Changeset - ef4ae15f2661
[Not reviewed]
default
0 0 8
Drew Perttula - 10 years ago 2015-06-10 04:55:39
drewp@bigasterisk.com
copy in rgb led program for arduino
Ignore-this: ee63cf3e2100597625a4392bd95aba0d
8 files changed with 2035 insertions and 0 deletions:
0 comments (0 inline, 0 general)
rgbled/Adafruit_NeoPixel/Adafruit_NeoPixel.cpp
Show inline comments
 
new file 100644
 
/*-------------------------------------------------------------------------
 
  Arduino library to control a wide variety of WS2811- and WS2812-based RGB
 
  LED devices such as Adafruit FLORA RGB Smart Pixels and NeoPixel strips.
 
  Currently handles 400 and 800 KHz bitstreams on 8, 12 and 16 MHz ATmega
 
  MCUs, with LEDs wired for RGB or GRB color order.  8 MHz MCUs provide
 
  output on PORTB and PORTD, while 16 MHz chips can handle most output pins
 
  (possible exception with upper PORT registers on the Arduino Mega).
 

	
 
  Written by Phil Burgess / Paint Your Dragon for Adafruit Industries,
 
  contributions by PJRC and other members of the open source community.
 

	
 
  Adafruit invests time and resources providing this open source code,
 
  please support Adafruit and open-source hardware by purchasing products
 
  from Adafruit!
 

	
 
  -------------------------------------------------------------------------
 
  This file is part of the Adafruit NeoPixel library.
 

	
 
  NeoPixel is free software: you can redistribute it and/or modify
 
  it under the terms of the GNU Lesser General Public License as
 
  published by the Free Software Foundation, either version 3 of
 
  the License, or (at your option) any later version.
 

	
 
  NeoPixel is distributed in the hope that it will be useful,
 
  but WITHOUT ANY WARRANTY; without even the implied warranty of
 
  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 
  GNU Lesser General Public License for more details.
 

	
 
  You should have received a copy of the GNU Lesser General Public
 
  License along with NeoPixel.  If not, see
 
  <http://www.gnu.org/licenses/>.
 
  -------------------------------------------------------------------------*/
 

	
 
#include "Adafruit_NeoPixel.h"
 

	
 
Adafruit_NeoPixel::Adafruit_NeoPixel(uint16_t n, uint8_t p, uint8_t t) :
 
   numLEDs(n), numBytes(n * 3), pin(p), brightness(0),
 
   pixels(NULL), type(t), endTime(0)
 
#ifdef __AVR__
 
  ,port(portOutputRegister(digitalPinToPort(p))),
 
   pinMask(digitalPinToBitMask(p))
 
#endif
 
{
 
  if((pixels = (uint8_t *)malloc(numBytes))) {
 
    memset(pixels, 0, numBytes);
 
  }
 
  if(t & NEO_GRB) { // GRB vs RGB; might add others if needed
 
    rOffset = 1;
 
    gOffset = 0;
 
    bOffset = 2;
 
  } else if (t & NEO_BRG) {
 
    rOffset = 1;
 
    gOffset = 2;
 
    bOffset = 0;
 
  } else {
 
    rOffset = 0;
 
    gOffset = 1;
 
    bOffset = 2;
 
  }
 
  
 
}
 

	
 
Adafruit_NeoPixel::~Adafruit_NeoPixel() {
 
  if(pixels) free(pixels);
 
  pinMode(pin, INPUT);
 
}
 

	
 
void Adafruit_NeoPixel::begin(void) {
 
  pinMode(pin, OUTPUT);
 
  digitalWrite(pin, LOW);
 
}
 

	
 
void Adafruit_NeoPixel::show(void) {
 

	
 
  if(!pixels) return;
 

	
 
  // Data latch = 50+ microsecond pause in the output stream.  Rather than
 
  // put a delay at the end of the function, the ending time is noted and
 
  // the function will simply hold off (if needed) on issuing the
 
  // subsequent round of data until the latch time has elapsed.  This
 
  // allows the mainline code to start generating the next frame of data
 
  // rather than stalling for the latch.
 
  while(!canShow());
 
  // endTime is a private member (rather than global var) so that mutliple
 
  // instances on different pins can be quickly issued in succession (each
 
  // instance doesn't delay the next).
 

	
 
  // In order to make this code runtime-configurable to work with any pin,
 
  // SBI/CBI instructions are eschewed in favor of full PORT writes via the
 
  // OUT or ST instructions.  It relies on two facts: that peripheral
 
  // functions (such as PWM) take precedence on output pins, so our PORT-
 
  // wide writes won't interfere, and that interrupts are globally disabled
 
  // while data is being issued to the LEDs, so no other code will be
 
  // accessing the PORT.  The code takes an initial 'snapshot' of the PORT
 
  // state, computes 'pin high' and 'pin low' values, and writes these back
 
  // to the PORT register as needed.
 

	
 
  noInterrupts(); // Need 100% focus on instruction timing
 

	
 
#ifdef __AVR__
 

	
 
  volatile uint16_t
 
    i   = numBytes; // Loop counter
 
  volatile uint8_t
 
   *ptr = pixels,   // Pointer to next byte
 
    b   = *ptr++,   // Current byte value
 
    hi,             // PORT w/output bit set high
 
    lo;             // PORT w/output bit set low
 

	
 
  // Hand-tuned assembly code issues data to the LED drivers at a specific
 
  // rate.  There's separate code for different CPU speeds (8, 12, 16 MHz)
 
  // for both the WS2811 (400 KHz) and WS2812 (800 KHz) drivers.  The
 
  // datastream timing for the LED drivers allows a little wiggle room each
 
  // way (listed in the datasheets), so the conditions for compiling each
 
  // case are set up for a range of frequencies rather than just the exact
 
  // 8, 12 or 16 MHz values, permitting use with some close-but-not-spot-on
 
  // devices (e.g. 16.5 MHz DigiSpark).  The ranges were arrived at based
 
  // on the datasheet figures and have not been extensively tested outside
 
  // the canonical 8/12/16 MHz speeds; there's no guarantee these will work
 
  // close to the extremes (or possibly they could be pushed further).
 
  // Keep in mind only one CPU speed case actually gets compiled; the
 
  // resulting program isn't as massive as it might look from source here.
 

	
 
// 8 MHz(ish) AVR ---------------------------------------------------------
 
#if (F_CPU >= 7400000UL) && (F_CPU <= 9500000UL)
 

	
 
#ifdef NEO_KHZ400
 
  if((type & NEO_SPDMASK) == NEO_KHZ800) { // 800 KHz bitstream
 
#endif
 

	
 
    volatile uint8_t n1, n2 = 0;  // First, next bits out
 

	
 
    // Squeezing an 800 KHz stream out of an 8 MHz chip requires code
 
    // specific to each PORT register.  At present this is only written
 
    // to work with pins on PORTD or PORTB, the most likely use case --
 
    // this covers all the pins on the Adafruit Flora and the bulk of
 
    // digital pins on the Arduino Pro 8 MHz (keep in mind, this code
 
    // doesn't even get compiled for 16 MHz boards like the Uno, Mega,
 
    // Leonardo, etc., so don't bother extending this out of hand).
 
    // Additional PORTs could be added if you really need them, just
 
    // duplicate the else and loop and change the PORT.  Each add'l
 
    // PORT will require about 150(ish) bytes of program space.
 

	
 
    // 10 instruction clocks per bit: HHxxxxxLLL
 
    // OUT instructions:              ^ ^    ^   (T=0,2,7)
 

	
 
#ifdef PORTD // PORTD isn't present on ATtiny85, etc.
 

	
 
    if(port == &PORTD) {
 

	
 
      hi = PORTD |  pinMask;
 
      lo = PORTD & ~pinMask;
 
      n1 = lo;
 
      if(b & 0x80) n1 = hi;
 

	
 
      // Dirty trick: RJMPs proceeding to the next instruction are used
 
      // to delay two clock cycles in one instruction word (rather than
 
      // using two NOPs).  This was necessary in order to squeeze the
 
      // loop down to exactly 64 words -- the maximum possible for a
 
      // relative branch.
 

	
 
      asm volatile(
 
       "headD:"                   "\n\t" // Clk  Pseudocode
 
        // Bit 7:
 
        "out  %[port] , %[hi]"    "\n\t" // 1    PORT = hi
 
        "mov  %[n2]   , %[lo]"    "\n\t" // 1    n2   = lo
 
        "out  %[port] , %[n1]"    "\n\t" // 1    PORT = n1
 
        "rjmp .+0"                "\n\t" // 2    nop nop
 
        "sbrc %[byte] , 6"        "\n\t" // 1-2  if(b & 0x40)
 
         "mov %[n2]   , %[hi]"    "\n\t" // 0-1   n2 = hi
 
        "out  %[port] , %[lo]"    "\n\t" // 1    PORT = lo
 
        "rjmp .+0"                "\n\t" // 2    nop nop
 
        // Bit 6:
 
        "out  %[port] , %[hi]"    "\n\t" // 1    PORT = hi
 
        "mov  %[n1]   , %[lo]"    "\n\t" // 1    n1   = lo
 
        "out  %[port] , %[n2]"    "\n\t" // 1    PORT = n2
 
        "rjmp .+0"                "\n\t" // 2    nop nop
 
        "sbrc %[byte] , 5"        "\n\t" // 1-2  if(b & 0x20)
 
         "mov %[n1]   , %[hi]"    "\n\t" // 0-1   n1 = hi
 
        "out  %[port] , %[lo]"    "\n\t" // 1    PORT = lo
 
        "rjmp .+0"                "\n\t" // 2    nop nop
 
        // Bit 5:
 
        "out  %[port] , %[hi]"    "\n\t" // 1    PORT = hi
 
        "mov  %[n2]   , %[lo]"    "\n\t" // 1    n2   = lo
 
        "out  %[port] , %[n1]"    "\n\t" // 1    PORT = n1
 
        "rjmp .+0"                "\n\t" // 2    nop nop
 
        "sbrc %[byte] , 4"        "\n\t" // 1-2  if(b & 0x10)
 
         "mov %[n2]   , %[hi]"    "\n\t" // 0-1   n2 = hi
 
        "out  %[port] , %[lo]"    "\n\t" // 1    PORT = lo
 
        "rjmp .+0"                "\n\t" // 2    nop nop
 
        // Bit 4:
 
        "out  %[port] , %[hi]"    "\n\t" // 1    PORT = hi
 
        "mov  %[n1]   , %[lo]"    "\n\t" // 1    n1   = lo
 
        "out  %[port] , %[n2]"    "\n\t" // 1    PORT = n2
 
        "rjmp .+0"                "\n\t" // 2    nop nop
 
        "sbrc %[byte] , 3"        "\n\t" // 1-2  if(b & 0x08)
 
         "mov %[n1]   , %[hi]"    "\n\t" // 0-1   n1 = hi
 
        "out  %[port] , %[lo]"    "\n\t" // 1    PORT = lo
 
        "rjmp .+0"                "\n\t" // 2    nop nop
 
        // Bit 3:
 
        "out  %[port] , %[hi]"    "\n\t" // 1    PORT = hi
 
        "mov  %[n2]   , %[lo]"    "\n\t" // 1    n2   = lo
 
        "out  %[port] , %[n1]"    "\n\t" // 1    PORT = n1
 
        "rjmp .+0"                "\n\t" // 2    nop nop
 
        "sbrc %[byte] , 2"        "\n\t" // 1-2  if(b & 0x04)
 
         "mov %[n2]   , %[hi]"    "\n\t" // 0-1   n2 = hi
 
        "out  %[port] , %[lo]"    "\n\t" // 1    PORT = lo
 
        "rjmp .+0"                "\n\t" // 2    nop nop
 
        // Bit 2:
 
        "out  %[port] , %[hi]"    "\n\t" // 1    PORT = hi
 
        "mov  %[n1]   , %[lo]"    "\n\t" // 1    n1   = lo
 
        "out  %[port] , %[n2]"    "\n\t" // 1    PORT = n2
 
        "rjmp .+0"                "\n\t" // 2    nop nop
 
        "sbrc %[byte] , 1"        "\n\t" // 1-2  if(b & 0x02)
 
         "mov %[n1]   , %[hi]"    "\n\t" // 0-1   n1 = hi
 
        "out  %[port] , %[lo]"    "\n\t" // 1    PORT = lo
 
        "rjmp .+0"                "\n\t" // 2    nop nop
 
        // Bit 1:
 
        "out  %[port] , %[hi]"    "\n\t" // 1    PORT = hi
 
        "mov  %[n2]   , %[lo]"    "\n\t" // 1    n2   = lo
 
        "out  %[port] , %[n1]"    "\n\t" // 1    PORT = n1
 
        "rjmp .+0"                "\n\t" // 2    nop nop
 
        "sbrc %[byte] , 0"        "\n\t" // 1-2  if(b & 0x01)
 
         "mov %[n2]   , %[hi]"    "\n\t" // 0-1   n2 = hi
 
        "out  %[port] , %[lo]"    "\n\t" // 1    PORT = lo
 
        "sbiw %[count], 1"        "\n\t" // 2    i-- (don't act on Z flag yet)
 
        // Bit 0:
 
        "out  %[port] , %[hi]"    "\n\t" // 1    PORT = hi
 
        "mov  %[n1]   , %[lo]"    "\n\t" // 1    n1   = lo
 
        "out  %[port] , %[n2]"    "\n\t" // 1    PORT = n2
 
        "ld   %[byte] , %a[ptr]+" "\n\t" // 2    b = *ptr++
 
        "sbrc %[byte] , 7"        "\n\t" // 1-2  if(b & 0x80)
 
         "mov %[n1]   , %[hi]"    "\n\t" // 0-1   n1 = hi
 
        "out  %[port] , %[lo]"    "\n\t" // 1    PORT = lo
 
        "brne headD"              "\n"   // 2    while(i) (Z flag set above)
 
      : [byte]  "+r" (b),
 
        [n1]    "+r" (n1),
 
        [n2]    "+r" (n2),
 
        [count] "+w" (i)
 
      : [port]   "I" (_SFR_IO_ADDR(PORTD)),
 
        [ptr]    "e" (ptr),
 
        [hi]     "r" (hi),
 
        [lo]     "r" (lo));
 

	
 
    } else if(port == &PORTB) {
 

	
 
#endif // PORTD
 

	
 
      // Same as above, just switched to PORTB and stripped of comments.
 
      hi = PORTB |  pinMask;
 
      lo = PORTB & ~pinMask;
 
      n1 = lo;
 
      if(b & 0x80) n1 = hi;
 

	
 
      asm volatile(
 
       "headB:"                   "\n\t"
 
        "out  %[port] , %[hi]"    "\n\t"
 
        "mov  %[n2]   , %[lo]"    "\n\t"
 
        "out  %[port] , %[n1]"    "\n\t"
 
        "rjmp .+0"                "\n\t"
 
        "sbrc %[byte] , 6"        "\n\t"
 
         "mov %[n2]   , %[hi]"    "\n\t"
 
        "out  %[port] , %[lo]"    "\n\t"
 
        "rjmp .+0"                "\n\t"
 
        "out  %[port] , %[hi]"    "\n\t"
 
        "mov  %[n1]   , %[lo]"    "\n\t"
 
        "out  %[port] , %[n2]"    "\n\t"
 
        "rjmp .+0"                "\n\t"
 
        "sbrc %[byte] , 5"        "\n\t"
 
         "mov %[n1]   , %[hi]"    "\n\t"
 
        "out  %[port] , %[lo]"    "\n\t"
 
        "rjmp .+0"                "\n\t"
 
        "out  %[port] , %[hi]"    "\n\t"
 
        "mov  %[n2]   , %[lo]"    "\n\t"
 
        "out  %[port] , %[n1]"    "\n\t"
 
        "rjmp .+0"                "\n\t"
 
        "sbrc %[byte] , 4"        "\n\t"
 
         "mov %[n2]   , %[hi]"    "\n\t"
 
        "out  %[port] , %[lo]"    "\n\t"
 
        "rjmp .+0"                "\n\t"
 
        "out  %[port] , %[hi]"    "\n\t"
 
        "mov  %[n1]   , %[lo]"    "\n\t"
 
        "out  %[port] , %[n2]"    "\n\t"
 
        "rjmp .+0"                "\n\t"
 
        "sbrc %[byte] , 3"        "\n\t"
 
         "mov %[n1]   , %[hi]"    "\n\t"
 
        "out  %[port] , %[lo]"    "\n\t"
 
        "rjmp .+0"                "\n\t"
 
        "out  %[port] , %[hi]"    "\n\t"
 
        "mov  %[n2]   , %[lo]"    "\n\t"
 
        "out  %[port] , %[n1]"    "\n\t"
 
        "rjmp .+0"                "\n\t"
 
        "sbrc %[byte] , 2"        "\n\t"
 
         "mov %[n2]   , %[hi]"    "\n\t"
 
        "out  %[port] , %[lo]"    "\n\t"
 
        "rjmp .+0"                "\n\t"
 
        "out  %[port] , %[hi]"    "\n\t"
 
        "mov  %[n1]   , %[lo]"    "\n\t"
 
        "out  %[port] , %[n2]"    "\n\t"
 
        "rjmp .+0"                "\n\t"
 
        "sbrc %[byte] , 1"        "\n\t"
 
         "mov %[n1]   , %[hi]"    "\n\t"
 
        "out  %[port] , %[lo]"    "\n\t"
 
        "rjmp .+0"                "\n\t"
 
        "out  %[port] , %[hi]"    "\n\t"
 
        "mov  %[n2]   , %[lo]"    "\n\t"
 
        "out  %[port] , %[n1]"    "\n\t"
 
        "rjmp .+0"                "\n\t"
 
        "sbrc %[byte] , 0"        "\n\t"
 
         "mov %[n2]   , %[hi]"    "\n\t"
 
        "out  %[port] , %[lo]"    "\n\t"
 
        "sbiw %[count], 1"        "\n\t"
 
        "out  %[port] , %[hi]"    "\n\t"
 
        "mov  %[n1]   , %[lo]"    "\n\t"
 
        "out  %[port] , %[n2]"    "\n\t"
 
        "ld   %[byte] , %a[ptr]+" "\n\t"
 
        "sbrc %[byte] , 7"        "\n\t"
 
         "mov %[n1]   , %[hi]"    "\n\t"
 
        "out  %[port] , %[lo]"    "\n\t"
 
        "brne headB"              "\n"
 
      : [byte] "+r" (b), [n1] "+r" (n1), [n2] "+r" (n2), [count] "+w" (i)
 
      : [port] "I" (_SFR_IO_ADDR(PORTB)), [ptr] "e" (ptr), [hi] "r" (hi),
 
        [lo] "r" (lo));
 

	
 
#ifdef PORTD
 
    }    // endif PORTB
 
#endif
 

	
 
#ifdef NEO_KHZ400
 
  } else { // end 800 KHz, do 400 KHz
 

	
 
    // Timing is more relaxed; unrolling the inner loop for each bit is
 
    // not necessary.  Still using the peculiar RJMPs as 2X NOPs, not out
 
    // of need but just to trim the code size down a little.
 
    // This 400-KHz-datastream-on-8-MHz-CPU code is not quite identical
 
    // to the 800-on-16 code later -- the hi/lo timing between WS2811 and
 
    // WS2812 is not simply a 2:1 scale!
 

	
 
    // 20 inst. clocks per bit: HHHHxxxxxxLLLLLLLLLL
 
    // ST instructions:         ^   ^     ^          (T=0,4,10)
 

	
 
    volatile uint8_t next, bit;
 

	
 
    hi   = *port |  pinMask;
 
    lo   = *port & ~pinMask;
 
    next = lo;
 
    bit  = 8;
 

	
 
    asm volatile(
 
     "head20:"                  "\n\t" // Clk  Pseudocode    (T =  0)
 
      "st   %a[port], %[hi]"    "\n\t" // 2    PORT = hi     (T =  2)
 
      "sbrc %[byte] , 7"        "\n\t" // 1-2  if(b & 128)
 
       "mov  %[next], %[hi]"    "\n\t" // 0-1   next = hi    (T =  4)
 
      "st   %a[port], %[next]"  "\n\t" // 2    PORT = next   (T =  6)
 
      "mov  %[next] , %[lo]"    "\n\t" // 1    next = lo     (T =  7)
 
      "dec  %[bit]"             "\n\t" // 1    bit--         (T =  8)
 
      "breq nextbyte20"         "\n\t" // 1-2  if(bit == 0)
 
      "rol  %[byte]"            "\n\t" // 1    b <<= 1       (T = 10)
 
      "st   %a[port], %[lo]"    "\n\t" // 2    PORT = lo     (T = 12)
 
      "rjmp .+0"                "\n\t" // 2    nop nop       (T = 14)
 
      "rjmp .+0"                "\n\t" // 2    nop nop       (T = 16)
 
      "rjmp .+0"                "\n\t" // 2    nop nop       (T = 18)
 
      "rjmp head20"             "\n\t" // 2    -> head20 (next bit out)
 
     "nextbyte20:"              "\n\t" //                    (T = 10)
 
      "st   %a[port], %[lo]"    "\n\t" // 2    PORT = lo     (T = 12)
 
      "nop"                     "\n\t" // 1    nop           (T = 13)
 
      "ldi  %[bit]  , 8"        "\n\t" // 1    bit = 8       (T = 14)
 
      "ld   %[byte] , %a[ptr]+" "\n\t" // 2    b = *ptr++    (T = 16)
 
      "sbiw %[count], 1"        "\n\t" // 2    i--           (T = 18)
 
      "brne head20"             "\n"   // 2    if(i != 0) -> (next byte)
 
      : [port]  "+e" (port),
 
        [byte]  "+r" (b),
 
        [bit]   "+r" (bit),
 
        [next]  "+r" (next),
 
        [count] "+w" (i)
 
      : [hi]    "r" (hi),
 
        [lo]    "r" (lo),
 
        [ptr]   "e" (ptr));
 
  }
 
#endif
 

	
 
// 12 MHz(ish) AVR --------------------------------------------------------
 
#elif (F_CPU >= 11100000UL) && (F_CPU <= 14300000UL)
 

	
 
#ifdef NEO_KHZ400
 
  if((type & NEO_SPDMASK) == NEO_KHZ800) { // 800 KHz bitstream
 
#endif
 

	
 
    // In the 12 MHz case, an optimized 800 KHz datastream (no dead time
 
    // between bytes) requires a PORT-specific loop similar to the 8 MHz
 
    // code (but a little more relaxed in this case).
 

	
 
    // 15 instruction clocks per bit: HHHHxxxxxxLLLLL
 
    // OUT instructions:              ^   ^     ^     (T=0,4,10)
 

	
 
    volatile uint8_t next;
 

	
 
#ifdef PORTD
 

	
 
    if(port == &PORTD) {
 

	
 
      hi   = PORTD |  pinMask;
 
      lo   = PORTD & ~pinMask;
 
      next = lo;
 
      if(b & 0x80) next = hi;
 

	
 
      // Don't "optimize" the OUT calls into the bitTime subroutine;
 
      // we're exploiting the RCALL and RET as 3- and 4-cycle NOPs!
 
      asm volatile(
 
       "headD:"                   "\n\t" //        (T =  0)
 
        "out   %[port], %[hi]"    "\n\t" //        (T =  1)
 
        "rcall bitTimeD"          "\n\t" // Bit 7  (T = 15)
 
        "out   %[port], %[hi]"    "\n\t"
 
        "rcall bitTimeD"          "\n\t" // Bit 6
 
        "out   %[port], %[hi]"    "\n\t"
 
        "rcall bitTimeD"          "\n\t" // Bit 5
 
        "out   %[port], %[hi]"    "\n\t"
 
        "rcall bitTimeD"          "\n\t" // Bit 4
 
        "out   %[port], %[hi]"    "\n\t"
 
        "rcall bitTimeD"          "\n\t" // Bit 3
 
        "out   %[port], %[hi]"    "\n\t"
 
        "rcall bitTimeD"          "\n\t" // Bit 2
 
        "out   %[port], %[hi]"    "\n\t"
 
        "rcall bitTimeD"          "\n\t" // Bit 1
 
        // Bit 0:
 
        "out  %[port] , %[hi]"    "\n\t" // 1    PORT = hi    (T =  1)
 
        "rjmp .+0"                "\n\t" // 2    nop nop      (T =  3)
 
        "ld   %[byte] , %a[ptr]+" "\n\t" // 2    b = *ptr++   (T =  5)
 
        "out  %[port] , %[next]"  "\n\t" // 1    PORT = next  (T =  6)
 
