]> git.zerfleddert.de Git - proxmark3-svn/blame - armsrc/iso14443b.c
removed commented code
[proxmark3-svn] / armsrc / iso14443b.c
CommitLineData
489ef36c 1//-----------------------------------------------------------------------------
2// Jonathan Westhues, split Nov 2006
3//
4// This code is licensed to you under the terms of the GNU GPL, version 2 or,
5// at your option, any later version. See the LICENSE.txt file for the text of
6// the license.
7//-----------------------------------------------------------------------------
abb21530 8// Routines to support ISO 14443B. This includes both the reader software and
9// the `fake tag' modes.
489ef36c 10//-----------------------------------------------------------------------------
6fc68747 11#include "iso14443b.h"
489ef36c 12
11c2df83 13#define RECEIVE_SAMPLES_TIMEOUT 50000
a62bf3af 14#define ISO14443B_DMA_BUFFER_SIZE 256
489ef36c 15
11c2df83 16// Guard Time (per 14443-2)
17#define TR0 0
18// Synchronization time (per 14443-2)
19#define TR1 0
20// Frame Delay Time PICC to PCD (per 14443-3 Amendment 1)
21#define TR2 0
22static void switch_off(void);
23
6fc68747 24// the block number for the ISO14443-4 PCB (used with APDUs)
a62bf3af 25static uint8_t pcb_blocknum = 0;
26
11c2df83 27static uint32_t iso14b_timeout = RECEIVE_SAMPLES_TIMEOUT;
28// param timeout is in ftw_
29void iso14b_set_timeout(uint32_t timeout) {
30 // 9.4395us = 1etu.
31 // clock is about 1.5 us
32 iso14b_timeout = timeout;
33 if(MF_DBGLEVEL >= 2) Dbprintf("ISO14443B Timeout set to %ld fwt", iso14b_timeout);
34}
35
36static void switch_off(void){
37 if (MF_DBGLEVEL > 3) Dbprintf("switch_off");
38 FpgaWriteConfWord(FPGA_MAJOR_MODE_OFF);
39 SpinDelay(100);
40 FpgaDisableSscDma();
41 set_tracing(FALSE);
42 LEDsoff();
43}
44
489ef36c 45//=============================================================================
46// An ISO 14443 Type B tag. We listen for commands from the reader, using
47// a UART kind of thing that's implemented in software. When we get a
48// frame (i.e., a group of bytes between SOF and EOF), we check the CRC.
49// If it's good, then we can do something appropriate with it, and send
50// a response.
51//=============================================================================
52
cef590d9 53
54//-----------------------------------------------------------------------------
11c2df83 55// The software UART that receives commands from the reader, and its state variables.
cef590d9 56//-----------------------------------------------------------------------------
57static struct {
58 enum {
59 STATE_UNSYNCD,
60 STATE_GOT_FALLING_EDGE_OF_SOF,
61 STATE_AWAITING_START_BIT,
62 STATE_RECEIVING_DATA
63 } state;
11c2df83 64 uint16_t shiftReg;
65 int bitCnt;
66 int byteCnt;
67 int byteCntMax;
68 int posCnt;
69 uint8_t *output;
cef590d9 70} Uart;
71
11c2df83 72static void UartReset() {
cef590d9 73 Uart.state = STATE_UNSYNCD;
11c2df83 74 Uart.shiftReg = 0;
cef590d9 75 Uart.bitCnt = 0;
11c2df83 76 Uart.byteCnt = 0;
77 Uart.byteCntMax = MAX_FRAME_SIZE;
cef590d9 78 Uart.posCnt = 0;
cef590d9 79}
80
11c2df83 81static void UartInit(uint8_t *data) {
cef590d9 82 Uart.output = data;
83 UartReset();
11c2df83 84// memset(Uart.output, 0x00, MAX_FRAME_SIZE);
cef590d9 85}
86
11c2df83 87//-----------------------------------------------------------------------------
88// The software Demod that receives commands from the tag, and its state variables.
89//-----------------------------------------------------------------------------
cef590d9 90static struct {
91 enum {
92 DEMOD_UNSYNCD,
93 DEMOD_PHASE_REF_TRAINING,
94 DEMOD_AWAITING_FALLING_EDGE_OF_SOF,
95 DEMOD_GOT_FALLING_EDGE_OF_SOF,
96 DEMOD_AWAITING_START_BIT,
97 DEMOD_RECEIVING_DATA
98 } state;
11c2df83 99 uint16_t bitCount;
100 int posCount;
101 int thisBit;
cef590d9 102/* this had been used to add RSSI (Received Signal Strength Indication) to traces. Currently not implemented.
103 int metric;
104 int metricN;
105*/
11c2df83 106 uint16_t shiftReg;
107 uint8_t *output;
108 uint16_t len;
109 int sumI;
110 int sumQ;
111 uint32_t startTime, endTime;
cef590d9 112} Demod;
113
11c2df83 114// Clear out the state of the "UART" that receives from the tag.
115static void DemodReset() {
cef590d9 116 Demod.state = DEMOD_UNSYNCD;
cef590d9 117 Demod.bitCount = 0;
11c2df83 118 Demod.posCount = 0;
cef590d9 119 Demod.thisBit = 0;
120 Demod.shiftReg = 0;
11c2df83 121 Demod.len = 0;
122 Demod.sumI = 0;
123 Demod.sumQ = 0;
124 Demod.startTime = 0;
125 Demod.endTime = 0;
cef590d9 126}
127
11c2df83 128static void DemodInit(uint8_t *data) {
cef590d9 129 Demod.output = data;
130 DemodReset();
11c2df83 131 // memset(Demod.output, 0x00, MAX_FRAME_SIZE);
cef590d9 132}
133
11c2df83 134void AppendCrc14443b(uint8_t* data, int len) {
6fc68747 135 ComputeCrc14443(CRC_14443_B,data,len,data+len,data+len+1);
136}
137
489ef36c 138//-----------------------------------------------------------------------------
139// Code up a string of octets at layer 2 (including CRC, we don't generate
140// that here) so that they can be transmitted to the reader. Doesn't transmit
141// them yet, just leaves them ready to send in ToSend[].
142//-----------------------------------------------------------------------------
11c2df83 143static void CodeIso14443bAsTag(const uint8_t *cmd, int len) {
144 /* ISO 14443 B
145 *
146 * Reader to card | ASK - Amplitude Shift Keying Modulation (PCD to PICC for Type B) (NRZ-L encodig)
147 * Card to reader | BPSK - Binary Phase Shift Keying Modulation, (PICC to PCD for Type B)
148 *
149 * fc - carrier frequency 13.56mHz
150 * TR0 - Guard Time per 14443-2
151 * TR1 - Synchronization Time per 14443-2
152 * TR2 - PICC to PCD Frame Delay Time (per 14443-3 Amendment 1)
153 *
154 * Elementary Time Unit (ETU) is
155 * - 128 Carrier Cycles (9.4395 µS) = 8 Subcarrier Units
156 * - 1 ETU = 1 bit
157 * - 10 ETU = 1 startbit, 8 databits, 1 stopbit (10bits length)
158 * - startbit is a 0
159 * - stopbit is a 1
160 *
161 * Start of frame (SOF) is
162 * - [10-11] ETU of ZEROS, unmodulated time
163 * - [2-3] ETU of ONES,
164 *
165 * End of frame (EOF) is
166 * - [10-11] ETU of ZEROS, unmodulated time
167 *
168 * -TO VERIFY THIS BELOW-
169 * The mode FPGA_MAJOR_MODE_HF_SIMULATOR | FPGA_HF_SIMULATOR_MODULATE_BPSK which we use to simulate tag
170 * works like this:
171 * - A 1-bit input to the FPGA becomes 8 pulses at 847.5kHz (9.44µS)
172 * - A 0-bit input to the FPGA becomes an unmodulated time of 9.44µS
173 *
174 *
175 *
176 * Card sends data ub 847.e kHz subcarrier
177 * 848k = 9.44µS = 128 fc
178 * 424k = 18.88µS = 256 fc
179 * 212k = 37.76µS = 512 fc
180 * 106k = 75.52µS = 1024 fc
181 *
182 * Reader data transmission:
183 * - no modulation ONES
184 * - SOF
185 * - Command, data and CRC_B
186 * - EOF
187 * - no modulation ONES
188 *
189 * Card data transmission
190 * - TR1
191 * - SOF
192 * - data (each bytes is: 1startbit,8bits, 1stopbit)
193 * - CRC_B
194 * - EOF
195 *
196 * FPGA implementation :
197 * At this point only Type A is implemented. This means that we are using a
198 * bit rate of 106 kbit/s, or fc/128. Oversample by 4, which ought to make
199 * things practical for the ARM (fc/32, 423.8 kbits/s, ~50 kbytes/s)
200 *
201 */
202
203 // ToSendStuffBit, 40 calls
204 // 1 ETU = 1startbit, 1stopbit, 8databits == 10bits.
205 // 1 ETU = 10 * 4 == 40 stuffbits ( ETU_TAG_BIT )
206 int i,j;
207 uint8_t b;
208
489ef36c 209 ToSendReset();
210
211 // Transmit a burst of ones, as the initial thing that lets the
11c2df83 212 // reader get phase sync.
213 // This loop is TR1, per specification
214 // TR1 minimum must be > 80/fs
215 // TR1 maximum 200/fs
216 // 80/fs < TR1 < 200/fs
217 // 10 ETU < TR1 < 24 ETU
489ef36c 218
219 // Send SOF.
