]> git.zerfleddert.de Git - proxmark3-svn/blob - client/cmdhflegic.c
0ddc7466cf0aeecce567f3305974ca311d142327
[proxmark3-svn] / client / cmdhflegic.c
1 //-----------------------------------------------------------------------------
2 // Copyright (C) 2010 iZsh <izsh at fail0verflow.com>
3 //
4 // This code is licensed to you under the terms of the GNU GPL, version 2 or,
5 // at your option, any later version. See the LICENSE.txt file for the text of
6 // the license.
7 //-----------------------------------------------------------------------------
8 // High frequency Legic commands
9 //-----------------------------------------------------------------------------
10 #include "cmdhflegic.h"
11
12 static int CmdHelp(const char *Cmd);
13
14 #define MAX_LENGTH 1024
15
16 int usage_legic_calccrc(void){
17 PrintAndLog("Calculates the legic crc8/crc16 on the given data.");
18 PrintAndLog("There must be an even number of hexsymbols as input.");
19 PrintAndLog("Usage: hf legic crc [h] d <data> u <uidcrc> c <8|16>");
20 PrintAndLog("Options:");
21 PrintAndLog(" h : this help");
22 PrintAndLog(" d <data> : (hex symbols) bytes to calculate crc over");
23 PrintAndLog(" u <uidcrc> : MCC hexbyte");
24 PrintAndLog(" c <8|16> : Crc type");
25 PrintAndLog("");
26 PrintAndLog("Samples:");
27 PrintAndLog(" hf legic crc b deadbeef1122");
28 PrintAndLog(" hf legic crc b deadbeef1122 u 9A c 16");
29 return 0;
30 }
31 int usage_legic_rdmem(void){
32 PrintAndLog("Read data from a legic tag.");
33 PrintAndLog("Usage: hf legic rdmem [h] <offset> <length> <IV>");
34 PrintAndLog("Options:");
35 PrintAndLog(" h : this help");
36 PrintAndLog(" <offset> : (hex) offset in data array to start download from");
37 PrintAndLog(" <length> : (hex) number of bytes to read");
38 PrintAndLog(" <IV> : (hex) (optional) Initialization vector to use. Must be odd and 7bits max");
39 PrintAndLog("");
40 PrintAndLog("Samples:");
41 PrintAndLog(" hf legic rdmem 0 16 - reads from byte[0] 0x16 bytes(system header)");
42 PrintAndLog(" hf legic rdmem 0 4 55 - reads from byte[0] 0x4 bytes with IV 0x55");
43 PrintAndLog(" hf legic rdmem 0 100 55 - reads 0x100 bytes with IV 0x55");
44 return 0;
45 }
46 int usage_legic_sim(void){
47 PrintAndLog("Simulates a LEGIC Prime tag. MIM22, MIM256, MIM1024 types can be emulated");
48 PrintAndLog("Use eload/esave to upload a dump into emulator memory");
49 PrintAndLog("Usage: hf legic sim [h] <tagtype> <phase> <frame> <reqresp>");
50 PrintAndLog("Options:");
51 PrintAndLog(" h : this help");
52 PrintAndLog(" <tagtype> : 0 = MIM22");
53 PrintAndLog(" : 1 = MIM256 (default)");
54 PrintAndLog(" : 2 = MIM1024");
55 PrintAndLog(" <phase> : phase drift");
56 PrintAndLog(" <frame> : frame drift");
57 PrintAndLog(" <reqresp> : reqresp drift");
58 PrintAndLog("");
59 PrintAndLog("Samples:");
60 PrintAndLog(" hf legic sim");
61 PrintAndLog(" hf legic sim ");
62 return 0;
63 }
64 int usage_legic_write(void){
65 PrintAndLog("Write data to a LEGIC Prime tag. It autodetects tagsize to make sure size");
66 PrintAndLog("Usage: hf legic write [h] o <offset> d <data (hex symbols)>");
67 PrintAndLog("Options:");
68 PrintAndLog(" h : this help");
69 PrintAndLog(" o <offset> : (hex) offset in data array to start writing");
70 //PrintAndLog(" <IV> : (optional) Initialization vector to use (ODD and 7bits)");
71 PrintAndLog(" d <data> : (hex symbols) bytes to write ");
72 PrintAndLog("");
73 PrintAndLog("Samples:");
74 PrintAndLog(" hf legic write o 10 d 11223344 - Write 0x11223344 starting from offset 0x10");
75 return 0;
76 }
77 int usage_legic_reader(void){
78 PrintAndLog("Read UID and type information from a legic tag.");
79 PrintAndLog("Usage: hf legic reader [h]");
80 PrintAndLog("Options:");
81 PrintAndLog(" h : this help");
82 PrintAndLog("");
83 PrintAndLog("Samples:");
84 PrintAndLog(" hf legic reader");
85 return 0;
86 }
87 int usage_legic_info(void){
88 PrintAndLog("Reads information from a legic prime tag.");
89 PrintAndLog("Shows systemarea, user areas etc");
90 PrintAndLog("Usage: hf legic info [h]");
91 PrintAndLog("Options:");
92 PrintAndLog(" h : this help");
93 PrintAndLog("");
94 PrintAndLog("Samples:");
95 PrintAndLog(" hf legic info");
96 return 0;
97 }
98 int usage_legic_dump(void){
99 PrintAndLog("Reads all pages from LEGIC Prime MIM22, MIM256, MIM1024");
100 PrintAndLog("and saves binary dump into the file `filename.bin` or `cardUID.bin`");
101 PrintAndLog("It autodetects card type.\n");
102 PrintAndLog("Usage: hf legic dump [h] o <filename w/o .bin>");
103 PrintAndLog("Options:");
104 PrintAndLog(" h : this help");
105 PrintAndLog(" o <filename> : filename w/o '.bin' to dump bytes");
106 PrintAndLog("");
