]> git.zerfleddert.de Git - proxmark3-svn/blob - client/emv/cmdemv.c
bc90857473ba09bf63a3d7c44c948cd72eefbc04
[proxmark3-svn] / client / emv / cmdemv.c
1 //-----------------------------------------------------------------------------
2 // Copyright (C) 2017, 2018 Merlok
3 //
4 // This code is licensed to you under the terms of the GNU GPL, version 2 or,
5 // at your option, any later version. See the LICENSE.txt file for the text of
6 // the license.
7 //-----------------------------------------------------------------------------
8 // EMV commands
9 //-----------------------------------------------------------------------------
10
11 #include <ctype.h>
12 #include "cmdemv.h"
13 #include "test/cryptotest.h"
14 #include "cliparser/cliparser.h"
15
16 int CmdHFEMVSelect(const char *cmd) {
17 uint8_t data[APDU_AID_LEN] = {0};
18 int datalen = 0;
19
20
21 CLIParserInit("hf 14a select",
22 "Executes select applet command",
23 "Usage:\n\thf emv select -s a00000000101 -> select card, select applet\n\thf emv select -st a00000000101 -> select card, select applet, show result in TLV\n");
24
25 void* argtable[] = {
26 arg_param_begin,
27 arg_lit0("sS", "select", "activate field and select card"),
28 arg_lit0("kK", "keep", "keep field for next command"),
29 arg_lit0("aA", "apdu", "show APDU reqests and responses"),
30 arg_lit0("tT", "tlv", "TLV decode results"),
31 arg_str0(NULL, NULL, "<HEX applet AID>", NULL),
32 arg_param_end
33 };
34 CLIExecWithReturn(cmd, argtable, true);
35
36 bool activateField = arg_get_lit(1);
37 bool leaveSignalON = arg_get_lit(2);
38 bool APDULogging = arg_get_lit(3);
39 bool decodeTLV = arg_get_lit(4);
40 CLIGetStrWithReturn(5, data, &datalen);
41 CLIParserFree();
42
43 SetAPDULogging(APDULogging);
44
45 // exec
46 uint8_t buf[APDU_RES_LEN] = {0};
47 size_t len = 0;
48 uint16_t sw = 0;
49 int res = EMVSelect(activateField, leaveSignalON, data, datalen, buf, sizeof(buf), &len, &sw, NULL);
50
51 if (sw)
52 PrintAndLog("APDU response status: %04x - %s", sw, GetAPDUCodeDescription(sw >> 8, sw & 0xff));
53
54 if (res)
55 return res;
56
57 if (decodeTLV)
58 TLVPrintFromBuffer(buf, len);
59
60 return 0;
61 }
62
63 int CmdHFEMVSearch(const char *cmd) {
64
65 CLIParserInit("hf 14a select",
66 "Tries to select all applets from applet list:\n",
67 "Usage:\n\thf emv search -s -> select card and search\n\thf emv search -st -> select card, search and show result in TLV\n");
68
69 void* argtable[] = {
70 arg_param_begin,
71 arg_lit0("sS", "select", "activate field and select card"),
72 arg_lit0("kK", "keep", "keep field ON for next command"),
73 arg_lit0("aA", "apdu", "show APDU reqests and responses"),
74 arg_lit0("tT", "tlv", "TLV decode results of selected applets"),
75 arg_param_end
76 };
77 CLIExecWithReturn(cmd, argtable, true);
78
79 bool activateField = arg_get_lit(1);
80 bool leaveSignalON = arg_get_lit(2);
81 bool APDULogging = arg_get_lit(3);
82 bool decodeTLV = arg_get_lit(4);
83 CLIParserFree();
84
85 SetAPDULogging(APDULogging);
86
87 struct tlvdb *t = NULL;
88 const char *al = "Applets list";
89 t = tlvdb_fixed(1, strlen(al), (const unsigned char *)al);
90
91 if (EMVSearch(activateField, leaveSignalON, decodeTLV, t)) {
92 tlvdb_free(t);
93 return 2;
94 }
95
96 PrintAndLog("Search completed.");
97
98 // print list here
99 if (!decodeTLV) {
100 TLVPrintAIDlistFromSelectTLV(t);
101 }
102
103 tlvdb_free(t);
104
105 return 0;
106 }
107
108 int CmdHFEMVPPSE(const char *cmd) {
109
110 CLIParserInit("hf 14a pse",
111 "Executes PSE/PPSE select command. It returns list of applet on the card:\n",
112 "Usage:\n\thf emv pse -s1 -> select, get pse\n\thf emv pse -st2 -> select, get ppse, show result in TLV\n");
113
114 void* argtable[] = {
115 arg_param_begin,
116 arg_lit0("sS", "select", "activate field and select card"),
117 arg_lit0("kK", "keep", "keep field ON for next command"),
118 arg_lit0("1", "pse", "pse (1PAY.SYS.DDF01) mode"),
119 arg_lit0("2", "ppse", "ppse (2PAY.SYS.DDF01) mode (default mode)"),
120 arg_lit0("aA", "apdu", "show APDU reqests and responses"),
121 arg_lit0("tT", "tlv", "TLV decode results of selected applets"),
