RRG-Proxmark3/armsrc/em4x70.c

1677 lines
66 KiB
C

//-----------------------------------------------------------------------------
// Copyright (C) Proxmark3 contributors. See AUTHORS.md for details.
//
// This program is free software: you can redistribute it and/or modify
// it under the terms of the GNU General Public License as published by
// the Free Software Foundation, either version 3 of the License, or
// (at your option) any later version.
//
// This program is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
// GNU General Public License for more details.
//
// See LICENSE.txt for the text of the license.
//-----------------------------------------------------------------------------
// Low frequency EM4x70 commands
//-----------------------------------------------------------------------------
#include "fpgaloader.h"
#include "ticks.h"
#include "dbprint.h"
#include "lfadc.h"
#include "commonutil.h"
#include "optimized_cipherutils.h"
#include "em4x70.h"
#include "appmain.h" // tear
// Set debug level via client, e.g.: `hw dbg -4`
// For development, can force all the logging at compilation time by setting this to `true`
#define FORCE_ENABLE_LOGGING (false)
// Define debug macros that efficiently avoid formatting the strings
// if the debug level is not high enough. Avoids rewriting the same
// checks like `if (g_dbglevel >= DBG_ERROR)` throughout the code,
// improving readability. On the downside, it does require double-parentheses
// because of the limitations of the C preprocessor (until C23).
//
// Example usage:
// DPRINTF_ERROR(("Error: %d", error_code));
// DPRINTF_EXTENDED(("Bitstream: %s", bitstream_as_string));
#define DPRINTF_ALWAYS(x) do { Dbprintf x ; } while (0);
#define DPRINTF_ERROR(x) do { if ((FORCE_ENABLE_LOGGING) || (g_dbglevel >= DBG_ERROR )) { Dbprintf x ; } } while (0);
#define DPRINTF_INFO(x) do { if ((FORCE_ENABLE_LOGGING) || (g_dbglevel >= DBG_INFO )) { Dbprintf x ; } } while (0);
#define DPRINTF_DEBUG(x) do { if ((FORCE_ENABLE_LOGGING) || (g_dbglevel >= DBG_DEBUG )) { Dbprintf x ; } } while (0);
#define DPRINTF_EXTENDED(x) do { if ((FORCE_ENABLE_LOGGING) || (g_dbglevel >= DBG_EXTENDED)) { Dbprintf x ; } } while (0);
#define DPRINTF_PROLIX(x) do { if ((FORCE_ENABLE_LOGGING) || (g_dbglevel > DBG_EXTENDED)) { Dbprintf x ; } } while (0);
// EM4170 requires a parity bit on commands, other variants do not.
static bool g_deprecated_command_parity = false;
static em4x70_tag_t g_tag = { 0 };
#if 1 // Calculation of ticks for timing functions
// Nearly every calculation is done in terms of Field Codes (FC) aka RF periods
// 1 us = 1.5 ticks
// 1RF Period = 8us = 12 Ticks
#define TICKS_PER_FC 12
// Chip timing from datasheet
// Converted into Ticks for timing functions
#define EM4X70_T_TAG_QUARTER_PERIOD (8 * TICKS_PER_FC)
#define EM4X70_T_TAG_HALF_PERIOD (16 * TICKS_PER_FC)
#define EM4X70_T_TAG_THREE_QUARTER_PERIOD (24 * TICKS_PER_FC)
#define EM4X70_T_TAG_FULL_PERIOD (32 * TICKS_PER_FC) // 1 Bit Period
#define EM4X70_T_TAG_TWA (128 * TICKS_PER_FC) // Write Access Time
#define EM4X70_T_TAG_DIV (224 * TICKS_PER_FC) // Divergency Time
#define EM4X70_T_TAG_AUTH (4224 * TICKS_PER_FC) // Authentication Time
#define EM4X70_T_TAG_WEE (3072 * TICKS_PER_FC) // EEPROM write Time
#define EM4X70_T_TAG_TWALB (672 * TICKS_PER_FC) // Write Access Time of Lock Bits
#define EM4X70_T_TAG_BITMOD (4 * TICKS_PER_FC) // Initial time to stop modulation when sending 0
#define EM4X70_T_TAG_TOLERANCE (8 * TICKS_PER_FC) // Tolerance in RF periods for receive/LIW
#define EM4X70_T_TAG_TIMEOUT (4 * EM4X70_T_TAG_FULL_PERIOD) // Timeout if we ever get a pulse longer than this
#define EM4X70_T_DELAY_FROM_LIW_TO_RM (72 * TICKS_PER_FC) // Default delay from finding LIW until start sending RM bits
#define EM4X70_T_PULSES_TO_SEARCH_FOR_LIW 50 // Pulses to wait for listen window
#define EM4X70_T_PULSES_TO_SEARCH_FOR_HEADER_TRANSITION 16 // Read header length (16 bit periods), wait that many pulses to find transition from the 12x `1` to 4x `0`
#define EM4X70_COMMAND_LIW_SEARCH_RETRIES 5 // Attempts to send/read command
#define EM4X70_MAX_SEND_BITCOUNT 96u // Authentication == CMD(4) + NONCE(56) + DIVERGENCY(7) + FRND(28) == 6 + 56 + 35 == 56 + 41 == 95 bits (NOTE: RM(2) is handled as part of LIW detection)
#define EM4X70_MAX_RECEIVE_BITCOUNT 64u // Maximum bits to receive in response to any command (NOTE: This is EXCLUDING the 16-bit header of 0b1111'1111'1111'0000)
#endif // Calculation of ticks for timing functions
#if 1 // EM4x70 Command IDs and notes
/**
* These IDs are from the EM4170 datasheet.
* Some versions of the chip require a
* (even) parity bit, others do not.
* The command is thus stored only in the
* three least significant bits (mask 0x07).
*/
// // w/o parity with parity
#define EM4X70_COMMAND_ID 0x01 // 0b0001 --> 0b001'1
#define EM4X70_COMMAND_UM1 0x02 // 0b0010 --> 0b010'1
#define EM4X70_COMMAND_AUTH 0x03 // 0b0011 --> 0b011'0
#define EM4X70_COMMAND_PIN 0x04 // 0b0100 --> 0b100'1
#define EM4X70_COMMAND_WRITE 0x05 // 0b0101 --> 0b101'0
#define EM4X70_COMMAND_UM2 0x07 // 0b0111 --> 0b111'1
// Command behaviors and bit counts for each direction:
//
// The command IDs and behaviors are the same for both EM4170 and V4070/EM4070,
// However, V4070/EM4070 does not support sending a PIN, reading UM2, and WRITE
// is limited to block 0..9 (other blocks don't exist).
// NOTE: It's possible that original V4070/EM4070 tags may have been manufactured
// with all ten blocks being OTP (one-time-programmable)?
//
// There are only 6 commands in total.
// Each of the six commands has two variants (i.e., with and w/o command parity).
//
// Four of the commands send a predetermined bitstream, immediately synchronize
// on the tag sending the header, and then receive a number of bits from the tag:
//
// #define EM4X70_COMMAND_ID 0x01 // 0b0001 --> 0b001'1
// Tag: [LIW] [Header][ID31..ID0][LIW]
// Reader: [RM][Command]
// Bits Sent: RM + 4 bits
// Bits Recv: Header + 32 bits
//
// #define EM4X70_COMMAND_UM1 0x02 // 0b0010 --> 0b010'1
// Tag: [LIW] [Header][LB1, LB0, UM129..UM10][LIW]
// Reader: [RM][Command]
// Bits Sent: RM + 4 bits
// Bits Recv: Header + 32 bits
//
// #define EM4X70_COMMAND_UM2 0x07 // 0b0111 --> 0b111'1
// Tag: [LIW] [Header][UM263..UM20][LIW]
// Reader: [RM][Command]
// Bits Sent: RM + 4 bits
// Bits Recv: Header + 64 bits
//
// #define EM4X70_COMMAND_AUTH 0x03 // 0b0011 --> 0b011'0
// Tag: [LIW] [Header][g(RN)19..RN0][LIW]
// Reader: [RM][Command][N55..N0][0000000][f(RN)27..f(RN)0]
// Bits Sent: RM + 95 bits
// Bits Recv: Header + 20 bits
//
// The SEND_PIN command requires the tag ID to be retrieved first,
// then can sends a predetermined bitstream. Unlike the above, there
// is then a wait time before the tag sends a first ACK. Then a second
// wait time before synchronizing on the tag sending the header, and
// receive a number of bits from the tag:
//
// #define EM4X70_COMMAND_PIN 0x04 // 0b0100 --> 0b100'1
// Tag: [LIW] .. [ACK] .. [Header][ID31..ID0][LIW]
// Reader: [RM][Command][ID31..ID0][Pin31..Pin0] .. ..
// Bits Sent: RM + 68 bits
// Bits Recv: Header + 32 bits
//
// The WRITE command, given an address to write (A) and 16 bits of data (D),
// sends a predetermined bitstream. Unlike the four basic commands, there
// is then a wait time before the tag sends a first ACK, and then a second
// wait time before the tag sends a second ACK. No data is received from
// the tag ... just the two ACKs.
