]> git.zerfleddert.de Git - proxmark3-svn/blobdiff - client/cmdlft55xx.c
fixed #541
[proxmark3-svn] / client / cmdlft55xx.c
index b287ce28efec268a710783ee506e159d8d8c7273..c5a6dd3f64623ed304c2487b50ae0238dedb7602 100644 (file)
@@ -24,6 +24,7 @@
 #include "data.h"\r
 #include "lfdemod.h"\r
 #include "cmdhf14a.h" //for getTagInfo\r
+#include "protocols.h"\r
 \r
 #define T55x7_CONFIGURATION_BLOCK 0x00\r
 #define T55x7_PAGE0 0x00\r
@@ -78,12 +79,13 @@ int usage_t55xx_read(){
        return 0;\r
 }\r
 int usage_t55xx_write(){\r
-       PrintAndLog("Usage:  lf t55xx write [b <block>] [d <data>] [p <password>] [1]");\r
+       PrintAndLog("Usage:  lf t55xx write [b <block>] [d <data>] [p <password>] [1] [t]");\r
        PrintAndLog("Options:");\r
        PrintAndLog("     b <block>    - block number to write. Between 0-7");\r
        PrintAndLog("     d <data>     - 4 bytes of data to write (8 hex characters)");\r
        PrintAndLog("     p <password> - OPTIONAL password 4bytes (8 hex characters)");\r
        PrintAndLog("     1            - OPTIONAL write Page 1 instead of Page 0");\r
+       PrintAndLog("     t            - OPTIONAL test mode write - ****DANGER****");   \r
        PrintAndLog("");\r
        PrintAndLog("Examples:");\r
        PrintAndLog("      lf t55xx write b 3 d 11223344            - write 11223344 to block 3");\r
@@ -138,15 +140,29 @@ int usage_t55xx_detect(){
        PrintAndLog("");\r
        return 0;\r
 }\r
+int usage_t55xx_detectP1(){\r
+       PrintAndLog("Command: Detect Page 1 of a t55xx chip");\r
+       PrintAndLog("Usage:  lf t55xx p1detect [1] [p <password>]");\r
+       PrintAndLog("Options:");\r
+       PrintAndLog("     1             - if set, use Graphbuffer otherwise read data from tag.");\r
+       PrintAndLog("     p <password>  - OPTIONAL password (8 hex characters)");\r
+       PrintAndLog("");\r
+       PrintAndLog("Examples:");\r
+       PrintAndLog("      lf t55xx p1detect");\r
+       PrintAndLog("      lf t55xx p1detect 1");\r
+       PrintAndLog("      lf t55xx p1detect p 11223344");\r
+       PrintAndLog("");\r
+       return 0;\r
+}\r
 int usage_t55xx_wakup(){\r
-       PrintAndLog("Usage:  lf t55xx wakeup [h] <password>");\r
+       PrintAndLog("Usage:  lf t55xx wakeup [h] <password>");\r
        PrintAndLog("This commands send the Answer-On-Request command and leaves the readerfield ON afterwards.");\r
        PrintAndLog("Options:");\r
        PrintAndLog("     h             - this help");\r
-       PrintAndLog("     p <password>  - password 4bytes (8 hex symbols)");\r
+       PrintAndLog("     <password>  - [required] password 4bytes (8 hex symbols)");\r
        PrintAndLog("");\r
        PrintAndLog("Examples:");\r
-               PrintAndLog("      lf t55xx wakeup 11223344  - send wakeup password");\r
+               PrintAndLog("      lf t55xx wakeup 11223344  - send wakeup password");\r
        return 0;\r
 }\r
 int usage_t55xx_bruteforce(){\r
@@ -220,7 +236,7 @@ int CmdT55xxSetConfig(const char *Cmd) {
                        cmdp+=2;\r
                        break;\r
                case 'd':\r
-                       param_getstr(Cmd, cmdp+1, modulation);\r
+                       param_getstr(Cmd, cmdp+1, modulation, sizeof(modulation));\r
                        cmdp += 2;\r
 \r
                        if ( strcmp(modulation, "FSK" ) == 0) {\r
@@ -403,23 +419,23 @@ bool DecodeT55xxBlock(){
                        break;\r
                case DEMOD_PSK1:\r
                        // skip first 160 samples to allow antenna to settle in (psk gets inverted occasionally otherwise)\r