122 arg_param_end
123 };
124 CLIExecWithReturn(cmd, argtable, true);
125
126 bool activateField = arg_get_lit(1);
127 bool leaveSignalON = arg_get_lit(2);
128 uint8_t PSENum = 2;
129 if (arg_get_lit(3))
130 PSENum = 1;
131 if (arg_get_lit(4))
132 PSENum = 2;
133 bool APDULogging = arg_get_lit(5);
134 bool decodeTLV = arg_get_lit(6);
135 CLIParserFree();
136
137 SetAPDULogging(APDULogging);
138
139 // exec
140 uint8_t buf[APDU_RES_LEN] = {0};
141 size_t len = 0;
142 uint16_t sw = 0;
143 int res = EMVSelectPSE(activateField, leaveSignalON, PSENum, buf, sizeof(buf), &len, &sw);
144
145 if (sw)
146 PrintAndLog("APDU response status: %04x - %s", sw, GetAPDUCodeDescription(sw >> 8, sw & 0xff));
147
148 if (res)
149 return res;
150
151
152 if (decodeTLV)
153 TLVPrintFromBuffer(buf, len);
154
155 return 0;
156 }
157
158 #define TLV_ADD(tag, value)( tlvdb_add(tlvRoot, tlvdb_fixed(tag, sizeof(value) - 1, (const unsigned char *)value)) )
159
160 int CmdHFEMVGPO(const char *cmd) {
161 uint8_t data[APDU_RES_LEN] = {0};
162 int datalen = 0;
163
164 CLIParserInit("hf 14a gpo",
165 "Executes Get Processing Options command. It returns data in TLV format (0x77 - format2) or plain format (0x80 - format1).\nNeeds a EMV applet to be selected.",
166 "Usage:\n\thf emv gpo -k -> execute GPO\n\thf emv gpo -st 01020304 -> execute GPO with 4-byte PDOL data, show result in TLV\n");
167 // here need to add load params from file and gen pdol
168
169 void* argtable[] = {
170 arg_param_begin,
171 arg_lit0("kK", "keep", "keep field ON for next command"),
172 arg_lit0("pP", "params", "load parameters for PDOL making from `emv/defparams.json` file (by default uses default parameters) (NOT WORK!!!)"),
173 arg_lit0("mM", "make", "make PDOLdata from PDOL (tag 9F38) and parameters (NOT WORK!!!)"),
174 arg_lit0("aA", "apdu", "show APDU reqests and responses"),
175 arg_lit0("tT", "tlv", "TLV decode results of selected applets"),
176 arg_str0(NULL, NULL, "<HEX PDOLdata/PDOL>", NULL),
177 arg_param_end
178 };
179 CLIExecWithReturn(cmd, argtable, true);
180
181 bool leaveSignalON = arg_get_lit(1);
182 bool paramsLoadFromFile = arg_get_lit(2);
183 bool dataMakeFromPDOL = arg_get_lit(3);
184 bool APDULogging = arg_get_lit(4);
185 bool decodeTLV = arg_get_lit(5);
186 CLIGetStrWithReturn(6, data, &datalen);
187 CLIParserFree();
188
189 SetAPDULogging(APDULogging);
190
191 // Init TLV tree
192 const char *alr = "Root terminal TLV tree";
193 struct tlvdb *tlvRoot = tlvdb_fixed(1, strlen(alr), (const unsigned char *)alr);
194
195 // calc PDOL
196 struct tlv *pdol_data_tlv = NULL;
197 struct tlv data_tlv = {
198 .tag = 0x01,
199 .len = datalen,
200 .value = (uint8_t *)data,
201 };
202 if (dataMakeFromPDOL) {
203 // TODO
204 PrintAndLog("Make PDOL data not implemented!");
205
206 //9F02:(Amount, authorized (Numeric)) len:6
207 TLV_ADD(0x9F02, "\x00\x00\x00\x00\x01\x00");
208 //9F1A:(Terminal Country Code) len:2
209 TLV_ADD(0x9F1A, "ru");
210 //5F2A:(Transaction Currency Code) len:2
211 // USD 840, EUR 978, RUR 810, RUB 643, RUR 810(old), UAH 980, AZN 031, n/a 999
212 TLV_ADD(0x5F2A, "\x09\x80");
213 //9A:(Transaction Date) len:3
214 TLV_ADD(0x9A, "\x00\x00\x00");
215 //9C:(Transaction Type) len:1 | 00 => Goods and service #01 => Cash
216 TLV_ADD(0x9C, "\x00");
217 // 9F37 Unpredictable Number len:4
218 TLV_ADD(0x9F37, "\x01\x02\x03\x04");
219 // 9F6A Unpredictable Number (MSD for UDOL) len:4
220 TLV_ADD(0x9F6A, "\x01\x02\x03\x04");
221 //9F66:(Terminal Transaction Qualifiers (TTQ)) len:4
222 TLV_ADD(0x9F66, "\x26\x00\x00\x00"); // qVSDC
223
224 if (paramsLoadFromFile) {
225 };
226 /* pdol_data_tlv = dol_process(tlvdb_get(tlvRoot, 0x9f38, NULL), tlvRoot, 0x83);
227 if (!pdol_data_tlv){
228 PrintAndLog("ERROR: can't create PDOL TLV.");
229 tlvdb_free(tlvRoot);
230 return 4;
231 }*/
232 return 0;
233 } else {
234 pdol_data_tlv = &data_tlv;
235 }
236
237 size_t pdol_data_tlv_data_len = 0;
238 unsigned char *pdol_data_tlv_data = tlv_encode(pdol_data_tlv, &pdol_data_tlv_data_len);
239 if (!pdol_data_tlv_data) {
240 PrintAndLog("ERROR: can't create PDOL data.");
241 tlvdb_free(tlvRoot);
242 return 4;
243 }
