Module_EvComm.c 56 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646164716481649165016511652165316541655165616571658165916601661166216631664166516661667166816691670167116721673167416751676167716781679168016811682168316841685168616871688168916901691169216931694169516961697169816991700170117021703170417051706170717081709171017111712171317141715171617171718171917201721172217231724172517261727172817291730173117321733173417351736173717381739174017411742174317441745174617471748174917501751175217531754175517561757175817591760176117621763176417651766176717681769177017711772177317741775177617771778177917801781178217831784178517861787178817891790179117921793179417951796179717981799180018011802180318041805180618071808180918101811181218131814181518161817181818191820182118221823182418251826182718281829183018311832183318341835183618371838183918401841184218431844184518461847184818491850185118521853
  1. /*
  2. * Module_EvComm.c
  3. *
  4. * Created on: 2020年9月14日
  5. * Author: Wendell
  6. */
  7. #include <sys/time.h>
  8. #include <sys/timeb.h>
  9. #include <sys/types.h>
  10. #include <sys/stat.h>
  11. #include <sys/types.h>
  12. #include <sys/ioctl.h>
  13. #include <sys/socket.h>
  14. #include <sys/ipc.h>
  15. #include <sys/shm.h>
  16. #include <sys/shm.h>
  17. #include <sys/mman.h>
  18. #include <linux/can.h>
  19. #include <linux/can/raw.h>
  20. #include <linux/wireless.h>
  21. #include <arpa/inet.h>
  22. #include <netinet/in.h>
  23. #include <unistd.h>
  24. #include <stdarg.h>
  25. #include <stdio.h> /*標準輸入輸出定義*/
  26. #include <stdlib.h> /*標準函數庫定義*/
  27. #include <unistd.h> /*Unix 標準函數定義*/
  28. #include <fcntl.h> /*檔控制定義*/
  29. #include <termios.h> /*PPSIX 終端控制定義*/
  30. #include <errno.h> /*錯誤號定義*/
  31. #include <errno.h>
  32. #include <string.h>
  33. #include <time.h>
  34. #include <ctype.h>
  35. #include <ifaddrs.h>
  36. #include <signal.h>
  37. #include <net/if_arp.h>
  38. #include "../../define.h"
  39. #include "Module_EvComm.h"
  40. #include "Config.h"
  41. #define ARRAY_SIZE(A) (sizeof(A) / sizeof(A[0]))
  42. #define PASS 1
  43. #define FAIL -1
  44. #define YES 1
  45. #define NO 0
  46. #define ON 1
  47. #define OFF 0
  48. #define true 1
  49. #define false 0
  50. struct SysConfigAndInfo *ShmSysConfigAndInfo;
  51. void PRINTF_FUNC(char *string, ...);
  52. int StoreLogMsg(const char *fmt, ...);
  53. #define DEBUG_INFO(format, args...) PRINTF_FUNC("[%s:%d][%s][Info] "format, __FILE__, __LINE__, __FUNCTION__, ##args)
  54. #define DEBUG_WARN(format, args...) PRINTF_FUNC("[%s:%d][%s][Warn] "format, __FILE__, __LINE__, __FUNCTION__, ##args)
  55. #define DEBUG_ERROR(format, args...) PRINTF_FUNC("[%s:%d][%s][Error] "format, __FILE__, __LINE__, __FUNCTION__, ##args)
  56. int StoreLogMsg(const char *fmt, ...)
  57. {
  58. char Buf[4096+256];
  59. char buffer[4096];
  60. va_list args;
  61. struct timeb SeqEndTime;
  62. struct tm *tm;
  63. va_start(args, fmt);
  64. int rc = vsnprintf(buffer, sizeof(buffer), fmt, args);
  65. va_end(args);
  66. memset(Buf,0,sizeof(Buf));
  67. ftime(&SeqEndTime);
  68. SeqEndTime.time = time(NULL);
  69. tm=localtime(&SeqEndTime.time);
  70. if (ShmSysConfigAndInfo->SysConfig.SwitchDebugFlag == YES)
  71. {
  72. sprintf(Buf,"%02d:%02d:%02d:%03d - %s",
  73. tm->tm_hour,tm->tm_min,tm->tm_sec,SeqEndTime.millitm, buffer);
  74. printf("%s \n", Buf);
  75. }
  76. else
  77. {
  78. sprintf(Buf,"echo \"%04d-%02d-%02d %02d:%02d:%02d:%03d - %s\" >> /Storage/SystemLog/[%04d.%02d]SystemLog",
  79. tm->tm_year+1900,tm->tm_mon+1,tm->tm_mday,tm->tm_hour,tm->tm_min,tm->tm_sec,SeqEndTime.millitm,
  80. buffer,
  81. tm->tm_year+1900,tm->tm_mon+1);
  82. system(Buf);
  83. }
  84. return rc;
  85. }
  86. void PRINTF_FUNC(char *string, ...)
  87. {
  88. va_list args;
  89. char buffer[4096];
  90. va_start(args, string);
  91. vsnprintf(buffer, sizeof(buffer), string, args);
  92. va_end(args);
  93. printf("%s \n", buffer);
  94. }
  95. void ShowSocketData(struct PACKET_STRUCTURE *packet)
  96. {
  97. printf("se: %02X, id: %02X, op: %d, len: %3d, reg: %02X",
  98. packet->Header.se, packet->Header.id, packet->Header.op, packet->Header.len, packet->Payload.reg);
  99. if(packet->Header.len > 1)
  100. {
  101. printf(", Data:");
  102. for(int i = 0; i < packet->Header.len - 1; i++)
  103. {
  104. printf(" %02X", packet->Payload.data[i]);
  105. }
  106. }
  107. printf("\n");
  108. }
  109. //==========================================
  110. // Init all share memory
  111. //==========================================
  112. int InitShareMemory()
  113. {
  114. int result = PASS;
  115. int MeterSMId;
  116. //creat ShmSysConfigAndInfo
  117. if ((MeterSMId = shmget(ShmSysConfigAndInfoKey, sizeof(struct SysConfigAndInfo), IPC_CREAT | 0777)) < 0)
  118. {
  119. #ifdef SystemLogMessage
  120. DEBUG_ERROR("shmget ShmSysConfigAndInfo NG\n");
  121. #endif
  122. result = FAIL;
  123. }
  124. else if ((ShmSysConfigAndInfo = shmat(MeterSMId, NULL, 0)) == (void *) -1)
  125. {
  126. #ifdef SystemLogMessage
  127. DEBUG_ERROR("shmat ShmSysConfigAndInfo NG\n");
  128. #endif
  129. result = FAIL;
  130. }
  131. else
  132. {}
  133. /*
  134. //creat ShmStatusCodeData
  135. if ((MeterSMId = shmget(ShmStatusCodeKey, sizeof(struct StatusCodeData), 0777)) < 0)
  136. {
  137. #ifdef SystemLogMessage
  138. DEBUG_ERROR("shmget ShmStatusCodeData NG\n");
  139. #endif
  140. result = FAIL;
  141. }
  142. else if ((ShmStatusCodeData = shmat(MeterSMId, NULL, 0)) == (void *) -1)
  143. {
  144. #ifdef SystemLogMessage
  145. DEBUG_ERROR("shmat ShmStatusCodeData NG\n");
  146. #endif
  147. result = FAIL;
  148. }
  149. else
  150. {}
  151. //creat ShmOCPP16Data
  152. if ((MeterSMId = shmget(ShmOcppModuleKey, sizeof(struct OCPP16Data), 0777)) < 0)
  153. {
  154. #ifdef SystemLogMessage
  155. DEBUG_ERROR("shmget ShmOCPP16Data NG");
  156. #endif
  157. result = FAIL;
  158. }
  159. else if ((ShmOCPP16Data = shmat(MeterSMId, NULL, 0)) == (void *) -1)
  160. {
  161. #ifdef SystemLogMessage
  162. DEBUG_ERROR("shmat ShmOCPP16Data NG");
  163. #endif
  164. result = FAIL;
  165. }
  166. else
  167. {}
  168. //creat ShmPsuData
  169. if ((MeterSMId = shmget(ShmPsuKey, sizeof(struct PsuData), 0777)) < 0)
  170. {
  171. #ifdef SystemLogMessage
  172. DEBUG_ERROR("shmget ShmPsuData NG \n");
  173. #endif
  174. result = FAIL;
  175. }
  176. else if ((ShmPsuData = shmat(MeterSMId, NULL, 0)) == (void *) -1)
  177. {
  178. #ifdef SystemLogMessage
  179. DEBUG_ERROR("shmat ShmPsuData NG \n");
  180. #endif
  181. result = FAIL;
  182. }
  183. memset(ShmPsuData,0,sizeof(struct PsuData));
  184. */
  185. return result;
  186. }
  187. //-------------------------------------------Socket Client Start-------------------------------------------
  188. unsigned char seqNum = 0;
  189. void sendCmdDispenserModelName(int socket, unsigned char se)
  190. {
  191. struct PACKET_STRUCTURE sendBuffer;
  192. char *modelName = "DSYE601J0EW2PH";
  193. //char *modelName = "DSYE601J00W2PH";
  194. memset(&sendBuffer, 0x00, sizeof(sendBuffer));
  195. sendBuffer.Header.se = se;
  196. sendBuffer.Header.id = 0xFF;
  197. sendBuffer.Header.op = _Header_Write;
  198. sendBuffer.Header.len = strlen(modelName) + 2;
  199. sendBuffer.Payload.reg = _Reg_Dispenser_Model_Name;
  200. memcpy(&sendBuffer.Payload.data[0], modelName, strlen(modelName));
  201. sendBuffer.Payload.data[strlen(modelName)] = 1;
  202. send(socket, &sendBuffer, sendBuffer.Header.len + 4, 0);
  203. }
  204. void sendCmdDispenserConnectorIDRequest(int socket, unsigned char se)
  205. {
  206. struct PACKET_STRUCTURE sendBuffer;
  207. memset(&sendBuffer, 0x00, sizeof(sendBuffer));
  208. sendBuffer.Header.se = se;
  209. sendBuffer.Header.id = 0xFF;
  210. sendBuffer.Header.op = _Header_Read;
  211. sendBuffer.Header.len = 1;
  212. sendBuffer.Payload.reg = _Reg_Connector_ID;
  213. send(socket, &sendBuffer, sendBuffer.Header.len + 4, 0);
  214. }
  215. void sendCmdPowerCabinetStatusRequest(int socket, unsigned char connector, unsigned char se)
  216. {
  217. struct PACKET_STRUCTURE sendBuffer;
  218. memset(&sendBuffer, 0x00, sizeof(sendBuffer));
  219. sendBuffer.Header.se = se;
  220. sendBuffer.Header.id = connector;
  221. sendBuffer.Header.op = _Header_Read;
  222. sendBuffer.Header.len = 1;
  223. sendBuffer.Payload.reg = _Reg_Power_Cabinet_Status;
  224. send(socket, &sendBuffer, sendBuffer.Header.len + 4, 0);
  225. }
  226. void sendCmdWriteDispenserStatus(int socket, unsigned char connector, unsigned char se)
  227. {
  228. struct PACKET_STRUCTURE sendBuffer;
  229. memset(&sendBuffer, 0x00, sizeof(sendBuffer));
  230. sendBuffer.Header.se = se;
  231. sendBuffer.Header.id = connector;
  232. sendBuffer.Header.op = _Header_Write;
  233. sendBuffer.Header.len = 1;
  234. sendBuffer.Payload.reg = _Reg_Dispenser_Status;
  235. send(socket, &sendBuffer, sendBuffer.Header.len + 4, 0);
  236. }
  237. void sendCmdReadChargingCapability(int socket, unsigned char connector, unsigned char se)
  238. {
  239. struct PACKET_STRUCTURE sendBuffer;
  240. memset(&sendBuffer, 0x00, sizeof(sendBuffer));
  241. sendBuffer.Header.se = se;
  242. sendBuffer.Header.id = connector;
  243. sendBuffer.Header.op = _Header_Read;
  244. sendBuffer.Header.len = 1;
  245. sendBuffer.Payload.reg = _Reg_Charging_Capability;
  246. send(socket, &sendBuffer, sendBuffer.Header.len + 4, 0);
  247. }
  248. void sendCmdWriteChargingTarget(int socket, unsigned char connector, unsigned char se, unsigned short voltage, unsigned short current)
  249. {
  250. struct PACKET_STRUCTURE sendBuffer;
  251. memset(&sendBuffer, 0x00, sizeof(sendBuffer));
  252. sendBuffer.Header.se = se;
  253. sendBuffer.Header.id = connector;
  254. sendBuffer.Header.op = _Header_Write;
  255. sendBuffer.Header.len = 5;
  256. sendBuffer.Payload.reg = _Reg_Charging_Target;
  257. sendBuffer.Payload.data[0] = (voltage >> 8) & 0xFF;
  258. sendBuffer.Payload.data[1] = voltage & 0xFF;
  259. sendBuffer.Payload.data[2] = (current >> 8) & 0xFF;
  260. sendBuffer.Payload.data[3] = current & 0xFF;
  261. send(socket, &sendBuffer, sendBuffer.Header.len + 4, 0);
  262. }
  263. void sendCmdWritePlugInStatus(int socket, unsigned char connector, unsigned char se)
  264. {
  265. struct PACKET_STRUCTURE sendBuffer;
  266. memset(&sendBuffer, 0x00, sizeof(sendBuffer));
  267. sendBuffer.Header.se = se;
  268. sendBuffer.Header.id = connector;
  269. sendBuffer.Header.op = _Header_Write;
  270. sendBuffer.Header.len = 2;
  271. sendBuffer.Payload.reg = _Reg_Plug_In_Status;
  272. sendBuffer.Payload.data[0] = se % 2 == 0 ?_PIS_UnPlugged : _PIS_PluggedIn;
  273. send(socket, &sendBuffer, sendBuffer.Header.len + 4, 0);
  274. }
  275. void sendCmdWriteConnectorState(int socket, unsigned char connector, unsigned char se)
  276. {
  277. struct PACKET_STRUCTURE sendBuffer;
  278. memset(&sendBuffer, 0x00, sizeof(sendBuffer));
  279. sendBuffer.Header.se = se;
  280. sendBuffer.Header.id = connector;
  281. sendBuffer.Header.op = _Header_Write;
  282. sendBuffer.Header.len = 2;
  283. sendBuffer.Payload.reg = _Reg_Connector_State;
  284. sendBuffer.Payload.data[0] = _CRS_Idle;
  285. send(socket, &sendBuffer, sendBuffer.Header.len + 4, 0);
  286. }
  287. void sendCmdWriteUserID(int socket, unsigned char connector, unsigned char se)
  288. {
  289. struct PACKET_STRUCTURE sendBuffer;
  290. char *userID = "010203040506";
  291. memset(&sendBuffer, 0x00, sizeof(sendBuffer));
  292. sendBuffer.Header.se = se;
  293. sendBuffer.Header.id = connector;
  294. sendBuffer.Header.op = _Header_Write;
  295. sendBuffer.Header.len = strlen(userID) + 1;
  296. sendBuffer.Payload.reg = _Reg_User_ID;
  297. memcpy(sendBuffer.Payload.data, userID, strlen(userID));
  298. send(socket, &sendBuffer, sendBuffer.Header.len + 4, 0);
  299. }
  300. void sendCmdReadChargingPermission(int socket, unsigned char connector, unsigned char se)
  301. {
  302. struct PACKET_STRUCTURE sendBuffer;
  303. memset(&sendBuffer, 0x00, sizeof(sendBuffer));
  304. sendBuffer.Header.se = se;
  305. sendBuffer.Header.id = connector;
  306. sendBuffer.Header.op = _Header_Read;
  307. sendBuffer.Header.len = 1;
  308. sendBuffer.Payload.reg = _Reg_Charging_Permission;
  309. send(socket, &sendBuffer, sendBuffer.Header.len + 4, 0);
  310. }
  311. int DispenserModelNameCheckIn(int socket, unsigned char se)
  312. {
  313. int rxLen = 0, timeout = 0;
  314. struct PACKET_STRUCTURE receiveBuffer;
  315. int result = FAIL;
  316. sendCmdDispenserModelName(socket, se);
  317. while(1)
  318. {
  319. if((rxLen = recv(socket, &receiveBuffer, sizeof(Packet_Structure), MSG_DONTWAIT )) > 0)
  320. {
  321. if(rxLen == (receiveBuffer.Header.len + PACKET_HEADER_LENGTH))
  322. {
  323. ShowSocketData(&receiveBuffer);
  324. if(receiveBuffer.Header.len == 2)
  325. {
  326. if(receiveBuffer.Payload.reg == _Reg_Dispenser_Model_Name && receiveBuffer.Payload.data[0] == _R_OK)
  327. {
  328. PRINTF_FUNC("Write Model Name OK");
  329. result = PASS;
  330. break;
  331. }
  332. }
  333. }
  334. }
  335. timeout += SOCKET_RECEIVE_INTERVAL;
  336. usleep((SOCKET_RECEIVE_INTERVAL * 1000));
  337. if(timeout >= DISPENSER_MODEL_NAME_RESEND)
  338. {
  339. //timeout
  340. break;
  341. }
  342. }
  343. return result;
  344. }
  345. int DispenserConnectorRequest(int socket, unsigned char se)
  346. {
  347. int rxLen = 0, timeout = 0;
  348. struct PACKET_STRUCTURE receiveBuffer;
  349. int result = FAIL;
  350. sendCmdDispenserConnectorIDRequest(socket, se);
  351. while(1)
  352. {
  353. if((rxLen = recv(socket, &receiveBuffer, sizeof(Packet_Structure), MSG_DONTWAIT )) > 0)
  354. {
  355. if(rxLen == (receiveBuffer.Header.len + PACKET_HEADER_LENGTH))
  356. {
  357. ShowSocketData(&receiveBuffer);
  358. if(receiveBuffer.Header.len == 4)
  359. {
  360. if(receiveBuffer.Payload.reg == _Reg_Connector_ID && receiveBuffer.Payload.data[0] == _R_OK)
  361. {
  362. PRINTF_FUNC("Get Connector ID: %02X, %02X", receiveBuffer.Payload.data[1], receiveBuffer.Payload.data[2]);
  363. result = PASS;
  364. break;
  365. }
  366. }
  367. }
  368. }
  369. timeout += SOCKET_RECEIVE_INTERVAL;
  370. usleep((SOCKET_RECEIVE_INTERVAL * 1000));
  371. if(timeout >= DISPENSER_CONNECTOR_RESEND)
  372. {
  373. //timeout
  374. break;
  375. }
  376. }
  377. return result;
  378. }
  379. int DispenserReadPowerCabinetStatus(int socket, unsigned char connector, unsigned char se)
  380. {
  381. int rxLen = 0, timeout = 0;
  382. struct PACKET_STRUCTURE receiveBuffer;
  383. int result = FAIL;
  384. sendCmdPowerCabinetStatusRequest(socket, connector, se);
  385. while(1)
  386. {
  387. if((rxLen = recv(socket, &receiveBuffer, sizeof(Packet_Structure), MSG_DONTWAIT )) > 0)
  388. {
  389. if(rxLen == (receiveBuffer.Header.len + PACKET_HEADER_LENGTH))
  390. {
  391. ShowSocketData(&receiveBuffer);
  392. if(receiveBuffer.Payload.reg == _Reg_Power_Cabinet_Status && receiveBuffer.Payload.data[0] == _R_OK)
  393. {
  394. PRINTF_FUNC("Get Cabinet Status Code, Len: %d", (receiveBuffer.Header.len - 2) / 6);
  395. result = PASS;
  396. }
  397. }
  398. }
  399. timeout += SOCKET_RECEIVE_INTERVAL;
  400. usleep((SOCKET_RECEIVE_INTERVAL * 1000));
  401. if(timeout >= CABINET_STATUS_REQUEST_RESEND)
  402. {
  403. //timeout
  404. break;
  405. }
  406. }
  407. return result;
  408. }
  409. int DispenserWriteStatusCode(int socket, unsigned char connector, unsigned char se)
  410. {
  411. int rxLen = 0, timeout = 0;
  412. struct PACKET_STRUCTURE receiveBuffer;
  413. int result = FAIL;
