]> git.zerfleddert.de Git - proxmark3-svn/blobdiff - armsrc/iso14443a.c
1. fixed send manchester
[proxmark3-svn] / armsrc / iso14443a.c
index 7b709ab099fc47a0730b9fdd047ea2ab146d2dc0..ce8467bfe37ed1bf78d7136a03002a90360eb03f 100644 (file)
@@ -26,11 +26,11 @@ static int rsamples = 0;
 static int tracing = TRUE;
 static uint32_t iso14a_timeout;
 
-// CARD TO READER
+// CARD TO READER - manchester
 // Sequence D: 11110000 modulation with subcarrier during first half
 // Sequence E: 00001111 modulation with subcarrier during second half
 // Sequence F: 00000000 no modulation with subcarrier
-// READER TO CARD
+// READER TO CARD - miller
 // Sequence X: 00001100 drop after half a period
 // Sequence Y: 00000000 no drop
 // Sequence Z: 11000000 drop at start
@@ -60,13 +60,6 @@ static const uint8_t OddByteParity[256] = {
   1, 0, 0, 1, 0, 1, 1, 0, 0, 1, 1, 0, 1, 0, 0, 1
 };
 
-// BIG CHANGE - UNDERSTAND THIS BEFORE WE COMMIT
-#define RECV_CMD_OFFSET   3032
-#define RECV_RES_OFFSET   3096
-#define DMA_BUFFER_OFFSET 3160
-#define DMA_BUFFER_SIZE   4096
-#define TRACE_LENGTH      3000
-
 uint8_t trigger = 0;
 void iso14a_set_trigger(int enable) {
        trigger = enable;
@@ -784,12 +777,12 @@ done:
 //-----------------------------------------------------------------------------
 // Prepare tag messages
 //-----------------------------------------------------------------------------
-static void CodeIso14443aAsTag(const uint8_t *cmd, int len)
+static void CodeIso14443aAsTagPar(const uint8_t *cmd, int len, uint32_t dwParity)
 {
-    int i;
-       int oddparity;
+       int i;
+//     int oddparity;
 
-    ToSendReset();
+       ToSendReset();
 
        // Correction bit, might be removed when not needed
        ToSendStuffBit(0);
@@ -800,55 +793,68 @@ static void CodeIso14443aAsTag(const uint8_t *cmd, int len)
        ToSendStuffBit(0);
        ToSendStuffBit(0);
        ToSendStuffBit(0);
-
+       
        // Send startbit
        ToSend[++ToSendMax] = SEC_D;
 
-    for(i = 0; i < len; i++) {
-        int j;
-        uint8_t b = cmd[i];
+       for(i = 0; i < len; i++) {
+               int j;
+               uint8_t b = cmd[i];
 
                // Data bits
-        oddparity = 0x01;
+//             oddparity = 0x01;
                for(j = 0; j < 8; j++) {
-            oddparity ^= (b & 1);
+//                     oddparity ^= (b & 1);
                        if(b & 1) {
                                ToSend[++ToSendMax] = SEC_D;
                        } else {
                                ToSend[++ToSendMax] = SEC_E;
-            }
-            b >>= 1;
-        }
+                       }
+                       b >>= 1;
+               }
 
-        // Parity bit
-        if(oddparity) {
-               ToSend[++ToSendMax] = SEC_D;
+       // Get the parity bit
+               if ((dwParity >> i) & 0x01) {
+                       ToSend[++ToSendMax] = SEC_D;
                } else {
                        ToSend[++ToSendMax] = SEC_E;
                }
-    }
+               
+                       // Parity bit
+//                     if(oddparity) {
+//                             ToSend[++ToSendMax] = SEC_D;
+//                     } else {
+//                             ToSend[++ToSendMax] = SEC_E;
+//                     }
+
+//             if (oddparity != ((dwParity >> i) & 0x01))
+//               Dbprintf("par error. i=%d", i);
+       }
 
-    // Send stopbit
-    ToSend[++ToSendMax] = SEC_F;
+       // Send stopbit
+       ToSend[++ToSendMax] = SEC_F;
 
        // Flush the buffer in FPGA!!
        for(i = 0; i < 5; i++) {
                ToSend[++ToSendMax] = SEC_F;
        }
 
-    // Convert from last byte pos to length
-    ToSendMax++;
+       // Convert from last byte pos to length
+       ToSendMax++;
 
     // Add a few more for slop
-    ToSend[ToSendMax++] = 0x00;
-       ToSend[ToSendMax++] = 0x00;
-    //ToSendMax += 2;
+//    ToSend[ToSendMax++] = 0x00;
+//     ToSend[ToSendMax++] = 0x00;
+}
+
+static void CodeIso14443aAsTag(const uint8_t *cmd, int len){
+       CodeIso14443aAsTagPar(cmd, len, GetParity(cmd, len));
 }
 
 //-----------------------------------------------------------------------------
 // This is to send a NACK kind of answer, its only 3 bits, I know it should be 4
 //-----------------------------------------------------------------------------
-static void CodeStrangeAnswer()
+static void CodeStrangeAnswerAsTag()
 {
        int i;
 
@@ -886,11 +892,47 @@ static void CodeStrangeAnswer()
 
     // Convert from last byte pos to length
     ToSendMax++;
+}
 
-    // Add a few more for slop
-    ToSend[ToSendMax++] = 0x00;
-       ToSend[ToSendMax++] = 0x00;
-    //ToSendMax += 2;
+static void Code4bitAnswerAsTag(uint8_t cmd)
+{
+       int i;
+
+    ToSendReset();
+
+       // Correction bit, might be removed when not needed
+       ToSendStuffBit(0);
+       ToSendStuffBit(0);
+       ToSendStuffBit(0);
+       ToSendStuffBit(0);
+       ToSendStuffBit(1);  // 1
+       ToSendStuffBit(0);
+       ToSendStuffBit(0);
+       ToSendStuffBit(0);
+
+       // Send startbit
+       ToSend[++ToSendMax] = SEC_D;
+
+       uint8_t b = cmd;
+       for(i = 0; i < 4; i++) {
+               if(b & 1) {
+                       ToSend[++ToSendMax] = SEC_D;
+               } else {
+                       ToSend[++ToSendMax] = SEC_E;
+               }
+               b >>= 1;
+       }
+
+       // Send stopbit
+       ToSend[++ToSendMax] = SEC_F;
+
+       // Flush the buffer in FPGA!!
+       for(i = 0; i < 5; i++) {
+               ToSend[++ToSendMax] = SEC_F;
+       }
+
+    // Convert from last byte pos to length
+    ToSendMax++;
 }
 
 //-----------------------------------------------------------------------------
@@ -932,6 +974,7 @@ static int GetIso14443aCommandFromReader(uint8_t *received, int *len, int maxLen
         }
     }
 }
+static int EmSendCmd14443aRaw(uint8_t *resp, int respLen, int correctionNeeded);
 
 //-----------------------------------------------------------------------------
 // Main loop of simulated tag: receive commands from reader, decide what
@@ -1062,7 +1105,7 @@ ComputeCrc14443(CRC_14443_A, response3a, 1, &response3a[1], &response3a[2]);
     memcpy(resp3a, ToSend, ToSendMax); resp3aLen = ToSendMax;
 
        // Strange answer is an example of rare message size (3 bits)
-       CodeStrangeAnswer();
+       CodeStrangeAnswerAsTag();
        memcpy(resp4, ToSend, ToSendMax); resp4Len = ToSendMax;
 
        // Authentication answer (random nonce)
@@ -1180,8 +1223,13 @@ ComputeCrc14443(CRC_14443_A, response3a, 1, &response3a[1], &response3a[2]);
                }
 
         if(respLen <= 0) continue;
+               //----------------------------
+               u = 0;
+               b = 0x00;
+               fdt_indicator = FALSE;
 
-        // Modulate Manchester
+               EmSendCmd14443aRaw(resp, respLen, receivedCmd[0] == 0x52);
+/*        // Modulate Manchester
                FpgaWriteConfWord(FPGA_MAJOR_MODE_HF_ISO14443A | FPGA_HF_ISO14443A_TAGSIM_MOD);
         AT91C_BASE_SSC->SSC_THR = 0x00;
         FpgaSetupSsc();
@@ -1213,7 +1261,7 @@ ComputeCrc14443(CRC_14443_A, response3a, 1, &response3a[1], &response3a[2]);
                            break;
                        }
         }
-
+*/
     }
 
        Dbprintf("%x %x %x", happened, happened2, cmdsRecvd);
@@ -1398,6 +1446,156 @@ void CodeIso14443aAsReaderPar(const uint8_t * cmd, int len, uint32_t dwParity)
   ToSendMax++;
 }
 
+//-----------------------------------------------------------------------------
+// Wait for commands from reader
+// Stop when button is pressed (return 1) or field was gone (return 2)
+// Or return 0 when command is captured
+//-----------------------------------------------------------------------------
+static int EmGetCmd(uint8_t *received, int *len, int maxLen)
+{
+       *len = 0;
+
+       uint32_t timer = 0, vtime = 0;
+       int analogCnt = 0;
+       int analogAVG = 0;
+
+       // Set FPGA mode to "simulated ISO 14443 tag", no modulation (listen
+       // only, since we are receiving, not transmitting).
+       // Signal field is off with the appropriate LED
+       LED_D_OFF();
+       FpgaWriteConfWord(FPGA_MAJOR_MODE_HF_ISO14443A | FPGA_HF_ISO14443A_TAGSIM_LISTEN);
+
+       // Set ADC to read field strength
+       AT91C_BASE_ADC->ADC_CR = AT91C_ADC_SWRST;
+       AT91C_BASE_ADC->ADC_MR =
+                               ADC_MODE_PRESCALE(32) |
+                               ADC_MODE_STARTUP_TIME(16) |
+                               ADC_MODE_SAMPLE_HOLD_TIME(8);
+       AT91C_BASE_ADC->ADC_CHER = ADC_CHANNEL(ADC_CHAN_HF);
+       // start ADC
+       AT91C_BASE_ADC->ADC_CR = AT91C_ADC_START;
+       
+       // Now run a 'software UART' on the stream of incoming samples.
+       Uart.output = received;
+       Uart.byteCntMax = maxLen;
+       Uart.state = STATE_UNSYNCD;
+
+       for(;;) {
+               WDT_HIT();
+
+               if (BUTTON_PRESS()) return 1;
+
+               // test if the field exists
+               if (AT91C_BASE_ADC->ADC_SR & ADC_END_OF_CONVERSION(ADC_CHAN_HF)) {
+                       analogCnt++;
+                       analogAVG += AT91C_BASE_ADC->ADC_CDR[ADC_CHAN_HF];
+                       AT91C_BASE_ADC->ADC_CR = AT91C_ADC_START;
+                       if (analogCnt >= 32) {
+                               if ((33000 * (analogAVG / analogCnt) >> 10) < MF_MINFIELDV) {
+                                       vtime = GetTickCount();
+                                       if (!timer) timer = vtime;
+                                       // 50ms no field --> card to idle state
+                                       if (vtime - timer > 50) return 2;
+                               } else
+                                       if (timer) timer = 0;
+                               analogCnt = 0;
+                               analogAVG = 0;
+                       }
+               }
+               // transmit none
+               if(AT91C_BASE_SSC->SSC_SR & (AT91C_SSC_TXRDY)) {
+                       AT91C_BASE_SSC->SSC_THR = 0x00;
+               }
+               // receive and test the miller decoding
+               if(AT91C_BASE_SSC->SSC_SR & (AT91C_SSC_RXRDY)) {
+                       volatile uint8_t b = (uint8_t)AT91C_BASE_SSC->SSC_RHR;
+                       if(MillerDecoding((b & 0xf0) >> 4)) {
+                               *len = Uart.byteCnt;
+                               if (tracing) LogTrace(received, *len, GetDeltaCountUS(), Uart.parityBits, TRUE);
+                               return 0;
+                       }
+                       if(MillerDecoding(b & 0x0f)) {
+                               *len = Uart.byteCnt;
+                               if (tracing) LogTrace(received, *len, GetDeltaCountUS(), Uart.parityBits, TRUE);
+                               return 0;
+                       }
+               }
+       }
+}
+
+static int EmSendCmd14443aRaw(uint8_t *resp, int respLen, int correctionNeeded)
+{
+       int i, u = 0;
+       uint8_t b = 0;
+
+       // Modulate Manchester
+       FpgaWriteConfWord(FPGA_MAJOR_MODE_HF_ISO14443A | FPGA_HF_ISO14443A_TAGSIM_MOD);
+       AT91C_BASE_SSC->SSC_THR = 0x00;
+       FpgaSetupSsc();
+       
+       // include correction bit
+       i = 1;
+       if((Uart.parityBits & 0x01) || correctionNeeded) {
+               // 1236, so correction bit needed
+               i = 0;
+       }
+       
+       // send cycle
+       for(;;) {
+               if(AT91C_BASE_SSC->SSC_SR & (AT91C_SSC_RXRDY)) {
+                       volatile uint8_t b = (uint8_t)AT91C_BASE_SSC->SSC_RHR;
+                       (void)b;
+               }
+               if(AT91C_BASE_SSC->SSC_SR & (AT91C_SSC_TXRDY)) {
+                       if(i > respLen) {
+                               b = 0xff; // was 0x00
+                               u++;
+                       } else {
+                               b = resp[i];
+                               i++;
+                       }
+                       AT91C_BASE_SSC->SSC_THR = b;
+
+                       if(u > 4) break;
+               }
+               if(BUTTON_PRESS()) {
+                       break;
+               }
+       }
+
+       return 0;
+}
+
+int EmSend4bitEx(uint8_t resp, int correctionNeeded){
+  Code4bitAnswerAsTag(resp);
+       int res = EmSendCmd14443aRaw(ToSend, ToSendMax, correctionNeeded);
+  if (tracing) LogTrace(&resp, 1, GetDeltaCountUS(), GetParity(&resp, 1), FALSE);
+       return res;
+}
+
+int EmSend4bit(uint8_t resp){
+       return EmSend4bitEx(resp, 0);
+}
+
+int EmSendCmdExPar(uint8_t *resp, int respLen, int correctionNeeded, uint32_t par){
+  CodeIso14443aAsTagPar(resp, respLen, par);
+       int res = EmSendCmd14443aRaw(ToSend, ToSendMax, correctionNeeded);
+  if (tracing) LogTrace(resp, respLen, GetDeltaCountUS(), par, FALSE);
+       return res;
+}
+
+int EmSendCmdEx(uint8_t *resp, int respLen, int correctionNeeded){
+       return EmSendCmdExPar(resp, respLen, correctionNeeded, GetParity(resp, respLen));
+}
+
+int EmSendCmd(uint8_t *resp, int respLen){
+       return EmSendCmdExPar(resp, respLen, 0, GetParity(resp, respLen));
+}
+
+int EmSendCmdPar(uint8_t *resp, int respLen, uint32_t par){
+       return EmSendCmdExPar(resp, respLen, 0, par);
+}
+
 //-----------------------------------------------------------------------------
 // Wait a certain time for tag response
 //  If a response is captured return TRUE
@@ -1693,22 +1891,24 @@ void ReaderMifare(uint32_t parameter)
        byte_t par_mask = 0xff;
        byte_t par_low = 0;
        int led_on = TRUE;
-       uint8_t uid[7];
+       uint8_t uid[8];
        uint32_t cuid;
 
