Cruz Monrreal
9d9a076f10
Merge pull request #9885 from VeijoPesonen/esp8266_conn_timeout_err2trace
...
ESP8266: graceful disconnect on network state timeout
2019-02-28 19:56:11 -06:00
Cruz Monrreal
befed111f5
Merge pull request #9668 from moranpeker/psa-init-attestation
...
PSA Initial Attestation service
2019-02-28 18:25:16 -06:00
Cruz Monrreal
b84439552a
Merge pull request #9883 from itayzafrir/crypto-service-proxy-mem-fix
...
Free dynamic memory in Crypto Service proxy (PSA targets)
2019-02-28 18:23:17 -06:00
Cruz Monrreal
b5878b164d
Merge pull request #9871 from VeijoPesonen/bugfix-esp8266-recv_busy
...
ESP8266: receive is able to handle device busy indication
2019-02-28 18:22:54 -06:00
Moran Peker
83d084afef
add casting to increased void pointer
2019-02-28 20:30:05 +02:00
Martin Kojtal
211db10aeb
Merge pull request #9828 from artokin/update_802154_rf_drivers
...
Update 802.15.4 RF drivers to the latest version
2019-02-28 17:53:50 +01:00
Moran Peker
116e14ade6
change license to file that mostly based on TF-M implementation
...
from Apache-2.0 to BSD-3-Clause
2019-02-28 16:00:53 +02:00
Moran Peker
2b8621aa6c
initialized psa_hash_operation_t to zeros before calling hash_setup
...
-initialized psa_hash_operation_t to zeros
-fix TF-M attestation code - increase t_cose_crypto_hash bytes to
handle max psa_hash_operation_t size
2019-02-28 15:54:45 +02:00
Moran Peker
6346442f03
Add SW_SIGNER_ID data to boot status
2019-02-28 15:52:16 +02:00
Moran Peker
bca8091e52
astyle fix
2019-02-28 14:13:24 +02:00
Veijo Pesonen
7bb887fef4
ESP8266: in unknown network state driver tries to disconnect
2019-02-28 12:44:49 +02:00
itayzafrir
362c307d84
Free dynamic memory in crypto proxy
2019-02-28 11:36:31 +02:00
Moran Peker
49c6a1caaf
fix void pointer increasing with bytes
2019-02-28 11:17:31 +02:00
avolinski
e4c7144355
Prevent compiler warning, converting psa_key_policy_t to const in call to psa_set_key_policy
2019-02-27 18:57:58 +02:00
Moran Peker
b847138819
astyle fix
2019-02-27 16:33:06 +02:00
Martin Kojtal
7656891179
Merge pull request #9638 from itayzafrir/crypto-access-control
...
Crypto Service - keys access control
2019-02-27 14:47:49 +01:00
Moran Peker
97a9652f3f
Use less stack
2019-02-27 15:34:22 +02:00
Moran Peker
4a2b06ed0d
Remove includes from mbedtls
2019-02-27 15:04:28 +02:00
Moran Peker
6e3d238ffd
Styling
2019-02-27 15:03:45 +02:00
Moran Peker
47f59b16cb
Correct psa-crypto include
2019-02-27 15:02:47 +02:00
Arto Kinnunen
05dc1f2f0e
Sync STM S2LP RF driver to v0.0.2
...
Sync with v0.0.2 in master repository.
2019-02-27 14:59:19 +02:00
Arto Kinnunen
e8225fbd7c
Sync with STM S2LP RF driver v0.0.1
...
Sync with v0.0.1 in master repository.
2019-02-27 14:59:19 +02:00
Arto Kinnunen
2c78427932
Sync with MCR20a RF driver v1.0.3
...
Sync with v1.0.3 in https://github.com/ARMmbed/mcr20a-rf-driver
2019-02-27 14:59:19 +02:00
Arto Kinnunen
3a9a50a7d7
Sync with Atmel RF driver v3.0.6
...