        "mov  %[next] , %[lo]"    "\n\t" // 1    next = lo    (T =  7)
 
        "sbrc %[byte] , 7"        "\n\t" // 1-2  if(b & 0x80) (T =  8)
 
         "mov %[next] , %[hi]"    "\n\t" // 0-1    next = hi  (T =  9)
 
        "nop"                     "\n\t" // 1                 (T = 10)
 
        "out  %[port] , %[lo]"    "\n\t" // 1    PORT = lo    (T = 11)
 
        "sbiw %[count], 1"        "\n\t" // 2    i--          (T = 13)
 
        "brne headD"              "\n\t" // 2    if(i != 0) -> (next byte)
 
         "rjmp doneD"             "\n\t"
 
        "bitTimeD:"               "\n\t" //      nop nop nop     (T =  4)
 
         "out  %[port], %[next]"  "\n\t" // 1    PORT = next     (T =  5)
 
         "mov  %[next], %[lo]"    "\n\t" // 1    next = lo       (T =  6)
 
         "rol  %[byte]"           "\n\t" // 1    b <<= 1         (T =  7)
 
         "sbrc %[byte], 7"        "\n\t" // 1-2  if(b & 0x80)    (T =  8)
 
          "mov %[next], %[hi]"    "\n\t" // 0-1   next = hi      (T =  9)
 
         "nop"                    "\n\t" // 1                    (T = 10)
 
         "out  %[port], %[lo]"    "\n\t" // 1    PORT = lo       (T = 11)
 
         "ret"                    "\n\t" // 4    nop nop nop nop (T = 15)
 
         "doneD:"                 "\n"
 
        : [byte]  "+r" (b),
 
          [next]  "+r" (next),
 
          [count] "+w" (i)
 
        : [port]   "I" (_SFR_IO_ADDR(PORTD)),
 
          [ptr]    "e" (ptr),
 
          [hi]     "r" (hi),
 
          [lo]     "r" (lo));
 

	
 
    } else if(port == &PORTB) {
 

	
 
#endif // PORTD
 

	
 
      hi   = PORTB |  pinMask;
 
      lo   = PORTB & ~pinMask;
 
      next = lo;
 
      if(b & 0x80) next = hi;
 

	
 
      // Same as above, just set for PORTB & stripped of comments
 
      asm volatile(
 
       "headB:"                   "\n\t"
 
        "out   %[port], %[hi]"    "\n\t"
 
        "rcall bitTimeB"          "\n\t"
 
        "out   %[port], %[hi]"    "\n\t"
 
        "rcall bitTimeB"          "\n\t"
 
        "out   %[port], %[hi]"    "\n\t"
 
        "rcall bitTimeB"          "\n\t"
 
        "out   %[port], %[hi]"    "\n\t"
 
        "rcall bitTimeB"          "\n\t"
 
        "out   %[port], %[hi]"    "\n\t"
 
        "rcall bitTimeB"          "\n\t"
 
        "out   %[port], %[hi]"    "\n\t"
 
        "rcall bitTimeB"          "\n\t"
 
        "out   %[port], %[hi]"    "\n\t"
 
        "rcall bitTimeB"          "\n\t"
 
        "out  %[port] , %[hi]"    "\n\t"
 
        "rjmp .+0"                "\n\t"
 
        "ld   %[byte] , %a[ptr]+" "\n\t"
 
        "out  %[port] , %[next]"  "\n\t"
 
        "mov  %[next] , %[lo]"    "\n\t"
 
        "sbrc %[byte] , 7"        "\n\t"
 
         "mov %[next] , %[hi]"    "\n\t"
 
        "nop"                     "\n\t"
 
        "out  %[port] , %[lo]"    "\n\t"
 
        "sbiw %[count], 1"        "\n\t"
 
        "brne headB"              "\n\t"
 
         "rjmp doneB"             "\n\t"
 
        "bitTimeB:"               "\n\t"
 
         "out  %[port], %[next]"  "\n\t"
 
         "mov  %[next], %[lo]"    "\n\t"
 
         "rol  %[byte]"           "\n\t"
 
         "sbrc %[byte], 7"        "\n\t"
 
          "mov %[next], %[hi]"    "\n\t"
 
         "nop"                    "\n\t"
 
         "out  %[port], %[lo]"    "\n\t"
 
         "ret"                    "\n\t"
 
         "doneB:"                 "\n"
 
        : [byte] "+r" (b), [next] "+r" (next), [count] "+w" (i)
 
        : [port] "I" (_SFR_IO_ADDR(PORTB)), [ptr] "e" (ptr), [hi] "r" (hi),
 
          [lo] "r" (lo));
 

	
 
#ifdef PORTD
 
    }
 
#endif
 

	
 
#ifdef NEO_KHZ400
 
  } else { // 400 KHz
 

	
 
    // 30 instruction clocks per bit: HHHHHHxxxxxxxxxLLLLLLLLLLLLLLL
 
    // ST instructions:               ^     ^        ^    (T=0,6,15)
 

	
 
    volatile uint8_t next, bit;
 

	
 
    hi   = *port |  pinMask;
 
    lo   = *port & ~pinMask;
 
    next = lo;
 
    bit  = 8;
 

	
 
    asm volatile(
 
     "head30:"                  "\n\t" // Clk  Pseudocode    (T =  0)
 
      "st   %a[port], %[hi]"    "\n\t" // 2    PORT = hi     (T =  2)
 
      "sbrc %[byte] , 7"        "\n\t" // 1-2  if(b & 128)
 
       "mov  %[next], %[hi]"    "\n\t" // 0-1   next = hi    (T =  4)
 
      "rjmp .+0"                "\n\t" // 2    nop nop       (T =  6)
 
      "st   %a[port], %[next]"  "\n\t" // 2    PORT = next   (T =  8)
 
      "rjmp .+0"                "\n\t" // 2    nop nop       (T = 10)
 
      "rjmp .+0"                "\n\t" // 2    nop nop       (T = 12)
 
      "rjmp .+0"                "\n\t" // 2    nop nop       (T = 14)
 
      "nop"                     "\n\t" // 1    nop           (T = 15)
 
      "st   %a[port], %[lo]"    "\n\t" // 2    PORT = lo     (T = 17)
 
      "rjmp .+0"                "\n\t" // 2    nop nop       (T = 19)
 
      "dec  %[bit]"             "\n\t" // 1    bit--         (T = 20)
 
      "breq nextbyte30"         "\n\t" // 1-2  if(bit == 0)
 
      "rol  %[byte]"            "\n\t" // 1    b <<= 1       (T = 22)
 
      "rjmp .+0"                "\n\t" // 2    nop nop       (T = 24)
 
      "rjmp .+0"                "\n\t" // 2    nop nop       (T = 26)
 
      "rjmp .+0"                "\n\t" // 2    nop nop       (T = 28)
 
      "rjmp head30"             "\n\t" // 2    -> head30 (next bit out)
 
     "nextbyte30:"              "\n\t" //                    (T = 22)
 
      "nop"                     "\n\t" // 1    nop           (T = 23)
 
      "ldi  %[bit]  , 8"        "\n\t" // 1    bit = 8       (T = 24)
 
      "ld   %[byte] , %a[ptr]+" "\n\t" // 2    b = *ptr++    (T = 26)
 
      "sbiw %[count], 1"        "\n\t" // 2    i--           (T = 28)
 
      "brne head30"             "\n"   // 1-2  if(i != 0) -> (next byte)
 
      : [port]  "+e" (port),
 
        [byte]  "+r" (b),
 
        [bit]   "+r" (bit),
 
        [next]  "+r" (next),
 
        [count] "+w" (i)
 
      : [hi]     "r" (hi),
 
        [lo]     "r" (lo),
 
        [ptr]    "e" (ptr));
 
  }
 
#endif
 

	
 
// 16 MHz(ish) AVR --------------------------------------------------------
 
#elif (F_CPU >= 15400000UL) && (F_CPU <= 19000000L)
 

	
 
#ifdef NEO_KHZ400
 
  if((type & NEO_SPDMASK) == NEO_KHZ800) { // 800 KHz bitstream
 
#endif
 

	
 
    // WS2811 and WS2812 have different hi/lo duty cycles; this is
 
    // similar but NOT an exact copy of the prior 400-on-8 code.
 

	
 
    // 20 inst. clocks per bit: HHHHHxxxxxxxxLLLLLLL
 
    // ST instructions:         ^   ^        ^       (T=0,5,13)
 

	
 
    volatile uint8_t next, bit;
 

	
 
    hi   = *port |  pinMask;
 
    lo   = *port & ~pinMask;
 
    next = lo;
 
    bit  = 8;
 

	
 
    asm volatile(
 
     "head20:"                   "\n\t" // Clk  Pseudocode    (T =  0)
 
      "st   %a[port],  %[hi]"    "\n\t" // 2    PORT = hi     (T =  2)
 
      "sbrc %[byte],  7"         "\n\t" // 1-2  if(b & 128)
 
       "mov  %[next], %[hi]"     "\n\t" // 0-1   next = hi    (T =  4)
 
      "dec  %[bit]"              "\n\t" // 1    bit--         (T =  5)
 
      "st   %a[port],  %[next]"  "\n\t" // 2    PORT = next   (T =  7)
 
      "mov  %[next] ,  %[lo]"    "\n\t" // 1    next = lo     (T =  8)
 
      "breq nextbyte20"          "\n\t" // 1-2  if(bit == 0) (from dec above)
 
      "rol  %[byte]"             "\n\t" // 1    b <<= 1       (T = 10)
 
      "rjmp .+0"                 "\n\t" // 2    nop nop       (T = 12)
 
      "nop"                      "\n\t" // 1    nop           (T = 13)
 
      "st   %a[port],  %[lo]"    "\n\t" // 2    PORT = lo     (T = 15)
 
      "nop"                      "\n\t" // 1    nop           (T = 16)
 
      "rjmp .+0"                 "\n\t" // 2    nop nop       (T = 18)
 
      "rjmp head20"              "\n\t" // 2    -> head20 (next bit out)
 
     "nextbyte20:"               "\n\t" //                    (T = 10)
 
      "ldi  %[bit]  ,  8"        "\n\t" // 1    bit = 8       (T = 11)
 
      "ld   %[byte] ,  %a[ptr]+" "\n\t" // 2    b = *ptr++    (T = 13)
 
      "st   %a[port], %[lo]"     "\n\t" // 2    PORT = lo     (T = 15)
 
      "nop"                      "\n\t" // 1    nop           (T = 16)
 
      "sbiw %[count], 1"         "\n\t" // 2    i--           (T = 18)
 
       "brne head20"             "\n"   // 2    if(i != 0) -> (next byte)
 
      : [port]  "+e" (port),
 
        [byte]  "+r" (b),
 
        [bit]   "+r" (bit),
 
        [next]  "+r" (next),
 
        [count] "+w" (i)
 
      : [ptr]    "e" (ptr),
 
        [hi]     "r" (hi),
 
        [lo]     "r" (lo));
 

	
 
#ifdef NEO_KHZ400
 
  } else { // 400 KHz
 

	
 
    // The 400 KHz clock on 16 MHz MCU is the most 'relaxed' version.
 

	
 
    // 40 inst. clocks per bit: HHHHHHHHxxxxxxxxxxxxLLLLLLLLLLLLLLLLLLLL
 
    // ST instructions:         ^       ^           ^         (T=0,8,20)
 

	
 
    volatile uint8_t next, bit;
 

	
 
    hi   = *port |  pinMask;
 
    lo   = *port & ~pinMask;
 
    next = lo;
 
    bit  = 8;
 

	
 
    asm volatile(
 
     "head40:"                  "\n\t" // Clk  Pseudocode    (T =  0)
 
      "st   %a[port], %[hi]"    "\n\t" // 2    PORT = hi     (T =  2)
 
      "sbrc %[byte] , 7"        "\n\t" // 1-2  if(b & 128)
 
       "mov  %[next] , %[hi]"   "\n\t" // 0-1   next = hi    (T =  4)
 
      "rjmp .+0"                "\n\t" // 2    nop nop       (T =  6)
 
      "rjmp .+0"                "\n\t" // 2    nop nop       (T =  8)
 
      "st   %a[port], %[next]"  "\n\t" // 2    PORT = next   (T = 10)
 
      "rjmp .+0"                "\n\t" // 2    nop nop       (T = 12)
 
      "rjmp .+0"                "\n\t" // 2    nop nop       (T = 14)
 
      "rjmp .+0"                "\n\t" // 2    nop nop       (T = 16)
 
      "rjmp .+0"                "\n\t" // 2    nop nop       (T = 18)
 
      "rjmp .+0"                "\n\t" // 2    nop nop       (T = 20)
 
      "st   %a[port], %[lo]"    "\n\t" // 2    PORT = lo     (T = 22)
 
      "nop"                     "\n\t" // 1    nop           (T = 23)
 
      "mov  %[next] , %[lo]"    "\n\t" // 1    next = lo     (T = 24)
 
      "dec  %[bit]"             "\n\t" // 1    bit--         (T = 25)
 
      "breq nextbyte40"         "\n\t" // 1-2  if(bit == 0)
 
      "rol  %[byte]"            "\n\t" // 1    b <<= 1       (T = 27)
 
      "nop"                     "\n\t" // 1    nop           (T = 28)
 
      "rjmp .+0"                "\n\t" // 2    nop nop       (T = 30)
 
      "rjmp .+0"                "\n\t" // 2    nop nop       (T = 32)
 
      "rjmp .+0"                "\n\t" // 2    nop nop       (T = 34)
 
      "rjmp .+0"                "\n\t" // 2    nop nop       (T = 36)
 
      "rjmp .+0"                "\n\t" // 2    nop nop       (T = 38)
 
      "rjmp head40"             "\n\t" // 2    -> head40 (next bit out)
 
     "nextbyte40:"              "\n\t" //                    (T = 27)
 
      "ldi  %[bit]  , 8"        "\n\t" // 1    bit = 8       (T = 28)
 
      "ld   %[byte] , %a[ptr]+" "\n\t" // 2    b = *ptr++    (T = 30)
 
      "rjmp .+0"                "\n\t" // 2    nop nop       (T = 32)
 
      "st   %a[port], %[lo]"    "\n\t" // 2    PORT = lo     (T = 34)
 
      "rjmp .+0"                "\n\t" // 2    nop nop       (T = 36)
 
      "sbiw %[count], 1"        "\n\t" // 2    i--           (T = 38)
 
      "brne head40"             "\n"   // 1-2  if(i != 0) -> (next byte)
 
      : [port]  "+e" (port),
 
        [byte]  "+r" (b),
 
        [bit]   "+r" (bit),
 
        [next]  "+r" (next),
 
        [count] "+w" (i)
 
      : [ptr]    "e" (ptr),
 
        [hi]     "r" (hi),
 
        [lo]     "r" (lo));
 
  }
 
#endif
 

	
 
#else
 
 #error "CPU SPEED NOT SUPPORTED"
 
#endif
 

	
 
#elif defined(__arm__)
 

	
 
#if defined(__MK20DX128__) || defined(__MK20DX256__) // Teensy 3.0 & 3.1
 
#define CYCLES_800_T0H  (F_CPU / 4000000)
 
#define CYCLES_800_T1H  (F_CPU / 1250000)
 
#define CYCLES_800      (F_CPU /  800000)
 
#define CYCLES_400_T0H  (F_CPU / 2000000)
 
#define CYCLES_400_T1H  (F_CPU /  833333)
 
#define CYCLES_400      (F_CPU /  400000)
 

	
 
  uint8_t          *p   = pixels,
 
                   *end = p + numBytes, pix, mask;
 
  volatile uint8_t *set = portSetRegister(pin),
 
                   *clr = portClearRegister(pin);
 
  uint32_t          cyc;
 

	
 
  ARM_DEMCR    |= ARM_DEMCR_TRCENA;
 
  ARM_DWT_CTRL |= ARM_DWT_CTRL_CYCCNTENA;
 

	
 
#ifdef NEO_KHZ400
 
  if((type & NEO_SPDMASK) == NEO_KHZ800) { // 800 KHz bitstream
 
#endif
 
    cyc = ARM_DWT_CYCCNT + CYCLES_800;
 
    while(p < end) {
 
      pix = *p++;
 
      for(mask = 0x80; mask; mask >>= 1) {
 
        while(ARM_DWT_CYCCNT - cyc < CYCLES_800);
 
        cyc  = ARM_DWT_CYCCNT;
 
        *set = 1;
 
        if(pix & mask) {
 
          while(ARM_DWT_CYCCNT - cyc < CYCLES_800_T1H);
 
        } else {
 
          while(ARM_DWT_CYCCNT - cyc < CYCLES_800_T0H);
 
        }
 
        *clr = 1;
 
      }
 
    }
 
    while(ARM_DWT_CYCCNT - cyc < CYCLES_800);
 
#ifdef NEO_KHZ400
 
  } else { // 400 kHz bitstream
 
    cyc = ARM_DWT_CYCCNT + CYCLES_400;
 
    while(p < end) {
 
      pix = *p++;
 
      for(mask = 0x80; mask; mask >>= 1) {
 
        while(ARM_DWT_CYCCNT - cyc < CYCLES_400);
 
        cyc  = ARM_DWT_CYCCNT;
 
        *set = 1;
 
        if(pix & mask) {
 
          while(ARM_DWT_CYCCNT - cyc < CYCLES_400_T1H);
 
        } else {
 
          while(ARM_DWT_CYCCNT - cyc < CYCLES_400_T0H);
 
        }
 
        *clr = 1;
 
      }
 
    }
 
    while(ARM_DWT_CYCCNT - cyc < CYCLES_400);
 
  }
 
#endif
 

	
 

	
 

	
 

	
 

	
 
#elif defined(__MKL26Z64__) // Teensy-LC
 

	
 
#if F_CPU == 48000000
 
  uint8_t          *p   = pixels,
 
		   pix, count, dly,
 
                   bitmask = digitalPinToBitMask(pin);
 
  volatile uint8_t *reg = portSetRegister(pin);
 
  uint32_t         num = numBytes;
 
  asm volatile(
 
	"L%=_begin:"				"\n\t"
 
	"ldrb	%[pix], [%[p], #0]"		"\n\t"
 
	"lsl	%[pix], #24"			"\n\t"
 
	"movs	%[count], #7"			"\n\t"
 
	"L%=_loop:"				"\n\t"
 
	"lsl	%[pix], #1"			"\n\t"
 
	"bcs	L%=_loop_one"			"\n\t"
 
	"L%=_loop_zero:"
 
	"strb	%[bitmask], [%[reg], #0]"	"\n\t"
 
	"movs	%[dly], #4"			"\n\t"
 
	"L%=_loop_delay_T0H:"			"\n\t"
 
	"sub	%[dly], #1"			"\n\t"
 
	"bne	L%=_loop_delay_T0H"		"\n\t"
 
	"strb	%[bitmask], [%[reg], #4]"	"\n\t"
 
	"movs	%[dly], #13"			"\n\t"
 
	"L%=_loop_delay_T0L:"			"\n\t"
 
	"sub	%[dly], #1"			"\n\t"
 
	"bne	L%=_loop_delay_T0L"		"\n\t"
 
	"b	L%=_next"			"\n\t"
 
	"L%=_loop_one:"
 
	"strb	%[bitmask], [%[reg], #0]"	"\n\t"
 
	"movs	%[dly], #13"			"\n\t"
 
	"L%=_loop_delay_T1H:"			"\n\t"
 
	"sub	%[dly], #1"			"\n\t"
 
	"bne	L%=_loop_delay_T1H"		"\n\t"
 
	"strb	%[bitmask], [%[reg], #4]"	"\n\t"
 
	"movs	%[dly], #4"			"\n\t"
 
	"L%=_loop_delay_T1L:"			"\n\t"
 
	"sub	%[dly], #1"			"\n\t"
 
	"bne	L%=_loop_delay_T1L"		"\n\t"
 
	"nop"					"\n\t"
 
	"L%=_next:"				"\n\t"
 
	"sub	%[count], #1"			"\n\t"
 
	"bne	L%=_loop"			"\n\t"
 
	"lsl	%[pix], #1"			"\n\t"
 
	"bcs	L%=_last_one"			"\n\t"
 
	"L%=_last_zero:"
 
	"strb	%[bitmask], [%[reg], #0]"	"\n\t"
 
	"movs	%[dly], #4"			"\n\t"
 
	"L%=_last_delay_T0H:"			"\n\t"
 
	"sub	%[dly], #1"			"\n\t"
 
	"bne	L%=_last_delay_T0H"		"\n\t"
 
	"strb	%[bitmask], [%[reg], #4]"	"\n\t"
 
	"movs	%[dly], #10"			"\n\t"
 
	"L%=_last_delay_T0L:"			"\n\t"
 
	"sub	%[dly], #1"			"\n\t"
 
	"bne	L%=_last_delay_T0L"		"\n\t"
 
	"b	L%=_repeat"			"\n\t"
 
	"L%=_last_one:"
 
	"strb	%[bitmask], [%[reg], #0]"	"\n\t"
 
	"movs	%[dly], #13"			"\n\t"
 
	"L%=_last_delay_T1H:"			"\n\t"
 
	"sub	%[dly], #1"			"\n\t"
 
	"bne	L%=_last_delay_T1H"		"\n\t"
 
	"strb	%[bitmask], [%[reg], #4]"	"\n\t"
 
	"movs	%[dly], #1"			"\n\t"
 
	"L%=_last_delay_T1L:"			"\n\t"
 
	"sub	%[dly], #1"			"\n\t"
 
	"bne	L%=_last_delay_T1L"		"\n\t"
 
	"nop"					"\n\t"
 
	"L%=_repeat:"				"\n\t"
 
	"add	%[p], #1"			"\n\t"
 
	"sub	%[num], #1"			"\n\t"
 
	"bne	L%=_begin"			"\n\t"
 
	"L%=_done:"				"\n\t"
 
	: [p] "+r" (p),
 
	  [pix] "=&r" (pix),
 
	  [count] "=&r" (count),
 
	  [dly] "=&r" (dly),
 
	  [num] "+r" (num)
 
	: [bitmask] "r" (bitmask),
 
	  [reg] "r" (reg)
 
  );
 
#else
 
#error "Sorry, only 48 MHz is supported, please set Tools > CPU Speed to 48 MHz"
 
#endif
 

	
 

	
 
#else // Arduino Due
 

	
 
  #define SCALE      VARIANT_MCK / 2UL / 1000000UL
 
  #define INST       (2UL * F_CPU / VARIANT_MCK)
 
  #define TIME_800_0 ((int)(0.40 * SCALE + 0.5) - (5 * INST))
 
  #define TIME_800_1 ((int)(0.80 * SCALE + 0.5) - (5 * INST))
 
  #define PERIOD_800 ((int)(1.25 * SCALE + 0.5) - (5 * INST))
 
  #define TIME_400_0 ((int)(0.50 * SCALE + 0.5) - (5 * INST))
 
  #define TIME_400_1 ((int)(1.20 * SCALE + 0.5) - (5 * INST))
 
  #define PERIOD_400 ((int)(2.50 * SCALE + 0.5) - (5 * INST))
 

	
 
  int             pinMask, time0, time1, period, t;
 
  Pio            *port;
 
  volatile WoReg *portSet, *portClear, *timeValue, *timeReset;
 
  uint8_t        *p, *end, pix, mask;
 

	
 
  pmc_set_writeprotect(false);
 
  pmc_enable_periph_clk((uint32_t)TC3_IRQn);
 
  TC_Configure(TC1, 0,
 
    TC_CMR_WAVE | TC_CMR_WAVSEL_UP | TC_CMR_TCCLKS_TIMER_CLOCK1);
 
  TC_Start(TC1, 0);
 

	
 
  pinMask   = g_APinDescription[pin].ulPin; // Don't 'optimize' these into
 
  port      = g_APinDescription[pin].pPort; // declarations above.  Want to
 
  portSet   = &(port->PIO_SODR);            // burn a few cycles after
 
  portClear = &(port->PIO_CODR);            // starting timer to minimize
 
  timeValue = &(TC1->TC_CHANNEL[0].TC_CV);  // the initial 'while'.
 
  timeReset = &(TC1->TC_CHANNEL[0].TC_CCR);
 
  p         =  pixels;
 
  end       =  p + numBytes;
 
  pix       = *p++;
 
  mask      = 0x80;
 

	
 
#ifdef NEO_KHZ400
 
  if((type & NEO_SPDMASK) == NEO_KHZ800) { // 800 KHz bitstream
 
#endif
 
    time0 = TIME_800_0;
 
    time1 = TIME_800_1;
 
    period = PERIOD_800;
 
#ifdef NEO_KHZ400
 
  } else { // 400 KHz bitstream
 
    time0 = TIME_400_0;
 
    time1 = TIME_400_1;
 
    period = PERIOD_400;
 
  }
 
#endif
 

	
 
  for(t = time0;; t = time0) {
 
    if(pix & mask) t = time1;
 
    while(*timeValue < period);
 
    *portSet   = pinMask;
 
    *timeReset = TC_CCR_CLKEN | TC_CCR_SWTRG;
 
    while(*timeValue < t);
 
    *portClear = pinMask;
 
    if(!(mask >>= 1)) {   // This 'inside-out' loop logic utilizes
 
      if(p >= end) break; // idle time to minimize inter-byte delays.
 
      pix = *p++;
 
      mask = 0x80;
 
    }
 
  }
 
  while(*timeValue < period); // Wait for last bit
 
  TC_Stop(TC1, 0);
 

	
 
#endif // end Arduino Due
 

	
 
#endif // end Architecture select
 

	
 
  interrupts();
 
  endTime = micros(); // Save EOD time for latch on next call
 
}
 

	
 
// Set the output pin number
 
void Adafruit_NeoPixel::setPin(uint8_t p) {
 
  pinMode(pin, INPUT);
 
  pin = p;
 
  pinMode(p, OUTPUT);
 
  digitalWrite(p, LOW);
 
#ifdef __AVR__
 
  port    = portOutputRegister(digitalPinToPort(p));
 
  pinMask = digitalPinToBitMask(p);
 
#endif
 
}
 

	
 
// Set pixel color from separate R,G,B components:
 
void Adafruit_NeoPixel::setPixelColor(
 
 uint16_t n, uint8_t r, uint8_t g, uint8_t b) {
 
  if(n < numLEDs) {
 
    if(brightness) { // See notes in setBrightness()
 
      r = (r * brightness) >> 8;
 
      g = (g * brightness) >> 8;
 
      b = (b * brightness) >> 8;
 
    }
 
    uint8_t *p = &pixels[n * 3];
 
    p[rOffset] = r;
 
    p[gOffset] = g;
 
    p[bOffset] = b;
 
  }
 
}
 

	
 
// Set pixel color from 'packed' 32-bit RGB color:
 
void Adafruit_NeoPixel::setPixelColor(uint16_t n, uint32_t c) {
 
  if(n < numLEDs) {
 
    uint8_t
 
      r = (uint8_t)(c >> 16),
 
      g = (uint8_t)(c >>  8),
 
      b = (uint8_t)c;
 
    if(brightness) { // See notes in setBrightness()
 
      r = (r * brightness) >> 8;
 
      g = (g * brightness) >> 8;
 
      b = (b * brightness) >> 8;
 
    }
 
    uint8_t *p = &pixels[n * 3];
 
    p[rOffset] = r;
 
    p[gOffset] = g;
 
    p[bOffset] = b;
 
  }
 
}
 

	
 
// Convert separate R,G,B into packed 32-bit RGB color.
 
// Packed format is always RGB, regardless of LED strand color order.
 
uint32_t Adafruit_NeoPixel::Color(uint8_t r, uint8_t g, uint8_t b) {
 
  return ((uint32_t)r << 16) | ((uint32_t)g <<  8) | b;
 
}
 

	
 
// Query color from previously-set pixel (returns packed 32-bit RGB value)
 
uint32_t Adafruit_NeoPixel::getPixelColor(uint16_t n) const {
 
  if(n >= numLEDs) {
 
    // Out of bounds, return no color.
 
    return 0;
 
  }
 
  uint8_t *p = &pixels[n * 3];
 
  uint32_t c = ((uint32_t)p[rOffset] << 16) |
 
               ((uint32_t)p[gOffset] <<  8) |
 
                (uint32_t)p[bOffset];
 
  // Adjust this back up to the true color, as setting a pixel color will
 
  // scale it back down again.
 
  if(brightness) { // See notes in setBrightness()
 
    //Cast the color to a byte array
 
    uint8_t * c_ptr =reinterpret_cast<uint8_t*>(&c);
 
    c_ptr[0] = (c_ptr[0] << 8)/brightness;
 
    c_ptr[1] = (c_ptr[1] << 8)/brightness;
 
    c_ptr[2] = (c_ptr[2] << 8)/brightness;
 
  }
 
  return c; // Pixel # is out of bounds
 
}
 

	
 
// Returns pointer to pixels[] array.  Pixel data is stored in device-
 
// native format and is not translated here.  Application will need to be
 
// aware whether pixels are RGB vs. GRB and handle colors appropriately.
 
uint8_t *Adafruit_NeoPixel::getPixels(void) const {
 
  return pixels;
 
}
 

	
 
uint16_t Adafruit_NeoPixel::numPixels(void) const {
 
  return numLEDs;
 
}
 

	
 
// Adjust output brightness; 0=darkest (off), 255=brightest.  This does
 
// NOT immediately affect what's currently displayed on the LEDs.  The
 
// next call to show() will refresh the LEDs at this level.  However,
 
// this process is potentially "lossy," especially when increasing
 
// brightness.  The tight timing in the WS2811/WS2812 code means there
 
// aren't enough free cycles to perform this scaling on the fly as data
 
// is issued.  So we make a pass through the existing color data in RAM
 
// and scale it (subsequent graphics commands also work at this
 
// brightness level).  If there's a significant step up in brightness,
 
// the limited number of steps (quantization) in the old data will be
 
// quite visible in the re-scaled version.  For a non-destructive
 
// change, you'll need to re-render the full strip data.  C'est la vie.
 
void Adafruit_NeoPixel::setBrightness(uint8_t b) {
 
  // Stored brightness value is different than what's passed.
 
  // This simplifies the actual scaling math later, allowing a fast
 
  // 8x8-bit multiply and taking the MSB.  'brightness' is a uint8_t,
 
  // adding 1 here may (intentionally) roll over...so 0 = max brightness
 
  // (color values are interpreted literally; no scaling), 1 = min
 
  // brightness (off), 255 = just below max brightness.
 
  uint8_t newBrightness = b + 1;
 
  if(newBrightness != brightness) { // Compare against prior value
 
    // Brightness has changed -- re-scale existing data in RAM
 
    uint8_t  c,
 
            *ptr           = pixels,
 
             oldBrightness = brightness - 1; // De-wrap old brightness value
 
    uint16_t scale;
 
    if(oldBrightness == 0) scale = 0; // Avoid /0
 
    else if(b == 255) scale = 65535 / oldBrightness;
 
    else scale = (((uint16_t)newBrightness << 8) - 1) / oldBrightness;
 
    for(uint16_t i=0; i<numBytes; i++) {
 
      c      = *ptr;
 
      *ptr++ = (c * scale) >> 8;
 
    }
 
    brightness = newBrightness;
 
  }
 
}
 

	
 
//Return the brightness value
 
uint8_t Adafruit_NeoPixel::getBrightness(void) const {
 
  return brightness - 1;
 
}
 

	
 
void Adafruit_NeoPixel::clear() {
 
  memset(pixels, 0, numBytes);
 
}
rgbled/Adafruit_NeoPixel/Adafruit_NeoPixel.h
Show inline comments
 
new file 100644
 
/*--------------------------------------------------------------------
 
  This file is part of the Adafruit NeoPixel library.
 

	
 
  NeoPixel is free software: you can redistribute it and/or modify
 
  it under the terms of the GNU Lesser General Public License as
 
  published by the Free Software Foundation, either version 3 of
 
  the License, or (at your option) any later version.
 

	
 
  NeoPixel is distributed in the hope that it will be useful,
 
  but WITHOUT ANY WARRANTY; without even the implied warranty of
 
  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 
  GNU Lesser General Public License for more details.
 

	
 
  You should have received a copy of the GNU Lesser General Public
 
  License along with NeoPixel.  If not, see
 
  <http://www.gnu.org/licenses/>.
 
  --------------------------------------------------------------------*/
 

	
 
#ifndef ADAFRUIT_NEOPIXEL_H
 
#define ADAFRUIT_NEOPIXEL_H
 

	
 
#if (ARDUINO >= 100)
 
 #include <Arduino.h>
 
#else
 
 #include <WProgram.h>
 
 #include <pins_arduino.h>
 
#endif
 

	
 
// 'type' flags for LED pixels (third parameter to constructor):
 
#define NEO_RGB     0x00 // Wired for RGB data order
 
#define NEO_GRB     0x01 // Wired for GRB data order
 
#define NEO_BRG     0x04
 
  
 
#define NEO_COLMASK 0x01
 
#define NEO_KHZ800  0x02 // 800 KHz datastream
 
#define NEO_SPDMASK 0x02
 
// Trinket flash space is tight, v1 NeoPixels aren't handled by default.
 
// Remove the ifndef/endif to add support -- but code will be bigger.
 
// Conversely, can comment out the #defines to save space on other MCUs.
 
#ifndef __AVR_ATtiny85__
 
#define NEO_KHZ400  0x00 // 400 KHz datastream
 
#endif
 

	
 
class Adafruit_NeoPixel {
 

	
 
 public:
 

	
 
  // Constructor: number of LEDs, pin number, LED type
 
  Adafruit_NeoPixel(uint16_t n, uint8_t p=6, uint8_t t=NEO_GRB + NEO_KHZ800);
 
  ~Adafruit_NeoPixel();
 

	
 
  void
 
    begin(void),
 
    show(void),
 
    setPin(uint8_t p),
 
    setPixelColor(uint16_t n, uint8_t r, uint8_t g, uint8_t b),
 
    setPixelColor(uint16_t n, uint32_t c),
 
    setBrightness(uint8_t),
 
    clear();
 
  uint8_t
 
   *getPixels(void) const,
 
    getBrightness(void) const;
 
  uint16_t
 
    numPixels(void) const;
 
  static uint32_t
 
    Color(uint8_t r, uint8_t g, uint8_t b);
 
  uint32_t
 
    getPixelColor(uint16_t n) const;
 
  inline bool
 
    canShow(void) { return (micros() - endTime) >= 50L; }
 

	
 
 private:
 

	
 
  const uint16_t
 
    numLEDs,       // Number of RGB LEDs in strip
 
    numBytes;      // Size of 'pixels' buffer below
 
  uint8_t
 
    pin,           // Output pin number
 
    brightness,
 
   *pixels,        // Holds LED color values (3 bytes each)
 
    rOffset,       // Index of red byte within each 3-byte pixel
 
    gOffset,       // Index of green byte
 
    bOffset;       // Index of blue byte
 
  const uint8_t
 
    type;          // Pixel flags (400 vs 800 KHz, RGB vs GRB color)
 
  uint32_t
 
    endTime;       // Latch timing reference
 
#ifdef __AVR__
 
  const volatile uint8_t
 
    *port;         // Output PORT register
 
  uint8_t
 
    pinMask;       // Output PORT bitmask
 
#endif
 

	
 
};
 

	
 
#endif // ADAFRUIT_NEOPIXEL_H
rgbled/Adafruit_NeoPixel/COPYING
Show inline comments
 
new file 100644
 

	
 
                    GNU GENERAL PUBLIC LICENSE
 
                       Version 3, 29 June 2007
 

	
 
 Copyright (C) 2007 Free Software Foundation, Inc. <http://fsf.org/>
 
 Everyone is permitted to copy and distribute verbatim copies
 
 of this license document, but changing it is not allowed.
 

	
 
                            Preamble
 

	
 
  The GNU General Public License is a free, copyleft license for
 
software and other kinds of works.
 

	
 
  The licenses for most software and other practical works are designed
 
to take away your freedom to share and change the works.  By contrast,
 
the GNU General Public License is intended to guarantee your freedom to
 
share and change all versions of a program--to make sure it remains free
 
software for all its users.  We, the Free Software Foundation, use the
 
GNU General Public License for most of our software; it applies also to
 
any other work released this way by its authors.  You can apply it to
 
your programs, too.
 

	
 
  When we speak of free software, we are referring to freedom, not
 
price.  Our General Public Licenses are designed to make sure that you
 
have the freedom to distribute copies of free software (and charge for
 
them if you wish), that you receive source code or can get it if you
 
want it, that you can change the software or use pieces of it in new
 
free programs, and that you know you can do these things.
 

	
 
  To protect your rights, we need to prevent others from denying you
 
these rights or asking you to surrender the rights.  Therefore, you have
 
certain responsibilities if you distribute copies of the software, or if
 
you modify it: responsibilities to respect the freedom of others.
 

