mirror of
https://github.com/RfidResearchGroup/proxmark3.git
synced 2024-11-12 12:41:49 +08:00
408 lines
14 KiB
C
408 lines
14 KiB
C
//-----------------------------------------------------------------------------
|
|
// by marshmellow
|
|
// by danshuk
|
|
//
|
|
// This code is licensed to you under the terms of the GNU GPL, version 2 or,
|
|
// at your option, any later version. See the LICENSE.txt file for the text of
|
|
// the license.
|
|
//-----------------------------------------------------------------------------
|
|
// Low frequency PAC/Stanley tag commands
|
|
// NRZ, RF/32, 128 bits long
|
|
//-----------------------------------------------------------------------------
|
|
#include "cmdlfpac.h"
|
|
|
|
#include <ctype.h> // tolower
|
|
#include <string.h>
|
|
#include <stdlib.h>
|
|
#include "commonutil.h" // ARRAYLEN
|
|
#include "common.h"
|
|
#include "cmdparser.h" // command_t
|
|
#include "comms.h"
|
|
#include "ui.h"
|
|
#include "cmddata.h"
|
|
#include "cmdlf.h"
|
|
#include "lfdemod.h" // preamble test
|
|
#include "protocols.h" // t55xx defines
|
|
#include "cmdlft55xx.h" // clone
|
|
#include "parity.h"
|
|
#include "cmdlfem4x05.h" //
|
|
#include "cliparser.h"
|
|
|
|
static int CmdHelp(const char *Cmd);
|
|
|
|
// PAC_8byte format: preamble (8 mark/idle bits), ascii STX (02), ascii '2' (32), ascii '0' (30), ascii bytes 0..7 (cardid), then xor checksum of cardid bytes
|
|
// all bytes following 8 bit preamble are one start bit (0), 7 data bits (lsb first), odd parity bit, and one stop bit (1)
|
|
static int pac_buf_to_cardid(uint8_t *src, const size_t src_size, uint8_t *dst, const size_t dst_size) {
|
|
const size_t byteLength = 10; // start bit, 7 data bits, parity bit, stop bit
|
|
const size_t startIndex = 8 + (3 * byteLength) + 1; // skip 8 bits preamble, STX, '2', '0', and first start bit
|
|
const size_t dataLength = 9;
|
|
|
|
if (startIndex + byteLength * (dataLength - 1) > src_size) {
|
|
PrintAndLogEx(DEBUG, "DEBUG: Error - PAC: Source buffer too small");
|
|
return PM3_EOVFLOW;
|
|
}
|
|
if (dataLength > dst_size) {
|
|
PrintAndLogEx(DEBUG, "DEBUG: Error - PAC: Destination buffer too small");
|
|
return PM3_EOVFLOW;
|
|
}
|
|
|
|
uint8_t checksum = 0;
|
|
for (size_t idx = 0; idx < dataLength; idx++) {
|
|
uint8_t byte = (uint8_t)bytebits_to_byteLSBF(src + startIndex + (byteLength * idx), 8);
|
|
dst[idx] = byte & 0x7F; // discard the parity bit
|
|
if (oddparity8(dst[idx]) != (byte & 0x80) >> 7) {
|
|
PrintAndLogEx(DEBUG, "DEBUG: Error - PAC: Parity check failed");
|
|
return PM3_ESOFT;
|
|
}
|
|
if (idx < dataLength - 1) checksum ^= byte;
|
|
}
|
|
if (dst[dataLength - 1] != checksum) {
|
|
PrintAndLogEx(DEBUG, "DEBUG: Error - PAC: Bad checksum - expected: %02X, actual: %02X", dst[dataLength - 1], checksum);
|
|
return PM3_ESOFT;
|
|
}
|
|
|
|
// overwrite checksum byte with null terminator
|
|
dst[dataLength - 1] = 0;
|
|
|
|
return PM3_SUCCESS;
|
|
}
|
|
|
|
// convert a 16 byte array of raw demod data (FF204990XX...) to 8 bytes of PAC_8byte ID
|
|
// performs no parity or checksum validation
|
|
static void pac_raw_to_cardid(const uint8_t *src, uint8_t *dst) {
|
|
for (int i = 4; i < 12; i++) {
|
|
uint8_t shift = 7 - (i + 3) % 4 * 2;
|
|
size_t index = i + (i - 1) / 4;
|
|
|
|
dst[i - 4] = reflect8((((src[index] << 8) | (src[index + 1])) >> shift) & 0xFE);
|
|
}
|
|
}
|
|
|
|
// convert 8 bytes of PAC_8byte ID to 16 byte array of raw data (FF204990XX...)
|
|
static void pac_cardid_to_raw(const char *src, uint8_t *dst) {
|
|
uint8_t idbytes[10];
|
|
|
|
// prepend PAC_8byte card type "20"
|
|
idbytes[0] = '2';
|
|
idbytes[1] = '0';
|
|
for (size_t i = 0; i < 8; i++)
|
|
idbytes[i + 2] = toupper(src[i]);
|
|
|
|
// initialise array with start and stop bits
|
|
for (size_t i = 0; i < 16; i++)
|
|
dst[i] = 0x40 >> (i + 3) % 5 * 2;
|
|
|
|
dst[0] = 0xFF; // mark + stop
|
|
dst[1] = 0x20; // start + reflect8(STX)
|
|
|
|
uint8_t checksum = 0;
|
|
for (size_t i = 2; i < 13; i++) {
|
|
uint8_t shift = 7 - (i + 3) % 4 * 2;
|
|
uint8_t index = i + (i - 1) / 4;
|
|
|
|
uint16_t pattern;
|
|
if (i < 12) {
|
|
pattern = reflect8(idbytes[i - 2]);
|
|
pattern |= oddparity8(pattern);
|
|
if (i > 3) checksum ^= idbytes[i - 2];
|
|
} else {
|
|
pattern = (reflect8(checksum) & 0xFE) | (oddparity8(checksum));
|
|
}
|
|
pattern <<= shift;
|
|
|
|
dst[index] |= pattern >> 8 & 0xFF;
|
|
dst[index + 1] |= pattern & 0xFF;
|
|
}
|
|
}
|
|
|
|
//see NRZDemod for what args are accepted
|
|
int demodPac(bool verbose) {
|
|
(void) verbose; // unused so far
|
|
//NRZ
|
|
if (NRZrawDemod(0, 0, 100, false) != PM3_SUCCESS) {
|
|
PrintAndLogEx(DEBUG, "DEBUG: Error - PAC: NRZ Demod failed");
|
|
return PM3_ESOFT;
|
|
}
|
|
size_t size = DemodBufferLen;
|
|
int ans = detectPac(DemodBuffer, &size);
|
|
if (ans < 0) {
|
|
if (ans == -1)
|
|
PrintAndLogEx(DEBUG, "DEBUG: Error - PAC: too few bits found");
|
|
else if (ans == -2)
|
|
PrintAndLogEx(DEBUG, "DEBUG: Error - PAC: preamble not found");
|
|
else if (ans == -3)
|
|
PrintAndLogEx(DEBUG, "DEBUG: Error - PAC: Size not correct: %zu", size);
|
|
else
|
|
PrintAndLogEx(DEBUG, "DEBUG: Error - PAC: ans: %d", ans);
|
|
|
|
return PM3_ESOFT;
|
|
}
|
|
setDemodBuff(DemodBuffer, 128, ans);
|
|
setClockGrid(g_DemodClock, g_DemodStartIdx + (ans * g_DemodClock));
|
|
|
|
//got a good demod
|
|
uint32_t raw1 = bytebits_to_byte(DemodBuffer, 32);
|
|
uint32_t raw2 = bytebits_to_byte(DemodBuffer + 32, 32);
|
|
uint32_t raw3 = bytebits_to_byte(DemodBuffer + 64, 32);
|
|
uint32_t raw4 = bytebits_to_byte(DemodBuffer + 96, 32);
|
|
|
|
const size_t idLen = 9; // 8 bytes + null terminator
|
|
uint8_t cardid[idLen];
|
|
int retval = pac_buf_to_cardid(DemodBuffer, DemodBufferLen, cardid, sizeof(cardid));
|
|
|
|
if (retval == PM3_SUCCESS)
|
|
PrintAndLogEx(SUCCESS, "PAC/Stanley - Card: " _GREEN_("%s") ", Raw: %08X%08X%08X%08X", cardid, raw1, raw2, raw3, raw4);
|
|
|
|
return retval;
|
|
}
|
|
|
|
static int CmdPacDemod(const char *Cmd) {
|
|
