Skip to content

Instantly share code, notes, and snippets.

@x8-999-github
Created July 11, 2017 12:43
Show Gist options
  • Save x8-999-github/61d1fe3e217a9954b974313fe9cfe437 to your computer and use it in GitHub Desktop.
Save x8-999-github/61d1fe3e217a9954b974313fe9cfe437 to your computer and use it in GitHub Desktop.
diff --git a/software/chipwhisperer/tests/aescpaeattackscript.py b/software/chipwhisperer/tests/aescpaeattackscript.py
index 8d24553a..891cd67a 100644
--- a/software/chipwhisperer/tests/aescpaeattackscript.py
+++ b/software/chipwhisperer/tests/aescpaeattackscript.py
@@ -1,7 +1,6 @@
# Date Auto-Generated: 2016.06.09-16.47.02
import os
import shutil
-
import time
from chipwhisperer.common.scripts.base import UserScriptBase
@@ -13,6 +12,7 @@ from chipwhisperer.analyzer.attacks.cpa_algorithms.progressive import CPAProgres
import chipwhisperer.analyzer.attacks.models.AES128_8bit
# Imports from utilList
from chipwhisperer.capture.api.programmers import XMEGAProgrammer
+import chipwhisperer.tests
class Capture(UserScriptBase):
@@ -39,7 +39,8 @@ class Capture(UserScriptBase):
xmega._logging = None
xmega.find()
xmega.erase()
- xmega.program(r"simpleserial-aes-xmega.hex", memtype="flash", verify=True)
+ xmega_firmware_file = os.path.join(os.path.dirname(chipwhisperer.tests.__file__), r"simpleserial-aes-xmega.hex")
+ xmega.program(xmega_firmware_file, memtype="flash", verify=True)
xmega.close()
# Setup the capture parameters
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment