Driver for CC3000 Wi-Fi module

Dependencies:   NVIC_set_all_priorities

Dependents:   CC3000_Simple_Socket Wi-Go_IOT_Demo

Information

The current code has been reworked to a full object oriented application and contains an mbed socket compatible API.

CC3000 Wi-Fi module library

Info

This is the low level driver for TI's SimpleLink CC3000 device.
Port from Avnet's Wi-Go KEIL code (based on TI's CC3000 code).
Special thanks to Jim Carver from Avnet for providing the Wi-Go board and for his assistance.

Differences with TI's original code

The code functionality stays exactly the same.
In order to make it easier to use the code, following changes were made :

  • Addition of a tool to shift all IRQ priorities to a lower level since it is very important to keep the SPI handler at the highest system priority, the WLAN interrupt the second highest and all other system interrupts at a lower priority, so their handlers can be preempted by the CC3000 interrupts.
  • Addition of low level I/O controls and conditional compiler controls in cc3000_common.h.
  • CC3000 initialisation, pin declarations, SPI and WLAN irq priorities are set in Init_HostDriver , we need to call this function at the start of the main function.
  • The SPI and HCI code are joined into one file.
  • The include list has been rearranged - Only #include "wlan.h" is needed in the user API.
  • Part of the CC3000's user eeprom memory is used to store additional info (52 bytes in NVMEM_USER_FILE_1):
# bytesDescriptionInfo
1First time config parameterUseful when connecting
2Firmware updater versionused with the Firmware update tool
2Service Pack versionused with the Firmware update tool
3Driver Versionused with the Firmware update tool
3Firmware Versionused with the Firmware update tool
1CIK validation (Client Interface Key)
40CIK data (Client Interface Key)used with the exosite

Using the Library

A user API is needed to access the CC3000 functions.
Examples:

Using the library with other processors

cc3000_common.cpp loads the irq tool for all targets:
All current mbed targets are supported by this library.

#include "NVIC_set_all_priorities.h"


All low level settings that need to change are available in cc3000_common.h

//*****************************************************************************
//              PIN CONTROLS & COMPILE CONTROLS
//*****************************************************************************
// Compiler control
#define CC3000_UNENCRYPTED_SMART_CONFIG   // No encryption
//#define CC3000_TINY_DRIVER                // Driver for small memory model CPUs

//Interrupt controls
#define NVIC_ALL_IRQ        NVIC_set_all_irq_priorities(3);         // Set ALL interrupt priorities to level 3
#define NVIC_SPI_IRQ        NVIC_SetPriority(SPI0_IRQn, 0x0);       // Wi-Fi SPI interrupt must be higher priority than SysTick
#define NVIC_PORT_IRQ       NVIC_SetPriority(PORTA_IRQn, 0x1);
#define NVIC_SYSTICK_IRQ    NVIC_SetPriority(SysTick_IRQn, 0x2);    // SysTick set to lower priority than Wi-Fi SPI bus interrupt
//#define NVIC_ADC_IRQ        NVIC_SetPriority(ADC0_IRQn, 0x3);       // ADC is the lowest of all

// Wlan controls
#define WLAN_ISF_PCR        PORTA->PCR[16]
#define WLAN_ISF_ISFR       PORTA->ISFR
#define WLAN_ISF_MASK       (1<<16)

#define WLAN_ASSERT_CS      wlan_cs = 0;   //CS : active low
#define WLAN_DEASSERT_CS    wlan_cs = 1;

#define WLAN_ASSERT_EN      wlan_en = 1;   //EN : active high
#define WLAN_DEASSERT_EN    wlan_en = 0;

#define WLAN_READ_IRQ       wlan_int

#define WLAN_ENABLE_IRQ     wlan_int.fall(&WLAN_IRQHandler);
#define WLAN_DISABLE_IRQ    wlan_int.fall(NULL);

#define WLAN_IRQ_PIN_CREATE         InterruptIn wlan_int (PTA16);
#define WLAN_EN_PIN_CREATE          DigitalOut  wlan_en  (PTA13);
#define WLAN_CS_PIN_CREATE          DigitalOut  wlan_cs  (PTD0);
#define WLAN_SPI_PORT_CREATE        SPI wlan(PTD2, PTD3, PTC5); // mosi, miso, sclk

#define WLAN_SPI_PORT_INIT          wlan.format(8,1);
#define WLAN_SPI_SET_FREQ           wlan.frequency(12000000);
#define WLAN_SPI_SET_IRQ_HANDLER    wlan_int.fall(&WLAN_IRQHandler);

#define WLAN_SPI_WRITE              wlan.write(*data++);
#define WLAN_SPI_READ               wlan.write(0x03);          // !! DO NOT MODIFY the 0x03 parameter (CC3000 will not respond).

API documentation

Due to a little problem with the links on the mbed site, the API documentation is not directly accessible (will be solved in a next release).
Currently, it is only accessible by adding modules.html to the API doc link: http://mbed.org/users/frankvnk/code/CC3000_Hostdriver/docs/tip/modules.html

Committer:
frankvnk
Date:
Sat Jul 13 13:12:46 2013 +0000
Revision:
3:3818c9c7b14e
Parent:
2:f1d50c7f8bdb
Child:
4:d8255a5aad46
first working version

Who changed what in which revision?

UserRevisionLine numberNew contents of line
frankvnk 0:c44f0314d6ec 1 /*****************************************************************************
frankvnk 0:c44f0314d6ec 2 *
frankvnk 0:c44f0314d6ec 3 * wlan.c - CC3000 Host Driver Implementation.
frankvnk 0:c44f0314d6ec 4 * Copyright (C) 2011 Texas Instruments Incorporated - http://www.ti.com/
frankvnk 0:c44f0314d6ec 5 *
frankvnk 0:c44f0314d6ec 6 * Redistribution and use in source and binary forms, with or without
frankvnk 0:c44f0314d6ec 7 * modification, are permitted provided that the following conditions
frankvnk 0:c44f0314d6ec 8 * are met:
frankvnk 0:c44f0314d6ec 9 *
frankvnk 0:c44f0314d6ec 10 * Redistributions of source code must retain the above copyright
frankvnk 0:c44f0314d6ec 11 * notice, this list of conditions and the following disclaimer.
frankvnk 0:c44f0314d6ec 12 *
frankvnk 0:c44f0314d6ec 13 * Redistributions in binary form must reproduce the above copyright
frankvnk 0:c44f0314d6ec 14 * notice, this list of conditions and the following disclaimer in the
frankvnk 0:c44f0314d6ec 15 * documentation and/or other materials provided with the
frankvnk 0:c44f0314d6ec 16 * distribution.
frankvnk 0:c44f0314d6ec 17 *
frankvnk 0:c44f0314d6ec 18 * Neither the name of Texas Instruments Incorporated nor the names of
frankvnk 0:c44f0314d6ec 19 * its contributors may be used to endorse or promote products derived
frankvnk 0:c44f0314d6ec 20 * from this software without specific prior written permission.
frankvnk 0:c44f0314d6ec 21 *
frankvnk 0:c44f0314d6ec 22 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
frankvnk 0:c44f0314d6ec 23 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
frankvnk 0:c44f0314d6ec 24 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
frankvnk 0:c44f0314d6ec 25 * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
frankvnk 0:c44f0314d6ec 26 * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
frankvnk 0:c44f0314d6ec 27 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
frankvnk 0:c44f0314d6ec 28 * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
frankvnk 0:c44f0314d6ec 29 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
frankvnk 0:c44f0314d6ec 30 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
frankvnk 0:c44f0314d6ec 31 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
frankvnk 0:c44f0314d6ec 32 * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
frankvnk 0:c44f0314d6ec 33 *
frankvnk 0:c44f0314d6ec 34 *****************************************************************************/
frankvnk 0:c44f0314d6ec 35
frankvnk 0:c44f0314d6ec 36 //*****************************************************************************
frankvnk 0:c44f0314d6ec 37 //
frankvnk 0:c44f0314d6ec 38 //! \addtogroup wlan_api
frankvnk 0:c44f0314d6ec 39 //! @{
frankvnk 0:c44f0314d6ec 40 //
frankvnk 0:c44f0314d6ec 41 //*****************************************************************************
frankvnk 0:c44f0314d6ec 42 #include "wlan.h"
frankvnk 0:c44f0314d6ec 43
frankvnk 0:c44f0314d6ec 44 extern void WriteWlanPin( unsigned char val );
frankvnk 0:c44f0314d6ec 45 volatile sSimplLinkInformation tSLInformation;
frankvnk 0:c44f0314d6ec 46
frankvnk 0:c44f0314d6ec 47 #define SMART_CONFIG_PROFILE_SIZE 67 // 67 = 32 (max ssid) + 32 (max key) + 1 (SSID length) + 1 (security type) + 1 (key length)
frankvnk 0:c44f0314d6ec 48
frankvnk 0:c44f0314d6ec 49 #ifndef CC3000_UNENCRYPTED_SMART_CONFIG
frankvnk 0:c44f0314d6ec 50 unsigned char key[AES128_KEY_SIZE];
frankvnk 0:c44f0314d6ec 51 unsigned char profileArray[SMART_CONFIG_PROFILE_SIZE];
frankvnk 0:c44f0314d6ec 52 #endif //CC3000_UNENCRYPTED_SMART_CONFIG
frankvnk 0:c44f0314d6ec 53
frankvnk 0:c44f0314d6ec 54 /* patches type */
frankvnk 0:c44f0314d6ec 55 #define PATCHES_HOST_TYPE_WLAN_DRIVER 0x01
frankvnk 0:c44f0314d6ec 56 #define PATCHES_HOST_TYPE_WLAN_FW 0x02
frankvnk 0:c44f0314d6ec 57 #define PATCHES_HOST_TYPE_BOOTLOADER 0x03
frankvnk 0:c44f0314d6ec 58
frankvnk 0:c44f0314d6ec 59 #define SL_SET_SCAN_PARAMS_INTERVAL_LIST_SIZE (16)
frankvnk 0:c44f0314d6ec 60 #define SL_SIMPLE_CONFIG_PREFIX_LENGTH (3)
frankvnk 0:c44f0314d6ec 61 #define ETH_ALEN (6)
frankvnk 0:c44f0314d6ec 62 #define MAXIMAL_SSID_LENGTH (32)
frankvnk 0:c44f0314d6ec 63
frankvnk 0:c44f0314d6ec 64 #define SL_PATCHES_REQUEST_DEFAULT (0)
frankvnk 0:c44f0314d6ec 65 #define SL_PATCHES_REQUEST_FORCE_HOST (1)
frankvnk 0:c44f0314d6ec 66 #define SL_PATCHES_REQUEST_FORCE_NONE (2)
frankvnk 0:c44f0314d6ec 67
frankvnk 0:c44f0314d6ec 68
frankvnk 0:c44f0314d6ec 69 #define WLAN_SEC_UNSEC (0)
frankvnk 0:c44f0314d6ec 70 #define WLAN_SEC_WEP (1)
frankvnk 0:c44f0314d6ec 71 #define WLAN_SEC_WPA (2)
frankvnk 0:c44f0314d6ec 72 #define WLAN_SEC_WPA2 (3)
frankvnk 0:c44f0314d6ec 73
frankvnk 0:c44f0314d6ec 74
frankvnk 0:c44f0314d6ec 75 #define WLAN_SL_INIT_START_PARAMS_LEN (1)
frankvnk 0:c44f0314d6ec 76 #define WLAN_PATCH_PARAMS_LENGTH (8)
frankvnk 0:c44f0314d6ec 77 #define WLAN_SET_CONNECTION_POLICY_PARAMS_LEN (12)
frankvnk 0:c44f0314d6ec 78 #define WLAN_DEL_PROFILE_PARAMS_LEN (4)
frankvnk 0:c44f0314d6ec 79 #define WLAN_SET_MASK_PARAMS_LEN (4)
frankvnk 0:c44f0314d6ec 80 #define WLAN_SET_SCAN_PARAMS_LEN (100)
frankvnk 0:c44f0314d6ec 81 #define WLAN_GET_SCAN_RESULTS_PARAMS_LEN (4)
frankvnk 0:c44f0314d6ec 82 #define WLAN_ADD_PROFILE_NOSEC_PARAM_LEN (24)
frankvnk 0:c44f0314d6ec 83 #define WLAN_ADD_PROFILE_WEP_PARAM_LEN (36)
frankvnk 0:c44f0314d6ec 84 #define WLAN_ADD_PROFILE_WPA_PARAM_LEN (44)
frankvnk 0:c44f0314d6ec 85 #define WLAN_CONNECT_PARAM_LEN (29)
frankvnk 0:c44f0314d6ec 86 #define WLAN_SMART_CONFIG_START_PARAMS_LEN (4)
frankvnk 0:c44f0314d6ec 87
frankvnk 0:c44f0314d6ec 88
frankvnk 0:c44f0314d6ec 89
frankvnk 0:c44f0314d6ec 90
frankvnk 0:c44f0314d6ec 91 //*****************************************************************************
frankvnk 0:c44f0314d6ec 92 //
frankvnk 0:c44f0314d6ec 93 //! SimpleLink_Init_Start
frankvnk 0:c44f0314d6ec 94 //!
frankvnk 0:c44f0314d6ec 95 //! @param usPatchesAvailableAtHost flag to indicate if patches available
frankvnk 0:c44f0314d6ec 96 //! from host or from EEPROM. Due to the
frankvnk 0:c44f0314d6ec 97 //! fact the patches are burn to the EEPROM
frankvnk 0:c44f0314d6ec 98 //! using the patch programmer utility, the
frankvnk 0:c44f0314d6ec 99 //! patches will be available from the EEPROM
frankvnk 0:c44f0314d6ec 100 //! and not from the host.
frankvnk 0:c44f0314d6ec 101 //!
frankvnk 0:c44f0314d6ec 102 //! @return none
frankvnk 0:c44f0314d6ec 103 //!
frankvnk 0:c44f0314d6ec 104 //! @brief Send HCI_CMND_SIMPLE_LINK_START to CC3000
frankvnk 0:c44f0314d6ec 105 //
frankvnk 0:c44f0314d6ec 106 //*****************************************************************************
frankvnk 0:c44f0314d6ec 107 static void SimpleLink_Init_Start(unsigned short usPatchesAvailableAtHost)
frankvnk 0:c44f0314d6ec 108 {
frankvnk 0:c44f0314d6ec 109 unsigned char *ptr;
frankvnk 0:c44f0314d6ec 110 unsigned char *args;
frankvnk 0:c44f0314d6ec 111
frankvnk 0:c44f0314d6ec 112 ptr = tSLInformation.pucTxCommandBuffer;
frankvnk 0:c44f0314d6ec 113 args = (unsigned char *)(ptr + HEADERS_SIZE_CMD);
frankvnk 0:c44f0314d6ec 114
frankvnk 0:c44f0314d6ec 115 UINT8_TO_STREAM(args, ((usPatchesAvailableAtHost) ? SL_PATCHES_REQUEST_FORCE_HOST : SL_PATCHES_REQUEST_DEFAULT));
frankvnk 0:c44f0314d6ec 116
frankvnk 0:c44f0314d6ec 117 // IRQ Line asserted - send HCI_CMND_SIMPLE_LINK_START to CC3000
frankvnk 0:c44f0314d6ec 118 hci_command_send(HCI_CMND_SIMPLE_LINK_START, ptr, WLAN_SL_INIT_START_PARAMS_LEN);
frankvnk 3:3818c9c7b14e 119 //printf("HCS-E\n");
frankvnk 0:c44f0314d6ec 120 SimpleLinkWaitEvent(HCI_CMND_SIMPLE_LINK_START, 0);
frankvnk 3:3818c9c7b14e 121 //printf("SLWE-E\n");
frankvnk 0:c44f0314d6ec 122 }
frankvnk 0:c44f0314d6ec 123
frankvnk 0:c44f0314d6ec 124
frankvnk 0:c44f0314d6ec 125
frankvnk 0:c44f0314d6ec 126 //*****************************************************************************
frankvnk 0:c44f0314d6ec 127 //
frankvnk 0:c44f0314d6ec 128 //! wlan_init
frankvnk 0:c44f0314d6ec 129 //!
frankvnk 0:c44f0314d6ec 130 //! @param sWlanCB Asynchronous events callback.
frankvnk 0:c44f0314d6ec 131 //! 0 no event call back.
frankvnk 0:c44f0314d6ec 132 //! -call back parameters:
frankvnk 0:c44f0314d6ec 133 //! 1) event_type: HCI_EVNT_WLAN_UNSOL_CONNECT connect event,
frankvnk 0:c44f0314d6ec 134 //! HCI_EVNT_WLAN_UNSOL_DISCONNECT disconnect event,
frankvnk 0:c44f0314d6ec 135 //! HCI_EVNT_WLAN_ASYNC_SIMPLE_CONFIG_DONE config done,
frankvnk 0:c44f0314d6ec 136 //! HCI_EVNT_WLAN_UNSOL_DHCP dhcp report,
frankvnk 0:c44f0314d6ec 137 //! HCI_EVNT_WLAN_ASYNC_PING_REPORT ping report OR
frankvnk 0:c44f0314d6ec 138 //! HCI_EVNT_WLAN_KEEPALIVE keepalive.
frankvnk 0:c44f0314d6ec 139 //! 2) data: pointer to extra data that received by the event
frankvnk 0:c44f0314d6ec 140 //! (NULL no data).
frankvnk 0:c44f0314d6ec 141 //! 3) length: data length.
frankvnk 0:c44f0314d6ec 142 //! -Events with extra data:
frankvnk 0:c44f0314d6ec 143 //! HCI_EVNT_WLAN_UNSOL_DHCP: 4 bytes IP, 4 bytes Mask,
frankvnk 0:c44f0314d6ec 144 //! 4 bytes default gateway, 4 bytes DHCP server and 4 bytes
frankvnk 0:c44f0314d6ec 145 //! for DNS server.
frankvnk 0:c44f0314d6ec 146 //! HCI_EVNT_WLAN_ASYNC_PING_REPORT: 4 bytes Packets sent,
frankvnk 0:c44f0314d6ec 147 //! 4 bytes Packets received, 4 bytes Min round time,
frankvnk 0:c44f0314d6ec 148 //! 4 bytes Max round time and 4 bytes for Avg round time.
frankvnk 0:c44f0314d6ec 149 //!
frankvnk 0:c44f0314d6ec 150 //! @param sFWPatches 0 no patch or pointer to FW patches
frankvnk 0:c44f0314d6ec 151 //! @param sDriverPatches 0 no patch or pointer to driver patches
frankvnk 0:c44f0314d6ec 152 //! @param sBootLoaderPatches 0 no patch or pointer to bootloader patches
frankvnk 0:c44f0314d6ec 153 //! @param sReadWlanInterruptPin init callback. the callback read wlan
frankvnk 0:c44f0314d6ec 154 //! interrupt status.
frankvnk 0:c44f0314d6ec 155 //! @param sWlanInterruptEnable init callback. the callback enable wlan
frankvnk 0:c44f0314d6ec 156 //! interrupt.
frankvnk 0:c44f0314d6ec 157 //! @param sWlanInterruptDisable init callback. the callback disable wlan
