]> git.zerfleddert.de Git - proxmark3-svn/blobdiff - client/cmdhfmf.c
Increased Mifare Esave & Eload filename array to 255 from 20
[proxmark3-svn] / client / cmdhfmf.c
index cc9b4c76df53d30f442a67bad0d97256b67181c6..5d2d3222561560be23593763919653b8eb756f1b 100644 (file)
@@ -140,80 +140,6 @@ int CmdHF14AMfWrBl(const char *Cmd)
        return 0;\r
 }\r
 \r
-int CmdHF14AMfUWrBl(const char *Cmd)\r
-{\r
-        uint8_t blockNo = 0;\r
-        uint8_t bldata[16] = {0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0};\r
-       UsbCommand resp;\r
-        \r
-        if (strlen(Cmd)<3) {\r
-                PrintAndLog("Usage:  hf mf uwrbl    <block number> <block data (8 hex symbols)>");\r
-                PrintAndLog("        sample: hf mf uwrbl 0 01020304");\r
-                return 0;\r
-        }       \r
-\r
-        blockNo = param_get8(Cmd, 0);\r
-        if (param_gethex(Cmd, 1, bldata, 8)) {\r
-                PrintAndLog("Block data must include 8 HEX symbols");\r
-                return 1;\r
-        }\r
-\r
-       switch(blockNo)\r
-       {\r
-       case 0:\r
-               PrintAndLog("Access Denied");\r
-               break;\r
-       case 1:\r
-               PrintAndLog("Access Denied");\r
-               break;\r
-       case 2:\r
-               PrintAndLog("--specialblock no:%02x", blockNo);\r
-                PrintAndLog("--data: %s", sprint_hex(bldata, 4));\r
-                UsbCommand c = {CMD_MIFAREU_WRITEBL, {blockNo}};\r
-                memcpy(c.d.asBytes, bldata, 4);\r
-                SendCommand(&c);\r
-\r
-                if (WaitForResponseTimeout(CMD_ACK,&resp,1500)) {\r
-                        uint8_t isOK  = resp.arg[0] & 0xff;\r
-                        PrintAndLog("isOk:%02x", isOK);\r
-                } else {\r
-                        PrintAndLog("Command execute timeout");\r
-                }\r
-               break;\r
-       case 3:\r
-               PrintAndLog("--specialblock no:%02x", blockNo);\r
-                PrintAndLog("--data: %s", sprint_hex(bldata, 4));\r
-                UsbCommand d = {CMD_MIFAREU_WRITEBL, {blockNo}};\r
-                memcpy(d.d.asBytes,bldata, 4);\r
-                SendCommand(&d);\r
-\r
-                if (WaitForResponseTimeout(CMD_ACK,&resp,1500)) {\r
-                        uint8_t isOK  = resp.arg[0] & 0xff;\r
-                        PrintAndLog("isOk:%02x", isOK);\r
-                } else {\r
-                        PrintAndLog("Command execute timeout");\r
-                }\r
-               break;\r
-       default: \r
-               PrintAndLog("--block no:%02x", blockNo);\r
-               PrintAndLog("--data: %s", sprint_hex(bldata, 4));               \r
-               //UsbCommand e = {CMD_MIFAREU_WRITEBL_COMPAT, {blockNo}};\r
-               //memcpy(e.d.asBytes,bldata, 16);\r
-               UsbCommand e = {CMD_MIFAREU_WRITEBL, {blockNo}};\r
-                memcpy(e.d.asBytes,bldata, 4);\r
-               SendCommand(&e);\r
-\r
-               if (WaitForResponseTimeout(CMD_ACK,&resp,1500)) {\r
-                       uint8_t isOK  = resp.arg[0] & 0xff;\r
-                       PrintAndLog("isOk:%02x", isOK);\r
-               } else {\r
-                       PrintAndLog("Command execute timeout");\r
-               }\r
-               break;\r
-       }\r
-        return 0;\r
-}\r
-\r
 int CmdHF14AMfRdBl(const char *Cmd)\r
 {\r
        uint8_t blockNo = 0;\r
@@ -262,129 +188,6 @@ int CmdHF14AMfRdBl(const char *Cmd)
   return 0;\r
 }\r
 \r
