initial commit from backup
This commit is contained in:
parent
170858aacf
commit
4cc886ee5a
398
ALS31313.c
Normal file
398
ALS31313.c
Normal file
@ -0,0 +1,398 @@
|
||||
/*
|
||||
* ALS31313.c
|
||||
*
|
||||
* Created on: 8 Apr 2021
|
||||
* Author: angoosh
|
||||
*
|
||||
* Datasheet: https://www.allegromicro.com/~/media/Files/Datasheets/ALS31313-Datasheet.ashx
|
||||
*/
|
||||
|
||||
#include "ALS31313.h"
|
||||
|
||||
void Enable_Setting_Modification();
|
||||
uint32_t Modify_Hall_EEPROM_Settings(int, uint32_t, ACCESS);
|
||||
uint32_t Modify_Hall_Register_Settings(int, uint32_t, ACCESS);
|
||||
int readHallData(int*, float*);
|
||||
double readDegrees(AXIS_PAIR);
|
||||
|
||||
void Enable_Setting_Modification(){
|
||||
uint8_t address = 0x35;
|
||||
int value = 0x2C413534;
|
||||
uint8_t registerData[4];
|
||||
|
||||
registerData[0] = 0x2C;
|
||||
registerData[1] = 0x41;
|
||||
registerData[2] = 0x35;
|
||||
registerData[3] = 0x34;
|
||||
|
||||
sendI2CMaster(HALL_I2C_ADDR, address, registerData, 4, false);
|
||||
}
|
||||
|
||||
/* @brief Settings 0-19
|
||||
* 0: 3bit - BW select
|
||||
* 1: 2bit - Hall mode
|
||||
* 2: 1bit - I2C CRC Rnable
|
||||
* 3: 1bit - Disable Slave ADC
|
||||
* 4: 7bit - Slave Address
|
||||
* 5: 1bit - I2C Threshold
|
||||
* 6: 3bit - Axes Channel Enable
|
||||
* 7: 1bit - INT Latch Enable
|
||||
* 8: 1bit - Signed INT Enable
|
||||
* 9: 1bit - INT Mode
|
||||
* 10: 1bit - INT EEPROM Status
|
||||
* 11: 1bit - INT EEPROM Enable
|
||||
* 12: 3bit - Axes INT Enable
|
||||
* 13: 6bit - Z INT Threshold
|
||||
* 14: 6bit - Y INT Threshold
|
||||
* 15: 6bit - X INT Threshold
|
||||
* 16: 5bit - 0x02 Customer EEPROM
|
||||
* 17: 26bit - 0x0D Customer EEPROM
|
||||
* 18: 26bit - 0x0E Customer EEPROM
|
||||
* 19: 26bit - 0x0F Customer EEPROM
|
||||
* @param setting number
|
||||
* @param value to write, if reading it doesn't matter
|
||||
* @param READ/WRITE
|
||||
* @retval read desired value of memory block, 1 if write successful or 0 if error
|
||||
*/
|
||||
|
||||
uint32_t Modify_Hall_EEPROM_Settings(int setting, uint32_t value, ACCESS rw){
|
||||
int address, returnVal;
|
||||
uint8_t registerData[4];
|
||||
|
||||
if((setting < 8) || (setting == 16)){
|
||||
address = 0x02;
|
||||
}
|
||||
else if(setting < 16){
|
||||
address = 0x03;
|
||||
}
|
||||
else if((setting > 16)&&(setting < 20)){
|
||||
address = 0x0D + (setting - 17);
|
||||
}
|
||||
|
||||
if(rw == READ){
|
||||
//read 32bit data (eeprom cell)
|
||||
SendReadI2CMaster(HALL_I2C_ADDR, address, registerData, 4, false);
|
||||
|
||||
if(setting == 0){
|
||||
returnVal = registerData[1];
|
||||
returnVal &= 0xE0;
|
||||
return returnVal >> 5;
|
||||
}
|
||||
else if(setting == 1){
|
||||
returnVal = registerData[1];
|
||||
returnVal &= 0x18;
|
||||
return returnVal >> 3;
|
||||
}
|
||||
else if(setting == 2){
|
||||
returnVal = registerData[1];
|
||||
returnVal &= 0x04;
|
||||
return returnVal >> 2;
|
||||
}
|
||||
else if(setting == 3){
|
||||
returnVal = registerData[1];
|
||||
returnVal &= 0x02;
|
||||
return returnVal >> 1;
|
||||
}
|
||||
else if(setting == 4){
|
||||
uint8_t returnVal_MSB = registerData[1];
|
||||
uint8_t returnVal_LSB = registerData[2];
|
||||
returnVal_MSB &= 0x01;
|
||||
returnVal_LSB &= 0xFC;
|
||||
returnVal = returnVal_MSB << 6;
|
||||
returnVal += returnVal_LSB >> 2;
|
||||
return returnVal;
|
||||
}
|
||||
else if(setting == 5){
|
||||
returnVal = registerData[2];
|
||||
returnVal &= 0x02;
|
||||
return returnVal >> 1;
|
||||
}
|
||||
else if(setting == 6){
|
||||
uint8_t returnVal_MSB = registerData[2];
|
||||
uint8_t returnVal_LSB = registerData[3];
|
||||
returnVal_MSB &= 0x01;
|
||||
returnVal_LSB &= 0xC0;
|
||||
returnVal = returnVal_MSB << 2;
|
||||
returnVal += returnVal_LSB >> 6;
|
||||
return returnVal;
|
||||
}
|
||||
else if(setting == 7){
|
||||
returnVal = registerData[3];
|
||||
returnVal &= 0x10;
|
||||
return returnVal >> 4;
|
||||
}
|
||||
else if(setting == 16){
|
||||
returnVal = registerData[3];
|
||||
returnVal &= 0x0F;
|
||||
return returnVal;
|
||||
}
|
||||
else if(setting == 8){
|
||||
returnVal = registerData[0];
|
||||
returnVal &= 0x01;
|
||||
return returnVal;
|
||||
}
|
||||
else if(setting == 9){
|
||||
returnVal = registerData[1];
|
||||
returnVal &= 0x80;
|
||||
return returnVal >> 7;
|
||||
}
|
||||
else if(setting == 10){
|
||||
returnVal = registerData[1];
|
||||
returnVal &= 0x40;
|
||||
return returnVal >> 6;
|
||||
}
|
||||
else if(setting == 11){
|
||||
returnVal = registerData[1];
|
||||
returnVal &= 0x20;
|
||||
return returnVal >> 5;
|
||||
}
|
||||
else if(setting == 12){
|
||||
returnVal = registerData[1];
|
||||
returnVal &= 0x1C;
|
||||
return returnVal >> 2;
|
||||
}
|
||||
else if(setting == 13){
|
||||
uint8_t returnVal_MSB = registerData[1];
|
||||
uint8_t returnVal_LSB = registerData[2];
|
||||
returnVal_MSB &= 0x03;
|
||||
returnVal_LSB &= 0xF0;
|
||||
returnVal = returnVal_MSB << 4;
|
||||
returnVal += returnVal_LSB >> 4;
|
||||
return returnVal;
|
||||
}
|
||||
else if(setting == 14){
|
||||
uint8_t returnVal_MSB = registerData[2];
|
||||
uint8_t returnVal_LSB = registerData[3];
|
||||
returnVal_MSB &= 0x0F;
|
||||
returnVal_LSB &= 0xC0;
|
||||
returnVal = returnVal_MSB << 2;
|
||||
returnVal += returnVal_LSB >> 6;
|
||||
return returnVal;
|
||||
}
|
||||
else if(setting == 15){
|
||||
returnVal = registerData[3];
|
||||
returnVal &= 0x3F;
|
||||
return returnVal;
|
||||
}
|
||||
else if(setting >= 17){
|
||||
uint8_t returnVal_MSB = registerData[0];
|
||||
uint8_t returnVal_LMSB = registerData[1];
|
||||
uint8_t returnVal_MLSB = registerData[2];
|
||||
uint8_t returnVal_LSB = registerData[3];
|
||||
returnVal_MSB &= 0x01;
|
||||
returnVal = returnVal_MSB << 24;
|
||||
returnVal += returnVal_LMSB << 16;
|
||||
returnVal += returnVal_MLSB << 8;
|
||||
returnVal += returnVal_LSB;
|
||||
|
||||
return returnVal;
|
||||
}
|
||||
}
|
||||
else{
|
||||
//read 32bit data (eeprom cell)
|
||||
SendReadI2CMaster(HALL_I2C_ADDR, address, registerData, 4, false);
|
||||
|
||||
if(setting == 0){
|
||||
registerData[1] = ((registerData[1] & ~0xE0) | (value << 5));
|
||||
}
|
||||
else if(setting == 1){
|
||||
registerData[1] = ((registerData[1] & ~0x18) | (value << 3));
|
||||
}
|
||||
else if(setting == 2){
|
||||
registerData[1] = ((registerData[1] & ~0x04) | (value << 2));
|
||||
}
|
||||
else if(setting == 3){
|
||||
registerData[1] = ((registerData[1] & ~0x02) | (value << 1));
|
||||
}
|
||||
else if(setting == 4){
|
||||
uint8_t returnVal_MSB = (value >> 6);
|
||||
uint8_t returnVal_LSB = (value << 2);
|
||||
registerData[1] = ((registerData[1] & ~0x01) | (returnVal_MSB << 0));
|
||||
registerData[2] = ((registerData[2] & ~0xFC) | (returnVal_LSB << 0));
|
||||
}
|
||||
else if(setting == 5){
|
||||
registerData[2] = ((registerData[2] & ~0x02) | (value << 1));
|
||||
}
|
||||
else if(setting == 6){
|
||||
uint8_t returnVal_MSB = (value >> 2);
|
||||
uint8_t returnVal_LSB = (value << 6);
|
||||
registerData[2] = ((registerData[2] & ~0x01) | (returnVal_MSB << 0));
|
||||
registerData[3] = ((registerData[3] & ~0xC0) | (returnVal_LSB << 0));
|
||||
}
|
||||
else if(setting == 7){
|
||||
registerData[3] = ((registerData[3] & ~0x10) | (value << 4));
|
||||
}
|
||||
else if(setting == 16){
|
||||
registerData[3] = ((registerData[3] & ~0x0F) | (value << 0));
|
||||
}
|
||||
else if(setting == 8){
|
||||
registerData[0] = ((registerData[0] & ~0x01) | (value << 0));
|
||||
}
|
||||
else if(setting == 9){
|
||||
registerData[1] = ((registerData[1] & ~0x80) | (value << 7));
|
||||
}
|
||||
else if(setting == 10){
|
||||
registerData[1] = ((registerData[1] & ~0x40) | (value << 6));
|
||||
}
|
||||
else if(setting == 11){
|
||||
registerData[1] = ((registerData[1] & ~0x20) | (value << 5));
|
||||
}
|
||||
else if(setting == 12){
|
||||
registerData[1] = ((registerData[1] & ~0x1C) | (value << 2));
|
||||
}
|
||||
else if(setting == 13){
|
||||
uint8_t returnVal_MSB = (value >> 4);
|
||||
uint8_t returnVal_LSB = (value << 4);
|
||||
registerData[1] = ((registerData[1] & ~0x03) | (returnVal_MSB << 0));
|
||||
registerData[2] = ((registerData[2] & ~0xF0) | (returnVal_LSB << 0));
|
||||
}
|
||||
else if(setting == 14){
|
||||
uint8_t returnVal_MSB = (value >> 2);
|
||||
uint8_t returnVal_LSB = (value << 6);
|
||||
registerData[2] = ((registerData[2] & ~0x0F) | (returnVal_MSB << 0));
|
||||
registerData[3] = ((registerData[3] & ~0xC0) | (returnVal_LSB << 0));
|
||||
}
|
||||
else if(setting == 15){
|
||||
registerData[3] = ((registerData[3] & ~0x3F) | (value << 0));
|
||||
}
|
||||
else if(setting >= 17){
|
||||
uint8_t returnVal_MSB = (value >> 24) & 0x01;
|
||||
uint8_t returnVal_LMSB = (value >> 16) & 0xFF;
|
||||
uint8_t returnVal_MLSB = (value >> 8) & 0xFF;
|
||||
uint8_t returnVal_LSB = (value & 0xFF);
|
||||
registerData[0] = ((registerData[0] & ~0xFF) | (returnVal_MSB << 0));
|
||||
registerData[1] = ((registerData[1] & ~0xFF) | (returnVal_LMSB << 0));
|
||||
registerData[2] = ((registerData[2] & ~0xFF) | (returnVal_MLSB << 0));
|
||||
registerData[3] = ((registerData[3] & ~0xFF) | (returnVal_LSB << 0));
|
||||
}
|
||||
|
||||
//write modified data to eeprom
|
||||
sendI2CMaster(HALL_I2C_ADDR, address, registerData, 4, false);
|
||||
|
||||
return 1;
|
||||
}
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
/* @brief Settings 0-2
|
||||
* 0: 3bit - Low-Power Mode - Count Max
|
||||
* 1: 2bit - I2C Loop-Mode
|
||||
* 2: 2bit - Sleep
|
||||
* @param setting number
|
||||
* @param value to write, if reading it doesn't matter
|
||||
* @param READ/WRITE
|
||||
* @retval read desired value of memory block, 1 if write successful or 0 if error