  414. sendCmdWriteDispenserStatus(socket, connector, se);
  415. while(1)
  416. {
  417. if((rxLen = recv(socket, &receiveBuffer, sizeof(Packet_Structure), MSG_DONTWAIT )) > 0)
  418. {
  419. if(rxLen == (receiveBuffer.Header.len + PACKET_HEADER_LENGTH))
  420. {
  421. ShowSocketData(&receiveBuffer);
  422. if(receiveBuffer.Header.len == 2)
  423. {
  424. if(receiveBuffer.Payload.reg == _Reg_Dispenser_Status && receiveBuffer.Payload.data[0] == _R_OK)
  425. {
  426. PRINTF_FUNC("Write Dispenser Status Code OK");
  427. result = PASS;
  428. }
  429. }
  430. }
  431. }
  432. timeout += SOCKET_RECEIVE_INTERVAL;
  433. usleep((SOCKET_RECEIVE_INTERVAL * 1000));
  434. if(timeout >= CABINET_STATUS_REQUEST_RESEND)
  435. {
  436. //timeout
  437. break;
  438. }
  439. }
  440. return result;
  441. }
  442. int DispenserReadChargingCapability(int socket, unsigned char connector, unsigned char se)
  443. {
  444. int rxLen = 0, timeout = 0;
  445. struct PACKET_STRUCTURE receiveBuffer;
  446. int result = FAIL;
  447. unsigned short voltage = 0, current = 0, power = 0;
  448. sendCmdReadChargingCapability(socket, connector, se);
  449. while(1)
  450. {
  451. if((rxLen = recv(socket, &receiveBuffer, sizeof(Packet_Structure), MSG_DONTWAIT )) > 0)
  452. {
  453. if(rxLen == (receiveBuffer.Header.len + PACKET_HEADER_LENGTH))
  454. {
  455. ShowSocketData(&receiveBuffer);
  456. if(receiveBuffer.Header.len == 8)
  457. {
  458. if(receiveBuffer.Payload.reg == _Reg_Charging_Capability && receiveBuffer.Payload.data[0] == _R_OK)
  459. {
  460. voltage = (receiveBuffer.Payload.data[1] << 8) + receiveBuffer.Payload.data[2];
  461. current = (receiveBuffer.Payload.data[3] << 8) + receiveBuffer.Payload.data[4];
  462. power = (receiveBuffer.Payload.data[5] << 8) + receiveBuffer.Payload.data[6];
  463. PRINTF_FUNC("Capability Voltage: %d.%dV, Current: %d.%dA, Power: %d.%dkW",
  464. voltage / 10, voltage % 10, current / 10, current % 10, power / 10, power % 10);
  465. result = PASS;
  466. }
  467. }
  468. }
  469. }
  470. timeout += SOCKET_RECEIVE_INTERVAL;
  471. usleep((SOCKET_RECEIVE_INTERVAL * 1000));
  472. if(timeout >= CHARGING_CAPABILITY_RESEND)
  473. {
  474. //timeout
  475. break;
  476. }
  477. }
  478. return result;
  479. }
  480. int DispenserWriteChargingTarget(int socket, unsigned char connector, unsigned char se)
  481. {
  482. int rxLen = 0, timeout = 0;
  483. struct PACKET_STRUCTURE receiveBuffer;
  484. int result = FAIL;
  485. sendCmdWriteChargingTarget(socket, connector, se, 7505, 406);
  486. while(1)
  487. {
  488. if((rxLen = recv(socket, &receiveBuffer, sizeof(Packet_Structure), MSG_DONTWAIT )) > 0)
  489. {
  490. if(rxLen == (receiveBuffer.Header.len + PACKET_HEADER_LENGTH))
  491. {
  492. ShowSocketData(&receiveBuffer);
  493. if(receiveBuffer.Header.len == 2)
  494. {
  495. if(receiveBuffer.Payload.reg == _Reg_Charging_Target && receiveBuffer.Payload.data[0] == _R_OK)
  496. {
  497. PRINTF_FUNC("Write Charging Target OK");
  498. result = PASS;
  499. }
  500. }
  501. }
  502. }
  503. timeout += SOCKET_RECEIVE_INTERVAL;
  504. usleep((SOCKET_RECEIVE_INTERVAL * 1000));
  505. if(timeout >= CHARGING_CAPABILITY_RESEND)
  506. {
  507. //timeout
  508. break;
  509. }
  510. }
  511. return result;
  512. }
  513. int DispenserWritePlugInStatus(int socket, unsigned char connector, unsigned char se)
  514. {
  515. int rxLen = 0, timeout = 0;
  516. struct PACKET_STRUCTURE receiveBuffer;
  517. int result = FAIL;
  518. sendCmdWritePlugInStatus(socket, connector, se);
  519. while(1)
  520. {
  521. if((rxLen = recv(socket, &receiveBuffer, sizeof(Packet_Structure), MSG_DONTWAIT )) > 0)
  522. {
  523. if(rxLen == (receiveBuffer.Header.len + PACKET_HEADER_LENGTH))
  524. {
  525. ShowSocketData(&receiveBuffer);
  526. if(receiveBuffer.Header.len == 2)
  527. {
  528. if(receiveBuffer.Payload.reg == _Reg_Plug_In_Status && receiveBuffer.Payload.data[0] == _R_OK)
  529. {
  530. PRINTF_FUNC("Write Plug In Status OK");
  531. result = PASS;
  532. }
  533. }
  534. }
  535. }
  536. timeout += SOCKET_RECEIVE_INTERVAL;
  537. usleep((SOCKET_RECEIVE_INTERVAL * 1000));
  538. if(timeout >= CHARGING_CAPABILITY_RESEND)
  539. {
  540. //timeout
  541. break;
  542. }
  543. }
  544. return result;
  545. }
  546. int DispenserWriteConnectorState(int socket, unsigned char connector, unsigned char se)
  547. {
  548. int rxLen = 0, timeout = 0;
  549. struct PACKET_STRUCTURE receiveBuffer;
  550. int result = FAIL;
  551. sendCmdWriteConnectorState(socket, connector, se);
  552. while(1)
  553. {
  554. if((rxLen = recv(socket, &receiveBuffer, sizeof(Packet_Structure), MSG_DONTWAIT )) > 0)
  555. {
  556. if(rxLen == (receiveBuffer.Header.len + PACKET_HEADER_LENGTH))
  557. {
  558. ShowSocketData(&receiveBuffer);
  559. if(receiveBuffer.Header.len == 2)
  560. {
  561. if(receiveBuffer.Payload.reg == _Reg_Connector_State && receiveBuffer.Payload.data[0] == _R_OK)
  562. {
  563. PRINTF_FUNC("Write Connector State OK");
  564. result = PASS;
  565. }
  566. }
  567. }
  568. }
  569. timeout += SOCKET_RECEIVE_INTERVAL;
  570. usleep((SOCKET_RECEIVE_INTERVAL * 1000));
  571. if(timeout >= CHARGING_CAPABILITY_RESEND)
  572. {
  573. //timeout
  574. break;
  575. }
  576. }
  577. return result;
  578. }
  579. int DispenserWriteUserID(int socket, unsigned char connector, unsigned char se)
  580. {
  581. int rxLen = 0, timeout = 0;
  582. struct PACKET_STRUCTURE receiveBuffer;
  583. int result = FAIL;
  584. sendCmdWriteUserID(socket, connector, se);
  585. while(1)
  586. {
  587. if((rxLen = recv(socket, &receiveBuffer, sizeof(Packet_Structure), MSG_DONTWAIT )) > 0)
  588. {
  589. if(rxLen == (receiveBuffer.Header.len + PACKET_HEADER_LENGTH))
  590. {
  591. ShowSocketData(&receiveBuffer);
  592. if(receiveBuffer.Header.len == 2)
  593. {
  594. if(receiveBuffer.Payload.reg == _Reg_User_ID && receiveBuffer.Payload.data[0] == _R_OK)
  595. {
  596. PRINTF_FUNC("Write User ID OK");
  597. result = PASS;
  598. }
  599. }
  600. }
  601. }
  602. timeout += SOCKET_RECEIVE_INTERVAL;
  603. usleep((SOCKET_RECEIVE_INTERVAL * 1000));
  604. if(timeout >= CHARGING_CAPABILITY_RESEND)
  605. {
  606. //timeout
  607. break;
  608. }
  609. }
  610. return result;
  611. }
  612. int DispenserReadChargingPermission(int socket, unsigned char connector, unsigned char se)
  613. {
  614. int rxLen = 0, timeout = 0;
  615. struct PACKET_STRUCTURE receiveBuffer;
  616. int result = FAIL;
  617. sendCmdReadChargingPermission(socket, connector, se);
  618. while(1)
  619. {
  620. if((rxLen = recv(socket, &receiveBuffer, sizeof(Packet_Structure), MSG_DONTWAIT )) > 0)
  621. {
  622. if(rxLen == (receiveBuffer.Header.len + PACKET_HEADER_LENGTH))
  623. {
  624. ShowSocketData(&receiveBuffer);
  625. if(receiveBuffer.Header.len == 3)
  626. {
  627. if(receiveBuffer.Payload.reg == _Reg_Charging_Permission && receiveBuffer.Payload.data[0] == _R_OK)
  628. {
  629. PRINTF_FUNC("Charging Permission: %s", receiveBuffer.Payload.data[1] == _PS_Permitted ? "Permitted" : "Not Permitted");
  630. result = PASS;
  631. }
  632. }
  633. }
  634. }
  635. timeout += SOCKET_RECEIVE_INTERVAL;
  636. usleep((SOCKET_RECEIVE_INTERVAL * 1000));
  637. if(timeout >= CHARGING_CAPABILITY_RESEND)
  638. {
  639. //timeout
  640. break;
  641. }
  642. }
  643. return result;
  644. }
  645. void tcpSocketClientStart(void)
  646. {
  647. struct sockaddr_in info;
  648. struct timeval tv;
  649. uint8_t socketEnable;
  650. int sockfd = 0;
  651. unsigned char clientStatus = 0;
  652. unsigned char se = 0;
  653. //start dhcp client
  654. //udhcpc -i eth1 --script /root/dhcp_script/eth1.script
  655. //udhcpc -i eth1 -s /root/dhcp_script/eth1.script &
  656. //udhcpc -i eth0 -x hostname CSU3_DSYE601J0EW2PH-SERIALFORRD -s /root/dhcp_script/eth0.script
  657. for(;;)
  658. {
  659. bzero(&info,sizeof(info));
  660. info.sin_family = PF_INET;
  661. info.sin_addr.s_addr = inet_addr(SOCKET_SERVER_IP);
  662. info.sin_port = htons(TCP_LISTEN_PORT);
  663. sockfd = socket(AF_INET, SOCK_STREAM, 0);
  664. if (sockfd == -1)
  665. {
  666. PRINTF_FUNC("Fail to create a socket.");
  667. return;
  668. }
  669. PRINTF_FUNC("TCP Client Start");
  670. if(connect(sockfd, (struct sockaddr *)&info, sizeof(info)) == -1)
  671. {
  672. PRINTF_FUNC("Connection error");
  673. }
  674. else
  675. {
  676. PRINTF_FUNC("Connect to %s success", inet_ntoa(info.sin_addr));
  677. tv.tv_sec = 0;
  678. tv.tv_usec = 500000;
  679. setsockopt(sockfd, SOL_SOCKET, SO_RCVTIMEO, (const char*)&tv, sizeof tv);
  680. socketEnable = ON;
  681. }
  682. while(socketEnable)
  683. {
  684. switch(clientStatus)
  685. {
  686. case 0:
  687. //5.1 Dispenser model name
  688. if(DispenserModelNameCheckIn(sockfd, se++) == PASS)
  689. {
  690. clientStatus = 1;
  691. }
  692. break;
  693. case 1:
  694. if(DispenserConnectorRequest(sockfd, se++) == PASS)
  695. {
  696. clientStatus = 2;
  697. }
  698. break;
  699. case 2:
  700. if(DispenserReadPowerCabinetStatus(sockfd, 0x01, se++) == PASS)
  701. {
  702. if(DispenserWriteStatusCode(sockfd, 0x01, se++) == PASS)
  703. {
  704. clientStatus = 3;
  705. }
  706. }
  707. break;
  708. case 3:
  709. if(DispenserWriteUserID(sockfd, 0x01, se++) == PASS)
  710. {
  711. clientStatus = 4;
  712. }
  713. break;
  714. case 4:
  715. if(DispenserReadChargingCapability(sockfd, 0x01, se++) == PASS)
  716. {
  717. }
  718. if(DispenserWriteChargingTarget(sockfd, 0x01, se++) == PASS)
  719. {
  720. }
  721. if(DispenserWritePlugInStatus(sockfd, 0x01, se++) == PASS)
  722. {
  723. }
  724. if(DispenserWriteConnectorState(sockfd, 0x01, se++) == PASS)
  725. {
  726. }
  727. if(DispenserReadChargingPermission(sockfd, 0x01, se++) == PASS)
  728. {
  729. }
  730. break;
  731. default:
  732. break;
  733. }
  734. }
  735. close(sockfd);
  736. sleep(5);
  737. return;
  738. }
  739. }
  740. //--------------------------------------------Socket Client End--------------------------------------------
  741. BOOL IsAvalibleGunType(char name, unsigned char *type)
  742. {
  743. char modelList[6] = {'J', 'U', 'E', 'G', 'V', 'F'};
  744. unsigned char typeList[6] = {0, 1, 1, 2, 1, 1}; // 0 : Chademo, 1: CCS, 2: GB
  745. for(int i = 0; i < 6; i++)
  746. {
  747. if(name == modelList[i])
  748. {
  749. *type = typeList[i];
  750. return true;
  751. }
  752. }
  753. return false;
  754. }
  755. unsigned char ConnectorQuantityTypeParsing(unsigned char *modelName, unsigned char *type)
  756. {
  757. unsigned char quantity = 0;
  758. for(int i = 0; i < 3; i++)
  759. {
  760. if(IsAvalibleGunType(modelName[7 + i], type))
  761. {
  762. if(quantity < 2)
  763. {
  764. quantity++;
  765. }
  766. else
  767. {
  768. quantity = 0;
  769. break;
  770. }
  771. }
  772. }
  773. return quantity;
  774. }
  775. void ModelNameResponse(int socket, struct PACKET_STRUCTURE *packet, unsigned char result)
  776. {
  777. struct PACKET_STRUCTURE sendBuffer;
  778. memset(&sendBuffer, 0x00, sizeof(sendBuffer));
  779. sendBuffer.Header.se = packet->Header.se;
  780. sendBuffer.Header.id = 0xFF;
  781. sendBuffer.Header.op = _Header_Response;
  782. sendBuffer.Header.len = 2;
  783. sendBuffer.Payload.reg = _Reg_Dispenser_Model_Name;
  784. sendBuffer.Payload.data[0] = result;
  785. send(socket, &sendBuffer, sendBuffer.Header.len + 4, 0);
  786. }
  787. void ConnectorIDResponse(int socket, struct PACKET_STRUCTURE *packet, unsigned char result, unsigned char dispenserIndex)
  788. {
  789. struct PACKET_STRUCTURE sendBuffer;
  790. memset(&sendBuffer, 0x00, sizeof(sendBuffer));
  791. sendBuffer.Header.se = packet->Header.se;
  792. sendBuffer.Header.id = 0xFF;
  793. sendBuffer.Header.op = _Header_Response;
  794. sendBuffer.Header.len = 4;
  795. sendBuffer.Payload.reg = _Reg_Connector_ID;
  796. sendBuffer.Payload.data[0] = result;
  797. sendBuffer.Payload.data[1] = ShmSysConfigAndInfo->SysInfo.DispenserInfo.Dispenser[dispenserIndex].ConnectorID[0];
  798. sendBuffer.Payload.data[2] = ShmSysConfigAndInfo->SysInfo.DispenserInfo.Dispenser[dispenserIndex].ConnectorID[1];
  799. send(socket, &sendBuffer, sendBuffer.Header.len + 4, 0);
  800. }
  801. void PowerCabinetStatusResponse(int socket, struct PACKET_STRUCTURE *packet)
  802. {
  803. struct PACKET_STRUCTURE sendBuffer;
  804. memset(&sendBuffer, 0x00, sizeof(sendBuffer));
  805. sendBuffer.Header.se = packet->Header.se;
  806. sendBuffer.Header.id = packet->Header.id;
  807. sendBuffer.Header.op = _Header_Response;
  808. sendBuffer.Header.len = 2;
  809. sendBuffer.Payload.reg = _Reg_Power_Cabinet_Status;
  810. sendBuffer.Payload.data[0] = _R_OK;
  811. if(ShmSysConfigAndInfo->SysWarningInfo.WarningCount > 0)
  812. {
  813. sendBuffer.Header.len += (ShmSysConfigAndInfo->SysWarningInfo.WarningCount * 6);
  814. for(int i = 0; i < ShmSysConfigAndInfo->SysWarningInfo.WarningCount; i++)
  815. {
  816. memcpy(&sendBuffer.Payload.data[1 + (i * 6)], &ShmSysConfigAndInfo->SysWarningInfo.WarningCode[i][0], 6);
  817. if(ShmSysConfigAndInfo->SysWarningInfo.WarningCode[i][1] == '1')
  818. {
  819. sendBuffer.Payload.data[1 + (i * 6) + 1] = '4';
  820. }
  821. }
  822. }
  823. send(socket, &sendBuffer, sendBuffer.Header.len + 4, 0);
  824. }
  825. void DispenserStatusResponse(int socket, struct PACKET_STRUCTURE *packet, unsigned char result)
  826. {
  827. struct PACKET_STRUCTURE sendBuffer;
  828. memset(&sendBuffer, 0x00, sizeof(sendBuffer));
  829. sendBuffer.Header.se = packet->Header.se;
  830. sendBuffer.Header.id = packet->Header.id;
  831. sendBuffer.Header.op = _Header_Response;
  832. sendBuffer.Header.len = 2;
  833. sendBuffer.Payload.reg = _Reg_Dispenser_Status;
  834. sendBuffer.Payload.data[0] = result;
  835. send(socket, &sendBuffer, sendBuffer.Header.len + 4, 0);
  836. }
  837. void ChargingCapabilityResponse(int socket, struct PACKET_STRUCTURE *packet)
  838. {
  839. struct PACKET_STRUCTURE sendBuffer;
  840. unsigned short voltage = 0, current = 0, power = 0;
  841. memset(&sendBuffer, 0x00, sizeof(sendBuffer));
  842. voltage = ShmSysConfigAndInfo->SysInfo.ConnectorInfo[packet->Header.id - 1].GeneralChargingData.MaximumChargingVoltage;
  843. current = ShmSysConfigAndInfo->SysInfo.ConnectorInfo[packet->Header.id - 1].GeneralChargingData.AvailableChargingCurrent;
  844. power = ShmSysConfigAndInfo->SysInfo.ConnectorInfo[packet->Header.id - 1].GeneralChargingData.AvailableChargingPower;
  845. PRINTF_FUNC("Connector %d Capability Voltage: %d, Current: %d, Power: %d", packet->Header.id, (int)(voltage), (int)(current), (int)(power));
  846. sendBuffer.Header.se = packet->Header.se;
  847. sendBuffer.Header.id = packet->Header.id;
  848. sendBuffer.Header.op = _Header_Response;
  849. sendBuffer.Header.len = 8;
  850. sendBuffer.Payload.reg = _Reg_Charging_Capability;
  851. sendBuffer.Payload.data[0] = _R_OK;
  852. sendBuffer.Payload.data[1] = ((voltage >> 8) & 0xFF);
  853. sendBuffer.Payload.data[2] = (voltage & 0xFF);
  854. sendBuffer.Payload.data[3] = ((current >> 8) & 0xFF);
  855. sendBuffer.Payload.data[4] = (current & 0xFF);
  856. sendBuffer.Payload.data[5] = ((power >> 8) & 0xFF);
  857. sendBuffer.Payload.data[6] = (power & 0xFF);
  858. send(socket, &sendBuffer, sendBuffer.Header.len + 4, 0);
  859. }
  860. void ChargingTargetResponse(int socket, struct PACKET_STRUCTURE *packet, unsigned char result)
  861. {
  862. struct PACKET_STRUCTURE sendBuffer;
  863. memset(&sendBuffer, 0x00, sizeof(sendBuffer));
  864. sendBuffer.Header.se = packet->Header.se;
