Wi-Fi Combo Forum Discussions
text.format{('custom.tabs.no.results')}
Hi,
We have ported 43455 WICED SDK to NXP FRDM-K64 platform taking NXP's port for IMXRT1020 as a reference. Using LWIP as TCP/IP stack and running Amazon FreeRTOS.
Our use case is as follows:
- Device configures it self as an open AP on channel 1.
- Device starts a DHCP server.
- An Android or IOS mobile connects with the device AP.
- Data exchange takes place
- Device turns off the AP mode and moves to Station mode.
We are observing the following issue:
- After device is configured as open AP on channel 1, mobile tries to join the network. Network join is successful and mobile gets IP address from the Device.
- Mobile after a few seconds, drops the connection by itself and then reconnects with the AP. This loop goes on for ever.
- This issue is not reproduced on all mobile variants, Older phones (moto g series, Nokia 6.1 plus etc) seem to be having this issue but not phones like Samsung M31s or VIVO/Oppo/RealMe.
- On the mobile phones that do have this issue we tried forgetting all the known APs so that the Mobile does not disconnect because of availability of better network, but that did not fix the issue.
- The issue is not produced when working on Linux or windows system.
Is there any possible missing configuration on 43455 side or on Network stack side that might be causing this issue?
Show LessHi team,
I am using murata 1LD Wifi module .Is that possible to get Lattitude longitude using this wifi module .If any one knows please help me .
Thanks advance
Ravindhar.S
Show LessHello
I'm working on a firmware to put our WiFi/BLE transmitter in test mode for regulatory testing. According to the regulatory guide, I need to contact Cypress and obtain a .clm_blob
https://www.cypress.com/documentation/application-notes/an225347-cypress-wi-fi-clm-regulatory-manual
Can I instead integrate the wl_tool in our firmware or are there any libraries I can use?
Show LessHello,
I am able to compile and get a response from httpbin.org using the example in WICED 101 07b_06. This is the project titled httpbin_post_tls.
I have modified the example to send a JSON sting to MY server instead of httpbin. I have put the necessary certificates for my server in place. I have verified with the server admin that my POST has been received and the server is sending the appropriate response, however, I am not receiving the payload in WICED. I do receive the HTTP response header, just no payload (body) data.
I have this working with a different module manufacturer and I compared the HTTP response headers. They are identical.
Is there an additional step I need to take in order to receive the payload?
The HTTP response indicates that it is chunked:
HTTP/1.1 200 OK
Server: nginx/1.14.0 (Ubuntu)
Date: Fri, 11 Sep 2020 14:36:56 GMT
Content-Type: application/json
Transfer-Encoding: chunked
Connection: keep-alive
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Access-Control-Allow-Credentials: true
Access-Control-Allow-Origin:
Access-Control-Allow-Headers: X-Requested-With, Content-Type, Accept, Origin, Authorization
Access-Control-Allow-Methods: GET, POST, PUT, PATCH, DELETE, OPTIONS
Cache-Control: no-store, no-cache, must-revalidate, max-age=0, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: PHPSESSID=5e2ojh23ud2fc09kn63hrrcdua; path=/
Strict-Transport-Security: max-age=31536000
Referrer-Policy: same-origin
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
X-Content-Type-Options: nosniff
X-Frame-Options: SAMEORIGIN
Thank you,
-Rocko
Show LessI am trying to transfer a large file (~100kB) from our server over MQTT using mbedtls as TLS library. Any incoming/outgoing payloads that are less than the MTU (1500 bytes) transfers without error. Any incoming payloads greater than MTU result in TCP receive error. However, the exact same code downloading 9kB payloads from server via broker will succeed if verbose logging is enabled. The logging significantly slows the application. Is there any special application considerations when downloading payload that are greater than MTU (ie require defragmentation buffer)? If required, I can provide wireshark captures.
