ESP8266 Socket Library. AT Thinker firmware.

Dependents:   ESP8266_MQTT_HelloWorld ESP8266_IFTTT_Test ECE_4180_Lab_4 websocketmbed ... more

Fork of ESP8266Interface by ESP8266

This repository has been superceded

This project has moved to https://developer.mbed.org/teams/ESP8266/code/esp8266-driver/

This library works with the AT Thinker firmware.

Note

This library is currently in Beta. It is not feature complete and has some bugs, proceed with caution! Fixes and patches are welcome and appreciated!

Currently the ESP8266Interface Library has the following Abilities:

Working

  • TCP Client
  • UDP Client
  • Transparent mode (single connection of 1 type at a time)
  • Station Mode (connects to AP)

To be implemented

  • TCP Server
  • UDP Server
  • Multi Connection Mode (able to have up to 5 sockets at a time)
  • AP Mode (Make ESP Chip act like access point)
  • DNS Support (currently websites must be looked up by IP)
  • Error Recovery

Nice but not necessary

  • colorized text for ESP AT Commands in Command line (easier to differentiate from other text)
Committer:
lz307
Date:
Fri Nov 08 21:27:08 2013 +0000
Revision:
7:3152fcc74390
Parent:
1:fb4494783863
Child:
8:04afe20d7927
Child:
10:131675c17372
Added delay to accommodate slow speed on the seeed wifi shield.

Who changed what in which revision?

