-static command_t CommandTable[] =\r
-{\r
- {"help", CmdHelp, 1, "This help"},\r
- {"config", CmdT55xxSetConfig, 1, "Set/Get T55XX configuration (modulation, inverted, offset, rate)"},\r
- {"detect", CmdT55xxDetect, 0, "[1] Try detecting the tag modulation from reading the configuration block."},\r
- {"read", CmdT55xxReadBlock, 0, "b <block> p [password] [o] [1] -- Read T55xx block data. Optional [p password], [override], [page1]"},\r
- {"resetread",CmdResetRead, 0, "Send Reset Cmd then lf read the stream to attempt to identify the start of it (needs a demod and/or plot after)"},\r
- {"write", CmdT55xxWriteBlock,0, "b <block> d <data> p [password] [1] -- Write T55xx block data. Optional [p password], [page1]"},\r
- {"trace", CmdT55xxReadTrace, 0, "[1] Show T55x7 traceability data (page 1/ blk 0-1)"},\r
- {"info", CmdT55xxInfo, 0, "[1] Show T55x7 configuration data (page 0/ blk 0)"},\r
- {"dump", CmdT55xxDump, 0, "[password] [o] Dump T55xx card block 0-7. Optional [password], [override]"},\r
- {"special", special, 0, "Show block changes with 64 different offsets"},\r
- {"wakeup", CmdT55xxWakeUp, 0, "Send AOR wakeup command"},\r
- {"wipe", CmdT55xxWipe, 0, "Wipe a T55xx tag and set defaults (will destroy any data on tag)"},\r
+// note length of data returned is different for different chips. \r
+// some return all page 1 (64 bits) and others return just that block (32 bits) \r
+// unfortunately the 64 bits makes this more likely to get a false positive...\r
+bool tryDetectP1(bool getData) {\r
+ uint8_t preamble[] = {1,1,1,0,0,0,0,0,0,0,0,1,0,1,0,1};\r
+ size_t startIdx = 0;\r
+ uint8_t fc1 = 0, fc2 = 0, ans = 0;\r
+ int clk = 0;\r
+ bool st = true;\r
+\r
+ if ( getData ) {\r
+ if ( !AquireData(T55x7_PAGE1, 1, false, 0) )\r
+ return false;\r
+ }\r
+\r
+ // try fsk clock detect. if successful it cannot be any other type of modulation... (in theory...)\r
+ ans = fskClocks(&fc1, &fc2, (uint8_t *)&clk, false);\r
+ if (ans && ((fc1==10 && fc2==8) || (fc1==8 && fc2==5))) {\r
+ if ( FSKrawDemod("0 0", false) && \r
+ preambleSearchEx(DemodBuffer,preamble,sizeof(preamble),&DemodBufferLen,&startIdx,false) && \r
+ (DemodBufferLen == 32 || DemodBufferLen == 64) ) {\r
+ return true;\r
+ }\r
+ if ( FSKrawDemod("0 1", false) && \r
+ preambleSearchEx(DemodBuffer,preamble,sizeof(preamble),&DemodBufferLen,&startIdx,false) && \r
+ (DemodBufferLen == 32 || DemodBufferLen == 64) ) {\r
+ return true;\r
+ }\r
+ return false;\r
+ }\r
+\r
+ // try psk clock detect. if successful it cannot be any other type of modulation... (in theory...)\r
+ clk = GetPskClock("", false, false);\r
+ if (clk>0) {\r
+ // allow undo\r
+ // save_restoreGB(1);\r
+ // skip first 160 samples to allow antenna to settle in (psk gets inverted occasionally otherwise)\r
+ //CmdLtrim("160");\r
+ if ( PSKDemod("0 0 6", false) &&\r
+ preambleSearchEx(DemodBuffer,preamble,sizeof(preamble),&DemodBufferLen,&startIdx,false) && \r
+ (DemodBufferLen == 32 || DemodBufferLen == 64) ) {\r
+ //save_restoreGB(0);\r
+ return true;\r
+ }\r
+ if ( PSKDemod("0 1 6", false) &&\r
+ preambleSearchEx(DemodBuffer,preamble,sizeof(preamble),&DemodBufferLen,&startIdx,false) && \r
+ (DemodBufferLen == 32 || DemodBufferLen == 64) ) {\r
+ //save_restoreGB(0);\r
+ return true;\r
+ }\r
+ // PSK2 - needs a call to psk1TOpsk2.\r
+ if ( PSKDemod("0 0 6", false)) {\r
+ psk1TOpsk2(DemodBuffer, DemodBufferLen);\r
+ if (preambleSearchEx(DemodBuffer,preamble,sizeof(preamble),&DemodBufferLen,&startIdx,false) && \r
+ (DemodBufferLen == 32 || DemodBufferLen == 64) ) {\r
+ //save_restoreGB(0);\r
+ return true;\r
+ }\r
+ } // inverse waves does not affect PSK2 demod\r
+ //undo trim samples\r
+ //save_restoreGB(0); \r
+ // no other modulation clocks = 2 or 4 so quit searching\r
+ if (fc1 != 8) return false;\r
+ }\r
+\r
+ // try ask clock detect. it could be another type even if successful.\r
+ clk = GetAskClock("", false, false);\r
+ if (clk>0) {\r
+ if ( ASKDemod_ext("0 0 1", false, false, 1, &st) &&\r
