Commit Graph

420 Commits (aad114aa55978a9be9586c58e142a00f76313b14)

Author SHA1 Message Date
Oren Cohen aad114aa55 Genrerate SPM data 2019-03-03 10:54:54 +02:00
Oren Cohen 21d09b4156 Unify flags 2019-03-03 10:54:53 +02:00
Oren Cohen a65baf55c6 Update psa_wait() and client_id 2019-03-03 10:54:53 +02:00
Kevin Bracey c368021e37 SPIFBlockDevice.h: include SingletonPtr.h
SPIFBlockDevice was using SingletonPtr without an include,
and only getting it via SPI.h.

Spotted while changing SPI to not use SingletonPtr - now
abandoned, but still this shouldn't have been relying on it.
2019-03-01 14:33:33 +02:00
Cruz Monrreal 9d9a076f10
Merge pull request #9885 from VeijoPesonen/esp8266_conn_timeout_err2trace
ESP8266: graceful disconnect on network state timeout
2019-02-28 19:56:11 -06:00
Cruz Monrreal befed111f5
Merge pull request #9668 from moranpeker/psa-init-attestation
PSA Initial Attestation service
2019-02-28 18:25:16 -06:00
Cruz Monrreal b84439552a
Merge pull request #9883 from itayzafrir/crypto-service-proxy-mem-fix
Free dynamic memory in Crypto Service proxy (PSA targets)
2019-02-28 18:23:17 -06:00
Cruz Monrreal b5878b164d
Merge pull request #9871 from VeijoPesonen/bugfix-esp8266-recv_busy
ESP8266: receive is able to handle device busy indication
2019-02-28 18:22:54 -06:00
Moran Peker 83d084afef add casting to increased void pointer 2019-02-28 20:30:05 +02:00
Martin Kojtal 211db10aeb
Merge pull request #9828 from artokin/update_802154_rf_drivers
Update 802.15.4 RF drivers to the latest version
2019-02-28 17:53:50 +01:00
Moran Peker 116e14ade6 change license to file that mostly based on TF-M implementation
from Apache-2.0 to BSD-3-Clause
2019-02-28 16:00:53 +02:00
Moran Peker 2b8621aa6c initialized psa_hash_operation_t to zeros before calling hash_setup
-initialized  psa_hash_operation_t to zeros
-fix TF-M attestation code - increase t_cose_crypto_hash bytes to
handle max psa_hash_operation_t size
2019-02-28 15:54:45 +02:00
Moran Peker 6346442f03 Add SW_SIGNER_ID data to boot status 2019-02-28 15:52:16 +02:00
Moran Peker bca8091e52 astyle fix 2019-02-28 14:13:24 +02:00
Veijo Pesonen 7bb887fef4 ESP8266: in unknown network state driver tries to disconnect 2019-02-28 12:44:49 +02:00
itayzafrir 362c307d84 Free dynamic memory in crypto proxy 2019-02-28 11:36:31 +02:00
Moran Peker 49c6a1caaf fix void pointer increasing with bytes 2019-02-28 11:17:31 +02:00
avolinski e4c7144355 Prevent compiler warning, converting psa_key_policy_t to const in call to psa_set_key_policy 2019-02-27 18:57:58 +02:00
Moran Peker b847138819 astyle fix 2019-02-27 16:33:06 +02:00
Martin Kojtal 7656891179
Merge pull request #9638 from itayzafrir/crypto-access-control
Crypto Service - keys access control
2019-02-27 14:47:49 +01:00
Moran Peker 97a9652f3f Use less stack 2019-02-27 15:34:22 +02:00
Moran Peker 4a2b06ed0d Remove includes from mbedtls 2019-02-27 15:04:28 +02:00
Moran Peker 6e3d238ffd Styling 2019-02-27 15:03:45 +02:00
Moran Peker 47f59b16cb Correct psa-crypto include 2019-02-27 15:02:47 +02:00
Arto Kinnunen 05dc1f2f0e Sync STM S2LP RF driver to v0.0.2
Sync with v0.0.2 in master repository.
2019-02-27 14:59:19 +02:00
Arto Kinnunen e8225fbd7c Sync with STM S2LP RF driver v0.0.1
Sync with v0.0.1 in master repository.
2019-02-27 14:59:19 +02:00
Arto Kinnunen 2c78427932 Sync with MCR20a RF driver v1.0.3
Sync with v1.0.3 in https://github.com/ARMmbed/mcr20a-rf-driver
2019-02-27 14:59:19 +02:00
Arto Kinnunen 3a9a50a7d7 Sync with Atmel RF driver v3.0.6
Sync with v3.0.6 in https://github.com/ARMmbed/atmel-rf-driver
2019-02-27 14:59:19 +02:00
Moran Peker 89ac1075df Documented any non apache files 2019-02-27 14:14:45 +02:00
Moran Peker 7dd58b99cc Add free to allocated buffer while error 2019-02-27 14:14:33 +02:00
Moran Peker a268b81a57 Remove extra buffers used
outputting straight into the final destination
2019-02-27 14:14:32 +02:00
Moran Peker 25fa5a6138 Remove TEMP_IMPL_ID_DATA and TEMP_IMPL_ID_DATA_SIZE
remove from public header into attestation_bootloader_data.c and add
const to impl_id_data
2019-02-27 14:14:31 +02:00
Moran Peker c97cecc273 Update TFM attestation code to latest version
The latest and greatest version is:
c43181daf54f69f53de58593a50dd6a9c233eecd