Setup:
Custom board with CY8C6247BZI-D54
RTOS
Wiced SDK 6.4 running custom 43xx_Wi-Fi app
Netx Duo v5.10
Common Defines
#for reduction of RAM usage
WICED_CONFIG_DISABLE_SSL_SERVER
WICED_CONFIG_DISABLE_ENTERPRISE_SECURITY
WICED_CONFIG_DISABLE_ADVANCED_SECURITY_CURVES
#Error Logging
WPRINT_ENABLE_PLATFORM_ERROR
WPRINT_ENABLE_SECURITY_ERROR
WPRINT_ENABLE_NETWORK_ERROR
#TX/RX Pools / TCP
WICED_USE_COMMON_PKT_POOL
COM_PACKET_POOL_SIZE=20
WICED_TCP_WINDOW_SIZE=65535
Scenario 1 - Download 108kB file in multiple 9kB chunks, verbose logging off. Failed download of chunk
Following Error occurs:
mbedtls_ssl_read failed with error : [2]
[MQTT-LIB] TCP receive error 2
mbedtls_ssl_read failed with error : [2]
[MQTT-LIB] TCP receive error 2
mbedtls_ssl_read failed with error : [2]
[MQTT-LIB] TCP receive error 2
Scenario 2 - Download 108kB file in multiple 18kB chunks, verbose logging on. Failed download of chunk
Following Error occurs
WICED/security/BESL/mbedtls_open/library/ssl_tls.c:2798: => write record
WICED/security/BESL/mbedtls_open/library/ssl_tls.c:1310: => encrypt buf
WICED/security/BESL/mbedtls_open/library/ssl_tls.c:1615: <= encrypt buf
WICED/security/BESL/mbedtls_open/library/ssl_tls.c:2487: => flush output
WICED/security/BESL/mbedtls_open/library/ssl_tls.c:2539: <= flush output
WICED/security/BESL/mbedtls_open/library/ssl_tls.c:2960: <= write record
WICED/security/BESL/mbedtls_open/library/ssl_tls.c:7215: => read
WICED/security/BESL/mbedtls_open/library/ssl_tls.c:3834: => read record
WICED/security/BESL/mbedtls_open/library/ssl_tls.c:2263: => fetch input
WICED/security/BESL/mbedtls_open/library/ssl_tls.c:2429: in_left: 0, nb_want: 5
TLS library asked for [5] bytes
Received new TCP packet with length [1460]
WICED/security/BESL/mbedtls_open/library/ssl_tls.c:2459: in_left: 0, nb_want: 5
WICED/security/BESL/mbedtls_open/library/ssl_tls.c:2460: ssl->f_recv(_timeout)() returned 0 (-0x0000)
WICED/security/BESL/mbedtls_open/library/ssl_tls.c:2474: <= fetch input
WICED/security/BESL/mbedtls_open/library/ssl_tls.c:2263: => fetch input
WICED/security/BESL/mbedtls_open/library/ssl_tls.c:2429: in_left: 5, nb_want: 16413
TLS library asked for [16408] bytes
Skip [5] no of bytes from TCP received packet with length : [1460]
Defragmentaion case : copying 1460 bytes to defrag buffer 0x0802aa30
Defrag buffer length [16413], [0] bytes processed, [0] skipped, [0] received
TLS record defragmentation failed with result : [2]
WICED/security/BESL/mbedtls_open/library/ssl_tls.c:2459: in_left: 5, nb_want: 16413
WICED/security/BESL/mbedtls_open/library/ssl_tls.c:2460: ssl->f_recv(_timeout)() returned 2 (-0xfffffffe)
WICED/security/BESL/mbedtls_open/library/ssl_tls.c:4046: mbedtls_ssl_fetch_input() returned 2 (-0xfffffffe)
WICED/security/BESL/mbedtls_open/library/ssl_tls.c:3842: mbedtls_ssl_read_record_layer() returned 2 (-0xfffffffe)
WICED/security/BESL/mbedtls_open/library/ssl_tls.c:7314: mbedtls_ssl_read_record() returned 2 (-0xfffffffe)
mbedtls_ssl_read failed with error : [2]
[MQTT-LIB] TCP receive error 2
WICED/security/BESL/mbedtls_open/library/ssl_tls.c:7215: => read
WICED/security/BESL/mbedtls_open/library/ssl_tls.c:3834: => read record
WICED/security/BESL/mbedtls_open/library/ssl_tls.c:2263: => fetch input
WICED/security/BESL/mbedtls_open/library/ssl_tls.c:2429: in_left: 0, nb_want: 5
TLS library asked for [5] bytes
halfway TLS defrag ## defragmentation buffer bytes received [13140] total defragmentaion bytes [16413]
Already have [13140] bytes in defragmentation buffer, asked for [5]
defragmentation buffer bytes skipped [0]