+ preambleSearchEx(DemodBuffer,preamble,sizeof(preamble),&DemodBufferLen,&startIdx,false) && \r
+ (DemodBufferLen == 32 || DemodBufferLen == 64) ) {\r
+ return true;\r
+ }\r
+ st = true;\r
+ if ( ASKDemod_ext("0 1 1", false, false, 1, &st) &&\r
+ preambleSearchEx(DemodBuffer,preamble,sizeof(preamble),&DemodBufferLen,&startIdx,false) && \r
+ (DemodBufferLen == 32 || DemodBufferLen == 64) ) {\r
+ return true;\r
+ }\r
+ if ( ASKbiphaseDemod("0 0 0 2", false) &&\r
+ preambleSearchEx(DemodBuffer,preamble,sizeof(preamble),&DemodBufferLen,&startIdx,false) && \r
+ (DemodBufferLen == 32 || DemodBufferLen == 64) ) {\r
+ return true;\r
+ }\r
+ if ( ASKbiphaseDemod("0 0 1 2", false) &&\r
+ preambleSearchEx(DemodBuffer,preamble,sizeof(preamble),&DemodBufferLen,&startIdx,false) && \r
+ (DemodBufferLen == 32 || DemodBufferLen == 64) ) {\r
+ return true;\r
+ }\r
+ }\r
+\r
+ // try NRZ clock detect. it could be another type even if successful.\r
+ clk = GetNrzClock("", false, false); //has the most false positives :(\r
+ if (clk>0) {\r
+ if ( NRZrawDemod("0 0 1", false) &&\r
+ preambleSearchEx(DemodBuffer,preamble,sizeof(preamble),&DemodBufferLen,&startIdx,false) && \r
+ (DemodBufferLen == 32 || DemodBufferLen == 64) ) {\r
+ return true;\r
+ }\r
+ if ( NRZrawDemod("0 1 1", false) &&\r
+ preambleSearchEx(DemodBuffer,preamble,sizeof(preamble),&DemodBufferLen,&startIdx,false) && \r
+ (DemodBufferLen == 32 || DemodBufferLen == 64) ) {\r
+ return true;\r
+ }\r
+ }\r
+ return false;\r
+}\r
+// does this need to be a callable command?\r
+int CmdT55xxDetectPage1(const char *Cmd){\r
+ bool errors = false;\r
+ bool useGB = false;\r
+ bool usepwd = false;\r
+ uint32_t password = 0;\r
+ uint8_t cmdp = 0;\r
+\r
+ while(param_getchar(Cmd, cmdp) != 0x00 && !errors) {\r
+ switch(param_getchar(Cmd, cmdp)) {\r
+ case 'h':\r
+ case 'H':\r
+ return usage_t55xx_detectP1();\r
+ case 'p':\r
+ case 'P':\r
+ password = param_get32ex(Cmd, cmdp+1, 0, 16);\r
+ usepwd = true;\r
+ cmdp += 2;\r
+ break;\r
+ case '1':\r
+ // use Graphbuffer data\r
+ useGB = true;\r
+ cmdp++;\r
+ break;\r
+ default:\r
+ PrintAndLog("Unknown parameter '%c'", param_getchar(Cmd, cmdp));\r
+ errors = true;\r
+ break;\r
+ }\r
+ }\r
+ if (errors) return usage_t55xx_detectP1();\r
+\r
+ if ( !useGB ) {\r
+ if ( !AquireData(T55x7_PAGE1, 1, usepwd, password) )\r
+ return false;\r
+ }\r
+ bool success = tryDetectP1(false);\r
+ if (success) PrintAndLog("T55xx chip found!");\r
+ return success;\r
+}\r
+\r
+static command_t CommandTable[] = {\r
+ {"help", CmdHelp, 1, "This help"},\r
+ {"bruteforce",CmdT55xxBruteForce,0, "<start password> <end password> [i <*.dic>] Simple bruteforce attack to find password"},\r
+ {"config", CmdT55xxSetConfig, 1, "Set/Get T55XX configuration (modulation, inverted, offset, rate)"},\r
+ {"detect", CmdT55xxDetect, 1, "[1] Try detecting the tag modulation from reading the configuration block."},\r
+ {"p1detect", CmdT55xxDetectPage1,1, "[1] Try detecting if this is a t55xx tag by reading page 1"},\r
+ {"read", CmdT55xxReadBlock, 0, "b <block> p [password] [o] [1] -- Read T55xx block data. Optional [p password], [override], [page1]"},\r
+ {"resetread", CmdResetRead, 0, "Send Reset Cmd then lf read the stream to attempt to identify the start of it (needs a demod and/or plot after)"},\r
+ {"write", CmdT55xxWriteBlock,0, "b <block> d <data> p [password] [1] -- Write T55xx block data. Optional [p password], [page1]"},\r
+ {"trace", CmdT55xxReadTrace, 1, "[1] Show T55x7 traceability data (page 1/ blk 0-1)"},\r
+ {"info", CmdT55xxInfo, 1, "[1] Show T55x7 configuration data (page 0/ blk 0)"},\r
+ {"dump", CmdT55xxDump, 0, "[password] [o] Dump T55xx card block 0-7. Optional [password], [override]"},\r
+ {"special", special, 0, "Show block changes with 64 different offsets"},\r
+ {"wakeup", CmdT55xxWakeUp, 0, "Send AOR wakeup command"},\r
+ {"wipe", CmdT55xxWipe, 0, "[q] Wipe a T55xx tag and set defaults (will destroy any data on tag)"},\r