diff --git a/src/core/ddsi/src/ddsi_security_exchange.c b/src/core/ddsi/src/ddsi_security_exchange.c index e510e2c..b475ad4 100644 --- a/src/core/ddsi/src/ddsi_security_exchange.c +++ b/src/core/ddsi/src/ddsi_security_exchange.c @@ -280,6 +280,8 @@ static bool write_crypto_exchange_message(const struct participant *pp, const dd nn_participant_generic_message_init(&pmg, &wr->e.guid, seq, dst_pguid, dst_eguid, src_eguid, classid, tokens, NULL); nn_participant_generic_message_serialize(&pmg, &data, &len); + nn_participant_generic_message_log(gv, &pmg, 0); + /* Get the key value. */ ddsrt_md5_state_t md5st; ddsrt_md5_byte_t digest[16]; diff --git a/src/core/ddsi/src/q_entity.c b/src/core/ddsi/src/q_entity.c index 69b75b5..d7b5c46 100644 --- a/src/core/ddsi/src/q_entity.c +++ b/src/core/ddsi/src/q_entity.c @@ -2480,7 +2480,7 @@ static void proxy_writer_add_connection (struct proxy_writer *pwr, struct reader /* These can change as a consequence of handling data and/or discovery activities. The safe way of dealing with them is to lock the proxy writer */ - if (is_builtin_entityid (rd->e.guid.entityid, NN_VENDORID_ECLIPSE) && !ddsrt_avl_is_empty (&pwr->readers)) + if (is_builtin_entityid (rd->e.guid.entityid, NN_VENDORID_ECLIPSE) && !ddsrt_avl_is_empty (&pwr->readers) && !pwr->filtered) { /* builtins really don't care about multiple copies or anything */ m->in_sync = PRMSS_SYNC; diff --git a/src/core/ddsi/src/q_receive.c b/src/core/ddsi/src/q_receive.c index 7a5f9a7..cdf7e2d 100644 --- a/src/core/ddsi/src/q_receive.c +++ b/src/core/ddsi/src/q_receive.c @@ -2300,7 +2300,7 @@ static void handle_regular (struct receiver_state *rst, nn_etime_t tnow, struct if (rres2 > 0) { if (!pwr->deliver_synchronously) - nn_dqueue_enqueue (pwr->dqueue, &sc, rres2); + nn_dqueue_enqueue1 (pwr->dqueue, &wn->rd_guid, &sc, rres2); else deliver_user_data_synchronously (&sc, &wn->rd_guid); }