]> cvs.zerfleddert.de Git - proxmark3-svn/blame - client/cmdhflegic.c
ADD: `analyse nuid` - generates NUID 4byte from a UID 7byte. Mifare Classic Ev1...
[proxmark3-svn] / client / cmdhflegic.c
CommitLineData
a553f267 1//-----------------------------------------------------------------------------
2// Copyright (C) 2010 iZsh <izsh at fail0verflow.com>
3//
4// This code is licensed to you under the terms of the GNU GPL, version 2 or,
5// at your option, any later version. See the LICENSE.txt file for the text of
6// the license.
7//-----------------------------------------------------------------------------
8// High frequency Legic commands
9//-----------------------------------------------------------------------------
7fe9b0b7 10#include "cmdhflegic.h"
3e134b4c 11
7fe9b0b7 12static int CmdHelp(const char *Cmd);
13
ffa306de 14#define MAX_LENGTH 1024
15
f6e01a34 16int usage_legic_calccrc(void){
5b9fb6f4 17 PrintAndLog("Calculates the legic crc8/crc16 on the given data.");
3b920280 18 PrintAndLog("There must be an even number of hexsymbols as input.");
5b9fb6f4 19 PrintAndLog("Usage: hf legic crc [h] d <data> u <uidcrc> c <8|16>");
514ddaa2 20 PrintAndLog("Options:");
ffa306de 21 PrintAndLog(" h : this help");
5b9fb6f4 22 PrintAndLog(" d <data> : (hex symbols) bytes to calculate crc over");
3e134b4c 23 PrintAndLog(" u <uidcrc> : MCC hexbyte");
5b9fb6f4 24 PrintAndLog(" c <8|16> : Crc type");
3b920280 25 PrintAndLog("");
514ddaa2 26 PrintAndLog("Samples:");
f6e01a34 27 PrintAndLog(" hf legic crc b deadbeef1122");
28 PrintAndLog(" hf legic crc b deadbeef1122 u 9A c 16");
3b920280 29 return 0;
30}
00271f77 31int usage_legic_rdmem(void){
cbdcc89a 32 PrintAndLog("Read data from a legic tag.");
00271f77 33 PrintAndLog("Usage: hf legic rdmem [h] <offset> <length> <IV>");
514ddaa2 34 PrintAndLog("Options:");
5b9fb6f4 35 PrintAndLog(" h : this help");
36 PrintAndLog(" <offset> : (hex) offset in data array to start download from");
37 PrintAndLog(" <length> : (hex) number of bytes to read");
38 PrintAndLog(" <IV> : (hex) (optional) Initialization vector to use. Must be odd and 7bits max");
cbdcc89a 39 PrintAndLog("");
514ddaa2 40 PrintAndLog("Samples:");
5b9fb6f4 41 PrintAndLog(" hf legic rdmem 0 16 - reads from byte[0] 0x16 bytes(system header)");
42 PrintAndLog(" hf legic rdmem 0 4 55 - reads from byte[0] 0x4 bytes with IV 0x55");
43 PrintAndLog(" hf legic rdmem 0 100 55 - reads 0x100 bytes with IV 0x55");
cbdcc89a 44 return 0;
45}
e8fecd72 46int usage_legic_sim(void){
5b9fb6f4 47 PrintAndLog("Simulates a LEGIC Prime tag. MIM22, MIM256, MIM1024 types can be emulated");
48 PrintAndLog("Use eload/esave to upload a dump into emulator memory");
49 PrintAndLog("Usage: hf legic sim [h] <tagtype> <phase> <frame> <reqresp>");
50 PrintAndLog("Options:");
51 PrintAndLog(" h : this help");
52 PrintAndLog(" <tagtype> : 0 = MIM22");
53 PrintAndLog(" : 1 = MIM256 (default)");
54 PrintAndLog(" : 2 = MIM1024");
55 PrintAndLog(" <phase> : phase drift");
56 PrintAndLog(" <frame> : frame drift");
57 PrintAndLog(" <reqresp> : reqresp drift");
58 PrintAndLog("");
59 PrintAndLog("Samples:");
60 PrintAndLog(" hf legic sim");
61 PrintAndLog(" hf legic sim ");
ffa306de 62 return 0;
63}
64int usage_legic_write(void){
5b9fb6f4 65 PrintAndLog("Write data to a LEGIC Prime tag. It autodetects tagsize to make sure size");
f0fa6638 66 PrintAndLog("Usage: hf legic write [h] o <offset> d <data (hex symbols)>");
ffa306de 67 PrintAndLog("Options:");
5b9fb6f4 68 PrintAndLog(" h : this help");
69 PrintAndLog(" o <offset> : (hex) offset in data array to start writing");
f0fa6638 70 //PrintAndLog(" <IV> : (optional) Initialization vector to use (ODD and 7bits)");
5b9fb6f4 71 PrintAndLog(" d <data> : (hex symbols) bytes to write ");
ffa306de 72 PrintAndLog("");
73 PrintAndLog("Samples:");
f0fa6638 74 PrintAndLog(" hf legic write o 10 d 11223344 - Write 0x11223344 starting from offset 0x10");
e8fecd72 75 return 0;
76}
633d0686 77int usage_legic_reader(void){
78 PrintAndLog("Read UID and type information from a legic tag.");
79 PrintAndLog("Usage: hf legic reader [h]");
80 PrintAndLog("Options:");
5b9fb6f4 81 PrintAndLog(" h : this help");
633d0686 82 PrintAndLog("");
83 PrintAndLog("Samples:");
84 PrintAndLog(" hf legic reader");
85 return 0;
86}
3e750be3 87int usage_legic_info(void){
633d0686 88 PrintAndLog("Reads information from a legic prime tag.");
89 PrintAndLog("Shows systemarea, user areas etc");
3e750be3 90 PrintAndLog("Usage: hf legic info [h]");
91 PrintAndLog("Options:");
5b9fb6f4 92 PrintAndLog(" h : this help");
3e750be3 93 PrintAndLog("");
94 PrintAndLog("Samples:");
95 PrintAndLog(" hf legic info");
96 return 0;
97}
633d0686 98int usage_legic_dump(void){
5b9fb6f4 99 PrintAndLog("Reads all pages from LEGIC Prime MIM22, MIM256, MIM1024");
633d0686 100 PrintAndLog("and saves binary dump into the file `filename.bin` or `cardUID.bin`");
101 PrintAndLog("It autodetects card type.\n");
102 PrintAndLog("Usage: hf legic dump [h] o <filename w/o .bin>");
103 PrintAndLog("Options:");
5b9fb6f4 104 PrintAndLog(" h : this help");
105 PrintAndLog(" o <filename> : filename w/o '.bin' to dump bytes");
633d0686 106 PrintAndLog("");
107 PrintAndLog("Samples:");
