123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403 |
- /* wifi_connect.c
- *
- * Copyright (C) 2006-2024 wolfSSL Inc.
- *
- * This file is part of wolfSSL.
- *
- * wolfSSL is free software; you can redistribute it and/or modify
- * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation; either version 2 of the License, or
- * (at your option) any later version.
- *
- * wolfSSL is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- * GNU General Public License for more details.
- *
- * You should have received a copy of the GNU General Public License
- * along with this program; if not, write to the Free Software
- * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA
- */
- #include "wifi_connect.h"
- /* FreeRTOS */
- #include <freertos/FreeRTOS.h>
- #include <freertos/task.h>
- #include <freertos/event_groups.h>
- /* Espressif */
- #include <esp_log.h>
- #include <esp_idf_version.h>
- #include <esp_wifi.h>
- /* wolfSSL */
- /* Always include wolfcrypt/settings.h before any other wolfSSL file. */
- /* Reminder: settings.h pulls in user_settings.h; don't include it here. */
- #ifdef WOLFSSL_USER_SETTINGS
- #include <wolfssl/wolfcrypt/settings.h>
- #ifndef WOLFSSL_ESPIDF
- #warning "Problem with wolfSSL user_settings."
- #warning "Check components/wolfssl/include"
- #endif
- #include <wolfssl/version.h>
- #include <wolfssl/wolfcrypt/types.h>
- #else
- /* Define WOLFSSL_USER_SETTINGS project wide for settings.h to include */
- /* wolfSSL user settings in ./components/wolfssl/include/user_settings.h */
- #error "Missing WOLFSSL_USER_SETTINGS in CMakeLists or Makefile:\
- CFLAGS +=-DWOLFSSL_USER_SETTINGS"
- #endif
- /* When there's too little heap, WiFi quietly refuses to connect */
- #define WIFI_LOW_HEAP_WARNING 21132
- #if defined(CONFIG_IDF_TARGET_ESP8266)
- #elif ESP_IDF_VERSION_MAJOR >= 5
- /* example path set in cmake file */
- #elif ESP_IDF_VERSION_MAJOR >= 4
- #include "protocol_examples_common.h"
- #else
- const static int CONNECTED_BIT = BIT0;
- static EventGroupHandle_t wifi_event_group;
- #endif
- #if defined(CONFIG_IDF_TARGET_ESP8266)
- #elif defined(ESP_IDF_VERSION_MAJOR) && defined(ESP_IDF_VERSION_MINOR)
- #if ESP_IDF_VERSION_MAJOR >= 4
- /* likely using examples, see wifi_connect.h */
- #else
- /* TODO - still supporting pre V4 ? */
- const static int CONNECTED_BIT = BIT0;
- static EventGroupHandle_t wifi_event_group;
- #endif
- #if (ESP_IDF_VERSION_MAJOR == 5)
- #define HAS_WPA3_FEATURES
- #else
- #undef HAS_WPA3_FEATURES
- #endif
- #else
- /* TODO Consider pre IDF v5? */
- #endif
- /* breadcrumb prefix for logging */
- const static char *TAG = "wifi_connect";
- #if defined(CONFIG_IDF_TARGET_ESP8266)
- #ifndef CONFIG_ESP_MAX_STA_CONN
- #define CONFIG_ESP_MAX_STA_CONN 4
- #endif
- #define EXAMPLE_MAX_STA_CONN CONFIG_ESP_MAX_STA_CONN
- #define WIFI_CONNECTED_BIT BIT0
- #define WIFI_FAIL_BIT BIT1
- #ifndef CONFIG_ESP_MAXIMUM_RETRY
- #define CONFIG_ESP_MAXIMUM_RETRY 5
- #endif
- /* FreeRTOS event group to signal when we are connected*/
- static EventGroupHandle_t s_wifi_event_group;
- static int s_retry_num = 0;
- #define EXAMPLE_ESP_MAXIMUM_RETRY CONFIG_ESP_MAXIMUM_RETRY
- static void event_handler(void* arg, esp_event_base_t event_base,
- int32_t event_id, void* event_data)
- {
- if (event_base == WIFI_EVENT && event_id == WIFI_EVENT_STA_START) {
- esp_wifi_connect();
- } else if (event_base == WIFI_EVENT && event_id == WIFI_EVENT_STA_DISCONNECTED) {
- if (s_retry_num < EXAMPLE_ESP_MAXIMUM_RETRY) {
- esp_wifi_connect();
- s_retry_num++;
- ESP_LOGI(TAG, "retry to connect to the AP");
- } else {
- xEventGroupSetBits(s_wifi_event_group, WIFI_FAIL_BIT);
- }
- ESP_LOGI(TAG,"connect to the AP fail");
- } else if (event_base == IP_EVENT && event_id == IP_EVENT_STA_GOT_IP) {
- ip_event_got_ip_t* event = (ip_event_got_ip_t*) event_data;
- ESP_LOGI(TAG, "got ip:%s",
- ip4addr_ntoa(&event->ip_info.ip));
- s_retry_num = 0;
- xEventGroupSetBits(s_wifi_event_group, WIFI_CONNECTED_BIT);
- }
- }
- int wifi_init_sta(void)
- {
- word32 this_heap;
- s_wifi_event_group = xEventGroupCreate();
- tcpip_adapter_init();
- ESP_ERROR_CHECK(esp_event_loop_create_default());
- wifi_init_config_t cfg = WIFI_INIT_CONFIG_DEFAULT();
- ESP_ERROR_CHECK(esp_wifi_init(&cfg));
- ESP_ERROR_CHECK(esp_event_handler_register(WIFI_EVENT, ESP_EVENT_ANY_ID, &event_handler, NULL));
- ESP_ERROR_CHECK(esp_event_handler_register(IP_EVENT, IP_EVENT_STA_GOT_IP, &event_handler, NULL));
- wifi_config_t wifi_config = {
- .sta = {
- .ssid = EXAMPLE_ESP_WIFI_SSID,
- .password = EXAMPLE_ESP_WIFI_PASS
- },
- };
- /* Setting a password implies station will connect to all security modes including WEP/WPA.
- * However these modes are deprecated and not advisable to be used. In case your Access point
- * doesn't support WPA2, these mode can be enabled by commenting below line */
- if (strlen((char *)wifi_config.sta.password)) {
- wifi_config.sta.threshold.authmode = WIFI_AUTH_WPA2_PSK;
- }
- ESP_ERROR_CHECK(esp_wifi_set_mode(WIFI_MODE_STA) );
- ESP_ERROR_CHECK(esp_wifi_set_config(ESP_IF_WIFI_STA, &wifi_config) );
- ESP_ERROR_CHECK(esp_wifi_start() );
- ESP_LOGI(TAG, "wifi_init_sta finished. Connecting...");
- this_heap = esp_get_free_heap_size();
- ESP_LOGI(TAG, "this heap = %d", this_heap);
- if (this_heap < WIFI_LOW_HEAP_WARNING) {
- ESP_LOGW(TAG, "Warning: WiFi low heap: %d", WIFI_LOW_HEAP_WARNING);
- }
- /* Waiting until either the connection is established (WIFI_CONNECTED_BIT) or connection failed for the maximum
- * number of re-tries (WIFI_FAIL_BIT). The bits are set by event_handler() (see above) */
- EventBits_t bits = xEventGroupWaitBits(s_wifi_event_group,
- WIFI_CONNECTED_BIT | WIFI_FAIL_BIT,
- pdFALSE,
- pdFALSE,
- portMAX_DELAY);
- ESP_LOGI(TAG, "xEventGroupWaitBits finished.");
- /* xEventGroupWaitBits() returns the bits before the call returned, hence we can test which event actually
- * happened. */
- if (bits & WIFI_CONNECTED_BIT) {
- ESP_LOGI(TAG, "connected to ap SSID:%s",
- EXAMPLE_ESP_WIFI_SSID);
- } else if (bits & WIFI_FAIL_BIT) {
- ESP_LOGI(TAG, "Failed to connect to SSID:%s, password:%s",
- EXAMPLE_ESP_WIFI_SSID, EXAMPLE_ESP_WIFI_PASS);
- } else {
- ESP_LOGE(TAG, "UNEXPECTED EVENT");
- }
- ESP_ERROR_CHECK(esp_event_handler_unregister(IP_EVENT, IP_EVENT_STA_GOT_IP, &event_handler));
- ESP_ERROR_CHECK(esp_event_handler_unregister(WIFI_EVENT, ESP_EVENT_ANY_ID, &event_handler));
- vEventGroupDelete(s_wifi_event_group);
- return ESP_OK;
- }
- #elif ESP_IDF_VERSION_MAJOR < 4
- /* event handler for wifi events */
- static esp_err_t wifi_event_handler(void *ctx, system_event_t *event)
- {
- switch (event->event_id)
- {
- case SYSTEM_EVENT_STA_START:
- esp_wifi_connect();
- break;
- case SYSTEM_EVENT_STA_GOT_IP:
- #if ESP_IDF_VERSION_MAJOR >= 4
- ESP_LOGI(TAG, "got ip:" IPSTR "\n",
- IP2STR(&event->event_info.got_ip.ip_info.ip));
- #else
- ESP_LOGI(TAG, "got ip:%s",
- ip4addr_ntoa(&event->event_info.got_ip.ip_info.ip));
- #endif
- /* see Espressif api-reference/system/freertos_idf.html */
- xEventGroupSetBits(wifi_event_group, CONNECTED_BIT);
- break;
- case SYSTEM_EVENT_STA_DISCONNECTED:
- esp_wifi_connect();
- xEventGroupClearBits(wifi_event_group, CONNECTED_BIT);
- break;
- default:
- break;
- }
- return ESP_OK;
- }
- #else
- #ifdef CONFIG_ESP_MAXIMUM_RETRY
- #define EXAMPLE_ESP_MAXIMUM_RETRY CONFIG_ESP_MAXIMUM_RETRY
- #else
- #define CONFIG_ESP_MAXIMUM_RETRY 5
- #endif
- #if CONFIG_ESP_WIFI_AUTH_OPEN
- #define ESP_WIFI_SCAN_AUTH_MODE_THRESHOLD WIFI_AUTH_OPEN
- #elif CONFIG_ESP_WIFI_AUTH_WEP
- #define ESP_WIFI_SCAN_AUTH_MODE_THRESHOLD WIFI_AUTH_WEP
- #elif CONFIG_ESP_WIFI_AUTH_WPA_PSK
- #define ESP_WIFI_SCAN_AUTH_MODE_THRESHOLD WIFI_AUTH_WPA_PSK
- #elif CONFIG_ESP_WIFI_AUTH_WPA2_PSK
- #define ESP_WIFI_SCAN_AUTH_MODE_THRESHOLD WIFI_AUTH_WPA2_PSK
- #elif CONFIG_ESP_WIFI_AUTH_WPA_WPA2_PSK
- #define ESP_WIFI_SCAN_AUTH_MODE_THRESHOLD WIFI_AUTH_WPA_WPA2_PSK
- #elif CONFIG_ESP_WIFI_AUTH_WPA3_PSK
- #define ESP_WIFI_SCAN_AUTH_MODE_THRESHOLD WIFI_AUTH_WPA3_PSK
- #elif CONFIG_ESP_WIFI_AUTH_WPA2_WPA3_PSK
- #define ESP_WIFI_SCAN_AUTH_MODE_THRESHOLD WIFI_AUTH_WPA2_WPA3_PSK
- #elif CONFIG_ESP_WIFI_AUTH_WAPI_PSK
- #define ESP_WIFI_SCAN_AUTH_MODE_THRESHOLD WIFI_AUTH_WAPI_PSK
- #endif
- #ifndef ESP_WIFI_SCAN_AUTH_MODE_THRESHOLD
- #define CONFIG_ESP_WIFI_AUTH_WPA2_PSK 1
- #define ESP_WIFI_SCAN_AUTH_MODE_THRESHOLD CONFIG_ESP_WIFI_AUTH_WPA2_PSK
- #endif
- /* FreeRTOS event group to signal when we are connected*/
- static EventGroupHandle_t s_wifi_event_group;
- /* The event group allows multiple bits for each event, but we only care about two events:
- * - we are connected to the AP with an IP
- * - we failed to connect after the maximum amount of retries */
- #define WIFI_CONNECTED_BIT BIT0
- #define WIFI_FAIL_BIT BIT1
- static int s_retry_num = 0;
- ip_event_got_ip_t* event;
- static void event_handler(void* arg,
- esp_event_base_t event_base,
- int32_t event_id,
- void* event_data)
- {
- if (event_base == WIFI_EVENT && event_id == WIFI_EVENT_STA_START) {
- esp_wifi_connect();
- }
- else if (event_base == WIFI_EVENT &&
- event_id == WIFI_EVENT_STA_DISCONNECTED) {
- if (s_retry_num < EXAMPLE_ESP_MAXIMUM_RETRY) {
- esp_wifi_connect();
- s_retry_num++;
- ESP_LOGI(TAG, "retry to connect to the AP");
- }
- else {
- xEventGroupSetBits(s_wifi_event_group, WIFI_FAIL_BIT);
- }
- ESP_LOGI(TAG, "connect to the AP fail");
- }
- else if (event_base == IP_EVENT && event_id == IP_EVENT_STA_GOT_IP) {
- event = (ip_event_got_ip_t*) event_data;
- wifi_show_ip();
- s_retry_num = 0;
- xEventGroupSetBits(s_wifi_event_group, WIFI_CONNECTED_BIT);
- }
- }
- int wifi_init_sta(void)
- {
