|
9 | 9 | #define MQTT_CERT_SIZE 2000 |
10 | 10 |
|
11 | 11 | // The PointPerfect token is provided at compile time via build flags |
12 | | -#define DEVELOPMENT_TOKEN \ |
13 | | - 0xAA, 0xBB, 0xCC, 0xDD, 0x00, 0x11, 0x22, 0x33, 0x0A, 0x0B, 0x0C, 0x0D, 0x00, 0x01, 0x02, 0x03 |
| 12 | +#define DEVELOPMENT_TOKEN 0xAA, 0xBB, 0xCC, 0xDD, 0x00, 0x11, 0x22, 0x33, 0x0A, 0x0B, 0x0C, 0x0D, 0x00, 0x01, 0x02, 0x03 |
14 | 13 | #ifndef POINTPERFECT_TOKEN |
15 | 14 | #warning Using the DEVELOPMENT_TOKEN for point perfect! |
16 | | -#define POINTPERFECT_TOKEN DEVELOPMENT_TOKEN |
| 15 | +#define POINTPERFECT_TOKEN DEVELOPMENT_TOKEN |
17 | 16 | #endif // POINTPERFECT_TOKEN |
18 | 17 |
|
19 | 18 | static const uint8_t developmentTokenArray[16] = {DEVELOPMENT_TOKEN}; // Token in HEX form |
@@ -181,7 +180,7 @@ bool pointperfectProvisionDevice() |
181 | 180 | { |
182 | 181 | #ifdef COMPILE_WIFI |
183 | 182 | bool bluetoothOriginallyConnected = false; |
184 | | - if(bluetoothState == BT_CONNECTED) |
| 183 | + if (bluetoothState == BT_CONNECTED) |
185 | 184 | bluetoothOriginallyConnected = true; |
186 | 185 |
|
187 | 186 | bluetoothStop(); // Free heap before starting secure client (requires ~70KB) |
@@ -342,7 +341,7 @@ bool pointperfectProvisionDevice() |
342 | 341 | if (jsonZtp) |
343 | 342 | delete jsonZtp; |
344 | 343 |
|
345 | | - if(bluetoothOriginallyConnected == true) |
| 344 | + if (bluetoothOriginallyConnected == true) |
346 | 345 | bluetoothStart(); |
347 | 346 |
|
348 | 347 | return (retVal); |
@@ -445,7 +444,7 @@ bool pointperfectUpdateKeys() |
445 | 444 | { |
446 | 445 | #ifdef COMPILE_WIFI |
447 | 446 | bool bluetoothOriginallyConnected = false; |
448 | | - if(bluetoothState == BT_CONNECTED) |
| 447 | + if (bluetoothState == BT_CONNECTED) |
449 | 448 | bluetoothOriginallyConnected = true; |
450 | 449 |
|
451 | 450 | bluetoothStop(); // Release available heap to allow room for TLS |
@@ -565,7 +564,7 @@ bool pointperfectUpdateKeys() |
565 | 564 | if (certificateContents) |
566 | 565 | free(certificateContents); |
567 | 566 |
|
568 | | - if(bluetoothOriginallyConnected == true) |
| 567 | + if (bluetoothOriginallyConnected == true) |
569 | 568 | bluetoothStart(); |
570 | 569 |
|
571 | 570 | // Return the key status |
@@ -1261,7 +1260,8 @@ void updateLBand() |
1261 | 1260 | { |
1262 | 1261 | lbandRestarts++; |
1263 | 1262 |
|
1264 | | - lbandTimeFloatStarted = millis(); //Restart timer for L-Band. Don't immediately reset ZED to achieve fix. |
| 1263 | + lbandTimeFloatStarted = |
| 1264 | + millis(); // Restart timer for L-Band. Don't immediately reset ZED to achieve fix. |
1265 | 1265 |
|
1266 | 1266 | // Hotstart ZED to try to get RTK lock |
1267 | 1267 | theGNSS.softwareResetGNSSOnly(); |
@@ -1293,7 +1293,8 @@ void updateLBand() |
1293 | 1293 | if (lBandCommunicationEnabled == true) |
1294 | 1294 | { |
1295 | 1295 | log_d("Disabling L-Band communication due to RTCM reception"); |
1296 | | - lBandCommunicationEnabled = !zedDisableLBandCommunication(); //zedDisableLBandCommunication() returns true if we successfully disabled |
| 1296 | + lBandCommunicationEnabled = !zedDisableLBandCommunication(); // zedDisableLBandCommunication() returns |
| 1297 | + // true if we successfully disabled |
1297 | 1298 | } |
1298 | 1299 | } |
1299 | 1300 | } |
|
0 commit comments