Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

TR3FIR-347 usb tbk #3452

Open
wants to merge 99 commits into
base: main
Choose a base branch
from

Conversation

TylerGajewski-Token
Copy link

No description provided.

TaylorCarpenter and others added 30 commits March 21, 2024 18:51
Not all example code can be fully compiled. This avoids errors being
thrown by the CI server from this known issue.
Currently there is a substantial amount hard coded to make things work with our setup.
It will be generalized later
Requires removing implementation of embedded-hal, otherwise it creates a recursive loop
Resolved conflicts by keeping Taylor's changes (sometimes with modifications).
Merging after Taylor's merge.
We did another upstream sync after the original. Merge that so we get
those new pieces too.
Now that I've gotten it all working, go back to using artifactory instead of paths.
This was something that Taylor fixed in
20faa0a and I had noticed when
resolving the conflict, but I accepted the wrong side.
[TR3FIR-141] Update embassy to latest
I missed this with my other number bumps and the bootloader needs it.
…on_number

[TR3FIR-141] update version number
mattcaron-token and others added 30 commits June 26, 2024 09:35
…uple_version_updates

[TR3FIR-197] I missed a couple dependency version updates for embassy-boot-stm32.
This practice should end the issues we have with version confusion
after updating.
TR3FIR-197 Add SOP document for how to update embassy.
## Overview
This change fixes AES CCM breaking our First Time Setup procedure.
Turns out it was down to resetting the peripheral too rarely, since we have only been doing it on the creation of the `Aes` struct, not on creation of every algorithm instance (`AesCcm` struct).
## Changes
Add `rcc::enable_and_reset` call while constructing new `AesCcm` instance.
## Commits
[TR3FIR-237] Fix AES CCM breaking authentication
- Replace core matching values with shifted ones
- Change magic values for cores to named constants
- add defmt derived impl for HSEM error
- Bump embassy-stm32 version to 0.1003.2
…UID-check

fix: [TR3FIR-238] Replace coreid detection values with shifted ones

- Replace core matching values with shifted ones
- Change magic values for cores to named constants
- add a derived implementation of `defmt` for the HSEM error
- Bump embassy-stm32 version to 0.1003.2
Needed for proper arbitration of flash access between the two CPUs.
I've kept our inversion of the rust-toolchain .toml files, but I'm not
sure why we did this.
Not needed now that we're using submodules.

Notable exceptions are stm32wb-hci and stm32-metapac, because those
are consumed, not published.
No more:

"warning:
/home/matt/workspace/code/halo/embassy/embassy-boot/Cargo.toml:
`default_features` is deprecated in favor of `default-features` and
will not work in the 2024 edition (in the `ed25519-dalek` dependency)"
Work in progres, there is a problem with exponent.

Fix modular exponent

Add finished PKA implementation with RSA operations

Fix constexpression calculations

Replace bytemuck with custom data conversion
[TR3FIR-217] Remove RSA struct from PKA driver

[TR3FIR-217] Add padding for PKA RAM writes

[TR3FIR-217] Fix modulus padding in PKA mod exp method

[TR3FIR-217] Fix modular exp in PKA

[TR3FIR-217] Fix Mongtomery param in PKA
[TR3FIR-217] Add PKA controller with RSA functionalities
…en_changes_to_embassy

[TR3FIR-336] DOCS Document Token changes to baseline embassy.
New version fixes handling of the
`ACI_L2CAP_CONNECTION_UPDATE_RESP_EVENT` event and in turn gets rid
of the `BadLength` errors.
…update-response-evt-parsing

[TR3FIR-345] Bump stm32wb-hci version
This version fixes incorrect parsing of pairing success event
[TR3FIR-440] Bump stm32wb-hci version
New version fixes parsing of indication and notification events
[TR3FIR-449] Bump stm32wb-hci version
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

8 participants