1 //-----------------------------------------------------------------------------
3 // This code is licensed to you under the terms of the GNU GPL, version 2 or,
4 // at your option, any later version. See the LICENSE.txt file for the text of
6 //-----------------------------------------------------------------------------
7 // Low frequency T55xx commands
8 //-----------------------------------------------------------------------------
14 #include "proxmark3.h"
18 #include "cmdparser.h"
21 #include "cmdlft55xx.h"
25 #include "../common/crc.h"
26 #include "../common/iso14443crc.h"
29 #define CONFIGURATION_BLOCK 0x00
30 #define TRACE_BLOCK 0x01
32 // Default configuration
33 t55xx_conf_block_t config
= { .modulation
= DEMOD_ASK
, .inverted
= FALSE
, .offset
= 0x00, .block0
= 0x00};
35 int usage_t55xx_config(){
36 PrintAndLog("Usage: lf t55xx config [d <demodulation>] [i 1] [o <offset>]");
37 PrintAndLog("Options: ");
38 PrintAndLog(" h This help");
39 PrintAndLog(" b <8|16|32|40|50|64|100|128> Set bitrate");
40 PrintAndLog(" d <FSK|FSK1|FSK1a|FSK2|FSK2a|ASK|PSK1|PSK2|NZ|BI|BIa> Set demodulation FSK / ASK / PSK / NZ / Biphase / Biphase A");
41 PrintAndLog(" i [1] Invert data signal, defaults to normal");
42 PrintAndLog(" o [offset] Set offset, where data should start decode in bitstream");
44 PrintAndLog("Examples:");
45 PrintAndLog(" lf t55xx config d FSK - FSK demodulation");
46 PrintAndLog(" lf t55xx config d FSK i 1 - FSK demodulation, inverse data");
47 PrintAndLog(" lf t55xx config d FSK i 1 o 3 - FSK demodulation, inverse data, offset=3,start from position 3 to decode data");
51 int usage_t55xx_read(){
52 PrintAndLog("Usage: lf t55xx read <block> <password>");
53 PrintAndLog(" <block>, block number to read. Between 0-7");
54 PrintAndLog(" <password>, OPTIONAL password (8 hex characters)");
56 PrintAndLog("Examples:");
57 PrintAndLog(" lf t55xx read 0 - read data from block 0");
58 PrintAndLog(" lf t55xx read 0 feedbeef - read data from block 0 password feedbeef");
62 int usage_t55xx_write(){
63 PrintAndLog("Usage: lf t55xx wr <block> <data> [password]");
64 PrintAndLog(" <block>, block number to read. Between 0-7");
65 PrintAndLog(" <data>, 4 bytes of data to write (8 hex characters)");
66 PrintAndLog(" [password], OPTIONAL password 4bytes (8 hex characters)");
68 PrintAndLog("Examples:");
69 PrintAndLog(" lf t55xx wd 3 11223344 - write 11223344 to block 3");
70 PrintAndLog(" lf t55xx wd 3 11223344 feedbeef - write 11223344 to block 3 password feedbeef");
74 int usage_t55xx_trace() {
75 PrintAndLog("Usage: lf t55xx trace [1]");
76 PrintAndLog(" [graph buffer data], if set, use Graphbuffer otherwise read data from tag.");
78 PrintAndLog("Examples:");
79 PrintAndLog(" lf t55xx trace");
80 PrintAndLog(" lf t55xx trace 1");
84 int usage_t55xx_info() {
85 PrintAndLog("Usage: lf t55xx info [1]");
86 PrintAndLog(" [graph buffer data], if set, use Graphbuffer otherwise read data from tag.");
88 PrintAndLog("Examples:");
89 PrintAndLog(" lf t55xx info");
90 PrintAndLog(" lf t55xx info 1");
94 int usage_t55xx_dump(){
95 PrintAndLog("Usage: lf t55xx dump <password>");
96 PrintAndLog(" <password>, OPTIONAL password 4bytes (8 hex symbols)");
98 PrintAndLog("Examples:");
99 PrintAndLog(" lf t55xx dump");
100 PrintAndLog(" lf t55xx dump feedbeef");
104 int usage_t55xx_detect(){
105 PrintAndLog("Usage: lf t55xx detect");
107 PrintAndLog("Examples:");
108 PrintAndLog(" lf t55xx detect");
109 PrintAndLog(" lf t55xx detect 1");
114 static int CmdHelp(const char *Cmd
);
116 int CmdT55xxSetConfig(const char *Cmd
) {
121 char modulation
[5] = {0x00};
124 uint8_t rates
[9] = {8,16,32,40,50,64,100,128,0};
125 while(param_getchar(Cmd
, cmdp
) != 0x00 && !errors
)
127 tmp
= param_getchar(Cmd
, cmdp
);
132 return usage_t55xx_config();
134 errors
|= param_getdec(Cmd
, cmdp
+1, &bitRate
);
138 if (rates
[i
]==bitRate
) {
143 if (i
==9) errors
= TRUE
;
148 param_getstr(Cmd
, cmdp
+1, modulation
);
151 if ( strcmp(modulation
, "FSK" ) == 0) {
152 config
.modulation
= DEMOD_FSK
;
153 } else if ( strcmp(modulation
, "FSK1" ) == 0) {
154 config
.modulation
= DEMOD_FSK1
;
156 } else if ( strcmp(modulation
, "FSK1a" ) == 0) {
157 config
.modulation
= DEMOD_FSK1a
;
159 } else if ( strcmp(modulation
, "FSK2" ) == 0) {
160 config
.modulation
= DEMOD_FSK2
;
162 } else if ( strcmp(modulation
, "FSK2a" ) == 0) {
163 config
.modulation
= DEMOD_FSK2a
;
165 } else if ( strcmp(modulation
, "ASK" ) == 0) {
166 config
.modulation
= DEMOD_ASK
;
167 } else if ( strcmp(modulation
, "NRZ" ) == 0) {
168 config
.modulation
= DEMOD_NRZ
;
169 } else if ( strcmp(modulation
, "PSK1" ) == 0) {
170 config
.modulation
= DEMOD_PSK1
;
171 } else if ( strcmp(modulation
, "PSK2" ) == 0) {
172 config
.modulation
= DEMOD_PSK2
;
173 } else if ( strcmp(modulation
, "PSK3" ) == 0) {
174 config
.modulation
= DEMOD_PSK3
;
175 } else if ( strcmp(modulation
, "BIa" ) == 0) {
176 config
.modulation
= DEMOD_BIa
;
178 } else if ( strcmp(modulation
, "BI" ) == 0) {
179 config
.modulation
= DEMOD_BI
;
182 PrintAndLog("Unknown modulation '%s'", modulation
);
187 config
.inverted
= param_getchar(Cmd
,cmdp
+1) == '1';
191 errors
|= param_getdec(Cmd
, cmdp
+1, &offset
);
193 config
.offset
= offset
;
197 PrintAndLog("Unknown parameter '%c'", param_getchar(Cmd
, cmdp
));
205 printConfiguration( config
);
210 return usage_t55xx_config();
213 printConfiguration ( config
);
217 int CmdT55xxReadBlock(const char *Cmd
) {
219 int password
= 0xFFFFFFFF; //default to blank Block 7
221 char cmdp
= param_getchar(Cmd
, 0);
222 if (cmdp
== 'h' || cmdp
== 'H')
223 return usage_t55xx_read();
225 int res
= sscanf(Cmd
, "%d %x", &block
, &password
);
227 if ( res
< 1 || res
> 2 )
228 return usage_t55xx_read();
231 if ((block
< 0) | (block
> 7)) {
232 PrintAndLog("Block must be between 0 and 7");
236 UsbCommand c
= {CMD_T55XX_READ_BLOCK
, {0, block
, 0}};
237 c
.d
.asBytes
[0] = 0x0;
242 c
.d
.asBytes
[0] = 0x1;
246 if ( !WaitForResponseTimeout(CMD_ACK
,NULL
,2500) ) {
247 PrintAndLog("command execution time out");
252 GetFromBigBuf(got
,sizeof(got
),0);
253 WaitForResponse(CMD_ACK
,NULL
);
254 setGraphBuf(got
, 12000);
256 if (!DecodeT55xxBlock()) return 3;
258 sprintf(blk
,"%d", block
);
259 printT55xxBlock(blk
);
263 bool DecodeT55xxBlock(){
265 char buf
[10] = {0x00};
268 uint8_t bitRate
[8] = {8,16,32,40,50,64,100,128};
270 DemodBufferLen
= 0x00;
272 switch( config
.modulation
){
274 snprintf(cmdStr
, sizeof(buf
),"%d", bitRate
[config
.bitrate
]/2 );
276 snprintf(cmdStr
, sizeof(buf
),"%d %d", bitRate
[config
.bitrate
], config
.inverted
);
277 ans
= FSKrawDemod(cmdStr
, FALSE
);
281 snprintf(cmdStr
, sizeof(buf
),"%d", bitRate
[config
.bitrate
]/2 );
283 snprintf(cmdStr
, sizeof(buf
),"%d %d 8 5", bitRate
[config
.bitrate
], config
.inverted
);
284 ans
= FSKrawDemod(cmdStr
, FALSE
);
288 snprintf(cmdStr
, sizeof(buf
),"%d", bitRate
[config
.bitrate
]/2 );
290 snprintf(cmdStr
, sizeof(buf
),"%d %d 10 8", bitRate
[config
.bitrate
], config
.inverted
);
291 ans
= FSKrawDemod(cmdStr
, FALSE
);
294 snprintf(cmdStr
, sizeof(buf
),"%d %d 0", bitRate
[config
.bitrate
], config
.inverted
);
295 ans
= ASKmanDemod(cmdStr
, FALSE
, FALSE
);
298 snprintf(cmdStr
, sizeof(buf
),"%d %d 0", bitRate
[config
.bitrate
], config
.inverted
);
299 ans
= PSKDemod(cmdStr
, FALSE
);
301 case DEMOD_PSK2
: //inverted won't affect this
302 case DEMOD_PSK3
: //not fully implemented
303 snprintf(cmdStr
, sizeof(buf
),"%d 0 1", bitRate
[config
.bitrate
] );
304 ans
= PSKDemod(cmdStr
, FALSE
);
305 psk1TOpsk2(DemodBuffer
, DemodBufferLen
);
308 snprintf(cmdStr
, sizeof(buf
),"%d %d 1", bitRate
[config
.bitrate
], config
.inverted
);
309 ans
= NRZrawDemod(cmdStr
, FALSE
);
313 snprintf(cmdStr
, sizeof(buf
),"0 %d %d 0", bitRate
[config
.bitrate
], config
.inverted
);
314 ans
= ASKbiphaseDemod(cmdStr
, FALSE
);
322 int CmdT55xxDetect(const char *Cmd
){
324 char cmdp
= param_getchar(Cmd
, 0);
325 if (strlen(Cmd
) > 1 || cmdp
== 'h' || cmdp
== 'H')
326 return usage_t55xx_detect();
329 AquireData( CONFIGURATION_BLOCK
);
331 if ( !tryDetectModulation() )
332 PrintAndLog("Could not detect modulation automatically. Try setting it manually with \'lf t55xx config\'");
337 // detect configuration?
338 bool tryDetectModulation(){
339 char cmdStr
[8] = {0};
341 t55xx_conf_block_t tests
[15];
343 if (GetFskClock("", FALSE
, FALSE
)){
344 uint8_t fc1
= 0, fc2
= 0, clk
=0;
345 fskClocks(&fc1
, &fc2
, &clk
, FALSE
);
346 sprintf(cmdStr
,"%d", clk
/2);
348 if ( FSKrawDemod("0 0", FALSE
) && test(DEMOD_FSK
, &tests
[hits
].offset
)){
349 tests
[hits
].modulation
= DEMOD_FSK
;
350 if (fc1
==8 && fc2
== 5)
351 tests
[hits
].modulation
= DEMOD_FSK1a
;
352 else if (fc1
==10 && fc2
== 8)
353 tests
[hits
].modulation
= DEMOD_FSK2
;
355 tests
[hits
].inverted
= FALSE
;
356 tests
[hits
].block0
= PackBits(tests
[hits
].offset
, 32, DemodBuffer
);
359 if ( FSKrawDemod("0 1", FALSE
) && test(DEMOD_FSK
, &tests
[hits
].offset
)) {
360 tests
[hits
].modulation
= DEMOD_FSK
;
361 if (fc1
==8 && fc2
== 5)
362 tests
[hits
].modulation
= DEMOD_FSK1
;
363 else if (fc1
==10 && fc2
== 8)
364 tests
[hits
].modulation
= DEMOD_FSK2a
;
366 tests
[hits
].inverted
= TRUE
;
367 tests
[hits
].block0
= PackBits(tests
[hits
].offset
, 32, DemodBuffer
);
371 if ( ASKmanDemod("0 0 1", FALSE
, FALSE
) && test(DEMOD_ASK
, &tests
[hits
].offset
)) {
372 tests
[hits
].modulation
= DEMOD_ASK
;
373 tests
[hits
].inverted
= FALSE
;
374 tests
[hits
].block0
= PackBits(tests
[hits
].offset
, 32, DemodBuffer
);
378 if ( ASKmanDemod("0 1 1", FALSE
, FALSE
) && test(DEMOD_ASK
, &tests
[hits
].offset
)) {
379 tests
[hits
].modulation
= DEMOD_ASK
;
380 tests
[hits
].inverted
= TRUE
;
381 tests
[hits
].block0
= PackBits(tests
[hits
].offset
, 32, DemodBuffer
);
385 if ( NRZrawDemod("0 0 1", FALSE
) && test(DEMOD_NRZ
, &tests
[hits
].offset
)) {
386 tests
[hits
].modulation
= DEMOD_NRZ
;
387 tests
[hits
].inverted
= FALSE
;
388 tests
[hits
].block0
= PackBits(tests
[hits
].offset
, 32, DemodBuffer
);
392 if ( NRZrawDemod("0 1 1", FALSE
) && test(DEMOD_NRZ
, &tests
[hits
].offset
)) {
393 tests
[hits
].modulation
= DEMOD_NRZ
;
394 tests
[hits
].inverted
= TRUE
;
395 tests
[hits
].block0
= PackBits(tests
[hits
].offset
, 32, DemodBuffer
);
399 if ( PSKDemod("0 0 1", FALSE
) && test(DEMOD_PSK1
, &tests
[hits
].offset
)) {
400 tests
[hits
].modulation
= DEMOD_PSK1
;
401 tests
[hits
].inverted
= FALSE
;
402 tests
[hits
].block0
= PackBits(tests
[hits
].offset
, 32, DemodBuffer
);
406 if ( PSKDemod("0 1 1", FALSE
) && test(DEMOD_PSK1
, &tests
[hits
].offset
)) {
407 tests
[hits
].modulation
= DEMOD_PSK1
;
408 tests
[hits
].inverted
= TRUE
;
409 tests
[hits
].block0
= PackBits(tests
[hits
].offset
, 32, DemodBuffer
);
413 // PSK2 - needs a call to psk1TOpsk2.
414 if ( PSKDemod("0 0 1", FALSE
)) {
415 psk1TOpsk2(DemodBuffer
, DemodBufferLen
);
416 if (test(DEMOD_PSK2
, &tests
[hits
].offset
)){
417 tests
[hits
].modulation
= DEMOD_PSK2
;
418 tests
[hits
].inverted
= FALSE
;
419 tests
[hits
].block0
= PackBits(tests
[hits
].offset
, 32, DemodBuffer
);
422 } // inverse waves does not affect this demod
424 // PSK3 - needs a call to psk1TOpsk2.
425 if ( PSKDemod("0 0 1", FALSE
)) {
426 psk1TOpsk2(DemodBuffer
, DemodBufferLen
);
427 if (test(DEMOD_PSK3
, &tests
[hits
].offset
)){
428 tests
[hits
].modulation
= DEMOD_PSK3
;
429 tests
[hits
].inverted
= FALSE
;
430 tests
[hits
].block0
= PackBits(tests
[hits
].offset
, 32, DemodBuffer
);
433 } // inverse waves does not affect this demod
435 if ( ASKbiphaseDemod("0 0 0 1", FALSE
) && test(DEMOD_BI
, &tests
[hits
].offset
) ) {
436 tests
[hits
].modulation
= DEMOD_BI
;
437 tests
[hits
].inverted
= FALSE
;
438 tests
[hits
].block0
= PackBits(tests
[hits
].offset
, 32, DemodBuffer
);
441 if ( ASKbiphaseDemod("0 0 1 1", FALSE
) && test(DEMOD_BIa
, &tests
[hits
].offset
) ) {
442 tests
[hits
].modulation
= DEMOD_BIa
;
443 tests
[hits
].inverted
= TRUE
;
444 tests
[hits
].block0
= PackBits(tests
[hits
].offset
, 32, DemodBuffer
);
449 config
.modulation
= tests
[0].modulation
;
450 config
.inverted
= tests
[0].inverted
;
451 config
.offset
= tests
[0].offset
;
452 config
.block0
= tests
[0].block0
;
453 printConfiguration( config
);
458 PrintAndLog("Found [%d] possible matches for modulation.",hits
);
459 for(int i
=0; i
<hits
; ++i
){
460 PrintAndLog("--[%d]---------------", i
+1);
461 printConfiguration( tests
[i
] );
467 bool testModulation(uint8_t mode
, uint8_t modread
){
470 if (modread
> 3 && modread
< 8) return TRUE
;
473 if (modread
== DEMOD_ASK
) return TRUE
;
476 if (modread
== DEMOD_PSK1
) return TRUE
;
479 if (modread
== DEMOD_PSK2
) return TRUE
;
482 if (modread
== DEMOD_PSK3
) return TRUE
;
485 if (modread
== DEMOD_NRZ
) return TRUE
;
488 if (modread
== DEMOD_BI
) return TRUE
;
491 if (modread
== DEMOD_BIa
) return TRUE
;
499 bool testBitRate(uint8_t readRate
, uint8_t mod
){
500 uint8_t expected
[8] = {8, 16, 32, 40, 50, 64, 100, 128};
508 detRate
= GetFskClock("",FALSE
, FALSE
);
509 if (expected
[readRate
] == detRate
) {
510 config
.bitrate
= readRate
;
517 detRate
= GetAskClock("",FALSE
, FALSE
);
518 if (expected
[readRate
] == detRate
) {
519 config
.bitrate
= readRate
;
526 detRate
= GetPskClock("",FALSE
, FALSE
);
527 if (expected
[readRate
] == detRate
) {
528 config
.bitrate
= readRate
;
533 detRate
= GetNrzClock("",FALSE
, FALSE
);
534 if (expected
[readRate
] == detRate
) {
535 config
.bitrate
= readRate
;
545 bool test(uint8_t mode
, uint8_t *offset
){
547 if ( !DemodBufferLen
) return FALSE
;
549 for (uint8_t idx
= 0; idx
< 64; idx
++){
551 if ( PackBits(si
, 32, DemodBuffer
) == 0x00 ) continue;
553 uint8_t safer
= PackBits(si
, 4, DemodBuffer
); si
+= 4; //master key
554 uint8_t resv
= PackBits(si
, 4, DemodBuffer
); si
+= 4; //was 7 & +=7+3 //should be only 4 bits if extended mode
555 // 2nibble must be zeroed.
