]> git.zerfleddert.de Git - proxmark3-svn/blame - client/cmdlfviking.c
fixed #395
[proxmark3-svn] / client / cmdlfviking.c
CommitLineData
709665b5 1//-----------------------------------------------------------------------------
2//
3// This code is licensed to you under the terms of the GNU GPL, version 2 or,
4// at your option, any later version. See the LICENSE.txt file for the text of
5// the license.
6//-----------------------------------------------------------------------------
b9957414 7// Low frequency Viking tag commands (AKA FDI Matalec Transit)
8// ASK/Manchester, RF/32, 64 bits (complete)
709665b5 9//-----------------------------------------------------------------------------
10#include <stdio.h>
11#include <string.h>
12#include <inttypes.h>
13#include "proxmark3.h"
2b4898ec 14#include "cmdlfviking.h"
709665b5 15#include "ui.h"
16#include "util.h"
17#include "graph.h"
18#include "cmdparser.h"
19#include "cmddata.h"
20#include "cmdmain.h"
21#include "cmdlf.h"
709665b5 22#include "lfdemod.h"
23static int CmdHelp(const char *Cmd);
24
25int usage_lf_viking_clone(void) {
26 PrintAndLog("clone a Viking AM tag to a T55x7 tag.");
27 PrintAndLog("Usage: lf viking clone <Card ID - 8 hex digits> <Q5>");
28 PrintAndLog("Options :");
29 PrintAndLog(" <Card Number> : 8 digit hex viking card number");
30 PrintAndLog(" <Q5> : specify write to Q5 (t5555 instead of t55x7)");
31 PrintAndLog("");
32 PrintAndLog("Sample : lf viking clone 1A337 Q5");
33 return 0;
34}
35
36int usage_lf_viking_sim(void) {
37 PrintAndLog("Enables simulation of viking card with specified card number.");
38 PrintAndLog("Simulation runs until the button is pressed or another USB command is issued.");
39 PrintAndLog("Per viking format, the card number is 8 digit hex number. Larger values are truncated.");
40 PrintAndLog("");
41 PrintAndLog("Usage: lf viking sim <Card-Number>");
42 PrintAndLog("Options :");
43 PrintAndLog(" <Card Number> : 8 digit hex viking card number");
44 PrintAndLog("");
45 PrintAndLog("Sample : lf viking sim 1A337");
46 return 0;
47}
48
49uint64_t getVikingBits(uint32_t id) {
50 //calc checksum
8f226839 51 uint8_t checksum = ((id>>24) & 0xFF) ^ ((id>>16) & 0xFF) ^ ((id>>8) & 0xFF) ^ (id & 0xFF) ^ 0xF2 ^ 0xA8;
52 return ((uint64_t)0xF2 << 56) | ((uint64_t)id << 8) | checksum;
709665b5 53}
f2fc0a9c 54
f2fc0a9c 55//by marshmellow
56//see ASKDemod for what args are accepted
57int CmdVikingDemod(const char *Cmd) {
58 if (!ASKDemod(Cmd, false, false, 1)) {
59 if (g_debugMode) PrintAndLog("ASKDemod failed");
60 return 0;
61 }
62 size_t size = DemodBufferLen;
63 //call lfdemod.c demod for Viking
64 int ans = VikingDemod_AM(DemodBuffer, &size);
65 if (ans < 0) {
66 if (g_debugMode) PrintAndLog("Error Viking_Demod %d", ans);
67 return 0;
68 }
69 //got a good demod
70 uint32_t raw1 = bytebits_to_byte(DemodBuffer+ans, 32);
71 uint32_t raw2 = bytebits_to_byte(DemodBuffer+ans+32, 32);
72 uint32_t cardid = bytebits_to_byte(DemodBuffer+ans+24, 32);
73 uint8_t checksum = bytebits_to_byte(DemodBuffer+ans+32+24, 8);
74 PrintAndLog("Viking Tag Found: Card ID %08X, Checksum: %02X", cardid, (unsigned int) checksum);
75 PrintAndLog("Raw: %08X%08X", raw1,raw2);
9fe4507c 76 setDemodBuf(DemodBuffer, 64, ans);
77 setClockGrid(g_DemodClock, g_DemodStartIdx + (ans*g_DemodClock));
f2fc0a9c 78 return 1;
79}
80
709665b5 81//by marshmellow
82//see ASKDemod for what args are accepted
83int CmdVikingRead(const char *Cmd) {
84 // read lf silently
b9957414 85 lf_read(true, 10000);
709665b5 86 // demod and output viking ID
87 return CmdVikingDemod(Cmd);
88}
89
90int CmdVikingClone(const char *Cmd) {
91 uint32_t id = 0;
92 uint64_t rawID = 0;
93 bool Q5 = false;
94 char cmdp = param_getchar(Cmd, 0);
735136e6 95 if (strlen(Cmd) == 0 || cmdp == 'h' || cmdp == 'H') return usage_lf_viking_clone();
709665b5 96
fe876493 97 id = param_get32ex(Cmd, 0, 0, 16);
709665b5 98 if (id == 0) return usage_lf_viking_clone();
99 if (param_getchar(Cmd, 1)=='Q' || param_getchar(Cmd, 1)=='q')
100 Q5 = true;
101
102 rawID = getVikingBits(id);
776f7e61 103 PrintAndLog("Cloning - ID: %08X, Raw: %08X%08X",id,(uint32_t)(rawID >> 32),(uint32_t) (rawID & 0xFFFFFFFF));
104 UsbCommand c = {CMD_VIKING_CLONE_TAG,{rawID >> 32, rawID & 0xFFFFFFFF, Q5}};
709665b5 105 clearCommandBuffer();
106 SendCommand(&c);
107 //check for ACK
108 WaitForResponse(CMD_ACK,NULL);
109 return 0;
110}
111
d1cea2a4 112int CmdVikingSim(const char *Cmd) {
709665b5 113 uint32_t id = 0;
114 uint64_t rawID = 0;
115 uint8_t clk = 32, encoding = 1, separator = 0, invert = 0;
fe876493 116 char cmdp = param_getchar(Cmd, 0);
709665b5 117
735136e6 118 if (strlen(Cmd) == 0 || cmdp == 'h' || cmdp == 'H') return usage_lf_viking_sim();
fe876493 119 id = param_get32ex(Cmd, 0, 0, 16);
709665b5 120 if (id == 0) return usage_lf_viking_sim();
121
122 rawID = getVikingBits(id);
123
124 uint16_t arg1, arg2;
125 size_t size = 64;
126 arg1 = clk << 8 | encoding;
127 arg2 = invert << 8 | separator;
128
129 UsbCommand c = {CMD_ASK_SIM_TAG, {arg1, arg2, size}};
130 PrintAndLog("preparing to sim ask data: %d bits", size);
131 num_to_bytebits(rawID, 64, c.d.asBytes);
132 clearCommandBuffer();
133 SendCommand(&c);
fe876493 134 return 0;
709665b5 135}
136
137static command_t CommandTable[] = {
138 {"help", CmdHelp, 1, "This help"},
f2fc0a9c 139 {"demod", CmdVikingDemod, 1, "Demodulate a Viking tag from the GraphBuffer"},
140 {"read", CmdVikingRead, 0, "Attempt to read and Extract tag data from the antenna"},
709665b5 141 {"clone", CmdVikingClone, 0, "<8 digit ID number> clone viking tag"},
142 {"sim", CmdVikingSim, 0, "<8 digit ID number> simulate viking tag"},
143 {NULL, NULL, 0, NULL}
144};
145
146int CmdLFViking(const char *Cmd) {
147 CmdsParse(CommandTable, Cmd);
148 return 0;
149}
150
151int CmdHelp(const char *Cmd) {
152 CmdsHelp(CommandTable);
153 return 0;
154}
Impressum, Datenschutz