more changes to TX test code
[goodfet] / client / goodfet.cc
index e8de384..074fdb2 100755 (executable)
@@ -16,23 +16,17 @@ from intelhex import IntelHex;
 def printpacket(packet):
     s="";
     i=0;
-    #print "Printing packet."
     for foo in packet:
         i=i+1;
-        #if i>packet[0]+1: break;
         s="%s %02x" % (s,foo);
-    print "%s" %s;
+    print "%s" %s;
 
+simplepacketcount=0;
 def handlesimplicitipacket(packet):
     s="";
     i=0;
-    
-    for foo in packet:
-        i=i+1;
-        #if i>packet[0]+1: break;
-        s="%s %02x" % (s,foo);
-    print "\n%s" %s;
-    
+    global simplepacketcount;
+    simplepacketcount=simplepacketcount+1;
     
     len=packet[0];
     if len<12: return;
@@ -48,30 +42,66 @@ def handlesimplicitipacket(packet):
     port=packet[9];
     info=packet[10];
     seq=packet[11];
-    #payload begins at byte 12.
+    #payload begins at byte 10.
     
-    
-    
-    if port==0x03:
+    if packet[len+2]&0x80==0:
+        print "# Dropped broken packet.";
+    elif port==0x20:
+        #data packet
+        counter=packet[11];
+        button=packet[12];
+        x=packet[13];
+        if x>=128: x=0-(x^0xFF)-1;
+        y=packet[14];
+        if y>=128: y=0-(y^0xFF)-1;
+        z=packet[15];
+        if z>=128: z=0-(z^0xFF)-1;
+        
+        print "%09i %03i %4i %4i %4i" % (simplepacketcount,button,x,y,z);
+        sys.stdout.flush();
+    elif port==0x02:
+        #Link request.  Gotta send a proper reply to get data.
+        tid=packet[13];
+        #14 ff ff ff ff 3c b7 e3 98 
+        #02 03 c9
+        #01 97
+        #ef be ad de 3d 00 02 
+        reply=[0x10,
+               src[0], src[1], src[2], src[3],
+               0x78,0x56,0x34,0x10, #my address.
+               port, 0x21, seq,
+               0x81, tid,         #reply, tid
+               
+               0x20,0x00,0xad,0xde, #link token
+               0x00];               #no security
+        #printpacket(reply);
+        print "#FIXME FAST: repeatedly broadcasting ACK to catch LINK on the next attempt.";
+        for foo in range(1,50):
+            client.RF_txpacket(reply);
+        
+        pass;
+    elif port==0x03:
         #print "Join request.";
+        #printpacket(packet);
         if packet[12]!=1:
             print "Not a join request.  WTF?";
             return;
         tid=packet[13];
         reply=[0x12, #reply is one byte shorter
                src[0], src[1], src[2], src[3],
-               1,1,1,1,           #my address
+               0x78,0x56,0x34,0x10, #my address.
                port, 0x21, seq,
                0x81, tid,         #reply, tid
                
-               1,1,1,1,
-               #4,3,2,1,           #default join token
-               #8,7,6,5,          #default link token
-               #0xFF,0xFF,0xFF,0xFF,
+               0xef,0xbe,0xad,0xde, #Join token
                0x00];             #no security
-        printpacket(reply);
-        client.RF_txpacket(reply);
-
+        #printpacket(reply);
+        print "#FIXME FAST: repeatedly broadcasting ACK to catch JOIN on the next attempt.";
+        #printpacket(reply);
+        for foo in range(1,20):
+            client.RF_txpacket(reply);
+        print "#Should be connected now.";
+        
     elif port==0x04:
         print "Security request.";
     elif port==0x05:
@@ -87,7 +117,11 @@ if(len(sys.argv)==1):
     print "%s flash $foo.hex" % sys.argv[0];
     print "%s test" % sys.argv[0];
     print "%s term" % sys.argv[0];
+    print "    use \'?\' for list of commands";
     print "%s info" % sys.argv[0];
+    print "%s infotest" % sys.argv[0];
+    print "%s radioinfo [help] [REGISTER_NAME]" % sys.argv[0];
+    print "%s specfuncreg [SPECIAL_REGISTER_NAME]" % sys.argv[0];
     print "%s halt"  % sys.argv[0];
     print "%s regs" % sys.argv[0];
     print "%s dumpcode $foo.hex [0x$start 0x$stop]" % sys.argv[0];
@@ -100,10 +134,16 @@ if(len(sys.argv)==1):
     print "%s poke 0x$iram 0x$val" % sys.argv[0];
     print "%s peekcode 0x$start [0x$stop]" % sys.argv[0];
     print "\n"
+    print "%s specan [freq]\n\tSpectrum Analyzer" % sys.argv[0];
     print "%s rssi [freq]\n\tGraphs signal strength on [freq] Hz." % sys.argv[0];
     print "%s carrier [freq]\n\tHolds a carrier on [freq] Hz." % sys.argv[0];
     print "%s reflex [freq]\n\tJams on [freq] Hz." % sys.argv[0];
     print "%s sniffsimpliciti [us|eu|lf]\n\tSniffs SimpliciTI packets." % sys.argv[0];
+    print "%s sniffdash7 [lf]\n\tSniffs Dash7. (untested)" % sys.argv[0];
+    print "%s snifficlicker [us]\n\tSniffs iClicker." % sys.argv[0];
+    print "\n";
+    print "%s simpliciti [us|eu|lf]\n\tSimpliciti access point for Chronos watch." % sys.argv[0];
+    print "%s iclicker [us|eu|lf]\n\tSniffs iClicker packets as ASCII." % sys.argv[0];
     