-                       save_restoreGB(1);\r
+                       save_restoreGB(GRAPH_SAVE);\r
                        CmdLtrim("160");\r
                        snprintf(cmdStr, sizeof(buf),"%d %d 6", bitRate[config.bitrate], config.inverted );\r
                        ans = PSKDemod(cmdStr, false);\r
                        //undo trim samples\r
-                       save_restoreGB(0);\r
+                       save_restoreGB(GRAPH_RESTORE);\r
                        break;\r
                case DEMOD_PSK2: //inverted won't affect this\r
                case DEMOD_PSK3: //not fully implemented\r
                        // skip first 160 samples to allow antenna to settle in (psk gets inverted occasionally otherwise)\r
-                       save_restoreGB(1);\r
+                       save_restoreGB(GRAPH_SAVE);\r
                        CmdLtrim("160");\r
                        snprintf(cmdStr, sizeof(buf),"%d 0 6", bitRate[config.bitrate] );\r
                        ans = PSKDemod(cmdStr, false);\r
                        psk1TOpsk2(DemodBuffer, DemodBufferLen);\r
                        //undo trim samples\r
-                       save_restoreGB(0);\r
+                       save_restoreGB(GRAPH_RESTORE);\r
                        break;\r
                case DEMOD_NRZ:\r
                        snprintf(cmdStr, sizeof(buf),"%d %d 1", bitRate[config.bitrate], config.inverted );\r
@@ -490,9 +506,10 @@ bool tryDetectModulation(){
        uint8_t hits = 0;\r
        t55xx_conf_block_t tests[15];\r
        int bitRate=0;\r
-       uint8_t fc1 = 0, fc2 = 0, clk=0;\r
-       if (GetFskClock("", false, false)){ \r
-               fskClocks(&fc1, &fc2, &clk, false);\r
+       uint8_t fc1 = 0, fc2 = 0, ans = 0;\r
+       int clk = 0, firstClockEdge = 0;\r
+       ans = fskClocks(&fc1, &fc2, (uint8_t *)&clk, false, &firstClockEdge);\r
+       if (ans && ((fc1==10 && fc2==8) || (fc1==8 && fc2==5))) {\r
                if ( FSKrawDemod("0 0", false) && test(DEMOD_FSK, &tests[hits].offset, &bitRate, clk, &tests[hits].Q5)) {\r
                        tests[hits].modulation = DEMOD_FSK;\r
                        if (fc1==8 && fc2 == 5)\r
@@ -553,10 +570,8 @@ bool tryDetectModulation(){
                                ++hits;\r
                        }\r
                }\r
-               //undo trim from ask\r
-               //save_restoreGB(0);\r
                clk = GetNrzClock("", false, false);\r
-               if (clk>0) {\r
+               if (clk>8) { //clock of rf/8 is likely a false positive, so don't use it.\r
                        if ( NRZrawDemod("0 0 1", false)  && test(DEMOD_NRZ, &tests[hits].offset, &bitRate, clk, &tests[hits].Q5)) {\r
                                tests[hits].modulation = DEMOD_NRZ;\r
                                tests[hits].bitrate = bitRate;\r
@@ -576,12 +591,12 @@ bool tryDetectModulation(){
                        }\r
                }\r
                \r
-               // allow undo\r
-               // skip first 160 samples to allow antenna to settle in (psk gets inverted occasionally otherwise)\r
-               save_restoreGB(1);\r
-               CmdLtrim("160");\r
                clk = GetPskClock("", false, false);\r
                if (clk>0) {\r
+                       // allow undo\r
+                       save_restoreGB(GRAPH_SAVE);\r
+                       // skip first 160 samples to allow antenna to settle in (psk gets inverted occasionally otherwise)\r
+                       CmdLtrim("160");\r
                        if ( PSKDemod("0 0 6", false) && test(DEMOD_PSK1, &tests[hits].offset, &bitRate, clk, &tests[hits].Q5)) {\r
                                tests[hits].modulation = DEMOD_PSK1;\r
                                tests[hits].bitrate = bitRate;\r
@@ -622,9 +637,9 @@ bool tryDetectModulation(){
                                        ++hits;\r
                                }\r
                        } // inverse waves does not affect this demod\r
+                       //undo trim samples\r
+                       save_restoreGB(GRAPH_RESTORE);\r
                }\r
-               //undo trim samples\r
-               save_restoreGB(0);\r
        }       \r
        if ( hits == 1) {\r
                config.modulation = tests[0].modulation;\r
@@ -780,9 +795,7 @@ bool test(uint8_t mode, uint8_t *offset, int *fndBitRate, uint8_t clk, bool *Q5)
                // moved test to here, since this gets most faults first.\r
                if ( resv > 0x00) continue;\r
 \r
-               uint8_t xtRate   = PackBits(si, 3, DemodBuffer); si += 3;     //extended mode part of rate\r
-               int bitRate      = PackBits(si, 3, DemodBuffer); si += 3;     //bit rate\r
-               if (bitRate > 7) continue;\r
+               int bitRate      = PackBits(si, 6, DemodBuffer); si += 6;     //bit rate (includes extended mode part of rate)\r
                uint8_t extend   = PackBits(si, 1, DemodBuffer); si += 1;     //bit 15 extended mode\r
                uint8_t modread  = PackBits(si, 5, DemodBuffer); si += 5+2+1; \r
                //uint8_t pskcr   = PackBits(si, 2, DemodBuffer); si += 2+1;  //could check psk cr\r
@@ -792,12 +805,15 @@ bool test(uint8_t mode, uint8_t *offset, int *fndBitRate, uint8_t clk, bool *Q5)
                //if extended mode\r
                bool extMode =( (safer == 0x6 || safer == 0x9) && extend) ? true : false;\r
 \r
-               if (!extMode){\r
-                       if (xtRate) continue;  //nml01 || nml02 ||  caused issues on noralys tags\r
+               if (!extMode) {\r
+                       if (bitRate > 7) continue;\r
+                       if (!testBitRate(bitRate, clk)) continue;\r
+               } else { //extended mode bitrate = same function to calc bitrate as em4x05\r
+                       if (EM4x05_GET_BITRATE(bitRate) != clk) continue;\r
+\r
                }\r
                //test modulation\r
                if (!testModulation(mode, modread)) continue;\r
-               if (!testBitRate(bitRate, clk)) continue;\r
                *fndBitRate = bitRate;\r
                *offset = idx;\r
                *Q5 = false;\r
@@ -854,7 +870,7 @@ int special(const char *Cmd) {
 int printConfiguration( t55xx_conf_block_t b){\r
        PrintAndLog("Chip Type  : %s", (b.Q5) ? "T5555(Q5)" : "T55x7");\r
        PrintAndLog("Modulation : %s", GetSelectedModulationStr(b.modulation) );\r
-       PrintAndLog("Bit Rate   : %s", GetBitRateStr(b.bitrate) );\r
+       PrintAndLog("Bit Rate   : %s", GetBitRateStr(b.bitrate, (b.block0 & T55x7_X_MODE && (b.block0>>28==6 || b.block0>>28==9))) );\r
        PrintAndLog("Inverted   : %s", (b.inverted) ? "Yes" : "No" );\r
        PrintAndLog("Offset     : %d", b.offset);\r
        PrintAndLog("Seq. Term. : %s", (b.ST) ? "Yes" : "No" );\r
@@ -865,26 +881,11 @@ int printConfiguration( t55xx_conf_block_t b){
 \r
 int CmdT55xxWakeUp(const char *Cmd) {\r
        uint32_t password = 0;\r
-       uint8_t cmdp = 0;\r
-       bool errors = true;\r
-       while(param_getchar(Cmd, cmdp) != 0x00) {\r
-               switch(param_getchar(Cmd, cmdp)) {\r
-               case 'h':\r
-               case 'H':\r
-                       return usage_t55xx_wakup();\r
-               case 'p':\r
-               case 'P':\r
-                       password = param_get32ex(Cmd, cmdp+1, 0xFFFFFFFF, 16);\r
-                       cmdp += 2;\r
-                       errors = false;\r
-                       break;\r
-               default:\r
-                       PrintAndLog("Unknown parameter '%c'", param_getchar(Cmd, cmdp));\r
-                       errors = true;\r
-                       break;\r
-               }\r
-       }\r
-       if (errors) return usage_t55xx_wakup();\r
+       if ( strlen(Cmd) <= 0 ) return usage_t55xx_wakup();\r
+       char cmdp = param_getchar(Cmd, 0);\r
+       if ( cmdp == 'h' || cmdp == 'H') return usage_t55xx_wakup();\r
+\r
+       password = param_get32ex(Cmd, 0, 0, 16);\r
 \r
        UsbCommand c = {CMD_T55XX_WAKEUP, {password, 0, 0}};\r
        clearCommandBuffer();\r
@@ -900,6 +901,7 @@ int CmdT55xxWriteBlock(const char *Cmd) {
        bool usepwd = false;\r
        bool page1 = false;     \r
        bool gotdata = false;\r
+       bool testMode = false;\r
        bool errors = false;\r
        uint8_t cmdp = 0;\r
        while(param_getchar(Cmd, cmdp) != 0x00 && !errors) {\r
@@ -924,6 +926,11 @@ int CmdT55xxWriteBlock(const char *Cmd) {
                        usepwd = true;\r
                        cmdp += 2;\r
                        break;\r
+               case 't':\r
+               case 'T':\r
+                       testMode = true;\r
+                       cmdp++;\r
+                       break;\r
                case '1':\r
                        page1 = true;\r
                        cmdp++;\r
@@ -944,6 +951,7 @@ int CmdT55xxWriteBlock(const char *Cmd) {
        UsbCommand c = {CMD_T55XX_WRITE_BLOCK, {data, block, 0}};\r
        UsbCommand resp;\r
        c.d.asBytes[0] = (page1) ? 0x2 : 0; \r
+       c.d.asBytes[0] |= (testMode) ? 0x4 : 0; \r
 \r
        char pwdStr[16] = {0};\r
        snprintf(pwdStr, sizeof(pwdStr), "pwd: 0x%08X", password);\r
@@ -1168,7 +1176,7 @@ int CmdT55xxInfo(const char *Cmd){
        PrintAndLog("-------------------------------------------------------------");\r
        PrintAndLog(" Safer key                 : %s", GetSaferStr(safer));\r
        PrintAndLog(" reserved                  : %d", resv);\r
-       PrintAndLog(" Data bit rate             : %s", GetBitRateStr(dbr));\r
+       PrintAndLog(" Data bit rate             : %s", GetBitRateStr(dbr, extend));\r
        PrintAndLog(" eXtended mode             : %s", (extend) ? "Yes - Warning":"No");\r
        PrintAndLog(" Modulation                : %s", GetModulationStr(datamod));\r
        PrintAndLog(" PSK clock frequency       : %d", pskcf);\r
@@ -1195,7 +1203,7 @@ int CmdT55xxDump(const char *Cmd){
        bool override = false;\r
        if ( cmdp == 'h' || cmdp == 'H') return usage_t55xx_dump();\r
 \r
-       bool usepwd = ( strlen(Cmd) > 0);       \r
+       bool usepwd = ( strlen(Cmd) > 0);\r
        if ( usepwd ){\r
                password = param_get32ex(Cmd, 0, 0, 16);\r
                if (param_getchar(Cmd, 1) =='o' )\r
@@ -1226,28 +1234,28 @@ int AquireData( uint8_t page, uint8_t block, bool pwdmode, uint32_t password ){
                PrintAndLog("command execution time out");\r
                return 0;\r
        }\r
-\r
-       uint8_t got[12000];\r
-       GetFromBigBuf(got,sizeof(got),0);\r
-       WaitForResponse(CMD_ACK,NULL);\r
-       setGraphBuf(got, sizeof(got));\r
+       getSamples(12000,true);\r
        return 1;\r
 }\r
 \r
-char * GetBitRateStr(uint32_t id) {\r
+char * GetBitRateStr(uint32_t id, bool xmode) {\r
