DoComm.c 43 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252
  1. #include <sys/time.h>
  2. #include <sys/timeb.h>
  3. #include <sys/types.h>
  4. #include <sys/stat.h>
  5. #include <sys/types.h>
  6. #include <sys/ioctl.h>
  7. #include <sys/socket.h>
  8. #include <sys/ipc.h>
  9. #include <sys/shm.h>
  10. #include <sys/shm.h>
  11. #include <sys/mman.h>
  12. #include <linux/can.h>
  13. #include <linux/can/raw.h>
  14. #include <linux/wireless.h>
  15. #include <arpa/inet.h>
  16. #include <netinet/in.h>
  17. #include <signal.h>
  18. #include <unistd.h>
  19. #include <stdarg.h>
  20. #include <stdio.h> /*標準輸入輸出定義*/
  21. #include <stdlib.h> /*標準函數庫定義*/
  22. #include <unistd.h> /*Unix 標準函數定義*/
  23. #include <fcntl.h> /*檔控制定義*/
  24. #include <termios.h> /*PPSIX 終端控制定義*/
  25. #include <errno.h> /*錯誤號定義*/
  26. #include <errno.h>
  27. #include <string.h>
  28. #include <time.h>
  29. #include <ctype.h>
  30. #include <ifaddrs.h>
  31. #include "../../define.h"
  32. #include "Config.h"
  33. //#define Debug
  34. #define DoIPAddress "192.168.100.1"
  35. #define DoTcpPort 36000
  36. #define TriggerMsgeNum 20
  37. int StoreLogMsg(const char *fmt, ...);
  38. #define DEBUG_INFO(format, args...) StoreLogMsg("[%s:%d][%s][Info] "format, __FILE__, __LINE__, __FUNCTION__, ##args)
  39. #define DEBUG_WARN(format, args...) StoreLogMsg("[%s:%d][%s][Warn] "format, __FILE__, __LINE__, __FUNCTION__, ##args)
  40. #define DEBUG_ERROR(format, args...) StoreLogMsg("[%s:%d][%s][Error] "format, __FILE__, __LINE__, __FUNCTION__, ##args)
  41. struct ApplicationPacket {
  42. unsigned char Se;
  43. unsigned char Id;
  44. unsigned char Op;
  45. unsigned char Len;
  46. unsigned char RegisterNum;
  47. unsigned char Data[250];
  48. };
  49. struct SysConfigAndInfo *ShmSysConfigAndInfo;
  50. struct StatusCodeData *ShmStatusCodeData;
  51. struct PsuData *ShmPsuData;
  52. struct OCPP16Data *ShmOCPP16Data;
  53. struct PrimaryMcuData *ShmPrimaryMcuData;
  54. int TcpSock = 0;
  55. unsigned char PacketSe;
  56. struct ChargingInfoData *ChargingData[CHAdeMO_QUANTITY + CCS_QUANTITY + GB_QUANTITY];
  57. struct timeb TriggerTimeUp[2][TriggerMsgeNum];
  58. struct WARNING_CODE_INFO PreSysWarningInfo;
  59. int DisconnectFlag;
  60. int StoreLogMsg(const char *fmt, ...)
  61. {
  62. char Buf[4096 + 256];
  63. char buffer[4096];
  64. va_list args;
  65. struct timeb SeqEndTime;
  66. struct tm *tm;
  67. va_start(args, fmt);
  68. int rc = vsnprintf(buffer, sizeof(buffer), fmt, args);
  69. va_end(args);
  70. memset(Buf, 0, sizeof(Buf));
  71. ftime(&SeqEndTime);
  72. SeqEndTime.time = time(NULL);
  73. tm = localtime(&SeqEndTime.time);
  74. if (ShmSysConfigAndInfo->SysConfig.SwitchDebugFlag == 1) {
  75. sprintf(Buf, "%02d:%02d:%02d:%03d - %s",
  76. tm->tm_hour, tm->tm_min, tm->tm_sec, SeqEndTime.millitm, buffer);
  77. printf("%s \n", Buf);
  78. } else {
  79. sprintf(Buf, "echo \"%04d-%02d-%02d %02d:%02d:%02d:%03d - %s\" >> /Storage/SystemLog/[%04d.%02d]SystemLog",
  80. tm->tm_year + 1900, tm->tm_mon + 1, tm->tm_mday, tm->tm_hour, tm->tm_min, tm->tm_sec, SeqEndTime.millitm,
  81. buffer,
  82. tm->tm_year + 1900, tm->tm_mon + 1);
  83. system(Buf);
  84. }
  85. return rc;
  86. }
  87. int DiffTimeb(struct timeb ST, struct timeb ET)
  88. {
  89. //return milli-second
  90. unsigned int StartTime, StopTime;
  91. StartTime = (unsigned int)ST.time;
  92. StopTime = (unsigned int)ET.time;
  93. return (StopTime - StartTime) * 1000 + ET.millitm - ST.millitm;
  94. }
  95. int InitShareMemory()
  96. {
  97. int result = 1;
  98. int MeterSMId;
  99. if ((MeterSMId = shmget(ShmSysConfigAndInfoKey, sizeof(struct SysConfigAndInfo), 0777)) < 0) {
  100. DEBUG_ERROR("shmget ShmSysConfigAndInfo NG\n");
  101. result = 0;
  102. } else if ((ShmSysConfigAndInfo = shmat(MeterSMId, NULL, 0)) == (void *) - 1) {
  103. DEBUG_ERROR("[shmat ShmSysConfigAndInfo NG\n");
  104. result = 0;
  105. }
  106. if ((MeterSMId = shmget(ShmStatusCodeKey, sizeof(struct StatusCodeData), 0777)) < 0) {
  107. DEBUG_ERROR("shmget ShmStatusCodeData NG\n");
  108. result = 0;
  109. } else if ((ShmStatusCodeData = shmat(MeterSMId, NULL, 0)) == (void *) - 1) {
  110. DEBUG_ERROR("shmat ShmStatusCodeData NG\n");
  111. result = 0;
  112. }
  113. //creat ShmPsuData
  114. if ((MeterSMId = shmget(ShmPsuKey, sizeof(struct PsuData), 0777)) < 0) {
  115. DEBUG_ERROR("shmget ShmPsuData NG \n");
  116. result = 0;
  117. } else if ((ShmPsuData = shmat(MeterSMId, NULL, 0)) == (void *) - 1) {
  118. DEBUG_ERROR("shmat ShmPsuData NG \n");
  119. result = 0;
  120. }
  121. //creat ShmOCPP16Data
  122. if ((MeterSMId = shmget(ShmOcppModuleKey, sizeof(struct OCPP16Data), 0777)) < 0) {
  123. DEBUG_ERROR("shmget ShmOCPP16Data NG \n");
  124. result = 0;
  125. } else if ((ShmOCPP16Data = shmat(MeterSMId, NULL, 0)) == (void *) - 1) {
  126. DEBUG_ERROR("shmat ShmOCPP16Data NG \n");
  127. result = 0;
  128. }
  129. if ((MeterSMId = shmget(ShmPrimaryMcuKey, sizeof(struct PrimaryMcuData), 0777)) < 0) {
  130. DEBUG_ERROR("shmget ShmPrimaryMcuData NG\n");
  131. result = 0;
  132. } else if ((ShmPrimaryMcuData = shmat(MeterSMId, NULL, 0)) == (void *) - 1) {
  133. DEBUG_ERROR("shmat ShmPrimaryMcuData NG\n");
  134. result = 0;
  135. }
  136. return result;
  137. }
