added rpi pico code and base pc code

This commit is contained in:
Angoosh Leviocki 2023-09-26 21:50:54 +02:00
parent 81a92d8c5d
commit 6a5b730f81
Signed by: angoosh
GPG Key ID: 1CCB948F5CBF1995
3 changed files with 631 additions and 0 deletions

33
SW/PC/main.py Normal file
View File

@ -0,0 +1,33 @@
import serial
def main():
s = serial.Serial(port="/dev/ttyACM0", parity=serial.PARITY_EVEN, stopbits=serial.STOPBITS_ONE, timeout=1)
s.flush()
rw = input('Read or Write tags? [R/w]')
rw = rw.lower()
if rw == 'w':
s.write('w'.encode())
while True:
data = input('ID:')
s.write(data.encode())
elif rw == 'r':
s.write('r\r'.encode())
while True:
mes = s.read_until(b'\r')
print(mes.decode())
elif rw == '':
s.write('r\r'.encode())
while True:
mes = s.read_until(b'\r')
if mes != '':
print(mes.decode())
else:
print('Invalid option')
if __name__ == "__main__":
main()

409
SW/RPi_Pico/NFC_PN532.py Normal file
View File

@ -0,0 +1,409 @@
# @Author: carlosgilgonzalez
# @Date: 2019-10-15T16:13:47+01:00
# @Last modified by: carlosgilgonzalez
# @Last modified time: 2019-10-15T16:56:27+01:00
# Original work:
# Adafruit PN532 NFC/RFID control library.
# Author: Tony DiCola
# Partial Port to Micropython:
# Micropython PN532 NFC/RFID control library.
# Author: Carlos Gil Gonzalez
"""
Micropython PN532 NFC/RFID control library (SPI)
https://github.com/Carglglz/NFC_PN532_SPI
"""
import time
from machine import Pin
from micropython import const
# __version__ = "0.0.0-auto.0"
# __repo__ = "https://github.com/adafruit/Adafruit_CircuitPython_PN532.git"
# pylint: disable=bad-whitespace
_PREAMBLE = const(0x00)
_STARTCODE1 = const(0x00)
_STARTCODE2 = const(0xFF)
_POSTAMBLE = const(0x00)
_HOSTTOPN532 = const(0xD4)
_PN532TOHOST = const(0xD5)
# PN532 Commands
_COMMAND_DIAGNOSE = const(0x00)
_COMMAND_GETFIRMWAREVERSION = const(0x02)
_COMMAND_GETGENERALSTATUS = const(0x04)
_COMMAND_SETSERIALBAUDRATE = const(0x10)
_COMMAND_SETPARAMETERS = const(0x12)
_COMMAND_SAMCONFIGURATION = const(0x14)
_COMMAND_INLISTPASSIVETARGET = const(0x4A)
_COMMAND_INDATAEXCHANGE = const(0x40)
_COMMAND_INCOMMUNICATETHRU = const(0x42)
_RESPONSE_INDATAEXCHANGE = const(0x41)
_RESPONSE_INLISTPASSIVETARGET = const(0x4B)
_WAKEUP = const(0x55)
_MIFARE_ISO14443A = const(0x00)
# Mifare Commands
MIFARE_CMD_AUTH_A = const(0x60)
MIFARE_CMD_AUTH_B = const(0x61)
MIFARE_CMD_READ = const(0x30)
MIFARE_CMD_WRITE = const(0xA0)
MIFARE_ULTRALIGHT_CMD_WRITE = const(0xA2)
# Known keys
KEY_DEFAULT_B = bytes([0xFF]*6)
_ACK = b'\x00\x00\xFF\x00\xFF\x00'
_FRAME_START = b'\x00\x00\xFF'
# pylint: enable=bad-whitespace
_SPI_STATREAD = const(0x02)
_SPI_DATAWRITE = const(0x01)
_SPI_DATAREAD = const(0x03)
_SPI_READY = const(0x01)
def _reset(pin):
"""Perform a hardware reset toggle"""
pin.init(Pin.OUT)
pin.value(True)
time.sleep(0.1)
pin.value(False)
time.sleep(0.5)
pin.value(True)
time.sleep(0.1)
class BusyError(Exception):
"""Base class for exceptions in this module."""
