Commit Graph

974 Commits (tools-release-test-cov-patterns)

Author SHA1 Message Date
Martin Kojtal 0560ecc558
Merge pull request #10478 from chrissnow/Dataflash-Erase_Size
DataFlash: Change erase size to pages to reduce memory usage.
2019-05-21 14:46:32 +01:00
Arto Kinnunen f03e51a23d Sync 802.15.4 RF drivers from master repos
-Sync STM S2LP with v0.0.6 in master repo
-Sync Atmel with v3.0.8 in master repo
-Sync MCR20A with v1.0.6 in master repo
2019-05-20 15:27:25 +03:00
Anna Bridge 9fb4429379
Merge pull request #10520 from kjbracey-arm/build_tz_heuristic
Permit non-TrustZone ARMv8 build
2019-05-17 11:06:55 +01:00
Chris Snow 157debffa6 Change erase size to pages to reduce memory usage 2019-05-15 16:23:16 -06:00
Martin Kojtal 3ea1c56124
Merge pull request #10147 from kjbracey-arm/atomic_bitwise
Assembler atomics
2019-05-13 14:18:05 +01:00
Anna Bridge 97e1c9cbaf
Merge pull request #10287 from linlingao/pr10177
Enable MTS_DRAGONFLY_F411RE to register with Pelion
2019-05-10 16:21:46 +01:00
Russ Butler 166ff13fe8 Add missing documentation
Add documentation to the MbedTester class and the test_utils.h file.
2019-05-08 13:15:42 -05:00
Russ Butler 45301ea718 Run astyle on all FPGA files
Run astyle to correct formatting.
2019-05-08 11:01:17 -05:00
Russ Butler 11bd96601b Remove inclusion of mbed.h from FPGA
And fix any build errors this caused.
2019-05-07 17:01:44 -05:00
Russ Butler b3332129b2 Check in files for the FPGA CI Test Shield
Bring all the FPGA CI Test Shield C and C++ driver files into mbed-os
as the component FPGA_CI_TEST_SHIELD. When this component is enabled
all the files that are needed to communicate with, update firmware on
and run testing with the FPGA are built.
2019-05-07 15:10:47 -05:00
Kevin Bracey 65e0887ef3 Permit non-TrustZone ARMv8 build
Change the heuristic for selection of CMSE in the tools python, so that
a non-TrustZone ARMv8 build can happen.

Ideally we would have more direct flagging in the targets, but this
refines the heuristic so the necessary behaviour can be easily
achieved.

* DOMAIN_NS=1 is based purely on the `-NS` suffix on the core name.

* Enabling CMSE in the compiler and outputting a secure import library
  is now enabled when the core doesn't have an `-NS` suffix by either
  the target label `TFM` being present or the flag `trustzone` being set.

This covers the existing ARMv8-M behaviour - TF-M builds have the TFM
label, as per its documentation; M2351 secure builds have no explicit
flagging, so we ensure that the M2351_NS target has the trustzone flag
set, and the out-of-tree secure target inherits that.
2019-05-03 13:36:38 +03:00
Lin Gao 438a52f15a Fix handoff issue from the bootloader to the application on MTS_DRAGONFLY_F411RE 2019-05-02 11:25:19 -05:00
Ben Cooke 3d68a53b81 Correct the default pins for the spi flash for the mts dragonfly - on behalf of Ben C. 2019-05-02 11:25:19 -05:00
Martin Kojtal 40f8cb95a8
Merge pull request #10435 from morser499/pr/cy-smif
Add support for QSPI to Cypress Boards
2019-05-02 13:41:56 +01:00
Ryan Morse a8570ffe6c Added support for QSPI to Cypress Boards 2019-05-01 07:09:58 -07:00
Alexander Zilberkant 117e3e82b6 Update PSA includes to autogenerated files 2019-04-30 14:41:09 +03:00
Alexander Zilberkant 8c5ba9154d Update PSA code generator
Unify TF-M and Mbed-SPM code generators:
 - Unify SPM initialization logic:
   - All partitions are registered at once
   - Test partitions are guarded by #ifndef
   - Introduce single template list
 - Beatify template files and add "Autogen-do not modify" notice
Prepare for integration with mbed-os build system:
 - Generate all the files in a single place
Simplify tools/psa/release.py script
2019-04-30 14:10:23 +03:00
Alexander Zilberkant ab01bea46d Delete autogenerated files 2019-04-30 14:10:23 +03:00
Oren Cohen 5342015bb1 TF-M patch: Add necessary include in tfm_ns_lock.h 2019-04-28 15:45:06 +03:00
Michael Schwarcz ea81bf91c9 TF-M patch: Fix wrong check in tfm_spm_check_client_version (TF-M issue #236)
- Link to bug tracking: https://developer.trustedfirmware.org/T236

(cherry picked from commit 008bf1b2d1)
2019-04-28 15:45:06 +03:00
Michael Schwarcz 280715f9b7 TF-M patch: Fix tfm_psa_call_venner wrong argument type (TF-M issue #241)
- Link to bug tracking: https://developer.trustedfirmware.org/T241

(cherry picked from commit da01e3411f)
2019-04-28 15:45:05 +03:00
Michael Schwarcz 78ed870287 TF-M patch: Fix fixed-size partitions stack size (TF-M issue #240)
- Link to bug tracking: https://developer.trustedfirmware.org/T240

(cherry picked from commit fc78640559)
2019-04-28 15:45:05 +03:00
Michael Schwarcz 9c1e080e39 TF-M patch: Fix service handles not cleared issue (TF-M issue #230)
- Link to bug tracking: https://developer.trustedfirmware.org/T230

(cherry picked from commit 0c23e86989)
2019-04-28 15:45:05 +03:00
Michael Schwarcz 5d41a2aeae TF-M patch: Fix tfm_ns_lock_init issue (TF-M issue #239)
- Link to bug tracking: https://developer.trustedfirmware.org/T239

(cherry picked from commit 5f2e4b3911)
2019-04-28 15:45:04 +03:00
Michael Schwarcz fb068d2cb4 TF-M patch: General modifications
- Remove un-needed files
- Disable printf and uart
- Modify include paths
- Guard macros from mbed_lib with ifndef

(cherry picked from commit 1f30b52488)
(cherry picked from commit 71cd34df32)
(cherry picked from commit 185d2865da)
2019-04-28 15:45:04 +03:00
Oren Cohen ae6bdc311c [trusted-firmware-m]: Updated to f2dea5b 2019-04-28 13:14:35 +03:00
David Saada f73544ed7e Remove excessive info and debug prints in SPIF driver. 2019-04-28 12:27:47 +03:00
Kevin Bracey 87396e0bf6 Assembler atomics
Reimplement atomic code in inline assembly. This can improve
optimisation, and avoids potential architectural problems with using
LDREX/STREX intrinsics.

API further extended:
* Bitwise operations (fetch_and/fetch_or/fetch_xor)
* fetch_add and fetch_sub (like incr/decr, but returning old value -
  aligning with C++11)
* compare_exchange_weak
* Explicit memory order specification
* Basic freestanding template overloads for C++

This gives our existing C implementation essentially all the functionality
needed by C++11.

An actual Atomic<T> template based upon these C functions could follow.
2019-04-26 13:12:35 +03:00
Martin Kojtal 7392d51460
Merge pull request #10394 from kjbracey-arm/networking_warnings
Networking: Fix some ARMC6 warnings
2019-04-18 13:15:45 +01:00
Martin Kojtal 69b9f3fab6
Merge pull request #10377 from michalpasztamobica/esp8266_connect_failures
Fix ESP8266 driver behavior on connection failures
2019-04-18 08:31:40 +01:00
Kevin Bracey 69c6cc341b Networking: Fix some ARMC6 warnings
Some int-versus-long and signed-versus-unsigned format string
mismatches, and missing `class` keyword.
2019-04-17 16:03:44 +03:00
Oren Cohen f51eb6215a Fix warnings on PSA secure builds 2019-04-17 10:37:51 +03:00
Michal Paszta 3e70df7f0a ESP8266: Timeout if chip keeps returning errors
The ESP chip returns timeout, but keeps trying to connect, so we want to
keep track of time ourselves, instead of relying on the chip's timeout.
This fixes failing WIFI-CONNECT-SECURE-FAIL test.
2019-04-16 14:23:36 +03:00
Michal Paszta 8eda11a5a3 Perform disconnection regardless of the IP address 2019-04-12 11:50:55 +03:00
Martin Kojtal c6b917327b
Merge pull request #10232 from itayzafrir/crypto-service-multipart-operation-abort-fix
PSA Crypto Service - multipart operation memory fixes
2019-04-11 11:51:18 +01:00
Michael Schwarcz 5a9dff2e04 TF-M patch: Fix tfm_memory_check issue (TF-M issue #224)
- Add Secure/non-secure code and secure heap to memory check
- Link to bug tracking: https://developer.trustedfirmware.org/T224
2019-04-10 14:20:56 +03:00
Michael Schwarcz 3badc126cf TF-M patch: Fix wrong check in tfm_spm_check_client_version (TF-M issue #236)
- Link to bug tracking: https://developer.trustedfirmware.org/T236

(cherry picked from commit 008bf1b2d1)
2019-04-10 14:20:56 +03:00
Michael Schwarcz ad8ddd8e6e TF-M patch: Fix tfm_psa_call_venner wrong argument type (TF-M issue #241)
- Link to bug tracking: https://developer.trustedfirmware.org/T241

(cherry picked from commit da01e3411f)
2019-04-10 14:20:56 +03:00
Michael Schwarcz f0e4583b72 TF-M patch: Fix fixed-size partitions stack size (TF-M issue #240)
- Link to bug tracking: https://developer.trustedfirmware.org/T240

(cherry picked from commit fc78640559)
2019-04-10 14:20:56 +03:00
Michael Schwarcz 3fbc73e046 TF-M patch: Fix service handles not cleared issue (TF-M issue #230)
- Link to bug tracking: https://developer.trustedfirmware.org/T230

(cherry picked from commit 0c23e86989)
2019-04-10 14:20:56 +03:00
Michael Schwarcz e89c1a68ce TF-M patch: Fix tfm_ns_lock_init issue (TF-M issue #239)
- Link to bug tracking: https://developer.trustedfirmware.org/T239

(cherry picked from commit 5f2e4b3911)
2019-04-10 14:20:56 +03:00
Michael Schwarcz 185d2865da TF-M patch: General modifications
- Remove un-needed files
- Disable printf and uart
- Modify include paths
- Guard macros from mbed_lib with ifndef

