]>
git.zerfleddert.de Git - proxmark3-svn/blob - client/cmdlft55xx.c
1 //-----------------------------------------------------------------------------
3 // This code is licensed to you under the terms of the GNU GPL, version 2 or,
4 // at your option, any later version. See the LICENSE.txt file for the text of
6 //-----------------------------------------------------------------------------
7 // Low frequency T55xx commands
8 //-----------------------------------------------------------------------------
13 #include "proxmark3.h"
17 #include "cmdparser.h"
20 #include "cmdlft55xx.h"
25 #define LF_TRACE_BUFF_SIZE 20000 // 32 x 32 x 10 (32 bit times numofblock (7), times clock skip..)
26 #define LF_BITSSTREAM_LEN 1000 // more then 1000 bits shouldn't happend.. 8block * 4 bytes * 8bits =
29 PrintAndLog("Usage: lf t55xx rd <block> <password>");
30 PrintAndLog(" <block>, block number to read. Between 0-7");
31 PrintAndLog(" <password>, OPTIONAL password (8 hex characters)");
33 PrintAndLog(" sample: lf t55xx rd 0 = try reading data from block 0");
34 PrintAndLog(" : lf t55xx rd 0 feedbeef = try reading data from block 0 using password");
39 PrintAndLog("Usage: lf t55xx wr <block> <data> [password]");
40 PrintAndLog(" <block>, block number to read. Between 0-7");
41 PrintAndLog(" <data>, 4 bytes of data to write (8 hex characters)");
42 PrintAndLog(" [password], OPTIONAL password 4bytes (8 hex characters)");
44 PrintAndLog(" sample: lf t55xx wd 3 11223344 = try writing data 11223344 to block 3");
45 PrintAndLog(" : lf t55xx wd 3 11223344 feedbeef = try writing data 11223344 to block 3 using password feedbeef");
49 int usage_t55xx_trace() {
50 PrintAndLog("Usage: lf t55xx trace [graph buffer data]");
51 PrintAndLog(" [graph buffer data], if set, use Graphbuffer otherwise read data from tag.");
53 PrintAndLog(" sample: lf t55xx trace");
54 PrintAndLog(" : lf t55xx trace 1");
58 int usage_t55xx_info() {
59 PrintAndLog("Usage: lf t55xx info [graph buffer data]");
60 PrintAndLog(" [graph buffer data], if set, use Graphbuffer otherwise read data from tag.");
62 PrintAndLog(" sample: lf t55xx info");
63 PrintAndLog(" : lf t55xx info 1");
67 int usage_t55xx_dump(){
68 PrintAndLog("Usage: lf t55xx dump <password>");
69 PrintAndLog(" <password>, OPTIONAL password 4bytes (8 hex characters)");
71 PrintAndLog(" sample: lf t55xx dump");
72 PrintAndLog(" : lf t55xx dump feedbeef");
77 static int CmdHelp(const char *Cmd
);
79 int CmdReadBlk(const char *Cmd
)
82 int password
= 0xFFFFFFFF; //default to blank Block 7
85 uint8_t bits
[MAX_GRAPH_TRACE_LEN
] = {0x00};
88 char cmdp
= param_getchar(Cmd
, 0);
89 if (cmdp
== 'h' || cmdp
== 'H') {
94 int res
= sscanf(Cmd
, "%d %x", &block
, &password
);
96 if ( res
< 1 || res
> 2 ){
101 if ((block
< 0) | (block
> 7)) {
102 PrintAndLog("Block must be between 0 and 7");
106 UsbCommand c
= {CMD_T55XX_READ_BLOCK
, {0, block
, 0}};
107 c
.d
.asBytes
[0] = 0x0;
112 c
.d
.asBytes
[0] = 0x1;
116 if ( !WaitForResponseTimeout(CMD_ACK
,NULL
,1500) ) {
117 PrintAndLog("command execution time out");
123 bitlen
= getFromGraphBuf(bits
);
125 if ( !tryDemod(bits
, bitlen
) )
128 //move bits back to DemodBuffer
129 setDemodBuf(bits
, bitlen
, 0);
130 printBitStream(bits
, bitlen
);
132 // // bits has the manchester encoded data.
