]> cvs.zerfleddert.de Git - proxmark3-svn/blame - client/lualibs/commands.lua
CHG: the mifare Auth command can make use of a random nonce aswell.
[proxmark3-svn] / client / lualibs / commands.lua
CommitLineData
21452811 1--[[
2These are command definitions. This file should correspond exactly to usb_cmd.h.
3--]]
4--// For the bootloader
5local _commands = {
6 CMD_DEVICE_INFO = 0x0000,
7 CMD_SETUP_WRITE = 0x0001,
8 CMD_FINISH_WRITE = 0x0003,
9 CMD_HARDWARE_RESET = 0x0004,
10 CMD_START_FLASH = 0x0005,
11 CMD_NACK = 0x00fe,
12 CMD_ACK = 0x00ff,
13
14 --// For general mucking around
15 CMD_DEBUG_PRINT_STRING = 0x0100,
16 CMD_DEBUG_PRINT_INTEGERS = 0x0101,
17 CMD_DEBUG_PRINT_BYTES = 0x0102,
18 CMD_LCD_RESET = 0x0103,
19 CMD_LCD = 0x0104,
20 CMD_BUFF_CLEAR = 0x0105,
21 CMD_READ_MEM = 0x0106,
22 CMD_VERSION = 0x0107,
7838f4be 23 CMD_STATUS = 0x0108,
24 CMD_PING = 0x0109,
aaa1a9a2 25 CMD_DOWNLOAD_EML_BIGBUF = 0x0110,
26 CMD_DOWNLOADED_EML_BIGBUF = 0x0111,
27
21452811 28 --// For low-frequency tags
29 CMD_READ_TI_TYPE = 0x0202,
30 CMD_WRITE_TI_TYPE = 0x0203,
31 CMD_DOWNLOADED_RAW_BITS_TI_TYPE = 0x0204,
32 CMD_ACQUIRE_RAW_ADC_SAMPLES_125K = 0x0205,
33 CMD_MOD_THEN_ACQUIRE_RAW_ADC_SAMPLES_125K = 0x0206,
34 CMD_DOWNLOAD_RAW_ADC_SAMPLES_125K = 0x0207,
35 CMD_DOWNLOADED_RAW_ADC_SAMPLES_125K = 0x0208,
36 CMD_DOWNLOADED_SIM_SAMPLES_125K = 0x0209,
37 CMD_SIMULATE_TAG_125K = 0x020A,
38 CMD_HID_DEMOD_FSK = 0x020B,
39 CMD_HID_SIM_TAG = 0x020C,
40 CMD_SET_LF_DIVISOR = 0x020D,
41 CMD_LF_SIMULATE_BIDIR = 0x020E,
42 CMD_SET_ADC_MUX = 0x020F,
43 CMD_HID_CLONE_TAG = 0x0210,
44 CMD_EM410X_WRITE_TAG = 0x0211,
45 CMD_INDALA_CLONE_TAG = 0x0212,
46 --// for 224 bits UID
47 CMD_INDALA_CLONE_TAG_L = 0x0213,
48 CMD_T55XX_READ_BLOCK = 0x0214,
49 CMD_T55XX_WRITE_BLOCK = 0x0215,
94422fa2 50 CMD_T55XX_RESET_READ = 0x0216,
21452811 51 CMD_PCF7931_READ = 0x0217,
f3cfe428 52 CMD_PCF7931_WRITE = 0x0223,
21452811 53 CMD_EM4X_READ_WORD = 0x0218,
54 CMD_EM4X_WRITE_WORD = 0x0219,
b1329a02 55 CMD_IO_DEMOD_FSK = 0x021A,
abd6112f 56 CMD_IO_CLONE_TAG = 0x021B,
57 CMD_EM410X_DEMOD = 0x021c,
58 CMD_SET_LF_SAMPLING_CONFIG = 0x021d,
59 CMD_FSK_SIM_TAG = 0x021E,
60 CMD_ASK_SIM_TAG = 0x021F,
872e3d4d 61 CMD_PSK_SIM_TAG = 0x0220,
db25599d 62 CMD_AWID_DEMOD_FSK = 0x0221,
0de8e387 63 CMD_VIKING_CLONE_TAG = 0x0222,
9276e859 64 CMD_T55XX_WAKEUP = 0x0224,
4653da43 65 CMD_COTAG = 0x0225,
0de8e387 66
21452811 67 --/* CMD_SET_ADC_MUX: ext1 is 0 for lopkd, 1 for loraw, 2 for hipkd, 3 for hiraw */
68
69 --// For the 13.56 MHz tags
70 CMD_ACQUIRE_RAW_ADC_SAMPLES_ISO_15693 = 0x0300,
6fc68747 71 CMD_READ_SRI_TAG = 0x0303,
14e18625 72 CMD_ISO_14443B_COMMAND = 0x0305,
21452811 73 CMD_READER_ISO_15693 = 0x0310,
74 CMD_SIMTAG_ISO_15693 = 0x0311,
75 CMD_RECORD_RAW_ADC_SAMPLES_ISO_15693 = 0x0312,
76 CMD_ISO_15693_COMMAND = 0x0313,
77 CMD_ISO_15693_COMMAND_DONE = 0x0314,
78 CMD_ISO_15693_FIND_AFI = 0x0315,
79 CMD_ISO_15693_DEBUG = 0x0316,
b1329a02 80 CMD_LF_SNOOP_RAW_ADC_SAMPLES = 0x0317,
21452811 81
82 --// For Hitag2 transponders
83 CMD_SNOOP_HITAG = 0x0370,
84 CMD_SIMULATE_HITAG = 0x0371,
85 CMD_READER_HITAG = 0x0372,
86
0db11b71 87 --// For HitagS
88 CMD_TEST_HITAGS_TRACES = 0x0367,
89 CMD_SIMULATE_HITAG_S = 0x0368,
90 CMD_READ_HITAG_S = 0x0373,
91 CMD_WR_HITAG_S = 0x0375,
92 CMD_EMU_HITAG_S = 0x0376,
93
22e24700 94 CMD_SIMULATE_TAG_ISO_14443B = 0x0381,
95 CMD_SNOOP_ISO_14443B = 0x0382,
21452811 96 CMD_SNOOP_ISO_14443a = 0x0383,
97 CMD_SIMULATE_TAG_ISO_14443a = 0x0384,
98 CMD_READER_ISO_14443a = 0x0385,
83dad64b 99 CMD_RAW_WRITER_LEGIC_RF = 0x0386,
21452811 100 CMD_SIMULATE_TAG_LEGIC_RF = 0x0387,
101 CMD_READER_LEGIC_RF = 0x0388,
102 CMD_WRITER_LEGIC_RF = 0x0389,
3e750be3 103
21452811 104 CMD_EPA_PACE_COLLECT_NONCE = 0x038A,
d0f3338e 105 CMD_EPA_PACE_REPLAY = 0x038B,
21452811 106
3e750be3 107 CMD_LEGIC_INFO = 0x03BC,
0e8cabed 108 CMD_LEGIC_ESET = 0x03BD,
109 CMD_LEGIC_EGET = 0x03BE,
110
111
e98572a1 112 CMD_ICLASS_READCHECK = 0x038F,
113 CMD_ICLASS_CLONE = 0x0390,
114 CMD_ICLASS_DUMP = 0x0391,
21452811 115 CMD_SNOOP_ICLASS = 0x0392,
116 CMD_SIMULATE_TAG_ICLASS = 0x0393,
117 CMD_READER_ICLASS = 0x0394,
b1329a02 118 CMD_READER_ICLASS_REPLAY = 0x0395,
e98572a1 119 CMD_ICLASS_READBLOCK = 0x0396,
120 CMD_ICLASS_WRITEBLOCK = 0x0397,
121 CMD_ICLASS_EML_MEMSET = 0x0398,
122 CMD_ICLASS_AUTHENTICATION = 0x0399,
21452811 123
124 --// For measurements of the antenna tuning
125 CMD_MEASURE_ANTENNA_TUNING = 0x0400,
126 CMD_MEASURE_ANTENNA_TUNING_HF = 0x0401,
127 CMD_MEASURED_ANTENNA_TUNING = 0x0410,
128 CMD_LISTEN_READER_FIELD = 0x0420,
129
130 --// For direct FPGA control
131 CMD_FPGA_MAJOR_MODE_OFF = 0x0500,
132
133 --// For mifare commands
134 CMD_MIFARE_SET_DBGMODE = 0x0600,
135 CMD_MIFARE_EML_MEMCLR = 0x0601,
136 CMD_MIFARE_EML_MEMSET = 0x0602,
137 CMD_MIFARE_EML_MEMGET = 0x0603,
138 CMD_MIFARE_EML_CARDLOAD = 0x0604,
b1329a02 139
140 --// magic chinese card commands
141 CMD_MIFARE_CSETBLOCK = 0x0605,
142 CMD_MIFARE_CGETBLOCK = 0x0606,
143 CMD_MIFARE_CIDENT = 0x0607,
21452811 144
145 CMD_SIMULATE_MIFARE_CARD = 0x0610,
146
147 CMD_READER_MIFARE = 0x0611,
148 CMD_MIFARE_NESTED = 0x0612,
c188b1b9 149 CMD_MIFARE_ACQUIRE_ENCRYPTED_NONCES = 0x0613,
21452811 150
151 CMD_MIFARE_READBL = 0x0620,
b1329a02 152 CMD_MIFAREU_READBL = 0x0720,
153
21452811 154 CMD_MIFARE_READSC = 0x0621,
b1329a02 155 CMD_MIFAREU_READCARD = 0x0721,
156
21452811 157 CMD_MIFARE_WRITEBL = 0x0622,
b1329a02 158 CMD_MIFAREU_WRITEBL = 0x0722,
159 CMD_MIFAREU_WRITEBL_COMPAT = 0x0723,
160
21452811 161 CMD_MIFARE_CHKKEYS = 0x0623,
162
163 CMD_MIFARE_SNIFFER = 0x0630,
164
b1329a02 165 --//ultralightC
e7e95088 166 CMD_MIFAREUC_AUTH = 0x0724,
aa60d156 167 CMD_MIFAREUC_SETPWD = 0x0727,
168 CMD_MIFAREU_SETUID = 0x0728,
b1329a02 169
170 --// mifare desfire
171 CMD_MIFARE_DESFIRE_READBL = 0x0728,
