+ if (res) {
+ PrintAndLogEx(NORMAL, "AC1 error(%d): %4x. Exit...", res, sw);
+ dreturn(7);
+ }
+
+ // process Format1 (0x80) and print Format2 (0x77)
+ ProcessACResponseFormat1(tlvRoot, buf, len, decodeTLV);
+
+ uint8_t CID = 0;
+ tlvdb_get_uint8(tlvRoot, 0x9f27, &CID);
+
+ // AC1 print result
+ PrintAndLog("");
+ if ((CID & EMVAC_AC_MASK) == EMVAC_AAC) PrintAndLogEx(INFO, "AC1 result: AAC (Transaction declined)");
+ if ((CID & EMVAC_AC_MASK) == EMVAC_TC) PrintAndLogEx(INFO, "AC1 result: TC (Transaction approved)");
+ if ((CID & EMVAC_AC_MASK) == EMVAC_ARQC) PrintAndLogEx(INFO, "AC1 result: ARQC (Online authorisation requested)");
+ if ((CID & EMVAC_AC_MASK) == EMVAC_AC_MASK) PrintAndLogEx(INFO, "AC1 result: RFU");
+
+ // decode Issuer Application Data (IAD)
+ uint8_t CryptoVersion = 0;
+ const struct tlv *IAD = tlvdb_get(tlvRoot, 0x9f10, NULL);
+ if (IAD && (IAD->len > 1)) {
+ PrintAndLogEx(NORMAL, "\n* * Issuer Application Data (IAD):");
+ uint8_t VDDlen = IAD->value[0]; // Visa discretionary data length
+ uint8_t IDDlen = 0; // Issuer discretionary data length
+ PrintAndLogEx(NORMAL, "IAD length: %d", IAD->len);
+ PrintAndLogEx(NORMAL, "VDDlen: %d", VDDlen);
+ if (VDDlen < IAD->len - 1)
+ IDDlen = IAD->value[VDDlen + 1];
+ PrintAndLogEx(NORMAL, "IDDlen: %d", IDDlen);
+
+ uint8_t DerivKeyIndex = IAD->value[1];
+ CryptoVersion = IAD->value[2];
+
+ PrintAndLogEx(NORMAL, "CryptoVersion: %d", CryptoVersion);
+ PrintAndLogEx(NORMAL, "DerivKeyIndex: %d", DerivKeyIndex);
+
+ // Card Verification Results (CVR) decode
+ if ((VDDlen - 2) > 0) {
+ uint8_t CVRlen = IAD->value[3];
+ if (CVRlen == (VDDlen - 2 - 1)) {
+ PrintAndLogEx(NORMAL, "CVR length: %d", CVRlen);
+ PrintAndLogEx(NORMAL, "CVR: %s", sprint_hex(&IAD->value[4], CVRlen));
+ } else {
+ PrintAndLogEx(NORMAL, "Wrong CVR length! CVR: %s", sprint_hex(&IAD->value[3], VDDlen - 2));
+ }
+ }
+ if (IDDlen)
+ PrintAndLogEx(NORMAL, "IDD: %s", sprint_hex(&IAD->value[VDDlen + 1], IDDlen));
+ } else {
+ PrintAndLogEx(NORMAL, "Issuer Application Data (IAD) not found.");
+ }
+
+ PrintAndLogEx(NORMAL, "\n* * Processing online request");
+
+ // authorization response code from acquirer
+ const char HostResponse[] = "00"; // 0x3030
+ size_t HostResponseLen = sizeof(HostResponse) - 1;
+ PrintAndLogEx(NORMAL, "Host Response: `%s`", HostResponse);
+ tlvdb_change_or_add_node(tlvRoot, 0x8a, HostResponseLen, (const unsigned char *)HostResponse);
+
+ if (CryptoVersion == 10) {
+ PrintAndLogEx(NORMAL, "\n* * Generate ARPC");
+
+ // Application Cryptogram (AC)
+ const struct tlv *AC = tlvdb_get(tlvRoot, 0x9f26, NULL);
+ if (AC && (AC->len > 0)) {
+ PrintAndLogEx(NORMAL, "AC: %s", sprint_hex(AC->value, AC->len));
+
+ size_t rawARPClen = AC->len;
+ uint8_t rawARPC[rawARPClen];
+ memcpy(rawARPC, AC->value, AC->len);
+ for (int i = 0; (i < HostResponseLen) && (i < rawARPClen); i++)
+ rawARPC[i] ^= HostResponse[i];
+ PrintAndLogEx(NORMAL, "raw ARPC: %s", sprint_hex(rawARPC, rawARPClen));
+
+ // here must be calculation of ARPC, but we dont know a bank keys.
