]> cvs.zerfleddert.de Git - proxmark3-svn/blob - client/cmdanalyse.c
CHG: 'lf t55xx' the no-time limit waiting for the device to ACK when transfering...
[proxmark3-svn] / client / cmdanalyse.c
1 //-----------------------------------------------------------------------------
2 // Copyright (C) 2016 iceman
3 //
4 // This code is licensed to you under the terms of the GNU GPL, version 2 or,
5 // at your option, any later version. See the LICENSE.txt file for the text of
6 // the license.
7 //-----------------------------------------------------------------------------
8 // Analyse bytes commands
9 //-----------------------------------------------------------------------------
10 #include "cmdanalyse.h"
11 #include "nonce2key/nonce2key.h"
12
13 static int CmdHelp(const char *Cmd);
14
15 int usage_analyse_lcr(void) {
16 PrintAndLog("Specifying the bytes of a UID with a known LRC will find the last byte value");
17 PrintAndLog("needed to generate that LRC with a rolling XOR. All bytes should be specified in HEX.");
18 PrintAndLog("");
19 PrintAndLog("Usage: analyse lcr [h] <bytes>");
20 PrintAndLog("Options:");
21 PrintAndLog(" h This help");
22 PrintAndLog(" <bytes> bytes to calc missing XOR in a LCR");
23 PrintAndLog("");
24 PrintAndLog("Samples:");
25 PrintAndLog(" analyse lcr 04008064BA");
26 PrintAndLog("expected output: Target (BA) requires final LRC XOR byte value: 5A");
27 return 0;
28 }
29 int usage_analyse_checksum(void) {
30 PrintAndLog("The bytes will be added with eachother and than limited with the applied mask");
31 PrintAndLog("Finally compute ones' complement of the least significant bytes");
32 PrintAndLog("");
33 PrintAndLog("Usage: analyse chksum [h] b <bytes> m <mask>");
34 PrintAndLog("Options:");
35 PrintAndLog(" h This help");
36 PrintAndLog(" b <bytes> bytes to calc missing XOR in a LCR");
37 PrintAndLog(" m <mask> bit mask to limit the outpuyt");
38 PrintAndLog("");
39 PrintAndLog("Samples:");
40 PrintAndLog(" analyse chksum b 137AF00A0A0D m FF");
41 PrintAndLog("expected output: 0x61");
42 return 0;
43 }
44 int usage_analyse_crc(void){
45 PrintAndLog("A stub method to test different crc implementations inside the PM3 sourcecode. Just because you figured out the poly, doesn't mean you get the desired output");
46 PrintAndLog("");
47 PrintAndLog("Usage: analyse crc [h] <bytes>");
48 PrintAndLog("Options:");
49 PrintAndLog(" h This help");
50 PrintAndLog(" <bytes> bytes to calc crc");
51 PrintAndLog("");
52 PrintAndLog("Samples:");
53 PrintAndLog(" analyse crc 137AF00A0A0D");
54 return 0;
55 }
56 int usage_analyse_hid(void){
57 PrintAndLog("Permute function from 'heart of darkness' paper.");
58 PrintAndLog("");
59 PrintAndLog("Usage: analyse hid [h] <r|f> <bytes>");
60 PrintAndLog("Options:");
61 PrintAndLog(" h This help");
62 PrintAndLog(" r reverse permuted key");
63 PrintAndLog(" f permute key");
64 PrintAndLog(" <bytes> input bytes");
65 PrintAndLog("");
66 PrintAndLog("Samples:");
67 PrintAndLog(" analyse hid r 0123456789abcdef");
68 return 0;
69 }
70
71 static uint8_t calculateLRC( uint8_t* bytes, uint8_t len) {
72 uint8_t LRC = 0;
73 for (uint8_t i = 0; i < len; i++)
74 LRC ^= bytes[i];
75 return LRC;
76 }
77
78 static uint8_t calcSumCrumbAdd( uint8_t* bytes, uint8_t len, uint32_t mask) {
79 uint8_t sum = 0;
80 for (uint8_t i = 0; i < len; i++) {
81 sum += CRUMB(bytes[i], 0);
82 sum += CRUMB(bytes[i], 2);
83 sum += CRUMB(bytes[i], 4);
84 sum += CRUMB(bytes[i], 6);
85 }
86 sum &= mask;
87 return sum;
88 }
89 static uint8_t calcSumCrumbAddOnes( uint8_t* bytes, uint8_t len, uint32_t mask) {
90 return ~calcSumCrumbAdd(bytes, len, mask);
91 }
92 static uint8_t calcSumNibbleAdd( uint8_t* bytes, uint8_t len, uint32_t mask) {
93 uint8_t sum = 0;
94 for (uint8_t i = 0; i < len; i++) {
95 sum += NIBBLE_LOW(bytes[i]);
96 sum += NIBBLE_HIGH(bytes[i]);
97 }
98 sum &= mask;
99 return sum;
100 }
101 static uint8_t calcSumNibbleAddOnes( uint8_t* bytes, uint8_t len, uint32_t mask){
102 return ~calcSumNibbleAdd(bytes, len, mask);
103 }
104 static uint8_t calcSumNibbleXor( uint8_t* bytes, uint8_t len, uint32_t mask) {
105 uint8_t sum = 0;
106 for (uint8_t i = 0; i < len; i++) {
107 sum ^= NIBBLE_LOW(bytes[i]);
108 sum ^= NIBBLE_HIGH(bytes[i]);
109 }
110 sum &= mask;
111 return sum;
112 }
113 static uint8_t calcSumByteXor( uint8_t* bytes, uint8_t len, uint32_t mask) {
114 uint8_t sum = 0;
115 for (uint8_t i = 0; i < len; i++)
116 sum ^= bytes[i];
117 sum &= mask;
118 return sum;
119 }
120
121 static uint8_t calcSumByteAdd( uint8_t* bytes, uint8_t len, uint32_t mask) {
122 uint8_t sum = 0;
123 for (uint8_t i = 0; i < len; i++)
124 sum += bytes[i];
125 sum &= mask;
126 return sum;
127 }
128 // Ones complement
129 static uint8_t calcSumByteAddOnes( uint8_t* bytes, uint8_t len, uint32_t mask) {
130 return ~calcSumByteAdd(bytes, len, mask);
131 }
132
133
134
135 static uint8_t calcSumByteSub( uint8_t* bytes, uint8_t len, uint32_t mask) {
136 uint8_t sum = 0;
137 for (uint8_t i = 0; i < len; i++)
138 sum -= bytes[i];
139 sum &= mask;
140 return sum;
141 }
142 static uint8_t calcSumByteSubOnes( uint8_t* bytes, uint8_t len, uint32_t mask){
143 return ~calcSumByteSub(bytes, len, mask);
144 }
145 static uint8_t calcSumNibbleSub( uint8_t* bytes, uint8_t len, uint32_t mask) {
146 uint8_t sum = 0;
147 for (uint8_t i = 0; i < len; i++) {
148 sum -= NIBBLE_LOW(bytes[i]);
149 sum -= NIBBLE_HIGH(bytes[i]);
150 }
151 sum &= mask;
152 return sum;
153 }
154 static uint8_t calcSumNibbleSubOnes( uint8_t* bytes, uint8_t len, uint32_t mask) {
155 return ~calcSumNibbleSub(bytes, len, mask);
156 }
157
158 // measuring LFSR maximum length
159 int CmdAnalyseLfsr(const char *Cmd){
160
161 uint16_t start_state = 0; /* Any nonzero start state will work. */
162 uint16_t lfsr = start_state;
163 //uint32_t period = 0;
164
165 uint8_t iv = param_get8ex(Cmd, 0, 0, 16);
166 uint8_t find = param_get8ex(Cmd, 1, 0, 16);
167
168 printf("LEGIC LFSR IV 0x%02X: \n", iv);
169 printf(" bit# | lfsr | ^0x40 | 0x%02X ^ lfsr \n",find);
170
171 for (uint8_t i = 0x01; i < 0x30; i += 1) {
172 //period = 0;
173 legic_prng_init(iv);
174 legic_prng_forward(i);
175 lfsr = legic_prng_get_bits(12);
176
177 printf(" %02X | %03X | %03X | %03X \n",i, lfsr, 0x40 ^ lfsr, find ^ lfsr);
178 }
179 return 0;
180 }
181 int CmdAnalyseLCR(const char *Cmd) {
182 uint8_t data[50];
183 char cmdp = param_getchar(Cmd, 0);
184 if (strlen(Cmd) == 0|| cmdp == 'h' || cmdp == 'H') return usage_analyse_lcr();
185
186 int len = 0;
187 param_gethex_ex(Cmd, 0, data, &len);
188 if ( len%2 ) return usage_analyse_lcr();
189 len >>= 1;
190 uint8_t finalXor = calculateLRC(data, len);
191 PrintAndLog("Target [%02X] requires final LRC XOR byte value: 0x%02X",data[len-1] ,finalXor);
192 return 0;
193 }
194 int CmdAnalyseCRC(const char *Cmd) {
195
196 char cmdp = param_getchar(Cmd, 0);
197 if (strlen(Cmd) == 0 || cmdp == 'h' || cmdp == 'H') return usage_analyse_crc();
198
199 int len = strlen(Cmd);
200 if ( len & 1 ) return usage_analyse_crc();
201
202 // add 1 for null terminator.
203 uint8_t *data = malloc(len+1);
204 if ( data == NULL ) return 1;
205
206 if ( param_gethex(Cmd, 0, data, len)) {
207 free(data);
208 return usage_analyse_crc();
209 }
210 len >>= 1;
211
212 //PrintAndLog("\nTests with '%s' hex bytes", sprint_hex(data, len));
213
214 PrintAndLog("\nTests of reflection. Two current methods in source code");
215 PrintAndLog(" reflect(0x3e23L,3) is %04X == 0x3e26", reflect(0x3e23L,3) );
216 PrintAndLog(" SwapBits(0x3e23L,3) is %04X == 0x3e26", SwapBits(0x3e23L,3) );
217 PrintAndLog(" 0xB400 == %04X", reflect( (1 << 16 | 0xb400),16) );
218
219 //
220 // Test of CRC16, '123456789' string.
221 //
222 PrintAndLog("\nTests with '123456789' string");
223 uint8_t dataStr[] = { 0x31,0x32,0x33,0x34,0x35,0x36,0x37,0x38,0x39 };
224 uint8_t legic8 = CRC8Legic(dataStr, sizeof(dataStr));
225
226 PrintAndLog("LEGIC: CRC16: %X", CRC16Legic(dataStr, sizeof(dataStr), legic8));
227
228 //these below has been tested OK.
229 PrintAndLog("Confirmed CRC Implementations");
230 PrintAndLog("LEGIC: CRC8 : %X (0xC6 expected)", legic8);
231 PrintAndLog("MAXIM: CRC8 : %X (0xA1 expected)", CRC8Maxim(dataStr, sizeof(dataStr)));
232 PrintAndLog("DNP : CRC16: %X (0x82EA expected)", CRC16_DNP(dataStr, sizeof(dataStr)));
233 PrintAndLog("CCITT: CRC16: %X (0xE5CC expected)", CRC16_CCITT(dataStr, sizeof(dataStr)));
234
235 PrintAndLog("ICLASS org: CRC16: %X (0x expected)",iclass_crc16( (char*)dataStr, sizeof(dataStr)));
236 PrintAndLog("ICLASS ice: CRC16: %X (0x expected)",CRC16_ICLASS(dataStr, sizeof(dataStr)));
237
238
239
240 uint8_t dataStr1234[] = { 0x1,0x2,0x3,0x4};
241 PrintAndLog("ISO15693 org: : CRC16: %X (0xF0B8 expected)", Iso15693Crc(dataStr1234, sizeof(dataStr1234)));
242 PrintAndLog("ISO15693 ice: : CRC16: %X (0xF0B8 expected)", CRC16_Iso15693(dataStr1234, sizeof(dataStr1234)));
243
244 free(data);
245 return 0;
246 }
247 int CmdAnalyseCHKSUM(const char *Cmd){
248
249 uint8_t data[50];
250 uint8_t cmdp = 0;
251 uint32_t mask = 0xFF;
252 bool errors = false;
253 int len = 0;
254 memset(data, 0x0, sizeof(data));
255
256 while(param_getchar(Cmd, cmdp) != 0x00) {
257 switch(param_getchar(Cmd, cmdp)) {
258 case 'b':
259 case 'B':
260 param_gethex_ex(Cmd, cmdp+1, data, &len);
261 if ( len%2 ) errors = true;
262 len >>= 1;
263 cmdp += 2;
264 break;
265 case 'm':
266 case 'M':
267 mask = param_get32ex(Cmd, cmdp+1, 0, 16);
268 cmdp += 2;
269 break;
270 case 'h':
271 case 'H':
272 return usage_analyse_checksum();
273 default:
274 PrintAndLog("Unknown parameter '%c'", param_getchar(Cmd, cmdp));
275 errors = true;
276 break;
277 }
278 if(errors) break;
279 }
280 //Validations
281 if(errors) return usage_analyse_checksum();
282
283 PrintAndLog("\nByte Add | 0x%X", calcSumByteAdd(data, len, mask));
284 PrintAndLog("Nibble Add | 0x%X", calcSumNibbleAdd(data, len, mask));
285 PrintAndLog("Crumb Add | 0x%X", calcSumCrumbAdd(data, len, mask));
286
287 PrintAndLog("\nByte Subtract | 0x%X", calcSumByteSub(data, len, mask));
288 PrintAndLog("Nibble Subtract | 0x%X", calcSumNibbleSub(data, len, mask));
289
290 PrintAndLog("\nCHECKSUM - One's complement");
291 PrintAndLog("Byte Add | 0x%X", calcSumByteAddOnes(data, len, mask));
292 PrintAndLog("Nibble Add | 0x%X", calcSumNibbleAddOnes(data, len, mask));
293 PrintAndLog("Crumb Add | 0x%X", calcSumCrumbAddOnes(data, len, mask));
294
295 PrintAndLog("Byte Subtract | 0x%X", calcSumByteSubOnes(data, len, mask));
296 PrintAndLog("Nibble Subtract | 0x%X", calcSumNibbleSubOnes(data, len, mask));
297
298 PrintAndLog("\nXOR");
299 PrintAndLog("Byte Xor | 0x%X", calcSumByteXor(data, len, mask));
300 PrintAndLog("Nibble Xor | 0x%X", calcSumNibbleXor(data, len, mask));
301
302 return 0;
303 }
304
305 int CmdAnalyseDates(const char *Cmd){
306 // look for datestamps in a given array of bytes
307 PrintAndLog("To be implemented. Feel free to contribute!");
308 return 0;
309 }
310 int CmdAnalyseTEASelfTest(const char *Cmd){
311
312 uint8_t v[8], v_le[8];
313 memset(v, 0x00, sizeof(v));
314 memset(v_le, 0x00, sizeof(v_le));
315 uint8_t* v_ptr = v_le;
316
317 uint8_t cmdlen = strlen(Cmd);
318 cmdlen = ( sizeof(v)<<2 < cmdlen ) ? sizeof(v)<<2 : cmdlen;
319
320 if ( param_gethex(Cmd, 0, v, cmdlen) > 0 ){
321 PrintAndLog("can't read hex chars, uneven? :: %u", cmdlen);
322 return 1;
323 }
324
325 SwapEndian64ex(v , 8, 4, v_ptr);
326
327 // ENCRYPTION KEY:
328 uint8_t key[16] = {0x55,0xFE,0xF6,0x30,0x62,0xBF,0x0B,0xC1,0xC9,0xB3,0x7C,0x34,0x97,0x3E,0x29,0xFB };
329 uint8_t keyle[16];
330 uint8_t* key_ptr = keyle;
331 SwapEndian64ex(key , sizeof(key), 4, key_ptr);
332
333 PrintAndLog("TEST LE enc| %s", sprint_hex(v_ptr, 8));
334
335 tea_decrypt(v_ptr, key_ptr);
336 PrintAndLog("TEST LE dec | %s", sprint_hex_ascii(v_ptr, 8));
337
338 tea_encrypt(v_ptr, key_ptr);
339 tea_encrypt(v_ptr, key_ptr);
340 PrintAndLog("TEST enc2 | %s", sprint_hex_ascii(v_ptr, 8));
341
342 return 0;
343 }
344
345 int CmdAnalyseA(const char *Cmd){
346 /*
347 piwi
348 // uid(2e086b1a) nt(230736f6) ks(0b0008000804000e) nr(000000000)
349 // uid(2e086b1a) nt(230736f6) ks(0e0b0e0b090c0d02) nr(000000001)
350 // uid(2e086b1a) nt(230736f6) ks(0e05060e01080b08) nr(000000002)
351 uint64_t d1[] = {0x2e086b1a, 0x230736f6, 0x0000001, 0x0e0b0e0b090c0d02};
352 uint64_t d2[] = {0x2e086b1a, 0x230736f6, 0x0000002, 0x0e05060e01080b08};
353
354 // uid(17758822) nt(c0c69e59) ks(080105020705040e) nr(00000001)
355 // uid(17758822) nt(c0c69e59) ks(01070a05050c0705) nr(00000002)
356 uint64_t d1[] = {0x17758822, 0xc0c69e59, 0x0000001, 0x080105020705040e};
357 uint64_t d2[] = {0x17758822, 0xc0c69e59, 0x0000002, 0x01070a05050c0705};
358
359 // uid(6e442129) nt(8f699195) ks(090d0b0305020f02) nr(00000001)
360 // uid(6e442129) nt(8f699195) ks(03030508030b0c0e) nr(00000002)
361 // uid(6e442129) nt(8f699195) ks(02010f030c0d050d) nr(00000003)
362 // uid(6e442129) nt(8f699195) ks(00040f0f0305030e) nr(00000004)
363 uint64_t d1[] = {0x6e442129, 0x8f699195, 0x0000001, 0x090d0b0305020f02};
364 uint64_t d2[] = {0x6e442129, 0x8f699195, 0x0000004, 0x00040f0f0305030e};
365
366 uid(3e172b29) nt(039b7bd2) ks(0c0e0f0505080800) nr(00000001)
367 uid(3e172b29) nt(039b7bd2) ks(0e06090d03000b0f) nr(00000002)
368 */
369 uint64_t key = 0;
370 uint64_t d1[] = {0x3e172b29, 0x039b7bd2, 0x0000001, 0x0c0e0f0505080800};
371 uint64_t d2[] = {0x3e172b29, 0x039b7bd2, 0x0000002, 0x0e06090d03000b0f};
372
373 nonce2key_ex(0, 0 , d1[0], d1[1], d1[2], d1[3], &key);
374 nonce2key_ex(0, 0 , d2[0], d2[1], d2[2], d2[3], &key);
375 return 0;
376 }
377
378 static void permute(uint8_t *data, uint8_t len, uint8_t *output){
379 #define KEY_SIZE 8
380
381 if ( len > KEY_SIZE ) {
382 for(uint8_t m = 0; m < len; m += KEY_SIZE){
383 permute(data+m, KEY_SIZE, output+m);
384 }
385 return;
386 }
387 if ( len != KEY_SIZE ) {
388 printf("wrong key size\n");
389 return;
390 }
391 uint8_t i,j,p, mask;
392 for( i=0; i < KEY_SIZE; ++i){
393 p = 0;
394 mask = 0x80 >> i;
395 for( j=0; j < KEY_SIZE; ++j){
396 p >>= 1;
397 if (data[j] & mask)
398 p |= 0x80;
399 }
400 output[i] = p;
401 }
402 }
403 static void permute_rev(uint8_t *data, uint8_t len, uint8_t *output){
404 permute(data, len, output);
405 permute(output, len, data);
406 permute(data, len, output);
407 }
408 static void simple_crc(uint8_t *data, uint8_t len, uint8_t *output){
409 uint8_t crc = 0;
410 for( uint8_t i=0; i < len; ++i){
411 // seventh byte contains the crc.
412 if ( (i & 0x7) == 0x7 ) {
413 output[i] = crc ^ 0xFF;
414 crc = 0;
415 } else {
416 output[i] = data[i];
417 crc ^= data[i];
418 }
419 }
420 }
421 // DES doesn't use the MSB.
422 static void shave(uint8_t *data, uint8_t len){
423 for (uint8_t i=0; i<len; ++i)
424 data[i] &= 0xFE;
425 }
426 static void generate_rev(uint8_t *data, uint8_t len) {
427 uint8_t *key = calloc(len,1);
428 printf("input permuted key | %s \n", sprint_hex(data, len));
429 permute_rev(data, len, key);
430 printf(" unpermuted key | %s \n", sprint_hex(key, len));
431 shave(key, len);
432 printf(" key | %s \n", sprint_hex(key, len));
433 free(key);
434 }
435 static void generate(uint8_t *data, uint8_t len) {
436 uint8_t *key = calloc(len,1);
437 uint8_t *pkey = calloc(len,1);
438 printf(" input key | %s \n", sprint_hex(data, len));
439 permute(data, len, pkey);
440 printf(" permuted key | %s \n", sprint_hex(pkey, len));
441 simple_crc(pkey, len, key );
442 printf(" CRC'ed key | %s \n", sprint_hex(key, len));
443 free(key);
444 free(pkey);
445 }
446 int CmdAnalyseHid(const char *Cmd){
447
448 uint8_t key[8] = {0};
449 uint8_t key_std_format[8] = {0};
450 uint8_t key_iclass_format[8] = {0};
451 uint8_t data[16] = {0};
452 bool isReverse = FALSE;
453 int len = 0;
454 char cmdp = param_getchar(Cmd, 0);
455 if (strlen(Cmd) == 0|| cmdp == 'h' || cmdp == 'H') return usage_analyse_hid();
456
457 if ( cmdp == 'r' || cmdp == 'R' )
458 isReverse = TRUE;
459
460 param_gethex_ex(Cmd, 1, data, &len);
461 if ( len%2 ) return usage_analyse_hid();
462
463 len >>= 1;
464
465 memcpy(key, data, 8);
466
467 if ( isReverse ) {
468 generate_rev(data, len);
469 permutekey_rev(key, key_std_format);
470 printf(" holiman iclass key | %s \n", sprint_hex(key_std_format, 8));
471 }
472 else {
473 generate(data, len);
474 permutekey(key, key_iclass_format);
475 printf(" holiman std key | %s \n", sprint_hex(key_iclass_format, 8));
476 }
477 return 0;
478 }
479
480 static command_t CommandTable[] = {
481 {"help", CmdHelp, 1, "This help"},
482 {"lcr", CmdAnalyseLCR, 1, "Generate final byte for XOR LRC"},
483 {"crc", CmdAnalyseCRC, 1, "Stub method for CRC evaluations"},
484 {"chksum", CmdAnalyseCHKSUM, 1, "Checksum with adding, masking and one's complement"},
485 {"dates", CmdAnalyseDates, 1, "Look for datestamps in a given array of bytes"},
486 {"tea", CmdAnalyseTEASelfTest, 1, "Crypto TEA test"},
487 {"lfsr", CmdAnalyseLfsr, 1, "LFSR tests"},
488 {"a", CmdAnalyseA, 1, "num bits test"},
489 {"hid", CmdAnalyseHid, 1, "Permute function from 'heart of darkness' paper"},
490 {NULL, NULL, 0, NULL}
491 };
492
493 int CmdAnalyse(const char *Cmd) {
494 clearCommandBuffer();
495 CmdsParse(CommandTable, Cmd);
496 return 0;
497 }
498
499 int CmdHelp(const char *Cmd) {
500 CmdsHelp(CommandTable);
501 return 0;
502 }
Impressum, Datenschutz