rtos/tinyara.git
6 years agoframework/st_things: apply tizenrt coding rule in st_things
Daesung [Thu, 19 Oct 2017 02:24:31 +0000 (11:24 +0900)]
framework/st_things: apply tizenrt coding rule in st_things

- apply tizenrt coding rule.

6 years agoframework/st_things: add null check statement
Daesung [Thu, 19 Oct 2017 02:22:57 +0000 (11:22 +0900)]
framework/st_things: add null check statement

- check the return value of cJSON whether it is null or not

6 years agoMerge pull request #855 from jeongarmy/fix_arastorage_security_issue
Taejun-Kwon [Wed, 18 Oct 2017 11:06:27 +0000 (20:06 +0900)]
Merge pull request #855 from jeongarmy/fix_arastorage_security_issue

arastorage : add change return type of some functions and missing checking error case

6 years agoMerge pull request #858 from Samsung/revert-851-1018-web
sunghan-chang [Wed, 18 Oct 2017 10:38:11 +0000 (19:38 +0900)]
Merge pull request #858 from Samsung/revert-851-1018-web

Revert "Add an error handling code and an initialization function in webserver&client"

6 years agoRevert "Add an error handling code and an initialization function in webserver&client"
pillip8282 [Wed, 18 Oct 2017 10:36:47 +0000 (19:36 +0900)]
Revert "Add an error handling code and an initialization function in webserver&client"

6 years agoarastorage/lvm : change return type of some functions in lvm to check result of them
Ahreum Jeong [Wed, 18 Oct 2017 08:26:59 +0000 (17:26 +0900)]
arastorage/lvm : change return type of some functions in lvm to check result of them

1. change return type from void to lvm_result_t of some functions
   because we need to check error case and execute next operation according to returned result in upper function

2. add missing checking error case
   . Description
      Functions lvm_set_op, lvm_set_relation, lvm_set_operand try to memcpy input data (part of AQL files) into fixed size buffer lvm_instance_t ->code.
      Allocated buffer can fit only DB_VM_BYTECODE_SIZE (128) bytes and the check is missing.
   . Mitigation
      The size of input string should be limited to DB_VM_BYTECODE_SIZE.
Allocated buffer can fit only DB_VM_BYTECODE_SIZE (128) bytes and the check is missing.

6 years agoarastorage/lexer : add checking the length of input data before allocating it to...
Ahreum Jeong [Wed, 18 Oct 2017 08:26:27 +0000 (17:26 +0900)]
arastorage/lexer : add checking the length of input data before allocating it to buffer with fixed si$

. Description
  - next_string
     Function next_string that provides next lexem during AQL analysis tries to memcpy input data (part of AQL files) into fixed size buffer.
     Allocated buffer can fit only DB_MAX_ELEMENT_SIZE (32) bytes and the check is missing.
  - next_token
     Function next_token that provides next token during AQL analysis tries to memcpy input data (part of AQL files) into fixed size buffer.
     Allocated buffer can fit only DB_MAX_ELEMENT_SIZE (32) bytes and the check is missing.

. Mitigation
   The size of input string should be limited to DB_MAX_ELEMENT_SIZE.

6 years agoMerge pull request #851 from HONGCHAEHEE/1018-web
pillip8282 [Wed, 18 Oct 2017 10:03:16 +0000 (19:03 +0900)]
Merge pull request #851 from HONGCHAEHEE/1018-web

Add an error handling code and an initialization function in webserver&client

6 years agoMerge pull request #852 from sunghan-chang/csvparser
btheosam [Wed, 18 Oct 2017 07:13:29 +0000 (16:13 +0900)]
Merge pull request #852 from sunghan-chang/csvparser

tools/csvparser: add a limitation of parsing parameters from syscall csv

6 years agotools/csvparser: add a limitation of parsing parameters from syscall csv
sunghan [Wed, 18 Oct 2017 06:47:34 +0000 (15:47 +0900)]
tools/csvparser: add a limitation of parsing parameters from syscall csv

The g_parm variable which it is a buffer to treat system call parameters
has a maximum value, 16 as a parameter field. But in parse_csvline function,
a maximum value is not checking so that it can cause memory corruption.
Because of above reason, it should have a checking code for maximum.
But, parser can't make a decision whether it is a valid or not. Let's exit
with error.

6 years agoAdd an error handling code and an initialization function in webserver&client
chaehee.hong [Wed, 18 Oct 2017 04:13:56 +0000 (13:13 +0900)]
Add an error handling code and an initialization function in webserver&client

- Initialization of buffers is added in webserver not to be filled with the previous data.
- Missing an error handling function is added in webserver.
- Missing error handling functions are added in webclient.

6 years agoMerge pull request #845 from an4967/add_user_data
pillip8282 [Wed, 18 Oct 2017 06:08:44 +0000 (15:08 +0900)]
Merge pull request #845 from an4967/add_user_data

examples/st_things: add user data in response msg

6 years agoexamples/st_things: add user data in response msg
Daesung [Tue, 17 Oct 2017 05:03:54 +0000 (14:03 +0900)]
examples/st_things: add user data in response msg

- add the usage of 2 APIs(st_things_create_representation_inst, st_things_destroy_representation_inst)
- show how to deliver user data to sever

6 years agoMerge pull request #847 from jeongarmy/fix_pm_comment
sunghan-chang [Tue, 17 Oct 2017 13:12:03 +0000 (22:12 +0900)]
Merge pull request #847 from jeongarmy/fix_pm_comment

os/pm : fix wrong file path in comment

6 years agoMerge pull request #848 from jeongarmy/modify_doxygen
sunghan-chang [Tue, 17 Oct 2017 13:11:30 +0000 (22:11 +0900)]
Merge pull request #848 from jeongarmy/modify_doxygen

doxygen : add include path, missing brief, parameters and return for fs APIs in include/sys

6 years agoMerge pull request #842 from pillip8282/fix_snmp_assert
davidfather [Tue, 17 Oct 2017 10:42:28 +0000 (19:42 +0900)]
Merge pull request #842 from pillip8282/fix_snmp_assert

net:lwip fix snmp issues

6 years agoMerge pull request #840 from pillip8282/lwip_fix_tcp_spoofing
davidfather [Tue, 17 Oct 2017 10:42:00 +0000 (19:42 +0900)]
Merge pull request #840 from pillip8282/lwip_fix_tcp_spoofing

net:lwip fix tcp spoofing attack at lwIP

6 years agoMerge pull request #836 from HONGCHAEHEE/dm
pillip8282 [Tue, 17 Oct 2017 10:17:53 +0000 (19:17 +0900)]
Merge pull request #836 from HONGCHAEHEE/dm

Edit makefiles of framework and tc for the path inclusion of DM API header

6 years agodoxygen : add include path, missing brief, parameters and return to fs APIs in includ...
Ahreum Jeong [Tue, 17 Oct 2017 07:46:38 +0000 (16:46 +0900)]
doxygen : add include path, missing brief, parameters and return to fs APIs in include/sys

. Add include path
  - If not, user can't know which header file should be included to use these APIs
. Add parameter name
  - each parameter name is needed for param[in/out] to follow doxygen rule
. Add missing brief to POSIX APIs and return

6 years agoMerge pull request #819 from pillip8282/cjson_update
sunghan-chang [Tue, 17 Oct 2017 09:52:58 +0000 (18:52 +0900)]
Merge pull request #819 from pillip8282/cjson_update

external:cjson update cJSON to the version 1.5.7 released Jun 29 2017

6 years agonet:lwip fix tcp spoofing attack at lwIP
kang [Tue, 17 Oct 2017 02:23:38 +0000 (11:23 +0900)]
net:lwip fix tcp spoofing attack at lwIP

Ignore TCP_RST if lwIP stack recevie it with invalid seqnum
You can check the detailed at https://www.cvedetails.com/cve/CVE-2004-0230/

6 years agoMerge pull request #846 from jeongchanKim/missed_doxy
sunghan-chang [Tue, 17 Oct 2017 09:41:37 +0000 (18:41 +0900)]
Merge pull request #846 from jeongchanKim/missed_doxy

doxygen : Add include path in stdio.h

6 years agonet:lwip fix SNMP assert when config value is not match to the received.
kang [Tue, 17 Oct 2017 04:28:51 +0000 (13:28 +0900)]
net:lwip fix SNMP assert when config value is not match to the received.

Developer in remote device is unable to communicate if configuration is not match to a input packet
You can see detail at https://savannah.nongnu.org/bugs/index.php?46128

6 years agoMerge pull request #850 from HONGCHAEHEE/http-header
pillip8282 [Tue, 17 Oct 2017 09:34:49 +0000 (18:34 +0900)]
Merge pull request #850 from HONGCHAEHEE/http-header

Fix a http header parsing function in webserver

6 years agoos/pm : fix wrong file path in comment
Ahreum Jeong [Tue, 17 Oct 2017 07:07:20 +0000 (16:07 +0900)]
os/pm : fix wrong file path in comment

Fix wrong file path in comment.
these files exist in os/pm

6 years agoFix a http header parsing function in webserver
chaehee.hong [Tue, 17 Oct 2017 08:26:45 +0000 (17:26 +0900)]
Fix a http header parsing function in webserver

- Remove the code for checking the length of the http header. The whole unseparated http header can be longer than the max key length.
- Re-fix of commit eda61d6f7b0b1ed4a17a62206ddf94d6fc8069d1

6 years agoMerge pull request #802 from JeonginKim/sec3
pillip8282 [Tue, 17 Oct 2017 08:53:31 +0000 (17:53 +0900)]
Merge pull request #802 from JeonginKim/sec3

Fix buffer overflow in FTP client

6 years agoMerge pull request #815 from sinzah/master
pillip8282 [Tue, 17 Oct 2017 07:28:21 +0000 (16:28 +0900)]
Merge pull request #815 from sinzah/master

wpa_supplicant : security vulnerability patch (http://w1.fi/security/2016-1/)

