toyowata
9fd6d06a3b
Correct SPDX identifiers
2019-07-11 11:40:51 +01:00
toyowata
df0bc1d498
Fix device_name and add SPDX identifiers
2019-07-11 11:40:51 +01:00
toyowata
8b8f4bf236
Remove ARCH_MAX files from STM32F407xG
2019-07-11 11:40:51 +01:00
toyowata
7d298aa036
Move Seeed ARCH_MAX to TARGET_STM32F407xE MCU
2019-07-11 11:40:50 +01:00
petroborys
fef0a41236
Add support I2C #3 (#ifdef I2C2) for target EFM32G11
2019-07-11 11:40:50 +01:00
Teijo Kinnunen
743b40aaa4
STM32L0: Add DEVICE_SPI_COUNT to DISCO_L072CZ_LRWAN1 + MTB_MURATA_ABZ
...
Enables simultaneous use of both SPIs without interference.
2019-07-11 11:40:50 +01:00
panyz0725@thundersoft.com
c7aa879b33
Setting wisely pin mode for TT_M3HQ
2019-07-11 11:40:50 +01:00
Qinghao Shi
3c4257577d
Examples: enable more tests for examples
2019-07-11 11:40:50 +01:00
David Saada
07d59b5703
PSA protected storage: Add encrypt & RB protect flags by default to set.
2019-07-11 11:40:50 +01:00
Teijo Kinnunen
62c2f38017
CThunk: Fix assertion when CThunk object is destroyed
...
In case the CThunk object is deleted without having called the
entry() function (and thus _entry is NULL), cthunk_free_real()
will fail with an assertion.
2019-07-11 11:40:50 +01:00
Chun-Chieh Li
b421ca6fcc
Fix wait_ns test failed
2019-07-11 11:40:50 +01:00
Vincent Veron
56be34e27c
TARGET_STM: SPI: add pulse on master transmissions
...
Add a pulse when using hardware chip select for SPI transmissions.
CS is at low level when a transmission is on-going.
Be careful, this is not compatible with all modes. It will work only
if PHA is 0, ie spi mode is 0 or 2. See stm32xx reference manual,
chapter "NSS pulse mode" for more details.
Fix #10671
Signed-off-by: Vincent Veron <vincent.veron@st.com>
2019-07-11 11:40:50 +01:00
Kevin Bracey
648cbf30db
Atomics: GCC fix for M23 (ARMv8-M baseline)
...
Add unified syntax directives to make the atomic assembler work when GCC
is building for M23.
GCC actually uses unified syntax when compiling C code, but puts
`.syntax divided` before each piece of inline assembly when targetting
Thumb-1 type devices like M0 and M23 for backwards compatibility. We can
overcome this with our own `.syntax unified`. The command-line option
`-masm-syntax-unified` intended to override this globally has been
broken from GCC 6 to 8.0.
2019-07-11 11:40:50 +01:00
Ronny Liu
60ef607c1c
bootloader support for GD32_F450ZI
2019-07-11 11:40:50 +01:00
Russ Butler
12f0f4514b
Fix typos in the FPGA CI Test Shield component
...
Fix some typos.
2019-07-11 11:39:48 +01:00
Tymoteusz Bloch
db83da69c1
Added hardcoded Echo server defaults for Greentea socket tests.
2019-07-11 11:39:48 +01:00
Martin Kojtal
c1e97ec688
unsupported USBHAL: fix coding style
2019-07-11 11:39:48 +01:00
Tomasz Moń
59c6af569d
STM USBHALHost: Fix NULL pointer dereference
...
On STM32F746G Discovery boards, the USB OTG HS port does not have a
dedicated GPIO for controlling the USB VBUS.
This change fixes HardFault (NULL pointer dereference) that triggered
when such USB host port was used.
2019-07-11 11:39:48 +01:00
ccli8
81f117af35
Exclude mbed-hal-spm test for TrustZone chips
...
This is because for TrustZone chips like M23/M33, SecureFault is implemented in
secure-side and cannot pass on to non-secure side.
2019-07-11 11:39:48 +01:00
Chris Trowbridge
f9f7f80dea
Remove component 'QSPIF' for target 'EP_AGORA'
2019-07-11 11:39:48 +01:00
Chris Trowbridge
83b20c6717
Remove unneeded custom_board.h file
2019-07-11 11:39:48 +01:00
Chris Trowbridge
b431de3d98
Update licenses for EP_AGORA target
2019-07-11 11:39:48 +01:00
Chris Trowbridge
545a595a2f
Add support files for target EP_AGORA
2019-07-11 11:39:48 +01:00
Chris Trowbridge
b8c4cb46fd
Add 'EP_AGORA' as a target
2019-07-11 11:39:48 +01:00
Maciej Bocianski
d9e2930808
hal_qspi_test: undo buggy code
...
