|
|
|
@ -0,0 +1,828 @@
|
|
|
|
|
#!/usr/bin/python
|
|
|
|
|
from time import sleep
|
|
|
|
|
import argparse
|
|
|
|
|
import threading
|
|
|
|
|
import os.path
|
|
|
|
|
import struct
|
|
|
|
|
import datetime
|
|
|
|
|
import time
|
|
|
|
|
import imp
|
|
|
|
|
|
|
|
|
|
rnode = None
|
|
|
|
|
rnode_serial = None
|
|
|
|
|
rnode_baudrate = 115200
|
|
|
|
|
known_keys = [["unsigned.io", "30819f300d06092a864886f70d010101050003818d0030818902818100e5d46084e445595376bf7efd9c6ccf19d39abbc59afdb763207e4ff68b8d00ebffb63847aa2fe6dd10783d3ea63b55ac66f71ad885c20e223709f0d51ed5c6c0d0b093be9e1d165bb8a483a548b67a3f7a1e4580f50e75b306593fa6067ae259d3e297717bd7ff8c8f5b07f2bed89929a9a0321026cf3699524db98e2d18fb2d020300ff39"]]
|
|
|
|
|
|
|
|
|
|
class RNS():
|
|
|
|
|
@staticmethod
|
|
|
|
|
def log(msg):
|
|
|
|
|
logtimefmt = "%Y-%m-%d %H:%M:%S"
|
|
|
|
|
timestamp = time.time()
|
|
|
|
|
logstring = "["+time.strftime(logtimefmt)+"] "+msg
|
|
|
|
|
print(logstring)
|
|
|
|
|
|
|
|
|
|
@staticmethod
|
|
|
|
|
def hexrep(data, delimit=True):
|
|
|
|
|
delimiter = ":"
|
|
|
|
|
if not delimit:
|
|
|
|
|
delimiter = ""
|
|
|
|
|
hexrep = delimiter.join("{:02x}".format(ord(c)) for c in data)
|
|
|
|
|
return hexrep
|
|
|
|
|
|
|
|
|
|
@staticmethod
|
|
|
|
|
def prettyhexrep(data):
|
|
|
|
|
delimiter = ""
|
|
|
|
|
hexrep = "<"+delimiter.join("{:02x}".format(ord(c)) for c in data)+">"
|
|
|
|
|
return hexrep
|
|
|
|
|
|
|
|
|
|
class KISS():
|
|
|
|
|
FEND = chr(0xC0)
|
|
|
|
|
FESC = chr(0xDB)
|
|
|
|
|
TFEND = chr(0xDC)
|
|
|
|
|
TFESC = chr(0xDD)
|
|
|
|
|
|
|
|
|
|
CMD_UNKNOWN = chr(0xFE)
|
|
|
|
|
CMD_DATA = chr(0x00)
|
|
|
|
|
CMD_FREQUENCY = chr(0x01)
|
|
|
|
|
CMD_BANDWIDTH = chr(0x02)
|
|
|
|
|
CMD_TXPOWER = chr(0x03)
|
|
|
|
|
CMD_SF = chr(0x04)
|
|
|
|
|
CMD_CR = chr(0x05)
|
|
|
|
|
CMD_RADIO_STATE = chr(0x06)
|
|
|
|
|
CMD_RADIO_LOCK = chr(0x07)
|
|
|
|
|
CMD_DETECT = chr(0x08)
|
|
|
|
|
CMD_READY = chr(0x0F)
|
|
|
|
|
CMD_STAT_RX = chr(0x21)
|
|
|
|
|
CMD_STAT_TX = chr(0x22)
|
|
|
|
|
CMD_STAT_RSSI = chr(0x23)
|
|
|
|
|
CMD_BLINK = chr(0x30)
|
|
|
|
|
CMD_RANDOM = chr(0x40)
|
|
|
|
|
CMD_FW_VERSION = chr(0x50)
|
|
|
|
|
CMD_ROM_READ = chr(0x51)
|
|
|
|
|
CMD_ROM_WRITE = chr(0x52)
|
|
|
|
|
CMD_CONF_SAVE = chr(0x53)
|
|
|
|
|
|
|
|
|
|
DETECT_REQ = chr(0x73)
|
|
|
|
|
DETECT_RESP = chr(0x46)
|
|
|
|
|
|
|
|
|
|
RADIO_STATE_OFF = chr(0x00)
|
|
|
|
|
RADIO_STATE_ON = chr(0x01)
|
|
|
|
|
RADIO_STATE_ASK = chr(0xFF)
|
|
|
|
|
|
|
|
|
|
CMD_ERROR = chr(0x90)
|
|
|
|
|
ERROR_INITRADIO = chr(0x01)
|
|
|
|
|
ERROR_TXFAILED = chr(0x02)
|
|
|
|
|
ERROR_EEPROM_LOCKED = chr(0x03)
|
|
|
|
|
|
|
|
|
|
@staticmethod
|
|
|
|
|
def escape(data):
|
|
|
|
|
data = data.replace(chr(0xdb), chr(0xdb)+chr(0xdd))
|
|
|
|
|
data = data.replace(chr(0xc0), chr(0xdb)+chr(0xdc))
|
|
|
|
|
return data
|
|
|
|
|
|
|
|
|
|
class ROM():
|
|
|
|
|
PRODUCT_RNODE = chr(0x03)
|
|
|
|
|
MODEL_A4 = chr(0xA4)
|
|
|
|
|
MODEL_A9 = chr(0xA9)
|
|
|
|
|
|
|
|
|
|
ADDR_PRODUCT = chr(0x00)
|
|
|
|
|
ADDR_MODEL = chr(0x01)
|
|
|
|
|
ADDR_HW_REV = chr(0x02)
|
|
|
|
|
ADDR_SERIAL = chr(0x03)
|
|
|
|
|
ADDR_MADE = chr(0x07)
|
|
|
|
|
ADDR_CHKSUM = chr(0x0B)
|
|
|
|
|
ADDR_SIGNATURE = chr(0x1B)
|
|
|
|
|
ADDR_INFO_LOCK = chr(0x9B)
|
|
|
|
|
ADDR_CONF_SF = chr(0x9C)
|
|
|
|
|
ADDR_CONF_CR = chr(0x9D)
|
|
|
|
|
ADDR_CONF_TXP = chr(0x9E)
|
|
|
|
|
ADDR_CONF_BW = chr(0x9F)
|
|
|
|
|
ADDR_CONF_FREQ = chr(0xA3)
|
|
|
|
|
ADDR_CONF_OK = chr(0xA7)
|
|
|
|
|
|
|
|
|
|
INFO_LOCK_BYTE = chr(0x73)
|
|
|
|
|
CONF_OK_BYTE = chr(0x73)
|
|
|
|
|
|
|
|
|
|
class RNode():
|
|
|
|
|
def __init__(self, serial_instance):
|
|
|
|
|
self.serial = serial_instance
|
|
|
|
|
self.timeout = 100
|
|
|
|
|
|
|
|
|
|
self.r_frequency = None
|
|
|
|
|