|
||||
*/
|
||||
uint32_t Modify_Hall_Register_Settings(int setting, uint32_t value, ACCESS rw){
|
||||
int address, returnVal;
|
||||
uint8_t registerData[4];
|
||||
|
||||
address = 0x27;
|
||||
|
||||
if(rw == READ){
|
||||
//read 32bit data (eeprom cell)
|
||||
SendReadI2CMaster(HALL_I2C_ADDR, address, registerData, 4, false);
|
||||
|
||||
if(setting == 0){
|
||||
returnVal = registerData[3];
|
||||
returnVal &= 0x70;
|
||||
return returnVal >> 4;
|
||||
}
|
||||
else if(setting == 1){
|
||||
returnVal = registerData[3];
|
||||
returnVal &= 0x0C;
|
||||
return returnVal >> 2;
|
||||
}
|
||||
else if(setting == 2){
|
||||
returnVal = registerData[3];
|
||||
returnVal &= 0x03;
|
||||
return returnVal;
|
||||
}
|
||||
}
|
||||
else{
|
||||
//read 32bit data (eeprom cell)
|
||||
SendReadI2CMaster(HALL_I2C_ADDR, address, registerData, 4, false);
|
||||
|
||||
if(setting == 0){
|
||||
registerData[3] = ((registerData[3] & ~0x70) | (value << 4));
|
||||
}
|
||||
else if(setting == 1){
|
||||
registerData[3] = ((registerData[3] & ~0x0C) | (value << 2));
|
||||
}
|
||||
else if(setting == 2){
|
||||
registerData[3] = ((registerData[3] & ~0x03) | (value << 0));
|
||||
}
|
||||
//write modified data to eeprom
|
||||
sendI2CMaster(HALL_I2C_ADDR, address, registerData, 4, false);
|
||||
|
||||
return 1;
|
||||
}
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
/**
|
||||
* @brief Read sensoric data from ALS31313
|
||||
* @param int array of min size 3, stores x, y, z gauss value in this order
|
||||
* @param float array of min size 1, temperature of the sensor in C
|
||||
* @retval Hall Mode Status - 0 = Single-Ended, 1 = Differential, 2 = Common
|
||||
*/
|
||||
int readHallData(int *xyz, float *temp){
|
||||
uint8_t registerData[8];
|
||||
int16_t x, y, z;
|
||||
int x_raw, y_raw, z_raw, temp_raw;
|
||||
int x_g, y_g, z_g;
|
||||
float tempr;
|
||||
|
||||
//read registers 0x28 and 0x29 respectively
|
||||
SendReadI2CMaster(HALL_I2C_ADDR, 0x28, registerData, 8, false);
|
||||
|
||||
x_raw = registerData[0] << 4;
|
||||
y_raw = registerData[1] << 4;
|
||||
z_raw = registerData[2] << 4;
|
||||
temp_raw = (registerData[3] & 0x3F) << 6;
|
||||
|
||||
x_raw += (registerData[5] & 0x0F);
|
||||
y_raw += (registerData[6] & 0xF0) >> 4;
|
||||
z_raw += (registerData[6] & 0x0F);
|
||||
temp_raw += (registerData[7] & 0x3F);
|
||||
|
||||
x = (x_raw & 0x0800) ? (x_raw | 0xf800) : x_raw;
|
||||
y = (y_raw & 0x0800) ? (y_raw | 0xf800) : y_raw;
|
||||
z = (z_raw & 0x0800) ? (z_raw | 0xf800) : z_raw;
|
||||
|
||||
//convert raw data to gauss and temperature
|
||||
x_g = x / LSB_GAUSS;
|
||||
y_g = y / LSB_GAUSS;
|
||||
z_g = z / LSB_GAUSS;
|
||||
tempr = (((float)302*((float)temp_raw-(float)1708))/(float)4096);
|
||||
temp[0] = tempr;
|
||||
|
||||
xyz[0] = x_g;
|
||||
xyz[1] = y_g;
|
||||
xyz[2] = z_g;
|
||||
|
||||
return ((registerData[7] & 0xC0) >> 6);
|
||||
}
|
||||
|
||||
/**
|
||||
* @brief Read degrees from ALS31313
|
||||
* @param what axes to read: XY, XZ, YZ
|
||||
* @retval degrees
|
||||
*/
|
||||
double readDegrees(AXIS_PAIR pair){
|
||||
float temp;
|
||||
int xyz[3];
|
||||
readHallData(xyz, &temp);
|
||||
|
||||
if(pair == XY){
|
||||
return ((atan2(xyz[1],xyz[0])*(180/3.14159))+180);
|
||||
}
|
||||
else if(pair == XZ){
|
||||
return ((atan2(xyz[2],xyz[0])*(180/3.14159))+180);
|
||||
}
|
||||
else{
|
||||
return ((atan2(xyz[1],xyz[2])*(180/3.14159))+180);
|
||||
}
|
||||
}
|
37
ALS31313.h
Normal file
37
ALS31313.h
Normal file
@ -0,0 +1,37 @@
|
||||
/*
|
||||
* ALS31313.h
|
||||
*
|
||||
* Created on: 8 Apr 2021
|
||||
* Author: angoosh
|
||||
*/
|
||||
|
||||
#ifndef ALS31313_H_
|
||||
#define ALS31313_H_
|
||||
|
||||
#include "chip.h"
|
||||
#include "main.h"
|
||||
#include "debug.h"
|
||||
#include "I2C.h"
|
||||
#include <math.h>
|
||||
|
||||
typedef enum {
|
||||
READ = 0,
|
||||
WRITE = 1
|
||||
} ACCESS;
|
||||
|
||||
typedef enum {
|
||||
XY = 0,
|
||||
XZ = 1,
|
||||
YZ = 2
|
||||
} AXIS_PAIR;
|
||||
|
||||
#define HALL_I2C_ADDR 0x60
|
||||
#define LSB_GAUSS 1
|
||||
|
||||
void Enable_Setting_Modification();
|
||||
uint32_t Modify_Hall_EEPROM_Settings(int setting, uint32_t value, ACCESS rw);
|
||||
uint32_t Modify_Hall_Register_Settings(int setting, uint32_t value, ACCESS rw);
|
||||
int readHallData(int *xyz, float *temp);
|
||||
double readDegrees(AXIS_PAIR pair);
|
||||
|
||||
#endif /* ALS31313_H_ */
|
452
Alink.c
Executable file
452
Alink.c
Executable file
@ -0,0 +1,452 @@
|
||||
//************************************************************************************
|
||||
|
||||
//**************** Alink (c) Angoosh *****************
|
||||
//**************** ADCIS s.r.o. *****************
|
||||
|
||||
//**************** Alink *****************
|
||||
// ver 1.0.0
|
||||
// 11.11.2019
|
||||
//************************************************************************************
|
||||
|
||||
#include "Alink.h"
|
||||
#include "main.h"
|
||||
|
||||
|
||||
//void checkA5(uint8_t, uint8_t, uint8_t);
|
||||
void TxParseMSG(UART_HandleTypeDef*,int,uint8_t,uint8_t,uint8_t);
|
||||
void RxParseMSG(UART_HandleTypeDef*,uint8_t*);
|
||||
|
||||
/*
|
||||
* Vysilani zpravy: A5, rec add, ln, my add, 0, data, CRC
|
||||
* 0 verze sw: A5, rec add, 0C, ADDRESS, 0, VERSION, SUB_VERSION, RELEASE, BUGFIX, CRC
|
||||
* 1 status: A5, rec add, 08, ADDRESS, 0, STATUS, CRC
|
||||
* 2 err: A5, rec add, 08, ADDRESS, 1, ERROR, CRC
|
||||
*
|
||||
* parametry fce:
|
||||
* type: 0,1,2 (verze, status, err)
|
||||
* mess: 0,1,2 (verze - pouze 0, status - 1,2,3, err - 1,2)
|
||||
*
|
||||
*
|
||||
* data bit:
|
||||
* 0 - version
|
||||
* 1 - status - sleep
|
||||
* 2 - status - charging
|
||||
* 3 - status - running
|
||||
* 4 - err - UNDERVOLT
|
||||
* 5 - err - FET_ERR
|
||||
*/
|
||||
|
||||
/**
|
||||
* @brief A5 symbol replacement pattern find
|
||||
* @param checked byte
|
||||
* @param retval for first replacement byte
|
||||
* @param retval for second replacement byte
|
||||
*/
|
||||
void checkA5(uint8_t byte, uint8_t *arr1, uint8_t *arr2){ //kontrola, zda ve zprave neni A5
|
||||
if(byte == 0xA5){
|
||||
*arr1 = 0xAA;
|
||||
*arr2 = 0xA8;
|
||||
}
|
||||
else if(byte == 0xAA){
|
||||
*arr1 = 0xAA;
|
||||
*arr2 = 0xAA;
|
||||
}
|
||||
else{
|
||||
*arr1 = byte;
|
||||
*arr2 = 0x00;
|
||||
}
|
||||
}
|
||||
|
||||
void A5pattern(uint8_t *messageIn, uint8_t *messageOut){
|
||||
|
||||
}
|
||||
/**
|
||||
* @brief CRC calculation function
|
||||
* @param data array pointer
|
||||
* @param data length
|
||||
* @retval crc byte
|
||||
*/
|
||||
uint8_t CRC_Calc(uint8_t *data, uint8_t length){
|
||||
uint8_t crc = 0;
|
||||
for(int i = 0; i<length; i++){
|
||||
crc ^= data[i];
|
||||
}
|
||||
return crc;
|
||||
}
|
||||
|
||||
/**
|
||||
* @brief Receive message parser and command executer
|
||||
* @param huart typedef
|
||||
* @param message
|
||||
*/
|
||||
void RxParseMSG(UART_HandleTypeDef *huart, uint8_t *dataBuffer){
|
||||
uint8_t isLCB = 0;
|
||||
//uint8_t msgMyAddr = dataBuffer[1];
|
||||
uint8_t msgLen = dataBuffer[2];
|
||||
uint8_t msgTxAddr = dataBuffer[3];
|
||||
uint8_t msgCmd = dataBuffer[4];
|
||||
uint8_t msgCrc = dataBuffer[msgLen-1];
|
||||
uint8_t msgPreData[msgLen-6];
|
||||
if(msgLen > 6){
|
||||
for(int i = 0; i<sizeof(msgPreData); i++){
|
||||
msgPreData[i] = dataBuffer[5+i];
|
||||
}
|
||||
}
|
||||
uint8_t payload = 0;
|
||||
uint8_t msgForCrc[msgLen-2];
|
||||
|
||||
for(int m = 0; m<sizeof(msgForCrc); m++){
|
||||
msgForCrc[m] = dataBuffer[m+1];
|
||||
}
|
||||
if(msgCrc == CRC_Calc(msgForCrc, sizeof(msgForCrc))){
|
||||
if(msgTxAddr >= LCBADDRMIN && msgTxAddr <= LCBADDRMAX){
|
||||
isLCB = 1;
|
||||
}
|
||||
}
|
||||
|
||||
uint8_t AAcount = 0;
|
||||
for(int i = 0; i<sizeof(msgPreData); i++){
|
||||
if(msgPreData[i] == 0xAA){
|
||||
AAcount++;
|
||||
i++;
|
||||
}
|
||||
}
|
||||
|
||||
uint8_t msgData[sizeof(msgPreData)-AAcount];
|
||||
uint8_t j = 0;
|
||||
for(int i = 0; i<sizeof(msgPreData); i++){
|
||||
if(msgPreData[i+j] == 0xAA){
|
||||
if(msgPreData[i+j+1] == 0xAA){
|
||||
msgData[i] = 0xAA;
|
||||
}
|
||||
else{
|
||||
msgData[i] = 0xA5;
|
||||
}
|
||||
j++;
|
||||
}
|
||||
else{
|
||||
msgData[i] = msgPreData[i+j];
|
||||
}
|
||||
}
|
||||
|
||||
if(isLCB == 1){
|
||||
if(msgLen > 6){
|
||||
payload = 1;
|
||||
}
|
||||
|
||||
if(msgCmd == SW_VER_ASK){ //verze sw //type 0
|
||||
TxParseMSG(huart,0,0x00,0x00,msgTxAddr);
|
||||
}
|
||||
else if(msgCmd == STATUS){ //stav (charging, off, on) //type 1
|
||||
uint8_t msgStatus = 0;
|
||||
TxParseMSG(huart,1,0x00,msgStatus,msgTxAddr);
|
||||
}
|
||||
else if(msgCmd == STATE_ASK){ //status (err) //type 2
|
||||
uint8_t msgState = 0;
|
||||
TxParseMSG(huart,2,0x00,msgState,msgTxAddr);
|
||||
}
|
||||
#ifdef ALINK_CTRL
|
||||
else if(msgCmd == ALINK_STABLE_STATE && payload == 1){//zapnuti/vypnuti ustaleneho stavu, default je vyply
|
||||
SteadyState = msgData[0];
|
||||
}
|
||||
else if(msgCmd == ALINK_BLOCK_PLS && payload == 1){//vyber ktere pulsy blokovat, popis funkce je v @info
|
||||
if(msgData[0] == 0x00){
|
||||
for(int i = 0; i < 8; i++){
|
||||
INJ0.PULSE_DEL_ARR[i] = msgData[1+i];
|
||||
}
|
||||
}
|
||||
else if(msgData[0] == 0x01){
|
||||
for(int i = 0; i < 8; i++){
|
||||
INJ1.PULSE_DEL_ARR[i] = msgData[1+i];
|
||||
}
|
||||
}
|
||||
else if(msgData[0] == 0x02){
|
||||
for(int i = 0; i < 8; i++){
|
||||
INJ2.PULSE_DEL_ARR[i] = msgData[1+i];
|
||||
}
|
||||
}
|
||||
else;
|
||||
}
|
||||
else if(msgCmd == ALINK_BLOCK_PLS_END && payload == 1){//vyber po ktere pulsy blokovat, popis funkce je v @info
|
||||
if(msgData[0] == 0x00){
|
||||
for(int i = 0; i < 8; i++){
