2013-05-25 05:06:57 +08:00
|
|
|
//-----------------------------------------------------------------------------
|
|
|
|
// Copyright (C) 2013 m h swende <martin at swende.se>
|
2019-03-09 15:59:13 +08:00
|
|
|
// Modified 2015,2016, iceman
|
2013-05-25 05:06:57 +08:00
|
|
|
//
|
|
|
|
// This code is licensed to you under the terms of the GNU GPL, version 2 or,
|
|
|
|
// at your option, any later version. See the LICENSE.txt file for the text of
|
|
|
|
// the license.
|
|
|
|
//-----------------------------------------------------------------------------
|
|
|
|
// Some lua scripting glue to proxmark core.
|
|
|
|
//-----------------------------------------------------------------------------
|
|
|
|
#include "scripting.h"
|
2016-02-23 00:50:32 +08:00
|
|
|
|
2019-08-08 22:57:33 +08:00
|
|
|
#include <stdlib.h>
|
|
|
|
#include <string.h>
|
|
|
|
|
|
|
|
#include "lauxlib.h"
|
|
|
|
#include "cmdmain.h"
|
|
|
|
#include "comms.h"
|
|
|
|
#include "mifare/mifarehost.h"
|
|
|
|
#include "crc.h"
|
|
|
|
#include "crc64.h"
|
|
|
|
#include "mbedtls/sha1.h"
|
|
|
|
#include "mbedtls/aes.h"
|
|
|
|
#include "cmdcrc.h"
|
|
|
|
#include "cmdhfmfhard.h"
|
|
|
|
#include "cmdhfmfu.h"
|
|
|
|
#include "cmdlft55xx.h" // read t55xx etc
|
|
|
|
#include "mifare/ndef.h" // ndef parsing
|
|
|
|
#include "commonutil.h"
|
|
|
|
#include "ui.h"
|
|
|
|
#include "proxmark3.h"
|
|
|
|
#include "crc16.h"
|
|
|
|
#include "protocols.h"
|
2019-08-30 20:53:53 +08:00
|
|
|
#include "fileutils.h" // searchfile
|
2019-10-18 04:28:49 +08:00
|
|
|
#include "cmdlf.h" // lf_config
|
2019-08-08 22:57:33 +08:00
|
|
|
|
2019-04-28 17:05:23 +08:00
|
|
|
static int returnToLuaWithError(lua_State *L, const char *fmt, ...) {
|
|
|
|
char buffer[200];
|
|
|
|
va_list args;
|
|
|
|
va_start(args, fmt);
|
|
|
|
vsnprintf(buffer, sizeof(buffer), fmt, args);
|
|
|
|
va_end(args);
|
|
|
|
|
|
|
|
lua_pushnil(L);
|
|
|
|
lua_pushstring(L, buffer);
|
|
|
|
return 2;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int l_clearCommandBuffer(lua_State *L) {
|
|
|
|
clearCommandBuffer();
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2019-04-30 15:48:08 +08:00
|
|
|
/**
|
2019-08-23 04:16:33 +08:00
|
|
|
* Enable / Disable fast push mode for lua scripts like mfckeys
|
2019-04-30 15:48:08 +08:00
|
|
|
* The following params expected:
|
2019-05-01 07:38:52 +08:00
|
|
|
*
|
2019-04-30 15:48:08 +08:00
|
|
|
*@brief l_fast_push_mode
|
|
|
|
* @param L
|
|
|
|
* @return
|
|
|
|
*/
|
2019-05-01 07:38:52 +08:00
|
|
|
static int l_fast_push_mode(lua_State *L) {
|
|
|
|
|
2019-04-30 15:48:08 +08:00
|
|
|
luaL_checktype(L, 1, LUA_TBOOLEAN);
|
2019-05-01 07:38:52 +08:00
|
|
|
|
2019-04-30 15:48:08 +08:00
|
|
|
bool enable = lua_toboolean(L, 1);
|
|
|
|
|
|
|
|
conn.block_after_ACK = enable;
|
2019-05-01 07:38:52 +08:00
|
|
|
|
2019-04-30 15:48:08 +08:00
|
|
|
// Disable fast mode and send a dummy command to make it effective
|
|
|
|
if (enable == false) {
|
2019-05-08 01:51:33 +08:00
|
|
|
SendCommandNG(CMD_PING, NULL, 0);
|
2019-10-10 04:24:54 +08:00
|
|
|
if (!WaitForResponseTimeout(CMD_PING, NULL, 1000)) {
|
|
|
|
PrintAndLogEx(WARNING, "command execution time out");
|
|
|
|
return returnToLuaWithError(L, "command execution time out");
|
|
|
|
}
|
2019-04-30 15:48:08 +08:00
|
|
|
}
|
2019-05-01 07:38:52 +08:00
|
|
|
|
2019-04-30 15:48:08 +08:00
|
|
|
//Push the retval on the stack
|
|
|
|
lua_pushboolean(L, enable);
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2019-04-28 17:05:23 +08:00
|
|
|
/**
|
|
|
|
* The following params expected:
|
|
|
|
* @brief l_SendCommandOLD
|
|
|
|
* @param L - a lua string with the following five params.
|
|
|
|
* @param cmd must be hexstring, max u64
|
|
|
|
* @param arg0 must be hexstring, max u64
|
|
|
|
* @param arg1 must be hexstring, max u64
|
|
|
|
* @param arg2 must be hexstring, max u64
|
|
|
|
* @param data must be hexstring less than 1024 chars(512bytes)
|
|
|
|
* @return
|
|
|
|
*/
|
|
|
|
static int l_SendCommandOLD(lua_State *L) {
|
2019-08-04 01:17:00 +08:00
|
|
|
// SendCommandMIX(CMD_HF_SNIFF, skippairs, skiptriggers, 0, NULL, 0);
|
2019-04-28 17:05:23 +08:00
|
|
|
// (uint64_t cmd, uint64_t arg0, uint64_t arg1, uint64_t arg2, void *data, size_t len)
|
|
|
|
|
|
|
|
uint64_t cmd, arg0, arg1, arg2;
|
2019-05-01 03:10:11 +08:00
|
|
|
uint8_t data[PM3_CMD_DATA_SIZE] = {0};
|
2019-04-28 17:05:23 +08:00
|
|
|
size_t len = 0, size;
|
|
|
|
|
|
|
|
//Check number of arguments
|
|
|
|
int n = lua_gettop(L);
|
|
|
|
if (n != 5) {
|
|
|
|
return returnToLuaWithError(L, "You need to supply five parameters");
|
|
|
|
}
|
|
|
|
|
|
|
|
// parse input
|
2019-04-29 04:54:00 +08:00
|
|
|
cmd = luaL_checknumber(L, 1);
|
2019-04-28 18:52:25 +08:00
|
|
|
arg0 = luaL_checknumber(L, 2);
|
|
|
|
arg1 = luaL_checknumber(L, 3);
|
2019-04-29 04:54:00 +08:00
|
|
|
arg2 = luaL_checknumber(L, 4);
|
2019-04-28 17:09:46 +08:00
|
|
|
|
2019-04-28 17:05:23 +08:00
|
|
|
// data
|
|
|
|
const char *p_data = luaL_checklstring(L, 5, &size);
|
2019-04-28 17:09:46 +08:00
|
|
|
if (size) {
|
|
|
|
if (size > 1024)
|
2019-04-28 17:05:23 +08:00
|
|
|
size = 1024;
|
2019-04-28 17:09:46 +08:00
|
|
|
|
2019-04-28 17:05:23 +08:00
|
|
|
uint32_t tmp;
|
|
|
|
for (int i = 0; i < size; i += 2) {
|
|
|
|
sscanf(&p_data[i], "%02x", &tmp);
|
|
|
|
data[i >> 1] = tmp & 0xFF;
|
|
|
|
len++;
|
|
|
|
}
|
|
|
|
}
|
2019-04-28 22:31:49 +08:00
|
|
|
|
2019-04-28 17:05:23 +08:00
|
|
|
SendCommandOLD(cmd, arg0, arg1, arg2, data, len);
|
2019-04-29 04:54:00 +08:00
|
|
|
lua_pushboolean(L, true);
|
2019-04-28 18:52:25 +08:00
|
|
|
return 1;
|
2019-04-28 17:05:23 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* The following params expected:
|
|
|
|
* @brief l_SendCommandMIX
|
2019-04-28 17:09:46 +08:00
|
|
|
* @param L - a lua string with the following five params.
|
2019-04-28 17:05:23 +08:00
|
|
|
* @param cmd must be hexstring, max u64
|
|
|
|
* @param arg0 must be hexstring, max u64
|
|
|
|
* @param arg1 must be hexstring, max u64
|
|
|
|
* @param arg2 must be hexstring, max u64
|
|
|
|
* @param data must be hexstring less than 1024 chars(512bytes)
|
|
|
|
* @return
|
|
|
|
*/
|
|
|
|
static int l_SendCommandMIX(lua_State *L) {
|
|
|
|
|
|
|
|
uint64_t cmd, arg0, arg1, arg2;
|
2019-05-01 03:10:11 +08:00
|
|
|
uint8_t data[PM3_CMD_DATA_SIZE] = {0};
|
2019-04-28 17:05:23 +08:00
|
|
|
size_t len = 0, size;
|
|
|
|
|
|
|
|
// check number of arguments
|
|
|
|
int n = lua_gettop(L);
|
|
|
|
if (n != 5)
|
|
|
|
return returnToLuaWithError(L, "You need to supply five parameters");
|
2019-04-28 17:09:46 +08:00
|
|
|
|
2019-04-28 17:05:23 +08:00
|
|
|
// parse input
|
2019-04-29 04:54:00 +08:00
|
|
|
cmd = luaL_checknumber(L, 1);
|
2019-04-28 18:52:25 +08:00
|
|
|
arg0 = luaL_checknumber(L, 2);
|
|
|
|
arg1 = luaL_checknumber(L, 3);
|
2019-04-29 04:54:00 +08:00
|
|
|
arg2 = luaL_checknumber(L, 4);
|
2019-04-28 17:09:46 +08:00
|
|
|
|
2019-04-28 17:05:23 +08:00
|
|
|
// data
|
2019-04-28 17:09:46 +08:00
|
|
|
const char *p_data = luaL_checklstring(L, 5, &size);
|
|
|
|
if (size) {
|
|
|
|
if (size > 1024)
|
2019-04-28 17:05:23 +08:00
|
|
|
size = 1024;
|
2019-04-28 17:09:46 +08:00
|
|
|
|
2019-04-28 17:05:23 +08:00
|
|
|
uint32_t tmp;
|
|
|
|
for (int i = 0; i < size; i += 2) {
|
|
|
|
sscanf(&p_data[i], "%02x", &tmp);
|
|
|
|
data[i >> 1] = tmp & 0xFF;
|
|
|
|
len++;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
SendCommandMIX(cmd, arg0, arg1, arg2, data, len);
|
2019-04-28 18:52:25 +08:00
|
|
|
lua_pushboolean(L, true);
|
|
|
|
return 1;
|
2019-04-28 17:05:23 +08:00
|
|
|
}
|
2019-04-28 22:31:49 +08:00
|
|
|
/**
|
|
|
|
* The following params expected:
|
|
|
|
* @brief l_SendCommandMIX
|
|
|
|
* @param L - a lua string with the following two params.
