summaryrefslogtreecommitdiff
path: root/FreeRTOS-Plus/Source
Commit message (Collapse)AuthorAgeFilesLines
...
* Hygiene changes of old Demo folders and temporary removal of submodules (#666)Archit Aggarwal2021-07-232-9/+0
| | | | | | | * Remove submodules of community and partner contribution repos, and stale directory of FreeRTOS+UDP * Obselete NTP demo and rename of HTTP server demo folder * Update manifest.yml
* [P3] SubModules pointer update of was libraries to latest commits (#663)Shivangi2021-07-223-0/+0
| | | | | | | * Updating device shadow to latest commit * updating jobs pointer * Updating device-defender pointer
* Remove redundant mbedtls error sources (#654)Oscar Michael Abrina2021-07-197-1425/+10
| | | | | Since `mbedtls_error.c` is already part of the mbedTLS submodule, the duplicate files are removed from this repository. Co-authored-by: Cobus van Eeden <35851496+cobusve@users.noreply.github.com>
* Cleaned up report_builder in defender_demo_json (#644)tianmc12021-07-141-0/+0
|
* [P3] Submodule pointer update to LTS Libraries (#640)Shivangi2021-07-146-0/+0
| | | | | | | | | | | | | | | | | | | * moved submodule to backoff v1.0.1 * move corehttp module to latest commit * move coremqtt module to latest commit * move coremqtt Agent module to latest commit * move coreSNTP Agent module to latest commit * move coreJSON Agent module to latest commit * move corePKCS11 Agent module to latest commit * Reverting coreHttp to previous commit * Updating coreHttp pointer after fix
* Updated device-shadow submodule to support named shadow, and updated demo to ↵tianmc12021-07-071-0/+0
| | | | use named shadow (#636)
* Update coreSNTP submodule and coreSNTP demo (#631)Archit Aggarwal2021-06-251-0/+0
| | | | | | | | | Update the coreSNTP submodule to the latest commit. Also, make updates to the coreSNTP demo for the new changes in the SNTP library which include the following: 1. Update to the type for packet size from size_t to uint16_t for parameters in the transport and authentication interfaces. 2. Change in the call to Sntp_SendTimeRequest API to pass the new blockTimeMs parameter added to the API. 3. Update to the clock-offfset type from int32_t to int64_t for representing information in milliseconds. To accommodate this update in the SntpSetTime_t interface, the mathematical model for representing system clock has been updated to store slew rate as milliseconds/second (instead of second/second). This change improves the accuracy of the WinSim demo time correction (because the milliseconds of time difference between server and client time is corrected over the entire polling interval which makes a significant difference!). This PR also adds demo config macros for setting the block time values passed to the Sntp_SendTimeRequest and Sntp_ReceiveTimeResponse APIs.
* Add unauthenticated mode demo for coreSNTP library for time synchronization ↵Archit Aggarwal2021-06-101-0/+0
| | | | | | | (#621) Add the FreeRTOS/coreSNTP library as a submodule (along with manifest.yaml file update) and add a demo project to showcase use of the coreSNTP library for having a SNTP client daemon in the system for periodically synchronizing system time with the internet to maintain Coordinated Univeral Time (UTC) in a device. This demo maintains UTC time of system in RAM, thereby, representing systems without a Real-Time Clock (RTC) module in the device. Note: This demo shows use of coreSNTP library for SNTP communication with NTP/SNTP time servers in non-authenticated mode (i.e. without any security mechanism payload beyond the standard 48 bytes of NTP packet exchange between client-server).
* Aws only files spell check (#593)Aniruddha Kanhere2021-05-131-1/+1
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * Added spell check * All words * Add a missing word * Fix header checks * Fix header checks v1 * Fix header check v2 * Updated freertos link in header * Fixed afr link in the header * Fix last of header checks * Update the spell check script to check amazon licensed files only * Fixed paths and added comments * Try with modified repo * Add inplace substitute option to sed * Use official repo as the spell checker source * Add vendor file to the ignored list Co-authored-by: root <root@ip-172-31-5-28.us-west-2.compute.internal>
* Merge FreeRTOS 202104.00 to main (#585)Archit Aggarwal2021-04-2917-15/+15
|
* OTA Demos (#573)Prasad Vyawahare2021-04-261-0/+0
| | | | | | | | | This change adds the OTA demos and required dependencies and helper components . * Add demos , configs and project files * Add subscription manager * Add HTTP utils * Submodules the OTA LTS 3.0 Library. * Add OTA pal
* Rename MQTT Agent structs and files (#576)Archit Aggarwal2021-04-261-0/+0
|
* Automate doxygen ZIP creation with GitHub Action (#568)Archit Aggarwal2021-04-211-0/+0
| | | Automate creation of doxygen ZIP output by using the custom doxygen GitHub Action, that has been updated to generate ZIP artifact in PR
* Add feature to set credentials using buffer in MQTT_Mutual_Auth_wolfSSL demo ↵TakayukiMatsuo2021-04-211-58/+119
| | | | | | (#522) * Add feature to set credentials using buffer * Change instructions for giving credential data via buffer
* Change Shadow submodule to point to LTS release tag (#567)Archit Aggarwal2021-04-201-0/+0
|
* Replace multithreading demo with MQTT Agent (#563)Muneeb Ahmed2021-04-201-0/+0
| | | | | | | | | | | | | | * Update MQTT agent submodule * Copy MQTT agent demo files * Remove other demos from connection manager * Update demo config and uncrustify * Update readme files * Fix headers
* Bump submodules of Kernel and AWS libraries (#564)Archit Aggarwal2021-04-163-0/+0
|
* Add MQTT Agent submodule (#551)Muneeb Ahmed2021-04-092-0/+3
| | | | | | | | * Add MQTT Agent submodule * Add MQTT agent platform files Co-authored-by: abhidixi11 <44424462+abhidixi11@users.noreply.github.com> Co-authored-by: Joseph Julicher <jjulicher@mac.com>
* Add custom metrics to defender demo (#507)Archit Gupta2021-03-051-0/+0
| | | Adds custom metrics to the defender demo. The metrics added are a list of the task ids and the stack high water mark.
* Update corePKCS11 submodule. (#505)Carl Lundin2021-02-221-0/+0
| | | Co-authored-by: alfred gedeon <28123637+alfred2g@users.noreply.github.com>
* Update Jobs demo to use DescribeJobExecution instead of ↵Archit Aggarwal2021-02-101-0/+0
| | | | | StartNextPendingJobExecution API (#496) It is recommended by the AWS IoT Jobs service to use DescribeJobExecution API for scaling purposes instead of StartNextPendingJobExecution API. Thus, update the Jobs demo to replace the latter API call with the former API call.
* Minor changes to wolfSSL MQTT demo files (#493)Carl Lundin2021-02-041-114/+135
| | | | | | | | | * Clean up demo config for wolfSSL mutual auth. * Add comment about picking the correct ROOT CA. * uncrustify using_wolfSSL.c and some other code style changes. * Apply suggestions from code review Co-authored-by: Archit Aggarwal <architag@amazon.com>
* Add MQTT_Mutual_Auth_wolfSSL demo (#464)TakayukiMatsuo2021-02-022-0/+653
| | | Add a demo that shows MQTT over TLS mutual authentication connection and communication with a broken when using wolfSSL as the TLS library.
* Call taskYIELD after calling FreeRTOS_send in Plaintext_FreeRTOS_send (#491)Marc-Antoine Lalonde2021-01-251-9/+22
| | | | | | | | | | | | | | | FreeRTOS_send adds the packet to be sent to the IP task's queue for later processing. The packet is sent later by the IP task. When FreeRTOS is used in collaborative mode (i.e. configUSE_PREEMPTION is 0), the Plaintext_FreeRTOS_send function returns without actually sending the packet as the IP task never gets a chance to run. The fact that Plaintext_FreeRTOS_send returns without actually sending the packet causes an issue in the MQTT_Connect which expects the CONNECT packet to be actually sent and waits for CONNACK. This commit adds a taskYIELD call after calling FreeRTOS_send to ensure that the IP task gets a chance to run and send the packet before the Plaintext_FreeRTOS_send function returns.
