Created
July 11, 2017 12:43
-
-
Save x8-999-github/61d1fe3e217a9954b974313fe9cfe437 to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
diff --git a/software/chipwhisperer/tests/aescpaeattackscript.py b/software/chipwhisperer/tests/aescpaeattackscript.py | |
index 8d24553a..891cd67a 100644 | |
--- a/software/chipwhisperer/tests/aescpaeattackscript.py | |
+++ b/software/chipwhisperer/tests/aescpaeattackscript.py | |
@@ -1,7 +1,6 @@ | |
# Date Auto-Generated: 2016.06.09-16.47.02 | |
import os | |
import shutil | |
- | |
import time | |
from chipwhisperer.common.scripts.base import UserScriptBase | |
@@ -13,6 +12,7 @@ from chipwhisperer.analyzer.attacks.cpa_algorithms.progressive import CPAProgres | |
import chipwhisperer.analyzer.attacks.models.AES128_8bit | |
# Imports from utilList | |
from chipwhisperer.capture.api.programmers import XMEGAProgrammer | |
+import chipwhisperer.tests | |
class Capture(UserScriptBase): | |
@@ -39,7 +39,8 @@ class Capture(UserScriptBase): | |
xmega._logging = None | |
xmega.find() | |
xmega.erase() | |
- xmega.program(r"simpleserial-aes-xmega.hex", memtype="flash", verify=True) | |
+ xmega_firmware_file = os.path.join(os.path.dirname(chipwhisperer.tests.__file__), r"simpleserial-aes-xmega.hex") | |
+ xmega.program(xmega_firmware_file, memtype="flash", verify=True) | |
xmega.close() | |
# Setup the capture parameters |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment