X-Git-Url: http://git.rot13.org/?p=goodfet;a=blobdiff_plain;f=client%2Fgoodfet.ccspi;h=f3b04fea762bf6d6905b94a9728c84baef45c356;hp=8e84ba793758385adaf7130ae216b5b094783059;hb=9a25dff298eb442c289d193e721727fd40a56e5d;hpb=e93d2ec888302a130747bd52d6e6e5a56eff12fa diff --git a/client/goodfet.ccspi b/client/goodfet.ccspi index 8e84ba7..f3b04fe 100755 --- a/client/goodfet.ccspi +++ b/client/goodfet.ccspi @@ -2,6 +2,7 @@ #GoodFET Chipcon SPI Client # (C) 2011 Travis Goodspeed +# Additions 2011-2012 Ryan Speers ryan@rmspeers.com #N.B., #Might be CC2420 Specific @@ -26,17 +27,15 @@ if(len(sys.argv)==1): print "%s bsniff [chan]" % sys.argv[0]; print "%s sniffdissect" % sys.argv[0]; - - print; - print "%s txtoscount [-i|-r] TinyOS BlinkToLED" % sys.argv[0]; - + print "\n%s txtoscount [-i|-r] TinyOS BlinkToLED" % sys.argv[0]; + print "%s reflexjam [channel=11] [delay=0]" % sys.argv[0]; + sys.exit(); #Initialize FET and set baud rate client=GoodFETCCSPI(); client.serInit() - client.setup(); #Dummy read. @@ -45,7 +44,7 @@ client.setup(); if(sys.argv[1]=="carrier"): if len(sys.argv)>2: client.RF_setfreq(eval(sys.argv[2])); - while 1: + while 1: client.RF_carrier(); while(1): time.sleep(1); @@ -58,6 +57,32 @@ if(sys.argv[1]=="modulated_spectrum"): while(1): time.sleep(1); +if(sys.argv[1]=="reflexjam" or sys.argv[1]=="reflexjamack"): + #Setup the radio to listen promiscously on a frequency + client.RF_promiscuity(1); + client.RF_autocrc(0); + if len(sys.argv)>2: + freq=eval(sys.argv[2]); + if freq>100: + client.RF_setfreq(freq); + else: + client.RF_setchan(freq); + duration=0; + if len(sys.argv)>3: + duration=eval(sys.argv[3]); + client.CC_RFST_RX(); + print "Reflexively jamming on %i MHz" % (client.RF_getfreq()/10**6); + #Now we let the firmware take over, watching for packets and jamming them. + #Standard reflexive jam is done with duration=0. + #To selectively jam packets that are above a certain length, set duration + # to the number of milliseconds needed to jam frames of that length. + # Api-Do project has script available to tune/test this duration. + # code.google.com/p/zigbeesecurity (rmspeers) + if sys.argv[1]=="reflexjam": + client.RF_reflexjam(duration); + elif sys.argv[1]=="reflexjamack": + client.RF_reflexjam_autoack(); + if(sys.argv[1]=="info"): print "Found %s" % client.identstr(); print "Freq: %05f MHz" % (client.RF_getfreq()/(10**6)); @@ -93,6 +118,7 @@ if(sys.argv[1]=="rssi"): for foo in range(0,rssi>>2): string=("%s."%string); print "%02x %04i %s" % (rssi,rssi, string); + if(sys.argv[1]=="sniff" or sys.argv[1]=="sniffdissect"): #Promiscuous mode. client.RF_promiscuity(1); @@ -117,6 +143,7 @@ if(sys.argv[1]=="sniff" or sys.argv[1]=="sniffdissect"): else: client.printpacket(packet); sys.stdout.flush(); + if(sys.argv[1]=="bsniff"): #Just broadcast. client.RF_promiscuity(0); @@ -156,10 +183,12 @@ if(sys.argv[1]=="txtest"): 0xff, 0xff, 0xff, 0xff, 0xde, 0xad, 0xbe, 0xef, 0xba, 0xbe, 0xc0]); + if(sys.argv[1]=="txtoscount"): ''' - Clone of what TinyOS's BlinkToLED demo code does. - Specify a channel a TinyOS mote programmed with BlinkToLED is on, and this will act as the second device. + Clone of what TinyOS's RadioCountToLeds demo code does. Specify a + channel a TinyOS mote programmed with RadioCountToLeds is on, and + this will act as the second device. (ryan@rmspeers.com) ''' if (len(sys.argv)<=3): print "Provide -r to work via replays or -i to work via