2013-06-07 17:27:58 +08:00
|
|
|
--[[
|
|
|
|
These are command definitions. This file should correspond exactly to usb_cmd.h.
|
|
|
|
--]]
|
|
|
|
--// For the bootloader
|
|
|
|
local _commands = {
|
|
|
|
CMD_DEVICE_INFO = 0x0000,
|
|
|
|
CMD_SETUP_WRITE = 0x0001,
|
|
|
|
CMD_FINISH_WRITE = 0x0003,
|
|
|
|
CMD_HARDWARE_RESET = 0x0004,
|
|
|
|
CMD_START_FLASH = 0x0005,
|
|
|
|
CMD_NACK = 0x00fe,
|
|
|
|
CMD_ACK = 0x00ff,
|
|
|
|
|
|
|
|
--// For general mucking around
|
|
|
|
CMD_DEBUG_PRINT_STRING = 0x0100,
|
|
|
|
CMD_DEBUG_PRINT_INTEGERS = 0x0101,
|
|
|
|
CMD_DEBUG_PRINT_BYTES = 0x0102,
|
|
|
|
CMD_LCD_RESET = 0x0103,
|
|
|
|
CMD_LCD = 0x0104,
|
|
|
|
CMD_BUFF_CLEAR = 0x0105,
|
|
|
|
CMD_READ_MEM = 0x0106,
|
|
|
|
CMD_VERSION = 0x0107,
|
|
|
|
|
|
|
|
--// For low-frequency tags
|
|
|
|
CMD_READ_TI_TYPE = 0x0202,
|
|
|
|
CMD_WRITE_TI_TYPE = 0x0203,
|
|
|
|
CMD_DOWNLOADED_RAW_BITS_TI_TYPE = 0x0204,
|
|
|
|
CMD_ACQUIRE_RAW_ADC_SAMPLES_125K = 0x0205,
|
|
|
|
CMD_MOD_THEN_ACQUIRE_RAW_ADC_SAMPLES_125K = 0x0206,
|
|
|
|
CMD_DOWNLOAD_RAW_ADC_SAMPLES_125K = 0x0207,
|
|
|
|
CMD_DOWNLOADED_RAW_ADC_SAMPLES_125K = 0x0208,
|
|
|
|
CMD_DOWNLOADED_SIM_SAMPLES_125K = 0x0209,
|
|
|
|
CMD_SIMULATE_TAG_125K = 0x020A,
|
|
|
|
CMD_HID_DEMOD_FSK = 0x020B,
|
|
|
|
CMD_HID_SIM_TAG = 0x020C,
|
|
|
|
CMD_SET_LF_DIVISOR = 0x020D,
|
|
|
|
CMD_LF_SIMULATE_BIDIR = 0x020E,
|
|
|
|
CMD_SET_ADC_MUX = 0x020F,
|
|
|
|
CMD_HID_CLONE_TAG = 0x0210,
|
|
|
|
CMD_EM410X_WRITE_TAG = 0x0211,
|
|
|
|
CMD_INDALA_CLONE_TAG = 0x0212,
|
|
|
|
--// for 224 bits UID
|
|
|
|
CMD_INDALA_CLONE_TAG_L = 0x0213,
|
|
|
|
CMD_T55XX_READ_BLOCK = 0x0214,
|
|
|
|
CMD_T55XX_WRITE_BLOCK = 0x0215,
|
|
|
|
CMD_T55XX_READ_TRACE = 0x0216,
|
|
|
|
CMD_PCF7931_READ = 0x0217,
|
|
|
|
CMD_EM4X_READ_WORD = 0x0218,
|
|
|
|
CMD_EM4X_WRITE_WORD = 0x0219,
|
2014-12-30 04:32:53 +08:00
|
|
|
CMD_IO_DEMOD_FSK = 0x021A,
|
|
|
|
CMD_IO_CLONE_TAG = 0x021B,
|
2015-01-20 16:32:53 +08:00
|
|
|
CMD_EM410X_DEMOD = 0x021c,
|
2013-06-07 17:27:58 +08:00
|
|
|
--/* CMD_SET_ADC_MUX: ext1 is 0 for lopkd, 1 for loraw, 2 for hipkd, 3 for hiraw */
|
|
|
|
|
|
|
|
--// For the 13.56 MHz tags
|
|
|
|
CMD_ACQUIRE_RAW_ADC_SAMPLES_ISO_15693 = 0x0300,
|
|
|
|
CMD_ACQUIRE_RAW_ADC_SAMPLES_ISO_14443 = 0x0301,
|
|
|
|
CMD_READ_SRI512_TAG = 0x0303,
|
|
|
|
CMD_READ_SRIX4K_TAG = 0x0304,
|
|
|
|
CMD_READER_ISO_15693 = 0x0310,
|
|
|
|
CMD_SIMTAG_ISO_15693 = 0x0311,
|
|
|
|
CMD_RECORD_RAW_ADC_SAMPLES_ISO_15693 = 0x0312,
|
|
|
|
CMD_ISO_15693_COMMAND = 0x0313,
|
|
|
|
CMD_ISO_15693_COMMAND_DONE = 0x0314,
|
|
|
|
CMD_ISO_15693_FIND_AFI = 0x0315,
|
|
|
|
CMD_ISO_15693_DEBUG = 0x0316,
|
2015-01-08 03:45:43 +08:00
|
|
|
CMD_LF_SNOOP_RAW_ADC_SAMPLES = 0x0317,
|
2013-06-07 17:27:58 +08:00
|
|
|
|
|
|
|
--// For Hitag2 transponders
|
|
|
|
CMD_SNOOP_HITAG = 0x0370,
|
|
|
|
CMD_SIMULATE_HITAG = 0x0371,
|
|
|
|
CMD_READER_HITAG = 0x0372,
|
|
|
|
|
|
|
|
CMD_SIMULATE_TAG_HF_LISTEN = 0x0380,
|
|
|
|
CMD_SIMULATE_TAG_ISO_14443 = 0x0381,
|
|
|
|
CMD_SNOOP_ISO_14443 = 0x0382,
|
|
|
|
CMD_SNOOP_ISO_14443a = 0x0383,
|
|
|
|
CMD_SIMULATE_TAG_ISO_14443a = 0x0384,
|
|
|
|
CMD_READER_ISO_14443a = 0x0385,
|
|
|
|
CMD_SIMULATE_TAG_LEGIC_RF = 0x0387,
|
|
|
|
CMD_READER_LEGIC_RF = 0x0388,
|
|
|
|
CMD_WRITER_LEGIC_RF = 0x0389,
|
|
|
|
CMD_EPA_PACE_COLLECT_NONCE = 0x038A,
|
2015-01-08 03:45:43 +08:00
|
|
|
--//CMD_EPA_ = 0x038B,
|
2013-06-07 17:27:58 +08:00
|
|
|
|
|
|
|
CMD_SNOOP_ICLASS = 0x0392,
|
|
|
|
CMD_SIMULATE_TAG_ICLASS = 0x0393,
|
|
|
|
CMD_READER_ICLASS = 0x0394,
|
2015-01-08 03:45:43 +08:00
|
|
|
CMD_READER_ICLASS_REPLAY = 0x0395,
|
|
|
|
CMD_ICLASS_ISO14443A_WRITE = 0x0397,
|
2013-06-07 17:27:58 +08:00
|
|
|
|
|
|
|
--// For measurements of the antenna tuning
|
|
|
|
CMD_MEASURE_ANTENNA_TUNING = 0x0400,
|
|
|
|
CMD_MEASURE_ANTENNA_TUNING_HF = 0x0401,
|
|
|
|
CMD_MEASURED_ANTENNA_TUNING = 0x0410,
|
|
|
|
CMD_LISTEN_READER_FIELD = 0x0420,
|
|
|
|
|
|
|
|
--// For direct FPGA control
|
|
|
|
CMD_FPGA_MAJOR_MODE_OFF = 0x0500,
|
|
|
|
|
|
|
|
--// For mifare commands
|
|
|
|
CMD_MIFARE_SET_DBGMODE = 0x0600,
|
|
|
|
CMD_MIFARE_EML_MEMCLR = 0x0601,
|
|
|
|
CMD_MIFARE_EML_MEMSET = 0x0602,
|
|
|
|
CMD_MIFARE_EML_MEMGET = 0x0603,
|
|
|
|
CMD_MIFARE_EML_CARDLOAD = 0x0604,
|
2015-01-08 05:00:29 +08:00
|
|
|
|
|
|
|
--// magic chinese card commands
|
|
|
|
CMD_MIFARE_CSETBLOCK = 0x0605,
|
|
|
|
CMD_MIFARE_CGETBLOCK = 0x0606,
|
|
|
|
CMD_MIFARE_CIDENT = 0x0607,
|
2013-06-07 17:27:58 +08:00
|
|
|
|
|
|
|
CMD_SIMULATE_MIFARE_CARD = 0x0610,
|
|
|
|
|
|
|
|
CMD_READER_MIFARE = 0x0611,
|
|
|
|
CMD_MIFARE_NESTED = 0x0612,
|
|
|
|
|
|
|
|
CMD_MIFARE_READBL = 0x0620,
|
2015-01-08 03:45:43 +08:00
|
|
|
CMD_MIFAREU_READBL = 0x0720,
|
|
|
|
|
2013-06-07 17:27:58 +08:00
|
|
|
CMD_MIFARE_READSC = 0x0621,
|
2015-01-08 03:45:43 +08:00
|
|
|
CMD_MIFAREU_READCARD = 0x0721,
|
|
|
|
|
2013-06-07 17:27:58 +08:00
|
|
|
CMD_MIFARE_WRITEBL = 0x0622,
|
2015-01-08 03:45:43 +08:00
|
|
|
CMD_MIFAREU_WRITEBL = 0x0722,
|
|
|
|
CMD_MIFAREU_WRITEBL_COMPAT = 0x0723,
|
|
|
|
|
2013-06-07 17:27:58 +08:00
|
|
|
CMD_MIFARE_CHKKEYS = 0x0623,
|
|
|
|
|
|
|
|
CMD_MIFARE_SNIFFER = 0x0630,
|
|
|
|
|
2015-01-08 03:45:43 +08:00
|
|
|
--//ultralightC
|
|
|
|
CMD_MIFAREUC_AUTH1 = 0x0724,
|
|
|
|
CMD_MIFAREUC_AUTH2 = 0x0725,
|
|
|
|
CMD_MIFAREUC_READCARD = 0x0726,
|
|
|
|
|
|
|
|
--// mifare desfire
|
|
|
|
CMD_MIFARE_DESFIRE_READBL = 0x0728,
|
|
|
|
CMD_MIFARE_DESFIRE_WRITEBL = 0x0729,
|
|
|
|
CMD_MIFARE_DESFIRE_AUTH1 = 0x072a,
|
|
