]>
cvs.zerfleddert.de Git - proxmark3-svn/blob - armsrc/mifaresniff.c
f20f2557868b007ac42d2553af605721a42b0456
1 //-----------------------------------------------------------------------------
4 // This code is licensed to you under the terms of the GNU GPL, version 2 or,
5 // at your option, any later version. See the LICENSE.txt file for the text of
7 //-----------------------------------------------------------------------------
8 // Routines to support mifare classic sniffer.
9 //-----------------------------------------------------------------------------
11 #include "mifaresniff.h"
13 #include "proxmark3.h"
16 #include "iso14443crc.h"
17 #include "iso14443a.h"
18 #include "crapto1/crapto1.h"
19 #include "mifareutil.h"
23 static int sniffState
= SNF_INIT
;
24 static uint8_t sniffUIDType
;
25 static uint8_t sniffUID
[8] = {0x00};
26 static uint8_t sniffATQA
[2] = {0x00};
27 static uint8_t sniffSAK
;
28 static uint8_t sniffBuf
[16] = {0x00};
29 static uint32_t timerData
= 0;
32 bool MfSniffInit(void){
33 memset(sniffUID
, 0x00, 8);
34 memset(sniffATQA
, 0x00, 2);
36 sniffUIDType
= SNF_UID_4
;
41 bool MfSniffEnd(void){
43 cmd_send(CMD_ACK
,0,0,0,0,0);
49 bool RAMFUNC
MfSniffLogic(const uint8_t *data
, uint16_t len
, uint8_t *parity
, uint16_t bitCnt
, bool reader
) {
51 if (reader
&& (len
== 1) && (bitCnt
== 7)) { // reset on 7-Bit commands from reader
52 sniffState
= SNF_INIT
;
57 if ((len
== 1) && (reader
) && (bitCnt
== 7) ) { // REQA or WUPA from reader
58 sniffUIDType
= SNF_UID_4
;
59 memset(sniffUID
, 0x00, 8);
60 memset(sniffATQA
, 0x00, 2);
62 sniffState
= SNF_ATQA
;
64 sniffState
= SNF_MAGIC_WUPC2
;
69 if ((len
== 1) && (reader
) && (data
[0] == 0x43) ) {
70 sniffState
= SNF_CARD_IDLE
;
74 if ((!reader
) && (len
== 2)) { // ATQA from tag
75 memcpy(sniffATQA
, data
, 2);
76 sniffState
= SNF_UID1
;
81 if ((reader
) && (len
== 9) && (data
[0] == 0x93) && (data
[1] == 0x70) && (CheckCrc14443(CRC_14443_A
, data
, 9))) { // Select 4 Byte UID from reader
82 memcpy(sniffUID
+ 3, &data
[2], 4);
88 if ((!reader
) && (len
== 3) && (CheckCrc14443(CRC_14443_A
, data
, 3))) { // SAK from card?
90 if ((sniffUID
[3] == 0x88) && (sniffUIDType
== SNF_UID_4
)) { // CL2 UID part to be expected
91 sniffUIDType
= SNF_UID_7
;
92 memcpy(sniffUID
, sniffUID
+ 4, 3);
93 sniffState
= SNF_UID2
;
94 } else { // select completed
95 sniffState
= SNF_CARD_IDLE
;
101 if ((reader
) && (len
== 9) && (data
[0] == 0x95) && (data
[1] == 0x70) && (CheckCrc14443(CRC_14443_A
, data
, 9))) {
102 memcpy(sniffUID
+ 3, &data
[2], 4);
103 sniffState
= SNF_SAK
;
107 case SNF_CARD_IDLE
:{ // trace the card select sequence
110 memcpy(sniffBuf
+ 2, sniffUID
, 7);
111 memcpy(sniffBuf
+ 9, sniffATQA
, 2);
112 sniffBuf
[11] = sniffSAK
;
115 LogTrace(sniffBuf
, 14, 0, 0, NULL
, TRUE
);
116 sniffState
= SNF_CARD_CMD
;
117 } // intentionally no break;
119 LogTrace(data
, len
, 0, 0, parity
, reader
);
120 timerData
= GetTickCount();
125 sniffState
= SNF_INIT
;
133 bool RAMFUNC
MfSniffSend(uint16_t maxTimeoutMs
) {
134 if (BigBuf_get_traceLen() && (GetTickCount() > timerData
+ maxTimeoutMs
)) {
135 return intMfSniffSend();
140 // internal sending function. not a RAMFUNC.
141 bool intMfSniffSend() {
144 int pckLen
= BigBuf_get_traceLen();
146 uint8_t *trace
= BigBuf_get_addr();
150 pckSize
= MIN(USB_CMD_DATA_SIZE
, pckLen
);
152 cmd_send(CMD_ACK
, 1, BigBuf_get_traceLen(), pckSize
, trace
+ BigBuf_get_traceLen() - pckLen
, pckSize
);
160 cmd_send(CMD_ACK
,2,0,0,0,0);