108 PrintAndLog(" hf legic dump");
109 PrintAndLog(" hf legic dump o myfile");
110 return 0;
111}
5b9fb6f4 112int usage_legic_restore(void){
113 PrintAndLog("Reads binary file and it autodetects card type and verifies that the file has the same size");
114 PrintAndLog("Then write the data back to card. All bytes except the first 7bytes [UID(4) MCC(1) DCF(2)]\n");
115 PrintAndLog("Usage: hf legic restore [h] i <filename w/o .bin>");
116 PrintAndLog("Options:");
117 PrintAndLog(" h : this help");
118 PrintAndLog(" i <filename> : filename w/o '.bin' to restore bytes on to card from");
119 PrintAndLog("");
120 PrintAndLog("Samples:");
121 PrintAndLog(" hf legic restore i myfile");
122 return 0;
123}
0e8cabed 124int usage_legic_eload(void){
125 PrintAndLog("It loads binary dump from the file `filename.bin`");
126 PrintAndLog("Usage: hf legic eload [h] [card memory] <file name w/o `.bin`>");
127 PrintAndLog("Options:");
5b9fb6f4 128 PrintAndLog(" h : this help");
129 PrintAndLog(" [card memory] : 0 = MIM22");
130 PrintAndLog(" : 1 = MIM256 (default)");
131 PrintAndLog(" : 2 = MIM1024");
132 PrintAndLog(" <filename> : filename w/o .bin to load");
0e8cabed 133 PrintAndLog("");
134 PrintAndLog("Samples:");
5b9fb6f4 135 PrintAndLog(" hf legic eload 2 myfile");
0e8cabed 136 return 0;
137}
138int usage_legic_esave(void){
139 PrintAndLog("It saves binary dump into the file `filename.bin` or `cardID.bin`");
140 PrintAndLog(" Usage: hf legic esave [h] [card memory] [file name w/o `.bin`]");
141 PrintAndLog("Options:");
5b9fb6f4 142 PrintAndLog(" h : this help");
143 PrintAndLog(" [card memory] : 0 = MIM22");
144 PrintAndLog(" : 1 = MIM256 (default)");
145 PrintAndLog(" : 2 = MIM1024");
146 PrintAndLog(" <filename> : filename w/o .bin to load");
0e8cabed 147 PrintAndLog("");
148 PrintAndLog("Samples:");
5b9fb6f4 149 PrintAndLog(" hf legic esave 2 myfile");
0e8cabed 150 return 0;
151}
1f247f6a 152int usage_legic_wipe(void){
153 PrintAndLog("Fills a legic tag memory with zeros. From byte7 and to the end.");
154 PrintAndLog(" Usage: hf legic wipe [h]");
155 PrintAndLog("Options:");
156 PrintAndLog(" h : this help");
157 PrintAndLog("");
158 PrintAndLog("Samples:");
159 PrintAndLog(" hf legic wipe");
160 return 0;
161}
669c1b80 162/*
163 * Output BigBuf and deobfuscate LEGIC RF tag data.
cbdcc89a 164 * This is based on information given in the talk held
669c1b80 165 * by Henryk Ploetz and Karsten Nohl at 26c3
669c1b80 166 */
633d0686 167int CmdLegicInfo(const char *Cmd) {
168
169 char cmdp = param_getchar(Cmd, 0);
170 if ( cmdp == 'H' || cmdp == 'h' ) return usage_legic_info();
e8fecd72 171
172 int i = 0, k = 0, segmentNum = 0, segment_len = 0, segment_flag = 0;
173 int crc = 0, wrp = 0, wrc = 0;
60bb5ef7 174 uint8_t stamp_len = 0;
77a689db 175 uint8_t data[1024]; // receiver buffer
e8fecd72 176 char token_type[5] = {0,0,0,0,0};
177 int dcf = 0;
3e134b4c 178 int bIsSegmented = 0;
52cf34c1 179
9015ae0f 180 CmdLegicRdmem("0 22 55");
633d0686 181
77a689db 182 // copy data from device
183 GetEMLFromBigBuf(data, sizeof(data), 0);
f7f844d0 184 if ( !WaitForResponseTimeout(CMD_ACK, NULL, 2000)){
185 PrintAndLog("Command execute timeout");
186 return 1;
187 }
188
52cf34c1 189 // Output CDF System area (9 bytes) plus remaining header area (12 bytes)
77a689db 190 crc = data[4];
191 uint32_t calc_crc = CRC8Legic(data, 4);
3b920280 192
52cf34c1 193 PrintAndLog("\nCDF: System Area");
aacb96d7 194 PrintAndLog("------------------------------------------------------");
3b920280 195 PrintAndLog("MCD: %02x, MSN: %02x %02x %02x, MCC: %02x %s",
77a689db 196 data[0],
197 data[1],
198 data[2],
199 data[3],
200 data[4],
201 (calc_crc == crc) ? "OK":"Fail"
52cf34c1 202 );
669c1b80 203
0e8cabed 204 // MCD = Manufacturer ID (should be list meaning something?)
3e134b4c 205
206 token_type[0] = 0;
77a689db 207 dcf = ((int)data[6] << 8) | (int)data[5];
3e134b4c 208
209 // New unwritten media?
210 if(dcf == 0xFFFF) {
211
212 PrintAndLog("DCF: %d (%02x %02x), Token Type=NM (New Media)",
213 dcf,
77a689db 214 data[5],
215 data[6]
3e134b4c 216 );
217
5b9fb6f4 218 } else if (dcf > 60000) { // Master token?
3e134b4c 219
220 int fl = 0;
221
77a689db 222 if(data[6] == 0xec) {
3e134b4c 223 strncpy(token_type, "XAM", sizeof(token_type));
224 fl = 1;
77a689db 225 stamp_len = 0x0c - (data[5] >> 4);
3e134b4c 226 } else {
77a689db 227 switch (data[5] & 0x7f) {
e8fecd72 228 case 0x00 ... 0x2f:
229 strncpy(token_type, "IAM", sizeof(token_type));
77a689db 230 fl = (0x2f - (data[5] & 0x7f)) + 1;
e8fecd72 231 break;
232 case 0x30 ... 0x6f:
233 strncpy(token_type, "SAM", sizeof(token_type));
77a689db 234 fl = (0x6f - (data[5] & 0x7f)) + 1;
e8fecd72 235 break;
236 case 0x70 ... 0x7f:
237 strncpy(token_type, "GAM", sizeof(token_type));
77a689db 238 fl = (0x7f - (data[5] & 0x7f)) + 1;
e8fecd72 239 break;
240 }
52cf34c1 241
77a689db 242 stamp_len = 0xfc - data[6];
3e134b4c 243 }
52cf34c1 244
3e134b4c 245 PrintAndLog("DCF: %d (%02x %02x), Token Type=%s (OLE=%01u), OL=%02u, FL=%02u",
246 dcf,
77a689db 247 data[5],
248 data[6],
e8fecd72 249 token_type,
77a689db 250 (data[5] & 0x80 )>> 7,
3e134b4c 251 stamp_len,
252 fl
e8fecd72 253 );
52cf34c1 254
e8fecd72 255 } else { // Is IM(-S) type of card...