|
||||
INJ0.PULSE_DEL_END_ARR[i] = msgData[1+i];
|
||||
}
|
||||
}
|
||||
else if(msgData[0] == 0x01){
|
||||
for(int i = 0; i < 8; i++){
|
||||
INJ1.PULSE_DEL_END_ARR[i] = msgData[1+i];
|
||||
}
|
||||
}
|
||||
else if(msgData[0] == 0x02){
|
||||
for(int i = 0; i < 8; i++){
|
||||
INJ2.PULSE_DEL_END_ARR[i] = msgData[1+i];
|
||||
}
|
||||
}
|
||||
else;
|
||||
}
|
||||
else if(msgCmd == ALINK_FET_SW_PAUSE && payload == 1){//Nastaveni delky pauzy mezi prepinani fetu
|
||||
int hi = msgData[1];
|
||||
int lo = msgData[2];
|
||||
int delay = (hi*256)+lo;
|
||||
|
||||
if(msgData[0] == 0x00){
|
||||
INJ0.SWITCH_DELAY = SwitchDelaySetup(INJ0, delay);
|
||||
}
|
||||
else if(msgData[0] == 0x01){
|
||||
INJ1.SWITCH_DELAY = SwitchDelaySetup(INJ1, delay);
|
||||
}
|
||||
else if(msgData[0] == 0x02){
|
||||
INJ2.SWITCH_DELAY = SwitchDelaySetup(INJ2, delay);
|
||||
}
|
||||
else;
|
||||
}
|
||||
else if(msgCmd == ALINK_PULSE_BLK_TIM && payload == 1){//po kolika ms blokovat puls 2B
|
||||
uint8_t hi = msgData[1];
|
||||
uint8_t lo = msgData[2];
|
||||
|
||||
float ARR = 65535;
|
||||
float PSC = 53;
|
||||
|
||||
float x = (1/(SysClk/APBDiv))*(PSC+1)*(ARR+1)*1000;
|
||||
float us = (x/ARR)*1000;
|
||||
int BlockPulseAfterMs = (hi*256)+lo;
|
||||
int BlockPulseAfterTicks = BlockPulseAfterMs/us;
|
||||
|
||||
if(msgData[0] == 0x00){
|
||||
INJ0.BLOCK_AFTER_TICKS = BlockPulseAfterTicks;
|
||||
INJ0.BLOCK_AFTER_US = BlockPulseAfterMs;
|
||||
}
|
||||
else if(msgData[0] == 0x01){
|
||||
INJ1.BLOCK_AFTER_TICKS = BlockPulseAfterTicks;
|
||||
INJ1.BLOCK_AFTER_US = BlockPulseAfterMs;
|
||||
}
|
||||
else if(msgData[0] == 0x02){
|
||||
INJ2.BLOCK_AFTER_TICKS = BlockPulseAfterTicks;
|
||||
INJ2.BLOCK_AFTER_US = BlockPulseAfterMs;
|
||||
}
|
||||
else;
|
||||
}
|
||||
#ifdef ALINK_BRD_RST
|
||||
else if(msgData[0] == ALINK_BRD_RST){
|
||||
TxParseMSG(huart,3,0x00,msgData[0],msgTxAddr);
|
||||
HAL_NVIC_SystemReset();
|
||||
}
|
||||
#endif
|
||||
}
|
||||
#endif
|
||||
else;
|
||||
}
|
||||
|
||||
/**
|
||||
* @brief Response message parser
|
||||
* @param huart typedef
|
||||
* @param type of message
|
||||
* @param command
|
||||
* @param data of message
|
||||
* @param address of destination device
|
||||
*/
|
||||
void TxParseMSG(UART_HandleTypeDef *huart, int type, uint8_t CMD, uint8_t mess, uint8_t addr){
|
||||
uint8_t crc = 0;
|
||||
int datasize = 0;
|
||||
uint8_t data_buffer[40];
|
||||
uint8_t data_buffer_size = 0;
|
||||
|
||||
//verze softwaru
|
||||
if(type == 0){
|
||||
uint8_t data[] = {addr,0x0A,ADDRESS,CMD,VERSION,SUB_VERSION,RELEASE,BUGFIX};
|
||||
datasize = sizeof(data);
|
||||
|
||||
for(int i = 0; i<sizeof(data); i++){
|
||||
uint8_t a,b;
|
||||
checkA5(data[i], &a, &b);
|
||||
if(a != 0 && b != 0){
|
||||
datasize ++;
|
||||
data[1]++;
|
||||
}
|
||||
}
|
||||
|
||||
datasize ++;
|
||||
uint8_t datanew[datasize];
|
||||
datanew[0] = 0xA5;
|
||||
int j = 0;
|
||||
for(int i = 1; i<sizeof(datanew); i++){
|
||||
uint8_t a,b;
|
||||
checkA5(data[i-1], &a, &b);
|
||||
if(a != 0 && b != 0){
|
||||
datanew[i+j] = a;
|
||||
datanew[i+j+1] = b;
|
||||
j++;
|
||||
}
|
||||
else{
|
||||
datanew[i+j] = a;
|
||||
}
|
||||
}
|
||||
for(int i = 0; i<sizeof(datanew); i++){
|
||||
data_buffer[i] = datanew[i];
|
||||
data_buffer_size ++;
|
||||
}
|
||||
|
||||
uint8_t dataForCrc[sizeof(datanew-1)];
|
||||
for(int i = 0; i < sizeof(dataForCrc); i++){
|
||||
dataForCrc[i] = datanew[i+1];
|
||||
}
|
||||
crc = CRC_Calc(dataForCrc,sizeof(dataForCrc));
|
||||
}
|
||||
|
||||
|
||||
//status
|
||||
else if(type == 1){
|
||||
__IO uint32_t DATA_READ = 0;
|
||||
uint8_t data[] = {addr,0x13,ADDRESS,CMD,mess,0,0,0,0,0,0,0,0,0,0,0,0};
|
||||
datasize = sizeof(data);
|
||||
|
||||
DATA_READ = *(__IO uint32_t*)SERIAL_ADDRESS;
|
||||
data[13] = DATA_READ >> 24;
|
||||
data[14] = DATA_READ >> 16;
|
||||
data[15] = DATA_READ >> 8;
|
||||
data[16] = DATA_READ;
|
||||
|
||||
for(int i = 0; i<sizeof(data); i++){
|
||||
uint8_t a,b;
|
||||
checkA5(data[i], &a, &b);
|
||||
if(a != 0 && b != 0){
|
||||
datasize ++;
|
||||
data[1]++;
|
||||
}
|
||||
}
|
||||
datasize ++;
|
||||
uint8_t datanew[datasize];
|
||||
datanew[0] = 0xA5;
|
||||
int j = 0;
|
||||
for(int i = 1; i<sizeof(datanew); i++){
|
||||
uint8_t a,b;
|
||||
checkA5(data[i-1], &a, &b);
|
||||
if(a != 0 && b != 0){
|
||||
datanew[j+i] = a;
|
||||
datanew[j+i+1] = b;
|
||||
j++;
|
||||
}
|
||||
else{
|
||||
datanew[j+i] = a;
|
||||
}
|
||||
}
|
||||
for(int i = 0; i<sizeof(datanew); i++){
|
||||
data_buffer[i] = datanew[i];
|
||||
data_buffer_size ++;
|
||||
}
|
||||
|
||||
uint8_t dataForCrc[sizeof(datanew-1)];
|
||||
for(int i = 0; i < sizeof(dataForCrc); i++){
|
||||
dataForCrc[i] = datanew[i+1];
|
||||
}
|
||||
crc = CRC_Calc(dataForCrc,sizeof(dataForCrc));
|
||||
}
|
||||
|
||||
//error report
|
||||
else if(type == 2){
|
||||
uint8_t data[] = {addr,0x07,ADDRESS,CMD,mess};
|
||||
datasize = sizeof(data);
|
||||
|
||||
for(int i = 0; i<sizeof(data); i++){
|
||||
uint8_t a,b;
|
||||
checkA5(data[i], &a, &b);
|
||||
if(a != 0 && b != 0){
|
||||
datasize ++;
|
||||
data[1]++;
|
||||
}
|
||||
}
|
||||
datasize ++;
|
||||
uint8_t datanew[datasize];
|
||||
datanew[0] = 0xA5;
|
||||
int j = 0;
|
||||
for(int i = 1; i<sizeof(datanew); i++){
|
||||
uint8_t a,b;
|
||||
checkA5(data[i-1], &a, &b);
|
||||
if(a != 0 && b != 0){
|
||||
datanew[j+i] = a;
|
||||
datanew[j+i+1] = b;
|
||||
j++;
|
||||
}
|
||||
else{
|
||||
datanew[j+i] = a;
|
||||
}
|
||||
}
|
||||
for(int i = 0; i<sizeof(datanew); i++){
|
||||
data_buffer[i] = datanew[i];
|
||||
data_buffer_size ++;
|
||||
}
|
||||
|
||||
uint8_t dataForCrc[sizeof(datanew-1)];
|
||||
for(int i = 0; i < sizeof(dataForCrc); i++){
|
||||
dataForCrc[i] = datanew[i+1];
|
||||
}
|
||||
crc = CRC_Calc(dataForCrc,sizeof(dataForCrc));
|
||||
}
|
||||
//else messages
|
||||
else if(type == 3){
|
||||
uint8_t data[] = {addr,0x07,ADDRESS,CMD,mess};
|
||||
datasize = sizeof(data);
|
||||
|
||||
for(int i = 0; i<sizeof(data); i++){
|
||||
uint8_t a,b;
|
||||
checkA5(data[i], &a, &b);
|
||||
if(a != 0 && b != 0){
|
||||
datasize ++;
|
||||
data[1]++;
|
||||
}
|
||||
}
|
||||
datasize ++;
|
||||
uint8_t datanew[datasize];
|
||||
datanew[0] = 0xA5;
|
||||
int j = 0;
|
||||
for(int i = 1; i<sizeof(datanew); i++){
|
||||
uint8_t a,b;
|
||||
checkA5(data[i-1], &a, &b);
|
||||
if(a != 0 && b != 0){
|
||||
datanew[j+i] = a;
|
||||
datanew[j+i+1] = b;
|
||||
j++;
|
||||
}
|
||||
else{
|
||||
datanew[j+i] = a;
|
||||
}
|
||||
}
|
||||
for(int i = 0; i<sizeof(datanew); i++){
|
||||
data_buffer[i] = datanew[i];
|
||||
data_buffer_size ++;
|
||||
}
|
||||
|
||||
uint8_t dataForCrc[sizeof(datanew-1)];
|
||||
for(int i = 0; i < sizeof(dataForCrc); i++){
|
||||
dataForCrc[i] = datanew[i+1];
|
||||
}
|
||||
crc = CRC_Calc(dataForCrc,sizeof(dataForCrc));
|
||||
}
|
||||
else{}
|
||||
|
||||
datasize ++;
|
||||
|
||||
uint8_t a,b;
|
||||
|
||||
checkA5(crc, &a, &b);
|
||||
if(a != 0 && b != 0){
|
||||
datasize ++;
|
||||
uint8_t msg[datasize];
|
||||
for(int i = 0; i<datasize-2; i++){
|
||||
msg[i] = data_buffer[i];
|
||||
}
|
||||
msg[sizeof(msg)-2] = a;
|
||||
msg[sizeof(msg)-1] = b;
|
||||
msg[2]++;
|
||||
HAL_UART_Transmit(huart, (uint8_t *)&msg, sizeof(msg), 0xFFFF);
|
||||
}
|
||||
else{
|
||||
uint8_t msg[datasize];
|
||||
for(int i = 0; i<datasize-1; i++){
|
||||
msg[i] = data_buffer[i];
|
||||
}
|
||||
msg[sizeof(msg)-1] = a;
|
||||
HAL_UART_Transmit(huart, (uint8_t *)&msg, sizeof(msg), 0xFFFF);
|
||||
}
|
||||
}
|
62
Alink.h
Normal file
62
Alink.h
Normal file
@ -0,0 +1,62 @@
|
||||
/*
|
||||
* Alink.h
|
||||
*
|
||||
* Created on: 16. 6. 2020
|
||||
* Author: Adcis
|
||||
*/
|
||||
|
||||
#ifndef INC_ALINK_H_
|
||||
#define INC_ALINK_H_
|
||||
|
||||
#include "main.h"
|
||||
|
||||
#define ALINK_CTL_ENABLE //povoleni rizeni pres Alink
|
||||
#define VERSION 0x02 //verze hardware
|
||||
#define SUB_VERSION 0x01 //verze software
|
||||
#define RELEASE 0x00 //je = 1 / neni = 0 release verze softwaru
|
||||
#define BUGFIX 0x00 //cislo bugfixu (HW verze desky)
|
||||
|
||||
//Flash data
|
||||
#define SERIAL_ADDRESS ((uint32_t)0x0800F000)
|
||||
#define ALINK_CTL_ADDRESS ((uint32_t)0x0800F400)
|
||||
#define ALINK_CTLB_ADDRES ((uint32_t)0x0800F404)
|
||||
#define CALIB_ADDRESS ((uint32_t)0x0800FC00)
|
||||
|
||||
//komunikace
|
||||
#define CRC_CHCK
|
||||
#define ADDRESS 0x31 //adresa desky na SS sbernici
|
||||
|
||||
#define DEF_BYTES_IN_RX 0xFF //velikost RX bufferu
|
||||
|
||||
#define RX_BUFFER DEF_BYTES_IN_RX
|
||||
#define DEBUG_BUFFER 0xFF
|
||||
#define COMMAND_MASK 0x7F
|
||||
#define BROADCAST_MSK 0x80
|
||||
#define STATE_ASK 0x03 //otazka na stav desky (errory) //0x03
|
||||
#define STATE_REPLY 0x04 //odpoved na stav //0x04
|
||||
#define SW_VER_ASK 0x05 //otazka na verzi sw //0x05
|
||||
#define STATUS 0x06 //otazka na status chyb //0x06
|
||||
#define ALINK_TOGGLE 0x40 //toggle Alink rizeni
|
||||
|
||||
//address space
|
||||
#define LCBADDRMIN 0x10
|
||||
#define LCBADDRMAX 0x17
|
||||
|
||||
#ifdef ALINK_CTL_ENABLE
|
||||
#define ALINK_CTRL 0x30 //prikaz pro manualni rizeni
|
||||
#define ALINK_CHARGE_ON 0x01 //turn on charging
|
||||
#define ALINK_CHARGE_OFF 0x00 //turn off charging
|
||||
#define ALINK_RE_ERR_ON 0x02 //turn on RE_ERR
|
||||
#define ALINK_RE_ERR_OFF 0x03 //turn off RE_ERR
|
||||
#define ALINK_EMERG_STOP 0x10 //emergency state of softstart disable
|
||||
#define ALINK_EMERG_GO 0x11 //emergency state of softstart enable
|
||||
#define ALINK_FLASH_SN 0x20 //flash serial number
|
||||
#define ALINK_CRG_CAL 0x21 //calibrate charging by C-
|
||||
#define ALINK_BRD_RST 0xFA //reset whole board - comment to disable
|
||||
#endif
|
||||
|
||||
|
||||
void TxParseMSG(UART_HandleTypeDef *huart, int type, uint8_t CMD, uint8_t mess, uint8_t addr);
|
||||
void RxParseMSG(UART_HandleTypeDef *huart, uint8_t *dataBuffer);
|
||||
|
||||
#endif /* INC_ALINK_H_ */
|
110
CBus.c
Normal file
110
CBus.c
Normal file
@ -0,0 +1,110 @@
|
||||
/*
|
||||
* CBus.c
|
||||
*
|
||||
* Created on: Jun 14, 2021
|
||||
* Author: angoosh
|
||||
*/
|
||||
#include "CBus.h"
|
||||
|
||||
void ReadRxBuffer();
|
||||
void SendPacket();
|
||||
|
||||
uint8_t ptr = 0;
|
||||
uint8_t RX[1];
|
||||
uint8_t WholeRxBuffer[RX_BUFFER_SIZE];
|
||||
|
||||
CBusPacket RxPacket;
|
||||
CBusPacket TxPacket;
|
||||
uint8_t CBusBufTx[64];
|
||||
uint8_t CBusBufTxSize;
|
||||
|
||||
void HAL_UART_RxCpltCallback(UART_HandleTypeDef *huart){
|
||||
WholeRxBuffer[ptr] = RX[0];
|
||||
ptr++;
|
||||
//CLEAR_BIT(huart->Instance->ISR,USART_ISR_RXNE);
|
||||
HAL_UART_Receive_IT(&huart3, RX, 1);
|
||||
}
|
||||
|
||||
void CBusBA(uint8_t byte){
|
||||
#ifdef PREFIXINPACKETACTION
|
||||
if(byte == PREFIX){
|
||||
CBusBufTx[CBusBufTxSize++] = 0xBB;
|
||||
CBusBufTx[CBusBufTxSize++] = 0xBC;
|
||||
}
|
||||
else if(byte == 0xBB){
|
||||
CBusBufTx[CBusBufTxSize++] = 0xBB;
|
||||
CBusBufTx[CBusBufTxSize++] = 0xBB;
|
||||
}
|
||||
else{
|
||||
CBusBufTx[CBusBufTxSize++] = byte;
|
||||
}
|
||||
#else
|
||||
CBusBufTx[CBusBufTxSize++] = byte;
|
||||
#endif
|
||||
}
|
||||
|
||||
void ReadRxBuffer(){
|
||||
uint8_t packtStart = 0;
|
||||
|
||||
for(int l = 0; l<sizeof(WholeRxBuffer); l++){
|
||||
if(packtStart){
|
||||
packtStart = 0;
|
||||
uint8_t PCrc = 0;
|
||||
|
||||
PCrc ^= RxPacket.RxAddr;
|
||||
PCrc ^= RxPacket.Length = WholeRxBuffer[l+1];
|
||||
PCrc ^= RxPacket.Sender = WholeRxBuffer[l+2];
|
||||
PCrc ^= RxPacket.Command = WholeRxBuffer[l+3];
|
||||
for(int i = 0; i < RxPacket.Length-5; i++){
|
||||
PCrc ^= RxPacket.Data[i] = WholeRxBuffer[l+4+i];
|
||||
}
|
||||
RxPacket.Crc = WholeRxBuffer[l+RxPacket.Length-1];
|
||||
if(PCrc == RxPacket.Crc){
|
||||
if(RxPacket.Command == TEST_CMD){
|
||||
HAL_GPIO_WritePin(GPIOD,LED_ERROR_Pin,RxPacket.Data[0]);
|
||||
TxPacket.RxAddr = RxPacket.Sender;
|
||||
TxPacket.Length = 6;
|
||||
TxPacket.Sender = ADDRESS;
|
||||
TxPacket.Command = ACK;
|
||||
TxPacket.Data[0] = RxPacket.Command;
|
||||
SendPacket();
|
||||
}
|
||||
l += RxPacket.Length;
|
||||
}
|
||||
}
|
||||
|
||||
if(WholeRxBuffer[l] == PREFIX){
|
||||
RxPacket.RxAddr = WholeRxBuffer[l+1];
|
||||
if(RxPacket.RxAddr == ADDRESS){
|
||||
packtStart = 1;
|
||||
}
|
||||
}
|
||||
}
|
||||
for(int k = 0; k<sizeof(WholeRxBuffer); k++){
|
||||
WholeRxBuffer[k] = 0;
|
||||
}
|
||||
ptr = 0;
|
||||
}
|
||||
|
||||
void SendPacket(){
|
||||
CBusBufTx[CBusBufTxSize++] = PREFIX;
|
||||
CBusBA(TxPacket.RxAddr);TxPacket.Crc ^= TxPacket.RxAddr;
|
||||
CBusBA(TxPacket.Length);TxPacket.Crc ^= TxPacket.Length;
|
||||
CBusBA(TxPacket.Sender);TxPacket.Crc ^= TxPacket.Sender;
|
||||
CBusBA(TxPacket.Command);TxPacket.Crc ^= TxPacket.Command;
|
||||
for(int i = 0; i<TxPacket.Length-5; i++){
|
||||
CBusBA(TxPacket.Data[i]);TxPacket.Crc ^= TxPacket.Data[i];
|
||||
}
|
||||
CBusBA(TxPacket.Crc);
|
||||
|
||||
HAL_UART_Transmit(&huart3, CBusBufTx, CBusBufTxSize, 0xFFFF);
|
||||
CBusBufTxSize = 0;
|
||||
for(int i = 0; i < sizeof(CBusBufTx); i++){
|
||||
CBusBufTx[i] = 0;
|
||||
}
|
||||
|
||||
memset(&TxPacket, 0, sizeof(TxPacket));
|
||||
memset(&RxPacket, 0, sizeof(RxPacket));
|
||||
}
|
||||
|
||||
|
47
CBus.h
Normal file
47
CBus.h
Normal file
@ -0,0 +1,47 @@
|
||||
/*
|
||||
* CBus.h
|
||||
*
|
||||
* Created on: Jun 14, 2021
|
||||
* Author: angoosh
|
||||
*/
|
||||
|
||||
#ifndef INC_CBUS_H_
|
||||
#define INC_CBUS_H_
|
||||
|
||||
#include <stdbool.h>
|
||||
#include <string.h>
|
||||
#include "main.h"
|
||||
|
||||
//buffers
|
||||
#define DataSize 32 //max size of packet data
|
||||
#define RX_BUFFER_SIZE 255 //size of RX buffer
|
||||
|
||||
//packet properties
|
||||
#define PREFIX 0xBA //packet start byte
|
||||
#define ADDRESS 0x01 //device address
|
||||
//#define PREFIXINPACKETACTION
|
||||
|
||||
//commands
|
||||
#define TEST_CMD 0x50 //test command for testing out communication
|
||||
#define ACK 0xFA //acknowledge command, in data command which it reacts to
|
||||
|
||||
|
||||
UART_HandleTypeDef huart3;
|
||||
|
||||
|
||||
typedef struct
|
||||
{
|
||||
uint8_t RxAddr; //Receiver address
|
||||
uint8_t Sender; //Sender address
|
||||
uint8_t Command; //Command
|
||||
uint8_t Length; //Length of message
|
||||
uint8_t Data[DataSize]; //Data
|
||||
uint8_t Crc; //Crc
|
||||
|
||||
bool IsOk;
|
||||
}CBusPacket;
|
||||
|
||||
|
||||
void ReadRxBuffer();
|
||||
|
||||
#endif /* INC_CBUS_H_ */
|
625
LICENSE
Normal file
625
LICENSE
Normal file
@ -0,0 +1,625 @@
|
||||
GNU GENERAL PUBLIC LICENSE
|
||||
|
||||
Version 3, 29 June 2007
|
||||
|
||||
Copyright © 2007 Free Software Foundation, Inc. <https://fsf.org/>
|
||||
|
||||
Everyone is permitted to copy and distribute verbatim copies of this license
|
||||
document, but changing it is not allowed.
|
||||
|
||||
Preamble
|
||||
|
||||
The GNU General Public License is a free, copyleft license for software and
|
||||
other kinds of works.
|
||||
|
||||
The licenses for most software and other practical works are designed to take
|
||||
away your freedom to share and change the works. By contrast, the GNU General
|
||||
Public License is intended to guarantee your freedom to share and change all
|
||||
versions of a program--to make sure it remains free software for all its users.
|
||||
We, the Free Software Foundation, use the GNU General Public License for most
|
||||
of our software; it applies also to any other work released this way by its
|
||||
authors. You can apply it to your programs, too.
|
||||
|
||||
When we speak of free software, we are referring to freedom, not price. Our
|
||||
General Public Licenses are designed to make sure that you have the freedom
|
||||
to distribute copies of free software (and charge for them if you wish), that
|
||||
you receive source code or can get it if you want it, that you can change
|
||||
the software or use pieces of it in new free programs, and that you know you
|
||||
can do these things.
|
||||
|
||||
To protect your rights, we need to prevent others from denying you these rights
|
||||
or asking you to surrender the rights. Therefore, you have certain responsibilities
|
||||
if you distribute copies of the software, or if you modify it: responsibilities
|
||||
to respect the freedom of others.
|
||||
|
||||
For example, if you distribute copies of such a program, whether gratis or
|
||||
for a fee, you must pass on to the recipients the same freedoms that you received.
|
||||
You must make sure that they, too, receive or can get the source code. And
|
||||
you must show them these terms so they know their rights.
|
||||
|
||||
Developers that use the GNU GPL protect your rights with two steps: (1) assert
|
||||
copyright on the software, and (2) offer you this License giving you legal
|
||||
permission to copy, distribute and/or modify it.
|
||||
|
||||
For the developers' and authors' protection, the GPL clearly explains that
|
||||
there is no warranty for this free software. For both users' and authors'
|
||||
sake, the GPL requires that modified versions be marked as changed, so that
|
||||
their problems will not be attributed erroneously to authors of previous versions.
|
||||
|
||||
Some devices are designed to deny users access to install or run modified
|
||||
versions of the software inside them, although the manufacturer can do so.
|
||||
This is fundamentally incompatible with the aim of protecting users' freedom
|
||||
to change the software. The systematic pattern of such abuse occurs in the
|
||||
area of products for individuals to use, which is precisely where it is most
|
||||
unacceptable. Therefore, we have designed this version of the GPL to prohibit
|
||||
the practice for those products. If such problems arise substantially in other
|
||||
domains, we stand ready to extend this provision to those domains in future
|
||||
versions of the GPL, as needed to protect the freedom of users.
|
||||
|
||||
Finally, every program is threatened constantly by software patents. States
|
||||
should not allow patents to restrict development and use of software on general-purpose
|
||||
computers, but in those that do, we wish to avoid the special danger that
|
||||
patents applied to a free program could make it effectively proprietary. To
|
||||
prevent this, the GPL assures that patents cannot be used to render the program
|
||||
non-free.
|
||||
|
||||
The precise terms and conditions for copying, distribution and modification
|
||||
follow.
|
||||
|
||||
TERMS AND CONDITIONS
|
||||
|
||||
0. Definitions.
|
||||
|
||||
"This License" refers to version 3 of the GNU General Public License.
|
||||
|
||||
"Copyright" also means copyright-like laws that apply to other kinds of works,
|
||||
such as semiconductor masks.
|
||||
|
||||
"The Program" refers to any copyrightable work licensed under this License.
|
||||
Each licensee is addressed as "you". "Licensees" and "recipients" may be individuals
|
||||
or organizations.
|
||||
|
||||
To "modify" a work means to copy from or adapt all or part of the work in
|
||||
a fashion requiring copyright permission, other than the making of an exact
|
||||
copy. The resulting work is called a "modified version" of the earlier work
|
||||
or a work "based on" the earlier work.
|
||||
|
||||
A "covered work" means either the unmodified Program or a work based on the
|
||||
Program.
