]>
git.zerfleddert.de Git - proxmark3-svn/blob - client/cmdlfindala.c
8ec04cbb7ef4e4bc1ab88754b70373390a9774fd
1 //-----------------------------------------------------------------------------
3 // This code is licensed to you under the terms of the GNU GPL, version 2 or,
4 // at your option, any later version. See the LICENSE.txt file for the text of
6 //-----------------------------------------------------------------------------
7 // Low frequency Indala commands
8 // PSK1, rf/32, 64 or 224 bits (known)
9 //-----------------------------------------------------------------------------
13 #include "cmdlfindala.h"
14 #include "proxmark3.h"
17 #include "cmdparser.h"
18 #include "cmddata.h" //for g_debugMode, demodbuff cmds
19 #include "lfdemod.h" //for indala26decode
20 #include "util.h" //for sprint_bin_break
21 #include "cmdlf.h" //for CmdLFRead
22 #include "cmdmain.h" //for clearCommandBuffer
24 static int CmdHelp(const char *Cmd
);
26 // Indala 26 bit decode
28 // optional arguments - same as PSKDemod (clock & invert & maxerr)
29 int CmdIndalaDecode(const char *Cmd
) {
32 ans
= PSKDemod(Cmd
, 0);
33 } else { //default to RF/32
34 ans
= PSKDemod("32", 0);
38 if (g_debugMode
) PrintAndLog("Error1: %i",ans
);
42 size_t size
= DemodBufferLen
;
43 int startIdx
= indala26decode(DemodBuffer
, &size
, &invert
);
44 if (startIdx
< 0 || size
> 224) {
45 if (g_debugMode
) PrintAndLog("Error2: %i",startIdx
);
48 setDemodBuf(DemodBuffer
, size
, (size_t)startIdx
);
49 setClockGrid(g_DemodClock
, g_DemodStartIdx
+ (startIdx
*g_DemodClock
));
52 PrintAndLog("Had to invert bits");
54 PrintAndLog("BitLen: %d",DemodBufferLen
);
56 uint32_t uid1
, uid2
, uid3
, uid4
, uid5
, uid6
, uid7
;
57 uid1
=bytebits_to_byte(DemodBuffer
,32);
58 uid2
=bytebits_to_byte(DemodBuffer
+32,32);
59 if (DemodBufferLen
==64) {
60 PrintAndLog("Indala UID=%s (%x%08x)", sprint_bin_break(DemodBuffer
,DemodBufferLen
,16), uid1
, uid2
);
61 } else if (DemodBufferLen
==224) {
62 uid3
=bytebits_to_byte(DemodBuffer
+64,32);
63 uid4
=bytebits_to_byte(DemodBuffer
+96,32);
64 uid5
=bytebits_to_byte(DemodBuffer
+128,32);
65 uid6
=bytebits_to_byte(DemodBuffer
+160,32);
66 uid7
=bytebits_to_byte(DemodBuffer
+192,32);
67 PrintAndLog("Indala UID=%s (%x%08x%08x%08x%08x%08x%08x)",
68 sprint_bin_break(DemodBuffer
,DemodBufferLen
,16), uid1
, uid2
, uid3
, uid4
, uid5
, uid6
, uid7
);
71 PrintAndLog("DEBUG: printing demodbuffer:");
77 int CmdIndalaRead(const char *Cmd
) {
79 return CmdIndalaDecode("");
82 // older alternative indala demodulate (has some positives and negatives)
83 // returns false positives more often - but runs against more sets of samples
84 // poor psk signal can be difficult to demod this approach might succeed when the other fails
85 // but the other appears to currently be more accurate than this approach most of the time.
