[Xastir] New script: ads-b.pl for snagging airplane positions

Curt Mills curt.we7u at gmail.com
Fri Feb 26 10:35:00 EST 2016


Want to do it in an even cooler way?

    $ xastir_udp_client localhost 2023 <callsign> <passcode> -identify
    Received: WE7U-13

Maybe that gives you some ideas...  If you don't do it, I'll get around to
doing it soon. Soon being relative.

Hint: Use backticks instead of the system() command to save the results of
a command. So something like this might work (untested code):

  $result = `xastir_udp_client localhost 2023 <callsign> <passcode>
-identify`;

Then split the callsign/SSID up into two (if SSID is present) with
"split()" and figure out if the SSID you want to inject with is different
than the running Xastir's SSID. If not, increment mod 16.


On Thu, Feb 25, 2016 at 5:47 PM, Lee Bengston <lee.bengston at gmail.com>
wrote:

> ​Not any more.  Now it only prompts the user for a callsign​.  If the user
> enters the same call+SSID found in xastir.cnf, it's not accepted.  It still
> uses callpass to determine the passcode.
>

-- 
Curt, WE7U
http://wetnet.net/~we7u
http://www.sarguydigital.com


More information about the Xastir mailing list