spider-bot/fw/nrf52/nrf5_sdk/components/ant/ant_fs/antfs.c

2382 lines
97 KiB
C

/**
* This software is subject to the ANT+ Shared Source License
* www.thisisant.com/swlicenses
* Copyright (c) Garmin Canada Inc. 2012
* All rights reserved.
*
* Redistribution and use in source and binary forms, with or
* without modification, are permitted provided that the following
* conditions are met:
*
* 1) Redistributions of source code must retain the above
* copyright notice, this list of conditions and the following
* disclaimer.
*
* 2) Redistributions in binary form must reproduce the above
* copyright notice, this list of conditions and the following
* disclaimer in the documentation and/or other materials
* provided with the distribution.
*
* 3) Neither the name of Garmin nor the names of its
* contributors may be used to endorse or promote products
* derived from this software without specific prior
* written permission.
*
* The following actions are prohibited:
*
* 1) Redistribution of source code containing the ANT+ Network
* Key. The ANT+ Network Key is available to ANT+ Adopters.
* Please refer to http://thisisant.com to become an ANT+
* Adopter and access the key.
*
* 2) Reverse engineering, decompilation, and/or disassembly of
* software provided in binary form under this license.
*
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND
* CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES,
* INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
* MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE HEREBY
* DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR
* CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES(INCLUDING,
* BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
* SERVICES; DAMAGE TO ANY DEVICE, LOSS OF USE, DATA, OR
* PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
* ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
* OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
* ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
* OF THE POSSIBILITY OF SUCH DAMAGE. SOME STATES DO NOT ALLOW
* THE EXCLUSION OF INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THE
* ABOVE LIMITATIONS MAY NOT APPLY TO YOU.
*
*/
#include "sdk_common.h"
#if NRF_MODULE_ENABLED(ANTFS)
#include "antfs.h"
#include <string.h>
#include "defines.h"
#include "app_error.h"
#include "app_timer.h"
#include "ant_error.h"
#include "ant_parameters.h"
#include "ant_interface.h"
#include "ant_key_manager.h"
#include "crc.h"
#if ANTFS_CONFIG_DEBUG_LED_ENABLED
#include "bsp.h"
#endif // ANTFS_CONFIG_DEBUG_LED_ENABLED
#define BURST_PACKET_SIZE 8u /**< The burst packet size. */
#define ANTFS_CONNECTION_TYPE_OFFSET 0x00u /**< The connection type offset within ANT-FS message. */
#define ANTFS_COMMAND_OFFSET 0x01u /**< The command offset within ANT-FS message. */
#define ANTFS_RESPONSE_OFFSET 0x01u /**< The response offset within ANT-FS message. */
#define ANTFS_CONTROL_OFFSET 0x02u /**< The control offset within ANT-FS message. */
#define ANTFS_DATA_OFFSET 0x03u /**< The data offset within ANT-FS message. */
#define ANTFS_BEACON_ID 0x43u /**< The ANT-FS beacon ID. */
#define ANTFS_COMMAND_ID 0x44u /**< The ANT-FS command ID. */
// Beacon definitions.
#define STATUS1_OFFSET 0x01u /**< The beacon status1 field offset. */
#define STATUS2_OFFSET 0x02u /**< The beacon status2 field offset. */
#define DEVICE_STATE_SHIFT 0x00u /**< Shift value for device state bitfield. */
#define DEVICE_STATE_MASK (0x0Fu << DEVICE_STATE_SHIFT) /**< Device state bitmask. */
#define DEVICE_STATE_LINK (0x00u << DEVICE_STATE_SHIFT) /**< Device is in link state. */
#define DEVICE_STATE_AUTHENTICATE (0x01u << DEVICE_STATE_SHIFT) /**< Device is in authenticate state. */
#define DEVICE_STATE_TRANSPORT (0x02u << DEVICE_STATE_SHIFT) /**< Device is in transport state. */
#define DEVICE_STATE_BUSY (0x03u << DEVICE_STATE_SHIFT) /**< Device is in busy state. */
#define DEVICE_DESCRIPTOR_OFFSET_0 0x04u /**< Beacon ANT-FS device descriptor LSB position. */
#define DEVICE_DESCRIPTOR_OFFSET_1 0x05u /**< Beacon ANT-FS device descriptor LSB + 1 position. */
#define DEVICE_DESCRIPTOR_OFFSET_2 0x06u /**< Beacon ANT-FS device descriptor LSB + 2 position. */
#define DEVICE_DESCRIPTOR_OFFSET_3 0x07u /**< Beacon ANT-FS device descriptor MSB position. */
// Commands.
#define ANTFS_CMD_NONE 0x00u /**< Used to identify that no ANT-FS command is in progress. */
#define ANTFS_CMD_LINK_ID 0x02u /**< ANT-FS link command ID. */
#define ANTFS_CMD_DISCONNECT_ID 0x03u /**< ANT-FS disconnect command ID. */
#define ANTFS_CMD_AUTHENTICATE_ID 0x04u /**< ANT-FS authenticate command ID. */
#define ANTFS_CMD_PING_ID 0x05u /**< ANT-FS ping command ID. */
#define ANTFS_CMD_DOWNLOAD_ID 0x09u /**< ANT-FS download request command ID. */
#define ANTFS_CMD_UPLOAD_REQUEST_ID 0x0Au /**< ANT-FS upload request command ID. */
#define ANTFS_CMD_ERASE_ID 0x0Bu /**< ANT-FS erase request command ID. */
#define ANTFS_CMD_UPLOAD_DATA_ID 0x0Cu /**< ANT-FS upload command ID. */
// Responses.
#define ANTFS_RSP_AUTHENTICATE_ID 0x84u /**< ANT-FS authenticate response command ID. */
#define ANTFS_RSP_DOWNLOAD_ID 0x89u /**< ANT-FS download request response command ID. */
#define ANTFS_RSP_UPLOAD_REQ_ID 0x8Au /**< ANT-FS upload request response command ID. */
#define ANTFS_RSP_ERASE_ID 0x8Bu /**< ANT-FS erase response command ID. */
#define ANTFS_RSP_UPLOAD_DATA_ID 0x8Cu /**< ANT-FS upload data response command ID. */
// Link command.
#define TRANSPORT_CHANNEL_FREQUENCY_OFFSET 0x02u /**< Channel frequency field offset within link command. */
#define TRANSPORT_MESSAGE_PERIOD_OFFSET 0x03u /**< Channel period field offset within link command. */
#define HOST_ID_OFFSET_0 0x04u /**< Host serial number period field LSB offset within link command. */
#define HOST_ID_OFFSET_1 0x05u /**< Host serial number period field LSB + 1 offset within link command. */
#define HOST_ID_OFFSET_2 0x06u /**< Host serial number period field LSB + 2 offset within link command. */
#define HOST_ID_OFFSET_3 0x07u /**< Host serial number period field MSB offset within link command. */
// Authenticate command.
#define COMMAND_TYPE_OFFSET 0x02u /**< Command type field offset within authenticate command. */
#define COMMAND_TYPE_PROCEED 0x00u /**< Command type proceed to transport in the authenticate command. */
#define COMMAND_TYPE_REQUEST_SERIAL 0x01u /**< Command type request client device serial number in the authenticate command. */
#define COMMAND_TYPE_REQUEST_PAIR 0x02u /**< Command type request pairing in the authenticate command. */
#define COMMAND_TYPE_REQUEST_PASSKEY 0x03u /**< Command type request passkey exchange in the authenticate command. */
// Authenticate response.
#define RESPONSE_TYPE_OFFSET 0x02u /**< Command type field offset within authenticate response command. */
#define AUTH_RESPONSE_N_A 0x00u /**< Command response type N/A (response for client serial number request). */
#define AUTH_RESPONSE_ACCEPT 0x01u /**< Command response type accept. */
#define AUTH_RESPONSE_REJECT 0x02u /**< Command response type reject. */
// Authenticate command/response.
#define AUTH_STRING_LENGTH_OFFSET 0x03u /**< Authenticate Command/Response authentication string length offset. */
#define SERIAL_NUMBER_OFFSET_0 0x04u /**< Authenticate Command/Response client/host serial number LSB offset. */
#define SERIAL_NUMBER_OFFSET_1 0x05u /**< Authenticate Command/Response client/host serial number LSB + 1 offset. */
#define SERIAL_NUMBER_OFFSET_2 0x06u /**< Authenticate Command/Response client/host serial number LSB + 2 offset. */
#define SERIAL_NUMBER_OFFSET_3 0x07u /**< Authenticate Command/Response client/host serial number MSB offset. */
// Download/Upload/Erase commands.
#define INITIAL_REQUEST_OFFSET 0x01u /**< Download/Upload/Erase command initial request command offset. */
#define DATA_INDEX_OFFSET_LOW 0x02u /**< Download/Upload/Erase command offset index low. */
#define DATA_INDEX_OFFSET_HIGH 0x03u /**< Download/Upload/Erase command offset index high. */
#define ADDRESS_PARAMETER_OFFSET_0 0x04u /**< Download/Upload command parameter LSB offset. */
#define ADDRESS_PARAMETER_OFFSET_1 0x05u /**< Download/Upload command parameter LSB + 1 offset. */
#define ADDRESS_PARAMETER_OFFSET_2 0x06u /**< Download/Upload command parameter LSB + 2 offset. */
#define ADDRESS_PARAMETER_OFFSET_3 0x07u /**< Download/Upload command parameter MSB offset. */
#define UPLOAD_CRC_OFFSET_LOW 0x06u /**< Upload data CRC offset low. */
#define UPLOAD_CRC_OFFSET_HIGH 0x07u /**< Upload data CRC offset high. */
// Authentication type. The highest level of authentication available is included in the beacon.
#if ANTFS_CONFIG_AUTH_TYPE_PASSKEY_ENABLED
#define AUTHENTICATION_TYPE COMMAND_TYPE_REQUEST_PASSKEY /**< Passkey and pairing only mode set as authentication type in beacon. */
#elif ANTFS_CONFIG_AUTH_TYPE_PAIRING_ENABLED
#define AUTHENTICATION_TYPE COMMAND_TYPE_REQUEST_PAIR /**< Pairing only mode set as authentication type in beacon. */
#elif ANTFS_CONFIG_AUTH_TYPE_PASSTHROUGH_ENABLED
#define AUTHENTICATION_TYPE COMMAND_TYPE_PROCEED /**< Pass-through mode set as authentication type in beacon. */
#else
#error "No valid auth type defined"
#endif
#define AUTHENTICATION_RETRIES 0x05u /**< Max number of retries for authentication responses */
#define ANTFS_EVENT_QUEUE_SIZE 0x04u /**< ANT-FS event queue size. */
#define SAVE_DISTANCE 256u /**< Save distance required because of nRF buffer to line up data offset on retry. */
// Buffer Indices.