86 int CmdIndalaDemod(const char *Cmd
) {
87 // Usage: recover 64bit UID by default, specify "224" as arg to recover a 224bit UID
93 // worst case with GraphTraceLen=64000 is < 4096
94 // under normal conditions it's < 2048
96 uint8_t rawbits
[4096];
98 int worst
= 0, worstPos
= 0;
100 //clear clock grid and demod plot
104 // PrintAndLog("Expecting a bit less than %d raw bits", GraphTraceLen / 32);
105 // loop through raw signal - since we know it is psk1 rf/32 fc/2 skip every other value (+=2)
106 for (i
= 0; i
< GraphTraceLen
-1; i
+= 2) {
108 if ((GraphBuffer
[i
] > GraphBuffer
[i
+ 1]) && (state
!= 1)) {
109 // appears redundant - marshmellow
111 for (j
= 0; j
< count
- 8; j
+= 16) {
112 rawbits
[rawbit
++] = 0;
114 if ((abs(count
- j
)) > worst
) {
115 worst
= abs(count
- j
);
121 } else if ((GraphBuffer
[i
] < GraphBuffer
[i
+ 1]) && (state
!= 0)) {
124 for (j
= 0; j
< count
- 8; j
+= 16) {
125 rawbits
[rawbit
++] = 1;
127 if ((abs(count
- j
)) > worst
) {
128 worst
= abs(count
- j
);
138 PrintAndLog("Recovered %d raw bits, expected: %d", rawbit
, GraphTraceLen
/32);
139 PrintAndLog("worst metric (0=best..7=worst): %d at pos %d", worst
, worstPos
);
144 // Finding the start of a UID
145 int uidlen
, long_wait
;
146 if (strcmp(Cmd
, "224") == 0) {
156 for (start
= 0; start
<= rawbit
- uidlen
; start
++) {
157 first
= rawbits
[start
];
158 for (i
= start
; i
< start
+ long_wait
; i
++) {
159 if (rawbits
[i
] != first
) {
163 if (i
== (start
+ long_wait
)) {
168 if (start
== rawbit
- uidlen
+ 1) {
169 PrintAndLog("nothing to wait for");
173 // Inverting signal if needed
175 for (i
= start
; i
< rawbit
; i
++) {
176 rawbits
[i
] = !rawbits
[i
];
181 uint8_t bits
[224] = {0x00};
182 char showbits
[225] = {0x00};
187 if (uidlen
> rawbit
) {
188 PrintAndLog("Warning: not enough raw bits to get a full UID");
189 for (bit
= 0; bit
< rawbit
; bit
++) {
190 bits
[bit
] = rawbits
[i
++];
191 // As we cannot know the parity, let's use "." and "/"
192 showbits
[bit
] = '.' + bits
[bit
];
194 showbits
[bit
+1]='\0';
195 PrintAndLog("Partial UID=%s", showbits
);
198 for (bit
= 0; bit
< uidlen
; bit
++) {
199 bits
[bit
] = rawbits
[i
++];
200 showbits
[bit
] = '0' + bits
[bit
];
206 uint32_t uid1
, uid2
, uid3
, uid4
, uid5
, uid6
, uid7
;
211 for( idx
=0; idx
<64; idx
++) {
212 if (showbits
[idx
] == '0') {
213 uid1
=(uid1
<<1)|(uid2
>>31);
216 uid1
=(uid1
<<1)|(uid2
>>31);
220 PrintAndLog("UID=%s (%x%08x)", showbits
, uid1
, uid2
);
223 uid3
= uid4
= uid5
= uid6
= uid7
= 0;
225 for( idx
=0; idx
<224; idx
++) {
226 uid1
=(uid1
<<1)|(uid2
>>31);
227 uid2
=(uid2
<<1)|(uid3
>>31);
228 uid3
=(uid3
<<1)|(uid4
>>31);
229 uid4
=(uid4
<<1)|(uid5
>>31);
230 uid5
=(uid5
<<1)|(uid6
>>31);
231 uid6
=(uid6
<<1)|(uid7
>>31);
233 if (showbits
[idx
] == '0')
234 uid7
= (uid7
<<1) | 0;
236 uid7
= (uid7
<<1) | 1;
238 PrintAndLog("UID=%s (%x%08x%08x%08x%08x%08x%08x)", showbits
, uid1
, uid2
, uid3
, uid4
, uid5
, uid6
, uid7
);
241 // Checking UID against next occurrences
243 for (; i
+ uidlen
<= rawbit
;) {
245 for (bit
= 0; bit
< uidlen
; bit
++) {
246 if (bits
[bit
] != rawbits
[i
++]) {
257 PrintAndLog("Occurrences: %d (expected %d)", times
, (rawbit
- start
) / uidlen
);
259 // Remodulating for tag cloning
260 // HACK: 2015-01-04 this will have an impact on our new way of seening lf commands (demod)
261 // since this changes graphbuffer data.
