Skip to content

Commit 2f68658

Browse files
authored
Merge pull request #7 from espressif/master
21.12.2020
2 parents ed90e2d + ef99cd7 commit 2f68658

File tree

91 files changed

+443
-279
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

91 files changed

+443
-279
lines changed

.gitignore

+3-2
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,10 @@
11
tools/xtensa-esp32-elf
2+
tools/xtensa-esp32s2-elf
23
tools/dist
34
tools/esptool
45
tools/esptool.exe
5-
tools/mkspiffs/mkspiffs
6-
tools/mkspiffs/mkspiffs.exe
6+
tools/mkspiffs
7+
tools/mklittlefs
78
.DS_Store
89

910
#Ignore files built by Visual Studio/Visual Micro

Kconfig.projbuild

+6
Original file line numberDiff line numberDiff line change
@@ -40,6 +40,12 @@ config ARDUINO_RUNNING_CORE
4040
default 1 if ARDUINO_RUN_CORE1
4141
default -1 if ARDUINO_RUN_NO_AFFINITY
4242

43+
config ARDUINO_LOOP_STACK_SIZE
44+
int "Loop thread stack size"
45+
default 8192
46+
help
47+
Amount of stack available for the Arduino task.
48+
4349
choice ARDUINO_EVENT_RUNNING_CORE
4450
bool "Core on which Arduino's event handler is running"
4551
default ARDUINO_EVENT_RUN_CORE1

boards.txt

+210-221
Large diffs are not rendered by default.

cores/esp32/main.cpp

+5-1
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,10 @@
33
#include "esp_task_wdt.h"
44
#include "Arduino.h"
55

6+
#ifndef CONFIG_ARDUINO_LOOP_STACK_SIZE
7+
#define CONFIG_ARDUINO_LOOP_STACK_SIZE 8192
8+
#endif
9+
610
TaskHandle_t loopTaskHandle = NULL;
711

812
#if CONFIG_AUTOSTART_ARDUINO
@@ -25,7 +29,7 @@ extern "C" void app_main()
2529
{
2630
loopTaskWDTEnabled = false;
2731
initArduino();
28-
xTaskCreateUniversal(loopTask, "loopTask", 8192, NULL, 1, &loopTaskHandle, CONFIG_ARDUINO_RUNNING_CORE);
32+
xTaskCreateUniversal(loopTask, "loopTask", CONFIG_ARDUINO_LOOP_STACK_SIZE, NULL, 1, &loopTaskHandle, CONFIG_ARDUINO_RUNNING_CORE);
2933
}
3034

3135
#endif

libraries/HTTPClient/src/HTTPClient.cpp

+9-5
Original file line numberDiff line numberDiff line change
@@ -73,11 +73,15 @@ class TLSTraits : public TransportTraits
7373

7474
bool verify(WiFiClient& client, const char* host) override
7575
{
76-
WiFiClientSecure& wcs = static_cast<WiFiClientSecure&>(client);
77-
wcs.setCACert(_cacert);
78-
wcs.setCertificate(_clicert);
79-
wcs.setPrivateKey(_clikey);
80-
return true;
76+
WiFiClientSecure& wcs = static_cast<WiFiClientSecure&>(client);
77+
if (_cacert == nullptr) {
78+
wcs.setInsecure();
79+
} else {
80+
wcs.setCACert(_cacert);
81+
wcs.setCertificate(_clicert);
82+
wcs.setPrivateKey(_clikey);
83+
}
84+
return true;
8185
}
8286

8387
protected:
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,61 @@
1+
#include <WiFiClientSecure.h>
2+
3+
const char* ssid = "your-ssid"; // your network SSID (name of wifi network)
4+
const char* password = "your-password"; // your network password
5+
6+
const char* server = "www.howsmyssl.com"; // Server URL
7+
8+
WiFiClientSecure client;
9+
10+
void setup() {
11+
//Initialize serial and wait for port to open:
12+
Serial.begin(115200);
13+
delay(100);
14+
15+
Serial.print("Attempting to connect to SSID: ");
16+
Serial.println(ssid);
17+
WiFi.begin(ssid, password);
18+
19+
// attempt to connect to Wifi network:
20+
while (WiFi.status() != WL_CONNECTED) {
21+
Serial.print(".");
22+
// wait 1 second for re-trying
23+
delay(1000);
24+
}
25+
26+
Serial.print("Connected to ");
27+
Serial.println(ssid);
28+
29+
Serial.println("\nStarting connection to server...");
30+
client.setInsecure();//skip verification
31+
if (!client.connect(server, 443))
32+
Serial.println("Connection failed!");
33+
else {
34+
Serial.println("Connected to server!");
35+
// Make a HTTP request:
36+
client.println("GET https://www.howsmyssl.com/a/check HTTP/1.0");
37+
client.println("Host: www.howsmyssl.com");
38+
client.println("Connection: close");
39+
client.println();
40+
41+
while (client.connected()) {
42+
String line = client.readStringUntil('\n');
43+
if (line == "\r") {
44+
Serial.println("headers received");
45+
break;
46+
}
47+
}
48+
// if there are incoming bytes available
49+
// from the server, read them and print them:
50+
while (client.available()) {
51+
char c = client.read();
52+
Serial.write(c);
53+
}
54+
55+
client.stop();
56+
}
57+
}
58+
59+
void loop() {
60+
// do nothing
61+
}