UserRevisionLine numberNew contents of line
samux 1:fb4494783863 1 /* Copyright (C) 2012 mbed.org, MIT License
samux 1:fb4494783863 2 *
samux 1:fb4494783863 3 * Permission is hereby granted, free of charge, to any person obtaining a copy of this software
samux 1:fb4494783863 4 * and associated documentation files (the "Software"), to deal in the Software without restriction,
samux 1:fb4494783863 5 * including without limitation the rights to use, copy, modify, merge, publish, distribute,
samux 1:fb4494783863 6 * sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is
samux 1:fb4494783863 7 * furnished to do so, subject to the following conditions:
samux 1:fb4494783863 8 *
samux 1:fb4494783863 9 * The above copyright notice and this permission notice shall be included in all copies or
samux 1:fb4494783863 10 * substantial portions of the Software.
samux 1:fb4494783863 11 *
samux 1:fb4494783863 12 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING
samux 1:fb4494783863 13 * BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
samux 1:fb4494783863 14 * NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM,
samux 1:fb4494783863 15 * DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
samux 1:fb4494783863 16 * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
samux 1:fb4494783863 17 */
samux 1:fb4494783863 18
samux 1:fb4494783863 19 #include "mbed.h"
samux 1:fb4494783863 20 #include "Wifly.h"
samux 1:fb4494783863 21 #include <string>
samux 1:fb4494783863 22 #include <algorithm>
samux 1:fb4494783863 23
samux 1:fb4494783863 24 //Debug is disabled by default
lz307 7:3152fcc74390 25 #if (1 && defined(TARGET_LPC1768))
samux 1:fb4494783863 26 #define DBG(x, ...) std::printf("[Wifly : DBG]"x"\r\n", ##__VA_ARGS__);
samux 1:fb4494783863 27 #define WARN(x, ...) std::printf("[Wifly : WARN]"x"\r\n", ##__VA_ARGS__);
samux 1:fb4494783863 28 #define ERR(x, ...) std::printf("[Wifly : ERR]"x"\r\n", ##__VA_ARGS__);
samux 1:fb4494783863 29 #else
samux 1:fb4494783863 30 #define DBG(x, ...)
samux 1:fb4494783863 31 #define WARN(x, ...)
samux 1:fb4494783863 32 #define ERR(x, ...)
samux 1:fb4494783863 33 #endif
samux 1:fb4494783863 34
samux 1:fb4494783863 35 #if TARGET_LPC1768
samux 1:fb4494783863 36 #define INFO(x, ...) printf("[Wifly : INFO]"x"\r\n", ##__VA_ARGS__);
samux 1:fb4494783863 37 #else
samux 1:fb4494783863 38 #define INFO(x, ...)
samux 1:fb4494783863 39 #endif
samux 1:fb4494783863 40
samux 1:fb4494783863 41 #define MAX_TRY_JOIN 3
samux 1:fb4494783863 42
samux 1:fb4494783863 43 Wifly * Wifly::inst;
samux 1:fb4494783863 44
samux 1:fb4494783863 45 Wifly::Wifly( PinName tx, PinName rx, PinName _reset, PinName tcp_status, const char * ssid, const char * phrase, Security sec):
samux 1:fb4494783863 46 wifi(tx, rx), reset_pin(_reset), tcp_status(tcp_status), buf_wifly(256)
samux 1:fb4494783863 47 {
samux 1:fb4494783863 48 memset(&state, 0, sizeof(state));
samux 1:fb4494783863 49 state.sec = sec;
samux 1:fb4494783863 50
samux 1:fb4494783863 51 // change all ' ' in '$' in the ssid and the passphrase
samux 1:fb4494783863 52 strcpy(this->ssid, ssid);
samux 1:fb4494783863 53 for (int i = 0; i < strlen(ssid); i++) {
samux 1:fb4494783863 54 if (this->ssid[i] == ' ')
samux 1:fb4494783863 55 this->ssid[i] = '$';
samux 1:fb4494783863 56 }
