]> git.zerfleddert.de Git - proxmark3-svn/blame - client/cmdlfnoralsy.c
Merge pull request #405 from ZenSecurity/master
[proxmark3-svn] / client / cmdlfnoralsy.c
CommitLineData
a9968da3 1//-----------------------------------------------------------------------------
2//
3// This code is licensed to you under the terms of the GNU GPL, version 2 or,
4// at your option, any later version. See the LICENSE.txt file for the text of
5// the license.
6//-----------------------------------------------------------------------------
7// Low frequency Noralsy tag commands
b9957414 8// ASK/Manchester, STT, RF/32, 96 bits long (some bits unknown)
a9968da3 9//-----------------------------------------------------------------------------
10#include "cmdlfnoralsy.h"
11#include <string.h>
12#include <inttypes.h>
13#include <math.h>
14#include "proxmark3.h"
15#include "ui.h"
16#include "util.h"
17#include "graph.h"
18#include "cmdparser.h"
19#include "cmddata.h"
20#include "cmdmain.h"
21#include "cmdlf.h"
22#include "protocols.h" // for T55xx config register definitions
23#include "lfdemod.h" // parityTest
24
25static int CmdHelp(const char *Cmd);
26
27int usage_lf_noralsy_clone(void){
28 PrintAndLog("clone a Noralsy tag to a T55x7 tag.");
29 PrintAndLog("Usage: lf noralsy clone [h] <card id> <year> <Q5>");
30 PrintAndLog("Options:");
31 PrintAndLog(" h : This help");
32 PrintAndLog(" <card id> : Noralsy card ID");
33 PrintAndLog(" <year> : Tag allocation year");
34 PrintAndLog(" <Q5> : specify write to Q5 (t5555 instead of t55x7)");
35 PrintAndLog("");
36 PrintAndLog("Sample: lf noralsy clone 112233");
37 return 0;
38}
39
40int usage_lf_noralsy_sim(void) {
41 PrintAndLog("Enables simulation of Noralsy card with specified card number.");
42 PrintAndLog("Simulation runs until the button is pressed or another USB command is issued.");
43 PrintAndLog("");
44 PrintAndLog("Usage: lf noralsy sim [h] <card id> <year>");
45 PrintAndLog("Options:");
46 PrintAndLog(" h : This help");
47 PrintAndLog(" <card id> : Noralsy card ID");
48 PrintAndLog(" <year> : Tag allocation year");
49 PrintAndLog("");
50 PrintAndLog("Sample: lf noralsy sim 112233");
51 return 0;
52}
53
54static uint8_t noralsy_chksum( uint8_t* bits, uint8_t len) {
55 uint8_t sum = 0;
56 for (uint8_t i = 0; i < len; i += 4)
57 sum ^= bytebits_to_byte(bits+i, 4);
58 return sum & 0x0F ;
59}
60int getnoralsyBits(uint32_t id, uint16_t year, uint8_t *bits) {
61 //preamp
62 num_to_bytebits(0xBB0214FF, 32, bits); // --> Have seen 0xBB0214FF / 0xBB0314FF UNKNOWN
63
64 year &= 0xFF;
65
66 uint16_t sub1 = (id & 0xFFF0000) >> 16;
67 uint8_t sub2 = (id & 0x000FF00) >> 8;
68 uint8_t sub3 = (id & 0x00000FF);
69
70 num_to_bytebits(sub1, 12, bits+32);
71 num_to_bytebits(year, 8, bits+44);
72 num_to_bytebits(0, 4, bits+52); // --> UNKNOWN. Flag?
73
74 num_to_bytebits(sub2, 8, bits+56);
75 num_to_bytebits(sub3, 8, bits+64);
76
77 //chksum byte
78 uint8_t chksum = noralsy_chksum(bits+32, 40);
79 num_to_bytebits(chksum, 4, bits+72);
80 chksum = noralsy_chksum(bits, 76);
81 num_to_bytebits(chksum, 4, bits+76);
82 return 1;
83}
84
85// by iceman
86// find Noralsy preamble in already demoded data
87int NoralsyDemod_AM(uint8_t *dest, size_t *size) {
88 if (*size < 96) return -1; //make sure buffer has data
89 size_t startIdx = 0;
90 uint8_t preamble[] = {1,0,1,1,1,0,1,1,0,0,0,0};
91 if (!preambleSearch(dest, preamble, sizeof(preamble), size, &startIdx))
92 return -2; //preamble not found
93 if (*size != 96) return -3; //wrong demoded size
94 //return start position
95 return (int)startIdx;
96}
97
98/*
99*
100* 2520116 | BB0214FF2529900116360000 | 10111011 00000011 00010100 11111111 00100101 00101001 10010000 00000001 00010110 00110110 00000000 00000000
b9957414 101* aaa*aaaaiiiYY*iiiicc---- **** iiiiiiii iiiiYYYY YYYY**** iiiiiiii iiiiiiii cccccccc
a9968da3 102*
b9957414 103* a = fixed value BB0*14FF
a9968da3 104* i = printed id, BCD-format
105* Y = year
106* c = checksum
b9957414 107* * = unknown
108*
a9968da3 109**/
110
111//see ASKDemod for what args are accepted
112int CmdNoralsyDemod(const char *Cmd) {
113
114 //ASK / Manchester
b97311b1 115 bool st = true;
199c74a4 116 if (!ASKDemod_ext("32 0 0", false, false, 1, &st)) {
a9968da3 117 if (g_debugMode) PrintAndLog("DEBUG: Error - Noralsy: ASK/Manchester Demod failed");
118 return 0;
119 }
c3caf040 120 if (!st) return 0;
121
a9968da3 122 size_t size = DemodBufferLen;
123 int ans = NoralsyDemod_AM(DemodBuffer, &size);
124 if (ans < 0){
125 if (g_debugMode){
126 if (ans == -1)
127 PrintAndLog("DEBUG: Error - Noralsy: too few bits found");
128 else if (ans == -2)
129 PrintAndLog("DEBUG: Error - Noralsy: preamble not found");
130 else if (ans == -3)
131 PrintAndLog("DEBUG: Error - Noralsy: Size not correct: %d", size);
132 else
133 PrintAndLog("DEBUG: Error - Noralsy: ans: %d", ans);
134 }
135 return 0;
136 }
137 setDemodBuf(DemodBuffer, 96, ans);
9fe4507c 138 setClockGrid(g_DemodClock, g_DemodStartIdx + (ans*g_DemodClock));
a9968da3 139 //setGrid_Clock(32);
140
141 //got a good demod
142 uint32_t raw1 = bytebits_to_byte(DemodBuffer, 32);
143 uint32_t raw2 = bytebits_to_byte(DemodBuffer+32, 32);
144 uint32_t raw3 = bytebits_to_byte(DemodBuffer+64, 32);
145
146 uint32_t cardid = (bytebits_to_byte(DemodBuffer+32, 12)<<16) | bytebits_to_byte(DemodBuffer+32+24, 16);
147
148 uint16_t year = (raw2 & 0x000ff000) >> 12;
149 year += ( year > 0x60 ) ? 0x1900: 0x2000;
150
151 // calc checksums
152 uint8_t calc1 = noralsy_chksum(DemodBuffer+32, 40);
153 uint8_t calc2 = noralsy_chksum(DemodBuffer, 76);
154 uint8_t chk1 = 0, chk2 = 0;
155 chk1 = bytebits_to_byte(DemodBuffer+72, 4);
156 chk2 = bytebits_to_byte(DemodBuffer+76, 4);
157 // test checksums
158 if ( chk1 != calc1 ) {
159 if (g_debugMode) PrintAndLog("DEBUG: Error - Noralsy: checksum 1 failed %x - %x\n", chk1, calc1);
160 return 0;
161 }
162 if ( chk2 != calc2 ) {
163 if (g_debugMode) PrintAndLog("DEBUG: Error - Noralsy: checksum 2 failed %x - %x\n", chk2, calc2);
164 return 0;
165 }
166
167 PrintAndLog("Noralsy Tag Found: Card ID %X, Year: %X Raw: %08X%08X%08X", cardid, year, raw1 ,raw2, raw3);
168 if (raw1 != 0xBB0214FF) {
169 PrintAndLog("Unknown bits set in first block! Expected 0xBB0214FF, Found: 0x%08X", raw1);
170 PrintAndLog("Please post this output in forum to further research on this format");
171 }
172 return 1;
173}
174
175int CmdNoralsyRead(const char *Cmd) {
b9957414 176 lf_read(true, 8000);
a9968da3 177 return CmdNoralsyDemod(Cmd);
178}
179
180int CmdNoralsyClone(const char *Cmd) {
181
182 uint16_t year = 0;
183 uint32_t id = 0;
184 uint32_t blocks[4] = {T55x7_MODULATION_MANCHESTER | T55x7_BITRATE_RF_32 | T55x7_ST_TERMINATOR | 3 << T55x7_MAXBLOCK_SHIFT, 0, 0};
185 uint8_t bits[96];
186 uint8_t *bs = bits;
187 memset(bs, 0, sizeof(bits));
188
189 char cmdp = param_getchar(Cmd, 0);
190 if (strlen(Cmd) == 0 || cmdp == 'h' || cmdp == 'H') return usage_lf_noralsy_clone();
191
192 id = param_get32ex(Cmd, 0, 0, 16);
193 year = param_get32ex(Cmd, 1, 2000, 16);
194
195 //Q5
196 if (param_getchar(Cmd, 2) == 'Q' || param_getchar(Cmd, 2) == 'q') {
197 //t5555 (Q5) BITRATE = (RF-2)/2 (iceman)
198 blocks[0] = T5555_MODULATION_MANCHESTER | ((32-2)>>1) << T5555_BITRATE_SHIFT | T5555_ST_TERMINATOR | 3 << T5555_MAXBLOCK_SHIFT;
199 }
200
201 if ( !getnoralsyBits(id, year, bs)) {
202 PrintAndLog("Error with tag bitstream generation.");
203 return 1;
204 }
205
206 //
207 blocks[1] = bytebits_to_byte(bs,32);
208 blocks[2] = bytebits_to_byte(bs+32,32);
209 blocks[3] = bytebits_to_byte(bs+64,32);
210
211 PrintAndLog("Preparing to clone Noralsy to T55x7 with CardId: %x", id);
212 PrintAndLog("Blk | Data ");
213 PrintAndLog("----+------------");
214 PrintAndLog(" 00 | 0x%08x", blocks[0]);
215 PrintAndLog(" 01 | 0x%08x", blocks[1]);
216 PrintAndLog(" 02 | 0x%08x", blocks[2]);
217 PrintAndLog(" 03 | 0x%08x", blocks[3]);
218
219 UsbCommand resp;
220 UsbCommand c = {CMD_T55XX_WRITE_BLOCK, {0,0,0}};
221
222 for (int i = 3; i >= 0; --i) {
223 c.arg[0] = blocks[i];
224 c.arg[1] = i;
225 clearCommandBuffer();
226 SendCommand(&c);
227 if (!WaitForResponseTimeout(CMD_ACK, &resp, T55XX_WRITE_TIMEOUT)){
228 PrintAndLog("Error occurred, device did not respond during write operation.");
229 return -1;
230 }
231 }
232 return 0;
233}
234
235int CmdNoralsySim(const char *Cmd) {
236
237 uint8_t bits[96];
238 uint8_t *bs = bits;
239 memset(bs, 0, sizeof(bits));
240
241 uint16_t year = 0;
242 uint32_t id = 0;
243
244 char cmdp = param_getchar(Cmd, 0);
245 if (strlen(Cmd) == 0 || cmdp == 'h' || cmdp == 'H') return usage_lf_noralsy_sim();
246
247 id = param_get32ex(Cmd, 0, 0, 16);
248 year = param_get32ex(Cmd, 1, 2000, 16);
249
250 uint8_t clk = 32, encoding = 1, separator = 1, invert = 0;
251 uint16_t arg1, arg2;
252 size_t size = 96;
253 arg1 = clk << 8 | encoding;
254 arg2 = invert << 8 | separator;
255
256 if ( !getnoralsyBits(id, year, bs)) {
257 PrintAndLog("Error with tag bitstream generation.");
258 return 1;
259 }
260
261 PrintAndLog("Simulating Noralsy - CardId: %x", id);
262
263 UsbCommand c = {CMD_ASK_SIM_TAG, {arg1, arg2, size}};
264 memcpy(c.d.asBytes, bs, size);
265 clearCommandBuffer();
266 SendCommand(&c);
267 return 0;
268}
269
270static command_t CommandTable[] = {
271 {"help", CmdHelp, 1, "This help"},
272 {"demod", CmdNoralsyDemod,1, "Attempt to read and extract tag data from the GraphBuffer"},
273 {"read", CmdNoralsyRead, 0, "Attempt to read and extract tag data from the antenna"},
274 {"clone", CmdNoralsyClone,0, "clone Noralsy tag"},
275 {"sim", CmdNoralsySim, 0, "simulate Noralsy tag"},
276 {NULL, NULL, 0, NULL}
277};
278
279int CmdLFNoralsy(const char *Cmd) {
280 clearCommandBuffer();
281 CmdsParse(CommandTable, Cmd);
282 return 0;
283}
284
285int CmdHelp(const char *Cmd) {
286 CmdsHelp(CommandTable);
287 return 0;
288}
Impressum, Datenschutz