libraries/WiFiClientSecure/src/WiFiClientSecure.cpp

+17-6
Original file line numberDiff line numberDiff line change
@@ -36,6 +36,7 @@ WiFiClientSecure::WiFiClientSecure()
3636
ssl_init(sslclient);
3737
sslclient->socket = -1;
3838
sslclient->handshake_timeout = 120000;
39+
_use_insecure = false;
3940
_CA_cert = NULL;
4041
_cert = NULL;
4142
_private_key = NULL;
@@ -116,17 +117,17 @@ int WiFiClientSecure::connect(const char *host, uint16_t port, int32_t timeout){
116117
return connect(host, port);
117118
}
118119

119-
int WiFiClientSecure::connect(IPAddress ip, uint16_t port, const char *_CA_cert, const char *_cert, const char *_private_key)
120+
int WiFiClientSecure::connect(IPAddress ip, uint16_t port, const char *CA_cert, const char *cert, const char *private_key)
120121
{
121-
return connect(ip.toString().c_str(), port, _CA_cert, _cert, _private_key);
122+
return connect(ip.toString().c_str(), port, CA_cert, cert, private_key);
122123
}
123124

124-
int WiFiClientSecure::connect(const char *host, uint16_t port, const char *_CA_cert, const char *_cert, const char *_private_key)
125+
int WiFiClientSecure::connect(const char *host, uint16_t port, const char *CA_cert, const char *cert, const char *private_key)
125126
{
126127
if(_timeout > 0){
127128
sslclient->handshake_timeout = _timeout;
128129
}
129-
int ret = start_ssl_client(sslclient, host, port, _timeout, _CA_cert, _cert, _private_key, NULL, NULL);
130+
int ret = start_ssl_client(sslclient, host, port, _timeout, CA_cert, cert, private_key, NULL, NULL, _use_insecure);
130131
_lastError = ret;
131132
if (ret < 0) {
132133
log_e("start_ssl_client: %d", ret);
@@ -138,15 +139,15 @@ int WiFiClientSecure::connect(const char *host, uint16_t port, const char *_CA_c
138139
}
139140

140141
int WiFiClientSecure::connect(IPAddress ip, uint16_t port, const char *pskIdent, const char *psKey) {
141-
return connect(ip.toString().c_str(), port,_pskIdent, _psKey);
142+
return connect(ip.toString().c_str(), port, pskIdent, psKey);
142143
}
143144

144145
int WiFiClientSecure::connect(const char *host, uint16_t port, const char *pskIdent, const char *psKey) {
145146
log_v("start_ssl_client with PSK");
146147
if(_timeout > 0){
147148
sslclient->handshake_timeout = _timeout;
148149
}
149-
int ret = start_ssl_client(sslclient, host, port, _timeout, NULL, NULL, NULL, _pskIdent, _psKey);
150+
int ret = start_ssl_client(sslclient, host, port, _timeout, NULL, NULL, NULL, pskIdent, psKey, _use_insecure);
150151
_lastError = ret;
151152
if (ret < 0) {
152153
log_e("start_ssl_client: %d", ret);
@@ -245,6 +246,16 @@ uint8_t WiFiClientSecure::connected()
245246
return _connected;
246247
}
247248

249+
void WiFiClientSecure::setInsecure()
250+
{
251+
_CA_cert = NULL;
252+
_cert = NULL;
253+
_private_key = NULL;
254+
_pskIdent = NULL;
255+
_psKey = NULL;
256+
_use_insecure = true;
257+
}
258+
248259
void WiFiClientSecure::setCACert (const char *rootCA)
249260
{
250261
_CA_cert = rootCA;

libraries/WiFiClientSecure/src/WiFiClientSecure.h

+2
Original file line numberDiff line numberDiff line change
@@ -33,6 +33,7 @@ class WiFiClientSecure : public WiFiClient
3333
int _lastError = 0;
3434
int _peek = -1;
3535
int _timeout = 0;
36+
bool _use_insecure;
3637
const char *_CA_cert;
3738
const char *_cert;
3839
const char *_private_key;
@@ -62,6 +63,7 @@ class WiFiClientSecure : public WiFiClient
6263
void stop();
6364
uint8_t connected();
6465
int lastError(char *buf, const size_t size);
66+
void setInsecure(); // Don't validate the chain, just accept whatever is given. VERY INSECURE!
6567
void setPreSharedKey(const char *pskIdent, const char *psKey); // psKey in Hex
6668
void setCACert(const char *rootCA);
6769
void setCertificate(const char *client_ca);

libraries/WiFiClientSecure/src/ssl_client.cpp

+16-10
Original file line numberDiff line numberDiff line change
@@ -51,13 +51,17 @@ void ssl_init(sslclient_context *ssl_client)
5151
}
5252

5353

54-
int start_ssl_client(sslclient_context *ssl_client, const char *host, uint32_t port, int timeout, const char *rootCABuff, const char *cli_cert, const char *cli_key, const char *pskIdent, const char *psKey)
54+
int start_ssl_client(sslclient_context *ssl_client, const char *host, uint32_t port, int timeout, const char *rootCABuff, const char *cli_cert, const char *cli_key, const char *pskIdent, const char *psKey, bool insecure)
5555
{
5656
char buf[512];
5757
int ret, flags;
5858
int enable = 1;
5959
log_v("Free internal heap before TLS %u", ESP.getFreeHeap());
6060

61+
if (rootCABuff == NULL && pskIdent == NULL && psKey == NULL && !insecure) {
62+
return -1;
63+
}
64+
6165
log_v("Starting socket");
6266
ssl_client->socket = -1;
6367

@@ -118,16 +122,19 @@ int start_ssl_client(sslclient_context *ssl_client, const char *host, uint32_t p
118122
// MBEDTLS_SSL_VERIFY_REQUIRED if a CA certificate is defined on Arduino IDE and
119123
// MBEDTLS_SSL_VERIFY_NONE if not.
120124

121-
if (rootCABuff != NULL) {
125+
if (insecure) {
126+
mbedtls_ssl_conf_authmode(&ssl_client->ssl_conf, MBEDTLS_SSL_VERIFY_NONE);
127+
log_i("WARNING: Skipping SSL Verification. INSECURE!");
128+
} else if (rootCABuff != NULL) {
122129
log_v("Loading CA cert");
123130
mbedtls_x509_crt_init(&ssl_client->ca_cert);
124131
mbedtls_ssl_conf_authmode(&ssl_client->ssl_conf, MBEDTLS_SSL_VERIFY_REQUIRED);
125132
ret = mbedtls_x509_crt_parse(&ssl_client->ca_cert, (const unsigned char *)rootCABuff, strlen(rootCABuff) + 1);
126133
mbedtls_ssl_conf_ca_chain(&ssl_client->ssl_conf, &ssl_client->ca_cert, NULL);
127134
//mbedtls_ssl_conf_verify(&ssl_client->ssl_ctx, my_verify, NULL );
128135
if (ret < 0) {
129-
// free the ca_cert in the case parse failed, otherwise, the old ca_cert still in the heap memory, that lead to "out of memory" crash.
130-
mbedtls_x509_crt_free(&ssl_client->ca_cert);
136+
// free the ca_cert in the case parse failed, otherwise, the old ca_cert still in the heap memory, that lead to "out of memory" crash.
137+
mbedtls_x509_crt_free(&ssl_client->ca_cert);
131138
return handle_error(ret);
132139
}
133140
} else if (pskIdent != NULL && psKey != NULL) {
@@ -161,20 +168,19 @@ int start_ssl_client(sslclient_context *ssl_client, const char *host, uint32_t p
161168
return handle_error(ret);
162169
}
163170
} else {
164-
mbedtls_ssl_conf_authmode(&ssl_client->ssl_conf, MBEDTLS_SSL_VERIFY_NONE);
165-
log_i("WARNING: Use certificates for a more secure communication!");
171+
return -1;
166172
}
167173

