Compare commits
37 Commits
mfoc-0.10.
...
mfoc-0.10.
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
1c5af20e98 | ||
|
|
d65d57d06e | ||
|
|
6674459a57 | ||
|
|
c004dd2c2c | ||
|
|
051d70e2ed | ||
|
|
6048309a13 | ||
|
|
2596aeac80 | ||
|
|
10699271f6 | ||
|
|
87d6203b88 | ||
|
|
1a2ed65879 | ||
|
|
02afffce07 | ||
|
|
25e1b8a3c6 | ||
|
|
451f2fa29c | ||
|
|
bc109b9252 | ||
|
|
435de61cc5 | ||
|
|
3b02985173 | ||
|
|
262e206b0a | ||
|
|
3545975303 | ||
|
|
f4282f0f5d | ||
|
|
8962d407c0 | ||
|
|
9187b97249 | ||
|
|
b27b742472 | ||
|
|
478d3d92eb | ||
|
|
08195d70ee | ||
|
|
68b71ea26c | ||
|
|
5c62782645 | ||
|
|
ea0c8a7047 | ||
|
|
2be6d8ddef | ||
|
|
c3808a240c | ||
|
|
ece9619e6d | ||
|
|
a3ddbf6a32 | ||
|
|
55c3296983 | ||
|
|
21b58f0bf6 | ||
|
|
5e3f177ee6 | ||
|
|
367f0d050e | ||
|
|
3b2b569f0d | ||
|
|
2ff463b5c1 |
21
.gitignore
vendored
Normal file
21
.gitignore
vendored
Normal file
@@ -0,0 +1,21 @@
|
|||||||
|
INSTALL
|
||||||
|
Makefile
|
||||||
|
Makefile.in
|
||||||
|
aclocal.m4
|
||||||
|
autom4te.cache/
|
||||||
|
config.h
|
||||||
|
config.h.in
|
||||||
|
config.log
|
||||||
|
config.status
|
||||||
|
configure
|
||||||
|
depcomp
|
||||||
|
install-sh
|
||||||
|
missing
|
||||||
|
src/*.lo
|
||||||
|
src/*.o
|
||||||
|
src/.deps/
|
||||||
|
src/Makefile
|
||||||
|
src/Makefile.in
|
||||||
|
src/mfoc
|
||||||
|
stamp-h1
|
||||||
|
|
||||||
2
AUTHORS
2
AUTHORS
@@ -6,4 +6,4 @@ Pavol Luptak - project leader, minor coding, testing and bugreporting
|
|||||||
= Contributors
|
= Contributors
|
||||||
|
|
||||||
Michal Boska <boska.michal@gmail.com> - porting to libnfc 1.3.3
|
Michal Boska <boska.michal@gmail.com> - porting to libnfc 1.3.3
|
||||||
Romuald Conty <romuald@libnfc.org> - porting to libnfc 1.3.9
|
Romuald Conty <romuald@libnfc.org> - porting to libnfc 1.3.9 and upper
|
||||||
|
|||||||
279
ChangeLog
279
ChangeLog
@@ -1,90 +1,243 @@
|
|||||||
2011-05-18 09:18 rconty@il4p.fr
|
2013-01-20 Romuald Conty <romuald@libnfc.org>
|
||||||
|
|
||||||
* src/mfoc.c: mfoc: improve tests made before running and show tag
|
* ChangeLog: Update outdated email addresses
|
||||||
info using print_nfc_iso14443a_info()
|
|
||||||
|
|
||||||
2011-04-08 15:19 rconty@il4p.fr
|
2013-01-20 Romuald Conty <romuald@libnfc.org>
|
||||||
|
|
||||||
* src/mfoc.c: mfoc: try to disconnect() the device on error.
|
* src/crapto1.c, src/crapto1.h, src/crypto1.c, src/mfoc.c,
|
||||||
|
src/mfoc.h: Format source code with "make style"
|
||||||
|
|
||||||
2011-04-08 10:05 rconty@il4p.fr
|
2013-01-20 Romuald Conty <romuald@libnfc.org>
|
||||||
|
|
||||||
* src/mfoc.c: mfoc: show errors then exit on mf_configure()
|
* Makefile.am: Add "make style" directive to format source code
|
||||||
|
|
||||||
2011-04-08 09:32 rconty@il4p.fr
|
2013-01-20 Romuald Conty <romuald@libnfc.org>
|
||||||
|
|
||||||
* src/mfoc.c: mfoc: apply a patch suggested by Valentijn Sessink.
|
* configure.ac, src/mfoc.c: Updates source to use libnfc 1.7.0
|
||||||
See Issue 56.
|
|
||||||
|
|
||||||
2011-04-08 09:17 rconty@il4p.fr
|
2013-01-20 Romuald Conty <romuald@libnfc.org>
|
||||||
|
|
||||||
* src/mfoc.c: mfoc: minors fixes and indent.
|
|
||||||
|
|
||||||
2011-04-08 08:54 rconty@il4p.fr
|
|
||||||
|
|
||||||
* src/mfoc.c: mfoc: show error (using nfc_perror) then exit if some
|
|
||||||
nfc_* functions failed on init.
|
|
||||||
|
|
||||||
2011-04-08 08:35 rconty@il4p.fr
|
|
||||||
|
|
||||||
* src/mfoc.c: mfoc: minor debug improvements.
|
|
||||||
|
|
||||||
2011-04-04 12:28 rconty@il4p.fr
|
|
||||||
|
|
||||||
* configure.ac, src/mfoc.c: mfoc: minor fixes/enhancements and
|
|
||||||
version bumping
|
|
||||||
|
|
||||||
2011-04-04 10:38 rconty@il4p.fr
|
|
||||||
|
|
||||||
* src/mfoc.c, src/mifare.c: mfoc: hide authentication errors
|
|
||||||
|
|
||||||
2011-04-04 10:01 rconty@il4p.fr
|
|
||||||
|
|
||||||
* src/mifare.c, src/mifare.h, src/nfc-utils.c, src/nfc-utils.h:
|
* src/mifare.c, src/mifare.h, src/nfc-utils.c, src/nfc-utils.h:
|
||||||
mfoc: sync nfc-utils.h/c and mifare.c/h with libnfc's ones.
|
Update mifare.* and nfc-utils.* from libnfc utils directory
|
||||||
|
|
||||||
2011-02-21 16:26 rtartiere@il4p.fr
|
2013-01-20 Romuald Conty <romuald@libnfc.org>
|
||||||
|
|
||||||
|
* .gitignore: Ignore generated files in source repository
|
||||||
|
|
||||||
|
2012-10-14 Romuald Conty <romuald@libnfc.org>
|
||||||
|
|
||||||
|
* src/mfoc.c: Fix tolerance (-T) option (Fixes issue 102) Thanks to
|
||||||
|
fnargwibble
|
||||||
|
|
||||||
|
2012-06-03 Romuald Conty <romuald@libnfc.org>
|
||||||
|
|
||||||
|
* src/mifare.c: do not display an error when authentication failed
|
||||||
|
|
||||||
|
2012-06-03 Romuald Conty <romuald@libnfc.org>
|
||||||
|
|
||||||
|
* src/mfoc.c, src/mfoc.h: use authuid instead uid name when handling
|
||||||
|
the authentication uid bytes (different from UID with 7bytes MIFARE
|
||||||
|
Classic
|
||||||
|
|
||||||
|
2012-06-03 Romuald Conty <romuald@libnfc.org>
|
||||||
|
|
||||||
|
* src/crapto1.h, src/mfoc.c, src/mfoc.h, src/mifare.c,
|
||||||
|
src/mifare.h, src/nfc-utils.c, src/nfc-utils.h: some code clean up:
|
||||||
|
find . -name '*.[ch]' | xargs perl -pi -e 's/\t+$//; s/ +$//'
|
||||||
|
|
||||||
|
2012-06-02 Romuald Conty <romuald@libnfc.org>
|
||||||
|
|
||||||
|
* src/mfoc.c, src/mifare.h: Allow to find default keys using 7bytes
|
||||||
|
UID MIFARE Classic tags
|
||||||
|
|
||||||
|
2012-06-02 Romuald Conty <romuald@libnfc.org>
|
||||||
|
|
||||||
|
* src/mfoc.c: Remove not requiered anticol and configuration, its
|
||||||
|
speed up default keys search
|
||||||
|
|
||||||
|
2012-06-02 Romuald Conty <romuald@libnfc.org>
|
||||||
|
|
||||||
|
* src/mfoc.c: Enhance default keys search result: '/', '\' and 'x'
|
||||||
|
means respectively A, B and both key(s) found.
|
||||||
|
|
||||||
|
2012-06-01 Romuald Conty <romuald@libnfc.org>
|
||||||
|
|
||||||
|
* INSTALL, configure.ac, debian/control, src/Makefile.am,
|
||||||
|
src/crapto1.c, src/mfoc.c, src/mfoc.h, src/mifare.c: foc> source
|
||||||
|
code maintenance: - upgrade to last libnfc devel API - removes various warnings - update debian package
|
||||||
|
|
||||||
|
2012-05-28 Ludovic Rousseau <ludovic.rousseau@gmail.com>
|
||||||
|
|
||||||
|
* debian/watch: Update upstream URL Closes Issue #92
|
||||||
|
|
||||||
|
2012-05-22 Ludovic Rousseau <ludovic.rousseau@gmail.com>
|
||||||
|
|
||||||
|
* debian/control: Upgrade libnfc-dev version in Build-Depends: Closes Issue #91
|
||||||
|
|
||||||
|
2012-05-14 Romain Tartiere <romain.tartiere@gmail.com>
|
||||||
|
|
||||||
|
* src/crapto1.h: Export lfsr_rollback_word().
|
||||||
|
|
||||||
|
2012-05-14 Romain Tartiere <romain.tartiere@gmail.com>
|
||||||
|
|
||||||
|
* src/mfoc.c, src/mfoc.h: Drop unused argument.
|
||||||
|
|
||||||
|
2012-05-14 Romain Tartiere <romain.tartiere@gmail.com>
|
||||||
|
|
||||||
|
* src/mfoc.c, src/mfoc.h: Fix a bunch of signed/unsigned
|
||||||
|
comparisons.
|
||||||
|
|
||||||
|
2012-05-14 Romain Tartiere <romain.tartiere@gmail.com>
|
||||||
|
|
||||||
|
* configure.ac: Complete configure.ac.
|
||||||
|
|
||||||
|
2012-05-14 Romain Tartiere <romain.tartiere@gmail.com>
|
||||||
|
|
||||||
|
* src/Makefile.am: Rely on variables set by the autotools.
|
||||||
|
|
||||||
|
2012-01-26 Audrey Diacre <adiacre@il4p.fr>
|
||||||
|
|
||||||
|
* src/mfoc.c, src/mfoc.h, src/mifare.c, src/mifare.h,
|
||||||
|
src/nfc-utils.c, src/nfc-utils.h: update to use libnfc's trunk
|
||||||
|
|
||||||
|
2011-10-17 Romuald Conty <romuald@libnfc.org>
|
||||||
|
|
||||||
|
* configure.ac, src/Makefile.am: compilation improvements (Thanks to
|
||||||
|
Thomas Hood)
|
||||||
|
|
||||||
|
2011-09-28 Romuald Conty <romuald@libnfc.org>
|
||||||
|
|
||||||
|
* configure.ac, src/mfoc.c, src/mifare.c: Sync w/ libnfc-1.5.1
|
||||||
|
(Fixes Issue 79)
|
||||||
|
|
||||||
|
2011-07-11 Romuald Conty <romuald@libnfc.org>
|
||||||
|
|
||||||
|
* src/nfc-utils.c: sync nfc-utils.c with libnfc trunk.
|
||||||
|
|
||||||
|
2011-05-20 Romuald Conty <romuald@libnfc.org>
|
||||||
|
|
||||||
|
* debian/control, debian/watch: debian: update pam_nfc, mfoc and
|
||||||
|
libfreefare packages to use dh7.
|
||||||
|
|
||||||
|
2011-05-20 Romuald Conty <romuald@libnfc.org>
|
||||||
|
|
||||||
|
* INSTALL, debian/control: debian: silent lintian warning
|
||||||
|
|
||||||
|
2011-05-20 Romuald Conty <romuald@libnfc.org>
|
||||||
|
|
||||||
|
* src/mfoc.c: usage output is now more standard (Thanks to Thomas
|
||||||
|
Hood)
|
||||||
|
|
||||||
|
2011-05-20 Romuald Conty <romuald@libnfc.org>
|
||||||
|
|
||||||
|
* debian/changelog, debian/control, debian/rules: debian package now
|
||||||
|
use dh_autoreconf to build against svn.
|
||||||
|
|
||||||
|
2011-05-19 Romuald Conty <romuald@libnfc.org>
|
||||||
|
|
||||||
|
* debian/rules: in some cases ./configure file needs to be chmoded
|
||||||
|
(dpkg-source -b mfoc).
|
||||||
|
|
||||||
|
2011-05-19 Romuald Conty <romuald@libnfc.org>
|
||||||
|
|
||||||
|
* AUTHORS, debian/changelog, debian/compat, debian/control,
|
||||||
|
debian/copyright, debian/docs, debian/manpages, debian/rules,
|
||||||
|
debian/source/format, debian/watch: import debian files (Thanks to
|
||||||
|
Thomas Hood)
|
||||||
|
|
||||||
|
2011-05-18 Romuald Conty <romuald@libnfc.org>
|
||||||
|
|
||||||
|
* src/Makefile.am, src/mfoc.1: add manpage (Thanks to Thomas Hood)
|
||||||
|
|
||||||
|
2011-05-18 Romuald Conty <romuald@libnfc.org>
|
||||||
|
|
||||||
|
* src/mfoc.c: read multiple keys from command line (Thanks to Frank
|
||||||
|
Morgner) (Fixes Issue 63)
|
||||||
|
|
||||||
|
2011-05-18 Romuald Conty <romuald@libnfc.org>
|
||||||
|
|
||||||
|
* ChangeLog, configure.ac: prepare 0.10.2 release
|
||||||
|
|
||||||
|
2011-05-18 Romuald Conty <romuald@libnfc.org>
|
||||||
|
|
||||||
|
* src/mfoc.c: improve tests made before running and show tag info
|
||||||
|
using print_nfc_iso14443a_info()
|
||||||
|
|
||||||
|
2011-04-08 Romuald Conty <romuald@libnfc.org>
|
||||||
|
|
||||||
|
* src/mfoc.c: try to disconnect() the device on error.
|
||||||
|
|
||||||
|
2011-04-08 Romuald Conty <romuald@libnfc.org>
|
||||||
|
|
||||||
|
* src/mfoc.c: show errors then exit on mf_configure()
|
||||||
|
|
||||||
|
2011-04-08 Romuald Conty <romuald@libnfc.org>
|
||||||
|
|
||||||
|
* src/mfoc.c: apply a patch suggested by Valentijn Sessink. See
|
||||||
|
Issue 56.
|
||||||
|
|
||||||
|
2011-04-08 Romuald Conty <romuald@libnfc.org>
|
||||||
|
|
||||||
|
* src/mfoc.c: minors fixes and indent.
|
||||||
|
|
||||||
|
2011-04-08 Romuald Conty <romuald@libnfc.org>
|
||||||
|
|
||||||
|
* src/mfoc.c: show error (using nfc_perror) then exit if some nfc_*
|
||||||
|
functions failed on init.
|
||||||
|
|
||||||
|
2011-04-08 Romuald Conty <romuald@libnfc.org>
|
||||||
|
|
||||||
|
* src/mfoc.c: minor debug improvements.
|
||||||
|
|
||||||
|
2011-04-04 Romuald Conty <romuald@libnfc.org>
|
||||||
|
|
||||||
|
* configure.ac, src/mfoc.c: minor fixes/enhancements and version
|
||||||
|
bumping
|
||||||
|
|
||||||
|
2011-04-04 Romuald Conty <romuald@libnfc.org>
|
||||||
|
|
||||||
|
* src/mfoc.c, src/mifare.c: hide authentication errors
|
||||||
|
|
||||||
|
2011-04-04 Romuald Conty <romuald@libnfc.org>
|
||||||
|
|
||||||
|
* src/mifare.c, src/mifare.h, src/nfc-utils.c, src/nfc-utils.h: sync
|
||||||
|
nfc-utils.h/c and mifare.c/h with libnfc's ones.
|
||||||
|
|
||||||
|
2011-02-21 Romain Tartiere <romain.tartiere@gmail.com>
|
||||||
|
|
||||||
* src/Makefile.am: mfox: Unbreak autotools on FreeBSD.
|
* src/Makefile.am: mfox: Unbreak autotools on FreeBSD.
|
||||||
|
|
||||||
2011-02-02 10:46 rconty@il4p.fr
|
2011-02-02 Romuald Conty <romuald@libnfc.org>
|
||||||
|
|
||||||
* src/mfoc.c: mfoc: use strtoll() function in order to retrieve
|
* src/mfoc.c: use strtoll() function in order to retrieve 64bits
|
||||||
64bits wide value. (Fixes Issue 55)
|
wide value. (Fixes Issue 55)
|
||||||
|
|
||||||
2010-11-18 11:20 rconty@il4p.fr
|
2010-11-18 Romuald Conty <romuald@libnfc.org>
|
||||||
|
|
||||||
* configure.ac: mfoc: bump package version
|
* configure.ac: bump package version
|
||||||
|
|
||||||
2010-11-18 11:18 rconty@il4p.fr
|
2010-11-18 Romuald Conty <romuald@libnfc.org>
|
||||||
|
|
||||||
* src/nfc-utils.c, src/nfc-utils.h: mfoc: sync nfc-utils.* from
|
* src/nfc-utils.c, src/nfc-utils.h: sync nfc-utils.* from libnfc
|
||||||
libnfc
|
|
||||||
|
|
||||||
2010-11-02 09:36 rconty@il4p.fr
|
2010-11-02 Romuald Conty <romuald@libnfc.org>
|
||||||
|
|
||||||
* configure.ac, src/mfoc.c, src/mfoc.h, src/nfc-utils.c,
|
* configure.ac, src/mfoc.c, src/mfoc.h, src/nfc-utils.c,
|
||||||
src/nfc-utils.h: mfoc: upgrade code to work with develoment
|
src/nfc-utils.h: upgrade code to work with develoment version of
|
||||||
version of libnfc (upcomming 1.4.0)
|
libnfc (upcomming 1.4.0) Update code to match with the new API; Sync
|
||||||
Update code to match with the new API;
|
nfc-utils.[ch] from libnfc's repo; Update ./configure to detect
|
||||||
Sync nfc-utils.[ch] from libnfc's repo;
|
libnfc 1.4.0;
|
||||||
Update ./configure to detect libnfc 1.4.0;
|
|
||||||
|
|
||||||
2010-09-14 09:38 rconty@il4p.fr
|
2010-09-14 Romuald Conty <romuald@libnfc.org>
|
||||||
|
|
||||||
* ., AUTHORS, Makefile.in, aclocal.m4, autogen.sh, config.h,
|
* AUTHORS, Makefile.in, aclocal.m4, autogen.sh, config.h,
|
||||||
config.h.in, configure, configure.ac, depcomp, install-sh,
|
config.h.in, configure, configure.ac, depcomp, install-sh, missing,
|
||||||
missing, src, src/Makefile.am, src/mfoc.c, src/mifare.c,
|
src/Makefile.am, src/mfoc.c, src/mifare.c, src/mifare.h,
|
||||||
src/mifare.h, src/nfc-utils.c, src/nfc-utils.h: mfoc: update code
|
src/nfc-utils.c, src/nfc-utils.h: update code in order to use libnfc
|
||||||
in order to use libnfc 1.3.9, minor clean up, and minor
|
1.3.9, minor clean up, and minor enhancements.
|
||||||
enhancements.
|
|
||||||
|
|
||||||
2010-09-14 09:34 rconty@il4p.fr
|
2010-09-14 Romuald Conty <romuald@libnfc.org>
|
||||||
|
|
||||||
* ., AUTHORS, COPYING, ChangeLog, INSTALL, Makefile.am,
|
* Import MFOC 0.08 from http://www.nethemba.com/mfoc.tar.bz2 on 13th
|
||||||
Makefile.in, NEWS, README, TODO, aclocal.m4, autogen.sh,
|
Sept 2010
|
||||||
config.h, config.h.in, configure, configure.ac, depcomp,
|
|
||||||
install-sh, missing, src, src/Makefile.am, src/crapto1.c,
|
|
||||||
src/crapto1.h, src/crypto1.c, src/mfoc.c, src/mfoc.h: Import MFOC
|
|
||||||
0.08 from http://www.nethemba.com/mfoc.tar.bz2 on 13th Sept 2010
|
|
||||||
|
|
||||||
|
|||||||
10
Makefile.am
10
Makefile.am
@@ -1,4 +1,10 @@
|
|||||||
SUBDIRS = src
|
SUBDIRS = src
|
||||||
|
|
||||||
#pkgconfigdir = $(libdir)/pkgconfig
|
style:
|
||||||
#pkgconfig_DATA = libnfc.pc
|
find . -name "*.[ch]" -exec perl -pi -e 's/[ \t]+$$//' {} \;
|
||||||
|
find . -name "*.[ch]" -exec astyle --formatted --mode=c --suffix=none \
|
||||||
|
--indent=spaces=2 --indent-switches --indent-preprocessor \
|
||||||
|
--keep-one-line-blocks --max-instatement-indent=60 \
|
||||||
|
--brackets=linux --pad-oper --unpad-paren --pad-header \
|
||||||
|
--align-pointer=name {} \;
|
||||||
|
|
||||||
|
|||||||
15
configure.ac
15
configure.ac
@@ -1,4 +1,4 @@
|
|||||||
AC_INIT([mfoc], [0.10.2], [mifare@nethemba.com])
|
AC_INIT([mfoc],[0.10.5],[mifare@nethemba.com])
|
||||||
|
|
||||||
AC_CONFIG_MACRO_DIR([m4])
|
AC_CONFIG_MACRO_DIR([m4])
|
||||||
|
|
||||||
@@ -13,20 +13,29 @@ AM_INIT_AUTOMAKE
|
|||||||
m4_ifdef([AM_SILENT_RULES],[AM_SILENT_RULES([yes])])
|
m4_ifdef([AM_SILENT_RULES],[AM_SILENT_RULES([yes])])
|
||||||
|
|
||||||
# Checks for pkg-config modules.
|
# Checks for pkg-config modules.
|
||||||
LIBNFC_REQUIRED_VERSION=1.4.2
|
LIBNFC_REQUIRED_VERSION=1.7.0
|
||||||
PKG_CHECK_MODULES([LIBNFC], [libnfc >= $LIBNFC_REQUIRED_VERSION], [], [AC_MSG_ERROR([libnfc >= $LIBNFC_REQUIRED_VERSION is mandatory.])])
|
PKG_CHECK_MODULES([libnfc], [libnfc >= $LIBNFC_REQUIRED_VERSION], [], [AC_MSG_ERROR([libnfc >= $LIBNFC_REQUIRED_VERSION is mandatory.])])
|
||||||
|
|
||||||
PKG_CONFIG_REQUIRES="libnfc"
|
PKG_CONFIG_REQUIRES="libnfc"
|
||||||
AC_SUBST([PKG_CONFIG_REQUIRES])
|
AC_SUBST([PKG_CONFIG_REQUIRES])
|
||||||
|
|
||||||
|
AC_C_INLINE
|
||||||
|
|
||||||
# Checks for typedefs, structures, and compiler characteristics.
|
# Checks for typedefs, structures, and compiler characteristics.
|
||||||
AC_HEADER_STDBOOL
|
AC_HEADER_STDBOOL
|
||||||
|
AC_TYPE_SIZE_T
|
||||||
|
AC_TYPE_UINT8_T
|
||||||
|
AC_TYPE_UINT16_T
|
||||||
AC_TYPE_UINT32_T
|
AC_TYPE_UINT32_T
|
||||||
AC_TYPE_UINT64_T
|
AC_TYPE_UINT64_T
|
||||||
|
|
||||||
# Checks for library functions.
|
# Checks for library functions.
|
||||||
AC_FUNC_MALLOC
|
AC_FUNC_MALLOC
|
||||||
AC_FUNC_REALLOC
|
AC_FUNC_REALLOC
|
||||||
|
AC_CHECK_FUNCS([memset])
|
||||||
|
|
||||||
|
# C99
|
||||||
|
CFLAGS="$CFLAGS -std=c99"
|
||||||
|
|
||||||
AC_CONFIG_FILES([Makefile
|
AC_CONFIG_FILES([Makefile
|
||||||
src/Makefile])
|
src/Makefile])
|
||||||
|
|||||||
6
debian/.gitignore
vendored
Normal file
6
debian/.gitignore
vendored
Normal file
@@ -0,0 +1,6 @@
|
|||||||
|
autoreconf.after
|
||||||
|
autoreconf.before
|
||||||
|
files
|
||||||
|
mfoc.debhelper.log
|
||||||
|
mfoc.substvars
|
||||||
|
mfoc/
|
||||||
11
debian/changelog
vendored
Normal file
11
debian/changelog
vendored
Normal file
@@ -0,0 +1,11 @@
|
|||||||
|
mfoc (0.10.4-0) unstable; urgency=low
|
||||||
|
|
||||||
|
* New upstream release
|
||||||
|
|
||||||
|
-- Romuald Conty <romuald@libnfc.org> Sun, 20 Jan 2013 15:58:42 +0100
|
||||||
|
|
||||||
|
mfoc (0.10.2pre3.1-0) unstable; urgency=low
|
||||||
|
|
||||||
|
* Initial package
|
||||||
|
|
||||||
|
-- Thomas Hood <jdthood@gmail.com> Wed, 18 May 2011 12:00:00 +0200
|
||||||
1
debian/compat
vendored
Normal file
1
debian/compat
vendored
Normal file
@@ -0,0 +1 @@
|
|||||||
|
7
|
||||||
17
debian/control
vendored
Normal file
17
debian/control
vendored
Normal file
@@ -0,0 +1,17 @@
|
|||||||
|
Source: mfoc
|
||||||
|
Section: utils
|
||||||
|
Priority: extra
|
||||||
|
Maintainer: Thomas Hood <jdthood@gmail.com>
|
||||||
|
Build-Depends: debhelper (>= 7.0.50~), dh-autoreconf, libnfc-dev (>= 1.7.0), pkg-config
|
||||||
|
Standards-Version: 3.9.2
|
||||||
|
Homepage: http://code.google.com/p/nfc-tools/wiki/mfoc
|
||||||
|
Vcs-Svn: http://nfc-tools.googlecode.com/svn/trunk/mfoc
|
||||||
|
Vcs-Browser: http://code.google.com/p/nfc-tools/source/browse/#svn/trunk/mfoc
|
||||||
|
|
||||||
|
Package: mfoc
|
||||||
|
Architecture: any
|
||||||
|
Depends: ${shlibs:Depends}, ${misc:Depends}
|
||||||
|
Description: MIFARE Classic offline cracker
|
||||||
|
This package includes the mfoc program which cracks the
|
||||||
|
encryption keys of the MIFARE Classic chip and dumps the
|
||||||
|
chip's memory contents to a file.
|
||||||
44
debian/copyright
vendored
Normal file
44
debian/copyright
vendored
Normal file
@@ -0,0 +1,44 @@
|
|||||||
|
Format: http://dep.debian.net/deps/dep5
|
||||||
|
Upstream-Name: MFOC
|
||||||
|
Source: http://nfc-tools.googlecode.com/svn/trunk/mfoc
|
||||||
|
|
||||||
|
Files: *
|
||||||
|
Copyright: 2009 Norbert Szetei, Pavol Luptak
|
||||||
|
2010 Micahal Boska, Romuald Conty
|
||||||
|
2011 Romuald Conty
|
||||||
|
License: GPL-2+
|
||||||
|
This package is free software; you can redistribute it and/or modify
|
||||||
|
it under the terms of the GNU General Public License as published by
|
||||||
|
the Free Software Foundation; either version 2 of the License, or
|
||||||
|
(at your option) any later version.
|
||||||
|
.
|
||||||
|
This package is distributed in the hope that it will be useful,
|
||||||
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||||
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||||
|
GNU General Public License for more details.
|
||||||
|
.
|
||||||
|
You should have received a copy of the GNU General Public License
|
||||||
|
along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||||
|
.
|
||||||
|
On Debian systems, the complete text of the GNU General Public
|
||||||
|
License version 2 can be found in "/usr/share/common-licenses/GPL-2".
|
||||||
|
|
||||||
|
|
||||||
|
Files: debian/*
|
||||||
|
Copyright: 2011 Thomas Hood <jdthood@gmail.com>
|
||||||
|
License: GPL-2+
|
||||||
|
This package is free software; you can redistribute it and/or modify
|
||||||
|
it under the terms of the GNU General Public License as published by
|
||||||
|
the Free Software Foundation; either version 2 of the License, or
|
||||||
|
(at your option) any later version.
|
||||||
|
.
|
||||||
|
This package is distributed in the hope that it will be useful,
|
||||||
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||||
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||||
|
GNU General Public License for more details.
|
||||||
|
.
|
||||||
|
You should have received a copy of the GNU General Public License
|
||||||
|
along with this program. If not, see <http://www.gnu.org/licenses/>
|
||||||
|
.
|
||||||
|
On Debian systems, the complete text of the GNU General Public
|
||||||
|
License version 2 can be found in "/usr/share/common-licenses/GPL-2".
|
||||||
1
debian/docs
vendored
Normal file
1
debian/docs
vendored
Normal file
@@ -0,0 +1 @@
|
|||||||
|
AUTHORS
|
||||||
1
debian/manpages
vendored
Normal file
1
debian/manpages
vendored
Normal file
@@ -0,0 +1 @@
|
|||||||
|
src/mfoc.1
|
||||||
16
debian/rules
vendored
Executable file
16
debian/rules
vendored
Executable file
@@ -0,0 +1,16 @@
|
|||||||
|
#!/usr/bin/make -f
|
||||||
|
# -*- makefile -*-
|
||||||
|
# Sample debian/rules that uses debhelper.
|
||||||
|
# This file was originally written by Joey Hess and Craig Small.
|
||||||
|
# As a special exception, when this file is copied by dh-make into a
|
||||||
|
# dh-make output file, you may use that output file without restriction.
|
||||||
|
# This special exception was added by Craig Small in version 0.37 of dh-make.
|
||||||
|
|
||||||
|
# Uncomment this to turn on verbose mode.
|
||||||
|
#export DH_VERBOSE=1
|
||||||
|
|
||||||
|
override_dh_installchangelogs:
|
||||||
|
dh_installchangelogs ChangeLog
|
||||||
|
|
||||||
|
%:
|
||||||
|
dh --with autoreconf $@
|
||||||
1
debian/source/format
vendored
Normal file
1
debian/source/format
vendored
Normal file
@@ -0,0 +1 @@
|
|||||||
|
3.0 (quilt)
|
||||||
7
debian/watch
vendored
Normal file
7
debian/watch
vendored
Normal file
@@ -0,0 +1,7 @@
|
|||||||
|
# See uscan(1) for format
|
||||||
|
|
||||||
|
# Compulsory line, this is a version 3 file
|
||||||
|
version=3
|
||||||
|
|
||||||
|
http://code.google.com/p/nfc-tools/downloads/list .*/mfoc-(.*).tar.gz
|
||||||
|
|
||||||
@@ -1,9 +1,10 @@
|
|||||||
AM_CFLAGS = @LIBNFC_CFLAGS@
|
AM_CFLAGS = @libnfc_CFLAGS@
|
||||||
AM_LDFLAGS = @LIBNFC_LIBS@
|
|
||||||
|
|
||||||
bin_PROGRAMS = mfoc
|
bin_PROGRAMS = mfoc
|
||||||
|
|
||||||
noinst_HEADERS = crapto1.h mfoc.h mifare.h nfc-utils.h
|
noinst_HEADERS = crapto1.h mfoc.h mifare.h nfc-utils.h
|
||||||
mfoc_SOURCES = crapto1.c crypto1.c mfoc.c mifare.c nfc-utils.c
|
|
||||||
|
|
||||||
# dist_man_MANS = mfoc.1
|
mfoc_SOURCES = crapto1.c crypto1.c mfoc.c mifare.c nfc-utils.c
|
||||||
|
mfoc_LDADD = @libnfc_LIBS@
|
||||||
|
|
||||||
|
dist_man_MANS = mfoc.1
|
||||||
|
|||||||
@@ -22,7 +22,7 @@
|
|||||||
|
|
||||||
#if !defined LOWMEM && defined __GNUC__
|
#if !defined LOWMEM && defined __GNUC__
|
||||||
static uint8_t filterlut[1 << 20];
|
static uint8_t filterlut[1 << 20];
|
||||||
static void __attribute__((constructor)) fill_lut()
|
static void __attribute__((constructor)) fill_lut(void)
|
||||||
{
|
{
|
||||||
uint32_t i;
|
uint32_t i;
|
||||||
for (i = 0; i < 1 << 20; ++i)
|
for (i = 0; i < 1 << 20; ++i)
|
||||||
@@ -126,8 +126,7 @@ extend_table_simple(uint32_t *tbl, uint32_t **end, int bit)
|
|||||||
static struct Crypto1State *
|
static struct Crypto1State *
|
||||||
recover(uint32_t *o_head, uint32_t *o_tail, uint32_t oks,
|
recover(uint32_t *o_head, uint32_t *o_tail, uint32_t oks,
|
||||||
uint32_t *e_head, uint32_t *e_tail, uint32_t eks, int rem,
|
uint32_t *e_head, uint32_t *e_tail, uint32_t eks, int rem,
|
||||||
struct Crypto1State *sl, uint32_t in)
|
struct Crypto1State *sl, uint32_t in) {
|
||||||
{
|
|
||||||
uint32_t *o, *e, i;
|
uint32_t *o, *e, i;
|
||||||
|
|
||||||
if (rem == -1) {
|
if (rem == -1) {
|
||||||
@@ -163,8 +162,7 @@ recover(uint32_t *o_head, uint32_t *o_tail, uint32_t oks,
|
|||||||
e_tail = binsearch(e_head, e = e_tail);
|
e_tail = binsearch(e_head, e = e_tail);
|
||||||
sl = recover(o_tail--, o, oks,
|
sl = recover(o_tail--, o, oks,
|
||||||
e_tail--, e, eks, rem, sl, in);
|
e_tail--, e, eks, rem, sl, in);
|
||||||
}
|
} else if (*o_tail > *e_tail)
|
||||||
else if(*o_tail > *e_tail)
|
|
||||||
o_tail = binsearch(o_head, o_tail) - 1;
|
o_tail = binsearch(o_head, o_tail) - 1;
|
||||||
else
|
else
|
||||||
e_tail = binsearch(e_head, e_tail) - 1;
|
e_tail = binsearch(e_head, e_tail) - 1;
|
||||||
@@ -176,8 +174,7 @@ recover(uint32_t *o_head, uint32_t *o_tail, uint32_t oks,
|
|||||||
* additionally you can use the in parameter to specify the value
|
* additionally you can use the in parameter to specify the value
|
||||||
* that was fed into the lfsr at the time the keystream was generated
|
* that was fed into the lfsr at the time the keystream was generated
|
||||||
*/
|
*/
|
||||||
struct Crypto1State* lfsr_recovery32(uint32_t ks2, uint32_t in)
|
struct Crypto1State *lfsr_recovery32(uint32_t ks2, uint32_t in) {
|
||||||
{
|
|
||||||
struct Crypto1State *statelist;
|
struct Crypto1State *statelist;
|
||||||
uint32_t *odd_head = 0, *odd_tail = 0, oks = 0;
|
uint32_t *odd_head = 0, *odd_tail = 0, oks = 0;
|
||||||
uint32_t *even_head = 0, *even_tail = 0, eks = 0;
|
uint32_t *even_head = 0, *even_tail = 0, eks = 0;
|
||||||
@@ -220,29 +217,32 @@ out:
|
|||||||
|
|
||||||
static const uint32_t S1[] = { 0x62141, 0x310A0, 0x18850, 0x0C428, 0x06214,
|
static const uint32_t S1[] = { 0x62141, 0x310A0, 0x18850, 0x0C428, 0x06214,
|
||||||
0x0310A, 0x85E30, 0xC69AD, 0x634D6, 0xB5CDE, 0xDE8DA, 0x6F46D, 0xB3C83,
|
0x0310A, 0x85E30, 0xC69AD, 0x634D6, 0xB5CDE, 0xDE8DA, 0x6F46D, 0xB3C83,
|
||||||
0x59E41, 0xA8995, 0xD027F, 0x6813F, 0x3409F, 0x9E6FA};
|
0x59E41, 0xA8995, 0xD027F, 0x6813F, 0x3409F, 0x9E6FA
|
||||||
|
};
|
||||||
static const uint32_t S2[] = { 0x3A557B00, 0x5D2ABD80, 0x2E955EC0, 0x174AAF60,
|
static const uint32_t S2[] = { 0x3A557B00, 0x5D2ABD80, 0x2E955EC0, 0x174AAF60,
|
||||||
0x0BA557B0, 0x05D2ABD8, 0x0449DE68, 0x048464B0, 0x42423258, 0x278192A8,
|
0x0BA557B0, 0x05D2ABD8, 0x0449DE68, 0x048464B0, 0x42423258, 0x278192A8,
|
||||||
0x156042D0, 0x0AB02168, 0x43F89B30, 0x61FC4D98, 0x765EAD48, 0x7D8FDD20,
|
0x156042D0, 0x0AB02168, 0x43F89B30, 0x61FC4D98, 0x765EAD48, 0x7D8FDD20,
|
||||||
0x7EC7EE90, 0x7F63F748, 0x79117020};
|
0x7EC7EE90, 0x7F63F748, 0x79117020
|
||||||
|
};
|
||||||
static const uint32_t T1[] = {
|
static const uint32_t T1[] = {
|
||||||
0x4F37D, 0x279BE, 0x97A6A, 0x4BD35, 0x25E9A, 0x12F4D, 0x097A6, 0x80D66,
|
0x4F37D, 0x279BE, 0x97A6A, 0x4BD35, 0x25E9A, 0x12F4D, 0x097A6, 0x80D66,
|
||||||
0xC4006, 0x62003, 0xB56B4, 0x5AB5A, 0xA9318, 0xD0F39, 0x6879C, 0xB057B,
|
0xC4006, 0x62003, 0xB56B4, 0x5AB5A, 0xA9318, 0xD0F39, 0x6879C, 0xB057B,
|
||||||
0x582BD, 0x2C15E, 0x160AF, 0x8F6E2, 0xC3DC4, 0xE5857, 0x72C2B, 0x39615,
|
0x582BD, 0x2C15E, 0x160AF, 0x8F6E2, 0xC3DC4, 0xE5857, 0x72C2B, 0x39615,
|
||||||
0x98DBF, 0xC806A, 0xE0680, 0x70340, 0x381A0, 0x98665, 0x4C332, 0xA272C};
|
0x98DBF, 0xC806A, 0xE0680, 0x70340, 0x381A0, 0x98665, 0x4C332, 0xA272C
|
||||||
|
};
|
||||||
static const uint32_t T2[] = { 0x3C88B810, 0x5E445C08, 0x2982A580, 0x14C152C0,
|
static const uint32_t T2[] = { 0x3C88B810, 0x5E445C08, 0x2982A580, 0x14C152C0,
|
||||||
0x4A60A960, 0x253054B0, 0x52982A58, 0x2FEC9EA8, 0x1156C4D0, 0x08AB6268,
|
0x4A60A960, 0x253054B0, 0x52982A58, 0x2FEC9EA8, 0x1156C4D0, 0x08AB6268,
|
||||||
0x42F53AB0, 0x217A9D58, 0x161DC528, 0x0DAE6910, 0x46D73488, 0x25CB11C0,
|
0x42F53AB0, 0x217A9D58, 0x161DC528, 0x0DAE6910, 0x46D73488, 0x25CB11C0,
|
||||||
0x52E588E0, 0x6972C470, 0x34B96238, 0x5CFC3A98, 0x28DE96C8, 0x12CFC0E0,
|
0x52E588E0, 0x6972C470, 0x34B96238, 0x5CFC3A98, 0x28DE96C8, 0x12CFC0E0,
|
||||||
0x4967E070, 0x64B3F038, 0x74F97398, 0x7CDC3248, 0x38CE92A0, 0x1C674950,
|
0x4967E070, 0x64B3F038, 0x74F97398, 0x7CDC3248, 0x38CE92A0, 0x1C674950,
|
||||||
0x0E33A4A8, 0x01B959D0, 0x40DCACE8, 0x26CEDDF0};
|
0x0E33A4A8, 0x01B959D0, 0x40DCACE8, 0x26CEDDF0
|
||||||
|
};
|
||||||
static const uint32_t C1[] = { 0x846B5, 0x4235A, 0x211AD};
|
static const uint32_t C1[] = { 0x846B5, 0x4235A, 0x211AD};
|
||||||
static const uint32_t C2[] = { 0x1A822E0, 0x21A822E0, 0x21A822E0};
|
static const uint32_t C2[] = { 0x1A822E0, 0x21A822E0, 0x21A822E0};
|
||||||
/** Reverse 64 bits of keystream into possible cipher states
|
/** Reverse 64 bits of keystream into possible cipher states
|
||||||
* Variation mentioned in the paper. Somewhat optimized version
|
* Variation mentioned in the paper. Somewhat optimized version
|
||||||
*/
|
*/
|
||||||
struct Crypto1State* lfsr_recovery64(uint32_t ks2, uint32_t ks3)
|
struct Crypto1State *lfsr_recovery64(uint32_t ks2, uint32_t ks3) {
|
||||||
{
|
|
||||||
struct Crypto1State *statelist, *sl;
|
struct Crypto1State *statelist, *sl;
|
||||||
uint8_t oks[32], eks[32], hi[32];
|
uint8_t oks[32], eks[32], hi[32];
|
||||||
uint32_t low = 0, win = 0;
|
uint32_t low = 0, win = 0;
|
||||||
@@ -302,12 +302,18 @@ struct Crypto1State* lfsr_recovery64(uint32_t ks2, uint32_t ks3)
|
|||||||
sl->even = win;
|
sl->even = win;
|
||||||
++sl;
|
++sl;
|
||||||
sl->odd = sl->even = 0;
|
sl->odd = sl->even = 0;
|
||||||
continue2:;
|
continue2:
|
||||||
|
;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
return statelist;
|
return statelist;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
uint8_t lfsr_rollback_bit(struct Crypto1State *s, uint32_t in, int fb);
|
||||||
|
uint8_t lfsr_rollback_byte(struct Crypto1State *s, uint32_t in, int fb);
|
||||||
|
uint32_t lfsr_rollback_word(struct Crypto1State *s, uint32_t in, int fb);
|
||||||
|
uint32_t *lfsr_prefix_ks(uint8_t ks[8], int isodd);
|
||||||
|
|
||||||
/** lfsr_rollback_bit
|
/** lfsr_rollback_bit
|
||||||
* Rollback the shift register in order to get previous states
|
* Rollback the shift register in order to get previous states
|
||||||
*/
|
*/
|
||||||
@@ -373,7 +379,8 @@ int nonce_distance(uint32_t from, uint32_t to)
|
|||||||
|
|
||||||
static uint32_t fastfwd[2][8] = {
|
static uint32_t fastfwd[2][8] = {
|
||||||
{ 0, 0x4BC53, 0xECB1, 0x450E2, 0x25E29, 0x6E27A, 0x2B298, 0x60ECB},
|
{ 0, 0x4BC53, 0xECB1, 0x450E2, 0x25E29, 0x6E27A, 0x2B298, 0x60ECB},
|
||||||
{ 0, 0x1D962, 0x4BC53, 0x56531, 0xECB1, 0x135D3, 0x450E2, 0x58980}};
|
{ 0, 0x1D962, 0x4BC53, 0x56531, 0xECB1, 0x135D3, 0x450E2, 0x58980}
|
||||||
|
};
|
||||||
|
|
||||||
|
|
||||||
/** lfsr_prefix_ks
|
/** lfsr_prefix_ks
|
||||||
@@ -415,8 +422,7 @@ uint32_t *lfsr_prefix_ks(uint8_t ks[8], int isodd)
|
|||||||
*/
|
*/
|
||||||
static struct Crypto1State *
|
static struct Crypto1State *
|
||||||
check_pfx_parity(uint32_t prefix, uint32_t rresp, uint8_t parities[8][8],
|
check_pfx_parity(uint32_t prefix, uint32_t rresp, uint8_t parities[8][8],
|
||||||
uint32_t odd, uint32_t even, struct Crypto1State* sl)
|
uint32_t odd, uint32_t even, struct Crypto1State *sl) {
|
||||||
{
|
|
||||||
uint32_t ks1, nr, ks2, rr, ks3, c, good = 1;
|
uint32_t ks1, nr, ks2, rr, ks3, c, good = 1;
|
||||||
|
|
||||||
for (c = 0; good && c < 8; ++c) {
|
for (c = 0; good && c < 8; ++c) {
|
||||||
@@ -444,6 +450,8 @@ check_pfx_parity(uint32_t prefix, uint32_t rresp, uint8_t parities[8][8],
|
|||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
struct Crypto1State *lfsr_common_prefix(uint32_t pfx, uint32_t rr, uint8_t ks[8], uint8_t par[8][8]);
|
||||||
|
|
||||||
/** lfsr_common_prefix
|
/** lfsr_common_prefix
|
||||||
* Implentation of the common prefix attack.
