platform_result_t platform_uart_transmit_bytes( platform_uart_driver_t* driver, const uint8_t* data_out, uint32_t size ) { UNUSED_PARAMETER(driver); UNUSED_PARAMETER(data_out); UNUSED_PARAMETER(size); pdc_packet_t dma_packet; /* Limitation: SAM4S doesn't support DMA transfer from embedded flash. * If data_out address is not within RAM range, use normal write to THR. */ if ( data_out >= (const uint8_t*)RAM_START_ADDR && data_out < (const uint8_t*)RAM_END_ADDR ) { /* Initialise TPR and TCR register values. TNPR and TNCR are unused */ dma_packet.ul_addr = (uint32_t)data_out; dma_packet.ul_size = (uint32_t)size; pdc_tx_init( usart_get_pdc_base( driver->peripheral->peripheral ), &dma_packet, NULL ); /* Enable Tx DMA transmission */ pdc_enable_transfer( usart_get_pdc_base( driver->peripheral->peripheral ), PERIPH_PTCR_TXTEN ); host_rtos_get_semaphore( &driver->tx_dma_complete, NEVER_TIMEOUT, WICED_FALSE ); } else { while ( size > 0 ) { usart_putchar( driver->peripheral->peripheral, (uint32_t)*data_out++ ); size--; } } return PLATFORM_SUCCESS; }
wwd_result_t wwd_wifi_stop_ap( void ) { uint32_t* data; wiced_buffer_t buffer; wiced_buffer_t response; wwd_result_t result; wwd_result_t result2; /* Query bss state (does it exist? if so is it UP?) */ data = (uint32_t*) wwd_sdpcm_get_iovar_buffer( &buffer, (uint16_t) 4, IOVAR_STR_BSS ); CHECK_IOCTL_BUFFER( data ); *data = wwd_get_bss_index( WWD_AP_INTERFACE ); result = wwd_sdpcm_send_iovar( SDPCM_GET, buffer, &response, WWD_STA_INTERFACE ); if ( result == WWD_WLAN_NOTFOUND ) { /* AP interface does not exist - i.e. it is down */ wwd_wifi_ap_is_up = WICED_FALSE; return WWD_SUCCESS; } CHECK_RETURN( result ); data = (uint32_t*) host_buffer_get_current_piece_data_pointer( response ); if ( data[0] != (uint32_t) BSS_UP ) { /* AP interface indicates it is not up - i.e. it is down */ host_buffer_release( response, WWD_NETWORK_RX ); wwd_wifi_ap_is_up = WICED_FALSE; return WWD_SUCCESS; } host_buffer_release( response, WWD_NETWORK_RX ); /* set BSS down */ data = (uint32_t*) wwd_sdpcm_get_iovar_buffer( &buffer, (uint16_t) 8, IOVAR_STR_BSS ); CHECK_IOCTL_BUFFER( data ); data[0] = wwd_get_bss_index( WWD_AP_INTERFACE ); data[1] = (uint32_t) BSS_DOWN; CHECK_RETURN( wwd_sdpcm_send_iovar( SDPCM_SET, buffer, 0, WWD_STA_INTERFACE ) ); /* Wait until AP is brought down */ result = host_rtos_get_semaphore( &wwd_wifi_sleep_flag, (uint32_t) 10000, WICED_FALSE ); result2 = host_rtos_deinit_semaphore( &wwd_wifi_sleep_flag ); if ( result != WWD_SUCCESS ) { return result; } if ( result2 != WWD_SUCCESS ) { return result2; } CHECK_RETURN( wwd_management_set_event_handler( apsta_events, NULL, NULL, WWD_AP_INTERFACE ) ); wwd_wifi_ap_is_up = WICED_FALSE; return WWD_SUCCESS; }
void start_download( void ) { wiced_deinit( ); currently_downloading = 1; host_rtos_init_semaphore( &downloading_semaphore ); host_rtos_init_semaphore( &download_ready_semaphore ); wiced_rtos_create_thread( &downloading_thread, WICED_NETWORK_WORKER_PRIORITY, "downloading_init_func", downloading_init_func, 5000, NULL); host_rtos_get_semaphore( &download_ready_semaphore, NEVER_TIMEOUT, WICED_FALSE ); host_rtos_deinit_semaphore( &download_ready_semaphore ); }
wwd_result_t external_write_wifi_firmware_and_nvram_image( void ) { if ( currently_downloading == 0 ) { wwd_result_t result; result = wwd_bus_write_wifi_firmware_image( ); if ( result != WWD_SUCCESS ) { return result; } return wwd_bus_write_wifi_nvram_image( ); } host_rtos_set_semaphore( &download_ready_semaphore, WICED_FALSE ); host_rtos_get_semaphore( &downloading_semaphore, NEVER_TIMEOUT, WICED_FALSE ); return WWD_SUCCESS; }
wwd_result_t wwd_wifi_ap_up( void ) { wiced_buffer_t buffer; uint32_t* data; data = (uint32_t*) wwd_sdpcm_get_iovar_buffer( &buffer, (uint16_t) 8, IOVAR_STR_BSS ); CHECK_IOCTL_BUFFER_WITH_SEMAPHORE( data, &wwd_wifi_sleep_flag ); data[0] = wwd_get_bss_index( WWD_AP_INTERFACE ); data[1] = (uint32_t) BSS_UP; CHECK_RETURN_WITH_SEMAPHORE( wwd_sdpcm_send_iovar( SDPCM_SET, buffer, 0, WWD_STA_INTERFACE ), &wwd_wifi_sleep_flag ); /* Wait until AP is brought up */ CHECK_RETURN_WITH_SEMAPHORE( host_rtos_get_semaphore( &wwd_wifi_sleep_flag, (uint32_t) 10000, WICED_FALSE ), &wwd_wifi_sleep_flag ); wwd_wifi_ap_is_up = WICED_TRUE; return WWD_SUCCESS; }
static wwd_result_t internal_ap_init( wiced_ssid_t* ssid, wiced_security_t auth_type, const uint8_t* security_key, uint8_t key_length, uint8_t channel ) { wiced_bool_t wait_for_interface = WICED_FALSE; wwd_result_t result; wiced_buffer_t response; wiced_buffer_t buffer; uint32_t* data; uint32_t bss_index = WWD_AP_INTERFACE; #ifdef WICED_WIFI_SOFT_AP_WEP_SUPPORT_ENABLED uint32_t* auth; uint16_t length; #endif if ( ( ( auth_type == WICED_SECURITY_WPA_TKIP_PSK ) || ( auth_type == WICED_SECURITY_WPA2_AES_PSK ) || ( auth_type == WICED_SECURITY_WPA2_MIXED_PSK ) ) && ( ( key_length < (uint8_t) 8 ) || ( key_length > (uint8_t) 64 ) ) ) { WPRINT_APP_INFO(( "Error: WPA security key length must be between 8 and 64\n" )); return WWD_WPA_KEYLEN_BAD; } #ifdef WICED_WIFI_SOFT_AP_WEP_SUPPORT_ENABLED else if( (( auth_type == WICED_SECURITY_WEP_PSK ) || ( auth_type == WICED_SECURITY_WEP_SHARED )) && (( key_length != FORMATTED_ASCII_WEP40_KEY_LENGTH ) && ( key_length != FORMATTED_ASCII_WEP104_KEY_LENGTH )) ) { WPRINT_APP_INFO(( "Error: WEP security Key length must be either 5 / 13 bytes\n" )); return WWD_WEP_KEYLEN_BAD; } #endif if ( ( wwd_wifi_p2p_go_is_up == WICED_TRUE ) || ( wwd_wifi_ap_is_up == WICED_TRUE ) ) { WPRINT_APP_INFO(( "Error: Soft AP or Wi-Fi Direct group owner already up\n" )); return WWD_AP_ALREADY_UP; } /* Query bss state (does it exist? if so is it UP?) */ data = (uint32_t*) wwd_sdpcm_get_iovar_buffer( &buffer, (uint16_t) 4, IOVAR_STR_BSS ); CHECK_IOCTL_BUFFER( data ); *data = (uint32_t) bss_index; if ( wwd_sdpcm_send_iovar( SDPCM_GET, buffer, &response, WWD_STA_INTERFACE ) != WWD_SUCCESS ) { /* Note: We don't need to release the response packet since the iovar failed */ wait_for_interface = WICED_TRUE; } else { /* Check if the BSS is already UP, if so return */ uint32_t* data2 = (uint32_t*) host_buffer_get_current_piece_data_pointer( response ); if ( *data2 == (uint32_t) BSS_UP ) { host_buffer_release( response, WWD_NETWORK_RX ); wwd_wifi_ap_is_up = WICED_TRUE; return WWD_SUCCESS; } else { host_buffer_release( response, WWD_NETWORK_RX ); } } CHECK_RETURN( host_rtos_init_semaphore( &wwd_wifi_sleep_flag ) ); /* Register for interested events */ CHECK_RETURN_WITH_SEMAPHORE( wwd_management_set_event_handler( apsta_events, wwd_handle_apsta_event, NULL, WWD_AP_INTERFACE ), &wwd_wifi_sleep_flag ); /* Check if we need to wait for interface to be created */ if ( wait_for_interface == WICED_TRUE ) { CHECK_RETURN_WITH_SEMAPHORE( host_rtos_get_semaphore( &wwd_wifi_sleep_flag, (uint32_t) 10000, WICED_FALSE ), &wwd_wifi_sleep_flag ); } if ( wwd_wifi_set_block_ack_window_size( WWD_AP_INTERFACE ) != WWD_SUCCESS ) { return WWD_SET_BLOCK_ACK_WINDOW_FAIL; } /* Set the SSID */ data = (uint32_t*) wwd_sdpcm_get_iovar_buffer( &buffer, (uint16_t) 40, "bsscfg:" IOVAR_STR_SSID ); CHECK_IOCTL_BUFFER_WITH_SEMAPHORE( data, &wwd_wifi_sleep_flag ); data[0] = bss_index; /* Set the bsscfg index */ data[1] = ssid->length; /* Set the ssid length */ memcpy( &data[2], (uint8_t*) ssid->value, ssid->length ); CHECK_RETURN_WITH_SEMAPHORE( wwd_sdpcm_send_iovar( SDPCM_SET, buffer, 0, WWD_STA_INTERFACE ), &wwd_wifi_sleep_flag ); /* Set the channel */ data = (uint32_t*) wwd_sdpcm_get_ioctl_buffer( &buffer, (uint16_t) 4 ); CHECK_IOCTL_BUFFER_WITH_SEMAPHORE( data, &wwd_wifi_sleep_flag ); *data = channel; CHECK_RETURN_WITH_SEMAPHORE( wwd_sdpcm_send_ioctl( SDPCM_SET, WLC_SET_CHANNEL, buffer, 0, WWD_AP_INTERFACE ), &wwd_wifi_sleep_flag ); #ifdef WICED_WIFI_SOFT_AP_WEP_SUPPORT_ENABLED if ( ( auth_type == WICED_SECURITY_WEP_PSK ) || ( auth_type == WICED_SECURITY_WEP_SHARED ) ) { for ( length = 0; length < key_length; length = (uint16_t) ( length + 2 + security_key[ 1 ] ) ) { const wiced_wep_key_t* in_key = (const wiced_wep_key_t*) &security_key[ length ]; wl_wsec_key_t* out_key = (wl_wsec_key_t*) wwd_sdpcm_get_ioctl_buffer( &buffer, sizeof(wl_wsec_key_t) ); CHECK_IOCTL_BUFFER_WITH_SEMAPHORE( out_key, &wwd_wifi_sleep_flag ); memset( out_key, 0, sizeof(wl_wsec_key_t) ); out_key->index = in_key->index; out_key->len = in_key->length; memcpy( out_key->data, in_key->data, in_key->length ); switch ( in_key->length ) { case WEP40_KEY_LENGTH: out_key->algo = (uint32_t) CRYPTO_ALGO_WEP1; break; case WEP104_KEY_LENGTH: out_key->algo = (uint32_t) CRYPTO_ALGO_WEP128; break; default: host_buffer_release( buffer, WWD_NETWORK_TX ); return WWD_INVALID_KEY; } /* Set the first entry as primary key by default */ if ( length == 0 ) { out_key->flags |= WL_PRIMARY_KEY; } out_key->index = htod32(out_key->index); out_key->len = htod32(out_key->len); out_key->algo = htod32(out_key->algo); out_key->flags = htod32(out_key->flags); CHECK_RETURN_WITH_SEMAPHORE( wwd_sdpcm_send_ioctl( SDPCM_SET, WLC_SET_KEY, buffer, NULL, WWD_AP_INTERFACE ), &wwd_wifi_sleep_flag ); } /* Set authentication type */ auth = (uint32_t*) wwd_sdpcm_get_ioctl_buffer( &buffer, (uint16_t) 4 ); CHECK_IOCTL_BUFFER_WITH_SEMAPHORE( auth, &wwd_wifi_sleep_flag ); if ( auth_type == WICED_SECURITY_WEP_SHARED ) { *auth = WEP_SHARED_KEY_AUTHENTICATION; /* 1 = Shared Key authentication */ } else { *auth = WEP_OPEN_SYSTEM_AUTHENTICATION; /* 0 = Open System authentication */ } CHECK_RETURN_WITH_SEMAPHORE( wwd_sdpcm_send_ioctl( SDPCM_SET, WLC_SET_AUTH, buffer, 0, WWD_AP_INTERFACE ), &wwd_wifi_sleep_flag ); } #endif data = (uint32_t*) wwd_sdpcm_get_iovar_buffer( &buffer, (uint16_t) 8, "bsscfg:" IOVAR_STR_WSEC ); CHECK_IOCTL_BUFFER_WITH_SEMAPHORE( data, &wwd_wifi_sleep_flag ); data[0] = bss_index; if ((auth_type & WPS_ENABLED) != 0) { data[1] = (uint32_t) ( ( auth_type & ( ~WPS_ENABLED ) ) | SES_OW_ENABLED ); } else { data[1] = (uint32_t) auth_type; } CHECK_RETURN_WITH_SEMAPHORE( wwd_sdpcm_send_iovar( SDPCM_SET, buffer, 0, WWD_STA_INTERFACE ), &wwd_wifi_sleep_flag ); if ( ( auth_type != WICED_SECURITY_OPEN ) && ( auth_type != WICED_SECURITY_WEP_PSK ) && ( auth_type != WICED_SECURITY_WEP_SHARED ) ) { wsec_pmk_t* psk; /* Set the wpa auth */ data = (uint32_t*) wwd_sdpcm_get_iovar_buffer( &buffer, (uint16_t) 8, "bsscfg:" IOVAR_STR_WPA_AUTH ); CHECK_IOCTL_BUFFER_WITH_SEMAPHORE( data, &wwd_wifi_sleep_flag ); data[0] = bss_index; data[1] = (uint32_t) (auth_type == WICED_SECURITY_WPA_TKIP_PSK) ? ( WPA_AUTH_PSK ) : ( WPA2_AUTH_PSK | WPA_AUTH_PSK ); CHECK_RETURN_WITH_SEMAPHORE( wwd_sdpcm_send_iovar( SDPCM_SET, buffer, 0, WWD_STA_INTERFACE ), &wwd_wifi_sleep_flag ); /* Set the passphrase */ psk = (wsec_pmk_t*) wwd_sdpcm_get_ioctl_buffer( &buffer, sizeof(wsec_pmk_t) ); CHECK_IOCTL_BUFFER_WITH_SEMAPHORE( psk, &wwd_wifi_sleep_flag ); memcpy( psk->key, security_key, key_length ); psk->key_len = key_length; psk->flags = (uint16_t) WSEC_PASSPHRASE; host_rtos_delay_milliseconds( 1 ); /* Delay required to allow radio firmware to be ready to receive PMK and avoid intermittent failure */ CHECK_RETURN_WITH_SEMAPHORE( wwd_sdpcm_send_ioctl( SDPCM_SET, WLC_SET_WSEC_PMK, buffer, 0, WWD_AP_INTERFACE ), &wwd_wifi_sleep_flag ); } /* Set the GMode */ data = (uint32_t*) wwd_sdpcm_get_ioctl_buffer( &buffer, (uint16_t) 4 ); CHECK_IOCTL_BUFFER_WITH_SEMAPHORE( data, &wwd_wifi_sleep_flag ); *data = (uint32_t) GMODE_AUTO; result = wwd_sdpcm_send_ioctl( SDPCM_SET, WLC_SET_GMODE, buffer, 0, WWD_AP_INTERFACE ); if ( ( result != WWD_SUCCESS ) && ( result != WWD_WLAN_ASSOCIATED ) ) { wiced_assert("start_ap: Failed to set GMode\n", 0 == 1 ); (void) host_rtos_deinit_semaphore( &wwd_wifi_sleep_flag ); return result; } /* Set the multicast transmission rate to 11 Mbps rather than the default 1 Mbps */ data = (uint32_t*) wwd_sdpcm_get_iovar_buffer( &buffer, (uint16_t) 4, IOVAR_STR_2G_MULTICAST_RATE ); CHECK_IOCTL_BUFFER( data ); *data = (uint32_t) RATE_SETTING_11_MBPS; CHECK_RETURN_WITH_SEMAPHORE( wwd_sdpcm_send_iovar( SDPCM_SET, buffer, NULL, WWD_AP_INTERFACE ), &wwd_wifi_sleep_flag ); /* Set DTIM period */ data = (uint32_t*) wwd_sdpcm_get_ioctl_buffer( &buffer, (uint16_t) 4 ); CHECK_IOCTL_BUFFER_WITH_SEMAPHORE( data, &wwd_wifi_sleep_flag ); *data = (uint32_t) WICED_DEFAULT_SOFT_AP_DTIM_PERIOD; CHECK_RETURN_WITH_SEMAPHORE( wwd_sdpcm_send_ioctl( SDPCM_SET, WLC_SET_DTIMPRD, buffer, 0, WWD_AP_INTERFACE ), &wwd_wifi_sleep_flag ); #ifdef WICED_DISABLE_SSID_BROADCAST /* Make the AP "hidden" */ data = (uint32_t*) wwd_sdpcm_get_iovar_buffer( &buffer, (uint16_t) 4, IOVAR_STR_CLOSEDNET ); CHECK_IOCTL_BUFFER_WITH_SEMAPHORE( data, &wwd_wifi_sleep_flag ); data[0] = (uint32_t) 1; CHECK_RETURN_WITH_SEMAPHORE( wwd_sdpcm_send_iovar( SDPCM_SET, buffer, 0, WWD_AP_INTERFACE ), &wwd_wifi_sleep_flag ); #endif #ifdef WICED_WIFI_ISOLATE_AP_CLIENTS result = wwd_wifi_enable_ap_isolate( WWD_AP_INTERFACE, WICED_TRUE ); wiced_assert("start_ap: Failed to disable intra BSS routing\r\n", result == WWD_SUCCESS ); #endif /* WICED_WIFI_ISOLATE_AP_CLIENTS */ return WWD_SUCCESS; }
platform_result_t platform_uart_receive_bytes( platform_uart_driver_t* driver, uint8_t* data_in, uint32_t expected_data_size, uint32_t timeout_ms ) { /*The following is a temporary implemenration of the UART*/ platform_result_t result = PLATFORM_SUCCESS; wiced_assert( "bad argument", ( driver != NULL ) && ( data_in != NULL ) && ( expected_data_size != 0 ) ); if ( driver->rx_buffer != NULL ) { while ( expected_data_size != 0 ) { uint32_t transfer_size = MIN( driver->rx_buffer->size / 2, expected_data_size ); /* Check if ring buffer already contains the required amount of data. */ if ( transfer_size > ring_buffer_used_space( driver->rx_buffer ) ) { wwd_result_t wwd_result; /* Set rx_size and wait in rx_complete semaphore until data reaches rx_size or timeout occurs */ WICED_DISABLE_INTERRUPTS( ); driver->last_receive_result = PLATFORM_SUCCESS; driver->rx_size = transfer_size; WICED_ENABLE_INTERRUPTS( ); wwd_result = host_rtos_get_semaphore( &driver->rx_complete, timeout_ms, WICED_TRUE ); /* Reset rx_size to prevent semaphore being set while nothing waits for the data */ WICED_DISABLE_INTERRUPTS( ); driver->rx_size = 0; WICED_ENABLE_INTERRUPTS( ); if ( wwd_result == WWD_TIMEOUT ) { /* Semaphore timeout. breaks from the while loop */ result = PLATFORM_TIMEOUT; break; } else { /* No timeout. retrieve result */ result = driver->last_receive_result; } } expected_data_size -= transfer_size; // Grab data from the buffer do { uint8_t* available_data; uint32_t bytes_available; ring_buffer_get_data( driver->rx_buffer, &available_data, &bytes_available ); bytes_available = MIN( bytes_available, transfer_size ); memcpy( data_in, available_data, bytes_available ); transfer_size -= bytes_available; data_in = ( (uint8_t*) data_in + bytes_available ); ring_buffer_consume( driver->rx_buffer, bytes_available ); } while ( transfer_size != 0 ); } return result; } else { return result; } }
static wwd_result_t internal_ap_init( wiced_ssid_t* ssid, wiced_security_t auth_type, const uint8_t* security_key, uint8_t key_length, uint8_t channel ) { wiced_bool_t wait_for_interface = WICED_FALSE; wwd_result_t result; wiced_buffer_t response; wiced_buffer_t buffer; uint32_t* data; if ( auth_type == WICED_SECURITY_WEP_PSK ) { return WWD_WEP_NOT_ALLOWED; } if ( ( ( auth_type == WICED_SECURITY_WPA_TKIP_PSK ) || ( auth_type == WICED_SECURITY_WPA2_AES_PSK ) || ( auth_type == WICED_SECURITY_WPA2_MIXED_PSK ) ) && ( ( key_length < (uint8_t) 8 ) || ( key_length > (uint8_t) 64 ) ) ) { return WWD_WPA_KEYLEN_BAD; } if ( wwd_wifi_set_block_ack_window_size( WWD_AP_INTERFACE ) != WWD_SUCCESS ) { return WWD_SET_BLOCK_ACK_WINDOW_FAIL; } /* Query bss state (does it exist? if so is it UP?) */ data = (uint32_t*) wwd_sdpcm_get_iovar_buffer( &buffer, (uint16_t) 4, IOVAR_STR_BSS ); CHECK_IOCTL_BUFFER( data ); *data = (uint32_t) CHIP_AP_INTERFACE; if ( wwd_sdpcm_send_iovar( SDPCM_GET, buffer, &response, WWD_STA_INTERFACE ) != WWD_SUCCESS ) { /* Note: We don't need to release the response packet since the iovar failed */ wait_for_interface = WICED_TRUE; } else { /* Check if the BSS is already UP, if so return */ uint32_t* data2 = (uint32_t*) host_buffer_get_current_piece_data_pointer( response ); if ( *data2 == (uint32_t) BSS_UP ) { host_buffer_release( response, WWD_NETWORK_RX ); wwd_wifi_ap_is_up = WICED_TRUE; return WWD_SUCCESS; } else { host_buffer_release( response, WWD_NETWORK_RX ); } } CHECK_RETURN( host_rtos_init_semaphore( &wwd_wifi_sleep_flag ) ); /* Register for interested events */ CHECK_RETURN_WITH_SEMAPHORE( wwd_management_set_event_handler( apsta_events, wwd_handle_apsta_event, NULL, WWD_AP_INTERFACE ), &wwd_wifi_sleep_flag ); /* Set the SSID */ data = (uint32_t*) wwd_sdpcm_get_iovar_buffer( &buffer, (uint16_t) 40, IOVAR_STR_BSSCFG_SSID ); CHECK_IOCTL_BUFFER_WITH_SEMAPHORE( data, &wwd_wifi_sleep_flag ); data[0] = (uint32_t) CHIP_AP_INTERFACE; /* Set the bsscfg index */ data[1] = ssid->length; /* Set the ssid length */ memcpy( &data[2], (uint8_t*) ssid->value, ssid->length ); CHECK_RETURN_WITH_SEMAPHORE( wwd_sdpcm_send_iovar( SDPCM_SET, buffer, 0, WWD_STA_INTERFACE ), &wwd_wifi_sleep_flag ); /* Check if we need to wait for interface to be created */ if ( wait_for_interface == WICED_TRUE ) { CHECK_RETURN_WITH_SEMAPHORE( host_rtos_get_semaphore( &wwd_wifi_sleep_flag, (uint32_t) 10000, WICED_FALSE ), &wwd_wifi_sleep_flag ); } /* Set the channel */ data = (uint32_t*) wwd_sdpcm_get_ioctl_buffer( &buffer, (uint16_t) 4 ); CHECK_IOCTL_BUFFER_WITH_SEMAPHORE( data, &wwd_wifi_sleep_flag ); *data = channel; CHECK_RETURN_WITH_SEMAPHORE( wwd_sdpcm_send_ioctl( SDPCM_SET, WLC_SET_CHANNEL, buffer, 0, WWD_AP_INTERFACE ), &wwd_wifi_sleep_flag ); data = (uint32_t*) wwd_sdpcm_get_iovar_buffer( &buffer, (uint16_t) 8, IOVAR_STR_BSSCFG_WSEC ); CHECK_IOCTL_BUFFER_WITH_SEMAPHORE( data, &wwd_wifi_sleep_flag ); data[0] = (uint32_t) CHIP_AP_INTERFACE; if ((auth_type & WPS_ENABLED) != 0) { data[1] = (uint32_t) ( ( auth_type & ( ~WPS_ENABLED ) ) | SES_OW_ENABLED ); } else { data[1] = (uint32_t) auth_type; } CHECK_RETURN_WITH_SEMAPHORE( wwd_sdpcm_send_iovar( SDPCM_SET, buffer, 0, WWD_STA_INTERFACE ), &wwd_wifi_sleep_flag ); if ( auth_type != WICED_SECURITY_OPEN ) { wsec_pmk_t* psk; /* Set the wpa auth */ data = (uint32_t*) wwd_sdpcm_get_iovar_buffer( &buffer, (uint16_t) 8, IOVAR_STR_BSSCFG_WPA_AUTH ); CHECK_IOCTL_BUFFER_WITH_SEMAPHORE( data, &wwd_wifi_sleep_flag ); data[0] = (uint32_t) CHIP_AP_INTERFACE; data[1] = (uint32_t) (auth_type == WICED_SECURITY_WPA_TKIP_PSK) ? ( WPA_AUTH_PSK ) : ( WPA2_AUTH_PSK | WPA_AUTH_PSK ); CHECK_RETURN_WITH_SEMAPHORE( wwd_sdpcm_send_iovar( SDPCM_SET, buffer, 0, WWD_STA_INTERFACE ), &wwd_wifi_sleep_flag ); /* Set the passphrase */ psk = (wsec_pmk_t*) wwd_sdpcm_get_ioctl_buffer( &buffer, sizeof(wsec_pmk_t) ); CHECK_IOCTL_BUFFER_WITH_SEMAPHORE( psk, &wwd_wifi_sleep_flag ); memcpy( psk->key, security_key, key_length ); psk->key_len = key_length; psk->flags = (uint16_t) WSEC_PASSPHRASE; host_rtos_delay_milliseconds( 1 ); /* Delay required to allow radio firmware to be ready to receive PMK and avoid intermittent failure */ CHECK_RETURN_WITH_SEMAPHORE( wwd_sdpcm_send_ioctl( SDPCM_SET, WLC_SET_WSEC_PMK, buffer, 0, WWD_AP_INTERFACE ), &wwd_wifi_sleep_flag ); } /* Set the GMode */ data = wwd_sdpcm_get_ioctl_buffer( &buffer, (uint16_t) 4 ); CHECK_IOCTL_BUFFER_WITH_SEMAPHORE( data, &wwd_wifi_sleep_flag ); *data = (uint32_t) GMODE_AUTO; result = wwd_sdpcm_send_ioctl( SDPCM_SET, WLC_SET_GMODE, buffer, 0, WWD_AP_INTERFACE ); if ( ( result != WWD_SUCCESS ) && ( result != WWD_WLAN_ASSOCIATED ) ) { wiced_assert("start_ap: Failed to set GMode\n", 0 == 1 ); (void) host_rtos_deinit_semaphore( &wwd_wifi_sleep_flag ); return result; } /* Set the multicast transmission rate to 11 Mbps rather than the default 1 Mbps */ data = (uint32_t*) wwd_sdpcm_get_iovar_buffer( &buffer, (uint16_t) 4, IOVAR_STR_2G_MULTICAST_RATE ); CHECK_IOCTL_BUFFER( data ); *data = (uint32_t) RATE_SETTING_11_MBPS; result = wwd_sdpcm_send_iovar( SDPCM_SET, buffer, NULL, WWD_AP_INTERFACE ); wiced_assert("start_ap: Failed to set multicast transmission rate\r\n", result == WWD_SUCCESS ); /* Set DTIM period */ data = wwd_sdpcm_get_ioctl_buffer( &buffer, (uint16_t) 4 ); CHECK_IOCTL_BUFFER_WITH_SEMAPHORE( data, &wwd_wifi_sleep_flag ); *data = (uint32_t) WICED_DEFAULT_SOFT_AP_DTIM_PERIOD; CHECK_RETURN_WITH_SEMAPHORE( wwd_sdpcm_send_ioctl( SDPCM_SET, WLC_SET_DTIMPRD, buffer, 0, WWD_AP_INTERFACE ), &wwd_wifi_sleep_flag ); #ifdef WICED_DISABLE_SSID_BROADCAST /* Make the AP "hidden" */ data = (uint32_t*) wwd_sdpcm_get_iovar_buffer( &buffer, (uint16_t) 4, IOVAR_STR_CLOSEDNET ); CHECK_IOCTL_BUFFER_WITH_SEMAPHORE( data, &wwd_wifi_sleep_flag ); data[0] = (uint32_t) 1; CHECK_RETURN_WITH_SEMAPHORE( wwd_sdpcm_send_iovar( SDPCM_SET, buffer, 0, WWD_AP_INTERFACE ), &wwd_wifi_sleep_flag ); #endif return WWD_SUCCESS; }
wiced_result_t wiced_rtos_get_semaphore( wiced_semaphore_t* semaphore, uint32_t timeout_ms ) { return host_rtos_get_semaphore( (host_semaphore_type_t*) semaphore, timeout_ms, WICED_FALSE ); }
platform_result_t platform_uart_receive_bytes( platform_uart_driver_t* driver, uint8_t* data_in, uint32_t expected_data_size, uint32_t timeout_ms ) { UNUSED_PARAMETER(driver); UNUSED_PARAMETER(data_in); UNUSED_PARAMETER(expected_data_size); UNUSED_PARAMETER(timeout_ms); if ( driver->rx_ring_buffer != NULL ) { while ( expected_data_size != 0 ) { uint32_t transfer_size = MIN(driver->rx_ring_buffer->size / 2, expected_data_size); /* Check if ring buffer already contains the required amount of data. */ if ( transfer_size > ring_buffer_used_space( driver->rx_ring_buffer ) ) { /* Set rx_size and wait in rx_complete semaphore until data reaches rx_size or timeout occurs */ driver->rx_transfer_size = transfer_size; if ( host_rtos_get_semaphore( &driver->rx_dma_complete, timeout_ms, WICED_FALSE ) != WWD_SUCCESS ) { driver->rx_transfer_size = 0; return PLATFORM_TIMEOUT; } /* Reset rx_size to prevent semaphore being set while nothing waits for the data */ driver->rx_transfer_size = 0; } expected_data_size -= transfer_size; // Grab data from the buffer do { uint8_t* available_data; uint32_t bytes_available; ring_buffer_get_data( driver->rx_ring_buffer, &available_data, &bytes_available ); bytes_available = MIN( bytes_available, transfer_size ); memcpy( data_in, available_data, bytes_available ); transfer_size -= bytes_available; data_in = ( (uint8_t*)data_in + bytes_available ); ring_buffer_consume( driver->rx_ring_buffer, bytes_available ); } while ( transfer_size != 0 ); } if ( expected_data_size != 0 ) { return PLATFORM_ERROR; } else { return PLATFORM_SUCCESS; } } else { /* TODO: need to implement this */ return PLATFORM_UNSUPPORTED; } }