2017-11-05 13:28:49 +00:00
|
|
|
#ifndef _IP65_H
|
|
|
|
#define _IP65_H
|
|
|
|
|
2018-07-19 13:35:03 +00:00
|
|
|
#include <stdint.h>
|
|
|
|
#include <stdbool.h>
|
|
|
|
|
2017-11-05 13:28:49 +00:00
|
|
|
// Error codes
|
|
|
|
//
|
2017-11-09 20:46:40 +00:00
|
|
|
#define IP65_ERROR_PORT_IN_USE 0x80
|
|
|
|
#define IP65_ERROR_TIMEOUT_ON_RECEIVE 0x81
|
|
|
|
#define IP65_ERROR_TRANSMIT_FAILED 0x82
|
|
|
|
#define IP65_ERROR_TRANSMISSION_REJECTED_BY_PEER 0x83
|
|
|
|
#define IP65_ERROR_INPUT_TOO_LARGE 0x84
|
|
|
|
#define IP65_ERROR_DEVICE_FAILURE 0x85
|
|
|
|
#define IP65_ERROR_ABORTED_BY_USER 0x86
|
|
|
|
#define IP65_ERROR_LISTENER_NOT_AVAILABLE 0x87
|
|
|
|
#define IP65_ERROR_CONNECTION_RESET_BY_PEER 0x89
|
|
|
|
#define IP65_ERROR_CONNECTION_CLOSED 0x8A
|
|
|
|
#define IP65_ERROR_MALFORMED_URL 0xA0
|
|
|
|
#define IP65_ERROR_DNS_LOOKUP_FAILED 0xA1
|
2017-11-05 13:28:49 +00:00
|
|
|
|
|
|
|
// Last error code
|
|
|
|
//
|
2018-07-19 13:35:03 +00:00
|
|
|
extern uint8_t ip65_error;
|
2017-11-05 13:28:49 +00:00
|
|
|
|
2018-02-22 21:40:52 +00:00
|
|
|
// Driver initialization parameter values
|
2018-02-22 21:33:47 +00:00
|
|
|
//
|
|
|
|
#ifdef __APPLE2__
|
|
|
|
#define DRV_INIT_DEFAULT 3 // Apple II slot number
|
|
|
|
#else
|
|
|
|
#define DRV_INIT_DEFAULT 0 // Unused
|
|
|
|
#endif
|
|
|
|
|
2018-02-22 21:40:52 +00:00
|
|
|
// Initialize the IP stack
|
2017-11-05 13:28:49 +00:00
|
|
|
//
|
2018-02-22 21:40:52 +00:00
|
|
|
// This calls the individual protocol & driver initializations, so this is
|
2017-11-05 13:28:49 +00:00
|
|
|
// the only *_init routine that must be called by a user application,
|
|
|
|
// except for dhcp_init which must also be called if the application
|
|
|
|
// is using DHCP rather than hardcoded IP configuration.
|
|
|
|
//
|
2018-02-22 21:40:52 +00:00
|
|
|
// Inputs: drv_init: Driver initialization parameter
|
2018-07-19 13:35:03 +00:00
|
|
|
// Output: true if there was an error, false otherwise
|
2017-11-05 13:28:49 +00:00
|
|
|
//
|
2018-07-19 13:35:03 +00:00
|
|
|
bool __fastcall__ ip65_init(uint8_t drv_init);
|
2017-11-05 13:28:49 +00:00
|
|
|
|
2018-07-27 15:23:26 +00:00
|
|
|
// Access to Ethernet configuration
|
|
|
|
//
|
|
|
|
// Access to the three items below is only valid after ip65_init returned false.
|
|
|
|
//
|
|
|
|
extern uint8_t cfg_mac[6]; // MAC address of local machine
|
|
|
|
extern char eth_driver_name[]; // Zero terminated string containing driver name
|
|
|
|
extern uint8_t* eth_driver_io_base; // Ethernet chip I/O base address used by driver
|
|
|
|
|
2017-11-05 13:28:49 +00:00
|
|
|
// Main IP polling loop
|
|
|
|
//
|
|
|
|
// This routine should be periodically called by an application at any time
|
|
|
|
// that an inbound packet needs to be handled.
