X-Git-Url: https://git.zerfleddert.de/cgi-bin/gitweb.cgi/proxmark3-svn/blobdiff_plain/c7ea35a9fbdb39825afbcce51088ba90f903b147..6f93185537e17bebe27f42c8558338e7f04b7d68:/client/cmdlfem4x.c diff --git a/client/cmdlfem4x.c b/client/cmdlfem4x.c index 2cf8f569..1150595c 100644 --- a/client/cmdlfem4x.c +++ b/client/cmdlfem4x.c @@ -283,7 +283,7 @@ uint32_t OutputEM4x50_Block(uint8_t *BitStream, size_t size, bool verbose, bool } return code; } -/* Read the transmitted data of an EM4x50 tag +/* Read the transmitted data of an EM4x50 tag from the graphbuffer * Format: * * XXXXXXXX [row parity bit (even)] <- 8 bits plus parity @@ -305,19 +305,6 @@ uint32_t OutputEM4x50_Block(uint8_t *BitStream, size_t size, bool verbose, bool //completed by Marshmellow int EM4x50Read(const char *Cmd, bool verbose) { - /* - char buf[30] = {0x00}; - char *cmdStr = buf; - int ans = 0; - bool ST = config.ST; - uint8_t bitRate[8] = {8,16,32,40,50,64,100,128}; - DemodBufferLen = 0x00; - snprintf(cmdStr, sizeof(buf),"%d %d 1", bitRate[config.bitrate], config.inverted ); - ans = ASKDemod_ext(cmdStr, FALSE, FALSE, 1, &ST); - snprintf(cmdStr, sizeof(buf),"0 %d %d 1", bitRate[config.bitrate], config.inverted ); - ans = ASKbiphaseDemod(cmdStr, FALSE); - */ - uint8_t fndClk[] = {8,16,32,40,50,64,128}; int clk = 0; int invert = 0; @@ -512,7 +499,7 @@ int CmdEM4x50Read(const char *Cmd) { } int usage_lf_em_read(void) { - PrintAndLog("Read EM4x50. Tag must be on antenna. "); + PrintAndLog("Read EM 4x05/4x50/EM4x69. Tag must be on antenna. "); PrintAndLog(""); PrintAndLog("Usage: lf em readword [h]
"); PrintAndLog("Options:"); @@ -524,6 +511,151 @@ int usage_lf_em_read(void) { PrintAndLog(" lf em readword 1 11223344"); return 0; } + +int usage_lf_em_write(void) { + PrintAndLog("Write EM 4x05/4x50/4x69. Tag must be on antenna. "); + PrintAndLog(""); + PrintAndLog("Usage: lf em writeword [h]
"); + PrintAndLog("Options:"); + PrintAndLog(" h - this help"); + PrintAndLog(" address - memory address to write to. (0-15)"); + PrintAndLog(" data - data to write (hex)"); + PrintAndLog(" pwd - password (hex) (optional)"); + PrintAndLog("samples:"); + PrintAndLog(" lf em writeword 1"); + PrintAndLog(" lf em writeword 1 deadc0de 11223344"); + return 0; +} + +#define EM_PREAMBLE_LEN 6 +// download samples from device +// and copy them to Graphbuffer +bool downloadSamplesEM(){ + + // 8 bit preamble + 32 bit word response (max clock (128) * 40bits = 5120 samples) + uint8_t got[6000]; + GetFromBigBuf(got, sizeof(got), 0); + if ( !WaitForResponseTimeout(CMD_ACK, NULL, 2500) ) { + PrintAndLog("command execution time out"); + return FALSE; + } + setGraphBuf(got, sizeof(got)); + return TRUE; +} +//search for given preamble in given BitStream and return success=1 or fail=0 and startIndex +bool doPreambleSearch(size_t *startIdx){ + + // sanity check + if ( DemodBufferLen < EM_PREAMBLE_LEN) { + if (g_debugMode) PrintAndLog("DEBUG: Error - EM4305 demodbuffer too small"); + return FALSE; + } + + // skip first two 0 bits as they might have been missed in the demod + uint8_t