* [AUTO][RELEASE]: Bump file header version to "202012.00"Joseph Julicher2020-12-1512-12/+12
|
* [AUTO][RELEASE]: Bump submodules per manifest.yml for V202012.00Joseph Julicher2020-12-157-0/+0
|
* [AUTO][RELEASE]: Bump file header version to "202012.00"Joseph Julicher2020-12-153-3/+3
|
* Update FreeRTOS-Plus-TCP (#479)Cobus van Eeden2020-12-141-0/+0
|
* Update submodule pointers (#476)Archit Gupta2020-12-143-0/+0
|
* Update submodules of CSDK libraries (#473)Oscar Michael Abrina2020-12-137-0/+0
|
* Add links to the MQTT agent in the non-agent mqtt demos (#470)RichardBarry2020-12-114-0/+0
| | | | Add URL file links to the MQTT agent documentation page. Add comment blocks into each demo that also point toward the MQTT agent documentation to ensure users are aware the agent method exists.
* Map errors from FreeRTOS+TCP to mbedTLS and make read non-blocking when ↵Oscar Michael Abrina2020-12-115-23/+128
| | | | | | | | | | | | requesting start of frame (#452) From the FreeRTOS documentation, pdFREERTOS_ERRNO_ENOSPC means that timeout occurred before any data could be sent or received. - In the plaintext transport-interface implementation, we would directly return `-pdFREERTOS_ERRNO_ENOSPC`. However, an error like this can occur when the TCP buffer is full, so this ought to be retriable. Libraries that consume the transport interface interpret a return value of 0 to mean that send/recv can be invoked again to get the data. As such, we should appropriately set the return value as 0 when the status is `-pdFREERTOS_ERRNO_ENOSPC`. - In the mbedTLS port, we would directly return whatever `FreeRTOS_send` or `FreeRTOS_recv` returns. However, sometimes, the return value can be an error. In such cases, we ought to map an error from FreeRTOS+TCP to an equivalent error in mbedTLS. In the case of `-pdFREERTOS_ERRNO_ENOSPC`, we map that to `MBEDTLS_ERR_SSL_TIMEOUT`. When the mbedTLS transport-interface send/recv wrapper sees that value, it appropriately returns 0, so that the library can retry the send/recv. I've verified that when the mbedTLS port returns an error, that same error is returned by `mbedtls_ssl_write` & `mbedtls_ssl_read`. - The TCP socket may have a receive block time. If bytesToRecv is greater than 1 then a frame is likely already part way through reception and blocking to wait for the desired number of bytes to be available is the most efficient thing to do. If bytesToRecv is 1 then this may be a speculative call to read to find the start of a new frame, in which case blocking is not desirable as it could block an entire protocol agent task for the duration of the read block time and therefore negatively impact performance. So if bytesToRecv is 1 then don't call recv unless it is known that bytes are already available. Co-authored-by: abhidixi11 <44424462+abhidixi11@users.noreply.github.com> Co-authored-by: RichardBarry <3073890+RichardBarry@users.noreply.github.com>
* Update comments about NetworkContext definition (#461)Oscar Michael Abrina2020-12-113-3/+24
| | | | | Small change that simply specifies why the NetworkContext must be defined by each compilation unit along with details on how to include it to your project. Co-authored-by: Cobus van Eeden <35851496+cobusve@users.noreply.github.com>
* Update demos to use version macro from coreMQTT (#460)Archit Aggarwal2020-12-101-0/+0
| | | Update demos to use the MQTT_LIBRARY_VERSION macro for the coreMQTT version they report in their metrics
* Update MQTT config for Keep Alive demo that uses dummy timer (#457)Archit Aggarwal2020-12-091-0/+0
| | | The MQTT library has been updated with the MQTT_RECV_POLLING_TIMEOUT_MS and MQTT_SEND_RETRY_TIMEOUT_MS configurations which should be set to zero when using a dummy timer function to avoid possibility of infinite loop when retrying failed transport send/receive calls. As the MQTT Keep Alive demo uses a dummy timer function, this PR updates the demo configuration to set these timeouts to zero.
