Commit Graph

906 Commits (5f19b6b03a71f2f9b6585fb03a573de608a5532d)

Author SHA1 Message Date
Michal Paszta 5a9183c549 storage: fix potential memory corruption and check return values 2019-08-21 09:26:35 +03:00
Martin Kojtal a5a2036c65
Merge pull request #11224 from AnttiKauppila/Coverity_fixes
Coverity issues fixed
2019-08-20 09:40:20 +02:00
Martin Kojtal 101ae73b87
Merge pull request #11063 from linlingao/f_cc3220sf_launchxl
Add CC3220SF_Launchxl to Mbed OS
2019-08-19 12:08:11 +02:00
Antti Kauppila 84063bf222 Coverity issues fixed 2019-08-14 16:22:05 +03:00
Pavel Slama 4974c86b54 astyle fix bracket 2019-08-13 21:48:18 +02:00
Pavel Slama 7b0a8f23a2 atyle format 2019-08-13 21:42:10 +02:00
Hugues Kamba 27e4ca18cf Fix inclusion of test related directories by build tool 2019-08-09 10:20:48 +01:00
Seppo Takalo 7d7416558a
Merge pull request #11073 from ARMmbed/feature-public-headers
Feature public headers
2019-08-07 16:04:45 +03:00
Michal Paszta 73b122b2c4 Coverity and compilation warnings fixes 2019-08-07 10:30:52 +03:00
Pavel Slama 7ff5a45a24 replace wait with rtos sleep 2019-08-06 15:57:16 +02:00
Michal Paszta 1fe59b70e3 Bring back SPIF module-specific debug logs
The logs are switched off by default and can be enabled with a
module-specific compile switch in mbed_app.json.

Logs brought back from PR #10501
2019-08-06 10:53:36 +03:00
Hugues Kamba bfa1b4dd84 Drivers/Events/RTOS Public and internal APIs cleanup (#10955)
Separate drivers, events, and rtos internal APIs from public APIs.

* Move source files to source subdirs
* Move internal headers to internal subdirs
* Add Doxygen comments for documenting internal and public APIs
* Remove source code from header files in order to remove include pre-processor directives
that included header files not directly used by said header files
* Explicitly include header files instead of implicit inclusions via third-party header files.

Release Notes

This will break user code that was using an internal API as the internal header files have been moved.
This will only break if the user was including the header file using a namespace (i.e #include "foo/bar.h" instead of #include "bar.h"
2019-08-02 12:23:47 +01:00
Seppo Takalo 818c1d6f0f
Merge pull request #11130 from Tharazi97/NotSupportedTest
Updated testcases
2019-08-02 13:27:54 +03:00
int_szyk ae6f8be146 Newline at the end of files 2019-08-01 08:44:58 +02:00
int_szyk 8b68a1ea58 Updated testcases 2019-07-31 10:46:38 +02:00
Filip Jagodzinski 5ee22d0c24 Test: FPGA shield: Fix GPIO-IRQ test_utils.h
Include the gpio_irq_api header to fix build failures.
2019-07-25 11:04:16 +02:00
Filip Jagodzinski 5e17eddf12 Test: FPGA shield: Update the GPIO-IRQ API tests
Use the gpio_irq_pinmap() for GPIO-IRQ testing.
2019-07-25 11:04:10 +02:00
Seppo Takalo c5c745804d
Merge pull request #11038 from fkjagodzinski/fpga_test-gpio
Extend the GPIO HAL API tests
2019-07-24 15:12:32 +03:00
Seppo Takalo 3a96f436ea
Merge pull request #10847 from davidsaada/david_ps_add_sec_flags
PSA storage: Conform to "PSA 1.0.0" spec release
2019-07-23 12:05:22 +03:00
Lin Gao e74fbcd79e Add CC3220SF_Launchxl to Mbed OS 2019-07-17 13:19:32 -05:00
Seppo Takalo 987533859a
Merge pull request #10104 from kjbracey-arm/sleep_api
Sleep rework, RTOS API for bare metal, wait deprecations
2019-07-17 14:37:53 +03:00
Seppo Takalo 5b6034d0a9
Merge pull request #11028 from c1728p9/fpga_warnings
Fix FPGA CI Test Shield warnings
2019-07-17 14:32:43 +03:00
Seppo Takalo 0425ffda9b
Merge pull request #11026 from c1728p9/skip_peripherals
Add a restricted peripheral list
2019-07-17 14:32:08 +03:00
Kevin Bracey a522dcfa0a Replace deprecated wait calls 2019-07-15 10:13:50 +03:00
Kevin Bracey fc8e8f67c6 Deprecate wait/wait_ms APIs 2019-07-15 10:13:50 +03:00
David Saada fb3559d841 PSA storage: Conform to "PSA 1.0.0" spec release
- Add the no confidentiality & no replay protection flags
- Add actual size parameter in PS/ITS get APIs
- Change a few size parameters from uint32_t to size_t
2019-07-14 18:50:47 +03:00
Filip Jagodzinski 74be850126 Test: FPGA shield: Extend the GPIO HAL API tests 2019-07-12 14:01:57 +02:00
Russ Butler 87c6a74a21 Fix FPGA CI Test Shield warnings
Fix warnings due to unused variables, comparison between signed and
unsigned. This patch also re-enables I2C asserts that were disabled
during early development.
2019-07-11 16:16:34 +01:00
Russ Butler 57d75538da Add a restricted peripheral list
Allow peripherals to be excluded from testing.
2019-07-11 16:08:33 +01:00
Filip Jagodzinski ed41994a3a Test: HAL: serial: Add DEVICE_SERIAL_FC guards
Fix undefined references to serial_set_flow_control.
2019-07-09 13:21:42 +02:00
Arto Kinnunen 492d10cb3e
Merge pull request #10967 from mtomczykmobica/IOTCORE-1251
ESP8266: fix driver's support AT firmware version
2019-07-08 11:49:05 +03:00
Marcin Tomczyk 9ae4463ccc Need to change ESP8266 driver's support AT firmware version. Only AT version 1.6 0r above support AT+CWCOUNTRY command. Command AT+CWLAP format is different for version 1.6 and above 2019-07-05 10:07:29 +02:00
Martin Kojtal b55344c50b
Merge pull request #10944 from maciejbocianski/i2c_fpga_test_update
Update I2CTester for fpga-ci-test-shield
2019-07-04 08:46:27 +01:00
Maciej Bocianski a6353b0c92 I2CTester: fix dosc 2019-07-03 10:26:41 +02:00
Maciej Bocianski b65d93e5ef I2CTester: add address mismatch statistics 2019-07-03 10:05:53 +02:00
Maciej Bocianski fb589319bf I2CTester: upgrade checksum calculation 2019-07-02 20:00:31 +02:00
Martin Kojtal 149d53cc89
Merge pull request #10619 from jamesbeyond/fm-iap
Fastmodel: enable flashIAP and kvstore
2019-07-02 14:23:00 +01:00
Martin Kojtal 23037b9d6b
Merge pull request #10921 from jeromecoutant/PR_STMOD
STMOD_CELLULAR: readme file additional information
2019-07-02 12:40:32 +01:00
Martin Kojtal 1aad06b394
Merge pull request #10829 from devran01/feature_trusted-firmware-m_e7efdc6
PSA: TFM import
2019-07-01 14:35:54 +01:00
jeromecoutant dc72c9b1a4 STMOD_CELLULAR: Read me update to describe test procedure 2019-06-28 17:09:46 +02:00
jeromecoutant a7fced3b68 STMOD_CELLULAR: print cleanup 2019-06-28 17:09:43 +02:00
Martin Kojtal 85c477c1dc
Merge pull request #10609 from kjbracey-arm/us_ticker_optimise
wait_us optimization
2019-06-28 14:29:00 +01:00
Kevin Bracey c5b9779858 Remote "static" from MBED_FORCEINLINE
Static keyword causes problems when trying to use force-inlined
functions from normal inlined functions. This is not legal:

    static inline void forced() { }

    inline void normal() { forced(); }

You cannot reference internal-linkage things from external-linkage
inline functions.