  138. int CheckNetworkStatus()
  139. {
  140. //printf("ShmSysConfigAndInfo->SysConfig.Eth0Interface.EthIpAddress=%s\n",ShmSysConfigAndInfo->SysConfig.Eth0Interface.EthIpAddress);
  141. if (strstr(ShmSysConfigAndInfo->SysConfig.Eth0Interface.EthIpAddress, "192.168.100") != NULL) {
  142. return 1;
  143. } else {
  144. return 0;
  145. }
  146. }
  147. int TcpConnected()
  148. {
  149. struct sockaddr_in dest;
  150. struct timeval tv;
  151. int flag;
  152. if (TcpSock > 0) {
  153. close(TcpSock);
  154. }
  155. if ((TcpSock = socket(AF_INET, SOCK_STREAM, 0)) < 0) {
  156. DEBUG_ERROR("Open TCP socket NG");
  157. return -1;
  158. }
  159. /* flag=fcntl (TcpSock, F_GETFL, 0);
  160. if(flag>=0)
  161. {
  162. flag |= O_NONBLOCK;
  163. fcntl(TcpSock,F_SETFL, flag );
  164. }*/
  165. tv.tv_sec = 0;
  166. tv.tv_usec = 100000;
  167. setsockopt(TcpSock, SOL_SOCKET, SO_RCVTIMEO, &tv, sizeof(struct timeval));
  168. setsockopt(TcpSock, SOL_SOCKET, SO_SNDTIMEO, &tv, sizeof(struct timeval));
  169. flag = 1;
  170. setsockopt(TcpSock, SOL_SOCKET, MSG_NOSIGNAL, &flag, sizeof(flag));
  171. memset(&dest, 0, sizeof(dest));
  172. dest.sin_family = AF_INET;
  173. dest.sin_port = htons(DoTcpPort);
  174. inet_aton(DoIPAddress, (struct in_addr *) &dest.sin_addr.s_addr);
  175. if (connect(TcpSock, (struct sockaddr *) &dest, sizeof(dest)) != 0) {
  176. close(TcpSock);
  177. return -1;
  178. }
  179. return TcpSock;
  180. }
  181. void AddFaultCodeToBuf(unsigned char *Code)
  182. {
  183. if (ShmSysConfigAndInfo->SysWarningInfo.WarningCount < 10) {
  184. memcpy(&ShmSysConfigAndInfo->SysWarningInfo.WarningCode[ShmSysConfigAndInfo->SysWarningInfo.WarningCount][0], Code, strlen(Code));
  185. ShmSysConfigAndInfo->SysWarningInfo.WarningCount++;
  186. }
  187. }
  188. void RemoveFaultCodeToBuf(unsigned char *Code)
  189. {
  190. unsigned char find = 0x01;
  191. char _code[7];
  192. sprintf(_code, "%s", Code);
  193. // 把相關的錯誤碼一次移除,避免重複顯示
  194. while (find) {
  195. find = 0x00;
  196. for (unsigned char i = 0; i < ShmSysConfigAndInfo->SysWarningInfo.WarningCount; i++) {
  197. if (find == 0x00) {
  198. if (memcmp(&ShmSysConfigAndInfo->SysWarningInfo.WarningCode[i][0], _code, 7) == 0) {
  199. find = 0x01;
  200. }
  201. } else {
  202. memcpy(&ShmSysConfigAndInfo->SysWarningInfo.WarningCode[i - 1][0],
  203. &ShmSysConfigAndInfo->SysWarningInfo.WarningCode[i][0], 7);
  204. }
  205. }
  206. if (find) {
  207. ShmSysConfigAndInfo->SysWarningInfo.WarningCount--;
  208. }
  209. }
  210. }
  211. int StatusCodeProcessing(unsigned char *StatusCode)
  212. {
  213. unsigned char Rtn = 0;
  214. int ByteCount, BitCount;
  215. unsigned char tmp, EventCodeTmp[7];
  216. if (strlen(StatusCode) != 6) {
  217. return 0;
  218. }
  219. memset(EventCodeTmp, 0, sizeof(EventCodeTmp));
  220. memcpy(EventCodeTmp, StatusCode, strlen(StatusCode));
  221. if (*(StatusCode + 1) == 0x34) { //alarm from power cabinet itself
  222. if (StatusCode[0] == 0x30) { //trigger
  223. for (unsigned char i = 0; i < ShmSysConfigAndInfo->SysWarningInfo.WarningCount; i++) {
  224. if (memcmp(&ShmSysConfigAndInfo->SysWarningInfo.WarningCode[i][0], EventCodeTmp, 7) == 0) {
  225. Rtn = 1;
  226. break;
  227. }
  228. }
  229. if (Rtn == 0) {
  230. AddFaultCodeToBuf(EventCodeTmp);
  231. }
  232. Rtn = 1;
  233. } else if (StatusCode[0] == 0x31) { //recovery
  234. RemoveFaultCodeToBuf(EventCodeTmp);
  235. Rtn = 1;
  236. }
  237. } else {
  238. switch (*(StatusCode + 2)) {
  239. case 0x31://Fault
  240. for (ByteCount = 0; ByteCount < (sizeof(FaultStatusCode) / 6); ByteCount++) {
  241. if (memcmp(FaultStatusCode[ByteCount] + 1, StatusCode + 1, 5) == 0) {
  242. if (StatusCode[0] == 0x30) { //trigger
  243. ShmStatusCodeData->FaultCode.FaultEvents.FaultVal[ByteCount / 8] |= 1 << (ByteCount % 8);
  244. } else if (StatusCode[0] == 0x31) { //recovery
  245. ShmStatusCodeData->FaultCode.FaultEvents.FaultVal[ByteCount / 8] &= 0 << (ByteCount % 8);
  246. }
  247. Rtn = 1;
  248. break;
  249. }
  250. }
  251. break;
  252. case 0x32://Alarm
  253. for (ByteCount = 0; ByteCount < (sizeof(AlarmStatusCode) / 6); ByteCount++) {
  254. if (memcmp(AlarmStatusCode[ByteCount] + 1, StatusCode + 1, 5) == 0) {
  255. if (StatusCode[0] == 0x30) { //trigger
  256. ShmStatusCodeData->AlarmCode.AlarmEvents.AlarmVal[ByteCount / 8] |= 1 << (ByteCount % 8);
  257. } else if (StatusCode[0] == 0x31) { //recovery
  258. ShmStatusCodeData->AlarmCode.AlarmEvents.AlarmVal[ByteCount / 8] &= 0 << (ByteCount % 8);
  259. }
  260. Rtn = 1;
  261. break;
  262. }
  263. }
  264. break;
  265. case 0x33://Information
  266. for (ByteCount = 0; ByteCount < (sizeof(InfoStatusCode) / 6); ByteCount++) {
  267. if (memcmp(InfoStatusCode[ByteCount] + 1, StatusCode + 1, 5) == 0) {
  268. if (StatusCode[0] == 0x30) { //trigger
  269. ShmStatusCodeData->InfoCode.InfoEvents.InfoVal[ByteCount / 8] |= 1 << (ByteCount % 8);
  270. } else if (StatusCode[0] == 0x31) { //recovery
  271. ShmStatusCodeData->InfoCode.InfoEvents.InfoVal[ByteCount / 8] &= 0 << (ByteCount % 8);
  272. }
  273. Rtn = 1;
  274. break;
  275. }
  276. }
  277. break;
  278. default:
  279. break;
  280. }
  281. }
  282. return Rtn;
  283. }
  284. int SendPacket(unsigned char Id, unsigned char Op, unsigned char RegNum, unsigned char DataLen, unsigned char *Data)
