This is an automated email from the ASF dual-hosted git repository.

xiaoxiang pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/nuttx-apps.git

commit 0f57c325612ead63b4f278f36a3097e72a5d6186
Author: raiden00pl <raide...@railab.me>
AuthorDate: Tue Oct 24 14:04:58 2023 +0200

    remove wireless/xxx/README.md. Migrated to 
Documentation/applications/wireless
---
 wireless/bluetooth/btsak/README.md  | 140 --------------------------
 wireless/bluetooth/nimble/README.md |  75 --------------
 wireless/ieee802154/i8sak/README.md | 189 ------------------------------------
 3 files changed, 404 deletions(-)

diff --git a/wireless/bluetooth/btsak/README.md 
b/wireless/bluetooth/btsak/README.md
deleted file mode 100644
index 7ab3c0211..000000000
--- a/wireless/bluetooth/btsak/README.md
+++ /dev/null
@@ -1,140 +0,0 @@
-# Wireless / Bluetooth / `btsak` Bluetooth Swiss Army Knife
-
-## Commands
-
-```
-Command:      help
-Description:  Should overall command help
-Usage:        bt <ifname> help
-```
-
-```
-Command:      info
-Description:  Show Bluetooth driver information
-Usage:        bt <ifname> info [-h]
-```
-
-```
-Command:      features
-Description:  Show Bluetooth driver information
-Usage:        bt <ifname> features [-h] [le]
-Where:        le - Selects LE features vs BR/EDR features
-```
-
-```
-Command:      scan
-Description:  Bluetooth scan commands
-Usage:        bt <ifname> scan [-h] <start [-d]|get|stop>
-Where:        start - Starts scanning.  The -d option enables duplicate
-                filtering.
-              get   - Shows new accumulated scan results
-              stop  - Stops scanning
-```
-
-```
-Command:      advertise
-Description:  Bluetooth advertise commands
-Usage:        bt <ifname> advertise [-h] <start|stop>
-Where:        start - Starts advertising
-              stop  - Stops advertising
-```
-
-```
-Command:      security
-Description:  Enable security (encryption) for a connection:
-              If device is paired, key encryption will be enabled.  If
-              the link is already encrypted with sufficiently strong
-              key this command does nothing.
-
-              If the device is not paired pairing will be initiated. If
-              the device is paired and keys are too weak but input output
-              capabilities allow for strong enough keys pairing will be
-              initiated.
-
-              This command may return error if required level of security
-              is not possible to achieve due to local or remote device
-              limitation (eg input output capabilities).
-Usage:        bt <ifname> security [-h] <addr> public|random <level>
-Where:        <addr>  - The 6-byte address of the connected peer
-              <level> - Security level, on of:
-
-                low     - No encryption and no authentication
-                medium  - Encryption and no authentication (no MITM)
-                high    - Encryption and authentication (MITM)
-                fips    - Authenticated LE secure connections and encryption
-```
-
-```
-Command:      gatt
-Description:  Generic Attribute (GATT) commands
-Usage:        bt <ifname> gatt [-h] <cmd> [option [option [option...]]]
-Where:        See "GATT Commands" below
-```
-
-## GATT Commands
-
-```
-Command:      exchange-mtu
-Description:  Set MTU to out maximum and negotiate MTU with peer
-Usage:        bt <ifname> gatt exchange-mtu [-h] <addr> public|random
-```
-
-```
-Command:      mget
-Description:  Get the pass/fail result of the last GATT 'exchange-mtu' command
-Usage:        bt <ifname> gatt mget [-h]
-```
-
-```
-Command:      discover
-Description:  Initiate discovery
-Usage:        bt <ifname> gatt discover [-h] <addr> public|random <uuid16> 
[<start> [<end>]]
-```
-
-```
-Command:      characteristic
-Description:  Initiate characteristics discovery
-Usage:        bt <ifname> gatt characteristic [-h] <addr> public|random 
[<start> [<end>]]
-```
-
-```
-Command:      descriptor
-Description:  Initiate characteristics discovery
-Usage:        bt <ifname> gatt descriptor [-h] <addr> public|random [<start> 
[<end>]]
-```
-
-```
-Command:      dget
-Description:  Get the result of the last discovery action
-Usage:        bt <ifname> gatt dget [-h]
-```
-
-```
-Command:      read
-Description:  Initiate a GATT read operation.
-Usage:        bt <ifname> gatt read [-h] <addr> public|random <handle> 
[<offset>]
-```
-
-```
-Command:      read-multiple
-Description:  Initiate a GATT read-multiple operation.
-Usage:        bt <ifname> gatt read-multiple [-h] <addr> public|random 
<handle> [<handle> [<handle>]..]
-```
-
-```
-Command:      rget
-Description:  Get the data resulting from the last read operation
-Usage:        bt <ifname> gatt rget [-h]
-```
-
-```
-Command:      write
-Description:  Initiate a GATT write operation.
-Usage:        bt <ifname> gatt write [-h] <addr> public|random <handle> <byte> 
[<byte> [<byte>]..]
-```
-
-```
-Command:      wget
