test

Dependents:   mbed-os-example-blinky-1stDevDemo

Committer:
karen801
Date:
Wed May 23 14:37:10 2018 +0000
Revision:
0:79ce2b184a43
Initial commit

Who changed what in which revision?

UserRevisionLine numberNew contents of line
karen801 0:79ce2b184a43 1 /* SPWFSA01 Device
karen801 0:79ce2b184a43 2 * Copyright (c) 2015 ARM Limited
karen801 0:79ce2b184a43 3 *
karen801 0:79ce2b184a43 4 * Licensed under the Apache License, Version 2.0 (the "License");
karen801 0:79ce2b184a43 5 * you may not use this file except in compliance with the License.
karen801 0:79ce2b184a43 6 * You may obtain a copy of the License at
karen801 0:79ce2b184a43 7 *
karen801 0:79ce2b184a43 8 * http://www.apache.org/licenses/LICENSE-2.0
karen801 0:79ce2b184a43 9 *
karen801 0:79ce2b184a43 10 * Unless required by applicable law or agreed to in writing, software
karen801 0:79ce2b184a43 11 * distributed under the License is distributed on an "AS IS" BASIS,
karen801 0:79ce2b184a43 12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
karen801 0:79ce2b184a43 13 * See the License for the specific language governing permissions and
karen801 0:79ce2b184a43 14 * limitations under the License.
karen801 0:79ce2b184a43 15 */
karen801 0:79ce2b184a43 16
karen801 0:79ce2b184a43 17 #include "SPWFSA01.h"
karen801 0:79ce2b184a43 18 #include "SpwfSAInterface.h"
karen801 0:79ce2b184a43 19 #include "mbed_debug.h"
karen801 0:79ce2b184a43 20
karen801 0:79ce2b184a43 21 #if MBED_CONF_IDW0XX1_EXPANSION_BOARD == IDW01M1
karen801 0:79ce2b184a43 22
karen801 0:79ce2b184a43 23 SPWFSA01::SPWFSA01(PinName tx, PinName rx,
karen801 0:79ce2b184a43 24 PinName rts, PinName cts,
karen801 0:79ce2b184a43 25 SpwfSAInterface &ifce, bool debug,
karen801 0:79ce2b184a43 26 PinName wakeup, PinName reset)
karen801 0:79ce2b184a43 27 : SPWFSAxx(tx, rx, rts, cts, ifce, debug, wakeup, reset) {
karen801 0:79ce2b184a43 28 }
karen801 0:79ce2b184a43 29
karen801 0:79ce2b184a43 30 bool SPWFSA01::open(const char *type, int* spwf_id, const char* addr, int port)
karen801 0:79ce2b184a43 31 {
karen801 0:79ce2b184a43 32 int socket_id;
karen801 0:79ce2b184a43 33 int value;
karen801 0:79ce2b184a43 34 int trials;
karen801 0:79ce2b184a43 35
karen801 0:79ce2b184a43 36 if(!_parser.send("AT+S.SOCKON=%s,%d,%s,ind", addr, port, type))
karen801 0:79ce2b184a43 37 {
karen801 0:79ce2b184a43 38 debug_if(_dbg_on, "\r\nSPWF> `SPWFSA01::open`: error opening socket (%d)\r\n", __LINE__);
karen801 0:79ce2b184a43 39 return false;
karen801 0:79ce2b184a43 40 }
karen801 0:79ce2b184a43 41
karen801 0:79ce2b184a43 42 /* handle both response possibilities here before returning
karen801 0:79ce2b184a43 43 * otherwise module seems to remain in inconsistent state.
karen801 0:79ce2b184a43 44 */
karen801 0:79ce2b184a43 45
karen801 0:79ce2b184a43 46 /* wait for first character */
karen801 0:79ce2b184a43 47 trials = 0;
karen801 0:79ce2b184a43 48 while((value = _parser.getc()) < 0) {
karen801 0:79ce2b184a43 49 if(trials++ > SPWFXX_MAX_TRIALS) {
karen801 0:79ce2b184a43 50 debug("\r\nSPWF> error opening socket (%d)\r\n", __LINE__);
karen801 0:79ce2b184a43 51 empty_rx_buffer();
karen801 0:79ce2b184a43 52 return false;
karen801 0:79ce2b184a43 53 }
karen801 0:79ce2b184a43 54 }
karen801 0:79ce2b184a43 55
karen801 0:79ce2b184a43 56 if(value != _cr_) { // Note: this is different to what the spec exactly says
karen801 0:79ce2b184a43 57 debug_if(_dbg_on, "\r\nSPWF> error opening socket (%d)\r\n", __LINE__);
karen801 0:79ce2b184a43 58 empty_rx_buffer();
karen801 0:79ce2b184a43 59 return false;
karen801 0:79ce2b184a43 60 }
karen801 0:79ce2b184a43 61
karen801 0:79ce2b184a43 62 if(!_recv_delim_lf()) { // Note: this is different to what the spec exactly says
karen801 0:79ce2b184a43 63 debug_if(_dbg_on, "\r\nSPWF> error opening socket (%d)\r\n", __LINE__);
karen801 0:79ce2b184a43 64 empty_rx_buffer();
karen801 0:79ce2b184a43 65 return false;
karen801 0:79ce2b184a43 66 }
karen801 0:79ce2b184a43 67
karen801 0:79ce2b184a43 68 value = _parser.getc();
karen801 0:79ce2b184a43 69 switch(value) {
karen801 0:79ce2b184a43 70 case ' ':
karen801 0:79ce2b184a43 71 if(_parser.recv("ID: %d\n", &socket_id)
karen801 0:79ce2b184a43 72 && _recv_ok()) {
karen801 0:79ce2b184a43 73 debug_if(_dbg_on, "AT^ ID: %d\r\n", socket_id);
karen801 0:79ce2b184a43 74
karen801 0:79ce2b184a43 75 *spwf_id = socket_id;
karen801 0:79ce2b184a43 76 return true;
karen801 0:79ce2b184a43 77 } else {
karen801 0:79ce2b184a43 78 empty_rx_buffer();
karen801 0:79ce2b184a43 79 }
karen801 0:79ce2b184a43 80 break;
karen801 0:79ce2b184a43 81 case 'E':
karen801 0:79ce2b184a43 82 if(_parser.recv("RROR: %255[^\n]\n", _msg_buffer) && _recv_delim_lf()) {
karen801 0:79ce2b184a43 83 debug_if(_dbg_on, "AT^ ERROR: %s (%d)\r\n", _msg_buffer, __LINE__);
karen801 0:79ce2b184a43 84 } else {
karen801 0:79ce2b184a43 85 debug_if(_dbg_on, "\r\nSPWF> error opening socket (%d)\r\n", __LINE__);
karen801 0:79ce2b184a43 86 empty_rx_buffer();
karen801 0:79ce2b184a43 87 }
karen801 0:79ce2b184a43 88 break;
karen801 0:79ce2b184a43 89 default:
karen801 0:79ce2b184a43 90 debug_if(_dbg_on, "\r\nSPWF> error opening socket (value=%d, %d)\r\n", value, __LINE__);
karen801 0:79ce2b184a43 91 break;
karen801 0:79ce2b184a43 92 }
karen801 0:79ce2b184a43 93
karen801 0:79ce2b184a43 94 return false;
karen801 0:79ce2b184a43 95 }
karen801 0:79ce2b184a43 96
karen801 0:79ce2b184a43 97 int SPWFSA01::_read_in(char* buffer, int spwf_id, uint32_t amount) {
karen801 0:79ce2b184a43 98 int ret = -1;
karen801 0:79ce2b184a43 99
karen801 0:79ce2b184a43 100 MBED_ASSERT(buffer != NULL);
karen801 0:79ce2b184a43 101
karen801 0:79ce2b184a43 102 /* block asynchronous indications */
karen801 0:79ce2b184a43 103 if(!_winds_off()) {
karen801 0:79ce2b184a43 104 return -1;
karen801 0:79ce2b184a43 105 }
