Ivan Grokhotkov
2c341a8557
console: minor fixes
...
- wrong comment
- duplicated setvbuf
2023-11-21 17:33:29 +01:00
sonika.rathi
633a3b06db
fix(vfs/uart): add UART VFS select callback in IRAM
...
UART VFS select callback is placed in IRAM when CONFIG_UART_ISR_IN_IRAM is enabled
2023-11-21 14:17:08 +01:00
luomanruo
d24f7d9f12
ble(fix): deinit crash issue
2023-11-21 15:05:22 +08:00
zwl
9cf6280eea
fix(ble): fixed ble occasional rx exception issue
2023-11-21 15:03:38 +08:00
luomanruo
2cf6c185dc
ci(ble/bluedroid): Add notes in sdkconfig.defaults
2023-11-21 15:03:38 +08:00
luomanruo
11f26f3319
ble: update controller log module
2023-11-21 15:03:38 +08:00
luomanruo
fcc8ce5de5
ble: update c6 h2 lib to 5b1dfd2b, c2 lib to db4e1fb2
2023-11-21 15:03:38 +08:00
luomanruo
2984e14eba
ble(fix): Fixed the issue of not returning memory to the memory pool after deinit callout
...
ble(fix): Fixed the issue of not returning memory to the memory pool after deinit callout
2023-11-21 15:03:38 +08:00
Rahul Tank
9571780d5e
ci(nimble): Cleanup sdkconfig files for nimble examples
2023-11-21 12:23:06 +05:30
Aditya Patwardhan
514cd783a3
Merge branch 'bugfix/esp32h2_ecdsa_hardware_k_v5.1' into 'release/v5.1'
...
fix(esp32h2): program use_hardware_k efuse bit for ECDSA key purpose (v5.1)
See merge request espressif/esp-idf!27271
2023-11-21 13:57:38 +08:00
Rahul Tank
6965a11570
fix(nimble): Generate a new unique Local IRK for each chip
2023-11-21 10:23:42 +05:30
Rahul Tank
4d88e7b9a7
Merge branch 'bugfix/remove_bond_v5.1' into 'release/v5.1'
...
fix(nimble):Handled IRK/LTK deletion based on key availability (v5.1)
See merge request espressif/esp-idf!26597
2023-11-21 12:47:54 +08:00
Jiang Jiang Jian
d578395041
Merge branch 'bugfix/secure_boot_v2_docs_v5.1' into 'release/v5.1'
...
fix(docs): correct the target specific macros for secure boot v2 guide (v5.1)
See merge request espressif/esp-idf!27170
2023-11-21 11:10:41 +08:00
morris
64e7343e40
Merge branch 'bugfix/fix_adc_read_zero_h2_v5.1' into 'release/v5.1'
...
ADC: fix adc raw data get 0 because of signal delay on ESP32H2(v5.1)
See merge request espressif/esp-idf!26976
2023-11-21 11:08:57 +08:00
Jiang Jiang Jian
0fa38244cb
Merge branch 'bugfix/newlib_test_correct_assertions_v5.1' into 'release/v5.1'
...
fix(newlib,ci): wrong floating point number handling in tests (v5.1)
See merge request espressif/esp-idf!27090
2023-11-21 11:08:32 +08:00
Jiang Jiang Jian
de81da8b53
Merge branch 'bugfix/fix_espcoredump_compilation_warning_v5.1' into 'release/v5.1'
...
fix(espcoredump): fixed compilation warning (v5.1)
See merge request espressif/esp-idf!26591
2023-11-21 11:07:57 +08:00
Jiang Jiang Jian
b3479b3164
Merge branch 'bugfix/docs_hw_breakpoints_num_v5.1' into 'release/v5.1'
...
fix(docs/jtag): Fix hard-coded HW breakpoints/watchpoints number (v5.1)
See merge request espressif/esp-idf!26500
2023-11-21 11:07:13 +08:00
Jiang Jiang Jian
2277c3c9dd
Merge branch 'feature/pseudo_exccause_to_openocd_v5.1' into 'release/v5.1'
...
Feature/pseudo exccause to openocd (v5.1)
See merge request espressif/esp-idf!26544
2023-11-21 11:06:41 +08:00
Jiang Jiang Jian
58344b1517
Merge branch 'backport-v5.1/gcov-write-fix' into 'release/v5.1'
...
fix(app_trace): fix host file write API return value
See merge request espressif/esp-idf!26421
2023-11-21 11:06:04 +08:00
morris
6bc8a025d5
Merge branch 'bugfix/ledc_max_duty_cycle_v5.1' into 'release/v5.1'
...
fix(ledc): fix ledc driver 100% duty cycle configuration (backport v5.1)
See merge request espressif/esp-idf!27179
2023-11-21 10:58:16 +08:00
Jiang Jiang Jian
e718b603e4
Merge branch 'bugfix/clear_ulp_wake_intr_in_wake_source_enable_v5.1' into 'release/v5.1'
...