Remove some buggy code introduced to hal_qspi_test by PR #10435
Added support for QSPI to Cypress Boards
a8570ffe6c
2019-07-11 11:39:48 +01:00
Tomasz Moń
2b76a05a10
USBHostMSD: Implement BlockDevice get_type()
...
This makes it possible to create instances of USBHostMSD class.
2019-07-11 11:39:48 +01:00
Laurent Meunier
46860d14dd
timeout_tests: do not call sleep from test thread
...
This is up to scheduler to call sleep when threads are inactive.
So the thread should simply wait for the semaphore for ever (or test timeout).
2019-07-11 11:39:48 +01:00
Ari Parkkila
c3119da987
Cellular: Fix socket connect on UBLOX_AT driver
2019-07-11 11:39:48 +01:00
Tymoteusz Bloch
6687f41177
Fixed LWIP warning issues found by Coverity scan
2019-07-11 11:39:48 +01:00
Ari Parkkila
390d7cc9f3
Cellular: Add BG96 power control
2019-07-11 11:39:48 +01:00
Pekka Pesu
97e9aed430
add BG96 povermanagemet
2019-07-11 11:39:48 +01:00
Pekka Pesu
aff9b52a22
BG96 power handling added
2019-07-11 11:39:48 +01:00
jeromecoutant
5eda48576f
STM32H7: flash issue while erasing sector in Bank 1
2019-07-11 11:39:48 +01:00
David Saada
fb663699cd
Remove excessive info and debug prints in SPIF driver.
2019-07-11 11:39:48 +01:00
Tomasz Moń
394036664c
USBHost: Wait for device to implement SET ADDRESS
...
The USB Device must change the address within 2 ms after completing
SET ADDRESS status stage.
Wait 2 ms before issuing GET DESCRIPTOR under the new address. In my
case, this completely resolves the timeout issues.
2019-07-11 11:39:48 +01:00
Teppo Järvelin
c87a7798a9
Cellular: AT_CellularContext disconnect in non-blocking mode
...
Disconnect was supporting only blocking mode.
2019-07-11 11:39:48 +01:00
Volodymyr Medvid
0560a93f59
PSOC6: move cmsis.h and device.h out from psoc6pdl directory
...
This simplifies updating of psoc6pdl directory to the latest Cypress
PSoC 6 PDL releases. cmsis.h and device.h are not part of psoc6pdl.
2019-07-11 11:39:48 +01:00
panyz0725@thundersoft.com
cc912e6260
Modifiying file PinNames.h
2019-07-11 11:39:48 +01:00
jeromecoutant
5c63c5704d
STM32: common cmsis.h and device.h
2019-07-11 11:39:48 +01:00
Arto Kinnunen
0809757f82
Add compilation flags to rf_configuration
...
Add flags to allow compilation without nanostack.
2019-07-11 11:39:48 +01:00
ale87jan
04105c788a
Update MAX3263x.sct
2019-07-11 11:39:48 +01:00
Martin Kojtal
7482462434
Merge pull request #10889 from ARMmbed/release-candidate
...
Release candidate for mbed-os-5.13.0-rc4
2019-06-25 09:57:59 +01:00
Mirela Chirica
1533d2466b
Cellular: Remove IPV6 and IPV4V6 as supported properties for BG96
...
IPV6 and IPV6V4 support is also network dependent not only modem.
Having these properties enabled for a modem requires a fallback
mechanism during PDP context activation. This mechanism is missing
at the moment and that can result in imposibility to establish
succesfull connection when network only supports IPV4 contexts.
2019-06-24 15:15:19 +01:00
Mirela Chirica
bfbf3a728b
Cellular: Fix requested socket id in socket_connect routines of BG96 and M26
2019-06-24 15:15:19 +01:00
Mirela Chirica
04d8c704ef
Cellular: Added IPV6 and IPV4V6 as supported properties for BG96
2019-06-24 15:15:19 +01:00
Anna Bridge
92a58dff99
Merge pull request #10818 from ARMmbed/release-candidate
...
Release candidate for mbed-os-5.13.0-rc3
2019-06-19 09:51:26 +01:00
Jaeden Amero
bf676c1264
psa: Avoid re-definition of MBEDTLS_PSA_CRYPTO_C
...
Mbed TLS now enables PSA APIs by default on all targets. It's not
necessary to explicitly enable MBEDTLS_PSA_CRYPTO_C, as that can be
gotten from the Mbed TLS config.h.
However, many PSA targets depend on `-DMBEDTLS_PSA_CRYPTO_C` being
defined by the Mbed OS json configuration system and are not yet
properly including the Mbed TLS configuration; for these PSA targets,
warnings may remain until this issue is fixed.