|
||||
|
||||
To "propagate" a work means to do anything with it that, without permission,
|
||||
would make you directly or secondarily liable for infringement under applicable
|
||||
copyright law, except executing it on a computer or modifying a private copy.
|
||||
Propagation includes copying, distribution (with or without modification),
|
||||
making available to the public, and in some countries other activities as
|
||||
well.
|
||||
|
||||
To "convey" a work means any kind of propagation that enables other parties
|
||||
to make or receive copies. Mere interaction with a user through a computer
|
||||
network, with no transfer of a copy, is not conveying.
|
||||
|
||||
An interactive user interface displays "Appropriate Legal Notices" to the
|
||||
extent that it includes a convenient and prominently visible feature that
|
||||
(1) displays an appropriate copyright notice, and (2) tells the user that
|
||||
there is no warranty for the work (except to the extent that warranties are
|
||||
provided), that licensees may convey the work under this License, and how
|
||||
to view a copy of this License. If the interface presents a list of user commands
|
||||
or options, such as a menu, a prominent item in the list meets this criterion.
|
||||
|
||||
1. Source Code.
|
||||
|
||||
The "source code" for a work means the preferred form of the work for making
|
||||
modifications to it. "Object code" means any non-source form of a work.
|
||||
|
||||
A "Standard Interface" means an interface that either is an official standard
|
||||
defined by a recognized standards body, or, in the case of interfaces specified
|
||||
for a particular programming language, one that is widely used among developers
|
||||
working in that language.
|
||||
|
||||
The "System Libraries" of an executable work include anything, other than
|
||||
the work as a whole, that (a) is included in the normal form of packaging
|
||||
a Major Component, but which is not part of that Major Component, and (b)
|
||||
serves only to enable use of the work with that Major Component, or to implement
|
||||
a Standard Interface for which an implementation is available to the public
|
||||
in source code form. A "Major Component", in this context, means a major essential
|
||||
component (kernel, window system, and so on) of the specific operating system
|
||||
(if any) on which the executable work runs, or a compiler used to produce
|
||||
the work, or an object code interpreter used to run it.
|
||||
|
||||
The "Corresponding Source" for a work in object code form means all the source
|
||||
code needed to generate, install, and (for an executable work) run the object
|
||||
code and to modify the work, including scripts to control those activities.
|
||||
However, it does not include the work's System Libraries, or general-purpose
|
||||
tools or generally available free programs which are used unmodified in performing
|
||||
those activities but which are not part of the work. For example, Corresponding
|
||||
Source includes interface definition files associated with source files for
|
||||
the work, and the source code for shared libraries and dynamically linked
|
||||
subprograms that the work is specifically designed to require, such as by
|
||||
intimate data communication or control flow between those subprograms and
|
||||
other parts of the work.
|
||||
|
||||
The Corresponding Source need not include anything that users can regenerate
|
||||
automatically from other parts of the Corresponding Source.
|
||||
|
||||
The Corresponding Source for a work in source code form is that same work.
|
||||
|
||||
2. Basic Permissions.
|
||||
|
||||
All rights granted under this License are granted for the term of copyright
|
||||
on the Program, and are irrevocable provided the stated conditions are met.
|
||||
This License explicitly affirms your unlimited permission to run the unmodified
|
||||
Program. The output from running a covered work is covered by this License
|
||||
only if the output, given its content, constitutes a covered work. This License
|
||||
acknowledges your rights of fair use or other equivalent, as provided by copyright
|
||||
law.
|
||||
|
||||
You may make, run and propagate covered works that you do not convey, without
|
||||
conditions so long as your license otherwise remains in force. You may convey
|
||||
covered works to others for the sole purpose of having them make modifications
|
||||
exclusively for you, or provide you with facilities for running those works,
|
||||
provided that you comply with the terms of this License in conveying all material
|
||||
for which you do not control copyright. Those thus making or running the covered
|
||||
works for you must do so exclusively on your behalf, under your direction
|
||||
and control, on terms that prohibit them from making any copies of your copyrighted
|
||||
material outside their relationship with you.
|
||||
|
||||
Conveying under any other circumstances is permitted solely under the conditions
|
||||
stated below. Sublicensing is not allowed; section 10 makes it unnecessary.
|
||||
|
||||
3. Protecting Users' Legal Rights From Anti-Circumvention Law.
|
||||
|
||||
No covered work shall be deemed part of an effective technological measure
|
||||
under any applicable law fulfilling obligations under article 11 of the WIPO
|
||||
copyright treaty adopted on 20 December 1996, or similar laws prohibiting
|
||||
or restricting circumvention of such measures.
|
||||
|
||||
When you convey a covered work, you waive any legal power to forbid circumvention
|
||||
of technological measures to the extent such circumvention is effected by
|
||||
exercising rights under this License with respect to the covered work, and
|
||||
you disclaim any intention to limit operation or modification of the work
|
||||
as a means of enforcing, against the work's users, your or third parties'
|
||||
legal rights to forbid circumvention of technological measures.
|
||||
|
||||
4. Conveying Verbatim Copies.
|
||||
|
||||
You may convey verbatim copies of the Program's source code as you receive
|
||||
it, in any medium, provided that you conspicuously and appropriately publish
|
||||
on each copy an appropriate copyright notice; keep intact all notices stating
|
||||
that this License and any non-permissive terms added in accord with section
|
||||
7 apply to the code; keep intact all notices of the absence of any warranty;
|
||||
and give all recipients a copy of this License along with the Program.
|
||||
|
||||
You may charge any price or no price for each copy that you convey, and you
|
||||
may offer support or warranty protection for a fee.
|
||||
|
||||
5. Conveying Modified Source Versions.
|
||||
|
||||
You may convey a work based on the Program, or the modifications to produce
|
||||
it from the Program, in the form of source code under the terms of section
|
||||
4, provided that you also meet all of these conditions:
|
||||
|
||||
a) The work must carry prominent notices stating that you modified it, and
|
||||
giving a relevant date.
|
||||
|
||||
b) The work must carry prominent notices stating that it is released under
|
||||
this License and any conditions added under section 7. This requirement modifies
|
||||
the requirement in section 4 to "keep intact all notices".
|
||||
|
||||
c) You must license the entire work, as a whole, under this License to anyone
|
||||
who comes into possession of a copy. This License will therefore apply, along
|
||||
with any applicable section 7 additional terms, to the whole of the work,
|
||||
and all its parts, regardless of how they are packaged. This License gives
|
||||
no permission to license the work in any other way, but it does not invalidate
|
||||
such permission if you have separately received it.
|
||||
|
||||
d) If the work has interactive user interfaces, each must display Appropriate
|
||||
Legal Notices; however, if the Program has interactive interfaces that do
|
||||
not display Appropriate Legal Notices, your work need not make them do so.
|
||||
|
||||
A compilation of a covered work with other separate and independent works,
|
||||
which are not by their nature extensions of the covered work, and which are
|
||||
not combined with it such as to form a larger program, in or on a volume of
|
||||
a storage or distribution medium, is called an "aggregate" if the compilation
|
||||
and its resulting copyright are not used to limit the access or legal rights
|
||||
of the compilation's users beyond what the individual works permit. Inclusion
|
||||
of a covered work in an aggregate does not cause this License to apply to
|
||||
the other parts of the aggregate.
|
||||
|
||||
6. Conveying Non-Source Forms.
|
||||
|
||||
You may convey a covered work in object code form under the terms of sections
|
||||
4 and 5, provided that you also convey the machine-readable Corresponding
|
||||
Source under the terms of this License, in one of these ways:
|
||||
|
||||
a) Convey the object code in, or embodied in, a physical product (including
|
||||
a physical distribution medium), accompanied by the Corresponding Source fixed
|
||||
on a durable physical medium customarily used for software interchange.
|
||||
|
||||
b) Convey the object code in, or embodied in, a physical product (including
|
||||
a physical distribution medium), accompanied by a written offer, valid for
|
||||
at least three years and valid for as long as you offer spare parts or customer
|
||||
support for that product model, to give anyone who possesses the object code
|
||||
either (1) a copy of the Corresponding Source for all the software in the
|
||||
product that is covered by this License, on a durable physical medium customarily
|
||||
used for software interchange, for a price no more than your reasonable cost
|
||||
of physically performing this conveying of source, or (2) access to copy the
|
||||
Corresponding Source from a network server at no charge.
|
||||
|
||||
c) Convey individual copies of the object code with a copy of the written
|
||||
offer to provide the Corresponding Source. This alternative is allowed only
|
||||
occasionally and noncommercially, and only if you received the object code
|
||||
with such an offer, in accord with subsection 6b.
|
||||
|
||||
d) Convey the object code by offering access from a designated place (gratis
|
||||
or for a charge), and offer equivalent access to the Corresponding Source
|
||||
in the same way through the same place at no further charge. You need not
|
||||
require recipients to copy the Corresponding Source along with the object
|
||||
code. If the place to copy the object code is a network server, the Corresponding
|
||||
Source may be on a different server (operated by you or a third party) that
|
||||
supports equivalent copying facilities, provided you maintain clear directions
|
||||
next to the object code saying where to find the Corresponding Source. Regardless
|
||||
of what server hosts the Corresponding Source, you remain obligated to ensure
|
||||
that it is available for as long as needed to satisfy these requirements.
|
||||
|
||||
e) Convey the object code using peer-to-peer transmission, provided you inform
|
||||
other peers where the object code and Corresponding Source of the work are
|
||||
being offered to the general public at no charge under subsection 6d.
|
||||
|
||||
A separable portion of the object code, whose source code is excluded from
|
||||
the Corresponding Source as a System Library, need not be included in conveying
|
||||
the object code work.
|
||||
|
||||
A "User Product" is either (1) a "consumer product", which means any tangible
|
||||
personal property which is normally used for personal, family, or household
|
||||
purposes, or (2) anything designed or sold for incorporation into a dwelling.
|
||||
In determining whether a product is a consumer product, doubtful cases shall
|
||||
be resolved in favor of coverage. For a particular product received by a particular
|
||||
user, "normally used" refers to a typical or common use of that class of product,
|
||||
regardless of the status of the particular user or of the way in which the
|
||||
particular user actually uses, or expects or is expected to use, the product.
|
||||
A product is a consumer product regardless of whether the product has substantial
|
||||
commercial, industrial or non-consumer uses, unless such uses represent the
|
||||
only significant mode of use of the product.
|
||||
|
||||
"Installation Information" for a User Product means any methods, procedures,
|
||||
authorization keys, or other information required to install and execute modified
|
||||
versions of a covered work in that User Product from a modified version of
|
||||
its Corresponding Source. The information must suffice to ensure that the
|
||||
continued functioning of the modified object code is in no case prevented
|
||||
or interfered with solely because modification has been made.
|
||||
|
||||
If you convey an object code work under this section in, or with, or specifically
|
||||
for use in, a User Product, and the conveying occurs as part of a transaction
|
||||
in which the right of possession and use of the User Product is transferred
|
||||
to the recipient in perpetuity or for a fixed term (regardless of how the
|
||||
transaction is characterized), the Corresponding Source conveyed under this
|
||||
section must be accompanied by the Installation Information. But this requirement
|
||||
does not apply if neither you nor any third party retains the ability to install
|
||||
modified object code on the User Product (for example, the work has been installed
|
||||
in ROM).
|
||||
|
||||
The requirement to provide Installation Information does not include a requirement
|
||||
to continue to provide support service, warranty, or updates for a work that
|
||||
has been modified or installed by the recipient, or for the User Product in
|
||||
which it has been modified or installed. Access to a network may be denied
|
||||
when the modification itself materially and adversely affects the operation
|
||||
of the network or violates the rules and protocols for communication across
|
||||
the network.
|
||||
|
||||
Corresponding Source conveyed, and Installation Information provided, in accord
|
||||
with this section must be in a format that is publicly documented (and with
|
||||
an implementation available to the public in source code form), and must require
|
||||
no special password or key for unpacking, reading or copying.
|
||||
|
||||
7. Additional Terms.
|
||||
|
||||
"Additional permissions" are terms that supplement the terms of this License
|
||||
by making exceptions from one or more of its conditions. Additional permissions
|
||||
that are applicable to the entire Program shall be treated as though they
|
||||
were included in this License, to the extent that they are valid under applicable
|
||||
law. If additional permissions apply only to part of the Program, that part
|
||||
may be used separately under those permissions, but the entire Program remains
|
||||
governed by this License without regard to the additional permissions.
|
||||
|
||||
When you convey a copy of a covered work, you may at your option remove any
|
||||
additional permissions from that copy, or from any part of it. (Additional
|
||||
permissions may be written to require their own removal in certain cases when
|
||||
you modify the work.) You may place additional permissions on material, added
|
||||
by you to a covered work, for which you have or can give appropriate copyright
|
||||
permission.
|
||||
|
||||
Notwithstanding any other provision of this License, for material you add
|
||||
to a covered work, you may (if authorized by the copyright holders of that
|
||||
material) supplement the terms of this License with terms:
|
||||
|
||||
a) Disclaiming warranty or limiting liability differently from the terms of
|
||||
sections 15 and 16 of this License; or
|
||||
|
||||
b) Requiring preservation of specified reasonable legal notices or author
|
||||
attributions in that material or in the Appropriate Legal Notices displayed
|
||||
by works containing it; or
|
||||
|
||||
c) Prohibiting misrepresentation of the origin of that material, or requiring
|
||||
that modified versions of such material be marked in reasonable ways as different
|
||||
from the original version; or
|
||||
|
||||
d) Limiting the use for publicity purposes of names of licensors or authors
|
||||
of the material; or
|
||||
|
||||
e) Declining to grant rights under trademark law for use of some trade names,
|
||||
trademarks, or service marks; or
|
||||
|
||||
f) Requiring indemnification of licensors and authors of that material by
|
||||
anyone who conveys the material (or modified versions of it) with contractual
|
||||
assumptions of liability to the recipient, for any liability that these contractual
|
||||
assumptions directly impose on those licensors and authors.
