]> git.zerfleddert.de Git - proxmark3-svn/blame - client/scripting.c
FIX: lf hitag : Mea culpa, simulation should not have reader_field on. thanks to...
[proxmark3-svn] / client / scripting.c
CommitLineData
5b760b6c 1//-----------------------------------------------------------------------------
2// Copyright (C) 2013 m h swende <martin at swende.se>
a75d63f1 3// Modified 2015,2016, iceman
5b760b6c 4//
5// This code is licensed to you under the terms of the GNU GPL, version 2 or,
6// at your option, any later version. See the LICENSE.txt file for the text of
7// the license.
8//-----------------------------------------------------------------------------
9// Some lua scripting glue to proxmark core.
10//-----------------------------------------------------------------------------
5b760b6c 11#include "scripting.h"
a75d63f1 12
5b760b6c 13/**
14 * The following params expected:
15 * UsbCommand c
16 *@brief l_SendCommand
17 * @param L
18 * @return
19 */
20static int l_SendCommand(lua_State *L){
21
22 /*
23 *
24 The SendCommand (native) expects the following structure:
25
26 typedef struct {
27 uint64_t cmd; //8 bytes
28 uint64_t arg[3]; // 8*3 bytes = 24 bytes
29 union {
30 uint8_t asBytes[USB_CMD_DATA_SIZE]; // 1 byte * 512 = 512 bytes (OR)
31 uint32_t asDwords[USB_CMD_DATA_SIZE/4]; // 4 byte * 128 = 512 bytes
32 } d;
33 } PACKED UsbCommand;
34
35 ==> A 544 byte buffer will do.
36 **/
37 //Pop cmd
96e7a3a5 38 size_t size;
39 const char *data = luaL_checklstring(L, 1, &size);
40 if(size != sizeof(UsbCommand))
41 {
1d0ccbe0 42 printf("Got data size %d, expected %d" , (int) size,(int) sizeof(UsbCommand));
96e7a3a5 43 lua_pushstring(L,"Wrong data size");
44 return 1;
45 }
46
42daa759 47 SendCommand((UsbCommand* )data);
44fffc54 48 return 0; // no return values
5b760b6c 49}
50/**
51 * @brief The following params expected:
52 * uint32_t cmd
53 * size_t ms_timeout
54 * @param L
55 * @return
56 */
57static int l_WaitForResponseTimeout(lua_State *L){
58
44fffc54 59 uint32_t cmd = 0;
60 size_t ms_timeout = -1;
5b760b6c 61
44fffc54 62 //Check number of arguments
63 int n = lua_gettop(L);
64 if(n == 0)
5b760b6c 65 {
44fffc54 66 //signal error by returning Nil, errorstring
67 lua_pushnil(L);
68 lua_pushstring(L,"You need to supply at least command to wait for");
69 return 2; // two return values
70 }
71 if(n >= 1)
72 {
73 //pop cmd
74 cmd = luaL_checkunsigned(L,1);
75 }
76 if(n >= 2)
77 {
78 //Did the user send a timeout ?
79 //Check if the current top of stack is an integer
5b760b6c 80 ms_timeout = luaL_checkunsigned(L,2);
44fffc54 81 //printf("Timeout set to %dms\n" , (int) ms_timeout);
5b760b6c 82 }
5b760b6c 83
44fffc54 84 UsbCommand response;
44fffc54 85 if(WaitForResponseTimeout(cmd, &response, ms_timeout))
5b760b6c 86 {
44fffc54 87 //Push it as a string
5de79e20 88 lua_pushlstring(L,(const char *)&response, sizeof(UsbCommand));
44fffc54 89
90 return 1;// return 1 to signal one return value
91 }else{
5b760b6c 92 //Push a Nil instead
93 lua_pushnil(L);
44fffc54 94 return 1;// one return value
5b760b6c 95 }
96}
2dcdf1a6 97
98static int returnToLuaWithError(lua_State *L, const char* fmt, ...)
99{
100 char buffer[200];
101 va_list args;
102 va_start(args,fmt);
103 vsnprintf(buffer, sizeof(buffer), fmt,args);
104 va_end(args);
105
106 lua_pushnil(L);
107 lua_pushstring(L,buffer);
108 return 2;
109}
110
111static int l_nonce2key(lua_State *L){
112
113 size_t size;
114 const char *p_uid = luaL_checklstring(L, 1, &size);
115 if(size != 4) return returnToLuaWithError(L,"Wrong size of uid, got %d bytes, expected 4", (int) size);
116
117 const char *p_nt = luaL_checklstring(L, 2, &size);
118 if(size != 4) return returnToLuaWithError(L,"Wrong size of nt, got %d bytes, expected 4", (int) size);
119
120 const char *p_nr = luaL_checklstring(L, 3, &size);
121 if(size != 4) return returnToLuaWithError(L,"Wrong size of nr, got %d bytes, expected 4", (int) size);
122
123 const char *p_par_info = luaL_checklstring(L, 4, &size);
124 if(size != 8) return returnToLuaWithError(L,"Wrong size of par_info, got %d bytes, expected 8", (int) size);
125
126 const char *p_pks_info = luaL_checklstring(L, 5, &size);
127 if(size != 8) return returnToLuaWithError(L,"Wrong size of ks_info, got %d bytes, expected 8", (int) size);
128
129
130 uint32_t uid = bytes_to_num(( uint8_t *)p_uid,4);
131 uint32_t nt = bytes_to_num(( uint8_t *)p_nt,4);
132
133 uint32_t nr = bytes_to_num(( uint8_t*)p_nr,4);
134 uint64_t par_info = bytes_to_num(( uint8_t *)p_par_info,8);
135 uint64_t ks_info = bytes_to_num(( uint8_t *)p_pks_info,8);
136
137 uint64_t key = 0;
138
139 int retval = nonce2key(uid,nt, nr, par_info,ks_info, &key);
140
141 //Push the retval on the stack
142 lua_pushinteger(L,retval);
2dcdf1a6 143
2dcdf1a6 144 //Push the key onto the stack
05f23c59 145 uint8_t dest_key[8];
146 num_to_bytes(key,sizeof(dest_key),dest_key);
b9697139 147
9c624f67 148 //printf("Pushing to lua stack: %012" PRIx64 "\n",key);
05f23c59 149 lua_pushlstring(L,(const char *) dest_key,sizeof(dest_key));
2dcdf1a6 150
151 return 2; //Two return values
152}
42daa759 153//static int l_PrintAndLog(lua_State *L){ return CmdHF14AMfDump(luaL_checkstring(L, 1));}
44fffc54 154static int l_clearCommandBuffer(lua_State *L){
155 clearCommandBuffer();
42daa759 156 return 0;
44fffc54 157}
158/**
159 * @brief l_foobar is a dummy function to test lua-integration with
160 * @param L
161 * @return
162 */
163static int l_foobar(lua_State *L)
164{
165 //Check number of arguments
166 int n = lua_gettop(L);
167 printf("foobar called with %d arguments" , n);
168 lua_settop(L, 0);
169 printf("Arguments discarded, stack now contains %d elements", lua_gettop(L));
bcf61bd3 170
05f23c59 171 // todo: this is not used, where was it intended for?
172 // UsbCommand response = {CMD_MIFARE_READBL, {1337, 1338, 1339}};
bcf61bd3 173
05f23c59 174 printf("Now returning a uint64_t as a string");
175 uint64_t x = 0xDEADBEEF;
176 uint8_t destination[8];
177 num_to_bytes(x,sizeof(x),destination);
178 lua_pushlstring(L,(const char *)&x,sizeof(x));
179 lua_pushlstring(L,(const char *)destination,sizeof(destination));
180
181 return 2;
44fffc54 182}
183
2dcdf1a6 184
44fffc54 185/**
186 * @brief Utility to check if a key has been pressed by the user. This method does not block.
187 * @param L
188 * @return boolean, true if kbhit, false otherwise.
