X-Git-Url: http://git.rot13.org/?p=goodfet;a=blobdiff_plain;f=client%2FGoodFETGlitch.py;h=0d49ac3e1cda7293d49239a1cdde7e5fc1a10d60;hp=56f30754290675c0b5390b420235d451837a4e8f;hb=8eed366711c123dbd740b0bc0d5ca0e0c0d770e8;hpb=a2de4ca441a02031e56fc8d14f8a476c644049e0 diff --git a/client/GoodFETGlitch.py b/client/GoodFETGlitch.py index 56f3075..0d49ac3 100644 --- a/client/GoodFETGlitch.py +++ b/client/GoodFETGlitch.py @@ -209,14 +209,13 @@ class GoodFETGlitch(GoodFET): self.secret=0x69; - while(client.eeprompeek(0)!=self.secret): + while(client.getsecret()!=self.secret): print "-- Setting secret"; client.start(); #Flash the secret to the first two bytes of CODE memory. client.erase(); - client.eeprompoke(0,self.secret); - client.eeprompoke(1,self.secret); + client.setsecret(self.secret); sys.stdout.flush() #Lock chip to unlock it later. @@ -265,7 +264,7 @@ class GoodFETGlitch(GoodFET): client.glitchstart(); #Try to read *0, which is secret if read works. - a=client.eeprompeek(0x0); + a=client.getsecret(); if lock>0: #locked if(a!=0 and a!=0xFF and a!=self.secret): gcount+=1;