+ PrintAndLogEx(NORMAL, "ARPC: n/a");
+
+ } else {
+ PrintAndLogEx(NORMAL, "Application Cryptogram (AC) not found.");
+ }
+
+ // here must be external authenticate, but we dont know ARPC
+
+ }
+
+
+ // needs to send AC2 command (res == ARQC)
+ if ((CID & EMVAC_AC_MASK) == EMVAC_ARQC) {
+ PrintAndLogEx(NORMAL, "\n* * Calc CDOL2");
+ struct tlv *cdol2_data_tlv = dol_process(tlvdb_get(tlvRoot, 0x8d, NULL), tlvRoot, 0x01); // 0x01 - dummy tag
+ if (!cdol2_data_tlv) {
+ PrintAndLogEx(WARNING, "Error: can't create CDOL2 TLV.");
+ dreturn(6);
+ }
+
+ PrintAndLogEx(NORMAL, "CDOL2 data[%d]: %s", cdol2_data_tlv->len, sprint_hex(cdol2_data_tlv->value, cdol2_data_tlv->len));
+
+ //PrintAndLogEx(NORMAL, "* * AC2");
+
+
+ // here must be AC2, but we dont make external authenticate (
+
+/* // AC2
+ PRINT_INDENT(level);
+ if ((CID & EMVAC_AC2_MASK) == EMVAC_AAC2) fprintf(f, "\tAC2: AAC (Transaction declined)\n");
+ if ((CID & EMVAC_AC2_MASK) == EMVAC_TC2) fprintf(f, "\tAC2: TC (Transaction approved)\n");
+ if ((CID & EMVAC_AC2_MASK) == EMVAC_ARQC2) fprintf(f, "\tAC2: not requested (ARQC)\n");
+ if ((CID & EMVAC_AC2_MASK) == EMVAC_AC2_MASK) fprintf(f, "\tAC2: RFU\n");
+*/
+ }
+
+ }
+
+ DropFieldEx( channel );
+
+ // Destroy TLV's
+ free(pdol_data_tlv);
+ tlvdb_free(tlvSelect);
+ tlvdb_free(tlvRoot);
+
+ PrintAndLogEx(NORMAL, "\n* Transaction completed.");
+ return 0;
+}
+
+int CmdEMVScan(const char *cmd) {
+ uint8_t AID[APDU_DATA_LEN] = {0};
+ size_t AIDlen = 0;
+ uint8_t buf[APDU_RESPONSE_LEN] = {0};
+ size_t len = 0;
+ uint16_t sw = 0;
+ int res;
+ json_t *root;
+ json_error_t error;
+
+ CLIParserInit("emv scan",
+ "Scan EMV card and save it contents to a file.",
+ "It executes EMV contactless transaction and saves result to a file which can be used for emulation\n"
+ "Usage:\n\temv scan -at -> scan MSD transaction mode and show APDU and TLV\n"
+ "\temv scan -c -> scan CDA transaction mode\n");
+
+ void* argtable[] = {
+ arg_param_begin,
+ arg_lit0("aA", "apdu", "show APDU reqests and responses."),
+ arg_lit0("tT", "tlv", "TLV decode results."),
+ arg_lit0("eE", "extract", "Extract TLV elements and fill Application Data"),
+ arg_lit0("jJ", "jload", "Load transaction parameters from `emv/defparams.json` file."),
+ arg_rem("By default:", "Transaction type - MSD"),
+ arg_lit0("vV", "qvsdc", "Transaction type - qVSDC or M/Chip."),
+ arg_lit0("cC", "qvsdccda", "Transaction type - qVSDC or M/Chip plus CDA (SDAD generation)."),
+ arg_lit0("xX", "vsdc", "Transaction type - VSDC. For test only. Not a standart behavior."),
+ arg_lit0("gG", "acgpo", "VISA. generate AC from GPO."),
+ arg_lit0("mM", "merge", "Merge output file with card's data. (warning: the file may be corrupted!)"),
+#ifdef WITH_SMARTCARD
+ arg_lit0("wW", "wired", "Send data via contact (iso7816) interface. Contactless interface set by default."),
+#endif
