mirror of https://github.com/t-edson/P65Utils.git
Add files via upload
This commit is contained in:
parent
3d3b96e776
commit
dc0f411cad
|
@ -0,0 +1,5 @@
|
||||||
|
0.0
|
||||||
|
===
|
||||||
|
|
||||||
|
Primera versión compilable de la librería.
|
||||||
|
Aún queda pendiente la implementación de la ejecución de las instrucciones, y revisar todo la librería para quitar elementos no usados ya que esta libraría se ha creado a partir de la librería PicUtils.
|
836
LICENSE
836
LICENSE
|
@ -1,281 +1,622 @@
|
||||||
GNU GENERAL PUBLIC LICENSE
|
GNU GENERAL PUBLIC LICENSE
|
||||||
Version 2, June 1991
|
Version 3, 29 June 2007
|
||||||
|
|
||||||
Copyright (C) 1989, 1991 Free Software Foundation, Inc.,
|
Copyright (C) 2007 Free Software Foundation, Inc. <http://fsf.org/>
|
||||||
51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
|
|
||||||
Everyone is permitted to copy and distribute verbatim copies
|
Everyone is permitted to copy and distribute verbatim copies
|
||||||
of this license document, but changing it is not allowed.
|
of this license document, but changing it is not allowed.
|
||||||
|
|
||||||
Preamble
|
Preamble
|
||||||
|
|
||||||
The licenses for most software are designed to take away your
|
The GNU General Public License is a free, copyleft license for
|
||||||
freedom to share and change it. By contrast, the GNU General Public
|
software and other kinds of works.
|
||||||
License is intended to guarantee your freedom to share and change free
|
|
||||||
software--to make sure the software is free for all its users. This
|
The licenses for most software and other practical works are designed
|
||||||
General Public License applies to most of the Free Software
|
to take away your freedom to share and change the works. By contrast,
|
||||||
Foundation's software and to any other program whose authors commit to
|
the GNU General Public License is intended to guarantee your freedom to
|
||||||
using it. (Some other Free Software Foundation software is covered by
|
share and change all versions of a program--to make sure it remains free
|
||||||
the GNU Lesser General Public License instead.) You can apply it to
|
software for all its users. We, the Free Software Foundation, use the
|
||||||
|
GNU General Public License for most of our software; it applies also to
|
||||||
|
any other work released this way by its authors. You can apply it to
|
||||||
your programs, too.
|
your programs, too.
|
||||||
|
|
||||||
When we speak of free software, we are referring to freedom, not
|
When we speak of free software, we are referring to freedom, not
|
||||||
price. Our General Public Licenses are designed to make sure that you
|
price. Our General Public Licenses are designed to make sure that you
|
||||||
have the freedom to distribute copies of free software (and charge for
|
have the freedom to distribute copies of free software (and charge for
|
||||||
this service if you wish), that you receive source code or can get it
|
them if you wish), that you receive source code or can get it if you
|
||||||
if you want it, that you can change the software or use pieces of it
|
want it, that you can change the software or use pieces of it in new
|
||||||
in new free programs; and that you know you can do these things.
|
free programs, and that you know you can do these things.
|
||||||
|
|
||||||
To protect your rights, we need to make restrictions that forbid
|
To protect your rights, we need to prevent others from denying you
|
||||||
anyone to deny you these rights or to ask you to surrender the rights.
|
these rights or asking you to surrender the rights. Therefore, you have
|
||||||
These restrictions translate to certain responsibilities for you if you
|
certain responsibilities if you distribute copies of the software, or if
|
||||||
distribute copies of the software, or if you modify it.
|
you modify it: responsibilities to respect the freedom of others.
|
||||||
|
|
||||||
For example, if you distribute copies of such a program, whether
|
For example, if you distribute copies of such a program, whether
|
||||||
gratis or for a fee, you must give the recipients all the rights that
|
gratis or for a fee, you must pass on to the recipients the same
|
||||||
you have. You must make sure that they, too, receive or can get the
|
freedoms that you received. You must make sure that they, too, receive
|
||||||
source code. And you must show them these terms so they know their
|
or can get the source code. And you must show them these terms so they
|
||||||
rights.
|
know their rights.
|
||||||
|
|
||||||
We protect your rights with two steps: (1) copyright the software, and
|
Developers that use the GNU GPL protect your rights with two steps:
|
||||||
(2) offer you this license which gives you legal permission to copy,
|
(1) assert copyright on the software, and (2) offer you this License
|
||||||
distribute and/or modify the software.
|
giving you legal permission to copy, distribute and/or modify it.
|
||||||
|
|
||||||
Also, for each author's protection and ours, we want to make certain
|
For the developers' and authors' protection, the GPL clearly explains
|
||||||
that everyone understands that there is no warranty for this free
|
that there is no warranty for this free software. For both users' and
|
||||||
software. If the software is modified by someone else and passed on, we
|
authors' sake, the GPL requires that modified versions be marked as
|
||||||
want its recipients to know that what they have is not the original, so
|
changed, so that their problems will not be attributed erroneously to
|
||||||
that any problems introduced by others will not reflect on the original
|
authors of previous versions.
|
||||||
authors' reputations.
|
|
||||||
|
|
||||||
Finally, any free program is threatened constantly by software
|
Some devices are designed to deny users access to install or run
|
||||||
patents. We wish to avoid the danger that redistributors of a free
|
modified versions of the software inside them, although the manufacturer
|
||||||
program will individually obtain patent licenses, in effect making the
|
can do so. This is fundamentally incompatible with the aim of
|
||||||
program proprietary. To prevent this, we have made it clear that any
|
protecting users' freedom to change the software. The systematic
|
||||||
patent must be licensed for everyone's free use or not licensed at all.
|
pattern of such abuse occurs in the area of products for individuals to
|
||||||
|
use, which is precisely where it is most unacceptable. Therefore, we
|
||||||
|
have designed this version of the GPL to prohibit the practice for those
|
||||||
|
products. If such problems arise substantially in other domains, we
|
||||||
|
stand ready to extend this provision to those domains in future versions
|
||||||
|
of the GPL, as needed to protect the freedom of users.
|
||||||
|
|
||||||
|
Finally, every program is threatened constantly by software patents.
|
||||||
|
States should not allow patents to restrict development and use of
|
||||||
|
software on general-purpose computers, but in those that do, we wish to
|
||||||
|
avoid the special danger that patents applied to a free program could
|
||||||
|
make it effectively proprietary. To prevent this, the GPL assures that
|
||||||
|
patents cannot be used to render the program non-free.
|
||||||
|
|
||||||
The precise terms and conditions for copying, distribution and
|
The precise terms and conditions for copying, distribution and
|
||||||
modification follow.
|
modification follow.
|
||||||
|
|
||||||
GNU GENERAL PUBLIC LICENSE
|
TERMS AND CONDITIONS
|
||||||
TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION
|
|
||||||
|
|
||||||
0. This License applies to any program or other work which contains
|
0. Definitions.
|
||||||
a notice placed by the copyright holder saying it may be distributed
|
|
||||||
under the terms of this General Public License. The "Program", below,
|
|
||||||
refers to any such program or work, and a "work based on the Program"
|
|
||||||
means either the Program or any derivative work under copyright law:
|
|
||||||
that is to say, a work containing the Program or a portion of it,
|
|
||||||
either verbatim or with modifications and/or translated into another
|
|
||||||
language. (Hereinafter, translation is included without limitation in
|
|
||||||
the term "modification".) Each licensee is addressed as "you".
|
|
||||||
|
|
||||||
Activities other than copying, distribution and modification are not
|
"This License" refers to version 3 of the GNU General Public License.
|
||||||
covered by this License; they are outside its scope. The act of
|
|
||||||
running the Program is not restricted, and the output from the Program
|
|
||||||
is covered only if its contents constitute a work based on the
|
|
||||||
Program (independent of having been made by running the Program).
|
|
||||||
Whether that is true depends on what the Program does.
|
|
||||||
|
|
||||||
1. You may copy and distribute verbatim copies of the Program's
|
"Copyright" also means copyright-like laws that apply to other kinds of
|
||||||
source code as you receive it, in any medium, provided that you
|
works, such as semiconductor masks.
|
||||||
conspicuously and appropriately publish on each copy an appropriate
|
|
||||||
copyright notice and disclaimer of warranty; keep intact all the
|
|
||||||
notices that refer to this License and to the absence of any warranty;
|
|
||||||
and give any other recipients of the Program a copy of this License
|
|
||||||
along with the Program.
|
|
||||||
|
|
||||||
You may charge a fee for the physical act of transferring a copy, and
|
"The Program" refers to any copyrightable work licensed under this
|
||||||
you may at your option offer warranty protection in exchange for a fee.
|
License. Each licensee is addressed as "you". "Licensees" and
|
||||||
|
"recipients" may be individuals or organizations.
|
||||||
|
|
||||||
2. You may modify your copy or copies of the Program or any portion
|
To "modify" a work means to copy from or adapt all or part of the work
|
||||||
of it, thus forming a work based on the Program, and copy and
|
in a fashion requiring copyright permission, other than the making of an
|
||||||
distribute such modifications or work under the terms of Section 1
|
exact copy. The resulting work is called a "modified version" of the
|
||||||
above, provided that you also meet all of these conditions:
|
earlier work or a work "based on" the earlier work.
|
||||||
|
|
||||||
a) You must cause the modified files to carry prominent notices
|
A "covered work" means either the unmodified Program or a work based
|
||||||
stating that you changed the files and the date of any change.
|
on the Program.
|
||||||
|
|
||||||
b) You must cause any work that you distribute or publish, that in
|
To "propagate" a work means to do anything with it that, without
|
||||||
whole or in part contains or is derived from the Program or any
|
permission, would make you directly or secondarily liable for
|
||||||
part thereof, to be licensed as a whole at no charge to all third
|
infringement under applicable copyright law, except executing it on a
|
||||||
parties under the terms of this License.
|
computer or modifying a private copy. Propagation includes copying,
|
||||||
|
distribution (with or without modification), making available to the
|
||||||
|
public, and in some countries other activities as well.
|
||||||
|
|
||||||
c) If the modified program normally reads commands interactively
|
To "convey" a work means any kind of propagation that enables other
|
||||||
when run, you must cause it, when started running for such
|
parties to make or receive copies. Mere interaction with a user through
|
||||||
interactive use in the most ordinary way, to print or display an
|
a computer network, with no transfer of a copy, is not conveying.
|
||||||
announcement including an appropriate copyright notice and a
|
|
||||||
notice that there is no warranty (or else, saying that you provide
|
|
||||||
a warranty) and that users may redistribute the program under
|
|
||||||
these conditions, and telling the user how to view a copy of this
|
|
||||||
License. (Exception: if the Program itself is interactive but
|
|
||||||
does not normally print such an announcement, your work based on
|
|
||||||
the Program is not required to print an announcement.)
|
|
||||||
|
|
||||||
These requirements apply to the modified work as a whole. If
|
An interactive user interface displays "Appropriate Legal Notices"
|
||||||
identifiable sections of that work are not derived from the Program,
|
to the extent that it includes a convenient and prominently visible
|
||||||
and can be reasonably considered independent and separate works in
|
feature that (1) displays an appropriate copyright notice, and (2)
|
||||||
themselves, then this License, and its terms, do not apply to those
|
tells the user that there is no warranty for the work (except to the
|
||||||
sections when you distribute them as separate works. But when you
|
extent that warranties are provided), that licensees may convey the
|
||||||
distribute the same sections as part of a whole which is a work based
|
work under this License, and how to view a copy of this License. If
|
||||||
on the Program, the distribution of the whole must be on the terms of
|
the interface presents a list of user commands or options, such as a
|
||||||
this License, whose permissions for other licensees extend to the
|
menu, a prominent item in the list meets this criterion.
|
||||||
entire whole, and thus to each and every part regardless of who wrote it.
|
|
||||||
|
|
||||||
Thus, it is not the intent of this section to claim rights or contest
|
1. Source Code.
|
||||||
your rights to work written entirely by you; rather, the intent is to
|
|
||||||
exercise the right to control the distribution of derivative or
|
|
||||||
collective works based on the Program.
|
|
||||||
|
|
||||||
In addition, mere aggregation of another work not based on the Program
|
The "source code" for a work means the preferred form of the work
|
||||||
with the Program (or with a work based on the Program) on a volume of
|
for making modifications to it. "Object code" means any non-source
|
||||||
a storage or distribution medium does not bring the other work under
|
form of a work.
|
||||||
the scope of this License.
|
|
||||||
|
|
||||||
3. You may copy and distribute the Program (or a work based on it,
|
A "Standard Interface" means an interface that either is an official
|
||||||
under Section 2) in object code or executable form under the terms of
|
standard defined by a recognized standards body, or, in the case of
|
||||||
Sections 1 and 2 above provided that you also do one of the following:
|
interfaces specified for a particular programming language, one that
|
||||||
|
is widely used among developers working in that language.
|
||||||
|
|
||||||
a) Accompany it with the complete corresponding machine-readable
|
The "System Libraries" of an executable work include anything, other
|
||||||
source code, which must be distributed under the terms of Sections
|
than the work as a whole, that (a) is included in the normal form of
|
||||||
1 and 2 above on a medium customarily used for software interchange; or,
|
packaging a Major Component, but which is not part of that Major
|
||||||
|
Component, and (b) serves only to enable use of the work with that
|
||||||
|
Major Component, or to implement a Standard Interface for which an
|
||||||
|
implementation is available to the public in source code form. A
|
||||||
|
"Major Component", in this context, means a major essential component
|
||||||
|
(kernel, window system, and so on) of the specific operating system
|
||||||
|
(if any) on which the executable work runs, or a compiler used to
|
||||||
|
produce the work, or an object code interpreter used to run it.
|
||||||
|
|
||||||
b) Accompany it with a written offer, valid for at least three
|
The "Corresponding Source" for a work in object code form means all
|
||||||
years, to give any third party, for a charge no more than your
|
the source code needed to generate, install, and (for an executable
|
||||||
cost of physically performing source distribution, a complete
|
work) run the object code and to modify the work, including scripts to
|
||||||
machine-readable copy of the corresponding source code, to be
|
control those activities. However, it does not include the work's
|
||||||
distributed under the terms of Sections 1 and 2 above on a medium
|
System Libraries, or general-purpose tools or generally available free
|
||||||
customarily used for software interchange; or,
|
programs which are used unmodified in performing those activities but
|
||||||
|
which are not part of the work. For example, Corresponding Source
|
||||||
|
includes interface definition files associated with source files for
|
||||||
|
the work, and the source code for shared libraries and dynamically
|
||||||
|
linked subprograms that the work is specifically designed to require,
|
||||||
|
such as by intimate data communication or control flow between those
|
||||||
|
subprograms and other parts of the work.
|
||||||
|
|
||||||
c) Accompany it with the information you received as to the offer
|
The Corresponding Source need not include anything that users
|
||||||
to distribute corresponding source code. (This alternative is
|
can regenerate automatically from other parts of the Corresponding
|
||||||
allowed only for noncommercial distribution and only if you
|
Source.
|
||||||
received the program in object code or executable form with such
|
|
||||||
an offer, in accord with Subsection b above.)
|
|
||||||
|
|
||||||
The source code for a work means the preferred form of the work for
|
The Corresponding Source for a work in source code form is that
|
||||||
making modifications to it. For an executable work, complete source
|
same work.
|
||||||
code means all the source code for all modules it contains, plus any
|
|
||||||
associated interface definition files, plus the scripts used to
|
|
||||||
control compilation and installation of the executable. However, as a
|
|
||||||
special exception, the source code distributed need not include
|
|
||||||
anything that is normally distributed (in either source or binary
|
|
||||||
form) with the major components (compiler, kernel, and so on) of the
|
|
||||||
operating system on which the executable runs, unless that component
|
|
||||||
itself accompanies the executable.
|
|
||||||
|
|
||||||
If distribution of executable or object code is made by offering
|
2. Basic Permissions.
|
||||||
access to copy from a designated place, then offering equivalent
|
|
||||||
access to copy the source code from the same place counts as
|
|
||||||
distribution of the source code, even though third parties are not
|
|
||||||
compelled to copy the source along with the object code.
|
|
||||||
|
|
||||||
4. You may not copy, modify, sublicense, or distribute the Program
|
All rights granted under this License are granted for the term of
|
||||||
except as expressly provided under this License. Any attempt
|
copyright on the Program, and are irrevocable provided the stated
|
||||||
otherwise to copy, modify, sublicense or distribute the Program is
|
conditions are met. This License explicitly affirms your unlimited
|
||||||
void, and will automatically terminate your rights under this License.
|
permission to run the unmodified Program. The output from running a
|
||||||
However, parties who have received copies, or rights, from you under
|
covered work is covered by this License only if the output, given its
|
||||||
this License will not have their licenses terminated so long as such
|
content, constitutes a covered work. This License acknowledges your
|
||||||
parties remain in full compliance.
|
rights of fair use or other equivalent, as provided by copyright law.
|
||||||
|
|
||||||
5. You are not required to accept this License, since you have not
|
You may make, run and propagate covered works that you do not
|
||||||
signed it. However, nothing else grants you permission to modify or
|
convey, without conditions so long as your license otherwise remains
|
||||||
distribute the Program or its derivative works. These actions are
|
in force. You may convey covered works to others for the sole purpose
|
||||||
prohibited by law if you do not accept this License. Therefore, by
|
of having them make modifications exclusively for you, or provide you
|
||||||
modifying or distributing the Program (or any work based on the
|
with facilities for running those works, provided that you comply with
|
||||||
Program), you indicate your acceptance of this License to do so, and
|
the terms of this License in conveying all material for which you do
|
||||||
all its terms and conditions for copying, distributing or modifying
|
not control copyright. Those thus making or running the covered works
|
||||||
the Program or works based on it.
|
for you must do so exclusively on your behalf, under your direction
|
||||||
|
and control, on terms that prohibit them from making any copies of
|
||||||
|
your copyrighted material outside their relationship with you.
|
||||||
|
|
||||||
6. Each time you redistribute the Program (or any work based on the
|
Conveying under any other circumstances is permitted solely under
|
||||||
Program), the recipient automatically receives a license from the
|
the conditions stated below. Sublicensing is not allowed; section 10
|
||||||
original licensor to copy, distribute or modify the Program subject to
|
makes it unnecessary.
|
||||||
these terms and conditions. You may not impose any further
|
|
||||||
restrictions on the recipients' exercise of the rights granted herein.
|
3. Protecting Users' Legal Rights From Anti-Circumvention Law.
|
||||||
You are not responsible for enforcing compliance by third parties to
|
|
||||||
|
No covered work shall be deemed part of an effective technological
|
||||||
|
measure under any applicable law fulfilling obligations under article
|
||||||
|
11 of the WIPO copyright treaty adopted on 20 December 1996, or
|
||||||
|
similar laws prohibiting or restricting circumvention of such
|
||||||
|
measures.
|
||||||
|
|
||||||
|
When you convey a covered work, you waive any legal power to forbid
|
||||||
|
circumvention of technological measures to the extent such circumvention
|
||||||
|
is effected by exercising rights under this License with respect to
|
||||||
|
the covered work, and you disclaim any intention to limit operation or
|
||||||
|
modification of the work as a means of enforcing, against the work's
|
||||||
|
users, your or third parties' legal rights to forbid circumvention of
|
||||||
|
technological measures.
|
||||||
|
|
||||||
|
4. Conveying Verbatim Copies.
|
||||||
|
|
||||||
|
You may convey verbatim copies of the Program's source code as you
|
||||||
|
receive it, in any medium, provided that you conspicuously and
|
||||||
|
appropriately publish on each copy an appropriate copyright notice;
|
||||||
|
keep intact all notices stating that this License and any
|
||||||
|
non-permissive terms added in accord with section 7 apply to the code;
|
||||||
|
keep intact all notices of the absence of any warranty; and give all
|
||||||
|
recipients a copy of this License along with the Program.
|
||||||
|
|
||||||
|
You may charge any price or no price for each copy that you convey,
|
||||||
|
and you may offer support or warranty protection for a fee.
|
||||||
|
|
||||||
|
5. Conveying Modified Source Versions.
|
||||||
|
|
||||||
|
You may convey a work based on the Program, or the modifications to
|
||||||
|
produce it from the Program, in the form of source code under the
|
||||||
|
terms of section 4, provided that you also meet all of these conditions:
|
||||||
|
|
||||||
|
a) The work must carry prominent notices stating that you modified
|
||||||
|
it, and giving a relevant date.
|
||||||
|
|
||||||
|
b) The work must carry prominent notices stating that it is
|
||||||
|
released under this License and any conditions added under section
|
||||||
|
7. This requirement modifies the requirement in section 4 to
|
||||||
|
"keep intact all notices".
|
||||||
|
|
||||||
|
c) You must license the entire work, as a whole, under this
|
||||||
|
License to anyone who comes into possession of a copy. This
|
||||||
|
License will therefore apply, along with any applicable section 7
|
||||||
|
additional terms, to the whole of the work, and all its parts,
|
||||||
|
regardless of how they are packaged. This License gives no
|
||||||
|
permission to license the work in any other way, but it does not
|
||||||
|
invalidate such permission if you have separately received it.
|
||||||
|
|
||||||
|
d) If the work has interactive user interfaces, each must display
|
||||||
|
Appropriate Legal Notices; however, if the Program has interactive
|
||||||
|
interfaces that do not display Appropriate Legal Notices, your
|
||||||
|
work need not make them do so.