|
* Implentation of the common prefix attack.
|
||||||
* Requires the 29 bit constant prefix used as reader nonce (pfx)
|
* Requires the 29 bit constant prefix used as reader nonce (pfx)
|
||||||
@@ -454,8 +462,7 @@ check_pfx_parity(uint32_t prefix, uint32_t rresp, uint8_t parities[8][8],
|
|||||||
* tag nonce was fed in
|
* tag nonce was fed in
|
||||||
*/
|
*/
|
||||||
struct Crypto1State *
|
struct Crypto1State *
|
||||||
lfsr_common_prefix(uint32_t pfx, uint32_t rr, uint8_t ks[8], uint8_t par[8][8])
|
lfsr_common_prefix(uint32_t pfx, uint32_t rr, uint8_t ks[8], uint8_t par[8][8]) {
|
||||||
{
|
|
||||||
struct Crypto1State *statelist, *s;
|
struct Crypto1State *statelist, *s;
|
||||||
uint32_t *odd, *even, *o, *e, top;
|
uint32_t *odd, *even, *o, *e, top;
|
||||||
|
|
||||||
|
|||||||
@@ -37,6 +37,7 @@ struct Crypto1State* lfsr_recovery32(uint32_t ks2, uint32_t in);
|
|||||||
struct Crypto1State *lfsr_recovery64(uint32_t ks2, uint32_t ks3);
|
struct Crypto1State *lfsr_recovery64(uint32_t ks2, uint32_t ks3);
|
||||||
|
|
||||||
void lfsr_rollback(struct Crypto1State *s, uint32_t in, int fb);
|
void lfsr_rollback(struct Crypto1State *s, uint32_t in, int fb);
|
||||||
|
uint32_t lfsr_rollback_word(struct Crypto1State *s, uint32_t in, int fb);
|
||||||
int nonce_distance(uint32_t from, uint32_t to);
|
int nonce_distance(uint32_t from, uint32_t to);
|
||||||
#define FOREACH_VALID_NONCE(N, FILTER, FSIZE)\
|
#define FOREACH_VALID_NONCE(N, FILTER, FSIZE)\
|
||||||
uint32_t __n = 0,__M = 0, N = 0;\
|
uint32_t __n = 0,__M = 0, N = 0;\
|
||||||
@@ -61,7 +62,7 @@ static inline int parity(uint32_t x)
|
|||||||
x ^= x >> 4;
|
x ^= x >> 4;
|
||||||
return BIT(0x6996, x & 0xf);
|
return BIT(0x6996, x & 0xf);
|
||||||
#else
|
#else
|
||||||
asm( "movl %1, %%eax\n"
|
__asm__("movl %1, %%eax\n"
|
||||||
"mov %%ax, %%cx\n"
|
"mov %%ax, %%cx\n"
|
||||||
"shrl $0x10, %%eax\n"
|
"shrl $0x10, %%eax\n"
|
||||||
"xor %%ax, %%cx\n"
|
"xor %%ax, %%cx\n"
|
||||||
|
|||||||
@@ -23,8 +23,7 @@
|
|||||||
#define SWAPENDIAN(x)\
|
#define SWAPENDIAN(x)\
|
||||||
(x = (x >> 8 & 0xff00ff) | (x & 0xff00ff) << 8, x = x >> 16 | x << 16)
|
(x = (x >> 8 & 0xff00ff) | (x & 0xff00ff) << 8, x = x >> 16 | x << 16)
|
||||||
|
|
||||||
struct Crypto1State * crypto1_create(uint64_t key)
|
struct Crypto1State *crypto1_create(uint64_t key) {
|
||||||
{
|
|
||||||
struct Crypto1State *s = malloc(sizeof(*s));
|
struct Crypto1State *s = malloc(sizeof(*s));
|
||||||
int i;
|
int i;
|
||||||
|
|
||||||
|
|||||||
41
src/mfoc.1
Normal file
41
src/mfoc.1
Normal file
@@ -0,0 +1,41 @@
|
|||||||
|
.\" Hey, EMACS: -*- nroff -*-
|
||||||
|
.TH MFOC 1 "May 13, 2011"
|
||||||
|
.SH NAME
|
||||||
|
mfoc \- MIFARE Classic offline cracker
|
||||||
|
.SH SYNOPSIS
|
||||||
|
.B mfoc
|
||||||
|
[ \fB\-h\fP ]
|
||||||
|
[ \fB\-k\fP \fIKEY\fR ]...
|
||||||
|
[ \fB\-O\fP \fIFILE\fR ]
|
||||||
|
[ \fB\-P\fP \fINUM\fR ]
|
||||||
|
[ \fB\-T\fP \fINUM\fR ]
|
||||||
|
.SH DESCRIPTION
|
||||||
|
This manual page documents briefly the
|
||||||
|
.B mfoc
|
||||||
|
command.
|
||||||
|
.PP
|
||||||
|
\fBmfoc\fP is a program that cracks the encryption of a MIFARE Classic chip and dumps the chip's keys and decrypted memory contents to a file.
|
||||||
|
To run it you need to have access to an NFC reader and, of course, a card equipped with a MIFARE Classic chip.
|
||||||
|
.SH OPTIONS
|
||||||
|
A summary of options is included below.
|
||||||
|
.TP
|
||||||
|
\fB\-h\fP
|
||||||
|
Show summary of options.
|
||||||
|
.TP
|
||||||
|
\fB\-k\fP \fIKEY\fR
|
||||||
|
Initially try KEY in addition to the default keys.
|
||||||
|
.TP
|
||||||
|
\fB\-O\fP \fIFILE\fR
|
||||||
|
Dump card contents to FILE.
|
||||||
|
.TP
|
||||||
|
\fB\-P\fP \fINUM\fR
|
||||||
|
Probe each sector up to NUM times. Default is 20.
|
||||||
|
.TP
|
||||||
|
\fB\-T\fP \fINUM\fR
|
||||||
|
Set half the range for a possible distance tolerance to NUM. Default is 20 (for a total range of 40).
|
||||||
|
.SH AUTHOR
|
||||||
|
.B mfoc
|
||||||
|
was written by Norbert Szetei and Pavol Luptak with contributions by others.
|
||||||
|
.PP
|
||||||
|
This manual page was written by Thomas Hood <jdthood@gmail.com>.
|
||||||
|
MIFARE is a trade mark of NXP bv, Netherlands.
|
||||||
306
src/mfoc.c
306
src/mfoc.c
@@ -30,13 +30,14 @@
|
|||||||
URL http://www.cs.ru.nl/~petervr/papers/grvw_2009_pickpocket.pdf
|
URL http://www.cs.ru.nl/~petervr/papers/grvw_2009_pickpocket.pdf
|
||||||
*/
|
*/
|
||||||
|
|
||||||
/* vim: set ts=2 sw=2 et: */
|
#define _XOPEN_SOURCE 1 // To enable getopt
|
||||||
|
|
||||||
#include <stdio.h>
|
#include <stdio.h>
|
||||||
#include <stdlib.h>
|
#include <stdlib.h>
|
||||||
#include <unistd.h>
|
|
||||||
#include <string.h>
|
#include <string.h>
|
||||||
|
|
||||||
|
#include <unistd.h>
|
||||||
|
|
||||||
// NFC
|
// NFC
|
||||||
#include <nfc/nfc.h>
|
#include <nfc/nfc.h>
|
||||||
|
|
||||||
@@ -49,13 +50,16 @@
|
|||||||
#include "nfc-utils.h"
|
#include "nfc-utils.h"
|
||||||
#include "mfoc.h"
|
#include "mfoc.h"
|
||||||
|
|
||||||
int main(int argc, char * const argv[]) {
|
nfc_context *context;
|
||||||
const nfc_modulation_t nm = {
|
|
||||||
|
int main(int argc, char *const argv[])
|
||||||
|
{
|
||||||
|
const nfc_modulation nm = {
|
||||||
.nmt = NMT_ISO14443A,
|
.nmt = NMT_ISO14443A,
|
||||||
.nbr = NBR_106,
|
.nbr = NBR_106,
|
||||||
};
|
};
|
||||||
|
|
||||||
int ch, i, k, n, j, m, o;
|
int ch, i, k, n, j, m;
|
||||||
int key, block;
|
int key, block;
|
||||||
int succeed = 1;
|
int succeed = 1;
|
||||||
|
|
||||||
@@ -70,11 +74,11 @@ int main(int argc, char * const argv[]) {
|
|||||||
bool skip = false;
|
bool skip = false;
|
||||||
|
|
||||||
// Next default key specified as option (-k)
|
// Next default key specified as option (-k)
|
||||||
byte_t * defKey = NULL;
|
uint8_t *defKeys = NULL, *p;
|
||||||
|
size_t defKeys_len = 0;
|
||||||
|
|
||||||
// Array with default Mifare Classic keys
|
// Array with default Mifare Classic keys
|
||||||
byte_t defaultKeys[][6] = {
|
uint8_t defaultKeys[][6] = {
|
||||||
{0xff, 0xff, 0xff, 0xff, 0xff, 0xff}, // User defined key slot
|
|
||||||
{0xff, 0xff, 0xff, 0xff, 0xff, 0xff}, // Default key (first key used by program if no user defined key)
|
{0xff, 0xff, 0xff, 0xff, 0xff, 0xff}, // Default key (first key used by program if no user defined key)
|
||||||
{0xa0, 0xa1, 0xa2, 0xa3, 0xa4, 0xa5}, // NFCForum MAD key
|
{0xa0, 0xa1, 0xa2, 0xa3, 0xa4, 0xa5}, // NFCForum MAD key
|
||||||
{0xd3, 0xf7, 0xd3, 0xf7, 0xd3, 0xf7}, // NFCForum content key
|
{0xd3, 0xf7, 0xd3, 0xf7, 0xd3, 0xf7}, // NFCForum content key
|
||||||
@@ -119,25 +123,29 @@ int main(int argc, char * const argv[]) {
|
|||||||
}
|
}
|
||||||
// fprintf(stdout, "Number of probes: %d\n", probes);
|
// fprintf(stdout, "Number of probes: %d\n", probes);
|
||||||
break;
|
break;
|
||||||
case 'T':
|
case 'T': {
|
||||||
|
int res;
|
||||||
// Nonce tolerance range
|
// Nonce tolerance range
|
||||||
if (!(d.tolerance = atoi(optarg)) || d.tolerance < 0) {
|
if (((res = atoi(optarg)) < 0)) {
|
||||||
ERR("The nonce distances range must be a zero or a positive number");
|
ERR("The nonce distances range must be a zero or a positive number");
|
||||||
exit(EXIT_FAILURE);
|
exit(EXIT_FAILURE);
|
||||||
}
|
}
|
||||||
|
d.tolerance = (uint32_t)res;
|
||||||
// fprintf(stdout, "Tolerance number: %d\n", probes);
|
// fprintf(stdout, "Tolerance number: %d\n", probes);
|
||||||
|
}
|
||||||
break;
|
break;
|
||||||
case 'k':
|
case 'k':
|
||||||
// Add this key to the default keys list
|
// Add this key to the default keys
|
||||||
if ((defKey = calloc(6, sizeof(byte_t))) == NULL) {
|
p = realloc(defKeys, defKeys_len + 6);
|
||||||
ERR ("Cannot allocate memory for defKey");
|
if (!p) {
|
||||||
|
ERR("Cannot allocate memory for defKeys");
|
||||||
exit(EXIT_FAILURE);
|
exit(EXIT_FAILURE);
|
||||||
} else {
|
|
||||||
bzero(defKey, 6);
|
|
||||||
num_to_bytes(strtoll(optarg, NULL, 16), 6, defKey);
|
|
||||||
memcpy(defaultKeys[0], defKey, 6);
|
|
||||||
}
|
}
|
||||||
fprintf(stdout, "The custom key 0x%012llx has been added to the default keys\n", bytes_to_num(defKey, 6));
|
defKeys = p;
|
||||||
|
memset(defKeys + defKeys_len, 0, 6);
|
||||||
|
num_to_bytes(strtoll(optarg, NULL, 16), 6, defKeys + defKeys_len);
|
||||||
|
fprintf(stdout, "The custom key 0x%012llx has been added to the default keys\n", bytes_to_num(defKeys + defKeys_len, 6));
|
||||||
|
defKeys_len = defKeys_len + 6;
|
||||||
|
|
||||||
break;
|
break;
|
||||||
case 'O':
|
case 'O':
|
||||||
@@ -163,29 +171,29 @@ int main(int argc, char * const argv[]) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
// Initialize reader/tag structures
|
// Initialize reader/tag structures
|
||||||
mf_init(&t, &r);
|
mf_init(&r);
|
||||||
|
|
||||||
if (!nfc_initiator_init (r.pdi)) {
|
if (nfc_initiator_init(r.pdi) < 0) {
|
||||||
nfc_perror(r.pdi, "nfc_initiator_init");
|
nfc_perror(r.pdi, "nfc_initiator_init");
|
||||||
goto error;
|
goto error;
|
||||||
}
|
}
|
||||||
// Drop the field for a while, so can be reset
|
// Drop the field for a while, so can be reset
|
||||||
if (!nfc_configure(r.pdi, NDO_ACTIVATE_FIELD, true)) {
|
if (nfc_device_set_property_bool(r.pdi, NP_ACTIVATE_FIELD, true) < 0) {
|
||||||
nfc_perror (r.pdi, "nfc_configure activate field");
|
nfc_perror(r.pdi, "nfc_device_set_property_bool activate field");
|
||||||
goto error;
|
goto error;
|
||||||
}
|
}
|
||||||
// Let the reader only try once to find a tag
|
// Let the reader only try once to find a tag
|
||||||
if (!nfc_configure(r.pdi, NDO_INFINITE_SELECT, false)) {
|
if (nfc_device_set_property_bool(r.pdi, NP_INFINITE_SELECT, false) < 0) {
|
||||||
nfc_perror (r.pdi, "nfc_configure infinite select");
|
nfc_perror(r.pdi, "nfc_device_set_property_bool infinite select");
|
||||||
goto error;
|
goto error;
|
||||||
}
|
}
|
||||||
// Configure the CRC and Parity settings
|
// Configure the CRC and Parity settings
|
||||||
if (!nfc_configure(r.pdi, NDO_HANDLE_CRC, true)) {
|
if (nfc_device_set_property_bool(r.pdi, NP_HANDLE_CRC, true) < 0) {
|
||||||
nfc_perror (r.pdi, "nfc_configure crc");
|
nfc_perror(r.pdi, "nfc_device_set_property_bool crc");
|
||||||
goto error;
|
goto error;
|
||||||
}
|
}
|
||||||
if (!nfc_configure(r.pdi, NDO_HANDLE_PARITY, true)) {
|
if (nfc_device_set_property_bool(r.pdi, NP_HANDLE_PARITY, true) < 0) {
|
||||||
nfc_perror (r.pdi, "nfc_configure parity");
|
nfc_perror(r.pdi, "nfc_device_set_property_bool parity");
|
||||||
goto error;
|
goto error;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -195,7 +203,7 @@ int main(int argc, char * const argv[]) {
|
|||||||
*/
|
*/
|
||||||
|
|
||||||
// mf_select_tag(r.pdi, &(t.nt));
|
// mf_select_tag(r.pdi, &(t.nt));
|
||||||
if (!nfc_initiator_select_passive_target (r.pdi, nm, NULL, 0, &t.nt)) {
|
if (nfc_initiator_select_passive_target(r.pdi, nm, NULL, 0, &t.nt) < 0) {
|
||||||
nfc_perror(r.pdi, "nfc_initiator_select_passive_target");
|
nfc_perror(r.pdi, "nfc_initiator_select_passive_target");
|
||||||
goto error;
|
goto error;
|
||||||
}
|
}
|
||||||
@@ -206,13 +214,9 @@ int main(int argc, char * const argv[]) {
|
|||||||
goto error;
|
goto error;
|
||||||
}
|
}
|
||||||
|
|
||||||
// TODO: Support Mifare Classic with 7 bytes UID ?
