#define DMA_BUFFER_OFFSET 3160
#define DMA_BUFFER_SIZE 4096
#define TRACE_LENGTH 3000
+// card emulator memory
+#define CARD_MEMORY 7260
+#define CARD_MEMORY_LEN 1024
uint8_t trigger = 0;
void iso14a_set_trigger(int enable) {
}
}
}
+static int EmSendCmd14443aRaw(uint8_t *resp, int respLen, int correctionNeeded);
//-----------------------------------------------------------------------------
// Main loop of simulated tag: receive commands from reader, decide what
}
if(respLen <= 0) continue;
+ //----------------------------
+ u = 0;
+ b = 0x00;
+ fdt_indicator = FALSE;
- // Modulate Manchester
+ EmSendCmd14443aRaw(resp, respLen, receivedCmd[0] == 0x52);
+/* // Modulate Manchester
FpgaWriteConfWord(FPGA_MAJOR_MODE_HF_ISO14443A | FPGA_HF_ISO14443A_TAGSIM_MOD);
AT91C_BASE_SSC->SSC_THR = 0x00;
FpgaSetupSsc();
break;
}
}
-
+*/
}
Dbprintf("%x %x %x", happened, happened2, cmdsRecvd);
ToSendMax++;
}
+//-----------------------------------------------------------------------------
+// Wait for commands from reader
+// Stop when button is pressed (return 1) or field was gone (return 2)
+// Or return 0 when command is captured
+//-----------------------------------------------------------------------------
+static int EmGetCmd(uint8_t *received, int *len, int maxLen)
+{
+ *len = 0;
+
+ uint32_t timer = 0, vtime = 0;
+ int analogCnt = 0;
+ int analogAVG = 0;
+
+ // Set FPGA mode to "simulated ISO 14443 tag", no modulation (listen
+ // only, since we are receiving, not transmitting).
+ // Signal field is off with the appropriate LED
+ LED_D_OFF();
+ FpgaWriteConfWord(FPGA_MAJOR_MODE_HF_ISO14443A | FPGA_HF_ISO14443A_TAGSIM_LISTEN);
+
+ // Set ADC to read field strength
+ AT91C_BASE_ADC->ADC_CR = AT91C_ADC_SWRST;
+ AT91C_BASE_ADC->ADC_MR =
+ ADC_MODE_PRESCALE(32) |
+ ADC_MODE_STARTUP_TIME(16) |
+ ADC_MODE_SAMPLE_HOLD_TIME(8);
+ AT91C_BASE_ADC->ADC_CHER = ADC_CHANNEL(ADC_CHAN_HF);
+ // start ADC
+ AT91C_BASE_ADC->ADC_CR = AT91C_ADC_START;
+
+ // Now run a 'software UART' on the stream of incoming samples.
+ Uart.output = received;
+ Uart.byteCntMax = maxLen;
+ Uart.state = STATE_UNSYNCD;
+
+ for(;;) {
+ WDT_HIT();
+
+ if (BUTTON_PRESS()) return 1;
+
+ // test if the field exists
+ if (AT91C_BASE_ADC->ADC_SR & ADC_END_OF_CONVERSION(ADC_CHAN_HF)) {
+ analogCnt++;
+ analogAVG += AT91C_BASE_ADC->ADC_CDR[ADC_CHAN_HF];
+ AT91C_BASE_ADC->ADC_CR = AT91C_ADC_START;
+ if (analogCnt >= 32) {
+ if ((33000 * (analogAVG / analogCnt) >> 10) < MF_MINFIELDV) {
+ vtime = GetTickCount();
+ if (!timer) timer = vtime;
+ // 50ms no field --> card to idle state
+ if (vtime - timer > 50) return 2;
+ } else
+ if (timer) timer = 0;
+ analogCnt = 0;
+ analogAVG = 0;
+ }
+ }
+ // transmit none
+ if(AT91C_BASE_SSC->SSC_SR & (AT91C_SSC_TXRDY)) {
+ AT91C_BASE_SSC->SSC_THR = 0x00;
+ }
+ // receive and test the miller decoding
+ if(AT91C_BASE_SSC->SSC_SR & (AT91C_SSC_RXRDY)) {
+ volatile uint8_t b = (uint8_t)AT91C_BASE_SSC->SSC_RHR;
+ if(MillerDecoding((b & 0xf0) >> 4)) {
+ *len = Uart.byteCnt;
+ if (tracing) LogTrace(received, *len, 0, GetParity(received, *len), TRUE);
+ return 0;
+ }
+ if(MillerDecoding(b & 0x0f)) {
+ *len = Uart.byteCnt;
+ if (tracing) LogTrace(received, *len, 0, GetParity(received, *len), TRUE);
+ return 0;
+ }
+ }
+ }
+}
+
+static int EmSendCmd14443aRaw(uint8_t *resp, int respLen, int correctionNeeded)
+{
+ int i, u = 0;
+ uint8_t b = 0;
+
+ // Modulate Manchester
+ FpgaWriteConfWord(FPGA_MAJOR_MODE_HF_ISO14443A | FPGA_HF_ISO14443A_TAGSIM_MOD);
+ AT91C_BASE_SSC->SSC_THR = 0x00;
+ FpgaSetupSsc();
+
+ // include correction bit
+ i = 1;
+ if((Uart.parityBits & 0x01) || correctionNeeded) {
+ // 1236, so correction bit needed
+ i = 0;
+ }
+
+ // send cycle
+ for(;;) {
+ if(AT91C_BASE_SSC->SSC_SR & (AT91C_SSC_RXRDY)) {
+ volatile uint8_t b = (uint8_t)AT91C_BASE_SSC->SSC_RHR;
+ (void)b;
+ }
+ if(AT91C_BASE_SSC->SSC_SR & (AT91C_SSC_TXRDY)) {
+ if(i > respLen) {
+ b = 0x00;
+ u++;
+ } else {
+ b = resp[i];
+ i++;
+ }
+ AT91C_BASE_SSC->SSC_THR = b;
+
+ if(u > 4) break;
+ }
+ if(BUTTON_PRESS()) {
+ break;
+ }
+ }
+
+ return 0;
+}
+
+static int EmSendCmdEx(uint8_t *resp, int respLen, int correctionNeeded){
+ CodeIso14443aAsTag(resp, respLen);
+ int res = EmSendCmd14443aRaw(ToSend, ToSendMax, correctionNeeded);
+ if (tracing) LogTrace(resp, respLen, 0, GetParity(resp, respLen), FALSE);
+ return res;
+}
+
+static int EmSendCmd(uint8_t *resp, int respLen){
+ return EmSendCmdEx(resp, respLen, 0);
+}
+
//-----------------------------------------------------------------------------
// Wait a certain time for tag response
// If a response is captured return TRUE
void Mifare1ksim(uint8_t arg0, uint8_t arg1, uint8_t arg2, uint8_t *datain)
{
int cardSTATE = MFEMUL_NOFIELD;
+ int vHf = 0; // in mV
+ int res, i;
+ uint32_t timer = 0;
+ uint32_t selTimer = 0;
+ uint32_t authTimer = 0;
+ uint32_t par = 0;
+ int len = 0;
+ uint8_t bt;
+ uint8_t cardAUTHSC = 0;
+ uint8_t cardAUTHKEY = 0xff; // no authentication
+ uint32_t cuid = 0;
+ struct Crypto1State mpcs = {0, 0};
+ struct Crypto1State *pcs;
+ pcs = &mpcs;
+
+ uint64_t key64 = 0xffffffffffffULL;
+
+ uint8_t* receivedCmd = mifare_get_bigbufptr();
+
+ static uint8_t rATQA[] = {0x04, 0x00}; // Mifare classic 1k
+
+ static uint8_t rUIDBCC1[] = {0xde, 0xad, 0xbe, 0xaf, 0x62};
+ static uint8_t rUIDBCC2[] = {0xde, 0xad, 0xbe, 0xaf, 0x62}; // !!!
+
+ static uint8_t rSAK[] = {0x08, 0xb6, 0xdd};
+ static uint8_t rAUTH_NT[] = {0x1a, 0xac, 0xff, 0x4f};
+ static uint8_t rAUTH_AT[] = {0x00, 0x00, 0x00, 0x00};
+ static uint8_t cmdBuf[18];
+
+ // clear trace
+ traceLen = 0;
+ tracing = true;
+
+// -------------------------------------- test area
+
+ // Authenticate response - nonce
+ uint8_t *resp1 = (((uint8_t *)BigBuf) + CARD_MEMORY);
+ int resp1Len;
+ uint8_t *resp2 = (((uint8_t *)BigBuf) + CARD_MEMORY + 200);
+ int resp2Len;
+ CodeIso14443aAsTag(rAUTH_NT, sizeof(rAUTH_NT));
+ memcpy(resp1, ToSend, ToSendMax); resp1Len = ToSendMax;
+
+ timer = GetTickCount();
+ uint32_t nonce = bytes_to_num(rAUTH_NT, 4);
+ uint32_t rn_enc = 0x98d76b77; // !!!!!!!!!!!!!!!!!