* Move corePKCS11 forward and update to latest core_pkcs11.h (#441)Carl Lundin2020-12-072-0/+2
| | | | | | | | | * Move corePKCS11 forward. * Update licenses. * strip NULL terminator. * Add threading_alt.h * Use github link. Co-authored-by: Cobus van Eeden <35851496+cobusve@users.noreply.github.com>
* Fix FreeRTOS+TCP submodule pointer (#453)Archit Gupta2020-12-071-0/+0
| | | | | The FreeRTOS+TCP submodule pointer was set to a commit not in main, which also lacked commits in main, which ended up causing build failures for defender demo.
* Update readme.txt (#446)yngki2020-12-041-4/+6
| | | | | | | | | | | * Update readme.txt * Update readme.txt * Update readme.txt * Update check-header.py Co-authored-by: Joseph Julicher <jjulicher@mac.com>
* Qemu mps2 networking (#439)alfred gedeon2020-12-032-0/+0
| | | | | | * Demo: Add Support for netwroking in Qemu for MPS2 AN385 * Add tcp echo client * Add steps to Readme
* Move WolfSSL to ThirdParty and Submodule code (#433)Carl Lundin2020-12-03627-1498830/+0
| | | | | | | | | | | * Submodule wolfSSL and move wolfSSL and WolfSSL-FIPS-Ready to ThirdParty folder. * Update VS studio project. * Update FIPS project settings. * Update FIPS demo readme. * Add md to ignored file extensions.
* Add retries to demos in case of a failure. (#435)leegeth2020-12-021-0/+0
|
* Support multiple transports in the same compilation unit (#434)Oscar Michael Abrina2020-12-019-78/+203
| | | By removing the definition of the NetworkContext struct in the header file, we allow the application to define it. This allows an application writer to use multiple transports in the same compilation unit. That way, multiple .c files do not have to be created for each transport.
* Update FreeRTOS+TCP submodule pointer (#427)Archit Gupta2020-11-301-0/+0
| | | | | Updates the FreeRTOS+TCP submodule pointer. This brings in a fix that needs changes in defender demo.
* Bump backoffAlgorithm submodule for API change and update demos (#426)Archit Aggarwal2020-11-301-0/+0
| | | The API of FreeRTOS/backoffAlgorithm library has changed to remove dependency on random number generator; instead require the caller to generate the random number and pass it to the BackoffAlgorithm_GetNextBackoff API for backoff period calculation. This PR updates the submodule pointer commit, and updates the demos and tests to use the simplied library API
* corePKCS11 submodule and file path update (#424)Carl Lundin2020-11-301-0/+0
| | | | | | | | * Move PKCS #11 submodule forward. * Update file path for folder update in corePKCS11. * Update mbedtls file filter.
* Replace exponential_backoff with submodule to FreeRTOS/backoffAlgorithm (#419)Archit Aggarwal2020-11-244-347/+1
| | | A new repository, FreeRTOS/backoffAlgorithm, has been created for hosting the library for backoff calculation. This repo replaces the FreeRTOS-Plus/Source/Utilities/exponential_backoff with the submodule to the new repository, and updates all the demos that use retry logic to use the backoffAlgorithm API
* Preparation for coreHTTP demos (#413)Sukhmani Minhas2020-11-191-0/+0
| | | | | Adding common utilities that will be used by 4 coreHTTP demos: - Adding coreHTTP submodule pointer to FreeRTOS-Plus/Source/Application-Protocols/coreHTTP - Adding folder FreeRTOS-Plus/Demo/coreHTTP_Windows_Simulator/Http_Demo_Helpers with functions common to demos.
* Bump corePKCS11 submodule (#412)Carl Lundin2020-11-191-0/+0
| | | | | * Move PKCS submodule forward. * Use common mbed code.
* Add device defender library submodule (#406)Archit Gupta2020-11-131-0/+0
|
* Add #ifndef guards for SdkLog definition to fix conflicting definitions (#403)Archit Aggarwal2020-11-124-4/+12
|