WICED/security/BESL/mbedtls_open/library/ssl_tls.c:2459: in_left: 0, nb_want: 5
WICED/security/BESL/mbedtls_open/library/ssl_tls.c:2460: ssl->f_recv(_timeout)() returned 0 (-0x0000)
WICED/security/BESL/mbedtls_open/library/ssl_tls.c:2474: <= fetch input
WICED/security/BESL/mbedtls_open/library/ssl_tls.c:2263: => fetch input
WICED/security/BESL/mbedtls_open/library/ssl_tls.c:2429: in_left: 5, nb_want: 16413
TLS library asked for [16408] bytes
halfway TLS defrag ## defragmentation buffer bytes received [13140] total defragmentaion bytes [16413]
halfway TLS record defragmentation failed with result : [2]
WICED/security/BESL/mbedtls_open/library/ssl_tls.c:2459: in_left: 5, nb_want: 16413
WICED/security/BESL/mbedtls_open/library/ssl_tls.c:2460: ssl->f_recv(_timeout)() returned 2 (-0xfffffffe)
WICED/security/BESL/mbedtls_open/library/ssl_tls.c:4046: mbedtls_ssl_fetch_input() returned 2 (-0xfffffffe)
WICED/security/BESL/mbedtls_open/library/ssl_tls.c:3842: mbedtls_ssl_read_record_layer() returned 2 (-0xfffffffe)
WICED/security/BESL/mbedtls_open/library/ssl_tls.c:7314: mbedtls_ssl_read_record() returned 2 (-0xfffffffe)
mbedtls_ssl_read failed with error : [2]
[MQTT-LIB] TCP receive error 2
Scenario 3 - Download 108kB file in multiple 9kB chunks, verbose logging on. Successful download chunks
Additional Defines:
MBEDTLS_MEMORY_DEBUG
MBEDTLS_DEBUG_C
MBEDTLS_SSL_DEBUG_ALL
MBEDTLS_DEBUG_LOG_LEVEL=2
WPRINT_ENABLE_SECURITY_INFO
WPRINT_ENABLE_SECURITY_DEBUG
WPRINT_ENABLE_NETWORK_DEBUG
Logs of successful chunk downloads:
WICED/security/BESL/mbedtls_open/library/ssl_tls.c:2798: => write record
WICED/security/BESL/mbedtls_open/library/ssl_tls.c:1310: => encrypt buf
WICED/security/BESL/mbedtls_open/library/ssl_tls.c:1615: <= encrypt buf
WICED/security/BESL/mbedtls_open/library/ssl_tls.c:2487: => flush output
WICED/security/BESL/mbedtls_open/library/ssl_tls.c:2539: <= flush output
WICED/security/BESL/mbedtls_open/library/ssl_tls.c:2960: <= write record
WICED/security/BESL/mbedtls_open/library/ssl_tls.c:7215: => read
WICED/security/BESL/mbedtls_open/library/ssl_tls.c:3834: => read record
WICED/security/BESL/mbedtls_open/library/ssl_tls.c:2263: => fetch input
WICED/security/BESL/mbedtls_open/library/ssl_tls.c:2429: in_left: 0, nb_want: 5
TLS library asked for [5] bytes
Received new TCP packet with length [1460]
WICED/security/BESL/mbedtls_open/library/ssl_tls.c:2459: in_left: 0, nb_want: 5
WICED/security/BESL/mbedtls_open/library/ssl_tls.c:2460: ssl->f_recv(_timeout)() returned 0 (-0x0000)
WICED/security/BESL/mbedtls_open/library/ssl_tls.c:2474: <= fetch input
WICED/security/BESL/mbedtls_open/library/ssl_tls.c:2263: => fetch input
WICED/security/BESL/mbedtls_open/library/ssl_tls.c:2429: in_left: 5, nb_want: 9079
TLS library asked for [9074] bytes
Skip [5] no of bytes from TCP received packet with length : [1460]
Defragmentaion case : copying 1460 bytes to defrag buffer 0x0802aa30
Defrag buffer length [9079], [0] bytes processed, [0] skipped, [0] received
Completed TLS record defragmentation. Received [9079] bytes
WICED/security/BESL/mbedtls_open/library/ssl_tls.c:2459: in_left: 5, nb_want: 9079
WICED/security/BESL/mbedtls_open/library/ssl_tls.c:2460: ssl->f_recv(_timeout)() returned 0 (-0x0000)
WICED/security/BESL/mbedtls_open/library/ssl_tls.c:2474: <= fetch input
WICED/security/BESL/mbedtls_open/library/ssl_tls.c:1631: => decrypt buf
WICED/security/BESL/mbedtls_open/library/ssl_tls.c:2106: <= decrypt buf
WICED/security/BESL/mbedtls_open/library/ssl_tls.c:3867: <= read record
WICED/security/BESL/mbedtls_open/library/ssl_tls.c:7514: <= read
