cc3100_Socket_Wifi_Server with Ethernet Interface not working
Dependencies: EthernetInterface mbed-rtos mbed
Fork of cc3100_Test_Demo by
simplelink/cc3100_socket.h
- Committer:
- artpes
- Date:
- 2017-05-26
- Revision:
- 9:fd9f64918306
- Parent:
- 6:778b081f6a13
File content as of revision 9:fd9f64918306:
/* * socket.h - CC31xx/CC32xx Host Driver Implementation * * Copyright (C) 2014 Texas Instruments Incorporated - http://www.ti.com/ * * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * * Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * * Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the * distribution. * * Neither the name of Texas Instruments Incorporated nor the names of * its contributors may be used to endorse or promote products derived * from this software without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. * */ /*****************************************************************************/ /* Include files */ /*****************************************************************************/ #include "cc3100_simplelink.h" #ifndef SL_SOCKET_H_ #define SL_SOCKET_H_ #include "cc3100_protocol.h" namespace mbed_cc3100 { //#include "cc3100_driver.h" /*! \addtogroup socket @{ */ /*****************************************************************************/ /* Macro declarations */ /*****************************************************************************/ const uint8_t SL_FD_SETSIZE = SL_MAX_SOCKETS; /* Number of sockets to select on - same is max sockets! */ const uint8_t BSD_SOCKET_ID_MASK = (0x0F); /* Index using the LBS 4 bits for socket id 0-7 */ /* Define some BSD protocol constants. */ const uint8_t SL_SOCK_STREAM = (1); /* TCP Socket */ const uint8_t SL_SOCK_DGRAM = (2); /* UDP Socket */ const uint8_t SL_SOCK_RAW = (3); /* Raw socket */ const uint8_t SL_IPPROTO_TCP = (6); /* TCP Raw Socket */ const uint8_t SL_IPPROTO_UDP = (17); /* UDP Raw Socket */ const uint8_t SL_IPPROTO_RAW = (255); /* Raw Socket */ const uint8_t SL_SEC_SOCKET = (100); /* Secured Socket Layer (SSL,TLS) */ /* Address families. */ const uint8_t SL_AF_INET = (2); /* IPv4 socket (UDP, TCP, etc) */ const uint8_t SL_AF_INET6 = (3); /* IPv6 socket (UDP, TCP, etc) */ const uint8_t SL_AF_INET6_EUI_48 = (9); const uint8_t AF_INET = SL_AF_INET; const uint8_t AF_INET6 = SL_AF_INET6; const uint8_t SL_AF_RF = (6); /* data include RF parameter, All layer by user (Wifi could be disconnected) */ const uint8_t SL_AF_PACKET = (17); /* Protocol families, same as address families. */ const uint8_t SL_PF_INET = AF_INET; const uint8_t SL_PF_INET6 = AF_INET6; const uint8_t SL_INADDR_ANY = (0); /* bind any address */ /* error codes */ const int8_t SL_SOC_ERROR = (-1); /* Failure. */ const int8_t SL_SOC_OK = ( 0); /* Success. */ const int8_t SL_INEXE = (-8); /* socket command in execution */ const int8_t SL_EBADF = (-9); /* Bad file number */ const int8_t SL_ENSOCK = (-10); /* The system limit on the total number of open socket, has been reached */ const int8_t SL_EAGAIN = (-11); /* Try again */ const int8_t SL_EWOULDBLOCK = SL_EAGAIN; const int8_t SL_ENOMEM = (-12); /* Out of memory */ const int8_t SL_EACCES = (-13); /* Permission denied */ const int8_t SL_EFAULT = (-14); /* Bad address */ const int8_t SL_ECLOSE = (-15); /* close socket operation failed to transmit all queued packets */ const int8_t SL_EALREADY_ENABLED = (-21); /* Transceiver - Transceiver already ON. there could be only one */ const int8_t SL_EINVAL = (-22); /* Invalid argument */ const int8_t SL_EAUTO_CONNECT_OR_CONNECTING = (-69); /* Transceiver - During connection, connected or auto mode started */ const int8_t SL_CONNECTION_PENDING = (-72); /* Transceiver - Device is connected, disconnect first to open transceiver */ const int8_t SL_EUNSUPPORTED_ROLE = (-86); /* Transceiver - Trying to start when WLAN role is AP or P2P GO */ const int8_t SL_EDESTADDRREQ = (-89); /* Destination address required */ const int8_t SL_EPROTOTYPE = (-91); /* Protocol wrong type for socket */ const int8_t SL_ENOPROTOOPT = (-92); /* Protocol not available */ const int8_t SL_EPROTONOSUPPORT = (-93); /* Protocol not supported */ const int8_t SL_ESOCKTNOSUPPORT = (-94); /* Socket type not supported */ const int8_t SL_EOPNOTSUPP = (-95); /* Operation not supported on transport endpoint */ const int8_t SL_EAFNOSUPPORT = (-97); /* Address family not supported by protocol */ const int8_t SL_EADDRINUSE = (-98); /* Address already in use */ const int8_t SL_EADDRNOTAVAIL = (-99); /* Cannot assign requested address */ const int8_t SL_ENETUNREACH = (-101); /* Network is unreachable */ const int8_t SL_ENOBUFS = (-105); /* No buffer space available */ const int8_t SL_EOBUFF = SL_ENOBUFS; const int8_t SL_EISCONN = (-106); /* Transport endpoint is already connected */ const int8_t SL_ENOTCONN = (-107); /* Transport endpoint is not connected */ const int8_t SL_ETIMEDOUT = (-110); /* Connection timed out */ const int8_t SL_ECONNREFUSED = (-111); /* Connection refused */ const int8_t SL_EALREADY = (-114); /* Non blocking connect in progress, try again */ const int16_t SL_ESEC_RSA_WRONG_TYPE_E = (-130); /* RSA wrong block type for RSA function */ const int16_t SL_ESEC_RSA_BUFFER_E = (-131); /* RSA buffer error, output too small or */ const int16_t SL_ESEC_BUFFER_E = (-132); /* output buffer too small or input too large */ const int16_t SL_ESEC_ALGO_ID_E = (-133); /* setting algo id error */ const int16_t SL_ESEC_PUBLIC_KEY_E = (-134); /* setting public key error */ const int16_t SL_ESEC_DATE_E = (-135); /* setting date validity error */ const int16_t SL_ESEC_SUBJECT_E = (-136); /* setting subject name error */ const int16_t SL_ESEC_ISSUER_E = (-137); /* setting issuer name error */ const int16_t SL_ESEC_CA_TRUE_E = (-138); /* setting CA basic constraint true error */ const int16_t SL_ESEC_EXTENSIONS_E = (-139); /* setting extensions error */ const int16_t SL_ESEC_ASN_PARSE_E = (-140); /* ASN parsing error, invalid input */ const int16_t SL_ESEC_ASN_VERSION_E = (-141); /* ASN version error, invalid number */ const int16_t SL_ESEC_ASN_GETINT_E = (-142); /* ASN get big int16_t error, invalid data */ const int16_t SL_ESEC_ASN_RSA_KEY_E = (-143); /* ASN key init error, invalid input */ const int16_t SL_ESEC_ASN_OBJECT_ID_E = (-144); /* ASN object id error, invalid id */ const int16_t SL_ESEC_ASN_TAG_NULL_E = (-145); /* ASN tag error, not null */ const int16_t SL_ESEC_ASN_EXPECT_0_E = (-146); /* ASN expect error, not zero */ const int16_t SL_ESEC_ASN_BITSTR_E = (-147); /* ASN bit string error, wrong id */ const int16_t SL_ESEC_ASN_UNKNOWN_OID_E = (-148); /* ASN oid error, unknown sum id */ const int16_t SL_ESEC_ASN_DATE_SZ_E = (-149); /* ASN date error, bad size */ const int16_t SL_ESEC_ASN_BEFORE_DATE_E = (-150); /* ASN date error, current date before */ const int16_t SL_ESEC_ASN_AFTER_DATE_E = (-151); /* ASN date error, current date after */ const int16_t SL_ESEC_ASN_SIG_OID_E = (-152); /* ASN signature error, mismatched oid */ const int16_t SL_ESEC_ASN_TIME_E = (-153); /* ASN time error, unknown time type */ const int16_t SL_ESEC_ASN_INPUT_E = (-154); /* ASN input error, not enough data */ const int16_t SL_ESEC_ASN_SIG_CONFIRM_E = (-155); /* ASN sig error, confirm failure */ const int16_t SL_ESEC_ASN_SIG_HASH_E = (-156); /* ASN sig error, unsupported hash type */ const int16_t SL_ESEC_ASN_SIG_KEY_E = (-157); /* ASN sig error, unsupported key type */ const int16_t SL_ESEC_ASN_DH_KEY_E = (-158); /* ASN key init error, invalid input */ const int16_t SL_ESEC_ASN_NTRU_KEY_E = (-159); /* ASN ntru key decode error, invalid input */ const int16_t SL_ESEC_ECC_BAD_ARG_E = (-170); /* ECC input argument of wrong type */ const int16_t SL_ESEC_ASN_ECC_KEY_E = (-171); /* ASN ECC bad input */ const int16_t SL_ESEC_ECC_CURVE_OID_E = (-172); /* Unsupported ECC OID curve type */ const int16_t SL_ESEC_BAD_FUNC_ARG = (-173); /* Bad function argument provided */ const int16_t SL_ESEC_NOT_COMPILED_IN = (-174); /* Feature not compiled in */ const int16_t SL_ESEC_UNICODE_SIZE_E = (-175); /* Unicode password too big */ const int16_t SL_ESEC_NO_PASSWORD = (-176); /* no password provided by user */ const int16_t SL_ESEC_ALT_NAME_E = (-177); /* alt name size problem, too big */ const int16_t SL_ESEC_AES_GCM_AUTH_E = (-180); /* AES-GCM Authentication check failure */ const int16_t SL_ESEC_AES_CCM_AUTH_E = (-181); /* AES-CCM Authentication check failure */ #define SL_SOCKET_ERROR_E (-208) /* Error state on socket */ #define SL_ESEC_MEMORY_ERROR (-203) /* out of memory */ #define SL_ESEC_VERIFY_FINISHED_ERROR (-204) /* verify problem on finished */ #define SL_ESEC_VERIFY_MAC_ERROR (-205) /* verify mac problem */ #define SL_ESEC_UNKNOWN_HANDSHAKE_TYPE (-207) /* weird handshake type */ #define SL_ESEC_SOCKET_ERROR_E (-208) /* error state on socket */ #define SL_ESEC_SOCKET_NODATA (-209) /* expected data, not there */ #define SL_ESEC_INCOMPLETE_DATA (-210) /* don't have enough data to complete task */ #define SL_ESEC_UNKNOWN_RECORD_TYPE (-211) /* unknown type in record hdr */ #define SL_ESEC_FATAL_ERROR (-213) /* recvd alert fatal error */ #define SL_ESEC_ENCRYPT_ERROR (-214) /* error during encryption */ #define SL_ESEC_NO_PEER_KEY (-216) /* need peer's key */ #define SL_ESEC_NO_PRIVATE_KEY (-217) /* need the private key */ #define SL_ESEC_RSA_PRIVATE_ERROR (-218) /* error during rsa priv op */ #define SL_ESEC_NO_DH_PARAMS (-219) /* server missing DH params */ #define SL_ESEC_BUILD_MSG_ERROR (-220) /* build message failure */ #define SL_ESEC_BAD_HELLO (-221) /* client hello malformed */ #define SL_ESEC_DOMAIN_NAME_MISMATCH (-222) /* peer subject name mismatch */ #define SL_ESEC_WANT_READ (-223) /* want read, call again */ #define SL_ESEC_NOT_READY_ERROR (-224) /* handshake layer not ready */ #define SL_ESEC_PMS_VERSION_ERROR (-225) /* pre m secret version error */ #define SL_ESEC_VERSION_ERROR (-226) /* record layer version error */ #define SL_ESEC_WANT_WRITE (-227) /* want write, call again */ #define SL_ESEC_BUFFER_ERROR (-228) /* malformed buffer input */ #define SL_ESEC_VERIFY_CERT_ERROR (-229) /* verify cert error */ #define SL_ESEC_VERIFY_SIGN_ERROR (-230) /* verify sign error */ #define SL_ESEC_LENGTH_ERROR (-241) /* record layer length error */ #define SL_ESEC_PEER_KEY_ERROR (-242) /* can't decode peer key */ #define SL_ESEC_ZERO_RETURN (-243) /* peer sent close notify */ #define SL_ESEC_SIDE_ERROR (-244) /* wrong client/server type */ #define SL_ESEC_NO_PEER_CERT (-245) /* peer didn't send key */ #define SL_ESEC_ECC_CURVETYPE_ERROR (-250) /* Bad ECC Curve Type */ #define SL_ESEC_ECC_CURVE_ERROR (-251) /* Bad ECC Curve */ #define SL_ESEC_ECC_PEERKEY_ERROR (-252) /* Bad Peer ECC Key */ #define SL_ESEC_ECC_MAKEKEY_ERROR (-253) /* Bad Make ECC Key */ #define SL_ESEC_ECC_EXPORT_ERROR (-254) /* Bad ECC Export Key */ #define SL_ESEC_ECC_SHARED_ERROR (-255) /* Bad ECC Shared Secret */ #define SL_ESEC_NOT_CA_ERROR (-257) /* Not a CA cert error */ #define SL_ESEC_BAD_PATH_ERROR (-258) /* Bad path for opendir */ #define SL_ESEC_BAD_CERT_MANAGER_ERROR (-259) /* Bad Cert Manager */ #define SL_ESEC_MAX_CHAIN_ERROR (-268) /* max chain depth exceeded */ #define SL_ESEC_SUITES_ERROR (-271) /* suites pointer error */ #define SL_ESEC_SSL_NO_PEM_HEADER (-272) /* no PEM header found */ #define SL_ESEC_OUT_OF_ORDER_E (-273) /* out of order message */ #define SL_ESEC_SANITY_CIPHER_E (-275) /* sanity check on cipher error */ #define SL_ESEC_GEN_COOKIE_E (-277) /* Generate Cookie Error */ #define SL_ESEC_NO_PEER_VERIFY (-278) /* Need peer cert verify Error */ #define SL_ESEC_UNKNOWN_SNI_HOST_NAME_E (-281) /* Unrecognized host name Error */ /* begin negotiation parameter errors */ #define SL_ESEC_UNSUPPORTED_SUITE (-290) /* unsupported cipher suite */ #define SL_ESEC_MATCH_SUITE_ERROR (-291 ) /* can't match cipher suite */ /* ssl tls security start with -300 offset */ const int16_t SL_ESEC_CLOSE_NOTIFY = (-300); /* ssl/tls alerts */ const int16_t SL_ESEC_UNEXPECTED_MESSAGE = (-310); /* ssl/tls alerts */ const int16_t SL_ESEC_BAD_RECORD_MAC = (-320); /* ssl/tls alerts */ const int16_t SL_ESEC_DECRYPTION_FAILED = (-321); /* ssl/tls alerts */ const int16_t SL_ESEC_RECORD_OVERFLOW = (-322); /* ssl/tls alerts */ const int16_t SL_ESEC_DECOMPRESSION_FAILURE = (-330); /* ssl/tls alerts */ const int16_t SL_ESEC_HANDSHAKE_FAILURE = (-340); /* ssl/tls alerts */ const int16_t SL_ESEC_NO_CERTIFICATE = (-341); /* ssl/tls alerts */ const int16_t SL_ESEC_BAD_CERTIFICATE = (-342); /* ssl/tls alerts */ const int16_t SL_ESEC_UNSUPPORTED_CERTIFICATE = (-343); /* ssl/tls alerts */ const int16_t SL_ESEC_CERTIFICATE_REVOKED = (-344); /* ssl/tls alerts */ const int16_t SL_ESEC_CERTIFICATE_EXPIRED = (-345); /* ssl/tls alerts */ const int16_t SL_ESEC_CERTIFICATE_UNKNOWN = (-346); /* ssl/tls alerts */ const int16_t SL_ESEC_ILLEGAL_PARAMETER = (-347); /* ssl/tls alerts */ const int16_t SL_ESEC_UNKNOWN_CA = (-348); /* ssl/tls alerts */ const int16_t SL_ESEC_ACCESS_DENIED = (-349); /* ssl/tls alerts */ const int16_t SL_ESEC_DECODE_ERROR = (-350); /* ssl/tls alerts */ const int16_t SL_ESEC_DECRYPT_ERROR = (-351); /* ssl/tls alerts */ const int16_t SL_ESEC_EXPORT_RESTRICTION = (-360); /* ssl/tls alerts */ const int16_t SL_ESEC_PROTOCOL_VERSION = (-370); /* ssl/tls alerts */ const int16_t SL_ESEC_INSUFFICIENT_SECURITY = (-371); /* ssl/tls alerts */ const int16_t SL_ESEC_INTERNAL_ERROR = (-380); /* ssl/tls alerts */ const int16_t SL_ESEC_USER_CANCELLED = (-390); /* ssl/tls alerts */ const int16_t SL_ESEC_NO_RENEGOTIATION = (-400); /* ssl/tls alerts */ const int16_t SL_ESEC_UNSUPPORTED_EXTENSION = (-410); /* ssl/tls alerts */ const int16_t SL_ESEC_CERTIFICATE_UNOBTAINABLE = (-411); /* ssl/tls alerts */ const int16_t SL_ESEC_UNRECOGNIZED_NAME = (-412); /* ssl/tls alerts */ const int16_t SL_ESEC_BAD_CERTIFICATE_STATUS_RESPONSE = (-413); /* ssl/tls alerts */ const int16_t SL_ESEC_BAD_CERTIFICATE_HASH_VALUE = (-414); /* ssl/tls alerts */ /* propierty secure */ const int16_t SL_ESECGENERAL = (-450); /* error secure level general error */ const int16_t SL_ESECDECRYPT = (-451); /* error secure level, decrypt recv packet fail */ const int16_t SL_ESECCLOSED = (-452); /* secure layrer is closed by other size , tcp is still connected */ const int16_t SL_ESECSNOVERIFY = (-453); /* Connected without server verification */ const int16_t SL_ESECNOCAFILE = (-454); /* error secure level CA file not found*/ const int16_t SL_ESECMEMORY = (-455); /* error secure level No memory space available */ const int16_t SL_ESECBADCAFILE = (-456); /* error secure level bad CA file */ const int16_t SL_ESECBADCERTFILE = (-457); /* error secure level bad Certificate file */ const int16_t SL_ESECBADPRIVATEFILE = (-458); /* error secure level bad private file */ const int16_t SL_ESECBADDHFILE = (-459); /* error secure level bad DH file */ const int16_t SL_ESECT00MANYSSLOPENED = (-460); /* MAX SSL Sockets are opened */ const int16_t SL_ESECDATEERROR = (-461); /* connected with certificate date verification error */ const int16_t SL_ESECHANDSHAKETIMEDOUT = (-462); /* connection timed out due to handshake time */ /* end error codes */ /* Max payload size by protocol */ const uint8_t SL_SOCKET_PAYLOAD_TYPE_MASK = (0xF0); /*4 bits type, 4 bits sockets id */ const uint8_t SL_SOCKET_PAYLOAD_TYPE_UDP_IPV4 = (0x00); /* 1472 bytes */ const uint8_t SL_SOCKET_PAYLOAD_TYPE_TCP_IPV4 = (0x10); /* 1460 bytes */ const uint8_t SL_SOCKET_PAYLOAD_TYPE_UDP_IPV6 = (0x20); /* 1452 bytes */ const uint8_t SL_SOCKET_PAYLOAD_TYPE_TCP_IPV6 = (0x30); /* 1440 bytes */ const uint8_t SL_SOCKET_PAYLOAD_TYPE_UDP_IPV4_SECURE =(0x40); /* */ const uint8_t SL_SOCKET_PAYLOAD_TYPE_TCP_IPV4_SECURE =(0x50); /* */ const uint8_t SL_SOCKET_PAYLOAD_TYPE_UDP_IPV6_SECURE =(0x60); /* */ const uint8_t SL_SOCKET_PAYLOAD_TYPE_TCP_IPV6_SECURE =(0x70); /* */ const uint8_t SL_SOCKET_PAYLOAD_TYPE_RAW_TRANCEIVER =(0x80); /* 1536 bytes */ const uint8_t SL_SOCKET_PAYLOAD_TYPE_RAW_PACKET = (0x90); /* 1536 bytes */ const uint8_t SL_SOCKET_PAYLOAD_TYPE_RAW_IP4 = (0xa0); const uint8_t SL_SOCKET_PAYLOAD_TYPE_RAW_IP6 = (SL_SOCKET_PAYLOAD_TYPE_RAW_IP4 ); const uint8_t SL_SOL_SOCKET = (1); /* Define the socket option category. */ const uint8_t SL_IPPROTO_IP = (2); /* Define the IP option category. */ const uint8_t SL_SOL_PHY_OPT = (3); /* Define the PHY option category. */ const uint8_t SL_SO_RCVBUF = (8); /* Setting TCP receive buffer size */ const uint8_t SL_SO_KEEPALIVE = (9); /* Connections are kept alive with periodic messages */ const uint8_t SL_SO_RCVTIMEO = (20); /* Enable receive timeout */ const uint8_t SL_SO_NONBLOCKING = (24); /* Enable . disable nonblocking mode */ const uint8_t SL_SO_SECMETHOD = (25); /* security metohd */ const uint8_t SL_SO_SECURE_MASK = (26); /* security mask */ const uint8_t SL_SO_SECURE_FILES = (27); /* security files */ const uint8_t SL_SO_CHANGE_CHANNEL = (28); /* This option is available only when transceiver started */ const uint8_t SL_SO_SECURE_FILES_PRIVATE_KEY_FILE_NAME =(30); /* This option used to configue secure file */ const uint8_t SL_SO_SECURE_FILES_CERTIFICATE_FILE_NAME =(31); /* This option used to configue secure file */ const uint8_t SL_SO_SECURE_FILES_CA_FILE_NAME = (32); /* This option used to configue secure file */ const uint8_t SL_SO_SECURE_FILES_DH_KEY_FILE_NAME = (33); /* This option used to configue secure file */ const uint8_t SL_IP_MULTICAST_IF = (60); /* Specify outgoing multicast interface */ const uint8_t SL_IP_MULTICAST_TTL = (61); /* Specify the TTL value to use for outgoing multicast packet. */ const uint8_t SL_IP_ADD_MEMBERSHIP = (65); /* Join IPv4 multicast membership */ const uint8_t SL_IP_DROP_MEMBERSHIP= (66); /* Leave IPv4 multicast membership */ const uint8_t SL_IP_HDRINCL = (67); /* Raw socket IPv4 header included. */ const uint8_t SL_IP_RAW_RX_NO_HEADER =(68); /* Proprietary socket option that does not includeIPv4/IPv6 header (and extension headers) on received raw sockets*/ const uint8_t SL_IP_RAW_IPV6_HDRINCL =(69); /* Transmitted buffer over IPv6 socket contains IPv6 header. */ const uint8_t SL_SO_PHY_RATE = (100); /* WLAN Transmit rate */ const uint8_t SL_SO_PHY_TX_POWER = (101); /* TX Power level */ const uint8_t SL_SO_PHY_NUM_FRAMES_TO_TX = (102); /* Number of frames to transmit */ const uint8_t SL_SO_PHY_PREAMBLE = (103); /* Preamble for transmission */ const uint8_t SL_SO_SEC_METHOD_SSLV3 = (0); /* security metohd SSL v3*/ const uint8_t SL_SO_SEC_METHOD_TLSV1 = (1); /* security metohd TLS v1*/ const uint8_t SL_SO_SEC_METHOD_TLSV1_1 = (2); /* security metohd TLS v1_1*/ const uint8_t SL_SO_SEC_METHOD_TLSV1_2 = (3); /* security metohd TLS v1_2*/ const uint8_t SL_SO_SEC_METHOD_SSLv3_TLSV1_2 = (4); /* use highest possible version from SSLv3 - TLS 1.2*/ const uint8_t SL_SO_SEC_METHOD_DLSV1 = (5); /* security metohd DTL v1 */ #define SL_SEC_MASK_SSL_RSA_WITH_RC4_128_SHA (1 << 0) #define SL_SEC_MASK_SSL_RSA_WITH_RC4_128_MD5 (1 << 1) #define SL_SEC_MASK_TLS_RSA_WITH_AES_256_CBC_SHA (1 << 2) #define SL_SEC_MASK_TLS_DHE_RSA_WITH_AES_256_CBC_SHA (1 << 3) #define SL_SEC_MASK_TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (1 << 4) #define SL_SEC_MASK_TLS_ECDHE_RSA_WITH_RC4_128_SHA (1 << 5) #define SL_SEC_MASK_TLS_RSA_WITH_AES_128_CBC_SHA256 (1 << 6) #define SL_SEC_MASK_TLS_RSA_WITH_AES_256_CBC_SHA256 (1 << 7) #define SL_SEC_MASK_TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (1 << 8) #define SL_SEC_MASK_TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (1 << 9) #define SL_SEC_MASK_SECURE_DEFAULT ((SL_SEC_MASK_TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 << 1) - 1) const uint32_t SL_MSG_DONTWAIT = (0x00000008); /* Nonblocking IO */ /* AP DHCP Server - IP Release reason code */ const uint8_t SL_IP_LEASE_PEER_RELEASE = (0); const uint8_t SL_IP_LEASE_PEER_DECLINE = (1); const uint8_t SL_IP_LEASE_EXPIRED = (2); /* possible types when receiving SL_SOCKET_ASYNC_EVENT*/ const uint8_t SSL_ACCEPT = (1); /* accept failed due to ssl issue ( tcp pass) */ const uint8_t RX_FRAGMENTATION_TOO_BIG = (2); /* connection less mode, rx packet fragmentation > 16K, packet is being released */ const uint8_t OTHER_SIDE_CLOSE_SSL_DATA_NOT_ENCRYPTED = (3); /* remote side down from secure to unsecure */ #ifdef SL_INC_STD_BSD_API_NAMING #define FD_SETSIZE SL_FD_SETSIZE #define SOCK_STREAM SL_SOCK_STREAM #define SOCK_DGRAM SL_SOCK_DGRAM #define SOCK_RAW SL_SOCK_RAW #define IPPROTO_TCP SL_IPPROTO_TCP #define IPPROTO_UDP SL_IPPROTO_UDP #define IPPROTO_RAW SL_IPPROTO_RAW #define AF_INET6_EUI_48 SL_AF_INET6_EUI_48 #define AF_RF SL_AF_RF #define AF_PACKET SL_AF_PACKET #define PF_INET SL_PF_INET #define PF_INET6 SL_PF_INET6 #define INADDR_ANY SL_INADDR_ANY #define ERROR SL_SOC_ERROR #define INEXE SL_INEXE #define EBADF SL_EBADF #define ENSOCK SL_ENSOCK #define EAGAIN SL_EAGAIN #define EWOULDBLOCK SL_EWOULDBLOCK #define ENOMEM SL_ENOMEM #define EACCES SL_EACCES #define EFAULT SL_EFAULT #define EINVAL SL_EINVAL #define EDESTADDRREQ SL_EDESTADDRREQ #define EPROTOTYPE SL_EPROTOTYPE #define ENOPROTOOPT SL_ENOPROTOOPT #define EPROTONOSUPPORT SL_EPROTONOSUPPORT #define ESOCKTNOSUPPORT SL_ESOCKTNOSUPPORT #define EOPNOTSUPP SL_EOPNOTSUPP #define EAFNOSUPPORT SL_EAFNOSUPPORT #define EADDRINUSE SL_EADDRINUSE #define EADDRNOTAVAIL SL_EADDRNOTAVAIL #define ENETUNREACH SL_ENETUNREACH #define ENOBUFS SL_ENOBUFS #define EOBUFF SL_EOBUFF #define EISCONN SL_EISCONN #define ENOTCONN SL_ENOTCONN #define ETIMEDOUT SL_ETIMEDOUT #define ECONNREFUSED SL_ECONNREFUSED #define SOL_SOCKET SL_SOL_SOCKET #define IPPROTO_IP SL_IPPROTO_IP #define SO_KEEPALIVE SL_SO_KEEPALIVE #define SO_RCVTIMEO SL_SO_RCVTIMEO #define SO_NONBLOCKING SL_SO_NONBLOCKING #define IP_MULTICAST_IF SL_IP_MULTICAST_IF #define IP_MULTICAST_TTL SL_IP_MULTICAST_TTL #define IP_ADD_MEMBERSHIP SL_IP_ADD_MEMBERSHIP #define IP_DROP_MEMBERSHIP SL_IP_DROP_MEMBERSHIP #define socklen_t SlSocklen_t #define timeval SlTimeval_t #define sockaddr SlSockAddr_t #define in6_addr SlIn6Addr_t #define sockaddr_in6 SlSockAddrIn6_t #define in_addr SlInAddr_t #define sockaddr_in SlSockAddrIn_t #define MSG_DONTWAIT SL_MSG_DONTWAIT #define FD_SET SL_FD_SET #define FD_CLR SL_FD_CLR #define FD_ISSET SL_FD_ISSET #define FD_ZERO SL_FD_ZERO #define fd_set SlFdSet_t #define socket sl_Socket #define close sl_Close #define accept sl_Accept #define bind sl_Bind #define listen sl_Listen #define connect sl_Connect #define select sl_Select #define setsockopt sl_SetSockOpt #define getsockopt sl_GetSockOpt #define recv sl_Recv #define recvfrom sl_RecvFrom #define write_ sl_Write #define send sl_Send #define sendto sl_SendTo #define gethostbyname sl_NetAppDnsGetHostByName #define htonl sl_Htonl #define ntohl sl_Ntohl #define htons sl_Htons #define ntohs sl_Ntohs #endif /*****************************************************************************/ /* Structure/Enum declarations */ /*****************************************************************************/ /* Internet address */ typedef struct SlInAddr_t { #ifndef s_addr uint32_t s_addr; /* Internet address 32 bits */ #else union S_un { struct { uint8_t s_b1,s_b2,s_b3,s_b4; } S_un_b; struct { uint8_t s_w1,s_w2; } S_un_w; uint32_t S_addr; } S_un; #endif } SlInAddr_t; /* sockopt */ typedef struct { uint32_t KeepaliveEnabled; /* 0 = disabled;1 = enabled; default = 1*/ } SlSockKeepalive_t; typedef struct { uint32_t ReuseaddrEnabled; /* 0 = disabled; 1 = enabled; default = 1*/ } SlSockReuseaddr_t; typedef struct { uint32_t Winsize; /* receive window size for tcp sockets */ } SlSockWinsize_t; typedef struct { uint32_t NonblockingEnabled;/* 0 = disabled;1 = enabled;default = 1*/ } SlSockNonblocking_t; typedef struct { uint8_t sd; uint8_t type; uint16_t val; uint8_t* pExtraInfo; } SlSocketAsyncEvent_t; typedef struct { int16_t status; uint8_t sd; uint8_t padding; } SlSockTxFailEventData_t; typedef union { SlSockTxFailEventData_t SockTxFailData; SlSocketAsyncEvent_t SockAsyncData; } SlSockEventData_u; typedef struct { uint32_t Event; SlSockEventData_u socketAsyncEvent; } SlSockEvent_t; typedef struct { uint32_t secureMask; } SlSockSecureMask; typedef struct { uint8_t secureMethod; } SlSockSecureMethod; typedef enum { SL_BSD_SECURED_PRIVATE_KEY_IDX = 0, SL_BSD_SECURED_CERTIFICATE_IDX, SL_BSD_SECURED_CA_IDX, SL_BSD_SECURED_DH_IDX } slBsd_secureSocketFilesIndex_e; typedef struct { SlInAddr_t imr_multiaddr; /* The IPv4 multicast address to join */ SlInAddr_t imr_interface; /* The interface to use for this group */ } SlSockIpMreq; /* sockopt */ typedef uint32_t SlTime_t; typedef uint32_t SlSuseconds_t; typedef struct { SlTime_t tv_sec; /* Seconds */ SlSuseconds_t tv_usec; /* Microseconds */ } SlTimeval_t; typedef uint16_t SlSocklen_t; /* IpV4 socket address */ typedef struct { uint16_t sa_family; /* Address family (e.g. , AF_INET) */ uint8_t sa_data[14]; /* Protocol- specific address information*/ } SlSockAddr_t; /* IpV6 or Ipv6 EUI64 */ typedef struct { union { uint8_t _S6_u8[16]; uint32_t _S6_u32[4]; } _S6_un; } SlIn6Addr_t; typedef struct { uint16_t sin6_family; /* AF_INET6 || AF_INET6_EUI_48*/ uint16_t sin6_port; /* Transport layer port. */ uint32_t sin6_flowinfo; /* IPv6 flow information. */ SlIn6Addr_t sin6_addr; /* IPv6 address. */ uint32_t sin6_scope_id; /* set of interfaces for a scope. */ } SlSockAddrIn6_t; /* Socket address, Internet style. */ typedef struct { uint16_t sin_family; /* Internet Protocol (AF_INET). */ uint16_t sin_port; /* Address port (16 bits). */ SlInAddr_t sin_addr; /* Internet address (32 bits). */ int8_t sin_zero[8]; /* Not used. */ } SlSockAddrIn_t; typedef struct { uint32_t ip; uint32_t gateway; uint32_t dns; } SlIpV4AcquiredAsync_t; typedef struct { uint32_t type; uint32_t ip[4]; uint32_t gateway[4]; uint32_t dns[4]; } SlIpV6AcquiredAsync_t; typedef struct { uint32_t ip_address; uint32_t lease_time; uint8_t mac[6]; uint16_t padding; } SlIpLeasedAsync_t; typedef struct { uint32_t ip_address; uint8_t mac[6]; uint16_t reason; } SlIpReleasedAsync_t; typedef union { SlIpV4AcquiredAsync_t ipAcquiredV4; /*SL_NETAPP_IPV4_IPACQUIRED_EVENT*/ SlIpV6AcquiredAsync_t ipAcquiredV6; /*SL_NETAPP_IPV6_IPACQUIRED_EVENT*/ uint32_t sd; /*SL_SOCKET_TX_FAILED_EVENT*/ SlIpLeasedAsync_t ipLeased; /* SL_NETAPP_IP_LEASED_EVENT */ SlIpReleasedAsync_t ipReleased; /* SL_NETAPP_IP_RELEASED_EVENT */ } SlNetAppEventData_u; typedef struct { uint32_t Event; SlNetAppEventData_u EventData; } SlNetAppEvent_t; typedef struct sock_secureFiles { uint8_t secureFiles[4]; } SlSockSecureFiles_t; typedef struct SlFdSet_t { /* The select socket array manager */ uint32_t fd_array[(SL_FD_SETSIZE + 31)/32]; /* Bit map of SOCKET Descriptors */ } SlFdSet_t; typedef struct { uint8_t rate; /* Recevied Rate */ uint8_t channel; /* The received channel*/ int8_t rssi; /* The computed RSSI value in db of current frame */ uint8_t padding; /* pad to align to 32 bits */ uint32_t timestamp; /* Timestamp in microseconds, */ } SlTransceiverRxOverHead_t; class cc3100_nonos; class cc3100_socket { public: cc3100_socket(cc3100_driver &driver, cc3100_nonos &nonos); ~cc3100_socket(); /*******************************************************************************/ /* Functions prototypes */ /*******************************************************************************/ void _sl_BuildAddress(const SlSockAddr_t *addr, _SocketAddrCommand_u *pCmd); void _sl_ParseAddress(_SocketAddrResponse_u *pRsp, SlSockAddr_t *addr, SlSocklen_t *addrlen); uint16_t _sl_TruncatePayloadByProtocol(const int16_t pSd,const uint16_t length); /*****************************************************************************/ /* Function prototypes */ /*****************************************************************************/ /*! \brief create an endpoint for communication The socket function creates a new socket of a certain socket type, identified by an integer number, and allocates system resources to it. This function is called by the application layer to obtain a socket handle. \param[in] domain specifies the protocol family of the created socket. For example: AF_INET for network protocol IPv4 AF_RF for starting transceiver mode. Notes: - sending and receiving any packet overriding 802.11 header - for optimized power consumption the socket will be started in TX only mode until receive command is activated AF_INET6 for IPv6 \param[in] type specifies the communication semantic, one of: SOCK_STREAM (reliable stream-oriented service or Stream Sockets) SOCK_DGRAM (datagram service or Datagram Sockets) SOCK_RAW (raw protocols atop the network layer) when used with AF_RF: SOCK_DGRAM - L2 socket SOCK_RAW - L1 socket - bypass WLAN CCA (Clear Channel Assessment) \param[in] protocol specifies a particular transport to be used with the socket. The most common are IPPROTO_TCP, IPPROTO_SCTP, IPPROTO_UDP, IPPROTO_DCCP. The value 0 may be used to select a default protocol from the selected domain and type \return On success, socket handle that is used for consequent socket operations. A successful return code should be a positive number (int16) On error, a negative (int16) value will be returned specifying the error code. SL_EAFNOSUPPORT - illegal domain parameter SL_EPROTOTYPE - illegal type parameter SL_EACCES - permission denied SL_ENSOCK - exceeded maximal number of socket SL_ENOMEM - memory allocation error SL_EINVAL - error in socket configuration SL_EPROTONOSUPPORT - illegal protocol parameter SL_EOPNOTSUPP - illegal combination of protocol and type parameters \sa sl_Close \note belongs to \ref basic_api \warning */ #if _SL_INCLUDE_FUNC(sl_Socket) int16_t sl_Socket(int16_t Domain, int16_t Type, int16_t Protocol); #endif /*! \brief gracefully close socket This function causes the system to release resources allocated to a socket. \n In case of TCP, the connection is terminated. \param[in] sd socket handle (received in sl_Socket) \return On success, zero is returned. On error, a negative number is returned. \sa sl_Socket \note belongs to \ref ext_api \warning */ #if _SL_INCLUDE_FUNC(sl_Close) int16_t sl_Close(int16_t sd); #endif /*! \brief Accept a connection on a socket This function is used with connection-based socket types (SOCK_STREAM). It extracts the first connection request on the queue of pending connections, creates a new connected socket, and returns a new file descriptor referring to that socket. The newly created socket is not in the listening state. The original socket sd is unaffected by this call. The argument sd is a socket that has been created with sl_Socket(), bound to a local address with sl_Bind(), and is listening for connections after a sl_Listen(). The argument \b \e addr is a pointer to a sockaddr structure. This structure is filled in with the address of the peer socket, as known to the communications layer. The exact format of the address returned addr is determined by the socket's address family. The \b \e addrlen argument is a value-result argument: it should initially contain the size of the structure pointed to by addr, on return it will contain the actual length (in bytes) of the address returned. \param[in] sd socket descriptor (handle) \param[out] addr the argument addr is a pointer to a sockaddr structure. This structure is filled in with the address of the peer socket, as known to the communications layer. The exact format of the address returned addr is determined by the socket's address\n sockaddr:\n - code for the address format. On this version only AF_INET is supported.\n - socket address, the length depends on the code format \param[out] addrlen the addrlen argument is a value-result argument: it should initially contain the size of the structure pointed to by addr \return On success, a socket handle. On a non-blocking accept a possible negative value is SL_EAGAIN. On failure, negative value. SL_POOL_IS_EMPTY may be return in case there are no resources in the system In this case try again later or increase MAX_CONCURRENT_ACTIONS \sa sl_Socket sl_Bind sl_Listen \note belongs to \ref server_side \warning */ #if _SL_INCLUDE_FUNC(sl_Accept) int16_t sl_Accept(int16_t sd, SlSockAddr_t *addr, SlSocklen_t *addrlen); #endif /*! \brief assign a name to a socket This function gives the socket the local address addr. addr is addrlen bytes long. Traditionally, this is called When a socket is created with socket, it exists in a name space (address family) but has no name assigned. It is necessary to assign a local address before a SOCK_STREAM socket may receive connections. \param[in] sd socket descriptor (handle) \param[in] addr specifies the destination addrs\n sockaddr:\n - code for the address format. On this version only AF_INET is supported.\n - socket address, the length depends on the code format \param[in] addrlen contains the size of the structure pointed to by addr \return On success, zero is returned. On error, a negative error code is returned. \sa sl_Socket sl_Accept sl_Listen \note belongs to \ref basic_api \warning */ #if _SL_INCLUDE_FUNC(sl_Bind) int16_t sl_Bind(int16_t sd, const SlSockAddr_t *addr, int16_t addrlen); #endif /*! \brief listen for connections on a socket The willingness to accept incoming connections and a queue limit for incoming connections are specified with listen(), and then the connections are accepted with accept. The listen() call applies only to sockets of type SOCK_STREAM The backlog parameter defines the maximum length the queue of pending connections may grow to. \param[in] sd socket descriptor (handle) \param[in] backlog specifies the listen queue depth. \return On success, zero is returned. On error, a negative error code is returned. \sa sl_Socket sl_Accept sl_Bind \note belongs to \ref server_side \warning */ #if _SL_INCLUDE_FUNC(sl_Listen) int16_t sl_Listen(int16_t sd, int16_t backlog); #endif /*! \brief Initiate a connection on a socket Function connects the socket referred to by the socket descriptor sd, to the address specified by addr. The addrlen argument specifies the size of addr. The format of the address in addr is determined by the address space of the socket. If it is of type SOCK_DGRAM, this call specifies the peer with which the socket is to be associated; this address is that to which datagrams are to be sent, and the only address from which datagrams are to be received. If the socket is of type SOCK_STREAM, this call attempts to make a connection to another socket. The other socket is specified by address, which is an address in the communications space of the socket. \param[in] sd socket descriptor (handle) \param[in] addr specifies the destination addr\n sockaddr:\n - code for the address format. On this version only AF_INET is supported.\n - socket address, the length depends on the code format \param[in] addrlen contains the size of the structure pointed to by addr \return On success, a socket handle. On a non-blocking connect a possible negative value is SL_EALREADY. On failure, negative value. SL_POOL_IS_EMPTY may be return in case there are no resources in the system In this case try again later or increase MAX_CONCURRENT_ACTIONS \sa sl_Socket \note belongs to \ref client_side \warning */ #if _SL_INCLUDE_FUNC(sl_Connect) int16_t sl_Connect(int16_t sd, const SlSockAddr_t *addr, int16_t addrlen); #endif /*! \brief Monitor socket activity Select allow a program to monitor multiple file descriptors, waiting until one or more of the file descriptors become "ready" for some class of I/O operation \param[in] nfds the highest-numbered file descriptor in any of the three sets, plus 1. \param[out] readsds socket descriptors list for read monitoring and accept monitoring \param[out] writesds socket descriptors list for connect monitoring only, write monitoring is not supported, non blocking connect is supported \param[out] exceptsds socket descriptors list for exception monitoring, not supported. \param[in] timeout is an upper bound on the amount of time elapsed before select() returns. Null or above 0xffff seconds means infinity timeout. The minimum timeout is 10 milliseconds, less than 10 milliseconds will be set automatically to 10 milliseconds. Max microseconds supported is 0xfffc00. \return On success, select() returns the number of file descriptors contained in the three returned descriptor sets (that is, the total number of bits that are set in readfds, writefds, exceptfds) which may be zero if the timeout expires before anything interesting happens. On error, a negative value is returned. readsds - return the sockets on which Read request will return without delay with valid data. writesds - return the sockets on which Write request will return without delay. exceptsds - return the sockets closed recently. SL_POOL_IS_EMPTY may be return in case there are no resources in the system In this case try again later or increase MAX_CONCURRENT_ACTIONS \sa sl_Socket \note If the timeout value set to less than 5ms it will automatically set to 5ms to prevent overload of the system belongs to \ref basic_api Only one sl_Select can be handled at a time. Calling this API while the same command is called from another thread, may result in one of the two scenarios: 1. The command will wait (internal) until the previous command finish, and then be executed. 