Analyse esp_wifi

This commit is contained in:
Florian Hoss 2022-07-20 15:39:15 +02:00
parent e2cb500f97
commit d8a578c4b5
4 changed files with 38 additions and 0 deletions

View file

@ -55,4 +55,34 @@ After analyzing existing solutions following firewall parameters were implemente
A port can be a maximum of 65565, therefore cannot be of type \verb|uint16_t| but \verb|uint32_t|. Target as well as protocol are enums for the available options. To block a range of ports, there is a \verb|port_from| and \verb|port_to|. The firewall will store all the rules as linked list to dynamically add and remove rules.
\subsection{WiFi Events}
To intercept network packages there is a need to somehow get notified when a new package arrived that needs to be analyzed. Based on the firewall rules, it can pass, gets dropped or rejected.
Available ESP32 WiFi Events can be seen in figure \ref*{fig:WiFi Events}. None of those events support reading incoming packages.
\begin{figure}[H]
\begin{center}
\includegraphics[height=0.9\textheight]{wifi-events}
\caption{WiFi Events}
\label{fig:WiFi Events}
\end{center}
\end{figure}
\cite[cf.][]{espressif-wifi}
\subsection{WiFi Buffer Usage}
Looking at the usage of the DMA buffer (Figure \ref{fig:WiFi Buffer}) of the driver we can see where we have to check for received packages.
\begin{figure}[H]
\begin{center}
\includegraphics[width=0.8\textwidth]{wifi-buffer}
\caption{WiFi Buffer}
\label{fig:WiFi Buffer}
\end{center}
\end{figure}
\cite[cf.][]{espressif-wifi}
\subsection{Benchmark}