Commit Graph

23282 Commits (276ef91bb6bb2a19eb1d0250aa8ad29fa93fe25e)

Author SHA1 Message Date
Moran Peker c97cecc273 Update TFM attestation code to latest version
The latest and greatest version is:
c43181daf54f69f53de58593a50dd6a9c233eecd

- Add new header file and implement tfm_memcpy (used in
attetstaion_core c file)
2019-02-27 14:14:30 +02:00
Moran Peker 2810d369f9 Remove incorrect free place 2019-02-27 14:14:29 +02:00
Moran Peker 661e2f92aa Remove header files from inc into services/attestation folder 2019-02-27 14:14:29 +02:00
Moran Peker f02f6e3cf9 Add newline at end of file and remove un needed commant 2019-02-27 14:14:28 +02:00
Moran Peker 92a9b3f736 Remove calling to "psa_crypto_init()"
No need to call psa_crypto_init before crypto operations
we assume init already called before. if not an error will return.
2019-02-27 14:14:28 +02:00
Moran Peker 2e7738b8eb astyle fix 2019-02-27 14:14:27 +02:00
Moran Peker 41bd381462 General fixes of spelling, newline, un needed code
-Correct spelling errors
-Add newline at end of file
-Remove un needed code
2019-02-27 14:14:27 +02:00
Moran Peker de3ee8e376 Using goto exit in attest_public_key_sha256 function 2019-02-27 14:14:26 +02:00
Moran Peker d3c9860360 Free allocated buffers 2019-02-27 14:14:26 +02:00
Moran Peker d9b22da91d Remove calling to psa_crypto_init
- no need to call psa_crypto_init before crypto operations
we assume init already called before. if not an error will return.
2019-02-27 14:14:25 +02:00
Moran Peker d40c25d516 Add newline at end of file 2019-02-27 14:14:25 +02:00
Moran Peker aa5b79a480 generated file update 2019-02-27 14:14:24 +02:00
Moran Peker e60af99edb Attestation: Add comments from temporary data 2019-02-27 14:14:24 +02:00
Moran Peker e12f5eeaa7 Add ifdef TARGET_PSA and MBEDTLS_PSA_CRYPTO_C to test file
if not supported return error
2019-02-27 14:14:23 +02:00
Moran Peker 2720b5a73d Update include psa_defs -> psa/client 2019-02-27 14:14:23 +02:00
Moran Peker 07520c7cf6 Update astyleignore to ignore qcbor lib folder 2019-02-27 14:14:23 +02:00
Moran Peker f8e4626098 Attestation: move t_code folder place 2019-02-27 14:14:22 +02:00
Moran Peker b3c6f709ca Attestation: move qcbor folder place 2019-02-27 14:14:21 +02:00
Moran Peker bd7061eaba Attestation: Add close key after open key 2019-02-27 14:14:20 +02:00
Moran Peker 715305accf Attestation: update boot status data
Epoc data to be 2 bytes instead of 4
2019-02-27 14:14:20 +02:00
Moran Peker e0c5df50be Attestation: Add parameter and entry size checks 2019-02-27 14:14:19 +02:00
Moran Peker 5211a92af7 Revert file permissions changes 100644 to 100755 2019-02-27 14:14:19 +02:00
Moran Peker 773fa44205 Update attestation asymmetric sign to use deterministic alg
- Add PSA_KEY_USAGE_VERIFY to attesttaion key usage
- Set deterministic alg to attestation key policy
- Call asymmetric sign with deterministic alg
2019-02-27 14:14:18 +02:00
Moran Peker 70a14b2f3a Update to last version of TFM-Attesttaion code
-update TFM attestation files
-update attest_crypto.c and psa_attestation_stubs.c file to support TFM
code changes
2019-02-27 14:14:18 +02:00
Moran Peker 2117a26cb1 Get security lifecycle by psa_security_lifecycle_state function
-Add bug fix for psa_security_lifecycle_state function - PR #9745
-Remove lifecycle data from temp boot status data
-Update attesttation_partition_json file to use
PSA_PLATFORM_LC_GET and generate partition
code - auto generated files update
2019-02-27 14:14:17 +02:00
Moran Peker 4101ee92df Add checks ,initialization,remove unneeded code and files license update 2019-02-27 14:14:14 +02:00
Moran Peker 080f4f4e69 Attestation: Update iat claims data
Add more iat claims: profile definition and verification service
Update boot status data: add more SW components for SW_S_NS module
2019-02-27 14:14:13 +02:00
Moran Peker 636753b404 Attestation: Add a new define for attestation private key id 2019-02-27 14:14:13 +02:00
Moran Peker 0a0bb04dfa Attestation: Change files license to Apache
change all files except tfm code.
2019-02-27 14:14:12 +02:00
Moran Peker 8fc9c8fdab Attestation: astyle fixs
Runing astyle over attestation file to pass CI
2019-02-27 14:14:11 +02:00
Moran Peker a994499bf3 Atteststaion: Update header files
-Remove psa_initial_attesttaion.h
-Move psa_initial_attesttaion_api.h and psa_attest_inject_key.h into
inc folder
-Update include in test file
2019-02-27 14:14:11 +02:00
Moran Peker 22437fca7e Attestation: Add test for initial attestation service
Add single test that check inject attestation key and attestation get token
2019-02-27 14:14:10 +02:00
Moran Peker 1d2351d870 Attestation: update targets.json for K64F
Make K64F run with MBED_SPM
Attestation code using SPM structures over single and dual core.
2019-02-27 14:14:10 +02:00
Moran Peker e2ea743646 Attestation: Update astyle.ignore
Ignore TFM imported code from astyle
2019-02-27 14:14:09 +02:00
Moran Peker 5f45b0af92 Attestation: aut- generated files by generate_partition_code.py
Atestation paration added.
2019-02-27 14:14:09 +02:00
Moran Peker 9a4ea3d319 Add PSA Initial Attestation service
Attestation service can create a token on request, which contains a fix set of
device specific data.
Implementation:
-‘psa_initial_attest_get_token_size’- get exact size of initial attestation token in bytes.
-‘psa_initial_attest_get_token’- get the initial attestation token.
-‘psa_attestation_inject_key’ - Generate or import the attestation key pair and export the public part.