  285. {
  286. int Rtn = 0, PacketLen, Tmp;
  287. struct ApplicationPacket SendBuffer;
  288. struct timeb ST, ET;
  289. memset(&SendBuffer, 0, sizeof(struct ApplicationPacket));
  290. SendBuffer.Se = (PacketSe++);
  291. SendBuffer.Id = Id;
  292. SendBuffer.Op = Op;
  293. SendBuffer.Len = DataLen + 1;
  294. SendBuffer.RegisterNum = RegNum;
  295. if (DataLen > 0) {
  296. memcpy(SendBuffer.Data, Data, DataLen);
  297. }
  298. PacketLen = SendBuffer.Len + 4;
  299. ftime(&ST);
  300. while (Rtn < PacketLen) {
  301. Tmp = send(TcpSock, &SendBuffer + Rtn, PacketLen - Rtn, MSG_NOSIGNAL);
  302. if (Tmp > 0) {
  303. Rtn += Tmp;
  304. }
  305. ftime(&ET);
  306. if (DiffTimeb(ST, ET) > 500) {
  307. DisconnectFlag++;
  308. if (DisconnectFlag >= 10) {
  309. DisconnectFlag = 10;
  310. }
  311. #ifdef Debug
  312. printf("Send Packet Timeout(%d/%d): SE=%d, ID=%d, OP=%d, Reg=%d",
  313. Rtn, PacketLen, PacketSe, Id, Op, RegNum);
  314. #endif
  315. return 0;
  316. }
  317. }
  318. return Rtn;
  319. }
  320. int RecvPacket(unsigned char *DataLen, struct ApplicationPacket *Packet)
  321. {
  322. int Rtn = 0, Tmp;
  323. unsigned char TmpBuf[250];
  324. struct timeb ST, ET;
  325. memset(Packet, 0, sizeof(struct ApplicationPacket));
  326. memset(TmpBuf, 0, sizeof(TmpBuf));
  327. ftime(&ST);
  328. while (Rtn < 5) {
  329. Tmp = recv(TcpSock, TmpBuf + Rtn, 5 - Rtn, 0);
  330. if (Tmp > 0) {
  331. Rtn += Tmp;
  332. }
  333. ftime(&ET);
  334. if (DiffTimeb(ST, ET) > 500) {
  335. DisconnectFlag++;
  336. if (DisconnectFlag >= 10) {
  337. DisconnectFlag = 10;
  338. }
  339. #ifdef Debug
  340. printf("Recv Packet header Timeout(%d/5)(disconnect count=%d): SE=%d, ID=%d, OP=%d, Len=%d, Reg=%d",
  341. Rtn, DisconnectFlag, TmpBuf[0], TmpBuf[1], TmpBuf[2], TmpBuf[3], TmpBuf[4]);
  342. #endif
  343. return 0;
  344. }
  345. }
  346. if ((TmpBuf[0] > 255)/*||(TmpBuf[1]>2)*/ || (TmpBuf[2] > 3) || (TmpBuf[3] > 250)) {
  347. DEBUG_INFO("Recv Wrong Packet header (%d/5): SE=%d, ID=%d, OP=%d, Len=%d, Reg=%d",
  348. Rtn, TmpBuf[0], TmpBuf[1], TmpBuf[2], TmpBuf[3], TmpBuf[4]);
  349. return 0;
  350. }
  351. memcpy(Packet, TmpBuf, 5);
  352. *DataLen = Packet->Len - 1;
  353. memset(TmpBuf, 0, sizeof(TmpBuf));
  354. Rtn = 0;
  355. ftime(&ST);
  356. while (Rtn < *DataLen) {
  357. Tmp = recv(TcpSock, TmpBuf + Rtn, *DataLen - Rtn, 0);
  358. if (Tmp > 0) {
  359. Rtn += Tmp;
  360. }
  361. ftime(&ET);
  362. if (DiffTimeb(ST, ET) > 500) {
  363. DEBUG_INFO("Recv Packet Timeout(%d/%d): SE=%d, ID=%d, OP=%d, Reg=%d",
  364. Rtn, *DataLen, Packet->Se, Packet->Id, Packet->Op, Packet->RegisterNum);
  365. return 0;
  366. }
  367. }
  368. memcpy(Packet->Data, TmpBuf, *DataLen);
  369. DisconnectFlag = 0;
  370. return Rtn;
  371. }
  372. int WriteModelName()
  373. {
  374. unsigned char Tmp = 0;
  375. unsigned char TmpBuf[255];
  376. struct ApplicationPacket PacketData;
  377. memset(TmpBuf, 0, sizeof(TmpBuf));
  378. memset(&PacketData, 0, sizeof(struct ApplicationPacket));
  379. memcpy(TmpBuf, ShmSysConfigAndInfo->SysConfig.ModelName, strlen(ShmSysConfigAndInfo->SysConfig.ModelName));
  380. Tmp = (unsigned char)(ShmPrimaryMcuData->InputDet.bits.Key2 << 2 | ShmPrimaryMcuData->InputDet.bits.Key1 << 1 | ShmPrimaryMcuData->InputDet.bits.Key0);
  381. TmpBuf[strlen(ShmSysConfigAndInfo->SysConfig.ModelName)] = Tmp; //Dispenser switch value
  382. #ifdef Debug
  383. printf("WriteModelName(%s)(%d) => ", ShmSysConfigAndInfo->SysConfig.ModelName, Tmp);
  384. #endif
  385. if (SendPacket(0xFF, 0x02, 0x01, strlen(ShmSysConfigAndInfo->SysConfig.ModelName) + 1, TmpBuf) <= 0) {
  386. #ifdef Debug
  387. printf("SendPacket Fail\n");
  388. #endif
  389. return -1;
  390. }
  391. if (RecvPacket(&Tmp, &PacketData) <= 0) {
  392. #ifdef Debug
  393. printf("RecvPacket Fail\n");
  394. #endif
  395. return -1;
  396. }
  397. if (PacketData.Data[0] != 1) { //!=OK
  398. #ifdef Debug
  399. printf("NG\n");
  400. #endif
  401. return -1;
  402. }
  403. #ifdef Debug
  404. printf("OK\n");
  405. #endif
  406. return 1;
  407. }
  408. int ReadConnectorID()
  409. {
  410. unsigned char Tmp = 0;
  411. struct ApplicationPacket PacketData;
  412. memset(&PacketData, 0, sizeof(struct ApplicationPacket));
  413. #ifdef Debug
  414. printf("ReadConnectorID => ");
  415. #endif
  416. if (SendPacket(0xFF, 0x01, 0x02, 0, PacketData.Data) <= 0) {
  417. #ifdef Debug
  418. printf("SendPacket Fail\n");
  419. #endif
  420. return -1;
  421. }
  422. if (RecvPacket(&Tmp, &PacketData) <= 0) {
  423. #ifdef Debug
  424. printf("RecvPacket Fail\n");
  425. #endif
  426. return -1;
  427. }
  428. if (PacketData.Data[0] != 1) { //!=OK
  429. #ifdef Debug
  430. printf("NG\n");
  431. #endif
  432. return -1;
  433. }
  434. #ifdef Debug
  435. printf("OK (Left connector ID = %d, Right connector ID = %d)\n", PacketData.Data[1], PacketData.Data[2]);
  436. #endif
  437. return 1;
  438. }
  439. int ReadDoStatus()
  440. {
  441. unsigned char Tmp = 0, count, Rtn;
  442. struct ApplicationPacket PacketData;
  443. unsigned char StatusArray[20][6];
  444. unsigned char EventCodeTmp[7];
  445. memset(&PacketData, 0, sizeof(struct ApplicationPacket));
  446. memset(StatusArray, 0, sizeof(StatusArray));
