I also made the SRi read functions better by combining them. The demodulation / uart code should be the same as last summers changes. The device side code can now be even smaller.
return (uint8_t *)BigBuf;
}
-
// get the address of the emulator memory. Allocate part of Bigbuf for it, if not yet done
uint8_t *BigBuf_get_EM_addr(void)
{
return emulator_memory;
}
-
// clear ALL of BigBuf
void BigBuf_Clear(void)
{
BigBuf_Clear_ext(true);
}
+
// clear ALL of BigBuf
void BigBuf_Clear_ext(bool verbose)
{
}
}
-
// free ALL allocated chunks. The whole BigBuf is available for traces or samples again.
void BigBuf_free(void)
{
// shouldn't this empty BigBuf also?
}
-
// free allocated chunks EXCEPT the emulator memory
void BigBuf_free_keep_EM(void)
{
// Emulator memory
uint8_t emlSet(uint8_t *data, uint32_t offset, uint32_t length){
uint8_t* mem = BigBuf_get_EM_addr();
- if(offset+length < CARD_MEMORY_SIZE)
- {
+ if(offset+length < CARD_MEMORY_SIZE) {
memcpy(mem+offset, data, length);
return 0;
- }else
- {
+ } else {
Dbprintf("Error, trying to set memory outside of bounds! %d > %d", (offset+length), CARD_MEMORY_SIZE);
return 1;
}
case CMD_TEST_HITAGS_TRACES:// Tests every challenge within the given file
check_challenges((bool)c->arg[0],(byte_t*)c->d.asBytes);
break;
- case CMD_READ_HITAG_S://Reader for only Hitag S tags, args = key or challenge
+ case CMD_READ_HITAG_S: //Reader for only Hitag S tags, args = key or challenge
ReadHitagS((hitag_function)c->arg[0],(hitag_data*)c->d.asBytes);
break;
- case CMD_WR_HITAG_S://writer for Hitag tags args=data to write,page and key or challenge
+ case CMD_WR_HITAG_S: //writer for Hitag tags args=data to write,page and key or challenge
WritePageHitagS((hitag_function)c->arg[0],(hitag_data*)c->d.asBytes,c->arg[2]);
break;
#endif
#endif
#ifdef WITH_ISO14443b
- case CMD_READ_SRI512_TAG:
- ReadSTMemoryIso14443b(0x0F);
- break;
- case CMD_READ_SRIX4K_TAG:
- ReadSTMemoryIso14443b(0x7F);
+ case CMD_READ_SRI_TAG:
+ ReadSTMemoryIso14443b(c->arg[0]);
break;
case CMD_SNOOP_ISO_14443B:
SnoopIso14443b();
SimulateIso14443bTag();
break;
case CMD_ISO_14443B_COMMAND:
- SendRawCommand14443B(c->arg[0],c->arg[1],c->arg[2],c->d.asBytes);
+ //SendRawCommand14443B(c->arg[0],c->arg[1],c->arg[2],c->d.asBytes);
+ SendRawCommand14443B_Ex(c);
break;
#endif
case CMD_SIMULATE_TAG_ISO_14443a:
SimulateIso14443aTag(c->arg[0], c->arg[1], c->d.asBytes); // ## Simulate iso14443a tag - pass tag type & UID
break;
-
case CMD_EPA_PACE_COLLECT_NONCE:
EPA_PACE_Collect_Nonce(c);
break;
case CMD_EPA_PACE_REPLAY:
EPA_PACE_Replay(c);
break;
-
case CMD_READER_MIFARE:
ReaderMifare(c->arg[0], c->arg[1]);
break;
//#include "des.h"
//#include "aes.h"
#include "desfire.h"
-
+#include "iso14443b.h"
extern const uint8_t OddByteParity[256];
extern int rsamples; // = 0;
/// iso14443.h
void SimulateIso14443bTag(void);
void AcquireRawAdcSamplesIso14443b(uint32_t parameter);
-void ReadSTMemoryIso14443b(uint32_t);
+void ReadSTMemoryIso14443b(uint8_t numofblocks);
void RAMFUNC SnoopIso14443b(void);
void SendRawCommand14443B(uint32_t, uint32_t, uint8_t, uint8_t[]);
uint8_t uid[10];
uint8_t pps_response[3];
uint8_t pps_response_par[1];
- iso14a_card_select_t card_select_info;
+ iso14a_card_select_t card_a_info;
+ iso14b_card_select_t card_b_info;
// first, look for type A cards
// power up the field
iso14443a_setup(FPGA_HF_ISO14443A_READER_MOD);
// select the card
- return_code = iso14443a_select_card(uid, &card_select_info, NULL, true, 0);
+ return_code = iso14443a_select_card(uid, &card_a_info, NULL, true, 0);
if (return_code == 1) {
- // send the PPS request
- ReaderTransmit((uint8_t *)pps, sizeof(pps), NULL);
- return_code = ReaderReceive(pps_response, pps_response_par);
- if (return_code != 3 || pps_response[0] != 0xD0) {
- return return_code == 0 ? 2 : return_code;
- }
+ // send the PPS request
+ ReaderTransmit((uint8_t *)pps, sizeof(pps), NULL);
+ return_code = ReaderReceive(pps_response, pps_response_par);
+ if (return_code != 3 || pps_response[0] != 0xD0) {
+ return return_code == 0 ? 2 : return_code;
+ }
Dbprintf("ISO 14443 Type A");
iso_type = 'a';
- return 0;
+ return 0;
}
// if we're here, there is no type A card, so we look for type B
// power up the field
iso14443b_setup();
// select the card
- return_code = iso14443b_select_card();
+ return_code = iso14443b_select_card( &card_b_info );
if (return_code == 1) {
Dbprintf("ISO 14443 Type B");
iso_type = 'b';
#include "cmd.h"
#include "iso14443crc.h"
#include "iso14443a.h"
+#include "iso14443b.h"
#include "crapto1.h"
#include "mifareutil.h"
#include "BigBuf.h"
ComputeCrc14443(CRC_14443_A,data,len,data+len,data+len+1);
}
-void AppendCrc14443b(uint8_t* data, int len)
-{
- ComputeCrc14443(CRC_14443_B,data,len,data+len,data+len+1);
-}
-
-
//=============================================================================
// ISO 14443 Type A - Miller decoder
//=============================================================================
ToSend[++ToSendMax] = SEC_F;
// Convert from last byte pos to length
- ToSendMax++;
+ ++ToSendMax;
}
static void CodeIso14443aAsTag(const uint8_t *cmd, uint16_t len)
{
uint8_t par[MAX_PARITY_SIZE] = {0};
-
GetParity(cmd, len, par);
CodeIso14443aAsTagPar(cmd, len, par);
}
for (i = 0; i < delay; ++i)
bitmask |= (0x01 << i);
- ToSend[++ToSendMax] = 0x00;
+ ToSend[++ToSendMax] = 0x00;
for (i = 0; i < ToSendMax; ++i) {
bits_to_shift = ToSend[i] & bitmask;
// Signal field is on with the appropriate LED
if (fpga_minor_mode == FPGA_HF_ISO14443A_READER_MOD
- || fpga_minor_mode == FPGA_HF_ISO14443A_READER_LISTEN) {
+ || fpga_minor_mode == FPGA_HF_ISO14443A_READER_LISTEN)
LED_D_ON();
- } else {
+ else
LED_D_OFF();
- }
+
FpgaWriteConfWord(FPGA_MAJOR_MODE_HF_ISO14443A | fpga_minor_mode);
- // Start the timer
- StartCountSspClk();
-
DemodReset();
UartReset();
- NextTransferTime = 2*DELAY_ARM2AIR_AS_READER;
+
iso14a_set_timeout(10*106); // 10ms default
+
+ // Start the timer
+ StartCountSspClk();
+
+ NextTransferTime = 2*DELAY_ARM2AIR_AS_READER;
}
int iso14_apdu(uint8_t *cmd, uint16_t cmd_len, void *data) {
if (param & ISO14A_REQUEST_TRIGGER)
iso14a_set_trigger(TRUE);
-
if (param & ISO14A_CONNECT) {
iso14443a_setup(FPGA_HF_ISO14443A_READER_LISTEN);
if(!(param & ISO14A_NO_SELECT)) {
iso14a_card_select_t *card = (iso14a_card_select_t*)buf;
arg0 = iso14443a_select_card(NULL,card,NULL, true, 0);
cmd_send(CMD_ACK,arg0,card->uidlen,0,buf,sizeof(iso14a_card_select_t));
+ // if it fails, the cmdhf14a.c client quites.. however this one still executes.
+ if ( arg0 == 0 ) return;
}
}
// Routines to support ISO 14443B. This includes both the reader software and
// the `fake tag' modes.
//-----------------------------------------------------------------------------
+#include "iso14443b.h"
-#include "proxmark3.h"
-#include "apps.h"
-#include "util.h"
-#include "string.h"
-#include "iso14443crc.h"
-#include "common.h"
#define RECEIVE_SAMPLES_TIMEOUT 20000
#define ISO14443B_DMA_BUFFER_SIZE 256
-// PCB Block number for APDUs
+// the block number for the ISO14443-4 PCB (used with APDUs)
static uint8_t pcb_blocknum = 0;
//=============================================================================
Demod.bitCount = 0;
Demod.thisBit = 0;
Demod.shiftReg = 0;
- memset(Demod.output, 0x00, MAX_FRAME_SIZE);
+ //memset(Demod.output, 0x00, MAX_FRAME_SIZE);
}
}
+void AppendCrc14443b(uint8_t* data, int len)
+{
+ ComputeCrc14443(CRC_14443_B,data,len,data+len,data+len+1);
+}
+
//-----------------------------------------------------------------------------
// Code up a string of octets at layer 2 (including CRC, we don't generate
// that here) so that they can be transmitted to the reader. Doesn't transmit
}
// Convert from last byte pos to length
- ToSendMax++;
+ ++ToSendMax;
}
void SimulateIso14443bTag(void)
{
// the only commands we understand is WUPB, AFI=0, Select All, N=1:
- static const uint8_t cmd1[] = { 0x05, 0x00, 0x08, 0x39, 0x73 }; // WUPB
+ static const uint8_t cmd1[] = { ISO14443B_REQB, 0x00, 0x08, 0x39, 0x73 }; // WUPB
// ... and REQB, AFI=0, Normal Request, N=1:
- static const uint8_t cmd2[] = { 0x05, 0x00, 0x00, 0x71, 0xFF }; // REQB
+ static const uint8_t cmd2[] = { ISO14443B_REQB, 0x00, 0x00, 0x71, 0xFF }; // REQB
// ... and HLTB
- static const uint8_t cmd3[] = { 0x50, 0xff, 0xff, 0xff, 0xff }; // HLTB
+ static const uint8_t cmd3[] = { ISO14443B_HALT, 0xff, 0xff, 0xff, 0xff }; // HLTB
// ... and ATTRIB
- static const uint8_t cmd4[] = { 0x1D, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff}; // ATTRIB
+ static const uint8_t cmd4[] = { ISO14443B_ATTRIB, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff}; // ATTRIB
// ... and we always respond with ATQB, PUPI = 820de174, Application Data = 0x20381922,
// supports only 106kBit/s in both directions, max frame size = 32Bytes,
};
// response to HLTB and ATTRIB
static const uint8_t response2[] = {0x00, 0x78, 0xF0};
-
- //uint8_t parity[MAX_PARITY_SIZE] = {0x00};
FpgaDownloadAndGo(FPGA_BITSTREAM_HF);
}
if (tracing)
- //LogTrace(receivedCmd, len, 0, 0, parity, TRUE);
LogTrace(receivedCmd, len, 0, 0, NULL, TRUE);
respCodeLen = resp2CodeLen;
} else {
Dbprintf("new cmd from reader: len=%d, cmdsRecvd=%d", len, cmdsRecvd);
+
// And print whether the CRC fails, just for good measure
uint8_t b1, b2;
if (len >= 3){ // if crc exists
//break;
}
- cmdsRecvd++;
+ ++cmdsRecvd;
- if(cmdsRecvd > 0x30) {
+ if(cmdsRecvd > 0xFF) {
DbpString("many commands later...");
break;
}
// Transmit the response.
uint16_t i = 0;
+ volatile uint8_t b;
for(;;) {
if(AT91C_BASE_SSC->SSC_SR & (AT91C_SSC_TXRDY)) {
uint8_t b = respCode[i];
AT91C_BASE_SSC->SSC_THR = b;
- i++;
- if(i > respCodeLen) {
+ ++i;
+ if(i > respCodeLen)
break;
- }
+
}
if(AT91C_BASE_SSC->SSC_SR & (AT91C_SSC_RXRDY)) {
- volatile uint8_t b = (uint8_t)AT91C_BASE_SSC->SSC_RHR;
+ b = (uint8_t)AT91C_BASE_SSC->SSC_RHR;
(void)b;
}
}
- // trace the response:
if (tracing)
- //LogTrace(resp, respLen, 0, 0, parity, FALSE);
LogTrace(resp, respLen, 0, 0, NULL, FALSE);
}
}
} \
}
+//note: couldn't we just use MAX(ABS(ci),ABS(cq)) + (MIN(ABS(ci),ABS(cq))/2) from common.h - marshmellow
+#define CHECK_FOR_SUBCARRIER_duo() { \
+ v = MAX(ABS(ci),ABS(cq)) + (MIN(ABS(ci),ABS(cq))/2); \
+ }
switch(Demod.state) {
case DEMOD_UNSYNCD:
// Allocate memory from BigBuf for some buffers
// free all previous allocations first
- BigBuf_free();
+ ///BigBuf_free();
// The response (tag -> reader) that we're receiving.
