Reading and writing of CC2420 RAM.
[goodfet] / client / GoodFETCCSPI.py
1 #!/usr/bin/env python
2 # GoodFET Chipcon RF Radio Client
3
4 # (C) 2009, 2012 Travis Goodspeed <travis at radiantmachines.com>
5 #
6 # This code is being rewritten and refactored.  You've been warned!
7
8 import sys, time, string, cStringIO, struct, glob, os;
9
10 from GoodFET import GoodFET;
11
12 class GoodFETCCSPI(GoodFET):
13     CCSPIAPP=0x51;
14     CCversions={0x233d: "CC2420",
15                 }
16     def setup(self):
17         """Move the FET into the CCSPI application."""
18         self.writecmd(self.CCSPIAPP,0x10,0,self.data); #CCSPI/SETUP
19         
20         #Set up the radio for ZigBee
21         self.strobe(0x01);       #SXOSCON
22         self.strobe(0x02);       #SCAL
23         self.poke(0x11, 0x0AC2 & (~0x0800)); #MDMCTRL0, promiscuous
24         self.poke(0x12, 0x0500); #MDMCTRL1
25         self.poke(0x1C, 0x007F); #IOCFG0
26         self.poke(0x19, 0x01C4); #SECCTRL0, disabling crypto
27         #self.poke(0x19, 0x0204); #SECCTRL0, as seen elsewhere.
28         #self.RF_setsync();
29         
30     def ident(self):
31         return self.peek(0x1E); #MANFIDL
32     def identstr(self):
33         manfidl=self.peek(0x1E);
34         #manfidh=self.peek(0x1f);
35         try:
36             return "%s" % (self.CCversions[manfidl]); 
37         except:
38             return "Unknown0x%04x" % manfidl;
39     def trans8(self,byte):
40         """Read and write 8 bits by CCSPI."""
41         data=self.CCSPItrans([byte]);
42         return ord(data[0]);
43     
44     def trans(self,data):
45         """Exchange data by CCSPI."""
46         self.data=data;
47         self.writecmd(self.CCSPIAPP,0x00,len(data),data);
48         return self.data;
49     def strobe(self,reg=0x00):
50         """Strobes a strobe register, returning the status."""
51         data=[reg];
52         self.trans(data);
53         return ord(self.data[0]);
54     def CC_RFST_IDLE(self):
55         """Switch the radio to idle mode, clearing overflows and errors."""
56         self.strobe(0x06); #SRXOFF
57     def CC_RFST_TX(self):
58         """Switch the radio to TX mode."""
59         self.strobe(0x04);  #0x05 for CCA
60     def CC_RFST_RX(self):
61         """Switch the radio to RX mode."""
62         self.strobe(0x03); #RX ON
63     def CC_RFST_CAL(self):
64         """Calibrate strobe the radio."""
65         self.strobe(0x02); #RX Calibrate
66     def CC_RFST(self,state=0x00):
67         self.strobe(state);
68         return;
69     def peek(self,reg,bytes=2):
70         """Read a CCSPI Register.  For long regs, result is flipped."""
71         
72         #Reg is ORed with 0x40 by the GoodFET.
73         data=[reg,0,0];
74         
75         #Automatically calibrate the len.
76         bytes=2;
77         
78         self.writecmd(self.CCSPIAPP,0x02,len(data),data);
79         toret=(
80             ord(self.data[2])+
81             (ord(self.data[1])<<8)
82             );
83         return toret;
84     def poke(self,reg,val,bytes=2):
85         """Write a CCSPI Register."""
86         data=[reg,(val>>8)&0xFF,val&0xFF];
87         self.writecmd(self.CCSPIAPP,0x03,len(data),data);
88         if self.peek(reg,bytes)!=val and reg!=0x18:
89             print "Warning, failed to set r%02x=0x%04x, got %02x." %(
90                 reg,
91                 val,
92                 self.peek(reg,bytes));
93             return False;
94         return True;
95     
96     def status(self):
97         """Read the status byte."""
98         statusbits={0x80: "?",
99                     0x40: "XOSC16M_STABLE",
100                     0x20: "TX_UNDERFLOW",
101                     0x10: "ENC_BUSY",
102                     0x08: "TX_ACTIVE",
103                     0x04: "LOCK",
104                     0x02: "RSSI_VALID",
105                     0x01: "?"};
106         status=self.strobe(0x00);
107         i=1;
108         str="";
109         while i<0x100:
110             if status&i:
111                str="%s %s" % (statusbits[i],str);
112             i*=2;
113         return str;
114     
115     #Radio stuff begins here.
116     def RF_setenc(self,code="802.15.4"):
117         """Set the encoding type."""
118         return code;
119     def RF_getenc(self):
120         """Get the encoding type."""
