Commit Graph

3676 Commits (main)
 

Author SHA1 Message Date
Gaurav-Aggarwal-AWS 008affa7bf
Add demo project for Polarfire board (#679)
Add the demo project for PolarFire SoC

Signed-off-by: Gaurav Aggarwal <aggarg@amazon.com>
3 years ago
Gaurav-Aggarwal-AWS a40172758a
Update submodule pointers (#680)
* Update submodule pointers

This is needed to address doxygen failures (Which are already fixed in
the submoduled repos).

Signed-off-by: Gaurav Aggarwal <aggarg@amazon.com>
3 years ago
Gaurav-Aggarwal-AWS 1b2c5605ca
Update code to extract versions from string (#678)
This is needed to correctly handle patch versions.

Signed-off-by: Gaurav Aggarwal <aggarg@amazon.com>
4 years ago
Gaurav-Aggarwal-AWS 687c50f390
Update release script to upload source code zip (#676)
Signed-off-by: Gaurav Aggarwal <aggarg@amazon.com>
4 years ago
JD 4744787e55
Added 'extern "C"' to FreeRTOS-CLI header file. (#674)
Co-authored-by: JD Scott <jscott@hotstart.com>
4 years ago
Gaurav-Aggarwal-AWS 455793a295
Add do-not-push flag in the release script (#673)
This flag enables a user to only make local commits for various steps
and not push them to the remote.

Signed-off-by: Gaurav Aggarwal <aggarg@amazon.com>
4 years ago
Archit Aggarwal 9f426a4a54
Hygiene update to manifest verification in CI (#671)
As the manifest verification script has been moved to FreeRTOS/CI-CD-Github-Actions as a GitHub Action along with the added functionality of verifying that manifest.yml versions match the current submoduled pointers in the repository, this PR updates the CI check for manifest verification to take advantage of the new manifest-verifier action from the repository.
4 years ago
Gaurav-Aggarwal-AWS 5f21507703
Add prints for CI (#670)
* Add prints for CI markers

Signed-off-by: Gaurav Aggarwal <aggarg@amazon.com>
4 years ago
Archit Aggarwal 5c9ab8dcce
Add mechanism for generating memory statistics report (#668)
To validate that the FreeRTOS/CI-CD-Github-Actions/memory_statistics/paths.json configuration is correct, this PR adds a CI check mechanism to generate the memory statistics report in JSON format. Additionally, the CI check also uploads the report as an artifact (for main and release-candidate branches ONLY) for user accessibility of the generated report.
4 years ago
Archit Aggarwal d122d26d7d
Re-add submodules to Community and Partner Contribution repos (#669) 4 years ago
tianmc1 67e5d4e6ec [AUTO][RELEASE]: Bump submodules per manifest.yml for V202107.00 4 years ago
tianmc1 176f1cae02 [AUTO][RELEASE]: Bump file header version to "202107.00" 4 years ago
tianmc1 40c9e37d10
Updated submodule libraries to latest release (#667)
* Updated submodule libraries to latest release

* Updated pointer for FreeRTOS-Plus-TCP

* Updated README about SNTP

* Updated link for coreSNTP on freertos.org

* Updated corePKCS11 to 'update-pkcs11submodule' branch for testing

* Update corePKCS11 version in manifest.yml

* Updated corePKCS11 pointer to v3.1.0

Co-authored-by: Oscar Michael Abrina <abrinao@amazon.com>
Co-authored-by: Archit Aggarwal <architag@amazon.com>
4 years ago
lienng_aws 01614ca997
Replace library links with the application-protocols one (#665)
* Replace library links with the application-protocols one

The ReadMe.txt refers to library link on FreeRTOS.org which will not be available until after the library is released in github. Instead, use top level page https://www.freertos.org/application-protocols.html which lists all the libraries in this directory which is also easy for user to navigate and could avoid this issue when releasing new library.

