]> git.zerfleddert.de Git - proxmark3-svn/blame - client/proxmark3.c
Experimeting with finding the "WDT_HIT" bug in "Hf mf mifare", which not shows if...
[proxmark3-svn] / client / proxmark3.c
CommitLineData
a553f267 1//-----------------------------------------------------------------------------
212ef3a0 2// Copyright (C) 2009 Michael Gernoth <michael at gernoth.net>
a553f267 3// Copyright (C) 2010 iZsh <izsh at fail0verflow.com>
4//
5// This code is licensed to you under the terms of the GNU GPL, version 2 or,
6// at your option, any later version. See the LICENSE.txt file for the text of
7// the license.
8//-----------------------------------------------------------------------------
9// Main binary
10//-----------------------------------------------------------------------------
11
6658905f 12#include <stdio.h>
590f8ff9 13#include <stdlib.h>
6658905f 14#include <string.h>
7fe9b0b7 15#include <pthread.h>
8556b852 16#include <unistd.h>
6658905f 17#include <readline/readline.h>
18#include <readline/history.h>
10403a6a 19
6658905f 20#include "proxmark3.h"
21#include "proxgui.h"
7fe9b0b7 22#include "cmdmain.h"
902cb3c0 23#include "uart.h"
902cb3c0 24#include "ui.h"
759c16b3 25#include "sleep.h"
57c69556 26#include "cmdparser.h"
9783989b 27#include "cmdhw.h"
902cb3c0 28
9492e0b0 29// a global mutex to prevent interlaced printing from different threads
30pthread_mutex_t print_lock;
31
902cb3c0 32static serial_port sp;
f0ba6342 33static UsbCommand txcmd;
c3385024 34volatile static bool txcmd_pending = false;
902cb3c0 35
36void SendCommand(UsbCommand *c) {
9484ff3d 37 #if 0
87b28d31 38 printf("Sending %d bytes\n", sizeof(UsbCommand));
9484ff3d 39 #endif
14edfd09 40
41 if (offline) {
87b28d31 42 PrintAndLog("Sending bytes to proxmark failed - offline");
43 return;
44 }
45 /**
72e930ef 46 The while-loop below causes hangups at times, when the pm3 unit is unresponsive
47 or disconnected. The main console thread is alive, but comm thread just spins here.
48 Not good.../holiman
49 **/
87b28d31 50 while(txcmd_pending);
51
52 txcmd = *c;
53 txcmd_pending = true;
902cb3c0 54}
6658905f 55
902cb3c0 56struct receiver_arg {
7fe9b0b7 57 int run;
6658905f 58};
59
902cb3c0 60struct main_loop_arg {
7fe9b0b7 61 int usb_present;
1f947c4b 62 char *script_cmds_file;
a60612db 63};
64
902cb3c0 65byte_t rx[0x1000000];
fe7bfa78 66byte_t* prx = rx;
902cb3c0 67
68static void *uart_receiver(void *targ) {
87b28d31 69 struct receiver_arg *arg = (struct receiver_arg*)targ;
70 size_t rxlen;
71 size_t cmd_count;
72
73 while (arg->run) {
74
75 rxlen = sizeof(UsbCommand);
9484ff3d 76
9484ff3d 77 if (uart_receive(sp, prx, &rxlen)) {
87b28d31 78 prx += rxlen;
79 if (((prx-rx) % sizeof(UsbCommand)) != 0)
80 continue;
81
82 cmd_count = (prx-rx) / sizeof(UsbCommand);
83
84 for (size_t i = 0; i < cmd_count; i++)
85 UsbCommandReceived((UsbCommand*)( rx + ( i * sizeof(UsbCommand))));
86
87 }
88 prx = rx;
89
90 if (txcmd_pending) {
91 if ( !uart_send(sp, (byte_t*) &txcmd, sizeof(UsbCommand))) {
92 PrintAndLog("Sending bytes to proxmark failed");
93 }
94 txcmd_pending = false;
95 }
96 }
97
98 pthread_exit(NULL);
99 return NULL;
6658905f 100}
101
902cb3c0 102static void *main_loop(void *targ) {
87b28d31 103 struct main_loop_arg *arg = (struct main_loop_arg*)targ;
104 struct receiver_arg rarg;
105 char *cmd = NULL;
106 pthread_t reader_thread;
902cb3c0 107
87b28d31 108 if (arg->usb_present == 1) {
9484ff3d 109 rarg.run = 1;
87b28d31 110 pthread_create(&reader_thread, NULL, &uart_receiver, &rarg);
9783989b 111 // cache Version information now:
112 CmdVersion(NULL);
87b28d31 113 }
9484ff3d 114
87b28d31 115 FILE *script_file = NULL;
116 char script_cmd_buf[256] = {0x00}; // iceman, needs lua script the same file_path_buffer as the rest
9484ff3d 117
14edfd09 118 if (arg->script_cmds_file) {
87b28d31 119 script_file = fopen(arg->script_cmds_file, "r");
120
121 if (script_file)
122 printf("using 'scripting' commands file %s\n", arg->script_cmds_file);
123 }
7fe9b0b7 124
8556b852 125 read_history(".history");
14edfd09 126
127 while(1) {
128
87b28d31 129 // If there is a script file
130 if (script_file)
131 {
14edfd09 132 if (!fgets(script_cmd_buf, sizeof(script_cmd_buf), script_file)) {
87b28d31 133 fclose(script_file);