Removal of the static implies that in C there would need to be a
non-inline definition in case anyone calls it non-inlined, but if the
force attribute is doing its job, that should not happen.

Only significant in-tree user of the MBED_FORCEINLINE macro is
the atomic operations - making this change permits atomic operations
from non-static inline functions.
2019-06-27 16:12:30 +03:00
Devaraj Ranganna 6e899b3cc9 TF-M patch/workaround related to (TF-M issue #T240)
- Link to bug tracking: https://developer.trustedfirmware.org/T240

The issue is fixed by TF-M team. However they autogenerate region details
(code, ro, rw, zi and stack ) using linker scripts and in mbed-os we
also autogenerate region details but using mix of service definition in
json file and other template files.

Signed-off-by: Devaraj Ranganna <devaraj.ranganna@arm.com>
2019-06-26 14:58:19 +01:00
Devaraj Ranganna 9a5110561a TF-M patch: Remove secure_fw/core/tfm_func_api.c which is required only
when TFM_PSA_API is not set

Signed-off-by: Devaraj Ranganna <devaraj.ranganna@arm.com>
2019-06-26 14:23:26 +01:00
Devaraj Ranganna cb748c5608 TF-M patch: Change #if TFM_PSA_API to #ifdef TFM_PSA_API to avoid
compiler errors as mbed-cli only generates "-D" macros only for
"macros" defined in targets.json

TF-M task link: https://developer.trustedfirmware.org/T396

Signed-off-by: Devaraj Ranganna <devaraj.ranganna@arm.com>
2019-06-26 14:23:26 +01:00
Devaraj Ranganna cb8f2c07a1 1. Include MBEDTLS_CONFIG_FILE before evaluating MBEDTLS_PSA_CRYPTO_C
2. Remove macro MBEDTLS_PSA_CRYPTO_C from PSA targets

Signed-off-by: Devaraj Ranganna <devaraj.ranganna@arm.com>
2019-06-24 14:33:04 +01:00
Martin Kojtal f2a7408334
Merge pull request #10866 from LMESTM/component_cellular_stmod
Adding stmod_cellular component
2019-06-24 12:16:29 +01:00
Laurent Meunier 1e06ad0155 Astyle fixes 2019-06-20 10:12:31 +02:00
Anna Bridge 61881e81fd
Merge pull request #10756 from martinichka/feature-correct-trace-level-storage-spif
Cleaned up trace log SPIF Block Device
2019-06-19 12:29:39 +01:00
Laurent Meunier fe2b2a7172 Adding stmod_cellular component
stmod_cellular component library adds up support for cellular modem that
are connected to the STMOD+ connector.

Currently supported modems are BG96 and UG96.
2019-06-19 11:05:37 +02:00
Martin Kojtal 180356130f
Merge pull request #10779 from martinichka/feature-spif-bigger-16m
Add support for SPIF of size bigger than 16Mbyte
2019-06-14 07:38:34 +01:00
Christopher Haster b0d36ebfc1 Remove mbed.h includes from I2CEEBlockDevice 2019-06-13 11:33:14 -05:00
Martin Kojtal 4625221f1e
Merge pull request #10746 from davidsaada/david_fix_ps_flags
PSA protected storage: Add encrypt & RB protect flags by default to set.
2019-06-09 18:17:19 +01:00
Martin Kojtal 48d23722fe
Merge pull request #10672 from c1728p9/fix_typos
Fix typos in the FPGA CI Test Shield component
2019-06-09 18:05:52 +01:00
Marten Lootsma 8a328ddc86 Changed to one more info to debug 2019-06-08 08:17:56 +02:00
Marten Lootsma e0ad71554b Fixed astyle error and removed duplicated comment 2019-06-08 07:32:10 +02:00
Qinghao Shi 7a1aafaf40 FastModel: change FVP_MPS2_M3 to FVP_MPS2 enable the MPS2 Family 2019-06-06 18:54:58 +01:00
Qinghao Shi 2e4329192e FastModel: enable FLASHIAP componment 2019-06-06 18:52:30 +01:00
Michael Schwarcz 910a402ce6 TF-M patch: Fix tfm_psa_call_venner wrong argument type (TF-M issue #241)
- Link to bug tracking: https://developer.trustedfirmware.org/T241

(cherry picked from commit da01e3411f)
(cherry picked from commit 280715f9b7)
2019-06-06 16:08:34 +01:00
Michael Schwarcz 35938a4071 TF-M patch: Fix service handles not cleared issue (TF-M issue #230)
- Link to bug tracking: https://developer.trustedfirmware.org/T230

(cherry picked from commit 0c23e86989)
(cherry picked from commit 9c1e080e39)
2019-06-06 16:08:33 +01:00
Michael Schwarcz 795e6418d0 TF-M patch: Fix tfm_ns_lock_init issue (TF-M issue #239)
- Link to bug tracking: https://developer.trustedfirmware.org/T239

(cherry picked from commit 5f2e4b3911)
(cherry picked from commit 5d41a2aeae)
2019-06-06 16:08:33 +01:00
Marten Lootsma aed0d054d7 Added support for SPIF of size bigger than 16Mbyte
- checks if size is bigger than 16Mbyte
- changes to 4 byte address mode of neccessary
2019-06-06 16:01:40 +02:00
Michael Schwarcz 11bff3f3cb TF-M patch: General modifications
- Remove un-needed files
- Disable printf and uart
- Modify include paths
- Guard macros from mbed_lib with ifndef

(cherry picked from commit 1f30b52488)
(cherry picked from commit 71cd34df32)
(cherry picked from commit 185d2865da)
(cherry picked from commit fb068d2cb4)
2019-06-06 14:49:41 +01:00
Devaraj Ranganna b0fe59df00 [trusted-firmware-m]: Updated to e7efdc6 2019-06-06 14:47:00 +01:00
Marten Lootsma ed36cc4e06 Add trace logging with size of block device 2019-06-04 16:03:56 +02:00
Marten Lootsma 5484f585a6 Cleaned up SPIF trace log.
- Test most SPIF log to DEBUG level.
- Removed DEBUG/ERROR/INFO tags.
- Removed not needed line endings.
2019-06-04 16:03:56 +02:00
David Saada dcd2c292af PSA protected storage: Add encrypt & RB protect flags by default to set. 2019-06-03 16:32:55 +03:00
Martin Kojtal 62698b903c
Merge pull request #10660 from mprse/fpga_ts_add_sckl_stats
Add SCLK and SIN stats to SPIMasterTester
2019-06-03 08:49:39 +01:00
Martin Kojtal 4f6035e6b1
Merge pull request #10501 from davidsaada/david_spif_driver_unlog
Remove excessive info and debug prints in SPIF driver
2019-06-03 08:33:19 +01:00
Martin Kojtal 34b4564371
Merge pull request #10680 from artokin/allow_compilation_withoout_nanostack
Add compilation flags to rf_configuration
2019-05-31 12:34:37 +01:00
Christopher Haster 51dd44337b Add 'components/storage/blockdevice/COMPONENT_I2CEE/' from commit 'd92806c11e0e05280c08db0b3ed6459b2d8dea2c'
git-subtree-dir: components/storage/blockdevice/COMPONENT_I2CEE
git-subtree-mainline: 9cc1caa031
git-subtree-split: d92806c11e
2019-05-29 19:34:16 -05:00
Martin Kojtal cc491812a8
Merge pull request #10427 from kjbracey-arm/new_standards
Set compilers to C++14 and C11
2019-05-28 20:34:00 +01:00
Martin Kojtal 8fc2a3c92a
Merge pull request #10675 from 0xc0170/update-mbedtls-2.18.0-rc1
Update mbedtls 2.18.0 rc1
2019-05-28 20:24:18 +01:00
Arto Kinnunen 5e23fbaa83 Add compilation flags to rf_configuration
Add flags to allow compilation without nanostack.
2019-05-27 17:06:59 +03:00
Martin Kojtal 303d0f0c0c SPE: fix inject entropy macro
Use new TLS macro
2019-05-27 11:50:09 +01:00
Przemyslaw Stekiel 87902a8e76 Add SCLK and SIN stats to SPIMasterTester.
It has been found that there is a problem with the new K66F SPI driver when clock polarity is high.
After setting clock polarity to high SCLK line is still low. When transmission starts and CS is asserted (in case of manual CS handling) SCLK signal is invalid (low). After first transfer SCLK idle state becomes high.
SPI implementation on FPGA test shield is resistant on this bug and transmission is successful. The problem has been found on two boards communication test where transmission fails.

The idea is to add support to the FPGA test shield to catch such errors and verify this in the test.
2019-05-27 09:48:33 +02:00
Russ Butler 424c4d9feb Fix typos in the FPGA CI Test Shield component
Fix some typos.
2019-05-26 13:29:14 -05:00
Kevin Bracey 7ec1663dd7 FPGA_CI_TEST_SHIELD: C++11 fix 2019-05-24 16:26:15 +03:00
Martin Kojtal a4738fa9a8
Merge pull request #10540 from c1728p9/fpga_ci_test_shield
Check in files for the FPGA CI Test Shield
2019-05-24 12:56:35 +01:00
Russ Butler e2312c4ff4 Bring in more changes from FPGA repo
Bring in updates the the FPGA CI Test Shield repo.
2019-05-23 19:17:32 -05:00
Martin Kojtal b2abfc3529
Merge pull request #10624 from artokin/prepare_for_mbedos513
Nanostack release for Mbed OS 5.13
2019-05-23 11:16:56 +01:00
Martin Kojtal 0560ecc558
Merge pull request #10478 from chrissnow/Dataflash-Erase_Size
DataFlash: Change erase size to pages to reduce memory usage.
2019-05-21 14:46:32 +01:00
Arto Kinnunen f03e51a23d Sync 802.15.4 RF drivers from master repos
-Sync STM S2LP with v0.0.6 in master repo
-Sync Atmel with v3.0.8 in master repo
-Sync MCR20A with v1.0.6 in master repo
2019-05-20 15:27:25 +03:00
Anna Bridge 9fb4429379
Merge pull request #10520 from kjbracey-arm/build_tz_heuristic
Permit non-TrustZone ARMv8 build
2019-05-17 11:06:55 +01:00
Chris Snow 157debffa6 Change erase size to pages to reduce memory usage 2019-05-15 16:23:16 -06:00
Martin Kojtal 3ea1c56124
Merge pull request #10147 from kjbracey-arm/atomic_bitwise
Assembler atomics
2019-05-13 14:18:05 +01:00
Anna Bridge 97e1c9cbaf
Merge pull request #10287 from linlingao/pr10177
Enable MTS_DRAGONFLY_F411RE to register with Pelion
2019-05-10 16:21:46 +01:00
Russ Butler 166ff13fe8 Add missing documentation
Add documentation to the MbedTester class and the test_utils.h file.
2019-05-08 13:15:42 -05:00
Russ Butler 45301ea718 Run astyle on all FPGA files
Run astyle to correct formatting.
2019-05-08 11:01:17 -05:00
Russ Butler 11bd96601b Remove inclusion of mbed.h from FPGA
And fix any build errors this caused.
2019-05-07 17:01:44 -05:00
Russ Butler b3332129b2 Check in files for the FPGA CI Test Shield
Bring all the FPGA CI Test Shield C and C++ driver files into mbed-os
as the component FPGA_CI_TEST_SHIELD. When this component is enabled
all the files that are needed to communicate with, update firmware on
and run testing with the FPGA are built.
2019-05-07 15:10:47 -05:00
Kevin Bracey 65e0887ef3 Permit non-TrustZone ARMv8 build
Change the heuristic for selection of CMSE in the tools python, so that
a non-TrustZone ARMv8 build can happen.

Ideally we would have more direct flagging in the targets, but this
refines the heuristic so the necessary behaviour can be easily
achieved.

* DOMAIN_NS=1 is based purely on the `-NS` suffix on the core name.

* Enabling CMSE in the compiler and outputting a secure import library
  is now enabled when the core doesn't have an `-NS` suffix by either
  the target label `TFM` being present or the flag `trustzone` being set.

This covers the existing ARMv8-M behaviour - TF-M builds have the TFM
label, as per its documentation; M2351 secure builds have no explicit
flagging, so we ensure that the M2351_NS target has the trustzone flag
set, and the out-of-tree secure target inherits that.
2019-05-03 13:36:38 +03:00
Lin Gao 438a52f15a Fix handoff issue from the bootloader to the application on MTS_DRAGONFLY_F411RE 2019-05-02 11:25:19 -05:00
Ben Cooke 3d68a53b81 Correct the default pins for the spi flash for the mts dragonfly - on behalf of Ben C. 2019-05-02 11:25:19 -05:00
Martin Kojtal 40f8cb95a8
Merge pull request #10435 from morser499/pr/cy-smif
Add support for QSPI to Cypress Boards
2019-05-02 13:41:56 +01:00
Ryan Morse a8570ffe6c Added support for QSPI to Cypress Boards 2019-05-01 07:09:58 -07:00
Alexander Zilberkant 117e3e82b6 Update PSA includes to autogenerated files 2019-04-30 14:41:09 +03:00
Alexander Zilberkant 8c5ba9154d Update PSA code generator
Unify TF-M and Mbed-SPM code generators:
 - Unify SPM initialization logic:
   - All partitions are registered at once
   - Test partitions are guarded by #ifndef
   - Introduce single template list
 - Beatify template files and add "Autogen-do not modify" notice
Prepare for integration with mbed-os build system:
 - Generate all the files in a single place
Simplify tools/psa/release.py script
2019-04-30 14:10:23 +03:00
Alexander Zilberkant ab01bea46d Delete autogenerated files 2019-04-30 14:10:23 +03:00
Oren Cohen 5342015bb1 TF-M patch: Add necessary include in tfm_ns_lock.h 2019-04-28 15:45:06 +03:00
Michael Schwarcz ea81bf91c9 TF-M patch: Fix wrong check in tfm_spm_check_client_version (TF-M issue #236)
- Link to bug tracking: https://developer.trustedfirmware.org/T236