#define BUFFER_INDEX_MESG_SIZE 0x00u /**< ANT message buffer index length offset. */
#define BUFFER_INDEX_MESG_ID 0x01u /**< ANT message buffer index ID offset. */
#define BUFFER_INDEX_CHANNEL_NUM 0x02u /**< ANT message buffer index channel number offset. */
#define BUFFER_INDEX_MESG_DATA 0x03u /**< ANT message buffer index begin of data offset. */
#define BUFFER_INDEX_RESPONSE_CODE 0x04u /**< ANT message buffer index response code offset. */
typedef struct
{
char friendly_name[ANTFS_FRIENDLY_NAME_MAX]; /**< Friendly Name. */
bool is_name_set; /**< Is the name set. */
uint32_t index; /**< Current index (for reading the friendly name). */
uint32_t friendly_name_size; /**< Friendly name size. */
} friendly_name_t;
typedef union
{
antfs_link_substate_t link_sub_state; /**< Sub-state (Link layer). */
antfs_authenticate_substate_t auth_sub_state; /**< Sub-state (Authentication layer). */
antfs_transport_substate_t trans_sub_state; /**< Sub-state (Transport layer). */
} antfs_substate_t;
typedef struct
{
antfs_state_t state; /**< ANT-FS state. */
antfs_substate_t sub_state; /**< ANT-FS sub-state. */
} antfs_states_t;
typedef struct
{
antfs_event_return_t * p_queue; /**< ANT-FS event queue. */
uint32_t head; /**< ANT-FS event queue head index. */
uint32_t tail; /**< ANT-FS event queue tail index. */
} antfs_event_queue_t;
static antfs_params_t m_initial_parameters; /**< Initial parameters. */
static antfs_beacon_status_byte1_t m_active_beacon_status1_field; /**< Status 1 field in beacon. */
static uint32_t m_active_beacon_frequency; /**< Active beacon frequency. */
static antfs_states_t m_current_state; /**< Current state. */
static friendly_name_t m_friendly_name; /**< Host's friendly name. */
static ulong_union_t m_link_host_serial_number; /**< Host's serial number. */
static uint32_t m_link_command_in_progress; /**< ANT-FS command in progress. */
static uint32_t m_authenticate_command_type; /**< Authenticate command type in progress. */
static volatile uint8_t m_burst_wait; /**< Polling status flag for data unlock on burst handler input. */
static uint8_t m_retry; /**< Retry counter */
APP_TIMER_DEF(m_timer_id); /**< Timer ID used with the timer module. */
#if ANTFS_CONFIG_AUTH_TYPE_PASSKEY_ENABLED
static uint32_t m_passkey_index; /**< Current location of Tx block (auth string). */
#endif // ANTFS_CONFIG_AUTH_TYPE_PASSKEY_ENABLED
// Download/upload.
static bool m_is_data_request_pending; /**< Requested data pending. */
static bool m_is_crc_pending; /**< CRC for data packets pending. */
static ushort_union_t m_file_index; /**< File index of current upload/download. */
static ulong_union_t m_file_size; /**< File size of current upload/download (bytes). */
static ulong_union_t m_max_block_size; /**< Maximum number of bytes expected to be downloaded in a single burst block of data (set by host). */
static ulong_union_t m_link_burst_index; /**< Current location of Tx block (bytes). */
static ulong_union_t m_bytes_remaining; /**< Total remaining data length (bytes). */
static ulong_union_t m_max_transfer_index; /**< Upper limit of the current Tx burst block (bytes). */
static uint32_t m_bytes_to_write; /**< Number of bytes to write to file (upload). */
static const uint8_t * mp_upload_data; /**< Address of begin of the buffer that holds data received from upload. */
#if ANTFS_CONFIG_UPLOAD_ENABLED
static ulong_union_t m_block_size; /**< Number of bytes the client can receive in a single burst. */
#endif // ANTFS_CONFIG_UPLOAD_ENABLED
// CRC verification.
static uint32_t m_saved_crc_offset; /**< CRC data offset (bytes) saved at last CRC update (save point). */
static uint32_t m_saved_buffer_crc_offset; /**< Data offset to track how much data has been buffered into nRF */
static uint32_t m_temp_crc_offset; /**< Temporary CRC data offset used in CRC calculation. */
static uint16_t m_compared_crc; /**< 16-bit CRC for all data packets in the block (provided by download request). */
static uint16_t m_transfer_crc; /**< 16-bit CRC for all data packets in the block (calculated by client). */
static uint16_t m_saved_transfer_crc; /**< 16-bit CRC saved at last CRC update (save point). */
static uint16_t m_saved_buffer_crc; /**< 16-bit CRC saved at last CRC update (save point) for buffering the nRF */
// ANT-FS event handling.
static antfs_event_return_t m_event_queue_buffer[ANTFS_EVENT_QUEUE_SIZE]; /**< Event queue storage. */
static antfs_event_queue_t m_event_queue; /**< Event queue. */
static antfs_burst_wait_handler_t m_burst_wait_handler = NULL; /**< Burst wait handler */
const char * antfs_hostname_get(void)
{
if (m_friendly_name.is_name_set)
{
return (m_friendly_name.friendly_name);
}
return NULL;
}
/**@brief Function for waiting for the burst transmission request to complete.
*/
static void wait_burst_request_to_complete(void)
{
while (m_burst_wait != 0)
{
if (m_burst_wait_handler != NULL)
{
m_burst_wait_handler();
}
};
}
/**@brief Function for stopping ANT-FS timeout, which is possibly currently running.
*/
static void timeout_disable(void)
{
m_link_command_in_progress = ANTFS_CMD_NONE;
const uint32_t err_code = app_timer_stop(m_timer_id);
APP_ERROR_CHECK(err_code);
}
/**@brief Function for transmitting a beacon.
*
* Transmits a beacon either using a broadcast or burst transmission mode.
*
* @param[in] message_type Defines the used transmission mode.
*/
static void beacon_transmit(uint32_t message_type)
{
uint8_t beacon_status_byte2;
// Set beacon status byte 2.
if (m_link_command_in_progress == ANTFS_CMD_NONE)
{
switch (m_current_state.state)
{
case ANTFS_STATE_AUTH:
beacon_status_byte2 = DEVICE_STATE_AUTHENTICATE;
break;
case ANTFS_STATE_TRANS:
beacon_status_byte2 = DEVICE_STATE_TRANSPORT;
break;
default:
beacon_status_byte2 = DEVICE_STATE_LINK;
break;
}
}
else
{
beacon_status_byte2 = DEVICE_STATE_BUSY;
}
// Set remaining beacon fields.
uint8_t tx_buffer[BURST_PACKET_SIZE];
tx_buffer[0] = ANTFS_BEACON_ID;
tx_buffer[1] = m_active_beacon_status1_field.status;
tx_buffer[2] = beacon_status_byte2;
tx_buffer[3] = AUTHENTICATION_TYPE;
if ((m_current_state.state == ANTFS_STATE_AUTH) ||
(m_current_state.state == ANTFS_STATE_TRANS))
{
tx_buffer[4] = m_link_host_serial_number.bytes.byte0;
tx_buffer[5] = m_link_host_serial_number.bytes.byte1;
tx_buffer[6] = m_link_host_serial_number.bytes.byte2;
tx_buffer[7] = m_link_host_serial_number.bytes.byte3;
}
else
{
tx_buffer[4] = m_initial_parameters.beacon_device_type;
tx_buffer[5] = (m_initial_parameters.beacon_device_type >> 8u);
tx_buffer[6] = m_initial_parameters.beacon_device_manufacturing_id;
tx_buffer[7] = (m_initial_parameters.beacon_device_manufacturing_id >> 8u);
}
if (message_type == MESG_BROADCAST_DATA_ID)
{
if (sd_ant_broadcast_message_tx(ANTFS_CONFIG_CHANNEL_NUMBER, sizeof(tx_buffer), tx_buffer) != NRF_SUCCESS)
{
// @note: No implementation needed, as it is a valid and accepted use case for this call
// to fail. This call can fail if we are in middle of bursting.
}
}
else if (message_type == MESG_BURST_DATA_ID)
{
// Send as the first packet of a burst.
const uint32_t err_code = sd_ant_burst_handler_request(ANTFS_CONFIG_CHANNEL_NUMBER,
sizeof(tx_buffer),
tx_buffer,
BURST_SEGMENT_START);
APP_ERROR_CHECK(err_code);
wait_burst_request_to_complete();
// This is the first packet of a burst response, disable command timeout while bursting.
timeout_disable();
}
else
{
// This should not happen.
APP_ERROR_HANDLER(message_type);
}
}
/**@brief Function for transmitting a authenticate response message.
*
* @param[in] response_type Authenticate response code.
* @param[in] password_length Length of authentication string.
* @param[in] p_password Authentication string transmitted.
*/
static void authenticate_response_transmit(uint8_t response_type,
uint32_t password_length,
const uint8_t * p_password)
{
ulong_union_t serial_number;
serial_number.data = m_initial_parameters.client_serial_number;
// First packet is beacon.
beacon_transmit(MESG_BURST_DATA_ID);
uint8_t tx_buffer[BURST_PACKET_SIZE];
tx_buffer[ANTFS_CONNECTION_TYPE_OFFSET] = ANTFS_COMMAND_ID;
tx_buffer[ANTFS_RESPONSE_OFFSET] = ANTFS_RSP_AUTHENTICATE_ID;
tx_buffer[RESPONSE_TYPE_OFFSET] = response_type;
tx_buffer[AUTH_STRING_LENGTH_OFFSET] = password_length;
tx_buffer[SERIAL_NUMBER_OFFSET_0] = serial_number.bytes.byte0;
tx_buffer[SERIAL_NUMBER_OFFSET_1] = serial_number.bytes.byte1;
tx_buffer[SERIAL_NUMBER_OFFSET_2] = serial_number.bytes.byte2;
tx_buffer[SERIAL_NUMBER_OFFSET_3] = serial_number.bytes.byte3;
uint32_t err_code;
if ((m_current_state.state == ANTFS_STATE_AUTH) &&
(
(response_type != AUTH_RESPONSE_REJECT) &&
password_length &&
(password_length <= ANTFS_AUTH_STRING_MAX)
)
)
{
// Send second packet (auth response).
err_code = sd_ant_burst_handler_request(ANTFS_CONFIG_CHANNEL_NUMBER,
sizeof(tx_buffer),
tx_buffer,
BURST_SEGMENT_CONTINUE);
APP_ERROR_CHECK(err_code);
wait_burst_request_to_complete();
// Round size to a multiple of 8 bytes.
uint8_t tx_buffer_authenticate[ANTFS_AUTH_STRING_MAX + 1u];
memset(tx_buffer_authenticate, 0, ANTFS_AUTH_STRING_MAX + 1u);
memcpy(tx_buffer_authenticate, p_password, password_length);
// Round up total number bytes to a multiple of 8 to be sent to burst handler.
if (password_length & (BURST_PACKET_SIZE - 1u))
{
password_length &= ~(BURST_PACKET_SIZE - 1u);
password_length += BURST_PACKET_SIZE;
}
// Send auth string (last packets of the burst).
err_code = sd_ant_burst_handler_request(ANTFS_CONFIG_CHANNEL_NUMBER,
password_length,
tx_buffer_authenticate,
BURST_SEGMENT_END);
APP_ERROR_CHECK(err_code);
wait_burst_request_to_complete();
m_link_command_in_progress = ANTFS_RSP_AUTHENTICATE_ID;
}
else
{
// If the authorization is rejected or there is no valid password, the auth response is the
// last packet.
err_code = sd_ant_burst_handler_request(ANTFS_CONFIG_CHANNEL_NUMBER,
sizeof(tx_buffer),
tx_buffer,
BURST_SEGMENT_END);
APP_ERROR_CHECK(err_code);
wait_burst_request_to_complete();
}
// Switch to appropiate state.
if (response_type == AUTH_RESPONSE_REJECT)
{
m_current_state.sub_state.auth_sub_state = ANTFS_AUTH_SUBSTATE_REJECT;
}
else if (response_type == AUTH_RESPONSE_ACCEPT)
{
m_current_state.sub_state.auth_sub_state = ANTFS_AUTH_SUBSTATE_ACCEPT;
}
else
{
// No implementation needed.
}
}
bool antfs_pairing_resp_transmit(bool accept)
{
#if ANTFS_CONFIG_AUTH_TYPE_PAIRING_ENABLED
// This function should only be called when ANT-FS is in PAIRING mode.
if ((m_current_state.state != ANTFS_STATE_AUTH) ||
(m_current_state.sub_state.auth_sub_state != ANTFS_AUTH_SUBSTATE_PAIR))
{
return false;
}
m_link_command_in_progress = ANTFS_CMD_AUTHENTICATE_ID;
if (accept)
{
// Accept request and send passkey if authentication passed.
authenticate_response_transmit(AUTH_RESPONSE_ACCEPT,
ANTFS_PASSKEY_SIZE,
m_initial_parameters.p_pass_key);
}
else
{
// Reject authentication request.
authenticate_response_transmit(AUTH_RESPONSE_REJECT, 0, NULL);
}
return true;
#else
return false;
#endif // ANTFS_CONFIG_AUTH_TYPE_PAIRING_ENABLED
}
/**@brief Function for adding an ANT-FS event to the event queue.
*
* @param[in] event_code The event to be added.
*/
static void event_queue_write(antfs_event_t event_code)
{
antfs_event_return_t * p_event = NULL;
#if ANTFS_CONFIG_DEBUG_LED_ENABLED
uint32_t err_code;
#endif // ANTFS_CONFIG_DEBUG_LED_ENABLED
// Check if there is room in the queue for a new event.
if (((m_event_queue.head + 1u) & (ANTFS_EVENT_QUEUE_SIZE - 1u)) != m_event_queue.tail)
{
p_event = &(m_event_queue.p_queue[m_event_queue.head]);
}
if (p_event != NULL)
{
// Initialize event parameters.
p_event->event = event_code;
// Set parameters depending on event type.
switch (event_code)
{
case ANTFS_EVENT_ERASE_REQUEST:
p_event->file_index = m_file_index.data;
p_event->offset = 0;
p_event->bytes = 0;
p_event->crc = 0;
break;
case ANTFS_EVENT_DOWNLOAD_REQUEST:
p_event->file_index = m_file_index.data;
// Requested offset for the download.
p_event->offset = m_link_burst_index.data;
p_event->bytes = 0;
p_event->crc = 0;
break;
case ANTFS_EVENT_DOWNLOAD_REQUEST_DATA:
p_event->file_index = m_file_index.data;
// Current offset.
p_event->offset = m_link_burst_index.data;
if (m_bytes_remaining.data > (ANTFS_BURST_BLOCK_SIZE * BURST_PACKET_SIZE))
{
// If remaining bytes > burst block size then grab one block at a time.
p_event->bytes = ANTFS_BURST_BLOCK_SIZE * BURST_PACKET_SIZE;
}
else
{
p_event->bytes = m_bytes_remaining.data;
}
p_event->crc = 0;
break;
case ANTFS_EVENT_UPLOAD_REQUEST:
p_event->file_index = m_file_index.data;
// Requested offset for the upload.
p_event->offset = m_link_burst_index.data;
// Upper limit of the download (offset + remaining bytes).
p_event->bytes = m_max_transfer_index.data;
// CRC Seed (from last save point if resuming).
p_event->crc = m_transfer_crc;
break;
case ANTFS_EVENT_UPLOAD_DATA:
p_event->file_index = m_file_index.data;
// Current offset.
p_event->offset = m_link_burst_index.data;
// Current CRC.
p_event->crc = m_transfer_crc;
// Number of bytes to write.
p_event->bytes = m_bytes_to_write;
// Upload to appication data buffer.
memcpy(p_event->data, mp_upload_data, m_bytes_to_write);
break;
case ANTFS_EVENT_PAIRING_REQUEST:
#if ANTFS_CONFIG_DEBUG_LED_ENABLED
err_code = bsp_indication_set(BSP_INDICATE_BONDING);
APP_ERROR_CHECK(err_code);
#endif // ANTFS_CONFIG_DEBUG_LED_ENABLED
break;
default:
// No parameters need to be set.
p_event->file_index = 0;
p_event->offset = 0;
p_event->bytes = 0;
p_event->crc = 0;
break;
}
// Put the event in the queue.
m_event_queue.head = ((m_event_queue.head + 1u) & (ANTFS_EVENT_QUEUE_SIZE - 1u));
}
else
{
// No free space left in the queue.
APP_ERROR_HANDLER(0);
}
}
/**@brief Function for transmitting download request response message.
*
* @param[in] response Download response code.
*/
static void download_request_response_transmit(uint8_t response)
{
// First burst packet is beacon.
beacon_transmit(MESG_BURST_DATA_ID);
uint8_t tx_buffer[BURST_PACKET_SIZE];
// Next send the first part of the download response.
tx_buffer[0] = ANTFS_COMMAND_ID;
tx_buffer[1] = ANTFS_RSP_DOWNLOAD_ID;
tx_buffer[2] = response;
tx_buffer[3] = 0;
// Total number of bytes remaining in the data block.
tx_buffer[4] = m_bytes_remaining.bytes.byte0;
tx_buffer[5] = m_bytes_remaining.bytes.byte1;
tx_buffer[6] = m_bytes_remaining.bytes.byte2;
tx_buffer[7] = m_bytes_remaining.bytes.byte3;
uint32_t err_code = sd_ant_burst_handler_request(ANTFS_CONFIG_CHANNEL_NUMBER,
sizeof(tx_buffer),
tx_buffer,
BURST_SEGMENT_CONTINUE);
APP_ERROR_CHECK(err_code);
wait_burst_request_to_complete();
// Second part of the download response.
// The offset the data will start from in this block.
tx_buffer[0] = m_link_burst_index.bytes.byte0;
tx_buffer[1] = m_link_burst_index.bytes.byte1;
tx_buffer[2] = m_link_burst_index.bytes.byte2;
tx_buffer[3] = m_link_burst_index.bytes.byte3;
// The file size in the client device.
tx_buffer[4] = m_file_size.bytes.byte0;
tx_buffer[5] = m_file_size.bytes.byte1;
tx_buffer[6] = m_file_size.bytes.byte2;
tx_buffer[7] = m_file_size.bytes.byte3;
if (response || (m_bytes_remaining.data == 0))
{
// If the download was rejected or there is no data to send.
// Set response to end since we're not downloading any data.
err_code = sd_ant_burst_handler_request(ANTFS_CONFIG_CHANNEL_NUMBER,
sizeof(tx_buffer),
tx_buffer,
BURST_SEGMENT_END);
APP_ERROR_CHECK(err_code);
wait_burst_request_to_complete();
}
else
{
// Response will continue (data packets + CRC footer to follow).
err_code = sd_ant_burst_handler_request(ANTFS_CONFIG_CHANNEL_NUMBER,
sizeof(tx_buffer),
tx_buffer,
BURST_SEGMENT_CONTINUE);
APP_ERROR_CHECK(err_code);
wait_burst_request_to_complete();
}
m_link_command_in_progress = ANTFS_CMD_DOWNLOAD_ID;
if (response == 0)
{
// If we are going to download (response OK), enter the downloading substate.
m_current_state.sub_state.trans_sub_state = ANTFS_TRANS_SUBSTATE_DOWNLOADING;
event_queue_write(ANTFS_EVENT_DOWNLOAD_START);
}
else
{
// Download rejected.
event_queue_write(ANTFS_EVENT_DOWNLOAD_FAIL);
}
}
void antfs_download_req_resp_prepare(uint8_t response,
const antfs_request_info_t * const p_request_info)
{
// This function should only be called after receiving a download request.
APP_ERROR_CHECK_BOOL((m_current_state.state == ANTFS_STATE_TRANS) &&
(m_link_command_in_progress == ANTFS_CMD_DOWNLOAD_ID));
if (response == 0)
{
// Download request OK.
// File size of the requested download.
m_file_size.data = p_request_info->file_size.data;
if (m_link_burst_index.data > m_file_size.data)
{
// Offset should not exceed file size.
m_link_burst_index.data = m_file_size.data;
}
// If the host is not limiting download size or the file size does not exceed the host's
// download size limit.
if ((m_max_block_size.data == 0) || (m_file_size.data < m_max_block_size.data))
{
// Number of bytes remaining to be downloaded in this block is the file size.
m_bytes_remaining.data = m_file_size.data;
}
if ((m_file_size.data - m_link_burst_index.data) < m_bytes_remaining.data)
{
// Calculate number of remaining bytes in this block based on the offset.
m_bytes_remaining.data = m_file_size.data - m_link_burst_index.data;
}
// If the application is limiting the Tx block size.
if (m_bytes_remaining.data > p_request_info->max_burst_block_size.data)
{
// Number of remaining bytes in this block is the application defined block size.
m_bytes_remaining.data = p_request_info->max_burst_block_size.data;
}
// Find upper limit of the burst Tx.
m_max_transfer_index.data = m_link_burst_index.data + m_bytes_remaining.data;
if (m_saved_crc_offset == ANTFS_MAX_FILE_SIZE)
{
// CRC checking was set as invalid. An invalid download was requested, so reject it.
response = RESPONSE_INVALID_OPERATION;
}
}
if ((response != 0) || (m_file_size.data == 0))
{
// Send the response right away if the download request was rejected or there is no data to
// send.
download_request_response_transmit(response);
}
else
{
// Proceed to download data.
if (m_link_burst_index.data != m_saved_crc_offset)
{
uint32_t temp;
// If requesting to resume exactly where we left off, we can start from the same block.
if (m_link_burst_index.data == m_temp_crc_offset)
{
// Move last save point to end of last block sent.
m_saved_crc_offset = m_link_burst_index.data;
m_saved_transfer_crc = m_transfer_crc;
}
// To resume the download, request a block of data starting from the last save point.
// Update the remaining number of bytes per the last save point.
m_bytes_remaining.data += (m_link_burst_index.data - m_saved_crc_offset);
// Swap the current burst Tx index with the saved CRC index, to make sure we do not
// start updating the CRC until we get to the requested index.
temp = m_link_burst_index.data;
m_link_burst_index.data = m_saved_crc_offset;
m_saved_crc_offset = temp;
// Set CRC to previous save point, to check the CRC provided by the host.
m_transfer_crc = m_saved_transfer_crc;
}
m_temp_crc_offset = m_saved_crc_offset;
m_is_data_request_pending = true;
// Request data from application.
event_queue_write(ANTFS_EVENT_DOWNLOAD_REQUEST_DATA);
m_current_state.sub_state.trans_sub_state = ANTFS_TRANS_SUBSTATE_VERIFY_CRC;
}
}
uint32_t antfs_input_data_download(uint16_t index,
uint32_t offset,
uint32_t num_bytes,
const uint8_t * const p_message)
{
// Verify that this is the requested data.
APP_ERROR_CHECK_BOOL((offset == m_link_burst_index.data) && (index == m_file_index.data));
// If file offset is greater than the upper limit, this is not data we need.
APP_ERROR_CHECK_BOOL(offset <= m_max_transfer_index.data);
if ((m_current_state.state == ANTFS_STATE_TRANS) &&
(
(m_current_state.sub_state.trans_sub_state == ANTFS_TRANS_SUBSTATE_VERIFY_CRC) ||
// Only send data if we were processing a download request.
(m_current_state.sub_state.trans_sub_state == ANTFS_TRANS_SUBSTATE_DOWNLOADING)
)
)
{
uint32_t block_offset = 0;
if (m_current_state.sub_state.trans_sub_state == ANTFS_TRANS_SUBSTATE_VERIFY_CRC)
{
// Make sure download_request_response_transmit defaults to RESPONSE_INVALID_CRC.
uint32_t response = RESPONSE_MESSAGE_OK;
// Check CRC.
if (m_link_burst_index.data == m_saved_crc_offset)
{
// If indexes match, we can compare CRC directly.
if (m_transfer_crc != m_compared_crc)
{
response = RESPONSE_INVALID_CRC;
}
else
{
// Set up the save point
m_temp_crc_offset = m_link_burst_index.data; // Reset save point counter
m_saved_crc_offset = m_link_burst_index.data;
m_saved_buffer_crc_offset = m_link_burst_index.data;
// Set up the CRC save points
m_saved_transfer_crc = m_compared_crc;
m_saved_buffer_crc = m_compared_crc;
m_is_crc_pending = true;
}
// Start bursting beacon and the download response (3 burst packets).
download_request_response_transmit(response);
}
// If the data is in this block, advance to the requested offset
else if ((m_link_burst_index.data < m_saved_crc_offset) &&
((m_saved_crc_offset - m_link_burst_index.data) < num_bytes))
{
// Update the offset within this block for the requested transmission.
block_offset = m_saved_crc_offset - m_link_burst_index.data;
// Update the number of bytes that will actually be transmitted.
num_bytes -= block_offset;
// Update CRC calculation up to requested index.
m_transfer_crc = crc_crc16_update(m_transfer_crc, p_message, block_offset);
// Update the remaining number of bytes.
m_bytes_remaining.data -= block_offset;
// Check CRC
if (m_transfer_crc != m_compared_crc)
{
response = RESPONSE_INVALID_CRC;
}
else
{
// Move index back to point where transmission will resume.
m_link_burst_index.data = m_saved_crc_offset;
// Set up the save point
m_temp_crc_offset = m_link_burst_index.data; // Reset save point counter
m_saved_buffer_crc_offset = m_link_burst_index.data;
// Set up the CRC save points
m_saved_transfer_crc = m_compared_crc;
m_saved_buffer_crc = m_compared_crc;
m_is_crc_pending = true;
}
download_request_response_transmit(response);
}
// Data index has gone too far and it is not possible to check CRC, fail and let host retry
else if (m_link_burst_index.data > m_saved_crc_offset)
{
response = RESPONSE_INVALID_CRC;
download_request_response_transmit(response);
}
// Keep getting data and recalculate the CRC until the indexes match
else
{
m_is_data_request_pending = false;
// Update the current burst index and bytes remaining
m_link_burst_index.data += num_bytes;
m_bytes_remaining.data -= num_bytes;
// Update CRC
m_transfer_crc = crc_crc16_update(m_transfer_crc, p_message, num_bytes);
// Request more data.
event_queue_write(ANTFS_EVENT_DOWNLOAD_REQUEST_DATA);
}
}
// Append data.
if (m_current_state.sub_state.trans_sub_state == ANTFS_TRANS_SUBSTATE_DOWNLOADING)
{
uint32_t num_of_bytes_to_burst = num_bytes;
if (num_of_bytes_to_burst & (BURST_PACKET_SIZE - 1u))
{
// Round up total number bytes to a multiple of BURST_PACKET_SIZE to be sent to
// burst handler.
num_of_bytes_to_burst &= ~(BURST_PACKET_SIZE - 1u);
num_of_bytes_to_burst += BURST_PACKET_SIZE;
}
uint32_t err_code = sd_ant_burst_handler_request(ANTFS_CONFIG_CHANNEL_NUMBER,
num_of_bytes_to_burst,
(uint8_t*)&(p_message[block_offset]),
BURST_SEGMENT_CONTINUE);
if (err_code != NRF_ANT_ERROR_TRANSFER_SEQUENCE_NUMBER_ERROR)
{
// If burst failed before we are able to catch it, we will get a TRANSFER_SEQUENCE_NUMBER_ERROR
// The message processing will send client back to correct state
APP_ERROR_CHECK(err_code);
}
wait_burst_request_to_complete();
// Update current burst index.
m_link_burst_index.data += num_bytes;
// Update remaining bytes.
m_bytes_remaining.data -= num_bytes;
m_is_data_request_pending = false;
m_transfer_crc = crc_crc16_update(m_transfer_crc,
&(p_message[block_offset]),
num_bytes);
if ((m_link_burst_index.data - m_temp_crc_offset) > SAVE_DISTANCE)
{
// Set CRC save point
m_saved_transfer_crc = m_saved_buffer_crc; // Set CRC at buffer save point (will always be one behind to account for buffering)
m_saved_buffer_crc = m_transfer_crc; // Set CRC at save point
// Set offset save point
m_saved_crc_offset = m_saved_buffer_crc_offset; // Set offset at buffer save point (will always be one behind to account for buffering)
m_saved_buffer_crc_offset = m_link_burst_index.data; // Set buffer offset to current data offset
// Reset save counter offset
m_temp_crc_offset = m_link_burst_index.data; // Set to current location; next save point will take place after SAVE_DISTANCE bytes
}
if (!m_is_data_request_pending && (m_link_burst_index.data < m_max_transfer_index.data))
{
// If we have not finished the download.
// Request more data.
event_queue_write(ANTFS_EVENT_DOWNLOAD_REQUEST_DATA);
m_is_data_request_pending = true;
}
else if (m_link_burst_index.data >= m_max_transfer_index.data && m_is_crc_pending)
{
// We are done, send CRC footer.
uint8_t tx_buffer[BURST_PACKET_SIZE];
tx_buffer[0] = 0;
tx_buffer[1] = 0;
tx_buffer[2] = 0;
tx_buffer[3] = 0;
tx_buffer[4] = 0;
tx_buffer[5] = 0;
tx_buffer[6] = (uint8_t)m_transfer_crc;
tx_buffer[7] = (uint8_t)(m_transfer_crc >> 8u);
err_code = sd_ant_burst_handler_request(ANTFS_CONFIG_CHANNEL_NUMBER,
sizeof(tx_buffer),
tx_buffer,
BURST_SEGMENT_END);
if (err_code != NRF_ANT_ERROR_TRANSFER_SEQUENCE_NUMBER_ERROR)
{
// If burst failed before we are able to catch it, we will get a TRANSFER_SEQUENCE_NUMBER_ERROR
// The message processing will send client back to correct state
APP_ERROR_CHECK(err_code);
}
wait_burst_request_to_complete();
m_is_crc_pending = false;
m_max_transfer_index.data = 0;
}
// Return the number of bytes we accepted.
return num_bytes;
}
}
// No bytes were accepted.
return 0;
}
bool antfs_upload_req_resp_transmit(uint8_t response,
const antfs_request_info_t * const p_request_info)
{
#if ANTFS_CONFIG_UPLOAD_ENABLED
if (m_current_state.state != ANTFS_STATE_TRANS ||
// Only send the response if we were processing an upload request.
(m_link_command_in_progress != ANTFS_CMD_UPLOAD_REQUEST_ID))
{
return false;
}
// If the application is sending a response for a different file than requested, the upload
// will fail.
if (p_request_info->file_index.data != m_file_index.data)
{
event_queue_write(ANTFS_EVENT_UPLOAD_FAIL);
return false;
}
ulong_union_t max_mem_size;
// Set maximum number of bytes that can be written to the file.
max_mem_size.data = p_request_info->max_file_size;
if (p_request_info->max_burst_block_size.data != 0)
{
// If the client is limiting the block size set the block size requested by the client.
m_block_size.data = p_request_info->max_burst_block_size.data;
}
else
{
// Try to get the entire file in a single block.
m_block_size.data = max_mem_size.data;
}
if (response == 0)
{
if (m_max_transfer_index.data > max_mem_size.data)
{
// Not enough space to write file, reject download.
response = RESPONSE_MESSAGE_NOT_ENOUGH_SPACE;
}
}
// Get last valid CRC and last valid offset.
m_transfer_crc = p_request_info->file_crc;
m_link_burst_index.data = p_request_info->file_size.data;
// First packet to transmit is the beacon.
beacon_transmit(MESG_BURST_DATA_ID);
// Second packet.
uint8_t tx_buffer[BURST_PACKET_SIZE];
tx_buffer[0] = ANTFS_COMMAND_ID;
tx_buffer[1] = ANTFS_RSP_UPLOAD_REQ_ID;
tx_buffer[2] = response;
tx_buffer[3] = 0;
// Last valid data offset written to the file.
tx_buffer[4] = m_link_burst_index.bytes.byte0;
tx_buffer[5] = m_link_burst_index.bytes.byte1;
tx_buffer[6] = m_link_burst_index.bytes.byte2;
tx_buffer[7] = m_link_burst_index.bytes.byte3;
uint32_t err_code = sd_ant_burst_handler_request(ANTFS_CONFIG_CHANNEL_NUMBER,
sizeof(tx_buffer),
tx_buffer,
BURST_SEGMENT_CONTINUE);
APP_ERROR_CHECK(err_code);
wait_burst_request_to_complete();
// Third packet.