11c2df83 220 // 10-11 ETU * 4times samples ZEROS
489ef36c 221 for(i = 0; i < 10; i++) {
222 ToSendStuffBit(0);
223 ToSendStuffBit(0);
224 ToSendStuffBit(0);
225 ToSendStuffBit(0);
226 }
11c2df83 227
228 // 2-3 ETU * 4times samples ONES
229 for(i = 0; i < 3; i++) {
489ef36c 230 ToSendStuffBit(1);
231 ToSendStuffBit(1);
232 ToSendStuffBit(1);
233 ToSendStuffBit(1);
234 }
11c2df83 235
236 // data
237 for(i = 0; i < len; ++i) {
238
489ef36c 239 // Start bit
240 ToSendStuffBit(0);
241 ToSendStuffBit(0);
242 ToSendStuffBit(0);
243 ToSendStuffBit(0);
244
245 // Data bits
11c2df83 246 b = cmd[i];
247 for(j = 0; j < 8; ++j) {
489ef36c 248 if(b & 1) {
249 ToSendStuffBit(1);
250 ToSendStuffBit(1);
251 ToSendStuffBit(1);
252 ToSendStuffBit(1);
253 } else {
254 ToSendStuffBit(0);
255 ToSendStuffBit(0);
256 ToSendStuffBit(0);
257 ToSendStuffBit(0);
258 }
259 b >>= 1;
260 }
261
262 // Stop bit
263 ToSendStuffBit(1);
264 ToSendStuffBit(1);
265 ToSendStuffBit(1);
266 ToSendStuffBit(1);
11c2df83 267
268 // Extra Guard bit
269 // For PICC it ranges 0-18us (1etu = 9us)
270 ToSendStuffBit(1);
271 ToSendStuffBit(1);
272 ToSendStuffBit(1);
273 ToSendStuffBit(1);
274
275 ToSendStuffBit(1);
276 ToSendStuffBit(1);
489ef36c 277 }
278
abb21530 279 // Send EOF.
11c2df83 280 // 10-11 ETU * 4 sample rate = ZEROS
489ef36c 281 for(i = 0; i < 10; i++) {
282 ToSendStuffBit(0);
283 ToSendStuffBit(0);
284 ToSendStuffBit(0);
285 ToSendStuffBit(0);
286 }
11c2df83 287
288 // why this?
289 for(i = 0; i < 40; i++) {
489ef36c 290 ToSendStuffBit(1);
291 ToSendStuffBit(1);
292 ToSendStuffBit(1);
293 ToSendStuffBit(1);
294 }
11c2df83 295
489ef36c 296 // Convert from last byte pos to length
6fc68747 297 ++ToSendMax;
489ef36c 298}
299
cef590d9 300
489ef36c 301/* Receive & handle a bit coming from the reader.
abb21530 302 *
303 * This function is called 4 times per bit (every 2 subcarrier cycles).
304 * Subcarrier frequency fs is 848kHz, 1/fs = 1,18us, i.e. function is called every 2,36us
489ef36c 305 *
306 * LED handling:
307 * LED A -> ON once we have received the SOF and are expecting the rest.
308 * LED A -> OFF once we have received EOF or are in error state or unsynced
309 *
310 * Returns: true if we received a EOF
311 * false if we are still waiting for some more
312 */
11c2df83 313static RAMFUNC int Handle14443bReaderUartBit(uint8_t bit) {
489ef36c 314 switch(Uart.state) {
315 case STATE_UNSYNCD:
489ef36c 316 if(!bit) {
317 // we went low, so this could be the beginning
318 // of an SOF
319 Uart.state = STATE_GOT_FALLING_EDGE_OF_SOF;
320 Uart.posCnt = 0;
321 Uart.bitCnt = 0;
322 }
323 break;
324
325 case STATE_GOT_FALLING_EDGE_OF_SOF:
326 Uart.posCnt++;
abb21530 327 if(Uart.posCnt == 2) { // sample every 4 1/fs in the middle of a bit
489ef36c 328 if(bit) {
abb21530 329 if(Uart.bitCnt > 9) {
489ef36c 330 // we've seen enough consecutive
331 // zeros that it's a valid SOF
332 Uart.posCnt = 0;
333 Uart.byteCnt = 0;
334 Uart.state = STATE_AWAITING_START_BIT;
335 LED_A_ON(); // Indicate we got a valid SOF
336 } else {
337 // didn't stay down long enough
338 // before going high, error
36f84d47 339 Uart.state = STATE_UNSYNCD;
489ef36c 340 }
341 } else {
342 // do nothing, keep waiting
343 }
344 Uart.bitCnt++;
345 }
346 if(Uart.posCnt >= 4) Uart.posCnt = 0;
abb21530 347 if(Uart.bitCnt > 12) {
489ef36c 348 // Give up if we see too many zeros without
349 // a one, too.
36f84d47 350 LED_A_OFF();
351 Uart.state = STATE_UNSYNCD;
489ef36c 352 }
353 break;
354
355 case STATE_AWAITING_START_BIT:
356 Uart.posCnt++;
357 if(bit) {
abb21530 358 if(Uart.posCnt > 50/2) { // max 57us between characters = 49 1/fs, max 3 etus after low phase of SOF = 24 1/fs
489ef36c 359 // stayed high for too long between
360 // characters, error
36f84d47 361 Uart.state = STATE_UNSYNCD;
489ef36c 362 }
363 } else {
364 // falling edge, this starts the data byte
365 Uart.posCnt = 0;
366 Uart.bitCnt = 0;
367 Uart.shiftReg = 0;
368 Uart.state = STATE_RECEIVING_DATA;
489ef36c 369 }
370 break;
371
372 case STATE_RECEIVING_DATA:
373 Uart.posCnt++;
374 if(Uart.posCnt == 2) {
375 // time to sample a bit
376 Uart.shiftReg >>= 1;
377 if(bit) {
378 Uart.shiftReg |= 0x200;
379 }
380 Uart.bitCnt++;
381 }
382 if(Uart.posCnt >= 4) {
383 Uart.posCnt = 0;
384 }
385 if(Uart.bitCnt == 10) {
386 if((Uart.shiftReg & 0x200) && !(Uart.shiftReg & 0x001))
387 {
388 // this is a data byte, with correct
389 // start and stop bits
390 Uart.output[Uart.byteCnt] = (Uart.shiftReg >> 1) & 0xff;
391 Uart.byteCnt++;
392
393 if(Uart.byteCnt >= Uart.byteCntMax) {
394 // Buffer overflowed, give up
36f84d47 395 LED_A_OFF();
396 Uart.state = STATE_UNSYNCD;
489ef36c 397 } else {
398 // so get the next byte now
399 Uart.posCnt = 0;
400 Uart.state = STATE_AWAITING_START_BIT;
401 }
46734099 402 } else if (Uart.shiftReg == 0x000) {
489ef36c 403 // this is an EOF byte
404 LED_A_OFF(); // Finished receiving
36f84d47 405 Uart.state = STATE_UNSYNCD;
22e24700 406 if (Uart.byteCnt != 0) {
489ef36c 407 return TRUE;
22e24700 408 }
489ef36c 409 } else {
410 // this is an error
36f84d47 411 LED_A_OFF();
46734099 412 Uart.state = STATE_UNSYNCD;
36f84d47 413 }
489ef36c 414 }
415 break;
416
417 default:
36f84d47 418 LED_A_OFF();
489ef36c 419 Uart.state = STATE_UNSYNCD;
420 break;
421 }
422
489ef36c 423 return FALSE;
424}
425
426//-----------------------------------------------------------------------------
427// Receive a command (from the reader to us, where we are the simulated tag),
428// and store it in the given buffer, up to the given maximum length. Keeps
429// spinning, waiting for a well-framed command, until either we get one
430// (returns TRUE) or someone presses the pushbutton on the board (FALSE).
431//
432// Assume that we're called with the SSC (to the FPGA) and ADC path set
433// correctly.
434//-----------------------------------------------------------------------------
11c2df83 435static int GetIso14443bCommandFromReader(uint8_t *received, uint16_t *len) {
abb21530 436 // Set FPGA mode to "simulated ISO 14443B tag", no modulation (listen
489ef36c 437 // only, since we are receiving, not transmitting).
438 // Signal field is off with the appropriate LED
439 LED_D_OFF();
440 FpgaWriteConfWord(FPGA_MAJOR_MODE_HF_SIMULATOR | FPGA_HF_SIMULATOR_NO_MODULATION);
11c2df83 441
442 StartCountSspClk();
443
489ef36c 444 // Now run a `software UART' on the stream of incoming samples.
36f84d47 445 UartInit(received);
11c2df83 446 uint8_t b = 0;
489ef36c 447 for(;;) {
448 WDT_HIT();
449
450 if(BUTTON_PRESS()) return FALSE;
451
489ef36c 452 if(AT91C_BASE_SSC->SSC_SR & (AT91C_SSC_RXRDY)) {
11c2df83 453 b = (uint8_t)AT91C_BASE_SSC->SSC_RHR;
36f84d47 454 for(uint8_t mask = 0x80; mask != 0x00; mask >>= 1) {
11c2df83 455 if(Handle14443bReaderUartBit(b & mask)) {
489ef36c 456 *len = Uart.byteCnt;
457 return TRUE;
458 }
459 }
460 }
11c2df83 461 }
36f84d47 462 return FALSE;
489ef36c 463}
464
465//-----------------------------------------------------------------------------
466// Main loop of simulated tag: receive commands from reader, decide what
467// response to send, and send it.
468//-----------------------------------------------------------------------------
11c2df83 469void SimulateIso14443bTag(void) {
b10a759f 470 // the only commands we understand is WUPB, AFI=0, Select All, N=1:
6fc68747 471 static const uint8_t cmd1[] = { ISO14443B_REQB, 0x00, 0x08, 0x39, 0x73 }; // WUPB
b10a759f 472 // ... and REQB, AFI=0, Normal Request, N=1:
6fc68747 473 static const uint8_t cmd2[] = { ISO14443B_REQB, 0x00, 0x00, 0x71, 0xFF }; // REQB
b10a759f 474 // ... and HLTB
6fc68747 475 static const uint8_t cmd3[] = { ISO14443B_HALT, 0xff, 0xff, 0xff, 0xff }; // HLTB
b10a759f 476 // ... and ATTRIB
6fc68747 477 static const uint8_t cmd4[] = { ISO14443B_ATTRIB, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff}; // ATTRIB
36f84d47 478
479 // ... and we always respond with ATQB, PUPI = 820de174, Application Data = 0x20381922,
abb21530 480 // supports only 106kBit/s in both directions, max frame size = 32Bytes,
481 // supports ISO14443-4, FWI=8 (77ms), NAD supported, CID not supported:
489ef36c 482 static const uint8_t response1[] = {
483 0x50, 0x82, 0x0d, 0xe1, 0x74, 0x20, 0x38, 0x19, 0x22,
484 0x00, 0x21, 0x85, 0x5e, 0xd7
485 };
b10a759f 486 // response to HLTB and ATTRIB
487 static const uint8_t response2[] = {0x00, 0x78, 0xF0};
99cf19d9 488
489 FpgaDownloadAndGo(FPGA_BITSTREAM_HF);
490
11c2df83 491 // allocate command receive buffer
492 BigBuf_free();
493 BigBuf_Clear_ext(false);
494 clear_trace(); //sim
36f84d47 495 set_tracing(TRUE);
496
497 const uint8_t *resp;
498 uint8_t *respCode;
11c2df83 499 uint16_t respLen, respCodeLen, len, cmdsRecvd = 0;
17ad0e09 500 uint8_t *receivedCmd = BigBuf_malloc(MAX_FRAME_SIZE);
11c2df83 501
abb21530 502 // prepare the (only one) tag answer:
489ef36c 503 CodeIso14443bAsTag(response1, sizeof(response1));
36f84d47 504 uint8_t *resp1Code = BigBuf_malloc(ToSendMax);
505 memcpy(resp1Code, ToSend, ToSendMax);
506 uint16_t resp1CodeLen = ToSendMax;
11c2df83 507 PrintToSendBuffer();
508 DbpString("Printing Resp1Code:");
509 Dbhexdump(resp1CodeLen, resp1Code, 0);
510
b10a759f 511 // prepare the (other) tag answer:
512 CodeIso14443bAsTag(response2, sizeof(response2));
513 uint8_t *resp2Code = BigBuf_malloc(ToSendMax);
514 memcpy(resp2Code, ToSend, ToSendMax);
515 uint16_t resp2CodeLen = ToSendMax;
11c2df83 516 PrintToSendBuffer();
517
489ef36c 518 // We need to listen to the high-frequency, peak-detected path.
519 SetAdcMuxFor(GPIO_MUXSEL_HIPKD);
520 FpgaSetupSsc();
521
11c2df83 522 uint32_t time_0 =0;
523 uint32_t t2r_time =0;
524 uint32_t r2t_time =0;
489ef36c 525 cmdsRecvd = 0;
526
527 for(;;) {
489ef36c 528
810f5379 529 if (!GetIso14443bCommandFromReader(receivedCmd, &len)) {
530 Dbprintf("button pressed, received %d commands", cmdsRecvd);
531 break;
489ef36c 532 }
11c2df83 533 r2t_time = GetCountSspClk();
489ef36c 534
11c2df83 535 if (tracing)
536 LogTrace(receivedCmd, len, (r2t_time - time_0), (r2t_time - time_0), NULL, TRUE);
cef590d9 537
489ef36c 538
36f84d47 539 // Good, look at the command now.
540 if ( (len == sizeof(cmd1) && memcmp(receivedCmd, cmd1, len) == 0)
541 || (len == sizeof(cmd2) && memcmp(receivedCmd, cmd2, len) == 0) ) {
542 resp = response1;
543 respLen = sizeof(response1);
544 respCode = resp1Code;
545 respCodeLen = resp1CodeLen;
b10a759f 546 } else if ( (len == sizeof(cmd3) && receivedCmd[0] == cmd3[0])
547 || (len == sizeof(cmd4) && receivedCmd[0] == cmd4[0]) ) {
548 resp = response2;
549 respLen = sizeof(response2);
550 respCode = resp2Code;
551 respCodeLen = resp2CodeLen;
489ef36c 552 } else {
553 Dbprintf("new cmd from reader: len=%d, cmdsRecvd=%d", len, cmdsRecvd);
6fc68747 554
489ef36c 555 // And print whether the CRC fails, just for good measure
36f84d47 556 uint8_t b1, b2;
b10a759f 557 if (len >= 3){ // if crc exists
810f5379 558 ComputeCrc14443(CRC_14443_B, receivedCmd, len-2, &b1, &b2);
11c2df83 559 if(b1 != receivedCmd[len-2] || b2 != receivedCmd[len-1])
810f5379 560 DbpString("+++CRC fail");
11c2df83 561 else
810f5379 562 DbpString("CRC passes");
b10a759f 563 }
564 //get rid of compiler warning
565 respCodeLen = 0;
566 resp = response1;
567 respLen = 0;
568 respCode = resp1Code;
569 //don't crash at new command just wait and see if reader will send other new cmds.
570 //break;
489ef36c 571 }
572
6fc68747 573 ++cmdsRecvd;
489ef36c 574
11c2df83 575 if(cmdsRecvd > 1000) {
576 DbpString("1000 commands later...");
489ef36c 577 break;
578 }
579
36f84d47 580 if(respCodeLen <= 0) continue;
489ef36c 581
582 // Modulate BPSK
583 // Signal field is off with the appropriate LED
584 LED_D_OFF();
585 FpgaWriteConfWord(FPGA_MAJOR_MODE_HF_SIMULATOR | FPGA_HF_SIMULATOR_MODULATE_BPSK);
11c2df83 586
489ef36c 587 AT91C_BASE_SSC->SSC_THR = 0xff;
11c2df83 588
489ef36c 589 FpgaSetupSsc();
590
591 // Transmit the response.
36f84d47 592 uint16_t i = 0;
6fc68747 593 volatile uint8_t b;
cef590d9 594 for(;;) {
489ef36c 595 if(AT91C_BASE_SSC->SSC_SR & (AT91C_SSC_TXRDY)) {
cef590d9 596
11c2df83 597 AT91C_BASE_SSC->SSC_THR = respCode[i];
598 i++;
6fc68747 599 if(i > respCodeLen)
cef590d9 600 break;
cef590d9 601 }
11c2df83 602
cef590d9 603 if(AT91C_BASE_SSC->SSC_SR & (AT91C_SSC_RXRDY)) {
6fc68747 604 b = (uint8_t)AT91C_BASE_SSC->SSC_RHR;
cef590d9 605 (void)b;
489ef36c 606 }
607 }
36f84d47 608
11c2df83 609 t2r_time = GetCountSspClk();
610
cef590d9 611 if (tracing)
11c2df83 612 LogTrace(resp, respLen, (t2r_time-time_0), (t2r_time-time_0), NULL, FALSE);
489ef36c 613 }
11c2df83 614
615 switch_off(); //simulate
489ef36c 616}
617
618//=============================================================================
619// An ISO 14443 Type B reader. We take layer two commands, code them
620// appropriately, and then send them to the tag. We then listen for the
621// tag's response, which we leave in the buffer to be demodulated on the
622// PC side.
623//=============================================================================
624
489ef36c 625/*
626 * Handles reception of a bit from the tag
627 *
abb21530 628 * This function is called 2 times per bit (every 4 subcarrier cycles).
629 * Subcarrier frequency fs is 848kHz, 1/fs = 1,18us, i.e. function is called every 4,72us
630 *
489ef36c 631 * LED handling:
632 * LED C -> ON once we have received the SOF and are expecting the rest.
633 * LED C -> OFF once we have received EOF or are unsynced
634 *
635 * Returns: true if we received a EOF
636 * false if we are still waiting for some more
637 *
638 */
cef590d9 639#ifndef SUBCARRIER_DETECT_THRESHOLD
11c2df83 640# define SUBCARRIER_DETECT_THRESHOLD 8
cef590d9 641#endif
642
11c2df83 643static RAMFUNC int Handle14443bTagSamplesDemod(int ci, int cq) {
644 int v=0;// , myI, myQ = 0;
51d4f6f1 645// The soft decision on the bit uses an estimate of just the
646// quadrant of the reference angle, not the exact angle.
