]>
Commit | Line | Data |
---|---|---|
21452811 | 1 | --[[ |
2 | These are command definitions. This file should correspond exactly to usb_cmd.h. | |
3 | --]] | |
4 | --// For the bootloader | |
5 | local _commands = { | |
6 | CMD_DEVICE_INFO = 0x0000, | |
7 | CMD_SETUP_WRITE = 0x0001, | |
8 | CMD_FINISH_WRITE = 0x0003, | |
9 | CMD_HARDWARE_RESET = 0x0004, | |
10 | CMD_START_FLASH = 0x0005, | |
11 | CMD_NACK = 0x00fe, | |
12 | CMD_ACK = 0x00ff, | |
13 | ||
14 | --// For general mucking around | |
15 | CMD_DEBUG_PRINT_STRING = 0x0100, | |
16 | CMD_DEBUG_PRINT_INTEGERS = 0x0101, | |
17 | CMD_DEBUG_PRINT_BYTES = 0x0102, | |
18 | CMD_LCD_RESET = 0x0103, | |
19 | CMD_LCD = 0x0104, | |
20 | CMD_BUFF_CLEAR = 0x0105, | |
21 | CMD_READ_MEM = 0x0106, | |
22 | CMD_VERSION = 0x0107, | |
7838f4be | 23 | CMD_STATUS = 0x0108, |
24 | CMD_PING = 0x0109, | |
aaa1a9a2 | 25 | CMD_DOWNLOAD_EML_BIGBUF = 0x0110, |
26 | CMD_DOWNLOADED_EML_BIGBUF = 0x0111, | |
27 | ||
21452811 | 28 | --// For low-frequency tags |
29 | CMD_READ_TI_TYPE = 0x0202, | |
30 | CMD_WRITE_TI_TYPE = 0x0203, | |
31 | CMD_DOWNLOADED_RAW_BITS_TI_TYPE = 0x0204, | |
32 | CMD_ACQUIRE_RAW_ADC_SAMPLES_125K = 0x0205, | |
33 | CMD_MOD_THEN_ACQUIRE_RAW_ADC_SAMPLES_125K = 0x0206, | |
34 | CMD_DOWNLOAD_RAW_ADC_SAMPLES_125K = 0x0207, | |
35 | CMD_DOWNLOADED_RAW_ADC_SAMPLES_125K = 0x0208, | |
36 | CMD_DOWNLOADED_SIM_SAMPLES_125K = 0x0209, | |
37 | CMD_SIMULATE_TAG_125K = 0x020A, | |
38 | CMD_HID_DEMOD_FSK = 0x020B, | |
39 | CMD_HID_SIM_TAG = 0x020C, | |
40 | CMD_SET_LF_DIVISOR = 0x020D, | |
41 | CMD_LF_SIMULATE_BIDIR = 0x020E, | |
42 | CMD_SET_ADC_MUX = 0x020F, | |
43 | CMD_HID_CLONE_TAG = 0x0210, | |
44 | CMD_EM410X_WRITE_TAG = 0x0211, | |
45 | CMD_INDALA_CLONE_TAG = 0x0212, | |
46 | --// for 224 bits UID | |
47 | CMD_INDALA_CLONE_TAG_L = 0x0213, | |
48 | CMD_T55XX_READ_BLOCK = 0x0214, | |
49 | CMD_T55XX_WRITE_BLOCK = 0x0215, | |
94422fa2 | 50 | CMD_T55XX_RESET_READ = 0x0216, |
21452811 | 51 | CMD_PCF7931_READ = 0x0217, |
f3cfe428 | 52 | CMD_PCF7931_WRITE = 0x0223, |
21452811 | 53 | CMD_EM4X_READ_WORD = 0x0218, |
54 | CMD_EM4X_WRITE_WORD = 0x0219, | |
b1329a02 | 55 | CMD_IO_DEMOD_FSK = 0x021A, |
abd6112f | 56 | CMD_IO_CLONE_TAG = 0x021B, |
57 | CMD_EM410X_DEMOD = 0x021c, | |
58 | CMD_SET_LF_SAMPLING_CONFIG = 0x021d, | |
59 | CMD_FSK_SIM_TAG = 0x021E, | |
60 | CMD_ASK_SIM_TAG = 0x021F, | |
872e3d4d | 61 | CMD_PSK_SIM_TAG = 0x0220, |
db25599d | 62 | CMD_AWID_DEMOD_FSK = 0x0221, |
0de8e387 | 63 | CMD_VIKING_CLONE_TAG = 0x0222, |
9276e859 | 64 | CMD_T55XX_WAKEUP = 0x0224, |
4653da43 | 65 | CMD_COTAG = 0x0225, |
0de8e387 | 66 | |
21452811 | 67 | --/* CMD_SET_ADC_MUX: ext1 is 0 for lopkd, 1 for loraw, 2 for hipkd, 3 for hiraw */ |
68 | ||
69 | --// For the 13.56 MHz tags | |
70 | CMD_ACQUIRE_RAW_ADC_SAMPLES_ISO_15693 = 0x0300, | |
6fc68747 | 71 | CMD_READ_SRI_TAG = 0x0303, |
14e18625 | 72 | CMD_ISO_14443B_COMMAND = 0x0305, |
21452811 | 73 | CMD_READER_ISO_15693 = 0x0310, |
74 | CMD_SIMTAG_ISO_15693 = 0x0311, | |
75 | CMD_RECORD_RAW_ADC_SAMPLES_ISO_15693 = 0x0312, | |
76 | CMD_ISO_15693_COMMAND = 0x0313, | |
77 | CMD_ISO_15693_COMMAND_DONE = 0x0314, | |
78 | CMD_ISO_15693_FIND_AFI = 0x0315, | |
79 | CMD_ISO_15693_DEBUG = 0x0316, | |
b1329a02 | 80 | CMD_LF_SNOOP_RAW_ADC_SAMPLES = 0x0317, |
21452811 | 81 | |
82 | --// For Hitag2 transponders | |
83 | CMD_SNOOP_HITAG = 0x0370, | |
84 | CMD_SIMULATE_HITAG = 0x0371, | |
85 | CMD_READER_HITAG = 0x0372, | |
86 | ||
0db11b71 | 87 | --// For HitagS |
88 | CMD_TEST_HITAGS_TRACES = 0x0367, | |
89 | CMD_SIMULATE_HITAG_S = 0x0368, | |
90 | CMD_READ_HITAG_S = 0x0373, | |
91 | CMD_WR_HITAG_S = 0x0375, | |
92 | CMD_EMU_HITAG_S = 0x0376, | |
93 | ||
22e24700 | 94 | CMD_SIMULATE_TAG_ISO_14443B = 0x0381, |
95 | CMD_SNOOP_ISO_14443B = 0x0382, | |
21452811 | 96 | CMD_SNOOP_ISO_14443a = 0x0383, |
97 | CMD_SIMULATE_TAG_ISO_14443a = 0x0384, | |
98 | CMD_READER_ISO_14443a = 0x0385, | |
83dad64b | 99 | CMD_RAW_WRITER_LEGIC_RF = 0x0386, |
21452811 | 100 | CMD_SIMULATE_TAG_LEGIC_RF = 0x0387, |
101 | CMD_READER_LEGIC_RF = 0x0388, | |
102 | CMD_WRITER_LEGIC_RF = 0x0389, | |
3e750be3 | 103 | |
21452811 | 104 | CMD_EPA_PACE_COLLECT_NONCE = 0x038A, |
d0f3338e | 105 | CMD_EPA_PACE_REPLAY = 0x038B, |
21452811 | 106 | |
3e750be3 | 107 | CMD_LEGIC_INFO = 0x03BC, |
0e8cabed | 108 | CMD_LEGIC_ESET = 0x03BD, |
109 | CMD_LEGIC_EGET = 0x03BE, | |
110 | ||
111 | ||
e98572a1 | 112 | CMD_ICLASS_READCHECK = 0x038F, |
113 | CMD_ICLASS_CLONE = 0x0390, | |
114 | CMD_ICLASS_DUMP = 0x0391, | |
21452811 | 115 | CMD_SNOOP_ICLASS = 0x0392, |
116 | CMD_SIMULATE_TAG_ICLASS = 0x0393, | |
117 | CMD_READER_ICLASS = 0x0394, | |
b1329a02 | 118 | CMD_READER_ICLASS_REPLAY = 0x0395, |
e98572a1 | 119 | CMD_ICLASS_READBLOCK = 0x0396, |
120 | CMD_ICLASS_WRITEBLOCK = 0x0397, | |
121 | CMD_ICLASS_EML_MEMSET = 0x0398, | |
122 | CMD_ICLASS_AUTHENTICATION = 0x0399, | |
21452811 | 123 | |
124 | --// For measurements of the antenna tuning | |
125 | CMD_MEASURE_ANTENNA_TUNING = 0x0400, | |
