AT Parser and bufferedSerial based SPWF library
Dependencies: ATParser
Dependents: X_NUCLEO_IDW01M1v2
Fork of SPWF01SA by
SPWFSA01.cpp
- Committer:
- mapellil
- Date:
- 2017-01-13
- Revision:
- 26:70852d26853e
- Parent:
- 25:6b79352bc1fa
- Child:
- 27:0dc1402f42a9
File content as of revision 26:70852d26853e:
/* SPWFInterface Example
* Copyright (c) 2015 ARM Limited
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include "SPWFSA01.h"
#include "mbed_debug.h"
#define SPWFSA01_CONNECT_TIMEOUT 15000
#define SPWFSA01_SEND_TIMEOUT 500
#define SPWFSA01_RECV_TIMEOUT 1500//some commands like AT&F/W takes some time to get the result back!
#define SPWFSA01_MISC_TIMEOUT 500
#define SPWFSA01_SOCKQ_TIMEOUT 3000
SPWFSA01::SPWFSA01(PinName tx, PinName rx, PinName reset, PinName wakeup, bool debug)
: _serial(tx, rx, 1024), _parser(_serial),
_reset(reset, PIN_OUTPUT, PullNone, 1),
_wakeup(wakeup, PIN_OUTPUT, PullNone, 0),
dbg_on(debug)
{
_serial.baud(115200); // LICIO FIXME increase the speed
_parser.debugOn(debug);
}
bool SPWFSA01::startup(int mode)
{
_parser.setTimeout(SPWFSA01_MISC_TIMEOUT);
/*Test module before reset*/
waitSPWFReady();
/*Reset module*/
reset();
/*set local echo to 0*/
if(!(_parser.send("AT+S.SCFG=localecho1,%d\r", 0) && _parser.recv("OK")))
{
debug_if(dbg_on, "SPWF> error local echo set\r\n");
return false;
}
/*reset factory settings*/
if(!(_parser.send("AT&F") && _parser.recv("OK")))
{
debug_if(dbg_on, "SPWF> error AT&F\r\n");
return false;
}
/*set Wi-Fi mode and rate to b/g/n*/
if(!(_parser.send("AT+S.SCFG=wifi_ht_mode,%d\r",1) && _parser.recv("OK")))
{
debug_if(dbg_on, "SPWF> error setting ht_mode\r\n");
return false;
}
if(!(_parser.send("AT+S.SCFG=wifi_opr_rate_mask,0x003FFFCF\r") && _parser.recv("OK")))
{
debug_if(dbg_on, "SPWF> error setting operational rates\r\n");
return false;
}
/*set idle mode (0->idle, 1->STA,3->miniAP, 2->IBSS)*/
if(!(_parser.send("AT+S.SCFG=wifi_mode,%d\r", mode) && _parser.recv("OK")))
{
debug_if(dbg_on, "SPWF> error wifi mode set\r\n");
return false;
}
/* save current setting in flash */
if(!(_parser.send("AT&W") && _parser.recv("OK")))
{
debug_if(dbg_on, "SPWF> error AT&W\r\n");
return false;
}
/*reset again and send AT command and check for result (AT->OK)*/
reset();
return true;
}
bool SPWFSA01::hw_reset(void)
{
if (_reset.is_connected()) {
/* reset the pin PC12 */
_reset.write(0);
wait_ms(200);
_reset.write(1);
wait_ms(100);
return 1;
} else { return 0; }
}
bool SPWFSA01::reset(void)
{
if(!_parser.send("AT+CFUN=1")) return false;
while(1) {
if (_parser.recv("+WIND:32:WiFi Hardware Started\r")) {
return true;
}
}
}
void SPWFSA01::waitSPWFReady(void)
{
//wait_ms(200);
while(1)
if(_parser.send("AT") && _parser.recv("OK"))
//till we get OK from AT command
//printf("\r\nwaiting for reset to complete..\n");
return;
}
/* Security Mode
None = 0,
WEP = 1,
WPA_Personal = 2,
*/
bool SPWFSA01::connect(const char *ap, const char *passPhrase, int securityMode)
{
uint32_t n1, n2, n3, n4;
_parser.setTimeout(SPWFSA01_CONNECT_TIMEOUT);
//AT+S.SCFG=wifi_wpa_psk_text,%s\r
if(!(_parser.send("AT+S.SCFG=wifi_wpa_psk_text,%s", passPhrase) && _parser.recv("OK")))
{
debug_if(dbg_on, "SPWF> error pass set\r\n");
return false;
}
//AT+S.SSIDTXT=%s\r
if(!(_parser.send("AT+S.SSIDTXT=%s", ap) && _parser.recv("OK")))
{
debug_if(dbg_on, "SPWF> error ssid set\r\n");
return false;
}
//AT+S.SCFG=wifi_priv_mode,%d\r
if(!(_parser.send("AT+S.SCFG=wifi_priv_mode,%d", securityMode) && _parser.recv("OK")))
{
debug_if(dbg_on, "SPWF> error security mode set\r\n");
return false;
}
//"AT+S.SCFG=wifi_mode,%d\r"
/*set idle mode (0->idle, 1->STA,3->miniAP, 2->IBSS)*/
if(!(_parser.send("AT+S.SCFG=wifi_mode,%d\r", 1) && _parser.recv("OK")))
{
debug_if(dbg_on, "SPWF> error wifi mode set\r\n");
return false;
}
//AT&W
/* save current setting in flash */
if(!(_parser.send("AT&W") && _parser.recv("OK")))
{
debug_if(dbg_on, "SPWF> error AT&W\r\n");
return false;
}
//reset module
reset();
while(1)
if((_parser.recv("+WIND:24:WiFi Up:%u.%u.%u.%u",&n1, &n2, &n3, &n4)))
{
break;
}
return true;
}
bool SPWFSA01::disconnect(void)
{
//"AT+S.SCFG=wifi_mode,%d\r"
/*set idle mode (0->idle, 1->STA,3->miniAP, 2->IBSS)*/
if(!(_parser.send("AT+S.SCFG=wifi_mode,%d\r", 0) && _parser.recv("OK")))
{
debug_if(dbg_on, "SPWF> error wifi mode set\r\n");
return false;
}
//AT&W
/* save current setting in flash */
if(!(_parser.send("AT&W") && _parser.recv("OK")))
{
debug_if(dbg_on, "SPWF> error AT&W\r\n");
return false;
}
//reset module
reset();
return true;
}
bool SPWFSA01::dhcp(int mode)
{
//only 3 valid modes
//0->off(ip_addr must be set by user), 1->on(auto set by AP), 2->on&customize(miniAP ip_addr can be set by user)
if(mode < 0 || mode > 2) {
return false;
}
return _parser.send("AT+S.SCFG=ip_use_dhcp,%d\r", mode)
&& _parser.recv("OK");
}
const char *SPWFSA01::getIPAddress(void)
{
uint32_t n1, n2, n3, n4;
if (!(_parser.send("AT+S.STS=ip_ipaddr")
&& _parser.recv("# ip_ipaddr = %u.%u.%u.%u", &n1, &n2, &n3, &n4)
&& _parser.recv("OK"))) {
debug_if(dbg_on, "SPWF> getIPAddress error\r\n");
return 0;
}
sprintf((char*)_ip_buffer,"%u.%u.%u.%u", n1, n2, n3, n4);
return _ip_buffer;
}
const char *SPWFSA01::getMACAddress(void)
{
uint32_t n1, n2, n3, n4, n5, n6;
if (!(_parser.send("AT+S.GCFG=nv_wifi_macaddr")
&& _parser.recv("# nv_wifi_macaddr = %x:%x:%x:%x:%x:%x", &n1, &n2, &n3, &n4, &n5, &n6)
&& _parser.recv("OK"))) {
debug_if(dbg_on, "SPWF> getMACAddress error\r\n");
return 0;
}
sprintf((char*)_mac_buffer,"%02X:%02X:%02X:%02X:%02X:%02X", n1, n2, n3, n4, n5, n6);
return _mac_buffer;
}
bool SPWFSA01::isConnected(void)
{
return getIPAddress() != 0;
}
bool SPWFSA01::open(const char *type, int* id, const char* addr, int port)
{
Timer timer;
timer.start();
socket_closed = 0;
if(!_parser.send("AT+S.SOCKON=%s,%d,%s,ind", addr, port, type))
{
debug_if(dbg_on, "SPWF> error opening socket\r\n");
return false;
}
while(1)
{
if( _parser.recv(" ID: %d", id)
&& _parser.recv("OK"))
break;
if (timer.read_ms() > SPWFSA01_CONNECT_TIMEOUT) {
return false;
}
//TODO:implement time-out functionality in case of no response
//if(timeout) return false;
//TODO: deal with errors like "ERROR: Failed to resolve name"
//TODO: deal with errors like "ERROR: Data mode not available"
}
return true;
}
bool SPWFSA01::send(int id, const void *data, uint32_t amount)
{
char _buf[18];
_parser.setTimeout(SPWFSA01_SEND_TIMEOUT);
sprintf((char*)_buf,"AT+S.SOCKW=%d,%d\r", id, amount);
//May take a second try if device is busy
for (unsigned i = 0; i < 2; i++) {
if (_parser.write((char*)_buf, strlen(_buf)) >=0
&& _parser.write((char*)data, (int)amount) >= 0
&& _parser.recv("OK")) {
return true;
}
}
return false;
}
int32_t SPWFSA01::recv(int id, void *data, uint32_t amount)
{
uint32_t recv_amount=0;
int wind_id;
if (socket_closed) {
socket_closed = 0;
return -3;
}
if(!(_parser.send("AT+S.SOCKQ=%d", id) //send a query (will be required for secure sockets)
&& _parser.recv(" DATALEN: %u", &recv_amount)
&& _parser.recv("OK"))) {
return -2;
}
if (recv_amount==0) { return -1; }
if(recv_amount > amount)
recv_amount = amount;
int par_timeout = _parser.getTimeout();
_parser.setTimeout(0);
while(_parser.recv("+WIND:%d:", &wind_id)) {