6 years agoMerge pull request #803 from dr-venkman/fix_coap_parsing
pillip8282 [Tue, 17 Oct 2017 07:08:16 +0000 (16:08 +0900)]
Merge pull request #803 from dr-venkman/fix_coap_parsing

Fix er-coap parsing in wakaama to handle heap buffer overflows

6 years agodoxygen : Add include path in stdio.h
jc_.kim [Tue, 17 Oct 2017 06:48:11 +0000 (15:48 +0900)]
doxygen : Add include path in stdio.h

if not, we cannot know which header we should include for using 'puts' api

6 years agoMerge pull request #812 from dr-venkman/fix_dos_issues_wakaama
pillip8282 [Tue, 17 Oct 2017 06:43:56 +0000 (15:43 +0900)]
Merge pull request #812 from dr-venkman/fix_dos_issues_wakaama

Merge security-related fixes from eclipse wakaama Github to TizenRT

6 years agoMerge pull request #827 from HONGCHAEHEE/doc
sunghan-chang [Tue, 17 Oct 2017 06:19:52 +0000 (15:19 +0900)]
Merge pull request #827 from HONGCHAEHEE/doc

doxygen : Add include path and missing param name in framework

6 years agodoxygen : tidy up framework/tinyalsa and st_things
Dongeon Kim [Tue, 17 Oct 2017 06:18:16 +0000 (15:18 +0900)]
doxygen : tidy up framework/tinyalsa and st_things

* Add header include path for framework/tinyalsa and framework/st_things on doxygen comments
 - if not, we cannot know which header we should include for using that api

* modify indentations

6 years agoMerge pull request #841 from jeongchanKim/doxy_include
sunghan-chang [Tue, 17 Oct 2017 06:09:45 +0000 (15:09 +0900)]
Merge pull request #841 from jeongchanKim/doxy_include

doxygen : Add include path, brief desc and missing param name and fix…

6 years agoMerge pull request #844 from heejin-kim/hj_18
sunghan-chang [Tue, 17 Oct 2017 06:07:51 +0000 (15:07 +0900)]
Merge pull request #844 from heejin-kim/hj_18

Add header file info in iotbus API's doxygen comment

6 years agoAdd header file info in iotbus API's doxygen comment
Heejin Kim [Tue, 17 Oct 2017 05:44:37 +0000 (14:44 +0900)]
Add header file info in iotbus API's doxygen comment

You can see which path should be included to use iotbus APIs.

6 years agoMerge pull request #811 from pillip8282/fix_netlib
davidfather [Tue, 17 Oct 2017 04:57:18 +0000 (13:57 +0900)]
Merge pull request #811 from pillip8282/fix_netlib

net:netlib fix vulerability while parsing malicious URLs

6 years agoMerge pull request #810 from pillip8282/fix_mdns
davidfather [Tue, 17 Oct 2017 04:56:12 +0000 (13:56 +0900)]
Merge pull request #810 from pillip8282/fix_mdns

protocol:mdns fix vulnerability at mdns

6 years agonet:lwip fix build snmp build error
kang [Tue, 17 Oct 2017 04:27:25 +0000 (13:27 +0900)]
net:lwip fix build snmp build error

Add <net/lwip/debug.h> in snmp to prevent a build error

6 years agodoxygen : Add include path, brief desc and missing param name and fix wrong desc...
jc_.kim [Mon, 16 Oct 2017 01:08:12 +0000 (10:08 +0900)]
doxygen : Add include path, brief desc and missing param name and fix wrong desc in os/include

1. Add include path for each apis
  - if not, we cannot know which header we should include for using that api
2. Add missing param name for each apis
  - argument name is needed after param[in] or param[out]
3. Add brief description for POSIX APIs
4. Fix wrong desc
  - some apis are not POSIX apis, but marked POSIX. so fix.

assert.h, crc16.h, crc32.h, crc8.h, debug.h, dirent.h, errno.h, fcntl.h, fixedmath.h, inttypes.h,
libgen.h, mqueue.h, pthread.h, queue.h, sched.h, semaphore.h, signal.h, spawn.h, stdio.h, stdlib.h,
string.h, syslog.h, termios.h, time.h, unistd.h
sys/prctl.h, sys/stat.h, sys/time.h, sys/wait.h, sys/ioctl.h
tinyara/clock.h, tinyara/math.h, tinyara/regex.h, tinyara/sched.h, tinyara/spawn.h, tinyara/streams.h,
tinyara/time.h, tinyara/ttrace.h

6 years agoMerge pull request #839 from jeongchanKim/mqtt_codingrule
sunghan-chang [Tue, 17 Oct 2017 03:43:12 +0000 (12:43 +0900)]
Merge pull request #839 from jeongchanKim/mqtt_codingrule

testcase/mqtt_itc : fix coding rule error - space is needed before '='

6 years agoprotocol:mdns fix vulnerability at mdns
kang [Thu, 12 Oct 2017 04:18:16 +0000 (13:18 +0900)]
protocol:mdns fix vulnerability at mdns

1) fix overflow when mdns is parsing the packet
2) checking cycle reference when it is parsing the packet
    https://www.kb.cert.org/vuls/id/23495
3) adding a buffer overflow check when it is converting a name label

6 years agotestcase/mqtt_itc : fix coding rule error - space is needed before '='
jc_.kim [Tue, 17 Oct 2017 01:20:50 +0000 (10:20 +0900)]
testcase/mqtt_itc : fix coding rule error - space is needed before '='

[SPC_M_OPR] spaces required around that '=' (ctx:VxW)

6 years agoMerge branch 'master' of https://github.com/Samsung/TizenRT into dm
chaehee.hong [Mon, 16 Oct 2017 23:57:31 +0000 (08:57 +0900)]
Merge branch 'master' of https://github.com/Samsung/TizenRT into dm

6 years agoMerge pull request #832 from an4967/bug_fix_iotbus_pwm
sunghan-chang [Mon, 16 Oct 2017 10:16:17 +0000 (19:16 +0900)]
Merge pull request #832 from an4967/bug_fix_iotbus_pwm

iotbus: bug fix in pwm

6 years agoEdit makefiles of framework and tc for the path inclusion of DM API header
chaehee.hong [Mon, 16 Oct 2017 09:42:30 +0000 (18:42 +0900)]
Edit makefiles of framework and tc for the path inclusion of DM API header

- Edit the compile option not to find the header file directory and use the original one as the other framework modules do.

6 years agonet:netlib fix vulerability while parsing malicious URLs
kang [Fri, 13 Oct 2017 00:42:58 +0000 (09:42 +0900)]
net:netlib fix vulerability while parsing malicious URLs

netlib_parsehttpurl() should be returned when error is detected

6 years agoMerge pull request #830 from an4967/apply_coding_rule
sunghan-chang [Mon, 16 Oct 2017 08:43:33 +0000 (17:43 +0900)]
Merge pull request #830 from an4967/apply_coding_rule

st_things: apply tizenrt coding rule

6 years agodoxygen : Add include path and missing param name for mqtt APIs
chaehee.hong [Mon, 16 Oct 2017 08:07:38 +0000 (17:07 +0900)]
doxygen : Add include path and missing param name for mqtt APIs

1.Add include path for each api
•if not, we cannot know which header we should include for using that api
2.Add missing param name for each api
•argument name is needed after param[in] or param[out]

6 years agodoxygen : Add include path and missing param names for DM APIs
chaehee.hong [Mon, 16 Oct 2017 08:05:26 +0000 (17:05 +0900)]
doxygen : Add include path and missing param names for DM APIs

1.Add include path for each api
•if not, we cannot know which header we should include for using that api
2.Add missing param name for each api
•argument name is needed after param[in] or param[out]

6 years agoMerge security-related fixes from eclipse wakaama Github to TizenRT
venkat.iyer [Fri, 13 Oct 2017 01:20:05 +0000 (10:20 +0900)]
Merge security-related fixes from eclipse wakaama Github to TizenRT

Wakaama in the version currently used by TizenRT (seems to be from around March/April) is vulnerable to several security issues, which were since fixed in the upstream version at https://github.com/eclipse/wakaama.

Reference to the original fixes are given below:

1. https://github.com/eclipse/wakaama/issues/319 (fix unknown, but likely https://github.com/eclipse/wakaama/commit/8037174913a5937c3bcb5ffe7838e4d3b867c53e)
2. https://github.com/eclipse/wakaama/issues/320
3. https://github.com/eclipse/wakaama/issues/268
4. https://github.com/eclipse/wakaama/issues/301

6 years agoFix buffer overflow in FTP client
JeonginKim [Thu, 12 Oct 2017 10:16:33 +0000 (19:16 +0900)]
Fix buffer overflow in FTP client

Function ftpc_dequote that converts quoted hexadecimal constants to binary values goes outside input data buffer -str pointer is checked, while str[1] and str[2] are read.
while parsing the server response end of string should be checked

6 years agoMerge pull request #833 from shivgarg/audio
Taejun-Kwon [Mon, 16 Oct 2017 07:29:37 +0000 (16:29 +0900)]
Merge pull request #833 from shivgarg/audio

framework/tinyalsa : Removing pcm_set_config as public API

6 years agoframework/tinyalsa : Removing pcm_set_config as public API
Shivam Garg [Mon, 16 Oct 2017 07:09:44 +0000 (16:09 +0900)]
framework/tinyalsa : Removing pcm_set_config as public API

pcm_set_config has been removed from tinyalsa include file. The tcs in utc and itc which tested pcm_set_config have been removed. Calls to pcm_set_config outside of tinyalsa have also been removed .pcm_set_config has been made a static function so that it can it is called only from tinyalsa.c file.

6 years agoiotbus: bug fix in pwm
Daesung [Mon, 16 Oct 2017 06:56:16 +0000 (15:56 +0900)]
iotbus: bug fix in pwm

- change type of divisor to get the result as float value.

