mirror of
https://github.com/esp8266/Arduino.git
synced 2025-06-06 05:21:22 +03:00
update SDK to esp_iot_sdk_v1.1.2_15_06_16_p1
This commit is contained in:
parent
9a1ff7f70d
commit
8f6d1e33d2
@ -128,12 +128,18 @@ extern "C" {
|
||||
void user_init(void) {
|
||||
uart_div_modify(0, UART_CLK_FREQ / (74480));
|
||||
|
||||
system_rtc_mem_read(0, &resetInfo, sizeof(struct rst_info));
|
||||
if(resetInfo.reason == REASON_WDT_RST || resetInfo.reason == REASON_EXCEPTION_RST) {
|
||||
os_printf("Last Reset:\n - flag=%d\n - Fatal exception (%d):\n - epc1=0x%08x,epc2=0x%08x,epc3=0x%08x,excvaddr=0x%08x,depc=0x%08x\n", resetInfo.reason, resetInfo.exccause, resetInfo.epc1, resetInfo.epc2, resetInfo.epc3, resetInfo.excvaddr, resetInfo.depc);
|
||||
struct rst_info *rtc_info = system_get_rst_info();
|
||||
os_printf("Last reset reason: 0x%02X\n", rtc_info->reason);
|
||||
|
||||
if (rtc_info->reason == REASON_WDT_RST ||
|
||||
rtc_info->reason == REASON_EXCEPTION_RST ||
|
||||
rtc_info->reason == REASON_SOFT_WDT_RST) {
|
||||
if (rtc_info->reason == REASON_EXCEPTION_RST) {
|
||||
os_printf("Fatal exception (%d):\n", rtc_info->exccause);
|
||||
}
|
||||
os_printf("epc1=0x%08x, epc2=0x%08x, epc3=0x%08x, excvaddr=0x%08x, depc=0x%08x\n",
|
||||
rtc_info->epc1, rtc_info->epc2, rtc_info->epc3, rtc_info->excvaddr, rtc_info->depc);
|
||||
}
|
||||
struct rst_info info = { 0 };
|
||||
system_rtc_mem_write(0, &info, sizeof(struct rst_info));
|
||||
|
||||
uart_div_modify(0, UART_CLK_FREQ / (115200));
|
||||
|
||||
|
@ -1,3 +1,35 @@
|
||||
esp_iot_sdk_v1.1.2_15_06_16_p1 Release Note
|
||||
-------------------------------------------
|
||||
Here is a patch based on SDK_v1.1.2 resolved issue that "wifi_station_scan" cause loss of wireless connectivity.
|
||||
|
||||
Please replace them in esp_iot_sdk/lib folder.
|
||||
|
||||
Sorry for the inconvenience.
|
||||
|
||||
|
||||
|
||||
|
||||
esp_iot_sdk_v1.1.2_15_06_12 Release Note
|
||||
-------------------------------------------
|
||||
|
||||
Optimization:
|
||||
1. support certificate issuer verification for SSL
|
||||
2. Update SPI driver, support overlap mode
|
||||
|
||||
Add APIs:
|
||||
1. wifi_station_set_hostname : set ESP8266 station DHCP hostname
|
||||
2. wifi_station_get_hostname : get ESP8266 station DHCP hostname
|
||||
3. spi_flash_set_read_func :set user specified reading SPI function on overlap mode
|
||||
4. espconn_secure_ca_disable : disable SSL CA verify
|
||||
5. espconn_secure_ca_enable : enable SSL CA verify
|
||||
|
||||
Add Documentation:
|
||||
1. SPI overlap introduction: \esp_iot_sdk\document, sorry that it has only Chinese version now,we will add English version of this documentation ASAP.
|
||||
2. SSL introduction: \esp_iot_sdk\document
|
||||
|
||||
|
||||
|
||||
|
||||
esp_iot_sdk_v1.1.1_15_06_05 Release Note
|
||||
-------------------------------------------
|
||||
|
||||
|
@ -23,6 +23,9 @@ typedef void (* espconn_reconnect_callback)(void *arg, sint8 err);
|
||||
#define ESPCONN_ARG -12 /* Illegal argument. */
|
||||
#define ESPCONN_ISCONN -15 /* Already connected. */
|
||||
|
||||
#define ESPCONN_HANDSHAKE -28 /* ssl handshake failed */
|
||||
#define ESPCONN_PROTO_MSG -61 /* ssl application invalid */
|
||||
|
||||
/** Protocol family and type of the espconn */
|
||||
enum espconn_type {
|
||||
ESPCONN_INVALID = 0,
|
||||
@ -455,6 +458,28 @@ bool espconn_secure_set_size(uint8 level, uint16 size);
|
||||
|
||||
sint16 espconn_secure_get_size(uint8 level);
|
||||
|
||||
/******************************************************************************
|
||||
* FunctionName : espconn_secure_ca_enable
|
||||
* Description : enable the certificate authenticate and set the flash sector
|
||||
* as client or server
|
||||
* Parameters : level -- set for client or server
|
||||
* 1: client,2:server,3:client and server
|
||||
* flash_sector -- flash sector for save certificate
|
||||
* Returns : result true or false
|
||||
*******************************************************************************/
|
||||
|
||||
bool espconn_secure_ca_enable(uint8 level, uint8 flash_sector );
|
||||
|
||||
/******************************************************************************
|
||||
* FunctionName : espconn_secure_ca_disable
|
||||
* Description : disable the certificate authenticate as client or server
|
||||
* Parameters : level -- set for client or server
|
||||
* 1: client,2:server,3:client and server
|
||||
* Returns : result true or false
|
||||
*******************************************************************************/
|
||||
|
||||
bool espconn_secure_ca_disable(uint8 level);
|
||||
|
||||
/******************************************************************************
|
||||
* FunctionName : espconn_secure_accept
|
||||
* Description : The function given as the listen
|
||||
|
@ -30,4 +30,12 @@ SpiFlashOpResult spi_flash_erase_sector(uint16 sec);
|
||||
SpiFlashOpResult spi_flash_write(uint32 des_addr, uint32 *src_addr, uint32 size);
|
||||
SpiFlashOpResult spi_flash_read(uint32 src_addr, uint32 *des_addr, uint32 size);
|
||||
|
||||
typedef SpiFlashOpResult (* user_spi_flash_read)(
|
||||
SpiFlashChip *spi,
|
||||
uint32 src_addr,
|
||||
uint32 *des_addr,
|
||||
uint32 size);
|
||||
|
||||
void spi_flash_set_read_func(user_spi_flash_read read);
|
||||
|
||||
#endif
|
||||
|
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
@ -1 +1 @@
|
||||
1.1.1_15_06_05
|
||||
1.1.2_15_06_16_p1
|
Loading…
x
Reference in New Issue
Block a user