3e134b4c 256
77a689db 257 if(data[7] == 0x9F && data[8] == 0xFF) {
3e134b4c 258 bIsSegmented = 1;
259 strncpy(token_type, "IM-S", sizeof(token_type));
260 } else {
261 strncpy(token_type, "IM", sizeof(token_type));
262 }
263
264 PrintAndLog("DCF: %d (%02x %02x), Token Type=%s (OLE=%01u)",
265 dcf,
77a689db 266 data[5],
267 data[6],
3e134b4c 268 token_type,
77a689db 269 (data[5]&0x80) >> 7
3e134b4c 270 );
271 }
272
273 // Makes no sence to show this on blank media...
274 if(dcf != 0xFFFF) {
275
276 if(bIsSegmented) {
277 PrintAndLog("WRP=%02u, WRC=%01u, RD=%01u, SSC=%02x",
77a689db 278 data[7] & 0x0f,
279 (data[7] & 0x70) >> 4,
280 (data[7] & 0x80) >> 7,
281 data[8]
e8fecd72 282 );
3e134b4c 283 }
52cf34c1 284
3e134b4c 285 // Header area is only available on IM-S cards, on master tokens this data is the master token data itself
286 if(bIsSegmented || dcf > 60000) {
287 if(dcf > 60000) {
288 PrintAndLog("Master token data");
77a689db 289 PrintAndLog("%s", sprint_hex(data+8, 14));
3e134b4c 290 } else {
e8fecd72 291 PrintAndLog("Remaining Header Area");
77a689db 292 PrintAndLog("%s", sprint_hex(data+9, 13));
3e134b4c 293 }
294 }
295 }
d7fd9084 296
e8fecd72 297 uint8_t segCrcBytes[8] = {0,0,0,0,0,0,0,0};
e579e768 298 uint32_t segCalcCRC = 0;
299 uint32_t segCRC = 0;
d7fd9084 300
3e134b4c 301 // Data card?
302 if(dcf <= 60000) {
cbdcc89a 303
e8fecd72 304 PrintAndLog("\nADF: User Area");
305 PrintAndLog("------------------------------------------------------");
3e134b4c 306
307 if(bIsSegmented) {
308
309 // Data start point on segmented cards
e8fecd72 310 i = 22;
3e134b4c 311
312 // decode segments
313 for (segmentNum=1; segmentNum < 128; segmentNum++ )
314 {
77a689db 315 segment_len = ((data[i+1] ^ crc) & 0x0f) * 256 + (data[i] ^ crc);
316 segment_flag = ((data[i+1] ^ crc) & 0xf0) >> 4;
317 wrp = (data[i+2] ^ crc);
318 wrc = ((data[i+3] ^ crc) & 0x70) >> 4;
e8fecd72 319
320 bool hasWRC = (wrc > 0);
321 bool hasWRP = (wrp > wrc);
322 int wrp_len = (wrp - wrc);
323 int remain_seg_payload_len = (segment_len - wrp - 5);
e579e768 324
e8fecd72 325 // validate segment-crc
77a689db 326 segCrcBytes[0]=data[0]; //uid0
327 segCrcBytes[1]=data[1]; //uid1
328 segCrcBytes[2]=data[2]; //uid2
329 segCrcBytes[3]=data[3]; //uid3
330 segCrcBytes[4]=(data[i] ^ crc); //hdr0
331 segCrcBytes[5]=(data[i+1] ^ crc); //hdr1
332 segCrcBytes[6]=(data[i+2] ^ crc); //hdr2
333 segCrcBytes[7]=(data[i+3] ^ crc); //hdr3
e8fecd72 334
335 segCalcCRC = CRC8Legic(segCrcBytes, 8);
77a689db 336 segCRC = data[i+4] ^ crc;
e8fecd72 337
338 PrintAndLog("Segment %02u \nraw header | 0x%02X 0x%02X 0x%02X 0x%02X \nSegment len: %u, Flag: 0x%X (valid:%01u, last:%01u), WRP: %02u, WRC: %02u, RD: %01u, CRC: 0x%02X (%s)",
339 segmentNum,
77a689db 340 data[i] ^ crc,
341 data[i+1] ^ crc,
342 data[i+2] ^ crc,
343 data[i+3] ^ crc,
e8fecd72 344 segment_len,
345 segment_flag,
346 (segment_flag & 0x4) >> 2,
347 (segment_flag & 0x8) >> 3,
348 wrp,
349 wrc,
77a689db 350 ((data[i+3]^crc) & 0x80) >> 7,
e8fecd72 351 segCRC,
352 ( segCRC == segCalcCRC ) ? "OK" : "fail"
353 );
354
355 i += 5;
669c1b80 356
e8fecd72 357 if ( hasWRC ) {
358 PrintAndLog("WRC protected area: (I %d | K %d| WRC %d)", i, k, wrc);
359 PrintAndLog("\nrow | data");
360 PrintAndLog("-----+------------------------------------------------");
3e134b4c 361
26778ea7 362 for ( k=i; k < (i + wrc); ++k)
77a689db 363 data[k] ^= crc;
3e134b4c 364
77a689db 365 print_hex_break( data+i, wrc, 16);
3b920280 366
e8fecd72 367 i += wrc;
368 }
669c1b80 369
e8fecd72 370 if ( hasWRP ) {
371 PrintAndLog("Remaining write protected area: (I %d | K %d | WRC %d | WRP %d WRP_LEN %d)",i, k, wrc, wrp, wrp_len);
372 PrintAndLog("\nrow | data");
373 PrintAndLog("-----+------------------------------------------------");
d7fd9084 374
3e134b4c 375 for (k=i; k < (i+wrp_len); ++k)
77a689db 376 data[k] ^= crc;
3b920280 377
77a689db 378 print_hex_break( data+i, wrp_len, 16);
3b920280 379
e8fecd72 380 i += wrp_len;
d7fd9084 381
3e134b4c 382 // does this one work? (Answer: Only if KGH/BGH is used with BCD encoded card number! So maybe this will show just garbage...)
e8fecd72 383 if( wrp_len == 8 )
77a689db 384 PrintAndLog("Card ID: %2X%02X%02X", data[i-4]^crc, data[i-3]^crc, data[i-2]^crc);
e8fecd72 385 }
669c1b80 386
e8fecd72 387 PrintAndLog("Remaining segment payload: (I %d | K %d | Remain LEN %d)", i, k, remain_seg_payload_len);
388 PrintAndLog("\nrow | data");
389 PrintAndLog("-----+------------------------------------------------");
3e134b4c 390
391 for ( k=i; k < (i+remain_seg_payload_len); ++k)
77a689db 392 data[k] ^= crc;
3b920280 393
77a689db 394 print_hex_break( data+i, remain_seg_payload_len, 16);
669c1b80 395
e8fecd72 396 i += remain_seg_payload_len;
d7fd9084 397
e8fecd72 398 PrintAndLog("-----+------------------------------------------------\n");
a182a680 399
e8fecd72 400 // end with last segment
401 if (segment_flag & 0x8) return 0;
52cf34c1 402
e8fecd72 403 } // end for loop
3e134b4c 404
405 } else {
406
407 // Data start point on unsegmented cards
408 i = 8;
409
77a689db 410 wrp = data[7] & 0x0F;
411 wrc = (data[7] & 0x70) >> 4;
3e134b4c 412
413 bool hasWRC = (wrc > 0);
414 bool hasWRP = (wrp > wrc);
415 int wrp_len = (wrp - wrc);
416 int remain_seg_payload_len = (1024 - 22 - wrp); // Any chance to get physical card size here!?
417
418 PrintAndLog("Unsegmented card - WRP: %02u, WRC: %02u, RD: %01u",
419 wrp,
420 wrc,
77a689db 421 (data[7] & 0x80) >> 7
3e134b4c 422 );
423
424 if ( hasWRC ) {
425 PrintAndLog("WRC protected area: (I %d | WRC %d)", i, wrc);
426 PrintAndLog("\nrow | data");
427 PrintAndLog("-----+------------------------------------------------");
77a689db 428 print_hex_break( data+i, wrc, 16);
3e134b4c 429 i += wrc;
430 }
431
432 if ( hasWRP ) {
433 PrintAndLog("Remaining write protected area: (I %d | WRC %d | WRP %d | WRP_LEN %d)", i, wrc, wrp, wrp_len);
434 PrintAndLog("\nrow | data");
435 PrintAndLog("-----+------------------------------------------------");
77a689db 436 print_hex_break( data + i, wrp_len, 16);
3e134b4c 437 i += wrp_len;
438
439 // does this one work? (Answer: Only if KGH/BGH is used with BCD encoded card number! So maybe this will show just garbage...)
440 if( wrp_len == 8 )
77a689db 441 PrintAndLog("Card ID: %2X%02X%02X", data[i-4], data[i-3], data[i-2]);
3e134b4c 442 }
443
444 PrintAndLog("Remaining segment payload: (I %d | Remain LEN %d)", i, remain_seg_payload_len);
445 PrintAndLog("\nrow | data");
446 PrintAndLog("-----+------------------------------------------------");
77a689db 447 print_hex_break( data + i, remain_seg_payload_len, 16);
3e134b4c 448 i += remain_seg_payload_len;
449
450 PrintAndLog("-----+------------------------------------------------\n");
451 }
452 }
52cf34c1 453 return 0;
669c1b80 454}
41dab153 455
77e1bab9 456// params:
457// offset in data memory
458// number of bytes to read
00271f77 459int CmdLegicRdmem(const char *Cmd) {
ffa306de 460
cbdcc89a 461 char cmdp = param_getchar(Cmd, 0);
00271f77 462 if ( cmdp == 'H' || cmdp == 'h' ) return usage_legic_rdmem();
cbdcc89a 463
b98827ff 464 uint32_t offset = 0, len = 0, IV = 1;
ffa306de 465 sscanf(Cmd, "%x %x %x", &offset, &len, &IV);
52cf34c1 466
5b9fb6f4 467 // tagtype
468 legic_card_select_t card;
469 if (legic_get_type(&card)) {
470 PrintAndLog("Failed to identify tagtype");
471 return 1;
472 }
473
474 legic_print_type(card.cardsize, 0);
475
ffa306de 476 // OUT-OF-BOUNDS check
5b9fb6f4 477 // UID 4 bytes can't be written to.
478 if ( len + offset >= card.cardsize ) {
479 len = card.cardsize - offset;
480 PrintAndLog("Out-of-bounds, Cardsize = %d, Trunc offset+len = %d", card.cardsize, len + offset);
a3994421 481 }
ffa306de 482
0e8cabed 483 legic_chk_iv(&IV);
ffa306de 484
ad5bc8cc 485 UsbCommand c = {CMD_READER_LEGIC_RF, {offset, len, IV}};
52cf34c1 486 clearCommandBuffer();
487 SendCommand(&c);
ad5bc8cc 488 UsbCommand resp;
77e1bab9 489 if ( !WaitForResponseTimeout(CMD_ACK, &resp, 3000) ) {
490 PrintAndLog("command execution time out");
491 return 1;
492 }
c649c433 493
77e1bab9 494 uint8_t isOK = resp.arg[0] & 0xFF;
495 uint16_t readlen = resp.arg[1];
496 if ( !isOK ) {
497 PrintAndLog("failed reading tag");
498 return 2;
499 }
500
501 uint8_t *data = malloc(readlen);
502 if ( !data ){
503 PrintAndLog("Cannot allocate memory");
504 return 2;
505 }
86087eba 506
77e1bab9 507 if ( readlen != len )
508 PrintAndLog("Fail, only managed to read 0x%02X bytes", readlen);
86087eba 509
77e1bab9 510 // copy data from device
511 GetEMLFromBigBuf(data, readlen, 0);
512 if ( !WaitForResponseTimeout(CMD_ACK, NULL, 2500)){
513 PrintAndLog("Command execute timeout");
514 free(data);
ad5bc8cc 515 return 1;
516 }
77e1bab9 517
539fd59e 518 PrintAndLog("\n ## | 0 1 2 3 4 5 6 7 8 9 A B C D E F 10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F");
519 PrintAndLog("-----+------------------------------------------------------------------------------------------------");
77e1bab9 520 print_hex_break( data, readlen, 32);
521 free(data);
52cf34c1 522 return 0;
41dab153 523}
3612a8a8 524
0e8cabed 525// should say which tagtype
526// should load a tag to device mem.
5b9fb6f4 527// int phase, int frame, int reqresp
52cf34c1 528int CmdLegicRfSim(const char *Cmd) {
3b920280 529 UsbCommand c = {CMD_SIMULATE_TAG_LEGIC_RF, {6,3,0}};
9c624f67 530 sscanf(Cmd, " %" SCNi64 " %" SCNi64 " %" SCNi64 , &c.arg[0], &c.arg[1], &c.arg[2]);
52cf34c1 531 clearCommandBuffer();
532 SendCommand(&c);
533 return 0;
3612a8a8 534}
535
52cf34c1 536int CmdLegicRfWrite(const char *Cmd) {
ffa306de 537
f0fa6638 538 uint8_t *data = NULL;
539 uint8_t cmdp = 0;
540 bool errors = false;
541 int len = 0, bg, en;
542 uint32_t offset = 0, IV = 0x55;
0e8cabed 543
f0fa6638 544 while(param_getchar(Cmd, cmdp) != 0x00) {
545 switch(param_getchar(Cmd, cmdp)) {
546 case 'd':
547 case 'D':
548 // peek at length of the input string so we can
549 // figure out how many elements to malloc in "data"
550 bg=en=0;
551 if (param_getptr(Cmd, &bg, &en, cmdp+1)) {
552 errors = true;
553 break;
554 }
555 len = (en - bg + 1);
556
557 // check that user entered even number of characters
558 // for hex data string
559 if (len & 1) {
560 errors = true;
561 break;
562 }
539fd59e 563
564 // limit number of bytes to write. This is not a 'restore' command.
565 if ( (len>>1) > 100 ){
566 PrintAndLog("Max bound on 100bytes to write a one time.");
567 PrintAndLog("Use the 'hf legic restore' command if you want to write the whole tag at once");
568 errors = true;
569 }
f0fa6638 570
571 // it's possible for user to accidentally enter "b" parameter
572 // more than once - we have to clean previous malloc
573 if (data)
574 free(data);
539fd59e 575
f0fa6638 576 data = malloc(len >> 1);
577 if ( data == NULL ) {
578 PrintAndLog("Can't allocate memory. exiting");
579 errors = true;
580 break;
581 }
582
583 if (param_gethex(Cmd, cmdp+1, data, len)) {
584 errors = true;
585 break;
586 }
587
588 len >>= 1;
589 cmdp += 2;
590 break;
591 case 'o':
592 case 'O':
5b9fb6f4 593 offset = param_get32ex(Cmd, cmdp+1, 4, 16);
f0fa6638 594 cmdp += 2;
595 break;
596 case 'h':
597 case 'H':
598 errors = true;
599 break;
600 default:
601 PrintAndLog("Unknown parameter '%c'", param_getchar(Cmd, cmdp));
602 errors = true;
603 break;
604 }
605 if (errors) break;
606 }
607 //Validations
608 if (errors){
609 if (data)
610 free(data);
611 return usage_legic_write();
612 }
613
0e8cabed 614 // tagtype
615 legic_card_select_t card;
616 if (legic_get_type(&card)) {
617 PrintAndLog("Failed to identify tagtype");
618 return -1;
619 }
ffa306de 620
0e8cabed 621 legic_print_type(card.cardsize, 0);
622
5b9fb6f4 623 // OUT-OF-BOUNDS checks
539fd59e 624 // UID 4+1 bytes can't be written to.
625 if ( offset < 5 ) {
626 PrintAndLog("Out-of-bounds, bytes 0-1-2-3-4 can't be written to. Offset = %d", offset);
5b9fb6f4 627 return -2;
628 }
629
539fd59e 630 if ( len + offset >= card.cardsize ) {
631 PrintAndLog("Out-of-bounds, Cardsize = %d, [offset+len = %d ]", card.cardsize, len + offset);
0e8cabed 632 return -2;
b98827ff 633 }
f0fa6638 634
539fd59e 635 if (offset == 5 || offset == 6) {
636 PrintAndLog("############# DANGER ################");
637 PrintAndLog("# changing the DCF is irreversible #");
638 PrintAndLog("#####################################");
2a1a6aa3 639 char *answer = NULL;
640 answer = readline("do you really want to continue? y(es) n(o) : ");
641 bool overwrite = (answer[0] == 'y' || answer[0] == 'Y');
642 if (!overwrite){
643 PrintAndLog("command cancelled");
539fd59e 644 return 0;
2a1a6aa3 645 }
539fd59e 646 }
647
0e8cabed 648 legic_chk_iv(&IV);
649
f0fa6638 650 PrintAndLog("Writing to tag");
539fd59e 651
652 UsbCommand c = {CMD_WRITER_LEGIC_RF, {offset, len, IV}};
653 memcpy(c.d.asBytes, data, len);
7bc3c99e 654 UsbCommand resp;
539fd59e 655 clearCommandBuffer();
656 SendCommand(&c);
657
658 if (!WaitForResponseTimeout(CMD_ACK, &resp, 2000)) {
7bc3c99e 659 PrintAndLog("command execution time out");
660 return 1;
661 }
f0fa6638 662 uint8_t isOK = resp.arg[0] & 0xFF;
663 if ( !isOK ) {
664 PrintAndLog("failed writing tag");
665 return 1;
666 }
539fd59e 667
3612a8a8 668 return 0;
669}
670
f6e01a34 671int CmdLegicCalcCrc(const char *Cmd){
3b920280 672
cc4c8fd6 673 uint8_t *data = NULL;
3e134b4c 674 uint8_t cmdp = 0, uidcrc = 0, type=0;
675 bool errors = false;
676 int len = 0;
e31a0f73 677 int bg, en;
3b920280 678
3e134b4c 679 while(param_getchar(Cmd, cmdp) != 0x00) {
680 switch(param_getchar(Cmd, cmdp)) {
681 case 'b':
682 case 'B':
e31a0f73
AG
683 // peek at length of the input string so we can
684 // figure out how many elements to malloc in "data"
685 bg=en=0;
987c5984
AG
686 if (param_getptr(Cmd, &bg, &en, cmdp+1)) {
687 errors = true;
688 break;
689 }
e31a0f73
AG
690 len = (en - bg + 1);
691
692 // check that user entered even number of characters
693 // for hex data string
694 if (len & 1) {
695 errors = true;
696 break;
697 }
698
08927081
AG
699 // it's possible for user to accidentally enter "b" parameter
700 // more than once - we have to clean previous malloc
701 if (data) free(data);
e31a0f73 702 data = malloc(len >> 1);
3e134b4c 703 if ( data == NULL ) {
704 PrintAndLog("Can't allocate memory. exiting");
705 errors = true;
706 break;
e31a0f73
AG
707 }
708
987c5984
AG
709 if (param_gethex(Cmd, cmdp+1, data, len)) {
710 errors = true;
711 break;
712 }
3e134b4c 713
714 len >>= 1;
715 cmdp += 2;
716 break;
717 case 'u':
718 case 'U':
719 uidcrc = param_get8ex(Cmd, cmdp+1, 0, 16);
720 cmdp += 2;
721 break;
722 case 'c':
723 case 'C':
724 type = param_get8ex(Cmd, cmdp+1, 0, 10);
725 cmdp += 2;
726 break;
727 case 'h':
728 case 'H':
729 errors = true;
730 break;
731 default:
732 PrintAndLog("Unknown parameter '%c'", param_getchar(Cmd, cmdp));
733 errors = true;
734 break;
735 }
736 if (errors) break;
737 }
738 //Validations
739 if (errors){
aeb128e2 740 if (data) free(data);
f6e01a34 741 return usage_legic_calccrc();
3e134b4c 742 }
743
744 switch (type){
745 case 16:
87342aad 746 PrintAndLog("Legic crc16: %X", CRC16Legic(data, len, uidcrc));
747 break;
3e134b4c 748 default:
87342aad 749 PrintAndLog("Legic crc8: %X", CRC8Legic(data, len) );