  447. #ifdef Debug
  448. printf("ReadDoStatus => ");
  449. #endif
  450. if (SendPacket(0x01, 0x01, 0x03, 0, PacketData.Data) <= 0) {
  451. #ifdef Debug
  452. printf("SendPacket Fail\n");
  453. #endif
  454. return -1;
  455. }
  456. if (RecvPacket(&Tmp, &PacketData) <= 0) {
  457. #ifdef Debug
  458. printf("RecvPacket Fail\n");
  459. #endif
  460. return -1;
  461. }
  462. if (PacketData.Data[0] != 1) { //!=OK
  463. #ifdef Debug
  464. printf("NG\n");
  465. #endif
  466. return -1;
  467. }
  468. Tmp--;//decrase OK/NG byte
  469. if (Tmp < 6) {
  470. if (ShmSysConfigAndInfo->SysWarningInfo.WarningCount > 0) {
  471. for (unsigned char i = 0; i < ShmSysConfigAndInfo->SysWarningInfo.WarningCount; i++) {
  472. if (ShmSysConfigAndInfo->SysWarningInfo.WarningCode[i][1] >= 0x33) { //from backend or power cabinet
  473. memset(EventCodeTmp, 0, sizeof(EventCodeTmp));
  474. memcpy(EventCodeTmp, ShmSysConfigAndInfo->SysWarningInfo.WarningCode[i], sizeof(EventCodeTmp));
  475. RemoveFaultCodeToBuf(EventCodeTmp);
  476. }
  477. }
  478. }
  479. #ifdef Debug
  480. printf("no alarm (%d)\n", Tmp);
  481. #endif
  482. return -1;
  483. }
  484. #ifdef Debug
  485. printf("OK, (%d) ", Tmp);
  486. //printf("PacketData.Se=%d\n",PacketData.Se);
  487. //printf("PacketData.Id=%d\n",PacketData.Id);
  488. //printf("PacketData.Op=%d\n",PacketData.Op);
  489. //printf("PacketData.Len=%d\n",PacketData.Len);
  490. //printf("PacketData.RegisterNum=%d\n",PacketData.RegisterNum);
  491. //for(Rtn=0;Rtn<=PacketData.Len-1;Rtn++)
  492. //printf("PacketData.Data[%d]=0x%x\n",Rtn,PacketData.Data[Rtn]);
  493. #endif
  494. for (count = 0; count < Tmp; count += 6) {
  495. //if((Tmp-count)<6)
  496. strncpy(StatusArray[count / 6], (PacketData.Data + 1) + count, 6);
  497. Rtn = 0;
  498. for (unsigned char i = 0; i < ShmSysConfigAndInfo->SysWarningInfo.WarningCount; i++) {
  499. if (memcmp(&ShmSysConfigAndInfo->SysWarningInfo.WarningCode[i][0], StatusArray[count / 6], 6) == 0) {
  500. Rtn = 1;
  501. break;
  502. }
  503. }
  504. if (Rtn == 0) {
  505. AddFaultCodeToBuf(StatusArray[count / 6]);
  506. }
  507. //Rtn=StatusCodeProcessing(StatusArray[count/6]);
  508. #ifdef Debug
  509. printf("(%d)(%s) = %s, ", count / 6, Rtn == 1 ? "Process OK" : "Process NG", StatusArray[count / 6]);
  510. #endif
  511. }
  512. for (unsigned char i = 0; i < ShmSysConfigAndInfo->SysWarningInfo.WarningCount; i++) {
  513. if (ShmSysConfigAndInfo->SysWarningInfo.WarningCode[i][1] >= 0x33) { //from backend or power cabinet
  514. Rtn = 0;
  515. for (count = 0; count < (Tmp / 6); count++) {
  516. if (memcmp(&ShmSysConfigAndInfo->SysWarningInfo.WarningCode[i][0], StatusArray[count], 6) == 0) {
  517. Rtn = 1;
  518. break;
  519. }
  520. }
  521. if (Rtn == 0) {
  522. memset(EventCodeTmp, 0, sizeof(EventCodeTmp));
  523. memcpy(EventCodeTmp, ShmSysConfigAndInfo->SysWarningInfo.WarningCode[i], sizeof(EventCodeTmp));
  524. RemoveFaultCodeToBuf(EventCodeTmp);
  525. }
  526. }
  527. }
  528. #ifdef Debug
  529. printf("\n");
  530. #endif
  531. return 1;
  532. }
  533. int WriteDdStatus()
  534. {
  535. unsigned char Tmp = 0, count;
  536. unsigned char TmpBuf[255], CurWarnCodeTmp[10][6], PreWarnCodeTmp[10][6];
  537. struct ApplicationPacket PacketData;
  538. if ((ShmSysConfigAndInfo->SysWarningInfo.WarningCount <= 0) && (PreSysWarningInfo.WarningCount <= 0)) {
  539. return -1;
  540. }
  541. memset(CurWarnCodeTmp, 0, sizeof(CurWarnCodeTmp));
  542. Tmp = ShmSysConfigAndInfo->SysWarningInfo.WarningCount;
  543. for (count = 0; count < Tmp; count++) {
  544. memcpy(CurWarnCodeTmp[count], ShmSysConfigAndInfo->SysWarningInfo.WarningCode[count], 6);
  545. }
  546. memset(PreWarnCodeTmp, 0, sizeof(PreWarnCodeTmp));
  547. Tmp = PreSysWarningInfo.WarningCount;
  548. for (count = 0; count < Tmp; count++) {
  549. memcpy(PreWarnCodeTmp[count], PreSysWarningInfo.WarningCode[count], 6);
  550. }
  551. if (strcmp(CurWarnCodeTmp, PreWarnCodeTmp) == 0) {
  552. return -1;
  553. }
  554. /*memset(TmpBuf,0,sizeof(TmpBuf));
  555. Tmp=ShmSysConfigAndInfo->SysWarningInfo.WarningCount;
  556. for(count=0;count<Tmp;count++)
  557. {
  558. memcpy(TmpBuf+(count*6),ShmSysConfigAndInfo->SysWarningInfo.WarningCode[count],6);
  559. #ifdef Debug
  560. printf("WriteDdStatus(%d) = %s", count, ShmSysConfigAndInfo->SysWarningInfo.WarningCode[count]);
  561. #endif
  562. }
  563. if(SendPacket(0x01, 0x02, 0x04,strlen(TmpBuf), TmpBuf)<=0)
  564. return -1;
  565. */
  566. #ifdef Debug
  567. printf("WriteDdStatus => ");
  568. #endif
  569. if (SendPacket(0x01, 0x02, 0x04, strlen(CurWarnCodeTmp), CurWarnCodeTmp) <= 0) {
  570. #ifdef Debug
  571. printf("SendPacket Fail\n");
  572. #endif
  573. return -1;
  574. }
  575. memset(&PacketData, 0, sizeof(struct ApplicationPacket));
  576. if (RecvPacket(&Tmp, &PacketData) <= 0) {
  577. #ifdef Debug
  578. printf("RecvPacket Fail\n");
  579. #endif
  580. return -1;
  581. }
  582. if (PacketData.Data[0] != 1) { //!=OK
  583. #ifdef Debug
  584. printf("NG\n");
  585. #endif
  586. return -1;
  587. }
  588. memset(&PreSysWarningInfo, 0, sizeof(struct WARNING_CODE_INFO));
  589. memcpy(&PreSysWarningInfo, &(ShmSysConfigAndInfo->SysWarningInfo), sizeof(struct WARNING_CODE_INFO));
  590. #ifdef Debug
  591. printf("OK, ");