        tracing = FALSE;
        byte_t nt[4] = {0,0,0,0};
-       byte_t nt_attacked[4];
+       byte_t nt_attacked[4], nt_noattack[4];
        byte_t par_list[8] = {0,0,0,0,0,0,0,0};
        byte_t ks_list[8] = {0,0,0,0,0,0,0,0};
-       num_to_bytes(parameter, 4, nt_attacked);
-       int isOK = 0;
-       
+       num_to_bytes(parameter, 4, nt_noattack);
+       int isOK = 0, isNULL = 0;
+
        while(TRUE)
        {
+               LED_C_ON();
                FpgaWriteConfWord(FPGA_MAJOR_MODE_OFF);
                SpinDelay(200);
                FpgaWriteConfWord(FPGA_MAJOR_MODE_HF_ISO14443A | FPGA_HF_ISO14443A_READER_MOD);
+               LED_C_OFF();
 
                // Test if the action was cancelled
                if(BUTTON_PRESS()) {
@@ -1730,6 +1930,11 @@ void ReaderMifare(uint32_t parameter)
                // Receive 4 bit answer
                if (ReaderReceive(receivedAnswer))
                {
+                       if ( (parameter != 0) && (memcmp(nt, nt_noattack, 4) == 0) ) continue;
+
+                       isNULL = (nt_attacked[0] = 0) && (nt_attacked[1] = 0) && (nt_attacked[2] = 0) && (nt_attacked[3] = 0);
+                       if ( (isNULL != 0 ) && (memcmp(nt, nt_attacked, 4) != 0) ) continue;
+
                        if (nt_diff == 0)
                        {
                                LED_A_ON();
@@ -1738,8 +1943,6 @@ void ReaderMifare(uint32_t parameter)
                                par_low = par & 0x07;
                        }
 
-                       if (memcmp(nt, nt_attacked, 4) != 0) continue;
-
                        led_on = !led_on;
                        if(led_on) LED_B_ON(); else LED_B_OFF();
                        par_list[nt_diff] = par;
@@ -1783,7 +1986,7 @@ void ReaderMifare(uint32_t parameter)
        LEDsoff();
        tracing = TRUE;
        
-//     DbpString("COMMAND mifare FINISHED");
+       if (MF_DBGLEVEL >= 1)   DbpString("COMMAND mifare FINISHED");
 }
 
 //-----------------------------------------------------------------------------
@@ -1801,7 +2004,7 @@ void MifareReadBlock(uint8_t arg0, uint8_t arg1, uint8_t arg2, uint8_t *datain)
        // variables
        byte_t isOK = 0;
        byte_t dataoutbuf[16];
-       uint8_t uid[7];
+       uint8_t uid[8];
        uint32_t cuid;
        struct Crypto1State mpcs = {0, 0};
        struct Crypto1State *pcs;
@@ -1819,22 +2022,22 @@ void MifareReadBlock(uint8_t arg0, uint8_t arg1, uint8_t arg2, uint8_t *datain)
 
        while (true) {
                if(!iso14443a_select_card(uid, NULL, &cuid)) {
-                       Dbprintf("Can't select card");
+               if (MF_DBGLEVEL >= 1)   Dbprintf("Can't select card");
                        break;
                };
 
                if(mifare_classic_auth(pcs, cuid, blockNo, keyType, ui64Key, AUTH_FIRST)) {
-                       Dbprintf("Auth error");
+               if (MF_DBGLEVEL >= 1)   Dbprintf("Auth error");
                        break;
                };
                
                if(mifare_classic_readblock(pcs, cuid, blockNo, dataoutbuf)) {
-                       Dbprintf("Read block error");
+               if (MF_DBGLEVEL >= 1)   Dbprintf("Read block error");
                        break;
                };
 
                if(mifare_classic_halt(pcs, cuid)) {
-                       Dbprintf("Halt error");
+               if (MF_DBGLEVEL >= 1)   Dbprintf("Halt error");
                        break;
                };
                
@@ -1845,13 +2048,10 @@ void MifareReadBlock(uint8_t arg0, uint8_t arg1, uint8_t arg2, uint8_t *datain)
        //  ----------------------------- crypto1 destroy
        crypto1_destroy(pcs);
        
-//    DbpString("READ BLOCK FINISHED");
+       if (MF_DBGLEVEL >= 2)   DbpString("READ BLOCK FINISHED");
 
        // add trace trailer
-       uid[0] = 0xff;
-       uid[1] = 0xff;
-       uid[2] = 0xff;
-       uid[3] = 0xff;
+       memset(uid, 0x44, 4);
        LogTrace(uid, 4, 0, 0, TRUE);
 
        UsbCommand ack = {CMD_ACK, {isOK, 0, 0}};
@@ -1902,34 +2102,34 @@ void MifareReadSector(uint8_t arg0, uint8_t arg1, uint8_t arg2, uint8_t *datain)
 
        while (true) {
                if(!iso14443a_select_card(uid, NULL, &cuid)) {
-                       Dbprintf("Can't select card");
+               if (MF_DBGLEVEL >= 1)   Dbprintf("Can't select card");
                        break;
                };
 
                if(mifare_classic_auth(pcs, cuid, sectorNo * 4, keyType, ui64Key, AUTH_FIRST)) {
-                       Dbprintf("Auth error");
+               if (MF_DBGLEVEL >= 1)   Dbprintf("Auth error");
                        break;
                };
                
                if(mifare_classic_readblock(pcs, cuid, sectorNo * 4 + 0, dataoutbuf + 16 * 0)) {
-                       Dbprintf("Read block 0 error");
+               if (MF_DBGLEVEL >= 1)   Dbprintf("Read block 0 error");
                        break;
                };
                if(mifare_classic_readblock(pcs, cuid, sectorNo * 4 + 1, dataoutbuf + 16 * 1)) {
-                       Dbprintf("Read block 1 error");
+               if (MF_DBGLEVEL >= 1)   Dbprintf("Read block 1 error");
                        break;
                };
                if(mifare_classic_readblock(pcs, cuid, sectorNo * 4 + 2, dataoutbuf + 16 * 2)) {
-                       Dbprintf("Read block 2 error");
+               if (MF_DBGLEVEL >= 1)   Dbprintf("Read block 2 error");
                        break;
                };
                if(mifare_classic_readblock(pcs, cuid, sectorNo * 4 + 3, dataoutbuf + 16 * 3)) {
-                       Dbprintf("Read block 3 error");
+               if (MF_DBGLEVEL >= 1)   Dbprintf("Read block 3 error");
                        break;
                };
                
                if(mifare_classic_halt(pcs, cuid)) {
-                       Dbprintf("Halt error");
+               if (MF_DBGLEVEL >= 1)   Dbprintf("Halt error");
                        break;
                };
 
@@ -1940,13 +2140,10 @@ void MifareReadSector(uint8_t arg0, uint8_t arg1, uint8_t arg2, uint8_t *datain)
        //  ----------------------------- crypto1 destroy
        crypto1_destroy(pcs);
        
-//    DbpString("READ BLOCK FINISHED");
+       if (MF_DBGLEVEL >= 2) DbpString("READ SECTOR FINISHED");
 
        // add trace trailer
-       uid[0] = 0xff;
-       uid[1] = 0xff;
-       uid[2] = 0xff;
-       uid[3] = 0xff;
+       memset(uid, 0x44, 4);
        LogTrace(uid, 4, 0, 0, TRUE);
 
        UsbCommand ack = {CMD_ACK, {isOK, 0, 0}};
@@ -2002,23 +2199,23 @@ void MifareWriteBlock(uint8_t arg0, uint8_t arg1, uint8_t arg2, uint8_t *datain)
        LED_C_OFF();
 
        while (true) {
-               if(!iso14443a_select_card(uid, NULL, &cuid)) {
-                       Dbprintf("Can't select card");
+                       if(!iso14443a_select_card(uid, NULL, &cuid)) {
+                       if (MF_DBGLEVEL >= 1)   Dbprintf("Can't select card");
                        break;
                };
 
                if(mifare_classic_auth(pcs, cuid, blockNo, keyType, ui64Key, AUTH_FIRST)) {
-                       Dbprintf("Auth error");
+                       if (MF_DBGLEVEL >= 1)   Dbprintf("Auth error");
                        break;
                };
                
                if(mifare_classic_writeblock(pcs, cuid, blockNo, blockdata)) {
-                       Dbprintf("Write block error");
+                       if (MF_DBGLEVEL >= 1)   Dbprintf("Write block error");
                        break;
                };
 
                if(mifare_classic_halt(pcs, cuid)) {
-                       Dbprintf("Halt error");
+                       if (MF_DBGLEVEL >= 1)   Dbprintf("Halt error");
                        break;
                };
                
@@ -2029,13 +2226,10 @@ void MifareWriteBlock(uint8_t arg0, uint8_t arg1, uint8_t arg2, uint8_t *datain)
        //  ----------------------------- crypto1 destroy
        crypto1_destroy(pcs);
        
-//  DbpString("WRITE BLOCK FINISHED");
+       if (MF_DBGLEVEL >= 2)   DbpString("WRITE BLOCK FINISHED");
 
        // add trace trailer
-       uid[0] = 0xff;
-       uid[1] = 0xff;
-       uid[2] = 0xff;
-       uid[3] = 0xff;
+       memset(uid, 0x44, 4);
        LogTrace(uid, 4, 0, 0, TRUE);
 
        UsbCommand ack = {CMD_ACK, {isOK, 0, 0}};
@@ -2064,34 +2258,39 @@ int valid_nonce(uint32_t Nt, uint32_t NtEnc, uint32_t Ks1, byte_t * parity) {
 // MIFARE nested authentication. 
 // 
 //-----------------------------------------------------------------------------
-void MifareNested(uint8_t arg0, uint8_t arg1, uint8_t arg2, uint8_t *datain)
+void MifareNested(uint32_t arg0, uint32_t arg1, uint32_t arg2, uint8_t *datain)
 {
        // params
        uint8_t blockNo = arg0;
        uint8_t keyType = arg1;
+       uint8_t targetBlockNo = arg2 & 0xff;
+       uint8_t targetKeyType = (arg2 >> 8) & 0xff;
        uint64_t ui64Key = 0;
 
        ui64Key = bytes_to_num(datain, 6);
        
        // variables
-       uint8_t targetBlockNo = blockNo + 1;
-       int rtr, i, m, len;
+       int rtr, i, j, m, len;
        int davg, dmin, dmax;
        uint8_t uid[8];
        uint32_t cuid, nt1, nt2, nttmp, nttest, par, ks1;
        uint8_t par_array[4];
-       nestedVector nvector[3][10];
-       int nvectorcount[3] = {10, 10, 10};
+       nestedVector nvector[NES_MAX_INFO + 1][10];
+       int nvectorcount[NES_MAX_INFO + 1];
        int ncount = 0;
+       UsbCommand ack = {CMD_ACK, {0, 0, 0}};
        struct Crypto1State mpcs = {0, 0};
        struct Crypto1State *pcs;
        pcs = &mpcs;
        uint8_t* receivedAnswer = mifare_get_bigbufptr();
 
+       //init
+       for (i = 0; i < NES_MAX_INFO + 1; i++) nvectorcount[i] = 11;  //  11 - empty block;
+       
        // clear trace
        traceLen = 0;
   tracing = false;
-
+       
        iso14443a_setup();
 
        LED_A_ON();
@@ -2116,17 +2315,17 @@ void MifareNested(uint8_t arg0, uint8_t arg1, uint8_t arg2, uint8_t *datain)
     }
 
                if(!iso14443a_select_card(uid, NULL, &cuid)) {
-                       Dbprintf("Can't select card");
+                       if (MF_DBGLEVEL >= 1)   Dbprintf("Can't select card");
                        break;
                };
                
                if(mifare_classic_authex(pcs, cuid, blockNo, keyType, ui64Key, AUTH_FIRST, &nt1)) {
-                       Dbprintf("Auth1 error");
+                       if (MF_DBGLEVEL >= 1)   Dbprintf("Auth1 error");
                        break;
                };
 
                if(mifare_classic_authex(pcs, cuid, blockNo, keyType, ui64Key, AUTH_NESTED, &nt2)) {
-                       Dbprintf("Auth2 error");
+                       if (MF_DBGLEVEL >= 1)   Dbprintf("Auth2 error");
                        break;
                };
                
