+ // Double & triple sized UID, can be mapped to a manufacturer.
+ // HACK: does this apply for Ultralight cards?
+ if ( card.uidlen > 4 ) {
+ PrintAndLog("MANUFACTURER : %s", getTagInfo(card.uid[0]));
+ }
+
+ // try to request ATS even if tag claims not to support it
+ if (select_status == 2) {
+ uint8_t rats[] = { 0xE0, 0x80 }; // FSDI=8 (FSD=256), CID=0
+ c.arg[0] = ISO14A_RAW | ISO14A_APPEND_CRC | ISO14A_NO_DISCONNECT;
+ c.arg[1] = 2;
+ c.arg[2] = 0;
+ memcpy(c.d.asBytes, rats, 2);
+ SendCommand(&c);
+ WaitForResponse(CMD_ACK,&resp);
+
+ memcpy(card.ats, resp.d.asBytes, resp.arg[0]);
+ card.ats_len = resp.arg[0]; // note: ats_len includes CRC Bytes
+ }
+
+ if(card.ats_len >= 3) { // a valid ATS consists of at least the length byte (TL) and 2 CRC bytes
+ bool ta1 = 0, tb1 = 0, tc1 = 0;
+ int pos;
+
+ if (select_status == 2) {
+ PrintAndLog("SAK incorrectly claims that card doesn't support RATS");
+ }
+ PrintAndLog(" ATS : %s", sprint_hex(card.ats, card.ats_len));
+ PrintAndLog(" - TL : length is %d bytes", card.ats[0]);
+ if (card.ats[0] != card.ats_len - 2) {
+ PrintAndLog("ATS may be corrupted. Length of ATS (%d bytes incl. 2 Bytes CRC) doesn't match TL", card.ats_len);
+ }
+
+ if (card.ats[0] > 1) { // there is a format byte (T0)
+ ta1 = (card.ats[1] & 0x10) == 0x10;
+ tb1 = (card.ats[1] & 0x20) == 0x20;
+ tc1 = (card.ats[1] & 0x40) == 0x40;
+ int16_t fsci = card.ats[1] & 0x0f;
+ PrintAndLog(" - T0 : TA1 is%s present, TB1 is%s present, "
+ "TC1 is%s present, FSCI is %d (FSC = %ld)",
+ (ta1 ? "" : " NOT"), (tb1 ? "" : " NOT"), (tc1 ? "" : " NOT"),
+ fsci,
+ fsci < 5 ? (fsci - 2) * 8 :
+ fsci < 8 ? (fsci - 3) * 32 :
+ fsci == 8 ? 256 :
+ -1
+ );
+ }
+ pos = 2;
+ if (ta1) {
+ char dr[16], ds[16];
+ dr[0] = ds[0] = '\0';
+ if (card.ats[pos] & 0x10) strcat(ds, "2, ");
+ if (card.ats[pos] & 0x20) strcat(ds, "4, ");
+ if (card.ats[pos] & 0x40) strcat(ds, "8, ");
+ if (card.ats[pos] & 0x01) strcat(dr, "2, ");
+ if (card.ats[pos] & 0x02) strcat(dr, "4, ");
+ if (card.ats[pos] & 0x04) strcat(dr, "8, ");
+ if (strlen(ds) != 0) ds[strlen(ds) - 2] = '\0';
+ if (strlen(dr) != 0) dr[strlen(dr) - 2] = '\0';
+ PrintAndLog(" - TA1 : different divisors are%s supported, "
+ "DR: [%s], DS: [%s]",
+ (card.ats[pos] & 0x80 ? " NOT" : ""), dr, ds);
+ pos++;
+ }
+ if (tb1) {
+ uint32_t sfgi = card.ats[pos] & 0x0F;
+ uint32_t fwi = card.ats[pos] >> 4;
+ PrintAndLog(" - TB1 : SFGI = %d (SFGT = %s%ld/fc), FWI = %d (FWT = %ld/fc)",
+ (sfgi),
+ sfgi ? "" : "(not needed) ",
+ sfgi ? (1 << 12) << sfgi : 0,
+ fwi,
+ (1 << 12) << fwi
+ );
+ pos++;
+ }
+ if (tc1) {
+ PrintAndLog(" - TC1 : NAD is%s supported, CID is%s supported",
+ (card.ats[pos] & 0x01) ? "" : " NOT",
+ (card.ats[pos] & 0x02) ? "" : " NOT");
+ pos++;
+ }
+ if (card.ats[0] > pos) {
+ char *tip = "";
+ if (card.ats[0] - pos >= 7) {
+ if (memcmp(card.ats + pos, "\xC1\x05\x2F\x2F\x01\xBC\xD6", 7) == 0) {
+ tip = "-> MIFARE Plus X 2K or 4K";
+ } else if (memcmp(card.ats + pos, "\xC1\x05\x2F\x2F\x00\x35\xC7", 7) == 0) {