6 years agost_things: apply tizenrt coding rule
Daesung [Mon, 16 Oct 2017 06:53:29 +0000 (15:53 +0900)]
st_things: apply tizenrt coding rule

- apply tizenrt coding rule

6 years agoMerge pull request #828 from shivgarg/audio
Taejun-Kwon [Mon, 16 Oct 2017 06:41:47 +0000 (15:41 +0900)]
Merge pull request #828 from shivgarg/audio

ta_tc/audio/{utc,itc} : Removing assert failure in audio TCs

6 years agoRemoving assert failure in audio TCs
Shivam Garg [Mon, 16 Oct 2017 06:16:49 +0000 (15:16 +0900)]
Removing assert failure in audio TCs

In audio utc/itc, readi positive tc gave an assert failure. The failure was due to the last pcm_readi call returning a negative value. The negative value was passed to write function which led to assert failure.
Now an if block has been added which checks the return value of pcm_readi before passing it to the write function.

6 years agoMerge pull request #820 from pillip8282/fix_xmlrpc
davidfather [Sat, 14 Oct 2017 06:58:23 +0000 (23:58 -0700)]
Merge pull request #820 from pillip8282/fix_xmlrpc

external:xmlrpc handle an exceptional case when invalid parameters ar…

6 years agoexternal:xmlrpc handle an exceptional case when invalid parameters are inserted
kang [Fri, 13 Oct 2017 06:01:49 +0000 (15:01 +0900)]
external:xmlrpc handle an exceptional case when invalid parameters are inserted

<> description:
Properly crafted xml request, can cause a situation in which the value of
the len field in the parsebuf_s structure will be less than the index field.
In this situation, when calling the xmlrpc_getelement from the xmlrpc_parseparams
function, the while loop will read the content of memory outside the buffer causing segmentation fault.

<> solution:
While calling xmlrpc_getelement function, check if index value inside parsebuf_s structure is less than len value.

6 years agoexternal:cjson update cJSON to the version 1.5.7 released Jun 29 2017
kang [Fri, 13 Oct 2017 05:44:02 +0000 (14:44 +0900)]
external:cjson update cJSON to the version 1.5.7 released Jun 29 2017

It will fix the below vulnerability issues existed at old version
https://www.talosintelligence.com/reports/TALOS-2016-0164/

6 years agoMerge pull request #822 from arvinmittal/fix_systemio_i2c_itc
sangwon03 [Fri, 13 Oct 2017 09:52:56 +0000 (18:52 +0900)]
Merge pull request #822 from arvinmittal/fix_systemio_i2c_itc

apps/examples/testcase/ta_tc/systemio/itc : fix itc_iotbus_i2c_write_read_p

6 years agoMerge pull request #804 from arvinmittal/fix_systemio_gpio_itc
sangwon03 [Fri, 13 Oct 2017 09:48:59 +0000 (18:48 +0900)]
Merge pull request #804 from arvinmittal/fix_systemio_gpio_itc

Fix systemio itc_gpio.c file, change gpio pin 12 to 41

6 years agoMerge pull request #726 from arvinmittal/fix_audio_fw_itc
Taejun-Kwon [Fri, 13 Oct 2017 09:46:14 +0000 (18:46 +0900)]
Merge pull request #726 from arvinmittal/fix_audio_fw_itc

apps/examples/testcase/ta_tc/audio/itc: Add ITCs for Audio_Framework Module

6 years agoMerge pull request #809 from thapav/fixAPIerrors
Juitem JoonWoo Kim [Fri, 13 Oct 2017 09:34:07 +0000 (18:34 +0900)]
Merge pull request #809 from thapav/fixAPIerrors

(libc/stdio): Fix wrong initialization in FS TC.

6 years agoapps/examples/testcase/ta_tc/audio/itc: Add ITCs for Audio_Framework
Arvin Mittal [Thu, 28 Sep 2017 12:38:08 +0000 (18:08 +0530)]
apps/examples/testcase/ta_tc/audio/itc: Add ITCs for Audio_Framework

Signed-off-by: Arvin Mittal <arvin.mittal@samsung.com>
6 years agoMerge pull request #814 from pillip8282/wifimanager_network_event_signal
davidfather [Fri, 13 Oct 2017 08:41:20 +0000 (01:41 -0700)]
Merge pull request #814 from pillip8282/wifimanager_network_event_signal

net:wifimanager fix sending net events to iotivity from wifi manager

6 years agoMerge pull request #725 from arvinmittal/fix_mqtt_itc
pillip8282 [Fri, 13 Oct 2017 08:20:40 +0000 (17:20 +0900)]
Merge pull request #725 from arvinmittal/fix_mqtt_itc

apps/examples/testcase/ta_tc/mqtt/itc : Add ITCs for MQTT Module

6 years agoMerge pull request #796 from an4967/mbedtls_hw_support
sunghan-chang [Fri, 13 Oct 2017 07:52:52 +0000 (16:52 +0900)]
Merge pull request #796 from an4967/mbedtls_hw_support

mbedtls: implement hardware support in mbedtls

6 years agoapps/examples/testcase/ta_tc/mqtt/itc: Add ITCs for MQTT
Arvin Mittal [Thu, 28 Sep 2017 12:05:54 +0000 (17:35 +0530)]
apps/examples/testcase/ta_tc/mqtt/itc: Add ITCs for MQTT