//
// #define EM4X70_COMMAND_WRITE 0x05 // 0b0101 --> 0b101'0
// Tag: [LIW] .. [ACK] .. [ACK][LIW]
// Reader: [RM][Command][A3..A0,Ap][Data5x5] .. ..
// Bits Sent: RM + 34 bits
// Bits Recv: !!!!!!!! NONE !!!!!!!!
//
// Thus, only need to define three sequences of interaction with the tag.
// Moreover, the reader can pre-generate its entire bitstream before any bits are sent.
// Validation of newly-written data depends on the block(s) written:
// * UM1 -- Read UM1 from the tag
// * ID -- Read ID from the tag
// * UM2 -- Read UM2 from the tag
// * KEY -- attempt authentication with the new key
// * PIN -- unlock the tag using the new PIN
// TODO: Determine if sending PIN will report success, even if the tag is already unlocked?
// Auto-detect tag variant and command parity?
// EM4070/V4070 does not contain UM2 or PIN, and UM1 may be OTP (one-time programmable)
// EM4170 added Pin and UM2, and UM1
//
// Thus, to check for overlap, need only check the first three commands with parity:
// | CMD | P? | Bits | Safe? | Overlaps With | Notes
// |-------|-----|----------|-------|------------------|------------
// | ID | No | `0b0001` | Yes | None! | Safe ... indicates no parity if successful
// | UM1 | No | `0b0010` | Yes | None! | Safe ... indicates no parity if successful
// | AUTH | No | `0b0011` | Yes | ID w/parity | cannot test for no-parity, but safe to try ID w/parity
// | WRITE | No | `0b0101` | NO | | DO NOT USE ... just in case
// | PIN | No | `0b0100` | N/A | | DO NOT USE ... just in case
// | UM2 | No | `0b0111` | Yes | None! | Safe ... indicates no parity AND EM4170 tag type
// | ID | Yes | `0b0011` | Yes | Auth w/o Parity | Safe to try ... indicates parity if successful
// | UM1 | Yes | `0b0101` | Yes | Write w/o Parity |
// | AUTH | Yes | `0b0110` | Yes | None! | Not testable
// | WRITE | Yes | `0b1010` | NO | None! | DO NOT USE ... just in case
// | PIN | Yes | `0b1001` | N/A | None! | DO NOT USE ... just in case
// | UM2 | Yes | `0b1111` | Yes | None! | Safe ... indicates parity AND EM4170 tag type
//
// Thus, the following sequence of commands should auto-detect both the type of tag,
// as well as whether it requires command parity or not:
// 1. If UM2 w/o parity -- If successful, command parity is NOT required, Type is EM4170
// 2. Elif UM2 with parity -- If successful, command parity IS required, Type is EM4170
// 3. Elif ID w/o parity -- If successful, command parity is NOT required, Type is EM4070/V4070
// 4. Elif ID with parity -- If successful, command parity IS required, Type is EM4070/V4070
// 5. Else -- Error ... no tag or other error?
#endif // EM4x70 Command IDs
// Constants used to determine high/low state of signal
#define EM4X70_NOISE_THRESHOLD 13 // May depend on noise in environment
#define HIGH_SIGNAL_THRESHOLD (127 + EM4X70_NOISE_THRESHOLD)
#define LOW_SIGNAL_THRESHOLD (127 - EM4X70_NOISE_THRESHOLD)
#define IS_HIGH(sample) (sample > LOW_SIGNAL_THRESHOLD ? true : false)
#define IS_LOW(sample) (sample < HIGH_SIGNAL_THRESHOLD ? true : false)
// Timing related macros
#define IS_TIMEOUT(timeout_ticks) (GetTicks() > timeout_ticks)
#define TICKS_ELAPSED(start_ticks) (GetTicks() - start_ticks)
static uint8_t encoded_bit_array_to_byte(const uint8_t *bits, int count_of_bits);
static void encoded_bit_array_to_bytes(const uint8_t *bits, int count_of_bits, uint8_t *out);
static int em4x70_receive(uint8_t *bits, size_t maximum_bits_to_read);
static bool find_listen_window(bool command);
static void init_tag(void) {
memset(g_tag.data, 0x00, sizeof(g_tag.data));
}
static void em4x70_setup_read(void) {
FpgaDownloadAndGo(FPGA_BITSTREAM_LF);
FpgaWriteConfWord(FPGA_MAJOR_MODE_LF_ADC | FPGA_LF_ADC_READER_FIELD);
// 50ms for the resonant antenna to settle.
SpinDelay(50);
// Now set up the SSC to get the ADC samples that are now streaming at us.
FpgaSetupSsc(FPGA_MAJOR_MODE_LF_READER);
FpgaSendCommand(FPGA_CMD_SET_DIVISOR, LF_DIVISOR_125);
// Connect the A/D to the peak-detected low-frequency path.
SetAdcMuxFor(GPIO_MUXSEL_LOPKD);
// Steal this pin from the SSP (SPI communication channel with fpga) and
// use it to control the modulation
AT91C_BASE_PIOA->PIO_PER = GPIO_SSC_DOUT;
AT91C_BASE_PIOA->PIO_OER = GPIO_SSC_DOUT;
// Disable modulation at default, which means enable the field
LOW(GPIO_SSC_DOUT);
// Start the timer
StartTicks();
// Watchdog hit
WDT_HIT();
}
static bool get_signalproperties(void) {
// Simple check to ensure we see a signal above the noise threshold
uint32_t no_periods = 32;
// wait until signal/noise > 1 (max. 32 periods)
for (int i = 0; i < EM4X70_T_TAG_FULL_PERIOD * no_periods; i++) {
// about 2 samples per bit period
WaitTicks(EM4X70_T_TAG_HALF_PERIOD);
if (AT91C_BASE_SSC->SSC_RHR > HIGH_SIGNAL_THRESHOLD) {
return true;
}
}
return false;
}
/**
* get_falling_pulse_length
*
* Returns time between falling edge pulse in ticks
*/
static uint32_t get_falling_pulse_length(void) {
uint32_t timeout = GetTicks() + EM4X70_T_TAG_TIMEOUT;
while (IS_HIGH(AT91C_BASE_SSC->SSC_RHR) && !IS_TIMEOUT(timeout));
if (IS_TIMEOUT(timeout))
return 0;
uint32_t start_ticks = GetTicks();
while (IS_LOW(AT91C_BASE_SSC->SSC_RHR) && !IS_TIMEOUT(timeout));
if (IS_TIMEOUT(timeout))
return 0;
while (IS_HIGH(AT91C_BASE_SSC->SSC_RHR) && !IS_TIMEOUT(timeout));
if (IS_TIMEOUT(timeout))
return 0;
return TICKS_ELAPSED(start_ticks);
}
/**
* get_rising_pulse_length
*
* Returns time between rising edge pulse in ticks
*/
static uint32_t get_rising_pulse_length(void) {
uint32_t timeout = GetTicks() + EM4X70_T_TAG_TIMEOUT;
while (IS_LOW(AT91C_BASE_SSC->SSC_RHR) && !IS_TIMEOUT(timeout));
if (IS_TIMEOUT(timeout))
return 0;
uint32_t start_ticks = GetTicks();
while (IS_HIGH(AT91C_BASE_SSC->SSC_RHR) && !IS_TIMEOUT(timeout));
if (IS_TIMEOUT(timeout))
return 0;
while (IS_LOW(AT91C_BASE_SSC->SSC_RHR) && !IS_TIMEOUT(timeout));
if (IS_TIMEOUT(timeout))
return 0;
return TICKS_ELAPSED(start_ticks);
}
static uint32_t get_pulse_length(edge_detection_t edge) {
if (edge == RISING_EDGE)
return get_rising_pulse_length();
else if (edge == FALLING_EDGE)
return get_falling_pulse_length();
return 0;
}
static bool check_pulse_length(uint32_t pulse_tick_length, uint32_t target_tick_length) {
// check if pulse tick length corresponds to target length (+/- tolerance)
return ((pulse_tick_length >= (target_tick_length - EM4X70_T_TAG_TOLERANCE)) &&
(pulse_tick_length <= (target_tick_length + EM4X70_T_TAG_TOLERANCE)));
}
#if 1 // brute force logging of sent buffer
// e.g., authenticate sends 93 bits (2x RM, 56x rnd, 7x div, 28x frnd) == 2+56+35 = 58+35 = 93
// NOTE: unlike the bitstream functions, the logs include sending of the two `RM` bits
#define EM4X70_MAX_LOG_BITS MAX(2u + EM4X70_MAX_SEND_BITCOUNT, 16u + EM4X70_MAX_RECEIVE_BITCOUNT)
typedef struct _em4x70_log_t {
uint32_t start_tick;
uint32_t end_tick;
uint32_t bits_used;
uint8_t bit[EM4X70_MAX_LOG_BITS]; // one bit per byte
} em4x70_sublog_t;
typedef struct _em4x70_transmit_log_t {
em4x70_sublog_t transmit;
em4x70_sublog_t receive;
} em4x70_transmitted_data_log_t;
em4x70_transmitted_data_log_t g_not_used_directly; // change to bigbuff allocation?
