X-Git-Url: http://cvs.zerfleddert.de/cgi-bin/gitweb.cgi/proxmark3-svn/blobdiff_plain/aaa1a9a2dcb8b9f2b6acd937f84464daa50ecad6..22eece1e2dc01228d44439876ba6814976b0deab:/include/usb_cmd.h diff --git a/include/usb_cmd.h b/include/usb_cmd.h index 8d6dd952..3fd2cedd 100644 --- a/include/usb_cmd.h +++ b/include/usb_cmd.h @@ -13,14 +13,14 @@ #ifndef __USB_CMD_H #define __USB_CMD_H #ifdef _MSC_VER -typedef DWORD uint32_t; -typedef BYTE uint8_t; -#define PACKED -// stuff + typedef DWORD uint32_t; + typedef BYTE uint8_t; + #define PACKED + // stuff #else -#include -#include -#define PACKED __attribute__((packed)) + #include + #include + #define PACKED __attribute__((packed)) #endif #define USB_CMD_DATA_SIZE 512 @@ -109,8 +109,7 @@ typedef struct{ // For the 13.56 MHz tags #define CMD_ACQUIRE_RAW_ADC_SAMPLES_ISO_15693 0x0300 -#define CMD_READ_SRI512_TAG 0x0303 -#define CMD_READ_SRIX4K_TAG 0x0304 +#define CMD_READ_SRI_TAG 0x0303 #define CMD_ISO_14443B_COMMAND 0x0305 #define CMD_READER_ISO_15693 0x0310 #define CMD_SIMTAG_ISO_15693 0x0311 @@ -139,12 +138,18 @@ typedef struct{ #define CMD_SNOOP_ISO_14443a 0x0383 #define CMD_SIMULATE_TAG_ISO_14443a 0x0384 #define CMD_READER_ISO_14443a 0x0385 +#define CMD_RAW_WRITER_LEGIC_RF 0x0386 #define CMD_SIMULATE_TAG_LEGIC_RF 0x0387 #define CMD_READER_LEGIC_RF 0x0388 #define CMD_WRITER_LEGIC_RF 0x0389 + #define CMD_EPA_PACE_COLLECT_NONCE 0x038A #define CMD_EPA_PACE_REPLAY 0x038B +#define CMD_LEGIC_INFO 0x03BC +#define CMD_LEGIC_ESET 0x03BD +#define CMD_LEGIC_EGET 0x03BE + #define CMD_ICLASS_READCHECK 0x038F #define CMD_ICLASS_CLONE 0x0390 #define CMD_ICLASS_DUMP 0x0391 @@ -214,14 +219,28 @@ typedef struct{ #define CMD_HF_SNIFFER 0x0800 + +// For EMV Commands +#define CMD_EMV_READ_RECORD 0x0700 +#define CMD_EMV_TRANSACTION 0x0701 +#define CMD_EMV_CLONE 0x0702 +#define CMD_EMV_SIM 0x0703 +#define CMD_EMV_TEST 0x0704 +#define CMD_EMV_FUZZ_RATS 0x0705 +#define CMD_EMV_GET_RANDOM_NUM 0x0706 +#define CMD_EMV_LOAD_VALUE 0x0707 +#define CMD_EMV_DUMP_CARD 0x0708 + #define CMD_UNKNOWN 0xFFFF //Mifare simulation flags -#define FLAG_INTERACTIVE 0x01 -#define FLAG_4B_UID_IN_DATA 0x02 -#define FLAG_7B_UID_IN_DATA 0x04 -#define FLAG_NR_AR_ATTACK 0x08 +#define FLAG_INTERACTIVE 0x01 +#define FLAG_4B_UID_IN_DATA 0x02 +#define FLAG_7B_UID_IN_DATA 0x04 +#define FLAG_10B_UID_IN_DATA 0x08 +#define FLAG_UID_IN_EMUL 0x10 +#define FLAG_NR_AR_ATTACK 0x20 //Iclass reader flags