Avoiding re-definition will eliminate warnings like the following, when
building mbed-os-example-blinky:
Compile [ 14.5%]: pal_client_api_empty_intf.c
[Warning] pal_client_api_intf.h@35,0: "PSA_SUCCESS" redefined
Compile [ 14.6%]: pal_client_api_intf.c
Compile [ 14.7%]: DeviceKey.cpp
Compile [ 14.9%]: pal_internal_trusted_storage_intf.c
[Warning] pal_internal_trusted_storage_intf.c@45,9: 'psa_its_set' is deprecated: PS specific types should not be used [-Wdeprecated-declarations]
Compile [ 15.3%]: val_attestation.c
[Warning] client.h@40,0: "PSA_VERSION_NONE" redefined
<..>
Compile [ 33.3%]: asn1parse.c
[Warning] config.h@2838,0: "MBEDTLS_PSA_CRYPTO_C" redefined
Compile [ 33.5%]: aes.c
[Warning] config.h@2838,0: "MBEDTLS_PSA_CRYPTO_C" redefined
Compile [ 33.6%]: asn1write.c
[Warning] config.h@2838,0: "MBEDTLS_PSA_CRYPTO_C" redefined
Compile [ 33.7%]: psa_crypto.c
[Warning] config.h@2838,0: "MBEDTLS_PSA_CRYPTO_C" redefined
Compile [ 33.8%]: blowfish.c
[Warning] config.h@2838,0: "MBEDTLS_PSA_CRYPTO_C" redefined
Compile [ 33.9%]: camellia.c
[Warning] config.h@2838,0: "MBEDTLS_PSA_CRYPTO_C" redefined
Compile [ 34.0%]: base64.c
[Warning] config.h@2838,0: "MBEDTLS_PSA_CRYPTO_C" redefined
Compile [ 34.2%]: ccm.c
[Warning] config.h@2838,0: "MBEDTLS_PSA_CRYPTO_C" redefined
Compile [ 34.3%]: chacha20.c
[Warning] config.h@2838,0: "MBEDTLS_PSA_CRYPTO_C" redefined
Compile [ 34.4%]: chachapoly.c
[Warning] config.h@2838,0: "MBEDTLS_PSA_CRYPTO_C" redefined
Compile [ 34.5%]: cipher_wrap.c
[Warning] config.h@2838,0: "MBEDTLS_PSA_CRYPTO_C" redefined
Compile [ 34.6%]: cmac.c
[Warning] config.h@2838,0: "MBEDTLS_PSA_CRYPTO_C" redefined
Compile [ 34.7%]: cipher.c
[Warning] config.h@2838,0: "MBEDTLS_PSA_CRYPTO_C" redefined
Compile [ 34.9%]: bignum.c
[Warning] config.h@2838,0: "MBEDTLS_PSA_CRYPTO_C" redefined
Compile [ 35.0%]: des.c
[Warning] config.h@2838,0: "MBEDTLS_PSA_CRYPTO_C" redefined
Compile [ 35.1%]: dhm.c
[Warning] config.h@2838,0: "MBEDTLS_PSA_CRYPTO_C" redefined
Compile [ 35.2%]: ctr_drbg.c
<..>
Compile [ 70.9%]: EthernetInterface.cpp
[Warning] config.h@2838,0: "MBEDTLS_PSA_CRYPTO_C" redefined
Compile [ 71.0%]: InternetSocket.cpp
Compile [ 71.1%]: L3IPInterface.cpp
[Warning] config.h@2838,0: "MBEDTLS_PSA_CRYPTO_C" redefined
Compile [ 71.2%]: NetworkInterface.cpp
2019-06-12 16:21:13 +01:00
Jaeden Amero
23d66c1c25
mbedtls: PSA entropy is compatible with other entropy
...
When using Mbed Crypto's PSA Entropy Injection feature on Mbed OS, it is
not required to opt out of having entropy sources added to your entropy
contexts by default (via MBEDTLS_NO_DEFAULT_ENTROPY_SOURCES).
As integrated in Mbed OS, MBEDTLS_PSA_INJECT_ENTROPY is compatible with
actual entropy sources. PSA entropy injection is implemented using the
standard Mbed TLS NV Seed feature, and is as compatible with other
entropy sources as the standard Mbed TLS NV Seed feature which does
support entropy mixing.
2019-06-12 16:15:57 +01:00
Jaeden Amero
c0b4343f26
mbedtls: Update to Mbed TLS 2.18.0-rc3
2019-06-12 16:15:57 +01:00
Jaeden Amero
0689c589fc
mbedtls: Update to Mbed Crypto 1.1.0d2
2019-06-12 16:15:57 +01:00