	
 
  For example, if you distribute copies of such a program, whether
 
gratis or for a fee, you must pass on to the recipients the same
 
freedoms that you received.  You must make sure that they, too, receive
 
or can get the source code.  And you must show them these terms so they
 
know their rights.
 

	
 
  Developers that use the GNU GPL protect your rights with two steps:
 
(1) assert copyright on the software, and (2) offer you this License
 
giving you legal permission to copy, distribute and/or modify it.
 

	
 
  For the developers' and authors' protection, the GPL clearly explains
 
that there is no warranty for this free software.  For both users' and
 
authors' sake, the GPL requires that modified versions be marked as
 
changed, so that their problems will not be attributed erroneously to
 
authors of previous versions.
 

	
 
  Some devices are designed to deny users access to install or run
 
modified versions of the software inside them, although the manufacturer
 
can do so.  This is fundamentally incompatible with the aim of
 
protecting users' freedom to change the software.  The systematic
 
pattern of such abuse occurs in the area of products for individuals to
 
use, which is precisely where it is most unacceptable.  Therefore, we
 
have designed this version of the GPL to prohibit the practice for those
 
products.  If such problems arise substantially in other domains, we
 
stand ready to extend this provision to those domains in future versions
 
of the GPL, as needed to protect the freedom of users.
 

	
 
  Finally, every program is threatened constantly by software patents.
 
States should not allow patents to restrict development and use of
 
software on general-purpose computers, but in those that do, we wish to
 
avoid the special danger that patents applied to a free program could
 
make it effectively proprietary.  To prevent this, the GPL assures that
 
patents cannot be used to render the program non-free.
 

	
 
  The precise terms and conditions for copying, distribution and
 
modification follow.
 

	
 
                       TERMS AND CONDITIONS
 

	
 
  0. Definitions.
 

	
 
  "This License" refers to version 3 of the GNU General Public License.
 

	
 
  "Copyright" also means copyright-like laws that apply to other kinds of
 
works, such as semiconductor masks.
 

	
 
  "The Program" refers to any copyrightable work licensed under this
 
License.  Each licensee is addressed as "you".  "Licensees" and
 
"recipients" may be individuals or organizations.
 

	
 
  To "modify" a work means to copy from or adapt all or part of the work
 
in a fashion requiring copyright permission, other than the making of an
 
exact copy.  The resulting work is called a "modified version" of the
 
earlier work or a work "based on" the earlier work.
 

	
 
  A "covered work" means either the unmodified Program or a work based
 
on the Program.
 

	
 
  To "propagate" a work means to do anything with it that, without
 
permission, would make you directly or secondarily liable for
 
infringement under applicable copyright law, except executing it on a
 
computer or modifying a private copy.  Propagation includes copying,
 
distribution (with or without modification), making available to the
 
public, and in some countries other activities as well.
 

	
 
  To "convey" a work means any kind of propagation that enables other
 
parties to make or receive copies.  Mere interaction with a user through
 
a computer network, with no transfer of a copy, is not conveying.
 

	
 
  An interactive user interface displays "Appropriate Legal Notices"
 
to the extent that it includes a convenient and prominently visible
 
feature that (1) displays an appropriate copyright notice, and (2)
 
tells the user that there is no warranty for the work (except to the
 
extent that warranties are provided), that licensees may convey the
 
work under this License, and how to view a copy of this License.  If
 
the interface presents a list of user commands or options, such as a
 
menu, a prominent item in the list meets this criterion.
 

	
 
  1. Source Code.
 

	
 
  The "source code" for a work means the preferred form of the work
 
for making modifications to it.  "Object code" means any non-source
 
form of a work.
 

	
 
  A "Standard Interface" means an interface that either is an official
 
standard defined by a recognized standards body, or, in the case of
 
interfaces specified for a particular programming language, one that
 
is widely used among developers working in that language.
 

	
 
  The "System Libraries" of an executable work include anything, other
 
than the work as a whole, that (a) is included in the normal form of
 
packaging a Major Component, but which is not part of that Major
 
Component, and (b) serves only to enable use of the work with that
 
Major Component, or to implement a Standard Interface for which an
 
implementation is available to the public in source code form.  A
 
"Major Component", in this context, means a major essential component
 
(kernel, window system, and so on) of the specific operating system
 
(if any) on which the executable work runs, or a compiler used to
 
produce the work, or an object code interpreter used to run it.
 

	
 
  The "Corresponding Source" for a work in object code form means all
 
the source code needed to generate, install, and (for an executable
 
work) run the object code and to modify the work, including scripts to
 
control those activities.  However, it does not include the work's
 
System Libraries, or general-purpose tools or generally available free
 
programs which are used unmodified in performing those activities but
 
which are not part of the work.  For example, Corresponding Source
 
includes interface definition files associated with source files for
 
the work, and the source code for shared libraries and dynamically
 
linked subprograms that the work is specifically designed to require,
 
such as by intimate data communication or control flow between those
 
subprograms and other parts of the work.
 

	
 
  The Corresponding Source need not include anything that users
 
can regenerate automatically from other parts of the Corresponding
 
Source.
 

	
 
  The Corresponding Source for a work in source code form is that
 
same work.
 

	
 
  2. Basic Permissions.
 

	
 
  All rights granted under this License are granted for the term of
 
copyright on the Program, and are irrevocable provided the stated
 
conditions are met.  This License explicitly affirms your unlimited
 
permission to run the unmodified Program.  The output from running a
 
covered work is covered by this License only if the output, given its
 
content, constitutes a covered work.  This License acknowledges your
 
rights of fair use or other equivalent, as provided by copyright law.
 

	
 
  You may make, run and propagate covered works that you do not
 
convey, without conditions so long as your license otherwise remains
 
in force.  You may convey covered works to others for the sole purpose
 
of having them make modifications exclusively for you, or provide you
 
with facilities for running those works, provided that you comply with
 
the terms of this License in conveying all material for which you do
 
not control copyright.  Those thus making or running the covered works
 
for you must do so exclusively on your behalf, under your direction
 
and control, on terms that prohibit them from making any copies of
 
your copyrighted material outside their relationship with you.
 

	
 
  Conveying under any other circumstances is permitted solely under
 
the conditions stated below.  Sublicensing is not allowed; section 10
 
makes it unnecessary.
 

	
 
  3. Protecting Users' Legal Rights From Anti-Circumvention Law.
 

	
 
  No covered work shall be deemed part of an effective technological
 
measure under any applicable law fulfilling obligations under article
 
11 of the WIPO copyright treaty adopted on 20 December 1996, or
 
similar laws prohibiting or restricting circumvention of such
 
measures.
 

	
 
  When you convey a covered work, you waive any legal power to forbid
 
circumvention of technological measures to the extent such circumvention
 
is effected by exercising rights under this License with respect to
 
the covered work, and you disclaim any intention to limit operation or
 
modification of the work as a means of enforcing, against the work's
 
users, your or third parties' legal rights to forbid circumvention of
 
technological measures.
 

	
 
  4. Conveying Verbatim Copies.
 

	
 
  You may convey verbatim copies of the Program's source code as you
 
receive it, in any medium, provided that you conspicuously and
 
appropriately publish on each copy an appropriate copyright notice;
 
keep intact all notices stating that this License and any
 
non-permissive terms added in accord with section 7 apply to the code;
 
keep intact all notices of the absence of any warranty; and give all
 
recipients a copy of this License along with the Program.
 

	
 
  You may charge any price or no price for each copy that you convey,
 
and you may offer support or warranty protection for a fee.
 

	
 
  5. Conveying Modified Source Versions.
 

	
 
  You may convey a work based on the Program, or the modifications to
 
produce it from the Program, in the form of source code under the
 
terms of section 4, provided that you also meet all of these conditions:
 

	
 
    a) The work must carry prominent notices stating that you modified
 
    it, and giving a relevant date.
 

	
 
    b) The work must carry prominent notices stating that it is
 
    released under this License and any conditions added under section
 
    7.  This requirement modifies the requirement in section 4 to
 
    "keep intact all notices".
 

	
 
    c) You must license the entire work, as a whole, under this
 
    License to anyone who comes into possession of a copy.  This
 
    License will therefore apply, along with any applicable section 7
 
    additional terms, to the whole of the work, and all its parts,
 
    regardless of how they are packaged.  This License gives no
 
    permission to license the work in any other way, but it does not
 
    invalidate such permission if you have separately received it.
 

	
 
    d) If the work has interactive user interfaces, each must display
 
    Appropriate Legal Notices; however, if the Program has interactive
 
    interfaces that do not display Appropriate Legal Notices, your
 
    work need not make them do so.
 

	
 
  A compilation of a covered work with other separate and independent
 
works, which are not by their nature extensions of the covered work,
 
and which are not combined with it such as to form a larger program,
 
in or on a volume of a storage or distribution medium, is called an
 
"aggregate" if the compilation and its resulting copyright are not
 
used to limit the access or legal rights of the compilation's users
 
beyond what the individual works permit.  Inclusion of a covered work
 
in an aggregate does not cause this License to apply to the other
 
parts of the aggregate.
 

	
 
  6. Conveying Non-Source Forms.
 

	
 
  You may convey a covered work in object code form under the terms
 
of sections 4 and 5, provided that you also convey the
 
machine-readable Corresponding Source under the terms of this License,
 
in one of these ways:
 

	
 
    a) Convey the object code in, or embodied in, a physical product
 
    (including a physical distribution medium), accompanied by the
 
    Corresponding Source fixed on a durable physical medium
 
    customarily used for software interchange.
 

	
 
    b) Convey the object code in, or embodied in, a physical product
 
    (including a physical distribution medium), accompanied by a
 
    written offer, valid for at least three years and valid for as
 
    long as you offer spare parts or customer support for that product
 
    model, to give anyone who possesses the object code either (1) a
 
    copy of the Corresponding Source for all the software in the
 
    product that is covered by this License, on a durable physical
 
    medium customarily used for software interchange, for a price no
 
    more than your reasonable cost of physically performing this
 
    conveying of source, or (2) access to copy the
 
    Corresponding Source from a network server at no charge.
 

	
 
    c) Convey individual copies of the object code with a copy of the
 
    written offer to provide the Corresponding Source.  This
 
    alternative is allowed only occasionally and noncommercially, and
 
    only if you received the object code with such an offer, in accord
 
    with subsection 6b.
 

	
 
    d) Convey the object code by offering access from a designated
 
    place (gratis or for a charge), and offer equivalent access to the
 
    Corresponding Source in the same way through the same place at no
 
    further charge.  You need not require recipients to copy the
 
    Corresponding Source along with the object code.  If the place to
 
    copy the object code is a network server, the Corresponding Source
 
    may be on a different server (operated by you or a third party)
 
    that supports equivalent copying facilities, provided you maintain
 
    clear directions next to the object code saying where to find the
 
    Corresponding Source.  Regardless of what server hosts the
 
    Corresponding Source, you remain obligated to ensure that it is
 
    available for as long as needed to satisfy these requirements.
 

	
 
    e) Convey the object code using peer-to-peer transmission, provided
 
    you inform other peers where the object code and Corresponding
 
    Source of the work are being offered to the general public at no
 
    charge under subsection 6d.
 

	
 
  A separable portion of the object code, whose source code is excluded
 
from the Corresponding Source as a System Library, need not be
 
included in conveying the object code work.
 

	
 
  A "User Product" is either (1) a "consumer product", which means any
 
tangible personal property which is normally used for personal, family,
 
or household purposes, or (2) anything designed or sold for incorporation
 
into a dwelling.  In determining whether a product is a consumer product,
 
doubtful cases shall be resolved in favor of coverage.  For a particular
 
product received by a particular user, "normally used" refers to a
 
typical or common use of that class of product, regardless of the status
 
of the particular user or of the way in which the particular user
 
actually uses, or expects or is expected to use, the product.  A product
 
is a consumer product regardless of whether the product has substantial
 
commercial, industrial or non-consumer uses, unless such uses represent
 
the only significant mode of use of the product.
 

	
 
  "Installation Information" for a User Product means any methods,
 
procedures, authorization keys, or other information required to install
 
and execute modified versions of a covered work in that User Product from
 
a modified version of its Corresponding Source.  The information must
 
suffice to ensure that the continued functioning of the modified object
 
code is in no case prevented or interfered with solely because
 
modification has been made.
 