-Description:  Get the pass/fail result of the last GATT 'write' command
-Usage:        bt <ifname> gatt wget [-h]
-```
diff --git a/wireless/bluetooth/nimble/README.md 
b/wireless/bluetooth/nimble/README.md
deleted file mode 100644
index 5800c6b5e..000000000
--- a/wireless/bluetooth/nimble/README.md
+++ /dev/null
@@ -1,75 +0,0 @@
-# nimBLE for NuttX
-
-This application will build nimBLE stack (host-only) as a library/application
-in NuttX.
-
-# Porting Layer
-
-nimBLE supports being built as part of different OS, not only their mynewt
-RTOS. A porting layer was written for NuttX, which was mostly a copy of
-the Linux porting layer.
-
-## Modifying the porting layer
-
-NuttX is supported in nimBLE by adding an entry in the porting layer
-used to support different OSs. However, nimBLE supports each OS
-by generating a configuration header (`syscfg.h`) from YAML configuration
-files. If you want to modify the porting layer and change its configuration
-you will need to regenerate this header. This process is a bit involved since
-nimBLE uses its own `newt` build tool to do so and also somewhat assumes it 
will
-be built for their mynewt OS, so it actually may fail to build completely but
-it will still get to generate the required files.
-
-So, first is to get the newt tool:
-
-  $ cd apps/nimble
-  $ git clone https://github.com/apache/mynewt-newt
-  $ cd mynewt-newt
-
-At the moment, you will probably require unstable version
-instead of a release so select a known working:
-
-  $ git checkout c14c47bb683d
-  $ ./build.sh
-
-There should be now a `newt` binary under `mynewt-newt/newt`.
-Extend your path so that it is visible:
-
-  $ export PATH=mynewt-newt/newt:$PATH
-
-Now, create a `newt` project:
-
-  $ newt new foo
-
-We want latest master version of mynewt OS and stack, so edit
-`foo/project.yml` and change the `vers` variable to `0.0.0`. Now
-do
-
-  $ cd foo/
-  $ newt upgrade
-
-Under `foo/repos` there will be a clone of both mynewt and nimble
-repo. Since this app already downloads nimble repo outside of `foo`,
-you can delete `foo/repos/apache-mynewt-nimble` and simply make a
-link to the `mynewt-nimble` directory, so that you can work on the
-nimBLE code directly.
-
-Now you can make any changes to the `yml` files such as
-`porting/targets/nuttx/syscfg.yml`. Finally, you can build with:
-
-  $ newt build @apache-mynewt-nimble/porting/targets/nuttx
-
-This will most likely fail to complete but the generated headers
-should be there. So now copy them to the appropriate location in
-the `nuttx` target directory:
-
-  $ cd foo/
-  $ cp 
bin/@apache-mynewt-nimble/porting/targets/nuttx/generated/include/logcfg/logcfg.h
 \
-       repos/apache-mynewt-nimble/porting/examples/nuttx/include/logcfg
-  $ cp 
bin/@apache-mynewt-nimble/porting/targets/nuttx/generated/include/syscfg/syscfg.h
 \
-       repos/apache-mynewt-nimble/porting/examples/nuttx/include/syscfg
-
-If these changes are done to fix a problem with NuttX porting layer in nimBLE, 
you
-should open a pull-request to nimBLE repository to include the updated header 
files.
-It is recommended to mention the issue in NuttX mailing list first to ensure 
the change
-is needed.
diff --git a/wireless/ieee802154/i8sak/README.md 
b/wireless/ieee802154/i8sak/README.md
deleted file mode 100644
index 1a0557b51..000000000
--- a/wireless/ieee802154/i8sak/README.md
+++ /dev/null
@@ -1,189 +0,0 @@
-# Wireless / IEEE 802.15.4 / `i8sak` or `i8` IEEE 802.15.4 Swiss Army Knife
-
-## Description
-
-The i8sak app is a useful CLI for testing various IEEE 802.15.4 functionality.
-It also serves as a starting place for learning how to interface with the NuttX
-IEEE 802.15.4 MAC layer.
-
-The i8sak CLI can be used to manipulate multiple MAC layer networks at once.
-Both a MAC character driver interface and a network interface using sockets are
-supported. The MAC character driver is used in cases where networking is not
-enabled and you want your application to use IEEE 802.15.4 directly. In most
-cases however, you will probably be using 6LoWPAN networking support and
-therefore, the MAC can be controlled directly from the socket interface rather
-than the MAC character driver. IEEE 802.15.4 MAC character drivers show up in
-NuttX as `/dev/ieeeN` by default.
-
-When you invoke the first call to i8sak with a specified interface name, it
-creates an i8sak instance and launches a daemon to handle processing work. The
-instance is considered sticky, so it is possible to run `i8 /dev/ieee0` or `i8
-wpan0` at the beginning of a session and then can exclude the interface name
-from all future calls. The number of i8sak instances supported is controllable
-through menuconfig.
-
-The `i8sak` app has many settings that can be configured. Most options are
-_sticky_, meaning, if you set the endpoint short address once, any future
-operation using the endpoint short address can default to the previously used
-address. This is particularly useful to keep the command lengths down.
-
-## How To Use
-
-The i8sak app has a series of CLI functions that can be invoked. The default
-i8sak command is `i8` to make things quick and easy to type.
-
-In my test setup I have 2 Clicker2-STM32 boards from MikroElektronika, with the
-BEE-click (MRF24J40) radios. Choose one device to be the PAN Coordinator. We'll
-refer to that as device A.
-
-On that device, run:
-
-```shell
-i8 /dev/ieee0 startpan cd:ab
-```
-
-This will tell the MAC layer that it should now act as a PAN coordinator using
-PAN ID CD:AB. For now, this function assumes that we are operating a non-beacon
-enabled PAN, since, as of this writing, beacon-enabled networks are unfinished.
-
-Next, on the same device, run:
-
-```shell
-i8 acceptassoc
-```
-
-Notice in the second command, we did not use the devname, again, that is
-_sticky_ so unless we are switching back and forth between character drivers, 
we
-can just use it once.
-
-The acceptassoc command, without any arguments, informs the `i8sak` instance to
-accept all association requests. The acceptassoc command also allows you to 
only
-accept requests from a single device by specifying the extended address with
-option `-e`.
-
-For instance:
-
-```shell
-i8 acceptassoc -e DEADBEEF00FADE0B
-```
-
-But for this example, let's just use the command with no arguments.
-
-Now, the second device will act as an endpoint device. The i8sak instance
-defaults to being in endpoint mode. Let's refer to the second device as device
-`B`.
-
-On device B, run:
-
-```shell
-i8 /dev/ieee0 assoc
-```
-
-This command attempts to associate with the node at the configured endpoint
-address. If everything is setup correctly, device A should have log information
-saying that a device tried to associate and that it accepted the association. 
On
-device `B`, the console should show that the association request was 
successful.
-With all default settings, device B should have been allocated a short address
-of `0x000B`.
-
-If you are following along with a packet sniffer, you should see something
-similar to the following:
-
-```
-1) Association Request
-    Frame Type      - CMD
-    Sequence Number - 0
-    Dest. PAN ID    - 0xFADE
-    Dest. Address   - 0x000A
-    Src.  PAN ID    - 0xFFFE
-    Src.  Address   - 0xDEADBEEF00FADE0C
-    Command Type    - Association Request
-
-    1a) ACK
-        Frame Type      - ACK
-        Sequence Number - 0
-
-2) Data Request
-    Frame Type      - CMD
-    Sequence Number - 1
-    Dest. PAN ID    - 0xFADE
-    Dest. Address   - 0x000A
-    Src.  PAN ID    - 0xFFFE
-    Src.  Address   - 0xDEADBEEF00FADE0C
-    Command Type    - Data Request
-
-    2a) ACK
-        Frame Type      - ACK
-        Sequence Number - 1
-
-3) Association Response
-    Frame Type      - CMD
-    Sequence Number - 0
-    Dest. PAN ID    - 0xFADE
-    Dest. Address   - 0xDEADBEEF00FADE0C
-    Src.  Address   - 0xDEADBEEF00FADE0A
-    Command Type    - Association Response
-    Assigned SADDR  - 0x000C
-    Assoc Status    - Successful
-
-    3a) ACK
-        Frame Type      - ACK
-        Sequence Number - 0
-```
-
-The default endpoint address can be configured via Kconfig or set dynamically
-using the `set` command.
-
-Here is how to set the endpoint short address
-
-```shell
-i8 set ep_saddr 0a:00
-```
-
-When setting the address, it's important to make sure the endpoint addressing
-mode is configured the way you want: Use `s` for short addressing or `e` for
-extended
-
-```shell
-i8 set ep_addrmode s
-```
-
-Device B has now successfully associated with device A. If you want to send 
data
-from device B to device A, run the following on device B:
-
-```shell
-i8 tx ABCDEF
-```
-
-This will immediately (not actually immediate, transaction is sent using CSMA)
-send the frame to device A with frame payload `0xABCDEF`
-
-Sending data from device A to device B is different. In IEEE 802.15.4, frames
-must be extracted from the coordinator. To prepare the frame, run the following
-command on device A
-
-```shell
-i8 tx AB
-```
-
-Because the devmode is PAN Coordinator, the `i8sak` app knows to send the data
-as an indirect transaction. If you were running the `i8sak` app on a device 
that
-is a coordinator, but not the PAN coordinator, you can force the `i8sak` app to
-send the transaction directly, rather than to the parent coordinator, by using
-the `-d` option.
-
-**Note**: Currently, the indirect transaction timeout is disabled. This means
-frames must be extracted or space may run out. This is only for the testing
-phase as it is easier to debug when I am not fighting a timeout. Re-enabling 
the
-timeout may effect the behavior of the indirect transaction features in the
-`i8sak` app.
-
-To extract the data, run the following command on device `B`:
-
-```shell
-i8 poll
-```
-
-This command polls the endpoint (our device A PAN Coordinator in this case) to
-see if there is any data. In the console of device B you should see a Poll
-request status print out.

Reply via email to