// Maximum number of bytes that can be written to the file.
tx_buffer[0] = max_mem_size.bytes.byte0;
tx_buffer[1] = max_mem_size.bytes.byte1;
tx_buffer[2] = max_mem_size.bytes.byte2;
tx_buffer[3] = max_mem_size.bytes.byte3;
// Maximum upload block size.
tx_buffer[4] = m_block_size.bytes.byte0;
tx_buffer[5] = m_block_size.bytes.byte1;
tx_buffer[6] = m_block_size.bytes.byte2;
tx_buffer[7] = m_block_size.bytes.byte3;
err_code = sd_ant_burst_handler_request(ANTFS_CONFIG_CHANNEL_NUMBER,
sizeof(tx_buffer),
tx_buffer,
BURST_SEGMENT_CONTINUE);
APP_ERROR_CHECK(err_code);
wait_burst_request_to_complete();
// Fourth packet.
tx_buffer[0] = 0;
tx_buffer[1] = 0;
tx_buffer[2] = 0;
tx_buffer[3] = 0;
tx_buffer[4] = 0;
tx_buffer[5] = 0;
// Value of CRC at last data offset.
tx_buffer[6] = (uint8_t) m_transfer_crc;
tx_buffer[7] = (uint8_t)(m_transfer_crc >> 8);
err_code = sd_ant_burst_handler_request(ANTFS_CONFIG_CHANNEL_NUMBER,
sizeof(tx_buffer),
tx_buffer,
BURST_SEGMENT_END);
APP_ERROR_CHECK(err_code);
wait_burst_request_to_complete();
m_link_command_in_progress = ANTFS_CMD_UPLOAD_REQUEST_ID;
if (response != 0)
{
// Failed upload request. Reset max transfer index to 0 (do not accept any data if the host
// sends it anyway).
m_max_transfer_index.data = 0;
}
else
{
// Wait for upload data request.
m_current_state.sub_state.trans_sub_state = ANTFS_TRANS_SUBSTATE_UPLOAD_WAIT_FOR_DATA;
}
return true;
#else
return false;
#endif // ANTFS_CONFIG_UPLOAD_ENABLED
}
bool antfs_upload_data_resp_transmit(bool data_upload_success)
{
#if ANTFS_CONFIG_UPLOAD_ENABLED
// Should be in TRANSPORT layer to send this response.
if (m_current_state.state != ANTFS_STATE_TRANS)
{
return false;
}
uint8_t tx_buffer[BURST_PACKET_SIZE];
// Response.
tx_buffer[0] = ANTFS_COMMAND_ID;
tx_buffer[1] = ANTFS_RSP_UPLOAD_DATA_ID;
tx_buffer[2] = (data_upload_success) ? RESPONSE_MESSAGE_OK : RESPONSE_MESSAGE_FAIL;
tx_buffer[3] = 0;
tx_buffer[4] = 0;
tx_buffer[5] = 0;
tx_buffer[6] = 0;
tx_buffer[7] = 0;
// First packet is beacon.
beacon_transmit(MESG_BURST_DATA_ID);
// Send last packet.
uint32_t err_code = sd_ant_burst_handler_request(ANTFS_CONFIG_CHANNEL_NUMBER,
sizeof(tx_buffer),
tx_buffer,
BURST_SEGMENT_END);
APP_ERROR_CHECK(err_code);
wait_burst_request_to_complete();
m_link_command_in_progress = ANTFS_CMD_UPLOAD_REQUEST_ID;
// Reset maximum index.
m_max_transfer_index.data = 0;
return true;
#else
return false;
#endif // ANTFS_CONFIG_UPLOAD_ENABLED
}
void antfs_erase_req_resp_transmit(uint8_t response)
{
// This function should only be called after receiving an erase request.
APP_ERROR_CHECK_BOOL((m_current_state.state == ANTFS_STATE_TRANS) &&
(m_link_command_in_progress == ANTFS_CMD_ERASE_ID));
beacon_transmit(MESG_BURST_DATA_ID);
uint8_t tx_buffer[BURST_PACKET_SIZE];
// Erase response.
tx_buffer[0] = ANTFS_COMMAND_ID;
tx_buffer[1] = ANTFS_RSP_ERASE_ID;
tx_buffer[2] = response;
tx_buffer[3] = 0;
tx_buffer[4] = 0;
tx_buffer[5] = 0;
tx_buffer[6] = 0;
tx_buffer[7] = 0;
uint32_t err_code = sd_ant_burst_handler_request(ANTFS_CONFIG_CHANNEL_NUMBER,
sizeof(tx_buffer),
tx_buffer,
BURST_SEGMENT_END);
APP_ERROR_CHECK(err_code);
wait_burst_request_to_complete();
}
bool antfs_event_extract(antfs_event_return_t * const p_event)
{
bool return_value = false;
if (m_event_queue.head != m_event_queue.tail)
{
// Pending events exist. Copy event parameters into return event.
p_event->event = m_event_queue.p_queue[m_event_queue.tail].event;
p_event->file_index = m_event_queue.p_queue[m_event_queue.tail].file_index;
p_event->offset = m_event_queue.p_queue[m_event_queue.tail].offset;
p_event->bytes = m_event_queue.p_queue[m_event_queue.tail].bytes;
p_event->crc = m_event_queue.p_queue[m_event_queue.tail].crc;
memcpy(p_event->data,
m_event_queue.p_queue[m_event_queue.tail].data,
sizeof(p_event->data));
// Release the event queue.
m_event_queue.tail = ((m_event_queue.tail + 1u) & (ANTFS_EVENT_QUEUE_SIZE - 1u));
return_value = true;
}
return return_value;
}
/**@brief Function for setting the channel period.
*
* Sets the channel period. The only allowed frequencies are 0.5, 1, 2, 4 and 8 Hz.
*
* @param[in] link_period Link period for the beacon transmission.
*/
static void channel_period_set(uint32_t link_period)
{
uint32_t period;
switch (link_period)
{
default:
// Shouldn't happen, but just in case default to 0,5Hz.
case BEACON_PERIOD_0_5_HZ:
period = 65535u;
break;
case BEACON_PERIOD_1_HZ:
period = 32768u;
break;
case BEACON_PERIOD_2_HZ:
period = 16384u;
break;
case BEACON_PERIOD_4_HZ:
period = 8192u;
break;
case BEACON_PERIOD_8_HZ:
period = 4096u;
break;
}
const uint32_t err_code = sd_ant_channel_period_set(ANTFS_CONFIG_CHANNEL_NUMBER, period);
APP_ERROR_CHECK(err_code);
}
/**@brief Function for starting ANT-FS timeout.
*
* @param[in] timeout_in_secs Timeout requested in unit of seconds.
*/
static void timeout_start(uint32_t timeout_in_secs)
{
uint32_t err_code = app_timer_stop(m_timer_id);
APP_ERROR_CHECK(err_code);
err_code = app_timer_start(m_timer_id,
APP_TIMER_TICKS((uint32_t)(timeout_in_secs * 1000u)),
NULL);
APP_ERROR_CHECK(err_code);
}
/**@brief Function for switching to authentication layer.
*/
static void authenticate_layer_transit(void)
{
if (m_current_state.state != ANTFS_STATE_OFF)
{
m_current_state.state = ANTFS_STATE_AUTH;
m_current_state.sub_state.auth_sub_state = ANTFS_AUTH_SUBSTATE_NONE;
m_link_command_in_progress = ANTFS_CMD_NONE;
timeout_start(ANTFS_CONFIG_LINK_COMMAND_TIMEOUT);
uint32_t err_code = sd_ant_channel_radio_freq_set(ANTFS_CONFIG_CHANNEL_NUMBER, m_active_beacon_frequency);
APP_ERROR_CHECK(err_code);
event_queue_write(ANTFS_EVENT_AUTH);
}
}
/**@brief Function for decoding an ANT-FS command received at the link layer.
*
* @param[in] p_command_buffer The ANT-FS command buffer.
*/
static void link_layer_cmd_decode(const uint8_t * p_command_buffer)
{
if (p_command_buffer[ANTFS_CONNECTION_TYPE_OFFSET] != ANTFS_COMMAND_ID)
{
return;
}
switch (p_command_buffer[ANTFS_COMMAND_OFFSET])
{
case ANTFS_CMD_LINK_ID:
// Channel frequency.
m_active_beacon_frequency =
p_command_buffer[TRANSPORT_CHANNEL_FREQUENCY_OFFSET];
// Channel message period.
m_active_beacon_status1_field.parameters.link_period =
p_command_buffer[TRANSPORT_MESSAGE_PERIOD_OFFSET];
// Host serial Number.
m_link_host_serial_number.bytes.byte0 =
p_command_buffer[HOST_ID_OFFSET_0];
m_link_host_serial_number.bytes.byte1 =
p_command_buffer[HOST_ID_OFFSET_1];
m_link_host_serial_number.bytes.byte2 =
p_command_buffer[HOST_ID_OFFSET_2];
m_link_host_serial_number.bytes.byte3 =
p_command_buffer[HOST_ID_OFFSET_3];
// Move to the channel period issued by the host.
channel_period_set(m_active_beacon_status1_field.parameters.link_period);
authenticate_layer_transit();
break;
default:
break;
}
}
/**@brief Function for switching to link layer.
*/
static void link_layer_transit(void)
{
if (m_current_state.state != ANTFS_STATE_OFF)
{
uint32_t err_code;
#if ANTFS_CONFIG_DEBUG_LED_ENABLED
err_code = bsp_indication_set(BSP_INDICATE_IDLE);
APP_ERROR_CHECK(err_code);
#endif // ANTFS_CONFIG_DEBUG_LED_ENABLED
m_current_state.state = ANTFS_STATE_LINK;
m_current_state.sub_state.link_sub_state = ANTFS_LINK_SUBSTATE_NONE;
m_link_command_in_progress = ANTFS_CMD_NONE;
m_active_beacon_status1_field = m_initial_parameters.beacon_status_byte1;
m_active_beacon_frequency = m_initial_parameters.beacon_frequency;
timeout_disable();
err_code = sd_ant_channel_radio_freq_set(ANTFS_CONFIG_CHANNEL_NUMBER, m_active_beacon_frequency);
APP_ERROR_CHECK(err_code);
event_queue_write(ANTFS_EVENT_LINK);
}
}
/**@brief Function for decoding an ANT-FS command received at the authenticate layer.
*
* @param[in] control_byte The command control byte.
* @param[in] p_command_buffer The ANT-FS command buffer.
*/
static void authenticate_layer_cmd_decode(uint8_t control_byte,
const uint8_t * p_command_buffer)
{
// @note: Response variable must have a static storage allocation as it keeps track of the
// passkey authentication progress between multiple burst packets.
