]> git.zerfleddert.de Git - proxmark3-svn/blame - client/cmdlfpyramid.c
a few notation fixes
[proxmark3-svn] / client / cmdlfpyramid.c
CommitLineData
6923d3f1 1//-----------------------------------------------------------------------------
2//
3// This code is licensed to you under the terms of the GNU GPL, version 2 or,
4// at your option, any later version. See the LICENSE.txt file for the text of
5// the license.
6//-----------------------------------------------------------------------------
7// Low frequency Farpoint / Pyramid tag commands
b9957414 8// FSK2a, rf/50, 128 bits (complete)
6923d3f1 9//-----------------------------------------------------------------------------
10#include <string.h>
11#include <inttypes.h>
acf0582d 12#include <stdio.h>
2b4898ec 13#include "cmdlfpyramid.h"
29ada8fc 14#include "proxmark3.h"
15#include "ui.h"
16#include "util.h"
17#include "graph.h"
18#include "cmdparser.h"
cf4640b9 19#include "cmddata.h" // setDemodBuf +
29ada8fc 20#include "cmdmain.h"
21#include "cmdlf.h"
22#include "protocols.h" // for T55xx config register definitions
23#include "lfdemod.h" // parityTest
24#include "crc.h"
25
6923d3f1 26static int CmdHelp(const char *Cmd);
27
28int usage_lf_pyramid_clone(void){
29 PrintAndLog("clone a Farpointe/Pyramid tag to a T55x7 tag.");
30 PrintAndLog("The facility-code is 8-bit and the card number is 16-bit. Larger values are truncated. ");
cf4640b9 31 PrintAndLog("Currently only works on 26bit");
6923d3f1 32 PrintAndLog("");
33 PrintAndLog("Usage: lf pyramid clone <Facility-Code> <Card-Number>");
34 PrintAndLog("Options :");
35 PrintAndLog(" <Facility-Code> : 8-bit value facility code");
36 PrintAndLog(" <Card Number> : 16-bit value card number");
29ada8fc 37 PrintAndLog(" Q5 : optional - clone to Q5 (T5555) instead of T55x7 chip");
6923d3f1 38 PrintAndLog("");
39 PrintAndLog("Sample : lf pyramid clone 123 11223");
40 return 0;
41}
42
43int usage_lf_pyramid_sim(void) {
44 PrintAndLog("Enables simulation of Farpointe/Pyramid card with specified card number.");
45 PrintAndLog("Simulation runs until the button is pressed or another USB command is issued.");
46 PrintAndLog("The facility-code is 8-bit and the card number is 16-bit. Larger values are truncated.");
47 PrintAndLog("Currently work only on 26bit");
48 PrintAndLog("");
49 PrintAndLog("Usage: lf pyramid sim <Card-Number>");
50 PrintAndLog("Options :");
51 PrintAndLog(" <Facility-Code> : 8-bit value facility code");
52 PrintAndLog(" <Card Number> : 16-bit value card number");
53 PrintAndLog("");
54 PrintAndLog("Sample : lf pyramid sim 123 11223");
55 return 0;
56}
57
58// Works for 26bits.