168-
if (cli_cert != NULL && cli_key != NULL) {
174+
if (!insecure && cli_cert != NULL && cli_key != NULL) {
169175
mbedtls_x509_crt_init(&ssl_client->client_cert);
170176
mbedtls_pk_init(&ssl_client->client_key);
171177

172178
log_v("Loading CRT cert");
173179

174180
ret = mbedtls_x509_crt_parse(&ssl_client->client_cert, (const unsigned char *)cli_cert, strlen(cli_cert) + 1);
175181
if (ret < 0) {
176-
// free the client_cert in the case parse failed, otherwise, the old client_cert still in the heap memory, that lead to "out of memory" crash.
177-
mbedtls_x509_crt_free(&ssl_client->client_cert);
182+
// free the client_cert in the case parse failed, otherwise, the old client_cert still in the heap memory, that lead to "out of memory" crash.
183+
mbedtls_x509_crt_free(&ssl_client->client_cert);
178184
return handle_error(ret);
179185
}
180186

@@ -211,7 +217,7 @@ int start_ssl_client(sslclient_context *ssl_client, const char *host, uint32_t p
211217
}
212218
if((millis()-handshake_start_time)>ssl_client->handshake_timeout)
213219
return -1;
214-
vTaskDelay(10 / portTICK_PERIOD_MS);
220+
vTaskDelay(2);//2 ticks
215221
}
216222

217223

libraries/WiFiClientSecure/src/ssl_client.h

+1-1
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ typedef struct sslclient_context {
2929

3030

3131
void ssl_init(sslclient_context *ssl_client);
32-
int start_ssl_client(sslclient_context *ssl_client, const char *host, uint32_t port, int timeout, const char *rootCABuff, const char *cli_cert, const char *cli_key, const char *pskIdent, const char *psKey);
32+
int start_ssl_client(sslclient_context *ssl_client, const char *host, uint32_t port, int timeout, const char *rootCABuff, const char *cli_cert, const char *cli_key, const char *pskIdent, const char *psKey, bool insecure);
3333
void stop_ssl_socket(sslclient_context *ssl_client, const char *rootCABuff, const char *cli_cert, const char *cli_key);
3434
int data_to_read(sslclient_context *ssl_client);
3535
int send_ssl_data(sslclient_context *ssl_client, const uint8_t *data, uint16_t len);

package/package_esp32_index.template.json

+2-2
Original file line numberDiff line numberDiff line change
@@ -115,8 +115,8 @@
115115
"host": "x86_64-apple-darwin",
116116
"url": "https://dl.espressif.com/dl/esptool-3.0.0.2-macos.tar.gz",
117117
"archiveFileName": "esptool-3.0.0.2-macos.tar.gz",
118-
"checksum": "SHA-256:9213f46d5aa865558da4a2ef4218e87eef4782779128083c15ce2b3e4d07a1ea",
119-
"size": "3849615"
118+
"checksum": "SHA-256:2cafab7f1ebce89475b84c115548eaace40b6366d7b3f9862cdb2fc64f806643",
119+
"size": "3859642"
120120
},
121121
{
122122
"host": "x86_64-pc-linux-gnu",

platform.txt

+1-1
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ compiler.S.flags=-c -g3 -x assembler-with-cpp -MMD -mlongcalls
3535

3636
compiler.c.elf.cmd=xtensa-esp32-elf-gcc
3737
compiler.c.elf.flags=-nostdlib "-L{compiler.sdk.path}/lib" "-L{compiler.sdk.path}/ld" -T esp32_out.ld -T esp32.project.ld -T esp32.rom.ld -T esp32.peripherals.ld -T esp32.rom.libgcc.ld -T esp32.rom.spiram_incompatible_fns.ld -u ld_include_panic_highint_hdl -u call_user_start_cpu0 -Wl,--gc-sections -Wl,-static -Wl,--undefined=uxTopUsedPriority -u __cxa_guard_dummy -u __cxx_fatal_exception
38-
compiler.c.elf.libs=-lgcc -lopenssl -lbtdm_app -lfatfs -lwps -lcoexist -lwear_levelling -lesp_http_client -lprotobuf-c -lhal -lnewlib -ldriver -lbootloader_support -lpp -lfreemodbus -lmesh -lsmartconfig -ljsmn -lwpa -lethernet -lphy -lapp_trace -lconsole -lulp -lwpa_supplicant -lfreertos -lbt -lmicro-ecc -lesp32-camera -lcxx -lxtensa-debug-module -ltcp_transport -lod -lmdns -ldetection -lvfs -lpe -lesp_websocket_client -lespcoredump -lesp_ringbuf -lsoc -lcore -lfb_gfx -lsdmmc -llibsodium -lcoap -ltcpip_adapter -lprotocomm -lesp_event -limage_util -lc_nano -lesp-tls -lasio -lrtc -lspi_flash -lwpa2 -lwifi_provisioning -lesp32 -lface_recognition -lapp_update -lnghttp -ldl -lspiffs -lface_detection -lefuse -lunity -lesp_https_server -lespnow -lnvs_flash -lesp_adc_cal -llog -ldetection_cat_face -lsmartconfig_ack -lexpat -lm -lfr -lmqtt -lc -lheap -lmbedtls -llwip -lnet80211 -lesp_http_server -lpthread -ljson -lesp_https_ota -lfd -lstdc++
38+
compiler.c.elf.libs=-lgcc -lespcoredump -lesp_event -lheap -lpe -lmesh -lm -lesp_http_client -lfb_gfx -lface_detection -lesp_adc_cal -ldetection_cat_face -lmbedtls -lunity -lspiffs -lod -lapp_trace -llog -lesp_websocket_client -lexpat -lwpa2 -lxtensa-debug-module -lnet80211 -lhal -lvfs -lwps -lmqtt -lasio -lbt -lwpa_supplicant -lpp -lmdns -llwip -lnvs_flash -lc -lbootloader_support -lnewlib -lsdmmc -lapp_update -lethernet -lefuse -lprotobuf-c -ldetection -lfreemodbus -lcore -lface_recognition -lfd -lcoap -ljsmn -lesp_https_ota -ltcp_transport -lbtdm_app -lesp_ringbuf -ldriver -lwifi_provisioning -llibsodium -lopenssl -lfatfs -lnghttp -lespnow -lprotocomm -lspi_flash -lc_nano -lulp -lesp_http_server -lesp32-camera -lsmartconfig -lsmartconfig_ack -lesp-tls -lcoexist -lmicro-ecc -lesp_https_server -lwpa -ltcpip_adapter -lwear_levelling -lfreertos -lsoc -ljson -lesp32 -lpthread -lcxx -lfr -ldl -lphy -limage_util -lrtc -lconsole -lstdc++
3939

4040
compiler.as.cmd=xtensa-esp32-elf-as
4141

tools/platformio-build.py

+1-1
Original file line numberDiff line numberDiff line change
@@ -171,7 +171,7 @@
171171
],
172172

173173
LIBS=[
174-
"-lgcc", "-lopenssl", "-lbtdm_app", "-lfatfs", "-lwps", "-lcoexist", "-lwear_levelling", "-lesp_http_client", "-lprotobuf-c", "-lhal", "-lnewlib", "-ldriver", "-lbootloader_support", "-lpp", "-lfreemodbus", "-lmesh", "-lsmartconfig", "-ljsmn", "-lwpa", "-lethernet", "-lphy", "-lapp_trace", "-lconsole", "-lulp", "-lwpa_supplicant", "-lfreertos", "-lbt", "-lmicro-ecc", "-lesp32-camera", "-lcxx", "-lxtensa-debug-module", "-ltcp_transport", "-lod", "-lmdns", "-ldetection", "-lvfs", "-lpe", "-lesp_websocket_client", "-lespcoredump", "-lesp_ringbuf", "-lsoc", "-lcore", "-lfb_gfx", "-lsdmmc", "-llibsodium", "-lcoap", "-ltcpip_adapter", "-lprotocomm", "-lesp_event", "-limage_util", "-lc_nano", "-lesp-tls", "-lasio", "-lrtc", "-lspi_flash", "-lwpa2", "-lwifi_provisioning", "-lesp32", "-lface_recognition", "-lapp_update", "-lnghttp", "-ldl", "-lspiffs", "-lface_detection", "-lefuse", "-lunity", "-lesp_https_server", "-lespnow", "-lnvs_flash", "-lesp_adc_cal", "-llog", "-ldetection_cat_face", "-lsmartconfig_ack", "-lexpat", "-lm", "-lfr", "-lmqtt", "-lc", "-lheap", "-lmbedtls", "-llwip", "-lnet80211", "-lesp_http_server", "-lpthread", "-ljson", "-lesp_https_ota", "-lfd", "-lstdc++"
174+
"-lgcc", "-lespcoredump", "-lesp_event", "-lheap", "-lpe", "-lmesh", "-lm", "-lesp_http_client", "-lfb_gfx", "-lface_detection", "-lesp_adc_cal", "-ldetection_cat_face", "-lmbedtls", "-lunity", "-lspiffs", "-lod", "-lapp_trace", "-llog", "-lesp_websocket_client", "-lexpat", "-lwpa2", "-lxtensa-debug-module", "-lnet80211", "-lhal", "-lvfs", "-lwps", "-lmqtt", "-lasio", "-lbt", "-lwpa_supplicant", "-lpp", "-lmdns", "-llwip", "-lnvs_flash", "-lc", "-lbootloader_support", "-lnewlib", "-lsdmmc", "-lapp_update", "-lethernet", "-lefuse", "-lprotobuf-c", "-ldetection", "-lfreemodbus", "-lcore", "-lface_recognition", "-lfd", "-lcoap", "-ljsmn", "-lesp_https_ota", "-ltcp_transport", "-lbtdm_app", "-lesp_ringbuf", "-ldriver", "-lwifi_provisioning", "-llibsodium", "-lopenssl", "-lfatfs", "-lnghttp", "-lespnow", "-lprotocomm", "-lspi_flash", "-lc_nano", "-lulp", "-lesp_http_server", "-lesp32-camera", "-lsmartconfig", "-lsmartconfig_ack", "-lesp-tls", "-lcoexist", "-lmicro-ecc", "-lesp_https_server", "-lwpa", "-ltcpip_adapter", "-lwear_levelling", "-lfreertos", "-lsoc", "-ljson", "-lesp32", "-lpthread", "-lcxx", "-lfr", "-ldl", "-lphy", "-limage_util", "-lrtc", "-lconsole", "-lstdc++"
175175
],
176176