frankvnk 0:c44f0314d6ec 158 //! interrupt.
frankvnk 0:c44f0314d6ec 159 //! @param sWriteWlanPin init callback. the callback write value
frankvnk 0:c44f0314d6ec 160 //! to device pin.
frankvnk 0:c44f0314d6ec 161 //!
frankvnk 0:c44f0314d6ec 162 //! @return none
frankvnk 0:c44f0314d6ec 163 //!
frankvnk 0:c44f0314d6ec 164 //! @sa wlan_set_event_mask , wlan_start , wlan_stop
frankvnk 0:c44f0314d6ec 165 //!
frankvnk 0:c44f0314d6ec 166 //! @brief Initialize wlan driver
frankvnk 0:c44f0314d6ec 167 //!
frankvnk 0:c44f0314d6ec 168 //! @warning This function must be called before ANY other wlan driver function
frankvnk 0:c44f0314d6ec 169 //
frankvnk 0:c44f0314d6ec 170 //*****************************************************************************
frankvnk 0:c44f0314d6ec 171
frankvnk 0:c44f0314d6ec 172 void wlan_init(tWlanCB sWlanCB,
frankvnk 0:c44f0314d6ec 173 tFWPatches sFWPatches,
frankvnk 0:c44f0314d6ec 174 tDriverPatches sDriverPatches,
frankvnk 0:c44f0314d6ec 175 tBootLoaderPatches sBootLoaderPatches,
frankvnk 0:c44f0314d6ec 176 tWlanReadInteruptPin sReadWlanInterruptPin,
frankvnk 0:c44f0314d6ec 177 tWlanInterruptEnable sWlanInterruptEnable,
frankvnk 0:c44f0314d6ec 178 tWlanInterruptDisable sWlanInterruptDisable,
frankvnk 0:c44f0314d6ec 179 tWriteWlanPin sWriteWlanPin)
frankvnk 0:c44f0314d6ec 180 {
frankvnk 0:c44f0314d6ec 181
frankvnk 0:c44f0314d6ec 182 tSLInformation.sFWPatches = sFWPatches;
frankvnk 0:c44f0314d6ec 183 tSLInformation.sDriverPatches = sDriverPatches;
frankvnk 0:c44f0314d6ec 184 tSLInformation.sBootLoaderPatches = sBootLoaderPatches;
frankvnk 0:c44f0314d6ec 185
frankvnk 0:c44f0314d6ec 186 // init io callback
frankvnk 0:c44f0314d6ec 187 tSLInformation.ReadWlanInterruptPin = sReadWlanInterruptPin;
frankvnk 0:c44f0314d6ec 188 tSLInformation.WlanInterruptEnable = sWlanInterruptEnable;
frankvnk 0:c44f0314d6ec 189 tSLInformation.WlanInterruptDisable = sWlanInterruptDisable;
frankvnk 0:c44f0314d6ec 190 tSLInformation.WriteWlanPin = sWriteWlanPin;
frankvnk 0:c44f0314d6ec 191
frankvnk 0:c44f0314d6ec 192 //init asynchronous events callback
frankvnk 0:c44f0314d6ec 193 tSLInformation.sWlanCB= sWlanCB;
frankvnk 0:c44f0314d6ec 194
frankvnk 0:c44f0314d6ec 195 // By default TX Complete events are routed to host too
frankvnk 0:c44f0314d6ec 196 tSLInformation.InformHostOnTxComplete = 1;
frankvnk 0:c44f0314d6ec 197 }
frankvnk 0:c44f0314d6ec 198
frankvnk 0:c44f0314d6ec 199 //*****************************************************************************
frankvnk 0:c44f0314d6ec 200 //
frankvnk 0:c44f0314d6ec 201 //! SpiReceiveHandler
frankvnk 0:c44f0314d6ec 202 //!
frankvnk 0:c44f0314d6ec 203 //! @param pvBuffer - pointer to the received data buffer
frankvnk 0:c44f0314d6ec 204 //! The function triggers Received event/data processing
frankvnk 0:c44f0314d6ec 205 //!
frankvnk 0:c44f0314d6ec 206 //! @param Pointer to the received data
frankvnk 0:c44f0314d6ec 207 //! @return none
frankvnk 0:c44f0314d6ec 208 //!
frankvnk 0:c44f0314d6ec 209 //! @brief The function triggers Received event/data processing. It is
frankvnk 0:c44f0314d6ec 210 //! called from the SPI library to receive the data
frankvnk 0:c44f0314d6ec 211 //
frankvnk 0:c44f0314d6ec 212 //*****************************************************************************
frankvnk 0:c44f0314d6ec 213 void SpiReceiveHandler(void *pvBuffer)
frankvnk 0:c44f0314d6ec 214 {
frankvnk 0:c44f0314d6ec 215 tSLInformation.usEventOrDataReceived = 1;
frankvnk 0:c44f0314d6ec 216 tSLInformation.pucReceivedData = (unsigned char *)pvBuffer;
frankvnk 0:c44f0314d6ec 217
frankvnk 0:c44f0314d6ec 218 hci_unsolicited_event_handler();
frankvnk 0:c44f0314d6ec 219 }
frankvnk 0:c44f0314d6ec 220
frankvnk 0:c44f0314d6ec 221 //*****************************************************************************
frankvnk 0:c44f0314d6ec 222 //
frankvnk 0:c44f0314d6ec 223 //! wlan_start
frankvnk 0:c44f0314d6ec 224 //!
frankvnk 0:c44f0314d6ec 225 //! @param usPatchesAvailableAtHost - flag to indicate if patches available
frankvnk 0:c44f0314d6ec 226 //! from host or from EEPROM. Due to the
frankvnk 0:c44f0314d6ec 227 //! fact the patches are burn to the EEPROM
frankvnk 0:c44f0314d6ec 228 //! using the patch programmer utility, the
frankvnk 0:c44f0314d6ec 229 //! patches will be available from the EEPROM
frankvnk 0:c44f0314d6ec 230 //! and not from the host.
frankvnk 0:c44f0314d6ec 231 //!
frankvnk 0:c44f0314d6ec 232 //! @return none
frankvnk 0:c44f0314d6ec 233 //!
frankvnk 0:c44f0314d6ec 234 //! @brief Start WLAN device. This function asserts the enable pin of
frankvnk 0:c44f0314d6ec 235 //! the device (WLAN_EN), starting the HW initialization process.
frankvnk 0:c44f0314d6ec 236 //! The function blocked until device Initialization is completed.
frankvnk 0:c44f0314d6ec 237 //! Function also configure patches (FW, driver or bootloader)
frankvnk 0:c44f0314d6ec 238 //! and calls appropriate device callbacks.
frankvnk 0:c44f0314d6ec 239 //!
frankvnk 0:c44f0314d6ec 240 //! @Note Prior calling the function wlan_init shall be called.
frankvnk 0:c44f0314d6ec 241 //! @Warning This function must be called after wlan_init and before any
frankvnk 0:c44f0314d6ec 242 //! other wlan API
frankvnk 0:c44f0314d6ec 243 //! @sa wlan_init , wlan_stop
frankvnk 0:c44f0314d6ec 244 //!
frankvnk 0:c44f0314d6ec 245 //
frankvnk 0:c44f0314d6ec 246 //*****************************************************************************
frankvnk 0:c44f0314d6ec 247
frankvnk 0:c44f0314d6ec 248 void wlan_start(unsigned short usPatchesAvailableAtHost)
frankvnk 0:c44f0314d6ec 249 {
frankvnk 0:c44f0314d6ec 250
frankvnk 0:c44f0314d6ec 251 unsigned long ulSpiIRQState;
frankvnk 0:c44f0314d6ec 252
frankvnk 0:c44f0314d6ec 253 tSLInformation.NumberOfSentPackets = 0;
frankvnk 0:c44f0314d6ec 254 tSLInformation.NumberOfReleasedPackets = 0;
frankvnk 0:c44f0314d6ec 255 tSLInformation.usRxEventOpcode = 0;
frankvnk 0:c44f0314d6ec 256 tSLInformation.usNumberOfFreeBuffers = 0;
frankvnk 0:c44f0314d6ec 257 tSLInformation.usSlBufferLength = 0;
frankvnk 0:c44f0314d6ec 258 tSLInformation.usBufferSize = 0;
frankvnk 0:c44f0314d6ec 259 tSLInformation.usRxDataPending = 0;
frankvnk 0:c44f0314d6ec 260 tSLInformation.slTransmitDataError = 0;
frankvnk 0:c44f0314d6ec 261 tSLInformation.usEventOrDataReceived = 0;
frankvnk 0:c44f0314d6ec 262 tSLInformation.pucReceivedData = 0;
frankvnk 2:f1d50c7f8bdb 263
frankvnk 0:c44f0314d6ec 264 // Allocate the memory for the RX/TX data transactions
frankvnk 0:c44f0314d6ec 265 tSLInformation.pucTxCommandBuffer = (unsigned char *)wlan_tx_buffer;
frankvnk 0:c44f0314d6ec 266
frankvnk 0:c44f0314d6ec 267 // init spi
frankvnk 0:c44f0314d6ec 268 SpiOpen(SpiReceiveHandler);
frankvnk 0:c44f0314d6ec 269 // Check the IRQ line
frankvnk 0:c44f0314d6ec 270 ulSpiIRQState = tSLInformation.ReadWlanInterruptPin();
frankvnk 0:c44f0314d6ec 271 // ASIC 1273 chip enable: toggle WLAN EN line
frankvnk 0:c44f0314d6ec 272 tSLInformation.WriteWlanPin( WLAN_ENABLE );
frankvnk 3:3818c9c7b14e 273
frankvnk 0:c44f0314d6ec 274 if (ulSpiIRQState)
frankvnk 0:c44f0314d6ec 275 {
frankvnk 0:c44f0314d6ec 276 // wait till the IRQ line goes low
frankvnk 1:bbcaf0b2f367 277 while(tSLInformation.ReadWlanInterruptPin() != 0)
frankvnk 1:bbcaf0b2f367 278 {
frankvnk 3:3818c9c7b14e 279 // Code inserted to avoid a wait forever. This only happens when wlan_start(0) is called.
frankvnk 3:3818c9c7b14e 280 // We need to reassert the enable pin to get an IRQ acknowledge from the CC3000.
frankvnk 3:3818c9c7b14e 281 // The real cause is unknown.
frankvnk 3:3818c9c7b14e 282 // A test indicates the enable pin only needs to be reasserted once.
frankvnk 3:3818c9c7b14e 283 if(usPatchesAvailableAtHost == 0)
frankvnk 3:3818c9c7b14e 284 {
frankvnk 3:3818c9c7b14e 285 tSLInformation.WriteWlanPin( WLAN_DISABLE );
frankvnk 3:3818c9c7b14e 286 wait_ms(50);
frankvnk 3:3818c9c7b14e 287 tSLInformation.WriteWlanPin( WLAN_ENABLE );
frankvnk 3:3818c9c7b14e 288 wait(1.5);
frankvnk 3:3818c9c7b14e 289 }
frankvnk 1:bbcaf0b2f367 290 }
frankvnk 0:c44f0314d6ec 291 }
frankvnk 0:c44f0314d6ec 292 else
frankvnk 0:c44f0314d6ec 293 {
frankvnk 3:3818c9c7b14e 294 // wait till the IRQ line goes high and then low
frankvnk 0:c44f0314d6ec 295 while(tSLInformation.ReadWlanInterruptPin() == 0)
frankvnk 0:c44f0314d6ec 296 {
frankvnk 0:c44f0314d6ec 297 }
frankvnk 0:c44f0314d6ec 298 while(tSLInformation.ReadWlanInterruptPin() != 0)
frankvnk 0:c44f0314d6ec 299 {
frankvnk 0:c44f0314d6ec 300 }
frankvnk 0:c44f0314d6ec 301 }
frankvnk 0:c44f0314d6ec 302 SimpleLink_Init_Start(usPatchesAvailableAtHost);
frankvnk 0:c44f0314d6ec 303
frankvnk 0:c44f0314d6ec 304 // Read Buffer's size and finish
frankvnk 0:c44f0314d6ec 305 hci_command_send(HCI_CMND_READ_BUFFER_SIZE, tSLInformation.pucTxCommandBuffer, 0);
frankvnk 3:3818c9c7b14e 306 //printf("HCS-E %02X\n",IRQ_cnt);
frankvnk 0:c44f0314d6ec 307 SimpleLinkWaitEvent(HCI_CMND_READ_BUFFER_SIZE, 0);
frankvnk 3:3818c9c7b14e 308 //printf("SLWE-E\n");
frankvnk 0:c44f0314d6ec 309 }
frankvnk 0:c44f0314d6ec 310
frankvnk 0:c44f0314d6ec 311
frankvnk 0:c44f0314d6ec 312 //*****************************************************************************
frankvnk 0:c44f0314d6ec 313 //
frankvnk 0:c44f0314d6ec 314 //! wlan_stop
frankvnk 0:c44f0314d6ec 315 //!
frankvnk 0:c44f0314d6ec 316 //! @param none
frankvnk 0:c44f0314d6ec 317 //!
frankvnk 0:c44f0314d6ec 318 //! @return none
frankvnk 0:c44f0314d6ec 319 //!
frankvnk 0:c44f0314d6ec 320 //! @brief Stop WLAN device by putting it into reset state.
frankvnk 0:c44f0314d6ec 321 //!
frankvnk 1:bbcaf0b2f367 322 //! @sa wlan_stop
frankvnk 0:c44f0314d6ec 323 //
frankvnk 0:c44f0314d6ec 324 //*****************************************************************************
frankvnk 0:c44f0314d6ec 325
frankvnk 0:c44f0314d6ec 326 void wlan_stop(void)
frankvnk 0:c44f0314d6ec 327 {
frankvnk 0:c44f0314d6ec 328 // ASIC 1273 chip disable
frankvnk 0:c44f0314d6ec 329 tSLInformation.WriteWlanPin( WLAN_DISABLE );
frankvnk 0:c44f0314d6ec 330
frankvnk 0:c44f0314d6ec 331 // Wait till IRQ line goes high...
frankvnk 0:c44f0314d6ec 332 while(tSLInformation.ReadWlanInterruptPin() == 0)
frankvnk 0:c44f0314d6ec 333 {