-int CmdHF14AMfURdBl(const char *Cmd)\r
-{\r
-        uint8_t blockNo = 0;\r
-\r
-        if (strlen(Cmd)<1) {\r
-                PrintAndLog("Usage:  hf mf urdbl    <block number>");\r
-                PrintAndLog("        sample: hf mf urdbl 0");\r
-                return 0;\r
-        }       \r
-        \r
-        blockNo = param_get8(Cmd, 0);\r
-        PrintAndLog("--block no:%02x", blockNo);\r
-        \r
-  UsbCommand c = {CMD_MIFAREU_READBL, {blockNo}};\r
-  SendCommand(&c);\r
-\r
-        UsbCommand resp;\r
-        if (WaitForResponseTimeout(CMD_ACK,&resp,1500)) {\r
-                uint8_t                isOK  = resp.arg[0] & 0xff;\r
-                uint8_t              * data  = resp.d.asBytes;\r
-\r
-                if (isOK)\r
-                        PrintAndLog("isOk:%02x data:%s", isOK, sprint_hex(data, 4));\r
-                else\r
-                        PrintAndLog("isOk:%02x", isOK);\r
-        } else {\r
-                PrintAndLog("Command execute timeout");\r
-        }\r
-\r
-  return 0;\r
-}\r
-\r
-int CmdHF14AMfURdCard(const char *Cmd)\r
-{\r
-        int i;\r
-        uint8_t sectorNo = 0;\r
-       uint8_t *lockbytes_t=NULL;\r
-       uint8_t lockbytes[2]={0,0};\r
-       bool bit[16]={0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0};\r
-        \r
-        uint8_t isOK  = 0;\r
-        uint8_t * data  = NULL;\r
-\r
-        if (sectorNo > 15) {\r
-                PrintAndLog("Sector number must be less than 16");\r
-                return 1;\r
-        }\r
-        PrintAndLog("Attempting to Read Ultralight... ");\r
-        \r
-       UsbCommand c = {CMD_MIFAREU_READCARD, {sectorNo}};\r
-       SendCommand(&c);\r
-\r
-        UsbCommand resp;\r
-        if (WaitForResponseTimeout(CMD_ACK,&resp,1500)) {\r
-                isOK  = resp.arg[0] & 0xff;\r
-                data  = resp.d.asBytes;\r
-\r
-                PrintAndLog("isOk:%02x", isOK);\r
-                if (isOK) \r
-                        for (i = 0; i < 16; i++) {\r
-                               switch(i){\r
-                                 case 2:\r
-                                       //process lock bytes\r
-                                       lockbytes_t=data+(i*4);\r
-                                       lockbytes[0]=lockbytes_t[2];\r
-                                       lockbytes[1]=lockbytes_t[3];\r
-                                       for(int j=0; j<16; j++){\r
-                                               bit[j]=lockbytes[j/8] & ( 1 <<(7-j%8));\r
-                                       }\r
-                                       //PrintAndLog("LB %02x %02x", lockbytes[0],lockbytes[1]);\r
-                                       //PrintAndLog("LB2b %02x %02x %02x %02x %02x %02x %02x %02x",bit[8],bit[9],bit[10],bit[11],bit[12],bit[13],bit[14],bit[15]);            \r
-                                       PrintAndLog("Block %02x:%s ", i,sprint_hex(data + i * 4, 4));\r
-                                       break;\r
-                                 case 3: \r
-                                       PrintAndLog("Block %02x:%s [%d]", i,sprint_hex(data + i * 4, 4),bit[4]);\r
-                                       break;\r
-                                 case 4:\r
-                                        PrintAndLog("Block %02x:%s [%d]", i,sprint_hex(data + i * 4, 4),bit[3]);\r
-                                       break;\r
-                                 case 5:\r
-                                        PrintAndLog("Block %02x:%s [%d]", i,sprint_hex(data + i * 4, 4),bit[2]);\r
-                                       break;\r
-                                 case 6:\r
-                                        PrintAndLog("Block %02x:%s [%d]", i,sprint_hex(data + i * 4, 4),bit[1]);\r
-                                       break;\r
-                                 case 7:\r
-                                        PrintAndLog("Block %02x:%s [%d]", i,sprint_hex(data + i * 4, 4),bit[0]);\r
-                                       break;\r
-                                 case 8:\r
-                                        PrintAndLog("Block %02x:%s [%d]", i,sprint_hex(data + i * 4, 4),bit[15]);\r
-                                       break;\r
-                                 case 9:\r
-                                        PrintAndLog("Block %02x:%s [%d]", i,sprint_hex(data + i * 4, 4),bit[14]);\r
-                                       break;\r
-                                 case 10:\r
-                                        PrintAndLog("Block %02x:%s [%d]", i,sprint_hex(data + i * 4, 4),bit[13]);\r
-                                       break;\r
-                                 case 11:\r
-                                        PrintAndLog("Block %02x:%s [%d]", i,sprint_hex(data + i * 4, 4),bit[12]);\r
-                                       break;\r
-                                 case 12:\r
-                                        PrintAndLog("Block %02x:%s [%d]", i,sprint_hex(data + i * 4, 4),bit[11]);\r
-                                       break;\r
-                                 case 13:\r
-                                        PrintAndLog("Block %02x:%s [%d]", i,sprint_hex(data + i * 4, 4),bit[10]);\r
-                                       break;\r
-                                 case 14:\r
-                                        PrintAndLog("Block %02x:%s [%d]", i,sprint_hex(data + i * 4, 4),bit[9]);\r
-                                       break;\r
-                                 case 15:\r
-                                        PrintAndLog("Block %02x:%s [%d]", i,sprint_hex(data + i * 4, 4),bit[8]);\r
-                                       break;\r
-                                 default:\r
-                                       PrintAndLog("Block %02x:%s ", i,sprint_hex(data + i * 4, 4));\r
-                                       break;\r
-                               }\r
-                        }\r
-        } else {\r
-                PrintAndLog("Command1 execute timeout");\r
-        }\r
-  return 0;\r
-}\r
-\r
 int CmdHF14AMfRdSc(const char *Cmd)\r
 {\r
        int i;\r
@@ -619,13 +422,13 @@ int CmdHF14AMfRestore(const char *Cmd)
        \r
        for (i=0 ; i<16 ; i++) {\r
                if (fread(keyA[i], 1, 6, fkeys) == 0) {\r
-      PrintAndLog("File reading error.");\r
+                       PrintAndLog("File reading error.");\r
                        return 2;\r
     }\r
        }\r
        for (i=0 ; i<16 ; i++) {\r
                if (fread(keyB[i], 1, 6, fkeys) == 0) {\r
-      PrintAndLog("File reading error.");\r
+                       PrintAndLog("File reading error.");\r
                        return 2;\r
     }\r
        }\r
@@ -638,8 +441,8 @@ int CmdHF14AMfRestore(const char *Cmd)
                        memcpy(c.d.asBytes, key, 6);\r
                        \r
                        if (fread(bldata, 1, 16, fdump) == 0) {\r
-        PrintAndLog("File reading error.");\r
-        return 2;\r
+                               PrintAndLog("File reading error.");\r
+                               return 2;\r
       }\r
                                        \r
                        if (j == 3) {\r
@@ -673,7 +476,7 @@ int CmdHF14AMfRestore(const char *Cmd)
                        SendCommand(&c);\r
 \r
                        UsbCommand resp;\r
-      if (WaitForResponseTimeout(CMD_ACK,&resp,1500)) {\r
+                       if (WaitForResponseTimeout(CMD_ACK,&resp,1500)) {\r
                                uint8_t isOK  = resp.arg[0] & 0xff;\r
                                PrintAndLog("isOk:%02x", isOK);\r
                        } else {\r
@@ -1304,24 +1107,28 @@ int CmdHF14AMfESet(const char *Cmd)
 int CmdHF14AMfELoad(const char *Cmd)\r
 {\r
        FILE * f;\r
-       char filename[20];\r
+       char filename[255];\r
        char * fnameptr = filename;\r
        char buf[64];\r
        uint8_t buf8[64];\r
        int i, len, blockNum;\r
+       bool 4kcard = 0;\r
        \r
        memset(filename, 0, sizeof(filename));\r
        memset(buf, 0, sizeof(buf));\r
 \r
        if (param_getchar(Cmd, 0) == 'h' || param_getchar(Cmd, 0)== 0x00) {\r
                PrintAndLog("It loads emul dump from the file `filename.eml`");\r
-               PrintAndLog("Usage:  hf mf eload <file name w/o `.eml`>");\r
-               PrintAndLog(" sample: hf mf eload filename");\r
+               PrintAndLog("Usage:  hf mf eload <file name w/o `.eml`> <4 - 4kcard>");\r
+               PrintAndLog(" sample: hf mf eload filename [4]");\r
                return 0;\r
        }       \r
 \r
+       size = param_getchar(Cmd, 1);\r
+        if (size == '4') 4kcard = 1;\r
+\r
        len = strlen(Cmd);\r
-       if (len > 14) len = 14;\r
+       if (len > 254) len = 254;\r
 \r
        memcpy(filename, Cmd, len);\r
        fnameptr += len;\r
@@ -1367,9 +1174,16 @@ int CmdHF14AMfELoad(const char *Cmd)
        }\r
        fclose(f);\r
        \r
-       if (blockNum != 16 * 4 && blockNum != 32 * 4 + 8 * 16){\r
-               PrintAndLog("File content error. There must be 64 blocks");\r
-               return 4;\r
+       if(4kcard){\r
+               if (blockNum != 32 * 4 + 8 * 16){\r
+                       PrintAndLog("File content error. There must be 64 blocks");\r
+                       return 4;\r
+               }\r
+       }else{\r
+               if (blockNum != 16 * 4 && blockNum != 32 * 4 + 8 * 16){\r
+                       PrintAndLog("File content error. There must be 64 blocks");\r
+                       return 4;\r
+               }\r
        }\r
        PrintAndLog("Loaded %d blocks from file: %s", blockNum, filename);\r
   return 0;\r
@@ -1378,7 +1192,7 @@ int CmdHF14AMfELoad(const char *Cmd)
 int CmdHF14AMfESave(const char *Cmd)\r
 {\r
        FILE * f;\r
-       char filename[20];\r
+       char filename[255];\r
        char * fnameptr = filename;\r
        uint8_t buf[64];\r
        int i, j, len;\r
@@ -1395,7 +1209,7 @@ int CmdHF14AMfESave(const char *Cmd)
        }       \r
 \r
        len = strlen(Cmd);\r
-       if (len > 14) len = 14;\r
+       if (len > 254) len = 254;\r
        \r
        if (len < 1) {\r
                // get filename\r
@@ -1917,31 +1731,28 @@ int CmdHF14AMfSniff(const char *Cmd){
 static command_t CommandTable[] =\r
 {\r
   {"help",             CmdHelp,                                                1, "This help"},\r
-  {"dbg",                      CmdHF14AMfDbg,                  0, "Set default debug mode"},\r
+  {"dbg",              CmdHF14AMfDbg,                  0, "Set default debug mode"},\r
   {"rdbl",             CmdHF14AMfRdBl,                 0, "Read MIFARE classic block"},\r
-  {"urdbl",              CmdHF14AMfURdBl,                 0, "Read MIFARE Ultralight block"},\r
-  {"urdcard",           CmdHF14AMfURdCard,               0,"Read MIFARE Ultralight Card"},\r
-  {"uwrbl",            CmdHF14AMfUWrBl,                0,"Write MIFARE Ultralight block"},\r
   {"rdsc",             CmdHF14AMfRdSc,                 0, "Read MIFARE classic sector"},\r
   {"dump",             CmdHF14AMfDump,                 0, "Dump MIFARE classic tag to binary file"},\r
-  {"restore",  CmdHF14AMfRestore,      0, "Restore MIFARE classic binary file to BLANK tag"},\r
+  {"restore",          CmdHF14AMfRestore,      0, "Restore MIFARE classic binary file to BLANK tag"},\r
   {"wrbl",             CmdHF14AMfWrBl,                 0, "Write MIFARE classic block"},\r
-  {"chk",                      CmdHF14AMfChk,                  0, "Test block keys"},\r
-  {"mifare",   CmdHF14AMifare,                 0, "Read parity error messages."},\r
-  {"nested",   CmdHF14AMfNested,               0, "Test nested authentication"},\r
+  {"chk",              CmdHF14AMfChk,                  0, "Test block keys"},\r
+  {"mifare",           CmdHF14AMifare,                 0, "Read parity error messages."},\r
+  {"nested",           CmdHF14AMfNested,               0, "Test nested authentication"},\r
   {"sniff",            CmdHF14AMfSniff,                0, "Sniff card-reader communication"},\r
-  {"sim",                      CmdHF14AMf1kSim,                0, "Simulate MIFARE card"},\r
+  {"sim",              CmdHF14AMf1kSim,                0, "Simulate MIFARE card"},\r
   {"eclr",             CmdHF14AMfEClear,               0, "Clear simulator memory block"},\r
   {"eget",             CmdHF14AMfEGet,                 0, "Get simulator memory block"},\r
   {"eset",             CmdHF14AMfESet,                 0, "Set simulator memory block"},\r
   {"eload",            CmdHF14AMfELoad,                0, "Load from file emul dump"},\r
   {"esave",            CmdHF14AMfESave,                0, "Save to file emul dump"},\r
-  {"ecfill",   CmdHF14AMfECFill,               0, "Fill simulator memory with help of keys from simulator"},\r
-  {"ekeyprn",  CmdHF14AMfEKeyPrn,      0, "Print keys from simulator memory"},\r
-  {"csetuid",  CmdHF14AMfCSetUID,      0, "Set UID for magic Chinese card"},\r
-  {"csetblk",  CmdHF14AMfCSetBlk,      0, "Write block into magic Chinese card"},\r
-  {"cgetblk",  CmdHF14AMfCGetBlk,      0, "Read block from magic Chinese card"},\r
-  {"cgetsc",   CmdHF14AMfCGetSc,               0, "Read sector from magic Chinese card"},\r
+  {"ecfill",           CmdHF14AMfECFill,               0, "Fill simulator memory with help of keys from simulator"},\r
+  {"ekeyprn",          CmdHF14AMfEKeyPrn,      0, "Print keys from simulator memory"},\r
+  {"csetuid",          CmdHF14AMfCSetUID,      0, "Set UID for magic Chinese card"},\r
+  {"csetblk",          CmdHF14AMfCSetBlk,      0, "Write block into magic Chinese card"},\r
+  {"cgetblk",          CmdHF14AMfCGetBlk,      0, "Read block from magic Chinese card"},\r
+  {"cgetsc",           CmdHF14AMfCGetSc,               0, "Read sector from magic Chinese card"},\r
   {"cload",            CmdHF14AMfCLoad,                0, "Load dump into magic Chinese card"},\r
   {"csave",            CmdHF14AMfCSave,                0, "Save dump from magic Chinese card into file or emulator"},\r
   {NULL, NULL, 0, NULL}\r
Impressum, Datenschutz