@@ -2140,24 +2339,24 @@ void MifareNested(uint8_t arg0, uint8_t arg1, uint8_t arg2, uint8_t *datain)
                        davg += i;
                        if (dmin > i) dmin = i;
                        if (dmax < i) dmax = i;
-//                     Dbprintf("r=%d nt1=%08x nt2=%08x distance=%d", rtr, nt1, nt2, i);
+                       if (MF_DBGLEVEL >= 4)   Dbprintf("r=%d nt1=%08x nt2=%08x distance=%d", rtr, nt1, nt2, i);
                }
        }
        
        if (rtr == 0)   return;
 
        davg = davg / rtr;
-       Dbprintf("distance: min=%d max=%d avg=%d", dmin, dmax, davg);
+       if (MF_DBGLEVEL >= 3)   Dbprintf("distance: min=%d max=%d avg=%d", dmin, dmax, davg);
 
        LED_B_OFF();
 
-  tracing = true;
+//  -------------------------------------------------------------------------------------------------  
        
        LED_C_ON();
 
        //  get crypted nonces for target sector
-       for (rtr = 0; rtr < 4; rtr++) {
-               Dbprintf("------------------------------");
+       for (rtr = 0; rtr < NS_RETRIES_GETNONCE; rtr++) {
+       if (MF_DBGLEVEL >= 4)                   Dbprintf("------------------------------");
 
                FpgaWriteConfWord(FPGA_MAJOR_MODE_OFF);
     SpinDelay(100);
@@ -2169,47 +2368,24 @@ void MifareNested(uint8_t arg0, uint8_t arg1, uint8_t arg2, uint8_t *datain)
     }
 
                if(!iso14443a_select_card(uid, NULL, &cuid)) {
-                       Dbprintf("Can't select card");
+                       if (MF_DBGLEVEL >= 1)   Dbprintf("Can't select card");
                        break;
                };
                
                if(mifare_classic_authex(pcs, cuid, blockNo, keyType, ui64Key, AUTH_FIRST, &nt1)) {
-                       Dbprintf("Auth1 error");
+                       if (MF_DBGLEVEL >= 1)   Dbprintf("Auth1 error");
                        break;
                };
 
                // nested authentication
-               len = mifare_sendcmd_shortex(pcs, AUTH_NESTED, 0x60 + (keyType & 0x01), targetBlockNo, receivedAnswer, &par);
+               len = mifare_sendcmd_shortex(pcs, AUTH_NESTED, 0x60 + (targetKeyType & 0x01), targetBlockNo, receivedAnswer, &par);
                if (len != 4) {
-                       Dbprintf("Auth2 error len=%d", len);
+                       if (MF_DBGLEVEL >= 1)   Dbprintf("Auth2 error len=%d", len);
                        break;
                };
        
                nt2 = bytes_to_num(receivedAnswer, 4);          
-               Dbprintf("r=%d nt1=%08x nt2enc=%08x nt2par=%08x", rtr, nt1, nt2, par);
-               
-// -----------------------  test               
-/*     uint32_t d_nt, d_ks1, d_ks2, d_ks3, reader_challenge;
-       byte_t ar[4];
-
-       ar[0] = 0x55;
-       ar[1] = 0x41;
-       ar[2] = 0x49;
-       ar[3] = 0x92; 
-
-       crypto1_destroy(pcs);
-       crypto1_create(pcs, ui64Key);
-
-       // decrypt nt with help of new key 
-       d_nt = crypto1_word(pcs, nt2 ^ cuid, 1) ^ nt2;
-       
-       reader_challenge = d_nt;//(uint32_t)bytes_to_num(ar, 4); 
-       d_ks1 = crypto1_word(pcs, reader_challenge, 0);
-       d_ks2 = crypto1_word(pcs, 0, 0);
-       d_ks3 = crypto1_word(pcs, 0,0);
-               
-       Dbprintf("TST: ks1=%08x nt=%08x", d_ks1, d_nt);*/
-// -----------------------  test               
+               if (MF_DBGLEVEL >= 4)   Dbprintf("r=%d nt1=%08x nt2enc=%08x nt2par=%08x", rtr, nt1, nt2, par);
                
                // Parity validity check
                for (i = 0; i < 4; i++) {
@@ -2218,86 +2394,176 @@ void MifareNested(uint8_t arg0, uint8_t arg1, uint8_t arg2, uint8_t *datain)
                }
                
                ncount = 0;
-               for (m = dmin - 10; m < dmax + 10; m++) {
+               for (m = dmin - NS_TOLERANCE; m < dmax + NS_TOLERANCE; m++) {
                        nttest = prng_successor(nt1, m);
                        ks1 = nt2 ^ nttest;
 
-//--------------------------------------  test
-/*                     if (nttest == d_nt){
-                               Dbprintf("nttest=d_nt!  m=%d ks1=%08x nttest=%08x", m, ks1, nttest);
-                       }*/
-//--------------------------------------  test
                        if (valid_nonce(nttest, nt2, ks1, par_array) && (ncount < 11)){
                                
-                               nvector[2][ncount].nt = nttest;
-                               nvector[2][ncount].ks1 = ks1;
+                               nvector[NES_MAX_INFO][ncount].nt = nttest;
+                               nvector[NES_MAX_INFO][ncount].ks1 = ks1;
                                ncount++;
-                               nvectorcount[2] = ncount;
-                               
-                               Dbprintf("valid m=%d ks1=%08x nttest=%08x", m, ks1, nttest);
+                               nvectorcount[NES_MAX_INFO] = ncount;
+                               if (MF_DBGLEVEL >= 4)   Dbprintf("valid m=%d ks1=%08x nttest=%08x", m, ks1, nttest);
                        }
 
                }
                
                // select vector with length less than got
-               m = 2;
-               if (nvectorcount[2] < nvectorcount[1]) m = 1;
-               if (nvectorcount[2] < nvectorcount[0]) m = 0;
-               if (m != 2) {
-                       for (i = 0; i < nvectorcount[m]; i++) {
-                               nvector[m][i] = nvector[2][i];
+               if (nvectorcount[NES_MAX_INFO] != 0) {
+                       m = NES_MAX_INFO;
+                       
+                       for (i = 0; i < NES_MAX_INFO; i++)
+                               if (nvectorcount[i] > 10) {
+                                       m = i;
+                                       break;
+                               }
+                               
+                       if (m == NES_MAX_INFO)
+                               for (i = 0; i < NES_MAX_INFO; i++)
+                                       if (nvectorcount[NES_MAX_INFO] < nvectorcount[i]) {
+                                               m = i;
+                                               break;
+                                       }
+                                       
+                       if (m != NES_MAX_INFO) {
+                               for (i = 0; i < nvectorcount[m]; i++) {
+                                       nvector[m][i] = nvector[NES_MAX_INFO][i];
+                               }
+                               nvectorcount[m] = nvectorcount[NES_MAX_INFO];
                        }
-                       nvectorcount[m] = nvectorcount[2];
                }
-               
-               Dbprintf("vector count: 1=%d 2=%d 3=%d", nvectorcount[0], nvectorcount[1], nvectorcount[2]);
        }
 