Signed-off-by: Arvin Mittal <arvin.mittal@samsung.com>
6 years agoMerge pull request #821 from jeongarmy/ttrace_config
Juitem JoonWoo Kim [Fri, 13 Oct 2017 07:37:07 +0000 (16:37 +0900)]
Merge pull request #821 from jeongarmy/ttrace_config

testcase/ttrace: add select condition for using ttrace in Kconfig

6 years agotestcase/ttrace: add select condition for using ttrace in Kconfig
Ahreum Jeong [Fri, 13 Oct 2017 06:56:24 +0000 (15:56 +0900)]
testcase/ttrace: add select condition for using ttrace in Kconfig

Add select config in Kconfig for testcase of T-trace.
Enable CONFIG_TTRACE when EXAMPLES_TESTCASE_TTRACE is turned on.

6 years agoMerge pull request #817 from HONGCHAEHEE/sdk
sangwon03 [Fri, 13 Oct 2017 07:15:19 +0000 (16:15 +0900)]
Merge pull request #817 from HONGCHAEHEE/sdk

Fix assert during things reset

6 years agoapps/examples/testcase/ta_tc/systemio/itc : fix itc_iotbus_i2c_write_read_p
Arvin Mittal [Fri, 13 Oct 2017 07:12:23 +0000 (12:42 +0530)]
apps/examples/testcase/ta_tc/systemio/itc : fix itc_iotbus_i2c_write_read_p

Signed-off-by: Arvin Mittal <arvin.mittal@samsung.com>
6 years agoFix assert during things reset
chaehee.hong [Fri, 13 Oct 2017 03:06:32 +0000 (12:06 +0900)]
Fix assert during things reset
- Assert often occur during the reset process as the TCP receive thread is trying to use resources of the ping thread already terminated.
- The TCP receive thread does not need to call the session state callback to terminate the ping thread during reset because the reset loop thread will unregister that callback.

6 years ago(libc/stdio): Fix wrong initialization in FS TC.
Vidisha Thapa [Thu, 12 Oct 2017 15:30:36 +0000 (21:00 +0530)]
(libc/stdio): Fix wrong initialization in FS TC.

This patch fixes wrong initialization in setvbuf and remove API testcases.

Signed-off-by: Vidisha Thapa <thapa.v@samsung.com>
6 years agoMerge pull request #818 from jeongarmy/fix_tc_arastorage
Taejun-Kwon [Fri, 13 Oct 2017 05:44:28 +0000 (14:44 +0900)]
Merge pull request #818 from jeongarmy/fix_tc_arastorage

testcase/arastorage: delete checking result value in cleanup function.

6 years agotestcase/arastorage: delete checking result value in cleanup function.
Ahreum Jeong [Fri, 13 Oct 2017 05:27:22 +0000 (14:27 +0900)]
testcase/arastorage: delete checking result value in cleanup function.

cleanup function is called before and after arastorage TCs run to verify cleaning related resources
We don't need to check whether result value of function used here is valid or not.
Because this function is not tc and is used internally.

6 years agonet:wifimanager fix sending net events to iotivity from wifi manager
kang [Fri, 13 Oct 2017 02:04:30 +0000 (11:04 +0900)]
net:wifimanager fix sending net events to iotivity from wifi manager

Send network events to Iotivity only when the IP address is changed on the device.
Wifi manager sends network event even though sta leaves on SoftAP mode
In above case, The IP address on the device is still ok, so it doesn't need to send.

6 years agoMerge pull request #816 from an4967/adjust_things_sample
sunghan-chang [Fri, 13 Oct 2017 05:09:17 +0000 (14:09 +0900)]
Merge pull request #816 from an4967/adjust_things_sample

st_things: update st_things sample app

6 years agoMerge pull request #805 from sunghan-chang/tc
Taejun-Kwon [Fri, 13 Oct 2017 05:02:44 +0000 (14:02 +0900)]
Merge pull request #805 from sunghan-chang/tc

apps/testcase: refactor codes

6 years agost_things: update st_things sample app
Daesung [Fri, 13 Oct 2017 03:01:07 +0000 (12:01 +0900)]
st_things: update st_things sample app

- Add 2 dimmer resources
- Add handlers for additional resources

6 years agoMerge pull request #808 from davidfather/wifi_manager_refactoring
pillip8282 [Fri, 13 Oct 2017 04:22:13 +0000 (13:22 +0900)]
Merge pull request #808 from davidfather/wifi_manager_refactoring

Wi-Fi Manager: add a checkpoint, to check if Wi-Fi Manager is initial…

6 years agoMerge pull request #797 from JeonginKim/gpio2
sangwon03 [Fri, 13 Oct 2017 03:29:29 +0000 (12:29 +0900)]
Merge pull request #797 from JeonginKim/gpio2

removed unsupported gpio output mode

6 years agowpa_supplicant : PSK configuration parameter update allowing arbitrary data to be...
Jin-Seong Kim [Thu, 12 Oct 2017 07:51:06 +0000 (16:51 +0900)]
wpa_supplicant : PSK configuration parameter update allowing arbitrary data to be written

This commit is patch for mitigation security vulnerability on wpa_supplicant
 - https://w1.fi/security/2016-1/

    Reject SET commands with newline characters in the string values

    Many of the global configuration parameters are written as strings
    without filtering and if there is an embedded newline character in the
    value, unexpected configuration file data might be written.

    This fixes an issue where wpa_supplicant could have updated the
    configuration file global parameter with arbitrary data from the control
    interface or D-Bus interface. While those interfaces are supposed to be
    accessible only for trusted users/applications, it may be possible that
    an untrusted user has access to a management software component that
    does not validate the value of a parameter before passing it to
    wpa_supplicant.

    This could allow such an untrusted user to inject almost arbitrary data
    into the configuration file. Such configuration file could result in
    wpa_supplicant trying to load a library (e.g., opensc_engine_path,
    pkcs11_engine_path, pkcs11_module_path, load_dynamic_eap) from user
    controlled location when starting again. This would allow code from that
    library to be executed under the wpa_supplicant process privileges.

Change-Id: I0f0237ff9809fa8173a08fa45e74447e95a33e7d
Signed-off-by: Jin-Seong Kim <jseong82.kim@samsung.com>
6 years agowpa_supplicant : PSK configuration parameter update allowing arbitrary data to be...
Jin-Seong Kim [Thu, 12 Oct 2017 07:49:00 +0000 (16:49 +0900)]
wpa_supplicant : PSK configuration parameter update allowing arbitrary data to be written

This commit is patch for mitigation security vulnerability on wpa_supplicant
 - https://w1.fi/security/2016-1/

    Reject SET_CRED commands with newline characters in the string values

    Most of the cred block parameters are written as strings without
    filtering and if there is an embedded newline character in the value,
    unexpected configuration file data might be written.

    This fixes an issue where wpa_supplicant could have updated the
    configuration file cred parameter with arbitrary data from the control
    interface or D-Bus interface. While those interfaces are supposed to be
    accessible only for trusted users/applications, it may be possible that
    an untrusted user has access to a management software component that
    does not validate the credential value before passing it to
    wpa_supplicant.

    This could allow such an untrusted user to inject almost arbitrary data
    into the configuration file. Such configuration file could result in
    wpa_supplicant trying to load a library (e.g., opensc_engine_path,
    pkcs11_engine_path, pkcs11_module_path, load_dynamic_eap) from user
    controlled location when starting again. This would allow code from that
    library to be executed under the wpa_supplicant process privileges.

Change-Id: I41f6fed02ed00b0031b25a7e629094509d753675
Signed-off-by: Jin-Seong Kim <jseong82.kim@samsung.com>
6 years agowpa_supplicant : PSK configuration parameter update allowing arbitrary data to be...
Jin-Seong Kim [Thu, 12 Oct 2017 07:39:09 +0000 (16:39 +0900)]
wpa_supplicant : PSK configuration parameter update allowing arbitrary data to be written

This commit is patch for mitigation security vulnerability on wpa_supplicant
 - https://w1.fi/security/2016-1/

    Remove newlines from wpa_supplicant config network output

    Spurious newlines output while writing the config file can corrupt the
    wpa_supplicant configuration. Avoid writing these for the network block
    parameters. This is a generic filter that cover cases that may not have
    been explicitly addressed with a more specific commit to avoid control
    characters in the psk parameter.

Change-Id: I7c4d6ac0bb0fbc34225a03690034cd0e429a44cf
Signed-off-by: Jin-Seong Kim <jseong82.kim@samsung.com>
6 years agowpa_supplicant : PSK configuration parameter update allowing arbitrary data to be...
Jin-Seong Kim [Thu, 12 Oct 2017 07:28:29 +0000 (16:28 +0900)]
wpa_supplicant : PSK configuration parameter update allowing arbitrary data to be written

This commit is patch for mitigation security vulnerability on wpa_supplicant
 - https://w1.fi/security/2016-1/

    Reject psk parameter set with invalid passphrase character

    WPA/WPA2-Personal passphrase is not allowed to include control
    characters. Reject a passphrase configuration attempt if that passphrase
    includes an invalid passphrase.

    This fixes an issue where wpa_supplicant could have updated the
    configuration file psk parameter with arbitrary data from the control
    interface or D-Bus interface. While those interfaces are supposed to be
    accessible only for trusted users/applications, it may be possible that
    an untrusted user has access to a management software component that
    does not validate the passphrase value before passing it to
    wpa_supplicant.

    This could allow such an untrusted user to inject up to 63 characters of
    almost arbitrary data into the configuration file. Such configuration
    file could result in wpa_supplicant trying to load a library (e.g.,
    opensc_engine_path, pkcs11_engine_path, pkcs11_module_path,
    load_dynamic_eap) from user controlled location when starting again.
    This would allow code from that library to be executed under the
    wpa_supplicant process privileges.