|
||||||
|
|
||||||
|
A compilation of a covered work with other separate and independent
|
||||||
|
works, which are not by their nature extensions of the covered work,
|
||||||
|
and which are not combined with it such as to form a larger program,
|
||||||
|
in or on a volume of a storage or distribution medium, is called an
|
||||||
|
"aggregate" if the compilation and its resulting copyright are not
|
||||||
|
used to limit the access or legal rights of the compilation's users
|
||||||
|
beyond what the individual works permit. Inclusion of a covered work
|
||||||
|
in an aggregate does not cause this License to apply to the other
|
||||||
|
parts of the aggregate.
|
||||||
|
|
||||||
|
6. Conveying Non-Source Forms.
|
||||||
|
|
||||||
|
You may convey a covered work in object code form under the terms
|
||||||
|
of sections 4 and 5, provided that you also convey the
|
||||||
|
machine-readable Corresponding Source under the terms of this License,
|
||||||
|
in one of these ways:
|
||||||
|
|
||||||
|
a) Convey the object code in, or embodied in, a physical product
|
||||||
|
(including a physical distribution medium), accompanied by the
|
||||||
|
Corresponding Source fixed on a durable physical medium
|
||||||
|
customarily used for software interchange.
|
||||||
|
|
||||||
|
b) Convey the object code in, or embodied in, a physical product
|
||||||
|
(including a physical distribution medium), accompanied by a
|
||||||
|
written offer, valid for at least three years and valid for as
|
||||||
|
long as you offer spare parts or customer support for that product
|
||||||
|
model, to give anyone who possesses the object code either (1) a
|
||||||
|
copy of the Corresponding Source for all the software in the
|
||||||
|
product that is covered by this License, on a durable physical
|
||||||
|
medium customarily used for software interchange, for a price no
|
||||||
|
more than your reasonable cost of physically performing this
|
||||||
|
conveying of source, or (2) access to copy the
|
||||||
|
Corresponding Source from a network server at no charge.
|
||||||
|
|
||||||
|
c) Convey individual copies of the object code with a copy of the
|
||||||
|
written offer to provide the Corresponding Source. This
|
||||||
|
alternative is allowed only occasionally and noncommercially, and
|
||||||
|
only if you received the object code with such an offer, in accord
|
||||||
|
with subsection 6b.
|
||||||
|
|
||||||
|
d) Convey the object code by offering access from a designated
|
||||||
|
place (gratis or for a charge), and offer equivalent access to the
|
||||||
|
Corresponding Source in the same way through the same place at no
|
||||||
|
further charge. You need not require recipients to copy the
|
||||||
|
Corresponding Source along with the object code. If the place to
|
||||||
|
copy the object code is a network server, the Corresponding Source
|
||||||
|
may be on a different server (operated by you or a third party)
|
||||||
|
that supports equivalent copying facilities, provided you maintain
|
||||||
|
clear directions next to the object code saying where to find the
|
||||||
|
Corresponding Source. Regardless of what server hosts the
|
||||||
|
Corresponding Source, you remain obligated to ensure that it is
|
||||||
|
available for as long as needed to satisfy these requirements.
|
||||||
|
|
||||||
|
e) Convey the object code using peer-to-peer transmission, provided
|
||||||
|
you inform other peers where the object code and Corresponding
|
||||||
|
Source of the work are being offered to the general public at no
|
||||||
|
charge under subsection 6d.
|
||||||
|
|
||||||
|
A separable portion of the object code, whose source code is excluded
|
||||||
|
from the Corresponding Source as a System Library, need not be
|
||||||
|
included in conveying the object code work.
|
||||||
|
|
||||||
|
A "User Product" is either (1) a "consumer product", which means any
|
||||||
|
tangible personal property which is normally used for personal, family,
|
||||||
|
or household purposes, or (2) anything designed or sold for incorporation
|
||||||
|
into a dwelling. In determining whether a product is a consumer product,
|
||||||
|
doubtful cases shall be resolved in favor of coverage. For a particular
|
||||||
|
product received by a particular user, "normally used" refers to a
|
||||||
|
typical or common use of that class of product, regardless of the status
|
||||||
|
of the particular user or of the way in which the particular user
|
||||||
|
actually uses, or expects or is expected to use, the product. A product
|
||||||
|
is a consumer product regardless of whether the product has substantial
|
||||||
|
commercial, industrial or non-consumer uses, unless such uses represent
|
||||||
|
the only significant mode of use of the product.
|
||||||
|
|
||||||
|
"Installation Information" for a User Product means any methods,
|
||||||
|
procedures, authorization keys, or other information required to install
|
||||||
|
and execute modified versions of a covered work in that User Product from
|
||||||
|
a modified version of its Corresponding Source. The information must
|
||||||
|
suffice to ensure that the continued functioning of the modified object
|
||||||
|
code is in no case prevented or interfered with solely because
|
||||||
|
modification has been made.
|
||||||
|
|
||||||
|
If you convey an object code work under this section in, or with, or
|
||||||
|
specifically for use in, a User Product, and the conveying occurs as
|
||||||
|
part of a transaction in which the right of possession and use of the
|
||||||
|
User Product is transferred to the recipient in perpetuity or for a
|
||||||
|
fixed term (regardless of how the transaction is characterized), the
|
||||||
|
Corresponding Source conveyed under this section must be accompanied
|
||||||
|
by the Installation Information. But this requirement does not apply
|
||||||
|
if neither you nor any third party retains the ability to install
|
||||||
|
modified object code on the User Product (for example, the work has
|
||||||
|
been installed in ROM).
|
||||||
|
|
||||||
|
The requirement to provide Installation Information does not include a
|
||||||
|
requirement to continue to provide support service, warranty, or updates
|
||||||
|
for a work that has been modified or installed by the recipient, or for
|
||||||
|
the User Product in which it has been modified or installed. Access to a
|
||||||
|
network may be denied when the modification itself materially and
|
||||||
|
adversely affects the operation of the network or violates the rules and
|
||||||
|
protocols for communication across the network.
|
||||||
|
|
||||||
|
Corresponding Source conveyed, and Installation Information provided,
|
||||||
|
in accord with this section must be in a format that is publicly
|
||||||
|
documented (and with an implementation available to the public in
|
||||||
|
source code form), and must require no special password or key for
|
||||||
|
unpacking, reading or copying.
|
||||||
|
|
||||||
|
7. Additional Terms.
|
||||||
|
|
||||||
|
"Additional permissions" are terms that supplement the terms of this
|
||||||
|
License by making exceptions from one or more of its conditions.
|
||||||
|
Additional permissions that are applicable to the entire Program shall
|
||||||
|
be treated as though they were included in this License, to the extent
|
||||||
|
that they are valid under applicable law. If additional permissions
|
||||||
|
apply only to part of the Program, that part may be used separately
|
||||||
|
under those permissions, but the entire Program remains governed by
|
||||||
|
this License without regard to the additional permissions.
|
||||||
|
|
||||||
|
When you convey a copy of a covered work, you may at your option
|
||||||
|
remove any additional permissions from that copy, or from any part of
|
||||||
|
it. (Additional permissions may be written to require their own
|
||||||
|
removal in certain cases when you modify the work.) You may place
|
||||||
|
additional permissions on material, added by you to a covered work,
|
||||||
|
for which you have or can give appropriate copyright permission.
|
||||||
|
|
||||||
|
Notwithstanding any other provision of this License, for material you
|
||||||
|
add to a covered work, you may (if authorized by the copyright holders of
|
||||||
|
that material) supplement the terms of this License with terms:
|
||||||
|
|
||||||
|
a) Disclaiming warranty or limiting liability differently from the
|
||||||
|
terms of sections 15 and 16 of this License; or
|
||||||
|
|
||||||
|
b) Requiring preservation of specified reasonable legal notices or
|
||||||
|
author attributions in that material or in the Appropriate Legal
|
||||||
|
Notices displayed by works containing it; or
|
||||||
|
|
||||||
|
c) Prohibiting misrepresentation of the origin of that material, or
|
||||||
|
requiring that modified versions of such material be marked in
|
||||||
|
reasonable ways as different from the original version; or
|
||||||
|
|
||||||
|
d) Limiting the use for publicity purposes of names of licensors or
|
||||||
|
authors of the material; or
|
||||||
|
|
||||||
|
e) Declining to grant rights under trademark law for use of some
|
||||||
|
trade names, trademarks, or service marks; or
|
||||||
|
|
||||||
|
f) Requiring indemnification of licensors and authors of that
|
||||||
|
material by anyone who conveys the material (or modified versions of
|
||||||
|
it) with contractual assumptions of liability to the recipient, for
|
||||||
|
any liability that these contractual assumptions directly impose on
|
||||||
|
those licensors and authors.
|
||||||
|
|
||||||
|
All other non-permissive additional terms are considered "further
|
||||||
|
restrictions" within the meaning of section 10. If the Program as you
|
||||||
|
received it, or any part of it, contains a notice stating that it is
|
||||||
|
governed by this License along with a term that is a further
|
||||||
|
restriction, you may remove that term. If a license document contains
|
||||||
|
a further restriction but permits relicensing or conveying under this
|
||||||
|
License, you may add to a covered work material governed by the terms
|
||||||
|
of that license document, provided that the further restriction does
|
||||||
|
not survive such relicensing or conveying.
|
||||||
|
|
||||||
|
If you add terms to a covered work in accord with this section, you
|
||||||
|
must place, in the relevant source files, a statement of the
|
||||||
|
additional terms that apply to those files, or a notice indicating
|
||||||
|
where to find the applicable terms.
|
||||||
|
|
||||||
|
Additional terms, permissive or non-permissive, may be stated in the
|
||||||
|
form of a separately written license, or stated as exceptions;
|
||||||
|
the above requirements apply either way.
|
||||||
|
|
||||||
|
8. Termination.
|
||||||
|
|
||||||
|
You may not propagate or modify a covered work except as expressly
|
||||||
|
provided under this License. Any attempt otherwise to propagate or
|
||||||
|
modify it is void, and will automatically terminate your rights under
|
||||||
|
this License (including any patent licenses granted under the third
|
||||||
|
paragraph of section 11).
|
||||||
|
|
||||||
|
However, if you cease all violation of this License, then your
|
||||||
|
license from a particular copyright holder is reinstated (a)
|
||||||
|
provisionally, unless and until the copyright holder explicitly and
|
||||||
|
finally terminates your license, and (b) permanently, if the copyright
|
||||||
|
holder fails to notify you of the violation by some reasonable means
|
||||||
|
prior to 60 days after the cessation.
|
||||||
|
|
||||||
|
Moreover, your license from a particular copyright holder is
|
||||||
|
reinstated permanently if the copyright holder notifies you of the
|
||||||
|
violation by some reasonable means, this is the first time you have
|
||||||
|
received notice of violation of this License (for any work) from that
|
||||||
|
copyright holder, and you cure the violation prior to 30 days after
|
||||||
|
your receipt of the notice.
