]> sigrok.org Git - libsigrokdecode.git/blame - decoders/pan1321/pd.py
s/out_proto/out_python/.
[libsigrokdecode.git] / decoders / pan1321 / pd.py
CommitLineData
5cc2d7bb 1##
50bd5d25 2## This file is part of the libsigrokdecode project.
5cc2d7bb 3##
5b2b0b0d 4## Copyright (C) 2012-2013 Uwe Hermann <uwe@hermann-uwe.de>
5cc2d7bb
UH
5##
6## This program is free software; you can redistribute it and/or modify
7## it under the terms of the GNU General Public License as published by
8## the Free Software Foundation; either version 2 of the License, or
9## (at your option) any later version.
10##
11## This program is distributed in the hope that it will be useful,
12## but WITHOUT ANY WARRANTY; without even the implied warranty of
13## MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14## GNU General Public License for more details.
15##
16## You should have received a copy of the GNU General Public License
17## along with this program; if not, write to the Free Software
18## Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
19##
20
677d597b 21import sigrokdecode as srd
5cc2d7bb 22
d9c0d0a3
UH
23# ...
24RX = 0
25TX = 1
26
677d597b 27class Decoder(srd.Decoder):
a2c2afd9 28 api_version = 1
5cc2d7bb 29 id = 'pan1321'
3d3da57d
UH
30 name = 'PAN1321'
31 longname = 'Panasonic PAN1321'
a465436e 32 desc = 'Bluetooth RF module with Serial Port Profile (SPP).'
5cc2d7bb
UH
33 license = 'gplv2+'
34 inputs = ['uart']
35 outputs = ['pan1321']
9a12a6e7 36 probes = []
b77614bc 37 optional_probes = []
9a12a6e7 38 options = {}
e97b6ef5 39 annotations = [
9f2f42c0
UH
40 ['text-verbose', 'Human-readable text (verbose)'],
41 ['text', 'Human-readable text'],
42 ['warnings', 'Human-readable warnings'],
5cc2d7bb
UH
43 ]
44
45 def __init__(self, **kwargs):
5dd1c937 46 self.cmd = ['', '']
f9b0356b 47 self.ss_block = None
5cc2d7bb 48
8915b346 49 def start(self):
c515eed7 50 # self.out_python = self.register(srd.OUTPUT_PYTHON)
be465111 51 self.out_ann = self.register(srd.OUTPUT_ANN)
5cc2d7bb 52
f9b0356b
UH
53 def putx(self, data):
54 self.put(self.ss_block, self.es_block, self.out_ann, data)
55
56 def handle_host_command(self, rxtx, s):
2d3f496e 57 if s.startswith('AT+JAAC'):
84f33bc7 58 # AT+JAAC=<auto_accept> (0 or 1)
2d3f496e
UH
59 p = s[s.find('=') + 1:]
60 if p not in ('0', '1'):
61 self.putx([2, ['Warning: Invalid JAAC parameter "%s"' % p]])
62 return
63 x = 'Auto' if (p == '1') else 'Don\'t auto'
64 self.putx([0, ['%s-accept new connections' % x]])
65 self.putx([1, ['%s-accept connections' % x]])
66 elif s.startswith('AT+JPRO'):
84f33bc7 67 # AT+JPRO=<mode> (0 or 1)
5b2b0b0d 68 p = s[s.find('=') + 1:]
6bbd2a8a
UH
69 if p not in ('0', '1'):
70 self.putx([2, ['Warning: Invalid JPRO parameter "%s"' % p]])
6bbd2a8a 71 return
5b2b0b0d
UH
72 onoff = 'off' if (p == '0') else 'on'
73 x = 'Leaving' if (p == '0') else 'Entering'
74 self.putx([0, ['%s production mode' % x]])
75 self.putx([1, ['Production mode = %s' % onoff]])
76 elif s.startswith('AT+JRES'):
84f33bc7 77 # AT+JRES
6bbd2a8a
UH
78 if s != 'AT+JRES': # JRES has no params.
79 self.putx([2, ['Warning: Invalid JRES usage.']])
6bbd2a8a 80 return
5b2b0b0d
UH
81 self.putx([0, ['Triggering a software reset']])
82 self.putx([1, ['Reset']])
b1f2d25f 83 elif s.startswith('AT+JSDA'):
84f33bc7
UH
84 # AT+JSDA=<l>,<d> (l: length in bytes, d: data)
85 # l is (max?) 3 decimal digits and ranges from 1 to MTU size.