134 script_file = NULL;
14edfd09 135 } else {
87b28d31 136 char *nl;
137 nl = strrchr(script_cmd_buf, '\r');
138 if (nl)
139 *nl = '\0';
1d660bb9 140
87b28d31 141 nl = strrchr(script_cmd_buf, '\n');
142
143 if (nl)
144 *nl = '\0';
9484ff3d 145
14edfd09 146 if ((cmd = (char*) malloc(strlen(script_cmd_buf) + 1)) != NULL) {
87b28d31 147 memset(cmd, 0, strlen(script_cmd_buf));
148 strcpy(cmd, script_cmd_buf);
149 printf("%s\n", cmd);
150 }
151 }
152 } else {
153 cmd = readline(PROXPROMPT);
1f947c4b 154 }
155
8556b852 156 if (cmd) {
14edfd09 157
8556b852 158 while(cmd[strlen(cmd) - 1] == ' ')
87b28d31 159 cmd[strlen(cmd) - 1] = 0x00;
160
8556b852 161 if (cmd[0] != 0x00) {
cc3c0a51 162 int ret = CommandReceived(cmd);
163 add_history(cmd);
87b28d31 164
165 // exit or quit
166 if (ret == 99)
8556b852 167 break;
8556b852
M
168 }
169 free(cmd);
170 } else {
171 printf("\n");
172 break;
173 }
174 }
902cb3c0 175
51969283 176 write_history(".history");
902cb3c0 177
87b28d31 178 if (arg->usb_present == 1) {
179 rarg.run = 0;
180 pthread_join(reader_thread, NULL);
181 }
9484ff3d 182
14edfd09 183 if (script_file) {
87b28d31 184 fclose(script_file);
185 script_file = NULL;
186 }
9484ff3d 187
87b28d31 188 ExitGraphics();
189 pthread_exit(NULL);
190 return NULL;
6658905f 191}
192
dec8e8bd 193static void dumpAllHelp(int markdown)
ae7aa73d 194{
87b28d31 195 printf("\n%sProxmark3 command dump%s\n\n",markdown?"# ":"",markdown?"":"\n======================");
196 printf("Some commands are available only if a Proxmark is actually connected.%s\n",markdown?" ":"");
197 printf("Check column \"offline\" for their availability.\n");
198 printf("\n");
199 command_t *cmds = getTopLevelCommandTable();
200 dumpCommandsRecursive(cmds, markdown);
ae7aa73d
PT
201}
202
902cb3c0 203int main(int argc, char* argv[]) {
9492e0b0 204 srand(time(0));
125a98a1 205
9492e0b0 206 if (argc < 2) {
207 printf("syntax: %s <port>\n\n",argv[0]);
208 printf("\tLinux example:'%s /dev/ttyACM0'\n\n", argv[0]);
dec8e8bd
PT
209 printf("help: %s -h\n\n", argv[0]);
210 printf("\tDump all interactive help at once\n");
211 printf("markdown: %s -m\n\n", argv[0]);
212 printf("\tDump all interactive help at once in markdown syntax\n");
9492e0b0 213 return 1;
214 }
dec8e8bd
PT
215 if (strcmp(argv[1], "-h") == 0) {
216 printf("syntax: %s <port>\n\n",argv[0]);
217 printf("\tLinux example:'%s /dev/ttyACM0'\n\n", argv[0]);
218 dumpAllHelp(0);
219 return 0;
220 }
221 if (strcmp(argv[1], "-m") == 0) {
222 dumpAllHelp(1);
223 return 0;
224 }
9492e0b0 225 // Make sure to initialize
226 struct main_loop_arg marg = {
227 .usb_present = 0,
228 .script_cmds_file = NULL
229 };
87b28d31 230
cc3c0a51 231 pthread_t main_loop_threat;
1f947c4b 232
4890730a 233
9492e0b0 234 sp = uart_open(argv[1]);
235 if (sp == INVALID_SERIAL_PORT) {
236 printf("ERROR: invalid serial port\n");
237 marg.usb_present = 0;
238 offline = 1;
239 } else if (sp == CLAIMED_SERIAL_PORT) {
240 printf("ERROR: serial port is claimed by another process\n");
241 marg.usb_present = 0;
242 offline = 1;
243 } else {
244 marg.usb_present = 1;
245 offline = 0;
246 }
7fe9b0b7 247
9492e0b0 248 // If the user passed the filename of the 'script' to execute, get it
249 if (argc > 2 && argv[2]) {
ed77aabe 250 if (argv[2][0] == 'f' && //buzzy, if a word 'flush' passed, flush the output after every log entry.
251 argv[2][1] == 'l' &&
252 argv[2][2] == 'u' &&
253 argv[2][3] == 's' &&
254 argv[2][4] == 'h')
255 {
256 printf("Output will be flushed after every print.\n");
257 flushAfterWrite = 1;
258 }
87b28d31 259 else {
260 marg.script_cmds_file = argv[2];
261 }
9492e0b0 262 }
ed77aabe 263
9492e0b0 264 // create a mutex to avoid interlacing print commands from our different threads
265 pthread_mutex_init(&print_lock, NULL);
7fe9b0b7 266
cc3c0a51 267 pthread_create(&main_loop_threat, NULL, &main_loop, &marg);
9492e0b0 268 InitGraphics(argc, argv);
7fe9b0b7 269
9492e0b0 270 MainGraphics();
271
cc3c0a51 272 pthread_join(main_loop_threat, NULL);
7fe9b0b7 273
9492e0b0 274 // Clean up the port
87b28d31 275 if (offline == 0)
276 uart_close(sp);
9492e0b0 277
278 // clean up mutex
279 pthread_mutex_destroy(&print_lock);
902cb3c0 280
cc3c0a51 281 exit(0);
6658905f 282}
Impressum, Datenschutz