2 # GoodFET Chipcon Example
4 # (C) 2009 Travis Goodspeed <travis at radiantmachines.com>
6 # This code is being rewritten and refactored. You've been warned!
11 from GoodFETCC import GoodFETCC;
12 from GoodFETConsole import GoodFETConsole;
13 from intelhex import IntelHex;
16 def printpacket(packet):
21 s="%s %02x" % (s,foo);
25 def handlesimplicitipacket(packet):
28 global simplepacketcount;
29 simplepacketcount=simplepacketcount+1;
45 #payload begins at byte 10.
47 if packet[len+2]&0x80==0:
48 print "# Dropped broken packet.";
54 if x>=128: x=0-(x^0xFF)-1;
56 if y>=128: y=0-(y^0xFF)-1;
58 if z>=128: z=0-(z^0xFF)-1;
60 print "%09i %03i %4i %4i %4i" % (simplepacketcount,button,x,y,z);
63 #Link request. Gotta send a proper reply to get data.
65 #14 ff ff ff ff 3c b7 e3 98
70 src[0], src[1], src[2], src[3],
71 0x78,0x56,0x34,0x10, #my address.
73 0x81, tid, #reply, tid
75 0x20,0x00,0xad,0xde, #link token
78 print "#FIXME FAST: repeatedly broadcasting ACK to catch LINK on the next attempt.";
79 for foo in range(1,50):
80 client.RF_txpacket(reply);
84 #print "Join request.";
87 print "Not a join request. WTF?";
90 reply=[0x12, #reply is one byte shorter
91 src[0], src[1], src[2], src[3],
92 0x78,0x56,0x34,0x10, #my address.
94 0x81, tid, #reply, tid
96 0xef,0xbe,0xad,0xde, #Join token
99 print "#FIXME FAST: repeatedly broadcasting ACK to catch JOIN on the next attempt.";
101 for foo in range(1,50):
102 client.RF_txpacket(reply);
106 print "Security request.";
108 print "Frequency request.";
110 print "Management request.";
112 print "Unknown Port %02x" %port;
114 if(len(sys.argv)==1):
115 print "Usage: %s verb [objects]\n" % sys.argv[0];
116 print "%s erase" % sys.argv[0];
117 print "%s flash $foo.hex" % sys.argv[0];
118 print "%s test" % sys.argv[0];
119 print "%s term" % sys.argv[0];
120 print " use \'?\' for list of commands";
121 print "%s info" % sys.argv[0];
122 print "%s infotest" % sys.argv[0];
123 print "%s radioinfo [help] [REGISTER_NAME]" % sys.argv[0];
124 print "%s specfuncreg [SPECIAL_REGISTER_NAME]" % sys.argv[0];
125 print "%s halt" % sys.argv[0];
126 print "%s regs" % sys.argv[0];
127 print "%s dumpcode $foo.hex [0x$start 0x$stop]" % sys.argv[0];
128 print "%s dumpdata $foo.hex [0x$start 0x$stop]" % sys.argv[0];
129 print "%s writedata $foo.hex [0x$start 0x$stop]" % sys.argv[0];
130 print "%s verify $foo.hex [0x$start 0x$stop]" % sys.argv[0];
131 print "%s peekdata 0x$start [0x$stop]" % sys.argv[0];
132 print "%s pokedata 0x$adr 0x$val" % sys.argv[0];
133 print "%s peek 0x$iram" % sys.argv[0];
134 print "%s poke 0x$iram 0x$val" % sys.argv[0];
135 print "%s peekcode 0x$start [0x$stop]" % sys.argv[0];
137 print "%s rssi [freq]\n\tGraphs signal strength on [freq] Hz." % sys.argv[0];
138 print "%s carrier [freq]\n\tHolds a carrier on [freq] Hz." % sys.argv[0];
139 print "%s reflex [freq]\n\tJams on [freq] Hz." % sys.argv[0];
140 print "%s sniffsimpliciti [us|eu|lf]\n\tSniffs SimpliciTI packets." % sys.argv[0];
141 print "%s sniffdash7 [lf]\n\tSniffs Dash7. (untested)" % sys.argv[0];
142 print "%s snifficlicker [us]\n\tSniffs iClicker." % sys.argv[0];
144 print "%s simpliciti [us|eu|lf]\n\tSimpliciti access point for Chronos watch." % sys.argv[0];
145 print "%s iclicker [us|eu|lf]\n\tSniffs iClicker packets as ASCII." % sys.argv[0];
149 #Initailize FET and set baud rate
150 #client=GoodFET.GoodFETCC.GoodFETCC();
160 if(sys.argv[1]=="carrier"):
162 client.RF_setfreq(eval(sys.argv[2]));
167 if(sys.argv[1]=="reflex"):
168 client.CC1110_crystal();
171 client.config_simpliciti();
175 client.RF_setfreq(eval(sys.argv[2]));
176 print "Listening on %f MHz." % (client.RF_getfreq()/10**6);
177 print "Jamming if RSSI>=%i" % threshold;
179 client.pokebyte(0xFE00,threshold,"xdata"); #Write threshold to shellcode.