|
|
||||||
if (t.nt.nti.nai.szUidLen != 4) {
|
|
||||||
ERR ("only Mifare Classic with UID on 4 bytes are supported");
|
|
||||||
}
|
|
||||||
// Save tag's block size (b4K)
|
// Save tag's block size (b4K)
|
||||||
t.b4K = (t.nt.nti.nai.abtAtqa[1] == 0x02);
|
t.b4K = (t.nt.nti.nai.abtAtqa[1] == 0x02);
|
||||||
t.uid = (uint32_t) bytes_to_num(t.nt.nti.nai.abtUid, 4);
|
t.authuid = (uint32_t) bytes_to_num(t.nt.nti.nai.abtUid + t.nt.nti.nai.szUidLen - 4, 4);
|
||||||
|
|
||||||
t.num_blocks = (t.b4K) ? 0xff : 0x3f;
|
t.num_blocks = (t.b4K) ? 0xff : 0x3f;
|
||||||
t.num_sectors = t.b4K ? NR_TRAILERS_4k : NR_TRAILERS_1k;
|
t.num_sectors = t.b4K ? NR_TRAILERS_4k : NR_TRAILERS_1k;
|
||||||
@@ -234,27 +238,34 @@ int main(int argc, char * const argv[]) {
|
|||||||
bk->size = 0;
|
bk->size = 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
d.distances = (void *) calloc(d.num_distances, sizeof(u_int32_t));
|
d.distances = (void *) calloc(d.num_distances, sizeof(uint32_t));
|
||||||
if (d.distances == NULL) {
|
if (d.distances == NULL) {
|
||||||
ERR("Cannot allocate memory for t.distances");
|
ERR("Cannot allocate memory for t.distances");
|
||||||
goto error;
|
goto error;
|
||||||
}
|
}
|
||||||
|
|
||||||
// Initialize t.sectors, keys are not known yet
|
// Initialize t.sectors, keys are not known yet
|
||||||
for (i = 0; i < (t.num_sectors); ++i) {
|
for (uint8_t s = 0; s < (t.num_sectors); ++s) {
|
||||||
t.sectors[i].foundKeyA = t.sectors[i].foundKeyB = false;
|
t.sectors[s].foundKeyA = t.sectors[s].foundKeyB = false;
|
||||||
}
|
}
|
||||||
|
|
||||||
print_nfc_iso14443a_info (t.nt.nti.nai, true);
|
print_nfc_target(t.nt, true);
|
||||||
|
|
||||||
// Try to authenticate to all sectors with default keys
|
// Try to authenticate to all sectors with default keys
|
||||||
// Set the authentication information (uid)
|
// Set the authentication information (uid)
|
||||||
memcpy(mp.mpa.abtUid, t.nt.nti.nai.abtUid, sizeof(mp.mpa.abtUid));
|
memcpy(mp.mpa.abtAuthUid, t.nt.nti.nai.abtUid + t.nt.nti.nai.szUidLen - 4, sizeof(mp.mpa.abtAuthUid));
|
||||||
// Iterate over all keys (n = number of keys)
|
// Iterate over all keys (n = number of keys)
|
||||||
n = sizeof(defaultKeys) / sizeof(defaultKeys[0]);
|
n = sizeof(defaultKeys) / sizeof(defaultKeys[0]);
|
||||||
for (key = 0; key < n; key++) {
|
size_t defKey_bytes_todo = defKeys_len;
|
||||||
if (key == 0 && defKey == NULL) ++key; // Custom key not provided, try another key
|
key = 0;
|
||||||
|
while (key < n) {
|
||||||
|
if (defKey_bytes_todo > 0) {
|
||||||
|
memcpy(mp.mpa.abtKey, defKeys + defKeys_len - defKey_bytes_todo, sizeof(mp.mpa.abtKey));
|
||||||
|
defKey_bytes_todo -= sizeof(mp.mpa.abtKey);
|
||||||
|
} else {
|
||||||
memcpy(mp.mpa.abtKey, defaultKeys[key], sizeof(mp.mpa.abtKey));
|
memcpy(mp.mpa.abtKey, defaultKeys[key], sizeof(mp.mpa.abtKey));
|
||||||
|
key++;
|
||||||
|
}
|
||||||
fprintf(stdout, "[Key: %012llx] -> ", bytes_to_num(mp.mpa.abtKey, 6));
|
fprintf(stdout, "[Key: %012llx] -> ", bytes_to_num(mp.mpa.abtKey, 6));
|
||||||
fprintf(stdout, "[");
|
fprintf(stdout, "[");
|
||||||
i = 0; // Sector counter
|
i = 0; // Sector counter
|
||||||
@@ -286,14 +297,16 @@ int main(int argc, char * const argv[]) {
|
|||||||
t.sectors[i].foundKeyB = true;
|
t.sectors[i].foundKeyB = true;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
if ((t.sectors[i].foundKeyA) || (t.sectors[i].foundKeyB)) {
|
if ((t.sectors[i].foundKeyA) && (t.sectors[i].foundKeyB)) {
|
||||||
fprintf(stdout, "x");
|
fprintf(stdout, "x");
|
||||||
|
} else if (t.sectors[i].foundKeyA) {
|
||||||
|
fprintf(stdout, "/");
|
||||||
|
} else if (t.sectors[i].foundKeyB) {
|
||||||
|
fprintf(stdout, "\\");
|
||||||
} else {
|
} else {
|
||||||
fprintf(stdout, ".");
|
fprintf(stdout, ".");
|
||||||
}
|
}
|
||||||
fflush(stdout);
|
fflush(stdout);
|
||||||
mf_configure(r.pdi);
|
|
||||||
mf_anticollision(t, r);
|
|
||||||
// fprintf(stdout, "\nSuccess: AUTH [Key %c:%012llx] sector %02x t_block %02x\n",
|
// fprintf(stdout, "\nSuccess: AUTH [Key %c:%012llx] sector %02x t_block %02x\n",
|
||||||
// (mc == MC_AUTH_A ? 'A' :'B'), bytes_to_num(mp.mpa.abtKey, 6), i, block);
|
// (mc == MC_AUTH_A ? 'A' :'B'), bytes_to_num(mp.mpa.abtKey, 6), i, block);
|
||||||
// Save position of a trailer block to sector struct
|
// Save position of a trailer block to sector struct
|
||||||
@@ -319,12 +332,12 @@ int main(int argc, char * const argv[]) {
|
|||||||
for (m = 0; m < 2; ++m) {
|
for (m = 0; m < 2; ++m) {
|
||||||
if (e_sector == -1) break; // All keys are default, I am skipping recovery mode
|
if (e_sector == -1) break; // All keys are default, I am skipping recovery mode
|
||||||
for (j = 0; j < (t.num_sectors); ++j) {
|
for (j = 0; j < (t.num_sectors); ++j) {
|
||||||
memcpy(mp.mpa.abtUid, t.nt.nti.nai.abtUid, sizeof(mp.mpa.abtUid));
|
memcpy(mp.mpa.abtAuthUid, t.nt.nti.nai.abtUid + t.nt.nti.nai.szUidLen - 4, sizeof(mp.mpa.abtAuthUid));
|
||||||
if ((dumpKeysA && !t.sectors[j].foundKeyA) || (!dumpKeysA && !t.sectors[j].foundKeyB)) {
|
if ((dumpKeysA && !t.sectors[j].foundKeyA) || (!dumpKeysA && !t.sectors[j].foundKeyB)) {
|
||||||
|
|
||||||
// First, try already broken keys
|
// First, try already broken keys
|
||||||
skip = false;
|
skip = false;
|
||||||
for (o = 0; o < bk->size; o++) {
|
for (uint32_t o = 0; o < bk->size; o++) {
|
||||||
num_to_bytes(bk->brokenKeys[o], 6, mp.mpa.abtKey);
|
num_to_bytes(bk->brokenKeys[o], 6, mp.mpa.abtKey);
|
||||||
mc = dumpKeysA ? 0x60 : 0x61;
|
mc = dumpKeysA ? 0x60 : 0x61;
|
||||||
if (!nfc_initiator_mifare_cmd(r.pdi, mc, t.sectors[j].trailer, &mp)) {
|
if (!nfc_initiator_mifare_cmd(r.pdi, mc, t.sectors[j].trailer, &mp)) {
|
||||||
@@ -415,7 +428,7 @@ int main(int argc, char * const argv[]) {
|
|||||||
// We haven't found any key, exiting
|
// We haven't found any key, exiting
|
||||||
if ((dumpKeysA && !t.sectors[j].foundKeyA) || (!dumpKeysA && !t.sectors[j].foundKeyB)) {
|
if ((dumpKeysA && !t.sectors[j].foundKeyA) || (!dumpKeysA && !t.sectors[j].foundKeyB)) {
|
||||||
ERR("No success, maybe you should increase the probes");
|
ERR("No success, maybe you should increase the probes");
|
||||||
exit (EXIT_FAILURE);
|
goto error;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -483,14 +496,14 @@ int main(int argc, char * const argv[]) {
|
|||||||
memcpy(mtDump.amb[block].mbt.abtKeyB, t.sectors[i].KeyB, 6);
|
memcpy(mtDump.amb[block].mbt.abtKeyB, t.sectors[i].KeyB, 6);
|
||||||
if (!failure) memcpy(mtDump.amb[block].mbt.abtAccessBits, mp.mpd.abtData + 6, 4);
|
if (!failure) memcpy(mtDump.amb[block].mbt.abtAccessBits, mp.mpd.abtData + 6, 4);
|
||||||
} else if (!failure) memcpy(mtDump.amb[block].mbd.abtData, mp.mpd.abtData, 16);
|
} else if (!failure) memcpy(mtDump.amb[block].mbd.abtData, mp.mpd.abtData, 16);
|
||||||
memcpy(mp.mpa.abtUid,t.nt.nti.nai.abtUid,4);
|
memcpy(mp.mpa.abtAuthUid, t.nt.nti.nai.abtUid + t.nt.nti.nai.szUidLen - 4, sizeof(mp.mpa.abtAuthUid));
|
||||||
}
|
}
|
||||||
|
|
||||||
// Finally save all keys + data to file
|
// Finally save all keys + data to file
|
||||||
if (fwrite(&mtDump, 1, sizeof(mtDump), pfDump) != sizeof(mtDump)) {
|
if (fwrite(&mtDump, 1, sizeof(mtDump), pfDump) != sizeof(mtDump)) {
|
||||||
fprintf(stdout, "Error, cannot write dump\n");
|
fprintf(stdout, "Error, cannot write dump\n");
|
||||||
fclose(pfDump);
|
fclose(pfDump);
|
||||||
exit (EXIT_FAILURE);
|
goto error;
|
||||||
}
|
}
|
||||||
fclose(pfDump);
|
fclose(pfDump);
|
||||||
}
|
}
|
||||||
@@ -499,86 +512,96 @@ int main(int argc, char * const argv[]) {
|
|||||||
free(d.distances);
|
free(d.distances);
|
||||||
|
|
||||||
// Reset the "advanced" configuration to normal
|
// Reset the "advanced" configuration to normal
|
||||||
nfc_configure(r.pdi, NDO_HANDLE_CRC, true);
|
nfc_device_set_property_bool(r.pdi, NP_HANDLE_CRC, true);
|
||||||
nfc_configure(r.pdi, NDO_HANDLE_PARITY, true);
|
nfc_device_set_property_bool(r.pdi, NP_HANDLE_PARITY, true);
|
||||||
|
|
||||||
// Disconnect device and exit
|
// Disconnect device and exit
|
||||||
nfc_disconnect(r.pdi);
|
nfc_close(r.pdi);
|
||||||
|
nfc_exit(context);
|
||||||
exit(EXIT_SUCCESS);
|
exit(EXIT_SUCCESS);
|
||||||
error:
|
error:
|
||||||
nfc_disconnect(r.pdi);
|
nfc_close(r.pdi);
|
||||||
|
nfc_exit(context);
|
||||||
exit(EXIT_FAILURE);
|
exit(EXIT_FAILURE);
|
||||||
}
|
}
|
||||||
|
|
||||||
void usage(FILE * stream, int errno) {
|
void usage(FILE *stream, int errno)
|
||||||
fprintf(stream, "mfoc %s\n\n", PACKAGE_VERSION);
|
{
|
||||||
fprintf(stream, "usage: mfoc [-h] [-P probnum] [-T tolerance] [-k custom_key] [-O output]\n\n");
|
fprintf(stream, "Usage: mfoc [-h] [-k key]... [-P probnum] [-T tolerance] [-O output]\n");
|
||||||
fprintf(stream, "example: mfoc -O card_dump\n");
|
|
||||||
fprintf(stream, "example: mfoc -k ffffeeeedddd -O card_dump\n");
|
|
||||||
fprintf(stream, "example: mfoc -P 50 -O card_dump\n");
|
|
||||||
fprintf(stream, "\n");
|
fprintf(stream, "\n");
|
||||||
fprintf(stream, " h : print this help\n");
|
fprintf(stream, " h print this help and exit\n");
|
||||||
// fprintf(stream, " B : instead of 'A' dump 'B' keys\n");
|
// fprintf(stream, " B instead of 'A' dump 'B' keys\n");
|
||||||
fprintf(stream, " k : use a specified key instead of looking for defaults ones\n");
|
fprintf(stream, " k try the specified key in addition to the default keys\n");
|
||||||
// fprintf(stream, " D : number of distance probes, default is 20\n");
|
// fprintf(stream, " D number of distance probes, default is 20\n");
|
||||||
// fprintf(stream, " S : number of sets with keystreams, default is 5\n");
|
// fprintf(stream, " S number of sets with keystreams, default is 5\n");
|
||||||
fprintf(stream, " P : number of probes for a key recovery for one sector, default is 20\n");
|
fprintf(stream, " P number of probes per sector, instead of default of 20\n");
|
||||||
fprintf(stream, " T : range for a possible distance tolerance, default is 20 (40 in both direction)\n");
|
fprintf(stream, " T nonce tolerance half-range, instead of default of 20\n (i.e., 40 for the total range, in both directions)\n");
|
||||||
// fprintf(stream, " s : specify the list of sectors to crack, for example -s 0,1,3,5\n");
|
// fprintf(stream, " s specify the list of sectors to crack, for example -s 0,1,3,5\n");
|
||||||
fprintf(stream, " O : dump file where the revealed keys should be stored\n");
|
fprintf(stream, " O file in which the card contents will be written (REQUIRED)\n");
|
||||||
fprintf(stream, "\n");
|
fprintf(stream, "\n");
|
||||||
|
fprintf(stream, "Example: mfoc -O mycard.mfd\n");
|
||||||
|
fprintf(stream, "Example: mfoc -k ffffeeeedddd -O mycard.mfd\n");
|
||||||
|
fprintf(stream, "Example: mfoc -P 50 -T 30 -O mycard.mfd\n");
|
||||||
|
fprintf(stream, "\n");
|
||||||
|
fprintf(stream, "This is mfoc version %s.\n", PACKAGE_VERSION);
|
||||||
|
fprintf(stream, "For more information, run: 'man mfoc'.\n");
|
||||||
exit(errno);
|
exit(errno);
|
||||||
}
|
}
|
||||||
|
|
||||||
void mf_init(mftag *t, mfreader *r) {
|
void mf_init(mfreader *r)
|
||||||
|
{
|
||||||
// Connect to the first NFC device
|
// Connect to the first NFC device
|
||||||
r->pdi = nfc_connect(NULL);
|
nfc_init(&context);
|
||||||
|
r->pdi = nfc_open(context, NULL);
|
||||||
if (!r->pdi) {
|
if (!r->pdi) {
|
||||||
ERR ("Unable to connect to NFC device\n");
|
printf("No NFC device found.\n");
|
||||||
exit(EXIT_FAILURE);
|
exit(EXIT_FAILURE);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
void mf_configure(nfc_device_t* pdi) {
|
void mf_configure(nfc_device *pdi)
|
||||||
if (!nfc_initiator_init (pdi)) {
|
{
|
||||||
|
if (nfc_initiator_init(pdi) < 0) {
|
||||||
nfc_perror(pdi, "nfc_initiator_init");
|
nfc_perror(pdi, "nfc_initiator_init");
|
||||||
exit(EXIT_FAILURE);
|
exit(EXIT_FAILURE);
|
||||||
}
|
}
|
||||||
// Drop the field for a while, so can be reset
|
// Drop the field for a while, so can be reset
|
||||||
if (!nfc_configure(pdi, NDO_ACTIVATE_FIELD, false)) {
|
if (nfc_device_set_property_bool(pdi, NP_ACTIVATE_FIELD, false) < 0) {
|
||||||
nfc_perror (pdi, "nfc_configure activate field");
|
nfc_perror(pdi, "nfc_device_set_property_bool activate field");
|
||||||
exit(EXIT_FAILURE);
|
exit(EXIT_FAILURE);
|
||||||
}
|
}
|
||||||
// Let the reader only try once to find a tag
|
// Let the reader only try once to find a tag
|
||||||
if (!nfc_configure(pdi, NDO_INFINITE_SELECT, false)) {
|
if (nfc_device_set_property_bool(pdi, NP_INFINITE_SELECT, false) < 0) {
|
||||||
nfc_perror (pdi, "nfc_configure infinite select");
|
nfc_perror(pdi, "nfc_device_set_property_bool infinite select");
|
||||||
exit(EXIT_FAILURE);
|
exit(EXIT_FAILURE);
|
||||||
}
|
}
|
||||||
// Configure the CRC and Parity settings
|
// Configure the CRC and Parity settings
|
||||||
if (!nfc_configure(pdi, NDO_HANDLE_CRC, true)) {
|
if (nfc_device_set_property_bool(pdi, NP_HANDLE_CRC, true) < 0) {
|
||||||
nfc_perror (pdi, "nfc_configure crc");
|
nfc_perror(pdi, "nfc_device_set_property_bool crc");
|
||||||
exit(EXIT_FAILURE);
|
exit(EXIT_FAILURE);
|
||||||
}
|
}
|
||||||
if (!nfc_configure(pdi, NDO_HANDLE_PARITY, true)) {
|
if (nfc_device_set_property_bool(pdi, NP_HANDLE_PARITY, true) < 0) {
|
||||||
nfc_perror (pdi, "nfc_configure parity");
|
nfc_perror(pdi, "nfc_device_set_property_bool parity");
|
||||||
exit(EXIT_FAILURE);
|
exit(EXIT_FAILURE);
|
||||||
}
|
}
|
||||||
// Enable the field so more power consuming cards can power themselves up
|
// Enable the field so more power consuming cards can power themselves up
|
||||||
if (!nfc_configure(pdi, NDO_ACTIVATE_FIELD, true)) {
|
if (nfc_device_set_property_bool(pdi, NP_ACTIVATE_FIELD, true) < 0) {
|
||||||
nfc_perror (pdi, "nfc_configure activate field");
|
nfc_perror(pdi, "nfc_device_set_property_bool activate field");
|
||||||
exit(EXIT_FAILURE);
|
exit(EXIT_FAILURE);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
void mf_select_tag(nfc_device_t* pdi, nfc_target_t* pnt) {
|
void mf_select_tag(nfc_device *pdi, nfc_target *pnt)
|
||||||
|
{
|
||||||
// Poll for a ISO14443A (MIFARE) tag
|
// Poll for a ISO14443A (MIFARE) tag
|
||||||
const nfc_modulation_t nm = {
|
const nfc_modulation nm = {
|
||||||
.nmt = NMT_ISO14443A,
|
.nmt = NMT_ISO14443A,
|
||||||
.nbr = NBR_106,
|
.nbr = NBR_106,
|
||||||
};
|
};
|
||||||
if (!nfc_initiator_select_passive_target(pdi, nm, NULL, 0, pnt)) {
|
if (nfc_initiator_select_passive_target(pdi, nm, NULL, 0, pnt) < 0) {
|
||||||
ERR("Unable to connect to the MIFARE Classic tag");
|
ERR("Unable to connect to the MIFARE Classic tag");
|
||||||
nfc_disconnect(pdi);
|
nfc_close(pdi);
|
||||||
|
nfc_exit(context);
|
||||||
exit(EXIT_FAILURE);
|
exit(EXIT_FAILURE);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -590,7 +613,8 @@ int trailer_block(uint32_t block)
|
|||||||
}
|
}
|
||||||
|
|
||||||
// Return position of sector if it is encrypted with the default key otherwise exit..
