1 //----------------------------------------------------------------------------- 
   2 // Copyright (C) 2010 iZsh <izsh at fail0verflow.com> 
   4 // This code is licensed to you under the terms of the GNU GPL, version 2 or, 
   5 // at your option, any later version. See the LICENSE.txt file for the text of 
   7 //----------------------------------------------------------------------------- 
   8 // Low frequency commands 
   9 //----------------------------------------------------------------------------- 
  15 #include "proxmark3.h" 
  19 #include "cmdparser.h" 
  25 #include "cmdlfawid.h" 
  27 #include "cmdlfem4x.h" 
  28 #include "cmdlfhitag.h" 
  29 #include "cmdlft55xx.h" 
  30 #include "cmdlfpcf7931.h" 
  33 #include "cmdlfviking.h" 
  34 static int CmdHelp(const char *Cmd
); 
  37 int usage_lf_cmdread() 
  39         PrintAndLog("Usage: lf cmdread  <delay off>  <zero> <one> <cmdbytes> [H] "); 
  40         PrintAndLog("Options:        "); 
  41         PrintAndLog("       h             This help"); 
  42         PrintAndLog("       L             Low frequency (125 KHz)"); 
  43         PrintAndLog("       H             High frequency (134 KHz)"); 
  44         PrintAndLog("       H             delay OFF"); 
  45         PrintAndLog("       H             time period ZERO"); 
  46         PrintAndLog("       H             time period ONE"); 
  47         PrintAndLog("Examples:"); 
  48         PrintAndLog("      lf cmdread 80 100 200 11000"); 
  49         PrintAndLog("      lf cmdread 80 100 100 11000 H"); 
  53 /* send a command before reading */ 
  54 int CmdLFCommandRead(const char *Cmd
) 
  56         static char dummy
[3] = {0x20,0x00,0x00}; 
  58         uint8_t divisor 
= 0; //125khz 
  60         while(param_getchar(Cmd
, cmdp
) != 0x00) 
  62                 switch(param_getchar(Cmd
, cmdp
)) 
  65                         return usage_lf_cmdread(); 
  71                         //param_getchar(Cmd, cmdp+1) == '1'; 
  75                         PrintAndLog("Unknown parameter '%c'", param_getchar(Cmd
, cmdp
)); 
  82         if(cmdp 
== 0) errors 
= 1; 
  85         if(errors
) return usage_lf_cmdread(); 
  87         UsbCommand c 
= {CMD_MOD_THEN_ACQUIRE_RAW_ADC_SAMPLES_125K
}; 
  88         sscanf(Cmd
, "%"lli
" %"lli
" %"lli
" %s %s", &c
.arg
[0], &c
.arg
[1], &c
.arg
[2],(char*)(&c
.d
.asBytes
),(char*)(&dummy
+1)); 
  89         // in case they specified 'h' 
  90         strcpy((char *)&c
.d
.asBytes 
+ strlen((char *)c
.d
.asBytes
), dummy
); 
  92         PrintAndLog("ICE: %d %s -- %s", strlen((char *)c
.d
.asBytes
) ,dummy
, c
.d
.asBytes
); 
  98 int CmdFlexdemod(const char *Cmd
) 
 101   for (i 
= 0; i 
< GraphTraceLen
; ++i
) { 
 102     if (GraphBuffer
[i
] < 0) { 
 109 #define LONG_WAIT 100 
 111   for (start 
= 0; start 
< GraphTraceLen 
- LONG_WAIT
; start
++) { 
 112     int first 
= GraphBuffer
[start
]; 
 113     for (i 
= start
; i 
< start 
+ LONG_WAIT
; i
++) { 
 114       if (GraphBuffer
[i
] != first
) { 
 118     if (i 
== (start 
+ LONG_WAIT
)) { 
 122   if (start 
== GraphTraceLen 
- LONG_WAIT
) { 
 123     PrintAndLog("nothing to wait for"); 
 127   GraphBuffer
[start
] = 2; 
 128   GraphBuffer
[start
+1] = -2; 
 129         uint8_t bits
[64] = {0x00}; 
 133   for (bit 
= 0; bit 
< 64; bit
++) { 
 135                 for (int j 
= 0; j 
< 16; j
++) { 
 136       sum 
+= GraphBuffer
[i
++]; 
 139                 bits
[bit
] = (sum 
> 0) ? 1 : 0; 
 141     PrintAndLog("bit %d sum %d", bit
, sum
); 
 144   for (bit 
= 0; bit 
< 64; bit
++) { 
 147     for (j 
= 0; j 
< 16; j
++) { 
 148       sum 
+= GraphBuffer
[i
++]; 
 150     if (sum 
> 0 && bits
[bit
] != 1) { 
 151       PrintAndLog("oops1 at %d", bit
); 
 153     if (sum 
< 0 && bits
[bit
] != 0) { 
 154       PrintAndLog("oops2 at %d", bit
); 
 158         // HACK writing back to graphbuffer. 
 159   GraphTraceLen 
= 32*64; 
 162   for (bit 
= 0; bit 
< 64; bit
++) { 
 164                 phase 
= (bits
[bit
] == 0) ? 0 : 1; 
 167     for (j 
= 0; j 
< 32; j
++) { 
 168       GraphBuffer
[i
++] = phase
; 
 173   RepaintGraphWindow(); 
 177 int CmdIndalaDemod(const char *Cmd
) 
 179   // Usage: recover 64bit UID by default, specify "224" as arg to recover a 224bit UID 
 185   // worst case with GraphTraceLen=64000 is < 4096 
 186   // under normal conditions it's < 2048 
 188   uint8_t rawbits
[4096]; 
 190   int worst 
= 0, worstPos 
= 0; 
 191  // PrintAndLog("Expecting a bit less than %d raw bits", GraphTraceLen / 32); 
 192   for (i 
= 0; i 
< GraphTraceLen
-1; i 
+= 2) { 
 194     if ((GraphBuffer
[i
] > GraphBuffer
[i 
+ 1]) && (state 
!= 1)) { 
 196         for (j 
= 0; j 
<  count 
- 8; j 
+= 16) { 
 197           rawbits
[rawbit
++] = 0; 
 199         if ((abs(count 
- j
)) > worst
) { 
 200           worst 
= abs(count 
- j
); 
 206     } else if ((GraphBuffer
[i
] < GraphBuffer
[i 
+ 1]) && (state 
!= 0)) { 
 208         for (j 
= 0; j 
<  count 
- 8; j 
+= 16) { 
 209           rawbits
[rawbit
++] = 1; 
 211         if ((abs(count 
- j
)) > worst
) { 
 212           worst 
= abs(count 
- j
); 
 222     PrintAndLog("Recovered %d raw bits, expected: %d", rawbit
, GraphTraceLen
/32); 
 223     PrintAndLog("worst metric (0=best..7=worst): %d at pos %d", worst
, worstPos
); 
 228   // Finding the start of a UID 
 229   int uidlen
, long_wait
; 
 230   if (strcmp(Cmd
, "224") == 0) { 
 240   for (start 
= 0; start 
<= rawbit 
- uidlen
; start
++) { 
 241     first 
= rawbits
[start
]; 
 242     for (i 
= start
; i 
< start 
+ long_wait
; i
++) { 
 243       if (rawbits
[i
] != first
) { 
 247     if (i 
== (start 
+ long_wait
)) { 
 252   if (start 
== rawbit 
- uidlen 
+ 1) { 
 253     PrintAndLog("nothing to wait for"); 
 257   // Inverting signal if needed 
 259     for (i 
= start
; i 
< rawbit
; i
++) { 
 260       rawbits
[i
] = !rawbits
[i
]; 
 265         uint8_t bits
[224] = {0x00}; 
 266         char showbits
[225] = {0x00}; 
 271   if (uidlen 
> rawbit
) { 
 272     PrintAndLog("Warning: not enough raw bits to get a full UID"); 
 273     for (bit 
= 0; bit 
< rawbit
; bit
++) { 
 274       bits
[bit
] = rawbits
[i
++]; 
 275       // As we cannot know the parity, let's use "." and "/" 
 276       showbits
[bit
] = '.' + bits
[bit
]; 
 278     showbits
[bit
+1]='\0'; 
 279     PrintAndLog("Partial UID=%s", showbits
); 
 282     for (bit 
= 0; bit 
< uidlen
; bit
++) { 
 283       bits
[bit
] = rawbits
[i
++]; 
 284       showbits
[bit
] = '0' + bits
[bit
]; 
 290   uint32_t uid1
, uid2
, uid3
, uid4
, uid5
, uid6
, uid7
; 
 295     for( idx
=0; idx
<64; idx
++) { 
 296         if (showbits
[idx
] == '0') { 
 297         uid1
=(uid1
<<1)|(uid2
>>31); 
 300         uid1
=(uid1
<<1)|(uid2
>>31); 
 304     PrintAndLog("UID=%s (%x%08x)", showbits
, uid1
, uid2
); 
 307                 uid3 
= uid4 
= uid5 
= uid6 
= uid7 
= 0; 
 309     for( idx
=0; idx
<224; idx
++) { 
 310         uid1
=(uid1
<<1)|(uid2
>>31); 
 311         uid2
=(uid2
<<1)|(uid3
>>31); 
 312         uid3
=(uid3
<<1)|(uid4
>>31); 
 313         uid4
=(uid4
<<1)|(uid5
>>31); 
 314         uid5
=(uid5
<<1)|(uid6
>>31); 
 315         uid6
=(uid6
<<1)|(uid7
>>31); 
 317                         if (showbits
[idx
] == '0')  
 318                                 uid7 
= (uid7
<<1) | 0; 
 320                                 uid7 
= (uid7
<<1) | 1; 
 322     PrintAndLog("UID=%s (%x%08x%08x%08x%08x%08x%08x)", showbits
, uid1
, uid2
, uid3
, uid4
, uid5
, uid6
, uid7
); 
 325   // Checking UID against next occurrences 
 327         for (; i 
+ uidlen 
<= rawbit
;) { 
 329     for (bit 
= 0; bit 
< uidlen
; bit
++) { 
 330       if (bits
[bit
] != rawbits
[i
++]) { 
 341   PrintAndLog("Occurrences: %d (expected %d)", times
, (rawbit 
- start
) / uidlen
); 
 343   // Remodulating for tag cloning 
 344         // HACK: 2015-01-04 this will have an impact on our new way of seening lf commands (demod)  
 345         // since this changes graphbuffer data. 