pass
def reverse_bit(num):
"""Turn an LSB byte to an MSB byte, and vice versa. Used for SPI as
it is LSB for the PN532, but 99% of SPI implementations are MSB only!"""
result = 0
for _ in range(8):
result <<= 1
result += (num & 1)
num >>= 1
return result
class PN532:
"""Driver for the PN532 connected over SPI. Pass in a hardware or bitbang
SPI device & chip select digitalInOut pin. Optional IRQ pin (not used),
reset pin and debugging output."""
def __init__(self, spi, cs_pin, irq=None, reset=None, debug=False):
"""Create an instance of the PN532 class using SPI"""
self.debug = debug
self._irq = irq
self.CSB = cs_pin
self._spi = spi
self.CSB.on()
if reset:
if debug:
print("Resetting")
_reset(reset)
try:
self._wakeup()
# self.get_firmware_version() # first time often fails, try 2ce
return
except (BusyError, RuntimeError):
pass
# self.get_firmware_version()
def _wakeup(self):
"""Send any special commands/data to wake up PN532"""
time.sleep(1)
self.CSB.off()
time.sleep_ms(2)
self._spi.write(bytearray([0x00]))
time.sleep_ms(2)
self.CSB.on() # pylint: disable=no-member
time.sleep(1)
def _wait_ready(self, timeout=1000):
"""Poll PN532 if status byte is ready, up to `timeout` milliseconds"""
status_query = bytearray([reverse_bit(_SPI_STATREAD), 0])
status = bytearray([0, 0])
timestamp = time.ticks_ms()
while time.ticks_diff(time.ticks_ms(), timestamp) < timeout:
time.sleep(0.02) # required
self.CSB.off()
time.sleep_ms(2)
self._spi.write_readinto(status_query, status)
time.sleep_ms(2)
self.CSB.on()
if reverse_bit(status[1]) == 0x01: # LSB data is read in MSB
return True # Not busy anymore!
else:
time.sleep(0.01) # pause a bit till we ask again
# Timed out!
return False
def _read_data(self, count):
"""Read a specified count of bytes from the PN532."""
# Build a read request frame.
frame = bytearray(count+1)
# Add the SPI data read signal byte, but LSB'ify it
frame[0] = reverse_bit(_SPI_DATAREAD)
time.sleep(0.02) # required
self.CSB.off()
time.sleep_ms(2)
self._spi.write_readinto(frame, frame)
time.sleep_ms(2)
self.CSB.on()
for i, val in enumerate(frame):
frame[i] = reverse_bit(val) # turn LSB data to MSB
if self.debug:
print("DEBUG: _read_data: ", [hex(i) for i in frame[1:]])
return frame[1:] # don't return the status byte
def _write_data(self, framebytes):
"""Write a specified count of bytes to the PN532"""
# start by making a frame with data write in front,
# then rest of bytes, and LSBify it
rev_frame = [reverse_bit(x)
for x in bytes([_SPI_DATAWRITE]) + framebytes]
if self.debug:
print("DEBUG: _write_data: ", [hex(i) for i in rev_frame])
time.sleep(0.02) # required
self.CSB.off()
time.sleep_ms(2)
self._spi.write(bytes(rev_frame)) # pylint: disable=no-member
time.sleep_ms(2)
self.CSB.on()
def _write_frame(self, data):
"""Write a frame to the PN532 with the specified data bytearray."""
assert data is not None and 1 < len(
data) < 255, 'Data must be array of 1 to 255 bytes.'
# Build frame to send as:
# - Preamble (0x00)
# - Start code (0x00, 0xFF)
# - Command length (1 byte)
# - Command length checksum
# - Command bytes
# - Checksum
# - Postamble (0x00)
length = len(data)
frame = bytearray(length+8)
frame[0] = _PREAMBLE
frame[1] = _STARTCODE1
frame[2] = _STARTCODE2
checksum = sum(frame[0:3])
frame[3] = length & 0xFF
frame[4] = (~length + 1) & 0xFF
frame[5:-2] = data
checksum += sum(data)
frame[-2] = ~checksum & 0xFF
frame[-1] = _POSTAMBLE
# Send frame.
if self.debug:
print('DEBUG: _write_frame: ', [hex(i) for i in frame])
self._write_data(bytes(frame))
def _read_frame(self, length):
"""Read a response frame from the PN532 of at most length bytes in size.
