mirror of
https://github.com/Proxmark/proxmark3.git
synced 2025-08-19 21:03:23 -07:00
iso14a reader patches [Hagen Fritsch]
This commit is contained in:
parent
7e758047e4
commit
534983d735
12 changed files with 255 additions and 95 deletions
|
@ -643,7 +643,7 @@ void UsbPacketReceived(uint8_t *packet, int len)
|
||||||
|
|
||||||
#ifdef WITH_ISO14443a
|
#ifdef WITH_ISO14443a
|
||||||
case CMD_READER_ISO_14443a:
|
case CMD_READER_ISO_14443a:
|
||||||
ReaderIso14443a(c->arg[0]);
|
ReaderIso14443a(c, &ack);
|
||||||
break;
|
break;
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
|
|
@ -99,7 +99,7 @@ void SnoopIso14443(void);
|
||||||
/// iso14443a.h
|
/// iso14443a.h
|
||||||
void SnoopIso14443a(void);
|
void SnoopIso14443a(void);
|
||||||
void SimulateIso14443aTag(int tagType, int TagUid); // ## simulate iso14443a tag
|
void SimulateIso14443aTag(int tagType, int TagUid); // ## simulate iso14443a tag
|
||||||
void ReaderIso14443a(uint32_t parameter);
|
void ReaderIso14443a(UsbCommand * c, UsbCommand * ack);
|
||||||
void ReaderMifare(uint32_t parameter);
|
void ReaderMifare(uint32_t parameter);
|
||||||
|
|
||||||
/// iso15693.h
|
/// iso15693.h
|
||||||
|
|
|
@ -1,5 +1,6 @@
|
||||||
//-----------------------------------------------------------------------------
|
//-----------------------------------------------------------------------------
|
||||||
// Gerhard de Koning Gans - May 2008
|
// Gerhard de Koning Gans - May 2008
|
||||||
|
// Hagen Fritsch - June 2010
|
||||||
//
|
//
|
||||||
// This code is licensed to you under the terms of the GNU GPL, version 2 or,
|
// This code is licensed to you under the terms of the GNU GPL, version 2 or,
|
||||||
// at your option, any later version. See the LICENSE.txt file for the text of
|
// at your option, any later version. See the LICENSE.txt file for the text of
|
||||||
|
@ -14,11 +15,13 @@
|
||||||
#include "string.h"
|
#include "string.h"
|
||||||
|
|
||||||
#include "iso14443crc.h"
|
#include "iso14443crc.h"
|
||||||
|
#include "iso14443a.h"
|
||||||
|
|
||||||
static uint8_t *trace = (uint8_t *) BigBuf;
|
static uint8_t *trace = (uint8_t *) BigBuf;
|
||||||
static int traceLen = 0;
|
static int traceLen = 0;
|
||||||
static int rsamples = 0;
|
static int rsamples = 0;
|
||||||
static int tracing = TRUE;
|
static int tracing = TRUE;
|
||||||
|
static uint32_t iso14a_timeout;
|
||||||
|
|
||||||
// CARD TO READER
|
// CARD TO READER
|
||||||
// Sequence D: 11110000 modulation with subcarrier during first half
|
// Sequence D: 11110000 modulation with subcarrier during first half
|
||||||
|
@ -61,6 +64,11 @@ static const uint8_t OddByteParity[256] = {
|
||||||
#define DMA_BUFFER_SIZE 4096
|
#define DMA_BUFFER_SIZE 4096
|
||||||
#define TRACE_LENGTH 3000
|
#define TRACE_LENGTH 3000
|
||||||
|
|
||||||
|
uint8_t trigger = 0;