+ tip = "-> MIFARE Plus S 2K or 4K";
+ }
+ }
+ PrintAndLog(" - HB : %s%s", sprint_hex(card.ats + pos, card.ats[0] - pos), tip);
+ if (card.ats[pos] == 0xC1) {
+ PrintAndLog(" c1 -> Mifare or (multiple) virtual cards of various type");
+ PrintAndLog(" %02x -> Length is %d bytes",
+ card.ats[pos + 1], card.ats[pos + 1]);
+ switch (card.ats[pos + 2] & 0xf0) {
+ case 0x10:
+ PrintAndLog(" 1x -> MIFARE DESFire");
+ break;
+ case 0x20:
+ PrintAndLog(" 2x -> MIFARE Plus");
+ break;
+ }
+ switch (card.ats[pos + 2] & 0x0f) {
+ case 0x00:
+ PrintAndLog(" x0 -> <1 kByte");
+ break;
+ case 0x01:
+ PrintAndLog(" x1 -> 1 kByte");
+ break;
+ case 0x02:
+ PrintAndLog(" x2 -> 2 kByte");
+ break;
+ case 0x03:
+ PrintAndLog(" x3 -> 4 kByte");
+ break;
+ case 0x04:
+ PrintAndLog(" x4 -> 8 kByte");
+ break;
+ }
+ switch (card.ats[pos + 3] & 0xf0) {
+ case 0x00:
+ PrintAndLog(" 0x -> Engineering sample");
+ break;
+ case 0x20:
+ PrintAndLog(" 2x -> Released");
+ break;
+ }
+ switch (card.ats[pos + 3] & 0x0f) {
+ case 0x00:
+ PrintAndLog(" x0 -> Generation 1");
+ break;
+ case 0x01:
+ PrintAndLog(" x1 -> Generation 2");
+ break;
+ case 0x02:
+ PrintAndLog(" x2 -> Generation 3");
+ break;
+ }
+ switch (card.ats[pos + 4] & 0x0f) {
+ case 0x00:
+ PrintAndLog(" x0 -> Only VCSL supported");
+ break;
+ case 0x01:
+ PrintAndLog(" x1 -> VCS, VCSL, and SVC supported");
+ break;
+ case 0x0E:
+ PrintAndLog(" xE -> no VCS command supported");
+ break;
+ }
+ }
+ }
+ } else {
+ PrintAndLog("proprietary non iso14443-4 card found, RATS not supported");
+ }
+
+
+ // try to see if card responses to "chinese magic backdoor" commands.
+ c.cmd = CMD_MIFARE_CIDENT;
+ c.arg[0] = 0;
+ c.arg[1] = 0;
+ c.arg[2] = 0;
+ SendCommand(&c);
+ WaitForResponse(CMD_ACK,&resp);
+ uint8_t isOK = resp.arg[0] & 0xff;
+ PrintAndLog("Answers to chinese magic backdoor commands: %s", (isOK ? "YES" : "NO") );
+
+ // disconnect
+ c.cmd = CMD_READER_ISO_14443a;
+ c.arg[0] = 0;
+ c.arg[1] = 0;
+ c.arg[2] = 0;
+ SendCommand(&c);
+
+ return select_status;
+}
+
+// Collect ISO14443 Type A UIDs
+int CmdHF14ACUIDs(const char *Cmd)
+{
+ // requested number of UIDs
+ int n = atoi(Cmd);
+ // collect at least 1 (e.g. if no parameter was given)
+ n = n > 0 ? n : 1;
+
+ PrintAndLog("Collecting %d UIDs", n);
+ PrintAndLog("Start: %u", time(NULL));
+ // repeat n times
+ for (int i = 0; i < n; i++) {
+ // execute anticollision procedure
+ UsbCommand c = {CMD_READER_ISO_14443a, {ISO14A_CONNECT, 0, 0}};
+ SendCommand(&c);
+
+ UsbCommand resp;
+ WaitForResponse(CMD_ACK,&resp);
+
+ iso14a_card_select_t *card = (iso14a_card_select_t *) resp.d.asBytes;
+
+ // check if command failed
+ if (resp.arg[0] == 0) {
+ PrintAndLog("Card select failed.");
+ } else {
+ char uid_string[20];
+ for (uint16_t i = 0; i < card->uidlen; i++) {
+ sprintf(&uid_string[2*i], "%02X", card->uid[i]);
+ }
+ PrintAndLog("%s", uid_string);
+ }
+ }
+ PrintAndLog("End: %u", time(NULL));
+
+ return 1;