        LED_C_OFF();
-
        
        //  ----------------------------- crypto1 destroy
        crypto1_destroy(pcs);
        
        // add trace trailer
-       uid[0] = 0xff;
-       uid[1] = 0xff;
-       uid[2] = 0xff;
-       uid[3] = 0xff;
+       memset(uid, 0x44, 4);
        LogTrace(uid, 4, 0, 0, TRUE);
 
-       for (i = 0; i < 2; i++) {
-               ncount = nvectorcount[i];
-               if (ncount > 5) ncount = 5; //!!!!!  needs to be 2 packets x 5 pairs (nt,ks1)
-
-               // isEOF = 0
-               UsbCommand ack = {CMD_ACK, {0, ncount, targetBlockNo}};
-               memcpy(ack.d.asBytes, &cuid, 4);
-               for (m = 0; m < 5; m++) {
-                       memcpy(ack.d.asBytes + 4 + m * 8 + 0, &nvector[i][m].nt, 4);
-                       memcpy(ack.d.asBytes + 4 + m * 8 + 4, &nvector[i][m].ks1, 4);
-               }
+       for (i = 0; i < NES_MAX_INFO; i++) {
+               if (nvectorcount[i] > 10) continue;
+               
+               for (j = 0; j < nvectorcount[i]; j += 5) {
+                       ncount = nvectorcount[i] - j;
+                       if (ncount > 5) ncount = 5; 
+
+                       ack.arg[0] = 0; // isEOF = 0
+                       ack.arg[1] = ncount;
+                       ack.arg[2] = targetBlockNo + (targetKeyType * 0x100);
+                       memset(ack.d.asBytes, 0x00, sizeof(ack.d.asBytes));
+                       
+                       memcpy(ack.d.asBytes, &cuid, 4);
+                       for (m = 0; m < ncount; m++) {
+                               memcpy(ack.d.asBytes + 8 + m * 8 + 0, &nvector[i][m + j].nt, 4);
+                               memcpy(ack.d.asBytes + 8 + m * 8 + 4, &nvector[i][m + j].ks1, 4);
+                       }
        
-               LED_B_ON();
-               UsbSendPacket((uint8_t *)&ack, sizeof(UsbCommand));
-               LED_B_OFF();    
+                       LED_B_ON();
+                       SpinDelay(100);
+                       UsbSendPacket((uint8_t *)&ack, sizeof(UsbCommand));
+                       LED_B_OFF();    
+               }
        }
 
        // finalize list
-       // isEOF = 1
-       UsbCommand ack = {CMD_ACK, {1, 0, 0}};
+       ack.arg[0] = 1; // isEOF = 1
+       ack.arg[1] = 0;
+       ack.arg[2] = 0;
+       memset(ack.d.asBytes, 0x00, sizeof(ack.d.asBytes));
        
        LED_B_ON();
+       SpinDelay(300);
        UsbSendPacket((uint8_t *)&ack, sizeof(UsbCommand));
        LED_B_OFF();    
 
-       DbpString("NESTED FINISHED");
+       if (MF_DBGLEVEL >= 4)   DbpString("NESTED FINISHED");
 
        // Thats it...
        FpgaWriteConfWord(FPGA_MAJOR_MODE_OFF);
        LEDsoff();
-//  tracing = TRUE;
+       
+  tracing = TRUE;
+}
+
+//-----------------------------------------------------------------------------
+// MIFARE check keys. key count up to 8. 
+// 
+//-----------------------------------------------------------------------------
+void MifareChkKeys(uint8_t arg0, uint8_t arg1, uint8_t arg2, uint8_t *datain)
+{
+  // params
+       uint8_t blockNo = arg0;
+       uint8_t keyType = arg1;
+       uint8_t keyCount = arg2;
+       uint64_t ui64Key = 0;
+       
+       // variables
+       int i;
+       byte_t isOK = 0;
+       uint8_t uid[8];
+       uint32_t cuid;
+       struct Crypto1State mpcs = {0, 0};
+       struct Crypto1State *pcs;
+       pcs = &mpcs;
+       
+       // clear debug level
+       int OLD_MF_DBGLEVEL = MF_DBGLEVEL;      
+       MF_DBGLEVEL = MF_DBG_NONE;
+       
+       // clear trace
+       traceLen = 0;
+  tracing = TRUE;
+
+       iso14443a_setup();
+
+       LED_A_ON();
+       LED_B_OFF();
+       LED_C_OFF();
+
+       SpinDelay(300);
+       for (i = 0; i < keyCount; i++) {
+               FpgaWriteConfWord(FPGA_MAJOR_MODE_OFF);
+    SpinDelay(100);
+    FpgaWriteConfWord(FPGA_MAJOR_MODE_HF_ISO14443A | FPGA_HF_ISO14443A_READER_MOD);
+
+               if(!iso14443a_select_card(uid, NULL, &cuid)) {
+                       if (OLD_MF_DBGLEVEL >= 1)       Dbprintf("Can't select card");
+                       break;
+               };
+
+               ui64Key = bytes_to_num(datain + i * 6, 6);
+               if(mifare_classic_auth(pcs, cuid, blockNo, keyType, ui64Key, AUTH_FIRST)) {
+                       continue;
+               };
+               
+               isOK = 1;
+               break;
+       }
+       
+       //  ----------------------------- crypto1 destroy
+       crypto1_destroy(pcs);
+       
+       // add trace trailer
+       memset(uid, 0x44, 4);
+       LogTrace(uid, 4, 0, 0, TRUE);
+
+       UsbCommand ack = {CMD_ACK, {isOK, 0, 0}};
+       if (isOK) memcpy(ack.d.asBytes, datain + i * 6, 6);
+       
+       LED_B_ON();
+       UsbSendPacket((uint8_t *)&ack, sizeof(UsbCommand));
+       LED_B_OFF();
+
+  // Thats it...
+       FpgaWriteConfWord(FPGA_MAJOR_MODE_OFF);
+       LEDsoff();
 