107 PrintAndLog("Samples:");
108 PrintAndLog(" hf legic dump");
109 PrintAndLog(" hf legic dump o myfile");
110 return 0;
111 }
112 int usage_legic_restore(void){
113 PrintAndLog("Reads binary file and it autodetects card type and verifies that the file has the same size");
114 PrintAndLog("Then write the data back to card. All bytes except the first 7bytes [UID(4) MCC(1) DCF(2)]\n");
115 PrintAndLog("Usage: hf legic restore [h] i <filename w/o .bin>");
116 PrintAndLog("Options:");
117 PrintAndLog(" h : this help");
118 PrintAndLog(" i <filename> : filename w/o '.bin' to restore bytes on to card from");
119 PrintAndLog("");
120 PrintAndLog("Samples:");
121 PrintAndLog(" hf legic restore i myfile");
122 return 0;
123 }
124 int usage_legic_eload(void){
125 PrintAndLog("It loads binary dump from the file `filename.bin`");
126 PrintAndLog("Usage: hf legic eload [h] [card memory] <file name w/o `.bin`>");
127 PrintAndLog("Options:");
128 PrintAndLog(" h : this help");
129 PrintAndLog(" [card memory] : 0 = MIM22");
130 PrintAndLog(" : 1 = MIM256 (default)");
131 PrintAndLog(" : 2 = MIM1024");
132 PrintAndLog(" <filename> : filename w/o .bin to load");
133 PrintAndLog("");
134 PrintAndLog("Samples:");
135 PrintAndLog(" hf legic eload 2 myfile");
136 return 0;
137 }
138 int usage_legic_esave(void){
139 PrintAndLog("It saves binary dump into the file `filename.bin` or `cardID.bin`");
140 PrintAndLog(" Usage: hf legic esave [h] [card memory] [file name w/o `.bin`]");
141 PrintAndLog("Options:");
142 PrintAndLog(" h : this help");
143 PrintAndLog(" [card memory] : 0 = MIM22");
144 PrintAndLog(" : 1 = MIM256 (default)");
145 PrintAndLog(" : 2 = MIM1024");
146 PrintAndLog(" <filename> : filename w/o .bin to load");
147 PrintAndLog("");
148 PrintAndLog("Samples:");
149 PrintAndLog(" hf legic esave 2 myfile");
150 return 0;
151 }
152 int usage_legic_wipe(void){
153 PrintAndLog("Fills a legic tag memory with zeros. From byte7 and to the end.");
154 PrintAndLog(" Usage: hf legic wipe [h]");
155 PrintAndLog("Options:");
156 PrintAndLog(" h : this help");
157 PrintAndLog("");
158 PrintAndLog("Samples:");
159 PrintAndLog(" hf legic wipe");
160 return 0;
161 }
162 /*
163 * Output BigBuf and deobfuscate LEGIC RF tag data.
164 * This is based on information given in the talk held
165 * by Henryk Ploetz and Karsten Nohl at 26c3
166 */
167 int CmdLegicInfo(const char *Cmd) {
168
169 char cmdp = param_getchar(Cmd, 0);
170 if ( cmdp == 'H' || cmdp == 'h' ) return usage_legic_info();
171
172 int i = 0, k = 0, segmentNum = 0, segment_len = 0, segment_flag = 0;
173 int crc = 0, wrp = 0, wrc = 0;
174 uint8_t stamp_len = 0;
175 uint8_t data[1024]; // receiver buffer
176 char token_type[5] = {0,0,0,0,0};
177 int dcf = 0;
178 int bIsSegmented = 0;
179
180 CmdLegicRdmem("0 22 55");
181
182 // copy data from device
183 GetEMLFromBigBuf(data, sizeof(data), 0);
184 if ( !WaitForResponseTimeout(CMD_ACK, NULL, 2000)){
185 PrintAndLog("Command execute timeout");
186 return 1;
187 }
188
189 // Output CDF System area (9 bytes) plus remaining header area (12 bytes)
190 crc = data[4];
191 uint32_t calc_crc = CRC8Legic(data, 4);
192
193 PrintAndLog("\nCDF: System Area");
194 PrintAndLog("------------------------------------------------------");
195 PrintAndLog("MCD: %02x, MSN: %02x %02x %02x, MCC: %02x %s",
196 data[0],
197 data[1],
198 data[2],
199 data[3],
200 data[4],
201 (calc_crc == crc) ? "OK":"Fail"
202 );
203
204 // MCD = Manufacturer ID (should be list meaning something?)
205
206 token_type[0] = 0;
207 dcf = ((int)data[6] << 8) | (int)data[5];
208
209 // New unwritten media?
210 if(dcf == 0xFFFF) {
211
212 PrintAndLog("DCF: %d (%02x %02x), Token Type=NM (New Media)",
213 dcf,
214 data[5],
215 data[6]
216 );
217
218 } else if (dcf > 60000) { // Master token?
219
220 int fl = 0;
221
222 if(data[6] == 0xec) {
223 strncpy(token_type, "XAM", sizeof(token_type));
224 fl = 1;
225 stamp_len = 0x0c - (data[5] >> 4);
226 } else {
227 switch (data[5] & 0x7f) {
228 case 0x00 ... 0x2f:
229 strncpy(token_type, "IAM", sizeof(token_type));
230 fl = (0x2f - (data[5] & 0x7f)) + 1;
231 break;
232 case 0x30 ... 0x6f:
233 strncpy(token_type, "SAM", sizeof(token_type));
234 fl = (0x6f - (data[5] & 0x7f)) + 1;
235 break;
236 case 0x70 ... 0x7f:
237 strncpy(token_type, "GAM", sizeof(token_type));
238 fl = (0x7f - (data[5] & 0x7f)) + 1;
239 break;
240 }
241
242 stamp_len = 0xfc - data[6];
243 }
244
245 PrintAndLog("DCF: %d (%02x %02x), Token Type=%s (OLE=%01u), OL=%02u, FL=%02u",
246 dcf,
247 data[5],
248 data[6],
249 token_type,
250 (data[5] & 0x80 )>> 7,
251 stamp_len,
252 fl
253 );
254
255 } else { // Is IM(-S) type of card...
