Commit Graph

535 Commits (mbed-os-5.12)

Author SHA1 Message Date
offirko 665a80f671 If QER is undefined: do nothing but log warning and continue 2019-04-05 12:26:58 +01:00
offirko 27a306b91b Fixed Bus Mode bit mask to select best mode. When setting Quad Enable, either SR1, SR2 or CR setup is required. Either way register size is up to 2 bytes. 2019-04-05 12:26:57 +01:00
offirko 2386825946 Fix Bus mode mask and status register write size in some modes in quad enable 2019-04-05 12:26:57 +01:00
Arto Kinnunen 6b0897bc64 Nanostack 802.15.4 RF drivers update
Sync Nanostack RF drivers from master copy:
-MCR20A: v1.0.6
-S2LP: v0.0.5
2019-04-05 12:26:26 +01:00
itayzafrir e53e8b9f94 Remove uneeded TODO comment from the code 2019-04-05 12:26:22 +01:00
itayzafrir f45801a611 Unify code style
- Use designated initializers for IPC structs
- Unify variables declaration and initialization
2019-04-05 12:26:22 +01:00
itayzafrir e2eea51eaa Unify sections titles/comments & fix typo in comment 2019-04-05 12:26:22 +01:00
itayzafrir 0bd2275c04 Set handle to PSA_NULL_HANDLE when closing IPC connection 2019-04-05 12:26:22 +01:00
itayzafrir 8bc0c45d00 Use PSA_NULL_HANDLE when testing for invalid handles 2019-04-05 12:26:21 +01:00
itayzafrir f8cdd41415 Use psa prefix for crypto.h include 2019-04-05 12:26:21 +01:00
itayzafrir 9a5839ab8f Refactor crypto service proxy 2019-04-05 12:26:21 +01:00
Ari Parkkila 4d40487abe SPIF: Fix SPI_FREQ for MTB_ADV_WISE_1570 2019-04-05 12:26:19 +01:00
Kevin Bracey e16a275b68 Atmel RF: use system wait_ns
This driver's delay_ns was used as the basis of the system wait_ns -
migrate to that refined implementation.
2019-04-05 12:26:19 +01:00
Arto Kinnunen 54c8d5a0f5 Nanostack 802.15.4 RF drivers update
Sync Nanostack RF drivers from master copies:
-Atmel: v3.0.7
-MCR20A: v1.0.3
-S2LP: v0.0.4
2019-04-05 12:26:18 +01:00
Veijo Pesonen de14f2dc77 ESP8266: astyle, remove from the .astyleignore-file 2019-04-05 12:26:07 +01:00
Amir Cohen 77b60f4e06 Add flashiap block device comment 2019-03-19 13:12:36 +00:00
Amir Cohen 43f4e25496 Fix functionality for FlashIAPBD & SlicingBD
Due to discovery of inconsistent sector sizes in devices storage the is_valid_erase function was adjusted,
For FlashIAPBD the 'code size' was included to the calculation, preventing faulty "virtual" addresses calculation.
For SlicingBD the same error was fixed and in all 3 validation functions that sent addresses for validation and program/read/erase
different addresses.
2019-03-19 13:12:36 +00:00
Michael Schwarcz 0ac2cd377f TF-M patch: Handle extended stack frame in tfm_svcall_psa_call
- Fix failing attestation test on LPC55S69
- Link to bug tracking: https://developer.trustedfirmware.org/T276
2019-03-12 10:06:40 -05:00
Alexander Zilberkant 64530095b9 Rename psa_system_reset to mbed_psa_system_reset
add noreturn attributes
update lifecycle service to use psa/error.h
fix doxygen
2019-03-12 10:06:40 -05:00
itayzafrir ef368937aa Fix crypto compliance tests
Prevent passing null buffer with size which is non-zero.
2019-03-12 10:06:40 -05:00
Oren Cohen 2c49ae1cf1 Fix error codes for psa_attestation_inject_key 2019-03-12 10:06:40 -05:00