-Including CBOR lib and TFM attestation implemantation.
-Temporary claim’s data – no bootloader over V7 Single & Dual
2019-02-27 14:14:08 +02:00
Martin Kojtal 6bdbe754cd
Merge pull request #9799 from VeijoPesonen/bugfix-esp8266-dns
Increase events.share-eventsize to 768B because of ESP8266 AT driver and asynchronous DNS
2019-02-27 11:30:38 +01:00
Martin Kojtal c123b98b3c
Merge pull request #9804 from aashishc1988/disable_update_cert
Provide an option to disable writing developer certificate
2019-02-27 11:13:30 +01:00
Martin Kojtal a59d45f9eb
Merge pull request #9867 from cydriftcloud/rebuild-wiced-for-iar8
PSOC6: Rebuild WICED libraries with IAR8 support
2019-02-27 10:59:27 +01:00
Martin Kojtal 7a5831ae0a
Merge pull request #9843 from desmond-blue/fix_Cordio-Gatts-write-permission
Fix cordio gatts configuring write permission
2019-02-27 10:48:22 +01:00
Michael Schwarcz 53a8cb7513 Add mbed_lib.json to usb folder 2019-02-27 11:47:35 +02:00
Arto Kinnunen 5486a38527 Merge commit 'b182455f1947ff8fa48f37ad5fde17d89d67efa5'
* commit 'b182455f1947ff8fa48f37ad5fde17d89d67efa5':
  Squashed 'features/nanostack/sal-stack-nanostack/' changes from 2cd155b..76da6a5
2019-02-27 11:02:44 +02:00
Arto Kinnunen b182455f19 Squashed 'features/nanostack/sal-stack-nanostack/' changes from 2cd155b..76da6a5
76da6a5 Merge branch 'release_internal' into release_external
d1e0074 Fix Mbed-OS test compilation error

git-subtree-dir: features/nanostack/sal-stack-nanostack
git-subtree-split: 76da6a594e77ad5138ec0700855f204045968b01
2019-02-27 11:02:43 +02:00
Martin Kojtal d4a07e0adb
Merge pull request #9851 from vidavidorra/feat/support-obj-in-memap
feat: add support for .obj files in memap
2019-02-27 09:48:46 +01:00
Martin Kojtal 5ab69d5d6b
Merge pull request #9575 from itayzafrir/crypto-64-bit-key-ids
Crypto IPC 64 bit key ids for ITS
2019-02-27 09:29:18 +01:00
Veijo Pesonen 688a4e42bc ESP8266: recv() is able to handle device busy indication 2019-02-27 09:54:43 +02:00
Jaeden Amero d63677f207 crypto: Update to Mbed Crypto 1.0.0d7 2019-02-27 07:24:50 +00:00
Cruz Monrreal d96c9e8800
Merge pull request #9862 from netanelgonen/backward_support_its
Backward support PSA_ITS
2019-02-26 23:32:58 -06:00
Cruz Monrreal 3352b431b3
Merge pull request #9786 from c1728p9/tickless_optimization
Optimize tickless tick computation
2019-02-26 23:22:04 -06:00
Cruz Monrreal e1736cd06f
Merge pull request #9571 from mprse/fix_9523_rtos_less_issue
Update to 2-region model for HEAP and Stack Memory
2019-02-26 22:50:19 -06:00