1 //-----------------------------------------------------------------------------
2 // This code is licensed to you under the terms of the GNU GPL, version 2 or,
3 // at your option, any later version. See the LICENSE.txt file for the text of
5 //-----------------------------------------------------------------------------
6 // HitagS emulation (preliminary test version)
8 // (c) 2016 Oguzhan Cicek, Hendrik Schwartke, Ralf Spenneberg
10 //-----------------------------------------------------------------------------
11 // Some code was copied from Hitag2.c
12 //-----------------------------------------------------------------------------
16 #include "proxmark3.h"
24 #define CRC_PRESET 0xFF
25 #define CRC_POLYNOM 0x1D
30 #define rev8(x) ((((x)>>7)&1)+((((x)>>6)&1)<<1)+((((x)>>5)&1)<<2)+((((x)>>4)&1)<<3)+((((x)>>3)&1)<<4)+((((x)>>2)&1)<<5)+((((x)>>1)&1)<<6)+(((x)&1)<<7))
31 #define rev16(x) (rev8 (x)+(rev8 (x>> 8)<< 8))
32 #define rev32(x) (rev16(x)+(rev16(x>>16)<<16))
33 #define rev64(x) (rev32(x)+(rev32(x>>32)<<32))
34 #define bit(x,n) (((x)>>(n))&1)
35 #define bit32(x,n) ((((x)[(n)>>5])>>((n)))&1)
36 #define inv32(x,i,n) ((x)[(i)>>5]^=((u32)(n))<<((i)&31))
37 #define rotl64(x, n) ((((u64)(x))<<((n)&63))+(((u64)(x))>>((0-(n))&63)))
40 static bool bSuccessful
;
41 static struct hitagS_tag tag
;
42 static byte_t page_to_be_written
= 0;
43 static int block_data_left
= 0;
44 typedef enum modulation
{
45 AC2K
= 0, AC4K
, MC4K
, MC8K
47 static MOD m
= AC2K
; //used modulation
48 static uint32_t temp_uid
;
50 static int sof_bits
; //number of start-of-frame bits
51 static byte_t pwdh0
, pwdl0
, pwdl1
; //password bytes
52 static uint32_t rnd
= 0x74124485; //randomnumber
57 // Single bit Hitag2 functions:
58 #define i4(x,a,b,c,d) ((u32)((((x)>>(a))&1)+(((x)>>(b))&1)*2+(((x)>>(c))&1)*4+(((x)>>(d))&1)*8))
59 static const u32 ht2_f4a
= 0x2C79; // 0010 1100 0111 1001
60 static const u32 ht2_f4b
= 0x6671; // 0110 0110 0111 0001
61 static const u32 ht2_f5c
= 0x7907287B; // 0111 1001 0000 0111 0010 1000 0111 1011
62 #define ht2bs_4a(a,b,c,d) (~(((a|b)&c)^(a|d)^b))
63 #define ht2bs_4b(a,b,c,d) (~(((d|c)&(a^b))^(d|a|b)))
64 #define ht2bs_5c(a,b,c,d,e) (~((((((c^e)|d)&a)^b)&(c^b))^(((d^e)|a)&((d^b)|c))))
67 static u32
f20(const u64 x
) {
70 i5
= ((ht2_f4a
>> i4(x
, 1, 2, 4, 5)) & 1) * 1
71 + ((ht2_f4b
>> i4(x
, 7, 11, 13, 14)) & 1) * 2
72 + ((ht2_f4b
>> i4(x
, 16, 20, 22, 25)) & 1) * 4
73 + ((ht2_f4b
>> i4(x
, 27, 28, 30, 32)) & 1) * 8
74 + ((ht2_f4a
>> i4(x
, 33, 42, 43, 45)) & 1) * 16;
76 return (ht2_f5c
>> i5
) & 1;
78 static u64
hitag2_round(u64
*state
) {
82 + ((((x
>> 0) ^ (x
>> 2) ^ (x
>> 3) ^ (x
>> 6) ^ (x
>> 7) ^ (x
>> 8)
83 ^ (x
>> 16) ^ (x
>> 22) ^ (x
>> 23) ^ (x
>> 26) ^ (x
>> 30)
84 ^ (x
>> 41) ^ (x
>> 42) ^ (x
>> 43) ^ (x
>> 46) ^ (x
>> 47))
90 static u64
hitag2_init(const u64 key
, const u32 serial
, const u32 IV
) {
92 u64 x
= ((key
& 0xFFFF) << 32) + serial
;
93 for (i
= 0; i
< 32; i
++) {
95 x
+= (u64
) (f20(x
) ^ (((IV
>> i
) ^ (key
>> (i
+ 16))) & 1)) << 47;
99 static u32
hitag2_byte(u64
*x
) {
102 for (i
= 0, c
= 0; i
< 8; i
++)
103 c
+= (u32
) hitag2_round(x
) << (i
^ 7);
107 // Sam7s has several timers, we will use the source TIMER_CLOCK1 (aka AT91C_TC_CLKS_TIMER_DIV1_CLOCK)
108 // TIMER_CLOCK1 = MCK/2, MCK is running at 48 MHz, Timer is running at 48/2 = 24 MHz
109 // Hitag units (T0) have duration of 8 microseconds (us), which is 1/125000 per second (carrier)
110 // T0 = TIMER_CLOCK1 / 125000 = 192
113 #define SHORT_COIL() LOW(GPIO_SSC_DOUT)
114 #define OPEN_COIL() HIGH(GPIO_SSC_DOUT)
116 #define HITAG_FRAME_LEN 20
117 #define HITAG_T_STOP 36 /* T_EOF should be > 36 */
118 #define HITAG_T_LOW 8 /* T_LOW should be 4..10 */
119 #define HITAG_T_0_MIN 15 /* T[0] should be 18..22 */
120 #define HITAG_T_1_MIN 25 /* T[1] should be 26..30 */
121 //#define HITAG_T_EOF 40 /* T_EOF should be > 36 */
122 #define HITAG_T_EOF 80 /* T_EOF should be > 36 */
123 #define HITAG_T_WAIT_1 200 /* T_wresp should be 199..206 */
124 #define HITAG_T_WAIT_2 90 /* T_wresp should be 199..206 */
125 #define HITAG_T_WAIT_MAX 300 /* bit more than HITAG_T_WAIT_1 + HITAG_T_WAIT_2 */
127 #define HITAG_T_TAG_ONE_HALF_PERIOD 10
128 #define HITAG_T_TAG_TWO_HALF_PERIOD 25
129 #define HITAG_T_TAG_THREE_HALF_PERIOD 41
130 #define HITAG_T_TAG_FOUR_HALF_PERIOD 57
132 #define HITAG_T_TAG_HALF_PERIOD 16
133 #define HITAG_T_TAG_FULL_PERIOD 32
135 #define HITAG_T_TAG_CAPTURE_ONE_HALF 13
136 #define HITAG_T_TAG_CAPTURE_TWO_HALF 25
137 #define HITAG_T_TAG_CAPTURE_THREE_HALF 41
138 #define HITAG_T_TAG_CAPTURE_FOUR_HALF 57
143 * Implementation of the crc8 calculation from Hitag S
144 * from http://www.proxmark.org/files/Documents/125%20kHz%20-%20Hitag/HitagS.V11.pdf
146 void calc_crc(unsigned char * crc
, unsigned char data
, unsigned char Bitcount
) {
147 *crc
^= data
; // crc = crc (exor) data
149 if (*crc
& 0x80) // if (MSB-CRC == 1)
151 *crc
<<= 1; // CRC = CRC Bit-shift left
152 *crc
^= CRC_POLYNOM
; // CRC = CRC (exor) CRC_POLYNOM
154 *crc
<<= 1; // CRC = CRC Bit-shift left
156 } while (--Bitcount
);
159 static void hitag_send_bit(int bit
) {
161 // Reset clock for the next bit
162 AT91C_BASE_TC0
->TC_CCR
= AT91C_TC_SWTRG
;
169 while (AT91C_BASE_TC0
->TC_CV
< T0
* 32)
172 while (AT91C_BASE_TC0
->TC_CV
< T0
* 64)
177 while (AT91C_BASE_TC0
->TC_CV
< T0
* 16)
180 while (AT91C_BASE_TC0
->TC_CV
