Commit Graph

376 Commits (3c450f1b3702ee13c41f787ba938284babe7a946)

Author SHA1 Message Date
Andres AG 509a72ca81 Add checks for NULL_ENTROPY and SSL_TLS in mbed OS 2016-10-20 17:07:32 +01:00
Martin Kojtal 382cb9f57a Merge pull request #3021 from hasnainvirk/master
ONME-2822 Binary build script mod
2016-10-19 13:42:22 +01:00
Sam Grove 026e880943 Merge pull request #3042 from mikaleppanen/lwip_tcp_acc_corr
Corrected lwip TCP socket accept ipv6 address conversion
2016-10-19 05:48:33 -05:00
Sam Grove 97670e3e6f Merge pull request #3040 from andresag01/update-mbedtls-to-2.4.0
Update feature/mbedtls to version 2.4.0
2016-10-19 05:48:06 -05:00
Sam Grove 61e40cd90b Merge pull request #3035 from c1728p9/fix_config_store
Fix config store
2016-10-19 05:47:47 -05:00
Sam Grove 5bcebba71d Merge pull request #3023 from jeromecoutant/PR_digital_loop_tests
digital_loop tests update for STM32
2016-10-19 05:46:22 -05:00
Russ Butler 3601b5ebb3 CFSTORE - Fix test failures due to fragmentation
In the config store create test in test case #5 the amount of available
memory is determined by fully allocating the heap. This is done
multiple times to determine if there is a memory leak. This causes
problems when even slight fragmentation occurs in the heap, since
the size that can be allocated is decreased slightly, which the test
flags as a memory leak.

This patch makes memory leak detection more robust by using metrics
provided by mbed_stats_heap_get. These metrics are an exact
measurement of memory allocated is not changed by fragmentation.
This allows the memory leak test to report correct values regardless of
fragmentation.
2016-10-17 21:08:57 -05:00
Andres AG 57814ddbbc Update feature/mbedtls to version 2.4.0 2016-10-17 13:32:25 +01:00
Mika Leppänen 61c7f9821b Corrected lwip TCP socket accept ipv6 address conversion 2016-10-17 15:30:09 +03:00
Russ Butler 9f0e756e28 CFSTORE - Delete handle even if key ref non zero
When closing a file handle remove the handle from the handle list
regardless of what the reference count of the key it is pointing to is.
This prevents config store from keeping a handle to file handles that
have gone out of scope.
2016-10-16 20:47:43 -05:00
Russ Butler c908666d63 CFSTORE - fix handling of realloc fail on delete
The function cfstore_delete_ex is written under the assumption that
CFSTORE_REALLOC will never fail if the size is decreasing. Regardless
of the status of CFSTORE_REALLOC the entry is removed from the config
store and zeroed. This works correctly if CFSTORE_REALLOC correctly
updates area_0_tail, but can lead to crashes in the case area_0_tail is
left unchanged. The crash is because when iterating over the config
store data, cfstore_get_next_hkvt is unable to determine the end of
valid data.

This patch fixes this problem by handling the realloc failure case by
updating area_0_tail even if CFSTORE_REALLOC returns NULL. This
patch also adds an assert to check for out of bound entries in when
calling cfstore_get_next_hkvt. This allows an assert to be triggered
if this bug is re-introduced, rather than a crash.
2016-10-16 20:47:42 -05:00
Russ Butler de8ce0e43e CFSTORE - Fix crashed due to uninit data
When the config store is powered down area_0_head is freed, but
area_0_len is not set to 0. This causes when cfstore_realloc_ex is
called, since on the first allocation it appears that the config store
size is decreasing, and therefore the data is not initialized.

Since the data is uninitiated various fields such as the reference
can have invalid values. On GCC_ARM built with heap stats enabled
this manifests as a crash due to an invalid reference count.

