1 //-----------------------------------------------------------------------------
2 // Copyright (C) 2010 iZsh <izsh at fail0verflow.com>
4 // This code is licensed to you under the terms of the GNU GPL, version 2 or,
5 // at your option, any later version. See the LICENSE.txt file for the text of
7 //-----------------------------------------------------------------------------
8 // Main command parser entry point
9 //-----------------------------------------------------------------------------
16 #include "cmdparser.h"
17 #include "proxmark3.h"
27 #include "cmdscript.h"
29 #include "cmdanalyse.h"
31 unsigned int current_command
= CMD_UNKNOWN
;
33 static int CmdHelp(const char *Cmd
);
34 static int CmdQuit(const char *Cmd
);
35 static int CmdRev(const char *Cmd
);
37 //For storing command that are received from the device
38 #define CMD_BUFFER_SIZE 50
39 static UsbCommand cmdBuffer
[CMD_BUFFER_SIZE
];
40 //Points to the next empty position to write to
41 static int cmd_head
;//Starts as 0
42 //Points to the position of the last unread command
43 static int cmd_tail
;//Starts as 0
45 static command_t CommandTable
[] =
47 {"help", CmdHelp
, 1, "This help. Use '<command> help' for details of a particular command."},
48 {"analyse", CmdAnalyse
, 1, "{ Analyse bytes... }"},
49 {"data", CmdData
, 1, "{ Plot window / data buffer manipulation... }"},
50 {"hf", CmdHF
, 1, "{ High Frequency commands... }"},
51 {"hw", CmdHW
, 1, "{ Hardware commands... }"},
52 {"lf", CmdLF
, 1, "{ Low Frequency commands... }"},
53 {"reveng", CmdRev
, 1, "Crc calculations from the software reveng 1.44"},
54 {"script", CmdScript
, 1, "{ Scripting commands }"},
55 {"quit", CmdQuit
, 1, "Exit program"},
56 {"exit", CmdQuit
, 1, "Exit program"},
60 command_t
* getTopLevelCommandTable()
64 int CmdHelp(const char *Cmd
)
66 CmdsHelp(CommandTable
);
70 int CmdQuit(const char *Cmd
)
75 int CmdRev(const char *Cmd
)
81 * @brief This method should be called when sending a new command to the pm3. In case any old
82 * responses from previous commands are stored in the buffer, a call to this method should clear them.
83 * A better method could have been to have explicit command-ACKS, so we can know which ACK goes to which
84 * operation. Right now we'll just have to live with this.
86 void clearCommandBuffer()
88 //This is a very simple operation
93 * @brief storeCommand stores a USB command in a circular buffer
96 void storeCommand(UsbCommand
*command
)
98 if( ( cmd_head
+1) % CMD_BUFFER_SIZE
== cmd_tail
)
100 //If these two are equal, we're about to overwrite in the
102 PrintAndLog("WARNING: Command buffer about to overwrite command! This needs to be fixed!");
104 //Store the command at the 'head' location
105 UsbCommand
* destination
= &cmdBuffer
[cmd_head
];
106 memcpy(destination
, command
, sizeof(UsbCommand
));
108 cmd_head
= (cmd_head
+1) % CMD_BUFFER_SIZE
; //increment head and wrap
112 * @brief getCommand gets a command from an internal circular buffer.
113 * @param response location to write command
114 * @return 1 if response was returned, 0 if nothing has been received
116 int getCommand(UsbCommand
* response
)
118 //If head == tail, there's nothing to read, or if we just got initialized
119 if(cmd_head
== cmd_tail
) return 0;
121 //Pick out the next unread command
122 UsbCommand
* last_unread
= &cmdBuffer
[cmd_tail
];
123 memcpy(response
, last_unread
, sizeof(UsbCommand
));
125 //Increment tail - this is a circular buffer, so modulo buffer size
126 cmd_tail
= (cmd_tail
+1 ) % CMD_BUFFER_SIZE
;
132 * Waits for a certain response type. This method waits for a maximum of
133 * ms_timeout milliseconds for a specified response command.
134 *@brief WaitForResponseTimeout
135 * @param cmd command to wait for
136 * @param response struct to copy received command into.
138 * @return true if command was returned, otherwise false
140 bool WaitForResponseTimeout(uint32_t cmd
, UsbCommand
* response
, size_t ms_timeout
) {
144 if (response
== NULL
)
147 // Wait until the command is received
148 for ( size_t dm_seconds
= 0; dm_seconds
< ms_timeout
/10; dm_seconds
++ ) {
150 while( getCommand(response
) ) {
151 if(response
->cmd
== cmd
)
155 msleep(10); // XXX ugh
156 if (dm_seconds
== 250) { // 2.5 seconds elapsed
157 PrintAndLog("Waiting for a response from the proxmark...");
158 PrintAndLog("Don't forget to cancel its operation first by pressing on the button");
164 bool WaitForResponse(uint32_t cmd
, UsbCommand
* response
) {
165 return WaitForResponseTimeout(cmd
, response
, -1);
168 //-----------------------------------------------------------------------------
169 // Entry point into our code: called whenever the user types a command and
170 // then presses Enter, which the full command line that they typed.
171 //-----------------------------------------------------------------------------
172 int CommandReceived(char *Cmd
) {
173 return CmdsParse(CommandTable
, Cmd
);
176 //-----------------------------------------------------------------------------
177 // Entry point into our code: called whenever we received a packet over USB
178 // that we weren't necessarily expecting, for example a debug print.
179 //-----------------------------------------------------------------------------
180 void UsbCommandReceived(UsbCommand
*UC
)
183 // First check if we are handling a debug message
184 case CMD_DEBUG_PRINT_STRING
: {
185 char s
[USB_CMD_DATA_SIZE
+1];
186 memset(s
, 0x00, sizeof(s
));
187 size_t len
= MIN(UC
->arg
[0],USB_CMD_DATA_SIZE
);
188 memcpy(s
, UC
->d
.asBytes
, len
);
191 if ( UC
->arg
[1] == CMD_MEASURE_ANTENNA_TUNING_HF
) {
192 printf("\r#db# %s", s
);
196 PrintAndLog("#db# %s", s
);
201 case CMD_DEBUG_PRINT_INTEGERS
: {
202 PrintAndLog("#db# %08x, %08x, %08x", UC
->arg
[0], UC
->arg
[1], UC
->arg
[2]);
205 case CMD_DOWNLOADED_RAW_ADC_SAMPLES_125K
:
206 case CMD_DOWNLOADED_EML_BIGBUF
: {
207 // sample_buf is a array pointer, located in data.c
208 // arg0 = offset in transfer. Startindex of this chunk
209 // arg1 = length bytes to transfer
210 // arg2 = bigbuff tracelength (?)
211 memcpy( sample_buf
+ (UC
->arg
[0]), UC
->d
.asBytes
, UC
->arg
[1]);
212 //printf("DBG:: Download from device. chunk %" PRIu64 " | size %" PRIu64 " | tracelen:%" PRIu64 " \n", UC->arg[0], UC->arg[1], UC->arg[2]);