+static uint8_t handshakeIclassTag(uint8_t *card_data) {
+ return handshakeIclassTag_ext(card_data, false);
+}
+
+
+// Reader iClass Anticollission
+void ReaderIClass(uint8_t arg0) {
+
+ uint8_t card_data[6 * 8] = {0};
+ memset(card_data, 0xFF, sizeof(card_data));
+ uint8_t last_csn[8] = {0,0,0,0,0,0,0,0};
+ uint8_t resp[ICLASS_BUFFER_SIZE];
+ memset(resp, 0xFF, sizeof(resp));
+ //Read conf block CRC(0x01) => 0xfa 0x22
+ uint8_t readConf[] = { ICLASS_CMD_READ_OR_IDENTIFY, 0x01, 0xfa, 0x22};
+ //Read App Issuer Area block CRC(0x05) => 0xde 0x64
+ uint8_t readAA[] = { ICLASS_CMD_READ_OR_IDENTIFY, 0x05, 0xde, 0x64};
+
+ int read_status= 0;
+ uint8_t result_status = 0;
+ // flag to read until one tag is found successfully
+ bool abort_after_read = arg0 & FLAG_ICLASS_READER_ONLY_ONCE;
+ // flag to only try 5 times to find one tag then return
+ bool try_once = arg0 & FLAG_ICLASS_READER_ONE_TRY;
+ // if neither abort_after_read nor try_once then continue reading until button pressed.
+
+ bool use_credit_key = arg0 & FLAG_ICLASS_READER_CEDITKEY;
+ // test flags for what blocks to be sure to read
+ uint8_t flagReadConfig = arg0 & FLAG_ICLASS_READER_CONF;
+ uint8_t flagReadCC = arg0 & FLAG_ICLASS_READER_CC;
+ uint8_t flagReadAA = arg0 & FLAG_ICLASS_READER_AA;
+
+ set_tracing(true);
+ setupIclassReader();
+
+ uint16_t tryCnt = 0;
+ bool userCancelled = BUTTON_PRESS() || usb_poll_validate_length();
+ while (!userCancelled) {
+ // if only looking for one card try 2 times if we missed it the first time
+ if (try_once && tryCnt > 2) {
+ break;
+ }
+ tryCnt++;
+ if (!get_tracing()) {
+ DbpString("Trace full");
+ break;
+ }
+ WDT_HIT();
+
+ read_status = handshakeIclassTag_ext(card_data, use_credit_key);
+
+ if (read_status == 0) continue;
+ if (read_status == 1) result_status = FLAG_ICLASS_READER_CSN;
+ if (read_status == 2) result_status = FLAG_ICLASS_READER_CSN | FLAG_ICLASS_READER_CC;
+
+ // handshakeIclass returns CSN|CC, but the actual block
+ // layout is CSN|CONFIG|CC, so here we reorder the data,
+ // moving CC forward 8 bytes
+ memcpy(card_data+16, card_data+8, 8);
+ //Read block 1, config
+ if (flagReadConfig) {
+ if (sendCmdGetResponseWithRetries(readConf, sizeof(readConf), resp, 10, 10)) {
+ result_status |= FLAG_ICLASS_READER_CONF;
+ memcpy(card_data+8, resp, 8);
+ } else {
+ Dbprintf("Failed to dump config block");
+ }
+ }
+
+ //Read block 5, AA
+ if (flagReadAA) {
+ if (sendCmdGetResponseWithRetries(readAA, sizeof(readAA), resp, 10, 10)) {
+ result_status |= FLAG_ICLASS_READER_AA;
+ memcpy(card_data + (8*5), resp, 8);
+ } else {
+ //Dbprintf("Failed to dump AA block");
+ }
+ }
+
+ // 0 : CSN
+ // 1 : Configuration
+ // 2 : e-purse
+ // (3,4 write-only, kc and kd)
+ // 5 Application issuer area
+ //
+ //Then we can 'ship' back the 8 * 6 bytes of data,
+ // with 0xFF:s in block 3 and 4.