preamble[EM_PREAMBLE_LEN] = {0,0,1,0,1,0}; + + // set size to 10 to only test first 4 positions for the preamble + size_t size = (10 > DemodBufferLen) ? DemodBufferLen : 10; + *startIdx = 0; + uint8_t found = 0; + + // em only sends preamble once, so look for it once in the first x bits + for (int idx = 0; idx < size - EM_PREAMBLE_LEN; idx++){ + if (memcmp(DemodBuffer+idx, preamble, EM_PREAMBLE_LEN) == 0){ + //first index found + *startIdx = idx; + found = 1; + break; + } + } + + if ( !found) { + if (g_debugMode) PrintAndLog("DEBUG: Error - EM4305 preamble not found :: %d", *startIdx); + return FALSE; + } + return TRUE; +} + +bool detectFSK(){ + // detect fsk clock + if (!GetFskClock("", FALSE, FALSE)) { + if (g_debugMode) PrintAndLog("DEBUG: Error - EM4305: FSK clock failed"); + return FALSE; + } + // demod + int ans = FSKrawDemod("0 0", FALSE); + if (!ans) { + if (g_debugMode) PrintAndLog("DEBUG: Error - EM4305: FSK Demod failed"); + return FALSE; + } + return TRUE; +} +// PSK clocks should be easy to detect ( but difficult to demod a non-repeating pattern... ) +bool detectPSK(){ + int ans = GetPskClock("", FALSE, FALSE); + if (ans <= 0) { + if (g_debugMode) PrintAndLog("DEBUG: Error - EM4305: PSK clock failed"); + return FALSE; + } + PrintAndLog("PSK response possibly found, run `data rawd p1` to attempt to demod"); + return TRUE; +} +// try manchester - NOTE: ST only applies to T55x7 tags. +bool detectASK_MAN(){ + bool stcheck = FALSE; + int ans = ASKDemod_ext("0 0 0", FALSE, FALSE, 1, &stcheck); + if (!ans) { + if (g_debugMode) PrintAndLog("DEBUG: Error - EM4305: ASK/Manchester Demod failed"); + return FALSE; + } + return TRUE; +} +bool detectASK_BI(){ + int ans = ASKbiphaseDemod("0 0 1", FALSE); + if (!ans) { + if (g_debugMode) PrintAndLog("DEBUG: Error - EM4305: ASK/biphase normal demod failed"); + + ans = ASKbiphaseDemod("0 1 1", FALSE); + if (!ans) { + if (g_debugMode) PrintAndLog("DEBUG: Error - EM4305: ASK/biphase inverted demod failed"); + return FALSE; + } + } + return TRUE; +} + +// param: idx - start index in demoded data. +int setDemodBufferEM(uint8_t bitsNeeded, size_t idx){ + if ( bitsNeeded < DemodBufferLen) { + setDemodBuf(DemodBuffer + idx + EM_PREAMBLE_LEN, bitsNeeded, 0); + CmdPrintDemodBuff("x"); + return 1; + } + return -1; +} + +// FSK, PSK, ASK/MANCHESTER, ASK/BIPHASE, ASK/DIPHASE +// should cover 90% of known used configs +// the rest will need to be manually demoded for now... +int demodEM4x05resp(uint8_t bitsNeeded) { + + size_t startIdx = 0; + + if (detectASK_MAN() && doPreambleSearch( &startIdx )) + return setDemodBufferEM(bitsNeeded, startIdx); + + if (detectASK_BI() && doPreambleSearch( &startIdx )) + return setDemodBufferEM(bitsNeeded, startIdx); + + if (detectFSK() && doPreambleSearch( &startIdx )) + return setDemodBufferEM(bitsNeeded, startIdx); + + if (detectPSK() && doPreambleSearch( &startIdx )) + return setDemodBufferEM(bitsNeeded, startIdx); + + return -1; +} + int CmdReadWord(const char *Cmd) { int addr, pwd; bool usePwd = false; @@ -552,38 +684,26 @@ int