if (wind_id == 58) {
socket_closed = 1;
_parser.flush();
}
}
_parser.setTimeout(par_timeout);
_parser.flush();
if(!(_parser.send("AT+S.SOCKR=%d,%d", id, recv_amount))){
return -2;
}
if(!((_parser.read((char*)data, recv_amount) >0)
&& _parser.recv("OK"))) {
return -2;
}
return recv_amount;
}
bool SPWFSA01::close(int id)
{
uint32_t recv_amount=0;
void * data = NULL;
_parser.setTimeout(SPWFSA01_MISC_TIMEOUT);
_parser.flush();
/* socket flush */
if(!(_parser.send("AT+S.SOCKQ=%d", id) //send a query (will be required for secure sockets)
&& _parser.recv(" DATALEN: %u", &recv_amount)
&& _parser.recv("OK"))) {
return -2;
}
if (recv_amount>0) {
data = malloc (recv_amount+4);
if(!(_parser.send("AT+S.SOCKR=%d,%d", id, recv_amount))) {
free (data);
return -2;
}
if(!((_parser.read((char*)data, recv_amount) >0)
&& _parser.recv("OK"))) {
free (data);
return -2;
}
free (data);
}
//May take a second try if device is busy or error is returned
for (unsigned i = 0; i < 2; i++) {
if (_parser.send("AT+S.SOCKC=%d", id)
&& _parser.recv("OK")) {
socket_closed = 1;
return true;
}
else
{
if(_parser.recv("ERROR: Pending data")) {
debug_if(dbg_on, "SPWF> ERROR!!!!\r\n");
return false;
}
}
//TODO: Deal with "ERROR: Pending data" (Closing a socket with pending data)
}
return false;
}
bool SPWFSA01::readable()
{
return _serial.readable();
}
bool SPWFSA01::writeable()
{
return _serial.writeable();
}
int32_t SPWFSA01::settime(time_t ctTime)
{
_parser.flush();
//May take a second try if device is busy or error is returned
for (unsigned i = 0; i < 2; i++) {
if (_parser.send("AT+S.SETTIME=%d", ctTime)
&& _parser.recv("OK")) {
return true;
}
else
{
debug_if(dbg_on, "SPWF> ERROR!!!!\r\n");
return false;
}
}
return false;
}
int32_t SPWFSA01::setTLScertificate(char * cert, unsigned int size, CertType_t type)
{
_parser.flush();
const char * cert_type="ca";
switch (type) {
case RAM_CA_ROOT_CERT:
printf ("RAM_CA_ROOT_CERT\n\r");
cert_type="ca";
break;
case RAM_CLIENT_CERT:
cert_type="cert";
break;
case RAM_CLIENT_PRIV_KEY:
cert_type="key";
break;
case FLASH_CA_ROOT_CERT:
cert_type="f_ca";
break;
case FLASH_CLIENT_CERT:
cert_type="f_cert";
break;
case FLASH_CLIENT_PRIV_KEY:
cert_type="f_key";
break;
default:
printf ("Error Unknown certificate type\n\r");
return false;
}
//May take a second try if device is busy or error is returned
for (unsigned i = 0; i < 2; i++) {
if (_parser.send("AT+S.TLSCERT=%s,%d\r%s", cert_type, size, cert)
&& _parser.recv("OK")) {
return true;
}
else
{
printf ("SET CERT ERROR cert_type %s, cert: %s\n\r", cert_type, cert);
debug_if(dbg_on, "SPWF> ERROR!!!!\r\n");
return false;
}
}
return false;
}
int32_t SPWFSA01::setTLSSRVdomain(char * domain, CertType_t type)
{
if (type == FLASH_DOMAIN)
{
if (_parser.send("AT+S.TLSDOMAIN=f_domain,%s", domain)) {
return true;
} else {
printf ("ERROR domain not set \n\r");
return false;
}
} else {
return false;
}
}
int32_t SPWFSA01::cleanTLScertificate(CertType_t type)
{
_parser.flush();
const char * cert_type="ca";
switch (type) {
case RAM_CA_ROOT_CERT:
cert_type="ca";
break;
case RAM_CLIENT_CERT:
cert_type="cert";
break;
case RAM_CLIENT_PRIV_KEY:
cert_type="key";
break;
case FLASH_CA_ROOT_CERT:
cert_type="f_ca";
break;
case FLASH_CLIENT_CERT:
cert_type="f_cert";
break;
case FLASH_CLIENT_PRIV_KEY:
cert_type="f_key";
break;
case ALL:
cert_type="all";
break;
default:
printf ("Error Unknown certificate type\n\r");
return false;
}
if (_parser.send("AT+S.TLSCERT2=clean,%s", cert_type) && _parser.recv("OK")) {
return true;
} else {
printf ("ERROR clean certificate \n\r");
return false;
}
}
