2022-11-12 22:42:03 +08:00
|
|
|
/* WiFi station Example
|
|
|
|
|
|
|
|
This example code is in the Public Domain (or CC0 licensed, at your option.)
|
|
|
|
|
|
|
|
Unless required by applicable law or agreed to in writing, this
|
|
|
|
software is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR
|
|
|
|
CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
*/
|
|
|
|
#include <string.h>
|
|
|
|
|
|
|
|
#include "esp_event.h"
|
|
|
|
#include "esp_log.h"
|
|
|
|
#include "esp_system.h"
|
|
|
|
#include "esp_wifi.h"
|
|
|
|
#include "freertos/FreeRTOS.h"
|
|
|
|
#include "freertos/event_groups.h"
|
|
|
|
#include "freertos/task.h"
|
|
|
|
#include "lwip/err.h"
|
|
|
|
#include "lwip/sys.h"
|
|
|
|
#include "nvs_flash.h"
|
|
|
|
|
|
|
|
/* The examples use WiFi configuration that you can set via project
|
|
|
|
configuration menu
|
|
|
|
|
|
|
|
If you'd rather not, just change the below entries to strings with
|
|
|
|
the config you want - ie #define EXAMPLE_WIFI_SSID "mywifissid"
|
|
|
|
*/
|
2022-11-21 20:46:26 +08:00
|
|
|
#define WIFI_SSID CONFIG_WIFI_SSID
|
|
|
|
#define WIFI_PASS CONFIG_WIFI_PASSWORD
|
|
|
|
#define MAXIMUM_RETRY CONFIG_WIFI_MAXIMUM_RETRY
|
|
|
|
|
|
|
|
#if CONFIG_WIFI_AUTH_OPEN
|
|
|
|
#define WIFI_SCAN_AUTH_MODE_THRESHOLD WIFI_AUTH_OPEN
|
|
|
|
#elif CONFIG_WIFI_AUTH_WEP
|
|
|
|
#define WIFI_SCAN_AUTH_MODE_THRESHOLD WIFI_AUTH_WEP
|
|
|
|
#elif CONFIG_WIFI_AUTH_WPA_PSK
|
|
|
|
#define WIFI_SCAN_AUTH_MODE_THRESHOLD WIFI_AUTH_WPA_PSK
|
|
|
|
#elif CONFIG_WIFI_AUTH_WPA2_PSK
|
|
|
|
#define WIFI_SCAN_AUTH_MODE_THRESHOLD WIFI_AUTH_WPA2_PSK
|
|
|
|
#elif CONFIG_WIFI_AUTH_WPA_WPA2_PSK
|
|
|
|
#define WIFI_SCAN_AUTH_MODE_THRESHOLD WIFI_AUTH_WPA_WPA2_PSK
|
|
|
|
#elif CONFIG_WIFI_AUTH_WPA3_PSK
|
|
|
|
#define WIFI_SCAN_AUTH_MODE_THRESHOLD WIFI_AUTH_WPA3_PSK
|
|
|
|
#elif CONFIG_WIFI_AUTH_WPA2_WPA3_PSK
|
|
|
|
#define WIFI_SCAN_AUTH_MODE_THRESHOLD WIFI_AUTH_WPA2_WPA3_PSK
|
|
|
|
#elif CONFIG_WIFI_AUTH_WAPI_PSK
|
|
|
|
#define WIFI_SCAN_AUTH_MODE_THRESHOLD WIFI_AUTH_WAPI_PSK
|
|
|
|
#endif
|
2022-11-12 22:42:03 +08:00
|
|
|
|
|
|
|
/* FreeRTOS event group to signal when we are connected*/
|
|
|
|
static EventGroupHandle_t s_wifi_event_group;
|
|
|
|
|
|
|
|
/* The event group allows multiple bits for each event, but we only care about
|
|
|
|
* two events:
|
|
|
|
* - we are connected to the AP with an IP
|
|
|
|
* - we failed to connect after the maximum amount of retries */
|
|
|
|
#define WIFI_CONNECTED_BIT BIT0
|
|
|
|
#define WIFI_FAIL_BIT BIT1
|
|
|
|
|
2022-11-23 21:46:36 +08:00
|
|
|
static const char* WIFI_TAG = "DisplayAmbientLight_WIFI";
|
2022-11-12 22:42:03 +08:00
|
|
|
|
|
|
|
static int s_retry_num = 0;
|
|
|
|
|
|
|
|
static void event_handler(void* arg, esp_event_base_t event_base,
|
|
|
|
int32_t event_id, void* event_data) {
|
|
|
|
if (event_base == WIFI_EVENT && event_id == WIFI_EVENT_STA_START) {
|
|
|
|
esp_wifi_connect();
|
|
|
|
} else if (event_base == WIFI_EVENT &&
|
|
|
|
event_id == WIFI_EVENT_STA_DISCONNECTED) {
|
2022-11-21 20:46:26 +08:00
|
|
|
if (s_retry_num < MAXIMUM_RETRY) {
|
2022-11-12 22:42:03 +08:00
|
|
|
esp_wifi_connect();
|
|
|
|
s_retry_num++;
|
|
|
|
ESP_LOGI(WIFI_TAG, "retry to connect to the AP");
|
|
|
|
} else {
|
|
|
|
xEventGroupSetBits(s_wifi_event_group, WIFI_FAIL_BIT);
|
|
|
|
}
|
|
|
|
ESP_LOGI(WIFI_TAG, "connect to the AP fail");
|
|
|
|
} else if (event_base == IP_EVENT && event_id == IP_EVENT_STA_GOT_IP) {
|
|
|
|
ip_event_got_ip_t* event = (ip_event_got_ip_t*)event_data;
|
|
|
|
ESP_LOGI(WIFI_TAG, "got ip:" IPSTR, IP2STR(&event->ip_info.ip));
|
|
|
|
s_retry_num = 0;
|
|
|
|
xEventGroupSetBits(s_wifi_event_group, WIFI_CONNECTED_BIT);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-11-13 17:05:41 +08:00
|
|
|
bool wifi_init_sta(void) {
|
2022-11-12 22:42:03 +08:00
|
|
|
s_wifi_event_group = xEventGroupCreate();
|
|
|
|
|
|
|
|
ESP_ERROR_CHECK(esp_netif_init());
|
|
|
|
|
|
|
|
ESP_ERROR_CHECK(esp_event_loop_create_default());
|
|
|
|
esp_netif_create_default_wifi_sta();
|
|
|
|
|
|
|
|
wifi_init_config_t cfg = WIFI_INIT_CONFIG_DEFAULT();
|
|
|
|
ESP_ERROR_CHECK(esp_wifi_init(&cfg));
|
|
|
|
|
|
|
|
esp_event_handler_instance_t instance_any_id;
|
|
|
|
esp_event_handler_instance_t instance_got_ip;
|
|
|
|
ESP_ERROR_CHECK(esp_event_handler_instance_register(
|
|
|
|
WIFI_EVENT, ESP_EVENT_ANY_ID, &event_handler, NULL, &instance_any_id));
|
|
|
|
ESP_ERROR_CHECK(esp_event_handler_instance_register(
|
|
|
|
IP_EVENT, IP_EVENT_STA_GOT_IP, &event_handler, NULL, &instance_got_ip));
|
|
|
|
|
|
|
|
wifi_config_t wifi_config = {
|
|
|
|
.sta =
|
|
|
|
{
|
2022-11-21 20:46:26 +08:00
|
|
|
.ssid = WIFI_SSID,
|
|
|
|
.password = WIFI_PASS,
|
2022-11-12 22:42:03 +08:00
|
|
|
/* Setting a password implies station will connect to all security
|
|
|
|
* modes including WEP/WPA. However these modes are deprecated and
|
|
|
|
