Commit Graph

210 Commits (tools-release-6.0.0)

Author SHA1 Message Date
Darryl Green fcf60ec683 Move frameworks/TARGET_PSA to TARGET_EXPERIMENTAL_API 2020-05-29 13:19:12 +01:00
Marcelo Salazar ccd95f1e14 Remove nRF51 targets
The following public nRF51 targets are being removed:

- NRF51822
- NRF51_DK
- NRF51_MICROBIT
2020-05-13 10:36:50 +01:00
Darryl Green 53260ebd77 Use updated ECC curve macros
Signed-off-by: Darryl Green <darryl.green@arm.com>
2020-04-30 11:28:10 +01:00
Martin Kojtal a9cb876b39
Merge pull request #12737 from Patater/psa-breaking-changes
Remove PSA implementation for v8-M and dual CPU targets
2020-04-30 10:42:24 +02:00
Jaeden Amero fcf427ac11 psa: Remove S-mode only code
Remove all PSA S-mode only code, as it is unused. Only PSA S targets
would use the code, and we've removed those targets in a previous
commit.

Ensure all tests for S-mode code we are deleting is also removed, even
if that code would run in NS-mode. Keep any tests that also test our PSA
emulation support (for single v7-M targets).

Signed-off-by: Jaeden Amero <jaeden.amero@arm.com>
2020-04-27 09:51:13 +01:00
Teemu Takaluoma e254ce9975 Update mbed-coap to version 5.1.5
BLOCK2 code-branch was missing handling for duplicate packets. As part of the fix, added also
a call to update the duplicate package data via a new function
sn_coap_protocol_update_duplicate_package_data_all.

The new implementation handles all CoAP messages, not just those with COAP_MSG_TYPE_ACKNOWLEDGEMENT.
2020-04-27 11:11:43 +03:00
Antti Yli-Tokola 267d3bc797 Update mbed-coap to version 5.1.4
Add also 4.13 (Request Entity Too Large) responses to duplicate info list.

Add client library configurations for DEFAULT_RESPONSE_TIMEOUT and SN_COAP_DUPLICATION_MAX_TIME_MSGS_STORED.