karen801 0:79ce2b184a43 106
karen801 0:79ce2b184a43 107 /* read in data */
karen801 0:79ce2b184a43 108 if(_parser.send("AT+S.SOCKR=%d,%u", spwf_id, (unsigned int)amount)) {
karen801 0:79ce2b184a43 109 /* set high timeout */
karen801 0:79ce2b184a43 110 _parser.set_timeout(SPWF_READ_BIN_TIMEOUT);
karen801 0:79ce2b184a43 111 /* read in binary data */
karen801 0:79ce2b184a43 112 int read = _parser.read(buffer, amount);
karen801 0:79ce2b184a43 113 /* reset timeout value */
karen801 0:79ce2b184a43 114 _parser.set_timeout(_timeout);
karen801 0:79ce2b184a43 115 if(read > 0) {
karen801 0:79ce2b184a43 116 if(_recv_ok()) {
karen801 0:79ce2b184a43 117 ret = amount;
karen801 0:79ce2b184a43 118
karen801 0:79ce2b184a43 119 /* remove from pending sizes
karen801 0:79ce2b184a43 120 * (MUST be done before next async indications handling (e.g. `_winds_on()`)) */
karen801 0:79ce2b184a43 121 _remove_pending_pkt_size(spwf_id, amount);
karen801 0:79ce2b184a43 122 } else {
karen801 0:79ce2b184a43 123 debug_if(_dbg_on, "\r\nSPWF> failed to receive OK (%s, %d)\r\n", __func__, __LINE__);
karen801 0:79ce2b184a43 124 empty_rx_buffer();
karen801 0:79ce2b184a43 125 }
karen801 0:79ce2b184a43 126 } else {
karen801 0:79ce2b184a43 127 debug_if(_dbg_on, "\r\nSPWF> failed to read binary data (%u:%d), (%s, %d)\r\n", amount, read, __func__, __LINE__);
karen801 0:79ce2b184a43 128 empty_rx_buffer();
karen801 0:79ce2b184a43 129 }
karen801 0:79ce2b184a43 130 } else {
karen801 0:79ce2b184a43 131 debug_if(_dbg_on, "\r\nSPWF> failed to send SOCKR (%s, %d)\r\n", __func__, __LINE__);
karen801 0:79ce2b184a43 132 }
karen801 0:79ce2b184a43 133
karen801 0:79ce2b184a43 134 debug_if(_dbg_on, "\r\nSPWF> %s():\t%d:%d\r\n", __func__, spwf_id, amount);
karen801 0:79ce2b184a43 135
karen801 0:79ce2b184a43 136 /* unblock asynchronous indications */
karen801 0:79ce2b184a43 137 _winds_on();
karen801 0:79ce2b184a43 138
karen801 0:79ce2b184a43 139 return ret;
karen801 0:79ce2b184a43 140 }
karen801 0:79ce2b184a43 141
karen801 0:79ce2b184a43 142 /* betzw - TODO: improve performance! */
karen801 0:79ce2b184a43 143 bool SPWFSA01::_recv_ap(nsapi_wifi_ap_t *ap)
karen801 0:79ce2b184a43 144 {
karen801 0:79ce2b184a43 145 bool ret;
karen801 0:79ce2b184a43 146 unsigned int channel;
karen801 0:79ce2b184a43 147 int trials;
karen801 0:79ce2b184a43 148
karen801 0:79ce2b184a43 149 ap->security = NSAPI_SECURITY_UNKNOWN;
karen801 0:79ce2b184a43 150
karen801 0:79ce2b184a43 151 /* check for end of list */
karen801 0:79ce2b184a43 152 if(_recv_delim_cr_lf()) {
karen801 0:79ce2b184a43 153 return false;
karen801 0:79ce2b184a43 154 }
karen801 0:79ce2b184a43 155
karen801 0:79ce2b184a43 156 /* run to 'horizontal tab' */
karen801 0:79ce2b184a43 157 trials = 0;
karen801 0:79ce2b184a43 158 while(_parser.getc() != '\x09') {
karen801 0:79ce2b184a43 159 if(trials++ > SPWFXX_MAX_TRIALS) {
karen801 0:79ce2b184a43 160 debug("\r\nSPWF> WARNING: might happen in case of RX buffer overflow! (%s, %d)\r\n", __func__, __LINE__);
karen801 0:79ce2b184a43 161 return false;
karen801 0:79ce2b184a43 162 }
karen801 0:79ce2b184a43 163 }
