]>
git.zerfleddert.de Git - proxmark3-svn/blob - client/cmdlfindala.c
de1757e9ee35243a5ae1fab388eec03addc3f55f
1 //-----------------------------------------------------------------------------
3 // This code is licensed to you under the terms of the GNU GPL, version 2 or,
4 // at your option, any later version. See the LICENSE.txt file for the text of
6 //-----------------------------------------------------------------------------
7 // Low frequency Indala commands
8 // PSK1, rf/32, 64 or 224 bits (known)
9 //-----------------------------------------------------------------------------
13 #include "cmdlfindala.h"
14 #include "proxmark3.h"
17 #include "cmdparser.h"
18 #include "cmddata.h" //for g_debugMode, demodbuff cmds
19 #include "lfdemod.h" //for indala26decode
20 #include "util.h" //for sprint_bin_break
21 #include "cmdlf.h" //for CmdLFRead
22 #include "cmdmain.h" //for clearCommandBuffer
24 static int CmdHelp(const char *Cmd
);
26 // Indala 26 bit decode
28 // optional arguments - same as PSKDemod (clock & invert & maxerr)
29 int CmdIndalaDecode(const char *Cmd
) {
32 ans
= PSKDemod(Cmd
, 0);
33 } else { //default to RF/32
34 ans
= PSKDemod("32", 0);
38 if (g_debugMode
) PrintAndLog("Error1: %i",ans
);
42 size_t size
= DemodBufferLen
;
43 int startIdx
= indala26decode(DemodBuffer
, &size
, &invert
);
44 if (startIdx
< 0 || size
> 224) {
45 if (g_debugMode
) PrintAndLog("Error2: %i",startIdx
);
48 setDemodBuf(DemodBuffer
, size
, (size_t)startIdx
);
49 setClockGrid(g_DemodClock
, g_DemodStartIdx
+ (startIdx
*g_DemodClock
));
52 PrintAndLog("Had to invert bits");
54 PrintAndLog("BitLen: %d",DemodBufferLen
);
56 uint32_t uid1
, uid2
, uid3
, uid4
, uid5
, uid6
, uid7
;
57 uid1
=bytebits_to_byte(DemodBuffer
,32);
58 uid2
=bytebits_to_byte(DemodBuffer
+32,32);
59 if (DemodBufferLen
==64) {
60 PrintAndLog("Indala UID=%s (%x%08x)", sprint_bin_break(DemodBuffer
,DemodBufferLen
,16), uid1
, uid2
);
61 } else if (DemodBufferLen
==224) {
62 uid3
=bytebits_to_byte(DemodBuffer
+64,32);
63 uid4
=bytebits_to_byte(DemodBuffer
+96,32);
64 uid5
=bytebits_to_byte(DemodBuffer
+128,32);
65 uid6
=bytebits_to_byte(DemodBuffer
+160,32);
66 uid7
=bytebits_to_byte(DemodBuffer
+192,32);
67 PrintAndLog("Indala UID=%s (%x%08x%08x%08x%08x%08x%08x)",
68 sprint_bin_break(DemodBuffer
,DemodBufferLen
,16), uid1
, uid2
, uid3
, uid4
, uid5
, uid6
, uid7
);
71 PrintAndLog("DEBUG: printing demodbuffer:");
77 int CmdIndalaRead(const char *Cmd
) {
79 return CmdIndalaDecode("");
82 // older alternative indala demodulate (has some positives and negatives)
83 // returns false positives more often - but runs against more sets of samples
84 // poor psk signal can be difficult to demod this approach might succeed when the other fails
85 // but the other appears to currently be more accurate than this approach most of the time.