  592. Tmp = ShmSysConfigAndInfo->SysWarningInfo.WarningCount;
  593. for (count = 0; count < Tmp; count++) {
  594. printf("(%d)%s, ", count, ShmSysConfigAndInfo->SysWarningInfo.WarningCode[count]);
  595. }
  596. printf("\n");
  597. #endif
  598. return 1;
  599. }
  600. int ReadChargingCapability(unsigned char PlugNum)
  601. {
  602. unsigned char Tmp = 0;
  603. struct ApplicationPacket PacketData;
  604. float MaxVolt, MaxCurrent, MaxPower;
  605. #ifdef Debug
  606. printf("Read Charging Capability => ");
  607. #endif
  608. memset(&PacketData, 0, sizeof(struct ApplicationPacket));
  609. if (SendPacket(PlugNum, 0x01, 0x05, 0, PacketData.Data) <= 0) {
  610. #ifdef Debug
  611. printf("SendPacket Fail\n");
  612. #endif
  613. return -1;
  614. }
  615. if (RecvPacket(&Tmp, &PacketData) <= 0) {
  616. #ifdef Debug
  617. printf("RecvPacket Fail\n");
  618. #endif
  619. return -1;
  620. }
  621. if (PacketData.Data[0] != 1) { //!=OK
  622. #ifdef Debug
  623. printf("NG\n");
  624. #endif
  625. return -1;
  626. }
  627. MaxVolt = (float)(PacketData.Data[1] << 8 | PacketData.Data[2]);
  628. MaxCurrent = (float)(PacketData.Data[3] << 8 | PacketData.Data[4]);
  629. MaxPower = (float)(PacketData.Data[5] << 8 | PacketData.Data[6]);
  630. if ((MaxVolt >= 0) && (MaxVolt <= 10000)) {
  631. ChargingData[PlugNum - 1]->MaximumChargingVoltage = MaxVolt;
  632. }
  633. if ((MaxCurrent >= 0) && (MaxCurrent <= 5000)) {
  634. ChargingData[PlugNum - 1]->AvailableChargingCurrent = MaxCurrent;
  635. }
  636. if ((MaxPower >= 0) && (MaxPower <= 3600)) {
  637. ChargingData[PlugNum - 1]->AvailableChargingPower = MaxPower;
  638. }
  639. #ifdef Debug
  640. printf(" MaxVolt=%f, MaxCurrent=%f, MaxPower=%f,\n", MaxVolt, MaxCurrent, MaxPower);
  641. #endif
  642. return 1;
  643. }
  644. int WriteChargingTarget(unsigned char PlugNum)
  645. {
  646. unsigned char Tmp = 0;
  647. unsigned char TmpBuf[255];
  648. struct ApplicationPacket PacketData;
  649. float ChargingVolt, ChargingAmp;
  650. memset(TmpBuf, 0, sizeof(TmpBuf));
  651. memset(&PacketData, 0, sizeof(struct ApplicationPacket));
  652. ChargingVolt = ChargingData[PlugNum - 1]->EvBatterytargetVoltage;
  653. ChargingAmp = ChargingData[PlugNum - 1]->EvBatterytargetCurrent;
  654. ChargingVolt *= 10;
  655. ChargingAmp *= 10;
  656. TmpBuf[0] = ((unsigned short)ChargingVolt >> 8) & 0xFF;
  657. TmpBuf[1] = ((unsigned short)ChargingVolt) & 0xFF;
  658. TmpBuf[2] = ((unsigned short)ChargingAmp >> 8) & 0xFF;
  659. TmpBuf[3] = ((unsigned short)ChargingAmp) & 0xFF;
  660. #ifdef Debug
  661. printf("WriteChargingTarget(%d), EvBatterytargetVoltage=%f,EvBatteryMaxVoltage=%f => ",
  662. PlugNum, ChargingData[PlugNum - 1]->EvBatterytargetVoltage, ChargingData[PlugNum - 1]->EvBatteryMaxVoltage);
  663. #endif
  664. if (SendPacket(PlugNum, 0x02, 0x06, 4, TmpBuf) <= 0) {
  665. #ifdef Debug
  666. printf("SendPacket Fail\n");
  667. #endif
  668. return -1;
  669. }
  670. if (RecvPacket(&Tmp, &PacketData) <= 0) {
  671. #ifdef Debug
  672. printf("RecvPacket Fail\n");
  673. #endif
  674. return -1;
  675. }
  676. if (PacketData.Data[0] != 1) { //!=OK
  677. #ifdef Debug
  678. printf("NG\n");
  679. #endif
  680. return -1;
  681. }
  682. #ifdef Debug
  683. printf("ChargingVolt=%f, ChargingAmp=%f\n", ChargingVolt / 10, ChargingAmp / 10);
  684. #endif
  685. return 1;
  686. }
  687. int ReadSoftwareUpdate()
  688. {
  689. unsigned char Tmp = 0;
  690. struct ApplicationPacket PacketData;
  691. memset(&PacketData, 0, sizeof(struct ApplicationPacket));
  692. if (SendPacket(0x01, 0x01, 0x07, 0, PacketData.Data) <= 0) {
  693. return -1;
  694. }
  695. if (RecvPacket(&Tmp, &PacketData) <= 0) {
  696. return -1;
  697. }
  698. if (PacketData.Data[0] != 1) { //!=OK
  699. return -1;
  700. }
  701. if (PacketData.Data[1] != 0x01) { //not update
  702. return -1;
  703. }
  704. return PacketData.Data[1];
  705. }
  706. int WritePlugInStatus(unsigned char PlugNum)
  707. {
  708. unsigned char Tmp = 0;
  709. unsigned char TmpBuf[255];
  710. struct ApplicationPacket PacketData;
  711. memset(TmpBuf, 0, sizeof(TmpBuf));
  712. memset(&PacketData, 0, sizeof(struct ApplicationPacket));
  713. TmpBuf[0] = ChargingData[PlugNum - 1]->ConnectorPlugIn;
  714. #ifdef Debug
  715. printf("WritePlugInStatus(%d) =>", PlugNum);
  716. #endif
  717. if (SendPacket(PlugNum, 0x02, 0x08, 1, TmpBuf) <= 0) {
  718. #ifdef Debug
  719. printf("SendPacket Fail\n");
  720. #endif
  721. return -1;
  722. }
  723. if (RecvPacket(&Tmp, &PacketData) <= 0) {
  724. #ifdef Debug
  725. printf("RecvPacket Fail\n");
  726. #endif
  727. return -1;
  728. }
  729. if (PacketData.Data[0] != 1) { //!=OK
  730. #ifdef Debug
  731. printf("NG\n");
  732. #endif
  733. return -1;
  734. }
  735. #ifdef Debug
  736. printf(" %s\n", TmpBuf[0] == 1 ? "Plug-in" : "Un-plug");
  737. #endif
  738. return 1;
  739. }
  740. int WriteConnectorState(unsigned char PlugNum)
  741. {
  742. unsigned char Tmp = 0;
  743. unsigned char TmpBuf[255];
  744. struct ApplicationPacket PacketData;
  745. memset(TmpBuf, 0, sizeof(TmpBuf));
  746. memset(&PacketData, 0, sizeof(struct ApplicationPacket));
  747. if (ChargingData[PlugNum - 1]->SystemStatus <= 2) {
  748. TmpBuf[0] = 0; //idle
  749. } else if ((ChargingData[PlugNum - 1]->SystemStatus <= 7) || (ChargingData[PlugNum - 1]->SystemStatus == 17) || (ChargingData[PlugNum - 1]->SystemStatus == 18)) {
  750. TmpBuf[0] = 1; //preparing
  751. } else if (ChargingData[PlugNum - 1]->SystemStatus == 8) {
  752. TmpBuf[0] = 2; //charging
  753. } else if (ChargingData[PlugNum - 1]->SystemStatus == 9) {
  754. TmpBuf[0] = 3; //terminating
  755. }
  756. #ifdef Debug
  757. printf("WriteConnectorState(%d) SystemStatus=%d,TmpBuf[0]=%d => ", PlugNum, ChargingData[PlugNum - 1]->SystemStatus, TmpBuf[0]);
  758. #endif
  759. if (SendPacket(PlugNum, 0x02, 0x09, 1, TmpBuf) <= 0) {
  760. #ifdef Debug
  761. printf("SendPacket Fail\n");
  762. #endif
  763. return -1;
  764. }
  765. if (RecvPacket(&Tmp, &PacketData) <= 0) {
  766. #ifdef Debug
  767. printf("RecvPacket Fail\n");
  768. #endif
  769. return -1;
  770. }
  771. if (PacketData.Data[0] != 1) { //!=OK
  772. #ifdef Debug
  773. printf("NG\n");
  774. #endif
  775. return -1;
  776. }
  777. #ifdef Debug
  778. printf(" %d\n", TmpBuf[0]);
  779. #endif
  780. return 1;
  781. }
  782. int WriteUserID(unsigned char ConnectorID, unsigned char *UserID)
  783. {
  784. unsigned char Tmp = 0;
  785. unsigned char TmpBuf[255];
  786. struct ApplicationPacket PacketData;
  787. if (strlen(UserID) <= 0) {
  788. return -1;
  789. }
  790. memset(TmpBuf, 0, sizeof(TmpBuf));
  791. memset(&PacketData, 0, sizeof(struct ApplicationPacket));
  792. strcpy(TmpBuf, UserID);
  793. #ifdef Debug
  794. printf("WriteUserID(%d) => ", ConnectorID);
  795. #endif
  796. if (SendPacket(ConnectorID, 0x02, 0x0A, strlen(TmpBuf), TmpBuf) <= 0) {
  797. #ifdef Debug
  798. printf("SendPacket Fail\n");
  799. #endif
  800. return -1;
  801. }
  802. if (RecvPacket(&Tmp, &PacketData) <= 0) {
  803. #ifdef Debug
  804. printf("RecvPacket Fail\n");
  805. #endif
  806. return -1;
  807. }
  808. if (PacketData.Data[0] != 1) { //!=OK
  809. #ifdef Debug
  810. printf("NG\n");
  811. #endif
  812. return -1;
  813. }
  814. #ifdef Debug
  815. printf(" StartUserId=%s, PacketData.Data[1]=%d\n", TmpBuf, PacketData.Data[1]);
  816. #endif
  817. return PacketData.Data[1];
  818. }
  819. int ReadChargePermission(unsigned char PlugNum)
  820. {
  821. unsigned char Tmp = 0;
  822. struct ApplicationPacket PacketData;
  823. memset(&PacketData, 0, sizeof(struct ApplicationPacket));
  824. #ifdef Debug
  825. printf("ReadChargePermission[%d] => ", PlugNum);
  826. #endif
  827. if (SendPacket(PlugNum, 0x01, 0x0B, 0, PacketData.Data) <= 0) {
  828. #ifdef Debug
  829. printf("SendPacket Fail\n");
  830. #endif
  831. return -1;
  832. }
  833. if (RecvPacket(&Tmp, &PacketData) <= 0) {
  834. #ifdef Debug
  835. printf("RecvPacket Fail\n");
  836. #endif
  837. return -1;
  838. }
  839. if (PacketData.Data[0] != 1) { //!=OK
  840. #ifdef Debug
  841. printf("NG\n");
  842. #endif
  843. return -1;
  844. }
  845. #ifdef Debug
  846. printf(" %s\n", PacketData.Data[1] == 1 ? "Permitted" : "NOT permitted" );
  847. #endif
  848. return PacketData.Data[1];
  849. }
  850. int FindChargingInfoData(byte target, struct ChargingInfoData **chargingData)
  851. {
  852. for (byte index = 0; index < CHAdeMO_QUANTITY; index++) {
  853. if (ShmSysConfigAndInfo->SysInfo.ChademoChargingData[index].Index == target) {
  854. chargingData[target] = &ShmSysConfigAndInfo->SysInfo.ChademoChargingData[index];
  855. return 1;
  856. }
  857. }
  858. for (byte index = 0; index < CCS_QUANTITY; index++) {
  859. if (ShmSysConfigAndInfo->SysInfo.CcsChargingData[index].Index == target) {
  860. chargingData[target] = &ShmSysConfigAndInfo->SysInfo.CcsChargingData[index];
  861. return 1;
  862. }
  863. }
  864. for (byte index = 0; index < GB_QUANTITY; index++) {
  865. if (ShmSysConfigAndInfo->SysInfo.GbChargingData[index].Index == target) {
  866. chargingData[target] = &ShmSysConfigAndInfo->SysInfo.GbChargingData[index];
  867. return 1;
  868. }
  869. }
  870. return 0;
  871. }
  872. int MessageTrigger(unsigned char connectorID)
  873. {
  874. struct timeb NowTime;
  875. unsigned char Reg;
  876. for (Reg = 0; Reg < TriggerMsgeNum; Reg++) {
  877. ftime(&NowTime);
  878. switch (Reg) {
  879. case 3://ReadDoStatus
  880. if (DiffTimeb(TriggerTimeUp[connectorID - 1][Reg], NowTime) > 1000) {
  881. if (ReadDoStatus()) {
  882. ftime(&TriggerTimeUp[connectorID - 1][Reg]);
  883. }
  884. }
  885. break;
  886. case 4://WriteDdStatus
  887. if (DiffTimeb(TriggerTimeUp[connectorID - 1][Reg], NowTime) > 1000) {
  888. if (WriteDdStatus()) {
  889. ftime(&TriggerTimeUp[connectorID - 1][Reg]);
  890. }
  891. }
  892. break;
  893. /*case 5://ReadChargingCapability
  894. if(DiffTimeb(TriggerTimeUp[connectorID-1][Reg],NowTime)>200)
  895. {
  896. if(ReadChargingCapability(connectorID))
  897. {
  898. ftime(&TriggerTimeUp[connectorID-1][Reg]);
  899. }
  900. }
  901. break;
  902. case 6://WriteChargingTarget
  903. if(DiffTimeb(TriggerTimeUp[connectorID-1][Reg],NowTime)>100)
  904. {
  905. if(WriteChargingTarget(connectorID))
  906. {
  907. ftime(&TriggerTimeUp[connectorID-1][Reg]);
  908. }
  909. }
  910. break;*/
  911. case 8://WritePlugInStatus
  912. if (DiffTimeb(TriggerTimeUp[connectorID - 1][Reg], NowTime) > 1000) {
  913. if (WritePlugInStatus(connectorID)) {
