]> git.zerfleddert.de Git - proxmark3-svn/blob - client/cmdlfpyramid.c
d1b4c293e396044a5eba952b15155407a835ba31
[proxmark3-svn] / client / cmdlfpyramid.c
1 //-----------------------------------------------------------------------------
2 //
3 // This code is licensed to you under the terms of the GNU GPL, version 2 or,
4 // at your option, any later version. See the LICENSE.txt file for the text of
5 // the license.
6 //-----------------------------------------------------------------------------
7 // Low frequency Farpoint / Pyramid tag commands
8 //-----------------------------------------------------------------------------
9 #include <string.h>
10 #include <inttypes.h>
11 #include <stdio.h>
12 #include "proxmark3.h"
13 #include "ui.h"
14 #include "util.h"
15 #include "graph.h"
16 #include "cmdparser.h"
17 #include "cmddata.h" // setDemodBuf +
18 #include "cmdmain.h"
19 #include "cmdlf.h"
20 #include "protocols.h" // for T55xx config register definitions
21 #include "lfdemod.h" // parityTest
22 #include "crc.h"
23
24 static int CmdHelp(const char *Cmd);
25
26 int usage_lf_pyramid_clone(void){
27 PrintAndLog("clone a Farpointe/Pyramid tag to a T55x7 tag.");
28 PrintAndLog("The facility-code is 8-bit and the card number is 16-bit. Larger values are truncated. ");
29 PrintAndLog("Currently only works on 26bit");
30 PrintAndLog("");
31 PrintAndLog("Usage: lf pyramid clone <Facility-Code> <Card-Number>");
32 PrintAndLog("Options :");
33 PrintAndLog(" <Facility-Code> : 8-bit value facility code");
34 PrintAndLog(" <Card Number> : 16-bit value card number");
35 PrintAndLog(" Q5 : optional - clone to Q5 (T5555) instead of T55x7 chip");
36 PrintAndLog("");
37 PrintAndLog("Sample : lf pyramid clone 123 11223");
38 return 0;
39 }
40
41 int usage_lf_pyramid_sim(void) {
42 PrintAndLog("Enables simulation of Farpointe/Pyramid card with specified card number.");
43 PrintAndLog("Simulation runs until the button is pressed or another USB command is issued.");
44 PrintAndLog("The facility-code is 8-bit and the card number is 16-bit. Larger values are truncated.");
45 PrintAndLog("Currently work only on 26bit");
46 PrintAndLog("");
47 PrintAndLog("Usage: lf pyramid sim <Card-Number>");
48 PrintAndLog("Options :");
49 PrintAndLog(" <Facility-Code> : 8-bit value facility code");
50 PrintAndLog(" <Card Number> : 16-bit value card number");
51 PrintAndLog("");
52 PrintAndLog("Sample : lf pyramid sim 123 11223");
53 return 0;
54 }
55
56 // Works for 26bits.
57 int GetPyramidBits(uint32_t fc, uint32_t cn, uint8_t *pyramidBits) {
58
59 uint8_t pre[128];
60 memset(pre, 0x00, sizeof(pre));
61
62 // format start bit
63 pre[79] = 1;
64
65 // Get 26 wiegand from FacilityCode, CardNumber
66 uint8_t wiegand[24];
67 memset(wiegand, 0x00, sizeof(wiegand));
68 num_to_bytebits(fc, 8, wiegand);
69 num_to_bytebits(cn, 16, wiegand+8);
70
71 // add wiegand parity bits (dest, source, len)
72 wiegand_add_parity(pre+80, wiegand, 24);
73
74 // add paritybits (bitsource, dest, sourcelen, paritylen, parityType (odd, even,)
75 addParity(pre+8, pyramidBits+8, 102, 8, 1);
76
77 // add checksum
78 uint8_t csBuff[13];
79 for (uint8_t i = 0; i < 13; i++)
80 csBuff[i] = bytebits_to_byte(pyramidBits + 16 + (i*8), 8);