#if ANTFS_CONFIG_AUTH_TYPE_PASSKEY_ENABLED
static uint32_t response;
#endif // ANTFS_CONFIG_AUTH_TYPE_PASSKEY_ENABLED
if ((control_byte & ~SEQUENCE_LAST_MESSAGE) == 0 && m_link_command_in_progress != ANTFS_CMD_NONE)
{
// This is something new, and we're busy processing something already, so don't respond
return;
}
if (p_command_buffer[ANTFS_CONNECTION_TYPE_OFFSET] == ANTFS_COMMAND_ID &&
m_link_command_in_progress == ANTFS_CMD_NONE)
{
if (p_command_buffer[ANTFS_COMMAND_OFFSET] == ANTFS_CMD_AUTHENTICATE_ID)
{
// Make sure it is the correct host
if (m_link_host_serial_number.bytes.byte0 != p_command_buffer[HOST_ID_OFFSET_0] ||
m_link_host_serial_number.bytes.byte1 != p_command_buffer[HOST_ID_OFFSET_1] ||
m_link_host_serial_number.bytes.byte2 != p_command_buffer[HOST_ID_OFFSET_2] ||
m_link_host_serial_number.bytes.byte3 != p_command_buffer[HOST_ID_OFFSET_3])
return;
m_link_command_in_progress = ANTFS_CMD_AUTHENTICATE_ID;
m_authenticate_command_type = p_command_buffer[COMMAND_TYPE_OFFSET];
m_retry = AUTHENTICATION_RETRIES;
}
}
if (m_link_command_in_progress == ANTFS_CMD_AUTHENTICATE_ID)
{
switch (m_authenticate_command_type)
{
case COMMAND_TYPE_REQUEST_SERIAL:
if (control_byte & SEQUENCE_LAST_MESSAGE)
{
// Don't do anything before the burst completes (last burst message received).
timeout_start(ANTFS_CONFIG_LINK_COMMAND_TIMEOUT);
authenticate_response_transmit(AUTH_RESPONSE_N_A,
ANTFS_REMOTE_FRIENDLY_NAME_MAX,
// Send device friendly name if it exists.
m_initial_parameters.p_remote_friendly_name);
}
break;
#if ANTFS_CONFIG_AUTH_TYPE_PASSTHROUGH_ENABLED
case COMMAND_TYPE_PROCEED:
if (control_byte & SEQUENCE_LAST_MESSAGE)
{
// Don't do anything before the burst completes (last burst message received).
timeout_start(ANTFS_CONFIG_LINK_COMMAND_TIMEOUT);
// Proceed directly to transport layer (no authentication required).
authenticate_response_transmit(AUTH_RESPONSE_ACCEPT, 0, NULL);
}
break;
#endif // ANTFS_CONFIG_AUTH_TYPE_PASSTHROUGH_ENABLED
#if ANTFS_CONFIG_AUTH_TYPE_PAIRING_ENABLED
case COMMAND_TYPE_REQUEST_PAIR:
if ((control_byte & SEQUENCE_NUMBER_ROLLOVER) == 0)
{
// First burst packet.
// Friendly name length.
m_friendly_name.friendly_name_size =
p_command_buffer[AUTH_STRING_LENGTH_OFFSET];
if (m_friendly_name.friendly_name_size > 0)
{
if (m_friendly_name.friendly_name_size > ANTFS_FRIENDLY_NAME_MAX)
{
m_friendly_name.friendly_name_size = ANTFS_FRIENDLY_NAME_MAX;
}
m_friendly_name.index = 0;
}
}
else
{
// Next burst packets: read host friendly name.
if (m_friendly_name.index < ANTFS_FRIENDLY_NAME_MAX)
{
uint32_t num_of_bytes = ANTFS_FRIENDLY_NAME_MAX - m_friendly_name.index;
if (num_of_bytes > 8u)
{
num_of_bytes = 8u;
}
memcpy((uint8_t*)&m_friendly_name.friendly_name[m_friendly_name.index],
p_command_buffer,
num_of_bytes);
m_friendly_name.index += num_of_bytes;
}
}
if (control_byte & SEQUENCE_LAST_MESSAGE)
{
// Last burst packet.
timeout_start(ANTFS_CONFIG_PAIRING_TIMEOUT);
if (m_friendly_name.friendly_name_size > 0)
{
m_friendly_name.is_name_set = true;
}
m_current_state.sub_state.auth_sub_state = ANTFS_AUTH_SUBSTATE_PAIR;
// If pairing is supported, send request to UI.
event_queue_write(ANTFS_EVENT_PAIRING_REQUEST);
}
break;
#endif // ANTFS_CONFIG_AUTH_TYPE_PAIRING_ENABLED
#if ANTFS_CONFIG_AUTH_TYPE_PASSKEY_ENABLED
case COMMAND_TYPE_REQUEST_PASSKEY:
if ((control_byte & SEQUENCE_NUMBER_ROLLOVER) == 0)
{
// First burst packet.
// Passkey length.
const uint32_t passkey_size = p_command_buffer[AUTH_STRING_LENGTH_OFFSET];
// Default the algorithm to accept.
response = AUTH_RESPONSE_ACCEPT;
// Check if the passkey length is valid.
if (passkey_size == ANTFS_PASSKEY_SIZE)
{
m_passkey_index = 0;
}
else
{
// Invalid lenght supplied - the authentication will be rejected.
response = AUTH_RESPONSE_REJECT;
}
}
else
{
// Next burst packets: read host friendly name.
if ((response == AUTH_RESPONSE_ACCEPT) &&
// Prevent buffer overrun.
(m_passkey_index != ANTFS_PASSKEY_SIZE))
{
// Passkey length was valid and the host supplied key matches so far.
uint32_t idx = 0;
// Check the current received burst packet for passkey match.
do
{
if (m_initial_parameters.p_pass_key[m_passkey_index++] !=
p_command_buffer[idx])
{
// Reject the authentication request and further processing of
// passkey matching if a mismatch is found.
response = AUTH_RESPONSE_REJECT;
break;
}
++idx;
}
while (idx < BURST_PACKET_SIZE);
}
}
if (control_byte & SEQUENCE_LAST_MESSAGE)
{
// Last burst packet.
if (m_passkey_index < ANTFS_PASSKEY_SIZE)
{
// We did not get the complete passkey, reject authentication request.
response = AUTH_RESPONSE_REJECT;
}
timeout_start(ANTFS_CONFIG_LINK_COMMAND_TIMEOUT);
m_current_state.sub_state.auth_sub_state = ANTFS_AUTH_SUBSTATE_PASSKEY;
authenticate_response_transmit(response, 0, NULL);
}
break;
#endif // ANTFS_CONFIG_AUTH_TYPE_PASSKEY_ENABLED
default:
break;
}
}
else if (p_command_buffer[ANTFS_COMMAND_OFFSET] == ANTFS_CMD_DISCONNECT_ID)
{
if (control_byte & SEQUENCE_LAST_MESSAGE)
{
// Don't do anything before the burst completes (last burst message received).
link_layer_transit();
}
}
else if (p_command_buffer[ANTFS_COMMAND_OFFSET] == ANTFS_CMD_PING_ID)
{
// Reset timeout.
timeout_start(ANTFS_CONFIG_LINK_COMMAND_TIMEOUT);
m_link_command_in_progress = ANTFS_CMD_NONE;
}
else
{
// No implementation needed.
}
}
/**@brief Function for decoding an ANT-FS command received at the transport layer.
*
* @param[in] control_byte The command control byte.
* @param[in] p_command_buffer The ANT-FS command buffer.
*/
static void transport_layer_cmd_decode(uint8_t control_byte, const uint8_t * p_command_buffer)
{
ulong_union_t host_serial_number = {0};
if (p_command_buffer[ANTFS_CONNECTION_TYPE_OFFSET] == ANTFS_COMMAND_ID)
{
m_link_command_in_progress = p_command_buffer[ANTFS_COMMAND_OFFSET];
}
switch (m_link_command_in_progress)
{
case ANTFS_CMD_PING_ID:
// Reset timeout.
timeout_start(ANTFS_CONFIG_LINK_COMMAND_TIMEOUT);
m_link_command_in_progress = ANTFS_CMD_NONE;
break;
case ANTFS_CMD_DISCONNECT_ID:
if (control_byte & SEQUENCE_LAST_MESSAGE)
{
// Don't do anything before the burst completes (last burst message received).
link_layer_transit();
}
break;
case ANTFS_CMD_ERASE_ID:
if (control_byte & SEQUENCE_LAST_MESSAGE)
{
// Don't do anything before the burst completes (last burst message received).
// Requested index.
m_file_index.bytes.low = p_command_buffer[DATA_INDEX_OFFSET_LOW];
m_file_index.bytes.high = p_command_buffer[DATA_INDEX_OFFSET_HIGH];
// Send erase request to the application.
event_queue_write(ANTFS_EVENT_ERASE_REQUEST);
timeout_start(ANTFS_CONFIG_LINK_COMMAND_TIMEOUT);
m_link_command_in_progress = ANTFS_CMD_ERASE_ID;
}
break;
case ANTFS_CMD_DOWNLOAD_ID:
if (m_current_state.sub_state.trans_sub_state != ANTFS_TRANS_SUBSTATE_NONE)
{
// Ignore the command if we are busy.
break;
}
if ((control_byte & SEQUENCE_NUMBER_MASK) == SEQUENCE_FIRST_MESSAGE)
{
// First burst packet.
if ((m_file_index.bytes.low != p_command_buffer[DATA_INDEX_OFFSET_LOW]) ||
(m_file_index.bytes.high != p_command_buffer[DATA_INDEX_OFFSET_HIGH]))
{
// This is a new index, so we can not check the CRC against the previous saved
// CRC.
// CRC seed checking is made invalid by setting the last saved offset to the
// maximum file size.
m_saved_crc_offset = ANTFS_MAX_FILE_SIZE;
}
// Requested data file index.
m_file_index.bytes.low = p_command_buffer[DATA_INDEX_OFFSET_LOW];
m_file_index.bytes.high = p_command_buffer[DATA_INDEX_OFFSET_HIGH];
// Initialize current position in the TX burst to the requested offset.
m_link_burst_index.bytes.byte0 = p_command_buffer[ADDRESS_PARAMETER_OFFSET_0];
m_link_burst_index.bytes.byte1 = p_command_buffer[ADDRESS_PARAMETER_OFFSET_1];
m_link_burst_index.bytes.byte2 = p_command_buffer[ADDRESS_PARAMETER_OFFSET_2];
m_link_burst_index.bytes.byte3 = p_command_buffer[ADDRESS_PARAMETER_OFFSET_3];
}
else if (control_byte & SEQUENCE_LAST_MESSAGE)
{
// Last burst packet (download command should be two packets long).
// Get CRC seed from host.
m_compared_crc = (uint16_t)p_command_buffer[DATA_INDEX_OFFSET_LOW];
m_compared_crc |= ((uint16_t)p_command_buffer[DATA_INDEX_OFFSET_HIGH] << 8u);
// Maximum block size allowed by host.
m_max_block_size.bytes.byte0 = p_command_buffer[ADDRESS_PARAMETER_OFFSET_0];
m_max_block_size.bytes.byte1 = p_command_buffer[ADDRESS_PARAMETER_OFFSET_1];
m_max_block_size.bytes.byte2 = p_command_buffer[ADDRESS_PARAMETER_OFFSET_2];
m_max_block_size.bytes.byte3 = p_command_buffer[ADDRESS_PARAMETER_OFFSET_3];
// Initialize number of remaining bytes for this block to the maximum block size.
m_bytes_remaining.data = m_max_block_size.data;
if (p_command_buffer[INITIAL_REQUEST_OFFSET])
{
// This request is the start of a new transfer.
// Initialize data offset for CRC calculation to the requested data offset.
m_saved_crc_offset = m_link_burst_index.data;
m_saved_buffer_crc_offset = m_link_burst_index.data;
// Use CRC seed provided by host for CRC checking of the data.
m_transfer_crc = m_compared_crc;
m_saved_transfer_crc = m_compared_crc;
m_saved_buffer_crc = m_compared_crc;
m_current_state.sub_state.trans_sub_state = ANTFS_TRANS_SUBSTATE_VERIFY_CRC;
}
else
{
// This is a request to resume a partially completed transfer.
if (m_saved_crc_offset > m_link_burst_index.data)
{
// We can not check the received CRC seed as the requested offset is before
// our last save point.
