#ifndef __USB_CMD_H
#define __USB_CMD_H
+
#ifdef _MSC_VER
-typedef DWORD uint32_t;
-typedef BYTE uint8_t;
-#define PACKED
-// stuff
+ typedef DWORD uint32_t;
+ typedef BYTE uint8_t;
+ #define PACKED
+ // stuff
#else
-#include <stdint.h>
-#include <stdbool.h>
-#define PACKED __attribute__((packed))
+ #include <stdint.h>
+ #include <stdbool.h>
+ #define PACKED __attribute__((packed))
#endif
#define USB_CMD_DATA_SIZE 512
#define CMD_BUFF_CLEAR 0x0105
#define CMD_READ_MEM 0x0106
#define CMD_VERSION 0x0107
+#define CMD_STATUS 0x0108
+#define CMD_PING 0x0109
+
+#define CMD_DOWNLOAD_EML_BIGBUF 0x0110
+#define CMD_DOWNLOADED_EML_BIGBUF 0x0111
// For low-frequency tags
#define CMD_READ_TI_TYPE 0x0202
#define CMD_INDALA_CLONE_TAG_L 0x0213
#define CMD_T55XX_READ_BLOCK 0x0214
#define CMD_T55XX_WRITE_BLOCK 0x0215
-#define CMD_T55XX_READ_TRACE 0x0216
+#define CMD_T55XX_RESET_READ 0x0216
#define CMD_PCF7931_READ 0x0217
+#define CMD_PCF7931_WRITE 0x0223
#define CMD_EM4X_READ_WORD 0x0218
#define CMD_EM4X_WRITE_WORD 0x0219
#define CMD_IO_DEMOD_FSK 0x021A
#define CMD_FSK_SIM_TAG 0x021E
#define CMD_ASK_SIM_TAG 0x021F
#define CMD_PSK_SIM_TAG 0x0220
+#define CMD_AWID_DEMOD_FSK 0x0221
+#define CMD_VIKING_CLONE_TAG 0x0222
+#define CMD_T55XX_WAKEUP 0x0224
+#define CMD_COTAG 0x0225
/* CMD_SET_ADC_MUX: ext1 is 0 for lopkd, 1 for loraw, 2 for hipkd, 3 for hiraw */
// For the 13.56 MHz tags
#define CMD_ACQUIRE_RAW_ADC_SAMPLES_ISO_15693 0x0300
-#define CMD_READ_SRI512_TAG 0x0303
-#define CMD_READ_SRIX4K_TAG 0x0304
+#define CMD_READ_SRI_TAG 0x0303
#define CMD_ISO_14443B_COMMAND 0x0305
#define CMD_READER_ISO_15693 0x0310
#define CMD_SIMTAG_ISO_15693 0x0311
#define CMD_SIMULATE_HITAG 0x0371
#define CMD_READER_HITAG 0x0372
+// For HitagS
+#define CMD_TEST_HITAGS_TRACES 0x0367
+#define CMD_SIMULATE_HITAG_S 0x0368
+#define CMD_READ_HITAG_S 0x0373
+#define CMD_WR_HITAG_S 0x0375
+#define CMD_EMU_HITAG_S 0x0376
+
+
#define CMD_SIMULATE_TAG_ISO_14443B 0x0381
#define CMD_SNOOP_ISO_14443B 0x0382
#define CMD_SNOOP_ISO_14443a 0x0383
#define CMD_SIMULATE_TAG_ISO_14443a 0x0384
#define CMD_READER_ISO_14443a 0x0385
+#define CMD_RAW_WRITER_LEGIC_RF 0x0386
#define CMD_SIMULATE_TAG_LEGIC_RF 0x0387
#define CMD_READER_LEGIC_RF 0x0388
#define CMD_WRITER_LEGIC_RF 0x0389
+
#define CMD_EPA_PACE_COLLECT_NONCE 0x038A
+#define CMD_EPA_PACE_REPLAY 0x038B
+
+#define CMD_LEGIC_INFO 0x03BC
+#define CMD_LEGIC_ESET 0x03BD
+#define CMD_LEGIC_EGET 0x03BE
+#define CMD_ICLASS_READCHECK 0x038F
+#define CMD_ICLASS_CLONE 0x0390
+#define CMD_ICLASS_DUMP 0x0391
#define CMD_SNOOP_ICLASS 0x0392
#define CMD_SIMULATE_TAG_ICLASS 0x0393
#define CMD_READER_ICLASS 0x0394
#define CMD_READER_ICLASS_REPLAY 0x0395
-#define CMD_ICLASS_ISO14443A_WRITE 0x0397
+#define CMD_ICLASS_READBLOCK 0x0396
+#define CMD_ICLASS_WRITEBLOCK 0x0397
#define CMD_ICLASS_EML_MEMSET 0x0398
+#define CMD_ICLASS_AUTHENTICATION 0x0399
// For measurements of the antenna tuning
#define CMD_MEASURE_ANTENNA_TUNING 0x0400
#define CMD_READER_MIFARE 0x0611
#define CMD_MIFARE_NESTED 0x0612
+#define CMD_MIFARE_ACQUIRE_ENCRYPTED_NONCES 0x0613
#define CMD_MIFARE_READBL 0x0620
#define CMD_MIFAREU_READBL 0x0720
//0x0725 and 0x0726 no longer used
#define CMD_MIFAREUC_SETPWD 0x0727
-
// mifare desfire
#define CMD_MIFARE_DESFIRE_READBL 0x0728
#define CMD_MIFARE_DESFIRE_WRITEBL 0x0729
#define CMD_MIFARE_COLLECT_NONCES 0x072f
-#define CMD_UNKNOWN 0xFFFF
+#define CMD_HF_SNIFFER 0x0800
+// For EMV Commands
+#define CMD_EMV_READ_RECORD 0x0700
+#define CMD_EMV_TRANSACTION 0x0701
+#define CMD_EMV_CLONE 0x0702
+#define CMD_EMV_SIM 0x0703
+#define CMD_EMV_TEST 0x0704
+#define CMD_EMV_FUZZ_RATS 0x0705
+#define CMD_EMV_GET_RANDOM_NUM 0x0706
+#define CMD_EMV_LOAD_VALUE 0x0707
+#define CMD_EMV_DUMP_CARD 0x0708
-//Mifare simulation flags
-#define FLAG_INTERACTIVE 0x01
-#define FLAG_4B_UID_IN_DATA 0x02
-#define FLAG_7B_UID_IN_DATA 0x04
-#define FLAG_NR_AR_ATTACK 0x08
+#define CMD_UNKNOWN 0xFFFF
+//Mifare simulation flags
+#define FLAG_INTERACTIVE 0x01
+#define FLAG_4B_UID_IN_DATA 0x02
+#define FLAG_7B_UID_IN_DATA 0x04
+#define FLAG_10B_UID_IN_DATA 0x08
+#define FLAG_UID_IN_EMUL 0x10
+#define FLAG_NR_AR_ATTACK 0x20
+//#define FLAG_RANDOM_NONCE 0x40
//Iclass reader flags
#define FLAG_ICLASS_READER_ONLY_ONCE 0x01
#define FLAG_ICLASS_READER_CONF 0x08
#define FLAG_ICLASS_READER_AA 0x10
#define FLAG_ICLASS_READER_ONE_TRY 0x20
-
-
+#define FLAG_ICLASS_READER_CEDITKEY 0x40
// CMD_DEVICE_INFO response packet has flags in arg[0], flag definitions:
/* Whether a bootloader that understands the common_area is present */