 346   GraphTraceLen 
= 32*uidlen
; 
 349   for (bit 
= 0; bit 
< uidlen
; bit
++) { 
 350     if (bits
[bit
] == 0) { 
 356     for (j 
= 0; j 
< 32; j
++) { 
 357       GraphBuffer
[i
++] = phase
; 
 362   RepaintGraphWindow(); 
 366 int CmdIndalaClone(const char *Cmd
) 
 369         unsigned int uid1
, uid2
, uid3
, uid4
, uid5
, uid6
, uid7
; 
 371         uid1 
=  uid2 
= uid3 
= uid4 
= uid5 
= uid6 
= uid7 
= 0; 
 374   if (strchr(Cmd
,'l') != 0) { 
 375     while (sscanf(&Cmd
[i
++], "%1x", &n 
) == 1) { 
 376       uid1 
= (uid1 
<< 4) | (uid2 
>> 28); 
 377       uid2 
= (uid2 
<< 4) | (uid3 
>> 28); 
 378       uid3 
= (uid3 
<< 4) | (uid4 
>> 28); 
 379       uid4 
= (uid4 
<< 4) | (uid5 
>> 28); 
 380       uid5 
= (uid5 
<< 4) | (uid6 
>> 28); 
 381       uid6 
= (uid6 
<< 4) | (uid7 
>> 28); 
 382         uid7 
= (uid7 
<< 4) | (n 
& 0xf); 
 384     PrintAndLog("Cloning 224bit tag with UID %x%08x%08x%08x%08x%08x%08x", uid1
, uid2
, uid3
, uid4
, uid5
, uid6
, uid7
); 
 385     c
.cmd 
= CMD_INDALA_CLONE_TAG_L
; 
 386     c
.d
.asDwords
[0] = uid1
; 
 387     c
.d
.asDwords
[1] = uid2
; 
 388     c
.d
.asDwords
[2] = uid3
; 
 389     c
.d
.asDwords
[3] = uid4
; 
 390     c
.d
.asDwords
[4] = uid5
; 
 391     c
.d
.asDwords
[5] = uid6
; 
 392     c
.d
.asDwords
[6] = uid7
; 
 394     while (sscanf(&Cmd
[i
++], "%1x", &n 
) == 1) { 
 395       uid1 
= (uid1 
<< 4) | (uid2 
>> 28); 
 396       uid2 
= (uid2 
<< 4) | (n 
& 0xf); 
 398     PrintAndLog("Cloning 64bit tag with UID %x%08x", uid1
, uid2
); 
 399     c
.cmd 
= CMD_INDALA_CLONE_TAG
; 
 410         PrintAndLog("Usage: lf read"); 
 411         PrintAndLog("Options:        "); 
 412         PrintAndLog("       h            This help"); 
 413         PrintAndLog("       s            silent run no printout"); 
 414         PrintAndLog("This function takes no arguments. "); 
 415         PrintAndLog("Use 'lf config' to set parameters."); 
 420         PrintAndLog("Usage: lf snoop"); 
 421         PrintAndLog("Options:        "); 
 422         PrintAndLog("       h            This help"); 
 423         PrintAndLog("This function takes no arguments. "); 
 424         PrintAndLog("Use 'lf config' to set parameters."); 
 428 int usage_lf_config() 
 430         PrintAndLog("Usage: lf config [H|<divisor>] [b <bps>] [d <decim>] [a 0|1]"); 
 431         PrintAndLog("Options:        "); 
 432         PrintAndLog("       h             This help"); 
 433         PrintAndLog("       L             Low frequency (125 KHz)"); 
 434         PrintAndLog("       H             High frequency (134 KHz)"); 
 435         PrintAndLog("       q <divisor>   Manually set divisor. 88-> 134KHz, 95-> 125 Hz"); 
 436         PrintAndLog("       b <bps>       Sets resolution of bits per sample. Default (max): 8"); 
 437         PrintAndLog("       d <decim>     Sets decimation. A value of N saves only 1 in N samples. Default: 1"); 
 438         PrintAndLog("       a [0|1]       Averaging - if set, will average the stored sample value when decimating. Default: 1"); 
 439         PrintAndLog("       t <threshold> Sets trigger threshold. 0 means no threshold (range: 0-128)"); 
 440         PrintAndLog("Examples:"); 
 441         PrintAndLog("      lf config b 8 L"); 
 442         PrintAndLog("                    Samples at 125KHz, 8bps."); 
 443         PrintAndLog("      lf config H b 4 d 3"); 
 444         PrintAndLog("                    Samples at 134KHz, averages three samples into one, stored with "); 
 445         PrintAndLog("                    a resolution of 4 bits per sample."); 
 446         PrintAndLog("      lf read"); 
 447         PrintAndLog("                    Performs a read (active field)"); 
 448         PrintAndLog("      lf snoop"); 
 449         PrintAndLog("                    Performs a snoop (no active field)"); 
 453 int CmdLFSetConfig(const char *Cmd
) 
 456         uint8_t divisor 
=  0;//Frequency divisor 
 457         uint8_t bps 
= 0; // Bits per sample 
 458         uint8_t decimation 
= 0; //How many to keep 
 459         bool averaging 
= 1; // Defaults to true 
 461         int trigger_threshold 
=-1;//Means no change 
 462         uint8_t unsigned_trigg 
= 0; 
 465         while(param_getchar(Cmd
, cmdp
) != 0x00) 
 467                 switch(param_getchar(Cmd
, cmdp
)) 
 470                         return usage_lf_config(); 
 480                         errors 
|= param_getdec(Cmd
,cmdp
+1,&divisor
); 
 484                         errors 
|= param_getdec(Cmd
,cmdp
+1,&unsigned_trigg
); 
 486                         if(!errors
) trigger_threshold 
= unsigned_trigg
; 
 489                         errors 
|= param_getdec(Cmd
,cmdp
+1,&bps
); 
 493                         errors 
|= param_getdec(Cmd
,cmdp
+1,&decimation
); 
 497                         averaging 
= param_getchar(Cmd
,cmdp
+1) == '1'; 
 501                         PrintAndLog("Unknown parameter '%c'", param_getchar(Cmd
, cmdp
)); 
 509                 errors 
= 1;// No args 
 515                 return usage_lf_config(); 
 517         //Bps is limited to 8, so fits in lower half of arg1 
 518         if(bps 
>> 8) bps 
= 8; 
 520         sample_config config 
= { 
 521                 decimation
,bps
,averaging
,divisor
,trigger_threshold
 
 523         //Averaging is a flag on high-bit of arg[1] 
 524         UsbCommand c 
= {CMD_SET_LF_SAMPLING_CONFIG
}; 
 525         memcpy(c
.d
.asBytes
,&config
,sizeof(sample_config
)); 
 530 int CmdLFRead(const char *Cmd
) 
 535         if (param_getchar(Cmd
, cmdp
) == 'h') 
 537                 return usage_lf_read(); 
 539         if (param_getchar(Cmd
, cmdp
) == 's') arg1 
= true; //suppress print 
 540         //And ship it to device 
 541         UsbCommand c 
= {CMD_ACQUIRE_RAW_ADC_SAMPLES_125K
, {arg1
,0,0}}; 
 543         //WaitForResponse(CMD_ACK,NULL);         
 544         if ( !WaitForResponseTimeout(CMD_ACK
,NULL
,2500) ) { 
 545                 PrintAndLog("command execution time out"); 
 552 int CmdLFSnoop(const char *Cmd
) 
 555         if(param_getchar(Cmd
, cmdp
) == 'h') 
 557                 return usage_lf_snoop(); 
 560         UsbCommand c 
= {CMD_LF_SNOOP_RAW_ADC_SAMPLES
}; 
 562         WaitForResponse(CMD_ACK
,NULL
); 
 566 static void ChkBitstream(const char *str
) 
 570   /* convert to bitstream if necessary */ 
 571         for (i 
= 0; i 
< (int)(GraphTraceLen 
/ 2); i
++){ 
 572                 if (GraphBuffer
[i
] > 1 || GraphBuffer
[i
] < 0) { 
 578 //Attempt to simulate any wave in buffer (one bit per output sample) 
 579 // converts GraphBuffer to bitstream (based on zero crossings) if needed. 
 580 int CmdLFSim(const char *Cmd
) 
 585   sscanf(Cmd
, "%i", &gap
); 
 587         // convert to bitstream if necessary  
 591         //can send only 512 bits at a time (1 byte sent per bit...) 
 592   printf("Sending [%d bytes]", GraphTraceLen
); 
 593   for (i 
= 0; i 
< GraphTraceLen
; i 
+= USB_CMD_DATA_SIZE
) { 
 594     UsbCommand c
={CMD_DOWNLOADED_SIM_SAMPLES_125K
, {i
, 0, 0}}; 
 596     for (j 
= 0; j 
< USB_CMD_DATA_SIZE
; j
++) { 
 597       c
.d
.asBytes
[j
] = GraphBuffer
[i
+j
]; 
 600     WaitForResponse(CMD_ACK
,NULL
); 
 605   PrintAndLog("Starting to simulate"); 
 606   UsbCommand c 
= {CMD_SIMULATE_TAG_125K
, {GraphTraceLen
, gap
, 0}}; 
 611 int usage_lf_simfsk(void) 
 614   PrintAndLog("Usage: lf simfsk [c <clock>] [i] [H <fcHigh>] [L <fcLow>] [d <hexdata>]"); 
 615   PrintAndLog("Options:        "); 
 616   PrintAndLog("       h              This help"); 
 617   PrintAndLog("       c <clock>      Manually set clock - can autodetect if using DemodBuffer"); 
 618   PrintAndLog("       i              invert data"); 
 619   PrintAndLog("       H <fcHigh>     Manually set the larger Field Clock"); 
 620   PrintAndLog("       L <fcLow>      Manually set the smaller Field Clock"); 
 621   //PrintAndLog("       s              TBD- -to enable a gap between playback repetitions - default: no gap"); 
 622   PrintAndLog("       d <hexdata>    Data to sim as hex - omit to sim from DemodBuffer"); 
 623   PrintAndLog("\n  NOTE: if you set one clock manually set them all manually"); 
 627 int usage_lf_simask(void) 
 630   PrintAndLog("Usage: lf simask [c <clock>] [i] [b|m|r] [s] [d <raw hex to sim>]"); 
 631   PrintAndLog("Options:        "); 
 632   PrintAndLog("       h              This help"); 
 633   PrintAndLog("       c <clock>      Manually set clock - can autodetect if using DemodBuffer"); 
 634   PrintAndLog("       i              invert data"); 
 635   PrintAndLog("       b              sim ask/biphase"); 
 636   PrintAndLog("       m              sim ask/manchester - Default"); 
 637   PrintAndLog("       r              sim ask/raw"); 
 638   PrintAndLog("       s              TBD- -to enable a gap between playback repetitions - default: no gap"); 
 639   PrintAndLog("       d <hexdata>    Data to sim as hex - omit to sim from DemodBuffer"); 
 643 int usage_lf_simpsk(void) 
 646   PrintAndLog("Usage: lf simpsk [1|2|3] [c <clock>] [i] [r <carrier>] [d <raw hex to sim>]"); 
 647   PrintAndLog("Options:        "); 
 648   PrintAndLog("       h              This help"); 
 649   PrintAndLog("       c <clock>      Manually set clock - can autodetect if using DemodBuffer"); 
 650   PrintAndLog("       i              invert data"); 
 651   PrintAndLog("       1              set PSK1 (default)"); 
 652   PrintAndLog("       2              set PSK2"); 
 653   PrintAndLog("       3              set PSK3"); 
 654   PrintAndLog("       r <carrier>    2|4|8 are valid carriers: default = 2"); 
 655   PrintAndLog("       d <hexdata>    Data to sim as hex - omit to sim from DemodBuffer"); 
 659 // by marshmellow - sim ask data given clock, fcHigh, fcLow, invert  
 660 // - allow pull data from DemodBuffer 
 661 int CmdLFfskSim(const char *Cmd
) 
 663         //might be able to autodetect FCs and clock from Graphbuffer if using demod buffer 
 664         // otherwise will need FChigh, FClow, Clock, and bitstream 
 665   uint8_t fcHigh
=0, fcLow
=0, clk
=0; 
 668   char hexData
[32] = {0x00}; // store entered hex data 
 669   uint8_t data
[255] = {0x00};  
 672   while(param_getchar(Cmd
, cmdp
) != 0x00) 
 674     switch(param_getchar(Cmd
, cmdp
)) 
 677       return usage_lf_simfsk(); 
 683       errors 
|= param_getdec(Cmd
,cmdp
+1,&clk
); 
 687       errors 
|= param_getdec(Cmd
,cmdp
+1,&fcHigh
); 
 691       errors 
|= param_getdec(Cmd
,cmdp
+1,&fcLow
); 
 699       dataLen 
= param_getstr(Cmd
, cmdp
+1, hexData
); 
 703         dataLen 
= hextobinarray((char *)data
, hexData
); 
 705       if (dataLen
==0) errors
=TRUE
;  
 706       if (errors
) PrintAndLog ("Error getting hex data"); 
 710       PrintAndLog("Unknown parameter '%c'", param_getchar(Cmd
, cmdp
)); 
 716   if(cmdp 
== 0 && DemodBufferLen 
== 0) 
 718     errors 
= TRUE
;// No args 
 724     return usage_lf_simfsk(); 
 727   if (dataLen 
== 0){ //using DemodBuffer  
 728     if (clk
==0 || fcHigh
==0 || fcLow
==0){ //manual settings must set them all 
 729       uint8_t ans 
= fskClocks(&fcHigh
, &fcLow
, &clk
, 0); 
 731         if (!fcHigh
) fcHigh
=10; 
 737     setDemodBuf(data
, dataLen
, 0); 
 740         //default if not found 
 741   if (clk 
== 0) clk 
= 50; 
 742   if (fcHigh 
== 0) fcHigh 
= 10; 
 743   if (fcLow 
== 0) fcLow 
= 8; 
 746   arg1 
= fcHigh 
<< 8 | fcLow
; 
 747   arg2 
= invert 
<< 8 | clk
; 
 748   size_t size 
= DemodBufferLen
; 
 749   if (size 
> USB_CMD_DATA_SIZE
) { 
 750     PrintAndLog("DemodBuffer too long for current implementation - length: %d - max: %d", size
, USB_CMD_DATA_SIZE
); 
 751     size 
= USB_CMD_DATA_SIZE
; 
 753   UsbCommand c 
= {CMD_FSK_SIM_TAG
, {arg1
, arg2
, size
}}; 
 755   memcpy(c
.d
.asBytes
, DemodBuffer
, size
); 
 760 // by marshmellow - sim ask data given clock, invert, manchester or raw, separator  
 761 // - allow pull data from DemodBuffer 
 762 int CmdLFaskSim(const char *Cmd
) 
 764   //autodetect clock from Graphbuffer if using demod buffer 
 765         // needs clock, invert, manchester/raw as m or r, separator as s, and bitstream 
 766   uint8_t encoding 
= 1, separator 
= 0; 
 767   uint8_t clk
=0, invert
=0; 
 769   char hexData
[32] = {0x00};  
 770   uint8_t data
[255]= {0x00}; // store entered hex data 
 773   while(param_getchar(Cmd
, cmdp
) != 0x00) 
 775     switch(param_getchar(Cmd
, cmdp
)) 
 778       return usage_lf_simask(); 
 784       errors 
|= param_getdec(Cmd
,cmdp
+1,&clk
); 
 788       encoding
=2; //biphase 
 804       dataLen 
= param_getstr(Cmd
, cmdp
+1, hexData
); 
 808         dataLen 
= hextobinarray((char *)data
, hexData
); 
 810       if (dataLen
==0) errors
=TRUE
;  
 811       if (errors
) PrintAndLog ("Error getting hex data, datalen: %d",dataLen
); 
 815       PrintAndLog("Unknown parameter '%c'", param_getchar(Cmd
, cmdp
)); 
 821   if(cmdp 
== 0 && DemodBufferLen 
== 0) 
 823     errors 