< T0
* 32)
183 while (AT91C_BASE_TC0
->TC_CV
< T0
* 48)
186 while (AT91C_BASE_TC0
->TC_CV
< T0
* 64)
195 while (AT91C_BASE_TC0
->TC_CV
< T0
* HITAG_T_TAG_HALF_PERIOD
)
198 while (AT91C_BASE_TC0
->TC_CV
< T0
* HITAG_T_TAG_FULL_PERIOD
)
203 while (AT91C_BASE_TC0
->TC_CV
< T0
* 8)
206 while (AT91C_BASE_TC0
->TC_CV
< T0
* 16)
209 while (AT91C_BASE_TC0
->TC_CV
< T0
* 24)
212 while (AT91C_BASE_TC0
->TC_CV
< T0
* 32)
219 // Manchester: Unloaded, then loaded |__--|
221 while (AT91C_BASE_TC0
->TC_CV
< T0
* 16)
224 while (AT91C_BASE_TC0
->TC_CV
< T0
* 32)
227 // Manchester: Loaded, then unloaded |--__|
229 while (AT91C_BASE_TC0
->TC_CV
< T0
* 16)
232 while (AT91C_BASE_TC0
->TC_CV
< T0
* 32)
239 // Manchester: Unloaded, then loaded |__--|
241 while (AT91C_BASE_TC0
->TC_CV
< T0
* 8)
244 while (AT91C_BASE_TC0
->TC_CV
< T0
* 16)
247 // Manchester: Loaded, then unloaded |--__|
249 while (AT91C_BASE_TC0
->TC_CV
< T0
* 8)
252 while (AT91C_BASE_TC0
->TC_CV
< T0
* 16)
262 static void hitag_send_frame(const byte_t
* frame
, size_t frame_len
) {
263 // Send start of frame
265 for (size_t i
= 0; i
< sof_bits
; i
++) {
269 // Send the content of the frame
270 for (size_t i
= 0; i
< frame_len
; i
++) {
271 hitag_send_bit((frame
[i
/ 8] >> (7 - (i
% 8))) & 1);
273 // Drop the modulation
277 static void hitag_reader_send_bit(int bit
) {
278 //Dbprintf("BIT: %d",bit);
280 // Reset clock for the next bit
281 AT91C_BASE_TC0
->TC_CCR
= AT91C_TC_SWTRG
;
283 // Binary puls length modulation (BPLM) is used to encode the data stream
284 // This means that a transmission of a one takes longer than that of a zero
286 // Enable modulation, which means, drop the the field
289 // Wait for 4-10 times the carrier period
290 while (AT91C_BASE_TC0
->TC_CV
< T0
* 6)
294 // Disable modulation, just activates the field again
299 while (AT91C_BASE_TC0
->TC_CV
< T0
* 11)
301 // SpinDelayUs(16*8);
304 while (AT91C_BASE_TC0
->TC_CV
< T0
* 14)
306 // SpinDelayUs(22*8);
309 // Wait for 4-10 times the carrier period
310 while (AT91C_BASE_TC0
->TC_CV
< T0
* 6)
314 // Disable modulation, just activates the field again
319 while (AT91C_BASE_TC0
->TC_CV
< T0
* 22)
321 // SpinDelayUs(16*8);
324 while (AT91C_BASE_TC0
->TC_CV
< T0
* 28)
326 // SpinDelayUs(22*8);
333 static void hitag_reader_send_frame(const byte_t
* frame
, size_t frame_len
) {
334 // Send the content of the frame
335 for (size_t i
= 0; i
< frame_len
; i
++) {
336 if (frame
[0] == 0xf8) {
337 //Dbprintf("BIT: %d",(frame[i / 8] >> (7 - (i % 8))) & 1);
339 hitag_reader_send_bit((frame
[i
/ 8] >> (7 - (i
% 8))) & 1);
342 AT91C_BASE_TC0
->TC_CCR
= AT91C_TC_SWTRG
;
343 // Enable modulation, which means, drop the the field
345 // Wait for 4-10 times the carrier period
346 while (AT91C_BASE_TC0
->TC_CV
< T0
* 6)
348 // Disable modulation, just activates the field again
353 * to check if the right uid was selected
355 static int check_select(byte_t
* rx
, uint32_t uid
) {
356 unsigned char resp
[48];
359 for (i
= 0; i
< 48; i
++)
360 resp
[i
] = (rx
[i
/ 8] >> (7 - (i
% 8))) & 0x1;
361 for (i
= 0; i
< 32; i
++)
362 ans
+= resp
[5 + i
] << (31 - i
);
363 /*if (rx[0] == 0x01 && rx[1] == 0x15 && rx[2] == 0xc1 && rx[3] == 0x14
364 && rx[4] == 0x65 && rx[5] == 0x38)
365 Dbprintf("got uid %X", ans);*/
373 * handles all commands from a reader
375 static void hitagS_handle_reader_command(byte_t
* rx
, const size_t rxlen
,
376 byte_t
* tx
, size_t* txlen
) {
377 byte_t rx_air
[HITAG_FRAME_LEN
];
383 // Copy the (original) received frame how it is send over the air
384 memcpy(rx_air
, rx
, nbytes(rxlen
));
385 // Reset the transmission frame length
387 // Try to find out which command was send by selecting on length (in bits)
390 //UID request with a selected response protocol mode
393 if ((rx
[0] & 0xf0) == 0x30) {
398 if ((rx
[0] & 0xf0) == 0xc0) {
404 if ((rx
[0] & 0xf0) == 0xd0) {
405 tag
.mode
= FAST_ADVANCED
;
409 //send uid as a response
411 for (i
= 0; i
< 4; i
++)
412 tx
[i
] = (tag
.uid
>> (24 - (i
* 8))) & 0xff;
416 //select command from reader received
417 if (check_select(rx
, tag
.uid
) == 1) {
418 //if the right tag was selected
438 for (i
= 0; i
< 4; i
++)
439 tx
[i
] = (tag
.pages
[0][1] >> (i
* 8)) & 0xff;
441 if (tag
.mode
!= STANDARD
) {
444 for (i
= 0; i
< 4; i
++)
445 calc_crc(&crc
, tx
[i
], 8);
452 //challenge message received
453 Dbprintf("Challenge for UID: %X", temp_uid
);
456 state
= hitag2_init(rev64(tag
.key
), rev32(tag
.pages
[0][0]),
457 rev32(((rx
[3] << 24) + (rx
[2] << 16) + (rx
[1] << 8) + rx
[0])));
459 ",{0x%02X, 0x%02X, 0x%02X, 0x%02X, 0x%02X, 0x%02X, 0x%02X, 0x%02X}",
460 rx
[0], rx
[1], rx
[2], rx
[3], rx
[4], rx
[5], rx
[6], rx
[7]);
478 for (i
= 0; i
< 4; i
++)
480 //send con2,pwdh0,pwdl0,pwdl1 encrypted as a response
481 tx
[0] = hitag2_byte(&state
) ^ ((tag
.pages
[0][1] >> 16) & 0xff);
482 tx
[1] = hitag2_byte(&state
) ^ tag
.pwdh0
;
483 tx
[2] = hitag2_byte(&state
) ^ tag
.pwdl0
;
484 tx
[3] = hitag2_byte(&state
) ^ tag
.pwdl1
;
485 if (tag
.mode
!= STANDARD
) {
489 calc_crc(&crc
, ((tag
.pages
[0][1] >> 16) & 0xff), 8);
490 calc_crc(&crc
, tag
.pwdh0
, 8);
491 calc_crc(&crc
, tag
.pwdl0
, 8);
492 calc_crc(&crc
, tag
.pwdl1
, 8);
493 tx
[4] = (crc
^ hitag2_byte(&state
));
496 * some readers do not allow to authenticate multiple times in a row with the same tag.
497 * use this to change the uid between authentications.