|
// Return position of sector if it is encrypted with the default key otherwise exit..
|
||||||
int find_exploit_sector(mftag t) {
|
int find_exploit_sector(mftag t)
|
||||||
|
{
|
||||||
int i;
|
int i;
|
||||||
bool interesting = false;
|
bool interesting = false;
|
||||||
|
|
||||||
@@ -614,19 +638,21 @@ int find_exploit_sector(mftag t) {
|
|||||||
exit(EXIT_FAILURE);
|
exit(EXIT_FAILURE);
|
||||||
}
|
}
|
||||||
|
|
||||||
void mf_anticollision(mftag t, mfreader r) {
|
void mf_anticollision(mftag t, mfreader r)
|
||||||
const nfc_modulation_t nm = {
|
{
|
||||||
|
const nfc_modulation nm = {
|
||||||
.nmt = NMT_ISO14443A,
|
.nmt = NMT_ISO14443A,
|
||||||
.nbr = NBR_106,
|
.nbr = NBR_106,
|
||||||
};
|
};
|
||||||
if (!nfc_initiator_select_passive_target(r.pdi, nm, NULL, 0, &t.nt)) {
|
if (nfc_initiator_select_passive_target(r.pdi, nm, NULL, 0, &t.nt) < 0) {
|
||||||
nfc_perror(r.pdi, "nfc_initiator_select_passive_target");
|
nfc_perror(r.pdi, "nfc_initiator_select_passive_target");
|
||||||
ERR("Tag has been removed");
|
ERR("Tag has been removed");
|
||||||
exit(EXIT_FAILURE);
|
exit(EXIT_FAILURE);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
int mf_enhanced_auth(int e_sector, int a_sector, mftag t, mfreader r, denonce *d, pKeys *pk, char mode, bool dumpKeysA) {
|
int mf_enhanced_auth(int e_sector, int a_sector, mftag t, mfreader r, denonce *d, pKeys *pk, char mode, bool dumpKeysA)
|
||||||
|
{
|
||||||
struct Crypto1State *pcs;
|
struct Crypto1State *pcs;
|
||||||
struct Crypto1State *revstate;
|
struct Crypto1State *revstate;
|
||||||
struct Crypto1State *revstate_start;
|
struct Crypto1State *revstate_start;
|
||||||
@@ -636,19 +662,18 @@ int mf_enhanced_auth(int e_sector, int a_sector, mftag t, mfreader r, denonce *d
|
|||||||
// Possible key counter, just continue with a previous "session"
|
// Possible key counter, just continue with a previous "session"
|
||||||
uint32_t kcount = pk->size;
|
uint32_t kcount = pk->size;
|
||||||
|
|
||||||
byte_t Nr[4] = { 0x00,0x00,0x00,0x00 }; // Reader nonce
|
uint8_t Nr[4] = { 0x00, 0x00, 0x00, 0x00 }; // Reader nonce
|
||||||
byte_t Auth[4] = { 0x00, t.sectors[e_sector].trailer, 0x00, 0x00 };
|
uint8_t Auth[4] = { 0x00, t.sectors[e_sector].trailer, 0x00, 0x00 };
|
||||||
byte_t AuthEnc[4] = { 0x00, t.sectors[e_sector].trailer, 0x00, 0x00 };
|
uint8_t AuthEnc[4] = { 0x00, t.sectors[e_sector].trailer, 0x00, 0x00 };
|
||||||
byte_t AuthEncPar[8] = { 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00 };
|
uint8_t AuthEncPar[8] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 };
|
||||||
|
|
||||||
byte_t ArEnc[8] = { 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00 };
|
uint8_t ArEnc[8] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 };
|
||||||
byte_t ArEncPar[8] = { 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00 };
|
uint8_t ArEncPar[8] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 };
|
||||||
|
|
||||||
byte_t Rx[MAX_FRAME_LEN]; // Tag response
|
uint8_t Rx[MAX_FRAME_LEN]; // Tag response
|
||||||
byte_t RxPar[MAX_FRAME_LEN]; // Tag response
|
uint8_t RxPar[MAX_FRAME_LEN]; // Tag response
|
||||||
size_t RxLen;
|
|
||||||
|
|
||||||
u_int32_t Nt, NtLast, NtProbe, NtEnc, Ks1;
|
uint32_t Nt, NtLast, NtProbe, NtEnc, Ks1;
|
||||||
|
|
||||||
int i, m;
|
int i, m;
|
||||||
|
|
||||||
@@ -659,25 +684,25 @@ int mf_enhanced_auth(int e_sector, int a_sector, mftag t, mfreader r, denonce *d
|
|||||||
// print_hex(Auth, 4);
|
// print_hex(Auth, 4);
|
||||||
|
|
||||||
// We need full control over the CRC
|
// We need full control over the CRC
|
||||||
if (!nfc_configure(r.pdi, NDO_HANDLE_CRC, false)) {
|
if (nfc_device_set_property_bool(r.pdi, NP_HANDLE_CRC, false) < 0) {
|
||||||
nfc_perror (r.pdi, "nfc_configure crc");
|
nfc_perror(r.pdi, "nfc_device_set_property_bool crc");
|
||||||
exit(EXIT_FAILURE);
|
exit(EXIT_FAILURE);
|
||||||
}
|
}
|
||||||
|
|
||||||
// Request plain tag-nonce
|
// Request plain tag-nonce
|
||||||
// TODO: Set NDO_EASY_FRAMING option only once if possible
|
// TODO: Set NP_EASY_FRAMING option only once if possible
|
||||||
if (!nfc_configure (r.pdi, NDO_EASY_FRAMING, false)) {
|
if (nfc_device_set_property_bool(r.pdi, NP_EASY_FRAMING, false) < 0) {
|
||||||
nfc_perror (r.pdi, "nfc_configure framing");
|
nfc_perror(r.pdi, "nfc_device_set_property_bool framing");
|
||||||
exit(EXIT_FAILURE);
|
exit(EXIT_FAILURE);
|
||||||
}
|
}
|
||||||
|
|
||||||
if (!nfc_initiator_transceive_bytes(r.pdi, Auth, 4, Rx, &RxLen)) {
|
if (nfc_initiator_transceive_bytes(r.pdi, Auth, 4, Rx, sizeof(Rx), 0) < 0) {
|
||||||
fprintf(stdout, "Error while requesting plain tag-nonce\n");
|
fprintf(stdout, "Error while requesting plain tag-nonce\n");
|
||||||
exit(EXIT_FAILURE);
|
exit(EXIT_FAILURE);
|
||||||
}
|
}
|
||||||
|
|
||||||
if (!nfc_configure (r.pdi, NDO_EASY_FRAMING, true)) {
|
if (nfc_device_set_property_bool(r.pdi, NP_EASY_FRAMING, true) < 0) {
|
||||||
nfc_perror (r.pdi, "nfc_configure");
|
nfc_perror(r.pdi, "nfc_device_set_property_bool");
|
||||||
exit(EXIT_FAILURE);
|
exit(EXIT_FAILURE);
|
||||||
}
|
}
|
||||||
// print_hex(Rx, 4);
|
// print_hex(Rx, 4);
|
||||||
@@ -693,7 +718,7 @@ int mf_enhanced_auth(int e_sector, int a_sector, mftag t, mfreader r, denonce *d
|
|||||||
}
|
}
|
||||||
|
|
||||||
// Load (plain) uid^nt into the cipher {48..79} bits
|
// Load (plain) uid^nt into the cipher {48..79} bits
|
||||||
crypto1_word(pcs, bytes_to_num(Rx, 4) ^ t.uid, 0);
|
crypto1_word(pcs, bytes_to_num(Rx, 4) ^ t.authuid, 0);
|
||||||
|
|
||||||
// Generate (encrypted) nr+parity by loading it into the cipher
|
// Generate (encrypted) nr+parity by loading it into the cipher
|
||||||
for (i = 0; i < 4; i++) {
|
for (i = 0; i < 4; i++) {
|
||||||
@@ -713,15 +738,16 @@ int mf_enhanced_auth(int e_sector, int a_sector, mftag t, mfreader r, denonce *d
|
|||||||
}
|
}
|
||||||
|
|
||||||
// Finally we want to send arbitrary parity bits
|
// Finally we want to send arbitrary parity bits
|
||||||
if (!nfc_configure(r.pdi, NDO_HANDLE_PARITY, false)) {
|
if (nfc_device_set_property_bool(r.pdi, NP_HANDLE_PARITY, false) < 0) {
|
||||||
nfc_perror (r.pdi, "nfc_configure parity");
|
nfc_perror(r.pdi, "nfc_device_set_property_bool parity");
|
||||||
exit(EXIT_FAILURE);
|
exit(EXIT_FAILURE);
|
||||||
}
|
}
|
||||||
|
|
||||||
// Transmit reader-answer
|
// Transmit reader-answer
|
||||||
// fprintf(stdout, "\t{Ar}:\t");
|
// fprintf(stdout, "\t{Ar}:\t");
|
||||||
// print_hex_par(ArEnc, 64, ArEncPar);
|
// print_hex_par(ArEnc, 64, ArEncPar);
|
||||||
if ((!nfc_initiator_transceive_bits(r.pdi, ArEnc, 64, ArEncPar, Rx, &RxLen, RxPar)) || (RxLen != 32)) {
|
int res;
|
||||||
|
if (((res = nfc_initiator_transceive_bits(r.pdi, ArEnc, 64, ArEncPar, Rx, sizeof(Rx), RxPar)) < 0) || (res != 32)) {
|
||||||
ERR("Reader-answer transfer error, exiting..");
|
ERR("Reader-answer transfer error, exiting..");
|
||||||
exit(EXIT_FAILURE);
|
exit(EXIT_FAILURE);
|
||||||
}
|
}
|
||||||
@@ -750,7 +776,7 @@ int mf_enhanced_auth(int e_sector, int a_sector, mftag t, mfreader r, denonce *d
|
|||||||
}
|
}
|
||||||
|
|
||||||
// Sending the encrypted Auth command
|
// Sending the encrypted Auth command
|
||||||
if (!nfc_initiator_transceive_bits(r.pdi, AuthEnc, 32, AuthEncPar,Rx, &RxLen, RxPar)) {
|
if (nfc_initiator_transceive_bits(r.pdi, AuthEnc, 32, AuthEncPar, Rx, sizeof(Rx), RxPar) < 0) {
|
||||||
fprintf(stdout, "Error requesting encrypted tag-nonce\n");
|
fprintf(stdout, "Error requesting encrypted tag-nonce\n");
|
||||||
exit(EXIT_FAILURE);
|
exit(EXIT_FAILURE);
|
||||||
}
|
}
|
||||||
@@ -761,7 +787,7 @@ int mf_enhanced_auth(int e_sector, int a_sector, mftag t, mfreader r, denonce *d
|
|||||||
} else {
|
} else {
|
||||||
pcs = crypto1_create(bytes_to_num(t.sectors[e_sector].KeyB, 6));
|
pcs = crypto1_create(bytes_to_num(t.sectors[e_sector].KeyB, 6));
|
||||||
}
|
}
|
||||||
NtLast = bytes_to_num(Rx, 4) ^ crypto1_word(pcs, bytes_to_num(Rx, 4) ^ t.uid, 1);
|
NtLast = bytes_to_num(Rx, 4) ^ crypto1_word(pcs, bytes_to_num(Rx, 4) ^ t.authuid, 1);
|
||||||
|
|
||||||
// Save the determined nonces distance
|
// Save the determined nonces distance
|
||||||
d->distances[m] = nonce_distance(Nt, NtLast);
|
d->distances[m] = nonce_distance(Nt, NtLast);
|
||||||
@@ -778,8 +804,8 @@ int mf_enhanced_auth(int e_sector, int a_sector, mftag t, mfreader r, denonce *d
|
|||||||
ArEnc[i] = crypto1_byte(pcs, 0x00, 0) ^(Nt & 0xFF);
|
ArEnc[i] = crypto1_byte(pcs, 0x00, 0) ^(Nt & 0xFF);
|
||||||
ArEncPar[i] = filter(pcs->odd) ^ oddparity(Nt);
|
ArEncPar[i] = filter(pcs->odd) ^ oddparity(Nt);
|
||||||
}
|
}
|
||||||
nfc_configure(r.pdi,NDO_HANDLE_PARITY,false);
|
nfc_device_set_property_bool(r.pdi, NP_HANDLE_PARITY, false);
|
||||||
if ((!nfc_initiator_transceive_bits(r.pdi, ArEnc, 64, ArEncPar, Rx, &RxLen, RxPar)) || (RxLen != 32)) {
|
if (((res = nfc_initiator_transceive_bits(r.pdi, ArEnc, 64, ArEncPar, Rx, sizeof(Rx), RxPar)) < 0) || (res != 32)) {
|
||||||
ERR("Reader-answer transfer error, exiting..");
|
ERR("Reader-answer transfer error, exiting..");
|
||||||
exit(EXIT_FAILURE);
|
exit(EXIT_FAILURE);
|
||||||
}
|
}
|
||||||
@@ -808,19 +834,19 @@ int mf_enhanced_auth(int e_sector, int a_sector, mftag t, mfreader r, denonce *d
|
|||||||
// Encrypt the parity bits with the 4 plaintext bytes
|
// Encrypt the parity bits with the 4 plaintext bytes
|
||||||
AuthEncPar[i] = filter(pcs->odd) ^ oddparity(Auth[i]);
|
AuthEncPar[i] = filter(pcs->odd) ^ oddparity(Auth[i]);
|
||||||
}
|
}
|
||||||
if (!nfc_initiator_transceive_bits(r.pdi, AuthEnc, 32, AuthEncPar,Rx, &RxLen, RxPar)) {
|
if (nfc_initiator_transceive_bits(r.pdi, AuthEnc, 32, AuthEncPar, Rx, sizeof(Rx), RxPar) < 0) {
|
||||||
ERR("while requesting encrypted tag-nonce");
|
ERR("while requesting encrypted tag-nonce");
|
||||||
exit(EXIT_FAILURE);
|
exit(EXIT_FAILURE);
|
||||||
}
|
}
|
||||||
|
|
||||||
// Finally we want to send arbitrary parity bits
|
// Finally we want to send arbitrary parity bits
|
||||||
if (!nfc_configure(r.pdi, NDO_HANDLE_PARITY, true)) {
|
if (nfc_device_set_property_bool(r.pdi, NP_HANDLE_PARITY, true) < 0) {
|
||||||
nfc_perror (r.pdi, "nfc_configure parity restore M");
|
nfc_perror(r.pdi, "nfc_device_set_property_bool parity restore M");
|
||||||
exit(EXIT_FAILURE);
|
exit(EXIT_FAILURE);
|
||||||
}
|
}
|
||||||
|
|
||||||
if (!nfc_configure(r.pdi, NDO_HANDLE_CRC, true)) {
|
if (nfc_device_set_property_bool(r.pdi, NP_HANDLE_CRC, true) < 0) {
|
||||||
nfc_perror (r.pdi, "nfc_configure crc restore M");
|
nfc_perror(r.pdi, "nfc_device_set_property_bool crc restore M");
|
||||||
exit(EXIT_FAILURE);
|
exit(EXIT_FAILURE);
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -844,12 +870,12 @@ int mf_enhanced_auth(int e_sector, int a_sector, mftag t, mfreader r, denonce *d
|
|||||||
revstate_start = NULL;
|
revstate_start = NULL;
|
||||||
if (valid_nonce(NtProbe, NtEnc, Ks1, d->parity)) {
|
if (valid_nonce(NtProbe, NtEnc, Ks1, d->parity)) {
|
||||||
// And finally recover the first 32 bits of the key
|
// And finally recover the first 32 bits of the key
|
||||||
revstate = lfsr_recovery32(Ks1, NtProbe ^ t.uid);
|
revstate = lfsr_recovery32(Ks1, NtProbe ^ t.authuid);
|
||||||
if (revstate_start == NULL) {
|
if (revstate_start == NULL) {
|
||||||
revstate_start = revstate;
|
revstate_start = revstate;
|
||||||
}
|
}
|
||||||
while ((revstate->odd != 0x0) || (revstate->even != 0x0)) {
|
while ((revstate->odd != 0x0) || (revstate->even != 0x0)) {
|
||||||
lfsr_rollback_word(revstate, NtProbe ^ t.uid, 0);
|
lfsr_rollback_word(revstate, NtProbe ^ t.authuid, 0);
|
||||||
crypto1_get_lfsr(revstate, &lfsr);
|
crypto1_get_lfsr(revstate, &lfsr);
|
||||||
// Allocate a new space for keys
|
// Allocate a new space for keys
|
||||||
if (((kcount % MEM_CHUNK) == 0) || (kcount >= pk->size)) {
|
if (((kcount % MEM_CHUNK) == 0) || (kcount >= pk->size)) {
|
||||||
@@ -883,9 +909,10 @@ int mf_enhanced_auth(int e_sector, int a_sector, mftag t, mfreader r, denonce *d
|
|||||||
}
|
}
|
||||||
|
|
||||||
// Return the median value from the nonce distances array
|
// Return the median value from the nonce distances array
|
||||||
uint32_t median(denonce d) {
|
uint32_t median(denonce d)
|
||||||
|
{
|
||||||
int middle = (int) d.num_distances / 2;
|
int middle = (int) d.num_distances / 2;
|
||||||
qsort(d.distances, d.num_distances, sizeof(u_int32_t), compar_int);
|
qsort(d.distances, d.num_distances, sizeof(uint32_t), compar_int);
|
||||||
|
|
||||||
if (d.num_distances % 2 == 1) {
|
if (d.num_distances % 2 == 1) {
|
||||||
// Odd number of elements
|
// Odd number of elements
|
||||||
@@ -896,17 +923,20 @@ uint32_t median(denonce d) {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
int compar_int(const void * a, const void * b) {
|
int compar_int(const void *a, const void *b)
|
||||||
|
{
|
||||||
return (*(uint64_t *)b - * (uint64_t *)a);
|
return (*(uint64_t *)b - * (uint64_t *)a);
|
||||||
}
|
}
|
||||||
|
|
||||||
// Compare countKeys structure
|
// Compare countKeys structure
|
||||||
int compar_special_int(const void * a, const void * b) {
|
int compar_special_int(const void *a, const void *b)
|
||||||
|
{
|
||||||
return (((countKeys *)b)->count - ((countKeys *)a)->count);
|
return (((countKeys *)b)->count - ((countKeys *)a)->count);
|
||||||
}
|
}
|
||||||
|
|
||||||
countKeys * uniqsort(uint64_t * possibleKeys, uint32_t size) {
|
countKeys *uniqsort(uint64_t *possibleKeys, uint32_t size)
|
||||||
int i, j = 0;
|
{
|
||||||
|
unsigned int i, j = 0;
|
||||||
int count = 0;
|
int count = 0;
|
||||||
countKeys *our_counts;
|
countKeys *our_counts;
|
||||||
|
|
||||||
@@ -934,23 +964,25 @@ countKeys * uniqsort(uint64_t * possibleKeys, uint32_t size) {
|
|||||||
|
|
||||||
|
|
||||||
// Return 1 if the nonce is invalid else return 0
|
// Return 1 if the nonce is invalid else return 0
|
||||||
int valid_nonce(uint32_t Nt, uint32_t NtEnc, uint32_t Ks1, byte_t * parity) {
|
int valid_nonce(uint32_t Nt, uint32_t NtEnc, uint32_t Ks1, uint8_t *parity)
|
||||||
|
{
|
||||||
return ((odd_parity((Nt >> 24) & 0xFF) == ((parity[0]) ^ odd_parity((NtEnc >> 24) & 0xFF) ^ BIT(Ks1, 16))) & \
|
return ((odd_parity((Nt >> 24) & 0xFF) == ((parity[0]) ^ odd_parity((NtEnc >> 24) & 0xFF) ^ BIT(Ks1, 16))) & \
|
||||||
(odd_parity((Nt >> 16) & 0xFF) == ((parity[1]) ^ odd_parity((NtEnc >> 16) & 0xFF) ^ BIT(Ks1, 8))) & \
|
(odd_parity((Nt >> 16) & 0xFF) == ((parity[1]) ^ odd_parity((NtEnc >> 16) & 0xFF) ^ BIT(Ks1, 8))) & \
|
||||||
(odd_parity((Nt >> 8) & 0xFF) == ((parity[2]) ^ odd_parity((NtEnc >> 8) & 0xFF) ^ BIT(Ks1, 0)))) ? 1 : 0;
|
(odd_parity((Nt >> 8) & 0xFF) == ((parity[2]) ^ odd_parity((NtEnc >> 8) & 0xFF) ^ BIT(Ks1, 0)))) ? 1 : 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
void num_to_bytes(uint64_t n, uint32_t len, byte_t* dest) {
|
void num_to_bytes(uint64_t n, uint32_t len, uint8_t *dest)
|
||||||
|
{
|
||||||
while (len--) {
|
while (len--) {
|
||||||
dest[len] = (byte_t) n;
|
dest[len] = (uint8_t) n;
|
||||||
n >>= 8;
|
n >>= 8;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
long long unsigned int bytes_to_num(byte_t* src, uint32_t len) {
|
long long unsigned int bytes_to_num(uint8_t *src, uint32_t len)
|
||||||
uint64_t num = 0;
|
|
||||||
while (len--)
|
|
||||||
{
|
{
|
||||||
|
uint64_t num = 0;
|
||||||
|
while (len--) {
|
||||||
num = (num << 8) | (*src);
|
num = (num << 8) | (*src);
|
||||||
src++;
|
src++;
|
||||||
}
|
}
|
||||||
|
|||||||
40
src/mfoc.h
40
src/mfoc.h
@@ -24,28 +24,28 @@
|
|||||||
#define odd_parity(i) (( (i) ^ (i)>>1 ^ (i)>>2 ^ (i)>>3 ^ (i)>>4 ^ (i)>>5 ^ (i)>>6 ^ (i)>>7 ^ 1) & 0x01)
|
#define odd_parity(i) (( (i) ^ (i)>>1 ^ (i)>>2 ^ (i)>>3 ^ (i)>>4 ^ (i)>>5 ^ (i)>>6 ^ (i)>>7 ^ 1) & 0x01)
|
||||||
|
|
||||||
typedef struct {
|
typedef struct {
|
||||||
byte_t KeyA[6];
|
uint8_t KeyA[6];
|
||||||
byte_t KeyB[6];
|
uint8_t KeyB[6];
|
||||||
bool foundKeyA;
|
bool foundKeyA;
|
||||||
bool foundKeyB;
|
bool foundKeyB;
|
||||||