59int GetPyramidBits(uint32_t fc, uint32_t cn, uint8_t *pyramidBits) {
60
61 uint8_t pre[128];
62 memset(pre, 0x00, sizeof(pre));
63
64 // format start bit
65 pre[79] = 1;
66
67 // Get 26 wiegand from FacilityCode, CardNumber
68 uint8_t wiegand[24];
69 memset(wiegand, 0x00, sizeof(wiegand));
70 num_to_bytebits(fc, 8, wiegand);
71 num_to_bytebits(cn, 16, wiegand+8);
72
73 // add wiegand parity bits (dest, source, len)
74 wiegand_add_parity(pre+80, wiegand, 24);
75
76 // add paritybits (bitsource, dest, sourcelen, paritylen, parityType (odd, even,)
77 addParity(pre+8, pyramidBits+8, 102, 8, 1);
78
79 // add checksum
80 uint8_t csBuff[13];
81 for (uint8_t i = 0; i < 13; i++)
82 csBuff[i] = bytebits_to_byte(pyramidBits + 16 + (i*8), 8);
83
84 uint32_t crc = CRC8Maxim(csBuff, 13);
85 num_to_bytebits(crc, 8, pyramidBits+120);
86 return 1;
87}
88
cf4640b9 89//by marshmellow
90//Pyramid Prox demod - FSK RF/50 with preamble of 0000000000000001 (always a 128 bit data stream)
91//print full Farpointe Data/Pyramid Prox ID and some bit format details if found
92int CmdFSKdemodPyramid(const char *Cmd)
93{
94 //raw fsk demod no manchester decoding no start bit finding just get binary from wave
95 uint8_t BitStream[MAX_GRAPH_TRACE_LEN]={0};
96 size_t size = getFromGraphBuf(BitStream);
97 if (size==0) return 0;
98
99 //get binary from fsk wave
100 int idx = PyramiddemodFSK(BitStream, &size);
101 if (idx < 0){
102 if (g_debugMode){
103 if (idx == -5)
104 PrintAndLog("DEBUG: Error - not enough samples");
105 else if (idx == -1)
106 PrintAndLog("DEBUG: Error - only noise found");
107 else if (idx == -2)
108 PrintAndLog("DEBUG: Error - problem during FSK demod");
109 else if (idx == -3)
110 PrintAndLog("DEBUG: Error - Size not correct: %d", size);
111 else if (idx == -4)
112 PrintAndLog("DEBUG: Error - Pyramid preamble not found");
113 else
114 PrintAndLog("DEBUG: Error - idx: %d",idx);
115 }
116 return 0;
117 }
118 // Index map
119 // 0 10 20 30 40 50 60
120 // | | | | | | |
121 // 0123456 7 8901234 5 6789012 3 4567890 1 2345678 9 0123456 7 8901234 5 6789012 3
122 // -----------------------------------------------------------------------------
123 // 0000000 0 0000000 1 0000000 1 0000000 1 0000000 1 0000000 1 0000000 1 0000000 1
124 // premable xxxxxxx o xxxxxxx o xxxxxxx o xxxxxxx o xxxxxxx o xxxxxxx o xxxxxxx o
125
126 // 64 70 80 90 100 110 120
127 // | | | | | | |
128 // 4567890 1 2345678 9 0123456 7 8901234 5 6789012 3 4567890 1 2345678 9 0123456 7
129 // -----------------------------------------------------------------------------
130 // 0000000 1 0000000 1 0000000 1 0110111 0 0011000 1 0000001 0 0001100 1 1001010 0
131 // xxxxxxx o xxxxxxx o xxxxxxx o xswffff o ffffccc o ccccccc o ccccccw o ppppppp o
132 // |---115---||---------71---------|
133 // s = format start bit, o = odd parity of last 7 bits
134 // f = facility code, c = card number
135 // w = wiegand parity, x = extra space for other formats
136 // p = unknown checksum
137 // (26 bit format shown)
138
139 //get bytes for checksum calc
140 uint8_t checksum = bytebits_to_byte(BitStream + idx + 120, 8);
141 uint8_t csBuff[14] = {0x00};
142 for (uint8_t i = 0; i < 13; i++){
143 csBuff[i] = bytebits_to_byte(BitStream + idx + 16 + (i*8), 8);
144 }
145 //check checksum calc
146 //checksum calc thanks to ICEMAN!!
147 uint32_t checkCS = CRC8Maxim(csBuff,13);
148
149 //get raw ID before removing parities
150 uint32_t rawLo = bytebits_to_byte(BitStream+idx+96,32);
151 uint32_t rawHi = bytebits_to_byte(BitStream+idx+64,32);
152 uint32_t rawHi2 = bytebits_to_byte(BitStream+idx+32,32);
153 uint32_t rawHi3 = bytebits_to_byte(BitStream+idx,32);
154 setDemodBuf(BitStream,128,idx);
9fe4507c 155 setClockGrid(g_DemodClock, g_DemodStartIdx + (idx*g_DemodClock));
cf4640b9 156
157 size = removeParity(BitStream, idx+8, 8, 1, 120);
158 if (size != 105){
159 if (g_debugMode)
160 PrintAndLog("DEBUG: Error at parity check - tag size does not match Pyramid format, SIZE: %d, IDX: %d, hi3: %x",size, idx, rawHi3);
161 return 0;
162 }
163
164 // ok valid card found!