This patch fixes this problem by setting area_0_len to 0 when the data
is freed.
2016-10-16 20:47:40 -05:00
Hasnain Virk 3942b6d0e3 ONME-2822 Binary build script mod
* Binary build script is modified to follow currebt mbedOS baseline structure
* License files are moved to the correct location.
* Contribution.md is also moved to the correct location.
2016-10-14 12:38:13 +03:00
Andres AG 2ff5400158 Update to mbed TLS release candidate 2016-10-14 09:03:05 +01:00
Sam Grove 08ff689afa Merge pull request #2979 from adustm/STM_F429_F439
New platforms: NUCLEO_F439ZI, NUCLEO_F756ZG, NUCLEO_L486RG
2016-10-13 16:22:36 -05:00
Sam Grove e410157557 Merge pull request #2865 from anangl/hal_fixes
TARGET_NRF5: A few corrections in HAL implementation.
2016-10-13 11:40:10 -05:00
adustm ff4fca6747 ADD NEW TARGET : NUCLEO_F756ZG, based on existing NUCLEO_F746ZG 2016-10-13 18:29:09 +02:00
adustm a07a271fe5 ADD NEW TARGET : NUCLEO_F439ZI, based on existing NUCLEO_F429ZI 2016-10-13 18:29:09 +02:00
Sam Grove 44dcb5f21f Merge pull request #2994 from 0xc0170/fix_issue#2993
lwip-interface: fix issue #2993
2016-10-13 11:14:10 -05:00
Sam Grove e24f398780 Merge pull request #2982 from bulislaw/dns_query_fix
DNS: Revork DNS query
2016-10-13 11:12:13 -05:00
Mahadevan Mahesh b0c52c5056 Update tests to add support for FRDM KL43Z and FRDM KL82Z
Signed-off-by: Mahadevan Mahesh <Mahesh.Mahadevan@nxp.com>
2016-10-13 09:02:11 -05:00
Martin Kojtal f8b682c943 lwip-interface: fix issue #2993
DEVICE_ are passed as command line -D, thus no inclusion is required.
``platform.h`` is C++ header file, should not be pulled in C files
2016-10-13 11:42:31 +01:00
Sam Grove b4f3841cc5 Merge pull request #2861 from OpenNuvoton/nuvoton
[NuMaker] Add PFM-M453 and Migrate PFM-NUC472 Crypto
2016-10-12 17:08:43 -05:00
Jeremy Brodt d535180784 [MAX326xx] Added support for FEATURE_BLE. Integrated MaximBLE library. 2016-10-12 08:59:38 -05:00
jeromecoutant e0ddd59fdd digital_loop tests update for STM32 2016-10-12 10:07:27 +02:00
Bartek Szatkowski 3d09b196b7 DNS: Rework DNS query
Don't ask multiple DNS servers in case of successful connection, even if
the response is negative. Make sure the return value is correct.
2016-10-11 10:53:05 -05:00
ccli8 1f2f4e3bb3 [NUC472/M453] Move files to match ARM mbed's restructure
1. Move USBHALHost_M451.cpp and USBHALHost_NUC472.cpp.
2. Move TARGET_M451/mbed_lib.json.
3. Move TARGET_NUC472/crypto.
4. Move TARGET_NUC472/mbed_lib.json.
2016-10-11 10:55:08 +08:00
cyliangtw 1c1257dcb1 EMAC buffer address word alignment 2016-10-11 10:55:08 +08:00
cyliangtw 82ef4ef047 remove warnings 2016-10-11 10:55:08 +08:00
ccli8 537beb5837 NUMAKER_PFM_M453 support for USB host 2016-10-11 10:55:08 +08:00
ccli8 69f4a200c0 Add NUC472 support for USBH 2016-10-11 10:55:08 +08:00
Martin Kojtal d6389a4b8b Merge pull request #2963 from bulislaw/master
DNS: Fix return value for successful name resolutions
2016-10-10 09:41:41 +01:00
Sam Grove 478c732116 Merge pull request #2952 from andresag01/iotssl-1017-mbedtls_user_config-null_entopy_update-mbedtls