86 int CmdIndalaDemod(const char *Cmd
) {
87 // Usage: recover 64bit UID by default, specify "224" as arg to recover a 224bit UID
93 // worst case with GraphTraceLen=64000 is < 4096
94 // under normal conditions it's < 2048
96 uint8_t rawbits
[4096];
98 int worst
= 0, worstPos
= 0;
99 // PrintAndLog("Expecting a bit less than %d raw bits", GraphTraceLen / 32);
101 // loop through raw signal - since we know it is psk1 rf/32 fc/2 skip every other value (+=2)
102 for (i
= 0; i
< GraphTraceLen
-1; i
+= 2) {
104 if ((GraphBuffer
[i
] > GraphBuffer
[i
+ 1]) && (state
!= 1)) {
105 // appears redundant - marshmellow
107 for (j
= 0; j
< count
- 8; j
+= 16) {
108 rawbits
[rawbit
++] = 0;
110 if ((abs(count
- j
)) > worst
) {
111 worst
= abs(count
- j
);
117 } else if ((GraphBuffer
[i
] < GraphBuffer
[i
+ 1]) && (state
!= 0)) {
120 for (j
= 0; j
< count
- 8; j
+= 16) {
121 rawbits
[rawbit
++] = 1;
123 if ((abs(count
- j
)) > worst
) {
124 worst
= abs(count
- j
);
134 PrintAndLog("Recovered %d raw bits, expected: %d", rawbit
, GraphTraceLen
/32);
135 PrintAndLog("worst metric (0=best..7=worst): %d at pos %d", worst
, worstPos
);
140 // Finding the start of a UID
141 int uidlen
, long_wait
;
142 if (strcmp(Cmd
, "224") == 0) {
152 for (start
= 0; start
<= rawbit
- uidlen
; start
++) {
153 first
= rawbits
[start
];
154 for (i
= start
; i
< start
+ long_wait
; i
++) {
155 if (rawbits
[i
] != first
) {
159 if (i
== (start
+ long_wait
)) {
164 if (start
== rawbit
- uidlen
+ 1) {
165 PrintAndLog("nothing to wait for");
169 // Inverting signal if needed
171 for (i
= start
; i
< rawbit
; i
++) {
172 rawbits
[i
] = !rawbits
[i
];
177 uint8_t bits
[224] = {0x00};
178 char showbits
[225] = {0x00};
183 if (uidlen
> rawbit
) {
184 PrintAndLog("Warning: not enough raw bits to get a full UID");
185 for (bit
= 0; bit
< rawbit
; bit
++) {
186 bits
[bit
] = rawbits
[i
++];
187 // As we cannot know the parity, let's use "." and "/"
188 showbits
[bit
] = '.' + bits
[bit
];
190 showbits
[bit
+1]='\0';
191 PrintAndLog("Partial UID=%s", showbits
);
194 for (bit
= 0; bit
< uidlen
; bit
++) {
195 bits
[bit
] = rawbits
[i
++];
196 showbits
[bit
] = '0' + bits
[bit
];
202 uint32_t uid1
, uid2
, uid3
, uid4
, uid5
, uid6
, uid7
;
207 for( idx
=0; idx
<64; idx
++) {
208 if (showbits
[idx
] == '0') {
209 uid1
=(uid1
<<1)|(uid2
>>31);
212 uid1
=(uid1
<<1)|(uid2
>>31);
216 PrintAndLog("UID=%s (%x%08x)", showbits
, uid1
, uid2
);
219 uid3
= uid4
= uid5
= uid6
= uid7
= 0;
221 for( idx
=0; idx
<224; idx
++) {
222 uid1
=(uid1
<<1)|(uid2
>>31);
223 uid2
=(uid2
<<1)|(uid3
>>31);
224 uid3
=(uid3
<<1)|(uid4
>>31);
225 uid4
=(uid4
<<1)|(uid5
>>31);
226 uid5
=(uid5
<<1)|(uid6
>>31);
227 uid6
=(uid6
<<1)|(uid7
>>31);
229 if (showbits
[idx
] == '0')
230 uid7
= (uid7
<<1) | 0;
232 uid7
= (uid7
<<1) | 1;
234 PrintAndLog("UID=%s (%x%08x%08x%08x%08x%08x%08x)", showbits
, uid1
, uid2
, uid3
, uid4
, uid5
, uid6
, uid7
);
237 // Checking UID against next occurrences
239 for (; i
+ uidlen
<= rawbit
;) {
241 for (bit
= 0; bit
< uidlen
; bit
++) {
242 if (bits
[bit
] != rawbits
[i
++]) {
253 PrintAndLog("Occurrences: %d (expected %d)", times
, (rawbit
- start
) / uidlen
);
255 // Remodulating for tag cloning
256 // HACK: 2015-01-04 this will have an impact on our new way of seening lf commands (demod)
257 // since this changes graphbuffer data.