(cherry picked from commit 008bf1b2d1)
2019-04-28 15:45:06 +03:00
Michael Schwarcz 280715f9b7 TF-M patch: Fix tfm_psa_call_venner wrong argument type (TF-M issue #241)
- Link to bug tracking: https://developer.trustedfirmware.org/T241

(cherry picked from commit da01e3411f)
2019-04-28 15:45:05 +03:00
Michael Schwarcz 78ed870287 TF-M patch: Fix fixed-size partitions stack size (TF-M issue #240)
- Link to bug tracking: https://developer.trustedfirmware.org/T240

(cherry picked from commit fc78640559)
2019-04-28 15:45:05 +03:00
Michael Schwarcz 9c1e080e39 TF-M patch: Fix service handles not cleared issue (TF-M issue #230)
- Link to bug tracking: https://developer.trustedfirmware.org/T230

(cherry picked from commit 0c23e86989)
2019-04-28 15:45:05 +03:00
Michael Schwarcz 5d41a2aeae TF-M patch: Fix tfm_ns_lock_init issue (TF-M issue #239)
- Link to bug tracking: https://developer.trustedfirmware.org/T239

(cherry picked from commit 5f2e4b3911)
2019-04-28 15:45:04 +03:00
Michael Schwarcz fb068d2cb4 TF-M patch: General modifications
- Remove un-needed files
- Disable printf and uart
- Modify include paths
- Guard macros from mbed_lib with ifndef

(cherry picked from commit 1f30b52488)
(cherry picked from commit 71cd34df32)
(cherry picked from commit 185d2865da)
2019-04-28 15:45:04 +03:00
Oren Cohen ae6bdc311c [trusted-firmware-m]: Updated to f2dea5b 2019-04-28 13:14:35 +03:00
David Saada f73544ed7e Remove excessive info and debug prints in SPIF driver. 2019-04-28 12:27:47 +03:00
Kevin Bracey 87396e0bf6 Assembler atomics
Reimplement atomic code in inline assembly. This can improve
optimisation, and avoids potential architectural problems with using
LDREX/STREX intrinsics.

API further extended:
* Bitwise operations (fetch_and/fetch_or/fetch_xor)
* fetch_add and fetch_sub (like incr/decr, but returning old value -
  aligning with C++11)
* compare_exchange_weak
* Explicit memory order specification
* Basic freestanding template overloads for C++

This gives our existing C implementation essentially all the functionality
needed by C++11.

An actual Atomic<T> template based upon these C functions could follow.
2019-04-26 13:12:35 +03:00
Martin Kojtal 7392d51460
Merge pull request #10394 from kjbracey-arm/networking_warnings
Networking: Fix some ARMC6 warnings
2019-04-18 13:15:45 +01:00
Martin Kojtal 69b9f3fab6
Merge pull request #10377 from michalpasztamobica/esp8266_connect_failures
Fix ESP8266 driver behavior on connection failures
2019-04-18 08:31:40 +01:00
Kevin Bracey 69c6cc341b Networking: Fix some ARMC6 warnings
Some int-versus-long and signed-versus-unsigned format string
mismatches, and missing `class` keyword.
2019-04-17 16:03:44 +03:00
Oren Cohen f51eb6215a Fix warnings on PSA secure builds 2019-04-17 10:37:51 +03:00
Michal Paszta 3e70df7f0a ESP8266: Timeout if chip keeps returning errors
The ESP chip returns timeout, but keeps trying to connect, so we want to
keep track of time ourselves, instead of relying on the chip's timeout.
This fixes failing WIFI-CONNECT-SECURE-FAIL test.
2019-04-16 14:23:36 +03:00
Michal Paszta 8eda11a5a3 Perform disconnection regardless of the IP address 2019-04-12 11:50:55 +03:00
Martin Kojtal c6b917327b
Merge pull request #10232 from itayzafrir/crypto-service-multipart-operation-abort-fix
PSA Crypto Service - multipart operation memory fixes
2019-04-11 11:51:18 +01:00
Michael Schwarcz 5a9dff2e04 TF-M patch: Fix tfm_memory_check issue (TF-M issue #224)
- Add Secure/non-secure code and secure heap to memory check
- Link to bug tracking: https://developer.trustedfirmware.org/T224
2019-04-10 14:20:56 +03:00
Michael Schwarcz 3badc126cf TF-M patch: Fix wrong check in tfm_spm_check_client_version (TF-M issue #236)
- Link to bug tracking: https://developer.trustedfirmware.org/T236

(cherry picked from commit 008bf1b2d1)
2019-04-10 14:20:56 +03:00
Michael Schwarcz ad8ddd8e6e TF-M patch: Fix tfm_psa_call_venner wrong argument type (TF-M issue #241)
- Link to bug tracking: https://developer.trustedfirmware.org/T241

(cherry picked from commit da01e3411f)
2019-04-10 14:20:56 +03:00
Michael Schwarcz f0e4583b72 TF-M patch: Fix fixed-size partitions stack size (TF-M issue #240)
- Link to bug tracking: https://developer.trustedfirmware.org/T240

(cherry picked from commit fc78640559)
2019-04-10 14:20:56 +03:00
Michael Schwarcz 3fbc73e046 TF-M patch: Fix service handles not cleared issue (TF-M issue #230)
- Link to bug tracking: https://developer.trustedfirmware.org/T230

(cherry picked from commit 0c23e86989)
2019-04-10 14:20:56 +03:00
Michael Schwarcz e89c1a68ce TF-M patch: Fix tfm_ns_lock_init issue (TF-M issue #239)
- Link to bug tracking: https://developer.trustedfirmware.org/T239

(cherry picked from commit 5f2e4b3911)
2019-04-10 14:20:56 +03:00
Michael Schwarcz 185d2865da TF-M patch: General modifications
- Remove un-needed files
- Disable printf and uart
- Modify include paths
- Guard macros from mbed_lib with ifndef