121         return "802.15.4";
122     def RF_getrate(self):
123         return 0;
124     def RF_setrate(self,rate=0):
125         return 0;
126     def RF_getsync(self):
127         return self.peek(0x14);
128     def RF_setsync(self,sync=0xa70F):
129         """Set the SYNC preamble.
130         Use 0xA70F for 0xA7."""
131         self.poke(0x14,sync);
132         return;
133     
134     def RF_setkey(self,key):
135         """Sets the first key for encryption to the given argument."""
136         print "ERROR: Forgot to set the key.";
137         
138         return;
139     def RF_setfreq(self,frequency):
140         """Set the frequency in Hz."""
141         mhz=frequency/1000000;
142         #fsctrl=0x8000; #
143         fsctrl=self.peek(0x18)&(~0x3FF);
144         fsctrl=fsctrl+int(mhz-2048)
145         self.poke(0x18,fsctrl);
146         #self.CC_RFST_IDLE();
147         self.strobe(0x02);#SCAL
148         time.sleep(0.01);
149         self.strobe(0x03);#SRXON
150     def RF_getfreq(self):
151         """Get the frequency in Hz."""
152         fsctrl=self.peek(0x18);
153         mhz=2048+(fsctrl&0x3ff)
154         return mhz*1000000;
155     def RF_setchan(self,channel):
156         """Set the ZigBee/802.15.4 channel number."""
157         if channel < 11 or channel > 26:
158             print "Only 802.15.4 channels 11 to 26 are currently supported.";
159         else:
160             self.RF_setfreq( ( (channel-11)*5 + 2405 ) * 1000000 );
161     def RF_getsmac(self):
162         """Return the source MAC address."""
163         return 0xdeadbeef;
164     def RF_setsmac(self,mac):
165         """Set the source MAC address."""
166         return 0xdeadbeef;
167     def RF_gettmac(self):
168         """Return the target MAC address."""
169         return 0xdeadbeef;
170     def RF_settmac(self,mac):
171         """Set the target MAC address."""
172         return 0xdeadbeef;
173     def RF_getrssi(self):
174         """Returns the received signal strength, with a weird offset."""
175         rssival=self.peek(0x13)&0xFF; #raw RSSI register
176         return rssival^0x80;
177
178     def peekram(self,adr,count):
179         """Peeks data from CC2420 RAM."""
180         data=[
181             adr&0xFF,adr>>8,     # Address first.
182             count&0xFF,count>>8  # Then length.
183             ];
184         self.writecmd(self.CCSPIAPP,0x84,len(data),data);
185         return self.data;
186     def pokeram(self,adr,data):
187         """Pokes data into CC2420 RAM."""
188         data=[adr&0xFF, adr>>8]+data;
189         self.writecmd(self.CCSPIAPP,0x85,len(data),data);
190         return;
191     
192     lastpacket=range(0,0xff);
193     def RF_rxpacket(self):
194         """Get a packet from the radio.  Returns None if none is
195         waiting."""
196         
197         data="\0";
198         self.data=data;
199         self.writecmd(self.CCSPIAPP,0x80,len(data),data);
200         buffer=self.data;
201         
202         self.lastpacket=buffer;
203         if(len(buffer)==0):
204             return None;
205         
206         return buffer;
207     def RF_rxpacketdec(self):
208         """Get and decrypt a packet from the radio.  Returns None if
209         none is waiting."""
210         
211         data="\0";
212         self.data=data;
213         self.writecmd(self.CCSPIAPP,0x90,len(data),data);
214         buffer=self.data;
215         
216         self.lastpacket=buffer;
217         if(len(buffer)==0):
218             return None;
219         
220         return buffer;
221
222     def RF_txpacket(self,packet):
223         """Send a packet through the radio."""
224         self.writecmd(self.CCSPIAPP,0x81,len(packet),packet);
225         #time.sleep(1);
226         #self.strobe(0x09);
227         return;
228     
229     def RF_reflexjam(self,duration=0):
230         """Place the device into reflexive jamming mode."""
231         data = [duration&0xff,
232                 (duration>>8)&0xff];
233         self.writecmd(self.CCSPIAPP,0xA0,len(data),data);
234         return;
235
236     def RF_reflexjam_autoack(self):
237         """Place the device into reflexive jamming mode
238            and that also sends a forged ACK if needed."""
239         data = "";
240         self.writecmd(self.CCSPIAPP,0xA1,len(data),data);
241         print "Got:", data, "and", self.data
242         return;
243
244     def RF_modulated_spectrum(self):
245         """Hold a carrier wave on the present frequency."""
