Commit Graph

23575 Commits (86d030dbaafa78f8d43c8dd9113b6ef6765ed64b)

Author SHA1 Message Date
Jimmy Brisson 58867c052e Correct test import locations
A few functions moved into their own module
2019-03-04 11:32:15 -06:00
Jimmy Brisson 4cac89c22b Reorder post-build and managed bootloader mode merging
Priously, post-bulid was run before the merge from managed bootloader mode.
This renders many post-build scripts less than useful, as most of them
compute a digest of the ROM image generated in a build.

This reorders the post-build scripts to come after the managed bootloader
mode so that post-build script digests are useful again.
2019-03-04 11:30:49 -06:00
Jimmy Brisson aeeb43fb3c Simplify hook tool implementation
The "hook tools" were capable of hooking into many commands run by the build system.
To my knowlage, the only hook is the "post-build-hook". The post build hook could be
easier to reason about if the implementation is specialized for just post-build
hooking.

This commit make it much easier to point out where post build hooks are called by
making the call explicit.
2019-03-04 11:30:49 -06:00
Jimmy Brisson 643b5785a5 Recreate STM32F439ZITx sector information 2019-03-04 11:24:48 -06:00
Jimmy Brisson fd63f5bde5 Correct python3 bug in gerenate index 2019-03-04 11:24:48 -06:00
Jimmy Brisson 1e5b83262a Recompute sector information for STM32F429ZITx 2019-03-04 11:24:47 -06:00
Jimmy Brisson c5bbfb2d51 Correct name of K22F 2019-03-04 11:24:47 -06:00
Jimmy Brisson 049ee2df4d Add old name for STM32H743ZI 2019-03-04 11:24:47 -06:00
Jimmy Brisson efeda77602 Require 0.2.3 CPM
This includes vendor parsing so that we can reproduced the index.json
2019-03-04 11:24:47 -06:00
Jimmy Brisson 859949fc74 Update index to include vendor information 2019-03-04 11:24:47 -06:00
Jimmy Brisson 8d7c15ee35 Use device variant in uvision export 2019-03-04 11:24:47 -06:00
Jimmy Brisson 9de37ec39c Correct uvisionn export 2019-03-04 11:24:47 -06:00
Brian Daniels dbbf336949 Avoid KeyError Exceptions.
Co-Authored-By: theotherjimmy <theotherjimmy@gmail.com>
2019-03-04 11:24:47 -06:00
Jimmy Brisson 4af70dcaa1 Use updated CPM info in config system 2019-03-04 11:24:47 -06:00
Jimmy Brisson aa07e126f1 Use upgrade table for unavailable CMP data 2019-03-04 11:24:47 -06:00
Jimmy Brisson 74f45fbbfc Start using CPM 2019-03-04 11:24:46 -06:00
Martin Kojtal 355f09bbac
Merge pull request #9875 from tymoteuszblochmobica/testfix
Apply proper network interface verification.
Only run for platforms which have two interfaces and prevent crashes otherwise.
2019-03-04 15:24:41 +01:00
Martin Kojtal e75794ec6e
Merge pull request #9888 from ARMmbed/feature-armc6
ARM Toolchain update to ARM Compiler 6.11(ARMC6)
2019-03-04 12:23:38 +01:00
Tymoteusz Bloch f420a5551d Fix multihoming tests for case of no ethernet device 2019-03-04 11:25:56 +01:00
Martin Kojtal 5c24ffefa4
Merge pull request #9915 from kfnta/tfm_import_new
Update TF-M sources
2019-03-04 10:53:12 +01:00
Martin Kojtal 9f6156abb3
Merge pull request #9916 from kfnta/skip_spm_hal_m33
Skip test on Cortex M33 devices
2019-03-04 10:51:14 +01:00
Simon Butcher 5285b39c01 Update Mbed TLS to the latest development version
This updates Mbed TLS to the latest development version, commit 535ee4a35b9c
in the Mbed TLS repo.
2019-03-03 23:04:00 +00:00
Simon Butcher 86825a65b6 Move the Mbed TLS target to the development branch
Before moving to the new release of Mbed TLS, this moves the default imported
version of Mbed TLS to the development branch, and will import the HEAD of the
branch, not just a specific release.
2019-03-03 22:59:00 +00:00
Simon Butcher 21c6c90519 Make the storage configs dependent on the PSA label
This commit makes the storage configurations - setting
MBEDTLS_PSA_CRYPTO_STORAGE_C, MBEDTLS_PSA_CRYPTO_STORAGE_ITS_C and unsetting
MBEDTLS_PSA_CRYPTO_STORAGE_FILE_C - dependent on the PSA label being defined for
the target.

Previously these symbols were always defined for all platforms which could
cause problems for targets that don't yet support PSA.
2019-03-03 22:55:38 +00:00
Oren Cohen f234a1dc5b
Unify PSA code generators 2019-03-03 21:15:49 +02:00
Oren Cohen 577d286639 Skip test on Cortex M33 devices
On platforms using coretx m33 accessing the secure memory will cause SecureFault instead of Hardfault.
SecureFault is implemented in the secure image and cannot be changed in runtime.
2019-03-03 18:43:04 +00:00
Martin Kojtal fa65546aa2
Merge pull request #9913 from kfnta/fix_acl_test
Fix bug in crypto_acl test
2019-03-03 19:30:43 +01:00
Martin Kojtal b2fb3d76bf
Merge pull request #9823 from kfnta/wait_and_identity
mbed-SPM updates
2019-03-03 19:26:28 +01:00
Oren Cohen 064dc7d154 Attestation doxygen 2019-03-03 18:46:20 +02:00
Michael Schwarcz f32f2ae0b0 Update tfm_importer.json with updated SHAs 2019-03-03 16:49:56 +02:00
Michael Schwarcz 7a2c7d7df4 TF-M patch: Fix tfm_memory_check issue (TF-M issue #224)
- Add Secure/non-secure code and secure heap to memory check
- Link to bug tracking: https://developer.trustedfirmware.org/T224
2019-03-03 16:47:53 +02:00
Michael Schwarcz 749faa6534 TF-M patch: Fix wrong check in tfm_spm_check_client_version (TF-M issue #236)
- Link to bug tracking: https://developer.trustedfirmware.org/T236

(cherry picked from commit 008bf1b2d1)
2019-03-03 16:47:47 +02:00
Michael Schwarcz 8a087a6504 TF-M patch: Fix tfm_psa_call_venner wrong argument type (TF-M issue #241)
- Link to bug tracking: https://developer.trustedfirmware.org/T241

(cherry picked from commit da01e3411f)
2019-03-03 16:47:41 +02:00
Michael Schwarcz ea8bff57b1 TF-M patch: Fix fixed-size partitions stack size (TF-M issue #240)
- Link to bug tracking: https://developer.trustedfirmware.org/T240

(cherry picked from commit fc78640559)
2019-03-03 16:47:34 +02:00
Michael Schwarcz 03dbd4bb28 TF-M patch: Fix service handles not cleared issue (TF-M issue #230)
- Link to bug tracking: https://developer.trustedfirmware.org/T230

(cherry picked from commit 0c23e86989)
2019-03-03 16:47:28 +02:00
Michael Schwarcz 87f22efcb5 TF-M patch: Fix tfm_ns_lock_init issue (TF-M issue #239)
- Link to bug tracking: https://developer.trustedfirmware.org/T239

(cherry picked from commit 5f2e4b3911)
2019-03-03 16:47:22 +02:00
Michael Schwarcz 71cd34df32 TF-M patch: General modifications
- Remove un-needed files
- Disable printf and uart
- Modify include paths
- Guard macros from mbed_lib with ifndef

(cherry picked from commit 1f30b52488)
2019-03-03 16:47:17 +02:00
Michael Schwarcz 823e5a2a7f [trusted-firmware-m]: Updated to f876e5c 2019-03-03 16:47:11 +02:00
Oren Cohen 4fe5a41734 Fix bug in crypto_acl test 2019-03-03 14:41:27 +02:00
Oren Cohen cfb60ec955 Fixes
* Add #include <stddef.h> to psa/client.h
* Add Attestation service to TFM
* Update FUTURE_SEQUANA_PSA secure binaries
* Remove MBED_SPM from K64F
* Refactor psa_manifest/sid.h
* Increase stackl size in spm-client tests
* Add handling of errors from psa_get in partitions
2019-03-03 13:30:58 +02:00
Michael Schwarcz 4eabce80b4 TF-M: Update tfm_importer.json 2019-03-03 10:55:47 +02:00
Michael Schwarcz 8fefa25a84 TF-M: Remove not-used platform headers 2019-03-03 10:55:47 +02:00
Michael Schwarcz 6341d44591 Update FUTURE_SEQUANA_M0_PSA default binaries 2019-03-03 10:55:47 +02:00
Michael Schwarcz b62c48977f Review fixes 2019-03-03 10:55:46 +02:00
Michael Schwarcz 20d7f817df Fix astyle 2019-03-03 10:55:46 +02:00
Michael Schwarcz 98efb44ea8 Remove another psa_identity 2019-03-03 10:55:46 +02:00
Michael Schwarcz ef76ec83ee Generate psa_manifest/sid.h 2019-03-03 10:55:46 +02:00
Oren Cohen 798e3c393a Call tfm_panic for SPM_PANIC 2019-03-03 10:55:45 +02:00
Michael Schwarcz faf5fcf795 Fix typo 2019-03-03 10:55:45 +02:00
Oren Cohen 0e74e09e56 Set default PSA client header for single v7 targets 2019-03-03 10:55:45 +02:00