kegilbert 92e076e3ad Allow baremetal to build by removing PSA 2019-03-12 10:06:39 -05:00
Ryan Morse cf4e4364a6 Fixed issue with wrong floating point literal 2019-03-12 10:06:33 -05:00
Nir Sonnenschein 848c2da563 synchronize latest fix to tests
synchronize latest fix to test_c043
2019-03-12 10:06:30 -05:00
Michael Schwarcz 17312d428f TF-M config: Add max_ns_thread_count parameter 2019-03-12 10:06:30 -05:00
Nir Sonnenschein 1d56ad44a6 use common flag to allow test 3 for PS and ITS
add a compilation flag to allow tests which fill up the entire device storage.
storage test 003 (for both PS and its) is unsuitable for the regular CI because:
1. it takes a long time causing timeouts
2. it places a very high attrition load on the storage of the CI boards
    and this can cause them to fail much sooner.
2019-03-12 10:06:30 -05:00
Nir Sonnenschein dc50ccb5bc Fix for resource leak in crypto compliance test 43
Destroy key after import key in a loop
2019-03-12 10:06:30 -05:00
Nir Sonnenschein 339d481c07 Define psa_storage_info_t for backward compatibility 2019-03-12 10:06:30 -05:00
Netanel Gonen 932c09745e rework for mbed-os intf for ACK tests
-rework test wrapper functions to simplify test main
-move greentea init before test setup code to avoid boards losing sync.
2019-03-12 10:06:30 -05:00
Nir Sonnenschein 1333f31a40 Allow PS test03 with PS_ALLOW_ENTIRE_STORAGE_FILL flag 2019-03-12 10:06:30 -05:00
Nir Sonnenschein 4a474cefcf add main functions to each compliance test
add main function to each compliance test , moving shared code to a common file
2019-03-12 10:06:30 -05:00
Nir Sonnenschein 9621a04c7d Delete unneeded .mk files after test import
delete unneeded .mk files imported as part of the PSA compliance test suite
2019-03-12 10:06:30 -05:00
Nir Sonnenschein 678ac50f67 Updated to cb58d2c 2019-03-12 10:06:30 -05:00
Oren Cohen d2bf036fb9 Remove unused type which was conflicting wiith errno.h 2019-03-12 10:06:30 -05:00
Nir Sonnenschein 0cc6d1a448 indentation fix 2019-03-12 10:06:29 -05:00
Nir Sonnenschein a79d9d1be7 fix resource leaks 2019-03-12 10:06:29 -05:00
Alon 7cb3205475 Fix crypto service get key info out params 2019-03-12 10:06:29 -05:00
Moran Peker ee08d13395 Attestation doxygen 2019-03-12 10:06:29 -05:00
Michael Schwarcz 46e0dccb41 TF-M: Increase TFM_SPM_MAX_ROT_SERV_NUM from 30 to 32 2019-03-12 10:06:29 -05:00
Martin Kojtal bb61ea1433
Merge pull request #9917 from kfnta/attest_doxy
Add attestation doxygen
2019-03-06 09:14:26 +01:00
Martin Kojtal 5c24ffefa4
Merge pull request #9915 from kfnta/tfm_import_new
Update TF-M sources
2019-03-04 10:53:12 +01:00
Oren Cohen 064dc7d154 Attestation doxygen 2019-03-03 18:46:20 +02:00
Michael Schwarcz 7a2c7d7df4 TF-M patch: Fix tfm_memory_check issue (TF-M issue #224)
- Add Secure/non-secure code and secure heap to memory check
- Link to bug tracking: https://developer.trustedfirmware.org/T224
2019-03-03 16:47:53 +02:00
Michael Schwarcz 749faa6534 TF-M patch: Fix wrong check in tfm_spm_check_client_version (TF-M issue #236)
- Link to bug tracking: https://developer.trustedfirmware.org/T236

(cherry picked from commit 008bf1b2d1)
2019-03-03 16:47:47 +02:00
Michael Schwarcz 8a087a6504 TF-M patch: Fix tfm_psa_call_venner wrong argument type (TF-M issue #241)
- Link to bug tracking: https://developer.trustedfirmware.org/T241

(cherry picked from commit da01e3411f)
2019-03-03 16:47:41 +02:00
Michael Schwarcz ea8bff57b1 TF-M patch: Fix fixed-size partitions stack size (TF-M issue #240)
- Link to bug tracking: https://developer.trustedfirmware.org/T240

(cherry picked from commit fc78640559)
2019-03-03 16:47:34 +02:00
Michael Schwarcz 03dbd4bb28 TF-M patch: Fix service handles not cleared issue (TF-M issue #230)
- Link to bug tracking: https://developer.trustedfirmware.org/T230

(cherry picked from commit 0c23e86989)
2019-03-03 16:47:28 +02:00
Michael Schwarcz 87f22efcb5 TF-M patch: Fix tfm_ns_lock_init issue (TF-M issue #239)
- Link to bug tracking: https://developer.trustedfirmware.org/T239

(cherry picked from commit 5f2e4b3911)
2019-03-03 16:47:22 +02:00
Michael Schwarcz 71cd34df32 TF-M patch: General modifications
- Remove un-needed files
- Disable printf and uart
- Modify include paths
- Guard macros from mbed_lib with ifndef

(cherry picked from commit 1f30b52488)
2019-03-03 16:47:17 +02:00
Michael Schwarcz 823e5a2a7f [trusted-firmware-m]: Updated to f876e5c 2019-03-03 16:47:11 +02:00
Oren Cohen cfb60ec955 Fixes
* Add #include <stddef.h> to psa/client.h
* Add Attestation service to TFM
* Update FUTURE_SEQUANA_PSA secure binaries
* Remove MBED_SPM from K64F
* Refactor psa_manifest/sid.h
* Increase stackl size in spm-client tests
* Add handling of errors from psa_get in partitions
2019-03-03 13:30:58 +02:00
Michael Schwarcz 8fefa25a84 TF-M: Remove not-used platform headers 2019-03-03 10:55:47 +02:00
Michael Schwarcz b62c48977f Review fixes 2019-03-03 10:55:46 +02:00
Michael Schwarcz 20d7f817df Fix astyle 2019-03-03 10:55:46 +02:00
Michael Schwarcz 98efb44ea8 Remove another psa_identity 2019-03-03 10:55:46 +02:00
Michael Schwarcz ef76ec83ee Generate psa_manifest/sid.h 2019-03-03 10:55:46 +02:00
Oren Cohen 798e3c393a Call tfm_panic for SPM_PANIC 2019-03-03 10:55:45 +02:00
Michael Schwarcz faf5fcf795 Fix typo 2019-03-03 10:55:45 +02:00
Oren Cohen 0e74e09e56 Set default PSA client header for single v7 targets 2019-03-03 10:55:45 +02:00
Oren Cohen 737a3cc350 Advance to PSA-FF 1.0 2019-03-03 10:55:45 +02:00
Oren Cohen bd9a738473 Move SPM_PANIC to psa/service.h 2019-03-03 10:55:44 +02:00
Oren Cohen 306a51f6c0 Update psa_get() to return psa_status_t 2019-03-03 10:55:44 +02:00
Michael Schwarcz f9fbd6ae82 Align PSA SPM tests to TF-M 2019-03-03 10:55:42 +02:00
Oren Cohen 483b23c318 Fix SPM warnings 2019-03-03 10:54:55 +02:00
Oren Cohen dfbc7b6b7a Adapt partitons 2019-03-03 10:54:54 +02:00
Oren Cohen aad114aa55 Genrerate SPM data 2019-03-03 10:54:54 +02:00
Oren Cohen 21d09b4156 Unify flags 2019-03-03 10:54:53 +02:00
Oren Cohen a65baf55c6 Update psa_wait() and client_id 2019-03-03 10:54:53 +02:00
Kevin Bracey c368021e37 SPIFBlockDevice.h: include SingletonPtr.h
SPIFBlockDevice was using SingletonPtr without an include,
and only getting it via SPI.h.

Spotted while changing SPI to not use SingletonPtr - now
abandoned, but still this shouldn't have been relying on it.
2019-03-01 14:33:33 +02:00
Cruz Monrreal 9d9a076f10
Merge pull request #9885 from VeijoPesonen/esp8266_conn_timeout_err2trace
ESP8266: graceful disconnect on network state timeout
2019-02-28 19:56:11 -06:00
Cruz Monrreal befed111f5
Merge pull request #9668 from moranpeker/psa-init-attestation
PSA Initial Attestation service
2019-02-28 18:25:16 -06:00
Cruz Monrreal b84439552a
Merge pull request #9883 from itayzafrir/crypto-service-proxy-mem-fix
Free dynamic memory in Crypto Service proxy (PSA targets)
2019-02-28 18:23:17 -06:00
Cruz Monrreal b5878b164d
Merge pull request #9871 from VeijoPesonen/bugfix-esp8266-recv_busy
ESP8266: receive is able to handle device busy indication
2019-02-28 18:22:54 -06:00
Moran Peker 83d084afef add casting to increased void pointer 2019-02-28 20:30:05 +02:00
Martin Kojtal 211db10aeb
Merge pull request #9828 from artokin/update_802154_rf_drivers
Update 802.15.4 RF drivers to the latest version
2019-02-28 17:53:50 +01:00
Moran Peker 116e14ade6 change license to file that mostly based on TF-M implementation
from Apache-2.0 to BSD-3-Clause
2019-02-28 16:00:53 +02:00
Moran Peker 2b8621aa6c initialized psa_hash_operation_t to zeros before calling hash_setup
-initialized  psa_hash_operation_t to zeros
-fix TF-M attestation code - increase t_cose_crypto_hash bytes to
handle max psa_hash_operation_t size
2019-02-28 15:54:45 +02:00
Moran Peker 6346442f03 Add SW_SIGNER_ID data to boot status 2019-02-28 15:52:16 +02:00
Moran Peker bca8091e52 astyle fix 2019-02-28 14:13:24 +02:00
Veijo Pesonen 7bb887fef4 ESP8266: in unknown network state driver tries to disconnect 2019-02-28 12:44:49 +02:00
itayzafrir 362c307d84 Free dynamic memory in crypto proxy 2019-02-28 11:36:31 +02:00
Moran Peker 49c6a1caaf fix void pointer increasing with bytes 2019-02-28 11:17:31 +02:00
avolinski e4c7144355 Prevent compiler warning, converting psa_key_policy_t to const in call to psa_set_key_policy 2019-02-27 18:57:58 +02:00
Moran Peker b847138819 astyle fix 2019-02-27 16:33:06 +02:00
Martin Kojtal 7656891179
Merge pull request #9638 from itayzafrir/crypto-access-control
Crypto Service - keys access control
2019-02-27 14:47:49 +01:00
Moran Peker 97a9652f3f Use less stack 2019-02-27 15:34:22 +02:00
Moran Peker 4a2b06ed0d Remove includes from mbedtls 2019-02-27 15:04:28 +02:00
Moran Peker 6e3d238ffd Styling 2019-02-27 15:03:45 +02:00
Moran Peker 47f59b16cb Correct psa-crypto include 2019-02-27 15:02:47 +02:00
Arto Kinnunen 05dc1f2f0e Sync STM S2LP RF driver to v0.0.2
Sync with v0.0.2 in master repository.
2019-02-27 14:59:19 +02:00
Arto Kinnunen e8225fbd7c Sync with STM S2LP RF driver v0.0.1
Sync with v0.0.1 in master repository.
2019-02-27 14:59:19 +02:00
Arto Kinnunen 2c78427932 Sync with MCR20a RF driver v1.0.3
Sync with v1.0.3 in https://github.com/ARMmbed/mcr20a-rf-driver
2019-02-27 14:59:19 +02:00
Arto Kinnunen 3a9a50a7d7 Sync with Atmel RF driver v3.0.6
Sync with v3.0.6 in https://github.com/ARMmbed/atmel-rf-driver
2019-02-27 14:59:19 +02:00
Moran Peker 89ac1075df Documented any non apache files 2019-02-27 14:14:45 +02:00
Moran Peker 7dd58b99cc Add free to allocated buffer while error 2019-02-27 14:14:33 +02:00
Moran Peker a268b81a57 Remove extra buffers used
outputting straight into the final destination
2019-02-27 14:14:32 +02:00
Moran Peker 25fa5a6138 Remove TEMP_IMPL_ID_DATA and TEMP_IMPL_ID_DATA_SIZE
remove from public header into attestation_bootloader_data.c and add
const to impl_id_data
2019-02-27 14:14:31 +02:00
Moran Peker c97cecc273 Update TFM attestation code to latest version
The latest and greatest version is:
c43181daf54f69f53de58593a50dd6a9c233eecd

- Add new header file and implement tfm_memcpy (used in
attetstaion_core c file)
2019-02-27 14:14:30 +02:00
Moran Peker 2810d369f9 Remove incorrect free place 2019-02-27 14:14:29 +02:00
Moran Peker 661e2f92aa Remove header files from inc into services/attestation folder 2019-02-27 14:14:29 +02:00