180 client.shellcodefile("reflex.ihx");
183 while(0==client.ishalted()):
185 rssi=client.peek8(0xFE00,"xdata");
186 print "Activated jamming with RSSI of %i, going again for another packet." % rssi;
187 #client.CCdebuginstr([0x02, 0xf0, 0x00]); #ljmp 0xF000
191 if(sys.argv[1]=="rssi"):
192 client.CC1110_crystal();
195 client.config_simpliciti();
198 client.RF_setfreq(eval(sys.argv[2]));
199 print "Listening on %f MHz." % (client.RF_getfreq()/10.0**6);
203 client.CC_RFST_CAL();
208 rssi=client.RF_getrssi();
209 client.CC_RFST_IDLE(); #idle
212 for foo in range(0,rssi>>2):
213 string=("%s."%string);
214 print "%02x %04i %s" % (rssi,rssi, string);
216 if(sys.argv[1]=="sniff"):
217 client.CC1110_crystal();
220 #client.config_simpliciti(region);
222 print "Listening as %x on %f MHz" % (client.RF_getsmac(),
223 client.RF_getfreq()/10.0**6);
224 #Now we're ready to get packets.
228 packet=client.RF_rxpacket();
232 if(sys.argv[1]=="sniffsimpliciti"):
237 client.CC1110_crystal();
240 client.config_simpliciti(region);
242 print "Listening as %x on %f MHz" % (client.RF_getsmac(),
243 client.RF_getfreq()/10.0**6);
244 #Now we're ready to get packets.
248 packet=client.RF_rxpacket();
251 if(sys.argv[1]=="sniffook"):
256 client.CC1110_crystal();
259 client.config_ook(region);
261 print "Listening for OOK on %f MHz" % (client.RF_getfreq()/10.0**6);
262 #Now we're ready to get packets.
266 packet=client.RF_rxpacket();
269 if(sys.argv[1]=="sniffdash7"):
274 client.CC1110_crystal();
277 client.config_dash7(region);
279 print "Listening as %x on %f MHz" % (client.RF_getsmac(),
280 client.RF_getfreq()/10.0**6);
281 #Now we're ready to get packets.
285 packet=client.RF_rxpacket();
288 if(sys.argv[1]=="snifficlicker"):
293 client.CC1110_crystal();
296 client.config_iclicker(region);
298 print "Listening as %x on %f MHz" % (client.RF_getsmac(),
299 client.RF_getfreq()/10.0**6);
300 #Now we're ready to get packets.
304 packet=client.RF_rxpacket();
307 if(sys.argv[1]=="iclicker"):
308 buttons=[0, 'A', 'j', 3, 4, 'B',
309 6, 7, 8, 9, 'E', 0xB, 0xC,
315 client.CC1110_crystal();
318 client.config_iclicker(region);
320 print "Listening as %x on %f MHz" % (client.RF_getsmac(),
321 client.RF_getfreq()/10.0**6);
322 #Now we're ready to get packets.
326 packet=client.RF_rxpacket();
328 button=((packet[5]&1)<<3) | (packet[6]>>5);
329 print "Button %c" % buttons[button];
332 if(sys.argv[1]=="simpliciti"):
337 client.CC1110_crystal();
340 client.config_simpliciti(region);
342 print "# Listening as %x on %f MHz" % (client.RF_getsmac(),
343 client.RF_getfreq()/10.0**6);
344 #Now we're ready to get packets.
348 packet=client.RF_rxpacket();
349 handlesimplicitipacket(packet);
354 if(sys.argv[1]=="term"):
355 GoodFETConsole(client).run();
356 if(sys.argv[1]=="test"):
358 if(sys.argv[1]=="deadtest"):
359 for i in range(1,10):
360 print "IDENT as %s" % client.CCidentstr();
361 if(sys.argv[1]=="dumpcode"):
366 start=int(sys.argv[3],16);
368 stop=int(sys.argv[4],16);
370 print "Dumping code from %04x to %04x as %s." % (start,stop,f);
374 h[i]=client.CCpeekcodebyte(i);
376 print "Dumped %04x."%i;
379 if(sys.argv[1]=="dumpdata"):
384 start=int(sys.argv[3],16);
386 stop=int(sys.argv[4],16);
388 print "Dumping data from %04x to %04x as %s." % (start,stop,f);
392 h[i]=client.CCpeekdatabyte(i);
394 print "Dumped %04x."%i;
397 if(sys.argv[1]=="status"):
398 print "Status: %s" %client.status();
399 if(sys.argv[1]=="halt"):
403 if(sys.argv[1]=="infotest"):
406 print "Ident %s" % client.CCidentstr();
407 if(sys.argv[1]=="info"):
408 print "Ident %s" % client.CCidentstr();
411 print "Freq %10.3f MHz" % (client.RF_getfreq()/10**6);
412 print "RSSI %02x" % client.RF_getrssi();
414 print "Freq, RSSI, etc unknown. Install SmartRF7.";
415 #print "Rate %10i kbps" % (client.RF_getrate()/1000);
416 #print "PacketLen %02i bytes" % client.RF_getpacketlen();
417 #print "SMAC 0x%010x" % client.RF_getsmac();
418 #print "TMAC 0x%010x" % client.RF_gettmac();
420 if(sys.argv[1]=="radioinfo"):
421 if (len(sys.argv) - 2) > 0:
422 client.CMDrs(sys.argv[2:]);
426 if(sys.argv[1]=="regs"):
429 if(sys.argv[1]=="erase"):
430 print "Status: %s" % client.status();
431 client.CCchiperase();
432 print "Status: %s" %client.status();
434 if(sys.argv[1]=="peekinfo"):
435 print "Select info flash."
436 client.CCwr_config(1);
437 print "Config is %02x" % client.CCrd_config();
441 start=int(sys.argv[2],16);
444 stop=int(sys.argv[3],16);
445 print "Peeking from %04x to %04x." % (start,stop);
447 print "%04x: %02x" % (start,client.CCpeekcodebyte(start));
449 if(sys.argv[1]=="poke"):
450 client.CCpokeirambyte(int(sys.argv[2],16),
451 int(sys.argv[3],16));
452 if(sys.argv[1]=="randtest"):
454 client.CCpokeirambyte(0xBD,0x01); #RNDH=0x01
455 client.CCpokeirambyte(0xB4,0x04); #ADCCON1=0x04
456 client.CCpokeirambyte(0xBD,0x01); #RNDH=0x01
457 client.CCpokeirambyte(0xB4,0x04); #ADCCON1=0x04
460 for foo in range(1,10):
461 print "%02x" % client.CCpeekirambyte(0xBD); #RNDH
462 client.CCpokeirambyte(0xB4,0x04); #ADCCON1=0x04
463 client.CCreleasecpu();
465 print "%02x" % client.CCpeekdatabyte(0xDF61); #CHIP ID
466 if(sys.argv[1]=="adctest"):
467 # ADCTest 0xDF3A 0xDF3B
468 print "ADC TEST %02x%02x" % (
469 client.CCpeekdatabyte(0xDF3A),
470 client.CCpeekdatabyte(0xDF3B));
471 if(sys.argv[1]=="config"):
472 print "Config is %02x" % client.CCrd_config();
474 if(sys.argv[1]=="specfuncreg"):
475 if len(sys.argv) > 2:
476 client.getSPR(sys.argv[2:]);
480 if(sys.argv[1]=="flash"):
485 start=int(sys.argv[3],16);
487 stop=int(sys.argv[4],16);
490 if(sys.argv[1]=="lock"):
491 print "Status: %s" %client.status();
493 print "Status: %s" %client.status();
494 if(sys.argv[1]=="flashpage"):
497 target=int(sys.argv[2],16);
498 print "Writing a page of flash from 0xF000 in XDATA"
499 client.CCflashpage(target);
500 if(sys.argv[1]=="erasebuffer"):
501 print "Erasing flash buffer.";
502 client.CCeraseflashbuffer();
504 if(sys.argv[1]=="writedata"):
509 start=int(sys.argv[3],16);
511 stop=int(sys.argv[4],16);
515 for i in h._buf.keys():
516 if(i>=start and i<=stop):
517 client.CCpokedatabyte(i,h[i]);
520 #if(sys.argv[1]=="flashtest"):
521 # client.CCflashtest();
522 if(sys.argv[1]=="peekdata"):
525 start=int(sys.argv[2],16);
528 stop=int(sys.argv[3],16);
529 print "Peeking from %04x to %04x." % (start,stop);
531 print "%04x: %02x" % (start,client.CCpeekdatabyte(start));
533 if(sys.argv[1]=="peek"):
536 start=int(sys.argv[2],16);
539 stop=int(sys.argv[3],16);
540 print "Peeking from %04x to %04x." % (start,stop);
542 print "%04x: %02x" % (start,client.CCpeekirambyte(start));
544 if(sys.argv[1]=="verify"):
549 start=int(sys.argv[3],16);
551 stop=int(sys.argv[4],16);
554 for i in h._buf.keys():
555 if(i>=start and i<stop):
556 peek=client.CCpeekcodebyte(i)
558 print "ERROR at %04x, found %02x not %02x"%(i,peek,h[i]);
561 if(sys.argv[1]=="peekcode"):
564 start=int(sys.argv[2],16);
567 stop=int(sys.argv[3],16);
568 print "Peeking from %04x to %04x." % (start,stop);
570 print "%04x: %02x" % (start,client.CCpeekcodebyte(start));
572 if(sys.argv[1]=="pokedata"):
576 start=int(sys.argv[2],16);
578 val=int(sys.argv[3],16);
579 print "Poking %04x to become %02x." % (start,val);
580 client.CCpokedatabyte(start,val);