X-Git-Url: http://git.rot13.org/?p=goodfet;a=blobdiff_plain;f=client%2FGoodFETMSP430.py;h=fc8e99befeaa9b9a9bfd1cbcf59a5d709d481297;hp=df6f20eabc8e99cb40cceddd412b57f6941a0d7e;hb=a9b0b85970a4f989779578f49c0f45d87848dc24;hpb=1ef22a7f7983e4bb7513686cd573776a8338c904 diff --git a/client/GoodFETMSP430.py b/client/GoodFETMSP430.py index df6f20e..fc8e99b 100644 --- a/client/GoodFETMSP430.py +++ b/client/GoodFETMSP430.py @@ -42,10 +42,13 @@ class GoodFETMSP430(GoodFET): return DeviceID; def peek16(self,adr,memory="vn"): return self.MSP430peek(adr); + def peek(self,adr,memory="vn"): + return self.MSP430peek(adr); def peek8(self,adr, memory="vn"): adr=self.MSP430peek(adr&~1); if adr&1==0: return adr&0xFF; else: return adr>>8; + def MSP430peek(self,adr): """Read a word at an address.""" self.data=[adr&0xff, (adr&0xff00)>>8, @@ -79,6 +82,12 @@ class GoodFETMSP430(GoodFET): val&0xff, (val&0xff00)>>8]; self.writecmd(self.MSP430APP,0xE1,6,self.data); return ord(self.data[0])+(ord(self.data[1])<<8); + def setsecret(self,value): + """Set a secret word for later retreival. Used by glitcher.""" + self.MSP430pokeflash(0xFFFE,value); + def getsecret(self): + """Get a secret word. Used by glitcher.""" + return self.peek(0xfffe); def MSP430pokeflashblock(self,adr,data): """Write many words to flash memory at an address.""" self.data=[adr&0xff, (adr&0xff00)>>8,