(cherry picked from commit 1f30b52488)
(cherry picked from commit 71cd34df32)
2019-04-10 14:20:56 +03:00
Oren Cohen 4e6ed2bb46 [trusted-firmware-m]: Updated to 0101fd37 2019-04-10 14:20:56 +03:00
Martin Kojtal 6081727cbf
Merge pull request #10115 from enebular/raven
Uhuru RAVEN: Adding platform HAL
2019-04-04 11:05:23 +02:00
Cruz Monrreal 4dd55d2db6
Merge pull request #10281 from ashok-rao/S2_LP
Adding support for S2_LP (WiSUN) as a new MTB target
2019-04-01 17:03:37 -05:00
Ashok Rao 479bcfdbfe Incorporating review comments
Removing USBDEVICE since USB pins are NOT brought out on the MTB/MCB.
2019-04-01 11:16:16 +01:00
Martin Kojtal 040388370f
Merge pull request #10171 from offirko/offir_qspi_bus_mask_fix
Fix QSPIF Bus mode mask and quad enable write SR size
2019-04-01 11:17:23 +02:00
Cruz Monrreal 594a1d180b
Merge pull request #10218 from kfnta/tfm_auto_src_gen
PSA - TFM manfiest scan
2019-03-29 17:59:44 -05:00
Offir Kochalsky 15fdb6ea7e
Update QSPIFBlockDevice.cpp 2019-03-29 17:37:00 +03:00
itayzafrir 2b81588664 Add message context cleanup helper function 2019-03-28 12:53:11 +02:00
Michal Paszta 5dbaa40eb0 Add the INTERRUPTIN compilation guard for ESP8266 2019-03-28 11:16:30 +02:00
Oren Cohen 268b48c2e5 Run autogen 2019-03-28 10:40:56 +02:00
offirko e8e0fb4fdf If QER is undefined: do nothing but log warning and continue 2019-03-28 10:18:16 +02:00
itayzafrir a446ee63c7 Rename internal function destroy_hash_clone to clear_hash_clone 2019-03-27 16:13:46 +02:00
itayzafrir b26890e62d Do not allocate zero sized buffers - generators 2019-03-27 15:43:19 +02:00
itayzafrir 749b1e30bb Do not allocate zero sized buffers - rng 2019-03-27 15:43:18 +02:00
itayzafrir abd9c661ce Do not allocate zero sized buffers - entropy 2019-03-27 15:43:18 +02:00
itayzafrir 19b83812d4 Do not allocate zero sized buffers - keys 2019-03-27 15:43:17 +02:00
itayzafrir f3294ef338 Do not allocate zero sized buffers - cipher 2019-03-27 15:43:16 +02:00
itayzafrir 19952d990c Do not allocate zero sized buffers - aead 2019-03-27 15:43:15 +02:00
itayzafrir 18feb26ca7 Do not allocate zero sized buffers - asymmetric 2019-03-27 15:43:14 +02:00
itayzafrir 979ca1ee55 Do not allocate zero sized buffers - hash 2019-03-27 15:43:12 +02:00
itayzafrir 7b35e763dd Do not allocate zero sized buffers - mac 2019-03-27 14:29:19 +02:00
jk 23cb826314 Add definition of RAVEN 2019-03-27 17:02:55 +09:00
Cruz Monrreal ecfe0c83ae
Merge pull request #9955 from VeijoPesonen/esp8266_wifi_scan_timeout
ESP8266: treats Wi-Fi scan results as out-of-band data; new API to adjusting Wi-Fi scan settings
2019-03-27 00:25:43 -05:00
Cruz Monrreal 1c23c5b85b
Merge pull request #9927 from VeijoPesonen/esp8266_country_code_policy
ESP8266: Country code API
2019-03-27 00:25:29 -05:00
Cruz Monrreal d81f3653c2
Merge pull request #10185 from artokin/mcr20a_interruptin_flag_fix
Nanostack 802.15.4 RF drivers update
2019-03-27 00:23:20 -05:00
itayzafrir 8044f6d038 Fix crypto service abort functionality - generators 2019-03-26 15:32:49 +02:00
itayzafrir 545e669c88 Fix crypto service abort functionality - mac 2019-03-26 15:32:49 +02:00
itayzafrir da999c6946 Fix crypto service abort functionality - hash 2019-03-26 15:32:49 +02:00
itayzafrir 1b26e0d5f2 Fix crypto service abort functionality - cipher
Also refactor cipher setup function to one common function.
2019-03-26 15:32:49 +02:00
Nir Sonnenschein ca62922c9f
Merge pull request #10036 from itayzafrir/crypto-ipc-refactor
Refactor Crypto Service Proxy
2019-03-26 15:20:49 +02:00
Arto Kinnunen 0710298a3c Nanostack 802.15.4 RF drivers update
Sync Nanostack RF drivers from master copy:
-MCR20A: v1.0.6
-S2LP: v0.0.5
2019-03-22 08:28:13 +02:00
Martin Kojtal e7a4658256
Merge pull request #10180 from AriParkkila/fix-wise-1570
Fix SPIF speed for MTB_ADV_WISE_1570 and max packet size for BC95
2019-03-22 06:32:39 +01:00
Martin Kojtal 4a2985a5c3
Merge pull request #10144 from kjbracey-arm/atmel_wait_ns
Atmel RF: use system wait_ns
2019-03-21 10:43:57 +01:00
Ari Parkkila a6c44f87b0 SPIF: Fix SPI_FREQ for MTB_ADV_WISE_1570 2019-03-21 01:11:40 -07:00
Martin Kojtal 6da5f9bf66
Merge pull request #10142 from artokin/nanostack_rf_drivers_interrruptin_flag
Nanostack 802.15.4 RF drivers update
2019-03-20 15:34:42 +01:00
offirko 1a4c11e3b5 Fixed Bus Mode bit mask to select best mode.
When setting Quad Enable, either SR1, SR2 or CR setup is required.
Either way register size is up to 2 bytes.
2019-03-20 15:24:46 +02:00
offirko ce5194f2f8 Fix Bus mode mask and status register write size in
some modes in quad enable
2019-03-20 14:27:49 +02:00
Kevin Bracey 9ad6b10b43 Atmel RF: use system wait_ns
This driver's delay_ns was used as the basis of the system wait_ns -
migrate to that refined implementation.
2019-03-18 17:22:17 +02:00
Amir Cohen 4d6240d26e Add flashiap block device comment 2019-03-18 14:34:00 +02:00
Arto Kinnunen 0c34a13538 Nanostack 802.15.4 RF drivers update
Sync Nanostack RF drivers from master copies:
-Atmel: v3.0.7
-MCR20A: v1.0.3
-S2LP: v0.0.4
2019-03-18 14:21:02 +02:00
itayzafrir 95b0a18ac5 Remove uneeded TODO comment from the code 2019-03-18 10:28:21 +02:00
Amir Cohen 7fac0722a4 Fix functionality for FlashIAPBD & SlicingBD
Due to discovery of inconsistent sector sizes in devices storage the is_valid_erase function was adjusted,
For FlashIAPBD the 'code size' was included to the calculation, preventing faulty "virtual" addresses calculation.
For SlicingBD the same error was fixed and in all 3 validation functions that sent addresses for validation and program/read/erase
different addresses.
2019-03-14 17:46:10 +02:00
Veijo Pesonen e2bd0644df ESP8266: new API for setting Wi-Fi scan active/passive mode
Makes possible to decide between active and passive mode.

