On Sunday 20 December 2009, Catalin Patulea wrote:
> http://sourceforge.net/apps/mediawiki/urjtag/index.php?title=Cable_Altera_USB-Blaster
>
> This is itself extracted from comments in usb_jtag sources, which is
> presumably a result of reverse engineering a USB Blaster.
It's worth putting a statement of the history and these
issues at the top of the source file. Points that stick
in my mind:
- Original code is from the USB-JTAG project
http://www.ixo.de/info/usb_jtag/
- You updated it
- Altera protocol was reverse engineered for USB-JTAG
Also, since I understand mediawiki is going away(*), it
might be worth making that header comment highlight some
key points from that doc ... I'd suggest
- Altera's hardware structure (FT245 + CPLD)
- The way USB-JTAG lets that be emulated with other hardware,
notably the FX2 version; and
- The fact that there are three operational modes (but leave
any details of the modes to your comments in the code).
Just a couple paragraphs should suffice, giving full credit
to USB-JTAG for that part of the hard work.
- Dave
(*) Presumably the content won't be lost, but one
doesn't know ...
_______________________________________________
Openocd-development mailing list
[email protected]
https://lists.berlios.de/mailman/listinfo/openocd-development