1
0
mirror of https://github.com/RIOT-OS/RIOT.git synced 2024-12-29 04:50:03 +01:00
Commit Graph

46700 Commits

Author SHA1 Message Date
Martine Lenders
f2b04ca6fa
Merge pull request #20875 from miri64/gh-actions/fix/bump-upload-artifact
gh-actions: bump upload-artifact to v4
2024-09-30 09:05:47 +00:00
Marian Buschsieweke
3c5c78abf3
Merge pull request #20841 from maribu/tests/pkg/emlearn
tests/pkg/emlearn: add model.h to repo
2024-09-29 17:17:23 +00:00
Marian Buschsieweke
29e963bd95
build system: deprecate RIOT_MCU predefined macro
This re-adds `RIOT_MCU` as alias for `RIOT_CPU` and marks it as
deprecated. That should make life easier for downstream apps that may
still use `RIOT_CPU`.
2024-09-28 18:32:49 +02:00
Marian Buschsieweke
cadbbb6e95
build system: Add MACRO_DEPRECATED macro
Adding this macro in the definition of a macro causes a warning about
the deprecation to be emitted when used (and a build failure with
`WERROR=1`). This is useful as no other means to deprecate preprocessor
macros are provided.

The macro will be defined empty for compilers that are not GCC or
clang.
2024-09-28 18:32:49 +02:00
Marian Buschsieweke
906e2c3234
build system: document riotbuid.h
This adds a `riotbuild-prefix.h` that is added to the `riotbuild.h`
and processed by Doxygen. It solves two problems:

1. The pre-defined macros where previously fully undocumented, but
   may be useful to real world applications
2. It provides a place where backward compatibility aliases can be
   added with a deprecation notice
2024-09-28 18:32:49 +02:00
Marian Buschsieweke
2c89b7acd3
tests/pkg/emlearn: add model.h to repo
The Makefile rule to regenerate model.h has been left in place, but
just adding the header to the test allows to build the application
without heaving emlearn installed, which is convenient for the CI.

Actual users of emlearn will like still want to generate the header.
2024-09-28 18:29:56 +02:00
Martine S. Lenders
29baafe523
gh-actions: bump upload-artifact to v4
See https://github.blog/changelog/2024-02-13-deprecation-notice-v1-and-v2-of-the-artifact-actions/
2024-09-28 10:29:27 +02:00
benpicco
9bdb697edb
Merge pull request #20857 from benpicco/dns_msg-fix_skip
dns_msg: skip RDLENGTH_LENGTH field when skipping record
2024-09-27 15:57:17 +00:00
Benjamin Valentin
0463b2705f
unittests: add test for dns_msg
Co-Authored-By: Martine Lenders <martine.lenders@tu-dresden.de>
2024-09-27 17:40:11 +02:00
mguetschow
055c1e6080
Merge pull request #20874 from chrysn-pull-requests/cpuid
doc: Clarify that our CPU ID is not ARM's CPUID
2024-09-27 08:59:23 +00:00
chrysn
f116a78de8 doc: Clarify that our CPU ID is not ARM's CPUID 2024-09-27 10:42:17 +02:00
benpicco
9d0a2c19e4
Merge pull request #20347 from aabadie/pkg/emlearn/bump_version
pkg/emlearn: bump version to 0.17.1
2024-09-26 15:14:35 +00:00
Benjamin Valentin
5c34eeae03 makefiles/arch/native: don't be pedantic
We don't enable this on any other architecture.
-pedantic doesn't give us any more beneficial wanrings, only warns
about language extensions that are implemented by both GCC and Clang
anyway.

Since those are the only compilers we are targeting, we can just make
use of them to make our lives easier.
2024-09-26 17:09:15 +02:00
Benjamin Valentin
42d95ad174 dist/tools/bootterm: bump to 0.5 2024-09-26 11:22:45 +02:00
krzysztof-cabaj
ecc5b60e30 boards/nucleo64-c0: add pinout source 2024-09-25 16:28:41 +02:00
benpicco
7f959f83cc
Merge pull request #20870 from derMihai/mir/event_timeout_zero
event/timeout: event_timeout_set() enqueues immediately if timeout is zero
2024-09-25 13:26:38 +00:00
Mihai Renea
b7eee2c8b7 event/timeout: event_timeout_set() enqueues immediately if timeout is zero 2024-09-25 10:00:58 +02:00
benpicco
5c06502c4d
Merge pull request #20835 from xnumad/nib-route-hide-on-link-prefixes
gnrc/ipv6: `nib route`: hide off-link PLEs
2024-09-24 15:42:48 +00:00
Marian Buschsieweke
4e17dbae20
Merge pull request #20866 from maribu/CODING_CONVENTIONS.md/indent-pp-directives
CODING_CONVENTIONS.md: Add preprocessor directive formatting
2024-09-24 08:52:49 +00:00
Marian Buschsieweke
f431aab856
CODING_CONVENTIONS.md: Add preprocessor directive formatting
This explicitly spells out what informally has been the coding
convention for some time on preprocessor directives, making it
more transparent and easier to find.

This is particularly useful as the code base has at least three
different styles. Deducing what actually is the current policy
would require a details look at how the style has changed over
time, rather than being obvious from a quick `grep` over the
code base.
2024-09-23 17:08:05 +02:00
Marian Buschsieweke
20f7328df4
Merge pull request #20864 from maribu/cpu/samd5x/cpu-conding-convention
cpu/samd5x/cpu.c: reformat code
2024-09-19 07:33:10 +00:00
xnumad
92b77ed944 gnrc_ipv6_nib: refactor
Co-Authored-By: benpicco <benpicco@googlemail.com>
2024-09-18 16:09:58 +02:00
mguetschow
5d958957be
Merge pull request #20854 from netd-tud/psa-headers
Various PSA Crypto fixes
2024-09-18 08:10:44 +00:00
Marian Buschsieweke
20e218680c
cpu/samd5x/cpu.c: reformat code
This formats the code to improve readability and apply the coding
convention. This is a whitespace only change that will not change
generated binaries.
2024-09-17 22:07:46 +02:00
Armin Wolf
fe56b7d19c sys/psa_crypto: Implement PSA_MAC_MAX_SIZE()
This support macro is necessary for full MAC support.

Signed-off-by: Armin Wolf <W_Armin@gmx.de>
2024-09-17 21:37:10 +02:00
Armin Wolf
98d268040a sys/psa_crypto: Implement PSA_HASH_BLOCK_LENGTH()
The initial implementation was inspired by MbedTLS, with the
addition of the MD2 and MD4 algorithms.

Signed-off-by: Armin Wolf <W_Armin@gmx.de>
2024-09-17 21:37:10 +02:00
Armin Wolf
cf66f712a6 tests/sys/psa_crypto: Add tests for key usage flags
Add some tests to verify that when creating or importing keys,
the usage flags PSA_KEY_USAGE_SIGN_HASH/PSA_KEY_USAGE_VERIFY_HASH
automatically set the usage flags PSA_KEY_USAGE_SIGN_MESSAGE/
PSA_KEY_USAGE_VERIFY_MESSAGE on the key.

Signed-off-by: Armin Wolf <W_Armin@gmx.de>
2024-09-17 21:36:39 +02:00
chrysn
d8808cb748 examples/rust-gcoap: Add ping, passive ping and nib resources 2024-09-16 23:17:04 +02:00
benpicco
0cea359db6
Merge pull request #20856 from dylad/pr/cpu/saml1x/compat_headers
boards/saml1x: convert bitfields to new masks name
2024-09-13 16:15:30 +00:00
Benjamin Valentin
1517949f13 makefiles/suit: drop use of SUIT_SEC_PASSWORD
Specifying the password of the SUIT private key on the command line
and thereby committing it to shell history is a security issue.

Instead ask for the password interactively when an encrypted private
key is used.
2024-09-13 10:57:40 +02:00
benpicco
870fe04dfa
Merge pull request #20858 from benpicco/suit_multi_key-2
makefiles/suit: store public keys, make it easier to work with multiple keys
2024-09-12 20:39:28 +00:00
Benjamin Valentin
765dd68753 makefiles/suit: use OpenSSL to generate key
Co-authored-by: Fabian Hüßler <fabian.huessler@ml-pa.com>
2024-09-12 21:54:00 +02:00
Marian Buschsieweke
1fa7db2eda
Merge pull request #20855 from benpicco/coap_block_finish-fix
nanocoap: always write at least 1 byte in coap_block2_finish()
2024-09-12 15:01:19 +00:00
Benjamin Valentin
344d4b80bf sock_dns: add debug output 2024-09-12 11:00:41 +02:00
Benjamin Valentin
bc2ad626f3 dns_msg: rename addrlen -> rdlen 2024-09-12 11:00:41 +02:00
Benjamin Valentin
305b5db4eb dns_msg: add debug output 2024-09-12 11:00:41 +02:00
Benjamin Valentin
74356c9737 dns_msg: skip RDLENGTH_LENGTH field when skipping record
fixes #20355
2024-09-12 11:00:41 +02:00
Benjamin Valentin
99285d3ec5 makefiles/suit: add support for multiple & encrypted signing key 2024-09-11 19:28:39 +02:00
Benjamin Valentin
fbf1cd16a6 makefiles/suit: store public keys
This makes it easier to work with encrypted keys and multiple keys.
The firmware binary can contain multiple public keys that are used
to verify the manifest.
The use case is that we want to include the production public key
in the debug build, so we can seamlessly update to the production
version without re-flashing the device.

If the public keys is always generated on the fly, this would still
require the production key password even for the debug build.

Instead if we store the (unencrypted) public key, we can always
include it in the debug build.
2024-09-11 17:57:59 +02:00
benpicco
24ad7e72c8
Merge pull request #20859 from krzysztof-cabaj/nucleo-144-pinout-source
boards/nucleo144: add pinout source
2024-09-11 12:36:45 +00:00
benpicco
74ddc4abfb
Merge pull request #20860 from chrysn-pull-requests/update-docker
Update docker image (and document the process)
2024-09-11 09:39:38 +00:00
chrysn
e774040df6 doc: Align c2rust installation with docker image setup 2024-09-11 10:26:29 +02:00
chrysn
6dc2037767 makefiles/docker: Update docker image 2024-09-11 10:26:11 +02:00
chrysn
f6477370df makefiles/doc: Explain where docker image hash values come from 2024-09-11 10:13:36 +02:00
krzysztof-cabaj
b74c4236c8 boards/nucleo144-l4: add pinout source 2024-09-10 17:44:04 +02:00
krzysztof-cabaj
911cc15129 boards/nucleo144-f7: add source to pinouts 2024-09-10 17:30:16 +02:00
Teufelchen
e31e814cff
Merge pull request #20852 from fabian18/nanocoap_sock_get_non
sys/net/application_layer/nanocoap: add `nanocoap_sock_get_non()`
2024-09-10 15:06:27 +00:00
Fabian Hüßler
02e513e04b sys/include/net: better documentation of nanocoap_sock_request_cb 2024-09-10 16:44:19 +02:00
Fabian Hüßler
d3417dad65 tests/net/nanocoap_cli: add get_non command 2024-09-10 16:43:45 +02:00
Fabian Hüßler
95b46ee2a5 sys/net/application_layer/nanocoap: add nanocoap_sock_get_non 2024-09-10 16:43:44 +02:00