489ef36c 647#define MAKE_SOFT_DECISION() { \
5b59bf20 648 if(Demod.sumI > 0) { \
649 v = ci; \
650 } else { \
651 v = -ci; \
652 } \
489ef36c 653 if(Demod.sumQ > 0) { \
654 v += cq; \
655 } else { \
656 v -= cq; \
657 } \
658 }
659
cef590d9 660// Subcarrier amplitude v = sqrt(ci^2 + cq^2), approximated here by abs(ci) + abs(cq)
abb21530 661// Subcarrier amplitude v = sqrt(ci^2 + cq^2), approximated here by max(abs(ci),abs(cq)) + 1/2*min(abs(ci),abs(cq)))
662#define CHECK_FOR_SUBCARRIER() { \
cef590d9 663 if(ci < 0) { \
664 if(cq < 0) { /* ci < 0, cq < 0 */ \
665 if (cq < ci) { \
666 v = -cq - (ci >> 1); \
667 } else { \
668 v = -ci - (cq >> 1); \
669 } \
670 } else { /* ci < 0, cq >= 0 */ \
671 if (cq < -ci) { \
672 v = -ci + (cq >> 1); \
673 } else { \
674 v = cq - (ci >> 1); \
675 } \
676 } \
677 } else { \
678 if(cq < 0) { /* ci >= 0, cq < 0 */ \
679 if (-cq < ci) { \
680 v = ci - (cq >> 1); \
681 } else { \
682 v = -cq + (ci >> 1); \
683 } \
684 } else { /* ci >= 0, cq >= 0 */ \
685 if (cq < ci) { \
686 v = ci + (cq >> 1); \
687 } else { \
688 v = cq + (ci >> 1); \
689 } \
690 } \
691 } \
692 }
db25599d 693
6fc68747 694//note: couldn't we just use MAX(ABS(ci),ABS(cq)) + (MIN(ABS(ci),ABS(cq))/2) from common.h - marshmellow
11c2df83 695#define CHECK_FOR_SUBCARRIER_un() { \
696 myI = ABS(ci); \
697 myQ = ABS(cq); \
698 v = MAX(myI,myQ) + (MIN(myI,myQ) >> 1); \
6fc68747 699 }
db25599d 700
489ef36c 701 switch(Demod.state) {
702 case DEMOD_UNSYNCD:
cef590d9 703
abb21530 704 CHECK_FOR_SUBCARRIER();
cef590d9 705
706 // subcarrier detected
707 if(v > SUBCARRIER_DETECT_THRESHOLD) {
489ef36c 708 Demod.state = DEMOD_PHASE_REF_TRAINING;
abb21530 709 Demod.sumI = ci;
710 Demod.sumQ = cq;
711 Demod.posCount = 1;
489ef36c 712 }
713 break;
714
715 case DEMOD_PHASE_REF_TRAINING:
5b59bf20 716 if(Demod.posCount < 8) {
cef590d9 717
abb21530 718 CHECK_FOR_SUBCARRIER();
cef590d9 719
abb21530 720 if (v > SUBCARRIER_DETECT_THRESHOLD) {
721 // set the reference phase (will code a logic '1') by averaging over 32 1/fs.
722 // note: synchronization time > 80 1/fs
b10a759f 723 Demod.sumI += ci;
724 Demod.sumQ += cq;
cef590d9 725 ++Demod.posCount;
726 } else {
727 // subcarrier lost
b10a759f 728 Demod.state = DEMOD_UNSYNCD;
abb21530 729 }
489ef36c 730 } else {
b10a759f 731 Demod.state = DEMOD_AWAITING_FALLING_EDGE_OF_SOF;
489ef36c 732 }
489ef36c 733 break;
734
735 case DEMOD_AWAITING_FALLING_EDGE_OF_SOF:
cef590d9 736
489ef36c 737 MAKE_SOFT_DECISION();
cef590d9 738
cef590d9 739 if(v < 0) { // logic '0' detected
489ef36c 740 Demod.state = DEMOD_GOT_FALLING_EDGE_OF_SOF;
abb21530 741 Demod.posCount = 0; // start of SOF sequence
489ef36c 742 } else {
cef590d9 743 // maximum length of TR1 = 200 1/fs
744 if(Demod.posCount > 25*2) Demod.state = DEMOD_UNSYNCD;
489ef36c 745 }
cef590d9 746 ++Demod.posCount;
489ef36c 747 break;
748
749 case DEMOD_GOT_FALLING_EDGE_OF_SOF:
cef590d9 750 ++Demod.posCount;
751
489ef36c 752 MAKE_SOFT_DECISION();
cef590d9 753
489ef36c 754 if(v > 0) {
cef590d9 755 // low phase of SOF too short (< 9 etu). Note: spec is >= 10, but FPGA tends to "smear" edges
756 if(Demod.posCount < 9*2) {
489ef36c 757 Demod.state = DEMOD_UNSYNCD;
758 } else {
a62bf3af 759 LED_C_ON(); // Got SOF
11c2df83 760 Demod.startTime = GetCountSspClk();
489ef36c 761 Demod.state = DEMOD_AWAITING_START_BIT;
762 Demod.posCount = 0;
763 Demod.len = 0;
489ef36c 764 }
765 } else {
cef590d9 766 // low phase of SOF too long (> 12 etu)
767 if (Demod.posCount > 12*2) {
489ef36c 768 Demod.state = DEMOD_UNSYNCD;
47286d89 769 LED_C_OFF();
489ef36c 770 }
771 }
489ef36c 772 break;
773
774 case DEMOD_AWAITING_START_BIT:
cef590d9 775 ++Demod.posCount;
776
489ef36c 777 MAKE_SOFT_DECISION();
cef590d9 778
779 if (v > 0) {
abb21530 780 if(Demod.posCount > 3*2) { // max 19us between characters = 16 1/fs, max 3 etu after low phase of SOF = 24 1/fs
489ef36c 781 Demod.state = DEMOD_UNSYNCD;
47286d89 782 LED_C_OFF();
489ef36c 783 }
abb21530 784 } else { // start bit detected
489ef36c 785 Demod.bitCount = 0;
abb21530 786 Demod.posCount = 1; // this was the first half
489ef36c 787 Demod.thisBit = v;
788 Demod.shiftReg = 0;
789 Demod.state = DEMOD_RECEIVING_DATA;
790 }
791 break;
792
793 case DEMOD_RECEIVING_DATA:
cef590d9 794
489ef36c 795 MAKE_SOFT_DECISION();
cef590d9 796
797 if (Demod.posCount == 0) {
798 // first half of bit
489ef36c 799 Demod.thisBit = v;
800 Demod.posCount = 1;
cef590d9 801 } else {
802 // second half of bit
489ef36c 803 Demod.thisBit += v;
489ef36c 804 Demod.shiftReg >>= 1;
489ef36c 805
cef590d9 806 // logic '1'
807 if(Demod.thisBit > 0) Demod.shiftReg |= 0x200;
808
809 ++Demod.bitCount;
810
489ef36c 811 if(Demod.bitCount == 10) {
cef590d9 812
489ef36c 813 uint16_t s = Demod.shiftReg;
cef590d9 814
815 // stop bit == '1', start bit == '0'
816 if((s & 0x200) && !(s & 0x001)) {
489ef36c 817 uint8_t b = (s >> 1);
818 Demod.output[Demod.len] = b;
cef590d9 819 ++Demod.len;
489ef36c 820 Demod.state = DEMOD_AWAITING_START_BIT;
489ef36c 821 } else {
822 Demod.state = DEMOD_UNSYNCD;
11c2df83 823 Demod.endTime = GetCountSspClk();
47286d89 824 LED_C_OFF();
cef590d9 825
826 // This is EOF (start, stop and all data bits == '0'
827 if(s == 0) return TRUE;
489ef36c 828 }
829 }
830 Demod.posCount = 0;
831 }
832 break;
833
834 default:
835 Demod.state = DEMOD_UNSYNCD;
47286d89 836 LED_C_OFF();
489ef36c 837 break;
838 }
489ef36c 839 return FALSE;
840}
841
842
489ef36c 843/*
844 * Demodulate the samples we received from the tag, also log to tracebuffer
489ef36c 845 * quiet: set to 'TRUE' to disable debug output
846 */
11c2df83 847static void GetTagSamplesFor14443bDemod(bool quiet) {
abb21530 848 bool gotFrame = FALSE;
11c2df83 849 int lastRxCounter = ISO14443B_DMA_BUFFER_SIZE;
850 int max = 0, ci = 0, cq = 0, samples = 0;
851 uint32_t time_0 = 0, time_stop = 0;
489ef36c 852
11c2df83 853 BigBuf_free();
854
489ef36c 855 // Set up the demodulator for tag -> reader responses.
db25599d 856 DemodInit(BigBuf_malloc(MAX_FRAME_SIZE));
b10a759f 857
858 // The DMA buffer, used to stream samples from the FPGA
859 int8_t *dmaBuf = (int8_t*) BigBuf_malloc(ISO14443B_DMA_BUFFER_SIZE);
11c2df83 860 int8_t *upTo = dmaBuf;
cef590d9 861
db25599d 862 // Setup and start DMA.
11c2df83 863 if ( !FpgaSetupSscDma((uint8_t*) dmaBuf, ISO14443B_DMA_BUFFER_SIZE) ){
864 if (MF_DBGLEVEL > 1) Dbprintf("FpgaSetupSscDma failed. Exiting");
865 return;
866 }
db25599d 867
11c2df83 868 time_0 = GetCountSspClk();
869
870 // And put the FPGA in the appropriate mode
871 FpgaWriteConfWord(FPGA_MAJOR_MODE_HF_READER_RX_XCORR | FPGA_HF_READER_RX_XCORR_848_KHZ);
872
873 while( !BUTTON_PRESS() ) {
874 WDT_HIT();
489ef36c 875
489ef36c 876 int behindBy = lastRxCounter - AT91C_BASE_PDC_SSC->PDC_RCR;
877 if(behindBy > max) max = behindBy;
878
11c2df83 879 // rx counter - dma counter? (how much?) & (mod) dma buff / 2. (since 2bytes at the time is read)
880 while(((lastRxCounter - AT91C_BASE_PDC_SSC->PDC_RCR) & (ISO14443B_DMA_BUFFER_SIZE-1)) > 2) {
881
489ef36c 882 ci = upTo[0];
883 cq = upTo[1];
884 upTo += 2;
11c2df83 885 samples += 2;
886
887 // restart DMA buffer to receive again.
705bfa10 888 if(upTo >= dmaBuf + ISO14443B_DMA_BUFFER_SIZE) {
489ef36c 889 upTo = dmaBuf;
890 AT91C_BASE_PDC_SSC->PDC_RNPR = (uint32_t) upTo;
705bfa10 891 AT91C_BASE_PDC_SSC->PDC_RNCR = ISO14443B_DMA_BUFFER_SIZE;
489ef36c 892 }
11c2df83 893
489ef36c 894 lastRxCounter -= 2;
cef590d9 895 if(lastRxCounter <= 0)
896 lastRxCounter += ISO14443B_DMA_BUFFER_SIZE;
489ef36c 897
6fc68747 898 // is this | 0x01 the error? & 0xfe in https://github.com/Proxmark/proxmark3/issues/103
11c2df83 899 //gotFrame = Handle14443bTagSamplesDemod(ci & 0xfe, cq & 0xfe);
900 gotFrame = Handle14443bTagSamplesDemod(ci, cq);
901 if ( gotFrame ) break;
902 LED_A_INV();
489ef36c 903 }
904
11c2df83 905 time_stop = GetCountSspClk() - time_0;
906
907 if(time_stop > iso14b_timeout || gotFrame) break;
489ef36c 908 }
11c2df83 909
910 FpgaDisableSscDma();
abb21530 911
ff3e0744 912 if (!quiet) {
11c2df83 913 Dbprintf("max behindby = %d, samples = %d, gotFrame = %s, Demod.state = %d, Demod.len = %u",
b10a759f 914 max,
915 samples,
ff3e0744 916 (gotFrame) ? "true" : "false",
cef590d9 917 Demod.state,
11c2df83 918 Demod.len
b10a759f 919 );
920 }
11c2df83 921 if ( Demod.len > 0 )
922 LogTrace(Demod.output, Demod.len, Demod.startTime, Demod.endTime, NULL, FALSE);
923
924 // free mem refs.
925 // if ( dmaBuf ) dmaBuf = NULL;
926 // if ( upTo ) upTo = NULL;
489ef36c 927}
928
929
489ef36c 930//-----------------------------------------------------------------------------
931// Transmit the command (to the tag) that was placed in ToSend[].
932//-----------------------------------------------------------------------------
11c2df83 933static void TransmitFor14443b_AsReader(void) {
489ef36c 934
abb21530 935 FpgaWriteConfWord(FPGA_MAJOR_MODE_HF_READER_TX | FPGA_HF_READER_TX_SHALLOW_MOD);
11c2df83 936 SpinDelay(20);
b10a759f 937
11c2df83 938 int c;
939 // we could been in following mode:
940 // FPGA_MAJOR_MODE_HF_READER_RX_XCORR | FPGA_HF_READER_RX_XCORR_848_KHZ
941 // if its second call or more
942
943 // What does this loop do? Is it TR1?
944 for(c = 0; c < 10;) {
489ef36c 945 if(AT91C_BASE_SSC->SSC_SR & (AT91C_SSC_TXRDY)) {
11c2df83 946 AT91C_BASE_SSC->SSC_THR = 0xFF;
cef590d9 947 ++c;
489ef36c 948 }
489ef36c 949 }
11c2df83 950
951 // Send frame loop
952 for(c = 0; c < ToSendMax;) {
489ef36c 953 if(AT91C_BASE_SSC->SSC_SR & (AT91C_SSC_TXRDY)) {
954 AT91C_BASE_SSC->SSC_THR = ToSend[c];
cef590d9 955 ++c;
489ef36c 956 }
489ef36c 957 }
11c2df83 958 WDT_HIT();
489ef36c 959}
960
489ef36c 961//-----------------------------------------------------------------------------
962// Code a layer 2 command (string of octets, including CRC) into ToSend[],
abb21530 963// so that it is ready to transmit to the tag using TransmitFor14443b().
489ef36c 964//-----------------------------------------------------------------------------
965static void CodeIso14443bAsReader(const uint8_t *cmd, int len)
966{
11c2df83 967 /*
968 * Reader data transmission:
969 * - no modulation ONES
970 * - SOF
971 * - Command, data and CRC_B
972 * - EOF
973 * - no modulation ONES
974 *
975 * 1 ETU == 1 BIT!
976 * TR0 - 8 ETUS minimum.
977 */
978 int i;
489ef36c 979 uint8_t b;
11c2df83 980
489ef36c 981 ToSendReset();
982
489ef36c 983 // Send SOF
11c2df83 984 // 10-11 ETUs of ZERO
985 for(i = 0; i < 10; ++i) ToSendStuffBit(0);
986
987 // 2-3 ETUs of ONE
988 ToSendStuffBit(1);
989 ToSendStuffBit(1);
990 ToSendStuffBit(1);
991
992 // Sending cmd, LSB
993 // from here we add BITS
6fc68747 994 for(i = 0; i < len; ++i) {
11c2df83 995 // Start bit
489ef36c 996 ToSendStuffBit(0);
997 // Data bits
11c2df83 998 b = cmd[i];
999 if ( b & 1 ) ToSendStuffBit(1); else ToSendStuffBit(0);
1000 if ( (b>>1) & 1) ToSendStuffBit(1); else ToSendStuffBit(0);
1001 if ( (b>>2) & 1) ToSendStuffBit(1); else ToSendStuffBit(0);
1002 if ( (b>>3) & 1) ToSendStuffBit(1); else ToSendStuffBit(0);
1003 if ( (b>>4) & 1) ToSendStuffBit(1); else ToSendStuffBit(0);
1004 if ( (b>>5) & 1) ToSendStuffBit(1); else ToSendStuffBit(0);
1005 if ( (b>>6) & 1) ToSendStuffBit(1); else ToSendStuffBit(0);
1006 if ( (b>>7) & 1) ToSendStuffBit(1); else ToSendStuffBit(0);
1007 // Stop bit
489ef36c 1008 ToSendStuffBit(1);
11c2df83 1009 // EGT extra guard time
1010 // For PCD it ranges 0-57us (1etu = 9us)
489ef36c 1011 ToSendStuffBit(1);
11c2df83 1012 ToSendStuffBit(1);
1013 ToSendStuffBit(1);
1014 }
1015
1016 // Send EOF
1017 // 10-11 ETUs of ZERO
1018 for(i = 0; i < 10; ++i) ToSendStuffBit(0);
489ef36c 1019
11c2df83 1020 // Transition time. TR0 - guard time
1021 // 8ETUS minum?
1022 // Per specification, Subcarrier must be stopped no later than 2 ETUs after EOF.
1023 for(i = 0; i < 40 ; ++i) ToSendStuffBit(1);
1024
1025 // TR1 - Synchronization time
489ef36c 1026 // Convert from last character reference to length
cef590d9 1027 ++ToSendMax;
489ef36c 1028}
1029
1030
489ef36c 1031/**
1032 Convenience function to encode, transmit and trace iso 14443b comms
1033 **/
11c2df83 1034static void CodeAndTransmit14443bAsReader(const uint8_t *cmd, int len) {
1035
489ef36c 1036 CodeIso14443bAsReader(cmd, len);
11c2df83 1037
1038 uint32_t time_start = GetCountSspClk();
6fc68747 1039
11c2df83 1040 TransmitFor14443b_AsReader();
1041
6fc68747 1042 if(trigger) LED_A_ON();
1043
11c2df83 1044 if (tracing) LogTrace(cmd, len, time_start, GetCountSspClk()-time_start, NULL, TRUE);
489ef36c 1045}
1046
a62bf3af 1047/* Sends an APDU to the tag
1048 * TODO: check CRC and preamble
1049 */
6fc68747 1050uint8_t iso14443b_apdu(uint8_t const *message, size_t message_length, uint8_t *response)
a62bf3af 1051{
6fc68747 1052 uint8_t crc[2] = {0x00, 0x00};
a62bf3af 1053 uint8_t message_frame[message_length + 4];
1054 // PCB
1055 message_frame[0] = 0x0A | pcb_blocknum;
1056 pcb_blocknum ^= 1;
1057 // CID
1058 message_frame[1] = 0;
1059 // INF
1060 memcpy(message_frame + 2, message, message_length);
1061 // EDC (CRC)
1062 ComputeCrc14443(CRC_14443_B, message_frame, message_length + 2, &message_frame[message_length + 2], &message_frame[message_length + 3]);
1063 // send
11c2df83 1064 CodeAndTransmit14443bAsReader(message_frame, message_length + 4); //no
a62bf3af 1065 // get response
11c2df83 1066 GetTagSamplesFor14443bDemod(TRUE); //no
a62bf3af 1067 if(Demod.len < 3)
a62bf3af 1068 return 0;
cef590d9 1069
6fc68747 1070 // VALIDATE CRC
1071 ComputeCrc14443(CRC_14443_B, Demod.output, Demod.len-2, &crc[0], &crc[1]);
1072 if ( crc[0] != Demod.output[Demod.len-2] || crc[1] != Demod.output[Demod.len-1] )
1073 return 0;
1074
a62bf3af 1075 // copy response contents
1076 if(response != NULL)
a62bf3af 1077 memcpy(response, Demod.output, Demod.len);
cef590d9 1078
a62bf3af 1079 return Demod.len;
1080}
1081
6fc68747 1082/**
1083* SRx Initialise.
1084*/
1085uint8_t iso14443b_select_srx_card(iso14b_card_select_t *card )
1086{
1087 // INITIATE command: wake up the tag using the INITIATE
1088 static const uint8_t init_srx[] = { ISO14443B_INITIATE, 0x00, 0x97, 0x5b };
1089 // SELECT command (with space for CRC)
1090 uint8_t select_srx[] = { ISO14443B_SELECT, 0x00, 0x00, 0x00};
1091 // temp to calc crc.