|
|
|
|
* @param cmd must be hexstring, max u64
|
|
|
|
* @param data must be hexstring less than 1024 chars(512bytes)
|
|
|
|
* @return
|
|
|
|
*/
|
|
|
|
static int l_SendCommandNG(lua_State *L) {
|
|
|
|
|
2019-05-01 03:10:11 +08:00
|
|
|
uint8_t data[PM3_CMD_DATA_SIZE] = {0};
|
2019-04-28 22:31:49 +08:00
|
|
|
size_t len = 0, size;
|
|
|
|
|
|
|
|
// check number of arguments
|
|
|
|
int n = lua_gettop(L);
|
|
|
|
if (n != 2)
|
|
|
|
return returnToLuaWithError(L, "You need to supply two parameters");
|
|
|
|
|
|
|
|
// parse input
|
2019-04-29 18:12:14 +08:00
|
|
|
uint16_t cmd = luaL_checknumber(L, 1);
|
2019-04-28 22:31:49 +08:00
|
|
|
|
|
|
|
// data
|
|
|
|
const char *p_data = luaL_checklstring(L, 2, &size);
|
|
|
|
if (size) {
|
|
|
|
if (size > 1024)
|
|
|
|
size = 1024;
|
|
|
|
|
|
|
|
uint32_t tmp;
|
|
|
|
for (int i = 0; i < size; i += 2) {
|
|
|
|
sscanf(&p_data[i], "%02x", &tmp);
|
|
|
|
data[i >> 1] = tmp & 0xFF;
|
|
|
|
len++;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
SendCommandNG(cmd, data, len);
|
|
|
|
lua_pushboolean(L, true);
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2017-07-30 15:17:48 +08:00
|
|
|
/**
|
|
|
|
* @brief The following params expected:
|
|
|
|
* uint8_t *dest
|
|
|
|
* int bytes
|
|
|
|
* int start_index
|
|
|
|
* @param L
|
|
|
|
* @return
|
|
|
|
*/
|
2019-03-10 18:20:22 +08:00
|
|
|
static int l_GetFromBigBuf(lua_State *L) {
|
2019-03-09 15:59:13 +08:00
|
|
|
|
2019-03-10 06:35:06 +08:00
|
|
|
int len = 0, startindex = 0;
|
2019-03-09 15:59:13 +08:00
|
|
|
|
2017-07-30 15:17:48 +08:00
|
|
|
//Check number of arguments
|
|
|
|
int n = lua_gettop(L);
|
2018-11-06 01:32:53 +08:00
|
|
|
if (n == 0) {
|
2019-04-28 17:05:23 +08:00
|
|
|
return returnToLuaWithError(L, "You need to supply number of bytes and startindex");
|
2017-07-30 15:17:48 +08:00
|
|
|
}
|
2019-04-28 17:09:46 +08:00
|
|
|
|
2018-11-06 01:32:53 +08:00
|
|
|
if (n >= 2) {
|
2018-11-06 01:45:46 +08:00
|
|
|
startindex = luaL_checknumber(L, 1);
|
2019-03-10 06:35:06 +08:00
|
|
|
len = luaL_checknumber(L, 2);
|
2017-07-30 15:17:48 +08:00
|
|
|
}
|
2019-03-28 21:19:41 +08:00
|
|
|
|
|
|
|
if (len == 0) {
|
2019-04-28 17:05:23 +08:00
|
|
|
return returnToLuaWithError(L, "You need to supply number of bytes larger than zero");
|
2019-03-19 05:04:53 +08:00
|
|
|
}
|
2017-07-30 15:17:48 +08:00
|
|
|
|
2019-03-10 06:35:06 +08:00
|
|
|
uint8_t *data = calloc(len, sizeof(uint8_t));
|
2019-03-10 07:00:59 +08:00
|
|
|
if (!data) {
|
2019-04-28 17:05:23 +08:00
|
|
|
return returnToLuaWithError(L, "Allocating memory failed");
|
2019-03-10 06:35:06 +08:00
|
|
|
}
|
2018-11-06 01:32:53 +08:00
|
|
|
|
2019-07-24 03:33:52 +08:00
|
|
|
if (!GetFromDevice(BIG_BUF, data, len, startindex, NULL, 0, NULL, 2500, false)) {
|
2019-03-10 06:35:06 +08:00
|
|
|
free(data);
|
2019-04-28 17:05:23 +08:00
|
|
|
return returnToLuaWithError(L, "command execution time out");
|
2019-03-10 06:35:06 +08:00
|
|
|
}
|
2019-03-09 15:59:13 +08:00
|
|
|
|
2019-03-10 06:35:06 +08:00
|
|
|
//Push it as a string
|
2019-03-10 07:00:59 +08:00
|
|
|
lua_pushlstring(L, (const char *)data, len);
|
2019-03-10 06:35:06 +08:00
|
|
|
free(data);
|
2019-04-04 01:48:00 +08:00
|
|
|
return 1; // return 1 to signal one return value
|
2017-07-30 15:17:48 +08:00
|
|
|
}
|
2018-11-06 01:32:53 +08:00
|
|
|
|
|
|
|
/**
|
|
|
|
* @brief The following params expected:
|
|
|
|
* uint8_t *dest
|
|
|
|
* int bytes
|
|
|
|
* int start_index
|
|
|
|
* @param L
|
|
|
|
* @return
|
|
|
|
*/
|
2019-03-10 18:20:22 +08:00
|
|
|
static int l_GetFromFlashMem(lua_State *L) {
|
2018-11-06 01:32:53 +08:00
|
|
|
|
2019-05-02 03:46:29 +08:00
|
|
|
if (IfPm3Flash()) {
|
|
|
|
int len = 0, startindex = 0;
|
2019-03-09 15:59:13 +08:00
|
|
|
|
2019-05-02 03:46:29 +08:00
|
|
|
int n = lua_gettop(L);
|
|
|
|
if (n == 0)
|
|
|
|
return returnToLuaWithError(L, "You need to supply number of bytes and startindex");
|
2019-04-28 17:09:46 +08:00
|
|
|
|
2019-05-02 03:46:29 +08:00
|
|
|
if (n >= 2) {
|
|
|
|
startindex = luaL_checknumber(L, 1);
|
|
|
|
len = luaL_checknumber(L, 2);
|
|
|
|
}
|
2019-03-28 21:19:41 +08:00
|
|
|
|
2019-05-02 03:46:29 +08:00
|
|
|
if (len == 0)
|
|
|
|
return returnToLuaWithError(L, "You need to supply number of bytes larger than zero");
|
2018-11-06 01:32:53 +08:00
|
|
|
|
2019-05-02 03:46:29 +08:00
|
|
|
uint8_t *data = calloc(len, sizeof(uint8_t));
|
|
|
|
if (!data)
|
|
|
|
return returnToLuaWithError(L, "Allocating memory failed");
|
2019-03-09 15:59:13 +08:00
|
|
|
|
2019-07-24 03:33:52 +08:00
|
|
|
if (!GetFromDevice(FLASH_MEM, data, len, startindex, NULL, 0, NULL, -1, false)) {
|
2019-05-02 03:46:29 +08:00
|
|
|
free(data);
|
|
|
|
return returnToLuaWithError(L, "command execution time out");
|
|
|
|
}
|
|
|
|
|
|
|
|
lua_pushlstring(L, (const char *)data, len);
|
2019-03-10 06:35:06 +08:00
|
|
|
free(data);
|
2019-05-02 03:46:29 +08:00
|
|
|
return 1;
|
|
|
|
} else {
|
|
|
|
return returnToLuaWithError(L, "No FLASH MEM support");
|
2019-03-10 06:35:06 +08:00
|
|
|
}
|
2018-11-06 01:32:53 +08:00
|
|
|
}
|
|
|
|
|
2019-11-03 02:07:36 +08:00
|
|
|
/**
|
|
|
|
* @brief The following params expected:
|
|
|
|
* uint8_t *destfilename
|
|
|
|
* @param L
|
|
|
|
* @return
|
|
|
|
*/
|
|
|
|
static int l_GetFromFlashMemSpiffs(lua_State *L) {
|
|
|
|
|
2019-12-30 23:50:53 +08:00
|
|
|
if (IfPm3Flash() == false) {
|
|
|
|
return returnToLuaWithError(L, "No FLASH MEM support");
|
|
|
|
}
|
2020-01-01 05:19:03 +08:00
|
|
|
|
2019-12-30 23:50:53 +08:00
|
|
|
uint32_t start_index = 0, len = 0x40000; //FLASH_MEM_MAX_SIZE
|
|
|
|
char destfilename[32] = {0};
|
|
|
|
size_t size;
|
2019-11-03 02:07:36 +08:00
|
|
|
|
2019-12-30 23:50:53 +08:00
|
|
|
int n = lua_gettop(L);
|
|
|
|
if (n == 0)
|
|
|
|
return returnToLuaWithError(L, "You need to supply the destination filename");
|
2019-11-03 02:07:36 +08:00
|
|
|
|
2019-12-30 23:50:53 +08:00
|
|
|
if (n >= 1) {
|
|
|
|
const char *p_filename = luaL_checklstring(L, 1, &size);
|
|
|
|
if (size != 0)
|
|
|
|
memcpy(destfilename, p_filename, 31);
|
|
|
|
}
|
2019-11-08 19:00:21 +08:00
|
|
|
|
2019-12-30 23:50:53 +08:00
|
|
|
if (destfilename[0] == '\0')
|
|
|
|
return returnToLuaWithError(L, "Filename missing or invalid");
|
2019-11-08 19:00:21 +08:00
|
|
|
|
2019-12-30 23:50:53 +08:00
|
|
|
// get size from spiffs itself !
|
|
|
|
SendCommandMIX(CMD_SPIFFS_STAT, 0, 0, 0, (uint8_t *)destfilename, 32);
|
|
|
|
PacketResponseNG resp;
|
|
|
|
if (!WaitForResponseTimeout(CMD_ACK, &resp, 2000))
|
|
|
|
return returnToLuaWithError(L, "No response from the device");
|
2019-11-08 19:00:21 +08:00
|
|
|
|
2019-12-30 23:50:53 +08:00
|
|
|
len = resp.oldarg[0];
|
2019-11-08 19:00:21 +08:00
|
|
|
|
2019-12-30 23:50:53 +08:00
|
|
|
if (len == 0)
|
|
|
|
return returnToLuaWithError(L, "Filename invalid or empty");
|
2019-11-08 19:00:21 +08:00
|
|
|
|
2019-12-30 23:50:53 +08:00
|
|
|
uint8_t *data = calloc(len, sizeof(uint8_t));
|
|
|
|
if (!data)
|
|
|
|
return returnToLuaWithError(L, "Allocating memory failed");
|
2019-11-03 02:07:36 +08:00
|
|
|
|
2019-12-30 23:50:53 +08:00
|
|
|
if (!GetFromDevice(SPIFFS, data, len, start_index, (uint8_t *)destfilename, 32, NULL, -1, true)) {
|
2019-11-03 02:07:36 +08:00
|
|
|
free(data);
|
2019-12-30 23:50:53 +08:00
|
|
|
return returnToLuaWithError(L, "ERROR; downloading from spiffs(flashmemory)");
|
2019-11-03 02:07:36 +08:00
|
|
|
}
|
2019-12-30 23:50:53 +08:00
|
|
|
|
|
|
|
lua_pushlstring(L, (const char *)data, len);
|
|
|
|
lua_pushunsigned(L, len);
|
|
|
|
free(data);
|
|
|
|
return 2;
|
2019-11-03 02:07:36 +08:00
|
|
|
}
|
|
|
|
|
2013-05-25 05:06:57 +08:00
|
|
|
/**
|
|
|
|
* @brief The following params expected:
|
|
|
|
* uint32_t cmd
|
|
|
|
* size_t ms_timeout
|
|
|
|
* @param L
|
2019-04-28 17:05:23 +08:00
|
|
|
* @return struct of PacketResponseNG
|
2013-05-25 05:06:57 +08:00
|
|
|
*/
|
2019-03-10 18:20:22 +08:00
|
|
|
static int l_WaitForResponseTimeout(lua_State *L) {
|
2013-05-25 05:06:57 +08:00
|
|
|
|
2013-06-07 17:24:25 +08:00
|
|
|
uint32_t cmd = 0;
|
|
|
|
size_t ms_timeout = -1;
|
2013-05-25 05:06:57 +08:00
|
|
|
|
2013-06-07 17:24:25 +08:00
|
|
|
//Check number of arguments
|
|
|
|
int n = lua_gettop(L);
|
2019-04-28 17:05:23 +08:00
|
|
|
if (n == 0)
|
|
|
|
return returnToLuaWithError(L, "You need to supply at least command to wait for");
|
2019-03-09 15:59:13 +08:00
|
|
|
|
2019-03-10 06:35:06 +08:00
|
|
|
// extract first param. cmd byte to look for
|
2019-04-28 17:05:23 +08:00
|
|
|
if (n >= 1)
|
2017-12-18 22:43:45 +08:00
|
|
|
cmd = luaL_checkunsigned(L, 1);
|
2019-04-28 17:05:23 +08:00
|
|
|
|
2019-03-10 06:35:06 +08:00
|
|
|
// extract second param. timeout value
|
2019-04-28 17:05:23 +08:00
|
|
|
if (n >= 2)
|
2017-12-18 22:43:45 +08:00
|
|
|
ms_timeout = luaL_checkunsigned(L, 2);
|
2013-05-25 05:06:57 +08:00
|
|
|
|
2019-04-18 18:43:35 +08:00
|
|
|
PacketResponseNG resp;
|
2019-05-25 21:06:44 +08:00
|
|
|
if (WaitForResponseTimeout(cmd, &resp, ms_timeout) == false)
|
2019-04-28 17:05:23 +08:00
|
|
|
return returnToLuaWithError(L, "No response from the device");
|
2013-10-07 18:11:15 +08:00
|
|
|
|
2019-05-25 21:06:44 +08:00
|
|
|
char foo[sizeof(PacketResponseNG)];
|
|
|
|
n = 0;
|
|
|
|
|
|
|
|
memcpy(foo + n, &resp.cmd, sizeof(resp.cmd));
|
|
|
|
n += sizeof(resp.cmd);
|
|
|
|
|
|
|
|
memcpy(foo + n, &resp.length, sizeof(resp.length));
|
|
|
|
n += sizeof(resp.length);
|
|
|
|
|
|
|
|
memcpy(foo + n, &resp.magic, sizeof(resp.magic));
|
|
|
|
n += sizeof(resp.magic);
|
|
|
|
|
|
|
|
memcpy(foo + n, &resp.status, sizeof(resp.status));
|
|
|
|
n += sizeof(resp.status);
|
|
|
|
|
|
|
|
memcpy(foo + n, &resp.crc, sizeof(resp.crc));
|
|
|
|
n += sizeof(resp.crc);
|
|
|
|
|
|
|
|
memcpy(foo + n, &resp.oldarg[0], sizeof(resp.oldarg[0]));
|
|
|
|
n += sizeof(resp.oldarg[0]);
|
|
|
|
|
|
|
|
memcpy(foo + n, &resp.oldarg[1], sizeof(resp.oldarg[1]));
|
|
|
|
n += sizeof(resp.oldarg[1]);
|
|
|
|
|
|
|
|
memcpy(foo + n, &resp.oldarg[2], sizeof(resp.oldarg[2]));
|
|
|
|
n += sizeof(resp.oldarg[2]);
|
|
|
|
|
|
|
|
memcpy(foo + n, resp.data.asBytes, sizeof(resp.data));
|
|
|
|
n += sizeof(resp.data);
|
|
|
|
|
|
|
|
memcpy(foo + n, &resp.ng, sizeof(resp.ng));
|
|
|
|
n += sizeof(resp.ng);
|
2019-06-08 00:41:39 +08:00
|
|
|
(void) n;
|
2019-05-25 21:06:44 +08:00
|
|
|
|
2019-04-28 17:05:23 +08:00
|
|
|
//Push it as a string
|
2019-05-25 21:06:44 +08:00
|
|
|
lua_pushlstring(L, (const char *)&foo, sizeof(foo));
|
|
|
|
|
2019-04-28 17:05:23 +08:00
|
|
|
return 1;
|
2013-10-07 18:11:15 +08:00
|
|
|
}
|
|
|
|
|
2019-03-10 18:20:22 +08:00
|
|
|
static int l_mfDarkside(lua_State *L) {
|
2017-07-31 21:45:01 +08:00
|
|
|
|
2019-03-10 06:35:06 +08:00
|
|
|
uint32_t blockno = 0;
|
|
|
|
uint32_t keytype = MIFARE_AUTH_KEYA;
|
|
|
|
uint64_t key = 0;
|
|
|
|
size_t size;
|
2017-07-31 21:45:01 +08:00
|
|
|
|
|
|
|
//Check number of arguments
|
|
|
|
int n = lua_gettop(L);
|
2019-03-10 06:35:06 +08:00
|
|
|
switch (n) {
|
2019-03-10 07:00:59 +08:00
|
|
|
case 2: {
|
2019-03-10 06:35:06 +08:00
|
|
|
const char *p_keytype = luaL_checklstring(L, 2, &size);
|
2019-03-10 07:00:59 +08:00
|
|
|
if (size != 2) return returnToLuaWithError(L, "Wrong size of keytype, got %d bytes, expected 1", (int) size);
|
2019-03-10 06:35:06 +08:00
|
|
|
sscanf(p_keytype, "%x", &keytype);
|
|
|
|
}
|
|
|
|
case 1: {
|
|
|
|
const char *p_blockno = luaL_checklstring(L, 1, &size);
|
2019-03-10 07:00:59 +08:00
|
|
|
if (size != 2) return returnToLuaWithError(L, "Wrong size of blockno, got %d bytes, expected 2", (int) size);
|
2019-03-10 06:35:06 +08:00
|
|
|
sscanf(p_blockno, "%02x", &blockno);
|
|
|
|
break;
|
|
|
|
}
|
2019-03-10 07:00:59 +08:00
|
|
|
default :
|
|
|
|
break;
|
2019-03-10 06:35:06 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
int retval = mfDarkside(blockno & 0xFF, keytype & 0xFF, &key);
|
2013-10-07 18:11:15 +08:00
|
|
|
|
2013-10-11 16:37:08 +08:00
|
|
|
uint8_t dest_key[8];
|
2017-12-18 22:43:45 +08:00
|
|
|
num_to_bytes(key, sizeof(dest_key), dest_key);
|
2019-03-09 15:59:13 +08:00
|
|
|
|
2017-12-18 22:43:45 +08:00
|
|
|
//Push the retval on the stack
|
|
|
|
lua_pushinteger(L, retval);
|
|
|
|
lua_pushlstring(L, (const char *) dest_key, sizeof(dest_key));
|
|
|
|
return 2;
|
2013-10-07 18:11:15 +08:00
|
|
|
}
|
2017-12-18 22:43:45 +08:00
|
|
|
|
2013-06-07 17:24:25 +08:00
|
|
|
/**
|
|
|
|
* @brief l_foobar is a dummy function to test lua-integration with
|
|
|
|
* @param L
|
|
|
|
* @return
|
|
|
|
*/
|
2019-03-10 18:20:22 +08:00
|
|
|
static int l_foobar(lua_State *L) {
|
2013-06-07 17:24:25 +08:00
|
|
|
//Check number of arguments
|
|
|
|
int n = lua_gettop(L);
|
2019-03-10 07:00:59 +08:00
|
|
|
printf("foobar called with %d arguments", n);
|
2013-06-07 17:24:25 +08:00
|
|
|
lua_settop(L, 0);
|
|
|
|
printf("Arguments discarded, stack now contains %d elements", lua_gettop(L));
|
2015-05-23 14:16:40 +08:00
|
|
|
|
2013-10-11 16:37:08 +08:00
|
|
|
// todo: this is not used, where was it intended for?
|
2019-08-04 01:17:00 +08:00
|
|
|
// PacketCommandOLD response = {CMD_HF_MIFARE_READBL, {1337, 1338, 1339}, {{0}}};
|
2015-05-23 14:16:40 +08:00
|
|
|
|
2013-10-11 16:37:08 +08:00
|
|
|
printf("Now returning a uint64_t as a string");
|
2017-07-31 21:45:01 +08:00
|
|
|
uint64_t x = 0xDEADC0DE;
|
2013-10-11 16:37:08 +08:00
|
|
|
uint8_t destination[8];
|
2019-03-10 07:00:59 +08:00
|
|
|
num_to_bytes(x, sizeof(x), destination);
|
|
|
|
lua_pushlstring(L, (const char *)&x, sizeof(x));
|
|
|
|
lua_pushlstring(L, (const char *)destination, sizeof(destination));
|
2013-10-11 16:37:08 +08:00
|
|
|
return 2;
|
2013-06-07 17:24:25 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @brief Utility to check if a key has been pressed by the user. This method does not block.
|
|
|
|
* @param L
|
|
|
|
* @return boolean, true if kbhit, false otherwise.
|
|
|
|
*/
|
2019-07-11 19:01:34 +08:00
|
|
|
static int l_kbd_enter_pressed(lua_State *L) {
|
|
|
|
lua_pushboolean(L, kbd_enter_pressed() ? true : false);
|
2013-06-07 17:24:25 +08:00
|
|
|
return 1;
|
|
|
|
}
|
2019-04-28 17:05:23 +08:00
|
|
|
|
2013-10-05 03:29:46 +08:00
|
|
|
/**
|
|
|
|
* @brief Calls the command line parser to deal with the command. This enables
|
|
|
|
* lua-scripts to do stuff like "core.console('hf mf mifare')"
|
|
|
|
* @param L
|
|
|
|
* @return
|
|
|
|
*/
|
2019-03-10 18:20:22 +08:00
|
|
|
static int l_CmdConsole(lua_State *L) {
|
2013-10-05 03:29:46 +08:00
|
|
|
CommandReceived((char *)luaL_checkstring(L, 1));
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2019-03-10 18:20:22 +08:00
|
|
|
static int l_iso15693_crc(lua_State *L) {
|
2019-03-10 06:35:06 +08:00
|
|
|
uint32_t tmp;
|
2019-05-01 03:10:11 +08:00
|
|
|
unsigned char buf[PM3_CMD_DATA_SIZE] = {0x00};
|
2019-03-09 15:59:13 +08:00
|
|
|
size_t size = 0;
|
2018-11-30 08:19:57 +08:00
|
|
|
const char *data = luaL_checklstring(L, 1, &size);
|
2019-03-09 15:59:13 +08:00
|
|
|
|
2019-03-10 06:35:06 +08:00
|
|
|
for (int i = 0; i < size; i += 2) {
|
|
|
|
sscanf(&data[i], "%02x", &tmp);
|
|
|
|
buf[i / 2] = tmp & 0xFF;
|
|
|
|
}
|
2019-03-09 15:59:13 +08:00
|
|
|
|
2019-03-10 06:35:06 +08:00
|
|
|
size /= 2;
|
2019-03-10 07:00:59 +08:00
|
|
|
compute_crc(CRC_15693, buf, size, &buf[size], &buf[size + 1]);
|
|
|
|
lua_pushlstring(L, (const char *)&buf, size + 2);
|
2013-11-07 02:34:10 +08:00
|
|
|
return 1;
|
|
|
|
}
|
2013-05-25 05:06:57 +08:00
|
|
|
|
2019-03-10 18:20:22 +08:00
|
|
|
static int l_iso14443b_crc(lua_State *L) {
|
2019-03-10 06:35:06 +08:00
|
|
|
uint32_t tmp;
|
2019-05-01 03:10:11 +08:00
|
|
|
unsigned char buf[PM3_CMD_DATA_SIZE] = {0x00};
|
2019-03-09 15:59:13 +08:00
|
|
|
size_t size = 0;
|
2016-02-26 00:51:02 +08:00
|
|
|
const char *data = luaL_checklstring(L, 1, &size);
|
2019-03-09 15:59:13 +08:00
|
|
|
|
2019-03-10 06:35:06 +08:00
|
|
|
for (int i = 0; i < size; i += 2) {
|
|
|
|
sscanf(&data[i], "%02x", &tmp);
|
|
|
|
buf[i / 2] = tmp & 0xFF;
|
|
|
|
}
|
2019-03-09 15:59:13 +08:00
|
|
|
|
2019-03-10 06:35:06 +08:00
|
|
|
size /= 2;
|
2019-03-10 07:00:59 +08:00
|
|
|
compute_crc(CRC_14443_B, buf, size, &buf[size], &buf[size + 1]);
|
|
|
|
lua_pushlstring(L, (const char *)&buf, size + 2);
|
2015-07-29 03:33:09 +08:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2014-11-03 20:49:19 +08:00
|
|
|
/*
|
|
|
|
Simple AES 128 cbc hook up to OpenSSL.