Makes possible to adjust for how long a single channel is scanned.
2019-03-14 12:01:42 +02:00
Veijo Pesonen b5f3fcf49b ESP8266: Wi-Fi scan results as OOB 2019-03-14 12:00:17 +02:00
Martin Kojtal 17f8bc1088
Merge pull request #9893 from VeijoPesonen/wifi_astyle_unignore
ESP8266: astyle fixes
2019-03-14 09:38:49 +01:00
itayzafrir c97b90ade1 Unify code style
- Use designated initializers for IPC structs
- Unify variables declaration and initialization
2019-03-12 14:31:30 +02:00
itayzafrir 9bc8bcf0d2 Unify sections titles/comments & fix typo in comment 2019-03-12 11:35:35 +02:00
itayzafrir 5c48d58389 Set handle to PSA_NULL_HANDLE when closing IPC connection 2019-03-12 11:35:34 +02:00
itayzafrir bf05154461 Use PSA_NULL_HANDLE when testing for invalid handles 2019-03-12 10:53:13 +02:00
itayzafrir caafc34695 Use psa prefix for crypto.h include 2019-03-12 10:51:31 +02:00
Martin Kojtal 83d70199d1
Merge pull request #10027 from kfnta/tfm_fix_ftype
TF-M patch: Handle extended stack frame in tfm_svcall_psa_call
2019-03-11 15:48:49 +01:00
itayzafrir 7a15865e8b Refactor crypto service proxy 2019-03-11 16:21:34 +02:00
Michael Schwarcz 134a169e35 TF-M patch: Handle extended stack frame in tfm_svcall_psa_call
- Fix failing attestation test on LPC55S69
- Link to bug tracking: https://developer.trustedfirmware.org/T276
2019-03-11 11:10:14 +02:00
Alexander Zilberkant 661613c998 Rename psa_system_reset to mbed_psa_system_reset
add noreturn attributes
update lifecycle service to use psa/error.h
fix doxygen
2019-03-11 10:43:19 +02:00
Martin Kojtal 5c79394756
Merge pull request #10023 from itayzafrir/crypto-compliance-tests-fix
Fix crypto compliance tests
2019-03-11 09:20:36 +01:00
itayzafrir ea36a89ec7 Fix crypto compliance tests
Prevent passing null buffer with size which is non-zero.
2019-03-10 15:47:07 +02:00
Oren Cohen d0021b5de7 Fix error codes for psa_attestation_inject_key 2019-03-10 10:53:38 +02:00
Martin Kojtal b9c214b165
Merge pull request #10002 from kegilbert/psa_baremetal_fix
Disable PSA in baremetal profiles
2019-03-08 21:15:30 +01:00
Martin Kojtal 820a2e284d
Merge pull request #9908 from morser499/pr/cy-mbed-os-5.12.0
Pr/cy mbed os 5.12.0
2019-03-08 11:01:41 +01:00
Cruz Monrreal 57ec1d57b9
Merge pull request #9990 from kfnta/sync_complinace_test_to_latest
Sync PSA compliance test to latest version
2019-03-07 23:36:56 -06:00
kegilbert 3fd32884c3 Allow baremetal to build by removing PSA 2019-03-07 16:41:58 -06:00
Ryan Morse 20c2734e7b Fixed issue with wrong floating point literal 2019-03-07 08:40:20 -08:00
Cruz Monrreal ff78bc4b7c
Merge pull request #9973 from kfnta/tfm_num_threads
TF-M config: Add max_ns_thread_count parameter
2019-03-07 10:28:11 -06:00
Nir Sonnenschein d473f6d59c synchronize latest fix to tests
synchronize latest fix to test_c043
2019-03-07 17:49:52 +02:00
Cruz Monrreal a87c7c82f3
Merge pull request #9312 from kfnta/psa_compliance
PSA compliance tests suite
2019-03-07 09:14:58 -06:00
Oren Cohen dbd91bc4e0 Remove unused type which was conflicting wiith errno.h 2019-03-07 14:01:51 +02:00
Michael Schwarcz 14aa347040 TF-M config: Add max_ns_thread_count parameter 2019-03-07 12:18:19 +02:00
Cruz Monrreal 63242cfbb4
Merge pull request #9939 from kfnta/fix_for_secure_partition
Fix for secure partition
2019-03-06 20:00:38 -06:00
Cruz Monrreal 254650c03f
Merge pull request #9956 from moranpeker/attestation_doxy
Add attestation doxygen
2019-03-06 16:36:00 -06:00
Michael Schwarcz 730e9b83b7 TF-M: Increase TFM_SPM_MAX_ROT_SERV_NUM from 30 to 32 2019-03-06 16:43:09 +02:00
Moran Peker c0633e56b1 Attestation doxygen 2019-03-06 15:39:08 +02:00
Nir Sonnenschein c437c9f0b8 use common flag to allow test 3 for PS and ITS
add a compilation flag to allow tests which fill up the entire device storage.
storage test 003 (for both PS and its) is unsuitable for the regular CI because:
1. it takes a long time causing timeouts
2. it places a very high attrition load on the storage of the CI boards
    and this can cause them to fail much sooner.
2019-03-06 10:53:57 +02:00
Martin Kojtal bb61ea1433
Merge pull request #9917 from kfnta/attest_doxy
Add attestation doxygen
2019-03-06 09:14:26 +01:00
Nir Sonnenschein 172fd650a2 Fix for resource leak in crypto compliance test 43
Destroy key after import key in a loop
2019-03-05 17:10:27 +02:00
Nir Sonnenschein 95d0c4d38d Define psa_storage_info_t for backward compatibility 2019-03-05 17:07:51 +02:00
Netanel Gonen 2982907e37 rework for mbed-os intf for ACK tests
-rework test wrapper functions to simplify test main
-move greentea init before test setup code to avoid boards losing sync.
2019-03-05 17:07:34 +02:00
Nir Sonnenschein f106718366 indentation fix 2019-03-05 15:52:41 +02:00
Nir Sonnenschein 4412e39a72 fix resource leaks 2019-03-05 15:07:14 +02:00
Alon 0d550eeeb6 Fix crypto service get key info out params 2019-03-05 14:57:24 +02:00
Veijo Pesonen 50984e5d2d ESP8266: makes usable channels runtime configurable 2019-03-05 10:40:22 +02:00
Veijo Pesonen eb27a23641 ESP8266: Exposes country code config API 2019-03-05 10:40:21 +02:00
Veijo Pesonen 96247dd76a ESP8266: sets hardcoded country code(CC) policy to track AP's CC 2019-03-05 10:40:21 +02:00
Martin Kojtal 5c24ffefa4
Merge pull request #9915 from kfnta/tfm_import_new
Update TF-M sources
2019-03-04 10:53:12 +01:00
Veijo Pesonen c9eaa07236 ESP8266: astyle, remove from the .astyleignore-file 2019-03-04 09:38:20 +02:00
Nir Sonnenschein 16a59cb992 Allow PS test03 with PS_ALLOW_ENTIRE_STORAGE_FILL flag 2019-03-03 22:51:43 +02:00
Nir Sonnenschein 1650a923eb add main functions to each compliance test
add main function to each compliance test , moving shared code to a common file
2019-03-03 22:50:59 +02:00
Oren Cohen 064dc7d154 Attestation doxygen 2019-03-03 18:46:20 +02:00
Michael Schwarcz 7a2c7d7df4 TF-M patch: Fix tfm_memory_check issue (TF-M issue #224)
- Add Secure/non-secure code and secure heap to memory check
- Link to bug tracking: https://developer.trustedfirmware.org/T224
2019-03-03 16:47:53 +02:00
Michael Schwarcz 749faa6534 TF-M patch: Fix wrong check in tfm_spm_check_client_version (TF-M issue #236)
- Link to bug tracking: https://developer.trustedfirmware.org/T236

(cherry picked from commit 008bf1b2d1)
2019-03-03 16:47:47 +02:00
Michael Schwarcz 8a087a6504 TF-M patch: Fix tfm_psa_call_venner wrong argument type (TF-M issue #241)
- Link to bug tracking: https://developer.trustedfirmware.org/T241

(cherry picked from commit da01e3411f)
2019-03-03 16:47:41 +02:00
Michael Schwarcz ea8bff57b1 TF-M patch: Fix fixed-size partitions stack size (TF-M issue #240)
- Link to bug tracking: https://developer.trustedfirmware.org/T240

(cherry picked from commit fc78640559)
2019-03-03 16:47:34 +02:00
Michael Schwarcz 03dbd4bb28 TF-M patch: Fix service handles not cleared issue (TF-M issue #230)
- Link to bug tracking: https://developer.trustedfirmware.org/T230

(cherry picked from commit 0c23e86989)
2019-03-03 16:47:28 +02:00
Michael Schwarcz 87f22efcb5 TF-M patch: Fix tfm_ns_lock_init issue (TF-M issue #239)
- Link to bug tracking: https://developer.trustedfirmware.org/T239

(cherry picked from commit 5f2e4b3911)
2019-03-03 16:47:22 +02:00
Michael Schwarcz 71cd34df32 TF-M patch: General modifications
- Remove un-needed files
- Disable printf and uart
- Modify include paths
- Guard macros from mbed_lib with ifndef

(cherry picked from commit 1f30b52488)
2019-03-03 16:47:17 +02:00
Michael Schwarcz 823e5a2a7f [trusted-firmware-m]: Updated to f876e5c 2019-03-03 16:47:11 +02:00
Nir Sonnenschein 67ada4404f Delete unneeded .mk files after test import
delete unneeded .mk files imported as part of the PSA compliance test suite
2019-03-03 16:16:54 +02:00
Nir Sonnenschein b64fb53d43 [api-tests]: Updated to cb58d2c 2019-03-03 15:51:26 +02:00
Oren Cohen cfb60ec955 Fixes
* Add #include <stddef.h> to psa/client.h
* Add Attestation service to TFM
* Update FUTURE_SEQUANA_PSA secure binaries
* Remove MBED_SPM from K64F
* Refactor psa_manifest/sid.h
* Increase stackl size in spm-client tests
* Add handling of errors from psa_get in partitions
2019-03-03 13:30:58 +02:00
Michael Schwarcz 8fefa25a84 TF-M: Remove not-used platform headers 2019-03-03 10:55:47 +02:00
Michael Schwarcz b62c48977f Review fixes 2019-03-03 10:55:46 +02:00
Michael Schwarcz 20d7f817df Fix astyle 2019-03-03 10:55:46 +02:00
Michael Schwarcz 98efb44ea8 Remove another psa_identity 2019-03-03 10:55:46 +02:00
Michael Schwarcz ef76ec83ee Generate psa_manifest/sid.h 2019-03-03 10:55:46 +02:00
Oren Cohen 798e3c393a Call tfm_panic for SPM_PANIC 2019-03-03 10:55:45 +02:00
Michael Schwarcz faf5fcf795 Fix typo 2019-03-03 10:55:45 +02:00
Oren Cohen 0e74e09e56 Set default PSA client header for single v7 targets 2019-03-03 10:55:45 +02:00
Oren Cohen 737a3cc350 Advance to PSA-FF 1.0 2019-03-03 10:55:45 +02:00
Oren Cohen bd9a738473 Move SPM_PANIC to psa/service.h 2019-03-03 10:55:44 +02:00
Oren Cohen 306a51f6c0 Update psa_get() to return psa_status_t 2019-03-03 10:55:44 +02:00
Michael Schwarcz f9fbd6ae82 Align PSA SPM tests to TF-M 2019-03-03 10:55:42 +02:00
Oren Cohen 483b23c318 Fix SPM warnings 2019-03-03 10:54:55 +02:00
Oren Cohen dfbc7b6b7a Adapt partitons 2019-03-03 10:54:54 +02:00
Oren Cohen aad114aa55 Genrerate SPM data 2019-03-03 10:54:54 +02:00
Oren Cohen 21d09b4156 Unify flags 2019-03-03 10:54:53 +02:00
Oren Cohen a65baf55c6 Update psa_wait() and client_id 2019-03-03 10:54:53 +02:00
Kevin Bracey c368021e37 SPIFBlockDevice.h: include SingletonPtr.h
SPIFBlockDevice was using SingletonPtr without an include,
and only getting it via SPI.h.