	
 
  If you convey an object code work under this section in, or with, or
 
specifically for use in, a User Product, and the conveying occurs as
 
part of a transaction in which the right of possession and use of the
 
User Product is transferred to the recipient in perpetuity or for a
 
fixed term (regardless of how the transaction is characterized), the
 
Corresponding Source conveyed under this section must be accompanied
 
by the Installation Information.  But this requirement does not apply
 
if neither you nor any third party retains the ability to install
 
modified object code on the User Product (for example, the work has
 
been installed in ROM).
 

	
 
  The requirement to provide Installation Information does not include a
 
requirement to continue to provide support service, warranty, or updates
 
for a work that has been modified or installed by the recipient, or for
 
the User Product in which it has been modified or installed.  Access to a
 
network may be denied when the modification itself materially and
 
adversely affects the operation of the network or violates the rules and
 
protocols for communication across the network.
 

	
 
  Corresponding Source conveyed, and Installation Information provided,
 
in accord with this section must be in a format that is publicly
 
documented (and with an implementation available to the public in
 
source code form), and must require no special password or key for
 
unpacking, reading or copying.
 

	
 
  7. Additional Terms.
 

	
 
  "Additional permissions" are terms that supplement the terms of this
 
License by making exceptions from one or more of its conditions.
 
Additional permissions that are applicable to the entire Program shall
 
be treated as though they were included in this License, to the extent
 
that they are valid under applicable law.  If additional permissions
 
apply only to part of the Program, that part may be used separately
 
under those permissions, but the entire Program remains governed by
 
this License without regard to the additional permissions.
 

	
 
  When you convey a copy of a covered work, you may at your option
 
remove any additional permissions from that copy, or from any part of
 
it.  (Additional permissions may be written to require their own
 
removal in certain cases when you modify the work.)  You may place
 
additional permissions on material, added by you to a covered work,
 
for which you have or can give appropriate copyright permission.
 

	
 
  Notwithstanding any other provision of this License, for material you
 
add to a covered work, you may (if authorized by the copyright holders of
 
that material) supplement the terms of this License with terms:
 

	
 
    a) Disclaiming warranty or limiting liability differently from the
 
    terms of sections 15 and 16 of this License; or
 

	
 
    b) Requiring preservation of specified reasonable legal notices or
 
    author attributions in that material or in the Appropriate Legal
 
    Notices displayed by works containing it; or
 

	
 
    c) Prohibiting misrepresentation of the origin of that material, or
 
    requiring that modified versions of such material be marked in
 
    reasonable ways as different from the original version; or
 

	
 
    d) Limiting the use for publicity purposes of names of licensors or
 
    authors of the material; or
 

	
 
    e) Declining to grant rights under trademark law for use of some
 
    trade names, trademarks, or service marks; or
 

	
 
    f) Requiring indemnification of licensors and authors of that
 
    material by anyone who conveys the material (or modified versions of
 
    it) with contractual assumptions of liability to the recipient, for
 
    any liability that these contractual assumptions directly impose on
 
    those licensors and authors.
 

	
 
  All other non-permissive additional terms are considered "further
 
restrictions" within the meaning of section 10.  If the Program as you
 
received it, or any part of it, contains a notice stating that it is
 
governed by this License along with a term that is a further
 
restriction, you may remove that term.  If a license document contains
 
a further restriction but permits relicensing or conveying under this
 
License, you may add to a covered work material governed by the terms
 
of that license document, provided that the further restriction does
 
not survive such relicensing or conveying.
 

	
 
  If you add terms to a covered work in accord with this section, you
 
must place, in the relevant source files, a statement of the
 
additional terms that apply to those files, or a notice indicating
 
where to find the applicable terms.
 

	
 
  Additional terms, permissive or non-permissive, may be stated in the
 
form of a separately written license, or stated as exceptions;
 
the above requirements apply either way.
 

	
 
  8. Termination.
 

	
 
  You may not propagate or modify a covered work except as expressly
 
provided under this License.  Any attempt otherwise to propagate or
 
modify it is void, and will automatically terminate your rights under
 
this License (including any patent licenses granted under the third
 
paragraph of section 11).
 

	
 
  However, if you cease all violation of this License, then your
 
license from a particular copyright holder is reinstated (a)
 
provisionally, unless and until the copyright holder explicitly and
 
finally terminates your license, and (b) permanently, if the copyright
 
holder fails to notify you of the violation by some reasonable means
 
prior to 60 days after the cessation.
 

	
 
  Moreover, your license from a particular copyright holder is
 
reinstated permanently if the copyright holder notifies you of the
 
violation by some reasonable means, this is the first time you have
 
received notice of violation of this License (for any work) from that
 
copyright holder, and you cure the violation prior to 30 days after
 
your receipt of the notice.
 

	
 
  Termination of your rights under this section does not terminate the
 
licenses of parties who have received copies or rights from you under
 
this License.  If your rights have been terminated and not permanently
 
reinstated, you do not qualify to receive new licenses for the same
 
material under section 10.
 

	
 
  9. Acceptance Not Required for Having Copies.
 

	
 
  You are not required to accept this License in order to receive or
 
run a copy of the Program.  Ancillary propagation of a covered work
 
occurring solely as a consequence of using peer-to-peer transmission
 
to receive a copy likewise does not require acceptance.  However,
 
nothing other than this License grants you permission to propagate or
 
modify any covered work.  These actions infringe copyright if you do
 
not accept this License.  Therefore, by modifying or propagating a
 
covered work, you indicate your acceptance of this License to do so.
 

	
 
  10. Automatic Licensing of Downstream Recipients.
 

	
 
  Each time you convey a covered work, the recipient automatically
 
receives a license from the original licensors, to run, modify and
 
propagate that work, subject to this License.  You are not responsible
 
for enforcing compliance by third parties with this License.
 

	
 
  An "entity transaction" is a transaction transferring control of an
 
organization, or substantially all assets of one, or subdividing an
 
organization, or merging organizations.  If propagation of a covered
 
work results from an entity transaction, each party to that
 
transaction who receives a copy of the work also receives whatever
 
licenses to the work the party's predecessor in interest had or could
 
give under the previous paragraph, plus a right to possession of the
 
Corresponding Source of the work from the predecessor in interest, if
 
the predecessor has it or can get it with reasonable efforts.
 

	
 
  You may not impose any further restrictions on the exercise of the
 
rights granted or affirmed under this License.  For example, you may
 
not impose a license fee, royalty, or other charge for exercise of
 
rights granted under this License, and you may not initiate litigation
 
(including a cross-claim or counterclaim in a lawsuit) alleging that
 
any patent claim is infringed by making, using, selling, offering for
 
sale, or importing the Program or any portion of it.
 

	
 
  11. Patents.
 

	
 
  A "contributor" is a copyright holder who authorizes use under this
 
License of the Program or a work on which the Program is based.  The
 
work thus licensed is called the contributor's "contributor version".
 

	
 
  A contributor's "essential patent claims" are all patent claims
 
owned or controlled by the contributor, whether already acquired or
 
hereafter acquired, that would be infringed by some manner, permitted
 
by this License, of making, using, or selling its contributor version,
 
but do not include claims that would be infringed only as a
 
consequence of further modification of the contributor version.  For
 
purposes of this definition, "control" includes the right to grant
 
patent sublicenses in a manner consistent with the requirements of
 
this License.
 

	
 
  Each contributor grants you a non-exclusive, worldwide, royalty-free
 
patent license under the contributor's essential patent claims, to
 
make, use, sell, offer for sale, import and otherwise run, modify and
 
propagate the contents of its contributor version.
 

	
 
  In the following three paragraphs, a "patent license" is any express
 
agreement or commitment, however denominated, not to enforce a patent
 
(such as an express permission to practice a patent or covenant not to
 
sue for patent infringement).  To "grant" such a patent license to a
 
party means to make such an agreement or commitment not to enforce a
 
patent against the party.
 

	
 
  If you convey a covered work, knowingly relying on a patent license,
 
and the Corresponding Source of the work is not available for anyone
 
to copy, free of charge and under the terms of this License, through a
 
publicly available network server or other readily accessible means,
 
then you must either (1) cause the Corresponding Source to be so
 
available, or (2) arrange to deprive yourself of the benefit of the
 
patent license for this particular work, or (3) arrange, in a manner
 
consistent with the requirements of this License, to extend the patent
 
license to downstream recipients.  "Knowingly relying" means you have
 
actual knowledge that, but for the patent license, your conveying the
 
covered work in a country, or your recipient's use of the covered work
 
in a country, would infringe one or more identifiable patents in that
 
country that you have reason to believe are valid.
 

	
 
  If, pursuant to or in connection with a single transaction or
 
arrangement, you convey, or propagate by procuring conveyance of, a
 
covered work, and grant a patent license to some of the parties
 
receiving the covered work authorizing them to use, propagate, modify
 
or convey a specific copy of the covered work, then the patent license
 
you grant is automatically extended to all recipients of the covered
 
work and works based on it.
 

	
 
  A patent license is "discriminatory" if it does not include within
 
the scope of its coverage, prohibits the exercise of, or is
 
conditioned on the non-exercise of one or more of the rights that are
 
specifically granted under this License.  You may not convey a covered
 
work if you are a party to an arrangement with a third party that is
 
in the business of distributing software, under which you make payment
 
to the third party based on the extent of your activity of conveying
 
the work, and under which the third party grants, to any of the
 
parties who would receive the covered work from you, a discriminatory
 
patent license (a) in connection with copies of the covered work
 
conveyed by you (or copies made from those copies), or (b) primarily
 
for and in connection with specific products or compilations that
 
contain the covered work, unless you entered into that arrangement,
 
or that patent license was granted, prior to 28 March 2007.
 

	
 
  Nothing in this License shall be construed as excluding or limiting
 
any implied license or other defenses to infringement that may
 
otherwise be available to you under applicable patent law.
 

	
 
  12. No Surrender of Others' Freedom.
 

	
 
  If conditions are imposed on you (whether by court order, agreement or
 
otherwise) that contradict the conditions of this License, they do not
 
excuse you from the conditions of this License.  If you cannot convey a
 
covered work so as to satisfy simultaneously your obligations under this
 
License and any other pertinent obligations, then as a consequence you may
 
not convey it at all.  For example, if you agree to terms that obligate you
 
to collect a royalty for further conveying from those to whom you convey
 
the Program, the only way you could satisfy both those terms and this
 
License would be to refrain entirely from conveying the Program.
 

	
 
  13. Use with the GNU Affero General Public License.
 

	
 
  Notwithstanding any other provision of this License, you have
 
permission to link or combine any covered work with a work licensed
 
under version 3 of the GNU Affero General Public License into a single
 
combined work, and to convey the resulting work.  The terms of this
 
License will continue to apply to the part which is the covered work,
 
but the special requirements of the GNU Affero General Public License,
 
section 13, concerning interaction through a network will apply to the
 
combination as such.
 

	
 
  14. Revised Versions of this License.
 

	
 
  The Free Software Foundation may publish revised and/or new versions of
 
the GNU General Public License from time to time.  Such new versions will
 
be similar in spirit to the present version, but may differ in detail to
 
address new problems or concerns.
 

	
 
  Each version is given a distinguishing version number.  If the
 
Program specifies that a certain numbered version of the GNU General
 
Public License "or any later version" applies to it, you have the
 
option of following the terms and conditions either of that numbered
 
version or of any later version published by the Free Software
 
Foundation.  If the Program does not specify a version number of the
 
GNU General Public License, you may choose any version ever published
 
by the Free Software Foundation.
 

	
 
  If the Program specifies that a proxy can decide which future
 
versions of the GNU General Public License can be used, that proxy's
 
public statement of acceptance of a version permanently authorizes you
 
to choose that version for the Program.
 

	
 
  Later license versions may give you additional or different
 
permissions.  However, no additional obligations are imposed on any
 
author or copyright holder as a result of your choosing to follow a
 
later version.
 

	
 
  15. Disclaimer of Warranty.
 

	
 
  THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY
 
APPLICABLE LAW.  EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT
 
HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY
 
OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO,
 
THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
 
PURPOSE.  THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM
 
IS WITH YOU.  SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF
 
ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
 

	
 
  16. Limitation of Liability.
 

	
 
  IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
 
WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS
 
THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY
 
GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE
 
USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF
 
DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD
 
PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS),
 
EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF
 
SUCH DAMAGES.
 

	
 
  17. Interpretation of Sections 15 and 16.
 

	
 
  If the disclaimer of warranty and limitation of liability provided
 
above cannot be given local legal effect according to their terms,
 
reviewing courts shall apply local law that most closely approximates
 
an absolute waiver of all civil liability in connection with the
 
Program, unless a warranty or assumption of liability accompanies a
 
copy of the Program in return for a fee.
 

	
 
                     END OF TERMS AND CONDITIONS
 

	
 

	
 

	
 
LGPL ADDENDUM:
 

	
 

	
 

	
 
                   GNU LESSER GENERAL PUBLIC LICENSE
 
                       Version 3, 29 June 2007
 

	
 
 Copyright (C) 2007 Free Software Foundation, Inc. <http://fsf.org/>
 
 Everyone is permitted to copy and distribute verbatim copies
 
 of this license document, but changing it is not allowed.
 

	
 

	
 
  This version of the GNU Lesser General Public License incorporates
 
the terms and conditions of version 3 of the GNU General Public
 
License, supplemented by the additional permissions listed below.
 

	
 
  0. Additional Definitions.
 

	
 
  As used herein, "this License" refers to version 3 of the GNU Lesser
 
General Public License, and the "GNU GPL" refers to version 3 of the GNU
 
General Public License.
 

	
 
  "The Library" refers to a covered work governed by this License,
 
other than an Application or a Combined Work as defined below.
 

	
 
  An "Application" is any work that makes use of an interface provided
 
by the Library, but which is not otherwise based on the Library.
 
Defining a subclass of a class defined by the Library is deemed a mode
 
of using an interface provided by the Library.
 

	
 
  A "Combined Work" is a work produced by combining or linking an
 
Application with the Library.  The particular version of the Library
 
with which the Combined Work was made is also called the "Linked
 
Version".
 

	
 
  The "Minimal Corresponding Source" for a Combined Work means the
 
Corresponding Source for the Combined Work, excluding any source code
 
for portions of the Combined Work that, considered in isolation, are
 
based on the Application, and not on the Linked Version.
 

	
 
  The "Corresponding Application Code" for a Combined Work means the
 
object code and/or source code for the Application, including any data
 
and utility programs needed for reproducing the Combined Work from the
 
Application, but excluding the System Libraries of the Combined Work.
 

	
 
  1. Exception to Section 3 of the GNU GPL.
 

	
 
  You may convey a covered work under sections 3 and 4 of this License
 
without being bound by section 3 of the GNU GPL.
 

	
 
  2. Conveying Modified Versions.
 

	
 
  If you modify a copy of the Library, and, in your modifications, a
 
facility refers to a function or data to be supplied by an Application
 
that uses the facility (other than as an argument passed when the
 
facility is invoked), then you may convey a copy of the modified
 
version:
 

	
 
   a) under this License, provided that you make a good faith effort to
 
   ensure that, in the event an Application does not supply the
 
   function or data, the facility still operates, and performs
 
   whatever part of its purpose remains meaningful, or
 

	
 
   b) under the GNU GPL, with none of the additional permissions of
 
   this License applicable to that copy.
 

	
 
  3. Object Code Incorporating Material from Library Header Files.
 

	
 
  The object code form of an Application may incorporate material from
 
a header file that is part of the Library.  You may convey such object
 
code under terms of your choice, provided that, if the incorporated
 
material is not limited to numerical parameters, data structure
 
layouts and accessors, or small macros, inline functions and templates
 
(ten or fewer lines in length), you do both of the following:
 

	
 
   a) Give prominent notice with each copy of the object code that the
 
   Library is used in it and that the Library and its use are
 
   covered by this License.
 

	
 
   b) Accompany the object code with a copy of the GNU GPL and this license
 
   document.
 

	
 
  4. Combined Works.
 

	
 
  You may convey a Combined Work under terms of your choice that,
 
taken together, effectively do not restrict modification of the
 
portions of the Library contained in the Combined Work and reverse
 
engineering for debugging such modifications, if you also do each of
 
the following:
 

	
 
   a) Give prominent notice with each copy of the Combined Work that
 
   the Library is used in it and that the Library and its use are
 
   covered by this License.
 

	
 
   b) Accompany the Combined Work with a copy of the GNU GPL and this license
 
   document.
 

	
 
   c) For a Combined Work that displays copyright notices during
 
   execution, include the copyright notice for the Library among
 
   these notices, as well as a reference directing the user to the
 
   copies of the GNU GPL and this license document.
 

	
 
   d) Do one of the following:
 

	
 
       0) Convey the Minimal Corresponding Source under the terms of this
 
       License, and the Corresponding Application Code in a form
 
       suitable for, and under terms that permit, the user to
 
       recombine or relink the Application with a modified version of
 
       the Linked Version to produce a modified Combined Work, in the
 
       manner specified by section 6 of the GNU GPL for conveying
 
       Corresponding Source.
 

	
 
       1) Use a suitable shared library mechanism for linking with the
 
       Library.  A suitable mechanism is one that (a) uses at run time
 
       a copy of the Library already present on the user's computer
 
       system, and (b) will operate properly with a modified version
 
       of the Library that is interface-compatible with the Linked
 
       Version.
 

	
 
   e) Provide Installation Information, but only if you would otherwise
 
   be required to provide such information under section 6 of the
 
   GNU GPL, and only to the extent that such information is
 
   necessary to install and execute a modified version of the
 
   Combined Work produced by recombining or relinking the
 
   Application with a modified version of the Linked Version. (If
 
   you use option 4d0, the Installation Information must accompany
 
   the Minimal Corresponding Source and Corresponding Application
 
   Code. If you use option 4d1, you must provide the Installation
 
   Information in the manner specified by section 6 of the GNU GPL
 
   for conveying Corresponding Source.)
 

	
 
  5. Combined Libraries.
 

	
 
  You may place library facilities that are a work based on the
 
Library side by side in a single library together with other library
 
facilities that are not Applications and are not covered by this
 
License, and convey such a combined library under terms of your
 
choice, if you do both of the following:
 

	
 
   a) Accompany the combined library with a copy of the same work based
 
   on the Library, uncombined with any other library facilities,
 
   conveyed under the terms of this License.
 

	
 
   b) Give prominent notice with the combined library that part of it
 
   is a work based on the Library, and explaining where to find the
 
   accompanying uncombined form of the same work.
 

	
 
  6. Revised Versions of the GNU Lesser General Public License.
 

	
 
  The Free Software Foundation may publish revised and/or new versions
 
of the GNU Lesser General Public License from time to time. Such new
 
versions will be similar in spirit to the present version, but may
 
differ in detail to address new problems or concerns.
 

	
 
  Each version is given a distinguishing version number. If the
 
Library as you received it specifies that a certain numbered version
 
of the GNU Lesser General Public License "or any later version"
 
applies to it, you have the option of following the terms and
 
conditions either of that published version or of any later version
 
published by the Free Software Foundation. If the Library as you
 
received it does not specify a version number of the GNU Lesser
 
General Public License, you may choose any version of the GNU Lesser
 
General Public License ever published by the Free Software Foundation.
 

	
 
  If the Library as you received it specifies that a proxy can decide
 
whether future versions of the GNU Lesser General Public License shall
 
apply, that proxy's public statement of acceptance of any version is
 
permanent authorization for you to choose that version for the
 
Library.
rgbled/Adafruit_NeoPixel/README.md
Show inline comments
 
new file 100644
 
Adafruit NeoPixel library
 
=========================
 

	
 
Arduino library for controlling single-wire-based LED pixels and strip such as the [Adafruit 60 LED/meter Digital LED strip][strip], the [Adafruit FLORA RGB Smart Pixel][flora], the [Adafruit Breadboard-friendly RGB Smart Pixel][pixel], the [Adafruit NeoPixel Stick][stick], and the [Adafruit NeoPixel Shield][shield].
 

	
 
After downloading, rename folder to 'Adafruit_NeoPixel' and install in Arduino Libraries folder. Restart Arduino IDE, then open File->Sketchbook->Library->Adafruit_NeoPixel->strandtest sketch.
 

	
 
[flora]:  http://adafruit.com/products/1060
 
[strip]:  http://adafruit.com/products/1138
 
[pixel]:  http://adafruit.com/products/1312
 
[stick]:  http://adafruit.com/products/1426
 
[shield]: http://adafruit.com/products/1430
rgbled/Adafruit_NeoPixel/keywords.txt
Show inline comments
 
new file 100644
 
#######################################
 
# Syntax Coloring Map For Adafruit_NeoPixel
 
####################################### 
 
# Class
 
#######################################
 

	
 
Adafruit_NeoPixel	KEYWORD1
 

	
 
#######################################
 
# Methods and Functions 
 
#######################################	
 

	
 
setPixelColor	KEYWORD2
 
setPin			KEYWORD2
 
setBrightness	KEYWORD2
 
numPixels		KEYWORD2
 
getPixelColor	KEYWORD2
 
Color			KEYWORD2
 

	
 
#######################################
 
# Constants
 
#######################################
 
 
 
NEO_GRB			LITERAL1
 
NEO_COLMASK		LITERAL1
 
NEO_KHZ800		LITERAL1
 
NEO_SPDMASK		LITERAL1
 
NEO_RGB			LITERAL1
 
NEO_KHZ400		LITERAL1
rgbled/Adafruit_NeoPixel/library.properties
Show inline comments
 
new file 100644
 
name=Adafruit NeoPixel
 
version=1.0
 
author=Adafruit
 
maintainer=Adafruit <info@adafruit.com>
 
sentence=Arduino library for controlling single-wire-based LED pixels and strip.
 
paragraph=Arduino library for controlling single-wire-based LED pixels and strip.
 
category=Display
 
url=https://github.com/adafruit/Adafruit_NeoPixel
 
architectures=*
rgbled/makefile
Show inline comments
 
new file 100644
 
BOARD_TAG    = nano328
 
ARDUINO_LIBS = Adafruit_NeoPixel
 
USER_LIB_PATH := $(realpath .)
 

	
 
include /usr/share/arduino/Arduino.mk
rgbled/nanostrip.cc
Show inline comments
 
new file 100644
 
#include <Arduino.h>
 
#include <Adafruit_NeoPixel.h>
 

	
 
// Parameter 1 = number of pixels in strip
 
// Parameter 2 = pin number (most are valid)
 
// Parameter 3 = pixel type flags, add together as needed:
 
//   NEO_RGB     Pixels are wired for RGB bitstream
 
//   NEO_GRB     Pixels are wired for GRB bitstream
 
//   NEO_KHZ400  400 KHz bitstream (e.g. FLORA pixels)
 
//   NEO_KHZ800  800 KHz bitstream (e.g. High Density LED strip)
 
Adafruit_NeoPixel strip = Adafruit_NeoPixel(50, 5, NEO_RGB + NEO_KHZ800);
 

	
 
// max about 26 with malloc; 36 works with a static array in the class
 

	
 
#define debugLed 13
 
void intro() {
 
  uint32_t red = strip.Color(255,0,0), black = strip.Color(0,0,0);
 
  strip.setPixelColor(0,   red); strip.show(); delay(100);
 
  strip.setPixelColor(0, black); strip.show(); delay(100);
 
  strip.setPixelColor(0,   red); strip.show(); delay(100);
 
  strip.setPixelColor(0, black); strip.show(); delay(100);
 
}
 
int main(void) {
 
  init();
 
  pinMode(debugLed, OUTPUT);
 
  strip.begin();
 
  intro(); 
 
  Serial.begin(115200);
 
 
 
  uint8_t i,r,g,b;
 
  while (1) {
 
    while (Serial.available() <= 2) {
 
    }
 
    i = Serial.read();
 
    if (i != 0x60) {
 
      continue;
 
    }
 
    i = Serial.read(); // command
 
    if (i == 0) { // set strip: 0x60 0x00 <numPixels * 3 bytes>
 
      digitalWrite(debugLed, 1);
 
      for (i=0; i < strip.numPixels(); i++) {
 
        while (Serial.available() < 3) {
 
        }
 
        r = Serial.read();
 
        g = Serial.read();
 
        b = Serial.read();
 
        strip.setPixelColor(i, strip.Color(g, r, b));
 
      }
 
      strip.show();
 

	
 
      digitalWrite(debugLed, 0);
 
    } else if (i == 1) { // set pwm on D3: 0x60 0x01 <level>
 
      while (Serial.available() < 1) {
 
      }
 
      analogWrite(3, Serial.read());
 
    } else {
 
        // unknown command
 
    }
 
  }
 
}
0 comments (0 inline, 0 general)