+ uint32_t ans = 0;
+ cuid = bytes_to_num(rUIDBCC1, 4);
+
+ crypto1_create(pcs, key64);
+ crypto1_word(pcs, cuid ^ nonce, 0);
+ crypto1_word(pcs, rn_enc , 1);
+ crypto1_word(pcs, 0, 0);
+ ans = prng_successor(nonce, 96) ^ crypto1_word(pcs, 0, 0);
+ num_to_bytes(ans, 4, rAUTH_AT);
+ CodeIso14443aAsTag(rAUTH_AT, sizeof(rAUTH_AT));
+ memcpy(resp2, ToSend, ToSendMax); resp2Len = ToSendMax;
+ Dbprintf("crypto auth time: %d", GetTickCount() - timer);
+
+// -------------------------------------- END test area
+
+ // We need to listen to the high-frequency, peak-detected path.
+ SetAdcMuxFor(GPIO_MUXSEL_HIPKD);
+ FpgaSetupSsc();
+
+ FpgaWriteConfWord(FPGA_MAJOR_MODE_HF_ISO14443A | FPGA_HF_ISO14443A_TAGSIM_LISTEN);
+ SpinDelay(200);
+
+Dbprintf("--> start");
while (true) {
+ WDT_HIT();
+ // find reader field
+ // Vref = 3300mV, and an 10:1 voltage divider on the input
+ // can measure voltages up to 33000 mV
+ if (cardSTATE == MFEMUL_NOFIELD) {
+ vHf = (33000 * AvgAdc(ADC_CHAN_HF)) >> 10;
+ if (vHf > MF_MINFIELDV) {
+ cardSTATE = MFEMUL_IDLE;
+ LED_A_ON();
+ }
+ }
+
+ if (cardSTATE != MFEMUL_NOFIELD) {
+ res = EmGetCmd(receivedCmd, &len, 100);
+ if (res == 2) {
+ cardSTATE = MFEMUL_NOFIELD;
+ LEDsoff();
+ continue;
+ }
+ if(res) break;
+ }
+
if(BUTTON_PRESS()) {
- break;
- }
-
+ break;
+ }
+// if (len) Dbprintf("len:%d cmd: %02x %02x %02x %02x", len, receivedCmd[0], receivedCmd[1], receivedCmd[2], receivedCmd[3]);
+
+ if (len != 4 && cardSTATE != MFEMUL_NOFIELD) { // len != 4 <---- speed up the code 4 authentication
+ // REQ or WUP request in ANY state and WUP in HALTED state
+ if (len == 1 && ((receivedCmd[0] == 0x26 && cardSTATE != MFEMUL_HALTED) || receivedCmd[0] == 0x52)) {
+ selTimer = GetTickCount();
+ EmSendCmdEx(rATQA, sizeof(rATQA), (receivedCmd[0] == 0x52));
+ cardSTATE = MFEMUL_SELECT1;
+
+ // init crypto block
+ LED_B_OFF();
+ LED_C_OFF();
+ crypto1_destroy(pcs);
+ cardAUTHKEY = 0xff;
+ }
+ }
+
switch (cardSTATE) {
case MFEMUL_NOFIELD:{
break;
}
+ case MFEMUL_HALTED:{
+ break;
+ }
case MFEMUL_IDLE:{
break;
}
case MFEMUL_SELECT1:{
+ // select all
+ if (len == 2 && (receivedCmd[0] == 0x93 && receivedCmd[1] == 0x20)) {
+ EmSendCmd(rUIDBCC1, sizeof(rUIDBCC1));
+
+ if (rUIDBCC1[0] == 0x88) {
+ cardSTATE = MFEMUL_SELECT2;
+ }
+ }
+
+ // select card
+ if (len == 9 &&
+ (receivedCmd[0] == 0x93 && receivedCmd[1] == 0x70 && memcmp(&receivedCmd[2], rUIDBCC1, 4) == 0)) {
+ EmSendCmd(rSAK, sizeof(rSAK));
+
+ cuid = bytes_to_num(rUIDBCC1, 4);
+ cardSTATE = MFEMUL_WORK;
+ LED_B_ON();
+ Dbprintf("--> WORK. anticol1 time: %d", GetTickCount() - selTimer);
+ }
+
break;
}
case MFEMUL_SELECT2:{
+ EmSendCmd(rUIDBCC2, sizeof(rUIDBCC2));
+
+ cuid = bytes_to_num(rUIDBCC2, 4);
+ cardSTATE = MFEMUL_WORK;
+ LED_B_ON();
+Dbprintf("--> WORK. anticol2 time: %d", GetTickCount() - timer);
break;
}
case MFEMUL_AUTH1:{
- break;
+ if (len == 8) {
+timer = GetTickCount();
+// ---------------------------------
+ rn_enc = bytes_to_num(receivedCmd, 4);
+ crypto1_create(pcs, key64);
+ crypto1_word(pcs, cuid ^ nonce, 0);
+ crypto1_word(pcs, rn_enc , 1);
+ crypto1_word(pcs, 0, 0);
+ ans = prng_successor(nonce, 96) ^ crypto1_word(pcs, 0, 0);
+ num_to_bytes(ans, 4, rAUTH_AT);
+// ---------------------------------
+ EmSendCmd(rAUTH_AT, sizeof(rAUTH_AT));
+// EmSendCmd14443aRaw(resp2, resp2Len, 0);
+ cardSTATE = MFEMUL_AUTH2;
+ } else {
+ cardSTATE = MFEMUL_IDLE;
+ LED_B_OFF();
+ LED_C_OFF();
+ }
+ if (cardSTATE != MFEMUL_AUTH2) break;
}
case MFEMUL_AUTH2:{
+ // test auth info here...
+
+ LED_C_ON();
+ cardSTATE = MFEMUL_WORK;
+Dbprintf("AUTH COMPLETED. sec=%d, key=%d time=%d a=%d", cardAUTHSC, cardAUTHKEY, GetTickCount() - authTimer, GetTickCount() - timer);
break;
}
- case MFEMUL_HALTED:{
+ case MFEMUL_WORK:{
+ // auth
+ if (len == 4 && (receivedCmd[0] == 0x60 || receivedCmd[0] == 0x61)) {
+ authTimer = GetTickCount();
+// EmSendCmd(rAUTH_NT, sizeof(rAUTH_NT));
+//SpinDelayUs(30);
+ EmSendCmd14443aRaw(resp1, resp1Len, 0);
+// crypto1_create(pcs, key64);
+// if (cardAUTHKEY == 0xff) { // first auth
+// crypto1_word(pcs, cuid ^ bytes_to_num(rAUTH_NT, 4), 0); // uid ^ nonce
+// } else { // nested auth
+// }
+
+ cardAUTHSC = receivedCmd[1] / 4; // received block num
+ cardAUTHKEY = receivedCmd[0] - 0x60;
+ cardSTATE = MFEMUL_AUTH1;
+ break;
+ }
+
+ if (len == 0) break;
+
+ // decrypt seqence
+ if (cardAUTHKEY != 0xff){
+ if (len != 1) {
+ for (i = 0; i < len; i++)
+ receivedCmd[i] = crypto1_byte(pcs, 0x00, 0) ^ receivedCmd[i];
+ } else {
+ bt = 0;
+ for (i = 0; i < 4; i++)
+ bt |= (crypto1_bit(pcs, 0, 0) ^ BIT(receivedCmd[0], i)) << i;
+
+ receivedCmd[0] = bt;
+ }
+ }
+
+ // read block
+ if (len == 4 && receivedCmd[0] == 0x30) {
+ cmdBuf[0] = 0;
+ par = 0;
+/* memcpy(cmdBuf, blockData, 16);
+ AppendCrc14443a(cmdBuf, 16);
+
+ // crypto
+ par = 0;
+ for (i = 0; i < 18; i++) {
+ d_block_enc[pos] = crypto1_byte(pcs, 0x00, 0) ^ cmdBuf[pos];
+ par = (par >> 1) | ( ((filter(pcs->odd) ^ oddparity(cmdBuf[pos])) & 0x01) * 0x20000 );
+ }
+*/
+ //ReaderTransmitPar(d_block_enc, sizeof(d_block_enc), par);
+Dbprintf("read block: %d", receivedCmd[1]);
+ break;
+ }
+
+ // write block
+ if (len == 4 && receivedCmd[0] == 0xA0) {
+Dbprintf("write block: %d", receivedCmd[1]);
+ break;
+ }
+
+ // halt
+ if (len == 4 && (receivedCmd[0] == 0x50 && receivedCmd[1] == 0x00)) {
+ cardSTATE = MFEMUL_HALTED;
+ LED_B_OFF();
+ LED_C_OFF();
+ Dbprintf("--> HALTED. Selected time: %d ms", GetTickCount() - selTimer);
+ break;
+ }
break;
}
}
+ FpgaWriteConfWord(FPGA_MAJOR_MODE_OFF);
+ LEDsoff();
+
+ // add trace trailer
+ LogTrace(rAUTH_NT, 4, 0, 0, TRUE);
+
+ DbpString("Emulator stopped.");
}