501 if (temp2 % 2 == 0) {
502 tag.uid = 0x11223344;
503 tag.pages[0][0] = 0x44332211;
505 tag.uid = 0x55667788;
506 tag.pages[0][0] = 0x88776655;
511 //data received to be written
512 if (tag
.tstate
== WRITING_PAGE_DATA
) {
514 tag
.pages
[page_to_be_written
/ 4][page_to_be_written
% 4] = (rx
[0]
515 << 0) + (rx
[1] << 8) + (rx
[2] << 16) + (rx
[3] << 24);
519 page_to_be_written
= 0;
536 } else if (tag
.tstate
== WRITING_BLOCK_DATA
) {
537 tag
.pages
[page_to_be_written
/ 4][page_to_be_written
% 4] = (rx
[0]
538 << 24) + (rx
[1] << 16) + (rx
[2] << 8) + rx
[3];
558 page_to_be_written
++;
560 if (block_data_left
== 0) {
562 page_to_be_written
= 0;
567 //write page, write block, read page or read block command received
568 if ((rx
[0] & 0xf0) == 0xc0) //read page
571 page
= ((rx
[0] & 0x0f) * 16) + ((rx
[1] & 0xf0) / 16);
573 tx
[0] = (tag
.pages
[page
/ 4][page
% 4]) & 0xff;
574 tx
[1] = (tag
.pages
[page
/ 4][page
% 4] >> 8) & 0xff;
575 tx
[2] = (tag
.pages
[page
/ 4][page
% 4] >> 16) & 0xff;
576 tx
[3] = (tag
.pages
[page
/ 4][page
% 4] >> 24) & 0xff;
577 if (tag
.LKP
&& page
== 1)
597 if (tag
.mode
!= STANDARD
) {
601 for (i
= 0; i
< 4; i
++)
602 calc_crc(&crc
, tx
[i
], 8);
606 if (tag
.LKP
&& (page
== 2 || page
== 3)) {
607 //if reader asks for key or password and the LKP-mark is set do not respond
611 } else if ((rx
[0] & 0xf0) == 0xd0) //read block
613 page
= ((rx
[0] & 0x0f) * 16) + ((rx
[1] & 0xf0) / 16);
615 //send page,...,page+3 data
616 for (i
= 0; i
< 4; i
++) {
617 tx
[0 + i
* 4] = (tag
.pages
[page
/ 4][page
% 4]) & 0xff;
618 tx
[1 + i
* 4] = (tag
.pages
[page
/ 4][page
% 4] >> 8) & 0xff;
619 tx
[2 + i
* 4] = (tag
.pages
[page
/ 4][page
% 4] >> 16) & 0xff;
620 tx
[3 + i
* 4] = (tag
.pages
[page
/ 4][page
% 4] >> 24) & 0xff;
641 if (tag
.mode
!= STANDARD
) {
645 for (i
= 0; i
< 16; i
++)
646 calc_crc(&crc
, tx
[i
], 8);
650 if ((page
- 4) % 4 != 0 || (tag
.LKP
&& (page
- 4) == 0)) {
654 } else if ((rx
[0] & 0xf0) == 0x80) //write page
656 page
= ((rx
[0] & 0x0f) * 16) + ((rx
[1] & 0xf0) / 16);
674 if ((tag
.LCON
&& page
== 1)
675 || (tag
.LKP
&& (page
== 2 || page
== 3))) {
682 page_to_be_written
= page
;
683 tag
.tstate
= WRITING_PAGE_DATA
;
686 } else if ((rx
[0] & 0xf0) == 0x90) //write block
688 page
= ((rx
[0] & 0x0f) * 6) + ((rx
[1] & 0xf0) / 16);
705 if (page
% 4 != 0 || page
== 0) {
712 page_to_be_written
= page
;
714 tag
.tstate
= WRITING_BLOCK_DATA
;
726 * to autenticate to a tag with the given key or challenge
728 static int hitagS_handle_tag_auth(hitag_function htf
,uint64_t key
, uint64_t NrAr
, byte_t
* rx
, const size_t rxlen
, byte_t
* tx
,
730 byte_t rx_air
[HITAG_FRAME_LEN
];
731 int response_bit
[200];
733 unsigned char mask
= 1;
734 unsigned char uid
[32];
735 byte_t uid1
= 0x00, uid2
= 0x00, uid3
= 0x00, uid4
= 0x00;
739 byte_t conf_pages
[3];
740 memcpy(rx_air
, rx
, nbytes(rxlen
));
743 if (tag
.pstate
== READY
&& rxlen
>= 67) {
746 Dbprintf("authentication failed!");
750 for (i
= 0; i
< 10; i
++) {
751 for (j
= 0; j
< 8; j
++) {
753 if ((rx
[i
] & ((mask
<< 7) >> j
)) != 0)
759 for (i
= 5; i
< z
; i
+= 2) {
760 uid
[k
] = response_bit
[i
];
765 uid1
= (uid
[0] << 7) | (uid
[1] << 6) | (uid
[2] << 5) | (uid
[3] << 4)
766 | (uid
[4] << 3) | (uid
[5] << 2) | (uid
[6] << 1) | uid
[7];
767 uid2
= (uid
[8] << 7) | (uid
[9] << 6) | (uid
[10] << 5) | (uid
[11] << 4)
768 | (uid
[12] << 3) | (uid
[13] << 2) | (uid
[14] << 1) | uid
[15];
769 uid3
= (uid
[16] << 7) | (uid
[17] << 6) | (uid
[18] << 5) | (uid
[19] << 4)
770 | (uid
[20] << 3) | (uid
[21] << 2) | (uid
[22] << 1) | uid
[23];
771 uid4
= (uid
[24] << 7) | (uid
[25] << 6) | (uid
[26] << 5) | (uid
[27] << 4)
772 | (uid
[28] << 3) | (uid
[29] << 2) | (uid
[30] << 1) | uid
[31];
774 Dbprintf("UID: %02X %02X %02X %02X", uid1
, uid2
, uid3
, uid4
);
775 tag
.uid
= (uid4
<< 24 | uid3
<< 16 | uid2
<< 8 | uid1
);
780 calc_crc(&crc
, 0x00, 5);
781 calc_crc(&crc
, uid1
, 8);
782 calc_crc(&crc
, uid2
, 8);
783 calc_crc(&crc
, uid3
, 8);
784 calc_crc(&crc
, uid4
, 8);
785 for (i
= 0; i
< 100; i
++) {
788 for (i
= 0; i
< 5; i
++) {
791 for (i
= 5; i
< 37; i
++) {
792 response_bit
[i
] = uid
[i
- 5];
794 for (j
= 0; j
< 8; j
++) {
796 if ((crc
& ((mask
<< 7) >> j
)) != 0)
801 for (i
= 0; i
< 6; i
++) {
802 tx
[i
] = (response_bit
[k
] << 7) | (response_bit
[k
+ 1] << 6)
803 | (response_bit
[k
+ 2] << 5) | (response_bit
[k
+ 3] << 4)
804 | (response_bit
[k
+ 4] << 3) | (response_bit
[k
+ 5] << 2)
805 | (response_bit
[k
+ 6] << 1) | response_bit
[k
+ 7];
809 } else if (tag
.pstate
== INIT
&& rxlen
== 44) {
810 // received configuration after select command
812 for (i
= 0; i
< 6; i
++) {
813 for (j
= 0; j
< 8; j
++) {
815 if ((rx
[i
] & ((mask
<< 7) >> j
)) != 0)
820 conf_pages
[0] = ((response_bit
[4] << 7) | (response_bit
[5] << 6)
821 | (response_bit
[6] << 5) | (response_bit
[7] << 4)
822 | (response_bit
[8] << 3) | (response_bit
[9] << 2)
823 | (response_bit
[10] << 1) | response_bit
[11]);
824 //check wich memorysize this tag has
825 if (response_bit
[10] == 0 && response_bit
[11] == 0)
826 tag
.max_page
= 32 / 32;
827 if (response_bit
[10] == 0 && response_bit
[11] == 1)
828 tag
.max_page
= 256 / 32;
829 if (response_bit
[10] == 1 && response_bit
[11] == 0)
830 tag
.max_page
= 2048 / 32;
831 conf_pages
[1] = ((response_bit
[12] << 7) | (response_bit
[13] << 6)
832 | (response_bit
[14] << 5) | (response_bit
[15] << 4)
833 | (response_bit
[16] << 3) | (response_bit
[17] << 2)
834 | (response_bit
[18] << 1) | response_bit
[19]);
835 tag
.auth
= response_bit
[12];
836 tag
.TTFC
= response_bit
[13];
837 //tag.TTFDR in response_bit[14] and response_bit[15]
838 //tag.TTFM in response_bit[16] and response_bit[17]
839 tag
.LCON
= response_bit
[18];
840 tag
.LKP
= response_bit
[19];
841 conf_pages
[2] = ((response_bit
[20] << 7) | (response_bit
[21] << 6)
842 | (response_bit
[22] << 5) | (response_bit
[23] << 4)
843 | (response_bit
[24] << 3) | (response_bit
[25] << 2)
844 | (response_bit
[26] << 1) | response_bit
[27]);
845 tag
.LCK7
= response_bit
[20];
846 tag
.LCK6
= response_bit
[21];
847 tag
.LCK5
= response_bit
[22];
848 tag
.LCK4
= response_bit
[23];
849 tag
.LCK3
= response_bit
[24];
850 tag
.LCK2
= response_bit
[25];
851 tag
.LCK1
= response_bit
[26];
852 tag
.LCK0
= response_bit
[27];
855 Dbprintf("conf0: %02X conf1: %02X conf2: %02X", conf_pages
[0],
856 conf_pages
[1], conf_pages
[2]);
858 //if the tag is in authentication mode try the key or challenge
861 if(htf
==02||htf
==04){ //RHTS_KEY //WHTS_KEY
862 state
= hitag2_init(rev64(key
), rev32(tag
.uid
),
865 for (i
= 0; i
< 4; i
++) {
866 auth_ks
[i
] = hitag2_byte(&state
) ^ 0xff;
870 tx
[1] = (rnd
>> 8) & 0xff;
871 tx
[2] = (rnd
>> 16) & 0xff;
872 tx
[3] = (rnd
>> 24) & 0xff;
879 Dbprintf("%02X %02X %02X %02X %02X %02X %02X %02X", tx
[0],
880 tx
[1], tx
[2], tx
[3], tx
[4], tx
[5], tx
[6], tx
[7]);
881 } else if(htf
==01 || htf
==03) { //RHTS_CHALLENGE //WHTS_CHALLENGE
882 for (i
= 0; i
< 8; i
++)
883 tx
[i
]=((NrAr
>>(56-(i
*8)))&0xff);
886 tag
.pstate
= AUTHENTICATE
;
888 Dbprintf("authentication failed!");
891 } else if (tag
.auth
== 0) {
892 tag
.pstate
= SELECTED
;
895 } else if (tag
.pstate
== AUTHENTICATE
&& rxlen
== 44) {
896 //encrypted con2,password received.
