X-Git-Url: http://git.rot13.org/?a=blobdiff_plain;f=client%2FGoodFETCC.py;h=239233e991bbe6bbe333f3a73d24ac597824b86c;hb=dbd6ebc010f41d8d6832083a9d6d759478cf94ec;hp=79fbe5e7aef22b8a3b16fedfa1d5162d1a4fff06;hpb=8e3df202724ba1830230e9352207231303cba6f3;p=goodfet diff --git a/client/GoodFETCC.py b/client/GoodFETCC.py index 79fbe5e..239233e 100644 --- a/client/GoodFETCC.py +++ b/client/GoodFETCC.py @@ -16,13 +16,18 @@ import xml.dom.minidom; class GoodFETCC(GoodFET): """A GoodFET variant for use with Chipcon 8051 Zigbee SoC.""" APP=0x30; + + + + smartrfpath="/opt/smartrf7"; def loadsymbols(self): try: self.SRF_loadsymbols(); - except: print "SmartRF load failed."; + except: + if self.verbose==1: print "SmartRF load failed."; def SRF_chipdom(self,chip="cc1110", doc="register_definition.xml"): fn="%s/config/xml/%s/%s" % (self.smartrfpath,chip,doc); - print "Opening %s" % fn; + #print "Opening %s" % fn; return xml.dom.minidom.parse(fn) def CMDrs(self,args=[]): @@ -67,6 +72,10 @@ class GoodFETCC(GoodFET): print "%-10s=0x%02x; /* %-50s */" % ( name,self.CCpeekdatabyte(eval(address)), description); if bitfields!="": print bitfields.rstrip(); + def RF_getrssi(self): + """Returns the received signal strenght, from 0 to 1.""" + rssireg=self.symbols.get("RSSI"); + return self.CCpeekdatabyte(rssireg); def SRF_loadsymbols(self): ident=self.CCident(); chip=self.CCversions.get(ident&0xFF00); @@ -160,6 +169,7 @@ class GoodFETCC(GoodFET): CCversions={0x0100:"cc1110", + 0x1100:"cc1111", 0x8500:"cc2430", 0x8900:"cc2431", 0x8100:"cc2510", @@ -168,6 +178,7 @@ class GoodFETCC(GoodFET): 0xB500:"cc2531", 0xFF00:"CCmissing"}; CCpagesizes={0x01: 1024, #"CC1110", + 0x11: 1024, #"CC1111", 0x85: 2048, #"CC2430", 0x89: 2048, #"CC2431", 0x81: 1024, #"CC2510", @@ -180,7 +191,11 @@ class GoodFETCC(GoodFET): def CCidentstr(self): ident=self.CCident(); chip=self.CCversions.get(ident&0xFF00); - return "%s/r%02x" % (chip, ident&0xFF); + pagesize=self.CCpagesizes.get(ident>0xFF); + try: + return "%s/r%0.4x/ps0x%0.4x" % (chip, ident, pagesize); + except: + return "%04x" % ident; def CCident(self): """Get a chipcon's ID.""" self.writecmd(self.APP,0x8B,0,None); @@ -194,7 +209,7 @@ class GoodFETCC(GoodFET): size=self.CCpagesizes.get(chip); if(size<10): print "ERROR: Pagesize undefined."; - print "chip=%02x" %chip; + print "chip=%0.4x" %chip; sys.exit(1); #return 2048; return size; @@ -262,6 +277,7 @@ class GoodFETCC(GoodFET): def erase(self): """Erase all of the target's memory.""" self.CCchiperase(); + self.start(); def CCstatus(self): """Check the status.""" @@ -303,6 +319,9 @@ class GoodFETCC(GoodFET): #print "Status: %s." % self.status(); self.CCreleasecpu(); self.CChaltcpu(); + #Get SmartRF Studio regs if they exist. + self.loadsymbols(); + #print "Status: %s." % self.status(); def stop(self): @@ -322,6 +341,27 @@ class GoodFETCC(GoodFET): (adr>>24)&0xFF]; print "Flashing buffer to 0x%06x" % adr; self.writecmd(self.APP,0x95,4,data); + + def setsecret(self,value): + """Set a secret word for later retreival. Used by glitcher.""" + page = 0x0000; + pagelen = self.CCpagesize(); #Varies by chip. + print "page=%04x, pagelen=%04x" % (page,pagelen); + + self.CCeraseflashbuffer(); + print "Setting secret to %x" % value; + self.CCpokedatabyte(0xF000,value); + self.CCpokedatabyte(0xF800,value); + print "Setting secret to %x==%x" % (value, + self.CCpeekdatabyte(0xf000)); + self.CCflashpage(0); + print "code[0]=%x" % self.CCpeekcodebyte(0); + def getsecret(self): + """Get a secret word. Used by glitcher.""" + secret=self.CCpeekcodebyte(0); + #print "Got secret %02x" % secret; + return secret; + def dump(self,file,start=0,stop=0xffff): """Dump an intel hex file from code memory.""" print "Dumping code from %04x to %04x as %s." % (start,stop,file);