Received all fragmented data of length [9079],Processed [1424], Packetize [1411] bytes and give it to application
First chunk received: 1361 bytes at 90000 offset
Received all fragmented data of length [9079],Processed [2835], Packetize [1411] bytes and give it to application
Chunk received: 1411 bytes at 91361 offset
Received all fragmented data of length [9079],Processed [4246], Packetize [1411] bytes and give it to application
Chunk received: 1411 bytes at 92772 offset
Received all fragmented data of length [9079],Processed [5657], Packetize [1411] bytes and give it to application
Chunk received: 1411 bytes at 94183 offset
Received all fragmented data of length [9079],Processed [7068], Packetize [1411] bytes and give it to application
Chunk received: 1411 bytes at 95594 offset
Received all fragmented data of length [9079],Processed [8479], Packetize [1411] bytes and give it to application
Chunk received: 1411 bytes at 97005 offset
Received all fragmented data of length [9079],Processed [9063], Packetize [584] bytes and give it to application
Freeing defrag buffer...
Chunk received: 584 bytes at 98416 offset
-------------------Chunk Download complete----------------
Please let me know if there is anything else you need to help debug this problem.
Cheers,
Nick
Show LessWe are using CYW943907AEVAL1F - Free RTOS - LwIP & WICED 6.4. WIFI works with 5Ghz Band.
We are streaming the audio over wifi. During the steaming some times "wiced_audio_wait_buffer" return error : 2 (TIMEOUT)
is there any recommendation to recover from this scenario ?
Show LessI was trying to fix an issue that was preventing me from downloading the program image onto the dev. kit. I was having a problem exactly like the one in this post: PSOC6 - CY8CKIT-062-WIFI-BT Cannot Program using Wiced. However, I tried the solution in this article with no luck.
I read in another post (that I can't find now) that said you can upgrade the firmware through PSoC Programmer (shown in the picture below). I upgraded the firmware while in HID mode and then again in BULK mode. After that, I pressed SW4 just to see what would happen. Now my dev. board is no longer recognized by the computer. It doesn't show up in the device manager or in PSoC Programmer.
Also when I plug it in LED4 turns on but LED2 stays off.
EDIT: I should mention I also have a CY8CKIT-062-WIFI-BT (not FRAM) that works fine. I'm able to connect and upload programs no problem.
Additional Info:
OS: Windows 10
IDE: WICED Studio 6.4
PSoC Programmer 3.28.7.4504
Dev. Kit: CY8CKIT-062-WiFi-BT-FRAM
Message was edited by: Cody Cook
Show LessHi All,
We are proud to announce that we have added integration with the WICED SDK to VisualGDB - our Visual Studio extension for advanced cross-platform development.
We have published a detailed tutorial showing how to create and debug a basic WICED-based project for PSoC6 with VisualGDB here: https://visualgdb.com/tutorials/arm/wiced/
Any comments or suggestions are very much welcome.
Show LessHello all,
We are currently using the 1DX Combo from Murata (brcm43430). We have some troubles with understanding / tuning the NVRAM params to get the best coexistence between BT and WiFi.
Brief description: if we change the btc_params8, btc_params1 and btc_params10 we get either great WiFi range / power / speed or BT A2DP cuts. We don't really understand what we are changing and we couldn't find any information about this.
Can someone help us from Cypress (MichaelF_56 or Murata (ToIn_1742091) for paid support ?
If not, does someone know a 3rd party that knows this chip and can help with this ?
Thank you,
Jean
HED Technologies
Show Less