em4x70_transmitted_data_log_t *g_Log = &g_not_used_directly;
static void log_reset(void) {
if (g_Log != NULL) {
memset(g_Log, 0, sizeof(em4x70_transmitted_data_log_t));
}
}
static void log_dump_helper(em4x70_sublog_t *part, bool is_transmit) {
if (g_dbglevel >= DBG_INFO || FORCE_ENABLE_LOGGING) {
char const *const direction = is_transmit ? "sent >>>" : "recv <<<";
if (part->bits_used == 0) {
DPRINTF_EXTENDED(("%s: no data", direction));
} else {
char bitstring[EM4X70_MAX_LOG_BITS + 1];
memset(bitstring, 0, sizeof(bitstring));
for (int i = 0; i < part->bits_used; i++) {
bitstring[i] = part->bit[i] ? '1' : '0';
}
DPRINTF_EXTENDED((
"%s: [ %8d .. %8d ] ( %6d ) %2d bits: %s",
direction,
part->start_tick, part->end_tick,
part->end_tick - part->start_tick,
part->bits_used, bitstring
));
}
}
}
static void log_dump(void) {
if (g_dbglevel >= DBG_INFO || FORCE_ENABLE_LOGGING) {
bool hasContent = false;
if (g_Log != NULL) {
uint8_t *check_for_data = (uint8_t *)g_Log;
for (size_t i = 0; i < sizeof(em4x70_transmitted_data_log_t); ++i) {
if (check_for_data[i] != 0) {
hasContent = true;
break;
}
}
}
if (hasContent) {
log_dump_helper(&g_Log->transmit, true);
log_dump_helper(&g_Log->receive, false);
}
}
}
static void log_sent_bit(uint32_t start_tick, bool bit) {
if (g_Log != NULL) {
if (g_Log->transmit.bits_used == 0) {
g_Log->transmit.start_tick = start_tick;
}
g_Log->transmit.bit[g_Log->transmit.bits_used] = bit;
g_Log->transmit.bits_used++;
}
}
static void log_sent_bit_end(uint32_t end_tick) {
if (g_Log != NULL) {
g_Log->transmit.end_tick = end_tick;
}
}
static void log_received_bit_start(uint32_t start_tick) {
if (g_Log != NULL && g_Log->receive.start_tick == 0) {
g_Log->receive.start_tick = start_tick;
}
}
static void log_received_bit_end(uint32_t end_tick) {
if (g_Log != NULL) {
g_Log->receive.end_tick = end_tick;
}
}
static void log_received_bits(uint8_t *byte_per_bit_array, size_t array_element_count) {
if (g_Log != NULL) {
memcpy(&g_Log->receive.bit[g_Log->receive.bits_used], byte_per_bit_array, array_element_count);
g_Log->receive.bits_used += array_element_count;
}
}
#endif // brute force logging of sent buffer
// This is the only function that actually toggles modulation for sending bits
static void em4x70_send_bit(bool bit) {
// send single bit according to EM4170 application note and datasheet
uint32_t start_ticks = GetTicks();
log_sent_bit(start_ticks, bit);
if (bit == 0) {
// disable modulation (drop the field) n cycles of carrier
LOW(GPIO_SSC_DOUT);
while (TICKS_ELAPSED(start_ticks) <= EM4X70_T_TAG_BITMOD);
// enable modulation (activates the field) for remaining first
// half of bit period
HIGH(GPIO_SSC_DOUT);
while (TICKS_ELAPSED(start_ticks) <= EM4X70_T_TAG_HALF_PERIOD);
// disable modulation for second half of bit period
LOW(GPIO_SSC_DOUT);
while (TICKS_ELAPSED(start_ticks) <= EM4X70_T_TAG_FULL_PERIOD);
} else {
// bit = "1" means disable modulation for full bit period
LOW(GPIO_SSC_DOUT);
while (TICKS_ELAPSED(start_ticks) <= EM4X70_T_TAG_FULL_PERIOD);
}
log_sent_bit_end(GetTicks());
}
// TODO: Add similar function that will wait for an ACK/NAK up to a given timeout.
// This will allow for more flexibile handling of tag timing in the response.
static bool check_ack(void) {
// returns true if signal structue corresponds to ACK, anything else is
// counted as NAK (-> false)
// ACK 64 + 64
// NAK 64 + 48
if (check_pulse_length(get_pulse_length(FALLING_EDGE), 2 * EM4X70_T_TAG_FULL_PERIOD) &&
check_pulse_length(get_pulse_length(FALLING_EDGE), 2 * EM4X70_T_TAG_FULL_PERIOD)) {
// ACK
return true;
}
// Otherwise it was a NAK or Listen Window
return false;
}
#if 1 // #pragma region // Bitstream structures / enumerations
#define EM4X70_MAX_BITSTREAM_BITS MAX(EM4X70_MAX_SEND_BITCOUNT, EM4X70_MAX_RECEIVE_BITCOUNT)
// _Static_assert(EM4X70_MAX_SEND_BITCOUNT <= 255, "EM4X70_MAX_SEND_BITCOUNT must fit in uint8_t");
// _Static_assert(EM4X70_MAX_RECEIVE_BITCOUNT <= 255, "EM4X70_MAX_RECEIVE_BITCOUNT must fit in uint8_t");
typedef struct _em4x70_bitstream_t {
// For sending, this is the number of bits to send
// For receiving, this is the number of bits expected from tag
uint8_t bitcount;
// each bit is stored as a uint8_t, storing a single bit as 0 or 1
// this avoids bit-shifting in potentially timing-sensitive code,
// and ensures the simplest possible code for sending and receiving.
uint8_t one_bit_per_byte[EM4X70_MAX_BITSTREAM_BITS];
} em4x70_bitstream_t;
typedef struct _em4x70_command_bitstream {
uint8_t command; // three-bit value that is encoded as the command ... used to select function to handle sending/receiving data
em4x70_bitstream_t to_send;
em4x70_bitstream_t to_receive;
// Note: Bits are stored in reverse order from transmission
// As a result, the first bit from one_bit_per_byte[0]
// ends up as the least significant bit of the LAST
// byte written. E.g., if receiving 20 bit g(rn),
// converted_to_bytes[0] will have bits: GRN03..GRN00 0 0 0 0
// converted_to_bytes[1] will have bits: GRN11..GRN04
// converted_to_bytes[2] will have bits: GRN19..GRN12
// Which when treated as a 24-bit value stored little-endian, is:
// g(rn) << 8u
// This is based on how the existing code worked.
uint8_t received_data_converted_to_bytes[(EM4X70_MAX_BITSTREAM_BITS / 8) + (EM4X70_MAX_BITSTREAM_BITS % 8 ? 1 : 0)];
} em4x70_command_bitstream_t;
typedef bool (*bitstream_command_generator_id_t)(em4x70_command_bitstream_t *out_cmd_bitstream, bool with_command_parity);
typedef bool (*bitstream_command_generator_um1_t)(em4x70_command_bitstream_t *out_cmd_bitstream, bool with_command_parity);
typedef bool (*bitstream_command_generator_um2_t)(em4x70_command_bitstream_t *out_cmd_bitstream, bool with_command_parity);
typedef bool (*bitstream_command_generator_auth_t)(em4x70_command_bitstream_t *out_cmd_bitstream, bool with_command_parity, const uint8_t *rnd, const uint8_t *frnd);
typedef bool (*bitstream_command_generator_pin_t)(em4x70_command_bitstream_t *out_cmd_bitstream, bool with_command_parity, const uint8_t *tag_id, const uint32_t pin_little_endian);
typedef bool (*bitstream_command_generator_write_t)(em4x70_command_bitstream_t *out_cmd_bitstream, bool with_command_parity, uint16_t data_little_endian, uint8_t address);
typedef struct _em4x70_command_generators_t {
bitstream_command_generator_id_t id;
bitstream_command_generator_um1_t um1;
bitstream_command_generator_um2_t um2;
bitstream_command_generator_auth_t auth;
bitstream_command_generator_pin_t pin;
bitstream_command_generator_write_t write;
} em4x70_command_generators_t;
#endif // #pragma endregion // Bitstream structures / enumerations
#if 1 // #pragma region // Functions to dump bitstreams to debug output
static void bitstream_dump_helper(const em4x70_bitstream_t *bitstream, bool is_transmit) {
// mimic the log's output format to make comparisons easier
char const *const direction = is_transmit ? "sent >>>" : "recv <<<";
if (bitstream->bitcount == 0) {
if (g_dbglevel >= DBG_INFO || true) {
DPRINTF_EXTENDED(("%s: no data", direction));
}
} else if (bitstream->bitcount > 0xFEu) {
DPRINTF_ERROR(("INTERNAL ERROR: Too many bits to dump: %d", bitstream->bitcount));
} else {
char bitstring[EM4X70_MAX_BITSTREAM_BITS + 1];
memset(bitstring, 0, sizeof(bitstring));
for (uint16_t i = 0; i < bitstream->bitcount; ++i) {
bitstring[i] = bitstream->one_bit_per_byte[i] ? '1' : '0';
}
DPRINTF_EXTENDED((
"%s: [ %8d .. %8d ] ( %6d ) %2d bits: %s%s",
direction,
0, 0, 0,
bitstream->bitcount + (is_transmit ? 2u : 0u), // add the two RM bits to transmitted data
is_transmit ? "00" : "", // add the two RM bits to transmitted data
bitstring
));
}
}
static void bitstream_dump(const em4x70_command_bitstream_t *cmd_bitstream) {
bitstream_dump_helper(&cmd_bitstream->to_send, true);
bitstream_dump_helper(&cmd_bitstream->to_receive, false);
}
#endif // #pragma region // Functions to dump bitstreams to debug output
#if 1 // #pragma region // Functions to send bitstreams, with options to receive data
/// @brief Internal function to send a bitstream to the tag.