898 calc_crc(&crc
, 0x80, 1);
899 calc_crc(&crc
, ((rx
[0] & 0x0f) * 16 + ((rx
[1] & 0xf0) / 16)), 8);
900 calc_crc(&crc
, ((rx
[1] & 0x0f) * 16 + ((rx
[2] & 0xf0) / 16)), 8);
901 calc_crc(&crc
, ((rx
[2] & 0x0f) * 16 + ((rx
[3] & 0xf0) / 16)), 8);
902 calc_crc(&crc
, ((rx
[3] & 0x0f) * 16 + ((rx
[4] & 0xf0) / 16)), 8);
904 Dbprintf("UID:::%X", tag
.uid
);
905 Dbprintf("RND:::%X", rnd
);
912 if(htf
==02 || htf
==04){ //RHTS_KEY //WHTS_KEY
914 state
= hitag2_init(rev64(key
), rev32(tag
.uid
), rev32(rnd
));
915 for (i
= 0; i
< 5; i
++)
917 pwdh0
= ((rx
[1] & 0x0f) * 16 + ((rx
[2] & 0xf0) / 16))
918 ^ hitag2_byte(&state
);
919 pwdl0
= ((rx
[2] & 0x0f) * 16 + ((rx
[3] & 0xf0) / 16))
920 ^ hitag2_byte(&state
);
921 pwdl1
= ((rx
[3] & 0x0f) * 16 + ((rx
[4] & 0xf0) / 16))
922 ^ hitag2_byte(&state
);
926 Dbprintf("pwdh0 %02X pwdl0 %02X pwdl1 %02X", pwdh0
, pwdl0
, pwdl1
);
929 //Dbprintf("%X %02X", rnd, ((rx[4] & 0x0f) * 16) + ((rx[5] & 0xf0) / 16));
932 tag
.pstate
= SELECTED
; //tag is now ready for read/write commands
939 * Emulates a Hitag S Tag with the given data from the .hts file
941 void SimulateHitagSTag(bool tag_mem_supplied
, byte_t
* data
) {
946 byte_t rx
[HITAG_FRAME_LEN
];
948 //bool bQuitTraceFull = false;
950 byte_t txbuf
[HITAG_FRAME_LEN
];
955 // Clean up trace and prepare it for storing frames
959 DbpString("Starting HitagS simulation");
964 for (i
= 0; i
< 16; i
++)
965 for (j
= 0; j
< 4; j
++)
966 tag
.pages
[i
][j
] = 0x0;
967 //read tag data into memory
968 if (tag_mem_supplied
) {
969 DbpString("Loading hitagS memory...");
970 memcpy((byte_t
*)tag
.pages
,data
,4*64);
972 tag
.uid
=(uint32_t)tag
.pages
[0];
973 Dbprintf("Hitag S simulation started");
974 tag
.key
=(intptr_t)tag
.pages
[3];
976 tag
.key
+=((tag
.pages
[2][0])<<8)+tag
.pages
[2][1];
977 tag
.pwdl0
=tag
.pages
[2][3];
978 tag
.pwdl1
=tag
.pages
[2][2];
979 tag
.pwdh0
=tag
.pages
[1][0];
982 if((tag
.pages
[1][3]&0x2)==0 && (tag
.pages
[1][3]&0x1)==1)
984 if((tag
.pages
[1][3]&0x2)==0 && (tag
.pages
[1][3]&0x1)==0)
988 if((tag
.pages
[1][2]&0x80)==1)
991 if((tag
.pages
[1][2]&0x2)==1)
994 if((tag
.pages
[1][2]&0x1)==1)
997 //0=read write 1=read only
999 if((tag
.pages
[1][1]&0x80)==1)
1002 if((tag
.pages
[1][1]&0x40)==1)
1005 if((tag
.pages
[1][1]&0x20)==1)
1008 if((tag
.pages
[1][1]&0x10)==1)
1011 if((tag
.pages
[1][1]&0x8)==1)
1014 if((tag
.pages
[1][1]&0x4)==1)
1017 if((tag
.pages
[1][1]&0x2)==1)
1020 if((tag
.pages
[1][1]&0x1)==1)
1023 // Set up simulator mode, frequency divisor which will drive the FPGA
1024 // and analog mux selection.
1025 FpgaDownloadAndGo(FPGA_BITSTREAM_LF
);
1027 FPGA_MAJOR_MODE_LF_EDGE_DETECT
| FPGA_LF_EDGE_DETECT_READER_FIELD
);
1028 FpgaSendCommand(FPGA_CMD_SET_DIVISOR
, 95); //125Khz
1029 SetAdcMuxFor(GPIO_MUXSEL_LOPKD
);
1032 // Configure output pin that is connected to the FPGA (for modulating)
1033 AT91C_BASE_PIOA
->PIO_OER
= GPIO_SSC_DOUT
;
1034 AT91C_BASE_PIOA
->PIO_PER
= GPIO_SSC_DOUT
;
1036 // Disable modulation at default, which means release resistance
1039 // Enable Peripheral Clock for TIMER_CLOCK0, used to measure exact timing before answering
1040 AT91C_BASE_PMC
->PMC_PCER
= (1 << AT91C_ID_TC0
);
1042 // Enable Peripheral Clock for TIMER_CLOCK1, used to capture edges of the reader frames
1043 AT91C_BASE_PMC
->PMC_PCER
= (1 << AT91C_ID_TC1
);
1044 AT91C_BASE_PIOA
->PIO_BSR
= GPIO_SSC_FRAME
;
1046 // Disable timer during configuration
1047 AT91C_BASE_TC1
->TC_CCR
= AT91C_TC_CLKDIS
;
1049 // Capture mode, default timer source = MCK/2 (TIMER_CLOCK1), TIOA is external trigger,
1050 // external trigger rising edge, load RA on rising edge of TIOA.
1051 AT91C_BASE_TC1
->TC_CMR
= AT91C_TC_CLKS_TIMER_DIV1_CLOCK
1052 | AT91C_TC_ETRGEDG_RISING
| AT91C_TC_ABETRG
| AT91C_TC_LDRA_RISING
;
1054 // Reset the received frame, frame count and timing info
1055 memset(rx
, 0x00, sizeof(rx
));
1060 // Enable and reset counter
1061 AT91C_BASE_TC1
->TC_CCR
= AT91C_TC_CLKEN
| AT91C_TC_SWTRG
;
1063 while (!BUTTON_PRESS()) {
1067 // Receive frame, watch for at most T0*EOF periods
1068 while (AT91C_BASE_TC1
->TC_CV
< T0
* HITAG_T_EOF
) {
1069 // Check if rising edge in modulation is detected
1070 if (AT91C_BASE_TC1
->TC_SR
& AT91C_TC_LDRAS
) {
1071 // Retrieve the new timing values
1072 int ra
= (AT91C_BASE_TC1
->TC_RA
/ T0
) + overflow
;
1075 // Reset timer every frame, we have to capture the last edge for timing
1076 AT91C_BASE_TC0
->TC_CCR
= AT91C_TC_CLKEN
| AT91C_TC_SWTRG
;
1080 // Capture reader frame
1081 if (ra
>= HITAG_T_STOP
) {
1083 //DbpString("wierd0?");
1085 // Capture the T0 periods that have passed since last communication or field drop (reset)
1086 response
= (ra
- HITAG_T_LOW
);
1087 } else if (ra
>= HITAG_T_1_MIN
) {
1089 rx
[rxlen
/ 8] |= 1 << (7 - (rxlen
% 8));
1091 } else if (ra
>= HITAG_T_0_MIN
) {
1093 rx
[rxlen
/ 8] |= 0 << (7 - (rxlen
% 8));
1096 // Ignore wierd value, is to small to mean anything
1101 // Check if frame was captured
1105 if (!LogTraceHitag(rx
, rxlen
, response
, 0, true)) {
1106 DbpString("Trace full");
1111 // Disable timer 1 with external trigger to avoid triggers during our own modulation
1112 AT91C_BASE_TC1
->TC_CCR
= AT91C_TC_CLKDIS
;
1114 // Process the incoming frame (rx) and prepare the outgoing frame (tx)
1115 hitagS_handle_reader_command(rx
, rxlen
, tx
, &txlen
);
1117 // Wait for HITAG_T_WAIT_1 carrier periods after the last reader bit,
1118 // not that since the clock counts since the rising edge, but T_Wait1 is
1119 // with respect to the falling edge, we need to wait actually (T_Wait1 - T_Low)
1120 // periods. The gap time T_Low varies (4..10). All timer values are in
1121 // terms of T0 units
1122 while (AT91C_BASE_TC0
->TC_CV
< T0
* (HITAG_T_WAIT_1
- HITAG_T_LOW
))
1125 // Send and store the tag answer (if there is any)
1127 // Transmit the tag frame
1128 hitag_send_frame(tx
, txlen
);
1129 // Store the frame in the trace
1131 if (!LogTraceHitag(tx
, txlen
, 0, 0, false)) {
1132 DbpString("Trace full");
1138 // Reset the received frame and response timing info
1139 memset(rx
, 0x00, sizeof(rx
));
1142 // Enable and reset external trigger in timer for capturing future frames
1143 AT91C_BASE_TC1
->TC_CCR
= AT91C_TC_CLKEN
| AT91C_TC_SWTRG
;
1146 // Reset the frame length
1148 // Save the timer overflow, will be 0 when frame was received
1149 overflow
+= (AT91C_BASE_TC1
->TC_CV
/ T0
);
1150 // Reset the timer to restart while-loop that receives frames
1151 AT91C_BASE_TC1
->TC_CCR
= AT91C_TC_SWTRG
;
1155 AT91C_BASE_TC1
->TC_CCR
= AT91C_TC_CLKDIS
;
1156 AT91C_BASE_TC0
->TC_CCR
= AT91C_TC_CLKDIS
;
1157 FpgaWriteConfWord(FPGA_MAJOR_MODE_OFF
);
1161 * Authenticates to the Tag with the given key or challenge.
1162 * If the key was given the password will be decrypted.
1163 * Reads every page of a hitag S transpoder.
1165 void ReadHitagS(hitag_function htf
, hitag_data
* htd
) {
1168 int response_bit
[200];
1170 byte_t rx
[HITAG_FRAME_LEN
];
1172 byte_t txbuf
[HITAG_FRAME_LEN
];
1179 int t_wait
= HITAG_T_WAIT_MAX
;
1181 bool bQuitTraceFull
= false;
1183 unsigned char mask
= 1;
1185 unsigned char pageData
[32];
1186 page_to_be_written
= 0;
1188 //read given key/challenge
1194 case 01: { //RHTS_CHALLENGE
1195 DbpString("Authenticating using nr,ar pair:");
1196 memcpy(NrAr_
,htd
->auth
.NrAr
,8);
1197 Dbhexdump(8,NrAr_
,false);
1198 NrAr
=NrAr_
[7] | ((uint64_t)NrAr_
[6]) << 8 | ((uint64_t)NrAr_
[5]) << 16 | ((uint64_t)NrAr_
[4]) << 24 | ((uint64_t)NrAr_
[3]) << 32 |
1199 ((uint64_t)NrAr_
[2]) << 40| ((uint64_t)NrAr_
[1]) << 48 | ((uint64_t)NrAr_
[0]) << 56;
1201 case 02: { //RHTS_KEY
1202 DbpString("Authenticating using key:");
1203 memcpy(key_
,htd
->crypto
.key
,6);
1204 Dbhexdump(6,key_
,false);
1205 key
=key_
[5] | ((uint64_t)key_
[4]) << 8 | ((uint64_t)key_
[3]) << 16 | ((uint64_t)key_
[2]) << 24 | ((uint64_t)key_
[1]) << 32 | ((uint64_t)key_
[0]) << 40;
1208 Dbprintf("Error , unknown function: %d",htf
);
1215 FpgaDownloadAndGo(FPGA_BITSTREAM_LF
);
1216 // Reset the return status
1217 bSuccessful
= false;
1219 // Clean up trace and prepare it for storing frames
1224 bQuitTraceFull
= true;
1228 // Configure output and enable pin that is connected to the FPGA (for modulating)
1229 AT91C_BASE_PIOA
->PIO_OER
= GPIO_SSC_DOUT
;
1230 AT91C_BASE_PIOA
->PIO_PER
= GPIO_SSC_DOUT
;
1232 // Set fpga in edge detect with reader field, we can modulate as reader now
1234 FPGA_MAJOR_MODE_LF_EDGE_DETECT
| FPGA_LF_EDGE_DETECT_READER_FIELD
);
1236 // Set Frequency divisor which will drive the FPGA and analog mux selection
1237 FpgaSendCommand(FPGA_CMD_SET_DIVISOR
, 95); //125Khz
1238 SetAdcMuxFor(GPIO_MUXSEL_LOPKD
);
1241 // Disable modulation at default, which means enable the field
1244 // Give it a bit of time for the resonant antenna to settle.
1247 // Enable Peripheral Clock for TIMER_CLOCK0, used to measure exact timing before answering
1248 AT91C_BASE_PMC
->PMC_PCER
= (1 << AT91C_ID_TC0
);
1250 // Enable Peripheral Clock for TIMER_CLOCK1, used to capture edges of the tag frames
1251 AT91C_BASE_PMC
->PMC_PCER
= (1 << AT91C_ID_TC1
);
1252 AT91C_BASE_PIOA
->PIO_BSR
= GPIO_SSC_FRAME
;
1254 // Disable timer during configuration
1255 AT91C_BASE_TC1
->TC_CCR
= AT91C_TC_CLKDIS
;
1257 // Capture mode, defaul timer source = MCK/2 (TIMER_CLOCK1), TIOA is external trigger,
1258 // external trigger rising edge, load RA on falling edge of TIOA.
1259 AT91C_BASE_TC1
->TC_CMR
= AT91C_TC_CLKS_TIMER_DIV1_CLOCK
1261 | AT91C_TC_ETRGEDG_FALLING
| AT91C_TC_ABETRG
| AT91C_TC_LDRA_FALLING
;
1263 // Enable and reset counters
1264 AT91C_BASE_TC0
->TC_CCR
= AT91C_TC_CLKEN
| AT91C_TC_SWTRG
;
1265 AT91C_BASE_TC1
->TC_CCR
= AT91C_TC_CLKEN
| AT91C_TC_SWTRG
;
1267 // Reset the received frame, frame count and timing info
1276 while (!bStop
&& !BUTTON_PRESS()) {
1280 // Check if frame was captured and store it
1284 if (!LogTraceHitag(rx
, rxlen
, response
, 0, false)) {
1285 DbpString("Trace full");
1286 if (bQuitTraceFull
) {
1295 // By default reset the transmission buffer
1300 //start authentication
1302 memcpy(tx
, "\xc0", nbytes(txlen
));
1305 } else if (tag
.pstate
!= SELECTED
) {
1306 if (hitagS_handle_tag_auth(htf
, key
,NrAr
,rx
, rxlen
, tx
, &txlen
) == -1)
1309 if (tag
.pstate
== SELECTED
&& tag
.tstate
== NO_OP
&& rxlen
> 0) {
1311 tag
.tstate
= READING_PAGE
;
1314 tx
[0] = 0xc0 + (sendNum
/ 16);
1315 calc_crc(&crc
, tx
[0], 8);
1316 calc_crc(&crc
, 0x00 + ((sendNum
% 16) * 16), 4);
1317 tx
[1] = 0x00 + ((sendNum
% 16) * 16) + (crc
/ 16);
1318 tx
[2] = 0x00 + (crc
% 16) * 16;
1319 } else if (tag
.pstate
== SELECTED
&& tag
.tstate
== READING_PAGE
1321 //save received data
1323 for (i
= 0; i
< 5; i
++) {
1324 for (j
= 0; j
< 8; j
++) {
1325 response_bit
[z
] = 0;
1326 if ((rx
[i
] & ((mask
<< 7) >> j
)) != 0)
1327 response_bit
[z
] = 1;
1332 for (i
= 4; i
< 36; i
++) {
1333 pageData
[k
] = response_bit
[i
];
1336 for (i
= 0; i
< 4; i
++)
1337 tag
.pages
[sendNum
/ 4][sendNum
% 4] = 0x0;
1338 for (i
= 0; i
< 4; i
++) {
1339 tag
.pages
[sendNum
/ 4][sendNum
% 4] += ((pageData
[i
* 8] << 7)
1340 | (pageData
[1 + (i
* 8)] << 6)
1341 | (pageData
[2 + (i
* 8)] << 5)
1342 | (pageData
[3 + (i
* 8)] << 4)
1343 | (pageData
[4 + (i
* 8)] << 3)
1344 | (pageData
[5 + (i
* 8)] << 2)
1345 | (pageData
[6 + (i
* 8)] << 1) | pageData
[7 + (i
* 8)])
1348 if (tag
.auth
&& tag
.LKP
&& sendNum
== 1) {
1349 Dbprintf("Page[%2d]: %02X %02X %02X %02X", sendNum
, pwdh0
,
1350 (tag
.pages
[sendNum
/ 4][sendNum
% 4] >> 16) & 0xff,
1351 (tag
.pages
[sendNum
/ 4][sendNum
% 4] >> 8) & 0xff,
1352 tag
.pages
[sendNum
/ 4][sendNum
% 4] & 0xff);
1354 Dbprintf("Page[%2d]: %02X %02X %02X %02X", sendNum
,
1355 (tag
.pages
[sendNum
/ 4][sendNum
% 4] >> 24) & 0xff,
1356 (tag
.pages
[sendNum
/ 4][sendNum
% 4] >> 16) & 0xff,
1357 (tag
.pages
[sendNum
/ 4][sendNum
% 4] >> 8) & 0xff,
1358 tag
.pages
[sendNum
/ 4][sendNum
% 4] & 0xff);
1362 //display key and password if possible
1363 if (sendNum
== 2 && tag
.auth
== 1 && tag
.LKP
) {
1364 if (htf
== 02) { //RHTS_KEY
1365 Dbprintf("Page[ 2]: %02X %02X %02X %02X",
1366 (byte_t
)(key
>> 8) & 0xff,
1367 (byte_t
) key
& 0xff, pwdl1
, pwdl0
);
1368 Dbprintf("Page[ 3]: %02X %02X %02X %02X",
1369 (byte_t
)(key
>> 40) & 0xff,
1370 (byte_t
)(key
>> 32) & 0xff,
1371 (byte_t
)(key
>> 24) & 0xff,
1372 (byte_t
)(key
>> 16) & 0xff);
1374 //if the authentication is done with a challenge the key and password are unknown
1375 Dbprintf("Page[ 2]: __ __ __ __");
1376 Dbprintf("Page[ 3]: __ __ __ __");
1382 tx
[0] = 0xc0 + (sendNum
/ 16);
1383 calc_crc(&crc
, tx
[0], 8);
1384 calc_crc(&crc
, 0x00 + ((sendNum
% 16) * 16), 4);
1385 tx
[1] = 0x00 + ((sendNum
% 16) * 16) + (crc
/ 16);
1386 tx
[2] = 0x00 + (crc
% 16) * 16;
1387 if (sendNum
>= tag
.max_page
) {
1392 // Send and store the reader command
1393 // Disable timer 1 with external trigger to avoid triggers during our own modulation
1394 AT91C_BASE_TC1
->TC_CCR
= AT91C_TC_CLKDIS
;
1396 // Wait for HITAG_T_WAIT_2 carrier periods after the last tag bit before transmitting,
1397 // Since the clock counts since the last falling edge, a 'one' means that the
1398 // falling edge occured halfway the period. with respect to this falling edge,
1399 // we need to wait (T_Wait2 + half_tag_period) when the last was a 'one'.