self.r_bandwidth = None
|
|
|
|
|
self.r_txpower = None
|
|
|
|
|
self.r_sf = None
|
|
|
|
|
self.r_state = None
|
|
|
|
|
self.r_lock = None
|
|
|
|
|
|
|
|
|
|
self.sf = None
|
|
|
|
|
self.cr = None
|
|
|
|
|
self.txpower = None
|
|
|
|
|
self.frequency = None
|
|
|
|
|
self.bandwidth = None
|
|
|
|
|
|
|
|
|
|
self.detected = None
|
|
|
|
|
|
|
|
|
|
self.eeprom = None
|
|
|
|
|
self.major_version = None
|
|
|
|
|
self.minor_version = None
|
|
|
|
|
self.version = None
|
|
|
|
|
|
|
|
|
|
self.provisioned = None
|
|
|
|
|
self.product = None
|
|
|
|
|
self.model = None
|
|
|
|
|
self.hw_rev = None
|
|
|
|
|
self.made = None
|
|
|
|
|
self.checksum = None
|
|
|
|
|
self.signature = None
|
|
|
|
|
self.signature_valid = False
|
|
|
|
|
self.vendor = None
|
|
|
|
|
|
|
|
|
|
self.configured = None
|
|
|
|
|
self.conf_sf = None
|
|
|
|
|
self.conf_cr = None
|
|
|
|
|
self.conf_txpower = None
|
|
|
|
|
self.conf_frequency = None
|
|
|
|
|
self.conf_bandwidth = None
|
|
|
|
|
|
|
|
|
|
def readLoop(self):
|
|
|
|
|
try:
|
|
|
|
|
in_frame = False
|
|
|
|
|
escape = False
|
|
|
|
|
command = KISS.CMD_UNKNOWN
|
|
|
|
|
data_buffer = ""
|
|
|
|
|
command_buffer = ""
|
|
|
|
|
last_read_ms = int(time.time()*1000)
|
|
|
|
|
|
|
|
|
|
while rnode_serial.is_open:
|
|
|
|
|
if rnode_serial.in_waiting:
|
|
|
|
|
byte = rnode_serial.read(1)
|
|
|
|
|
last_read_ms = int(time.time()*1000)
|
|
|
|
|
|
|
|
|
|
if (in_frame and byte == KISS.FEND and command == KISS.CMD_ROM_READ):
|
|
|
|
|
self.eeprom = data_buffer
|
|
|
|
|
#RNS.log("Read "+str(len(self.eeprom))+" bytes of EEPROM from device")
|
|
|
|
|
#RNS.log(RNS.hexrep(self.eeprom))
|
|
|
|
|
in_frame = False
|
|
|
|
|
data_buffer = ""
|
|
|
|
|
command_buffer = ""
|
|
|
|
|
elif (byte == KISS.FEND):
|
|
|
|
|
in_frame = True
|
|
|
|
|
command = KISS.CMD_UNKNOWN
|
|
|
|
|
data_buffer = ""
|
|
|
|
|
command_buffer = ""
|
|
|
|
|
elif (in_frame and len(data_buffer) < 512):
|
|
|
|
|
if (len(data_buffer) == 0 and command == KISS.CMD_UNKNOWN):
|
|
|
|
|
command = byte
|
|
|
|
|
elif (command == KISS.CMD_ROM_READ):
|
|
|
|
|
if (byte == KISS.FESC):
|
|
|
|
|
escape = True
|
|
|
|
|
else:
|
|
|
|
|
if (escape):
|
|
|
|
|
if (byte == KISS.TFEND):
|
|
|
|
|
byte = KISS.FEND
|
|
|
|
|
if (byte == KISS.TFESC):
|
|
|
|
|
byte = KISS.FESC
|
|
|
|
|
escape = False
|
|
|
|
|
data_buffer = data_buffer+byte
|
|
|
|
|
elif (command == KISS.CMD_FREQUENCY):
|
|
|
|
|
if (byte == KISS.FESC):
|
|
|
|
|
escape = True
|
|
|
|
|
else:
|
|
|
|
|
if (escape):
|
|
|
|
|
if (byte == KISS.TFEND):
|
|
|
|
|
byte = KISS.FEND
|
|
|
|
|
if (byte == KISS.TFESC):
|
|
|
|
|
byte = KISS.FESC
|
|
|
|
|
escape = False
|
|
|
|
|
command_buffer = command_buffer+byte
|
|
|
|
|
if (len(command_buffer) == 4):
|
|
|
|
|
self.r_frequency = ord(command_buffer[0]) << 24 | ord(command_buffer[1]) << 16 | ord(command_buffer[2]) << 8 | ord(command_buffer[3])
|
|
|
|
|
RNS.log("Radio reporting frequency is "+str(self.r_frequency/1000000.0)+" MHz")
|
|
|
|
|
self.updateBitrate()
|
|
|
|
|
|
|
|
|
|
elif (command == KISS.CMD_BANDWIDTH):
|
|
|
|
|
if (byte == KISS.FESC):
|
|
|
|
|
escape = True
|
|
|
|
|
else:
|
|
|
|
|
if (escape):
|
|
|
|
|
if (byte == KISS.TFEND):
|
|
|
|
|
byte = KISS.FEND
|
|
|
|
|
if (byte == KISS.TFESC):
|
|
|
|
|
byte = KISS.FESC
|
|
|
|
|
escape = False
|
|
|
|
|
command_buffer = command_buffer+byte
|
|
|
|
|
if (len(command_buffer) == 4):
|
|
|
|
|
self.r_bandwidth = ord(command_buffer[0]) << 24 | ord(command_buffer[1]) << 16 | ord(command_buffer[2]) << 8 | ord(command_buffer[3])
|
|
|
|
|
RNS.log("Radio reporting bandwidth is "+str(self.r_bandwidth/1000.0)+" KHz")
|
|
|
|
|
self.updateBitrate()
|
|
|
|
|
|
|
|
|
|
elif (command == KISS.CMD_FW_VERSION):
|
|
|
|
|