+ arg_str1(NULL, NULL, "output.json", "JSON output file name"),
+ arg_param_end
+ };
+ CLIExecWithReturn(cmd, argtable, true);
+
+ bool showAPDU = arg_get_lit(1);
+ bool decodeTLV = arg_get_lit(2);
+ bool extractTLVElements = arg_get_lit(3);
+ bool paramLoadJSON = arg_get_lit(4);
+
+ enum TransactionType TrType = TT_MSD;
+ if (arg_get_lit(6))
+ TrType = TT_QVSDCMCHIP;
+ if (arg_get_lit(7))
+ TrType = TT_CDA;
+ if (arg_get_lit(8))
+ TrType = TT_VSDC;
+
+ bool GenACGPO = arg_get_lit(9);
+ bool MergeJSON = arg_get_lit(10);
+ EMVCommandChannel channel = ECC_CONTACTLESS;
+ uint8_t relfname[250] = {0};
+ char *crelfname = (char *)relfname;
+ int relfnamelen = 0;
+#ifdef WITH_SMARTCARD
+ if (arg_get_lit(11)) {
+ channel = ECC_CONTACT;
+ }
+ CLIGetStrWithReturn(12, relfname, &relfnamelen);
+#else
+ CLIGetStrWithReturn(11, relfname, &relfnamelen);
+#endif
+ PrintChannel(channel);
+ uint8_t psenum = (channel == ECC_CONTACT) ? 1 : 2;
+ CLIParserFree();
+
+ SetAPDULogging(showAPDU);
+
+ // current path + file name
+ if (!strstr(crelfname, ".json"))
+ strcat(crelfname, ".json");
+ char fname[strlen(get_my_executable_directory()) + strlen(crelfname) + 1];
+ strcpy(fname, get_my_executable_directory());
+ strcat(fname, crelfname);
+
+ if (MergeJSON) {
+ root = json_load_file(fname, 0, &error);
+ if (!root) {
+ PrintAndLogEx(ERR, "json error on line %d: %s", error.line, error.text);
+ return 1;
+ }
+
+ if (!json_is_object(root)) {
+ PrintAndLogEx(ERR, "Invalid json format. root must be an object.");
+ return 1;
+ }
+ } else {
+ root = json_object();
+ }
+
+ // drop field at start
+ DropFieldEx( channel );
+
+ JsonSaveStr(root, "$.File.Created", "proxmark3 `emv scan`");
+
+ if (channel == ECC_CONTACTLESS) {
+ // iso 14443 select
+ PrintAndLogEx(NORMAL, "--> GET UID, ATS.");
+
+ iso14a_card_select_t card;
+ if (Hf14443_4aGetCardData(&card)) {
+ return 2;
+ }
+ if (!card.uidlen) {
+ PrintAndLogEx(ERR, "get ATS error");
+ return 2;
+ }
+
+ JsonSaveStr(root, "$.Card.Contactless.Communication", "iso14443-4a");
+ JsonSaveBufAsHex(root, "$.Card.Contactless.UID", (uint8_t *)&card.uid, card.uidlen);
+ JsonSaveHex(root, "$.Card.Contactless.ATQA", card.atqa[0] + (card.atqa[1] << 2), 2);
+ JsonSaveHex(root, "$.Card.Contactless.SAK", card.sak, 0);
+ JsonSaveBufAsHex(root, "$.Card.Contactless.ATS", (uint8_t *)card.ats, card.ats_len);
+ } else {
+ PrintAndLogEx(NORMAL, "--> GET ATR.");
+
+ smart_card_atr_t ccard;
+ smart_getATR(&ccard);
+
+ if (!ccard.atr_len) {
+ PrintAndLogEx(ERR, "get ATR error");
+ return 2;
+ }
+
+ JsonSaveStr(root, "$.Card.Contact.Communication", "iso7816");
+ JsonSaveBufAsHex(root, "$.Card.Contact.ATR", (uint8_t *)ccard.atr, ccard.atr_len);
+ }
+
+ // init applets list tree
+ const char *al = "Applets list";
+ struct tlvdb *tlvSelect = tlvdb_fixed(1, strlen(al), (const unsigned char *)al);
+