incrementing itself."; @@ -185,26 +214,19 @@ if(sys.argv[1]=="txtoscount"): packet=None; while packet==None: packet=client.RF_rxpacket(); - #print "Recd:", - #client.printpacket(packet); pkt = packet[:14]; - #print "Sent:", - #client.printpacket(pkt) client.RF_txpacket(pkt); elif (sys.argv[3]=="-i"): #give -i to have it increment and send #Use this code for it to actually do increments itself: pkt = countpkt[:]; pkt[3] = i; pkt[13] = i+1; - #for j in pkt: - # print hex(j)[2:],; - #print; client.RF_txpacket(pkt); if i >= 31: i = 0; else: i += 1; time.sleep(0.5); -if(sys.argv[1]=="txpiptest"):# or sys.argv[1]=="txpipscapy"): +if(sys.argv[1]=="txpiptest" or sys.argv[1]=="txpipscapy"): if len(sys.argv)>2: freq=eval(sys.argv[2]); if freq>100: @@ -218,36 +240,61 @@ if(sys.argv[1]=="txpiptest"):# or sys.argv[1]=="txpipscapy"): client.RF_setsync(0xFFFF); while 1: - client.RF_txpacket([ - 0x7f, - #Real header, must begin with SFD. - 0x00, 0x00, 0x00, - 0x00, 0xA7, - - #Length - 0x1f, 0x01, 0x08, 0x82, - 0xDF, 0xff, 0xff, 0xff, - 0xde, 0xad, 0xbe, 0xef, - 0xba, 0xbe, 0xc0, - - #Preamble - 0x00, 0x00, 0x00, - #SFD - 0x00, 0xA7, #CC2420 SFD - #Packet In Packet - 0x0f, 0x01, 0x08, 0x82, - 0xff, 0xff, 0xff, 0xff, - 0xde, 0xad, 0xbe, 0xef, - 0xba, 0xbe, 0xc0, - - 0xff, 0xff, 0xff, 0xff, - 0xff, 0xff, 0xff, 0xff, - 0xff, 0xff, 0xff, 0xff, - 0xff, 0xff, 0xff, 0xff, - 0xff, 0xff, 0xff, 0xff, - 0xff, 0xff, 0xff, 0xff, - 0xff, 0xff, 0xff, 0xff, - ]); + if(sys.argv[1]=="txpiptest"): + client.RF_txpacket([ + 0x7f, + #Real header, must begin with SFD. + 0x00, 0x00, 0x00, + 0x00, 0xA7, + + #Length + 0x1f, 0x01, 0x08, 0x82, + 0xDF, 0xff, 0xff, 0xff, + 0xde, 0xad, 0xbe, 0xef, + 0xba, 0xbe, 0xc0, + + #Preamble + 0x00, 0x00, 0x00, + #SFD + 0x00, 0xA7, #CC2420 SFD + #Packet In Packet + 0x0f, 0x01, 0x08, 0x82, + 0xff, 0xff, 0xff, 0xff, + 0xde, 0xad, 0xbe, 0xef, + 0xba, 0xbe, 0xc0, + + 0xff, 0xff, 0xff, 0xff, + 0xff, 0xff, 0xff, 0xff, + 0xff, 0xff, 0xff, 0xff, + 0xff, 0xff, 0xff, 0xff, + 0xff, 0xff, 0xff, 0xff, + 0xff, 0xff, 0xff, 0xff, + 0xff, 0xff, 0xff, 0xff, + ]); + elif(sys.argv[1]=="txpipscapy"): + # NB: Requires Scapy with dot15d4.py layer. (rmspeers) + try: + from scapy.all import Dot15d4, Dot15d4FCS, Dot15d4Data, Raw + import struct + except ImportError: + print "To use packet building, Scapy must be installed and have the dot15d4 layer present." + print "try: hg clone http://hg.secdev.org/scapy-com"; + print " sudo ./setup.py install"; + #Overall method is to build from the inner packet outwards in the pkt string + # Make inner packet + scapyinner = Dot15d4FCS(seqnum=130)/Dot15d4Data()/Raw('\xde\xad\xbe\xef'); + pkt = str(scapyinner); #build inner pkt to bytes, adding FCS automatically + pkt = struct.pack('b', len(pkt)) + pkt #prepend with its length + pkt = "\x00\x00\x00\x00\xA7" + pkt #add preamble and SFD to inner packet + # Make outer (wrapping) packet + scapyouter = Dot15d4(seqnum=130)/Dot15d4Data(dest_panid=0xffdf)/Raw('\xde\xad\xbe\xef\xba\xbe\xc0') #TODO why need these last 3 bytes? + pkt = str(scapyouter) + pkt + pkt = struct.pack('b', len(pkt)) + pkt #prepend with its length + pkt = '\x00\x00\x00\x00\xA7' + pkt + ('\xff'*28) #start with preamble/SFD and add 0xff fill at end + pkt = struct.pack('b', len(pkt)) + pkt #prepend with its length (originally used \x7f) + client.printpacket(pkt) + client.RF_autocrc(1); + client.RF_txpacket(pkt) if(sys.argv[1]=="peek"): start=0x0000;