1400 // All timer values are in terms of T0 units
1402 while (AT91C_BASE_TC0
->TC_CV
1403 < T0
* (t_wait
+ (HITAG_T_TAG_HALF_PERIOD
* lastbit
)))
1406 // Transmit the reader frame
1407 hitag_reader_send_frame(tx
, txlen
);
1409 // Enable and reset external trigger in timer for capturing future frames
1410 AT91C_BASE_TC1
->TC_CCR
= AT91C_TC_CLKEN
| AT91C_TC_SWTRG
;
1412 // Add transmitted frame to total count
1416 // Store the frame in the trace
1417 if (!LogTraceHitag(tx
, txlen
, HITAG_T_WAIT_2
, 0, true)) {
1418 if (bQuitTraceFull
) {
1419 DbpString("Trace full");
1428 // Reset values for receiving frames
1429 memset(rx
, 0x00, sizeof(rx
));
1433 tag_sof
= reset_sof
;
1436 // Receive frame, watch for at most T0*EOF periods
1437 while (AT91C_BASE_TC1
->TC_CV
< T0
* HITAG_T_WAIT_MAX
) {
1438 // Check if falling edge in tag modulation is detected
1439 if (AT91C_BASE_TC1
->TC_SR
& AT91C_TC_LDRAS
) {
1440 // Retrieve the new timing values
1441 int ra
= (AT91C_BASE_TC1
->TC_RA
/ T0
);
1443 // Reset timer every frame, we have to capture the last edge for timing
1444 AT91C_BASE_TC0
->TC_CCR
= AT91C_TC_SWTRG
;
1448 // Capture tag frame (manchester decoding using only falling edges)
1449 if (ra
>= HITAG_T_EOF
) {
1451 //DbpString("wierd1?");
1453 // Capture the T0 periods that have passed since last communication or field drop (reset)
1454 // We always recieve a 'one' first, which has the falling edge after a half period |-_|
1455 response
= ra
- HITAG_T_TAG_HALF_PERIOD
;
1456 } else if (ra
>= HITAG_T_TAG_CAPTURE_FOUR_HALF
) {
1457 // Manchester coding example |-_|_-|-_| (101)
1458 rx
[rxlen
/ 8] |= 0 << (7 - (rxlen
% 8));
1460 rx
[rxlen
/ 8] |= 1 << (7 - (rxlen
% 8));
1462 } else if (ra
>= HITAG_T_TAG_CAPTURE_THREE_HALF
) {
1463 // Manchester coding example |_-|...|_-|-_| (0...01)
1464 rx
[rxlen
/ 8] |= 0 << (7 - (rxlen
% 8));
1466 // We have to skip this half period at start and add the 'one' the second time
1468 rx
[rxlen
/ 8] |= 1 << (7 - (rxlen
% 8));
1473 } else if (ra
>= HITAG_T_TAG_CAPTURE_TWO_HALF
) {
1474 // Manchester coding example |_-|_-| (00) or |-_|-_| (11)
1476 // Ignore bits that are transmitted during SOF
1479 // bit is same as last bit
1480 rx
[rxlen
/ 8] |= lastbit
<< (7 - (rxlen
% 8));
1484 // Ignore wierd value, is to small to mean anything
1488 // We can break this loop if we received the last bit from a frame
1489 if (AT91C_BASE_TC1
->TC_CV
> T0
* HITAG_T_EOF
) {
1498 AT91C_BASE_TC1
->TC_CCR
= AT91C_TC_CLKDIS
;
1499 AT91C_BASE_TC0
->TC_CCR
= AT91C_TC_CLKDIS
;
1500 FpgaWriteConfWord(FPGA_MAJOR_MODE_OFF
);
1501 cmd_send(CMD_ACK
, bSuccessful
, 0, 0, 0, 0);
1505 * Authenticates to the Tag with the given Key or Challenge.
1506 * Writes the given 32Bit data into page_
1508 void WritePageHitagS(hitag_function htf
, hitag_data
* htd
,int page_
) {
1511 byte_t rx
[HITAG_FRAME_LEN
];
1513 byte_t txbuf
[HITAG_FRAME_LEN
];
1520 int t_wait
= HITAG_T_WAIT_MAX
;
1522 bool bQuitTraceFull
= false;
1525 byte_t data
[4]= {0,0,0,0};
1527 //read given key/challenge, the page and the data
1533 case 03: { //WHTS_CHALLENGE
1534 memcpy(data
,htd
->auth
.data
,4);
1535 DbpString("Authenticating using nr,ar pair:");
1536 memcpy(NrAr_
,htd
->auth
.NrAr
,8);
1537 Dbhexdump(8,NrAr_
,false);
1538 NrAr
=NrAr_
[7] | ((uint64_t)NrAr_
[6]) << 8 | ((uint64_t)NrAr_
[5]) << 16 | ((uint64_t)NrAr_
[4]) << 24 | ((uint64_t)NrAr_
[3]) << 32 |
1539 ((uint64_t)NrAr_
[2]) << 40| ((uint64_t)NrAr_
[1]) << 48 | ((uint64_t)NrAr_
[0]) << 56;
1541 case 04: { //WHTS_KEY
1542 memcpy(data
,htd
->crypto
.data
,4);
1543 DbpString("Authenticating using key:");
1544 memcpy(key_
,htd
->crypto
.key
,6);
1545 Dbhexdump(6,key_
,false);
1546 key
=key_
[5] | ((uint64_t)key_
[4]) << 8 | ((uint64_t)key_
[3]) << 16 | ((uint64_t)key_
[2]) << 24 | ((uint64_t)key_
[1]) << 32 | ((uint64_t)key_
[0]) << 40;
1549 Dbprintf("Error , unknown function: %d",htf
);
1554 Dbprintf("Page: %d",page_
);
1555 Dbprintf("DATA: %02X %02X %02X %02X", data
[0], data
[1], data
[2], data
[3]);
1556 FpgaDownloadAndGo(FPGA_BITSTREAM_LF
);
1557 // Reset the return status
1558 bSuccessful
= false;
1563 // Clean up trace and prepare it for storing frames
1568 bQuitTraceFull
= true;
1572 // Configure output and enable pin that is connected to the FPGA (for modulating)
1573 AT91C_BASE_PIOA
->PIO_OER
= GPIO_SSC_DOUT
;
1574 AT91C_BASE_PIOA
->PIO_PER
= GPIO_SSC_DOUT
;
1576 // Set fpga in edge detect with reader field, we can modulate as reader now
1578 FPGA_MAJOR_MODE_LF_EDGE_DETECT
| FPGA_LF_EDGE_DETECT_READER_FIELD
);
1580 // Set Frequency divisor which will drive the FPGA and analog mux selection
1581 FpgaSendCommand(FPGA_CMD_SET_DIVISOR
, 95); //125Khz
1582 SetAdcMuxFor(GPIO_MUXSEL_LOPKD
);
1585 // Disable modulation at default, which means enable the field
1588 // Give it a bit of time for the resonant antenna to settle.
1591 // Enable Peripheral Clock for TIMER_CLOCK0, used to measure exact timing before answering
1592 AT91C_BASE_PMC
->PMC_PCER
= (1 << AT91C_ID_TC0
);
1594 // Enable Peripheral Clock for TIMER_CLOCK1, used to capture edges of the tag frames
1595 AT91C_BASE_PMC
->PMC_PCER
= (1 << AT91C_ID_TC1
);
1596 AT91C_BASE_PIOA
->PIO_BSR
= GPIO_SSC_FRAME
;
1598 // Disable timer during configuration
1599 AT91C_BASE_TC1
->TC_CCR
= AT91C_TC_CLKDIS
;
1601 // Capture mode, defaul timer source = MCK/2 (TIMER_CLOCK1), TIOA is external trigger,
1602 // external trigger rising edge, load RA on falling edge of TIOA.