|
||||
|
||||
All other non-permissive additional terms are considered "further restrictions"
|
||||
within the meaning of section 10. If the Program as you received it, or any
|
||||
part of it, contains a notice stating that it is governed by this License
|
||||
along with a term that is a further restriction, you may remove that term.
|
||||
If a license document contains a further restriction but permits relicensing
|
||||
or conveying under this License, you may add to a covered work material governed
|
||||
by the terms of that license document, provided that the further restriction
|
||||
does not survive such relicensing or conveying.
|
||||
|
||||
If you add terms to a covered work in accord with this section, you must place,
|
||||
in the relevant source files, a statement of the additional terms that apply
|
||||
to those files, or a notice indicating where to find the applicable terms.
|
||||
|
||||
Additional terms, permissive or non-permissive, may be stated in the form
|
||||
of a separately written license, or stated as exceptions; the above requirements
|
||||
apply either way.
|
||||
|
||||
8. Termination.
|
||||
|
||||
You may not propagate or modify a covered work except as expressly provided
|
||||
under this License. Any attempt otherwise to propagate or modify it is void,
|
||||
and will automatically terminate your rights under this License (including
|
||||
any patent licenses granted under the third paragraph of section 11).
|
||||
|
||||
However, if you cease all violation of this License, then your license from
|
||||
a particular copyright holder is reinstated (a) provisionally, unless and
|
||||
until the copyright holder explicitly and finally terminates your license,
|
||||
and (b) permanently, if the copyright holder fails to notify you of the violation
|
||||
by some reasonable means prior to 60 days after the cessation.
|
||||
|
||||
Moreover, your license from a particular copyright holder is reinstated permanently
|
||||
if the copyright holder notifies you of the violation by some reasonable means,
|
||||
this is the first time you have received notice of violation of this License
|
||||
(for any work) from that copyright holder, and you cure the violation prior
|
||||
to 30 days after your receipt of the notice.
|
||||
|
||||
Termination of your rights under this section does not terminate the licenses
|
||||
of parties who have received copies or rights from you under this License.
|
||||
If your rights have been terminated and not permanently reinstated, you do
|
||||
not qualify to receive new licenses for the same material under section 10.
|
||||
|
||||
9. Acceptance Not Required for Having Copies.
|
||||
|
||||
You are not required to accept this License in order to receive or run a copy
|
||||
of the Program. Ancillary propagation of a covered work occurring solely as
|
||||
a consequence of using peer-to-peer transmission to receive a copy likewise
|
||||
does not require acceptance. However, nothing other than this License grants
|
||||
you permission to propagate or modify any covered work. These actions infringe
|
||||
copyright if you do not accept this License. Therefore, by modifying or propagating
|
||||
a covered work, you indicate your acceptance of this License to do so.
|
||||
|
||||
10. Automatic Licensing of Downstream Recipients.
|
||||
|
||||
Each time you convey a covered work, the recipient automatically receives
|
||||
a license from the original licensors, to run, modify and propagate that work,
|
||||
subject to this License. You are not responsible for enforcing compliance
|
||||
by third parties with this License.
|
||||
|
||||
An "entity transaction" is a transaction transferring control of an organization,
|
||||
or substantially all assets of one, or subdividing an organization, or merging
|
||||
organizations. If propagation of a covered work results from an entity transaction,
|
||||
each party to that transaction who receives a copy of the work also receives
|
||||
whatever licenses to the work the party's predecessor in interest had or could
|
||||
give under the previous paragraph, plus a right to possession of the Corresponding
|
||||
Source of the work from the predecessor in interest, if the predecessor has
|
||||
it or can get it with reasonable efforts.
|
||||
|
||||
You may not impose any further restrictions on the exercise of the rights
|
||||
granted or affirmed under this License. For example, you may not impose a
|
||||
license fee, royalty, or other charge for exercise of rights granted under
|
||||
this License, and you may not initiate litigation (including a cross-claim
|
||||
or counterclaim in a lawsuit) alleging that any patent claim is infringed
|
||||
by making, using, selling, offering for sale, or importing the Program or
|
||||
any portion of it.
|
||||
|
||||
11. Patents.
|
||||
|
||||
A "contributor" is a copyright holder who authorizes use under this License
|
||||
of the Program or a work on which the Program is based. The work thus licensed
|
||||
is called the contributor's "contributor version".
|
||||
|
||||
A contributor's "essential patent claims" are all patent claims owned or controlled
|
||||
by the contributor, whether already acquired or hereafter acquired, that would
|
||||
be infringed by some manner, permitted by this License, of making, using,
|
||||
or selling its contributor version, but do not include claims that would be
|
||||
infringed only as a consequence of further modification of the contributor
|
||||
version. For purposes of this definition, "control" includes the right to
|
||||
grant patent sublicenses in a manner consistent with the requirements of this
|
||||
License.
|
||||
|
||||
Each contributor grants you a non-exclusive, worldwide, royalty-free patent
|
||||
license under the contributor's essential patent claims, to make, use, sell,
|
||||
offer for sale, import and otherwise run, modify and propagate the contents
|
||||
of its contributor version.
|
||||
|
||||
In the following three paragraphs, a "patent license" is any express agreement
|
||||
or commitment, however denominated, not to enforce a patent (such as an express
|
||||
permission to practice a patent or covenant not to sue for patent infringement).
|
||||
To "grant" such a patent license to a party means to make such an agreement
|
||||
or commitment not to enforce a patent against the party.
|
||||
|
||||
If you convey a covered work, knowingly relying on a patent license, and the
|
||||
Corresponding Source of the work is not available for anyone to copy, free
|
||||
of charge and under the terms of this License, through a publicly available
|
||||
network server or other readily accessible means, then you must either (1)
|
||||
cause the Corresponding Source to be so available, or (2) arrange to deprive
|
||||
yourself of the benefit of the patent license for this particular work, or
|
||||
(3) arrange, in a manner consistent with the requirements of this License,
|
||||
to extend the patent license to downstream recipients. "Knowingly relying"
|
||||
means you have actual knowledge that, but for the patent license, your conveying
|
||||
the covered work in a country, or your recipient's use of the covered work
|
||||
in a country, would infringe one or more identifiable patents in that country
|
||||
that you have reason to believe are valid.
|
||||
|
||||
If, pursuant to or in connection with a single transaction or arrangement,
|
||||
you convey, or propagate by procuring conveyance of, a covered work, and grant
|
||||
a patent license to some of the parties receiving the covered work authorizing
|
||||
them to use, propagate, modify or convey a specific copy of the covered work,
|
||||
then the patent license you grant is automatically extended to all recipients
|
||||
of the covered work and works based on it.
|
||||
|
||||
A patent license is "discriminatory" if it does not include within the scope
|
||||
of its coverage, prohibits the exercise of, or is conditioned on the non-exercise
|
||||
of one or more of the rights that are specifically granted under this License.
|
||||
You may not convey a covered work if you are a party to an arrangement with
|
||||
a third party that is in the business of distributing software, under which
|
||||
you make payment to the third party based on the extent of your activity of
|
||||
conveying the work, and under which the third party grants, to any of the
|
||||
parties who would receive the covered work from you, a discriminatory patent
|
||||
license (a) in connection with copies of the covered work conveyed by you
|
||||
(or copies made from those copies), or (b) primarily for and in connection
|
||||
with specific products or compilations that contain the covered work, unless
|
||||
you entered into that arrangement, or that patent license was granted, prior
|
||||
to 28 March 2007.
|
||||
|
||||
Nothing in this License shall be construed as excluding or limiting any implied
|
||||
license or other defenses to infringement that may otherwise be available
|
||||
to you under applicable patent law.
|
||||
|
||||
12. No Surrender of Others' Freedom.
|
||||
|
||||
If conditions are imposed on you (whether by court order, agreement or otherwise)
|
||||
that contradict the conditions of this License, they do not excuse you from
|
||||
the conditions of this License. If you cannot convey a covered work so as
|
||||
to satisfy simultaneously your obligations under this License and any other
|
||||
pertinent obligations, then as a consequence you may not convey it at all.
|
||||
For example, if you agree to terms that obligate you to collect a royalty
|
||||
for further conveying from those to whom you convey the Program, the only
|
||||
way you could satisfy both those terms and this License would be to refrain
|
||||
entirely from conveying the Program.
|
||||
|
||||
13. Use with the GNU Affero General Public License.
|
||||
|
||||
Notwithstanding any other provision of this License, you have permission to
|
||||
link or combine any covered work with a work licensed under version 3 of the
|
||||
GNU Affero General Public License into a single combined work, and to convey
|
||||
the resulting work. The terms of this License will continue to apply to the
|
||||
part which is the covered work, but the special requirements of the GNU Affero
|
||||
General Public License, section 13, concerning interaction through a network
|
||||
will apply to the combination as such.
|
||||
|
||||
14. Revised Versions of this License.
|
||||
|
||||
The Free Software Foundation may publish revised and/or new versions of the
|
||||
GNU General Public License from time to time. Such new versions will be similar
|
||||
in spirit to the present version, but may differ in detail to address new
|
||||
problems or concerns.
|
||||
|
||||
Each version is given a distinguishing version number. If the Program specifies
|
||||
that a certain numbered version of the GNU General Public License "or any
|
||||
later version" applies to it, you have the option of following the terms and
|
||||
conditions either of that numbered version or of any later version published
|
||||
by the Free Software Foundation. If the Program does not specify a version
|
||||
number of the GNU General Public License, you may choose any version ever
|
||||
published by the Free Software Foundation.
|
||||
|
||||
If the Program specifies that a proxy can decide which future versions of
|
||||
the GNU General Public License can be used, that proxy's public statement
|
||||
of acceptance of a version permanently authorizes you to choose that version
|
||||
for the Program.
|
||||
|
||||
Later license versions may give you additional or different permissions. However,
|
||||
no additional obligations are imposed on any author or copyright holder as
|
||||
a result of your choosing to follow a later version.
|
||||
|
||||
15. Disclaimer of Warranty.
|
||||
|
||||
THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE
|
||||
LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR
|
||||
OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER
|
||||
EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
|
||||
OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS
|
||||
TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM
|
||||
PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR
|
||||
CORRECTION.
|
||||
|
||||
16. Limitation of Liability.
|
||||
|
||||
IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL
|
||||
ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS THE PROGRAM
|
||||
AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL,
|
||||
INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO
|
||||
USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED
|
||||
INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE
|
||||
PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER
|
||||
PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
|
||||
|
||||
17. Interpretation of Sections 15 and 16.
|
||||
|
||||
If the disclaimer of warranty and limitation of liability provided above cannot
|
||||
be given local legal effect according to their terms, reviewing courts shall
|
||||
apply local law that most closely approximates an absolute waiver of all civil
|
||||
liability in connection with the Program, unless a warranty or assumption
|
||||
of liability accompanies a copy of the Program in return for a fee. END OF
|
||||
TERMS AND CONDITIONS
|
||||
|
||||
How to Apply These Terms to Your New Programs
|
||||
|
||||
If you develop a new program, and you want it to be of the greatest possible
|
||||
use to the public, the best way to achieve this is to make it free software
|
||||
which everyone can redistribute and change under these terms.
|
||||
|
||||
To do so, attach the following notices to the program. It is safest to attach
|
||||
them to the start of each source file to most effectively state the exclusion
|
||||
of warranty; and each file should have at least the "copyright" line and a
|
||||
pointer to where the full notice is found.
|
||||
|
||||
<one line to give the program's name and a brief idea of what it does.>
|
||||
|
||||
Copyright (C) <year> <name of author>
|
||||
|
||||
This program is free software: you can redistribute it and/or modify it under
|
||||
the terms of the GNU General Public License as published by the Free Software
|
||||
Foundation, either version 3 of the License, or (at your option) any later
|
||||
version.
|
||||
|
||||
This program is distributed in the hope that it will be useful, but WITHOUT
|
||||
ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS
|
||||
FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.
|
||||
|
||||
You should have received a copy of the GNU General Public License along with
|
||||
this program. If not, see <https://www.gnu.org/licenses/>.
|
||||
|
||||
Also add information on how to contact you by electronic and paper mail.
|
||||
|
||||
If the program does terminal interaction, make it output a short notice like
|
||||
this when it starts in an interactive mode:
|
||||
|
||||
<program> Copyright (C) <year> <name of author>
|
||||
|
||||
This program comes with ABSOLUTELY NO WARRANTY; for details type `show w'.
|
||||
|
||||
This is free software, and you are welcome to redistribute it under certain
|
||||
conditions; type `show c' for details.
|
||||
|
||||
The hypothetical commands `show w' and `show c' should show the appropriate
|
||||
parts of the General Public License. Of course, your program's commands might
|
||||
be different; for a GUI interface, you would use an "about box".
|
||||
|
||||
You should also get your employer (if you work as a programmer) or school,
|
||||
if any, to sign a "copyright disclaimer" for the program, if necessary. For
|
||||
more information on this, and how to apply and follow the GNU GPL, see <https://www.gnu.org/licenses/>.
|
||||
|
||||
The GNU General Public License does not permit incorporating your program
|
||||
into proprietary programs. If your program is a subroutine library, you may
|
||||
consider it more useful to permit linking proprietary applications with the
|
||||
library. If this is what you want to do, use the GNU Lesser General Public
|
||||
License instead of this License. But first, please read <https://www.gnu.org/
|
||||
licenses /why-not-lgpl.html>.