189 */
190static int l_ukbhit(lua_State *L)
191{
192 lua_pushboolean(L,ukbhit() ? true : false);
193 return 1;
194}
0a85b725 195/**
196 * @brief Calls the command line parser to deal with the command. This enables
197 * lua-scripts to do stuff like "core.console('hf mf mifare')"
198 * @param L
199 * @return
200 */
201static int l_CmdConsole(lua_State *L)
202{
203 CommandReceived((char *)luaL_checkstring(L, 1));
204 return 0;
205}
206
77cd612f 207static int l_iso15693_crc(lua_State *L)
208{
209 // uint16_t Iso15693Crc(uint8_t *v, int n);
210 size_t size;
211 const char *v = luaL_checklstring(L, 1, &size);
212 uint16_t retval = Iso15693Crc((uint8_t *) v, size);
213 lua_pushinteger(L, (int) retval);
214 return 1;
215}
5b760b6c 216
5de79e20 217static int l_iso14443b_crc(lua_State *L)
218{
219 /* void ComputeCrc14443(int CrcType,
220 const unsigned char *Data, int Length,
221 unsigned char *TransmitFirst,
222 unsigned char *TransmitSecond)
223 */
b804b9cd 224 unsigned char buf[USB_CMD_DATA_SIZE] = {0x00};
f6af1cf0 225 size_t size = 0;
226 const char *data = luaL_checklstring(L, 1, &size);
227
5de79e20 228
f6af1cf0 229 for (int i = 0; i < size; i += 2)
230 sscanf(&data[i], "%02x", (unsigned int *)&buf[i / 2]);
5de79e20 231
f6af1cf0 232 size /= 2;
233 ComputeCrc14443(CRC_14443_B, buf, size, &buf[size], &buf[size+1]);
234 lua_pushlstring(L, (const char *)&buf, size+2);
5de79e20 235 return 1;
236}
237
c15d2bdc 238/*
239 Simple AES 128 cbc hook up to OpenSSL.
240 params: key, input
241*/
b18948fd 242static int l_aes128decrypt_cbc(lua_State *L)
c15d2bdc 243{
244 //Check number of arguments
245 int i;
246 size_t size;
247 const char *p_key = luaL_checklstring(L, 1, &size);
248 if(size != 32) return returnToLuaWithError(L,"Wrong size of key, got %d bytes, expected 32", (int) size);
249
250 const char *p_encTxt = luaL_checklstring(L, 2, &size);
b915fda3 251
1f6417a9
MHS
252 unsigned char indata[16] = {0x00};
253 unsigned char outdata[16] = {0x00};
254 unsigned char aes_key[16] = {0x00};
255 unsigned char iv[16] = {0x00};
d87779d6 256
d730878d 257 // convert key to bytearray and convert input to bytearray
c15d2bdc 258 for (i = 0; i < 32; i += 2) {
259 sscanf(&p_encTxt[i], "%02x", (unsigned int *)&indata[i / 2]);
d87779d6 260 sscanf(&p_key[i], "%02x", (unsigned int *)&aes_key[i / 2]);
c15d2bdc 261 }
d87779d6 262
263 aes_context ctx;
264 aes_init(&ctx);
d87779d6 265 aes_setkey_dec(&ctx, aes_key, 128);
266 aes_crypt_cbc(&ctx, AES_DECRYPT, sizeof(indata), iv, indata, outdata );
267 //Push decrypted array as a string
268 lua_pushlstring(L,(const char *)&outdata, sizeof(outdata));
269 return 1;// return 1 to signal one return value
270}
b18948fd 271static int l_aes128decrypt_ecb(lua_State *L)
272{
273 //Check number of arguments
274 int i;
275 size_t size;
276 const char *p_key = luaL_checklstring(L, 1, &size);
277 if(size != 32) return returnToLuaWithError(L,"Wrong size of key, got %d bytes, expected 32", (int) size);
278
279 const char *p_encTxt = luaL_checklstring(L, 2, &size);
280
281 unsigned char indata[16] = {0x00};
282 unsigned char outdata[16] = {0x00};
283 unsigned char aes_key[16] = {0x00};
284
285 // convert key to bytearray and convert input to bytearray
286 for (i = 0; i < 32; i += 2) {