- Add new header file and implement tfm_memcpy (used in
attetstaion_core c file)
2019-02-27 14:14:30 +02:00
Moran Peker 2810d369f9 Remove incorrect free place 2019-02-27 14:14:29 +02:00
Moran Peker 661e2f92aa Remove header files from inc into services/attestation folder 2019-02-27 14:14:29 +02:00
Moran Peker f02f6e3cf9 Add newline at end of file and remove un needed commant 2019-02-27 14:14:28 +02:00
Moran Peker 92a9b3f736 Remove calling to "psa_crypto_init()"
No need to call psa_crypto_init before crypto operations
we assume init already called before. if not an error will return.
2019-02-27 14:14:28 +02:00
Moran Peker 2e7738b8eb astyle fix 2019-02-27 14:14:27 +02:00
Moran Peker 41bd381462 General fixes of spelling, newline, un needed code
-Correct spelling errors
-Add newline at end of file
-Remove un needed code
2019-02-27 14:14:27 +02:00
Moran Peker de3ee8e376 Using goto exit in attest_public_key_sha256 function 2019-02-27 14:14:26 +02:00
Moran Peker d3c9860360 Free allocated buffers 2019-02-27 14:14:26 +02:00
Moran Peker d9b22da91d Remove calling to psa_crypto_init
- no need to call psa_crypto_init before crypto operations
we assume init already called before. if not an error will return.
2019-02-27 14:14:25 +02:00
Moran Peker aa5b79a480 generated file update 2019-02-27 14:14:24 +02:00
Moran Peker e60af99edb Attestation: Add comments from temporary data 2019-02-27 14:14:24 +02:00
Moran Peker 2720b5a73d Update include psa_defs -> psa/client 2019-02-27 14:14:23 +02:00
Moran Peker f8e4626098 Attestation: move t_code folder place 2019-02-27 14:14:22 +02:00
Moran Peker b3c6f709ca Attestation: move qcbor folder place 2019-02-27 14:14:21 +02:00
Moran Peker bd7061eaba Attestation: Add close key after open key 2019-02-27 14:14:20 +02:00
Moran Peker 715305accf Attestation: update boot status data
Epoc data to be 2 bytes instead of 4
2019-02-27 14:14:20 +02:00
Moran Peker e0c5df50be Attestation: Add parameter and entry size checks 2019-02-27 14:14:19 +02:00