MODIFIED from mbed official WiflyInterface (interface for Roving Networks Wifly modules). Numerous performance and reliability improvements (see the detailed documentation). Also, tracking changes in mbed official version to retain functional parity.

Dependents:   Smart-WiFly-WebServer PUB_WiflyInterface_Demo

Fork of WiflyInterface by mbed official

Resources

Derivative from mbed Official

  • Documentation update, improved consistency, documented parameters that were inadvertently omitted.
  • Avoid c++ string handling, which causes dynamic allocation and free, side effect, fewer CPU cycles spent for same purpose.
  • Fixed socket APIs to support non-blocking mode.
  • Increase communication baud-rate to Wifly module
  • sendCommand - added retries for improved robustness.
  • setConnectionState - method to force the connection state (used by TCPSocketServer)
  • gethostbyname - added a length parameter to the size of the buffer being written
  • flushIn - a private method to flush the input buffer
  • Changed the timeout from 500 to 2500 msec for commands - measured some at 700 to 850 msec.
  • Performance improvements - reduced some unnecessary delays.
  • Added additional security options for the wi-fi connection (that are supported by the WiFly module).
  • Added setSecurity API which permits revising the security when connecting to, or selecting from, one of several access points.
  • Improved DEBUG interface (slightly more consistent printout).
  • gathers information from the Wifly module on reboot (SW version info), which permits customizing behavior based on Wifly capabilities (like the improved security).
  • Avoid potential for recursive crash (if exit fails, it calls sendcommand, which calls exit...)
  • Update to support permissible SSID and PassCode lengths.

Robustness testing

I've had some mixed behavior with the Wifly module, some of which seems to be traceable to the module itself, and some in my derivative code. The result, after running for minutes, hours, sometimes days, it hangs and I have to reset the module.

To test, I created a fairly simple test program -

  • check for Watchdog induced reset and count it.
  • initialize the Watchdog for 60 sec timeout.
  • Init the Wifly interface and connect to my network.
  • Wait 10 seconds and force mbed_reset().

If the Watchdog induces the restart, then it is pretty clear that either:

  • The communications hung with the Wifly module causing the failure.
  • The Wifly module decided to go unresponsive.

If it gets to the end, it typically takes about 4 to 6 seconds for the boot and connect, then the 10 second delay.

But I can't really pin down the root cause easily. My strongest theory is that the Wifly module has rebooted, and since I don't store the high baud rate I configure it for, it resets back to 9600.

Also, one of the objectives for my revised send( ) is to avoid the c++ string, as that can fragment memory, and it wasn't very well bounded in behavior.

Latest tests:

Warm BootsWatchdog EventsNotes
100's30An early version of my derivative WiflyInterface, including my derivative of "send( )" API. Let's call this version 0.1.
26684My derivative WiflyInterface, but with the mbed official "send( )" API. Much improved. This was over the course of about 12 hours.
24003Most recent derivative - incremental change to "send( )", but this relative number does not rule out the Wifly module itself.

I think with these numbers, +/- 1 means that the changes have had no measurable effect. Which is good, since this incremental change eliminates the c++ string handling.

Test Software

This is pieces of a test program, clipped and copied to here. What I have compiled and run for hours and hours is almost exactly what you see. This uses this simple Watchdog library.

#include "mbed.h"
#include "WiflyInterface.h"
#include "Watchdog.h"

Serial pc(USBTX, USBRX);

Watchdog wd;
extern "C" void mbed_reset();

// Pinout for SmartBoard
WiflyInterface wifly(p9, p10, p30, p29, "ssid", "pass", WPA);

int main() {
    pc.baud(460800);                         // I like a snappy terminal
    
    wd.Configure(60.0);                     // Set time limit for the test to 1 minute
    LPC_RTC->GPREG0++;                      // Count boots here
    if (wd.WatchdogCausedReset()) {
        LPC_RTC->GPREG1++;                  // Count Watchdog events here
        pc.printf("\r\n\r\nWatchdog event.\r\n");
    }
    pc.printf("\r\nWifly Test: %d boots, %d watchdogs. %s %s\r\n", LPC_RTC->GPREG0, LPC_RTC->GPREG1, __DATE__, __TIME__);
    
    wifly.init(); // use DHCP
    pc.printf("Connect...  ");
    while (!wifly.connect());               // join the network
    pc.printf("Address is %s.  ", wifly.getIPAddress());
    pc.printf("Disconnect...  ");
    wifly.disconnect();
    pc.printf("OK. Reset in 10 sec...\r\n");
    wait(10);
    if (pc.readable()) {
        if (pc.getc() == 'r') {             // secret 'r'eset of the counters
            LPC_RTC->GPREG0 = 0;
            LPC_RTC->GPREG1 = 0;
            pc.printf("counters reset\r\n");
        }
    }
    mbed_reset();                           // reset here indicates successful communication
}
Committer:
WiredHome
Date:
Sun Jul 21 23:16:38 2013 +0000
Revision:
23:6e77c65ced00
Parent:
22:62267088e95a
Parent:
20:906b0f951bc3
Child:
24:5012a535b1d5
Minor refactor on send() to share the timeout for both purposes.; Minor refactor on sendCommand to retry on failure.

Who changed what in which revision?

UserRevisionLine numberNew contents of line
samux 1:fb4494783863 1 /* Copyright (C) 2012 mbed.org, MIT License
samux 1:fb4494783863 2 *
samux 1:fb4494783863 3 * Permission is hereby granted, free of charge, to any person obtaining a copy of this software
samux 1:fb4494783863 4 * and associated documentation files (the "Software"), to deal in the Software without restriction,
samux 1:fb4494783863 5 * including without limitation the rights to use, copy, modify, merge, publish, distribute,
samux 1:fb4494783863 6 * sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is
samux 1:fb4494783863 7 * furnished to do so, subject to the following conditions:
samux 1:fb4494783863 8 *
samux 1:fb4494783863 9 * The above copyright notice and this permission notice shall be included in all copies or
samux 1:fb4494783863 10 * substantial portions of the Software.
samux 1:fb4494783863 11 *
samux 1:fb4494783863 12 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING
samux 1:fb4494783863 13 * BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
samux 1:fb4494783863 14 * NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM,
samux 1:fb4494783863 15 * DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
samux 1:fb4494783863 16 * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
samux 1:fb4494783863 17 */
samux 1:fb4494783863 18
samux 1:fb4494783863 19 #include "mbed.h"
samux 1:fb4494783863 20 #include "Wifly.h"
samux 1:fb4494783863 21 #include <string>
samux 1:fb4494783863 22 #include <algorithm>
samux 1:fb4494783863 23
WiredHome 20:906b0f951bc3 24 #define DEBUG //Debug is disabled by default
WiredHome 20:906b0f951bc3 25
WiredHome 20:906b0f951bc3 26 #if (defined(DEBUG) && !defined(TARGET_LPC11U24))
WiredHome 20:906b0f951bc3 27 #define DBG(x, ...) std::printf("[DBG Wifly%4d] "x"\r\n", __LINE__, ##__VA_ARGS__);
WiredHome 20:906b0f951bc3 28 #define WARN(x, ...) std::printf("[WRN Wifly%4d] "x"\r\n", __LINE__, ##__VA_ARGS__);
WiredHome 20:906b0f951bc3 29 #define ERR(x, ...) std::printf("[ERR Wifly%4d] "x"\r\n", __LINE__, ##__VA_ARGS__);
WiredHome 20:906b0f951bc3 30 #define INFO(x, ...) std::printf("[INF Wifly%4d] "x"\r\n", __LINE__, ##__VA_ARGS__);
samux 1:fb4494783863 31 #else
samux 1:fb4494783863 32 #define DBG(x, ...)
samux 1:fb4494783863 33 #define WARN(x, ...)
samux 1:fb4494783863 34 #define ERR(x, ...)
WiredHome 20:906b0f951bc3 35 #define INFO(x, ...)
samux 1:fb4494783863 36 #endif
samux 1:fb4494783863 37
samux 1:fb4494783863 38 #define MAX_TRY_JOIN 3
samux 1:fb4494783863 39
samux 1:fb4494783863 40 Wifly * Wifly::inst;
samux 1:fb4494783863 41
samux 1:fb4494783863 42 Wifly::Wifly( PinName tx, PinName rx, PinName _reset, PinName tcp_status, const char * ssid, const char * phrase, Security sec):
WiredHome 20:906b0f951bc3 43 wifi(tx, rx), reset_pin(_reset), tcp_status(tcp_status), baudrate(9600), buf_wifly(256)
samux 1:fb4494783863 44 {
samux 1:fb4494783863 45 memset(&state, 0, sizeof(state));
samux 1:fb4494783863 46 state.sec = sec;
samux 1:fb4494783863 47
samux 1:fb4494783863 48 // change all ' ' in '$' in the ssid and the passphrase
samux 1:fb4494783863 49 strcpy(this->ssid, ssid);
samux 1:fb4494783863 50 for (int i = 0; i < strlen(ssid); i++) {
samux 1:fb4494783863 51 if (this->ssid[i] == ' ')
samux 1:fb4494783863 52 this->ssid[i] = '$';
samux 1:fb4494783863 53 }
samux 1:fb4494783863 54 strcpy(this->phrase, phrase);
samux 1:fb4494783863 55 for (int i = 0; i < strlen(phrase); i++) {
samux 1:fb4494783863 56 if (this->phrase[i] == ' ')
samux 1:fb4494783863 57 this->phrase[i] = '$';
samux 1:fb4494783863 58 }
samux 1:fb4494783863 59
samux 1:fb4494783863 60 inst = this;
samux 1:fb4494783863 61 attach_rx(false);
samux 1:fb4494783863 62 state.cmd_mode = false;
samux 1:fb4494783863 63 }
samux 1:fb4494783863 64
samux 1:fb4494783863 65 bool Wifly::join()
samux 1:fb4494783863 66 {
samux 1:fb4494783863 67 char cmd[20];
samux 1:fb4494783863 68
samux 1:fb4494783863 69 for (int i= 0; i < MAX_TRY_JOIN; i++) {
samux 2:8e54830d0df7 70
samux 2:8e54830d0df7 71 // no auto join
samux 2:8e54830d0df7 72 if (!sendCommand("set w j 0\r", "AOK"))
samux 2:8e54830d0df7 73 continue;
samux 2:8e54830d0df7 74
samux 2:8e54830d0df7 75 //no echo
samux 2:8e54830d0df7 76 if (!sendCommand("set u m 1\r", "AOK"))
samux 2:8e54830d0df7 77 continue;
samux 2:8e54830d0df7 78
samux 1:fb4494783863 79 // set time
samux 4:0bcec6272784 80 if (!sendCommand("set c t 30\r", "AOK"))
samux 1:fb4494783863 81 continue;
samux 1:fb4494783863 82
samux 1:fb4494783863 83 // set size
samux 4:0bcec6272784 84 if (!sendCommand("set c s 1024\r", "AOK"))
samux 1:fb4494783863 85 continue;
samux 1:fb4494783863 86
samux 1:fb4494783863 87 // red led on when tcp connection active
samux 1:fb4494783863 88 if (!sendCommand("set s i 0x40\r", "AOK"))
samux 1:fb4494783863 89 continue;
samux 1:fb4494783863 90
samux 1:fb4494783863 91 // no string sent to the tcp client
samux 1:fb4494783863 92 if (!sendCommand("set c r 0\r", "AOK"))
samux 1:fb4494783863 93 continue;
samux 1:fb4494783863 94
samux 1:fb4494783863 95 // tcp protocol
samux 1:fb4494783863 96 if (!sendCommand("set i p 2\r", "AOK"))
samux 1:fb4494783863 97 continue;
samux 1:fb4494783863 98
samux 1:fb4494783863 99 // tcp retry
samux 1:fb4494783863 100 if (!sendCommand("set i f 0x7\r", "AOK"))
samux 1:fb4494783863 101 continue;
WiredHome 20:906b0f951bc3 102
samux 2:8e54830d0df7 103 // set dns server
samux 2:8e54830d0df7 104 if (!sendCommand("set d n rn.microchip.com\r", "AOK"))
samux 1:fb4494783863 105 continue;
samux 1:fb4494783863 106
samux 1:fb4494783863 107 //dhcp
samux 1:fb4494783863 108 sprintf(cmd, "set i d %d\r", (state.dhcp) ? 1 : 0);
samux 1:fb4494783863 109 if (!sendCommand(cmd, "AOK"))
samux 1:fb4494783863 110 continue;
samux 1:fb4494783863 111
samux 1:fb4494783863 112 // ssid
samux 1:fb4494783863 113 sprintf(cmd, "set w s %s\r", ssid);
samux 1:fb4494783863 114 if (!sendCommand(cmd, "AOK"))
samux 1:fb4494783863 115 continue;
samux 1:fb4494783863 116
samux 1:fb4494783863 117 //auth
samux 1:fb4494783863 118 sprintf(cmd, "set w a %d\r", state.sec);
samux 1:fb4494783863 119 if (!sendCommand(cmd, "AOK"))
samux 1:fb4494783863 120 continue;
samux 1:fb4494783863 121
samux 1:fb4494783863 122 // if no dhcp, set ip, netmask and gateway
samux 1:fb4494783863 123 if (!state.dhcp) {
WiredHome 20:906b0f951bc3 124 DBG("not dhcp");
samux 1:fb4494783863 125
samux 1:fb4494783863 126 sprintf(cmd, "set i a %s\r\n", ip);
samux 1:fb4494783863 127 if (!sendCommand(cmd, "AOK"))
samux 1:fb4494783863 128 continue;
samux 1:fb4494783863 129
samux 1:fb4494783863 130 sprintf(cmd, "set i n %s\r", netmask);
samux 1:fb4494783863 131 if (!sendCommand(cmd, "AOK"))
samux 1:fb4494783863 132 continue;
samux 1:fb4494783863 133
samux 1:fb4494783863 134 sprintf(cmd, "set i g %s\r", gateway);
samux 1:fb4494783863 135 if (!sendCommand(cmd, "AOK"))
samux 1:fb4494783863 136 continue;
samux 1:fb4494783863 137 }
samux 1:fb4494783863 138
samux 1:fb4494783863 139 //key step
samux 1:fb4494783863 140 if (state.sec != NONE) {
samux 1:fb4494783863 141 if (state.sec == WPA)
samux 1:fb4494783863 142 sprintf(cmd, "set w p %s\r", phrase);
samux 1:fb4494783863 143 else if (state.sec == WEP_128)
samux 1:fb4494783863 144 sprintf(cmd, "set w k %s\r", phrase);
samux 1:fb4494783863 145
samux 1:fb4494783863 146 if (!sendCommand(cmd, "AOK"))
samux 1:fb4494783863 147 continue;
samux 1:fb4494783863 148 }
samux 1:fb4494783863 149
samux 2:8e54830d0df7 150 //join the network (10s timeout)
samux 1:fb4494783863 151 if (state.dhcp) {
samux 2:8e54830d0df7 152 if (!sendCommand("join\r", "DHCP=ON", NULL, 10000))
samux 2:8e54830d0df7 153 continue;
samux 2:8e54830d0df7 154 } else {
samux 2:8e54830d0df7 155 if (!sendCommand("join\r", "Associated", NULL, 10000))
samux 1:fb4494783863 156 continue;
samux 1:fb4494783863 157 }
samux 1:fb4494783863 158
samux 2:8e54830d0df7 159 if (!sendCommand("save\r", "Stor"))
samux 2:8e54830d0df7 160 continue;