|
277
Monitor.c
Normal file
277
Monitor.c
Normal file
@ -0,0 +1,277 @@
|
||||
/*
|
||||
* Monitor.c
|
||||
*
|
||||
* Created on: 23 Mar 2021
|
||||
* Author: angoosh
|
||||
*/
|
||||
#include "Monitor.h"
|
||||
|
||||
|
||||
void MONITOR_VarSendInt(UART_HandleTypeDef*, char*, int, int, uint8_t, uint8_t, int*);
|
||||
void MONITOR_VarSendFloat(UART_HandleTypeDef*, char*, int, float, int*);
|
||||
void MONITOR_VarSendReg(UART_HandleTypeDef*, char*, int, uint32_t, int*);
|
||||
void MONITOR_Update(uint8_t*, int);
|
||||
|
||||
int Gaddress;
|
||||
char GaddrBuff[10];
|
||||
/**
|
||||
* @brief Posilani promenne
|
||||
* @param UART type
|
||||
* @param <string> Jmeno promenne
|
||||
* @param sizeof(Jmeno promenne)
|
||||
* @param Promenna pro odeslani
|
||||
* @param sizeof(Promenna)
|
||||
* @param sign (zda je unsigned = 0, nebo signed = 1)
|
||||
*/
|
||||
void MONITOR_VarSendInt(UART_HandleTypeDef *huart, char *name, int name_size, int var, uint8_t size, uint8_t sign, int *pointer){
|
||||
uint8_t isNegative = 0;
|
||||
int varAbs = abs(var);
|
||||
if(var < 0){
|
||||
isNegative = 1;
|
||||
}
|
||||
uint8_t ValueOfVariableSize = (uint8_t)log10(varAbs)+1+isNegative;
|
||||
char ValueOfVariableTemp[11];
|
||||
char ValueOfVariable[ValueOfVariableSize];
|
||||
sprintf(ValueOfVariableTemp, "%d", var);
|
||||
|
||||
for(int i = 0; i < ValueOfVariableSize; i++){
|
||||
ValueOfVariable[i] = ValueOfVariableTemp[i];
|
||||
}
|
||||
|
||||
int dataStrSize;
|
||||
|
||||
if(sign == 0){
|
||||
if(size == 1){
|
||||
dataStrSize = 9;
|
||||
}
|
||||
else{
|
||||
dataStrSize = 10;
|
||||
}
|
||||
}
|
||||
else{
|
||||
if(size == 1){
|
||||
dataStrSize = 8;
|
||||
}
|
||||
else{
|
||||
dataStrSize = 9;
|
||||
}
|
||||
}
|
||||
char varType[dataStrSize];
|
||||
|
||||
if(sign == 0){
|
||||
if(size == 1){
|
||||
strcpy(varType,"uint8_t,");
|
||||
}
|
||||
else if(size == 2){
|
||||
strcpy(varType,"uint16_t,");
|
||||
}
|
||||
else{
|
||||
strcpy(varType,"uint32_t,");
|
||||
}
|
||||
}
|
||||
else{
|
||||
if(size == 1){
|
||||
strcpy(varType,"int8_t,");
|
||||
}
|
||||
else if(size == 2){
|
||||
strcpy(varType,"int16_t,");
|
||||
}
|
||||
else{
|
||||
strcpy(varType,"int32_t,");
|
||||
}
|
||||
}
|
||||
//HAL_UART_Transmit(huart, (uint8_t *)&ValueOfVariable, 3, 0xFFFF);
|
||||
char msg[sizeof(ValueOfVariable)+dataStrSize+name_size+2];
|
||||
|
||||
|
||||
|
||||
strcpy(msg, "V,");
|
||||
strcat(msg, varType);
|
||||
strcat(msg, name);
|
||||
strcat(msg, ",");
|
||||
strcat(msg, ValueOfVariable);
|
||||
//strcat(msg, "\n");
|
||||
|
||||
HAL_UART_Transmit(huart, (uint8_t *)&msg, sizeof(msg), 0xFFFF);
|
||||
char pointerArr[10];
|
||||
sprintf(pointerArr, "%p", pointer);
|
||||
HAL_UART_Transmit(huart, (uint8_t *)&",", 1, 0xFFFF);
|
||||
HAL_UART_Transmit(huart, (uint8_t *)&pointerArr, sizeof(pointerArr), 0xFFFF);
|
||||
HAL_UART_Transmit(huart, (uint8_t *)&"\n", 1, 0xFFFF);
|
||||
|
||||
//int *pointer = &var;
|
||||
|
||||
}
|
||||
|
||||
/**
|
||||
* @brief Posilani promenne
|
||||
* @param UART type
|
||||
* @param <string> Jmeno promenne
|
||||
* @param sizeof(Jmeno promenne)
|
||||
* @param Promenna pro odeslani
|
||||
*/
|
||||
void MONITOR_VarSendFloat(UART_HandleTypeDef *huart, char *name, int name_size, float var, int *pointer){
|
||||
uint8_t isNegative = 0;
|
||||
int varAbs = abs(var);
|
||||
if(var < 0){
|
||||
isNegative = 1;
|
||||
}
|
||||
uint8_t ValueOfVariableSize = (uint8_t)log10(varAbs)+4+isNegative;
|
||||
//char ValueOfVariableTemp[11];
|
||||
char ValueOfVariable[ValueOfVariableSize];
|
||||
sprintf(ValueOfVariable, "%.3f", var);
|
||||
|
||||
//for(int i = 0; i < ValueOfVariableSize; i++){
|
||||
// ValueOfVariable[i] = ValueOfVariableTemp[i];
|
||||
//}
|
||||
|
||||
char varType[] = "float,";
|
||||
char msg[sizeof(ValueOfVariable)+sizeof(varType)+name_size+2];
|
||||
|
||||
strcpy(msg, "V,");
|
||||
strcat(msg, varType);
|
||||
strcat(msg, name);
|
||||
strcat(msg, ",");
|
||||
strcat(msg, ValueOfVariable);
|
||||
//msg[sizeof(msg)-1] = '\n';
|
||||
//strcat(msg, "\n");
|
||||
|
||||
HAL_UART_Transmit(huart, (uint8_t *)&msg, sizeof(msg), 0xFFFF);
|
||||
|
||||
char pointerArr[10];
|
||||
sprintf(pointerArr, "%p", pointer);
|
||||
HAL_UART_Transmit(huart, (uint8_t *)&",", 1, 0xFFFF);
|
||||
HAL_UART_Transmit(huart, (uint8_t *)&pointerArr, sizeof(pointerArr), 0xFFFF);
|
||||
HAL_UART_Transmit(huart, (uint8_t *)&"\n", 1, 0xFFFF);
|
||||
}
|
||||
|
||||
/**
|
||||
* @brief Posilani promenne
|
||||
* @param UART type
|
||||
* @param <string> Jmeno registru
|
||||
* @param sizeof(Jmeno registru)
|
||||
* @param registr
|
||||
*/
|
||||
void MONITOR_VarSendReg(UART_HandleTypeDef *huart, char *name, int name_size, uint32_t reg, int *pointer){
|
||||
uint8_t ValueOfVariableSize = (uint8_t)log10(reg)+1;
|
||||
char ValueOfVariable[ValueOfVariableSize];
|
||||
sprintf(ValueOfVariable, "%lu", reg);
|
||||
|
||||
char varType[] = "reg,";
|
||||
char msg[sizeof(ValueOfVariable)+sizeof(varType)+name_size+2];
|
||||
|
||||
strcpy(msg, "R,");
|
||||
strcat(msg, varType);
|
||||
strcat(msg, name);
|
||||
strcat(msg, ",");
|
||||
strcat(msg, ValueOfVariable);
|
||||
//msg[sizeof(msg)-1] = '\n';
|
||||
//strcat(msg, "\n");
|
||||
|
||||
HAL_UART_Transmit(huart, (uint8_t *)&msg, sizeof(msg), 0xFFFF);
|
||||
|
||||
char pointerArr[10];
|
||||
sprintf(pointerArr, "%p", pointer);
|
||||
HAL_UART_Transmit(huart, (uint8_t *)&",", 1, 0xFFFF);
|
||||
HAL_UART_Transmit(huart, (uint8_t *)&pointerArr, sizeof(pointerArr), 0xFFFF);
|
||||
HAL_UART_Transmit(huart, (uint8_t *)&"\n", 1, 0xFFFF);
|
||||
}
|
||||
|
||||
/**
|
||||
* @brief Posilani promenne
|
||||
* @param typ promenne 0: uint8_t, 1:int8_t, 2:uint16_t, 3:int16_t, 4:uint32_t, 5:int32_t, 6:float, 7:register
|
||||
* @param adresa promenne
|
||||
* @param string hodnota
|
||||
*/
|
||||
|
||||
|
||||
void MONITOR_Update(uint8_t *buffer, int bufferSize){
|
||||
|
||||
//void Update(uint8_t type, int address, char *value){
|
||||
uint type;
|
||||
int address;
|
||||
char lineBuffer[bufferSize];
|
||||
int lineLen = 0;
|
||||
for(int i = 0; i < bufferSize; i++){
|
||||
if(buffer[i] == MSG_PREFIX){
|
||||
HAL_GPIO_TogglePin(GPIOB,LED_OK_Pin);
|
||||
for(int j = 0; j < bufferSize; j++){
|
||||
if(buffer[i+j+1] != MSG_LINE_END){
|
||||
lineBuffer[j] = buffer[i+j+1];
|
||||
lineLen ++;
|
||||
}
|
||||
else{
|
||||
break;
|
||||
}
|
||||
}
|
||||
type = lineBuffer[0]-'0';
|
||||
|
||||
char addrBuff[10];
|
||||
for(int j = 0; j < 10; j++){
|
||||
addrBuff[j] = lineBuffer[j+1];
|
||||
GaddrBuff[j] = addrBuff[j];
|
||||
}
|
||||
sscanf(GaddrBuff, "%X", &address);
|
||||
|
||||
Gaddress = address;
|
||||
|
||||
char value[lineLen-11];
|
||||
for(int j = 0; j < sizeof(value); j++){
|
||||
value[j] = lineBuffer[j+11];
|
||||
}
|
||||
if(type == 0){
|
||||
uint data;
|
||||
sscanf(value, "%u", &data);
|
||||
*(uint8_t*)address = data;
|
||||
}
|
||||
else if(type == 1){
|
||||
int data;
|
||||
sscanf(value, "%d", &data);
|
||||
*(int8_t*)address = data;
|
||||
}
|
||||
else if(type == 2){
|
||||
uint data;
|
||||
sscanf(value, "%u", &data);
|
||||
*(uint16_t*)address = data;
|
||||
}
|
||||
else if(type == 3){
|
||||
int data;
|
||||
sscanf(value, "%d", &data);
|
||||
*(int16_t*)address = data;
|
||||
}
|
||||
else if(type == 4){
|
||||
uint data;
|
||||
sscanf(value, "%u", &data);
|
||||
*(uint32_t*)address = data;
|
||||
}
|
||||
else if(type == 5){
|
||||
int data;
|
||||
sscanf(value, "%d", &data);
|
||||
*(int32_t*)address = data;
|
||||
}
|
||||
else if(type == 6){
|
||||
float data;
|
||||
sscanf(value, "%f", &data);
|
||||
*(float*)address = data;
|
||||
}
|
||||
else if(type == 7){
|
||||
uint data;
|
||||
sscanf(value, "%u", &data);
|
||||
*(uint32_t*)address = data;
|
||||
}
|
||||
else;
|
||||
|
||||
for(int j = 0; j < lineLen; j++){
|
||||
buffer[i+j] = 0;
|
||||
}
|
||||
|
||||
i += lineLen;
|
||||
lineLen = 0;
|
||||
}
|
||||
else{
|
||||
buffer[i] = 0;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
|
26
Monitor.h
Normal file
26
Monitor.h
Normal file
@ -0,0 +1,26 @@
|
||||
/*
|
||||
* Monitor.h
|
||||
*
|
||||
* Created on: 23 Mar 2021
|
||||
* Author: angoosh
|
||||
*/
|
||||
|
||||
#ifndef MONITOR_H_
|
||||
#define MONITOR_H_
|
||||
|
||||
#include "main.h"
|
||||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
#include <math.h>
|
||||
#include <string.h>
|
||||
|
||||
void MONITOR_VarSendInt(UART_HandleTypeDef*, char*, int, int, uint8_t, uint8_t, int*);
|
||||
void MONITOR_VarSendFloat(UART_HandleTypeDef*, char*, int, float, int*);
|
||||
void MONITOR_VarSendReg(UART_HandleTypeDef*, char*, int, uint32_t, int*);
|
||||
void MONITOR_Update(uint8_t*, int);
|
||||
//void Update(uint8_t, int, char*);
|
||||
|
||||
#define MSG_PREFIX 'A'
|
||||
#define MSG_LINE_END '\n'
|
||||
|
||||
#endif /* MONITOR_H_ */
|
