]> cvs.zerfleddert.de Git - proxmark3-svn/blob - armsrc/iso14443.c
linux patch by Wil
[proxmark3-svn] / armsrc / iso14443.c
1 //-----------------------------------------------------------------------------
2 // Jonathan Westhues, split Nov 2006
3 //
4 // This code is licensed to you under the terms of the GNU GPL, version 2 or,
5 // at your option, any later version. See the LICENSE.txt file for the text of
6 // the license.
7 //-----------------------------------------------------------------------------
8 // Routines to support ISO 14443. This includes both the reader software and
9 // the `fake tag' modes. At the moment only the Type B modulation is
10 // supported.
11 //-----------------------------------------------------------------------------
12
13 #include "proxmark3.h"
14 #include "apps.h"
15 #include "util.h"
16 #include "string.h"
17
18 #include "iso14443crc.h"
19
20 //static void GetSamplesFor14443(int weTx, int n);
21
22 #define DEMOD_TRACE_SIZE 4096
23 #define READER_TAG_BUFFER_SIZE 2048
24 #define TAG_READER_BUFFER_SIZE 2048
25 #define DMA_BUFFER_SIZE 1024
26
27 //=============================================================================
28 // An ISO 14443 Type B tag. We listen for commands from the reader, using
29 // a UART kind of thing that's implemented in software. When we get a
30 // frame (i.e., a group of bytes between SOF and EOF), we check the CRC.
31 // If it's good, then we can do something appropriate with it, and send
32 // a response.
33 //=============================================================================
34
35 //-----------------------------------------------------------------------------
36 // Code up a string of octets at layer 2 (including CRC, we don't generate
37 // that here) so that they can be transmitted to the reader. Doesn't transmit
38 // them yet, just leaves them ready to send in ToSend[].
39 //-----------------------------------------------------------------------------
40 static void CodeIso14443bAsTag(const uint8_t *cmd, int len)
41 {
42 int i;
43
44 ToSendReset();
45
46 // Transmit a burst of ones, as the initial thing that lets the
47 // reader get phase sync. This (TR1) must be > 80/fs, per spec,
48 // but tag that I've tried (a Paypass) exceeds that by a fair bit,
49 // so I will too.
50 for(i = 0; i < 20; i++) {
51 ToSendStuffBit(1);
52 ToSendStuffBit(1);
53 ToSendStuffBit(1);
54 ToSendStuffBit(1);
55 }
56
57 // Send SOF.
58 for(i = 0; i < 10; i++) {
59 ToSendStuffBit(0);
60 ToSendStuffBit(0);
61 ToSendStuffBit(0);
62 ToSendStuffBit(0);
63 }
64 for(i = 0; i < 2; i++) {
65 ToSendStuffBit(1);
66 ToSendStuffBit(1);
67 ToSendStuffBit(1);
68 ToSendStuffBit(1);
69 }
70
71 for(i = 0; i < len; i++) {
72 int j;
73 uint8_t b = cmd[i];
74
75 // Start bit
76 ToSendStuffBit(0);
77 ToSendStuffBit(0);
78 ToSendStuffBit(0);
79 ToSendStuffBit(0);
80
81 // Data bits
82 for(j = 0; j < 8; j++) {
83 if(b & 1) {
84 ToSendStuffBit(1);
85 ToSendStuffBit(1);
86 ToSendStuffBit(1);
87 ToSendStuffBit(1);
88 } else {
89 ToSendStuffBit(0);
90 ToSendStuffBit(0);
91 ToSendStuffBit(0);
92 ToSendStuffBit(0);
93 }
94 b >>= 1;
95 }
96
97 // Stop bit
98 ToSendStuffBit(1);
99 ToSendStuffBit(1);
100 ToSendStuffBit(1);
101 ToSendStuffBit(1);
102 }
103
104 // Send SOF.
105 for(i = 0; i < 10; i++) {
106 ToSendStuffBit(0);
107 ToSendStuffBit(0);
108 ToSendStuffBit(0);
109 ToSendStuffBit(0);
110 }
111 for(i = 0; i < 10; i++) {
112 ToSendStuffBit(1);
113 ToSendStuffBit(1);
114 ToSendStuffBit(1);
115 ToSendStuffBit(1);
116 }
117
118 // Convert from last byte pos to length
119 ToSendMax++;
120
121 // Add a few more for slop
122 ToSendMax += 2;
123 }
124
125 //-----------------------------------------------------------------------------
126 // The software UART that receives commands from the reader, and its state
127 // variables.
128 //-----------------------------------------------------------------------------
129 static struct {
130 enum {
131 STATE_UNSYNCD,
132 STATE_GOT_FALLING_EDGE_OF_SOF,
133 STATE_AWAITING_START_BIT,
134 STATE_RECEIVING_DATA,
135 STATE_ERROR_WAIT
136 } state;
137 uint16_t shiftReg;
138 int bitCnt;
139 int byteCnt;
140 int byteCntMax;
141 int posCnt;
142 uint8_t *output;
143 } Uart;
144
145 /* Receive & handle a bit coming from the reader.
146 *
147 * LED handling:
148 * LED A -> ON once we have received the SOF and are expecting the rest.
149 * LED A -> OFF once we have received EOF or are in error state or unsynced
150 *
151 * Returns: true if we received a EOF
152 * false if we are still waiting for some more
153 */
154 static int Handle14443UartBit(int bit)
155 {
156 switch(Uart.state) {
157 case STATE_UNSYNCD:
158 LED_A_OFF();
159 if(!bit) {
160 // we went low, so this could be the beginning
161 // of an SOF
162 Uart.state = STATE_GOT_FALLING_EDGE_OF_SOF;
163 Uart.posCnt = 0;
164 Uart.bitCnt = 0;
165 }
166 break;
167
168 case STATE_GOT_FALLING_EDGE_OF_SOF:
169 Uart.posCnt++;
170 if(Uart.posCnt == 2) {
171 if(bit) {
172 if(Uart.bitCnt >= 10) {
173 // we've seen enough consecutive
174 // zeros that it's a valid SOF
175 Uart.posCnt = 0;
176 Uart.byteCnt = 0;
177 Uart.state = STATE_AWAITING_START_BIT;
178 LED_A_ON(); // Indicate we got a valid SOF
179 } else {
180 // didn't stay down long enough
181 // before going high, error
182 Uart.state = STATE_ERROR_WAIT;
183 }
184 } else {
185 // do nothing, keep waiting
186 }
187 Uart.bitCnt++;
188 }
189 if(Uart.posCnt >= 4) Uart.posCnt = 0;
190 if(Uart.bitCnt > 14) {
191 // Give up if we see too many zeros without
192 // a one, too.
193 Uart.state = STATE_ERROR_WAIT;
194 }
195 break;
196
197 case STATE_AWAITING_START_BIT:
198 Uart.posCnt++;
199 if(bit) {
200 if(Uart.posCnt > 25) {
201 // stayed high for too long between
202 // characters, error
203 Uart.state = STATE_ERROR_WAIT;
204 }
205 } else {
206 // falling edge, this starts the data byte
207 Uart.posCnt = 0;
208 Uart.bitCnt = 0;
209 Uart.shiftReg = 0;
210 Uart.state = STATE_RECEIVING_DATA;
211 LED_A_ON(); // Indicate we're receiving
212 }
213 break;
214
215 case STATE_RECEIVING_DATA:
216 Uart.posCnt++;
217 if(Uart.posCnt == 2) {
218 // time to sample a bit
219 Uart.shiftReg >>= 1;
220 if(bit) {
221 Uart.shiftReg |= 0x200;
222 }
223 Uart.bitCnt++;
224 }
225 if(Uart.posCnt >= 4) {
226 Uart.posCnt = 0;
227 }
228 if(Uart.bitCnt == 10) {
229 if((Uart.shiftReg & 0x200) && !(Uart.shiftReg & 0x001))
230 {
231 // this is a data byte, with correct
232 // start and stop bits
233 Uart.output[Uart.byteCnt] = (Uart.shiftReg >> 1) & 0xff;
234 Uart.byteCnt++;
235
236 if(Uart.byteCnt >= Uart.byteCntMax) {
237 // Buffer overflowed, give up
238 Uart.posCnt = 0;
239 Uart.state = STATE_ERROR_WAIT;
240 } else {
241 // so get the next byte now
242 Uart.posCnt = 0;
243 Uart.state = STATE_AWAITING_START_BIT;
244 }
245 } else if(Uart.shiftReg == 0x000) {
246 // this is an EOF byte
247 LED_A_OFF(); // Finished receiving
248 return TRUE;
249 } else {
250 // this is an error
251 Uart.posCnt = 0;
252 Uart.state = STATE_ERROR_WAIT;
253 }
254 }
255 break;
256
257 case STATE_ERROR_WAIT:
258 // We're all screwed up, so wait a little while
259 // for whatever went wrong to finish, and then
260 // start over.
261 Uart.posCnt++;
262 if(Uart.posCnt > 10) {
263 Uart.state = STATE_UNSYNCD;
264 }
265 break;
266
267 default:
268 Uart.state = STATE_UNSYNCD;
269 break;
270 }
271
272 if (Uart.state == STATE_ERROR_WAIT) LED_A_OFF(); // Error
273
274 return FALSE;
275 }
276
277 //-----------------------------------------------------------------------------
278 // Receive a command (from the reader to us, where we are the simulated tag),
279 // and store it in the given buffer, up to the given maximum length. Keeps
280 // spinning, waiting for a well-framed command, until either we get one
281 // (returns TRUE) or someone presses the pushbutton on the board (FALSE).
282 //
283 // Assume that we're called with the SSC (to the FPGA) and ADC path set
284 // correctly.
285 //-----------------------------------------------------------------------------
286 static int GetIso14443CommandFromReader(uint8_t *received, int *len, int maxLen)
287 {
288 uint8_t mask;
289 int i, bit;
290
291 // Set FPGA mode to "simulated ISO 14443 tag", no modulation (listen
292 // only, since we are receiving, not transmitting).
293 // Signal field is off with the appropriate LED
294 LED_D_OFF();
295 FpgaWriteConfWord(
296 FPGA_MAJOR_MODE_HF_SIMULATOR | FPGA_HF_SIMULATOR_NO_MODULATION);
297
298
299 // Now run a `software UART' on the stream of incoming samples.
300 Uart.output = received;
301 Uart.byteCntMax = maxLen;
302 Uart.state = STATE_UNSYNCD;
303
304 for(;;) {
305 WDT_HIT();
306
307 if(BUTTON_PRESS()) return FALSE;
308
309 if(AT91C_BASE_SSC->SSC_SR & (AT91C_SSC_TXRDY)) {
310 AT91C_BASE_SSC->SSC_THR = 0x00;
311 }
312 if(AT91C_BASE_SSC->SSC_SR & (AT91C_SSC_RXRDY)) {
313 uint8_t b = (uint8_t)AT91C_BASE_SSC->SSC_RHR;
314
315 mask = 0x80;
316 for(i = 0; i < 8; i++, mask >>= 1) {
317 bit = (b & mask);
318 if(Handle14443UartBit(bit)) {
319 *len = Uart.byteCnt;
320 return TRUE;
321 }
322 }
323 }
324 }
325 }
326
327 //-----------------------------------------------------------------------------
328 // Main loop of simulated tag: receive commands from reader, decide what
329 // response to send, and send it.
330 //-----------------------------------------------------------------------------
331 void SimulateIso14443Tag(void)
332 {
333 static const uint8_t cmd1[] = { 0x05, 0x00, 0x08, 0x39, 0x73 };
334 static const uint8_t response1[] = {
335 0x50, 0x82, 0x0d, 0xe1, 0x74, 0x20, 0x38, 0x19, 0x22,
336 0x00, 0x21, 0x85, 0x5e, 0xd7
337 };
338
339 uint8_t *resp;
340 int respLen;
341
342 uint8_t *resp1 = (((uint8_t *)BigBuf) + 800);
343 int resp1Len;
344
345 uint8_t *receivedCmd = (uint8_t *)BigBuf;
346 int len;
347
348 int i;
349
350 int cmdsRecvd = 0;
351
352 memset(receivedCmd, 0x44, 400);
353
354 CodeIso14443bAsTag(response1, sizeof(response1));
355 memcpy(resp1, ToSend, ToSendMax); resp1Len = ToSendMax;
356
357 // We need to listen to the high-frequency, peak-detected path.
358 SetAdcMuxFor(GPIO_MUXSEL_HIPKD);
359 FpgaSetupSsc();
360
361 cmdsRecvd = 0;
362
363 for(;;) {
364 uint8_t b1, b2;
365
366 if(!GetIso14443CommandFromReader(receivedCmd, &len, 100)) {
367 Dbprintf("button pressed, received %d commands", cmdsRecvd);
368 break;
369 }
370
371 // Good, look at the command now.
372
373 if(len == sizeof(cmd1) && memcmp(receivedCmd, cmd1, len)==0) {
374 resp = resp1; respLen = resp1Len;
375 } else {
376 Dbprintf("new cmd from reader: len=%d, cmdsRecvd=%d", len, cmdsRecvd);
377 // And print whether the CRC fails, just for good measure
378 ComputeCrc14443(CRC_14443_B, receivedCmd, len-2, &b1, &b2);
379 if(b1 != receivedCmd[len-2] || b2 != receivedCmd[len-1]) {
380 // Not so good, try again.
381 DbpString("+++CRC fail");
382 } else {
383 DbpString("CRC passes");
384 }
385 break;
386 }
387
388 memset(receivedCmd, 0x44, 32);
389
390 cmdsRecvd++;
391
392 if(cmdsRecvd > 0x30) {
393 DbpString("many commands later...");
394 break;
395 }
396
397 if(respLen <= 0) continue;
398
399 // Modulate BPSK
400 // Signal field is off with the appropriate LED
401 LED_D_OFF();
402 FpgaWriteConfWord(
403 FPGA_MAJOR_MODE_HF_SIMULATOR | FPGA_HF_SIMULATOR_MODULATE_BPSK);
404 AT91C_BASE_SSC->SSC_THR = 0xff;
405 FpgaSetupSsc();
406
407 // Transmit the response.
408 i = 0;
409 for(;;) {
410 if(AT91C_BASE_SSC->SSC_SR & (AT91C_SSC_TXRDY)) {
411 uint8_t b = resp[i];
412
413 AT91C_BASE_SSC->SSC_THR = b;
414
415 i++;
416 if(i > respLen) {
417 break;
418 }
419 }
420 if(AT91C_BASE_SSC->SSC_SR & (AT91C_SSC_RXRDY)) {
421 volatile uint8_t b = (uint8_t)AT91C_BASE_SSC->SSC_RHR;
422 (void)b;
423 }
424 }
425 }
426 }
427
428 //=============================================================================
429 // An ISO 14443 Type B reader. We take layer two commands, code them
430 // appropriately, and then send them to the tag. We then listen for the
431 // tag's response, which we leave in the buffer to be demodulated on the
432 // PC side.
433 //=============================================================================
434
435 static struct {
436 enum {
437 DEMOD_UNSYNCD,
438 DEMOD_PHASE_REF_TRAINING,
439 DEMOD_AWAITING_FALLING_EDGE_OF_SOF,
440 DEMOD_GOT_FALLING_EDGE_OF_SOF,
441 DEMOD_AWAITING_START_BIT,
442 DEMOD_RECEIVING_DATA,
443 DEMOD_ERROR_WAIT
444 } state;
445 int bitCount;
446 int posCount;
447 int thisBit;
448 int metric;
449 int metricN;
450 uint16_t shiftReg;
451 uint8_t *output;
452 int len;
453 int sumI;
454 int sumQ;
455 } Demod;
456
457 /*
458 * Handles reception of a bit from the tag
459 *
460 * LED handling:
461 * LED C -> ON once we have received the SOF and are expecting the rest.
462 * LED C -> OFF once we have received EOF or are unsynced
463 *
464 * Returns: true if we received a EOF
465 * false if we are still waiting for some more
466 *
467 */
468 static int Handle14443SamplesDemod(int ci, int cq)
469 {
470 int v;
471
472 // The soft decision on the bit uses an estimate of just the
473 // quadrant of the reference angle, not the exact angle.