if (byte == KISS.FESC):
|
|
|
|
|
escape = True
|
|
|
|
|
else:
|
|
|
|
|
if (escape):
|
|
|
|
|
if (byte == KISS.TFEND):
|
|
|
|
|
byte = KISS.FEND
|
|
|
|
|
if (byte == KISS.TFESC):
|
|
|
|
|
byte = KISS.FESC
|
|
|
|
|
escape = False
|
|
|
|
|
command_buffer = command_buffer+byte
|
|
|
|
|
if (len(command_buffer) == 2):
|
|
|
|
|
self.major_version = ord(command_buffer[0])
|
|
|
|
|
self.minor_version = ord(command_buffer[1])
|
|
|
|
|
self.updateVersion()
|
|
|
|
|
|
|
|
|
|
elif (command == KISS.CMD_TXPOWER):
|
|
|
|
|
self.r_txpower = ord(byte)
|
|
|
|
|
RNS.log("Radio reporting TX power is "+str(self.r_txpower)+" dBm")
|
|
|
|
|
elif (command == KISS.CMD_SF):
|
|
|
|
|
self.r_sf = ord(byte)
|
|
|
|
|
RNS.log("Radio reporting spreading factor is "+str(self.r_sf))
|
|
|
|
|
self.updateBitrate()
|
|
|
|
|
elif (command == KISS.CMD_CR):
|
|
|
|
|
self.r_cr = ord(byte)
|
|
|
|
|
RNS.log("Radio reporting coding rate is "+str(self.r_cr))
|
|
|
|
|
self.updateBitrate()
|
|
|
|
|
elif (command == KISS.CMD_RADIO_STATE):
|
|
|
|
|
self.r_state = ord(byte)
|
|
|
|
|
elif (command == KISS.CMD_RADIO_LOCK):
|
|
|
|
|
self.r_lock = ord(byte)
|
|
|
|
|
elif (command == KISS.CMD_ERROR):
|
|
|
|
|
if (byte == KISS.ERROR_INITRADIO):
|
|
|
|
|
RNS.log(str(self)+" hardware initialisation error (code "+RNS.hexrep(byte)+")")
|
|
|
|
|
elif (byte == KISS.ERROR_INITRADIO):
|
|
|
|
|
RNS.log(str(self)+" hardware TX error (code "+RNS.hexrep(byte)+")")
|
|
|
|
|
else:
|
|
|
|
|
RNS.log(str(self)+" hardware error (code "+RNS.hexrep(byte)+")")
|
|
|
|
|
elif (command == KISS.CMD_DETECT):
|
|
|
|
|
if byte == KISS.DETECT_RESP:
|
|
|
|
|
self.detected = True
|
|
|
|
|
else:
|
|
|
|
|
self.detected = False
|
|
|
|
|
|
|
|
|
|
else:
|
|
|
|
|
time_since_last = int(time.time()*1000) - last_read_ms
|
|
|
|
|
if len(data_buffer) > 0 and time_since_last > self.timeout:
|
|
|
|
|
RNS.log(str(self)+" serial read timeout")
|
|
|
|
|
data_buffer = ""
|
|
|
|
|
in_frame = False
|
|
|
|
|
command = KISS.CMD_UNKNOWN
|
|
|
|
|
escape = False
|
|
|
|
|
sleep(0.08)
|
|
|
|
|
|
|
|
|
|
except Exception as e:
|
|
|
|
|
exit()
|
|
|
|
|
|
|
|
|
|
def updateBitrate(self):
|
|
|
|
|
try:
|
|
|
|
|
self.bitrate = self.sf * ( (4.0/self.cr) / (math.pow(2,self.sf)/(self.bandwidth/1000)) ) * 1000
|
|
|
|
|
self.bitrate_kbps = round(self.bitrate/1000.0, 2)
|
|
|
|
|
RNS.log(str(self)+" On-air bitrate is now "+str(self.bitrate_kbps)+ " kbps")
|
|
|
|
|
except:
|
|
|
|
|
self.bitrate = 0
|
|
|
|
|
|
|
|
|
|
def updateVersion(self):
|
|
|
|
|
minstr = str(self.minor_version)
|
|
|
|
|
if len(minstr) == 1:
|
|
|
|
|
minstr = "0"+minstr
|
|
|
|
|
self.version = str(self.major_version)+"."+minstr
|
|
|
|
|
|
|
|
|
|
def detect(self):
|
|
|
|
|
kiss_command = KISS.FEND+KISS.CMD_DETECT+KISS.DETECT_REQ+KISS.FEND+KISS.CMD_FW_VERSION+chr(0x00)+KISS.FEND
|
|
|
|
|
written = rnode_serial.write(kiss_command)
|
|
|
|
|
if written != len(kiss_command):
|
|
|
|
|
raise IOError("An IO error occurred while configuring spreading factor for "+self(str))
|
|
|
|
|
|
|
|
|
|
def initRadio(self):
|
|
|
|
|
self.setFrequency()
|
|
|
|
|
self.setBandwidth()
|
|
|
|
|
self.setTXPower()
|
|
|
|
|
self.setSpreadingFactor()
|
|
|
|
|
self.setCodingRate()
|
|
|
|
|
self.setRadioState(KISS.RADIO_STATE_ON)
|
|
|
|
|
|
|
|
|
|
def setFrequency(self):
|
|
|
|
|
c1 = self.frequency >> 24
|
|
|
|
|
c2 = self.frequency >> 16 & 0xFF
|
|
|
|
|
c3 = self.frequency >> 8 & 0xFF
|
|
|
|
|
c4 = self.frequency & 0xFF
|
|
|
|
|
data = KISS.escape(chr(c1)+chr(c2)+chr(c3)+chr(c4))
|
|
|
|
|
|
|
|
|
|
kiss_command = KISS.FEND+KISS.CMD_FREQUENCY+data+KISS.FEND
|
|
|
|
|
written = self.serial.write(kiss_command)
|
|
|
|
|
if written != len(kiss_command):
|
|
|
|
|