(cherry picked from commit 1f30b52488)
(cherry picked from commit 71cd34df32)
2019-04-10 14:20:56 +03:00
Oren Cohen 4e6ed2bb46 [trusted-firmware-m]: Updated to 0101fd37 2019-04-10 14:20:56 +03:00
Martin Kojtal 6081727cbf
Merge pull request #10115 from enebular/raven
Uhuru RAVEN: Adding platform HAL
2019-04-04 11:05:23 +02:00
Cruz Monrreal 4dd55d2db6
Merge pull request #10281 from ashok-rao/S2_LP
Adding support for S2_LP (WiSUN) as a new MTB target
2019-04-01 17:03:37 -05:00
Ashok Rao 479bcfdbfe Incorporating review comments
Removing USBDEVICE since USB pins are NOT brought out on the MTB/MCB.
2019-04-01 11:16:16 +01:00
Martin Kojtal 040388370f
Merge pull request #10171 from offirko/offir_qspi_bus_mask_fix
Fix QSPIF Bus mode mask and quad enable write SR size
2019-04-01 11:17:23 +02:00
Cruz Monrreal 594a1d180b
Merge pull request #10218 from kfnta/tfm_auto_src_gen
PSA - TFM manfiest scan
2019-03-29 17:59:44 -05:00
Offir Kochalsky 15fdb6ea7e
Update QSPIFBlockDevice.cpp 2019-03-29 17:37:00 +03:00
itayzafrir 2b81588664 Add message context cleanup helper function 2019-03-28 12:53:11 +02:00
Michal Paszta 5dbaa40eb0 Add the INTERRUPTIN compilation guard for ESP8266 2019-03-28 11:16:30 +02:00
Oren Cohen 268b48c2e5 Run autogen 2019-03-28 10:40:56 +02:00
offirko e8e0fb4fdf If QER is undefined: do nothing but log warning and continue 2019-03-28 10:18:16 +02:00
itayzafrir a446ee63c7 Rename internal function destroy_hash_clone to clear_hash_clone 2019-03-27 16:13:46 +02:00
itayzafrir b26890e62d Do not allocate zero sized buffers - generators 2019-03-27 15:43:19 +02:00
itayzafrir 749b1e30bb Do not allocate zero sized buffers - rng 2019-03-27 15:43:18 +02:00
itayzafrir abd9c661ce Do not allocate zero sized buffers - entropy 2019-03-27 15:43:18 +02:00
itayzafrir 19b83812d4 Do not allocate zero sized buffers - keys 2019-03-27 15:43:17 +02:00
itayzafrir f3294ef338 Do not allocate zero sized buffers - cipher 2019-03-27 15:43:16 +02:00
itayzafrir 19952d990c Do not allocate zero sized buffers - aead 2019-03-27 15:43:15 +02:00
itayzafrir 18feb26ca7 Do not allocate zero sized buffers - asymmetric 2019-03-27 15:43:14 +02:00
itayzafrir 979ca1ee55 Do not allocate zero sized buffers - hash 2019-03-27 15:43:12 +02:00
itayzafrir 7b35e763dd Do not allocate zero sized buffers - mac 2019-03-27 14:29:19 +02:00
jk 23cb826314 Add definition of RAVEN 2019-03-27 17:02:55 +09:00
Cruz Monrreal ecfe0c83ae
Merge pull request #9955 from VeijoPesonen/esp8266_wifi_scan_timeout
ESP8266: treats Wi-Fi scan results as out-of-band data; new API to adjusting Wi-Fi scan settings
2019-03-27 00:25:43 -05:00
Cruz Monrreal 1c23c5b85b
Merge pull request #9927 from VeijoPesonen/esp8266_country_code_policy
ESP8266: Country code API
2019-03-27 00:25:29 -05:00
Cruz Monrreal d81f3653c2
Merge pull request #10185 from artokin/mcr20a_interruptin_flag_fix
Nanostack 802.15.4 RF drivers update
2019-03-27 00:23:20 -05:00
itayzafrir 8044f6d038 Fix crypto service abort functionality - generators 2019-03-26 15:32:49 +02:00
itayzafrir 545e669c88 Fix crypto service abort functionality - mac 2019-03-26 15:32:49 +02:00
itayzafrir da999c6946 Fix crypto service abort functionality - hash 2019-03-26 15:32:49 +02:00
itayzafrir 1b26e0d5f2 Fix crypto service abort functionality - cipher
Also refactor cipher setup function to one common function.
2019-03-26 15:32:49 +02:00
Nir Sonnenschein ca62922c9f
Merge pull request #10036 from itayzafrir/crypto-ipc-refactor
Refactor Crypto Service Proxy
2019-03-26 15:20:49 +02:00
Arto Kinnunen 0710298a3c Nanostack 802.15.4 RF drivers update
Sync Nanostack RF drivers from master copy:
-MCR20A: v1.0.6
-S2LP: v0.0.5
2019-03-22 08:28:13 +02:00
Martin Kojtal e7a4658256
Merge pull request #10180 from AriParkkila/fix-wise-1570
Fix SPIF speed for MTB_ADV_WISE_1570 and max packet size for BC95
2019-03-22 06:32:39 +01:00
Martin Kojtal 4a2985a5c3
Merge pull request #10144 from kjbracey-arm/atmel_wait_ns
Atmel RF: use system wait_ns
2019-03-21 10:43:57 +01:00
Ari Parkkila a6c44f87b0 SPIF: Fix SPI_FREQ for MTB_ADV_WISE_1570 2019-03-21 01:11:40 -07:00
Martin Kojtal 6da5f9bf66
Merge pull request #10142 from artokin/nanostack_rf_drivers_interrruptin_flag
Nanostack 802.15.4 RF drivers update
2019-03-20 15:34:42 +01:00
offirko 1a4c11e3b5 Fixed Bus Mode bit mask to select best mode.
When setting Quad Enable, either SR1, SR2 or CR setup is required.
Either way register size is up to 2 bytes.
2019-03-20 15:24:46 +02:00
offirko ce5194f2f8 Fix Bus mode mask and status register write size in
some modes in quad enable
2019-03-20 14:27:49 +02:00
Kevin Bracey 9ad6b10b43 Atmel RF: use system wait_ns
This driver's delay_ns was used as the basis of the system wait_ns -
migrate to that refined implementation.
2019-03-18 17:22:17 +02:00
Amir Cohen 4d6240d26e Add flashiap block device comment 2019-03-18 14:34:00 +02:00
Arto Kinnunen 0c34a13538 Nanostack 802.15.4 RF drivers update
Sync Nanostack RF drivers from master copies:
-Atmel: v3.0.7
-MCR20A: v1.0.3
-S2LP: v0.0.4
2019-03-18 14:21:02 +02:00
itayzafrir 95b0a18ac5 Remove uneeded TODO comment from the code 2019-03-18 10:28:21 +02:00
Amir Cohen 7fac0722a4 Fix functionality for FlashIAPBD & SlicingBD
Due to discovery of inconsistent sector sizes in devices storage the is_valid_erase function was adjusted,
For FlashIAPBD the 'code size' was included to the calculation, preventing faulty "virtual" addresses calculation.
For SlicingBD the same error was fixed and in all 3 validation functions that sent addresses for validation and program/read/erase
different addresses.
2019-03-14 17:46:10 +02:00
Veijo Pesonen e2bd0644df ESP8266: new API for setting Wi-Fi scan active/passive mode
Makes possible to decide between active and passive mode.