samux 1:fb4494783863 57 strcpy(this->phrase, phrase);
samux 1:fb4494783863 58 for (int i = 0; i < strlen(phrase); i++) {
samux 1:fb4494783863 59 if (this->phrase[i] == ' ')
samux 1:fb4494783863 60 this->phrase[i] = '$';
samux 1:fb4494783863 61 }
samux 1:fb4494783863 62
samux 1:fb4494783863 63 inst = this;
samux 1:fb4494783863 64 attach_rx(false);
samux 1:fb4494783863 65 state.cmd_mode = false;
samux 1:fb4494783863 66 }
samux 1:fb4494783863 67
samux 1:fb4494783863 68 bool Wifly::join()
samux 1:fb4494783863 69 {
samux 1:fb4494783863 70 char cmd[20];
samux 1:fb4494783863 71
samux 1:fb4494783863 72 for (int i= 0; i < MAX_TRY_JOIN; i++) {
samux 1:fb4494783863 73 // set time
samux 1:fb4494783863 74 if (!sendCommand("set c t 20\r", "AOK"))
samux 1:fb4494783863 75 continue;
samux 1:fb4494783863 76
samux 1:fb4494783863 77 // set size
samux 1:fb4494783863 78 if (!sendCommand("set c s 128\r", "AOK"))
samux 1:fb4494783863 79 continue;
samux 1:fb4494783863 80
samux 1:fb4494783863 81 // red led on when tcp connection active
samux 1:fb4494783863 82 if (!sendCommand("set s i 0x40\r", "AOK"))
samux 1:fb4494783863 83 continue;
samux 1:fb4494783863 84
samux 1:fb4494783863 85 // no string sent to the tcp client
samux 1:fb4494783863 86 if (!sendCommand("set c r 0\r", "AOK"))
samux 1:fb4494783863 87 continue;
samux 1:fb4494783863 88
samux 1:fb4494783863 89 // tcp protocol
samux 1:fb4494783863 90 if (!sendCommand("set i p 2\r", "AOK"))
samux 1:fb4494783863 91 continue;
samux 1:fb4494783863 92
samux 1:fb4494783863 93 // tcp retry
samux 1:fb4494783863 94 if (!sendCommand("set i f 0x7\r", "AOK"))
samux 1:fb4494783863 95 continue;
samux 1:fb4494783863 96
samux 1:fb4494783863 97 //no echo
samux 1:fb4494783863 98 if (!sendCommand("set u m 1\r", "AOK"))
samux 1:fb4494783863 99 continue;
samux 1:fb4494783863 100
samux 1:fb4494783863 101 // no auto join
samux 1:fb4494783863 102 if (!sendCommand("set w j 0\r", "AOK"))
samux 1:fb4494783863 103 continue;
samux 1:fb4494783863 104
samux 1:fb4494783863 105 //dhcp
samux 1:fb4494783863 106 sprintf(cmd, "set i d %d\r", (state.dhcp) ? 1 : 0);
samux 1:fb4494783863 107 if (!sendCommand(cmd, "AOK"))
samux 1:fb4494783863 108 continue;
samux 1:fb4494783863 109
samux 1:fb4494783863 110 // ssid
samux 1:fb4494783863 111 sprintf(cmd, "set w s %s\r", ssid);
lz307 7:3152fcc74390 112 if (!sendCommand(cmd, "AOK", NULL, 1000))
samux 1:fb4494783863 113 continue;
samux 1:fb4494783863 114
samux 1:fb4494783863 115 //auth
samux 1:fb4494783863 116 sprintf(cmd, "set w a %d\r", state.sec);
samux 1:fb4494783863 117 if (!sendCommand(cmd, "AOK"))
samux 1:fb4494783863 118 continue;
samux 1:fb4494783863 119
samux 1:fb4494783863 120 // if no dhcp, set ip, netmask and gateway
samux 1:fb4494783863 121 if (!state.dhcp) {
samux 1:fb4494783863 122 DBG("not dhcp\r");
samux 1:fb4494783863 123
samux 1:fb4494783863 124 sprintf(cmd, "set i a %s\r\n", ip);
samux 1:fb4494783863 125 if (!sendCommand(cmd, "AOK"))
samux 1:fb4494783863 126 continue;
samux 1:fb4494783863 127
samux 1:fb4494783863 128 sprintf(cmd, "set i n %s\r", netmask);
samux 1:fb4494783863 129 if (!sendCommand(cmd, "AOK"))
samux 1:fb4494783863 130 continue;
samux 1:fb4494783863 131
samux 1:fb4494783863 132 sprintf(cmd, "set i g %s\r", gateway);
samux 1:fb4494783863 133 if (!sendCommand(cmd, "AOK"))
samux 1:fb4494783863 134 continue;