Spotted while changing SPI to not use SingletonPtr - now
abandoned, but still this shouldn't have been relying on it.
2019-03-01 14:33:33 +02:00
Cruz Monrreal 9d9a076f10
Merge pull request #9885 from VeijoPesonen/esp8266_conn_timeout_err2trace
ESP8266: graceful disconnect on network state timeout
2019-02-28 19:56:11 -06:00
Cruz Monrreal befed111f5
Merge pull request #9668 from moranpeker/psa-init-attestation
PSA Initial Attestation service
2019-02-28 18:25:16 -06:00
Cruz Monrreal b84439552a
Merge pull request #9883 from itayzafrir/crypto-service-proxy-mem-fix
Free dynamic memory in Crypto Service proxy (PSA targets)
2019-02-28 18:23:17 -06:00
Cruz Monrreal b5878b164d
Merge pull request #9871 from VeijoPesonen/bugfix-esp8266-recv_busy
ESP8266: receive is able to handle device busy indication
2019-02-28 18:22:54 -06:00
Moran Peker 83d084afef add casting to increased void pointer 2019-02-28 20:30:05 +02:00
Martin Kojtal 211db10aeb
Merge pull request #9828 from artokin/update_802154_rf_drivers
Update 802.15.4 RF drivers to the latest version
2019-02-28 17:53:50 +01:00
Moran Peker 116e14ade6 change license to file that mostly based on TF-M implementation
from Apache-2.0 to BSD-3-Clause
2019-02-28 16:00:53 +02:00
Moran Peker 2b8621aa6c initialized psa_hash_operation_t to zeros before calling hash_setup
-initialized  psa_hash_operation_t to zeros
-fix TF-M attestation code - increase t_cose_crypto_hash bytes to
handle max psa_hash_operation_t size
2019-02-28 15:54:45 +02:00
Moran Peker 6346442f03 Add SW_SIGNER_ID data to boot status 2019-02-28 15:52:16 +02:00
Moran Peker bca8091e52 astyle fix 2019-02-28 14:13:24 +02:00
Veijo Pesonen 7bb887fef4 ESP8266: in unknown network state driver tries to disconnect 2019-02-28 12:44:49 +02:00
itayzafrir 362c307d84 Free dynamic memory in crypto proxy 2019-02-28 11:36:31 +02:00
Moran Peker 49c6a1caaf fix void pointer increasing with bytes 2019-02-28 11:17:31 +02:00
avolinski e4c7144355 Prevent compiler warning, converting psa_key_policy_t to const in call to psa_set_key_policy 2019-02-27 18:57:58 +02:00
Moran Peker b847138819 astyle fix 2019-02-27 16:33:06 +02:00
Martin Kojtal 7656891179
Merge pull request #9638 from itayzafrir/crypto-access-control
Crypto Service - keys access control
2019-02-27 14:47:49 +01:00
Moran Peker 97a9652f3f Use less stack 2019-02-27 15:34:22 +02:00
Moran Peker 4a2b06ed0d Remove includes from mbedtls 2019-02-27 15:04:28 +02:00
Moran Peker 6e3d238ffd Styling 2019-02-27 15:03:45 +02:00
Moran Peker 47f59b16cb Correct psa-crypto include 2019-02-27 15:02:47 +02:00
Arto Kinnunen 05dc1f2f0e Sync STM S2LP RF driver to v0.0.2
Sync with v0.0.2 in master repository.
2019-02-27 14:59:19 +02:00
Arto Kinnunen e8225fbd7c Sync with STM S2LP RF driver v0.0.1
Sync with v0.0.1 in master repository.
2019-02-27 14:59:19 +02:00
Arto Kinnunen 2c78427932 Sync with MCR20a RF driver v1.0.3
Sync with v1.0.3 in https://github.com/ARMmbed/mcr20a-rf-driver
2019-02-27 14:59:19 +02:00
Arto Kinnunen 3a9a50a7d7 Sync with Atmel RF driver v3.0.6
Sync with v3.0.6 in https://github.com/ARMmbed/atmel-rf-driver
2019-02-27 14:59:19 +02:00
Moran Peker 89ac1075df Documented any non apache files 2019-02-27 14:14:45 +02:00
Moran Peker 7dd58b99cc Add free to allocated buffer while error 2019-02-27 14:14:33 +02:00
Moran Peker a268b81a57 Remove extra buffers used
outputting straight into the final destination
2019-02-27 14:14:32 +02:00
Moran Peker 25fa5a6138 Remove TEMP_IMPL_ID_DATA and TEMP_IMPL_ID_DATA_SIZE
remove from public header into attestation_bootloader_data.c and add
const to impl_id_data
2019-02-27 14:14:31 +02:00
Moran Peker c97cecc273 Update TFM attestation code to latest version
The latest and greatest version is:
c43181daf54f69f53de58593a50dd6a9c233eecd

- Add new header file and implement tfm_memcpy (used in
attetstaion_core c file)
2019-02-27 14:14:30 +02:00
Moran Peker 2810d369f9 Remove incorrect free place 2019-02-27 14:14:29 +02:00
Moran Peker 661e2f92aa Remove header files from inc into services/attestation folder 2019-02-27 14:14:29 +02:00
Moran Peker f02f6e3cf9 Add newline at end of file and remove un needed commant 2019-02-27 14:14:28 +02:00
Moran Peker 92a9b3f736 Remove calling to "psa_crypto_init()"
No need to call psa_crypto_init before crypto operations
we assume init already called before. if not an error will return.
2019-02-27 14:14:28 +02:00
Moran Peker 2e7738b8eb astyle fix 2019-02-27 14:14:27 +02:00
Moran Peker 41bd381462 General fixes of spelling, newline, un needed code
-Correct spelling errors
-Add newline at end of file
-Remove un needed code
2019-02-27 14:14:27 +02:00
Moran Peker de3ee8e376 Using goto exit in attest_public_key_sha256 function 2019-02-27 14:14:26 +02:00
Moran Peker d3c9860360 Free allocated buffers 2019-02-27 14:14:26 +02:00
Moran Peker d9b22da91d Remove calling to psa_crypto_init
- no need to call psa_crypto_init before crypto operations
we assume init already called before. if not an error will return.
2019-02-27 14:14:25 +02:00
Moran Peker aa5b79a480 generated file update 2019-02-27 14:14:24 +02:00
Moran Peker e60af99edb Attestation: Add comments from temporary data 2019-02-27 14:14:24 +02:00
Moran Peker 2720b5a73d Update include psa_defs -> psa/client 2019-02-27 14:14:23 +02:00
Moran Peker f8e4626098 Attestation: move t_code folder place 2019-02-27 14:14:22 +02:00
Moran Peker b3c6f709ca Attestation: move qcbor folder place 2019-02-27 14:14:21 +02:00
Moran Peker bd7061eaba Attestation: Add close key after open key 2019-02-27 14:14:20 +02:00
Moran Peker 715305accf Attestation: update boot status data
Epoc data to be 2 bytes instead of 4
2019-02-27 14:14:20 +02:00
Moran Peker e0c5df50be Attestation: Add parameter and entry size checks 2019-02-27 14:14:19 +02:00
Moran Peker 773fa44205 Update attestation asymmetric sign to use deterministic alg
- Add PSA_KEY_USAGE_VERIFY to attesttaion key usage
- Set deterministic alg to attestation key policy
- Call asymmetric sign with deterministic alg
2019-02-27 14:14:18 +02:00
Moran Peker 70a14b2f3a Update to last version of TFM-Attesttaion code
-update TFM attestation files
-update attest_crypto.c and psa_attestation_stubs.c file to support TFM
code changes
2019-02-27 14:14:18 +02:00
Moran Peker 2117a26cb1 Get security lifecycle by psa_security_lifecycle_state function
-Add bug fix for psa_security_lifecycle_state function - PR #9745
-Remove lifecycle data from temp boot status data
-Update attesttation_partition_json file to use
PSA_PLATFORM_LC_GET and generate partition
code - auto generated files update
2019-02-27 14:14:17 +02:00
Moran Peker 4101ee92df Add checks ,initialization,remove unneeded code and files license update 2019-02-27 14:14:14 +02:00
Moran Peker 080f4f4e69 Attestation: Update iat claims data
Add more iat claims: profile definition and verification service
Update boot status data: add more SW components for SW_S_NS module
2019-02-27 14:14:13 +02:00
Moran Peker 636753b404 Attestation: Add a new define for attestation private key id 2019-02-27 14:14:13 +02:00
Moran Peker 0a0bb04dfa Attestation: Change files license to Apache
change all files except tfm code.
2019-02-27 14:14:12 +02:00
Moran Peker 8fc9c8fdab Attestation: astyle fixs
Runing astyle over attestation file to pass CI
2019-02-27 14:14:11 +02:00
Moran Peker a994499bf3 Atteststaion: Update header files
-Remove psa_initial_attesttaion.h
-Move psa_initial_attesttaion_api.h and psa_attest_inject_key.h into
inc folder
-Update include in test file
2019-02-27 14:14:11 +02:00
Moran Peker 5f45b0af92 Attestation: aut- generated files by generate_partition_code.py
Atestation paration added.
2019-02-27 14:14:09 +02:00
Moran Peker 9a4ea3d319 Add PSA Initial Attestation service
Attestation service can create a token on request, which contains a fix set of
device specific data.
Implementation:
-‘psa_initial_attest_get_token_size’- get exact size of initial attestation token in bytes.
-‘psa_initial_attest_get_token’- get the initial attestation token.
-‘psa_attestation_inject_key’ - Generate or import the attestation key pair and export the public part.

