Modularizando o src

Dependencies:   EALib EthernetInterface_vz mbed-rtos mbed

Fork of header_main_colinas_V0-20-09-14 by VZTECH

Revision:
100:09a23fcd3bdf
Parent:
99:e80850c51106
Child:
104:62646ef786a3
--- a/file_system_manager.cpp	Mon Jan 19 18:00:42 2015 +0000
+++ b/file_system_manager.cpp	Thu Feb 12 16:42:35 2015 +0000
@@ -105,14 +105,12 @@
 }
 
 void set_max_ext( int new_max_ext ){
-    debug_msg("");
     FILE * fmex = fopen( "/qspi/maxext.txt", "w" );
-    debug_msg("");
     if( fmex ){
         fprintf( fmex, "%i\n\r", new_max_ext );
-        debug_msg("");
+        //debug_msg("");
         fclose( fmex );
-        debug_msg("");
+        //debug_msg("");
     }
 }
 
@@ -131,13 +129,13 @@
     
     FILE *fp = fopen(fname, "r");
     if (fp == NULL) {
-        if( debug_file ) pc.printf( "Failed to open %s", fname);
+        if( debug_file ) if( debug_uart3 ) pc.printf( "Failed to open %s", fname);
         return;
     }
     
     while( ( num = fread( buff, 1, 512, fp ) ) > 0 ){
         buff[ num ] = '\0';
-        pc.printf( buff );
+        if( debug_uart3 ) pc.printf( buff );
         if( from_eth ){
             if( tcp_session ) while( !( tcp_client.send_all( buff, strlen( buff ) ) ) );
             
@@ -173,7 +171,7 @@
     // show files
     switch( type ){    
         case 's' : {
-            pc.printf("Header IP " );
+            if( debug_uart3 ) pc.printf("Header IP " );
             if( from_eth ){
                 snprintf( string_msg, __PROMPT_ETH_BUFFER_SIZE__, "Header IP " );
                 if( tcp_session ) while( !( tcp_client.send_all( string_msg, strlen( string_msg ) ) ) );
@@ -185,7 +183,7 @@
             
             cat("/qspi/myip.txt");
             
-            pc.printf("Header ext ");
+            if( debug_uart3 ) pc.printf("Header ext ");
             if( from_eth ){
                 snprintf( string_msg, __PROMPT_ETH_BUFFER_SIZE__, "Header ext " );
                 if( tcp_session ) while( !( tcp_client.send_all( string_msg, strlen( string_msg ) ) ) );
@@ -197,7 +195,7 @@
             
             cat("/qspi/myext.txt");
             
-            pc.printf("Header port ");
+            if( debug_uart3 ) pc.printf("Header port ");
             if( from_eth ){
                 snprintf( string_msg, __PROMPT_ETH_BUFFER_SIZE__, "Header port " );
                 if( tcp_session ) while( !( tcp_client.send_all( string_msg, strlen( string_msg ) ) ) );
@@ -209,7 +207,7 @@
             
             cat("/qspi/mysipport.txt");
             
-            pc.printf("Server IP ");
+            if( debug_uart3 ) pc.printf("Server IP ");
             if( from_eth ){
                 snprintf( string_msg, __PROMPT_ETH_BUFFER_SIZE__, "Server IP " );
                 if( tcp_session ) while( !( tcp_client.send_all( string_msg, strlen( string_msg ) ) ) );
@@ -221,7 +219,7 @@
             
             cat("/qspi/serverip.txt");
             
-            pc.printf("Server ext ");
+            if( debug_uart3 ) pc.printf("Server ext ");
             if( from_eth ){
                 snprintf( string_msg, __PROMPT_ETH_BUFFER_SIZE__, "Server ext " );
                 if( tcp_session ) while( !( tcp_client.send_all( string_msg, strlen( string_msg ) ) ) );
@@ -233,7 +231,7 @@
             
             cat("/qspi/peerext.txt");
             
-            pc.printf("Server port ");
+            if( debug_uart3 ) pc.printf("Server port ");
             if( from_eth ){
                 snprintf( string_msg, __PROMPT_ETH_BUFFER_SIZE__, "Server port " );
                 if( tcp_session ) while( !( tcp_client.send_all( string_msg, strlen( string_msg ) ) ) );
@@ -244,7 +242,7 @@
             }
             cat("/qspi/serverport.txt");
             
-            pc.printf("Mascara de rede ");
+            if( debug_uart3 ) pc.printf("Mascara de rede ");
             if( from_eth ){
                 snprintf( string_msg, __PROMPT_ETH_BUFFER_SIZE__, "Mascara de rede " );
                 if( tcp_session ) while( !( tcp_client.send_all( string_msg, strlen( string_msg ) ) ) );
@@ -255,7 +253,7 @@
             }
             cat("/qspi/mymask.txt");
             
-            pc.printf("Gateway IP ");
+            if( debug_uart3 ) pc.printf("Gateway IP ");
             if( from_eth ){
                 snprintf( string_msg, __PROMPT_ETH_BUFFER_SIZE__, "Gateway IP " );
                 if( tcp_session ) while( !( tcp_client.send_all( string_msg, strlen( string_msg ) ) ) );
@@ -266,7 +264,7 @@
             }
             cat("/qspi/mygateway.txt");
             
-            pc.printf("UDP Port ");
+            if( debug_uart3 ) pc.printf("UDP Port ");
             if( from_eth ){
                 snprintf( string_msg, __PROMPT_ETH_BUFFER_SIZE__, "UDP Port " );
                 if( tcp_session ) while( !( tcp_client.send_all( string_msg, strlen( string_msg ) ) ) );
@@ -278,7 +276,7 @@
             
             cat("/qspi/udpport.txt");
             
-            pc.printf("TCP Port ");
+            if( debug_uart3 ) pc.printf("TCP Port ");
             if( from_eth ){
                 snprintf( string_msg, __PROMPT_ETH_BUFFER_SIZE__, "TCP Port " );
                 if( tcp_session ) while( !( tcp_client.send_all( string_msg, strlen( string_msg ) ) ) );
@@ -290,7 +288,7 @@
             
             cat("/qspi/tcpport.txt");
             
-            pc.printf("Telemetry Server IP ");
+            if( debug_uart3 ) pc.printf("Telemetry Server IP ");
             if( from_eth ){
                 snprintf( string_msg, __PROMPT_ETH_BUFFER_SIZE__, "Telemetry Server IP " );
                 if( tcp_session ) while( !( tcp_client.send_all( string_msg, strlen( string_msg ) ) ) );
@@ -302,7 +300,7 @@
             
             cat("/qspi/telemetry_ip.txt");
             
-            pc.printf("Telemetry Server Port ");
+            if( debug_uart3 ) pc.printf("Telemetry Server Port ");
             if( from_eth ){
                 snprintf( string_msg, __PROMPT_ETH_BUFFER_SIZE__, "Telemetry Server Port " );
                 if( tcp_session ) while( !( tcp_client.send_all( string_msg, strlen( string_msg ) ) ) );