556 // moved test to here, since this gets most faults first.
557 if ( resv
> 0x00) continue;
559 uint8_t xtRate
= PackBits(si
, 3, DemodBuffer
); si
+= 3; //extended mode part of rate
560 uint8_t bitRate
= PackBits(si
, 3, DemodBuffer
); si
+= 3; //bit rate
561 uint8_t extend
= PackBits(si
, 1, DemodBuffer
); si
+= 1; //bit 15 extended mode
562 uint8_t modread
= PackBits(si
, 5, DemodBuffer
); si
+= 5+2+1;
563 //uint8_t pskcr = PackBits(si, 2, DemodBuffer); si += 2+1; //could check psk cr
564 uint8_t nml01
= PackBits(si
, 1, DemodBuffer
); si
+= 1+5; //bit 24, 30, 31 could be tested for 0 if not extended mode
565 uint8_t nml02
= PackBits(si
, 2, DemodBuffer
); si
+= 2;
568 bool extMode
=( (safer
== 0x6 || safer
== 0x9) && extend
) ? TRUE
: FALSE
;
571 if (nml01
|| nml02
|| xtRate
) continue;
574 if (!testModulation(mode
, modread
)) continue;
575 if (!testBitRate(bitRate
, mode
)) continue;
582 void printT55xxBlock(const char *blockNum
){
584 uint8_t i
= config
.offset
;
585 uint8_t endpos
= 32 + i
;
586 uint32_t blockData
= 0;
587 uint8_t bits
[64] = {0x00};
589 if ( !DemodBufferLen
) return;
591 if ( endpos
> DemodBufferLen
){
592 PrintAndLog("The configured offset %d is too big. Possible offset: %d)", i
, DemodBufferLen
-32);
596 for (; i
< endpos
; ++i
)
597 bits
[i
- config
.offset
]=DemodBuffer
[i
];
599 blockData
= PackBits(0, 32, bits
);
600 PrintAndLog("[%s] 0x%08X %s", blockNum
, blockData
, sprint_bin(bits
,32));
603 int special(const char *Cmd
) {
604 uint32_t blockData
= 0;
605 uint8_t bits
[32] = {0x00};
607 PrintAndLog("[OFFSET] [DATA] [BINARY]");
608 PrintAndLog("----------------------------------------------------");
612 for (i
= 0; i
< 32; ++i
)
613 bits
[i
]=DemodBuffer
[j
+i
];
615 blockData
= PackBits(0, 32, bits
);
617 PrintAndLog("[%02d] 0x%08X %s",j
, blockData
, sprint_bin(bits
,32));
622 void printConfiguration( t55xx_conf_block_t b
){
623 PrintAndLog("Modulation : %s", GetSelectedModulationStr(b
.modulation
) );
624 PrintAndLog("Bit Rate : %s", GetBitRateStr(b
.bitrate
) );
625 PrintAndLog("Inverted : %s", (b
.inverted
) ? "Yes" : "No" );
626 PrintAndLog("Offset : %d", b
.offset
);
627 PrintAndLog("Block0 : 0x%08X", b
.block0
);
631 int CmdT55xxWriteBlock(const char *Cmd
)
633 int block
= 8; //default to invalid block
634 int data
= 0xFFFFFFFF; //default to blank Block
635 int password
= 0xFFFFFFFF; //default to blank Block 7
637 char cmdp
= param_getchar(Cmd
, 0);
638 if (cmdp
== 'h' || cmdp
== 'H') {
643 int res
= sscanf(Cmd
, "%d %x %x",&block
, &data
, &password
);
645 if ( res
< 2 || res
> 3) {
651 PrintAndLog("Block number must be between 0 and 7");
655 UsbCommand c
= {CMD_T55XX_WRITE_BLOCK
, {data
, block
, 0}};
656 c
.d
.asBytes