|
|
CMD_MIFARE_DESFIRE_AUTH2 = 0x072b,
|
|
|
|
CMD_MIFARE_DES_READER = 0x072c,
|
|
|
|
CMD_MIFARE_DESFIRE_INFO = 0x072d,
|
|
|
|
CMD_MIFARE_DESFIRE = 0x072e,
|
|
|
|
|
2013-06-07 17:27:58 +08:00
|
|
|
CMD_UNKNOWN = 0xFFFF,
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
local _reverse_lookup,k,v = {}
|
|
|
|
for k, v in pairs(_commands) do
|
|
|
|
_reverse_lookup[v] = k
|
|
|
|
end
|
|
|
|
_commands.tostring = function(command)
|
|
|
|
if(type(command) == 'number') then
|
|
|
|
return ("%s (%d)"):format(_reverse_lookup[command]or "ERROR UNDEFINED!", command)
|
|
|
|
end
|
|
|
|
return ("Error, numeric argument expected, got : %s"):format(tostring(command))
|
|
|
|
end
|
|
|
|
|
|
|
|
Command = {
|
|
|
|
|
|
|
|
new = function(self, o)
|
|
|
|
|
|
|
|
local o = o or {} -- create object if user does not provide one
|
|
|
|
setmetatable(o, self) -- DIY inheritance a'la javascript
|
|
|
|
self.__index = self
|
|
|
|
|
|
|
|
o.cmd = o.cmd or _commands.CMD_UNKNOWN
|
|
|
|
--o.arg1 = "test"
|
|
|
|
o.arg1 = o.arg1 or 0
|
|
|
|
o.arg2 = o.arg2 or 0
|
|
|
|
o.arg3 = o.arg3 or 0
|
|
|
|
local data = o.data or "0"
|
|
|
|
|
|
|
|
if(type(data) == 'string') then
|
|
|
|
-- We need to check if it is correct length, otherwise pad it
|
|
|
|
local len = string.len(data)
|
|
|
|
if(len < 1024) then
|
|
|
|
--Should be 1024 hex characters to represent 512 bytes of data
|
|
|
|
data = data .. string.rep("0",1024 - len )
|
|
|
|
end
|
|
|
|
if(len > 1024) then
|
|
|
|
-- OOps, a bit too much data here
|
|
|
|
print( ( "WARNING: data size too large, was %s chars, will be truncated "):format(len) )
|
|
|
|
--
|
|
|
|
data = data:sub(1,1024)
|
|
|
|
end
|
|
|
|
else
|
|
|
|
print(("WARNING; data was NOT a (hex-) string, but was %s"):format(type(data)))
|
|
|
|
end
|
|
|
|
o.data = data
|
|
|
|
|
|
|
|
return o
|
|
|
|
end,
|
2013-07-04 20:56:00 +08:00
|
|
|
parse = function (packet)
|
|
|
|
local count,cmd,arg1,arg2,arg3,data = bin.unpack('LLLLH512',packet)
|
|
|
|
return Command:new{cmd = cmd, arg1 = arg1, arg2 = arg2, arg3 = arg3, data = data}
|
|
|
|
end,
|
2013-06-07 17:27:58 +08:00
|
|
|
}
|
|
|
|
function Command:__tostring()
|
|
|
|
local output = ("%s\r\nargs : (%s, %s, %s)\r\ndata:\r\n%s\r\n"):format(
|
|
|
|
_commands.tostring(self.cmd),
|
|
|
|
tostring(self.arg1),
|
|
|
|
tostring(self.arg2),
|
|
|
|
tostring(self.arg3),
|
|
|
|
tostring(self.data))
|
|
|
|
return output
|
|
|
|
end
|
|
|
|
function Command:getBytes()
|
|
|
|
--If a hex-string has been used
|
|
|
|
local data = self.data
|
|
|
|
local cmd = self.cmd
|
|
|
|
local arg1, arg2, arg3 = self.arg1, self.arg2, self.arg3
|
|
|
|
|
|
|
|
return bin.pack("LLLLH",cmd, arg1, arg2, arg3,data);
|
|
|
|
end
|
|
|
|
return _commands
|