mirror of
https://github.com/Proxmark/proxmark3.git
synced 2025-08-14 02:26:59 -07:00
Hitag fixes (#887)
* don't display error message during 'lf search' when no Hitag tag is present * remove superfluous options in 'lf hitag read' * fix setting of default threshold when selecting FPGA_CMD_SET_EDGE_DETECT_THRESHOLD major mode * some refactoring
This commit is contained in:
parent
e938f71011
commit
00848e096b
7 changed files with 66 additions and 56 deletions
|
@ -943,12 +943,12 @@ int CmdLFfind(const char *Cmd)
|
|||
PrintAndLog("\nValid EM4x05/EM4x69 Chip Found\nUse lf em 4x05readword/dump commands to read\n");
|
||||
return 1;
|
||||
}
|
||||
ans=CmdLFHitagReader("26"); // 26 = RHT2F_UID_ONLY
|
||||
if (ans==0) {
|
||||
if (getHitagUid(NULL, true)) {
|
||||
PrintAndLog("\nValid Hitag2 tag Found!");
|
||||
return 1;
|
||||
}
|
||||
ans=CmdCOTAGRead("");
|
||||
if (ans>0) {
|
||||
}
|
||||
ans = CmdCOTAGRead("");
|
||||
if (ans > 0) {
|
||||
PrintAndLog("\nValid COTAG ID Found!");
|
||||
return 1;
|
||||
}
|
||||
|
|
|
@ -70,7 +70,7 @@ static int CmdLFHitagList(const char *Cmd) {
|
|||
|
||||
for (;;) {
|
||||
|
||||
if(i > traceLen) { break; }
|
||||
if(i >= traceLen) { break; }
|
||||
|
||||
bool isResponse;
|
||||
int timestamp = *((uint32_t *)(got+i));
|
||||
|
@ -208,7 +208,7 @@ static int CmdLFHitagSim(const char *Cmd) {
|
|||
}
|
||||
|
||||
|
||||
static bool getHitagUid(uint32_t *uid) {
|
||||
bool getHitagUid(uint32_t *uid, bool quiet) {
|
||||
// ToDo: this is for Hitag2 only (??)
|
||||
|
||||
UsbCommand c = {CMD_READER_HITAG, {RHT2F_UID_ONLY}};
|
||||
|
@ -217,12 +217,12 @@ static bool getHitagUid(uint32_t *uid) {
|
|||
|
||||
UsbCommand resp;
|
||||
if (!WaitForResponseTimeout(CMD_ACK, &resp, 2500)) {
|
||||
PrintAndLogEx(WARNING, "timeout while waiting for reply.");
|
||||
if (!quiet) PrintAndLogEx(WARNING, "timeout while waiting for reply.");
|
||||
return false;
|
||||
}
|
||||
|
||||
if (resp.arg[0] == false) {
|
||||
PrintAndLogEx(DEBUG, "DEBUG: Error - failed getting UID");
|
||||
if (!quiet) PrintAndLogEx(DEBUG, "DEBUG: Error - failed getting UID");
|
||||
return false;
|
||||
}
|
||||
|
||||
|
@ -246,7 +246,7 @@ static int CmdLFHitagInfo(const char *Cmd) {
|
|||
|
||||
// read UID
|
||||
uint32_t uid = 0;
|
||||
if (getHitagUid(&uid) == false)
|
||||
if (getHitagUid(&uid, false) == false)
|
||||
return 1;
|
||||
|
||||
PrintAndLogEx(SUCCESS, "UID: %08X", uid);
|
||||
|
@ -271,32 +271,19 @@ int CmdLFHitagReader(const char *Cmd) {
|
|||
hitag_function htf = param_get32ex(Cmd, 0, 0, 10);
|
||||
|
||||
switch (htf) {
|
||||
case 01: { //RHTSF_CHALLENGE
|
||||
case RHTSF_CHALLENGE: {
|
||||
c = (UsbCommand){ CMD_READ_HITAG_S };
|
||||
num_to_bytes(param_get32ex(Cmd, 1, 0, 16), 4, htd->auth.NrAr);
|
||||
num_to_bytes(param_get32ex(Cmd, 2, 0, 16), 4, htd->auth.NrAr+4);
|
||||
c.arg[1] = param_get64ex(Cmd, 3, 0, 0); //firstpage
|
||||
c.arg[2] = param_get64ex(Cmd, 4, 0, 0); //tag mode
|
||||
} break;
|
||||
case 02: { //RHTSF_KEY
|
||||
case RHTSF_KEY: {
|
||||
c = (UsbCommand){ CMD_READ_HITAG_S };
|
||||
num_to_bytes(param_get64ex(Cmd, 1, 0, 16), 6, htd->crypto.key);
|
||||
c.arg[1] = param_get64ex(Cmd, 2, 0, 0); //firstpage
|
||||
c.arg[2] = param_get64ex(Cmd, 3, 0, 0); //tag mode
|
||||
} break;
|
||||
case 03: { //RHTSF_CHALLENGE BLOCK
|
||||
c = (UsbCommand){ CMD_READ_HITAG_S_BLK };
|
||||
num_to_bytes(param_get32ex(Cmd, 1, 0, 16), 4, htd->auth.NrAr);
|
||||
num_to_bytes(param_get32ex(Cmd, 2, 0, 16), 4, htd->auth.NrAr+4);
|
||||
c.arg[1] = param_get64ex(Cmd, 3, 0, 0); //firstpage
|
||||
c.arg[2] = param_get64ex(Cmd, 4, 0, 0); //tag mode
|
||||
} break;
|
||||
case 04: { //RHTSF_KEY BLOCK
|
||||
c = (UsbCommand){ CMD_READ_HITAG_S_BLK };
|
||||
num_to_bytes(param_get64ex(Cmd, 1, 0, 16), 6, htd->crypto.key);
|
||||
c.arg[1] = param_get64ex(Cmd, 2, 0, 0); //firstpage
|
||||
c.arg[2] = param_get64ex(Cmd, 3, 0, 0); //tag mode
|
||||
} break;
|
||||
case RHT2F_PASSWORD: {
|
||||
num_to_bytes(param_get32ex(Cmd, 1, 0, 16), 4, htd->pwd.password);
|
||||
} break;
|
||||
|
@ -322,8 +309,6 @@ int CmdLFHitagReader(const char *Cmd) {
|
|||
PrintAndLog(" HitagS (0*):");
|
||||
PrintAndLog(" 01 <nr> <ar> (Challenge) <firstPage> <tagmode> read all pages from a Hitag S tag");
|
||||
PrintAndLog(" 02 <key> (set to 0 if no authentication is needed) <firstPage> <tagmode> read all pages from a Hitag S tag");
|
||||
PrintAndLog(" 03 <nr> <ar> (Challenge) <firstPage> <tagmode> read all blocks from a Hitag S tag");
|
||||
PrintAndLog(" 04 <key> (set to 0 if no authentication is needed) <firstPage> <tagmode> read all blocks from a Hitag S tag");
|
||||
PrintAndLog(" Valid tagmodes are 0=STANDARD, 1=ADVANCED, 2=FAST_ADVANCED (default is ADVANCED)");
|
||||
PrintAndLog(" Hitag1 (1*):");
|
||||
PrintAndLog(" (not yet implemented)");
|
||||
|
@ -356,11 +341,11 @@ int CmdLFHitagReader(const char *Cmd) {
|
|||
return 1;
|
||||
}
|
||||
|
||||
uint32_t id = bytes_to_num(resp.d.asBytes,4);
|
||||
uint32_t id = bytes_to_num(resp.d.asBytes, 4);
|
||||
|
||||
if (htf == RHT2F_UID_ONLY){
|
||||
PrintAndLog("Valid Hitag2 tag found - UID: %08x",id);
|
||||
} else {
|
||||
PrintAndLog("Valid Hitag2 tag found - UID: %08x", id);
|
||||
if (htf != RHT2F_UID_ONLY) {
|
||||
PrintAndLogEx(SUCCESS, "Dumping tag memory...");
|
||||
char filename[256];
|
||||
FILE* pf = NULL;
|
||||
|
||||
|
|
|
@ -11,7 +11,11 @@
|
|||
#ifndef CMDLFHITAG_H__
|
||||
#define CMDLFHITAG_H__
|
||||
|
||||
#include <stdint.h>
|
||||
#include <stdbool.h>
|
||||
|
||||
extern int CmdLFHitag(const char *Cmd);
|
||||
extern int CmdLFHitagReader(const char *Cmd);
|
||||
extern bool getHitagUid(uint32_t *uid, bool quiet);
|
||||
|
||||
#endif
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue