under constructiong

Dependencies:   mbed

Fork of BLE_WallbotBLE_Challenge by Yutaka Yoshida

Committer:
jksoft
Date:
Wed Nov 12 02:40:34 2014 +0000
Revision:
0:76dfa9657d9d
????????

Who changed what in which revision?

UserRevisionLine numberNew contents of line
jksoft 0:76dfa9657d9d 1 /**************************************************************************/
jksoft 0:76dfa9657d9d 2 /*!
jksoft 0:76dfa9657d9d 3 @file binary.h
jksoft 0:76dfa9657d9d 4 @author hathach (tinyusb.org)
jksoft 0:76dfa9657d9d 5
jksoft 0:76dfa9657d9d 6 @section LICENSE
jksoft 0:76dfa9657d9d 7
jksoft 0:76dfa9657d9d 8 Software License Agreement (BSD License)
jksoft 0:76dfa9657d9d 9
jksoft 0:76dfa9657d9d 10 Copyright (c) 2013, K. Townsend (microBuilder.eu)
jksoft 0:76dfa9657d9d 11 All rights reserved.
jksoft 0:76dfa9657d9d 12
jksoft 0:76dfa9657d9d 13 Redistribution and use in source and binary forms, with or without
jksoft 0:76dfa9657d9d 14 modification, are permitted provided that the following conditions are met:
jksoft 0:76dfa9657d9d 15 1. Redistributions of source code must retain the above copyright
jksoft 0:76dfa9657d9d 16 notice, this list of conditions and the following disclaimer.
jksoft 0:76dfa9657d9d 17 2. Redistributions in binary form must reproduce the above copyright
jksoft 0:76dfa9657d9d 18 notice, this list of conditions and the following disclaimer in the
jksoft 0:76dfa9657d9d 19 documentation and/or other materials provided with the distribution.
jksoft 0:76dfa9657d9d 20 3. Neither the name of the copyright holders nor the
jksoft 0:76dfa9657d9d 21 names of its contributors may be used to endorse or promote products
jksoft 0:76dfa9657d9d 22 derived from this software without specific prior written permission.
jksoft 0:76dfa9657d9d 23
jksoft 0:76dfa9657d9d 24 THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS ''AS IS'' AND ANY
jksoft 0:76dfa9657d9d 25 EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
jksoft 0:76dfa9657d9d 26 WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
jksoft 0:76dfa9657d9d 27 DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER BE LIABLE FOR ANY
jksoft 0:76dfa9657d9d 28 DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
jksoft 0:76dfa9657d9d 29 INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
jksoft 0:76dfa9657d9d 30 LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION HOWEVER CAUSED AND
jksoft 0:76dfa9657d9d 31 ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
jksoft 0:76dfa9657d9d 32 INCLUDING NEGLIGENCE OR OTHERWISE ARISING IN ANY WAY OUT OF THE USE OF THIS
jksoft 0:76dfa9657d9d 33 SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
jksoft 0:76dfa9657d9d 34 */
jksoft 0:76dfa9657d9d 35 /**************************************************************************/
jksoft 0:76dfa9657d9d 36
jksoft 0:76dfa9657d9d 37 /** \ingroup TBD
jksoft 0:76dfa9657d9d 38 * \defgroup TBD
jksoft 0:76dfa9657d9d 39 * \brief TBD
jksoft 0:76dfa9657d9d 40 *
jksoft 0:76dfa9657d9d 41 * @{
jksoft 0:76dfa9657d9d 42 */
jksoft 0:76dfa9657d9d 43
jksoft 0:76dfa9657d9d 44 #ifndef _BINARY_H_
jksoft 0:76dfa9657d9d 45 #define _BINARY_H_
jksoft 0:76dfa9657d9d 46
jksoft 0:76dfa9657d9d 47 #ifdef __cplusplus
jksoft 0:76dfa9657d9d 48 extern "C" {
jksoft 0:76dfa9657d9d 49 #endif
jksoft 0:76dfa9657d9d 50
jksoft 0:76dfa9657d9d 51 /// n-th Bit
jksoft 0:76dfa9657d9d 52 #define BIT(n) (1 << (n))
jksoft 0:76dfa9657d9d 53
jksoft 0:76dfa9657d9d 54 /// set n-th bit of x to 1
jksoft 0:76dfa9657d9d 55 #define BIT_SET(x, n) ( (x) | BIT(n) )
jksoft 0:76dfa9657d9d 56
jksoft 0:76dfa9657d9d 57 /// clear n-th bit of x
jksoft 0:76dfa9657d9d 58 #define BIT_CLR(x, n) ( (x) & (~BIT(n)) )
jksoft 0:76dfa9657d9d 59
jksoft 0:76dfa9657d9d 60 /// test n-th bit of x
jksoft 0:76dfa9657d9d 61 #define BIT_TEST(x, n) ( (x) & BIT(n) )
jksoft 0:76dfa9657d9d 62
jksoft 0:76dfa9657d9d 63 #if defined(__GNUC__) && !defined(__CC_ARM) // keil does not support binary format
jksoft 0:76dfa9657d9d 64
jksoft 0:76dfa9657d9d 65 #define BIN8(x) ((uint8_t) (0b##x))
jksoft 0:76dfa9657d9d 66 #define BIN16(b1, b2) ((uint16_t) (0b##b1##b2))
jksoft 0:76dfa9657d9d 67 #define BIN32(b1, b2, b3, b4) ((uint32_t) (0b##b1##b2##b3##b4))
jksoft 0:76dfa9657d9d 68
jksoft 0:76dfa9657d9d 69 #else
jksoft 0:76dfa9657d9d 70
jksoft 0:76dfa9657d9d 71 // internal macro of B8, B16, B32
jksoft 0:76dfa9657d9d 72 #define _B8__(x) (((x&0x0000000FUL)?1:0) \
jksoft 0:76dfa9657d9d 73 +((x&0x000000F0UL)?2:0) \
jksoft 0:76dfa9657d9d 74 +((x&0x00000F00UL)?4:0) \
jksoft 0:76dfa9657d9d 75 +((x&0x0000F000UL)?8:0) \
jksoft 0:76dfa9657d9d 76 +((x&0x000F0000UL)?16:0) \
jksoft 0:76dfa9657d9d 77 +((x&0x00F00000UL)?32:0) \
jksoft 0:76dfa9657d9d 78 +((x&0x0F000000UL)?64:0) \
jksoft 0:76dfa9657d9d 79 +((x&0xF0000000UL)?128:0))
jksoft 0:76dfa9657d9d 80
jksoft 0:76dfa9657d9d 81 #define BIN8(d) ((uint8_t) _B8__(0x##d##UL))
jksoft 0:76dfa9657d9d 82 #define BIN16(dmsb,dlsb) (((uint16_t)BIN8(dmsb)<<8) + BIN8(dlsb))
jksoft 0:76dfa9657d9d 83 #define BIN32(dmsb,db2,db3,dlsb) \
jksoft 0:76dfa9657d9d 84 (((uint32_t)BIN8(dmsb)<<24) \
jksoft 0:76dfa9657d9d 85 + ((uint32_t)BIN8(db2)<<16) \
jksoft 0:76dfa9657d9d 86 + ((uint32_t)BIN8(db3)<<8) \
jksoft 0:76dfa9657d9d 87 + BIN8(dlsb))
jksoft 0:76dfa9657d9d 88 #endif
jksoft 0:76dfa9657d9d 89
jksoft 0:76dfa9657d9d 90 #ifdef __cplusplus
jksoft 0:76dfa9657d9d 91 }
jksoft 0:76dfa9657d9d 92 #endif
jksoft 0:76dfa9657d9d 93
jksoft 0:76dfa9657d9d 94 #endif /* _BINARY_H_ */
jksoft 0:76dfa9657d9d 95
jksoft 0:76dfa9657d9d 96 /** @} */