Sync with v3.0.6 in https://github.com/ARMmbed/atmel-rf-driver
2019-02-27 14:59:19 +02:00
Moran Peker
89ac1075df
Documented any non apache files
2019-02-27 14:14:45 +02:00
Moran Peker
7dd58b99cc
Add free to allocated buffer while error
2019-02-27 14:14:33 +02:00
Moran Peker
a268b81a57
Remove extra buffers used
...
outputting straight into the final destination
2019-02-27 14:14:32 +02:00
Moran Peker
25fa5a6138
Remove TEMP_IMPL_ID_DATA and TEMP_IMPL_ID_DATA_SIZE
...
remove from public header into attestation_bootloader_data.c and add
const to impl_id_data
2019-02-27 14:14:31 +02:00
Moran Peker
c97cecc273
Update TFM attestation code to latest version
...
The latest and greatest version is:
c43181daf54f69f53de58593a50dd6a9c233eecd
- Add new header file and implement tfm_memcpy (used in
attetstaion_core c file)
2019-02-27 14:14:30 +02:00
Moran Peker
2810d369f9
Remove incorrect free place
2019-02-27 14:14:29 +02:00
Moran Peker
661e2f92aa
Remove header files from inc into services/attestation folder
2019-02-27 14:14:29 +02:00
Moran Peker
f02f6e3cf9
Add newline at end of file and remove un needed commant
2019-02-27 14:14:28 +02:00
Moran Peker
92a9b3f736
Remove calling to "psa_crypto_init()"
...
No need to call psa_crypto_init before crypto operations
we assume init already called before. if not an error will return.
2019-02-27 14:14:28 +02:00
Moran Peker
2e7738b8eb
astyle fix
2019-02-27 14:14:27 +02:00
Moran Peker
41bd381462
General fixes of spelling, newline, un needed code
...
-Correct spelling errors
-Add newline at end of file
-Remove un needed code
2019-02-27 14:14:27 +02:00
Moran Peker
de3ee8e376
Using goto exit in attest_public_key_sha256 function
2019-02-27 14:14:26 +02:00
Moran Peker
d3c9860360
Free allocated buffers
2019-02-27 14:14:26 +02:00
Moran Peker
d9b22da91d
Remove calling to psa_crypto_init
...
- no need to call psa_crypto_init before crypto operations
we assume init already called before. if not an error will return.
2019-02-27 14:14:25 +02:00
Moran Peker
aa5b79a480
generated file update
2019-02-27 14:14:24 +02:00
Moran Peker
e60af99edb
Attestation: Add comments from temporary data
2019-02-27 14:14:24 +02:00
Moran Peker
2720b5a73d
Update include psa_defs -> psa/client
2019-02-27 14:14:23 +02:00
Moran Peker
f8e4626098
Attestation: move t_code folder place
2019-02-27 14:14:22 +02:00
Moran Peker
b3c6f709ca
Attestation: move qcbor folder place
2019-02-27 14:14:21 +02:00
Moran Peker
bd7061eaba
Attestation: Add close key after open key
2019-02-27 14:14:20 +02:00
Moran Peker
715305accf
Attestation: update boot status data
...
Epoc data to be 2 bytes instead of 4
2019-02-27 14:14:20 +02:00
Moran Peker
e0c5df50be
Attestation: Add parameter and entry size checks
2019-02-27 14:14:19 +02:00
Moran Peker
773fa44205
Update attestation asymmetric sign to use deterministic alg
...
- Add PSA_KEY_USAGE_VERIFY to attesttaion key usage
- Set deterministic alg to attestation key policy
- Call asymmetric sign with deterministic alg
2019-02-27 14:14:18 +02:00
Moran Peker
70a14b2f3a
Update to last version of TFM-Attesttaion code
...
-update TFM attestation files
-update attest_crypto.c and psa_attestation_stubs.c file to support TFM
code changes
2019-02-27 14:14:18 +02:00
Moran Peker
2117a26cb1
Get security lifecycle by psa_security_lifecycle_state function
...