|
|
|
|
// It is 'non-blocking', i.e. it will return if there is no packet waiting to be
|
|
|
|
// handled. Any inbound packet will be handed off to the appropriate handler.
|
|
|
|
//
|
|
|
|
// Inputs: None
|
2018-07-19 13:35:03 +00:00
|
|
|
// Output: true if no packet was waiting or packet handling caused error, false otherwise
|
2017-11-05 13:28:49 +00:00
|
|
|
//
|
2018-07-19 13:35:03 +00:00
|
|
|
bool ip65_process(void);
|
2017-11-05 13:28:49 +00:00
|
|
|
|
|
|
|
// Generate a 'random' 16 bit word
|
|
|
|
//
|
|
|
|
// Entropy comes from the last ethernet frame, counters, and timer.
|
|
|
|
//
|
|
|
|
// Inputs: None
|
|
|
|
// Output: Pseudo-random 16 bit number
|
|
|
|
//
|
2018-07-19 13:35:03 +00:00
|
|
|
uint16_t ip65_random_word(void);
|
2017-11-05 13:28:49 +00:00
|
|
|
|
|
|
|
// Convert 4 octets (IP address, netmask) into a string representing a dotted quad
|
|
|
|
//
|
|
|
|
// The string is returned in a statically allocated buffer, which subsequent calls
|
|
|
|
// will overwrite.
|
|
|
|
//
|
|
|
|
// Inputs: quad: IP address
|
2017-12-07 22:03:04 +00:00
|
|
|
// Output: Zero terminated string containing dotted quad (e.g. "192.168.1.0")
|
2017-11-05 13:28:49 +00:00
|
|
|
//
|
2018-07-19 13:35:03 +00:00
|
|
|
char* __fastcall__ dotted_quad(uint32_t quad);
|
2017-11-05 13:28:49 +00:00
|
|
|
|
|
|
|
// Convert a string representing a dotted quad (IP address, netmask) into 4 octets
|
|
|
|
//
|
2017-12-07 22:03:04 +00:00
|
|
|
// Inputs: quad: Zero terminated string containing dotted quad (e.g. "192.168.1.0"),
|
2017-11-05 13:28:49 +00:00
|
|
|
// to simplify URL parsing, a ':' or '/' can also terminate the string.
|
|
|
|
// Output: IP address, 0 on error
|
|
|
|
//
|
2018-07-19 13:35:03 +00:00
|
|
|
uint32_t __fastcall__ parse_dotted_quad(char* quad);
|
2017-11-05 13:28:49 +00:00
|
|
|
|
|
|
|
// Minimal DHCP client implementation
|
|
|
|
//
|
|
|
|
// IP addresses are requested from a DHCP server (aka 'leased') but are not renewed
|
|
|
|
// or released. Although this is not correct behaviour according to the DHCP RFC,
|
|
|
|
// this works fine in practice in a typical home network environment.
|
|
|
|
//
|
|
|
|
// Inputs: None (although ip65_init should be called first)
|
2018-07-19 13:35:03 +00:00
|
|
|
// Output: false if IP config has been sucesfully obtained and cfg_ip, cfg_netmask,
|
|
|
|
// cfg_gateway and cfg_dns will be set per response from dhcp server.
|
|
|
|
// dhcp_server will be set to address of server that provided configuration.
|
|
|
|
// true if there was an error
|
2017-11-05 13:28:49 +00:00
|
|
|
//
|
2018-07-19 13:35:03 +00:00
|
|
|
bool dhcp_init(void);
|
2017-11-05 13:28:49 +00:00
|
|
|
|
2018-07-27 15:23:26 +00:00
|
|
|
// Access to IP configuration
|
|
|
|
//
|
|
|
|
// The five items below will be overwritten if dhcp_init is called.