474 #define MAKE_SOFT_DECISION() { \
475 if(Demod.sumI > 0) { \
476 v = ci; \
477 } else { \
478 v = -ci; \
479 } \
480 if(Demod.sumQ > 0) { \
481 v += cq; \
482 } else { \
483 v -= cq; \
484 } \
485 }
486
487 switch(Demod.state) {
488 case DEMOD_UNSYNCD:
489 v = ci;
490 if(v < 0) v = -v;
491 if(cq > 0) {
492 v += cq;
493 } else {
494 v -= cq;
495 }
496 if(v > 40) {
497 Demod.posCount = 0;
498 Demod.state = DEMOD_PHASE_REF_TRAINING;
499 Demod.sumI = 0;
500 Demod.sumQ = 0;
501 }
502 break;
503
504 case DEMOD_PHASE_REF_TRAINING:
505 if(Demod.posCount < 8) {
506 Demod.sumI += ci;
507 Demod.sumQ += cq;
508 } else if(Demod.posCount > 100) {
509 // error, waited too long
510 Demod.state = DEMOD_UNSYNCD;
511 } else {
512 MAKE_SOFT_DECISION();
513 if(v < 0) {
514 Demod.state = DEMOD_AWAITING_FALLING_EDGE_OF_SOF;
515 Demod.posCount = 0;
516 }
517 }
518 Demod.posCount++;
519 break;
520
521 case DEMOD_AWAITING_FALLING_EDGE_OF_SOF:
522 MAKE_SOFT_DECISION();
523 if(v < 0) {
524 Demod.state = DEMOD_GOT_FALLING_EDGE_OF_SOF;
525 Demod.posCount = 0;
526 } else {
527 if(Demod.posCount > 100) {
528 Demod.state = DEMOD_UNSYNCD;
529 }
530 }
531 Demod.posCount++;
532 break;
533
534 case DEMOD_GOT_FALLING_EDGE_OF_SOF:
535 MAKE_SOFT_DECISION();
536 if(v > 0) {
537 if(Demod.posCount < 12) {
538 Demod.state = DEMOD_UNSYNCD;
539 } else {
540 LED_C_ON(); // Got SOF
541 Demod.state = DEMOD_AWAITING_START_BIT;
542 Demod.posCount = 0;
543 Demod.len = 0;
544 Demod.metricN = 0;
545 Demod.metric = 0;
546 }
547 } else {
548 if(Demod.posCount > 100) {
549 Demod.state = DEMOD_UNSYNCD;
550 }
551 }
552 Demod.posCount++;
553 break;
554
555 case DEMOD_AWAITING_START_BIT:
556 MAKE_SOFT_DECISION();
557 if(v > 0) {
558 if(Demod.posCount > 10) {
559 Demod.state = DEMOD_UNSYNCD;
560 }
561 } else {
562 Demod.bitCount = 0;
563 Demod.posCount = 1;
564 Demod.thisBit = v;
565 Demod.shiftReg = 0;
566 Demod.state = DEMOD_RECEIVING_DATA;
567 }
568 break;
569
570 case DEMOD_RECEIVING_DATA:
571 MAKE_SOFT_DECISION();
572 if(Demod.posCount == 0) {
573 Demod.thisBit = v;
574 Demod.posCount = 1;
575 } else {
576 Demod.thisBit += v;
577
578 if(Demod.thisBit > 0) {
579 Demod.metric += Demod.thisBit;
580 } else {
581 Demod.metric -= Demod.thisBit;
582 }
583 (Demod.metricN)++;
584
585 Demod.shiftReg >>= 1;
586 if(Demod.thisBit > 0) {
587 Demod.shiftReg |= 0x200;
588 }
589
590 Demod.bitCount++;
591 if(Demod.bitCount == 10) {
592 uint16_t s = Demod.shiftReg;
593 if((s & 0x200) && !(s & 0x001)) {
594 uint8_t b = (s >> 1);
595 Demod.output[Demod.len] = b;
596 Demod.len++;
597 Demod.state = DEMOD_AWAITING_START_BIT;
598 } else if(s == 0x000) {
599 // This is EOF
600 LED_C_OFF();
601 return TRUE;
602 Demod.state = DEMOD_UNSYNCD;
603 } else {
604 Demod.state = DEMOD_UNSYNCD;
605 }
606 }
607 Demod.posCount = 0;
608 }
609 break;
610
611 default:
612 Demod.state = DEMOD_UNSYNCD;
613 break;
614 }
615
616 if (Demod.state == DEMOD_UNSYNCD) LED_C_OFF(); // Not synchronized...
617 return FALSE;
618 }
619
620 /*
621 * Demodulate the samples we received from the tag
622 * weTx: set to 'TRUE' if we behave like a reader
623 * set to 'FALSE' if we behave like a snooper
624 * quiet: set to 'TRUE' to disable debug output
625 */
626 static void GetSamplesFor14443Demod(int weTx, int n, int quiet)
627 {
628 int max = 0;
629 int gotFrame = FALSE;
630
631 //# define DMA_BUFFER_SIZE 8
632 int8_t *dmaBuf;
633
634 int lastRxCounter;
635 int8_t *upTo;
636
637 int ci, cq;
638
639 int samples = 0;
640
641 // Clear out the state of the "UART" that receives from the tag.
642 memset(BigBuf, 0x44, 400);
643 Demod.output = (uint8_t *)BigBuf;
644 Demod.len = 0;
645 Demod.state = DEMOD_UNSYNCD;
646
647 // And the UART that receives from the reader
648 Uart.output = (((uint8_t *)BigBuf) + 1024);
649 Uart.byteCntMax = 100;
650 Uart.state = STATE_UNSYNCD;
651
652 // Setup for the DMA.
653 dmaBuf = (int8_t *)(BigBuf + 32);
654 upTo = dmaBuf;
655 lastRxCounter = DMA_BUFFER_SIZE;
656 FpgaSetupSscDma((uint8_t *)dmaBuf, DMA_BUFFER_SIZE);
657
658 // Signal field is ON with the appropriate LED:
659 if (weTx) LED_D_ON(); else LED_D_OFF();
660 // And put the FPGA in the appropriate mode
661 FpgaWriteConfWord(
662 FPGA_MAJOR_MODE_HF_READER_RX_XCORR | FPGA_HF_READER_RX_XCORR_848_KHZ |
663 (weTx ? 0 : FPGA_HF_READER_RX_XCORR_SNOOP));
664
665 for(;;) {
666 int behindBy = lastRxCounter - AT91C_BASE_PDC_SSC->PDC_RCR;
667 if(behindBy > max) max = behindBy;
668
669 while(((lastRxCounter-AT91C_BASE_PDC_SSC->PDC_RCR) & (DMA_BUFFER_SIZE-1))
670 > 2)
671 {
672 ci = upTo[0];
673 cq = upTo[1];
674 upTo += 2;
675 if(upTo - dmaBuf > DMA_BUFFER_SIZE) {
676 upTo -= DMA_BUFFER_SIZE;
677 AT91C_BASE_PDC_SSC->PDC_RNPR = (uint32_t) upTo;
678 AT91C_BASE_PDC_SSC->PDC_RNCR = DMA_BUFFER_SIZE;
679 }
680 lastRxCounter -= 2;
681 if(lastRxCounter <= 0) {
682 lastRxCounter += DMA_BUFFER_SIZE;
683 }
684
685 samples += 2;
686
687 Handle14443UartBit(1);
688 Handle14443UartBit(1);
689
690 if(Handle14443SamplesDemod(ci, cq)) {
691 gotFrame = 1;
692 }
693 }
694
695 if(samples > 2000) {
696 break;
697 }
698 }
699 AT91C_BASE_PDC_SSC->PDC_PTCR = AT91C_PDC_RXTDIS;
700 if (!quiet) Dbprintf("%x %x %x", max, gotFrame, Demod.len);
701 }
702
703 //-----------------------------------------------------------------------------
704 // Read the tag's response. We just receive a stream of slightly-processed
705 // samples from the FPGA, which we will later do some signal processing on,
706 // to get the bits.
707 //-----------------------------------------------------------------------------
708 /*static void GetSamplesFor14443(int weTx, int n)
709 {
710 uint8_t *dest = (uint8_t *)BigBuf;
711 int c;
712
713 FpgaWriteConfWord(
714 FPGA_MAJOR_MODE_HF_READER_RX_XCORR | FPGA_HF_READER_RX_XCORR_848_KHZ |
715 (weTx ? 0 : FPGA_HF_READER_RX_XCORR_SNOOP));
716
717 c = 0;
718 for(;;) {
719 if(AT91C_BASE_SSC->SSC_SR & (AT91C_SSC_TXRDY)) {
720 AT91C_BASE_SSC->SSC_THR = 0x43;
721 }
722 if(AT91C_BASE_SSC->SSC_SR & (AT91C_SSC_RXRDY)) {
723 int8_t b;
724 b = (int8_t)AT91C_BASE_SSC->SSC_RHR;
725
726 dest[c++] = (uint8_t)b;
727
728 if(c >= n) {
729 break;
730 }
731 }
732 }
733 }*/
734
735 //-----------------------------------------------------------------------------
736 // Transmit the command (to the tag) that was placed in ToSend[].
737 //-----------------------------------------------------------------------------
738 static void TransmitFor14443(void)
739 {
740 int c;
741
742 FpgaSetupSsc();
743
744 while(AT91C_BASE_SSC->SSC_SR & (AT91C_SSC_TXRDY)) {
745 AT91C_BASE_SSC->SSC_THR = 0xff;
746 }
747
748 // Signal field is ON with the appropriate Red LED
749 LED_D_ON();
750 // Signal we are transmitting with the Green LED
751 LED_B_ON();
752 FpgaWriteConfWord(
753 FPGA_MAJOR_MODE_HF_READER_TX | FPGA_HF_READER_TX_SHALLOW_MOD);
754
755 for(c = 0; c < 10;) {
756 if(AT91C_BASE_SSC->SSC_SR & (AT91C_SSC_TXRDY)) {
757 AT91C_BASE_SSC->SSC_THR = 0xff;
758 c++;
759 }
760 if(AT91C_BASE_SSC->SSC_SR & (AT91C_SSC_RXRDY)) {
761 volatile uint32_t r = AT91C_BASE_SSC->SSC_RHR;
762 (void)r;
763 }
764 WDT_HIT();
765 }
766
767 c = 0;
768 for(;;) {
769 if(AT91C_BASE_SSC->SSC_SR & (AT91C_SSC_TXRDY)) {
770 AT91C_BASE_SSC->SSC_THR = ToSend[c];
771 c++;
772 if(c >= ToSendMax) {
773 break;
774 }
775 }
776 if(AT91C_BASE_SSC->SSC_SR & (AT91C_SSC_RXRDY)) {
777 volatile uint32_t r = AT91C_BASE_SSC->SSC_RHR;
778 (void)r;
779 }
780 WDT_HIT();
781 }
782 LED_B_OFF(); // Finished sending
783 }
784
785 //-----------------------------------------------------------------------------
786 // Code a layer 2 command (string of octets, including CRC) into ToSend[],
787 // so that it is ready to transmit to the tag using TransmitFor14443().
788 //-----------------------------------------------------------------------------
789 void CodeIso14443bAsReader(const uint8_t *cmd, int len)
790 {
791 int i, j;
792 uint8_t b;
793
794 ToSendReset();
795
796 // Establish initial reference level
797 for(i = 0; i < 40; i++) {
798 ToSendStuffBit(1);
799 }
800 // Send SOF
801 for(i = 0; i < 10; i++) {
802 ToSendStuffBit(0);
803 }
804
805 for(i = 0; i < len; i++) {
806 // Stop bits/EGT
807 ToSendStuffBit(1);
808 ToSendStuffBit(1);
809 // Start bit
810 ToSendStuffBit(0);
811 // Data bits
812 b = cmd[i];
813 for(j = 0; j < 8; j++) {
814 if(b & 1) {
815 ToSendStuffBit(1);
816 } else {
817 ToSendStuffBit(0);
818 }
819 b >>= 1;
820 }
821 }
822 // Send EOF
823 ToSendStuffBit(1);
824 for(i = 0; i < 10; i++) {
825 ToSendStuffBit(0);
826 }
827 for(i = 0; i < 8; i++) {
828 ToSendStuffBit(1);
829 }
830
831 // And then a little more, to make sure that the last character makes
832 // it out before we switch to rx mode.
833 for(i = 0; i < 24; i++) {
834 ToSendStuffBit(1);
835 }
836
837 // Convert from last character reference to length
838 ToSendMax++;
839 }
840
841 //-----------------------------------------------------------------------------
842 // Read an ISO 14443 tag. We send it some set of commands, and record the
843 // responses.
844 // The command name is misleading, it actually decodes the reponse in HEX
845 // into the output buffer (read the result using hexsamples, not hisamples)
846 //-----------------------------------------------------------------------------
847 void AcquireRawAdcSamplesIso14443(uint32_t parameter)
848 {
849 uint8_t cmd1[] = { 0x05, 0x00, 0x08, 0x39, 0x73 };
850
851 // Make sure that we start from off, since the tags are stateful;
852 // confusing things will happen if we don't reset them between reads.
