#include #include "esp_system.h" #include "esp_log.h" #include "dev_name.h" #include "storage.h" #include "system.h" #include "crypto.h" #include "unsecure_api.h" #include "secure_api.h" #include "ethernet.h" #include "constants.h" static const char *TAG = "main"; void app_main(void) { esp_log_level_set("*", ESP_LOG_VERBOSE); system_show_free_memory(); ESP_LOGI(TAG, "SolarEnergy WT32-ETH01 device"); // Initialize storage if (storage_init() == false) { ESP_LOGE(TAG, "Failed to init storage!\n"); reboot(); } // Give a name to the device if (dev_generate_name()) { ESP_LOGI(TAG, "Generated a new device name\n"); } char *name = dev_name(); ESP_LOGI(TAG, "Dev name: %s\n", name); free(name); // Generate private key, if needed if (crypto_gen_priv_key()) { ESP_LOGI(TAG, "Generated device private key!\n"); } ESP_LOGI(TAG, "Device private key:\n"); crypto_print_priv_key(); // Show current private key char *csr = crypto_get_csr(); ESP_LOGI(TAG, "Current CSR:\n%s\n", csr); free(csr); // Initialize network stack ESP_LOGI(TAG, "Initialize network\n"); ethernet_init(); ethernet_wait_for_network(); // Get if secure origin endpoint is known ESP_LOGI(TAG, "Check secure origin\n"); if (storage_get_secure_origin(NULL) == 0) { char *sec_ori = unsecure_api_get_secure_origin(); if (!sec_ori) { ESP_LOGE(TAG, "Failed to fetch secure origin!"); reboot(); } storage_set_secure_origin(sec_ori); free(sec_ori); } // Print secure origin endpoint for debugging purposes ESP_LOGI(TAG, "Get secure origin\n"); char *sec_ori = calloc(SEC_ORIG_LEN, 1); assert(storage_get_secure_origin(sec_ori) > 0); ESP_LOGI(TAG, "Current secure origin: %s", sec_ori); free(sec_ori); // Check if root CA is available locally ESP_LOGI(TAG, "Check root CA"); if (storage_get_root_ca(NULL) == 0) { char *root_ca = unsecure_api_get_root_ca(); if (!root_ca) { ESP_LOGE(TAG, "Failed to fetch root CA!"); reboot(); } storage_set_root_ca(root_ca); free(root_ca); } // Print root CA for debugging purposes ESP_LOGI(TAG, "Get root CA"); char *root_ca = calloc(ROOT_CA_MAX_BYTES, 1); assert(storage_get_root_ca(root_ca) > 0); ESP_LOGI(TAG, "Current root CA:\n%s", root_ca); free(root_ca); bool validated = false; while (!validated) { // Check current device enrollment status ESP_LOGI(TAG, "Check enrollment status"); enum DevEnrollmentStatus status = secure_api_get_device_enrollment_status(); ESP_LOGI(TAG, "Current enrollment status: %d\n", status); switch (status) { case DevEnrollError: ESP_LOGE(TAG, "Failed to retrieve device enrollment status!"); break; case DevEnrollPending: ESP_LOGI(TAG, "Device enrolled, but not validated yet. Please accept device on central system web UI"); break; case DevEnrollValidated: ESP_LOGI(TAG, "Device enrolled and validated. Ready to operate!"); validated = true; break; case DevEnrollUnknown: ESP_LOGI(TAG, "Device unknown, need to enroll!"); // Remove certificate if present storage_set_dev_cert(""); // Enroll device ESP_LOGI(TAG, "Enroll device"); if (secure_api_enroll_device() != 0) { ESP_LOGE(TAG, "Failed to enroll device!"); reboot(); } ESP_LOGI(TAG, "Requested device enrollment."); break; } // Wait before next try if (!validated) system_sleep(60); }; // Retrieve device certificate if missing ESP_LOGI(TAG, "Check device certificate"); if (storage_get_dev_cert(NULL) < 2) { char *dev_cert = secure_api_get_dev_certificate(); if (!dev_cert) { ESP_LOGE(TAG, "Failed to fetch device certificate!"); reboot(); } storage_set_dev_cert(dev_cert); free(dev_cert); } // Print device certificate for debugging purposes ESP_LOGI(TAG, "Get device certificate"); char *dev_certificate = calloc(DEV_CERT_MAX_BYTES, 1); assert(storage_get_dev_cert(dev_certificate) > 0); ESP_LOGI(TAG, "Current device certificate:\n%s", dev_certificate); free(dev_certificate); ESP_LOGI(TAG, "Starting main loop"); system_sleep(120); reboot(); }