|
|
|
|
//
|
|
|
|
extern uint32_t cfg_ip; // IP address of local machine
|
|
|
|
extern uint32_t cfg_netmask; // Netmask of local network
|
|
|
|
extern uint32_t cfg_gateway; // IP address of router on local network
|
|
|
|
extern uint32_t cfg_dns; // IP address of DNS server to use
|
|
|
|
extern uint32_t dhcp_server; // Address of DHCP server that config was obtained from
|
|
|
|
|
2017-11-05 13:28:49 +00:00
|
|
|
// Resolve a string containing a hostname (or a dotted quad) to an IP address
|
|
|
|
//
|
2017-12-07 22:03:04 +00:00
|
|
|
// Inputs: hostname: Zero terminated string containing either a DNS hostname
|
|
|
|
// (e.g. "host.example.com") or an address in "dotted quad"
|
|
|
|
// format (e.g. "192.168.1.0")
|
2017-11-05 13:28:49 +00:00
|
|
|
// Output: IP address of the hostname, 0 on error
|
|
|
|
//
|
2018-07-19 13:35:03 +00:00
|
|
|
uint32_t __fastcall__ dns_resolve(const char* hostname);
|
2017-11-05 13:28:49 +00:00
|
|
|
|
|
|
|
// Send a ping (ICMP echo request) to a remote host, and wait for a response
|
|
|
|
//
|
|
|
|
// Inputs: dest: Destination IP address
|
|
|
|
// Output: 0 if no response, otherwise time (in miliseconds) for host to respond
|
|
|
|
//
|
2018-07-19 13:35:03 +00:00
|
|
|
uint16_t __fastcall__ icmp_ping(uint32_t dest);
|
2017-11-05 13:28:49 +00:00
|
|
|
|
|
|
|
// Add a UDP listener
|
|
|
|
//
|
|
|
|
// Inputs: port: UDP port to listen on
|
|
|
|
// callback: Vector to call when UDP packet arrives on specified port
|
2018-07-19 13:35:03 +00:00
|
|
|
// Output: true if too may listeners already installed, false otherwise
|
2017-11-05 13:28:49 +00:00
|
|
|
//
|
2018-07-19 13:35:03 +00:00
|
|
|
bool __fastcall__ udp_add_listener(uint16_t port, void (*callback)(void));
|
2017-11-05 13:28:49 +00:00
|
|
|
|
|
|
|
// Remove a UDP listener
|
|
|
|
//
|
|
|
|
// Inputs: port: UDP port to stop listening on
|
2018-07-19 13:35:03 +00:00
|
|
|
// Output: false if handler found and removed,
|
|
|
|
// true if handler for specified port not found
|
2017-11-05 13:28:49 +00:00
|
|
|
//
|
2018-07-19 13:35:03 +00:00
|
|
|
bool __fastcall__ udp_remove_listener(uint16_t port);
|
2017-11-05 13:28:49 +00:00
|
|
|
|
|
|
|
// Access to received UDP packet
|
|
|
|
//
|
|
|
|
// Access to the four items below is only valid in the context of a callback
|
|
|
|
// added with udp_add_listener.
|
|
|
|
//
|
2018-07-19 13:35:03 +00:00
|
|
|
extern uint8_t udp_recv_buf[1476]; // Buffer with data received
|
|
|
|
uint16_t udp_recv_len(void); // Length of data received
|
|
|
|
uint32_t udp_recv_src(void); // Source IP address
|
|
|
|
uint16_t udp_recv_src_port(void); // Source port
|
2017-11-05 13:28:49 +00:00
|
|
|
|
|
|
|
// Send a UDP packet
|
|
|
|
//
|
|
|
|
// If the correct MAC address can't be found in the ARP cache then
|
|
|
|
// an ARP request is sent - and the UDP packet is NOT sent. The caller
|
|
|
|
// should wait a while calling ip65_process (to allow time for an ARP
|
|
|
|
// response to arrive) and then call upd_send again. This behavior
|
|
|
|
// makes sense as a UDP packet may get lost in transit at any time
|
|
|
|
// so the caller should to be prepared to resend it after a while
|
|
|
|
// anyway.
