Skip to content

Commit 8a29f3c

Browse files
umapraseedade-nordic
authored andcommitted
doc: Doc fixes for 2.4 release
Doc fixes for 2.4 release Signed-off-by: Uma Praseeda <[email protected]>
1 parent 1d1d442 commit 8a29f3c

File tree

9 files changed

+1109
-1100
lines changed

9 files changed

+1109
-1100
lines changed

README.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,11 +19,11 @@ Refer to their respective documentation for more information.
1919
nrf_modem/README
2020
mpsl/README
2121
nrf_802154/README
22+
nrf_fuel_gauge/README
2223
nfc/README
2324
nrf_dm/README
2425
nrf_security/README
2526
openthread/README
2627
nrf_rpc/README
2728
softdevice_controller/README
2829
zboss/README
29-
nrf_fuel_gauge/README

crypto/doc/nrf_cc310_mbedcrypto.rst

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -203,6 +203,12 @@ The library cannot be used in the :ref:`Non-Secure Processing Environment (NSPE)
203203
The hardware can only process one request at a time.
204204
Therefore, this library has used mutexes to make the library thread-safe.
205205

206+
On Arm CryptoCell 310 devices (nRF52840 and nRF91 Series), symmetric operations (like hashing and encryption) require data input to be present in DMA acessible RAM.
207+
208+
.. note::
209+
210+
In Arm CryptoCell 312 devices (nRF5340), there are no restrictions as CryptoCell has DMA access to Flash.
211+
206212
API documentation
207213
=================
208214

crypto/nrf_cc310_mbedcrypto/CHANGELOG.rst

Lines changed: 399 additions & 396 deletions
Large diffs are not rendered by default.

crypto/nrf_cc310_platform/CHANGELOG.rst

Lines changed: 366 additions & 366 deletions
Large diffs are not rendered by default.

crypto/nrf_oberon/CHANGELOG.rst

Lines changed: 294 additions & 294 deletions
Large diffs are not rendered by default.

nrf_modem/doc/CHANGELOG.rst

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -17,15 +17,15 @@ nrf_modem 2.4.0
1717

1818
* Added
1919

20-
* The ``NRF_SO_SEC_DTLS_CID`` and ``NRF_SO_SEC_DTLS_CID_STATUS`` socket options for DTLS connection ID.
21-
* The ``NRF_SO_SEC_DTLS_CONN_SAVE`` and ``NRF_SO_SEC_DTLS_CONN_LOAD`` socket options.
22-
* The ``NRF_SO_SEC_CIPHERSUITE_USED`` socket option (requires mfw v2.0.0).
23-
* The ``NRF_SO_SEC_HANDSHAKE_STATUS`` socket option (requires mfw v2.0.0).
20+
* The :c:macro:`NRF_SO_SEC_DTLS_CID` and :c:macro:`NRF_SO_SEC_DTLS_CID_STATUS` socket options for DTLS connection ID.
21+
* The :c:macro:`NRF_SO_SEC_DTLS_CONN_SAVE` and :c:macro:`NRF_SO_SEC_DTLS_CONN_LOAD` socket options.
22+
* The :c:macro:`NRF_SO_SEC_CIPHERSUITE_USED` socket option (requires modem firmware v2.0.0).
23+
* The :c:macro:`NRF_SO_SEC_HANDSHAKE_STATUS` socket option (requires modem firmware v2.0.0).
2424
* The :c:macro:`NRF_SOCKET_TLS_MAX_SEC_TAG_LIST_SIZE` macro to indicate the maximum number of security tags that can be associated with a socket.
2525
* Several new macros for allowed TLS/DTLS socket option values.
2626

2727
* Fixed a memory leak in the :c:func:`nrf_getsockopt` function, in certain cases where the function returned an error.
28-
* The :c:macro:`NRF_MODEM_MAX_SOCKET_COUNT` macro was moved to :file:`nrf_socket.h`, from :file:`nrf_modem.h`.
28+
* The :c:macro:`NRF_MODEM_MAX_SOCKET_COUNT` macro was moved from :file:`nrf_modem.h` to :file:`nrf_socket.h`.
2929

3030
:ref:`AT interface <nrf_modem_at>`
3131
==================================

nrf_modem/doc/at_interface.rst

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -233,7 +233,7 @@ The following is the response format that must be the same as the modem's:
233233
* Successful responses end with ``OK\r\n``.
234234
* For error response, use ``ERROR\r\n``, ``+CME ERROR: <errorcode>``, or ``+CMS ERROR: <errorcode>`` depending on the error.
235235