// Set up the demodulator for tag -> reader responses.
+ // this init, can take some time to execute, memset
DemodInit(BigBuf_malloc(MAX_FRAME_SIZE));
// The DMA buffer, used to stream samples from the FPGA
samples += 2;
- //
- gotFrame = Handle14443bSamplesDemod(ci , cq );
+ // is this | 0x01 the error? & 0xfe in https://github.com/Proxmark/proxmark3/issues/103
+ // can we double this?
+ gotFrame = Handle14443bSamplesDemod(ci<<2 , cq<<2);
if ( gotFrame )
break;
}
- if(samples > n || gotFrame) {
+ if(samples > n || gotFrame)
break;
- }
}
//disable
);
}
- //Tracing
- if (Demod.len > 0)
- LogTrace(Demod.output, Demod.len, 0, 0, NULL, FALSE);
+ if (tracing > 0)
+ LogTrace(Demod.output, Demod.len, samples, samples, NULL, FALSE);
}
ToSendReset();
// Establish initial reference level
- for(i = 0; i < 40; i++)
+ for(i = 0; i < 40; ++i)
ToSendStuffBit(1);
// Send SOF
- for(i = 0; i < 10; i++)
+ for(i = 0; i < 10; ++i)
ToSendStuffBit(0);
- for(i = 0; i < len; i++) {
+ for(i = 0; i < len; ++i) {
// Stop bits/EGT
ToSendStuffBit(1);
ToSendStuffBit(1);
ToSendStuffBit(0);
// Data bits
b = cmd[i];
- for(j = 0; j < 8; j++) {
+ for(j = 0; j < 8; ++j) {
if(b & 1)
ToSendStuffBit(1);
else
}
// Send EOF
ToSendStuffBit(1);
- for(i = 0; i < 10; i++)
+ for(i = 0; i < 10; ++i)
ToSendStuffBit(0);
- for(i = 0; i < 8; i++)
+ for(i = 0; i < 8; ++i)
ToSendStuffBit(1);
// And then a little more, to make sure that the last character makes
// it out before we switch to rx mode.
- for(i = 0; i < 24; i++)
+ for(i = 0; i < 24; ++i)
ToSendStuffBit(1);
// Convert from last character reference to length
{
CodeIso14443bAsReader(cmd, len);
TransmitFor14443b();
- if (tracing) {
- //uint8_t parity[MAX_PARITY_SIZE];
- //LogTrace(cmd,len, 0, 0, parity, TRUE);
- LogTrace(cmd,len, 0, 0, NULL, TRUE);
- }
+
+ if(trigger) LED_A_ON();
+
+ if (tracing) LogTrace(cmd, len, 0, 0, NULL, TRUE);
}
/* Sends an APDU to the tag
* TODO: check CRC and preamble
*/
-int iso14443b_apdu(uint8_t const *message, size_t message_length, uint8_t *response)
+uint8_t iso14443b_apdu(uint8_t const *message, size_t message_length, uint8_t *response)
{
+ uint8_t crc[2] = {0x00, 0x00};
uint8_t message_frame[message_length + 4];
// PCB
message_frame[0] = 0x0A | pcb_blocknum;
if(Demod.len < 3)
return 0;
- // TODO: Check CRC
+ // VALIDATE CRC
+ ComputeCrc14443(CRC_14443_B, Demod.output, Demod.len-2, &crc[0], &crc[1]);
+ if ( crc[0] != Demod.output[Demod.len-2] || crc[1] != Demod.output[Demod.len-1] )
+ return 0;
+
// copy response contents
if(response != NULL)
memcpy(response, Demod.output, Demod.len);
return Demod.len;
}
+/**
+* SRx Initialise.
+*/
+uint8_t iso14443b_select_srx_card(iso14b_card_select_t *card )
+{
+ // INITIATE command: wake up the tag using the INITIATE
+ static const uint8_t init_srx[] = { ISO14443B_INITIATE, 0x00, 0x97, 0x5b };
+ // SELECT command (with space for CRC)
+ uint8_t select_srx[] = { ISO14443B_SELECT, 0x00, 0x00, 0x00};
+ // temp to calc crc.
+ uint8_t crc[2] = {0x00, 0x00};
+
+ CodeAndTransmit14443bAsReader(init_srx, sizeof(init_srx));
+ GetSamplesFor14443bDemod(RECEIVE_SAMPLES_TIMEOUT, TRUE);
+
+ if (Demod.len == 0) return 2;
+
+ // Randomly generated Chip ID
+ if (card) card->chipid = Demod.output[0];
+
+ select_srx[1] = Demod.output[0];
+
+ ComputeCrc14443(CRC_14443_B, select_srx, 2, &select_srx[2], &select_srx[3]);
+ CodeAndTransmit14443bAsReader(select_srx, sizeof(select_srx));
+ GetSamplesFor14443bDemod(RECEIVE_SAMPLES_TIMEOUT, TRUE);
+
+ if (Demod.len != 3) return 2;
+
+ // Check the CRC of the answer:
+ ComputeCrc14443(CRC_14443_B, Demod.output, Demod.len-2 , &crc[0], &crc[1]);
+ if(crc[0] != Demod.output[1] || crc[1] != Demod.output[2]) return 3;
+
+ // Check response from the tag: should be the same UID as the command we just sent:
+ if (select_srx[1] != Demod.output[0]) return 1;
+
+ // First get the tag's UID:
+ select_srx[0] = ISO14443B_GET_UID;
+
+ ComputeCrc14443(CRC_14443_B, select_srx, 1 , &select_srx[1], &select_srx[2]);
+ CodeAndTransmit14443bAsReader(select_srx, 3); // Only first three bytes for this one
+ GetSamplesFor14443bDemod(RECEIVE_SAMPLES_TIMEOUT, TRUE);
+
+ if (Demod.len != 10) return 2;
+
+ // The check the CRC of the answer
+ ComputeCrc14443(CRC_14443_B, Demod.output, Demod.len-2, &crc[0], &crc[1]);
+ if(crc[0] != Demod.output[8] || crc[1] != Demod.output[9]) return 3;
+
+ if (card) {
+ card->uidlen = 8;
+ memcpy(card->uid, Demod.output, 8);
+ }
+
+ return 0;
+}
/* Perform the ISO 14443 B Card Selection procedure
* Currently does NOT do any collision handling.
* It expects 0-1 cards in the device's range.
* TODO: Support multiple cards (perform anticollision)
* TODO: Verify CRC checksums
*/
-int iso14443b_select_card()
+uint8_t iso14443b_select_card(iso14b_card_select_t *card )
{
// WUPB command (including CRC)
// Note: WUPB wakes up all tags, REQB doesn't wake up tags in HALT state
- static const uint8_t wupb[] = { 0x05, 0x00, 0x08, 0x39, 0x73 };
+ static const uint8_t wupb[] = { ISO14443B_REQB, 0x00, 0x08, 0x39, 0x73 };
// ATTRIB command (with space for CRC)
- uint8_t attrib[] = { 0x1D, 0x00, 0x00, 0x00, 0x00, 0x00, 0x08, 0x00, 0x00, 0x00, 0x00};
+ uint8_t attrib[] = { ISO14443B_ATTRIB, 0x00, 0x00, 0x00, 0x00, 0x00, 0x08, 0x00, 0x00, 0x00, 0x00};
+ // temp to calc crc.
+ uint8_t crc[2] = {0x00, 0x00};
+
// first, wake up the tag
CodeAndTransmit14443bAsReader(wupb, sizeof(wupb));
GetSamplesFor14443bDemod(RECEIVE_SAMPLES_TIMEOUT, TRUE);
+
// ATQB too short?
- if (Demod.len < 14)
- return 2;
+ if (Demod.len < 14) return 2;
+
+ // VALIDATE CRC
+ ComputeCrc14443(CRC_14443_B, Demod.output, Demod.len-2, &crc[0], &crc[1]);
+ if ( crc[0] != Demod.output[12] || crc[1] != Demod.output[13] )
+ return 3;
+
+ if (card) {
+ card->uidlen = 4;
+ memcpy(card->uid, Demod.output+1, 4);
+ memcpy(card->atqb, Demod.output+5, 7);
+ }
- // select the tag
// copy the PUPI to ATTRIB
memcpy(attrib + 1, Demod.output + 1, 4);
- /* copy the protocol info from ATQB (Protocol Info -> Protocol_Type) into
- ATTRIB (Param 3) */
+
+ // copy the protocol info from ATQB (Protocol Info -> Protocol_Type) into ATTRIB (Param 3)
attrib[7] = Demod.output[10] & 0x0F;
ComputeCrc14443(CRC_14443_B, attrib, 9, attrib + 9, attrib + 10);
+
CodeAndTransmit14443bAsReader(attrib, sizeof(attrib));
GetSamplesFor14443bDemod(RECEIVE_SAMPLES_TIMEOUT, TRUE);
+
// Answer to ATTRIB too short?
- if(Demod.len < 3)
- return 2;
+ if(Demod.len < 3) return 2;
+
+ // VALIDATE CRC
+ ComputeCrc14443(CRC_14443_B, Demod.output, Demod.len-2, &crc[0], &crc[1]);
+ if ( crc[0] != Demod.output[1] || crc[1] != Demod.output[2] )
+ return 3;
+
+ // CID
+ if (card) card->cid = Demod.output[0];
// reset PCB block number
pcb_blocknum = 0;
- return 1;
+ return 0;
}
// Set up ISO 14443 Type B communication (similar to iso14443a_setup)
// Signal field is on with the appropriate LED
LED_D_ON();
FpgaWriteConfWord(FPGA_MAJOR_MODE_HF_READER_TX | FPGA_HF_READER_TX_SHALLOW_MOD);
- SpinDelay(200);
+ SpinDelay(400);
// Start the timer
StartCountSspClk();
//
// I tried to be systematic and check every answer of the tag, every CRC, etc...