81
82 uint32_t crc = CRC8Maxim(csBuff, 13);
83 num_to_bytebits(crc, 8, pyramidBits+120);
84 return 1;
85 }
86
87 //by marshmellow
88 //Pyramid Prox demod - FSK RF/50 with preamble of 0000000000000001 (always a 128 bit data stream)
89 //print full Farpointe Data/Pyramid Prox ID and some bit format details if found
90 int CmdFSKdemodPyramid(const char *Cmd)
91 {
92 //raw fsk demod no manchester decoding no start bit finding just get binary from wave
93 uint8_t BitStream[MAX_GRAPH_TRACE_LEN]={0};
94 size_t size = getFromGraphBuf(BitStream);
95 if (size==0) return 0;
96
97 //get binary from fsk wave
98 int idx = PyramiddemodFSK(BitStream, &size);
99 if (idx < 0){
100 if (g_debugMode){
101 if (idx == -5)
102 PrintAndLog("DEBUG: Error - not enough samples");
103 else if (idx == -1)
104 PrintAndLog("DEBUG: Error - only noise found");
105 else if (idx == -2)
106 PrintAndLog("DEBUG: Error - problem during FSK demod");
107 else if (idx == -3)
108 PrintAndLog("DEBUG: Error - Size not correct: %d", size);
109 else if (idx == -4)
110 PrintAndLog("DEBUG: Error - Pyramid preamble not found");
111 else
112 PrintAndLog("DEBUG: Error - idx: %d",idx);
113 }
114 return 0;
115 }
116 // Index map
117 // 0 10 20 30 40 50 60
118 // | | | | | | |
119 // 0123456 7 8901234 5 6789012 3 4567890 1 2345678 9 0123456 7 8901234 5 6789012 3
120 // -----------------------------------------------------------------------------
121 // 0000000 0 0000000 1 0000000 1 0000000 1 0000000 1 0000000 1 0000000 1 0000000 1
122 // premable xxxxxxx o xxxxxxx o xxxxxxx o xxxxxxx o xxxxxxx o xxxxxxx o xxxxxxx o
123
124 // 64 70 80 90 100 110 120
125 // | | | | | | |
126 // 4567890 1 2345678 9 0123456 7 8901234 5 6789012 3 4567890 1 2345678 9 0123456 7
127 // -----------------------------------------------------------------------------
128 // 0000000 1 0000000 1 0000000 1 0110111 0 0011000 1 0000001 0 0001100 1 1001010 0
129 // xxxxxxx o xxxxxxx o xxxxxxx o xswffff o ffffccc o ccccccc o ccccccw o ppppppp o
130 // |---115---||---------71---------|
131 // s = format start bit, o = odd parity of last 7 bits
132 // f = facility code, c = card number
133 // w = wiegand parity, x = extra space for other formats
134 // p = unknown checksum
135 // (26 bit format shown)
136
137 //get bytes for checksum calc
138 uint8_t checksum = bytebits_to_byte(BitStream + idx + 120, 8);
139 uint8_t csBuff[14] = {0x00};
140 for (uint8_t i = 0; i < 13; i++){
141 csBuff[i] = bytebits_to_byte(BitStream + idx + 16 + (i*8), 8);
142 }
143 //check checksum calc
144 //checksum calc thanks to ICEMAN!!
145 uint32_t checkCS = CRC8Maxim(csBuff,13);
146
147 //get raw ID before removing parities
148 uint32_t rawLo = bytebits_to_byte(BitStream+idx+96,32);
149 uint32_t rawHi = bytebits_to_byte(BitStream+idx+64,32);
150 uint32_t rawHi2 = bytebits_to_byte(BitStream+idx+32,32);
151 uint32_t rawHi3 = bytebits_to_byte(BitStream+idx,32);
152 setDemodBuf(BitStream,128,idx);
153
154 size = removeParity(BitStream, idx+8, 8, 1, 120);
155 if (size != 105){
156 if (g_debugMode)
157 PrintAndLog("DEBUG: Error at parity check - tag size does not match Pyramid format, SIZE: %d, IDX: %d, hi3: %x",size, idx, rawHi3);
158 return 0;
159 }
160
161 // ok valid card found!
