]> git.zerfleddert.de Git - proxmark3-svn/blob - client/cmdhf.c
adjust ManchesterEncode
[proxmark3-svn] / client / cmdhf.c
1 //-----------------------------------------------------------------------------
2 // Copyright (C) 2010 iZsh <izsh at fail0verflow.com>
3 //
4 // This code is licensed to you under the terms of the GNU GPL, version 2 or,
5 // at your option, any later version. See the LICENSE.txt file for the text of
6 // the license.
7 //-----------------------------------------------------------------------------
8 // High frequency commands
9 //-----------------------------------------------------------------------------
10
11 #include <stdio.h>
12 #include <string.h>
13 #include "proxmark3.h"
14 #include "util.h"
15 #include "ui.h"
16 #include "iso14443crc.h"
17 #include "cmdmain.h"
18 #include "cmdparser.h"
19 #include "cmdhf.h"
20 #include "cmdhf14a.h"
21 #include "cmdhf14b.h"
22 #include "cmdhf15.h"
23 #include "cmdhfepa.h"
24 #include "cmdhflegic.h"
25 #include "cmdhficlass.h"
26 #include "cmdhfmf.h"
27 #include "cmdhfmfu.h"
28 #include "cmdhftopaz.h"
29 #include "protocols.h"
30
31 static int CmdHelp(const char *Cmd);
32
33 int CmdHFTune(const char *Cmd)
34 {
35 UsbCommand c={CMD_MEASURE_ANTENNA_TUNING_HF};
36 SendCommand(&c);
37 return 0;
38 }
39
40
41 void annotateIso14443a(char *exp, size_t size, uint8_t* cmd, uint8_t cmdsize)
42 {
43 switch(cmd[0])
44 {
45 case ISO14443A_CMD_WUPA: snprintf(exp,size,"WUPA"); break;
46 case ISO14443A_CMD_ANTICOLL_OR_SELECT:{
47 // 93 20 = Anticollision (usage: 9320 - answer: 4bytes UID+1byte UID-bytes-xor)
48 // 93 70 = Select (usage: 9370+5bytes 9320 answer - answer: 1byte SAK)
49 if(cmd[1] == 0x70)
50 {
51 snprintf(exp,size,"SELECT_UID"); break;
52 }else
53 {
54 snprintf(exp,size,"ANTICOLL"); break;
55 }
56 }
57 case ISO14443A_CMD_ANTICOLL_OR_SELECT_2:{
58 //95 20 = Anticollision of cascade level2
59 //95 70 = Select of cascade level2
60 if(cmd[2] == 0x70)
61 {
62 snprintf(exp,size,"SELECT_UID-2"); break;
63 }else
64 {
65 snprintf(exp,size,"ANTICOLL-2"); break;
66 }
67 }
68 case ISO14443A_CMD_REQA: snprintf(exp,size,"REQA"); break;
69 case ISO14443A_CMD_READBLOCK: snprintf(exp,size,"READBLOCK(%d)",cmd[1]); break;
70 case ISO14443A_CMD_WRITEBLOCK: snprintf(exp,size,"WRITEBLOCK(%d)",cmd[1]); break;
71 case ISO14443A_CMD_HALT: snprintf(exp,size,"HALT"); break;
72 case ISO14443A_CMD_RATS: snprintf(exp,size,"RATS"); break;
73 case MIFARE_CMD_INC: snprintf(exp,size,"INC(%d)",cmd[1]); break;
74 case MIFARE_CMD_DEC: snprintf(exp,size,"DEC(%d)",cmd[1]); break;
75 case MIFARE_CMD_RESTORE: snprintf(exp,size,"RESTORE(%d)",cmd[1]); break;
76 case MIFARE_CMD_TRANSFER: snprintf(exp,size,"TRANSFER(%d)",cmd[1]); break;
77 case MIFARE_AUTH_KEYA:{
78 if ( cmdsize > 3)
79 snprintf(exp,size,"AUTH-A(%d)",cmd[1]);
80 else
81 // case MIFARE_ULEV1_VERSION : both 0x60.