        static char buf[25];\r
 \r
        char *retStr = buf;\r
-       switch (id) {\r
-               case 0:   snprintf(retStr,sizeof(buf),"%d - RF/8",id);   break;\r
-               case 1:   snprintf(retStr,sizeof(buf),"%d - RF/16",id);  break;\r
-               case 2:   snprintf(retStr,sizeof(buf),"%d - RF/32",id);  break;\r
-               case 3:   snprintf(retStr,sizeof(buf),"%d - RF/40",id);  break;\r
-               case 4:   snprintf(retStr,sizeof(buf),"%d - RF/50",id);  break;\r
-               case 5:   snprintf(retStr,sizeof(buf),"%d - RF/64",id);  break;\r
-               case 6:   snprintf(retStr,sizeof(buf),"%d - RF/100",id); break;\r
-               case 7:   snprintf(retStr,sizeof(buf),"%d - RF/128",id); break;\r
-               default:  snprintf(retStr,sizeof(buf),"%d - (Unknown)",id); break;\r
+       if (xmode) { //xmode bitrate calc is same as em4x05 calc\r
+               snprintf(retStr,sizeof(buf),"%d - RF/%d", id, EM4x05_GET_BITRATE(id));\r
+       } else {\r
+               switch (id) {\r
+                       case 0:   snprintf(retStr,sizeof(buf),"%d - RF/8",id);   break;\r
+                       case 1:   snprintf(retStr,sizeof(buf),"%d - RF/16",id);  break;\r
+                       case 2:   snprintf(retStr,sizeof(buf),"%d - RF/32",id);  break;\r
+                       case 3:   snprintf(retStr,sizeof(buf),"%d - RF/40",id);  break;\r
+                       case 4:   snprintf(retStr,sizeof(buf),"%d - RF/50",id);  break;\r
+                       case 5:   snprintf(retStr,sizeof(buf),"%d - RF/64",id);  break;\r
+                       case 6:   snprintf(retStr,sizeof(buf),"%d - RF/100",id); break;\r
+                       case 7:   snprintf(retStr,sizeof(buf),"%d - RF/128",id); break;\r
+                       default:  snprintf(retStr,sizeof(buf),"%d - (Unknown)",id); break;\r
+               }               \r
        }\r
        return buf;\r
 }\r
@@ -1425,7 +1433,7 @@ int CmdT55xxBruteForce(const char *Cmd) {
                        //The line start with # is comment, skip\r
                        if( buf[0]=='#' ) continue;\r
 \r
-                       if (!isxdigit(buf[0])) {\r
+                       if (!isxdigit((unsigned char)buf[0])) {\r
                                PrintAndLog("File content error. '%s' must include 8 HEX symbols", buf);\r
                                continue;\r
                        }\r
@@ -1540,11 +1548,160 @@ int CmdT55xxBruteForce(const char *Cmd) {
        return 0;\r
 }\r
 \r
+// note length of data returned is different for different chips.  \r
+//   some return all page 1 (64 bits) and others return just that block (32 bits) \r
+//   unfortunately the 64 bits makes this more likely to get a false positive...\r
+bool tryDetectP1(bool getData) {\r
+       uint8_t preamble[] = {1,1,1,0,0,0,0,0,0,0,0,1,0,1,0,1};\r
+       size_t startIdx = 0;\r
+       uint8_t fc1 = 0, fc2 = 0, ans = 0;\r
+       int clk = 0, firstClockEdge = 0;\r
+       bool st = true;\r
+\r
+       if ( getData ) {\r
+               if ( !AquireData(T55x7_PAGE1, 1, false, 0) )\r
+                       return false;\r
+       }\r
+\r
+       // try fsk clock detect. if successful it cannot be any other type of modulation...  (in theory...)\r
+       ans = fskClocks(&fc1, &fc2, (uint8_t *)&clk, false, &firstClockEdge);\r
+       if (ans && ((fc1==10 && fc2==8) || (fc1==8 && fc2==5))) {\r
+               if ( FSKrawDemod("0 0", false) && \r
+                         preambleSearchEx(DemodBuffer,preamble,sizeof(preamble),&DemodBufferLen,&startIdx,false) && \r
