Skip to content

Commit 7a153ad

Browse files
jtguggedalrlubos
authored andcommitted
samples: net: download: Add nRF7002 DK support
Add support for nRF7002 DK, downloading over Wi-Fi. Signed-off-by: Jan Tore Guggedal <jantore.guggedal@nordicsemi.no>
1 parent 0e66b13 commit 7a153ad

File tree

4 files changed

+105
-25
lines changed

4 files changed

+105
-25
lines changed

samples/net/download/README.rst

+4-5
Original file line numberDiff line numberDiff line change
@@ -24,12 +24,12 @@ Overview
2424

2525
The sample first initializes the :ref:`nrfxlib:nrf_modem` and AT communications.
2626
Next, it provisions a certificate to the modem using the :ref:`modem_key_mgmt` library if the :ref:`CONFIG_SAMPLE_SECURE_SOCKET <CONFIG_SAMPLE_SECURE_SOCKET>` option is set.
27-
The provisioning of the certificates must be done before connecting to the LTE network since the certificates can only be provisioned when the device is not connected.
27+
When using an nRF91 Series device, the provisioning of the certificates must be done before connecting to the LTE network since the certificates can only be provisioned when the device is not connected.
2828
The certificate file name and security tag can be configured using the :ref:`CONFIG_SAMPLE_SEC_TAG <CONFIG_SAMPLE_SEC_TAG>` and the :ref:`CONFIG_SAMPLE_CERT_FILE <CONFIG_SAMPLE_CERT_FILE>` options, respectively.
2929

3030
The sample then performs the following actions:
3131

32-
1. Establishes a connection to the LTE network
32+
1. Establishes a connection to the network
3333
#. Optionally sets up the secure socket options
3434
#. Uses the :ref:`lib_download_client` library to download a file from an HTTP server.
3535

@@ -42,8 +42,7 @@ To enable CoAP block-wise transfer, it is necessary to enable :ref:`Zephyr's CoA
4242
Using TLS and DTLS
4343
==================
4444

45-
46-
When the :ref:`CONFIG_SAMPLE_SECURE_SOCKET <CONFIG_SAMPLE_SECURE_SOCKET>` option is set, the sample provisions the certificate found in the :file:`samples/net/download/cert` folder.
45+
By default, the :ref:`CONFIG_SAMPLE_SECURE_SOCKET <CONFIG_SAMPLE_SECURE_SOCKET>` option is set, which means that the sample provisions the certificate found in the :file:`samples/net/download/cert` folder.
4746
The certificate file name is indicated by the :ref:`CONFIG_SAMPLE_CERT_FILE <CONFIG_SAMPLE_CERT_FILE>` option.
4847
This certificate will work for the default test files.
4948
If you are using a custom download test file, you must provision the correct certificate for the servers from which the certificates will be downloaded.
@@ -136,7 +135,7 @@ The following output is logged on the terminal when the sample downloads a file
136135
Dependencies
137136
************
138137

139-
This sample uses the following |NCS| libraries:
138+
This sample uses the following |NCS| libraries when using an nRF91 Series device:
140139