samux 2:8e54830d0df7 161
samux 1:fb4494783863 162 exit();
samux 1:fb4494783863 163
samux 1:fb4494783863 164 state.associated = true;
samux 1:fb4494783863 165 INFO("\r\nssid: %s\r\nphrase: %s\r\nsecurity: %s\r\n\r\n", this->ssid, this->phrase, getStringSecurity());
samux 1:fb4494783863 166 return true;
samux 1:fb4494783863 167 }
samux 1:fb4494783863 168 return false;
samux 1:fb4494783863 169 }
samux 1:fb4494783863 170
samux 1:fb4494783863 171
samux 1:fb4494783863 172 bool Wifly::setProtocol(Protocol p)
samux 1:fb4494783863 173 {
samux 1:fb4494783863 174 // use udp auto pairing
samux 1:fb4494783863 175 char cmd[20];
samux 1:fb4494783863 176 sprintf(cmd, "set i p %d\r", p);
samux 1:fb4494783863 177 if (!sendCommand(cmd, "AOK"))
samux 1:fb4494783863 178 return false;
samux 1:fb4494783863 179
samux 1:fb4494783863 180 switch(p) {
samux 1:fb4494783863 181 case TCP:
samux 1:fb4494783863 182 // set ip flags: tcp retry enabled
samux 1:fb4494783863 183 if (!sendCommand("set i f 0x07\r", "AOK"))
samux 1:fb4494783863 184 return false;
samux 1:fb4494783863 185 break;
samux 1:fb4494783863 186 case UDP:
samux 1:fb4494783863 187 // set ip flags: udp auto pairing enabled
samux 1:fb4494783863 188 if (!sendCommand("set i h 0.0.0.0\r", "AOK"))
samux 1:fb4494783863 189 return false;
samux 4:0bcec6272784 190 if (!sendCommand("set i f 0x40\r", "AOK"))
samux 1:fb4494783863 191 return false;
samux 1:fb4494783863 192 break;
samux 1:fb4494783863 193 }
samux 1:fb4494783863 194 state.proto = p;
samux 1:fb4494783863 195 return true;
samux 1:fb4494783863 196 }
samux 1:fb4494783863 197
samux 1:fb4494783863 198 char * Wifly::getStringSecurity()
samux 1:fb4494783863 199 {
samux 1:fb4494783863 200 switch(state.sec) {
samux 1:fb4494783863 201 case NONE:
samux 1:fb4494783863 202 return "NONE";
samux 1:fb4494783863 203 case WEP_128:
samux 1:fb4494783863 204 return "WEP_128";
samux 1:fb4494783863 205 case WPA:
samux 1:fb4494783863 206 return "WPA";
samux 1:fb4494783863 207 }
samux 1:fb4494783863 208 return "UNKNOWN";
samux 1:fb4494783863 209 }
samux 1:fb4494783863 210
samux 1:fb4494783863 211 bool Wifly::connect(const char * host, int port)
samux 1:fb4494783863 212 {
samux 1:fb4494783863 213 char rcv[20];
samux 1:fb4494783863 214 char cmd[20];
samux 1:fb4494783863 215
samux 2:8e54830d0df7 216 // try to open
samux 2:8e54830d0df7 217 sprintf(cmd, "open %s %d\r", host, port);
samux 2:8e54830d0df7 218 if (sendCommand(cmd, "OPEN", NULL, 10000)) {
samux 2:8e54830d0df7 219 state.tcp = true;
samux 2:8e54830d0df7 220 state.cmd_mode = false;
samux 2:8e54830d0df7 221 return true;
samux 1:fb4494783863 222 }
samux 1:fb4494783863 223
samux 2:8e54830d0df7 224 // if failed, retry and parse the response
samux 2:8e54830d0df7 225 if (sendCommand(cmd, NULL, rcv, 5000)) {
samux 1:fb4494783863 226 if (strstr(rcv, "OPEN") == NULL) {
samux 1:fb4494783863 227 if (strstr(rcv, "Connected") != NULL) {
samux 2:8e54830d0df7 228 wait(0.25);
samux 1:fb4494783863 229 if (!sendCommand("close\r", "CLOS"))
samux 1:fb4494783863 230 return false;
samux 2:8e54830d0df7 231 wait(0.25);
samux 2:8e54830d0df7 232 if (!sendCommand(cmd, "OPEN", NULL, 10000))
samux 1:fb4494783863 233 return false;
samux 1:fb4494783863 234 } else {
samux 1:fb4494783863 235 return false;
samux 1:fb4494783863 236 }
samux 1:fb4494783863 237 }
samux 1:fb4494783863 238 } else {
samux 1:fb4494783863 239 return false;
samux 1:fb4494783863 240 }
samux 2:8e54830d0df7 241
samux 1:fb4494783863 242 state.tcp = true;
samux 1:fb4494783863 243 state.cmd_mode = false;
samux 1:fb4494783863 244
samux 1:fb4494783863 245 return true;
samux 1:fb4494783863 246 }
samux 1:fb4494783863 247
samux 1:fb4494783863 248
samux 1:fb4494783863 249 bool Wifly::gethostbyname(const char * host, char * ip)
samux 1:fb4494783863 250 {
samux 1:fb4494783863 251 string h = host;
samux 1:fb4494783863 252 char cmd[30], rcv[100];
samux 1:fb4494783863 253 int l = 0;
samux 1:fb4494783863 254 char * point;
samux 1:fb4494783863 255 int nb_digits = 0;
samux 1:fb4494783863 256
samux 1:fb4494783863 257 // no dns needed
samux 1:fb4494783863 258 int pos = h.find(".");
samux 1:fb4494783863 259 if (pos != string::npos) {
samux 1:fb4494783863 260 string sub = h.substr(0, h.find("."));
samux 1:fb4494783863 261 nb_digits = atoi(sub.c_str());
samux 1:fb4494783863 262 }
samux 1:fb4494783863 263 //printf("substrL %s\r\n", sub.c_str());
samux 1:fb4494783863 264 if (count(h.begin(), h.end(), '.') == 3 && nb_digits > 0) {
samux 1:fb4494783863 265 strcpy(ip, host);
samux 1:fb4494783863 266 }
samux 1:fb4494783863 267 // dns needed
samux 1:fb4494783863 268 else {
samux 1:fb4494783863 269 nb_digits = 0;
samux 1:fb4494783863 270 sprintf(cmd, "lookup %s\r", host);
samux 1:fb4494783863 271 if (!sendCommand(cmd, NULL, rcv))
samux 1:fb4494783863 272 return false;
samux 1:fb4494783863 273
samux 1:fb4494783863 274 // look for the ip address
samux 1:fb4494783863 275 char * begin = strstr(rcv, "=") + 1;
samux 1:fb4494783863 276 for (int i = 0; i < 3; i++) {
samux 1:fb4494783863 277 point = strstr(begin + l, ".");
samux 1:fb4494783863 278 DBG("str: %s", begin + l);
samux 1:fb4494783863 279 l += point - (begin + l) + 1;
samux 1:fb4494783863 280 }
samux 1:fb4494783863 281 DBG("str: %s", begin + l);
samux 1:fb4494783863 282 while(*(begin + l + nb_digits) >= '0' && *(begin + l + nb_digits) <= '9') {
samux 1:fb4494783863 283 DBG("digit: %c", *(begin + l + nb_digits));
samux 1:fb4494783863 284 nb_digits++;
samux 1:fb4494783863 285 }
samux 1:fb4494783863 286 memcpy(ip, begin, l + nb_digits);
samux 1:fb4494783863 287 ip[l+nb_digits] = 0;
samux 1:fb4494783863 288 DBG("ip from dns: %s", ip);
samux 1:fb4494783863 289 }
samux 1:fb4494783863 290 return true;
samux 1:fb4494783863 291 }
samux 1:fb4494783863 292
samux 1:fb4494783863 293
samux 1:fb4494783863 294 void Wifly::flush()
samux 1:fb4494783863 295 {
samux 1:fb4494783863 296 buf_wifly.flush();
samux 1:fb4494783863 297 }
samux 1:fb4494783863 298
samux 1:fb4494783863 299 bool Wifly::sendCommand(const char * cmd, const char * ack, char * res, int timeout)
samux 1:fb4494783863 300 {
WiredHome 20:906b0f951bc3 301 int tries = 1;
WiredHome 20:906b0f951bc3 302
samux 1:fb4494783863 303 if (!state.cmd_mode) {
samux 1:fb4494783863 304 cmdMode();
samux 1:fb4494783863 305 }
WiredHome 20:906b0f951bc3 306 while (tries <= 2) {
WiredHome 20:906b0f951bc3 307 DBG("sendCommand() try: %d, this: %s", tries, cmd);
WiredHome 20:906b0f951bc3 308 if (send(cmd, strlen(cmd), ack, res, timeout) >= 0) {
WiredHome 20:906b0f951bc3 309 return true;
WiredHome 20:906b0f951bc3 310 }
WiredHome 20:906b0f951bc3 311 tries++;
samux 1:fb4494783863 312 }
WiredHome 20:906b0f951bc3 313 ERR("sendCommand: failed: %s", cmd);
WiredHome 17:213844a1864f 314 return false;
samux 1:fb4494783863 315 }
samux 1:fb4494783863 316
samux 1:fb4494783863 317 bool Wifly::cmdMode()
samux 1:fb4494783863 318 {
samux 1:fb4494783863 319 // if already in cmd mode, return
samux 1:fb4494783863 320 if (state.cmd_mode)
samux 1:fb4494783863 321 return true;
samux 2:8e54830d0df7 322
samux 1:fb4494783863 323 if (send("$$$", 3, "CMD") == -1) {
samux 1:fb4494783863 324 ERR("cannot enter in cmd mode\r\n");
samux 2:8e54830d0df7 325 exit();
samux 1:fb4494783863 326 return false;
samux 1:fb4494783863 327 }
samux 1:fb4494783863 328 state.cmd_mode = true;
samux 1:fb4494783863 329 return true;
samux 1:fb4494783863 330 }
samux 1:fb4494783863 331
samux 1:fb4494783863 332 bool Wifly::disconnect()
samux 1:fb4494783863 333 {
samux 1:fb4494783863 334 // if already disconnected, return
samux 1:fb4494783863 335 if (!state.associated)
samux 1:fb4494783863 336 return true;
samux 2:8e54830d0df7 337
samux 1:fb4494783863 338 if (!sendCommand("leave\r", "DeAuth"))
samux 1:fb4494783863 339 return false;
samux 1:fb4494783863 340 exit();
samux 2:8e54830d0df7 341
samux 1:fb4494783863 342 state.associated = false;
samux 1:fb4494783863 343 return true;
samux 1:fb4494783863 344
samux 1:fb4494783863 345 }
samux 1:fb4494783863 346
samux 1:fb4494783863 347 bool Wifly::is_connected()
samux 1:fb4494783863 348 {
samux 1:fb4494783863 349 return (tcp_status.read() == 1) ? true : false;
samux 1:fb4494783863 350 }
samux 1:fb4494783863 351
samux 1:fb4494783863 352
samux 1:fb4494783863 353 void Wifly::reset()
samux 1:fb4494783863 354 {
samux 1:fb4494783863 355 reset_pin = 0;
samux 1:fb4494783863 356 wait(0.2);
samux 1:fb4494783863 357 reset_pin = 1;
samux 1:fb4494783863 358 wait(0.2);
samux 1:fb4494783863 359 }
samux 1:fb4494783863 360
samux 3:9aa05e19c62e 361 bool Wifly::reboot()
samux 3:9aa05e19c62e 362 {
samux 3:9aa05e19c62e 363 // if already in cmd mode, return
samux 3:9aa05e19c62e 364 if (!sendCommand("reboot\r"))
samux 3:9aa05e19c62e 365 return false;
WiredHome 20:906b0f951bc3 366
samux 3:9aa05e19c62e 367 wait(0.3);
samux 3:9aa05e19c62e 368
samux 3:9aa05e19c62e 369 state.cmd_mode = false;
samux 3:9aa05e19c62e 370 return true;
samux 3:9aa05e19c62e 371 }
samux 3:9aa05e19c62e 372
samux 1:fb4494783863 373 bool Wifly::close()
samux 1:fb4494783863 374 {
samux 1:fb4494783863 375 // if not connected, return
samux 1:fb4494783863 376 if (!state.tcp)
samux 1:fb4494783863 377 return true;
samux 2:8e54830d0df7 378
samux 1:fb4494783863 379 wait(0.25);
samux 1:fb4494783863 380 if (!sendCommand("close\r", "CLOS"))
samux 1:fb4494783863 381 return false;
samux 1:fb4494783863 382 exit();
samux 2:8e54830d0df7 383
samux 1:fb4494783863 384 state.tcp = false;
samux 1:fb4494783863 385 return true;
samux 1:fb4494783863 386 }
samux 1:fb4494783863 387
samux 1:fb4494783863 388
samux 1:fb4494783863 389 int Wifly::putc(char c)
samux 1:fb4494783863 390 {
samux 1:fb4494783863 391 while (!wifi.writeable());
samux 1:fb4494783863 392 return wifi.putc(c);
samux 1:fb4494783863 393 }
samux 1:fb4494783863 394
samux 1:fb4494783863 395
samux 1:fb4494783863 396 bool Wifly::exit()
samux 1:fb4494783863 397 {
samux 1:fb4494783863 398 flush();
samux 1:fb4494783863 399 if (!state.cmd_mode)
samux 1:fb4494783863 400 return true;
samux 1:fb4494783863 401 if (!sendCommand("exit\r", "EXIT"))
samux 1:fb4494783863 402 return false;
samux 1:fb4494783863 403 state.cmd_mode = false;
samux 1:fb4494783863 404 flush();
samux 1:fb4494783863 405 return true;
samux 1:fb4494783863 406 }
samux 1:fb4494783863 407
samux 1:fb4494783863 408
samux 1:fb4494783863 409 int Wifly::readable()
samux 1:fb4494783863 410 {
samux 1:fb4494783863 411 return buf_wifly.available();
samux 1:fb4494783863 412 }
samux 1:fb4494783863 413
samux 1:fb4494783863 414 int Wifly::writeable()
samux 1:fb4494783863 415 {
samux 1:fb4494783863 416 return wifi.writeable();
samux 1:fb4494783863 417 }
samux 1:fb4494783863 418
samux 1:fb4494783863 419 char Wifly::getc()
samux 1:fb4494783863 420 {
samux 1:fb4494783863 421 char c;
samux 1:fb4494783863 422 while (!buf_wifly.available());
samux 1:fb4494783863 423 buf_wifly.dequeue(&c);
samux 1:fb4494783863 424 return c;
samux 1:fb4494783863 425 }
samux 1:fb4494783863 426
samux 1:fb4494783863 427 void Wifly::handler_rx(void)
samux 1:fb4494783863 428 {
samux 1:fb4494783863 429 //read characters
samux 1:fb4494783863 430 while (wifi.readable())
samux 1:fb4494783863 431 buf_wifly.queue(wifi.getc());
samux 1:fb4494783863 432 }
samux 1:fb4494783863 433
samux 1:fb4494783863 434 void Wifly::attach_rx(bool callback)
samux 1:fb4494783863 435 {
samux 1:fb4494783863 436 if (!callback)
samux 1:fb4494783863 437 wifi.attach(NULL);
samux 1:fb4494783863 438 else
samux 1:fb4494783863 439 wifi.attach(this, &Wifly::handler_rx);
samux 1:fb4494783863 440 }
samux 1:fb4494783863 441
samux 1:fb4494783863 442
samux 1:fb4494783863 443 int Wifly::send(const char * str, int len, const char * ACK, char * res, int timeout)
samux 1:fb4494783863 444 {
samux 1:fb4494783863 445 char read;
samux 1:fb4494783863 446 size_t found = string::npos;
samux 1:fb4494783863 447 string checking;
samux 1:fb4494783863 448 Timer tmr;