* not advisable to be used. Incase your Access point doesn't
|
|
|
|
* support WPA2, these mode can be enabled by commenting below
|
|
|
|
* line */
|
2022-11-21 20:46:26 +08:00
|
|
|
.threshold.authmode = WIFI_SCAN_AUTH_MODE_THRESHOLD,
|
2022-11-12 22:42:03 +08:00
|
|
|
.sae_pwe_h2e = WPA3_SAE_PWE_BOTH,
|
|
|
|
},
|
|
|
|
};
|
|
|
|
ESP_ERROR_CHECK(esp_wifi_set_mode(WIFI_MODE_STA));
|
|
|
|
ESP_ERROR_CHECK(esp_wifi_set_config(WIFI_IF_STA, &wifi_config));
|
|
|
|
ESP_ERROR_CHECK(esp_wifi_start());
|
|
|
|
|
|
|
|
ESP_LOGI(WIFI_TAG, "wifi_init_sta finished.");
|
|
|
|
|
|
|
|
/* Waiting until either the connection is established (WIFI_CONNECTED_BIT) or
|
|
|
|
* connection failed for the maximum number of re-tries (WIFI_FAIL_BIT). The
|
|
|
|
* bits are set by event_handler() (see above) */
|
|
|
|
EventBits_t bits = xEventGroupWaitBits(s_wifi_event_group,
|
|
|
|
WIFI_CONNECTED_BIT | WIFI_FAIL_BIT,
|
|
|
|
pdFALSE, pdFALSE, portMAX_DELAY);
|
2022-11-13 17:05:41 +08:00
|
|
|
bool connected = 0;
|
2022-11-12 22:42:03 +08:00
|
|
|
/* xEventGroupWaitBits() returns the bits before the call returned, hence we
|
|
|
|
* can test which event actually happened. */
|
|
|
|
if (bits & WIFI_CONNECTED_BIT) {
|
2022-11-13 17:05:41 +08:00
|
|
|
connected = 1;
|
2022-11-21 20:46:26 +08:00
|
|
|
ESP_LOGI(WIFI_TAG, "connected to ap SSID:%s password:%s", WIFI_SSID,
|
|
|
|
WIFI_PASS);
|
2022-11-12 22:42:03 +08:00
|
|
|
} else if (bits & WIFI_FAIL_BIT) {
|
2022-11-21 20:46:26 +08:00
|
|
|
ESP_LOGI(WIFI_TAG, "Failed to connect to SSID:%s, password:%s", WIFI_SSID,
|
|
|
|
WIFI_PASS);
|
2022-11-12 22:42:03 +08:00
|
|
|
} else {
|
|
|
|
ESP_LOGE(WIFI_TAG, "UNEXPECTED EVENT");
|
|
|
|
}
|
|
|
|
|
|
|
|
/* The event will not be processed after unregister */
|
|
|
|
ESP_ERROR_CHECK(esp_event_handler_instance_unregister(
|
|
|
|
IP_EVENT, IP_EVENT_STA_GOT_IP, instance_got_ip));
|
|
|
|
ESP_ERROR_CHECK(esp_event_handler_instance_unregister(
|
|
|
|
WIFI_EVENT, ESP_EVENT_ANY_ID, instance_any_id));
|
|
|
|
vEventGroupDelete(s_wifi_event_group);
|
2022-11-13 17:05:41 +08:00
|
|
|
return connected;
|
2022-11-12 22:42:03 +08:00
|
|
|
}
|
|
|
|
|
2022-11-13 17:05:41 +08:00
|
|
|
bool connect_wifi(void) {
|
2023-05-02 20:06:30 +08:00
|
|
|
//! Should init NVS before wifi init
|
2022-11-12 22:42:03 +08:00
|
|
|
|
|
|
|
ESP_LOGI(WIFI_TAG, "ESP_WIFI_MODE_STA");
|
2022-11-13 17:05:41 +08:00
|
|
|
return wifi_init_sta();
|
2022-11-12 22:42:03 +08:00
|
|
|
}
|