fix(esp_hw_support): clear all type ULP wakeup intr status at ulp wakeup source enable (backport v5.1)
See merge request espressif/esp-idf!27188
2023-11-21 10:52:54 +08:00
Jiang Jiang Jian
0e1ec38785
Merge branch 'bugfix/fix_lightsleep_current_leakage_on_usj_pad_v5.1' into 'release/v5.1'
...
fix(esp_hw_support): fix lightsleep current leakage on usb pad (backport v5.1)
See merge request espressif/esp-idf!27205
2023-11-21 10:51:11 +08:00
Abhinav Kudnar
533b4a2e02
fix(nimble): Handled IRK/LTK deletion based on key availability
2023-11-21 07:15:56 +05:30
Rahul Tank
443a612a46
Merge branch 'bugfix/pairing_when_enc_with_no_key_fails_v5.1' into 'release/v5.1'
...
fix(nimble): Initate pairing if encryption fails with reason no pin or key missing (v5.1)
See merge request espressif/esp-idf!27017
2023-11-21 09:05:44 +08:00
Rahul Tank
c75bab8fcb
fix(nimble): Initate pairing if encryption fails with reason no pin or key missing
2023-11-20 20:22:48 +05:30
Rahul Tank
3b30594eef
Merge branch 'bugfix/ble_gap_unpair_oldest_peer_v5.1' into 'release/v5.1'
...
fix(nimble): Fixed incorrect handling of bonded devices (v5.1)
See merge request espressif/esp-idf!26939
2023-11-20 22:41:11 +08:00
Mahavir Jain
78453c8918
docs(ecdsa): add a note about TRNG dependency for ECDSA peripheral
2023-11-20 16:17:51 +05:30
Mahavir Jain
bb1376ff5d
fix(api-docs): include in the ECDSA APIs for doxygen build
2023-11-20 16:17:11 +05:30
Mahavir Jain
d9abb44049
docs: add ECDSA peripheral chapter for H2/P4
...
- Add ECDSA peripheral chapter and instructions to program efuse key block
- Update security guide for ECDSA peripheral mention for device identity
- Link with ESP-TLS guide about using ECDSA peripheral in TLS connection
2023-11-20 16:13:35 +05:30
Mahavir Jain
2cd1635b86
fix(ecdsa): remove unused k_mode from the ECDSA HAL/LL API
...
For ESP32-H2 case, the hardware k mode is always enforced through
efuse settings (done in startup code).
For ESP32-P4 case, the software k mode is not supported in the peripheral
itself and code was redundant.
2023-11-20 16:05:15 +05:30
Mahavir Jain
0ccfa4b0c2
fix(esp32h2): program use_hardware_k efuse bit for ECDSA key purpose
...
In ESP32-H2, the ECDSA peripheral by default uses the TRNG (hardware)
generated k value but it can be overridden to software supplied k.
This can happen through by overriding the `ECDSA_SOFTWARE_SET_K` bit
in the configuration register. Even though the HAL API is not exposed
for this but still it could be achieved by direct register
programming. And for this scenario, if sufficiently random k is not
supplied by the software then it could posses a security risk.
In this change, we are unconditionally programming the efuse
`ESP_EFUSE_ECDSA_FORCE_USE_HARDWARE_K` bit during startup security
checks itself. Additionally, same is ensured in the `esp_efuse_write_key`
API as well. This always enforces the hardware k mode in the ECDSA
peripheral and ensures strongest possible security.
2023-11-20 16:03:29 +05:30
Frantisek Hrbata
4c3beef656
feat(ci): add test for custom cmake CMAKE_EXECUTABLE_SUFFIX
...
Signed-off-by: Frantisek Hrbata <frantisek.hrbata@espressif.com>
2023-11-20 11:03:28 +01:00
Mahavir Jain
ecd485be87
Merge branch 'feat/ecdsa_perph_while_mutual_auth_v5.1' into 'release/v5.1'
...
Feat/ecdsa perph while mutual auth v5.1
See merge request espressif/esp-idf!27245
2023-11-20 18:03:19 +08:00
Arno Moonen
c6913fa397
fix(build): fix build failure if CMAKE_EXECUTABLE_SUFFIX is set
...
From: Arno Moonen <arno.moonen@airios.eu>
Follows original message from Arno Moonen <arno.moonen@airios.eu>
While integrating the ESP-IDF into our existing CMake structure,
I've come across quite some hurdles. Most I've been able to fix
in our CMake files, however this one I could not.
Most of the targets created by the esptool_py component assume
that the EXECUTABLE IDF build property (which contains the name
of the CMake executable target) always equals the name of the
created binary.
This is however not always true. For instance, in our setup we use
CMAKE_EXECUTABLE_SUFFIX_C and CMAKE_EXECUTABLE_SUFFIX_CXX in our
toolchain file (both set to .elf). If we do add_executable(my_app),
the target binary file would actually be my_app.elf.
In order to fix this, I've updated it to use the TARGET_FILE generated
expression. That way we also no longer need the EXECUTABLE_DIR IDF build
property here.
I've fixed this on v5.0.1 (as that's the ESP-IDF version I'm currently
trying to integrate), but I assume it should be easy to apply the same
fix to newer versions and the master branch as well.
Note that this problem might exist in multiple places where EXECUTABLE
is being used. While going through the ESP-IDF code base, I even noticed
that a few places actually already seem to use the TARGET_FILE expression.
To be honest the property name might be somewhat confusing as well, as it
is actually the executable target.
Closes https://github.com/espressif/esp-idf/pull/12558
2023-11-20 10:49:02 +01:00
Anton Maklakov
92ebdd9e16
Merge branch 'ci/fix_add_build_unit_test_jobs' into 'release/v5.1'
...
ci: add build unit test apps jobs (v5.1)
See merge request espressif/esp-idf!27156
2023-11-20 17:43:51 +08:00
Jiang Jiang Jian
5719d882d1
Merge branch 'bugfix/fix_onebyte_watchpoint_setting_v5.1' into 'release/v5.1'
...
fix(riscv): supports 1 byte and larger than 64byte range watchpoint setting (v5.1)
See merge request espressif/esp-idf!27215
2023-11-20 17:37:03 +08:00
Jiang Jiang Jian
ea081e04b9
Merge branch 'bugfix/dpp_config_memset_v5.1' into 'release/v5.1'
...
Wi-Fi: Fixed some DPP issues (v5.1)
See merge request espressif/esp-idf!27192
2023-11-20 16:52:20 +08:00
Jiang Jiang Jian
2348a0a61d
Merge branch 'bufix/Backport_some_lwip_bugs_for_5.1_1115' into 'release/v5.1'
...
Bufix/backport some lwip bugs for 5.1 1115
See merge request espressif/esp-idf!27149
2023-11-20 16:09:30 +08:00
darshan
ca4ba28613
fix(nimble): Fixed incorrect handling of bonded devices
2023-11-20 12:27:18 +05:30
Rahul Tank
a08c557001
Merge branch 'bugfix/validate_random_address_v5.1' into 'release/v5.1'
...
fix(nimble): Added check to validate allowed random address (v5.1)
See merge request espressif/esp-idf!26928
2023-11-20 14:48:33 +08:00
Wang Meng Yang
00936f9434
Merge branch 'feature/support_for_32_and_128_bit_custom_uuids_v5.1' into 'release/v5.1'
...
feat(bt/bluedroid): Add new APIs for 32 and 128-bit UUIDs (backport v5.1)
See merge request espressif/esp-idf!27230
2023-11-20 14:07:56 +08:00
Jin Cheng
b9a0ca6feb
fix(bt/bluedroid): corrected the API documents of profile HFP and A2DP
2023-11-20 11:59:05 +08:00
Jin Cheng
e4ab4499b0
fix(bt/bluedroid): Added some argument check in APIs of HFP AG
2023-11-20 11:59:01 +08:00
Mahavir Jain
fcd0b8b8e9
Merge branch 'fix/https_request_example_build_with_esp_wolfssl_v5.1' into 'release/v5.1'
...
fix(esp-tls): Fix the https_request example build for esp-wolfssl (v5.1)
See merge request espressif/esp-idf!26735
2023-11-20 11:07:36 +08:00
Rahul Tank
7e21aff12c
fix(nimble): Added check to validate allowed random address
2023-11-20 08:19:38 +05:30
Rahul Tank
81a4a86196
Merge branch 'bugfix/ble_gap_connect_v5.1' into 'release/v5.1'
...
fix(nimble):Handled the Load access fault crash caused due to an invalid setting of index-variable 'reattempt_idx' (v5.1)
See merge request espressif/esp-idf!26944
2023-11-20 10:41:26 +08:00
Abhinav Kudnar
c91c8a1197
fix(nimble): Handled crash caused due to incorrect use of reattempt_idx
2023-11-18 17:16:17 +05:30
Rahul Tank
57090788ec
Merge branch 'feature/walkthrough_for_coc_ble_prph_v5.1' into 'release/v5.1'
...
doc (nimble): Added the tutorial for coc_bleprph example. (v5.1)
See merge request espressif/esp-idf!26480
2023-11-18 16:21:42 +08:00
Rahul Tank
54e3737202
Merge branch 'feature/protocomm_update_params_v5.1' into 'release/v5.1'
...
fix(protocomm): added Protocomm BLE Event Structure and Event Handling (v5.1)
See merge request espressif/esp-idf!26899
2023-11-18 16:16:48 +08:00
Island
4023a22512
Merge branch 'bugfix/fix_some_ble_bugs_v5.1' into 'release/v5.1'
...
Fixed some BLE bugs (backport v5.1)
See merge request espressif/esp-idf!27196
2023-11-17 20:21:57 +08:00