Tianyuan Yu

Results 10 comments of Tianyuan Yu

Yeah that's why I asked since I didn't see implementations three years after.

I don't know the detail of this piece @Zhiyi-Zhang . But I suppose `ndn_gen_encrypted_payload` doesn't calculate `used_size` correctly.

Yes, and I'm not saying to use runtime if-else. I think I missed something here. No documentation have ever mentioned about `FEATURE_PERIPH_HWRNG` and how to use it, so if you...

@Zhiyi-Zhang How do you see this HMAC change? Personally I agree with "don't copy the key". But in default AES and ECC, they do copy keys as well. If we...

Clear, while still a little question: should a method be reserved for users retrieving the key bytes from the `ndn_hmac_key`? This job is currently done by copying keys in `ndn_lite_hmac_load_key`....

**Memory Usage in Encoding/Decoding** Naturally, we declare strings and then construct a `ndn_name_t` by `memcpy` from string bytes. Then we TLV encode `ndn_name_t` by reading memory buffer it holds. A...

>So my suggestion is to make 2 encoding systems, one for "beginners" which are easy to use, the other one is for "experts" which are well-tuned on performance. > I...

>I think it's because C don't have constructors so we must declare an empty one first? > Of course we can also use method like `struct A a={.b = 1,.c...

>I mean, as everything is ready, why don't we just supply a function called "make-interest" and ask the user give ALL things at once, and the result is IMMUTABLE? The...

Current `face_receive` is still called inside ISR, though only the last segment will trigger it. Our [UDP face](https://github.com/named-data-iot/ndn-iot-package-over-posix/blob/master/adaptation/udp/udp-face.c) in POSIX adaptation is a good example, showing how to utilize msg...