246         # print "Don't know how to hold a carrier.";
247         # 33.1 p.55:
248         #  reset chip
249         #  SXOSCON
250         #  set MDMCTRL1.TX_MODE to 3   0x12  3:2 
251         #  STXON                            0x04
252
253         mdmctrl1=self.peek(0x12);
254         #print "mdmctrl1 was %04x" % mdmctrl1;
255         mdmctrl1=mdmctrl1|0x00c0;  #MDMCTRL1.TX_MODE = 3
256         self.poke(0x12, mdmctrl1); #MDMCTRL1
257
258         mdmctrl1=self.peek(0x12);
259         #print "mdmctrl1 is %04x" % mdmctrl1;
260
261         # http://e2e.ti.com/support/low_power_rf/f/155/t/15914.aspx?PageIndex=2
262         #   suggests this
263         self.strobe(0x02);         #STXCAL
264         #print "STXCAL status: %s" % self.status()
265
266         # is this necessary?
267         self.strobe(0x09);         #SFLUSHTX
268         #print "SFLUSHTX status: %s" % self.status()
269
270         self.strobe(0x04);         #STXON
271         #print "STXON status: %s" % self.status()
272
273     def RF_carrier(self):
274         """Hold a carrier wave on the present frequency."""
275         # print "Don't know how to hold a carrier.";
276         # 33.1 p.54:
277         #  reset chip
278         #  SXOSCON
279         #  set MDMCTRL1.TX_MODE to 2 or 3   0x12  3:2 
280         #  set DACTST to 0x1800             0x2E
281         #  STXON                            0x04
282
283         mdmctrl1=self.peek(0x12);
284         #print "mdmctrl1 was %04x" % mdmctrl1;
285         mdmctrl1=mdmctrl1|0x0080; 
286         mdmctrl1=mdmctrl1&0x0080;  #MDMCTRL1.TX_MODE = 2
287         self.poke(0x12, mdmctrl1); #MDMCTRL1
288
289         mdmctrl1=self.peek(0x12);
290         #print "mdmctrl1 is %04x" % mdmctrl1;
291
292         self.poke(0x2E, 0x1800);   #DACTST
293         dactst=self.peek(0x2E);
294         #print "dactst is %04x" % dactst;
295
296         # see above for why this is here
297         self.strobe(0x02);         #STXCAL
298         #print "STXCAL status: %s" % self.status()
299         self.strobe(0x09);         #SFLUSHTX
300         #print "SFLUSHTX status: %s" % self.status()
301
302         self.strobe(0x04);         #STXON
303         #print "STXON status: %s" % self.status()
304
305     def RF_promiscuity(self,promiscuous=1):
306         mdmctrl0=self.peek(0x11);
307         if promiscuous>0:
308             mdmctrl0=mdmctrl0&(~0x800);
309         else:
310             mdmctrl0=mdmctrl0|0x800;
311         self.poke(0x11,mdmctrl0);
312         return;
313     def RF_autocrc(self,autocrc=1):
314         mdmctrl0=self.peek(0x11);
315         if autocrc==0:
316             mdmctrl0=mdmctrl0&(~0x0020);
317         else:
318             mdmctrl0=mdmctrl0|0x0020;
319         self.poke(0x11,mdmctrl0);
320         return;
321     def RF_autoack(self,autoack=1):
322         mdmctrl0=self.peek(0x11);
323         if autoack==0:
324             mdmctrl0=mdmctrl0&(~0x0010);
325         else:
326             mdmctrl0=mdmctrl0|0x0010;
327         self.poke(0x11,mdmctrl0);
328         return;
329     packetlen=16;
330     def RF_setpacketlen(self,len=16):
331         """Set the number of bytes in the expected payload."""
332         #self.poke(0x11,len);
333         self.packetlen=len;
334     def RF_getpacketlen(self):
335         """Set the number of bytes in the expected payload."""
336         #len=self.peek(0x11);
337         self.packetlen=len;
338         return len;
339     maclen=5;
340     def RF_getmaclen(self):
341         """Get the number of bytes in the MAC address."""
342         choices=[0, 3, 4, 5];
343         choice=self.peek(0x03)&3;
344         self.maclen=choices[choice];
345         return self.maclen;
346     def RF_setmaclen(self,len):
347         """Set the number of bytes in the MAC address."""
348         choices=["illegal", "illegal", "illegal", 
349                  1, 2, 3];
350         choice=choices[len];
351         self.poke(0x03,choice);
352         self.maclen=len;
353     def printpacket(self,packet,prefix="#"):
354         s="";
355         i=0;
356         for foo in packet:
357             s="%s %02x" % (s,ord(foo));
358         print "%s%s" % (prefix,s);
359         
360     def printdissect(self,packet):
361         try:
362             from scapy.all import Dot15d4
363         except ImportError:
364             print "To use packet disection, Scapy must be installed and have the Dot15d4 extension present."
365             print "try: hg clone http://hg.secdev.org/scapy-com";
366             print "     sudo ./setup.py install";
367         self.printpacket(packet);
368         try:
369             scapyd = Dot15d4(packet[1:]);
370             scapyd.show();
371         except:
372             pass;