samux 1:fb4494783863 135 }
samux 1:fb4494783863 136
samux 1:fb4494783863 137 //key step
samux 1:fb4494783863 138 if (state.sec != NONE) {
samux 1:fb4494783863 139 if (state.sec == WPA)
samux 1:fb4494783863 140 sprintf(cmd, "set w p %s\r", phrase);
samux 1:fb4494783863 141 else if (state.sec == WEP_128)
samux 1:fb4494783863 142 sprintf(cmd, "set w k %s\r", phrase);
samux 1:fb4494783863 143
lz307 7:3152fcc74390 144 if (!sendCommand(cmd, "AOK", NULL, 1000))
samux 1:fb4494783863 145 continue;
samux 1:fb4494783863 146 }
samux 1:fb4494783863 147
samux 1:fb4494783863 148 //join the network
samux 1:fb4494783863 149 sprintf(cmd, "join\r");
samux 1:fb4494783863 150 if (!sendCommand(cmd, "Associated", NULL, 3000))
samux 1:fb4494783863 151 continue;
lz307 7:3152fcc74390 152
lz307 7:3152fcc74390 153 if (!sendCommand("", "IP=", NULL, 10000))
lz307 7:3152fcc74390 154 continue;
samux 1:fb4494783863 155
samux 1:fb4494783863 156 if (state.dhcp) {
lz307 7:3152fcc74390 157 if (!sendCommand("get i\r", "DHCP=ON", NULL, 3000))
samux 1:fb4494783863 158 continue;
samux 1:fb4494783863 159 }
samux 1:fb4494783863 160
samux 1:fb4494783863 161 exit();
samux 1:fb4494783863 162
samux 1:fb4494783863 163 state.associated = true;
samux 1:fb4494783863 164 INFO("\r\nssid: %s\r\nphrase: %s\r\nsecurity: %s\r\n\r\n", this->ssid, this->phrase, getStringSecurity());
samux 1:fb4494783863 165 return true;
samux 1:fb4494783863 166 }
samux 1:fb4494783863 167 return false;
samux 1:fb4494783863 168 }
samux 1:fb4494783863 169
samux 1:fb4494783863 170
samux 1:fb4494783863 171 bool Wifly::setProtocol(Protocol p)
samux 1:fb4494783863 172 {
samux 1:fb4494783863 173 // use udp auto pairing
samux 1:fb4494783863 174 char cmd[20];
samux 1:fb4494783863 175 sprintf(cmd, "set i p %d\r", p);
samux 1:fb4494783863 176 if (!sendCommand(cmd, "AOK"))
samux 1:fb4494783863 177 return false;
samux 1:fb4494783863 178
samux 1:fb4494783863 179 switch(p) {
samux 1:fb4494783863 180 case TCP:
samux 1:fb4494783863 181 // set ip flags: tcp retry enabled
samux 1:fb4494783863 182 if (!sendCommand("set i f 0x07\r", "AOK"))
samux 1:fb4494783863 183 return false;
samux 1:fb4494783863 184 break;
samux 1:fb4494783863 185 case UDP:
samux 1:fb4494783863 186 // set ip flags: udp auto pairing enabled
samux 1:fb4494783863 187 if (!sendCommand("set i f 0x40\r", "AOK"))
samux 1:fb4494783863 188 return false;
samux 1:fb4494783863 189 if (!sendCommand("set i h 0.0.0.0\r", "AOK"))
samux 1:fb4494783863 190 return false;
samux 1:fb4494783863 191 if (!sendCommand("set i r 0\r", "AOK"))
samux 1:fb4494783863 192 return false;
samux 1:fb4494783863 193 break;
samux 1:fb4494783863 194 }
samux 1:fb4494783863 195 state.proto = p;
samux 1:fb4494783863 196 return true;
samux 1:fb4494783863 197 }
samux 1:fb4494783863 198
samux 1:fb4494783863 199 char * Wifly::getStringSecurity()
samux 1:fb4494783863 200 {
samux 1:fb4494783863 201 switch(state.sec) {
samux 1:fb4494783863 202 case NONE:
samux 1:fb4494783863 203 return "NONE";
samux 1:fb4494783863 204 case WEP_128:
samux 1:fb4494783863 205 return "WEP_128";
samux 1:fb4494783863 206 case WPA:
samux 1:fb4494783863 207 return "WPA";
samux 1:fb4494783863 208 }
samux 1:fb4494783863 209 return "UNKNOWN";
samux 1:fb4494783863 210 }
samux 1:fb4494783863 211
samux 1:fb4494783863 212 bool Wifly::connect(const char * host, int port)
samux 1:fb4494783863 213 {
samux 1:fb4494783863 214 char rcv[20];
samux 1:fb4494783863 215 char cmd[20];
samux 1:fb4494783863 216
samux 1:fb4494783863 217 // get ip from host and set host
samux 1:fb4494783863 218 if (gethostbyname(host, rcv)) {
samux 1:fb4494783863 219 sprintf(cmd, "set i h %s\r", rcv);
samux 1:fb4494783863 220 if (!sendCommand(cmd, "AOK"))
samux 1:fb4494783863 221 return false;
samux 1:fb4494783863 222 } else {
samux 1:fb4494783863 223 return false;
samux 1:fb4494783863 224 }
samux 1:fb4494783863 225
samux 1:fb4494783863 226 // set port
samux 1:fb4494783863 227 sprintf(cmd, "set i r %d\r", port);
samux 1:fb4494783863 228 if (!sendCommand(cmd, "AOK"))
samux 1:fb4494783863 229 return false;
samux 1:fb4494783863 230
samux 1:fb4494783863 231 // open
samux 1:fb4494783863 232 if (sendCommand("open\r", NULL, rcv)) {
samux 1:fb4494783863 233 if (strstr(rcv, "OPEN") == NULL) {
samux 1:fb4494783863 234 if (strstr(rcv, "Connected") != NULL) {
samux 1:fb4494783863 235 if (!sendCommand("close\r", "CLOS"))
samux 1:fb4494783863 236 return false;
samux 1:fb4494783863 237 if (!sendCommand("open\r", "OPEN"))
samux 1:fb4494783863 238 return false;
samux 1:fb4494783863 239 } else {
samux 1:fb4494783863 240 return false;
samux 1:fb4494783863 241 }
samux 1:fb4494783863 242 }
samux 1:fb4494783863 243 } else {
samux 1:fb4494783863 244 return false;
samux 1:fb4494783863 245 }
samux 1:fb4494783863 246
samux 1:fb4494783863 247 state.tcp = true;
samux 1:fb4494783863 248 state.cmd_mode = false;
samux 1:fb4494783863 249
samux 1:fb4494783863 250 return true;
samux 1:fb4494783863 251 }
samux 1:fb4494783863 252
samux 1:fb4494783863 253
samux 1:fb4494783863 254 bool Wifly::gethostbyname(const char * host, char * ip)
samux 1:fb4494783863 255 {
samux 1:fb4494783863 256 string h = host;
samux 1:fb4494783863 257 char cmd[30], rcv[100];
samux 1:fb4494783863 258 int l = 0;
samux 1:fb4494783863 259 char * point;
samux 1:fb4494783863 260 int nb_digits = 0;
samux 1:fb4494783863 261
samux 1:fb4494783863 262 // no dns needed
samux 1:fb4494783863 263 int pos = h.find(".");
samux 1:fb4494783863 264 if (pos != string::npos) {
samux 1:fb4494783863 265 string sub = h.substr(0, h.find("."));
samux 1:fb4494783863 266 nb_digits = atoi(sub.c_str());
samux 1:fb4494783863 267 }
samux 1:fb4494783863 268 //printf("substrL %s\r\n", sub.c_str());
samux 1:fb4494783863 269 if (count(h.begin(), h.end(), '.') == 3 && nb_digits > 0) {
samux 1:fb4494783863 270 strcpy(ip, host);
samux 1:fb4494783863 271 }
samux 1:fb4494783863 272 // dns needed
samux 1:fb4494783863 273 else {
samux 1:fb4494783863 274 nb_digits = 0;
samux 1:fb4494783863 275 sprintf(cmd, "lookup %s\r", host);
samux 1:fb4494783863 276 if (!sendCommand(cmd, NULL, rcv))
samux 1:fb4494783863 277 return false;
samux 1:fb4494783863 278
samux 1:fb4494783863 279 // look for the ip address
samux 1:fb4494783863 280 char * begin = strstr(rcv, "=") + 1;
samux 1:fb4494783863 281 for (int i = 0; i < 3; i++) {
samux 1:fb4494783863 282 point = strstr(begin + l, ".");
samux 1:fb4494783863 283 DBG("str: %s", begin + l);
samux 1:fb4494783863 284 l += point - (begin + l) + 1;
samux 1:fb4494783863 285 }
samux 1:fb4494783863 286 DBG("str: %s", begin + l);
samux 1:fb4494783863 287 while(*(begin + l + nb_digits) >= '0' && *(begin + l + nb_digits) <= '9') {
samux 1:fb4494783863 288 DBG("digit: %c", *(begin + l + nb_digits));
samux 1:fb4494783863 289 nb_digits++;
samux 1:fb4494783863 290 }
samux 1:fb4494783863 291 memcpy(ip, begin, l + nb_digits);
samux 1:fb4494783863 292 ip[l+nb_digits] = 0;
samux 1:fb4494783863 293 DBG("ip from dns: %s", ip);
samux 1:fb4494783863 294 }
samux 1:fb4494783863 295 return true;
samux 1:fb4494783863 296 }
samux 1:fb4494783863 297
samux 1:fb4494783863 298
samux 1:fb4494783863 299 void Wifly::flush()
samux 1:fb4494783863 300 {
samux 1:fb4494783863 301 buf_wifly.flush();
samux 1:fb4494783863 302 }
samux 1:fb4494783863 303
samux 1:fb4494783863 304 bool Wifly::sendCommand(const char * cmd, const char * ack, char * res, int timeout)
samux 1:fb4494783863 305 {
samux 1:fb4494783863 306 if (!state.cmd_mode) {
samux 1:fb4494783863 307 cmdMode();
samux 1:fb4494783863 308 }
samux 1:fb4494783863 309 if (send(cmd, strlen(cmd), ack, res, timeout) == -1) {
samux 1:fb4494783863 310 ERR("sendCommand: cannot %s\r\n", cmd);
samux 1:fb4494783863 311 exit();
samux 1:fb4494783863 312 return false;
samux 1:fb4494783863 313 }
samux 1:fb4494783863 314 return true;
samux 1:fb4494783863 315 }
samux 1:fb4494783863 316
samux 1:fb4494783863 317 bool Wifly::cmdMode()
samux 1:fb4494783863 318 {
samux 1:fb4494783863 319 // if already in cmd mode, return
samux 1:fb4494783863 320 if (state.cmd_mode)
samux 1:fb4494783863 321 return true;
samux 1:fb4494783863 322
lz307 7:3152fcc74390 323 if (send("$$$", 3, "CMD") == -1 && send("\r",1,">") != true) {
samux 1:fb4494783863 324 ERR("cannot enter in cmd mode\r\n");
samux 1:fb4494783863 325 return false;
samux 1:fb4494783863 326 }
samux 1:fb4494783863 327 state.cmd_mode = true;
samux 1:fb4494783863 328 return true;
samux 1:fb4494783863 329 }
samux 1:fb4494783863 330
samux 1:fb4494783863 331 bool Wifly::disconnect()
samux 1:fb4494783863 332 {
samux 1:fb4494783863 333 // if already disconnected, return
samux 1:fb4494783863 334 if (!state.associated)
samux 1:fb4494783863 335 return true;
samux 1:fb4494783863 336
samux 1:fb4494783863 337 if (!sendCommand("leave\r", "DeAuth"))
samux 1:fb4494783863 338 return false;
samux 1:fb4494783863 339 exit();
samux 1:fb4494783863 340
samux 1:fb4494783863 341 state.associated = false;
samux 1:fb4494783863 342 return true;
samux 1:fb4494783863 343
samux 1:fb4494783863 344 }
samux 1:fb4494783863 345
samux 1:fb4494783863 346 bool Wifly::is_connected()
samux 1:fb4494783863 347 {
samux 1:fb4494783863 348 return (tcp_status.read() == 1) ? true : false;
samux 1:fb4494783863 349 }
samux 1:fb4494783863 350
samux 1:fb4494783863 351
samux 1:fb4494783863 352 void Wifly::reset()
samux 1:fb4494783863 353 {
samux 1:fb4494783863 354 reset_pin = 0;
samux 1:fb4494783863 355 wait(0.2);
samux 1:fb4494783863 356 reset_pin = 1;
samux 1:fb4494783863 357 wait(0.2);
samux 1:fb4494783863 358 }
samux 1:fb4494783863 359
samux 1:fb4494783863 360 bool Wifly::close()
samux 1:fb4494783863 361 {
samux 1:fb4494783863 362 // if not connected, return
samux 1:fb4494783863 363 if (!state.tcp)
samux 1:fb4494783863 364 return true;
samux 1:fb4494783863 365
samux 1:fb4494783863 366 wait(0.25);
samux 1:fb4494783863 367 if (!sendCommand("close\r", "CLOS"))
samux 1:fb4494783863 368 return false;
samux 1:fb4494783863 369 exit();
samux 1:fb4494783863 370
samux 1:fb4494783863 371 state.tcp = false;
samux 1:fb4494783863 372 return true;
samux 1:fb4494783863 373 }
samux 1:fb4494783863 374
samux 1:fb4494783863 375
samux 1:fb4494783863 376 int Wifly::putc(char c)
samux 1:fb4494783863 377 {
samux 1:fb4494783863 378 while (!wifi.writeable());
samux 1:fb4494783863 379 return wifi.putc(c);
samux 1:fb4494783863 380 }
samux 1:fb4494783863 381
samux 1:fb4494783863 382
samux 1:fb4494783863 383 bool Wifly::exit()
samux 1:fb4494783863 384 {
samux 1:fb4494783863 385 flush();
samux 1:fb4494783863 386 if (!state.cmd_mode)
samux 1:fb4494783863 387 return true;
samux 1:fb4494783863 388 if (!sendCommand("exit\r", "EXIT"))
samux 1:fb4494783863 389 return false;
samux 1:fb4494783863 390 state.cmd_mode = false;
samux 1:fb4494783863 391 flush();
samux 1:fb4494783863 392 return true;
samux 1:fb4494783863 393 }
samux 1:fb4494783863 394
samux 1:fb4494783863 395
samux 1:fb4494783863 396 int Wifly::readable()
samux 1:fb4494783863 397 {
samux 1:fb4494783863 398 return buf_wifly.available();
samux 1:fb4494783863 399 }
samux 1:fb4494783863 400
samux 1:fb4494783863 401 int Wifly::writeable()
samux 1:fb4494783863 402 {
samux 1:fb4494783863 403 return wifi.writeable();
samux 1:fb4494783863 404 }
samux 1:fb4494783863 405
samux 1:fb4494783863 406 char Wifly::getc()
samux 1:fb4494783863 407 {
samux 1:fb4494783863 408 char c;
samux 1:fb4494783863 409 while (!buf_wifly.available());
samux 1:fb4494783863 410 buf_wifly.dequeue(&c);
samux 1:fb4494783863 411 return c;
samux 1:fb4494783863 412 }
samux 1:fb4494783863 413
samux 1:fb4494783863 414 void Wifly::handler_rx(void)
samux 1:fb4494783863 415 {
samux 1:fb4494783863 416 //read characters
samux 1:fb4494783863 417 while (wifi.readable())
samux 1:fb4494783863 418 buf_wifly.queue(wifi.getc());
samux 1:fb4494783863 419 }
samux 1:fb4494783863 420
samux 1:fb4494783863 421 void Wifly::attach_rx(bool callback)
samux 1:fb4494783863 422 {
samux 1:fb4494783863 423 if (!callback)
samux 1:fb4494783863 424 wifi.attach(NULL);
samux 1:fb4494783863 425 else
samux 1:fb4494783863 426 wifi.attach(this, &Wifly::handler_rx);
samux 1:fb4494783863 427 }
samux 1:fb4494783863 428
samux 1:fb4494783863 429
samux 1:fb4494783863 430 int Wifly::send(const char * str, int len, const char * ACK, char * res, int timeout)
samux 1:fb4494783863 431 {
samux 1:fb4494783863 432 char read;
samux 1:fb4494783863 433 size_t found = string::npos;
samux 1:fb4494783863 434 string checking;
samux 1:fb4494783863 435 Timer tmr;
samux 1:fb4494783863 436 int result = 0;
samux 1:fb4494783863 437
samux 1:fb4494783863 438 DBG("will send: %s\r\n",str);
samux 1:fb4494783863 439
samux 1:fb4494783863 440 attach_rx(false);
samux 1:fb4494783863 441
samux 1:fb4494783863 442 //We flush the buffer
samux 1:fb4494783863 443 while (wifi.readable())
samux 1:fb4494783863 444 wifi.getc();
samux 1:fb4494783863 445
samux 1:fb4494783863 446 if (!ACK || !strcmp(ACK, "NO")) {
samux 1:fb4494783863 447 for (int i = 0; i < len; i++)
samux 1:fb4494783863 448 result = (putc(str[i]) == str[i]) ? result + 1 : result;
samux 1:fb4494783863 449 } else {
samux 1:fb4494783863 450 //We flush the buffer
samux 1:fb4494783863 451 while (wifi.readable())
samux 1:fb4494783863 452 wifi.getc();
samux 1:fb4494783863 453
samux 1:fb4494783863 454 tmr.start();
samux 1:fb4494783863 455 for (int i = 0; i < len; i++)
samux 1:fb4494783863 456 result = (putc(str[i]) == str[i]) ? result + 1 : result;
samux 1:fb4494783863 457
samux 1:fb4494783863 458 while (1) {
samux 1:fb4494783863 459 if (tmr.read_ms() > timeout) {
samux 1:fb4494783863 460 //We flush the buffer
samux 1:fb4494783863 461 while (wifi.readable())
samux 1:fb4494783863 462 wifi.getc();
samux 1:fb4494783863 463
samux 1:fb4494783863 464 DBG("check: %s\r\n", checking.c_str());
samux 1:fb4494783863 465
samux 1:fb4494783863 466 attach_rx(true);
samux 1:fb4494783863 467 return -1;
samux 1:fb4494783863 468 } else if (wifi.readable()) {
samux 1:fb4494783863 469 read = wifi.getc();
samux 1:fb4494783863 470 if ( read != '\r' && read != '\n') {
samux 1:fb4494783863 471 checking += read;
samux 1:fb4494783863 472 found = checking.find(ACK);
samux 1:fb4494783863 473 if (found != string::npos) {
samux 1:fb4494783863 474 wait(0.01);
samux 1:fb4494783863 475
samux 1:fb4494783863 476 //We flush the buffer
samux 1:fb4494783863 477 while (wifi.readable())
samux 1:fb4494783863 478 wifi.getc();
samux 1:fb4494783863 479
samux 1:fb4494783863 480 break;
samux 1:fb4494783863 481 }
samux 1:fb4494783863 482 }
samux 1:fb4494783863 483 }
samux 1:fb4494783863 484 }
samux 1:fb4494783863 485 DBG("check: %s\r\n", checking.c_str());
samux 1:fb4494783863 486
samux 1:fb4494783863 487 attach_rx(true);
samux 1:fb4494783863 488 return result;
samux 1:fb4494783863 489 }
samux 1:fb4494783863 490
samux 1:fb4494783863 491 //the user wants the result from the command (ACK == NULL, res != NULL)
samux 1:fb4494783863 492 if ( res != NULL) {
samux 1:fb4494783863 493 int i = 0;
samux 1:fb4494783863 494 Timer timeout;
samux 1:fb4494783863 495 timeout.start();
samux 1:fb4494783863 496 tmr.reset();
samux 1:fb4494783863 497 while (1) {
samux 1:fb4494783863 498 if (timeout.read() > 2) {
samux 1:fb4494783863 499 if (i == 0) {
samux 1:fb4494783863 500 res = NULL;
samux 1:fb4494783863 501 break;
samux 1:fb4494783863 502 }
samux 1:fb4494783863 503 res[i] = '\0';
samux 1:fb4494783863 504 DBG("user str 1: %s\r\n", res);
samux 1:fb4494783863 505
samux 1:fb4494783863 506 break;
samux 1:fb4494783863 507 } else {
samux 1:fb4494783863 508 if (tmr.read_ms() > 300) {
samux 1:fb4494783863 509 res[i] = '\0';
samux 1:fb4494783863 510 DBG("user str: %s\r\n", res);
samux 1:fb4494783863 511
samux 1:fb4494783863 512 break;
samux 1:fb4494783863 513 }
samux 1:fb4494783863 514 if (wifi.readable()) {
samux 1:fb4494783863 515 tmr.start();
samux 1:fb4494783863 516 read = wifi.getc();
samux 1:fb4494783863 517
samux 1:fb4494783863 518 // we drop \r and \n
samux 1:fb4494783863 519 if ( read != '\r' && read != '\n') {
samux 1:fb4494783863 520 res[i++] = read;
samux 1:fb4494783863 521 }
samux 1:fb4494783863 522 }
samux 1:fb4494783863 523 }
samux 1:fb4494783863 524 }
samux 1:fb4494783863 525 DBG("user str: %s\r\n", res);
samux 1:fb4494783863 526 }
samux 1:fb4494783863 527
samux 1:fb4494783863 528 //We flush the buffer
samux 1:fb4494783863 529 while (wifi.readable())
samux 1:fb4494783863 530 wifi.getc();
samux 1:fb4494783863 531
samux 1:fb4494783863 532 attach_rx(true);
samux 1:fb4494783863 533 DBG("result: %d\r\n", result)
samux 1:fb4494783863 534 return result;
samux 1:fb4494783863 535 }