236-
The following snippet shows how to set up and use an custom AT command:
236+
The following snippet shows how to set up and use a custom AT command:
237237

238238
.. code-block:: c
239239
@@ -319,9 +319,9 @@ The user is responsible for rescheduling the processing of AT notifications as a
319319
In |NCS|, the :ref:`at_monitor_readme` library takes care of dispatching notifications to different parts of the application.
320320

321321
.. important::
322-
In NCS applications, many libraries use the :ref:`at_monitor_readme` library to register their own callback with the Modem library using the :c:func:`nrf_modem_at_notif_handler_set` function.
323-
If you are building an NCS application, do not use the :c:func:`nrf_modem_at_notif_handler_set` function to register your callback.
324-
Instead, use the :ref:`at_monitor_readme` library to dispatch AT notifications to where you need them in your application, and to ensure compatibility with other NCS libraries.
322+
In |NCS| applications, many libraries use the :ref:`at_monitor_readme` library to register their own callback with the Modem library using the :c:func:`nrf_modem_at_notif_handler_set` function.
323+
If you are building an |NCS| application, do not use the :c:func:`nrf_modem_at_notif_handler_set` function to register your callback.
324+
Instead, use the :ref:`at_monitor_readme` library to dispatch AT notifications to where you need them in your application, and to ensure compatibility with other |NCS| libraries.
325325
The :ref:`at_monitor_readme` library also takes care of rescheduling the notifications to a thread context.
326326

327327
Thread safety

nrf_modem/doc/sockets.rst

Lines changed: 32 additions & 32 deletions
Original file line numberDiff line numberDiff line change
@@ -70,7 +70,7 @@ The following table shows all socket options supported by the Modem library.
7070
+-----------------+---------------------------------+------------------------+------------+--------------------------------------------------------------------------------------------+
7171
| NRF_SOL_SECURE | NRF_SO_SEC_HOSTNAME | ``char *`` | get/set | Set/get the hostname to check against during TLS handshakes. |
7272
+-----------------+---------------------------------+------------------------+------------+--------------------------------------------------------------------------------------------+
73-
| NRF_SOL_SECURE | NRF_SO_SEC_CIPHERSUITE_LIST | ``nrf_sec_cipher_t *`` | get/set | Set/get allowed ciphersuite list. |
73+
| NRF_SOL_SECURE | NRF_SO_SEC_CIPHERSUITE_LIST | ``nrf_sec_cipher_t *`` | get/set | Set/get allowed cipher suite list. |
7474
+-----------------+---------------------------------+------------------------+------------+--------------------------------------------------------------------------------------------+
7575
| NRF_SOL_SECURE | NRF_SO_SEC_PEER_VERIFY | ``nrf_peer_verify_t`` | get/set | Set/get Peer verification level. |
7676
+-----------------+---------------------------------+------------------------+------------+--------------------------------------------------------------------------------------------+
@@ -108,12 +108,12 @@ The details for each socket are described as follows:
108108
NRF_SO_ERROR
109109
When this option is specified, :c:func:`nrf_getsockopt` returns any pending errors on the socket and clears the error status.
110110
It returns a ``0`` value if there is no pending error.
111-
``NRF_SO_ERROR`` might be used to check for asynchronous errors on connected connectionless-mode sockets or for other types of asynchronous errors.
112-
``NRF_SO_ERROR`` has no default value.
111+
:c:macro:`NRF_SO_ERROR` might be used to check for asynchronous errors on connected connectionless-mode sockets or for other types of asynchronous errors.
112+
:c:macro:`NRF_SO_ERROR` has no default value.
113113

114114
NRF_SO_REUSEADDR
115115
Allow for the reuse of local addresses by using the :c:func:`nrf_bind` function.
116-
The default value for ``NRF_SO_REUSEADDR`` is ``off``, that is, reuse of local addresses is not permitted.
116+
The default value for :c:macro:`NRF_SO_REUSEADDR` is ``off``, that is, reuse of local addresses is not permitted.
117117

118118
NRF_SO_RCVTIMEO
119119
Set a timeout value for the :c:func:`nrf_recv` and :c:func:`nrf_recvfrom` operations.
@@ -217,18 +217,18 @@ NRF_SO_SEC_PEER_VERIFY
217217
Set the peer verification level.
218218
The following values are accepted:
219219