//-----------------------------------------------------------------------------
-void ReadSTMemoryIso14443b(uint32_t dwLast)
+void ReadSTMemoryIso14443b(uint8_t numofblocks)
{
FpgaDownloadAndGo(FPGA_BITSTREAM_HF);
clear_trace();
// Signal field is on with the appropriate LED
LED_D_ON();
FpgaWriteConfWord(FPGA_MAJOR_MODE_HF_READER_RX_XCORR | FPGA_HF_READER_RX_XCORR_848_KHZ);
- SpinDelay(200);
+ SpinDelay(300);
// First command: wake up the tag using the INITIATE command
- uint8_t cmd1[] = {0x06, 0x00, 0x97, 0x5b};
+ uint8_t cmd1[] = {ISO14443B_INITIATE, 0x00, 0x97, 0x5b};
CodeAndTransmit14443bAsReader(cmd1, sizeof(cmd1));
GetSamplesFor14443bDemod(RECEIVE_SAMPLES_TIMEOUT, TRUE);
// There is a response, SELECT the uid
DbpString("Now SELECT tag:");
- cmd1[0] = 0x0E; // 0x0E is SELECT
+ cmd1[0] = ISO14443B_SELECT; // 0x0E is SELECT
cmd1[1] = Demod.output[0];
ComputeCrc14443(CRC_14443_B, cmd1, 2, &cmd1[2], &cmd1[3]);
CodeAndTransmit14443bAsReader(cmd1, sizeof(cmd1));
// Tag is now selected,
// First get the tag's UID:
- cmd1[0] = 0x0B;
+ cmd1[0] = ISO14443B_GET_UID;
ComputeCrc14443(CRC_14443_B, cmd1, 1 , &cmd1[1], &cmd1[2]);
CodeAndTransmit14443bAsReader(cmd1, 3); // Only first three bytes for this one
GetSamplesFor14443bDemod(RECEIVE_SAMPLES_TIMEOUT, TRUE);
(Demod.output[3]<<24) + (Demod.output[2]<<16) + (Demod.output[1]<<8) + Demod.output[0]);
// Now loop to read all 16 blocks, address from 0 to last block
- Dbprintf("Tag memory dump, block 0 to %d", dwLast);
+ Dbprintf("Tag memory dump, block 0 to %d", numofblocks);
cmd1[0] = 0x08;
i = 0x00;
- dwLast++;
+ ++numofblocks;
+
for (;;) {
- if (i == dwLast) {
+ if (i == numofblocks) {
DbpString("System area block (0xff):");
i = 0xff;
}
ComputeCrc14443(CRC_14443_B, cmd1, 2, &cmd1[2], &cmd1[3]);
CodeAndTransmit14443bAsReader(cmd1, sizeof(cmd1));
GetSamplesFor14443bDemod(RECEIVE_SAMPLES_TIMEOUT, TRUE);
+
if (Demod.len != 6) { // Check if we got an answer from the tag
- DbpString("Expected 6 bytes from tag, got less...");
- return;
+ DbpString("Expected 6 bytes from tag, got less...");
+ return;
}
// The check the CRC of the answer (use cmd1 as temporary variable):
ComputeCrc14443(CRC_14443_B, Demod.output, 4, &cmd1[2], &cmd1[3]);
Dbprintf("Address=%02x, Contents=%08x, CRC=%04x", i,
(Demod.output[3]<<24) + (Demod.output[2]<<16) + (Demod.output[1]<<8) + Demod.output[0],
(Demod.output[4]<<8)+Demod.output[5]);
- if (i == 0xff) {
- break;
- }
- i++;
+
+ if (i == 0xff) break;
+ ++i;
}
set_tracing(FALSE);
}
-
//=============================================================================
// Finally, the `sniffer' combines elements from both the reader and
// simulated tag, to show both sides of the conversation.
upTo = dmaBuf;
lastRxCounter = ISO14443B_DMA_BUFFER_SIZE;
FpgaSetupSscDma((uint8_t*) dmaBuf, ISO14443B_DMA_BUFFER_SIZE);
- //uint8_t parity[MAX_PARITY_SIZE] = {0x00};
bool TagIsActive = FALSE;
bool ReaderIsActive = FALSE;
for(;;) {
int behindBy = (lastRxCounter - AT91C_BASE_PDC_SSC->PDC_RCR) &
(ISO14443B_DMA_BUFFER_SIZE-1);
- if(behindBy > maxBehindBy) {
- maxBehindBy = behindBy;
- }
+ if(behindBy > maxBehindBy) maxBehindBy = behindBy;
if(behindBy < 2) continue;
ci = upTo[0];
if (!TagIsActive) { // no need to try decoding reader data if the tag is sending
if (Handle14443bUartBit(ci & 0x01)) {
- if(triggered && tracing) {
- //LogTrace(Uart.output, Uart.byteCnt, samples, samples, parity, TRUE);
+
+ if(triggered && tracing)
LogTrace(Uart.output, Uart.byteCnt, samples, samples, NULL, TRUE);
- }
+
/* And ready to receive another command. */
UartReset();
/* And also reset the demod code, which might have been */
/* false-triggered by the commands from the reader. */
DemodReset();
}
+
if (Handle14443bUartBit(cq & 0x01)) {
- if(triggered && tracing) {
- //LogTrace(Uart.output, Uart.byteCnt, samples, samples, parity, TRUE);
+ if(triggered && tracing)
LogTrace(Uart.output, Uart.byteCnt, samples, samples, NULL, TRUE);
- }
+
/* And ready to receive another command. */
UartReset();
/* And also reset the demod code, which might have been */
/* false-triggered by the commands from the reader. */
DemodReset();
- }
+ }
ReaderIsActive = (Uart.state > STATE_GOT_FALLING_EDGE_OF_SOF);
}
//Use samples as a time measurement
if(tracing)
- //LogTrace(Demod.output, Demod.len, samples, samples, parity, FALSE);
LogTrace(Demod.output, Demod.len, samples, samples, NULL, FALSE);
triggered = TRUE;
set_tracing(FALSE);
}
+void iso14b_set_trigger(bool enable) {
+ trigger = enable;
+}
/*
* Send raw command to tag ISO14443B
* @Input
- * datalen len of buffer data
- * recv bool when true wait for data from tag and send to client
- * powerfield bool leave the field on when true
- * data buffer with byte to send
+ * param flags enum ISO14B_COMMAND. (mifare.h)
+ * len len of buffer data
+ * data buffer with bytes to send
*
* @Output
* none
*
*/
-void SendRawCommand14443B(uint32_t datalen, uint32_t recv, uint8_t powerfield, uint8_t data[])
+void SendRawCommand14443B_Ex(UsbCommand *c)
{
- // param ISO_
- // param ISO_CONNECT
- // param ISO14A_NO_DISCONNECT
- //if (param & ISO14A_NO_DISCONNECT)
- // return;
- iso14443b_setup();
+ iso14b_command_t param = c->arg[0];
+ size_t len = c->arg[1] & 0xffff;
+ uint8_t *cmd = c->d.asBytes;
+ uint8_t status = 0;
+ uint32_t sendlen = sizeof(iso14b_card_select_t);
+ uint8_t buf[USB_CMD_DATA_SIZE] = {0x00};
+
+ if (MF_DBGLEVEL > 3) Dbprintf("param, %04x", param );
- if ( datalen == 0 && recv == 0 && powerfield == 0){
-
- } else {
+ // turn on trigger (LED_A)
+ if (param & ISO14B_REQUEST_TRIGGER)
+ iso14b_set_trigger(TRUE);
+
+ if (param & ISO14B_CONNECT) {
+ // Make sure that we start from off, since the tags are stateful;
+ // confusing things will happen if we don't reset them between reads.
+ LED_D_OFF();
+ FpgaWriteConfWord(FPGA_MAJOR_MODE_OFF);
+ SpinDelay(200);
clear_trace();
- set_tracing(TRUE);
- CodeAndTransmit14443bAsReader(data, datalen);
+ iso14443b_setup();
}
+
+ set_tracing(TRUE);
- if (recv) {
- GetSamplesFor14443bDemod(RECEIVE_SAMPLES_TIMEOUT, FALSE);
- uint16_t len = MIN(Demod.len, USB_CMD_DATA_SIZE);
- cmd_send(CMD_ACK, len, 0, 0, Demod.output, len);
+ if ( param & ISO14B_SELECT_STD) {
+ iso14b_card_select_t *card = (iso14b_card_select_t*)buf;
+ status = iso14443b_select_card(card);
+ cmd_send(CMD_ACK, status, sendlen, 0, buf, sendlen);
+ // 0: OK 2: attrib fail, 3:crc fail,
+ if ( status > 0 ) return;
+ }
+
+ if ( param & ISO14B_SELECT_SR) {
+ iso14b_card_select_t *card = (iso14b_card_select_t*)buf;
+ status = iso14443b_select_srx_card(card);
+ cmd_send(CMD_ACK, status, sendlen, 0, buf, sendlen);
+ // 0: OK 2: attrib fail, 3:crc fail,
+ if ( status > 0 ) return;
+ }
+
+ if (param & ISO14B_APDU) {
+ status = iso14443b_apdu(cmd, len, buf);
+ cmd_send(CMD_ACK, status, status, 0, buf, status);
}
- if (!powerfield) {
+ if (param & ISO14B_RAW) {
+ if(param & ISO14B_APPEND_CRC) {
+ AppendCrc14443b(cmd, len);
+ len += 2;
+ }
+
+ CodeAndTransmit14443bAsReader(cmd, len);
+ GetSamplesFor14443bDemod(RECEIVE_SAMPLES_TIMEOUT, TRUE);
+
+ sendlen = MIN(Demod.len, USB_CMD_DATA_SIZE);
+ status = (Demod.len > 0) ? 0 : 1;
+ cmd_send(CMD_ACK, status, sendlen, 0, Demod.output, sendlen);
+ }
+
+ // turn off trigger (LED_A)
+ if (param & ISO14B_REQUEST_TRIGGER)
+ iso14a_set_trigger(FALSE);
+
+ // turn off antenna et al
+ // we don't send a HALT command.
+ if ( param & ISO14B_DISCONNECT) {
+ if (MF_DBGLEVEL > 3) Dbprintf("disconnect");
FpgaWriteConfWord(FPGA_MAJOR_MODE_OFF);
FpgaDisableSscDma();
set_tracing(FALSE);
- LED_D_OFF();
+ LEDsoff();
}
-}
-
+}
\ No newline at end of file
// at your option, any later version. See the LICENSE.txt file for the text of
// the license.
//-----------------------------------------------------------------------------
-// Routines to support ISO 14443 type A.
+// Routines to support ISO 14443 type B.
//-----------------------------------------------------------------------------
#ifndef __ISO14443B_H
#define __ISO14443B_H
+
+#include "proxmark3.h"
+#include "apps.h"
+#include "util.h"
+#include "string.h"
+#include "iso14443crc.h"
#include "common.h"
+#include "mifare.h"
+#include "protocols.h"
+#include "mifareutil.h" // access to global variable: MF_DBGLEVEL
+
+extern void AppendCrc14443b(uint8_t *data, int len);
-int iso14443b_apdu(uint8_t const *message, size_t message_length, uint8_t *response);
+uint8_t iso14443b_apdu(uint8_t const *message, size_t message_length, uint8_t *response);
void iso14443b_setup();
-int iso14443b_select_card();
+uint8_t iso14443b_select_card(iso14b_card_select_t* card);
+uint8_t iso14443b_select_card_srx(iso14b_card_select_t* card);
+
+void SendRawCommand14443B_Ex(UsbCommand *c);
#endif /* __ISO14443B_H */
// every other is Q. We just want power, so abs(I) + abs(Q) is
// close to what we want.
if(getNext) {
- int8_t r;
-
- r = ABS(b);
-
- // if(b < 0) {
- // r = -b;
- // } else {
- // r = b;
- // }
- // ABS(prev)
- if(prev < 0) {
- r -= prev;
- } else {
- r += prev;
- }
+ int8_t r = ABS(b) + ABS(prev);
dest[c++] = (uint8_t)r;
// every other is Q. We just want power, so abs(I) + abs(Q) is
// close to what we want.
if(getNext) {
- int8_t r;
-
- r = ABS(b);
- // if(b < 0) {
- // r = -b;
- // } else {
- // r = b;
- // }
- if(prev < 0) {
- r -= prev;
- } else {
- r += prev;
- }
+ int8_t r = ABS(b) + ABS(prev);
dest[c++] = (uint8_t)r;
// every other is Q. We just want power, so abs(I) + abs(Q) is
// close to what we want.
if(getNext) {
- int8_t r;
-
- if(b < 0) {
- r = -b;
- } else {
- r = b;
- }
- if(prev < 0) {
- r -= prev;
- } else {
- r += prev;
- }
+ int8_t r = ABS(b) + ABS(prev);
dest[c++] = (uint8_t)r;
// every other is Q. We just want power, so abs(I) + abs(Q) is
// close to what we want.
if(getNext) {
- int8_t r;
-
- if(b < 0) {
- r = -b;
- } else {
- r = b;
- }
- if(prev < 0) {
- r -= prev;
- } else {
- r += prev;
- }
+ int8_t r = ABS(b) + ABS(prev);
dest[c++] = (uint8_t)r;
datalen = (datalen > USB_CMD_DATA_SIZE) ? USB_CMD_DATA_SIZE : datalen;
c.arg[1] = (datalen & 0xFFFF) | (uint32_t)(numbits << 16);
- memcpy(c.d.asBytes,data,datalen);
+ memcpy(c.d.asBytes, data, datalen);
clearCommandBuffer();
SendCommand(&c);
}
static void waitCmd(uint8_t iSelect) {
- uint8_t *recv;
UsbCommand resp;
- char *hexout;
+ uint16_t len = 0;
- if (WaitForResponseTimeout(CMD_ACK,&resp,1500)) {
- recv = resp.d.asBytes;
- uint8_t iLen = iSelect ? resp.arg[1] : resp.arg[0];
- PrintAndLog("received %i octets",iLen);
- if(!iLen)
+ if (WaitForResponseTimeout(CMD_ACK,&resp,1500)) {
+ len = iSelect ? (resp.arg[1] & 0xffff) : (resp.arg[0] & 0xffff);
+ PrintAndLog("received %i octets", len);
+ if(!len)
return;
- hexout = (char *)malloc(iLen * 3 + 1);
- if (hexout != NULL) {
- for (int i = 0; i < iLen; i++) { // data in hex
- sprintf(&hexout[i * 3], "%02X ", recv[i]);
- }
- PrintAndLog("%s", hexout);
- free(hexout);
- } else {
- PrintAndLog("malloc failed your client has low memory?");
- }
+ PrintAndLog("%s", sprint_hex(resp.d.asBytes, len) );
} else {
PrintAndLog("timeout while waiting for reply.");
}
#include <stdlib.h>
#include <stdbool.h>
#include <stdint.h>
-#include "iso14443crc.h"
-#include "proxmark3.h"
-#include "data.h"
-#include "graph.h"
-#include "util.h"
-#include "ui.h"
-#include "cmdparser.h"
#include "cmdhf14b.h"
-#include "cmdmain.h"
-#include "cmdhf14a.h"
-#include "tea.h"
-#include "cmdhf.h"
-#include "prng.h"
-#include "sha1.h"
static int CmdHelp(const char *Cmd);
-int CmdHF14BList(const char *Cmd) {
- CmdHFList("14b");
+int usage_hf_14b_info(void){
+ PrintAndLog("Usage: hf 14b info [-h] [-s]");
+ PrintAndLog(" -h this help");
+ PrintAndLog(" -s silently");
return 0;
}
-
-int CmdHF14BSim(const char *Cmd)
-{
- UsbCommand c = {CMD_SIMULATE_TAG_ISO_14443B};
- clearCommandBuffer();
- SendCommand(&c);
+int usage_hf_14b_reader(void){
+ PrintAndLog("Usage: hf 14b reader [-h] [-s]");
+ PrintAndLog(" -h this help");
+ PrintAndLog(" -s silently");
return 0;
}
-
-int CmdHF14BSnoop(const char *Cmd)
-{
- UsbCommand c = {CMD_SNOOP_ISO_14443B};
- clearCommandBuffer();
- SendCommand(&c);
- return 0;
+int usage_hf_14b_raw(void){
+ PrintAndLog("Usage: hf 14b raw [-h] [-r] [-c] [-p] [-s || -ss] <0A 0B 0C ... hex>");
+ PrintAndLog(" -h this help");
+ PrintAndLog(" -r do not read response");
+ PrintAndLog(" -c calculate and append CRC");
+ PrintAndLog(" -p leave the field on after receive");
+ PrintAndLog(" -s active signal field ON with select");
+ PrintAndLog(" -ss active signal field ON with select for SRx ST Microelectronics tags");
+ return 0;
}
-
-/* New command to read the contents of a SRI512 tag
- * SRI512 tags are ISO14443-B modulated memory tags,
- * this command just dumps the contents of the memory
- */
-int CmdSri512Read(const char *Cmd)
-{
- UsbCommand c = {CMD_READ_SRI512_TAG, {strtol(Cmd, NULL, 0), 0, 0}};
- clearCommandBuffer();
- SendCommand(&c);
+int usage_hf_14b_snoop(void){
+ PrintAndLog("It get data from the field and saves it into command buffer.");
+ PrintAndLog("Buffer accessible from command 'hf list 14b'");
+ PrintAndLog("Usage: hf 14b snoop [-h]");
+ PrintAndLog(" -h this help");
+ PrintAndLog("sample: hf 14b snoop");
+ return 0;
+}
+int usage_hf_14b_sim(void){
+ PrintAndLog("Emulating ISO/IEC 14443 type B tag with 4 UID");
+ PrintAndLog("Usage: hf 14b sim [-h]");
+ PrintAndLog(" -h this help");
+ PrintAndLog("sample: hf 14b sim");
+ return 0;
+}
+int usage_hf_14b_read_srx(void){
+ PrintAndLog("Usage: hf 14b read [h] <1|2>");
+ PrintAndLog("Options:");
+ PrintAndLog(" h this help");
+ PrintAndLog(" <1|2> 1 = SRIX4K , 2 = SRI512");
+ PrintAndLog("sample: hf 14b read 1");
+ PrintAndLog(" : hf 14b read 2");
return 0;
}
-
-/* New command to read the contents of a SRIX4K tag
- * SRIX4K tags are ISO14443-B modulated memory tags,
- * this command just dumps the contents of the memory/
- */
-int CmdSrix4kRead(const char *Cmd) {
- UsbCommand c = {CMD_READ_SRIX4K_TAG, {strtol(Cmd, NULL, 0), 0, 0}};
- clearCommandBuffer();
- SendCommand(&c);
+int usage_hf_14b_write_srx(void){
+ PrintAndLog("Usage: hf 14b write <1|2> <BLOCK> <DATA>");
+ PrintAndLog("Options:");
+ PrintAndLog(" h this help");
+ PrintAndLog(" <1|2> 1 = SRIX4K , 2 = SRI512");
+ PrintAndLog(" <block> BLOCK number depends on tag, special block == FF");
+ PrintAndLog(" <data> hex bytes of data to be written");
+ PrintAndLog("sample : hf 14b write 1 7F 11223344");
+ PrintAndLog(" : hf 14b write 1 FF 11223344");
+ PrintAndLog(" : hf 14b write 2 15 11223344");
+ PrintAndLog(" : hf 14b write 2 FF 11223344");
return 0;
}
-static int rawCloseEx(bool verbose){
- UsbCommand resp;
- UsbCommand c = {CMD_ISO_14443B_COMMAND, {0, 0, 0}};
+static int rawClose(){
+ UsbCommand c = {CMD_ISO_14443B_COMMAND, {ISO14B_DISCONNECT, 0, 0}};
clearCommandBuffer();
SendCommand(&c);
- if (!WaitForResponseTimeout(CMD_ACK, &resp, 1000)) {
- if ( verbose ) PrintAndLog("Command time-out");
- return 0;
- }
return 1;
}
-static int rawClose() {
- return rawCloseEx(false);
-}
-int HF14BCmdRaw(bool reply, bool *crc, bool power, uint8_t *data, uint8_t *datalen, bool verbose){
-
- if(*crc) {
- ComputeCrc14443(CRC_14443_B, data, *datalen, data+*datalen, data+*datalen+1);
- *datalen += 2;
- }
+int CmdHF14BList(const char *Cmd) {
+ CmdHFList("14b");
+ return 0;
+}
- UsbCommand c = {CMD_ISO_14443B_COMMAND, {0, 0, 0}}; // len,recv,power
- c.arg[0] = *datalen;
- c.arg[1] = reply;
- c.arg[2] = power;
- memcpy(c.d.asBytes, data, *datalen);
+int CmdHF14BSim(const char *Cmd) {
+ char cmdp = param_getchar(Cmd, 0);
+ if (cmdp == 'h' || cmdp == 'H') return usage_hf_14b_sim();
+
+ UsbCommand c = {CMD_SIMULATE_TAG_ISO_14443B, {0, 0, 0}};
clearCommandBuffer();
SendCommand(&c);
+ return 0;
+}
- if (!reply) return 1;
-
- UsbCommand resp;
- if (!WaitForResponseTimeout(CMD_ACK, &resp, 2000)) {
- if (verbose) PrintAndLog("timeout while waiting for reply.");
- return 0;
- }
-
- *datalen = resp.arg[0];
- if (verbose) PrintAndLog("received %u octets", *datalen);
- if(*datalen<3) return 0;
-
- memcpy(data, resp.d.asBytes, *datalen);
+int CmdHF14BSnoop(const char *Cmd) {
- uint8_t first = 0, second = 0;
- ComputeCrc14443(CRC_14443_B, data, *datalen-2, &first, &second);
- *crc = ( data[*datalen-2] == first && data[*datalen-1] == second);
-
- if (verbose)
- PrintAndLog("[LEN %u] %s[%02X %02X] %s",
- *datalen,
- sprint_hex(data, *datalen-2),
- data[*datalen-2],
- data[*datalen-1],
- (*crc)?"OK":"FAIL"
- );
+ char cmdp = param_getchar(Cmd, 0);
+ if (cmdp == 'h' || cmdp == 'H') return usage_hf_14b_snoop();
- return 1;
+ UsbCommand c = {CMD_SNOOP_ISO_14443B, {0, 0, 0}};
+ clearCommandBuffer();
+ SendCommand(&c);
+ return 0;
}
int CmdHF14BCmdRaw (const char *Cmd) {
- bool reply = true;
- bool crc = false;
- bool power = false;
- bool select = false;
- bool SRx = false;
- char buf[5]="";
- uint8_t data[USB_CMD_DATA_SIZE] = {0x00};
- uint8_t datalen = 0;
- unsigned int temp;
- int i = 0;
- if (strlen(Cmd)<3) {
- PrintAndLog("Usage: hf 14b raw [-r] [-c] [-p] [-s || -ss] <0A 0B 0C ... hex>");
- PrintAndLog(" -r do not read response");
- PrintAndLog(" -c calculate and append CRC");
- PrintAndLog(" -p leave the field on after receive");
- PrintAndLog(" -s active signal field ON with select");
- PrintAndLog(" -ss active signal field ON with select for SRx ST Microelectronics tags");
- return 0;
- }
+ bool reply = TRUE;
+ bool power = FALSE;
+ bool select = FALSE;
+ char buf[5]="";
+
+ int i = 0;
+ uint8_t data[USB_CMD_DATA_SIZE] = {0x00};
+ uint16_t datalen = 0;
+ uint32_t flags = 0;
+ uint32_t temp = 0;
+
+ if (strlen(Cmd)<3) return usage_hf_14b_raw();
// strip
- while (*Cmd==' ' || *Cmd=='\t') Cmd++;
+ while (*Cmd==' ' || *Cmd=='\t') ++Cmd;
while (Cmd[i]!='\0') {
- if (Cmd[i]==' ' || Cmd[i]=='\t') { i++; continue; }
+ if (Cmd[i]==' ' || Cmd[i]=='\t') { ++i; continue; }
if (Cmd[i]=='-') {
switch (Cmd[i+1]) {
+ case 'H':
+ case 'h':
+ return usage_hf_14b_raw();
case 'r':
case 'R':
- reply = false;
+ reply = FALSE;
break;
case 'c':
case 'C':
- crc = true;
+ flags |= ISO14B_APPEND_CRC;
break;
case 'p':
case 'P':
- power = true;
+ power = TRUE;
break;
case 's':
case 'S':
- select = true;
+ flags |= ISO14B_CONNECT;
+ select = TRUE;
if (Cmd[i+2]=='s' || Cmd[i+2]=='S') {
- SRx = true;
- i++;
+ flags |= ISO14B_SELECT_SR;
+ ++i;
+ } else {
+ flags |= ISO14B_SELECT_STD;
}
break;
default:
- PrintAndLog("Invalid option");
- return 0;
+ return usage_hf_14b_raw();
}
i+=2;
continue;
if (strlen(buf)>=2) {
sscanf(buf,"%x",&temp);
- data[datalen++]=(uint8_t)(temp & 0xff);
+ data[datalen++] = (uint8_t)(temp & 0xff);
*buf=0;
memset(buf, 0x00, sizeof(buf));
}
PrintAndLog("Invalid char on input");
return 0;
}
- if (datalen == 0)
- {
- PrintAndLog("Missing data input");
- return 0;
- }
-
- if (select){ //auto select 14b tag
- uint8_t cmd2[16];
- bool crc2 = true;
- uint8_t cmdLen;
-
- if (SRx) {
- // REQ SRx
- cmdLen = 2;
- cmd2[0] = 0x06;
- cmd2[1] = 0x00;
- } else {
- // REQB
- cmdLen = 3;
- cmd2[0] = 0x05;
- cmd2[1] = 0x00;
- cmd2[2] = 0x08;
- }
-
- // REQB
- if (HF14BCmdRaw(true, &crc2, true, cmd2, &cmdLen, false)==0) return rawClose();
-
- PrintAndLog("REQB : %s", sprint_hex(cmd2, cmdLen));
-
- if ( SRx && (cmdLen != 3 || !crc2) ) return rawClose();
- else if (cmd2[0] != 0x50 || cmdLen != 14 || !crc2) return rawClose();
-
- uint8_t chipID = 0;
- if (SRx) {
- // select
- chipID = cmd2[0];
- cmd2[0] = 0x0E;
- cmd2[1] = chipID;
- cmdLen = 2;
- } else {
- // attrib
- cmd2[0] = 0x1D;
- // UID from cmd2[1 - 4]
- cmd2[5] = 0x00;
- cmd2[6] = 0x08;
- cmd2[7] = 0x01;
- cmd2[8] = 0x00;
- cmdLen = 9;
- }
- // wait
-
- // attrib
- if (HF14BCmdRaw(true, &crc2, true, cmd2, &cmdLen, false)==0) return rawClose();
- PrintAndLog("ATTRIB : %s", sprint_hex(cmd2, cmdLen));
-
- if (cmdLen != 3 || !crc2) return rawClose();
- if (SRx && cmd2[0] != chipID) return rawClose();
- }
- return HF14BCmdRaw(reply, &crc, power, data, &datalen, true);
+ if(!power)
+ flags |= ISO14B_DISCONNECT;
+
+ if(datalen>0)
+ flags |= ISO14B_RAW;
+
+ // Max buffer is USB_CMD_DATA_SIZE
+ datalen = (datalen > USB_CMD_DATA_SIZE) ? USB_CMD_DATA_SIZE : datalen;
+
+ UsbCommand c = {CMD_ISO_14443B_COMMAND, {flags, datalen, 0}};
+ memcpy(c.d.asBytes, data, datalen);
+ clearCommandBuffer();
+ SendCommand(&c);
+
+ if (!reply) return 1;
+
+ bool success = TRUE;
+ // get back iso14b_card_select_t, don't print it.