|
||||||
|
|
||||||
|
Termination of your rights under this section does not terminate the
|
||||||
|
licenses of parties who have received copies or rights from you under
|
||||||
|
this License. If your rights have been terminated and not permanently
|
||||||
|
reinstated, you do not qualify to receive new licenses for the same
|
||||||
|
material under section 10.
|
||||||
|
|
||||||
|
9. Acceptance Not Required for Having Copies.
|
||||||
|
|
||||||
|
You are not required to accept this License in order to receive or
|
||||||
|
run a copy of the Program. Ancillary propagation of a covered work
|
||||||
|
occurring solely as a consequence of using peer-to-peer transmission
|
||||||
|
to receive a copy likewise does not require acceptance. However,
|
||||||
|
nothing other than this License grants you permission to propagate or
|
||||||
|
modify any covered work. These actions infringe copyright if you do
|
||||||
|
not accept this License. Therefore, by modifying or propagating a
|
||||||
|
covered work, you indicate your acceptance of this License to do so.
|
||||||
|
|
||||||
|
10. Automatic Licensing of Downstream Recipients.
|
||||||
|
|
||||||
|
Each time you convey a covered work, the recipient automatically
|
||||||
|
receives a license from the original licensors, to run, modify and
|
||||||
|
propagate that work, subject to this License. You are not responsible
|
||||||
|
for enforcing compliance by third parties with this License.
|
||||||
|
|
||||||
|
An "entity transaction" is a transaction transferring control of an
|
||||||
|
organization, or substantially all assets of one, or subdividing an
|
||||||
|
organization, or merging organizations. If propagation of a covered
|
||||||
|
work results from an entity transaction, each party to that
|
||||||
|
transaction who receives a copy of the work also receives whatever
|
||||||
|
licenses to the work the party's predecessor in interest had or could
|
||||||
|
give under the previous paragraph, plus a right to possession of the
|
||||||
|
Corresponding Source of the work from the predecessor in interest, if
|
||||||
|
the predecessor has it or can get it with reasonable efforts.
|
||||||
|
|
||||||
|
You may not impose any further restrictions on the exercise of the
|
||||||
|
rights granted or affirmed under this License. For example, you may
|
||||||
|
not impose a license fee, royalty, or other charge for exercise of
|
||||||
|
rights granted under this License, and you may not initiate litigation
|
||||||
|
(including a cross-claim or counterclaim in a lawsuit) alleging that
|
||||||
|
any patent claim is infringed by making, using, selling, offering for
|
||||||
|
sale, or importing the Program or any portion of it.
|
||||||
|
|
||||||
|
11. Patents.
|
||||||
|
|
||||||
|
A "contributor" is a copyright holder who authorizes use under this
|
||||||
|
License of the Program or a work on which the Program is based. The
|
||||||
|
work thus licensed is called the contributor's "contributor version".
|
||||||
|
|
||||||
|
A contributor's "essential patent claims" are all patent claims
|
||||||
|
owned or controlled by the contributor, whether already acquired or
|
||||||
|
hereafter acquired, that would be infringed by some manner, permitted
|
||||||
|
by this License, of making, using, or selling its contributor version,
|
||||||
|
but do not include claims that would be infringed only as a
|
||||||
|
consequence of further modification of the contributor version. For
|
||||||
|
purposes of this definition, "control" includes the right to grant
|
||||||
|
patent sublicenses in a manner consistent with the requirements of
|
||||||
this License.
|
this License.
|
||||||
|
|
||||||
7. If, as a consequence of a court judgment or allegation of patent
|
Each contributor grants you a non-exclusive, worldwide, royalty-free
|
||||||
infringement or for any other reason (not limited to patent issues),
|
patent license under the contributor's essential patent claims, to
|
||||||
conditions are imposed on you (whether by court order, agreement or
|
make, use, sell, offer for sale, import and otherwise run, modify and
|
||||||
|
propagate the contents of its contributor version.
|
||||||
|
|
||||||
|
In the following three paragraphs, a "patent license" is any express
|
||||||
|
agreement or commitment, however denominated, not to enforce a patent
|
||||||
|
(such as an express permission to practice a patent or covenant not to
|
||||||
|
sue for patent infringement). To "grant" such a patent license to a
|
||||||
|
party means to make such an agreement or commitment not to enforce a
|
||||||
|
patent against the party.
|
||||||
|
|
||||||
|
If you convey a covered work, knowingly relying on a patent license,
|
||||||
|
and the Corresponding Source of the work is not available for anyone
|
||||||
|
to copy, free of charge and under the terms of this License, through a
|
||||||
|
publicly available network server or other readily accessible means,
|
||||||
|
then you must either (1) cause the Corresponding Source to be so
|
||||||
|
available, or (2) arrange to deprive yourself of the benefit of the
|
||||||
|
patent license for this particular work, or (3) arrange, in a manner
|
||||||
|
consistent with the requirements of this License, to extend the patent
|
||||||
|
license to downstream recipients. "Knowingly relying" means you have
|
||||||
|
actual knowledge that, but for the patent license, your conveying the
|
||||||
|
covered work in a country, or your recipient's use of the covered work
|
||||||
|
in a country, would infringe one or more identifiable patents in that
|
||||||
|
country that you have reason to believe are valid.
|
||||||
|
|
||||||
|
If, pursuant to or in connection with a single transaction or
|
||||||
|
arrangement, you convey, or propagate by procuring conveyance of, a
|
||||||
|
covered work, and grant a patent license to some of the parties
|
||||||
|
receiving the covered work authorizing them to use, propagate, modify
|
||||||
|
or convey a specific copy of the covered work, then the patent license
|
||||||
|
you grant is automatically extended to all recipients of the covered
|
||||||
|
work and works based on it.
|
||||||
|
|
||||||
|
A patent license is "discriminatory" if it does not include within
|
||||||
|
the scope of its coverage, prohibits the exercise of, or is
|
||||||
|
conditioned on the non-exercise of one or more of the rights that are
|
||||||
|
specifically granted under this License. You may not convey a covered
|
||||||
|
work if you are a party to an arrangement with a third party that is
|
||||||
|
in the business of distributing software, under which you make payment
|
||||||
|
to the third party based on the extent of your activity of conveying
|
||||||
|
the work, and under which the third party grants, to any of the
|
||||||
|
parties who would receive the covered work from you, a discriminatory
|
||||||
|
patent license (a) in connection with copies of the covered work
|
||||||
|
conveyed by you (or copies made from those copies), or (b) primarily
|
||||||
|
for and in connection with specific products or compilations that
|
||||||
|
contain the covered work, unless you entered into that arrangement,
|
||||||
|
or that patent license was granted, prior to 28 March 2007.
|
||||||
|
|
||||||
|
Nothing in this License shall be construed as excluding or limiting
|
||||||
|
any implied license or other defenses to infringement that may
|
||||||
|
otherwise be available to you under applicable patent law.
|
||||||
|
|
||||||
|
12. No Surrender of Others' Freedom.
|
||||||
|
|
||||||
|
If conditions are imposed on you (whether by court order, agreement or
|
||||||
otherwise) that contradict the conditions of this License, they do not
|
otherwise) that contradict the conditions of this License, they do not
|
||||||
excuse you from the conditions of this License. If you cannot
|
excuse you from the conditions of this License. If you cannot convey a
|
||||||
distribute so as to satisfy simultaneously your obligations under this
|
covered work so as to satisfy simultaneously your obligations under this
|
||||||
License and any other pertinent obligations, then as a consequence you
|
License and any other pertinent obligations, then as a consequence you may
|
||||||
may not distribute the Program at all. For example, if a patent
|
not convey it at all. For example, if you agree to terms that obligate you
|
||||||
license would not permit royalty-free redistribution of the Program by
|
to collect a royalty for further conveying from those to whom you convey
|
||||||
all those who receive copies directly or indirectly through you, then
|
the Program, the only way you could satisfy both those terms and this
|
||||||
the only way you could satisfy both it and this License would be to
|
License would be to refrain entirely from conveying the Program.
|
||||||
refrain entirely from distribution of the Program.
|
|
||||||
|
|
||||||
If any portion of this section is held invalid or unenforceable under
|
13. Use with the GNU Affero General Public License.
|
||||||
any particular circumstance, the balance of the section is intended to
|
|
||||||
apply and the section as a whole is intended to apply in other
|
|
||||||
circumstances.
|
|
||||||
|
|
||||||
It is not the purpose of this section to induce you to infringe any
|
Notwithstanding any other provision of this License, you have
|
||||||
patents or other property right claims or to contest validity of any
|
permission to link or combine any covered work with a work licensed
|
||||||
such claims; this section has the sole purpose of protecting the
|
under version 3 of the GNU Affero General Public License into a single
|
||||||
integrity of the free software distribution system, which is
|
combined work, and to convey the resulting work. The terms of this
|
||||||
implemented by public license practices. Many people have made
|
License will continue to apply to the part which is the covered work,
|
||||||
generous contributions to the wide range of software distributed
|
but the special requirements of the GNU Affero General Public License,
|
||||||
through that system in reliance on consistent application of that
|
section 13, concerning interaction through a network will apply to the
|
||||||
system; it is up to the author/donor to decide if he or she is willing
|
combination as such.
|
||||||
to distribute software through any other system and a licensee cannot
|
|
||||||
impose that choice.
|
|
||||||
|
|
||||||
This section is intended to make thoroughly clear what is believed to
|
14. Revised Versions of this License.
|
||||||
be a consequence of the rest of this License.
|
|
||||||
|
|
||||||
8. If the distribution and/or use of the Program is restricted in
|
The Free Software Foundation may publish revised and/or new versions of
|
||||||
certain countries either by patents or by copyrighted interfaces, the
|
the GNU General Public License from time to time. Such new versions will
|
||||||
original copyright holder who places the Program under this License
|
|
||||||
may add an explicit geographical distribution limitation excluding
|
|
||||||
those countries, so that distribution is permitted only in or among
|
|
||||||
countries not thus excluded. In such case, this License incorporates
|
|
||||||
the limitation as if written in the body of this License.
|
|
||||||
|
|
||||||
9. The Free Software Foundation may publish revised and/or new versions
|
|
||||||
of the General Public License from time to time. Such new versions will
|
|
||||||
be similar in spirit to the present version, but may differ in detail to
|
be similar in spirit to the present version, but may differ in detail to
|
||||||
address new problems or concerns.
|
address new problems or concerns.
|
||||||
|
|
||||||
Each version is given a distinguishing version number. If the Program
|
Each version is given a distinguishing version number. If the
|
||||||
specifies a version number of this License which applies to it and "any
|
Program specifies that a certain numbered version of the GNU General
|
||||||
later version", you have the option of following the terms and conditions
|
Public License "or any later version" applies to it, you have the
|
||||||
either of that version or of any later version published by the Free
|
option of following the terms and conditions either of that numbered
|
||||||
Software Foundation. If the Program does not specify a version number of
|
version or of any later version published by the Free Software
|
||||||
this License, you may choose any version ever published by the Free Software
|
Foundation. If the Program does not specify a version number of the
|
||||||
Foundation.
|
GNU General Public License, you may choose any version ever published
|
||||||
|
by the Free Software Foundation.
|
||||||
|
|
||||||
10. If you wish to incorporate parts of the Program into other free
|
If the Program specifies that a proxy can decide which future
|
||||||
programs whose distribution conditions are different, write to the author
|
versions of the GNU General Public License can be used, that proxy's
|
||||||
to ask for permission. For software which is copyrighted by the Free
|
public statement of acceptance of a version permanently authorizes you
|
||||||
Software Foundation, write to the Free Software Foundation; we sometimes
|
to choose that version for the Program.
|
||||||
make exceptions for this. Our decision will be guided by the two goals
|
|
||||||
of preserving the free status of all derivatives of our free software and
|
|
||||||
of promoting the sharing and reuse of software generally.
|
|
||||||
|
|
||||||
NO WARRANTY
|
Later license versions may give you additional or different
|
||||||
|
permissions. However, no additional obligations are imposed on any
|
||||||
|
author or copyright holder as a result of your choosing to follow a
|
||||||
|
later version.
|
||||||
|
|
||||||
11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY
|
15. Disclaimer of Warranty.
|
||||||
FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN
|
|
||||||
OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES
|
|
||||||
PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED
|
|
||||||
OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
|
|
||||||
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS
|
|
||||||
TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE
|
|
||||||
PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING,
|
|
||||||
REPAIR OR CORRECTION.
|
|
||||||
|
|
||||||
12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
|
THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY
|
||||||
WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR
|
APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT
|
||||||
REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES,
|
HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY
|
||||||
INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING
|
OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO,
|
||||||
OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED
|
THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
||||||
TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY
|
PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM
|
||||||
YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER
|
IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF
|
||||||
PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE
|
ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
|
||||||
POSSIBILITY OF SUCH DAMAGES.
|
|
||||||
|
16. Limitation of Liability.
|
||||||
|
|
||||||
|
IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
|
||||||
|
WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS
|
||||||
|
THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY
|
||||||
|
GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE
|
||||||
|
USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF
|
||||||
|
DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD
|
||||||
|
PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS),
|
||||||
|
EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF
|
||||||
|
SUCH DAMAGES.
|
||||||
|
|
||||||
|
17. Interpretation of Sections 15 and 16.
|
||||||
|
|
||||||
|
If the disclaimer of warranty and limitation of liability provided
|
||||||
|
above cannot be given local legal effect according to their terms,
|
||||||
|
reviewing courts shall apply local law that most closely approximates
|
||||||
|
an absolute waiver of all civil liability in connection with the
|
||||||
|
Program, unless a warranty or assumption of liability accompanies a
|
||||||
|
copy of the Program in return for a fee.
|
||||||
|
|
||||||
END OF TERMS AND CONDITIONS
|
END OF TERMS AND CONDITIONS
|
||||||
|
|
||||||
|
@ -287,15 +628,15 @@ free software which everyone can redistribute and change under these terms.
|
||||||
|
|
||||||
To do so, attach the following notices to the program. It is safest
|
To do so, attach the following notices to the program. It is safest
|
||||||
to attach them to the start of each source file to most effectively
|
to attach them to the start of each source file to most effectively
|
||||||
convey the exclusion of warranty; and each file should have at least
|
state the exclusion of warranty; and each file should have at least
|
||||||
the "copyright" line and a pointer to where the full notice is found.
|
the "copyright" line and a pointer to where the full notice is found.
|
||||||
|
|
||||||
<one line to give the program's name and a brief idea of what it does.>
|
{one line to give the program's name and a brief idea of what it does.}
|
||||||
Copyright (C) <year> <name of author>
|
Copyright (C) {year} {name of author}
|
||||||
|
|
||||||
This program is free software; you can redistribute it and/or modify
|
This program is free software: you can redistribute it and/or modify
|
||||||
it under the terms of the GNU General Public License as published by
|
it under the terms of the GNU General Public License as published by
|
||||||
the Free Software Foundation; either version 2 of the License, or
|
the Free Software Foundation, either version 3 of the License, or
|
||||||
(at your option) any later version.
|
(at your option) any later version.
|
||||||
|
|
||||||
This program is distributed in the hope that it will be useful,
|
This program is distributed in the hope that it will be useful,
|
||||||
|
@ -303,37 +644,32 @@ the "copyright" line and a pointer to where the full notice is found.
|
||||||
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||||
GNU General Public License for more details.
|
GNU General Public License for more details.
|
||||||
|
|
||||||
You should have received a copy of the GNU General Public License along
|
You should have received a copy of the GNU General Public License
|
||||||
with this program; if not, write to the Free Software Foundation, Inc.,
|
along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||||
51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
|
|
||||||
|
|
||||||
Also add information on how to contact you by electronic and paper mail.
|
Also add information on how to contact you by electronic and paper mail.
|
||||||
|
|
||||||
If the program is interactive, make it output a short notice like this
|
If the program does terminal interaction, make it output a short
|
||||||
when it starts in an interactive mode:
|
notice like this when it starts in an interactive mode:
|
||||||
|
|
||||||
Gnomovision version 69, Copyright (C) year name of author
|
{project} Copyright (C) {year} {fullname}
|
||||||
Gnomovision comes with ABSOLUTELY NO WARRANTY; for details type `show w'.
|
This program comes with ABSOLUTELY NO WARRANTY; for details type `show w'.
|
||||||
This is free software, and you are welcome to redistribute it
|
This is free software, and you are welcome to redistribute it
|
||||||
under certain conditions; type `show c' for details.
|
under certain conditions; type `show c' for details.
|
||||||
|
|
||||||
The hypothetical commands `show w' and `show c' should show the appropriate
|
The hypothetical commands `show w' and `show c' should show the appropriate
|
||||||
parts of the General Public License. Of course, the commands you use may
|
parts of the General Public License. Of course, your program's commands
|
||||||
be called something other than `show w' and `show c'; they could even be
|
might be different; for a GUI interface, you would use an "about box".
|
||||||
mouse-clicks or menu items--whatever suits your program.
|
|
||||||
|
|
||||||
You should also get your employer (if you work as a programmer) or your
|
You should also get your employer (if you work as a programmer) or school,
|
||||||
school, if any, to sign a "copyright disclaimer" for the program, if
|
if any, to sign a "copyright disclaimer" for the program, if necessary.
|
||||||
necessary. Here is a sample; alter the names:
|
For more information on this, and how to apply and follow the GNU GPL, see
|
||||||
|
<http://www.gnu.org/licenses/>.
|
||||||
|
|
||||||
Yoyodyne, Inc., hereby disclaims all copyright interest in the program
|
The GNU General Public License does not permit incorporating your program
|
||||||
`Gnomovision' (which makes passes at compilers) written by James Hacker.
|
into proprietary programs. If your program is a subroutine library, you
|
||||||
|
may consider it more useful to permit linking proprietary applications with
|
||||||
|
the library. If this is what you want to do, use the GNU Lesser General
|
||||||
|
Public License instead of this License. But first, please read
|
||||||
|
<http://www.gnu.org/philosophy/why-not-lgpl.html>.
|
||||||
|
|
||||||
<signature of Ty Coon>, 1 April 1989
|
|
||||||
Ty Coon, President of Vice
|
|
||||||
|
|
||||||
This General Public License does not permit incorporating your program into
|
|
||||||
proprietary programs. If your program is a subroutine library, you may
|
|
||||||
consider it more useful to permit linking proprietary applications with the
|
|
||||||
library. If this is what you want to do, use the GNU Lesser General
|
|
||||||
Public License instead of this License.
|
|
||||||
|
|
|
@ -0,0 +1,659 @@
|
||||||
|
{PICCore
|
||||||
|
|
||||||
|
Contains basic definitions applicable to all PIC microcontroller Cores
|
||||||
|
Created by Tito Hinostroza 28/04/2018
|
||||||
|
}
|
||||||
|
unit PicCore;
|
||||||
|
{$mode objfpc}{$H+}
|
||||||
|
interface
|
||||||
|
uses
|
||||||
|
Classes, SysUtils, LCLProc;
|
||||||
|
const
|
||||||
|
PIC_MAX_PINES = 64; //Max. number of pines for the package
|
||||||
|
type
|
||||||
|
//Union to access bytes of a word
|
||||||
|
TWordRec = record
|
||||||
|
case byte of
|
||||||
|
1 : (W : Word);
|
||||||
|
{$IFDEF ENDIAN_LITTLE}
|
||||||
|
2 : (L, H: Byte);
|
||||||
|
{$ELSE}
|
||||||
|
2 : (H, L: Byte);
|
||||||
|
{$ENDIF}
|
||||||
|
end;
|
||||||
|
|
||||||
|
TPICCellState = (
|
||||||
|
cs_impleGPR, //Implemented. Can be used.
|
||||||
|
cs_unimplem //Not implemented.
|
||||||
|
);
|
||||||
|
|
||||||
|
TPICPinType = (
|
||||||
|
pptVcc, //Alimentación
|
||||||
|
pptGND, //Tierra
|
||||||
|
pptControl,//Pin de control
|
||||||
|
pptPort, //Puerto Entrada/Salida
|
||||||
|
pptUnused //Pin no usado
|
||||||
|
);
|
||||||
|
|
||||||
|
{ TPICPin }
|
||||||
|
//Model for a phisycal pin of the PIC
|
||||||
|
TPICPin = object
|
||||||
|
nam: string; //Eqtiueta o nombre
|
||||||
|
typ: TPICPinType; //Tipo de pin
|
||||||
|
add: word; //Dirección en RAM
|
||||||
|
bit: byte; //Bit en RAM
|
||||||
|
function GetLabel: string;
|
||||||
|
end;
|
||||||
|
TPICPinPtr = ^TPICPin;
|
||||||
|
|
||||||
|
type //Models for RAM memory
|
||||||
|
|
||||||
|
{ TPICRamCell }
|
||||||
|
{Modela a una dirección lógica de la memoria RAM. Se ha taratdo de hacer una
|
||||||
|
definición eficiente de esta estructura para facilitar la implementación de
|
||||||
|
simuladores en tiempo real. Podemos usar un tamaño mediano para este registro,
|
||||||
|
porque no esperamos tener muchas celdas de RAM (<1K).}
|
||||||
|
TPICRamCellPtr = ^TPICRamCell;
|
||||||
|
TPICRamCell = object
|
||||||
|
private
|
||||||
|
Fvalue : byte; //value of the memory
|
||||||
|
function Getvalue: byte;
|
||||||
|
procedure Setvalue(AValue: byte);
|
||||||
|
public
|
||||||
|
addr : word; //dirección física de memoria, en donde está la celda.
|
||||||
|
name : string; //Name of the register (or variable)
|
||||||
|
used : boolean; //Indicates if have been written
|
||||||
|
shared : boolean; //Used to share this register
|
||||||
|
state : TPICCellState; //Status of the cell
|
||||||
|
property value: byte read Getvalue write Setvalue;
|
||||||
|
property dvalue: byte read Fvalue write Fvalue; //Direct access to "Fvalue".
|
||||||
|
function AvailGPR: boolean;
|
||||||
|
public //Campos para deputación
|
||||||
|
breakPnt : boolean; //Indicates if this cell have a Breakpoint
|
||||||
|
{Be careful on the size of this record, because it's going to be multiplied by 64K}
|
||||||
|
public //Information of position in source code. Used for debug
|
||||||
|
rowSrc : word; //Row number
|
||||||
|
colSrc : word; //Column number
|
||||||
|
idFile : SmallInt; //Index to a file. No load the name to save space.
|
||||||
|
{Estos campos de cadena ocupan bastante espacio, aún cuado están en NULL. Si se
|
||||||
|
quisiera optimizar el uso de RAM, se podría pensar en codificar, varios campos en
|
||||||
|
una sola cadena.}
|
||||||
|
topLabel : string; //Label on the top of the cell.
|
||||||
|
topComment : string; //Comment on the top of the cell.
|
||||||
|
sideComment: string; //Right comment to code
|
||||||
|
end;
|
||||||
|
|
||||||
|
TPICRam = array of TPICRamCell;
|
||||||
|
TPICRamPtr = ^TPICRam;
|
||||||
|
TPICRutExplorRAM = procedure(offs, bnk: byte; regPtr: TPICRamCellPtr) of object;
|
||||||
|
|
||||||
|
type //Models for Flash memory
|
||||||
|
TPICFlashCell = record
|
||||||
|
value : word; //Value of the memory (OpCode)
|
||||||
|
end;
|
||||||
|
|
||||||
|
type
|
||||||
|
|
||||||
|
{ TPicCore }
|
||||||
|
{Abcestor of all 8 bits PIC cores}
|
||||||
|
TPicCore = class
|
||||||
|
private
|
||||||
|
FMaxFlash: integer;
|
||||||
|
procedure SetMaxFlash(AValue: integer);
|
||||||
|
public //Limits
|
||||||
|
{This variables are set just one time. So they work as constant.}
|
||||||
|
PICBANKSIZE : word;
|
||||||
|
PICMAXRAM : word;
|
||||||
|
PICPAGESIZE : word;
|
||||||
|
PICMAXFLASH : word;
|
||||||
|
public //General fields
|
||||||
|
Model : string; //modelo de PIC
|
||||||
|
frequen : integer; //frecuencia del reloj
|
||||||
|
MaxFreq : integer; //máxima frecuencia del reloj
|
||||||
|
//Propiedades que definen la arquitectura del PIC destino.
|
||||||
|
NumBanks: byte; //Número de bancos de RAM.
|
||||||
|
NumPages: byte; //Número de páginas de memoria Flash.
|
||||||
|
MsjError: string;
|
||||||
|
{Maximun numbers of Flash cells implemented (Generally used when the first Flash
|
||||||
|
page is partially implemented). Applicable only when it's greater than zero}
|
||||||
|
property MaxFlash: integer read FMaxFlash write SetMaxFlash;
|
||||||
|
public //Execution control
|
||||||
|
nClck : Int64; //Contador de ciclos de reloj
|
||||||
|
CommStop: boolean; //Bandera para detener la ejecución
|
||||||
|
OnExecutionMsg: procedure(message: string) of object; //Genera mensaje en ejecución
|
||||||
|
protected //Generation of HEX files
|
||||||
|
minUsed : word; //Dirección menor de la ROM usada
|
||||||
|
maxUsed : word; //Dirección mayor de la ROM usdas
|
||||||
|
hexLines : TStringList; //Uusado para crear archivo *.hex
|
||||||
|
function HexChecksum(const lin: string): string;
|
||||||
|
procedure GenHexComm(comment: string);
|
||||||
|
procedure GenHexExAdd(Data: word);
|
||||||
|
procedure GenHexData(Address: word; Data: string);
|
||||||
|
procedure GenHexEOF;
|
||||||
|
function StrHexFlash(i1, i2: integer): string;
|
||||||
|
public //Memories
|
||||||
|
ram : TPICRam; //memoria RAM
|
||||||
|
iRam : integer; //puntero a la memoria RAM, para escribir cuando se ensambla o compila código.
|
||||||
|
function DisassemblerAt(addr: word; out nBytesProc: byte; useVarName: boolean
|
||||||
|
): string; virtual; abstract; //Desensambla la instrucción actual
|
||||||
|
public //RAM memory functions
|
||||||
|
procedure ClearMemRAM;
|
||||||
|
procedure DisableAllRAM;
|
||||||
|
procedure SetStatRAM(i1, i2: word; status0: TPICCellState);
|
||||||
|
function SetStatRAMCom(strDef: string): boolean;
|
||||||
|
function MapRAMtoPIN(strDef: string): boolean;
|
||||||
|
function HaveConsecRAM(const i, n: word; maxRam: word): boolean; //Indica si hay "n" bytes libres
|
||||||
|
procedure UseConsecRAM(const i, n: word); //Ocupa "n" bytes en la posición "i"
|
||||||
|
procedure SetSharedUnused;
|
||||||
|
procedure SetSharedUsed;
|
||||||
|
public //ram memory functions
|
||||||
|
function UsedMemRAM: word; //devuelve el total de memoria ram usada
|
||||||
|
procedure ClearMemFlash;
|
||||||
|
public //Pins fields
|
||||||
|
Npins : byte; //Number of pins
|
||||||
|
pines : array[1..PIC_MAX_PINES] of TPICPin;
|
||||||
|
procedure ResetPins;
|
||||||
|
procedure SetPin(pNumber: integer; pLabel: string; pType: TPICPinType);
|
||||||
|
function SetPinName(strDef: string): boolean;
|
||||||
|
public //RAM name managment
|
||||||
|
function NameRAM(const addr: word): string;
|
||||||
|
procedure SetNameRAM(const addr: word; const nam: string); //Fija nombre a una celda de RAM
|
||||||
|
procedure AddNameRAM(const addr: word; const nam: string); //Agrega nombre a una celda de RAM
|
||||||
|
public //Execution control
|
||||||
|
procedure AddBreakpoint(aPC: word);
|
||||||
|
procedure ToggleBreakpoint(aPC: word);
|
||||||
|
procedure Exec(aPC: word); virtual; abstract; //Ejecuta la instrucción en la dirección indicada.
|
||||||
|
procedure Exec; virtual; abstract; //Ejecuta instrucción actual
|
||||||
|
procedure ExecTo(endAdd: word); virtual; abstract; //Ejecuta hasta cierta dirección
|
||||||
|
procedure ExecStep; virtual; abstract; //Execute one instruction considering CALL as one instruction
|
||||||
|
procedure ExecNCycles(nCyc: integer; out stopped: boolean); virtual; abstract; //Ejecuta hasta cierta dirección
|
||||||
|
procedure Reset; virtual; abstract;
|
||||||
|
function ReadPC: dword; virtual; abstract; //Defined DWORD to cover the 18F PC register
|
||||||
|
procedure WritePC(AValue: dword); virtual; abstract;
|
||||||
|
public //Others
|
||||||
|
procedure addTopLabel(lbl: string); //Add a comment to the ASM code
|
||||||
|
procedure addTopComm(comm: string; replace: boolean = true); //Add a comment to the ASM code
|
||||||
|
procedure addSideComm(comm: string; before: boolean); //Add lateral comment to the ASM code
|
||||||
|
procedure addPosInformation(rowSrc, colSrc: word; idFile: byte);
|
||||||
|
public //Initialization
|
||||||
|
constructor Create; virtual;
|
||||||
|
destructor Destroy; override;
|
||||||
|
end;
|
||||||
|
|
||||||
|
implementation
|
||||||
|
|
||||||
|
{ TPICRamCell }
|
||||||
|
function TPICRamCell.Getvalue: byte;
|
||||||
|
begin
|
||||||
|
Result := Fvalue;
|
||||||
|
end;
|
||||||
|
procedure TPICRamCell.Setvalue(AValue: byte);
|
||||||
|
begin
|
||||||
|
Fvalue := AValue;
|
||||||
|
end;
|
||||||
|
function TPICRamCell.AvailGPR: boolean;
|
||||||
|
{Indica si el registro es una dirección disponible en la memoria RAM.}
|
||||||
|
begin
|
||||||
|
Result := (state = cs_impleGPR);
|
||||||
|
end;
|
||||||
|
|
||||||
|
{ TPICPin }
|
||||||
|
function TPICPin.GetLabel: string;
|
||||||
|
{Devuelve una etiqueta para el pin}
|
||||||
|
begin
|
||||||
|
case typ of
|
||||||
|
pptUnused: Result := 'NC';
|
||||||
|
else
|
||||||
|
Result := nam;
|
||||||
|
end;
|
||||||
|
end;
|
||||||
|
|
||||||
|
procedure TPicCore.SetMaxFlash(AValue: integer);
|
||||||
|
begin
|
||||||
|
if FMaxFlash = AValue then Exit;
|
||||||
|
FMaxFlash := AValue;
|
||||||
|
end;
|
||||||
|
{ TPicCore }
|
||||||
|
//Creación de archivo *.hex
|
||||||
|
function TPicCore.HexChecksum(const lin:string): string;
|
||||||
|
//Devuelve los caracteres en hexadecimal del Checksum, para el archivo *.hex
|
||||||
|
var
|
||||||
|
i: Integer;
|
||||||
|
chk: Integer;
|
||||||
|
part: String;
|
||||||
|
begin
|
||||||
|
i:=1;
|
||||||
|
chk := 0;
|
||||||
|
while i<length(lin) do begin
|
||||||
|
part := copy(lin,i,2);
|
||||||
|
chk := chk + StrToInt('$'+part);
|
||||||
|
inc(i,2);
|
||||||
|
end;
|
||||||
|
chk := not chk; //complemento a 1
|
||||||
|
inc(chk); //complemento a 2
|
||||||
|
part := IntToHex(chk,4); //a hexadecimal
|
||||||
|
Result := copy(part, length(part)-1,2); //recorta
|
||||||
|
end;
|
||||||
|
procedure TPicCore.GenHexComm(comment: string);
|
||||||
|
//Agrega una línea de comentario al archivo *.hex
|
||||||
|
begin
|
||||||
|
hexLines.Add(';'+comment);
|
||||||
|
end;
|
||||||
|
procedure TPicCore.GenHexExAdd(Data: word);
|
||||||
|
//Agrega una línea de Extended Address al archivo *.hex
|
||||||
|
const RecordType = '04';
|
||||||
|
var
|
||||||
|
ByteCount: Integer;
|
||||||
|
lin: String;
|
||||||
|
begin
|
||||||
|
ByteCount := 2;
|
||||||
|
lin:= IntToHex(ByteCount,2) + '0000' + RecordType + IntToHex(Data,4);
|
||||||
|
hexLines.Add(':' + lin + HexChecksum(lin));
|
||||||
|
end;
|
||||||
|
procedure TPicCore.GenHexData(Address: word; Data: string);
|
||||||
|
//Agrega una línea de datos al archivo *.hex
|
||||||
|
const RecordType = '00';
|
||||||
|
var
|
||||||
|
ByteCount: Integer;
|
||||||
|
lin: String;
|
||||||
|
begin
|
||||||
|
ByteCount := length(data) div 2;
|
||||||
|
lin:= IntToHex(ByteCount,2) + IntToHex(Address*2,4) + RecordType + Data;
|
||||||
|
hexLines.Add(':'+lin + HexChecksum(lin));
|
||||||
|
end;
|
||||||
|
procedure TPicCore.GenHexEOF;
|
||||||
|
//Agrega una línea de Extended Address al archivo *.hex
|
||||||
|
begin
|
||||||
|
hexLines.Add(':00000001FF');
|
||||||
|
end;
|
||||||
|
function TPicCore.StrHexFlash(i1, i2: integer): string;
|
||||||
|
{Devuelve la cadena, de bytes hexadecimales de la memoria Flash, desde la posición
|
||||||
|
i1 hasta i2.}
|
||||||
|
var
|
||||||
|
i: Integer;
|
||||||
|
tmp: String;
|
||||||
|
begin
|
||||||
|
Result:='';
|
||||||
|
for i:=i1 to i2 do begin
|
||||||
|
tmp := IntToHex(ram[i].value,4);
|
||||||
|
Result+=copy(tmp,3,2) + copy(tmp,1,2); //se graba con los bytes invertidos
|
||||||
|
end;
|
||||||
|
end;
|
||||||
|
//RAM memory functions
|
||||||
|
procedure TPicCore.ClearMemRAM;
|
||||||
|
{Limpia el contenido de la memoria}
|
||||||
|
var
|
||||||
|
i: Integer;
|
||||||
|
begin
|
||||||
|
for i:=0 to high(ram) do begin
|
||||||
|
ram[i].dvalue := $00;
|
||||||
|
ram[i].used := false;
|
||||||
|
ram[i].name:='';
|
||||||
|
ram[i].shared := false;
|
||||||
|
// ram[i].state := cs_unimplem; //por defecto se considera no implementado
|
||||||
|
end;
|
||||||
|
end;
|
||||||
|
procedure TPicCore.DisableAllRAM;
|
||||||
|
{Inicia el estado de toda la memoria RAM física definida em el Modelo.