+       // restore debug level
+       MF_DBGLEVEL = OLD_MF_DBGLEVEL;  
 }
 
 //-----------------------------------------------------------------------------
@@ -2306,4 +2572,306 @@ void MifareNested(uint8_t arg0, uint8_t arg1, uint8_t arg2, uint8_t *datain)
 //-----------------------------------------------------------------------------
 void Mifare1ksim(uint8_t arg0, uint8_t arg1, uint8_t arg2, uint8_t *datain)
 {
+       int cardSTATE = MFEMUL_NOFIELD;
+       int vHf = 0;    // in mV
+       int nextCycleTimeout = 0;
+       int res;
+       uint32_t timer = 0;
+       uint32_t selTimer = 0;
+       uint32_t authTimer = 0;
+       uint32_t par = 0;
+       int len = 0;
+       uint8_t cardWRBL = 0;
+       uint8_t cardAUTHSC = 0;
+       uint8_t cardAUTHKEY = 0xff;  // no authentication
+       uint32_t cuid = 0;
+       struct Crypto1State mpcs = {0, 0};
+       struct Crypto1State *pcs;
+       pcs = &mpcs;
+       
+       uint64_t key64 = 0xffffffffffffULL;
+       
+       uint8_t* receivedCmd = eml_get_bigbufptr_recbuf();
+       uint8_t *response = eml_get_bigbufptr_sendbuf();
+       
+       static uint8_t rATQA[] = {0x04, 0x00}; // Mifare classic 1k
+
+       static uint8_t rUIDBCC1[] = {0xde, 0xad, 0xbe, 0xaf, 0x62}; 
+       static uint8_t rUIDBCC2[] = {0xde, 0xad, 0xbe, 0xaf, 0x62}; // !!!
+               
+       static uint8_t rSAK[] = {0x08, 0xb6, 0xdd};
+
+       static uint8_t rAUTH_NT[] = {0x1a, 0xac, 0xff, 0x4f};
+       static uint8_t rAUTH_AT[] = {0x00, 0x00, 0x00, 0x00};
+       
+       // clear trace
+       traceLen = 0;
+       tracing = true;
+       
+       // emulator memory
+       emlClearMem();
+       emlGetMemBt(rUIDBCC1, 0, 4);
+       rUIDBCC1[4] = rUIDBCC1[0] ^ rUIDBCC1[1] ^ rUIDBCC1[2] ^ rUIDBCC1[3];
+       
+// --------------------------------------      test area
+
+   // Authenticate response - nonce
+    uint8_t *resp1 = (((uint8_t *)BigBuf) + EML_RESPONSES);
+    int resp1Len;
+//    uint8_t *resp2 = (((uint8_t *)BigBuf) + EML_RESPONSES + 200);
+//    int resp2Len;
+       CodeIso14443aAsTag(rAUTH_NT, sizeof(rAUTH_NT));
+    memcpy(resp1, ToSend, ToSendMax); resp1Len = ToSendMax;
+               
+       timer = GetTickCount();
+       uint32_t nonce = bytes_to_num(rAUTH_NT, 4);
+       uint32_t rn_enc = 0x98d76b77; // !!!!!!!!!!!!!!!!!
+       uint32_t ans = 0;
+       cuid = bytes_to_num(rUIDBCC1, 4);
+/*     
+       crypto1_create(pcs, key64);
+  crypto1_word(pcs, cuid ^ nonce, 0);
+  crypto1_word(pcs, rn_enc , 1);
+  crypto1_word(pcs, 0, 0);
+  ans = prng_successor(nonce, 96) ^ crypto1_word(pcs, 0, 0);
+       num_to_bytes(ans, 4, rAUTH_AT);
+       CodeIso14443aAsTag(rAUTH_AT, sizeof(rAUTH_AT));
+  memcpy(resp2, ToSend, ToSendMax); resp2Len = ToSendMax;
+       Dbprintf("crypto auth time: %d", GetTickCount() - timer);
+*/
+// --------------------------------------      END test area
+       // start mkseconds counter
+       StartCountUS();
+
+       // We need to listen to the high-frequency, peak-detected path.
+       SetAdcMuxFor(GPIO_MUXSEL_HIPKD);
+       FpgaSetupSsc();
+
+  FpgaWriteConfWord(FPGA_MAJOR_MODE_HF_ISO14443A | FPGA_HF_ISO14443A_TAGSIM_LISTEN);
+       SpinDelay(200);
+
+       Dbprintf("--> start");
+       // calibrate mkseconds counter
+       GetDeltaCountUS();
+       while (true) {
+               WDT_HIT();
+
+               if(BUTTON_PRESS()) {
+                       break;
+               }
+
+               // find reader field
+               // Vref = 3300mV, and an 10:1 voltage divider on the input
+               // can measure voltages up to 33000 mV
+               if (cardSTATE == MFEMUL_NOFIELD) {
+                       vHf = (33000 * AvgAdc(ADC_CHAN_HF)) >> 10;
+                       if (vHf > MF_MINFIELDV) {
+                               cardSTATE = MFEMUL_IDLE;
+                               LED_A_ON();
+                       }
+               } 
+
+               if (cardSTATE != MFEMUL_NOFIELD) {
+                       res = EmGetCmd(receivedCmd, &len, 100); // (+ nextCycleTimeout)
+                       if (res == 2) {
+                               cardSTATE = MFEMUL_NOFIELD;
+                               LEDsoff();
+                               continue;
+                       }
+                       if(res) break;
+               }
+               
+               nextCycleTimeout = 0;
+               
+//             if (len) Dbprintf("len:%d cmd: %02x %02x %02x %02x", len, receivedCmd[0], receivedCmd[1], receivedCmd[2], receivedCmd[3]);
+
+               if (len != 4 && cardSTATE != MFEMUL_NOFIELD) { // len != 4 <---- speed up the code 4 authentication
+                       // REQ or WUP request in ANY state and WUP in HALTED state
+                       if (len == 1 && ((receivedCmd[0] == 0x26 && cardSTATE != MFEMUL_HALTED) || receivedCmd[0] == 0x52)) {
+                               selTimer = GetTickCount();
+                               EmSendCmdEx(rATQA, sizeof(rATQA), (receivedCmd[0] == 0x52));
+                               cardSTATE = MFEMUL_SELECT1;
+
+                               // init crypto block
+                               LED_B_OFF();
+                               LED_C_OFF();
+                               crypto1_destroy(pcs);
+                               cardAUTHKEY = 0xff;
+                       }
+               }
+               
+               switch (cardSTATE) {
+                       case MFEMUL_NOFIELD:{
+                               break;
+                       }
+                       case MFEMUL_HALTED:{
+                               break;
+                       }
+                       case MFEMUL_IDLE:{
+                               break;
+                       }
+                       case MFEMUL_SELECT1:{
+                               // select all
+                               if (len == 2 && (receivedCmd[0] == 0x93 && receivedCmd[1] == 0x20)) {
+                                       EmSendCmd(rUIDBCC1, sizeof(rUIDBCC1));
+
+                                       if (rUIDBCC1[0] == 0x88) {
+                                               cardSTATE = MFEMUL_SELECT2;
+                                       }
+                               }
+
+                               // select card
+                               if (len == 9 && 
+                                               (receivedCmd[0] == 0x93 && receivedCmd[1] == 0x70 && memcmp(&receivedCmd[2], rUIDBCC1, 4) == 0)) {
+                                       EmSendCmd(rSAK, sizeof(rSAK));
+
+                                       cuid = bytes_to_num(rUIDBCC1, 4);
+                                       cardSTATE = MFEMUL_WORK;
+                                       LED_B_ON();
+                                       Dbprintf("--> WORK. anticol1 time: %d", GetTickCount() - selTimer);
+                               }
+                               
+                               break;
+                       }
+                       case MFEMUL_SELECT2:{
+                                       EmSendCmd(rUIDBCC2, sizeof(rUIDBCC2));
+
+                               cuid = bytes_to_num(rUIDBCC2, 4);
+                               cardSTATE = MFEMUL_WORK;
+                               LED_B_ON();
+Dbprintf("--> WORK. anticol2 time: %d", GetTickCount() - selTimer);
+                               break;
+                       }
+                       case MFEMUL_AUTH1:{
+                               if (len == 8) {
+// ---------------------------------
+       rn_enc = bytes_to_num(receivedCmd, 4);
+       crypto1_create(pcs, key64);
+  crypto1_word(pcs, cuid ^ nonce, 0);
+  crypto1_word(pcs, rn_enc , 1);
+  crypto1_word(pcs, 0, 0);
+  ans = prng_successor(nonce, 96) ^ crypto1_word(pcs, 0, 0);
+       num_to_bytes(ans, 4, rAUTH_AT);
+// ---------------------------------
+                               EmSendCmd(rAUTH_AT, sizeof(rAUTH_AT));
+                                       cardSTATE = MFEMUL_AUTH2;
+                               } else {
+                                       cardSTATE = MFEMUL_IDLE;
+                                       LED_B_OFF();
+                                       LED_C_OFF();
+                               }
+                               if (cardSTATE != MFEMUL_AUTH2) break;
+                       }
+                       case MFEMUL_AUTH2:{
+                               // test auth info here...
+
+                               LED_C_ON();
+                               cardSTATE = MFEMUL_WORK;
+Dbprintf("AUTH COMPLETED. sec=%d, key=%d time=%d", cardAUTHSC, cardAUTHKEY, GetTickCount() - authTimer);
+                               break;
+                       }
+                       case MFEMUL_WORK:{
+                               // auth
+                               if (len == 4 && (receivedCmd[0] == 0x60 || receivedCmd[0] == 0x61)) {
+authTimer = GetTickCount();
+//                                     EmSendCmd(rAUTH_NT, sizeof(rAUTH_NT));
+                                       EmSendCmd14443aRaw(resp1, resp1Len, 0);
+LogTrace(NULL, 0, GetDeltaCountUS(), 0, TRUE);
+//                                     crypto1_create(pcs, key64);
+//                                     if (cardAUTHKEY == 0xff) { // first auth
+//                                     crypto1_word(pcs, cuid ^ bytes_to_num(rAUTH_NT, 4), 0); // uid ^ nonce
+//                                     } else { // nested auth
+//                                     }
+
+                                       cardAUTHSC = receivedCmd[1] / 4;  // received block num
+                                       cardAUTHKEY = receivedCmd[0] - 0x60;
+                                       cardSTATE = MFEMUL_AUTH1;
+                                       nextCycleTimeout = 10;
+                                       break;
+                               }
+                               
+                               if (len == 0) break;
+                               
+                               // decrypt seqence
+                               if (cardAUTHKEY != 0xff) mf_crypto1_decrypt(pcs, receivedCmd, len);
+                               
+                               // rule 13 of 7.5.3. in ISO 14443-4. chaining shall be continued
+                               // BUT... ACK --> NACK
+                               if (len == 1 && receivedCmd[0] == CARD_ACK) {
+                                       EmSend4bit(mf_crypto1_encrypt4bit(pcs, CARD_NACK_NA));
+                                       break;
+                               }
+                               
+                               // rule 12 of 7.5.3. in ISO 14443-4. R(NAK) --> R(ACK)
+                               if (len == 1 && receivedCmd[0] == CARD_NACK_NA) {
+                                       EmSend4bit(mf_crypto1_encrypt4bit(pcs, CARD_ACK));
+                                       break;
+                               }
+                               
+                               // read block
+                               if (len == 4 && receivedCmd[0] == 0x30) {
+                                       if (receivedCmd[1] >= 16 * 4) {
+                                               EmSend4bit(mf_crypto1_encrypt4bit(pcs, CARD_NACK_NA));
+                                               break;
+                                       }
+                                       emlGetMem(response, receivedCmd[1], 1);
+                                       AppendCrc14443a(response, 16);
+                                       mf_crypto1_encrypt(pcs, response, 18, &par);
+                                       EmSendCmdPar(response, 18, par);
+                                       break;
+                               }
+                               
+                               // write block
+                               if (len == 4 && receivedCmd[0] == 0xA0) {
+                                       if (receivedCmd[1] >= 16 * 4) {
+                                               EmSend4bit(mf_crypto1_encrypt4bit(pcs, CARD_NACK_NA));
+                                               break;
+                                       }
+                                       EmSend4bit(mf_crypto1_encrypt4bit(pcs, CARD_ACK));
+                                       nextCycleTimeout = 50;
+                                       cardSTATE = MFEMUL_WRITEBL2;
+                                       cardWRBL = receivedCmd[1];
+                                       break;
+                               }
+                       
+                               // halt
+                               if (len == 4 && (receivedCmd[0] == 0x50 && receivedCmd[1] == 0x00)) {
+                                       cardSTATE = MFEMUL_HALTED;
+                                       LED_B_OFF();
+                                       LED_C_OFF();
+                                       Dbprintf("--> HALTED. Selected time: %d ms",  GetTickCount() - selTimer);
+                                       break;
+                               }
+                               break;
+
+                               // command not allowed
+                               if (len == 4) {
+                                       EmSend4bit(mf_crypto1_encrypt4bit(pcs, CARD_NACK_NA));
+                                       break;
+                               }
+                       }
+                       case MFEMUL_WRITEBL2:{
+                               if (len == 18){
+                                       mf_crypto1_decrypt(pcs, receivedCmd, len);
+                                       emlSetMem(receivedCmd, cardWRBL, 1);
+                                       EmSend4bit(mf_crypto1_encrypt4bit(pcs, CARD_ACK));
+                                       cardSTATE = MFEMUL_WORK;
+                                       break;
+                               }
+Dbprintf("err write block: %d len:%d", cardWRBL, len);
+                               break;
+                       }
+               
+               }
+       
+       }
+
+       FpgaWriteConfWord(FPGA_MAJOR_MODE_OFF);
+       LEDsoff();
+
+       // add trace trailer
+       memset(rAUTH_NT, 0x44, 4);
+       LogTrace(rAUTH_NT, 4, 0, 0, TRUE);
+
+       DbpString("Emulator stopped.");
 }
Impressum, Datenschutz