  914. ftime(&TriggerTimeUp[connectorID - 1][Reg]);
  915. }
  916. }
  917. break;
  918. case 9://WriteConnectorState
  919. if (DiffTimeb(TriggerTimeUp[connectorID - 1][Reg], NowTime) > 1000) {
  920. if (WriteConnectorState(connectorID)) {
  921. ftime(&TriggerTimeUp[connectorID - 1][Reg]);
  922. }
  923. }
  924. break;
  925. /*case 0x0B://ReadChargePermission
  926. if(DiffTimeb(TriggerTimeUp[connectorID-1][Reg],NowTime)>1000)
  927. {
  928. if(ReadChargePermission(connectorID))
  929. {
  930. ftime(&TriggerTimeUp[connectorID-1][Reg]);
  931. }
  932. }
  933. break;*/
  934. default:
  935. break;
  936. }
  937. }
  938. }
  939. int main(int argc, char *argv[])
  940. {
  941. unsigned char Tmp, PlugNum;
  942. int Rtn;
  943. struct timeb AuthNowTime;
  944. /**************** Initialization **********/
  945. if (InitShareMemory() == 0) {
  946. #ifdef SystemLogMessage
  947. DEBUG_ERROR("InitShareMemory NG\n");
  948. #endif
  949. if (ShmStatusCodeData != NULL) {
  950. ShmStatusCodeData->AlarmCode.AlarmEvents.bits.FailToCreateShareMemory = 1;
  951. }
  952. sleep(5);
  953. return 0;
  954. }
  955. ReConnect:
  956. memset(&PreSysWarningInfo, 0, sizeof(struct WARNING_CODE_INFO));
  957. PacketSe = 0;
  958. DisconnectFlag = 0;
  959. for (byte _index = 0; _index < ShmSysConfigAndInfo->SysConfig.TotalConnectorCount; _index++) {
  960. if (!FindChargingInfoData(_index, &ChargingData[0])) {
  961. DEBUG_ERROR("FindChargingInfoData false \n");
  962. break;
  963. }
  964. }
  965. /**************** Check Network **********/
  966. DEBUG_INFO("Check Dispenser Network Information");
  967. while (!CheckNetworkStatus()) {
  968. sleep(1);
  969. if (DisconnectFlag >= 10) {
  970. ShmStatusCodeData->AlarmCode.AlarmEvents.bits.DisconnectedFromDo = 1;
  971. } else {
  972. DisconnectFlag++;
  973. }
  974. }
  975. DEBUG_INFO("Dispenser Network Information checked: IP=%s Netmask=%s, Gateway=%s",
  976. ShmSysConfigAndInfo->SysConfig.Eth0Interface.EthIpAddress,
  977. ShmSysConfigAndInfo->SysConfig.Eth0Interface.EthSubmaskAddress,
  978. ShmSysConfigAndInfo->SysConfig.Eth0Interface.EthGatewayAddress);
  979. /**************** Power cabinet connection **********/
  980. DEBUG_INFO("Connect to Power Cabinet");
  981. while (TcpConnected() < 0) {
  982. sleep(1);
  983. if (DisconnectFlag >= 5) {
  984. ShmStatusCodeData->AlarmCode.AlarmEvents.bits.DisconnectedFromDo = 1;
  985. } else {
  986. DisconnectFlag++;
  987. }
  988. }
  989. DEBUG_INFO("Power cabinet connected(TcpSock=%d): IP=%s Netmask=%s, Gateway=%s",
  990. TcpSock,
  991. ShmSysConfigAndInfo->SysConfig.Eth0Interface.EthIpAddress,
  992. ShmSysConfigAndInfo->SysConfig.Eth0Interface.EthSubmaskAddress,
  993. ShmSysConfigAndInfo->SysConfig.Eth0Interface.EthGatewayAddress);
  994. /**************** Write Model Name**********/
  995. DEBUG_INFO("Write Model Name");
  996. while (WriteModelName() < 0) {
  997. sleep(1);
  998. if (DisconnectFlag >= 5) {
  999. ShmStatusCodeData->AlarmCode.AlarmEvents.bits.DisconnectedFromDo = 1;
  1000. } else {
  1001. DisconnectFlag++;
  1002. }
  1003. }
  1004. DEBUG_INFO("Write Model Name OK: %s", ShmSysConfigAndInfo->SysConfig.ModelName);
  1005. /**************** Get Connector ID**********/
  1006. DEBUG_INFO("Get Connector ID");
  1007. while (ReadConnectorID() < 0) {
  1008. sleep(1);
  1009. if (DisconnectFlag >= 5) {
  1010. ShmStatusCodeData->AlarmCode.AlarmEvents.bits.DisconnectedFromDo = 1;
  1011. } else {
  1012. DisconnectFlag++;
  1013. }
  1014. }
  1015. DEBUG_INFO("Get Connector ID OK");
  1016. /*while(1)
  1017. {
  1018. //for self testin main.c
  1019. if(ShmSysConfigAndInfo->SysInfo.SelfTestSeq >= _STEST_PSU_DETECT)
  1020. {
  1021. ShmSysConfigAndInfo->SysInfo.SelfTestSeq = _STEST_PSU_CAP;
  1022. break;
  1023. }
  1024. }*/
  1025. for (Tmp = 0; Tmp < TriggerMsgeNum; Tmp++) {
  1026. ftime(&TriggerTimeUp[0][Tmp]);
  1027. ftime(&TriggerTimeUp[1][Tmp]);
  1028. usleep(50000);
  1029. }
  1030. ShmStatusCodeData->AlarmCode.AlarmEvents.bits.DisconnectedFromDo = 0;
  1031. DEBUG_INFO("Start Communication");
  1032. /**************** Data transmission**********/
  1033. while (1) {
  1034. if ((ShmOCPP16Data->SpMsg.bits.AuthorizeReq == 1) || (ShmSysConfigAndInfo->SysInfo.AuthorizeFlag == 1)) {
  1035. ftime(&AuthNowTime);
  1036. if (DiffTimeb(TriggerTimeUp[0][10], AuthNowTime) > 1000) {
  1037. Rtn = WriteUserID(ShmSysConfigAndInfo->SysInfo.CurGunSelected, ShmSysConfigAndInfo->SysConfig.UserId);
  1038. if (Rtn >= 0) {
  1039. memset(ShmOCPP16Data->Authorize.ResponseIdTagInfo.Status, 0, sizeof(ShmOCPP16Data->Authorize.ResponseIdTagInfo.Status));
  1040. if (Rtn == 0) {
  1041. strcpy(ShmOCPP16Data->Authorize.ResponseIdTagInfo.Status, "Invalid");
  1042. } else {
  1043. strcpy(ShmOCPP16Data->Authorize.ResponseIdTagInfo.Status, "Accepted");
  1044. }
  1045. ShmOCPP16Data->SpMsg.bits.AuthorizeConf = 1; //isAuthorizedComplete
  1046. ShmOCPP16Data->SpMsg.bits.AuthorizeReq = 0;
  1047. ShmSysConfigAndInfo->SysInfo.AuthorizeFlag = 0;
  1048. ShmPsuData->SystemAvailablePower = 0;
  1049. ShmPsuData->SystemPresentPsuQuantity = 0;
  1050. }
  1051. ftime(&TriggerTimeUp[0][10]);
  1052. }
  1053. }
  1054. for (PlugNum = 1; PlugNum <= ShmSysConfigAndInfo->SysConfig.TotalConnectorCount; PlugNum++) {
  1055. //printf("ChargingData[PlugNum-1]->SystemStatus=%d\n",ChargingData[PlugNum-1]->SystemStatus);
  1056. //printf("ShmOCPP16Data->SpMsg.bits.AuthorizeReq=%d\n",ShmOCPP16Data->SpMsg.bits.AuthorizeReq);
  1057. //printf("ShmSysConfigAndInfo->SysInfo.AuthorizeFlag=%d\n",ShmSysConfigAndInfo->SysInfo.AuthorizeFlag);
  1058. //printf("ChargingData[%d]->FireChargingVoltage=%f\n",PlugNum,ChargingData[PlugNum-1]->FireChargingVoltage);
  1059. //printf("ChargingData[%d]->PresentChargingCurrent=%f\n",PlugNum,ChargingData[PlugNum-1]->PresentChargingCurrent);
  1060. switch (ChargingData[PlugNum - 1]->SystemStatus) {
  1061. case S_IDLE:
  1062. case S_RESERVATION:
  1063. case S_MAINTAIN:
  1064. case S_ALARM:
  1065. case S_AUTHORIZING:
  1066. if ((ShmOCPP16Data->SpMsg.bits.AuthorizeReq == 1) || (ShmSysConfigAndInfo->SysInfo.AuthorizeFlag == 1)) {
  1067. ftime(&AuthNowTime);
  1068. if (DiffTimeb(TriggerTimeUp[PlugNum - 1][10], AuthNowTime) > 1000) {
  1069. Rtn = WriteUserID(ShmSysConfigAndInfo->SysInfo.CurGunSelected, ShmSysConfigAndInfo->SysConfig.UserId);
  1070. if (Rtn >= 0) {
  1071. memset(ShmOCPP16Data->Authorize.ResponseIdTagInfo.Status, 0, sizeof(ShmOCPP16Data->Authorize.ResponseIdTagInfo.Status));
  1072. if (Rtn == 0) {
  1073. strcpy(ShmOCPP16Data->Authorize.ResponseIdTagInfo.Status, "Invalid");
  1074. } else {
  1075. strcpy(ShmOCPP16Data->Authorize.ResponseIdTagInfo.Status, "Accepted");
  1076. }
  1077. ShmOCPP16Data->SpMsg.bits.AuthorizeConf = 1; //isAuthorizedComplete
  1078. ShmOCPP16Data->SpMsg.bits.AuthorizeReq = 0;
  1079. ShmSysConfigAndInfo->SysInfo.AuthorizeFlag = 0;
  1080. ShmPsuData->SystemAvailablePower = 0;
  1081. ShmPsuData->SystemPresentPsuQuantity = 0;
  1082. ftime(&TriggerTimeUp[PlugNum - 1][10]);
  1083. }
  1084. ftime(&TriggerTimeUp[PlugNum - 1][10]);
  1085. }
  1086. }
  1087. /*if(ReadSoftwareUpdate())//0x07
  1088. {
  1089. //firmware update
  1090. }*/
  1091. break;
  1092. case S_PREPARNING: //get permission
  1093. //printf("S_PREPARNING\n");
  1094. ftime(&AuthNowTime);
  1095. if (DiffTimeb(TriggerTimeUp[PlugNum - 1][11], AuthNowTime) > 1000) {
  1096. if ((ReadChargePermission(PlugNum)) && (ReadChargingCapability(PlugNum))) {
  1097. ShmPsuData->SystemAvailablePower = ChargingData[0]->AvailableChargingPower + ChargingData[1]->AvailableChargingPower;
  1098. ShmPsuData->SystemPresentPsuQuantity = ShmPsuData->SystemAvailablePower / 30;
  1099. }
  1100. ftime(&TriggerTimeUp[PlugNum - 1][11]);
  1101. }
  1102. break;
  1103. case S_PREPARING_FOR_EV://wait connector lock
  1104. //printf("S_PREPARING_FOR_EV\n");
  1105. ftime(&AuthNowTime);
  1106. if (DiffTimeb(TriggerTimeUp[PlugNum - 1][5], AuthNowTime) > 1000) {
  1107. ReadChargingCapability(PlugNum);
  1108. ftime(&TriggerTimeUp[PlugNum - 1][5]);
  1109. }
  1110. ftime(&AuthNowTime);
  1111. if (DiffTimeb(TriggerTimeUp[PlugNum - 1][11], AuthNowTime) > 1000) {
  1112. if (ReadChargePermission(PlugNum) == 0) {
  1113. DEBUG_INFO("Stop charging by power cabinet's permission");
  1114. ChargingData[PlugNum - 1]->StopChargeFlag = 1;
  1115. }
  1116. ftime(&TriggerTimeUp[PlugNum - 1][11]);
  1117. }
  1118. break;
  1119. case S_PREPARING_FOR_EVSE: //insaulation test
  1120. case S_CCS_PRECHARGE_ST0:
  1121. case S_CCS_PRECHARGE_ST1:
  1122. //printf("S_PREPARING_FOR_EVSE\n");
  1123. WriteChargingTarget(PlugNum);
  1124. ftime(&AuthNowTime);
  1125. if (DiffTimeb(TriggerTimeUp[PlugNum - 1][5], AuthNowTime) > 1000) {
  1126. ReadChargingCapability(PlugNum);
  1127. ftime(&TriggerTimeUp[PlugNum - 1][5]);
  1128. }
  1129. ftime(&AuthNowTime);
  1130. if (DiffTimeb(TriggerTimeUp[PlugNum - 1][11], AuthNowTime) > 1000) {
  1131. if (ReadChargePermission(PlugNum) == 0) {
  1132. DEBUG_INFO("Stop charging by power cabinet's permission");
  1133. ChargingData[PlugNum - 1]->StopChargeFlag = 1;
  1134. }
  1135. ftime(&TriggerTimeUp[PlugNum - 1][11]);
  1136. }
  1137. break;
  1138. case S_CHARGING: //charging
  1139. case S_TERMINATING:
  1140. //printf("S_CHARGING,S_TERMINATING\n");
  1141. ftime(&AuthNowTime);
  1142. if (DiffTimeb(TriggerTimeUp[PlugNum - 1][5], AuthNowTime) > 1000) {
  1143. ReadChargingCapability(PlugNum);
  1144. ftime(&TriggerTimeUp[PlugNum - 1][5]);
  1145. }
  1146. ftime(&AuthNowTime);
  1147. if (DiffTimeb(TriggerTimeUp[PlugNum - 1][11], AuthNowTime) > 1000) {
  1148. if (ReadChargePermission(PlugNum) == 0) {
  1149. DEBUG_INFO("Stop charging by power cabinet's permission");
  1150. ChargingData[PlugNum - 1]->StopChargeFlag = 1;
  1151. }
  1152. ftime(&TriggerTimeUp[PlugNum - 1][11]);
  1153. }
  1154. WriteChargingTarget(PlugNum);
  1155. //printf("ChargingData[%d]->FireChargingVoltage=%f\n",PlugNum,ChargingData[PlugNum-1]->FireChargingVoltage);
  1156. //printf("ChargingData[%d]->PresentChargingCurrent=%f\n",PlugNum,ChargingData[PlugNum-1]->PresentChargingCurrent);
  1157. break;
  1158. default:
  1159. break;
  1160. }//switch case
  1161. MessageTrigger(PlugNum);
  1162. }//for connector #
  1163. if (DisconnectFlag >= 10) {
  1164. if (ShmStatusCodeData->AlarmCode.AlarmEvents.bits.DisconnectedFromDo == 0) {
  1165. ShmStatusCodeData->AlarmCode.AlarmEvents.bits.DisconnectedFromDo = 1;
  1166. DEBUG_INFO("Disconnected from power cabinet...re-connecting");
  1167. }
  1168. goto ReConnect;
  1169. }
  1170. }//while(1)
  1171. }