2. There are not enough resources and SL_POOL_IS_EMPTY error will return. In this case, MAX_CONCURRENT_ACTIONS can be increased (result in memory increase) or try again later to issue the command. \warning */ #if _SL_INCLUDE_FUNC(sl_Select) int16_t sl_Select(int16_t nfds, SlFdSet_t *readsds, SlFdSet_t *writesds, SlFdSet_t *exceptsds, SlTimeval_t *timeout); /*! \brief Select's SlFdSet_t SET function Sets current socket descriptor on SlFdSet_t container */ void SL_FD_SET(int16_t fd, SlFdSet_t *fdset); /*! \brief Select's SlFdSet_t CLR function Clears current socket descriptor on SlFdSet_t container */ void SL_FD_CLR(int16_t fd, SlFdSet_t *fdset); /*! \brief Select's SlFdSet_t ISSET function Checks if current socket descriptor is set (TRUE/FALSE) \return Returns TRUE if set, FALSE if unset */ int16_t SL_FD_ISSET(int16_t fd, SlFdSet_t *fdset); /*! \brief Select's SlFdSet_t ZERO function Clears all socket descriptors from SlFdSet_t */ void SL_FD_ZERO(SlFdSet_t *fdset); #endif /*! \brief set socket options This function manipulate the options associated with a socket. Options may exist at multiple protocol levels; they are always present at the uppermost socket level. When manipulating socket options the level at which the option resides and the name of the option must be specified. To manipulate options at the socket level, level is specified as SOL_SOCKET. To manipulate options at any other level the protocol number of the appropriate proto- col controlling the option is supplied. For example, to indicate that an option is to be interpreted by the TCP protocol, level should be set to the protocol number of TCP; The parameters optval and optlen are used to access optval - ues for setsockopt(). For getsockopt() they identify a buffer in which the value for the requested option(s) are to be returned. For getsockopt(), optlen is a value-result parameter, initially containing the size of the buffer pointed to by option_value, and modified on return to indicate the actual size of the value returned. If no option value is to be supplied or returned, option_value may be NULL. \param[in] sd socket handle \param[in] level defines the protocol level for this option - <b>SL_SOL_SOCKET</b> Socket level configurations (L4, transport layer) - <b>SL_IPPROTO_IP</b> IP level configurations (L3, network layer) - <b>SL_SOL_PHY_OPT</b> Link level configurations (L2, link layer) \param[in] optname defines the option name to interrogate - <b>SL_SOL_SOCKET</b> - <b>SL_SO_KEEPALIVE</b> \n Enable/Disable periodic keep alive. Keeps TCP connections active by enabling the periodic transmission of messages \n Timeout is 5 minutes.\n Default: Enabled \n This options takes SlSockKeepalive_t struct as parameter - <b>SL_SO_RCVTIMEO</b> \n Sets the timeout value that specifies the maximum amount of time an input function waits until it completes. \n Default: No timeout \n This options takes SlTimeval_t struct as parameter - <b>SL_SO_RCVBUF</b> \n Sets tcp max recv window size. \n This options takes SlSockWinsize_t struct as parameter - <b>SL_SO_NONBLOCKING</b> \n Sets socket to non-blocking operation Impacts: connect, accept, send, sendto, recv and recvfrom. \n Default: Blocking. This options takes SlSockNonblocking_t struct as parameter - <b>SL_SO_SECMETHOD</b> \n Sets method to tcp secured socket (SL_SEC_SOCKET) \n Default: SL_SO_SEC_METHOD_SSLv3_TLSV1_2 \n This options takes SlSockSecureMethod struct as parameter - <b>SL_SO_SEC_MASK</b> \n Sets specific cipher to tcp secured socket (SL_SEC_SOCKET) \n Default: "Best" cipher suitable to method \n This options takes SlSockSecureMask struct as parameter - <b>SL_SO_SECURE_FILES_CA_FILE_NAME</b> \n Map secured socket to CA file by name \n This options takes <b>uint8_t</b> buffer as parameter - <b>SL_SO_SECURE_FILES_PRIVATE_KEY_FILE_NAME</b> \n Map secured socket to private key by name \n This options takes <b>uint8_t</b> buffer as parameter - <b>SL_SO_SECURE_FILES_CERTIFICATE_FILE_NAME</b> \n Map secured socket to certificate file by name \n This options takes <b>uint8_t</b> buffer as parameter - <b>SL_SO_SECURE_FILES_DH_KEY_FILE_NAME</b> \n Map secured socket to Diffie Hellman file by name \n This options takes <b>uint8_t</b> buffer as parameter - <b>SL_SO_CHANGE_CHANNEL</b> \n Sets channel in transceiver mode. This options takes <b>uint32_t</b> as channel number parameter - <b>SL_IPPROTO_IP</b> - <b>SL_IP_MULTICAST_TTL</b> \n Set the time-to-live value of outgoing multicast packets for this socket. \n This options takes <b>uint8_t</b> as parameter - <b>SL_IP_ADD_MEMBERSHIP</b> \n UDP socket, Join a multicast group. \n This options takes SlSockIpMreq struct as parameter - <b>SL_IP_DROP_MEMBERSHIP</b> \n UDP socket, Leave a multicast group \n This options takes SlSockIpMreq struct as parameter - <b>SL_IP_RAW_RX_NO_HEADER</b> \n Raw socket remove IP header from received data. \n Default: data includes ip header \n This options takes <b>uint32_t</b> as parameter - <b>SL_IP_HDRINCL</b> \n RAW socket only, the IPv4 layer generates an IP header when sending a packet unless \n the IP_HDRINCL socket option is enabled on the socket. \n When it is enabled, the packet must contain an IP header. \n Default: disabled, IPv4 header generated by Network Stack \n This options takes <b>uint32_t</b> as parameter - <b>SL_IP_RAW_IPV6_HDRINCL</b> (inactive) \n RAW socket only, the IPv6 layer generates an IP header when sending a packet unless \n the IP_HDRINCL socket option is enabled on the socket. When it is enabled, the packet must contain an IP header \n Default: disabled, IPv4 header generated by Network Stack \n This options takes <b>uint32_t</b> as parameter - <b>SL_SOL_PHY_OPT</b> - <b>SL_SO_PHY_RATE</b> \n RAW socket, set WLAN PHY transmit rate \n The values are based on RateIndex_e \n This options takes <b>uint32_t</b> as parameter - <b>SL_SO_PHY_TX_POWER</b> \n RAW socket, set WLAN PHY TX power \n Valid rage is 1-15 \n This options takes <b>uint32_t</b> as parameter - <b>SL_SO_PHY_NUM_FRAMES_TO_TX</b> \n RAW socket, set number of frames to transmit in transceiver mode. Default: 1 packet This options takes <b>uint32_t</b> as parameter - <b>SL_SO_PHY_PREAMBLE</b> \n RAW socket, set WLAN PHY preamble for Long/Short\n This options takes <b>uint32_t</b> as parameter \param[in] optval specifies a value for the option \param[in] optlen specifies the length of the option value \return On success, zero is returned. On error, a negative value is returned. \sa sl_getsockopt \note belongs to \ref basic_api \warning \par Examples: \par <b> SL_SO_KEEPALIVE: </b>(disable Keepalive) \code SlSockKeepalive_t enableOption; enableOption.KeepaliveEnabled = 0; sl_SetSockOpt(SockID,SL_SOL_SOCKET,SL_SO_KEEPALIVE, (uint8_t *)&enableOption,sizeof(enableOption)); \endcode \par <b> SL_SO_RCVTIMEO: </b> \code struct SlTimeval_t timeVal; timeVal.tv_sec = 1; // Seconds timeVal.tv_usec = 0; // Microseconds. 