|
||||||
|
Solo debería usarse, para cuando se va a definir el hardware del dispositivo.}
|
||||||
|
var
|
||||||
|
i: word;
|
||||||
|
begin
|
||||||
|
for i:=0 to high(ram) do begin
|
||||||
|
ram[i].addr := i;
|
||||||
|
ram[i].state := cs_unimplem;
|
||||||
|
end;
|
||||||
|
//Inicia estado de pines
|
||||||
|
for i:=1 to high(pines) do begin
|
||||||
|
pines[i].typ := pptUnused;
|
||||||
|
end;
|
||||||
|
end;
|
||||||
|
procedure TPicCore.SetStatRAM(i1, i2: word; status0: TPICCellState);
|
||||||
|
{Inicia el campo State, de la memoria. Permite definir el estado real de la memoria RAM.
|
||||||
|
}
|
||||||
|
var
|
||||||
|
i: Integer;
|
||||||
|
begin
|
||||||
|
for i:=i1 to i2 do begin //verifica 1 a 1, por seguridad
|
||||||
|
if i>PICMAXRAM-1 then continue; //protection
|
||||||
|
ram[i].state := status0;
|
||||||
|
end;
|
||||||
|
end;
|
||||||
|
function TPicCore.SetStatRAMCom(strDef: string): boolean;
|
||||||
|
{Define el estado de la memoria RAM, usando una cadena de definición.
|
||||||
|
La cadena de definición, tiene el formato:
|
||||||
|
<comando 1>, <comando 2>, ...
|
||||||
|
Cada comando, tiene el formato:
|
||||||
|
<dirIni>-<dirFin>:<estado de memoria>
|
||||||
|
Un ejemplo de cadena de definición, es:
|
||||||
|
'000-01F:IMP, 020-07F:NIM'
|
||||||
|
Si hay error, devuelve FALSE, y el mensaje de error en MsjError.
|
||||||
|
}
|
||||||
|
var
|
||||||
|
coms: TStringList;
|
||||||
|
add1, add2: longint;
|
||||||
|
state: TPICCellState;
|
||||||
|
staMem, com, str: String;
|
||||||
|
begin
|
||||||
|
Result := true;
|
||||||
|
coms:= TStringList.Create;
|
||||||
|
try
|
||||||
|
coms.Delimiter := ',';
|
||||||
|
coms.DelimitedText := strDef;
|
||||||
|
for str in coms do begin
|
||||||
|
com := UpCase(trim(str));
|
||||||
|
if com='' then continue;
|
||||||
|
if length(com)<>11 then begin
|
||||||
|
MsjError := 'Memory definition syntax error: Bad string size.';
|
||||||
|
exit(false);
|
||||||
|
end;
|
||||||
|
if com[4] <> '-' then begin
|
||||||
|
MsjError := 'Memory definition syntax error: Expected "-".';
|
||||||
|
exit(false);
|
||||||
|
end;
|
||||||
|
if com[8] <> ':' then begin
|
||||||
|
MsjError := 'Memory definition syntax error: Expected ":".';
|
||||||
|
exit(false);
|
||||||
|
end;
|
||||||
|
//Debe tener el formato pedido
|
||||||
|
if not TryStrToInt('$'+copy(com,1,3), add1) then begin
|
||||||
|
MsjError := 'Memory definition syntax error: Wrong address.';
|
||||||
|
exit(false);
|
||||||
|
end;
|
||||||
|
if not TryStrToInt('$'+copy(com,5,3), add2) then begin
|
||||||
|
MsjError := 'Memory definition syntax error: Wrong address.';
|
||||||
|
exit(false);
|
||||||
|
end;
|
||||||
|
staMem := copy(com, 9, 3);
|
||||||
|
case staMem of
|
||||||
|
'IMP': state := cs_impleGPR;
|
||||||
|
'NIM': state := cs_unimplem;
|
||||||
|
else
|
||||||
|
MsjError := 'Memory definition syntax error: Expected SFR or GPR';
|
||||||
|
exit(false);
|
||||||
|
end;
|
||||||
|
//Ya se tienen los parámetros, para definir la memoria
|
||||||
|
SetStatRAM(add1, add2, state);
|
||||||
|
end;
|
||||||
|
finally
|
||||||
|
coms.Destroy;
|
||||||
|
end;
|
||||||
|
end;
|
||||||
|
function TPicCore.MapRAMtoPIN(strDef: string): boolean;
|
||||||
|
{Mapea puertos de memoria RAM a pines físicos del dispositivo. Útil para la simulación
|
||||||
|
La cadena de definición, tiene el formato:
|
||||||
|
<dirección>:<comando 1>, <comando 2>, ...
|
||||||
|
Cada comando, tiene el formato:
|
||||||
|
<dirIni>-<dirFin>:<banco al que está mapeado>
|
||||||
|
Un ejemplo de cadena de definición, es:
|
||||||
|
'005:0-17,1-18,2-1,3-2,4-3'
|
||||||
|
Si hay error, devuelve FALSE, y el mensaje de error en MsjError.
|
||||||
|
}
|
||||||
|
var
|
||||||
|
coms: TStringList;
|
||||||
|
add1, pin, bit: longint;
|
||||||
|
com, str, ramName: String;
|
||||||
|
pSep: SizeInt;
|
||||||
|
begin
|
||||||
|
Result := true;
|
||||||
|
//Obtiene dirección
|
||||||
|
if length(strDef) < 4 then begin
|
||||||
|
MsjError := 'Syntax error';
|
||||||
|
exit(false);
|
||||||
|
end;
|
||||||
|
if strDef[4] <> ':' then begin
|
||||||
|
MsjError := 'Expected "<3-digits address>"';
|
||||||
|
exit(false);
|
||||||
|
end;
|
||||||
|
if not TryStrToInt('$'+copy(strDef,1,3), add1) then begin
|
||||||
|
MsjError := 'Address format error.';
|
||||||
|
exit(false);
|
||||||
|
end;
|
||||||
|
delete(strDef, 1, 4); //quita la dirección
|
||||||
|
//Obtiene lista de asociaciones
|
||||||
|
coms:= TStringList.Create;
|
||||||
|
try
|
||||||
|
coms.Delimiter := ',';
|
||||||
|
coms.DelimitedText := strDef;
|
||||||
|
for str in coms do begin
|
||||||
|
com := UpCase(trim(str)); //asociación
|
||||||
|
if com='' then continue;
|
||||||
|
pSep := pos('-',com); //Posición de separador
|
||||||
|
if pSep = 0 then begin
|
||||||
|
MsjError := 'Expected "-".';
|
||||||
|
exit(false);
|
||||||
|
end;
|
||||||
|
//Debe tener el formato pedido
|
||||||
|
// debugln(com);
|
||||||
|
if not TryStrToInt(copy(com,1,pSep-1), bit) then begin
|
||||||
|
MsjError := 'Error in bit number.';
|
||||||
|
exit(false);
|
||||||
|
end;
|
||||||
|
if not TryStrToInt(copy(com,pSep+1,length(com)), pin) then begin
|
||||||
|
MsjError := 'Error in pin number.';
|
||||||
|
exit(false);
|
||||||
|
end;
|
||||||
|
if (pin<0) or (pin>PIC_MAX_PINES) then begin
|
||||||
|
MsjError := 'Pin number out of range.';
|
||||||
|
exit(false);
|
||||||
|
end;
|
||||||
|
if pin>Npins then begin
|
||||||
|
MsjError := 'Pin number out of range, for this device.';
|
||||||
|
exit(false);
|
||||||
|
end;
|
||||||
|
//Ya se tiene el BIT y el PIN. Configura datos del PIN
|
||||||
|
pines[pin].add := add1;
|
||||||
|
pines[pin].bit := bit;
|
||||||
|
pines[pin].typ := pptPort;
|
||||||
|
ramName := ram[add1].name;
|
||||||
|
if ramName='' then ramName := 'PORT';
|
||||||
|
pines[pin].nam := ramName + '.' + IntToStr(bit); //Nombre por defecto
|
||||||
|
end;
|
||||||
|
finally
|
||||||
|
coms.Destroy;
|
||||||
|
end;
|
||||||
|
end;
|
||||||
|
procedure TPicCore.ResetPins;
|
||||||
|
{Reset the pins of the device.}
|
||||||
|
var
|
||||||
|
i: byte;
|
||||||
|
begin
|
||||||
|
for i:=1 to Npins do begin
|
||||||
|
pines[i].nam := ' ';
|
||||||
|
pines[i].typ := pptUnused;
|
||||||
|
end;
|
||||||
|
end;
|
||||||
|
procedure TPicCore.SetPin(pNumber: integer; pLabel: string; pType: TPICPinType);
|
||||||
|
begin
|
||||||
|
if pNumber>PIC_MAX_PINES then exit;
|
||||||
|
pines[pNumber].nam := pLabel;
|
||||||
|
pines[pNumber].typ := pType;
|
||||||
|
end;
|
||||||
|
function TPicCore.SetPinName(strDef: string): boolean;
|
||||||
|
{Define the name for a specified Pin of the microcontroller, using a string.
