From: travisutk Date: Thu, 9 Dec 2010 17:09:21 +0000 (+0000) Subject: I'm damned close to sniffing a Simpliciti packet by Python. X-Git-Url: http://git.rot13.org/?p=goodfet;a=commitdiff_plain;h=68085aea3ce73ad23246754d7fe649c8e018693c I'm damned close to sniffing a Simpliciti packet by Python. git-svn-id: https://svn.code.sf.net/p/goodfet/code/trunk@777 12e2690d-a6be-4b82-a7b7-67c4a43b65c8 --- diff --git a/client/goodfet.cc b/client/goodfet.cc index b051ff0..10ed3cf 100755 --- a/client/goodfet.cc +++ b/client/goodfet.cc @@ -42,7 +42,7 @@ if(len(sys.argv)==1): print "%s peekcode 0x$start [0x$stop]" % sys.argv[0]; print "%s carrier [freq]\n\tHolds a carrier on [freq] Hz." % sys.argv[0]; - #print "%s reflex [freq]\n\tJams on [freq] Hz." % sys.argv[0]; + print "%s reflex [freq]\n\tJams on [freq] Hz." % sys.argv[0]; print "%s sniffsimpliciti [us|eu|lf]\n\tSniffs SimpliciTI packets." % sys.argv[0]; sys.exit(); @@ -72,11 +72,11 @@ if(sys.argv[1]=="reflex"): client.RF_idle(); client.config_simpliciti(); - client.pokebysym("MDMCFG4",0x0c); #ultrawide - client.pokebysym("FSCTRL1", 0x12); #IF of 457.031 + client.pokebysym("MDMCFG4", 0x0c); #ultrawide + client.pokebysym("FSCTRL1", 0x12); #IF of 457.031 client.pokebysym("FSCTRL0", 0x00); - client.pokebysym("FSCAL2", 0x2A); #above mid - client.pokebysym("MCSM0" , 0x0) # Main Radio Control State Machine + client.pokebysym("FSCAL2" , 0x2A); #above mid + client.pokebysym("MCSM0" , 0x00); # Main Radio Control State Machine client.pokebysym("FSCAL3" , 0xEA) # Frequency synthesizer calibration. client.pokebysym("FSCAL2" , 0x2A) # Frequency synthesizer calibration. @@ -122,6 +122,10 @@ if(sys.argv[1]=="sniffsimpliciti"): #Reversal of transmitter code from nRF_CMD.c of OpenBeacon #TODO remove all poke() calls. + client.CC1110_crystal(); + client.RF_idle(); + + client.config_simpliciti("lf"); #client.RF_setfreq(2481 * 10**6);