10000 microseconds resolution sl_SetSockOpt(SockID,SL_SOL_SOCKET,SL_SO_RCVTIMEO, (uint8_t *)&timeVal, sizeof(timeVal)); // Enable receive timeout \endcode \par <b> SL_SO_RCVBUF: </b> \code SlSockWinsize_t size; size.Winsize = 3000; // bytes sl_SetSockOpt(SockID,SL_SOL_SOCKET,SL_SO_RCVBUF, (uint8_t *)&size, sizeof(size)); \endcode \par <b> SL_SO_NONBLOCKING: </b> \code SlSockNonblocking_t enableOption; enableOption.NonblockingEnabled = 1; sl_SetSockOpt(SockID,SL_SOL_SOCKET,SL_SO_NONBLOCKING, (uint8_t *)&enableOption,sizeof(enableOption)); // Enable/disable nonblocking mode \endcode \par <b> SL_SO_SECMETHOD:</b> \code SlSockSecureMethod method; method.secureMethod = SL_SO_SEC_METHOD_SSLV3; // security method we want to use SockID = sl_Socket(SL_AF_INET,SL_SOCK_STREAM, SL_SEC_SOCKET); sl_SetSockOpt(SockID, SL_SOL_SOCKET, SL_SO_SECMETHOD, (uint8_t *)&method, sizeof(method)); \endcode \par <b> SL_SO_SECURE_MASK:</b> \code SlSockSecureMask cipher; cipher.secureMask = SL_SEC_MASK_SSL_RSA_WITH_RC4_128_SHA; // cipher type SockID = sl_Socket(SL_AF_INET,SL_SOCK_STREAM, SL_SEC_SOCKET); sl_SetSockOpt(SockID, SL_SOL_SOCKET, SL_SO_SEC_MASK,(uint8_t *)&cipher, sizeof(cipher)); \endcode \par <b> SL_SO_SECURE_FILES_CA_FILE_NAME:</b> \code sl_SetSockOpt(SockID,SL_SOL_SOCKET,SL_SO_SECURE_FILES_CA_FILE_NAME,"exuifaxCaCert.der",strlen("exuifaxCaCert.der")); \endcode \par <b> SL_SO_SECURE_FILES_PRIVATE_KEY_FILE_NAME:</b> \code sl_SetSockOpt(SockID,SL_SOL_SOCKET,SL_SO_SECURE_FILES_PRIVATE_KEY_FILE_NAME,"myPrivateKey.der",strlen("myPrivateKey.der")); \endcode \par <b> SL_SO_SECURE_FILES_CERTIFICATE_FILE_NAME:</b> \code sl_SetSockOpt(SockID,SL_SOL_SOCKET,SL_SO_SECURE_FILES_CERTIFICATE_FILE_NAME,"myCertificate.der",strlen("myCertificate.der")); \endcode \par <b> SL_SO_SECURE_FILES_DH_KEY_FILE_NAME:</b> \code sl_SetSockOpt(SockID,SL_SOL_SOCKET,SL_SO_SECURE_FILES_DH_KEY_FILE_NAME,"myDHinServerMode.der",strlen("myDHinServerMode.der")); \endcode \par <b> SL_IP_MULTICAST_TTL:</b> \code uint8_t ttl = 20; sl_SetSockOpt(SockID, SL_IPPROTO_IP, SL_IP_MULTICAST_TTL, &ttl, sizeof(ttl)); \endcode \par <b> SL_IP_ADD_MEMBERSHIP:</b> \code SlSockIpMreq mreq; sl_SetSockOpt(SockID, SL_IPPROTO_IP, SL_IP_ADD_MEMBERSHIP, &mreq, sizeof(mreq)); \endcode \par <b> SL_IP_DROP_MEMBERSHIP:</b> \code SlSockIpMreq mreq; sl_SetSockOpt(SockID, SL_IPPROTO_IP, SL_IP_DROP_MEMBERSHIP, &mreq, sizeof(mreq)); \endcode \par <b> SL_SO_CHANGE_CHANNEL:</b> \code uint32_t newChannel = 6; // range is 1-13 sl_SetSockOpt(SockID, SL_SOL_SOCKET, SL_SO_CHANGE_CHANNEL, &newChannel, sizeof(newChannel)); \endcode \par <b> SL_IP_RAW_RX_NO_HEADER:</b> \code uint32_t header = 1; // remove ip header sl_SetSockOpt(SockID, SL_IPPROTO_IP, SL_IP_RAW_RX_NO_HEADER, &header, sizeof(header)); \endcode \par <b> SL_IP_HDRINCL:</b> \code uint32_t header = 1; sl_SetSockOpt(SockID, SL_IPPROTO_IP, SL_IP_HDRINCL, &header, sizeof(header)); \endcode \par <b> SL_IP_RAW_IPV6_HDRINCL:</b> \code uint32_t header = 1; sl_SetSockOpt(SockID, SL_IPPROTO_IP, SL_IP_RAW_IPV6_HDRINCL, &header, sizeof(header)); \endcode \par <b> SL_SO_PHY_RATE:</b> \code uint32_t rate = 6; // see wlan.h RateIndex_e for values sl_SetSockOpt(SockID, SL_SOL_PHY_OPT, SL_SO_PHY_RATE, &rate, sizeof(rate)); \endcode \par <b> SL_SO_PHY_TX_POWER:</b> \code uint32_t txpower = 1; // valid range is 1-15 sl_SetSockOpt(SockID, SL_SOL_PHY_OPT, SL_SO_PHY_TX_POWER, &txpower, sizeof(txpower)); \endcode \par <b> SL_SO_PHY_NUM_FRAMES_TO_TX:</b> \code uint32_t numframes = 1; sl_SetSockOpt(SockID, SL_SOL_PHY_OPT, SL_SO_PHY_NUM_FRAMES_TO_TX, &numframes, sizeof(numframes)); \endcode \par <b> SL_SO_PHY_PREAMBLE:</b> \code uint32_t preamble = 1; sl_SetSockOpt(SockID, SL_SOL_PHY_OPT, SL_SO_PHY_PREAMBLE, &preamble, sizeof(preamble)); \endcode */ #if _SL_INCLUDE_FUNC(sl_SetSockOpt) int16_t sl_SetSockOpt(int16_t sd, int16_t level, int16_t optname, const void *optval, SlSocklen_t optlen); #endif /*! \brief Get socket options This function manipulate the options associated with a socket. Options may exist at multiple protocol levels; they are always present at the uppermost socket level. When manipulating socket options the level at which the option resides and the name of the option must be specified. To manipulate options at the socket level, level is specified as SOL_SOCKET. To manipulate options at any other level the protocol number of the appropriate proto- col controlling the option is supplied. For example, to indicate that an option is to be interpreted by the TCP protocol, level should be set to the protocol number of TCP; The parameters optval and optlen are used to access optval - ues for setsockopt(). For getsockopt() they identify a buffer in which the value for the requested option(s) are to be returned. For getsockopt(), optlen is a value-result parameter, initially containing the size of the buffer pointed to by option_value, and modified on return to indicate the actual size of the value returned. If no option value is to be supplied or returned, option_value may be NULL. \param[in] sd socket handle \param[in] level defines the protocol level for this option \param[in] optname defines the option name to interrogate \param[out] optval specifies a value for the option \param[out] optlen specifies the length of the option value \return On success, zero is returned. On error, a negative value is returned. \sa sl_SetSockOpt \note See sl_SetSockOpt belongs to \ref ext_api \warning */ #if _SL_INCLUDE_FUNC(sl_GetSockOpt) int16_t sl_GetSockOpt(int16_t sd, int16_t level, int16_t optname, void *optval, SlSocklen_t *optlen); #endif /*! \brief read data from TCP socket function receives a message from a connection-mode socket \param[in] sd socket handle \param[out] buf Points to the buffer where the message should be stored. \param[in] Len Specifies the length in bytes of the buffer pointed to by the buffer argument. Range: 1-16000 bytes \param[in] flags Specifies the type of message reception. On this version, this parameter is not supported. \return return the number of bytes received, or a negative value if an error occurred. using a non-blocking recv a possible negative value is SL_EAGAIN. SL_POOL_IS_EMPTY may be return in case there are no resources in the system In this case try again later or increase MAX_CONCURRENT_ACTIONS \sa sl_RecvFrom \note belongs to \ref recv_api \warning \par Examples: \code An example of receiving data using TCP socket: SlSockAddrIn_t Addr; SlSockAddrIn_t LocalAddr; int16_t AddrSize = sizeof(SlSockAddrIn_t); int16_t SockID, newSockID; int16_t Status; int8_t Buf[RECV_BUF_LEN]; LocalAddr.sin_family = SL_AF_INET; LocalAddr.sin_port = sl_Htons(5001); LocalAddr.sin_addr.s_addr = 0; Addr.sin_family = SL_AF_INET; Addr.sin_port = sl_Htons(5001); Addr.sin_addr.s_addr = sl_Htonl(SL_IPV4_VAL(10,1,1,200)); SockID = sl_Socket(SL_AF_INET,SL_SOCK_STREAM, 0); Status = sl_Bind(SockID, (SlSockAddr_t *)&LocalAddr, AddrSize); Status = sl_Listen(SockID, 0); newSockID = sl_Accept(SockID, (SlSockAddr_t*)&Addr, (SlSocklen_t*) &AddrSize); Status = sl_Recv(newSockID, Buf, 1460, 0); \endcode \code Example code for Rx transceiver mode using a raw socket int8_t buffer[1536]; int16_t sd; uint16_t size; SlTransceiverRxOverHead_t *transHeader; sd = sl_Socket(SL_AF_RF,SL_SOCK_RAW,11); // channel 11 while(1) { size = sl_Recv(sd,buffer,1536,0); transHeader = (SlTransceiverRxOverHead_t *)buffer; printf("RSSI is %d frame type is 0x%x size %d\n",transHeader->rssi,buffer[sizeof(SlTransceiverRxOverHead_t)],size); } \endcode */ #if _SL_INCLUDE_FUNC(sl_Recv) int16_t sl_Recv(int16_t sd, void *buf, int16_t Len, int16_t flags); #endif /*! \brief read data from socket function receives a message from a connection-mode or connectionless-mode socket \param[in] sd socket handle \param[out] buf Points to the buffer where the message should be stored. \param[in] Len Specifies the length in bytes of the buffer pointed to by the buffer argument. Range: 1-16000 bytes \param[in] flags Specifies the type of message reception. On this version, this parameter is not supported. \param[in] from pointer to an address structure indicating the source address.\n sockaddr:\n - code for the address format. On this version only AF_INET is supported.\n - socket address, the length depends on the code format \param[in] fromlen source address structure size. This parameter MUST be set to the size of the structure pointed to by addr. \return return the number of bytes received, or a negative value if an error occurred. using a non-blocking recv a possible negative value is SL_EAGAIN. SL_RET_CODE_INVALID_INPUT (-2) will be returned if fromlen has incorrect length. SL_POOL_IS_EMPTY may be return in case there are no resources in the system In this case try again later or increase MAX_CONCURRENT_ACTIONS \sa sl_Recv \note belongs to \ref recv_api \warning \par Example: \code An example of receiving data: SlSockAddrIn_t Addr; SlSockAddrIn_t LocalAddr; int16_t AddrSize = sizeof(SlSockAddrIn_t); int16_t SockID; int16_t Status; int8_t Buf[RECV_BUF_LEN]; LocalAddr.sin_family = SL_AF_INET; LocalAddr.sin_port = sl_Htons(5001); LocalAddr.sin_addr.s_addr = 0; SockID = sl_Socket(SL_AF_INET,SL_SOCK_DGRAM, 0); Status = sl_Bind(SockID, (SlSockAddr_t *)&LocalAddr, AddrSize); Status = sl_RecvFrom(SockID, Buf, 1472, 0, (SlSockAddr_t *)&Addr, (SlSocklen_t*)&AddrSize); \endcode */ #if _SL_INCLUDE_FUNC(sl_RecvFrom) int16_t sl_RecvFrom(int16_t sd, void *buf, int16_t Len, int16_t flags, SlSockAddr_t *from, SlSocklen_t *fromlen); #endif /*! \brief write data to TCP socket This function is used to transmit a message to another socket. Returns immediately after sending data to device. In case of TCP failure an async event SL_SOCKET_TX_FAILED_EVENT is going to be received. In case of a RAW socket (transceiver mode), extra 4 bytes should be reserved at the end of the frame data buffer for WLAN FCS \param[in] sd socket handle \param[in] buf Points to a buffer containing the message to be sent \param[in] Len message size in bytes. Range: 1-1460 bytes \param[in] flags Specifies the type of message transmission. On this version, this parameter is not supported for TCP. For transceiver mode, the SL_RAW_RF_TX_PARAMS macro can be used to determine transmission parameters (channel,rate,tx_power,preamble) \return Return the number of bytes transmitted, or -1 if an error occurred \sa sl_SendTo \note belongs to \ref send_api \warning \par Example: \code An example of sending data: SlSockAddrIn_t Addr; int16_t AddrSize = sizeof(SlSockAddrIn_t); int16_t SockID; int16_t Status; int8_t Buf[SEND_BUF_LEN]; Addr.sin_family = SL_AF_INET; Addr.sin_port = sl_Htons(5001); Addr.sin_addr.s_addr = sl_Htonl(SL_IPV4_VAL(10,1,1,200)); SockID = sl_Socket(SL_AF_INET,SL_SOCK_STREAM, 0); Status = sl_Connect(SockID, (SlSockAddr_t *)&Addr, AddrSize); Status = sl_Send(SockID, Buf, 1460, 0 ); \endcode */ #if _SL_INCLUDE_FUNC(sl_Send ) int16_t sl_Send(int16_t sd, const void *buf, int16_t Len, int16_t flags); #endif /*! \brief write data to socket This function is used to transmit a message to another socket (connection less socket SOCK_DGRAM, SOCK_RAW). Returns immediately after sending data to device. In case of transmission failure an async event SL_SOCKET_TX_FAILED_EVENT is going to be received. \param[in] sd socket handle \param[in] buf Points to a buffer containing the message to be sent \param[in] Len message size in bytes. Range: 1-1460 bytes \param[in] flags Specifies the type of message transmission. On this version, this parameter is not supported \param[in] to pointer to an address structure indicating the destination address.\n sockaddr:\n - code for the address format. On this version only AF_INET is supported.\n - socket address, the length depends on the code format \param[in] tolen destination address structure size \return Return the number of transmitted bytes, or -1 if an error occurred \sa sl_Send \note belongs to \ref send_api \warning \par Example: \code An example of sending data: SlSockAddrIn_t Addr; int16_t AddrSize = sizeof(SlSockAddrIn_t); int16_t SockID; int16_t Status; int8_t Buf[SEND_BUF_LEN]; Addr.sin_family = SL_AF_INET; Addr.sin_port = sl_Htons(5001); Addr.sin_addr.s_addr = sl_Htonl(SL_IPV4_VAL(10,1,1,200)); SockID = sl_Socket(SL_AF_INET,SL_SOCK_DGRAM, 0); Status = sl_SendTo(SockID, Buf, 1472, 0, (SlSockAddr_t *)&Addr, AddrSize); \endcode */ #if _SL_INCLUDE_FUNC(sl_SendTo) int16_t sl_SendTo(int16_t sd, const void *buf, int16_t Len, int16_t flags, const SlSockAddr_t *to, SlSocklen_t tolen); #endif /*! \brief Reorder the bytes of a 32-bit unsigned value This function is used to Reorder the bytes of a 32-bit unsigned value from processor order to network order. \param[in] var variable to reorder \return Return the reorder variable, \sa sl_SendTo sl_Bind sl_Connect sl_RecvFrom sl_Accept \note belongs to \ref send_api \warning */ #if _SL_INCLUDE_FUNC(sl_Htonl ) uint32_t sl_Htonl( uint32_t val ); #define sl_Ntohl sl_Htonl /* Reorder the bytes of a 16-bit unsigned value from network order to processor orde. */ #endif /*! \brief Reorder the bytes of a 16-bit unsigned value This function is used to Reorder the bytes of a 16-bit unsigned value from processor order to network order. \param[in] var variable to reorder \return Return the reorder variable, \sa sl_SendTo sl_Bind sl_Connect sl_RecvFrom sl_Accept \note belongs to \ref send_api \warning */ #if _SL_INCLUDE_FUNC(sl_Htons ) uint16_t sl_Htons( uint16_t val ); #define sl_Ntohs sl_Htons /* Reorder the bytes of a 16-bit unsigned value from network order to processor orde. */ #endif private: cc3100_driver &_driver; cc3100_nonos &_nonos; };//class }//namespace mbed_cc3100 /*! Close the Doxygen group. @} */ #endif /* __SOCKET_H__ */