Makes possible to adjust for how long a single channel is scanned.
2019-03-14 12:01:42 +02:00
Veijo Pesonen b5f3fcf49b ESP8266: Wi-Fi scan results as OOB 2019-03-14 12:00:17 +02:00
Martin Kojtal 17f8bc1088
Merge pull request #9893 from VeijoPesonen/wifi_astyle_unignore
ESP8266: astyle fixes
2019-03-14 09:38:49 +01:00
itayzafrir c97b90ade1 Unify code style
- Use designated initializers for IPC structs
- Unify variables declaration and initialization
2019-03-12 14:31:30 +02:00
itayzafrir 9bc8bcf0d2 Unify sections titles/comments & fix typo in comment 2019-03-12 11:35:35 +02:00
itayzafrir 5c48d58389 Set handle to PSA_NULL_HANDLE when closing IPC connection 2019-03-12 11:35:34 +02:00
itayzafrir bf05154461 Use PSA_NULL_HANDLE when testing for invalid handles 2019-03-12 10:53:13 +02:00
itayzafrir caafc34695 Use psa prefix for crypto.h include 2019-03-12 10:51:31 +02:00
Martin Kojtal 83d70199d1
Merge pull request #10027 from kfnta/tfm_fix_ftype
TF-M patch: Handle extended stack frame in tfm_svcall_psa_call
2019-03-11 15:48:49 +01:00
itayzafrir 7a15865e8b Refactor crypto service proxy 2019-03-11 16:21:34 +02:00
Michael Schwarcz 134a169e35 TF-M patch: Handle extended stack frame in tfm_svcall_psa_call
- Fix failing attestation test on LPC55S69
- Link to bug tracking: https://developer.trustedfirmware.org/T276
2019-03-11 11:10:14 +02:00
Alexander Zilberkant 661613c998 Rename psa_system_reset to mbed_psa_system_reset
add noreturn attributes
update lifecycle service to use psa/error.h
fix doxygen
2019-03-11 10:43:19 +02:00
Martin Kojtal 5c79394756
Merge pull request #10023 from itayzafrir/crypto-compliance-tests-fix
Fix crypto compliance tests
2019-03-11 09:20:36 +01:00
itayzafrir ea36a89ec7 Fix crypto compliance tests
Prevent passing null buffer with size which is non-zero.
2019-03-10 15:47:07 +02:00
Oren Cohen d0021b5de7 Fix error codes for psa_attestation_inject_key 2019-03-10 10:53:38 +02:00
Martin Kojtal b9c214b165
Merge pull request #10002 from kegilbert/psa_baremetal_fix
Disable PSA in baremetal profiles
2019-03-08 21:15:30 +01:00
Martin Kojtal 820a2e284d
Merge pull request #9908 from morser499/pr/cy-mbed-os-5.12.0
Pr/cy mbed os 5.12.0
2019-03-08 11:01:41 +01:00
Cruz Monrreal 57ec1d57b9
Merge pull request #9990 from kfnta/sync_complinace_test_to_latest
Sync PSA compliance test to latest version
2019-03-07 23:36:56 -06:00
kegilbert 3fd32884c3 Allow baremetal to build by removing PSA 2019-03-07 16:41:58 -06:00
Ryan Morse 20c2734e7b Fixed issue with wrong floating point literal 2019-03-07 08:40:20 -08:00
Cruz Monrreal ff78bc4b7c
Merge pull request #9973 from kfnta/tfm_num_threads
TF-M config: Add max_ns_thread_count parameter
2019-03-07 10:28:11 -06:00
Nir Sonnenschein d473f6d59c synchronize latest fix to tests
synchronize latest fix to test_c043
2019-03-07 17:49:52 +02:00
Cruz Monrreal a87c7c82f3
Merge pull request #9312 from kfnta/psa_compliance
PSA compliance tests suite
2019-03-07 09:14:58 -06:00
Oren Cohen dbd91bc4e0 Remove unused type which was conflicting wiith errno.h 2019-03-07 14:01:51 +02:00
Michael Schwarcz 14aa347040 TF-M config: Add max_ns_thread_count parameter 2019-03-07 12:18:19 +02:00
Cruz Monrreal 63242cfbb4
Merge pull request #9939 from kfnta/fix_for_secure_partition
Fix for secure partition
2019-03-06 20:00:38 -06:00
Cruz Monrreal 254650c03f
Merge pull request #9956 from moranpeker/attestation_doxy
Add attestation doxygen
2019-03-06 16:36:00 -06:00
Michael Schwarcz 730e9b83b7 TF-M: Increase TFM_SPM_MAX_ROT_SERV_NUM from 30 to 32 2019-03-06 16:43:09 +02:00
Moran Peker c0633e56b1 Attestation doxygen 2019-03-06 15:39:08 +02:00
Nir Sonnenschein c437c9f0b8 use common flag to allow test 3 for PS and ITS
add a compilation flag to allow tests which fill up the entire device storage.
storage test 003 (for both PS and its) is unsuitable for the regular CI because:
1. it takes a long time causing timeouts
2. it places a very high attrition load on the storage of the CI boards
    and this can cause them to fail much sooner.
2019-03-06 10:53:57 +02:00
Martin Kojtal bb61ea1433
Merge pull request #9917 from kfnta/attest_doxy
Add attestation doxygen
2019-03-06 09:14:26 +01:00
Nir Sonnenschein 172fd650a2 Fix for resource leak in crypto compliance test 43
Destroy key after import key in a loop
2019-03-05 17:10:27 +02:00
Nir Sonnenschein 95d0c4d38d Define psa_storage_info_t for backward compatibility 2019-03-05 17:07:51 +02:00
Netanel Gonen 2982907e37 rework for mbed-os intf for ACK tests
-rework test wrapper functions to simplify test main
-move greentea init before test setup code to avoid boards losing sync.
2019-03-05 17:07:34 +02:00
Nir Sonnenschein f106718366 indentation fix 2019-03-05 15:52:41 +02:00
Nir Sonnenschein 4412e39a72 fix resource leaks 2019-03-05 15:07:14 +02:00
Alon 0d550eeeb6 Fix crypto service get key info out params 2019-03-05 14:57:24 +02:00
Veijo Pesonen 50984e5d2d ESP8266: makes usable channels runtime configurable 2019-03-05 10:40:22 +02:00
Veijo Pesonen eb27a23641 ESP8266: Exposes country code config API 2019-03-05 10:40:21 +02:00
Veijo Pesonen 96247dd76a ESP8266: sets hardcoded country code(CC) policy to track AP's CC 2019-03-05 10:40:21 +02:00
Martin Kojtal 5c24ffefa4
Merge pull request #9915 from kfnta/tfm_import_new
Update TF-M sources
2019-03-04 10:53:12 +01:00
Veijo Pesonen c9eaa07236 ESP8266: astyle, remove from the .astyleignore-file 2019-03-04 09:38:20 +02:00
Nir Sonnenschein 16a59cb992 Allow PS test03 with PS_ALLOW_ENTIRE_STORAGE_FILL flag 2019-03-03 22:51:43 +02:00
Nir Sonnenschein 1650a923eb add main functions to each compliance test
add main function to each compliance test , moving shared code to a common file
2019-03-03 22:50:59 +02:00
Oren Cohen 064dc7d154 Attestation doxygen 2019-03-03 18:46:20 +02:00
Michael Schwarcz 7a2c7d7df4 TF-M patch: Fix tfm_memory_check issue (TF-M issue #224)
- Add Secure/non-secure code and secure heap to memory check
- Link to bug tracking: https://developer.trustedfirmware.org/T224
2019-03-03 16:47:53 +02:00
Michael Schwarcz 749faa6534 TF-M patch: Fix wrong check in tfm_spm_check_client_version (TF-M issue #236)
- Link to bug tracking: https://developer.trustedfirmware.org/T236

(cherry picked from commit 008bf1b2d1)
2019-03-03 16:47:47 +02:00
Michael Schwarcz 8a087a6504 TF-M patch: Fix tfm_psa_call_venner wrong argument type (TF-M issue #241)
- Link to bug tracking: https://developer.trustedfirmware.org/T241