-Including CBOR lib and TFM attestation implemantation.
-Temporary claim’s data – no bootloader over V7 Single & Dual
2019-02-27 14:14:08 +02:00
Martin Kojtal 6bdbe754cd
Merge pull request #9799 from VeijoPesonen/bugfix-esp8266-dns
Increase events.share-eventsize to 768B because of ESP8266 AT driver and asynchronous DNS
2019-02-27 11:30:38 +01:00
Martin Kojtal 5ab69d5d6b
Merge pull request #9575 from itayzafrir/crypto-64-bit-key-ids
Crypto IPC 64 bit key ids for ITS
2019-02-27 09:29:18 +01:00
Veijo Pesonen 688a4e42bc ESP8266: recv() is able to handle device busy indication 2019-02-27 09:54:43 +02:00
Cruz Monrreal d96c9e8800
Merge pull request #9862 from netanelgonen/backward_support_its
Backward support PSA_ITS
2019-02-26 23:32:58 -06:00
Cruz Monrreal d29312e7ac
Merge pull request #9808 from ARMmbed/feature-iar8
IAR 8 feature branch merge
2019-02-26 15:30:27 -06:00
Netanel Gonen 3e89a05e0b add invalid argument incase receiving uid==0 2019-02-26 18:35:38 +02:00
Amir Cohen 5c7f6cb755 Merge SPIF & QSPIF components test to general block device tests
The SPIF and QPIF components tests are fully merged into general block device tests and were deleted
2019-02-26 10:28:45 -06:00
Netanel Gonen d2eb2e4eb5 add backward support to error values 2019-02-26 18:27:15 +02:00
Deepika d2e11966fc Revert "rand() by default does increment of 1, randomizing more"
This reverts commit f7a6d254f6.
2019-02-26 09:21:19 -06:00
itayzafrir fc2b0726b6 Remove duplicate inclusion of header files
Remove duplicate inclusion of psa/client.h and psa/service.h
2019-02-26 12:30:20 +02:00
itayzafrir ca94dc8673 Define MBEDTLS_PSA_CRYPTO_KEY_FILE_ID_ENCODES_OWNER
This enables crypto encoding an owner in key file IDs.
Added a static assert check in client side proxy.
2019-02-26 12:30:20 +02:00
itayzafrir 3992b83a52 crypto service: Assemble bit crypto key ids 2019-02-26 12:30:20 +02:00
itayzafrir 2b9b29455f crypto service: Remove unused IPC argument and unneeded casts 2019-02-26 12:27:55 +02:00
Veijo Pesonen 2e5d1d959b ESP8266: halts if unable to add an event to the event queue 2019-02-26 09:44:15 +02:00
Cruz Monrreal 15ccb32d31
Merge pull request #9836 from kfnta/tfm_patch
TF-M: Fix issues found in SPM tests
2019-02-25 19:58:38 -06:00
Cruz Monrreal ed350dc533
Merge pull request #9758 from NirSonnenschein/large_buffer_support_for_hash_and_mac
allow hash or mac on large buffers with less memory use
2019-02-25 10:34:14 -06:00
Edison Ai ebc961dab8 TF-M patch: Free connection handle in psa_reply (TF-M issue #263)
- Link to bug tracking: https://developer.trustedfirmware.org/T263
2019-02-25 14:35:21 +02:00
Netanel Gonen b5b0e981f8 reopening #9754 after the changes where overrun
changing the SPM error codes from invalid argument to bad state aligned to PSA spec
2019-02-25 11:55:47 +02:00
Nir Sonnenschein 1d4c280d2a a-style fix for unrelated code 2019-02-25 00:46:06 +02:00
itayzafrir 37cc25726c Add internal documentation to access control header file
This file is for internal use only.
2019-02-24 15:07:54 +02:00
itayzafrir 0c231b0ac9 Move include psa_crypto_core.h to C file 2019-02-24 15:07:54 +02:00
itayzafrir 672712ca8a Add SPM_PANIC macro for TARGET_TFM 2019-02-24 15:07:54 +02:00
itayzafrir 99032f6967 Change PSA_CRYPTO_ACCESS_CONTROL_RESET into static inline function 2019-02-24 15:07:54 +02:00
itayzafrir 0ecd2c5da1 crypto service: Crypto access control
Implement crypto keys access control in crypto service:
- Only the key owner (the partition which created the key)
  is allowed to manage (import/export/open/close/destroy/etc.)
  the key.
- Only the key owner (the partition which created the key)
  is allowed to use the key handle for crypto operations which
  require a key handle.
2019-02-24 15:07:54 +02:00
Nir Sonnenschein 84b618704b fix comment issues 2019-02-24 14:32:36 +02:00
Nir Sonnenschein ffaf083b75 a-style fixes for code 2019-02-24 14:25:25 +02:00
Netanel Gonen 165719d11f return the new values for key type & size even if function fails 2019-02-24 11:24:12 +02:00
Deepika f7a6d254f6 rand() by default does increment of 1, randomizing more
Random number generation in case of IAR 8, requires TLS support.
Thread local storage is not part of Mbed OS, test is updated to have random
numbers sparse, but in future random number creation should be moved to main
thread, or use some other logic for randomization instead of rand() call.
2019-02-22 16:44:54 -06:00
Cruz Monrreal 497d0d65c3
Merge pull request #9802 from orenc17/patch-2
Fix psa_system_reset() on PSA IPC platform
2019-02-21 17:31:11 -06:00
Cruz Monrreal 870bd05904
Merge pull request #9708 from davidsaada/david_protected_storage
Implement PSA protected storage & restructure PSA storage implementation
2019-02-21 17:30:56 -06:00
Oren Cohen 922cdeab82 Update crypto IPC handling of negative errors 2019-02-21 20:59:18 +02:00
David Saada 41eb5cbfd9 Implement PSA protected storage & restructure PSA storage implementation
- Move all PSA storage code under psa/storage directory
- Create a global PSA error codes header, eliminating ITS specific ones
- Create a common header file for PSA storage type definitions,
  eliminating ITS specific ones
- Create a common implementation for PS & ITS
- Implement protected storage feature
- Change ITS test to be common to PS as well
2019-02-21 20:58:59 +02:00
Oren Cohen 6b68bf7fdf
Fix psa_system_reset on PSA IPC platform 2019-02-21 19:50:02 +02:00
Michael Schwarcz d2c433ccfe TFM Importer: Update SHAa of TFM patches 2019-02-21 17:42:56 +02:00
Oren Cohen 8800ad5c80 TFM: Add defines to mbed_lib.json 2019-02-21 17:38:30 +02:00
Michael Schwarcz 6354b9a473 TF-M patch: More fixes to tfm_memory_check issue (TF-M issue #224)
- Link to bug tracking: https://developer.trustedfirmware.org/T224
2019-02-21 17:38:30 +02:00
Cruz Monrreal 813c844fb4
Merge pull request #9745 from moranpeker/psa_security_lifecycle
Fix incorrect return value in psa_security_lifecycle_state (emul)
2019-02-20 12:12:56 -06:00
Martin Kojtal ad2cb910f9
Merge pull request #9503 from VeijoPesonen/feature-esp8266_oob_handling_by_sigio
ESP8266: OOB handling done based on arrival of SIGIOs
2019-02-20 09:35:29 +01:00
Cruz Monrreal 9f6ee7db66
Merge pull request #9754 from netanelgonen/SPM_return_value
Fix SPM returning the wrong value
2019-02-19 15:29:48 -06:00
Cruz Monrreal 4c04771c5d
Merge pull request #9653 from kfnta/tfm_src_integ
TF-M sources integration to Mbed-OS
2019-02-19 15:28:44 -06:00
Cruz Monrreal 19474fcab1
Merge pull request #9617 from kjbracey-arm/spe_atomics
SPE: Fix up atomic usage
2019-02-19 15:27:54 -06:00
Michael Schwarcz 6a90da42fa Add BSD3-clause license file to TF-M folder 2019-02-19 16:29:28 +02:00
Nir Sonnenschein 4a4af57c22 allow calling hash or mac on large buffers without large memory allocation
use a fixed size buffer for large inputs to process the input
in multiple smaller pieces.
2019-02-19 15:49:52 +02:00
Michael Schwarcz 9e33f0d8cd Re-generate TF-M partition files 2019-02-19 15:19:07 +02:00
Alexander Zilberkant 0ba963acfc Adding TF-M integration guide 2019-02-19 15:19:05 +02:00
Michael Schwarcz cf3fd858ad Align existing partitions to work with TF-M
- ITS
- Crypto
- Platform
2019-02-19 15:19:01 +02:00
Edison Ai 67a4e6d723 TF-M patch: Fix psa_set_rhandle() issue during CONNECT (TF-M issue #216)
- Link to bug tracking: https://developer.trustedfirmware.org/T216
2019-02-19 15:19:00 +02:00
Michael Schwarcz 008bf1b2d1 TF-M patch: Fix wrong check in tfm_spm_check_client_version (TF-M issue #236)
- Link to bug tracking: https://developer.trustedfirmware.org/T236
2019-02-19 15:19:00 +02:00
Michael Schwarcz da01e3411f TF-M patch: Fix tfm_psa_call_venner wrong argument type (TF-M issue #241)
- Link to bug tracking: https://developer.trustedfirmware.org/T241
2019-02-19 15:18:59 +02:00
Michael Schwarcz 011fa28110 TF-M patch: Fix tfm_memory_check issue (TF-M issue #224)
- Link to bug tracking: https://developer.trustedfirmware.org/T224
2019-02-19 15:18:59 +02:00
Michael Schwarcz fc78640559 TF-M patch: Fix fixed-size partitions stack size (TF-M issue #240)
- Link to bug tracking: https://developer.trustedfirmware.org/T240
2019-02-19 15:18:58 +02:00
Michael Schwarcz 0c23e86989 TF-M patch: Fix service handles not cleared issue (TF-M issue #230)
- Link to bug tracking: https://developer.trustedfirmware.org/T230
2019-02-19 15:18:58 +02:00
Michael Schwarcz 5f2e4b3911 TF-M patch: Fix tfm_ns_lock_init issue (TF-M issue #239)
- Link to bug tracking: https://developer.trustedfirmware.org/T239
2019-02-19 15:18:57 +02:00
Michael Schwarcz 1f30b52488 TF-M patch: General modifications
- Remove un-needed files
- Disable printf and uart
- Modify include paths
- Guard macros from mbed_lib with ifndef
2019-02-19 15:18:57 +02:00
Michael Schwarcz 8e62826991 Add mbed_lib.json to TF-M SPE 2019-02-19 15:18:56 +02:00
Michael Schwarcz 9277d0f586 Generate partition files 2019-02-19 15:18:56 +02:00
Michael Schwarcz 73ea7ca4c4 [trusted-firmware-m]: Updated to 45e5276 2019-02-19 15:18:55 +02:00
Netanel Gonen 1a87f24955 support in more types then just RSA_KEYPAIR
if the type is not supported the psa_crypto will return the error code
for unsupported
2019-02-19 14:47:11 +02:00
Netanel Gonen d0dae03d01 Fix SPM returning the wrong value 2019-02-19 12:56:41 +02:00
Martin Kojtal 1892e2dd8e
Merge pull request #9741 from michalpasztamobica/esp8266_fix_nonblocking_connect
ESP8266: connect() returns OK in non-blocking calls
2019-02-18 13:22:19 +01:00
Veijo Pesonen d6701c36a3 ESP8266: does OOB handling based on SIGIO and not on a certain interval 2019-02-18 12:39:16 +02:00
Moran Peker fb9ae2faae Fix incorrect return value in psa_security_lifecycle_state (emul)
psa_security_lifecycle_state should return uint32_t of the security
lifecycle state.
bug: psa_platfrom_lifecycle_get_impl return value
is psa_status_t.
2019-02-17 14:28:53 +02:00
Cruz Monrreal 7dbe541251
Merge pull request #9473 from VeijoPesonen/feature-esp8266_reset_handling
ESP8266: treats reset-ready-message as OOB
2019-02-15 12:29:51 -06:00
Michal Paszta 32686d48a8 ESP8266: connect() returns OK in non-blocking calls 2019-02-15 17:33:21 +02:00
Cruz Monrreal c07410d78c
Merge pull request #9628 from kfnta/bare-metal-updates
Bare metal mbed_lib updates
2019-02-14 09:13:34 -06:00
Veijo Pesonen cbbe2ff55e ESP8266: retry reset attempt once in failure 2019-02-14 11:08:37 +02:00
Veijo Pesonen 2d6b63d5a2 ESP8266: prevents doing reset twice in a row, unnecessary 2019-02-14 11:08:36 +02:00
Veijo Pesonen 706dd39569 ESP8266: protects setting UART HW flow control with a mutex 2019-02-14 10:41:04 +02:00
Veijo Pesonen 108ec44b66 ESP8266: fixes UART HW flow control enabling sequence 2019-02-14 10:41:04 +02:00
Veijo Pesonen 71e5321f0f ESP8266: fixes network status refresh procedure 2019-02-14 10:41:04 +02:00
Veijo Pesonen 876a397101 ESP8266: handles reset ready as OOB
Makes possible to recover from spurious resets addiotionally to planned
ones.
2019-02-14 10:41:04 +02:00
Cruz Monrreal f2abdcbcc6
Merge pull request #9639 from michalpasztamobica/esp8266_connect_timeout
ESP8266: connect() checks errors from ESP chip
2019-02-13 20:00:37 -06:00
Oren Cohen b5e8492458
Add PSA mbed-lib.json 2019-02-13 20:36:01 +02:00
Oren Cohen 45c44eb07c Fix dependencies of platform partition 2019-02-13 17:10:12 +02:00
Michal Paszta 6a184da381 ESP8266: connect() can handle ESP's errors.
ESP8266Interface::connect() checks the exact return value from
the underlying ESP8266::connect() call.
Increased timeout for network-wifi greentea tests to 6 minutes.
2019-02-11 17:20:14 +02:00
offirko be1c887477 Ensure unique block address for multi threaded test.
The addresses dont have to change each run, just be unique.
Because address seeds repeat themselves each run, rand() will
produce repeating results that should not collide between
different threads.
2019-02-11 14:41:41 +02:00
Kevin Bracey a3e7a6d85a SPE: Fix up atomic usage
PSA SPE code was using atomics, but not consistently. On the assumption
that the atomics are needed, correct the code to be properly atomic.