+ // EMV PPSE
+ PrintAndLogEx(NORMAL, "--> PPSE.");
+ res = EMVSelectPSE(channel, true, true, 2, buf, sizeof(buf), &len, &sw);
+
+ if (!res && sw == 0x9000){
+ if (decodeTLV)
+ TLVPrintFromBuffer(buf, len);
+
+ JsonSaveBufAsHex(root, "$.PPSE.AID", (uint8_t *)"2PAY.SYS.DDF01", 14);
+
+ struct tlvdb *fci = tlvdb_parse_multi(buf, len);
+ if (extractTLVElements)
+ JsonSaveTLVTree(root, root, "$.PPSE.FCITemplate", fci);
+ else
+ JsonSaveTLVTreeElm(root, "$.PPSE.FCITemplate", fci, true, true, false);
+ JsonSaveTLVValue(root, "$.Application.KernelID", tlvdb_find_full(fci, 0x9f2a));
+ tlvdb_free(fci);
+ }
+
+ res = EMVSearchPSE(channel, false, true, psenum, decodeTLV, tlvSelect);
+
+ // check PPSE and select application id
+ if (!res) {
+ TLVPrintAIDlistFromSelectTLV(tlvSelect);
+ } else {
+ // EMV SEARCH with AID list
+ SetAPDULogging(false);
+ PrintAndLogEx(NORMAL, "--> AID search.");
+ if (EMVSearch(channel, false, true, decodeTLV, tlvSelect)) {
+ PrintAndLogEx(ERR, "Can't found any of EMV AID. Exit...");
+ tlvdb_free(tlvSelect);
+ DropFieldEx( channel );
+ return 3;
+ }
+
+ // check search and select application id
+ TLVPrintAIDlistFromSelectTLV(tlvSelect);
+ }
+
+ // EMV SELECT application
+ SetAPDULogging(showAPDU);
+ EMVSelectApplication(tlvSelect, AID, &AIDlen);
+
+ tlvdb_free(tlvSelect);
+
+ if (!AIDlen) {
+ PrintAndLogEx(INFO, "Can't select AID. EMV AID not found. Exit...");
+ DropFieldEx( channel );
+ return 4;
+ }
+
+ JsonSaveBufAsHex(root, "$.Application.AID", AID, AIDlen);
+
+ // Init TLV tree
+ const char *alr = "Root terminal TLV tree";
+ struct tlvdb *tlvRoot = tlvdb_fixed(1, strlen(alr), (const unsigned char *)alr);
+
+ // EMV SELECT applet
+
+ PrintAndLogEx(NORMAL, "\n-->Selecting AID:%s.", sprint_hex_inrow(AID, AIDlen));
+ SetAPDULogging(showAPDU);
+ res = EMVSelect(channel, false, true, AID, AIDlen, buf, sizeof(buf), &len, &sw, tlvRoot);
+
+ if (res) {
+ PrintAndLogEx(ERR, "Can't select AID (%d). Exit...", res);
+ tlvdb_free(tlvRoot);
+ DropFieldEx( channel );
+ return 5;
+ }
+
+ if (decodeTLV)
+ TLVPrintFromBuffer(buf, len);
+
+ // save mode
+ if (tlvdb_get(tlvRoot, 0x9f38, NULL)) {
+ JsonSaveStr(root, "$.Application.Mode", TransactionTypeStr[TrType]);
+ }
+
+ struct tlvdb *fci = tlvdb_parse_multi(buf, len);
+ if (extractTLVElements)
+ JsonSaveTLVTree(root, root, "$.Application.FCITemplate", fci);
+ else
+ JsonSaveTLVTreeElm(root, "$.Application.FCITemplate", fci, true, true, false);
+ tlvdb_free(fci);
+
+ // create transaction parameters
+ PrintAndLogEx(NORMAL, "-->Init transaction parameters.");
+ InitTransactionParameters(tlvRoot, paramLoadJSON, TrType, GenACGPO);
+
+ PrintAndLogEx(NORMAL, "-->Calc PDOL.");
+ struct tlv *pdol_data_tlv = dol_process(tlvdb_get(tlvRoot, 0x9f38, NULL), tlvRoot, 0x83);
+ if (!pdol_data_tlv){
+ PrintAndLogEx(ERR, "Can't create PDOL TLV.");
+ tlvdb_free(tlvRoot);
+ DropFieldEx( channel );
+ return 6;
+ }
+
+ size_t pdol_data_tlv_data_len;
+ unsigned char *pdol_data_tlv_data = tlv_encode(pdol_data_tlv, &pdol_data_tlv_data_len);
+ if (!pdol_data_tlv_data) {
+ PrintAndLogEx(ERR, "Can't create PDOL data.");
+ tlvdb_free(tlvRoot);
+ DropFieldEx( channel );
+ return 6;
+ }
+ PrintAndLogEx(INFO, "PDOL data[%d]: %s", pdol_data_tlv_data_len, sprint_hex(pdol_data_tlv_data, pdol_data_tlv_data_len));
+
+ PrintAndLogEx(INFO, "-->GPO.");
+ res = EMVGPO(channel, true, pdol_data_tlv_data, pdol_data_tlv_data_len, buf, sizeof(buf), &len, &sw, tlvRoot);
+
+ free(pdol_data_tlv_data);
+ free(pdol_data_tlv);
+
+ if (res) {
+ PrintAndLogEx(ERR, "GPO error(%d): %4x. Exit...", res, sw);
+ tlvdb_free(tlvRoot);
+ DropFieldEx( channel );
+ return 7;
+ }
+ ProcessGPOResponseFormat1(tlvRoot, buf, len, decodeTLV);
+
+ struct tlvdb *gpofci = tlvdb_parse_multi(buf, len);
+ if (extractTLVElements)
+ JsonSaveTLVTree(root, root, "$.Application.GPO", gpofci);
+ else
+ JsonSaveTLVTreeElm(root, "$.Application.GPO", gpofci, true, true, false);
+
+ JsonSaveTLVValue(root, "$.ApplicationData.AIP", tlvdb_find_full(gpofci, 0x82));
+ JsonSaveTLVValue(root, "$.ApplicationData.AFL", tlvdb_find_full(gpofci, 0x94));
+
+ tlvdb_free(gpofci);
+
+ PrintAndLogEx(INFO, "-->Read records from AFL.");
+ const struct tlv *AFL = tlvdb_get(tlvRoot, 0x94, NULL);
+
+ while(AFL && AFL->len) {
+ if (AFL->len % 4) {
+ PrintAndLogEx(ERR, "Wrong AFL length: %d", AFL->len);
+ break;
+ }
+
+ json_t *sfijson = json_path_get(root, "$.Application.Records");
+ if (!sfijson) {
+ json_t *app = json_path_get(root, "$.Application");
+ json_object_set_new(app, "Records", json_array());
+
+ sfijson = json_path_get(root, "$.Application.Records");
+ }
+ if (!json_is_array(sfijson)) {
+ PrintAndLogEx(ERR, "Internal logic error. `$.Application.Records` is not an array.");
+ break;
+ }
+ for (int i = 0; i < AFL->len / 4; i++) {
+ uint8_t SFI = AFL->value[i * 4 + 0] >> 3;
+ uint8_t SFIstart = AFL->value[i * 4 + 1];
+ uint8_t SFIend = AFL->value[i * 4 + 2];
+ uint8_t SFIoffline = AFL->value[i * 4 + 3];
+
+ PrintAndLogEx(INFO, "--->SFI[%02x] start:%02x end:%02x offline:%02x", SFI, SFIstart, SFIend, SFIoffline);
+ if (SFI == 0 || SFI == 31 || SFIstart == 0 || SFIstart > SFIend) {
+ PrintAndLogEx(ERR, "SFI ERROR! Skipped...");
+ continue;
+ }
+
+ for(int n = SFIstart; n <= SFIend; n++) {
+ PrintAndLogEx(INFO, "---->SFI[%02x] %d", SFI, n);
+
+ res = EMVReadRecord(channel, true, SFI, n, buf, sizeof(buf), &len, &sw, tlvRoot);
+ if (res) {
+ PrintAndLogEx(ERR, "SFI[%02x]. APDU error %4x", SFI, sw);
+ continue;
+ }
+
+ if (decodeTLV) {
+ TLVPrintFromBuffer(buf, len);
+ PrintAndLogEx(NORMAL, "");
+ }
+
+ json_t *jsonelm = json_object();
+ json_array_append_new(sfijson, jsonelm);
+
+ JsonSaveHex(jsonelm, "SFI", SFI, 1);