|
||||||
|
void iso14a_set_trigger(int enable) {
|
||||||
|
trigger = enable;
|
||||||
|
}
|
||||||
|
|
||||||
//-----------------------------------------------------------------------------
|
//-----------------------------------------------------------------------------
|
||||||
// Generate the parity value for a byte sequence
|
// Generate the parity value for a byte sequence
|
||||||
//
|
//
|
||||||
|
@ -78,7 +86,7 @@ uint32_t GetParity(const uint8_t * pbtCmd, int iLen)
|
||||||
return dwPar;
|
return dwPar;
|
||||||
}
|
}
|
||||||
|
|
||||||
static void AppendCrc14443a(uint8_t* data, int len)
|
void AppendCrc14443a(uint8_t* data, int len)
|
||||||
{
|
{
|
||||||
ComputeCrc14443(CRC_14443_A,data,len,data+len,data+len+1);
|
ComputeCrc14443(CRC_14443_A,data,len,data+len,data+len+1);
|
||||||
}
|
}
|
||||||
|
@ -454,6 +462,7 @@ static int ManchesterDecoding(int v)
|
||||||
Demod.parityBits = 0;
|
Demod.parityBits = 0;
|
||||||
Demod.samples = 0;
|
Demod.samples = 0;
|
||||||
if(Demod.posCount) {
|
if(Demod.posCount) {
|
||||||
|
if(trigger) LED_A_OFF();
|
||||||
switch(Demod.syncBit) {
|
switch(Demod.syncBit) {
|
||||||
case 0x08: Demod.samples = 3; break;
|
case 0x08: Demod.samples = 3; break;
|
||||||
case 0x04: Demod.samples = 2; break;
|
case 0x04: Demod.samples = 2; break;
|
||||||
|
@ -1411,7 +1420,7 @@ static int GetIso14443aAnswerFromTag(uint8_t *receivedResponse, int maxLen, int
|
||||||
if (elapsed) (*elapsed)++;
|
if (elapsed) (*elapsed)++;
|
||||||
}
|
}
|
||||||
if(AT91C_BASE_SSC->SSC_SR & (AT91C_SSC_RXRDY)) {
|
if(AT91C_BASE_SSC->SSC_SR & (AT91C_SSC_RXRDY)) {
|
||||||
if(c < 2048) { c++; } else { return FALSE; }
|
if(c < iso14a_timeout) { c++; } else { return FALSE; }
|
||||||
b = (uint8_t)AT91C_BASE_SSC->SSC_RHR;
|
b = (uint8_t)AT91C_BASE_SSC->SSC_RHR;
|
||||||
if(ManchesterDecoding((b>>4) & 0xf)) {
|
if(ManchesterDecoding((b>>4) & 0xf)) {
|
||||||
*samples = ((c - 1) << 3) + 4;
|
*samples = ((c - 1) << 3) + 4;
|
||||||
|
@ -1450,6 +1459,8 @@ void ReaderTransmitPar(uint8_t* frame, int len, uint32_t par)
|
||||||
|
|
||||||
// Select the card
|
// Select the card
|
||||||
TransmitFor14443a(ToSend, ToSendMax, &samples, &wait);
|
TransmitFor14443a(ToSend, ToSendMax, &samples, &wait);
|
||||||
|
if(trigger)
|
||||||
|
LED_A_ON();
|
||||||
|
|
||||||
// Store reader command in buffer
|
// Store reader command in buffer
|
||||||
if (tracing) LogTrace(frame,len,0,par,TRUE);
|
if (tracing) LogTrace(frame,len,0,par,TRUE);
|
||||||
|
@ -1472,62 +1483,72 @@ int ReaderReceive(uint8_t* receivedAnswer)
|
||||||
}
|
}
|
||||||
|
|
||||||
/* performs iso14443a anticolision procedure
|
/* performs iso14443a anticolision procedure
|
||||||
* fills the uid pointer */
|
* fills the uid pointer unless NULL
|
||||||
int iso14443a_select_card(uint8_t * uid_ptr) {
|
* fills resp_data unless NULL */
|
||||||
|
int iso14443a_select_card(uint8_t * uid_ptr, iso14a_card_select_t * resp_data) {
|
||||||
uint8_t wupa[] = { 0x52 };
|
uint8_t wupa[] = { 0x52 };
|
||||||
uint8_t sel_all[] = { 0x93,0x20 };
|
uint8_t sel_all[] = { 0x93,0x20 };
|
||||||
uint8_t sel_uid[] = { 0x93,0x70,0x00,0x00,0x00,0x00,0x00,0x00,0x00 };
|
uint8_t sel_uid[] = { 0x93,0x70,0x00,0x00,0x00,0x00,0x00,0x00,0x00 };
|
||||||
uint8_t sel_all_c2[] = { 0x95,0x20 };
|
|
||||||
uint8_t sel_uid_c2[] = { 0x95,0x70,0x00,0x00,0x00,0x00,0x00,0x00,0x00 };
|
|
||||||
uint8_t rats[] = { 0xE0,0x80,0x00,0x00 }; // FSD=256, FSDI=8, CID=0
|
uint8_t rats[] = { 0xE0,0x80,0x00,0x00 }; // FSD=256, FSDI=8, CID=0
|
||||||
|
|
||||||
uint8_t* resp = (((uint8_t *)BigBuf) + 3560); // was 3560 - tied to other size changes
|
uint8_t* resp = (((uint8_t *)BigBuf) + 3560); // was 3560 - tied to other size changes
|
||||||
uint8_t* uid = resp + 7;
|
uint8_t* uid = resp + 7;
|
||||||
|
|
||||||
|
uint8_t sak = 0x04; // cascade uid
|
||||||
|
int cascade_level = 0;
|
||||||
|
|
||||||
int len;
|
int len;
|
||||||
|
|
||||||
// Broadcast for a card, WUPA (0x52) will force response from all cards in the field
|
// Broadcast for a card, WUPA (0x52) will force response from all cards in the field
|
||||||
ReaderTransmitShort(wupa);
|
ReaderTransmitShort(wupa);
|
||||||
// Receive the ATQA
|
// Receive the ATQA
|
||||||
if(!ReaderReceive(resp)) return 0;
|
if(!ReaderReceive(resp)) return 0;
|
||||||
// if(*(uint16_t *) resp == 0x4403) MIFARE_CLASSIC
|
|
||||||
// if(*(uint16_t *) resp == 0x0400) MIFARE_DESFIRE
|
|
||||||
|
|
||||||
ReaderTransmit(sel_all,sizeof(sel_all)); // SELECT_ALL
|
if(resp_data)
|
||||||
|
memcpy(resp_data->atqa, resp, 2);
|
||||||
|
|
||||||
|
ReaderTransmit(sel_all,sizeof(sel_all));
|
||||||
if(!ReaderReceive(uid)) return 0;
|
if(!ReaderReceive(uid)) return 0;
|
||||||
|
|
||||||
// Construct SELECT UID command
|
// OK we will select at least at cascade 1, lets see if first byte of UID was 0x88 in
|
||||||
// First copy the 5 bytes (Mifare Classic) after the 93 70
|
|
||||||
memcpy(sel_uid+2,uid,5);
|
|
||||||
// Secondly compute the two CRC bytes at the end
|
|
||||||
AppendCrc14443a(sel_uid,7);
|
|
||||||
|
|
||||||
ReaderTransmit(sel_uid,sizeof(sel_uid));
|
|
||||||
// Receive the SAK
|
|
||||||
if (!ReaderReceive(resp)) return 0;
|
|
||||||
|
|
||||||
// OK we have selected at least at cascade 1, lets see if first byte of UID was 0x88 in
|
|
||||||
// which case we need to make a cascade 2 request and select - this is a long UID
|
// which case we need to make a cascade 2 request and select - this is a long UID
|
||||||
// When the UID is not complete, the 3nd bit (from the right) is set in the SAK.
|
// While the UID is not complete, the 3nd bit (from the right) is set in the SAK.