* Tighten up table full case - new_handle was left with a bogus value,
  and surrounding code (as a result?) used loop index to assert success.
  Make handle the sole output of the loop, and correct and use it.
* Ensure handle in table is cleared last, with atomic store to release.
* Make skipping of the invalid handle in handle generator loop atomic.
* Use atomic load on state assert, and don't re-read on failure.
* Tighten up types, and avoid casts by using new signed atomics.
2019-02-05 16:03:25 +02:00
Martin Kojtal dcba5ffa3c
Merge pull request #9529 from kfnta/its_crypto
RollUp PR Crypto with ITS
2019-02-04 17:14:05 +01:00
Martin Kojtal f1bf5dbd63
Merge pull request #9520 from VeijoPesonen/bugfix-esp8266_reduce_sigio
ESP8266: reduces SIGIO signaled to the upper layers
2019-02-01 08:23:35 +01:00
Oren Cohen c11904e097
Fix compilation for single v7 platforms 2019-01-31 21:26:47 +02:00
Cruz Monrreal b506b03055
Merge pull request #9456 from VeijoPesonen/feature-esp8266_mbed_error_if_wdt
ESP8266: calls MBED_ERROR if modem's watchdog reset gets triggered
2019-01-31 10:51:38 -06:00
Oren Cohen 27cfacec5c Remove demand for MBED_SPM on single v7 platforms 2019-01-31 18:36:18 +02:00
Cruz Monrreal ffc52e6a5e
Merge pull request #9478 from deepikabhavnani/refactor_sd
Refactor storage components
2019-01-31 10:21:38 -06:00
Cruz Monrreal 39d46280e2
Merge pull request #9475 from davidsaada/david_flashiap_no_default
FlashIAP Block device: Assert if default constructor is used without setting config parameters
2019-01-31 10:21:20 -06:00
itayzafrir b7b85516cb crypto service: Add documentation 2019-01-31 17:17:58 +02:00
Oren Cohen ea9f104463 Fix Licenses 2019-01-31 17:17:58 +02:00
Oren Cohen 5d448d758c Astyle 2019-01-31 17:17:57 +02:00
Oren Cohen 20478ba654 Last update 2019-01-31 17:17:57 +02:00
Oren Cohen b0cbe815ec Regenerate SPM data 2019-01-31 17:17:57 +02:00
Oren Cohen 98707d047b Fix Typo 2019-01-31 17:17:57 +02:00
Oren Cohen 47365d4620 Update ITS test 2019-01-31 17:17:56 +02:00
Alexander Zilberkant 95f8dbce7b Add new platform partition 2019-01-31 17:17:56 +02:00
Oren Cohen cae1ebf33d Add new ITS reset SID
Only accessible from SPE
2019-01-31 17:17:55 +02:00
Oren Cohen 156d3b785b Replace psa_prot_internal_storage.h with psa/internal_trusted_storage.h 2019-01-31 17:17:54 +02:00
Oren Cohen 642fce5022 ITS 1.0 2019-01-31 17:17:54 +02:00
Oren Cohen 34895a05ad CR fixes 2019-01-31 17:17:54 +02:00
Oren Cohen 8841ba69f8 Align to new spec changes and prep for TFM SPM
# Conflicts:
#	components/TARGET_PSA/services/crypto/COMPONENT_PSA_SRV_IPC/psa_crypto_spm.c
#	components/TARGET_PSA/services/crypto/COMPONENT_SPE/psa_crypto_partition.c
2019-01-31 17:17:53 +02:00
Oren Cohen b08c0e2361 Create new PSA compliant headers 2019-01-31 17:17:52 +02:00
Oren Cohen 99b8eafc35 Align with PSA spec
* psa_error_t -> psa_status_t
* psa_invec_t -> psa_invec
* psa_outvec_t -> psa_outvec
* Use new PSA headers
2019-01-31 17:16:41 +02:00
deepikabhavnani 2952735ac0 Moved util (common test folder) inside the TESTS directory
Util was common test folder, which was kept outside as we had
no mechanism to have common files for various tests in tools.
Now same can be achieved by having COMMON folder inside tests
directory
2019-01-30 16:51:05 -06:00
deepikabhavnani 0d6bd2798f Moved `mbed_lib.json` outside config folder
This is to have consistency across all storage components
2019-01-30 16:51:05 -06:00
Veijo Pesonen 53c2879a5c ESP8266: makes guarding variable for deferring events atomic 2019-01-30 17:00:56 +02:00
Veijo Pesonen 7d3621dae4 ESP8266: reduces SIGIO signaled to the upper layers 2019-01-30 17:00:56 +02:00
Martin Kojtal a4ed473afc
Merge pull request #9515 from VeijoPesonen/bugfix-tests-netsocket-udp_udpsocket_sendto_invalid
tests-netsocket-udp UDPSOCKET_SENDTO_INVALID allow unsupported empty UDP packet
2019-01-30 10:08:34 +01:00
Martin Kojtal 88d7ef155b
Merge pull request #9531 from theamirocohen/remove_flashiap_tests
Remove COMPONENT_FLASHIAP tests
2019-01-30 09:57:35 +01:00
Martin Kojtal 1031e2d464
Merge pull request #9236 from jeromecoutant/PR_SD_TEST
COMPONENT_SD tests update for small RAM targets
2019-01-30 09:54:41 +01:00
Amir Cohen 35df2de703 Remove COMPONENT_FLASHIAP tests
FlashIAPBlockDevice LittleFS ‘fopen’ falls on nightly tests
LittleFS test on FlashIAP is not relevant and thus removed
2019-01-29 13:54:40 +02:00
itayzafrir 861fb0cbf0 crypto service: Implement function psa_hash_clone over IPC 2019-01-29 11:43:27 +02:00
itayzafrir 81a4ff6425 crypto service: Implement IPC according to Mbed Crypto 1.0.0d1 API
1. Removed obsolete crypto APIs from IPC implementation.
2. Updated existing crypto APIs in IPC implementation.
3. Added new crypto APIs to IPC implemntation (except for psa_hash_clone).
2019-01-29 11:43:27 +02:00
Veijo Pesonen d712568b8f ESP8266: with empty packet send returns zero if TCP, unsupported otherwise 2019-01-28 13:46:48 +02:00
Cruz Monrreal 1b1c108528
Merge pull request #9484 from offirko/offir_test_fopen_fixes
Start Component SD test by formatting SD Card
2019-01-24 13:28:33 -06:00
Cruz Monrreal 7c4668cfe9
Merge pull request #9291 from j3hill/QSPI_Align
NRF5x: QSPI SFDP read, min read/write implementation
2019-01-24 13:25:05 -06:00
offirko 0bf071809c Start test by formatting SD Card, otherwise FATFS mount might fail
Fix Jira: IOTSTOR-752
2019-01-24 12:44:04 +02:00
Cruz Monrreal f790fdd1cd
Merge pull request #9421 from VeijoPesonen/feature-esp8266_nonblocking_connect
ESP8266: implements possibility to decide between non-blocking/blocking connect.
2019-01-23 22:47:51 -06:00
j3hill 2a72bb67a3 NRF5x: QSPI SFDP read implementation 2019-01-23 10:24:02 -06:00
j3hill e9f08cb4d4 NRF5x: min read/write implementation 2019-01-23 09:55:27 -06:00
David Saada 22309c93d0 FlashIAP BD: Assert if default constructor is used w/o config change 2019-01-23 16:30:36 +02:00
Cruz Monrreal 0c85d441d2
Merge pull request #9408 from evva-sfw/feature/SPIF_ULBPR
SPIF - Fix command to unlock Global Block-Protection register
2019-01-22 23:59:21 -06:00
Veijo Pesonen 832eed02ce ESP8266: calls MBED_ERROR if modem's watchdog reset gets triggered 2019-01-22 16:11:32 +02:00
Veijo Pesonen c4d96e6309 ESP8266: provides blocking/non-blocking connect
Implements NetworkInterface::set_blocking() and implements the
functionality to distinguish between the two in connect()
2019-01-21 16:22:53 +02:00
Veijo Pesonen 58c1a88348 ESP8266: turns connect fully to non-blocking mode
Blocking mode connect is not supported anymore when this patch is
applied
2019-01-21 16:22:53 +02:00
Veijo Pesonen c60c5244c1 ESP8266: makes connect() connection status aware 2019-01-21 14:43:35 +02:00
jeromecoutant f3ba34a344 DIRS and SEEK SD tests update for small RAM targets
Test buffer size can now be specified for each target
2019-01-18 09:23:40 +01:00
Cruz Monrreal 309d9be347
Merge pull request #9386 from jeromecoutant/PR_SDJSON
SD default configuration for ST boards is already defined in TARGET_STM
2019-01-17 21:54:18 -06:00
Cruz Monrreal 30e0d8f1f6
Merge pull request #9366 from VeijoPesonen/bugfix-esp8266_verify_rcvd_data_len
ESP8266: add an error check for data overflow from modem side
2019-01-17 21:52:11 -06:00
Philipp Steiner f0ec813d71 Update Comments 2019-01-17 11:13:16 -06:00
Philipp Steiner 167a3098c8 Add SPIF_ULBPR command also to QSPIFBlockDevice and SPIFReducedBlockDevice 2019-01-17 11:13:16 -06:00
Philipp Steiner 5f4ff5de8c Add SPIF_ULBPR command and replace wrong command to clear all write-protection bits in the Block-Protection register. 2019-01-17 11:13:16 -06:00
Martin Kojtal b59b93e828
Merge pull request #9331 from VeijoPesonen/bugfix-esp8266_udp_prevent_would_block
ESP8266: prevent WOULD BLOCK from TX if UDP
2019-01-17 12:41:42 +01:00
jeromecoutant b070fb47d7 COMPONENT_SD default configuration for ST boards is already defined in TARGET_STM 2019-01-15 17:08:54 +01:00
Martin Kojtal a180d69e60
Merge pull request #9356 from VeijoPesonen/bugfix-esp8266_disconnect_return_code
ESP8266 - fixes disconnect to check the state from modem
2019-01-15 10:38:40 +01:00
Martin Kojtal ebf3a192e1
Merge pull request #9329 from juhaylinen/sdblockdevice-doc
SDBlockDevice docs update
2019-01-14 10:40:35 +00:00
Veijo Pesonen 02cd9f1884 [ESP8266] adds an error check for data overflow from modem side 2019-01-14 12:22:41 +02:00
Veijo Pesonen e83b883e08 [ESP8266] fixes disconnect to check the state from modem
Additionally to internal bookkeeping lets check from the modem
that what is connection state in disconnect. There might be
inconsistencies.
2019-01-11 16:25:26 +02:00
Seppo Takalo 7db2292417 Flush ESP8266 serial input buffers after HW reset 2019-01-10 18:13:32 +02:00
Veijo Pesonen e9ceff2450 [ESP8266] fixes a debug print 2019-01-10 14:33:15 +02:00
Veijo Pesonen 9a3c9a30b3 [ESP8266] Drop signalling SIGIO artificially if UDP send fails
With TCP it's desirable that SIGIO wakes up the application to check
if there is buffer space space available on the mode. With UDP the
behavior is not acceptable as we don't know if the other endpoint is
there as connection establishment is missing. Hence buffers might
stay full forever.
2019-01-10 14:33:15 +02:00
Martin Kojtal e25611aad8
Merge pull request #9309 from VeijoPesonen/bugfix-esp8266_send_busy
ESP8266 - fix send buffer exhaustion handling
2019-01-10 12:24:09 +00:00
Mel W 66f5358c4b
some minor streamlining and editorial changes 2019-01-10 14:18:11 +02:00
Juha Ylinen a4a99d61d2 SDBlockDevice docs update 2019-01-10 13:44:10 +02:00
Martin Kojtal 47e477cc97
Merge pull request #9310 from juhaylinen/spifblockdevice-doc
SPIFBlockDevice docs update
2019-01-10 10:53:19 +00:00
Cruz Monrreal b9d5dceb72
Merge pull request #9284 from VeijoPesonen/bugfix-esp8266_socket_close
ESP8266: Fixes AT-layer socket_open-functions
2019-01-09 13:47:46 -06:00
Veijo Pesonen 7c112b2843 [ESP8266] socket_send() returns WOULD_BLOCK if server won't accept
Driver must return NSAPI_ERROR_WOULD_BLOCK if a server won't accept
data from the modem and the modem's buffers are full. In case that
socket is closed driver returns NSAPI_ERROR_CONNECTION_LOST.
2019-01-09 16:34:25 +02:00
Juha Ylinen 96877b80e6 SPIFBlockDevice docs update 2019-01-09 15:29:34 +02:00
Veijo Pesonen 4a9f86565a [ESP8266] Fixes AT-layer socket_open-functions
When a socket open fails it musn't be treated as fatal error. Returning
a device error which is then handled by an application is the correct
solution
2019-01-09 13:20:52 +02:00
Seppo Takalo 8bf3ce3d68 ESP8266: Set HW reset time to 2ms 2019-01-08 18:18:46 +02:00
Martin Kojtal a9ce91686c
Merge pull request #9264 from offirko/offir_qspif_reduce_trace_level
reduce info traces to debug level to prevent logs overflow
2019-01-08 12:38:51 +00:00
Martin Kojtal 1c3b6f4f94
Merge pull request #9268 from yossi2le/yossi_fix_flashiap_test
Calculate FlashIAPBlockDevice start address and size automatically for test only
2019-01-08 09:51:28 +00:00
Yossi Levy bdeb54592f This commit fixes an issue in which boards with FlashIAP block device enabled fails the FlashIAP block device tests exists under the component directory. That's because they have no start address and size configured in the mbed_lib.json file. In order to simplify the test for targets with no definitions in the mbed_lib.json, the test will calculate the start address as the first sector after the application ends and up to the max size available. 2019-01-07 15:20:58 +02:00
Martin Kojtal 0eabafa551
Merge pull request #9135 from yossi2le/yossi_get_type_for_bd
Get type for BlockDevice
2019-01-07 12:26:29 +00:00
offirko a270cffe39 reduce info traces to debug level to prevent logs overflow 2019-01-06 12:11:30 +02:00
Cruz Monrreal 54f759176b
Merge pull request #9210 from AnttiKauppila/mbed_h_fix
mbed.h includes removed
2019-01-04 10:27:30 -06:00
Martin Kojtal 26b8a96d44
Merge pull request #9173 from michalpasztamobica/esp8266_remove_stop_uart_hw_ctrl
Prevent ESP8266 stopping HW control on init
2019-01-04 08:42:51 +00:00
Antti Kauppila 2ff6cd3df3 Cleaned 802.15.4_RF to not have mbed.h includes 2018-12-28 15:19:03 +02:00
Antti Kauppila 02b0f79e15 mbed.h includes removed 2018-12-28 14:36:10 +02:00
Yossi Levy b17d13e75e Documnent changes and adding const to get_type method 2018-12-23 14:27:14 +02:00
Yossi Levy b8b7292d8e astyle fix 2018-12-23 11:03:45 +02:00
Yossi Levy 1d71fb1c9f Add get_type method to block devices. 2018-12-23 11:03:45 +02:00
Deepika 5f57b89c10 Resolved: [Error] main.cpp@115,34: [Pe266]: "size" is ambiguous
`size` is part of std library since c++17, and results in build
errors for IAR 8.x.
https://en.cppreference.com/w/cpp/iterator/size
2018-12-21 14:29:06 -06:00
Deepika a356db19aa Resolved warning: variable declared but never referenced 2018-12-21 13:34:00 -06:00
Deepika 7b5fe2d8ba Resolve string literal error
Space needed between 2 string literals
    [Error] fopen.cpp@204,97: [Pe2486]: user-defined literal operator not found
2018-12-21 13:28:23 -06:00
Martin Kojtal cc2e15c84e
Merge pull request #9158 from davidsaada/david_lto_dup_types
Fix LTO build failures due to duplicate local types
2018-12-20 16:30:16 +00:00
Michal Paszta 034c72e12c Prevent ESP8266 stopping HW control on init 2018-12-20 13:22:13 +01:00
Alastair D'Silva 2617c5d55b Don't use define checks on DEVICE_FOO macros (mbed code)
The DEVICE_FOO macros are always defined (either 0 or 1).

This patch replaces any instances of a define check on a DEVICE_FOO
macro with value test instead.

Signed-off-by: Alastair D'Silva <alastair@d-silva.org>
2018-12-20 10:16:42 +11:00
David Saada ec0ebc2cec Fix LTO build failures due to duplicate local types 2018-12-19 15:52:43 +02:00
Cruz Monrreal II 9b9b81e9a4 Merge branch 'esp8266_link_type_fix' of ssh://github.com/c1728p9/mbed-os 2018-12-18 13:23:44 -06:00
Cruz Monrreal ce1929b5df
Merge pull request #9045 from fredlee12001/patch-1
Fix wrong PIN config for RTL8195AM platform
2018-12-18 10:32:59 -06:00
Russ Butler 6210805696 Fix ESP8266 "Link Type" errors after reset
As part of the ESP8266 connect sequence, ESP8266Interface::connect,
a software reset is performed. If the ESP8266 had been connected
previously then the ESP8266 will sometimes send a "WIFI DISCONNECT" OOB
message before performing the software reset. This causes the
ESP8266::_oob_connection_status to change its state (_conn_status) from
NSAPI_STATUS_DISCONNECTED to NSAPI_STATUS_CONNECTING. This causes
ESP8266Interface::_startup, called later in the boot seqeunce, to skip
ESP8266::startup. Without this call socket mux mode (CIPMUX=1) is never
enabled and all send commands using this format fail with a "Link Type"
error.