     sys.exit();
 
@@ -116,7 +156,8 @@ client.serInit()
 client.setup();
 client.start();
 
-
+#client.halt();
+#client.pokebyte(0xc7,0x08);
 
 if(sys.argv[1]=="carrier"):
     if len(sys.argv)>2:
@@ -147,27 +188,7 @@ if(sys.argv[1]=="reflex"):
         print "Activated jamming with RSSI of %i, going again for another packet." % rssi;
         client.resume();
     
-    RFST=0xDFE1
-    client.CC_RFST_CAL(); #SCAL
-    time.sleep(1);
-    
-    maxrssi=0;
-    while 1:
-        client.CC_RFST_RX(); #SRX
-        rssi=client.RF_getrssi();
-        client.CC_RFST_IDLE(); #idle
-        time.sleep(0.01);
-        string="";
-        for foo in range(0,rssi>>2):
-            string=("%s."%string);
-        print "%02x %04i %04i %s" % (rssi,rssi, maxrssi, string); 
-        if rssi>maxrssi:
-            maxrssi=(rssi);
-        if rssi>threshold:
-            #print "Triggered jamming for 1s.";
-            client.RF_carrier();
-            time.sleep(1);
-            print "JAMMING JAMMING JAMMING JAMMING";
+
 if(sys.argv[1]=="rssi"):
     client.CC1110_crystal();
     client.RF_idle();
@@ -192,9 +213,66 @@ if(sys.argv[1]=="rssi"):
         for foo in range(0,rssi>>2):
             string=("%s."%string);
         print "%02x %04i %s" % (rssi,rssi, string); 
+if(sys.argv[1]=="specan"):
+    print "This doesn't work yet."
+    
+    client.CC1110_crystal();
+    client.RF_idle();
+    
+    client.config_simpliciti();
+    
+    if len(sys.argv)>2:
+        client.RF_setfreq(eval(sys.argv[2]));
+    #print "Listening on %f MHz." % (client.RF_getfreq()/10.0**6);
+    
+    client.CChaltcpu();
+    client.shellcodefile("specan.ihx",wait=0);
+    #client.shellcodefile("crystal.ihx",wait=1);
+    
+    bytestart=0xf800;
+    maxchan=10;
+    round=0;
+    
+    print "time freq rssi";
+    
+    while 1:
+        time.sleep(1);
+        #client.CChaltcpu();
+        
+        round=round+1;
+        
+        dump="";
+        for entry in range(0,maxchan):
+            adr=bytestart+entry*8;
+            freq=((client.CCpeekdatabyte(adr+0)<<16)+
+                  (client.CCpeekdatabyte(adr+1)<<8)+
+                  (client.CCpeekdatabyte(adr+2)<<0));
+            hz=freq*396.728515625;
+            mhz=hz/1000000.0
+            rssi=client.CCpeekdatabyte(adr+6);
+            print "%03i %3.3f %03i" % (round,mhz,rssi);
+        print dump;
+        sys.stdout.flush();
+        client.CCreleasecpu();
+
+
+if(sys.argv[1]=="sniff"):
+    client.CC1110_crystal();
+    client.RF_idle();
+    
+    #client.config_simpliciti(region);
+    
+    print "Listening as %x on %f MHz" % (client.RF_getsmac(),
+                                           client.RF_getfreq()/10.0**6);
+    #Now we're ready to get packets.
+    while 1:
+        packet=None;
+        while packet==None:
+            packet=client.RF_rxpacket();
+        printpacket(packet);
+        sys.stdout.flush();
 
 if(sys.argv[1]=="sniffsimpliciti"):
-    #TODO remove all poke() calls.
     region="us";
     if len(sys.argv)>2:
         region=sys.argv[2];
@@ -213,9 +291,88 @@ if(sys.argv[1]=="sniffsimpliciti"):
             packet=client.RF_rxpacket();
         printpacket(packet);
         sys.stdout.flush();
+if(sys.argv[1]=="sniffook"):
+    region="lf";
+    if len(sys.argv)>2:
+        region=sys.argv[2];
+    
+    client.CC1110_crystal();
+    client.RF_idle();
+    
+    client.config_ook(region);
+    
+    print "Listening for OOK on %f MHz" % (client.RF_getfreq()/10.0**6);
+    #Now we're ready to get packets.
+    while 1:
+        packet=None;
+        while packet==None:
+            packet=client.RF_rxpacket();
+        printpacket(packet);
+        sys.stdout.flush();
+if(sys.argv[1]=="sniffdash7"):
+    region="lf";
+    if len(sys.argv)>2:
+        region=sys.argv[2];
+    
+    client.CC1110_crystal();
+    client.RF_idle();
+    
+    client.config_dash7(region);
+    
+    print "Listening as %x on %f MHz" % (client.RF_getsmac(),
+                                           client.RF_getfreq()/10.0**6);
+    #Now we're ready to get packets.
+    while 1:
+        packet=None;
+        while packet==None:
+            packet=client.RF_rxpacket();
+        printpacket(packet);
+        sys.stdout.flush();
+if(sys.argv[1]=="snifficlicker"):
+    region="us";
+    if len(sys.argv)>2:
+        region=sys.argv[2];
+    
+    client.CC1110_crystal();
+    client.RF_idle();
+    
+    client.config_iclicker(region);
+    
+    print "Listening as %x on %f MHz" % (client.RF_getsmac(),
+                                           client.RF_getfreq()/10.0**6);
+    #Now we're ready to get packets.
+    while 1:
+        packet=None;
+        while packet==None:
+            packet=client.RF_rxpacket();
+        printpacket(packet);
+        sys.stdout.flush();
+if(sys.argv[1]=="iclicker"):
+    buttons=[0, 'A', 'j', 3, 4, 'B',
+             6, 7, 8, 9, 'E', 0xB, 0xC,
+             'C', 'D', 0xF];
+    region="us";
+    if len(sys.argv)>2:
+        region=sys.argv[2];
+    
+    client.CC1110_crystal();
+    client.RF_idle();
+    
+    client.config_iclicker(region);
+    
+    print "Listening as %x on %f MHz" % (client.RF_getsmac(),
+                                           client.RF_getfreq()/10.0**6);
+    #Now we're ready to get packets.
+    while 1:
+        packet=None;
+        while packet==None:
+            packet=client.RF_rxpacket();
+        printpacket(packet);
+        button=((packet[5]&1)<<3) | (packet[6]>>5);
+        print "Button %c" % buttons[button];
+        sys.stdout.flush();
 
 if(sys.argv[1]=="simpliciti"):
-    #TODO remove all poke() calls.
     region="us";
     if len(sys.argv)>2:
         region=sys.argv[2];
@@ -225,7 +382,7 @@ if(sys.argv[1]=="simpliciti"):
     
     client.config_simpliciti(region);
     
-    print "Listening as %x on %f MHz" % (client.RF_getsmac(),
+    print "Listening as %x on %f MHz" % (client.RF_getsmac(),
                                            client.RF_getfreq()/10.0**6);
     #Now we're ready to get packets.
     while 1:
@@ -285,6 +442,11 @@ if(sys.argv[1]=="status"):
 if(sys.argv[1]=="halt"):
     print "Halting CPU."
     client.halt();
+
+if(sys.argv[1]=="infotest"):
+    while 1:
+        client.start();
+        print "Ident   %s" % client.CCidentstr();
 if(sys.argv[1]=="info"):
     print "Ident   %s" % client.CCidentstr();
     
@@ -298,6 +460,12 @@ if(sys.argv[1]=="info"):
     #print "SMAC  0x%010x" % client.RF_getsmac();
     #print "TMAC  0x%010x" % client.RF_gettmac();
 
+if(sys.argv[1]=="radioinfo"):
+    if (len(sys.argv) - 2) > 0:
+        client.CMDrs(sys.argv[2:]);
+    else:
+        client.CMDrs();
+
 if(sys.argv[1]=="regs"):
     client.CMDrs();
 
@@ -346,6 +514,12 @@ if(sys.argv[1]=="adctest"):
 if(sys.argv[1]=="config"):
     print "Config is %02x" % client.CCrd_config();
 
+if(sys.argv[1]=="specfuncreg" or sys.argv[1]=="sfr"):
+    if len(sys.argv) > 2:
+        client.getSPR(sys.argv[2:]);
+    else:
+        client.getSPR();
+
 if(sys.argv[1]=="flash"):
      f=sys.argv[2];
      start=0;