|
||||||
if (resp[0] &= 0x04)
|
for(; sak & 0x04; cascade_level++)
|
||||||
{
|
{
|
||||||
ReaderTransmit(sel_all_c2,sizeof(sel_all_c2));
|
// SELECT_* (L1: 0x93, L2: 0x95, L3: 0x97)
|
||||||
if (!ReaderReceive(uid+5)) return 0;
|
sel_uid[0] = sel_all[0] = 0x93 + cascade_level * 2;
|
||||||
|
|
||||||
|
// SELECT_ALL
|
||||||
|
ReaderTransmit(sel_all,sizeof(sel_all));
|
||||||
|
if (!ReaderReceive(resp)) return 0;
|
||||||
|
if(uid_ptr) memcpy(uid_ptr + cascade_level*4, resp, 4);
|
||||||
|
|
||||||
// Construct SELECT UID command
|
// Construct SELECT UID command
|
||||||
memcpy(sel_uid_c2+2,uid+5,5);
|
memcpy(sel_uid+2,resp,5);
|
||||||
AppendCrc14443a(sel_uid_c2,7);
|
AppendCrc14443a(sel_uid,7);
|
||||||
ReaderTransmit(sel_uid_c2,sizeof(sel_uid_c2));
|
ReaderTransmit(sel_uid,sizeof(sel_uid));
|
||||||
|
|
||||||
// Receive the SAK
|
// Receive the SAK
|
||||||
if (!ReaderReceive(resp)) return 0;
|
if (!ReaderReceive(resp)) return 0;
|
||||||
|
sak = resp[0];
|
||||||
}
|
}
|
||||||
if(uid_ptr) memcpy(uid_ptr, uid, 10);
|
if(resp_data) {
|
||||||
if( (resp[0] & 0x20) == 0)
|
resp_data->sak = sak;
|
||||||
|
resp_data->ats_len = 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
if( (sak & 0x20) == 0)
|
||||||
return 2; // non iso14443a compliant tag
|
return 2; // non iso14443a compliant tag
|
||||||
|
|
||||||
// Request for answer to select
|
// Request for answer to select
|
||||||
AppendCrc14443a(rats, 2);
|
AppendCrc14443a(rats, 2);
|
||||||
ReaderTransmit(rats, sizeof(rats));
|
ReaderTransmit(rats, sizeof(rats));
|
||||||
if (!(len = ReaderReceive(resp))) return 0;
|
if (!(len = ReaderReceive(resp))) return 0;
|
||||||
|
if(resp_data) {
|
||||||
|
memcpy(resp_data->ats, resp, sizeof(resp_data->ats));
|
||||||
|
resp_data->ats_len = len;
|
||||||
|
}
|
||||||
|
|
||||||
return 1;
|
return 1;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -1547,52 +1568,75 @@ void iso14443a_setup() {
|
||||||
LED_D_ON();
|
LED_D_ON();
|
||||||
FpgaWriteConfWord(FPGA_MAJOR_MODE_HF_ISO14443A | FPGA_HF_ISO14443A_READER_MOD);
|
FpgaWriteConfWord(FPGA_MAJOR_MODE_HF_ISO14443A | FPGA_HF_ISO14443A_READER_MOD);
|
||||||
SpinDelay(200);
|
SpinDelay(200);
|
||||||
|
|
||||||
|
iso14a_timeout = 2048; //default
|
||||||
}
|
}
|
||||||
|
|
||||||
|
int iso14_apdu(uint8_t * cmd, size_t cmd_len, void * data) {
|
||||||
|
uint8_t real_cmd[cmd_len+4];
|
||||||
|
real_cmd[0] = 0x0a; //I-Block
|
||||||
|
real_cmd[1] = 0x00; //CID: 0 //FIXME: allow multiple selected cards
|
||||||
|
memcpy(real_cmd+2, cmd, cmd_len);
|
||||||
|
AppendCrc14443a(real_cmd,cmd_len+2);
|
||||||
|
|
||||||
|
ReaderTransmit(real_cmd, cmd_len+4);
|
||||||
|
size_t len = ReaderReceive(data);
|
||||||
|
if(!len)
|
||||||
|
return -1; //DATA LINK ERROR
|
||||||
|
|
||||||
|
return len;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
//-----------------------------------------------------------------------------
|
//-----------------------------------------------------------------------------
|
||||||
// Read an ISO 14443a tag. Send out commands and store answers.
|
// Read an ISO 14443a tag. Send out commands and store answers.
|
||||||
//
|
//
|
||||||
//-----------------------------------------------------------------------------
|
//-----------------------------------------------------------------------------
|
||||||
void ReaderIso14443a(uint32_t parameter)
|
void ReaderIso14443a(UsbCommand * c, UsbCommand * ack)
|
||||||
{
|
{
|
||||||
|
iso14a_command_t param = c->arg[0];
|
||||||
|
uint8_t * cmd = c->d.asBytes;
|
||||||
|
size_t len = c->arg[1];
|
||||||
|
|
||||||
// Mifare AUTH
|
if(param & ISO14A_REQUEST_TRIGGER) iso14a_set_trigger(1);
|
||||||
uint8_t mf_auth[] = { 0x60,0x00,0xf5,0x7b };
|
|
||||||
// uint8_t mf_nr_ar[] = { 0x00,0x00,0x00,0x00 };
|
|
||||||
|
|
||||||
uint8_t* receivedAnswer = (((uint8_t *)BigBuf) + 3560); // was 3560 - tied to other size changes
|
|
||||||
traceLen = 0;
|
|
||||||
|
|
||||||
|
if(param & ISO14A_CONNECT) {
|
||||||
iso14443a_setup();
|
iso14443a_setup();
|
||||||
|
ack->arg[0] = iso14443a_select_card(ack->d.asBytes, (iso14a_card_select_t *) (ack->d.asBytes+12));
|
||||||
LED_A_ON();
|
UsbSendPacket((void *)ack, sizeof(UsbCommand));
|
||||||
LED_B_OFF();
|
|
||||||
LED_C_OFF();
|
|
||||||
|
|
||||||
while(traceLen < TRACE_LENGTH)
|
|
||||||
{
|
|
||||||
// Test if the action was cancelled
|
|
||||||
if(BUTTON_PRESS()) break;
|
|
||||||
|
|
||||||
if(!iso14443a_select_card(NULL)) {
|
|
||||||
DbpString("iso14443a setup failed");
|
|
||||||
break;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// Transmit MIFARE_CLASSIC_AUTH
|
if(param & ISO14A_SET_TIMEOUT) {
|
||||||
ReaderTransmit(mf_auth,sizeof(mf_auth));
|
iso14a_timeout = c->arg[2];
|
||||||
|
|
||||||
// Receive the (16 bit) "random" nonce
|
|
||||||
if (!ReaderReceive(receivedAnswer)) continue;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// Thats it...
|
if(param & ISO14A_SET_TIMEOUT) {
|
||||||
|
iso14a_timeout = c->arg[2];
|
||||||
|
}
|
||||||
|
|
||||||
|
if(param & ISO14A_APDU) {
|
||||||
|
ack->arg[0] = iso14_apdu(cmd, len, ack->d.asBytes);
|
||||||
|
UsbSendPacket((void *)ack, sizeof(UsbCommand));
|
||||||
|
}
|
||||||
|
|
||||||
|
if(param & ISO14A_RAW) {
|
||||||
|
if(param & ISO14A_APPEND_CRC) {
|
||||||
|
AppendCrc14443a(cmd,len);
|
||||||
|
len += 2;
|
||||||
|
}
|
||||||
|
ReaderTransmit(cmd,len);
|
||||||
|
ack->arg[0] = ReaderReceive(ack->d.asBytes);
|
||||||
|
UsbSendPacket((void *)ack, sizeof(UsbCommand));
|
||||||
|
}
|
||||||
|
|
||||||
|
if(param & ISO14A_REQUEST_TRIGGER) iso14a_set_trigger(0);
|
||||||
|
|
||||||
|
if(param & ISO14A_NO_DISCONNECT)
|
||||||
|
return;
|
||||||
|
|
||||||
FpgaWriteConfWord(FPGA_MAJOR_MODE_OFF);
|
FpgaWriteConfWord(FPGA_MAJOR_MODE_OFF);
|
||||||
LEDsoff();
|
LEDsoff();
|
||||||
Dbprintf("%x %x %x", rsamples, 0xCC, 0xCC);
|
|
||||||
DbpString("ready..");
|
|
||||||
}
|
}
|
||||||
|
|
||||||
//-----------------------------------------------------------------------------
|
//-----------------------------------------------------------------------------
|
||||||
// Read an ISO 14443a tag. Send out commands and store answers.
|
// Read an ISO 14443a tag. Send out commands and store answers.
|
||||||
//
|
//
|
||||||
|
@ -1638,7 +1682,7 @@ void ReaderMifare(uint32_t parameter)
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
|
|
||||||
if(!iso14443a_select_card(NULL)) continue;
|
if(!iso14443a_select_card(NULL, NULL)) continue;
|
||||||
|
|
||||||
// Transmit MIFARE_CLASSIC_AUTH
|
// Transmit MIFARE_CLASSIC_AUTH
|
||||||
ReaderTransmit(mf_auth,sizeof(mf_auth));
|
ReaderTransmit(mf_auth,sizeof(mf_auth));
|
||||||
|
|
13
armsrc/iso14443a.h
Normal file
13
armsrc/iso14443a.h
Normal file
|
@ -0,0 +1,13 @@
|
||||||
|
#ifndef __ISO14443A_H
|
||||||
|
#define __ISO14443A_H
|
||||||
|
#include "common.h"
|
||||||
|
|
||||||
|
extern void AppendCrc14443a(uint8_t* data, int len);
|
||||||
|
extern void ReaderTransmitShort(const uint8_t* bt);
|
||||||
|
extern void ReaderTransmit(uint8_t* frame, int len);
|
||||||
|
extern int ReaderReceive(uint8_t* receivedAnswer);
|
||||||
|
extern void iso14443a_setup();
|
||||||
|
extern int iso14443a_select_card(uint8_t * uid_ptr, iso14a_card_select_t * card_info);
|
||||||
|
extern void iso14a_set_trigger(int enable);
|
||||||
|
|
||||||
|
#endif /* __ISO14443A_H */
|
|
@ -45,6 +45,7 @@ CMDSRCS = \
|
||||||
data.c \
|
data.c \
|
||||||
graph.c \
|
graph.c \
|
||||||
ui.c \
|
ui.c \
|
||||||
|
util.c \
|
||||||
cmddata.c \
|
cmddata.c \
|
||||||
cmdhf.c \
|
cmdhf.c \
|
||||||
cmdhf14a.c \
|
cmdhf14a.c \
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
//-----------------------------------------------------------------------------
|
//-----------------------------------------------------------------------------
|
||||||
// Copyright (C) 2010 iZsh <izsh at fail0verflow.com>
|
// Copyright (C) 2010 iZsh <izsh at fail0verflow.com>, Hagen Fritsch
|
||||||
//
|
//
|
||||||
// This code is licensed to you under the terms of the GNU GPL, version 2 or,
|
// This code is licensed to you under the terms of the GNU GPL, version 2 or,
|
||||||
// at your option, any later version. See the LICENSE.txt file for the text of
|
// at your option, any later version. See the LICENSE.txt file for the text of
|
||||||
|
@ -17,6 +17,7 @@
|
||||||
#include "ui.h"
|
#include "ui.h"
|
||||||
#include "cmdparser.h"
|
#include "cmdparser.h"
|
||||||
#include "cmdhf14a.h"
|
#include "cmdhf14a.h"
|
||||||
|
#include "common.h"
|
||||||
|
|
||||||
static int CmdHelp(const char *Cmd);
|
static int CmdHelp(const char *Cmd);
|
||||||
|
|
||||||
|
@ -147,6 +148,11 @@ int CmdHF14AList(const char *Cmd)
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
void iso14a_set_timeout(uint32_t timeout) {
|
||||||
|
UsbCommand c = {CMD_READER_ISO_14443a, {ISO14A_SET_TIMEOUT, 0, timeout}};
|
||||||
|
SendCommand(&c);
|
||||||
|
}
|
||||||
|
|
||||||
int CmdHF14AMifare(const char *Cmd)
|
int CmdHF14AMifare(const char *Cmd)
|
||||||
{
|
{
|
||||||
UsbCommand c = {CMD_READER_MIFARE, {strtol(Cmd, NULL, 0), 0, 0}};
|
UsbCommand c = {CMD_READER_MIFARE, {strtol(Cmd, NULL, 0), 0, 0}};
|
||||||
|
@ -156,9 +162,26 @@ int CmdHF14AMifare(const char *Cmd)
|
||||||
|
|
||||||
int CmdHF14AReader(const char *Cmd)
|
int CmdHF14AReader(const char *Cmd)
|
||||||
{
|
{
|
||||||
UsbCommand c = {CMD_READER_ISO_14443a, {strtol(Cmd, NULL, 0), 0, 0}};
|
UsbCommand c = {CMD_READER_ISO_14443a, {ISO14A_CONNECT, 0, 0}};
|
||||||
SendCommand(&c);
|
SendCommand(&c);
|
||||||
|
