diff --git a/ALS31313.c b/ALS31313.c new file mode 100644 index 0000000..5c476c4 --- /dev/null +++ b/ALS31313.c @@ -0,0 +1,398 @@ +/* + * ALS31313.c + * + * Created on: 8 Apr 2021 + * Author: angoosh + * + * Datasheet: https://www.allegromicro.com/~/media/Files/Datasheets/ALS31313-Datasheet.ashx + */ + +#include "ALS31313.h" + +void Enable_Setting_Modification(); +uint32_t Modify_Hall_EEPROM_Settings(int, uint32_t, ACCESS); +uint32_t Modify_Hall_Register_Settings(int, uint32_t, ACCESS); +int readHallData(int*, float*); +double readDegrees(AXIS_PAIR); + +void Enable_Setting_Modification(){ + uint8_t address = 0x35; + int value = 0x2C413534; + uint8_t registerData[4]; + + registerData[0] = 0x2C; + registerData[1] = 0x41; + registerData[2] = 0x35; + registerData[3] = 0x34; + + sendI2CMaster(HALL_I2C_ADDR, address, registerData, 4, false); +} + +/* @brief Settings 0-19 + * 0: 3bit - BW select + * 1: 2bit - Hall mode + * 2: 1bit - I2C CRC Rnable + * 3: 1bit - Disable Slave ADC + * 4: 7bit - Slave Address + * 5: 1bit - I2C Threshold + * 6: 3bit - Axes Channel Enable + * 7: 1bit - INT Latch Enable + * 8: 1bit - Signed INT Enable + * 9: 1bit - INT Mode + * 10: 1bit - INT EEPROM Status + * 11: 1bit - INT EEPROM Enable + * 12: 3bit - Axes INT Enable + * 13: 6bit - Z INT Threshold + * 14: 6bit - Y INT Threshold + * 15: 6bit - X INT Threshold + * 16: 5bit - 0x02 Customer EEPROM + * 17: 26bit - 0x0D Customer EEPROM + * 18: 26bit - 0x0E Customer EEPROM + * 19: 26bit - 0x0F Customer EEPROM + * @param setting number + * @param value to write, if reading it doesn't matter + * @param READ/WRITE + * @retval read desired value of memory block, 1 if write successful or 0 if error + */ + +uint32_t Modify_Hall_EEPROM_Settings(int setting, uint32_t value, ACCESS rw){ + int address, returnVal; + uint8_t registerData[4]; + + if((setting < 8) || (setting == 16)){ + address = 0x02; + } + else if(setting < 16){ + address = 0x03; + } + else if((setting > 16)&&(setting < 20)){ + address = 0x0D + (setting - 17); + } + + if(rw == READ){ + //read 32bit data (eeprom cell) + SendReadI2CMaster(HALL_I2C_ADDR, address, registerData, 4, false); + + if(setting == 0){ + returnVal = registerData[1]; + returnVal &= 0xE0; + return returnVal >> 5; + } + else if(setting == 1){ + returnVal = registerData[1]; + returnVal &= 0x18; + return returnVal >> 3; + } + else if(setting == 2){ + returnVal = registerData[1]; + returnVal &= 0x04; + return returnVal >> 2; + } + else if(setting == 3){ + returnVal = registerData[1]; + returnVal &= 0x02; + return returnVal >> 1; + } + else if(setting == 4){ + uint8_t returnVal_MSB = registerData[1]; + uint8_t returnVal_LSB = registerData[2]; + returnVal_MSB &= 0x01; + returnVal_LSB &= 0xFC; + returnVal = returnVal_MSB << 6; + returnVal += returnVal_LSB >> 2; + return returnVal; + } + else if(setting == 5){ + returnVal = registerData[2]; + returnVal &= 0x02; + return returnVal >> 1; + } + else if(setting == 6){ + uint8_t returnVal_MSB = registerData[2]; + uint8_t returnVal_LSB = registerData[3]; + returnVal_MSB &= 0x01; + returnVal_LSB &= 0xC0; + returnVal = returnVal_MSB << 2; + returnVal += returnVal_LSB >> 6; + return returnVal; + } + else if(setting == 7){ + returnVal = registerData[3]; + returnVal &= 0x10; + return returnVal >> 4; + } + else if(setting == 16){ + returnVal = registerData[3]; + returnVal &= 0x0F; + return returnVal; + } + else if(setting == 8){ + returnVal = registerData[0]; + returnVal &= 0x01; + return returnVal; + } + else if(setting == 9){ + returnVal = registerData[1]; + returnVal &= 0x80; + return returnVal >> 7; + } + else if(setting == 10){ + returnVal = registerData[1]; + returnVal &= 0x40; + return returnVal >> 6; + } + else if(setting == 11){ + returnVal = registerData[1]; + returnVal &= 0x20; + return returnVal >> 5; + } + else if(setting == 12){ + returnVal = registerData[1]; + returnVal &= 0x1C; + return returnVal >> 2; + } + else if(setting == 13){ + uint8_t returnVal_MSB = registerData[1]; + uint8_t returnVal_LSB = registerData[2]; + returnVal_MSB &= 0x03; + returnVal_LSB &= 0xF0; + returnVal = returnVal_MSB << 4; + returnVal += returnVal_LSB >> 4; + return returnVal; + } + else if(setting == 14){ + uint8_t returnVal_MSB = registerData[2]; + uint8_t returnVal_LSB = registerData[3]; + returnVal_MSB &= 0x0F; + returnVal_LSB &= 0xC0; + returnVal = returnVal_MSB << 2; + returnVal += returnVal_LSB >> 6; + return returnVal; + } + else if(setting == 15){ + returnVal = registerData[3]; + returnVal &= 0x3F; + return returnVal; + } + else if(setting >= 17){ + uint8_t returnVal_MSB = registerData[0]; + uint8_t returnVal_LMSB = registerData[1]; + uint8_t returnVal_MLSB = registerData[2]; + uint8_t returnVal_LSB = registerData[3]; + returnVal_MSB &= 0x01; + returnVal = returnVal_MSB << 24; + returnVal += returnVal_LMSB << 16; + returnVal += returnVal_MLSB << 8; + returnVal += returnVal_LSB; + + return returnVal; + } + } + else{ + //read 32bit data (eeprom cell) + SendReadI2CMaster(HALL_I2C_ADDR, address, registerData, 4, false); + + if(setting == 0){ + registerData[1] = ((registerData[1] & ~0xE0) | (value << 5)); + } + else if(setting == 1){ + registerData[1] = ((registerData[1] & ~0x18) | (value << 3)); + } + else if(setting == 2){ + registerData[1] = ((registerData[1] & ~0x04) | (value << 2)); + } + else if(setting == 3){ + registerData[1] = ((registerData[1] & ~0x02) | (value << 1)); + } + else if(setting == 4){ + uint8_t returnVal_MSB = (value >> 6); + uint8_t returnVal_LSB = (value << 2); + registerData[1] = ((registerData[1] & ~0x01) | (returnVal_MSB << 0)); + registerData[2] = ((registerData[2] & ~0xFC) | (returnVal_LSB << 0)); + } + else if(setting == 5){ + registerData[2] = ((registerData[2] & ~0x02) | (value << 1)); + } + else if(setting == 6){ + uint8_t returnVal_MSB = (value >> 2); + uint8_t returnVal_LSB = (value << 6); + registerData[2] = ((registerData[2] & ~0x01) | (returnVal_MSB << 0)); + registerData[3] = ((registerData[3] & ~0xC0) | (returnVal_LSB << 0)); + } + else if(setting == 7){ + registerData[3] = ((registerData[3] & ~0x10) | (value << 4)); + } + else if(setting == 16){ + registerData[3] = ((registerData[3] & ~0x0F) | (value << 0)); + } + else if(setting == 8){ + registerData[0] = ((registerData[0] & ~0x01) | (value << 0)); + } + else if(setting == 9){ + registerData[1] = ((registerData[1] & ~0x80) | (value << 7)); + } + else if(setting == 10){ + registerData[1] = ((registerData[1] & ~0x40) | (value << 6)); + } + else if(setting == 11){ + registerData[1] = ((registerData[1] & ~0x20) | (value << 5)); + } + else if(setting == 12){ + registerData[1] = ((registerData[1] & ~0x1C) | (value << 2)); + } + else if(setting == 13){ + uint8_t returnVal_MSB = (value >> 4); + uint8_t returnVal_LSB = (value << 4); + registerData[1] = ((registerData[1] & ~0x03) | (returnVal_MSB << 0)); + registerData[2] = ((registerData[2] & ~0xF0) | (returnVal_LSB << 0)); + } + else if(setting == 14){ + uint8_t returnVal_MSB = (value >> 2); + uint8_t returnVal_LSB = (value << 6); + registerData[2] = ((registerData[2] & ~0x0F) | (returnVal_MSB << 0)); + registerData[3] = ((registerData[3] & ~0xC0) | (returnVal_LSB << 0)); + } + else if(setting == 15){ + registerData[3] = ((registerData[3] & ~0x3F) | (value << 0)); + } + else if(setting >= 17){ + uint8_t returnVal_MSB = (value >> 24) & 0x01; + uint8_t returnVal_LMSB = (value >> 16) & 0xFF; + uint8_t returnVal_MLSB = (value >> 8) & 0xFF; + uint8_t returnVal_LSB = (value & 0xFF); + registerData[0] = ((registerData[0] & ~0xFF) | (returnVal_MSB << 0)); + registerData[1] = ((registerData[1] & ~0xFF) | (returnVal_LMSB << 0)); + registerData[2] = ((registerData[2] & ~0xFF) | (returnVal_MLSB << 0)); + registerData[3] = ((registerData[3] & ~0xFF) | (returnVal_LSB << 0)); + } + + //write modified data to eeprom + sendI2CMaster(HALL_I2C_ADDR, address, registerData, 4, false); + + return 1; + } + + return 0; +} + +/* @brief Settings 0-2 + * 0: 3bit - Low-Power Mode - Count Max + * 1: 2bit - I2C Loop-Mode + * 2: 2bit - Sleep + * @param setting number + * @param value to write, if reading it doesn't matter + * @param READ/WRITE + * @retval read desired value of memory block, 1 if write successful or 0 if error + */ +uint32_t Modify_Hall_Register_Settings(int setting, uint32_t value, ACCESS rw){ + int address, returnVal; + uint8_t registerData[4]; + + address = 0x27; + + if(rw == READ){ + //read 32bit data (eeprom cell) + SendReadI2CMaster(HALL_I2C_ADDR, address, registerData, 4, false); + + if(setting == 0){ + returnVal = registerData[3]; + returnVal &= 0x70; + return returnVal >> 4; + } + else if(setting == 1){ + returnVal = registerData[3]; + returnVal &= 0x0C; + return returnVal >> 2; + } + else if(setting == 2){ + returnVal = registerData[3]; + returnVal &= 0x03; + return returnVal; + } + } + else{ + //read 32bit data (eeprom cell) + SendReadI2CMaster(HALL_I2C_ADDR, address, registerData, 4, false); + + if(setting == 0){ + registerData[3] = ((registerData[3] & ~0x70) | (value << 4)); + } + else if(setting == 1){ + registerData[3] = ((registerData[3] & ~0x0C) | (value << 2)); + } + else if(setting == 2){ + registerData[3] = ((registerData[3] & ~0x03) | (value << 0)); + } + //write modified data to eeprom + sendI2CMaster(HALL_I2C_ADDR, address, registerData, 4, false); + + return 1; + } + + return 0; +} + +/** + * @brief Read sensoric data from ALS31313 + * @param int array of min size 3, stores x, y, z gauss value in this order + * @param float array of min size 1, temperature of the sensor in C + * @retval Hall Mode Status - 0 = Single-Ended, 1 = Differential, 2 = Common + */ +int readHallData(int *xyz, float *temp){ + uint8_t registerData[8]; + int16_t x, y, z; + int x_raw, y_raw, z_raw, temp_raw; + int x_g, y_g, z_g; + float tempr; + + //read registers 0x28 and 0x29 respectively + SendReadI2CMaster(HALL_I2C_ADDR, 0x28, registerData, 8, false); + + x_raw = registerData[0] << 4; + y_raw = registerData[1] << 4; + z_raw = registerData[2] << 4; + temp_raw = (registerData[3] & 0x3F) << 6; + + x_raw += (registerData[5] & 0x0F); + y_raw += (registerData[6] & 0xF0) >> 4; + z_raw += (registerData[6] & 0x0F); + temp_raw += (registerData[7] & 0x3F); + + x = (x_raw & 0x0800) ? (x_raw | 0xf800) : x_raw; + y = (y_raw & 0x0800) ? (y_raw | 0xf800) : y_raw; + z = (z_raw & 0x0800) ? (z_raw | 0xf800) : z_raw; + + //convert raw data to gauss and temperature + x_g = x / LSB_GAUSS; + y_g = y / LSB_GAUSS; + z_g = z / LSB_GAUSS; + tempr = (((float)302*((float)temp_raw-(float)1708))/(float)4096); + temp[0] = tempr; + + xyz[0] = x_g; + xyz[1] = y_g; + xyz[2] = z_g; + + return ((registerData[7] & 0xC0) >> 6); +} + +/** + * @brief Read degrees from ALS31313 + * @param what axes to read: XY, XZ, YZ + * @retval degrees + */ +double readDegrees(AXIS_PAIR pair){ + float temp; + int xyz[3]; + readHallData(xyz, &temp); + + if(pair == XY){ + return ((atan2(xyz[1],xyz[0])*(180/3.14159))+180); + } + else if(pair == XZ){ + return ((atan2(xyz[2],xyz[0])*(180/3.14159))+180); + } + else{ + return ((atan2(xyz[1],xyz[2])*(180/3.14159))+180); + } +} diff --git a/ALS31313.h b/ALS31313.h new file mode 100644 index 0000000..556a0c8 --- /dev/null +++ b/ALS31313.h @@ -0,0 +1,37 @@ +/* + * ALS31313.h + * + * Created on: 8 Apr 2021 + * Author: angoosh + */ + +#ifndef ALS31313_H_ +#define ALS31313_H_ + +#include "chip.h" +#include "main.h" +#include "debug.h" +#include "I2C.h" +#include + +typedef enum { + READ = 0, + WRITE = 1 +} ACCESS; + +typedef enum { + XY = 0, + XZ = 1, + YZ = 2 +} AXIS_PAIR; + +#define HALL_I2C_ADDR 0x60 +#define LSB_GAUSS 1 + +void Enable_Setting_Modification(); +uint32_t Modify_Hall_EEPROM_Settings(int setting, uint32_t value, ACCESS rw); +uint32_t Modify_Hall_Register_Settings(int setting, uint32_t value, ACCESS rw); +int readHallData(int *xyz, float *temp); +double readDegrees(AXIS_PAIR pair); + +#endif /* ALS31313_H_ */ diff --git a/Alink.c b/Alink.c new file mode 100755 index 0000000..336a8de --- /dev/null +++ b/Alink.c @@ -0,0 +1,452 @@ +//************************************************************************************ + +//**************** Alink (c) Angoosh ***************** +//**************** ADCIS s.r.o. ***************** + +//**************** Alink ***************** +// ver 1.0.0 +// 11.11.2019 +//************************************************************************************ + +#include "Alink.h" +#include "main.h" + + +//void checkA5(uint8_t, uint8_t, uint8_t); +void TxParseMSG(UART_HandleTypeDef*,int,uint8_t,uint8_t,uint8_t); +void RxParseMSG(UART_HandleTypeDef*,uint8_t*); + +/* + * Vysilani zpravy: A5, rec add, ln, my add, 0, data, CRC + * 0 verze sw: A5, rec add, 0C, ADDRESS, 0, VERSION, SUB_VERSION, RELEASE, BUGFIX, CRC + * 1 status: A5, rec add, 08, ADDRESS, 0, STATUS, CRC + * 2 err: A5, rec add, 08, ADDRESS, 1, ERROR, CRC + * + * parametry fce: + * type: 0,1,2 (verze, status, err) + * mess: 0,1,2 (verze - pouze 0, status - 1,2,3, err - 1,2) + * + * + * data bit: + * 0 - version + * 1 - status - sleep + * 2 - status - charging + * 3 - status - running + * 4 - err - UNDERVOLT + * 5 - err - FET_ERR + */ + +/** + * @brief A5 symbol replacement pattern find + * @param checked byte + * @param retval for first replacement byte + * @param retval for second replacement byte + */ +void checkA5(uint8_t byte, uint8_t *arr1, uint8_t *arr2){ //kontrola, zda ve zprave neni A5 + if(byte == 0xA5){ + *arr1 = 0xAA; + *arr2 = 0xA8; + } + else if(byte == 0xAA){ + *arr1 = 0xAA; + *arr2 = 0xAA; + } + else{ + *arr1 = byte; + *arr2 = 0x00; + } +} + +void A5pattern(uint8_t *messageIn, uint8_t *messageOut){ + +} +/** + * @brief CRC calculation function + * @param data array pointer + * @param data length + * @retval crc byte + */ +uint8_t CRC_Calc(uint8_t *data, uint8_t length){ + uint8_t crc = 0; + for(int i = 0; i 6){ + for(int i = 0; i= LCBADDRMIN && msgTxAddr <= LCBADDRMAX){ + isLCB = 1; + } + } + + uint8_t AAcount = 0; + for(int i = 0; i 6){ + payload = 1; + } + + if(msgCmd == SW_VER_ASK){ //verze sw //type 0 + TxParseMSG(huart,0,0x00,0x00,msgTxAddr); + } + else if(msgCmd == STATUS){ //stav (charging, off, on) //type 1 + uint8_t msgStatus = 0; + TxParseMSG(huart,1,0x00,msgStatus,msgTxAddr); + } + else if(msgCmd == STATE_ASK){ //status (err) //type 2 + uint8_t msgState = 0; + TxParseMSG(huart,2,0x00,msgState,msgTxAddr); + } +#ifdef ALINK_CTRL + else if(msgCmd == ALINK_STABLE_STATE && payload == 1){//zapnuti/vypnuti ustaleneho stavu, default je vyply + SteadyState = msgData[0]; + } + else if(msgCmd == ALINK_BLOCK_PLS && payload == 1){//vyber ktere pulsy blokovat, popis funkce je v @info + if(msgData[0] == 0x00){ + for(int i = 0; i < 8; i++){ + INJ0.PULSE_DEL_ARR[i] = msgData[1+i]; + } + } + else if(msgData[0] == 0x01){ + for(int i = 0; i < 8; i++){ + INJ1.PULSE_DEL_ARR[i] = msgData[1+i]; + } + } + else if(msgData[0] == 0x02){ + for(int i = 0; i < 8; i++){ + INJ2.PULSE_DEL_ARR[i] = msgData[1+i]; + } + } + else; + } + else if(msgCmd == ALINK_BLOCK_PLS_END && payload == 1){//vyber po ktere pulsy blokovat, popis funkce je v @info + if(msgData[0] == 0x00){ + for(int i = 0; i < 8; i++){ + INJ0.PULSE_DEL_END_ARR[i] = msgData[1+i]; + } + } + else if(msgData[0] == 0x01){ + for(int i = 0; i < 8; i++){ + INJ1.PULSE_DEL_END_ARR[i] = msgData[1+i]; + } + } + else if(msgData[0] == 0x02){ + for(int i = 0; i < 8; i++){ + INJ2.PULSE_DEL_END_ARR[i] = msgData[1+i]; + } + } + else; + } + else if(msgCmd == ALINK_FET_SW_PAUSE && payload == 1){//Nastaveni delky pauzy mezi prepinani fetu + int hi = msgData[1]; + int lo = msgData[2]; + int delay = (hi*256)+lo; + + if(msgData[0] == 0x00){ + INJ0.SWITCH_DELAY = SwitchDelaySetup(INJ0, delay); + } + else if(msgData[0] == 0x01){ + INJ1.SWITCH_DELAY = SwitchDelaySetup(INJ1, delay); + } + else if(msgData[0] == 0x02){ + INJ2.SWITCH_DELAY = SwitchDelaySetup(INJ2, delay); + } + else; + } + else if(msgCmd == ALINK_PULSE_BLK_TIM && payload == 1){//po kolika ms blokovat puls 2B + uint8_t hi = msgData[1]; + uint8_t lo = msgData[2]; + + float ARR = 65535; + float PSC = 53; + + float x = (1/(SysClk/APBDiv))*(PSC+1)*(ARR+1)*1000; + float us = (x/ARR)*1000; + int BlockPulseAfterMs = (hi*256)+lo; + int BlockPulseAfterTicks = BlockPulseAfterMs/us; + + if(msgData[0] == 0x00){ + INJ0.BLOCK_AFTER_TICKS = BlockPulseAfterTicks; + INJ0.BLOCK_AFTER_US = BlockPulseAfterMs; + } + else if(msgData[0] == 0x01){ + INJ1.BLOCK_AFTER_TICKS = BlockPulseAfterTicks; + INJ1.BLOCK_AFTER_US = BlockPulseAfterMs; + } + else if(msgData[0] == 0x02){ + INJ2.BLOCK_AFTER_TICKS = BlockPulseAfterTicks; + INJ2.BLOCK_AFTER_US = BlockPulseAfterMs; + } + else; + } +#ifdef