= TRUE
;// No args 
 829     return usage_lf_simask(); 
 831   if (dataLen 
== 0){ //using DemodBuffer 
 832     if (clk 
== 0) clk 
= GetAskClock("0", false, false); 
 834     setDemodBuf(data
, dataLen
, 0); 
 836   if (clk 
== 0) clk 
= 64; 
 837   if (encoding 
== 0) clk 
= clk
/2; //askraw needs to double the clock speed 
 839   size_t size
=DemodBufferLen
; 
 840   arg1 
= clk 
<< 8 | encoding
; 
 841   arg2 
= invert 
<< 8 | separator
; 
 842   if (size 
> USB_CMD_DATA_SIZE
) { 
 843     PrintAndLog("DemodBuffer too long for current implementation - length: %d - max: %d", size
, USB_CMD_DATA_SIZE
); 
 844     size 
= USB_CMD_DATA_SIZE
; 
 846   UsbCommand c 
= {CMD_ASK_SIM_TAG
, {arg1
, arg2
, size
}}; 
 847   PrintAndLog("preparing to sim ask data: %d bits", size
); 
 848   memcpy(c
.d
.asBytes
, DemodBuffer
, size
); 
 853 // by marshmellow - sim psk data given carrier, clock, invert  
 854 // - allow pull data from DemodBuffer or parameters 
 855 int CmdLFpskSim(const char *Cmd
) 
 857   //might be able to autodetect FC and clock from Graphbuffer if using demod buffer 
 858   //will need carrier, Clock, and bitstream 
 859   uint8_t carrier
=0, clk
=0; 
 862   char hexData
[32] = {0x00}; // store entered hex data 
 863   uint8_t data
[255] = {0x00};  
 867   while(param_getchar(Cmd
, cmdp
) != 0x00) 
 869     switch(param_getchar(Cmd
, cmdp
)) 
 872       return usage_lf_simpsk(); 
 878       errors 
|= param_getdec(Cmd
,cmdp
+1,&clk
); 
 882       errors 
|= param_getdec(Cmd
,cmdp
+1,&carrier
); 
 898       dataLen 
= param_getstr(Cmd
, cmdp
+1, hexData
); 
 902         dataLen 
= hextobinarray((char *)data
, hexData
); 
 904       if (dataLen
==0) errors
=TRUE
;  
 905       if (errors
) PrintAndLog ("Error getting hex data"); 
 909       PrintAndLog("Unknown parameter '%c'", param_getchar(Cmd
, cmdp
)); 
 915   if (cmdp 
== 0 && DemodBufferLen 
== 0) 
 917     errors 
= TRUE
;// No args 
 923     return usage_lf_simpsk(); 
 925   if (dataLen 
== 0){ //using DemodBuffer 
 926     PrintAndLog("Getting Clocks"); 
 927     if (clk
==0) clk 
= GetPskClock("", FALSE
, FALSE
); 
 928     PrintAndLog("clk: %d",clk
); 
 929     if (!carrier
) carrier 
= GetPskCarrier("", FALSE
, FALSE
);  
 930     PrintAndLog("carrier: %d", carrier
); 
 932     setDemodBuf(data
, dataLen
, 0); 
 935   if (clk 
<= 0) clk 
= 32; 
 936   if (carrier 
== 0) carrier 
= 2; 
 939       //need to convert psk2 to psk1 data before sim 
 940       psk2TOpsk1(DemodBuffer
, DemodBufferLen
); 
 942       PrintAndLog("Sorry, PSK3 not yet available"); 
 946   arg1 
= clk 
<< 8 | carrier
; 
 948   size_t size
=DemodBufferLen
; 
 949   if (size 
> USB_CMD_DATA_SIZE
) { 
 950     PrintAndLog("DemodBuffer too long for current implementation - length: %d - max: %d", size
, USB_CMD_DATA_SIZE
); 
 951     size
=USB_CMD_DATA_SIZE
; 
 953   UsbCommand c 
= {CMD_PSK_SIM_TAG
, {arg1
, arg2
, size
}}; 
 954   PrintAndLog("DEBUG: Sending DemodBuffer Length: %d", size
); 
 955   memcpy(c
.d
.asBytes
, DemodBuffer
, size
); 
 961 int CmdLFSimBidir(const char *Cmd
) 
 963   // Set ADC to twice the carrier for a slight supersampling 
 964   // HACK: not implemented in ARMSRC. 
 965   PrintAndLog("Not implemented yet."); 
 966   UsbCommand c 
= {CMD_LF_SIMULATE_BIDIR
, {47, 384, 0}}; 
 971 int CmdVchDemod(const char *Cmd
) 
 973   // Is this the entire sync pattern, or does this also include some 
 974   // data bits that happen to be the same everywhere? That would be 
 976   static const int SyncPattern
[] = { 
 977     1,  1,  1,  1,  1,  1,  1,  1,  1,  1,  1,  1,  1,  1,  1,  1, 
 978     1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, 
 979     1,  1,  1,  1,  1,  1,  1,  1,  1,  1,  1,  1,  1,  1,  1,  1, 
 980     1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, 
 981     1,  1,  1,  1,  1,  1,  1,  1,  1,  1,  1,  1,  1,  1,  1,  1, 
 982     1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, 
 983     1,  1,  1,  1,  1,  1,  1,  1,  1,  1,  1,  1,  1,  1,  1,  1, 
 984     1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, 
 985     1,  1,  1,  1,  1,  1,  1,  1,  1,  1,  1,  1,  1,  1,  1,  1, 
 986     1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, 
 989   // So first, we correlate for the sync pattern, and mark that. 
 990   int bestCorrel 
= 0, bestPos 
= 0; 
 992   // It does us no good to find the sync pattern, with fewer than 
 993   // 2048 samples after it... 
 994   for (i 
= 0; i 
< (GraphTraceLen
-2048); i
++) { 
 997     for (j 
= 0; j 
< arraylen(SyncPattern
); j
++) { 
 998       sum 
+= GraphBuffer
[i
+j
]*SyncPattern
[j
]; 
1000     if (sum 
> bestCorrel
) { 
1005   PrintAndLog("best sync at %d [metric %d]", bestPos
, bestCorrel
); 
1010   int worst 
= INT_MAX
; 
1013   for (i 
= 0; i 
< 2048; i 
+= 8) { 
1016     for (j 
= 0; j 
< 8; j
++) { 
1017       sum 
+= GraphBuffer
[bestPos
+i
+j
]; 
1024     if(abs(sum
) < worst
) { 
1029   PrintAndLog("bits:"); 
1030   PrintAndLog("%s", bits
); 
1031   PrintAndLog("worst metric: %d at pos %d", worst
, worstPos
); 
1033   if (strcmp(Cmd
, "clone")==0) { 
1036     for(s 
= bits
; *s
; s
++) { 
1038       for(j 
= 0; j 
< 16; j
++) { 
1039         GraphBuffer
[GraphTraceLen
++] = (*s 
== '1') ? 1 : 0; 
1042     RepaintGraphWindow(); 
1048 int CmdLFfind(const char *Cmd
) 
1051   char cmdp 
= param_getchar(Cmd
, 0); 
1052   char testRaw 
= param_getchar(Cmd
, 1); 
1053   if (strlen(Cmd
) > 3 || cmdp 
== 'h' || cmdp 
== 'H') { 
1054     PrintAndLog("Usage:  lf search <0|1> [u]"); 
1055     PrintAndLog("     <use data from Graphbuffer> , if not set, try reading data from tag."); 
1056     PrintAndLog("     [Search for Unknown tags] , if not set, reads only known tags."); 
1058     PrintAndLog("    sample: lf search     = try reading data from tag & search for known tags"); 
1059     PrintAndLog("          : lf search 1   = use data from GraphBuffer & search for known tags"); 
1060     PrintAndLog("          : lf search u   = try reading data from tag & search for known and unknown tags"); 
1061     PrintAndLog("          : lf search 1 u = use data from GraphBuffer & search for known and unknown tags"); 
1066   if (!offline 
&& (cmdp 
!= '1')){ 
1068                 getSamples("30000",false); 
1069   } else if (GraphTraceLen 
< 1000) { 
1070     PrintAndLog("Data in Graphbuffer was too small."); 
1073   if (cmdp 
== 'u' || cmdp 
== 'U') testRaw 
= 'u'; 
1075   PrintAndLog("NOTE: some demods output possible binary\n  if it finds something that looks like a tag"); 
1076   PrintAndLog("False Positives ARE possible\n");   
1077   PrintAndLog("\nChecking for known tags:\n"); 
1079   ans
=CmdFSKdemodIO(""); 
1081     PrintAndLog("\nValid IO Prox ID Found!"); 
1085   ans
=CmdFSKdemodPyramid(""); 
1087     PrintAndLog("\nValid Pyramid ID Found!"); 
1091   ans
=CmdFSKdemodParadox(""); 
1093     PrintAndLog("\nValid Paradox ID Found!"); 
1097   ans
=CmdFSKdemodAWID(""); 
1099     PrintAndLog("\nValid AWID ID Found!"); 
1103   ans
=CmdFSKdemodHID(""); 
1105     PrintAndLog("\nValid HID Prox ID Found!"); 
1109   //add psk and indala 
1110   ans
=CmdIndalaDecode(""); 
1112     PrintAndLog("\nValid Indala ID Found!"); 
1116   ans
=CmdAskEM410xDemod(""); 
1118     PrintAndLog("\nValid EM410x ID Found!"); 
1122   ans
=CmdG_Prox_II_Demod(""); 
1124     PrintAndLog("\nValid Guardall G-Prox II ID Found!"); 
1128         ans
=CmdFDXBdemodBI(""); 
1130                 PrintAndLog("\nValid FDX-B ID Found!"); 
1134         ans
=EM4x50Read("", false); 
1136                 PrintAndLog("\nValid EM4x50 ID Found!"); 
1140         ans
=CmdPSKNexWatch(""); 
1142                 PrintAndLog("\nValid NexWatch ID Found!"); 
1146   PrintAndLog("\nNo Known Tags Found!\n"); 
1147   if (testRaw
=='u' || testRaw
=='U'){ 
1148     //test unknown tag formats (raw mode) 
1149     PrintAndLog("\nChecking for Unknown tags:\n"); 
1150     ans
=AutoCorrelate(4000, FALSE
, FALSE
); 
1154                 PrintAndLog("Possible Auto Correlation of %d repeating samples",ans
); 
1156                 if ( ans 
% 8 == 0)  { 
1157                         int bytes 
= (ans 
/ 8); 
1158                         PrintAndLog("Possible %d bytes", bytes
); 
1160                         if ( bytes 
% 2 == 0) { 
1161                                 blocks 
= (bytes 
/ 2);    
1162                                 PrintAndLog("Possible  2 blocks, width %d", blocks
); 
1164                         if ( bytes 
% 4 == 0) { 
1165                                 blocks 
= (bytes 
/ 4);    
1166                                 PrintAndLog("Possible  4 blocks, width %d", blocks
); 
1168                         if ( bytes 
% 8 == 0) { 
1169                                 blocks 
= (bytes 
/ 8);    
1170                                 PrintAndLog("Possible  8 blocks, width %d", blocks
); 
1172                         if ( bytes 
% 16 == 0) { 
1173                                 blocks 
= (bytes 
/ 16);   
1174                                 PrintAndLog("Possible 16 blocks, width %d", blocks
); 
1178                 ans
=GetFskClock("",FALSE
,FALSE
);  
1179     if (ans 
!= 0){ //fsk 
1180                         ans
=FSKrawDemod("",TRUE
); 
1182         PrintAndLog("\nUnknown FSK Modulated Tag Found!"); 
1186                 ans
=ASKDemod("0 0 0",TRUE
,FALSE
,1); 
1188       PrintAndLog("\nUnknown ASK Modulated and Manchester encoded Tag Found!"); 
1189       PrintAndLog("\nif it does not look right it could instead be ASK/Biphase - try 'data rawdemod ab'"); 
1192     ans
=CmdPSK1rawDemod(""); 
1194       PrintAndLog("Possible unknown PSK1 Modulated Tag Found above!\n\nCould also be PSK2 - try 'data rawdemod p2'"); 
1195       PrintAndLog("\nCould also be PSK3 - [currently not supported]"); 
1196       PrintAndLog("\nCould also be NRZ - try 'data nrzrawdemod"); 
1199     PrintAndLog("\nNo Data Found!\n"); 
1204 static command_t CommandTable
[] =  
1206   {"help",        CmdHelp
,            1, "This help"}, 
1207   {"em4x",        CmdLFEM4X
,          1, "{ EM4X RFIDs... }"}, 
1208   {"awid",              CmdLFAWID
,                  1, "{ AWID RFIDs... }"}, 
1209   {"hid",         CmdLFHID
,           1, "{ HID RFIDs... }"}, 
1210   {"hitag",       CmdLFHitag
,         1, "{ HITAG RFIDs... }"}, 
1211   {"io",          CmdLFIO
,                1, "{ IOPROX RFIDs... }"}, 
1212   {"pcf7931",     CmdLFPCF7931
,       1, "{ PCF7931 RFIDs... }"}, 
1213   {"ti",          CmdLFTI
,            1, "{ TI RFIDs... }"}, 
1214   {"t55xx",       CmdLFT55XX
,         1, "{ T55X7 RFIDs... }"}, 
1215 {"viking",      CmdLFViking
,        1, "{ Viking RFIDs... }"}, 
1216   {"config",      CmdLFSetConfig
,     0, "Set config for LF sampling, bit/sample, decimation, frequency"}, 
1218   {"cmdread",     CmdLFCommandRead
,   0, "<off period> <'0' period> <'1' period> <command> ['h' 134] \n\t\t-- Modulate LF reader field to send command before read (all periods in microseconds)"}, 
1219   {"flexdemod",   CmdFlexdemod
,       1, "Demodulate samples for FlexPass"}, 
1220   {"indalademod", CmdIndalaDemod
,     1, "['224'] -- Demodulate samples for Indala 64 bit UID (option '224' for 224 bit)"}, 
1221   {"indalaclone", CmdIndalaClone
,     0, "<UID> ['l']-- Clone Indala to T55x7 (tag must be in antenna)(UID in HEX)(option 'l' for 224 UID"}, 
1222   {"read",        CmdLFRead
,          0, "['s' silent] Read 125/134 kHz LF ID-only tag. Do 'lf read h' for help"}, 
1223   {"search",      CmdLFfind
,          1, "[offline] ['u'] Read and Search for valid known tag (in offline mode it you can load first then search) \n\t\t- 'u' to search for unknown tags"}, 
1224   {"sim",         CmdLFSim
,           0, "[GAP] -- Simulate LF tag from buffer with optional GAP (in microseconds)"}, 
1225   {"simask",      CmdLFaskSim
,        0, "[clock] [invert <1|0>] [manchester/raw <'m'|'r'>] [msg separator 's'] [d <hexdata>] \n\t\t-- Simulate LF ASK tag from demodbuffer or input"}, 
1226   {"simfsk",      CmdLFfskSim
,        0, "[c <clock>] [i] [H <fcHigh>] [L <fcLow>] [d <hexdata>] \n\t\t-- Simulate LF FSK tag from demodbuffer or input"}, 
1227   {"simpsk",      CmdLFpskSim
,        0, "[1|2|3] [c <clock>] [i] [r <carrier>] [d <raw hex to sim>] \n\t\t-- Simulate LF PSK tag from demodbuffer or input"}, 
1228   {"simbidir",    CmdLFSimBidir
,      0, "Simulate LF tag (with bidirectional data transmission between reader and tag)"}, 
1229   {"snoop",       CmdLFSnoop
,         0, "['l'|'h'|<divisor>] [trigger threshold] -- Snoop LF (l:125khz, h:134khz)"}, 
1230   {"vchdemod",    CmdVchDemod
,        1, "['clone'] -- Demodulate samples for VeriChip"}, 
1231   {NULL
, NULL
, 0, NULL
} 
1234 int CmdLF(const char *Cmd
) 
1236   CmdsParse(CommandTable
, Cmd
); 
1240 int CmdHelp(const char *Cmd
) 
1242   CmdsHelp(CommandTable
);