raise IOError("An IO error occurred while configuring frequency for "+self(str))
|
|
|
|
|
|
|
|
|
|
def setBandwidth(self):
|
|
|
|
|
c1 = self.bandwidth >> 24
|
|
|
|
|
c2 = self.bandwidth >> 16 & 0xFF
|
|
|
|
|
c3 = self.bandwidth >> 8 & 0xFF
|
|
|
|
|
c4 = self.bandwidth & 0xFF
|
|
|
|
|
data = KISS.escape(chr(c1)+chr(c2)+chr(c3)+chr(c4))
|
|
|
|
|
|
|
|
|
|
kiss_command = KISS.FEND+KISS.CMD_BANDWIDTH+data+KISS.FEND
|
|
|
|
|
written = self.serial.write(kiss_command)
|
|
|
|
|
if written != len(kiss_command):
|
|
|
|
|
raise IOError("An IO error occurred while configuring bandwidth")
|
|
|
|
|
|
|
|
|
|
def setTXPower(self):
|
|
|
|
|
txp = chr(self.txpower)
|
|
|
|
|
kiss_command = KISS.FEND+KISS.CMD_TXPOWER+txp+KISS.FEND
|
|
|
|
|
written = self.serial.write(kiss_command)
|
|
|
|
|
if written != len(kiss_command):
|
|
|
|
|
raise IOError("An IO error occurred while configuring TX power")
|
|
|
|
|
|
|
|
|
|
def setSpreadingFactor(self):
|
|
|
|
|
sf = chr(self.sf)
|
|
|
|
|
kiss_command = KISS.FEND+KISS.CMD_SF+sf+KISS.FEND
|
|
|
|
|
written = self.serial.write(kiss_command)
|
|
|
|
|
if written != len(kiss_command):
|
|
|
|
|
raise IOError("An IO error occurred while configuring spreading factor")
|
|
|
|
|
|
|
|
|
|
def setCodingRate(self):
|
|
|
|
|
cr = chr(self.cr)
|
|
|
|
|
kiss_command = KISS.FEND+KISS.CMD_CR+cr+KISS.FEND
|
|
|
|
|
written = self.serial.write(kiss_command)
|
|
|
|
|
if written != len(kiss_command):
|
|
|
|
|
raise IOError("An IO error occurred while configuring coding rate")
|
|
|
|
|
|
|
|
|
|
def setRadioState(self, state):
|
|
|
|
|
kiss_command = KISS.FEND+KISS.CMD_RADIO_STATE+state+KISS.FEND
|
|
|
|
|
written = self.serial.write(kiss_command)
|
|
|
|
|
if written != len(kiss_command):
|
|
|
|
|
raise IOError("An IO error occurred while configuring radio state")
|
|
|
|
|
|
|
|
|
|
def write_eeprom(self, addr, byte):
|
|
|
|
|
kiss_command = KISS.FEND+KISS.CMD_ROM_WRITE+KISS.escape(addr)+KISS.escape(byte)+KISS.FEND
|
|
|
|
|
written = self.serial.write(kiss_command)
|
|
|
|
|
if written != len(kiss_command):
|
|
|
|
|
raise IOError("An IO error occurred while writing EEPROM")
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
def download_eeprom(self):
|
|
|
|
|
kiss_command = KISS.FEND+KISS.CMD_ROM_READ+chr(0x00)+KISS.FEND
|
|
|
|
|
written = self.serial.write(kiss_command)
|
|
|
|
|
if written != len(kiss_command):
|
|
|
|
|
raise IOError("An IO error occurred while configuring radio state")
|
|
|
|
|
|
|
|
|
|
sleep(0.2)
|
|
|
|
|
if self.eeprom == None:
|
|
|
|
|
RNS.log("Could not download EEPROM from device. Is a valid firmware installed?")
|
|
|
|
|
exit()
|
|
|
|
|
else:
|
|
|
|
|
self.parse_eeprom()
|
|
|
|
|
|
|
|
|
|
def parse_eeprom(self):
|
|
|
|
|
if self.eeprom[ord(ROM.ADDR_INFO_LOCK)] == ROM.INFO_LOCK_BYTE:
|
|
|
|
|
from cryptography.hazmat.primitives import hashes
|
|
|
|
|
from cryptography.hazmat.backends import default_backend
|
|
|
|
|
|
|
|
|
|
self.provisioned = True
|
|
|
|
|
|
|
|
|
|
self.product = self.eeprom[ord(ROM.ADDR_PRODUCT)]
|
|
|
|
|
self.model = self.eeprom[ord(ROM.ADDR_MODEL)]
|
|
|
|
|
self.hw_rev = self.eeprom[ord(ROM.ADDR_HW_REV)]
|
|
|
|
|
self.serial = "" + self.eeprom[ord(ROM.ADDR_SERIAL)] + self.eeprom[ord(ROM.ADDR_SERIAL)+1] + self.eeprom[ord(ROM.ADDR_SERIAL)+2] + self.eeprom[ord(ROM.ADDR_SERIAL)+3]
|
|
|
|
|
self.made = "" + self.eeprom[ord(ROM.ADDR_MADE)] + self.eeprom[ord(ROM.ADDR_MADE)+1] + self.eeprom[ord(ROM.ADDR_MADE)+2] + self.eeprom[ord(ROM.ADDR_MADE)+3]
|
|
|
|
|
self.checksum = ""
|
|
|
|
|
for i in range(0,16):
|
|
|
|
|
self.checksum = self.checksum+self.eeprom[ord(ROM.ADDR_CHKSUM)+i]
|
|
|
|
|
|
|
|
|
|
self.signature = ""
|
|
|
|
|
for i in range(0,128):
|
|
|
|
|
self.signature = self.signature+self.eeprom[ord(ROM.ADDR_SIGNATURE)+i]
|
|
|
|
|
|
|
|
|
|
checksummed_info = self.product+self.model+self.hw_rev+self.serial+self.made
|
|
|
|
|
digest = hashes.Hash(hashes.MD5(), backend=default_backend())
|
|
|
|
|
digest.update(checksummed_info)
|
|
|
|
|
checksum = digest.finalize()
|
|
|
|
|
|
|
|
|
|
#RNS.log("EEPROM checksum: "+RNS.hexrep(self.checksum))
|
|
|
|
|
#RNS.log("Calculated checksum: "+RNS.hexrep(checksum))
|
|
|
|
|
|
|
|
|
|
if self.checksum != checksum:
|
|
|
|
|
self.provisioned = False
|
|
|
|
|
RNS.log("EEPROM checksum mismatch")
|
|
|
|
|
exit()
|
|
|
|
|
else:
|
|
|
|
|
RNS.log("EEPROM checksum correct")
|
|
|
|
|
from cryptography.hazmat.primitives.serialization import load_der_public_key
|
|
|
|
|
from cryptography.hazmat.primitives.serialization import load_der_private_key
|
|
|
|
|
from cryptography.hazmat.primitives.asymmetric import padding
|
|
|
|
|
for known in known_keys:
|
|
|
|
|
vendor = known[0]
|
|
|
|
|
public_hexrep = known[1]
|
|
|
|
|
public_bytes = public_hexrep.decode("hex")
|
|
|
|
|
public_key = load_der_public_key(public_bytes, backend=default_backend())
|
|
|
|
|
try:
|
|
|
|
|
public_key.verify(
|
|
|
|
|
self.signature,
|
|
|
|
|
self.checksum,
|
|
|
|
|
padding.PSS(
|
|
|
|
|
mgf=padding.MGF1(hashes.SHA256()),
|
|
|
|
|
salt_length=padding.PSS.MAX_LENGTH
|
|
|
|
|
),
|
|
|
|
|
hashes.SHA256())
|
|
|
|
|
RNS.log("Board signature validated")
|
|
|
|
|
self.signature_valid = True
|
|
|
|
|
self.vendor = vendor
|
|
|
|
|
except Exception as e:
|
|
|
|
|
RNS.log("Board signature validation failed")
|
|
|
|
|
|
|
|
|
|
if self.eeprom[ord(ROM.ADDR_CONF_OK)] == ROM.CONF_OK_BYTE:
|
|
|
|
|
self.configured = True
|
|
|
|
|
self.conf_sf = self.eeprom[ord(ROM.ADDR_CONF_SF)]
|
|
|
|
|
self.conf_cr = self.eeprom[ord(ROM.ADDR_CONF_CR)]
|
|
|
|
|
self.conf_txpower = self.eeprom[ord(ROM.ADDR_CONF_TXP)]
|
|
|
|
|
self.conf_frequency = ord(self.eeprom[ord(ROM.ADDR_CONF_FREQ)]) << 24 | ord(self.eeprom[ord(ROM.ADDR_CONF_FREQ)+1]) << 16 | ord(self.eeprom[ord(ROM.ADDR_CONF_FREQ)+2]) << 8 | ord(self.eeprom[ord(ROM.ADDR_CONF_FREQ)+3])
|
|
|
|
|
self.conf_bandwidth = ord(self.eeprom[ord(ROM.ADDR_CONF_BW)]) << 24 | ord(self.eeprom[ord(ROM.ADDR_CONF_BW)+1]) << 16 | ord(self.eeprom[ord(ROM.ADDR_CONF_BW)+2]) << 8 | ord(self.eeprom[ord(ROM.ADDR_CONF_BW)+3])
|
|
|
|
|
else:
|
|
|
|
|
self.configured = False
|
|
|
|
|
else:
|
|
|
|
|
self.provisioned = False
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
# TODO: remove this
|
|
|
|
|
def test(self):
|
|
|
|
|
self.frequency = 868000000
|
|
|
|
|
self.bandwidth = 125000
|
|
|
|
|
self.txpower = 2
|
|
|
|
|
self.sf = 7
|
|
|
|
|
self.cr = 5
|
|
|
|
|
self.initRadio()
|
|
|
|
|
self.setRadioState(KISS.RADIO_STATE_OFF)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
def device_probe():
|
|
|
|
|
sleep(2)
|
|
|
|
|
rnode.detect()
|
|
|
|
|
sleep(0.1)
|
|
|
|
|
if rnode.detected == True:
|
|
|
|
|
RNS.log("Device connected")
|
|
|
|
|
RNS.log("Firmware version: "+rnode.version)
|
|
|
|
|
return True
|
|
|
|
|
else:
|
|
|
|
|
raise IOError("Got invalid response while detecting device")
|
|
|
|
|
|
|
|
|
|
def config_interface():
|
|
|
|
|
RNS.log("Starting configuration interface...")
|
|
|
|
|
|
|
|
|
|
if __name__ == "__main__":
|
|
|
|
|
try:
|
|
|
|
|
imp.find_module("serial")
|
|
|
|
|
except ImportError:
|
|
|
|
|
print("")
|
|
|
|
|
print("RNode Config Utility needs pyserial to work.")
|
|
|
|
|
print("You can install it with: pip install pyserial")
|
|
|
|
|
print("")
|
|
|
|
|
exit()
|
|
|
|
|
|
|
|
|
|
try:
|
|
|
|
|
imp.find_module("cryptography")
|
|
|
|
|
except ImportError:
|
|
|
|
|
print("")
|
|
|
|
|
print("RNode Config Utility needs the cryptography module to work.")