// Set CRC checking as invalid.
m_saved_crc_offset = ANTFS_MAX_FILE_SIZE;
}
else
{
m_current_state.sub_state.trans_sub_state = ANTFS_TRANS_SUBSTATE_VERIFY_CRC;
}
}
m_is_data_request_pending = false;
// Send download request to the application for further handling.
event_queue_write(ANTFS_EVENT_DOWNLOAD_REQUEST);
timeout_start(ANTFS_CONFIG_LINK_COMMAND_TIMEOUT);
m_link_command_in_progress = ANTFS_CMD_DOWNLOAD_ID;
}
break;
case ANTFS_CMD_UPLOAD_REQUEST_ID:
#if ANTFS_CONFIG_UPLOAD_ENABLED
if ((control_byte & ~SEQUENCE_LAST_MESSAGE) == 0x00)
{
// First burst packet.
if ((m_file_index.bytes.low != p_command_buffer[DATA_INDEX_OFFSET_LOW]) ||
(
(m_file_index.bytes.high != p_command_buffer[DATA_INDEX_OFFSET_HIGH]) ||
(m_current_state.sub_state.trans_sub_state == ANTFS_TRANS_SUBSTATE_NONE)
)
)
{
// If it is a new index or we completed the last upload.
// Get the file index.
m_file_index.bytes.low = p_command_buffer[DATA_INDEX_OFFSET_LOW];
m_file_index.bytes.high = p_command_buffer[DATA_INDEX_OFFSET_HIGH];
// As this is a new upload, reset save point to the beginning of the file.
// Set CRC to zero.
m_saved_crc_offset = 0;
m_saved_transfer_crc = 0;
}
// Get the upper limit of upload from request message.
m_max_transfer_index.bytes.byte0 = p_command_buffer[ADDRESS_PARAMETER_OFFSET_0];
m_max_transfer_index.bytes.byte1 = p_command_buffer[ADDRESS_PARAMETER_OFFSET_1];
m_max_transfer_index.bytes.byte2 = p_command_buffer[ADDRESS_PARAMETER_OFFSET_2];
m_max_transfer_index.bytes.byte3 = p_command_buffer[ADDRESS_PARAMETER_OFFSET_3];
}
else if (control_byte & SEQUENCE_LAST_MESSAGE)
{
// Last burst (second) packet.
// Get data offset the requested upload will start at.
m_link_burst_index.bytes.byte0 = p_command_buffer[ADDRESS_PARAMETER_OFFSET_0];
m_link_burst_index.bytes.byte1 = p_command_buffer[ADDRESS_PARAMETER_OFFSET_1];
m_link_burst_index.bytes.byte2 = p_command_buffer[ADDRESS_PARAMETER_OFFSET_2];
m_link_burst_index.bytes.byte3 = p_command_buffer[ADDRESS_PARAMETER_OFFSET_3];
if (m_link_burst_index.data != ANTFS_MAX_FILE_SIZE)
{
// If this is a new upload.
// The data offset specified in the upload request will be used.
m_saved_crc_offset = m_link_burst_index.data;
m_saved_transfer_crc = 0;
}
m_transfer_crc = m_saved_transfer_crc;
// Send upload request to the application for further handling.
event_queue_write(ANTFS_EVENT_UPLOAD_REQUEST);
timeout_start(ANTFS_CONFIG_LINK_COMMAND_TIMEOUT);
m_link_command_in_progress = ANTFS_CMD_UPLOAD_REQUEST_ID;
}
#endif // ANTFS_CONFIG_UPLOAD_ENABLED
break;
case ANTFS_CMD_UPLOAD_DATA_ID:
#if ANTFS_CONFIG_UPLOAD_ENABLED
if ((control_byte & ~SEQUENCE_LAST_MESSAGE) == 0x00)
{
// First burst packet.
if (m_current_state.sub_state.trans_sub_state ==
ANTFS_TRANS_SUBSTATE_UPLOAD_WAIT_FOR_DATA)
{
antfs_event_t event;
// Get CRC Seed from host.
m_compared_crc = (uint16_t)p_command_buffer[DATA_INDEX_OFFSET_LOW];
m_compared_crc |= ((uint16_t)p_command_buffer[DATA_INDEX_OFFSET_HIGH] << 8u);
// Set download offset.
m_link_burst_index.bytes.byte0 = p_command_buffer[ADDRESS_PARAMETER_OFFSET_0];
m_link_burst_index.bytes.byte1 = p_command_buffer[ADDRESS_PARAMETER_OFFSET_1];
m_link_burst_index.bytes.byte2 = p_command_buffer[ADDRESS_PARAMETER_OFFSET_2];
m_link_burst_index.bytes.byte3 = p_command_buffer[ADDRESS_PARAMETER_OFFSET_3];
if ((m_link_burst_index.data + m_block_size.data) < m_max_transfer_index.data)
{
// Adjust block size as set by client.
m_max_transfer_index.data = m_link_burst_index.data + m_block_size.data;
}
if (m_compared_crc != m_transfer_crc)
{
// Check that the request matches the CRC sent on the upload response.
// Do not accept any data.
m_max_transfer_index.data = 0;
// Failure will be reported when upload is done.
event = (antfs_event_t)0;
}
// Set ready to receive a file.
m_current_state.sub_state.trans_sub_state = ANTFS_TRANS_SUBSTATE_UPLOADING;
event = ANTFS_EVENT_UPLOAD_START;
m_transfer_crc = m_compared_crc;
if (m_link_burst_index.data > m_max_transfer_index.data)
{
// If the requested offset is too high.
// Clear the max transfer index, so we'll report fail when the transfer
// finishes.
m_max_transfer_index.data = 0;
// Clear the event because we normally would not send an event at this point
// in this case.
event = (antfs_event_t)0;
}
if (control_byte & SEQUENCE_LAST_MESSAGE)
{
// If this upload contains no data.
// Leave the upload state.
m_current_state.sub_state.trans_sub_state = ANTFS_TRANS_SUBSTATE_NONE;
// if it was a valid index, report it as a successful upload, otherwise
// report it as a failure.
if (event == 0)
{
event = ANTFS_EVENT_UPLOAD_FAIL;
}
else
{
event = ANTFS_EVENT_UPLOAD_COMPLETE;
}
}
if (event != 0)
{
event_queue_write(event);
}
}
}
#endif // ANTFS_CONFIG_UPLOAD_ENABLED
break;
case ANTFS_CMD_LINK_ID:
host_serial_number.bytes.byte0 = p_command_buffer[HOST_ID_OFFSET_0];
host_serial_number.bytes.byte1 = p_command_buffer[HOST_ID_OFFSET_1];
host_serial_number.bytes.byte2 = p_command_buffer[HOST_ID_OFFSET_2];
host_serial_number.bytes.byte3 = p_command_buffer[HOST_ID_OFFSET_3];
if (m_link_host_serial_number.data == host_serial_number.data)
{
m_active_beacon_frequency = p_command_buffer[TRANSPORT_CHANNEL_FREQUENCY_OFFSET];
m_active_beacon_status1_field.parameters.link_period =
p_command_buffer[TRANSPORT_MESSAGE_PERIOD_OFFSET];
const uint32_t err_code = sd_ant_channel_radio_freq_set(ANTFS_CONFIG_CHANNEL_NUMBER,
m_active_beacon_frequency);
APP_ERROR_CHECK(err_code);
channel_period_set(m_active_beacon_status1_field.parameters.link_period);
}
m_link_command_in_progress = 0;
break;
default:
// Don't do anything, this is an invalid message.
m_link_command_in_progress = 0;
break;
}
}
/**@brief Function for handling data upload.
*
* @param[in] control_byte The command control byte.
* @param[in] p_buffer The data buffer.
*/
static void upload_data_process(uint8_t control_byte, const uint8_t * p_buffer)
{
#if ANTFS_CONFIG_UPLOAD_ENABLED
if (control_byte & SEQUENCE_LAST_MESSAGE)
{
// Last burst packet: upload complete.
m_current_state.sub_state.trans_sub_state = ANTFS_TRANS_SUBSTATE_NONE;
// CRC for data packets contained in this upload block.
m_compared_crc = p_buffer[UPLOAD_CRC_OFFSET_LOW ];
m_compared_crc |= (p_buffer[UPLOAD_CRC_OFFSET_HIGH] << 8u);
if (m_max_transfer_index.data && (m_compared_crc == m_transfer_crc))
{
// CRC OK, upload was completed successfully.
event_queue_write(ANTFS_EVENT_UPLOAD_COMPLETE);
}
else
{
// CRC mismatch, upload failed.
event_queue_write(ANTFS_EVENT_UPLOAD_FAIL);
}
m_max_transfer_index.data = 0;
}
else
{
// Not the last burst packet: upload not complete.
// Set initial number of bytes to 8 (size of burst packet).
m_bytes_to_write = BURST_PACKET_SIZE;
timeout_start(ANTFS_CONFIG_LINK_COMMAND_TIMEOUT);
if (m_link_burst_index.data > m_max_transfer_index.data)
{
// We are past the main index, we do not need to write any more data.
m_bytes_to_write = 0;
}
else
{
if ((m_bytes_to_write + m_link_burst_index.data) > m_max_transfer_index.data)
{
// if we're less than 8 bytes away from the end, adjust the number of bytes to write
// in this block.
m_bytes_to_write = m_max_transfer_index.data - m_link_burst_index.data;
}
}
if (m_bytes_to_write != 0)
{
APP_ERROR_CHECK_BOOL(m_bytes_to_write <= BURST_PACKET_SIZE);
// Store begin of upload data.
mp_upload_data = p_buffer;
m_transfer_crc = crc_crc16_update(m_transfer_crc, p_buffer, m_bytes_to_write);
// Send data to application.
event_queue_write(ANTFS_EVENT_UPLOAD_DATA);
// Update current offset.
m_link_burst_index.data += m_bytes_to_write;
// Store save point.
m_saved_crc_offset = m_link_burst_index.data;
m_saved_transfer_crc = m_transfer_crc;
}
}
#endif // ANTFS_CONFIG_UPLOAD_ENABLED
}
/**@brief Function for switching to transport layer.