-Add bug fix for psa_security_lifecycle_state function - PR #9745
-Remove lifecycle data from temp boot status data
-Update attesttation_partition_json file to use
PSA_PLATFORM_LC_GET and generate partition
code - auto generated files update
2019-02-27 14:14:17 +02:00
Moran Peker
4101ee92df
Add checks ,initialization,remove unneeded code and files license update
2019-02-27 14:14:14 +02:00
Moran Peker
080f4f4e69
Attestation: Update iat claims data
...
Add more iat claims: profile definition and verification service
Update boot status data: add more SW components for SW_S_NS module
2019-02-27 14:14:13 +02:00
Moran Peker
636753b404
Attestation: Add a new define for attestation private key id
2019-02-27 14:14:13 +02:00
Moran Peker
0a0bb04dfa
Attestation: Change files license to Apache
...
change all files except tfm code.
2019-02-27 14:14:12 +02:00
Moran Peker
8fc9c8fdab
Attestation: astyle fixs
...
Runing astyle over attestation file to pass CI
2019-02-27 14:14:11 +02:00
Moran Peker
a994499bf3
Atteststaion: Update header files
...
-Remove psa_initial_attesttaion.h
-Move psa_initial_attesttaion_api.h and psa_attest_inject_key.h into
inc folder
-Update include in test file
2019-02-27 14:14:11 +02:00
Moran Peker
5f45b0af92
Attestation: aut- generated files by generate_partition_code.py
...
Atestation paration added.
2019-02-27 14:14:09 +02:00
Moran Peker
9a4ea3d319
Add PSA Initial Attestation service
...
Attestation service can create a token on request, which contains a fix set of
device specific data.
Implementation:
-‘psa_initial_attest_get_token_size’- get exact size of initial attestation token in bytes.
-‘psa_initial_attest_get_token’- get the initial attestation token.
-‘psa_attestation_inject_key’ - Generate or import the attestation key pair and export the public part.
-Including CBOR lib and TFM attestation implemantation.
-Temporary claim’s data – no bootloader over V7 Single & Dual
2019-02-27 14:14:08 +02:00
Martin Kojtal
6bdbe754cd
Merge pull request #9799 from VeijoPesonen/bugfix-esp8266-dns
...
Increase events.share-eventsize to 768B because of ESP8266 AT driver and asynchronous DNS
2019-02-27 11:30:38 +01:00
Martin Kojtal
5ab69d5d6b
Merge pull request #9575 from itayzafrir/crypto-64-bit-key-ids
...
Crypto IPC 64 bit key ids for ITS
2019-02-27 09:29:18 +01:00
Veijo Pesonen
688a4e42bc
ESP8266: recv() is able to handle device busy indication
2019-02-27 09:54:43 +02:00
Cruz Monrreal
d96c9e8800
Merge pull request #9862 from netanelgonen/backward_support_its
...
Backward support PSA_ITS
2019-02-26 23:32:58 -06:00
Cruz Monrreal
d29312e7ac
Merge pull request #9808 from ARMmbed/feature-iar8
...
IAR 8 feature branch merge
2019-02-26 15:30:27 -06:00
Netanel Gonen
3e89a05e0b
add invalid argument incase receiving uid==0
2019-02-26 18:35:38 +02:00
Amir Cohen
5c7f6cb755
Merge SPIF & QSPIF components test to general block device tests
...
The SPIF and QPIF components tests are fully merged into general block device tests and were deleted
2019-02-26 10:28:45 -06:00
Netanel Gonen
d2eb2e4eb5
add backward support to error values
2019-02-26 18:27:15 +02:00
Deepika
d2e11966fc
Revert "rand() by default does increment of 1, randomizing more"
...
This reverts commit f7a6d254f6
.
2019-02-26 09:21:19 -06:00
itayzafrir
fc2b0726b6
Remove duplicate inclusion of header files
...
