Commit Graph

24939 Commits (78e0596bc8fa0d6416322fd8f345cc52fc137382)

Author SHA1 Message Date
Tymoteusz Bloch 78e0596bc8 Added hardcoded Echo server defaults for Greentea socket tests. 2019-07-03 16:19:35 +03:00
Martin Kojtal bb8be83885 unsupported USBHAL: fix coding style 2019-07-03 16:19:35 +03:00
Tomasz Moń b9490b8541 STM USBHALHost: Fix NULL pointer dereference
On STM32F746G Discovery boards, the USB OTG HS port does not have a
dedicated GPIO for controlling the USB VBUS.

This change fixes HardFault (NULL pointer dereference) that triggered
when such USB host port was used.
2019-07-03 16:19:35 +03:00
ccli8 d40c529320 Exclude mbed-hal-spm test for TrustZone chips
This is because for TrustZone chips like M23/M33, SecureFault is implemented in
secure-side and cannot pass on to non-secure side.
2019-07-03 16:19:35 +03:00
Chris Trowbridge aec8ddec5c Remove component 'QSPIF' for target 'EP_AGORA' 2019-07-03 16:19:35 +03:00
Chris Trowbridge ca8492426b Remove unneeded custom_board.h file 2019-07-03 16:19:35 +03:00
Chris Trowbridge c6e6acb3f3 Update licenses for EP_AGORA target 2019-07-03 16:19:35 +03:00
Chris Trowbridge d57f5d369e Add support files for target EP_AGORA 2019-07-03 16:19:34 +03:00
Chris Trowbridge 7b8babcc55 Add 'EP_AGORA' as a target 2019-07-03 16:19:34 +03:00
Maciej Bocianski b3ace3d07f hal_qspi_test: undo buggy code
Remove some buggy code introduced to hal_qspi_test by PR #10435
Added support for QSPI to Cypress Boards
a8570ffe6c
2019-07-03 16:19:34 +03:00
Tomasz Moń 1e9b7f6a65 USBHostMSD: Implement BlockDevice get_type()
This makes it possible to create instances of USBHostMSD class.
2019-07-03 16:19:34 +03:00
Laurent Meunier a885b6b0fc timeout_tests: do not call sleep from test thread
This is up to scheduler to call sleep when threads are inactive.
So the thread should simply wait for the semaphore for ever (or test timeout).
2019-07-03 16:19:34 +03:00
Ari Parkkila 075e6f8871 Cellular: Fix socket connect on UBLOX_AT driver 2019-07-03 16:19:34 +03:00
Tymoteusz Bloch d769fe5f61 Fixed LWIP warning issues found by Coverity scan 2019-07-03 16:19:34 +03:00
Ari Parkkila 12b9613f82 Cellular: Add BG96 power control 2019-07-03 16:19:34 +03:00
Pekka Pesu d8ab1bb87e add BG96 povermanagemet 2019-07-03 16:19:34 +03:00
Pekka Pesu 4c0c4f5f08 BG96 power handling added 2019-07-03 16:19:34 +03:00
jeromecoutant 404ce839e9 STM32H7: flash issue while erasing sector in Bank 1 2019-07-03 16:19:33 +03:00
David Saada 6c57210f28 Remove excessive info and debug prints in SPIF driver. 2019-07-03 16:19:33 +03:00
Tomasz Moń c92a24d57e USBHost: Wait for device to implement SET ADDRESS
The USB Device must change the address within 2 ms after completing
SET ADDRESS status stage.

Wait 2 ms before issuing GET DESCRIPTOR under the new address. In my
case, this completely resolves the timeout issues.
2019-07-03 16:19:33 +03:00
Teppo Järvelin 5d3f0781fd Cellular: AT_CellularContext disconnect in non-blocking mode
Disconnect was supporting only blocking mode.
2019-07-03 16:19:33 +03:00
Volodymyr Medvid 6c96592813 PSOC6: move cmsis.h and device.h out from psoc6pdl directory
This simplifies updating of psoc6pdl directory to the latest Cypress
PSoC 6 PDL releases. cmsis.h and device.h are not part of psoc6pdl.
2019-07-03 16:19:33 +03:00
panyz0725@thundersoft.com 9cc74f2dff Modifiying file PinNames.h 2019-07-03 16:19:33 +03:00
jeromecoutant b8dca89d9f STM32: common cmsis.h and device.h 2019-07-03 16:19:32 +03:00
Arto Kinnunen 1de205ed7a Add compilation flags to rf_configuration
Add flags to allow compilation without nanostack.
2019-07-03 16:19:32 +03:00
ale87jan 2ccc03dfbf Update MAX3263x.sct 2019-07-03 16:19:31 +03:00
Martin Kojtal 7482462434
Merge pull request #10889 from ARMmbed/release-candidate
Release candidate for mbed-os-5.13.0-rc4
2019-06-25 09:57:59 +01:00
Mirela Chirica 1533d2466b Cellular: Remove IPV6 and IPV4V6 as supported properties for BG96
IPV6 and IPV6V4 support is also network dependent not only modem.

Having these properties enabled for a modem requires a fallback
mechanism during PDP context activation. This mechanism is missing
at the moment and that can result in imposibility to establish
succesfull connection when network only supports IPV4 contexts.
2019-06-24 15:15:19 +01:00
Mirela Chirica bfbf3a728b Cellular: Fix requested socket id in socket_connect routines of BG96 and M26 2019-06-24 15:15:19 +01:00
Mirela Chirica 04d8c704ef Cellular: Added IPV6 and IPV4V6 as supported properties for BG96 2019-06-24 15:15:19 +01:00
Anna Bridge 92a58dff99
Merge pull request #10818 from ARMmbed/release-candidate
Release candidate for mbed-os-5.13.0-rc3
2019-06-19 09:51:26 +01:00
Jaeden Amero bf676c1264 psa: Avoid re-definition of MBEDTLS_PSA_CRYPTO_C
Mbed TLS now enables PSA APIs by default on all targets. It's not
necessary to explicitly enable MBEDTLS_PSA_CRYPTO_C, as that can be
gotten from the Mbed TLS config.h.

However, many PSA targets depend on `-DMBEDTLS_PSA_CRYPTO_C` being
defined by the Mbed OS json configuration system and are not yet
properly including the Mbed TLS configuration; for these PSA targets,
warnings may remain until this issue is fixed.

Avoiding re-definition will eliminate warnings like the following, when
building mbed-os-example-blinky:

    Compile [ 14.5%]: pal_client_api_empty_intf.c
    [Warning] pal_client_api_intf.h@35,0: "PSA_SUCCESS" redefined
    Compile [ 14.6%]: pal_client_api_intf.c
    Compile [ 14.7%]: DeviceKey.cpp
    Compile [ 14.9%]: pal_internal_trusted_storage_intf.c
    [Warning] pal_internal_trusted_storage_intf.c@45,9: 'psa_its_set' is deprecated: PS specific types should not be used [-Wdeprecated-declarations]
    Compile [ 15.3%]: val_attestation.c
    [Warning] client.h@40,0: "PSA_VERSION_NONE" redefined
    <..>
    Compile [ 33.3%]: asn1parse.c
    [Warning] config.h@2838,0: "MBEDTLS_PSA_CRYPTO_C" redefined
    Compile [ 33.5%]: aes.c
    [Warning] config.h@2838,0: "MBEDTLS_PSA_CRYPTO_C" redefined
    Compile [ 33.6%]: asn1write.c
    [Warning] config.h@2838,0: "MBEDTLS_PSA_CRYPTO_C" redefined
    Compile [ 33.7%]: psa_crypto.c
    [Warning] config.h@2838,0: "MBEDTLS_PSA_CRYPTO_C" redefined
    Compile [ 33.8%]: blowfish.c
    [Warning] config.h@2838,0: "MBEDTLS_PSA_CRYPTO_C" redefined
    Compile [ 33.9%]: camellia.c
    [Warning] config.h@2838,0: "MBEDTLS_PSA_CRYPTO_C" redefined
    Compile [ 34.0%]: base64.c
    [Warning] config.h@2838,0: "MBEDTLS_PSA_CRYPTO_C" redefined
    Compile [ 34.2%]: ccm.c
    [Warning] config.h@2838,0: "MBEDTLS_PSA_CRYPTO_C" redefined
    Compile [ 34.3%]: chacha20.c
    [Warning] config.h@2838,0: "MBEDTLS_PSA_CRYPTO_C" redefined
    Compile [ 34.4%]: chachapoly.c
    [Warning] config.h@2838,0: "MBEDTLS_PSA_CRYPTO_C" redefined
    Compile [ 34.5%]: cipher_wrap.c
    [Warning] config.h@2838,0: "MBEDTLS_PSA_CRYPTO_C" redefined
    Compile [ 34.6%]: cmac.c
    [Warning] config.h@2838,0: "MBEDTLS_PSA_CRYPTO_C" redefined
    Compile [ 34.7%]: cipher.c
    [Warning] config.h@2838,0: "MBEDTLS_PSA_CRYPTO_C" redefined
    Compile [ 34.9%]: bignum.c
    [Warning] config.h@2838,0: "MBEDTLS_PSA_CRYPTO_C" redefined
    Compile [ 35.0%]: des.c
    [Warning] config.h@2838,0: "MBEDTLS_PSA_CRYPTO_C" redefined
    Compile [ 35.1%]: dhm.c
    [Warning] config.h@2838,0: "MBEDTLS_PSA_CRYPTO_C" redefined
    Compile [ 35.2%]: ctr_drbg.c
    <..>
    Compile [ 70.9%]: EthernetInterface.cpp
    [Warning] config.h@2838,0: "MBEDTLS_PSA_CRYPTO_C" redefined
    Compile [ 71.0%]: InternetSocket.cpp
    Compile [ 71.1%]: L3IPInterface.cpp
    [Warning] config.h@2838,0: "MBEDTLS_PSA_CRYPTO_C" redefined
    Compile [ 71.2%]: NetworkInterface.cpp
2019-06-12 16:21:13 +01:00
Jaeden Amero 23d66c1c25 mbedtls: PSA entropy is compatible with other entropy
When using Mbed Crypto's PSA Entropy Injection feature on Mbed OS, it is
not required to opt out of having entropy sources added to your entropy
contexts by default (via MBEDTLS_NO_DEFAULT_ENTROPY_SOURCES).