|
|
|
|
|
print("You can install it with: pip install cryptography")
|
|
|
|
|
print("")
|
|
|
|
|
exit()
|
|
|
|
|
|
|
|
|
|
import serial
|
|
|
|
|
|
|
|
|
|
try:
|
|
|
|
|
parser = argparse.ArgumentParser(description="RNode Configuration and firmware utility")
|
|
|
|
|
parser.add_argument("-i", "--info", action="store_true", help="Show device info")
|
|
|
|
|
parser.add_argument("-b", "--backup", action="store_true", help="Backup EEPROM to file")
|
|
|
|
|
parser.add_argument("-d", "--dump", action="store_true", help="Dump EEPROM to console")
|
|
|
|
|
parser.add_argument("-f", "--flash", action="store_true", help="Flash firmware and bootstrap EEPROM")
|
|
|
|
|
parser.add_argument("-r", "--rom", action="store_true", help="Bootstrap EEPROM without flashing firmware")
|
|
|
|
|
parser.add_argument("-u", "--update", action="store_true", help="Update firmware")
|
|
|
|
|
parser.add_argument("-k", "--key", action="store_true", help="Generate a new signing key and exit")
|
|
|
|
|
parser.add_argument("-p", "--public", action="store_true", help="Display public part of signing key")
|
|
|
|
|
parser.add_argument("--model", action="store", metavar="model", type=str, default=None, help="Model code for EEPROM bootstrap")
|
|
|
|
|
parser.add_argument("--hwrev", action="store", metavar="revision", type=int, default=None, help="Hardware revision EEPROM bootstrap")
|
|
|
|
|
|
|
|
|
|
parser.add_argument("port", nargs="?", default=None, help="serial port where RNode is attached", type=str)
|
|
|
|
|
args = parser.parse_args()
|
|
|
|
|
|
|
|
|
|
if args.public or args.key or args.flash or args.rom:
|
|
|
|
|
from cryptography.hazmat.primitives import hashes
|
|
|
|
|
from cryptography.hazmat.backends import default_backend
|
|
|
|
|
from cryptography.hazmat.primitives import serialization
|
|
|
|
|
from cryptography.hazmat.primitives.serialization import load_der_public_key
|
|
|
|
|
from cryptography.hazmat.primitives.serialization import load_der_private_key
|
|
|
|
|
from cryptography.hazmat.primitives.asymmetric import rsa
|
|
|
|
|
from cryptography.hazmat.primitives.asymmetric import padding
|
|
|
|
|
|
|
|
|
|
if args.public:
|
|
|
|
|
private_bytes = None
|
|
|
|
|
try:
|
|
|
|
|
file = open("./firmware/signing.key", "r")
|
|
|
|
|
private_bytes = file.read()
|
|
|
|
|
file.close()
|
|
|
|
|
except Exception as e:
|
|
|
|
|
RNS.log("Could not load signing key")
|
|
|
|
|
|
|
|
|
|
try:
|
|
|
|
|
private_key = serialization.load_der_private_key(
|
|
|
|
|
private_bytes,
|
|
|
|
|
password=None,
|
|
|
|
|
backend=default_backend()
|
|
|
|
|
)
|
|
|
|
|
public_key = private_key.public_key()
|
|
|
|
|
public_bytes = public_key.public_bytes(
|
|
|
|
|
encoding=serialization.Encoding.DER,
|
|
|
|
|
format=serialization.PublicFormat.SubjectPublicKeyInfo
|
|
|
|
|
)
|
|
|
|
|
RNS.log("Public key:")
|
|
|
|
|
RNS.log(RNS.hexrep(public_bytes, delimit=False))
|
|
|
|
|
except Exception as e:
|
|
|
|
|
RNS.log("Could not deserialize signing key")
|
|
|
|
|
RNS.log(str(e))
|
|
|
|
|
|
|
|
|
|
exit()
|
|
|
|
|
|
|
|
|
|
if args.key:
|
|
|
|
|
RNS.log("Generating a new signing key...")
|
|
|
|
|
private_key = rsa.generate_private_key(
|
|
|
|
|
public_exponent=65337,
|
|
|
|
|
key_size=1024,
|
|
|
|
|
backend=default_backend()
|
|
|
|
|
)
|
|
|
|
|
private_bytes = private_key.private_bytes(
|
|
|
|
|
encoding=serialization.Encoding.DER,
|
|
|
|
|
format=serialization.PrivateFormat.PKCS8,
|
|
|
|
|
encryption_algorithm=serialization.NoEncryption()
|
|
|
|
|
)
|
|
|
|
|
public_key = private_key.public_key()
|
|
|
|
|
public_bytes = public_key.public_bytes(
|
|
|
|
|
encoding=serialization.Encoding.DER,
|
|
|
|
|
format=serialization.PublicFormat.SubjectPublicKeyInfo
|
|
|
|
|
)
|
|
|
|
|
if os.path.isdir("./firmware"):
|
|
|
|
|
if os.path.isfile("./firmware/signing.key"):
|
|
|
|
|
RNS.log("Signing key already exists, not overwriting!")
|
|
|
|
|
RNS.log("Manually delete this key to create a new one.")
|
|
|
|
|
else:
|
|
|
|
|
file = open("./firmware/signing.key", "w")
|
|
|
|
|
file.write(private_bytes)
|
|
|
|
|
file.close()
|
|
|
|
|
|
|
|
|
|
RNS.log("Wrote signing key")
|
|
|
|
|
RNS.log("Public key:")
|
|
|
|
|
RNS.log(RNS.hexrep(public_bytes, delimit=False))
|
|
|
|
|
else:
|
|
|
|
|
RNS.log("The firmware directory does not exist, can't write key!")
|
|
|
|
|
|
|
|
|
|
exit()
|
|
|
|
|
|
|
|
|
|
if args.port:
|
|
|
|
|
if args.flash:
|
|
|
|
|
if os.path.isfile("./firmware/firmware.hex"):
|
|
|
|
|
try:
|
|
|
|
|
RNS.log("Flashing RNode firmware to device on "+args.port)
|
|
|
|
|
from subprocess import call
|
|
|
|
|
flash_status = call(["avrdude", "-P", args.port, "-p", "m1284p", "-c", "arduino", "-b", "115200", "-U", "flash:w:firmware/firmware.hex"])
|
|
|
|
|
if flash_status == 0:
|
|
|
|
|
RNS.log("Done flashing")
|
|
|
|
|
args.rom = True
|
|
|
|
|
else:
|
|
|
|
|
exit()
|
|
|
|
|
|
|
|
|
|
except Exception as e:
|
|
|
|
|
RNS.log("Error while flashing")
|
|
|
|
|
RNS.log(str(e))
|
|
|
|
|
else:
|
|
|
|
|
RNS.log("Firmware file not found")
|
|
|
|
|
exit()
|
|
|
|
|
|
|
|
|
|
RNS.log("Opening serial port "+args.port+"...")
|
|
|
|
|
try:
|
|
|
|
|
rnode_serial = serial.Serial(
|
|
|
|
|
port = args.port,
|
|
|
|
|
baudrate = rnode_baudrate,
|
|
|
|
|
bytesize = 8,
|
|
|
|
|
parity = serial.PARITY_NONE,
|
|
|
|
|
stopbits = 1,
|
|
|
|
|
xonxoff = False,
|
|
|
|
|
rtscts = False,
|
|
|
|
|
timeout = 0,
|
|
|
|
|
inter_byte_timeout = None,
|
|
|
|
|
write_timeout = None,
|
|
|
|
|
dsrdtr = False
|
|
|
|
|
)
|
|
|
|
|
except Exception as e:
|
|
|
|
|
RNS.log("Could not open the specified serial port. The contained exception was:")
|
|
|
|
|
RNS.log(str(e))
|
|
|
|
|
exit()
|
|
|
|
|
|
|
|
|
|
rnode = RNode(rnode_serial)
|
|
|
|
|
thread = threading.Thread(target=rnode.readLoop)
|
|
|
|
|
thread.setDaemon(True)
|
|
|
|
|
thread.start()
|
|
|
|
|
|
|
|
|
|
try:
|
|
|
|
|
device_probe()
|
|
|
|
|
except Exception as e:
|
|
|
|
|
RNS.log("Serial port opened, but RNode did not respond. Is a valid firmware installed?")
|
|
|
|
|
print(e)
|
|
|
|
|
exit()
|
|
|
|
|
|
|
|
|
|
RNS.log("Reading EEPROM...")
|
|
|
|
|
rnode.download_eeprom()
|
|
|
|
|
|
|
|
|
|
if args.dump:
|
|
|
|
|
RNS.log("EEPROM contents:")
|
|
|
|
|
RNS.log(RNS.hexrep(rnode.eeprom))
|
|
|
|
|
exit()
|
|
|
|
|
|
|
|
|
|
if args.backup:
|
|
|
|
|
try:
|
|
|
|
|
timestamp = time.time()
|
|
|
|
|
filename = str(time.strftime("%Y-%m-%d_%H-%M-%S"))
|
|
|
|
|
path = "./eeprom/"+filename+".eeprom"
|
|
|
|
|
file = open(path, "w")
|
|
|
|
|
file.write(rnode.eeprom)
|
|
|
|
|
file.close()
|
|
|
|
|
RNS.log("EEPROM backup written to: "+path)
|
|
|
|
|
except Exception as e:
|
|
|
|
|
RNS.log("EEPROM was successfully downloaded from device,")
|
|
|
|
|
RNS.log("but file could not be written to disk.")
|
|
|
|
|
exit()
|
|
|
|
|
|
|
|
|
|
if args.info:
|
|
|
|
|
if rnode.provisioned:
|
|
|
|
|
timestamp = struct.unpack(">I", rnode.made)[0]
|
|
|
|
|
timestring = datetime.datetime.fromtimestamp(timestamp).strftime("%Y-%m-%d %H:%M:%S")
|
|
|
|
|
sigstring = "Unverified"
|
|
|
|
|
if rnode.signature_valid:
|
|
|
|
|
sigstring = "Genuine board, vendor is "+rnode.vendor
|
|
|
|
|
|
|
|
|
|
RNS.log("")
|
|
|
|
|
RNS.log("Board info:")
|
|
|
|
|
RNS.log("\tFirmware version:\t"+rnode.version)
|
|
|
|
|
RNS.log("\tProduct code:\t\t"+RNS.hexrep(rnode.product))
|
|
|
|
|
RNS.log("\tModel code:\t\t"+RNS.hexrep(rnode.model))
|
|
|
|
|
RNS.log("\tHardware revision:\t"+RNS.hexrep(rnode.hw_rev))
|
|
|
|
|
RNS.log("\tSerial number:\t\t"+RNS.hexrep(rnode.serial))
|
|
|
|
|
RNS.log("\tManufactured:\t\t"+timestring)
|
|
|
|
|
RNS.log("\tDevice signature:\t"+sigstring)
|
|
|
|
|
print("")
|
|
|
|
|
exit()
|
|
|
|
|
|
|
|
|
|
else:
|
|
|
|
|
RNS.log("EEPROM is invalid, no further information available")
|
|
|
|
|
exit()
|
|
|
|
|
|
|
|
|
|
if args.rom:
|
|
|
|
|
if rnode.provisioned:
|
|
|
|
|
RNS.log("EEPROM bootstrap was requested, but a valid EEPROM was already present.")
|
|
|
|
|
RNS.log("No changes are being made.")
|
|
|
|
|
exit()
|
|
|
|
|
else:
|
|
|
|
|
counter = None
|
|
|
|
|
counter_path = "./firmware/serial.counter"
|
|
|
|
|
try:
|
|
|
|
|
if os.path.isfile(counter_path):
|
|
|
|
|
file = open(counter_path, "r")
|
|
|
|
|
counter_str = file.read()
|
|
|
|
|
counter = int(counter_str)
|
|
|
|
|
file.close()
|
|
|
|
|
else:
|
|
|
|
|
counter = 0
|
|
|
|
|
except Exception as e:
|
|
|
|
|
RNS.log("Could not create device serial number, exiting")
|
|
|
|
|
RNS.log(str(e))
|
|
|
|
|
exit()
|
|
|
|
|
|
|
|
|
|
serialno = counter+1
|
|
|
|
|
model = None
|
|
|
|
|
hwrev = None
|
|
|
|
|
if args.model == "a4":
|
|
|
|
|
model = ROM.MODEL_A4
|
|
|
|
|
if args.model == "a9":
|
|
|
|
|
model = ROM.MODEL_A9
|
|
|
|
|
if args.hwrev > 0 and args.hwrev < 256:
|
|
|
|
|
hwrev = chr(args.hwrev)
|
|
|
|
|
|
|
|
|
|
if serialno > 0 and model != None and hwrev != None:
|
|
|
|
|
try:
|
|
|
|
|
from cryptography.hazmat.primitives import hashes
|
|
|
|
|
from cryptography.hazmat.backends import default_backend
|
|
|
|
|
|
|
|
|
|
timestamp = int(time.time())
|
|
|
|
|
time_bytes = struct.pack(">I", timestamp)
|
|
|
|
|
serial_bytes = struct.pack(">I", serialno)
|
|
|
|
|
file = open(counter_path, "w")
|
|
|
|
|
file.write(str(serialno))
|
|
|
|
|
file.close()
|
|
|
|
|
|
|
|
|
|
info_chunk = ROM.PRODUCT_RNODE+model+hwrev+serial_bytes+time_bytes
|
|
|
|
|
digest = hashes.Hash(hashes.MD5(), backend=default_backend())
|
|
|
|
|
digest.update(info_chunk)
|
|
|
|
|
checksum = digest.finalize()
|
|
|
|
|
|
|
|
|
|
RNS.log("Loading signing key...")