+
+ LED_B_ON();
+ //Send back to client, but don't bother if we already sent this -
+ // only useful if looping in arm (not try_once && not abort_after_read)
+ if (memcmp(last_csn, card_data, 8) != 0) {
+ // If caller requires that we get Conf, CC, AA, continue until we got it
+ if ( (result_status ^ FLAG_ICLASS_READER_CSN ^ flagReadConfig ^ flagReadCC ^ flagReadAA) == 0) {
+ cmd_send(CMD_ACK, result_status, 0, 0, card_data, sizeof(card_data));
+ if (abort_after_read) {
+ LED_A_OFF();
+ LED_B_OFF();
+ return;
+ }
+ //Save that we already sent this....
+ memcpy(last_csn, card_data, 8);
+ }
+
+ }
+ LED_B_OFF();
+ userCancelled = BUTTON_PRESS() || usb_poll_validate_length();
+ }
+ if (userCancelled) {
+ cmd_send(CMD_ACK, 0xFF, 0, 0, card_data, 0);
+ } else {
+ cmd_send(CMD_ACK, 0, 0, 0, card_data, 0);
+ }
+ LED_A_OFF();
+}
+
+void ReaderIClass_Replay(uint8_t arg0, uint8_t *MAC) {
+
+ uint8_t card_data[USB_CMD_DATA_SIZE]={0};
+ uint16_t block_crc_LUT[255] = {0};
+
+ //Generate a lookup table for block crc
+ for (int block = 0; block < 255; block++){
+ char bl = block;
+ block_crc_LUT[block] = iclass_crc16(&bl ,1);
+ }
+ //Dbprintf("Lookup table: %02x %02x %02x" ,block_crc_LUT[0],block_crc_LUT[1],block_crc_LUT[2]);
+
+ uint8_t check[] = { 0x05, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 };
+ uint8_t read[] = { 0x0c, 0x00, 0x00, 0x00 };
+
+ uint16_t crc = 0;
+ uint8_t cardsize = 0;
+ uint8_t mem = 0;
+
+ static struct memory_t {
+ int k16;
+ int book;
+ int k2;
+ int lockauth;
+ int keyaccess;
+ } memory;
+
+ uint8_t resp[ICLASS_BUFFER_SIZE];
+
+ setupIclassReader();
+ set_tracing(true);
+
+ while (!BUTTON_PRESS()) {
+
+ WDT_HIT();
+
+ if (!get_tracing()) {
+ DbpString("Trace full");
+ break;
+ }
+
+ uint8_t read_status = handshakeIclassTag(card_data);
+ if (read_status < 2) continue;
+
+ //for now replay captured auth (as cc not updated)
+ memcpy(check+5, MAC, 4);
+
+ if (!sendCmdGetResponseWithRetries(check, sizeof(check), resp, 4, 5)) {
+ Dbprintf("Error: Authentication Fail!");
+ continue;
+ }
+
+ //first get configuration block (block 1)
+ crc = block_crc_LUT[1];
+ read[1] = 1;
+ read[2] = crc >> 8;
+ read[3] = crc & 0xff;
+
+ if (!sendCmdGetResponseWithRetries(read, sizeof(read),resp, 10, 10)) {
+ Dbprintf("Dump config (block 1) failed");
+ continue;
+ }
+
+ mem = resp[5];
+ memory.k16 = (mem & 0x80);
+ memory.book = (mem & 0x20);
+ memory.k2 = (mem & 0x8);
+ memory.lockauth = (mem & 0x2);
+ memory.keyaccess = (mem & 0x1);
+
+ cardsize = memory.k16 ? 255 : 32;
+ WDT_HIT();
+ //Set card_data to all zeroes, we'll fill it with data
+ memset(card_data, 0x0, USB_CMD_DATA_SIZE);
+ uint8_t failedRead = 0;
+ uint32_t stored_data_length = 0;
+ //then loop around remaining blocks
+ for (int block = 0; block < cardsize; block++) {
+ read[1] = block;
+ crc = block_crc_LUT[block];
+ read[2] = crc >> 8;
+ read[3] = crc & 0xff;
+
+ if (sendCmdGetResponseWithRetries(read, sizeof(read), resp, 10, 10)) {
+ Dbprintf(" %02x: %02x %02x %02x %02x %02x %02x %02x %02x",
+ block, resp[0], resp[1], resp[2],
+ resp[3], resp[4], resp[5],
+ resp[6], resp[7]);
+
+ //Fill up the buffer
+ memcpy(card_data+stored_data_length, resp, 8);
+ stored_data_length += 8;
+ if (stored_data_length +8 > USB_CMD_DATA_SIZE) {
+ //Time to send this off and start afresh
+ cmd_send(CMD_ACK,
+ stored_data_length,//data length
+ failedRead,//Failed blocks?
+ 0,//Not used ATM
+ card_data, stored_data_length);
+ //reset
+ stored_data_length = 0;
+ failedRead = 0;
+ }
+
+ } else {
+ failedRead = 1;
+ stored_data_length += 8;//Otherwise, data becomes misaligned
+ Dbprintf("Failed to dump block %d", block);
+ }
+ }
+
+ //Send off any remaining data
+ if (stored_data_length > 0) {
+ cmd_send(CMD_ACK,
+ stored_data_length,//data length
+ failedRead,//Failed blocks?
+ 0,//Not used ATM
+ card_data,
+ stored_data_length);
+ }
+ //If we got here, let's break
+ break;
+ }
+ //Signal end of transmission
+ cmd_send(CMD_ACK,
+ 0,//data length
+ 0,//Failed blocks?
+ 0,//Not used ATM
+ card_data,
+ 0);
+
+ LED_A_OFF();
+}
+
+void iClass_ReadCheck(uint8_t blockNo, uint8_t keyType) {
+ uint8_t readcheck[] = { keyType, blockNo };
+ uint8_t resp[] = {0,0,0,0,0,0,0,0};
+ size_t isOK = 0;
+ isOK = sendCmdGetResponseWithRetries(readcheck, sizeof(readcheck), resp, sizeof(resp), 6);
+ cmd_send(CMD_ACK,isOK, 0, 0, 0, 0);
+}
+
+void iClass_Authentication(uint8_t *MAC) {
+ uint8_t check[] = { ICLASS_CMD_CHECK, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 };
+ uint8_t resp[ICLASS_BUFFER_SIZE];
+ memcpy(check+5, MAC, 4);
+ bool isOK;
+ isOK = sendCmdGetResponseWithRetries(check, sizeof(check), resp, 4, 6);
+ cmd_send(CMD_ACK,isOK, 0, 0, 0, 0);
+}
+
+bool iClass_ReadBlock(uint8_t blockNo, uint8_t *readdata) {
+ uint8_t readcmd[] = {ICLASS_CMD_READ_OR_IDENTIFY, blockNo, 0x00, 0x00}; //0x88, 0x00 // can i use 0C?
+ char bl = blockNo;
+ uint16_t rdCrc = iclass_crc16(&bl, 1);
+ readcmd[2] = rdCrc >> 8;
+ readcmd[3] = rdCrc & 0xff;
+ uint8_t resp[] = {0,0,0,0,0,0,0,0,0,0};
+ bool isOK = false;
+
+ //readcmd[1] = blockNo;
+ isOK = sendCmdGetResponseWithRetries(readcmd, sizeof(readcmd), resp, 10, 10);
+ memcpy(readdata, resp, sizeof(resp));
+
+ return isOK;
+}
+
+void iClass_ReadBlk(uint8_t blockno) {
+ uint8_t readblockdata[] = {0,0,0,0,0,0,0,0,0,0};
+ bool isOK = false;
+ isOK = iClass_ReadBlock(blockno, readblockdata);
+ cmd_send(CMD_ACK, isOK, 0, 0, readblockdata, 8);
+}
+
+void iClass_Dump(uint8_t blockno, uint8_t numblks) {
+ uint8_t readblockdata[] = {0,0,0,0,0,0,0,0,0,0};
+ bool isOK = false;
+ uint8_t blkCnt = 0;
+
+ BigBuf_free();
+ uint8_t *dataout = BigBuf_malloc(255*8);
+ if (dataout == NULL) {
+ Dbprintf("out of memory");
+ FpgaWriteConfWord(FPGA_MAJOR_MODE_OFF);
+ LED_D_OFF();
+ cmd_send(CMD_ACK, 0, 1, 0, 0, 0);
+ LED_A_OFF();
+ return;
+ }
+ memset(dataout, 0xFF, 255*8);
+
+ for ( ; blkCnt < numblks; blkCnt++) {
+ isOK = iClass_ReadBlock(blockno+blkCnt, readblockdata);