165
166 // Index map
167 // 0 10 20 30 40 50 60 70
168 // | | | | | | | |
169 // 01234567890123456789012345678901234567890123456789012345678901234567890
170 // -----------------------------------------------------------------------
171 // 00000000000000000000000000000000000000000000000000000000000000000000000
172 // xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
173
174 // 71 80 90 100
175 // | | | |
176 // 1 2 34567890 1234567890123456 7 8901234
177 // ---------------------------------------
178 // 1 1 01110011 0000000001000110 0 1001010
179 // s w ffffffff cccccccccccccccc w ppppppp
180 // |--115-| |------71------|
181 // s = format start bit, o = odd parity of last 7 bits
182 // f = facility code, c = card number
183 // w = wiegand parity, x = extra space for other formats
184 // p = unknown checksum
185 // (26 bit format shown)
186
187 //find start bit to get fmtLen
188 int j;
189 for (j=0; j<size; j++){
190 if(BitStream[j]) break;
191 }
192 uint8_t fmtLen = size-j-8;
193 uint32_t fc = 0;
194 uint32_t cardnum = 0;
195 uint32_t code1 = 0;
196 if (fmtLen==26){
197 fc = bytebits_to_byte(BitStream+73, 8);
198 cardnum = bytebits_to_byte(BitStream+81, 16);
199 code1 = bytebits_to_byte(BitStream+72,fmtLen);
200 PrintAndLog("Pyramid ID Found - BitLength: %d, FC: %d, Card: %d - Wiegand: %x, Raw: %08x%08x%08x%08x", fmtLen, fc, cardnum, code1, rawHi3, rawHi2, rawHi, rawLo);
201 } else if (fmtLen==45){
202 fmtLen=42; //end = 10 bits not 7 like 26 bit fmt
203 fc = bytebits_to_byte(BitStream+53, 10);
204 cardnum = bytebits_to_byte(BitStream+63, 32);
205 PrintAndLog("Pyramid ID Found - BitLength: %d, FC: %d, Card: %d - Raw: %08x%08x%08x%08x", fmtLen, fc, cardnum, rawHi3, rawHi2, rawHi, rawLo);
206 } else {
207 cardnum = bytebits_to_byte(BitStream+81, 16);
208 if (fmtLen>32){
209 //code1 = bytebits_to_byte(BitStream+(size-fmtLen),fmtLen-32);
210 //code2 = bytebits_to_byte(BitStream+(size-32),32);
211 PrintAndLog("Pyramid ID Found - BitLength: %d -unknown BitLength- (%d), Raw: %08x%08x%08x%08x", fmtLen, cardnum, rawHi3, rawHi2, rawHi, rawLo);
212 } else{
213 //code1 = bytebits_to_byte(BitStream+(size-fmtLen),fmtLen);
214 PrintAndLog("Pyramid ID Found - BitLength: %d -unknown BitLength- (%d), Raw: %08x%08x%08x%08x", fmtLen, cardnum, rawHi3, rawHi2, rawHi, rawLo);
215 }
216 }
217 if (checksum == checkCS)
218 PrintAndLog("Checksum %02x passed", checksum);
219 else
220 PrintAndLog("Checksum %02x failed - should have been %02x", checksum, checkCS);
221
222 if (g_debugMode){
223 PrintAndLog("DEBUG: idx: %d, Len: %d, Printing Demod Buffer:", idx, 128);
224 printDemodBuff();
225 }
226 return 1;
227}
228
6923d3f1 229int CmdPyramidRead(const char *Cmd) {
b9957414 230 lf_read(true, 15000);
6923d3f1 231 return CmdFSKdemodPyramid("");
232}
233
234int CmdPyramidClone(const char *Cmd) {
235
236 char cmdp = param_getchar(Cmd, 0);
237 if (strlen(Cmd) == 0 || cmdp == 'h' || cmdp == 'H') return usage_lf_pyramid_clone();
238
239 uint32_t facilitycode=0, cardnumber=0, fc = 0, cn = 0;
240 uint32_t blocks[5];
241 uint8_t i;
242 uint8_t bs[128];
243 memset(bs, 0x00, sizeof(bs));
244
245 if (sscanf(Cmd, "%u %u", &fc, &cn ) != 2) return usage_lf_pyramid_clone();
246
247 facilitycode = (fc & 0x000000FF);
248 cardnumber = (cn & 0x0000FFFF);