+ JsonSaveHex(jsonelm, "RecordNum", n, 1);
+ JsonSaveHex(jsonelm, "Offline", SFIoffline, 1);
+
+ struct tlvdb *rsfi = tlvdb_parse_multi(buf, len);
+ if (extractTLVElements)
+ JsonSaveTLVTree(root, jsonelm, "$.Data", rsfi);
+ else
+ JsonSaveTLVTreeElm(jsonelm, "$.Data", rsfi, true, true, false);
+ tlvdb_free(rsfi);
+ }
+ }
+
+ break;
+ }
+
+ // getting certificates
+ if (tlvdb_get(tlvRoot, 0x90, NULL)) {
+ PrintAndLogEx(INFO, "-->Recovering certificates.");
+ PKISetStrictExecution(false);
+ RecoveryCertificates(tlvRoot, root);
+ PKISetStrictExecution(true);
+ }
+
+ // free tlv object
+ tlvdb_free(tlvRoot);
+
+ DropFieldEx( channel );
+
+ res = json_dump_file(root, fname, JSON_INDENT(2));
+ if (res) {
+ PrintAndLogEx(ERR, "Can't save the file: %s", fname);
+ return 200;
+ }
+ PrintAndLogEx(SUCCESS, "File `%s` saved.", fname);
+
+ // free json object
+ json_decref(root);
+
+ return 0;
+}
+
+int CmdEMVTest(const char *cmd) {
+ return ExecuteCryptoTests(true);
+}
+
+int CmdEMVRoca(const char *cmd) {
+ uint8_t AID[APDU_DATA_LEN] = {0};
+ size_t AIDlen = 0;
+ uint8_t buf[APDU_RESPONSE_LEN] = {0};
+ size_t len = 0;
+ uint16_t sw = 0;
+ int res;
+ uint8_t ODAiList[4096];
+ size_t ODAiListLen = 0;
+
+ CLIParserInit("emv roca",
+ "Tries to extract public keys and run the ROCA test against them.\n",
+ "Usage:\n"
+ "\temv roca -w -> select --CONTACT-- card and run test\n"
+ "\temv roca -> select --CONTACTLESS-- card and run test\n"
+ );
+
+ void* argtable[] = {
+ arg_param_begin,
+ arg_lit0("tT", "selftest", "self test"),
+ arg_lit0("aA", "apdu", "show APDU reqests and responses"),
+ arg_lit0("wW", "wired", "Send data via contact (iso7816) interface. Contactless interface set by default."),
+ arg_param_end
+ };
+ CLIExecWithReturn(cmd, argtable, true);
+
+ if (arg_get_lit(1))
+ return roca_self_test();
+ bool showAPDU = arg_get_lit(2);
+
+ EMVCommandChannel channel = ECC_CONTACTLESS;
+#ifdef WITH_SMARTCARD
+ if (arg_get_lit(3))
+ channel = ECC_CONTACT;
+#endif
+ PrintChannel(channel);
+ CLIParserFree();
+
+ // select card
+ uint8_t psenum = (channel == ECC_CONTACT) ? 1 : 2;
+ char *PSE_or_PPSE = psenum == 1 ? "PSE" : "PPSE";
+
+ SetAPDULogging(showAPDU);
+
+ // init applets list tree
+ const char *al = "Applets list";
+ struct tlvdb *tlvSelect = tlvdb_fixed(1, strlen(al), (const unsigned char *)al);
+
+ // EMV PSE/PPSE
+ PrintAndLogEx(NORMAL, "--> %s.", PSE_or_PPSE);
+ res = EMVSearchPSE(channel, true, true, psenum, false, tlvSelect);
+
+ // check PSE/PPSE and select application id
+ if (!res) {
+ TLVPrintAIDlistFromSelectTLV(tlvSelect);
+ } else {
+ // EMV SEARCH with AID list
+ PrintAndLogEx(NORMAL, "--> AID search.");
+ if (EMVSearch(channel, false, true, false, tlvSelect)) {
+ PrintAndLogEx(ERR, "Couldn't find any known EMV AID. Exit...");
+ tlvdb_free(tlvSelect);
+ DropFieldEx( channel );
+ return 3;
+ }
+
+ // check search and select application id
+ TLVPrintAIDlistFromSelectTLV(tlvSelect);
+ }
+
+ // EMV SELECT application
+ EMVSelectApplication(tlvSelect, AID, &AIDlen);
+
+ tlvdb_free(tlvSelect);
+
+ if (!AIDlen) {
+ PrintAndLogEx(INFO, "Can't select AID. EMV AID not found. Exit...");
+ DropFieldEx( channel );
+ return 4;
+ }
+
+ // Init TLV tree
+ const char *alr = "Root terminal TLV tree";
+ struct tlvdb *tlvRoot = tlvdb_fixed(1, strlen(alr), (const unsigned char *)alr);
+
+ // EMV SELECT applet
+ PrintAndLogEx(NORMAL, "\n-->Selecting AID:%s.", sprint_hex_inrow(AID, AIDlen));
+ res = EMVSelect(channel, false, true, AID, AIDlen, buf, sizeof(buf), &len, &sw, tlvRoot);
+
+ if (res) {
+ PrintAndLogEx(ERR, "Can't select AID (%d). Exit...", res);
+ tlvdb_free(tlvRoot);
+ DropFieldEx( channel );
+ return 5;
+ }
+
+ PrintAndLog("\n* Init transaction parameters.");
+ InitTransactionParameters(tlvRoot, true, TT_QVSDCMCHIP, false);
+
+ PrintAndLogEx(NORMAL, "-->Calc PDOL.");
+ struct tlv *pdol_data_tlv = dol_process(tlvdb_get(tlvRoot, 0x9f38, NULL), tlvRoot, 0x83);
+ if (!pdol_data_tlv){
+ PrintAndLogEx(ERR, "Can't create PDOL TLV.");
+ tlvdb_free(tlvRoot);
+ DropFieldEx( channel );
+ return 6;
+ }
+
+ size_t pdol_data_tlv_data_len;
+ unsigned char *pdol_data_tlv_data = tlv_encode(pdol_data_tlv, &pdol_data_tlv_data_len);
+ if (!pdol_data_tlv_data) {
+ PrintAndLogEx(ERR, "Can't create PDOL data.");
+ tlvdb_free(tlvRoot);
+ DropFieldEx( channel );
+ return 6;
+ }
+ PrintAndLogEx(INFO, "PDOL data[%d]: %s", pdol_data_tlv_data_len, sprint_hex(pdol_data_tlv_data, pdol_data_tlv_data_len));
+
+ PrintAndLogEx(INFO, "-->GPO.");
+ res = EMVGPO(channel, true, pdol_data_tlv_data, pdol_data_tlv_data_len, buf, sizeof(buf), &len, &sw, tlvRoot);
+
+ free(pdol_data_tlv_data);
+ free(pdol_data_tlv);
+
+ if (res) {
+ PrintAndLogEx(ERR, "GPO error(%d): %4x. Exit...", res, sw);
+ tlvdb_free(tlvRoot);
+ DropFieldEx( channel );
+ return 7;
+ }
+ ProcessGPOResponseFormat1(tlvRoot, buf, len, false);
+
+ PrintAndLogEx(INFO, "-->Read records from AFL.");
+ const struct tlv *AFL = tlvdb_get(tlvRoot, 0x94, NULL);
+
+ while(AFL && AFL->len) {
+ if (AFL->len % 4) {
+ PrintAndLogEx(ERR, "Wrong AFL length: %d", AFL->len);
+ break;
+ }
+
+ for (int i = 0; i < AFL->len / 4; i++) {
+ uint8_t SFI = AFL->value[i * 4 + 0] >> 3;
+ uint8_t SFIstart = AFL->value[i * 4 + 1];
+ uint8_t SFIend = AFL->value[i * 4 + 2];
+ uint8_t SFIoffline = AFL->value[i * 4 + 3];
+
+ PrintAndLogEx(INFO, "--->SFI[%02x] start:%02x end:%02x offline:%02x", SFI, SFIstart, SFIend, SFIoffline);
+ if (SFI == 0 || SFI == 31 || SFIstart == 0 || SFIstart > SFIend) {
+ PrintAndLogEx(ERR, "SFI ERROR! Skipped...");
+ continue;
+ }
+
+ for(int n = SFIstart; n <= SFIend; n++) {
+ PrintAndLogEx(INFO, "---->SFI[%02x] %d", SFI, n);
+
+ res = EMVReadRecord(channel, true, SFI, n, buf, sizeof(buf), &len, &sw, tlvRoot);