1603 AT91C_BASE_TC1
->TC_CMR
= AT91C_TC_CLKS_TIMER_DIV1_CLOCK
1604 | AT91C_TC_ETRGEDG_FALLING
| AT91C_TC_ABETRG
1605 | AT91C_TC_LDRA_FALLING
;
1607 // Enable and reset counters
1608 AT91C_BASE_TC0
->TC_CCR
= AT91C_TC_CLKEN
| AT91C_TC_SWTRG
;
1609 AT91C_BASE_TC1
->TC_CCR
= AT91C_TC_CLKEN
| AT91C_TC_SWTRG
;
1611 // Reset the received frame, frame count and timing info
1620 while (!bStop
&& !BUTTON_PRESS()) {
1624 // Check if frame was captured and store it
1628 if (!LogTraceHitag(rx
, rxlen
, response
, 0, false)) {
1629 DbpString("Trace full");
1630 if (bQuitTraceFull
) {
1639 //check for valid input
1642 "usage: lf hitag writer [03 | 04] [CHALLENGE | KEY] [page] [byte0] [byte1] [byte2] [byte3]");
1646 // By default reset the transmission buffer
1650 if (rxlen
== 0 && tag
.tstate
== WRITING_PAGE_ACK
) {
1651 //no write access on this page
1652 Dbprintf("no write access on page %d", page_
);
1654 } else if (rxlen
== 0 && tag
.tstate
!= WRITING_PAGE_DATA
) {
1655 //start the authetication
1657 memcpy(tx
, "\xc0", nbytes(txlen
));
1660 } else if (tag
.pstate
!= SELECTED
) {
1661 //try to authenticate with the given key or challenge
1662 if (hitagS_handle_tag_auth(htf
,key
,NrAr
,rx
, rxlen
, tx
, &txlen
) == -1)
1665 if (tag
.pstate
== SELECTED
&& tag
.tstate
== NO_OP
&& rxlen
> 0) {
1666 //check if the given page exists
1667 if (page
> tag
.max_page
) {
1668 Dbprintf("page number too big");
1671 //ask Tag for write permission
1672 tag
.tstate
= WRITING_PAGE_ACK
;
1675 tx
[0] = 0x90 + (page
/ 16);
1676 calc_crc(&crc
, tx
[0], 8);
1677 calc_crc(&crc
, 0x00 + ((page
% 16) * 16), 4);
1678 tx
[1] = 0x00 + ((page
% 16) * 16) + (crc
/ 16);
1679 tx
[2] = 0x00 + (crc
% 16) * 16;
1680 } else if (tag
.pstate
== SELECTED
&& tag
.tstate
== WRITING_PAGE_ACK
1681 && rxlen
== 6 && rx
[0] == 0xf4) {
1682 //ACK recieved to write the page. send data
1683 tag
.tstate
= WRITING_PAGE_DATA
;
1686 calc_crc(&crc
, data
[3], 8);
1687 calc_crc(&crc
, data
[2], 8);
1688 calc_crc(&crc
, data
[1], 8);
1689 calc_crc(&crc
, data
[0], 8);
1695 } else if (tag
.pstate
== SELECTED
&& tag
.tstate
== WRITING_PAGE_DATA
1696 && rxlen
== 6 && rx
[0] == 0xf4) {
1698 Dbprintf("Successful!");
1702 // Send and store the reader command
1703 // Disable timer 1 with external trigger to avoid triggers during our own modulation
1704 AT91C_BASE_TC1
->TC_CCR
= AT91C_TC_CLKDIS
;
1706 // Wait for HITAG_T_WAIT_2 carrier periods after the last tag bit before transmitting,
1707 // Since the clock counts since the last falling edge, a 'one' means that the
1708 // falling edge occured halfway the period. with respect to this falling edge,
1709 // we need to wait (T_Wait2 + half_tag_period) when the last was a 'one'.
1710 // All timer values are in terms of T0 units
1712 while (AT91C_BASE_TC0
->TC_CV
1713 < T0
* (t_wait
+ (HITAG_T_TAG_HALF_PERIOD
* lastbit
)))
1716 // Transmit the reader frame
1717 hitag_reader_send_frame(tx
, txlen
);
1719 // Enable and reset external trigger in timer for capturing future frames
1720 AT91C_BASE_TC1
->TC_CCR
= AT91C_TC_CLKEN
| AT91C_TC_SWTRG
;
1722 // Add transmitted frame to total count
1726 // Store the frame in the trace
1727 if (!LogTraceHitag(tx
, txlen
, HITAG_T_WAIT_2
, 0, true)) {
1728 if (bQuitTraceFull
) {
1729 DbpString("Trace full");
1738 // Reset values for receiving frames
1739 memset(rx
, 0x00, sizeof(rx
));
1743 tag_sof
= reset_sof
;
1746 // Receive frame, watch for at most T0*EOF periods
1747 while (AT91C_BASE_TC1
->TC_CV
< T0
* HITAG_T_WAIT_MAX
) {
1748 // Check if falling edge in tag modulation is detected
1749 if (AT91C_BASE_TC1
->TC_SR
& AT91C_TC_LDRAS
) {
1750 // Retrieve the new timing values
1751 int ra
= (AT91C_BASE_TC1
->TC_RA
/ T0
);
1753 // Reset timer every frame, we have to capture the last edge for timing
1754 AT91C_BASE_TC0
->TC_CCR
= AT91C_TC_SWTRG
;
1758 // Capture tag frame (manchester decoding using only falling edges)
1759 if (ra
>= HITAG_T_EOF
) {
1761 //DbpString("wierd1?");
1763 // Capture the T0 periods that have passed since last communication or field drop (reset)
1764 // We always recieve a 'one' first, which has the falling edge after a half period |-_|
1765 response
= ra
- HITAG_T_TAG_HALF_PERIOD
;
1766 } else if (ra
>= HITAG_T_TAG_CAPTURE_FOUR_HALF
) {
1767 // Manchester coding example |-_|_-|-_| (101)
1768 rx
[rxlen
/ 8] |= 0 << (7 - (rxlen
% 8));
1770 rx
[rxlen
/ 8] |= 1 << (7 - (rxlen
% 8));
1772 } else if (ra
>= HITAG_T_TAG_CAPTURE_THREE_HALF
) {
1773 // Manchester coding example |_-|...|_-|-_| (0...01)
1774 rx
[rxlen
/ 8] |= 0 << (7 - (rxlen
% 8));
1776 // We have to skip this half period at start and add the 'one' the second time
1778 rx
[rxlen
/ 8] |= 1 << (7 - (rxlen
% 8));
1783 } else if (ra
>= HITAG_T_TAG_CAPTURE_TWO_HALF
) {
1784 // Manchester coding example |_-|_-| (00) or |-_|-_| (11)
1786 // Ignore bits that are transmitted during SOF
1789 // bit is same as last bit
1790 rx
[rxlen
/ 8] |= lastbit
<< (7 - (rxlen
% 8));
1794 // Ignore wierd value, is to small to mean anything
1798 // We can break this loop if we received the last bit from a frame
1799 if (AT91C_BASE_TC1
->TC_CV
> T0
* HITAG_T_EOF
) {
1808 AT91C_BASE_TC1
->TC_CCR
= AT91C_TC_CLKDIS
;
1809 AT91C_BASE_TC0
->TC_CCR
= AT91C_TC_CLKDIS
;
1810 FpgaWriteConfWord(FPGA_MAJOR_MODE_OFF
);
1811 cmd_send(CMD_ACK
, bSuccessful
, 0, 0, 0, 0);
1815 * Tries to authenticate to a Hitag S Transponder with the given challenges from a .cc file.
1816 * Displays all Challenges that failed.
1817 * When collecting Challenges to break the key it is possible that some data
1818 * is not received correctly due to Antenna problems. This function
1819 * detects these challenges.
1821 void check_challenges(bool file_given
, byte_t
* data
) {
1826 byte_t rx
[HITAG_FRAME_LEN
];
1827 byte_t unlocker
[60][8];
1830 byte_t txbuf
[HITAG_FRAME_LEN
];
1837 int t_wait
= HITAG_T_WAIT_MAX
;
1840 bool bQuitTraceFull
= false;
1841 int response_bit
[200];
1842 unsigned char mask
= 1;
1843 unsigned char uid
[32];
1846 FpgaDownloadAndGo(FPGA_BITSTREAM_LF
);
1847 // Reset the return status
1848 bSuccessful
= false;
1850 // Clean up trace and prepare it for storing frames
1855 bQuitTraceFull
= true;
1859 // Configure output and enable pin that is connected to the FPGA (for modulating)
1860 AT91C_BASE_PIOA
->PIO_OER
= GPIO_SSC_DOUT
;
1861 AT91C_BASE_PIOA
->PIO_PER
= GPIO_SSC_DOUT
;
1863 // Set fpga in edge detect with reader field, we can modulate as reader now
1865 FPGA_MAJOR_MODE_LF_EDGE_DETECT
| FPGA_LF_EDGE_DETECT_READER_FIELD
);
1867 // Set Frequency divisor which will drive the FPGA and analog mux selection
1868 FpgaSendCommand(FPGA_CMD_SET_DIVISOR
, 95); //125Khz
1869 SetAdcMuxFor(GPIO_MUXSEL_LOPKD
);
1872 // Disable modulation at default, which means enable the field
1875 // Give it a bit of time for the resonant antenna to settle.
1878 // Enable Peripheral Clock for TIMER_CLOCK0, used to measure exact timing before answering
1879 AT91C_BASE_PMC
->PMC_PCER
= (1 << AT91C_ID_TC0
);
1881 // Enable Peripheral Clock for TIMER_CLOCK1, used to capture edges of the tag frames
1882 AT91C_BASE_PMC
->PMC_PCER
= (1 << AT91C_ID_TC1
);
1883 AT91C_BASE_PIOA
->PIO_BSR
= GPIO_SSC_FRAME
;
1885 // Disable timer during configuration
1886 AT91C_BASE_TC1
->TC_CCR
= AT91C_TC_CLKDIS
;
1888 // Capture mode, defaul timer source = MCK/2 (TIMER_CLOCK1), TIOA is external trigger,
1889 // external trigger rising edge, load RA on falling edge of TIOA.