Increased the default timeouts of DEFAULT_RESPONSE_TIMEOUT and SN_COAP_DUPLICATION_MAX_TIME_MSGS_STORED to 300 seconds.
These two are critical parameters for low-bandwidth high-latency networks. The defaults should be more geared towards such networks that are likely to have issues with transmissions.
The increased defaults can increase the runtime HEAP usage when there is a lot of duplicates or retransmissions.
2020-04-23 13:14:50 +03:00
Martin Kojtal 27405bff31
Merge pull request #12671 from hugueskamba/hk-netsocket-remove-armc5-support
Netsocket/lwIP Stack: Remove support for ARM Compiler 5
2020-04-20 14:16:20 +02:00
Hugues Kamba 209f1e6a71 Netsocket/lwIP Stack: Remove support for ARM Compiler 5
ARM Compiler 5 is no longer actively supported and was superseded in
Mbed OS by ARM Compiler 6.
2020-03-31 10:54:36 +01:00
Martin Kojtal 6cdb44ea38
Merge pull request #12682 from jeromecoutant/PR_TRACELEVEL
MBED TRACE default level is INFO
2020-03-31 09:28:11 +02:00
Martin Kojtal 5d07fa8ada
Merge pull request #12705 from hugueskamba/hk_remove_armc5_support_mbed-client
mbed-client-cli: Remove support for ARM Compiler 5
2020-03-31 08:34:33 +02:00
Hugues Kamba a79ae95703 mbed-client-cli: Remove support for ARM Compiler 5
ARM Compiler 5 is no longer actively supported and was superseded in
Mbed OS by ARM Compiler 6.
2020-03-26 13:45:46 +00:00
Hugues Kamba 4318a0747f Tests: Remove support for ARM Compiler 5
ARM Compiler 5 is no longer actively supported and was superseded in
Mbed OS by ARM Compiler 6.
2020-03-25 18:22:00 +00:00
jeromecoutant 7b0ac0669f MBED TRACE default level is INFO 2020-03-24 09:36:21 +01:00
Martin Kojtal 0286e3c325
Merge pull request #12525 from rajkan01/ticker_remove_deprecated
Remove the deprecated Ticker APIs
2020-02-28 09:52:22 +00:00
Martin Kojtal 9ad292a2a3
Merge pull request #12466 from jeromecoutant/PR_METRIC
MBED_STACK_STATS_ENABLED : Add stack_name information in greentea metrics
2020-02-28 08:45:44 +00:00
Rajkumar Kanagaraj db0bf08e4d Remove the deprecated Ticker APIs 2020-02-27 03:26:12 -08:00
jeromecoutant 2df428b36d MBED_STACK_STATS_ENABLED : Add stack_name information in greentea metrics 2020-02-18 18:00:40 +01:00
David Lin 49b0f43cff
Fixed typo: 'lenght' in ip6string.h
Note that the word 'lenght' is wrong,
so that 'lenght' should been replaced with 'length'.
2020-02-16 18:38:19 +08:00
Hugues Kamba dbaeeaf758 Replace RawSerial instances as it has been deprecated 2020-01-06 15:48:49 +00:00
Martin Kojtal de798c4f37
Merge pull request #12147 from ristohuhtala/mbed-coap-builder-uint-overflow
mbed-coap uint16 overflow fix
2020-01-02 13:51:14 +00:00
Risto Huhtala 82caa9007e Code review fix. Removing extra spaces 2020-01-02 13:40:50 +02:00
Risto Huhtala 1d220135c9 Update mbed-coap changelog-md with v5.1.3 information 2019-12-30 09:37:17 +02:00
Risto Huhtala 03b12ed334 mbed-coap uint16 overflow when calculating packet data size 2019-12-20 11:34:53 +02:00
Risto Huhtala 9f0c0043d8 mbed-coap Buffer overflow when paring CoAP message 2019-12-20 10:42:54 +02:00
Antti Kauppila 11b1df00b8 Coverity fix for mbed-client-cli
- uint64_t cast added to avoid overflow
2019-12-11 09:32:02 +02:00
Antti Yli-Tokola 4a491b99df Update mbed-coap to version 5.1.2
Compiler warning cleanups.
2019-11-20 22:36:25 +02:00
Martin Kojtal d556bf698f
Merge pull request #11821 from rajkan01/feature-baremetal-greentea-psa
Skip Bare Metal green tea test for PSA component
2019-11-12 11:07:16 +01:00
RAJKUMAR KANAGARAJ f30dd1cef2 Enable the Bare Metal green tea test
-PSA test framework uses the RTOS threads to run test cases so added MBED_CONF_RTOS_PRESENT to all the test cases.
2019-11-06 03:15:49 -08:00
RAJKUMAR KANAGARAJ b1731ce3c8 -New PR for PSA,Netsocket,storage components,reverted all the changes to back to original
-Change the #error description more precisely
 -Separated the MBED_CONF_RTOS_PRESENT guarded
2019-11-06 01:59:05 -08:00
RAJKUMAR KANAGARAJ 3fc8905315 Fixed the greentea test dependency and incorporated the review comments
-Added the mbedtls,crypto,psa,filesystem,fat,littlefs in baremetal.json to resolve compiler issue
 -Disable metrics that are not available for bare metal
 -Moved the baremetal.json inside TESTS/configs directory
2019-11-05 08:49:27 -08:00
RAJKUMAR KANAGARAJ f402dbb2da Bare metal greentea support
-Added the baremetal.json on Tests directory to enable bare-metal
 -Conditional enable of greentea metrics

