Analyse esp_wifi
This commit is contained in:
parent
e2cb500f97
commit
d8a578c4b5
4 changed files with 38 additions and 0 deletions
|
@ -55,4 +55,34 @@ After analyzing existing solutions following firewall parameters were implemente
|
|||
|
||||
A port can be a maximum of 65565, therefore cannot be of type \verb|uint16_t| but \verb|uint32_t|. Target as well as protocol are enums for the available options. To block a range of ports, there is a \verb|port_from| and \verb|port_to|. The firewall will store all the rules as linked list to dynamically add and remove rules.
|
||||
|
||||
\subsection{WiFi Events}
|
||||
|
||||
To intercept network packages there is a need to somehow get notified when a new package arrived that needs to be analyzed. Based on the firewall rules, it can pass, gets dropped or rejected.
|
||||
|
||||
Available ESP32 WiFi Events can be seen in figure \ref*{fig:WiFi Events}. None of those events support reading incoming packages.
|
||||
|
||||
\begin{figure}[H]
|
||||
\begin{center}
|
||||
\includegraphics[height=0.9\textheight]{wifi-events}
|
||||
\caption{WiFi Events}
|
||||
\label{fig:WiFi Events}
|
||||
\end{center}
|
||||
\end{figure}
|
||||
|
||||
\cite[cf.][]{espressif-wifi}
|
||||
|
||||
\subsection{WiFi Buffer Usage}
|
||||
|
||||
Looking at the usage of the DMA buffer (Figure \ref{fig:WiFi Buffer}) of the driver we can see where we have to check for received packages.
|
||||
|
||||
\begin{figure}[H]
|
||||
\begin{center}
|
||||
\includegraphics[width=0.8\textwidth]{wifi-buffer}
|
||||
\caption{WiFi Buffer}
|
||||
\label{fig:WiFi Buffer}
|
||||
\end{center}
|
||||
\end{figure}
|
||||
|
||||
\cite[cf.][]{espressif-wifi}
|
||||
|
||||
\subsection{Benchmark}
|
||||
|
|
Reference in a new issue