262 GraphTraceLen
= 32*uidlen
;
265 for (bit
= 0; bit
< uidlen
; bit
++) {
266 if (bits
[bit
] == 0) {
272 for (j
= 0; j
< 32; j
++) {
273 GraphBuffer
[i
++] = phase
;
278 RepaintGraphWindow();
282 int CmdIndalaClone(const char *Cmd
) {
284 unsigned int uid1
, uid2
, uid3
, uid4
, uid5
, uid6
, uid7
;
286 uid1
= uid2
= uid3
= uid4
= uid5
= uid6
= uid7
= 0;
289 if (strchr(Cmd
,'l') != 0) {
290 while (sscanf(&Cmd
[i
++], "%1x", &n
) == 1) {
291 uid1
= (uid1
<< 4) | (uid2
>> 28);
292 uid2
= (uid2
<< 4) | (uid3
>> 28);
293 uid3
= (uid3
<< 4) | (uid4
>> 28);
294 uid4
= (uid4
<< 4) | (uid5
>> 28);
295 uid5
= (uid5
<< 4) | (uid6
>> 28);
296 uid6
= (uid6
<< 4) | (uid7
>> 28);
297 uid7
= (uid7
<< 4) | (n
& 0xf);
299 PrintAndLog("Cloning 224bit tag with UID %x%08x%08x%08x%08x%08x%08x", uid1
, uid2
, uid3
, uid4
, uid5
, uid6
, uid7
);
300 c
.cmd
= CMD_INDALA_CLONE_TAG_L
;
301 c
.d
.asDwords
[0] = uid1
;
302 c
.d
.asDwords
[1] = uid2
;
303 c
.d
.asDwords
[2] = uid3
;
304 c
.d
.asDwords
[3] = uid4
;
305 c
.d
.asDwords
[4] = uid5
;
306 c
.d
.asDwords
[5] = uid6
;
307 c
.d
.asDwords
[6] = uid7
;
309 while (sscanf(&Cmd
[i
++], "%1x", &n
) == 1) {
310 uid1
= (uid1
<< 4) | (uid2
>> 28);
311 uid2
= (uid2
<< 4) | (n
& 0xf);
313 PrintAndLog("Cloning 64bit tag with UID %x%08x", uid1
, uid2
);
314 c
.cmd
= CMD_INDALA_CLONE_TAG
;
319 clearCommandBuffer();
324 static command_t CommandTable
[] = {
325 {"help", CmdHelp
, 1, "This help"},
326 {"demod", CmdIndalaDecode
, 1, "[clock] [invert<0|1>] -- Demodulate an indala tag (PSK1) from GraphBuffer (args optional)"},
327 {"read", CmdIndalaRead
, 0, "Read an Indala Prox tag from the antenna"},
328 {"clone", CmdIndalaClone
, 0, "<UID> ['l']-- Clone Indala to T55x7 (tag must be on antenna)(UID in HEX)(option 'l' for 224 UID"},
329 {"altdemod", CmdIndalaDemod
, 1, "['224'] -- Alternative method to Demodulate samples for Indala 64 bit UID (option '224' for 224 bit)"},
330 //{"sim", CmdIndalaSim, 0, "<ID> -- indala tag simulator"},
331 {NULL
, NULL
, 0, NULL
}
334 int CmdLFINDALA(const char *Cmd
) {
335 CmdsParse(CommandTable
, Cmd
);
339 int CmdHelp(const char *Cmd
) {
340 CmdsHelp(CommandTable
);