+ if(select)
+ success = waitCmd(FALSE);
+
+ // get back response from the raw bytes you sent.
+ if(success && datalen>0) waitCmd(TRUE);
+
+ return 1;
}
// print full atqb info
-static void print_atqb_resp(uint8_t *data){
+static void print_atqb_resp(uint8_t *data, uint8_t cid){
//PrintAndLog (" UID: %s", sprint_hex(data+1,4));
- PrintAndLog (" App Data: %s", sprint_hex(data+5,4));
- PrintAndLog (" Protocol: %s", sprint_hex(data+9,3));
- uint8_t BitRate = data[9];
+ PrintAndLog (" App Data: %s", sprint_hex(data,4));
+ PrintAndLog (" Protocol: %s", sprint_hex(data+4,3));
+ uint8_t BitRate = data[4];
if (!BitRate) PrintAndLog (" Bit Rate: 106 kbit/s only PICC <-> PCD");
if (BitRate & 0x10) PrintAndLog (" Bit Rate: 212 kbit/s PICC -> PCD supported");
if (BitRate & 0x20) PrintAndLog (" Bit Rate: 424 kbit/s PICC -> PCD supported");
if (BitRate & 0x04) PrintAndLog (" Bit Rate: 847 kbit/s PICC <- PCD supported");
if (BitRate & 0x80) PrintAndLog (" Same bit rate <-> required");
- uint16_t maxFrame = data[10]>>4;
+ uint16_t maxFrame = data[5]>>4;
if (maxFrame < 5) maxFrame = 8 * maxFrame + 16;
else if (maxFrame == 5) maxFrame = 64;
else if (maxFrame == 6) maxFrame = 96;
PrintAndLog ("Max Frame Size: %u%s",maxFrame, (maxFrame == 257) ? "+ RFU" : "");
- uint8_t protocolT = data[10] & 0xF;
+ uint8_t protocolT = data[5] & 0xF;
PrintAndLog (" Protocol Type: Protocol is %scompliant with ISO/IEC 14443-4",(protocolT) ? "" : "not " );
- PrintAndLog ("Frame Wait Int: %u", data[11]>>4);
- PrintAndLog (" App Data Code: Application is %s",(data[11]&4) ? "Standard" : "Proprietary");
- PrintAndLog (" Frame Options: NAD is %ssupported",(data[11]&2) ? "" : "not ");
- PrintAndLog (" Frame Options: CID is %ssupported",(data[11]&1) ? "" : "not ");
- PrintAndLog ("Max Buf Length: %u (MBLI) %s",data[14]>>4, (data[14] & 0xF0) ? "" : "not supported");
-
+ PrintAndLog ("Frame Wait Int: %u", data[6]>>4);
+ PrintAndLog (" App Data Code: Application is %s",(data[6]&4) ? "Standard" : "Proprietary");
+ PrintAndLog (" Frame Options: NAD is %ssupported",(data[6]&2) ? "" : "not ");
+ PrintAndLog (" Frame Options: CID is %ssupported",(data[6]&1) ? "" : "not ");
+ PrintAndLog ("Tag :");
+ PrintAndLog (" Max Buf Length: %u (MBLI) %s",cid>>4, (cid & 0xF0) ? "" : "not supported");
+ PrintAndLog (" Cid : %u", cid & 0x0f);
return;
}
return retStr;
}
+// REMAKE:
int print_ST_Lock_info(uint8_t model){
- //assume connection open and tag selected...
- uint8_t data[16] = {0x00};
- uint8_t datalen = 2;
- bool crc = true;
- uint8_t resplen;
- uint8_t blk1;
- data[0] = 0x08;
-
- if (model == 0x2) { //SR176 has special command:
- data[1] = 0xf;
- resplen = 4;
- } else {
- data[1] = 0xff;
- resplen = 6;
- }
- //std read cmd
- if (HF14BCmdRaw(true, &crc, true, data, &datalen, false)==0) return rawClose();
-
- if (datalen != resplen || !crc) return rawClose();
-
- PrintAndLog("Chip Write Protection Bits:");
- // now interpret the data
- switch (model){
- case 0x0: //fall through (SRIX4K special)
- case 0x3: //fall through (SRIx4K)
- case 0x7: // (SRI4K)
- //only need data[3]
- blk1 = 9;
- PrintAndLog(" raw: %s", sprint_bin(data+3, 1));
- PrintAndLog(" 07/08:%slocked", (data[3] & 1) ? " not " : " " );
- for (uint8_t i = 1; i<8; i++){
- PrintAndLog(" %02u:%slocked", blk1, (data[3] & (1 << i)) ? " not " : " " );
- blk1++;
- }
- break;
- case 0x4: //fall through (SRIX512)
- case 0x6: //fall through (SRI512)
- case 0xC: // (SRT512)
- //need data[2] and data[3]
- blk1 = 0;
- PrintAndLog(" raw: %s", sprint_bin(data+2, 2));
- for (uint8_t b=2; b<4; b++){
- for (uint8_t i=0; i<8; i++){
- PrintAndLog(" %02u:%slocked", blk1, (data[b] & (1 << i)) ? " not " : " " );
- blk1++;
- }
- }
- break;
- case 0x2: // (SR176)
- //need data[2]
- blk1 = 0;
- PrintAndLog(" raw: %s", sprint_bin(data+2, 1));
- for (uint8_t i = 0; i<8; i++){
- PrintAndLog(" %02u/%02u:%slocked", blk1, blk1+1, (data[2] & (1 << i)) ? " " : " not " );
- blk1+=2;
- }
- break;
- default:
- return rawClose();
- }
+ // PrintAndLog("Chip Write Protection Bits:");
+ // // now interpret the data
+ // switch (model){
+ // case 0x0: //fall through (SRIX4K special)
+ // case 0x3: //fall through (SRIx4K)
+ // case 0x7: // (SRI4K)
+ // //only need data[3]
+ // blk1 = 9;
+ // PrintAndLog(" raw: %s", sprint_bin(data+3, 1));
+ // PrintAndLog(" 07/08:%slocked", (data[3] & 1) ? " not " : " " );
+ // for (uint8_t i = 1; i<8; i++){
+ // PrintAndLog(" %02u:%slocked", blk1, (data[3] & (1 << i)) ? " not " : " " );
+ // blk1++;
+ // }
+ // break;
+ // case 0x4: //fall through (SRIX512)
+ // case 0x6: //fall through (SRI512)
+ // case 0xC: // (SRT512)
+ // //need data[2] and data[3]
+ // blk1 = 0;
+ // PrintAndLog(" raw: %s", sprint_bin(data+2, 2));
+ // for (uint8_t b=2; b<4; b++){
+ // for (uint8_t i=0; i<8; i++){
+ // PrintAndLog(" %02u:%slocked", blk1, (data[b] & (1 << i)) ? " not " : " " );
+ // blk1++;
+ // }
+ // }
+ // break;
+ // case 0x2: // (SR176)
+ // //need data[2]
+ // blk1 = 0;
+ // PrintAndLog(" raw: %s", sprint_bin(data+2, 1));
+ // for (uint8_t i = 0; i<8; i++){
+ // PrintAndLog(" %02u/%02u:%slocked", blk1, blk1+1, (data[2] & (1 << i)) ? " " : " not " );
+ // blk1+=2;
+ // }
+ // break;
+ // default:
+ // return rawClose();
+ // }
return 1;
}
// print UID info from SRx chips (ST Microelectronics)
-static void print_st_general_info(uint8_t *data){
+static void print_st_general_info(uint8_t *data, uint8_t len){
//uid = first 8 bytes in data
- PrintAndLog(" UID: %s", sprint_hex(SwapEndian64(data,8,8),8));
+ PrintAndLog(" UID: %s", sprint_hex(SwapEndian64(data,8,8), len));
PrintAndLog(" MFG: %02X, %s", data[6], getTagInfo(data[6]));
PrintAndLog("Chip: %02X, %s", data[5]>>2, get_ST_Chip_Model(data[5]>>2));
return;
}
-// 14b get and print UID only (general info)
-int HF14BStdReader(uint8_t *data, uint8_t *datalen, bool verbose){
- //05 00 00 = find one tag in field
- //1d xx xx xx xx 00 08 01 00 = attrib xx=UID (resp 10 [f9 e0])
- //a3 = ? (resp 03 [e2 c2])
- //02 = ? (resp 02 [6a d3])
- // 022b (resp 02 67 00 [29 5b])
- // 0200a40400 (resp 02 67 00 [29 5b])
- // 0200a4040c07a0000002480300 (resp 02 67 00 [29 5b])
- // 0200a4040c07a0000002480200 (resp 02 67 00 [29 5b])
- // 0200a4040006a0000000010100 (resp 02 6a 82 [4b 4c])
- // 0200a4040c09d27600002545500200 (resp 02 67 00 [29 5b])
- // 0200a404000cd2760001354b414e4d30310000 (resp 02 6a 82 [4b 4c])
- // 0200a404000ca000000063504b43532d313500 (resp 02 6a 82 [4b 4c])
- // 0200a4040010a000000018300301000000000000000000 (resp 02 6a 82 [4b 4c])
- //03 = ? (resp 03 [e3 c2])
- //c2 = ? (resp c2 [66 15])
- //b2 = ? (resp a3 [e9 67])
- //a2 = ? (resp 02 [6a d3])
- bool crc = true;
- *datalen = 3;
- //std read cmd
- data[0] = 0x05;
- data[1] = 0x00;
- data[2] = 0x08;
-
- if (HF14BCmdRaw(true, &crc, true, data, datalen, false)==0) return rawCloseEx(verbose);
-
- if (data[0] != 0x50 || *datalen != 14 || !crc) return rawCloseEx(verbose);
-
- PrintAndLog ("\n14443-3b tag found:");
- PrintAndLog (" UID: %s", sprint_hex(data+1,4));
-
- uint8_t cmd2[16];
- uint8_t cmdLen = 3;
- bool crc2 = true;
-
- cmd2[0] = 0x1D;
- // UID from data[1 - 4]
- cmd2[1] = data[1];
- cmd2[2] = data[2];
- cmd2[3] = data[3];
- cmd2[4] = data[4];
- cmd2[5] = 0x00;
- cmd2[6] = 0x08;
- cmd2[7] = 0x01;
- cmd2[8] = 0x00;
- cmdLen = 9;
-
- // attrib
- if (HF14BCmdRaw(true, &crc2, true, cmd2, &cmdLen, false)==0) rawCloseEx(verbose);
-
- if (cmdLen != 3 || !crc2) return rawCloseEx(verbose);
- // add attrib responce to data
- data[14] = cmd2[0];
- rawCloseEx(verbose);
- return 1;
-}
+//05 00 00 = find one tag in field
+//1d xx xx xx xx 00 08 01 00 = attrib xx=UID (resp 10 [f9 e0])
+//a3 = ? (resp 03 [e2 c2])
+//02 = ? (resp 02 [6a d3])
+// 022b (resp 02 67 00 [29 5b])
+// 0200a40400 (resp 02 67 00 [29 5b])
+// 0200a4040c07a0000002480300 (resp 02 67 00 [29 5b])
+// 0200a4040c07a0000002480200 (resp 02 67 00 [29 5b])
+// 0200a4040006a0000000010100 (resp 02 6a 82 [4b 4c])
+// 0200a4040c09d27600002545500200 (resp 02 67 00 [29 5b])
+// 0200a404000cd2760001354b414e4d30310000 (resp 02 6a 82 [4b 4c])
+// 0200a404000ca000000063504b43532d313500 (resp 02 6a 82 [4b 4c])
+// 0200a4040010a000000018300301000000000000000000 (resp 02 6a 82 [4b 4c])
+//03 = ? (resp 03 [e3 c2])
+//c2 = ? (resp c2 [66 15])
+//b2 = ? (resp a3 [e9 67])
+//a2 = ? (resp 02 [6a d3])
// 14b get and print Full Info (as much as we know)
-int HF14BStdInfo(uint8_t *data, uint8_t *datalen, bool verbose){
- if (!HF14BStdReader(data,datalen, verbose)) return 0;
-
+bool HF14B_Std_Info(bool verbose){
//add more info here
- print_atqb_resp(data);
- return 1;
+ return FALSE;
}
-// SRx get and print general info about SRx chip from UID
-int HF14B_ST_Reader(uint8_t *data, uint8_t *datalen, bool closeCon, bool verbose){
- bool crc = true;
- *datalen = 2;
- //wake cmd
- data[0] = 0x06;
- data[1] = 0x00;
-
- //leave power on
- // verbose on for now for testing - turn off when functional
- if (HF14BCmdRaw(true, &crc, true, data, datalen, false)==0) return rawCloseEx(verbose);
+// SRx get and print full info (needs more info...)
+bool HF14B_ST_Info(bool verbose){
+
+ UsbCommand c = {CMD_ISO_14443B_COMMAND, {ISO14B_CONNECT | ISO14B_SELECT_SR | ISO14B_DISCONNECT, 0, 0}};
+ clearCommandBuffer();
+ SendCommand(&c);
+ UsbCommand resp;
- if (*datalen != 3 || !crc) return rawClose();
+ if (!WaitForResponseTimeout(CMD_ACK, &resp, 1000)) {
+ if (verbose) PrintAndLog("timeout while waiting for reply.");
+ return FALSE;
+ }
- uint8_t chipID = data[0];
- // select
- data[0] = 0x0E;
- data[1] = chipID;
- *datalen = 2;
+ iso14b_card_select_t card;
+ memcpy(&card, (iso14b_card_select_t *)resp.d.asBytes, sizeof(iso14b_card_select_t));
+
+ uint64_t status = resp.arg[0];
+ if ( status > 0 ) {
+ rawClose();
+ return FALSE;
+ }
- //leave power on
- if (HF14BCmdRaw(true, &crc, true, data, datalen, false)==0) return rawCloseEx(verbose);
+ //add locking bit information here. uint8_t data[16] = {0x00};
+ // uint8_t datalen = 2;
+ // uint8_t resplen;
+ // uint8_t blk1;
+ // data[0] = 0x08;
+
+ //
+ // if (model == 0x2) { //SR176 has special command:
+ // data[1] = 0xf;
+ // resplen = 4;
+ // } else {
+ // data[1] = 0xff;
+ // resplen = 6;
+ // }
+
+ // //std read cmd
+ // if (HF14BCmdRaw(true, true, data, &datalen, false)==0)
+ // return rawClose();
+
+ // if (datalen != resplen || !crc) return rawClose();
+ //print_ST_Lock_info(data[5]>>2);
+ rawClose();
+ return TRUE;
+}
- if (*datalen != 3 || !crc || data[0] != chipID) return rawCloseEx(verbose);
+// get and print all info known about any known 14b tag
+bool HF14BInfo(bool verbose){
- // get uid
- data[0] = 0x0B;
- *datalen = 1;
+ // try std 14b (atqb)
+ if (HF14B_Std_Info(verbose)) return TRUE;
- //leave power on
- if (HF14BCmdRaw(true, &crc, true, data, datalen, false)==0) return rawCloseEx(verbose);
+ // try st 14b
+ if (HF14B_ST_Info(verbose)) return TRUE;
- if (*datalen != 10 || !crc) return rawCloseEx(verbose);
+ // try unknown 14b read commands (to be identified later)
+ // could be read of calypso, CEPAS, moneo, or pico pass.
- //power off ?
- if (closeCon) rawCloseEx(verbose);
+ if (verbose) PrintAndLog("no 14443B tag found");
+ return FALSE;
+}
- if (verbose ) {
- PrintAndLog("\n14443-3b ST tag found:");
- print_st_general_info(data);
- }
- return 1;
+// menu command to get and print all info known about any known 14b tag
+int CmdHF14Binfo(const char *Cmd){
+ char cmdp = param_getchar(Cmd, 0);
+ if (cmdp == 'h' || cmdp == 'H') return usage_hf_14b_info();
+
+ bool verbose = !((cmdp == 's') || (cmdp == 'S'));
+ return HF14BInfo(verbose);
}
-// SRx get and print full info (needs more info...)
-int HF14B_ST_Info(uint8_t *data, uint8_t *datalen, bool verbose){
- if (!HF14B_ST_Reader(data, datalen, false, verbose)) return 0;
+bool HF14B_ST_Reader(bool verbose){
+
+ bool isSuccess = FALSE;
+
+ // SRx get and print general info about SRx chip from UID
+ UsbCommand c = {CMD_ISO_14443B_COMMAND, {ISO14B_CONNECT | ISO14B_SELECT_SR | ISO14B_DISCONNECT, 0, 0}};
+ clearCommandBuffer();
+ SendCommand(&c);
+ UsbCommand resp;
- //add locking bit information here.
- if (print_ST_Lock_info(data[5]>>2))
- rawCloseEx(verbose);
+ if (!WaitForResponseTimeout(CMD_ACK, &resp, 1000)) {
+ if (verbose) PrintAndLog("timeout while waiting for reply.");
+ return FALSE;
+ }
- return 1;
-}
+
+ iso14b_card_select_t card;
+ memcpy(&card, (iso14b_card_select_t *)resp.d.asBytes, sizeof(iso14b_card_select_t));
-// test for other 14b type tags (mimic another reader - don't have tags to identify)
-int HF14B_Other_Reader(uint8_t *data, uint8_t *datalen, bool verbose){
- bool crc = true;
- *datalen = 4;
- //std read cmd
- data[0] = 0x00;
- data[1] = 0x0b;
- data[2] = 0x3f;
- data[3] = 0x80;
-
- if (HF14BCmdRaw(true, &crc, true, data, datalen, false)!=0) {
- if (*datalen > 2 || !crc) {
- PrintAndLog ("\n14443-3b tag found:");
- PrintAndLog ("Unknown tag type answered to a 0x000b3f80 command ans:");
- PrintAndLog ("%s",sprint_hex(data,*datalen));
- rawCloseEx(verbose);
- return 1;
- }
- }
+ uint64_t status = resp.arg[0];
- crc = false;
- *datalen = 1;
- data[0] = 0x0a;
-
- if (HF14BCmdRaw(true, &crc, true, data, datalen, false)!=0) {
- if (*datalen > 0) {
- PrintAndLog ("\n14443-3b tag found:");
- PrintAndLog ("Unknown tag type answered to a 0x0A command ans:");
- PrintAndLog ("%s",sprint_hex(data,*datalen));
- rawCloseEx(verbose);
- return 1;
- }
+ switch( status ){
+ case 0:
+ print_st_general_info(card.uid, card.uidlen);
+ isSuccess = TRUE;
+ break;
+ case 1:
+ if (verbose) PrintAndLog("iso14443-3 random chip id fail");
+ break;
+ case 2:
+ if (verbose) PrintAndLog("iso14443-3 ATTRIB fail");
+ break;
+ case 3:
+ if (verbose) PrintAndLog("iso14443-3 CRC fail");
+ break;
+ default:
+ if (verbose) PrintAndLog("iso14443b card select SRx failed");
+ break;
}
- crc = false;
- *datalen = 1;
- data[0] = 0x0c;
-
- if (HF14BCmdRaw(true, &crc, true, data, datalen, false)!=0) {
- if (*datalen > 0) {
- PrintAndLog ("\n14443-3b tag found:");
- PrintAndLog ("Unknown tag type answered to a 0x0C command ans:");
- PrintAndLog ("%s",sprint_hex(data,*datalen));
- rawCloseEx(verbose);
- return 1;
- }
- }
- rawCloseEx(verbose);
- return 0;
+ rawClose();
+ return isSuccess;
}
-// get and print all info known about any known 14b tag
-int HF14BInfo(bool verbose){
- uint8_t data[USB_CMD_DATA_SIZE];
- uint8_t datalen = 5;
+bool HF14B_Std_Reader(bool verbose){
- // try std 14b (atqb)
- if (HF14BStdInfo(data, &datalen, verbose)) return 1;
+ bool isSuccess = FALSE;
- // try st 14b
- if (HF14B_ST_Info(data, &datalen, verbose)) return 1;
+ // 14b get and print UID only (general info)
+ UsbCommand c = {CMD_ISO_14443B_COMMAND, {ISO14B_CONNECT | ISO14B_SELECT_STD | ISO14B_DISCONNECT, 0, 0}};
+ clearCommandBuffer();
+ SendCommand(&c);
+ UsbCommand resp;
+
+ if (!WaitForResponseTimeout(CMD_ACK, &resp, 1000)) {
+ if (verbose) PrintAndLog("timeout while waiting for reply.");
+ return FALSE;
+ }
+
+ iso14b_card_select_t card;
+ memcpy(&card, (iso14b_card_select_t *)resp.d.asBytes, sizeof(iso14b_card_select_t));
+
+ uint64_t status = resp.arg[0];
+
+ switch( status ){
+ case 0:
+ PrintAndLog(" UID : %s", sprint_hex(card.uid, card.uidlen));
+ PrintAndLog(" ATQB : %s", sprint_hex(card.atqb, sizeof(card.atqb)));
+ PrintAndLog(" CHIPID : %02X", card.chipid);
+ print_atqb_resp(card.atqb, card.cid);
+ isSuccess = TRUE;
+ break;
+ case 2:
+ if (verbose) PrintAndLog("iso14443-3 ATTRIB fail");
+ break;
+ case 3:
+ if (verbose) PrintAndLog("iso14443-3 CRC fail");
+ break;
+ default:
+ if (verbose) PrintAndLog("iso14443b card select failed");
+ break;
+ }
+
+ rawClose();
+ return isSuccess;
+}
- // try unknown 14b read commands (to be identified later)
- // could be read of calypso, CEPAS, moneo, or pico pass.
