Martin Kojtal
bb61ea1433
Merge pull request #9917 from kfnta/attest_doxy
...
Add attestation doxygen
2019-03-06 09:14:26 +01:00
Nir Sonnenschein
172fd650a2
Fix for resource leak in crypto compliance test 43
...
Destroy key after import key in a loop
2019-03-05 17:10:27 +02:00
Nir Sonnenschein
95d0c4d38d
Define psa_storage_info_t for backward compatibility
2019-03-05 17:07:51 +02:00
Netanel Gonen
2982907e37
rework for mbed-os intf for ACK tests
...
-rework test wrapper functions to simplify test main
-move greentea init before test setup code to avoid boards losing sync.
2019-03-05 17:07:34 +02:00
Nir Sonnenschein
f106718366
indentation fix
2019-03-05 15:52:41 +02:00
Nir Sonnenschein
4412e39a72
fix resource leaks
2019-03-05 15:07:14 +02:00
Alon
0d550eeeb6
Fix crypto service get key info out params
2019-03-05 14:57:24 +02:00
Veijo Pesonen
50984e5d2d
ESP8266: makes usable channels runtime configurable
2019-03-05 10:40:22 +02:00
Veijo Pesonen
eb27a23641
ESP8266: Exposes country code config API
2019-03-05 10:40:21 +02:00
Veijo Pesonen
96247dd76a
ESP8266: sets hardcoded country code(CC) policy to track AP's CC
2019-03-05 10:40:21 +02:00
Martin Kojtal
5c24ffefa4
Merge pull request #9915 from kfnta/tfm_import_new
...
Update TF-M sources
2019-03-04 10:53:12 +01:00
Veijo Pesonen
c9eaa07236
ESP8266: astyle, remove from the .astyleignore-file
2019-03-04 09:38:20 +02:00
Nir Sonnenschein
16a59cb992
Allow PS test03 with PS_ALLOW_ENTIRE_STORAGE_FILL flag
2019-03-03 22:51:43 +02:00
Nir Sonnenschein
1650a923eb
add main functions to each compliance test
...
add main function to each compliance test , moving shared code to a common file
2019-03-03 22:50:59 +02:00
Oren Cohen
064dc7d154
Attestation doxygen
2019-03-03 18:46:20 +02:00
Michael Schwarcz
7a2c7d7df4
TF-M patch: Fix tfm_memory_check issue (TF-M issue #224 )
...
- Add Secure/non-secure code and secure heap to memory check
- Link to bug tracking: https://developer.trustedfirmware.org/T224
2019-03-03 16:47:53 +02:00
Michael Schwarcz
749faa6534
TF-M patch: Fix wrong check in tfm_spm_check_client_version (TF-M issue #236 )
...
- Link to bug tracking: https://developer.trustedfirmware.org/T236
(cherry picked from commit 008bf1b2d1
)
2019-03-03 16:47:47 +02:00
Michael Schwarcz
8a087a6504
TF-M patch: Fix tfm_psa_call_venner wrong argument type (TF-M issue #241 )
...
- Link to bug tracking: https://developer.trustedfirmware.org/T241
(cherry picked from commit da01e3411f
)
2019-03-03 16:47:41 +02:00
Michael Schwarcz
ea8bff57b1
TF-M patch: Fix fixed-size partitions stack size (TF-M issue #240 )
...
- Link to bug tracking: https://developer.trustedfirmware.org/T240
(cherry picked from commit fc78640559
)
2019-03-03 16:47:34 +02:00
Michael Schwarcz
03dbd4bb28
TF-M patch: Fix service handles not cleared issue (TF-M issue #230 )
...
- Link to bug tracking: https://developer.trustedfirmware.org/T230
(cherry picked from commit 0c23e86989
)
2019-03-03 16:47:28 +02:00
Michael Schwarcz
87f22efcb5
TF-M patch: Fix tfm_ns_lock_init issue (TF-M issue #239 )
...
- Link to bug tracking: https://developer.trustedfirmware.org/T239
(cherry picked from commit 5f2e4b3911
)
2019-03-03 16:47:22 +02:00
Michael Schwarcz
71cd34df32
TF-M patch: General modifications
...
- Remove un-needed files
- Disable printf and uart
- Modify include paths
- Guard macros from mbed_lib with ifndef
(cherry picked from commit 1f30b52488
)
2019-03-03 16:47:17 +02:00
Michael Schwarcz
823e5a2a7f
[trusted-firmware-m]: Updated to f876e5c
2019-03-03 16:47:11 +02:00
Nir Sonnenschein
67ada4404f
Delete unneeded .mk files after test import
...
delete unneeded .mk files imported as part of the PSA compliance test suite
2019-03-03 16:16:54 +02:00
Nir Sonnenschein
b64fb53d43
[api-tests]: Updated to cb58d2c
2019-03-03 15:51:26 +02:00
Oren Cohen
cfb60ec955
Fixes
...
* Add #include <stddef.h> to psa/client.h
* Add Attestation service to TFM
* Update FUTURE_SEQUANA_PSA secure binaries
* Remove MBED_SPM from K64F
* Refactor psa_manifest/sid.h
* Increase stackl size in spm-client tests
* Add handling of errors from psa_get in partitions
2019-03-03 13:30:58 +02:00
Michael Schwarcz
8fefa25a84
TF-M: Remove not-used platform headers
2019-03-03 10:55:47 +02:00
Michael Schwarcz
b62c48977f
Review fixes
2019-03-03 10:55:46 +02:00
Michael Schwarcz
20d7f817df
Fix astyle
2019-03-03 10:55:46 +02:00
Michael Schwarcz
98efb44ea8
Remove another psa_identity
2019-03-03 10:55:46 +02:00
Michael Schwarcz
ef76ec83ee
Generate psa_manifest/sid.h
2019-03-03 10:55:46 +02:00
Oren Cohen
798e3c393a
Call tfm_panic for SPM_PANIC
2019-03-03 10:55:45 +02:00
Michael Schwarcz
faf5fcf795
Fix typo
2019-03-03 10:55:45 +02:00
Oren Cohen
0e74e09e56
Set default PSA client header for single v7 targets
2019-03-03 10:55:45 +02:00
Oren Cohen
737a3cc350
Advance to PSA-FF 1.0
2019-03-03 10:55:45 +02:00
Oren Cohen
bd9a738473
Move SPM_PANIC to psa/service.h
2019-03-03 10:55:44 +02:00
Oren Cohen
306a51f6c0
Update psa_get() to return psa_status_t
2019-03-03 10:55:44 +02:00
Michael Schwarcz
f9fbd6ae82
Align PSA SPM tests to TF-M
2019-03-03 10:55:42 +02:00
Oren Cohen
483b23c318
Fix SPM warnings
2019-03-03 10:54:55 +02:00
Oren Cohen
dfbc7b6b7a
Adapt partitons
2019-03-03 10:54:54 +02:00
Oren Cohen
aad114aa55
Genrerate SPM data
2019-03-03 10:54:54 +02:00
Oren Cohen
21d09b4156
Unify flags
2019-03-03 10:54:53 +02:00
Oren Cohen
a65baf55c6
Update psa_wait() and client_id
2019-03-03 10:54:53 +02:00
Kevin Bracey
c368021e37
SPIFBlockDevice.h: include SingletonPtr.h
...
SPIFBlockDevice was using SingletonPtr without an include,
and only getting it via SPI.h.
Spotted while changing SPI to not use SingletonPtr - now
abandoned, but still this shouldn't have been relying on it.
2019-03-01 14:33:33 +02:00
Cruz Monrreal
9d9a076f10
Merge pull request #9885 from VeijoPesonen/esp8266_conn_timeout_err2trace
...
ESP8266: graceful disconnect on network state timeout
2019-02-28 19:56:11 -06:00
Cruz Monrreal
befed111f5
Merge pull request #9668 from moranpeker/psa-init-attestation
...
PSA Initial Attestation service
2019-02-28 18:25:16 -06:00
Cruz Monrreal
b84439552a
Merge pull request #9883 from itayzafrir/crypto-service-proxy-mem-fix
...
Free dynamic memory in Crypto Service proxy (PSA targets)
2019-02-28 18:23:17 -06:00
Cruz Monrreal
b5878b164d
Merge pull request #9871 from VeijoPesonen/bugfix-esp8266-recv_busy
...
ESP8266: receive is able to handle device busy indication
2019-02-28 18:22:54 -06:00
Moran Peker
83d084afef
add casting to increased void pointer
2019-02-28 20:30:05 +02:00
Martin Kojtal
211db10aeb
Merge pull request #9828 from artokin/update_802154_rf_drivers
...
Update 802.15.4 RF drivers to the latest version
2019-02-28 17:53:50 +01:00
Moran Peker
116e14ade6
change license to file that mostly based on TF-M implementation
...
from Apache-2.0 to BSD-3-Clause
2019-02-28 16:00:53 +02:00
Moran Peker
2b8621aa6c
initialized psa_hash_operation_t to zeros before calling hash_setup
...
-initialized psa_hash_operation_t to zeros
-fix TF-M attestation code - increase t_cose_crypto_hash bytes to
handle max psa_hash_operation_t size
2019-02-28 15:54:45 +02:00
Moran Peker
6346442f03
Add SW_SIGNER_ID data to boot status
2019-02-28 15:52:16 +02:00
Moran Peker
bca8091e52
astyle fix
2019-02-28 14:13:24 +02:00
Veijo Pesonen
7bb887fef4
ESP8266: in unknown network state driver tries to disconnect
2019-02-28 12:44:49 +02:00
itayzafrir
362c307d84
Free dynamic memory in crypto proxy
2019-02-28 11:36:31 +02:00
Moran Peker
49c6a1caaf
fix void pointer increasing with bytes
2019-02-28 11:17:31 +02:00
avolinski
e4c7144355
Prevent compiler warning, converting psa_key_policy_t to const in call to psa_set_key_policy
2019-02-27 18:57:58 +02:00
Moran Peker
b847138819
astyle fix
2019-02-27 16:33:06 +02:00
Martin Kojtal
7656891179
Merge pull request #9638 from itayzafrir/crypto-access-control
...
Crypto Service - keys access control
2019-02-27 14:47:49 +01:00
Moran Peker
97a9652f3f
Use less stack
2019-02-27 15:34:22 +02:00
Moran Peker
4a2b06ed0d
Remove includes from mbedtls
2019-02-27 15:04:28 +02:00
Moran Peker
6e3d238ffd
Styling
2019-02-27 15:03:45 +02:00
Moran Peker
47f59b16cb
Correct psa-crypto include
2019-02-27 15:02:47 +02:00
Arto Kinnunen
05dc1f2f0e
Sync STM S2LP RF driver to v0.0.2
...
Sync with v0.0.2 in master repository.
2019-02-27 14:59:19 +02:00
Arto Kinnunen
e8225fbd7c
Sync with STM S2LP RF driver v0.0.1
...
Sync with v0.0.1 in master repository.
2019-02-27 14:59:19 +02:00
Arto Kinnunen
2c78427932
Sync with MCR20a RF driver v1.0.3
...
Sync with v1.0.3 in https://github.com/ARMmbed/mcr20a-rf-driver
2019-02-27 14:59:19 +02:00
Arto Kinnunen
3a9a50a7d7
Sync with Atmel RF driver v3.0.6
...
Sync with v3.0.6 in https://github.com/ARMmbed/atmel-rf-driver
2019-02-27 14:59:19 +02:00
Moran Peker
89ac1075df
Documented any non apache files
2019-02-27 14:14:45 +02:00
Moran Peker
7dd58b99cc
Add free to allocated buffer while error
2019-02-27 14:14:33 +02:00
Moran Peker
a268b81a57
Remove extra buffers used
...
outputting straight into the final destination
2019-02-27 14:14:32 +02:00
Moran Peker
25fa5a6138
Remove TEMP_IMPL_ID_DATA and TEMP_IMPL_ID_DATA_SIZE
...
remove from public header into attestation_bootloader_data.c and add
const to impl_id_data
2019-02-27 14:14:31 +02:00
Moran Peker
c97cecc273
Update TFM attestation code to latest version
...
The latest and greatest version is:
c43181daf54f69f53de58593a50dd6a9c233eecd
- Add new header file and implement tfm_memcpy (used in
attetstaion_core c file)
2019-02-27 14:14:30 +02:00
Moran Peker
2810d369f9
Remove incorrect free place
2019-02-27 14:14:29 +02:00
Moran Peker
661e2f92aa
Remove header files from inc into services/attestation folder
2019-02-27 14:14:29 +02:00
Moran Peker
f02f6e3cf9
Add newline at end of file and remove un needed commant
2019-02-27 14:14:28 +02:00
Moran Peker
92a9b3f736
Remove calling to "psa_crypto_init()"
...
No need to call psa_crypto_init before crypto operations
we assume init already called before. if not an error will return.
2019-02-27 14:14:28 +02:00
Moran Peker
2e7738b8eb
astyle fix
2019-02-27 14:14:27 +02:00
Moran Peker
41bd381462
General fixes of spelling, newline, un needed code
...
-Correct spelling errors
-Add newline at end of file
-Remove un needed code
2019-02-27 14:14:27 +02:00
Moran Peker
de3ee8e376
Using goto exit in attest_public_key_sha256 function
2019-02-27 14:14:26 +02:00
Moran Peker
d3c9860360
Free allocated buffers
2019-02-27 14:14:26 +02:00
Moran Peker
d9b22da91d
Remove calling to psa_crypto_init
...
- no need to call psa_crypto_init before crypto operations
we assume init already called before. if not an error will return.
2019-02-27 14:14:25 +02:00
Moran Peker
aa5b79a480
generated file update
2019-02-27 14:14:24 +02:00
Moran Peker
e60af99edb
Attestation: Add comments from temporary data
2019-02-27 14:14:24 +02:00
Moran Peker
2720b5a73d
Update include psa_defs -> psa/client
2019-02-27 14:14:23 +02:00
Moran Peker
f8e4626098
Attestation: move t_code folder place
2019-02-27 14:14:22 +02:00
Moran Peker
b3c6f709ca
Attestation: move qcbor folder place
2019-02-27 14:14:21 +02:00
Moran Peker
bd7061eaba
Attestation: Add close key after open key
2019-02-27 14:14:20 +02:00
Moran Peker
715305accf
Attestation: update boot status data
...
Epoc data to be 2 bytes instead of 4
2019-02-27 14:14:20 +02:00
Moran Peker
e0c5df50be
Attestation: Add parameter and entry size checks
2019-02-27 14:14:19 +02:00
Moran Peker
773fa44205
Update attestation asymmetric sign to use deterministic alg
...
- Add PSA_KEY_USAGE_VERIFY to attesttaion key usage
- Set deterministic alg to attestation key policy
- Call asymmetric sign with deterministic alg
2019-02-27 14:14:18 +02:00
Moran Peker
70a14b2f3a
Update to last version of TFM-Attesttaion code
...
-update TFM attestation files
-update attest_crypto.c and psa_attestation_stubs.c file to support TFM
code changes
2019-02-27 14:14:18 +02:00
Moran Peker
2117a26cb1
Get security lifecycle by psa_security_lifecycle_state function
...
-Add bug fix for psa_security_lifecycle_state function - PR #9745
-Remove lifecycle data from temp boot status data
-Update attesttation_partition_json file to use
PSA_PLATFORM_LC_GET and generate partition
code - auto generated files update
2019-02-27 14:14:17 +02:00
Moran Peker
4101ee92df
Add checks ,initialization,remove unneeded code and files license update
2019-02-27 14:14:14 +02:00
Moran Peker
080f4f4e69
Attestation: Update iat claims data
...
Add more iat claims: profile definition and verification service
Update boot status data: add more SW components for SW_S_NS module
2019-02-27 14:14:13 +02:00
Moran Peker
636753b404
Attestation: Add a new define for attestation private key id
2019-02-27 14:14:13 +02:00
Moran Peker
0a0bb04dfa
Attestation: Change files license to Apache
...
change all files except tfm code.
2019-02-27 14:14:12 +02:00
Moran Peker
8fc9c8fdab
Attestation: astyle fixs
...
Runing astyle over attestation file to pass CI
2019-02-27 14:14:11 +02:00
Moran Peker
a994499bf3
Atteststaion: Update header files
...
-Remove psa_initial_attesttaion.h
-Move psa_initial_attesttaion_api.h and psa_attest_inject_key.h into
inc folder
-Update include in test file
2019-02-27 14:14:11 +02:00
Moran Peker
5f45b0af92
Attestation: aut- generated files by generate_partition_code.py
...
Atestation paration added.
2019-02-27 14:14:09 +02:00
Moran Peker
9a4ea3d319
Add PSA Initial Attestation service
...
Attestation service can create a token on request, which contains a fix set of
device specific data.
Implementation:
-‘psa_initial_attest_get_token_size’- get exact size of initial attestation token in bytes.
-‘psa_initial_attest_get_token’- get the initial attestation token.
-‘psa_attestation_inject_key’ - Generate or import the attestation key pair and export the public part.
-Including CBOR lib and TFM attestation implemantation.