  865. sendBuffer.Header.id = packet->Header.id;
  866. sendBuffer.Header.op = _Header_Response;
  867. sendBuffer.Header.len = 2;
  868. sendBuffer.Payload.reg = _Reg_Charging_Target;
  869. sendBuffer.Payload.data[0] = result;
  870. send(socket, &sendBuffer, sendBuffer.Header.len + 4, 0);
  871. }
  872. void PlugInStatusResponse(int socket, struct PACKET_STRUCTURE *packet, unsigned char result)
  873. {
  874. struct PACKET_STRUCTURE sendBuffer;
  875. memset(&sendBuffer, 0x00, sizeof(sendBuffer));
  876. sendBuffer.Header.se = packet->Header.se;
  877. sendBuffer.Header.id = packet->Header.id;
  878. sendBuffer.Header.op = _Header_Response;
  879. sendBuffer.Header.len = 2;
  880. sendBuffer.Payload.reg = _Reg_Plug_In_Status;
  881. sendBuffer.Payload.data[0] = result;
  882. send(socket, &sendBuffer, sendBuffer.Header.len + 4, 0);
  883. }
  884. void ConnectorStateResponse(int socket, struct PACKET_STRUCTURE *packet, unsigned char result)
  885. {
  886. struct PACKET_STRUCTURE sendBuffer;
  887. memset(&sendBuffer, 0x00, sizeof(sendBuffer));
  888. sendBuffer.Header.se = packet->Header.se;
  889. sendBuffer.Header.id = packet->Header.id;
  890. sendBuffer.Header.op = _Header_Response;
  891. sendBuffer.Header.len = 2;
  892. sendBuffer.Payload.reg = _Reg_Connector_State;
  893. sendBuffer.Payload.data[0] = result;
  894. send(socket, &sendBuffer, sendBuffer.Header.len + 4, 0);
  895. }
  896. void UserIDResponse(int socket, struct PACKET_STRUCTURE *packet, unsigned char result)
  897. {
  898. struct PACKET_STRUCTURE sendBuffer;
  899. memset(&sendBuffer, 0x00, sizeof(sendBuffer));
  900. sendBuffer.Header.se = packet->Header.se;
  901. sendBuffer.Header.id = packet->Header.id;
  902. sendBuffer.Header.op = _Header_Response;
  903. sendBuffer.Header.len = 3;
  904. sendBuffer.Payload.reg = _Reg_User_ID;
  905. sendBuffer.Payload.data[0] = result == _DAS_Wait ? _R_NG : _R_OK;
  906. sendBuffer.Payload.data[1] = result == _DAS_Allowed ? _PS_Permitted : _PS_NotPermitted;
  907. send(socket, &sendBuffer, sendBuffer.Header.len + 4, 0);
  908. }
  909. void ChargingPermissionResponse(int socket, struct PACKET_STRUCTURE *packet, unsigned char result)
  910. {
  911. struct PACKET_STRUCTURE sendBuffer;
  912. memset(&sendBuffer, 0x00, sizeof(sendBuffer));
  913. sendBuffer.Header.se = packet->Header.se;
  914. sendBuffer.Header.id = packet->Header.id;
  915. sendBuffer.Header.op = _Header_Response;
  916. sendBuffer.Header.len = 3;
  917. sendBuffer.Payload.reg = _Reg_Charging_Permission;
  918. sendBuffer.Payload.data[0] = result == _DAS_Wait ? _R_NG : _R_OK;
  919. sendBuffer.Payload.data[1] = result == _DAS_Allowed ? _PS_Permitted : _PS_NotPermitted;
  920. send(socket, &sendBuffer, sendBuffer.Header.len + 4, 0);
  921. }
  922. BOOL FindConnectorID(unsigned char dispenserIndex, unsigned char id)
  923. {
  924. BOOL find = false;
  925. for(int i = 0; i < ShmSysConfigAndInfo->SysInfo.DispenserInfo.Dispenser[dispenserIndex].ConnectorQuantity; i++)
  926. {
  927. if(ShmSysConfigAndInfo->SysInfo.DispenserInfo.Dispenser[dispenserIndex].ConnectorID[i] == id)
  928. {
  929. find = true;
  930. break;
  931. }
  932. }
  933. return find;
  934. }
  935. void ConnectorTypeBindingHandler(unsigned char dispenserIndex, unsigned char *type)
  936. {
  937. for(int i = 0; i < ShmSysConfigAndInfo->SysInfo.DispenserInfo.Dispenser[dispenserIndex].ConnectorQuantity; i++)
  938. {
  939. unsigned char gunIndex = ShmSysConfigAndInfo->SysInfo.DispenserInfo.Dispenser[dispenserIndex].ConnectorID[i] - 1;
  940. ShmSysConfigAndInfo->SysInfo.ConnectorInfo[gunIndex].ParentDispensetIndex = dispenserIndex;
  941. ShmSysConfigAndInfo->SysInfo.ConnectorInfo[gunIndex].GeneralChargingData.Type = type[i];
  942. }
  943. }
  944. BOOL IsAvailableDispenserIndexSequence(unsigned char index)
  945. {
  946. if((ShmSysConfigAndInfo->SysInfo.DispenserInfo.CheckInLog.Status & (1 << index)) > 0)
  947. {
  948. // dispenser ever checkin
  949. return true;
  950. }
  951. else
  952. {
  953. for(int i = 0; i < GENERAL_GUN_QUANTITY; i++)
  954. {
  955. if(i == index)
  956. {
  957. return true;
  958. }
  959. if((ShmSysConfigAndInfo->SysInfo.DispenserInfo.CheckInLog.Status & (1 << index)) == 0)
  960. {
  961. // i is not check in yet before index
  962. return false;
  963. }
  964. }
  965. }
  966. return false;
  967. }
  968. void DispenserCheckInInfoUpdate(void)
  969. {
  970. unsigned char dispenser = 0, connector = 0;
  971. BOOL change = false;
  972. for(int i = 0; i < GENERAL_GUN_QUANTITY; i++)
  973. {
  974. if(ShmSysConfigAndInfo->SysInfo.DispenserInfo.Dispenser[i].LocalStatus != _DS_None &&
  975. ShmSysConfigAndInfo->SysInfo.DispenserInfo.Dispenser[i].LocalStatus != _DS_Timeout)
  976. {
  977. dispenser++;
  978. ShmSysConfigAndInfo->SysInfo.DispenserInfo.CheckInLog.Status |= (1 << i);
  979. ShmSysConfigAndInfo->SysInfo.DispenserInfo.ConnectorLog[i] = ShmSysConfigAndInfo->SysInfo.DispenserInfo.Dispenser[i].ConnectorQuantity;
  980. connector += ShmSysConfigAndInfo->SysInfo.DispenserInfo.Dispenser[i].ConnectorQuantity;
  981. }
  982. }
  983. if(ShmSysConfigAndInfo->SysInfo.DispenserInfo.DispenserQuantity != dispenser ||
  984. ShmSysConfigAndInfo->SysInfo.DispenserInfo.TotalConnectorQuantity != connector)
  985. {
  986. change = true;
  987. }
  988. ShmSysConfigAndInfo->SysInfo.DispenserInfo.DispenserQuantity = dispenser;
  989. ShmSysConfigAndInfo->SysInfo.DispenserInfo.TotalConnectorQuantity = connector;
  990. if(change)
  991. {
  992. PRINTF_FUNC("Total Dispenser: %d, Total Connector: %d",
  993. ShmSysConfigAndInfo->SysInfo.DispenserInfo.DispenserQuantity,
  994. ShmSysConfigAndInfo->SysInfo.DispenserInfo.TotalConnectorQuantity);
  995. }
  996. }
  997. void SetConnectorID(unsigned char dispenserIndex, unsigned char quantity)
  998. {
  999. unsigned char currentQuantity = 0;
  1000. ShmSysConfigAndInfo->SysInfo.DispenserInfo.Dispenser[dispenserIndex].ConnectorID[0] = 0x00;
  1001. ShmSysConfigAndInfo->SysInfo.DispenserInfo.Dispenser[dispenserIndex].ConnectorID[1] = 0x00;
  1002. for(int i = 0; i < dispenserIndex; i++)
  1003. {
  1004. currentQuantity += ShmSysConfigAndInfo->SysInfo.DispenserInfo.ConnectorLog[i];
  1005. }
  1006. for(int i = 0; i < quantity; i++)
  1007. {
  1008. currentQuantity++;
  1009. ShmSysConfigAndInfo->SysInfo.DispenserInfo.Dispenser[dispenserIndex].ConnectorID[i] = currentQuantity;
  1010. ShmSysConfigAndInfo->SysInfo.ConnectorInfo[currentQuantity - 1].Enable = true;
  1011. }
  1012. }
  1013. BOOL DispenserIdentificationHandler(struct PACKET_STRUCTURE *packet, unsigned char dispenserIndex, unsigned char *modelName)
  1014. {
  1015. unsigned char quantity = 0;
  1016. unsigned char connectorType[2] = {0, 0};
  1017. quantity = ConnectorQuantityTypeParsing(modelName, connectorType);
  1018. if(quantity > 0)
  1019. {
  1020. if(ShmSysConfigAndInfo->SysInfo.DispenserInfo.Dispenser[dispenserIndex].LocalStatus == _DS_Timeout &&
  1021. quantity != ShmSysConfigAndInfo->SysInfo.DispenserInfo.ConnectorLog[dispenserIndex])
  1022. {
  1023. PRINTF_FUNC("The same dispenser id (%d) but connector quantity not match", dispenserIndex + 1);
  1024. return false;
  1025. }
  1026. if(ShmSysConfigAndInfo->SysInfo.DispenserInfo.Dispenser[dispenserIndex].LocalStatus == _DS_None ||
  1027. ShmSysConfigAndInfo->SysInfo.DispenserInfo.Dispenser[dispenserIndex].LocalStatus == _DS_Timeout)
  1028. {
  1029. ShmSysConfigAndInfo->SysInfo.DispenserInfo.Dispenser[dispenserIndex].LocalStatus = _DS_Identification;
  1030. ShmSysConfigAndInfo->SysInfo.DispenserInfo.Dispenser[dispenserIndex].ConnectorQuantity = quantity;
  1031. ShmSysConfigAndInfo->SysInfo.DispenserInfo.ConnectorLog[dispenserIndex] = quantity;
  1032. SetConnectorID(dispenserIndex, quantity);
  1033. memcpy(ShmSysConfigAndInfo->SysInfo.DispenserInfo.Dispenser[dispenserIndex].ModelName, packet->Payload.data, (packet->Header.len - 2));
  1034. ConnectorTypeBindingHandler(dispenserIndex, connectorType);
  1035. PRINTF_FUNC("Dispenser id %d identified, Connector: %d, ID: %d, %d", dispenserIndex + 1, quantity,
  1036. ShmSysConfigAndInfo->SysInfo.DispenserInfo.Dispenser[dispenserIndex].ConnectorID[0],
  1037. ShmSysConfigAndInfo->SysInfo.DispenserInfo.Dispenser[dispenserIndex].ConnectorID[1]);
  1038. DispenserCheckInInfoUpdate();
  1039. return true;
  1040. }
  1041. else
  1042. {
  1043. PRINTF_FUNC("Conflict dispenser ID: %d", dispenserIndex + 1);
  1044. }
  1045. }
  1046. else
  1047. {
  1048. PRINTF_FUNC("Connector quantity fail, model name: %s", modelName);
  1049. }
  1050. return false;
  1051. }
  1052. BOOL DispenserStatusCodeHandler(struct PACKET_STRUCTURE *packet, unsigned char dispenserIndex)
  1053. {
  1054. BOOL find = FindConnectorID(dispenserIndex, packet->Header.id);
  1055. if(find)
  1056. {
  1057. ShmSysConfigAndInfo->SysInfo.ConnectorInfo[packet->Header.id - 1].WarningInfo.WarningCount = (packet->Header.len - 1) / 6;
  1058. if(ShmSysConfigAndInfo->SysInfo.ConnectorInfo[packet->Header.id - 1].WarningInfo.WarningCount > 10)
  1059. {
  1060. ShmSysConfigAndInfo->SysInfo.ConnectorInfo[packet->Header.id - 1].WarningInfo.WarningCount = 10;
  1061. }
  1062. for(int i = 0; i < ShmSysConfigAndInfo->SysInfo.ConnectorInfo[packet->Header.id - 1].WarningInfo.WarningCount; i++)
  1063. {
  1064. memcpy(&ShmSysConfigAndInfo->SysInfo.ConnectorInfo[packet->Header.id - 1].WarningInfo.WarningCode[i][0],
  1065. &packet->Payload.data[i * 6], 6);
  1066. }
  1067. PRINTF_FUNC("Dispenser %d, Status Code Len: %d", packet->Header.id, ShmSysConfigAndInfo->SysInfo.ConnectorInfo[packet->Header.id - 1].WarningInfo.WarningCount);
  1068. }
  1069. else
  1070. {
  1071. }
  1072. return find;
  1073. }
  1074. BOOL ConnectorChargingCapabilityHandler(struct PACKET_STRUCTURE *packet, unsigned char dispenserIndex)
  1075. {
  1076. BOOL find = FindConnectorID(dispenserIndex, packet->Header.id);
  1077. BOOL done = false;
  1078. if(find)
  1079. {
  1080. done = true;
  1081. }
  1082. return done;
  1083. }
  1084. unsigned long GetTimeoutValue(struct timeval _sour_time)
  1085. {
  1086. struct timeval _end_time;
  1087. gettimeofday(&_end_time, NULL);
  1088. return 1000000 * (_end_time.tv_sec - _sour_time.tv_sec) + _end_time.tv_usec - _sour_time.tv_usec;
  1089. }
  1090. struct timeval _ConnectorCapabilityTime[CONNECTOR_QUANTITY];
  1091. BOOL ConnectorChargingTargetHandler(struct PACKET_STRUCTURE *packet, unsigned char dispenserIndex)
  1092. {
  1093. BOOL find = FindConnectorID(dispenserIndex, packet->Header.id);
  1094. BOOL done = false;
  1095. float voltage = 0, current = 0;
  1096. if(find)
  1097. {
  1098. voltage = (float)((packet->Payload.data[0] << 8) + packet->Payload.data[1]) / 10;
  1099. current = (float)((packet->Payload.data[2] << 8) + packet->Payload.data[3]) / 10;
  1100. // if(GetTimeoutValue(_ConnectorCapabilityTime[packet->Header.id - 1]) / 1000 >= 2000)
  1101. // {
  1102. // gettimeofday(&_ConnectorCapabilityTime[packet->Header.id - 1], NULL);
  1103. // ShowSocketData(packet);
  1104. // }
  1105. if(ShmSysConfigAndInfo->SysInfo.ConnectorInfo[packet->Header.id - 1].GeneralChargingData.SystemStatus == S_CHARGING)
  1106. {
  1107. if(ShmSysConfigAndInfo->SysInfo.ConnectorInfo[packet->Header.id - 1].GeneralChargingData.EvBatterytargetVoltage != voltage ||
  1108. ShmSysConfigAndInfo->SysInfo.ConnectorInfo[packet->Header.id - 1].GeneralChargingData.EvBatterytargetCurrent != current)
  1109. {
  1110. PRINTF_FUNC("Connector %d Target Voltage: %d, Current: %d", packet->Header.id, (int)(voltage * 10), (int)(current * 10));
  1111. }
  1112. ShmSysConfigAndInfo->SysInfo.ConnectorInfo[packet->Header.id - 1].GeneralChargingData.EvBatterytargetVoltage = (float)voltage;
  1113. ShmSysConfigAndInfo->SysInfo.ConnectorInfo[packet->Header.id - 1].GeneralChargingData.EvBatterytargetCurrent = (float)current;
  1114. done = true;
  1115. }
  1116. else
  1117. {
  1118. if(ShmSysConfigAndInfo->SysInfo.ConnectorInfo[packet->Header.id - 1].GeneralChargingData.EvBatterytargetVoltage != 0 ||
  1119. ShmSysConfigAndInfo->SysInfo.ConnectorInfo[packet->Header.id - 1].GeneralChargingData.EvBatterytargetCurrent != 0)
  1120. {
  1121. PRINTF_FUNC("Connector %d Not Charging Status, Set Voltage & Current Fail", packet->Header.id);
  1122. }
  1123. ShmSysConfigAndInfo->SysInfo.ConnectorInfo[packet->Header.id - 1].GeneralChargingData.EvBatterytargetVoltage = 0;
  1124. ShmSysConfigAndInfo->SysInfo.ConnectorInfo[packet->Header.id - 1].GeneralChargingData.EvBatterytargetCurrent = 0;
  1125. }
  1126. }
  1127. else
  1128. {
  1129. }
  1130. return done;
  1131. }
  1132. BOOL ConnectorPlugInHandler(struct PACKET_STRUCTURE *packet, unsigned char dispenserIndex)
  1133. {
  1134. BOOL find = FindConnectorID(dispenserIndex, packet->Header.id);
  1135. if(find)
  1136. {
  1137. if(ShmSysConfigAndInfo->SysInfo.ConnectorInfo[packet->Header.id - 1].GeneralChargingData.ConnectorPlugIn != packet->Payload.data[0])
  1138. {
  1139. PRINTF_FUNC("Connector %d %s", packet->Header.id, packet->Payload.data[0] == _PIS_PluggedIn ? "Pluged In" : "Un Plugged");
  1140. }
  1141. ShmSysConfigAndInfo->SysInfo.ConnectorInfo[packet->Header.id - 1].GeneralChargingData.ConnectorPlugIn = packet->Payload.data[0];
  1142. }
  1143. else
  1144. {
  1145. }
  1146. return find;
  1147. }
  1148. BOOL ConnectorStateHandler(struct PACKET_STRUCTURE *packet, unsigned char dispenserIndex)
  1149. {
  1150. BOOL find = FindConnectorID(dispenserIndex, packet->Header.id);
  1151. if(find)
  1152. {
  1153. if(ShmSysConfigAndInfo->SysInfo.ConnectorInfo[packet->Header.id - 1].RemoteStatus != packet->Payload.data[0])
  1154. {
  1155. PRINTF_FUNC("Connector %d Remote Status: %d", packet->Header.id, packet->Payload.data[0]);
  1156. if((packet->Payload.data[0] == _CRS_Idle && ShmSysConfigAndInfo->SysInfo.ConnectorInfo[packet->Header.id - 1].RemoteStatus != _CRS_Terminating) ||
  1157. packet->Payload.data[0] == _CRS_Terminating)
  1158. {
  1159. PRINTF_FUNC("*********** Connector id %d Set Stop Flag ***********\n", packet->Header.id);
  1160. ShmSysConfigAndInfo->SysInfo.ConnectorInfo[packet->Header.id - 1].GeneralChargingData.StopChargeFlag = true;
  1161. }
  1162. }
  1163. ShmSysConfigAndInfo->SysInfo.ConnectorInfo[packet->Header.id - 1].RemoteStatus = packet->Payload.data[0];
  1164. }
  1165. else
  1166. {
  1167. }
  1168. return true;
  1169. }
  1170. unsigned char UserIDHandler(struct PACKET_STRUCTURE *packet, unsigned char dispenserIndex)
  1171. {
  1172. DispenserAck_Status authorize = _DAS_Wait;
  1173. if(ShmSysConfigAndInfo->SysInfo.DispenserInfo.Dispenser[dispenserIndex].AuthorizeStatus == _AuthorizeStatus_Idle)
  1174. {
  1175. if(ShmSysConfigAndInfo->SysInfo.DispenserInfo.Dispenser[dispenserIndex].Setting.bits.AuthorizeRequest)
  1176. {
  1177. ShmSysConfigAndInfo->SysInfo.DispenserInfo.Dispenser[dispenserIndex].Setting.bits.AuthorizeRequest = false;
  1178. }
  1179. memset(ShmSysConfigAndInfo->SysInfo.DispenserInfo.Dispenser[dispenserIndex].UserId, 0x00, 32);
  1180. memcpy(ShmSysConfigAndInfo->SysInfo.DispenserInfo.Dispenser[dispenserIndex].UserId, packet->Payload.data, packet->Header.len - 1);
  1181. PRINTF_FUNC("Dispenser id %d user id %s need authorize", dispenserIndex + 1, ShmSysConfigAndInfo->SysInfo.DispenserInfo.Dispenser[dispenserIndex].UserId);
  1182. ShmSysConfigAndInfo->SysInfo.DispenserInfo.Dispenser[dispenserIndex].Setting.bits.AuthorizeRequest = true;
  1183. authorize = _DAS_Wait;
  1184. }
  1185. else if(ShmSysConfigAndInfo->SysInfo.DispenserInfo.Dispenser[dispenserIndex].AuthorizeStatus == _AuthorizeStatus_Fail)