* Update FreeRTOS-Plus/Source/Application-Protocols/readme.txt

Co-authored-by: Archit Aggarwal <architag@amazon.com>

* Update FreeRTOS-Plus/Source/Application-Protocols/readme.txt

Co-authored-by: Paul Bartell <pbartell@amazon.com>

Co-authored-by: Archit Aggarwal <architag@amazon.com>
Co-authored-by: Paul Bartell <pbartell@amazon.com>
4 years ago
Archit Aggarwal 69b9155bad
Hygiene changes of old Demo folders and temporary removal of submodules (#666)
* Remove submodules of community and partner contribution repos, and stale directory of FreeRTOS+UDP

* Obselete NTP demo and rename of HTTP server demo folder

* Update manifest.yml
4 years ago
jasonpcarroll 64eaecc31b
Updated README.md to reflect Windows symlink issues. (#660)
Co-authored-by: Jason Carroll <czjaso@amazon.com>
4 years ago
tianmc1 17efff0e34
Updated kernel submodule pointer to kernel V10.4.4 release (#664)
* Updated kernel submodule pointer to kernel V10.4.4 release

* Updated manifest.yml
4 years ago
Shivangi b5ab5087db
[P3] SubModules pointer update of was libraries to latest commits (#663)
* Updating device shadow to latest commit

* updating jobs pointer

* Updating device-defender pointer
4 years ago
alfred gedeon ae92d8c6ee
Add uncrustify github workflow (#659)
* Add uncrustify github workflow

* Fix exclusion pattern

* fix find expression

* exclude uncrustify files

* Uncrustify common demo and test files

* exlude white space checking files

* Fix EOL whitespace checker

* Remove whitespaces from EOL

* Fix space at EOL

* Fix find spaces at EOL

Co-authored-by: Archit Aggarwal <architag@amazon.com>
4 years ago
Oscar Michael Abrina dd80d615b5
Remove duplicate error.c in WIN32.vcxproj.filters files (#662) 4 years ago
Gaurav-Aggarwal-AWS e2b1d46340
Update the template readme file (#658)
Update instructions to use repositories instead of directories.

Signed-off-by: Gaurav Aggarwal <aggarg@amazon.com>
4 years ago
Archit Aggarwal 1e4f79709c
Some changes for upcoming release (#657)
Update mbedTLS submodule to v2.26.0 and update History.txt
4 years ago
Shivangi 6c17a54685
CorePKCS11 Muthual Auth demo fix (#656) 4 years ago
tianmc1 aa1eed8b4e
Defender demo cleanup (#651) 4 years ago
Oscar Michael Abrina 63d38b846e
Remove redundant mbedtls error sources (#654)
Since `mbedtls_error.c` is already part of the mbedTLS submodule, the duplicate files are removed from this repository.

Co-authored-by: Cobus van Eeden <35851496+cobusve@users.noreply.github.com>
4 years ago
Archit Aggarwal a44df5c1b9
Fix clock drift issue in SNTP demo (#655)
Issue
The existing clock discipline algorithm in the coreSNTP demo yields an inaccurate wall-clock time (in UTC) that is always behind the astronomical UTC time by the chosen polling interval period of the demo. The issue with the clock discipline algorithm was that it was calculating the slew rate to make the system clock be gradually compensated for the previous time synchronization clock drift over the period of the subsequent polling time interval. Thereby, the clock slew rate correction calculated is always lower than it should be (because it does not incorporate possible clock drift that would occur over another period of time polling interval till the next time synchronization attempt).

Fix
This PR fixes the clock discipline algorithm to make the demo calculate its system time that matches the astronomical UTC time.
The fix involves simplifying the clock discipline algorithm to use a combination of step and slew correction approaches where:

1. Step correction is applied on EVERY time successful synchronization with a time server. This immediately corrects the system time to match server time.
2. Slew rate is calculated ONCE (on the second successful time synchronization with server) and applied henceforth, on every time polling interval period to compensate gradually for the system clock drift during the period.
4 years ago
Shivangi a9c27ccdac
[P3] Update corePKCS11 demo to read the public key (#652)
* PKCS11 fix
4 years ago
Gaurav-Aggarwal-AWS 2fedeff332
Update BSP and SDK for HiFive board (#645)
* Update BSP and SDK for HiFive board

This commit also adds demo start and success/failure output messages.
4 years ago
Archit Aggarwal b550e6090d
Add note in coreSNTP demo about Network Time Security (NTS) (#648)
This PR makes the following changes in the coreSNTP demo:

To suggest the most secure way of using SNTP communication, we are adding a documentation note about the Network Time Security in the SNTP demo.
Hygiene update of using the FreeRTOS/backoffAlgorithm utility library for calculating time polling period interval backoff when time requests are rejected by a time server.
4 years ago
alfred gedeon e38c279b22
Fix: qemu mps2 demo bug (#649) 4 years ago
tianmc1 096824515f
Cleaned up report_builder in defender_demo_json (#644) 4 years ago
Archit Aggarwal 5a4fe788d7
Update coreSNTP demo to avoid issues from open UDP socket (#647)
Issue
There is a possible vulnerability of Denial of Service attack by keeping the UDP socket for the SNTP client task always open in the coreSNTP demo. The Denial of Service attack can occur from receiving multiple server response (duplicated or malicious) for a single SNTP time request sent by the client, and thereby, filing the socket network buffer response packets that affect future time requests.

Solution
This PR fixes this vulnerability by updating the demo to keep a UDP socket open only for the time period of waiting for server response, closing the socket on either receiving a server response or experiencing server timeout, and re-creating a UDP socket for the next polling try. This PR also adds another security functionality using a random port for UDP socket to protect against spoofing attacks from "off-network path" attackers.
4 years ago
Shivangi 3fd635b39e
[P3] Submodule pointer update to LTS Libraries (#640)
* moved submodule to backoff v1.0.1

* move corehttp module to latest commit

* move coremqtt module to latest commit

* move coremqtt Agent module to latest commit

* move coreSNTP Agent module to latest commit

* move coreJSON Agent module to latest commit

* move corePKCS11 Agent module to latest commit

* Reverting coreHttp to previous commit

* Updating coreHttp pointer after fix
4 years ago
alfred gedeon 693a9994b0
Add static to a variable in Qemu mps2 demo (#646) 4 years ago
alfred gedeon d663850e1b
Demo: Exit on Error with Qemu MPS2 Full Demo (#642) 4 years ago
alfred gedeon 141070a2eb
Demo: Run uncrustify on quemu mps2 demo (#643) 4 years ago
Graham Sanderson 25e73f2e75
RP2040 Demo (#618)
* Fix code to match comment; idle prioriry task should not block to yield, as then it will hardly run at all (bug affects SMP tests)

* Add RP2040 Demo - can be used for 'main' or 'smp' branch of FreeRTOS_Kernel

* move to latest main/ of FreeRTOS-Kernel

* move RP2040 demos into Community-Supported

* Update whitespace issue

Co-authored-by: Gaurav-Aggarwal-AWS <33462878+aggarg@users.noreply.github.com>

* Add SMP to lexicon

Co-authored-by: Gaurav-Aggarwal-AWS <33462878+aggarg@users.noreply.github.com>
4 years ago
Gaurav-Aggarwal-AWS bec88bfe41
Update the size of privileged data section (#639)
This is needed because FreeRTOS heap is now placed in the privileged
data section.