+ if (!isOK || (readblockdata[0] == 0xBB || readblockdata[7] == 0xBB || readblockdata[2] == 0xBB)) { //try again
+ isOK = iClass_ReadBlock(blockno+blkCnt, readblockdata);
+ if (!isOK) {
+ Dbprintf("Block %02X failed to read", blkCnt+blockno);
+ break;
+ }
+ }
+ memcpy(dataout + (blkCnt*8), readblockdata, 8);
+ }
+ //return pointer to dump memory in arg3
+ cmd_send(CMD_ACK, isOK, blkCnt, BigBuf_max_traceLen(), 0, 0);
+ FpgaWriteConfWord(FPGA_MAJOR_MODE_OFF);
+ LEDsoff();
+ BigBuf_free();
+}
+
+static bool iClass_WriteBlock_ext(uint8_t blockNo, uint8_t *data) {
+ uint8_t write[] = { ICLASS_CMD_UPDATE, blockNo, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 };
+ //uint8_t readblockdata[10];
+ //write[1] = blockNo;
+ memcpy(write+2, data, 12); // data + mac
+ char *wrCmd = (char *)(write+1);
+ uint16_t wrCrc = iclass_crc16(wrCmd, 13);
+ write[14] = wrCrc >> 8;
+ write[15] = wrCrc & 0xff;
+ uint8_t resp[] = {0,0,0,0,0,0,0,0,0,0};
+ bool isOK = false;
+
+ isOK = sendCmdGetResponseWithRetries(write, sizeof(write), resp, sizeof(resp), 10);
+ if (isOK) { //if reader responded correctly
+ //Dbprintf("WriteResp: %02X%02X%02X%02X%02X%02X%02X%02X%02X%02X",resp[0],resp[1],resp[2],resp[3],resp[4],resp[5],resp[6],resp[7],resp[8],resp[9]);
+ if (memcmp(write+2, resp, 8)) { //if response is not equal to write values
+ if (blockNo != 3 && blockNo != 4) { //if not programming key areas (note key blocks don't get programmed with actual key data it is xor data)
+ //error try again
+ isOK = sendCmdGetResponseWithRetries(write, sizeof(write), resp, sizeof(resp), 10);
+ }
+ }
+ }
+ return isOK;
+}
+
+void iClass_WriteBlock(uint8_t blockNo, uint8_t *data) {
+ bool isOK = iClass_WriteBlock_ext(blockNo, data);
+ if (isOK){
+ Dbprintf("Write block [%02x] successful", blockNo);
+ } else {
+ Dbprintf("Write block [%02x] failed", blockNo);
+ }
+ cmd_send(CMD_ACK, isOK, 0, 0, 0, 0);
+}
+
+void iClass_Clone(uint8_t startblock, uint8_t endblock, uint8_t *data) {
+ int i;
+ int written = 0;
+ int total_block = (endblock - startblock) + 1;
+ for (i = 0; i < total_block; i++) {
+ // block number
+ if (iClass_WriteBlock_ext(i+startblock, data + (i*12))){
+ Dbprintf("Write block [%02x] successful", i + startblock);
+ written++;
+ } else {
+ if (iClass_WriteBlock_ext(i+startblock, data + (i*12))){
+ Dbprintf("Write block [%02x] successful", i + startblock);
+ written++;
+ } else {
+ Dbprintf("Write block [%02x] failed", i + startblock);
+ }
+ }
+ }
+ if (written == total_block)
+ Dbprintf("Clone complete");
+ else
+ Dbprintf("Clone incomplete");
+
+ cmd_send(CMD_ACK, 1, 0, 0, 0, 0);
+ FpgaWriteConfWord(FPGA_MAJOR_MODE_OFF);
+ LEDsoff();
+}