I hereby claim:
- I am hardolaf on github.
- I am hardolaf (https://keybase.io/hardolaf) on keybase.
- I have a public key whose fingerprint is A6CD A6B7 983E 9422 2C86 048A D546 9F84 2613 0FCE
To claim this, I am signing this object:
void setup() { | |
DDRF = DDRF | _BV(5); | |
} | |
void loop() { | |
if (!(PINF & _BV(7))) { | |
PORTF |= _BV(5); | |
} else { | |
PORTF &= ~_BV(5); | |
} |
void setup() { | |
pinMode(A0, INPUT); | |
pinMode(A2, OUTPUT); | |
} | |
void loop() { | |
if (DDRF & _BV(7)) { | |
PORTF |= _BV(5); | |
} else { | |
PORTF &= ~_BV(5); |
network={ | |
ssid="osuwireless" | |
scan_ssid=1 | |
key_mgmt=WPA-EAP | |
eap=PEAP | |
ca_cert="/etc/ssl/certs/AddTrust_External_Root.pem" | |
phase1="peaplabel=0" | |
phase2="auth=MSCHAPV2" | |
identity="hardolaf" | |
password="hunter2" |
I hereby claim:
To claim this, I am signing this object:
/* | |
40 to 50 channel data acquisition | |
TODO: Detection of optional channels 41 to 50 | |
TODO: Collect only when data is incoming | |
created 09 April 2014 | |
by Joseph Warner | |
*/ |
/* | |
40 to 50 channel data acquisition | |
TODO: Detection of optional channels 41 to 50 | |
TODO: Collect only when data is incoming | |
created 09 April 2014 | |
by Joseph Warner | |
*/ |
; MSP430 Assembler Code Template for use with TI Code Composer Studio | |
; | |
; | |
;------------------------------------------------------------------------------- | |
.cdecls C,LIST,"msp430.h" ; Include device header file | |
;------------------------------------------------------------------------------- | |
.text ; Assemble into program memory | |
.retain ; Override ELF conditional linking | |
; and retain current section |
ESC[33mcommit 7cfd5401d0edcaece9459195eab4252ca76e7f0eESC[m | |
Author: Joseph Warner <hardolaf@hardolaf.com> | |
AuthorDate: Sat Apr 13 10:37:30 2013 -0400 | |
Commit: Joseph Warner <hardolaf@hardolaf.com> | |
CommitDate: Sat Apr 13 10:37:30 2013 -0400 | |
[Robot] Code right before competition start | |
ESC[1mdiff --git a/Proteus/Proteus.creator.user b/Proteus/Proteus.creator.userESC[m | |
ESC[1mindex 6066117..ad38000 100755ESC[m |
#!/bin/sh | |
# This is a stripped-down script to connect to wpa networks on GNU/Linux systems | |
echo "* Connecting to the internet... " | |
if ps ax|awk '{print$5}'|grep -q 'wpa_supplicant' | |
then | |
echo -n " - Killing previous wpa_supplicant... " | |
if pkill wpa_supplicant; then | |
echo "done." |
wlan0: Trying to associate with SSID 'osuwireless' | |
wlan0: Associated with d8:c7:c8:a0:c4:c8 | |
wlan0: CTRL-EVENT-EAP-STARTED EAP authentication started | |
wlan0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25 | |
wlan0: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected | |
wlan0: CTRL-EVENT-EAP-PEER-CERT depth=1 subject='/C=US/O=Equifax/OU=Equifax Secure Certificate Authority' | |
wlan0: CTRL-EVENT-EAP-PEER-CERT depth=0 subject='/serialNumber=IPxpNxeOrDo-OvjbgfrLiTzaoYos67yx/C=US/ST=Ohio/L=Columbus/O=The Ohio State University/OU=Office of the Chief Information Officer/CN=wireless.osu.edu' | |
EAP-MSCHAPV2: Authentication succeeded | |
EAP-TLV: TLV Result - Success - EAP-TLV/Phase2 Completed | |
wlan0: CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully |