// High frequency ISO14443B commands
//-----------------------------------------------------------------------------
-#include <stdio.h>
-#include <stdlib.h>
-#include <stdbool.h>
-#include <stdint.h>
#include "cmdhf14b.h"
#define TIMEOUT 2000
return 0;
}
int usage_hf_14b_sim(void){
- PrintAndLog("Emulating ISO/IEC 14443 type B tag with 4 UID");
- PrintAndLog("Usage: hf 14b sim [h]");
+ PrintAndLog("Emulating ISO/IEC 14443 type B tag with 4 UID / PUPI");
+ PrintAndLog("Usage: hf 14b sim [h] u <uid>");
PrintAndLog("Options:");
PrintAndLog(" h this help");
+ PrintAndLog(" u 4byte UID/PUPI");
PrintAndLog("sample:");
PrintAndLog(" hf 14b sim");
+ PrintAndLog(" hf 14b sim u 11223344");
return 0;
}
int usage_hf_14b_read_srx(void){
}
int CmdHF14BSim(const char *Cmd) {
- char cmdp = param_getchar(Cmd, 0);
+ char cmdp = param_getchar(Cmd, 0);
if (cmdp == 'h' || cmdp == 'H') return usage_hf_14b_sim();
- UsbCommand c = {CMD_SIMULATE_TAG_ISO_14443B, {0, 0, 0}};
+ uint32_t pupi = 0;
+ if (cmdp == 'u' || cmdp == 'U') {
+ pupi = param_get32ex(Cmd, 1, 0, 16);
+ }
+
+ UsbCommand c = {CMD_SIMULATE_TAG_ISO_14443B, {pupi, 0, 0}};
clearCommandBuffer();
SendCommand(&c);
return 0;
}
int CmdHF14BCmdRaw (const char *Cmd) {
- bool reply = TRUE;
- bool power = FALSE;
- bool select = FALSE;
- char buf[5]="";
-
+ bool reply = TRUE, power = FALSE, select = FALSE;
+ char buf[5] = "";
int i = 0;
uint8_t data[USB_CMD_DATA_SIZE] = {0x00};
uint16_t datalen = 0;
uint32_t flags = ISO14B_CONNECT;
uint32_t temp = 0;
- if (strlen(Cmd)<3) return usage_hf_14b_raw();
+ if ( strlen(Cmd) < 3 ) return usage_hf_14b_raw();
// strip
while (*Cmd==' ' || *Cmd=='\t') ++Cmd;
if (Cmd[i]==' ' || Cmd[i]=='\t') { ++i; continue; }
if (Cmd[i]=='-') {
switch (Cmd[i+1]) {
- case 'H':
case 'h':
+ case 'H':
return usage_hf_14b_raw();
case 'r':
case 'R':
return 0;
}
- if(!power)
+ if (!power)
flags |= ISO14B_DISCONNECT;
- if(datalen>0)
+ if (datalen>0)
flags |= ISO14B_RAW;
// Max buffer is USB_CMD_DATA_SIZE
bool success = TRUE;
// get back iso14b_card_select_t, don't print it.
- if(select)
+ if (select)
success = waitCmd(FALSE);
// get back response from the raw bytes you sent.
- if(success && datalen>0) waitCmd(TRUE);
+ if (success && datalen>0) waitCmd(TRUE);
return 1;
}
if (BitRate & 0x04) PrintAndLog(" Bit Rate: 847 kbit/s PICC <- PCD supported");
if (BitRate & 0x80) PrintAndLog(" Same bit rate <-> required");
- uint16_t maxFrame = data[5]>>4;
+ uint16_t maxFrame = data[5] >> 4;
if (maxFrame < 5) maxFrame = 8 * maxFrame + 16;
else if (maxFrame == 5) maxFrame = 64;
else if (maxFrame == 6) maxFrame = 96;
else if (maxFrame == 8) maxFrame = 256;
else maxFrame = 257;
- PrintAndLog("Max Frame Size: %u%s bytes",maxFrame, (maxFrame == 257) ? "+ RFU" : "");
+ PrintAndLog("Max Frame Size: %u%s bytes", maxFrame, (maxFrame == 257) ? "+ RFU" : "");
uint8_t protocolT = data[5] & 0xF;
PrintAndLog(" Protocol Type: Protocol is %scompliant with ISO/IEC 14443-4",(protocolT) ? "" : "not " );
);
}
- sprintf(str, "-ss -c %02x %02x %02x%02x%02x%02x", ISO14443B_WRITE_BLK, blockno, data[0], data[1], data[2], data[3]);
+ sprintf(str, "-ss -c %02x %02x %02x %02x %02x %02x", ISO14443B_WRITE_BLK, blockno, data[0], data[1], data[2], data[3]);
CmdHF14BCmdRaw(str);
return 0;
}
return 0;
}
-int CmdteaSelfTest(const char *Cmd){
-
- uint8_t v[8], v_le[8];
- memset(v, 0x00, sizeof(v));
- memset(v_le, 0x00, sizeof(v_le));
- uint8_t* v_ptr = v_le;
-
- uint8_t cmdlen = strlen(Cmd);
- cmdlen = ( sizeof(v)<<2 < cmdlen ) ? sizeof(v)<<2 : cmdlen;
-
- if ( param_gethex(Cmd, 0, v, cmdlen) > 0 ){
- PrintAndLog("can't read hex chars, uneven? :: %u", cmdlen);
- return 1;
- }
-
- SwapEndian64ex(v , 8, 4, v_ptr);
-
- // ENCRYPTION KEY:
- uint8_t key[16] = {0x55,0xFE,0xF6,0x30,0x62,0xBF,0x0B,0xC1,0xC9,0xB3,0x7C,0x34,0x97,0x3E,0x29,0xFB };
- uint8_t keyle[16];
- uint8_t* key_ptr = keyle;
- SwapEndian64ex(key , sizeof(key), 4, key_ptr);
-
- PrintAndLog("TEST LE enc| %s", sprint_hex(v_ptr, 8));
-
- tea_decrypt(v_ptr, key_ptr);
- PrintAndLog("TEST LE dec | %s", sprint_hex_ascii(v_ptr, 8));
-
- tea_encrypt(v_ptr, key_ptr);
- tea_encrypt(v_ptr, key_ptr);
- PrintAndLog("TEST enc2 | %s", sprint_hex_ascii(v_ptr, 8));
-
- return 0;
-}
-
bool waitCmd(bool verbose) {
bool crc = FALSE;
if (WaitForResponseTimeout(CMD_ACK, &resp, TIMEOUT)) {
- status = (resp.arg[0] & 0xFFFF);
+ status = (resp.arg[0] & 0xFF);
if ( status > 0 ) return FALSE;
-
+
len = (resp.arg[1] & 0xFFFF);
+
memcpy(data, resp.d.asBytes, len);
if (verbose) {
-
- ComputeCrc14443(CRC_14443_B, data, len-2, &b1, &b2);
- crc = ( data[len-2] == b1 && data[len-1] == b2);
-
- PrintAndLog("[LEN %u] %s[%02X %02X] %s",
- len,
- sprint_hex(data, len-2),
- data[len-2],
- data[len-1],
- (crc) ? "OK" : "FAIL"
- );
+ if ( len >= 3 ) {
+ ComputeCrc14443(CRC_14443_B, data, len-2, &b1, &b2);
+ crc = ( data[len-2] == b1 && data[len-1] == b2);
+
+ PrintAndLog("[LEN %u] %s[%02X %02X] %s",
+ len,
+ sprint_hex(data, len-2),
+ data[len-2],
+ data[len-1],
+ (crc) ? "OK" : "FAIL"
+ );
+ } else {
+ PrintAndLog("[LEN %u] %s", len, sprint_hex(data, len) );
+ }
}
return TRUE;
} else {
{"sriread", CmdHF14BReadSri, 0, "Read contents of a SRI512 | SRIX4K tag"},
{"sriwrite", CmdHF14BWriteSri, 0, "Write data to a SRI512 | SRIX4K tag"},
//{"valid", srix4kValid, 1, "srix4k checksum test"},
- //{"valid", CmdteaSelfTest, 1, "tea test"},
{NULL, NULL, 0, NULL}
};