|
|
|
|
params: key, input
|
|
|
|
*/
|
2019-03-10 18:20:22 +08:00
|
|
|
static int l_aes128decrypt_cbc(lua_State *L) {
|
2019-03-10 06:35:06 +08:00
|
|
|
//Check number of arguments
|
|
|
|
int i;
|
|
|
|
uint32_t tmp;
|
2014-11-03 20:49:19 +08:00
|
|
|
size_t size;
|
|
|
|
const char *p_key = luaL_checklstring(L, 1, &size);
|
2019-04-28 17:05:23 +08:00
|
|
|
if (size != 32)
|
|
|
|
return returnToLuaWithError(L, "Wrong size of key, got %d bytes, expected 32", (int) size);
|
2014-11-03 20:49:19 +08:00
|
|
|
|
|
|
|
const char *p_encTxt = luaL_checklstring(L, 2, &size);
|
2015-01-08 05:00:29 +08:00
|
|
|
|
2019-03-10 06:35:06 +08:00
|
|
|
unsigned char indata[16] = {0x00};
|
|
|
|
unsigned char outdata[16] = {0x00};
|
2015-01-13 04:47:36 +08:00
|
|
|
unsigned char aes_key[16] = {0x00};
|
2019-03-10 06:35:06 +08:00
|
|
|
unsigned char iv[16] = {0x00};
|
|
|
|
|
|
|
|
// convert key to bytearray and convert input to bytearray
|
|
|
|
for (i = 0; i < 32; i += 2) {
|
|
|
|
sscanf(&p_encTxt[i], "%02x", &tmp);
|
|
|
|
indata[i / 2] = tmp & 0xFF;
|
|
|
|
sscanf(&p_key[i], "%02x", &tmp);
|
|
|
|
aes_key[i / 2] = tmp & 0xFF;
|
|
|
|
}
|
2015-04-10 02:34:34 +08:00
|
|
|
|
2018-11-08 00:20:24 +08:00
|
|
|
mbedtls_aes_context ctx;
|
|
|
|
mbedtls_aes_init(&ctx);
|
2019-03-10 06:35:06 +08:00
|
|
|
mbedtls_aes_setkey_dec(&ctx, aes_key, 128);
|
2019-03-10 07:00:59 +08:00
|
|
|
mbedtls_aes_crypt_cbc(&ctx, MBEDTLS_AES_DECRYPT, sizeof(indata), iv, indata, outdata);
|
2015-04-10 02:34:34 +08:00
|
|
|
//Push decrypted array as a string
|
2019-03-10 07:00:59 +08:00
|
|
|
lua_pushlstring(L, (const char *)&outdata, sizeof(outdata));
|
2019-03-10 06:35:06 +08:00
|
|
|
return 1;// return 1 to signal one return value
|
2015-04-10 02:34:34 +08:00
|
|
|
}
|
2019-03-10 18:20:22 +08:00
|
|
|
static int l_aes128decrypt_ecb(lua_State *L) {
|
2019-03-10 06:35:06 +08:00
|
|
|
//Check number of arguments
|
|
|
|
int i;
|
|
|
|
uint32_t tmp;
|
2015-05-27 03:51:18 +08:00
|
|
|
size_t size;
|
|
|
|
const char *p_key = luaL_checklstring(L, 1, &size);
|
2019-04-28 17:05:23 +08:00
|
|
|
if (size != 32)
|
|
|
|
return returnToLuaWithError(L, "Wrong size of key, got %d bytes, expected 32", (int) size);
|
2015-05-27 03:51:18 +08:00
|
|
|
|
|
|
|
const char *p_encTxt = luaL_checklstring(L, 2, &size);
|
|
|
|
|
2019-03-10 06:35:06 +08:00
|
|
|
unsigned char indata[16] = {0x00};
|
|
|
|
unsigned char outdata[16] = {0x00};
|
2015-05-27 03:51:18 +08:00
|
|
|
unsigned char aes_key[16] = {0x00};
|
|
|
|
|
2019-03-10 06:35:06 +08:00
|
|
|
// convert key to bytearray and convert input to bytearray
|
|
|
|
for (i = 0; i < 32; i += 2) {
|
|
|
|
sscanf(&p_encTxt[i], "%02x", &tmp);
|
|
|
|
indata[i / 2] = tmp & 0xFF;
|
|
|
|
sscanf(&p_key[i], "%02x", &tmp);
|
|
|
|
aes_key[i / 2] = tmp & 0xFF;
|
|
|
|
}
|
2018-11-08 00:20:24 +08:00
|
|
|
mbedtls_aes_context ctx;
|
|
|
|
mbedtls_aes_init(&ctx);
|
2019-03-10 06:35:06 +08:00
|
|
|
mbedtls_aes_setkey_dec(&ctx, aes_key, 128);
|
2019-03-10 07:00:59 +08:00
|
|
|
mbedtls_aes_crypt_ecb(&ctx, MBEDTLS_AES_DECRYPT, indata, outdata);
|
2015-05-27 03:51:18 +08:00
|
|
|
|
|
|
|
//Push decrypted array as a string
|
2019-03-10 07:00:59 +08:00
|
|
|
lua_pushlstring(L, (const char *)&outdata, sizeof(outdata));
|
2019-03-10 06:35:06 +08:00
|
|
|
return 1;// return 1 to signal one return value
|
2015-05-27 03:51:18 +08:00
|
|
|
}
|
|
|
|
|
2019-03-10 18:20:22 +08:00
|
|
|
static int l_aes128encrypt_cbc(lua_State *L) {
|
2019-03-10 06:35:06 +08:00
|
|
|
//Check number of arguments
|
|
|
|
int i;
|
|
|
|
uint32_t tmp;
|
2015-04-10 02:34:34 +08:00
|
|
|
size_t size;
|
|
|
|
const char *p_key = luaL_checklstring(L, 1, &size);
|
2019-04-28 17:05:23 +08:00
|
|
|
if (size != 32)
|
|
|
|
return returnToLuaWithError(L, "Wrong size of key, got %d bytes, expected 32", (int) size);
|
2015-04-10 02:34:34 +08:00
|
|
|
|
|
|
|
const char *p_txt = luaL_checklstring(L, 2, &size);
|
2019-03-09 15:59:13 +08:00
|
|
|
|
2019-03-10 06:35:06 +08:00
|
|
|
unsigned char indata[16] = {0x00};
|
|
|
|
unsigned char outdata[16] = {0x00};
|
2015-04-10 02:34:34 +08:00
|
|
|
unsigned char aes_key[16] = {0x00};
|
2019-03-10 06:35:06 +08:00
|
|
|
unsigned char iv[16] = {0x00};
|
2019-03-09 15:59:13 +08:00
|
|
|
|
2019-03-10 06:35:06 +08:00
|
|
|
for (i = 0; i < 32; i += 2) {
|
|
|
|
sscanf(&p_txt[i], "%02x", &tmp);
|
|
|
|
indata[i / 2] = tmp & 0xFF;
|
|
|
|
sscanf(&p_key[i], "%02x", &tmp);
|
|
|
|
aes_key[i / 2] = tmp & 0xFF;
|
|
|
|
}
|
2015-01-13 04:47:36 +08:00
|
|
|
|
2018-11-08 00:20:24 +08:00
|
|
|
mbedtls_aes_context ctx;
|
|
|
|
mbedtls_aes_init(&ctx);
|
2019-03-10 06:35:06 +08:00
|
|
|
mbedtls_aes_setkey_enc(&ctx, aes_key, 128);
|
2019-03-10 07:00:59 +08:00
|
|
|
mbedtls_aes_crypt_cbc(&ctx, MBEDTLS_AES_ENCRYPT, sizeof(indata), iv, indata, outdata);
|
2019-03-10 06:35:06 +08:00
|
|
|
//Push encrypted array as a string
|
2019-03-10 07:00:59 +08:00
|
|
|
lua_pushlstring(L, (const char *)&outdata, sizeof(outdata));
|
2019-03-10 06:35:06 +08:00
|
|
|
return 1;// return 1 to signal one return value
|
2014-11-03 20:49:19 +08:00
|
|
|
}
|
|
|
|
|
2019-03-10 18:20:22 +08:00
|
|
|
static int l_aes128encrypt_ecb(lua_State *L) {
|
2019-03-10 06:35:06 +08:00
|
|
|
//Check number of arguments
|
|
|
|
int i;
|
|
|
|
uint32_t tmp;
|
2015-05-27 03:51:18 +08:00
|
|
|
size_t size;
|
|
|
|
const char *p_key = luaL_checklstring(L, 1, &size);
|
2019-04-28 17:05:23 +08:00
|
|
|
if (size != 32)
|
|
|
|
return returnToLuaWithError(L, "Wrong size of key, got %d bytes, expected 32", (int) size);
|
2015-05-27 03:51:18 +08:00
|
|
|
|
|
|
|
const char *p_txt = luaL_checklstring(L, 2, &size);
|
2019-03-09 15:59:13 +08:00
|
|
|
|
2019-03-10 06:35:06 +08:00
|
|
|
unsigned char indata[16] = {0x00};
|
|
|
|
unsigned char outdata[16] = {0x00};
|
2015-05-27 03:51:18 +08:00
|
|
|
unsigned char aes_key[16] = {0x00};
|
2019-03-09 15:59:13 +08:00
|
|
|
|
2019-03-10 06:35:06 +08:00
|
|
|
for (i = 0; i < 32; i += 2) {
|
|
|
|
sscanf(&p_txt[i], "%02x", &tmp);
|
|
|
|
indata[i / 2] = tmp & 0xFF;
|
|
|
|
sscanf(&p_key[i], "%02x", &tmp);
|
|
|
|
aes_key[i / 2] = tmp & 0xFF;
|
|
|
|
}
|
2018-11-08 00:20:24 +08:00
|
|
|
mbedtls_aes_context ctx;
|
|
|
|
mbedtls_aes_init(&ctx);
|
2019-03-10 06:35:06 +08:00
|
|
|
mbedtls_aes_setkey_enc(&ctx, aes_key, 128);
|
2019-03-10 07:00:59 +08:00
|
|
|
mbedtls_aes_crypt_ecb(&ctx, MBEDTLS_AES_ENCRYPT, indata, outdata);
|
2019-03-10 06:35:06 +08:00
|
|
|
//Push encrypted array as a string
|
2019-03-10 07:00:59 +08:00
|
|
|
lua_pushlstring(L, (const char *)&outdata, sizeof(outdata));
|
2019-03-10 06:35:06 +08:00
|
|
|
return 1;// return 1 to signal one return value
|
2015-05-27 03:51:18 +08:00
|
|
|
}
|
|
|
|
|
2019-03-10 18:20:22 +08:00
|
|
|
static int l_crc8legic(lua_State *L) {
|
2019-03-10 06:35:06 +08:00
|
|
|
size_t size;
|
|
|
|
const char *p_str = luaL_checklstring(L, 1, &size);
|
2016-02-23 00:50:32 +08:00
|
|
|
|
2019-03-10 07:00:59 +08:00
|
|
|
uint16_t retval = CRC8Legic((uint8_t *) p_str, size);
|
2017-11-26 14:29:05 +08:00
|
|
|
lua_pushunsigned(L, retval);
|
2016-02-23 00:50:32 +08:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2019-03-10 18:20:22 +08:00
|
|
|
static int l_crc16(lua_State *L) {
|
2019-03-10 06:35:06 +08:00
|
|
|
size_t size;
|
|
|
|
const char *p_str = luaL_checklstring(L, 1, &size);
|
2015-05-14 09:14:35 +08:00
|
|
|
|
2019-04-09 16:12:15 +08:00
|
|
|
uint16_t checksum = Crc16ex(CRC_CCITT, (uint8_t *) p_str, size);
|
2018-04-18 22:08:46 +08:00
|
|
|
lua_pushunsigned(L, checksum);
|
2014-11-13 06:18:46 +08:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2019-03-10 18:20:22 +08:00
|
|
|
static int l_crc64(lua_State *L) {