244 PrintAndLog("PDOL data[%d]: %s", pdol_data_tlv_data_len, sprint_hex(pdol_data_tlv_data, pdol_data_tlv_data_len));
245
246 // exec
247 uint8_t buf[APDU_RES_LEN] = {0};
248 size_t len = 0;
249 uint16_t sw = 0;
250 int res = EMVGPO(leaveSignalON, pdol_data_tlv_data, pdol_data_tlv_data_len, buf, sizeof(buf), &len, &sw, tlvRoot);
251
252 free(pdol_data_tlv_data);
253 tlvdb_free(tlvRoot);
254
255 if (sw)
256 PrintAndLog("APDU response status: %04x - %s", sw, GetAPDUCodeDescription(sw >> 8, sw & 0xff));
257
258 if (res)
259 return res;
260
261 if (decodeTLV)
262 TLVPrintFromBuffer(buf, len);
263
264 return 0;
265 }
266
267 int CmdHFEMVReadRecord(const char *cmd) {
268 uint8_t data[APDU_RES_LEN] = {0};
269 int datalen = 0;
270
271 CLIParserInit("hf 14a readrec",
272 "Executes Read Record command. It returns data in TLV format.\nNeeds a bank applet to be selected and sometimes needs GPO to be executed.",
273 "Usage:\n\thf emv readrec -k 0101 -> read file SFI=01, SFIrec=01\n\thf emv readrec -kt 0201-> read file 0201 and show result in TLV\n");
274
275 void* argtable[] = {
276 arg_param_begin,
277 arg_lit0("kK", "keep", "keep field ON for next command"),
278 arg_lit0("aA", "apdu", "show APDU reqests and responses"),
279 arg_lit0("tT", "tlv", "TLV decode results of selected applets"),
280 arg_str1(NULL, NULL, "<SFI 1byte HEX><SFIrec 1byte HEX>", NULL),
281 arg_param_end
282 };
283 CLIExecWithReturn(cmd, argtable, true);
284
285 bool leaveSignalON = arg_get_lit(1);
286 bool APDULogging = arg_get_lit(2);
287 bool decodeTLV = arg_get_lit(3);
288 CLIGetStrWithReturn(4, data, &datalen);
289 CLIParserFree();
290
291 if (datalen != 2) {
292 PrintAndLog("ERROR: Command needs to have 2 bytes of data");
293 return 1;
294 }
295
296 SetAPDULogging(APDULogging);
297
298 // exec
299 uint8_t buf[APDU_RES_LEN] = {0};
300 size_t len = 0;
301 uint16_t sw = 0;
302 int res = EMVReadRecord(leaveSignalON, data[0], data[1], buf, sizeof(buf), &len, &sw, NULL);
303
304 if (sw)
305 PrintAndLog("APDU response status: %04x - %s", sw, GetAPDUCodeDescription(sw >> 8, sw & 0xff));
306
307 if (res)
308 return res;
309
310
311 if (decodeTLV)
312 TLVPrintFromBuffer(buf, len);
313
314 return 0;
315 }
316
317 int CmdHFEMVAC(const char *cmd) {
318 uint8_t data[APDU_RES_LEN] = {0};
319 int datalen = 0;
320
321 CLIParserInit("hf 14a genac",
322 "Generate Application Cryptogram command. It returns data in TLV format .\nNeeds a EMV applet to be selected and GPO to be executed.",
323 "Usage:\n\thf emv genac -k 0102 -> execute GPO with 2-byte CDOLdata and keep field ON after command\n"
324 "\thf emv genac -t 01020304 -> execute GPO with 4-byte CDOL data, show result in TLV\n");
325
326 void* argtable[] = {
327 arg_param_begin,
328 arg_lit0("kK", "keep", "keep field ON for next command"),
329 arg_lit0("cC", "cda", "executes CDA transaction. Needs to get SDAD in results."),
330 arg_lit0("aA", "apdu", "show APDU reqests and responses"),
331 arg_lit0("tT", "tlv", "TLV decode results of selected applets"),
332 arg_str1(NULL, NULL, "<HEX CDOLdata>", NULL),
333 arg_param_end
334 };
335 CLIExecWithReturn(cmd, argtable, false);
336
337 bool leaveSignalON = arg_get_lit(1);
338 bool trTypeCDA = arg_get_lit(2);
339 bool APDULogging = arg_get_lit(3);
340 bool decodeTLV = arg_get_lit(4);
341 CLIGetStrWithReturn(5, data, &datalen);
342 CLIParserFree();
343
344 SetAPDULogging(APDULogging);
345
346 // Init TLV tree
347 const char *alr = "Root terminal TLV tree";
348 struct tlvdb *tlvRoot = tlvdb_fixed(1, strlen(alr), (const unsigned char *)alr);
349
350 // calc CDOL
351 struct tlv *cdol_data_tlv = NULL;
352 // struct tlv *cdol_data_tlv = dol_process(tlvdb_get(tlvRoot, 0x8c, NULL), tlvRoot, 0x01); // 0x01 - dummy tag
353 struct tlv data_tlv = {
354 .tag = 0x01,
355 .len = datalen,
356 .value = (uint8_t *)data,
357 };
358 cdol_data_tlv = &data_tlv;
359 PrintAndLog("CDOL data[%d]: %s", cdol_data_tlv->len, sprint_hex(cdol_data_tlv->value, cdol_data_tlv->len));
360
361 // exec
362 uint8_t buf[APDU_RES_LEN] = {0};
363 size_t len = 0;
364 uint16_t sw = 0;
365 int res = EMVAC(leaveSignalON, (trTypeCDA) ? EMVAC_TC + EMVAC_CDAREQ : EMVAC_TC, (uint8_t *)cdol_data_tlv->value, cdol_data_tlv->len, buf, sizeof(buf), &len, &sw, tlvRoot);
366
367 // free(cdol_data_tlv);
368 tlvdb_free(tlvRoot);
369
370 if (sw)
371 PrintAndLog("APDU response status: %04x - %s", sw, GetAPDUCodeDescription(sw >> 8, sw & 0xff));
372
373 if (res)
374 return res;
375
376 if (decodeTLV)
377 TLVPrintFromBuffer(buf, len);
378
379 return 0;
380 }
381
382 int CmdHFEMVGenerateChallenge(const char *cmd) {
383
384 CLIParserInit("hf 14a challenge",
385 "Executes Generate Challenge command. It returns 4 or 8-byte random number from card:\n",
386 "Usage:\n\thf emv challenge -> get challenge\n\thf emv challenge -k -> get challenge, keep fileld ON\n");
387
388 void* argtable[] = {
389 arg_param_begin,
390 arg_lit0("kK", "keep", "keep field ON for next command"),
391 arg_lit0("aA", "apdu", "show APDU reqests and responses"),
392 arg_param_end
393 };
394 CLIExecWithReturn(cmd, argtable, true);
395
396 bool leaveSignalON = arg_get_lit(1);
397 bool APDULogging = arg_get_lit(2);
398 CLIParserFree();
399
400 SetAPDULogging(APDULogging);
401
402 // exec
403 uint8_t buf[APDU_RES_LEN] = {0};
404 size_t len = 0;
405 uint16_t sw = 0;
406 int res = EMVGenerateChallenge(leaveSignalON, buf, sizeof(buf), &len, &sw, NULL);
407
408 if (sw)
409 PrintAndLog("APDU response status: %04x - %s", sw, GetAPDUCodeDescription(sw >> 8, sw & 0xff));
410
411 if (res)
412 return res;
413
414 PrintAndLog("Challenge: %s", sprint_hex(buf, len));
415
416 if (len != 4 && len != 8)
417 PrintAndLog("WARNING: length of challenge must be 4 or 8, but it %d", len);
418
419 return 0;
420 }
421
422 int CmdHFEMVInternalAuthenticate(const char *cmd) {
423 uint8_t data[APDU_RES_LEN] = {0};
424 int datalen = 0;
425
426 CLIParserInit("hf 14a intauth",
427 "Generate Internal Authenticate command. Usually needs 4-byte random number. It returns data in TLV format .\nNeeds a EMV applet to be selected and GPO to be executed.",
428 "Usage:\n\thf emv intauth -k 01020304 -> execute Internal Authenticate with 4-byte DDOLdata and keep field ON after command\n"
429 "\thf emv intauth -t 01020304 -> execute Internal Authenticate with 4-byte DDOL data, show result in TLV\n");
430
431 void* argtable[] = {
432 arg_param_begin,
433 arg_lit0("kK", "keep", "keep field ON for next command"),
434 arg_lit0("aA", "apdu", "show APDU reqests and responses"),
435 arg_lit0("tT", "tlv", "TLV decode results of selected applets"),
436 arg_str1(NULL, NULL, "<HEX DDOLdata>", NULL),
437 arg_param_end
438 };
439 CLIExecWithReturn(cmd, argtable, false);
440
441 bool leaveSignalON = arg_get_lit(1);
442 bool APDULogging = arg_get_lit(2);
443 bool decodeTLV = arg_get_lit(3);
444 CLIGetStrWithReturn(4, data, &datalen);
445 CLIParserFree();
446
447 SetAPDULogging(APDULogging);
448
449 // DDOL
450 PrintAndLog("DDOL data[%d]: %s", datalen, sprint_hex(data, datalen));
451
452 // exec
453 uint8_t buf[APDU_RES_LEN] = {0};
454 size_t len = 0;
455 uint16_t sw = 0;
456 int res = EMVInternalAuthenticate(leaveSignalON, data, datalen, buf, sizeof(buf), &len, &sw, NULL);
457
458 if (sw)
459 PrintAndLog("APDU response status: %04x - %s", sw, GetAPDUCodeDescription(sw >> 8, sw & 0xff));
460
461 if (res)
462 return res;
463
464 if (decodeTLV)
465 TLVPrintFromBuffer(buf, len);
466
467 return 0;
468 }
469
470 int UsageCmdHFEMVExec(void) {
471 PrintAndLog("HELP : Executes EMV contactless transaction:\n");
472 PrintAndLog("Usage: hf emv exec [-s][-a][-t][-f][-v][-c][-x][-g]\n");
473 PrintAndLog(" Options:");
474 PrintAndLog(" -s : select card");
475 PrintAndLog(" -a : show APDU reqests and responses\n");
476 PrintAndLog(" -t : TLV decode results\n");
477 PrintAndLog(" -f : force search AID. Search AID instead of execute PPSE.\n");
478 PrintAndLog(" -v : transaction type - qVSDC or M/Chip.\n");
479 PrintAndLog(" -c : transaction type - qVSDC or M/Chip plus CDA (SDAD generation).\n");
480 PrintAndLog(" -x : transaction type - VSDC. For test only. Not a standart behavior.\n");
481 PrintAndLog(" -g : VISA. generate AC from GPO\n");
482 PrintAndLog("By default : transaction type - MSD.\n");
483 PrintAndLog("Samples:");