+ if (res) {
+ PrintAndLogEx(ERR, "SFI[%02x]. APDU error %4x", SFI, sw);
+ continue;
+ }
+
+ // Build Input list for Offline Data Authentication
+ // EMV 4.3 book3 10.3, page 96
+ if (SFIoffline > 0) {
+ if (SFI < 11) {
+ const unsigned char *abuf = buf;
+ size_t elmlen = len;
+ struct tlv e;
+ if (tlv_parse_tl(&abuf, &elmlen, &e)) {
+ memcpy(&ODAiList[ODAiListLen], &buf[len - elmlen], elmlen);
+ ODAiListLen += elmlen;
+ } else {
+ PrintAndLogEx(WARNING, "Error SFI[%02x]. Creating input list for Offline Data Authentication error.", SFI);
+ }
+ } else {
+ memcpy(&ODAiList[ODAiListLen], buf, len);
+ ODAiListLen += len;
+ }
+
+ SFIoffline--;
+ }
+ }
+ }
+
+ break;
+ }
+
+ // copy Input list for Offline Data Authentication
+ if (ODAiListLen) {
+ struct tlvdb *oda = tlvdb_fixed(0x21, ODAiListLen, ODAiList); // not a standard tag
+ tlvdb_add(tlvRoot, oda);
+ PrintAndLogEx(NORMAL, "* Input list for Offline Data Authentication added to TLV. len=%d \n", ODAiListLen);
+ }
+
+ // getting certificates
+ if (tlvdb_get(tlvRoot, 0x90, NULL)) {
+ PrintAndLogEx(INFO, "-->Recovering certificates.");
+ PKISetStrictExecution(false);
+
+ struct emv_pk *pk = get_ca_pk(tlvRoot);
+ if (!pk) {
+ PrintAndLogEx(ERR, "CA Public Key not found. Exit.");
+ goto out;
+ }
+
+ struct emv_pk *issuer_pk = emv_pki_recover_issuer_cert(pk, tlvRoot);
+ if (!issuer_pk) {
+ emv_pk_free(pk);
+ PrintAndLogEx(WARNING, "WARNING: Issuer certificate not found. Exit.");
+ goto out;
+ }
+
+ char RID[15] = {0};
+ memcpy(RID, sprint_hex(issuer_pk->rid, 5), 14);
+ PrintAndLogEx(SUCCESS, "Issuer Public Key recovered. RID %s IDX %02hhx CSN %s",
+ RID,
+ issuer_pk->index,
+ sprint_hex(issuer_pk->serial, 3)
+ );
+
+ const struct tlv *sda_tlv = tlvdb_get(tlvRoot, 0x21, NULL);
+ struct emv_pk *icc_pk = emv_pki_recover_icc_cert(issuer_pk, tlvRoot, sda_tlv);
+ if (!icc_pk) {
+ emv_pk_free(pk);
+ emv_pk_free(issuer_pk);
+ PrintAndLogEx(WARNING, "WARNING: ICC certificate not found. Exit.");
+ goto out;
+ }
+
+ memcpy(RID, sprint_hex(icc_pk->rid, 5), 14);
+ PrintAndLogEx(SUCCESS, "ICC Public Key recovered. RID %s IDX %02hhx CSN %s\n",
+ RID,
+ icc_pk->index,
+ sprint_hex(icc_pk->serial, 3)
+ );
+
+ PrintAndLogEx(INFO, "ICC Public Key modulus: %s\n", sprint_hex_inrow(icc_pk->modulus, icc_pk->mlen));
+
+ // icc_pk->exp, icc_pk->elen
+ // icc_pk->modulus, icc_pk->mlen
+ if (icc_pk->elen > 0 && icc_pk->mlen > 0) {
+ if (emv_rocacheck(icc_pk->modulus, icc_pk->mlen, false)) {
+ PrintAndLogEx(INFO, "ICC Public Key is subject to ROCA vulnerability (it is NOT secure).");
+ } else {
+ PrintAndLogEx(INFO, "ICC Public Key is not subject to ROCA vulnerability (it is secure)");
+ }
+ }
+
+ PKISetStrictExecution(true);
+ }
+
+out:
+
+ // free tlv object
+ tlvdb_free(tlvRoot);
+
+ DropFieldEx( channel );
+ return 0;
+}
+
+int CmdHelp(const char *Cmd);