3e134b4c 750 break;
eb5206bd 751 }
3b920280 752
aeb128e2 753 if (data) free(data);
3b920280 754 return 0;
755}
3e750be3 756
9015ae0f 757int legic_print_type(uint32_t tagtype, uint8_t spaces){
758 char spc[11] = " ";
759 spc[10]=0x00;
760 char *spacer = spc + (10-spaces);
761
762 if ( tagtype == 22 )
763 PrintAndLog("%sTYPE : MIM%d card (outdated)", spacer, tagtype);
764 else if ( tagtype == 256 )
765 PrintAndLog("%sTYPE : MIM%d card (234 bytes)", spacer, tagtype);
766 else if ( tagtype == 1024 )
767 PrintAndLog("%sTYPE : MIM%d card (1002 bytes)", spacer, tagtype);
768 else
769 PrintAndLog("%sTYPE : Unknown %06x", spacer, tagtype);
770 return 0;
771}
772int legic_get_type(legic_card_select_t *card){
773
774 if ( card == NULL ) return 1;
775
3e750be3 776 UsbCommand c = {CMD_LEGIC_INFO, {0,0,0}};
777 clearCommandBuffer();
778 SendCommand(&c);
779 UsbCommand resp;
9015ae0f 780 if (!WaitForResponseTimeout(CMD_ACK, &resp, 500))
781 return 2;
a3994421 782
783 uint8_t isOK = resp.arg[0] & 0xFF;
9015ae0f 784 if ( !isOK )
785 return 3;
786
787 memcpy(card, (legic_card_select_t *)resp.d.asBytes, sizeof(legic_card_select_t));
788 return 0;
789}
0e8cabed 790void legic_chk_iv(uint32_t *iv){
791 if ( (*iv & 0x7F) != *iv ){
792 *iv &= 0x7F;
793 PrintAndLog("Truncating IV to 7bits, %u", *iv);
794 }
795 // IV must be odd
796 if ( (*iv & 1) == 0 ){
797 *iv |= 0x01;
798 PrintAndLog("LSB of IV must be SET %u", *iv);
799 }
800}
0e8cabed 801void legic_seteml(uint8_t *src, uint32_t offset, uint32_t numofbytes) {
0e8cabed 802 size_t len = 0;
803 UsbCommand c = {CMD_LEGIC_ESET, {0, 0, 0}};
0e8cabed 804 for(size_t i = 0; i < numofbytes; i += USB_CMD_DATA_SIZE) {
805
806 len = MIN((numofbytes - i), USB_CMD_DATA_SIZE);
807 c.arg[0] = i; // offset
808 c.arg[1] = len; // number of bytes
77e1bab9 809 memcpy(c.d.asBytes, src+i, len);
0e8cabed 810 clearCommandBuffer();
811 SendCommand(&c);
0e8cabed 812 }
813}
9015ae0f 814
815int HFLegicReader(const char *Cmd, bool verbose) {
816
817 char cmdp = param_getchar(Cmd, 0);
818 if ( cmdp == 'H' || cmdp == 'h' ) return usage_legic_reader();
a3994421 819
820 legic_card_select_t card;
9015ae0f 821 switch(legic_get_type(&card)){
822 case 1:
823 if ( verbose ) PrintAndLog("command execution time out");
a3994421 824 return 1;
9015ae0f 825 case 2:
826 case 3:
827 if ( verbose ) PrintAndLog("legic card select failed");
828 return 2;
829 default: break;
830 }
831 PrintAndLog(" UID : %s", sprint_hex(card.uid, sizeof(card.uid)));
832 legic_print_type(card.cardsize, 0);
3e750be3 833 return 0;
834}
633d0686 835int CmdLegicReader(const char *Cmd){
836 return HFLegicReader(Cmd, TRUE);
3e750be3 837}
633d0686 838
839int CmdLegicDump(const char *Cmd){
00271f77 840
0e8cabed 841 FILE *f;
00271f77 842 char filename[FILE_PATH_SIZE] = {0x00};
843 char *fnameptr = filename;
844 size_t fileNlen = 0;
845 bool errors = false;
9015ae0f 846 uint16_t dumplen;
847 uint8_t cmdp = 0;
00271f77 848
0e8cabed 849 memset(filename, 0, sizeof(filename));
850
851 while(param_getchar(Cmd, cmdp) != 0x00) {
852 switch(param_getchar(Cmd, cmdp)) {
853 case 'h':
854 case 'H':
855 return usage_legic_dump();
856 case 'o':
857 case 'O':
858 fileNlen = param_getstr(Cmd, cmdp+1, filename);
859 if (!fileNlen)
860 errors = true;
861 if (fileNlen > FILE_PATH_SIZE-5)
862 fileNlen = FILE_PATH_SIZE-5;
863 cmdp += 2;
864 break;
865 default:
866 PrintAndLog("Unknown parameter '%c'", param_getchar(Cmd, cmdp));
867 errors = true;
868 break;
00271f77 869 }
870 if(errors) break;
871 }
872
873 //Validations
874 if(errors) return usage_legic_dump();
875
876 // tagtype
9015ae0f 877 legic_card_select_t card;
878 if (legic_get_type(&card)) {
879 PrintAndLog("Failed to identify tagtype");
880 return -1;
881 }
882 dumplen = card.cardsize;
00271f77 883
9015ae0f 884 legic_print_type(dumplen, 0);
885 PrintAndLog("Reading tag memory...");
886
00271f77 887 UsbCommand c = {CMD_READER_LEGIC_RF, {0x00, dumplen, 0x55}};
888 clearCommandBuffer();
889 SendCommand(&c);
890 UsbCommand resp;
891 if (!WaitForResponseTimeout(CMD_ACK, &resp, 3000)) {
892 PrintAndLog("Command execute time-out");
893 return 1;
894 }
895
896 uint8_t isOK = resp.arg[0] & 0xFF;
897 if ( !isOK ) {
898 PrintAndLog("Failed dumping tag data");
899 return 2;
900 }
901
902 uint16_t readlen = resp.arg[1];
903 uint8_t *data = malloc(readlen);
0e8cabed 904 if (!data) {
00271f77 905 PrintAndLog("Fail, cannot allocate memory");
906 return 3;
907 }
77e1bab9 908 memset(data, 0, readlen);
00271f77 909
910 if ( readlen != dumplen )
911 PrintAndLog("Fail, only managed to read 0x%02X bytes of 0x%02X", readlen, dumplen);
912
913 // copy data from device
914 GetEMLFromBigBuf(data, readlen, 0);
915 if ( !WaitForResponseTimeout(CMD_ACK, NULL, 2500)) {
916 PrintAndLog("Fail, transfer from device time-out");
0e8cabed 917 free(data);
00271f77 918 return 4;
919 }
920
921 // user supplied filename?