162
163 // Index map
164 // 0 10 20 30 40 50 60 70
165 // | | | | | | | |
166 // 01234567890123456789012345678901234567890123456789012345678901234567890
167 // -----------------------------------------------------------------------
168 // 00000000000000000000000000000000000000000000000000000000000000000000000
169 // xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
170
171 // 71 80 90 100
172 // | | | |
173 // 1 2 34567890 1234567890123456 7 8901234
174 // ---------------------------------------
175 // 1 1 01110011 0000000001000110 0 1001010
176 // s w ffffffff cccccccccccccccc w ppppppp
177 // |--115-| |------71------|
178 // s = format start bit, o = odd parity of last 7 bits
179 // f = facility code, c = card number
180 // w = wiegand parity, x = extra space for other formats
181 // p = unknown checksum
182 // (26 bit format shown)
183
184 //find start bit to get fmtLen
185 int j;
186 for (j=0; j<size; j++){
187 if(BitStream[j]) break;
188 }
189 uint8_t fmtLen = size-j-8;
190 uint32_t fc = 0;
191 uint32_t cardnum = 0;
192 uint32_t code1 = 0;
193 if (fmtLen==26){
194 fc = bytebits_to_byte(BitStream+73, 8);
195 cardnum = bytebits_to_byte(BitStream+81, 16);
196 code1 = bytebits_to_byte(BitStream+72,fmtLen);
197 PrintAndLog("Pyramid ID Found - BitLength: %d, FC: %d, Card: %d - Wiegand: %x, Raw: %08x%08x%08x%08x", fmtLen, fc, cardnum, code1, rawHi3, rawHi2, rawHi, rawLo);
198 } else if (fmtLen==45){
199 fmtLen=42; //end = 10 bits not 7 like 26 bit fmt
200 fc = bytebits_to_byte(BitStream+53, 10);
201 cardnum = bytebits_to_byte(BitStream+63, 32);
202 PrintAndLog("Pyramid ID Found - BitLength: %d, FC: %d, Card: %d - Raw: %08x%08x%08x%08x", fmtLen, fc, cardnum, rawHi3, rawHi2, rawHi, rawLo);
203 } else {
204 cardnum = bytebits_to_byte(BitStream+81, 16);
205 if (fmtLen>32){
206 //code1 = bytebits_to_byte(BitStream+(size-fmtLen),fmtLen-32);
207 //code2 = bytebits_to_byte(BitStream+(size-32),32);
208 PrintAndLog("Pyramid ID Found - BitLength: %d -unknown BitLength- (%d), Raw: %08x%08x%08x%08x", fmtLen, cardnum, rawHi3, rawHi2, rawHi, rawLo);
209 } else{
210 //code1 = bytebits_to_byte(BitStream+(size-fmtLen),fmtLen);
211 PrintAndLog("Pyramid ID Found - BitLength: %d -unknown BitLength- (%d), Raw: %08x%08x%08x%08x", fmtLen, cardnum, rawHi3, rawHi2, rawHi, rawLo);
212 }
213 }
214 if (checksum == checkCS)
215 PrintAndLog("Checksum %02x passed", checksum);
216 else
217 PrintAndLog("Checksum %02x failed - should have been %02x", checksum, checkCS);
218
219 if (g_debugMode){
220 PrintAndLog("DEBUG: idx: %d, Len: %d, Printing Demod Buffer:", idx, 128);
221 printDemodBuff();
222 }
223 return 1;
224 }
225
226 int CmdPyramidRead(const char *Cmd) {
227 CmdLFRead("s");
228 getSamples("30000",false);
229 return CmdFSKdemodPyramid("");
230 }
231
232 int CmdPyramidClone(const char *Cmd) {
233
234 char cmdp = param_getchar(Cmd, 0);
235 if (strlen(Cmd) == 0 || cmdp == 'h' || cmdp == 'H') return usage_lf_pyramid_clone();
236
237 uint32_t facilitycode=0, cardnumber=0, fc = 0, cn = 0;
238 uint32_t blocks[5];
239 uint8_t i;
240 uint8_t bs[128];
241 memset(bs, 0x00, sizeof(bs));
242
243 if (sscanf(Cmd, "%u %u", &fc, &cn ) != 2) return usage_lf_pyramid_clone();