As integrated in Mbed OS, MBEDTLS_PSA_INJECT_ENTROPY is compatible with
actual entropy sources. PSA entropy injection is implemented using the
standard Mbed TLS NV Seed feature, and is as compatible with other
entropy sources as the standard Mbed TLS NV Seed feature which does
support entropy mixing.
2019-06-12 16:15:57 +01:00
Jaeden Amero c0b4343f26 mbedtls: Update to Mbed TLS 2.18.0-rc3 2019-06-12 16:15:57 +01:00
Jaeden Amero 0689c589fc mbedtls: Update to Mbed Crypto 1.1.0d2 2019-06-12 16:15:57 +01:00
desmond.chen 0ebc05385f Fix nrf52 enabled uart count and enable uart0/1 2019-06-12 16:15:57 +01:00
Kevin Bracey 1b124e03ca ns_list: avoid UINT_FAST8_MAX
Prevent compilation issues when someone has included <stdint.h> before
a header file that needs to include <ns_list.h>.

Some toolchains like ARM C 5 will not provide UINT_FAST8_MAX in C++
unless __STDC_LIMIT_MACROS is defined, and if this was not defined the
first time <stdint.h> was included, it's too late.

We can get the maximum value for our unsigned list offset by casting -1
to it, thanks to modulo arithmetic.
2019-06-12 16:15:57 +01:00
Kevin Bracey 3a2bd249c6 Fix ARMC5 compilation
Minor tweaks to fix ARM C 5 compatibility.

Pushing "ns_list.h" include to first makes sure "ns_types.h" is included
first, meaning it gets to define `__STDC_LIMIT_MACROS` before the first
include of <stdint.h>, which ensures that UINT8_MAX etc are defined.
2019-06-12 16:15:57 +01:00
paul-szczepanek-arm 3b66065a10 exculde test 2019-06-12 16:15:57 +01:00
Lingkai Dong 0607340748 NORDIC_CORDIC pal_crypto: check if cryptocell310 is enabled
The config "cryptocell310-acceleration" is set by MCU_NRF52840
but individual targets may have crytocell310 feature disabled.
2019-06-12 16:15:57 +01:00
Lingkai Dong ad91527023 critical_section tests: do not check APP interrupts on NRF52
APP interrupts are masked on SoftDevice BLE stack only, but we
have switched to Cordio stack on NRF52 targets.
2019-06-12 16:15:57 +01:00
Lingkai Dong 29446548f5 Default to Cordio BLE stack for NRF52* targets
The BLE stack from SoftDevice is not actively maintained and
has issues when used with Nordic SDK v15.
2019-06-12 16:15:57 +01:00
adbridge 14ed96e72c Re-enable complilation for wifi and nanostack examples 2019-06-12 16:15:57 +01:00
Jaeden Amero 465944b396 mbed-crypto: Update to Mbed Crypto 1.1.0d1 2019-06-12 16:15:57 +01:00
Martin Kojtal cd8e315ba5
Merge pull request #10763 from ARMmbed/release-candidate
Release candidate for mbed-os-5.13.0-rc2
2019-06-05 21:01:28 +01:00
Vincent Coubard 452c60bea7 Cordio: Fix default COC parameters.
The stack doesn't cope with zero COC client or channel on IAR.
2019-06-05 13:08:10 +01:00
Vincent Coubard 2e8d123d2d BLE - tune Cordio LL default parameters to reduce the memory required. 2019-06-05 13:08:10 +01:00
Vincent Coubard 79c0d3af80 BLE - Fix Cordio LL extended advertising size. 2019-06-05 13:08:10 +01:00
Vincent Coubard 8cd222c5db BLE - Set rx ACL buffer size to the minimum viable in cordio conf. 2019-06-05 13:08:10 +01:00
Vincent Coubard f0ad9b32c1 Disable l2cap connection oriented channels in Cordio default conf. 2019-06-05 13:08:10 +01:00