1092 uint8_t crc[2] = {0x00, 0x00};
1093
1094 CodeAndTransmit14443bAsReader(init_srx, sizeof(init_srx));
11c2df83 1095 GetTagSamplesFor14443bDemod(TRUE); //no
6fc68747 1096
1097 if (Demod.len == 0) return 2;
1098
1099 // Randomly generated Chip ID
1100 if (card) card->chipid = Demod.output[0];
1101
1102 select_srx[1] = Demod.output[0];
1103
1104 ComputeCrc14443(CRC_14443_B, select_srx, 2, &select_srx[2], &select_srx[3]);
1105 CodeAndTransmit14443bAsReader(select_srx, sizeof(select_srx));
11c2df83 1106 GetTagSamplesFor14443bDemod(TRUE); //no
6fc68747 1107
1108 if (Demod.len != 3) return 2;
1109
1110 // Check the CRC of the answer:
1111 ComputeCrc14443(CRC_14443_B, Demod.output, Demod.len-2 , &crc[0], &crc[1]);
1112 if(crc[0] != Demod.output[1] || crc[1] != Demod.output[2]) return 3;
1113
1114 // Check response from the tag: should be the same UID as the command we just sent:
1115 if (select_srx[1] != Demod.output[0]) return 1;
1116
1117 // First get the tag's UID:
1118 select_srx[0] = ISO14443B_GET_UID;
1119
1120 ComputeCrc14443(CRC_14443_B, select_srx, 1 , &select_srx[1], &select_srx[2]);
1121 CodeAndTransmit14443bAsReader(select_srx, 3); // Only first three bytes for this one
11c2df83 1122 GetTagSamplesFor14443bDemod(TRUE); //no
6fc68747 1123
1124 if (Demod.len != 10) return 2;
1125
1126 // The check the CRC of the answer
1127 ComputeCrc14443(CRC_14443_B, Demod.output, Demod.len-2, &crc[0], &crc[1]);
1128 if(crc[0] != Demod.output[8] || crc[1] != Demod.output[9]) return 3;
1129
1130 if (card) {
1131 card->uidlen = 8;
1132 memcpy(card->uid, Demod.output, 8);
1133 }
1134
1135 return 0;
1136}
a62bf3af 1137/* Perform the ISO 14443 B Card Selection procedure
1138 * Currently does NOT do any collision handling.
1139 * It expects 0-1 cards in the device's range.
1140 * TODO: Support multiple cards (perform anticollision)
1141 * TODO: Verify CRC checksums
1142 */
6fc68747 1143uint8_t iso14443b_select_card(iso14b_card_select_t *card )
a62bf3af 1144{
1145 // WUPB command (including CRC)
1146 // Note: WUPB wakes up all tags, REQB doesn't wake up tags in HALT state
6fc68747 1147 static const uint8_t wupb[] = { ISO14443B_REQB, 0x00, 0x08, 0x39, 0x73 };
a62bf3af 1148 // ATTRIB command (with space for CRC)
6fc68747 1149 uint8_t attrib[] = { ISO14443B_ATTRIB, 0x00, 0x00, 0x00, 0x00, 0x00, 0x08, 0x00, 0x00, 0x00, 0x00};
a62bf3af 1150
6fc68747 1151 // temp to calc crc.
1152 uint8_t crc[2] = {0x00, 0x00};
1153
a62bf3af 1154 // first, wake up the tag
1155 CodeAndTransmit14443bAsReader(wupb, sizeof(wupb));
11c2df83 1156 GetTagSamplesFor14443bDemod(TRUE); //select_card
6fc68747 1157
a62bf3af 1158 // ATQB too short?
6fc68747 1159 if (Demod.len < 14) return 2;
1160
1161 // VALIDATE CRC
1162 ComputeCrc14443(CRC_14443_B, Demod.output, Demod.len-2, &crc[0], &crc[1]);
1163 if ( crc[0] != Demod.output[12] || crc[1] != Demod.output[13] )
1164 return 3;
1165
1166 if (card) {
1167 card->uidlen = 4;
1168 memcpy(card->uid, Demod.output+1, 4);
1169 memcpy(card->atqb, Demod.output+5, 7);
1170 }
a62bf3af 1171
11c2df83 1172 // copy the PUPI to ATTRIB ( PUPI == UID )
a62bf3af 1173 memcpy(attrib + 1, Demod.output + 1, 4);
6fc68747 1174
1175 // copy the protocol info from ATQB (Protocol Info -> Protocol_Type) into ATTRIB (Param 3)
a62bf3af 1176 attrib[7] = Demod.output[10] & 0x0F;
1177 ComputeCrc14443(CRC_14443_B, attrib, 9, attrib + 9, attrib + 10);
6fc68747 1178
a62bf3af 1179 CodeAndTransmit14443bAsReader(attrib, sizeof(attrib));
11c2df83 1180 GetTagSamplesFor14443bDemod(TRUE);//select_card
6fc68747 1181
a62bf3af 1182 // Answer to ATTRIB too short?
6fc68747 1183 if(Demod.len < 3) return 2;
1184
1185 // VALIDATE CRC
1186 ComputeCrc14443(CRC_14443_B, Demod.output, Demod.len-2, &crc[0], &crc[1]);
1187 if ( crc[0] != Demod.output[1] || crc[1] != Demod.output[2] )
1188 return 3;
1189
1190 // CID
1191 if (card) card->cid = Demod.output[0];
cef590d9 1192
11c2df83 1193 uint8_t fwt = card->atqb[6]>>4;
1194 if ( fwt < 16 ){
1195 uint32_t fwt_time = (302 << fwt);
1196 iso14b_set_timeout( fwt_time);
1197 }
a62bf3af 1198 // reset PCB block number
1199 pcb_blocknum = 0;
6fc68747 1200 return 0;
a62bf3af 1201}
1202
1203// Set up ISO 14443 Type B communication (similar to iso14443a_setup)
11c2df83 1204// field is setup for "Sending as Reader"
a62bf3af 1205void iso14443b_setup() {
11c2df83 1206 if (MF_DBGLEVEL > 3) Dbprintf("iso1443b_setup Enter");
1207 LEDsoff();
a62bf3af 1208 FpgaDownloadAndGo(FPGA_BITSTREAM_HF);
11c2df83 1209 //BigBuf_free();
1210 //BigBuf_Clear_ext(false);
ff3e0744 1211
11c2df83 1212 // Initialize Demod and Uart structs
1213 DemodInit(BigBuf_malloc(MAX_FRAME_SIZE));
1214 UartInit(BigBuf_malloc(MAX_FRAME_SIZE));
cef590d9 1215
a62bf3af 1216 // connect Demodulated Signal to ADC:
1217 SetAdcMuxFor(GPIO_MUXSEL_HIPKD);
1218
11c2df83 1219 // Set up the synchronous serial port
1220 FpgaSetupSsc();
1221
a62bf3af 1222 // Signal field is on with the appropriate LED
a62bf3af 1223 FpgaWriteConfWord(FPGA_MAJOR_MODE_HF_READER_TX | FPGA_HF_READER_TX_SHALLOW_MOD);
11c2df83 1224 SpinDelay(100);
a62bf3af 1225
1226 // Start the timer
ff3e0744 1227 StartCountSspClk();
11c2df83 1228
1229 LED_D_ON();
1230 if (MF_DBGLEVEL > 3) Dbprintf("iso1443b_setup Exit");
a62bf3af 1231}
489ef36c 1232
1233//-----------------------------------------------------------------------------
abb21530 1234// Read a SRI512 ISO 14443B tag.
489ef36c 1235//
1236// SRI512 tags are just simple memory tags, here we're looking at making a dump
1237// of the contents of the memory. No anticollision algorithm is done, we assume
1238// we have a single tag in the field.
1239//
1240// I tried to be systematic and check every answer of the tag, every CRC, etc...
1241//-----------------------------------------------------------------------------
6fc68747 1242void ReadSTMemoryIso14443b(uint8_t numofblocks)
489ef36c 1243{
17ad0e09 1244 FpgaDownloadAndGo(FPGA_BITSTREAM_HF);
489ef36c 1245
489ef36c 1246 // Make sure that we start from off, since the tags are stateful;
1247 // confusing things will happen if we don't reset them between reads.
11c2df83 1248 switch_off(); // before ReadStMemory
1249
1250 set_tracing(TRUE);
1251
1252 uint8_t i = 0x00;
99cf19d9 1253
489ef36c 1254 SetAdcMuxFor(GPIO_MUXSEL_HIPKD);
1255 FpgaSetupSsc();
1256
1257 // Now give it time to spin up.
1258 // Signal field is on with the appropriate LED
1259 LED_D_ON();
22e24700 1260 FpgaWriteConfWord(FPGA_MAJOR_MODE_HF_READER_RX_XCORR | FPGA_HF_READER_RX_XCORR_848_KHZ);
11c2df83 1261 SpinDelay(20);
489ef36c 1262
1263 // First command: wake up the tag using the INITIATE command
6fc68747 1264 uint8_t cmd1[] = {ISO14443B_INITIATE, 0x00, 0x97, 0x5b};
11c2df83 1265 CodeAndTransmit14443bAsReader(cmd1, sizeof(cmd1)); //no
1266 GetTagSamplesFor14443bDemod(TRUE); // no
489ef36c 1267
1268 if (Demod.len == 0) {
22e24700 1269 DbpString("No response from tag");
5ee53a0e 1270 set_tracing(FALSE);
22e24700 1271 return;
489ef36c 1272 } else {
705bfa10 1273 Dbprintf("Randomly generated Chip ID (+ 2 byte CRC): %02x %02x %02x",
1274 Demod.output[0], Demod.output[1], Demod.output[2]);
489ef36c 1275 }
705bfa10 1276
489ef36c 1277 // There is a response, SELECT the uid
1278 DbpString("Now SELECT tag:");
6fc68747 1279 cmd1[0] = ISO14443B_SELECT; // 0x0E is SELECT
489ef36c 1280 cmd1[1] = Demod.output[0];
1281 ComputeCrc14443(CRC_14443_B, cmd1, 2, &cmd1[2], &cmd1[3]);
11c2df83 1282 CodeAndTransmit14443bAsReader(cmd1, sizeof(cmd1)); //no
1283 GetTagSamplesFor14443bDemod(TRUE); //no
489ef36c 1284 if (Demod.len != 3) {
22e24700 1285 Dbprintf("Expected 3 bytes from tag, got %d", Demod.len);
5ee53a0e 1286 set_tracing(FALSE);
22e24700 1287 return;
489ef36c 1288 }
1289 // Check the CRC of the answer:
1290 ComputeCrc14443(CRC_14443_B, Demod.output, 1 , &cmd1[2], &cmd1[3]);
1291 if(cmd1[2] != Demod.output[1] || cmd1[3] != Demod.output[2]) {
22e24700 1292 DbpString("CRC Error reading select response.");
5ee53a0e 1293 set_tracing(FALSE);
22e24700 1294 return;
489ef36c 1295 }
1296 // Check response from the tag: should be the same UID as the command we just sent:
1297 if (cmd1[1] != Demod.output[0]) {
22e24700 1298 Dbprintf("Bad response to SELECT from Tag, aborting: %02x %02x", cmd1[1], Demod.output[0]);
5ee53a0e 1299 set_tracing(FALSE);
22e24700 1300 return;
489ef36c 1301 }
705bfa10 1302
489ef36c 1303 // Tag is now selected,
1304 // First get the tag's UID:
6fc68747 1305 cmd1[0] = ISO14443B_GET_UID;
489ef36c 1306 ComputeCrc14443(CRC_14443_B, cmd1, 1 , &cmd1[1], &cmd1[2]);
11c2df83 1307 CodeAndTransmit14443bAsReader(cmd1, 3); // no -- Only first three bytes for this one
1308 GetTagSamplesFor14443bDemod(TRUE); //no
489ef36c 1309 if (Demod.len != 10) {
22e24700 1310 Dbprintf("Expected 10 bytes from tag, got %d", Demod.len);
5ee53a0e 1311 set_tracing(FALSE);
22e24700 1312 return;
489ef36c 1313 }
1314 // The check the CRC of the answer (use cmd1 as temporary variable):
1315 ComputeCrc14443(CRC_14443_B, Demod.output, 8, &cmd1[2], &cmd1[3]);
51d4f6f1 1316 if(cmd1[2] != Demod.output[8] || cmd1[3] != Demod.output[9]) {
22e24700 1317 Dbprintf("CRC Error reading block! Expected: %04x got: %04x",
705bfa10 1318 (cmd1[2]<<8)+cmd1[3], (Demod.output[8]<<8)+Demod.output[9]);
489ef36c 1319 // Do not return;, let's go on... (we should retry, maybe ?)
1320 }
1321 Dbprintf("Tag UID (64 bits): %08x %08x",
705bfa10 1322 (Demod.output[7]<<24) + (Demod.output[6]<<16) + (Demod.output[5]<<8) + Demod.output[4],
1323 (Demod.output[3]<<24) + (Demod.output[2]<<16) + (Demod.output[1]<<8) + Demod.output[0]);
489ef36c 1324
1325 // Now loop to read all 16 blocks, address from 0 to last block
6fc68747 1326 Dbprintf("Tag memory dump, block 0 to %d", numofblocks);
489ef36c 1327 cmd1[0] = 0x08;
1328 i = 0x00;
6fc68747 1329 ++numofblocks;
1330
489ef36c 1331 for (;;) {
6fc68747 1332 if (i == numofblocks) {
489ef36c 1333 DbpString("System area block (0xff):");
1334 i = 0xff;
1335 }
1336 cmd1[1] = i;
1337 ComputeCrc14443(CRC_14443_B, cmd1, 2, &cmd1[2], &cmd1[3]);
11c2df83 1338 CodeAndTransmit14443bAsReader(cmd1, sizeof(cmd1)); //no
1339 GetTagSamplesFor14443bDemod(TRUE); //no
6fc68747 1340
489ef36c 1341 if (Demod.len != 6) { // Check if we got an answer from the tag
6fc68747 1342 DbpString("Expected 6 bytes from tag, got less...");
1343 return;
489ef36c 1344 }
1345 // The check the CRC of the answer (use cmd1 as temporary variable):
1346 ComputeCrc14443(CRC_14443_B, Demod.output, 4, &cmd1[2], &cmd1[3]);
1347 if(cmd1[2] != Demod.output[4] || cmd1[3] != Demod.output[5]) {
132a0217 1348 Dbprintf("CRC Error reading block! Expected: %04x got: %04x",
705bfa10 1349 (cmd1[2]<<8)+cmd1[3], (Demod.output[4]<<8)+Demod.output[5]);
489ef36c 1350 // Do not return;, let's go on... (we should retry, maybe ?)
1351 }
1352 // Now print out the memory location:
22e24700 1353 Dbprintf("Address=%02x, Contents=%08x, CRC=%04x", i,
705bfa10 1354 (Demod.output[3]<<24) + (Demod.output[2]<<16) + (Demod.output[1]<<8) + Demod.output[0],
17ad0e09 1355 (Demod.output[4]<<8)+Demod.output[5]);
6fc68747 1356
1357 if (i == 0xff) break;
1358 ++i;
489ef36c 1359 }
5ee53a0e 1360
1361 set_tracing(FALSE);
489ef36c 1362}
1363
11c2df83 1364
1365static void iso1444b_setup_snoop(void){
1366 if (MF_DBGLEVEL > 3) Dbprintf("iso1443b_setup_snoop Enter");
1367 LEDsoff();
1368 FpgaDownloadAndGo(FPGA_BITSTREAM_HF);
1369 BigBuf_free();
1370 BigBuf_Clear_ext(false);
1371 clear_trace();//setup snoop
1372 set_tracing(TRUE);
1373
1374 // Initialize Demod and Uart structs
1375 DemodInit(BigBuf_malloc(MAX_FRAME_SIZE));
1376 UartInit(BigBuf_malloc(MAX_FRAME_SIZE));
1377
1378 if (MF_DBGLEVEL > 1) {
1379 // Print debug information about the buffer sizes
1380 Dbprintf("Snooping buffers initialized:");
1381 Dbprintf(" Trace: %i bytes", BigBuf_max_traceLen());
1382 Dbprintf(" Reader -> tag: %i bytes", MAX_FRAME_SIZE);
1383 Dbprintf(" tag -> Reader: %i bytes", MAX_FRAME_SIZE);
1384 Dbprintf(" DMA: %i bytes", ISO14443B_DMA_BUFFER_SIZE);
1385 }
1386
1387 // connect Demodulated Signal to ADC:
1388 SetAdcMuxFor(GPIO_MUXSEL_HIPKD);
1389
1390 // Setup for the DMA.
1391 FpgaSetupSsc();
1392
1393 // Set FPGA in the appropriate mode
1394 FpgaWriteConfWord(FPGA_MAJOR_MODE_HF_READER_RX_XCORR | FPGA_HF_READER_RX_XCORR_848_KHZ | FPGA_HF_READER_RX_XCORR_SNOOP);
1395 SpinDelay(20);
1396
1397 // Start the SSP timer
1398 StartCountSspClk();
1399 if (MF_DBGLEVEL > 3) Dbprintf("iso1443b_setup_snoop Exit");
1400}
1401
489ef36c 1402//=============================================================================
1403// Finally, the `sniffer' combines elements from both the reader and
1404// simulated tag, to show both sides of the conversation.
1405//=============================================================================
1406
1407//-----------------------------------------------------------------------------
1408// Record the sequence of commands sent by the reader to the tag, with
1409// triggering so that we start recording at the point that the tag is moved
1410// near the reader.
1411//-----------------------------------------------------------------------------
1412/*
1413 * Memory usage for this function, (within BigBuf)
47286d89 1414 * Last Received command (reader->tag) - MAX_FRAME_SIZE
1415 * Last Received command (tag->reader) - MAX_FRAME_SIZE
705bfa10 1416 * DMA Buffer - ISO14443B_DMA_BUFFER_SIZE
47286d89 1417 * Demodulated samples received - all the rest
489ef36c 1418 */
11c2df83 1419void RAMFUNC SnoopIso14443b(void) {
1420
1421 uint32_t time_0 = 0, time_start = 0, time_stop = 0;
1422
489ef36c 1423 // We won't start recording the frames that we acquire until we trigger;
1424 // a good trigger condition to get started is probably when we see a
1425 // response from the tag.
11c2df83 1426 int triggered = TRUE; // TODO: set and evaluate trigger condition
489ef36c 1427 int ci, cq;
1428 int maxBehindBy = 0;
11c2df83 1429 //int behindBy = 0;
1430 int lastRxCounter = ISO14443B_DMA_BUFFER_SIZE;
1431
f53020e7 1432 bool TagIsActive = FALSE;
1433 bool ReaderIsActive = FALSE;
11c2df83 1434
1435 iso1444b_setup_snoop();
1436
1437 // The DMA buffer, used to stream samples from the FPGA
1438 int8_t *dmaBuf = (int8_t*) BigBuf_malloc(ISO14443B_DMA_BUFFER_SIZE);
1439 int8_t *upTo = dmaBuf;
1440
1441 // Setup and start DMA.
1442 if ( !FpgaSetupSscDma((uint8_t*) dmaBuf, ISO14443B_DMA_BUFFER_SIZE) ){
1443 if (MF_DBGLEVEL > 1) Dbprintf("FpgaSetupSscDma failed. Exiting");
1444 BigBuf_free();
1445 return;
1446 }
1447
1448 time_0 = GetCountSspClk();
489ef36c 1449
1450 // And now we loop, receiving samples.
