6.4 BSD API...........................................................................................................................................................................99
6.5 Socket Working Flow......................................................................................................................................................100
6.6 DNS................................................................................................................................................................................109
6.7 Operation Modes............................................................................................................................................................110
6.8 IP Fragmentation............................................................................................................................................................115
6.9 Errors..............................................................................................................................................................................116
7 Secure Socket..................................................................................................................................................................... 117
7.1 Introduction.....................................................................................................................................................................118
7.2 Key Features.................................................................................................................................................................. 118
7.3 Opening a Secure Socket...............................................................................................................................................118
7.4 Trusted Root-Certificate Catalog.................................................................................................................................... 119
7.5 Options and Features Use..............................................................................................................................................119
7.6 Supported Cryptographic Algorithms............................................................................................................................. 125
7.7 Common Errors and Asynchronous Events................................................................................................................... 126
8 File System..........................................................................................................................................................................129
8.1 Introduction.................................................................................................................................................................... 130
8.2 Key Features..................................................................................................................................................................130
8.3 File System Characteristics............................................................................................................................................130
8.4 Write a File.....................................................................................................................................................................132
8.5 Read a File.....................................................................................................................................................................138
8.6 Delete a File...................................................................................................................................................................140
8.7 Rename a File................................................................................................................................................................141
8.8 File System Helper Functions........................................................................................................................................ 141
8.9 Bundle Protection...........................................................................................................................................................143
8.10 File Commit Feature.....................................................................................................................................................146
8.11 File Rollback Process...................................................................................................................................................147
8.12 Programming................................................................................................................................................................147
8.13 Restore to Factory........................................................................................................................................................149
8.14 Security Alerts..............................................................................................................................................................151
8.15 Design Consideration...................................................................................................................................................152
9 HTTP Server........................................................................................................................................................................ 157
9.1 Introduction.................................................................................................................................................................... 158
9.2 Key Features..................................................................................................................................................................162
9.3 Configurations and Settings...........................................................................................................................................162
9.4 RESTful API Processing................................................................................................................................................ 163
9.5 Device Parameter Querying Through HTTP (Device Tokens)....................................................................................... 168
9.6 Resource Search Order................................................................................................................................................. 175
9.7 Host HTTP Requests Processing.................................................................................................................................. 176
9.8 Security.......................................................................................................................................................................... 185
9.9 Processing of Parallel Requests.................................................................................................................................... 186
10 mDNS.................................................................................................................................................................................187
10.1 Introduction.................................................................................................................................................................. 188
10.2 Key Features................................................................................................................................................................188
10.3 Configurations and Settings.........................................................................................................................................188
10.4 Query........................................................................................................................................................................... 188
10.5 Get Service List............................................................................................................................................................191
10.6 Advertisement.............................................................................................................................................................. 192
10.7 Limitations....................................................................................................................................................................194
11 Rx Filters............................................................................................................................................................................195
11.1 Introduction...................................................................................................................................................................196
11.2 Matching Process.........................................................................................................................................................197
11.3 Examples of Filter Use................................................................................................................................................. 200
11.4 Filter Creation...............................................................................................................................................................202
11.5 Managing Filters...........................................................................................................................................................212
12 Ping....................................................................................................................................................................................215
12.1 General Description..................................................................................................................................................... 216
12.2 Start and Stop Ping......................................................................................................................................................216
12.3 Limitations....................................................................................................................................................................217
13 Transceiver........................................................................................................................................................................219
13.1 Introduction.................................................................................................................................................................. 220
Table of Contents www.ti.com
4SimpleLink™ Wi-Fi® CC3x20, CC3x3x Network Processor SWRU455M – FEBRUARY 2017 – REVISED OCTOBER 2020
Submit Document Feedback
Copyright © 2020 Texas Instruments Incorporated