byte_t trailer; // Value of a trailer block
|
uint8_t trailer; // Value of a trailer block
|
||||||
} sector;
|
} sector;
|
||||||
|
|
||||||
typedef struct {
|
typedef struct {
|
||||||
u_int32_t *distances;
|
uint32_t *distances;
|
||||||
u_int32_t median;
|
uint32_t median;
|
||||||
u_int32_t num_distances;
|
uint32_t num_distances;
|
||||||
u_int32_t tolerance;
|
uint32_t tolerance;
|
||||||
byte_t parity[3]; // used for 3 bits of parity information
|
uint8_t parity[3]; // used for 3 bits of parity information
|
||||||
} denonce; // Revealed information about nonce
|
} denonce; // Revealed information about nonce
|
||||||
|
|
||||||
typedef struct {
|
typedef struct {
|
||||||
nfc_target_t nt;
|
nfc_target nt;
|
||||||
sector *sectors; // Allocate later, we do not know the number of sectors yet
|
sector *sectors; // Allocate later, we do not know the number of sectors yet
|
||||||
sector e_sector; // Exploit sector
|
sector e_sector; // Exploit sector
|
||||||
uint32_t num_sectors;
|
uint8_t num_sectors;
|
||||||
uint32_t num_blocks;
|
uint8_t num_blocks;
|
||||||
uint32_t uid;
|
uint32_t authuid;
|
||||||
bool b4K;
|
bool b4K;
|
||||||
} mftag;
|
} mftag;
|
||||||
|
|
||||||
@@ -56,11 +56,11 @@ typedef struct {
|
|||||||
|
|
||||||
typedef struct {
|
typedef struct {
|
||||||
uint64_t *brokenKeys;
|
uint64_t *brokenKeys;
|
||||||
uint32_t size;
|
int32_t size;
|
||||||
} bKeys;
|
} bKeys;
|
||||||
|
|
||||||
typedef struct {
|
typedef struct {
|
||||||
nfc_device_t *pdi;
|
nfc_device *pdi;
|
||||||
} mfreader;
|
} mfreader;
|
||||||
|
|
||||||
typedef struct {
|
typedef struct {
|
||||||
@@ -70,17 +70,17 @@ typedef struct {
|
|||||||
|
|
||||||
|
|
||||||
void usage(FILE *stream, int errno);
|
void usage(FILE *stream, int errno);
|
||||||
void mf_init(mftag *t, mfreader *r);
|
void mf_init(mfreader *r);
|
||||||
void mf_configure(nfc_device_t* pdi);
|
void mf_configure(nfc_device *pdi);
|
||||||
void mf_select_tag(nfc_device_t* pdi, nfc_target_t* pnt);
|
void mf_select_tag(nfc_device *pdi, nfc_target *pnt);
|
||||||
int trailer_block(uint32_t block);
|
int trailer_block(uint32_t block);
|
||||||
int find_exploit_sector(mftag t);
|
int find_exploit_sector(mftag t);
|
||||||
void mf_anticollision(mftag t, mfreader r);
|
void mf_anticollision(mftag t, mfreader r);
|
||||||
int mf_enhanced_auth(int e_sector, int a_sector, mftag t, mfreader r, denonce *d, pKeys *pk, char mode, bool dumpKeysA);
|
int mf_enhanced_auth(int e_sector, int a_sector, mftag t, mfreader r, denonce *d, pKeys *pk, char mode, bool dumpKeysA);
|
||||||
uint32_t median(denonce d);
|
uint32_t median(denonce d);
|
||||||
int compar_int(const void *a, const void *b);
|
int compar_int(const void *a, const void *b);
|
||||||
int valid_nonce(uint32_t Nt, uint32_t NtEnc, uint32_t Ks1, byte_t * parity);
|
int valid_nonce(uint32_t Nt, uint32_t NtEnc, uint32_t Ks1, uint8_t *parity);
|
||||||
int compar_special_int(const void *a, const void *b);
|
int compar_special_int(const void *a, const void *b);
|
||||||
countKeys *uniqsort(uint64_t *possibleKeys, uint32_t size);
|
countKeys *uniqsort(uint64_t *possibleKeys, uint32_t size);
|
||||||
void num_to_bytes(uint64_t n, uint32_t len, byte_t* dest);
|
void num_to_bytes(uint64_t n, uint32_t len, uint8_t *dest);
|
||||||
long long unsigned int bytes_to_num(byte_t* src, uint32_t len);
|
long long unsigned int bytes_to_num(uint8_t *src, uint32_t len);
|
||||||
|
|||||||
53
src/mifare.c
53
src/mifare.c
@@ -1,8 +1,9 @@
|
|||||||
/*-
|
/*-
|
||||||
* Public platform independent Near Field Communication (NFC) library examples
|
* Public platform independent Near Field Communication (NFC) library examples
|
||||||
*
|
*
|
||||||
* Copyright (C) 2009, Roel Verdult
|
* Copyright (C) 2009 Roel Verdult
|
||||||
* Copyright (C) 2010, Romuald Conty, Romain Tartière
|
* Copyright (C) 2010 Romain Tartière
|
||||||
|
* Copyright (C) 2010, 2011 Romuald Conty
|
||||||
*
|
*
|
||||||
* Redistribution and use in source and binary forms, with or without
|
* Redistribution and use in source and binary forms, with or without
|
||||||
* modification, are permitted provided that the following conditions are met:
|
* modification, are permitted provided that the following conditions are met:
|
||||||
@@ -27,7 +28,10 @@
|
|||||||
* Note that this license only applies on the examples, NFC library itself is under LGPL
|
* Note that this license only applies on the examples, NFC library itself is under LGPL
|
||||||
*
|
*
|
||||||
*/
|
*/
|
||||||
|
/**
|
||||||
|
* @file mifare.c
|
||||||
|
* @brief provide samples structs and functions to manipulate MIFARE Classic and Ultralight tags using libnfc
|
||||||
|
*/
|
||||||
#include "mifare.h"
|
#include "mifare.h"
|
||||||
|
|
||||||
#include <string.h>
|
#include <string.h>
|
||||||
@@ -48,13 +52,12 @@
|
|||||||
* The MIFARE Classic Specification (http://www.nxp.com/acrobat/other/identification/M001053_MF1ICS50_rev5_3.pdf) explains more about this process.
|
* The MIFARE Classic Specification (http://www.nxp.com/acrobat/other/identification/M001053_MF1ICS50_rev5_3.pdf) explains more about this process.
|
||||||
*/
|
*/
|
||||||
bool
|
bool
|
||||||
nfc_initiator_mifare_cmd (nfc_device_t * pnd, const mifare_cmd mc, const uint8_t ui8Block, mifare_param * pmp)
|
nfc_initiator_mifare_cmd(nfc_device *pnd, const mifare_cmd mc, const uint8_t ui8Block, mifare_param *pmp)
|
||||||
{
|
{
|
||||||
byte_t abtRx[265];
|
uint8_t abtRx[265];
|
||||||
size_t szRx = sizeof(abtRx);
|
|
||||||
size_t szParamLen;
|
size_t szParamLen;
|
||||||
byte_t abtCmd[265];
|
uint8_t abtCmd[265];
|
||||||
bool bEasyFraming;
|
//bool bEasyFraming;
|
||||||
|
|
||||||
abtCmd[0] = mc; // The MIFARE Classic command
|
abtCmd[0] = mc; // The MIFARE Classic command
|
||||||
abtCmd[1] = ui8Block; // The block address (1K=0x00..0x39, 4K=0x00..0xff)
|
abtCmd[1] = ui8Block; // The block address (1K=0x00..0x39, 4K=0x00..0xff)
|
||||||
@@ -69,19 +72,19 @@ nfc_initiator_mifare_cmd (nfc_device_t * pnd, const mifare_cmd mc, const uint8_t
|
|||||||
// Authenticate command
|
// Authenticate command
|
||||||
case MC_AUTH_A:
|
case MC_AUTH_A:
|
||||||
case MC_AUTH_B:
|
case MC_AUTH_B:
|
||||||
szParamLen = sizeof (mifare_param_auth);
|
szParamLen = sizeof(struct mifare_param_auth);
|
||||||
break;
|
break;
|
||||||
|
|
||||||
// Data command
|
// Data command
|
||||||
case MC_WRITE:
|
case MC_WRITE:
|
||||||
szParamLen = sizeof (mifare_param_data);
|
szParamLen = sizeof(struct mifare_param_data);
|
||||||
break;
|
break;
|
||||||
|
|
||||||
// Value command
|
// Value command
|
||||||
case MC_DECREMENT:
|
case MC_DECREMENT:
|
||||||
case MC_INCREMENT:
|
case MC_INCREMENT:
|
||||||
case MC_TRANSFER:
|
case MC_TRANSFER:
|
||||||
szParamLen = sizeof (mifare_param_value);
|
szParamLen = sizeof(struct mifare_param_value);
|
||||||
break;
|
break;
|
||||||
|
|
||||||
// Please fix your code, you never should reach this statement
|
// Please fix your code, you never should reach this statement
|
||||||
@@ -92,36 +95,38 @@ nfc_initiator_mifare_cmd (nfc_device_t * pnd, const mifare_cmd mc, const uint8_t
|
|||||||
|
|
||||||
// When available, copy the parameter bytes
|
// When available, copy the parameter bytes
|
||||||
if (szParamLen)
|
if (szParamLen)
|
||||||
memcpy (abtCmd + 2, (byte_t *) pmp, szParamLen);
|
memcpy(abtCmd + 2, (uint8_t *) pmp, szParamLen);
|
||||||
|
|
||||||
bEasyFraming = pnd->bEasyFraming;
|
// FIXME: Save and restore bEasyFraming
|
||||||
if (!nfc_configure (pnd, NDO_EASY_FRAMING, true)) {
|
// bEasyFraming = nfc_device_get_property_bool (pnd, NP_EASY_FRAMING, &bEasyFraming);
|
||||||
nfc_perror (pnd, "nfc_configure");
|
if (nfc_device_set_property_bool(pnd, NP_EASY_FRAMING, true) < 0) {
|
||||||
|
nfc_perror(pnd, "nfc_device_set_property_bool");
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
// Fire the mifare command
|
// Fire the mifare command
|
||||||
if (!nfc_initiator_transceive_bytes (pnd, abtCmd, 2 + szParamLen, abtRx, &szRx)) {
|
int res;
|
||||||
if (pnd->iLastError == EINVRXFRAM) {
|
if ((res = nfc_initiator_transceive_bytes(pnd, abtCmd, 2 + szParamLen, abtRx, sizeof(abtRx), -1)) < 0) {
|
||||||
// "Invalid received frame" AKA EINVRXFRAM, usual means we are
|
if (res == NFC_ERFTRANS) {
|
||||||
|
// "Invalid received frame", usual means we are
|
||||||
// authenticated on a sector but the requested MIFARE cmd (read, write)
|
// authenticated on a sector but the requested MIFARE cmd (read, write)
|
||||||
// is not permitted by current acces bytes;
|
// is not permitted by current acces bytes;
|
||||||
// So there is nothing to do here.
|
// So there is nothing to do here.
|
||||||
} else if (pnd->iLastError == EMFAUTH) {
|
|
||||||
// In MFOC, we have to hide authentication errors :)
|
|
||||||
} else {
|
} else {
|
||||||
nfc_perror(pnd, "nfc_initiator_transceive_bytes");
|
nfc_perror(pnd, "nfc_initiator_transceive_bytes");
|
||||||
}
|
}
|
||||||
nfc_configure (pnd, NDO_EASY_FRAMING, bEasyFraming);
|
// XXX nfc_device_set_property_bool (pnd, NP_EASY_FRAMING, bEasyFraming);
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
if (!nfc_configure (pnd, NDO_EASY_FRAMING, bEasyFraming)) {
|
/* XXX
|
||||||
nfc_perror (pnd, "nfc_configure");
|
if (nfc_device_set_property_bool (pnd, NP_EASY_FRAMING, bEasyFraming) < 0) {
|
||||||
|
nfc_perror (pnd, "nfc_device_set_property_bool");
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
|
*/
|
||||||
|
|
||||||
// When we have executed a read command, copy the received bytes into the param
|
// When we have executed a read command, copy the received bytes into the param
|
||||||
if (mc == MC_READ) {
|
if (mc == MC_READ) {
|
||||||
if (szRx == 16) {
|
if (res == 16) {
|
||||||
memcpy(pmp->mpd.abtData, abtRx, 16);
|
memcpy(pmp->mpd.abtData, abtRx, 16);
|
||||||
} else {
|
} else {
|
||||||
return false;
|
return false;
|
||||||
|
|||||||
73
src/mifare.h
73
src/mifare.h
@@ -1,8 +1,9 @@
|
|||||||
/*-
|
/*-
|
||||||
* Public platform independent Near Field Communication (NFC) library examples
|
* Public platform independent Near Field Communication (NFC) library examples
|
||||||
*
|
*
|
||||||
* Copyright (C) 2009, Roel Verdult
|
* Copyright (C) 2009 Roel Verdult
|
||||||
* Copyright (C) 2010, Romuald Conty, Romain Tartière
|
* Copyright (C) 2010 Romain Tartière
|
||||||
|
* Copyright (C) 2010, 2011 Romuald Conty
|
||||||
*
|
*
|
||||||
* Redistribution and use in source and binary forms, with or without
|
* Redistribution and use in source and binary forms, with or without
|
||||||
* modification, are permitted provided that the following conditions are met:
|
* modification, are permitted provided that the following conditions are met:
|
||||||
@@ -29,7 +30,7 @@
|
|||||||
*/
|
*/
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* @file mifaretag.h
|
* @file mifare.h
|
||||||
* @brief provide samples structs and functions to manipulate MIFARE Classic and Ultralight tags using libnfc
|
* @brief provide samples structs and functions to manipulate MIFARE Classic and Ultralight tags using libnfc
|
||||||
*/
|
*/
|
||||||
|
|
||||||
@@ -38,7 +39,7 @@
|
|||||||
|
|
||||||
# include <nfc/nfc-types.h>
|
# include <nfc/nfc-types.h>
|
||||||
|
|
||||||
// Compiler directive, set struct alignment to 1 byte_t for compatibility
|
// Compiler directive, set struct alignment to 1 uint8_t for compatibility
|
||||||
# pragma pack(1)
|
# pragma pack(1)
|
||||||
|
|
||||||
typedef enum {
|
typedef enum {
|
||||||
@@ -53,50 +54,50 @@ typedef enum {
|
|||||||
} mifare_cmd;
|
} mifare_cmd;
|
||||||
|
|
||||||
// MIFARE command params
|
// MIFARE command params
|
||||||
typedef struct {
|
struct mifare_param_auth {
|
||||||
byte_t abtKey[6];
|
uint8_t abtKey[6];
|
||||||
byte_t abtUid[4];
|
uint8_t abtAuthUid[4];
|
||||||
} mifare_param_auth;
|
};
|
||||||
|
|
||||||
typedef struct {
|
struct mifare_param_data {
|
||||||
byte_t abtData[16];
|
uint8_t abtData[16];
|
||||||
} mifare_param_data;
|
};
|
||||||
|
|
||||||
typedef struct {
|
struct mifare_param_value {
|
||||||
byte_t abtValue[4];
|
uint8_t abtValue[4];
|
||||||
} mifare_param_value;
|
};
|
||||||
|
|
||||||
typedef union {
|
typedef union {
|
||||||
mifare_param_auth mpa;
|
struct mifare_param_auth mpa;
|
||||||
mifare_param_data mpd;
|
struct mifare_param_data mpd;
|
||||||
mifare_param_value mpv;
|
struct mifare_param_value mpv;
|
||||||
} mifare_param;
|
} mifare_param;
|
||||||
|
|
||||||
// Reset struct alignment to default
|
// Reset struct alignment to default
|
||||||
# pragma pack()
|
# pragma pack()
|
||||||
|
|
||||||
bool nfc_initiator_mifare_cmd (nfc_device_t * pnd, const mifare_cmd mc, const uint8_t ui8Block, mifare_param * pmp);
|
bool nfc_initiator_mifare_cmd(nfc_device *pnd, const mifare_cmd mc, const uint8_t ui8Block, mifare_param *pmp);
|
||||||
|
|
||||||
// Compiler directive, set struct alignment to 1 byte_t for compatibility
|
// Compiler directive, set struct alignment to 1 uint8_t for compatibility
|
||||||
# pragma pack(1)
|
# pragma pack(1)
|
||||||
|
|
||||||
// MIFARE Classic
|
// MIFARE Classic
|
||||||
typedef struct {
|
typedef struct {
|
||||||
byte_t abtUID[4];
|
uint8_t abtUID[4];
|
||||||
byte_t btBCC;
|
uint8_t btBCC;
|
||||||
byte_t btUnknown;
|
uint8_t btUnknown;
|
||||||
byte_t abtATQA[2];
|
uint8_t abtATQA[2];
|
||||||
byte_t abtUnknown[8];
|
uint8_t abtUnknown[8];
|
||||||
} mifare_classic_block_manufacturer;
|
} mifare_classic_block_manufacturer;
|
||||||
|
|
||||||
typedef struct {
|
typedef struct {
|
||||||
byte_t abtData[16];
|
uint8_t abtData[16];
|
||||||
} mifare_classic_block_data;
|
} mifare_classic_block_data;
|
||||||
|
|
||||||
typedef struct {
|
typedef struct {
|
||||||
byte_t abtKeyA[6];
|
uint8_t abtKeyA[6];
|
||||||
byte_t abtAccessBits[4];
|
uint8_t abtAccessBits[4];
|
||||||
byte_t abtKeyB[6];
|
uint8_t abtKeyB[6];
|
||||||
} mifare_classic_block_trailer;
|
} mifare_classic_block_trailer;
|
||||||
|
|
||||||
typedef union {
|
typedef union {
|
||||||
@@ -111,17 +112,17 @@ typedef struct {
|
|||||||
|
|
||||||
// MIFARE Ultralight
|
// MIFARE Ultralight
|
||||||
typedef struct {
|
typedef struct {
|
||||||
byte_t sn0[3];
|
uint8_t sn0[3];
|
||||||
byte_t btBCC0;
|
uint8_t btBCC0;
|
||||||
byte_t sn1[4];
|
uint8_t sn1[4];
|
||||||
byte_t btBCC1;
|
uint8_t btBCC1;
|
||||||
byte_t internal;
|
uint8_t internal;
|
||||||
byte_t lock[2];
|
uint8_t lock[2];
|
||||||
byte_t otp[4];
|
uint8_t otp[4];
|
||||||
} mifareul_block_manufacturer;
|
} mifareul_block_manufacturer;
|
||||||
|
|
||||||
typedef struct {
|
typedef struct {
|
||||||
byte_t abtData[16];
|
uint8_t abtData[16];
|
||||||
} mifareul_block_data;
|
} mifareul_block_data;
|
||||||
|
|
||||||
typedef union {
|
typedef union {
|
||||||
|
|||||||
641
src/nfc-utils.c
641
src/nfc-utils.c
@@ -1,8 +1,9 @@
|
|||||||
/*-
|
/*-
|
||||||
* Public platform independent Near Field Communication (NFC) library examples
|
* Public platform independent Near Field Communication (NFC) library examples
|
||||||
*
|
*
|
||||||
* Copyright (C) 2009, Roel Verdult
|
* Copyright (C) 2009 Roel Verdult
|
||||||
* Copyright (C) 2010, Romuald Conty, Romain Tartière
|
* Copyright (C) 2010, 2011 Romain Tartière
|
||||||
|
* Copyright (C) 2009, 2010, 2011, 2012 Romuald Conty
|
||||||
*
|
*
|
||||||
* Redistribution and use in source and binary forms, with or without
|
* Redistribution and use in source and binary forms, with or without
|
||||||
* modification, are permitted provided that the following conditions are met:
|
* modification, are permitted provided that the following conditions are met:
|
||||||
@@ -27,49 +28,34 @@
|
|||||||
* Note that this license only applies on the examples, NFC library itself is under LGPL
|
* Note that this license only applies on the examples, NFC library itself is under LGPL
|
||||||
*
|
*
|
||||||
*/
|
*/
|
||||||
|
/**
|
||||||
|
* @file nfc-utils.c
|
||||||
|
* @brief Provide some examples shared functions like print, parity calculation, options parsing.
|
||||||
|
*/
|
||||||
#include <nfc/nfc.h>
|
#include <nfc/nfc.h>
|
||||||
#include <err.h>
|
#include <err.h>
|
||||||
|
|
||||||
#include "nfc-utils.h"
|
#include "nfc-utils.h"
|
||||||
|
|
||||||
static const byte_t OddParity[256] = {
|
uint8_t
|
||||||
1, 0, 0, 1, 0, 1, 1, 0, 0, 1, 1, 0, 1, 0, 0, 1,
|
oddparity(const uint8_t bt)
|
||||||
0, 1, 1, 0, 1, 0, 0, 1, 1, 0, 0, 1, 0, 1, 1, 0,
|
|
||||||
0, 1, 1, 0, 1, 0, 0, 1, 1, 0, 0, 1, 0, 1, 1, 0,
|
|
||||||
1, 0, 0, 1, 0, 1, 1, 0, 0, 1, 1, 0, 1, 0, 0, 1,
|
|
||||||
0, 1, 1, 0, 1, 0, 0, 1, 1, 0, 0, 1, 0, 1, 1, 0,
|
|
||||||
1, 0, 0, 1, 0, 1, 1, 0, 0, 1, 1, 0, 1, 0, 0, 1,
|
|
||||||
1, 0, 0, 1, 0, 1, 1, 0, 0, 1, 1, 0, 1, 0, 0, 1,
|
|
||||||
0, 1, 1, 0, 1, 0, 0, 1, 1, 0, 0, 1, 0, 1, 1, 0,
|
|
||||||
0, 1, 1, 0, 1, 0, 0, 1, 1, 0, 0, 1, 0, 1, 1, 0,
|
|
||||||
1, 0, 0, 1, 0, 1, 1, 0, 0, 1, 1, 0, 1, 0, 0, 1,
|
|
||||||
1, 0, 0, 1, 0, 1, 1, 0, 0, 1, 1, 0, 1, 0, 0, 1,
|
|
||||||
0, 1, 1, 0, 1, 0, 0, 1, 1, 0, 0, 1, 0, 1, 1, 0,
|
|
||||||
1, 0, 0, 1, 0, 1, 1, 0, 0, 1, 1, 0, 1, 0, 0, 1,
|
|
||||||
0, 1, 1, 0, 1, 0, 0, 1, 1, 0, 0, 1, 0, 1, 1, 0,
|
|
||||||
0, 1, 1, 0, 1, 0, 0, 1, 1, 0, 0, 1, 0, 1, 1, 0,
|
|
||||||
1, 0, 0, 1, 0, 1, 1, 0, 0, 1, 1, 0, 1, 0, 0, 1
|
|
||||||
};
|
|
||||||
|
|
||||||
byte_t
|
|
||||||
oddparity (const byte_t bt)
|
|
||||||
{
|
{
|
||||||
return OddParity[bt];
|
// cf http://graphics.stanford.edu/~seander/bithacks.html#ParityParallel
|
||||||
|
return (0x9669 >> ((bt ^(bt >> 4)) & 0xF)) & 1;
|
||||||
}
|
}
|
||||||
|
|
||||||
void
|
void
|
||||||
oddparity_bytes_ts (const byte_t * pbtData, const size_t szLen, byte_t * pbtPar)
|
oddparity_bytes_ts(const uint8_t *pbtData, const size_t szLen, uint8_t *pbtPar)
|
||||||
{
|
{
|
||||||
size_t szByteNr;
|
size_t szByteNr;
|
||||||
// Calculate the parity bits for the command
|
// Calculate the parity bits for the command
|
||||||
for (szByteNr = 0; szByteNr < szLen; szByteNr++) {
|
for (szByteNr = 0; szByteNr < szLen; szByteNr++) {
|
||||||
pbtPar[szByteNr] = OddParity[pbtData[szByteNr]];
|
pbtPar[szByteNr] = oddparity(pbtData[szByteNr]);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
void
|
void
|
||||||
print_hex (const byte_t * pbtData, const size_t szBytes)
|
print_hex(const uint8_t *pbtData, const size_t szBytes)
|
||||||
{
|
{
|
||||||
size_t szPos;
|
size_t szPos;
|
||||||
|
|
||||||
@@ -80,7 +66,7 @@ print_hex (const byte_t * pbtData, const size_t szBytes)
|
|||||||
}
|
}
|
||||||
|
|
||||||
void
|
void
|
||||||
print_hex_bits (const byte_t * pbtData, const size_t szBits)
|
print_hex_bits(const uint8_t *pbtData, const size_t szBits)
|
||||||
{
|
{
|
||||||
uint8_t uRemainder;
|
uint8_t uRemainder;
|
||||||
size_t szPos;
|
size_t szPos;
|
||||||
@@ -102,7 +88,7 @@ print_hex_bits (const byte_t * pbtData, const size_t szBits)
|
|||||||
}
|
}
|
||||||
|
|
||||||
void
|
void
|
||||||
print_hex_par (const byte_t * pbtData, const size_t szBits, const byte_t * pbtDataPar)
|
print_hex_par(const uint8_t *pbtData, const size_t szBits, const uint8_t *pbtDataPar)
|
||||||
{
|
{
|
||||||
uint8_t uRemainder;
|
uint8_t uRemainder;
|
||||||
size_t szPos;
|
size_t szPos;
|
||||||
@@ -110,7 +96,7 @@ print_hex_par (const byte_t * pbtData, const size_t szBits, const byte_t * pbtDa
|
|||||||
|
|
||||||
for (szPos = 0; szPos < szBytes; szPos++) {
|
for (szPos = 0; szPos < szBytes; szPos++) {
|
||||||
printf("%02x", pbtData[szPos]);
|
printf("%02x", pbtData[szPos]);
|
||||||
if (OddParity[pbtData[szPos]] != pbtDataPar[szPos]) {
|
if (oddparity(pbtData[szPos]) != pbtDataPar[szPos]) {
|
||||||
printf("! ");
|
printf("! ");
|
||||||
} else {
|
} else {
|
||||||
printf(" ");
|
printf(" ");
|
||||||
@@ -128,594 +114,11 @@ print_hex_par (const byte_t * pbtData, const size_t szBits, const byte_t * pbtDa
|
|||||||
printf("\n");
|
printf("\n");
|
||||||
}
|
}
|
||||||
|
|
||||||
#define SAK_UID_NOT_COMPLETE 0x04
|
|
||||||
#define SAK_ISO14443_4_COMPLIANT 0x20
|
|
||||||
#define SAK_ISO18092_COMPLIANT 0x40
|
|
||||||
|
|
||||||
void
|
void
|
||||||
print_nfc_iso14443a_info (const nfc_iso14443a_info_t nai, bool verbose)
|
print_nfc_target(const nfc_target nt, bool verbose)
|
||||||
{
|
{
|
||||||
printf (" ATQA (SENS_RES): ");
|
char *s;
|
||||||
print_hex (nai.abtAtqa, 2);
|
str_nfc_target(&s, nt, verbose);
|
||||||
if (verbose) {
|
printf("%s", s);
|
||||||
printf("* UID size: ");
|
free(s);
|
||||||
switch ((nai.abtAtqa[1] & 0xc0)>>6) {
|
|
||||||
case 0:
|
|
||||||
printf("single\n");
|
|
||||||
break;
|
|
||||||
case 1:
|
|
||||||
printf("double\n");
|
|
||||||
break;
|
|
||||||
case 2:
|
|
||||||
printf("triple\n");
|
|
||||||
break;
|
|
||||||
case 3:
|
|
||||||
printf("RFU\n");
|
|
||||||
break;
|
|
||||||
}
|
}
|
||||||
printf("* bit frame anticollision ");
|
|
||||||
switch (nai.abtAtqa[1] & 0x1f) {
|
|
||||||
case 0x01:
|
|
||||||
case 0x02:
|
|
||||||
case 0x04:
|
|
||||||
case 0x08:
|
|
||||||
case 0x10:
|
|
||||||
printf("supported\n");
|
|
||||||
break;
|
|
||||||
default:
|
|
||||||
printf("not supported\n");
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
printf (" UID (NFCID%c): ", (nai.abtUid[0] == 0x08 ? '3' : '1'));
|
|
||||||
print_hex (nai.abtUid, nai.szUidLen);
|
|
||||||
if (verbose) {
|
|
||||||
if (nai.abtUid[0] == 0x08) {
|
|
||||||
printf ("* Random UID\n");
|
|
||||||
}
|
|
||||||
}
|
|
||||||
printf (" SAK (SEL_RES): ");
|
|
||||||
print_hex (&nai.btSak, 1);
|
|
||||||
if (verbose) {
|
|
||||||
if (nai.btSak & SAK_UID_NOT_COMPLETE) {
|
|
||||||
printf ("* Warning! Cascade bit set: UID not complete\n");
|
|
||||||
}
|
|
||||||
if (nai.btSak & SAK_ISO14443_4_COMPLIANT) {
|
|
||||||
printf ("* Compliant with ISO/IEC 14443-4\n");
|
|
||||||
} else {
|
|
||||||
printf ("* Not compliant with ISO/IEC 14443-4\n");
|
|
||||||
}
|
|
||||||
if (nai.btSak & SAK_ISO18092_COMPLIANT) {
|
|
||||||
printf ("* Compliant with ISO/IEC 18092\n");
|
|
||||||
} else {
|
|
||||||
printf ("* Not compliant with ISO/IEC 18092\n");
|
|
||||||
}
|
|
||||||
}
|
|
||||||
if (nai.szAtsLen) {
|
|
||||||
printf (" ATS: ");
|
|
||||||
print_hex (nai.abtAts, nai.szAtsLen);
|
|
||||||
}
|
|
||||||
if (nai.szAtsLen && verbose) {
|
|
||||||
// Decode ATS according to ISO/IEC 14443-4 (5.2 Answer to select)
|
|
||||||
const int iMaxFrameSizes[] = { 16, 24, 32, 40, 48, 64, 96, 128, 256 };
|
|
||||||
printf ("* Max Frame Size accepted by PICC: %d bytes\n", iMaxFrameSizes[nai.abtAts[0] & 0x0F]);
|
|
||||||
|
|
||||||
size_t offset = 1;
|
|
||||||
if (nai.abtAts[0] & 0x10) { // TA(1) present
|
|
||||||
byte_t TA = nai.abtAts[offset];
|
|
||||||
offset++;
|
|
||||||
printf ("* Bit Rate Capability:\n");
|
|
||||||
if (TA == 0) {
|
|
||||||
printf (" * PICC supports only 106 kbits/s in both directions\n");
|
|
||||||
}
|
|
||||||
if (TA & 1<<7) {
|
|
||||||
printf (" * Same bitrate in both directions mandatory\n");
|
|
||||||
}
|
|
||||||
if (TA & 1<<4) {
|
|
||||||
printf (" * PICC to PCD, DS=2, bitrate 212 kbits/s supported\n");
|
|
||||||
}
|
|
||||||
if (TA & 1<<5) {
|
|
||||||
printf (" * PICC to PCD, DS=4, bitrate 424 kbits/s supported\n");
|
|
||||||
}
|
|
||||||
if (TA & 1<<6) {
|
|
||||||
printf (" * PICC to PCD, DS=8, bitrate 847 kbits/s supported\n");
|
|
||||||
}
|
|
||||||
if (TA & 1<<0) {
|
|
||||||
printf (" * PCD to PICC, DR=2, bitrate 212 kbits/s supported\n");
|
|
||||||
}
|
|
||||||
if (TA & 1<<1) {
|
|
||||||
printf (" * PCD to PICC, DR=4, bitrate 424 kbits/s supported\n");
|
|
||||||
}
|
|
||||||
if (TA & 1<<2) {
|
|
||||||
printf (" * PCD to PICC, DR=8, bitrate 847 kbits/s supported\n");
|
|
||||||
}
|
|
||||||
if (TA & 1<<3) {
|
|
||||||
printf (" * ERROR unknown value\n");
|
|
||||||
}
|
|
||||||
}
|
|
||||||
if (nai.abtAts[0] & 0x20) { // TB(1) present
|
|
||||||
byte_t TB= nai.abtAts[offset];
|
|
||||||
offset++;
|
|
||||||
printf ("* Frame Waiting Time: %.4g ms\n",256.0*16.0*(1<<((TB & 0xf0) >> 4))/13560.0);
|
|
||||||
if ((TB & 0x0f) == 0) {
|
|
||||||
printf ("* No Start-up Frame Guard Time required\n");
|
|
||||||
} else {
|
|
||||||
printf ("* Start-up Frame Guard Time: %.4g ms\n",256.0*16.0*(1<<(TB & 0x0f))/13560.0);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
if (nai.abtAts[0] & 0x40) { // TC(1) present
|
|
||||||
byte_t TC = nai.abtAts[offset];
|
|
||||||
offset++;
|
|
||||||
if (TC & 0x1) {
|
|
||||||
printf("* Node ADdress supported\n");
|
|
||||||
} else {
|
|
||||||
printf("* Node ADdress not supported\n");
|
|
||||||
}
|
|
||||||
if (TC & 0x2) {
|
|
||||||
printf("* Card IDentifier supported\n");
|
|
||||||
} else {
|
|
||||||
printf("* Card IDentifier not supported\n");
|
|
||||||
}
|
|
||||||
}
|
|
||||||
if (nai.szAtsLen > offset) {
|
|
||||||
printf ("* Historical bytes Tk: " );
|
|
||||||
print_hex (nai.abtAts + offset, (nai.szAtsLen - offset));
|
|
||||||
byte_t CIB = nai.abtAts[offset];
|
|
||||||
offset++;
|
|
||||||
if (CIB != 0x00 && CIB != 0x10 && (CIB & 0xf0) != 0x80) {
|
|
||||||
printf(" * Proprietary format\n");
|
|
||||||
if (CIB == 0xc1) {
|
|
||||||
printf(" * Tag byte: Mifare or virtual cards of various types\n");
|
|
||||||
byte_t L = nai.abtAts[offset];
|
|
||||||
offset++;
|
|
||||||
if (L != (nai.szAtsLen - offset)) {
|
|
||||||
printf(" * Warning: Type Identification Coding length (%i)", L);
|
|
||||||
printf(" not matching Tk length (%zi)\n", (nai.szAtsLen - offset));
|
|
||||||
}
|
|
||||||
if ((nai.szAtsLen - offset - 2) > 0) { // Omit 2 CRC bytes
|
|
||||||
byte_t CTC = nai.abtAts[offset];
|
|
||||||
offset++;
|
|
||||||
printf(" * Chip Type: ");
|
|
||||||
switch (CTC & 0xf0) {
|
|
||||||
case 0x00:
|
|
||||||
printf("(Multiple) Virtual Cards\n");
|
|
||||||
break;
|
|
||||||
case 0x10:
|
|
||||||
printf("Mifare DESFire\n");
|
|
||||||
break;
|
|
||||||
case 0x20:
|
|
||||||
printf("Mifare Plus\n");
|
|
||||||
break;
|
|
||||||
default:
|
|
||||||
printf("RFU\n");
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
printf(" * Memory size: ");
|
|
||||||
switch (CTC & 0x0f) {
|
|
||||||
case 0x00:
|
|
||||||
printf("<1 kbyte\n");
|
|
||||||
break;
|
|
||||||
case 0x01:
|
|
||||||
printf("1 kbyte\n");
|
|
||||||
break;
|
|
||||||
case 0x02:
|
|
||||||
printf("2 kbyte\n");
|
|
||||||
break;
|
|
||||||
case 0x03:
|
|
||||||
printf("4 kbyte\n");
|
|
||||||
break;
|
|
||||||
case 0x04:
|
|
||||||
printf("8 kbyte\n");
|
|
||||||
break;
|
|
||||||
case 0x0f:
|
|
||||||
printf("Unspecified\n");
|
|
||||||
break;
|
|
||||||
default:
|
|
||||||
printf("RFU\n");
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
if ((nai.szAtsLen - offset) > 0) { // Omit 2 CRC bytes
|
|
||||||
byte_t CVC = nai.abtAts[offset];
|
|
||||||
offset++;
|
|
||||||
printf(" * Chip Status: ");
|
|
||||||
switch (CVC & 0xf0) {
|
|
||||||
case 0x00:
|
|
||||||
printf("Engineering sample\n");
|
|
||||||
break;
|
|
||||||
case 0x20:
|
|
||||||
printf("Released\n");
|
|
||||||
break;
|
|
||||||
default:
|
|
||||||
printf("RFU\n");
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
printf(" * Chip Generation: ");
|
|
||||||
switch (CVC & 0x0f) {
|
|
||||||
case 0x00:
|
|
||||||
printf("Generation 1\n");
|
|
||||||
break;
|
|
||||||
case 0x01:
|
|
||||||
printf("Generation 2\n");
|
|
||||||
break;
|
|
||||||
case 0x02:
|
|
||||||
printf("Generation 3\n");
|
|
||||||
break;
|
|
||||||
case 0x0f:
|
|
||||||
printf("Unspecified\n");
|
|
||||||
break;
|
|
||||||
default:
|
|
||||||
printf("RFU\n");
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
if ((nai.szAtsLen - offset) > 0) { // Omit 2 CRC bytes
|
|
||||||
byte_t VCS = nai.abtAts[offset];
|
|
||||||
offset++;
|
|
||||||
printf(" * Specifics (Virtual Card Selection):\n");
|
|
||||||
if ((VCS & 0x09) == 0x00) {
|
|
||||||
printf(" * Only VCSL supported\n");
|
|
||||||
} else if ((VCS & 0x09) == 0x01) {
|
|
||||||
printf(" * VCS, VCSL and SVC supported\n");
|
|
||||||
}
|
|
||||||
if ((VCS & 0x0e) == 0x00) {
|
|
||||||
printf(" * SL1, SL2(?), SL3 supported\n");
|
|
||||||
} else if ((VCS & 0x0e) == 0x02) {
|
|
||||||
printf(" * SL3 only card\n");
|
|
||||||
} else if ((VCS & 0x0f) == 0x0e) {
|
|
||||||
printf(" * No VCS command supported\n");
|
|
||||||
} else if ((VCS & 0x0f) == 0x0f) {
|
|
||||||
printf(" * Unspecified\n");
|
|
||||||
} else {
|
|
||||||
printf(" * RFU\n");
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
if (CIB == 0x00) {
|
|
||||||
printf(" * Tk after 0x00 consist of optional consecutive COMPACT-TLV data objects\n");
|
|
||||||
printf(" followed by a mandatory status indicator (the last three bytes, not in TLV)\n");
|
|
||||||
printf(" See ISO/IEC 7816-4 8.1.1.3 for more info\n");
|
|
||||||
}
|
|
||||||
if (CIB == 0x10) {
|
|
||||||
printf(" * DIR data reference: %02x\n", nai.abtAts[offset]);
|
|
||||||
}
|
|
||||||
if (CIB == 0x80) {
|
|
||||||
if (nai.szAtsLen == offset) {
|
|
||||||
printf(" * No COMPACT-TLV objects found, no status found\n");
|
|
||||||
} else {
|
|
||||||
printf(" * Tk after 0x80 consist of optional consecutive COMPACT-TLV data objects;\n");
|
|
||||||
printf(" the last data object may carry a status indicator of one, two or three bytes.\n");
|
|
||||||
printf(" See ISO/IEC 7816-4 8.1.1.3 for more info\n");
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
if (verbose) {
|
|
||||||
printf("Fingerprinting based on ATQA & SAK values:\n");
|
|
||||||
uint32_t atqasak = 0;
|
|
||||||
atqasak += (((uint32_t)nai.abtAtqa[0] & 0xff)<<16);
|
|
||||||
atqasak += (((uint32_t)nai.abtAtqa[1] & 0xff)<<8);
|
|
||||||
atqasak += ((uint32_t)nai.btSak & 0xff);
|
|
||||||
bool found_possible_match = false;
|
|
||||||
switch (atqasak) {
|
|
||||||
case 0x000218:
|
|
||||||
printf("* Mifare Classic 4K\n");
|
|
||||||
found_possible_match = true;
|
|
||||||
break;
|
|
||||||
case 0x000408:
|
|
||||||
printf("* Mifare Classic 1K\n");
|
|
||||||
printf("* Mifare Plus (4-byte UID) 2K SL1\n");
|
|
||||||
found_possible_match = true;
|
|
||||||
break;
|
|
||||||
case 0x000409:
|
|
||||||
printf("* Mifare MINI\n");
|
|
||||||
found_possible_match = true;
|
|
||||||
break;
|
|
||||||
case 0x000410:
|
|
||||||
printf("* Mifare Plus (4-byte UID) 2K SL2\n");
|
|
||||||
found_possible_match = true;
|
|
||||||
break;
|
|
||||||
case 0x000411:
|
|
||||||
printf("* Mifare Plus (4-byte UID) 4K SL2\n");
|
|
||||||
found_possible_match = true;
|
|
||||||
break;
|
|
||||||
case 0x000418:
|
|
||||||
printf("* Mifare Plus (4-byte UID) 4K SL1\n");
|
|
||||||
found_possible_match = true;
|
|
||||||
break;
|
|
||||||
case 0x000420:
|
|
||||||
printf("* Mifare Plus (4-byte UID) 2K/4K SL3\n");
|
|
||||||
found_possible_match = true;
|
|
||||||
break;
|
|
||||||
case 0x004400:
|
|
||||||
printf("* Mifare Ultralight\n");
|
|
||||||
printf("* Mifare UltralightC\n");
|
|
||||||
found_possible_match = true;
|
|
||||||
break;
|
|
||||||
case 0x004208:
|
|
||||||
case 0x004408:
|
|
||||||
printf("* Mifare Plus (7-byte UID) 2K SL1\n");
|
|
||||||
found_possible_match = true;
|
|
||||||
break;
|
|
||||||
case 0x004218:
|
|
||||||
case 0x004418:
|
|
||||||
printf("* Mifare Plus (7-byte UID) 4K SL1\n");
|
|
||||||
found_possible_match = true;
|
|
||||||
break;
|
|
||||||
case 0x004210:
|
|
||||||
case 0x004410:
|
|
||||||
printf("* Mifare Plus (7-byte UID) 2K SL2\n");
|
|
||||||
found_possible_match = true;
|
|
||||||
break;
|
|
||||||
case 0x004211:
|
|
||||||
case 0x004411:
|
|
||||||
printf("* Mifare Plus (7-byte UID) 4K SL2\n");
|
|
||||||
found_possible_match = true;
|
|
||||||
break;
|
|
||||||
case 0x004220:
|
|
||||||
case 0x004420:
|
|
||||||
printf("* Mifare Plus (7-byte UID) 2K/4K SL3\n");
|
|
||||||
found_possible_match = true;
|
|
||||||
break;
|
|
||||||
case 0x034420:
|
|
||||||
printf("* Mifare DESFire / Desfire EV1\n");
|
|
||||||
found_possible_match = true;
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
|
|
||||||
// Other matches not described in
|
|
||||||
// AN MIFARE Type Identification Procedure
|
|
||||||
// but seen in the field:
|
|
||||||
switch (atqasak) {
|
|
||||||
case 0x000488:
|
|
||||||
printf("* Mifare Classic 1K Infineon\n");
|
|
||||||
found_possible_match = true;
|
|
||||||
break;
|
|
||||||
case 0x000298:
|
|
||||||
printf("* Gemplus MPCOS\n");
|
|
||||||
found_possible_match = true;
|
|
||||||
break;
|
|
||||||
case 0x030428:
|
|
||||||
printf("* JCOP31\n");
|
|
||||||
found_possible_match = true;
|
|
||||||
break;
|
|
||||||
case 0x004820:
|
|
||||||
printf("* JCOP31 v2.4.1\n");
|
|
||||||
printf("* JCOP31 v2.2\n");
|
|
||||||
found_possible_match = true;
|
|
||||||
break;
|
|
||||||
case 0x000428:
|
|
||||||
printf("* JCOP31 v2.3.1\n");
|
|
||||||
found_possible_match = true;
|
|
||||||
break;
|
|
||||||
case 0x000453:
|
|
||||||
printf("* Fudan FM1208SH01\n");
|
|
||||||
found_possible_match = true;
|
|
||||||
break;
|
|
||||||
case 0x000820:
|
|
||||||
printf("* Fudan FM1208\n");
|
|
||||||
found_possible_match = true;
|
|
||||||
break;
|
|
||||||
case 0x000238:
|
|
||||||
printf("* MFC 4K emulated by Nokia 6212 Classic\n");
|
|
||||||
found_possible_match = true;
|
|
||||||
break;
|
|
||||||
case 0x000838:
|
|
||||||
printf("* MFC 4K emulated by Nokia 6131 NFC\n");
|
|
||||||
found_possible_match = true;
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
if ((nai.abtAtqa[0] & 0xf0) == 0) {
|
|
||||||
switch (nai.abtAtqa[1]) {
|
|
||||||
case 0x02:
|
|
||||||
printf("* SmartMX with Mifare 4K emulation\n");
|
|
||||||
found_possible_match = true;
|
|
||||||
break;
|
|
||||||
case 0x04:
|
|
||||||
printf("* SmartMX with Mifare 1K emulation\n");
|
|
||||||
found_possible_match = true;
|
|
||||||
break;
|
|
||||||
case 0x48:
|
|
||||||
printf("* SmartMX with 7-byte UID\n");
|
|
||||||
found_possible_match = true;
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
if (! found_possible_match) {
|
|
||||||
printf("* Unknown card, sorry\n");
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
void
|
|
||||||
print_nfc_felica_info (const nfc_felica_info_t nfi, bool verbose)
|
|
||||||
{
|
|
||||||
(void) verbose;
|
|
||||||
printf (" ID (NFCID2): ");
|
|
||||||
print_hex (nfi.abtId, 8);
|
|
||||||
printf (" Parameter (PAD): ");
|
|
||||||
print_hex (nfi.abtPad, 8);
|
|
||||||
}
|
|
||||||
|
|
||||||
void
|
|
||||||
print_nfc_jewel_info (const nfc_jewel_info_t nji, bool verbose)
|
|
||||||
{
|
|
||||||
(void) verbose;
|
|
||||||
printf (" ATQA (SENS_RES): ");
|
|
||||||
print_hex (nji.btSensRes, 2);
|
|
||||||
printf (" 4-LSB JEWELID: ");
|
|
||||||
print_hex (nji.btId, 4);
|
|
||||||
}
|
|
||||||
|
|
||||||
#define PI_ISO14443_4_SUPPORTED 0x01
|
|
||||||
#define PI_NAD_SUPPORTED 0x01
|
|
||||||
#define PI_CID_SUPPORTED 0x02
|
|
||||||
void
|
|
||||||
print_nfc_iso14443b_info (const nfc_iso14443b_info_t nbi, bool verbose)
|
|
||||||
{
|
|
||||||
const int iMaxFrameSizes[] = { 16, 24, 32, 40, 48, 64, 96, 128, 256 };
|
|
||||||
printf (" PUPI: ");
|
|
||||||
print_hex (nbi.abtPupi, 4);
|
|
||||||
printf (" Application Data: ");
|
|
||||||
print_hex (nbi.abtApplicationData, 4);
|
|
||||||
printf (" Protocol Info: ");
|
|
||||||
print_hex (nbi.abtProtocolInfo, 3);
|
|
||||||
if (verbose) {
|
|
||||||
printf ("* Bit Rate Capability:\n");
|
|
||||||
if (nbi.abtProtocolInfo[0] == 0) {
|
|
||||||
printf (" * PICC supports only 106 kbits/s in both directions\n");
|
|
||||||
}
|
|
||||||
if (nbi.abtProtocolInfo[0] & 1<<7) {
|
|
||||||
printf (" * Same bitrate in both directions mandatory\n");
|
|
||||||
}
|
|
||||||
if (nbi.abtProtocolInfo[0] & 1<<4) {
|
|
||||||
printf (" * PICC to PCD, 1etu=64/fc, bitrate 212 kbits/s supported\n");
|
|
||||||
}
|
|
||||||
if (nbi.abtProtocolInfo[0] & 1<<5) {
|
|
||||||
printf (" * PICC to PCD, 1etu=32/fc, bitrate 424 kbits/s supported\n");
|
|
||||||
}
|
|
||||||
if (nbi.abtProtocolInfo[0] & 1<<6) {
|
|
||||||
printf (" * PICC to PCD, 1etu=16/fc, bitrate 847 kbits/s supported\n");
|
|
||||||
}
|
|
||||||
if (nbi.abtProtocolInfo[0] & 1<<0) {
|
|
||||||
printf (" * PCD to PICC, 1etu=64/fc, bitrate 212 kbits/s supported\n");
|
|
||||||
}
|
|
||||||
if (nbi.abtProtocolInfo[0] & 1<<1) {
|
|
||||||
printf (" * PCD to PICC, 1etu=32/fc, bitrate 424 kbits/s supported\n");
|
|
||||||
}
|
|
||||||
if (nbi.abtProtocolInfo[0] & 1<<2) {
|
|
||||||
printf (" * PCD to PICC, 1etu=16/fc, bitrate 847 kbits/s supported\n");
|
|
||||||
}
|
|
||||||
if (nbi.abtProtocolInfo[0] & 1<<3) {
|
|
||||||
printf (" * ERROR unknown value\n");
|
|
||||||
}
|
|
||||||
if( (nbi.abtProtocolInfo[1] & 0xf0) <= 0x80 ) {
|
|
||||||
printf ("* Maximum frame sizes: %d bytes\n", iMaxFrameSizes[((nbi.abtProtocolInfo[1] & 0xf0) >> 4)]);
|
|
||||||
}
|
|
||||||
if((nbi.abtProtocolInfo[1] & 0x0f) == PI_ISO14443_4_SUPPORTED) {
|
|
||||||
printf ("* Protocol types supported: ISO/IEC 14443-4\n");
|
|
||||||
}
|
|
||||||
printf ("* Frame Waiting Time: %.4g ms\n",256.0*16.0*(1<<((nbi.abtProtocolInfo[2] & 0xf0) >> 4))/13560.0);
|
|
||||||
if((nbi.abtProtocolInfo[2] & (PI_NAD_SUPPORTED|PI_CID_SUPPORTED)) != 0) {
|
|
||||||
printf ("* Frame options supported: ");
|
|
||||||
if ((nbi.abtProtocolInfo[2] & PI_NAD_SUPPORTED) != 0) printf ("NAD ");
|
|
||||||
if ((nbi.abtProtocolInfo[2] & PI_CID_SUPPORTED) != 0) printf ("CID ");
|
|
||||||
printf("\n");
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
void
|
|
||||||
print_nfc_dep_info (const nfc_dep_info_t ndi, bool verbose)
|
|
||||||
{
|
|
||||||
(void) verbose;
|
|
||||||
printf (" NFCID3: ");
|
|
||||||
print_hex (ndi.abtNFCID3, 10);
|
|
||||||
printf (" BS: %02x\n", ndi.btBS);
|
|
||||||
printf (" BR: %02x\n", ndi.btBR);
|
|
||||||
printf (" TO: %02x\n", ndi.btTO);
|
|
||||||
printf (" PP: %02x\n", ndi.btPP);
|
|
||||||
if (ndi.szGB) {
|
|
||||||
printf ("General Bytes: ");
|
|
||||||
print_hex (ndi.abtGB, ndi.szGB);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @brief Tries to parse arguments to find device descriptions.
|
|
||||||
* @return Returns the list of found device descriptions.
|
|
||||||
*/
|
|
||||||
nfc_device_desc_t *
|
|
||||||
parse_args (int argc, const char *argv[], size_t * szFound, bool * verbose)
|
|
||||||
{
|
|
||||||
nfc_device_desc_t *pndd = 0;
|
|
||||||
int arg;
|
|
||||||
*szFound = 0;
|
|
||||||
|
|
||||||
// Get commandline options
|
|
||||||
for (arg = 1; arg < argc; arg++) {
|
|
||||||
|
|
||||||
if (0 == strcmp (argv[arg], "--device")) {
|
|
||||||
// FIXME: this device selection by command line options is terrible & does not support USB/PCSC drivers
|
|
||||||
if (argc > arg + 1) {
|
|
||||||
char buffer[256];
|
|
||||||
|
|
||||||
pndd = malloc (sizeof (nfc_device_desc_t));
|
|
||||||
|
|
||||||
strncpy (buffer, argv[++arg], 256);
|
|
||||||
|
|
||||||
// Driver.
|
|
||||||
pndd->pcDriver = (char *) malloc (256);
|
|
||||||
strcpy (pndd->pcDriver, strtok (buffer, ":"));
|
|
||||||
|
|
||||||
// Port.
|
|
||||||
pndd->pcPort = (char *) malloc (256);
|
|
||||||
strcpy (pndd->pcPort, strtok (NULL, ":"));
|
|
||||||
|
|
||||||
// Speed.
|
|
||||||
sscanf (strtok (NULL, ":"), "%u", &pndd->uiSpeed);
|
|
||||||
|
|
||||||
*szFound = 1;
|
|
||||||
} else {
|
|
||||||
errx (1, "usage: %s [--device driver:port:speed]", argv[0]);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
if ((0 == strcmp (argv[arg], "-v")) || (0 == strcmp (argv[arg], "--verbose"))) {
|
|
||||||
*verbose = true;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return pndd;
|
|
||||||
}
|
|
||||||
|
|
||||||
const char *
|
|
||||||
str_nfc_baud_rate (const nfc_baud_rate_t nbr)
|
|
||||||
{
|
|
||||||
switch(nbr) {
|
|
||||||
case NBR_UNDEFINED:
|
|
||||||
return "undefined baud rate";
|
|
||||||
break;
|
|
||||||
case NBR_106:
|
|
||||||
return "106 kbps";
|
|
||||||
break;
|
|
||||||
case NBR_212:
|
|
||||||
return "212 kbps";
|
|
||||||
break;
|
|
||||||
case NBR_424:
|
|
||||||
return "424 kbps";
|
|
||||||
break;
|
|
||||||
case NBR_847:
|
|
||||||
return "847 kbps";
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
return "";
|
|
||||||
}
|
|
||||||
|
|
||||||
void
|
|
||||||
print_nfc_target (const nfc_target_t nt, bool verbose)
|
|
||||||
{
|
|
||||||
switch(nt.nm.nmt) {
|
|
||||||
case NMT_ISO14443A:
|
|
||||||
printf ("ISO/IEC 14443A (%s) target:\n", str_nfc_baud_rate(nt.nm.nbr));
|
|
||||||
print_nfc_iso14443a_info (nt.nti.nai, verbose);
|
|
||||||
break;
|
|
||||||
case NMT_JEWEL:
|
|
||||||
printf ("Innovision Jewel (%s) target:\n", str_nfc_baud_rate(nt.nm.nbr));
|
|
||||||
print_nfc_jewel_info (nt.nti.nji, verbose);
|
|
||||||
break;
|
|
||||||
case NMT_FELICA:
|
|
||||||
printf ("FeliCa (%s) target:\n", str_nfc_baud_rate(nt.nm.nbr));
|
|
||||||
print_nfc_felica_info (nt.nti.nfi, verbose);
|
|
||||||
break;
|
|
||||||
case NMT_ISO14443B:
|
|
||||||
printf ("ISO/IEC 14443-4B (%s) target:\n", str_nfc_baud_rate(nt.nm.nbr));
|
|
||||||
print_nfc_iso14443b_info (nt.nti.nbi, verbose);
|
|
||||||
break;
|
|
||||||
case NMT_DEP:
|
|
||||||
printf ("D.E.P. (%s) target:\n", str_nfc_baud_rate(nt.nm.nbr));
|
|
||||||
print_nfc_dep_info (nt.nti.ndi, verbose);
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|||||||
@@ -1,8 +1,9 @@
|
|||||||
/*-
|
/*-
|
||||||
* Public platform independent Near Field Communication (NFC) library examples
|
* Public platform independent Near Field Communication (NFC) library examples
|
||||||
*
|
*
|
||||||
* Copyright (C) 2009, Roel Verdult
|
* Copyright (C) 2009 Roel Verdult
|
||||||
* Copyright (C) 2010, Romuald Conty, Romain Tartière
|
* Copyright (C) 2010 Romain Tartière
|
||||||
|
* Copyright (C) 2010, 2011, 2012 Romuald Conty
|
||||||
*
|
*
|
||||||
* Redistribution and use in source and binary forms, with or without
|
* Redistribution and use in source and binary forms, with or without
|
||||||
* modification, are permitted provided that the following conditions are met:
|
* modification, are permitted provided that the following conditions are met:
|
||||||
@@ -79,21 +80,20 @@
|
|||||||
# define ERR(...) warnx ("ERROR: " __VA_ARGS__ )
|
# define ERR(...) warnx ("ERROR: " __VA_ARGS__ )
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
byte_t oddparity (const byte_t bt);
|
#ifndef MIN
|
||||||
void oddparity_byte_ts (const byte_t * pbtData, const size_t szLen, byte_t * pbtPar);
|
#define MIN(a,b) (((a) < (b)) ? (a) : (b))
|
||||||
|
#endif
|
||||||
|
#ifndef MAX
|
||||||
|
#define MAX(a,b) (((a) > (b)) ? (a) : (b))
|
||||||
|
#endif
|
||||||
|
|
||||||
void print_hex (const byte_t * pbtData, const size_t szLen);
|
uint8_t oddparity(const uint8_t bt);
|
||||||
void print_hex_bits (const byte_t * pbtData, const size_t szBits);
|
void oddparity_bytes_ts(const uint8_t *pbtData, const size_t szLen, uint8_t *pbtPar);
|
||||||
void print_hex_par (const byte_t * pbtData, const size_t szBits, const byte_t * pbtDataPar);
|
|
||||||
|
|
||||||
void print_nfc_iso14443a_info (const nfc_iso14443a_info_t nai, bool verbose);
|
void print_hex(const uint8_t *pbtData, const size_t szLen);
|
||||||
void print_nfc_iso14443b_info (const nfc_iso14443b_info_t nbi, bool verbose);
|
void print_hex_bits(const uint8_t *pbtData, const size_t szBits);
|
||||||
void print_nfc_felica_info (const nfc_felica_info_t nfi, bool verbose);
|
void print_hex_par(const uint8_t *pbtData, const size_t szBits, const uint8_t *pbtDataPar);
|
||||||
void print_nfc_jewel_info (const nfc_jewel_info_t nji, bool verbose);
|
|
||||||
void print_nfc_dep_info (const nfc_dep_info_t ndi, bool verbose);
|
|
||||||
|
|
||||||
void print_nfc_target (const nfc_target_t nt, bool verbose);
|
void print_nfc_target(const nfc_target nt, bool verbose);
|
||||||
|
|
||||||
nfc_device_desc_t *parse_args (int argc, const char *argv[], size_t * szFound, bool * verbose);
|
|
||||||
|
|
||||||
#endif
|
#endif
|
||||||
|
|||||||
Reference in New Issue
Block a user