CLIParserContext *ctx;
|
|
CLIParserInit(&ctx, "lf pac demod",
|
|
"Try to find PAC/Stanley preamble, if found decode / descramble data",
|
|
"lf pac demod"
|
|
);
|
|
|
|
void *argtable[] = {
|
|
arg_param_begin,
|
|
arg_param_end
|
|
};
|
|
CLIExecWithReturn(ctx, Cmd, argtable, true);
|
|
CLIParserFree(ctx);
|
|
return demodPac(true);
|
|
}
|
|
|
|
static int CmdPacReader(const char *Cmd) {
|
|
|
|
CLIParserContext *ctx;
|
|
CLIParserInit(&ctx, "lf pac reader",
|
|
"read a PAC/Stanley tag",
|
|
"lf pac reader -@ -> continuous reader mode"
|
|
);
|
|
|
|
void *argtable[] = {
|
|
arg_param_begin,
|
|
arg_lit0("@", NULL, "optional - continuous reader mode"),
|
|
arg_param_end
|
|
};
|
|
CLIExecWithReturn(ctx, Cmd, argtable, true);
|
|
bool cm = arg_get_lit(ctx, 1);
|
|
CLIParserFree(ctx);
|
|
|
|
if (cm) {
|
|
PrintAndLogEx(INFO, "Press " _GREEN_("<Enter>") " to exit");
|
|
}
|
|
|
|
do {
|
|
lf_read(false, 4096 * 2 + 20);
|
|
demodPac(!cm);
|
|
} while (cm && !kbd_enter_pressed());
|
|
|
|
return PM3_SUCCESS;
|
|
}
|
|
|
|
static int CmdPacClone(const char *Cmd) {
|
|
|
|
CLIParserContext *ctx;
|
|
CLIParserInit(&ctx, "lf pac clone",
|
|
"clone a PAC/Stanley tag to a T55x7, Q5/T5555 or EM4305/4469 tag.",
|
|
"lf pac clone --cn CD4F5552\n"
|
|
"lf pac clone --cn CD4F5552 --q5 -> encode for Q5/T5555 tag\n"
|
|
"lf pac clone --cn CD4F5552 --em -> encode for EM4305/4469\n"
|
|
"lf pac clone --raw FF2049906D8511C593155B56D5B2649F"
|
|
);
|
|
|
|
void *argtable[] = {
|
|
arg_param_begin,
|
|
arg_str0(NULL, "cn", "<dec>", "8 byte PAC/Stanley card ID"),
|
|
arg_str0("r", "raw", "<hex>", "raw hex data. 16 bytes max"),
|
|
arg_lit0(NULL, "q5", "optional - specify writing to Q5/T5555 tag"),
|
|
arg_lit0(NULL, "em", "optional - specify writing to EM4305/4469 tag"),
|
|
arg_param_end
|
|
};
|
|
CLIExecWithReturn(ctx, Cmd, argtable, false);
|
|
|
|
uint8_t cnstr[9];
|
|
int cnlen = 9;
|
|
memset(cnstr, 0x00, sizeof(cnstr));
|
|
CLIGetStrWithReturn(ctx, 1, cnstr, &cnlen);
|
|
|
|
// skip first block, 4*4 = 16 bytes left
|
|
int raw_len = 0;
|
|
uint8_t raw[16] = {0};
|
|
CLIGetHexWithReturn(ctx, 2, raw, &raw_len);
|
|
|
|
bool q5 = arg_get_lit(ctx, 3);
|
|
bool em = arg_get_lit(ctx, 4);
|
|
CLIParserFree(ctx);
|
|
|
|
if (q5 && em) {
|
|
PrintAndLogEx(FAILED, "Can't specify both Q5 and EM4305 at the same time");
|
|
return PM3_EINVARG;
|
|
}
|
|
if (cnlen && raw_len) {
|
|
PrintAndLogEx(FAILED, "Can't specify both CardID and raw hex at the same time");
|
|
return PM3_EINVARG;
|
|
}
|
|
|
|
if (cnlen && cnlen < 8) {