/// @details This function presumes a validated structure, and sends the bitstream without delays, to support timing-sensitive operations.
/// @param send The details on the bitstream to send to the tag.
/// @return
static bool send_bitstream_internal(const em4x70_bitstream_t *send) {
// similar to original send_command_and_read, but using provided bitstream
int retries = EM4X70_COMMAND_LIW_SEARCH_RETRIES; // only retries finding the LIW ... not the actual command
// TIMING SENSITIVE FUNCTION ... Minimize delays after finding the listen window
while (retries) {
const uint8_t *s = send->one_bit_per_byte;
uint8_t sent = 0;
retries--;
if (find_listen_window(true)) { // `true` will automatically send the two `RM` zero bits
// TIMING SENSITIVE SECTION
do {
em4x70_send_bit(*s);
s++;
sent++;
} while (sent < send->bitcount);
return true;
// TIMING SENSITIVE SECTION
}
}
return false;
}
/// @brief Internal function to send a bitstream to the tag, and immediately read response data.
/// @param send Bitstream to be sent to the tag
/// @param recv Buffer to store received data from the tag.
/// `recv->expected_bitcount` must be initialized to indicate expected bits to receive from the tag.
/// @return true only if the bitstream was sent and the expected count of bits were received from the tag.
static bool send_bitstream_and_read(em4x70_command_bitstream_t *command_bitstream) {
const em4x70_bitstream_t *send = &command_bitstream->to_send;
em4x70_bitstream_t *recv = &command_bitstream->to_receive;
// Validate the parameters before proceeding
bool parameters_valid = true;
uint8_t bits_to_decode;
do {
if (command_bitstream->command == 0) {
DPRINTF_ERROR(("No command specified -- coding error?"));
parameters_valid = false;
bits_to_decode = 0;
} else if (
(command_bitstream->command == EM4X70_COMMAND_ID) ||
(command_bitstream->command == EM4X70_COMMAND_UM1) ||
(command_bitstream->command == EM4X70_COMMAND_UM2) ||
(command_bitstream->command == EM4X70_COMMAND_AUTH)
) {
// These are the four commands that are supported by this function.
// Allow these to proceed.
} else {
DPRINTF_ERROR(("Unknown command: 0x%x (%d)", command_bitstream->command, command_bitstream->command));
parameters_valid = false;
bits_to_decode = 0;
}
if (send->bitcount == 0) {
DPRINTF_ERROR(("No bits to send -- coding error?"));
parameters_valid = false;
bits_to_decode = 0;
} else if (send->bitcount > EM4X70_MAX_SEND_BITCOUNT) {
DPRINTF_ERROR(("Too many bits to send -- coding error? %d", send->bitcount));
parameters_valid = false;
bits_to_decode = 0;
}
if (recv->bitcount == 0) {
DPRINTF_ERROR(("No bits to receive -- coding error?"));
parameters_valid = false;
bits_to_decode = 0;
} else if (recv->bitcount > EM4X70_MAX_RECEIVE_BITCOUNT) {
DPRINTF_ERROR(("Too many bits to receive -- coding error? %d", recv->bitcount));
parameters_valid = false;
bits_to_decode = 0;
} else if (recv->bitcount % 8u != 0u) {
// AUTH command receives 20 bits. Existing code treated this "as if" tag sent 24 bits.
// Keep this behavior to minimize the changes to both ARM and client code bases.
bits_to_decode = ((recv->bitcount / 8u) + 1u) * 8u; // round up to nearest byte multiple
// _Static_assert(EM4X70_MAX_RECEIVE_BITCOUNT <= (UINT8_MAX - (UINT8_MAX % 8u)), "EM4X70_MAX_RECEIVE_BITCOUNT too large to safely round up within a uint8_t?");
// No static assertion, so do this at runtime
if (bits_to_decode > EM4X70_MAX_RECEIVE_BITCOUNT) {
DPRINTF_ERROR(("Too many bits to decode after adjusting to nearest byte multiple -- coding error? %d --> %d (max %d)", recv->bitcount, bits_to_decode, EM4X70_MAX_RECEIVE_BITCOUNT));
parameters_valid = false;
} else {
DPRINTF_PROLIX(("Note: will receive %d bits, but decode as %d bits", recv->bitcount));
}
} else {
// Valid number of bits expected, and an integral multiple of 8 bits ... so decode exactly what was received
bits_to_decode = recv->bitcount;
}
} while (0);
// early return when parameter validation fails
if (!parameters_valid) {
return false;
}
// similar to original send_command_and_read, but using provided bitstream
int bits_received = 0;
// NOTE: reset of log does not track the time first bit is sent. That occurs
// when the first sent bit is recorded in the log.
log_reset();
// TIMING SENSITIVE SECTION
if (send_bitstream_internal(send)) {
bits_received = em4x70_receive(recv->one_bit_per_byte, recv->bitcount);
}
// END OF TIMING SENSITIVE SECTION
// Convert the received bits into byte array (bits are received in reverse order ... this simplifies reasoning / debugging)
bool result = (bits_received == recv->bitcount);
// output errors via debug prints and dump log as appropriate
encoded_bit_array_to_bytes(recv->one_bit_per_byte, bits_to_decode, command_bitstream->received_data_converted_to_bytes);
log_dump();
bitstream_dump(command_bitstream);
if (bits_received == 0) {
DPRINTF_INFO(("No bits received -- tag may not be present?"));
} else if (bits_received < recv->bitcount) {
DPRINTF_INFO(("Invalid data received length: %d, expected %d", bits_received, recv->bitcount));
} else if (bits_received != recv->bitcount) {
DPRINTF_INFO(("INTERNAL ERROR: Expected %d bits, received %d bits (more than maximum allowed)", recv->bitcount, bits_received));
}
// finally return the result of the operation
return result;
}
static bool send_bitstream_wait_ack_wait_read(em4x70_command_bitstream_t *command_bitstream) {
const em4x70_bitstream_t *send = &command_bitstream->to_send;
em4x70_bitstream_t *recv = &command_bitstream->to_receive;
// Validate the parameters before proceeding
bool parameters_valid = true;
do {
if (command_bitstream->command == 0) {
DPRINTF_ERROR(("No command specified -- coding error?"));
parameters_valid = false;
} else if (command_bitstream->command != EM4X70_COMMAND_PIN) {
DPRINTF_ERROR(("Unexpected command (only supports PIN): 0x%x (%d)", command_bitstream->command, command_bitstream->command));
parameters_valid = false;
}
if (send->bitcount == 0) {
DPRINTF_ERROR(("No bits to send -- coding error?"));
parameters_valid = false;
} else if (send->bitcount > EM4X70_MAX_SEND_BITCOUNT) {
DPRINTF_ERROR(("Too many bits to send -- coding error? %d", send->bitcount));
parameters_valid = false;
}
if (recv->bitcount == 0) {
DPRINTF_ERROR(("No bits to receive -- coding error?"));
parameters_valid = false;
} else if (recv->bitcount > EM4X70_MAX_RECEIVE_BITCOUNT) {
DPRINTF_ERROR(("Too many bits to receive -- coding error? %d", recv->bitcount));
parameters_valid = false;
} else if (recv->bitcount % 8u != 0u) {
DPRINTF_ERROR(("PIN must transmit multiple of 8 bits -- coding error?", recv->bitcount));
parameters_valid = false;
}
} while (0);
// early return when parameter validation fails
if (!parameters_valid) {
return false;
}
log_reset();
int bits_received = 0;
// TIMING SENSITIVE SECTION -- only debug output on unrecoverable errors
if (send_bitstream_internal(send)) {
// Wait TWALB (write access lock bits)
WaitTicks(EM4X70_T_TAG_TWALB);
// <-- Receive ACK
if (check_ack()) {
// <w> Writes Lock Bits
WaitTicks(EM4X70_T_TAG_WEE);
bits_received = em4x70_receive(recv->one_bit_per_byte, recv->bitcount);
if (bits_received != recv->bitcount) {
DPRINTF_INFO(("Invalid data received length: %d, expected %d", bits_received, recv->bitcount));
}
} else {
DPRINTF_INFO(("No ACK received after sending command"));
}
} else {
DPRINTF_INFO(("Failed to send command"));
}
// END TIMING SENSITIVE SECTION