Signed-off-by: Gaurav Aggarwal <aggarg@amazon.com>
4 years ago
tianmc1 6ef5c92233
Updated device-shadow submodule to support named shadow, and updated demo to use named shadow (#636) 4 years ago
Shivangi d1c84a324a
Template Project for existing FreeRTOS port (#637)
* Partner demo changes

* Adding template folder

* readme addition to partner supported folder

* updating license

Co-authored-by: Gaurav-Aggarwal-AWS <33462878+aggarg@users.noreply.github.com>
4 years ago
thomas-coding b8bcbf2a40
Fix data copy address error (#634) 4 years ago
Alfred Gedeon a14f136596 Doc: Add new lines 4 years ago
Alfred Gedeon 449ad960e2 Doc: Improve debugging doc with Qemu demo 4 years ago
thomas-coding e66c4a93ee
Fix data copy address error (#632)
* Fix data copy address error

Co-authored-by: Jinping Wu <jinping.wu@verisilicon.com>
4 years ago
Archit Aggarwal ac5bf3b934
Update coreSNTP submodule and coreSNTP demo (#631)
Update the coreSNTP submodule to the latest commit. Also, make updates to the coreSNTP demo for the new changes in the SNTP library which include the following:

1. Update to the type for packet size from size_t to uint16_t for parameters in the transport and authentication interfaces.
2. Change in the call to Sntp_SendTimeRequest API to pass the new blockTimeMs parameter added to the API.
3. Update to the clock-offfset type from int32_t to int64_t for representing information in milliseconds. To accommodate this update in the SntpSetTime_t interface, the mathematical model for representing system clock has been updated to store slew rate as milliseconds/second (instead of second/second). This change improves the accuracy of the WinSim demo time correction (because the milliseconds of time difference between server and client time is corrected over the entire polling interval which makes a significant difference!).

This PR also adds demo config macros for setting the block time values passed to the Sntp_SendTimeRequest and Sntp_ReceiveTimeResponse APIs.
4 years ago
victorfdezc 4c4a0ab755
Fix Bug from Issue #565 (#629)
Co-authored-by: Victor <vfernandez@maccorobotics.com>
Co-authored-by: Paul Bartell <pbartell@amazon.com>
Co-authored-by: Shivangi <66447522+gshvang@users.noreply.github.com>
4 years ago
Archit Gupta 434eeadf9f
Add new demo submodules to manifest.yml (#630) 4 years ago
Archit Gupta 5e596c2e32
Add new submodules for port demo contribution (#628)
Adds two new submodules for community and partner supported ports demos.
4 years ago
Archit Aggarwal 5a41846f05
Add authentication support to coreSNTP demo (#625)
Update the coreSNTP demo to showcase use of symmetric key algorithm of authentication scheme for securing SNTP communication between client and server.
The demo uses the AES-128-CMAC algorithm for the generating Message Authentication Code for the client on sending the SNTP time request to server as well as validating the server response received by verifying if the payload present authentication code can be generated. Use of an authentication mechanism in SNTP communication protects against server spoofing attacks as well as man-in-the-middle attacks of server response modification.

The demo uses corePKCS11 library for the AES-CMAC operations. Also, the demo adds functionality of generating random number, using corePKCS11, for sending as a parameter to the Sntp_SendTimeRequest API.

Note: For symmetric key based security mechanism to be protective against malicious, it is IMPORTANT to securely pre-share the symmetric key between client and server.
4 years ago
Archit Aggarwal f771faef4a
Add unauthenticated mode demo for coreSNTP library for time synchronization (#621)
Add the FreeRTOS/coreSNTP library as a submodule (along with manifest.yaml file update) and add a demo project to showcase use of the coreSNTP library for having a SNTP client daemon in the system for periodically synchronizing system time with the internet to maintain Coordinated Univeral Time (UTC) in a device. This demo maintains UTC time of system in RAM, thereby, representing systems without a Real-Time Clock (RTC) module in the device.

Note: This demo shows use of coreSNTP library for SNTP communication with NTP/SNTP time servers in non-authenticated mode (i.e. without any security mechanism payload beyond the standard 48 bytes of NTP packet exchange between client-server).
4 years ago