ADD: started with a NEDAP demod, read, clone and sim functionality.
The encrypted part is not solveabled today.
This commit is contained in:
@@ -764,6 +764,18 @@ int PyramiddemodFSK(uint8_t *dest, size_t *size)
|
||||
return (int)startIdx;
|
||||
}
|
||||
|
||||
// find presco preamble 0x10D in already demoded data
|
||||
int NedapDemod(uint8_t *dest, size_t *size) {
|
||||
//make sure buffer has data
|
||||
if (*size < 128) return -3;
|
||||
size_t startIdx = 0;
|
||||
uint8_t preamble[] = {1,1,1,1,1,1,1,1,1,0};
|
||||
uint8_t errChk = preambleSearch(dest, preamble, sizeof(preamble), size, &startIdx);
|
||||
if (errChk == 0) return -4; //preamble not found
|
||||
//return start position
|
||||
return (int) startIdx;
|
||||
}
|
||||
|
||||
// by marshmellow
|
||||
// to detect a wave that has heavily clipped (clean) samples
|
||||
uint8_t DetectCleanAskWave(uint8_t dest[], size_t size, uint8_t high, uint8_t low)
|
||||
|
||||
@@ -55,4 +55,5 @@ int ParadoxdemodFSK(uint8_t *dest, size_t *size, uint32_t *hi2, uint32_t *hi, ui
|
||||
int PyramiddemodFSK(uint8_t *dest, size_t *size);
|
||||
int VikingDemod_AM(uint8_t *dest, size_t *size);
|
||||
int PrescoDemod(uint8_t *dest, size_t *size);
|
||||
int NedapDemod(uint8_t *dest, size_t *size);
|
||||
#endif
|
||||
|
||||
Reference in New Issue
Block a user