// Convert the received bits into byte array (bits are received in reverse order ... this simplifies reasoning / debugging)
bool result = (bits_received == recv->bitcount);
// output errors via debug prints and dump log as appropriate
encoded_bit_array_to_bytes(recv->one_bit_per_byte, bits_received, command_bitstream->received_data_converted_to_bytes);
log_dump();
bitstream_dump(command_bitstream);
return result;
}
static bool send_bitstream_wait_ack_wait_ack(em4x70_command_bitstream_t *command_bitstream) {
const em4x70_bitstream_t *send = &command_bitstream->to_send;
em4x70_bitstream_t *recv = &command_bitstream->to_receive;
// Validate the parameters before proceeding
bool parameters_valid = true;
do {
if (command_bitstream->command == 0) {
DPRINTF_ERROR(("No command specified -- coding error?"));
parameters_valid = false;
} else if (command_bitstream->command != EM4X70_COMMAND_WRITE) {
DPRINTF_ERROR(("Unexpected command (only supports WRITE): 0x%x (%d)", command_bitstream->command, command_bitstream->command));
parameters_valid = false;
}
if (send->bitcount == 0) {
DPRINTF_ERROR(("No bits to send -- coding error?"));
parameters_valid = false;
} else if (send->bitcount > EM4X70_MAX_SEND_BITCOUNT) {
DPRINTF_ERROR(("Too many bits to send -- coding error? %d", send->bitcount));
parameters_valid = false;
}
if (recv->bitcount != 0) {
DPRINTF_ERROR(("Expecting to receive data (%d bits) -- coding error?", recv->bitcount));
parameters_valid = false;
}
} while (0);
// early return when parameter validation fails
if (!parameters_valid) {
DPRINTF_ERROR(("Parameter validation failed"));
return false;
}
bool result = false;
log_reset();
// TIMING SENSITIVE SECTION -- only debug output on unrecoverable errors
if (send_bitstream_internal(send)) {
// Wait TWA
WaitTicks(EM4X70_T_TAG_TWA);
// look for ACK sequence
if (check_ack()) {
// now EM4x70 needs EM4X70_T_TAG_TWEE (EEPROM write time)
// for saving data and should return with ACK
WaitTicks(EM4X70_T_TAG_WEE);
if (check_ack()) {
result = true;
} else {
DPRINTF_INFO(("No second ACK received after sending command"));
}
} else {
DPRINTF_INFO(("No ACK received after sending command"));
}
} else {
DPRINTF_INFO(("Failed to send command"));
}
// END TIMING SENSITIVE SECTION
log_dump();
bitstream_dump(command_bitstream);
return result;
}
#endif // #pragma region // Functions to send bitstreams, with options to receive data
#if 1 // #pragma region // Create bitstreams for each type of EM4x70 command
static bool add_bit_to_bitstream(em4x70_bitstream_t *s, bool b) {
uint8_t i = s->bitcount;
uint8_t bits_to_add = 1u;
if (i > EM4X70_MAX_BITSTREAM_BITS - bits_to_add) {
DPRINTF_ERROR(("Too many bits to add to bitstream: %d, %d", i, bits_to_add));
return false;
}
s->one_bit_per_byte[i] = b ? 1 : 0;
s->bitcount++;
return true;
}
static bool add_nibble_to_bitstream(em4x70_bitstream_t *s, uint8_t nibble, bool add_fifth_parity_bit) {
uint8_t i = s->bitcount;
uint8_t bits_to_add = add_fifth_parity_bit ? 5u : 4u;
if (i > EM4X70_MAX_BITSTREAM_BITS - bits_to_add) {
DPRINTF_ERROR(("Too many bits to add to bitstream: %d, %d", i, bits_to_add));
return false;
}
if ((nibble & 0xFu) != nibble) {
DPRINTF_ERROR(("Invalid nibble value: 0x%x", nibble));
return false;
}
// transmit the most significant bit first
s->one_bit_per_byte[i + 0] = nibble & 0x08u ? 1 : 0;
s->one_bit_per_byte[i + 1] = nibble & 0x04u ? 1 : 0;
s->one_bit_per_byte[i + 2] = nibble & 0x02u ? 1 : 0;
s->one_bit_per_byte[i + 3] = nibble & 0x01u ? 1 : 0;
// add parity if requested
if (add_fifth_parity_bit) {
static const uint16_t parity = 0x6996u; // 0b0110'1001'1001'0110 -- value at bit index defines parity bit for that nibble value
s->one_bit_per_byte[i + 4] = (parity & (1u << nibble)) == 0 ? 0 : 1;
}
s->bitcount += bits_to_add;
return true;
}
static bool add_byte_to_bitstream(em4x70_bitstream_t *s, uint8_t b) {
uint8_t i = s->bitcount;
uint8_t bits_to_add = 8u;
if (i > EM4X70_MAX_BITSTREAM_BITS - bits_to_add) {
DPRINTF_ERROR(("Too many bits to add to bitstream: %d, %d", i, bits_to_add));
return false;
}
// transmit the most significant bit first
s->one_bit_per_byte[i + 0] = b & 0x80u ? 1 : 0;
s->one_bit_per_byte[i + 1] = b & 0x40u ? 1 : 0;
s->one_bit_per_byte[i + 2] = b & 0x20u ? 1 : 0;
s->one_bit_per_byte[i + 3] = b & 0x10u ? 1 : 0;
s->one_bit_per_byte[i + 4] = b & 0x08u ? 1 : 0;
s->one_bit_per_byte[i + 5] = b & 0x04u ? 1 : 0;
s->one_bit_per_byte[i + 6] = b & 0x02u ? 1 : 0;
s->one_bit_per_byte[i + 7] = b & 0x01u ? 1 : 0;
s->bitcount += bits_to_add;
return true;
}
static bool create_legacy_em4x70_bitstream_for_cmd_id(em4x70_command_bitstream_t *out_cmd_bitstream, bool with_command_parity) {
const uint8_t expected_bits_to_send = 4u;
bool result = true;
memset(out_cmd_bitstream, 0, sizeof(em4x70_command_bitstream_t));
out_cmd_bitstream->command = EM4X70_COMMAND_ID;
uint8_t cmd = 0x3u; // CMD + Parity bit == 0b001'1
result = result && add_nibble_to_bitstream(&out_cmd_bitstream->to_send, cmd, false);
out_cmd_bitstream->to_receive.bitcount = 32;
if (out_cmd_bitstream->to_send.bitcount != expected_bits_to_send) {
DPRINTF_ERROR(("INTERNAL ERROR: Expected %d bits to be added to send buffer, but only %d bits were added", expected_bits_to_send, out_cmd_bitstream->to_send.bitcount));
result = false;
}
return result;
}
static bool create_legacy_em4x70_bitstream_for_cmd_um1(em4x70_command_bitstream_t *out_cmd_bitstream, bool with_command_parity) {
const uint8_t expected_bits_to_send = 4u;
bool result = true;
memset(out_cmd_bitstream, 0, sizeof(em4x70_command_bitstream_t));
out_cmd_bitstream->command = EM4X70_COMMAND_UM1;
uint8_t cmd = 0x5u; // CMD + Parity bit == 0b010'1
result = result && add_nibble_to_bitstream(&out_cmd_bitstream->to_send, cmd, false);
out_cmd_bitstream->to_receive.bitcount = 32;
if (out_cmd_bitstream->to_send.bitcount != expected_bits_to_send) {
DPRINTF_ERROR(("INTERNAL ERROR: Expected %d bits to be added to send buffer, but only %d bits were added", expected_bits_to_send, out_cmd_bitstream->to_send.bitcount));
result = false;
}
return result;
}
static bool create_legacy_em4x70_bitstream_for_cmd_um2(em4x70_command_bitstream_t *out_cmd_bitstream, bool with_command_parity) {
const uint8_t expected_bits_to_send = 4u;
bool result = true;
memset(out_cmd_bitstream, 0, sizeof(em4x70_command_bitstream_t));
out_cmd_bitstream->command = EM4X70_COMMAND_UM2;
uint8_t cmd = 0xFu; // CMD + Parity bit == 0b111'1
result = result && add_nibble_to_bitstream(&out_cmd_bitstream->to_send, cmd, false);
out_cmd_bitstream->to_receive.bitcount = 64;
if (out_cmd_bitstream->to_send.bitcount != expected_bits_to_send) {
DPRINTF_ERROR(("INTERNAL ERROR: Expected %d bits to be added to send buffer, but only %d bits were added", expected_bits_to_send, out_cmd_bitstream->to_send.bitcount));
result = false;
}
return true;
}
static bool create_legacy_em4x70_bitstream_for_cmd_auth(em4x70_command_bitstream_t *out_cmd_bitstream, bool with_command_parity, const uint8_t *rnd, const uint8_t *frnd) {
const uint8_t expected_bits_to_send = 95u;
bool result = true;
memset(out_cmd_bitstream, 0, sizeof(em4x70_command_bitstream_t));
out_cmd_bitstream->command = EM4X70_COMMAND_AUTH;
em4x70_bitstream_t *s = &out_cmd_bitstream->to_send;
uint8_t cmd = 0x6u; // CMD + Parity bit == 0b011'0
result = result && add_nibble_to_bitstream(s, cmd, false);
// Reader: [RM][0][Command][N55..N0][0000000][f(RN)27..f(RN)0]
//
// ----> HACK <----- : [ 0 ] == extra bit of zero (!?)
// Command is 4 bits : [ 1 .. 4 ] <---- HACK: Always sent with command parity
// N is 56 bits : [ 5 .. 60 ]
// 7 bits of 0 : [61 .. 67 ]
// f(RN) is 28 bits : [68 .. 95 ]
// Total bits to send: 96 bits (not the 95 bits that are actually expected)
// Fills in bits at indexes 5 .. 60
for (uint_fast8_t i = 0; i < 7; ++i) {
result = result && add_byte_to_bitstream(s, rnd[i]);
}
// Send seven diversity bits ... indexes 61 .. 67
for (uint_fast8_t i = 0; i < 7; ++i) {
result = result && add_bit_to_bitstream(s, 0);
}
// Send first 24 bit of f(RN) ... indexes 68 .. 91
for (uint_fast8_t i = 0; i < 3; ++i) {
result = result && add_byte_to_bitstream(s, frnd[i]);
}
// and send the final 4 bits of f(RN) ... indexes 92 .. 95
do {
uint8_t nibble = (frnd[3] >> 4u) & 0xFu;
result = result && add_nibble_to_bitstream(s, nibble, false);
} while (0);
out_cmd_bitstream->to_receive.bitcount = 20;
if (out_cmd_bitstream->to_send.bitcount != expected_bits_to_send) {
DPRINTF_ERROR(("INTERNAL ERROR: Expected %d bits to be added to send buffer, but only %d bits were added", expected_bits_to_send, out_cmd_bitstream->to_send.bitcount));
result = false;
}
return result;
}
static bool create_legacy_em4x70_bitstream_for_cmd_pin(em4x70_command_bitstream_t *out_cmd_bitstream, bool with_command_parity, const uint8_t *tag_id, const uint32_t pin) {
const uint8_t expected_bits_to_send = 68;
bool result = true;
memset(out_cmd_bitstream, 0, sizeof(em4x70_command_bitstream_t));
em4x70_bitstream_t *s = &out_cmd_bitstream->to_send;
out_cmd_bitstream->command = EM4X70_COMMAND_PIN;
uint8_t cmd = 0x9u; // CMD + Parity bit == 0b100'1
result = result && add_nibble_to_bitstream(s, cmd, false);
// Send tag's ID ... indexes 4 .. 35
// e.g., tag_id points to &tag.data[4] ... &tag.data[7]
for (uint_fast8_t i = 0; i < 4; i++) {
uint8_t b = tag_id[3 - i];
result = result && add_byte_to_bitstream(s, b);
}
// Send the PIN ... indexes 36 .. 67
for (uint_fast8_t i = 0; i < 4 ; i++) {
// BUGBUG ... Non-portable ... likely depends on little-endian vs. big-endian (presumes little-endian)
uint8_t b = (pin >> (i * 8u)) & 0xFFu;
result = result && add_byte_to_bitstream(s, b);
}
out_cmd_bitstream->to_receive.bitcount = 32;
if (out_cmd_bitstream->to_send.bitcount != expected_bits_to_send) {
DPRINTF_ERROR(("INTERNAL ERROR: Expected %d bits to be added to send buffer, but only %d bits were added", expected_bits_to_send, out_cmd_bitstream->to_send.bitcount));
result = false;
}
return result;
}
static bool create_legacy_em4x70_bitstream_for_cmd_write(em4x70_command_bitstream_t *out_cmd_bitstream, bool with_command_parity, uint16_t new_data, uint8_t address) {
const uint8_t expected_bits_to_send = 34u;
bool result = true;
memset(out_cmd_bitstream, 0, sizeof(em4x70_command_bitstream_t));
out_cmd_bitstream->command = EM4X70_COMMAND_WRITE;
em4x70_bitstream_t *s = &out_cmd_bitstream->to_send;
uint8_t cmd = 0xAu; // CMD + Parity bit == 0b101'0
result = result && add_nibble_to_bitstream(s, cmd, false);
if ((address & 0x0Fu) != address) {
// only lower 4 bits are valid for address
DPRINTF_ERROR(("Invalid address value: 0x%x", address));
result = false;
}
// Send address data with its even parity bit ... indexes 4 .. 8
result = result && add_nibble_to_bitstream(s, address, true);
// Split into nibbles ... Being explicit here because
// the client sent a uint16_t, but the order of the bytes
// is reversed relative to what is going to be sent.
// Thus, must swap the bytes before splitting into nibbles.
// TODO: Fix client and arm code to only use byte arrays.....
uint8_t nibbles[4] = {
(new_data >> 4) & 0xFu,
(new_data >> 0) & 0xFu,
(new_data >> 12) & 0xFu,
(new_data >> 8) & 0xFu,
};
// Send each of the four nibbles of data with their respective parity ... indexes 9 .. 28
uint8_t column_parity = 0;
for (uint_fast8_t i = 0; i < 4; ++i) {
uint8_t nibble = nibbles[i];
column_parity ^= nibble;
result = result && add_nibble_to_bitstream(s, nibble, true);
}
// add the column parity ... indexes 29 .. 32 ... but manually add zero as fifth bit (it's not a parity)
result = result && add_nibble_to_bitstream(s, column_parity, false);
result = result && add_bit_to_bitstream(s, 0);
out_cmd_bitstream->to_receive.bitcount = 0;
if (out_cmd_bitstream->to_send.bitcount != expected_bits_to_send) {
DPRINTF_ERROR(("INTERNAL ERROR: Expected %d bits to be added to send buffer, but only %d bits were added", expected_bits_to_send, out_cmd_bitstream->to_send.bitcount));
result = false;
}
return result;
}
const em4x70_command_generators_t legacy_em4x70_command_generators = {
.id = create_legacy_em4x70_bitstream_for_cmd_id,
.um1 = create_legacy_em4x70_bitstream_for_cmd_um1,
.um2 = create_legacy_em4x70_bitstream_for_cmd_um2,
.auth = create_legacy_em4x70_bitstream_for_cmd_auth,
.pin = create_legacy_em4x70_bitstream_for_cmd_pin,
.write = create_legacy_em4x70_bitstream_for_cmd_write
};
#endif // #pragma endregion // Create bitstreams for each type of EM4x70 command
// TODO: define and use structs for rnd, frnd, response
// Or, just use the structs defined by IDLIB48?
// log entry/exit point
static int authenticate(const uint8_t *rnd, const uint8_t *frnd, uint8_t *response) {
em4x70_command_bitstream_t auth_cmd;
const em4x70_command_generators_t *generator = &legacy_em4x70_command_generators;
generator->auth(&auth_cmd, g_deprecated_command_parity, rnd, frnd);
bool result = send_bitstream_and_read(&auth_cmd);
if (result) {
encoded_bit_array_to_bytes(auth_cmd.to_receive.one_bit_per_byte, 24, response);
}
return result ? PM3_SUCCESS : PM3_ESOFT;
}
// Sets one (reflected) byte and returns carry bit
// (1 if `value` parameter was greater than 0xFF)
static int set_byte(uint8_t *target, uint16_t value) {
int c = value > 0xFF ? 1 : 0; // be explicit about carry bit values
*target = reflect8(value);
return c;
}
static int bruteforce(const uint8_t address, const uint8_t *rnd, const uint8_t *frnd, uint16_t start_key, uint8_t *response) {
uint8_t auth_resp[3] = {0};
uint8_t rev_rnd[7];
uint8_t temp_rnd[7];
reverse_arraybytes_copy((uint8_t *)rnd, rev_rnd, sizeof(rev_rnd));
memcpy(temp_rnd, rnd, sizeof(temp_rnd));
for (int k = start_key; k <= 0xFFFF; ++k) {
int c = 0;
WDT_HIT();
uint16_t rev_k = reflect16(k);
switch (address) {
case 9:
c = set_byte(&temp_rnd[0], rev_rnd[0] + ((rev_k) & 0xFFu));
c = set_byte(&temp_rnd[1], rev_rnd[1] + c + ((rev_k >> 8) & 0xFFu));
c = set_byte(&temp_rnd[2], rev_rnd[2] + c);
c = set_byte(&temp_rnd[3], rev_rnd[3] + c);
c = set_byte(&temp_rnd[4], rev_rnd[4] + c);
c = set_byte(&temp_rnd[5], rev_rnd[5] + c);
set_byte(&temp_rnd[6], rev_rnd[6] + c);
break;
case 8:
c = set_byte(&temp_rnd[2], rev_rnd[2] + ((rev_k) & 0xFFu));
c = set_byte(&temp_rnd[3], rev_rnd[3] + c + ((rev_k >> 8) & 0xFFu));
c = set_byte(&temp_rnd[4], rev_rnd[4] + c);
c = set_byte(&temp_rnd[5], rev_rnd[5] + c);
set_byte(&temp_rnd[6], rev_rnd[6] + c);
break;
case 7:
c = set_byte(&temp_rnd[4], rev_rnd[4] + ((rev_k) & 0xFFu));
c = set_byte(&temp_rnd[5], rev_rnd[5] + c + ((rev_k >> 8) & 0xFFu));
set_byte(&temp_rnd[6], rev_rnd[6] + c);
break;
default:
DPRINTF_ERROR(("Bad block number given: %d", address));
return PM3_ESOFT;
}
// Report progress every 256 attempts
if ((k % 0x100) == 0) {
DPRINTF_ALWAYS(("Trying: %04X", k));
}
// Due to performance reason, we only try it once. Therefore you need a very stable RFID communcation.