|
|
PrintAndLogEx(FAILED, "Card ID must be 8 or 9 hex digits (%d)", cnlen);
|
|
return PM3_EINVARG;
|
|
}
|
|
|
|
if (cnlen == 8 || cnlen == 9) {
|
|
pac_cardid_to_raw((char *)cnstr, raw);
|
|
} else {
|
|
pac_raw_to_cardid(raw, cnstr);
|
|
}
|
|
|
|
uint32_t blocks[5];
|
|
for (uint8_t i = 1; i < ARRAYLEN(blocks); i++) {
|
|
blocks[i] = bytes_to_num(raw + ((i - 1) * 4), sizeof(uint32_t));
|
|
}
|
|
|
|
// Pac - compat mode, NRZ, data rate 32, 3 data blocks
|
|
blocks[0] = T55x7_MODULATION_DIRECT | T55x7_BITRATE_RF_32 | 4 << T55x7_MAXBLOCK_SHIFT;
|
|
char cardtype[16] = {"T55x7"};
|
|
// Q5
|
|
if (q5) {
|
|
blocks[0] = T5555_FIXED | T5555_MODULATION_DIRECT | T5555_SET_BITRATE(32) | 4 << T5555_MAXBLOCK_SHIFT;
|
|
snprintf(cardtype, sizeof(cardtype), "Q5/T5555");
|
|
}
|
|
|
|
// EM4305
|
|
if (em) {
|
|
blocks[0] = EM4305_PAC_CONFIG_BLOCK;
|
|
snprintf(cardtype, sizeof(cardtype), "EM4305/4469");
|
|
}
|
|
|
|
PrintAndLogEx(INFO, "Preparing to clone PAC/Stanley tag to " _YELLOW_("%s") " with ID " _GREEN_("%s") " raw " _GREEN_("%s")
|
|
, cardtype
|
|
, cnstr
|
|
, sprint_hex_inrow(raw, sizeof(raw))
|
|
);
|
|
|
|
print_blocks(blocks, ARRAYLEN(blocks));
|
|
|
|
int res;
|
|
if (em) {
|
|
res = em4x05_clone_tag(blocks, ARRAYLEN(blocks), 0, false);
|
|
} else {
|
|
res = clone_t55xx_tag(blocks, ARRAYLEN(blocks));
|
|
}
|
|
PrintAndLogEx(SUCCESS, "Done");
|
|
PrintAndLogEx(HINT, "Hint: try " _YELLOW_("`lf pac reader`") " to verify");
|
|
return res;
|
|
}
|
|
|
|
static int CmdPacSim(const char *Cmd) {
|
|
|
|
CLIParserContext *ctx;
|
|
CLIParserInit(&ctx, "lf pac sim",
|
|
"Enables simulation of PAC/Stanley card with specified card number.\n"
|
|
"Simulation runs until the button is pressed or another USB command is issued.\n"
|
|
"The card ID is 8 byte number. Larger values are truncated.",
|
|
"lf pac sim --cn CD4F5552\n"
|
|
"lf pac sim --raw FF2049906D8511C593155B56D5B2649F"
|
|
);
|
|
|
|
void *argtable[] = {
|
|
arg_param_begin,
|
|
arg_str0(NULL, "cn", "<dec>", "8 byte PAC/Stanley card ID"),
|
|
arg_str0("r", "raw", "<hex>", "raw hex data. 16 bytes max"),
|
|
arg_param_end
|
|
};
|
|
CLIExecWithReturn(ctx, Cmd, argtable, false);
|
|
|
|
uint8_t cnstr[10];
|
|
int cnlen = 9;
|
|
memset(cnstr, 0x00, sizeof(cnstr));
|
|
CLIGetStrWithReturn(ctx, 1, cnstr, &cnlen);
|
|
|
|
// skip first block, 4*4 = 16 bytes left
|
|
int raw_len = 0;
|
|
uint8_t raw[16] = {0};
|
|
CLIGetHexWithReturn(ctx, 2, raw, &raw_len);
|
|
CLIParserFree(ctx);
|
|
|
|
if (cnlen && raw_len) {
|
|
PrintAndLogEx(FAILED, "Can't specify both CardID and raw hex at the same time");
|
|
return PM3_EINVARG;
|
|
}
|
|
|
|
if (cnlen && cnlen < 8) {
|
|
PrintAndLogEx(FAILED, "Card ID must be 8 or 9 hex digits (%d)", cnlen);
|
|
return PM3_EINVARG;
|
|
}
|
|
|
|
if (cnlen == 8 || cnlen == 9) {
|
|
pac_cardid_to_raw((char *)cnstr, raw);
|
|
} else {
|
|
pac_raw_to_cardid(raw, cnstr);
|
|
}
|
|
|
|
uint8_t bs[128];
|
|
for (size_t i = 0; i < 4; i++) {
|
|
uint32_t tmp = bytes_to_num(raw + (i * sizeof(uint32_t)), sizeof(uint32_t));
|
|
num_to_bytebits(tmp, sizeof(uint32_t) * 8, bs + (i * sizeof(uint32_t) * 8));
|
|
}
|
|
|
|
PrintAndLogEx(SUCCESS, "Simulating PAC/Stanley - ID " _YELLOW_("%s")" raw " _YELLOW_("%s")
|
|
, cnstr
|
|
, sprint_hex_inrow(raw, sizeof(raw))
|
|
);
|
|
|
|
// NRZ sim.
|
|
lf_nrzsim_t *payload = calloc(1, sizeof(lf_nrzsim_t) + sizeof(bs));
|
|
payload->invert = 0;
|
|
payload->separator = 0;
|
|
payload->clock = 32;
|
|
memcpy(payload->data, bs, sizeof(bs));
|
|
|
|
clearCommandBuffer();
|
|
SendCommandNG(CMD_LF_NRZ_SIMULATE, (uint8_t *)payload, sizeof(lf_nrzsim_t) + sizeof(bs));
|
|
free(payload);
|
|
|
|
PacketResponseNG resp;
|
|
WaitForResponse(CMD_LF_NRZ_SIMULATE, &resp);
|
|
|
|
PrintAndLogEx(INFO, "Done");
|
|
if (resp.status != PM3_EOPABORTED)
|
|
return resp.status;
|
|
|
|
return PM3_SUCCESS;
|
|
}
|
|
|
|
static command_t CommandTable[] = {
|
|
{"help", CmdHelp, AlwaysAvailable, "This help"},
|
|
{"demod", CmdPacDemod, AlwaysAvailable, "Demodulate a PAC tag from the GraphBuffer"},
|
|
{"reader", CmdPacReader, IfPm3Lf, "Attempt to read and extract tag data from the antenna"},
|
|
{"clone", CmdPacClone, IfPm3Lf, "clone PAC tag to T55x7"},
|
|
{"sim", CmdPacSim, IfPm3Lf, "simulate PAC tag"},
|
|
{NULL, NULL, NULL, NULL}
|
|
};
|
|
|
|
static int CmdHelp(const char *Cmd) {
|
|
(void)Cmd; // Cmd is not used so far
|
|
CmdsHelp(CommandTable);
|
|
return PM3_SUCCESS;
|
|
}
|
|
|
|
int CmdLFPac(const char *Cmd) {
|
|
clearCommandBuffer();
|
|
return CmdsParse(CommandTable, Cmd);
|
|
}
|
|
|
|
// find PAC preamble in already demoded data
|
|
int detectPac(uint8_t *dest, size_t *size) {
|
|
if (*size < 128) return -1; //make sure buffer has data
|
|
size_t startIdx = 0;
|
|
uint8_t preamble[] = {1, 1, 1, 1, 1, 1, 1, 1, 0, 0, 1, 0, 0, 0, 0, 0, 0, 1, 0};
|
|
if (!preambleSearch(dest, preamble, sizeof(preamble), size, &startIdx))
|
|
return -2; //preamble not found
|
|
if (*size != 128) return -3; //wrong demoded size
|
|
//return start position
|
|
return (int)startIdx;
|
|
}
|
|
|
|
|