#ifndef __USB_CMD_H
#define __USB_CMD_H
+
#ifdef _MSC_VER
typedef DWORD uint32_t;
typedef BYTE uint8_t;
#define CMD_AWID_DEMOD_FSK 0x0221
#define CMD_VIKING_CLONE_TAG 0x0222
#define CMD_T55XX_WAKEUP 0x0224
+#define CMD_COTAG 0x0225
/* CMD_SET_ADC_MUX: ext1 is 0 for lopkd, 1 for loraw, 2 for hipkd, 3 for hiraw */
#define CMD_SNOOP_ISO_14443a 0x0383
#define CMD_SIMULATE_TAG_ISO_14443a 0x0384
#define CMD_READER_ISO_14443a 0x0385
+#define CMD_RAW_WRITER_LEGIC_RF 0x0386
#define CMD_SIMULATE_TAG_LEGIC_RF 0x0387
#define CMD_READER_LEGIC_RF 0x0388
#define CMD_WRITER_LEGIC_RF 0x0389
+
#define CMD_EPA_PACE_COLLECT_NONCE 0x038A
#define CMD_EPA_PACE_REPLAY 0x038B
+#define CMD_LEGIC_INFO 0x03BC
+#define CMD_LEGIC_ESET 0x03BD
+#define CMD_LEGIC_EGET 0x03BE
+
#define CMD_ICLASS_READCHECK 0x038F
#define CMD_ICLASS_CLONE 0x0390
#define CMD_ICLASS_DUMP 0x0391
//0x0725 and 0x0726 no longer used
#define CMD_MIFAREUC_SETPWD 0x0727
-
// mifare desfire
#define CMD_MIFARE_DESFIRE_READBL 0x0728
#define CMD_MIFARE_DESFIRE_WRITEBL 0x0729
#define CMD_HF_SNIFFER 0x0800
-#define CMD_UNKNOWN 0xFFFF
+// For EMV Commands
+#define CMD_EMV_READ_RECORD 0x0700
+#define CMD_EMV_TRANSACTION 0x0701
+#define CMD_EMV_CLONE 0x0702
+#define CMD_EMV_SIM 0x0703
+#define CMD_EMV_TEST 0x0704
+#define CMD_EMV_FUZZ_RATS 0x0705
+#define CMD_EMV_GET_RANDOM_NUM 0x0706
+#define CMD_EMV_LOAD_VALUE 0x0707
+#define CMD_EMV_DUMP_CARD 0x0708
+#define CMD_UNKNOWN 0xFFFF
//Mifare simulation flags
#define FLAG_INTERACTIVE 0x01
#define FLAG_10B_UID_IN_DATA 0x08
#define FLAG_UID_IN_EMUL 0x10
#define FLAG_NR_AR_ATTACK 0x20
-
+//#define FLAG_RANDOM_NONCE 0x40
//Iclass reader flags
#define FLAG_ICLASS_READER_ONLY_ONCE 0x01
#define FLAG_ICLASS_READER_ONE_TRY 0x20
#define FLAG_ICLASS_READER_CEDITKEY 0x40
-
-
// CMD_DEVICE_INFO response packet has flags in arg[0], flag definitions:
/* Whether a bootloader that understands the common_area is present */
#define DEVICE_INFO_FLAG_BOOTROM_PRESENT (1<<0)