1451 for(;;) {
abb21530 1452
11c2df83 1453 WDT_HIT();
1454
1455 int behindBy = (lastRxCounter - AT91C_BASE_PDC_SSC->PDC_RCR) & (ISO14443B_DMA_BUFFER_SIZE-1);
489ef36c 1456
11c2df83 1457 if ( behindBy > maxBehindBy )
1458 maxBehindBy = behindBy;
1459
1460 if ( behindBy < 2 ) continue;
1461
489ef36c 1462 ci = upTo[0];
1463 cq = upTo[1];
1464 upTo += 2;
11c2df83 1465
489ef36c 1466 lastRxCounter -= 2;
11c2df83 1467
1468 if (upTo >= dmaBuf + ISO14443B_DMA_BUFFER_SIZE) {
489ef36c 1469 upTo = dmaBuf;
705bfa10 1470 lastRxCounter += ISO14443B_DMA_BUFFER_SIZE;
489ef36c 1471 AT91C_BASE_PDC_SSC->PDC_RNPR = (uint32_t) dmaBuf;
705bfa10 1472 AT91C_BASE_PDC_SSC->PDC_RNCR = ISO14443B_DMA_BUFFER_SIZE;
51d4f6f1 1473 WDT_HIT();
11c2df83 1474
1475 // TODO: understand whether we can increase/decrease as we want or not?
1476 if ( behindBy > ( 9 * ISO14443B_DMA_BUFFER_SIZE/10) ) {
132a0217 1477 Dbprintf("blew circular buffer! behindBy=%d", behindBy);
51d4f6f1 1478 break;
abb21530 1479 }
810f5379 1480
abb21530 1481 if(!tracing) {
810f5379 1482 DbpString("Trace full");
abb21530 1483 break;
1484 }
11c2df83 1485
abb21530 1486 if(BUTTON_PRESS()) {
1487 DbpString("cancelled");
1488 break;
1489 }
489ef36c 1490 }
11c2df83 1491
1492 if (!TagIsActive) {
1493
1494 LED_A_ON();
1495
1496 // no need to try decoding reader data if the tag is sending
1497 if (Handle14443bReaderUartBit(ci & 0x01)) {
489ef36c 1498
11c2df83 1499 time_stop = (GetCountSspClk()-time_0);
1500
1501 if (triggered)
1502 LogTrace(Uart.output, Uart.byteCnt, time_start, time_stop, NULL, TRUE);
6fc68747 1503
810f5379 1504 /* And ready to receive another command. */
1505 UartReset();
1506 /* And also reset the demod code, which might have been */
1507 /* false-triggered by the commands from the reader. */
1508 DemodReset();
11c2df83 1509 } else {
1510 time_start = (GetCountSspClk()-time_0);
489ef36c 1511 }
6fc68747 1512
11c2df83 1513 if (Handle14443bReaderUartBit(cq & 0x01)) {
1514
1515 time_stop = (GetCountSspClk()-time_0);
1516
1517 if (triggered)
1518 LogTrace(Uart.output, Uart.byteCnt, time_start, time_stop, NULL, TRUE);
6fc68747 1519
810f5379 1520 /* And ready to receive another command. */
1521 UartReset();
1522 /* And also reset the demod code, which might have been */
1523 /* false-triggered by the commands from the reader. */
1524 DemodReset();
11c2df83 1525 } else {
1526 time_start = (GetCountSspClk()-time_0);
6fc68747 1527 }
36f84d47 1528 ReaderIsActive = (Uart.state > STATE_GOT_FALLING_EDGE_OF_SOF);
11c2df83 1529 LED_A_OFF();
47286d89 1530 }
11c2df83 1531
1532 if(!ReaderIsActive) {
1533 // no need to try decoding tag data if the reader is sending - and we cannot afford the time
d8af608f 1534 // is this | 0x01 the error? & 0xfe in https://github.com/Proxmark/proxmark3/issues/103
11c2df83 1535 if(Handle14443bTagSamplesDemod(ci & 0xFE, cq & 0xFE)) {
1536
1537 time_stop = (GetCountSspClk()-time_0);
1538
1539 LogTrace(Demod.output, Demod.len, time_start, time_stop, NULL, FALSE);
489ef36c 1540
810f5379 1541 triggered = TRUE;
1542
1543 // And ready to receive another response.
1544 DemodReset();
11c2df83 1545 } else {
1546 time_start = (GetCountSspClk()-time_0);
810f5379 1547 }
22e24700 1548 TagIsActive = (Demod.state > DEMOD_GOT_FALLING_EDGE_OF_SOF);
47286d89 1549 }
489ef36c 1550 }
abb21530 1551
11c2df83 1552 switch_off(); // Snoop
810f5379 1553
489ef36c 1554 DbpString("Snoop statistics:");
1555 Dbprintf(" Max behind by: %i", maxBehindBy);
11c2df83 1556 Dbprintf(" Uart State: %x ByteCount: %i ByteCountMax: %i", Uart.state, Uart.byteCnt, Uart.byteCntMax);
489ef36c 1557 Dbprintf(" Trace length: %i", BigBuf_get_traceLen());
11c2df83 1558
1559 // free mem refs.
1560 if ( dmaBuf ) dmaBuf = NULL;
1561 if ( upTo ) upTo = NULL;
1562 // Uart.byteCntMax should be set with ATQB value..
489ef36c 1563}
1564
6fc68747 1565void iso14b_set_trigger(bool enable) {
1566 trigger = enable;
1567}
489ef36c 1568
1569/*
1570 * Send raw command to tag ISO14443B
1571 * @Input
6fc68747 1572 * param flags enum ISO14B_COMMAND. (mifare.h)
1573 * len len of buffer data
1574 * data buffer with bytes to send
489ef36c 1575 *
1576 * @Output
1577 * none
1578 *
1579 */
6fc68747 1580void SendRawCommand14443B_Ex(UsbCommand *c)
489ef36c 1581{
6fc68747 1582 iso14b_command_t param = c->arg[0];
1583 size_t len = c->arg[1] & 0xffff;
1584 uint8_t *cmd = c->d.asBytes;
1585 uint8_t status = 0;
1586 uint32_t sendlen = sizeof(iso14b_card_select_t);
1587 uint8_t buf[USB_CMD_DATA_SIZE] = {0x00};
1588
11c2df83 1589 if (MF_DBGLEVEL > 3) Dbprintf("14b raw: param, %04x", param );
b10a759f 1590
6fc68747 1591 // turn on trigger (LED_A)
11c2df83 1592 if ((param & ISO14B_REQUEST_TRIGGER) == ISO14B_REQUEST_TRIGGER)
6fc68747 1593 iso14b_set_trigger(TRUE);
1594
11c2df83 1595 if ((param & ISO14B_CONNECT) == ISO14B_CONNECT) {
6fc68747 1596 // Make sure that we start from off, since the tags are stateful;
1597 // confusing things will happen if we don't reset them between reads.
11c2df83 1598 //switch_off(); // before connect in raw
6fc68747 1599 iso14443b_setup();
99cf19d9 1600 }
6fc68747 1601
1602 set_tracing(TRUE);
489ef36c 1603
11c2df83 1604 if ((param & ISO14B_SELECT_STD) == ISO14B_SELECT_STD) {
6fc68747 1605 iso14b_card_select_t *card = (iso14b_card_select_t*)buf;
1606 status = iso14443b_select_card(card);
1607 cmd_send(CMD_ACK, status, sendlen, 0, buf, sendlen);
1608 // 0: OK 2: attrib fail, 3:crc fail,
1609 if ( status > 0 ) return;
1610 }
1611
11c2df83 1612 if ((param & ISO14B_SELECT_SR) == ISO14B_SELECT_SR) {
6fc68747 1613 iso14b_card_select_t *card = (iso14b_card_select_t*)buf;
1614 status = iso14443b_select_srx_card(card);
1615 cmd_send(CMD_ACK, status, sendlen, 0, buf, sendlen);
1616 // 0: OK 2: attrib fail, 3:crc fail,
1617 if ( status > 0 ) return;
1618 }
1619
11c2df83 1620 if ((param & ISO14B_APDU) == ISO14B_APDU) {
6fc68747 1621 status = iso14443b_apdu(cmd, len, buf);
1622 cmd_send(CMD_ACK, status, status, 0, buf, status);
489ef36c 1623 }
abb21530 1624
11c2df83 1625 if ((param & ISO14B_RAW) == ISO14B_RAW) {
1626 if((param & ISO14B_APPEND_CRC) == ISO14B_APPEND_CRC) {
6fc68747 1627 AppendCrc14443b(cmd, len);
1628 len += 2;
1629 }
1630
11c2df83 1631 CodeAndTransmit14443bAsReader(cmd, len); // raw
1632 GetTagSamplesFor14443bDemod(TRUE); // raw
6fc68747 1633
1634 sendlen = MIN(Demod.len, USB_CMD_DATA_SIZE);
1635 status = (Demod.len > 0) ? 0 : 1;
1636 cmd_send(CMD_ACK, status, sendlen, 0, Demod.output, sendlen);
1637 }
1638
1639 // turn off trigger (LED_A)
11c2df83 1640 if ((param & ISO14B_REQUEST_TRIGGER) == ISO14B_REQUEST_TRIGGER)
1641 iso14b_set_trigger(FALSE);
6fc68747 1642
1643 // turn off antenna et al
1644 // we don't send a HALT command.
11c2df83 1645 if ((param & ISO14B_DISCONNECT) == ISO14B_DISCONNECT) {
6fc68747 1646 if (MF_DBGLEVEL > 3) Dbprintf("disconnect");
11c2df83 1647 switch_off(); // disconnect raw
1648 } else {
1649 //FpgaWriteConfWord(FPGA_MAJOR_MODE_HF_READER_TX | FPGA_HF_READER_TX_SHALLOW_MOD);
489ef36c 1650 }
11c2df83 1651
6fc68747 1652}
Impressum, Datenschutz