1890 AT91C_BASE_TC1
->TC_CMR
= AT91C_TC_CLKS_TIMER_DIV1_CLOCK
1892 | AT91C_TC_ETRGEDG_FALLING
| AT91C_TC_ABETRG
| AT91C_TC_LDRA_FALLING
;
1894 // Enable and reset counters
1895 AT91C_BASE_TC0
->TC_CCR
= AT91C_TC_CLKEN
| AT91C_TC_SWTRG
;
1896 AT91C_BASE_TC1
->TC_CCR
= AT91C_TC_CLKEN
| AT91C_TC_SWTRG
;
1898 // Reset the received frame, frame count and timing info
1908 DbpString("Loading challenges...");
1909 memcpy((byte_t
*)unlocker
,data
,60*8);
1912 while (file_given
&& !bStop
&& !BUTTON_PRESS()) {
1916 // Check if frame was captured and store it
1920 if (!LogTraceHitag(rx
, rxlen
, response
, 0, false)) {
1921 DbpString("Trace full");
1922 if (bQuitTraceFull
) {
1936 Dbprintf("Challenge failed: %02X %02X %02X %02X %02X %02X %02X %02X",
1937 unlocker
[u1
- 1][0], unlocker
[u1
- 1][1],
1938 unlocker
[u1
- 1][2], unlocker
[u1
- 1][3],
1939 unlocker
[u1
- 1][4], unlocker
[u1
- 1][5],
1940 unlocker
[u1
- 1][6], unlocker
[u1
- 1][7]);
1943 //start new authentication
1944 memcpy(tx
, "\xc0", nbytes(txlen
));
1945 } else if (rxlen
>= 67 && STATE
== 0) {
1948 for (i
= 0; i
< 10; i
++) {
1949 for (j
= 0; j
< 8; j
++) {
1950 response_bit
[z
] = 0;
1951 if ((rx
[i
] & ((mask
<< 7) >> j
)) != 0)
1952 response_bit
[z
] = 1;
1957 for (i
= 5; i
< z
; i
+= 2) {
1958 uid
[k
] = response_bit
[i
];
1963 uid_byte
[0] = (uid
[0] << 7) | (uid
[1] << 6) | (uid
[2] << 5)
1964 | (uid
[3] << 4) | (uid
[4] << 3) | (uid
[5] << 2)
1965 | (uid
[6] << 1) | uid
[7];
1966 uid_byte
[1] = (uid
[8] << 7) | (uid
[9] << 6) | (uid
[10] << 5)
1967 | (uid
[11] << 4) | (uid
[12] << 3) | (uid
[13] << 2)
1968 | (uid
[14] << 1) | uid
[15];
1969 uid_byte
[2] = (uid
[16] << 7) | (uid
[17] << 6) | (uid
[18] << 5)
1970 | (uid
[19] << 4) | (uid
[20] << 3) | (uid
[21] << 2)
1971 | (uid
[22] << 1) | uid
[23];
1972 uid_byte
[3] = (uid
[24] << 7) | (uid
[25] << 6) | (uid
[26] << 5)
1973 | (uid
[27] << 4) | (uid
[28] << 3) | (uid
[29] << 2)
1974 | (uid
[30] << 1) | uid
[31];
1975 //Dbhexdump(10, rx, rxlen);
1979 calc_crc(&crc
, 0x00, 5);
1980 calc_crc(&crc
, uid_byte
[0], 8);
1981 calc_crc(&crc
, uid_byte
[1], 8);
1982 calc_crc(&crc
, uid_byte
[2], 8);
1983 calc_crc(&crc
, uid_byte
[3], 8);
1984 for (i
= 0; i
< 100; i
++) {
1985 response_bit
[i
] = 0;
1987 for (i
= 0; i
< 5; i
++) {
1988 response_bit
[i
] = 0;
1990 for (i
= 5; i
< 37; i
++) {
1991 response_bit
[i
] = uid
[i
- 5];
1993 for (j
= 0; j
< 8; j
++) {
1994 response_bit
[i
] = 0;
1995 if ((crc
& ((mask
<< 7) >> j
)) != 0)
1996 response_bit
[i
] = 1;
2000 for (i
= 0; i
< 6; i
++) {
2001 tx
[i
] = (response_bit
[k
] << 7) | (response_bit
[k
+ 1] << 6)
2002 | (response_bit
[k
+ 2] << 5)
2003 | (response_bit
[k
+ 3] << 4)
2004 | (response_bit
[k
+ 4] << 3)
2005 | (response_bit
[k
+ 5] << 2)
2006 | (response_bit
[k
+ 6] << 1) | response_bit
[k
+ 7];
2010 } else if (STATE
== 1 && rxlen
== 44) {
2011 //received configuration
2014 for (i
= 0; i
< 6; i
++) {
2015 for (j
= 0; j
< 8; j
++) {
2016 response_bit
[z
] = 0;
2017 if ((rx
[i
] & ((mask
<< 7) >> j
)) != 0)
2018 response_bit
[z
] = 1;
2024 if (u1
>= (sizeof(unlocker
) / sizeof(unlocker
[0])))
2026 for (i
= 0; i
< 8; i
++)
2027 tx
[i
] = unlocker
[u1
][i
];
2030 } else if (STATE
== 2 && rxlen
>= 44) {
2034 // Send and store the reader command
2035 // Disable timer 1 with external trigger to avoid triggers during our own modulation
2036 AT91C_BASE_TC1
->TC_CCR
= AT91C_TC_CLKDIS
;
2038 // Wait for HITAG_T_WAIT_2 carrier periods after the last tag bit before transmitting,
2039 // Since the clock counts since the last falling edge, a 'one' means that the
2040 // falling edge occured halfway the period. with respect to this falling edge,
2041 // we need to wait (T_Wait2 + half_tag_period) when the last was a 'one'.
2042 // All timer values are in terms of T0 units
2044 while (AT91C_BASE_TC0
->TC_CV
2045 < T0
* (t_wait
+ (HITAG_T_TAG_HALF_PERIOD
* lastbit
)))
2048 // Transmit the reader frame
2049 hitag_reader_send_frame(tx
, txlen
);
2051 // Enable and reset external trigger in timer for capturing future frames
2052 AT91C_BASE_TC1
->TC_CCR
= AT91C_TC_CLKEN
| AT91C_TC_SWTRG
;
2054 // Add transmitted frame to total count
2058 // Store the frame in the trace
2059 if (!LogTraceHitag(tx
, txlen
, HITAG_T_WAIT_2
, 0, true)) {
2060 if (bQuitTraceFull
) {
2061 DbpString("Trace full");
2070 // Reset values for receiving frames
2071 memset(rx
, 0x00, sizeof(rx
));
2075 tag_sof
= reset_sof
;
2078 // Receive frame, watch for at most T0*EOF periods
2079 while (AT91C_BASE_TC1
->TC_CV
< T0
* HITAG_T_WAIT_MAX
) {
2080 // Check if falling edge in tag modulation is detected
2081 if (AT91C_BASE_TC1
->TC_SR
& AT91C_TC_LDRAS
) {
2082 // Retrieve the new timing values
2083 int ra
= (AT91C_BASE_TC1
->TC_RA
/ T0
);
2085 // Reset timer every frame, we have to capture the last edge for timing
2086 AT91C_BASE_TC0
->TC_CCR
= AT91C_TC_SWTRG
;
2090 // Capture tag frame (manchester decoding using only falling edges)
2091 if (ra
>= HITAG_T_EOF
) {
2093 //DbpString("wierd1?");
2095 // Capture the T0 periods that have passed since last communication or field drop (reset)
2096 // We always recieve a 'one' first, which has the falling edge after a half period |-_|
2097 response
= ra
- HITAG_T_TAG_HALF_PERIOD
;
2098 } else if (ra
>= HITAG_T_TAG_CAPTURE_FOUR_HALF
) {
2099 // Manchester coding example |-_|_-|-_| (101)
2100 rx
[rxlen
/ 8] |= 0 << (7 - (rxlen
% 8));
2102 rx
[rxlen
/ 8] |= 1 << (7 - (rxlen
% 8));
2104 } else if (ra
>= HITAG_T_TAG_CAPTURE_THREE_HALF
) {
2105 // Manchester coding example |_-|...|_-|-_| (0...01)
2106 rx
[rxlen
/ 8] |= 0 << (7 - (rxlen
% 8));
2108 // We have to skip this half period at start and add the 'one' the second time
2110 rx
[rxlen
/ 8] |= 1 << (7 - (rxlen
% 8));
2115 } else if (ra
>= HITAG_T_TAG_CAPTURE_TWO_HALF
) {
2116 // Manchester coding example |_-|_-| (00) or |-_|-_| (11)
2118 // Ignore bits that are transmitted during SOF
2121 // bit is same as last bit
2122 rx
[rxlen
/ 8] |= lastbit
<< (7 - (rxlen
% 8));
2126 // Ignore wierd value, is to small to mean anything
2130 // We can break this loop if we received the last bit from a frame
2131 if (AT91C_BASE_TC1
->TC_CV
> T0
* HITAG_T_EOF
) {
2139 AT91C_BASE_TC1
->TC_CCR
= AT91C_TC_CLKDIS
;
2140 AT91C_BASE_TC0
->TC_CCR
= AT91C_TC_CLKDIS
;
2141 FpgaWriteConfWord(FPGA_MAJOR_MODE_OFF
);
2142 cmd_send(CMD_ACK
, bSuccessful
, 0, 0, 0, 0);