Update mbed TLS with the development HEAD
2016-10-07 11:16:19 -05:00
Bartek Szatkowski 922e9526bf DNS: Fix return value for successful name resolutions 2016-10-07 16:10:15 +01:00
Martin Kojtal 7e292fb9b7 Merge pull request #2926 from andresag01/iotssl-1017-mbedtls_user_config-null_entopy
Fix mbedtls user config and null entropy
2016-10-07 14:33:36 +01:00
Martin Kojtal 49145358ec Merge pull request #2929 from ARMmbed/update_trace
Update trace
2016-10-07 10:37:25 +01:00
Sam Grove 94e1cbccfc Merge pull request #2954 from c1728p9/ncs36510_fix
Fix ncs36510 by updating header guard
2016-10-06 16:12:09 -05:00
Sam Grove 3a16ca9855 Merge pull request #2911 from theotherjimmy/docs-generation
[Tools] Add documentation generation script
2016-10-06 15:57:08 -05:00
Russ Butler 6375b8cf2b Fix ncs36510 by updating header guard
Fix the header guard in the ncs36510 RF driver. Also update the
license in NanostackRfPhyNcs36510.h.
2016-10-06 11:52:09 -05:00
Andres AG 39c95e0e2f Sync mbed TLS with development HEAD
Update the current version of mbed TLS with the development HEAD of the
mbed TLS project repository. This mostly includes the latest CMAC
feature. Also, update the version in the importer Makefile and
VERSION.txt with the hash of the mbed TLS commit that was sync'ed.
2016-10-06 16:29:41 +01:00
Głąbek, Andrzej 691969c315 TARGET_NORDIC: restored old 'sleep()' implementation in legacy HAL, moved the new one to FEATURE_BLE, so it is picked only when SoftDevice is in use. 2016-10-06 11:51:41 +02:00
Seppo Takalo 35c4ceb2ef Update mbed-trace
* commit '7a4b3d11a35f764d887b1a8c7a31b1944d2c9c46':
  Squashed 'features/FEATURE_COMMON_PAL/mbed-trace/' changes from b17e969..31e338c
2016-10-05 16:09:58 +03:00
Andres AG 916ce43ffa Fix mbedtls user config and null entropy 2016-10-05 11:04:35 +01:00
Sam Grove 5693e7a7ca Merge pull request #2916 from c1728p9/ncs36510_rf_phy
Add ncs36510 RF phy
2016-10-05 00:52:54 -05:00
Sam Grove 683d7b7d74 Merge pull request #2874 from 0xc0170/feature_wifi_ublox
emac HAL API, WiFiInterface additions
2016-10-04 22:46:09 -05:00
Jimmy Brisson f1a78027d3 Add tags to our code 2016-10-04 15:02:44 -05:00
Christopher Haster 4f1ededb58 Renamed NSAPI_SECURITY_UNSUPPORTED -> NSAPI_SECURITY_UNKNOWN
Returning a wifi access point without information regarding the
security type is only valid if the security type is unknown (from
the perspective of the network-socket API). For clarity in situations
in which scan may return an unsupported, but known security type,
type name has been changed to NSAPI_SECURITY_UNKNOWN.
2016-10-04 14:23:36 -05:00
Russ Butler 1aec3700de Add ncs36510 RF phy
Check in the RF phy for the ncs36510. Note that the RF phy is included
in the built when nanostack is included since the phy is specific to
nanostack.
2016-10-04 14:20:14 -05:00
Bartek Szatkowski febc341672 Fix spelling error: NSAPI_SECURITY_UNSUPPORTED 2016-10-04 17:34:58 +01:00
andreas.larsson 26eb5f19f2 Fixed mbed_lwip_get_netmask amd mbed_lwip_get_gateway 2016-10-04 16:40:15 +02:00