UsbCommand * resp = WaitForResponse(CMD_ACK);
|
||||||
|
uint8_t * uid = resp->d.asBytes;
|
||||||
|
iso14a_card_select_t * card = uid + 12;
|
||||||
|
|
||||||
|
if(resp->arg[0] == 0) {
|
||||||
|
PrintAndLog("iso14443a card select failed");
|
||||||
return 0;
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
PrintAndLog("ATQA : %02x %02x", card->atqa[0], card->atqa[1]);
|
||||||
|
PrintAndLog(" UID : %s", sprint_hex(uid, 12));
|
||||||
|
PrintAndLog(" SAK : %02x [%d]", card->sak, resp->arg[0]);
|
||||||
|
if(resp->arg[0] == 1)
|
||||||
|
PrintAndLog(" ATS : %s", sprint_hex(card->ats, card->ats_len));
|
||||||
|
else
|
||||||
|
PrintAndLog("proprietary non-iso14443a card found, RATS not supported");
|
||||||
|
|
||||||
|
return resp->arg[0];
|
||||||
}
|
}
|
||||||
|
|
||||||
// ## simulate iso14443a tag
|
// ## simulate iso14443a tag
|
||||||
|
|
|
@ -25,6 +25,7 @@
|
||||||
|
|
||||||
unsigned int current_command = CMD_UNKNOWN;
|
unsigned int current_command = CMD_UNKNOWN;
|
||||||
unsigned int received_command = CMD_UNKNOWN;
|
unsigned int received_command = CMD_UNKNOWN;
|
||||||
|
UsbCommand current_response;
|
||||||
|
|
||||||
static int CmdHelp(const char *Cmd);
|
static int CmdHelp(const char *Cmd);
|
||||||
static int CmdQuit(const char *Cmd);
|
static int CmdQuit(const char *Cmd);
|
||||||
|
@ -53,12 +54,25 @@ int CmdQuit(const char *Cmd)
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
void WaitForResponse(uint32_t response_type)
|
UsbCommand * WaitForResponseTimeout(uint32_t response_type, uint32_t ms_timeout) {
|
||||||
{
|
UsbCommand * ret = ¤t_response;
|
||||||
while (received_command != response_type) {
|
int i=0;
|
||||||
|
|
||||||
|
for(i=0; received_command != response_type && i < ms_timeout / 10; i++) {
|
||||||
msleep(10); // XXX ugh
|
msleep(10); // XXX ugh
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if(received_command != response_type)
|
||||||
|
ret = NULL;
|
||||||
|
|
||||||
received_command = CMD_UNKNOWN;
|
received_command = CMD_UNKNOWN;
|
||||||
|
|
||||||
|
return ret;
|
||||||
|
}
|
||||||
|
|
||||||
|
UsbCommand * WaitForResponse(uint32_t response_type)
|
||||||
|
{
|
||||||
|
return WaitForResponseTimeout(response_type, -1);
|
||||||
}
|
}
|
||||||
|
|
||||||
//-----------------------------------------------------------------------------
|
//-----------------------------------------------------------------------------
|
||||||
|
@ -137,7 +151,11 @@ void UsbCommandReceived(UsbCommand *UC)
|
||||||
return;
|
return;
|
||||||
default:
|
default:
|
||||||
unexpected_response:
|
unexpected_response:
|
||||||
|
|
||||||
|
if(UC->cmd != CMD_ACK)
|
||||||
PrintAndLog("unrecognized command %08x\n", UC->cmd);
|
PrintAndLog("unrecognized command %08x\n", UC->cmd);
|
||||||
break;
|
else
|
||||||
|
memcpy(¤t_response, UC, sizeof(UsbCommand));
|
||||||
|
received_command = UC->cmd;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -15,6 +15,7 @@
|
||||||
|
|
||||||
void UsbCommandReceived(UsbCommand *UC);
|
void UsbCommandReceived(UsbCommand *UC);
|
||||||
void CommandReceived(char *Cmd);
|
void CommandReceived(char *Cmd);
|
||||||
void WaitForResponse(uint32_t response_type);
|
UsbCommand * WaitForResponseTimeout(uint32_t response_type, uint32_t ms_timeout);
|
||||||
|
UsbCommand * WaitForResponse(uint32_t response_type);
