-
Notifications
You must be signed in to change notification settings - Fork 3k
Release candidate for mbed-os-5.11.5 #9805
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Like all HAL APIs, the calls in trng_api.h are not expected to be thread-safe. All current accesses to the TRNG HAL are currently via `mbedtls_hardware_poll`. Mbed TLS does not currently serialise these calls itself, as `MBEDTLS_THREADING_C` is not enabled. But even if Mbed TLS's own accesses were serialised, there are other direct users of `mbedtls_hardware_poll` such as randLIB, that need to use direct calls due to lack of API to extract entropy from Mbed TLS. As such it makes sense to treat `mbedtls_hardware_poll` as a de facto public Mbed OS API, akin to the C++ veneers on top of the HAL, and add a PlatformMutex there so that it is safe for multithreaded use.
Use PSA_NON_SECURE_ROM_START configuration value instead of hardcoded CY_CORTEX_M4_APPL_ADDR.
1. Removed random i/o glitches occurring during device reconfiguration 2. Fixed hazardous reads occurring at the end of transfer resulting in incorrect values being received 3. Added spi_free() function 4. Replaced default M0 image with a one ignoring i/o reservation. This is a workaround for missing proper destructors in Mbed drivers and BlockDevice tests failing on repeated initialization Fixes issue #9620.
When building secure targets, we would like compile only files that are in the the mbe-os root folder. This Fixes an issue when sending multiple --source parameters that are all inside the mbed-os tree
Previously, the CryptoToolbox was allocated once as part of the security manager. This was inneficient memory wise as it is only use to prepare key at initialization and when we need to compute shared keys. This was also inneficient power consumption wise as the Crypto cell was kept enabled even when it wasn't used. This fix creates a CryptoToolbox whenever it is needed and release it once it has fulfilled its purpose. Note that CryptoToolbox allocation happens on the heap as mbed tls data structure are huge and there's an high risk of crushing the stack.
In case mbedtls fails to execute handshake advertising MBEDTLS_ERR_SSL_WANT_READ or MBEDTLS_ERR_SSL_WANT_WRITE, TLSSocketWrapper::continue_handshake returns NSAPI_ERROR_WOULD_BLOCK.
Removed by mistake in 763cb4c
…nt have to change each run, just be unique. Because address seeds repeat themselves each run, rand() will produce repeating results that should not collide between different threads.
Port of NUC472/M487 crypto AC mgmt work to M2351: 1. Choose mutex to synchronize access to crypto non-SHA AC 2. Choose atomic flag to synchronize access to crypto SHA AC
Fix the following warning seen when built with GCC_ARM with mbed-cli v1.8.3 $ mbed compile -c -t GCC_ARM -m K64F <snip> [Warning] QUECTEL_M26_CellularStack.cpp@364,9: variable 'sent_acked' set but not used [-Wunused-but-set-variable] <snip>
Fixes a bug where after dropping bad packets receiver doesn't restore the socket back to non-blocking state as it's supposed to.
Test case is allowed to take not more than a half what has been given to the whole UDP suite. UDP test cases reorganized so that the longest running ones are executed last.
CI started |
This reverts commit 2a7f5e2.
@JanneKiiskila Please review and OK when able. |
Test run: FAILEDSummary: 3 of 8 test jobs failed Failed test jobs:
|
Reverted PR: #9616 (comment) |
CI restarted |
Test run: FAILEDSummary: 3 of 8 test jobs failed Failed test jobs:
|
ab03bcd
to
f5eb87c
Compare
CI restarted. |
@ARMmbed/mbed-os-psa Please review. Had to revert hte following PRs to get a locall F411 build to pass: |
Test run: SUCCESSSummary: 12 of 12 test jobs passed |
I've left comments in the PRs that they moved to 5.12. Not certain why but might be some dependancy. All of these should be fine for 5.12. But we should rather wait for psa team to confirm. |
@Patater could you confirm that the target configuration is fine? |
I had a look at targets.json between 5.11.0 and 5.11.5.
|
@Patater To the problem we had on master, by not having the PRs referenced above in 5.11.5 - are we fine? will client work as it was for previous patch release? My assumption would be yes. |
@0xc0170 Yes, the problem we had on master will not come up in 5.11.5 because there are no targets without guaranteed entropy having MBEDTLS_PSA_CRYPTO_C enabled. |
Confirmed, client tests are OK. This is ready for merge |
No description provided.