133 // errCnt = manrawdecode(bits, &bitlen);
134 // if ( errCnt == -1 || bitlen < 32 ){
135 // PrintAndLog("no data found");
137 // PrintAndLog("errCnt: %d, bitlen: %d, clk: %d, invert: %d", errCnt, bitlen, clk, invert);
141 blockData
= PackBits(1, 32, bits
);
144 PrintAndLog(" Decoded : 0x%08X %s", blockData
, sprint_bin(bits
+1,32) );
146 PrintAndLog(" Block %d : 0x%08X %s", block
, blockData
, sprint_bin(bits
+1,32) );
154 size = fskdemod(dest, size, 32, 0, 8, 10); // fsk1 RF/32
155 size = fskdemod(dest, size, 32, 1, 8, 10); // fsk1a RF/32
158 size = fskdemod(dest, size, 32, 0, 10, 8); // fsk2 RF/32
159 size = fskdemod(dest, size, 32, 1, 10, 8); // fsk2a RF/32
160 size = fskdemod(dest, size, 50, 1, 10, 8); // fsk2a RF/50
161 size = fskdemod(dest, size, 64, 1, 10, 8); // FSK2a RF/64
164 errCnt = pskRawDemod(bits, &bitlen, 32, 0);
166 bool tryDemod(uint8_t bits
[], size_t bitlen
) {
172 uint8_t rflen
, fchigh
, fclow
, dummy
= 0;
175 // ASK - manchester demod
176 errCnt
= askmandemod(bits
, &bitlen
, &clk
, &invert
, maxErr
);
177 if ( analyseDemod(errCnt
, bitlen
, clk
, invert
) )
181 fcs
= countFC(bits
, bitlen
, &dummy
);
186 fchigh
= (fcs
>> 8) & 0xFF;
189 //get bit clock length
190 rflen
= detectFSKClk(bits
, bitlen
, fchigh
, fclow
);
191 rflen
= (rflen
== 0) ? 50 : rflen
;
193 size
= fskdemod(bits
, bitlen
, rflen
, invert
, fchigh
, fclow
);
194 if ( analyseDemod(size
, bitlen
, clk
, invert
) )
201 bool analyseDemod( int errCnt
, size_t bitlen
, uint8_t clock
, uint8_t invert
){
203 PrintAndLog("ErrorCount: %d, Bits Found: %d, Clock: %d, invert: %d", errCnt
, bitlen
, clock
, invert
);
204 //PrintAndLog("Args invert: %d - Clock:%d - fchigh:%d - fclow: %d",invert,rfLen,fchigh, fclow);
206 //throw away static - allow 1 and -1 (in case of threshold command first)
207 if ( errCnt
== -1 || bitlen
< 32 ){
208 PrintAndLog("no success demod");
214 int CmdWriteBlk(const char *Cmd
)
216 int block
= 8; //default to invalid block
217 int data
= 0xFFFFFFFF; //default to blank Block
218 int password
= 0xFFFFFFFF; //default to blank Block 7
220 char cmdp
= param_getchar(Cmd
, 0);
221 if (cmdp
== 'h' || cmdp
== 'H') {
226 int res
= sscanf(Cmd
, "%d %x %x",&block
, &data
, &password
);
228 if ( res
< 2 || res
> 3) {
234 PrintAndLog("Block must be between 0 and 7");
238 UsbCommand c
= {CMD_T55XX_WRITE_BLOCK
, {data
, block
, 0}};
239 c
.d
.asBytes
[0] = 0x0;
242 PrintAndLog("Writing block %d data %08X", block
, data
);
246 c
.d
.asBytes
[0] = 0x1;
247 PrintAndLog("Writing block %d data %08X password %08X", block
, data
, password
);
254 int CmdReadTrace(const char *Cmd
)
261 uint8_t bits
[MAX_GRAPH_TRACE_LEN
] = {0x00};
263 char cmdp
= param_getchar(Cmd
, 0);
265 if (strlen(Cmd
) > 1 || cmdp
== 'h' || cmdp
== 'H') {
270 if ( strlen(Cmd
)==0){
272 UsbCommand c
= {CMD_T55XX_READ_TRACE
, {0, 0, 0}};
274 WaitForResponse(CMD_ACK
, NULL
);
279 bitlen
= getFromGraphBuf(bits
);
281 //errCnt = askrawdemod(bits, &bitlen, &clk, &invert, maxErr, askAmp);
282 errCnt
= askmandemod(bits
, &bitlen
, &clk
, &invert
, maxErr
);
284 //throw away static - allow 1 and -1 (in case of threshold command first)
285 if ( errCnt
== -1 || bitlen
< 16 ){
286 PrintAndLog("no data found");
288 PrintAndLog("errCnt: %d, bitlen: %d, clk: %d, invert: %d", errCnt
, bitlen
, clk
, invert
);
292 PrintAndLog("Using Clock: %d - invert: %d - Bits Found: %d", clk
, invert
, bitlen
);
294 //move bits back to DemodBuffer
295 setDemodBuf(bits
, bitlen
, 0);
297 // bits has the manchester encoded data.
298 errCnt
= manrawdecode(bits
, &bitlen
);
299 if ( errCnt
== -1 || bitlen
< 16 ){
300 PrintAndLog("no data found");
302 PrintAndLog("errCnt: %d, bitlen: %d, clk: %d, invert: %d", errCnt
, bitlen
, clk
, invert
);
306 RepaintGraphWindow();
309 uint32_t bl0
= PackBits(si
, 32, bits
);
310 uint32_t bl1
= PackBits(si
+32, 32, bits
);
312 uint32_t acl
= PackBits(si
, 8, bits
); si
+= 8;
313 uint32_t mfc
= PackBits(si
, 8, bits
); si
+= 8;
314 uint32_t cid
= PackBits(si
, 5, bits
); si
+= 5;
315 uint32_t icr
= PackBits(si
, 3, bits
); si
+= 3;
316 uint32_t year
= PackBits(si
, 4, bits
); si
+= 4;
317 uint32_t quarter
= PackBits(si
, 2, bits
); si
+= 2;
318 uint32_t lotid
= PackBits(si
, 12, bits
); si
+= 12;
319 uint32_t wafer
= PackBits(si
, 5, bits
); si
+= 5;
320 uint32_t dw
= PackBits(si
, 15, bits
);
323 PrintAndLog("-- T55xx Trace Information ----------------------------------");
324 PrintAndLog("-------------------------------------------------------------");
325 PrintAndLog(" ACL Allocation class (ISO/IEC 15963-1) : 0x%02X (%d)", acl
, acl
);
326 PrintAndLog(" MFC Manufacturer ID (ISO/IEC 7816-6) : 0x%02X (%d)", mfc
, mfc
);
327 PrintAndLog(" CID : 0x%02X (%d)", cid
, cid
);
328 PrintAndLog(" ICR IC Revision : %d",icr
);
329 PrintAndLog(" Manufactured");
330 PrintAndLog(" Year/Quarter : %d/%d",2000+year
, quarter
);
331 PrintAndLog(" Lot ID : %d", lotid
);
332 PrintAndLog(" Wafer number : %d", wafer
);
333 PrintAndLog(" Die Number : %d", dw
);
334 PrintAndLog("-------------------------------------------------------------");
335 PrintAndLog(" Raw Data - Page 1");
336 PrintAndLog(" Block 0 : 0x%08X %s", bl0
, sprint_bin(bits
+5,32) );
337 PrintAndLog(" Block 0 : 0x%08X %s", bl1
, sprint_bin(bits
+37,32) );
338 PrintAndLog("-------------------------------------------------------------");
342 1-8 ACL Allocation class (ISO/IEC 15963-1) 0xE0
343 9-16 MFC Manufacturer ID (ISO/IEC 7816-6) 0x15 Atmel Corporation
344 17-21 CID 0x1 = Atmel ATA5577M1 0x2 = Atmel ATA5577M2
345 22-24 ICR IC revision
346 25-28 YEAR (BCD encoded) 9 (= 2009)
347 29-30 QUARTER 1,2,3,4
353 18-32 DW, die number sequential
359 int CmdInfo(const char *Cmd
){
361 Page 0 Block 0 Configuration data.
365 char cmdp
= param_getchar(Cmd
, 0);
367 if (strlen(Cmd
) > 1 || cmdp
== 'h' || cmdp
== 'H') {
374 uint8_t bits
[LF_BITSSTREAM_LEN
] = {0x00};
376 manchester_decode(GraphBuffer
, LF_TRACE_BUFF_SIZE
, bits
, LF_BITSSTREAM_LEN
);
379 uint32_t bl0
= PackBits(si
, 32, bits
);
381 uint32_t safer
= PackBits(si
, 4, bits
); si
+= 4;
382 uint32_t resv
= PackBits(si
, 7, bits
); si
+= 7;
383 uint32_t dbr
= PackBits(si
, 3, bits
); si
+= 3;
384 uint32_t extend
= PackBits(si
, 1, bits
); si
+= 1;
385 uint32_t datamodulation
= PackBits(si
, 5, bits
); si
+= 5;
386 uint32_t pskcf
= PackBits(si
, 2, bits
); si
+= 2;
387 uint32_t aor
= PackBits(si
, 1, bits
); si
+= 1;
388 uint32_t otp
= PackBits(si
, 1, bits
); si
+= 1;
389 uint32_t maxblk
= PackBits(si
, 3, bits
); si
+= 3;
390 uint32_t pwd
= PackBits(si
, 1, bits
); si
+= 1;
391 uint32_t sst
= PackBits(si
, 1, bits
); si
+= 1;
392 uint32_t fw
= PackBits(si
, 1, bits
); si
+= 1;
393 uint32_t inv
= PackBits(si
, 1, bits
); si
+= 1;
394 uint32_t por
= PackBits(si
, 1, bits
); si
+= 1;
397 PrintAndLog("-- T55xx Configuration & Tag Information --------------------");
398 PrintAndLog("-------------------------------------------------------------");
399 PrintAndLog(" Safer key : %s", GetSaferStr(safer
));
400 PrintAndLog(" reserved : %d", resv
);
401 PrintAndLog(" Data bit rate : %s", GetBitRateStr(dbr
));
402 PrintAndLog(" eXtended mode : %s", (extend
) ? "Yes - Warning":"No");
403 PrintAndLog(" Modulation : %s", GetModulationStr(datamodulation
) );
404 PrintAndLog(" PSK clock freq : %d", pskcf
);
405 PrintAndLog(" AOR - Answer on Request : %s", (aor
) ? "Yes":"No");
406 PrintAndLog(" OTP - One Time Pad : %s", (otp
) ? "Yes - Warning":"No" );
407 PrintAndLog(" Max block : %d", maxblk
);
408 PrintAndLog(" Password mode : %s", (pwd
) ? "Yes":"No");
409 PrintAndLog(" Sequence Start Terminator : %s", (sst
) ? "Yes":"No");
410 PrintAndLog(" Fast Write : %s", (fw
) ? "Yes":"No");
411 PrintAndLog(" Inverse data : %s", (inv
) ? "Yes":"No");
412 PrintAndLog(" POR-Delay : %s", (por
) ? "Yes":"No");
413 PrintAndLog("-------------------------------------------------------------");
414 PrintAndLog(" Raw Data - Page 0");
415 PrintAndLog(" Block 0 : 0x%08X %s", bl0
, sprint_bin(bits
+5,32) );
416 PrintAndLog("-------------------------------------------------------------");
421 int CmdDump(const char *Cmd
){
424 uint8_t pwd
[4] = {0x00};
426 char cmdp
= param_getchar(Cmd
, 0);
427 if ( cmdp
== 'h' || cmdp
== 'H') {
432 bool hasPwd
= ( strlen(Cmd
) > 0);
434 if (param_gethex(Cmd
, 0, pwd
, 8)) {
435 PrintAndLog("password must include 8 HEX symbols");
440 for ( int i
= 0; i
<8; ++i
){
441 memset(s
,0,sizeof(s
));
443 sprintf(s
,"%d %02x%02x%02x%02x", i
, pwd
[0],pwd
[1],pwd
[2],pwd
[3]);
452 int CmdIceFsk(const char *Cmd
){
454 if (!HasGraphData()) return 0;
456 iceFsk3(GraphBuffer
, LF_TRACE_BUFF_SIZE
);
457 RepaintGraphWindow();
460 int CmdIceManchester(const char *Cmd
){
461 ManchesterDemod( -1);
464 int ManchesterDemod(int blockNum
){
466 if (!HasGraphData()) return 0;
468 uint8_t sizebyte
= 32;
469 // the value 5 was selected during empirical studies of the decoded data. Some signal noise to skip.
472 uint8_t bits
[LF_BITSSTREAM_LEN
] = {0x00};
473 uint8_t * bitstream
= bits
;
475 manchester_decode(GraphBuffer
, LF_TRACE_BUFF_SIZE
, bits
, LF_BITSSTREAM_LEN
);
476 blockData
= PackBits(offset
, sizebyte
, bits
);
479 PrintAndLog(" Decoded : 0x%08X %s", blockData
, sprint_bin(bitstream
+offset
,sizebyte
) );
481 PrintAndLog(" Block %d : 0x%08X %s", blockNum
, blockData
, sprint_bin(bitstream
+offset
,sizebyte
) );
486 char * GetBitRateStr(uint32_t id
){
491 sprintf(retStr
,"%d - RF/8",id
);
494 sprintf(retStr
,"%d - RF/16",id
);
497 sprintf(retStr
,"%d - RF/32",id
);
500 sprintf(retStr
,"%d - RF/40",id
);
503 sprintf(retStr
,"%d - RF/50",id
);
506 sprintf(retStr
,"%d - RF/64",id
);
509 sprintf(retStr
,"%d - RF/100",id
);
512 sprintf(retStr
,"%d - RF/128",id
);
515 sprintf(retStr
,"%d - (Unknown)",id
);
522 char * GetSaferStr(uint32_t id
){
526 sprintf(retStr
,"%d",id
);
528 sprintf(retStr
,"%d - pasdwd",id
);
531 sprintf(retStr
,"%d - testmode ",id
);
536 char * GetModulationStr( uint32_t id
){
542 sprintf(retStr
,"%d - DIRECT (ASK/NRZ)",id
);
545 sprintf(retStr
,"%d - PSK 1 phase change when input changes",id
);
548 sprintf(retStr
,"%d - PSK 2 phase change on bitclk if input high",id
);
551 sprintf(retStr
,"%d - PSK 3 phase change on rising edge of input",id
);
554 sprintf(retStr
,"%d - FSK 1 RF/8 RF/5",id
);
557 sprintf(retStr
,"%d - FSK 2 RF/8 RF/10",id
);
560 sprintf(retStr
,"%d - FSK 1a RF/5 RF/8",id
);
563 sprintf(retStr
,"%d - FSK 2a RF/10 RF/8",id
);
566 sprintf(retStr
,"%d - Manschester",id
);
569 sprintf(retStr
,"%d - Biphase",id
);
572 sprintf(retStr
,"%d - Reserved",id
);
575 sprintf(retStr
,"0x%02X (Unknown)",id
);
582 uint32_t PackBits(uint8_t start
, uint8_t len
, uint8_t* bits
){
590 for (; j
>= 0; --j
, ++i
){
596 static command_t CommandTable
[] =
598 {"help", CmdHelp
, 1, "This help"},
599 {"rd", CmdReadBlk
, 0, "<block> [password] -- Read T55xx block data (page 0) [optional password]"},
600 {"wr", CmdWriteBlk
, 0, "<block> <data> [password] -- Write T55xx block data (page 0) [optional password]"},
601 {"trace", CmdReadTrace
, 0, "[1] Read T55xx traceability data (page 1/ blk 0-1)"},
602 {"info", CmdInfo
, 0, "[1] Read T55xx configuration data (page 0/ blk 0)"},
603 {"dump", CmdDump
, 0, "[password] Dump T55xx card block 0-7. [optional password]"},
604 {"man", CmdIceManchester
, 0, "Manchester demod (with SST)"},
605 {NULL
, NULL
, 0, NULL
}
608 int CmdLFT55XX(const char *Cmd
)
610 CmdsParse(CommandTable
, Cmd
);
614 int CmdHelp(const char *Cmd
)
616 CmdsHelp(CommandTable
);