mirror of
https://github.com/Proxmark/proxmark3.git
synced 2025-08-21 05:43:23 -07:00
MF ultralight code cleanup
This commit is contained in:
parent
8258f40969
commit
9d87eb6650
6 changed files with 93 additions and 76 deletions
|
@ -830,7 +830,6 @@ void UsbPacketReceived(uint8_t *packet, int len)
|
|||
MifareUC_Auth(c->arg[0],c->d.asBytes);
|
||||
break;
|
||||
case CMD_MIFAREU_READCARD:
|
||||
case CMD_MIFAREUC_READCARD:
|
||||
MifareUReadCard(c->arg[0], c->arg[1], c->arg[2], c->d.asBytes);
|
||||
break;
|
||||
case CMD_MIFAREUC_SETPWD:
|
||||
|
|
|
@ -106,17 +106,17 @@ void MifareUC_Auth(uint8_t arg0, uint8_t *keybytes){
|
|||
return;
|
||||
};
|
||||
|
||||
if(mifare_ultra_auth(keybytes) == 1){
|
||||
if(!mifare_ultra_auth(keybytes)){
|
||||
if (MF_DBGLEVEL >= MF_DBG_ERROR) Dbprintf("Authentication failed");
|
||||
OnError(1);
|
||||
return;
|
||||
}
|
||||
cmd_send(CMD_ACK,1,0,0,0,0);
|
||||
|
||||
if (turnOffField) {
|
||||
FpgaWriteConfWord(FPGA_MAJOR_MODE_OFF);
|
||||
LEDsoff();
|
||||
}
|
||||
cmd_send(CMD_ACK,1,0,0,0,0);
|
||||
}
|
||||
|
||||
// Arg0 = BlockNo,
|
||||
|
@ -146,7 +146,7 @@ void MifareUReadBlock(uint8_t arg0, uint8_t arg1, uint8_t *datain)
|
|||
uint8_t key[16] = {0x00};
|
||||
memcpy(key, datain, sizeof(key) );
|
||||
|
||||
if ( mifare_ultra_auth(key) == 1 ) {
|
||||
if ( !mifare_ultra_auth(key) ) {
|
||||
OnError(1);
|
||||
return;
|
||||
}
|
||||
|
@ -157,7 +157,7 @@ void MifareUReadBlock(uint8_t arg0, uint8_t arg1, uint8_t *datain)
|
|||
uint8_t pwd[4] = {0x00};
|
||||
memcpy(pwd, datain, 4);
|
||||
uint8_t pack[4] = {0,0,0,0};
|
||||
if (mifare_ul_ev1_auth(pwd, pack) == 1) {
|
||||
if (!mifare_ul_ev1_auth(pwd, pack)) {
|
||||
OnError(1);
|
||||
return;
|
||||
}
|
||||
|
@ -255,8 +255,8 @@ void MifareUReadCard(uint8_t arg0, uint16_t arg1, uint8_t arg2, uint8_t *datain)
|
|||
uint16_t blocks = arg1;
|
||||
bool useKey = (arg2 == 1); //UL_C
|
||||
bool usePwd = (arg2 == 2); //UL_EV1/NTAG
|
||||
int countblocks = 0;
|
||||
uint8_t dataout[176] = {0x00};
|
||||
uint32_t countblocks = 0;
|
||||
uint8_t *dataout = BigBuf_get_addr();
|
||||
|
||||
LEDsoff();
|
||||
LED_A_ON();
|
||||
|
@ -275,7 +275,7 @@ void MifareUReadCard(uint8_t arg0, uint16_t arg1, uint8_t arg2, uint8_t *datain)
|
|||
uint8_t key[16] = {0x00};
|
||||
memcpy(key, datain, sizeof(key) );
|
||||
|
||||
if ( mifare_ultra_auth(key) == 1 ) {
|
||||
if ( !mifare_ultra_auth(key) ) {
|
||||
OnError(1);
|
||||
return;
|
||||
}
|
||||
|
@ -287,19 +287,30 @@ void MifareUReadCard(uint8_t arg0, uint16_t arg1, uint8_t arg2, uint8_t *datain)
|
|||
memcpy(pwd, datain, sizeof(pwd));
|
||||
uint8_t pack[4] = {0,0,0,0};
|
||||
|
||||
if (mifare_ul_ev1_auth(pwd, pack) == 1){
|
||||
if (!mifare_ul_ev1_auth(pwd, pack)){
|
||||
OnError(1);
|
||||
return;
|
||||
}
|
||||
}
|
||||
|
||||
for (int i = 0; i < blocks; i++){
|
||||
len = mifare_ultra_readblock(blockNo * 4 + i, dataout + 4 * i);
|
||||
if ((i*4) + 4 > BigBuf_get_traceLen()) {
|
||||
Dbprintf("Data exceeds buffer!!");
|
||||
break;
