Hashes are like checksums in that it takes an individual binary file and uses an algorithm based on the original file to generate an individual number. This number can then be compared to a reference number to determine integrity and authenticity of the file. These hashes play an integral part in production releases of a […]
Category: Systems
C# Example – CRC8 Implementation
In support of my previous post on the CRC8 checksum. I compiled this basic program to provide a real-world implementation. The example uses a potential serial communication protocol that consists of a START and END deliminter using GREATER-THAN and LESS-THAN symbols. The first two bytes L1 and L0 indicate the length of the payload (Command […]
RealTerm and CSV Debugging
What if what you’re debugging is a little more complicated than verifying a serial packet? That you’re not just tracking down an issue with a couple bytes or words of sensor, variable, or EEPROM data, but a more complex algorithm. In doing so, you may want to know the critical values involved in each step […]