126 | CMD_MEASURE_ANTENNA_TUNING_HF = 0x0401, | |
127 | CMD_MEASURED_ANTENNA_TUNING = 0x0410, | |
128 | CMD_LISTEN_READER_FIELD = 0x0420, | |
129 | ||
130 | --// For direct FPGA control | |
131 | CMD_FPGA_MAJOR_MODE_OFF = 0x0500, | |
132 | ||
133 | --// For mifare commands | |
134 | CMD_MIFARE_SET_DBGMODE = 0x0600, | |
135 | CMD_MIFARE_EML_MEMCLR = 0x0601, | |
136 | CMD_MIFARE_EML_MEMSET = 0x0602, | |
137 | CMD_MIFARE_EML_MEMGET = 0x0603, | |
138 | CMD_MIFARE_EML_CARDLOAD = 0x0604, | |
b1329a02 | 139 | |
140 | --// magic chinese card commands | |
141 | CMD_MIFARE_CSETBLOCK = 0x0605, | |
142 | CMD_MIFARE_CGETBLOCK = 0x0606, | |
143 | CMD_MIFARE_CIDENT = 0x0607, | |
21452811 | 144 | |
145 | CMD_SIMULATE_MIFARE_CARD = 0x0610, | |
146 | ||
147 | CMD_READER_MIFARE = 0x0611, | |
148 | CMD_MIFARE_NESTED = 0x0612, | |
c188b1b9 | 149 | CMD_MIFARE_ACQUIRE_ENCRYPTED_NONCES = 0x0613, |
21452811 | 150 | |
151 | CMD_MIFARE_READBL = 0x0620, | |
b1329a02 | 152 | CMD_MIFAREU_READBL = 0x0720, |
153 | ||
21452811 | 154 | CMD_MIFARE_READSC = 0x0621, |
b1329a02 | 155 | CMD_MIFAREU_READCARD = 0x0721, |
156 | ||
21452811 | 157 | CMD_MIFARE_WRITEBL = 0x0622, |
b1329a02 | 158 | CMD_MIFAREU_WRITEBL = 0x0722, |
159 | CMD_MIFAREU_WRITEBL_COMPAT = 0x0723, | |
160 | ||
21452811 | 161 | CMD_MIFARE_CHKKEYS = 0x0623, |
162 | ||
163 | CMD_MIFARE_SNIFFER = 0x0630, | |
164 | ||
b1329a02 | 165 | --//ultralightC |
e7e95088 | 166 | CMD_MIFAREUC_AUTH = 0x0724, |
aa60d156 | 167 | CMD_MIFAREUC_SETPWD = 0x0727, |
168 | CMD_MIFAREU_SETUID = 0x0728, | |
b1329a02 | 169 | |
170 | --// mifare desfire | |
171 | CMD_MIFARE_DESFIRE_READBL = 0x0728, | |
172 | CMD_MIFARE_DESFIRE_WRITEBL = 0x0729, | |
173 | CMD_MIFARE_DESFIRE_AUTH1 = 0x072a, | |
174 | CMD_MIFARE_DESFIRE_AUTH2 = 0x072b, | |
175 | CMD_MIFARE_DES_READER = 0x072c, | |
176 | CMD_MIFARE_DESFIRE_INFO = 0x072d, | |
177 | CMD_MIFARE_DESFIRE = 0x072e, | |
1d0ccbe0 | 178 | CMD_HF_SNIFFER = 0x0800, |
179 | ||
83dad64b | 180 | |
181 | --// For EMV Commands | |
182 | CMD_EMV_READ_RECORD = 0x0700, | |
183 | CMD_EMV_TRANSACTION = 0x0701, | |
184 | CMD_EMV_CLONE = 0x0702, | |
185 | CMD_EMV_SIM = 0x0703, | |
186 | CMD_EMV_TEST = 0x0704, | |
187 | CMD_EMV_FUZZ_RATS = 0x0705, | |
188 | CMD_EMV_GET_RANDOM_NUM = 0x0706, | |
189 | CMD_EMV_LOAD_VALUE = 0x0707, | |
190 | CMD_EMV_DUMP_CARD = 0x0708, | |
191 | ||
21452811 | 192 | CMD_UNKNOWN = 0xFFFF, |
193 | } | |
194 | ||
195 | ||
196 | local _reverse_lookup,k,v = {} | |
f62b5e12 | 197 | for k, v in pairs(_commands) do |
198 | _reverse_lookup[v] = k | |
199 | end | |
200 | _commands.tostring = function(command) | |
21452811 | 201 | if(type(command) == 'number') then |
202 | return ("%s (%d)"):format(_reverse_lookup[command]or "ERROR UNDEFINED!", command) | |
203 | end | |
204 | return ("Error, numeric argument expected, got : %s"):format(tostring(command)) | |
205 | end | |
206 | ||
207 | Command = { | |
208 | ||
209 | new = function(self, o) | |
210 | ||
211 | local o = o or {} -- create object if user does not provide one | |
212 | setmetatable(o, self) -- DIY inheritance a'la javascript | |
213 | self.__index = self | |
214 | ||
215 | o.cmd = o.cmd or _commands.CMD_UNKNOWN | |
21452811 | 216 | o.arg1 = o.arg1 or 0 |
217 | o.arg2 = o.arg2 or 0 | |
218 | o.arg3 = o.arg3 or 0 | |
219 | local data = o.data or "0" | |
220 | ||
221 | if(type(data) == 'string') then | |
222 | -- We need to check if it is correct length, otherwise pad it | |
223 | local len = string.len(data) | |
224 | if(len < 1024) then | |
225 | --Should be 1024 hex characters to represent 512 bytes of data | |
226 | data = data .. string.rep("0",1024 - len ) | |
227 | end | |
228 | if(len > 1024) then | |
229 | -- OOps, a bit too much data here | |
230 | print( ( "WARNING: data size too large, was %s chars, will be truncated "):format(len) ) | |
231 | -- | |
232 | data = data:sub(1,1024) | |
233 | end | |
234 | else | |
235 | print(("WARNING; data was NOT a (hex-) string, but was %s"):format(type(data))) | |
236 | end | |
f62b5e12 | 237 | o.data = data |
21452811 | 238 | return o |
239 | end, | |
f62b5e12 | 240 | parse = function(packet) |
0de8e387 | 241 | local count, cmd, arg1, arg2, arg3, data = bin.unpack('LLLLH511', packet) |
4df3eb3f | 242 | return Command:new{cmd = cmd, arg1 = arg1, arg2 = arg2, arg3 = arg3, data = data} |
f62b5e12 | 243 | end |
244 | ||
21452811 | 245 | } |
246 | function Command:__tostring() | |
247 | local output = ("%s\r\nargs : (%s, %s, %s)\r\ndata:\r\n%s\r\n"):format( | |
248 | _commands.tostring(self.cmd), | |
249 | tostring(self.arg1), | |
250 | tostring(self.arg2), | |
251 | tostring(self.arg3), | |
252 | tostring(self.data)) | |
253 | return output | |
254 | end | |
255 | function Command:getBytes() | |
256 | --If a hex-string has been used | |
257 | local data = self.data | |
258 | local cmd = self.cmd | |
259 | local arg1, arg2, arg3 = self.arg1, self.arg2, self.arg3 | |
6fc68747 | 260 | return bin.pack("LLLLH", cmd, arg1, arg2, arg3, data); |
21452811 | 261 | end |
abd6112f | 262 | return _commands |