82 snprintf(exp,size,"EV1 VERSION");
83 break;
84 }
85 case MIFARE_AUTH_KEYB: snprintf(exp,size,"AUTH-B(%d)",cmd[1]); break;
86 case MIFARE_MAGICWUPC1: snprintf(exp,size,"MAGIC WUPC1"); break;
87 case MIFARE_MAGICWUPC2: snprintf(exp,size,"MAGIC WUPC2"); break;
88 case MIFARE_MAGICWIPEC: snprintf(exp,size,"MAGIC WIPEC"); break;
89 case MIFARE_ULC_AUTH_1: snprintf(exp,size,"AUTH "); break;
90 case MIFARE_ULC_AUTH_2: snprintf(exp,size,"AUTH_ANSW"); break;
91 case MIFARE_ULEV1_AUTH:
92 if ( cmdsize == 7 )
93 snprintf(exp,size,"PWD-AUTH KEY: 0x%02x%02x%02x%02x", cmd[1], cmd[2], cmd[3], cmd[4] );
94 else
95 snprintf(exp,size,"PWD-AUTH");
96 break;
97 case MIFARE_ULEV1_FASTREAD:{
98 if ( cmdsize >=3 && cmd[2] <= 0xE6)
99 snprintf(exp,size,"READ RANGE (%d-%d)",cmd[1],cmd[2]);
100 else
101 snprintf(exp,size,"?");
102 break;
103 }
104 case MIFARE_ULC_WRITE:{
105 if ( cmd[1] < 0x21 )
106 snprintf(exp,size,"WRITEBLOCK(%d)",cmd[1]);
107 else
108 snprintf(exp,size,"?");
109 break;
110 }
111 case MIFARE_ULEV1_READ_CNT:{
112 if ( cmd[1] < 5 )
113 snprintf(exp,size,"READ CNT(%d)",cmd[1]);
114 else
115 snprintf(exp,size,"?");
116 break;
117 }
118 case MIFARE_ULEV1_INCR_CNT:{
119 if ( cmd[1] < 5 )
120 snprintf(exp,size,"INCR(%d)",cmd[1]);
121 else
122 snprintf(exp,size,"?");
123 break;
124 }
125 case MIFARE_ULEV1_READSIG: snprintf(exp,size,"READ_SIG"); break;
126 case MIFARE_ULEV1_CHECKTEAR: snprintf(exp,size,"CHK_TEARING(%d)",cmd[1]); break;
127 case MIFARE_ULEV1_VCSL: snprintf(exp,size,"VCSL"); break;
128 default: snprintf(exp,size,"?"); break;
129 }
130 return;
131 }
132
133 void annotateIclass(char *exp, size_t size, uint8_t* cmd, uint8_t cmdsize)
134 {
135 switch(cmd[0])
136 {
137 case ICLASS_CMD_ACTALL: snprintf(exp,size,"ACTALL"); break;
138 case ICLASS_CMD_READ_OR_IDENTIFY:{
139 if(cmdsize > 1){
140 snprintf(exp,size,"READ(%d)",cmd[1]);
141 }else{
142 snprintf(exp,size,"IDENTIFY");
143 }
144 break;
145 }
146 case ICLASS_CMD_SELECT: snprintf(exp,size,"SELECT"); break;
147 case ICLASS_CMD_PAGESEL: snprintf(exp,size,"PAGESEL(%d)", cmd[1]); break;
148 case ICLASS_CMD_READCHECK_KC:snprintf(exp,size,"READCHECK[Kc](%d)", cmd[1]); break;
149 case ICLASS_CMD_READCHECK_KD:snprintf(exp,size,"READCHECK[Kd](%d)", cmd[1]); break;
150 case ICLASS_CMD_CHECK: snprintf(exp,size,"CHECK"); break;
151 case ICLASS_CMD_DETECT: snprintf(exp,size,"DETECT"); break;
152 case ICLASS_CMD_HALT: snprintf(exp,size,"HALT"); break;
153 case ICLASS_CMD_UPDATE: snprintf(exp,size,"UPDATE(%d)",cmd[1]); break;
154 case ICLASS_CMD_ACT: snprintf(exp,size,"ACT"); break;
155 case ICLASS_CMD_READ4: snprintf(exp,size,"READ4(%d)",cmd[1]); break;
156 default: snprintf(exp,size,"?"); break;
157 }
158 return;
159 }
160
161 void annotateIso15693(char *exp, size_t size, uint8_t* cmd, uint8_t cmdsize)
162 {
163
164 if(cmd[0] == 0x26)
165 {
166 switch(cmd[1]){
167 case ISO15693_INVENTORY :snprintf(exp, size, "INVENTORY");break;
168 case ISO15693_STAYQUIET :snprintf(exp, size, "STAY_QUIET");break;
169 default: snprintf(exp,size,"?"); break;
170
171 }
172 }else if(cmd[0] == 0x02)
173 {
174 switch(cmd[1])
175 {
176 case ISO15693_READBLOCK :snprintf(exp, size, "READBLOCK");break;
177 case ISO15693_WRITEBLOCK :snprintf(exp, size, "WRITEBLOCK");break;
178 case ISO15693_LOCKBLOCK :snprintf(exp, size, "LOCKBLOCK");break;
179 case ISO15693_READ_MULTI_BLOCK :snprintf(exp, size, "READ_MULTI_BLOCK");break;
180 case ISO15693_SELECT :snprintf(exp, size, "SELECT");break;
181 case ISO15693_RESET_TO_READY :snprintf(exp, size, "RESET_TO_READY");break;
182 case ISO15693_WRITE_AFI :snprintf(exp, size, "WRITE_AFI");break;
183 case ISO15693_LOCK_AFI :snprintf(exp, size, "LOCK_AFI");break;
184 case ISO15693_WRITE_DSFID :snprintf(exp, size, "WRITE_DSFID");break;
185 case ISO15693_LOCK_DSFID :snprintf(exp, size, "LOCK_DSFID");break;
186 case ISO15693_GET_SYSTEM_INFO :snprintf(exp, size, "GET_SYSTEM_INFO");break;
187 case ISO15693_READ_MULTI_SECSTATUS :snprintf(exp, size, "READ_MULTI_SECSTATUS");break;
188 default: snprintf(exp,size,"?"); break;
189 }
190 }
191 }
192
193
194 void annotateTopaz(char *exp, size_t size, uint8_t* cmd, uint8_t cmdsize)
195 {
196 switch(cmd[0]) {
197 case TOPAZ_REQA :snprintf(exp, size, "REQA");break;
198 case TOPAZ_WUPA :snprintf(exp, size, "WUPA");break;
199 case TOPAZ_RID :snprintf(exp, size, "RID");break;
200 case TOPAZ_RALL :snprintf(exp, size, "RALL");break;
201 case TOPAZ_READ :snprintf(exp, size, "READ");break;
202 case TOPAZ_WRITE_E :snprintf(exp, size, "WRITE-E");break;
203 case TOPAZ_WRITE_NE :snprintf(exp, size, "WRITE-NE");break;
204 case TOPAZ_RSEG :snprintf(exp, size, "RSEG");break;
205 case TOPAZ_READ8 :snprintf(exp, size, "READ8");break;
206 case TOPAZ_WRITE_E8 :snprintf(exp, size, "WRITE-E8");break;
207 case TOPAZ_WRITE_NE8 :snprintf(exp, size, "WRITE-NE8");break;
208 default: snprintf(exp,size,"?"); break;
209 }
210 }
211
212
213 /**
214 06 00 = INITIATE
215 0E xx = SELECT ID (xx = Chip-ID)
216 0B = Get UID
217 08 yy = Read Block (yy = block number)
218 09 yy dd dd dd dd = Write Block (yy = block number; dd dd dd dd = data to be written)
219 0C = Reset to Inventory
220 0F = Completion
221 0A 11 22 33 44 55 66 = Authenticate (11 22 33 44 55 66 = data to authenticate)
222 **/
223
224 void annotateIso14443b(char *exp, size_t size, uint8_t* cmd, uint8_t cmdsize)
225 {
226 switch(cmd[0]){
227 case ISO14443B_REQB : snprintf(exp,size,"REQB");break;
228 case ISO14443B_ATTRIB : snprintf(exp,size,"ATTRIB");break;
229 case ISO14443B_HALT : snprintf(exp,size,"HALT");break;
230 case ISO14443B_INITIATE : snprintf(exp,size,"INITIATE");break;
231 case ISO14443B_SELECT : snprintf(exp,size,"SELECT(%d)",cmd[1]);break;
232 case ISO14443B_GET_UID : snprintf(exp,size,"GET UID");break;
233 case ISO14443B_READ_BLK : snprintf(exp,size,"READ_BLK(%d)", cmd[1]);break;
234 case ISO14443B_WRITE_BLK : snprintf(exp,size,"WRITE_BLK(%d)",cmd[1]);break;
235 case ISO14443B_RESET : snprintf(exp,size,"RESET");break;
236 case ISO14443B_COMPLETION : snprintf(exp,size,"COMPLETION");break;
237 case ISO14443B_AUTHENTICATE : snprintf(exp,size,"AUTHENTICATE");break;
238 default : snprintf(exp,size ,"?");break;
239 }
240
241 }
242
243 /**
244 * @brief iso14443A_CRC_check Checks CRC in command or response
245 * @param isResponse
246 * @param data
247 * @param len
248 * @return 0 : CRC-command, CRC not ok
249 * 1 : CRC-command, CRC ok
250 * 2 : Not crc-command
251 */
252
253 uint8_t iso14443A_CRC_check(bool isResponse, uint8_t* data, uint8_t len)
254 {
255 uint8_t b1,b2;
256
257 if(len <= 2) return 2;
258
259 if(isResponse & (len < 6)) return 2;
260
261 ComputeCrc14443(CRC_14443_A, data, len-2, &b1, &b2);
262 if (b1 != data[len-2] || b2 != data[len-1]) {
263 return 0;
264 } else {
265 return 1;
266 }
267 }
268
269
270 /**
271 * @brief iso14443B_CRC_check Checks CRC in command or response
272 * @param isResponse
273 * @param data
274 * @param len
275 * @return 0 : CRC-command, CRC not ok
276 * 1 : CRC-command, CRC ok
277 * 2 : Not crc-command
278 */
279
280 uint8_t iso14443B_CRC_check(bool isResponse, uint8_t* data, uint8_t len)
281 {
282 uint8_t b1,b2;
283
284 if(len <= 2) return 2;
285
286 ComputeCrc14443(CRC_14443_B, data, len-2, &b1, &b2);
287 if(b1 != data[len-2] || b2 != data[len-1]) {
288 return 0;
289 } else {
290 return 1;
291 }
292 }
293
294 /**
295 * @brief iclass_CRC_Ok Checks CRC in command or response
296 * @param isResponse
297 * @param data
298 * @param len
299 * @return 0 : CRC-command, CRC not ok
300 * 1 : CRC-command, CRC ok
301 * 2 : Not crc-command
302 */
303 uint8_t iclass_CRC_check(bool isResponse, uint8_t* data, uint8_t len)
304 {
305 if(len < 4) return 2;//CRC commands (and responses) are all at least 4 bytes
306
307 uint8_t b1, b2;
308
309 if(!isResponse)//Commands to tag
310 {
311 /**
312 These commands should have CRC. Total length leftmost
313 4 READ
314 4 READ4
315 12 UPDATE - unsecured, ends with CRC16
316 14 UPDATE - secured, ends with signature instead
317 4 PAGESEL
318 **/
319 if(len == 4 || len == 12)//Covers three of them
320 {
321 //Don't include the command byte
322 ComputeCrc14443(CRC_ICLASS, (data+1), len-3, &b1, &b2);
323 return b1 == data[len -2] && b2 == data[len-1];
324 }
325 return 2;
326 }else{
327 /**
328 These tag responses should have CRC. Total length leftmost
329
330 10 READ data[8] crc[2]
331 34 READ4 data[32]crc[2]
332 10 UPDATE data[8] crc[2]
333 10 SELECT csn[8] crc[2]
334 10 IDENTIFY asnb[8] crc[2]
335 10 PAGESEL block1[8] crc[2]
336 10 DETECT csn[8] crc[2]
337
338 These should not
339
340 4 CHECK chip_response[4]
341 8 READCHECK data[8]
342 1 ACTALL sof[1]
343 1 ACT sof[1]
344
345 In conclusion, without looking at the command; any response
346 of length 10 or 34 should have CRC
347 **/
348 if(len != 10 && len != 34) return true;
349
350 ComputeCrc14443(CRC_ICLASS, data, len-2, &b1, &b2);
351 return b1 == data[len -2] && b2 == data[len-1];
352 }
353 }
354
355
356 bool is_last_record(uint16_t tracepos, uint8_t *trace, uint16_t traceLen)
357 {
358 return(tracepos + sizeof(uint32_t) + sizeof(uint16_t) + sizeof(uint16_t) >= traceLen);
359 }
360
361
