Hi,
I have the SAMD21 Xplained Pro board with the ATWINC3400-MR210CA extension board attached.
I've been trying to run various examples and have had no luck in connecting to a network.
For example, in the project TCP server it seems that a communication issue occurs when the method m2m_wifi_connect() is called.
This is the output from the console at this point:
-- WINC3400 TCP server example --
-- SAMD21_XPLAINED_PRO --
-- Compiled: Apr 28 2021 13:49:06 --
(APP)(INFO)Chip ID 3400d2
(APP)(INFO)Curr driver ver: 1.1.0
(APP)(INFO)Curr driver HIF Level: (2) 1.4
(APP)(INFO)Fw HIF: 8103
(APP)(INFO)Firmware HIF (2) : 1.3
(APP)(INFO)Firmware ver : 1.2.2
(APP)(INFO)Firmware Build Oct 5 2017 Time 13:22:37
(APP)(INFO)Ota HIF: 0000
(APP)(INFO)No valid Ota image
(APP)(ERR)[hif_check_code][417]HIF message unsupported
This is because the Wifi library tries to use a blacklisted command (HIF_OTA_RB_ONLY).
I then tried to connect to an open network and the same issue occurred but with a different command (HIFCODE_WIFI_CONN).
I then saw on another post on these forms that the issue can occur because the firmware on the WiFi module is out of date.
The post also had a pdf on how to update the project which I believe I have done correctly, but the same firmware version keeps getting programmed into the Wifi module.
The latest on the Microchip website is v1.4.1, but it seems that only v 1.2.2 is being programmed into the Wifi module.
Below is the output from the download_all.bat script:
Mode UART
Chip 3400
Downloading Image... (pod 0) (comport )
********************************************
* >Programmer for WINC3400 SPI Flash< *
* Owner: Atmel Corporation *
********************************************
Firmware Path (2B0) ../../../firmware/m2m_aio_2b0.bin
Firmware Path (3A0) ../../../firmware/m2m_aio_3a0.bin
3400 Path ../../../firmware/m2m_aio_3400.bin
>>Initialize programmer. (com 0; aardvark 0)
Detecting ports...
(COM11),11
EDBG Virtual COM Port (COM11)
(COM7),7
Checking COM11
(APP)(INFO)WINCxx00 Serial Bridge Found
Avail port COM11
Checking COM7
(APP)(INFO)failed to read Serial Bridge ID response
(APP)(INFO)failed to read Serial Bridge ID response
(APP)(INFO)failed to read Serial Bridge ID response
Available ports: 1 from 2 present
Chip id 3400d2
Programming fw file: ../../../programmer_firmware/release3400/programmer_firmware.bin
>Waiting for chip permission...
>>Reinitialise serial bridge to 500000
OK.
>>Loading this FW: ../../../firmware/m2m_aio_3400.bin
----- NOW Programming Firmware Image Version -----
Firmware HIF Level : (2) 1.3
Firmware ver : 1.2.2
Firmware Build Oct 5 2017 Time 13:22:37
----- Previous Firmware Image Version -----
Firmware HIF Level : (2) 1.3
Firmware ver : 1.2.2
Firmware Build Oct 5 2017 Time 13:22:37
Flash ID 1440ef
(APP)(INFO)Flash Size 8 Mb
>Start erasing...
Done
#Erase time = 3.360000 sec
>Start programming...
Done
#Programming time = 26.453000 sec
(APP)(INFO)----------- BEGIN EFUSE DUMP ----------------
(APP)(INFO)(Efuse)Ver = 0,bank idx = 0,used = 1,invalid = 0
(APP)(INFO)(Efuse)Valid = 1,MAC = f8:f0:05:c3:86:f4
(APP)(INFO)(Efuse)Valid = 0,PATxGainCorr = 00
(APP)(INFO)(Efuse)Valid = 1,FreqOffset = 7d13
(APP)(INFO)------------- END EFUSE DUMP ----------------
Creating wifi channel look up table for PLL with xo_offset = -11.7031.
Creating freq look up table for PLL with xo_offset = -11.7031.
>Start erasing...
Done
#Erase time = 0.047000 sec
>Start programming...
Done
#Programming time = 0.422000 sec
done
>>Image downloaded successfully.
(APP)(INFO)----------- BEGIN EFUSE DUMP ----------------
(APP)(INFO)(Efuse)Ver = 0,bank idx = 0,used = 1,invalid = 0
(APP)(INFO)(Efuse)Valid = 1,MAC = f8:f0:05:c3:86:f4
(APP)(INFO)(Efuse)Valid = 0,PATxGainCorr = 00
(APP)(INFO)(Efuse)Valid = 1,FreqOffset = 7d13
(APP)(INFO)------------- END EFUSE DUMP ----------------
>>This task finished after 30.66 sec
Downloading Gain Values...
********************************************
* >TX Gain Builder for WINC3400 < *
* Owner: Atmel Corporation *
********************************************
>>Init Programmer
Detecting ports...
(COM11),11
EDBG Virtual COM Port (COM11)
(COM7),7
Checking COM11
(APP)(INFO)WINCxx00 Serial Bridge Found
Avail port COM11
Checking COM7
(APP)(INFO)failed to read Serial Bridge ID response
(APP)(INFO)failed to read Serial Bridge ID response
(APP)(INFO)failed to read Serial Bridge ID response
Available ports: 1 from 2 present
Chip id 3400d2
Programming fw file: ../../../programmer_firmware/release3400/programmer_firmware.bin
>Waiting for chip permission...
>>Reinitialise serial bridge to 500000
OK.
>Reading flash data...
Done.
>Verifying...
Done
Gain values have been downloaded successfully.
>>This task finished after 1.00 sec
No TLS Client RSA Certificate specified.
No TLS Client ECDSA Certificate specified.
Downloading root certificates...
**************************************************
* > WINC3400 Root Certificate Flash Downloader < *
**************************************************
Detecting ports...
(COM11),11
EDBG Virtual COM Port (COM11)
(COM7),7
Checking COM11
(APP)(INFO)WINCxx00 Serial Bridge Found
Avail port COM11
Checking COM7
(APP)(INFO)failed to read Serial Bridge ID response
(APP)(INFO)failed to read Serial Bridge ID response
(APP)(INFO)failed to read Serial Bridge ID response
Available ports: 1 from 2 present
Chip id 3400d2
Programming fw file: ../../../programmer_firmware/release3400/programmer_firmware.bin
>Waiting for chip permission...
>>Reinitialise serial bridge to 500000
OK.
>Start erasing...
Done
#Erase time = 0.032000 sec
>>>Found Certificate:
>>> Baltimore CyberTrust Root
>Start erasing...
Done
#Erase time = 0.031000 sec
>Writing the certificate to SPI flash...
>Start programming...
Done
#Programming time = 0.203000 sec
Done
>>>Found Certificate:
>>> DigiCert High Assurance EV Root CA
>Start erasing...
Done
#Erase time = 0.031000 sec
>Writing the certificate to SPI flash...
>Start programming...
Done
#Programming time = 0.204000 sec
Done
>>>Found Certificate:
>>> Google Internet Authority G3
>Start erasing...
Done
#Erase time = 0.031000 sec
>Writing the certificate to SPI flash...
>Start programming...
Done
#Programming time = 0.203000 sec
Done
>>>Found Certificate:
>>> Sample Matrix RSA-2048 Certificate Authority
>Start erasing...
Done
#Erase time = 0.032000 sec
>Writing the certificate to SPI flash...
>Start programming...
Done
#Programming time = 0.203000 sec
Done
>>>Found Certificate:
>>> AddTrust External CA Root
>Start erasing...
Done
#Erase time = 0.031000 sec
>Writing the certificate to SPI flash...
>Start programming...
Done
#Programming time = 0.219000 sec
Done
>>>Found Certificate:
>>>
>Start erasing...
Done
#Erase time = 0.032000 sec
>Writing the certificate to SPI flash...
>Start programming...
Done
#Programming time = 0.203000 sec
Done
>>>Found Certificate:
>>> GeoTrust Global CA
>Start erasing...
Done
#Erase time = 0.031000 sec
>Writing the certificate to SPI flash...
>Start programming...
Done
#Programming time = 0.219000 sec
Done
>>>Found Certificate:
>>> VeriSign Class 3 Public Primary Certification Authority - G5
>Start erasing...
Done
#Erase time = 0.031000 sec
>Writing the certificate to SPI flash...
>Start programming...
Done
#Programming time = 0.219000 sec
Done
>>This task finished after 3.00 sec
OK
#######################################################################
## ##
## ######## ### ###### ###### ##
## ## ## ## ## ## ## ## ## ##
## ## ## ## ## ## ## ##
## ######## ## ## ###### ###### ##
## ## ######### ## ## ##
## ## ## ## ## ## ## ## ##
## ## ## ## ###### ###### ##
## ##
#######################################################################
Downloading ends successfully
Press any key to continue . . .
I'm using ADF v3.50 for the projects.
Any input on this would be great,
Thanks,
Ben