853 FpgaWriteConfWord(FPGA_MAJOR_MODE_OFF);
854 LED_D_OFF();
855 SpinDelay(200);
856
857 SetAdcMuxFor(GPIO_MUXSEL_HIPKD);
858 FpgaSetupSsc();
859
860 // Now give it time to spin up.
861 // Signal field is on with the appropriate LED
862 LED_D_ON();
863 FpgaWriteConfWord(
864 FPGA_MAJOR_MODE_HF_READER_RX_XCORR | FPGA_HF_READER_RX_XCORR_848_KHZ);
865 SpinDelay(200);
866
867 CodeIso14443bAsReader(cmd1, sizeof(cmd1));
868 TransmitFor14443();
869 // LED_A_ON();
870 GetSamplesFor14443Demod(TRUE, 2000, FALSE);
871 // LED_A_OFF();
872 }
873
874 //-----------------------------------------------------------------------------
875 // Read a SRI512 ISO 14443 tag.
876 //
877 // SRI512 tags are just simple memory tags, here we're looking at making a dump
878 // of the contents of the memory. No anticollision algorithm is done, we assume
879 // we have a single tag in the field.
880 //
881 // I tried to be systematic and check every answer of the tag, every CRC, etc...
882 //-----------------------------------------------------------------------------
883 void ReadSRI512Iso14443(uint32_t parameter)
884 {
885 ReadSTMemoryIso14443(parameter,0x0F);
886 }
887 void ReadSRIX4KIso14443(uint32_t parameter)
888 {
889 ReadSTMemoryIso14443(parameter,0x7F);
890 }
891
892 void ReadSTMemoryIso14443(uint32_t parameter,uint32_t dwLast)
893 {
894 uint8_t i = 0x00;
895
896 // Make sure that we start from off, since the tags are stateful;
897 // confusing things will happen if we don't reset them between reads.
898 LED_D_OFF();
899 FpgaWriteConfWord(FPGA_MAJOR_MODE_OFF);
900 SpinDelay(200);
901
902 SetAdcMuxFor(GPIO_MUXSEL_HIPKD);
903 FpgaSetupSsc();
904
905 // Now give it time to spin up.
906 // Signal field is on with the appropriate LED
907 LED_D_ON();
908 FpgaWriteConfWord(
909 FPGA_MAJOR_MODE_HF_READER_RX_XCORR | FPGA_HF_READER_RX_XCORR_848_KHZ);
910 SpinDelay(200);
911
912 // First command: wake up the tag using the INITIATE command
913 uint8_t cmd1[] = { 0x06, 0x00, 0x97, 0x5b};
914 CodeIso14443bAsReader(cmd1, sizeof(cmd1));
915 TransmitFor14443();
916 // LED_A_ON();
917 GetSamplesFor14443Demod(TRUE, 2000,TRUE);
918 // LED_A_OFF();
919
920 if (Demod.len == 0) {
921 DbpString("No response from tag");
922 return;
923 } else {
924 Dbprintf("Randomly generated UID from tag (+ 2 byte CRC): %x %x %x",
925 Demod.output[0], Demod.output[1],Demod.output[2]);
926 }
927 // There is a response, SELECT the uid
928 DbpString("Now SELECT tag:");
929 cmd1[0] = 0x0E; // 0x0E is SELECT
930 cmd1[1] = Demod.output[0];
931 ComputeCrc14443(CRC_14443_B, cmd1, 2, &cmd1[2], &cmd1[3]);
932 CodeIso14443bAsReader(cmd1, sizeof(cmd1));
933 TransmitFor14443();
934 // LED_A_ON();
935 GetSamplesFor14443Demod(TRUE, 2000,TRUE);
936 // LED_A_OFF();
937 if (Demod.len != 3) {
938 Dbprintf("Expected 3 bytes from tag, got %d", Demod.len);
939 return;
940 }
941 // Check the CRC of the answer:
942 ComputeCrc14443(CRC_14443_B, Demod.output, 1 , &cmd1[2], &cmd1[3]);
943 if(cmd1[2] != Demod.output[1] || cmd1[3] != Demod.output[2]) {
944 DbpString("CRC Error reading select response.");
945 return;
946 }
947 // Check response from the tag: should be the same UID as the command we just sent:
948 if (cmd1[1] != Demod.output[0]) {
949 Dbprintf("Bad response to SELECT from Tag, aborting: %x %x", cmd1[1], Demod.output[0]);
950 return;
951 }
952 // Tag is now selected,
953 // First get the tag's UID:
954 cmd1[0] = 0x0B;
955 ComputeCrc14443(CRC_14443_B, cmd1, 1 , &cmd1[1], &cmd1[2]);
956 CodeIso14443bAsReader(cmd1, 3); // Only first three bytes for this one
957 TransmitFor14443();
958 // LED_A_ON();
959 GetSamplesFor14443Demod(TRUE, 2000,TRUE);
960 // LED_A_OFF();
961 if (Demod.len != 10) {
962 Dbprintf("Expected 10 bytes from tag, got %d", Demod.len);
963 return;
964 }
965 // The check the CRC of the answer (use cmd1 as temporary variable):
966 ComputeCrc14443(CRC_14443_B, Demod.output, 8, &cmd1[2], &cmd1[3]);
967 if(cmd1[2] != Demod.output[8] || cmd1[3] != Demod.output[9]) {
968 Dbprintf("CRC Error reading block! - Below: expected, got %x %x",
969 (cmd1[2]<<8)+cmd1[3], (Demod.output[8]<<8)+Demod.output[9]);
970 // Do not return;, let's go on... (we should retry, maybe ?)