|
2019-03-10 06:35:06 +08:00
|
|
|
size_t size;
|
|
|
|
uint64_t crc = 0;
|
|
|
|
unsigned char outdata[8] = {0x00};
|
|
|
|
|
|
|
|
const char *p_str = luaL_checklstring(L, 1, &size);
|
|
|
|
|
2019-03-10 07:00:59 +08:00
|
|
|
crc64((uint8_t *) p_str, size, &crc);
|
2019-03-10 06:35:06 +08:00
|
|
|
|
|
|
|
outdata[0] = (uint8_t)(crc >> 56) & 0xff;
|
|
|
|
outdata[1] = (uint8_t)(crc >> 48) & 0xff;
|
|
|
|
outdata[2] = (uint8_t)(crc >> 40) & 0xff;
|
|
|
|
outdata[3] = (uint8_t)(crc >> 32) & 0xff;
|
|
|
|
outdata[4] = (uint8_t)(crc >> 24) & 0xff;
|
|
|
|
outdata[5] = (uint8_t)(crc >> 16) & 0xff;
|
|
|
|
outdata[6] = (uint8_t)(crc >> 8) & 0xff;
|
|
|
|
outdata[7] = crc & 0xff;
|
2019-03-10 07:00:59 +08:00
|
|
|
lua_pushlstring(L, (const char *)&outdata, sizeof(outdata));
|
2019-03-10 06:35:06 +08:00
|
|
|
return 1;
|
2015-03-12 05:06:23 +08:00
|
|
|
}
|
|
|
|
|
2019-04-28 17:05:23 +08:00
|
|
|
// TO BE IMPLEMENTED
|
2019-03-10 18:20:22 +08:00
|
|
|
static int l_crc64_ecma182(lua_State *L) {
|
2019-03-10 06:35:06 +08:00
|
|
|
//size_t size;
|
|
|
|
uint64_t crc = 0;
|
|
|
|
unsigned char outdata[8] = {0x00};
|
|
|
|
//const char *p_str = luaL_checklstring(L, 1, &size);
|
|
|
|
|
|
|
|
//init
|
|
|
|
//crc64_ecma182(NULL, 0, &crc);
|
|
|
|
crc = 0x338103260CC4;
|
|
|
|
|
|
|
|
// calc hash
|
|
|
|
//crc64_ecma182((uint8_t*) p_str, size, &crc);
|
|
|
|
|
|
|
|
outdata[0] = (uint8_t)(crc >> 56) & 0xff;
|
|
|
|
outdata[1] = (uint8_t)(crc >> 48) & 0xff;
|
|
|
|
outdata[2] = (uint8_t)(crc >> 40) & 0xff;
|
|
|
|
outdata[3] = (uint8_t)(crc >> 32) & 0xff;
|
|
|
|
outdata[4] = (uint8_t)(crc >> 24) & 0xff;
|
|
|
|
outdata[5] = (uint8_t)(crc >> 16) & 0xff;
|
|
|
|
outdata[6] = (uint8_t)(crc >> 8) & 0xff;
|
|
|
|
outdata[7] = crc & 0xff;
|
|
|
|
lua_pushlstring(L, (const char *)&outdata, sizeof(outdata));
|
|
|
|
return 1;
|
2017-07-30 15:17:48 +08:00
|
|
|
}
|
|
|
|
|
2019-03-10 18:20:22 +08:00
|
|
|
static int l_sha1(lua_State *L) {
|
2019-03-10 06:35:06 +08:00
|
|
|
size_t size;
|
|
|
|
const char *p_str = luaL_checklstring(L, 1, &size);
|
|
|
|
unsigned char outdata[20] = {0x00};
|
2019-03-10 07:00:59 +08:00
|
|
|
mbedtls_sha1((uint8_t *) p_str, size, outdata);
|
2017-12-18 22:43:45 +08:00
|
|
|
lua_pushlstring(L, (const char *)&outdata, sizeof(outdata));
|
2019-03-09 15:59:13 +08:00
|
|
|
return 1;
|
2015-05-26 22:12:33 +08:00
|
|
|
}
|
|
|
|
|
2019-03-10 18:20:22 +08:00
|
|
|
static int l_reveng_models(lua_State *L) {
|
2015-06-09 19:31:53 +08:00
|
|
|
|
2018-07-29 13:37:23 +08:00
|
|
|
// This array needs to be adjusted if RevEng adds more crc-models.
|
2019-03-16 14:18:58 +08:00
|
|
|
#define NMODELS 106
|
2018-07-29 13:37:23 +08:00
|
|
|
|
2019-03-10 06:35:06 +08:00
|
|
|
int count = 0;
|
|
|
|
uint8_t in_width = luaL_checkunsigned(L, 1);
|
2019-04-28 17:05:23 +08:00
|
|
|
if (in_width > 89)
|
|
|
|
return returnToLuaWithError(L, "Width cannot exceed 89, got %d", in_width);
|
2015-06-09 19:31:53 +08:00
|
|
|
|
2019-03-10 06:35:06 +08:00
|
|
|
uint8_t width[NMODELS];
|
|
|
|
memset(width, 0, sizeof(width));
|
|
|
|
char *models[NMODELS];
|
2018-02-04 05:17:07 +08:00
|
|
|
|
2019-03-10 06:35:06 +08:00
|
|
|
width[0] = in_width;
|
2019-03-09 15:59:13 +08:00
|
|
|
|
2019-03-10 06:35:06 +08:00
|
|
|
if (!GetModels(models, &count, width))
|
|
|
|
return returnToLuaWithError(L, "didn't find any models");
|
2019-03-09 15:59:13 +08:00
|
|
|
|
2019-03-10 06:35:06 +08:00
|
|
|
lua_newtable(L);
|
2019-03-10 07:00:59 +08:00
|
|
|
for (int i = 0; i < count; i++) {
|
|
|
|
lua_pushstring(L, (const char *)models[i]);
|
|
|
|
lua_rawseti(L, -2, i + 1);
|
2019-03-10 06:35:06 +08:00
|
|
|
free(models[i]);
|
|
|
|
}
|
|
|
|
return 1;
|
2015-06-09 19:31:53 +08:00
|
|
|
}
|
|
|
|
|
2015-06-10 03:32:22 +08:00
|
|
|
//Called with 4 parameters.
|
|
|
|
// inModel ,string containing the crc model name: 'CRC-8'
|
|
|
|
// inHexStr ,string containing the hex representation of the data that will be used for CRC calculations.
|
|
|
|
// reverse ,int 0/1 (bool) if 1, calculate the reverse CRC
|
|
|
|
// endian ,char, 'B','b','L','l','t','r' describing if Big-Endian or Little-Endian should be used in different combinations.
|
|
|
|
//
|
|
|
|
// outputs: string with hex representation of the CRC result
|
2019-04-04 01:48:00 +08:00
|
|
|
static int l_reveng_runmodel(lua_State *L) {
|
2019-03-10 06:35:06 +08:00
|
|
|
//-c || -v
|
|
|
|
//inModel = valid model name string - CRC-8
|
|
|
|
//inHexStr = input hex string to calculate crc on
|
|
|
|
//reverse = reverse calc option if true
|
|
|
|
//endian = {0 = calc default endian input and output, b = big endian input and output, B = big endian output, r = right justified
|
|
|
|
// l = little endian input and output, L = little endian output only, t = left justified}
|
|
|
|
//result = calculated crc hex string
|
|
|
|
char result[50];
|
|
|
|
|
|
|
|
const char *inModel = luaL_checkstring(L, 1);
|
|
|
|
const char *inHexStr = luaL_checkstring(L, 2);
|
2015-06-10 03:32:22 +08:00
|
|
|
bool reverse = lua_toboolean(L, 3);
|
2019-03-10 06:35:06 +08:00
|
|
|
const char endian = luaL_checkstring(L, 4)[0];
|
2015-06-09 19:31:53 +08:00
|
|
|
|
2019-03-10 07:00:59 +08:00
|
|
|
int ans = RunModel((char *)inModel, (char *)inHexStr, reverse, endian, result);
|
2019-03-10 06:35:06 +08:00
|
|
|
if (!ans)
|
2019-03-10 07:00:59 +08:00
|
|
|
return returnToLuaWithError(L, "Reveng failed");
|
2015-06-09 19:31:53 +08:00
|
|
|
|
2019-03-10 07:00:59 +08:00
|
|
|
lua_pushstring(L, (const char *)result);
|
2019-03-10 06:35:06 +08:00
|
|
|
return 1;
|
2015-06-09 19:31:53 +08:00
|
|
|
}
|
|
|
|
|
2019-03-10 18:20:22 +08:00
|
|
|
static int l_hardnested(lua_State *L) {
|
2016-11-21 23:08:12 +08:00
|
|
|
|
2019-03-10 06:35:06 +08:00
|
|
|
bool haveTarget = true;
|
2016-11-21 23:08:12 +08:00
|
|
|
size_t size;
|
2019-03-10 06:35:06 +08:00
|
|
|
uint32_t tmp;
|
2016-11-21 23:08:12 +08:00
|
|
|
const char *p_blockno = luaL_checklstring(L, 1, &size);
|
2019-04-28 17:05:23 +08:00
|
|
|
if (size != 2)
|
|
|
|
return returnToLuaWithError(L, "Wrong size of blockNo, got %d bytes, expected 2", (int) size);
|
2016-11-21 23:08:12 +08:00
|
|
|
|
|
|
|
const char *p_keytype = luaL_checklstring(L, 2, &size);
|
2019-04-28 17:05:23 +08:00
|
|
|
if (size != 1)
|
|
|
|
return returnToLuaWithError(L, "Wrong size of keyType, got %d bytes, expected 1", (int) size);
|
2016-11-21 23:08:12 +08:00
|
|
|
|
2019-03-10 06:35:06 +08:00
|
|
|
const char *p_key = luaL_checklstring(L, 3, &size);
|
2019-04-28 17:05:23 +08:00
|
|
|
if (size != 12)
|
|
|
|
return returnToLuaWithError(L, "Wrong size of key, got %d bytes, expected 12", (int) size);
|
2019-03-09 15:59:13 +08:00
|
|
|
|
2016-11-21 23:08:12 +08:00
|
|
|
const char *p_trg_blockno = luaL_checklstring(L, 4, &size);
|
2019-04-28 17:05:23 +08:00
|
|
|
if (size != 2)
|
|
|
|
return returnToLuaWithError(L, "Wrong size of trgBlockNo, got %d bytes, expected 2", (int) size);
|
2016-11-21 23:08:12 +08:00
|
|
|
|
|
|
|
const char *p_trg_keytype = luaL_checklstring(L, 5, &size);
|
2019-04-28 17:05:23 +08:00
|
|
|
if (size != 1)
|
|
|
|
return returnToLuaWithError(L, "Wrong size of trgKeyType, got %d bytes, expected 1", (int) size);
|
2016-11-21 23:08:12 +08:00
|
|
|
|
|
|
|
const char *p_trgkey = luaL_checklstring(L, 6, &size);
|
2019-03-10 07:00:59 +08:00
|
|
|
if (size != 12)
|
2019-03-10 06:35:06 +08:00
|
|
|
haveTarget = false;
|
2016-11-21 23:08:12 +08:00
|
|
|
|
2019-03-10 06:35:06 +08:00
|
|
|
const char *p_nonce_file_read = luaL_checklstring(L, 7, &size);
|
2019-04-28 17:05:23 +08:00
|
|
|
if (size != 1)
|
|
|
|
return returnToLuaWithError(L, "Wrong size of nonce_file_read, got %d bytes, expected 1", (int) size);
|
2016-11-21 23:08:12 +08:00
|
|
|
|
2019-03-10 06:35:06 +08:00
|
|
|
const char *p_nonce_file_write = luaL_checklstring(L, 8, &size);
|
2019-04-28 17:05:23 +08:00
|
|
|
if (size != 1)
|
|
|
|
return returnToLuaWithError(L, "Wrong size of nonce_file_write, got %d bytes, expected 1", (int) size);
|
2016-11-21 23:08:12 +08:00
|
|
|
|
2019-03-10 06:35:06 +08:00
|
|
|
const char *p_slow = luaL_checklstring(L, 9, &size);
|
2019-04-28 17:05:23 +08:00
|
|
|
if (size != 1)
|
|
|
|
return returnToLuaWithError(L, "Wrong size of slow, got %d bytes, expected 1", (int) size);
|
2016-11-21 23:08:12 +08:00
|
|
|
|
2019-03-10 06:35:06 +08:00
|
|
|
const char *p_tests = luaL_checklstring(L, 10, &size);
|
2019-04-28 17:05:23 +08:00
|
|
|
if (size != 1)
|
|
|
|
return returnToLuaWithError(L, "Wrong size of tests, got %d bytes, expected 1", (int) size);
|
2019-03-09 15:59:13 +08:00
|
|
|
|
2019-03-10 07:00:59 +08:00
|
|
|
char filename[FILE_PATH_SIZE] = "nonces.bin";
|
2019-03-10 06:35:06 +08:00
|
|
|
const char *p_filename = luaL_checklstring(L, 11, &size);
|
2019-03-10 07:00:59 +08:00
|
|
|
if (size != 0)
|
|
|
|
memcpy(filename, p_filename, FILE_PATH_SIZE - 1);
|
2018-02-08 23:01:05 +08:00
|
|
|
|
2019-03-10 06:35:06 +08:00
|
|
|
uint32_t blockNo = 0, keyType = 0;
|
|
|
|
uint32_t trgBlockNo = 0, trgKeyType = 0;
|
|
|
|
uint32_t slow = 0, tests = 0;
|
|
|
|
uint32_t nonce_file_read = 0, nonce_file_write = 0;
|
2016-11-21 23:08:12 +08:00
|
|
|
sscanf(p_blockno, "%02x", &blockNo);
|
2019-03-10 06:35:06 +08:00
|
|
|
sscanf(p_keytype, "%x", &keyType);
|
2016-11-21 23:08:12 +08:00
|
|
|
sscanf(p_trg_blockno, "%02x", &trgBlockNo);
|
2019-03-10 06:35:06 +08:00
|
|
|
sscanf(p_trg_keytype, "%x", &trgKeyType);
|
|
|
|
sscanf(p_nonce_file_read, "%x", &nonce_file_read);
|
|
|
|
sscanf(p_nonce_file_write, "%x", &nonce_file_write);
|
2016-11-21 23:08:12 +08:00
|
|
|
|
2019-03-10 06:35:06 +08:00
|
|
|
sscanf(p_slow, "%x", &slow);
|
|
|
|
sscanf(p_tests, "%x", &tests);
|
2016-11-21 23:08:12 +08:00
|
|
|
|
2019-03-10 07:00:59 +08:00
|
|
|
uint8_t key[6] = {0, 0, 0, 0, 0, 0};
|
|
|
|
uint8_t trgkey[6] = {0, 0, 0, 0, 0, 0};
|
2019-03-19 05:04:53 +08:00
|
|
|
for (int i = 0; i < 12; i += 2) {
|
2019-03-10 06:35:06 +08:00
|
|
|
sscanf(&p_key[i], "%02x", &tmp);
|
|
|
|
key[i / 2] = tmp & 0xFF;
|
|
|
|
if (haveTarget) {
|
|
|
|
sscanf(&p_trgkey[i], "%02x", &tmp);
|
|
|
|
trgkey[i / 2] = tmp & 0xFF;
|
|
|
|
}
|
|
|
|
}
|
2019-03-09 15:59:13 +08:00
|
|
|
|
2016-11-21 23:08:12 +08:00
|
|
|
uint64_t foundkey = 0;
|
2019-03-10 06:35:06 +08:00
|
|
|
int retval = mfnestedhard(blockNo, keyType, key, trgBlockNo, trgKeyType, haveTarget ? trgkey : NULL, nonce_file_read, nonce_file_write, slow, tests, &foundkey, filename);
|
|
|
|
DropField();
|
2016-11-21 23:08:12 +08:00
|
|
|
|
|
|
|
//Push the key onto the stack
|
|
|
|
uint8_t dest_key[6];
|
|
|
|
num_to_bytes(foundkey, sizeof(dest_key), dest_key);
|
2019-03-09 15:59:13 +08:00
|
|
|
|
2017-12-18 22:43:45 +08:00
|
|
|
//Push the retval on the stack
|
2019-03-10 07:00:59 +08:00
|
|
|
lua_pushinteger(L, retval);
|
2016-11-21 23:08:12 +08:00
|
|
|
lua_pushlstring(L, (const char *) dest_key, sizeof(dest_key));
|
|
|
|
return 2; //Two return values
|
|
|
|
}
|
|
|
|
|
2017-07-30 15:17:48 +08:00
|
|
|
/**
|
|
|
|
* @brief l_validate_prng is a function to test is a nonce is using the weak PRNG
|
2018-02-21 04:20:17 +08:00
|
|
|
* detection = 1 == weak, 0 == hard , -1 = failed
|
2017-07-30 15:17:48 +08:00
|
|
|
* @param L
|
|
|
|
* @return
|
|
|
|
*/
|
2019-03-10 18:20:22 +08:00
|
|
|
static int l_detect_prng(lua_State *L) {
|
2019-03-10 06:35:06 +08:00
|
|
|
int res = detect_classic_prng();
|
|
|
|
lua_pushinteger(L, res);
|
|
|
|
return 1;
|
2017-07-30 15:17:48 +08:00
|
|
|
}
|
2017-11-26 14:08:27 +08:00
|
|
|
/*
|
|
|
|
* @brief l_keygen_algoD is a function to calculate pwd/pack using UID, by algo D
|
|
|
|
* @param L
|
|
|
|
* @return
|
|
|
|
*/
|
2019-03-10 18:20:22 +08:00
|
|
|
static int l_keygen_algoD(lua_State *L) {
|
2019-03-10 06:35:06 +08:00
|
|
|
size_t size;
|
|
|
|
uint32_t tmp;
|
2017-11-26 14:08:27 +08:00
|
|
|
const char *p_uid = luaL_checklstring(L, 1, &size);
|
2019-04-28 17:05:23 +08:00
|
|
|
if (size != 14)
|
|
|
|
return returnToLuaWithError(L, "Wrong size of UID, got %d bytes, expected 14", (int) size);
|
2017-11-26 14:08:27 +08:00
|
|
|
|
2019-03-10 07:00:59 +08:00
|
|
|
uint8_t uid[7] = {0, 0, 0, 0, 0, 0, 0};
|
2017-11-26 14:08:27 +08:00
|
|
|
|
2019-03-10 06:35:06 +08:00
|
|
|
for (int i = 0; i < 14; i += 2) {
|
|
|
|
sscanf(&p_uid[i], "%02x", &tmp);
|
|
|
|
uid[i / 2] = tmp & 0xFF;
|
|
|
|
}
|
2017-11-26 14:08:27 +08:00
|
|
|
|
2019-03-10 06:35:06 +08:00
|
|
|
uint32_t pwd = ul_ev1_pwdgenD(uid);
|
|
|
|
uint16_t pack = ul_ev1_packgenD(uid);
|
2019-03-09 15:59:13 +08:00
|
|
|
|
2019-03-10 06:35:06 +08:00
|
|
|
lua_pushunsigned(L, pwd);
|
|
|
|
lua_pushunsigned(L, pack);
|
|
|
|
return 2;
|
2017-11-26 14:08:27 +08:00
|
|
|
}
|
2017-07-30 15:17:48 +08:00
|
|
|
|
2019-04-04 01:48:00 +08:00
|
|
|
/*
|
2019-04-07 01:09:01 +08:00
|
|
|
Read T55Xx block.
|
2019-04-04 01:48:00 +08:00
|
|
|
param1 uint8_t block
|
|
|
|
param2 bool page1
|
|
|
|
param3 bool override
|
|
|
|
param4 uint32_t password
|
|
|
|
*/
|
|
|
|
static int l_T55xx_readblock(lua_State *L) {
|
2019-04-07 01:09:01 +08:00
|
|
|
|
2019-04-04 01:48:00 +08:00
|
|
|
//Check number of arguments
|
|
|
|
int n = lua_gettop(L);
|
2019-04-28 17:05:23 +08:00
|
|
|
if (n != 4)
|
2019-04-07 01:09:01 +08:00
|
|
|
return returnToLuaWithError(L, "Wrong number of arguments, got %d bytes, expected 4", n);
|
|
|
|
|
2019-04-04 01:48:00 +08:00
|
|
|
uint32_t block, usepage1, override, password;
|
|
|
|
bool usepwd;
|
|
|
|
size_t size;
|
2019-04-07 01:09:01 +08:00
|
|
|
|
2019-04-04 01:48:00 +08:00
|
|
|
const char *p_blockno = luaL_checklstring(L, 1, &size);
|
2019-04-28 17:05:23 +08:00
|
|
|
if (size < 1 || size > 2)
|
|
|
|
return returnToLuaWithError(L, "Wrong size of blockNo, got %d, expected 1 or 2", (int) size);
|
2019-04-28 17:09:46 +08:00
|
|
|
|
2019-04-04 01:48:00 +08:00
|
|
|
sscanf(p_blockno, "%x", &block);
|
2019-04-07 01:09:01 +08:00
|
|
|
|
2019-04-04 01:48:00 +08:00
|
|
|
const char *p_usepage1 = luaL_checklstring(L, 2, &size);
|
2019-04-28 17:05:23 +08:00
|
|
|
if (size != 1)
|
|
|
|
return returnToLuaWithError(L, "Wrong size of usePage1, got %d, expected 1", (int) size);
|
2019-04-28 17:09:46 +08:00
|
|
|
|
2019-04-04 01:48:00 +08:00
|
|
|
sscanf(p_usepage1, "%x", &usepage1);
|
2019-04-07 01:09:01 +08:00
|
|
|
|
2019-04-04 01:48:00 +08:00
|
|
|
const char *p_override = luaL_checklstring(L, 3, &size);
|
2019-04-28 17:05:23 +08:00
|
|
|
if (size != 1)
|
|
|
|
return returnToLuaWithError(L, "Wrong size of override, got %d, expected 1", (int) size);
|
2019-04-28 17:09:46 +08:00
|
|
|
|
2019-04-04 01:48:00 +08:00
|
|
|
sscanf(p_override, "%x", &override);
|
2019-04-07 01:09:01 +08:00
|
|
|
|
2019-04-04 01:48:00 +08:00
|
|
|
const char *p_pwd = luaL_checklstring(L, 4, &size);
|
2019-04-07 01:09:01 +08:00
|
|
|
if (size == 0) {
|
2019-04-04 01:48:00 +08:00
|
|
|
usepwd = false;
|
|
|
|
} else {
|
|
|
|
|
2019-04-28 17:05:23 +08:00
|
|
|
if (size != 8)
|
|
|
|
return returnToLuaWithError(L, "Wrong size of pwd, got %d , expected 8", (int) size);
|
2019-04-28 17:09:46 +08:00
|
|
|
|
2019-04-04 01:48:00 +08:00
|
|
|
sscanf(p_pwd, "%08x", &password);
|
|
|
|
usepwd = true;
|
2019-04-07 01:09:01 +08:00
|
|
|
}
|
|
|
|
|
2019-04-04 01:48:00 +08:00
|
|
|
//Password mode
|
|
|
|
if (usepwd) {
|
|
|
|
// try reading the config block and verify that PWD bit is set before doing this!
|
|
|
|
if (!override) {
|
|
|
|
|
2019-10-10 04:32:38 +08:00
|
|
|
if (!AcquireData(T55x7_PAGE0, T55x7_CONFIGURATION_BLOCK, false, 0, 0)) {
|
2019-04-04 01:48:00 +08:00
|
|
|
return returnToLuaWithError(L, "Failed to read config block");
|
|
|
|
}
|
|
|
|
|
2019-09-19 16:54:34 +08:00
|
|
|
if (!tryDetectModulation(0, true)) { // Default to prev. behaviour (default dl mode and print config)
|
2019-04-04 01:48:00 +08:00
|
|
|
PrintAndLogEx(NORMAL, "Safety Check: Could not detect if PWD bit is set in config block. Exits.");
|
|
|
|
return 0;
|
|
|
|
} else {
|
|
|
|
PrintAndLogEx(NORMAL, "Safety Check: PWD bit is NOT set in config block. Reading without password...");
|
|
|
|
usepwd = false;
|
|
|
|
usepage1 = false;
|
|
|
|
}
|
|
|
|
} else {
|
2019-09-14 23:44:58 +08:00
|
|
|
PrintAndLogEx(NORMAL, "Safety Check Overridden - proceeding despite risk");
|
2019-04-04 01:48:00 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-10-10 04:32:38 +08:00
|
|
|
if (!AcquireData(usepage1, block, usepwd, password, 0)) {
|
2019-09-14 23:44:58 +08:00
|
|
|
return returnToLuaWithError(L, "Failed to acquire data from card");
|
2019-04-04 01:48:00 +08:00
|
|
|
}
|
2019-04-07 01:09:01 +08:00
|
|
|
|
2019-04-04 01:48:00 +08:00
|
|
|
if (!DecodeT55xxBlock()) {
|
|
|
|
return returnToLuaWithError(L, "Failed to decode signal");
|
|
|
|
}
|
2019-04-07 01:09:01 +08:00
|
|
|
|
2019-04-04 01:48:00 +08:00
|
|
|
uint32_t blockData = 0;
|
|
|
|
if (GetT55xxBlockData(&blockData) == false) {
|
|
|
|
return returnToLuaWithError(L, "Failed to get actual data");
|
|
|
|
}
|
2019-04-07 01:09:01 +08:00
|
|
|
|
2019-04-04 01:48:00 +08:00
|
|
|
lua_pushunsigned(L, blockData);
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
// arg 1 = pwd
|
|
|
|
// arg 2 = use GB
|
|
|
|
static int l_T55xx_detect(lua_State *L) {
|
|
|
|
bool useGB = false, usepwd = false, isok;
|
2019-04-05 13:39:07 +08:00
|
|
|
uint32_t gb, password = 0;
|
2019-04-04 01:48:00 +08:00
|
|
|
size_t size;
|
2019-04-07 01:09:01 +08:00
|
|
|
|
2019-04-04 01:48:00 +08:00
|
|
|
//Check number of arguments
|
|
|
|
int n = lua_gettop(L);
|
|
|
|
|
|
|
|
switch (n) {
|
|
|
|
case 2: {
|
|
|
|
const char *p_gb = luaL_checklstring(L, 2, &size);
|
2019-04-28 17:05:23 +08:00
|
|
|
if (size != 1)
|
|
|
|
return returnToLuaWithError(L, "Wrong size of useGB, got %d , expected 1", (int) size);
|
2019-04-28 17:09:46 +08:00
|
|
|
|
2019-04-04 01:48:00 +08:00
|
|
|
sscanf(p_gb, "%u", &gb);
|
2019-04-07 01:09:01 +08:00
|
|
|
useGB = (gb) ? true : false;
|
|
|
|
printf("p_gb size %zu | %c \n", size, useGB ? 'Y' : 'N');
|
2019-04-04 01:48:00 +08:00
|
|
|
}
|
|
|
|
case 1: {
|
|
|
|
const char *p_pwd = luaL_checklstring(L, 1, &size);
|
2019-04-07 01:09:01 +08:00
|
|
|
if (size == 0) {
|
2019-04-04 01:48:00 +08:00
|
|
|
usepwd = false;
|
|
|
|
} else {
|
2019-04-07 01:09:01 +08:00
|
|
|
|
2019-04-28 17:05:23 +08:00
|
|
|
if (size != 8)
|
|
|
|
return returnToLuaWithError(L, "Wrong size of pwd, got %d , expected 8", (int) size);
|
2019-04-28 17:09:46 +08:00
|
|
|
|
2019-04-04 01:48:00 +08:00
|
|
|
sscanf(p_pwd, "%08x", &password);
|
|
|
|
usepwd = true;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
default :
|
|
|
|
break;
|
|
|
|
}
|
2019-04-07 01:09:01 +08:00
|
|
|
|
2019-04-04 01:48:00 +08:00
|
|
|
if (!useGB) {
|
2019-04-07 01:09:01 +08:00
|
|
|
|
2019-10-10 04:32:38 +08:00
|
|
|
isok = AcquireData(T55x7_PAGE0, T55x7_CONFIGURATION_BLOCK, usepwd, password, 0);
|
2019-04-07 01:09:01 +08:00
|
|
|
if (isok == false) {
|
2019-09-14 23:44:58 +08:00
|
|
|
return returnToLuaWithError(L, "Failed to acquire LF signal data");
|
2019-04-04 01:48:00 +08:00
|
|
|
}
|
|
|
|
}
|
2019-04-07 01:09:01 +08:00
|
|
|
|
2019-09-19 16:54:34 +08:00
|
|
|
isok = tryDetectModulation(0, true); // Default to prev. behaviour (default dl mode and print config)
|
2019-04-07 01:09:01 +08:00
|
|
|
if (isok == false) {
|
2019-04-28 17:05:23 +08:00
|
|
|
return returnToLuaWithError(L, "Could not detect modulation automatically. Try setting it manually with \'lf t55xx config\'");
|
2019-04-04 01:48:00 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
lua_pushinteger(L, isok);
|
|
|
|
lua_pushstring(L, "Success");
|
|
|
|
return 2;
|
|
|
|
}
|
|
|
|
|
2019-04-29 20:19:41 +08:00
|
|
|
//
|
|
|
|
static int l_ndefparse(lua_State *L) {
|
|
|
|
|
2019-06-08 00:41:39 +08:00
|
|
|
size_t size;
|
2019-04-29 20:19:41 +08:00
|
|
|
|
|
|
|
//Check number of arguments
|
|
|
|
int n = lua_gettop(L);
|
|
|
|
if (n != 3) {
|
|
|
|
return returnToLuaWithError(L, "You need to supply three parameters");
|
|
|
|
}
|
|
|
|
|
|
|
|
size_t datalen = luaL_checknumber(L, 1);
|
|
|
|
bool verbose = luaL_checknumber(L, 2);
|
|
|
|
|
|
|
|
uint8_t *data = calloc(datalen, sizeof(uint8_t));
|
|
|
|
if (data == 0) {
|
|
|
|
return returnToLuaWithError(L, "Allocating memory failed");
|
|
|
|
}
|
2019-04-30 04:41:28 +08:00
|
|
|
|
2019-04-29 20:19:41 +08:00
|
|
|
// data
|
|
|
|
const char *p_data = luaL_checklstring(L, 3, &size);
|
|
|
|
if (size) {
|
2019-04-30 04:41:28 +08:00
|
|
|
if (size > (datalen << 1))
|
2019-04-29 20:19:41 +08:00
|
|
|
size = (datalen << 1);
|
|
|
|
|
|
|
|
uint32_t tmp;
|
|
|
|
for (int i = 0; i < size; i += 2) {
|
|
|
|
sscanf(&p_data[i], "%02x", &tmp);
|
|
|
|
data[i >> 1] = tmp & 0xFF;
|
|
|
|
}
|
|
|
|
}
|
2019-04-30 04:41:28 +08:00
|
|
|
|
2019-04-29 20:19:41 +08:00
|
|
|
int res = NDEFDecodeAndPrint(data, datalen, verbose);
|
|
|
|
lua_pushinteger(L, res);
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2019-10-18 04:28:49 +08:00
|
|
|
static int l_remark(lua_State *L) {
|
|
|
|
//Check number of arguments
|
|
|
|
int n = lua_gettop(L);
|
|
|
|
if (n != 1) {
|
|
|
|
return returnToLuaWithError(L, "Only one string allowed");
|
|
|
|
}
|
|
|
|
|
|
|
|
size_t size;
|
|
|
|
// data
|
|
|
|
const char *s = luaL_checklstring(L, 1, &size);
|
|
|
|
|
|
|
|
int res = CmdRem(s);
|
|
|
|
lua_pushinteger(L, res);
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2019-08-30 20:53:53 +08:00
|
|
|
static int l_searchfile(lua_State *L) {
|
|
|
|
//Check number of arguments
|
|
|
|
int n = lua_gettop(L);
|
|
|
|
if (n != 2) {
|
|
|
|
return returnToLuaWithError(L, "Only filename and extension");
|
|
|
|
}
|
2019-09-05 06:48:48 +08:00
|
|
|
|
2019-08-30 20:53:53 +08:00
|
|
|
size_t size;
|
2019-09-05 06:48:48 +08:00
|
|
|
// data
|
2019-08-30 20:53:53 +08:00
|
|
|
const char *filename = luaL_checklstring(L, 1, &size);
|
2019-09-05 06:48:48 +08:00
|
|
|
if (size == 0)
|
2019-08-30 20:53:53 +08:00
|
|
|
return returnToLuaWithError(L, "Must specify filename");
|
2019-09-05 06:48:48 +08:00
|
|
|
|
|
|
|
const char *suffix = luaL_checklstring(L, 2, &size);
|
2019-08-30 20:53:53 +08:00
|
|
|
char *path;
|
|
|
|
int res = searchFile(&path, "", filename, suffix, false);
|
2019-09-05 06:48:48 +08:00
|
|
|
if (res != PM3_SUCCESS) {
|
2019-08-30 20:53:53 +08:00
|
|
|
return returnToLuaWithError(L, "Failed to find file");
|
|
|
|
}
|
2019-09-05 06:48:48 +08:00
|
|
|
|
2019-08-30 20:53:53 +08:00
|
|
|
lua_pushstring(L, path);
|
2019-10-06 07:18:04 +08:00
|
|
|
free(path);
|
2019-08-30 20:53:53 +08:00
|
|
|
return 1;
|
|
|
|
}
|
2019-04-29 20:19:41 +08:00
|
|
|
|
2013-09-29 04:07:28 +08:00
|
|
|
/**
|
|
|
|
* @brief Sets the lua path to include "./lualibs/?.lua", in order for a script to be
|
|
|
|
* able to do "require('foobar')" if foobar.lua is within lualibs folder.
|
|
|
|
* Taken from http://stackoverflow.com/questions/4125971/setting-the-global-lua-path-variable-from-c-c
|
|
|
|
* @param L
|
|
|
|
* @param path
|
|
|
|
* @return
|
|
|
|
*/
|
2019-04-11 06:10:21 +08:00
|
|
|
static int setLuaPath(lua_State *L, const char *path) {
|
2019-03-10 07:00:59 +08:00
|
|
|
lua_getglobal(L, "package");
|
|
|
|
lua_getfield(L, -1, "path"); // get field "path" from table at top of stack (-1)
|
|
|
|
const char *cur_path = lua_tostring(L, -1); // grab path string from top of stack
|
|
|
|
int requiredLength = strlen(cur_path) + strlen(path) + 10; //A few bytes too many, whatever we can afford it
|
|
|
|
char *buf = calloc(requiredLength, sizeof(char));
|
2013-09-29 04:07:28 +08:00
|
|
|
snprintf(buf, requiredLength, "%s;%s", cur_path, path);
|
2019-03-10 07:00:59 +08:00
|
|
|
lua_pop(L, 1); // get rid of the string on the stack we just pushed on line 5
|
|
|
|
lua_pushstring(L, buf); // push the new one
|
|
|
|
lua_setfield(L, -2, "path"); // set the field "path" in table at -2 with value at top of stack
|
|
|
|
lua_pop(L, 1); // get rid of package table from top of stack
|
2019-03-10 06:35:06 +08:00
|
|
|
free(buf);
|
|
|
|
return 0; // all done!
|
2013-09-29 04:07:28 +08:00
|
|
|
}
|
|
|
|
|
2019-03-10 18:20:22 +08:00
|
|
|
int set_pm3_libraries(lua_State *L) {
|
2013-05-25 05:06:57 +08:00
|
|
|
static const luaL_Reg libs[] = {
|
2019-04-28 17:05:23 +08:00
|
|
|
{"SendCommandOLD", l_SendCommandOLD},
|
|
|
|
{"SendCommandMIX", l_SendCommandMIX},
|
2019-04-28 22:31:49 +08:00
|
|
|
{"SendCommandNG", l_SendCommandNG},
|
2019-03-10 06:35:06 +08:00
|
|
|
{"GetFromBigBuf", l_GetFromBigBuf},
|
|
|
|
{"GetFromFlashMem", l_GetFromFlashMem},
|
2019-11-03 02:07:36 +08:00
|
|
|
{"GetFromFlashMemSpiffs", l_GetFromFlashMemSpiffs},
|
2013-05-25 05:06:57 +08:00
|
|
|
{"WaitForResponseTimeout", l_WaitForResponseTimeout},
|
2019-03-10 06:35:06 +08:00
|
|
|
{"mfDarkside", l_mfDarkside},
|
2013-06-07 17:24:25 +08:00
|
|
|
{"foobar", l_foobar},
|
2019-07-11 19:01:34 +08:00
|
|
|
{"kbd_enter_pressed", l_kbd_enter_pressed},
|
2013-06-07 17:24:25 +08:00
|
|
|
{"clearCommandBuffer", l_clearCommandBuffer},
|
2019-03-10 06:35:06 +08:00
|
|
|
{"console", l_CmdConsole},
|
|
|
|
{"iso15693_crc", l_iso15693_crc},
|
|
|
|
{"iso14443b_crc", l_iso14443b_crc},
|
|
|
|
{"aes128_decrypt", l_aes128decrypt_cbc},
|
|
|
|
{"aes128_decrypt_ecb", l_aes128decrypt_ecb},
|
|
|
|
{"aes128_encrypt", l_aes128encrypt_cbc},
|
|
|
|
{"aes128_encrypt_ecb", l_aes128encrypt_ecb},
|
|
|
|
{"crc8legic", l_crc8legic},
|
|
|
|
{"crc16", l_crc16},
|
|
|
|
{"crc64", l_crc64},
|
|
|
|
{"crc64_ecma182", l_crc64_ecma182},
|
|
|
|
{"sha1", l_sha1},
|
|
|
|
{"reveng_models", l_reveng_models},
|
2019-04-04 01:48:00 +08:00
|
|
|
{"reveng_runmodel", l_reveng_runmodel},
|
2019-03-10 06:35:06 +08:00
|
|
|
{"hardnested", l_hardnested},
|
|
|
|
{"detect_prng", l_detect_prng},
|
|
|
|
// {"keygen.algoA", l_keygen_algoA},
|
|
|
|
// {"keygen.algoB", l_keygen_algoB},
|
|
|
|
// {"keygen.algoC", l_keygen_algoC},
|
|
|
|
{"keygen_algo_d", l_keygen_algoD},
|
2019-04-04 01:48:00 +08:00
|
|
|
{"t55xx_readblock", l_T55xx_readblock},
|
|
|
|
{"t55xx_detect", l_T55xx_detect},
|
2019-04-30 15:48:08 +08:00
|
|
|
{"ndefparse", l_ndefparse},
|
|
|
|
{"fast_push_mode", l_fast_push_mode},
|
2019-08-30 20:53:53 +08:00
|
|
|
{"search_file", l_searchfile},
|
2019-10-18 04:28:49 +08:00
|
|
|
{"rem", l_remark},
|
2013-05-25 05:06:57 +08:00
|
|
|
{NULL, NULL}
|
|
|
|
};
|
|
|
|
|
|
|
|
lua_pushglobaltable(L);
|
|
|
|
// Core library is in this table. Contains '
|
|
|
|
//this is 'pm3' table
|
|
|
|
lua_newtable(L);
|
|
|
|
|
|
|
|
//Put the function into the hash table.
|
|
|
|
for (int i = 0; libs[i].name; i++) {
|
|
|
|
lua_pushcfunction(L, libs[i].func);
|
|
|
|
lua_setfield(L, -2, libs[i].name);//set the name, pop stack
|
|
|
|
}
|
|
|
|
//Name of 'core'
|
|
|
|
lua_setfield(L, -2, "core");
|
|
|
|
|
|
|
|
//-- remove the global environment table from the stack
|
|
|
|
lua_pop(L, 1);
|
2013-09-29 04:07:28 +08:00
|
|
|
|
2019-03-10 06:35:06 +08:00
|
|
|
//--add to the LUA_PATH (package.path in lua)
|
2019-08-22 05:50:41 +08:00
|
|
|
// so we can load scripts from various places:
|
2019-08-22 23:44:08 +08:00
|
|
|
const char *exec_path = get_my_executable_directory();
|
|
|
|
if (exec_path != NULL) {
|
2019-08-22 05:50:41 +08:00
|
|
|
// from the ./luascripts/ directory
|
2019-08-24 04:07:45 +08:00
|
|
|
char scripts_path[strlen(exec_path) + strlen(LUA_SCRIPTS_SUBDIR) + strlen(LUA_LIBRARIES_WILDCARD) + 1];
|
2019-08-22 23:44:08 +08:00
|
|
|
strcpy(scripts_path, exec_path);
|
2019-08-24 04:07:45 +08:00
|
|
|
strcat(scripts_path, LUA_SCRIPTS_SUBDIR);
|
2019-08-22 05:50:41 +08:00
|
|
|
strcat(scripts_path, LUA_LIBRARIES_WILDCARD);
|
|
|
|
setLuaPath(L, scripts_path);
|
|
|
|
// from the ./lualib/ directory
|
2019-08-24 04:07:45 +08:00
|
|
|
char libraries_path[strlen(exec_path) + strlen(LUA_LIBRARIES_SUBDIR) + strlen(LUA_LIBRARIES_WILDCARD) + 1];
|
2019-08-22 23:44:08 +08:00
|
|
|
strcpy(libraries_path, exec_path);
|
2019-08-24 04:07:45 +08:00
|
|
|
strcat(libraries_path, LUA_LIBRARIES_SUBDIR);
|
2019-08-22 05:50:41 +08:00
|
|
|
strcat(libraries_path, LUA_LIBRARIES_WILDCARD);
|
|
|
|
setLuaPath(L, libraries_path);
|
|
|
|
}
|
2019-09-13 02:13:01 +08:00
|
|
|
const char *user_path = get_my_user_directory();
|
2019-08-22 23:44:08 +08:00
|
|
|
if (user_path != NULL) {
|
2019-08-31 03:36:10 +08:00
|
|
|
// from the $HOME/.proxmark3/luascripts/ directory
|
2019-08-24 04:07:45 +08:00
|
|
|
char scripts_path[strlen(user_path) + strlen(PM3_USER_DIRECTORY) + strlen(LUA_SCRIPTS_SUBDIR) + strlen(LUA_LIBRARIES_WILDCARD) + 1];
|
2019-08-22 23:44:08 +08:00
|
|
|
strcpy(scripts_path, user_path);
|
2019-08-23 01:36:20 +08:00
|
|
|
strcat(scripts_path, PM3_USER_DIRECTORY);
|
2019-08-24 04:07:45 +08:00
|
|
|
strcat(scripts_path, LUA_SCRIPTS_SUBDIR);
|
2019-08-22 05:50:41 +08:00
|
|
|
strcat(scripts_path, LUA_LIBRARIES_WILDCARD);
|
|
|
|
setLuaPath(L, scripts_path);
|
2019-08-22 23:44:08 +08:00
|
|
|
|
2019-08-31 03:36:10 +08:00
|
|
|
// from the $HOME/.proxmark3/lualib/ directory
|
2019-08-24 04:07:45 +08:00
|
|
|
char libraries_path[strlen(user_path) + strlen(PM3_USER_DIRECTORY) + strlen(LUA_LIBRARIES_SUBDIR) + strlen(LUA_LIBRARIES_WILDCARD) + 1];
|
2019-08-22 23:44:08 +08:00
|
|
|
strcpy(libraries_path, user_path);
|
2019-08-23 01:36:20 +08:00
|
|
|
strcat(libraries_path, PM3_USER_DIRECTORY);
|
2019-08-24 04:07:45 +08:00
|
|
|
strcat(libraries_path, LUA_LIBRARIES_SUBDIR);
|
2019-08-22 05:50:41 +08:00
|
|
|
strcat(libraries_path, LUA_LIBRARIES_WILDCARD);
|
|
|
|
setLuaPath(L, libraries_path);
|
|
|
|
}
|
2019-08-22 23:44:08 +08:00
|
|
|
|
2019-08-31 03:36:10 +08:00
|
|
|
if (exec_path != NULL) {
|
|
|
|
// from the $PREFIX/share/proxmark3/luascripts/ directory
|
|
|
|
char scripts_path[strlen(exec_path) + strlen(PM3_SHARE_RELPATH) + strlen(LUA_SCRIPTS_SUBDIR) + strlen(LUA_LIBRARIES_WILDCARD) + 1];
|
|
|
|
strcpy(scripts_path, exec_path);
|
|
|
|
strcat(scripts_path, PM3_SHARE_RELPATH);
|
2019-08-24 04:07:45 +08:00
|
|
|
strcat(scripts_path, LUA_SCRIPTS_SUBDIR);
|
2019-08-22 05:50:41 +08:00
|
|
|
strcat(scripts_path, LUA_LIBRARIES_WILDCARD);
|
|
|
|
setLuaPath(L, scripts_path);
|
2019-08-31 03:36:10 +08:00
|
|
|
// from the $PREFIX/share/proxmark3/lualib/ directory
|
|
|
|
char libraries_path[strlen(exec_path) + strlen(PM3_SHARE_RELPATH) + strlen(LUA_LIBRARIES_SUBDIR) + strlen(LUA_LIBRARIES_WILDCARD) + 1];
|
|
|
|
strcpy(libraries_path, exec_path);
|
|
|
|
strcat(libraries_path, PM3_SHARE_RELPATH);
|
2019-08-24 04:07:45 +08:00
|
|
|
strcat(libraries_path, LUA_LIBRARIES_SUBDIR);
|
2019-08-22 05:50:41 +08:00
|
|
|
strcat(libraries_path, LUA_LIBRARIES_WILDCARD);
|
|
|
|
setLuaPath(L, libraries_path);
|
|
|
|
}
|
2019-08-22 06:32:15 +08:00
|
|
|
return 1;
|
2019-03-12 07:12:26 +08:00
|
|
|
}
|