]> git.zerfleddert.de Git - proxmark3-svn/blobdiff - include/usb_cmd.h
Merge pull request #32 from osysltd/patch-1
[proxmark3-svn] / include / usb_cmd.h
index 8d6dd9524124922d768e9767adc77ec1c1f66dc6..e4ec049356ae60b8d0a23b92ddd67046137714c1 100644 (file)
 #ifndef __USB_CMD_H
 #define __USB_CMD_H
 #ifdef _MSC_VER
-typedef DWORD uint32_t;
-typedef BYTE uint8_t;
-#define PACKED
-// stuff
+   typedef DWORD uint32_t;
+   typedef BYTE uint8_t;
+   #define PACKED
+   // stuff
 #else
-#include <stdint.h>
-#include <stdbool.h>
-#define PACKED __attribute__((packed))
+  #include <stdint.h>
+  #include <stdbool.h>
+  #define PACKED __attribute__((packed))
 #endif
 
 #define USB_CMD_DATA_SIZE 512
@@ -109,8 +109,7 @@ typedef struct{
 
 // For the 13.56 MHz tags
 #define CMD_ACQUIRE_RAW_ADC_SAMPLES_ISO_15693                             0x0300
-#define CMD_READ_SRI512_TAG                                               0x0303
-#define CMD_READ_SRIX4K_TAG                                               0x0304
+#define CMD_READ_SRI_TAG                                                  0x0303
 #define CMD_ISO_14443B_COMMAND                                            0x0305
 #define CMD_READER_ISO_15693                                              0x0310
 #define CMD_SIMTAG_ISO_15693                                              0x0311
@@ -139,6 +138,7 @@ typedef struct{
 #define CMD_SNOOP_ISO_14443a                                              0x0383
 #define CMD_SIMULATE_TAG_ISO_14443a                                       0x0384
 #define CMD_READER_ISO_14443a                                             0x0385
+#define CMD_RAW_WRITER_LEGIC_RF                                           0x0386
 #define CMD_SIMULATE_TAG_LEGIC_RF                                         0x0387
 #define CMD_READER_LEGIC_RF                                               0x0388
 #define CMD_WRITER_LEGIC_RF                                               0x0389
@@ -214,14 +214,28 @@ typedef struct{
 
 #define CMD_HF_SNIFFER                                                    0x0800
 
+
+// For EMV Commands
+#define CMD_EMV_READ_RECORD                                               0x0700
+#define CMD_EMV_TRANSACTION                                               0x0701
+#define CMD_EMV_CLONE                                                     0x0702
+#define CMD_EMV_SIM                                                       0x0703
+#define CMD_EMV_TEST                                                      0x0704
+#define CMD_EMV_FUZZ_RATS                                                 0x0705
+#define CMD_EMV_GET_RANDOM_NUM                                            0x0706
+#define CMD_EMV_LOAD_VALUE                                                0x0707
+#define CMD_EMV_DUMP_CARD                                                 0x0708
+
 #define CMD_UNKNOWN                                                       0xFFFF
 
 
 //Mifare simulation flags
-#define FLAG_INTERACTIVE 0x01
-#define FLAG_4B_UID_IN_DATA 0x02
-#define FLAG_7B_UID_IN_DATA 0x04
-#define FLAG_NR_AR_ATTACK 0x08
+#define FLAG_INTERACTIVE               0x01
+#define FLAG_4B_UID_IN_DATA    0x02
+#define FLAG_7B_UID_IN_DATA    0x04
+#define FLAG_10B_UID_IN_DATA   0x08
+#define FLAG_UID_IN_EMUL               0x10
+#define FLAG_NR_AR_ATTACK              0x20
 
 
 //Iclass reader flags
Impressum, Datenschutz