karen801 0:79ce2b184a43 164
karen801 0:79ce2b184a43 165 /* read in next line */
karen801 0:79ce2b184a43 166 ret = _parser.recv("%255[^\n]\n", _msg_buffer) && _recv_delim_lf();
karen801 0:79ce2b184a43 167
karen801 0:79ce2b184a43 168 /* parse line - first phase */
karen801 0:79ce2b184a43 169 if(ret) {
karen801 0:79ce2b184a43 170 int val = sscanf(_msg_buffer,
karen801 0:79ce2b184a43 171 " %*s %hhx:%hhx:%hhx:%hhx:%hhx:%hhx CHAN: %u RSSI: %hhd SSID: \'%*255[^\']\'",
karen801 0:79ce2b184a43 172 &ap->bssid[0], &ap->bssid[1], &ap->bssid[2], &ap->bssid[3], &ap->bssid[4], &ap->bssid[5],
karen801 0:79ce2b184a43 173 &channel, &ap->rssi);
karen801 0:79ce2b184a43 174 if(val < 8) {
karen801 0:79ce2b184a43 175 ret = false;
karen801 0:79ce2b184a43 176 }
karen801 0:79ce2b184a43 177 }
karen801 0:79ce2b184a43 178
karen801 0:79ce2b184a43 179 /* parse line - second phase */
karen801 0:79ce2b184a43 180 if(ret) { // ret == true
karen801 0:79ce2b184a43 181 char value;
karen801 0:79ce2b184a43 182 char *rest, *first, *last;
karen801 0:79ce2b184a43 183
karen801 0:79ce2b184a43 184 /* decide about position of `CAPS:` */
karen801 0:79ce2b184a43 185 first = strchr(_msg_buffer, '\'');
karen801 0:79ce2b184a43 186 if(first == NULL) {
karen801 0:79ce2b184a43 187 debug("\r\nSPWF> WARNING: might happen in case of RX buffer overflow! (%s, %d)\r\n", __func__, __LINE__);
karen801 0:79ce2b184a43 188 return false;
karen801 0:79ce2b184a43 189 }
karen801 0:79ce2b184a43 190 last = strrchr(_msg_buffer, '\'');
karen801 0:79ce2b184a43 191 if((last == NULL) || (last < (first+1))) {
karen801 0:79ce2b184a43 192 debug("\r\nSPWF> WARNING: might happen in case of RX buffer overflow! (%s, %d)\r\n", __func__, __LINE__);
karen801 0:79ce2b184a43 193 return false;
karen801 0:79ce2b184a43 194 }
karen801 0:79ce2b184a43 195 rest = strstr(last, "CAPS:");
karen801 0:79ce2b184a43 196 if(rest == NULL) {
karen801 0:79ce2b184a43 197 debug("\r\nSPWF> WARNING: might happen in case of RX buffer overflow! (%s, %d)\r\n", __func__, __LINE__);
karen801 0:79ce2b184a43 198 return false;
karen801 0:79ce2b184a43 199 }
karen801 0:79ce2b184a43 200
karen801 0:79ce2b184a43 201 /* substitute '\'' with '\0' */
karen801 0:79ce2b184a43 202 *last = '\0';
karen801 0:79ce2b184a43 203
karen801 0:79ce2b184a43 204 /* copy values */
karen801 0:79ce2b184a43 205 memcpy(&ap->ssid, first+1, sizeof(ap->ssid)-1);
karen801 0:79ce2b184a43 206 ap->ssid[sizeof(ap->ssid)-1] = '\0';
karen801 0:79ce2b184a43 207 ap->channel = channel;
karen801 0:79ce2b184a43 208
karen801 0:79ce2b184a43 209 /* skip `CAPS: 0421 ` */
karen801 0:79ce2b184a43 210 if(strlen(rest) < 11) {
karen801 0:79ce2b184a43 211 debug("\r\nSPWF> WARNING: might happen in case of RX buffer overflow! (%s, %d)\r\n", __func__, __LINE__);
karen801 0:79ce2b184a43 212 return false;
karen801 0:79ce2b184a43 213 }
karen801 0:79ce2b184a43 214 rest += 11;
karen801 0:79ce2b184a43 215
karen801 0:79ce2b184a43 216 /* get next character */
karen801 0:79ce2b184a43 217 value = *rest++;
karen801 0:79ce2b184a43 218 if(value != 'W') { // no security
karen801 0:79ce2b184a43 219 ap->security = NSAPI_SECURITY_NONE;
karen801 0:79ce2b184a43 220 return true;
karen801 0:79ce2b184a43 221 }
karen801 0:79ce2b184a43 222
karen801 0:79ce2b184a43 223 /* determine security */
karen801 0:79ce2b184a43 224 {
karen801 0:79ce2b184a43 225 char buffer[10];
karen801 0:79ce2b184a43 226
karen801 0:79ce2b184a43 227 if(!(sscanf(rest, "%s%*[\x20]", (char*)&buffer) > 0)) { // '\0x20' == <space>
karen801 0:79ce2b184a43 228 return true;
karen801 0:79ce2b184a43 229 } else if(strncmp("EP", buffer, 10) == 0) {
karen801 0:79ce2b184a43 230 ap->security = NSAPI_SECURITY_WEP;
karen801 0:79ce2b184a43 231 return true;
karen801 0:79ce2b184a43 232 } else if(strncmp("PA2", buffer, 10) == 0) {
karen801 0:79ce2b184a43 233 ap->security = NSAPI_SECURITY_WPA2;
karen801 0:79ce2b184a43 234 return true;
karen801 0:79ce2b184a43 235 } else if(strncmp("PA", buffer, 10) != 0) {
karen801 0:79ce2b184a43 236 return true;
karen801 0:79ce2b184a43 237 }
karen801 0:79ce2b184a43 238
karen801 0:79ce2b184a43 239 /* got a "WPA", check for "WPA2" */
karen801 0:79ce2b184a43 240 rest += strlen(buffer);
karen801 0:79ce2b184a43 241 value = *rest++;
karen801 0:79ce2b184a43 242 if(value == '\0') { // no further protocol
karen801 0:79ce2b184a43 243 ap->security = NSAPI_SECURITY_WPA;
karen801 0:79ce2b184a43 244 return true;
karen801 0:79ce2b184a43 245 } else { // assume "WPA2"
karen801 0:79ce2b184a43 246 ap->security = NSAPI_SECURITY_WPA_WPA2;
karen801 0:79ce2b184a43 247 return true;
karen801 0:79ce2b184a43 248 }
karen801 0:79ce2b184a43 249 }
karen801 0:79ce2b184a43 250 } else { // ret == false
karen801 0:79ce2b184a43 251 debug("\r\nSPWF> WARNING: might happen in case of RX buffer overflow! (%s, %d)\r\n", __func__, __LINE__);
karen801 0:79ce2b184a43 252 }
karen801 0:79ce2b184a43 253
karen801 0:79ce2b184a43 254 return ret;
karen801 0:79ce2b184a43 255 }
karen801 0:79ce2b184a43 256
karen801 0:79ce2b184a43 257 int SPWFSA01::scan(WiFiAccessPoint *res, unsigned limit)
karen801 0:79ce2b184a43 258 {
karen801 0:79ce2b184a43 259 unsigned cnt = 0;
karen801 0:79ce2b184a43 260 nsapi_wifi_ap_t ap;
karen801 0:79ce2b184a43 261
karen801 0:79ce2b184a43 262 if (!_parser.send("AT+S.SCAN=a,s")) {
karen801 0:79ce2b184a43 263 return NSAPI_ERROR_DEVICE_ERROR;
karen801 0:79ce2b184a43 264 }
karen801 0:79ce2b184a43 265
karen801 0:79ce2b184a43 266 while (_recv_ap(&ap)) {
karen801 0:79ce2b184a43 267 if (cnt < limit) {
karen801 0:79ce2b184a43 268 res[cnt] = WiFiAccessPoint(ap);
karen801 0:79ce2b184a43 269 }
karen801 0:79ce2b184a43 270
karen801 0:79ce2b184a43 271 cnt++;
karen801 0:79ce2b184a43 272 if (limit != 0 && cnt >= limit) {
karen801 0:79ce2b184a43 273 break;
karen801 0:79ce2b184a43 274 }
karen801 0:79ce2b184a43 275 }
karen801 0:79ce2b184a43 276
karen801 0:79ce2b184a43 277 if(!_recv_ok()) {
karen801 0:79ce2b184a43 278 empty_rx_buffer();
karen801 0:79ce2b184a43 279 }
karen801 0:79ce2b184a43 280
karen801 0:79ce2b184a43 281 return cnt;
karen801 0:79ce2b184a43 282 }
karen801 0:79ce2b184a43 283
karen801 0:79ce2b184a43 284 #endif // MBED_CONF_IDW0XX1_EXPANSION_BOARD