ALINK_BRD_RST + else if(msgData[0] == ALINK_BRD_RST){ + TxParseMSG(huart,3,0x00,msgData[0],msgTxAddr); + HAL_NVIC_SystemReset(); + } +#endif + } +#endif + else; +} + +/** + * @brief Response message parser + * @param huart typedef + * @param type of message + * @param command + * @param data of message + * @param address of destination device + */ +void TxParseMSG(UART_HandleTypeDef *huart, int type, uint8_t CMD, uint8_t mess, uint8_t addr){ + uint8_t crc = 0; + int datasize = 0; + uint8_t data_buffer[40]; + uint8_t data_buffer_size = 0; + +//verze softwaru + if(type == 0){ + uint8_t data[] = {addr,0x0A,ADDRESS,CMD,VERSION,SUB_VERSION,RELEASE,BUGFIX}; + datasize = sizeof(data); + + for(int i = 0; i> 24; + data[14] = DATA_READ >> 16; + data[15] = DATA_READ >> 8; + data[16] = DATA_READ; + + for(int i = 0; iInstance->ISR,USART_ISR_RXNE); + HAL_UART_Receive_IT(&huart3, RX, 1); +} + +void CBusBA(uint8_t byte){ +#ifdef PREFIXINPACKETACTION + if(byte == PREFIX){ + CBusBufTx[CBusBufTxSize++] = 0xBB; + CBusBufTx[CBusBufTxSize++] = 0xBC; + } + else if(byte == 0xBB){ + CBusBufTx[CBusBufTxSize++] = 0xBB; + CBusBufTx[CBusBufTxSize++] = 0xBB; + } + else{ + CBusBufTx[CBusBufTxSize++] = byte; + } +#else + CBusBufTx[CBusBufTxSize++] = byte; +#endif +} + +void ReadRxBuffer(){ + uint8_t packtStart = 0; + + for(int l = 0; l +#include +#include "main.h" + +//buffers +#define DataSize 32 //max size of packet data +#define RX_BUFFER_SIZE 255 //size of RX buffer + +//packet properties +#define PREFIX 0xBA //packet start byte +#define ADDRESS 0x01 //device address +//#define PREFIXINPACKETACTION + +//commands +#define TEST_CMD 0x50 //test command for testing out communication +#define ACK 0xFA //acknowledge command, in data command which it reacts to + + +UART_HandleTypeDef huart3; + + +typedef struct +{ + uint8_t RxAddr; //Receiver address + uint8_t Sender; //Sender address + uint8_t Command; //Command + uint8_t Length; //Length of message + uint8_t Data[DataSize]; //Data + uint8_t Crc; //Crc + + bool IsOk; +}CBusPacket; + + +void ReadRxBuffer(); + +#endif /* INC_CBUS_H_ */ diff --git a/LICENSE b/LICENSE new file mode 100644 index 0000000..e142a52 --- /dev/null +++ b/LICENSE @@ -0,0 +1,625 @@ +GNU GENERAL PUBLIC LICENSE + +Version 3, 29 June 2007 + +Copyright © 2007 Free Software Foundation, Inc. + +Everyone is permitted to copy and distribute verbatim copies of this license +document, but changing it is not allowed. + +Preamble + +The GNU General Public License is a free, copyleft license for software and +other kinds of works. + +The licenses for most software and other practical works are designed to take +away your freedom to share and change the works. By contrast, the GNU General +Public License is intended to guarantee your freedom to share and change all +versions of a program--to make sure it remains free software for all its users. +We, the Free Software Foundation, use the GNU General Public License for most +of our software; it applies also to any other work released this way by its +authors. You can apply it to your programs, too. + +When we speak of free software, we are referring to freedom, not price. Our +General Public Licenses are designed to make sure that you have the freedom +to distribute copies of free software (and charge for them if you wish), that +you receive source code or can get it if you want it, that you can change +the software or use pieces of it in new free programs, and that you know you +can do these things. + +To protect your rights, we need to prevent others from denying you these rights +or asking you to surrender the rights. Therefore, you have certain responsibilities +if you distribute copies of the software, or if you modify it: responsibilities +to respect the freedom of others. + +For example, if you distribute copies of such a program, whether gratis or +for a fee, you must pass on to the recipients the same freedoms that you received. +You must make sure that they, too, receive or can get the source code. And +you must show them these terms so they know their rights. + +Developers that use the GNU GPL protect your rights with two steps: (1) assert +copyright on the software, and (2) offer you this License giving you legal +permission to copy, distribute and/or modify it. + +For the developers' and authors' protection, the GPL clearly explains that +there is no warranty for this free software. For both users' and authors' +sake, the GPL requires that modified versions be marked as changed, so that +their problems will not be attributed erroneously to authors of previous versions. + +Some devices are designed to deny users access to install or run modified +versions of the software inside them, although the manufacturer can do so. +This is fundamentally incompatible with the aim of protecting users' freedom +to change the software. The systematic pattern of such abuse occurs in the +area of products for individuals to use, which is precisely where it is most +unacceptable. Therefore, we have designed this version of the GPL to prohibit +the practice for those products. If such problems arise substantially in other +domains, we stand ready to extend this provision to those domains in future +versions of the GPL, as needed to protect the freedom of users. + +Finally, every program is threatened constantly by software patents. States +should not allow patents to restrict development and use of software on general-purpose +computers, but in those that do, we wish to avoid the special danger that +patents applied to a free program could make it effectively proprietary. To +prevent this, the GPL assures that patents cannot be used to render the program +non-free. + +The precise terms and conditions for copying, distribution and modification +follow. + +TERMS AND CONDITIONS + + 0. Definitions. + + "This License" refers to version 3 of the GNU General Public License. + +"Copyright" also means copyright-like laws that apply to other kinds of works, +such as semiconductor masks. + +"The Program" refers to any copyrightable work licensed under this License. +Each licensee is addressed as "you". "Licensees" and "recipients" may be individuals +or organizations. + +To "modify" a work means to copy from or adapt all or part of the work in +a fashion requiring copyright permission, other than the making of an exact +copy. The resulting work is called a "modified version" of the earlier work +or a work "based on" the earlier work. + +A "covered work" means either the unmodified Program or a work based on the +Program. + +To "propagate" a work means to do anything with it that, without permission, +would make you directly or secondarily liable for infringement under applicable +copyright law, except executing it on a computer or modifying a private copy. +Propagation includes copying, distribution (with or without modification), +making available to the public, and in some countries other activities as +well. + +To "convey" a work means any kind of propagation that enables other parties +to make or receive copies. Mere interaction with a user through a computer +network, with no transfer of a copy, is not conveying. + +An interactive user interface displays "Appropriate Legal Notices" to the +extent that it includes a convenient and prominently visible feature that +(1) displays an appropriate copyright notice, and (2) tells the user that +there is no warranty for the work (except to the extent that warranties are +provided), that licensees may convey the work under this License, and how +to view a copy of this License. If the interface presents a list of user commands +or options, such as a menu, a prominent item in the list meets this criterion. + + 1. Source Code. + +The "source code" for a work means the preferred form of the work for making +modifications to it. "Object code" means any non-source form of a work. + +A "Standard Interface" means an interface that either is an official standard +defined by a recognized standards body, or, in the case of interfaces specified +for a particular programming language, one that is widely used among developers +working in that language. + +The "System Libraries" of an executable work include anything, other than +the work as a whole, that (a) is included in the normal form of packaging +a Major Component, but which is not part of that Major Component, and (b) +serves only to enable use of the work with that Major Component, or to implement +a Standard Interface for which an implementation is available to the public +in source code form. A "Major Component", in this context, means a major essential +component (kernel, window system, and so on) of the specific operating system +(if any) on which the executable work runs, or a compiler used to produce +the work, or an object code interpreter used to run it. + +The "Corresponding Source" for a work in object code form means all the source +code needed to generate, install, and (for an executable work) run the object +code and to modify the work, including scripts to control those activities. +However, it does not include the work's System Libraries, or general-purpose +tools or generally available free programs which are used unmodified in performing +those activities but which are not part of the work. For example, Corresponding +Source includes interface definition files associated with source files for +the work, and the source code for shared libraries and dynamically linked +subprograms that the work is specifically designed to require, such as by +intimate data communication or control flow between those subprograms and +other parts of the work. + +The Corresponding Source need not include anything that users can regenerate +automatically from other parts of the Corresponding Source. + + The Corresponding Source for a work in source code form is that same work. + + 2. Basic Permissions. + +All rights granted under this License are granted for the term of copyright +on the Program, and are irrevocable provided the stated conditions are met. +This License explicitly affirms your unlimited permission to run the unmodified +Program. The output from running a covered work is covered by this License +only if the output, given its content, constitutes a covered work. This License +acknowledges your rights of fair use or other equivalent, as provided by copyright +law. + +You may make, run and propagate covered works that you do not convey, without +conditions so long as your license otherwise remains in force. You may convey +covered works to others for the sole purpose of having them make modifications +exclusively for you, or provide you with facilities for running those works, +provided that you comply with the terms of this License in conveying all material +for which you do not control copyright. Those thus making or running the covered +works for you must do so exclusively on your behalf, under your direction +and control, on terms that prohibit them from making any copies of your copyrighted +material outside their relationship with you. + +Conveying under any other circumstances is permitted solely under the conditions +stated below. Sublicensing is not allowed; section 10 makes it unnecessary. + + 3. Protecting Users' Legal Rights From Anti-Circumvention Law. + +No covered work shall be deemed part of an effective technological measure +under any applicable law fulfilling obligations under article 11 of the WIPO +copyright treaty adopted on 20 December 1996, or similar laws prohibiting +or restricting circumvention of such measures. + +When you convey a covered work, you waive any legal power to forbid circumvention +of technological measures to the extent such circumvention is effected by +exercising rights under this License with respect to the covered work, and +you disclaim any intention to limit operation or modification of the work +as a means of enforcing, against the work's users, your or third parties' +legal rights to forbid circumvention of technological measures. + + 4. Conveying Verbatim Copies. + +You may convey verbatim copies of the Program's source code as you receive +it, in any medium, provided that you conspicuously and appropriately publish +on each copy an appropriate copyright notice; keep intact all notices stating +that this License and any non-permissive terms added in accord with section +7 apply to the code; keep intact all notices of the absence of any warranty; +and give all recipients a copy of this License along with the Program. + +You may charge any price or no price for each copy that you convey, and you +may offer support or warranty protection for a fee. + + 5. Conveying Modified Source Versions. + +You may convey a work based on the Program, or the modifications to produce +it from the Program, in the form of source code under the terms of section +4, provided that you also meet all of these conditions: + +a) The work must carry prominent notices stating that you modified it, and +giving a relevant date. + +b) The work must carry prominent notices stating that it is released under +this License and any conditions added under section 7. This requirement modifies +the requirement in section 4 to "keep intact all notices". + +c) You must license the entire work, as a whole, under this License to anyone +who comes into possession of a copy. This License will therefore apply, along +with any applicable section 7 additional terms, to the whole of the work, +and all its parts, regardless of how they are packaged. This License gives +no permission to license the work in any other way, but it does not invalidate +such permission if you have separately received it. + +d) If the work has interactive user interfaces, each must display Appropriate +Legal Notices; however, if the Program has interactive interfaces that do +not display Appropriate Legal Notices, your work need not make them do so. + +A compilation of a covered work with other separate and independent works, +which are not by their nature extensions of the covered work, and which are +not combined with it such as to form a larger program, in or on a volume of +a storage or distribution medium, is called an "aggregate" if the compilation +and its resulting copyright are not used to limit the access or legal rights +of the compilation's users beyond what the individual works permit. Inclusion +of a covered work in an aggregate does not cause this License to apply to +the other parts of the aggregate. + + 6. Conveying Non-Source Forms. + +You may convey a covered work in object code form under the terms of sections +4 and 5, provided that you also convey the machine-readable Corresponding +Source under the terms of this License, in one of these ways: + +a) Convey the object code in, or embodied in, a physical product (including +a physical distribution medium), accompanied by the Corresponding Source fixed +on a durable physical medium customarily used for software interchange. + +b) Convey the object code in, or embodied in, a physical product (including +a physical distribution medium), accompanied by a written offer, valid for +at least three years and valid for as long as you offer spare parts or customer +support for that product model, to give anyone who possesses the object code +either (1) a copy of the Corresponding Source for all the software in the +product that is covered by this License, on a durable physical medium customarily +used for software interchange, for a price no more than your reasonable cost +of physically performing this conveying of source, or (2) access to copy the +Corresponding Source from a network server at no charge. + +c) Convey individual copies of the object code with a copy of the written +offer to provide the Corresponding Source. This alternative is allowed only +occasionally and noncommercially, and only if you received the object code +with such an offer, in accord with subsection 6b. + +d) Convey the object code by offering access from a designated place (gratis +or for a charge), and offer equivalent access to the Corresponding Source +in the same way through the same place at no further charge. You need not +require recipients to copy the Corresponding Source along with the object +code. If the place to copy the object code is a network server, the Corresponding +Source may be on a different server (operated by you or a third party) that +supports equivalent copying facilities, provided you maintain clear directions +next to the object code saying where to find the Corresponding Source. Regardless +of what server hosts the Corresponding Source, you remain obligated to ensure +that it is available for as long as needed to satisfy these requirements. + +e) Convey the object code using peer-to-peer transmission, provided you inform +other peers where the object code and Corresponding Source of the work are +being offered to the general public at no charge under subsection 6d. + +A separable portion of the object code, whose source code is excluded from +the Corresponding Source as a System Library, need not be included in conveying +the object code work. + +A "User Product" is either (1) a "consumer product", which means any tangible +personal property which is normally used for personal, family, or household +purposes, or (2) anything designed or sold for incorporation into a dwelling. +In determining whether a product is a consumer product, doubtful cases shall +be resolved in favor of coverage. For a particular product received by a particular +user, "normally used" refers to a typical or common use of that class of product, +regardless of the status of the particular user or of the way in which the +particular user actually uses, or expects or is expected to use, the product. +A product is a consumer product regardless of whether the product has substantial +commercial, industrial or non-consumer uses, unless such uses represent the +only significant mode of use of the product. + +"Installation Information" for a User Product means any methods, procedures, +authorization keys, or other information required to install and execute modified +versions of a covered work in that User Product from a modified version of +its Corresponding Source. The information must suffice to ensure that the +continued functioning of the modified object code is in no case prevented +or interfered with solely because modification has been made. + +If you convey an object code work under this section in, or with, or specifically +for use in, a User Product, and the conveying occurs as part of a transaction +in which the right of possession and use of the User Product is transferred +to the recipient in perpetuity or for a fixed term (regardless of how the +transaction is characterized), the Corresponding Source conveyed under this +section must be accompanied by the Installation Information. But this requirement +does not apply if neither you nor any third party retains the ability to install +modified object code on the User Product (for example, the work has been installed +in ROM). + +The requirement to provide Installation Information does not include a requirement +to continue to provide support service, warranty, or updates for a work that +has been modified or installed by the recipient, or for the User Product in +which it has been modified or installed. Access to a network may be denied +when the modification itself materially and adversely affects the operation +of the network or violates the rules and protocols for communication across +the network. + +Corresponding Source conveyed, and Installation Information provided, in accord +with this section must be in a format that is publicly documented (and with +an implementation available to the public in source code form), and must require +no special password or key for unpacking, reading or copying. + + 7. Additional Terms. + +"Additional permissions" are terms that supplement the terms of this License +by making exceptions from one or more of its conditions. Additional permissions +that are applicable to the entire Program shall be treated as though they +were included in this License, to the extent that they are valid under applicable +law. If additional permissions apply only to part of the Program, that part +may be used separately under those permissions, but the entire Program remains +governed by this License without regard to the additional permissions. + +When you convey a copy of a covered work, you may at your option remove any +additional permissions from that copy, or from any part of it. (Additional +permissions may be written to require their own removal in certain cases when +you modify the work.) You may place additional permissions on material, added +by you to a covered work, for which you have or can give appropriate copyright +permission. + +Notwithstanding any other provision of this License, for material you add +to a covered work, you may (if authorized by the copyright holders of that +material) supplement the terms of this License with terms: + +a) Disclaiming warranty or limiting liability differently from the terms of +sections 15 and 16 of this License; or + +b) Requiring preservation of specified reasonable legal notices or author +attributions in that material or in the Appropriate Legal Notices displayed +by works containing it; or + +c) Prohibiting misrepresentation of the origin of that material, or requiring +that modified versions of such material be marked in reasonable ways as different +from the original version; or + +d) Limiting the use for publicity purposes of names of licensors or authors +of the material; or + +e) Declining to grant rights under trademark law for use of some trade names, +trademarks, or service marks; or + +f) Requiring indemnification of licensors and authors of that material by +anyone who conveys the material (or modified versions of it) with contractual +assumptions of liability to the recipient, for any liability that these contractual +assumptions directly impose on those licensors and authors. + +All other non-permissive additional terms are considered "further restrictions" +within the meaning of section 10. If the Program as you received it, or any +part of it, contains a notice stating that it is governed by this License +along with a term that is a further restriction, you may remove that term. +If a license document contains a further restriction but permits relicensing +or conveying under this License, you may add to a covered work material governed +by the terms of that license document, provided that the further restriction +does not survive such relicensing or conveying. + +If you add terms to a covered work in accord with this section, you must place, +in the relevant source files, a statement of the additional terms that apply +to those files, or a notice indicating where to find the applicable terms. + +Additional terms, permissive or non-permissive, may be stated in the form +of a separately written license, or stated as exceptions; the above requirements +apply either way. + + 8. Termination. + +You may not propagate or modify a covered work except as expressly provided +under this License. Any attempt otherwise to propagate or modify it is void, +and will automatically terminate your rights under this License (including +any patent licenses granted under the third paragraph of section 11). + +However, if you cease all violation of this License, then your license from +a particular copyright holder is reinstated (a) provisionally, unless and +until the copyright holder explicitly and finally terminates your license, +and (b) permanently, if the copyright holder fails to notify you of the violation +by some reasonable means prior to 60 days after the cessation. + +Moreover, your license from a particular copyright holder is reinstated permanently +if the copyright holder notifies you of the violation by some reasonable means, +this is the first time you have received notice of violation of this License +(for any work) from that copyright holder, and you cure the violation prior +to 30 days after your receipt of the notice. + +Termination of your rights under this section does not terminate the licenses +of parties who have received copies or rights from you under this License. +If your rights have been terminated and not permanently reinstated, you do +not qualify to receive new licenses for the same material under section 10. + + 9. Acceptance Not Required for Having Copies. + +You are not required to accept this License in order to receive or run a copy +of the Program. Ancillary propagation of a covered work occurring solely as +a consequence of using peer-to-peer transmission to receive a copy likewise +does not require acceptance. However, nothing other than this License grants +you permission to propagate or modify any covered