484 PrintAndLog(" hf emv exec -s -a -t -> execute MSD transaction");
485 PrintAndLog(" hf emv exec -s -a -t -c -> execute CDA transaction");
486 return 0;
487 }
488
489 #define dreturn(n) {free(pdol_data_tlv);tlvdb_free(tlvSelect);tlvdb_free(tlvRoot);DropField();return n;}
490
491 int CmdHFEMVExec(const char *cmd) {
492 bool activateField = false;
493 bool showAPDU = false;
494 bool decodeTLV = false;
495 bool forceSearch = false;
496 enum TransactionType TrType = TT_MSD;
497 bool GenACGPO = false;
498
499 uint8_t buf[APDU_RES_LEN] = {0};
500 size_t len = 0;
501 uint16_t sw = 0;
502 uint8_t AID[APDU_AID_LEN] = {0};
503 size_t AIDlen = 0;
504 uint8_t ODAiList[4096];
505 size_t ODAiListLen = 0;
506
507 int res;
508
509 struct tlvdb *tlvSelect = NULL;
510 struct tlvdb *tlvRoot = NULL;
511 struct tlv *pdol_data_tlv = NULL;
512
513 if (strlen(cmd) < 1) {
514 UsageCmdHFEMVExec();
515 return 0;
516 }
517
518 int cmdp = 0;
519 while(param_getchar(cmd, cmdp) != 0x00) {
520 char c = param_getchar(cmd, cmdp);
521 if ((c == '-') && (param_getlength(cmd, cmdp) == 2))
522 switch (param_getchar_indx(cmd, 1, cmdp)) {
523 case 'h':
524 case 'H':
525 UsageCmdHFEMVExec();
526 return 0;
527 case 's':
528 case 'S':
529 activateField = true;
530 break;
531 case 'a':
532 case 'A':
533 showAPDU = true;
534 break;
535 case 't':
536 case 'T':
537 decodeTLV = true;
538 break;
539 case 'f':
540 case 'F':
541 forceSearch = true;
542 break;
543 case 'x':
544 case 'X':
545 TrType = TT_VSDC;
546 break;
547 case 'v':
548 case 'V':
549 TrType = TT_QVSDCMCHIP;
550 break;
551 case 'c':
552 case 'C':
553 TrType = TT_CDA;
554 break;
555 case 'g':
556 case 'G':
557 GenACGPO = true;
558 break;
559 default:
560 PrintAndLog("Unknown parameter '%c'", param_getchar_indx(cmd, 1, cmdp));
561 return 1;
562 }
563 cmdp++;
564 }
565
566
567 // init applets list tree
568 const char *al = "Applets list";
569 tlvSelect = tlvdb_fixed(1, strlen(al), (const unsigned char *)al);
570
571 // Application Selection
572 // https://www.openscdp.org/scripts/tutorial/emv/applicationselection.html
573 if (!forceSearch) {
574 // PPSE
575 PrintAndLog("\n* PPSE.");
576 SetAPDULogging(showAPDU);
577 res = EMVSearchPSE(activateField, true, decodeTLV, tlvSelect);
578
579 // check PPSE and select application id
580 if (!res) {
581 TLVPrintAIDlistFromSelectTLV(tlvSelect);
582 EMVSelectApplication(tlvSelect, AID, &AIDlen);
583 }
584 }
585
586 // Search
587 if (!AIDlen) {
588 PrintAndLog("\n* Search AID in list.");
589 SetAPDULogging(false);
590 if (EMVSearch(activateField, true, decodeTLV, tlvSelect)) {
591 dreturn(2);
592 }
593
594 // check search and select application id
595 TLVPrintAIDlistFromSelectTLV(tlvSelect);
596 EMVSelectApplication(tlvSelect, AID, &AIDlen);
597 }
598
599 // Init TLV tree
600 const char *alr = "Root terminal TLV tree";
601 tlvRoot = tlvdb_fixed(1, strlen(alr), (const unsigned char *)alr);
602
603 // check if we found EMV application on card
604 if (!AIDlen) {
605 PrintAndLog("Can't select AID. EMV AID not found");
606 dreturn(2);
607 }
608
609 // Select
610 PrintAndLog("\n* Selecting AID:%s", sprint_hex_inrow(AID, AIDlen));
611 SetAPDULogging(showAPDU);
612 res = EMVSelect(false, true, AID, AIDlen, buf, sizeof(buf), &len, &sw, tlvRoot);
613
614 if (res) {
615 PrintAndLog("Can't select AID (%d). Exit...", res);
616 dreturn(3);
617 }
618
619 if (decodeTLV)
620 TLVPrintFromBuffer(buf, len);
621 PrintAndLog("* Selected.");
622
623 PrintAndLog("\n* Init transaction parameters.");
624
625 //9F66:(Terminal Transaction Qualifiers (TTQ)) len:4
626 char *qVSDC = "\x26\x00\x00\x00";
627 if (GenACGPO) {
628 qVSDC = "\x26\x80\x00\x00";
629 }
630 switch(TrType) {
631 case TT_MSD:
632 TLV_ADD(0x9F66, "\x86\x00\x00\x00"); // MSD
633 break;
634 // not standard for contactless. just for test.
635 case TT_VSDC:
636 TLV_ADD(0x9F66, "\x46\x00\x00\x00"); // VSDC
637 break;
638 case TT_QVSDCMCHIP:
639 TLV_ADD(0x9F66, qVSDC); // qVSDC
640 break;
641 case TT_CDA:
642 TLV_ADD(0x9F66, qVSDC); // qVSDC (VISA CDA not enabled)
643 break;
644 default:
645 TLV_ADD(0x9F66, "\x26\x00\x00\x00"); // qVSDC
646 break;
647 }
648
649 //9F02:(Amount, authorized (Numeric)) len:6
650 TLV_ADD(0x9F02, "\x00\x00\x00\x00\x01\x00");
651 //9F1A:(Terminal Country Code) len:2
652 TLV_ADD(0x9F1A, "ru");
653 //5F2A:(Transaction Currency Code) len:2
654 // USD 840, EUR 978, RUR 810, RUB 643, RUR 810(old), UAH 980, AZN 031, n/a 999
655 TLV_ADD(0x5F2A, "\x09\x80");
656 //9A:(Transaction Date) len:3
657 TLV_ADD(0x9A, "\x00\x00\x00");
658 //9C:(Transaction Type) len:1 | 00 => Goods and service #01 => Cash
659 TLV_ADD(0x9C, "\x00");
660 // 9F37 Unpredictable Number len:4
661 TLV_ADD(0x9F37, "\x01\x02\x03\x04");
662 // 9F6A Unpredictable Number (MSD for UDOL) len:4
663 TLV_ADD(0x9F6A, "\x01\x02\x03\x04");
664
665 TLVPrintFromTLV(tlvRoot); // TODO delete!!!
666
667 PrintAndLog("\n* Calc PDOL.");
668 pdol_data_tlv = dol_process(tlvdb_get(tlvRoot, 0x9f38, NULL), tlvRoot, 0x83);
669 if (!pdol_data_tlv){
670 PrintAndLog("ERROR: can't create PDOL TLV.");
671 dreturn(4);
672 }
673
674 size_t pdol_data_tlv_data_len;
675 unsigned char *pdol_data_tlv_data = tlv_encode(pdol_data_tlv, &pdol_data_tlv_data_len);
676 if (!pdol_data_tlv_data) {
677 PrintAndLog("ERROR: can't create PDOL data.");
678 dreturn(4);
679 }
680 PrintAndLog("PDOL data[%d]: %s", pdol_data_tlv_data_len, sprint_hex(pdol_data_tlv_data, pdol_data_tlv_data_len));
681
682 PrintAndLog("\n* GPO.");
683 res = EMVGPO(true, pdol_data_tlv_data, pdol_data_tlv_data_len, buf, sizeof(buf), &len, &sw, tlvRoot);
684
685 free(pdol_data_tlv_data);
686 //free(pdol_data_tlv); --- free on exit.
687
688 if (res) {
689 PrintAndLog("GPO error(%d): %4x. Exit...", res, sw);
690 dreturn(5);
691 }
692
693 // process response template format 1 [id:80 2b AIP + x4b AFL] and format 2 [id:77 TLV]
694 if (buf[0] == 0x80) {
695 if (decodeTLV){
696 PrintAndLog("GPO response format1:");
697 TLVPrintFromBuffer(buf, len);
698 }
699
700 if (len < 4 || (len - 4) % 4) {
701 PrintAndLog("ERROR: GPO response format1 parsing error. length=%d", len);
702 } else {
703 // AIP
704 struct tlvdb * f1AIP = tlvdb_fixed(0x82, 2, buf + 2);
705 tlvdb_add(tlvRoot, f1AIP);
706 if (decodeTLV){
707 PrintAndLog("\n* * Decode response format 1 (0x80) AIP and AFL:");
708 TLVPrintFromTLV(f1AIP);
709 }
710
711 // AFL
712 struct tlvdb * f1AFL = tlvdb_fixed(0x94, len - 4, buf + 2 + 2);
713 tlvdb_add(tlvRoot, f1AFL);
714 if (decodeTLV)
715 TLVPrintFromTLV(f1AFL);
716 }
717 } else {
718 if (decodeTLV)
719 TLVPrintFromBuffer(buf, len);
720 }
721
722 // extract PAN from track2
723 {
724 const struct tlv *track2 = tlvdb_get(tlvRoot, 0x57, NULL);
725 if (!tlvdb_get(tlvRoot, 0x5a, NULL) && track2 && track2->len >= 8) {
726 struct tlvdb *pan = GetPANFromTrack2(track2);
727 if (pan) {
728 tlvdb_add(tlvRoot, pan);
729
730 const struct tlv *pantlv = tlvdb_get(tlvRoot, 0x5a, NULL);
731 PrintAndLog("\n* * Extracted PAN from track2: %s", sprint_hex(pantlv->value, pantlv->len));
732 } else {
733 PrintAndLog("\n* * WARNING: Can't extract PAN from track2.");
734 }
735 }
736 }
737
738 PrintAndLog("\n* Read records from AFL.");
739 const struct tlv *AFL = tlvdb_get(tlvRoot, 0x94, NULL);
740 if (!AFL || !AFL->len) {
741 PrintAndLog("WARNING: AFL not found.");
742 }
743
744 while(AFL && AFL->len) {
745 if (AFL->len % 4) {
746 PrintAndLog("ERROR: Wrong AFL length: %d", AFL->len);
747 break;
748 }
749
750 for (int i = 0; i < AFL->len / 4; i++) {
751 uint8_t SFI = AFL->value[i * 4 + 0] >> 3;
752 uint8_t SFIstart = AFL->value[i * 4 + 1];
753 uint8_t SFIend = AFL->value[i * 4 + 2];
754 uint8_t SFIoffline = AFL->value[i * 4 + 3];
755
756 PrintAndLog("* * SFI[%02x] start:%02x end:%02x offline:%02x", SFI, SFIstart, SFIend, SFIoffline);
757 if (SFI == 0 || SFI == 31 || SFIstart == 0 || SFIstart > SFIend) {
758 PrintAndLog("SFI ERROR! Skipped...");
759 continue;
760 }
761
762 for(int n = SFIstart; n <= SFIend; n++) {
763 PrintAndLog("* * * SFI[%02x] %d", SFI, n);
764
765 res = EMVReadRecord(true, SFI, n, buf, sizeof(buf), &len, &sw, tlvRoot);
766 if (res) {
767 PrintAndLog("ERROR SFI[%02x]. APDU error %4x", SFI, sw);
768 continue;
769 }
770
771 if (decodeTLV) {
772 TLVPrintFromBuffer(buf, len);
773 PrintAndLog("");
774 }
775
776 // Build Input list for Offline Data Authentication
777 // EMV 4.3 book3 10.3, page 96