  1186. {
  1187. PRINTF_FUNC("Dispenser id %d user id %s authorizing fail", dispenserIndex + 1, ShmSysConfigAndInfo->SysInfo.DispenserInfo.Dispenser[dispenserIndex].UserId);
  1188. authorize = _DAS_NotAllowed;
  1189. }
  1190. else if(ShmSysConfigAndInfo->SysInfo.DispenserInfo.Dispenser[dispenserIndex].AuthorizeStatus == _AuthorizeStatus_Pass)
  1191. {
  1192. PRINTF_FUNC("Dispenser id %d user id %s authorizing ok", dispenserIndex + 1, ShmSysConfigAndInfo->SysInfo.DispenserInfo.Dispenser[dispenserIndex].UserId);
  1193. authorize = _DAS_Allowed;
  1194. }
  1195. else
  1196. {
  1197. authorize = _DAS_Wait;
  1198. }
  1199. return authorize;
  1200. }
  1201. unsigned char ChargingPermissionHandler(struct PACKET_STRUCTURE *packet, unsigned char dispenserIndex)
  1202. {
  1203. BOOL find = FindConnectorID(dispenserIndex, packet->Header.id);
  1204. DispenserAck_Status permission = _DAS_Wait;
  1205. if(find)
  1206. {
  1207. switch(ShmSysConfigAndInfo->SysInfo.ConnectorInfo[packet->Header.id - 1].GeneralChargingData.SystemStatus)
  1208. {
  1209. case S_PREPARING_FOR_EV:
  1210. if(ShmSysConfigAndInfo->SysInfo.ConnectorInfo[packet->Header.id - 1].RemoteStatus >= _CRS_Preparing &&
  1211. ShmSysConfigAndInfo->SysInfo.ConnectorInfo[packet->Header.id - 1].RemoteStatus <= _CRS_Charging)
  1212. {
  1213. if(!ShmSysConfigAndInfo->SysInfo.ConnectorInfo[packet->Header.id - 1].Parameter.bits.PermissionRequest)
  1214. {
  1215. ShmSysConfigAndInfo->SysInfo.ConnectorInfo[packet->Header.id - 1].Parameter.bits.PermissionRequest = true;
  1216. PRINTF_FUNC("Allow dispenser index %d connector id %d start to charge", dispenserIndex, packet->Header.id);
  1217. }
  1218. permission = _DAS_Allowed;
  1219. }
  1220. else if(ShmSysConfigAndInfo->SysInfo.ConnectorInfo[packet->Header.id - 1].RemoteStatus == _CRS_Terminating)
  1221. {
  1222. permission = _DAS_NotAllowed;
  1223. PRINTF_FUNC("Allow dispenser index %d connector id %d start to charge", dispenserIndex, packet->Header.id);
  1224. }
  1225. else
  1226. {
  1227. // keep wait
  1228. }
  1229. break;
  1230. case S_CHARGING:
  1231. if(ShmSysConfigAndInfo->SysInfo.ConnectorInfo[packet->Header.id - 1].RemoteStatus == _CRS_Preparing ||
  1232. ShmSysConfigAndInfo->SysInfo.ConnectorInfo[packet->Header.id - 1].RemoteStatus == _CRS_Charging)
  1233. {
  1234. permission = _DAS_Allowed;
  1235. }
  1236. else
  1237. {
  1238. permission = _DAS_NotAllowed;
  1239. PRINTF_FUNC("Dispenser index %d connector id %d remote status not in charging mode", dispenserIndex, packet->Header.id);
  1240. }
  1241. break;
  1242. default:
  1243. break;
  1244. }
  1245. }
  1246. else
  1247. {
  1248. PRINTF_FUNC("Dispenser index %d Connector id %d not found", dispenserIndex, packet->Header.id);
  1249. permission = _DAS_NotAllowed;
  1250. }
  1251. // PRINTF_FUNC("Dispenser %d Permission %s, Gun Status: %d, Connector Status: %d, Wait Plug: %d, PlugIn: %d, Available: %d, Order: %d", dispenserIndex, permission == true ? "OK" : "NG",
  1252. // ShmSysConfigAndInfo->SysInfo.ConnectorInfo[packet->Header.id - 1].GeneralChargingData.SystemStatus,
  1253. // ShmSysConfigAndInfo->SysInfo.ConnectorInfo[packet->Header.id - 1].RemoteStatus,
  1254. // ShmSysConfigAndInfo->SysInfo.WaitForPlugit,
  1255. // ShmSysConfigAndInfo->SysInfo.ConnectorInfo[packet->Header.id - 1].GeneralChargingData.ConnectorPlugIn,
  1256. // ShmSysConfigAndInfo->SysInfo.ConnectorInfo[packet->Header.id - 1].GeneralChargingData.IsAvailable,
  1257. // ShmSysConfigAndInfo->SysInfo.OrderCharging);
  1258. return permission;
  1259. }
  1260. void DisableConnector(unsigned char dispenserIndex)
  1261. {
  1262. for(int i = 0; i < ShmSysConfigAndInfo->SysInfo.DispenserInfo.Dispenser[dispenserIndex].ConnectorQuantity; i++)
  1263. {
  1264. unsigned char connector = ShmSysConfigAndInfo->SysInfo.DispenserInfo.Dispenser[dispenserIndex].ConnectorID[i] - 1;
  1265. ShmSysConfigAndInfo->SysInfo.ConnectorInfo[connector].Enable = false;
  1266. }
  1267. }
  1268. void DispenserSocketProcess(int socketFd, struct sockaddr_in clientInfo, unsigned char index)
  1269. {
  1270. int rxLen = 0, timeout = 0;
  1271. unsigned char dispenserID = 0, dispenserIndex = 0;
  1272. struct PACKET_STRUCTURE receiveBuffer;
  1273. unsigned char modelName[64];
  1274. unsigned char ackResult = _R_NG;
  1275. DispenserAck_Status ack = _DAS_Wait;
  1276. PRINTF_FUNC("IP %s connection(%d) is established, start dispenser process", (inet_ntoa(clientInfo.sin_addr)), index);
  1277. for(int i = 0; i < CONNECTOR_QUANTITY; i++)
  1278. {
  1279. memset(&_ConnectorCapabilityTime[i], 0x00, sizeof(struct timeval));
  1280. }
  1281. while(1)
  1282. {
  1283. if((rxLen = recv(socketFd, &receiveBuffer, sizeof(Packet_Structure), MSG_DONTWAIT )) > 0)
  1284. {
  1285. if(rxLen == (receiveBuffer.Header.len + PACKET_HEADER_LENGTH))
  1286. {
  1287. ackResult = _R_NG;
  1288. //ShowSocketData(&receiveBuffer);
  1289. if(ShmSysConfigAndInfo->SysInfo.DispenserInfo.ConnectionInfo[index].Status == _CNS_WaitModelName)
  1290. {
  1291. // Reg: 0x01, Dispenser model name
  1292. if(receiveBuffer.Header.op == _Header_Write && receiveBuffer.Payload.reg == _Reg_Dispenser_Model_Name)
  1293. {
  1294. memset(modelName, 0x00, 64);
  1295. dispenserID = receiveBuffer.Payload.data[receiveBuffer.Header.len - 2];
  1296. if(dispenserID > 0 && dispenserID <= GENERAL_GUN_QUANTITY)
  1297. {
  1298. dispenserIndex = dispenserID - 1;
  1299. memcpy(modelName, receiveBuffer.Payload.data, receiveBuffer.Header.len - 2);
  1300. if(IsAvailableDispenserIndexSequence(dispenserIndex))
  1301. {
  1302. if(DispenserIdentificationHandler(&receiveBuffer, dispenserIndex, modelName) == true)
  1303. {
  1304. ShmSysConfigAndInfo->SysInfo.DispenserInfo.ConnectionInfo[index].DispenserIndex = dispenserIndex;
  1305. ShmSysConfigAndInfo->SysInfo.DispenserInfo.ConnectionInfo[index].Status = _CNS_DispenserMatched;
  1306. PRINTF_FUNC("Dispenser id %d check in, model name: %s", dispenserID, modelName);
  1307. ackResult = _R_OK;
  1308. }
  1309. else
  1310. {
  1311. // response NG: gun quantity fail
  1312. PRINTF_FUNC("Dispenser ID %d Identification Fail", dispenserID);
  1313. }
  1314. }
  1315. else
  1316. {
  1317. // response NG: dispenser Index fail
  1318. PRINTF_FUNC("Dispenser ID %d Fail, Need Wait Another Dispenser", dispenserID);
  1319. }
  1320. }
  1321. else
  1322. {
  1323. PRINTF_FUNC("Dispenser ID: %d Over Range", dispenserID);
  1324. }
  1325. ModelNameResponse(socketFd, &receiveBuffer, ackResult);
  1326. }
  1327. else
  1328. {
  1329. // do nothing
  1330. }
  1331. }
  1332. else if(ShmSysConfigAndInfo->SysInfo.DispenserInfo.ConnectionInfo[index].Status == _CNS_DispenserMatched)
  1333. {
  1334. // Reg: 0x01, Dispenser model name
  1335. if(receiveBuffer.Header.op == _Header_Write && receiveBuffer.Payload.reg == _Reg_Dispenser_Model_Name)
  1336. {
  1337. ackResult = _R_OK;
  1338. ModelNameResponse(socketFd, &receiveBuffer, ackResult);
  1339. }
  1340. // Reg: 0x02, Connector ID
  1341. if(receiveBuffer.Header.op == _Header_Read && receiveBuffer.Payload.reg == _Reg_Connector_ID)
  1342. {
  1343. if(ShmSysConfigAndInfo->SysInfo.DispenserInfo.Dispenser[dispenserIndex].ConnectorQuantity > 0)
  1344. {
  1345. ShmSysConfigAndInfo->SysInfo.DispenserInfo.Dispenser[dispenserIndex].LocalStatus = _DS_Idle;
  1346. ackResult = _R_OK;
  1347. }
  1348. PRINTF_FUNC("Dispenser ID %d Get Connector ID %s", dispenserID, ackResult == _R_OK ? "OK" : "NG");
  1349. ConnectorIDResponse(socketFd, &receiveBuffer, ackResult, dispenserIndex);
  1350. }
  1351. // Reg: 0x03, Power cabinet status
  1352. if(receiveBuffer.Header.op == _Header_Read && receiveBuffer.Payload.reg == _Reg_Power_Cabinet_Status)
  1353. {