362 bool next_record_is_response(uint16_t tracepos, uint8_t *trace)
363 {
364 uint16_t next_records_datalen = *((uint16_t *)(trace + tracepos + sizeof(uint32_t) + sizeof(uint16_t)));
365
366 return(next_records_datalen & 0x8000);
367 }
368
369
370 bool merge_topaz_reader_frames(uint32_t timestamp, uint32_t *duration, uint16_t *tracepos, uint16_t traceLen, uint8_t *trace, uint8_t *frame, uint8_t *topaz_reader_command, uint16_t *data_len)
371 {
372
373 #define MAX_TOPAZ_READER_CMD_LEN 16
374
375 uint32_t last_timestamp = timestamp + *duration;
376
377 if ((*data_len != 1) || (frame[0] == TOPAZ_WUPA) || (frame[0] == TOPAZ_REQA)) return false;
378
379 memcpy(topaz_reader_command, frame, *data_len);
380
381 while (!is_last_record(*tracepos, trace, traceLen) && !next_record_is_response(*tracepos, trace)) {
382 uint32_t next_timestamp = *((uint32_t *)(trace + *tracepos));
383 *tracepos += sizeof(uint32_t);
384 uint16_t next_duration = *((uint16_t *)(trace + *tracepos));
385 *tracepos += sizeof(uint16_t);
386 uint16_t next_data_len = *((uint16_t *)(trace + *tracepos)) & 0x7FFF;
387 *tracepos += sizeof(uint16_t);
388 uint8_t *next_frame = (trace + *tracepos);
389 *tracepos += next_data_len;
390 if ((next_data_len == 1) && (*data_len + next_data_len <= MAX_TOPAZ_READER_CMD_LEN)) {
391 memcpy(topaz_reader_command + *data_len, next_frame, next_data_len);
392 *data_len += next_data_len;
393 last_timestamp = next_timestamp + next_duration;
394 } else {
395 // rewind and exit
396 *tracepos = *tracepos - next_data_len - sizeof(uint16_t) - sizeof(uint16_t) - sizeof(uint32_t);
397 break;
398 }
399 uint16_t next_parity_len = (next_data_len-1)/8 + 1;
400 *tracepos += next_parity_len;
401 }
402
403 *duration = last_timestamp - timestamp;
404
405 return true;
406 }
407
408
409 uint16_t printTraceLine(uint16_t tracepos, uint16_t traceLen, uint8_t *trace, uint8_t protocol, bool showWaitCycles, bool markCRCBytes)
410 {
411 bool isResponse;
412 uint16_t data_len, parity_len;
413 uint32_t duration;
414 uint8_t topaz_reader_command[9];
415 uint32_t timestamp, first_timestamp, EndOfTransmissionTimestamp;
416 char explanation[30] = {0};
417
418 if (tracepos + sizeof(uint32_t) + sizeof(uint16_t) + sizeof(uint16_t) > traceLen) return traceLen;
419
420 first_timestamp = *((uint32_t *)(trace));
421 timestamp = *((uint32_t *)(trace + tracepos));
422
423 tracepos += 4;
424 duration = *((uint16_t *)(trace + tracepos));
425 tracepos += 2;
426 data_len = *((uint16_t *)(trace + tracepos));
427 tracepos += 2;
428
429 if (data_len & 0x8000) {
430 data_len &= 0x7fff;
431 isResponse = true;
432 } else {
433 isResponse = false;
434 }
435 parity_len = (data_len-1)/8 + 1;
436
437 if (tracepos + data_len + parity_len > traceLen) {
438 return traceLen;
439 }
440 uint8_t *frame = trace + tracepos;
441 tracepos += data_len;
442 uint8_t *parityBytes = trace + tracepos;
443 tracepos += parity_len;
444
445 if (protocol == TOPAZ && !isResponse) {
446 // topaz reader commands come in 1 or 9 separate frames with 7 or 8 Bits each.
447 // merge them:
448 if (merge_topaz_reader_frames(timestamp, &duration, &tracepos, traceLen, trace, frame, topaz_reader_command, &data_len)) {
449 frame = topaz_reader_command;
450 }
451 }
452
453 //Check the CRC status
454 uint8_t crcStatus = 2;
455
456 if (data_len > 2) {
457 switch (protocol) {
458 case ICLASS:
459 crcStatus = iclass_CRC_check(isResponse, frame, data_len);
460 break;
461 case ISO_14443B:
462 case TOPAZ:
463 crcStatus = iso14443B_CRC_check(isResponse, frame, data_len);
464 break;
465 case ISO_14443A:
466 crcStatus = iso14443A_CRC_check(isResponse, frame, data_len);
467 break;
468 default:
469 break;
470 }
471 }
472 //0 CRC-command, CRC not ok
473 //1 CRC-command, CRC ok
474 //2 Not crc-command
475
476 //--- Draw the data column
477 //char line[16][110];
478 char line[16][110];
479
480 for (int j = 0; j < data_len && j/16 < 16; j++) {
481
482 int oddparity = 0x01;
483 int k;
484
485 for (k=0 ; k<8 ; k++) {
486 oddparity ^= (((frame[j] & 0xFF) >> k) & 0x01);
487 }
488 uint8_t parityBits = parityBytes[j>>3];
489 if (protocol != ISO_14443B && (isResponse || protocol == ISO_14443A) && (oddparity != ((parityBits >> (7-(j&0x0007))) & 0x01))) {
490 snprintf(line[j/16]+(( j % 16) * 4),110, "%02x! ", frame[j]);
491 } else {
492 snprintf(line[j/16]+(( j % 16) * 4), 110, " %02x ", frame[j]);
493 }
494
495 }
496
497 if (markCRCBytes) {
498 if(crcStatus == 0 || crcStatus == 1)
499 {//CRC-command
500 char *pos1 = line[(data_len-2)/16]+(((data_len-2) % 16) * 4);
501 (*pos1) = '[';
502 char *pos2 = line[(data_len)/16]+(((data_len) % 16) * 4);
503 sprintf(pos2, "%c", ']');
504 }
505 }
506
507 if(data_len == 0)
508 {
509 if(data_len == 0){
510 sprintf(line[0],"<empty trace - possible error>");
511 }
512 }
513 //--- Draw the CRC column
514
515 char *crc = (crcStatus == 0 ? "!crc" : (crcStatus == 1 ? " ok " : " "));
516
517 EndOfTransmissionTimestamp = timestamp + duration;
518
519 if(!isResponse)
520 {
521 switch(protocol) {
522 case ICLASS: annotateIclass(explanation,sizeof(explanation),frame,data_len); break;
523 case ISO_14443A: annotateIso14443a(explanation,sizeof(explanation),frame,data_len); break;
524 case ISO_14443B: annotateIso14443b(explanation,sizeof(explanation),frame,data_len); break;
525 case TOPAZ: annotateTopaz(explanation,sizeof(explanation),frame,data_len); break;
526 default: break;
527 }
528 }
529
530 int num_lines = MIN((data_len - 1)/16 + 1, 16);
531 for (int j = 0; j < num_lines ; j++) {
532 if (j == 0) {
533 PrintAndLog(" %10d | %10d | %s |%-64s | %s| %s",
534 (timestamp - first_timestamp),
535 (EndOfTransmissionTimestamp - first_timestamp),
536 (isResponse ? "Tag" : "Rdr"),
537 line[j],
538 (j == num_lines-1) ? crc : " ",
539 (j == num_lines-1) ? explanation : "");
540 } else {
541 PrintAndLog(" | | |%-64s | %s| %s",
542 line[j],
543 (j == num_lines-1) ? crc : " ",
544 (j == num_lines-1) ? explanation : "");
545 }
546 }
547
548 if (is_last_record(tracepos, trace, traceLen)) return traceLen;
549
550 if (showWaitCycles && !isResponse && next_record_is_response(tracepos, trace)) {
551 uint32_t next_timestamp = *((uint32_t *)(trace + tracepos));
552 PrintAndLog(" %9d | %9d | %s | fdt (Frame Delay Time): %d",
553 (EndOfTransmissionTimestamp - first_timestamp),
554 (next_timestamp - first_timestamp),
555 " ",
556 (next_timestamp - EndOfTransmissionTimestamp));
557 }
558
559 return tracepos;
560 }
561
562
563 int CmdHFList(const char *Cmd)
564 {
565 bool showWaitCycles = false;
566 bool markCRCBytes = false;
567 char type[40] = {0};
568 int tlen = param_getstr(Cmd,0,type);
569 char param1 = param_getchar(Cmd, 1);
570 char param2 = param_getchar(Cmd, 2);
571 bool errors = false;
572 uint8_t protocol = 0;
573 //Validate params
574
575 if(tlen == 0) {
576 errors = true;
577 }
578
579 if(param1 == 'h'
580 || (param1 != 0 && param1 != 'f' && param1 != 'c')
581 || (param2 != 0 && param2 != 'f' && param2 != 'c')) {
582 errors = true;
583 }
584
585 if(!errors) {
586 if(strcmp(type, "iclass") == 0) {
587 protocol = ICLASS;
588 } else if(strcmp(type, "14a") == 0) {
589 protocol = ISO_14443A;
590 } else if(strcmp(type, "14b") == 0) {
591 protocol = ISO_14443B;
592 } else if(strcmp(type,"topaz")== 0) {
593 protocol = TOPAZ;
594 } else if(strcmp(type,"raw")== 0) {
595 protocol = -1;//No crc, no annotations
596 } else {
597 errors = true;
598 }
599 }
600
601 if (errors) {
602 PrintAndLog("List protocol data in trace buffer.");
603 PrintAndLog("Usage: hf list <protocol> [f][c]");
604 PrintAndLog(" f - show frame delay times as well");
605 PrintAndLog(" c - mark CRC bytes");
606 PrintAndLog("Supported <protocol> values:");
607 PrintAndLog(" raw - just show raw data without annotations");
608 PrintAndLog(" 14a - interpret data as iso14443a communications");
609 PrintAndLog(" 14b - interpret data as iso14443b communications");
610 PrintAndLog(" iclass - interpret data as iclass communications");
611 PrintAndLog(" topaz - interpret data as topaz communications");
612 PrintAndLog("");
613 PrintAndLog("example: hf list 14a f");
614 PrintAndLog("example: hf list iclass");
615 return 0;
616 }
617
618
619 if (param1 == 'f' || param2 == 'f') {
620 showWaitCycles = true;
621 }
622
623 if (param1 == 'c' || param2 == 'c') {
624 markCRCBytes = true;
625 }
626
627 uint8_t *trace;
628 uint16_t tracepos = 0;
629 trace = malloc(USB_CMD_DATA_SIZE);
630
631 // Query for the size of the trace
632 UsbCommand response;
633 GetFromBigBuf(trace, USB_CMD_DATA_SIZE, 0);
634 WaitForResponse(CMD_ACK, &response);
635 uint16_t traceLen = response.arg[2];
636 if (traceLen > USB_CMD_DATA_SIZE) {
637 uint8_t *p = realloc(trace, traceLen);
638 if (p == NULL) {
639 PrintAndLog("Cannot allocate memory for trace");
640 free(trace);
641 return 2;
642 }
643 trace = p;
644 GetFromBigBuf(trace, traceLen, 0);
