Azure Sphere – Unlock API

Basically, the user application is a dynamic object that only needs the name of the function from static library

and sysroot/2+Beta1905/usr/lib/libs.so

is a fake stub to the real static library sysroot../lib/ld-musl-armhf.so.1

The „Hack“

  • Open folder Sysroots/2+Beta19xx/lib/
  • Rename ld-musl-armhf.so.1 to _ld-musl-armhf.so.1 (don`t delete, backup)
  • Copy _ld-musl-armhf.so.1
  • Open folder …/2+Beta19xx/usr/lib/ and paste _ld-musl-armhf.so.1
  • Rename libc.so to _libc.so (don`t delete, backup)
  • Rename _ld-musl-armhf.so.1 to libc.so

And now you have ALL C functions (library musl)

MORE INFO here

Tested with sysroot 19.05 and can work with (all sysroots)

VStudio and VSCode

DEMO ( used wolfSSL ) MQTT to AmazonGoogle

 

Вашият коментар

Вашият имейл адрес няма да бъде публикуван. Задължителните полета са отбелязани с *