DoComm.c 37 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372
  1. #include <sys/time.h>
  2. #include <sys/timeb.h>
  3. #include <sys/types.h>
  4. #include <sys/stat.h>
  5. #include <sys/types.h>
  6. #include <sys/ioctl.h>
  7. #include <sys/socket.h>
  8. #include <sys/ipc.h>
  9. #include <sys/shm.h>
  10. #include <sys/shm.h>
  11. #include <sys/mman.h>
  12. #include <linux/can.h>
  13. #include <linux/can/raw.h>
  14. #include <linux/wireless.h>
  15. #include <arpa/inet.h>
  16. #include <netinet/in.h>
  17. #include <signal.h>
  18. #include <unistd.h>
  19. #include <stdarg.h>
  20. #include <stdio.h> /*標準輸入輸出定義*/
  21. #include <stdlib.h> /*標準函數庫定義*/
  22. #include <unistd.h> /*Unix 標準函數定義*/
  23. #include <fcntl.h> /*檔控制定義*/
  24. #include <termios.h> /*PPSIX 終端控制定義*/
  25. #include <errno.h> /*錯誤號定義*/
  26. #include <errno.h>
  27. #include <string.h>
  28. #include <time.h>
  29. #include <ctype.h>
  30. #include <ifaddrs.h>
  31. #include "../../define.h"
  32. #include "Config.h"
  33. //#define Debug
  34. #define DoIPAddress "192.168.100.1"
  35. #define DoTcpPort 36000
  36. #define TriggerMsgeNum 20
  37. int StoreLogMsg(const char *fmt, ...);
  38. #define DEBUG_INFO(format, args...) StoreLogMsg("[%s:%d][%s][Info] "format, __FILE__, __LINE__, __FUNCTION__, ##args)
  39. #define DEBUG_WARN(format, args...) StoreLogMsg("[%s:%d][%s][Warn] "format, __FILE__, __LINE__, __FUNCTION__, ##args)
  40. #define DEBUG_ERROR(format, args...) StoreLogMsg("[%s:%d][%s][Error] "format, __FILE__, __LINE__, __FUNCTION__, ##args)
  41. struct ApplicationPacket
  42. {
  43. unsigned char Se;
  44. unsigned char Id;
  45. unsigned char Op;
  46. unsigned char Len;
  47. unsigned char RegisterNum;
  48. unsigned char Data[250];
  49. };
  50. struct SysConfigAndInfo *ShmSysConfigAndInfo;
  51. struct StatusCodeData *ShmStatusCodeData;
  52. struct PsuData *ShmPsuData;
  53. struct OCPP16Data *ShmOCPP16Data;
  54. struct PrimaryMcuData *ShmPrimaryMcuData;
  55. int TcpSock=0;
  56. unsigned char PacketSe;
  57. struct ChargingInfoData *ChargingData[CHAdeMO_QUANTITY + CCS_QUANTITY + GB_QUANTITY];
  58. struct timeb TriggerTimeUp[2][TriggerMsgeNum];
  59. struct WARNING_CODE_INFO PreSysWarningInfo;
  60. int DisconnectFlag;
  61. int StoreLogMsg(const char *fmt, ...)
  62. {
  63. char Buf[4096+256];
  64. char buffer[4096];
  65. va_list args;
  66. struct timeb SeqEndTime;
  67. struct tm *tm;
  68. va_start(args, fmt);
  69. int rc = vsnprintf(buffer, sizeof(buffer), fmt, args);
  70. va_end(args);
  71. memset(Buf,0,sizeof(Buf));
  72. ftime(&SeqEndTime);
  73. SeqEndTime.time = time(NULL);
  74. tm=localtime(&SeqEndTime.time);
  75. if (ShmSysConfigAndInfo->SysConfig.SwitchDebugFlag == 1)
  76. {
  77. sprintf(Buf,"%02d:%02d:%02d:%03d - %s",
  78. tm->tm_hour,tm->tm_min,tm->tm_sec,SeqEndTime.millitm, buffer);
  79. printf("%s \n", Buf);
  80. }
  81. else
  82. {
  83. sprintf(Buf,"echo \"%04d-%02d-%02d %02d:%02d:%02d:%03d - %s\" >> /Storage/SystemLog/[%04d.%02d]SystemLog",
  84. tm->tm_year+1900,tm->tm_mon+1,tm->tm_mday,tm->tm_hour,tm->tm_min,tm->tm_sec,SeqEndTime.millitm,
  85. buffer,
  86. tm->tm_year+1900,tm->tm_mon+1);
  87. system(Buf);
  88. }
  89. return rc;
  90. }
  91. int DiffTimeb(struct timeb ST, struct timeb ET)
  92. {
  93. //return milli-second
  94. unsigned int StartTime,StopTime;
  95. StartTime=(unsigned int)ST.time;
  96. StopTime=(unsigned int)ET.time;
  97. return (StopTime-StartTime)*1000+ET.millitm-ST.millitm;
  98. }
  99. int InitShareMemory()
  100. {
  101. int result = 1;
  102. int MeterSMId;
  103. if ((MeterSMId = shmget(ShmSysConfigAndInfoKey, sizeof(struct SysConfigAndInfo), 0777)) < 0)
  104. {
  105. DEBUG_ERROR("shmget ShmSysConfigAndInfo NG\n");
  106. result = 0;
  107. }
  108. else if ((ShmSysConfigAndInfo = shmat(MeterSMId, NULL, 0)) == (void *) -1)
  109. {
  110. DEBUG_ERROR("[shmat ShmSysConfigAndInfo NG\n");
  111. result = 0;
  112. }
  113. if ((MeterSMId = shmget(ShmStatusCodeKey, sizeof(struct StatusCodeData), 0777)) < 0)
  114. {
  115. DEBUG_ERROR("shmget ShmStatusCodeData NG\n");
  116. result = 0;
  117. }
  118. else if ((ShmStatusCodeData = shmat(MeterSMId, NULL, 0)) == (void *) -1)
  119. {
  120. DEBUG_ERROR("shmat ShmStatusCodeData NG\n");
  121. result = 0;
  122. }
  123. //creat ShmPsuData
  124. if ((MeterSMId = shmget(ShmPsuKey, sizeof(struct PsuData), 0777)) < 0)
  125. {
  126. DEBUG_ERROR("shmget ShmPsuData NG \n");
  127. result = 0;
  128. }
  129. else if ((ShmPsuData = shmat(MeterSMId, NULL, 0)) == (void *) -1)
  130. {
  131. DEBUG_ERROR("shmat ShmPsuData NG \n");
  132. result = 0;
  133. }
  134. //creat ShmOCPP16Data
  135. if ((MeterSMId = shmget(ShmOcppModuleKey, sizeof(struct OCPP16Data), 0777)) < 0)
  136. {
  137. DEBUG_ERROR("shmget ShmOCPP16Data NG \n");
  138. result = 0;
  139. }
  140. else if ((ShmOCPP16Data = shmat(MeterSMId, NULL, 0)) == (void *) -1)
  141. {
  142. DEBUG_ERROR("shmat ShmOCPP16Data NG \n");
  143. result = 0;
  144. }
  145. if ((MeterSMId = shmget(ShmPrimaryMcuKey, sizeof(struct PrimaryMcuData), 0777)) < 0)
  146. {
  147. DEBUG_ERROR("shmget ShmPrimaryMcuData NG\n");
  148. result = 0;
  149. }
  150. else if ((ShmPrimaryMcuData = shmat(MeterSMId, NULL, 0)) == (void *) -1)
  151. {
  152. DEBUG_ERROR("shmat ShmPrimaryMcuData NG\n");
  153. result = 0;
  154. }
  155. return result;
  156. }
  157. int CheckNetworkStatus()
  158. {
  159. //printf("ShmSysConfigAndInfo->SysConfig.Eth0Interface.EthIpAddress=%s\n",ShmSysConfigAndInfo->SysConfig.Eth0Interface.EthIpAddress);
  160. if(strstr(ShmSysConfigAndInfo->SysConfig.Eth0Interface.EthIpAddress,"192.168.100") != NULL)
  161. return 1;
  162. else
  163. return 0;
  164. }
  165. int TcpConnected()
  166. {
  167. struct sockaddr_in dest;
  168. struct timeval tv;
  169. int flag;
  170. if(TcpSock>0)
  171. close(TcpSock);
  172. if ((TcpSock = socket(AF_INET, SOCK_STREAM, 0)) < 0)
  173. {
  174. DEBUG_ERROR("Open TCP socket NG");
  175. return -1;
  176. }
  177. /* flag=fcntl (TcpSock, F_GETFL, 0);
  178. if(flag>=0)
  179. {
  180. flag |= O_NONBLOCK;
  181. fcntl(TcpSock,F_SETFL, flag );
  182. }*/
  183. tv.tv_sec = 0;
  184. tv.tv_usec = 100000;
  185. setsockopt(TcpSock, SOL_SOCKET, SO_RCVTIMEO, &tv, sizeof(struct timeval));
  186. setsockopt(TcpSock, SOL_SOCKET, SO_SNDTIMEO, &tv, sizeof(struct timeval));
  187. flag = 1;
  188. setsockopt(TcpSock, SOL_SOCKET, MSG_NOSIGNAL, &flag, sizeof(flag));
  189. memset(&dest, 0, sizeof(dest));
  190. dest.sin_family = AF_INET;
  191. dest.sin_port = htons(DoTcpPort);
  192. inet_aton(DoIPAddress, (struct in_addr *) &dest.sin_addr.s_addr);
  193. if (connect(TcpSock, (struct sockaddr *) &dest, sizeof(dest)) != 0)
  194. {
  195. close(TcpSock);
  196. return -1;
  197. }
  198. return TcpSock;
  199. }
  200. void AddFaultCodeToBuf(unsigned char *Code)
  201. {
  202. if(ShmSysConfigAndInfo->SysWarningInfo.WarningCount < 10)
  203. {
  204. memcpy(&ShmSysConfigAndInfo->SysWarningInfo.WarningCode[ShmSysConfigAndInfo->SysWarningInfo.WarningCount][0], Code, strlen(Code));
  205. ShmSysConfigAndInfo->SysWarningInfo.WarningCount++;
  206. }
  207. }
  208. void RemoveFaultCodeToBuf(unsigned char *Code)
  209. {
  210. unsigned char find = 0x01;
  211. char _code[7];
  212. sprintf(_code,"%s", Code);
  213. // 把相關的錯誤碼一次移除,避免重複顯示
  214. while(find)
  215. {
  216. find = 0x00;
  217. for(unsigned char i = 0; i < ShmSysConfigAndInfo->SysWarningInfo.WarningCount; i++)
  218. {
  219. if (find == 0x00)
  220. {
  221. if(memcmp(&ShmSysConfigAndInfo->SysWarningInfo.WarningCode[i][0], _code, 7) == 0)
  222. {
  223. find = 0x01;
  224. }
  225. }
  226. else
  227. {
  228. memcpy(&ShmSysConfigAndInfo->SysWarningInfo.WarningCode[i - 1][0],
  229. &ShmSysConfigAndInfo->SysWarningInfo.WarningCode[i][0], 7);
  230. }
  231. }
  232. if (find)
  233. {
  234. ShmSysConfigAndInfo->SysWarningInfo.WarningCount--;
  235. }
  236. }
  237. }
  238. int StatusCodeProcessing(unsigned char *StatusCode)
  239. {
  240. unsigned char Rtn=0;
  241. int ByteCount,BitCount;
  242. unsigned char tmp, EventCodeTmp[7];
  243. if(strlen(StatusCode)!=6)
  244. return 0;
  245. memset(EventCodeTmp,0,sizeof(EventCodeTmp));
  246. memcpy(EventCodeTmp,StatusCode,strlen(StatusCode));
  247. if(*(StatusCode+1)==0x34)//alarm from power cabinet itself
  248. {
  249. if(StatusCode[0]==0x30)//trigger
  250. {
  251. for(unsigned char i = 0; i < ShmSysConfigAndInfo->SysWarningInfo.WarningCount; i++)
  252. {
  253. if(memcmp(&ShmSysConfigAndInfo->SysWarningInfo.WarningCode[i][0], EventCodeTmp, 7) == 0)
  254. {
  255. Rtn=1;
  256. break;
  257. }
  258. }
  259. if(Rtn==0)
  260. AddFaultCodeToBuf(EventCodeTmp);
  261. Rtn=1;
  262. }
  263. else if(StatusCode[0]==0x31)//recovery
  264. {
  265. RemoveFaultCodeToBuf(EventCodeTmp);
  266. Rtn=1;
  267. }
  268. }
  269. else
  270. {
  271. switch(*(StatusCode+2))
  272. {
  273. case 0x31://Fault
  274. for(ByteCount=0;ByteCount<(sizeof(FaultStatusCode)/6);ByteCount++)
  275. {
  276. if(memcmp(FaultStatusCode[ByteCount]+1, StatusCode+1, 5) == 0)
  277. {
  278. if(StatusCode[0]==0x30)//trigger
  279. ShmStatusCodeData->FaultCode.FaultEvents.FaultVal[ByteCount/8]|=1<<(ByteCount%8);
  280. else if(StatusCode[0]==0x31)//recovery
  281. ShmStatusCodeData->FaultCode.FaultEvents.FaultVal[ByteCount/8]&=0<<(ByteCount%8);
  282. Rtn=1;
  283. break;
  284. }
  285. }
  286. break;
  287. case 0x32://Alarm
  288. for(ByteCount=0;ByteCount<(sizeof(AlarmStatusCode)/6);ByteCount++)
  289. {
  290. if(memcmp(AlarmStatusCode[ByteCount]+1, StatusCode+1, 5) == 0)
  291. {
  292. if(StatusCode[0]==0x30)//trigger
  293. ShmStatusCodeData->AlarmCode.AlarmEvents.AlarmVal[ByteCount/8]|=1<<(ByteCount%8);
  294. else if(StatusCode[0]==0x31)//recovery
  295. ShmStatusCodeData->AlarmCode.AlarmEvents.AlarmVal[ByteCount/8]&=0<<(ByteCount%8);
  296. Rtn=1;
  297. break;
  298. }
  299. }
  300. break;
  301. case 0x33://Information
  302. for(ByteCount=0;ByteCount<(sizeof(InfoStatusCode)/6);ByteCount++)
  303. {
  304. if(memcmp(InfoStatusCode[ByteCount]+1, StatusCode+1, 5) == 0)
  305. {
  306. if(StatusCode[0]==0x30)//trigger
  307. ShmStatusCodeData->InfoCode.InfoEvents.InfoVal[ByteCount/8]|=1<<(ByteCount%8);
  308. else if(StatusCode[0]==0x31)//recovery
  309. ShmStatusCodeData->InfoCode.InfoEvents.InfoVal[ByteCount/8]&=0<<(ByteCount%8);
  310. Rtn=1;
  311. break;
  312. }
  313. }
  314. break;
  315. default:
  316. break;
  317. }
  318. }
  319. return Rtn;