samux 1:fb4494783863 449 int result = 0;
samux 1:fb4494783863 450
WiredHome 20:906b0f951bc3 451 DBG("send in %d ms this: %s", timeout, str);
samux 1:fb4494783863 452
samux 1:fb4494783863 453 attach_rx(false);
samux 1:fb4494783863 454
WiredHome 18:18ab3993d00d 455 flushIn();
WiredHome 20:906b0f951bc3 456 tmr.start();
samux 1:fb4494783863 457 if (!ACK || !strcmp(ACK, "NO")) {
samux 1:fb4494783863 458 for (int i = 0; i < len; i++)
samux 1:fb4494783863 459 result = (putc(str[i]) == str[i]) ? result + 1 : result;
samux 1:fb4494783863 460 } else {
samux 1:fb4494783863 461 for (int i = 0; i < len; i++)
samux 1:fb4494783863 462 result = (putc(str[i]) == str[i]) ? result + 1 : result;
samux 1:fb4494783863 463
samux 1:fb4494783863 464 while (1) {
samux 1:fb4494783863 465 if (tmr.read_ms() > timeout) {
WiredHome 18:18ab3993d00d 466 flushIn();
WiredHome 20:906b0f951bc3 467 DBG("check: %s", checking.c_str());
samux 1:fb4494783863 468 attach_rx(true);
samux 1:fb4494783863 469 return -1;
samux 1:fb4494783863 470 } else if (wifi.readable()) {
samux 1:fb4494783863 471 read = wifi.getc();
samux 1:fb4494783863 472 if ( read != '\r' && read != '\n') {
samux 1:fb4494783863 473 checking += read;
samux 1:fb4494783863 474 found = checking.find(ACK);
samux 1:fb4494783863 475 if (found != string::npos) {
WiredHome 18:18ab3993d00d 476 flushIn(10);
samux 1:fb4494783863 477 break;
samux 1:fb4494783863 478 }
samux 1:fb4494783863 479 }
samux 1:fb4494783863 480 }
samux 1:fb4494783863 481 }
WiredHome 20:906b0f951bc3 482 DBG("check: %s", checking.c_str());
samux 1:fb4494783863 483 attach_rx(true);
samux 1:fb4494783863 484 return result;
samux 1:fb4494783863 485 }
samux 1:fb4494783863 486
samux 1:fb4494783863 487 //the user wants the result from the command (ACK == NULL, res != NULL)
samux 1:fb4494783863 488 if ( res != NULL) {
samux 1:fb4494783863 489 int i = 0;
samux 1:fb4494783863 490 while (1) {
WiredHome 19:b0c2488222a3 491 if (tmr.read_ms() > timeout) {
WiredHome 19:b0c2488222a3 492 res[i] = '\0';
samux 1:fb4494783863 493 if (i == 0) {
samux 1:fb4494783863 494 res = NULL;
samux 1:fb4494783863 495 }
WiredHome 23:6e77c65ced00 496 DBG("timed out");
samux 1:fb4494783863 497 break;
samux 1:fb4494783863 498 } else {
samux 1:fb4494783863 499 if (wifi.readable()) {
samux 1:fb4494783863 500 read = wifi.getc();
samux 1:fb4494783863 501 // we drop \r and \n
samux 1:fb4494783863 502 if ( read != '\r' && read != '\n') {
samux 1:fb4494783863 503 res[i++] = read;
samux 1:fb4494783863 504 }
samux 1:fb4494783863 505 }
samux 1:fb4494783863 506 }
samux 1:fb4494783863 507 }
WiredHome 20:906b0f951bc3 508 DBG("user str: %s", res);
samux 1:fb4494783863 509 }
samux 1:fb4494783863 510
WiredHome 18:18ab3993d00d 511 flushIn();
samux 1:fb4494783863 512 attach_rx(true);
WiredHome 20:906b0f951bc3 513 DBG("result: %d", result)
samux 1:fb4494783863 514 return result;
WiredHome 18:18ab3993d00d 515 }
WiredHome 18:18ab3993d00d 516
WiredHome 19:b0c2488222a3 517
WiredHome 18:18ab3993d00d 518 void Wifly::flushIn(int timeout_ms)
WiredHome 18:18ab3993d00d 519 {
WiredHome 18:18ab3993d00d 520 Timer tmr;
WiredHome 18:18ab3993d00d 521 #ifdef DEBUG
WiredHome 18:18ab3993d00d 522 char chatter[500];
WiredHome 18:18ab3993d00d 523 int count = 0;
WiredHome 18:18ab3993d00d 524 int c;
WiredHome 18:18ab3993d00d 525 #endif
WiredHome 18:18ab3993d00d 526
WiredHome 18:18ab3993d00d 527 if (timeout_ms == 0) {
WiredHome 18:18ab3993d00d 528 timeout_ms = 2;
WiredHome 18:18ab3993d00d 529 }
WiredHome 18:18ab3993d00d 530 tmr.start();
WiredHome 18:18ab3993d00d 531 while (wifi.readable() || (tmr.read_ms() < timeout_ms)) {
WiredHome 18:18ab3993d00d 532 if (wifi.readable()) {
WiredHome 18:18ab3993d00d 533 #ifndef DEBUG
WiredHome 18:18ab3993d00d 534 wifi.getc();
WiredHome 18:18ab3993d00d 535 #else
WiredHome 18:18ab3993d00d 536 c = wifi.getc();
WiredHome 18:18ab3993d00d 537 if (c != '\r' && c != '\n')
WiredHome 18:18ab3993d00d 538 chatter[count++] = c;
WiredHome 18:18ab3993d00d 539 #endif
WiredHome 18:18ab3993d00d 540 tmr.reset();
WiredHome 18:18ab3993d00d 541 tmr.start(); // start should not be necessary
WiredHome 18:18ab3993d00d 542 }
WiredHome 18:18ab3993d00d 543 }
WiredHome 18:18ab3993d00d 544 #ifdef DEBUG
WiredHome 18:18ab3993d00d 545 chatter[count] = '\0';
WiredHome 18:18ab3993d00d 546 DBG("Wifly::flushIn(%d) {%s}", timeout_ms, chatter);
WiredHome 18:18ab3993d00d 547 #endif
WiredHome 18:18ab3993d00d 548 }
WiredHome 20:906b0f951bc3 549
WiredHome 20:906b0f951bc3 550
WiredHome 20:906b0f951bc3 551 // The ARM uart and the Wifly uart have to be in sync or we get
WiredHome 20:906b0f951bc3 552 // no meaningful response, so then have to try the possibilities.
WiredHome 20:906b0f951bc3 553 //
WiredHome 20:906b0f951bc3 554 // First try is at the currently configured ARM uart baud, if
WiredHome 20:906b0f951bc3 555 // that fails then it shifts the ARM uart baud through the probable
WiredHome 20:906b0f951bc3 556 // speeds, trying to establish contact with the Wifly module.
WiredHome 20:906b0f951bc3 557 // Once contact is demonstrated (response to the 'ver' command),
WiredHome 20:906b0f951bc3 558 // then it sets the Wifly module and then the ARM uart.
WiredHome 20:906b0f951bc3 559 bool Wifly::baud(int _targetBaud)
WiredHome 20:906b0f951bc3 560 {
WiredHome 20:906b0f951bc3 561 // in testing, 460800 and 921600 may change the Wifly module where you can't
WiredHome 20:906b0f951bc3 562 // change it back w/o a reset. So, we won't even permit those speeds.
WiredHome 20:906b0f951bc3 563 const int baudrates[] = {2400, 4800, 9600, 19200, 38400, 57600, 115200, 230400}; //, 460800, 921600};
WiredHome 20:906b0f951bc3 564 #define BRCOUNT (sizeof(baudrates)/sizeof(baudrates[0]))
WiredHome 20:906b0f951bc3 565 char cmd[20]; // sized for "set u i 460800\r" [15+1], plus margin [4]
WiredHome 20:906b0f951bc3 566 int tryIndex = 0;
WiredHome 20:906b0f951bc3 567 bool res = false;
WiredHome 20:906b0f951bc3 568 int userIndex;
WiredHome 20:906b0f951bc3 569
WiredHome 20:906b0f951bc3 570 sprintf(cmd, "set u i %d\r", _targetBaud);
WiredHome 20:906b0f951bc3 571 // set u i # should cause it to exit command mode (manual 2.3.64),
WiredHome 20:906b0f951bc3 572 // but testing indicates that it does not.
WiredHome 20:906b0f951bc3 573 for (userIndex=0; userIndex < BRCOUNT; userIndex++) {
WiredHome 20:906b0f951bc3 574 if (_targetBaud == baudrates[userIndex]) {
WiredHome 20:906b0f951bc3 575 while (tryIndex <= BRCOUNT) {
WiredHome 20:906b0f951bc3 576 DBG("baud(%d) try: %d", _targetBaud, tryIndex);
WiredHome 20:906b0f951bc3 577 sendCommand(cmd); // shift Wifly to desired speed [it may not respond (see 2.3.64)]
WiredHome 20:906b0f951bc3 578 // state.cmd_mode = false; // see note above why this is disabled
WiredHome 20:906b0f951bc3 579 wifi.baud(_targetBaud); // shift the ARM uart to match
WiredHome 20:906b0f951bc3 580 if (sendCommand("ver\r", "wifly", NULL, timeToRespond(4))) { // use this to verify communications
WiredHome 20:906b0f951bc3 581 baudrate = _targetBaud;
WiredHome 20:906b0f951bc3 582 res = true;
WiredHome 20:906b0f951bc3 583 break; // success
WiredHome 20:906b0f951bc3 584 }
WiredHome 20:906b0f951bc3 585 // keep trying baudrates between ARM and WiFly
WiredHome 20:906b0f951bc3 586 if (tryIndex < BRCOUNT) {
WiredHome 20:906b0f951bc3 587 wifi.baud(baudrates[tryIndex]);
WiredHome 20:906b0f951bc3 588 }
WiredHome 20:906b0f951bc3 589 tryIndex++;
WiredHome 20:906b0f951bc3 590 }
WiredHome 20:906b0f951bc3 591 break; // if they selected a legitimate baud, try no others
WiredHome 20:906b0f951bc3 592 }
WiredHome 20:906b0f951bc3 593 }
WiredHome 20:906b0f951bc3 594 return res;
WiredHome 20:906b0f951bc3 595 }
WiredHome 20:906b0f951bc3 596
WiredHome 20:906b0f951bc3 597 int Wifly::timeToRespond(int stringLen)
WiredHome 20:906b0f951bc3 598 {
WiredHome 20:906b0f951bc3 599 return 150 + (1 | 10000/baudrate) * stringLen;
WiredHome 21:97294686b4a1 600 }
WiredHome 23:6e77c65ced00 601