922 if (fileNlen < 1)
923 sprintf(fnameptr,"%02X%02X%02X%02X.bin", data[0], data[1], data[2], data[3]);
924 else
925 sprintf(fnameptr + fileNlen,".bin");
926
ceb34a3c 927 f = fopen(filename,"wb");
928 if (!f) {
00271f77 929 PrintAndLog("Could not create file name %s", filename);
0e8cabed 930 if (data)
931 free(data);
00271f77 932 return 5;
933 }
0e8cabed 934 fwrite(data, 1, readlen, f);
935 fclose(f);
936 free(data);
00271f77 937 PrintAndLog("Wrote %d bytes to %s", readlen, filename);
633d0686 938 return 0;
939}
0e8cabed 940
5b9fb6f4 941int CmdLegicRestore(const char *Cmd){
942
943 FILE *f;
944 char filename[FILE_PATH_SIZE] = {0x00};
945 char *fnameptr = filename;
946 size_t fileNlen = 0;
539fd59e 947 bool errors = true;
5b9fb6f4 948 uint16_t numofbytes;
949 uint8_t cmdp = 0;
950
951 memset(filename, 0, sizeof(filename));
952
953 while(param_getchar(Cmd, cmdp) != 0x00) {
954 switch(param_getchar(Cmd, cmdp)) {
955 case 'h':
956 case 'H':
957 errors = true;
958 break;
959 case 'i':
960 case 'I':
961 fileNlen = param_getstr(Cmd, cmdp+1, filename);
962 if (!fileNlen)
539fd59e 963 errors = true;
964 else
965 errors = false;
966
5b9fb6f4 967 if (fileNlen > FILE_PATH_SIZE-5)
968 fileNlen = FILE_PATH_SIZE-5;
539fd59e 969 cmdp += 2;
5b9fb6f4 970 break;
971 default:
972 PrintAndLog("Unknown parameter '%c'", param_getchar(Cmd, cmdp));
973 errors = true;
974 break;
975 }
539fd59e 976 if (errors) break;
5b9fb6f4 977 }
978
979 //Validations
980 if(errors) return usage_legic_restore();
981
982 // tagtype
983 legic_card_select_t card;
984 if (legic_get_type(&card)) {
985 PrintAndLog("Failed to identify tagtype");
986 return 1;
987 }
988 numofbytes = card.cardsize;
989
990 // set up buffer
991 uint8_t *data = malloc(numofbytes);
992 if (!data) {
993 PrintAndLog("Fail, cannot allocate memory");
36799656 994 return 2;
5b9fb6f4 995 }
996 memset(data, 0, numofbytes);
997
998 legic_print_type(numofbytes, 0);
999
1000 // set up file
1001 fnameptr += fileNlen;
1002 sprintf(fnameptr, ".bin");
5b9fb6f4 1003
ceb34a3c 1004 f = fopen(filename,"rb");
1005 if (!f) {
5b9fb6f4 1006 PrintAndLog("File %s not found or locked", filename);
36799656 1007 return 3;
5b9fb6f4 1008 }
1009
36799656 1010 // verify size of dumpfile is the same as card.
1011 fseek(f, 0, SEEK_END); // seek to end of file
1012 size_t filesize = ftell(f); // get current file pointer
1013 fseek(f, 0, SEEK_SET); // seek back to beginning of file
1014
1015 if ( filesize != numofbytes) {
539fd59e 1016 PrintAndLog("Fail, filesize and cardsize is not equal. [%u != %u]", filesize, numofbytes);
36799656 1017 free(data);
1018 fclose(f);
1019 return 4;
1020 }
5b9fb6f4 1021
1022 // load file
1023 size_t bytes_read = fread(data, 1, numofbytes, f);
ceb34a3c 1024 fclose(f);
1025
5b9fb6f4 1026 if ( bytes_read == 0){
1027 PrintAndLog("File reading error");
1028 free(data);
5b9fb6f4 1029 return 2;
1030 }
ceb34a3c 1031
f9eeab99 1032 PrintAndLog("Restoring to card");
5b9fb6f4 1033
539fd59e 1034 // transfer to device
1035 size_t len = 0;
1036 UsbCommand c = {CMD_WRITER_LEGIC_RF, {0, 0, 0x55}};
1037 UsbCommand resp;
1038 for(size_t i = 7; i < numofbytes; i += USB_CMD_DATA_SIZE) {
1039
1040 len = MIN((numofbytes - i), USB_CMD_DATA_SIZE);
1041 c.arg[0] = i; // offset
1042 c.arg[1] = len; // number of bytes
1043 memcpy(c.d.asBytes, data+i, len);
539fd59e 1044 clearCommandBuffer();
1045 SendCommand(&c);
1046
f9eeab99 1047 if (!WaitForResponseTimeout(CMD_ACK, &resp, 4000)) {
539fd59e 1048 PrintAndLog("command execution time out");
1049 free(data);
1050 return 1;
1051 }
1052 uint8_t isOK = resp.arg[0] & 0xFF;
1053 if ( !isOK ) {
1054 PrintAndLog("failed writing tag [msg = %u]", resp.arg[1] & 0xFF);
1055 free(data);
1056 return 1;
1057 }
f9eeab99 1058 PrintAndLog("Wrote chunk [offset %d | len %d | total %d", i, len, i+len);
539fd59e 1059 }
5b9fb6f4 1060
1061 free(data);
f9eeab99 1062 PrintAndLog("\nWrote %d bytes to card from file %s", numofbytes, filename);
5b9fb6f4 1063 return 0;
1064}
1065
0e8cabed 1066int CmdLegicELoad(const char *Cmd) {
1067 FILE * f;
1068 char filename[FILE_PATH_SIZE];
1069 char *fnameptr = filename;
1070 int len, numofbytes;
1071 int nameParamNo = 1;
1072
1073 char cmdp = param_getchar(Cmd, 0);
1074 if ( cmdp == 'h' || cmdp == 'H' || cmdp == 0x00)
1075 return usage_legic_eload();
1076
1077 switch (cmdp) {
1078 case '0' : numofbytes = 22; break;
1079 case '1' :
1080 case '\0': numofbytes = 256; break;
1081 case '2' : numofbytes = 1024; break;
1082 default : numofbytes = 256; nameParamNo = 0;break;
1083 }
1084
1085 // set up buffer
1086 uint8_t *data = malloc(numofbytes);
1087 if (!data) {
1088 PrintAndLog("Fail, cannot allocate memory");
1089 return 3;
1090 }
1091 memset(data, 0, numofbytes);
1092
1093 // set up file
1094 len = param_getstr(Cmd, nameParamNo, filename);
1095 if (len > FILE_PATH_SIZE - 5)
1096 len = FILE_PATH_SIZE - 5;
1097 fnameptr += len;
5b9fb6f4 1098 sprintf(fnameptr, ".bin");
0e8cabed 1099
1100 // open file
ceb34a3c 1101 f = fopen(filename,"rb");
1102 if (!f) {
0e8cabed 1103 PrintAndLog("File %s not found or locked", filename);
1104 free(data);
1105 return 1;
1106 }
1107
1108 // load file
1109 size_t bytes_read = fread(data, 1, numofbytes, f);
1110 if ( bytes_read == 0){
1111 PrintAndLog("File reading error");
1112 free(data);
1113 fclose(f);
ceb34a3c 1114 f = NULL;
0e8cabed 1115 return 2;
1116 }
1117 fclose(f);
ceb34a3c 1118 f = NULL;
0e8cabed 1119
1120 // transfer to device
1121 legic_seteml(data, 0, numofbytes);
1122
1123 free(data);
1124 PrintAndLog("\nLoaded %d bytes from file: %s to emulator memory", numofbytes, filename);
1125 return 0;
1126}
1127
1128int CmdLegicESave(const char *Cmd) {
1129 FILE *f;
1130 char filename[FILE_PATH_SIZE];
1131 char *fnameptr = filename;
1132 int fileNlen, numofbytes, nameParamNo = 1;
1133
1134 memset(filename, 0, sizeof(filename));
1135
1136 char cmdp = param_getchar(Cmd, 0);
1137
1138 if ( cmdp == 'h' || cmdp == 'H' || cmdp == 0x00)
1139 return usage_legic_esave();
1140
1141 switch (cmdp) {
1142 case '0' : numofbytes = 22; break;
1143 case '1' :
1144 case '\0': numofbytes = 256; break;
1145 case '2' : numofbytes = 1024; break;
1146 default : numofbytes = 256; nameParamNo = 0; break;
1147 }
1148
1149 fileNlen = param_getstr(Cmd, nameParamNo, filename);
1150
1151 if (fileNlen > FILE_PATH_SIZE - 5)
1152 fileNlen = FILE_PATH_SIZE - 5;
1153
1154 // set up buffer
1155 uint8_t *data = malloc(numofbytes);
1156 if (!data) {
1157 PrintAndLog("Fail, cannot allocate memory");
1158 return 3;
1159 }
1160 memset(data, 0, numofbytes);
1161
1162 // download emulator memory
77e1bab9 1163 PrintAndLog("Reading emulator memory...");
0e8cabed 1164 GetEMLFromBigBuf(data, numofbytes, 0);
1165 if ( !WaitForResponseTimeout(CMD_ACK, NULL, 2500)) {
1166 PrintAndLog("Fail, transfer from device time-out");
1167 free(data);
1168 return 4;
1169 }
1170
1171 // user supplied filename?
1172 if (fileNlen < 1)
1173 sprintf(fnameptr,"%02X%02X%02X%02X.bin", data[0], data[1], data[2], data[3]);
1174 else
1175 sprintf(fnameptr + fileNlen,".bin");
1176
1177 // open file
ceb34a3c 1178 f = fopen(filename,"wb");
1179 if (!f) {
0e8cabed 1180 PrintAndLog("Could not create file name %s", filename);
1181 free(data);
1182 return 1;
1183 }
1184 fwrite(data, 1, numofbytes, f);
1185 fclose(f);
1186 free(data);
1187 PrintAndLog("\nSaved %d bytes from emulator memory to file: %s", numofbytes, filename);
1188 return 0;
1189}
5b9fb6f4 1190
1f247f6a 1191int CmdLegicWipe(const char *Cmd){
1192
1193 char cmdp = param_getchar(Cmd, 0);
1194
1195 if ( cmdp == 'h' || cmdp == 'H') return usage_legic_wipe();
1196
1197 // tagtype
1198 legic_card_select_t card;
1199 if (legic_get_type(&card)) {
1200 PrintAndLog("Failed to identify tagtype");
1201 return 1;
1202 }
1203
1204 // set up buffer
1205 uint8_t *data = malloc(card.cardsize);
1206 if (!data) {
1207 PrintAndLog("Fail, cannot allocate memory");
1208 return 2;
1209 }
1210 memset(data, 0, card.cardsize);
1211
1212 legic_print_type(card.cardsize, 0);
1213
1214 printf("Erasing");
1215
1216 // transfer to device
1217 size_t len = 0;
1218 UsbCommand c = {CMD_WRITER_LEGIC_RF, {0, 0, 0x55}};
1219 UsbCommand resp;
1220 for(size_t i = 7; i < card.cardsize; i += USB_CMD_DATA_SIZE) {
1221
1222 printf(".");
1223 len = MIN((card.cardsize - i), USB_CMD_DATA_SIZE);
1224 c.arg[0] = i; // offset
1225 c.arg[1] = len; // number of bytes
1226 memcpy(c.d.asBytes, data+i, len);
1227 clearCommandBuffer();
1228 SendCommand(&c);
1229
1230 if (!WaitForResponseTimeout(CMD_ACK, &resp, 4000)) {
1231 PrintAndLog("command execution time out");
1232 free(data);
1233 return 3;
1234 }
1235 uint8_t isOK = resp.arg[0] & 0xFF;
1236 if ( !isOK ) {
1237 PrintAndLog("failed writing tag [msg = %u]", resp.arg[1] & 0xFF);
1238 free(data);
1239 return 4;
1240 }
1241 }
1242 printf("ok\n");
1243 return 0;
1244}
1245
5b9fb6f4 1246int CmdLegicList(const char *Cmd) {
1247 CmdHFList("legic");
1248 return 0;
1249}
1250
52cf34c1 1251static command_t CommandTable[] = {
633d0686 1252 {"help", CmdHelp, 1, "This help"},
5b9fb6f4 1253 {"reader", CmdLegicReader, 1, "LEGIC Prime Reader UID and tag info"},
633d0686 1254 {"info", CmdLegicInfo, 0, "Display deobfuscated and decoded LEGIC Prime tag data"},
5b9fb6f4 1255 {"dump", CmdLegicDump, 0, "Dump LEGIC Prime tag to binary file"},
1256 {"restore", CmdLegicRestore, 0, "Restore a dump onto a LEGIC Prime tag"},
1257 {"rdmem", CmdLegicRdmem, 0, "Read bytes from a LEGIC Prime tag"},
1258 {"sim", CmdLegicRfSim, 0, "Start tag simulator"},
1259 {"write", CmdLegicRfWrite, 0, "Write data to a LEGIC Prime tag"},
1260 {"crc", CmdLegicCalcCrc, 1, "Calculate Legic CRC over given bytes"},
0e8cabed 1261 {"eload", CmdLegicELoad, 1, "Load binary dump to emulator memory"},
1262 {"esave", CmdLegicESave, 1, "Save emulator memory to binary file"},
5b9fb6f4 1263 {"list", CmdLegicList, 1, "[Deprecated] List LEGIC history"},
1f247f6a 1264 {"wipe", CmdLegicWipe, 1, "Wipe a LEGIC Prime tag"},
52cf34c1 1265 {NULL, NULL, 0, NULL}
1266};
1267
1268int CmdHFLegic(const char *Cmd) {
1269 clearCommandBuffer();
1270 CmdsParse(CommandTable, Cmd);
1271 return 0;
1272}
1273
1274int CmdHelp(const char *Cmd) {
1275 CmdsHelp(CommandTable);
1276 return 0;
1277}
Impressum, Datenschutz