Note:
Run green tea with bare metal
mbed test  -m target -t GCC_ARM -n tests-mbed_platform-transaction  --app-config TESTS/baremetal.json
2019-11-05 08:49:27 -08:00
Martin Kojtal f1392d6b6b
Merge pull request #11695 from jeromecoutant/PR_GREENTEA_TRACE
GREENTEA: init trace if trace is enabled in json
2019-10-29 15:13:31 +01:00
Martin Kojtal 02c722af42
Merge pull request #11620 from jainvikas8/ISSUE-11256
Fix enum type to align with psa-arch-tests
2019-10-22 09:42:13 +02:00
jeromecoutant 0d678e9299 GREENTEA: init trace if trace is enabled in json 2019-10-16 11:47:07 +02:00
Vikas Katariya c1486eaf41 Fix enum type to align with psa-arch-tests
This is related to https://github.com/ARMmbed/mbed-os/issues/11256
When TARGET_PSA is enabled on Cortex-A boards, the SECURE
is redeclared. So to minimize the impact we can redeclare this in
val.h which is used only by Mbed. And `security_t` itself is used in
mbed-os\components\TARGET_PSA\TESTS, but the SECURE string is not used.

Renamed to `caller_security_t` which aligns with
https://github.com/ARM-software/psa-arch-tests
2019-10-02 16:37:58 +01:00
int_szyk 76407bc654 sn_coap_builder: remove unnecessary code.
Fixes Coverity issue about unused variable.
2019-09-24 11:35:52 +02:00
Yogesh Pande 246f431ed4 Delaying message id random initialization to later stage.
Random initialization sequence is causing start up issues in multiple platform
when done at construction phase.
The right thing is to delay the random initialization to later stage when the
message id is actually required. This provides system to do all necessary allocation
upfront without causing any random race condition at startup phase.
2019-09-13 16:17:14 +03:00
Martin Kojtal 87cdef9258
Merge pull request #11408 from SeppoTakalo/mbed_trace_nanomesh
Remove mbed_trace dependency to Nanomesh headers
2019-09-06 14:36:14 +02:00
Seppo Takalo a7634a1e5a Include ns_types.h before mbed_trace.h in Nanomesh 2019-09-06 13:05:19 +03:00
Seppo Takalo 40841453a5 Remove mbed_trace dependency to Nanomesh headers
This library only uses standard types from C99, and
thus does not need compiler specific tweaks from ns_types.h
2019-09-06 10:40:14 +03:00
Martin Kojtal 567479792c
Merge pull request #11392 from hugueskamba/hk-remove-minor-warnings
Remove minor build warnings
2019-09-05 09:59:39 +02:00
Hugues Kamba 8c22bbbbc8 Use PRIu32 to print uint32_t variable
As the variable underlying type size is different depending on the
toolchain used
2019-09-03 09:29:06 +01:00
Martin Kojtal e001216b55
Merge pull request #11315 from Patater/psa-crypto-api-1.0b3
Update Mbed OS for PSA Crypto API 1.0b3
2019-09-03 09:20:15 +02:00
Jaeden Amero 95d448b63d attestation: Erase storage before test
Be robust when keys can't be opened for deletion by erasing storage and
thereby all keys.
2019-09-02 17:10:59 +01:00
Jaeden Amero 3d1b8363db Use PSA Crypto API 1.0b3
The PSA Crypto API has moved on from 1.0b2 to 1.0b3, bringing along with
it some breaking changes. Update Mbed OS to use the 1.0b3 API.
2019-09-02 17:10:59 +01:00
Hugues Kamba e65a0c0a99 Remove minor build warnings 2019-09-02 15:04:58 +01:00
Antti Yli-Tokola 5f92db3c12 Add a flag to maintain backward compatibility
By default CoAP will create a copy of the whole data to be passed to application and it keeps the backward compatibility.

If enabled, application must NOT free the payload when it gets the COAP_STATUS_PARSER_BLOCKWISE_MSG_RECEIVED status.
And application must call sn_coap_protocol_block_remove() instead.
2019-08-29 13:34:24 +03:00
Antti Yli-Tokola d74326e5cc Update changelog about the breaking change 2019-08-28 14:22:03 +03:00
Antti Yli-Tokola 2774e3f301 Update mbed-coap to version 5.0.0
- Reduce heap footprint by storing only single block when receiving a blockwise message.
    * User is now responsible of freeing the data by calling sn_coap_protocol_block_remove() and must not free the payload separately.
- Bug fix: Request blockwise transfer if incoming payload length is too large and when it comes without block indication.
2019-08-28 11:26:55 +03:00