220-
* ``NRF_SO_SEC_PEER_VERIFY_NONE`` - No peer verification
221-
* ``NRF_SO_SEC_PEER_VERIFY_OPTIONAL`` - Optional peer verification
222-
* ``NRF_SO_SEC_PEER_VERIFY_REQUIRED`` - Peer verification is required
220+
* :c:macro:`NRF_SO_SEC_PEER_VERIFY_NONE` - No peer verification
221+
* :c:macro:`NRF_SO_SEC_PEER_VERIFY_OPTIONAL` - Optional peer verification
222+
* :c:macro:`NRF_SO_SEC_PEER_VERIFY_REQUIRED` - Peer verification is required
223223

224224
By default, peer verification is required.
225225

226226
NRF_SO_SEC_ROLE
227227
Set the role for the connection.
228228
The following values are accepted:
229229

230-
* ``NRF_SO_SEC_ROLE_CLIENT`` - Client role
231-
* ``NRF_SO_SEC_ROLE_SERVER`` - Server role
230+
* :c:macro:`NRF_SO_SEC_ROLE_CLIENT` - Client role
231+
* :c:macro:`NRF_SO_SEC_ROLE_SERVER` - Server role
232232

233233
The default role is client.
234234
For TLS, the choice is implicit from the usage of ``listen()``, ``accept()`` and ``connect()``.
@@ -237,8 +237,8 @@ NRF_SO_SEC_SESSION_CACHE
237237
This option controls TLS session caching.
238238
The following values are accepted:
239239

240-
* ``NRF_SO_SEC_SESSION_CACHE_DISABLED`` - Disable TLS session caching
241-
* ``NRF_SO_SEC_SESSION_CACHE_ENABLED`` - Enable TLS session caching
240+
* :c:macro:`NRF_SO_SEC_SESSION_CACHE_DISABLED` - Disable TLS session caching
241+
* :c:macro:`NRF_SO_SEC_SESSION_CACHE_ENABLED` - Enable TLS session caching
242242

243243
By default, TLS session caching is disabled.
244244

@@ -252,13 +252,13 @@ NRF_SO_SEC_DTLS_HANDSHAKE_TIMEO
252252
The following values are accepted:
253253

254254
* 0 - No timeout
255-
* ``NRF_SO_SEC_DTLS_HANDSHAKE_TIMEOUT_1S`` - 1 second
256-
* ``NRF_SO_SEC_DTLS_HANDSHAKE_TIMEOUT_3S`` - 3 seconds
257-
* ``NRF_SO_SEC_DTLS_HANDSHAKE_TIMEOUT_7S`` - 7 seconds
258-
* ``NRF_SO_SEC_DTLS_HANDSHAKE_TIMEOUT_15S`` - 15 seconds
259-
* ``NRF_SO_SEC_DTLS_HANDSHAKE_TIMEOUT_31S`` - 31 seconds
260-
* ``NRF_SO_SEC_DTLS_HANDSHAKE_TIMEOUT_63S`` - 63 seconds
261-
* ``NRF_SO_SEC_DTLS_HANDSHAKE_TIMEOUT_123S`` - 123 seconds
255+
* :c:macro:`NRF_SO_SEC_DTLS_HANDSHAKE_TIMEOUT_1S` - 1 second
256+
* :c:macro:`NRF_SO_SEC_DTLS_HANDSHAKE_TIMEOUT_3S` - 3 seconds
257+
* :c:macro:`NRF_SO_SEC_DTLS_HANDSHAKE_TIMEOUT_7S` - 7 seconds
258+
* :c:macro:`NRF_SO_SEC_DTLS_HANDSHAKE_TIMEOUT_15S` - 15 seconds
259+
* :c:macro:`NRF_SO_SEC_DTLS_HANDSHAKE_TIMEOUT_31S` - 31 seconds
260+
* :c:macro:`NRF_SO_SEC_DTLS_HANDSHAKE_TIMEOUT_63S` - 63 seconds
261+
* :c:macro:`NRF_SO_SEC_DTLS_HANDSHAKE_TIMEOUT_123S` - 123 seconds
262262

263263
The default is no timeout.
264264

@@ -268,8 +268,8 @@ NRF_SO_SEC_HANDSHAKE_STATUS
268268
The socket option is supported from modem firmware v2.x.x.
269269
The following values are expected:
270270