This patch fixes that problem by unconditionally calling
ESP8266::startup as part of the ESP8266 connect sequence.
2018-12-17 10:11:52 -06:00
Cruz Monrreal 64e7e468b2
Merge pull request #9089 from jeromecoutant/DEV_QSPI_TEST
STM32 QSPI update
2018-12-14 10:14:13 -06:00
Cruz Monrreal 5e42fc0e74
Merge pull request #9057 from offirko/offir_qspif_prefer_144_mode
Prefer QSPI Bus mode 1-4-4 as highest priority for QSPIFBlockDevice
2018-12-13 18:15:04 -06:00
jeromecoutant fc548cdc05 STM32 QSPIF: add DISCO_L496AG, DISCO_F746NG and DISCO_F769NI 2018-12-13 10:56:36 +01:00
offirko b79c64ec53 Favor QSPI Bus mode 1-4-4 over QPI
QPI may have slightly better performance, but it is not supported by all targets.
It requires register setup between each Read and Program/Erase commands,
which might damage the overall performance eventually.
2018-12-12 10:54:48 +02:00
Michal Paszta d6e385b330 ESP8266 send returns WOULD_BLOCK error when busy 2018-12-11 17:48:37 +01:00
Veijo Pesonen e4de165a32 [ESP8266] Fixes namespace collision 2018-12-11 09:49:23 +02:00
Veijo Pesonen 02aeab29d3 [ESP8266] powers down the modem on disconnect 2018-12-11 09:49:23 +02:00
Veijo Pesonen 8415e49835 Fixes connect, and network-status logic 2018-12-11 09:49:23 +02:00
Veijo Pesonen 12fa3e59bb Fixes AT command timeout values from reset&connect 2018-12-11 09:49:23 +02:00
Veijo Pesonen 9857ee1c17 [ESP8266] Adds support for controlling HW reset of the modem from the driver
While connecting will run HW reset for the modem if reset wire is attached to a know pin.
2018-12-11 09:49:23 +02:00
Fred.Li fb1e4de3ba
Fix wrong PIN config for RTL8195AM platform
Merge from https://github.com/ARMmbed/sd-driver/pull/110
2018-12-11 14:37:09 +08:00
Cruz Monrreal 61ade84447
Merge pull request #8875 from deepikabhavnani/fix_components
Add dependency checks to components
2018-12-10 19:20:30 -06:00
Martin Kojtal 8301325481
Merge pull request #8935 from kfnta/crypto_partition_fix
Fix PSA crypto partition and tests
2018-12-06 11:34:45 +01:00
Martin Kojtal be817bab44
Merge pull request #8853 from VeijoPesonen/feature-esp8266_reconnect2
Reports NSAPI_STATUS_CONNECTING when trying to reconnect
2018-12-05 10:37:17 +01:00
Cruz Monrreal b03a8a37bb
Merge pull request #8947 from SeppoTakalo/patch-1
ONME-4007: Fix mbed_lib link from ESP8266 Readme.md
2018-12-04 12:23:16 -06:00
Cruz Monrreal 0b1b8e0cc3
Merge pull request #8908 from kfnta/alzix_fix_its
Fix PSA internal storage configuration
2018-12-04 11:51:04 -06:00
Oren Cohen fa5c96c857 Fix includes 2018-12-04 18:37:47 +02:00
Oren Cohen c3bd6f12d2 Fix PSA crypto partiotion and tests
* Styling
* Correct error codes on failing connection
* Add panics where needed
* correct skip defines
* Fix psa_spm_init_refence_counter bug
2018-12-04 17:07:28 +02:00
Martin Kojtal 6edc81ddae
Merge pull request #8873 from kfnta/psa_spm_docs
PSA-SPM documentation follow-up
2018-12-04 15:38:45 +01:00
Martin Kojtal e02a8ab2f1
Merge pull request #8925 from Patater/crypto-storage-config-fixes
Fix PSA storage typo
2018-12-04 14:34:15 +01:00
Alexander Zilberkant 44ec2aa49a Better PID handling
PSA PID is of int32_t type - use native type during the whole flow for better readability.
Convert PID to unsigned for calculations only.
Add dedicated inline function for logic shift right.
2018-12-04 14:08:14 +02:00
Alexander Zilberkant 9f7752b1f9 Replace PID and UID order in file name
PID should come first to create - to prevent timing attacks. Each partition can only request its own files. Thus starting lookup from the PID makes more sence.
2018-12-04 14:08:14 +02:00
Alexander Zilberkant e7df8583d6 Optimize error handling 2018-12-04 14:08:14 +02:00
Alexander Zilberkant 9d59ed8c60 Fix PSA internal storage misconfiguration
Use internal TDBStore instance instead of default one
2018-12-04 14:08:14 +02:00
Martin Kojtal 6ae3501a66 spm spe: remove space 2018-12-04 11:50:14 +00:00
Mel W 56e3dd9a7f
Grammatical and capitalization changes 2018-12-04 13:03:21 +02:00
Seppo Takalo c384119576 ONME-4007: Fix mbed_lib link from ESP8266 Readme.md
ONME-4007: Fix mbed_lib link from ESP8266 Readme.md
2018-12-04 10:27:17 +02:00
Martin Kojtal b52c164028
Merge pull request #8911 from c1728p9/esp8266_flow_control_fix
Fix ESP8266 recv_udp timeout with flow control
2018-12-03 13:41:23 +01:00
Martin Kojtal 0d0740f17e
Merge pull request #8890 from michalpasztamobica/esp8266_disconnect_no_connection
ESP8266 disconnect returns ERROR_NO_CONNECTION
2018-12-03 13:40:54 +01:00
Martin Kojtal bf36ff77c1
Merge pull request #8855 from michalpasztamobica/warnings_fix
Fix compilation warnings (apart from nanostack)
2018-12-03 13:31:55 +01:00
Martin Kojtal c62f654da1
Merge pull request #8843 from miyuki/fix-cxx11
Fix C++11 build with Arm Compiler 6
2018-12-03 13:22:11 +01:00
Martin Kojtal acbde4e0b6
Merge pull request #8841 from VeijoPesonen/bugfix-restrict_send_size2
Bugfix restrict send size; namespace fixes; ATCmdParser::read return value fix
2018-12-03 13:21:34 +01:00
Deepika 76220fa89c Add Serial + EventQueue dependency to ESP8266 2018-11-30 15:38:28 -06:00
Jaeden Amero 6de7c184d7 psa: storage: Fix PSA_PS_ERROR_OFFSET typo
Correct typo of PSA_PS_ERROR_OFFSET to PSA_ITS_ERROR_OFFSET.
2018-11-30 15:36:22 +00:00
Russ Butler 53ed3f5c3d Fix ESP8266 recv_udp timeout with flow control
UDP packets are always received as OOB data. Without checking for
new OOB data with a call to "_process_oob" then recv_udp never blocks.
If a UDP packet is not available then NSAPI_ERROR_WOULD_BLOCK is
returned. This causes mbed-os's DNS handling to always fail when
flow control is enabled.

This patch fixes recv_udp by always calling "_process_oob" regardless
of if flow control is enabled. This ensures that recv_udp follows the
timeout parameter and waits for new data to arrive.
2018-11-29 19:13:37 -06:00
Oren Cohen 549d24f213 More fixes by Melinda 2018-11-28 14:52:40 +02:00
Oren Cohen 01301387f8 Run SPM code generator 2018-11-28 14:40:01 +02:00
Oren Cohen 45bd4f305a Add SPM code generation test to Travis-CI 2018-11-28 14:38:44 +02:00
Michal Paszta eb9c688574 ESP8266 disconnect returns ERROR_NO_CONNECTION 2018-11-28 11:23:09 +01:00
Oren Cohen 6ec5144e0c Melinda's remarks 2018-11-28 12:17:37 +02:00
Oren Cohen 3629e002ee Fix PSA-SPM Documentation 2018-11-28 12:17:36 +02:00
Martin Kojtal e62abd8aee
Merge pull request #8804 from mohammad1603/inject_entropy_spm
PSA Crypto SPM
2018-11-28 09:40:31 +01:00
Deepika b32c6ba2a5 Components if using RTOS modules should be enabled only when RTOS is present
Build failures were observed when rtos is ignored with .mbedignored.
Components dependent on RTOS should be guarded with MBED_CONF_RTOS_PRESENT
2018-11-27 13:55:59 -06:00
Deepika 6c6ef87c19 Fix header files used in esp8266
"ns_types.h" results in build failure when networking feature is ignored with
.mbedignored. ESP8266 component should be enabled only when NSAPI is present.
2018-11-27 13:55:59 -06:00
Deepika 74ad47b269 Fix header files used in 802.15.4_RF
"ns_types.h" is not used, but included. Results in build failure when networking
feature is ignored with .mbedignored

"mbed_trace.h" not used.
2018-11-27 13:55:59 -06:00
Martin Kojtal e69aa15aea
Merge pull request #8744 from kfnta/psa_spm_base
PSA Secure partition manager and services
2018-11-27 15:26:38 +01:00
mohammad1603 6e862cf112 Fix psa_crypto_generator_init implementation to use the init define macro 2018-11-27 11:56:59 +02:00
mohammad1603 88f4f48fac Astyle fixes for the source
Used running: astyle -n --options=.astylerc
2018-11-27 11:56:57 +02:00
Mohammad AboMokh 5c2cf07780 Revert file permission change 2018-11-27 11:56:56 +02:00
Mohammad AboMokh 1d4b6a4e89 Return invalid argument error in case of zero or negative handle for generators 2018-11-27 11:56:55 +02:00
Mohammad AboMokh 79d957ac7b Change PSA_MAX_NONCE_SIZE to PSA_AEAD_MAX_NONCE_SIZE 2018-11-27 11:56:54 +02:00
Mohammad AboMokh ba47b450aa Remove unnecessary define 2018-11-27 11:56:54 +02:00
Mohammad AboMokh 7776fea903 Remove unneeded includes 2018-11-27 11:56:53 +02:00
Netanel Gonen 352bac3b26 Crypto SPM - fix - PART1
Fail fast on invalid handles before calling to SPM
2018-11-27 11:56:52 +02:00
Netanel Gonen bab6116f31 compilation fix 2018-11-27 11:56:51 +02:00
Mohammad AboMokh a4c498e02a Integrate psa_key_agreement() with SPM code 2018-11-27 11:56:50 +02:00
Netanel Gonen 59c3c9fff7 crypto init with multiple client guard & tests 2018-11-27 11:56:48 +02:00
Netanel Gonen 7f49fd2b09 Fix memory leak if user does not calls abort. call abort when connection is closed 2018-11-27 11:56:46 +02:00
Netanel Gonen 58f92c3266 remove execute permissions from file 2018-11-27 11:56:45 +02:00
Mohammad AboMokh 54cd8bf51f Change behavior realted to MBEDTLS_ENTROPY_NV_SEED and MBEDTLS_PSA_HAS_ITS_IO flags
* mbedtls_psa_inject_entropy() MUST be always available for client side.
* Partition will return PSA_ERROR_NOT_SUPPPORTED in case where MBEDTLS_ENTROPY_NV_SEED or MBEDTLS_PSA_HAS_ITS_IO flags are not defined
2018-11-27 11:56:40 +02:00
Mohammad AboMokh fb88cb4cb5 Add missing guards 2018-11-27 11:56:38 +02:00
Mohammad AboMokh 587fdbb447 Remove crypto init that was not called by the user 2018-11-27 11:56:32 +02:00
Mohammad AboMokh bd47a8c2b8 Add entropy inject to spm 2018-11-27 11:56:30 +02:00
Oren Cohen f4581faab0 Create a new partition for the crypto service
The following files initially were taken
from https://github.com/ARMmbed/psa-crypto-spm/releases/tag/spm-crypto-5.11
* crypto_platform_spe.h
* crypto_struct.h
* crypto_struct_ipc.h
* psa_crypto_spm.c
* crypto_spe.h
* crypto_partition_psa.json

The rest of the files were autimatically generated
by tools/spm/generate_psa_partition.py
2018-11-27 11:56:29 +02:00
Alexander Zilberkant ed8505ae64 Update components/TARGET_PSA/spm/psa_defs.h
Co-Authored-By: orenc17 <oren.cohen@arm.com>
2018-11-27 09:16:48 +02:00
Amanda Butler ba6fdcf494 Edit psa_defs.h
Make minor edits, mostly for consistent abbreviations.
2018-11-27 09:16:48 +02:00
Amanda Butler b87ab2511b Edit spm_server.h
Make minor edits, mostly for consistent capitalization and style.
2018-11-27 09:16:47 +02:00