(cherry picked from commit da01e3411f)
2019-03-03 16:47:41 +02:00
Michael Schwarcz ea8bff57b1 TF-M patch: Fix fixed-size partitions stack size (TF-M issue #240)
- Link to bug tracking: https://developer.trustedfirmware.org/T240

(cherry picked from commit fc78640559)
2019-03-03 16:47:34 +02:00
Michael Schwarcz 03dbd4bb28 TF-M patch: Fix service handles not cleared issue (TF-M issue #230)
- Link to bug tracking: https://developer.trustedfirmware.org/T230

(cherry picked from commit 0c23e86989)
2019-03-03 16:47:28 +02:00
Michael Schwarcz 87f22efcb5 TF-M patch: Fix tfm_ns_lock_init issue (TF-M issue #239)
- Link to bug tracking: https://developer.trustedfirmware.org/T239

(cherry picked from commit 5f2e4b3911)
2019-03-03 16:47:22 +02:00
Michael Schwarcz 71cd34df32 TF-M patch: General modifications
- Remove un-needed files
- Disable printf and uart
- Modify include paths
- Guard macros from mbed_lib with ifndef

(cherry picked from commit 1f30b52488)
2019-03-03 16:47:17 +02:00
Michael Schwarcz 823e5a2a7f [trusted-firmware-m]: Updated to f876e5c 2019-03-03 16:47:11 +02:00
Nir Sonnenschein 67ada4404f Delete unneeded .mk files after test import
delete unneeded .mk files imported as part of the PSA compliance test suite
2019-03-03 16:16:54 +02:00
Nir Sonnenschein b64fb53d43 [api-tests]: Updated to cb58d2c 2019-03-03 15:51:26 +02:00
Oren Cohen cfb60ec955 Fixes
* Add #include <stddef.h> to psa/client.h
* Add Attestation service to TFM
* Update FUTURE_SEQUANA_PSA secure binaries
* Remove MBED_SPM from K64F
* Refactor psa_manifest/sid.h
* Increase stackl size in spm-client tests
* Add handling of errors from psa_get in partitions
2019-03-03 13:30:58 +02:00
Michael Schwarcz 8fefa25a84 TF-M: Remove not-used platform headers 2019-03-03 10:55:47 +02:00
Michael Schwarcz b62c48977f Review fixes 2019-03-03 10:55:46 +02:00
Michael Schwarcz 20d7f817df Fix astyle 2019-03-03 10:55:46 +02:00
Michael Schwarcz 98efb44ea8 Remove another psa_identity 2019-03-03 10:55:46 +02:00
Michael Schwarcz ef76ec83ee Generate psa_manifest/sid.h 2019-03-03 10:55:46 +02:00
Oren Cohen 798e3c393a Call tfm_panic for SPM_PANIC 2019-03-03 10:55:45 +02:00
Michael Schwarcz faf5fcf795 Fix typo 2019-03-03 10:55:45 +02:00
Oren Cohen 0e74e09e56 Set default PSA client header for single v7 targets 2019-03-03 10:55:45 +02:00
Oren Cohen 737a3cc350 Advance to PSA-FF 1.0 2019-03-03 10:55:45 +02:00
Oren Cohen bd9a738473 Move SPM_PANIC to psa/service.h 2019-03-03 10:55:44 +02:00
Oren Cohen 306a51f6c0 Update psa_get() to return psa_status_t 2019-03-03 10:55:44 +02:00
Michael Schwarcz f9fbd6ae82 Align PSA SPM tests to TF-M 2019-03-03 10:55:42 +02:00
Oren Cohen 483b23c318 Fix SPM warnings 2019-03-03 10:54:55 +02:00
Oren Cohen dfbc7b6b7a Adapt partitons 2019-03-03 10:54:54 +02:00
Oren Cohen aad114aa55 Genrerate SPM data 2019-03-03 10:54:54 +02:00
Oren Cohen 21d09b4156 Unify flags 2019-03-03 10:54:53 +02:00
Oren Cohen a65baf55c6 Update psa_wait() and client_id 2019-03-03 10:54:53 +02:00
Kevin Bracey c368021e37 SPIFBlockDevice.h: include SingletonPtr.h
SPIFBlockDevice was using SingletonPtr without an include,
and only getting it via SPI.h.

Spotted while changing SPI to not use SingletonPtr - now
abandoned, but still this shouldn't have been relying on it.
2019-03-01 14:33:33 +02:00
Cruz Monrreal 9d9a076f10
Merge pull request #9885 from VeijoPesonen/esp8266_conn_timeout_err2trace
ESP8266: graceful disconnect on network state timeout
2019-02-28 19:56:11 -06:00
Cruz Monrreal befed111f5
Merge pull request #9668 from moranpeker/psa-init-attestation
PSA Initial Attestation service
2019-02-28 18:25:16 -06:00
Cruz Monrreal b84439552a
Merge pull request #9883 from itayzafrir/crypto-service-proxy-mem-fix
Free dynamic memory in Crypto Service proxy (PSA targets)
2019-02-28 18:23:17 -06:00
Cruz Monrreal b5878b164d
Merge pull request #9871 from VeijoPesonen/bugfix-esp8266-recv_busy
ESP8266: receive is able to handle device busy indication
2019-02-28 18:22:54 -06:00
Moran Peker 83d084afef add casting to increased void pointer 2019-02-28 20:30:05 +02:00
Martin Kojtal 211db10aeb
Merge pull request #9828 from artokin/update_802154_rf_drivers
Update 802.15.4 RF drivers to the latest version
2019-02-28 17:53:50 +01:00
Moran Peker 116e14ade6 change license to file that mostly based on TF-M implementation
from Apache-2.0 to BSD-3-Clause
2019-02-28 16:00:53 +02:00
Moran Peker 2b8621aa6c initialized psa_hash_operation_t to zeros before calling hash_setup
-initialized  psa_hash_operation_t to zeros
-fix TF-M attestation code - increase t_cose_crypto_hash bytes to
handle max psa_hash_operation_t size
2019-02-28 15:54:45 +02:00
Moran Peker 6346442f03 Add SW_SIGNER_ID data to boot status 2019-02-28 15:52:16 +02:00
Moran Peker bca8091e52 astyle fix 2019-02-28 14:13:24 +02:00
Veijo Pesonen 7bb887fef4 ESP8266: in unknown network state driver tries to disconnect 2019-02-28 12:44:49 +02:00
itayzafrir 362c307d84 Free dynamic memory in crypto proxy 2019-02-28 11:36:31 +02:00
Moran Peker 49c6a1caaf fix void pointer increasing with bytes 2019-02-28 11:17:31 +02:00
avolinski e4c7144355 Prevent compiler warning, converting psa_key_policy_t to const in call to psa_set_key_policy 2019-02-27 18:57:58 +02:00
Moran Peker b847138819 astyle fix 2019-02-27 16:33:06 +02:00
Martin Kojtal 7656891179
Merge pull request #9638 from itayzafrir/crypto-access-control
Crypto Service - keys access control
2019-02-27 14:47:49 +01:00
Moran Peker 97a9652f3f Use less stack 2019-02-27 15:34:22 +02:00
Moran Peker 4a2b06ed0d Remove includes from mbedtls 2019-02-27 15:04:28 +02:00
Moran Peker 6e3d238ffd Styling 2019-02-27 15:03:45 +02:00
Moran Peker 47f59b16cb Correct psa-crypto include 2019-02-27 15:02:47 +02:00
Arto Kinnunen 05dc1f2f0e Sync STM S2LP RF driver to v0.0.2
Sync with v0.0.2 in master repository.
2019-02-27 14:59:19 +02:00
Arto Kinnunen e8225fbd7c Sync with STM S2LP RF driver v0.0.1
Sync with v0.0.1 in master repository.
2019-02-27 14:59:19 +02:00
Arto Kinnunen 2c78427932 Sync with MCR20a RF driver v1.0.3
Sync with v1.0.3 in https://github.com/ARMmbed/mcr20a-rf-driver
2019-02-27 14:59:19 +02:00
Arto Kinnunen 3a9a50a7d7 Sync with Atmel RF driver v3.0.6
Sync with v3.0.6 in https://github.com/ARMmbed/atmel-rf-driver
2019-02-27 14:59:19 +02:00
Moran Peker 89ac1075df Documented any non apache files 2019-02-27 14:14:45 +02:00
Moran Peker 7dd58b99cc Add free to allocated buffer while error 2019-02-27 14:14:33 +02:00
Moran Peker a268b81a57 Remove extra buffers used
outputting straight into the final destination
2019-02-27 14:14:32 +02:00
Moran Peker 25fa5a6138 Remove TEMP_IMPL_ID_DATA and TEMP_IMPL_ID_DATA_SIZE
remove from public header into attestation_bootloader_data.c and add
const to impl_id_data
2019-02-27 14:14:31 +02:00
Moran Peker c97cecc273 Update TFM attestation code to latest version
The latest and greatest version is:
c43181daf54f69f53de58593a50dd6a9c233eecd