271-
* ``NRF_SO_SEC_HANDSHAKE_STATUS_FULL`` - TLS/DTLS attach/negotiation procedure was made with a full handshake, and session cache data was not used or it was not accepted by the server.
272-
* ``NRF_SO_SEC_HANDSHAKE_STATUS_CACHED`` - The latest TLS/DTLS attach negotiation was completed successfully with cached session data.
271+
* :c:macro:`NRF_SO_SEC_HANDSHAKE_STATUS_FULL` - TLS/DTLS attach/negotiation procedure was made with a full handshake, and session cache data was not used or it was not accepted by the server.
272+
* :c:macro:`NRF_SO_SEC_HANDSHAKE_STATUS_CACHED` - The latest TLS/DTLS attach negotiation was completed successfully with cached session data.
273273

274274
The default is a full handshake.
275275

@@ -278,9 +278,9 @@ NRF_SO_SEC_DTLS_CID
278278
The socket option is supported from modem firmware v1.3.x, where x is greater than or equal to 5, and v2.x.x.
279279
The following values are accepted:
280280

281-
* ``NRF_SO_SEC_DTLS_CID_DISABLED`` - The DTLS connection ID is not used, and the connection ID extension is not included in the client hello.
282-
* ``NRF_SO_SEC_DTLS_CID_SUPPORTED`` - The DTLS connection ID is supported but not used, and the connection ID extension with a zero-length CID is included in the client hello.
283-
* ``NRF_SO_SEC_DTLS_CID_ENABLED`` - The DTLS connection ID is used, and the connection ID extension with a valid CID is included in the client hello.
281+
* :c:macro:`NRF_SO_SEC_DTLS_CID_DISABLED` - The DTLS connection ID is not used, and the connection ID extension is not included in the client hello.
282+
* :c:macro:`NRF_SO_SEC_DTLS_CID_SUPPORTED` - The DTLS connection ID is supported but not used, and the connection ID extension with a zero-length CID is included in the client hello.
283+
* :c:macro:`NRF_SO_SEC_DTLS_CID_ENABLED` - The DTLS connection ID is used, and the connection ID extension with a valid CID is included in the client hello.
284284

285285
The default is disabled.
286286

@@ -290,29 +290,29 @@ NRF_SO_SEC_DTLS_CID_STATUS
290290
The socket option is supported from modem firmware v1.3.x, where x is greater than or equal to 5, and v2.x.x.
291291
The following values are expected:
292292

293-
* ``NRF_SO_SEC_DTLS_CID_STATUS_DISABLED`` - The DTLS connection ID is not included in DTLS records sent to and from the modem.
293+
* :c:macro:`NRF_SO_SEC_DTLS_CID_STATUS_DISABLED` - The DTLS connection ID is not included in DTLS records sent to and from the modem.
294294
This status is returned before the DTLS handshake is complete.
295-
* ``NRF_SO_SEC_DTLS_CID_STATUS_DOWNLINK`` - The DTLS connection ID is included only in DTLS records sent to the modem.
296-
* ``NRF_SO_SEC_DTLS_CID_STATUS_UPLINK`` - The DTLS connection ID is included only in DTLS records sent from the modem.
297-
* ``NRF_SO_SEC_DTLS_CID_STATUS_BIDIRECTIONAL`` - The DTLS connection ID is included in DTLS records sent to and from the modem.
295+
* :c:macro:`NRF_SO_SEC_DTLS_CID_STATUS_DOWNLINK` - The DTLS connection ID is included only in DTLS records sent to the modem.
296+
* :c:macro:`NRF_SO_SEC_DTLS_CID_STATUS_UPLINK` - The DTLS connection ID is included only in DTLS records sent from the modem.
297+
* :c:macro:`NRF_SO_SEC_DTLS_CID_STATUS_BIDIRECTIONAL` - The DTLS connection ID is included in DTLS records sent to and from the modem.
298298

299299
NRF_SO_SEC_DTLS_CONN_SAVE
300300
Save DTLS connection.
301301
This option is write-only.
302302
This option require a DTLS v1.2 connection with renegotiation disabled.
303303
The socket option is supported from modem firmware v1.3.x, where x is greater than or equal to 5, and v2.x.x.
304304

305-
Once the DTLS context is saved, the socket can't be used before the DTLS context is loaded with NRF_SO_SEC_DTLS_CONN_LOAD.
305+
Once the DTLS context is saved, the socket can't be used before the DTLS context is loaded with :c:macro:`NRF_SO_SEC_DTLS_CONN_LOAD`.
306306