141140
* :ref:`modem_key_mgmt`
142141
* :ref:`nrf_modem_lib_readme`
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,62 @@
1+
#
2+
# Copyright (c) 2023 Nordic Semiconductor ASA
3+
#
4+
# SPDX-License-Identifier: LicenseRef-Nordic-5-Clause
5+
#
6+
7+
# General
8+
CONFIG_POSIX_CLOCK=y
9+
CONFIG_SYSTEM_WORKQUEUE_STACK_SIZE=4096
10+
CONFIG_LOG_BUFFER_SIZE=3072
11+
CONFIG_HEAP_MEM_POOL_SIZE=153600
12+
CONFIG_LOG=y
13+
14+
# Zephyr NET Connection Manager connectivity layer.
15+
CONFIG_L2_WIFI_CONNECTIVITY=y
16+
CONFIG_L2_WIFI_CONNECTIVITY_AUTO_DOWN=n
17+
CONFIG_L2_WIFI_CONNECTIVITY_AUTO_CONNECT=n
18+
CONFIG_MAIN_STACK_SIZE=4096
19+
20+
# Wi-Fi
21+
CONFIG_WIFI=y
22+
CONFIG_WIFI_NRF700X=y
23+
CONFIG_WIFI_LOG_LEVEL_ERR=y
24+
CONFIG_WIFI_MGMT_EXT=y
25+
CONFIG_WIFI_CREDENTIALS=y
26+
CONFIG_WIFI_CREDENTIALS_BACKEND_SETTINGS=y
27+
CONFIG_WIFI_CREDENTIALS_STATIC=y
28+
CONFIG_WIFI_CREDENTIALS_STATIC_SSID=""
29+
CONFIG_WIFI_CREDENTIALS_STATIC_PASSWORD=""
30+
CONFIG_FLASH=y
31+
CONFIG_FLASH_PAGE_LAYOUT=y
32+
CONFIG_FLASH_MAP=y
33+
CONFIG_NVS=y
34+
CONFIG_SETTINGS=y
35+
CONFIG_SETTINGS_NVS=y
36+
37+
# WPA
38+
CONFIG_WPA_SUPP=y
39+
CONFIG_WPA_SUPP_LOG_LEVEL_ERR=y
40+
41+
# NET sockets
42+
CONFIG_NET_L2_ETHERNET=y
43+
CONFIG_NET_TCP_WORKQ_STACK_SIZE=2048
44+
CONFIG_NET_UDP=y
45+
CONFIG_NET_DHCPV4=y
46+
CONFIG_NET_CONTEXT_SNDTIMEO=y
47+
CONFIG_NET_CONTEXT_RCVTIMEO=y
48+
CONFIG_NET_MGMT_EVENT_STACK_SIZE=4096
49+
CONFIG_NET_TCP=y
50+
CONFIG_NET_NATIVE=y
51+
52+
# DNS
53+
CONFIG_DNS_RESOLVER=y
54+
55+
# TLS
56+
CONFIG_NRF_SECURITY=y
57+
CONFIG_MBEDTLS=y
58+
CONFIG_MBEDTLS_ENABLE_HEAP=y
59+
CONFIG_MBEDTLS_HEAP_SIZE=120000
60+
CONFIG_MBEDTLS_RSA_C=y
61+
CONFIG_MBEDTLS_SSL_SERVER_NAME_INDICATION=y
62+
CONFIG_NET_SOCKETS_SOCKOPT_TLS=y

samples/net/download/sample.yaml

+14-2
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,15 @@
11
sample:
22
name: Download sample
33
tests:
4-
sample.net.download.tfm:
4+
sample.net.download.tfm.lte:
55
build_only: true
66
extra_args: OVERLAY_CONFIG="overlay-tfm.conf"
77
integration_platforms:
88
- nrf9160dk_nrf9160_ns
99
- nrf9161dk_nrf9161_ns
1010
platform_allow: nrf9160dk_nrf9160_ns nrf9161dk_nrf9161_ns
1111
tags: ci_build
12-
sample.net.download_client:
12+
sample.net.download_client.lte:
1313
build_only: true
1414
extra_configs:
1515
- CONFIG_SHELL=y
@@ -21,3 +21,15 @@ tests:
2121
- nrf9161dk_nrf9161_ns
2222
platform_allow: nrf9160dk_nrf9160_ns nrf9161dk_nrf9161_ns
2323
tags: ci_build
24+
sample.net.download_client.wifi:
25+
build_only: true
26+
extra_configs:
27+
- CONFIG_SHELL=y
28+
- CONFIG_DOWNLOAD_CLIENT_SHELL=y
29+
- CONFIG_SAMPLE_COMPUTE_HASH=y
30+
- CONFIG_WIFI_CREDENTIALS_STATIC_SSID="test-ssid"
31+
- CONFIG_WIFI_CREDENTIALS_STATIC_PASSWORD="test-password"
32+
integration_platforms:
33+
- nrf7002dk_nrf5340_cpuapp
34+
platform_allow: nrf7002dk_nrf5340_cpuapp
35+
tags: ci_build

samples/net/download/src/main.c

+25-18
Original file line numberDiff line numberDiff line change
@@ -7,12 +7,15 @@
77
#include <string.h>
88
#include <stdlib.h>
99
#include <zephyr/kernel.h>
10+
#include <zephyr/net/socket.h>
1011
#include <zephyr/net/net_if.h>
1112
#include <zephyr/net/conn_mgr_connectivity.h>
1213
#include <net/download_client.h>
1314

14-
#if CONFIG_SAMPLE_SECURE_SOCKET
15+
#if CONFIG_MODEM_KEY_MGMT
1516
#include <modem/modem_key_mgmt.h>
17+
#else
18+
#include <zephyr/net/tls_credentials.h>
1619
#endif
1720

1821
#define URL CONFIG_SAMPLE_FILE_URL
@@ -45,6 +48,7 @@ static struct download_client_cfg config = {
4548
#if CONFIG_SAMPLE_SECURE_SOCKET
4649
.sec_tag_list = sec_tag_list,
4750
.sec_tag_count = ARRAY_SIZE(sec_tag_list),
51+
.set_tls_hostname = true,
4852
#endif
4953
};
5054

@@ -56,10 +60,13 @@ static mbedtls_sha256_context sha256_ctx;
5660
static int64_t ref_time;
5761

5862
#if CONFIG_SAMPLE_SECURE_SOCKET
59-
/* Provision certificate to modem */
6063
static int cert_provision(void)
6164
{
6265
int err;
66+
67+
printk("Provisioning certificate\n");
68+
69+
#if CONFIG_MODEM_KEY_MGMT
6370
bool exists;
6471

6572
err = modem_key_mgmt_exists(SEC_TAG,
@@ -76,14 +83,14 @@ static int cert_provision(void)
7683
err = modem_key_mgmt_cmp(SEC_TAG,
7784
MODEM_KEY_MGMT_CRED_TYPE_CA_CHAIN,
7885
cert, sizeof(cert) - 1);
86+
7987
printk("%s\n", err ? "mismatch" : "match");
88+
8089
if (!err) {
8190
return 0;
8291
}
8392
}
8493

85-
printk("Provisioning certificate\n");
86-
8794
/* Provision certificate to the modem */
8895
err = modem_key_mgmt_write(SEC_TAG,
8996
MODEM_KEY_MGMT_CRED_TYPE_CA_CHAIN,
@@ -92,6 +99,16 @@ static int cert_provision(void)
9299
printk("Failed to provision certificate, err %d\n", err);
93100
return err;
94101
}
102+
#else /* CONFIG_MODEM_KEY_MGMT */
103+
err = tls_credential_add(SEC_TAG,
104+
TLS_CREDENTIAL_CA_CERTIFICATE,
105+
cert,
106+
sizeof(cert));
107+
if (err < 0) {
108+
printk("Failed to register CA certificate: %d\n", err);
109+
return err;
110+
}
111+
#endif /* !CONFIG_MODEM_KEY_MGMT */
95112

96113
return 0;
97114
}
@@ -231,12 +248,6 @@ int main(void)
231248

232249
printk("Download client sample started\n");
233250

234-
net_if = net_if_get_default();
235-
if (net_if == NULL) {
236-
printk("Pointer to network interface is NULL\n");
237-
return -ECANCELED;
238-
}
239-
240251
/* Setup handler for Zephyr NET Connection Manager events. */
241252
net_mgmt_init_event_callback(&l4_cb, l4_event_handler, L4_EVENT_MASK);
242253
net_mgmt_add_event_callback(&l4_cb);
@@ -245,9 +256,9 @@ int main(void)
245256
net_mgmt_init_event_callback(&conn_cb, connectivity_event_handler, CONN_LAYER_EVENT_MASK);
246257
net_mgmt_add_event_callback(&conn_cb);
247258

248-
err = net_if_up(net_if);
259+
err = conn_mgr_all_if_up(true);
249260
if (err) {
250-
printk("net_if_up, error: %d\n", err);
261+
printk("conn_mgr_all_if_up, error: %d\n", err);
251262
return err;
252263
}
253264

@@ -259,15 +270,11 @@ int main(void)
259270
}
260271
#endif
261272

262-
/* Add temporary fix to prevent using Wi-Fi before WPA supplicant is ready. */
263-
/* Remove this whenever wpa supplicant ready events has been added. */
264-
k_sleep(K_SECONDS(1));
265-
266273
printk("Connecting to network\n");
267274

268-
err = conn_mgr_if_connect(net_if);
275+
err = conn_mgr_all_if_connect(true);
269276
if (err) {
270-
printk("conn_mgr_if_connect, error: %d\n", err);
277+
printk("conn_mgr_all_if_connect, error: %d\n", err);
271278
return err;
272279
}
273280

0 commit comments

Comments
 (0)