mirror of
https://github.com/ferrous-systems/embedded-trainings-2020.git
synced 2024-06-10 09:29:26 +00:00
98 lines
2.5 KiB
Rust
98 lines
2.5 KiB
Rust
|
#![deny(unused_must_use)]
|
||
|
#![no_main]
|
||
|
#![no_std]
|
||
|
|
||
|
use core::str;
|
||
|
|
||
|
use cortex_m_rt::entry;
|
||
|
use dk::ieee802154::{Channel, Packet};
|
||
|
use heapless::{consts, LinearMap, Vec};
|
||
|
use panic_log as _; // the panicking behavior
|
||
|
|
||
|
const TEN_MS: u32 = 10_000;
|
||
|
|
||
|
#[entry]
|
||
|
fn main() -> ! {
|
||
|
let board = dk::init().unwrap();
|
||
|
let mut radio = board.radio;
|
||
|
let mut timer = board.timer;
|
||
|
|
||
|
/* # Build a dictionary */
|
||
|
// TODO increase capacity
|
||
|
let mut dict = LinearMap::<u8, u8, consts::U2>::new();
|
||
|
|
||
|
// puzzle.hex uses channel 25
|
||
|
radio.set_channel(Channel::_25);
|
||
|
|
||
|
let mut packet = Packet::new();
|
||
|
// TODO do the whole ASCII range [0, 127]
|
||
|
for source in b'A'..=b'B' {
|
||
|
packet.copy_from_slice(&[source]);
|
||
|
|
||
|
radio.send(&packet);
|
||
|
|
||
|
if radio.recv_timeout(&mut packet, &mut timer, TEN_MS).is_ok() {
|
||
|
// response should be one byte large
|
||
|
if packet.len() == 1 {
|
||
|
let destination = packet[0];
|
||
|
|
||
|
// TODO insert the key-value pair
|
||
|
// dict.insert(/* ? */, /* ? */).expect("dictionary full");
|
||
|
} else {
|
||
|
log::error!("response packet was not a single byte");
|
||
|
dk::exit()
|
||
|
}
|
||
|
} else {
|
||
|
log::error!("no response or response packet was corrupted");
|
||
|
dk::exit()
|
||
|
}
|
||
|
}
|
||
|
|
||
|
/* # Retrieve the secret string */
|
||
|
packet.copy_from_slice(&[]); // empty packet
|
||
|
radio.send(&packet);
|
||
|
|
||
|
if radio.recv_timeout(&mut packet, &mut timer, TEN_MS).is_err() {
|
||
|
log::error!("no response or response packet was corrupted");
|
||
|
dk::exit()
|
||
|
}
|
||
|
|
||
|
log::info!(
|
||
|
"ciphertext: {}",
|
||
|
str::from_utf8(&packet).expect("packet was not valid UTF-8")
|
||
|
);
|
||
|
|
||
|
/* # Decrypt the string */
|
||
|
let mut buffer = Vec::<u8, consts::U128>::new();
|
||
|
|
||
|
// iterate over the bytes
|
||
|
for byte in packet.iter() {
|
||
|
// NOTE this should map from the encrypted letter to the plaintext letter
|
||
|
let key = byte;
|
||
|
let value = dict[key];
|
||
|
buffer.push(value).expect("buffer full");
|
||
|
}
|
||
|
|
||
|
log::info!(
|
||
|
"plaintext: {}",
|
||
|
str::from_utf8(&buffer).expect("buffer contains non-UTF-8 data")
|
||
|
);
|
||
|
|
||
|
/* # Verify decrypted text */
|
||
|
packet.copy_from_slice(&buffer);
|
||
|
|
||
|
radio.send(&packet);
|
||
|
|
||
|
if radio.recv_timeout(&mut packet, &mut timer, TEN_MS).is_err() {
|
||
|
log::error!("no response or response packet was corrupted");
|
||
|
dk::exit()
|
||
|
}
|
||
|
|
||
|
log::info!(
|
||
|
"Dongle response: {}",
|
||
|
str::from_utf8(&packet).expect("response was not UTF-8")
|
||
|
);
|
||
|
|
||
|
dk::exit()
|
||
|
}
|