+                         (DemodBufferLen == 32 || DemodBufferLen == 64) ) {\r
+                       return true;\r
+               }\r
+               if ( FSKrawDemod("0 1", false) && \r
+                         preambleSearchEx(DemodBuffer,preamble,sizeof(preamble),&DemodBufferLen,&startIdx,false) && \r
+                         (DemodBufferLen == 32 || DemodBufferLen == 64) ) {\r
+                       return true;\r
+               }\r
+               return false;\r
+       }\r
+\r
+       // try psk clock detect. if successful it cannot be any other type of modulation... (in theory...)\r
+       clk = GetPskClock("", false, false);\r
+       if (clk>0) {\r
+               // allow undo\r
+               // save_restoreGB(1);\r
+               // skip first 160 samples to allow antenna to settle in (psk gets inverted occasionally otherwise)\r
+               //CmdLtrim("160");\r
+               if ( PSKDemod("0 0 6", false) &&\r
+                         preambleSearchEx(DemodBuffer,preamble,sizeof(preamble),&DemodBufferLen,&startIdx,false) && \r
+                         (DemodBufferLen == 32 || DemodBufferLen == 64) ) {\r
+                       //save_restoreGB(0);\r
+                       return true;\r
+               }\r
+               if ( PSKDemod("0 1 6", false) &&\r
+                         preambleSearchEx(DemodBuffer,preamble,sizeof(preamble),&DemodBufferLen,&startIdx,false) && \r
+                         (DemodBufferLen == 32 || DemodBufferLen == 64) ) {\r
+                       //save_restoreGB(0);\r
+                       return true;\r
+               }\r
+               // PSK2 - needs a call to psk1TOpsk2.\r
+               if ( PSKDemod("0 0 6", false)) {\r
+                       psk1TOpsk2(DemodBuffer, DemodBufferLen);\r
+                       if (preambleSearchEx(DemodBuffer,preamble,sizeof(preamble),&DemodBufferLen,&startIdx,false) && \r
+                                 (DemodBufferLen == 32 || DemodBufferLen == 64) ) {\r
+                               //save_restoreGB(0);\r
+                               return true;\r
+                       }\r
+               } // inverse waves does not affect PSK2 demod\r
+               //undo trim samples\r
+               //save_restoreGB(0); \r
+               // no other modulation clocks = 2 or 4 so quit searching\r
+               if (fc1 != 8) return false;\r
+       }\r
+\r
+       // try ask clock detect.  it could be another type even if successful.\r
+       clk = GetAskClock("", false, false);\r
+       if (clk>0) {\r
+               if ( ASKDemod_ext("0 0 1", false, false, 1, &st) &&\r
+                         preambleSearchEx(DemodBuffer,preamble,sizeof(preamble),&DemodBufferLen,&startIdx,false) && \r
+                         (DemodBufferLen == 32 || DemodBufferLen == 64) ) {\r
+                       return true;\r
+               }\r
+               st = true;\r
+               if ( ASKDemod_ext("0 1 1", false, false, 1, &st)  &&\r
+                         preambleSearchEx(DemodBuffer,preamble,sizeof(preamble),&DemodBufferLen,&startIdx,false) && \r
+                         (DemodBufferLen == 32 || DemodBufferLen == 64) ) {\r
+                       return true;\r
+               }\r
+               if ( ASKbiphaseDemod("0 0 0 2", false) &&\r
+                         preambleSearchEx(DemodBuffer,preamble,sizeof(preamble),&DemodBufferLen,&startIdx,false) && \r
+                         (DemodBufferLen == 32 || DemodBufferLen == 64) ) {\r
+                       return true;\r
+               }\r
+               if ( ASKbiphaseDemod("0 0 1 2", false) &&\r
+                         preambleSearchEx(DemodBuffer,preamble,sizeof(preamble),&DemodBufferLen,&startIdx,false) && \r
+                         (DemodBufferLen == 32 || DemodBufferLen == 64) ) {\r
+                       return true;\r
+               }\r
+       }\r
+\r
+       // try NRZ clock detect.  it could be another type even if successful.\r
+       clk = GetNrzClock("", false, false); //has the most false positives :(\r
+       if (clk>0) {\r
+               if ( NRZrawDemod("0 0 1", false)  &&\r
+                         preambleSearchEx(DemodBuffer,preamble,sizeof(preamble),&DemodBufferLen,&startIdx,false) && \r
+                         (DemodBufferLen == 32 || DemodBufferLen == 64) ) {\r
+                       return true;\r
+               }\r
+               if ( NRZrawDemod("0 1 1", false)  &&\r
+                         preambleSearchEx(DemodBuffer,preamble,sizeof(preamble),&DemodBufferLen,&startIdx,false) && \r
+                         (DemodBufferLen == 32 || DemodBufferLen == 64) ) {\r
+                       return true;\r
+               }\r
+       }\r
+       return false;\r
+}\r
+//  does this need to be a callable command?\r
+int CmdT55xxDetectPage1(const char *Cmd){\r
+       bool errors = false;\r
+       bool useGB = false;\r
+       bool usepwd = false;\r
+       uint32_t password = 0;\r
+       uint8_t cmdp = 0;\r
+\r
+       while(param_getchar(Cmd, cmdp) != 0x00 && !errors) {\r
+               switch(param_getchar(Cmd, cmdp)) {\r
+               case 'h':\r
+               case 'H':\r
+                       return usage_t55xx_detectP1();\r
+               case 'p':\r
+               case 'P':\r
+                       password = param_get32ex(Cmd, cmdp+1, 0, 16);\r
+                       usepwd = true;\r
+                       cmdp += 2;\r
+                       break;\r
+               case '1':\r
+                       // use Graphbuffer data\r
+                       useGB = true;\r
+                       cmdp++;\r
+                       break;\r
+               default:\r
+                       PrintAndLog("Unknown parameter '%c'", param_getchar(Cmd, cmdp));\r
+                       errors = true;\r
+                       break;\r
+               }\r
+       }\r
+       if (errors) return usage_t55xx_detectP1();\r
+\r
+       if ( !useGB ) {\r
+               if ( !AquireData(T55x7_PAGE1, 1, usepwd, password) )\r
+                       return false;\r
+       }\r
+       bool success = tryDetectP1(false);\r
+       if (success) PrintAndLog("T55xx chip found!");\r
+       return success;\r
+}\r
+\r
 static command_t CommandTable[] = {\r
   {"help",      CmdHelp,           1, "This help"},\r
        {"bruteforce",CmdT55xxBruteForce,0, "<start password> <end password> [i <*.dic>] Simple bruteforce attack to find password"},\r
   {"config",    CmdT55xxSetConfig, 1, "Set/Get T55XX configuration (modulation, inverted, offset, rate)"},\r
   {"detect",    CmdT55xxDetect,    1, "[1] Try detecting the tag modulation from reading the configuration block."},\r
+  {"p1detect",  CmdT55xxDetectPage1,1, "[1] Try detecting if this is a t55xx tag by reading page 1"},\r
   {"read",      CmdT55xxReadBlock, 0, "b <block> p [password] [o] [1] -- Read T55xx block data. Optional [p password], [override], [page1]"},\r
   {"resetread", CmdResetRead,      0, "Send Reset Cmd then lf read the stream to attempt to identify the start of it (needs a demod and/or plot after)"},\r
   {"write",     CmdT55xxWriteBlock,0, "b <block> d <data> p [password] [1] -- Write T55xx block data. Optional [p password], [page1]"},\r
Impressum, Datenschutz