177177
LIBSOURCE_DIRS=[

tools/sdk/bin/bootloader_dio_40m.bin

128 Bytes
Binary file not shown.

tools/sdk/bin/bootloader_dio_80m.bin

144 Bytes
Binary file not shown.

tools/sdk/bin/bootloader_dout_40m.bin

128 Bytes
Binary file not shown.

tools/sdk/bin/bootloader_dout_80m.bin

144 Bytes
Binary file not shown.

tools/sdk/bin/bootloader_qio_40m.bin

128 Bytes
Binary file not shown.

tools/sdk/bin/bootloader_qio_80m.bin

128 Bytes
Binary file not shown.

tools/sdk/bin/bootloader_qout_40m.bin

128 Bytes
Binary file not shown.

tools/sdk/bin/bootloader_qout_80m.bin

128 Bytes
Binary file not shown.

tools/sdk/include/config/sdkconfig.h

+3-1
Original file line numberDiff line numberDiff line change
@@ -144,6 +144,7 @@
144144
#define CONFIG_MBEDTLS_PSK_MODES 1
145145
#define CONFIG_GATTS_SEND_SERVICE_CHANGE_AUTO 1
146146
#define CONFIG_LWIP_DHCPS_LEASE_UNIT 60
147+
#define CONFIG_LWIP_TCP_HIGH_SPEED_RETRANSMISSION 1
147148
#define CONFIG_EFUSE_MAX_BLK_LEN 192
148149
#define CONFIG_SPIFFS_USE_MAGIC 1
149150
#define CONFIG_OV7725_SUPPORT 1
@@ -171,6 +172,7 @@
171172
#define CONFIG_ESP32_REV_MIN_0 1
172173
#define CONFIG_LOG_DEFAULT_LEVEL 1
173174
#define CONFIG_TIMER_QUEUE_LENGTH 10
175+
#define CONFIG_ARDUINO_LOOP_STACK_SIZE 8192
174176
#define CONFIG_ESP32_REV_MIN 0
175177
#define CONFIG_SUPPRESS_SELECT_DEBUG_OUTPUT 1
176178
#define CONFIG_GATTS_SEND_SERVICE_CHANGE_MODE 0
@@ -393,5 +395,5 @@
393395
#define CONFIG_BTDM_MODEM_SLEEP_MODE_ORIG 1
394396
#define CONFIG_ARDUHAL_LOG_DEFAULT_LEVEL_ERROR 1
395397
#define CONFIG_FATFS_API_ENCODING_ANSI_OEM 1
396-
#define CONFIG_ARDUINO_IDF_COMMIT "c33fc7821"
398+
#define CONFIG_ARDUINO_IDF_COMMIT "b4c075169"
397399
#define CONFIG_ARDUINO_IDF_BRANCH "release/v3.3"

0 commit comments

Comments
 (0)