7370 Commits

Author SHA1 Message Date
Brian
490343b4d3 Add CodeQL Workflow for Code Security Analysis
Add CodeQL Workflow for Code Security Analysis

This pull request introduces a CodeQL workflow to enhance the security analysis of our repository. CodeQL is a powerful static analysis tool that helps identify and mitigate security vulnerabilities in our codebase. By integrating this workflow into our GitHub Actions, we can proactively identify and address potential issues before they become security threats.

We added a new CodeQL workflow file (.github/workflows/codeql.yml) that
- Runs on every pull request (functionality to run on every push to main branches is included as a comment for convenience).
- Runs daily.
- Excludes queries with a high false positive rate or low-severity findings.
- Does not display results for git submodules, focusing only on our own codebase.

Testing:
To validate the functionality of this workflow, we have run several test scans on the codebase and reviewed the results. The workflow successfully compiles the project, identifies issues, and provides actionable insights while reducing noise by excluding certain queries and third-party code.

Deployment:
Once this pull request is merged, the CodeQL workflow will be active and automatically run on every push and pull request to the main branch. To view the results of these code scans, please follow these steps:
1. Under the repository name, click on the Security tab.
2. In the left sidebar, click Code scanning alerts.

Additional Information:
- You can further customize the workflow to adapt to your specific needs by modifying the workflow file.
- For more information on CodeQL and how to interpret its results, refer to the GitHub documentation and the CodeQL documentation (https://codeql.github.com/ and https://codeql.github.com/docs/).

Signed-off-by: Brian <bayuan@purdue.edu>
2023-10-29 15:28:27 -04:00
Yveaux
ae7ad53949 Add PlatformIO manifest 2023-10-28 14:47:29 +02:00
hathach
9cba9a753b
update s3 devkitm with max3421 pin following metro s3, check max3421 version to make sure it is valid 2023-10-27 17:40:53 +07:00
PanRe
10558acac6
Merge pull request #2289 from HiFiPhile/uac_interl
Update audio_4_channel_mic example for HS device.
2023-10-25 20:31:00 +02:00
HiFiPhile
2d802e03e9 Update audio_4_channel_mic example for HS device. 2023-10-24 22:14:24 +02:00
Brian
3cc82d656e Add CodeQL Workflow for Code Security Analysis
Add CodeQL Workflow for Code Security Analysis

This pull request introduces a CodeQL workflow to enhance the security analysis of our repository. CodeQL is a powerful static analysis tool that helps identify and mitigate security vulnerabilities in our codebase. By integrating this workflow into our GitHub Actions, we can proactively identify and address potential issues before they become security threats.

We added a new CodeQL workflow file (.github/workflows/codeql.yml) that
- Runs on every pull request (functionality to run on every push to main branches is included as a comment for convenience).
- Runs daily.
- Excludes queries with a high false positive rate or low-severity findings.
- Does not display results for git submodules, focusing only on our own codebase.

Testing:
To validate the functionality of this workflow, we have run several test scans on the codebase and reviewed the results. The workflow successfully compiles the project, identifies issues, and provides actionable insights while reducing noise by excluding certain queries and third-party code.

Deployment:
Once this pull request is merged, the CodeQL workflow will be active and automatically run on every push and pull request to the main branch. To view the results of these code scans, please follow these steps:
1. Under the repository name, click on the Security tab.
2. In the left sidebar, click Code scanning alerts.

Additional Information:
- You can further customize the workflow to adapt to your specific needs by modifying the workflow file.
- For more information on CodeQL and how to interpret its results, refer to the GitHub documentation and the CodeQL documentation (https://codeql.github.com/ and https://codeql.github.com/docs/).

Signed-off-by: Brian <bayuan@purdue.edu>
2023-10-20 01:02:27 -04:00
PanRe
a2390802f8
Merge pull request #2282 from HiFiPhile/uac_interl
UAC IN transfer improvements
2023-10-19 19:49:19 +02:00
Brian
b8ae3d55d4 Add CodeQL Workflow for Code Security Analysis
Add CodeQL Workflow for Code Security Analysis

This pull request introduces a CodeQL workflow to enhance the security analysis of our repository. CodeQL is a powerful static analysis tool that helps identify and mitigate security vulnerabilities in our codebase. By integrating this workflow into our GitHub Actions, we can proactively identify and address potential issues before they become security threats.

We added a new CodeQL workflow file (.github/workflows/codeql.yml) that
- Runs on every pull request (functionality to run on every push to main branches is included as a comment for convenience).
- Runs daily.
- Excludes queries with a high false positive rate or low-severity findings.
- Does not display results for git submodules, focusing only on our own codebase.

Testing:
To validate the functionality of this workflow, we have run several test scans on the codebase and reviewed the results. The workflow successfully compiles the project, identifies issues, and provides actionable insights while reducing noise by excluding certain queries and third-party code.

Deployment:
Once this pull request is merged, the CodeQL workflow will be active and automatically run on every push and pull request to the main branch. To view the results of these code scans, please follow these steps:
1. Under the repository name, click on the Security tab.
2. In the left sidebar, click Code scanning alerts.

Additional Information:
- You can further customize the workflow to adapt to your specific needs by modifying the workflow file.
- For more information on CodeQL and how to interpret its results, refer to the GitHub documentation and the CodeQL documentation (https://codeql.github.com/ and https://codeql.github.com/docs/).

Signed-off-by: Brian <bayuan@purdue.edu>
2023-10-18 16:50:07 -04:00
Mengsk
d3fa3cdf48 Adjsut blackout time. 2023-10-18 17:05:35 +02:00
hathach
27a2c8cba4
adding nulceo stm32u5a5, fix clock configure issue
dwc2 core stuck at reset
2023-10-18 18:43:07 +07:00
hathach
5025e80c9e
adding u5a5 nucleo 2023-10-18 15:27:06 +07:00
Ha Thach
dd588222c7
Merge pull request #2265 from bencowperthwaite/master
STM32U5 HS Support
2023-10-18 15:25:57 +07:00
HiFiPhile
ade8a19aef Put sw_buf in USB section only if necessary. 2023-10-17 21:21:52 +02:00
HiFiPhile
e9d894fe66 Fix compile. 2023-10-17 21:03:29 +02:00
Ha Thach
0ede159ad0
Merge pull request #2244 from gabChouin/feat-stm32u575_nucleo
Add stm32u575-nucleo support
2023-10-18 00:06:28 +07:00
hathach
a5a77af11e
add board.mk for u575 nucleo 2023-10-17 23:53:09 +07:00
hathach
22aefd6aba
add cmake support for u575 nucleo 2023-10-17 22:48:54 +07:00
Ha Thach
80ee307244
Merge branch 'master' into feat-stm32u575_nucleo 2023-10-17 22:31:33 +07:00
HiFiPhile
d83a210788 Add blackout time. 2023-10-17 15:18:05 +02:00
HiFiPhile
0a1d6cf4d0 Read sample rate directly from control transfer to eliminate callback. 2023-10-17 13:06:55 +02:00
HiFiPhile
656e1e416a Add flow control for IN transfer. 2023-10-17 09:46:01 +02:00
Brian
d6acbd0ea5 Add CodeQL Workflow for Code Security Analysis
Add CodeQL Workflow for Code Security Analysis

This pull request introduces a CodeQL workflow to enhance the security analysis of our repository. CodeQL is a powerful static analysis tool that helps identify and mitigate security vulnerabilities in our codebase. By integrating this workflow into our GitHub Actions, we can proactively identify and address potential issues before they become security threats.

We added a new CodeQL workflow file (.github/workflows/codeql.yml) that
- Runs on every push and pull request to the main branch.
- Excludes queries with a high false positive rate or low-severity findings.
- Does not display results for third-party code, focusing only on our own codebase.

Testing:
To validate the functionality of this workflow, we have run several test scans on the codebase and reviewed the results. The workflow successfully compiles the project, identifies issues, and provides actionable insights while reducing noise by excluding certain queries and third-party code.

Deployment:
Once this pull request is merged, the CodeQL workflow will be active and automatically run on every push and pull request to the main branch. To view the results of these code scans, please follow these steps:
1. Under the repository name, click on the Security tab.
2. In the left sidebar, click Code scanning alerts.

Additional Information:
- You can further customize the workflow to adapt to your specific needs by modifying the workflow file.
- For more information on CodeQL and how to interpret its results, refer to the GitHub documentation and the CodeQL documentation.

Signed-off-by: Brian <bayuan@purdue.edu>
2023-10-11 19:59:23 -04:00
PanRe
118823c254
Merge pull request #2259 from HiFiPhile/uac_interl
Fix UAC encoding, update example.
2023-10-11 19:18:35 +02:00
HiFiPhile
c8430f5f85 Refactor to get rid of CMSIS DSP lib. 2023-10-10 20:00:50 +02:00
HiFiPhile
e2852da668 Update deps. 2023-10-10 18:35:24 +02:00
HiFiPhile
504d29cf7a Update make & cmake file. 2023-10-10 18:25:42 +02:00
HiFiPhile
20699e30dd Enhance plot script. 2023-10-10 18:25:14 +02:00
HiFiPhile
2ba760a1c1 Enhance audio_4_channel_mic example, plot 4 different waves for each channel. 2023-10-10 18:24:47 +02:00
HiFiPhile
8b2cb63da8 Fix naming nBytesPerSample. 2023-10-10 18:22:20 +02:00
HiFiPhile
b5c839f739 Merge branch 'master' of https://github.com/hathach/tinyusb into uac_interl 2023-10-10 15:02:25 +02:00
denis.krasutski
ce627f4318 feat(ch32f20x): add support of ch32f20x 2023-10-06 13:04:54 +03:00
Ha Thach
513ab37ec6
Merge pull request #2276 from hathach/more-esp32-max3421
More max3421
2023-10-05 17:53:13 +07:00
hathach
cfb683f481
tested with nrf52840 and esp32s2 2023-10-05 17:01:41 +07:00
hathach
67e34267a6 change tuh_max3421_spi_xfer_api() signature
tested working with sam d21 and d51, not tested with nrf52, seem not
working with esp32
2023-10-04 18:00:32 +07:00
hathach
f36e0b7b92
esp32 comment out uart, increase max3421 spi speed to 26mhz 2023-10-03 16:27:35 +07:00
Ha Thach
b394ae1786
Merge pull request #2270 from hathach/add-max3421-esp32
Add max3421 support for esp32
2023-09-28 16:56:20 +07:00
hathach
8348631bf5
improve esp32 ci, build esp32 with -DDMAX3421_HOST=1 for max3421 testing
revert change in hcd.h
2023-09-28 16:15:31 +07:00
hathach
6b8933cfe8
fix build with new freertos host example 2023-09-28 12:55:59 +07:00
hathach
7dc1a66f91
esp32 cdc host with max3421 work well 2023-09-28 11:12:22 +07:00
hathach
277852afc1
fix esp32 msc example 2023-09-28 10:56:38 +07:00
hathach
10abece264
esp32 hid device work well 2023-09-28 10:06:10 +07:00
hathach
3a10b6a3d5
fix esp32 build 2023-09-27 18:09:19 +07:00
hathach
76c43a5bdc
Merge branch 'master' into add-max3421-esp32 2023-09-27 17:52:18 +07:00
Ha Thach
5b08a65ad2
Merge pull request #2268 from HiFiPhile/iar_tmpl
Update IAR template.
2023-09-27 17:41:18 +07:00
Ha Thach
e4058177af
Merge pull request #2269 from hathach/add-in_isr-to-hcd_int_hanlder
Add in isr to hcd int hanlder
2023-09-27 17:40:50 +07:00
Ha Thach
68c4009bba
Merge branch 'master' into add-in_isr-to-hcd_int_hanlder 2023-09-27 17:01:40 +07:00
Mengsk
42eb4e0da0 Fix CI. 2023-09-27 11:46:52 +02:00
Mengsk
b35621fc63 Update IAR template. 2023-09-27 11:43:23 +02:00
hathach
58c49cea5b
remove sct_neopixel from lpc54 (due to warnings and not used) 2023-09-27 16:31:46 +07:00
hathach
0a4fb6963d
fix build with lpc54 2023-09-27 16:19:39 +07:00