778 if (SFIoffline) {
779 if (SFI < 11) {
780 const unsigned char *abuf = buf;
781 size_t elmlen = len;
782 struct tlv e;
783 if (tlv_parse_tl(&abuf, &elmlen, &e)) {
784 memcpy(&ODAiList[ODAiListLen], &buf[len - elmlen], elmlen);
785 ODAiListLen += elmlen;
786 } else {
787 PrintAndLog("ERROR SFI[%02x]. Creating input list for Offline Data Authentication error.", SFI);
788 }
789 } else {
790 memcpy(&ODAiList[ODAiListLen], buf, len);
791 ODAiListLen += len;
792 }
793 }
794 }
795 }
796
797 break;
798 }
799
800 // copy Input list for Offline Data Authentication
801 if (ODAiListLen) {
802 struct tlvdb *oda = tlvdb_fixed(0x21, ODAiListLen, ODAiList); // not a standard tag
803 tlvdb_add(tlvRoot, oda);
804 PrintAndLog("* Input list for Offline Data Authentication added to TLV. len=%d \n", ODAiListLen);
805 }
806
807 // get AIP
808 const struct tlv *AIPtlv = tlvdb_get(tlvRoot, 0x82, NULL);
809 uint16_t AIP = AIPtlv->value[0] + AIPtlv->value[1] * 0x100;
810 PrintAndLog("* * AIP=%04x", AIP);
811
812 // SDA
813 if (AIP & 0x0040) {
814 PrintAndLog("\n* SDA");
815 trSDA(tlvRoot);
816 }
817
818 // DDA
819 if (AIP & 0x0020) {
820 PrintAndLog("\n* DDA");
821 trDDA(decodeTLV, tlvRoot);
822 }
823
824 // transaction check
825
826 // qVSDC
827 if (TrType == TT_QVSDCMCHIP|| TrType == TT_CDA){
828 // 9F26: Application Cryptogram
829 const struct tlv *AC = tlvdb_get(tlvRoot, 0x9F26, NULL);
830 if (AC) {
831 PrintAndLog("\n--> qVSDC transaction.");
832 PrintAndLog("* AC path");
833
834 // 9F36: Application Transaction Counter (ATC)
835 const struct tlv *ATC = tlvdb_get(tlvRoot, 0x9F36, NULL);
836 if (ATC) {
837
838 // 9F10: Issuer Application Data - optional
839 const struct tlv *IAD = tlvdb_get(tlvRoot, 0x9F10, NULL);
840
841 // print AC data
842 PrintAndLog("ATC: %s", sprint_hex(ATC->value, ATC->len));
843 PrintAndLog("AC: %s", sprint_hex(AC->value, AC->len));
844 if (IAD){
845 PrintAndLog("IAD: %s", sprint_hex(IAD->value, IAD->len));
846
847 if (IAD->len >= IAD->value[0] + 1) {
848 PrintAndLog("\tKey index: 0x%02x", IAD->value[1]);
849 PrintAndLog("\tCrypto ver: 0x%02x(%03d)", IAD->value[2], IAD->value[2]);
850 PrintAndLog("\tCVR:", sprint_hex(&IAD->value[3], IAD->value[0] - 2));
851 struct tlvdb * cvr = tlvdb_fixed(0x20, IAD->value[0] - 2, &IAD->value[3]);
852 TLVPrintFromTLVLev(cvr, 1);
853 }
854 } else {
855 PrintAndLog("WARNING: IAD not found.");
856 }
857
858 } else {
859 PrintAndLog("ERROR AC: Application Transaction Counter (ATC) not found.");
860 }
861 }
862 }
863
864 // Mastercard M/CHIP
865 if (GetCardPSVendor(AID, AIDlen) == CV_MASTERCARD && (TrType == TT_QVSDCMCHIP || TrType == TT_CDA)){
866 const struct tlv *CDOL1 = tlvdb_get(tlvRoot, 0x8c, NULL);
867 if (CDOL1 && GetCardPSVendor(AID, AIDlen) == CV_MASTERCARD) { // and m/chip transaction flag
868 PrintAndLog("\n--> Mastercard M/Chip transaction.");
869
870 PrintAndLog("* * Generate challenge");
871 res = EMVGenerateChallenge(true, buf, sizeof(buf), &len, &sw, tlvRoot);
872 if (res) {
873 PrintAndLog("ERROR GetChallenge. APDU error %4x", sw);
874 dreturn(6);
875 }
876 if (len < 4) {
877 PrintAndLog("ERROR GetChallenge. Wrong challenge length %d", len);
878 dreturn(6);
879 }
880
881 // ICC Dynamic Number
882 struct tlvdb * ICCDynN = tlvdb_fixed(0x9f4c, len, buf);
883 tlvdb_add(tlvRoot, ICCDynN);
884 if (decodeTLV){
885 PrintAndLog("\n* * ICC Dynamic Number:");
886 TLVPrintFromTLV(ICCDynN);
887 }
888
889 PrintAndLog("* * Calc CDOL1");
890 struct tlv *cdol_data_tlv = dol_process(tlvdb_get(tlvRoot, 0x8c, NULL), tlvRoot, 0x01); // 0x01 - dummy tag
891 if (!cdol_data_tlv){
892 PrintAndLog("ERROR: can't create CDOL1 TLV.");
893 dreturn(6);
894 }
895 PrintAndLog("CDOL1 data[%d]: %s", cdol_data_tlv->len, sprint_hex(cdol_data_tlv->value, cdol_data_tlv->len));
896
897 PrintAndLog("* * AC1");
898 // EMVAC_TC + EMVAC_CDAREQ --- to get SDAD
899 res = EMVAC(true, (TrType == TT_CDA) ? EMVAC_TC + EMVAC_CDAREQ : EMVAC_TC, (uint8_t *)cdol_data_tlv->value, cdol_data_tlv->len, buf, sizeof(buf), &len, &sw, tlvRoot);
900
901 if (res) {
902 PrintAndLog("AC1 error(%d): %4x. Exit...", res, sw);
903 dreturn(7);
904 }
905
906 if (decodeTLV)
907 TLVPrintFromBuffer(buf, len);
908
909 // CDA
910 PrintAndLog("\n* CDA:");
911 struct tlvdb *ac_tlv = tlvdb_parse_multi(buf, len);
912 res = trCDA(tlvRoot, ac_tlv, pdol_data_tlv, cdol_data_tlv);
913 if (res) {
914 PrintAndLog("CDA error (%d)", res);
915 }
916 free(ac_tlv);
917 free(cdol_data_tlv);
918
919 PrintAndLog("\n* M/Chip transaction result:");
920 // 9F27: Cryptogram Information Data (CID)
921 const struct tlv *CID = tlvdb_get(tlvRoot, 0x9F27, NULL);
922 if (CID) {
923 emv_tag_dump(CID, stdout, 0);
924 PrintAndLog("------------------------------");
925 if (CID->len > 0) {
926 switch(CID->value[0] & EMVAC_AC_MASK){
927 case EMVAC_AAC:
928 PrintAndLog("Transaction DECLINED.");
929 break;
930 case EMVAC_TC:
931 PrintAndLog("Transaction approved OFFLINE.");
932 break;
933 case EMVAC_ARQC:
934 PrintAndLog("Transaction approved ONLINE.");
935 break;
936 default:
937 PrintAndLog("ERROR: CID transaction code error %2x", CID->value[0] & EMVAC_AC_MASK);
938 break;
939 }
940 } else {
941 PrintAndLog("ERROR: Wrong CID length %d", CID->len);
942 }
943 } else {
944 PrintAndLog("ERROR: CID(9F27) not found.");
945 }
946
947 }
948 }
949
950 // MSD
951 if (AIP & 0x8000 && TrType == TT_MSD) {
952 PrintAndLog("\n--> MSD transaction.");
953
954 PrintAndLog("* MSD dCVV path. Check dCVV");
955
956 const struct tlv *track2 = tlvdb_get(tlvRoot, 0x57, NULL);
957 if (track2) {
958 PrintAndLog("Track2: %s", sprint_hex(track2->value, track2->len));
959
960 struct tlvdb *dCVV = GetdCVVRawFromTrack2(track2);
961 PrintAndLog("dCVV raw data:");
962 TLVPrintFromTLV(dCVV);
963
964 if (GetCardPSVendor(AID, AIDlen) == CV_MASTERCARD) {
965 PrintAndLog("\n* Mastercard calculate UDOL");
966
967 // UDOL (9F69)
968 const struct tlv *UDOL = tlvdb_get(tlvRoot, 0x9F69, NULL);
969 // UDOL(9F69) default: 9F6A (Unpredictable number) 4 bytes
970 const struct tlv defUDOL = {
971 .tag = 0x01,
972 .len = 3,
973 .value = (uint8_t *)"\x9f\x6a\x04",
974 };
975 if (!UDOL)
976 PrintAndLog("Use default UDOL.");
977
978 struct tlv *udol_data_tlv = dol_process(UDOL ? UDOL : &defUDOL, tlvRoot, 0x01); // 0x01 - dummy tag
979 if (!udol_data_tlv){
980 PrintAndLog("ERROR: can't create UDOL TLV.");
981 dreturn(8);
982 }
983
984 PrintAndLog("UDOL data[%d]: %s", udol_data_tlv->len, sprint_hex(udol_data_tlv->value, udol_data_tlv->len));
985
986 PrintAndLog("\n* Mastercard compute cryptographic checksum(UDOL)");
987
988 res = MSCComputeCryptoChecksum(true, (uint8_t *)udol_data_tlv->value, udol_data_tlv->len, buf, sizeof(buf), &len, &sw, tlvRoot);
989 if (res) {
990 PrintAndLog("ERROR Compute Crypto Checksum. APDU error %4x", sw);
991 free(udol_data_tlv);
992 dreturn(9);
993 }
994
995 if (decodeTLV) {
996 TLVPrintFromBuffer(buf, len);
997 PrintAndLog("");
998 }
999 free(udol_data_tlv);
1000
1001 }
1002 } else {
1003 PrintAndLog("ERROR MSD: Track2 data not found.");
1004 }
1005 }
1006
1007 // DropField
1008 DropField();
1009
1010 // Destroy TLV's
1011 free(pdol_data_tlv);
1012 tlvdb_free(tlvSelect);
1013 tlvdb_free(tlvRoot);
1014
1015 PrintAndLog("\n* Transaction completed.");
1016
1017 return 0;
1018 }
1019
1020 int CmdHFEMVTest(const char *cmd) {
1021 return ExecuteCryptoTests(true);
1022 }
1023
1024 int CmdHelp(const char *Cmd);
1025 static command_t CommandTable[] = {
1026 {"help", CmdHelp, 1, "This help"},
1027 {"exec", CmdHFEMVExec, 0, "Executes EMV contactless transaction."},
1028 {"pse", CmdHFEMVPPSE, 0, "Execute PPSE. It selects 2PAY.SYS.DDF01 or 1PAY.SYS.DDF01 directory."},
1029 {"search", CmdHFEMVSearch, 0, "Try to select all applets from applets list and print installed applets."},
1030 {"select", CmdHFEMVSelect, 0, "Select applet."},
1031 {"gpo", CmdHFEMVGPO, 0, "Execute GetProcessingOptions."},
1032 {"readrec", CmdHFEMVReadRecord, 0, "Read files from card."},
1033 {"genac", CmdHFEMVAC, 0, "Generate ApplicationCryptogram."},
1034 {"challenge", CmdHFEMVGenerateChallenge, 0, "Generate challenge."},
1035 {"intauth", CmdHFEMVInternalAuthenticate, 0, "Internal authentication."},
1036 {"test", CmdHFEMVTest, 0, "Crypto logic test."},
1037 {NULL, NULL, 0, NULL}
1038 };
1039
1040 int CmdHFEMV(const char *Cmd) {
1041 CmdsParse(CommandTable, Cmd);
1042 return 0;
1043 }
1044
1045 int CmdHelp(const char *Cmd) {
1046 CmdsHelp(CommandTable);
1047 return 0;
1048 }
Impressum, Datenschutz