287 sscanf(&p_encTxt[i], "%02x", (unsigned int *)&indata[i / 2]);
288 sscanf(&p_key[i], "%02x", (unsigned int *)&aes_key[i / 2]);
289 }
290 aes_context ctx;
291 aes_init(&ctx);
292 aes_setkey_dec(&ctx, aes_key, 128);
293 aes_crypt_ecb(&ctx, AES_DECRYPT, indata, outdata );
294
295 //Push decrypted array as a string
296 lua_pushlstring(L,(const char *)&outdata, sizeof(outdata));
297 return 1;// return 1 to signal one return value
298}
299
300static int l_aes128encrypt_cbc(lua_State *L)
d87779d6 301{
302 //Check number of arguments
303 int i;
304 size_t size;
305 const char *p_key = luaL_checklstring(L, 1, &size);
306 if(size != 32) return returnToLuaWithError(L,"Wrong size of key, got %d bytes, expected 32", (int) size);
307
308 const char *p_txt = luaL_checklstring(L, 2, &size);
309
310 unsigned char indata[16] = {0x00};
311 unsigned char outdata[16] = {0x00};
312 unsigned char aes_key[16] = {0x00};
313 unsigned char iv[16] = {0x00};
c15d2bdc 314
c15d2bdc 315 for (i = 0; i < 32; i += 2) {
d87779d6 316 sscanf(&p_txt[i], "%02x", (unsigned int *)&indata[i / 2]);
c15d2bdc 317 sscanf(&p_key[i], "%02x", (unsigned int *)&aes_key[i / 2]);
318 }
1f6417a9
MHS
319
320 aes_context ctx;
321 aes_init(&ctx);
d730878d 322 aes_setkey_enc(&ctx, aes_key, 128);
d87779d6 323 aes_crypt_cbc(&ctx, AES_ENCRYPT, sizeof(indata), iv, indata, outdata );
d730878d 324 //Push encrypted array as a string
c15d2bdc 325 lua_pushlstring(L,(const char *)&outdata, sizeof(outdata));
326 return 1;// return 1 to signal one return value
327}
328
b18948fd 329static int l_aes128encrypt_ecb(lua_State *L)
330{
331 //Check number of arguments
332 int i;
333 size_t size;
334 const char *p_key = luaL_checklstring(L, 1, &size);
335 if(size != 32) return returnToLuaWithError(L,"Wrong size of key, got %d bytes, expected 32", (int) size);
336
337 const char *p_txt = luaL_checklstring(L, 2, &size);
338
339 unsigned char indata[16] = {0x00};
340 unsigned char outdata[16] = {0x00};
341 unsigned char aes_key[16] = {0x00};
342
343 for (i = 0; i < 32; i += 2) {
344 sscanf(&p_txt[i], "%02x", (unsigned int *)&indata[i / 2]);
345 sscanf(&p_key[i], "%02x", (unsigned int *)&aes_key[i / 2]);
346 }
347 aes_context ctx;
348 aes_init(&ctx);
349 aes_setkey_enc(&ctx, aes_key, 128);
350 aes_crypt_ecb(&ctx, AES_ENCRYPT, indata, outdata );
351 //Push encrypted array as a string
352 lua_pushlstring(L,(const char *)&outdata, sizeof(outdata));
353 return 1;// return 1 to signal one return value
354}
355
a75d63f1 356static int l_crc8legic(lua_State *L)
357{
358 size_t size;
359 const char *p_str = luaL_checklstring(L, 1, &size);
360
361 uint16_t retval = CRC8Legic( (uint8_t*) p_str, size);
362 lua_pushinteger(L, (int) retval);
363 return 1;
364}
365
47cbb2d4 366static int l_crc16(lua_State *L)
367{
368 size_t size;
369 const char *p_str = luaL_checklstring(L, 1, &size);
d730878d 370
06b58a94 371 uint16_t retval = crc16_ccitt( (uint8_t*) p_str, size);
47cbb2d4 372 lua_pushinteger(L, (int) retval);
373 return 1;
374}
375
3ee8c808 376static int l_crc64(lua_State *L)
377{
378 size_t size;
379 uint64_t crc = 0;
380 unsigned char outdata[8] = {0x00};
381
382 const char *p_str = luaL_checklstring(L, 1, &size);
d730878d 383
3ee8c808 384 crc64( (uint8_t*) p_str, size, &crc);
385
386 outdata[0] = (uint8_t)(crc >> 56) & 0xff;
387 outdata[1] = (uint8_t)(crc >> 48) & 0xff;
388 outdata[2] = (uint8_t)(crc >> 40) & 0xff;
389 outdata[3] = (uint8_t)(crc >> 32) & 0xff;
390 outdata[4] = (uint8_t)(crc >> 24) & 0xff;
391 outdata[5] = (uint8_t)(crc >> 16) & 0xff;
392 outdata[6] = (uint8_t)(crc >> 8) & 0xff;
393 outdata[7] = crc & 0xff;
394 lua_pushlstring(L,(const char *)&outdata, sizeof(outdata));
d730878d 395 return 1;
3ee8c808 396}
397
2d2f7d19 398static int l_sha1(lua_State *L)
399{
ea75b30c 400 size_t size;
401 const char *p_str = luaL_checklstring(L, 1, &size);
402 unsigned char outdata[20] = {0x00};
403 sha1( (uint8_t*) p_str, size, outdata);
404 lua_pushlstring(L,(const char *)&outdata, sizeof(outdata));
405 return 1;
406}
407
60e86577 408static int l_reveng_models(lua_State *L){
409
ef085a59 410 // This array needs to be adjusted if RevEng adds more crc-models.
411 char *models[100];
60e86577 412 int count = 0;
dd1df490 413 int in_width = luaL_checkinteger(L, 1);
60e86577 414
415 if( in_width > 89 ) return returnToLuaWithError(L,"Width cannot exceed 89, got %d", in_width);
416
ef085a59 417 // This array needs to be adjusted if RevEng adds more crc-models.
418 uint8_t width[100];
99789601 419 width[0] = (uint8_t)in_width;
420 int ans = GetModels(models, &count, width);
421 if (!ans) return 0;
60e86577 422
423 lua_newtable(L);
424
425 for (int i = 0; i < count; i++){
426 lua_pushstring(L, (const char*)models[i]);
427 lua_rawseti(L,-2,i+1);
428 free(models[i]);
429 }
430
431 return 1;
432}
433
dd1df490 434//Called with 4 parameters.
435// inModel ,string containing the crc model name: 'CRC-8'
436// inHexStr ,string containing the hex representation of the data that will be used for CRC calculations.
437// reverse ,int 0/1 (bool) if 1, calculate the reverse CRC
438// endian ,char, 'B','b','L','l','t','r' describing if Big-Endian or Little-Endian should be used in different combinations.
439//
440// outputs: string with hex representation of the CRC result
60e86577 441static int l_reveng_RunModel(lua_State *L){
442 //-c || -v
443 //inModel = valid model name string - CRC-8
444 //inHexStr = input hex string to calculate crc on
445 //reverse = reverse calc option if true
446 //endian = {0 = calc default endian input and output, b = big endian input and output, B = big endian output, r = right justified
447 // l = little endian input and output, L = little endian output only, t = left justified}
448 //result = calculated crc hex string
449 char result[50];
450
dd1df490 451 const char *inModel = luaL_checkstring(L, 1);
452 const char *inHexStr = luaL_checkstring(L, 2);
453 bool reverse = lua_toboolean(L, 3);
454 const char endian = luaL_checkstring(L, 4)[0];
60e86577 455
456 //PrintAndLog("mod: %s, hex: %s, rev %d", inModel, inHexStr, reverse);
dd1df490 457 // int RunModel(char *inModel, char *inHexStr, bool reverse, char endian, char *result)
458 int ans = RunModel( (char *)inModel, (char *)inHexStr, reverse, endian, result);
60e86577 459 if (!ans)
460 return returnToLuaWithError(L,"Reveng failed");
461
462 lua_pushstring(L, (const char*)result);
463 return 1;
464}
465
e108a48a 466static int l_hardnested(lua_State *L){
467
468 bool haveTarget = TRUE;
469 size_t size;
470 const char *p_blockno = luaL_checklstring(L, 1, &size);
471 if(size != 2) return returnToLuaWithError(L,"Wrong size of blockNo, got %d bytes, expected 2", (int) size);
472
473 const char *p_keytype = luaL_checklstring(L, 2, &size);
474 if(size != 1) return returnToLuaWithError(L,"Wrong size of keyType, got %d bytes, expected 1", (int) size);
475
476 const char *p_key = luaL_checklstring(L, 3, &size);
477 if(size != 12) return returnToLuaWithError(L,"Wrong size of key, got %d bytes, expected 12", (int) size);
478
479 const char *p_trg_blockno = luaL_checklstring(L, 4, &size);
480 if(size != 2) return returnToLuaWithError(L,"Wrong size of trgBlockNo, got %d bytes, expected 2", (int) size);
481
482 const char *p_trg_keytype = luaL_checklstring(L, 5, &size);
483 if(size != 1) return returnToLuaWithError(L,"Wrong size of trgKeyType, got %d bytes, expected 1", (int) size);
484
485 const char *p_trgkey = luaL_checklstring(L, 6, &size);
486 if(size != 12)
487 haveTarget = FALSE;
488
489 const char *p_nonce_file_read = luaL_checklstring(L, 7, &size);
490 if(size != 1) return returnToLuaWithError(L,"Wrong size of nonce_file_read, got %d bytes, expected 1", (int) size);
491
492 const char *p_nonce_file_write = luaL_checklstring(L, 8, &size);
493 if(size != 1) return returnToLuaWithError(L,"Wrong size of nonce_file_write, got %d bytes, expected 1", (int) size);
494
495 const char *p_slow = luaL_checklstring(L, 9, &size);
496 if(size != 1) return returnToLuaWithError(L,"Wrong size of slow, got %d bytes, expected 1", (int) size);
497
498 const char *p_tests = luaL_checklstring(L, 10, &size);
499 if(size != 1) return returnToLuaWithError(L,"Wrong size of tests, got %d bytes, expected 1", (int) size);
500
501 uint32_t blockNo = 0, keyType = 0;
502 uint32_t trgBlockNo = 0, trgKeyType = 0;
503 uint32_t slow = 0, tests = 0;
504 uint32_t nonce_file_read = 0, nonce_file_write = 0;
505
506 sscanf(p_blockno, "%02x", &blockNo);
507 sscanf(p_keytype, "%x", &keyType);
508 sscanf(p_trg_blockno, "%02x", &trgBlockNo);
509 sscanf(p_trg_keytype, "%x", &trgKeyType);
510 sscanf(p_nonce_file_read, "%x", &nonce_file_read);
511 sscanf(p_nonce_file_write, "%x", &nonce_file_write);
512
513 sscanf(p_slow, "%x", &slow);
514 sscanf(p_tests, "%x", &tests);
515
516 uint8_t key[6] = {0,0,0,0,0,0};
517 uint8_t trgkey[6] = {0,0,0,0,0,0};
518 for (int i = 0; i < 32; i += 2) {
519 sscanf(&p_key[i], "%02x", (unsigned int *)&key[i / 2]);
520 if (haveTarget)
521 sscanf(&p_trgkey[i], "%02x", (unsigned int *)&trgkey[i / 2]);
522 }
523
524 uint64_t foundkey = 0;
525 int retval = mfnestedhard(blockNo, keyType, key, trgBlockNo, trgKeyType, haveTarget ? trgkey : NULL, nonce_file_read, nonce_file_write, slow, tests, &foundkey);
526
527 //Push the retval on the stack
528 lua_pushinteger(L,retval);
529
530 //Push the key onto the stack
531 uint8_t dest_key[6];
532 num_to_bytes(foundkey, sizeof(dest_key), dest_key);
533
9c624f67 534 //printf("Pushing to lua stack: %012" PRIx64 "\n",key);
e108a48a 535 lua_pushlstring(L, (const char *) dest_key, sizeof(dest_key));
536 return 2; //Two return values
537}
538
686f0a17 539/**
540 * @brief Sets the lua path to include "./lualibs/?.lua", in order for a script to be
541 * able to do "require('foobar')" if foobar.lua is within lualibs folder.
542 * Taken from http://stackoverflow.com/questions/4125971/setting-the-global-lua-path-variable-from-c-c
543 * @param L
544 * @param path
545 * @return
546 */
547int setLuaPath( lua_State* L, const char* path )
548{
549 lua_getglobal( L, "package" );
550 lua_getfield( L, -1, "path" ); // get field "path" from table at top of stack (-1)
551 const char* cur_path = lua_tostring( L, -1 ); // grab path string from top of stack
552 int requiredLength = strlen(cur_path)+ strlen(path)+10; //A few bytes too many, whatever we can afford it
553 char * buf = malloc(requiredLength);
554 snprintf(buf, requiredLength, "%s;%s", cur_path, path);
555 lua_pop( L, 1 ); // get rid of the string on the stack we just pushed on line 5
556 lua_pushstring( L, buf ); // push the new one
557 lua_setfield( L, -2, "path" ); // set the field "path" in table at -2 with value at top of stack
558 lua_pop( L, 1 ); // get rid of package table from top of stack
d730878d 559 free(buf);
664bb5ae 560 return 0; // all done!
686f0a17 561}
562
f057bddb 563int set_pm3_libraries(lua_State *L)
5b760b6c 564{
565 static const luaL_Reg libs[] = {
566 {"SendCommand", l_SendCommand},
567 {"WaitForResponseTimeout", l_WaitForResponseTimeout},
2dcdf1a6 568 {"nonce2key", l_nonce2key},
42daa759 569 //{"PrintAndLog", l_PrintAndLog},
44fffc54 570 {"foobar", l_foobar},
571 {"ukbhit", l_ukbhit},
572 {"clearCommandBuffer", l_clearCommandBuffer},
d730878d 573 {"console", l_CmdConsole},
574 {"iso15693_crc", l_iso15693_crc},
5de79e20 575 {"iso14443b_crc", l_iso14443b_crc},
b18948fd 576 {"aes128_decrypt", l_aes128decrypt_cbc},
577 {"aes128_decrypt_ecb", l_aes128decrypt_ecb},
578 {"aes128_encrypt", l_aes128encrypt_cbc},
579 {"aes128_encrypt_ecb", l_aes128encrypt_ecb},
a75d63f1 580 {"crc8legic", l_crc8legic},
47cbb2d4 581 {"crc16", l_crc16},
d730878d 582 {"crc64", l_crc64},
ea75b30c 583 {"sha1", l_sha1},
60e86577 584 {"reveng_models", l_reveng_models},
585 {"reveng_runmodel", l_reveng_RunModel},
e108a48a 586 {"hardnested", l_hardnested},
5b760b6c 587 {NULL, NULL}
588 };
589
590 lua_pushglobaltable(L);
591 // Core library is in this table. Contains '
592 //this is 'pm3' table
593 lua_newtable(L);
594
595 //Put the function into the hash table.
596 for (int i = 0; libs[i].name; i++) {
597 lua_pushcfunction(L, libs[i].func);
598 lua_setfield(L, -2, libs[i].name);//set the name, pop stack
599 }
600 //Name of 'core'
601 lua_setfield(L, -2, "core");
602
603 //-- remove the global environment table from the stack
604 lua_pop(L, 1);
686f0a17 605
606 //-- Last but not least, add to the LUA_PATH (package.path in lua)
607 // so we can load libraries from the ./lualib/ - directory
b804b9cd 608 char libraries_path[strlen(get_my_executable_directory()) + strlen(LUA_LIBRARIES_DIRECTORY) + strlen(LUA_LIBRARIES_WILDCARD) + 1];
609 strcpy(libraries_path, get_my_executable_directory());
610 strcat(libraries_path, LUA_LIBRARIES_DIRECTORY);
611 strcat(libraries_path, LUA_LIBRARIES_WILDCARD);
612 setLuaPath(L, libraries_path);
686f0a17 613
5b760b6c 614 return 1;
615}
Impressum, Datenschutz