249
250 if ( !GetPyramidBits(facilitycode, cardnumber, bs)) {
251 PrintAndLog("Error with tag bitstream generation.");
252 return 1;
29ada8fc 253 }
6923d3f1 254
255 //Pyramid - compat mode, FSK2a, data rate 50, 4 data blocks
256 blocks[0] = T55x7_MODULATION_FSK2a | T55x7_BITRATE_RF_50 | 4<<T55x7_MAXBLOCK_SHIFT;
29ada8fc 257
258 if (param_getchar(Cmd, 3) == 'Q' || param_getchar(Cmd, 3) == 'q')
259 blocks[0] = T5555_MODULATION_FSK2 | T5555_INVERT_OUTPUT | 50<<T5555_BITRATE_SHIFT | 4<<T5555_MAXBLOCK_SHIFT;
260
6923d3f1 261 blocks[1] = bytebits_to_byte(bs,32);
262 blocks[2] = bytebits_to_byte(bs+32,32);
263 blocks[3] = bytebits_to_byte(bs+64,32);
264 blocks[4] = bytebits_to_byte(bs+96,32);
265
266 PrintAndLog("Preparing to clone Farpointe/Pyramid to T55x7 with Facility Code: %u, Card Number: %u", facilitycode, cardnumber);
267 PrintAndLog("Blk | Data ");
268 PrintAndLog("----+------------");
269 for ( i = 0; i<5; ++i )
270 PrintAndLog(" %02d | %08" PRIx32, i, blocks[i]);
271
272 UsbCommand resp;
273 UsbCommand c = {CMD_T55XX_WRITE_BLOCK, {0,0,0}};
274
275 for ( i = 0; i<5; ++i ) {
276 c.arg[0] = blocks[i];
277 c.arg[1] = i;
278 clearCommandBuffer();
279 SendCommand(&c);
280 if (!WaitForResponseTimeout(CMD_ACK, &resp, 1000)){
281 PrintAndLog("Error occurred, device did not respond during write operation.");
282 return -1;
283 }
284 }
29ada8fc 285 return 0;
6923d3f1 286}
287
288int CmdPyramidSim(const char *Cmd) {
289
290 char cmdp = param_getchar(Cmd, 0);
291 if (strlen(Cmd) == 0 || cmdp == 'h' || cmdp == 'H') return usage_lf_pyramid_sim();
292
293 uint32_t facilitycode = 0, cardnumber = 0, fc = 0, cn = 0;
29ada8fc 294
6923d3f1 295 uint8_t bs[128];
296 size_t size = sizeof(bs);
297 memset(bs, 0x00, size);
29ada8fc 298
6923d3f1 299 // Pyramid uses: fcHigh: 10, fcLow: 8, clk: 50, invert: 0
300 uint64_t arg1, arg2;
301 arg1 = (10 << 8) + 8;
302 arg2 = 50 | 0;
303
304 if (sscanf(Cmd, "%u %u", &fc, &cn ) != 2) return usage_lf_pyramid_sim();
305
306 facilitycode = (fc & 0x000000FF);
307 cardnumber = (cn & 0x0000FFFF);
29ada8fc 308
6923d3f1 309 if ( !GetPyramidBits(facilitycode, cardnumber, bs)) {
310 PrintAndLog("Error with tag bitstream generation.");
311 return 1;
29ada8fc 312 }
6923d3f1 313
314 PrintAndLog("Simulating Farpointe/Pyramid - Facility Code: %u, CardNumber: %u", facilitycode, cardnumber );
29ada8fc 315
6923d3f1 316 UsbCommand c = {CMD_FSK_SIM_TAG, {arg1, arg2, size}};
317 memcpy(c.d.asBytes, bs, size);
318 clearCommandBuffer();
319 SendCommand(&c);
320 return 0;
321}
322
323static command_t CommandTable[] = {
cf4640b9 324 {"help", CmdHelp, 1, "This help"},
325 {"demod", CmdFSKdemodPyramid, 1, "Demodulate a Pyramid FSK tag from the GraphBuffer"},
326 {"read", CmdPyramidRead, 0, "Attempt to read and extract tag data"},
327 {"clone", CmdPyramidClone, 0, "<Facility-Code> <Card Number> clone pyramid tag"},
328 {"sim", CmdPyramidSim, 0, "<Facility-Code> <Card Number> simulate pyramid tag"},
29ada8fc 329 {NULL, NULL, 0, NULL}
6923d3f1 330};
331
332int CmdLFPyramid(const char *Cmd) {
333 clearCommandBuffer();
29ada8fc 334 CmdsParse(CommandTable, Cmd);
335 return 0;
6923d3f1 336}
337
338int CmdHelp(const char *Cmd) {
29ada8fc 339 CmdsHelp(CommandTable);
340 return 0;
6923d3f1 341}
Impressum, Datenschutz