86 # Data can be ASCII or binary values (l bytes total).
b1f2d25f
UH
87 l, d = s[s.find('=') + 1:].split(',')
88 if not l.isnumeric():
89 self.putx([2, ['Warning: Invalid data length "%s".' % l]])
90 if int(l) != len(d):
91 self.putx([2, ['Warning: Data length mismatch (%d != %d).' % \
92 (int(l), len(d))]])
84f33bc7
UH
93 # TODO: Warn if length > MTU size (which is firmware-dependent
94 # and is negotiated by both Bluetooth devices upon connection).
b1f2d25f
UH
95 b = ''.join(['%02x ' % ord(c) for c in d])[:-1]
96 self.putx([0, ['Sending %d data bytes: %s' % (int(l), b)]])
97 self.putx([1, ['Send %d = %s' % (int(l), b)]])
5b2b0b0d 98 elif s.startswith('AT+JSEC'):
84f33bc7
UH
99 # AT+JSEC=<secmode>,<linkkey_info>,<pintype>,<pinlen>,<pin>
100 # secmode: Security mode 1 or 3 (default).
101 # linkkey_info: Must be 1 or 2. Has no function according to docs.
102 # pintype: 1: variable pin (default), 2: fixed pin.
103 # pinlen: PIN length (2 decimal digits). Max. PIN length is 16.
104 # pin: The Bluetooth PIN ('pinlen' chars). Used if pintype=2.
105 # Note: AT+JSEC (if used) must be the first command after reset.
106 # TODO: Parse all the other parameters.
fd4aa8aa 107 pin = s[-4:]
5b2b0b0d 108 self.putx([0, ['Host set the Bluetooth PIN to "' + pin + '"']])
e1f5df5b 109 self.putx([1, ['PIN = ' + pin]])
5dd1c937 110 elif s.startswith('AT+JSLN'):
84f33bc7
UH
111 # AT+JSLN=<namelen>,<name>
112 # namelen: Friendly name length (2 decimal digits). Max. len is 18.
113 # name: The Bluetooth "friendly name" ('namelen' ASCII characters).
fd4aa8aa 114 name = s[s.find(',') + 1:]
5b2b0b0d 115 self.putx([0, ['Host set the Bluetooth name to "' + name + '"']])
e1f5df5b 116 self.putx([1, ['BT name = ' + name]])
5dd1c937 117 else:
f9b0356b 118 self.putx([0, ['Host sent unsupported command: %s' % s]])
e1f5df5b 119 self.putx([1, ['Unsupported command: %s' % s]])
5dd1c937 120
f9b0356b 121 def handle_device_reply(self, rxtx, s):
fd4aa8aa 122 if s == 'ROK':
f9b0356b 123 self.putx([0, ['Device initialized correctly']])
e1f5df5b 124 self.putx([1, ['Init']])
fd4aa8aa 125 elif s == 'OK':
f9b0356b 126 self.putx([0, ['Device acknowledged last command']])
e1f5df5b 127 self.putx([1, ['ACK']])
5dd1c937
UH
128 elif s.startswith('ERR'):
129 error = s[s.find('=') + 1:]
f9b0356b 130 self.putx([0, ['Device sent error code ' + error]])
e1f5df5b 131 self.putx([1, ['ERR = ' + error]])
5dd1c937 132 else:
f9b0356b 133 self.putx([0, ['Device sent an unknown reply: %s' % s]])
e1f5df5b 134 self.putx([1, ['Unknown reply: %s' % s]])
5dd1c937 135
5cc2d7bb 136 def decode(self, ss, es, data):
d9c0d0a3 137 ptype, rxtx, pdata = data
5cc2d7bb
UH
138
139 # For now, ignore all UART packets except the actual data packets.
b9e44d1e 140 if ptype != 'DATA':
5cc2d7bb
UH
141 return
142
f9b0356b
UH
143 # If this is the start of a command/reply, remember the start sample.
144 if self.cmd[rxtx] == '':
145 self.ss_block = ss
146
5dd1c937
UH
147 # Append a new (ASCII) byte to the currently built/parsed command.
148 self.cmd[rxtx] += chr(pdata)
5cc2d7bb
UH
149
150 # Get packets/bytes until an \r\n sequence is found (end of command).
72a6cad4 151 if self.cmd[rxtx][-2:] != '\r\n':
5cc2d7bb
UH
152 return
153
5dd1c937 154 # Handle host commands and device replies.
fd4aa8aa 155 # We remove trailing \r\n from the strings before handling them.
db9ebbc2 156 self.es_block = es
5dd1c937 157 if rxtx == RX:
f9b0356b 158 self.handle_device_reply(rxtx, self.cmd[rxtx][:-2])
5dd1c937 159 elif rxtx == TX:
f9b0356b 160 self.handle_host_command(rxtx, self.cmd[rxtx][:-2])
5cc2d7bb 161 else:
decde15e 162 raise Exception('Invalid rxtx value: %d' % rxtx)
5cc2d7bb 163
db9ebbc2
UH
164 self.cmd[rxtx] = ''
165