X-Git-Url: http://git.rot13.org/?p=goodfet;a=blobdiff_plain;f=client%2FGoodFETCC.py;h=344d9a52edbd6a773901ea8f601422de94fc9f47;hp=f937ac978aa1336ea9913bf1394f0bc65cff91ee;hb=68b3ba0e68376630d0ce37c80048b3c107661007;hpb=b070c8ec3025b80f20b6230259fba989931c1d6b diff --git a/client/GoodFETCC.py b/client/GoodFETCC.py index f937ac9..344d9a5 100644 --- a/client/GoodFETCC.py +++ b/client/GoodFETCC.py @@ -16,11 +16,20 @@ import xml.dom.minidom; class GoodFETCC(GoodFET): """A GoodFET variant for use with Chipcon 8051 Zigbee SoC.""" APP=0x30; + + + + smartrfpath="/opt/smartrf7"; + def loadsymbols(self): + try: self.SRF_loadsymbols(); + except: + if self.verbose==1: print "SmartRF load failed."; def SRF_chipdom(self,chip="cc1110", doc="register_definition.xml"): fn="%s/config/xml/%s/%s" % (self.smartrfpath,chip,doc); - print "Opening %s" % fn; + #print "Opening %s" % fn; return xml.dom.minidom.parse(fn) + def CMDrs(self,args=[]): """Chip command to grab the radio state.""" self.SRF_radiostate(); @@ -63,6 +72,33 @@ class GoodFETCC(GoodFET): print "%-10s=0x%02x; /* %-50s */" % ( name,self.CCpeekdatabyte(eval(address)), description); if bitfields!="": print bitfields.rstrip(); + def RF_getrssi(self): + """Returns the received signal strenght, from 0 to 1.""" + rssireg=self.symbols.get("RSSI"); + return self.CCpeekdatabyte(rssireg); + def SRF_loadsymbols(self): + ident=self.CCident(); + chip=self.CCversions.get(ident&0xFF00); + dom=self.SRF_chipdom(chip,"register_definition.xml"); + for e in dom.getElementsByTagName("registerdefinition"): + for f in e.childNodes: + if f.localName=="Register": + name="unknownreg"; + address="0xdead"; + description=""; + bitfields=""; + for g in f.childNodes: + if g.localName=="Name": + name=g.childNodes[0].nodeValue; + elif g.localName=="Address": + address=g.childNodes[0].nodeValue; + elif g.localName=="Description": + if g.childNodes: + description=g.childNodes[0].nodeValue; + elif g.localName=="Bitfield": + bitfields+="%17s/* %-50s */\n" % ("",self.SRF_bitfieldstr(g)); + #print "SFRX(%10s, %s); /* %50s */" % (name,address, description); + self.symbols.define(eval(address),name,description,"data"); def halt(self): """Halt the CPU.""" self.CChaltcpu(); @@ -235,6 +271,7 @@ class GoodFETCC(GoodFET): def erase(self): """Erase all of the target's memory.""" self.CCchiperase(); + self.start(); def CCstatus(self): """Check the status.""" @@ -276,6 +313,9 @@ class GoodFETCC(GoodFET): #print "Status: %s." % self.status(); self.CCreleasecpu(); self.CChaltcpu(); + #Get SmartRF Studio regs if they exist. + self.loadsymbols(); + #print "Status: %s." % self.status(); def stop(self): @@ -295,6 +335,39 @@ class GoodFETCC(GoodFET): (adr>>24)&0xFF]; print "Flashing buffer to 0x%06x" % adr; self.writecmd(self.APP,0x95,4,data); + + def setsecret(self,value): + """Set a secret word for later retreival. Used by glitcher.""" + page = 0x0000; + pagelen = self.CCpagesize(); #Varies by chip. + print "page=%04x, pagelen=%04x" % (page,pagelen); + + self.CCeraseflashbuffer(); + print "Setting secret to %x" % value; + self.CCpokedatabyte(0xF000,value); + self.CCpokedatabyte(0xF800,value); + print "Setting secret to %x==%x" % (value, + self.CCpeekdatabyte(0xf000)); + self.CCflashpage(0); + print "code[0]=%x" % self.CCpeekcodebyte(0); + def getsecret(self): + """Get a secret word. Used by glitcher.""" + secret=self.CCpeekcodebyte(0); + #print "Got secret %02x" % secret; + return secret; + + def dump(self,file,start=0,stop=0xffff): + """Dump an intel hex file from code memory.""" + print "Dumping code from %04x to %04x as %s." % (start,stop,file); + h = IntelHex(None); + i=start; + while i<=stop: + h[i]=self.CCpeekcodebyte(i); + if(i%0x100==0): + print "Dumped %04x."%i; + h.write_hex_file(file); #buffer to disk. + i+=1; + h.write_hex_file(file); def flash(self,file): """Flash an intel hex file to code memory."""