frankvnk 0:c44f0314d6ec 334 }
frankvnk 0:c44f0314d6ec 335
frankvnk 0:c44f0314d6ec 336 // Free the used by WLAN Driver memory
frankvnk 0:c44f0314d6ec 337 if (tSLInformation.pucTxCommandBuffer)
frankvnk 0:c44f0314d6ec 338 {
frankvnk 0:c44f0314d6ec 339 tSLInformation.pucTxCommandBuffer = 0;
frankvnk 0:c44f0314d6ec 340 }
frankvnk 0:c44f0314d6ec 341
frankvnk 0:c44f0314d6ec 342 SpiClose();
frankvnk 0:c44f0314d6ec 343 }
frankvnk 0:c44f0314d6ec 344
frankvnk 0:c44f0314d6ec 345
frankvnk 0:c44f0314d6ec 346 //*****************************************************************************
frankvnk 0:c44f0314d6ec 347 //
frankvnk 0:c44f0314d6ec 348 //! wlan_connect
frankvnk 0:c44f0314d6ec 349 //!
frankvnk 0:c44f0314d6ec 350 //! @param sec_type security options:
frankvnk 0:c44f0314d6ec 351 //! WLAN_SEC_UNSEC,
frankvnk 0:c44f0314d6ec 352 //! WLAN_SEC_WEP (ASCII support only),
frankvnk 0:c44f0314d6ec 353 //! WLAN_SEC_WPA or WLAN_SEC_WPA2
frankvnk 0:c44f0314d6ec 354 //! @param ssid up to 32 bytes and is ASCII SSID of the AP
frankvnk 0:c44f0314d6ec 355 //! @param ssid_len length of the SSID
frankvnk 0:c44f0314d6ec 356 //! @param bssid 6 bytes specified the AP bssid
frankvnk 0:c44f0314d6ec 357 //! @param key up to 16 bytes specified the AP security key
frankvnk 0:c44f0314d6ec 358 //! @param key_len key length
frankvnk 0:c44f0314d6ec 359 //!
frankvnk 0:c44f0314d6ec 360 //! @return On success, zero is returned. On error, negative is returned.
frankvnk 0:c44f0314d6ec 361 //! Note that even though a zero is returned on success to trigger
frankvnk 0:c44f0314d6ec 362 //! connection operation, it does not mean that CCC3000 is already
frankvnk 0:c44f0314d6ec 363 //! connected. An asynchronous "Connected" event is generated when
frankvnk 0:c44f0314d6ec 364 //! actual association process finishes and CC3000 is connected to
frankvnk 0:c44f0314d6ec 365 //! the AP. If DHCP is set, An asynchronous "DHCP" event is
frankvnk 0:c44f0314d6ec 366 //! generated when DHCP process is finish.
frankvnk 0:c44f0314d6ec 367 //!
frankvnk 0:c44f0314d6ec 368 //!
frankvnk 0:c44f0314d6ec 369 //! @brief Connect to AP
frankvnk 0:c44f0314d6ec 370 //! @warning Please Note that when connection to AP configured with security
frankvnk 0:c44f0314d6ec 371 //! type WEP, please confirm that the key is set as ASCII and not
frankvnk 0:c44f0314d6ec 372 //! as HEX.
frankvnk 0:c44f0314d6ec 373 //! @sa wlan_disconnect
frankvnk 0:c44f0314d6ec 374 //
frankvnk 0:c44f0314d6ec 375 //*****************************************************************************
frankvnk 0:c44f0314d6ec 376 #ifndef CC3000_TINY_DRIVER
frankvnk 0:c44f0314d6ec 377 long wlan_connect(unsigned long ulSecType,
frankvnk 0:c44f0314d6ec 378 char *ssid,
frankvnk 0:c44f0314d6ec 379 long ssid_len,
frankvnk 0:c44f0314d6ec 380 unsigned char *bssid,
frankvnk 0:c44f0314d6ec 381 unsigned char *key,
frankvnk 0:c44f0314d6ec 382 long key_len)
frankvnk 0:c44f0314d6ec 383 {
frankvnk 0:c44f0314d6ec 384 long ret;
frankvnk 0:c44f0314d6ec 385 unsigned char *ptr;
frankvnk 0:c44f0314d6ec 386 unsigned char *args;
frankvnk 0:c44f0314d6ec 387 unsigned char bssid_zero[] = {0, 0, 0, 0, 0, 0};
frankvnk 0:c44f0314d6ec 388
frankvnk 0:c44f0314d6ec 389 ret = EFAIL;
frankvnk 0:c44f0314d6ec 390 ptr = tSLInformation.pucTxCommandBuffer;
frankvnk 0:c44f0314d6ec 391 args = (ptr + HEADERS_SIZE_CMD);
frankvnk 0:c44f0314d6ec 392
frankvnk 0:c44f0314d6ec 393 // Fill in command buffer
frankvnk 0:c44f0314d6ec 394 args = UINT32_TO_STREAM(args, 0x0000001c);
frankvnk 0:c44f0314d6ec 395 args = UINT32_TO_STREAM(args, ssid_len);
frankvnk 0:c44f0314d6ec 396 args = UINT32_TO_STREAM(args, ulSecType);
frankvnk 0:c44f0314d6ec 397 args = UINT32_TO_STREAM(args, 0x00000010 + ssid_len);
frankvnk 0:c44f0314d6ec 398 args = UINT32_TO_STREAM(args, key_len);
frankvnk 0:c44f0314d6ec 399 args = UINT16_TO_STREAM(args, 0);
frankvnk 0:c44f0314d6ec 400
frankvnk 0:c44f0314d6ec 401 // padding shall be zeroed
frankvnk 0:c44f0314d6ec 402 if(bssid)
frankvnk 0:c44f0314d6ec 403 {
frankvnk 0:c44f0314d6ec 404 ARRAY_TO_STREAM(args, bssid, ETH_ALEN);
frankvnk 0:c44f0314d6ec 405 }
frankvnk 0:c44f0314d6ec 406 else
frankvnk 0:c44f0314d6ec 407 {
frankvnk 0:c44f0314d6ec 408 ARRAY_TO_STREAM(args, bssid_zero, ETH_ALEN);
frankvnk 0:c44f0314d6ec 409 }
frankvnk 0:c44f0314d6ec 410
frankvnk 0:c44f0314d6ec 411 ARRAY_TO_STREAM(args, ssid, ssid_len);
frankvnk 0:c44f0314d6ec 412
frankvnk 0:c44f0314d6ec 413 if(key_len && key)
frankvnk 0:c44f0314d6ec 414 {
frankvnk 0:c44f0314d6ec 415 ARRAY_TO_STREAM(args, key, key_len);
frankvnk 0:c44f0314d6ec 416 }
frankvnk 0:c44f0314d6ec 417
frankvnk 0:c44f0314d6ec 418 // Initiate a HCI command
frankvnk 0:c44f0314d6ec 419 hci_command_send(HCI_CMND_WLAN_CONNECT, ptr, WLAN_CONNECT_PARAM_LEN + ssid_len + key_len - 1);
frankvnk 0:c44f0314d6ec 420
frankvnk 0:c44f0314d6ec 421 // Wait for command complete event
frankvnk 0:c44f0314d6ec 422 SimpleLinkWaitEvent(HCI_CMND_WLAN_CONNECT, &ret);
frankvnk 0:c44f0314d6ec 423 errno = ret;
frankvnk 0:c44f0314d6ec 424
frankvnk 0:c44f0314d6ec 425 return(ret);
frankvnk 0:c44f0314d6ec 426 }
frankvnk 0:c44f0314d6ec 427 #else
frankvnk 0:c44f0314d6ec 428 long wlan_connect(char *ssid, long ssid_len)
frankvnk 0:c44f0314d6ec 429 {
frankvnk 0:c44f0314d6ec 430 long ret;
frankvnk 0:c44f0314d6ec 431 unsigned char *ptr;
frankvnk 0:c44f0314d6ec 432 unsigned char *args;
frankvnk 0:c44f0314d6ec 433 unsigned char bssid_zero[] = {0, 0, 0, 0, 0, 0};
frankvnk 0:c44f0314d6ec 434
frankvnk 0:c44f0314d6ec 435 ret = EFAIL;
frankvnk 0:c44f0314d6ec 436 ptr = tSLInformation.pucTxCommandBuffer;
frankvnk 0:c44f0314d6ec 437 args = (ptr + HEADERS_SIZE_CMD);
frankvnk 0:c44f0314d6ec 438
frankvnk 0:c44f0314d6ec 439 // Fill in command buffer
frankvnk 0:c44f0314d6ec 440 args = UINT32_TO_STREAM(args, 0x0000001c);
frankvnk 0:c44f0314d6ec 441 args = UINT32_TO_STREAM(args, ssid_len);
frankvnk 0:c44f0314d6ec 442 args = UINT32_TO_STREAM(args, 0);
frankvnk 0:c44f0314d6ec 443 args = UINT32_TO_STREAM(args, 0x00000010 + ssid_len);
frankvnk 0:c44f0314d6ec 444 args = UINT32_TO_STREAM(args, 0);
frankvnk 0:c44f0314d6ec 445 args = UINT16_TO_STREAM(args, 0);
frankvnk 0:c44f0314d6ec 446
frankvnk 0:c44f0314d6ec 447 // padding shall be zeroed
frankvnk 0:c44f0314d6ec 448 ARRAY_TO_STREAM(args, bssid_zero, ETH_ALEN);
frankvnk 0:c44f0314d6ec 449 ARRAY_TO_STREAM(args, ssid, ssid_len);
frankvnk 0:c44f0314d6ec 450
frankvnk 0:c44f0314d6ec 451 // Initiate a HCI command
frankvnk 0:c44f0314d6ec 452 hci_command_send(HCI_CMND_WLAN_CONNECT, ptr, WLAN_CONNECT_PARAM_LEN + ssid_len - 1);
frankvnk 0:c44f0314d6ec 453
frankvnk 0:c44f0314d6ec 454 // Wait for command complete event
frankvnk 0:c44f0314d6ec 455 SimpleLinkWaitEvent(HCI_CMND_WLAN_CONNECT, &ret);
frankvnk 0:c44f0314d6ec 456 errno = ret;
frankvnk 0:c44f0314d6ec 457
frankvnk 0:c44f0314d6ec 458 return(ret);
frankvnk 0:c44f0314d6ec 459 }
frankvnk 0:c44f0314d6ec 460 #endif
frankvnk 0:c44f0314d6ec 461
frankvnk 0:c44f0314d6ec 462 //*****************************************************************************
frankvnk 0:c44f0314d6ec 463 //
frankvnk 0:c44f0314d6ec 464 //! wlan_disconnect
frankvnk 0:c44f0314d6ec 465 //!
frankvnk 0:c44f0314d6ec 466 //! @return 0 disconnected done, other CC3000 already disconnected
frankvnk 0:c44f0314d6ec 467 //!
frankvnk 0:c44f0314d6ec 468 //! @brief Disconnect connection from AP.
frankvnk 0:c44f0314d6ec 469 //!
frankvnk 0:c44f0314d6ec 470 //! @sa wlan_connect
frankvnk 0:c44f0314d6ec 471 //
frankvnk 0:c44f0314d6ec 472 //*****************************************************************************
frankvnk 0:c44f0314d6ec 473
frankvnk 0:c44f0314d6ec 474 long wlan_disconnect()
frankvnk 0:c44f0314d6ec 475 {
frankvnk 0:c44f0314d6ec 476 long ret;
frankvnk 0:c44f0314d6ec 477 unsigned char *ptr;
frankvnk 0:c44f0314d6ec 478
frankvnk 0:c44f0314d6ec 479 ret = EFAIL;
frankvnk 0:c44f0314d6ec 480 ptr = tSLInformation.pucTxCommandBuffer;
frankvnk 0:c44f0314d6ec 481
frankvnk 0:c44f0314d6ec 482 hci_command_send(HCI_CMND_WLAN_DISCONNECT, ptr, 0);
frankvnk 0:c44f0314d6ec 483
frankvnk 0:c44f0314d6ec 484 // Wait for command complete event
frankvnk 0:c44f0314d6ec 485 SimpleLinkWaitEvent(HCI_CMND_WLAN_DISCONNECT, &ret);
frankvnk 0:c44f0314d6ec 486 errno = ret;
frankvnk 0:c44f0314d6ec 487
frankvnk 0:c44f0314d6ec 488 return(ret);
frankvnk 0:c44f0314d6ec 489 }
frankvnk 0:c44f0314d6ec 490
frankvnk 0:c44f0314d6ec 491 //*****************************************************************************
frankvnk 0:c44f0314d6ec 492 //
frankvnk 0:c44f0314d6ec 493 //! wlan_ioctl_set_connection_policy
frankvnk 0:c44f0314d6ec 494 //!
frankvnk 0:c44f0314d6ec 495 //! @param should_connect_to_open_ap enable(1), disable(0) connect to any
frankvnk 0:c44f0314d6ec 496 //! available AP. This parameter corresponds to the configuration of
frankvnk 0:c44f0314d6ec 497 //! item # 3 in the brief description.
frankvnk 0:c44f0314d6ec 498 //! @param should_use_fast_connect enable(1), disable(0). if enabled, tries
frankvnk 0:c44f0314d6ec 499 //! to connect to the last connected AP. This parameter corresponds
frankvnk 0:c44f0314d6ec 500 //! to the configuration of item # 1 in the brief description.
frankvnk 0:c44f0314d6ec 501 //! @param auto_start enable(1), disable(0) auto connect
frankvnk 0:c44f0314d6ec 502 //! after reset and periodically reconnect if needed. This
frankvnk 0:c44f0314d6ec 503 //! configuration configures option 2 in the above description.
frankvnk 0:c44f0314d6ec 504 //!
frankvnk 0:c44f0314d6ec 505 //! @return On success, zero is returned. On error, -1 is returned
frankvnk 0:c44f0314d6ec 506 //!
frankvnk 0:c44f0314d6ec 507 //! @brief When auto is enabled, the device tries to connect according
frankvnk 0:c44f0314d6ec 508 //! the following policy:
frankvnk 0:c44f0314d6ec 509 //! 1) If fast connect is enabled and last connection is valid,
frankvnk 0:c44f0314d6ec 510 //! the device will try to connect to it without the scanning
frankvnk 0:c44f0314d6ec 511 //! procedure (fast). The last connection will be marked as
frankvnk 0:c44f0314d6ec 512 //! invalid, due to adding/removing profile.
frankvnk 0:c44f0314d6ec 513 //! 2) If profile exists, the device will try to connect it
frankvnk 0:c44f0314d6ec 514 //! (Up to seven profiles).
frankvnk 0:c44f0314d6ec 515 //! 3) If fast and profiles are not found, and open mode is
frankvnk 0:c44f0314d6ec 516 //! enabled, the device will try to connect to any AP.
frankvnk 0:c44f0314d6ec 517 //! * Note that the policy settings are stored in the CC3000 NVMEM.
frankvnk 0:c44f0314d6ec 518 //!
frankvnk 0:c44f0314d6ec 519 //! @sa wlan_add_profile , wlan_ioctl_del_profile
frankvnk 0:c44f0314d6ec 520 //
frankvnk 0:c44f0314d6ec 521 //*****************************************************************************
frankvnk 0:c44f0314d6ec 522
frankvnk 0:c44f0314d6ec 523 long wlan_ioctl_set_connection_policy(unsigned long should_connect_to_open_ap,
frankvnk 0:c44f0314d6ec 524 unsigned long ulShouldUseFastConnect,
frankvnk 0:c44f0314d6ec 525 unsigned long ulUseProfiles)
frankvnk 0:c44f0314d6ec 526 {
frankvnk 0:c44f0314d6ec 527 long ret;
frankvnk 0:c44f0314d6ec 528 unsigned char *ptr;
frankvnk 0:c44f0314d6ec 529 unsigned char *args;
frankvnk 0:c44f0314d6ec 530
frankvnk 0:c44f0314d6ec 531 ret = EFAIL;
frankvnk 0:c44f0314d6ec 532 ptr = tSLInformation.pucTxCommandBuffer;
frankvnk 0:c44f0314d6ec 533 args = (unsigned char *)(ptr + HEADERS_SIZE_CMD);
frankvnk 0:c44f0314d6ec 534
frankvnk 0:c44f0314d6ec 535 // Fill in HCI packet structure
frankvnk 0:c44f0314d6ec 536 args = UINT32_TO_STREAM(args, should_connect_to_open_ap);
frankvnk 0:c44f0314d6ec 537 args = UINT32_TO_STREAM(args, ulShouldUseFastConnect);
frankvnk 0:c44f0314d6ec 538 args = UINT32_TO_STREAM(args, ulUseProfiles);
frankvnk 0:c44f0314d6ec 539
frankvnk 0:c44f0314d6ec 540 // Initiate a HCI command
frankvnk 0:c44f0314d6ec 541 hci_command_send(HCI_CMND_WLAN_IOCTL_SET_CONNECTION_POLICY, ptr, WLAN_SET_CONNECTION_POLICY_PARAMS_LEN);
frankvnk 0:c44f0314d6ec 542
frankvnk 0:c44f0314d6ec 543 // Wait for command complete event
frankvnk 0:c44f0314d6ec 544 SimpleLinkWaitEvent(HCI_CMND_WLAN_IOCTL_SET_CONNECTION_POLICY, &ret);
frankvnk 0:c44f0314d6ec 545
frankvnk 0:c44f0314d6ec 546 return(ret);
frankvnk 0:c44f0314d6ec 547 }
frankvnk 0:c44f0314d6ec 548
frankvnk 0:c44f0314d6ec 549 //*****************************************************************************
frankvnk 0:c44f0314d6ec 550 //
frankvnk 0:c44f0314d6ec 551 //! wlan_add_profile
frankvnk 0:c44f0314d6ec 552 //!
frankvnk 0:c44f0314d6ec 553 //! @param ulSecType WLAN_SEC_UNSEC,WLAN_SEC_WEP,WLAN_SEC_WPA,WLAN_SEC_WPA2
frankvnk 0:c44f0314d6ec 554 //! @param ucSsid ssid SSID up to 32 bytes
frankvnk 0:c44f0314d6ec 555 //! @param ulSsidLen ssid length
frankvnk 0:c44f0314d6ec 556 //! @param ucBssid bssid 6 bytes
frankvnk 0:c44f0314d6ec 557 //! @param ulPriority ulPriority profile priority. Lowest priority:0.
frankvnk 0:c44f0314d6ec 558 //! @param ulPairwiseCipher_Or_TxKeyLen key length for WEP security
frankvnk 0:c44f0314d6ec 559 //! @param ulGroupCipher_TxKeyIndex key index
frankvnk 0:c44f0314d6ec 560 //! @param ulKeyMgmt KEY management
frankvnk 0:c44f0314d6ec 561 //! @param ucPf_OrKey security key
frankvnk 0:c44f0314d6ec 562 //! @param ulPassPhraseLen security key length for WPA\WPA2
frankvnk 0:c44f0314d6ec 563 //!
frankvnk 0:c44f0314d6ec 564 //! @return On success, zero is returned. On error, -1 is returned
frankvnk 0:c44f0314d6ec 565 //!
frankvnk 0:c44f0314d6ec 566 //! @brief When auto start is enabled, the device connects to
frankvnk 0:c44f0314d6ec 567 //! station from the profiles table. Up to 7 profiles are supported.
frankvnk 0:c44f0314d6ec 568 //! If several profiles configured the device choose the highest
frankvnk 0:c44f0314d6ec 569 //! priority profile, within each priority group, device will choose
frankvnk 0:c44f0314d6ec 570 //! profile based on security policy, signal strength, etc
frankvnk 0:c44f0314d6ec 571 //! parameters. All the profiles are stored in CC3000 NVMEM.
frankvnk 0:c44f0314d6ec 572 //!
frankvnk 0:c44f0314d6ec 573 //! @sa wlan_ioctl_del_profile
frankvnk 0:c44f0314d6ec 574 //
frankvnk 0:c44f0314d6ec 575 //*****************************************************************************
frankvnk 0:c44f0314d6ec 576
frankvnk 0:c44f0314d6ec 577 #ifndef CC3000_TINY_DRIVER
frankvnk 0:c44f0314d6ec 578 long wlan_add_profile(unsigned long ulSecType,
frankvnk 0:c44f0314d6ec 579 unsigned char* ucSsid,
frankvnk 0:c44f0314d6ec 580 unsigned long ulSsidLen,
frankvnk 0:c44f0314d6ec 581 unsigned char *ucBssid,
frankvnk 0:c44f0314d6ec 582 unsigned long ulPriority,
frankvnk 0:c44f0314d6ec 583 unsigned long ulPairwiseCipher_Or_TxKeyLen,
frankvnk 0:c44f0314d6ec 584 unsigned long ulGroupCipher_TxKeyIndex,
frankvnk 0:c44f0314d6ec 585 unsigned long ulKeyMgmt,
frankvnk 0:c44f0314d6ec 586 unsigned char* ucPf_OrKey,
frankvnk 0:c44f0314d6ec 587 unsigned long ulPassPhraseLen)
frankvnk 0:c44f0314d6ec 588 {
frankvnk 0:c44f0314d6ec 589 unsigned short arg_len = 0x00;
frankvnk 0:c44f0314d6ec 590 long ret;
frankvnk 0:c44f0314d6ec 591 unsigned char *ptr;
frankvnk 0:c44f0314d6ec 592 long i = 0;
frankvnk 0:c44f0314d6ec 593 unsigned char *args;
frankvnk 0:c44f0314d6ec 594 unsigned char bssid_zero[] = {0, 0, 0, 0, 0, 0};
frankvnk 0:c44f0314d6ec 595
frankvnk 0:c44f0314d6ec 596 ptr = tSLInformation.pucTxCommandBuffer;
frankvnk 0:c44f0314d6ec 597 args = (ptr + HEADERS_SIZE_CMD);
frankvnk 0:c44f0314d6ec 598
frankvnk 0:c44f0314d6ec 599 args = UINT32_TO_STREAM(args, ulSecType);
frankvnk 0:c44f0314d6ec 600
frankvnk 0:c44f0314d6ec 601 // Setup arguments in accordance with the security type
frankvnk 0:c44f0314d6ec 602 switch (ulSecType)
frankvnk 0:c44f0314d6ec 603 {
frankvnk 0:c44f0314d6ec 604 //OPEN
frankvnk 0:c44f0314d6ec 605 case WLAN_SEC_UNSEC:
frankvnk 0:c44f0314d6ec 606 {
frankvnk 0:c44f0314d6ec 607 args = UINT32_TO_STREAM(args, 0x00000014);
frankvnk 0:c44f0314d6ec 608 args = UINT32_TO_STREAM(args, ulSsidLen);
frankvnk 0:c44f0314d6ec 609 args = UINT16_TO_STREAM(args, 0);
frankvnk 0:c44f0314d6ec 610 if(ucBssid)
frankvnk 0:c44f0314d6ec 611 {
frankvnk 0:c44f0314d6ec 612 ARRAY_TO_STREAM(args, ucBssid, ETH_ALEN);
frankvnk 0:c44f0314d6ec 613 }
frankvnk 0:c44f0314d6ec 614 else
frankvnk 0:c44f0314d6ec 615 {
frankvnk 0:c44f0314d6ec 616 ARRAY_TO_STREAM(args, bssid_zero, ETH_ALEN);
frankvnk 0:c44f0314d6ec 617 }
frankvnk 0:c44f0314d6ec 618 args = UINT32_TO_STREAM(args, ulPriority);
frankvnk 0:c44f0314d6ec 619 ARRAY_TO_STREAM(args, ucSsid, ulSsidLen);
frankvnk 0:c44f0314d6ec 620
frankvnk 0:c44f0314d6ec 621 arg_len = WLAN_ADD_PROFILE_NOSEC_PARAM_LEN + ulSsidLen;
frankvnk 0:c44f0314d6ec 622 }
frankvnk 0:c44f0314d6ec 623 break;
frankvnk 0:c44f0314d6ec 624
frankvnk 0:c44f0314d6ec 625 //WEP
frankvnk 0:c44f0314d6ec 626 case WLAN_SEC_WEP:
frankvnk 0:c44f0314d6ec 627 {
frankvnk 0:c44f0314d6ec 628 args = UINT32_TO_STREAM(args, 0x00000020);
frankvnk 0:c44f0314d6ec 629 args = UINT32_TO_STREAM(args, ulSsidLen);
frankvnk 0:c44f0314d6ec 630 args = UINT16_TO_STREAM(args, 0);
frankvnk 0:c44f0314d6ec 631 if(ucBssid)
frankvnk 0:c44f0314d6ec 632 {
frankvnk 0:c44f0314d6ec 633 ARRAY_TO_STREAM(args, ucBssid, ETH_ALEN);
frankvnk 0:c44f0314d6ec 634 }
frankvnk 0:c44f0314d6ec 635 else
frankvnk 0:c44f0314d6ec 636 {
frankvnk 0:c44f0314d6ec 637 ARRAY_TO_STREAM(args, bssid_zero, ETH_ALEN);
frankvnk 0:c44f0314d6ec 638 }
frankvnk 0:c44f0314d6ec 639 args = UINT32_TO_STREAM(args, ulPriority);
frankvnk 0:c44f0314d6ec 640 args = UINT32_TO_STREAM(args, 0x0000000C + ulSsidLen);
frankvnk 0:c44f0314d6ec 641 args = UINT32_TO_STREAM(args, ulPairwiseCipher_Or_TxKeyLen);
frankvnk 0:c44f0314d6ec 642 args = UINT32_TO_STREAM(args, ulGroupCipher_TxKeyIndex);
frankvnk 0:c44f0314d6ec 643 ARRAY_TO_STREAM(args, ucSsid, ulSsidLen);
frankvnk 0:c44f0314d6ec 644
frankvnk 0:c44f0314d6ec 645 for(i = 0; i < 4; i++)
frankvnk 0:c44f0314d6ec 646 {
frankvnk 0:c44f0314d6ec 647 unsigned char *p = &ucPf_OrKey[i * ulPairwiseCipher_Or_TxKeyLen];
frankvnk 0:c44f0314d6ec 648
frankvnk 0:c44f0314d6ec 649 ARRAY_TO_STREAM(args, p, ulPairwiseCipher_Or_TxKeyLen);
frankvnk 0:c44f0314d6ec 650 }
frankvnk 0:c44f0314d6ec 651
frankvnk 0:c44f0314d6ec 652 arg_len = WLAN_ADD_PROFILE_WEP_PARAM_LEN + ulSsidLen +
frankvnk 0:c44f0314d6ec 653 ulPairwiseCipher_Or_TxKeyLen * 4;
frankvnk 0:c44f0314d6ec 654
frankvnk 0:c44f0314d6ec 655 }
frankvnk 0:c44f0314d6ec 656 break;
frankvnk 0:c44f0314d6ec 657
frankvnk 0:c44f0314d6ec 658 //WPA
frankvnk 0:c44f0314d6ec 659 //WPA2
frankvnk 0:c44f0314d6ec 660 case WLAN_SEC_WPA:
frankvnk 0:c44f0314d6ec 661 case WLAN_SEC_WPA2:
frankvnk 0:c44f0314d6ec 662 {
frankvnk 0:c44f0314d6ec 663 args = UINT32_TO_STREAM(args, 0x00000028);
frankvnk 0:c44f0314d6ec 664 args = UINT32_TO_STREAM(args, ulSsidLen);
frankvnk 0:c44f0314d6ec 665 args = UINT16_TO_STREAM(args, 0);
frankvnk 0:c44f0314d6ec 666 if(ucBssid)
frankvnk 0:c44f0314d6ec 667 {
frankvnk 0:c44f0314d6ec 668 ARRAY_TO_STREAM(args, ucBssid, ETH_ALEN);
frankvnk 0:c44f0314d6ec 669 }
frankvnk 0:c44f0314d6ec 670 else
frankvnk 0:c44f0314d6ec 671 {
frankvnk 0:c44f0314d6ec 672 ARRAY_TO_STREAM(args, bssid_zero, ETH_ALEN);
frankvnk 0:c44f0314d6ec 673 }
frankvnk 0:c44f0314d6ec 674 args = UINT32_TO_STREAM(args, ulPriority);
frankvnk 0:c44f0314d6ec 675 args = UINT32_TO_STREAM(args, ulPairwiseCipher_Or_TxKeyLen);
frankvnk 0:c44f0314d6ec 676 args = UINT32_TO_STREAM(args, ulGroupCipher_TxKeyIndex);
frankvnk 0:c44f0314d6ec 677 args = UINT32_TO_STREAM(args, ulKeyMgmt);
frankvnk 0:c44f0314d6ec 678 args = UINT32_TO_STREAM(args, 0x00000008 + ulSsidLen);
frankvnk 0:c44f0314d6ec 679 args = UINT32_TO_STREAM(args, ulPassPhraseLen);
frankvnk 0:c44f0314d6ec 680 ARRAY_TO_STREAM(args, ucSsid, ulSsidLen);
frankvnk 0:c44f0314d6ec 681 ARRAY_TO_STREAM(args, ucPf_OrKey, ulPassPhraseLen);
frankvnk 0:c44f0314d6ec 682
frankvnk 0:c44f0314d6ec 683 arg_len = WLAN_ADD_PROFILE_WPA_PARAM_LEN + ulSsidLen + ulPassPhraseLen;
frankvnk 0:c44f0314d6ec 684 }
frankvnk 0:c44f0314d6ec 685
frankvnk 0:c44f0314d6ec 686 break;
frankvnk 0:c44f0314d6ec 687 }
frankvnk 0:c44f0314d6ec 688
frankvnk 0:c44f0314d6ec 689 // Initiate a HCI command
frankvnk 0:c44f0314d6ec 690 hci_command_send(HCI_CMND_WLAN_IOCTL_ADD_PROFILE, ptr, arg_len);
frankvnk 0:c44f0314d6ec 691
frankvnk 0:c44f0314d6ec 692 // Wait for command complete event
frankvnk 0:c44f0314d6ec 693 SimpleLinkWaitEvent(HCI_CMND_WLAN_IOCTL_ADD_PROFILE, &ret);
frankvnk 0:c44f0314d6ec 694
frankvnk 0:c44f0314d6ec 695 return(ret);
frankvnk 0:c44f0314d6ec 696 }
frankvnk 0:c44f0314d6ec 697 #else
frankvnk 0:c44f0314d6ec 698 long wlan_add_profile(unsigned long ulSecType,
frankvnk 0:c44f0314d6ec 699 unsigned char* ucSsid,
frankvnk 0:c44f0314d6ec 700 unsigned long ulSsidLen,
frankvnk 0:c44f0314d6ec 701 unsigned char *ucBssid,
frankvnk 0:c44f0314d6ec 702 unsigned long ulPriority,
frankvnk 0:c44f0314d6ec 703 unsigned long ulPairwiseCipher_Or_TxKeyLen,
frankvnk 0:c44f0314d6ec 704 unsigned long ulGroupCipher_TxKeyIndex,
frankvnk 0:c44f0314d6ec 705 unsigned long ulKeyMgmt,
frankvnk 0:c44f0314d6ec 706 unsigned char* ucPf_OrKey,
frankvnk 0:c44f0314d6ec 707 unsigned long ulPassPhraseLen)
frankvnk 0:c44f0314d6ec 708 {
frankvnk 0:c44f0314d6ec 709 return -1;
frankvnk 0:c44f0314d6ec 710 }
frankvnk 0:c44f0314d6ec 711 #endif
frankvnk 0:c44f0314d6ec 712
frankvnk 0:c44f0314d6ec 713 //*****************************************************************************
frankvnk 0:c44f0314d6ec 714 //
frankvnk 0:c44f0314d6ec 715 //! wlan_ioctl_del_profile
frankvnk 0:c44f0314d6ec 716 //!
frankvnk 0:c44f0314d6ec 717 //! @param index number of profile to delete
frankvnk 0:c44f0314d6ec 718 //!
frankvnk 0:c44f0314d6ec 719 //! @return On success, zero is returned. On error, -1 is returned
frankvnk 0:c44f0314d6ec 720 //!
frankvnk 0:c44f0314d6ec 721 //! @brief Delete WLAN profile
frankvnk 0:c44f0314d6ec 722 //!
frankvnk 0:c44f0314d6ec 723 //! @Note In order to delete all stored profile, set index to 255.
frankvnk 0:c44f0314d6ec 724 //!
frankvnk 0:c44f0314d6ec 725 //! @sa wlan_add_profile
frankvnk 0:c44f0314d6ec 726 //
frankvnk 0:c44f0314d6ec 727 //*****************************************************************************
frankvnk 0:c44f0314d6ec 728
frankvnk 0:c44f0314d6ec 729 long wlan_ioctl_del_profile(unsigned long ulIndex)
frankvnk 0:c44f0314d6ec 730 {
frankvnk 0:c44f0314d6ec 731 long ret;
frankvnk 0:c44f0314d6ec 732 unsigned char *ptr;
frankvnk 0:c44f0314d6ec 733 unsigned char *args;
frankvnk 0:c44f0314d6ec 734
frankvnk 0:c44f0314d6ec 735 ptr = tSLInformation.pucTxCommandBuffer;
frankvnk 0:c44f0314d6ec 736 args = (unsigned char *)(ptr + HEADERS_SIZE_CMD);
frankvnk 0:c44f0314d6ec 737
frankvnk 0:c44f0314d6ec 738 // Fill in HCI packet structure
frankvnk 0:c44f0314d6ec 739 args = UINT32_TO_STREAM(args, ulIndex);
frankvnk 0:c44f0314d6ec 740 ret = EFAIL;
frankvnk 0:c44f0314d6ec 741
frankvnk 0:c44f0314d6ec 742 // Initiate a HCI command
frankvnk 0:c44f0314d6ec 743 hci_command_send(HCI_CMND_WLAN_IOCTL_DEL_PROFILE, ptr, WLAN_DEL_PROFILE_PARAMS_LEN);
frankvnk 0:c44f0314d6ec 744
frankvnk 0:c44f0314d6ec 745 // Wait for command complete event
frankvnk 0:c44f0314d6ec 746 SimpleLinkWaitEvent(HCI_CMND_WLAN_IOCTL_DEL_PROFILE, &ret);
frankvnk 0:c44f0314d6ec 747
frankvnk 0:c44f0314d6ec 748 return(ret);
frankvnk 0:c44f0314d6ec 749 }
frankvnk 0:c44f0314d6ec 750
frankvnk 0:c44f0314d6ec 751 //*****************************************************************************
frankvnk 0:c44f0314d6ec 752 //
frankvnk 0:c44f0314d6ec 753 //! wlan_ioctl_get_scan_results
frankvnk 0:c44f0314d6ec 754 //!
frankvnk 0:c44f0314d6ec 755 //! @param[in] scan_timeout parameter not supported
frankvnk 0:c44f0314d6ec 756 //! @param[out] ucResults scan results (_wlan_full_scan_results_args_t)
frankvnk 0:c44f0314d6ec 757 //!
frankvnk 0:c44f0314d6ec 758 //! @return On success, zero is returned. On error, -1 is returned
frankvnk 0:c44f0314d6ec 759 //!
frankvnk 0:c44f0314d6ec 760 //! @brief Gets entry from scan result table.
frankvnk 0:c44f0314d6ec 761 //! The scan results are returned one by one, and each entry
frankvnk 0:c44f0314d6ec 762 //! represents a single AP found in the area. The following is a
frankvnk 0:c44f0314d6ec 763 //! format of the scan result:
frankvnk 0:c44f0314d6ec 764 //! - 4 Bytes: number of networks found
frankvnk 0:c44f0314d6ec 765 //! - 4 Bytes: The status of the scan: 0 - aged results,
frankvnk 0:c44f0314d6ec 766 //! 1 - results valid, 2 - no results
frankvnk 0:c44f0314d6ec 767 //! - 42 bytes: Result entry, where the bytes are arranged as follows:
frankvnk 0:c44f0314d6ec 768 //!
frankvnk 0:c44f0314d6ec 769 //! - 1 bit isValid - is result valid or not
frankvnk 0:c44f0314d6ec 770 //! - 7 bits rssi - RSSI value;
frankvnk 0:c44f0314d6ec 771 //! - 2 bits: securityMode - security mode of the AP:
frankvnk 0:c44f0314d6ec 772 //! 0 - Open, 1 - WEP, 2 WPA, 3 WPA2
frankvnk 0:c44f0314d6ec 773 //! - 6 bits: SSID name length
frankvnk 0:c44f0314d6ec 774 //! - 2 bytes: the time at which the entry has entered into
frankvnk 0:c44f0314d6ec 775 //! scans result table
frankvnk 0:c44f0314d6ec 776 //! - 32 bytes: SSID name
frankvnk 0:c44f0314d6ec 777 //! - 6 bytes: BSSID
frankvnk 0:c44f0314d6ec 778 //!
frankvnk 0:c44f0314d6ec 779 //! @Note scan_timeout, is not supported on this version.
frankvnk 0:c44f0314d6ec 780 //!
frankvnk 0:c44f0314d6ec 781 //! @sa wlan_ioctl_set_scan_params
frankvnk 0:c44f0314d6ec 782 //
frankvnk 0:c44f0314d6ec 783 //*****************************************************************************
frankvnk 0:c44f0314d6ec 784
frankvnk 0:c44f0314d6ec 785 #ifndef CC3000_TINY_DRIVER
frankvnk 0:c44f0314d6ec 786 long wlan_ioctl_get_scan_results(unsigned long ulScanTimeout,
frankvnk 0:c44f0314d6ec 787 unsigned char *ucResults)
frankvnk 0:c44f0314d6ec 788 {
frankvnk 0:c44f0314d6ec 789 unsigned char *ptr;
frankvnk 0:c44f0314d6ec 790 unsigned char *args;
frankvnk 0:c44f0314d6ec 791
frankvnk 0:c44f0314d6ec 792 ptr = tSLInformation.pucTxCommandBuffer;
frankvnk 0:c44f0314d6ec 793 args = (ptr + HEADERS_SIZE_CMD);
frankvnk 0:c44f0314d6ec 794
frankvnk 0:c44f0314d6ec 795 // Fill in temporary command buffer
frankvnk 0:c44f0314d6ec 796 args = UINT32_TO_STREAM(args, ulScanTimeout);
frankvnk 0:c44f0314d6ec 797
frankvnk 0:c44f0314d6ec 798 // Initiate a HCI command
frankvnk 0:c44f0314d6ec 799 hci_command_send(HCI_CMND_WLAN_IOCTL_GET_SCAN_RESULTS, ptr, WLAN_GET_SCAN_RESULTS_PARAMS_LEN);
frankvnk 0:c44f0314d6ec 800
frankvnk 0:c44f0314d6ec 801 // Wait for command complete event
frankvnk 0:c44f0314d6ec 802 SimpleLinkWaitEvent(HCI_CMND_WLAN_IOCTL_GET_SCAN_RESULTS, ucResults);
frankvnk 0:c44f0314d6ec 803
frankvnk 0:c44f0314d6ec 804 return(0);
frankvnk 0:c44f0314d6ec 805 }
frankvnk 0:c44f0314d6ec 806 #endif
frankvnk 0:c44f0314d6ec 807
frankvnk 0:c44f0314d6ec 808 //*****************************************************************************
frankvnk 0:c44f0314d6ec 809 //
frankvnk 0:c44f0314d6ec 810 //! wlan_ioctl_set_scan_params
frankvnk 0:c44f0314d6ec 811 //!
frankvnk 0:c44f0314d6ec 812 //! @param uiEnable - start/stop application scan:
frankvnk 0:c44f0314d6ec 813 //! 1 = start scan with default interval value of 10 min.
frankvnk 0:c44f0314d6ec 814 //! in order to set a different scan interval value apply the value
frankvnk 0:c44f0314d6ec 815 //! in milliseconds. minimum 1 second. 0=stop). Wlan reset
frankvnk 0:c44f0314d6ec 816 //! (wlan_stop() wlan_start()) is needed when changing scan interval
frankvnk 0:c44f0314d6ec 817 //! value. Saved: No
frankvnk 0:c44f0314d6ec 818 //! @param uiMinDwellTime minimum dwell time value to be used for each
frankvnk 0:c44f0314d6ec 819 //! channel, in milliseconds. Saved: yes
frankvnk 0:c44f0314d6ec 820 //! Recommended Value: 100 (Default: 20)
frankvnk 0:c44f0314d6ec 821 //! @param uiMaxDwellTime maximum dwell time value to be used for each
frankvnk 0:c44f0314d6ec 822 //! channel, in milliseconds. Saved: yes
frankvnk 0:c44f0314d6ec 823 //! Recommended Value: 100 (Default: 30)
frankvnk 0:c44f0314d6ec 824 //! @param uiNumOfProbeRequests max probe request between dwell time.
frankvnk 0:c44f0314d6ec 825 //! Saved: yes. Recommended Value: 5 (Default:2)
frankvnk 0:c44f0314d6ec 826 //! @param uiChannelMask bitwise, up to 13 channels (0x1fff).
frankvnk 0:c44f0314d6ec 827 //! Saved: yes. Default: 0x7ff
frankvnk 0:c44f0314d6ec 828 //! @param uiRSSIThreshold RSSI threshold. Saved: yes (Default: -80)
frankvnk 0:c44f0314d6ec 829 //! @param uiSNRThreshold NSR threshold. Saved: yes (Default: 0)
frankvnk 0:c44f0314d6ec 830 //! @param uiDefaultTxPower probe Tx power. Saved: yes (Default: 205)
frankvnk 0:c44f0314d6ec 831 //! @param aiIntervalList pointer to array with 16 entries (16 channels)
frankvnk 0:c44f0314d6ec 832 //! each entry (unsigned long) holds timeout between periodic scan
frankvnk 0:c44f0314d6ec 833 //! (connection scan) - in millisecond. Saved: yes. Default 2000ms.
frankvnk 0:c44f0314d6ec 834 //!
frankvnk 0:c44f0314d6ec 835 //! @return On success, zero is returned. On error, -1 is returned
frankvnk 0:c44f0314d6ec 836 //!
frankvnk 0:c44f0314d6ec 837 //! @brief start and stop scan procedure. Set scan parameters.
frankvnk 0:c44f0314d6ec 838 //!
frankvnk 0:c44f0314d6ec 839 //! @Note uiDefaultTxPower, is not supported on this version.
frankvnk 0:c44f0314d6ec 840 //!
frankvnk 0:c44f0314d6ec 841 //! @sa wlan_ioctl_get_scan_results
frankvnk 0:c44f0314d6ec 842 //
frankvnk 0:c44f0314d6ec 843 //*****************************************************************************
frankvnk 0:c44f0314d6ec 844
frankvnk 0:c44f0314d6ec 845 #ifndef CC3000_TINY_DRIVER
frankvnk 0:c44f0314d6ec 846 long wlan_ioctl_set_scan_params(unsigned long uiEnable,
frankvnk 0:c44f0314d6ec 847 unsigned long uiMinDwellTime,
frankvnk 0:c44f0314d6ec 848 unsigned long uiMaxDwellTime,
frankvnk 0:c44f0314d6ec 849 unsigned long uiNumOfProbeRequests,
frankvnk 0:c44f0314d6ec 850 unsigned long uiChannelMask,
frankvnk 0:c44f0314d6ec 851 long iRSSIThreshold,
frankvnk 0:c44f0314d6ec 852 unsigned long uiSNRThreshold,
frankvnk 0:c44f0314d6ec 853 unsigned long uiDefaultTxPower,
frankvnk 0:c44f0314d6ec 854 unsigned long *aiIntervalList)
frankvnk 0:c44f0314d6ec 855 {
frankvnk 0:c44f0314d6ec 856 unsigned long uiRes;
frankvnk 0:c44f0314d6ec 857 unsigned char *ptr;
frankvnk 0:c44f0314d6ec 858 unsigned char *args;
frankvnk 0:c44f0314d6ec 859
frankvnk 0:c44f0314d6ec 860 ptr = tSLInformation.pucTxCommandBuffer;
frankvnk 0:c44f0314d6ec 861 args = (ptr + HEADERS_SIZE_CMD);
frankvnk 0:c44f0314d6ec 862
frankvnk 0:c44f0314d6ec 863 // Fill in temporary command buffer
frankvnk 0:c44f0314d6ec 864 args = UINT32_TO_STREAM(args, 36);
frankvnk 0:c44f0314d6ec 865 args = UINT32_TO_STREAM(args, uiEnable);
frankvnk 0:c44f0314d6ec 866 args = UINT32_TO_STREAM(args, uiMinDwellTime);
frankvnk 0:c44f0314d6ec 867 args = UINT32_TO_STREAM(args, uiMaxDwellTime);
frankvnk 0:c44f0314d6ec 868 args = UINT32_TO_STREAM(args, uiNumOfProbeRequests);
frankvnk 0:c44f0314d6ec 869 args = UINT32_TO_STREAM(args, uiChannelMask);
frankvnk 0:c44f0314d6ec 870 args = UINT32_TO_STREAM(args, iRSSIThreshold);
frankvnk 0:c44f0314d6ec 871 args = UINT32_TO_STREAM(args, uiSNRThreshold);
frankvnk 0:c44f0314d6ec 872 args = UINT32_TO_STREAM(args, uiDefaultTxPower);
frankvnk 0:c44f0314d6ec 873 ARRAY_TO_STREAM(args, aiIntervalList, sizeof(unsigned long) * SL_SET_SCAN_PARAMS_INTERVAL_LIST_SIZE);
frankvnk 0:c44f0314d6ec 874
frankvnk 0:c44f0314d6ec 875 // Initiate a HCI command
frankvnk 0:c44f0314d6ec 876 hci_command_send(HCI_CMND_WLAN_IOCTL_SET_SCANPARAM, ptr, WLAN_SET_SCAN_PARAMS_LEN);
frankvnk 0:c44f0314d6ec 877
frankvnk 0:c44f0314d6ec 878 // Wait for command complete event
frankvnk 0:c44f0314d6ec 879 SimpleLinkWaitEvent(HCI_CMND_WLAN_IOCTL_SET_SCANPARAM, &uiRes);
frankvnk 0:c44f0314d6ec 880
frankvnk 0:c44f0314d6ec 881 return(uiRes);
frankvnk 0:c44f0314d6ec 882 }
frankvnk 0:c44f0314d6ec 883 #endif
frankvnk 0:c44f0314d6ec 884
frankvnk 0:c44f0314d6ec 885 //*****************************************************************************
frankvnk 0:c44f0314d6ec 886 //
frankvnk 0:c44f0314d6ec 887 //! wlan_set_event_mask
frankvnk 0:c44f0314d6ec 888 //!
frankvnk 0:c44f0314d6ec 889 //! @param mask mask option:
frankvnk 0:c44f0314d6ec 890 //! HCI_EVNT_WLAN_UNSOL_CONNECT connect event
frankvnk 0:c44f0314d6ec 891 //! HCI_EVNT_WLAN_UNSOL_DISCONNECT disconnect event
frankvnk 0:c44f0314d6ec 892 //! HCI_EVNT_WLAN_ASYNC_SIMPLE_CONFIG_DONE smart config done
frankvnk 0:c44f0314d6ec 893 //! HCI_EVNT_WLAN_UNSOL_INIT init done
frankvnk 0:c44f0314d6ec 894 //! HCI_EVNT_WLAN_UNSOL_DHCP dhcp event report
frankvnk 0:c44f0314d6ec 895 //! HCI_EVNT_WLAN_ASYNC_PING_REPORT ping report
frankvnk 0:c44f0314d6ec 896 //! HCI_EVNT_WLAN_KEEPALIVE keepalive
frankvnk 0:c44f0314d6ec 897 //! HCI_EVNT_WLAN_TX_COMPLETE - disable information on end of transmission
frankvnk 0:c44f0314d6ec 898 //! Saved: no.
frankvnk 0:c44f0314d6ec 899 //!
frankvnk 0:c44f0314d6ec 900 //! @return On success, zero is returned. On error, -1 is returned
frankvnk 0:c44f0314d6ec 901 //!
frankvnk 0:c44f0314d6ec 902 //! @brief Mask event according to bit mask. In case that event is
frankvnk 0:c44f0314d6ec 903 //! masked (1), the device will not send the masked event to host.
frankvnk 0:c44f0314d6ec 904 //
frankvnk 0:c44f0314d6ec 905 //*****************************************************************************
frankvnk 0:c44f0314d6ec 906
frankvnk 0:c44f0314d6ec 907 long wlan_set_event_mask(unsigned long ulMask)
frankvnk 0:c44f0314d6ec 908 {
frankvnk 0:c44f0314d6ec 909 long ret;
frankvnk 0:c44f0314d6ec 910 unsigned char *ptr;
frankvnk 0:c44f0314d6ec 911 unsigned char *args;
frankvnk 0:c44f0314d6ec 912
frankvnk 0:c44f0314d6ec 913
frankvnk 0:c44f0314d6ec 914 if ((ulMask & HCI_EVNT_WLAN_TX_COMPLETE) == HCI_EVNT_WLAN_TX_COMPLETE)
frankvnk 0:c44f0314d6ec 915 {
frankvnk 0:c44f0314d6ec 916 tSLInformation.InformHostOnTxComplete = 0;
frankvnk 0:c44f0314d6ec 917
frankvnk 0:c44f0314d6ec 918 // Since an event is a virtual event - i.e. it is not coming from CC3000
frankvnk 0:c44f0314d6ec 919 // there is no need to send anything to the device if it was an only event
frankvnk 0:c44f0314d6ec 920 if (ulMask == HCI_EVNT_WLAN_TX_COMPLETE)
frankvnk 0:c44f0314d6ec 921 {
frankvnk 0:c44f0314d6ec 922 return 0;
frankvnk 0:c44f0314d6ec 923 }
frankvnk 0:c44f0314d6ec 924
frankvnk 0:c44f0314d6ec 925 ulMask &= ~HCI_EVNT_WLAN_TX_COMPLETE;
frankvnk 0:c44f0314d6ec 926 ulMask |= HCI_EVNT_WLAN_UNSOL_BASE;
frankvnk 0:c44f0314d6ec 927 }
frankvnk 0:c44f0314d6ec 928 else
frankvnk 0:c44f0314d6ec 929 {
frankvnk 0:c44f0314d6ec 930 tSLInformation.InformHostOnTxComplete = 1;
frankvnk 0:c44f0314d6ec 931 }
frankvnk 0:c44f0314d6ec 932
frankvnk 0:c44f0314d6ec 933 ret = EFAIL;
frankvnk 0:c44f0314d6ec 934 ptr = tSLInformation.pucTxCommandBuffer;
frankvnk 0:c44f0314d6ec 935 args = (unsigned char *)(ptr + HEADERS_SIZE_CMD);
frankvnk 0:c44f0314d6ec 936
frankvnk 0:c44f0314d6ec 937 // Fill in HCI packet structure
frankvnk 0:c44f0314d6ec 938 args = UINT32_TO_STREAM(args, ulMask);
frankvnk 0:c44f0314d6ec 939
frankvnk 0:c44f0314d6ec 940 // Initiate a HCI command
frankvnk 0:c44f0314d6ec 941 hci_command_send(HCI_CMND_EVENT_MASK, ptr, WLAN_SET_MASK_PARAMS_LEN);
frankvnk 0:c44f0314d6ec 942
frankvnk 0:c44f0314d6ec 943 // Wait for command complete event
frankvnk 0:c44f0314d6ec 944 SimpleLinkWaitEvent(HCI_CMND_EVENT_MASK, &ret);
frankvnk 0:c44f0314d6ec 945
frankvnk 0:c44f0314d6ec 946 return(ret);
frankvnk 0:c44f0314d6ec 947 }
frankvnk 0:c44f0314d6ec 948
frankvnk 0:c44f0314d6ec 949 //*****************************************************************************
frankvnk 0:c44f0314d6ec 950 //
frankvnk 0:c44f0314d6ec 951 //! wlan_ioctl_statusget
frankvnk 0:c44f0314d6ec 952 //!
frankvnk 0:c44f0314d6ec 953 //! @param none
frankvnk 0:c44f0314d6ec 954 //!
frankvnk 0:c44f0314d6ec 955 //! @return WLAN_STATUS_DISCONNECTED, WLAN_STATUS_SCANING,
frankvnk 0:c44f0314d6ec 956 //! STATUS_CONNECTING or WLAN_STATUS_CONNECTED
frankvnk 0:c44f0314d6ec 957 //!
frankvnk 0:c44f0314d6ec 958 //! @brief get wlan status: disconnected, scanning, connecting or connected
frankvnk 0:c44f0314d6ec 959 //
frankvnk 0:c44f0314d6ec 960 //*****************************************************************************
frankvnk 0:c44f0314d6ec 961
frankvnk 0:c44f0314d6ec 962 #ifndef CC3000_TINY_DRIVER
frankvnk 0:c44f0314d6ec 963 long wlan_ioctl_statusget(void)
frankvnk 0:c44f0314d6ec 964 {
frankvnk 0:c44f0314d6ec 965 long ret;
frankvnk 0:c44f0314d6ec 966 unsigned char *ptr;
frankvnk 0:c44f0314d6ec 967
frankvnk 0:c44f0314d6ec 968 ret = EFAIL;
frankvnk 0:c44f0314d6ec 969 ptr = tSLInformation.pucTxCommandBuffer;
frankvnk 0:c44f0314d6ec 970
frankvnk 0:c44f0314d6ec 971 hci_command_send(HCI_CMND_WLAN_IOCTL_STATUSGET,ptr, 0);
frankvnk 0:c44f0314d6ec 972
frankvnk 0:c44f0314d6ec 973 // Wait for command complete event
frankvnk 0:c44f0314d6ec 974 SimpleLinkWaitEvent(HCI_CMND_WLAN_IOCTL_STATUSGET, &ret);
frankvnk 0:c44f0314d6ec 975
frankvnk 0:c44f0314d6ec 976 return(ret);
frankvnk 0:c44f0314d6ec 977 }
frankvnk 0:c44f0314d6ec 978 #endif
frankvnk 0:c44f0314d6ec 979
frankvnk 0:c44f0314d6ec 980 //*****************************************************************************
frankvnk 0:c44f0314d6ec 981 //
frankvnk 0:c44f0314d6ec 982 //! wlan_smart_config_start
frankvnk 0:c44f0314d6ec 983 //!
frankvnk 0:c44f0314d6ec 984 //! @param algoEncryptedFlag indicates whether the information is encrypted
frankvnk 0:c44f0314d6ec 985 //!
frankvnk 0:c44f0314d6ec 986 //! @return On success, zero is returned. On error, -1 is returned
frankvnk 0:c44f0314d6ec 987 //!
frankvnk 0:c44f0314d6ec 988 //! @brief Start to acquire device profile. The device acquire its own
frankvnk 0:c44f0314d6ec 989 //! profile, if profile message is found. The acquired AP information
frankvnk 0:c44f0314d6ec 990 //! is stored in CC3000 EEPROM only in case AES128 encryption is used.
frankvnk 0:c44f0314d6ec 991 //! In case AES128 encryption is not used, a profile is created by
frankvnk 0:c44f0314d6ec 992 //! CC3000 internally.
frankvnk 0:c44f0314d6ec 993 //!
frankvnk 0:c44f0314d6ec 994 //! @Note An asynchronous event - Smart Config Done will be generated as soon
frankvnk 0:c44f0314d6ec 995 //! as the process finishes successfully.
frankvnk 0:c44f0314d6ec 996 //!
frankvnk 0:c44f0314d6ec 997 //! @sa wlan_smart_config_set_prefix , wlan_smart_config_stop
frankvnk 0:c44f0314d6ec 998 //
frankvnk 0:c44f0314d6ec 999 //*****************************************************************************
frankvnk 0:c44f0314d6ec 1000
frankvnk 0:c44f0314d6ec 1001 long wlan_smart_config_start(unsigned long algoEncryptedFlag)
frankvnk 0:c44f0314d6ec 1002 {
frankvnk 0:c44f0314d6ec 1003 long ret;
frankvnk 0:c44f0314d6ec 1004 unsigned char *ptr;
frankvnk 0:c44f0314d6ec 1005 unsigned char *args;
frankvnk 0:c44f0314d6ec 1006
frankvnk 0:c44f0314d6ec 1007 ret = EFAIL;
frankvnk 0:c44f0314d6ec 1008 ptr = tSLInformation.pucTxCommandBuffer;
frankvnk 0:c44f0314d6ec 1009 args = (unsigned char *)(ptr + HEADERS_SIZE_CMD);
frankvnk 0:c44f0314d6ec 1010
frankvnk 0:c44f0314d6ec 1011 // Fill in HCI packet structure
frankvnk 0:c44f0314d6ec 1012 args = UINT32_TO_STREAM(args, algoEncryptedFlag);
frankvnk 0:c44f0314d6ec 1013 ret = EFAIL;
frankvnk 0:c44f0314d6ec 1014
frankvnk 0:c44f0314d6ec 1015 hci_command_send(HCI_CMND_WLAN_IOCTL_SIMPLE_CONFIG_START, ptr, WLAN_SMART_CONFIG_START_PARAMS_LEN);
frankvnk 0:c44f0314d6ec 1016
frankvnk 0:c44f0314d6ec 1017 // Wait for command complete event
frankvnk 0:c44f0314d6ec 1018 SimpleLinkWaitEvent(HCI_CMND_WLAN_IOCTL_SIMPLE_CONFIG_START, &ret);
frankvnk 0:c44f0314d6ec 1019
frankvnk 0:c44f0314d6ec 1020 return(ret);
frankvnk 0:c44f0314d6ec 1021 }
frankvnk 0:c44f0314d6ec 1022
frankvnk 0:c44f0314d6ec 1023 //*****************************************************************************
frankvnk 0:c44f0314d6ec 1024 //
frankvnk 0:c44f0314d6ec 1025 //! wlan_smart_config_stop
frankvnk 0:c44f0314d6ec 1026 //!
frankvnk 0:c44f0314d6ec 1027 //! @param algoEncryptedFlag indicates whether the information is encrypted
frankvnk 0:c44f0314d6ec 1028 //!
frankvnk 0:c44f0314d6ec 1029 //! @return On success, zero is returned. On error, -1 is returned
frankvnk 0:c44f0314d6ec 1030 //!
frankvnk 0:c44f0314d6ec 1031 //! @brief Stop the acquire profile procedure
frankvnk 0:c44f0314d6ec 1032 //!
frankvnk 0:c44f0314d6ec 1033 //! @sa wlan_smart_config_start , wlan_smart_config_set_prefix
frankvnk 0:c44f0314d6ec 1034 //
frankvnk 0:c44f0314d6ec 1035 //*****************************************************************************
frankvnk 0:c44f0314d6ec 1036
frankvnk 0:c44f0314d6ec 1037 long wlan_smart_config_stop(void)
frankvnk 0:c44f0314d6ec 1038 {
frankvnk 0:c44f0314d6ec 1039 long ret;
frankvnk 0:c44f0314d6ec 1040 unsigned char *ptr;
frankvnk 0:c44f0314d6ec 1041
frankvnk 0:c44f0314d6ec 1042 ret = EFAIL;
frankvnk 0:c44f0314d6ec 1043 ptr = tSLInformation.pucTxCommandBuffer;
frankvnk 0:c44f0314d6ec 1044
frankvnk 0:c44f0314d6ec 1045 hci_command_send(HCI_CMND_WLAN_IOCTL_SIMPLE_CONFIG_STOP, ptr, 0);
frankvnk 0:c44f0314d6ec 1046
frankvnk 0:c44f0314d6ec 1047 // Wait for command complete event
frankvnk 0:c44f0314d6ec 1048 SimpleLinkWaitEvent(HCI_CMND_WLAN_IOCTL_SIMPLE_CONFIG_STOP, &ret);
frankvnk 0:c44f0314d6ec 1049
frankvnk 0:c44f0314d6ec 1050 return(ret);
frankvnk 0:c44f0314d6ec 1051 }
frankvnk 0:c44f0314d6ec 1052
frankvnk 0:c44f0314d6ec 1053 //*****************************************************************************
frankvnk 0:c44f0314d6ec 1054 //
frankvnk 0:c44f0314d6ec 1055 //! wlan_smart_config_set_prefix
frankvnk 0:c44f0314d6ec 1056 //!
frankvnk 0:c44f0314d6ec 1057 //! @param newPrefix 3 bytes identify the SSID prefix for the Smart Config.
frankvnk 0:c44f0314d6ec 1058 //!
frankvnk 0:c44f0314d6ec 1059 //! @return On success, zero is returned. On error, -1 is returned
frankvnk 0:c44f0314d6ec 1060 //!
frankvnk 0:c44f0314d6ec 1061 //! @brief Configure station ssid prefix. The prefix is used internally
frankvnk 0:c44f0314d6ec 1062 //! in CC3000. It should always be TTT.
frankvnk 0:c44f0314d6ec 1063 //!
frankvnk 0:c44f0314d6ec 1064 //! @Note The prefix is stored in CC3000 NVMEM
frankvnk 0:c44f0314d6ec 1065 //!
frankvnk 0:c44f0314d6ec 1066 //! @sa wlan_smart_config_start , wlan_smart_config_stop
frankvnk 0:c44f0314d6ec 1067 //
frankvnk 0:c44f0314d6ec 1068 //*****************************************************************************
frankvnk 0:c44f0314d6ec 1069
frankvnk 0:c44f0314d6ec 1070 long wlan_smart_config_set_prefix(char* cNewPrefix)
frankvnk 0:c44f0314d6ec 1071 {
frankvnk 0:c44f0314d6ec 1072 long ret;
frankvnk 0:c44f0314d6ec 1073 unsigned char *ptr;
frankvnk 0:c44f0314d6ec 1074 unsigned char *args;
frankvnk 0:c44f0314d6ec 1075
frankvnk 0:c44f0314d6ec 1076 ret = EFAIL;
frankvnk 0:c44f0314d6ec 1077 ptr = tSLInformation.pucTxCommandBuffer;
frankvnk 0:c44f0314d6ec 1078 args = (ptr + HEADERS_SIZE_CMD);
frankvnk 0:c44f0314d6ec 1079
frankvnk 0:c44f0314d6ec 1080 if (cNewPrefix == NULL)
frankvnk 0:c44f0314d6ec 1081 return ret;
frankvnk 0:c44f0314d6ec 1082 else // with the new Smart Config, prefix must be TTT
frankvnk 0:c44f0314d6ec 1083 {
frankvnk 0:c44f0314d6ec 1084 *cNewPrefix = 'T';
frankvnk 0:c44f0314d6ec 1085 *(cNewPrefix + 1) = 'T';
frankvnk 0:c44f0314d6ec 1086 *(cNewPrefix + 2) = 'T';
frankvnk 0:c44f0314d6ec 1087 }
frankvnk 0:c44f0314d6ec 1088
frankvnk 0:c44f0314d6ec 1089 ARRAY_TO_STREAM(args, cNewPrefix, SL_SIMPLE_CONFIG_PREFIX_LENGTH);
frankvnk 0:c44f0314d6ec 1090
frankvnk 0:c44f0314d6ec 1091 hci_command_send(HCI_CMND_WLAN_IOCTL_SIMPLE_CONFIG_SET_PREFIX, ptr, SL_SIMPLE_CONFIG_PREFIX_LENGTH);
frankvnk 0:c44f0314d6ec 1092
frankvnk 0:c44f0314d6ec 1093 // Wait for command complete event
frankvnk 0:c44f0314d6ec 1094 SimpleLinkWaitEvent(HCI_CMND_WLAN_IOCTL_SIMPLE_CONFIG_SET_PREFIX, &ret);
frankvnk 0:c44f0314d6ec 1095
frankvnk 0:c44f0314d6ec 1096 return(ret);
frankvnk 0:c44f0314d6ec 1097 }
frankvnk 0:c44f0314d6ec 1098
frankvnk 0:c44f0314d6ec 1099 //*****************************************************************************
frankvnk 0:c44f0314d6ec 1100 //
frankvnk 0:c44f0314d6ec 1101 //! wlan_smart_config_process
frankvnk 0:c44f0314d6ec 1102 //!
frankvnk 0:c44f0314d6ec 1103 //! @param none
frankvnk 0:c44f0314d6ec 1104 //!
frankvnk 0:c44f0314d6ec 1105 //! @return On success, zero is returned. On error, -1 is returned
frankvnk 0:c44f0314d6ec 1106 //!
frankvnk 0:c44f0314d6ec 1107 //! @brief process the acquired data and store it as a profile. The acquired
frankvnk 0:c44f0314d6ec 1108 //! AP information is stored in CC3000 EEPROM encrypted.
frankvnk 0:c44f0314d6ec 1109 //! The encrypted data is decrypted and stored as a profile.
frankvnk 0:c44f0314d6ec 1110 //! behavior is as defined by connection policy.
frankvnk 0:c44f0314d6ec 1111 //
frankvnk 0:c44f0314d6ec 1112 //*****************************************************************************
frankvnk 0:c44f0314d6ec 1113
frankvnk 0:c44f0314d6ec 1114
frankvnk 0:c44f0314d6ec 1115 #ifndef CC3000_UNENCRYPTED_SMART_CONFIG
frankvnk 0:c44f0314d6ec 1116 long wlan_smart_config_process()
frankvnk 0:c44f0314d6ec 1117 {
frankvnk 0:c44f0314d6ec 1118 signed long returnValue;
frankvnk 0:c44f0314d6ec 1119 unsigned long ssidLen, keyLen;
frankvnk 0:c44f0314d6ec 1120 unsigned char *decKeyPtr;
frankvnk 0:c44f0314d6ec 1121 unsigned char *ssidPtr;
frankvnk 0:c44f0314d6ec 1122
frankvnk 0:c44f0314d6ec 1123 // read the key from EEPROM - fileID 12
frankvnk 0:c44f0314d6ec 1124 returnValue = aes_read_key(key);
frankvnk 0:c44f0314d6ec 1125
frankvnk 0:c44f0314d6ec 1126 if (returnValue != 0)
frankvnk 0:c44f0314d6ec 1127 return returnValue;
frankvnk 0:c44f0314d6ec 1128
frankvnk 0:c44f0314d6ec 1129 // read the received data from fileID #13 and parse it according to the followings:
frankvnk 0:c44f0314d6ec 1130 // 1) SSID LEN - not encrypted
frankvnk 0:c44f0314d6ec 1131 // 2) SSID - not encrypted
frankvnk 0:c44f0314d6ec 1132 // 3) KEY LEN - not encrypted. always 32 bytes long
frankvnk 0:c44f0314d6ec 1133 // 4) Security type - not encrypted
frankvnk 0:c44f0314d6ec 1134 // 5) KEY - encrypted together with true key length as the first byte in KEY
frankvnk 0:c44f0314d6ec 1135 // to elaborate, there are two corner cases:
frankvnk 0:c44f0314d6ec 1136 // 1) the KEY is 32 bytes long. In this case, the first byte does not represent KEY length
frankvnk 0:c44f0314d6ec 1137 // 2) the KEY is 31 bytes long. In this case, the first byte represent KEY length and equals 31
frankvnk 0:c44f0314d6ec 1138 returnValue = nvmem_read(NVMEM_SHARED_MEM_FILEID, SMART_CONFIG_PROFILE_SIZE, 0, profileArray);
frankvnk 0:c44f0314d6ec 1139
frankvnk 0:c44f0314d6ec 1140 if (returnValue != 0)
frankvnk 0:c44f0314d6ec 1141 return returnValue;
frankvnk 0:c44f0314d6ec 1142
frankvnk 0:c44f0314d6ec 1143 ssidPtr = &profileArray[1];
frankvnk 0:c44f0314d6ec 1144
frankvnk 0:c44f0314d6ec 1145 ssidLen = profileArray[0];
frankvnk 0:c44f0314d6ec 1146
frankvnk 0:c44f0314d6ec 1147 decKeyPtr = &profileArray[profileArray[0] + 3];
frankvnk 0:c44f0314d6ec 1148
frankvnk 0:c44f0314d6ec 1149 aes_decrypt(decKeyPtr, key);
frankvnk 0:c44f0314d6ec 1150 if (profileArray[profileArray[0] + 1] > 16)
frankvnk 0:c44f0314d6ec 1151 aes_decrypt((unsigned char *)(decKeyPtr + 16), key);
frankvnk 0:c44f0314d6ec 1152
frankvnk 0:c44f0314d6ec 1153 if (*(unsigned char *)(decKeyPtr +31) != 0)
frankvnk 0:c44f0314d6ec 1154 {
frankvnk 0:c44f0314d6ec 1155 if (*decKeyPtr == 31)
frankvnk 0:c44f0314d6ec 1156 {
frankvnk 0:c44f0314d6ec 1157 keyLen = 31;
frankvnk 0:c44f0314d6ec 1158 decKeyPtr++;
frankvnk 0:c44f0314d6ec 1159 }
frankvnk 0:c44f0314d6ec 1160 else
frankvnk 0:c44f0314d6ec 1161 {
frankvnk 0:c44f0314d6ec 1162 keyLen = 32;
frankvnk 0:c44f0314d6ec 1163 }
frankvnk 0:c44f0314d6ec 1164 }
frankvnk 0:c44f0314d6ec 1165 else
frankvnk 0:c44f0314d6ec 1166 {
frankvnk 0:c44f0314d6ec 1167 keyLen = *decKeyPtr;
frankvnk 0:c44f0314d6ec 1168 decKeyPtr++;
frankvnk 0:c44f0314d6ec 1169 }
frankvnk 0:c44f0314d6ec 1170
frankvnk 0:c44f0314d6ec 1171 // add a profile
frankvnk 0:c44f0314d6ec 1172 switch (profileArray[profileArray[0] + 2])
frankvnk 0:c44f0314d6ec 1173 {
frankvnk 0:c44f0314d6ec 1174 case WLAN_SEC_UNSEC://None
frankvnk 0:c44f0314d6ec 1175 {
frankvnk 0:c44f0314d6ec 1176 returnValue = wlan_add_profile(profileArray[profileArray[0] + 2], // security type
frankvnk 0:c44f0314d6ec 1177 ssidPtr, // SSID
frankvnk 0:c44f0314d6ec 1178 ssidLen, // SSID length
frankvnk 0:c44f0314d6ec 1179 NULL, // BSSID
frankvnk 0:c44f0314d6ec 1180 1, // Priority
frankvnk 0:c44f0314d6ec 1181 0, 0, 0, 0, 0);
frankvnk 0:c44f0314d6ec 1182
frankvnk 0:c44f0314d6ec 1183 break;
frankvnk 0:c44f0314d6ec 1184 }
frankvnk 0:c44f0314d6ec 1185
frankvnk 0:c44f0314d6ec 1186 case WLAN_SEC_WEP://WEP
frankvnk 0:c44f0314d6ec 1187 {
frankvnk 0:c44f0314d6ec 1188 returnValue = wlan_add_profile(profileArray[profileArray[0] + 2], // security type
frankvnk 0:c44f0314d6ec 1189 ssidPtr, // SSID
frankvnk 0:c44f0314d6ec 1190 ssidLen, // SSID length
frankvnk 0:c44f0314d6ec 1191 NULL, // BSSID
frankvnk 0:c44f0314d6ec 1192 1, // Priority
frankvnk 0:c44f0314d6ec 1193 keyLen, // KEY length
frankvnk 0:c44f0314d6ec 1194 0, // KEY index
frankvnk 0:c44f0314d6ec 1195 0,
frankvnk 0:c44f0314d6ec 1196 decKeyPtr, // KEY
frankvnk 0:c44f0314d6ec 1197 0);
frankvnk 0:c44f0314d6ec 1198
frankvnk 0:c44f0314d6ec 1199 break;
frankvnk 0:c44f0314d6ec 1200 }
frankvnk 0:c44f0314d6ec 1201
frankvnk 0:c44f0314d6ec 1202 case WLAN_SEC_WPA://WPA
frankvnk 0:c44f0314d6ec 1203 case WLAN_SEC_WPA2://WPA2
frankvnk 0:c44f0314d6ec 1204 {
frankvnk 0:c44f0314d6ec 1205 returnValue = wlan_add_profile(WLAN_SEC_WPA2, // security type
frankvnk 0:c44f0314d6ec 1206 ssidPtr,
frankvnk 0:c44f0314d6ec 1207 ssidLen,
frankvnk 0:c44f0314d6ec 1208 NULL, // BSSID
frankvnk 0:c44f0314d6ec 1209 1, // Priority
frankvnk 0:c44f0314d6ec 1210 0x18, // PairwiseCipher
frankvnk 0:c44f0314d6ec 1211 0x1e, // GroupCipher
frankvnk 0:c44f0314d6ec 1212 2, // KEY management
frankvnk 0:c44f0314d6ec 1213 decKeyPtr, // KEY
frankvnk 0:c44f0314d6ec 1214 keyLen); // KEY length
frankvnk 0:c44f0314d6ec 1215
frankvnk 0:c44f0314d6ec 1216 break;
frankvnk 0:c44f0314d6ec 1217 }
frankvnk 0:c44f0314d6ec 1218 }
frankvnk 0:c44f0314d6ec 1219
frankvnk 0:c44f0314d6ec 1220 return returnValue;
frankvnk 0:c44f0314d6ec 1221 }
frankvnk 0:c44f0314d6ec 1222 #endif //CC3000_UNENCRYPTED_SMART_CONFIG
frankvnk 0:c44f0314d6ec 1223
frankvnk 0:c44f0314d6ec 1224 //*****************************************************************************
frankvnk 0:c44f0314d6ec 1225 //
frankvnk 0:c44f0314d6ec 1226 // Close the Doxygen group.
frankvnk 0:c44f0314d6ec 1227 //! @}
frankvnk 0:c44f0314d6ec 1228 //
frankvnk 0:c44f0314d6ec 1229 //*****************************************************************************
frankvnk 0:c44f0314d6ec 1230
frankvnk 0:c44f0314d6ec 1231