-Temporary claim’s data – no bootloader over V7 Single & Dual
2019-02-27 14:14:08 +02:00
Martin Kojtal
6bdbe754cd
Merge pull request #9799 from VeijoPesonen/bugfix-esp8266-dns
...
Increase events.share-eventsize to 768B because of ESP8266 AT driver and asynchronous DNS
2019-02-27 11:30:38 +01:00
Martin Kojtal
5ab69d5d6b
Merge pull request #9575 from itayzafrir/crypto-64-bit-key-ids
...
Crypto IPC 64 bit key ids for ITS
2019-02-27 09:29:18 +01:00
Veijo Pesonen
688a4e42bc
ESP8266: recv() is able to handle device busy indication
2019-02-27 09:54:43 +02:00
Cruz Monrreal
d96c9e8800
Merge pull request #9862 from netanelgonen/backward_support_its
...
Backward support PSA_ITS
2019-02-26 23:32:58 -06:00
Cruz Monrreal
d29312e7ac
Merge pull request #9808 from ARMmbed/feature-iar8
...
IAR 8 feature branch merge
2019-02-26 15:30:27 -06:00
Netanel Gonen
3e89a05e0b
add invalid argument incase receiving uid==0
2019-02-26 18:35:38 +02:00
Amir Cohen
5c7f6cb755
Merge SPIF & QSPIF components test to general block device tests
...
The SPIF and QPIF components tests are fully merged into general block device tests and were deleted
2019-02-26 10:28:45 -06:00
Netanel Gonen
d2eb2e4eb5
add backward support to error values
2019-02-26 18:27:15 +02:00
Deepika
d2e11966fc
Revert "rand() by default does increment of 1, randomizing more"
...
This reverts commit f7a6d254f6
.
2019-02-26 09:21:19 -06:00
itayzafrir
fc2b0726b6
Remove duplicate inclusion of header files
...
Remove duplicate inclusion of psa/client.h and psa/service.h
2019-02-26 12:30:20 +02:00
itayzafrir
ca94dc8673
Define MBEDTLS_PSA_CRYPTO_KEY_FILE_ID_ENCODES_OWNER
...
This enables crypto encoding an owner in key file IDs.
Added a static assert check in client side proxy.
2019-02-26 12:30:20 +02:00
itayzafrir
3992b83a52
crypto service: Assemble bit crypto key ids
2019-02-26 12:30:20 +02:00
itayzafrir
2b9b29455f
crypto service: Remove unused IPC argument and unneeded casts
2019-02-26 12:27:55 +02:00
Veijo Pesonen
2e5d1d959b
ESP8266: halts if unable to add an event to the event queue
2019-02-26 09:44:15 +02:00
Cruz Monrreal
15ccb32d31
Merge pull request #9836 from kfnta/tfm_patch
...
TF-M: Fix issues found in SPM tests
2019-02-25 19:58:38 -06:00
Cruz Monrreal
ed350dc533
Merge pull request #9758 from NirSonnenschein/large_buffer_support_for_hash_and_mac
...
allow hash or mac on large buffers with less memory use
2019-02-25 10:34:14 -06:00
Edison Ai
ebc961dab8
TF-M patch: Free connection handle in psa_reply (TF-M issue #263 )
...
- Link to bug tracking: https://developer.trustedfirmware.org/T263
2019-02-25 14:35:21 +02:00
Netanel Gonen
b5b0e981f8
reopening #9754 after the changes where overrun
...
changing the SPM error codes from invalid argument to bad state aligned to PSA spec
2019-02-25 11:55:47 +02:00
Nir Sonnenschein
1d4c280d2a
a-style fix for unrelated code
2019-02-25 00:46:06 +02:00
itayzafrir
37cc25726c
Add internal documentation to access control header file
...
This file is for internal use only.
2019-02-24 15:07:54 +02:00
itayzafrir
0c231b0ac9
Move include psa_crypto_core.h to C file
2019-02-24 15:07:54 +02:00
itayzafrir
672712ca8a
Add SPM_PANIC macro for TARGET_TFM
2019-02-24 15:07:54 +02:00
itayzafrir
99032f6967
Change PSA_CRYPTO_ACCESS_CONTROL_RESET into static inline function
2019-02-24 15:07:54 +02:00
itayzafrir
0ecd2c5da1
crypto service: Crypto access control
...
Implement crypto keys access control in crypto service:
- Only the key owner (the partition which created the key)
is allowed to manage (import/export/open/close/destroy/etc.)
the key.
- Only the key owner (the partition which created the key)
is allowed to use the key handle for crypto operations which
require a key handle.
2019-02-24 15:07:54 +02:00
Nir Sonnenschein
84b618704b
fix comment issues
2019-02-24 14:32:36 +02:00
Nir Sonnenschein
ffaf083b75
a-style fixes for code
2019-02-24 14:25:25 +02:00
Netanel Gonen
165719d11f
return the new values for key type & size even if function fails
2019-02-24 11:24:12 +02:00
Deepika
f7a6d254f6
rand() by default does increment of 1, randomizing more
...
Random number generation in case of IAR 8, requires TLS support.
Thread local storage is not part of Mbed OS, test is updated to have random
numbers sparse, but in future random number creation should be moved to main
thread, or use some other logic for randomization instead of rand() call.
2019-02-22 16:44:54 -06:00
Cruz Monrreal
497d0d65c3
Merge pull request #9802 from orenc17/patch-2
...
Fix psa_system_reset() on PSA IPC platform
2019-02-21 17:31:11 -06:00
Cruz Monrreal
870bd05904
Merge pull request #9708 from davidsaada/david_protected_storage
...
Implement PSA protected storage & restructure PSA storage implementation
2019-02-21 17:30:56 -06:00
Oren Cohen
922cdeab82
Update crypto IPC handling of negative errors
2019-02-21 20:59:18 +02:00
David Saada
41eb5cbfd9
Implement PSA protected storage & restructure PSA storage implementation
...
- Move all PSA storage code under psa/storage directory
- Create a global PSA error codes header, eliminating ITS specific ones
- Create a common header file for PSA storage type definitions,
eliminating ITS specific ones
- Create a common implementation for PS & ITS
- Implement protected storage feature
- Change ITS test to be common to PS as well
2019-02-21 20:58:59 +02:00
Oren Cohen
6b68bf7fdf
Fix psa_system_reset on PSA IPC platform
2019-02-21 19:50:02 +02:00
Michael Schwarcz
d2c433ccfe
TFM Importer: Update SHAa of TFM patches
2019-02-21 17:42:56 +02:00
Oren Cohen
8800ad5c80
TFM: Add defines to mbed_lib.json
2019-02-21 17:38:30 +02:00
Michael Schwarcz
6354b9a473
TF-M patch: More fixes to tfm_memory_check issue (TF-M issue #224 )
...
- Link to bug tracking: https://developer.trustedfirmware.org/T224
2019-02-21 17:38:30 +02:00
Cruz Monrreal
813c844fb4
Merge pull request #9745 from moranpeker/psa_security_lifecycle
...
Fix incorrect return value in psa_security_lifecycle_state (emul)
2019-02-20 12:12:56 -06:00
Martin Kojtal
ad2cb910f9
Merge pull request #9503 from VeijoPesonen/feature-esp8266_oob_handling_by_sigio
...
ESP8266: OOB handling done based on arrival of SIGIOs
2019-02-20 09:35:29 +01:00
Cruz Monrreal
9f6ee7db66
Merge pull request #9754 from netanelgonen/SPM_return_value
...
Fix SPM returning the wrong value
2019-02-19 15:29:48 -06:00
Cruz Monrreal
4c04771c5d
Merge pull request #9653 from kfnta/tfm_src_integ
...
TF-M sources integration to Mbed-OS
2019-02-19 15:28:44 -06:00
Cruz Monrreal
19474fcab1
Merge pull request #9617 from kjbracey-arm/spe_atomics
...
SPE: Fix up atomic usage
2019-02-19 15:27:54 -06:00
Michael Schwarcz
6a90da42fa
Add BSD3-clause license file to TF-M folder
2019-02-19 16:29:28 +02:00
Nir Sonnenschein
4a4af57c22
allow calling hash or mac on large buffers without large memory allocation
...
use a fixed size buffer for large inputs to process the input
in multiple smaller pieces.
2019-02-19 15:49:52 +02:00
Michael Schwarcz
9e33f0d8cd
Re-generate TF-M partition files
2019-02-19 15:19:07 +02:00
Alexander Zilberkant
0ba963acfc
Adding TF-M integration guide
2019-02-19 15:19:05 +02:00
Michael Schwarcz
cf3fd858ad
Align existing partitions to work with TF-M
...
- ITS
- Crypto
- Platform
2019-02-19 15:19:01 +02:00
Edison Ai
67a4e6d723
TF-M patch: Fix psa_set_rhandle() issue during CONNECT (TF-M issue #216 )
...
- Link to bug tracking: https://developer.trustedfirmware.org/T216
2019-02-19 15:19:00 +02:00
Michael Schwarcz
008bf1b2d1
TF-M patch: Fix wrong check in tfm_spm_check_client_version (TF-M issue #236 )
...
- Link to bug tracking: https://developer.trustedfirmware.org/T236
2019-02-19 15:19:00 +02:00
Michael Schwarcz
da01e3411f
TF-M patch: Fix tfm_psa_call_venner wrong argument type (TF-M issue #241 )
...
- Link to bug tracking: https://developer.trustedfirmware.org/T241
2019-02-19 15:18:59 +02:00
Michael Schwarcz
011fa28110
TF-M patch: Fix tfm_memory_check issue (TF-M issue #224 )
...
- Link to bug tracking: https://developer.trustedfirmware.org/T224
2019-02-19 15:18:59 +02:00
Michael Schwarcz
fc78640559
TF-M patch: Fix fixed-size partitions stack size (TF-M issue #240 )
...
- Link to bug tracking: https://developer.trustedfirmware.org/T240
2019-02-19 15:18:58 +02:00
Michael Schwarcz
0c23e86989
TF-M patch: Fix service handles not cleared issue (TF-M issue #230 )
...
- Link to bug tracking: https://developer.trustedfirmware.org/T230
2019-02-19 15:18:58 +02:00
Michael Schwarcz
5f2e4b3911
TF-M patch: Fix tfm_ns_lock_init issue (TF-M issue #239 )
...
- Link to bug tracking: https://developer.trustedfirmware.org/T239
2019-02-19 15:18:57 +02:00
Michael Schwarcz
1f30b52488
TF-M patch: General modifications
...
- Remove un-needed files
- Disable printf and uart
- Modify include paths
- Guard macros from mbed_lib with ifndef
2019-02-19 15:18:57 +02:00
Michael Schwarcz
8e62826991
Add mbed_lib.json to TF-M SPE
2019-02-19 15:18:56 +02:00
Michael Schwarcz
9277d0f586
Generate partition files
2019-02-19 15:18:56 +02:00
Michael Schwarcz
73ea7ca4c4
[trusted-firmware-m]: Updated to 45e5276
2019-02-19 15:18:55 +02:00
Netanel Gonen
1a87f24955
support in more types then just RSA_KEYPAIR
...
if the type is not supported the psa_crypto will return the error code
for unsupported
2019-02-19 14:47:11 +02:00
Netanel Gonen
d0dae03d01
Fix SPM returning the wrong value
2019-02-19 12:56:41 +02:00
Martin Kojtal
1892e2dd8e
Merge pull request #9741 from michalpasztamobica/esp8266_fix_nonblocking_connect
...
ESP8266: connect() returns OK in non-blocking calls
2019-02-18 13:22:19 +01:00
Veijo Pesonen
d6701c36a3
ESP8266: does OOB handling based on SIGIO and not on a certain interval
2019-02-18 12:39:16 +02:00
Moran Peker
fb9ae2faae
Fix incorrect return value in psa_security_lifecycle_state (emul)
...
psa_security_lifecycle_state should return uint32_t of the security
lifecycle state.
bug: psa_platfrom_lifecycle_get_impl return value
is psa_status_t.
2019-02-17 14:28:53 +02:00
Cruz Monrreal
7dbe541251
Merge pull request #9473 from VeijoPesonen/feature-esp8266_reset_handling
...
ESP8266: treats reset-ready-message as OOB
2019-02-15 12:29:51 -06:00
Michal Paszta
32686d48a8
ESP8266: connect() returns OK in non-blocking calls
2019-02-15 17:33:21 +02:00
Cruz Monrreal
c07410d78c
Merge pull request #9628 from kfnta/bare-metal-updates
...
Bare metal mbed_lib updates
2019-02-14 09:13:34 -06:00
Veijo Pesonen
cbbe2ff55e
ESP8266: retry reset attempt once in failure
2019-02-14 11:08:37 +02:00
Veijo Pesonen
2d6b63d5a2
ESP8266: prevents doing reset twice in a row, unnecessary
2019-02-14 11:08:36 +02:00
Veijo Pesonen
706dd39569
ESP8266: protects setting UART HW flow control with a mutex
2019-02-14 10:41:04 +02:00
Veijo Pesonen
108ec44b66
ESP8266: fixes UART HW flow control enabling sequence
2019-02-14 10:41:04 +02:00
Veijo Pesonen
71e5321f0f
ESP8266: fixes network status refresh procedure
2019-02-14 10:41:04 +02:00
Veijo Pesonen
876a397101
ESP8266: handles reset ready as OOB
...
Makes possible to recover from spurious resets addiotionally to planned
ones.
2019-02-14 10:41:04 +02:00
Cruz Monrreal
f2abdcbcc6
Merge pull request #9639 from michalpasztamobica/esp8266_connect_timeout
...
ESP8266: connect() checks errors from ESP chip
2019-02-13 20:00:37 -06:00
Oren Cohen
b5e8492458
Add PSA mbed-lib.json
2019-02-13 20:36:01 +02:00
Oren Cohen
45c44eb07c
Fix dependencies of platform partition
2019-02-13 17:10:12 +02:00
Michal Paszta
6a184da381
ESP8266: connect() can handle ESP's errors.
...
ESP8266Interface::connect() checks the exact return value from
the underlying ESP8266::connect() call.
Increased timeout for network-wifi greentea tests to 6 minutes.
2019-02-11 17:20:14 +02:00
offirko
be1c887477
Ensure unique block address for multi threaded test.
...
The addresses dont have to change each run, just be unique.
Because address seeds repeat themselves each run, rand() will
produce repeating results that should not collide between
different threads.
2019-02-11 14:41:41 +02:00
Kevin Bracey
a3e7a6d85a
SPE: Fix up atomic usage
...
PSA SPE code was using atomics, but not consistently. On the assumption
that the atomics are needed, correct the code to be properly atomic.
* Tighten up table full case - new_handle was left with a bogus value,
and surrounding code (as a result?) used loop index to assert success.
Make handle the sole output of the loop, and correct and use it.
* Ensure handle in table is cleared last, with atomic store to release.
* Make skipping of the invalid handle in handle generator loop atomic.
* Use atomic load on state assert, and don't re-read on failure.
* Tighten up types, and avoid casts by using new signed atomics.
2019-02-05 16:03:25 +02:00
Martin Kojtal
dcba5ffa3c
Merge pull request #9529 from kfnta/its_crypto
...
RollUp PR Crypto with ITS
2019-02-04 17:14:05 +01:00
Martin Kojtal
f1bf5dbd63
Merge pull request #9520 from VeijoPesonen/bugfix-esp8266_reduce_sigio
...
ESP8266: reduces SIGIO signaled to the upper layers
2019-02-01 08:23:35 +01:00
Oren Cohen
c11904e097
Fix compilation for single v7 platforms
2019-01-31 21:26:47 +02:00
Cruz Monrreal
b506b03055
Merge pull request #9456 from VeijoPesonen/feature-esp8266_mbed_error_if_wdt
...
ESP8266: calls MBED_ERROR if modem's watchdog reset gets triggered
2019-01-31 10:51:38 -06:00
Oren Cohen
27cfacec5c
Remove demand for MBED_SPM on single v7 platforms
2019-01-31 18:36:18 +02:00
Cruz Monrreal
ffc52e6a5e
Merge pull request #9478 from deepikabhavnani/refactor_sd
...
Refactor storage components
2019-01-31 10:21:38 -06:00
Cruz Monrreal
39d46280e2
Merge pull request #9475 from davidsaada/david_flashiap_no_default
...
FlashIAP Block device: Assert if default constructor is used without setting config parameters
2019-01-31 10:21:20 -06:00
itayzafrir
b7b85516cb
crypto service: Add documentation
2019-01-31 17:17:58 +02:00
Oren Cohen
ea9f104463
Fix Licenses
2019-01-31 17:17:58 +02:00
Oren Cohen
5d448d758c
Astyle
2019-01-31 17:17:57 +02:00
Oren Cohen
20478ba654
Last update
2019-01-31 17:17:57 +02:00
Oren Cohen
b0cbe815ec
Regenerate SPM data
2019-01-31 17:17:57 +02:00
Oren Cohen
98707d047b
Fix Typo
2019-01-31 17:17:57 +02:00
Oren Cohen
47365d4620
Update ITS test
2019-01-31 17:17:56 +02:00
Alexander Zilberkant
95f8dbce7b
Add new platform partition
2019-01-31 17:17:56 +02:00
Oren Cohen
cae1ebf33d
Add new ITS reset SID
...
Only accessible from SPE
2019-01-31 17:17:55 +02:00
Oren Cohen
156d3b785b
Replace psa_prot_internal_storage.h with psa/internal_trusted_storage.h
2019-01-31 17:17:54 +02:00
Oren Cohen
642fce5022
ITS 1.0
2019-01-31 17:17:54 +02:00
Oren Cohen
34895a05ad
CR fixes
2019-01-31 17:17:54 +02:00
Oren Cohen
8841ba69f8
Align to new spec changes and prep for TFM SPM
...
# Conflicts:
# components/TARGET_PSA/services/crypto/COMPONENT_PSA_SRV_IPC/psa_crypto_spm.c
# components/TARGET_PSA/services/crypto/COMPONENT_SPE/psa_crypto_partition.c
2019-01-31 17:17:53 +02:00
Oren Cohen
b08c0e2361
Create new PSA compliant headers
2019-01-31 17:17:52 +02:00
Oren Cohen
99b8eafc35
Align with PSA spec
...
* psa_error_t -> psa_status_t
* psa_invec_t -> psa_invec
* psa_outvec_t -> psa_outvec
* Use new PSA headers
2019-01-31 17:16:41 +02:00
deepikabhavnani
2952735ac0
Moved util (common test folder) inside the TESTS directory
...
Util was common test folder, which was kept outside as we had
no mechanism to have common files for various tests in tools.
Now same can be achieved by having COMMON folder inside tests
directory
2019-01-30 16:51:05 -06:00
deepikabhavnani
0d6bd2798f
Moved `mbed_lib.json` outside config folder
...
This is to have consistency across all storage components
2019-01-30 16:51:05 -06:00
Veijo Pesonen
53c2879a5c
ESP8266: makes guarding variable for deferring events atomic
2019-01-30 17:00:56 +02:00
Veijo Pesonen
7d3621dae4
ESP8266: reduces SIGIO signaled to the upper layers
2019-01-30 17:00:56 +02:00
Martin Kojtal
a4ed473afc
Merge pull request #9515 from VeijoPesonen/bugfix-tests-netsocket-udp_udpsocket_sendto_invalid
...
tests-netsocket-udp UDPSOCKET_SENDTO_INVALID allow unsupported empty UDP packet
2019-01-30 10:08:34 +01:00
Martin Kojtal
88d7ef155b
Merge pull request #9531 from theamirocohen/remove_flashiap_tests
...
Remove COMPONENT_FLASHIAP tests
2019-01-30 09:57:35 +01:00
Martin Kojtal
1031e2d464
Merge pull request #9236 from jeromecoutant/PR_SD_TEST
...
COMPONENT_SD tests update for small RAM targets
2019-01-30 09:54:41 +01:00
Amir Cohen
35df2de703
Remove COMPONENT_FLASHIAP tests
...
FlashIAPBlockDevice LittleFS ‘fopen’ falls on nightly tests
LittleFS test on FlashIAP is not relevant and thus removed
2019-01-29 13:54:40 +02:00
itayzafrir
861fb0cbf0
crypto service: Implement function psa_hash_clone over IPC
2019-01-29 11:43:27 +02:00
itayzafrir
81a4ff6425
crypto service: Implement IPC according to Mbed Crypto 1.0.0d1 API
...
1. Removed obsolete crypto APIs from IPC implementation.
2. Updated existing crypto APIs in IPC implementation.
3. Added new crypto APIs to IPC implemntation (except for psa_hash_clone).
2019-01-29 11:43:27 +02:00
Veijo Pesonen
d712568b8f
ESP8266: with empty packet send returns zero if TCP, unsupported otherwise
2019-01-28 13:46:48 +02:00
Cruz Monrreal
1b1c108528
Merge pull request #9484 from offirko/offir_test_fopen_fixes
...
Start Component SD test by formatting SD Card
2019-01-24 13:28:33 -06:00
Cruz Monrreal
7c4668cfe9
Merge pull request #9291 from j3hill/QSPI_Align
...
NRF5x: QSPI SFDP read, min read/write implementation
2019-01-24 13:25:05 -06:00
offirko
0bf071809c
Start test by formatting SD Card, otherwise FATFS mount might fail
...
Fix Jira: IOTSTOR-752
2019-01-24 12:44:04 +02:00
Cruz Monrreal
f790fdd1cd
Merge pull request #9421 from VeijoPesonen/feature-esp8266_nonblocking_connect
...
ESP8266: implements possibility to decide between non-blocking/blocking connect.
2019-01-23 22:47:51 -06:00
j3hill
2a72bb67a3
NRF5x: QSPI SFDP read implementation
2019-01-23 10:24:02 -06:00
j3hill
e9f08cb4d4
NRF5x: min read/write implementation
2019-01-23 09:55:27 -06:00
David Saada
22309c93d0
FlashIAP BD: Assert if default constructor is used w/o config change
2019-01-23 16:30:36 +02:00
Cruz Monrreal
0c85d441d2
Merge pull request #9408 from evva-sfw/feature/SPIF_ULBPR
...
SPIF - Fix command to unlock Global Block-Protection register
2019-01-22 23:59:21 -06:00
Veijo Pesonen
832eed02ce
ESP8266: calls MBED_ERROR if modem's watchdog reset gets triggered
2019-01-22 16:11:32 +02:00
Veijo Pesonen
c4d96e6309
ESP8266: provides blocking/non-blocking connect
...
Implements NetworkInterface::set_blocking() and implements the
functionality to distinguish between the two in connect()
2019-01-21 16:22:53 +02:00
Veijo Pesonen
58c1a88348
ESP8266: turns connect fully to non-blocking mode
...
Blocking mode connect is not supported anymore when this patch is
applied
2019-01-21 16:22:53 +02:00
Veijo Pesonen
c60c5244c1
ESP8266: makes connect() connection status aware
2019-01-21 14:43:35 +02:00
jeromecoutant
f3ba34a344
DIRS and SEEK SD tests update for small RAM targets
...
Test buffer size can now be specified for each target
2019-01-18 09:23:40 +01:00
Cruz Monrreal
309d9be347
Merge pull request #9386 from jeromecoutant/PR_SDJSON
...
SD default configuration for ST boards is already defined in TARGET_STM
2019-01-17 21:54:18 -06:00
Cruz Monrreal
30e0d8f1f6
Merge pull request #9366 from VeijoPesonen/bugfix-esp8266_verify_rcvd_data_len
...
ESP8266: add an error check for data overflow from modem side
2019-01-17 21:52:11 -06:00
Philipp Steiner
f0ec813d71
Update Comments
2019-01-17 11:13:16 -06:00
Philipp Steiner
167a3098c8
Add SPIF_ULBPR command also to QSPIFBlockDevice and SPIFReducedBlockDevice
2019-01-17 11:13:16 -06:00
Philipp Steiner
5f4ff5de8c
Add SPIF_ULBPR command and replace wrong command to clear all write-protection bits in the Block-Protection register.
2019-01-17 11:13:16 -06:00
Martin Kojtal
b59b93e828
Merge pull request #9331 from VeijoPesonen/bugfix-esp8266_udp_prevent_would_block
...
ESP8266: prevent WOULD BLOCK from TX if UDP
2019-01-17 12:41:42 +01:00
jeromecoutant
b070fb47d7
COMPONENT_SD default configuration for ST boards is already defined in TARGET_STM
2019-01-15 17:08:54 +01:00
Martin Kojtal
a180d69e60
Merge pull request #9356 from VeijoPesonen/bugfix-esp8266_disconnect_return_code
...
ESP8266 - fixes disconnect to check the state from modem
2019-01-15 10:38:40 +01:00
Martin Kojtal
ebf3a192e1
Merge pull request #9329 from juhaylinen/sdblockdevice-doc
...
SDBlockDevice docs update
2019-01-14 10:40:35 +00:00
Veijo Pesonen
02cd9f1884
[ESP8266] adds an error check for data overflow from modem side
2019-01-14 12:22:41 +02:00
Veijo Pesonen
e83b883e08
[ESP8266] fixes disconnect to check the state from modem
...
Additionally to internal bookkeeping lets check from the modem
that what is connection state in disconnect. There might be
inconsistencies.
2019-01-11 16:25:26 +02:00
Seppo Takalo
7db2292417
Flush ESP8266 serial input buffers after HW reset
2019-01-10 18:13:32 +02:00
Veijo Pesonen
e9ceff2450
[ESP8266] fixes a debug print
2019-01-10 14:33:15 +02:00
Veijo Pesonen
9a3c9a30b3
[ESP8266] Drop signalling SIGIO artificially if UDP send fails
...
With TCP it's desirable that SIGIO wakes up the application to check
if there is buffer space space available on the mode. With UDP the
behavior is not acceptable as we don't know if the other endpoint is
there as connection establishment is missing. Hence buffers might
stay full forever.
2019-01-10 14:33:15 +02:00
Martin Kojtal
e25611aad8
Merge pull request #9309 from VeijoPesonen/bugfix-esp8266_send_busy
...
ESP8266 - fix send buffer exhaustion handling
2019-01-10 12:24:09 +00:00
Mel W
66f5358c4b
some minor streamlining and editorial changes
2019-01-10 14:18:11 +02:00
Juha Ylinen
a4a99d61d2
SDBlockDevice docs update
2019-01-10 13:44:10 +02:00
Martin Kojtal
47e477cc97
Merge pull request #9310 from juhaylinen/spifblockdevice-doc
...
SPIFBlockDevice docs update
2019-01-10 10:53:19 +00:00
Cruz Monrreal
b9d5dceb72
Merge pull request #9284 from VeijoPesonen/bugfix-esp8266_socket_close
...
ESP8266: Fixes AT-layer socket_open-functions
2019-01-09 13:47:46 -06:00
Veijo Pesonen
7c112b2843
[ESP8266] socket_send() returns WOULD_BLOCK if server won't accept
...
Driver must return NSAPI_ERROR_WOULD_BLOCK if a server won't accept
data from the modem and the modem's buffers are full. In case that
socket is closed driver returns NSAPI_ERROR_CONNECTION_LOST.
2019-01-09 16:34:25 +02:00
Juha Ylinen
96877b80e6
SPIFBlockDevice docs update
2019-01-09 15:29:34 +02:00
Veijo Pesonen
4a9f86565a
[ESP8266] Fixes AT-layer socket_open-functions
...
When a socket open fails it musn't be treated as fatal error. Returning
a device error which is then handled by an application is the correct
solution
2019-01-09 13:20:52 +02:00
Seppo Takalo
8bf3ce3d68
ESP8266: Set HW reset time to 2ms
2019-01-08 18:18:46 +02:00
Martin Kojtal
a9ce91686c
Merge pull request #9264 from offirko/offir_qspif_reduce_trace_level
...
reduce info traces to debug level to prevent logs overflow
2019-01-08 12:38:51 +00:00
Martin Kojtal
1c3b6f4f94
Merge pull request #9268 from yossi2le/yossi_fix_flashiap_test
...
Calculate FlashIAPBlockDevice start address and size automatically for test only
2019-01-08 09:51:28 +00:00
Yossi Levy
bdeb54592f
This commit fixes an issue in which boards with FlashIAP block device enabled fails the FlashIAP block device tests exists under the component directory. That's because they have no start address and size configured in the mbed_lib.json file. In order to simplify the test for targets with no definitions in the mbed_lib.json, the test will calculate the start address as the first sector after the application ends and up to the max size available.
2019-01-07 15:20:58 +02:00