- Add new header file and implement tfm_memcpy (used in
attetstaion_core c file)
2019-02-27 14:14:30 +02:00
Moran Peker 2810d369f9 Remove incorrect free place 2019-02-27 14:14:29 +02:00
Moran Peker 661e2f92aa Remove header files from inc into services/attestation folder 2019-02-27 14:14:29 +02:00
Moran Peker f02f6e3cf9 Add newline at end of file and remove un needed commant 2019-02-27 14:14:28 +02:00
Moran Peker 92a9b3f736 Remove calling to "psa_crypto_init()"
No need to call psa_crypto_init before crypto operations
we assume init already called before. if not an error will return.
2019-02-27 14:14:28 +02:00
Moran Peker 2e7738b8eb astyle fix 2019-02-27 14:14:27 +02:00
Moran Peker 41bd381462 General fixes of spelling, newline, un needed code
-Correct spelling errors
-Add newline at end of file
-Remove un needed code
2019-02-27 14:14:27 +02:00
Moran Peker de3ee8e376 Using goto exit in attest_public_key_sha256 function 2019-02-27 14:14:26 +02:00
Moran Peker d3c9860360 Free allocated buffers 2019-02-27 14:14:26 +02:00
Moran Peker d9b22da91d Remove calling to psa_crypto_init
- no need to call psa_crypto_init before crypto operations
we assume init already called before. if not an error will return.
2019-02-27 14:14:25 +02:00
Moran Peker aa5b79a480 generated file update 2019-02-27 14:14:24 +02:00
Moran Peker e60af99edb Attestation: Add comments from temporary data 2019-02-27 14:14:24 +02:00
Moran Peker 2720b5a73d Update include psa_defs -> psa/client 2019-02-27 14:14:23 +02:00
Moran Peker f8e4626098 Attestation: move t_code folder place 2019-02-27 14:14:22 +02:00
Moran Peker b3c6f709ca Attestation: move qcbor folder place 2019-02-27 14:14:21 +02:00
Moran Peker bd7061eaba Attestation: Add close key after open key 2019-02-27 14:14:20 +02:00
Moran Peker 715305accf Attestation: update boot status data
Epoc data to be 2 bytes instead of 4
2019-02-27 14:14:20 +02:00
Moran Peker e0c5df50be Attestation: Add parameter and entry size checks 2019-02-27 14:14:19 +02:00
Moran Peker 773fa44205 Update attestation asymmetric sign to use deterministic alg
- Add PSA_KEY_USAGE_VERIFY to attesttaion key usage
- Set deterministic alg to attestation key policy
- Call asymmetric sign with deterministic alg
2019-02-27 14:14:18 +02:00
Moran Peker 70a14b2f3a Update to last version of TFM-Attesttaion code
-update TFM attestation files
-update attest_crypto.c and psa_attestation_stubs.c file to support TFM
code changes
2019-02-27 14:14:18 +02:00
Moran Peker 2117a26cb1 Get security lifecycle by psa_security_lifecycle_state function
-Add bug fix for psa_security_lifecycle_state function - PR #9745
-Remove lifecycle data from temp boot status data
-Update attesttation_partition_json file to use
PSA_PLATFORM_LC_GET and generate partition
code - auto generated files update
2019-02-27 14:14:17 +02:00
Moran Peker 4101ee92df Add checks ,initialization,remove unneeded code and files license update 2019-02-27 14:14:14 +02:00
Moran Peker 080f4f4e69 Attestation: Update iat claims data
Add more iat claims: profile definition and verification service
Update boot status data: add more SW components for SW_S_NS module
2019-02-27 14:14:13 +02:00
Moran Peker 636753b404 Attestation: Add a new define for attestation private key id 2019-02-27 14:14:13 +02:00
Moran Peker 0a0bb04dfa Attestation: Change files license to Apache
change all files except tfm code.
2019-02-27 14:14:12 +02:00
Moran Peker 8fc9c8fdab Attestation: astyle fixs
Runing astyle over attestation file to pass CI
2019-02-27 14:14:11 +02:00
Moran Peker a994499bf3 Atteststaion: Update header files
-Remove psa_initial_attesttaion.h
-Move psa_initial_attesttaion_api.h and psa_attest_inject_key.h into
inc folder
-Update include in test file
2019-02-27 14:14:11 +02:00
Moran Peker 5f45b0af92 Attestation: aut- generated files by generate_partition_code.py
Atestation paration added.
2019-02-27 14:14:09 +02:00
Moran Peker 9a4ea3d319 Add PSA Initial Attestation service
Attestation service can create a token on request, which contains a fix set of
device specific data.
Implementation:
-‘psa_initial_attest_get_token_size’- get exact size of initial attestation token in bytes.
-‘psa_initial_attest_get_token’- get the initial attestation token.
-‘psa_attestation_inject_key’ - Generate or import the attestation key pair and export the public part.

-Including CBOR lib and TFM attestation implemantation.
-Temporary claim’s data – no bootloader over V7 Single & Dual
2019-02-27 14:14:08 +02:00
Martin Kojtal 6bdbe754cd
Merge pull request #9799 from VeijoPesonen/bugfix-esp8266-dns
Increase events.share-eventsize to 768B because of ESP8266 AT driver and asynchronous DNS
2019-02-27 11:30:38 +01:00
Martin Kojtal 5ab69d5d6b
Merge pull request #9575 from itayzafrir/crypto-64-bit-key-ids
Crypto IPC 64 bit key ids for ITS
2019-02-27 09:29:18 +01:00
Veijo Pesonen 688a4e42bc ESP8266: recv() is able to handle device busy indication 2019-02-27 09:54:43 +02:00