  1354. PowerCabinetStatusResponse(socketFd, &receiveBuffer);
  1355. }
  1356. // Reg: 0x04, Dispenser status
  1357. if(receiveBuffer.Header.op == _Header_Write && receiveBuffer.Payload.reg == _Reg_Dispenser_Status)
  1358. {
  1359. if(DispenserStatusCodeHandler(&receiveBuffer, dispenserIndex))
  1360. {
  1361. ackResult = _R_OK;
  1362. }
  1363. DispenserStatusResponse(socketFd, &receiveBuffer, ackResult);
  1364. }
  1365. // Reg: 0x05, Charging capability
  1366. if(receiveBuffer.Header.op == _Header_Read && receiveBuffer.Payload.reg == _Reg_Charging_Capability)
  1367. {
  1368. if(ConnectorChargingCapabilityHandler(&receiveBuffer, dispenserIndex))
  1369. {
  1370. ChargingCapabilityResponse(socketFd, &receiveBuffer);
  1371. }
  1372. }
  1373. // Reg: 0x06, Charging target
  1374. if(receiveBuffer.Header.op == _Header_Write && receiveBuffer.Payload.reg == _Reg_Charging_Target)
  1375. {
  1376. if(receiveBuffer.Header.len == 5)
  1377. {
  1378. if(ConnectorChargingTargetHandler(&receiveBuffer, dispenserIndex))
  1379. {
  1380. ackResult = _R_OK;
  1381. }
  1382. }
  1383. ChargingTargetResponse(socketFd, &receiveBuffer, ackResult);
  1384. }
  1385. // Reg: 0x07, Software update
  1386. // Reg: 0x08, Plug-in status
  1387. if(receiveBuffer.Header.op == _Header_Write && receiveBuffer.Payload.reg == _Reg_Plug_In_Status)
  1388. {
  1389. if(receiveBuffer.Header.len == 2)
  1390. {
  1391. if(ConnectorPlugInHandler(&receiveBuffer, dispenserIndex))
  1392. {
  1393. ackResult = _R_OK;
  1394. }
  1395. }
  1396. PlugInStatusResponse(socketFd, &receiveBuffer, ackResult);
  1397. }
  1398. // Reg: 0x09, Connector state
  1399. if(receiveBuffer.Header.op == _Header_Write && receiveBuffer.Payload.reg == _Reg_Connector_State)
  1400. {
  1401. if(ConnectorStateHandler(&receiveBuffer, dispenserIndex))
  1402. {
  1403. ackResult = _R_OK;
  1404. }
  1405. ConnectorStateResponse(socketFd, &receiveBuffer, ackResult);
  1406. }
  1407. // Reg: 0x0A, User ID
  1408. if(receiveBuffer.Header.op == _Header_Write && receiveBuffer.Payload.reg == _Reg_User_ID)
  1409. {
  1410. ack = UserIDHandler(&receiveBuffer, dispenserIndex);
  1411. UserIDResponse(socketFd, &receiveBuffer, ack);
  1412. }
  1413. // Reg: 0x0B, Charging permission
  1414. if(receiveBuffer.Header.op == _Header_Read && receiveBuffer.Payload.reg == _Reg_Charging_Permission)
  1415. {
  1416. ack = ChargingPermissionHandler(&receiveBuffer, dispenserIndex);
  1417. ChargingPermissionResponse(socketFd, &receiveBuffer, ack);
  1418. }
  1419. }
  1420. // clean timeout
  1421. timeout = 0;
  1422. }
  1423. }
  1424. else
  1425. {
  1426. timeout += SOCKET_RECEIVE_INTERVAL;
  1427. usleep((SOCKET_RECEIVE_INTERVAL * 1000));
  1428. }
  1429. if(timeout >= DISPENSER_SOCKET_TIMEOUT)
  1430. {
  1431. //timeout
  1432. PRINTF_FUNC("IP: %s, Socket %d connection timeout", (inet_ntoa(clientInfo.sin_addr)), index);
  1433. if(ShmSysConfigAndInfo->SysInfo.DispenserInfo.ConnectionInfo[index].Status == _CNS_DispenserMatched)
  1434. {
  1435. DisableConnector(dispenserIndex);
  1436. memset(&ShmSysConfigAndInfo->SysInfo.DispenserInfo.Dispenser[dispenserIndex], 0x00, sizeof(struct DispenserModule));
  1437. ShmSysConfigAndInfo->SysInfo.DispenserInfo.Dispenser[dispenserIndex].LocalStatus = _DS_Timeout;
  1438. DispenserCheckInInfoUpdate();
  1439. }
  1440. break;
  1441. }
  1442. }
  1443. }
  1444. int GetMacAddress(int sockFd, unsigned char *mac)
  1445. {
  1446. struct arpreq arpReq;
  1447. struct sockaddr_in clientInfo;
  1448. socklen_t len = sizeof(struct sockaddr_in);
  1449. memset(mac, 0x00, 6);
  1450. if(getpeername(sockFd, (struct sockaddr*)&clientInfo, &len) < 0)
  1451. {
  1452. return 0;
  1453. }
  1454. else
  1455. {
  1456. memcpy(&arpReq.arp_pa, &clientInfo, sizeof(struct sockaddr_in));
  1457. strcpy(arpReq.arp_dev, "eth1");
  1458. arpReq.arp_pa.sa_family = AF_INET;
  1459. arpReq.arp_ha.sa_family = AF_UNSPEC;
  1460. if(ioctl(sockFd, SIOCGARP, &arpReq) < 0)
  1461. {
  1462. return 0;
  1463. }
  1464. else
  1465. {
  1466. memcpy(mac, arpReq.arp_ha.sa_data, 6);
  1467. }
  1468. }
  1469. return 1;
  1470. }
  1471. int FindFreeChannel(void)
  1472. {
  1473. for(int i = 0; i < MAXIMUM_CONNECT_QUANTITY; i++)
  1474. {
  1475. if(ShmSysConfigAndInfo->SysInfo.DispenserInfo.ConnectionInfo[i].Status == _CNS_FREE)
  1476. {
  1477. return i;
  1478. }
  1479. }
  1480. return FAIL;
  1481. }
  1482. BOOL IsConflictIp(uint32_t ipAddress)
  1483. {
  1484. for(int i = 0; i < MAXIMUM_CONNECT_QUANTITY; i++)
  1485. {
  1486. if(ShmSysConfigAndInfo->SysInfo.DispenserInfo.ConnectionInfo[i].IpAddress == ipAddress)
  1487. {
  1488. return true;
  1489. }
  1490. }
  1491. return false;
  1492. }
  1493. void InitDispenserInfo(void)
  1494. {
  1495. for(int i = 0; i < GENERAL_GUN_QUANTITY; i++)
  1496. {
  1497. memset(&ShmSysConfigAndInfo->SysInfo.ConnectorInfo[i], 0x00, sizeof(struct ConnectorInfoData));
  1498. }
  1499. memset(&ShmSysConfigAndInfo->SysInfo.DispenserInfo, 0x00, sizeof(struct DispenserInfoData));
  1500. }
  1501. void tcpSocketServerStart(void)
  1502. {
  1503. int sockFd = 0;
  1504. int clientSockFd = 0;
  1505. int connectIndex = 0;
  1506. pid_t forkId;
  1507. struct sockaddr_in serverInfo, clientInfo;
  1508. socklen_t addrlen = sizeof(clientInfo);
  1509. //struct timeval timeout = {3, 0};
  1510. sockFd = socket(AF_INET, SOCK_STREAM, 0);
  1511. if(sockFd == -1)
  1512. {
  1513. PRINTF_FUNC("InitSocketServer NG\n");
  1514. sleep(5);
  1515. return;
  1516. }
  1517. InitDispenserInfo();
  1518. bzero(&serverInfo,sizeof(serverInfo));
  1519. serverInfo.sin_family = PF_INET;
  1520. serverInfo.sin_addr.s_addr = htonl(INADDR_ANY);
  1521. serverInfo.sin_port = htons(TCP_LISTEN_PORT);
  1522. bind(sockFd, (struct sockaddr *)&serverInfo, sizeof(serverInfo));
  1523. listen(sockFd, CONNECTION_LIMIT);
  1524. PRINTF_FUNC("TCP Server Start\n");
  1525. signal(SIGCHLD, SIG_IGN);
  1526. // Main loop
  1527. while(1)
  1528. {
  1529. clientSockFd = accept(sockFd, (struct sockaddr*) &clientInfo, &addrlen);
  1530. PRINTF_FUNC("Client ip: %s is accepted at port: %d", inet_ntoa(clientInfo.sin_addr), clientInfo.sin_port);
  1531. connectIndex = FindFreeChannel();
  1532. if(connectIndex >= 0)
  1533. {
  1534. if(IsConflictIp(clientInfo.sin_addr.s_addr) == false)
  1535. {
  1536. ShmSysConfigAndInfo->SysInfo.DispenserInfo.ConnectionInfo[connectIndex].Status = _CNS_WaitModelName;
  1537. ShmSysConfigAndInfo->SysInfo.DispenserInfo.ConnectionInfo[connectIndex].IpAddress = clientInfo.sin_addr.s_addr;
  1538. forkId = fork();
  1539. if(forkId == 0)
  1540. {
  1541. // child process
  1542. DispenserSocketProcess(clientSockFd, clientInfo, connectIndex);
  1543. close(clientSockFd);
  1544. memset(&ShmSysConfigAndInfo->SysInfo.DispenserInfo.ConnectionInfo[connectIndex], 0x00, sizeof(struct ConnectionInfoData));
  1545. return;
  1546. }
  1547. else if(forkId == -1)
  1548. {
  1549. PRINTF_FUNC("fork fail");
  1550. }
  1551. }
  1552. else
  1553. {
  1554. // conflict ip address
  1555. PRINTF_FUNC("Conflict IP address, close socket");
  1556. close(clientSockFd);
  1557. }
  1558. }
  1559. else
  1560. {
  1561. // no free channel
  1562. PRINTF_FUNC("No free channel, close socket");
  1563. close(clientSockFd);
  1564. }
  1565. usleep(10000);
  1566. }
  1567. return;
  1568. }
  1569. int main(void)
  1570. {
  1571. if(InitShareMemory() == FAIL)
  1572. {
  1573. #ifdef SystemLogMessage
  1574. DEBUG_ERROR("InitShareMemory NG\n");
  1575. #endif
  1576. sleep(5);
  1577. return 0;
  1578. }
  1579. // wait for self test completed
  1580. while(ShmSysConfigAndInfo->SysInfo.BootingStatus == BOOTTING);
  1581. tcpSocketServerStart();
  1582. //tcpSocketClientStart();
  1583. return 0;
  1584. }