|
|
|
|
|
signature = None
|
|
|
|
|
key_path = "./firmware/signing.key"
|
|
|
|
|
if os.path.isfile(key_path):
|
|
|
|
|
try:
|
|
|
|
|
file = open(key_path, "r")
|
|
|
|
|
private_bytes = file.read()
|
|
|
|
|
file.close()
|
|
|
|
|
private_key = serialization.load_der_private_key(
|
|
|
|
|
private_bytes,
|
|
|
|
|
password=None,
|
|
|
|
|
backend=default_backend()
|
|
|
|
|
)
|
|
|
|
|
public_key = private_key.public_key()
|
|
|
|
|
public_bytes = public_key.public_bytes(
|
|
|
|
|
encoding=serialization.Encoding.DER,
|
|
|
|
|
format=serialization.PublicFormat.SubjectPublicKeyInfo
|
|
|
|
|
)
|
|
|
|
|
signature = private_key.sign(
|
|
|
|
|
checksum,
|
|
|
|
|
padding.PSS(
|
|
|
|
|
mgf=padding.MGF1(hashes.SHA256()),
|
|
|
|
|
salt_length=padding.PSS.MAX_LENGTH
|
|
|
|
|
),
|
|
|
|
|
hashes.SHA256()
|
|
|
|
|
)
|
|
|
|
|
except Exception as e:
|
|
|
|
|
RNS.log("Error while signing EEPROM")
|
|
|
|
|
RNS.log(str(e))
|
|
|
|
|
else:
|
|
|
|
|
RNS.log("No signing key found")
|
|
|
|
|
exit()
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
RNS.log("Bootstrapping device EEPROM...")
|
|
|
|
|
|
|
|
|
|
rnode.write_eeprom(ROM.ADDR_PRODUCT, ROM.PRODUCT_RNODE)
|
|
|
|
|
time.sleep(0.006)
|
|
|
|
|
rnode.write_eeprom(ROM.ADDR_MODEL, model)
|
|
|
|
|
time.sleep(0.006)
|
|
|
|
|
rnode.write_eeprom(ROM.ADDR_HW_REV, hwrev)
|
|
|
|
|
time.sleep(0.006)
|
|
|
|
|
rnode.write_eeprom(ROM.ADDR_SERIAL, serial_bytes[0])
|
|
|
|
|
time.sleep(0.006)
|
|
|
|
|
rnode.write_eeprom(chr(ord(ROM.ADDR_SERIAL)+1), serial_bytes[1])
|
|
|
|
|
time.sleep(0.006)
|
|
|
|
|
rnode.write_eeprom(chr(ord(ROM.ADDR_SERIAL)+2), serial_bytes[2])
|
|
|
|
|
time.sleep(0.006)
|
|
|
|
|
rnode.write_eeprom(chr(ord(ROM.ADDR_SERIAL)+3), serial_bytes[3])
|
|
|
|
|
time.sleep(0.006)
|
|
|
|
|
rnode.write_eeprom(ROM.ADDR_MADE, time_bytes[0])
|
|
|
|
|
time.sleep(0.006)
|
|
|
|
|
rnode.write_eeprom(chr(ord(ROM.ADDR_MADE)+1), time_bytes[1])
|
|
|
|
|
time.sleep(0.006)
|
|
|
|
|
rnode.write_eeprom(chr(ord(ROM.ADDR_MADE)+2), time_bytes[2])
|
|
|
|
|
time.sleep(0.006)
|
|
|
|
|
rnode.write_eeprom(chr(ord(ROM.ADDR_MADE)+3), time_bytes[3])
|
|
|
|
|
time.sleep(0.006)
|
|
|
|
|
|
|
|
|
|
for i in range(0,16):
|
|
|
|
|
rnode.write_eeprom(chr(ord(ROM.ADDR_CHKSUM)+i), checksum[i])
|
|
|
|
|
time.sleep(0.006)
|
|
|
|
|
|
|
|
|
|
for i in range(0,128):
|
|
|
|
|
rnode.write_eeprom(chr(ord(ROM.ADDR_SIGNATURE)+i), signature[i])
|
|
|
|
|
time.sleep(0.006)
|
|
|
|
|
|
|
|
|
|
rnode.write_eeprom(ROM.ADDR_INFO_LOCK, ROM.INFO_LOCK_BYTE)
|
|
|
|
|
|
|
|
|
|
RNS.log("EEPROM written! Validating...")
|
|
|
|
|
rnode.download_eeprom()
|
|
|
|
|
if rnode.provisioned:
|
|
|
|
|
RNS.log("EEPROM Bootstrapping successful!")
|
|
|
|
|
exit()
|
|
|
|
|
else:
|
|
|
|
|
RNS.log("EEPROM was written, but validation failed. Check your settings.")
|
|
|
|
|
exit()
|
|
|
|
|
except Exception as e:
|
|
|
|
|
RNS.log("An error occured while writing EEPROM. The contained exception was:")
|
|
|
|
|
RNS.log(str(e))
|
|
|
|
|
|
|
|
|
|
else:
|
|
|
|
|
RNS.log("Invalid data specified, cancelling EEPROM write")
|
|
|
|
|
exit()
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
if rnode.provisioned:
|
|
|
|
|
config_interface()
|
|
|
|
|
else:
|
|
|
|
|
RNS.log("This device contains a valid firmware, but EEPROM is invalid.")
|
|
|
|
|
RNS.log("Probably the device has not been initialised, or the EEPROM has been erased.")
|
|
|
|
|
RNS.log("Please correctly initialise the device and try again!")
|
|
|
|
|
|
|
|
|
|
else:
|
|
|
|
|
print("")
|
|
|
|
|
parser.print_help()
|
|
|
|
|
print("")
|
|
|
|
|
exit()
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
except KeyboardInterrupt:
|
|
|
|
|
print("")
|
|
|
|
|
exit()
|