if (authenticate(temp_rnd, frnd, auth_resp) == PM3_SUCCESS) {
DPRINTF_INFO(("Authentication success with rnd: %02X%02X%02X%02X%02X%02X%02X", temp_rnd[0], temp_rnd[1], temp_rnd[2], temp_rnd[3], temp_rnd[4], temp_rnd[5], temp_rnd[6]));
response[0] = (k >> 8) & 0xFF;
response[1] = k & 0xFF;
return PM3_SUCCESS;
}
if (BUTTON_PRESS() || data_available()) {
DPRINTF_ALWAYS(("EM4x70 Bruteforce Interrupted at key %04X", k));
return PM3_EOPABORTED;
}
}
return PM3_ESOFT;
}
// log entry/exit point
static int send_pin(const uint32_t pin) {
em4x70_command_bitstream_t send_pin_cmd;
const em4x70_command_generators_t *generator = &legacy_em4x70_command_generators;
generator->pin(&send_pin_cmd, g_deprecated_command_parity, &g_tag.data[4], pin);
bool result = send_bitstream_wait_ack_wait_read(&send_pin_cmd);
return result ? PM3_SUCCESS : PM3_ESOFT;
}
// log entry/exit point
static int write(const uint16_t word, const uint8_t address) {
em4x70_command_bitstream_t write_cmd;
const em4x70_command_generators_t *generator = &legacy_em4x70_command_generators;
generator->write(&write_cmd, g_deprecated_command_parity, word, address);
bool result = send_bitstream_wait_ack_wait_ack(&write_cmd);
if (!result) {
DPRINTF_INFO(("Failed to write data"));
}
return result ? PM3_SUCCESS : PM3_ESOFT;
}
static bool find_listen_window(bool command) {
int cnt = 0;
while (cnt < EM4X70_T_PULSES_TO_SEARCH_FOR_LIW) {
/*
80 ( 64 + 16 )
80 ( 64 + 16 )
Flip Polarity
96 ( 64 + 32 )
64 ( 32 + 16 +16 )*/
if (check_pulse_length(get_pulse_length(RISING_EDGE), (2 * EM4X70_T_TAG_FULL_PERIOD) + EM4X70_T_TAG_HALF_PERIOD) &&
check_pulse_length(get_pulse_length(RISING_EDGE), (2 * EM4X70_T_TAG_FULL_PERIOD) + EM4X70_T_TAG_HALF_PERIOD) &&
check_pulse_length(get_pulse_length(FALLING_EDGE), (2 * EM4X70_T_TAG_FULL_PERIOD) + EM4X70_T_TAG_FULL_PERIOD) &&
check_pulse_length(get_pulse_length(FALLING_EDGE), (1 * EM4X70_T_TAG_FULL_PERIOD) + EM4X70_T_TAG_FULL_PERIOD)) {
if (command) {
/* Here we are after the 64 duration edge.
* em4170 says we need to wait about 48 RF clock cycles.
* depends on the delay between tag and us
*
* I've found 32-40 field cycles works best
* Allow user adjustment in range: 24-48 field cycles?
* On PM3Easy I've seen success at 24..40 field
*/
WaitTicks(EM4X70_T_DELAY_FROM_LIW_TO_RM);
// Send RM Command
em4x70_send_bit(0);
em4x70_send_bit(0);
}
return true;
}
cnt++;
}
return false;
}
// *bits == array of bytes, each byte storing a single bit.
// *out == array of bytes, storing converted bits --> bytes.
//
// [in, bcount(count_of_bits) ] const uint8_t *bits
// [out, bcount(count_of_bits/8)] uint8_t *out
static void encoded_bit_array_to_bytes(const uint8_t *bits, int count_of_bits, uint8_t *out) {
if (count_of_bits % 8 != 0) {
DPRINTF_ERROR(("Should have a multiple of 8 bits, was sent %d", count_of_bits));
}
int num_bytes = count_of_bits / 8; // We should have a multiple of 8 here
for (int i = 1; i <= num_bytes; i++) {
out[num_bytes - i] = encoded_bit_array_to_byte(bits, 8);
bits += 8;
}
}
static uint8_t encoded_bit_array_to_byte(const uint8_t *bits, int count_of_bits) {
// converts <count_of_bits> separate bits into a single "byte"
uint8_t byte = 0;
for (int i = 0; i < count_of_bits; i++) {
byte <<= 1;
byte |= bits[i];
}
return byte;
}
/**
* em4x70_read_id
*
* read pre-programmed ID (4 bytes)
*/
static bool em4x70_read_id(void) {
em4x70_command_bitstream_t read_id_cmd;
const em4x70_command_generators_t *generator = &legacy_em4x70_command_generators;
generator->id(&read_id_cmd, g_deprecated_command_parity);
bool result = send_bitstream_and_read(&read_id_cmd);
if (result) {
encoded_bit_array_to_bytes(read_id_cmd.to_receive.one_bit_per_byte, read_id_cmd.to_receive.bitcount, &g_tag.data[4]);
}
return result;
}
/**
* em4x70_read_um1
*
* read user memory 1 (4 bytes including lock bits)
*/
static bool em4x70_read_um1(void) {
em4x70_command_bitstream_t read_um1_cmd;
const em4x70_command_generators_t *generator = &legacy_em4x70_command_generators;
generator->um1(&read_um1_cmd, g_deprecated_command_parity);
bool result = send_bitstream_and_read(&read_um1_cmd);
if (result) {
encoded_bit_array_to_bytes(read_um1_cmd.to_receive.one_bit_per_byte, read_um1_cmd.to_receive.bitcount, &g_tag.data[0]);
}
bitstream_dump(&read_um1_cmd);
return result;
}
/**
* em4x70_read_um2
*
* read user memory 2 (8 bytes)
*/
static bool em4x70_read_um2(void) {
em4x70_command_bitstream_t read_um2_cmd;
const em4x70_command_generators_t *generator = &legacy_em4x70_command_generators;
generator->um2(&read_um2_cmd, g_deprecated_command_parity);
bool result = send_bitstream_and_read(&read_um2_cmd);
if (result) {
encoded_bit_array_to_bytes(read_um2_cmd.to_receive.one_bit_per_byte, read_um2_cmd.to_receive.bitcount, &g_tag.data[24]);
}
bitstream_dump(&read_um2_cmd);
return result;
}
static bool find_em4x70_tag(void) {
// function is used to check whether a tag on the proxmark is an
// EM4x70 tag or not -> speed up "lf search" process
return find_listen_window(false);
}
// This is the ONLY function that receives data from the tag
static int em4x70_receive(uint8_t *bits, size_t maximum_bits_to_read) {
uint32_t pl;
int bit_pos = 0;
edge_detection_t edge = RISING_EDGE;
bool foundheader = false;
// Read out the header
// 12 Manchester 1's (may miss some during settle period)
// 4 Manchester 0's
// Skip about half of the leading 1's as signal could start off noisy
WaitTicks(6 * EM4X70_T_TAG_FULL_PERIOD);
// wait until we get the transition from 1's to 0's which is 1.5 full windows
for (int i = 0; i < EM4X70_T_PULSES_TO_SEARCH_FOR_HEADER_TRANSITION; i++) {
pl = get_pulse_length(edge);
if (check_pulse_length(pl, 3 * EM4X70_T_TAG_HALF_PERIOD)) {
foundheader = true;
break;
}
}
if (!foundheader) {
if (g_dbglevel >= DBG_EXTENDED) Dbprintf("Failed to find read header");
return 0;
}
// Skip next 3 0's, (the header check above consumed the first 0)
for (int i = 0; i < 3; i++) {
// If pulse length is not 1 bit, then abort early
if (!check_pulse_length(get_pulse_length(edge), EM4X70_T_TAG_FULL_PERIOD)) {
return 0;
}
}
log_received_bit_start(GetTicks());
// identify remaining bits based on pulse lengths
// between listen windows only pulse lengths of 1, 1.5 and 2 are possible
while (bit_pos < maximum_bits_to_read) {
pl = get_pulse_length(edge);
if (check_pulse_length(pl, EM4X70_T_TAG_FULL_PERIOD)) {
// pulse length 1 -> assign bit
bits[bit_pos++] = edge == FALLING_EDGE ? 1 : 0;
} else if (check_pulse_length(pl, 3 * EM4X70_T_TAG_HALF_PERIOD)) {
// pulse length 1.5 -> 2 bits + flip edge detection
if (edge == FALLING_EDGE) {
bits[bit_pos++] = 0;
if (bit_pos < maximum_bits_to_read) {
bits[bit_pos++] = 0;
}
edge = RISING_EDGE;
} else {
bits[bit_pos++] = 1;
if (bit_pos < maximum_bits_to_read) {
bits[bit_pos++] = 1;
}
edge = FALLING_EDGE;
}
} else if (check_pulse_length(pl, 2 * EM4X70_T_TAG_FULL_PERIOD)) {
// pulse length of 2 -> two bits
if (edge == FALLING_EDGE) {
bits[bit_pos++] = 0;
if (bit_pos < maximum_bits_to_read) {
bits[bit_pos++] = 1;
}
} else {
bits[bit_pos++] = 1;
if (bit_pos < maximum_bits_to_read) {
bits[bit_pos++] = 0;
}
}
} else {
// Listen Window, or invalid bit
break;
}
}
log_received_bit_end(GetTicks());
log_received_bits(bits, bit_pos);
return bit_pos;
}
// CLIENT ENTRY POINTS
void em4x70_info(const em4x70_data_t *etd, bool ledcontrol) {
bool success = false;
bool success_with_UM2 = false;
// Support tags with and without command parity bits
g_deprecated_command_parity = false;
init_tag();
em4x70_setup_read();
// Find the Tag
if (get_signalproperties() && find_em4x70_tag()) {
// Read ID and UM1 (both em4070 and em4170)
success = em4x70_read_id() && em4x70_read_um1();
// em4170 also has UM2, V4070 does not (e.g., 1998 Porsche Boxster)
success_with_UM2 = em4x70_read_um2();
}
StopTicks();
lf_finalize(ledcontrol);
int status = success ? PM3_SUCCESS : PM3_ESOFT;
size_t data_size =
success && success_with_UM2 ? 32 :
success ? 20 :
0;
// not returning the data to the client about actual length read?
reply_ng(CMD_LF_EM4X70_INFO, status, g_tag.data, data_size);
}
void em4x70_write(const em4x70_data_t *etd, bool ledcontrol) {
int status = PM3_ESOFT;
g_deprecated_command_parity = false;
// Disable to prevent sending corrupted data to the tag.
if (g_deprecated_command_parity) {
DPRINTF_ALWAYS(("Use of `--par` option with `lf em 4x70 write` is non-functional and may corrupt data on the tag."));
// reply_ng(CMD_LF_EM4X70_WRITE, PM3_ENOTIMPL, NULL, 0);
// return;
}
init_tag();
em4x70_setup_read();
// Find the Tag
if (get_signalproperties() && find_em4x70_tag()) {
// Write
status = write(etd->word, etd->address);
if (status == PM3_SUCCESS) {
// Read Tag after writing
if (em4x70_read_id()) {
em4x70_read_um1();
em4x70_read_um2();
}
}
}
StopTicks();
lf_finalize(ledcontrol);
reply_ng(CMD_LF_EM4X70_WRITE, status, g_tag.data, sizeof(g_tag.data));
}
void em4x70_unlock(const em4x70_data_t *etd, bool ledcontrol) {
int status = PM3_ESOFT;
g_deprecated_command_parity = false;
init_tag();
em4x70_setup_read();
// Find the Tag
if (get_signalproperties() && find_em4x70_tag()) {
// Read ID (required for send_pin command)
if (em4x70_read_id()) {
// Send PIN
status = send_pin(etd->pin);
// If the write succeeded, read the rest of the tag
if (status == PM3_SUCCESS) {
// Read Tag
// ID doesn't change
em4x70_read_um1();
em4x70_read_um2();
}
}
}
StopTicks();
lf_finalize(ledcontrol);
reply_ng(CMD_LF_EM4X70_UNLOCK, status, g_tag.data, sizeof(g_tag.data));
}
void em4x70_auth(const em4x70_data_t *etd, bool ledcontrol) {
int status = PM3_ESOFT;
uint8_t response[3] = {0};
g_deprecated_command_parity = false;
// Disable to prevent sending corrupted data to the tag.
if (g_deprecated_command_parity) {
DPRINTF_ALWAYS(("Use of `--par` option with `lf em 4x70 auth` is non-functional."));
// reply_ng(CMD_LF_EM4X70_WRITE, PM3_ENOTIMPL, NULL, 0);
// return;
}
init_tag();
em4x70_setup_read();
// Find the Tag
if (get_signalproperties() && find_em4x70_tag()) {
// Authenticate and get tag response
status = authenticate(etd->rnd, etd->frnd, response);
}
StopTicks();
lf_finalize(ledcontrol);
reply_ng(CMD_LF_EM4X70_AUTH, status, response, sizeof(response));
}
void em4x70_brute(const em4x70_data_t *etd, bool ledcontrol) {
int status = PM3_ESOFT;
uint8_t response[2] = {0};
g_deprecated_command_parity = false;
// Disable to prevent sending corrupted data to the tag.
if (g_deprecated_command_parity) {
DPRINTF_ALWAYS(("Use of `--par` option with `lf em 4x70 brute` is non-functional and may corrupt data on the tag."));
// reply_ng(CMD_LF_EM4X70_WRITE, PM3_ENOTIMPL, NULL, 0);
// return;
}
init_tag();
em4x70_setup_read();
// Find the Tag
if (get_signalproperties() && find_em4x70_tag()) {
// Bruteforce partial key
status = bruteforce(etd->address, etd->rnd, etd->frnd, etd->start_key, response);
}
StopTicks();
lf_finalize(ledcontrol);
reply_ng(CMD_LF_EM4X70_BRUTE, status, response, sizeof(response));
}
void em4x70_write_pin(const em4x70_data_t *etd, bool ledcontrol) {
int status = PM3_ESOFT;
g_deprecated_command_parity = false;
// Disable to prevent sending corrupted data to the tag.
if (g_deprecated_command_parity) {
DPRINTF_ALWAYS(("Use of `--par` option with `lf em 4x70 setpin` is non-functional and may corrupt data on the tag."));
// reply_ng(CMD_LF_EM4X70_WRITE, PM3_ENOTIMPL, NULL, 0);
// return;
}
init_tag();
em4x70_setup_read();
// Find the Tag
if (get_signalproperties() && find_em4x70_tag()) {
// Read ID (required for send_pin command)
if (em4x70_read_id()) {
// Write the pin
status = write((etd->pin) & 0xFFFF, EM4X70_PIN_WORD_UPPER);
if (status == PM3_SUCCESS) {
status = write((etd->pin >> 16) & 0xFFFF, EM4X70_PIN_WORD_LOWER);
}
if (status == PM3_SUCCESS) {
// Now Try to authenticate using the new PIN
// Send PIN
status = send_pin(etd->pin);
// If the write succeeded, read the rest of the tag
if (status == PM3_SUCCESS) {
// Read Tag
// ID doesn't change
em4x70_read_um1();
em4x70_read_um2();
}
}
}
}
StopTicks();
lf_finalize(ledcontrol);
reply_ng(CMD_LF_EM4X70_SETPIN, status, g_tag.data, sizeof(g_tag.data));
}
void em4x70_write_key(const em4x70_data_t *etd, bool ledcontrol) {
int status = PM3_ESOFT;
g_deprecated_command_parity = false;
// Disable to prevent sending corrupted data to the tag.
if (g_deprecated_command_parity) {
DPRINTF_ALWAYS(("Use of `--par` option with `lf em 4x70 setkey` is non-functional and may corrupt data on the tag."));
// reply_ng(CMD_LF_EM4X70_WRITE, PM3_ENOTIMPL, NULL, 0);
// return;
}
init_tag();
em4x70_setup_read();
// Find the Tag
if (get_signalproperties() && find_em4x70_tag()) {
// Read ID to ensure we can write to card
if (em4x70_read_id()) {
status = PM3_SUCCESS;
// Write each crypto block
for (int i = 0; i < 6; i++) {
uint16_t key_word = (etd->crypt_key[(i * 2) + 1] << 8) + etd->crypt_key[i * 2];
// Write each word, abort if any failure occurs
status = write(key_word, 9 - i);
if (status != PM3_SUCCESS) {
break;
}
}
// The client now has support for test authentication after
// writing a new key, thus allowing to verify that the new
// key was written correctly. This is what the datasheet
// suggests. Not currently implemented in the firmware.
// ID48LIB has no dependencies that would prevent this from
// being implemented directly within the firmware layer...
}
}
StopTicks();
lf_finalize(ledcontrol);
reply_ng(CMD_LF_EM4X70_SETKEY, status, g_tag.data, sizeof(g_tag.data));
}