This commit modifies the Vector Table Offset Register in the startup
file, so it uses address coming from the user application instead of a
fixed one pointing to the bootloader. This change has been already
proposed for another STM32F4 board [1] to fix bootloader issues.
1. https://github.com/ARMmbed/mbed-os/issues/1666#issuecomment-386242991
We should really specify the littlefs and FAT FS licensing as separate
items, we should not just lump them together.
I also think we should point where the originals were picked up from.
With send(...) changing to non-block, modem can be busy in sending previous data and 'busy' the current 'AT+CIPCLOSE' command.
In blocking mode, add retries to avoid spurious close to some degree.
This is required to pass GT netsocket-tcp/netsocket-tls tests which expect close(...) to be OK.
This is because the ESP8266 is now waiting for SEND OK and takes much
more to complete the send_repeat, and echo_burst tests in RAAS.
(but has higher pass ratio).
1. Fix 'spurious close' by adding close() in open(). 'spurious close' gets frequent and cannot ignore when send() changes to asynchronous. User can retry open() until 'spurious close' gets true.
2. Allow only one actively sending socket because:
(1) ESP8266 AT packets 'SEND OK'/'SEND FAIL' are not associated with socket ID. No way to tell them.
(2) In original implementation, ESP8266::send() is synchronous, which implies only one actively sending socket.
3. Register 'SEND OK'/'SEND FAIL' oobs, like others in ESP8266::ESP8266 constructor. Don't get involved in oob management with send status because ESP8266 modem possibly doesn't reply these packets on error case.
4. Now that ESP8266::send() changes to asynchronous, drop the code with _parser.recv("SEND OK")/_parser.recv("SEND FAIL"). _parser.recv("SEND OK")/_parser.recv("SEND FAIL") and 'SEND OK'/'SEND FAIL' oobs both consume 'SEND OK'/'SEND FAIL' packets and complicate flow control.
We are now checking if ESP8266 has confirmed receiving data over serial
port with an undocumented (but existing) "Recv x bytes" message. Next we
are explicitly waiting for an official "SEND OK".
b3fe5744d1 Remove test files from the release
b2bf24ca85 Merge branch 'release_internal' into release_external
0ed25a7485 Fix errors found from coverity scan (#2386)
7a138f7e51 Added IID for border router info structure
4021b0c1ef LLC secure data duplicate check update and EAPOL relay duplicate fix
b190a97eeb Remove Thread-protocol from README (#2383)
ae8ae32cfe EAPOL relay agent rx filter from joiner side
0d4eb7a46e Removed dead code part
fc644f5e5b RPL new parent accept update and NUD operation
f5920e2d0c ETX API update and RPL ETX threshold callback update.
1fdee20a40 Wi-sun keep all candidates alive by NUD.
bd746da33d Key storage settings are no longer cleared on delete
bd388fcb08 Changed EAPOL initial-Key retries from 2 to 4 on large NW
a3d80a3235 WS bootstrap: Default CCA threshold to -60dBm (#2377)
72b26a72c2 Created extra large network setup for Wi-SUN
38dd4a6423 Corrected PTK and PMK lifetime handling
64f2a77239 Cleared EAPOL temporary trace print's.
02ec23fa27 Timed parent selection is now imim-imin*2 earlier there was just 5 seconds randomize.
3b2d906b75 Added check for network name and DODAG ID IID (EUI-64) (#2373)
ee45f4be32 Updated initial key trickles
184425b038 Fixed parent target address set.
07ec2374a1 Updated Discovery and RPL setup large & medium size network
a94d8f2e5d RPL version num update
9e2ac1d855 Double default eapol entry size for test purpose.
6b8beefb51 Clear all neighbors only on eapol next target check
faa19e1fba Corrected next address set
8a917fb9a5 Continue trickle on initial EAPOL-key TX failure
cfdb193c3e Merge pull request #2368 from ARMmbed/sync_with_mbedos
f7a15fa68d (via MbedOS) ws: added support for brazilian regulatory domain
c397edb121 Changed large network initial-key trickle parameters
758f5347b5 Added maximum frame counter storing interval
b0ea148d41 Corrected key storage configuration setting
be3c94e03b WS RPL paret soft filter update
8b1d537a02 Adjusted EAPOL limits and timers
9a2166869f Merge branch 'release_internal' into release_external
8e72b80826 MAC CCA thr: Check if channel out of range (#2363)
146a0a38c2 Corrected trace on authenticator
d04a96dd48 Merge pull request #2361 from ARMmbed/sync_with_mbedos
2c2b915198 Added empty function for ns time callback
76ac0decce Remove NCS36510 target
0258ac3197 Remove KW24D target
788f01b93d Netsocket/lwIP Stack: Remove support for ARM Compiler 5
2fbc7a1c4f Corrected invalid memory read on access revoke
941b9b42dc Updates to stagger/latency (#2358)
c2abaaafba Corrected defects
1811194bf2 Corrected warning trace, validations and ut stubs
69e2d1989e Added NS filesystem and interface to application
c5b6993ddd refactored packet ingress
a05605eca3 Unsecured packets will be acked by default automatically.
36dfb2924f MAC: Implemented automatic CCA threshold (#2353)
0396b9738c Revert EAPOL simplify failure handling and focus this problem later on.
b2fe3d49db Ignoring authentication failure if security protocol already started
11de56dad8 Added info API for Wi-SUN border router
87a4f691fe Added EAPOL key storage to authenticator and unified GTK storage (#2345)
ff1ca25ed7 EAPOL failure simplify and EAPOL relay agent add trace when eapol temp pool is empty
6667b31ae8 Update NA trace
34cdafe214 Temporary EAPOL neighbour entry Update and MAC MLME update
d092f833a8 Iotthd 3995 (#2347)
e2ea4e41f7 Disabled BR (TLS server) EC calculation queue
575985190d Changed the rate limiting function to calculate the values runtime
899e75510b Make it possible to update tr51 table to larger dynamically
8436669c10 Added configuration for DHCP lifetime value
da732bc28e When network name or PAN ID is changed authenticator updates MAC keys
git-subtree-dir: features/nanostack/sal-stack-nanostack
git-subtree-split: b3fe5744d1ab20792223ff08f08ef97a1f89682b