971 }
972 Dbprintf("Tag UID (64 bits): %08x %08x",
973 (Demod.output[7]<<24) + (Demod.output[6]<<16) + (Demod.output[5]<<8) + Demod.output[4],
974 (Demod.output[3]<<24) + (Demod.output[2]<<16) + (Demod.output[1]<<8) + Demod.output[0]);
975
976 // Now loop to read all 16 blocks, address from 0 to 15
977 DbpString("Tag memory dump, block 0 to 15");
978 cmd1[0] = 0x08;
979 i = 0x00;
980 dwLast++;
981 for (;;) {
982 if (i == dwLast) {
983 DbpString("System area block (0xff):");
984 i = 0xff;
985 }
986 cmd1[1] = i;
987 ComputeCrc14443(CRC_14443_B, cmd1, 2, &cmd1[2], &cmd1[3]);
988 CodeIso14443bAsReader(cmd1, sizeof(cmd1));
989 TransmitFor14443();
990 // LED_A_ON();
991 GetSamplesFor14443Demod(TRUE, 2000,TRUE);
992 // LED_A_OFF();
993 if (Demod.len != 6) { // Check if we got an answer from the tag
994 DbpString("Expected 6 bytes from tag, got less...");
995 return;
996 }
997 // The check the CRC of the answer (use cmd1 as temporary variable):
998 ComputeCrc14443(CRC_14443_B, Demod.output, 4, &cmd1[2], &cmd1[3]);
999 if(cmd1[2] != Demod.output[4] || cmd1[3] != Demod.output[5]) {
1000 Dbprintf("CRC Error reading block! - Below: expected, got %x %x",
1001 (cmd1[2]<<8)+cmd1[3], (Demod.output[4]<<8)+Demod.output[5]);
1002 // Do not return;, let's go on... (we should retry, maybe ?)
1003 }
1004 // Now print out the memory location:
1005 Dbprintf("Address=%x, Contents=%x, CRC=%x", i,
1006 (Demod.output[3]<<24) + (Demod.output[2]<<16) + (Demod.output[1]<<8) + Demod.output[0],
1007 (Demod.output[4]<<8)+Demod.output[5]);
1008 if (i == 0xff) {
1009 break;
1010 }
1011 i++;
1012 }
1013 }
1014
1015
1016 //=============================================================================
1017 // Finally, the `sniffer' combines elements from both the reader and
1018 // simulated tag, to show both sides of the conversation.
1019 //=============================================================================
1020
1021 //-----------------------------------------------------------------------------
1022 // Record the sequence of commands sent by the reader to the tag, with
1023 // triggering so that we start recording at the point that the tag is moved
1024 // near the reader.
1025 //-----------------------------------------------------------------------------
1026 /*
1027 * Memory usage for this function, (within BigBuf)
1028 * 0-4095 : Demodulated samples receive (4096 bytes) - DEMOD_TRACE_SIZE
1029 * 4096-6143 : Last Received command, 2048 bytes (reader->tag) - READER_TAG_BUFFER_SIZE
1030 * 6144-8191 : Last Received command, 2048 bytes(tag->reader) - TAG_READER_BUFFER_SIZE
1031 * 8192-9215 : DMA Buffer, 1024 bytes (samples) - DMA_BUFFER_SIZE
1032 */
1033 void SnoopIso14443(void)
1034 {
1035 // We won't start recording the frames that we acquire until we trigger;
1036 // a good trigger condition to get started is probably when we see a
1037 // response from the tag.
1038 int triggered = FALSE;
1039
1040 // The command (reader -> tag) that we're working on receiving.
1041 uint8_t *receivedCmd = (uint8_t *)(BigBuf) + DEMOD_TRACE_SIZE;
1042 // The response (tag -> reader) that we're working on receiving.
1043 uint8_t *receivedResponse = (uint8_t *)(BigBuf) + DEMOD_TRACE_SIZE + READER_TAG_BUFFER_SIZE;
1044
1045 // As we receive stuff, we copy it from receivedCmd or receivedResponse
1046 // into trace, along with its length and other annotations.
1047 uint8_t *trace = (uint8_t *)BigBuf;
1048 int traceLen = 0;
1049
1050 // The DMA buffer, used to stream samples from the FPGA.
1051 int8_t *dmaBuf = (int8_t *)(BigBuf) + DEMOD_TRACE_SIZE + READER_TAG_BUFFER_SIZE + TAG_READER_BUFFER_SIZE;
1052 int lastRxCounter;
1053 int8_t *upTo;
1054 int ci, cq;
1055 int maxBehindBy = 0;
1056
1057 // Count of samples received so far, so that we can include timing
1058 // information in the trace buffer.
1059 int samples = 0;
1060
1061 // Initialize the trace buffer
1062 memset(trace, 0x44, DEMOD_TRACE_SIZE);
1063
1064 // Set up the demodulator for tag -> reader responses.
1065 Demod.output = receivedResponse;
1066 Demod.len = 0;
1067 Demod.state = DEMOD_UNSYNCD;
1068
1069 // And the reader -> tag commands
1070 memset(&Uart, 0, sizeof(Uart));
1071 Uart.output = receivedCmd;
1072 Uart.byteCntMax = 100;
1073 Uart.state = STATE_UNSYNCD;
1074
1075 // Print some debug information about the buffer sizes
1076 Dbprintf("Snooping buffers initialized:");
1077 Dbprintf(" Trace: %i bytes", DEMOD_TRACE_SIZE);
1078 Dbprintf(" Reader -> tag: %i bytes", READER_TAG_BUFFER_SIZE);
1079 Dbprintf(" tag -> Reader: %i bytes", TAG_READER_BUFFER_SIZE);
1080 Dbprintf(" DMA: %i bytes", DMA_BUFFER_SIZE);
1081
1082 // Use a counter for blinking the LED
1083 long ledCount=0;
1084 long ledFlashAt=200000;
1085
1086 // And put the FPGA in the appropriate mode
1087 // Signal field is off with the appropriate LED
1088 LED_D_OFF();
1089 FpgaWriteConfWord(
1090 FPGA_MAJOR_MODE_HF_READER_RX_XCORR | FPGA_HF_READER_RX_XCORR_848_KHZ |
1091 FPGA_HF_READER_RX_XCORR_SNOOP);
1092 SetAdcMuxFor(GPIO_MUXSEL_HIPKD);
1093
1094 // Setup for the DMA.
1095 FpgaSetupSsc();
1096 upTo = dmaBuf;
1097 lastRxCounter = DMA_BUFFER_SIZE;
1098 FpgaSetupSscDma((uint8_t *)dmaBuf, DMA_BUFFER_SIZE);
1099 // And now we loop, receiving samples.
1100 for(;;) {
1101 // Blink the LED while Snooping
1102 ledCount++;
1103 if (ledCount == ledFlashAt) {
1104 LED_D_ON();
1105 }
1106 if (ledCount >= 2*ledFlashAt) {
1107 LED_D_OFF();
1108 ledCount=0;
1109 }
1110
1111 int behindBy = (lastRxCounter - AT91C_BASE_PDC_SSC->PDC_RCR) &
1112 (DMA_BUFFER_SIZE-1);
1113 if(behindBy > maxBehindBy) {
1114 maxBehindBy = behindBy;
1115 if(behindBy > (DMA_BUFFER_SIZE-2)) { // TODO: understand whether we can increase/decrease as we want or not?
1116 Dbprintf("blew circular buffer! behindBy=0x%x", behindBy);
1117 goto done;
1118 }
1119 }
1120 if(behindBy < 2) continue;
1121
1122 ci = upTo[0];
1123 cq = upTo[1];
1124 upTo += 2;
1125 lastRxCounter -= 2;
1126 if(upTo - dmaBuf > DMA_BUFFER_SIZE) {
1127 upTo -= DMA_BUFFER_SIZE;
1128 lastRxCounter += DMA_BUFFER_SIZE;
1129 AT91C_BASE_PDC_SSC->PDC_RNPR = (uint32_t) upTo;
1130 AT91C_BASE_PDC_SSC->PDC_RNCR = DMA_BUFFER_SIZE;
1131 }
1132
1133 samples += 2;
1134
1135 #define HANDLE_BIT_IF_BODY \
1136 if(triggered) { \
1137 ledFlashAt=30000; \
1138 trace[traceLen++] = ((samples >> 0) & 0xff); \
1139 trace[traceLen++] = ((samples >> 8) & 0xff); \
1140 trace[traceLen++] = ((samples >> 16) & 0xff); \
1141 trace[traceLen++] = ((samples >> 24) & 0xff); \
1142 trace[traceLen++] = 0; \
1143 trace[traceLen++] = 0; \
1144 trace[traceLen++] = 0; \
1145 trace[traceLen++] = 0; \
1146 trace[traceLen++] = Uart.byteCnt; \
1147 memcpy(trace+traceLen, receivedCmd, Uart.byteCnt); \
1148 traceLen += Uart.byteCnt; \
1149 if(traceLen > 1000) break; \
1150 } \
1151 /* And ready to receive another command. */ \
1152 memset(&Uart, 0, sizeof(Uart)); \
1153 Uart.output = receivedCmd; \
1154 Uart.byteCntMax = 100; \
1155 Uart.state = STATE_UNSYNCD; \
1156 /* And also reset the demod code, which might have been */ \
1157 /* false-triggered by the commands from the reader. */ \
1158 memset(&Demod, 0, sizeof(Demod)); \
1159 Demod.output = receivedResponse; \
1160 Demod.state = DEMOD_UNSYNCD; \
1161
1162 if(Handle14443UartBit(ci & 1)) {
1163 HANDLE_BIT_IF_BODY
1164 }
1165 if(Handle14443UartBit(cq & 1)) {
1166 HANDLE_BIT_IF_BODY
1167 }
1168
1169 if(Handle14443SamplesDemod(ci, cq)) {
1170 // timestamp, as a count of samples
1171 trace[traceLen++] = ((samples >> 0) & 0xff);
1172 trace[traceLen++] = ((samples >> 8) & 0xff);
1173 trace[traceLen++] = ((samples >> 16) & 0xff);
1174 trace[traceLen++] = 0x80 | ((samples >> 24) & 0xff);
1175 // correlation metric (~signal strength estimate)
1176 if(Demod.metricN != 0) {
1177 Demod.metric /= Demod.metricN;
1178 }
1179 trace[traceLen++] = ((Demod.metric >> 0) & 0xff);
1180 trace[traceLen++] = ((Demod.metric >> 8) & 0xff);
1181 trace[traceLen++] = ((Demod.metric >> 16) & 0xff);
1182 trace[traceLen++] = ((Demod.metric >> 24) & 0xff);
1183 // length
1184 trace[traceLen++] = Demod.len;
1185 memcpy(trace+traceLen, receivedResponse, Demod.len);
1186 traceLen += Demod.len;
1187 if(traceLen > DEMOD_TRACE_SIZE) {
1188 DbpString("Reached trace limit");
1189 goto done;
1190 }
1191
1192 triggered = TRUE;
1193
1194 // And ready to receive another response.
1195 memset(&Demod, 0, sizeof(Demod));
1196 Demod.output = receivedResponse;
1197 Demod.state = DEMOD_UNSYNCD;
1198 }
1199 WDT_HIT();
1200
1201 if(BUTTON_PRESS()) {
1202 DbpString("cancelled");
1203 goto done;
1204 }
1205 }
1206
1207 done:
1208 LED_D_OFF();
1209 AT91C_BASE_PDC_SSC->PDC_PTCR = AT91C_PDC_RXTDIS;
1210 DbpString("Snoop statistics:");
1211 Dbprintf(" Max behind by: %i", maxBehindBy);
1212 Dbprintf(" Uart State: %x", Uart.state);
1213 Dbprintf(" Uart ByteCnt: %i", Uart.byteCnt);
1214 Dbprintf(" Uart ByteCntMax: %i", Uart.byteCntMax);
1215 Dbprintf(" Trace length: %i", traceLen);
1216 }
Impressum, Datenschutz