@@ -393,6 +393,9 @@ _express_ekey_interest(uint8_t service)
393
393
if (ret != 0 ) return ret ;
394
394
ret = ndn_name_append_bytes_component (& interest .name , & service , 1 );
395
395
if (ret != 0 ) return ret ;
396
+ // append device-id to ekey_interest_name
397
+ ret = ndn_name_append_component (& interest .name , & storage -> self_identity [0 ].components [storage -> self_identity [0 ].components_size - 1 ]);
398
+ if (ret != 0 ) return ret ;
396
399
397
400
// signature signing
398
401
ndn_name_t * self_identity = ndn_key_storage_get_self_identity (service );
@@ -446,6 +449,10 @@ _express_dkey_interest(uint8_t service)
446
449
if (ret != 0 ) return ret ;
447
450
ret = ndn_name_append_bytes_component (& interest .name , & service , 1 );
448
451
if (ret != 0 ) return ret ;
452
+ // append device-id to dkey_interest_name
453
+ ret = ndn_name_append_component (& interest .name , & storage -> self_identity [0 ].components [storage -> self_identity [0 ].components_size - 1 ]);
454
+ if (ret != 0 ) return ret ;
455
+
449
456
450
457
// TODO: figure out a better way to sign instead of using the first cert
451
458
ndn_signed_interest_ecdsa_sign (& interest , & storage -> self_identity [0 ], & storage -> self_identity_key [0 ]);
@@ -603,4 +610,4 @@ ndn_ac_trigger_expiration(uint8_t service, uint32_t received_keyid)
603
610
}
604
611
605
612
return NDN_SUCCESS ;
606
- }
613
+ }
0 commit comments