CmdReadWord(const char *Cmd) { PrintAndLog("Command timed out"); return -1; } + + if (!downloadSamplesEM()) + return -1; - //uint8_t got[12288]; - uint8_t got[30000]; - GetFromBigBuf(got, sizeof(got), 0); - if ( !WaitForResponseTimeout(CMD_ACK, NULL, 8000) ) { - PrintAndLog("command execution time out"); - return 0; + int testLen = (GraphTraceLen < 1000) ? GraphTraceLen : 1000; + if (graphJustNoise(GraphBuffer, testLen)) { + PrintAndLog("Tag not found"); + return -1; } - setGraphBuf(got, sizeof(got)); - return 1; -} -int usage_lf_em_write(void) { - PrintAndLog("Write EM4x50. Tag must be on antenna. "); - PrintAndLog(""); - PrintAndLog("Usage: lf em writeword [h]
"); - PrintAndLog("Options:"); - PrintAndLog(" h - this help"); - PrintAndLog(" address - memory address to write to. (0-15)"); - PrintAndLog(" data - data to write (hex)"); - PrintAndLog(" pwd - password (hex) (optional)"); - PrintAndLog("samples:"); - PrintAndLog(" lf em writeword 1"); - PrintAndLog(" lf em writeword 1 deadc0de 11223344"); - return 0; + //attempt demod: + //need 32 bits from a read word + return demodEM4x05resp(44); } + int CmdWriteWord(const char *Cmd) { uint8_t ctmp = param_getchar(Cmd, 0); if ( strlen(Cmd) == 0 || ctmp == 'H' || ctmp == 'h' ) return usage_lf_em_write(); - bool usePwd = false; - + bool usePwd = false; int addr = 16; // default to invalid address int data = 0xFFFFFFFF; // default to blank data int pwd = 0xFFFFFFFF; // default to blank password @@ -592,7 +712,6 @@ int CmdWriteWord(const char *Cmd) { data = param_get32ex(Cmd, 1, -1, 16); pwd = param_get32ex(Cmd, 2, -1, 16); - if ( (addr > 15) || (addr < 0 ) || ( addr == -1) ) { PrintAndLog("Address must be between 0 and 15"); return 1; @@ -614,7 +733,19 @@ int CmdWriteWord(const char *Cmd) { PrintAndLog("Error occurred, device did not respond during write operation."); return -1; } - return 0; + + if (!downloadSamplesEM()) + return -1; + + //todo: check response for 00001010 then write data for write confirmation! + + //attempt demod: + //need 0 bits demoded (after preamble) to verify write cmd + int result = demodEM4x05resp(0); + if (result == 1) + PrintAndLog("Write Verified"); + + return result; } static command_t CommandTable[] = { @@ -625,9 +756,9 @@ static command_t CommandTable[] = { {"em410xwatch", CmdEM410xWatch, 0, "['h'] -- Watches for EM410x 125/134 kHz tags (option 'h' for 134)"}, {"em410xspoof", CmdEM410xWatchnSpoof, 0, "['h'] --- Watches for EM410x 125/134 kHz tags, and replays them. (option 'h' for 134)" }, {"em410xwrite", CmdEM410xWrite, 0, " <'0' T5555> <'1' T55x7> [clock rate] -- Write EM410x UID to T5555(Q5) or T55x7 tag, optionally setting clock rate"}, - {"em4x50read", CmdEM4x50Read, 1, "Extract data from EM4x50 tag"}, - {"readword", CmdReadWord, 1, "Read EM4xxx data"}, - {"writeword", CmdWriteWord, 1, "Write EM4xxx data"}, + {"em4x50read", CmdEM4x50Read, 1, "demod data from EM4x50 tag from the graphbuffer"}, + {"readword", CmdReadWord, 1, "read EM4x05/4x69 data"}, + {"writeword", CmdWriteWord, 1, "write EM405/4x69 data"}, {NULL, NULL, 0, NULL} };