PCF7931: improved read code and implemented a simple password bruteforce (#745)
[proxmark3-svn] / include / usb_cmd.h
CommitLineData
e30c654b 1//-----------------------------------------------------------------------------
e30c654b 2// Jonathan Westhues, Mar 2006
3// Edits by Gerhard de Koning Gans, Sep 2007
bd20f8f4 4//
5// This code is licensed to you under the terms of the GNU GPL, version 2 or,
6// at your option, any later version. See the LICENSE.txt file for the text of
7// the license.
8//-----------------------------------------------------------------------------
9// Definitions for all the types of commands that may be sent over USB; our
10// own protocol.
e30c654b 11//-----------------------------------------------------------------------------
12
13#ifndef __USB_CMD_H
14#define __USB_CMD_H
15#ifdef _MSC_VER
16typedef DWORD uint32_t;
17typedef BYTE uint8_t;
18#define PACKED
19// stuff
20#else
21#include <stdint.h>
22#include <stdbool.h>
23#define PACKED __attribute__((packed))
24#endif
25
902cb3c0 26#define USB_CMD_DATA_SIZE 512
27
28typedef struct {
9440213d 29 uint64_t cmd;
80501bad 30 uint64_t arg[3];
902cb3c0 31 union {
9440213d 32 uint8_t asBytes[USB_CMD_DATA_SIZE];
902cb3c0 33 uint32_t asDwords[USB_CMD_DATA_SIZE/4];
34 } d;
e30c654b 35} PACKED UsbCommand;
31abe49f
MHS
36// A struct used to send sample-configs over USB
37typedef struct{
38 uint8_t decimation;
39 uint8_t bits_per_sample;
40 bool averaging;
41 int divisor;
42 int trigger_threshold;
43} sample_config;
e30c654b 44
45// For the bootloader
3ebf4b3d 46#define CMD_DEVICE_INFO 0x0000
47#define CMD_SETUP_WRITE 0x0001
48#define CMD_FINISH_WRITE 0x0003
49#define CMD_HARDWARE_RESET 0x0004
50#define CMD_START_FLASH 0x0005
51#define CMD_NACK 0x00fe
52#define CMD_ACK 0x00ff
e30c654b 53
54// For general mucking around
3ebf4b3d 55#define CMD_DEBUG_PRINT_STRING 0x0100
56#define CMD_DEBUG_PRINT_INTEGERS 0x0101
57#define CMD_DEBUG_PRINT_BYTES 0x0102
58#define CMD_LCD_RESET 0x0103
59#define CMD_LCD 0x0104
60#define CMD_BUFF_CLEAR 0x0105
61#define CMD_READ_MEM 0x0106
62#define CMD_VERSION 0x0107
43591e64 63#define CMD_STATUS 0x0108
64#define CMD_PING 0x0109
65
66// RDV40, Smart card operations
67#define CMD_SMART_RAW 0x0140
68#define CMD_SMART_UPGRADE 0x0141
69#define CMD_SMART_UPLOAD 0x0142
70#define CMD_SMART_ATR 0x0143
71// CMD_SMART_SETBAUD is unused for now
72#define CMD_SMART_SETBAUD 0x0144
73#define CMD_SMART_SETCLOCK 0x0145
e30c654b 74
75// For low-frequency tags
3ebf4b3d 76#define CMD_READ_TI_TYPE 0x0202
77#define CMD_WRITE_TI_TYPE 0x0203
78#define CMD_DOWNLOADED_RAW_BITS_TI_TYPE 0x0204
79#define CMD_ACQUIRE_RAW_ADC_SAMPLES_125K 0x0205
80#define CMD_MOD_THEN_ACQUIRE_RAW_ADC_SAMPLES_125K 0x0206
81#define CMD_DOWNLOAD_RAW_ADC_SAMPLES_125K 0x0207
82#define CMD_DOWNLOADED_RAW_ADC_SAMPLES_125K 0x0208
83#define CMD_DOWNLOADED_SIM_SAMPLES_125K 0x0209
84#define CMD_SIMULATE_TAG_125K 0x020A
85#define CMD_HID_DEMOD_FSK 0x020B
86#define CMD_HID_SIM_TAG 0x020C
87#define CMD_SET_LF_DIVISOR 0x020D
88#define CMD_LF_SIMULATE_BIDIR 0x020E
89#define CMD_SET_ADC_MUX 0x020F
90#define CMD_HID_CLONE_TAG 0x0210
91#define CMD_EM410X_WRITE_TAG 0x0211
92#define CMD_INDALA_CLONE_TAG 0x0212
93// for 224 bits UID
94#define CMD_INDALA_CLONE_TAG_L 0x0213
54a942b0 95#define CMD_T55XX_READ_BLOCK 0x0214
96#define CMD_T55XX_WRITE_BLOCK 0x0215
66837a03 97#define CMD_T55XX_RESET_READ 0x0216
54a942b0 98#define CMD_PCF7931_READ 0x0217
dc4300ba 99#define CMD_PCF7931_WRITE 0x0222
818e15b0 100#define CMD_PCF7931_BRUTEFORCE 0x0226
54a942b0 101#define CMD_EM4X_READ_WORD 0x0218
102#define CMD_EM4X_WRITE_WORD 0x0219
a1f3bb12 103#define CMD_IO_DEMOD_FSK 0x021A
104#define CMD_IO_CLONE_TAG 0x021B
abd6112f 105#define CMD_EM410X_DEMOD 0x021c
31abe49f
MHS
106// Sampling configuration for LF reader/snooper
107#define CMD_SET_LF_SAMPLING_CONFIG 0x021d
abd6112f 108#define CMD_FSK_SIM_TAG 0x021E
109#define CMD_ASK_SIM_TAG 0x021F
872e3d4d 110#define CMD_PSK_SIM_TAG 0x0220
dbf6e824 111#define CMD_AWID_DEMOD_FSK 0x0221
709665b5 112#define CMD_VIKING_CLONE_TAG 0x0223
be2d41b7 113#define CMD_T55XX_WAKEUP 0x0224
e04475c4 114#define CMD_COTAG 0x0225
5f84531b
SS
115// misc extra
116#define CMD_PARADOX_CLONE_TAG 0x0226
66707a3b 117
dc4300ba 118
e30c654b 119/* CMD_SET_ADC_MUX: ext1 is 0 for lopkd, 1 for loraw, 2 for hipkd, 3 for hiraw */
120
121// For the 13.56 MHz tags
3ebf4b3d 122#define CMD_ACQUIRE_RAW_ADC_SAMPLES_ISO_15693 0x0300
3ebf4b3d 123#define CMD_READ_SRI512_TAG 0x0303
124#define CMD_READ_SRIX4K_TAG 0x0304
7cf3ef20 125#define CMD_ISO_14443B_COMMAND 0x0305
3ebf4b3d 126#define CMD_READER_ISO_15693 0x0310
127#define CMD_SIMTAG_ISO_15693 0x0311
128#define CMD_RECORD_RAW_ADC_SAMPLES_ISO_15693 0x0312
129#define CMD_ISO_15693_COMMAND 0x0313
130#define CMD_ISO_15693_COMMAND_DONE 0x0314
131#define CMD_ISO_15693_FIND_AFI 0x0315
132#define CMD_ISO_15693_DEBUG 0x0316
b014c96d 133#define CMD_LF_SNOOP_RAW_ADC_SAMPLES 0x0317
d19929cb 134
135// For Hitag2 transponders
136#define CMD_SNOOP_HITAG 0x0370
137#define CMD_SIMULATE_HITAG 0x0371
138#define CMD_READER_HITAG 0x0372
139
4e12287d 140#define CMD_SIMULATE_HITAG_S 0x0368
43591e64 141#define CMD_TEST_HITAGS_TRACES 0x0367
142#define CMD_READ_HITAG_S 0x0373
7b6e3205 143#define CMD_READ_HITAG_S_BLK 0x0374
43591e64 144#define CMD_WR_HITAG_S 0x0375
145#define CMD_EMU_HITAG_S 0x0376
4e12287d
RS
146
147
132a0217 148#define CMD_SIMULATE_TAG_ISO_14443B 0x0381
149#define CMD_SNOOP_ISO_14443B 0x0382
3ebf4b3d 150#define CMD_SNOOP_ISO_14443a 0x0383
151#define CMD_SIMULATE_TAG_ISO_14443a 0x0384
152#define CMD_READER_ISO_14443a 0x0385
153#define CMD_SIMULATE_TAG_LEGIC_RF 0x0387
154#define CMD_READER_LEGIC_RF 0x0388
155#define CMD_WRITER_LEGIC_RF 0x0389
5acd09bd 156#define CMD_EPA_PACE_COLLECT_NONCE 0x038A
3bb07d96 157#define CMD_EPA_PACE_REPLAY 0x038B
3ebf4b3d 158
3ac22ee1 159#define CMD_ICLASS_READCHECK 0x038F
aa53efc3 160#define CMD_ICLASS_CLONE 0x0390
161#define CMD_ICLASS_DUMP 0x0391
3ebf4b3d 162#define CMD_SNOOP_ICLASS 0x0392
163#define CMD_SIMULATE_TAG_ICLASS 0x0393
164#define CMD_READER_ICLASS 0x0394
f168b263 165#define CMD_READER_ICLASS_REPLAY 0x0395
aa53efc3 166#define CMD_ICLASS_READBLOCK 0x0396
167#define CMD_ICLASS_WRITEBLOCK 0x0397
7781a656 168#define CMD_ICLASS_EML_MEMSET 0x0398
aa53efc3 169#define CMD_ICLASS_AUTHENTICATION 0x0399
e30c654b 170
171// For measurements of the antenna tuning
3ebf4b3d 172#define CMD_MEASURE_ANTENNA_TUNING 0x0400
173#define CMD_MEASURE_ANTENNA_TUNING_HF 0x0401
174#define CMD_MEASURED_ANTENNA_TUNING 0x0410
175#define CMD_LISTEN_READER_FIELD 0x0420
e30c654b 176
177// For direct FPGA control
3ebf4b3d 178#define CMD_FPGA_MAJOR_MODE_OFF 0x0500
9ca155ba
M
179
180// For mifare commands
3ebf4b3d 181#define CMD_MIFARE_SET_DBGMODE 0x0600
182#define CMD_MIFARE_EML_MEMCLR 0x0601
183#define CMD_MIFARE_EML_MEMSET 0x0602
184#define CMD_MIFARE_EML_MEMGET 0x0603
185#define CMD_MIFARE_EML_CARDLOAD 0x0604
3fe4ff4f 186
187// magic chinese card commands
188#define CMD_MIFARE_CSETBLOCK 0x0605
189#define CMD_MIFARE_CGETBLOCK 0x0606
190#define CMD_MIFARE_CIDENT 0x0607
3a05a1e7 191#define CMD_MIFARE_CWIPE 0x0608
9ca155ba 192
3ebf4b3d 193#define CMD_SIMULATE_MIFARE_CARD 0x0610
9ca155ba 194
3ebf4b3d 195#define CMD_READER_MIFARE 0x0611
196#define CMD_MIFARE_NESTED 0x0612
c48c4d78 197#define CMD_MIFARE_ACQUIRE_ENCRYPTED_NONCES 0x0613
9ca155ba 198
3ebf4b3d 199#define CMD_MIFARE_READBL 0x0620
f168b263 200#define CMD_MIFAREU_READBL 0x0720
3ebf4b3d 201#define CMD_MIFARE_READSC 0x0621
f168b263 202#define CMD_MIFAREU_READCARD 0x0721
3ebf4b3d 203#define CMD_MIFARE_WRITEBL 0x0622
f168b263 204#define CMD_MIFAREU_WRITEBL 0x0722
205#define CMD_MIFAREU_WRITEBL_COMPAT 0x0723
3fe4ff4f 206
3ebf4b3d 207#define CMD_MIFARE_CHKKEYS 0x0623
e30c654b 208
3ebf4b3d 209#define CMD_MIFARE_SNIFFER 0x0630
3fe4ff4f 210//ultralightC
9d87eb66 211#define CMD_MIFAREUC_AUTH 0x0724
212//0x0725 and 0x0726 no longer used
f168b263 213#define CMD_MIFAREUC_SETPWD 0x0727
214
3fe4ff4f 215
216// mifare desfire
217#define CMD_MIFARE_DESFIRE_READBL 0x0728
218#define CMD_MIFARE_DESFIRE_WRITEBL 0x0729
219#define CMD_MIFARE_DESFIRE_AUTH1 0x072a
220#define CMD_MIFARE_DESFIRE_AUTH2 0x072b
221#define CMD_MIFARE_DES_READER 0x072c
222#define CMD_MIFARE_DESFIRE_INFO 0x072d
223#define CMD_MIFARE_DESFIRE 0x072e
b62a5a84 224
0472d76d 225#define CMD_HF_SNIFFER 0x0800
226
3ebf4b3d 227#define CMD_UNKNOWN 0xFFFF
3851172d 228
d2f487af 229
230//Mifare simulation flags
c872d8c1 231#define FLAG_INTERACTIVE 0x01
232#define FLAG_4B_UID_IN_DATA 0x02
233#define FLAG_7B_UID_IN_DATA 0x04
234#define FLAG_10B_UID_IN_DATA 0x08
235#define FLAG_NR_AR_ATTACK 0x10
f9c1dcd9 236#define FLAG_RANDOM_NONCE 0x20
d2f487af 237
238
aa41c605 239//Iclass reader flags
c8dd9b09 240#define FLAG_ICLASS_READER_ONLY_ONCE 0x01
6ce0e538 241#define FLAG_ICLASS_READER_CC 0x02
242#define FLAG_ICLASS_READER_CSN 0x04
243#define FLAG_ICLASS_READER_CONF 0x08
244#define FLAG_ICLASS_READER_AA 0x10
245#define FLAG_ICLASS_READER_ONE_TRY 0x20
aa53efc3 246#define FLAG_ICLASS_READER_CEDITKEY 0x40
caaf9618 247
d2f487af 248
fdcfbdcc
RAB
249//hw tune args
250#define FLAG_TUNE_LF 1
251#define FLAG_TUNE_HF 2
252#define FLAG_TUNE_ALL 3
253
31abe49f 254
e30c654b 255// CMD_DEVICE_INFO response packet has flags in arg[0], flag definitions:
256/* Whether a bootloader that understands the common_area is present */
257#define DEVICE_INFO_FLAG_BOOTROM_PRESENT (1<<0)
258
259/* Whether a osimage that understands the common_area is present */
260#define DEVICE_INFO_FLAG_OSIMAGE_PRESENT (1<<1)
261
262/* Set if the bootloader is currently executing */
263#define DEVICE_INFO_FLAG_CURRENT_MODE_BOOTROM (1<<2)
264
265/* Set if the OS is currently executing */
266#define DEVICE_INFO_FLAG_CURRENT_MODE_OS (1<<3)
267
268/* Set if this device understands the extend start flash command */
269#define DEVICE_INFO_FLAG_UNDERSTANDS_START_FLASH (1<<4)
270
271/* CMD_START_FLASH may have three arguments: start of area to flash,
272 end of area to flash, optional magic.
273 The bootrom will not allow to overwrite itself unless this magic
274 is given as third parameter */
275
276#define START_FLASH_MAGIC 0x54494f44 // 'DOIT'
277
278#endif
Impressum, Datenschutz