Skip to content

Commit a1ed056

Browse files
authored
Revert "Fix psram crash pico d4 (#110)" (#113)
This reverts commit 56cf555.
1 parent 6b8af36 commit a1ed056

File tree

4 files changed

+7
-95
lines changed

4 files changed

+7
-95
lines changed

Diff for: cores/esp32/esp32-hal-psram.c

+2-4
Original file line numberDiff line numberDiff line change
@@ -70,10 +70,8 @@ bool psramInit(){
7070
spiramFailed = true;
7171
log_w("PSRAM init failed!");
7272
#if CONFIG_IDF_TARGET_ESP32
73-
if (pkg_ver != EFUSE_RD_CHIP_VER_PKG_ESP32PICOD4) {
74-
pinMatrixOutDetach(16, false, false);
75-
pinMatrixOutDetach(17, false, false);
76-
}
73+
pinMatrixOutDetach(16, false, false);
74+
pinMatrixOutDetach(17, false, false);
7775
#endif
7876
return false;
7977
}

Diff for: libraries/WiFi/examples/WiFiClientEnterprise/WiFiClientEnterprise.ino

+5-23
Original file line numberDiff line numberDiff line change
@@ -1,22 +1,10 @@
11
#include <WiFi.h> //Wifi library
22
#include "esp_wpa2.h" //wpa2 library for connections to Enterprise networks
33
#define EAP_IDENTITY "login" //if connecting from another corporation, use [email protected] in Eduroam
4-
#define EAP_USERNAME "login" //oftentimes just a repeat of the identity
54
#define EAP_PASSWORD "password" //your Eduroam password
65
const char* ssid = "eduroam"; // Eduroam SSID
76
const char* host = "arduino.php5.sk"; //external server domain for HTTP connection after authentification
87
int counter = 0;
9-
10-
// NOTE: For some systems, various certification keys are required to connect to the wifi system.
11-
// Usually you are provided these by the IT department of your organization when certs are required
12-
// and you can't connect with just an identity and password.
13-
// Most eduroam setups we have seen do not require this level of authentication, but you should contact
14-
// your IT department to verify.
15-
// You should uncomment these and populate with the contents of the files if this is required for your scenario (See Example 2 and Example 3 below).
16-
//const char *ca_pem = "insert your CA cert from your .pem file here";
17-
//const char *client_cert = "insert your client cert from your .crt file here";
18-
//const char *client_key = "insert your client key from your .key file here";
19-
208
void setup() {
219
Serial.begin(115200);
2210
delay(10);
@@ -25,17 +13,11 @@ void setup() {
2513
Serial.println(ssid);
2614
WiFi.disconnect(true); //disconnect form wifi to set new wifi connection
2715
WiFi.mode(WIFI_STA); //init wifi mode
28-
29-
// Example1 (most common): a cert-file-free eduroam with PEAP (or TTLS)
30-
WiFi.begin(ssid, WPA2_AUTH_PEAP, EAP_IDENTITY, EAP_USERNAME, EAP_PASSWORD);
31-
32-
// Example 2: a cert-file WPA2 Enterprise with PEAP
33-
//WiFi.begin(ssid, WPA2_AUTH_PEAP, EAP_IDENTITY, EAP_USERNAME, EAP_PASSWORD, ca_pem, client_cert, client_key);
34-
35-
// Example 3: TLS with cert-files and no password
36-
//WiFi.begin(ssid, WPA2_AUTH_TLS, EAP_IDENTITY, NULL, NULL, ca_pem, client_cert, client_key);
37-
38-
16+
esp_wifi_sta_wpa2_ent_set_identity((uint8_t *)EAP_IDENTITY, strlen(EAP_IDENTITY)); //provide identity
17+
esp_wifi_sta_wpa2_ent_set_username((uint8_t *)EAP_IDENTITY, strlen(EAP_IDENTITY)); //provide username --> identity and username is same
18+
esp_wifi_sta_wpa2_ent_set_password((uint8_t *)EAP_PASSWORD, strlen(EAP_PASSWORD)); //provide password
19+
esp_wifi_sta_wpa2_ent_enable();
20+
WiFi.begin(ssid); //connect to wifi
3921
while (WiFi.status() != WL_CONNECTED) {
4022
delay(500);
4123
Serial.print(".");

Diff for: libraries/WiFi/src/WiFiSTA.cpp

-62
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,6 @@ extern "C" {
4242
#include "lwip/dns.h"
4343
#include <esp_smartconfig.h>
4444
#include <esp_netif.h>
45-
#include "esp_wpa2.h"
4645
}
4746

4847
// -----------------------------------------------------------------------------------------------------------------------
@@ -146,67 +145,6 @@ wl_status_t WiFiSTAClass::status()
146145
return (wl_status_t)xEventGroupClearBits(_sta_status_group, 0);
147146
}
148147

149-
/**
150-
* Start Wifi connection with a WPA2 Enterprise AP
151-
* if passphrase is set the most secure supported mode will be automatically selected
152-
* @param ssid const char* Pointer to the SSID string.
153-
* @param method wpa2_method_t The authentication method of WPA2 (WPA2_AUTH_TLS, WPA2_AUTH_PEAP, WPA2_AUTH_TTLS)
154-
* @param wpa2_identity const char* Pointer to the entity
155-
* @param wpa2_username const char* Pointer to the username
156-
* @param password const char * Pointer to the password.
157-
* @param ca_pem const char* Pointer to a string with the contents of a .pem file with CA cert
158-
* @param client_crt const char* Pointer to a string with the contents of a .crt file with client cert
159-
* @param client_key const char* Pointer to a string with the contants of a .key file with client key
160-
* @param bssid uint8_t[6] Optional. BSSID / MAC of AP
161-
* @param channel Optional. Channel of AP
162-
* @param connect Optional. call connect
163-
* @return
164-
*/
165-
wl_status_t WiFiSTAClass::begin(const char* wpa2_ssid, wpa2_auth_method_t method, const char* wpa2_identity, const char* wpa2_username, const char *wpa2_password, const char* ca_pem, const char* client_crt, const char* client_key, int32_t channel, const uint8_t* bssid, bool connect)
166-
{
167-
if(!WiFi.enableSTA(true)) {
168-
log_e("STA enable failed!");
169-
return WL_CONNECT_FAILED;
170-
}
171-
172-
if(!wpa2_ssid || *wpa2_ssid == 0x00 || strlen(wpa2_ssid) > 32) {
173-
log_e("SSID too long or missing!");
174-
return WL_CONNECT_FAILED;
175-
}
176-
177-
if(wpa2_identity && strlen(wpa2_identity) > 64) {
178-
log_e("identity too long!");
179-
return WL_CONNECT_FAILED;
180-
}
181-
182-
if(wpa2_username && strlen(wpa2_username) > 64) {
183-
log_e("username too long!");
184-
return WL_CONNECT_FAILED;
185-
}
186-
187-
if(wpa2_password && strlen(wpa2_password) > 64) {
188-
log_e("password too long!");
189-
}
190-
191-
if(ca_pem) {
192-
esp_wifi_sta_wpa2_ent_set_ca_cert((uint8_t *)ca_pem, strlen(ca_pem));
193-
}
194-
195-
if(client_crt) {
196-
esp_wifi_sta_wpa2_ent_set_cert_key((uint8_t *)client_crt, strlen(client_crt), (uint8_t *)client_key, strlen(client_key), NULL, 0);
197-
}
198-
199-
esp_wifi_sta_wpa2_ent_set_identity((uint8_t *)wpa2_identity, strlen(wpa2_identity));
200-
if(method == WPA2_AUTH_PEAP || method == WPA2_AUTH_TTLS) {
201-
esp_wifi_sta_wpa2_ent_set_username((uint8_t *)wpa2_username, strlen(wpa2_username));
202-
esp_wifi_sta_wpa2_ent_set_password((uint8_t *)wpa2_password, strlen(wpa2_password));
203-
}
204-
esp_wifi_sta_wpa2_ent_enable(); //set config settings to enable function
205-
WiFi.begin(wpa2_ssid); //connect to wifi
206-
207-
return status();
208-
}
209-
210148
/**
211149
* Start Wifi connection
212150
* if passphrase is set the most secure supported mode will be automatically selected

Diff for: libraries/WiFi/src/WiFiSTA.h

-6
Original file line numberDiff line numberDiff line change
@@ -30,11 +30,6 @@
3030
#include "esp_event.h"
3131
#endif
3232

33-
typedef enum {
34-
WPA2_AUTH_TLS = 0,
35-
WPA2_AUTH_PEAP = 1,
36-
WPA2_AUTH_TTLS = 2
37-
} wpa2_auth_method_t;
3833

3934
class WiFiSTAClass
4035
{
@@ -44,7 +39,6 @@ class WiFiSTAClass
4439

4540
public:
4641

47-
wl_status_t begin(const char* wpa2_ssid, wpa2_auth_method_t method, const char* wpa2_identity=NULL, const char* wpa2_username=NULL, const char *wpa2_password=NULL, const char* ca_pem=NULL, const char* client_crt=NULL, const char* client_key=NULL, int32_t channel=0, const uint8_t* bssid=0, bool connect=true);
4842
wl_status_t begin(const char* ssid, const char *passphrase = NULL, int32_t channel = 0, const uint8_t* bssid = NULL, bool connect = true);
4943
wl_status_t begin(char* ssid, char *passphrase = NULL, int32_t channel = 0, const uint8_t* bssid = NULL, bool connect = true);
5044
wl_status_t begin();

0 commit comments

Comments
 (0)