256
257 if(data[7] == 0x9F && data[8] == 0xFF) {
258 bIsSegmented = 1;
259 strncpy(token_type, "IM-S", sizeof(token_type));
260 } else {
261 strncpy(token_type, "IM", sizeof(token_type));
262 }
263
264 PrintAndLog("DCF: %d (%02x %02x), Token Type=%s (OLE=%01u)",
265 dcf,
266 data[5],
267 data[6],
268 token_type,
269 (data[5]&0x80) >> 7
270 );
271 }
272
273 // Makes no sence to show this on blank media...
274 if(dcf != 0xFFFF) {
275
276 if(bIsSegmented) {
277 PrintAndLog("WRP=%02u, WRC=%01u, RD=%01u, SSC=%02x",
278 data[7] & 0x0f,
279 (data[7] & 0x70) >> 4,
280 (data[7] & 0x80) >> 7,
281 data[8]
282 );
283 }
284
285 // Header area is only available on IM-S cards, on master tokens this data is the master token data itself
286 if(bIsSegmented || dcf > 60000) {
287 if(dcf > 60000) {
288 PrintAndLog("Master token data");
289 PrintAndLog("%s", sprint_hex(data+8, 14));
290 } else {
291 PrintAndLog("Remaining Header Area");
292 PrintAndLog("%s", sprint_hex(data+9, 13));
293 }
294 }
295 }
296
297 uint8_t segCrcBytes[8] = {0,0,0,0,0,0,0,0};
298 uint32_t segCalcCRC = 0;
299 uint32_t segCRC = 0;
300
301 // Data card?
302 if(dcf <= 60000) {
303
304 PrintAndLog("\nADF: User Area");
305 PrintAndLog("------------------------------------------------------");
306
307 if(bIsSegmented) {
308
309 // Data start point on segmented cards
310 i = 22;
311
312 // decode segments
313 for (segmentNum=1; segmentNum < 128; segmentNum++ )
314 {
315 segment_len = ((data[i+1] ^ crc) & 0x0f) * 256 + (data[i] ^ crc);
316 segment_flag = ((data[i+1] ^ crc) & 0xf0) >> 4;
317 wrp = (data[i+2] ^ crc);
318 wrc = ((data[i+3] ^ crc) & 0x70) >> 4;
319
320 bool hasWRC = (wrc > 0);
321 bool hasWRP = (wrp > wrc);
322 int wrp_len = (wrp - wrc);
323 int remain_seg_payload_len = (segment_len - wrp - 5);
324
325 // validate segment-crc
326 segCrcBytes[0]=data[0]; //uid0
327 segCrcBytes[1]=data[1]; //uid1
328 segCrcBytes[2]=data[2]; //uid2
329 segCrcBytes[3]=data[3]; //uid3
330 segCrcBytes[4]=(data[i] ^ crc); //hdr0
331 segCrcBytes[5]=(data[i+1] ^ crc); //hdr1
332 segCrcBytes[6]=(data[i+2] ^ crc); //hdr2
333 segCrcBytes[7]=(data[i+3] ^ crc); //hdr3
334
335 segCalcCRC = CRC8Legic(segCrcBytes, 8);
336 segCRC = data[i+4] ^ crc;
337
338 PrintAndLog("Segment %02u \nraw header | 0x%02X 0x%02X 0x%02X 0x%02X \nSegment len: %u, Flag: 0x%X (valid:%01u, last:%01u), WRP: %02u, WRC: %02u, RD: %01u, CRC: 0x%02X (%s)",
339 segmentNum,
340 data[i] ^ crc,
341 data[i+1] ^ crc,
342 data[i+2] ^ crc,
343 data[i+3] ^ crc,
344 segment_len,
345 segment_flag,
346 (segment_flag & 0x4) >> 2,
347 (segment_flag & 0x8) >> 3,
348 wrp,
349 wrc,
350 ((data[i+3]^crc) & 0x80) >> 7,
351 segCRC,
352 ( segCRC == segCalcCRC ) ? "OK" : "fail"
353 );
354
355 i += 5;
356
357 if ( hasWRC ) {
358 PrintAndLog("WRC protected area: (I %d | K %d| WRC %d)", i, k, wrc);
359 PrintAndLog("\nrow | data");
360 PrintAndLog("-----+------------------------------------------------");
361
362 for ( k=i; k < (i + wrc); ++k)
363 data[k] ^= crc;
364
365 print_hex_break( data+i, wrc, 16);
366
367 i += wrc;
368 }
369
370 if ( hasWRP ) {
371 PrintAndLog("Remaining write protected area: (I %d | K %d | WRC %d | WRP %d WRP_LEN %d)",i, k, wrc, wrp, wrp_len);
372 PrintAndLog("\nrow | data");
373 PrintAndLog("-----+------------------------------------------------");
374
375 for (k=i; k < (i+wrp_len); ++k)
376 data[k] ^= crc;
377
378 print_hex_break( data+i, wrp_len, 16);
379
380 i += wrp_len;
381
382 // does this one work? (Answer: Only if KGH/BGH is used with BCD encoded card number! So maybe this will show just garbage...)
383 if( wrp_len == 8 )
384 PrintAndLog("Card ID: %2X%02X%02X", data[i-4]^crc, data[i-3]^crc, data[i-2]^crc);
385 }
386
387 PrintAndLog("Remaining segment payload: (I %d | K %d | Remain LEN %d)", i, k, remain_seg_payload_len);
388 PrintAndLog("\nrow | data");
389 PrintAndLog("-----+------------------------------------------------");
390
391 for ( k=i; k < (i+remain_seg_payload_len); ++k)
392 data[k] ^= crc;
393
394 print_hex_break( data+i, remain_seg_payload_len, 16);
395
396 i += remain_seg_payload_len;
397
398 PrintAndLog("-----+------------------------------------------------\n");
399
400 // end with last segment
401 if (segment_flag & 0x8) return 0;
402
403 } // end for loop
404
405 } else {
406
407 // Data start point on unsegmented cards
408 i = 8;
409
410 wrp = data[7] & 0x0F;
411 wrc = (data[7] & 0x70) >> 4;
412
413 bool hasWRC = (wrc > 0);
414 bool hasWRP = (wrp > wrc);
415 int wrp_len = (wrp - wrc);
416 int remain_seg_payload_len = (1024 - 22 - wrp); // Any chance to get physical card size here!?
417
418 PrintAndLog("Unsegmented card - WRP: %02u, WRC: %02u, RD: %01u",
419 wrp,
420 wrc,
421 (data[7] & 0x80) >> 7
422 );
423
424 if ( hasWRC ) {
425 PrintAndLog("WRC protected area: (I %d | WRC %d)", i, wrc);
426 PrintAndLog("\nrow | data");
427 PrintAndLog("-----+------------------------------------------------");
428 print_hex_break( data+i, wrc, 16);
429 i += wrc;
430 }
431
432 if ( hasWRP ) {
433 PrintAndLog("Remaining write protected area: (I %d | WRC %d | WRP %d | WRP_LEN %d)", i, wrc, wrp, wrp_len);
434 PrintAndLog("\nrow | data");
435 PrintAndLog("-----+------------------------------------------------");
436 print_hex_break( data + i, wrp_len, 16);
437 i += wrp_len;
438
439 // does this one work? (Answer: Only if KGH/BGH is used with BCD encoded card number! So maybe this will show just garbage...)
440 if( wrp_len == 8 )
441 PrintAndLog("Card ID: %2X%02X%02X", data[i-4], data[i-3], data[i-2]);
442 }
443
444 PrintAndLog("Remaining segment payload: (I %d | Remain LEN %d)", i, remain_seg_payload_len);
445 PrintAndLog("\nrow | data");
446 PrintAndLog("-----+------------------------------------------------");
447 print_hex_break( data + i, remain_seg_payload_len, 16);
448 i += remain_seg_payload_len;
449
450 PrintAndLog("-----+------------------------------------------------\n");
451 }
452 }
453 return 0;
454 }
455
456 // params:
457 // offset in data memory
458 // number of bytes to read
459 int CmdLegicRdmem(const char *Cmd) {
460
461 char cmdp = param_getchar(Cmd, 0);
462 if ( cmdp == 'H' || cmdp == 'h' ) return usage_legic_rdmem();
463
464 uint32_t offset = 0, len = 0, IV = 1;
465 sscanf(Cmd, "%x %x %x", &offset, &len, &IV);
466
467 // tagtype
468 legic_card_select_t card;
469 if (legic_get_type(&card)) {
470 PrintAndLog("Failed to identify tagtype");
471 return 1;
472 }
473
474 legic_print_type(card.cardsize, 0);
475
476 // OUT-OF-BOUNDS check
477 // UID 4 bytes can't be written to.
478 if ( len + offset >= card.cardsize ) {
479 len = card.cardsize - offset;
480 PrintAndLog("Out-of-bounds, Cardsize = %d, Trunc offset+len = %d", card.cardsize, len + offset);
481 }
482
483 legic_chk_iv(&IV);
484
485 UsbCommand c = {CMD_READER_LEGIC_RF, {offset, len, IV}};
486 clearCommandBuffer();
487 SendCommand(&c);
488 UsbCommand resp;
489 if ( !WaitForResponseTimeout(CMD_ACK, &resp, 3000) ) {
490 PrintAndLog("command execution time out");
491 return 1;
492 }
493
494 uint8_t isOK = resp.arg[0] & 0xFF;
495 uint16_t readlen = resp.arg[1];
496 if ( !isOK ) {
497 PrintAndLog("failed reading tag");
498 return 2;
499 }
500
501 uint8_t *data = malloc(readlen);
502 if ( !data ){
503 PrintAndLog("Cannot allocate memory");
504 return 2;
505 }
506
507 if ( readlen != len )
508 PrintAndLog("Fail, only managed to read 0x%02X bytes", readlen);
509
510 // copy data from device
511 GetEMLFromBigBuf(data, readlen, 0);
512 if ( !WaitForResponseTimeout(CMD_ACK, NULL, 2500)){
513 PrintAndLog("Command execute timeout");
514 free(data);
515 return 1;
516 }
517
518 PrintAndLog("\n ## | 0 1 2 3 4 5 6 7 8 9 A B C D E F 10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F");
519 PrintAndLog("-----+------------------------------------------------------------------------------------------------");
520 print_hex_break( data, readlen, 32);
521 free(data);
522 return 0;
523 }
524
525 // should say which tagtype
526 // should load a tag to device mem.
527 // int phase, int frame, int reqresp
528 int CmdLegicRfSim(const char *Cmd) {
529 UsbCommand c = {CMD_SIMULATE_TAG_LEGIC_RF, {6,3,0}};
530 sscanf(Cmd, " %"lli" %"lli" %"lli, &c.arg[0], &c.arg[1], &c.arg[2]);
531 clearCommandBuffer();
532 SendCommand(&c);
533 return 0;
534 }
535
536 int CmdLegicRfWrite(const char *Cmd) {
537
538 uint8_t *data = NULL;
539 uint8_t cmdp = 0;
540 bool errors = false;
541 int len = 0, bg, en;
542 uint32_t offset = 0, IV = 0x55;
543
544 while(param_getchar(Cmd, cmdp) != 0x00) {
545 switch(param_getchar(Cmd, cmdp)) {
546 case 'd':
547 case 'D':
548 // peek at length of the input string so we can
549 // figure out how many elements to malloc in "data"
550 bg=en=0;
551 if (param_getptr(Cmd, &bg, &en, cmdp+1)) {
552 errors = true;
553 break;
554 }
555 len = (en - bg + 1);
556
557 // check that user entered even number of characters
558 // for hex data string
559 if (len & 1) {
560 errors = true;
561 break;
562 }
563
564 // limit number of bytes to write. This is not a 'restore' command.
565 if ( (len>>1) > 100 ){
566 PrintAndLog("Max bound on 100bytes to write a one time.");
567 PrintAndLog("Use the 'hf legic restore' command if you want to write the whole tag at once");
568 errors = true;
569 }
570
571 // it's possible for user to accidentally enter "b" parameter
572 // more than once - we have to clean previous malloc
573 if (data)
574 free(data);
575
576 data = malloc(len >> 1);
577 if ( data == NULL ) {
578 PrintAndLog("Can't allocate memory. exiting");
579 errors = true;
580 break;
581 }
582
583 if (param_gethex(Cmd, cmdp+1, data, len)) {
584 errors = true;
585 break;
586 }
587
588 len >>= 1;
589 cmdp += 2;
590 break;
591 case 'o':
592 case 'O':
593 offset = param_get32ex(Cmd, cmdp+1, 4, 16);
594 cmdp += 2;
595 break;
596 case 'h':
597 case 'H':
598 errors = true;
599 break;
600 default:
601 PrintAndLog("Unknown parameter '%c'", param_getchar(Cmd, cmdp));
602 errors = true;
603 break;
604 }
605 if (errors) break;
606 }
607 //Validations
608 if (errors){
609 if (data)
610 free(data);
611 return usage_legic_write();
612 }
613
614 // tagtype
615 legic_card_select_t card;
616 if (legic_get_type(&card)) {
617 PrintAndLog("Failed to identify tagtype");
618 return -1;
619 }
620
621 legic_print_type(card.cardsize, 0);
622
623 // OUT-OF-BOUNDS checks
624 // UID 4+1 bytes can't be written to.
625 if ( offset < 5 ) {
626 PrintAndLog("Out-of-bounds, bytes 0-1-2-3-4 can't be written to. Offset = %d", offset);
627 return -2;
628 }
629
630 if ( len + offset >= card.cardsize ) {
631 PrintAndLog("Out-of-bounds, Cardsize = %d, [offset+len = %d ]", card.cardsize, len + offset);
632 return -2;
633 }
634
635 if (offset == 5 || offset == 6) {
636 PrintAndLog("############# DANGER ################");
637 PrintAndLog("# changing the DCF is irreversible #");
638 PrintAndLog("#####################################");
639 PrintAndLog("do you really want to continue? y(es) n(o)");
640 char answer;
641 sscanf(" %c", &answer);
642 bool exit = !(answer == 'n' || answer == 'N');
643 if (exit)
644 return 0;
645 printf("ICE DCF: %c answer, %d\n", answer, exit);
646 return 0;
647 }
648
649 legic_chk_iv(&IV);
650
651 PrintAndLog("Writing to tag");
652
653 UsbCommand c = {CMD_WRITER_LEGIC_RF, {offset, len, IV}};
654 memcpy(c.d.asBytes, data, len);
655 UsbCommand resp;
656 clearCommandBuffer();
657 SendCommand(&c);
658
659 if (!WaitForResponseTimeout(CMD_ACK, &resp, 2000)) {
660 PrintAndLog("command execution time out");
661 return 1;
662 }
663 uint8_t isOK = resp.arg[0] & 0xFF;
664 if ( !isOK ) {
665 PrintAndLog("failed writing tag");
666 return 1;
667 }
668
669 return 0;
670 }
671
672 int CmdLegicCalcCrc(const char *Cmd){
673
674 uint8_t *data = NULL;
675 uint8_t cmdp = 0, uidcrc = 0, type=0;
676 bool errors = false;
677 int len = 0;
678 int bg, en;
679
680 while(param_getchar(Cmd, cmdp) != 0x00) {
681 switch(param_getchar(Cmd, cmdp)) {
682 case 'b':
683 case 'B':
684 // peek at length of the input string so we can
685 // figure out how many elements to malloc in "data"
686 bg=en=0;
687 if (param_getptr(Cmd, &bg, &en, cmdp+1)) {
688 errors = true;
689 break;
690 }
691 len = (en - bg + 1);
692
693 // check that user entered even number of characters
694 // for hex data string
695 if (len & 1) {
696 errors = true;
697 break;
698 }
699
700 // it's possible for user to accidentally enter "b" parameter
701 // more than once - we have to clean previous malloc
702 if (data) free(data);
703 data = malloc(len >> 1);
704 if ( data == NULL ) {
705 PrintAndLog("Can't allocate memory. exiting");
706 errors = true;
707 break;
708 }
709
710 if (param_gethex(Cmd, cmdp+1, data, len)) {
711 errors = true;
712 break;
713 }
714
715 len >>= 1;
716 cmdp += 2;
717 break;
718 case 'u':
719 case 'U':
720 uidcrc = param_get8ex(Cmd, cmdp+1, 0, 16);
721 cmdp += 2;
722 break;
723 case 'c':
724 case 'C':
725 type = param_get8ex(Cmd, cmdp+1, 0, 10);
726 cmdp += 2;
727 break;
728 case 'h':
729 case 'H':
730 errors = true;
731 break;
732 default:
733 PrintAndLog("Unknown parameter '%c'", param_getchar(Cmd, cmdp));
734 errors = true;
735 break;
736 }
737 if (errors) break;
738 }
739 //Validations
740 if (errors){
741 if (data) free(data);
742 return usage_legic_calccrc();
743 }
744
745 switch (type){
746 case 16:
747 PrintAndLog("Legic crc16: %X", CRC16Legic(data, len, uidcrc));
748 break;
749 default:
750 PrintAndLog("Legic crc8: %X", CRC8Legic(data, len) );
751 break;
752 }
753
754 if (data) free(data);
755 return 0;
756 }
757
758 int legic_print_type(uint32_t tagtype, uint8_t spaces){
759 char spc[11] = " ";
760 spc[10]=0x00;
761 char *spacer = spc + (10-spaces);
762
763 if ( tagtype == 22 )
764 PrintAndLog("%sTYPE : MIM%d card (outdated)", spacer, tagtype);
765 else if ( tagtype == 256 )
766 PrintAndLog("%sTYPE : MIM%d card (234 bytes)", spacer, tagtype);
767 else if ( tagtype == 1024 )
768 PrintAndLog("%sTYPE : MIM%d card (1002 bytes)", spacer, tagtype);
769 else
770 PrintAndLog("%sTYPE : Unknown %06x", spacer, tagtype);
771 return 0;
772 }
773 int legic_get_type(legic_card_select_t *card){
774
775 if ( card == NULL ) return 1;
776
777 UsbCommand c = {CMD_LEGIC_INFO, {0,0,0}};
778 clearCommandBuffer();
779 SendCommand(&c);
780 UsbCommand resp;
781 if (!WaitForResponseTimeout(CMD_ACK, &resp, 500))
782 return 2;
783
784 uint8_t isOK = resp.arg[0] & 0xFF;
785 if ( !isOK )
786 return 3;
787
788 memcpy(card, (legic_card_select_t *)resp.d.asBytes, sizeof(legic_card_select_t));
789 return 0;
790 }
791 void legic_chk_iv(uint32_t *iv){
792 if ( (*iv & 0x7F) != *iv ){
793 *iv &= 0x7F;
794 PrintAndLog("Truncating IV to 7bits, %u", *iv);
795 }
796 // IV must be odd
797 if ( (*iv & 1) == 0 ){
798 *iv |= 0x01;
799 PrintAndLog("LSB of IV must be SET %u", *iv);
800 }
801 }
802 void legic_seteml(uint8_t *src, uint32_t offset, uint32_t numofbytes) {
803 size_t len = 0;
804 UsbCommand c = {CMD_LEGIC_ESET, {0, 0, 0}};
805 for(size_t i = 0; i < numofbytes; i += USB_CMD_DATA_SIZE) {
806
807 len = MIN((numofbytes - i), USB_CMD_DATA_SIZE);
808 c.arg[0] = i; // offset
809 c.arg[1] = len; // number of bytes
810 memcpy(c.d.asBytes, src+i, len);
811 clearCommandBuffer();
812 SendCommand(&c);
813 }
814 }
815
816 int HFLegicReader(const char *Cmd, bool verbose) {
817
818 char cmdp = param_getchar(Cmd, 0);
819 if ( cmdp == 'H' || cmdp == 'h' ) return usage_legic_reader();
820
821 legic_card_select_t card;
822 switch(legic_get_type(&card)){
823 case 1:
824 if ( verbose ) PrintAndLog("command execution time out");
825 return 1;
826 case 2:
827 case 3:
828 if ( verbose ) PrintAndLog("legic card select failed");
829 return 2;
830 default: break;
831 }
832 PrintAndLog(" UID : %s", sprint_hex(card.uid, sizeof(card.uid)));
833 legic_print_type(card.cardsize, 0);
834 return 0;
835 }
836 int CmdLegicReader(const char *Cmd){
837 return HFLegicReader(Cmd, TRUE);
838 }
839
840 int CmdLegicDump(const char *Cmd){
841
842 FILE *f;
843 char filename[FILE_PATH_SIZE] = {0x00};
844 char *fnameptr = filename;
845 size_t fileNlen = 0;
846 bool errors = false;
847 uint16_t dumplen;
848 uint8_t cmdp = 0;
849
850 memset(filename, 0, sizeof(filename));
851
852 while(param_getchar(Cmd, cmdp) != 0x00) {
853 switch(param_getchar(Cmd, cmdp)) {
854 case 'h':
855 case 'H':
856 return usage_legic_dump();
857 case 'o':
858 case 'O':
859 fileNlen = param_getstr(Cmd, cmdp+1, filename);
860 if (!fileNlen)
861 errors = true;
862 if (fileNlen > FILE_PATH_SIZE-5)
863 fileNlen = FILE_PATH_SIZE-5;
864 cmdp += 2;
865 break;
866 default:
867 PrintAndLog("Unknown parameter '%c'", param_getchar(Cmd, cmdp));
868 errors = true;
869 break;
870 }
871 if(errors) break;
872 }
873
874 //Validations
875 if(errors) return usage_legic_dump();
876
877 // tagtype
878 legic_card_select_t card;
879 if (legic_get_type(&card)) {
880 PrintAndLog("Failed to identify tagtype");
881 return -1;
882 }
883 dumplen = card.cardsize;
884
885 legic_print_type(dumplen, 0);
886 PrintAndLog("Reading tag memory...");
887
888 UsbCommand c = {CMD_READER_LEGIC_RF, {0x00, dumplen, 0x55}};
889 clearCommandBuffer();
890 SendCommand(&c);
891 UsbCommand resp;
892 if (!WaitForResponseTimeout(CMD_ACK, &resp, 3000)) {
893 PrintAndLog("Command execute time-out");
894 return 1;
895 }
896
897 uint8_t isOK = resp.arg[0] & 0xFF;
898 if ( !isOK ) {
899 PrintAndLog("Failed dumping tag data");
900 return 2;
901 }
902
903 uint16_t readlen = resp.arg[1];
904 uint8_t *data = malloc(readlen);
905 if (!data) {
906 PrintAndLog("Fail, cannot allocate memory");
907 return 3;
908 }
909 memset(data, 0, readlen);
910
911 if ( readlen != dumplen )
912 PrintAndLog("Fail, only managed to read 0x%02X bytes of 0x%02X", readlen, dumplen);
913
914 // copy data from device
915 GetEMLFromBigBuf(data, readlen, 0);
916 if ( !WaitForResponseTimeout(CMD_ACK, NULL, 2500)) {
917 PrintAndLog("Fail, transfer from device time-out");
918 free(data);
919 return 4;
920 }
921
922 // user supplied filename?
923 if (fileNlen < 1)
924 sprintf(fnameptr,"%02X%02X%02X%02X.bin", data[0], data[1], data[2], data[3]);
925 else
926 sprintf(fnameptr + fileNlen,".bin");
927
928 if ((f = fopen(filename,"wb")) == NULL) {
929 PrintAndLog("Could not create file name %s", filename);
930 if (data)
931 free(data);
932 return 5;
933 }
934 fwrite(data, 1, readlen, f);
935 fclose(f);
936 free(data);
937 PrintAndLog("Wrote %d bytes to %s", readlen, filename);
938 return 0;
939 }
940
941 int CmdLegicRestore(const char *Cmd){
942
943 FILE *f;
944 char filename[FILE_PATH_SIZE] = {0x00};
945 char *fnameptr = filename;
946 size_t fileNlen = 0;
947 bool errors = true;
948 uint16_t numofbytes;
949 uint8_t cmdp = 0;
950
951 memset(filename, 0, sizeof(filename));
952
953 while(param_getchar(Cmd, cmdp) != 0x00) {
954 switch(param_getchar(Cmd, cmdp)) {
955 case 'h':
956 case 'H':
957 errors = true;
958 break;
959 case 'i':
960 case 'I':
961 fileNlen = param_getstr(Cmd, cmdp+1, filename);
962 if (!fileNlen)
963 errors = true;
964 else
965 errors = false;
966
967 if (fileNlen > FILE_PATH_SIZE-5)
968 fileNlen = FILE_PATH_SIZE-5;
969 cmdp += 2;
970 break;
971 default:
972 PrintAndLog("Unknown parameter '%c'", param_getchar(Cmd, cmdp));
973 errors = true;
974 break;
975 }
976 if (errors) break;
977 }
978
979 //Validations
980 if(errors) return usage_legic_restore();
981
982 // tagtype
983 legic_card_select_t card;
984 if (legic_get_type(&card)) {
985 PrintAndLog("Failed to identify tagtype");
986 return 1;
987 }
988 numofbytes = card.cardsize;
989
990 // set up buffer
991 uint8_t *data = malloc(numofbytes);
992 if (!data) {
993 PrintAndLog("Fail, cannot allocate memory");
994 return 2;
995 }
996 memset(data, 0, numofbytes);
997
998 legic_print_type(numofbytes, 0);
999
1000 // set up file
1001 fnameptr += fileNlen;
1002 sprintf(fnameptr, ".bin");
1003
1004 if ((f = fopen(filename,"rb")) == NULL) {
1005 PrintAndLog("File %s not found or locked", filename);
1006 return 3;
1007 }
1008
1009 // verify size of dumpfile is the same as card.
1010 fseek(f, 0, SEEK_END); // seek to end of file
1011 size_t filesize = ftell(f); // get current file pointer
1012 fseek(f, 0, SEEK_SET); // seek back to beginning of file
1013
1014 if ( filesize != numofbytes) {
1015 PrintAndLog("Fail, filesize and cardsize is not equal. [%u != %u]", filesize, numofbytes);
1016 free(data);
1017 fclose(f);
1018 return 4;
1019 }
1020
1021 // load file
1022 size_t bytes_read = fread(data, 1, numofbytes, f);
1023 if ( bytes_read == 0){
1024 PrintAndLog("File reading error");
1025 free(data);
1026 fclose(f);
1027 return 2;
1028 }
1029 fclose(f);
1030
1031 PrintAndLog("Restoring to card");
1032
1033 // transfer to device
1034 size_t len = 0;
1035 UsbCommand c = {CMD_WRITER_LEGIC_RF, {0, 0, 0x55}};
1036 UsbCommand resp;
1037 for(size_t i = 7; i < numofbytes; i += USB_CMD_DATA_SIZE) {
1038
1039 len = MIN((numofbytes - i), USB_CMD_DATA_SIZE);
1040 c.arg[0] = i; // offset
1041 c.arg[1] = len; // number of bytes
1042 memcpy(c.d.asBytes, data+i, len);
1043 clearCommandBuffer();
1044 SendCommand(&c);
1045
1046 if (!WaitForResponseTimeout(CMD_ACK, &resp, 4000)) {
1047 PrintAndLog("command execution time out");
1048 free(data);
1049 return 1;
1050 }
1051 uint8_t isOK = resp.arg[0] & 0xFF;
1052 if ( !isOK ) {
1053 PrintAndLog("failed writing tag [msg = %u]", resp.arg[1] & 0xFF);
1054 free(data);
1055 return 1;
1056 }
1057 PrintAndLog("Wrote chunk [offset %d | len %d | total %d", i, len, i+len);
1058 }
1059
1060 free(data);
1061 PrintAndLog("\nWrote %d bytes to card from file %s", numofbytes, filename);
1062 return 0;
1063 }
1064
1065 int CmdLegicELoad(const char *Cmd) {
1066 FILE * f;
1067 char filename[FILE_PATH_SIZE];
1068 char *fnameptr = filename;
1069 int len, numofbytes;
1070 int nameParamNo = 1;
1071
1072 char cmdp = param_getchar(Cmd, 0);
1073 if ( cmdp == 'h' || cmdp == 'H' || cmdp == 0x00)
1074 return usage_legic_eload();
1075
1076 switch (cmdp) {
1077 case '0' : numofbytes = 22; break;
1078 case '1' :
1079 case '\0': numofbytes = 256; break;
1080 case '2' : numofbytes = 1024; break;
1081 default : numofbytes = 256; nameParamNo = 0;break;
1082 }
1083
1084 // set up buffer
1085 uint8_t *data = malloc(numofbytes);
1086 if (!data) {
1087 PrintAndLog("Fail, cannot allocate memory");
1088 return 3;
1089 }
1090 memset(data, 0, numofbytes);
1091
1092 // set up file
1093 len = param_getstr(Cmd, nameParamNo, filename);
1094 if (len > FILE_PATH_SIZE - 5)
1095 len = FILE_PATH_SIZE - 5;
1096 fnameptr += len;
1097 sprintf(fnameptr, ".bin");
1098
1099 // open file
1100 if ((f = fopen(filename,"rb")) == NULL) {
1101 PrintAndLog("File %s not found or locked", filename);
1102 free(data);
1103 return 1;
1104 }
1105
1106 // load file
1107 size_t bytes_read = fread(data, 1, numofbytes, f);
1108 if ( bytes_read == 0){
1109 PrintAndLog("File reading error");
1110 free(data);
1111 fclose(f);
1112 return 2;
1113 }
1114 fclose(f);
1115
1116 // transfer to device
1117 legic_seteml(data, 0, numofbytes);
1118
1119 free(data);
1120 PrintAndLog("\nLoaded %d bytes from file: %s to emulator memory", numofbytes, filename);
1121 return 0;
1122 }
1123
1124 int CmdLegicESave(const char *Cmd) {
1125 FILE *f;
1126 char filename[FILE_PATH_SIZE];
1127 char *fnameptr = filename;
1128 int fileNlen, numofbytes, nameParamNo = 1;
1129
1130 memset(filename, 0, sizeof(filename));
1131
1132 char cmdp = param_getchar(Cmd, 0);
1133
1134 if ( cmdp == 'h' || cmdp == 'H' || cmdp == 0x00)
1135 return usage_legic_esave();
1136
1137 switch (cmdp) {
1138 case '0' : numofbytes = 22; break;
1139 case '1' :
1140 case '\0': numofbytes = 256; break;
1141 case '2' : numofbytes = 1024; break;
1142 default : numofbytes = 256; nameParamNo = 0; break;
1143 }
1144
1145 fileNlen = param_getstr(Cmd, nameParamNo, filename);
1146
1147 if (fileNlen > FILE_PATH_SIZE - 5)
1148 fileNlen = FILE_PATH_SIZE - 5;
1149
1150 // set up buffer
1151 uint8_t *data = malloc(numofbytes);
1152 if (!data) {
1153 PrintAndLog("Fail, cannot allocate memory");
1154 return 3;
1155 }
1156 memset(data, 0, numofbytes);
1157
1158 // download emulator memory
1159 PrintAndLog("Reading emulator memory...");
1160 GetEMLFromBigBuf(data, numofbytes, 0);
1161 if ( !WaitForResponseTimeout(CMD_ACK, NULL, 2500)) {
1162 PrintAndLog("Fail, transfer from device time-out");
1163 free(data);
1164 return 4;
1165 }
1166
1167 // user supplied filename?
1168 if (fileNlen < 1)
1169 sprintf(fnameptr,"%02X%02X%02X%02X.bin", data[0], data[1], data[2], data[3]);
1170 else
1171 sprintf(fnameptr + fileNlen,".bin");
1172
1173 // open file
1174 if ((f = fopen(filename,"wb")) == NULL) {
1175 PrintAndLog("Could not create file name %s", filename);
1176 free(data);
1177 return 1;
1178 }
1179 fwrite(data, 1, numofbytes, f);
1180 fclose(f);
1181 free(data);
1182 PrintAndLog("\nSaved %d bytes from emulator memory to file: %s", numofbytes, filename);
1183 return 0;
1184 }
1185
1186 int CmdLegicWipe(const char *Cmd){
1187
1188 char cmdp = param_getchar(Cmd, 0);
1189
1190 if ( cmdp == 'h' || cmdp == 'H') return usage_legic_wipe();
1191
1192 // tagtype
1193 legic_card_select_t card;
1194 if (legic_get_type(&card)) {
1195 PrintAndLog("Failed to identify tagtype");
1196 return 1;
1197 }
1198
1199 // set up buffer
1200 uint8_t *data = malloc(card.cardsize);
1201 if (!data) {
1202 PrintAndLog("Fail, cannot allocate memory");
1203 return 2;
1204 }
1205 memset(data, 0, card.cardsize);
1206
1207 legic_print_type(card.cardsize, 0);
1208
1209 printf("Erasing");
1210
1211 // transfer to device
1212 size_t len = 0;
1213 UsbCommand c = {CMD_WRITER_LEGIC_RF, {0, 0, 0x55}};
1214 UsbCommand resp;
1215 for(size_t i = 7; i < card.cardsize; i += USB_CMD_DATA_SIZE) {
1216
1217 printf(".");
1218 len = MIN((card.cardsize - i), USB_CMD_DATA_SIZE);
1219 c.arg[0] = i; // offset
1220 c.arg[1] = len; // number of bytes
1221 memcpy(c.d.asBytes, data+i, len);
1222 clearCommandBuffer();
1223 SendCommand(&c);
1224
1225 if (!WaitForResponseTimeout(CMD_ACK, &resp, 4000)) {
1226 PrintAndLog("command execution time out");
1227 free(data);
1228 return 3;
1229 }
1230 uint8_t isOK = resp.arg[0] & 0xFF;
1231 if ( !isOK ) {
1232 PrintAndLog("failed writing tag [msg = %u]", resp.arg[1] & 0xFF);
1233 free(data);
1234 return 4;
1235 }
1236 }
1237 printf("ok\n");
1238 return 0;
1239 }
1240
1241 int CmdLegicList(const char *Cmd) {
1242 CmdHFList("legic");
1243 return 0;
1244 }
1245
1246 static command_t CommandTable[] = {
1247 {"help", CmdHelp, 1, "This help"},
1248 {"reader", CmdLegicReader, 1, "LEGIC Prime Reader UID and tag info"},
1249 {"info", CmdLegicInfo, 0, "Display deobfuscated and decoded LEGIC Prime tag data"},
1250 {"dump", CmdLegicDump, 0, "Dump LEGIC Prime tag to binary file"},
1251 {"restore", CmdLegicRestore, 0, "Restore a dump onto a LEGIC Prime tag"},
1252 {"rdmem", CmdLegicRdmem, 0, "Read bytes from a LEGIC Prime tag"},
1253 {"sim", CmdLegicRfSim, 0, "Start tag simulator"},
1254 {"write", CmdLegicRfWrite, 0, "Write data to a LEGIC Prime tag"},
1255 {"crc", CmdLegicCalcCrc, 1, "Calculate Legic CRC over given bytes"},
1256 {"eload", CmdLegicELoad, 1, "Load binary dump to emulator memory"},
1257 {"esave", CmdLegicESave, 1, "Save emulator memory to binary file"},
1258 {"list", CmdLegicList, 1, "[Deprecated] List LEGIC history"},
1259 {"wipe", CmdLegicWipe, 1, "Wipe a LEGIC Prime tag"},
1260 {NULL, NULL, 0, NULL}
1261 };
1262
1263 int CmdHFLegic(const char *Cmd) {
1264 clearCommandBuffer();
1265 CmdsParse(CommandTable, Cmd);
1266 return 0;
1267 }
1268
1269 int CmdHelp(const char *Cmd) {
1270 CmdsHelp(CommandTable);
1271 return 0;
1272 }
Impressum, Datenschutz