| 1 | --[[ |
| 2 | These are command definitions. This file should correspond exactly to usb_cmd.h. |
| 3 | --]] |
| 4 | --// For the bootloader |
| 5 | local _commands = { |
| 6 | CMD_DEVICE_INFO = 0x0000, |
| 7 | CMD_SETUP_WRITE = 0x0001, |
| 8 | CMD_FINISH_WRITE = 0x0003, |
| 9 | CMD_HARDWARE_RESET = 0x0004, |
| 10 | CMD_START_FLASH = 0x0005, |
| 11 | CMD_NACK = 0x00fe, |
| 12 | CMD_ACK = 0x00ff, |
| 13 | |
| 14 | --// For general mucking around |
| 15 | CMD_DEBUG_PRINT_STRING = 0x0100, |
| 16 | CMD_DEBUG_PRINT_INTEGERS = 0x0101, |
| 17 | CMD_DEBUG_PRINT_BYTES = 0x0102, |
| 18 | CMD_LCD_RESET = 0x0103, |
| 19 | CMD_LCD = 0x0104, |
| 20 | CMD_BUFF_CLEAR = 0x0105, |
| 21 | CMD_READ_MEM = 0x0106, |
| 22 | CMD_VERSION = 0x0107, |
| 23 | CMD_STATUS = 0x0108, |
| 24 | CMD_PING = 0x0109, |
| 25 | CMD_DOWNLOAD_EML_BIGBUF = 0x0110, |
| 26 | CMD_DOWNLOADED_EML_BIGBUF = 0x0111, |
| 27 | |
| 28 | --// For low-frequency tags |
| 29 | CMD_READ_TI_TYPE = 0x0202, |
| 30 | CMD_WRITE_TI_TYPE = 0x0203, |
| 31 | CMD_DOWNLOADED_RAW_BITS_TI_TYPE = 0x0204, |
| 32 | CMD_ACQUIRE_RAW_ADC_SAMPLES_125K = 0x0205, |
| 33 | CMD_MOD_THEN_ACQUIRE_RAW_ADC_SAMPLES_125K = 0x0206, |
| 34 | CMD_DOWNLOAD_RAW_ADC_SAMPLES_125K = 0x0207, |
| 35 | CMD_DOWNLOADED_RAW_ADC_SAMPLES_125K = 0x0208, |
| 36 | CMD_DOWNLOADED_SIM_SAMPLES_125K = 0x0209, |
| 37 | CMD_SIMULATE_TAG_125K = 0x020A, |
| 38 | CMD_HID_DEMOD_FSK = 0x020B, |
| 39 | CMD_HID_SIM_TAG = 0x020C, |
| 40 | CMD_SET_LF_DIVISOR = 0x020D, |
| 41 | CMD_LF_SIMULATE_BIDIR = 0x020E, |
| 42 | CMD_SET_ADC_MUX = 0x020F, |
| 43 | CMD_HID_CLONE_TAG = 0x0210, |
| 44 | CMD_EM410X_WRITE_TAG = 0x0211, |
| 45 | CMD_INDALA_CLONE_TAG = 0x0212, |
| 46 | --// for 224 bits UID |
| 47 | CMD_INDALA_CLONE_TAG_L = 0x0213, |
| 48 | CMD_T55XX_READ_BLOCK = 0x0214, |
| 49 | CMD_T55XX_WRITE_BLOCK = 0x0215, |
| 50 | CMD_T55XX_RESET_READ = 0x0216, |
| 51 | CMD_PCF7931_READ = 0x0217, |
| 52 | CMD_PCF7931_WRITE = 0x0223, |
| 53 | CMD_EM4X_READ_WORD = 0x0218, |
| 54 | CMD_EM4X_WRITE_WORD = 0x0219, |
| 55 | CMD_IO_DEMOD_FSK = 0x021A, |
| 56 | CMD_IO_CLONE_TAG = 0x021B, |
| 57 | CMD_EM410X_DEMOD = 0x021c, |
| 58 | CMD_SET_LF_SAMPLING_CONFIG = 0x021d, |
| 59 | CMD_FSK_SIM_TAG = 0x021E, |
| 60 | CMD_ASK_SIM_TAG = 0x021F, |
| 61 | CMD_PSK_SIM_TAG = 0x0220, |
| 62 | CMD_AWID_DEMOD_FSK = 0x0221, |
| 63 | CMD_VIKING_CLONE_TAG = 0x0222, |
| 64 | CMD_T55XX_WAKEUP = 0x0224, |
| 65 | |
| 66 | --/* CMD_SET_ADC_MUX: ext1 is 0 for lopkd, 1 for loraw, 2 for hipkd, 3 for hiraw */ |
| 67 | |
| 68 | --// For the 13.56 MHz tags |
| 69 | CMD_ACQUIRE_RAW_ADC_SAMPLES_ISO_15693 = 0x0300, |
| 70 | CMD_READ_SRI_TAG = 0x0303, |
| 71 | CMD_ISO_14443B_COMMAND = 0x0305, |
| 72 | CMD_READER_ISO_15693 = 0x0310, |
| 73 | CMD_SIMTAG_ISO_15693 = 0x0311, |
| 74 | CMD_RECORD_RAW_ADC_SAMPLES_ISO_15693 = 0x0312, |
| 75 | CMD_ISO_15693_COMMAND = 0x0313, |
| 76 | CMD_ISO_15693_COMMAND_DONE = 0x0314, |
| 77 | CMD_ISO_15693_FIND_AFI = 0x0315, |
| 78 | CMD_ISO_15693_DEBUG = 0x0316, |
| 79 | CMD_LF_SNOOP_RAW_ADC_SAMPLES = 0x0317, |
| 80 | |
| 81 | --// For Hitag2 transponders |
| 82 | CMD_SNOOP_HITAG = 0x0370, |
| 83 | CMD_SIMULATE_HITAG = 0x0371, |
| 84 | CMD_READER_HITAG = 0x0372, |
| 85 | |
| 86 | --// For HitagS |
| 87 | CMD_TEST_HITAGS_TRACES = 0x0367, |
| 88 | CMD_SIMULATE_HITAG_S = 0x0368, |
| 89 | CMD_READ_HITAG_S = 0x0373, |
| 90 | CMD_WR_HITAG_S = 0x0375, |
| 91 | CMD_EMU_HITAG_S = 0x0376, |
| 92 | |
| 93 | CMD_SIMULATE_TAG_ISO_14443B = 0x0381, |
| 94 | CMD_SNOOP_ISO_14443B = 0x0382, |
| 95 | CMD_SNOOP_ISO_14443a = 0x0383, |
| 96 | CMD_SIMULATE_TAG_ISO_14443a = 0x0384, |
| 97 | CMD_READER_ISO_14443a = 0x0385, |
| 98 | CMD_SIMULATE_TAG_LEGIC_RF = 0x0387, |
| 99 | CMD_READER_LEGIC_RF = 0x0388, |
| 100 | CMD_WRITER_LEGIC_RF = 0x0389, |
| 101 | CMD_EPA_PACE_COLLECT_NONCE = 0x038A, |
| 102 | CMD_EPA_PACE_REPLAY = 0x038B, |
| 103 | |
| 104 | CMD_ICLASS_READCHECK = 0x038F, |
| 105 | CMD_ICLASS_CLONE = 0x0390, |
| 106 | CMD_ICLASS_DUMP = 0x0391, |
| 107 | CMD_SNOOP_ICLASS = 0x0392, |
| 108 | CMD_SIMULATE_TAG_ICLASS = 0x0393, |
| 109 | CMD_READER_ICLASS = 0x0394, |
| 110 | CMD_READER_ICLASS_REPLAY = 0x0395, |
| 111 | CMD_ICLASS_READBLOCK = 0x0396, |
| 112 | CMD_ICLASS_WRITEBLOCK = 0x0397, |
| 113 | CMD_ICLASS_EML_MEMSET = 0x0398, |
| 114 | CMD_ICLASS_AUTHENTICATION = 0x0399, |
| 115 | |
| 116 | --// For measurements of the antenna tuning |
| 117 | CMD_MEASURE_ANTENNA_TUNING = 0x0400, |
| 118 | CMD_MEASURE_ANTENNA_TUNING_HF = 0x0401, |
| 119 | CMD_MEASURED_ANTENNA_TUNING = 0x0410, |
| 120 | CMD_LISTEN_READER_FIELD = 0x0420, |
| 121 | |
| 122 | --// For direct FPGA control |
| 123 | CMD_FPGA_MAJOR_MODE_OFF = 0x0500, |
| 124 | |
| 125 | --// For mifare commands |
| 126 | CMD_MIFARE_SET_DBGMODE = 0x0600, |
| 127 | CMD_MIFARE_EML_MEMCLR = 0x0601, |
| 128 | CMD_MIFARE_EML_MEMSET = 0x0602, |
| 129 | CMD_MIFARE_EML_MEMGET = 0x0603, |
| 130 | CMD_MIFARE_EML_CARDLOAD = 0x0604, |
| 131 | |
| 132 | --// magic chinese card commands |
| 133 | CMD_MIFARE_CSETBLOCK = 0x0605, |
| 134 | CMD_MIFARE_CGETBLOCK = 0x0606, |
| 135 | CMD_MIFARE_CIDENT = 0x0607, |
| 136 | |
| 137 | CMD_SIMULATE_MIFARE_CARD = 0x0610, |
| 138 | |
| 139 | CMD_READER_MIFARE = 0x0611, |
| 140 | CMD_MIFARE_NESTED = 0x0612, |
| 141 | CMD_MIFARE_ACQUIRE_ENCRYPTED_NONCES = 0x0613, |
| 142 | |
| 143 | CMD_MIFARE_READBL = 0x0620, |
| 144 | CMD_MIFAREU_READBL = 0x0720, |
| 145 | |
| 146 | CMD_MIFARE_READSC = 0x0621, |
| 147 | CMD_MIFAREU_READCARD = 0x0721, |
| 148 | |
| 149 | CMD_MIFARE_WRITEBL = 0x0622, |
| 150 | CMD_MIFAREU_WRITEBL = 0x0722, |
| 151 | CMD_MIFAREU_WRITEBL_COMPAT = 0x0723, |
| 152 | |
| 153 | CMD_MIFARE_CHKKEYS = 0x0623, |
| 154 | |
| 155 | CMD_MIFARE_SNIFFER = 0x0630, |
| 156 | |
| 157 | --//ultralightC |
| 158 | CMD_MIFAREUC_AUTH = 0x0724, |
| 159 | CMD_MIFAREUC_SETPWD = 0x0727, |
| 160 | CMD_MIFAREU_SETUID = 0x0728, |
| 161 | |
| 162 | --// mifare desfire |
| 163 | CMD_MIFARE_DESFIRE_READBL = 0x0728, |
| 164 | CMD_MIFARE_DESFIRE_WRITEBL = 0x0729, |
| 165 | CMD_MIFARE_DESFIRE_AUTH1 = 0x072a, |
| 166 | CMD_MIFARE_DESFIRE_AUTH2 = 0x072b, |
| 167 | CMD_MIFARE_DES_READER = 0x072c, |
| 168 | CMD_MIFARE_DESFIRE_INFO = 0x072d, |
| 169 | CMD_MIFARE_DESFIRE = 0x072e, |
| 170 | CMD_HF_SNIFFER = 0x0800, |
| 171 | |
| 172 | CMD_UNKNOWN = 0xFFFF, |
| 173 | } |
| 174 | |
| 175 | |
| 176 | local _reverse_lookup,k,v = {} |
| 177 | for k, v in pairs(_commands) do |
| 178 | _reverse_lookup[v] = k |
| 179 | end |
| 180 | _commands.tostring = function(command) |
| 181 | if(type(command) == 'number') then |
| 182 | return ("%s (%d)"):format(_reverse_lookup[command]or "ERROR UNDEFINED!", command) |
| 183 | end |
| 184 | return ("Error, numeric argument expected, got : %s"):format(tostring(command)) |
| 185 | end |
| 186 | |
| 187 | Command = { |
| 188 | |
| 189 | new = function(self, o) |
| 190 | |
| 191 | local o = o or {} -- create object if user does not provide one |
| 192 | setmetatable(o, self) -- DIY inheritance a'la javascript |
| 193 | self.__index = self |
| 194 | |
| 195 | o.cmd = o.cmd or _commands.CMD_UNKNOWN |
| 196 | o.arg1 = o.arg1 or 0 |
| 197 | o.arg2 = o.arg2 or 0 |
| 198 | o.arg3 = o.arg3 or 0 |
| 199 | local data = o.data or "0" |
| 200 | |
| 201 | if(type(data) == 'string') then |
| 202 | -- We need to check if it is correct length, otherwise pad it |
| 203 | local len = string.len(data) |
| 204 | if(len < 1024) then |
| 205 | --Should be 1024 hex characters to represent 512 bytes of data |
| 206 | data = data .. string.rep("0",1024 - len ) |
| 207 | end |
| 208 | if(len > 1024) then |
| 209 | -- OOps, a bit too much data here |
| 210 | print( ( "WARNING: data size too large, was %s chars, will be truncated "):format(len) ) |
| 211 | -- |
| 212 | data = data:sub(1,1024) |
| 213 | end |
| 214 | else |
| 215 | print(("WARNING; data was NOT a (hex-) string, but was %s"):format(type(data))) |
| 216 | end |
| 217 | o.data = data |
| 218 | return o |
| 219 | end, |
| 220 | parse = function(packet) |
| 221 | local count, cmd, arg1, arg2, arg3, data = bin.unpack('LLLLH511', packet) |
| 222 | return Command:new{cmd = cmd, arg1 = arg1, arg2 = arg2, arg3 = arg3, data = data} |
| 223 | end |
| 224 | |
| 225 | } |
| 226 | function Command:__tostring() |
| 227 | local output = ("%s\r\nargs : (%s, %s, %s)\r\ndata:\r\n%s\r\n"):format( |
| 228 | _commands.tostring(self.cmd), |
| 229 | tostring(self.arg1), |
| 230 | tostring(self.arg2), |
| 231 | tostring(self.arg3), |
| 232 | tostring(self.data)) |
| 233 | return output |
| 234 | end |
| 235 | function Command:getBytes() |
| 236 | --If a hex-string has been used |
| 237 | local data = self.data |
| 238 | local cmd = self.cmd |
| 239 | local arg1, arg2, arg3 = self.arg1, self.arg2, self.arg3 |
| 240 | return bin.pack("LLLLH", cmd, arg1, arg2, arg3, data); |
| 241 | end |
| 242 | return _commands |