From 4a7ef06b516dba4cdda939a16e5458c59592f6b1 Mon Sep 17 00:00:00 2001 From: David Madison Date: Fri, 15 Feb 2019 12:08:19 -0500 Subject: Delete 'firmwares' folder --- firmwares/wifishield/wifiHD/src/cmd_wl.c | 731 ------------------------------- 1 file changed, 731 deletions(-) delete mode 100644 firmwares/wifishield/wifiHD/src/cmd_wl.c (limited to 'firmwares/wifishield/wifiHD/src/cmd_wl.c') diff --git a/firmwares/wifishield/wifiHD/src/cmd_wl.c b/firmwares/wifishield/wifiHD/src/cmd_wl.c deleted file mode 100644 index a210dec..0000000 --- a/firmwares/wifishield/wifiHD/src/cmd_wl.c +++ /dev/null @@ -1,731 +0,0 @@ -/* This source file is part of the ATMEL AVR-UC3-SoftwareFramework-1.7.0 Release */ - -/*! \page License - * Copyright (C) 2009, H&D Wireless AB All rights reserved. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions are met: - * - * 1. Redistributions of source code must retain the above copyright notice, - * this list of conditions and the following disclaimer. - * - * 2. Redistributions in binary form must reproduce the above copyright notice, - * this list of conditions and the following disclaimer in the documentation - * and/or other materials provided with the distribution. - * - * 3. The name of H&D Wireless AB may not be used to endorse or promote products derived - * from this software without specific prior written permission. - * - * THIS SOFTWARE IS PROVIDED BY H&D WIRELESS AB ``AS IS'' AND ANY EXPRESS OR IMPLIED - * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF - * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE EXPRESSLY AND - * SPECIFICALLY DISCLAIMED. IN NO EVENT SHALL ATMEL BE LIABLE FOR ANY DIRECT, - * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES - * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; - * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND - * ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT - * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF - * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. - */ -#include -#include -#include -#include - -#include - -#include -#include -#include -#include - -#include "lwip/netif.h" -#include "lwip/dns.h" -#include "debug.h" -#include "ard_spi.h" -#include "ard_tcp.h" -#include "ard_utils.h" - -extern void showTTCPstatus(); - -#define _DNS_CMD_ - -/** - * - */ -cmd_state_t -cmd_scan(int argc, char* argv[], void* ctx) -{ - /* Note that the scan results presented will - * be from the last scan, not this one. - */ - wl_scan(); - print_network_list(); - return CMD_DONE; -} - -cmd_state_t -cmd_debug_toggle(int argc, char* argv[], void* ctx) -{ - extern uint8_t tr_data_trace; - if ( argc != 2 ) { - printk("usage: dt <1|0>\n"); - return CMD_DONE; - } - if ( '0' == argv[1][0] ) { - tr_data_trace = 0; - } - if ( '1' == argv[1][0] ) { - tr_data_trace = 1; - } - return CMD_DONE; -} - -/** - * - */ -cmd_state_t -cmd_connect(int argc, char* argv[], void* ctx) -{ - struct wl_ssid_t ssid; - char desired_ssid[WL_SSID_MAX_LENGTH]; - int len = 0; - - if (argc < 2) { - printk("usage: connect \n"); - return CMD_DONE; - } - - len = join_argv(desired_ssid, sizeof desired_ssid, argc - 1, argv + 1); - if (0 == len) { - return CMD_DONE; - } - - memcpy(ssid.ssid, desired_ssid, len); - ssid.len = len; - /* Start connection manager */ - wl_cm_set_network(&ssid, NULL); - wl_cm_start(); - return CMD_DONE; -} - -#ifdef WFE_6_12 -cmd_state_t -cmd_ibss(int argc, char* argv[], void* ctx) -{ - struct wl_ssid_t ssid; - char desired_ssid[WL_SSID_MAX_LENGTH]; - uint8_t channel; - enum wl_auth_mode amode; - int len = 0; - wl_err_t ret; - - if ( 2 == argc && ! strncmp(argv[1], "none", 4) ) { - printk("Disconnecting\n"); - wl_disconnect(); - wl_cm_stop(); - return CMD_DONE; - } - if (argc < 4) { - printk("usage: ibss \n"); - printk(" ibss none\n"); - return CMD_DONE; - } - - channel = atoi(argv[argc - 2]); - if ( *argv[argc - 1] == '0' ) { - amode = AUTH_MODE_OPEN_SYSTEM; - } else { - amode = AUTH_MODE_SHARED_KEY; - } - len = join_argv(desired_ssid, sizeof desired_ssid, argc - 3, argv + 1); - if (0 == len) { - return CMD_DONE; - } - if ( channel > 14 ) { - printk("Invalid channel %d\n", (int)channel); - return CMD_DONE; - } - printk("%s : Start with ssid \"%s\", channel %d\n", __func__, - desired_ssid, channel); - memcpy(ssid.ssid, desired_ssid, len); - ssid.len = len; - /* Stop the connection manager */ - wl_cm_stop(); - - ret = wl_start_adhoc_net(ssid, channel, amode); - switch (ret) { - case WL_BUSY: - printk("Driver is busy. Already connected?\n"); - break; - case WL_RETRY: - printk("Driver is busy. Retry operation\n"); - break; - case WL_OOM: - printk("Out of memory\n"); - break; - case WL_INVALID_ARGS: - printk("Invalid argument\n"); - break; - case WL_SUCCESS: - break; - default: - printk("Unknown error %d\n", ret); - break; - } - return CMD_DONE; -} -#endif -/** - * - */ -cmd_state_t -cmd_set_ip(int argc, char* argv[], void* ctx) -{ - struct ctx_server *hs = ctx; - struct net_cfg *ncfg = &(hs->net_cfg); - struct ip_addr lwip_addr; - struct netif *nif = ncfg->netif; - - if (argc == 2 && - (strncmp(argv[1], "none", 4) == 0)) { - ncfg->dhcp_enabled = DYNAMIC_IP_CONFIG; - - return CMD_DONE; - } - else if (argc != 4 ) { - printk("usage: ipconfig \n"); - printk(" or : ipconfig none (to enable DHCP)\n"); - return CMD_DONE; - } - - /* IP address */ - lwip_addr = str2ip(argv[1]); - INFO_SPI("nif:%p lwip_addr=0x%x\n", nif, lwip_addr.addr); - netif_set_ipaddr(nif, &lwip_addr); - /* Netmask */ - lwip_addr = str2ip(argv[2]); - netif_set_netmask(nif, &lwip_addr); - /* Default Gateway address */ - lwip_addr = str2ip(argv[3]); - netif_set_gw(nif, &lwip_addr); - /* Disable DHCP */ - ncfg->dhcp_enabled = STATIC_IP_CONFIG; - - return CMD_DONE; -} - -#ifdef WITH_WPA - -/** - * - */ -cmd_state_t -cmd_delpass(int argc, char* argv[], void* ctx) -{ - const char *usage = "usage: dpass \n"; - struct wl_network_t net; - char desired_ssid[WL_SSID_MAX_LENGTH]; - int len = 0; - - if (argc != 2) { - printk(usage); - return CMD_DONE; - } - - memset(&net, 0, sizeof net); - memset(net.bssid.octet, 0xFF, sizeof net.bssid.octet); - - len = join_argv(desired_ssid, sizeof desired_ssid, argc - 1, argv + 1); - if (0 == len) { - return CMD_DONE; - } - memcpy(net.ssid.ssid, desired_ssid, len); - net.ssid.len = len; - net.enc_type = ENC_TYPE_AUTO; - if (wl_clear_passphrase(&net) != WL_SUCCESS) { - printk("%s : Failed to delete passphrase\n", __func__); - } - - return CMD_DONE; -} - - -/** - * - */ -cmd_state_t -cmd_setpass(int argc, char* argv[], void* ctx) -{ - const char *usage = "usage: wpass \n"; - struct wl_network_t net; - char desired_ssid[WL_SSID_MAX_LENGTH]; - int len = 0; - - if (argc < 3) { - printk(usage); - return CMD_DONE; - } - /* Not really kosher, an ssid may legally contain 0-bytes but - * the console interface does not deal with that. - */ - memset(&net, 0, sizeof net); - memset(net.bssid.octet, 0xFF, sizeof net.bssid.octet); - - len = join_argv(desired_ssid, sizeof desired_ssid, argc - 2, argv + 1); - if (0 == len) { - return CMD_DONE; - } - - memcpy(net.ssid.ssid, desired_ssid, len); - net.ssid.len = len; - net.enc_type = ENC_TYPE_AUTO; - if (wl_set_passphrase(&net, - argv[argc - 1], - strlen(argv[argc - 1]), - ENC_TYPE_AUTO, - AUTH_MODE_AUTO) - != WL_SUCCESS) { - printk("%s : Failed to add passphrase\n", __func__); - } - - return CMD_DONE; -} -#endif - -#ifdef _DNS_CMD_ -void foundHost(const char *name, struct ip_addr *ipaddr, void *callback_arg) -{ - printk("Found Host: name=%s ip=0x%x\n", name, ipaddr->addr); -} - -/** - * - */ -cmd_state_t -cmd_gethostbyname(int argc, char* argv[], void* ctx) -{ - const char *usage = "usage: getHost \n"; - char hostname[DNS_MAX_NAME_LENGTH]; - struct ip_addr _addr; - int len = 0; - - if (argc < 2) { - printk(usage); - return CMD_DONE; - } - - len = join_argv(hostname, sizeof hostname, argc - 1, argv + 1); - if (0 == len) { - return CMD_DONE; - } - err_t err = dns_gethostbyname(hostname, &_addr, foundHost, NULL); - if (err == ERR_OK) - { - printk("Found Host: name=%s ip=0x%x\n", hostname, _addr.addr); - } - - return CMD_DONE; -} - -/** - * - */ -cmd_state_t -cmd_setDnsServer(int argc, char* argv[], void* ctx) -{ - const char *usage = "usage: setdns [1-2] aaa.bbb.ccc.ddd\n"; - struct ip_addr dnsIp; - int dnsIdx = 0; - - if (argc < 3) { - printk(usage); - return CMD_DONE; - } - - /* DNS IDX */ - dnsIdx = atoi(argv[1])-1; - /* IP address */ - dnsIp = str2ip(argv[2]); - - printk("Set DNS server %d to %s\n", dnsIdx, ip2str(dnsIp)); - dns_setserver(dnsIdx, &dnsIp); - struct ip_addr addr1 = dns_getserver(0); - struct ip_addr addr2 = dns_getserver(1); - - printk("==> DNS1: %s\n", ip2str(addr1), addr1); - printk("==> DNS2: %s\n", ip2str(addr2), addr2); - - return CMD_DONE; -} - -/** - * - */ -cmd_state_t -cmd_startSrv(int argc, char* argv[], void* ctx) -{ - const char *usage = "usage: startSrv \n"; - - int port = 0; - int sock = 0; - int protMode = 0; - - if (argc < 4) { - printk(usage); - return CMD_DONE; - } - - /* TCP port */ - port = atoi(argv[1]); - /* socket index */ - sock = atoi(argv[2]); - /* Protocol Mode */ - protMode = atoi(argv[3]); - - printk("Start %s server on port %d sock %d\n", ProtMode2Str(protMode), port, sock); - if (start_server_tcp(port, sock, protMode) == -1) - { - WARN("Start %s server on port %d sock %d FAILED\n", ProtMode2Str(protMode), port, sock); - } - return CMD_DONE; -} - -/** - * - */ -cmd_state_t -cmd_startCli(int argc, char* argv[], void* ctx) -{ - const char *usage = "usage: startCli \n"; - struct ip_addr addr = {0}; - int port = 0; - int sock = 0; - int protMode = 0; - - if (argc < 5) { - printk(usage); - return CMD_DONE; - } - - /* IP address */ - addr = str2ip(argv[1]); - /* TCP port */ - port = atoi(argv[2]); - /* socket index */ - sock = atoi(argv[3]); - /* Protocol Mode */ - protMode = atoi(argv[4]); - - printk("Start client on addr 0x%x, port %d sock %d mode %d\n", addr, port, sock, protMode); - if (start_client_tcp(addr.addr, port, sock, protMode) == -1) - { - WARN("Start client on port %d sock %d prot %d mode %d FAILED\n", port, sock, protMode); - } - return CMD_DONE; -} - -#endif - - -/** - * - */ -cmd_state_t -cmd_status(int argc, char* argv[], void* ctx) -{ - struct net_cfg *ncfg = ctx; - struct wl_network_t* net; - uint8_t mac[WL_MAC_ADDR_LENGTH]; - - printk("wl_api version " WL_API_RELEASE_NAME "\n"); - /* print mac address */ - if (wl_get_mac_addr(mac) != WL_SUCCESS) { - printk("failed to get mac address\n"); - }else{ - printk("hw addr: %s\n", mac2str(mac)); - } - - /* print network info */ - net = wl_get_current_network(); - printk("link status: "); - if (!net) { - printk("down\n"); - - }else{ - print_network(net); - } - - /* print ip address */ - if (netif_is_up(netif_default)) - { - printk("ip addr: %s - ", ip2str(netif_default->ip_addr)); - printk("netmask: %s - ", ip2str(netif_default->netmask)); - printk("gateway: %s\n", ip2str(netif_default->gw)); - } - else - printk("ip interface is down\n"); - printk("dhcp : "); - if (ncfg->dhcp_enabled == DYNAMIC_IP_CONFIG) { - printk("enabled\n"); - } - else { - printk("disabled\n"); - } - struct ip_addr addr1 = dns_getserver(0); - struct ip_addr addr2 = dns_getserver(1); - - printk("DNS: %s - ", ip2str(addr1)); - printk("%s\n", ip2str(addr2)); - - showTTCPstatus(); - return CMD_DONE; -} - -#ifdef ADD_CMDS -/** - * - */ -cmd_state_t -cmd_power(int argc, char* argv[], void* ctx) -{ - const char *usage = "usage: powersave \n"; - - if (argc < 2) { - printk(usage); - return CMD_DONE; - } - - if (!strcmp(argv[1], "on")) { - if (wl_enable_ps() != WL_SUCCESS) { - printk("could not enable power save\n"); - return CMD_DONE; - } - return CMD_DONE; - } - else if(!strcmp(argv[1], "off")) { - if (wl_disable_ps() != WL_SUCCESS) { - printk("could not disable power save\n"); - return CMD_DONE; - } - return CMD_DONE; - } - - printk(usage); - return CMD_DONE; -} -#endif - -#ifdef ADD_CMDS -/** - * - */ -cmd_state_t -cmd_psconf(int argc, char* argv[], void* ctx) -{ - const char *usage = - "usage: psconf (0/1 default 0)\n" \ - " ([ms] default 10)\n" \ - " ([ms] default 5000)\n"\ - " (0/1 default 1)\n"\ - " ([beacons] default 20)\n"; - - uint8_t use_ps_poll; - uint32_t traffic_timeout; - uint32_t ps_delay; - uint8_t rx_all_dtim; - uint16_t listen_interval; - - if (argc < 6) { - printk(usage); - return CMD_DONE; - } - - use_ps_poll = atoi(argv[1]); - traffic_timeout = atoi(argv[2]); - ps_delay = atoi(argv[3]); - rx_all_dtim = atoi(argv[4]); - listen_interval = atoi(argv[5]); - - if (use_ps_poll > 1) { - printk(usage); - return CMD_DONE; - } - - if (rx_all_dtim > 1) { - printk(usage); - return CMD_DONE; - } - - if (wl_conf_ps(use_ps_poll, traffic_timeout, ps_delay, - rx_all_dtim, listen_interval) != WL_SUCCESS) - printk("configuration failed\n"); - - return CMD_DONE; -} -#endif - -/** - * - */ -cmd_state_t -cmd_setkey(int argc, char* argv[], void* ctx) -{ - int idx, len; - char key[13]; - struct wl_mac_addr_t bssid; - const char *usage = "usage: setkey \n\t "\ - "or: setkey none\n"; - - memset(&bssid.octet, 0xff, sizeof bssid.octet); - if (argc == 2 && strcmp(argv[1], "none") == 0) { - printk("Deleting WEP keys\n"); - wl_delete_wep_key(0, &bssid); - wl_delete_wep_key(1, &bssid); - wl_delete_wep_key(2, &bssid); - wl_delete_wep_key(3, &bssid); - return CMD_DONE; - } - if (argc < 3) { - printk(usage); - return CMD_DONE; - } - idx = atoi(argv[1]); - len = strlen(argv[2]); - /* Pass phrase? */ - if ( 5 == len || 13 == len ) { - strncpy(key, argv[2], len); - } - /* Otherwise it's a hex string */ - else { - len = ascii_to_key(key, argv[2]); - if (0 == len || idx > 3 || idx < 0 || (idx == 0 && *argv[1] != '0')) { - printk(usage); - return CMD_DONE; - } - if (len != 5 && len != 13) { - printk(" WEP key must be 10 (WEP-40) or 26 (WEP-104) digits\n"); - return CMD_DONE; - } - } - wl_add_wep_key(idx, len, key, &bssid); - wl_set_default_wep_key(idx); - - return CMD_DONE; -} - -cmd_state_t -cmd_debug(int argc, char* argv[], void* ctx) -{ - int level; - const char *usage = "usage: debug
\n\t"\ - "section: init, cm, spi, tcp , util, warn\n\t" - "level : 0 (off), 1 (on), 2 (verbose)\n\t" - "or: debug print/on/off\n"; - - if (argc == 2 && strcmp(argv[1], "off") == 0) { - printk("Debug OFF\n"); - INIT_DEBUG_VARIABLES() - return CMD_DONE; - }else if (argc == 2 && strcmp(argv[1], "print") == 0) { - PRINT_DEBUG_VARIABLES() - return CMD_DONE; - }else if (argc == 2 && strcmp(argv[1], "on") == 0) { - printk("Debug ON\n"); - TURNON_DEBUG_VARIABLES(); - return CMD_DONE; - } - if (argc < 3) { - printk(usage); - return CMD_DONE; - } - level = atoi(argv[2]); - if (argc == 3 && strcmp(argv[1], "init") == 0) { - CHECK_DEBUG_LEVEL(level, INFO_INIT_FLAG); - }else if (argc == 3 && strcmp(argv[1], "spi") == 0) { - CHECK_DEBUG_LEVEL(level, INFO_SPI_FLAG); - }else if (argc == 3 && strcmp(argv[1], "tcp") == 0) { - CHECK_DEBUG_LEVEL(level, INFO_TCP_FLAG); - }else if (argc == 3 && strcmp(argv[1], "cm") == 0) { - CHECK_DEBUG_LEVEL(level, INFO_CM_FLAG); - }else if (argc == 3 && strcmp(argv[1], "util") == 0) { - CHECK_DEBUG_LEVEL(level, INFO_UTIL_FLAG); - }else if (argc == 3 && strcmp(argv[1], "warn") == 0) { - CHECK_DEBUG_LEVEL(level, INFO_WARN_FLAG); - } - return CMD_DONE; -} - -extern void dumpPbuf(uint8_t sock); - -/** - * - */ -cmd_state_t -cmd_dumpBuf(int argc, char* argv[], void* ctx) -{ - const char *usage = "usage: dumpPbuf [sock]\n\t"\ - "sock: socket Number\n"; - - if (argc == 2 && strcmp(argv[1], "all") == 0) { - printk("Dump All Buffers\n"); - int i = 0; - for (; i= 2) { - - uint8_t sock = atoi(argv[1]); - printk("Socket: %d\n", sock); - - if (argc >= 3) { - uint8_t patternType = atoi(argv[2]); - printk("PatternType: %d\n", patternType); - if (patternType == 1) - { - insertBuf(sock, (uint8_t*)pattern2[0], strlen(pattern2[0])); - insertBuf(sock, (uint8_t*)pattern2[1], strlen(pattern2[1])); - insertBuf(sock, (uint8_t*)pattern2[2], strlen(pattern2[2])); - } - if (patternType == 2) - { - mergeBuf(sock, NULL, NULL); - } - }else{ - if (sock < MAX_SOCK_NUM) - { - sendUdpData(getTTCP(sock, TTCP_MODE_TRANSMIT), (uint8_t*)pattern, sizeof(pattern)/sizeof(char)); - } - } - - } - return CMD_DONE; -} -- cgit v1.2.3-18-g5258