  320. }
  321. int SendPacket(unsigned char Id, unsigned char Op, unsigned char RegNum, unsigned char DataLen, unsigned char *Data)
  322. {
  323. int Rtn=0, PacketLen,Tmp;
  324. struct ApplicationPacket SendBuffer;
  325. struct timeb ST,ET;
  326. memset(&SendBuffer,0,sizeof(struct ApplicationPacket));
  327. SendBuffer.Se=(PacketSe++);
  328. SendBuffer.Id=Id;
  329. SendBuffer.Op=Op;
  330. SendBuffer.Len=DataLen+1;
  331. SendBuffer.RegisterNum=RegNum;
  332. if(DataLen>0)
  333. memcpy(SendBuffer.Data,Data,DataLen);
  334. PacketLen= SendBuffer.Len+4;
  335. ftime(&ST);
  336. while(Rtn<PacketLen)
  337. {
  338. Tmp=send(TcpSock, &SendBuffer+Rtn, PacketLen-Rtn, MSG_NOSIGNAL);
  339. if(Tmp>0)
  340. Rtn += Tmp;
  341. ftime(&ET);
  342. if(DiffTimeb(ST,ET)>500)
  343. {
  344. DisconnectFlag++;
  345. if(DisconnectFlag>=10)
  346. DisconnectFlag=10;
  347. #ifdef Debug
  348. printf("Send Packet Timeout(%d/%d): SE=%d, ID=%d, OP=%d, Reg=%d",
  349. Rtn,PacketLen,PacketSe,Id,Op,RegNum);
  350. #endif
  351. return 0;
  352. }
  353. }
  354. return Rtn;
  355. }
  356. int RecvPacket(unsigned char *DataLen, struct ApplicationPacket *Packet)
  357. {
  358. int Rtn=0, Tmp;
  359. unsigned char TmpBuf[250];
  360. struct timeb ST,ET;
  361. memset(Packet,0,sizeof(struct ApplicationPacket));
  362. memset(TmpBuf,0,sizeof(TmpBuf));
  363. ftime(&ST);
  364. while(Rtn<5)
  365. {
  366. Tmp=recv(TcpSock, TmpBuf+Rtn, 5-Rtn, 0);
  367. if(Tmp>0)
  368. Rtn+=Tmp;
  369. ftime(&ET);
  370. if(DiffTimeb(ST,ET)>500)
  371. {
  372. DisconnectFlag++;
  373. if(DisconnectFlag>=10)
  374. DisconnectFlag=10;
  375. #ifdef Debug
  376. printf("Recv Packet header Timeout(%d/5)(disconnect count=%d): SE=%d, ID=%d, OP=%d, Len=%d, Reg=%d",
  377. Rtn,DisconnectFlag,TmpBuf[0],TmpBuf[1],TmpBuf[2],TmpBuf[3],TmpBuf[4]);
  378. #endif
  379. return 0;
  380. }
  381. }
  382. if((TmpBuf[0]>255)/*||(TmpBuf[1]>2)*/||(TmpBuf[2]>3)||(TmpBuf[3]>250))
  383. {
  384. DEBUG_INFO("Recv Wrong Packet header (%d/5): SE=%d, ID=%d, OP=%d, Len=%d, Reg=%d",
  385. Rtn,TmpBuf[0],TmpBuf[1],TmpBuf[2],TmpBuf[3],TmpBuf[4]);
  386. return 0;
  387. }
  388. memcpy(Packet,TmpBuf,5);
  389. *DataLen=Packet->Len -1;
  390. memset(TmpBuf,0,sizeof(TmpBuf));
  391. Rtn=0;
  392. ftime(&ST);
  393. while(Rtn<*DataLen)
  394. {
  395. Tmp=recv(TcpSock, TmpBuf+Rtn, *DataLen-Rtn, 0);
  396. if(Tmp>0)
  397. Rtn+=Tmp;
  398. ftime(&ET);
  399. if(DiffTimeb(ST,ET)>500)
  400. {
  401. DEBUG_INFO("Recv Packet Timeout(%d/%d): SE=%d, ID=%d, OP=%d, Reg=%d",
  402. Rtn,*DataLen,Packet->Se,Packet->Id,Packet->Op,Packet->RegisterNum);
  403. return 0;
  404. }
  405. }
  406. memcpy(Packet->Data,TmpBuf,*DataLen);
  407. DisconnectFlag=0;
  408. return Rtn;
  409. }
  410. int WriteModelName()
  411. {
  412. unsigned char Tmp=0;
  413. unsigned char TmpBuf[255];
  414. struct ApplicationPacket PacketData;
  415. memset(TmpBuf,0,sizeof(TmpBuf));
  416. memset(&PacketData,0,sizeof(struct ApplicationPacket));
  417. memcpy(TmpBuf, ShmSysConfigAndInfo->SysConfig.ModelName,strlen(ShmSysConfigAndInfo->SysConfig.ModelName));
  418. Tmp=(unsigned char)(ShmPrimaryMcuData->InputDet.bits.Key2<<2|ShmPrimaryMcuData->InputDet.bits.Key1<<1|ShmPrimaryMcuData->InputDet.bits.Key0);
  419. TmpBuf[strlen(ShmSysConfigAndInfo->SysConfig.ModelName)]=Tmp;//Dispenser switch value
  420. #ifdef Debug
  421. printf("WriteModelName(%s)(%d) => ",ShmSysConfigAndInfo->SysConfig.ModelName,Tmp);
  422. #endif
  423. if(SendPacket(0xFF, 0x02, 0x01,strlen(ShmSysConfigAndInfo->SysConfig.ModelName)+1, TmpBuf)<=0)
  424. {
  425. #ifdef Debug
  426. printf("SendPacket Fail\n");
  427. #endif
  428. return -1;
  429. }
  430. if(RecvPacket(&Tmp, &PacketData)<=0)
  431. {
  432. #ifdef Debug
  433. printf("RecvPacket Fail\n");
  434. #endif
  435. return -1;
  436. }
  437. if(PacketData.Data[0]!=1)//!=OK
  438. {
  439. #ifdef Debug
  440. printf("NG\n");
  441. #endif
  442. return -1;
  443. }
  444. #ifdef Debug
  445. printf("OK\n");
  446. #endif
  447. return 1;
  448. }
  449. int ReadConnectorID()
  450. {
  451. unsigned char Tmp=0;
  452. struct ApplicationPacket PacketData;
  453. memset(&PacketData,0,sizeof(struct ApplicationPacket));
  454. #ifdef Debug
  455. printf("ReadConnectorID => ");
  456. #endif
  457. if(SendPacket(0xFF, 0x01, 0x02,0, PacketData.Data)<=0)
  458. {
  459. #ifdef Debug
  460. printf("SendPacket Fail\n");
  461. #endif
  462. return -1;
  463. }
  464. if(RecvPacket(&Tmp, &PacketData)<=0)
  465. {
  466. #ifdef Debug
  467. printf("RecvPacket Fail\n");
  468. #endif
  469. return -1;
  470. }
  471. if(PacketData.Data[0]!=1)//!=OK
  472. {
  473. #ifdef Debug
  474. printf("NG\n");
  475. #endif
  476. return -1;
  477. }
  478. #ifdef Debug
  479. printf("OK (Left connector ID = %d, Right connector ID = %d)\n", PacketData.Data[1], PacketData.Data[2]);
  480. #endif
  481. return 1;
  482. }
  483. int ReadDoStatus()
  484. {
  485. unsigned char Tmp=0, count,Rtn;
  486. struct ApplicationPacket PacketData;
  487. unsigned char StatusArray[20][6];
  488. unsigned char EventCodeTmp[7];
  489. memset(&PacketData,0,sizeof(struct ApplicationPacket));
  490. memset(StatusArray,0,sizeof(StatusArray));
  491. #ifdef Debug
  492. printf("ReadDoStatus => ");