172 CMD_MIFARE_DESFIRE_WRITEBL = 0x0729,
173 CMD_MIFARE_DESFIRE_AUTH1 = 0x072a,
174 CMD_MIFARE_DESFIRE_AUTH2 = 0x072b,
175 CMD_MIFARE_DES_READER = 0x072c,
176 CMD_MIFARE_DESFIRE_INFO = 0x072d,
177 CMD_MIFARE_DESFIRE = 0x072e,
1d0ccbe0 178 CMD_HF_SNIFFER = 0x0800,
179
83dad64b 180
181 --// For EMV Commands
182 CMD_EMV_READ_RECORD = 0x0700,
183 CMD_EMV_TRANSACTION = 0x0701,
184 CMD_EMV_CLONE = 0x0702,
185 CMD_EMV_SIM = 0x0703,
186 CMD_EMV_TEST = 0x0704,
187 CMD_EMV_FUZZ_RATS = 0x0705,
188 CMD_EMV_GET_RANDOM_NUM = 0x0706,
189 CMD_EMV_LOAD_VALUE = 0x0707,
190 CMD_EMV_DUMP_CARD = 0x0708,
191
21452811 192 CMD_UNKNOWN = 0xFFFF,
193}
194
195
196local _reverse_lookup,k,v = {}
f62b5e12 197for k, v in pairs(_commands) do
198 _reverse_lookup[v] = k
199end
200_commands.tostring = function(command)
21452811 201 if(type(command) == 'number') then
202 return ("%s (%d)"):format(_reverse_lookup[command]or "ERROR UNDEFINED!", command)
203 end
204 return ("Error, numeric argument expected, got : %s"):format(tostring(command))
205end
206
207Command = {
208
209 new = function(self, o)
210
211 local o = o or {} -- create object if user does not provide one
212 setmetatable(o, self) -- DIY inheritance a'la javascript
213 self.__index = self
214
215 o.cmd = o.cmd or _commands.CMD_UNKNOWN
21452811 216 o.arg1 = o.arg1 or 0
217 o.arg2 = o.arg2 or 0
218 o.arg3 = o.arg3 or 0
219 local data = o.data or "0"
220
221 if(type(data) == 'string') then
222 -- We need to check if it is correct length, otherwise pad it
223 local len = string.len(data)
224 if(len < 1024) then
225 --Should be 1024 hex characters to represent 512 bytes of data
226 data = data .. string.rep("0",1024 - len )
227 end
228 if(len > 1024) then
229 -- OOps, a bit too much data here
230 print( ( "WARNING: data size too large, was %s chars, will be truncated "):format(len) )
231 --
232 data = data:sub(1,1024)
233 end
234 else
235 print(("WARNING; data was NOT a (hex-) string, but was %s"):format(type(data)))
236 end
f62b5e12 237 o.data = data
21452811 238 return o
239 end,
f62b5e12 240 parse = function(packet)
0de8e387 241 local count, cmd, arg1, arg2, arg3, data = bin.unpack('LLLLH511', packet)
4df3eb3f 242 return Command:new{cmd = cmd, arg1 = arg1, arg2 = arg2, arg3 = arg3, data = data}
f62b5e12 243 end
244
21452811 245}
246function Command:__tostring()
247 local output = ("%s\r\nargs : (%s, %s, %s)\r\ndata:\r\n%s\r\n"):format(
248 _commands.tostring(self.cmd),
249 tostring(self.arg1),
250 tostring(self.arg2),
251 tostring(self.arg3),
252 tostring(self.data))
253 return output
254end
255function Command:getBytes()
256 --If a hex-string has been used
257 local data = self.data
258 local cmd = self.cmd
259 local arg1, arg2, arg3 = self.arg1, self.arg2, self.arg3
6fc68747 260 return bin.pack("LLLLH", cmd, arg1, arg2, arg3, data);
21452811 261end
abd6112f 262return _commands
Impressum, Datenschutz