@ -1,3 +1,9 @@
|
||||
# C-Libs
|
||||
|
||||
C/C++ libraries for various devices and uses
|
||||
C libraries, mainly for STM32 and NXP MCUs
|
||||
|
||||
Alink.h,.c - Adcis communication protocol<br>
|
||||
ALS31313.h,.c - Library for ALS31313 3D hall sensor<br>
|
||||
CBus.h,.c - Low overhead communication protocol, doesn't use DMA, interruppt based<br>
|
||||
Monitor.h,.c - monitor library, not much useful<br>
|
||||
Soft_SPI.h,.c - Software SPI library<br>
|
292
Soft_SPI.c
Normal file
292
Soft_SPI.c
Normal file
@ -0,0 +1,292 @@
|
||||
/*
|
||||
* Soft_SPI.c
|
||||
*
|
||||
* Created on: Nov 26, 2019
|
||||
* Author: Adcis
|
||||
*
|
||||
* SCK_Pin, MOSI_Pin, MISO_Pin, CS0_Pin and CS1_Pin required to define in project
|
||||
*
|
||||
* Software SPI library for use with STM32 MCUs
|
||||
*/
|
||||
#include "main.h"
|
||||
#include "Soft_SPI.h"
|
||||
|
||||
#ifdef NXP_LPC
|
||||
#include "chip.h"
|
||||
#include <stdbool.h>
|
||||
#include "debug.h"
|
||||
#endif
|
||||
|
||||
int SOFT_Power(int,int);
|
||||
void SOFT_SCK(unsigned int); //rizeni SCK pinu
|
||||
void SOFT_SPI(unsigned int); //rizeni MOSI pinu
|
||||
void SOFT_SPI_Send(unsigned int); //odeslani zpravy po SPI
|
||||
int SOFT_SPI_Receive(unsigned int); //prijem zpravy po SPI
|
||||
void SOFT_CS(unsigned int); //chip select - 0 = DA prevodnik, 1 = AD prevodnik, cokoliv jineho = nezvoleno nic
|
||||
void SOFT_SPI_CLK(unsigned int); //1 puls _|-|_ na SCK
|
||||
int SOFT_SPI_ReadWrite(uint32_t, uint8_t, uint8_t, uint32_t*);
|
||||
|
||||
|
||||
int SOFT_Power(int x, int y){
|
||||
if (y == 0){
|
||||
return 1;
|
||||
}
|
||||
else if (y % 2 == 0){
|
||||
return SOFT_Power(x, y / 2) * SOFT_Power(x, y / 2);
|
||||
}
|
||||
else{
|
||||
return x * SOFT_Power(x, y / 2) * SOFT_Power(x, y / 2);
|
||||
}
|
||||
}
|
||||
/**
|
||||
* @brief Controls SCK
|
||||
*
|
||||
* @param var = set state of SCK
|
||||
*
|
||||
* @retval None
|
||||
*/
|
||||
void SOFT_SCK(unsigned int state){
|
||||
if(state == 1){
|
||||
#ifdef NXP_LPC
|
||||
Chip_GPIO_SetPinState(LPC_GPIO_PORT, 0, SCLK, true);
|
||||
#else
|
||||
GPIOB->BSRR = SCK_Pin;
|
||||
#endif
|
||||
}
|
||||
else{
|
||||
#ifdef NXP_LPC
|
||||
Chip_GPIO_SetPinState(LPC_GPIO_PORT, 0, SCLK, false);
|
||||
#else
|
||||
GPIOB->BRR = SCK_Pin;
|
||||
#endif
|
||||
}
|
||||
}
|
||||
/**
|
||||
* @brief Controls MOSI
|
||||
*
|
||||
* @param var = set state of MOSI
|
||||
*
|
||||
* @retval None
|
||||
*/
|
||||
void SOFT_SPI(unsigned int var){
|
||||
if(var!=0){
|
||||
#ifdef NXP_LPC
|
||||
Chip_GPIO_SetPinState(LPC_GPIO_PORT, 0, MOSI, true);
|
||||
#else
|
||||
GPIOB->BSRR = MOSI_Pin;
|
||||
#endif
|
||||
}
|
||||
else{
|
||||
#ifdef NXP_LPC
|
||||
Chip_GPIO_SetPinState(LPC_GPIO_PORT, 0, MOSI, false);
|
||||
#else
|
||||
GPIOB->BRR = MOSI_Pin;
|
||||
#endif
|
||||
}
|
||||
}
|
||||
/**
|
||||
* @brief SPI CS control
|
||||
*
|
||||
* @param cs = what cs pin to use
|
||||
*
|
||||
* @retval None
|
||||
*/
|
||||
void SOFT_CS(unsigned int cs){
|
||||
if(cs == 0){
|
||||
#ifdef NXP_LPC
|
||||
Chip_GPIO_SetPinState(LPC_GPIO_PORT, 0, CS, false);
|
||||
#else
|
||||
GPIOB->BSRR = CS1_Pin;
|
||||
GPIOB->BRR = CS0_Pin;
|
||||
#endif
|
||||
}
|
||||
else if(cs == 1){
|
||||
#ifdef NXP_LPC
|
||||
Chip_GPIO_SetPinState(LPC_GPIO_PORT, 0, CS, true);
|
||||
#else
|
||||
GPIOB->BSRR = CS0_Pin;
|
||||
GPIOB->BRR = CS1_Pin;
|
||||
#endif
|
||||
}
|
||||
else{
|
||||
#ifdef NXP_LPC
|
||||
Chip_GPIO_SetPinState(LPC_GPIO_PORT, 0, CS, false);
|
||||
#else
|
||||
GPIOB->BSRR = CS0_Pin;
|
||||
GPIOB->BSRR = CS1_Pin;
|
||||
#endif
|
||||
}
|
||||
}
|
||||
/**
|
||||
* @brief Sends SPI message
|
||||
*
|
||||
* @param value = what byte to send
|
||||
*
|
||||
* @retval None
|
||||
*/
|
||||
void SOFT_SPI_Send(unsigned int value){
|
||||
unsigned int valueBin[] = {0,0,0,0,0,0,0,0};
|
||||
if(value >= 128){
|
||||
valueBin[0] = 1;
|
||||
value = value % 128;
|
||||
}
|
||||
if(value >= 64){
|
||||
valueBin[1] = 1;
|
||||
value = value % 64;
|
||||
}
|
||||
if(value >= 32){
|
||||
valueBin[2] = 1;
|
||||
value = value % 32;
|
||||
}
|
||||
if(value >= 16){
|
||||
valueBin[3] = 1;
|
||||
value = value % 16;
|
||||
}
|
||||
if(value >= 8){
|
||||
valueBin[4] = 1;
|
||||
value = value % 8;
|
||||
}
|
||||
if(value >= 4){
|
||||
valueBin[5] = 1;
|
||||
value = value % 4;
|
||||
}
|
||||
if(value >= 2){
|
||||
valueBin[6] = 1;
|
||||
}
|
||||
valueBin[7] = value % 2;
|
||||
|
||||
SOFT_SCK(0);
|
||||
SOFT_SPI(valueBin[0]);
|
||||
SOFT_SCK(0);
|
||||
SOFT_SCK(1);
|
||||
SOFT_SPI(valueBin[1]);
|
||||
SOFT_SCK(0);
|
||||
SOFT_SCK(1);
|
||||
SOFT_SPI(valueBin[2]);
|
||||
SOFT_SCK(0);
|
||||
SOFT_SCK(1);
|
||||
SOFT_SPI(valueBin[3]);
|
||||
SOFT_SCK(0);
|
||||
SOFT_SCK(1);
|
||||
SOFT_SPI(valueBin[4]);
|
||||
SOFT_SCK(0);
|
||||
SOFT_SCK(1);
|
||||
SOFT_SPI(valueBin[5]);
|
||||
SOFT_SCK(0);
|
||||
SOFT_SCK(1);
|
||||
SOFT_SPI(valueBin[6]);
|
||||
SOFT_SCK(0);
|
||||
SOFT_SCK(1);
|
||||
SOFT_SPI(valueBin[7]);
|
||||
SOFT_SCK(0);
|
||||
SOFT_SCK(1);
|
||||
#ifdef NXP_LPC
|
||||
Chip_GPIO_SetPinState(LPC_GPIO_PORT, 0, MOSI, false);
|
||||
#else
|
||||
GPIOB->BRR = MOSI_Pin;
|
||||
#endif
|
||||
SOFT_SCK(0);
|
||||
}
|
||||
/**
|
||||
* @brief Recieves SPI message
|
||||
*
|
||||
* @param bits = how long will received mesage be
|
||||
*
|
||||
* @retval uint16_t
|
||||
*/
|
||||
int SOFT_SPI_Receive(unsigned int bits){
|
||||
uint8_t arr_bts[bits];
|
||||
uint8_t sumarr[bits];
|
||||
uint16_t sum;
|
||||
for(int i=0; i<bits;i++){
|
||||
SOFT_SCK(1);
|
||||
#ifdef NXP_LPC
|
||||
uint8_t MISO_read = Chip_GPIO_GetPinState(LPC_GPIO_PORT, 0, MISO);
|
||||
#else
|
||||
uint8_t MISO_read = HAL_GPIO_ReadPin(GPIOB, MISO_Pin);
|
||||
#endif
|
||||
if(MISO_read == 1){
|
||||
|
||||
arr_bts[i] = 1;
|
||||
}
|
||||
else{
|
||||
arr_bts[i] = 0;
|
||||
}
|
||||
#ifndef FAST_SPI
|
||||
sumarr[i] = arr_bts[i] * power(2 , bits - i - 1);
|
||||
#endif
|
||||
SOFT_SCK(0);
|
||||
}
|
||||
#ifdef FAST_SPI
|
||||
for(int i = 0; i < bits; i++){
|
||||
sumarr[i] = arr_bts[i] * SOFT_Power(2 , bits - i - 1);
|
||||
}
|
||||
#endif
|
||||
//receive string
|
||||
if(bits==12){
|
||||
sum = sumarr[0]+sumarr[1]+sumarr[2]+sumarr[3]+sumarr[4]+sumarr[5]+sumarr[6]+sumarr[7]+sumarr[8]+sumarr[9]+sumarr[10]+sumarr[11];
|
||||
}
|
||||
else if(bits==16){
|
||||
sum = sumarr[0]+sumarr[1]+sumarr[2]+sumarr[3]+sumarr[4]+sumarr[5]+sumarr[6]+sumarr[7]+sumarr[8]+sumarr[9]+sumarr[10]+sumarr[11]+sumarr[12]+sumarr[13]+sumarr[14]+sumarr[15];
|
||||
}
|
||||
else if(bits==8){
|
||||
sum = sumarr[0]+sumarr[1]+sumarr[2]+sumarr[3]+sumarr[4]+sumarr[5]+sumarr[6]+sumarr[7];
|
||||
}
|
||||
else{
|
||||
sum = 0;
|
||||
}
|
||||
return sum;
|
||||
}
|
||||
/**
|
||||
* @brief SPI clk
|
||||
*
|
||||
* @param cycles = how many cycles to make
|
||||
*
|
||||
* @retval None
|
||||
*/
|
||||
void SOFT_SPI_CLK(unsigned int cycles){
|
||||
for(int i=0;i<cycles;i++){
|
||||
SOFT_SCK(1);
|
||||
for(int j=0;j<1;j++);
|
||||
SOFT_SCK(0);
|
||||
}
|
||||
}
|
||||
|
||||
int SOFT_SPI_ReadWrite(uint32_t valueToSend, uint8_t dataLen, uint8_t packets, uint32_t *RxBuffer){
|
||||
int nOfBits = dataLen * packets;
|
||||
int valueToSendMaxPackets = 32/dataLen;
|
||||
uint32_t receiveData = 0;
|
||||
//uint32_t RxBuffer[packets];
|
||||
int bitsTransferred = 0;
|
||||
|
||||
SOFT_SCK(0);
|
||||
for(int j = 0; j < packets; j++){
|
||||
for(int i = 0; i < dataLen; i++){
|
||||
SOFT_SPI((valueToSend >> (dataLen-i)) & 1);
|
||||
SOFT_SCK(0);
|
||||
SOFT_SCK(1);
|
||||
#ifdef NXP_LPC
|
||||
uint8_t MISO_read = Chip_GPIO_GetPinState(LPC_GPIO_PORT, 0, MISO);
|
||||
#else
|
||||
uint8_t MISO_read = HAL_GPIO_ReadPin(GPIOB, MISO_Pin);
|
||||
#endif
|
||||
if(MISO_read == 1){
|
||||
receiveData |= (1 << (dataLen - i));
|
||||
}
|
||||
//else{
|
||||
// receiveData |= (1 << i);
|
||||
//}
|
||||
bitsTransferred++;
|
||||
}
|
||||
#ifdef NXP_LPC
|
||||
Chip_GPIO_SetPinState(LPC_GPIO_PORT, 0, MOSI, false);
|
||||
#else
|
||||
GPIOB->BRR = MOSI_Pin;
|
||||
#endif
|
||||
SOFT_SCK(0);
|
||||
|
||||
RxBuffer[j] = receiveData >> 1;
|
||||
}
|
||||
return bitsTransferred;
|
||||
}
|
||||
|
10
Soft_SPI.h
Normal file
10
Soft_SPI.h
Normal file
@ -0,0 +1,10 @@
|
||||
void SOFT_SCK(unsigned int state); //rizeni SCK pinu
|
||||
void SOFT_SPI(unsigned int var); //rizeni MOSI pinu
|
||||
void SOFT_SPI_Send(unsigned int value); //odeslani zpravy po SPI
|
||||
int SOFT_SPI_Receive(unsigned int bits); //prijem zpravy po SPI
|
||||
void SOFT_CS(unsigned int cs); //chip select - 0 = DA prevodnik, 1 = AD prevodnik, cokoliv jineho = nezvoleno nic
|
||||
void SOFT_SPI_CLK(unsigned int cycles); //1 puls _|-|_ na SCK
|
||||
int SOFT_SPI_ReadWrite(uint32_t valueToSend, uint8_t dataLen, uint8_t packets, uint32_t *RxBuffer);
|
||||
|
||||
#define FAST_SPI
|
||||
#define NXP_LPC
|
Loading…
x
Reference in New Issue
Block a user