Change-Id: Ic86dc19346f1a4601ae954dc169b1f0de57514de
Signed-off-by: Jin-Seong Kim <jseong82.kim@samsung.com>
6 years agowpa_supplicant : PSK configuration parameter update allowing arbitrary data to be...
Jin-Seong Kim [Thu, 12 Oct 2017 07:14:49 +0000 (16:14 +0900)]
wpa_supplicant : PSK configuration parameter update allowing arbitrary data to be written

This commit is patch for mitigation security vulnerability on wpa_supplicant
 - https://w1.fi/security/2016-1/

    WPS: Reject a Credential with invalid passphrase

    WPA/WPA2-Personal passphrase is not allowed to include control
    characters. Reject a Credential received from a WPS Registrar both as
    STA (Credential) and AP (AP Settings) if the credential is for WPAPSK or
    WPA2PSK authentication type and includes an invalid passphrase.

    This fixes an issue where hostapd or wpa_supplicant could have updated
    the configuration file PSK/passphrase parameter with arbitrary data from
    an external device (Registrar) that may not be fully trusted. Should
    such data include a newline character, the resulting configuration file
    could become invalid and fail to be parsed.

Change-Id: I106f6949da95b6e03e1489b63c1e7787e24eb478
Signed-off-by: Jin-Seong Kim <jseong82.kim@samsung.com>
6 years agoMerge pull request #807 from jeongarmy/fix_tc_arastorage
sunghan-chang [Fri, 13 Oct 2017 02:39:10 +0000 (11:39 +0900)]
Merge pull request #807 from jeongarmy/fix_tc_arastorage

testcase/arastorage: call cleanup function at the beginning arastorage TCs to verify cleaning all undeleted resources

6 years agoMerge pull request #813 from jeongchanKim/coding_rule
sunghan-chang [Fri, 13 Oct 2017 02:32:39 +0000 (11:32 +0900)]
Merge pull request #813 from jeongchanKim/coding_rule

testcase/filesystem : fix coding rule error - remove unnecessary space

6 years agoWi-Fi Manager: add a checkpoint, to check if Wi-Fi Manager is initialized, in APIs...
Seongil Hahm [Thu, 12 Oct 2017 15:20:12 +0000 (08:20 -0700)]
Wi-Fi Manager: add a checkpoint, to check if Wi-Fi Manager is initialized, in APIs and callback handlers

To make Wi-Fi Manager thread-safe, it is necessary to check if Wi-Fi Manager is initialized.
For simplicity, we just do null-comparison of w_mutex and w_info_mutex at the very beginning of each API and each callback handler.

6 years agoMerge pull request #750 from JeongJunSik/temp
sunghan-chang [Fri, 13 Oct 2017 02:28:32 +0000 (11:28 +0900)]
Merge pull request #750 from JeongJunSik/temp

st_things : Get the manufacturerName from JSON

6 years agost_things : add logic of parsing manufacturerName from JSON
정준식/Things Platform Lab(S/W센터)/Engineer/삼성전자 [Sun, 1 Oct 2017 05:50:09 +0000 (14:50 +0900)]
st_things : add logic of parsing manufacturerName from JSON
- Changed the pre-defined value to use JSON value

6 years agotestcase/filesystem : fix coding rule error - remove unnecessary space
jc_.kim [Fri, 13 Oct 2017 02:12:18 +0000 (11:12 +0900)]
testcase/filesystem : fix coding rule error - remove unnecessary space

[IDT_M_TAB] please, no space before tabs

6 years agoremove unsupported gpio output mode
JeonginKim [Thu, 12 Oct 2017 10:00:28 +0000 (19:00 +0900)]
remove unsupported gpio output mode

artik053 board is not support 2mode(IOTBUS_GPIO_DRIVE_NONE, IOTBUS_GPIO_DRIVE_PUSHPULL)

6 years agoMerge pull request #720 from arvinmittal/fix_wifi_manager_itc
davidfather [Fri, 13 Oct 2017 00:54:03 +0000 (17:54 -0700)]
Merge pull request #720 from arvinmittal/fix_wifi_manager_itc

Add ITCs for Wifi_manager Module

6 years agoMerge pull request #801 from JeonginKim/sec2
sangwon03 [Thu, 12 Oct 2017 23:57:35 +0000 (08:57 +0900)]
Merge pull request #801 from JeonginKim/sec2

Fixed stack based memory disclosure in FTP client

6 years agoMerge pull request #800 from an4967/remove_unused_ca
sangwon03 [Thu, 12 Oct 2017 23:46:54 +0000 (08:46 +0900)]
Merge pull request #800 from an4967/remove_unused_ca

st_things: modify things_sdk security resources process

6 years agoFix er-coap parsing in wakaama to handle heap buffer overflows
venkat.iyer [Thu, 12 Oct 2017 12:21:07 +0000 (21:21 +0900)]
Fix er-coap parsing in wakaama to handle heap buffer overflows

Two cases of heap buffer overflows are considered:

1. When packet length is less than the coap header length of 4 bytes
2. when the option byte lengths have values far greater than what the packet buffer capacity. In this case, especially when merging contiguous location query coap options, buffer overflow tends to occur.

Functions modified: coap_parse_message, and coap_merge_multi_option.