645 WaitForResponse(CMD_ACK, NULL);
646 }
647
648 PrintAndLog("Recorded Activity (TraceLen = %d bytes)", traceLen);
649 PrintAndLog("");
650 PrintAndLog("Start = Start of Start Bit, End = End of last modulation. Src = Source of Transfer");
651 PrintAndLog("iso14443a - All times are in carrier periods (1/13.56Mhz)");
652 PrintAndLog("iClass - Timings are not as accurate");
653 PrintAndLog("");
654 PrintAndLog(" Start | End | Src | Data (! denotes parity error) | CRC | Annotation |");
655 PrintAndLog("------------|------------|-----|-----------------------------------------------------------------|-----|--------------------|");
656
657 while(tracepos < traceLen)
658 {
659 tracepos = printTraceLine(tracepos, traceLen, trace, protocol, showWaitCycles, markCRCBytes);
660 }
661
662 free(trace);
663 return 0;
664 }
665
666 int CmdHFSearch(const char *Cmd){
667 int ans = 0;
668 PrintAndLog("");
669 ans = CmdHF14AReader("s");
670 if (ans > 0) {
671 PrintAndLog("\nValid ISO14443A Tag Found - Quiting Search\n");
672 return ans;
673 }
674 ans = HFiClassReader("", false, false);
675 if (ans) {
676 PrintAndLog("\nValid iClass Tag (or PicoPass Tag) Found - Quiting Search\n");
677 return ans;
678 }
679 ans = HF14BInfo(false);
680 if (ans) {
681 PrintAndLog("\nValid ISO14443B Tag Found - Quiting Search\n");
682 return ans;
683 }
684 ans = HF15Reader("", false);
685 if (ans) {
686 PrintAndLog("\nValid ISO15693 Tag Found - Quiting Search\n");
687 return ans;
688 }
689 PrintAndLog("\nno known/supported 13.56 MHz tags found\n");
690 return 0;
691 }
692
693 int CmdHFSnoop(const char *Cmd)
694 {
695 char * pEnd;
696 UsbCommand c = {CMD_HF_SNIFFER, {strtol(Cmd, &pEnd,0),strtol(pEnd, &pEnd,0),0}};
697 SendCommand(&c);
698 return 0;
699 }
700
701 static command_t CommandTable[] =
702 {
703 {"help", CmdHelp, 1, "This help"},
704 {"14a", CmdHF14A, 1, "{ ISO14443A RFIDs... }"},
705 {"14b", CmdHF14B, 1, "{ ISO14443B RFIDs... }"},
706 {"15", CmdHF15, 1, "{ ISO15693 RFIDs... }"},
707 {"epa", CmdHFEPA, 1, "{ German Identification Card... }"},
708 {"legic", CmdHFLegic, 0, "{ LEGIC RFIDs... }"},
709 {"iclass", CmdHFiClass, 1, "{ ICLASS RFIDs... }"},
710 {"mf", CmdHFMF, 1, "{ MIFARE RFIDs... }"},
711 {"mfu", CmdHFMFUltra, 1, "{ MIFARE Ultralight RFIDs... }"},
712 {"topaz", CmdHFTopaz, 1, "{ TOPAZ (NFC Type 1) RFIDs... }"},
713 {"tune", CmdHFTune, 0, "Continuously measure HF antenna tuning"},
714 {"list", CmdHFList, 1, "List protocol data in trace buffer"},
715 {"search", CmdHFSearch, 1, "Search for known HF tags [preliminary]"},
716 {"snoop", CmdHFSnoop, 0, "<samples to skip (10000)> <triggers to skip (1)> Generic HF Snoop"},
717 {NULL, NULL, 0, NULL}
718 };
719
720 int CmdHF(const char *Cmd)
721 {
722 CmdsParse(CommandTable, Cmd);
723 return 0;
724 }
725
726 int CmdHelp(const char *Cmd)
727 {
728 CmdsHelp(CommandTable);
729 return 0;
730 }
Impressum, Datenschutz