[0] = 0x0;
658 PrintAndLog("Writing to block: %d data : 0x%08X", block
, data
);
663 c
.d
.asBytes
[0] = 0x1;
664 PrintAndLog("pwd : 0x%08X", password
);
670 int CmdT55xxReadTrace(const char *Cmd
)
672 char cmdp
= param_getchar(Cmd
, 0);
674 if (strlen(Cmd
) > 1 || cmdp
== 'h' || cmdp
== 'H')
675 return usage_t55xx_trace();
678 AquireData( TRACE_BLOCK
);
680 if (!DecodeT55xxBlock()) return 1;
682 if ( !DemodBufferLen
) return 1;
684 RepaintGraphWindow();
686 if (config
.offset
> 5)
688 uint8_t si
= config
.offset
+repeat
;
689 uint32_t bl0
= PackBits(si
, 32, DemodBuffer
);
690 uint32_t bl1
= PackBits(si
+32, 32, DemodBuffer
);
692 uint32_t acl
= PackBits(si
, 8, DemodBuffer
); si
+= 8;
693 uint32_t mfc
= PackBits(si
, 8, DemodBuffer
); si
+= 8;
694 uint32_t cid
= PackBits(si
, 5, DemodBuffer
); si
+= 5;
695 uint32_t icr
= PackBits(si
, 3, DemodBuffer
); si
+= 3;
696 uint32_t year
= PackBits(si
, 4, DemodBuffer
); si
+= 4;
697 uint32_t quarter
= PackBits(si
, 2, DemodBuffer
); si
+= 2;
698 uint32_t lotid
= PackBits(si
, 14, DemodBuffer
); si
+= 14;
699 uint32_t wafer
= PackBits(si
, 5, DemodBuffer
); si
+= 5;
700 uint32_t dw
= PackBits(si
, 15, DemodBuffer
);
702 time_t t
= time(NULL
);
703 struct tm tm
= *localtime(&t
);
704 if ( year
> tm
.tm_year
-110)
710 PrintAndLog("The modulation is most likely wrong since the ACL is not 0xE0. ");
715 PrintAndLog("-- T55xx Trace Information ----------------------------------");
716 PrintAndLog("-------------------------------------------------------------");
717 PrintAndLog(" ACL Allocation class (ISO/IEC 15963-1) : 0x%02X (%d)", acl
, acl
);
718 PrintAndLog(" MFC Manufacturer ID (ISO/IEC 7816-6) : 0x%02X (%d) - %s", mfc
, mfc
, getTagInfo(mfc
));
719 PrintAndLog(" CID : 0x%02X (%d) - %s", cid
, cid
, GetModelStrFromCID(cid
));
720 PrintAndLog(" ICR IC Revision : %d",icr
);
721 PrintAndLog(" Manufactured");
722 PrintAndLog(" Year/Quarter : 20?%d/%d",year
, quarter
);
723 PrintAndLog(" Lot ID : %d", lotid
);
724 PrintAndLog(" Wafer number : %d", wafer
);
725 PrintAndLog(" Die Number : %d", dw
);
726 PrintAndLog("-------------------------------------------------------------");
727 PrintAndLog(" Raw Data - Page 1");
728 PrintAndLog(" Block 0 : 0x%08X %s", bl0
, sprint_bin(DemodBuffer
+config
.offset
+repeat
,32) );
729 PrintAndLog(" Block 1 : 0x%08X %s", bl1
, sprint_bin(DemodBuffer
+config
.offset
+repeat
+32,32) );
730 PrintAndLog("-------------------------------------------------------------");
735 1-8 ACL Allocation class (ISO/IEC 15963-1) 0xE0
736 9-16 MFC Manufacturer ID (ISO/IEC 7816-6) 0x15 Atmel Corporation
737 17-21 CID 0x1 = Atmel ATA5577M1 0x2 = Atmel ATA5577M2
738 22-24 ICR IC revision
739 25-28 YEAR (BCD encoded) 9 (= 2009)
740 29-30 QUARTER 1,2,3,4
746 18-32 DW, die number sequential
752 int CmdT55xxInfo(const char *Cmd
){
754 Page 0 Block 0 Configuration data.
758 char cmdp
= param_getchar(Cmd
, 0);
760 if (strlen(Cmd
) > 1 || cmdp
== 'h' || cmdp
== 'H')
761 return usage_t55xx_info();
764 AquireData( CONFIGURATION_BLOCK
);
766 if (!DecodeT55xxBlock()) return 1;
768 if ( !DemodBufferLen
) return 1;
770 uint8_t si
= config
.offset
;
771 uint32_t bl0
= PackBits(si
, 32, DemodBuffer
);
773 uint32_t safer
= PackBits(si
, 4, DemodBuffer
); si
+= 4;
774 uint32_t resv
= PackBits(si
, 7, DemodBuffer
); si
+= 7;
775 uint32_t dbr
= PackBits(si
, 3, DemodBuffer
); si
+= 3;
776 uint32_t extend
= PackBits(si
, 1, DemodBuffer
); si
+= 1;
777 uint32_t datamod
= PackBits(si
, 5, DemodBuffer
); si
+= 5;
778 uint32_t pskcf
= PackBits(si
, 2, DemodBuffer
); si
+= 2;
779 uint32_t aor
= PackBits(si
, 1, DemodBuffer
); si
+= 1;
780 uint32_t otp
= PackBits(si
, 1, DemodBuffer
); si
+= 1;
781 uint32_t maxblk
= PackBits(si
, 3, DemodBuffer
); si
+= 3;
782 uint32_t pwd
= PackBits(si
, 1, DemodBuffer
); si
+= 1;
783 uint32_t sst
= PackBits(si
, 1, DemodBuffer
); si
+= 1;
784 uint32_t fw
= PackBits(si
, 1, DemodBuffer
); si
+= 1;
785 uint32_t inv
= PackBits(si
, 1, DemodBuffer
); si
+= 1;
786 uint32_t por
= PackBits(si
, 1, DemodBuffer
); si
+= 1;
789 PrintAndLog("-- T55xx Configuration & Tag Information --------------------");
790 PrintAndLog("-------------------------------------------------------------");
791 PrintAndLog(" Safer key : %s", GetSaferStr(safer
));
792 PrintAndLog(" reserved : %d", resv
);
793 PrintAndLog(" Data bit rate : %s", GetBitRateStr(dbr
));
794 PrintAndLog(" eXtended mode : %s", (extend
) ? "Yes - Warning":"No");
795 PrintAndLog(" Modulation : %s", GetModulationStr(datamod
));
796 PrintAndLog(" PSK clock frequency : %d", pskcf
);
797 PrintAndLog(" AOR - Answer on Request : %s", (aor
) ? "Yes":"No");
798 PrintAndLog(" OTP - One Time Pad : %s", (otp
) ? "Yes - Warning":"No" );
799 PrintAndLog(" Max block : %d", maxblk
);
800 PrintAndLog(" Password mode : %s", (pwd
) ? "Yes":"No");
801 PrintAndLog(" Sequence Start Terminator : %s", (sst
) ? "Yes":"No");
802 PrintAndLog(" Fast Write : %s", (fw
) ? "Yes":"No");
803 PrintAndLog(" Inverse data : %s", (inv
) ? "Yes":"No");
804 PrintAndLog(" POR-Delay : %s", (por
) ? "Yes":"No");
805 PrintAndLog("-------------------------------------------------------------");
806 PrintAndLog(" Raw Data - Page 0");
807 PrintAndLog(" Block 0 : 0x%08X %s", bl0
, sprint_bin(DemodBuffer
+config
.offset
,32) );
808 PrintAndLog("-------------------------------------------------------------");
813 int CmdT55xxDump(const char *Cmd
){
816 uint8_t pwd
[4] = {0x00};
818 char cmdp
= param_getchar(Cmd
, 0);
819 if ( cmdp
== 'h' || cmdp
== 'H') {
824 bool hasPwd
= ( strlen(Cmd
) > 0);
826 if (param_gethex(Cmd
, 0, pwd
, 8)) {
827 PrintAndLog("password must include 8 HEX symbols");
832 for ( int i
= 0; i
<8; ++i
){
833 memset(s
,0,sizeof(s
));
835 sprintf(s
,"%d %02x%02x%02x%02x", i
, pwd
[0],pwd
[1],pwd
[2],pwd
[3]);
839 CmdT55xxReadBlock(s
);
844 int AquireData( uint8_t block
){
848 if ( block
== CONFIGURATION_BLOCK
)
849 c
.cmd
= CMD_T55XX_READ_BLOCK
;
850 else if (block
== TRACE_BLOCK
)
851 c
.cmd
= CMD_T55XX_READ_TRACE
;
856 c
.d
.asBytes
[0] = 0x0;
860 // c.arg[2] = password;
861 // c.d.asBytes[0] = 0x1;
865 if ( !WaitForResponseTimeout(CMD_ACK
,NULL
,2500) ) {
866 PrintAndLog("command execution time out");
871 GetFromBigBuf(got
,sizeof(got
),0);
872 WaitForResponse(CMD_ACK
,NULL
);
873 setGraphBuf(got
, 12000);
877 char * GetBitRateStr(uint32_t id
){
882 snprintf(retStr
,sizeof(buf
