mirror of
https://github.com/itomato/macusbdb.git
synced 2024-10-13 13:23:39 +00:00
Exploded, removed tarball
This commit is contained in:
parent
68b6ef4866
commit
2588b80920
20
README.md
20
README.md
@ -1,2 +1,22 @@
|
||||
# macusbdb
|
||||
Jeroen/Spritesmods "macusbfb" LPC1343 firmware for Macintosh 9" CRT driver board
|
||||
The code in these directories isn't the best I ever wrote, but at the moment
|
||||
it works good enough for my own purposes. Use at your own risk!
|
||||
Contents:
|
||||
|
||||
adb2usb/ : Code for the ADB to USB converter
|
||||
adb2usb/adb2uart : Code for the uC that receives ADB
|
||||
adb2usb/uart2usb : Code for the uC that sends the data over the USB bus
|
||||
macusbfb : Firmware for the LPC1343 that a.o. controls the Macintosh CRT
|
||||
|
||||
A few notes about the shortcomings of the current code:
|
||||
- macusbfb works just fine, but leaks memory when unloaded or the display
|
||||
device is unplugged. As long as you plug in the device and load the module,
|
||||
you should be fine though.
|
||||
- The adb2usb device seems to drop adb replies every now and then, resulting
|
||||
in e.g. a stuck key. I still need to figure out why. Until then, pressing
|
||||
the key a second time should make it work again
|
||||
|
||||
As always, if you fix or expand something, I'd love to get a patch.
|
||||
|
||||
Jeroen/Sprite_tm <jeroen@spritesmods.com>
|
||||
|
674
adb2usb/LICENSE
Normal file
674
adb2usb/LICENSE
Normal file
@ -0,0 +1,674 @@
|
||||
GNU GENERAL PUBLIC LICENSE
|
||||
Version 3, 29 June 2007
|
||||
|
||||
Copyright (C) 2007 Free Software Foundation, Inc. <http://fsf.org/>
|
||||
Everyone is permitted to copy and distribute verbatim copies
|
||||
of this license document, but changing it is not allowed.
|
||||
|
||||
Preamble
|
||||
|
||||
The GNU General Public License is a free, copyleft license for
|
||||
software and other kinds of works.
|
||||
|
||||
The licenses for most software and other practical works are designed
|
||||
to take away your freedom to share and change the works. By contrast,
|
||||
the GNU General Public License is intended to guarantee your freedom to
|
||||
share and change all versions of a program--to make sure it remains free
|
||||
software for all its users. We, the Free Software Foundation, use the
|
||||
GNU General Public License for most of our software; it applies also to
|
||||
any other work released this way by its authors. You can apply it to
|
||||
your programs, too.
|
||||
|
||||
When we speak of free software, we are referring to freedom, not
|
||||
price. Our General Public Licenses are designed to make sure that you
|
||||
have the freedom to distribute copies of free software (and charge for
|
||||
them if you wish), that you receive source code or can get it if you
|
||||
want it, that you can change the software or use pieces of it in new
|
||||
free programs, and that you know you can do these things.
|
||||
|
||||
To protect your rights, we need to prevent others from denying you
|
||||
these rights or asking you to surrender the rights. Therefore, you have
|
||||
certain responsibilities if you distribute copies of the software, or if
|
||||
you modify it: responsibilities to respect the freedom of others.
|
||||
|
||||
For example, if you distribute copies of such a program, whether
|
||||
gratis or for a fee, you must pass on to the recipients the same
|
||||
freedoms that you received. You must make sure that they, too, receive
|
||||
or can get the source code. And you must show them these terms so they
|
||||
know their rights.
|
||||
|
||||
Developers that use the GNU GPL protect your rights with two steps:
|
||||
(1) assert copyright on the software, and (2) offer you this License
|
||||
giving you legal permission to copy, distribute and/or modify it.
|
||||
|
||||
For the developers' and authors' protection, the GPL clearly explains
|
||||
that there is no warranty for this free software. For both users' and
|
||||
authors' sake, the GPL requires that modified versions be marked as
|
||||
changed, so that their problems will not be attributed erroneously to
|
||||
authors of previous versions.
|
||||
|
||||
Some devices are designed to deny users access to install or run
|
||||
modified versions of the software inside them, although the manufacturer
|
||||
can do so. This is fundamentally incompatible with the aim of
|
||||
protecting users' freedom to change the software. The systematic
|
||||
pattern of such abuse occurs in the area of products for individuals to
|
||||
use, which is precisely where it is most unacceptable. Therefore, we
|
||||
have designed this version of the GPL to prohibit the practice for those
|
||||
products. If such problems arise substantially in other domains, we
|
||||
stand ready to extend this provision to those domains in future versions
|
||||
of the GPL, as needed to protect the freedom of users.
|
||||
|
||||
Finally, every program is threatened constantly by software patents.
|
||||
States should not allow patents to restrict development and use of
|
||||
software on general-purpose computers, but in those that do, we wish to
|
||||
avoid the special danger that patents applied to a free program could
|
||||
make it effectively proprietary. To prevent this, the GPL assures that
|
||||
patents cannot be used to render the program non-free.
|
||||
|
||||
The precise terms and conditions for copying, distribution and
|
||||
modification follow.
|
||||
|
||||
TERMS AND CONDITIONS
|
||||
|
||||
0. Definitions.
|
||||
|
||||
"This License" refers to version 3 of the GNU General Public License.
|
||||
|
||||
"Copyright" also means copyright-like laws that apply to other kinds of
|
||||
works, such as semiconductor masks.
|
||||
|
||||
"The Program" refers to any copyrightable work licensed under this
|
||||
License. Each licensee is addressed as "you". "Licensees" and
|
||||
"recipients" may be individuals or organizations.
|
||||
|
||||
To "modify" a work means to copy from or adapt all or part of the work
|
||||
in a fashion requiring copyright permission, other than the making of an
|
||||
exact copy. The resulting work is called a "modified version" of the
|
||||
earlier work or a work "based on" the earlier work.
|
||||
|
||||
A "covered work" means either the unmodified Program or a work based
|
||||
on the Program.
|
||||
|
||||
To "propagate" a work means to do anything with it that, without
|
||||
permission, would make you directly or secondarily liable for
|
||||
infringement under applicable copyright law, except executing it on a
|
||||
computer or modifying a private copy. Propagation includes copying,
|
||||
distribution (with or without modification), making available to the
|
||||
public, and in some countries other activities as well.
|
||||
|
||||
To "convey" a work means any kind of propagation that enables other
|
||||
parties to make or receive copies. Mere interaction with a user through
|
||||
a computer network, with no transfer of a copy, is not conveying.
|
||||
|
||||
An interactive user interface displays "Appropriate Legal Notices"
|
||||
to the extent that it includes a convenient and prominently visible
|
||||
feature that (1) displays an appropriate copyright notice, and (2)
|
||||
tells the user that there is no warranty for the work (except to the
|
||||
extent that warranties are provided), that licensees may convey the
|
||||
work under this License, and how to view a copy of this License. If
|
||||
the interface presents a list of user commands or options, such as a
|
||||
menu, a prominent item in the list meets this criterion.
|
||||
|
||||
1. Source Code.
|
||||
|
||||
The "source code" for a work means the preferred form of the work
|
||||
for making modifications to it. "Object code" means any non-source
|
||||
form of a work.
|
||||
|
||||
A "Standard Interface" means an interface that either is an official
|
||||
standard defined by a recognized standards body, or, in the case of
|
||||
interfaces specified for a particular programming language, one that
|
||||
is widely used among developers working in that language.
|
||||
|
||||
The "System Libraries" of an executable work include anything, other
|
||||
than the work as a whole, that (a) is included in the normal form of
|
||||
packaging a Major Component, but which is not part of that Major
|
||||
Component, and (b) serves only to enable use of the work with that
|
||||
Major Component, or to implement a Standard Interface for which an
|
||||
implementation is available to the public in source code form. A
|
||||
"Major Component", in this context, means a major essential component
|
||||
(kernel, window system, and so on) of the specific operating system
|
||||
(if any) on which the executable work runs, or a compiler used to
|
||||
produce the work, or an object code interpreter used to run it.
|
||||
|
||||
The "Corresponding Source" for a work in object code form means all
|
||||
the source code needed to generate, install, and (for an executable
|
||||
work) run the object code and to modify the work, including scripts to
|
||||
control those activities. However, it does not include the work's
|
||||
System Libraries, or general-purpose tools or generally available free
|
||||
programs which are used unmodified in performing those activities but
|
||||
which are not part of the work. For example, Corresponding Source
|
||||
includes interface definition files associated with source files for
|
||||
the work, and the source code for shared libraries and dynamically
|
||||
linked subprograms that the work is specifically designed to require,
|
||||
such as by intimate data communication or control flow between those
|
||||
subprograms and other parts of the work.
|
||||
|
||||
The Corresponding Source need not include anything that users
|
||||
can regenerate automatically from other parts of the Corresponding
|
||||
Source.
|
||||
|
||||
The Corresponding Source for a work in source code form is that
|
||||
same work.
|
||||
|
||||
2. Basic Permissions.
|
||||
|
||||
All rights granted under this License are granted for the term of
|
||||
copyright on the Program, and are irrevocable provided the stated
|
||||
conditions are met. This License explicitly affirms your unlimited
|
||||
permission to run the unmodified Program. The output from running a
|
||||
covered work is covered by this License only if the output, given its
|
||||
content, constitutes a covered work. This License acknowledges your
|
||||
rights of fair use or other equivalent, as provided by copyright law.
|
||||
|
||||
You may make, run and propagate covered works that you do not
|
||||
convey, without conditions so long as your license otherwise remains
|
||||
in force. You may convey covered works to others for the sole purpose
|
||||
of having them make modifications exclusively for you, or provide you
|
||||
with facilities for running those works, provided that you comply with
|
||||
the terms of this License in conveying all material for which you do
|
||||
not control copyright. Those thus making or running the covered works
|
||||
for you must do so exclusively on your behalf, under your direction
|
||||
and control, on terms that prohibit them from making any copies of
|
||||
your copyrighted material outside their relationship with you.
|
||||
|
||||
Conveying under any other circumstances is permitted solely under
|
||||
the conditions stated below. Sublicensing is not allowed; section 10
|
||||
makes it unnecessary.
|
||||
|
||||
3. Protecting Users' Legal Rights From Anti-Circumvention Law.
|
||||
|
||||
No covered work shall be deemed part of an effective technological
|
||||
measure under any applicable law fulfilling obligations under article
|
||||
11 of the WIPO copyright treaty adopted on 20 December 1996, or
|
||||
similar laws prohibiting or restricting circumvention of such
|
||||
measures.
|
||||
|
||||
When you convey a covered work, you waive any legal power to forbid
|
||||
circumvention of technological measures to the extent such circumvention
|
||||
is effected by exercising rights under this License with respect to
|
||||
the covered work, and you disclaim any intention to limit operation or
|
||||
modification of the work as a means of enforcing, against the work's
|
||||
users, your or third parties' legal rights to forbid circumvention of
|
||||
technological measures.
|
||||
|
||||
4. Conveying Verbatim Copies.
|
||||
|
||||
You may convey verbatim copies of the Program's source code as you
|
||||
receive it, in any medium, provided that you conspicuously and
|
||||
appropriately publish on each copy an appropriate copyright notice;
|
||||
keep intact all notices stating that this License and any
|
||||
non-permissive terms added in accord with section 7 apply to the code;
|
||||
keep intact all notices of the absence of any warranty; and give all
|
||||
recipients a copy of this License along with the Program.
|
||||
|
||||
You may charge any price or no price for each copy that you convey,
|
||||
and you may offer support or warranty protection for a fee.
|
||||
|
||||
5. Conveying Modified Source Versions.
|
||||
|
||||
You may convey a work based on the Program, or the modifications to
|
||||
produce it from the Program, in the form of source code under the
|
||||
terms of section 4, provided that you also meet all of these conditions:
|
||||
|
||||
a) The work must carry prominent notices stating that you modified
|
||||
it, and giving a relevant date.
|
||||
|
||||
b) The work must carry prominent notices stating that it is
|
||||
released under this License and any conditions added under section
|
||||
7. This requirement modifies the requirement in section 4 to
|
||||
"keep intact all notices".
|
||||
|
||||
c) You must license the entire work, as a whole, under this
|
||||
License to anyone who comes into possession of a copy. This
|
||||
License will therefore apply, along with any applicable section 7
|
||||
additional terms, to the whole of the work, and all its parts,
|
||||
regardless of how they are packaged. This License gives no
|
||||
permission to license the work in any other way, but it does not
|
||||
invalidate such permission if you have separately received it.
|
||||
|
||||
d) If the work has interactive user interfaces, each must display
|
||||
Appropriate Legal Notices; however, if the Program has interactive
|
||||
interfaces that do not display Appropriate Legal Notices, your
|
||||
work need not make them do so.
|
||||
|
||||
A compilation of a covered work with other separate and independent
|
||||
works, which are not by their nature extensions of the covered work,
|
||||
and which are not combined with it such as to form a larger program,
|
||||
in or on a volume of a storage or distribution medium, is called an
|
||||
"aggregate" if the compilation and its resulting copyright are not
|
||||
used to limit the access or legal rights of the compilation's users
|
||||
beyond what the individual works permit. Inclusion of a covered work
|
||||
in an aggregate does not cause this License to apply to the other
|
||||
parts of the aggregate.
|
||||
|
||||
6. Conveying Non-Source Forms.
|
||||
|
||||
You may convey a covered work in object code form under the terms
|
||||
of sections 4 and 5, provided that you also convey the
|
||||
machine-readable Corresponding Source under the terms of this License,
|
||||
in one of these ways:
|
||||
|
||||
a) Convey the object code in, or embodied in, a physical product
|
||||
(including a physical distribution medium), accompanied by the
|
||||
Corresponding Source fixed on a durable physical medium
|
||||
customarily used for software interchange.
|
||||
|
||||
b) Convey the object code in, or embodied in, a physical product
|
||||
(including a physical distribution medium), accompanied by a
|
||||
written offer, valid for at least three years and valid for as
|
||||
long as you offer spare parts or customer support for that product
|
||||
model, to give anyone who possesses the object code either (1) a
|
||||
copy of the Corresponding Source for all the software in the
|
||||
product that is covered by this License, on a durable physical
|
||||
medium customarily used for software interchange, for a price no
|
||||
more than your reasonable cost of physically performing this
|
||||
conveying of source, or (2) access to copy the
|
||||
Corresponding Source from a network server at no charge.
|
||||
|
||||
c) Convey individual copies of the object code with a copy of the
|
||||
written offer to provide the Corresponding Source. This
|
||||
alternative is allowed only occasionally and noncommercially, and
|
||||
only if you received the object code with such an offer, in accord
|
||||
with subsection 6b.
|
||||
|
||||
d) Convey the object code by offering access from a designated
|
||||
place (gratis or for a charge), and offer equivalent access to the
|
||||
Corresponding Source in the same way through the same place at no
|
||||
further charge. You need not require recipients to copy the
|
||||
Corresponding Source along with the object code. If the place to
|
||||
copy the object code is a network server, the Corresponding Source
|
||||
may be on a different server (operated by you or a third party)
|
||||
that supports equivalent copying facilities, provided you maintain
|
||||
clear directions next to the object code saying where to find the
|
||||
Corresponding Source. Regardless of what server hosts the
|
||||
Corresponding Source, you remain obligated to ensure that it is
|
||||
available for as long as needed to satisfy these requirements.
|
||||
|
||||
e) Convey the object code using peer-to-peer transmission, provided
|
||||
you inform other peers where the object code and Corresponding
|
||||
Source of the work are being offered to the general public at no
|
||||
charge under subsection 6d.
|
||||
|
||||
A separable portion of the object code, whose source code is excluded
|
||||
from the Corresponding Source as a System Library, need not be
|
||||
included in conveying the object code work.
|
||||
|
||||
A "User Product" is either (1) a "consumer product", which means any
|
||||
tangible personal property which is normally used for personal, family,
|
||||
or household purposes, or (2) anything designed or sold for incorporation
|
||||
into a dwelling. In determining whether a product is a consumer product,
|
||||
doubtful cases shall be resolved in favor of coverage. For a particular
|
||||
product received by a particular user, "normally used" refers to a
|
||||
typical or common use of that class of product, regardless of the status
|
||||
of the particular user or of the way in which the particular user
|
||||
actually uses, or expects or is expected to use, the product. A product
|
||||
is a consumer product regardless of whether the product has substantial
|
||||
commercial, industrial or non-consumer uses, unless such uses represent
|
||||
the only significant mode of use of the product.
|
||||
|
||||
"Installation Information" for a User Product means any methods,
|
||||
procedures, authorization keys, or other information required to install
|
||||
and execute modified versions of a covered work in that User Product from
|
||||
a modified version of its Corresponding Source. The information must
|
||||
suffice to ensure that the continued functioning of the modified object
|
||||
code is in no case prevented or interfered with solely because
|
||||
modification has been made.
|
||||
|
||||
If you convey an object code work under this section in, or with, or
|
||||
specifically for use in, a User Product, and the conveying occurs as
|
||||
part of a transaction in which the right of possession and use of the
|
||||
User Product is transferred to the recipient in perpetuity or for a
|
||||
fixed term (regardless of how the transaction is characterized), the
|
||||
Corresponding Source conveyed under this section must be accompanied
|
||||
by the Installation Information. But this requirement does not apply
|
||||
if neither you nor any third party retains the ability to install
|
||||
modified object code on the User Product (for example, the work has
|
||||
been installed in ROM).
|
||||
|
||||
The requirement to provide Installation Information does not include a
|
||||
requirement to continue to provide support service, warranty, or updates
|
||||
for a work that has been modified or installed by the recipient, or for
|
||||
the User Product in which it has been modified or installed. Access to a
|
||||
network may be denied when the modification itself materially and
|
||||
adversely affects the operation of the network or violates the rules and
|
||||
protocols for communication across the network.
|
||||
|
||||
Corresponding Source conveyed, and Installation Information provided,
|
||||
in accord with this section must be in a format that is publicly
|
||||
documented (and with an implementation available to the public in
|
||||
source code form), and must require no special password or key for
|
||||
unpacking, reading or copying.
|
||||
|
||||
7. Additional Terms.
|
||||
|
||||
"Additional permissions" are terms that supplement the terms of this
|
||||
License by making exceptions from one or more of its conditions.
|
||||
Additional permissions that are applicable to the entire Program shall
|
||||
be treated as though they were included in this License, to the extent
|
||||
that they are valid under applicable law. If additional permissions
|
||||
apply only to part of the Program, that part may be used separately
|
||||
under those permissions, but the entire Program remains governed by
|
||||
this License without regard to the additional permissions.
|
||||
|
||||
When you convey a copy of a covered work, you may at your option
|
||||
remove any additional permissions from that copy, or from any part of
|
||||
it. (Additional permissions may be written to require their own
|
||||
removal in certain cases when you modify the work.) You may place
|
||||
additional permissions on material, added by you to a covered work,
|
||||
for which you have or can give appropriate copyright permission.
|
||||
|
||||
Notwithstanding any other provision of this License, for material you
|
||||
add to a covered work, you may (if authorized by the copyright holders of
|
||||
that material) supplement the terms of this License with terms:
|
||||
|
||||
a) Disclaiming warranty or limiting liability differently from the
|
||||
terms of sections 15 and 16 of this License; or
|
||||
|
||||
b) Requiring preservation of specified reasonable legal notices or
|
||||
author attributions in that material or in the Appropriate Legal
|
||||
Notices displayed by works containing it; or
|
||||
|
||||
c) Prohibiting misrepresentation of the origin of that material, or
|
||||
requiring that modified versions of such material be marked in
|
||||
reasonable ways as different from the original version; or
|
||||
|
||||
d) Limiting the use for publicity purposes of names of licensors or
|
||||
authors of the material; or
|
||||
|
||||
e) Declining to grant rights under trademark law for use of some
|
||||
trade names, trademarks, or service marks; or
|
||||
|
||||
f) Requiring indemnification of licensors and authors of that
|
||||
material by anyone who conveys the material (or modified versions of
|
||||
it) with contractual assumptions of liability to the recipient, for
|
||||
any liability that these contractual assumptions directly impose on
|
||||
those licensors and authors.
|
||||
|
||||
All other non-permissive additional terms are considered "further
|
||||
restrictions" within the meaning of section 10. If the Program as you
|
||||
received it, or any part of it, contains a notice stating that it is
|
||||
governed by this License along with a term that is a further
|
||||
restriction, you may remove that term. If a license document contains
|
||||
a further restriction but permits relicensing or conveying under this
|
||||
License, you may add to a covered work material governed by the terms
|
||||
of that license document, provided that the further restriction does
|
||||
not survive such relicensing or conveying.
|
||||
|
||||
If you add terms to a covered work in accord with this section, you
|
||||
must place, in the relevant source files, a statement of the
|
||||
additional terms that apply to those files, or a notice indicating
|
||||
where to find the applicable terms.
|
||||
|
||||
Additional terms, permissive or non-permissive, may be stated in the
|
||||
form of a separately written license, or stated as exceptions;
|
||||
the above requirements apply either way.
|
||||
|
||||
8. Termination.
|
||||
|
||||
You may not propagate or modify a covered work except as expressly
|
||||
provided under this License. Any attempt otherwise to propagate or
|
||||
modify it is void, and will automatically terminate your rights under
|
||||
this License (including any patent licenses granted under the third
|
||||
paragraph of section 11).
|
||||
|
||||
However, if you cease all violation of this License, then your
|
||||
license from a particular copyright holder is reinstated (a)
|
||||
provisionally, unless and until the copyright holder explicitly and
|
||||
finally terminates your license, and (b) permanently, if the copyright
|
||||
holder fails to notify you of the violation by some reasonable means
|
||||
prior to 60 days after the cessation.
|
||||
|
||||
Moreover, your license from a particular copyright holder is
|
||||
reinstated permanently if the copyright holder notifies you of the
|
||||
violation by some reasonable means, this is the first time you have
|
||||
received notice of violation of this License (for any work) from that
|
||||
copyright holder, and you cure the violation prior to 30 days after
|
||||
your receipt of the notice.
|
||||
|
||||
Termination of your rights under this section does not terminate the
|
||||
licenses of parties who have received copies or rights from you under
|
||||
this License. If your rights have been terminated and not permanently
|
||||
reinstated, you do not qualify to receive new licenses for the same
|
||||
material under section 10.
|
||||
|
||||
9. Acceptance Not Required for Having Copies.
|
||||
|
||||
You are not required to accept this License in order to receive or
|
||||
run a copy of the Program. Ancillary propagation of a covered work
|
||||
occurring solely as a consequence of using peer-to-peer transmission
|
||||
to receive a copy likewise does not require acceptance. However,
|
||||
nothing other than this License grants you permission to propagate or
|
||||
modify any covered work. These actions infringe copyright if you do
|
||||
not accept this License. Therefore, by modifying or propagating a
|
||||
covered work, you indicate your acceptance of this License to do so.
|
||||
|
||||
10. Automatic Licensing of Downstream Recipients.
|
||||
|
||||
Each time you convey a covered work, the recipient automatically
|
||||
receives a license from the original licensors, to run, modify and
|
||||
propagate that work, subject to this License. You are not responsible
|
||||
for enforcing compliance by third parties with this License.
|
||||
|
||||
An "entity transaction" is a transaction transferring control of an
|
||||
organization, or substantially all assets of one, or subdividing an
|
||||
organization, or merging organizations. If propagation of a covered
|
||||
work results from an entity transaction, each party to that
|
||||
transaction who receives a copy of the work also receives whatever
|
||||
licenses to the work the party's predecessor in interest had or could
|
||||
give under the previous paragraph, plus a right to possession of the
|
||||
Corresponding Source of the work from the predecessor in interest, if
|
||||
the predecessor has it or can get it with reasonable efforts.
|
||||
|
||||
You may not impose any further restrictions on the exercise of the
|
||||
rights granted or affirmed under this License. For example, you may
|
||||
not impose a license fee, royalty, or other charge for exercise of
|
||||
rights granted under this License, and you may not initiate litigation
|
||||
(including a cross-claim or counterclaim in a lawsuit) alleging that
|
||||
any patent claim is infringed by making, using, selling, offering for
|
||||
sale, or importing the Program or any portion of it.
|
||||
|
||||
11. Patents.
|
||||
|
||||
A "contributor" is a copyright holder who authorizes use under this
|
||||
License of the Program or a work on which the Program is based. The
|
||||
work thus licensed is called the contributor's "contributor version".
|
||||
|
||||
A contributor's "essential patent claims" are all patent claims
|
||||
owned or controlled by the contributor, whether already acquired or
|
||||
hereafter acquired, that would be infringed by some manner, permitted
|
||||
by this License, of making, using, or selling its contributor version,
|
||||
but do not include claims that would be infringed only as a
|
||||
consequence of further modification of the contributor version. For
|
||||
purposes of this definition, "control" includes the right to grant
|
||||
patent sublicenses in a manner consistent with the requirements of
|
||||
this License.
|
||||
|
||||
Each contributor grants you a non-exclusive, worldwide, royalty-free
|
||||
patent license under the contributor's essential patent claims, to
|
||||
make, use, sell, offer for sale, import and otherwise run, modify and
|
||||
propagate the contents of its contributor version.
|
||||
|
||||
In the following three paragraphs, a "patent license" is any express
|
||||
agreement or commitment, however denominated, not to enforce a patent
|
||||
(such as an express permission to practice a patent or covenant not to
|
||||
sue for patent infringement). To "grant" such a patent license to a
|
||||
party means to make such an agreement or commitment not to enforce a
|
||||
patent against the party.
|
||||
|
||||
If you convey a covered work, knowingly relying on a patent license,
|
||||
and the Corresponding Source of the work is not available for anyone
|
||||
to copy, free of charge and under the terms of this License, through a
|
||||
publicly available network server or other readily accessible means,
|
||||
then you must either (1) cause the Corresponding Source to be so
|
||||
available, or (2) arrange to deprive yourself of the benefit of the
|
||||
patent license for this particular work, or (3) arrange, in a manner
|
||||
consistent with the requirements of this License, to extend the patent
|
||||
license to downstream recipients. "Knowingly relying" means you have
|
||||
actual knowledge that, but for the patent license, your conveying the
|
||||
covered work in a country, or your recipient's use of the covered work
|
||||
in a country, would infringe one or more identifiable patents in that
|
||||
country that you have reason to believe are valid.
|
||||
|
||||
If, pursuant to or in connection with a single transaction or
|
||||
arrangement, you convey, or propagate by procuring conveyance of, a
|
||||
covered work, and grant a patent license to some of the parties
|
||||
receiving the covered work authorizing them to use, propagate, modify
|
||||
or convey a specific copy of the covered work, then the patent license
|
||||
you grant is automatically extended to all recipients of the covered
|
||||
work and works based on it.
|
||||
|
||||
A patent license is "discriminatory" if it does not include within
|
||||
the scope of its coverage, prohibits the exercise of, or is
|
||||
conditioned on the non-exercise of one or more of the rights that are
|
||||
specifically granted under this License. You may not convey a covered
|
||||
work if you are a party to an arrangement with a third party that is
|
||||
in the business of distributing software, under which you make payment
|
||||
to the third party based on the extent of your activity of conveying
|
||||
the work, and under which the third party grants, to any of the
|
||||
parties who would receive the covered work from you, a discriminatory
|
||||
patent license (a) in connection with copies of the covered work
|
||||
conveyed by you (or copies made from those copies), or (b) primarily
|
||||
for and in connection with specific products or compilations that
|
||||
contain the covered work, unless you entered into that arrangement,
|
||||
or that patent license was granted, prior to 28 March 2007.
|
||||
|
||||
Nothing in this License shall be construed as excluding or limiting
|
||||
any implied license or other defenses to infringement that may
|
||||
otherwise be available to you under applicable patent law.
|
||||
|
||||
12. No Surrender of Others' Freedom.
|
||||
|
||||
If conditions are imposed on you (whether by court order, agreement or
|
||||
otherwise) that contradict the conditions of this License, they do not
|
||||
excuse you from the conditions of this License. If you cannot convey a
|
||||
covered work so as to satisfy simultaneously your obligations under this
|
||||
License and any other pertinent obligations, then as a consequence you may
|
||||
not convey it at all. For example, if you agree to terms that obligate you
|
||||
to collect a royalty for further conveying from those to whom you convey
|
||||
the Program, the only way you could satisfy both those terms and this
|
||||
License would be to refrain entirely from conveying the Program.
|
||||
|
||||
13. Use with the GNU Affero General Public License.
|
||||
|
||||
Notwithstanding any other provision of this License, you have
|
||||
permission to link or combine any covered work with a work licensed
|
||||
under version 3 of the GNU Affero General Public License into a single
|
||||
combined work, and to convey the resulting work. The terms of this
|
||||
License will continue to apply to the part which is the covered work,
|
||||
but the special requirements of the GNU Affero General Public License,
|
||||
section 13, concerning interaction through a network will apply to the
|
||||
combination as such.
|
||||
|
||||
14. Revised Versions of this License.
|
||||
|
||||
The Free Software Foundation may publish revised and/or new versions of
|
||||
the GNU General Public License from time to time. Such new versions will
|
||||
be similar in spirit to the present version, but may differ in detail to
|
||||
address new problems or concerns.
|
||||
|
||||
Each version is given a distinguishing version number. If the
|
||||
Program specifies that a certain numbered version of the GNU General
|
||||
Public License "or any later version" applies to it, you have the
|
||||
option of following the terms and conditions either of that numbered
|
||||
version or of any later version published by the Free Software
|
||||
Foundation. If the Program does not specify a version number of the
|
||||
GNU General Public License, you may choose any version ever published
|
||||
by the Free Software Foundation.
|
||||
|
||||
If the Program specifies that a proxy can decide which future
|
||||
versions of the GNU General Public License can be used, that proxy's
|
||||
public statement of acceptance of a version permanently authorizes you
|
||||
to choose that version for the Program.
|
||||
|
||||
Later license versions may give you additional or different
|
||||
permissions. However, no additional obligations are imposed on any
|
||||
author or copyright holder as a result of your choosing to follow a
|
||||
later version.
|
||||
|
||||
15. Disclaimer of Warranty.
|
||||
|
||||
THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY
|
||||
APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT
|
||||
HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY
|
||||
OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO,
|
||||
THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
||||
PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM
|
||||
IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF
|
||||
ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
|
||||
|
||||
16. Limitation of Liability.
|
||||
|
||||
IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
|
||||
WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS
|
||||
THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY
|
||||
GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE
|
||||
USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF
|
||||
DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD
|
||||
PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS),
|
||||
EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF
|
||||
SUCH DAMAGES.
|
||||
|
||||
17. Interpretation of Sections 15 and 16.
|
||||
|
||||
If the disclaimer of warranty and limitation of liability provided
|
||||
above cannot be given local legal effect according to their terms,
|
||||
reviewing courts shall apply local law that most closely approximates
|
||||
an absolute waiver of all civil liability in connection with the
|
||||
Program, unless a warranty or assumption of liability accompanies a
|
||||
copy of the Program in return for a fee.
|
||||
|
||||
END OF TERMS AND CONDITIONS
|
||||
|
||||
How to Apply These Terms to Your New Programs
|
||||
|
||||
If you develop a new program, and you want it to be of the greatest
|
||||
possible use to the public, the best way to achieve this is to make it
|
||||
free software which everyone can redistribute and change under these terms.
|
||||
|
||||
To do so, attach the following notices to the program. It is safest
|
||||
to attach them to the start of each source file to most effectively
|
||||
state the exclusion of warranty; and each file should have at least
|
||||
the "copyright" line and a pointer to where the full notice is found.
|
||||
|
||||
<one line to give the program's name and a brief idea of what it does.>
|
||||
Copyright (C) <year> <name of author>
|
||||
|
||||
This program is free software: you can redistribute it and/or modify
|
||||
it under the terms of the GNU General Public License as published by
|
||||
the Free Software Foundation, either version 3 of the License, or
|
||||
(at your option) any later version.
|
||||
|
||||
This program is distributed in the hope that it will be useful,
|
||||
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
GNU General Public License for more details.
|
||||
|
||||
You should have received a copy of the GNU General Public License
|
||||
along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||
|
||||
Also add information on how to contact you by electronic and paper mail.
|
||||
|
||||
If the program does terminal interaction, make it output a short
|
||||
notice like this when it starts in an interactive mode:
|
||||
|
||||
<program> Copyright (C) <year> <name of author>
|
||||
This program comes with ABSOLUTELY NO WARRANTY; for details type `show w'.
|
||||
This is free software, and you are welcome to redistribute it
|
||||
under certain conditions; type `show c' for details.
|
||||
|
||||
The hypothetical commands `show w' and `show c' should show the appropriate
|
||||
parts of the General Public License. Of course, your program's commands
|
||||
might be different; for a GUI interface, you would use an "about box".
|
||||
|
||||
You should also get your employer (if you work as a programmer) or school,
|
||||
if any, to sign a "copyright disclaimer" for the program, if necessary.
|
||||
For more information on this, and how to apply and follow the GNU GPL, see
|
||||
<http://www.gnu.org/licenses/>.
|
||||
|
||||
The GNU General Public License does not permit incorporating your program
|
||||
into proprietary programs. If your program is a subroutine library, you
|
||||
may consider it more useful to permit linking proprietary applications with
|
||||
the library. If this is what you want to do, use the GNU Lesser General
|
||||
Public License instead of this License. But first, please read
|
||||
<http://www.gnu.org/philosophy/why-not-lgpl.html>.
|
267
adb2usb/adb2uart/Makefile
Normal file
267
adb2usb/adb2uart/Makefile
Normal file
@ -0,0 +1,267 @@
|
||||
# Hey Emacs, this is a -*- makefile -*-
|
||||
|
||||
# AVR-GCC Makefile template, derived from the WinAVR template (which
|
||||
# is public domain), believed to be neutral to any flavor of "make"
|
||||
# (GNU make, BSD make, SysV make)
|
||||
|
||||
|
||||
MCU = attiny2313
|
||||
FORMAT = ihex
|
||||
TARGET = adb2uart
|
||||
SRC = main.c adb.c
|
||||
DEPS=
|
||||
ASRC =
|
||||
OPT = s
|
||||
|
||||
# Name of this Makefile (used for "make depend").
|
||||
MAKEFILE = Makefile
|
||||
|
||||
# Debugging format.
|
||||
# Native formats for AVR-GCC's -g are stabs [default], or dwarf-2.
|
||||
# AVR (extended) COFF requires stabs, plus an avr-objcopy run.
|
||||
DEBUG = stabs
|
||||
|
||||
# Compiler flag to set the C Standard level.
|
||||
# c89 - "ANSI" C
|
||||
# gnu89 - c89 plus GCC extensions
|
||||
# c99 - ISO C99 standard (not yet fully implemented)
|
||||
# gnu99 - c99 plus GCC extensions
|
||||
CSTANDARD = -std=gnu99
|
||||
|
||||
# Place -D or -U options here
|
||||
CDEFS =
|
||||
|
||||
# Place -I options here
|
||||
CINCS =
|
||||
|
||||
|
||||
CDEBUG = -g$(DEBUG)
|
||||
CWARN = -Wall -Wstrict-prototypes
|
||||
CTUNING = -funsigned-char -funsigned-bitfields -fpack-struct -fshort-enums -fno-inline-small-functions
|
||||
#CEXTRA = -Wa,-adhlns=$(<:.c=.lst)
|
||||
CFLAGS = $(CDEBUG) $(CDEFS) $(CINCS) -O$(OPT) $(CWARN) $(CSTANDARD) $(CEXTRA) $(CTUNING)
|
||||
|
||||
|
||||
#ASFLAGS = -Wa,-adhlns=$(<:.S=.lst),-gstabs
|
||||
|
||||
|
||||
#Additional libraries.
|
||||
|
||||
# Minimalistic printf version
|
||||
PRINTF_LIB_MIN = -Wl,-u,vfprintf -lprintf_min
|
||||
|
||||
# Floating point printf version (requires MATH_LIB = -lm below)
|
||||
PRINTF_LIB_FLOAT = -Wl,-u,vfprintf -lprintf_flt
|
||||
|
||||
#PRINTF_LIB = $(PRINTF_LIB_MIN)
|
||||
|
||||
# Minimalistic scanf version
|
||||
SCANF_LIB_MIN = -Wl,-u,vfscanf -lscanf_min
|
||||
|
||||
# Floating point + %[ scanf version (requires MATH_LIB = -lm below)
|
||||
SCANF_LIB_FLOAT = -Wl,-u,vfscanf -lscanf_flt
|
||||
|
||||
SCANF_LIB =
|
||||
|
||||
#MATH_LIB = -lm
|
||||
|
||||
# External memory options
|
||||
|
||||
# 64 KB of external RAM, starting after internal RAM (ATmega128!),
|
||||
# used for variables (.data/.bss) and heap (malloc()).
|
||||
#EXTMEMOPTS = -Wl,--section-start,.data=0x801100,--defsym=__heap_end=0x80ffff
|
||||
|
||||
# 64 KB of external RAM, starting after internal RAM (ATmega128!),
|
||||
# only used for heap (malloc()).
|
||||
#EXTMEMOPTS = -Wl,--defsym=__heap_start=0x801100,--defsym=__heap_end=0x80ffff
|
||||
|
||||
EXTMEMOPTS =
|
||||
|
||||
#LDMAP = $(LDFLAGS) -Wl,-Map=$(TARGET).map,--cref
|
||||
LDFLAGS = $(EXTMEMOPTS) $(LDMAP) $(PRINTF_LIB) $(SCANF_LIB) $(MATH_LIB)
|
||||
|
||||
|
||||
# Programming support using avrdude. Settings and variables.
|
||||
|
||||
#AVRDUDE_PROGRAMMER = bsd
|
||||
AVRDUDE_PROGRAMMER = usbasp
|
||||
AVRDUDE_PORT = /dev/parport0
|
||||
|
||||
AVRDUDE_WRITE_FLASH = -U flash:w:$(TARGET).hex
|
||||
#AVRDUDE_WRITE_EEPROM = -U eeprom:w:$(TARGET).eep
|
||||
|
||||
|
||||
# Uncomment the following if you want avrdude's erase cycle counter.
|
||||
# Note that this counter needs to be initialized first using -Yn,
|
||||
# see avrdude manual.
|
||||
#AVRDUDE_ERASE_COUNTER = -y
|
||||
|
||||
# Uncomment the following if you do /not/ wish a verification to be
|
||||
# performed after programming the device.
|
||||
#AVRDUDE_NO_VERIFY = -V
|
||||
|
||||
# Increase verbosity level. Please use this when submitting bug
|
||||
# reports about avrdude. See <http://savannah.nongnu.org/projects/avrdude>
|
||||
# to submit bug reports.
|
||||
#AVRDUDE_VERBOSE = -v -v
|
||||
|
||||
AVRDUDE_BASIC = -p $(MCU) -P $(AVRDUDE_PORT) -c $(AVRDUDE_PROGRAMMER)
|
||||
AVRDUDE_FLAGS = $(AVRDUDE_BASIC) $(AVRDUDE_NO_VERIFY) $(AVRDUDE_VERBOSE) $(AVRDUDE_ERASE_COUNTER) -E noreset,vcc
|
||||
|
||||
|
||||
CC = avr-gcc
|
||||
OBJCOPY = avr-objcopy
|
||||
OBJDUMP = avr-objdump
|
||||
SIZE = avr-size
|
||||
NM = avr-nm
|
||||
AVRDUDE = avrdude
|
||||
REMOVE = rm -f
|
||||
MV = mv -f
|
||||
|
||||
# Define all object files.
|
||||
OBJ = $(DEPS) $(SRC:.c=.o) $(ASRC:.S=.o)
|
||||
|
||||
# Define all listing files.
|
||||
LST = $(ASRC:.S=.lst) $(SRC:.c=.lst)
|
||||
|
||||
# Combine all necessary flags and optional flags.
|
||||
# Add target processor to flags.
|
||||
ALL_CFLAGS = -mmcu=$(MCU) -I. $(CFLAGS)
|
||||
ALL_ASFLAGS = -mmcu=$(MCU) -I. -x assembler-with-cpp $(ASFLAGS)
|
||||
|
||||
|
||||
# Default target.
|
||||
all: build
|
||||
|
||||
build: elf hex eep
|
||||
|
||||
elf: $(TARGET).elf
|
||||
hex: $(TARGET).hex
|
||||
eep: $(TARGET).eep
|
||||
lss: $(TARGET).lss
|
||||
sym: $(TARGET).sym
|
||||
|
||||
|
||||
# Program the device.
|
||||
program: $(TARGET).hex $(TARGET).eep
|
||||
$(AVRDUDE) $(AVRDUDE_FLAGS) $(AVRDUDE_WRITE_FLASH) $(AVRDUDE_WRITE_EEPROM)
|
||||
|
||||
fw.h: firmware.bin
|
||||
bin2c fw < firmware.bin > fw.h
|
||||
|
||||
|
||||
# Convert ELF to COFF for use in debugging / simulating in AVR Studio or VMLAB.
|
||||
COFFCONVERT=$(OBJCOPY) --debugging \
|
||||
--change-section-address .data-0x800000 \
|
||||
--change-section-address .bss-0x800000 \
|
||||
--change-section-address .noinit-0x800000 \
|
||||
--change-section-address .eeprom-0x810000
|
||||
|
||||
|
||||
coff: $(TARGET).elf
|
||||
$(COFFCONVERT) -O coff-avr $(TARGET).elf $(TARGET).cof
|
||||
|
||||
|
||||
extcoff: $(TARGET).elf
|
||||
$(COFFCONVERT) -O coff-ext-avr $(TARGET).elf $(TARGET).cof
|
||||
|
||||
|
||||
.SUFFIXES: .elf .hex .eep .lss .sym
|
||||
|
||||
.elf.hex:
|
||||
$(OBJCOPY) -O $(FORMAT) -R .eeprom $< $@
|
||||
|
||||
.elf.eep:
|
||||
-$(OBJCOPY) -j .eeprom --set-section-flags=.eeprom="alloc,load" \
|
||||
--change-section-lma .eeprom=0 -O $(FORMAT) $< $@
|
||||
|
||||
# Create extended listing file from ELF output file.
|
||||
.elf.lss:
|
||||
$(OBJDUMP) -h -S $< > $@
|
||||
|
||||
# Create a symbol table from ELF output file.
|
||||
.elf.sym:
|
||||
$(NM) -n $< > $@
|
||||
|
||||
|
||||
|
||||
# Link: create ELF output file from object files.
|
||||
$(TARGET).elf: $(OBJ)
|
||||
$(CC) $(ALL_CFLAGS) $(OBJ) --output $@ $(LDFLAGS)
|
||||
|
||||
|
||||
# Compile: create object files from C source files.
|
||||
.c.o:
|
||||
$(CC) -c $(ALL_CFLAGS) $< -o $@
|
||||
|
||||
|
||||
# Compile: create assembler files from C source files.
|
||||
.c.s:
|
||||
$(CC) -S $(ALL_CFLAGS) $< -o $@
|
||||
|
||||
|
||||
# Assemble: create object files from assembler source files.
|
||||
.S.o:
|
||||
$(CC) -c $(ALL_ASFLAGS) $< -o $@
|
||||
|
||||
|
||||
|
||||
# Target: clean project.
|
||||
clean:
|
||||
$(REMOVE) $(TARGET).hex $(TARGET).eep $(TARGET).cof $(TARGET).elf \
|
||||
$(TARGET).map $(TARGET).sym $(TARGET).lss \
|
||||
$(OBJ) $(LST) $(SRC:.c=.s) $(SRC:.c=.d)
|
||||
|
||||
depend:
|
||||
if grep '^# DO NOT DELETE' $(MAKEFILE) >/dev/null; \
|
||||
then \
|
||||
sed -e '/^# DO NOT DELETE/,$$d' $(MAKEFILE) > \
|
||||
$(MAKEFILE).$$$$ && \
|
||||
$(MV) $(MAKEFILE).$$$$ $(MAKEFILE); \
|
||||
fi
|
||||
echo '# DO NOT DELETE THIS LINE -- make depend depends on it.' \
|
||||
>> $(MAKEFILE); \
|
||||
$(CC) -M -mmcu=$(MCU) $(CDEFS) $(CINCS) $(SRC) $(ASRC) >> $(MAKEFILE)
|
||||
|
||||
|
||||
.PHONY: all build elf hex eep lss sym program coff extcoff clean depend
|
||||
|
||||
|
||||
# DO NOT DELETE THIS LINE -- make depend depends on it.
|
||||
main.o: main.c /usr/lib/gcc/avr/4.3.4/../../../avr/include/util/delay.h \
|
||||
/usr/lib/gcc/avr/4.3.4/../../../avr/include/inttypes.h \
|
||||
/usr/lib/gcc/avr/4.3.4/../../../avr/include/stdint.h \
|
||||
/usr/lib/gcc/avr/4.3.4/../../../avr/include/util/delay_basic.h \
|
||||
/usr/lib/gcc/avr/4.3.4/../../../avr/include/avr/io.h \
|
||||
/usr/lib/gcc/avr/4.3.4/../../../avr/include/avr/sfr_defs.h \
|
||||
/usr/lib/gcc/avr/4.3.4/../../../avr/include/avr/iotn2313.h \
|
||||
/usr/lib/gcc/avr/4.3.4/../../../avr/include/avr/portpins.h \
|
||||
/usr/lib/gcc/avr/4.3.4/../../../avr/include/avr/common.h \
|
||||
/usr/lib/gcc/avr/4.3.4/../../../avr/include/avr/version.h \
|
||||
/usr/lib/gcc/avr/4.3.4/../../../avr/include/avr/fuse.h \
|
||||
/usr/lib/gcc/avr/4.3.4/../../../avr/include/avr/lock.h \
|
||||
/usr/lib/gcc/avr/4.3.4/../../../avr/include/avr/interrupt.h \
|
||||
/usr/lib/gcc/avr/4.3.4/../../../avr/include/stdio.h \
|
||||
/usr/lib/gcc/avr/4.3.4/include/stdarg.h \
|
||||
/usr/lib/gcc/avr/4.3.4/include/stddef.h \
|
||||
/usr/lib/gcc/avr/4.3.4/../../../avr/include/avr/pgmspace.h \
|
||||
/usr/lib/gcc/avr/4.3.4/../../../avr/include/string.h adb.h \
|
||||
scanadb2usb.h
|
||||
adb.o: adb.c /usr/lib/gcc/avr/4.3.4/../../../avr/include/util/delay.h \
|
||||
/usr/lib/gcc/avr/4.3.4/../../../avr/include/inttypes.h \
|
||||
/usr/lib/gcc/avr/4.3.4/../../../avr/include/stdint.h \
|
||||
/usr/lib/gcc/avr/4.3.4/../../../avr/include/util/delay_basic.h \
|
||||
/usr/lib/gcc/avr/4.3.4/../../../avr/include/avr/io.h \
|
||||
/usr/lib/gcc/avr/4.3.4/../../../avr/include/avr/sfr_defs.h \
|
||||
/usr/lib/gcc/avr/4.3.4/../../../avr/include/avr/iotn2313.h \
|
||||
/usr/lib/gcc/avr/4.3.4/../../../avr/include/avr/portpins.h \
|
||||
/usr/lib/gcc/avr/4.3.4/../../../avr/include/avr/common.h \
|
||||
/usr/lib/gcc/avr/4.3.4/../../../avr/include/avr/version.h \
|
||||
/usr/lib/gcc/avr/4.3.4/../../../avr/include/avr/fuse.h \
|
||||
/usr/lib/gcc/avr/4.3.4/../../../avr/include/avr/lock.h \
|
||||
/usr/lib/gcc/avr/4.3.4/../../../avr/include/avr/interrupt.h \
|
||||
/usr/lib/gcc/avr/4.3.4/../../../avr/include/stdio.h \
|
||||
/usr/lib/gcc/avr/4.3.4/include/stdarg.h \
|
||||
/usr/lib/gcc/avr/4.3.4/include/stddef.h \
|
||||
/usr/lib/gcc/avr/4.3.4/../../../avr/include/avr/pgmspace.h \
|
||||
/usr/lib/gcc/avr/4.3.4/../../../avr/include/string.h adb.h
|
153
adb2usb/adb2uart/adb.c
Normal file
153
adb2usb/adb2uart/adb.c
Normal file
@ -0,0 +1,153 @@
|
||||
/*
|
||||
ADB to USB-converter, for a non-extended keyboard and a mouse
|
||||
Copyright (C) 2010 Jeroen Domburg
|
||||
|
||||
This program is free software: you can redistribute it and/or modify
|
||||
it under the terms of the GNU General Public License as published by
|
||||
the Free Software Foundation, either version 3 of the License, or
|
||||
(at your option) any later version.
|
||||
|
||||
This program is distributed in the hope that it will be useful,
|
||||
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
GNU General Public License for more details.
|
||||
|
||||
You should have received a copy of the GNU General Public License
|
||||
along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||
*/
|
||||
#define F_CPU 12000000
|
||||
#include <util/delay.h>
|
||||
#include <avr/io.h>
|
||||
#include <avr/interrupt.h>
|
||||
#include <stdio.h>
|
||||
#include <avr/pgmspace.h>
|
||||
#include <string.h>
|
||||
#include "adb.h"
|
||||
|
||||
|
||||
#define ADB_H() DDRB&=~(1<<ADBPIN)
|
||||
#define ADB_L() DDRB|=(1<<ADBPIN)
|
||||
#define ADBVAL (PINB&(1<<ADBPIN))
|
||||
|
||||
static void adbSendOne(void) {
|
||||
ADB_L();
|
||||
_delay_us(35);
|
||||
ADB_H();
|
||||
_delay_us(65);
|
||||
}
|
||||
|
||||
static void adbSendZero(void) {
|
||||
ADB_L();
|
||||
_delay_us(65);
|
||||
ADB_H();
|
||||
_delay_us(35);
|
||||
}
|
||||
|
||||
static void adbAttnSync(void) {
|
||||
ADB_L();
|
||||
_delay_us(800);
|
||||
ADB_H();
|
||||
_delay_us(70);
|
||||
}
|
||||
|
||||
static void adbSendByte(unsigned char byte) {
|
||||
unsigned char p;
|
||||
for (p=0; p<8; p++) {
|
||||
if (byte&128) adbSendOne(); else adbSendZero();
|
||||
byte<<=1;
|
||||
}
|
||||
}
|
||||
|
||||
//Includes stop byte
|
||||
static void adbSendTlt(void) {
|
||||
adbSendZero();
|
||||
ADB_H();
|
||||
// _delay_us(165); //165 is according to spec
|
||||
_delay_us(100);
|
||||
}
|
||||
|
||||
static char adbWaitStart(void) {
|
||||
int x=200;
|
||||
//Wait till line goes low.
|
||||
_delay_us(1);
|
||||
while (ADBVAL && x>0) {
|
||||
x--;
|
||||
_delay_us(1);
|
||||
}
|
||||
if (x==0) return 0;
|
||||
|
||||
//Delay for the low time of the start bit
|
||||
_delay_us(40);
|
||||
//Should be high again...
|
||||
if (!ADBVAL) return 0;
|
||||
//Wait till the line goes low again for the 1st databit.
|
||||
while(ADBVAL && x>0) {
|
||||
x--;
|
||||
_delay_us(1);
|
||||
}
|
||||
if (x==0) return 0;
|
||||
//Ok, all good.
|
||||
return 1;
|
||||
}
|
||||
|
||||
static char adbGetBit(void) {
|
||||
char res=0;
|
||||
int x;
|
||||
// DDRD|=(1<<3);
|
||||
// PIND=(1<<3);
|
||||
_delay_us(50);
|
||||
// PIND=(1<<3);
|
||||
if (ADBVAL) res=1;
|
||||
x=80;
|
||||
while(!ADBVAL && x>0) {
|
||||
_delay_us(1);
|
||||
x--;
|
||||
}
|
||||
while(ADBVAL && x>0) {
|
||||
_delay_us(1);
|
||||
x--;
|
||||
}
|
||||
if (x==0) return -1;
|
||||
return res;
|
||||
}
|
||||
|
||||
static unsigned char adbGetByte(void) {
|
||||
unsigned char ret, b, x;
|
||||
for (x=0; x<8; x++) {
|
||||
ret<<=1;
|
||||
b=adbGetBit();
|
||||
if (b==-1) return 0xff;
|
||||
if (b==1) ret|=1;
|
||||
}
|
||||
return ret;
|
||||
}
|
||||
|
||||
|
||||
int adbCommand(unsigned char cmd, unsigned char *data, int size) {
|
||||
int x;
|
||||
adbAttnSync();
|
||||
adbSendByte(cmd);
|
||||
adbSendTlt();
|
||||
if (cmd&C_TALK) {
|
||||
//Device writes data
|
||||
if (!adbWaitStart()) return -1;
|
||||
for (x=0; x<size; x++) data[x]=adbGetByte();
|
||||
} else {
|
||||
//We write data.
|
||||
_delay_us(200);
|
||||
adbSendOne();
|
||||
for (x=0; x<size; x++) adbSendByte(data[x]);
|
||||
adbSendOne();
|
||||
}
|
||||
return size;
|
||||
}
|
||||
|
||||
void adbReset(void) {
|
||||
PORTD&=~(1<<ADBPIN);
|
||||
|
||||
//Reset bus
|
||||
ADB_L();
|
||||
_delay_ms(3);
|
||||
ADB_H();
|
||||
_delay_ms(2);
|
||||
}
|
16
adb2usb/adb2uart/adb.h
Normal file
16
adb2usb/adb2uart/adb.h
Normal file
@ -0,0 +1,16 @@
|
||||
#define C_TALK 0xC
|
||||
#define C_LISTN 0x8
|
||||
#define C_RESET 0x0 //?
|
||||
#define C_FLUSH 0x1 //?
|
||||
|
||||
#define REG_0 0
|
||||
#define REG_1 1
|
||||
#define REG_2 2
|
||||
#define REG_3 3
|
||||
|
||||
//PB6
|
||||
#define ADBPIN 6
|
||||
|
||||
|
||||
int adbCommand(unsigned char cmd, unsigned char *data, int size);
|
||||
void adbReset();
|
108
adb2usb/adb2uart/exsc/scanadb2usb.h
Normal file
108
adb2usb/adb2uart/exsc/scanadb2usb.h
Normal file
@ -0,0 +1,108 @@
|
||||
struct scanadb2usb_t {
|
||||
unsigned char adbcode;
|
||||
unsigned char usbcode;
|
||||
};
|
||||
|
||||
struct scanadb2usb_t scanadb2usb[] {
|
||||
{53, 41},
|
||||
{18, 30},
|
||||
{19, 31},
|
||||
{20, 32},
|
||||
{21, 33},
|
||||
{23, 34},
|
||||
{22, 35},
|
||||
{26, 36},
|
||||
{28, 37},
|
||||
{25, 38},
|
||||
{29, 39},
|
||||
{27, 45},
|
||||
{24, 46},
|
||||
{51, 42},
|
||||
{48, 43},
|
||||
{12, 20},
|
||||
{13, 26},
|
||||
{14, 8},
|
||||
{15, 21},
|
||||
{17, 23},
|
||||
{16, 28},
|
||||
{32, 24},
|
||||
{34, 12},
|
||||
{31, 18},
|
||||
{35, 19},
|
||||
{33, 47},
|
||||
{30, 48},
|
||||
{36, 40},
|
||||
{54, 224},
|
||||
{0, 4},
|
||||
{1, 22},
|
||||
{2, 7},
|
||||
{3, 9},
|
||||
{5, 10},
|
||||
{4, 11},
|
||||
{38, 13},
|
||||
{40, 14},
|
||||
{37, 15},
|
||||
{41, 51},
|
||||
{39, 52},
|
||||
{50, 53},
|
||||
{56, 225},
|
||||
{42, 49},
|
||||
{6, 29},
|
||||
{7, 27},
|
||||
{8, 6},
|
||||
{9, 25},
|
||||
{11, 5},
|
||||
{45, 17},
|
||||
{46, 16},
|
||||
{43, 54},
|
||||
{47, 55},
|
||||
{44, 56},
|
||||
{123, 229},
|
||||
{67, 85},
|
||||
{55, 226},
|
||||
{49, 44},
|
||||
{57, 57},
|
||||
{122, 58},
|
||||
{120, 59},
|
||||
{99, 60},
|
||||
{118, 61},
|
||||
{96, 62},
|
||||
{97, 63},
|
||||
{98, 64},
|
||||
{100, 65},
|
||||
{101, 66},
|
||||
{109, 67},
|
||||
{71, 83},
|
||||
{107, 71},
|
||||
{89, 95},
|
||||
{91, 96},
|
||||
{92, 97},
|
||||
{78, 86},
|
||||
{86, 92},
|
||||
{87, 93},
|
||||
{88, 94},
|
||||
{69, 87},
|
||||
{83, 89},
|
||||
{84, 90},
|
||||
{85, 91},
|
||||
{82, 98},
|
||||
{65, 99},
|
||||
{103, 68},
|
||||
{111, 69},
|
||||
{76, 88},
|
||||
{75, 84},
|
||||
{124, 230},
|
||||
{117, 76},
|
||||
{113, 72},
|
||||
{115, 74},
|
||||
{62, 82},
|
||||
{116, 75},
|
||||
{59, 80},
|
||||
{60, 79},
|
||||
{119, 77},
|
||||
{61, 81},
|
||||
{121, 78},
|
||||
{114, 73},
|
||||
{125, 228},
|
||||
{0,0}
|
||||
};
|
400
adb2usb/adb2uart/exsc/scancodes.h
Normal file
400
adb2usb/adb2uart/exsc/scancodes.h
Normal file
@ -0,0 +1,400 @@
|
||||
/*
|
||||
* scancodes.h Version 0.1
|
||||
*
|
||||
* Copyright (C) 1999 Vojtech Pavlik
|
||||
*/
|
||||
|
||||
/*
|
||||
* This program is free software; you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License as published by
|
||||
* the Free Software Foundation; either version 2 of the License, or
|
||||
* (at your option) any later version.
|
||||
*
|
||||
* This program is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
* GNU General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License
|
||||
* along with this program; if not, write to the Free Software
|
||||
* Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
|
||||
*
|
||||
* Should you need to contact me, the author, you can do so either by
|
||||
* e-mail - mail your message to <vojtech@ucw.cz>, or by paper mail:
|
||||
* Vojtech Pavlik, Ucitelska 1576, Prague 8, 182 00 Czech Republic
|
||||
*/
|
||||
|
||||
|
||||
struct scancode_list {
|
||||
unsigned char xt;
|
||||
unsigned char at2;
|
||||
unsigned char at3;
|
||||
unsigned char sun;
|
||||
unsigned char usb;
|
||||
unsigned char adb;
|
||||
unsigned char code;
|
||||
};
|
||||
|
||||
/*
|
||||
* The base set common to all keyboards - the XT keyboard.
|
||||
*/
|
||||
|
||||
static struct scancode_list scancodes[] = {
|
||||
|
||||
{0x01, 0x76, 0x08, 0x1d, 0x29, 0x35, 1}, /* Esc */
|
||||
{0x02, 0x16, 0x16, 0x1e, 0x1e, 0x12, 2}, /* 1 ! */
|
||||
{0x03, 0x1e, 0x1e, 0x1f, 0x1f, 0x13, 3}, /* 2 @ */
|
||||
{0x04, 0x26, 0x26, 0x20, 0x20, 0x14, 4}, /* 3 # */
|
||||
{0x05, 0x25, 0x25, 0x21, 0x21, 0x15, 5}, /* 4 $ */
|
||||
{0x06, 0x2e, 0x2e, 0x22, 0x22, 0x17, 6}, /* 5 % */
|
||||
{0x07, 0x36, 0x36, 0x23, 0x23, 0x16, 7}, /* 6 ^ */
|
||||
{0x08, 0x3d, 0x3d, 0x24, 0x24, 0x1a, 8}, /* 7 & */
|
||||
{0x09, 0x3e, 0x3e, 0x25, 0x25, 0x1c, 9}, /* 8 * */
|
||||
{0x0a, 0x46, 0x46, 0x26, 0x26, 0x19, 10}, /* 9 ( */
|
||||
{0x0b, 0x45, 0x45, 0x27, 0x27, 0x1d, 11}, /* 0 ) */
|
||||
{0x0c, 0x4e, 0x4e, 0x28, 0x2d, 0x1b, 12}, /* - _ */
|
||||
{0x0d, 0x55, 0x55, 0x29, 0x2e, 0x18, 13}, /* = + */
|
||||
{0x0e, 0x66, 0x66, 0x2b, 0x2a, 0x33, 14}, /* Backspace */
|
||||
{0x0f, 0x0d, 0x0d, 0x35, 0x2b, 0x30, 15}, /* Tab */
|
||||
{0x10, 0x15, 0x15, 0x36, 0x14, 0x0c, 16}, /* Q */
|
||||
{0x11, 0x1d, 0x1d, 0x37, 0x1a, 0x0d, 17}, /* W */
|
||||
{0x12, 0x24, 0x24, 0x38, 0x08, 0x0e, 18}, /* E */
|
||||
{0x13, 0x2d, 0x2d, 0x39, 0x15, 0x0f, 19}, /* R */
|
||||
{0x14, 0x2c, 0x2c, 0x3a, 0x17, 0x11, 20}, /* T */
|
||||
{0x15, 0x35, 0x35, 0x3b, 0x1c, 0x10, 21}, /* Y */
|
||||
{0x16, 0x3c, 0x3c, 0x3c, 0x18, 0x20, 22}, /* U */
|
||||
{0x17, 0x43, 0x43, 0x3d, 0x0c, 0x22, 23}, /* I */
|
||||
{0x18, 0x44, 0x44, 0x3e, 0x12, 0x1f, 24}, /* O */
|
||||
{0x19, 0x4d, 0x4d, 0x3f, 0x13, 0x23, 25}, /* P */
|
||||
{0x1a, 0x54, 0x54, 0x40, 0x2f, 0x21, 26}, /* [ { */
|
||||
{0x1b, 0x5b, 0x5b, 0x41, 0x30, 0x1e, 27}, /* ] } */
|
||||
{0x1c, 0x5a, 0x5a, 0x59, 0x28, 0x24, 28}, /* Enter */
|
||||
{0x1d, 0x14, 0x11, 0x4c, 0xe0, 0x36, 29}, /* Left Control */
|
||||
{0x1e, 0x1c, 0x1c, 0x4d, 0x04, 0x00, 30}, /* A */
|
||||
{0x1f, 0x1b, 0x1b, 0x4e, 0x16, 0x01, 31}, /* S */
|
||||
{0x20, 0x23, 0x23, 0x4f, 0x07, 0x02, 32}, /* D */
|
||||
{0x21, 0x2b, 0x2b, 0x50, 0x09, 0x03, 33}, /* F */
|
||||
{0x22, 0x34, 0x34, 0x51, 0x0a, 0x05, 34}, /* G */
|
||||
{0x23, 0x33, 0x33, 0x52, 0x0b, 0x04, 35}, /* H */
|
||||
{0x24, 0x3b, 0x3b, 0x53, 0x0d, 0x26, 36}, /* J */
|
||||
{0x25, 0x42, 0x42, 0x54, 0x0e, 0x28, 37}, /* K */
|
||||
{0x26, 0x4b, 0x4b, 0x55, 0x0f, 0x25, 38}, /* L */
|
||||
{0x27, 0x4c, 0x4c, 0x56, 0x33, 0x29, 39}, /* ; : */
|
||||
{0x28, 0x52, 0x52, 0x57, 0x34, 0x27, 40}, /* ' " */
|
||||
{0x29, 0x0e, 0x0e, 0x2a, 0x35, 0x32, 41}, /* ` ~ */
|
||||
{0x2a, 0x12, 0x12, 0x63, 0xe1, 0x38, 42}, /* Left Shift */
|
||||
{0x2b, 0x5d, 0x5c, 0x58, 0x31, 0x2a, 43}, /* \ | */
|
||||
{ 0, 0, 0x53, 0, 0, 0, 43}, /* \ | */
|
||||
{ 0, 0, 0x5d, 0, 0, 0, 43}, /* \ | */
|
||||
{0x2c, 0x1a, 0x1a, 0x64, 0x1d, 0x06, 44}, /* Z */
|
||||
{0x2d, 0x22, 0x22, 0x65, 0x1b, 0x07, 45}, /* X */
|
||||
{0x2e, 0x21, 0x21, 0x66, 0x06, 0x08, 46}, /* C */
|
||||
{0x2f, 0x2a, 0x2a, 0x67, 0x19, 0x09, 47}, /* V */
|
||||
{0x30, 0x32, 0x32, 0x68, 0x05, 0x0b, 48}, /* B */
|
||||
{0x31, 0x31, 0x31, 0x69, 0x11, 0x2d, 49}, /* N */
|
||||
{0x32, 0x3a, 0x3a, 0x6a, 0x10, 0x2e, 50}, /* M */
|
||||
{0x33, 0x41, 0x41, 0x6b, 0x36, 0x2b, 51}, /* , < */
|
||||
{0x34, 0x49, 0x49, 0x6c, 0x37, 0x2f, 52}, /* . > */
|
||||
{0x35, 0x4a, 0x4a, 0x6d, 0x38, 0x2c, 53}, /* / ? */
|
||||
{0x36, 0x59, 0x59, 0x6e, 0xe5, 0x7b, 54}, /* Right Shift */
|
||||
{0x37, 0x7c, 0x7e, 0x2f, 0x55, 0x43, 55}, /* KP * */
|
||||
{0x38, 0x11, 0x19, 0x13, 0xe2, 0x37, 56}, /* Left Alt */
|
||||
{0x39, 0x29, 0x29, 0x79, 0x2c, 0x31, 57}, /* Space */
|
||||
{0x3a, 0x58, 0x14, 0x77, 0x39, 0x39, 58}, /* Caps Lock */
|
||||
{0x3b, 0x05, 0x07, 0x05, 0x3a, 0x7a, 59}, /* F1 */
|
||||
{0x3c, 0x06, 0x0f, 0x06, 0x3b, 0x78, 60}, /* F2 */
|
||||
{0x3d, 0x04, 0x17, 0x08, 0x3c, 0x63, 61}, /* F3 */
|
||||
{0x3e, 0x0c, 0x1f, 0x0a, 0x3d, 0x76, 62}, /* F4 */
|
||||
{0x3f, 0x03, 0x27, 0x0c, 0x3e, 0x60, 63}, /* F5 */
|
||||
{0x40, 0x0b, 0x2f, 0x0e, 0x3f, 0x61, 64}, /* F6 */
|
||||
{0x41, 0x02, 0x37, 0x10, 0x40, 0x62, 65}, /* F7 */
|
||||
{0x42, 0x0a, 0x3f, 0x11, 0x41, 0x64, 66}, /* F8 */
|
||||
{0x43, 0x01, 0x47, 0x12, 0x42, 0x65, 67}, /* F9 */
|
||||
{0x44, 0x09, 0x4f, 0x07, 0x43, 0x6d, 68}, /* F10 */
|
||||
{0x45, 0x77, 0x76, 0x62, 0x53, 0x47, 69}, /* Num Lock */
|
||||
{0x46, 0x7e, 0x5f, 0x17, 0x47, 0x6b, 70}, /* Scroll Lock Break */
|
||||
{0x47, 0x6c, 0x6c, 0x44, 0x5f, 0x59, 71}, /* KP Home 7 */
|
||||
{0x48, 0x75, 0x75, 0x45, 0x60, 0x5b, 72}, /* KP Up 8 */
|
||||
{0x49, 0x7d, 0x7d, 0x46, 0x61, 0x5c, 73}, /* KP PgUp 9 */
|
||||
{0x4a, 0x7b, 0x84, 0x47, 0x56, 0x4e, 74}, /* KP - */
|
||||
{0x4b, 0x6b, 0x6b, 0x5b, 0x5c, 0x56, 75}, /* KP Left 4 */
|
||||
{0x4c, 0x73, 0x73, 0x5c, 0x5d, 0x57, 76}, /* KP 5 */
|
||||
{0x4d, 0x74, 0x74, 0x5d, 0x5e, 0x58, 77}, /* KP Right 6 */
|
||||
{0x4e, 0x79, 0x7c, 0x7d, 0x57, 0x45, 78}, /* KP + */
|
||||
{0x4f, 0x69, 0x69, 0x70, 0x59, 0x53, 79}, /* KP End 1 */
|
||||
{0x50, 0x72, 0x72, 0x71, 0x5a, 0x54, 80}, /* KP Down 2 */
|
||||
{0x51, 0x7a, 0x7a, 0x72, 0x5b, 0x55, 81}, /* KP PgDn 3 */
|
||||
{0x52, 0x70, 0x70, 0x5e, 0x62, 0x52, 82}, /* KP Ins 0 */
|
||||
{0x53, 0x71, 0x71, 0x32, 0x63, 0x41, 83}, /* KP Del . */
|
||||
|
||||
/*
|
||||
* The most common extensions to the base.
|
||||
*/
|
||||
|
||||
{ 0, 0x78, 0x56, 0x09, 0x44, 0x67, 87}, /* F11 */
|
||||
{ 0, 0x07, 0x5e, 0x0b, 0x45, 0x6f, 88}, /* F12 */
|
||||
{ 0, 0xda, 0x79, 0x5a, 0x58, 0x4c, 96}, /* KP Enter */
|
||||
{ 0, 0xca, 0x77, 0x2e, 0x54, 0x4b, 98}, /* KP / */
|
||||
{ 0, 0x91, 0x39, 0x0d, 0xe6, 0x7c, 100}, /* Right Alt (Graph) */
|
||||
{ 0, 0, 0x58, 0, 0, 0, 100}, /* Alt Graph - Sun PS/2 Type 5 */
|
||||
{ 0, 0xf1, 0x64, 0x42, 0x4c, 0x75, 111}, /* Delete */
|
||||
{ 0, 0xfe, 0x62, 0x15, 0x48, 0x71, 119}, /* Pause Break */
|
||||
{ 0, 0xf7, 0, 0, 0, 0, 119}, /* Alternate Pause Break */
|
||||
|
||||
/*
|
||||
* The separate navigation keys
|
||||
*/
|
||||
|
||||
{ 0, 0xec, 0x6e, 0x34, 0x4a, 0x73, 102}, /* Home */
|
||||
{ 0, 0xf5, 0x63, 0x14, 0x52, 0x3e, 103}, /* Up */
|
||||
{ 0, 0xfd, 0x6f, 0x60, 0x4b, 0x74, 104}, /* Page Up */
|
||||
{ 0, 0xeb, 0x61, 0x18, 0x50, 0x3b, 105}, /* Left */
|
||||
{ 0, 0xf4, 0x6a, 0x1c, 0x4f, 0x3c, 106}, /* Right */
|
||||
{ 0, 0xe9, 0x65, 0x4a, 0x4d, 0x77, 107}, /* End */
|
||||
{ 0, 0xf2, 0x60, 0x1b, 0x51, 0x3d, 108}, /* Down */
|
||||
{ 0, 0xfa, 0x6d, 0x7b, 0x4e, 0x79, 109}, /* Page Down */
|
||||
{ 0, 0xf0, 0x67, 0x2c, 0x49, 0x72, 110}, /* Insert */
|
||||
|
||||
/*
|
||||
* The OS keys
|
||||
*/
|
||||
|
||||
{ 0, 0x9f, 0x8b, 0x78, 0xe3, 0, 125}, /* Left Meta (Win, Apple, Amiga) */
|
||||
{ 0, 0xa7, 0x8c, 0x7a, 0xe7, 0, 126}, /* Right Meta (Win, Apple, Amiga) */
|
||||
{ 0, 0xaf, 0x8d, 0x43, 0x65, 0, 127}, /* Compose (Application) */
|
||||
|
||||
/*
|
||||
* OS keys on a NCD PS/2 Sun keyboard
|
||||
*/
|
||||
|
||||
{ 0, 0, 0x40, 0, 0, 0, 125}, /* Left Meta (Win, Apple, Amiga) */
|
||||
{ 0, 0, 0x48, 0, 0, 0, 126}, /* Right Meta (Win, Apple, Amiga) */
|
||||
{ 0, 0, 0x39, 0, 0, 0, 127}, /* Compose (Application) */
|
||||
|
||||
/*
|
||||
* PrintScreen
|
||||
*/
|
||||
|
||||
{ 0, 0xfc, 0x57, 0x16, 0x46, 0, 99}, /* PrintScreen SysRq */
|
||||
|
||||
/*
|
||||
* Right Ctrl
|
||||
*/
|
||||
|
||||
{ 0, 0x94, 0x58, 0, 0xe4, 0x7d, 97}, /* Right Ctrl */
|
||||
|
||||
/*
|
||||
* The European 102nd key
|
||||
*/
|
||||
|
||||
{ 0, 0x61, 0x13, 0, 0x64, 0, 86}, /* the 102nd key */
|
||||
|
||||
/*
|
||||
* Sun function keys
|
||||
*/
|
||||
|
||||
{ 0, 0, 0x0a, 0x01, 0x78, 0, 128}, /* Stop */
|
||||
{ 0, 0, 0x0b, 0x03, 0x79, 0, 129}, /* Again */
|
||||
{ 0, 0, 0x0c, 0x19, 0, 0, 130}, /* Props */
|
||||
{ 0, 0, 0x10, 0x1a, 0x7a, 0, 131}, /* Undo */
|
||||
{ 0, 0, 0x13, 0x31, 0, 0, 132}, /* Front */
|
||||
{ 0, 0, 0x18, 0x33, 0x7c, 0, 133}, /* Copy */
|
||||
{ 0, 0, 0x20, 0x48, 0, 0, 134}, /* Open */
|
||||
{ 0, 0, 0x28, 0x49, 0x7d, 0, 135}, /* Paste */
|
||||
{ 0, 0, 0x30, 0x5f, 0x7e, 0, 136}, /* Find */
|
||||
{ 0, 0, 0x38, 0x61, 0x7b, 0, 137}, /* Cut */
|
||||
{ 0, 0, 0x09, 0x76, 0x75, 0, 138}, /* Help */
|
||||
|
||||
|
||||
/*
|
||||
* Line Feed found on Sun Type 4 keyboard
|
||||
*/
|
||||
|
||||
{ 0, 0, 0, 0x6f, 0, 0, 101}, /* Line Feed */
|
||||
|
||||
/*
|
||||
* AT Enhanced keyboard in XT mode
|
||||
*/
|
||||
|
||||
{0x57, 0, 0, 0, 0, 0, 87}, /* F11 */
|
||||
{0x58, 0, 0, 0, 0, 0, 88}, /* F12 */
|
||||
|
||||
/*
|
||||
* PP-06 keyboard extension keys
|
||||
*/
|
||||
|
||||
{0x65, 0, 0, 0, 0, 0, 87}, /* F11 */
|
||||
{0x66, 0, 0, 0, 0, 0, 88}, /* F12 */
|
||||
{0x6b, 0, 0, 0, 0, 0, 110}, /* Insert */
|
||||
{0x6c, 0, 0, 0, 0, 0, 111}, /* Delete */
|
||||
{0x6d, 0, 0, 0, 0, 0, 103}, /* Up */
|
||||
{0x6e, 0, 0, 0, 0, 0, 108}, /* Down */
|
||||
{0x6f, 0, 0, 0, 0, 0, 105}, /* Left */
|
||||
{0x70, 0, 0, 0, 0, 0, 106}, /* Right */
|
||||
|
||||
/*
|
||||
* F13-F24, for USB and Focus 9000
|
||||
*/
|
||||
|
||||
{ 0, 0x60, 0, 0, 0x68, 0, 85}, /* F13 (PF1) */
|
||||
{ 0, 0x51, 0, 0, 0x69, 0, 89}, /* F14 (PF2) */
|
||||
{ 0, 0x62, 0, 0, 0x6a, 0, 90}, /* F15 (PF3) */
|
||||
{ 0, 0x63, 0, 0, 0x6b, 0, 91}, /* F16 (PF4) */
|
||||
{ 0, 0x64, 0, 0, 0x6c, 0, 92}, /* F17 (PF5) */
|
||||
{ 0, 0x65, 0, 0, 0x6d, 0, 93}, /* F18 (PF6) */
|
||||
{ 0, 0x67, 0, 0, 0x6e, 0, 94}, /* F19 (PF7) */
|
||||
{ 0, 0x68, 0, 0, 0x6f, 0, 95}, /* F20 (PF8) */
|
||||
{ 0, 0x53, 0, 0, 0x70, 0, 120}, /* F21 (PF9) */
|
||||
{ 0, 0x6d, 0, 0, 0x71, 0, 121}, /* F22 (PF10) */
|
||||
{ 0, 0x50, 0, 0, 0x72, 0, 122}, /* F23 (PF11) */
|
||||
{ 0, 0x6f, 0, 0, 0x73, 0, 123}, /* F24 (PF12) */
|
||||
|
||||
/*
|
||||
* F13-F17 for DEC LK450
|
||||
*/
|
||||
|
||||
{ 0, 0x84, 0, 0, 0, 0, 85}, /* F13 */
|
||||
{ 0, 0x8c, 0, 0, 0, 0, 89}, /* F14 */
|
||||
{ 0, 0x83, 0, 0, 0, 0, 90}, /* F15 */
|
||||
{ 0, 0x8b, 0, 0, 0, 0, 91}, /* F16 */
|
||||
{ 0, 0x82, 0, 0, 0, 0, 92}, /* F17 */
|
||||
|
||||
/*
|
||||
* A1-A4 for RC930
|
||||
*/
|
||||
|
||||
{ 0, 0x0f, 0, 0, 0, 0, 85}, /* A1 */
|
||||
{ 0, 0x17, 0, 0, 0, 0, 89}, /* A2 */
|
||||
{ 0, 0x1f, 0, 0, 0, 0, 90}, /* A3 */
|
||||
{ 0, 0x27, 0, 0, 0, 0, 91}, /* A4 */
|
||||
|
||||
/*
|
||||
* Unlabeled keys on the NCD Sun PS/2 keyboard
|
||||
*/
|
||||
|
||||
{ 0, 0, 0x7f, 0, 0, 0, 85}, /* U1 */
|
||||
{ 0, 0, 0x80, 0, 0, 0, 89}, /* U2 */
|
||||
{ 0, 0, 0x81, 0, 0, 0, 90}, /* U3 */
|
||||
{ 0, 0, 0x82, 0, 0, 0, 91}, /* U4 */
|
||||
{ 0, 0, 0x83, 0, 0, 0, 92}, /* U5 */
|
||||
|
||||
/*
|
||||
* Macro key on BTC and other keyboards
|
||||
*/
|
||||
|
||||
{ 0, 0xef, 0, 0, 0, 0, 112}, /* BTC Macro key */
|
||||
|
||||
/*
|
||||
* Logitech key on Logitech NewTouch
|
||||
*/
|
||||
|
||||
{ 0, 0xa8, 0x8e, 0, 0, 0, 112}, /* Logitech key */
|
||||
|
||||
/*
|
||||
* Omni key on NorthGate and Lueck keyboards
|
||||
*/
|
||||
|
||||
{ 0, 0xf3, 0, 0, 0, 0, 112}, /* NorthGate / Lueck Omni */
|
||||
|
||||
/*
|
||||
* Sound (NCD Sun PS/2 + Sun Type 5 keyboard)
|
||||
*/
|
||||
|
||||
{ 0, 0, 0x50, 0x2d, 0x7f, 0, 113}, /* Mute */
|
||||
{ 0, 0, 0x51, 0x02, 0x81, 0, 114}, /* Volume Down */
|
||||
{ 0, 0, 0x53, 0x04, 0x80, 0, 115}, /* Volume Up */
|
||||
|
||||
/*
|
||||
* Sound (BTC Ez multimedia keyboard)
|
||||
*/
|
||||
|
||||
{ 0, 0xcb, 0x9c, 0, 0, 0, 113}, /* Mute */
|
||||
{ 0, 0xc2, 0x9d, 0, 0, 0, 114}, /* Volume Down */
|
||||
{ 0, 0x9c, 0x95, 0, 0, 0, 115}, /* Volume Up */
|
||||