*/
static void transport_layer_transit(void)
{
if (m_current_state.state != ANTFS_STATE_OFF)
{
#if ANTFS_CONFIG_DEBUG_LED_ENABLED
uint32_t err_code = bsp_indication_set(BSP_INDICATE_IDLE);
APP_ERROR_CHECK(err_code);
#endif // ANTFS_CONFIG_DEBUG_LED_ENABLED
m_current_state.state = ANTFS_STATE_TRANS;
m_current_state.sub_state.trans_sub_state = ANTFS_TRANS_SUBSTATE_NONE;
timeout_start(ANTFS_CONFIG_LINK_COMMAND_TIMEOUT);
beacon_transmit(MESG_BROADCAST_DATA_ID);
event_queue_write(ANTFS_EVENT_TRANS);
}
}
void antfs_message_process(uint8_t * p_message)
{
#if ANTFS_CONFIG_DEBUG_LED_ENABLED
uint32_t err_code;
#endif // ANTFS_CONFIG_DEBUG_LED_ENABLED
if (p_message != NULL)
{
if ((p_message[BUFFER_INDEX_CHANNEL_NUM] & CHANNEL_NUMBER_MASK) != ANTFS_CONFIG_CHANNEL_NUMBER)
{
// Only process messages corresponding to the ANT-FS channel here.
return;
}
if ((m_current_state.state == ANTFS_STATE_OFF) &&
(
!(
(p_message[BUFFER_INDEX_MESG_ID] == MESG_RESPONSE_EVENT_ID) &&
(p_message[BUFFER_INDEX_RESPONSE_CODE] == NO_EVENT)
)
)
)
{
return;
}
switch (p_message[BUFFER_INDEX_MESG_ID])
{
case MESG_BROADCAST_DATA_ID:
// We are not going to process broadcast messages or pass them to the app to handle.
break;
case MESG_ACKNOWLEDGED_DATA_ID:
// Mark it as being the last message if it's an ack message.
p_message[ANTFS_CONTROL_OFFSET] |= SEQUENCE_LAST_MESSAGE;
/* fall-through */
case MESG_BURST_DATA_ID:
switch (m_current_state.state)
{
case ANTFS_STATE_LINK:
link_layer_cmd_decode(&p_message[ANTFS_DATA_OFFSET]);
break;
case ANTFS_STATE_AUTH:
authenticate_layer_cmd_decode(p_message[ANTFS_CONTROL_OFFSET],
&p_message[ANTFS_DATA_OFFSET]);
break;
case ANTFS_STATE_TRANS:
if (m_current_state.sub_state.trans_sub_state !=
ANTFS_TRANS_SUBSTATE_UPLOADING)
{
transport_layer_cmd_decode(p_message[ANTFS_CONTROL_OFFSET],
&p_message[ANTFS_DATA_OFFSET]);
}
else
{
upload_data_process(p_message[ANTFS_CONTROL_OFFSET],
&p_message[ANTFS_DATA_OFFSET]);
}
break;
default:
// If in any other state or sub-state, do nothing.
break;
}
break;
case MESG_RESPONSE_EVENT_ID:
// Branch on event ID.
switch (p_message[BUFFER_INDEX_RESPONSE_CODE])
{
case EVENT_TRANSFER_TX_FAILED:
m_link_command_in_progress = ANTFS_CMD_NONE;
// Switch into the appropriate state after the failure. Must be ready for
// the host to do a retry.
switch (m_current_state.state)
{
case ANTFS_STATE_LINK:
link_layer_transit();
break;
case ANTFS_STATE_AUTH:
// Burst failed, retry sending the response
if (!m_retry)
{
authenticate_layer_transit(); // Reload beacon
}
else
{
if (m_current_state.sub_state.auth_sub_state == ANTFS_AUTH_SUBSTATE_ACCEPT)
{
if (m_authenticate_command_type == COMMAND_TYPE_REQUEST_PAIR)
{
authenticate_response_transmit(AUTH_RESPONSE_ACCEPT, ANTFS_PASSKEY_SIZE,
m_initial_parameters.p_pass_key);
}
else
{
authenticate_response_transmit(AUTH_RESPONSE_ACCEPT, 0, NULL);
}
}
else if (m_current_state.sub_state.auth_sub_state == ANTFS_AUTH_SUBSTATE_REJECT)
{
authenticate_response_transmit(AUTH_RESPONSE_REJECT, 0, NULL);
}
else if (m_authenticate_command_type == COMMAND_TYPE_REQUEST_SERIAL)
{
authenticate_response_transmit(AUTH_RESPONSE_N_A,
ANTFS_REMOTE_FRIENDLY_NAME_MAX,
// Send device friendly name if it exists.
m_initial_parameters.p_remote_friendly_name);
}
else
{
// No implementation needed
}
m_retry--;
}
break;
case ANTFS_STATE_TRANS:
if (m_current_state.sub_state.trans_sub_state ==
ANTFS_TRANS_SUBSTATE_DOWNLOADING)
{
event_queue_write(ANTFS_EVENT_DOWNLOAD_FAIL);
}
transport_layer_transit();
break;
default:
// No implementation needed.
break;
}
break;
case EVENT_TRANSFER_RX_FAILED:
m_link_command_in_progress = ANTFS_CMD_NONE;
if (m_current_state.sub_state.trans_sub_state ==
ANTFS_TRANS_SUBSTATE_UPLOADING)
{
event_queue_write(ANTFS_EVENT_UPLOAD_FAIL);
m_current_state.sub_state.trans_sub_state =
ANTFS_TRANS_SUBSTATE_UPLOAD_RESUME;
}
else
{
// No implementation needed
}
break;
case EVENT_TRANSFER_TX_COMPLETED:
m_link_command_in_progress = ANTFS_CMD_NONE;
// Switch into appropiate state after successful command.
switch (m_current_state.state)
{
case ANTFS_STATE_AUTH:
if (m_current_state.sub_state.auth_sub_state ==
ANTFS_AUTH_SUBSTATE_ACCEPT)
{
// We passed authentication, so go to transport state.
transport_layer_transit();
}
else if (m_current_state.sub_state.auth_sub_state ==
ANTFS_AUTH_SUBSTATE_REJECT)
{
// We failed authentication, so go to link state.
link_layer_transit();
}
else
{
// Reload beacon.
authenticate_layer_transit();
}
break;
case ANTFS_STATE_TRANS:
if (m_current_state.sub_state.trans_sub_state ==
ANTFS_TRANS_SUBSTATE_DOWNLOADING)
{
event_queue_write(ANTFS_EVENT_DOWNLOAD_COMPLETE);
}
if (m_current_state.sub_state.trans_sub_state !=
ANTFS_TRANS_SUBSTATE_UPLOAD_WAIT_FOR_DATA)
{
transport_layer_transit(); // Reload beacon.
}
break;
default:
link_layer_transit(); // Reload beacon.
break;
}
break;
case EVENT_TX:
#if ANTFS_CONFIG_DEBUG_LED_ENABLED
err_code = bsp_indication_set(BSP_INDICATE_SENT_OK);
APP_ERROR_CHECK(err_code);
#endif // ANTFS_CONFIG_DEBUG_LED_ENABLED
// Load beacon.
beacon_transmit(MESG_BROADCAST_DATA_ID);
break;
case EVENT_CHANNEL_CLOSED:
event_queue_write(ANTFS_EVENT_CLOSE_COMPLETE);
break;
case NO_EVENT:
// This shouldn't happen... command responses should not occur.
APP_ERROR_HANDLER(p_message[BUFFER_INDEX_RESPONSE_CODE]);
break;
default:
// No implementation needed.
return;
}
break;
default:
// No implementation needed.
return;
}
}
}
void antfs_channel_setup(void)
{
// Start channel configuration.
uint32_t err_code = ant_fs_key_set(ANTFS_CONFIG_NETWORK_NUMBER);
APP_ERROR_CHECK(err_code);
err_code = sd_ant_channel_assign(ANTFS_CONFIG_CHANNEL_NUMBER,
ANTFS_CHANNEL_TYPE,
ANTFS_CONFIG_NETWORK_NUMBER,
0);
APP_ERROR_CHECK(err_code);
// Use the lower 2 bytes of the ESN for device number.
uint16_t device_number = (uint16_t)(m_initial_parameters.client_serial_number & 0x0000FFFFu);
if (device_number == 0)
{
// Device number of 0 is not allowed.
device_number = 2;
}
err_code = sd_ant_channel_id_set(ANTFS_CONFIG_CHANNEL_NUMBER,
device_number,
ANTFS_CONFIG_DEVICE_TYPE,
ANTFS_CONFIG_TRANS_TYPE);
APP_ERROR_CHECK(err_code);
// Remain in initialization state until channel is open.
m_current_state.state = ANTFS_STATE_INIT;
// @note: Channel frequency is set by function below.
link_layer_transit();
m_current_state.state = ANTFS_STATE_INIT;
channel_period_set(m_active_beacon_status1_field.parameters.link_period);
err_code = sd_ant_channel_open(ANTFS_CONFIG_CHANNEL_NUMBER);
APP_ERROR_CHECK(err_code);
err_code = sd_ant_channel_radio_tx_power_set(ANTFS_CONFIG_CHANNEL_NUMBER,
ANTFS_CONFIG_TRANSMIT_POWER,
ANTFS_CONFIG_CUSTOM_TRANSMIT_POWER);
APP_ERROR_CHECK(err_code);
m_current_state.state = ANTFS_STATE_LINK;
m_current_state.sub_state.link_sub_state = ANTFS_LINK_SUBSTATE_NONE;
event_queue_write(ANTFS_EVENT_OPEN_COMPLETE);
// Start beacon broadcast.
beacon_transmit(MESG_BROADCAST_DATA_ID);
}
/**@brief Function for resetting the ANT-FS state machine.
*/
static void state_machine_reset(void)
{
m_current_state.state = ANTFS_STATE_OFF;
m_link_command_in_progress = ANTFS_CMD_NONE;
timeout_disable();
// Reset the ANT-FS event queue.
m_event_queue.p_queue = m_event_queue_buffer;
m_event_queue.head = 0;
m_event_queue.tail = 0;
// Set as invalid.
m_authenticate_command_type = 0xFFu;
m_retry = 0;
m_saved_crc_offset = 0xFFFFFFFFu;
m_max_transfer_index.data = 0;
m_is_crc_pending = false;
m_is_data_request_pending = false;
m_friendly_name.is_name_set = false;
m_friendly_name.index = 0;
memset(m_friendly_name.friendly_name, 0, ANTFS_FRIENDLY_NAME_MAX);
}
/**@brief Function for ANT-FS timer event.
*
* Handles pairing and command timeouts.
*
* @param[in] p_context The callback context.
*/
static void timeout_handle(void * p_context)
{
if (m_current_state.state == ANTFS_STATE_OFF)
{
return;
}
if ((m_current_state.state == ANTFS_STATE_AUTH) &&
// Pairing timeout.
(m_current_state.sub_state.auth_sub_state == ANTFS_AUTH_SUBSTATE_PAIR))
{
// Reject authentication request and send pairing timeout event.
authenticate_response_transmit(AUTH_RESPONSE_REJECT, 0, NULL);
event_queue_write(ANTFS_EVENT_PAIRING_TIMEOUT);
}
// Fall back to link layer when an ANT-FS event times out.
link_layer_transit();
}
void antfs_init(const antfs_params_t * const p_params,
antfs_burst_wait_handler_t burst_wait_handler)
{
m_initial_parameters = *p_params;
m_burst_wait_handler = burst_wait_handler;
m_active_beacon_status1_field = m_initial_parameters.beacon_status_byte1;
uint32_t err_code = app_timer_create(&m_timer_id, APP_TIMER_MODE_SINGLE_SHOT, timeout_handle);
APP_ERROR_CHECK(err_code);
state_machine_reset();
err_code = sd_ant_burst_handler_wait_flag_enable((uint8_t *)(&m_burst_wait));
APP_ERROR_CHECK(err_code);
}
#endif // NRF_MODULE_ENABLED(ANTFS)