zklib-ts
Version:
Unofficial zkteco library allows Node.js developers to easily interface with ZK BioMetric Fingerprint Attendance Devices
205 lines (204 loc) • 6.58 kB
TypeScript
export declare enum COMMANDS {
CMD_ACK_DATA = 2002,
/** There was an error when processing the request.*/
CMD_ACK_ERROR = 2001,
CMD_ACK_ERROR_CMD = 65533,
CMD_ACK_ERROR_DATA = 65531,
CMD_ACK_ERROR_INIT = 65532,
/** [0xD0, 0x07] The request was processed sucessfully. */
CMD_ACK_OK = 2000,
CMD_ACK_REPEAT = 2004,
CMD_ACK_RETRY = 2003,
/** [0xD5, 0x07] Connection not authorized. */
CMD_ACK_UNAUTH = 2005,
/** Received unknown command. */
CMD_ACK_UNKNOWN = 65535,
/** Request attendance log. */
CMD_ATTLOG_RRQ = 13,
/** [0x4E, 0x04] Request to begin session using commkey. */
CMD_AUTH = 1102,
/** Disable normal authentication of users. */
CMD_CANCELCAPTURE = 62,
/** Capture fingerprint picture. */
CMD_CAPTUREFINGER = 1009,
/** Capture the entire image. */
CMD_CAPTUREIMAGE = 1012,
/** Change transmission speed. */
CMD_CHANGE_SPEED = 1101,
/** [0x77, 0x00] Get checksum of machine's buffer. */
CMD_CHECKSUM_BUFFER = 119,
/** Restore access control to default. */
CMD_CLEAR_ACC = 32,
/** Clears admins privileges. */
CMD_CLEAR_ADMIN = 20,
/** Delete attendance record. */
CMD_CLEAR_ATTLOG = 15,
/** Delete data. */
CMD_CLEAR_DATA = 14,
/** Clear screen captions. */
CMD_CLEAR_LCD = 67,
/** Delete operations log. */
CMD_CLEAR_OPLOG = 33,
/** [0xE8, 0x03] Begin connection. */
CMD_CONNECT = 1000,
/** [0xDD, 0x05] Data packet. */
CMD_DATA = 1501,
/** Indicates that it is ready to receive data. */
CMD_DATA_RDY = 1504,
/** Read/Write a large data set. */
CMD_DATA_WRRQ = 1503,
/** Read saved data. */
CMD_DB_RRQ = 7,
/** Deletes fingerprint template. */
CMD_DEL_FPTMP = 134,
/** Delete short message. */
CMD_DELETE_SMS = 72,
/** Delete user short message. */
CMD_DELETE_UDATA = 74,
/** Delete user. */
CMD_DELETE_USER = 18,
/** Delete user fingerprint template. */
CMD_DELETE_USERTEMP = 19,
/** Disables fingerprint, rfid reader and keyboard. */
CMD_DISABLEDEVICE = 1003,
/** Get door state. */
CMD_DOORSTATE_RRQ = 75,
/** Clear Mifare card. */
CMD_EMPTY_MIFARE = 78,
/** Enables the ":" in screen clock. */
CMD_ENABLE_CLOCK = 57,
/** Change machine state to "normal work". */
CMD_ENABLEDEVICE = 1002,
/** [0xE9, 0x03] Disconnect. */
CMD_EXIT = 1001,
/** [0xDE, 0x05] Release buffer used for data transmission. */
CMD_FREE_DATA = 1502,
/** Request machine status (remaining space). */
CMD_GET_FREE_SIZES = 50,
/** Request max size for users id. */
CMD_GET_PINWIDTH = 69,
/** Request machine time. */
CMD_GET_TIME = 201,
CMD_GET_USERTEMP = 88,
/** Request the firmware edition. */
CMD_GET_VERSION = 1100,
/** Get group timezone. */
CMD_GRPTZ_RRQ = 25,
/** Set group timezone. */
CMD_GRPTZ_WRQ = 26,
/** Read operations log. */
CMD_OPLOG_RRQ = 34,
/** Read configuration value of the machine. */
CMD_OPTIONS_RRQ = 11,
/** Change configuration value of the machine. */
CMD_OPTIONS_WRQ = 12,
/** Shut-down machine. */
CMD_POWEROFF = 1005,
/** [0xDC, 0x05] Prepare for data transmission. */
CMD_PREPARE_DATA = 1500,
/** [0xF5, 0x03] Refresh the machine stored data. */
CMD_REFRESHDATA = 1013,
/** Refresh the configuration parameters. */
CMD_REFRESHOPTION = 1014,
/** Realtime events. */
CMD_REG_EVENT = 500,
/** Restart machine. */
CMD_RESTART = 1004,
/** Change machine state to "awaken". */
CMD_RESUME = 1007,
/** Set machine time. */
CMD_SET_TIME = 202,
/** Change machine state to "idle". */
CMD_SLEEP = 1006,
/** Download short message. */
CMD_SMS_RRQ = 71,
/** Upload short message. */
CMD_SMS_WRQ = 70,
/** Start enroll procedure. */
CMD_STARTENROLL = 61,
/** Set the machine to authentication state. */
CMD_STARTVERIFY = 60,
/** Query state. */
CMD_STATE_RRQ = 64,
/** Test if fingerprint exists. */
CMD_TEST_TEMP = 1011,
/** Test voice. */
CMD_TESTVOICE = 1017,
/** [0x77, 0x00] Transfer fp template from buffer. */
CMD_TMP_WRITE = 87,
/** Get device timezones. */
CMD_TZ_RRQ = 27,
/** Set device timezones. */
CMD_TZ_WRQ = 28,
/** Set user short message. */
CMD_UDATA_WRQ = 73,
/** Get group combination to unlock. */
CMD_ULG_RRQ = 29,
/** Set group combination to unlock. */
CMD_ULG_WRQ = 30,
/** Unlock door for a specified amount of time. */
CMD_UNLOCK = 31,
/** Upload user data. */
CMD_USER_WRQ = 8,
/** Read user group. */
CMD_USERGRP_RRQ = 21,
/** Set user group. */
CMD_USERGRP_WRQ = 22,
/** [0x09, 0x00] Read user fingerprint template. */
CMD_USERTEMP_RRQ = 9,
/** Upload user fingerprint template. */
CMD_USERTEMP_WRQ = 10,
/** Get user timezones. */
CMD_USERTZ_RRQ = 23,
/** Set the user timezones. */
CMD_USERTZ_WRQ = 24,
/** Read verification style of a given user. */
CMD_VERIFY_RRQ = 80,
/** Change verification style of a given user. */
CMD_VERIFY_WRQ = 79,
/** Prints chars to the device screen. */
CMD_WRITE_LCD = 66,
/** Write data to Mifare card. */
CMD_WRITE_MIFARE = 76,
/** Triggered alarm. */
EF_ALARM = 512,
/** Attendance entry. */
EF_ATTLOG = 1,
/** Pressed keyboard key. */
EF_BUTTON = 16,
/** Upload user data. */
EF_ENROLLFINGER = 8,
/** Enrolled user. */
EF_ENROLLUSER = 4,
/** Pressed finger. */
EF_FINGER = 2,
/** Fingerprint score in enroll procedure. */
EF_FPFTR = 256,
/** Restore access control to default. */
EF_UNLOCK = 32,
/** Registered user placed finger. */
EF_VERIFY = 128
}
export declare enum DISCOVERED_CMD {
/** Returned when the Finger id not exists in the user uid, when attempting to download single finger template */
FID_NOT_FOUND = 4993
}
export type CommandKeys = keyof typeof COMMANDS;
export type CommandValues = typeof COMMANDS[CommandKeys];
export declare enum Constants {
USHRT_MAX = 65535,
MAX_CHUNK = 65472,
MACHINE_PREPARE_DATA_1 = 20560,
MACHINE_PREPARE_DATA_2 = 32130
}
interface RequestData {
/** Fixed buffer to start every TCP packet */
START_TAG: Buffer;
DISABLE_DEVICE: Buffer;
GET_REAL_TIME_EVENT: Buffer;
GET_ATTENDANCE_LOGS: Buffer;
GET_USERS: Buffer;
GET_TEMPLATES: Buffer;
}
export declare const REQUEST_DATA: RequestData;
export {};