- if (HF14B_Other_Reader(data, &datalen, verbose)) return 1;
+// test for other 14b type tags (mimic another reader - don't have tags to identify)
+bool HF14B_Other_Reader(){
- if (verbose) PrintAndLog("no 14443B tag found");
- return 0;
-}
+ // uint8_t data[] = {0x00, 0x0b, 0x3f, 0x80};
+ // uint8_t datalen = 4;
-// menu command to get and print all info known about any known 14b tag
-int CmdHF14Binfo(const char *Cmd){
- return HF14BInfo(true);
+ // // 14b get and print UID only (general info)
+ // uint32_t flags = ISO14B_CONNECT | ISO14B_SELECT_STD | ISO14B_RAW | ISO14B_APPEND_CRC;
+
+ // UsbCommand c = {CMD_ISO_14443B_COMMAND, {flags, datalen, 0}};
+ // memcpy(c.d.asBytes, data, datalen);
+
+ // clearCommandBuffer();
+ // SendCommand(&c);
+ // UsbCommand resp;
+ // WaitForResponse(CMD_ACK,&resp);
+
+ // if (datalen > 2 ) {
+ // printandlog ("\n14443-3b tag found:");
+ // printandlog ("unknown tag type answered to a 0x000b3f80 command ans:");
+ // //printandlog ("%s", sprint_hex(data, datalen));
+ // rawclose();
+ // return true;
+ // }
+
+ // c.arg1 = 1;
+ // c.d.asBytes[0] = ISO14443B_AUTHENTICATE;
+ // clearCommandBuffer();
+ // SendCommand(&c);
+ // UsbCommand resp;
+ // WaitForResponse(CMD_ACK, &resp);
+
+ // if (datalen > 0) {
+ // PrintAndLog ("\n14443-3b tag found:");
+ // PrintAndLog ("Unknown tag type answered to a 0x0A command ans:");
+ // // PrintAndLog ("%s", sprint_hex(data, datalen));
+ // rawClose();
+ // return TRUE;
+ // }
+
+ // c.arg1 = 1;
+ // c.d.asBytes[0] = ISO14443B_RESET;
+ // clearCommandBuffer();
+ // SendCommand(&c);
+ // UsbCommand resp;
+ // WaitForResponse(CMD_ACK, &resp);
+
+ // if (datalen > 0) {
+ // PrintAndLog ("\n14443-3b tag found:");
+ // PrintAndLog ("Unknown tag type answered to a 0x0C command ans:");
+ // PrintAndLog ("%s", sprint_hex(data, datalen));
+ // rawClose();
+ // return TRUE;
+ // }
+
+ // rawClose();
+ return FALSE;
}
// get and print general info about all known 14b chips
-int HF14BReader(bool verbose){
- uint8_t data[USB_CMD_DATA_SIZE];
- uint8_t datalen = 5;
+bool HF14BReader(bool verbose){
// try std 14b (atqb)
- if (HF14BStdReader(data, &datalen, verbose)) return 1;
+ if (HF14B_Std_Reader(verbose)) return TRUE;
- // try st 14b
- if (HF14B_ST_Reader(data, &datalen, true, verbose)) return 1;
+ // try ST Microelectronics 14b
+ if (HF14B_ST_Reader(verbose)) return TRUE;
// try unknown 14b read commands (to be identified later)
// could be read of calypso, CEPAS, moneo, or pico pass.
- if (HF14B_Other_Reader(data, &datalen, verbose)) return 1;
+ if (HF14B_Other_Reader()) return TRUE;
if (verbose) PrintAndLog("no 14443B tag found");
- return 0;
+ return FALSE;
}
// menu command to get and print general info about all known 14b chips
int CmdHF14BReader(const char *Cmd){
- return HF14BReader(true);
+ char cmdp = param_getchar(Cmd, 0);
+ if (cmdp == 'h' || cmdp == 'H') return usage_hf_14b_reader();
+
+ bool verbose = !((cmdp == 's') || (cmdp == 'S'));
+ return HF14BReader(verbose);
}
-int CmdSriWrite( const char *Cmd){
+/* New command to read the contents of a SRI512|SRIX4K tag
+ * SRI* tags are ISO14443-B modulated memory tags,
+ * this command just dumps the contents of the memory/
+ */
+int CmdHF14BReadSri(const char *Cmd){
+ char cmdp = param_getchar(Cmd, 0);
+ if (strlen(Cmd) < 1 || cmdp == 'h' || cmdp == 'H') return usage_hf_14b_read_srx();
+
+ uint8_t tagtype = param_get8(Cmd, 0);
+ uint8_t blocks = (tagtype == 1) ? 0x7F : 0x0F;
+
+ UsbCommand c = {CMD_READ_SRI_TAG, {blocks, 0, 0}};
+ clearCommandBuffer();
+ SendCommand(&c);
+ return 0;
+}
+// New command to write a SRI512/SRIX4K tag.
+int CmdHF14BWriteSri(const char *Cmd){
/*
* For SRIX4K blocks 00 - 7F
* hf 14b raw -c -p 09 $srix4kwblock $srix4kwdata
uint8_t blockno = -1;
uint8_t data[4] = {0x00};
bool isSrix4k = true;
- char str[20];
-
- if (strlen(Cmd) < 1 || cmdp == 'h' || cmdp == 'H') {
- PrintAndLog("Usage: hf 14b write <1|2> <BLOCK> <DATA>");
- PrintAndLog(" [1 = SRIX4K]");
- PrintAndLog(" [2 = SRI512]");
- PrintAndLog(" [BLOCK number depends on tag, special block == FF]");
- PrintAndLog(" sample: hf 14b write 1 7F 11223344");
- PrintAndLog(" : hf 14b write 1 FF 11223344");
- PrintAndLog(" : hf 14b write 2 15 11223344");
- PrintAndLog(" : hf 14b write 2 FF 11223344");
- return 0;
- }
+ char str[30];
+ memset(str, 0x00, sizeof(str));
+
+ if (strlen(Cmd) < 1 || cmdp == 'h' || cmdp == 'H') return usage_hf_14b_write_srx();
if ( cmdp == '2' )
isSrix4k = false;
//blockno = param_get8(Cmd, 1);
- if ( param_gethex(Cmd,1, &blockno, 2) ) {
+ if ( param_gethex(Cmd, 1, &blockno, 2) ) {
PrintAndLog("Block number must include 2 HEX symbols");
return 0;
}
return 0;
}
- if ( blockno == 0xff)
- PrintAndLog("[%s] Write special block %02X [ %s ]", (isSrix4k)?"SRIX4K":"SRI512" , blockno, sprint_hex(data,4) );
- else
- PrintAndLog("[%s] Write block %02X [ %s ]", (isSrix4k)?"SRIX4K":"SRI512", blockno, sprint_hex(data,4) );
-
- sprintf(str, "-c 09 %02x %02x%02x%02x%02x", blockno, data[0], data[1], data[2], data[3]);
-
+ if ( blockno == 0xff) {
+ PrintAndLog("[%s] Write special block %02X [ %s ]",
+ (isSrix4k) ? "SRIX4K":"SRI512",
+ blockno,
+ sprint_hex(data,4)
+ );
+ } else {
+ PrintAndLog("[%s] Write block %02X [ %s ]",
+ (isSrix4k) ? "SRIX4K":"SRI512",
+ blockno,
+ sprint_hex(data,4)
+ );
+ }
+
+ sprintf(str, "-ss -c %02x %02x %02x%02x%02x%02x", ISO14443B_WRITE_BLK, blockno, data[0], data[1], data[2], data[3]);
CmdHF14BCmdRaw(str);
return 0;
}
return 0;
}
+bool waitCmd(bool verbose) {
+
+ bool crc = FALSE;
+ uint8_t b1 = 0, b2 = 0;
+ uint8_t data[USB_CMD_DATA_SIZE] = {0x00};
+ uint8_t status = 0;
+ uint16_t len = 0;
+ UsbCommand resp;
+
+ if (WaitForResponseTimeout(CMD_ACK, &resp, 2000)) {
+
+ status = (resp.arg[0] & 0xFFFF);
+ if ( status > 0 ) return FALSE;
+
+ len = (resp.arg[1] & 0xFFFF);
+ memcpy(data, resp.d.asBytes, len);
+
+ if (verbose) {
+
+ ComputeCrc14443(CRC_14443_B, data, len-2, &b1, &b2);
+ crc = ( data[len-2] == b1 && data[len-1] == b2);
+
+ PrintAndLog("[LEN %u] %s[%02X %02X] %s",
+ len,
+ sprint_hex(data, len-2),
+ data[len-2],
+ data[len-1],
+ (crc) ? "OK" : "FAIL"
+ );
+ }
+ return TRUE;
+ } else {
+ PrintAndLog("timeout while waiting for reply.");
+ return FALSE;
+ }
+}
+
static command_t CommandTable[] = {
{"help", CmdHelp, 1, "This help"},
{"info", CmdHF14Binfo, 0, "Find and print details about a 14443B tag"},
{"list", CmdHF14BList, 0, "[Deprecated] List ISO 14443B history"},
+ {"raw", CmdHF14BCmdRaw, 0, "Send raw hex data to tag"},
{"reader", CmdHF14BReader, 0, "Act as a 14443B reader to identify a tag"},
{"sim", CmdHF14BSim, 0, "Fake ISO 14443B tag"},
{"snoop", CmdHF14BSnoop, 0, "Eavesdrop ISO 14443B"},
- {"sri512read", CmdSri512Read, 0, "Read contents of a SRI512 tag"},
- {"srix4kread", CmdSrix4kRead, 0, "Read contents of a SRIX4K tag"},
- {"sriwrite", CmdSriWrite, 0, "Write data to a SRI512 | SRIX4K tag"},
- {"raw", CmdHF14BCmdRaw, 0, "Send raw hex data to tag"},
+ {"sriread", CmdHF14BReadSri, 0, "Read contents of a SRI512 | SRIX4K tag"},
+ {"sriwrite", CmdHF14BWriteSri, 0, "Write data to a SRI512 | SRIX4K tag"},
//{"valid", srix4kValid, 1, "srix4k checksum test"},
- {"valid", CmdteaSelfTest, 1, "tea test"},
+ //{"valid", CmdteaSelfTest, 1, "tea test"},
{NULL, NULL, 0, NULL}
};
#ifndef CMDHF14B_H__
#define CMDHF14B_H__
+#include "iso14443crc.h"
+#include "proxmark3.h"
+#include "data.h"
+#include "graph.h"
+#include "util.h"
+#include "ui.h"
+#include "cmdparser.h"
+#include "cmdmain.h"
+#include "cmdhf14a.h"
+#include "tea.h"
+#include "cmdhf.h"
+#include "prng.h"
+#include "sha1.h"
+#include "mifare.h" // structs/enum for ISO14B
+#include "protocols.h" // definitions of ISO14B protocol
+
+
+int usage_hf_14b_info(void);
+int usage_hf_14b_reader(void);
+int usage_hf_14b_raw(void);
+int usage_hf_14b_snoop(void);
+int usage_hf_14b_sim(void);
+int usage_hf_14b_read_srx(void);
+int usage_hf_14b_write_srx(void);
+
int CmdHF14B(const char *Cmd);
int CmdHF14BList(const char *Cmd);
int CmdHF14BInfo(const char *Cmd);
int CmdHF14BSim(const char *Cmd);
int CmdHF14BSnoop(const char *Cmd);
-int CmdSri512Read(const char *Cmd);
-int CmdSrix4kRead(const char *Cmd);
int CmdHF14BWrite( const char *cmd);
-int HF14BInfo(bool verbose);
+int CmdHF14BReader(const char *Cmd);
+
+bool HF14BInfo(bool verbose);
+bool HF14BReader(bool verbose);
+int CmdHF14BCmdRaw (const char *Cmd);
+
+// SRi ST Microelectronics read/write
+int CmdHF14BReadSri(const char *Cmd);
+int CmdHF14BWriteSri(const char *Cmd);
+bool waitCmd(bool verbose);
#endif
// For the 13.56 MHz tags
#define CMD_ACQUIRE_RAW_ADC_SAMPLES_ISO_15693 0x0300
-#define CMD_READ_SRI512_TAG 0x0303
-#define CMD_READ_SRIX4K_TAG 0x0304
+#define CMD_READ_SRI_TAG 0x0303
#define CMD_ISO_14443B_COMMAND 0x0305
#define CMD_READER_ISO_15693 0x0310
#define CMD_SIMTAG_ISO_15693 0x0311
--// For the 13.56 MHz tags
CMD_ACQUIRE_RAW_ADC_SAMPLES_ISO_15693 = 0x0300,
- CMD_READ_SRI512_TAG = 0x0303,
- CMD_READ_SRIX4K_TAG = 0x0304,
+ CMD_READ_SRI_TAG = 0x0303,
CMD_ISO_14443B_COMMAND = 0x0305,
CMD_READER_ISO_15693 = 0x0310,
CMD_SIMTAG_ISO_15693 = 0x0311,
local data = self.data
local cmd = self.cmd
local arg1, arg2, arg3 = self.arg1, self.arg2, self.arg3
- return bin.pack("LLLLH",cmd, arg1, arg2, arg3, data);
+ return bin.pack("LLLLH", cmd, arg1, arg2, arg3, data);
end
return _commands
-
--[[
This is a library to read 14443b tags. It can be used something like this
-- Loads the commands-library
local cmds = require('commands')
local utils = require('utils')
-local TIMEOUT = 10000 -- Shouldn't take longer than 2 seconds
+local TIMEOUT = 4000
+local ISO14B_COMMAND = {
+ ISO14B_CONNECT = 1,
+ ISO14B_DISCONNECT = 2,
+ ISO14B_APDU = 4,
+ ISO14B_RAW = 8,
+ ISO14B_REQUEST_TRIGGER = 0x10,
+ ISO14B_APPEND_CRC = 0x20,
+ ISO14B_SELECT_STD = 0x40,
+ ISO14B_SELECT_SR = 0x80,
+}
-local function parse1443b_reqb(data)
+local function parse1443b(data)
--[[
- --]]
- local pcb = data:sub(1,2)
- local uid = data:sub(3,10)
- local pps = data:sub(11,18)
- local ats = data:sub(19,24)
- local crc = data:sub(25,29)
- return { pcb = pcb, uid = uid, pps = pps, ats = ats, crc = crc, cid = '' }
-end
+
+ Based on this struct :
+
+ typedef struct {
+ byte_t uid[10];
+ byte_t uidlen;
+ byte_t atqb[7];
+ byte_t chipid;
+ byte_t cid;
+ } __attribute__((__packed__)) iso14b_card_select_t;
-local function parse1443b_attrib(data)
- --[[
--]]
- local attrib = data:sub(1,2)
- local crc = data:sub(3,7)
- return { attrib = attrib, crc = crc }
+
+ local count, uid, uidlen, atqb, chipid, cid = bin.unpack('H10CH7CC',data)
+ uid = uid:sub(1,2*uidlen)
+ return { uid = uid, uidlen = uidlen, atqb = atqb, chipid = chipid, cid = cid }
end
-
--- Sends a USBpacket to the device
-- @param command - the usb packet to send
--- @param readresponse - if set to true, we read the device answer packet
+-- @param ignoreresponse - if set to true, we don't read the device answer packet
-- which is usually recipe for fail. If not sent, the host will wait 2s for a
-- response of type CMD_ACK
-- @return packet,nil if successfull
-- nil, errormessage if unsuccessfull
-local function sendToDevice(cmd, readresponse)
- core.clearCommandBuffer()
+local function sendToDevice(cmd, ignoreresponse)
+ --core.clearCommandBuffer()
+ local bytes = cmd:getBytes()
+ local count,c,arg0,arg1,arg2 = bin.unpack('LLLL',bytes)
local err = core.SendCommand(cmd:getBytes())
if err then
- print(err)
+ print('ERROR',err)
return nil, err
end
- if readresponse == 0 then return '',nil end
+ if ignoreresponse then return nil,nil end
+
local response = core.WaitForResponseTimeout(cmds.CMD_ACK, TIMEOUT)
- if response == nil then return nil, nil end
return response,nil
end
--- Picks out and displays the data read from a tag
-- @param usbpacket the data received from the device
local function showData(usbpacket)
local response = Command.parse(usbpacket)
- local len = tonumber(response.arg1) * 2
+ local len = response.arg2 * 2
local data = string.sub(response.data, 0, len);
print("<< ",data)
end
----
--- Sends a usbpackage , "hf 14b raw" and the 14bCrc is added to the rawdata before sending
-local function sendRaw(rawdata, readresponse, addcrc)
- -- add crc first
- local rawdata_crc = rawdata
- if ( addcrc == 1) then
- rawdata_crc = utils.Crc14b(rawdata)
- end
- print(">> ", rawdata_crc)
-
- local command = Command:new{cmd = cmds.CMD_ISO_14443B_COMMAND,
- arg1 = #rawdata_crc/2, -- LEN of data, which is half the length of the ASCII-string rawdata
- arg2 = readresponse, -- read response
- arg3 = 1, -- leave power on
- data = rawdata_crc} -- raw data bytes
- return sendToDevice(command, readresponse)
-end
-- This function does a connect and retrieves some info
-- @return if successfull: an table containing card info
-- @return if unsuccessfull : nil, error
+local function read14443b(disconnect)
--- void SendRawCommand14443B(uint32_t datalen, uint32_t recv, uint8_t powerfield, uint8_t data[])
-local function select1443b()
+ local command, result, info, err, data
- local result, infoReqb, infoAttrib, infoPong, err, resp, len, data
- local goodReqbResponse = false
- --REQB
- local p = 20
- while p > 0 do
- -- 05 00 08
- -- 05
- -- command (REQB/WUPB)
- -- 00
- -- AFI application family identifier ( 00 == all sorts)
- -- 08 (ie WUPB)
- -- bit 0-1-2 | N slots ( 0 = 1, 1 = 2, 2 = 4, 3 = 8, 4 == 16)
- -- bit 3 | (1== WUPB, 0 == REQB)
- -- bit 4-5-6-7 | AFI application family identifier
- local result, err = sendRaw('050008', 1, 1)
- if result then
- resp = Command.parse( result )
- len = tonumber(resp.arg1) * 2
- local data = string.sub(resp.data, 0, len)
- if ( resp.arg1 == 14 ) then
- --print ('DATA ::', data)
- infoReqb, err = parse1443b_reqb(data)
- --print(infoReqb.pcb, infoReqb.uid, infoReqb.pps, infoReqb.ats, infoReqb.crc)
- goodReqbResponse = true
- break -- break while loop. REQB got a good response
- end
- end
-
- -- send some strange 0A/0C
- -- if ( p < 3) then
- -- sendRaw('0A', 0, 0)
- -- sendRaw('0C', 0, 0)
- -- end
-
- p = p - 1
- print('retrying')
+ local flags = ISO14B_COMMAND.ISO14B_CONNECT +
+ ISO14B_COMMAND.ISO14B_SELECT_STD
+
+ if disconnect then
+ print('DISCONNECT')
+ flags = flags + ISO14B_COMMAND.ISO14B_DISCONNECT
end
- if goodReqbResponse == false then
- err = "No response from card"
- print(err)
- return nil, err
- end
- --SLOT MARKER
- -- result, err = sendRaw('05', 1, 1)
- -- if result then
- -- showData(result)
- -- resp = Command.parse( result )
- -- if arg1 == 0 then
- -- return nil, "iso14443b card - SLOT MARKER failed"
- -- end
- -- len = tonumber(resp.arg1) * 2
- -- data = string.sub(resp.data, 0, len)
- -- infoAttrib, err = parse1443b_attrib(data)
- -- print( infoAttrib.attrib, infoAttrib.crc)
- -- else
- -- err ="No response from card"
- -- print(err)
- -- return nil, err
- -- end
-
- --ATTRIB
- local cid = '00'
- result, err = sendRaw('1D'..infoReqb.uid..'000801'..cid, 1, 1)
+ command = Command:new{cmd = cmds.CMD_ISO_14443B_COMMAND, arg1 = flags}
+ local result,err = sendToDevice(command, false)
if result then
- showData(result)
- resp = Command.parse( result )
- if resp.arg1 == 0 then
- return nil, "iso14443b card - ATTRIB failed"
+ local count,cmd,arg0,arg1,arg2 = bin.unpack('LLLL',result)
+ if arg0 == 0 then
+ data = string.sub(result, count)
+ info, err = parse1443b(data)
+ else
+ err = "iso14443b card select failed"
end
- len = tonumber(resp.arg1) * 2
- data = string.sub(resp.data, 0, len)
- infoAttrib, err = parse1443b_attrib(data)
- infoReqb.cid = infoAttrib.attrib:sub(2,2)
- else
- err ="No response from card"
- print(err)
- return nil, err
- end
-
- --PING / PONG - Custom Anticollison for Navigo.
- local ping = ('BA00')
- result, err = sendRaw(ping, 1, 1)
- if result then
- resp = Command.parse( result )
- if arg1 == 0 then
- return nil, "iso14443b card - PING/PONG failed"
- end
- showData(result)
else
err = "No response from card"
+ end
+
+ if err then
print(err)
return nil, err
end
-
- return infoReqb
+ return info
end
+--PING / PONG - Custom Anticollison for Navigo.
+-- AA / BB ?!?
+-- local ping = ('BA00')
+-- result, err = sendRaw(ping, 1, 1)
+-- if result then
+ -- resp = Command.parse( result )
+ -- if arg1 == 0 then
+ -- return nil, "iso14443b card - PING/PONG failed"
+ -- end
+ -- showData(result)
+-- else
+ -- err = "No response from card"
+ -- print(err)
+ -- return nil, err
+-- end
+
---
-- Waits for a mifare card to be placed within the vicinity of the reader.
local function waitFor14443b()
print("Waiting for card... press any key to quit")
while not core.ukbhit() do
- res, err = select1443b()
+ res, err = read14443b(false)
if res then return res end
- if res == nil then return nil, err end
-- err means that there was no response from card
end
return nil, "Aborted by user"
end
-local function disconnect(uid)
-
- local halt = ('50'..uid) -- 50 UID0 UID1 UID2 UID3 CRC1 CRC2
- result, err = sendRaw(halt, 1, 1)
- if result then
- resp = Command.parse( result )
- showData(result) -- expected answer is 00 CRC1 CRC2
- else
- err = "No response from card"
- print(err)
- return nil, err
- end
-
- -- shutdown raw command / pm3 device.
- local command = Command:new{ cmd = cmds.CMD_ISO_14443B_COMMAND, arg1 = 0, arg2 = 0, arg3 = 0 }
- -- We can ignore the response here, no ACK is returned for this command
- -- Check /armsrc/iso14443b.c, SendRawCommand14443B() for details
- return sendToDevice(command, 0)
-end
-
local library = {
- select1443b = select1443b,
- select = select1443b,
+ parse1443b = parse1443b,
+ read1443b = read14443b,
waitFor14443b = waitFor14443b,
sendToDevice = sendToDevice,
- disconnect = disconnect,
- sendRaw = sendRaw,
showData = showData,
+ ISO14B_COMMAND = ISO14B_COMMAND,
}
return library
\ No newline at end of file
#endif
#define RAMFUNC __attribute((long_call, section(".ramfunc")))
-
#endif
ISO14A_TOPAZMODE = (1 << 8)
} iso14a_command_t;
+
+//-----------------------------------------------------------------------------
+// ISO 14443B
+//-----------------------------------------------------------------------------
+typedef struct {
+ byte_t uid[10];
+ byte_t uidlen;
+ byte_t atqb[7];
+ byte_t chipid;
+ byte_t cid;
+} __attribute__((__packed__)) iso14b_card_select_t;
+
+
+typedef enum ISO14B_COMMAND {
+ ISO14B_CONNECT = (1 << 0),
+ ISO14B_DISCONNECT = (1 << 1),
+ ISO14B_APDU = (1 << 2),
+ ISO14B_RAW = (1 << 3),
+ ISO14B_REQUEST_TRIGGER = (1 << 4),
+ ISO14B_APPEND_CRC = (1 << 5),
+ ISO14B_SELECT_STD = (1 << 6),
+ ISO14B_SELECT_SR = (1 << 7)
+} iso14b_command_t;
+
+
#endif // _MIFARE_H_
// For the 13.56 MHz tags
#define CMD_ACQUIRE_RAW_ADC_SAMPLES_ISO_15693 0x0300
-#define CMD_READ_SRI512_TAG 0x0303
-#define CMD_READ_SRIX4K_TAG 0x0304
+#define CMD_READ_SRI_TAG 0x0303
#define CMD_ISO_14443B_COMMAND 0x0305
#define CMD_READER_ISO_15693 0x0310
#define CMD_SIMTAG_ISO_15693 0x0311