Jan D
Jan D
Hi nicolasb565, I don't have good news for you. STM32H5 does not have RSA, ECC hardware accelerator. It have hardware cryptography accelerator for AES, DES and hash accelerators. But these...
Hi nicolasb565, I did not know that at STM32H5 are devices with PKA (Public key accelerator) peripheral. If you will be able change device and use this accelerator, I think...
Hi hwmaier, Thank you for valuable comment. I am glad that you confirmed my observation that implementation of hw acceleration into NetX Crypto is not easy task. And my decision...
Hi @ATrocan, Just a quick question. Do you have disabled packet chaining feature by macro _NX_DISABLE_PACKET_CHAIN_? I would expect exact same error as you see when packet chaining is disabled....
Hi @ATrocan, OK. Unfortunately I don't have time to deeply debug this issue. Please wait for hints from other users. btw ... I saw already that you discussed this topic...
Hi @ATrocan, Do you use separate packet pool for TX of your TCP socket or do you share packet pool with other sockets or even RX? Maybe you can check...
Hi @ATrocan, Hard to say what is going on at your case (I never used BSD wrapper at NetX Duo). I used BSD sockets at my previous project, but I...
@weiliang6023 I am just curious, what is use case for disabling IPv4? Do you have security concerns?
Hi, Server verification against CA can be disabled by modifying _nx_secure_tls_remote_certificate_verify.c_. From line: _status = tls_session -> nx_secure_remote_certificate_verify(store, remote_certificate, current_time);_ to: _if (tls_session->nx_secure_tls_credentials.nx_secure_tls_certificate_store.nx_secure_x509_trusted_certificates != NULL) { status = tls_session ->...