),"%d - RF/8",id
);
885 snprintf(retStr
,sizeof(buf
),"%d - RF/16",id
);
888 snprintf(retStr
,sizeof(buf
),"%d - RF/32",id
);
891 snprintf(retStr
,sizeof(buf
),"%d - RF/40",id
);
894 snprintf(retStr
,sizeof(buf
),"%d - RF/50",id
);
897 snprintf(retStr
,sizeof(buf
),"%d - RF/64",id
);
900 snprintf(retStr
,sizeof(buf
),"%d - RF/100",id
);
903 snprintf(retStr
,sizeof(buf
),"%d - RF/128",id
);
906 snprintf(retStr
,sizeof(buf
),"%d - (Unknown)",id
);
913 char * GetSaferStr(uint32_t id
){
917 snprintf(retStr
,sizeof(buf
),"%d",id
);
919 snprintf(retStr
,sizeof(buf
),"%d - passwd",id
);
922 snprintf(retStr
,sizeof(buf
),"%d - testmode",id
);
928 char * GetModulationStr( uint32_t id
){
934 snprintf(retStr
,sizeof(buf
),"%d - DIRECT (ASK/NRZ)",id
);
937 snprintf(retStr
,sizeof(buf
),"%d - PSK 1 phase change when input changes",id
);
940 snprintf(retStr
,sizeof(buf
),"%d - PSK 2 phase change on bitclk if input high",id
);
943 snprintf(retStr
,sizeof(buf
),"%d - PSK 3 phase change on rising edge of input",id
);
946 snprintf(retStr
,sizeof(buf
),"%d - FSK 1 RF/8 RF/5",id
);
949 snprintf(retStr
,sizeof(buf
),"%d - FSK 2 RF/8 RF/10",id
);
952 snprintf(retStr
,sizeof(buf
),"%d - FSK 1a RF/5 RF/8",id
);
955 snprintf(retStr
,sizeof(buf
),"%d - FSK 2a RF/10 RF/8",id
);
958 snprintf(retStr
,sizeof(buf
),"%d - Manschester",id
);
961 snprintf(retStr
,sizeof(buf
),"%d - Biphase",id
);
964 snprintf(retStr
,sizeof(buf
),"%d - Biphase a - AKA Conditional Dephase Encoding(CDP)",id
);
967 snprintf(retStr
,sizeof(buf
),"%d - Reserved",id
);
970 snprintf(retStr
,sizeof(buf
),"0x%02X (Unknown)",id
);
976 char * GetModelStrFromCID(uint32_t cid
){
981 if (cid
== 1) snprintf(retStr
, sizeof(buf
),"ATA5577M1");
982 if (cid
== 2) snprintf(retStr
, sizeof(buf
),"ATA5577M2");
986 char * GetSelectedModulationStr( uint8_t id
){
993 snprintf(retStr
,sizeof(buf
),"FSK");
996 snprintf(retStr
,sizeof(buf
),"FSK1");
999 snprintf(retStr
,sizeof(buf
),"FSK1a");
1002 snprintf(retStr
,sizeof(buf
),"FSK2");
1005 snprintf(retStr
,sizeof(buf
),"FSK2a");
1008 snprintf(retStr
,sizeof(buf
),"ASK");
1011 snprintf(retStr
,sizeof(buf
),"DIRECT/NRZ");
1014 snprintf(retStr
,sizeof(buf
),"PSK1");
1017 snprintf(retStr
,sizeof(buf
),"PSK2");
1020 snprintf(retStr
,sizeof(buf
),"PSK3");
1023 snprintf(retStr
,sizeof(buf
),"BIPHASE");
1026 snprintf(retStr
,sizeof(buf
),"BIPHASEa - (CDP)");
1029 snprintf(retStr
,sizeof(buf
),"(Unknown)");
1035 uint32_t PackBits(uint8_t start
, uint8_t len
, uint8_t* bits
){
1040 if (len
> 32) return 0;
1043 for (; j
>= 0; --j
, ++i
)
1044 tmp
|= bits
[i
] << j
;
1049 static command_t CommandTable
[] =
1051 {"help", CmdHelp
, 1, "This help"},
1052 {"config", CmdT55xxSetConfig
, 1, "Set/Get T55XX configuration (modulation, inverted, offset, rate)"},
1053 {"detect", CmdT55xxDetect
, 0, "[1] Try detecting the tag modulation from reading the configuration block."},
1054 {"read", CmdT55xxReadBlock
, 0, "<block> [password] -- Read T55xx block data (page 0) [optional password]"},
1055 {"write", CmdT55xxWriteBlock
,0, "<block> <data> [password] -- Write T55xx block data (page 0) [optional password]"},
1056 {"trace", CmdT55xxReadTrace
, 0, "[1] Show T55xx traceability data (page 1/ blk 0-1)"},
1057 {"info", CmdT55xxInfo
, 0, "[1] Show T55xx configuration data (page 0/ blk 0)"},
1058 {"dump", CmdT55xxDump
, 0, "[password] Dump T55xx card block 0-7. [optional password]"},
1059 {"special", special
, 0, "Show block changes with 64 different offsets"},
1060 {NULL
, NULL
, 0, NULL
}
1063 int CmdLFT55XX(const char *Cmd
)
1065 CmdsParse(CommandTable
, Cmd
);
1069 int CmdHelp(const char *Cmd
)
1071 CmdsHelp(CommandTable
);