X-Git-Url: http://git.rot13.org/?p=goodfet;a=blobdiff_plain;f=client%2FGoodFETMSP430.py;h=4d84a441df9ab0e111cd8e52312bcd8d54743311;hp=df6f20eabc8e99cb40cceddd412b57f6941a0d7e;hb=0a6754712a364a01d149dc518f44b258a3a37cf8;hpb=1ef22a7f7983e4bb7513686cd573776a8338c904 diff --git a/client/GoodFETMSP430.py b/client/GoodFETMSP430.py index df6f20e..4d84a44 100644 --- a/client/GoodFETMSP430.py +++ b/client/GoodFETMSP430.py @@ -5,7 +5,7 @@ # # Presently being rewritten. -import sys, time, string, cStringIO, struct, glob, serial, os; +import sys, time, string, cStringIO, struct, glob, os; from GoodFET import GoodFET; @@ -42,10 +42,13 @@ class GoodFETMSP430(GoodFET): return DeviceID; def peek16(self,adr,memory="vn"): return self.MSP430peek(adr); + def peek(self,adr,memory="vn"): + return self.MSP430peek(adr); def peek8(self,adr, memory="vn"): adr=self.MSP430peek(adr&~1); if adr&1==0: return adr&0xFF; else: return adr>>8; + def MSP430peek(self,adr): """Read a word at an address.""" self.data=[adr&0xff, (adr&0xff00)>>8, @@ -79,6 +82,12 @@ class GoodFETMSP430(GoodFET): val&0xff, (val&0xff00)>>8]; self.writecmd(self.MSP430APP,0xE1,6,self.data); return ord(self.data[0])+(ord(self.data[1])<<8); + def setsecret(self,value): + """Set a secret word for later retreival. Used by glitcher.""" + self.MSP430pokeflash(0xFFFE,value); + def getsecret(self): + """Get a secret word. Used by glitcher.""" + return self.peek(0xfffe); def MSP430pokeflashblock(self,adr,data): """Write many words to flash memory at an address.""" self.data=[adr&0xff, (adr&0xff00)>>8, @@ -144,6 +153,8 @@ class GoodFETMSP430(GoodFET): 0xf26f: "MSP430F261x", 0xf237: "MSP430F23x0", 0xf201: "MSP430F201x", + #Are G's and F's distinct? + 0x2553: "MSP430G2553", #MSP430F1xx 0xf16c: "MSP430F161x", @@ -161,7 +172,7 @@ class GoodFETMSP430(GoodFET): 0xF427: "MSP430FE42x", #or FW42x, F415, F417 0xF439: "MSP430FG43x", 0xf46f: "MSP430FG46xx", #or F471xx - + 0xF413: "MSP430F413", #or maybe others. } def MSP430test(self): """Test MSP430 JTAG. Requires that a chip be attached."""