Remove duplicate inclusion of psa/client.h and psa/service.h
2019-02-26 12:30:20 +02:00
itayzafrir
ca94dc8673
Define MBEDTLS_PSA_CRYPTO_KEY_FILE_ID_ENCODES_OWNER
...
This enables crypto encoding an owner in key file IDs.
Added a static assert check in client side proxy.
2019-02-26 12:30:20 +02:00
itayzafrir
3992b83a52
crypto service: Assemble bit crypto key ids
2019-02-26 12:30:20 +02:00
itayzafrir
2b9b29455f
crypto service: Remove unused IPC argument and unneeded casts
2019-02-26 12:27:55 +02:00
Veijo Pesonen
2e5d1d959b
ESP8266: halts if unable to add an event to the event queue
2019-02-26 09:44:15 +02:00
Cruz Monrreal
15ccb32d31
Merge pull request #9836 from kfnta/tfm_patch
...
TF-M: Fix issues found in SPM tests
2019-02-25 19:58:38 -06:00
Cruz Monrreal
ed350dc533
Merge pull request #9758 from NirSonnenschein/large_buffer_support_for_hash_and_mac
...
allow hash or mac on large buffers with less memory use
2019-02-25 10:34:14 -06:00
Edison Ai
ebc961dab8
TF-M patch: Free connection handle in psa_reply (TF-M issue #263 )
...
- Link to bug tracking: https://developer.trustedfirmware.org/T263
2019-02-25 14:35:21 +02:00
Netanel Gonen
b5b0e981f8
reopening #9754 after the changes where overrun
...
changing the SPM error codes from invalid argument to bad state aligned to PSA spec
2019-02-25 11:55:47 +02:00
Nir Sonnenschein
1d4c280d2a
a-style fix for unrelated code
2019-02-25 00:46:06 +02:00
itayzafrir
37cc25726c
Add internal documentation to access control header file
...
This file is for internal use only.
2019-02-24 15:07:54 +02:00
itayzafrir
0c231b0ac9
Move include psa_crypto_core.h to C file
2019-02-24 15:07:54 +02:00
itayzafrir
672712ca8a
Add SPM_PANIC macro for TARGET_TFM
2019-02-24 15:07:54 +02:00
itayzafrir
99032f6967
Change PSA_CRYPTO_ACCESS_CONTROL_RESET into static inline function
2019-02-24 15:07:54 +02:00
itayzafrir
0ecd2c5da1
crypto service: Crypto access control
...
Implement crypto keys access control in crypto service:
- Only the key owner (the partition which created the key)
is allowed to manage (import/export/open/close/destroy/etc.)
the key.
- Only the key owner (the partition which created the key)
is allowed to use the key handle for crypto operations which
require a key handle.
2019-02-24 15:07:54 +02:00
Nir Sonnenschein
84b618704b
fix comment issues
2019-02-24 14:32:36 +02:00
Nir Sonnenschein
ffaf083b75
a-style fixes for code
2019-02-24 14:25:25 +02:00
Netanel Gonen
165719d11f
return the new values for key type & size even if function fails
2019-02-24 11:24:12 +02:00
Deepika
f7a6d254f6
rand() by default does increment of 1, randomizing more
...
Random number generation in case of IAR 8, requires TLS support.
Thread local storage is not part of Mbed OS, test is updated to have random
numbers sparse, but in future random number creation should be moved to main
thread, or use some other logic for randomization instead of rand() call.
2019-02-22 16:44:54 -06:00
Cruz Monrreal
497d0d65c3
Merge pull request #9802 from orenc17/patch-2
...
Fix psa_system_reset() on PSA IPC platform
2019-02-21 17:31:11 -06:00
Cruz Monrreal
870bd05904
Merge pull request #9708 from davidsaada/david_protected_storage
...
Implement PSA protected storage & restructure PSA storage implementation
2019-02-21 17:30:56 -06:00
Oren Cohen
922cdeab82
Update crypto IPC handling of negative errors
2019-02-21 20:59:18 +02:00
David Saada
41eb5cbfd9
Implement PSA protected storage & restructure PSA storage implementation
...
- Move all PSA storage code under psa/storage directory
- Create a global PSA error codes header, eliminating ITS specific ones
- Create a common header file for PSA storage type definitions,
eliminating ITS specific ones
- Create a common implementation for PS & ITS
- Implement protected storage feature
- Change ITS test to be common to PS as well
2019-02-21 20:58:59 +02:00
Oren Cohen
6b68bf7fdf
Fix psa_system_reset on PSA IPC platform
2019-02-21 19:50:02 +02:00
Michael Schwarcz
d2c433ccfe
TFM Importer: Update SHAa of TFM patches
2019-02-21 17:42:56 +02:00
Oren Cohen
8800ad5c80
TFM: Add defines to mbed_lib.json
2019-02-21 17:38:30 +02:00
Michael Schwarcz
6354b9a473
TF-M patch: More fixes to tfm_memory_check issue (TF-M issue #224 )
...
- Link to bug tracking: https://developer.trustedfirmware.org/T224
2019-02-21 17:38:30 +02:00
Cruz Monrreal
813c844fb4
Merge pull request #9745 from moranpeker/psa_security_lifecycle
...
Fix incorrect return value in psa_security_lifecycle_state (emul)
2019-02-20 12:12:56 -06:00
Martin Kojtal
ad2cb910f9
Merge pull request #9503 from VeijoPesonen/feature-esp8266_oob_handling_by_sigio
...
ESP8266: OOB handling done based on arrival of SIGIOs
2019-02-20 09:35:29 +01:00
Cruz Monrreal
9f6ee7db66
Merge pull request #9754 from netanelgonen/SPM_return_value
...
Fix SPM returning the wrong value
2019-02-19 15:29:48 -06:00
Cruz Monrreal
4c04771c5d
Merge pull request #9653 from kfnta/tfm_src_integ
...
TF-M sources integration to Mbed-OS
2019-02-19 15:28:44 -06:00
Cruz Monrreal
19474fcab1
Merge pull request #9617 from kjbracey-arm/spe_atomics
...
SPE: Fix up atomic usage
2019-02-19 15:27:54 -06:00
Michael Schwarcz
6a90da42fa
Add BSD3-clause license file to TF-M folder
2019-02-19 16:29:28 +02:00
Nir Sonnenschein
4a4af57c22
allow calling hash or mac on large buffers without large memory allocation
...
use a fixed size buffer for large inputs to process the input
in multiple smaller pieces.
2019-02-19 15:49:52 +02:00
Michael Schwarcz
9e33f0d8cd
Re-generate TF-M partition files
2019-02-19 15:19:07 +02:00
Alexander Zilberkant
0ba963acfc
Adding TF-M integration guide
2019-02-19 15:19:05 +02:00
Michael Schwarcz
cf3fd858ad
Align existing partitions to work with TF-M
...
- ITS
- Crypto
- Platform
2019-02-19 15:19:01 +02:00
Edison Ai
67a4e6d723
TF-M patch: Fix psa_set_rhandle() issue during CONNECT (TF-M issue #216 )
...
- Link to bug tracking: https://developer.trustedfirmware.org/T216
2019-02-19 15:19:00 +02:00
Michael Schwarcz
008bf1b2d1
TF-M patch: Fix wrong check in tfm_spm_check_client_version (TF-M issue #236 )
...
- Link to bug tracking: https://developer.trustedfirmware.org/T236
2019-02-19 15:19:00 +02:00
Michael Schwarcz
da01e3411f
TF-M patch: Fix tfm_psa_call_venner wrong argument type (TF-M issue #241 )
...
- Link to bug tracking: https://developer.trustedfirmware.org/T241
2019-02-19 15:18:59 +02:00
Michael Schwarcz
011fa28110
TF-M patch: Fix tfm_memory_check issue (TF-M issue #224 )
...
- Link to bug tracking: https://developer.trustedfirmware.org/T224
2019-02-19 15:18:59 +02:00
Michael Schwarcz
fc78640559
TF-M patch: Fix fixed-size partitions stack size (TF-M issue #240 )
...
- Link to bug tracking: https://developer.trustedfirmware.org/T240
2019-02-19 15:18:58 +02:00
Michael Schwarcz
0c23e86989
TF-M patch: Fix service handles not cleared issue (TF-M issue #230 )
...
- Link to bug tracking: https://developer.trustedfirmware.org/T230
2019-02-19 15:18:58 +02:00
Michael Schwarcz
5f2e4b3911
TF-M patch: Fix tfm_ns_lock_init issue (TF-M issue #239 )
...
- Link to bug tracking: https://developer.trustedfirmware.org/T239
2019-02-19 15:18:57 +02:00
Michael Schwarcz
1f30b52488
TF-M patch: General modifications
...
- Remove un-needed files
- Disable printf and uart
- Modify include paths
- Guard macros from mbed_lib with ifndef
2019-02-19 15:18:57 +02:00
Michael Schwarcz
8e62826991
Add mbed_lib.json to TF-M SPE
2019-02-19 15:18:56 +02:00
Michael Schwarcz
9277d0f586
Generate partition files
2019-02-19 15:18:56 +02:00
Michael Schwarcz
73ea7ca4c4
[trusted-firmware-m]: Updated to 45e5276
2019-02-19 15:18:55 +02:00
Netanel Gonen
1a87f24955
support in more types then just RSA_KEYPAIR
...
if the type is not supported the psa_crypto will return the error code
for unsupported
2019-02-19 14:47:11 +02:00
Netanel Gonen
d0dae03d01
Fix SPM returning the wrong value
2019-02-19 12:56:41 +02:00
Martin Kojtal
1892e2dd8e
Merge pull request #9741 from michalpasztamobica/esp8266_fix_nonblocking_connect
...
ESP8266: connect() returns OK in non-blocking calls
2019-02-18 13:22:19 +01:00
Veijo Pesonen
d6701c36a3
ESP8266: does OOB handling based on SIGIO and not on a certain interval
2019-02-18 12:39:16 +02:00
Moran Peker
fb9ae2faae
Fix incorrect return value in psa_security_lifecycle_state (emul)
...
psa_security_lifecycle_state should return uint32_t of the security
lifecycle state.
bug: psa_platfrom_lifecycle_get_impl return value
is psa_status_t.
2019-02-17 14:28:53 +02:00
Cruz Monrreal
7dbe541251
Merge pull request #9473 from VeijoPesonen/feature-esp8266_reset_handling
...
ESP8266: treats reset-ready-message as OOB
2019-02-15 12:29:51 -06:00
Michal Paszta
32686d48a8
ESP8266: connect() returns OK in non-blocking calls
2019-02-15 17:33:21 +02:00
Cruz Monrreal
c07410d78c
Merge pull request #9628 from kfnta/bare-metal-updates
...
Bare metal mbed_lib updates
2019-02-14 09:13:34 -06:00
Veijo Pesonen
cbbe2ff55e
ESP8266: retry reset attempt once in failure
2019-02-14 11:08:37 +02:00
Veijo Pesonen
2d6b63d5a2
ESP8266: prevents doing reset twice in a row, unnecessary
2019-02-14 11:08:36 +02:00
Veijo Pesonen
706dd39569
ESP8266: protects setting UART HW flow control with a mutex
2019-02-14 10:41:04 +02:00
Veijo Pesonen
108ec44b66
ESP8266: fixes UART HW flow control enabling sequence
2019-02-14 10:41:04 +02:00
Veijo Pesonen
71e5321f0f
ESP8266: fixes network status refresh procedure
2019-02-14 10:41:04 +02:00
Veijo Pesonen
876a397101
ESP8266: handles reset ready as OOB
...
Makes possible to recover from spurious resets addiotionally to planned
ones.
2019-02-14 10:41:04 +02:00
Cruz Monrreal
f2abdcbcc6
Merge pull request #9639 from michalpasztamobica/esp8266_connect_timeout
...
ESP8266: connect() checks errors from ESP chip
2019-02-13 20:00:37 -06:00
Oren Cohen
b5e8492458
Add PSA mbed-lib.json
2019-02-13 20:36:01 +02:00
Oren Cohen
45c44eb07c
Fix dependencies of platform partition
2019-02-13 17:10:12 +02:00
Michal Paszta
6a184da381
ESP8266: connect() can handle ESP's errors.
...
ESP8266Interface::connect() checks the exact return value from
the underlying ESP8266::connect() call.
Increased timeout for network-wifi greentea tests to 6 minutes.
2019-02-11 17:20:14 +02:00
offirko
be1c887477
Ensure unique block address for multi threaded test.
...
The addresses dont have to change each run, just be unique.
Because address seeds repeat themselves each run, rand() will
produce repeating results that should not collide between
different threads.
2019-02-11 14:41:41 +02:00
Kevin Bracey
a3e7a6d85a
SPE: Fix up atomic usage
...
PSA SPE code was using atomics, but not consistently. On the assumption
that the atomics are needed, correct the code to be properly atomic.
* Tighten up table full case - new_handle was left with a bogus value,
and surrounding code (as a result?) used loop index to assert success.
Make handle the sole output of the loop, and correct and use it.
* Ensure handle in table is cleared last, with atomic store to release.
* Make skipping of the invalid handle in handle generator loop atomic.
* Use atomic load on state assert, and don't re-read on failure.
* Tighten up types, and avoid casts by using new signed atomics.
2019-02-05 16:03:25 +02:00
Martin Kojtal
dcba5ffa3c
Merge pull request #9529 from kfnta/its_crypto
...
RollUp PR Crypto with ITS
2019-02-04 17:14:05 +01:00
Martin Kojtal
f1bf5dbd63
Merge pull request #9520 from VeijoPesonen/bugfix-esp8266_reduce_sigio
...
ESP8266: reduces SIGIO signaled to the upper layers
2019-02-01 08:23:35 +01:00
Oren Cohen
c11904e097
Fix compilation for single v7 platforms
2019-01-31 21:26:47 +02:00
Cruz Monrreal
b506b03055
Merge pull request #9456 from VeijoPesonen/feature-esp8266_mbed_error_if_wdt
...
ESP8266: calls MBED_ERROR if modem's watchdog reset gets triggered
2019-01-31 10:51:38 -06:00
Oren Cohen
27cfacec5c
Remove demand for MBED_SPM on single v7 platforms
2019-01-31 18:36:18 +02:00
Cruz Monrreal
ffc52e6a5e
Merge pull request #9478 from deepikabhavnani/refactor_sd
...
Refactor storage components
2019-01-31 10:21:38 -06:00
Cruz Monrreal
39d46280e2
Merge pull request #9475 from davidsaada/david_flashiap_no_default
...
FlashIAP Block device: Assert if default constructor is used without setting config parameters
2019-01-31 10:21:20 -06:00
itayzafrir
b7b85516cb
crypto service: Add documentation
2019-01-31 17:17:58 +02:00
Oren Cohen
ea9f104463
Fix Licenses
2019-01-31 17:17:58 +02:00
Oren Cohen
5d448d758c
Astyle
2019-01-31 17:17:57 +02:00
Oren Cohen
20478ba654
Last update
2019-01-31 17:17:57 +02:00
Oren Cohen
b0cbe815ec
Regenerate SPM data
2019-01-31 17:17:57 +02:00
Oren Cohen
98707d047b
Fix Typo
2019-01-31 17:17:57 +02:00
Oren Cohen
47365d4620
Update ITS test
2019-01-31 17:17:56 +02:00
Alexander Zilberkant
95f8dbce7b
Add new platform partition
2019-01-31 17:17:56 +02:00
Oren Cohen
cae1ebf33d
Add new ITS reset SID
...
Only accessible from SPE
2019-01-31 17:17:55 +02:00