244
245 facilitycode = (fc & 0x000000FF);
246 cardnumber = (cn & 0x0000FFFF);
247
248 if ( !GetPyramidBits(facilitycode, cardnumber, bs)) {
249 PrintAndLog("Error with tag bitstream generation.");
250 return 1;
251 }
252
253 //Pyramid - compat mode, FSK2a, data rate 50, 4 data blocks
254 blocks[0] = T55x7_MODULATION_FSK2a | T55x7_BITRATE_RF_50 | 4<<T55x7_MAXBLOCK_SHIFT;
255
256 if (param_getchar(Cmd, 3) == 'Q' || param_getchar(Cmd, 3) == 'q')
257 blocks[0] = T5555_MODULATION_FSK2 | T5555_INVERT_OUTPUT | 50<<T5555_BITRATE_SHIFT | 4<<T5555_MAXBLOCK_SHIFT;
258
259 blocks[1] = bytebits_to_byte(bs,32);
260 blocks[2] = bytebits_to_byte(bs+32,32);
261 blocks[3] = bytebits_to_byte(bs+64,32);
262 blocks[4] = bytebits_to_byte(bs+96,32);
263
264 PrintAndLog("Preparing to clone Farpointe/Pyramid to T55x7 with Facility Code: %u, Card Number: %u", facilitycode, cardnumber);
265 PrintAndLog("Blk | Data ");
266 PrintAndLog("----+------------");
267 for ( i = 0; i<5; ++i )
268 PrintAndLog(" %02d | %08" PRIx32, i, blocks[i]);
269
270 UsbCommand resp;
271 UsbCommand c = {CMD_T55XX_WRITE_BLOCK, {0,0,0}};
272
273 for ( i = 0; i<5; ++i ) {
274 c.arg[0] = blocks[i];
275 c.arg[1] = i;
276 clearCommandBuffer();
277 SendCommand(&c);
278 if (!WaitForResponseTimeout(CMD_ACK, &resp, 1000)){
279 PrintAndLog("Error occurred, device did not respond during write operation.");
280 return -1;
281 }
282 }
283 return 0;
284 }
285
286 int CmdPyramidSim(const char *Cmd) {
287
288 char cmdp = param_getchar(Cmd, 0);
289 if (strlen(Cmd) == 0 || cmdp == 'h' || cmdp == 'H') return usage_lf_pyramid_sim();
290
291 uint32_t facilitycode = 0, cardnumber = 0, fc = 0, cn = 0;
292
293 uint8_t bs[128];
294 size_t size = sizeof(bs);
295 memset(bs, 0x00, size);
296
297 // Pyramid uses: fcHigh: 10, fcLow: 8, clk: 50, invert: 0
298 uint64_t arg1, arg2;
299 arg1 = (10 << 8) + 8;
300 arg2 = 50 | 0;
301
302 if (sscanf(Cmd, "%u %u", &fc, &cn ) != 2) return usage_lf_pyramid_sim();
303
304 facilitycode = (fc & 0x000000FF);
305 cardnumber = (cn & 0x0000FFFF);
306
307 if ( !GetPyramidBits(facilitycode, cardnumber, bs)) {
308 PrintAndLog("Error with tag bitstream generation.");
309 return 1;
310 }
311
312 PrintAndLog("Simulating Farpointe/Pyramid - Facility Code: %u, CardNumber: %u", facilitycode, cardnumber );
313
314 UsbCommand c = {CMD_FSK_SIM_TAG, {arg1, arg2, size}};
315 memcpy(c.d.asBytes, bs, size);
316 clearCommandBuffer();
317 SendCommand(&c);
318 return 0;
319 }
320
321 static command_t CommandTable[] = {
322 {"help", CmdHelp, 1, "This help"},
323 {"demod", CmdFSKdemodPyramid, 1, "Demodulate a Pyramid FSK tag from the GraphBuffer"},
324 {"read", CmdPyramidRead, 0, "Attempt to read and extract tag data"},
325 {"clone", CmdPyramidClone, 0, "<Facility-Code> <Card Number> clone pyramid tag"},
326 {"sim", CmdPyramidSim, 0, "<Facility-Code> <Card Number> simulate pyramid tag"},
327 {NULL, NULL, 0, NULL}
328 };
329
330 int CmdLFPyramid(const char *Cmd) {
331 clearCommandBuffer();
332 CmdsParse(CommandTable, Cmd);
333 return 0;
334 }
335
336 int CmdHelp(const char *Cmd) {
337 CmdsHelp(CommandTable);
338 return 0;
339 }
Impressum, Datenschutz