  493. #endif
  494. if(SendPacket(0x01, 0x01, 0x03,0, PacketData.Data)<=0)
  495. {
  496. #ifdef Debug
  497. printf("SendPacket Fail\n");
  498. #endif
  499. return -1;
  500. }
  501. if(RecvPacket(&Tmp, &PacketData)<=0)
  502. {
  503. #ifdef Debug
  504. printf("RecvPacket Fail\n");
  505. #endif
  506. return -1;
  507. }
  508. if(PacketData.Data[0]!=1)//!=OK
  509. {
  510. #ifdef Debug
  511. printf("NG\n");
  512. #endif
  513. return -1;
  514. }
  515. Tmp--;//decrase OK/NG byte
  516. if(Tmp<6)
  517. {
  518. if(ShmSysConfigAndInfo->SysWarningInfo.WarningCount>0)
  519. {
  520. for(unsigned char i = 0; i < ShmSysConfigAndInfo->SysWarningInfo.WarningCount; i++)
  521. {
  522. if(ShmSysConfigAndInfo->SysWarningInfo.WarningCode[i][1]>=0x33)//from backend or power cabinet
  523. {
  524. memset(EventCodeTmp,0,sizeof(EventCodeTmp));
  525. memcpy(EventCodeTmp,ShmSysConfigAndInfo->SysWarningInfo.WarningCode[i],sizeof(EventCodeTmp));
  526. RemoveFaultCodeToBuf(EventCodeTmp);
  527. }
  528. }
  529. }
  530. #ifdef Debug
  531. printf("no alarm (%d)\n",Tmp);
  532. #endif
  533. return -1;
  534. }
  535. #ifdef Debug
  536. printf("OK, (%d) ",Tmp);
  537. //printf("PacketData.Se=%d\n",PacketData.Se);
  538. //printf("PacketData.Id=%d\n",PacketData.Id);
  539. //printf("PacketData.Op=%d\n",PacketData.Op);
  540. //printf("PacketData.Len=%d\n",PacketData.Len);
  541. //printf("PacketData.RegisterNum=%d\n",PacketData.RegisterNum);
  542. //for(Rtn=0;Rtn<=PacketData.Len-1;Rtn++)
  543. //printf("PacketData.Data[%d]=0x%x\n",Rtn,PacketData.Data[Rtn]);
  544. #endif
  545. for(count=0;count<Tmp;count+=6)
  546. {
  547. //if((Tmp-count)<6)
  548. strncpy(StatusArray[count/6],(PacketData.Data+1)+count,6);
  549. Rtn=0;
  550. for(unsigned char i = 0; i < ShmSysConfigAndInfo->SysWarningInfo.WarningCount; i++)
  551. {
  552. if(memcmp(&ShmSysConfigAndInfo->SysWarningInfo.WarningCode[i][0], StatusArray[count/6], 6) == 0)
  553. {
  554. Rtn=1;
  555. break;
  556. }
  557. }
  558. if(Rtn==0)
  559. AddFaultCodeToBuf(StatusArray[count/6]);
  560. //Rtn=StatusCodeProcessing(StatusArray[count/6]);
  561. #ifdef Debug
  562. printf("(%d)(%s) = %s, ", count/6,Rtn==1?"Process OK":"Process NG", StatusArray[count/6]);
  563. #endif
  564. }
  565. for(unsigned char i = 0; i < ShmSysConfigAndInfo->SysWarningInfo.WarningCount; i++)
  566. {
  567. if(ShmSysConfigAndInfo->SysWarningInfo.WarningCode[i][1]>=0x33)//from backend or power cabinet
  568. {
  569. Rtn=0;
  570. for(count=0;count<(Tmp/6);count++)
  571. {
  572. if(memcmp(&ShmSysConfigAndInfo->SysWarningInfo.WarningCode[i][0], StatusArray[count], 6) == 0)
  573. {
  574. Rtn=1;
  575. break;
  576. }
  577. }
  578. if(Rtn==0)
  579. {
  580. memset(EventCodeTmp,0,sizeof(EventCodeTmp));
  581. memcpy(EventCodeTmp,ShmSysConfigAndInfo->SysWarningInfo.WarningCode[i],sizeof(EventCodeTmp));
  582. RemoveFaultCodeToBuf(EventCodeTmp);
  583. }
  584. }
  585. }
  586. #ifdef Debug
  587. printf("\n");
  588. #endif
  589. return 1;
  590. }
  591. int WriteDdStatus()
  592. {
  593. unsigned char Tmp=0,count;
  594. unsigned char TmpBuf[255], CurWarnCodeTmp[10][6],PreWarnCodeTmp[10][6];
  595. struct ApplicationPacket PacketData;
  596. if((ShmSysConfigAndInfo->SysWarningInfo.WarningCount<=0)&&(PreSysWarningInfo.WarningCount<=0))
  597. return -1;
  598. memset(CurWarnCodeTmp,0,sizeof(CurWarnCodeTmp));
  599. Tmp=ShmSysConfigAndInfo->SysWarningInfo.WarningCount;
  600. for(count=0;count<Tmp;count++)
  601. {
  602. memcpy(CurWarnCodeTmp[count],ShmSysConfigAndInfo->SysWarningInfo.WarningCode[count],6);
  603. }
  604. memset(PreWarnCodeTmp,0,sizeof(PreWarnCodeTmp));
  605. Tmp=PreSysWarningInfo.WarningCount;
  606. for(count=0;count<Tmp;count++)
  607. {
  608. memcpy(PreWarnCodeTmp[count],PreSysWarningInfo.WarningCode[count],6);
  609. }
  610. if(strcmp(CurWarnCodeTmp,PreWarnCodeTmp)==0)
  611. return -1;
  612. /*memset(TmpBuf,0,sizeof(TmpBuf));
  613. Tmp=ShmSysConfigAndInfo->SysWarningInfo.WarningCount;
  614. for(count=0;count<Tmp;count++)
  615. {
  616. memcpy(TmpBuf+(count*6),ShmSysConfigAndInfo->SysWarningInfo.WarningCode[count],6);
  617. #ifdef Debug
  618. printf("WriteDdStatus(%d) = %s", count, ShmSysConfigAndInfo->SysWarningInfo.WarningCode[count]);
  619. #endif
  620. }
  621. if(SendPacket(0x01, 0x02, 0x04,strlen(TmpBuf), TmpBuf)<=0)
  622. return -1;
  623. */
  624. #ifdef Debug
  625. printf("WriteDdStatus => ");
  626. #endif
  627. if(SendPacket(0x01, 0x02, 0x04,strlen(CurWarnCodeTmp), CurWarnCodeTmp)<=0)
  628. {
  629. #ifdef Debug
  630. printf("SendPacket Fail\n");
  631. #endif
  632. return -1;
  633. }
  634. memset(&PacketData,0,sizeof(struct ApplicationPacket));
  635. if(RecvPacket(&Tmp, &PacketData)<=0)
  636. {
  637. #ifdef Debug
  638. printf("RecvPacket Fail\n");
  639. #endif
  640. return -1;
  641. }
  642. if(PacketData.Data[0]!=1)//!=OK
  643. {
  644. #ifdef Debug
  645. printf("NG\n");
  646. #endif
  647. return -1;
  648. }
  649. memset(&PreSysWarningInfo,0, sizeof(struct WARNING_CODE_INFO));
  650. memcpy(&PreSysWarningInfo,&(ShmSysConfigAndInfo->SysWarningInfo),sizeof(struct WARNING_CODE_INFO));
  651. #ifdef Debug
  652. printf("OK, ");
  653. Tmp=ShmSysConfigAndInfo->SysWarningInfo.WarningCount;
  654. for(count=0;count<Tmp;count++)
  655. {
  656. printf("(%d)%s, ", count, ShmSysConfigAndInfo->SysWarningInfo.WarningCode[count]);
  657. }
  658. printf("\n");
  659. #endif
  660. return 1;
  661. }
  662. int ReadChargingCapability(unsigned char PlugNum)
  663. {
  664. unsigned char Tmp=0;
  665. struct ApplicationPacket PacketData;
  666. float MaxVolt, MaxCurrent, MaxPower;
  667. #ifdef Debug
  668. printf("Read Charging Capability => ");
  669. #endif
  670. memset(&PacketData,0,sizeof(struct ApplicationPacket));
  671. if(SendPacket(PlugNum, 0x01, 0x05,0, PacketData.Data)<=0)
  672. {
  673. #ifdef Debug
  674. printf("SendPacket Fail\n");
  675. #endif
  676. return -1;
  677. }
  678. if(RecvPacket(&Tmp, &PacketData)<=0)
  679. {
  680. #ifdef Debug
  681. printf("RecvPacket Fail\n");
  682. #endif
  683. return -1;
  684. }
  685. if(PacketData.Data[0]!=1)//!=OK
  686. {
  687. #ifdef Debug
  688. printf("NG\n");
  689. #endif
  690. return -1;
  691. }
  692. MaxVolt=(float)(PacketData.Data[1]<<8|PacketData.Data[2]);
  693. MaxCurrent=(float)(PacketData.Data[3]<<8|PacketData.Data[4]);
  694. MaxPower=(float)(PacketData.Data[5]<<8|PacketData.Data[6]);
  695. if((MaxVolt>=0)&&(MaxVolt<=10000))
  696. ChargingData[PlugNum-1]->MaximumChargingVoltage=MaxVolt;
  697. if((MaxCurrent>=0)&&(MaxCurrent<=5000))
  698. ChargingData[PlugNum-1]->AvailableChargingCurrent=MaxCurrent;
  699. if((MaxPower>=0)&&(MaxPower<=3600))
  700. ChargingData[PlugNum-1]->AvailableChargingPower=MaxPower;
  701. #ifdef Debug
  702. printf(" MaxVolt=%f, MaxCurrent=%f, MaxPower=%f,\n", MaxVolt,MaxCurrent,MaxPower);
  703. #endif
  704. return 1;
  705. }
  706. int WriteChargingTarget(unsigned char PlugNum)
  707. {
  708. unsigned char Tmp=0;
  709. unsigned char TmpBuf[255];
  710. struct ApplicationPacket PacketData;
  711. float ChargingVolt, ChargingAmp;
  712. memset(TmpBuf,0,sizeof(TmpBuf));
  713. memset(&PacketData,0,sizeof(struct ApplicationPacket));
  714. ChargingVolt=ChargingData[PlugNum-1]->EvBatterytargetVoltage;
  715. ChargingAmp=ChargingData[PlugNum-1]->EvBatterytargetCurrent;
  716. ChargingVolt*=10;
  717. ChargingAmp*=10;
  718. TmpBuf[0]=((unsigned short)ChargingVolt>>8)&0xFF;
  719. TmpBuf[1]=((unsigned short)ChargingVolt)&0xFF;
  720. TmpBuf[2]=((unsigned short)ChargingAmp>>8)&0xFF;
  721. TmpBuf[3]=((unsigned short)ChargingAmp)&0xFF;
  722. #ifdef Debug
  723. printf("WriteChargingTarget(%d), EvBatterytargetVoltage=%f,EvBatteryMaxVoltage=%f => ",
  724. PlugNum,ChargingData[PlugNum-1]->EvBatterytargetVoltage,ChargingData[PlugNum-1]->EvBatteryMaxVoltage);
  725. #endif
  726. if(SendPacket(PlugNum, 0x02, 0x06,4, TmpBuf)<=0)
  727. {
  728. #ifdef Debug
  729. printf("SendPacket Fail\n");
  730. #endif
  731. return -1;
  732. }
  733. if(RecvPacket(&Tmp, &PacketData)<=0)
  734. {
  735. #ifdef Debug
  736. printf("RecvPacket Fail\n");
  737. #endif
  738. return -1;
  739. }
  740. if(PacketData.Data[0]!=1)//!=OK
  741. {
  742. #ifdef Debug
  743. printf("NG\n");
  744. #endif
  745. return -1;
  746. }
  747. #ifdef Debug
  748. printf("ChargingVolt=%f, ChargingAmp=%f\n", ChargingVolt/10,ChargingAmp/10);
  749. #endif
  750. return 1;
  751. }
  752. int ReadSoftwareUpdate()
  753. {
  754. unsigned char Tmp=0;
  755. struct ApplicationPacket PacketData;
  756. memset(&PacketData,0,sizeof(struct ApplicationPacket));
  757. if(SendPacket(0x01, 0x01, 0x07,0, PacketData.Data)<=0)
  758. return -1;
  759. if(RecvPacket(&Tmp, &PacketData)<=0)
  760. return -1;
  761. if(PacketData.Data[0]!=1)//!=OK
  762. return -1;
  763. if(PacketData.Data[1]!=0x01)//not update
  764. return -1;
  765. return PacketData.Data[1];
  766. }
  767. int WritePlugInStatus(unsigned char PlugNum)
  768. {
  769. unsigned char Tmp=0;
  770. unsigned char TmpBuf[255];
  771. struct ApplicationPacket PacketData;
  772. memset(TmpBuf,0,sizeof(TmpBuf));
  773. memset(&PacketData,0,sizeof(struct ApplicationPacket));
  774. TmpBuf[0]=ChargingData[PlugNum-1]->ConnectorPlugIn;
  775. #ifdef Debug
  776. printf("WritePlugInStatus(%d) =>",PlugNum);
  777. #endif
  778. if(SendPacket(PlugNum, 0x02, 0x08,1, TmpBuf)<=0)
  779. {
  780. #ifdef Debug
  781. printf("SendPacket Fail\n");
  782. #endif
  783. return -1;
  784. }
  785. if(RecvPacket(&Tmp, &PacketData)<=0)
  786. {
  787. #ifdef Debug
  788. printf("RecvPacket Fail\n");
  789. #endif
  790. return -1;
  791. }
  792. if(PacketData.Data[0]!=1)//!=OK
  793. {
  794. #ifdef Debug
  795. printf("NG\n");
  796. #endif
  797. return -1;
  798. }
  799. #ifdef Debug
  800. printf(" %s\n", TmpBuf[0]==1?"Plug-in":"Un-plug");
  801. #endif
  802. return 1;
  803. }
  804. int WriteConnectorState(unsigned char PlugNum)
  805. {
  806. unsigned char Tmp=0;
  807. unsigned char TmpBuf[255];
  808. struct ApplicationPacket PacketData;
  809. memset(TmpBuf,0,sizeof(TmpBuf));
  810. memset(&PacketData,0,sizeof(struct ApplicationPacket));
  811. if(ChargingData[PlugNum-1]->SystemStatus<=2)
  812. TmpBuf[0]=0;//idle
  813. else if((ChargingData[PlugNum-1]->SystemStatus<=7)||(ChargingData[PlugNum-1]->SystemStatus==17)||(ChargingData[PlugNum-1]->SystemStatus==18))
  814. TmpBuf[0]=1;//preparing
  815. else if(ChargingData[PlugNum-1]->SystemStatus==8)
  816. TmpBuf[0]=2;//charging
  817. else if(ChargingData[PlugNum-1]->SystemStatus==9)
  818. TmpBuf[0]=3;//terminating
  819. #ifdef Debug
  820. printf("WriteConnectorState(%d) SystemStatus=%d,TmpBuf[0]=%d => ",PlugNum,ChargingData[PlugNum-1]->SystemStatus,TmpBuf[0]);
  821. #endif
  822. if(SendPacket(PlugNum, 0x02, 0x09,1, TmpBuf)<=0)
  823. {
  824. #ifdef Debug
  825. printf("SendPacket Fail\n");
  826. #endif
  827. return -1;
  828. }
  829. if(RecvPacket(&Tmp, &PacketData)<=0)
  830. {
  831. #ifdef Debug
  832. printf("RecvPacket Fail\n");
  833. #endif
  834. return -1;
  835. }
  836. if(PacketData.Data[0]!=1)//!=OK
  837. {
  838. #ifdef Debug
  839. printf("NG\n");
  840. #endif
  841. return -1;
  842. }
  843. #ifdef Debug
  844. printf(" %d\n",TmpBuf[0]);
  845. #endif
  846. return 1;
  847. }
  848. int WriteUserID(unsigned char ConnectorID, unsigned char *UserID)
  849. {
  850. unsigned char Tmp=0;
  851. unsigned char TmpBuf[255];
  852. struct ApplicationPacket PacketData;
  853. if(strlen(UserID)<=0)
  854. return -1;
  855. memset(TmpBuf,0,sizeof(TmpBuf));
  856. memset(&PacketData,0,sizeof(struct ApplicationPacket));
  857. strcpy(TmpBuf,UserID);
  858. #ifdef Debug
  859. printf("WriteUserID(%d) => ",ConnectorID);
  860. #endif
  861. if(SendPacket(ConnectorID, 0x02, 0x0A,strlen(TmpBuf), TmpBuf)<=0)
  862. {
  863. #ifdef Debug
  864. printf("SendPacket Fail\n");
  865. #endif
  866. return -1;
  867. }
  868. if(RecvPacket(&Tmp, &PacketData)<=0)
  869. {
  870. #ifdef Debug
  871. printf("RecvPacket Fail\n");
  872. #endif
  873. return -1;
  874. }
  875. if(PacketData.Data[0]!=1)//!=OK
  876. {
  877. #ifdef Debug
  878. printf("NG\n");
  879. #endif
  880. return -1;
  881. }
  882. #ifdef Debug
  883. printf(" StartUserId=%s, PacketData.Data[1]=%d\n", TmpBuf,PacketData.Data[1]);
  884. #endif
  885. return PacketData.Data[1];
  886. }
  887. int ReadChargePermission(unsigned char PlugNum)
  888. {
  889. unsigned char Tmp=0;
  890. struct ApplicationPacket PacketData;
  891. memset(&PacketData,0,sizeof(struct ApplicationPacket));
  892. #ifdef Debug
  893. printf("ReadChargePermission[%d] => ", PlugNum);
  894. #endif
  895. if(SendPacket(PlugNum, 0x01, 0x0B,0, PacketData.Data)<=0)
  896. {
  897. #ifdef Debug
  898. printf("SendPacket Fail\n");
  899. #endif
  900. return -1;
  901. }
  902. if(RecvPacket(&Tmp, &PacketData)<=0)
  903. {
  904. #ifdef Debug
  905. printf("RecvPacket Fail\n");
  906. #endif
  907. return -1;
  908. }
  909. if(PacketData.Data[0]!=1)//!=OK
  910. {
  911. #ifdef Debug
  912. printf("NG\n");
  913. #endif
  914. return -1;
  915. }
  916. #ifdef Debug
  917. printf(" %s\n", PacketData.Data[1]==1?"Permitted": "NOT permitted" );
  918. #endif
  919. return PacketData.Data[1];
  920. }
  921. int FindChargingInfoData(byte target, struct ChargingInfoData **chargingData)
  922. {
  923. for (byte index = 0; index < CHAdeMO_QUANTITY; index++)
  924. {
  925. if (ShmSysConfigAndInfo->SysInfo.ChademoChargingData[index].Index == target)
  926. {
  927. chargingData[target] = &ShmSysConfigAndInfo->SysInfo.ChademoChargingData[index];
  928. return 1;
  929. }
  930. }
  931. for (byte index = 0; index < CCS_QUANTITY; index++)
  932. {
  933. if (ShmSysConfigAndInfo->SysInfo.CcsChargingData[index].Index == target)
  934. {
  935. chargingData[target] = &ShmSysConfigAndInfo->SysInfo.CcsChargingData[index];
  936. return 1;
  937. }
  938. }
  939. for (byte index = 0; index < GB_QUANTITY; index++)
  940. {
  941. if (ShmSysConfigAndInfo->SysInfo.GbChargingData[index].Index == target)
  942. {
  943. chargingData[target] = &ShmSysConfigAndInfo->SysInfo.GbChargingData[index];
  944. return 1;
  945. }
  946. }
  947. return 0;
  948. }
  949. int MessageTrigger(unsigned char connectorID)
  950. {
  951. struct timeb NowTime;
  952. unsigned char Reg;
  953. for(Reg=0;Reg<TriggerMsgeNum;Reg++)
  954. {
  955. ftime(&NowTime);
  956. switch(Reg)
  957. {
  958. case 3://ReadDoStatus
  959. if(DiffTimeb(TriggerTimeUp[connectorID-1][Reg],NowTime)>1000)
  960. {
  961. if(ReadDoStatus())
  962. {
  963. ftime(&TriggerTimeUp[connectorID-1][Reg]);
  964. }
  965. }
  966. break;
  967. case 4://WriteDdStatus
  968. if(DiffTimeb(TriggerTimeUp[connectorID-1][Reg],NowTime)>1000)
  969. {
  970. if(WriteDdStatus())
  971. {
  972. ftime(&TriggerTimeUp[connectorID-1][Reg]);
  973. }
  974. }
  975. break;
  976. /*case 5://ReadChargingCapability
  977. if(DiffTimeb(TriggerTimeUp[connectorID-1][Reg],NowTime)>200)
  978. {
  979. if(ReadChargingCapability(connectorID))
  980. {
  981. ftime(&TriggerTimeUp[connectorID-1][Reg]);
  982. }
  983. }
  984. break;
  985. case 6://WriteChargingTarget
  986. if(DiffTimeb(TriggerTimeUp[connectorID-1][Reg],NowTime)>100)
  987. {
  988. if(WriteChargingTarget(connectorID))
  989. {
  990. ftime(&TriggerTimeUp[connectorID-1][Reg]);
  991. }
  992. }
  993. break;*/
  994. case 8://WritePlugInStatus
  995. if(DiffTimeb(TriggerTimeUp[connectorID-1][Reg],NowTime)>1000)
  996. {
  997. if(WritePlugInStatus(connectorID))
  998. {
  999. ftime(&TriggerTimeUp[connectorID-1][Reg]);
  1000. }
  1001. }
  1002. break;
  1003. case 9://WriteConnectorState
  1004. if(DiffTimeb(TriggerTimeUp[connectorID-1][Reg],NowTime)>1000)
  1005. {
  1006. if(WriteConnectorState(connectorID))
  1007. {
  1008. ftime(&TriggerTimeUp[connectorID-1][Reg]);
  1009. }
  1010. }
  1011. break;
  1012. /*case 0x0B://ReadChargePermission
  1013. if(DiffTimeb(TriggerTimeUp[connectorID-1][Reg],NowTime)>1000)
  1014. {
  1015. if(ReadChargePermission(connectorID))
  1016. {
  1017. ftime(&TriggerTimeUp[connectorID-1][Reg]);
  1018. }
  1019. }
  1020. break;*/
  1021. default:
  1022. break;
  1023. }
  1024. }
  1025. }
  1026. int main(int argc,char *argv[])
  1027. {
  1028. unsigned char Tmp,PlugNum;
  1029. int Rtn;
  1030. struct timeb AuthNowTime;
  1031. /**************** Initialization **********/
  1032. if(InitShareMemory()==0)
  1033. {
  1034. #ifdef SystemLogMessage
  1035. DEBUG_ERROR("InitShareMemory NG\n");
  1036. #endif
  1037. if(ShmStatusCodeData!=NULL)
  1038. {
  1039. ShmStatusCodeData->AlarmCode.AlarmEvents.bits.FailToCreateShareMemory=1;
  1040. }
  1041. sleep(5);
  1042. return 0;
  1043. }
  1044. ReConnect:
  1045. memset(&PreSysWarningInfo,0,sizeof(struct WARNING_CODE_INFO));
  1046. PacketSe=0;
  1047. DisconnectFlag=0;
  1048. for (byte _index = 0; _index < ShmSysConfigAndInfo->SysConfig.TotalConnectorCount; _index++)
  1049. {
  1050. if (!FindChargingInfoData(_index, &ChargingData[0]))
  1051. {
  1052. DEBUG_ERROR("FindChargingInfoData false \n");
  1053. break;
  1054. }
  1055. }
  1056. /**************** Check Network **********/
  1057. DEBUG_INFO("Check Dispenser Network Information");
  1058. while(!CheckNetworkStatus())
  1059. {
  1060. sleep(1);
  1061. if(DisconnectFlag>=10)
  1062. {
  1063. ShmStatusCodeData->AlarmCode.AlarmEvents.bits.DisconnectedFromDo=1;
  1064. }
  1065. else
  1066. DisconnectFlag++;
  1067. }
  1068. DEBUG_INFO("Dispenser Network Information checked: IP=%s Netmask=%s, Gateway=%s",
  1069. ShmSysConfigAndInfo->SysConfig.Eth0Interface.EthIpAddress,
  1070. ShmSysConfigAndInfo->SysConfig.Eth0Interface.EthSubmaskAddress,
  1071. ShmSysConfigAndInfo->SysConfig.Eth0Interface.EthGatewayAddress);
  1072. /**************** Power cabinet connection **********/
  1073. DEBUG_INFO("Connect to Power Cabinet");
  1074. while(TcpConnected()<0)
  1075. {
  1076. sleep(1);
  1077. if(DisconnectFlag>=5)
  1078. {
  1079. ShmStatusCodeData->AlarmCode.AlarmEvents.bits.DisconnectedFromDo=1;
  1080. }
  1081. else
  1082. DisconnectFlag++;
  1083. }
  1084. DEBUG_INFO("Power cabinet connected(TcpSock=%d): IP=%s Netmask=%s, Gateway=%s",
  1085. TcpSock,
  1086. ShmSysConfigAndInfo->SysConfig.Eth0Interface.EthIpAddress,
  1087. ShmSysConfigAndInfo->SysConfig.Eth0Interface.EthSubmaskAddress,
  1088. ShmSysConfigAndInfo->SysConfig.Eth0Interface.EthGatewayAddress);
  1089. /**************** Write Model Name**********/
  1090. DEBUG_INFO("Write Model Name");
  1091. while(WriteModelName()<0)
  1092. {
  1093. sleep(1);
  1094. if(DisconnectFlag>=5)
  1095. {
  1096. ShmStatusCodeData->AlarmCode.AlarmEvents.bits.DisconnectedFromDo=1;
  1097. }
  1098. else
  1099. DisconnectFlag++;
  1100. }
  1101. DEBUG_INFO("Write Model Name OK: %s",ShmSysConfigAndInfo->SysConfig.ModelName);
  1102. /**************** Get Connector ID**********/
  1103. DEBUG_INFO("Get Connector ID");
  1104. while(ReadConnectorID()<0)
  1105. {
  1106. sleep(1);
  1107. if(DisconnectFlag>=5)
  1108. {
  1109. ShmStatusCodeData->AlarmCode.AlarmEvents.bits.DisconnectedFromDo=1;
  1110. }
  1111. else
  1112. DisconnectFlag++;
  1113. }
  1114. DEBUG_INFO("Get Connector ID OK");
  1115. /*while(1)
  1116. {
  1117. //for self testin main.c
  1118. if(ShmSysConfigAndInfo->SysInfo.SelfTestSeq >= _STEST_PSU_DETECT)
  1119. {
  1120. ShmSysConfigAndInfo->SysInfo.SelfTestSeq = _STEST_PSU_CAP;
  1121. break;
  1122. }
  1123. }*/
  1124. for(Tmp=0;Tmp<TriggerMsgeNum;Tmp++)
  1125. {
  1126. ftime(&TriggerTimeUp[0][Tmp]);
  1127. ftime(&TriggerTimeUp[1][Tmp]);
  1128. usleep(50000);
  1129. }
  1130. ShmStatusCodeData->AlarmCode.AlarmEvents.bits.DisconnectedFromDo=0;
  1131. DEBUG_INFO("Start Communication");
  1132. /**************** Data transmission**********/
  1133. while(1)
  1134. {
  1135. if((ShmOCPP16Data->SpMsg.bits.AuthorizeReq == 1)||(ShmSysConfigAndInfo->SysInfo.AuthorizeFlag==1))
  1136. {
  1137. ftime(&AuthNowTime);
  1138. if(DiffTimeb(TriggerTimeUp[0][10],AuthNowTime)>1000)
  1139. {
  1140. Rtn=WriteUserID(ShmSysConfigAndInfo->SysInfo.CurGunSelected,ShmSysConfigAndInfo->SysConfig.UserId);
  1141. if(Rtn>=0)
  1142. {
  1143. memset(ShmOCPP16Data->Authorize.ResponseIdTagInfo.Status,0,sizeof(ShmOCPP16Data->Authorize.ResponseIdTagInfo.Status));
  1144. if(Rtn==0)
  1145. strcpy(ShmOCPP16Data->Authorize.ResponseIdTagInfo.Status,"Invalid");
  1146. else
  1147. strcpy(ShmOCPP16Data->Authorize.ResponseIdTagInfo.Status,"Accepted");
  1148. ShmOCPP16Data->SpMsg.bits.AuthorizeConf=1;//isAuthorizedComplete
  1149. ShmOCPP16Data->SpMsg.bits.AuthorizeReq=0;
  1150. ShmSysConfigAndInfo->SysInfo.AuthorizeFlag=0;
  1151. ShmPsuData->SystemAvailablePower=0;
  1152. ShmPsuData->SystemPresentPsuQuantity=0;
  1153. }
  1154. ftime(&TriggerTimeUp[0][10]);
  1155. }
  1156. }
  1157. for (PlugNum = 1; PlugNum <= ShmSysConfigAndInfo->SysConfig.TotalConnectorCount; PlugNum++)
  1158. {
  1159. //printf("ChargingData[PlugNum-1]->SystemStatus=%d\n",ChargingData[PlugNum-1]->SystemStatus);
  1160. //printf("ShmOCPP16Data->SpMsg.bits.AuthorizeReq=%d\n",ShmOCPP16Data->SpMsg.bits.AuthorizeReq);
  1161. //printf("ShmSysConfigAndInfo->SysInfo.AuthorizeFlag=%d\n",ShmSysConfigAndInfo->SysInfo.AuthorizeFlag);
  1162. //printf("ChargingData[%d]->FireChargingVoltage=%f\n",PlugNum,ChargingData[PlugNum-1]->FireChargingVoltage);
  1163. //printf("ChargingData[%d]->PresentChargingCurrent=%f\n",PlugNum,ChargingData[PlugNum-1]->PresentChargingCurrent);
  1164. switch(ChargingData[PlugNum-1]->SystemStatus)
  1165. {
  1166. case S_IDLE:
  1167. case S_RESERVATION:
  1168. case S_MAINTAIN:
  1169. case S_ALARM:
  1170. case S_AUTHORIZING:
  1171. if((ShmOCPP16Data->SpMsg.bits.AuthorizeReq == 1)||(ShmSysConfigAndInfo->SysInfo.AuthorizeFlag==1))
  1172. {
  1173. ftime(&AuthNowTime);
  1174. if(DiffTimeb(TriggerTimeUp[PlugNum-1][10],AuthNowTime)>1000)
  1175. {
  1176. Rtn=WriteUserID(ShmSysConfigAndInfo->SysInfo.CurGunSelected,ShmSysConfigAndInfo->SysConfig.UserId);
  1177. if(Rtn>=0)
  1178. {
  1179. memset(ShmOCPP16Data->Authorize.ResponseIdTagInfo.Status,0,sizeof(ShmOCPP16Data->Authorize.ResponseIdTagInfo.Status));
  1180. if(Rtn==0)
  1181. strcpy(ShmOCPP16Data->Authorize.ResponseIdTagInfo.Status,"Invalid");
  1182. else
  1183. strcpy(ShmOCPP16Data->Authorize.ResponseIdTagInfo.Status,"Accepted");
  1184. ShmOCPP16Data->SpMsg.bits.AuthorizeConf=1;//isAuthorizedComplete
  1185. ShmOCPP16Data->SpMsg.bits.AuthorizeReq=0;
  1186. ShmSysConfigAndInfo->SysInfo.AuthorizeFlag=0;
  1187. ShmPsuData->SystemAvailablePower=0;
  1188. ShmPsuData->SystemPresentPsuQuantity=0;
  1189. ftime(&TriggerTimeUp[PlugNum-1][10]);
  1190. }
  1191. ftime(&TriggerTimeUp[PlugNum-1][10]);
  1192. }
  1193. }
  1194. /*if(ReadSoftwareUpdate())//0x07
  1195. {
  1196. //firmware update
  1197. }*/
  1198. break;
  1199. case S_PREPARNING: //get permission
  1200. //printf("S_PREPARNING\n");
  1201. ftime(&AuthNowTime);
  1202. if(DiffTimeb(TriggerTimeUp[PlugNum-1][11],AuthNowTime)>1000)
  1203. {
  1204. if((ReadChargePermission(PlugNum))&&(ReadChargingCapability(PlugNum)))
  1205. {
  1206. ShmPsuData->SystemAvailablePower=ChargingData[0]->AvailableChargingPower+ChargingData[1]->AvailableChargingPower;
  1207. ShmPsuData->SystemPresentPsuQuantity=ShmPsuData->SystemAvailablePower/30;
  1208. }
  1209. ftime(&TriggerTimeUp[PlugNum-1][11]);
  1210. }
  1211. break;
  1212. case S_PREPARING_FOR_EV://wait connector lock
  1213. //printf("S_PREPARING_FOR_EV\n");
  1214. ftime(&AuthNowTime);
  1215. if(DiffTimeb(TriggerTimeUp[PlugNum-1][5],AuthNowTime)>1000)
  1216. {
  1217. ReadChargingCapability(PlugNum);
  1218. ftime(&TriggerTimeUp[PlugNum-1][5]);
  1219. }
  1220. ftime(&AuthNowTime);
  1221. if(DiffTimeb(TriggerTimeUp[PlugNum-1][11],AuthNowTime)>1000)
  1222. {
  1223. if(ReadChargePermission(PlugNum)==0)
  1224. {
  1225. DEBUG_INFO("Stop charging by power cabinet's permission");
  1226. ChargingData[PlugNum-1]->StopChargeFlag = 1;
  1227. }
  1228. ftime(&TriggerTimeUp[PlugNum-1][11]);
  1229. }
  1230. break;
  1231. case S_PREPARING_FOR_EVSE: //insaulation test
  1232. case S_CCS_PRECHARGE_ST0:
  1233. case S_CCS_PRECHARGE_ST1:
  1234. //printf("S_PREPARING_FOR_EVSE\n");
  1235. WriteChargingTarget(PlugNum);
  1236. ftime(&AuthNowTime);
  1237. if(DiffTimeb(TriggerTimeUp[PlugNum-1][5],AuthNowTime)>1000)
  1238. {
  1239. ReadChargingCapability(PlugNum);
  1240. ftime(&TriggerTimeUp[PlugNum-1][5]);
  1241. }
  1242. ftime(&AuthNowTime);
  1243. if(DiffTimeb(TriggerTimeUp[PlugNum-1][11],AuthNowTime)>1000)
  1244. {
  1245. if(ReadChargePermission(PlugNum)==0)
  1246. {
  1247. DEBUG_INFO("Stop charging by power cabinet's permission");
  1248. ChargingData[PlugNum-1]->StopChargeFlag = 1;
  1249. }
  1250. ftime(&TriggerTimeUp[PlugNum-1][11]);
  1251. }
  1252. break;
  1253. case S_CHARGING: //charging
  1254. case S_TERMINATING:
  1255. //printf("S_CHARGING,S_TERMINATING\n");
  1256. ftime(&AuthNowTime);
  1257. if(DiffTimeb(TriggerTimeUp[PlugNum-1][5],AuthNowTime)>1000)
  1258. {
  1259. ReadChargingCapability(PlugNum);
  1260. ftime(&TriggerTimeUp[PlugNum-1][5]);
  1261. }
  1262. ftime(&AuthNowTime);
  1263. if(DiffTimeb(TriggerTimeUp[PlugNum-1][11],AuthNowTime)>1000)
  1264. {
  1265. if(ReadChargePermission(PlugNum)==0)
  1266. {
  1267. DEBUG_INFO("Stop charging by power cabinet's permission");
  1268. ChargingData[PlugNum-1]->StopChargeFlag = 1;
  1269. }
  1270. ftime(&TriggerTimeUp[PlugNum-1][11]);
  1271. }
  1272. WriteChargingTarget(PlugNum);
  1273. //printf("ChargingData[%d]->FireChargingVoltage=%f\n",PlugNum,ChargingData[PlugNum-1]->FireChargingVoltage);
  1274. //printf("ChargingData[%d]->PresentChargingCurrent=%f\n",PlugNum,ChargingData[PlugNum-1]->PresentChargingCurrent);
  1275. break;
  1276. default:
  1277. break;
  1278. }//switch case
  1279. MessageTrigger(PlugNum);
  1280. }//for connector #
  1281. if(DisconnectFlag>=10)
  1282. {
  1283. if(ShmStatusCodeData->AlarmCode.AlarmEvents.bits.DisconnectedFromDo==0)
  1284. {
  1285. ShmStatusCodeData->AlarmCode.AlarmEvents.bits.DisconnectedFromDo=1;
  1286. DEBUG_INFO("Disconnected from power cabinet...re-connecting");
  1287. }
  1288. goto ReConnect;
  1289. }
  1290. }//while(1)
  1291. }