258 GraphTraceLen
= 32*uidlen
;
261 for (bit
= 0; bit
< uidlen
; bit
++) {
262 if (bits
[bit
] == 0) {
268 for (j
= 0; j
< 32; j
++) {
269 GraphBuffer
[i
++] = phase
;
274 RepaintGraphWindow();
278 int CmdIndalaClone(const char *Cmd
) {
280 unsigned int uid1
, uid2
, uid3
, uid4
, uid5
, uid6
, uid7
;
282 uid1
= uid2
= uid3
= uid4
= uid5
= uid6
= uid7
= 0;
285 if (strchr(Cmd
,'l') != 0) {
286 while (sscanf(&Cmd
[i
++], "%1x", &n
) == 1) {
287 uid1
= (uid1
<< 4) | (uid2
>> 28);
288 uid2
= (uid2
<< 4) | (uid3
>> 28);
289 uid3
= (uid3
<< 4) | (uid4
>> 28);
290 uid4
= (uid4
<< 4) | (uid5
>> 28);
291 uid5
= (uid5
<< 4) | (uid6
>> 28);
292 uid6
= (uid6
<< 4) | (uid7
>> 28);
293 uid7
= (uid7
<< 4) | (n
& 0xf);
295 PrintAndLog("Cloning 224bit tag with UID %x%08x%08x%08x%08x%08x%08x", uid1
, uid2
, uid3
, uid4
, uid5
, uid6
, uid7
);
296 c
.cmd
= CMD_INDALA_CLONE_TAG_L
;
297 c
.d
.asDwords
[0] = uid1
;
298 c
.d
.asDwords
[1] = uid2
;
299 c
.d
.asDwords
[2] = uid3
;
300 c
.d
.asDwords
[3] = uid4
;
301 c
.d
.asDwords
[4] = uid5
;
302 c
.d
.asDwords
[5] = uid6
;
303 c
.d
.asDwords
[6] = uid7
;
305 while (sscanf(&Cmd
[i
++], "%1x", &n
) == 1) {
306 uid1
= (uid1
<< 4) | (uid2
>> 28);
307 uid2
= (uid2
<< 4) | (n
& 0xf);
309 PrintAndLog("Cloning 64bit tag with UID %x%08x", uid1
, uid2
);
310 c
.cmd
= CMD_INDALA_CLONE_TAG
;
315 clearCommandBuffer();
320 static command_t CommandTable
[] = {
321 {"help", CmdHelp
, 1, "This help"},
322 {"demod", CmdIndalaDecode
, 1, "[clock] [invert<0|1>] -- Demodulate an indala tag (PSK1) from GraphBuffer (args optional)"},
323 {"read", CmdIndalaRead
, 0, "Read an Indala Prox tag from the antenna"},
324 {"clone", CmdIndalaClone
, 0, "<UID> ['l']-- Clone Indala to T55x7 (tag must be on antenna)(UID in HEX)(option 'l' for 224 UID"},
325 {"altdemod", CmdIndalaDemod
, 1, "['224'] -- Alternative method to Demodulate samples for Indala 64 bit UID (option '224' for 224 bit)"},
326 //{"sim", CmdIndalaSim, 0, "<ID> -- indala tag simulator"},
327 {NULL
, NULL
, 0, NULL
}
330 int CmdLFINDALA(const char *Cmd
) {
331 CmdsParse(CommandTable
, Cmd
);
335 int CmdHelp(const char *Cmd
) {
336 CmdsHelp(CommandTable
);