Returns the data inside the frame if found, otherwise raises an exception
if there is an error parsing the frame. Note that less than length bytes
might be returned!
"""
# Read frame with expected length of data.
response = self._read_data(length+8)
if self.debug:
print('DEBUG: _read_frame:', [hex(i) for i in response])
# Swallow all the 0x00 values that preceed 0xFF.
offset = 0
while response[offset] == 0x00:
offset += 1
if offset >= len(response):
raise RuntimeError(
'Response frame preamble does not contain 0x00FF!')
if response[offset] != 0xFF:
raise RuntimeError(
'Response frame preamble does not contain 0x00FF!')
offset += 1
if offset >= len(response):
raise RuntimeError('Response contains no data!')
# Check length & length checksum match.
frame_len = response[offset]
if (frame_len + response[offset+1]) & 0xFF != 0:
raise RuntimeError(
'Response length checksum did not match length!')
# Check frame checksum value matches bytes.
checksum = sum(response[offset+2:offset+2+frame_len+1]) & 0xFF
if checksum != 0:
raise RuntimeError(
'Response checksum did not match expected value: ', checksum)
# Return frame data.
return response[offset+2:offset+2+frame_len]
def call_function(self, command, response_length=0, params=[], timeout=1000): # pylint: disable=dangerous-default-value
"""Send specified command to the PN532 and expect up to response_length
bytes back in a response. Note that less than the expected bytes might
be returned! Params can optionally specify an array of bytes to send as
parameters to the function call. Will wait up to timeout seconds
for a response and return a bytearray of response bytes, or None if no
response is available within the timeout.
"""
# Build frame data with command and parameters.
data = bytearray(2+len(params))
data[0] = _HOSTTOPN532
data[1] = command & 0xFF
for i, val in enumerate(params):
data[2+i] = val
# Send frame and wait for response.
try:
self._write_frame(data)
except OSError:
self._wakeup()
return None
if not self._wait_ready(timeout):
if(self.debug):
print('DEBUG: _wait_ready timed out waiting for ACK')
return None
# Verify ACK response and wait to be ready for function response.
if not _ACK == self._read_data(len(_ACK)):
raise RuntimeError('Did not receive expected ACK from PN532!')
if not self._wait_ready(timeout):
if(self.debug):
print('DEBUG: _wait_ready timed out waiting for response')
return None
# Read response bytes.
response = self._read_frame(response_length+2)
if(self.debug):
print('DEBUG: call_function response:', [hex(i) for i in response])
# Check that response is for the called function.
if not (response[0] == _PN532TOHOST and response[1] == (command+1)):
raise RuntimeError('Received unexpected command response!')
# Return response data.
return response[2:]
def get_firmware_version(self):
"""Call PN532 GetFirmwareVersion function and return a tuple with the IC,
Ver, Rev, and Support values.
"""
response = self.call_function(
_COMMAND_GETFIRMWAREVERSION, 4, timeout=500)
if response is None:
raise RuntimeError('Failed to detect the PN532')
return tuple(response)
def SAM_configuration(self): # pylint: disable=invalid-name
"""Configure the PN532 to read MiFare cards."""
# Send SAM configuration command with configuration for:
# - 0x01, normal mode
# - 0x14, timeout 50ms * 20 = 1 second
# - 0x01, use IRQ pin
# Note that no other verification is necessary as call_function will
# check the command was executed as expected.
self.call_function(_COMMAND_SAMCONFIGURATION,
params=[0x01, 0x14, 0x01])
def read_passive_target(self, card_baud=_MIFARE_ISO14443A, timeout=1000):
"""Wait for a MiFare card to be available and return its UID when found.
Will wait up to timeout seconds and return None if no card is found,
otherwise a bytearray with the UID of the found card is returned.
"""
# Send passive read command for 1 card. Expect at most a 7 byte UUID.
try:
response = self.call_function(_COMMAND_INLISTPASSIVETARGET,
params=[0x01, card_baud],
response_length=19,
timeout=timeout)
except BusyError:
return None # no card found!
# If no response is available return None to indicate no card is present.
if response is None:
return None
# Check only 1 card with up to a 7 byte UID is present.
if response[0] != 0x01:
raise RuntimeError('More than one card detected!')
if response[5] > 7:
raise RuntimeError('Found card with unexpectedly long UID!')
# Return UID of card.
return response[6:6+response[5]]
def ntag2xx_write_block(self, block_number, data):
"""Write a block of data to the card. Block number should be the block
to write and data should be a byte array of length 4 with the data to
write. If the data is successfully written then True is returned,
otherwise False is returned.
"""
assert data is not None and len(
data) == 4, 'Data must be an array of 4 bytes!'
# Build parameters for InDataExchange command to do NTAG203 classic write.
params = bytearray(3+len(data))
params[0] = 0x01 # Max card numbers
params[1] = MIFARE_ULTRALIGHT_CMD_WRITE
params[2] = block_number & 0xFF
params[3:] = data
# Send InDataExchange request.
response = self.call_function(_COMMAND_INDATAEXCHANGE,
params=params,
response_length=1)
return response[0] == 0x00
def ntag2xx_read_block(self, block_number):
"""Read a block of data from the card. Block number should be the block
to read. If the block is successfully read a bytearray of length 16 with
data starting at the specified block will be returned. If the block is
not read then None will be returned.
"""
return self.mifare_classic_read_block(block_number)[0:4] # only 4 bytes per page
def mifare_classic_read_block(self, block_number):
"""Read a block of data from the card. Block number should be the block
to read. If the block is successfully read a bytearray of length 16 with
data starting at the specified block will be returned. If the block is
not read then None will be returned.
"""
# Send InDataExchange request to read block of MiFare data.
response = self.call_function(_COMMAND_INDATAEXCHANGE,
params=[0x01, MIFARE_CMD_READ,
block_number & 0xFF],
response_length=17)
# Check first response is 0x00 to show success.
if response[0] != 0x00:
return None
# Return first 4 bytes since 16 bytes are always returned.
return response[1:]
def mifare_classic_authenticate_block(self, uid, block_number, key_number=MIFARE_CMD_AUTH_B, key=KEY_DEFAULT_B): # pylint: disable=invalid-name
"""Authenticate specified block number for a MiFare classic card. Uid
should be a byte array with the UID of the card, block number should be
the block to authenticate, key number should be the key type (like
MIFARE_CMD_AUTH_A or MIFARE_CMD_AUTH_B), and key should be a byte array
with the key data. Returns True if the block was authenticated, or False
if not authenticated.
"""
# Build parameters for InDataExchange command to authenticate MiFare card.
uidlen = len(uid)
keylen = len(key)
params = bytearray(3 + uidlen + keylen)
params[0] = 0x01 # Max card numbers
params[1] = key_number & 0xFF
params[2] = block_number & 0xFF
params[3 : 3 + keylen] = key
params[3 + keylen :] = uid
# Send InDataExchange request and verify response is 0x00.
response = self.call_function(
_COMMAND_INDATAEXCHANGE, params=params, response_length=1
)
return response[0] == 0x00

189
SW/RPi_Pico/main.py Normal file
View File

@ -0,0 +1,189 @@
import NFC_PN532 as nfc
import neopixel
import time
import sys
import select
from machine import Pin, SPI
#neopixel
ws_pin = 0
led_num = 8
BRIGHTNESS = 0.2 # Adjust the brightness (0.0 - 1.0)
led_strip = neopixel.NeoPixel(Pin(ws_pin), led_num)
# SPI
spi_dev = SPI(0, baudrate=1000000)
cs = Pin(17, Pin.OUT)
cs.on()
# SENSOR INIT
pn532 = nfc.PN532(spi_dev,cs)
ic, ver, rev, support = pn532.get_firmware_version()
print('Found PN532 with firmware version: {0}.{1}'.format(ver, rev))
# Configure PN532 to communicate with MiFare cards
pn532.SAM_configuration()
# FUNCTION TO READ NFC
def read_nfc(dev, tmot):
"""Accepts a device and a timeout in millisecs """
print('Reading...')
uid = dev.read_passive_target(timeout=tmot)
if uid is None:
print('CARD NOT FOUND')
else:
numbers = [i for i in uid]
string_ID = '{}-{}-{}-{}'.format(*numbers)
print('Found card with UID:', [hex(i) for i in uid])
print('Number_id: {}'.format(string_ID))
#set neopixel brightness
def set_neopixel_brightness(color):
r, g, b = color
r = int(r * BRIGHTNESS)
g = int(g * BRIGHTNESS)
b = int(b * BRIGHTNESS)
return (r, g, b)
def set_neopixel_color(r,g,b):
color = (r,g,b)
color = set_neopixel_brightness(color)
led_strip.fill(color)
led_strip.write()
def loop_neopixel():
# Display red
color = (255, 0, 0) # Red color
color = set_neopixel_brightness(color)
led_strip.fill(color)
led_strip.write()
time.sleep(1)
# Display green
color = (0, 255, 0) # Green color
color = set_neopixel_brightness(color)
led_strip.fill(color)
led_strip.write()
time.sleep(1)
# Display blue
color = (0, 0, 255) # Blue color
color = set_neopixel_brightness(color)
led_strip.fill(color)
led_strip.write()
time.sleep(1)
def read_nfc_loop():
print("Waiting for RFID/NFC card to read!")
set_neopixel_color(255,0,0)
while True:
# Check if a card is available to read
uid = pn532.read_passive_target(timeout=0.5)
# Try again if no card is available.
if uid is not None:
break
print("")
print("Found card with UID:", [hex(i) for i in uid])
set_neopixel_color(255,255,0)
ntag_string = ''
for page in range(20,40):
try:
ntag2xx_page = pn532.ntag2xx_read_block(page)
if ntag2xx_page is not None:
for char in ntag2xx_page:
ntag_string += chr(char)
else:
print('Error reading card')
return 1
except:
print('Error reading card')
return 1
set_neopixel_color(0,255,0)
print(ntag_string)
time.sleep(3)
return 0
#print('PAGE ',page,': ',[chr(x) for x in ntag2xx_page])
def write_nfc_loop(data):
content = data.encode('utf-8')
length = len(content)
pages = int(length / 4)
if (length % 4) != 0:
pages += 1
print("Waiting for RFID/NFC card to write to!")
set_neopixel_color(255,0,0)
while True:
# Check if a card is available to read
uid = pn532.read_passive_target(timeout=0.5)
# Try again if no card is available.
if uid is not None:
break
print("")
print("Found card with UID:", [hex(i) for i in uid])
set_neopixel_color(255,255,0)
print('Erasing card')
for page in range(20,41):
content_erase = b'\x00\x00\x00\x00'
pn532.ntag2xx_write_block(page, content_erase)
print('Writing card')
for page in range(20,20 + pages):
content_slice = bytearray(4)
for i in range(0,4):
try:
content_slice[i] = (content[i + 4 * (page - 20)])
except:
content_slice[i] = 0
#content_slice.append(content[i + 4 * (page - 20)])
print(content_slice)
pn532.ntag2xx_write_block(page, content_slice)
print('Write done')
set_neopixel_color(0,255,0)
def loop():
rw = input('Read or Write tags? [R/w]')
rw = rw.lower()
if rw == 'w':
while True:
data = input('ID:')
write_nfc_loop(data)
elif rw == 'r':
while True:
read_nfc_loop()
elif rw == '':
while True:
read_nfc_loop()
else:
print('Invalid option')
poll_obj = select.poll()
poll_obj.register(sys.stdin, select.POLLIN)
set_neopixel_color(0,0,255)
try:
while True:
poll_results = poll_obj.poll(1)
if poll_results:
while True:
try:
ret = loop()
except:
set_neopixel_color(0,0,255)
break
else:
continue
except:
set_neopixel_color(0,0,0)