|
||||||
|
"strDef" have the format:
|
||||||
|
<pin number>:<name of the pin>
|
||||||
|
On error this function return FALSE, and the error menssage in MsjError.
|
||||||
|
}
|
||||||
|
var
|
||||||
|
com, pinName: String;
|
||||||
|
pNumber: integer;
|
||||||
|
pcol: SizeInt;
|
||||||
|
begin
|
||||||
|
com := UpCase(trim(strDef));
|
||||||
|
if com='' then exit;
|
||||||
|
pcol := Pos(':', strDef);
|
||||||
|
if pcol=0 then begin
|
||||||
|
MsjError := 'SetPinName: Expected ":".';
|
||||||
|
exit(false);
|
||||||
|
end;
|
||||||
|
//"com" must have the correct format
|
||||||
|
if not TryStrToInt( copy(com, 1, pcol-1) , pNumber) then begin
|
||||||
|
MsjError := 'SetPinName: Wrong Pin Number.';
|
||||||
|
exit(false);
|
||||||
|
end;
|
||||||
|
pinName :=copy(com, pcol+1, 32); //limited to 32
|
||||||
|
SetPin(pNumber, pinName, pptControl);
|
||||||
|
end;
|
||||||
|
function TPicCore.HaveConsecRAM(const i, n: word; maxRam: word): boolean;
|
||||||
|
{Indica si hay "n" bytes consecutivos libres en la posicióm "i", en RAM.
|
||||||
|
La búsqueda se hace solo hasta la posición "maxRam"}
|
||||||
|
var
|
||||||
|
c: Integer;
|
||||||
|
j: word;
|
||||||
|
begin
|
||||||
|
Result := false;
|
||||||
|
c := 0;
|
||||||
|
j := i;
|
||||||
|
while (j<=maxRam) and (c<n) do begin
|
||||||
|
if (ram[j].state <> cs_impleGPR) or (ram[j].used) then exit;
|
||||||
|
inc(c); //verifica siguiente
|
||||||
|
inc(j);
|
||||||
|
end;
|
||||||
|
if j>maxRam then exit; //no hay más espacio
|
||||||
|
//Si llega aquí es porque estaban libres los bloques
|
||||||
|
Result := true;
|
||||||
|
end;
|
||||||
|
procedure TPicCore.UseConsecRAM(const i, n: word);
|
||||||
|
{Marca "n" bytes como usados en la posición de memoria "i", en la RAM.
|
||||||
|
Debe haberse verificado previamente que los parámetros son válidos, porque aquí no
|
||||||
|
se hará ninguna verificación.}
|
||||||
|
var j: word;
|
||||||
|
begin
|
||||||
|
for j:=i to i+n-1 do begin
|
||||||
|
ram[j].used := true; //todos los bits
|
||||||
|
end;
|
||||||
|
end;
|
||||||
|
procedure TPicCore.SetSharedUnused;
|
||||||
|
{Marca las posiciones que estén en "shared", como no usadas, para que se puedan
|
||||||
|
usar nuevamente.}
|
||||||
|
var
|
||||||
|
i: Integer;
|
||||||
|
begin
|
||||||
|
for i:=0 to high(ram) do begin
|
||||||
|
if (ram[i].state = cs_impleGPR) and (ram[i].shared) then begin
|
||||||
|
ram[i].used := false; //pone en cero
|
||||||
|
end;
|
||||||
|
end;
|
||||||
|
end;
|
||||||
|
procedure TPicCore.SetSharedUsed;
|
||||||
|
{Marca las posiciones que estén en "shared", como usadas, para que no se puedan
|
||||||
|
usar nuevamente.}
|
||||||
|
var
|
||||||
|
i: Integer;
|
||||||
|
begin
|
||||||
|
for i:=0 to high(ram) do begin
|
||||||
|
if (ram[i].state = cs_impleGPR) and (ram[i].shared) then begin
|
||||||
|
ram[i].used := true; //pone en uno
|
||||||
|
end;
|
||||||
|
end;
|
||||||
|
end;
|
||||||
|
//FLASH memory functions
|
||||||
|
function TPicCore.UsedMemRAM: word;
|
||||||
|
var
|
||||||
|
i: Integer;
|
||||||
|
begin
|
||||||
|
Result := 0;
|
||||||
|
for i:=$0000 to PICMAXFLASH-1 do begin
|
||||||
|
if ram[i].used then inc(Result);
|
||||||
|
end;
|
||||||
|
end;
|
||||||
|
procedure TPicCore.ClearMemFlash;
|
||||||
|
var
|
||||||
|
i: Integer;
|
||||||
|
begin
|
||||||
|
for i:=0 to high(ram) do begin
|
||||||
|
ram[i].value := $3FFF;
|
||||||
|
ram[i].used := false;
|
||||||
|
ram[i].breakPnt := false;
|
||||||
|
ram[i].topLabel := '';
|
||||||
|
ram[i].sideComment:= '';
|
||||||
|
ram[i].topComment := '';
|
||||||
|
ram[i].idFile := -1; //Indica no inicializado
|
||||||
|
end;
|
||||||
|
end;
|
||||||
|
//RAM name managment
|
||||||
|
function TPicCore.NameRAM(const addr: word): string;
|
||||||
|
{Devuelve el nombre de una celda de la memoria RAM.}
|
||||||
|
begin
|
||||||
|
Result := ram[addr].name;
|
||||||
|
end;
|
||||||
|
procedure TPicCore.SetNameRAM(const addr: word; const nam: string
|
||||||
|
);
|
||||||
|
{Escribe en el campo "name" de la RAM en la psoición indicada}
|
||||||
|
begin
|
||||||
|
ram[addr].name:=nam;
|
||||||
|
end;
|
||||||
|
procedure TPicCore.AddNameRAM(const addr: word; const nam: string);
|
||||||
|
{Escribe en el campo "name" de la RAM en la psoición indicada. Si ya existía un nombre,
|
||||||
|
lo argega después de una coma.}
|
||||||
|
begin
|
||||||
|
if ram[addr].name = '' then begin
|
||||||
|
ram[addr].name:=nam;
|
||||||
|
end else begin
|
||||||
|
ram[addr].name+=','+nam;
|
||||||
|
end;
|
||||||
|
end;
|
||||||
|
//Execution control
|
||||||
|
procedure TPicCore.AddBreakpoint(aPC: word);
|
||||||
|
//Agrega un punto de interrupción
|
||||||
|
begin
|
||||||
|
if aPC>=PICMAXFLASH then exit;
|
||||||
|
ram[aPC].breakPnt := true;
|
||||||
|
end;
|
||||||
|
procedure TPicCore.ToggleBreakpoint(aPC: word);
|
||||||
|
//COnmuta el estado del Punto de Interrupción, en la posición indicada
|
||||||
|
begin
|
||||||
|
if aPC>=PICMAXFLASH then exit;
|
||||||
|
ram[aPC].breakPnt := not ram[aPC].breakPnt;
|
||||||
|
end;
|
||||||
|
procedure TPicCore.addTopLabel(lbl: string);
|
||||||
|
begin
|
||||||
|
ram[iRam].topLabel := lbl;
|
||||||
|
end;
|
||||||
|
procedure TPicCore.addTopComm(comm: string; replace: boolean);
|
||||||
|
{Agrega un comentario de línea al código en la posición de memoria actual}
|
||||||
|
begin
|
||||||
|
if replace then begin
|
||||||
|
ram[iRam].topComment := comm;
|
||||||
|
end else begin
|
||||||
|
ram[iRam].topComment := ram[iRam].topComment + comm;
|
||||||
|
end;
|
||||||
|
end;
|
||||||
|
procedure TPicCore.addSideComm(comm: string; before: boolean);
|
||||||
|
{Agrega un comentario para que apareza al lado de la instrucción.
|
||||||
|
"before" = TRUE -> Se debe llamar después de codificar la instrucción
|
||||||
|
"before" = FALSE -> Se debe llamar antes de codificar la instrucción
|
||||||
|
}
|
||||||
|
begin
|
||||||
|
if before then begin
|
||||||
|
if iRam= 0 then exit;
|
||||||
|
ram[iRam-1].sideComment+=comm; //se agrega al que pudiera haber
|
||||||
|
end else begin
|
||||||
|
if iRam= 0 then exit;
|
||||||
|
ram[iRam].sideComment+=comm; //se agrega al que pudiera haber
|
||||||
|
end;
|
||||||
|
end;
|
||||||
|
procedure TPicCore.addPosInformation(rowSrc, colSrc: word; idFile: byte);
|
||||||
|
{Agrega information de la posición en el codigo fuente, a la posición actual de la
|
||||||
|
memoria flash.}
|
||||||
|
begin
|
||||||
|
ram[iRam].rowSrc := rowSrc;
|
||||||
|
ram[iRam].colSrc := colSrc;
|
||||||
|
ram[iRam].idFile := idFile;
|
||||||
|
end;
|
||||||
|
//Initialization
|
||||||
|
constructor TPicCore.Create;
|
||||||
|
begin
|
||||||
|
hexLines := TStringList.Create;
|
||||||
|
frequen := 4000000; //4MHz
|
||||||
|
end;
|
||||||
|
destructor TPicCore.Destroy;
|
||||||
|
begin
|
||||||
|
hexLines.Destroy;
|
||||||
|
inherited Destroy;
|
||||||
|
end;
|
||||||
|
|
||||||
|
initialization
|
||||||
|
end.
|
||||||
|
|
File diff suppressed because it is too large
Load Diff
Loading…
Reference in New Issue