307307
This option will fail with nrf_errno ``NRF_EAGAIN`` if an error happened during serialization of the SSL context.
308308
This can occur, for instance, when the modem cannot allocate enough memory or if the socket is busy sending or receiving data.
309309
In this case, the SSL context is still present in the socket, so data sending is still possible.
310310
The option will fail with nrf_errno ``NRF_EINVAL`` if the socket option is not supported with the current configuration, for instance because the DTLS handshake is not completed,
311-
the connection is not an DTLS v1.2 connection with renegotiation disabled, or the connection does not use an AEAD ciper suite (AES-CCM or AES-GCM).
311+
the connection is not an DTLS v1.2 connection with renegotiation disabled, or the connection does not use an AEAD cipher suite (AES-CCM or AES-GCM).
312312
The option will fail with nrf_errno ``NRF_ENOMEM`` if the amount of saved connections exceeds four.
313313

314314
NRF_SO_SEC_DTLS_CONN_LOAD
315-
LOAD DTLS connection.
315+
Load DTLS connection.
316316
This option is write-only.
317317
The socket option is supported from modem firmware v1.3.x, where x is greater than or equal to 5, and v2.x.x.
318318

@@ -336,7 +336,7 @@ For more information about how to configure PDP contexts, activate PDN connectio
336336
Configuring a socket to use a PDN
337337
=================================
338338

339-
The application can select which PDN to use on a specific socket by using the :c:func:`nrf_setsockopt` function, with the ``NRF_SO_BINDTODEVICE`` option and specifying the PDN ID as a string, prefixed by ``pdn``.
339+
The application can select which PDN to use on a specific socket by using the :c:func:`nrf_setsockopt` function, with the :c:macro:`NRF_SO_BINDTODEVICE` option and specifying the PDN ID as a string, prefixed by ``pdn``.
340340
For example, to select the PDN with ID 1, the application must pass ``pdn1`` as the option value.
341341

342342
The following code shows how to create an IPv4 TCP stream socket and configure it to use the PDN with ID 1:
@@ -369,7 +369,7 @@ Handling PDN errors on sockets
369369
During operation, an active PDN connection may be deactivated due to loss of connectivity or other reasons.
370370
When a socket operation is attempted on a socket that no longer has an active PDN connection, the operation will return ``-1`` and set ``errno`` to ``NRF_ENETDOWN``.
371371
If the socket is being polled, the :c:func:`nrf_poll` function will set the ``POLLERR`` flag and set the socket error to ``NRF_ENETDOWN``.
372-
The socket error can be retrieved using the ``NRF_SO_ERROR`` socket option.
372+
The socket error can be retrieved using the :c:macro:`NRF_SO_ERROR` socket option.
373373

374374
When the ``NRF_ENETDOWN`` error is detected, the socket is no longer usable and must be closed by the application.
375375
The application is responsible for detecting when the PDN connection is activated again, before re-creating the socket and attempting the failed operation again.

softdevice_controller/CHANGELOG.rst

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -30,8 +30,8 @@ Changes
3030

3131
* The ``VersNr`` field in the ``LL_VERSION_IND`` packet now contains the value 0x0D to indicate compatibility with Bluetooth Core Specification v5.4 (DRGN-18624).
3232
* Receiving a Periodic Advertisement Sync Transfer (PAST) with invalid parameters will now generate the ``LE Periodic Advertising Sync Transfer Received`` event when receiving PAST is enabled (DRGN-18803).
33-
* Periodic advertiser is allocated from the Periodic Advertising with Responses (PAwR) Advertiser sets when :c:enumerator:`SDC_CFG_TYPE_PERIODIC_ADV_RSP_COUNT` is available.
34-
Otherwise, it is allocated from the Periodic Advertiser sets if :c:enumerator:`SDC_CFG_TYPE_PERIODIC_ADV_COUNT` is set (DRGN-18979).
33+
* Periodic advertiser is allocated from the Periodic Advertising with Responses (PAwR) Advertiser sets when :c:enum:`SDC_CFG_TYPE_PERIODIC_ADV_RSP_COUNT` is available.
34+
Otherwise, it is allocated from the Periodic Advertiser sets if :c:enum:`SDC_CFG_TYPE_PERIODIC_ADV_COUNT` is set (DRGN-18979).
3535
* The controller now returns the error code ``0x0D`` instead of ``0x09`` if it has insufficient resources to handle more connections and the host tries to start a connectable advertiser or the controller receives the commands ``LE Extended Create Connection`` or ``LE Create Connection`` (DRGN-18944).
3636

3737
Bug fixes

0 commit comments

Comments
 (0)