- int ret = ESP_OK;
- s_wifi_event_group = xEventGroupCreate();
- ESP_ERROR_CHECK(esp_netif_init());
- ESP_ERROR_CHECK(esp_event_loop_create_default());
- esp_netif_create_default_wifi_sta();
- wifi_init_config_t cfg = WIFI_INIT_CONFIG_DEFAULT();
- ESP_ERROR_CHECK(esp_wifi_init(&cfg));
- esp_event_handler_instance_t instance_any_id;
- esp_event_handler_instance_t instance_got_ip;
- ESP_ERROR_CHECK(esp_event_handler_instance_register(WIFI_EVENT,
- ESP_EVENT_ANY_ID,
- &event_handler,
- NULL,
- &instance_any_id));
- ESP_ERROR_CHECK(esp_event_handler_instance_register(IP_EVENT,
- IP_EVENT_STA_GOT_IP,
- &event_handler,
- NULL,
- &instance_got_ip));
- wifi_config_t wifi_config = {
- .sta = {
- .ssid = EXAMPLE_ESP_WIFI_SSID,
- .password = EXAMPLE_ESP_WIFI_PASS,
- /* Authmode threshold resets to WPA2 as default if password matches
- * WPA2 standards (password len => 8). If you want to connect the
- * device to deprecated WEP/WPA networks, Please set the threshold
- * value WIFI_AUTH_WEP/WIFI_AUTH_WPA_PSK and set the password with
- * length and format matching to WIFI_AUTH_WEP/WIFI_AUTH_WPA_PSK
- * standards. */
- .threshold.authmode = ESP_WIFI_SCAN_AUTH_MODE_THRESHOLD,
- #ifdef HAS_WPA3_FEATURES
- .sae_pwe_h2e = WPA3_SAE_PWE_BOTH,
- #endif
- },
- };
- ESP_ERROR_CHECK(esp_wifi_set_mode(WIFI_MODE_STA) );
- ESP_ERROR_CHECK(esp_wifi_set_config(WIFI_IF_STA, &wifi_config) );
- #ifdef CONFIG_EXAMPLE_WIFI_SSID
- if (XSTRCMP(CONFIG_EXAMPLE_WIFI_SSID, "myssid") == 0) {
- ESP_LOGW(TAG, "WARNING: CONFIG_EXAMPLE_WIFI_SSID is \"myssid\".");
- ESP_LOGW(TAG, " Do you have a WiFi AP called \"myssid\", ");
- ESP_LOGW(TAG, " or did you forget the ESP-IDF configuration?");
- }
- #else
- ESP_LOGW(TAG, "WARNING: CONFIG_EXAMPLE_WIFI_SSID not defined.");
- #endif
- ESP_ERROR_CHECK(esp_wifi_start() );
- ESP_LOGI(TAG, "wifi_init_sta finished.");
- /* Waiting until either the connection is established (WIFI_CONNECTED_BIT)
- * or connection failed for the maximum number of re-tries (WIFI_FAIL_BIT).
- * The bits are set by event_handler() (see above) */
- EventBits_t bits = xEventGroupWaitBits(s_wifi_event_group,
- WIFI_CONNECTED_BIT | WIFI_FAIL_BIT,
- pdFALSE,
- pdFALSE,
- portMAX_DELAY);
- /* xEventGroupWaitBits() returns the bits before the call returned,
- * hence we can test which event actually happened. */
- #if defined(SHOW_SSID_AND_PASSWORD)
- ESP_LOGW(TAG, "Undefine SHOW_SSID_AND_PASSWORD to not show SSID/password");
- if (bits & WIFI_CONNECTED_BIT) {
- ESP_LOGI(TAG, "connected to ap SSID:%s password:%s",
- EXAMPLE_ESP_WIFI_SSID,
- EXAMPLE_ESP_WIFI_PASS);
- }
- else if (bits & WIFI_FAIL_BIT) {
- ESP_LOGI(TAG, "Failed to connect to SSID:%s, password:%s",
- EXAMPLE_ESP_WIFI_SSID,
- EXAMPLE_ESP_WIFI_PASS);
- }
- else {
- ESP_LOGE(TAG, "UNEXPECTED EVENT");
- }
- #else
- if (bits & WIFI_CONNECTED_BIT) {
- ESP_LOGI(TAG, "Connected to AP");
- }
- else if (bits & WIFI_FAIL_BIT) {
- ESP_LOGI(TAG, "Failed to connect to AP");
- ret = -1;
- }
- else {
- ESP_LOGE(TAG, "AP UNEXPECTED EVENT");
- ret = -2;
- }
- #endif
- return ret;
- }
- int wifi_show_ip(void)
- {
- /* TODO Causes panic: ESP_LOGI(TAG, "got ip:" IPSTR,
- * IP2STR(&event->ip_info.ip)); */
- return ESP_OK;
- }
- #endif
|