|
|
|
|
//
|
|
|
|
// Inputs: buf: Pointer to buffer containing data to be sent
|
|
|
|
// len: Length of data to send (exclusive of any headers)
|
|
|
|
// dest: Destination IP address
|
|
|
|
// dest_port: Destination port
|
|
|
|
// src_port: Source port
|
2018-07-19 13:35:03 +00:00
|
|
|
// Output: true if an error occured, false otherwise
|
2017-11-05 13:28:49 +00:00
|
|
|
//
|
2018-07-19 13:35:03 +00:00
|
|
|
bool __fastcall__ udp_send(const uint8_t* buf, uint16_t len, uint32_t dest,
|
|
|
|
uint16_t dest_port, uint16_t src_port);
|
2017-11-05 13:28:49 +00:00
|
|
|
|
2017-11-06 22:36:44 +00:00
|
|
|
// Listen for an inbound TCP connection
|
|
|
|
//
|
|
|
|
// This is a 'blocking' call, i.e. it will not return until a connection has been made.
|
|
|
|
//
|
|
|
|
// Inputs: port: TCP port to listen on
|
|
|
|
// callback: Vector to call when data arrives on this connection
|
2017-11-07 22:05:05 +00:00
|
|
|
// buf: Pointer to buffer with data received
|
|
|
|
// len: -1 on close, otherwise length of data received
|
2017-11-08 19:59:06 +00:00
|
|
|
// Output: IP address of the connected client, 0 on error
|
2017-11-06 22:36:44 +00:00
|
|
|
//
|
2018-07-19 13:35:03 +00:00
|
|
|
uint32_t __fastcall__ tcp_listen(uint16_t port,
|
|
|
|
void __fastcall__ (*callback)(const uint8_t* buf,
|
|
|
|
int16_t len));
|
2017-11-06 22:36:44 +00:00
|
|
|
|
|
|
|
// Make outbound TCP connection
|
|
|
|
//
|
|
|
|
// Inputs: dest: Destination IP address
|
|
|
|
// dest_port: Destination port
|
|
|
|
// callback: Vector to call when data arrives on this connection
|
2017-11-07 22:05:05 +00:00
|
|
|
// buf: Pointer to buffer with data received
|
|
|
|
// len: -1 on close, otherwise length of data received
|
2018-07-19 13:35:03 +00:00
|
|
|
// Output: true if an error occured, false otherwise
|
2017-11-06 22:36:44 +00:00
|
|
|
//
|
2018-07-19 13:35:03 +00:00
|
|
|
bool __fastcall__ tcp_connect(uint32_t dest, uint16_t dest_port,
|
|
|
|
void __fastcall__ (*callback)(const uint8_t* buf,
|
|
|
|
int16_t len));
|
2017-11-06 22:36:44 +00:00
|
|
|
|
|
|
|
// Close the current TCP connection
|
|
|
|
//
|
|
|
|
// Inputs: None
|
2018-07-19 13:35:03 +00:00
|
|
|
// Output: true if an error occured, false otherwise
|
2017-11-06 22:36:44 +00:00
|
|
|
//
|
2018-07-19 13:35:03 +00:00
|
|
|
bool tcp_close(void);
|
2017-11-06 22:36:44 +00:00
|
|
|
|
|
|
|
// Send data on the current TCP connection
|
|
|
|
//
|
|
|
|
// Inputs: buf: Pointer to buffer containing data to be sent
|
|
|
|
// len: Length of data to send (exclusive of any headers)
|
2018-07-19 13:35:03 +00:00
|
|
|
// Output: true if an error occured, false otherwise
|
2017-11-06 22:36:44 +00:00
|
|
|
//
|
2018-07-19 13:35:03 +00:00
|
|
|
bool __fastcall__ tcp_send(const uint8_t* buf, uint16_t len);
|
2017-11-06 22:36:44 +00:00
|
|
|
|
|
|
|
// Send an empty ACK packet on the current TCP connection
|
|
|
|
//
|
|
|
|
// Inputs: None
|
2018-07-19 13:35:03 +00:00
|
|
|
// Output: true if an error occured, false otherwise
|
2017-11-06 22:36:44 +00:00
|
|
|
//
|
2018-07-19 13:35:03 +00:00
|
|
|
bool tcp_send_keep_alive(void);
|
2017-11-06 22:36:44 +00:00
|
|
|
|
2017-11-09 20:46:40 +00:00
|
|
|
// Query an SNTP server for current UTC time
|
|
|
|
//
|
|
|
|
// Inputs: SNTP server IP address
|
2018-07-20 12:51:20 +00:00
|
|
|
// Output: The number of seconds since 00:00 on Jan 1 1900 (UTC), 0 on error
|
2017-11-09 20:46:40 +00:00
|
|
|
//
|
2018-07-19 13:35:03 +00:00
|
|
|
uint32_t __fastcall__ sntp_get_time(uint32_t server);
|
2017-11-09 20:46:40 +00:00
|
|
|
|
2018-07-20 16:12:51 +00:00
|
|
|
// Download a file from a TFTP server and provide data to user supplied vector
|
2018-07-20 12:51:20 +00:00
|
|
|
//
|
|
|
|
// Inputs: server: IP address of server to receive file from
|
2018-07-20 16:12:51 +00:00
|
|
|
// name: Zero terminated string containing the name of file to download
|
2018-07-20 12:51:20 +00:00
|
|
|
// callback: Vector to call once for each 512 byte packet received
|
|
|
|
// buf: Pointer to buffer containing data received
|
|
|
|
// len: 512 if buffer is full, otherwise number of bytes
|
|
|
|
// in the buffer
|
|
|
|
// Output: true if an error occured, false otherwise
|
|
|
|
//
|
|
|
|
bool __fastcall__ tftp_download(uint32_t server, const char* name,
|
|
|
|
void __fastcall__ (*callback)(const uint8_t* buf,
|
|
|
|
uint16_t len));
|
|
|
|
|
2018-07-20 16:12:51 +00:00
|
|
|
// Download a file from a TFTP server and provide data to specified memory location
|
2018-07-20 12:51:20 +00:00
|
|
|
//
|
|
|
|
// Inputs: server: IP address of server to receive file from
|
2018-07-20 16:12:51 +00:00
|
|
|
// name: Zero terminated string containing the name of file to download
|
2018-07-20 12:51:20 +00:00
|
|
|
// buf: Pointer to buffer containing data received
|
|
|
|
// Output: Length of data received, 0 on error
|
|
|
|
//
|
|
|
|
uint16_t __fastcall__ tftp_download_to_memory(uint32_t server, const char* name,
|
|
|
|
const uint8_t* buf);
|
|
|
|
|
2018-07-20 16:12:51 +00:00
|
|
|
// Upload a file to a TFTP server with data retrieved from user supplied vector
|
2018-07-20 12:51:20 +00:00
|
|
|
//
|
|
|
|
// Inputs: server: IP address of server to send file to
|
2018-07-20 16:12:51 +00:00
|
|
|
// name: Zero terminated string containing the name of file to upload
|
2018-07-20 12:51:20 +00:00
|
|
|
// callback: Vector to call once for each 512 byte packet to be sent
|
|
|
|
// buf: Pointer to buffer containing data to be sent
|
|
|
|
// Output: 512 if buffer is full, otherwise number of bytes
|
|
|
|
// in the buffer
|
|
|
|
// Output: true if an error occured, false otherwise
|
|
|
|
//
|
|
|
|
bool __fastcall__ tftp_upload(uint32_t server, const char* name,
|
|
|
|
uint16_t __fastcall__ (*callback)(const uint8_t* buf));
|
|
|
|
|
2018-07-20 16:12:51 +00:00
|
|
|
// Upload a file to a TFTP server with data retrieved from specified memory location
|
2018-07-20 12:51:20 +00:00
|
|
|
//
|
|
|
|
// Inputs: server: IP address of server to send file to
|
2018-07-20 16:12:51 +00:00
|
|
|
// name: Zero terminated string containing the name of file to upload
|
2018-07-20 12:51:20 +00:00
|
|
|
// buf: Pointer to buffer containing data to be sent
|
|
|
|
// len: Length of data to be sent
|
|
|
|
// Output: true if an error occured, false otherwise
|
|
|
|
//
|
|
|
|
bool __fastcall__ tftp_upload_from_memory(uint32_t server, const char* name,
|
|
|
|
const uint8_t* buf, uint16_t len);
|
|
|
|
|
2018-07-20 16:12:51 +00:00
|
|
|
// Parse an HTTP URL into a form that makes it easy to retrieve the specified resource
|
|
|
|
//
|
|
|
|
// On success the variables url_ip, url_port and url_selector (see below) are valid.
|
|
|
|
//
|
|
|
|
// Inputs: url: Zero (or ctrl char) terminated string containing the URL
|
|
|
|
// Output: true if an error occured, false otherwise
|
|
|
|
//
|
|
|
|
bool __fastcall__ url_parse(const char* url);
|
|
|
|
|
|
|
|
// Access to parsed HTTP URL
|
|
|
|
//
|
|
|
|
// Access to the three items below is only valid after url_parse returned false.
|
|
|
|
//
|
|
|
|
extern uint32_t url_ip; // IP address of host in URL
|
|
|
|
extern uint16_t url_port; // Port number of URL
|
|
|
|
extern char* url_selector; // Zero terminated string containing selector part of URL
|
|
|
|
|
|
|
|
// Download a resource specified by an HTTP URL
|
|
|
|
//
|
2018-10-30 21:02:47 +00:00
|
|
|
// The URL mustn't be longer than 450 chars.
|
2018-07-20 16:12:51 +00:00
|
|
|
// On success the resource is zero terminated.
|
|
|
|
//
|
|
|
|
// Inputs: url: Zero (or ctrl char) terminated string containing the URL
|
|
|
|
// buf: Pointer to a buffer that the resource will be downloaded into
|
|
|
|
// len: Length of buffer
|
|
|
|
// Output: Length of resource downloaded, 0 on error
|
|
|
|
//
|
|
|
|
uint16_t __fastcall__ url_download(const char* url, const uint8_t* buf, uint16_t len);
|
|
|
|
|
2017-12-07 22:03:04 +00:00
|
|
|
// Start an HTTP server
|
|
|
|
//
|
|
|
|
// This routine will stay in an endless loop that is broken only if user press the abort key.
|
|
|
|
//
|
|
|
|
// Inputs: port: TCP port to listen on
|
|
|
|
// callback: Vector to call for each inbound HTTP request
|
|
|
|
// client: IP address of the client that sent the request
|
2018-07-20 16:12:51 +00:00
|
|
|
// method: Zero terminated string containing the HTTP method
|
|
|
|
// path: Zero terminated string containing the HTTP path
|
2017-12-07 22:03:04 +00:00
|
|
|
// Output: None
|
|
|
|
//
|
2018-07-19 13:35:03 +00:00
|
|
|
void __fastcall__ httpd_start(uint16_t port,
|
|
|
|
void __fastcall__ (*callback)(uint32_t client,
|
|
|
|
const char* method,
|
|
|
|
const char* path));
|
2017-12-07 22:03:04 +00:00
|
|
|
|
|
|
|
// HTTP response types
|
|
|
|
//
|
|
|
|
#define HTTPD_RESPONSE_NOHEADER 0 // No HTTP response header
|
|
|
|
#define HTTPD_RESPONSE_200_TEXT 1 // HTTP Code: 200 OK, Content Type: 'text/text'
|
|
|
|
#define HTTPD_RESPONSE_200_HTML 2 // HTTP Code: 200 OK, Content Type: 'text/html'
|
|
|
|
#define HTTPD_RESPONSE_200_DATA 3 // HTTP Code: 200 OK, Content Type: 'application/octet-stream'
|
|
|
|
#define HTTPD_RESPONSE_404 4 // HTTP Code: 404 Not Found
|
|
|
|
#define HTTPD_RESPONSE_500 5 // HTTP Code: 500 System Error
|
|
|
|
|
2018-07-21 16:46:25 +00:00
|
|
|
// Send HTTP response
|
2017-12-07 22:03:04 +00:00
|
|
|
//
|
|
|
|
// Calling httpd_send_response is only valid in the context of a httpd_start callback.
|
|
|
|
// For the response types HTTPD_RESPONSE_404 and HTTPD_RESPONSE_500 'buf' is ignored.
|
|
|
|
// With the response type HTTPD_RESPONSE_NOHEADER it's possible to add more content to
|
|
|
|
// an already sent HTTP response.
|
|
|
|
//
|
|
|
|
// Inputs: response_type: Value describing HTTP code and content type in response header
|
|
|
|
// buf: Pointer to buffer with HTTP response content
|
|
|
|
// len: Length of buffer with HTTP response content
|
|
|
|
// Output: None
|
|
|
|
//
|
2018-07-19 13:35:03 +00:00
|
|
|
void __fastcall__ httpd_send_response(uint8_t response_type,
|
|
|
|
const uint8_t* buf, uint16_t len);
|
2017-12-07 22:03:04 +00:00
|
|
|
|
2018-07-21 16:46:25 +00:00
|
|
|
// Retrieve the value of a variable defined in the previously received HTTP request
|
2017-12-07 22:03:04 +00:00
|
|
|
//
|
|
|
|
// Calling http_get_value is only valid in the context of a httpd_start callback.
|
|
|
|
// Only the first letter in a variable name is significant. E.g. if a querystring contains
|
|
|
|
// the variables 'a','alpha' and 'alabama', then only the first one will be retrievable.
|
|
|
|
//
|
|
|
|
// Inputs: name: Variable to retrieve
|
|
|
|
// Output: Variable value (zero terminated string) if variable exists, null otherwise.
|
|
|
|
//
|
|
|
|
char* __fastcall__ http_get_value(char name);
|
|
|
|
|
2017-11-05 22:16:34 +00:00
|
|
|
// Get number of milliseconds since initialization
|
|
|
|
//
|
|
|
|
// Inputs: None
|
|
|
|
// Output: Current number of milliseconds
|
|
|
|
//
|
2018-07-19 13:35:03 +00:00
|
|
|
uint16_t timer_read(void);
|
2017-11-05 22:16:34 +00:00
|
|
|
|
|
|
|
// Check if specified period of time has passed yet
|
|
|
|
//
|
|
|
|
// Inputs: time: Number of milliseconds we are willing to wait for
|
2018-07-19 13:35:03 +00:00
|
|
|
// Output: true if timeout occured, false otherwise
|
2017-11-05 22:16:34 +00:00
|
|
|
//
|
2018-07-19 13:35:03 +00:00
|
|
|
bool __fastcall__ timer_timeout(uint16_t time);
|
2017-11-05 22:16:34 +00:00
|
|
|
|
2018-07-27 20:03:26 +00:00
|
|
|
// Check whether the abort key is being pressed
|
|
|
|
//
|
|
|
|
// Inputs: None
|
|
|
|
// Output: true if abort key pressed, false otherwise
|
|
|
|
//
|
|
|
|
bool input_check_for_abort_key(void);
|
|
|
|
|
|
|
|
// Control abort key
|
2017-11-05 21:55:55 +00:00
|
|
|
//
|
|
|
|
// Control if the user can abort blocking functions with the abort key
|
|
|
|
// (making them return IP65_ERROR_ABORTED_BY_USER). Initially the abort
|
|
|
|
// key is enabled.
|
|
|
|
//
|
2018-07-19 13:35:03 +00:00
|
|
|
// Inputs: enable: false to disable the key, true to enable the key
|
2017-11-05 21:55:55 +00:00
|
|
|
// Output: None
|
|
|
|
//
|
2018-07-27 20:03:26 +00:00
|
|
|
void __fastcall__ input_set_abort_key(bool enable);
|
|
|
|
|
|
|
|
// Access to actual abort key code
|
|
|
|
//
|
|
|
|
extern uint8_t abort_key;
|
2017-11-05 21:55:55 +00:00
|
|
|
|
2017-11-05 13:28:49 +00:00
|
|
|
#endif
|