|
||||||
|
|
||||||
#endif
|
#endif
|
||||||
|
|
|
@ -151,9 +151,10 @@ usb_dev_handle* findProxmark(int verbose, unsigned int *iface)
|
||||||
|
|
||||||
fprintf(stdout, "\nConnected units:\n");
|
fprintf(stdout, "\nConnected units:\n");
|
||||||
|
|
||||||
for (int i = 0; i < iUnit; i++)
|
for (int i = 0; i < iUnit; i++) {
|
||||||
fprintf(stdout, "\t%d. SN: %s\n", i+1, units[i].serial_number);
|
struct usb_device * dev = usb_device(units[i].handle);
|
||||||
|
fprintf(stdout, "\t%d. SN: %s [%s/%s]\n", i+1, units[i].serial_number, dev->bus->dirname, dev->filename);
|
||||||
|
}
|
||||||
if (iUnit > 1) {
|
if (iUnit > 1) {
|
||||||
while (iSelection < 1 || iSelection > iUnit) {
|
while (iSelection < 1 || iSelection > iUnit) {
|
||||||
fprintf(stdout, "Which unit do you want to connect to? ");
|
fprintf(stdout, "Which unit do you want to connect to? ");
|
||||||
|
|
23
client/util.c
Normal file
23
client/util.c
Normal file
|
@ -0,0 +1,23 @@
|
||||||
|
#include <stdio.h>
|
||||||
|
#include <stdint.h>
|
||||||
|
|
||||||
|
void print_hex(const uint8_t * data, const size_t len)
|
||||||
|
{
|
||||||
|
size_t i;
|
||||||
|
|
||||||
|
for (i=0; i < len; i++)
|
||||||
|
printf("%02x ", data[i]);
|
||||||
|
|
||||||
|
printf("\n");
|
||||||
|
}
|
||||||
|
|
||||||
|
char * sprint_hex(const uint8_t * data, const size_t len) {
|
||||||
|
static char buf[1024];
|
||||||
|
char * tmp = buf;
|
||||||
|
size_t i;
|
||||||
|
|
||||||
|
for (i=0; i < len && i < 1024/3; i++, tmp += 3)
|
||||||
|
sprintf(tmp, "%02x ", data[i]);
|
||||||
|
|
||||||
|
return buf;
|
||||||
|
}
|
1
client/util.h
Normal file
1
client/util.h
Normal file
|
@ -0,0 +1 @@
|
||||||
|
void print_hex(const uint8_t * data, const size_t len);
|
35
include/common.h
Normal file
35
include/common.h
Normal file
|
@ -0,0 +1,35 @@
|
||||||
|
//-----------------------------------------------------------------------------
|
||||||
|
// Hagen Fritsch - June 2010
|
||||||
|
//
|
||||||
|
// This code is licensed to you under the terms of the GNU GPL, version 2 or,
|
||||||
|
// at your option, any later version. See the LICENSE.txt file for the text of
|
||||||
|
// the license.
|
||||||
|
|
||||||
|
//-----------------------------------------------------------------------------
|
||||||
|
// Interlib Definitions
|
||||||
|
//-----------------------------------------------------------------------------
|
||||||
|
|
||||||
|
#ifndef __COMMON_H
|
||||||
|
#define __COMMON_H
|
||||||
|
|
||||||
|
//-----------------------------------------------------------------------------
|
||||||
|
// ISO 14443A
|
||||||
|
//-----------------------------------------------------------------------------
|
||||||
|
typedef struct {
|
||||||
|
uint8_t atqa[2];
|
||||||
|
uint8_t sak;
|
||||||
|
uint8_t ats_len;
|
||||||
|
uint8_t ats[20]; //FIXME: size?
|
||||||
|
} __attribute__((__packed__)) iso14a_card_select_t;
|
||||||
|
|
||||||
|
typedef enum ISO14A_COMMAND {
|
||||||
|
ISO14A_CONNECT = 1,
|
||||||
|
ISO14A_NO_DISCONNECT = 2,
|
||||||
|
ISO14A_APDU = 4,
|
||||||
|
ISO14A_RAW = 8,
|
||||||
|
ISO14A_REQUEST_TRIGGER = 0x10,
|
||||||
|
ISO14A_APPEND_CRC = 0x20,
|
||||||
|
ISO14A_SET_TIMEOUT = 0x40
|
||||||
|
} iso14a_command_t;
|
||||||
|
|
||||||
|
#endif
|
Loading…
Add table
Add a link
Reference in a new issue