work. These actions infringe +copyright if you do not accept this License. Therefore, by modifying or propagating +a covered work, you indicate your acceptance of this License to do so. + + 10. Automatic Licensing of Downstream Recipients. + +Each time you convey a covered work, the recipient automatically receives +a license from the original licensors, to run, modify and propagate that work, +subject to this License. You are not responsible for enforcing compliance +by third parties with this License. + +An "entity transaction" is a transaction transferring control of an organization, +or substantially all assets of one, or subdividing an organization, or merging +organizations. If propagation of a covered work results from an entity transaction, +each party to that transaction who receives a copy of the work also receives +whatever licenses to the work the party's predecessor in interest had or could +give under the previous paragraph, plus a right to possession of the Corresponding +Source of the work from the predecessor in interest, if the predecessor has +it or can get it with reasonable efforts. + +You may not impose any further restrictions on the exercise of the rights +granted or affirmed under this License. For example, you may not impose a +license fee, royalty, or other charge for exercise of rights granted under +this License, and you may not initiate litigation (including a cross-claim +or counterclaim in a lawsuit) alleging that any patent claim is infringed +by making, using, selling, offering for sale, or importing the Program or +any portion of it. + + 11. Patents. + +A "contributor" is a copyright holder who authorizes use under this License +of the Program or a work on which the Program is based. The work thus licensed +is called the contributor's "contributor version". + +A contributor's "essential patent claims" are all patent claims owned or controlled +by the contributor, whether already acquired or hereafter acquired, that would +be infringed by some manner, permitted by this License, of making, using, +or selling its contributor version, but do not include claims that would be +infringed only as a consequence of further modification of the contributor +version. For purposes of this definition, "control" includes the right to +grant patent sublicenses in a manner consistent with the requirements of this +License. + +Each contributor grants you a non-exclusive, worldwide, royalty-free patent +license under the contributor's essential patent claims, to make, use, sell, +offer for sale, import and otherwise run, modify and propagate the contents +of its contributor version. + +In the following three paragraphs, a "patent license" is any express agreement +or commitment, however denominated, not to enforce a patent (such as an express +permission to practice a patent or covenant not to sue for patent infringement). +To "grant" such a patent license to a party means to make such an agreement +or commitment not to enforce a patent against the party. + +If you convey a covered work, knowingly relying on a patent license, and the +Corresponding Source of the work is not available for anyone to copy, free +of charge and under the terms of this License, through a publicly available +network server or other readily accessible means, then you must either (1) +cause the Corresponding Source to be so available, or (2) arrange to deprive +yourself of the benefit of the patent license for this particular work, or +(3) arrange, in a manner consistent with the requirements of this License, +to extend the patent license to downstream recipients. "Knowingly relying" +means you have actual knowledge that, but for the patent license, your conveying +the covered work in a country, or your recipient's use of the covered work +in a country, would infringe one or more identifiable patents in that country +that you have reason to believe are valid. + +If, pursuant to or in connection with a single transaction or arrangement, +you convey, or propagate by procuring conveyance of, a covered work, and grant +a patent license to some of the parties receiving the covered work authorizing +them to use, propagate, modify or convey a specific copy of the covered work, +then the patent license you grant is automatically extended to all recipients +of the covered work and works based on it. + +A patent license is "discriminatory" if it does not include within the scope +of its coverage, prohibits the exercise of, or is conditioned on the non-exercise +of one or more of the rights that are specifically granted under this License. +You may not convey a covered work if you are a party to an arrangement with +a third party that is in the business of distributing software, under which +you make payment to the third party based on the extent of your activity of +conveying the work, and under which the third party grants, to any of the +parties who would receive the covered work from you, a discriminatory patent +license (a) in connection with copies of the covered work conveyed by you +(or copies made from those copies), or (b) primarily for and in connection +with specific products or compilations that contain the covered work, unless +you entered into that arrangement, or that patent license was granted, prior +to 28 March 2007. + +Nothing in this License shall be construed as excluding or limiting any implied +license or other defenses to infringement that may otherwise be available +to you under applicable patent law. + + 12. No Surrender of Others' Freedom. + +If conditions are imposed on you (whether by court order, agreement or otherwise) +that contradict the conditions of this License, they do not excuse you from +the conditions of this License. If you cannot convey a covered work so as +to satisfy simultaneously your obligations under this License and any other +pertinent obligations, then as a consequence you may not convey it at all. +For example, if you agree to terms that obligate you to collect a royalty +for further conveying from those to whom you convey the Program, the only +way you could satisfy both those terms and this License would be to refrain +entirely from conveying the Program. + + 13. Use with the GNU Affero General Public License. + +Notwithstanding any other provision of this License, you have permission to +link or combine any covered work with a work licensed under version 3 of the +GNU Affero General Public License into a single combined work, and to convey +the resulting work. The terms of this License will continue to apply to the +part which is the covered work, but the special requirements of the GNU Affero +General Public License, section 13, concerning interaction through a network +will apply to the combination as such. + + 14. Revised Versions of this License. + +The Free Software Foundation may publish revised and/or new versions of the +GNU General Public License from time to time. Such new versions will be similar +in spirit to the present version, but may differ in detail to address new +problems or concerns. + +Each version is given a distinguishing version number. If the Program specifies +that a certain numbered version of the GNU General Public License "or any +later version" applies to it, you have the option of following the terms and +conditions either of that numbered version or of any later version published +by the Free Software Foundation. If the Program does not specify a version +number of the GNU General Public License, you may choose any version ever +published by the Free Software Foundation. + +If the Program specifies that a proxy can decide which future versions of +the GNU General Public License can be used, that proxy's public statement +of acceptance of a version permanently authorizes you to choose that version +for the Program. + +Later license versions may give you additional or different permissions. However, +no additional obligations are imposed on any author or copyright holder as +a result of your choosing to follow a later version. + + 15. Disclaimer of Warranty. + +THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE +LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR +OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER +EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES +OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS +TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM +PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR +CORRECTION. + + 16. Limitation of Liability. + +IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL +ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS THE PROGRAM +AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, +INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO +USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED +INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE +PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER +PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. + + 17. Interpretation of Sections 15 and 16. + +If the disclaimer of warranty and limitation of liability provided above cannot +be given local legal effect according to their terms, reviewing courts shall +apply local law that most closely approximates an absolute waiver of all civil +liability in connection with the Program, unless a warranty or assumption +of liability accompanies a copy of the Program in return for a fee. END OF +TERMS AND CONDITIONS + +How to Apply These Terms to Your New Programs + +If you develop a new program, and you want it to be of the greatest possible +use to the public, the best way to achieve this is to make it free software +which everyone can redistribute and change under these terms. + +To do so, attach the following notices to the program. It is safest to attach +them to the start of each source file to most effectively state the exclusion +of warranty; and each file should have at least the "copyright" line and a +pointer to where the full notice is found. + + + +Copyright (C) + +This program is free software: you can redistribute it and/or modify it under +the terms of the GNU General Public License as published by the Free Software +Foundation, either version 3 of the License, or (at your option) any later +version. + +This program is distributed in the hope that it will be useful, but WITHOUT +ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS +FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. + +You should have received a copy of the GNU General Public License along with +this program. If not, see . + +Also add information on how to contact you by electronic and paper mail. + +If the program does terminal interaction, make it output a short notice like +this when it starts in an interactive mode: + + Copyright (C) + +This program comes with ABSOLUTELY NO WARRANTY; for details type `show w'. + +This is free software, and you are welcome to redistribute it under certain +conditions; type `show c' for details. + +The hypothetical commands `show w' and `show c' should show the appropriate +parts of the General Public License. Of course, your program's commands might +be different; for a GUI interface, you would use an "about box". + +You should also get your employer (if you work as a programmer) or school, +if any, to sign a "copyright disclaimer" for the program, if necessary. For +more information on this, and how to apply and follow the GNU GPL, see . + +The GNU General Public License does not permit incorporating your program +into proprietary programs. If your program is a subroutine library, you may +consider it more useful to permit linking proprietary applications with the +library. If this is what you want to do, use the GNU Lesser General Public +License instead of this License. But first, please read . diff --git a/Monitor.c b/Monitor.c new file mode 100644 index 0000000..328ee27 --- /dev/null +++ b/Monitor.c @@ -0,0 +1,277 @@ +/* + * Monitor.c + * + * Created on: 23 Mar 2021 + * Author: angoosh + */ +#include "Monitor.h" + + +void MONITOR_VarSendInt(UART_HandleTypeDef*, char*, int, int, uint8_t, uint8_t, int*); +void MONITOR_VarSendFloat(UART_HandleTypeDef*, char*, int, float, int*); +void MONITOR_VarSendReg(UART_HandleTypeDef*, char*, int, uint32_t, int*); +void MONITOR_Update(uint8_t*, int); + +int Gaddress; +char GaddrBuff[10]; +/** + * @brief Posilani promenne + * @param UART type + * @param Jmeno promenne + * @param sizeof(Jmeno promenne) + * @param Promenna pro odeslani + * @param sizeof(Promenna) + * @param sign (zda je unsigned = 0, nebo signed = 1) + */ +void MONITOR_VarSendInt(UART_HandleTypeDef *huart, char *name, int name_size, int var, uint8_t size, uint8_t sign, int *pointer){ + uint8_t isNegative = 0; + int varAbs = abs(var); + if(var < 0){ + isNegative = 1; + } + uint8_t ValueOfVariableSize = (uint8_t)log10(varAbs)+1+isNegative; + char ValueOfVariableTemp[11]; + char ValueOfVariable[ValueOfVariableSize]; + sprintf(ValueOfVariableTemp, "%d", var); + + for(int i = 0; i < ValueOfVariableSize; i++){ + ValueOfVariable[i] = ValueOfVariableTemp[i]; + } + + int dataStrSize; + + if(sign == 0){ + if(size == 1){ + dataStrSize = 9; + } + else{ + dataStrSize = 10; + } + } + else{ + if(size == 1){ + dataStrSize = 8; + } + else{ + dataStrSize = 9; + } + } + char varType[dataStrSize]; + + if(sign == 0){ + if(size == 1){ + strcpy(varType,"uint8_t,"); + } + else if(size == 2){ + strcpy(varType,"uint16_t,"); + } + else{ + strcpy(varType,"uint32_t,"); + } + } + else{ + if(size == 1){ + strcpy(varType,"int8_t,"); + } + else if(size == 2){ + strcpy(varType,"int16_t,"); + } + else{ + strcpy(varType,"int32_t,"); + } + } + //HAL_UART_Transmit(huart, (uint8_t *)&ValueOfVariable, 3, 0xFFFF); + char msg[sizeof(ValueOfVariable)+dataStrSize+name_size+2]; + + + + strcpy(msg, "V,"); + strcat(msg, varType); + strcat(msg, name); + strcat(msg, ","); + strcat(msg, ValueOfVariable); + //strcat(msg, "\n"); + + HAL_UART_Transmit(huart, (uint8_t *)&msg, sizeof(msg), 0xFFFF); + char pointerArr[10]; + sprintf(pointerArr, "%p", pointer); + HAL_UART_Transmit(huart, (uint8_t *)&",", 1, 0xFFFF); + HAL_UART_Transmit(huart, (uint8_t *)&pointerArr, sizeof(pointerArr), 0xFFFF); + HAL_UART_Transmit(huart, (uint8_t *)&"\n", 1, 0xFFFF); + + //int *pointer = &var; + +} + +/** + * @brief Posilani promenne + * @param UART type + * @param Jmeno promenne + * @param sizeof(Jmeno promenne) + * @param Promenna pro odeslani + */ +void MONITOR_VarSendFloat(UART_HandleTypeDef *huart, char *name, int name_size, float var, int *pointer){ + uint8_t isNegative = 0; + int varAbs = abs(var); + if(var < 0){ + isNegative = 1; + } + uint8_t ValueOfVariableSize = (uint8_t)log10(varAbs)+4+isNegative; + //char ValueOfVariableTemp[11]; + char ValueOfVariable[ValueOfVariableSize]; + sprintf(ValueOfVariable, "%.3f", var); + + //for(int i = 0; i < ValueOfVariableSize; i++){ + // ValueOfVariable[i] = ValueOfVariableTemp[i]; + //} + + char varType[] = "float,"; + char msg[sizeof(ValueOfVariable)+sizeof(varType)+name_size+2]; + + strcpy(msg, "V,"); + strcat(msg, varType); + strcat(msg, name); + strcat(msg, ","); + strcat(msg, ValueOfVariable); + //msg[sizeof(msg)-1] = '\n'; + //strcat(msg, "\n"); + + HAL_UART_Transmit(huart, (uint8_t *)&msg, sizeof(msg), 0xFFFF); + + char pointerArr[10]; + sprintf(pointerArr, "%p", pointer); + HAL_UART_Transmit(huart, (uint8_t *)&",", 1, 0xFFFF); + HAL_UART_Transmit(huart, (uint8_t *)&pointerArr, sizeof(pointerArr), 0xFFFF); + HAL_UART_Transmit(huart, (uint8_t *)&"\n", 1, 0xFFFF); +} + +/** + * @brief Posilani promenne + * @param UART type + * @param Jmeno registru + * @param sizeof(Jmeno registru) + * @param registr + */ +void MONITOR_VarSendReg(UART_HandleTypeDef *huart, char *name, int name_size, uint32_t reg, int *pointer){ + uint8_t ValueOfVariableSize = (uint8_t)log10(reg)+1; + char ValueOfVariable[ValueOfVariableSize]; + sprintf(ValueOfVariable, "%lu", reg); + + char varType[] = "reg,"; + char msg[sizeof(ValueOfVariable)+sizeof(varType)+name_size+2]; + + strcpy(msg, "R,"); + strcat(msg, varType); + strcat(msg, name); + strcat(msg, ","); + strcat(msg, ValueOfVariable); + //msg[sizeof(msg)-1] = '\n'; + //strcat(msg, "\n"); + + HAL_UART_Transmit(huart, (uint8_t *)&msg, sizeof(msg), 0xFFFF); + + char pointerArr[10]; + sprintf(pointerArr, "%p", pointer); + HAL_UART_Transmit(huart, (uint8_t *)&",", 1, 0xFFFF); + HAL_UART_Transmit(huart, (uint8_t *)&pointerArr, sizeof(pointerArr), 0xFFFF); + HAL_UART_Transmit(huart, (uint8_t *)&"\n", 1, 0xFFFF); +} + +/** + * @brief Posilani promenne + * @param typ promenne 0: uint8_t, 1:int8_t, 2:uint16_t, 3:int16_t, 4:uint32_t, 5:int32_t, 6:float, 7:register + * @param adresa promenne + * @param string hodnota + */ + + +void MONITOR_Update(uint8_t *buffer, int bufferSize){ + +//void Update(uint8_t type, int address, char *value){ + uint type; + int address; + char lineBuffer[bufferSize]; + int lineLen = 0; + for(int i = 0; i < bufferSize; i++){ + if(buffer[i] == MSG_PREFIX){ + HAL_GPIO_TogglePin(GPIOB,LED_OK_Pin); + for(int j = 0; j < bufferSize; j++){ + if(buffer[i+j+1] != MSG_LINE_END){ + lineBuffer[j] = buffer[i+j+1]; + lineLen ++; + } + else{ + break; + } + } + type = lineBuffer[0]-'0'; + + char addrBuff[10]; + for(int j = 0; j < 10; j++){ + addrBuff[j] = lineBuffer[j+1]; + GaddrBuff[j] = addrBuff[j]; + } + sscanf(GaddrBuff, "%X", &address); + + Gaddress = address; + + char value[lineLen-11]; + for(int j = 0; j < sizeof(value); j++){ + value[j] = lineBuffer[j+11]; + } + if(type == 0){ + uint data; + sscanf(value, "%u", &data); + *(uint8_t*)address = data; + } + else if(type == 1){ + int data; + sscanf(value, "%d", &data); + *(int8_t*)address = data; + } + else if(type == 2){ + uint data; + sscanf(value, "%u", &data); + *(uint16_t*)address = data; + } + else if(type == 3){ + int data; + sscanf(value, "%d", &data); + *(int16_t*)address = data; + } + else if(type == 4){ + uint data; + sscanf(value, "%u", &data); + *(uint32_t*)address = data; + } + else if(type == 5){ + int data; + sscanf(value, "%d", &data); + *(int32_t*)address = data; + } + else if(type == 6){ + float data; + sscanf(value, "%f", &data); + *(float*)address = data; + } + else if(type == 7){ + uint data; + sscanf(value, "%u", &data); + *(uint32_t*)address = data; + } + else; + + for(int j = 0; j < lineLen; j++){ + buffer[i+j] = 0; + } + + i += lineLen; + lineLen = 0; + } + else{ + buffer[i] = 0; + } + } +} + + diff --git a/Monitor.h b/Monitor.h new file mode 100644 index 0000000..902afc4 --- /dev/null +++ b/Monitor.h @@ -0,0 +1,26 @@ +/* + * Monitor.h + * + * Created on: 23 Mar 2021 + * Author: angoosh + */ + +#ifndef MONITOR_H_ +#define MONITOR_H_ + +#include "main.h" +#include +#include +#include +#include + +void MONITOR_VarSendInt(UART_HandleTypeDef*, char*, int, int, uint8_t, uint8_t, int*); +void MONITOR_VarSendFloat(UART_HandleTypeDef*, char*, int, float, int*); +void MONITOR_VarSendReg(UART_HandleTypeDef*, char*, int, uint32_t, int*); +void MONITOR_Update(uint8_t*, int); +//void Update(uint8_t, int, char*); + +#define MSG_PREFIX 'A' +#define MSG_LINE_END '\n' + +#endif /* MONITOR_H_ */ diff --git a/README.md b/README.md index 52cf9e7..eceec0a 100644 --- a/README.md +++ b/README.md @@ -1,3 +1,9 @@ # C-Libs -C/C++ libraries for various devices and uses \ No newline at end of file +C libraries, mainly for STM32 and NXP MCUs + +Alink.h,.c - Adcis communication protocol
+ALS31313.h,.c - Library for ALS31313 3D hall sensor
+CBus.h,.c - Low overhead communication protocol, doesn't use DMA, interruppt based
+Monitor.h,.c - monitor library, not much useful
+Soft_SPI.h,.c - Software SPI library
\ No newline at end of file diff --git a/Soft_SPI.c b/Soft_SPI.c new file mode 100644 index 0000000..c5c905e --- /dev/null +++ b/Soft_SPI.c @@ -0,0 +1,292 @@ +/* + * Soft_SPI.c + * + * Created on: Nov 26, 2019 + * Author: Adcis + * + * SCK_Pin, MOSI_Pin, MISO_Pin, CS0_Pin and CS1_Pin required to define in project + * + * Software SPI library for use with STM32 MCUs + */ +#include "main.h" +#include "Soft_SPI.h" + +#ifdef NXP_LPC + #include "chip.h" + #include +#include "debug.h" +#endif + +int SOFT_Power(int,int); +void SOFT_SCK(unsigned int); //rizeni SCK pinu +void SOFT_SPI(unsigned int); //rizeni MOSI pinu +void SOFT_SPI_Send(unsigned int); //odeslani zpravy po SPI +int SOFT_SPI_Receive(unsigned int); //prijem zpravy po SPI +void SOFT_CS(unsigned int); //chip select - 0 = DA prevodnik, 1 = AD prevodnik, cokoliv jineho = nezvoleno nic +void SOFT_SPI_CLK(unsigned int); //1 puls _|-|_ na SCK +int SOFT_SPI_ReadWrite(uint32_t, uint8_t, uint8_t, uint32_t*); + + +int SOFT_Power(int x, int y){ + if (y == 0){ + return 1; + } + else if (y % 2 == 0){ + return SOFT_Power(x, y / 2) * SOFT_Power(x, y / 2); + } + else{ + return x * SOFT_Power(x, y / 2) * SOFT_Power(x, y / 2); + } +} +/** + * @brief Controls SCK + * + * @param var = set state of SCK + * + * @retval None + */ +void SOFT_SCK(unsigned int state){ + if(state == 1){ +#ifdef NXP_LPC + Chip_GPIO_SetPinState(LPC_GPIO_PORT, 0, SCLK, true); +#else + GPIOB->BSRR = SCK_Pin; +#endif + } + else{ +#ifdef NXP_LPC + Chip_GPIO_SetPinState(LPC_GPIO_PORT, 0, SCLK, false); +#else + GPIOB->BRR = SCK_Pin; +#endif + } +} +/** + * @brief Controls MOSI + * + * @param var = set state of MOSI + * + * @retval None + */ +void SOFT_SPI(unsigned int var){ + if(var!=0){ +#ifdef NXP_LPC + Chip_GPIO_SetPinState(LPC_GPIO_PORT, 0, MOSI, true); +#else + GPIOB->BSRR = MOSI_Pin; +#endif + } + else{ +#ifdef NXP_LPC + Chip_GPIO_SetPinState(LPC_GPIO_PORT, 0, MOSI, false); +#else + GPIOB->BRR = MOSI_Pin; +#endif + } +} +/** + * @brief SPI CS control + * + * @param cs = what cs pin to use + * + * @retval None + */ +void SOFT_CS(unsigned int cs){ + if(cs == 0){ +#ifdef NXP_LPC + Chip_GPIO_SetPinState(LPC_GPIO_PORT, 0, CS, false); +#else + GPIOB->BSRR = CS1_Pin; + GPIOB->BRR = CS0_Pin; +#endif + } + else if(cs == 1){ +#ifdef NXP_LPC + Chip_GPIO_SetPinState(LPC_GPIO_PORT, 0, CS, true); +#else + GPIOB->BSRR = CS0_Pin; + GPIOB->BRR = CS1_Pin; +#endif + } + else{ +#ifdef NXP_LPC + Chip_GPIO_SetPinState(LPC_GPIO_PORT, 0, CS, false); +#else + GPIOB->BSRR = CS0_Pin; + GPIOB->BSRR = CS1_Pin; +#endif + } +} +/** + * @brief Sends SPI message + * + * @param value = what byte to send + * + * @retval None + */ +void SOFT_SPI_Send(unsigned int value){ + unsigned int valueBin[] = {0,0,0,0,0,0,0,0}; + if(value >= 128){ + valueBin[0] = 1; + value = value % 128; + } + if(value >= 64){ + valueBin[1] = 1; + value = value % 64; + } + if(value >= 32){ + valueBin[2] = 1; + value = value % 32; + } + if(value >= 16){ + valueBin[3] = 1; + value = value % 16; + } + if(value >= 8){ + valueBin[4] = 1; + value = value % 8; + } + if(value >= 4){ + valueBin[5] = 1; + value = value % 4; + } + if(value >= 2){ + valueBin[6] = 1; + } + valueBin[7] = value % 2; + + SOFT_SCK(0); + SOFT_SPI(valueBin[0]); + SOFT_SCK(0); + SOFT_SCK(1); + SOFT_SPI(valueBin[1]); + SOFT_SCK(0); + SOFT_SCK(1); + SOFT_SPI(valueBin[2]); + SOFT_SCK(0); + SOFT_SCK(1); + SOFT_SPI(valueBin[3]); + SOFT_SCK(0); + SOFT_SCK(1); + SOFT_SPI(valueBin[4]); + SOFT_SCK(0); + SOFT_SCK(1); + SOFT_SPI(valueBin[5]); + SOFT_SCK(0); + SOFT_SCK(1); + SOFT_SPI(valueBin[6]); + SOFT_SCK(0); + SOFT_SCK(1); + SOFT_SPI(valueBin[7]); + SOFT_SCK(0); + SOFT_SCK(1); +#ifdef NXP_LPC + Chip_GPIO_SetPinState(LPC_GPIO_PORT, 0, MOSI, false); +#else + GPIOB->BRR = MOSI_Pin; +#endif + SOFT_SCK(0); +} +/** + * @brief Recieves SPI message + * + * @param bits = how long will received mesage be + * + * @retval uint16_t + */ +int SOFT_SPI_Receive(unsigned int bits){ + uint8_t arr_bts[bits]; + uint8_t sumarr[bits]; + uint16_t sum; + for(int i=0; i> (dataLen-i)) & 1); + SOFT_SCK(0); + SOFT_SCK(1); +#ifdef NXP_LPC + uint8_t MISO_read = Chip_GPIO_GetPinState(LPC_GPIO_PORT, 0, MISO); +#else + uint8_t MISO_read = HAL_GPIO_ReadPin(GPIOB, MISO_Pin); +#endif + if(MISO_read == 1){ + receiveData |= (1 << (dataLen - i)); + } + //else{ + // receiveData |= (1 << i); + //} + bitsTransferred++; + } +#ifdef NXP_LPC + Chip_GPIO_SetPinState(LPC_GPIO_PORT, 0, MOSI, false); +#else + GPIOB->BRR = MOSI_Pin; +#endif + SOFT_SCK(0); + + RxBuffer[j] = receiveData >> 1; + } + return bitsTransferred; +} + diff --git a/Soft_SPI.h b/Soft_SPI.h new file mode 100644 index 0000000..73d0e1e --- /dev/null +++ b/Soft_SPI.h @@ -0,0 +1,10 @@ +void SOFT_SCK(unsigned int state); //rizeni SCK pinu +void SOFT_SPI(unsigned int var); //rizeni MOSI pinu +void SOFT_SPI_Send(unsigned int value); //odeslani zpravy po SPI +int SOFT_SPI_Receive(unsigned int bits); //prijem zpravy po SPI +void SOFT_CS(unsigned int cs); //chip select - 0 = DA prevodnik, 1 = AD prevodnik, cokoliv jineho = nezvoleno nic +void SOFT_SPI_CLK(unsigned int cycles); //1 puls _|-|_ na SCK +int SOFT_SPI_ReadWrite(uint32_t valueToSend, uint8_t dataLen, uint8_t packets, uint32_t *RxBuffer); + +#define FAST_SPI +#define NXP_LPC