|
||||
}
|
||||
|
||||
len = mifare_ultra_readblock(blockNo + i, dataout + 4 * i);
|
||||
|
||||
if (len) {
|
||||
if (MF_DBGLEVEL >= MF_DBG_ERROR) Dbprintf("Read block %d error",i);
|
||||
OnError(2);
|
||||
return;
|
||||
// if no blocks read - error out
|
||||
if (i==0){
|
||||
OnError(2);
|
||||
return;
|
||||
} else {
|
||||
//stop at last successful read block and return what we got
|
||||
break;
|
||||
}
|
||||
} else {
|
||||
countblocks++;
|
||||
}
|
||||
|
@ -314,9 +325,8 @@ void MifareUReadCard(uint8_t arg0, uint16_t arg1, uint8_t arg2, uint8_t *datain)
|
|||
|
||||
if (MF_DBGLEVEL >= MF_DBG_EXTENDED) Dbprintf("Blocks read %d", countblocks);
|
||||
|
||||
len = blocks * 4;
|
||||
|
||||
cmd_send(CMD_ACK, 1, len, 0, dataout, len);
|
||||
countblocks *= 4;
|
||||
cmd_send(CMD_ACK, 1, countblocks, countblocks, 0, 0);
|
||||
FpgaWriteConfWord(FPGA_MAJOR_MODE_OFF);
|
||||
LEDsoff();
|
||||
}
|
||||
|
|
|
@ -322,15 +322,14 @@ int mifare_ul_ev1_auth(uint8_t *keybytes, uint8_t *pack){
|
|||
len = mifare_sendcmd_short_mfuev1auth(NULL, 0, 0x1B, key, resp, respPar, NULL);
|
||||
if (len != 4) {
|
||||
if (MF_DBGLEVEL >= MF_DBG_ERROR) Dbprintf("Cmd Error: %02x %u", resp[0], len);
|
||||
OnError(1);
|
||||
return 1;
|
||||
return 0;
|
||||
}
|
||||
|
||||
if (MF_DBGLEVEL >= MF_DBG_EXTENDED)
|
||||
Dbprintf("Auth Resp: %02x%02x%02x%02x", resp[0],resp[1],resp[2],resp[3]);
|
||||
|
||||
memcpy(pack, resp, 4);
|
||||
return 0;
|
||||
return 1;
|
||||
}
|
||||
|
||||
int mifare_ultra_auth(uint8_t *keybytes){
|
||||
|
@ -353,8 +352,7 @@ int mifare_ultra_auth(uint8_t *keybytes){
|
|||
len = mifare_sendcmd_short(NULL, 1, 0x1A, 0x00, resp, respPar ,NULL);
|
||||
if (len != 11) {
|
||||
if (MF_DBGLEVEL >= MF_DBG_ERROR) Dbprintf("Cmd Error: %02x", resp[0]);
|
||||
OnError(1);
|
||||
return 1;
|
||||
return 0;
|
||||
}
|
||||
|
||||
// tag nonce.
|
||||
|
@ -386,8 +384,7 @@ int mifare_ultra_auth(uint8_t *keybytes){
|
|||
len = mifare_sendcmd_short_mfucauth(NULL, 1, 0xAF, rnd_ab, resp, respPar, NULL);
|
||||
if (len != 11) {
|
||||
if (MF_DBGLEVEL >= MF_DBG_ERROR) Dbprintf("Cmd Error: %02x", resp[0]);
|
||||
OnError(1);
|
||||
return 1;
|
||||
return 0;
|
||||
}
|
||||
|
||||
uint8_t enc_resp[8] = { 0,0,0,0,0,0,0,0 };
|
||||
|
@ -398,7 +395,7 @@ int mifare_ultra_auth(uint8_t *keybytes){
|
|||
tdes_2key_dec(resp_random_a, enc_resp, 8, key, enc_random_b);
|
||||
if ( memcmp(resp_random_a, random_a, 8) != 0 ) {
|
||||
if (MF_DBGLEVEL >= MF_DBG_ERROR) Dbprintf("failed authentication");
|
||||
return 1;
|
||||
return 0;
|
||||
}
|
||||
|
||||
if (MF_DBGLEVEL >= MF_DBG_EXTENDED) {
|
||||
|
@ -418,7 +415,7 @@ int mifare_ultra_auth(uint8_t *keybytes){
|
|||
resp_random_a[0],resp_random_a[1],resp_random_a[2],resp_random_a[3],
|
||||
resp_random_a[4],resp_random_a[5],resp_random_a[6],resp_random_a[7]);
|
||||
}
|
||||
return 0;
|
||||
return 1;
|
||||
}
|
||||
|
||||
int mifare_ultra_readblock(uint8_t blockNo, uint8_t *blockData)
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue