partial ISO15693 support (based on patch by Bjoern Kaiser)
[librfid] / src / rfid_layer2_iso15693.c
index 8c5d808..09dd632 100644 (file)
@@ -1,7 +1,7 @@
 /* ISO 15693 anticollision implementation
  *
- * (C) 2005 by Harald Welte <laforge@gnumonks.org>
- *
+ * (C) 2005-2008 by Harald Welte <laforge@gnumonks.org>
+ * (C) 2007 by Bjoern Riemer <bjoern.riemer@web.de>
  */
 
 /*
  *
  *  You should have received a copy of the GNU General Public License
  *  along with this program; if not, write to the Free Software
- *  Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA  02111-1307  USA
+ *  Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA
  */
 
+#define DEBUG_LIBRFID
+
 #include <stdlib.h>
 #include <unistd.h>
 #include <string.h>
+#include <errno.h>
 
 #include <librfid/rfid.h>
 #include <librfid/rfid_layer2.h>
 #include <librfid/rfid_reader.h>
 #include <librfid/rfid_layer2_iso15693.h>
 
-#if 0
-/* Transceive a 7-bit short frame */
-static int
-iso14443a_transceive_sf(struct rfid_layer2_handle *handle,
-                        unsigned char cmd,
-                        struct iso14443a_atqa *atqa)
-{
-       struct rfid_reader *rdr = handle->rh->reader;
+struct iso15693_request_read {
+       struct iso15693_request req;
+       u_int64_t uid;
+       u_int8_t blocknum;
+} __attribute__ ((packed));
+
+struct iso15693_request_adressed {
+       struct iso15693_request head;
+       u_int64_t uid;
+} __attribute__ ((packed));
+
+#define ISO15693_BLOCK_SIZE_MAX        (256/8)
+#define ISO15693_RESP_SIZE_MAX (4+ISO15693_BLOCK_SIZE_MAX)
+
+#define TIMEOUT 200
 
-       return rdr->iso14443a.transceive_sf(handle->rh, cmd, atqa);
+static int iso15693_transceive(struct rfid_layer2_handle *handle,
+                              enum rfid_frametype frametype,
+                              const unsigned char *tx_buf, unsigned int tx_len,
+                              unsigned char *rx_buf, unsigned int *rx_len,
+                              u_int64_t timeout, unsigned int flags)
+{
+       return handle->rh->reader->transceive(handle->rh, frametype, tx_buf,
+                                       tx_len, rx_buf, rx_len, timeout, flags);
 }
 
-/* Transmit an anticollission bit frame */
+/* Transmit an anticollission frame */
 static int
-iso14443a_transceive_acf(struct rfid_layer2_handle *handle,
-                        struct iso14443a_anticol_cmd *acf,
-                        unsigned int *bit_of_col)
+iso15693_transceive_acf(struct rfid_layer2_handle *handle,
+                       struct iso15693_anticol_cmd *acf,
+                       unsigned char uuid[ISO15693_UID_LEN],
+                       char *bit_of_col)
 {
        struct rfid_reader *rdr = handle->rh->reader;
-
-       return rdr->iso14443a.transceive_acf(handle->rh, acf, bit_of_col);
+       if (!rdr->iso15693.transceive_ac)
+               return -1;
+       return rdr->iso15693.transceive_ac(handle->rh, acf, uuid, bit_of_col);
 }
 
-/* Transmit a regular frame */
-static int 
-iso14443a_transceive(struct rfid_layer2_handle *handle,
-                       const unsigned char *tx_buf, unsigned int tx_len,
-                       unsigned char *rx_buf, unsigned int *rx_len,
-                       u_int64_t, unsigned int flags)
-{
-       return handle->rh->reader->transceive(handle->rh, tx_buf, tx_len, 
-                                               rx_buf, rx_len, timeout, flags);
-}
+#if 0
 
-static int 
-iso14443a_code_nvb_bits(unsigned char *nvb, unsigned int bits)
+static int
+iso15693_read_block(struct rfid_layer2_handle *handle,
+                   u_int8_t blocknr, u_int32_t *data)
 {
-       unsigned int byte_count = bits / 8;
-       unsigned int bit_count = bits % 8;
+       int rc;
+       struct iso15693_request_read req;
+       u_int8_t resp[ISO15693_RESP_SIZE_MAX];
 
-       if (byte_count < 2 || byte_count > 7)
-               return -1;
+       req.req.flags = 0;
+       req.command = ISO15693_CMD_READ_BLOCK_SINGLE;
+       memcpy(&req.uid, handle->..., ISO15693_UID_LEN);
+       req.blocknum = blocknr;
 
-       *nvb = ((byte_count & 0xf) << 4) | bit_count;
+       /* FIXME: fill CRC if required */
 
-       return 0;
-}
+       rc = iso15693_transceive(... &req, ...,  );
 
-/* first bit is '1', second bit '2' */
-static void
-set_bit_in_field(unsigned char *bitfield, unsigned int bit)
-{
-       unsigned int byte_count = bit / 8;
-       unsigned int bit_count = bit % 8;
-
-       DEBUGP("bitfield=%p, byte_count=%u, bit_count=%u\n",
-                       bitfield, byte_count, bit_count);
-       DEBUGP("%p = 0x%02x\n", (bitfield+byte_count), *(bitfield+byte_count));
-       *(bitfield+byte_count) |= 1 << (bit_count-1);
-       DEBUGP("%p = 0x%02x\n", (bitfield+byte_count), *(bitfield+byte_count));
+       if (rc < 0)
+               return rc;
+
+       memcpy(data, resp+1, rc-1); /* FIXME rc-3 in case of CRC */
+
+       return rc-1;
 }
 
 static int
-iso14443a_anticol(struct rfid_layer2_handle *handle)
+iso15693_write_block()
 {
-       int ret;
-       unsigned int uid_size;
-       struct iso14443a_atqa atqa;
-       struct iso14443a_anticol_cmd acf;
-       unsigned int bit_of_col;
-       unsigned char sak[3];
-       unsigned char uid[10];  // triple size equals 10 bytes;
-       unsigned int rx_len = sizeof(sak);
-       char *aqptr = (char *) &atqa;
-       static int first = 0;
-
-       memset(uid, 0, sizeof(uid));
-       memset(sak, 0, sizeof(sak));
-       memset(&atqa, 0, sizeof(atqa));
-       memset(&acf, 0, sizeof(acf));
-
-       if (first == 0) {
-       DEBUGP("Sending REQA\n");
-       ret = iso14443a_transceive_sf(handle, ISO14443A_SF_CMD_REQA, &atqa);
-       first = 1;
-       } else {
-       DEBUGP("Sending WUPA\n");
-       ret = iso14443a_transceive_sf(handle, ISO14443A_SF_CMD_WUPA, &atqa);
-       }
+       struct iso16593_request_read *rreq;
+       u_int32_t buf[sizeof(req)+ISO15693_BLOCK_SIZE_MAX];
 
-       if (ret < 0) {
-               handle->priv.iso14443a.state = ISO14443A_STATE_REQA_SENT;
-               DEBUGP("error during transceive_sf: %d\n", ret);
-               return ret;
-       }
-       handle->priv.iso14443a.state = ISO14443A_STATE_ATQA_RCVD;
+       rreq = (struct iso15693_request_read *) req;
 
-       DEBUGP("ATQA: 0x%02x 0x%02x\n", *aqptr, *(aqptr+1));
+       rreq->req.flags = ;
+       rreq->req.command = ISO15693_CMD_WRITE_BLOCK_SINGLE;
+       memcpy(rreq->uid, handle->, ISO15693_UID_LEN);
+       rreq->blocknum = blocknr;
+       memcpy(rreq->);
 
-       if (!atqa.bf_anticol) {
-               handle->priv.iso14443a.state =ISO14443A_STATE_NO_BITFRAME_ANTICOL;
-               DEBUGP("no bitframe anticollission bits set, aborting\n");
-               return -1;
-       }
+}
 
-       if (atqa.uid_size == 2 || atqa.uid_size == 3)
-               uid_size = 3;
-       else if (atqa.uid_size == 1)
-               uid_size = 2;
-       else
-               uid_size = 1;
-       
-       acf.sel_code = ISO14443A_AC_SEL_CODE_CL1;
-
-       handle->priv.iso14443a.state = ISO14443A_STATE_ANTICOL_RUNNING;
-       handle->priv.iso14443a.level = ISO14443A_LEVEL_CL1;
-
-cascade:
-       iso14443a_code_nvb_bits(&acf.nvb, 16);
-
-       ret = iso14443a_transceive_acf(handle, &acf, &bit_of_col);
-       if (ret < 0)
-               return ret;
-       DEBUGP("bit_of_col = %u\n", bit_of_col);
-       
-       while (bit_of_col != ISO14443A_BITOFCOL_NONE) {
-               set_bit_in_field(&acf.uid_bits[0], bit_of_col-16);
-               iso14443a_code_nvb_bits(&acf.nvb, bit_of_col);
-               ret = iso14443a_transceive_acf(handle, &acf, &bit_of_col);
-               DEBUGP("bit_of_col = %u\n", bit_of_col);
-               if (ret < 0)
-                       return ret;
-       }
+static int
+iso15693_lock_block()
+{
+}
 
-       iso14443a_code_nvb_bits(&acf.nvb, 7*8);
-       ret = iso14443a_transceive(handle, (unsigned char *)&acf, 7, 
-                                  (unsigned char *) &sak, &rx_len,
-                                  TIMEOUT, 0);
-       if (ret < 0)
-               return ret;
-
-       if (sak[0] & 0x04) {
-               /* Cascade bit set, UID not complete */
-               switch (acf.sel_code) {
-               case ISO14443A_AC_SEL_CODE_CL1:
-                       /* cascading from CL1 to CL2 */
-                       if (acf.uid_bits[0] != 0x88) {
-                               DEBUGP("Cascade bit set, but UID0 != 0x88\n");
-                               return -1;
-                       }
-                       memcpy(&uid[0], &acf.uid_bits[1], 3);
-                       acf.sel_code = ISO14443A_AC_SEL_CODE_CL2;
-                       handle->priv.iso14443a.level = ISO14443A_LEVEL_CL2;
+#endif
+
+static int
+iso15693_anticol(struct rfid_layer2_handle *handle)
+{
+       int i, ret;
+       int rx_len = 0;
+       int num_valid = 0;
+       struct iso15693_anticol_cmd acf;
+       char uuid[ISO15693_UID_LEN];
+       char boc;
+
+       char uuid_list[16][ISO15693_UID_LEN];
+       int uuid_list_valid[16];
+
+#define MY_NONE 0
+#define MY_COLL 1
+#define MY_UUID 2
+
+       memset(uuid_list_valid, MY_NONE, 16);
+       memset(uuid_list, 0, ISO15693_UID_LEN * 16);
+
+       memset(&acf, 0, sizeof(struct iso15693_anticol_cmd));
+       acf.afi = 0;
+       acf.flags = RFID_15693_F5_NSLOTS_1 | /* comment out for 16 slots */
+                   RFID_15693_F_INV_TABLE_5 |
+                   RFID_15693_F_RATE_HIGH;
+                   //RFID_15693_F_SUBC_TWO
+       acf.mask_len = 0;
+       //acf.mask_bits[0] = 3;
+       acf.current_slot = 0;
+
+       if (acf.flags & RFID_15693_F5_NSLOTS_1)
+               i = 1;
+       else
+               i = 16;
+       for (; i >=1; i--) {
+               //acf.current_slot=0;
+               ret = iso15693_transceive_acf(handle, &acf, &uuid[0], &boc);
+               switch (ret) {
+               case -ETIMEDOUT:
+                       DEBUGP("no answer from vicc in slot %d\n",
+                               acf.current_slot);
+                       uuid_list_valid[acf.current_slot] = MY_NONE;
                        break;
-               case ISO14443A_AC_SEL_CODE_CL2:
-                       /* cascading from CL2 to CL3 */
-                       memcpy(&uid[3], &acf.uid_bits[1], 3);
-                       acf.sel_code = ISO14443A_AC_SEL_CODE_CL3;
-                       handle->priv.iso14443a.level = ISO14443A_LEVEL_CL3;
+               case -ECOLLISION:
+                       DEBUGP("Collision during anticol. slot %d bit %d\n",
+                               acf.current_slot,boc);
+                       uuid_list_valid[acf.current_slot] = -boc;
+                       memcpy(uuid_list[acf.current_slot], uuid, ISO15693_UID_LEN);
                        break;
                default:
-                       DEBUGP("cannot cascade any further than CL3\n");
-                       handle->priv.iso14443a.state = ISO14443A_STATE_ERROR;
-                       return -1;
-                       break;
+                       if (ret < 0) {
+                               DEBUGP("ERROR ret: %d, slot %d\n", ret,
+                                       acf.current_slot);
+                               uuid_list_valid[acf.current_slot] = MY_NONE;
+                       } else {
+                               DEBUGP("Slot %d ret: %d UUID: %s\n",
+                                       acf.current_slot, ret,
+                                       rfid_hexdump(uuid, ISO15693_UID_LEN));
+                               uuid_list_valid[acf.current_slot] = MY_UUID;
+                               memcpy(&uuid_list[acf.current_slot][0], uuid,
+                                       ISO15693_UID_LEN);
+                       }
                }
-               goto cascade;
-
-       } else {
-               switch (acf.sel_code) {
-               case ISO14443A_AC_SEL_CODE_CL1:
-                       /* single size UID (4 bytes) */
-                       memcpy(&uid[0], &acf.uid_bits[0], 4);
-                       break;
-               case ISO14443A_AC_SEL_CODE_CL2:
-                       /* double size UID (7 bytes) */
-                       memcpy(&uid[3], &acf.uid_bits[0], 4);
-                       break;
-               case ISO14443A_AC_SEL_CODE_CL3:
-                       /* triple size UID (10 bytes) */
-                       memcpy(&uid[6], &acf.uid_bits[0], 4);
-                       break;
+               usleep(1000*200);
+       }
+       if (acf.flags & RFID_15693_F5_NSLOTS_1)
+               i = 1;
+       else
+               i = 16;
+
+       while (i) {
+               if (uuid_list_valid[i] == MY_NONE) {
+                       DEBUGP("slot[%d]: timeout\n",i);
+               } else if (uuid_list_valid[i] == MY_UUID) {
+                       DEBUGP("slot[%d]: VALID uuid: %s\n", i,
+                               rfid_hexdump(uuid_list[i], ISO15693_UID_LEN));
+                       num_valid++;
+               } else if (uuid_list_valid[i] < 0) {
+                       DEBUGP("slot[%d]: collision(%d %d,%d) uuid: %s\n",
+                               i,uuid_list_valid[i]*-1,
+                               (uuid_list_valid[i]*-1)/8,
+                               (uuid_list_valid[i]*-1)%8,
+                       rfid_hexdump(uuid_list[i], ISO15693_UID_LEN));
                }
+               i--;
        }
+       if (num_valid == 0)
+               return -1;
 
-       handle->priv.iso14443a.level = ISO14443A_LEVEL_NONE;
-       handle->priv.iso14443a.state = ISO14443A_STATE_SELECTED;
-
-       {
-               int uid_len;
-               if (uid_size == 1)
-                       uid_len = 4;
-               else if (uid_size == 2)
-                       uid_len = 7;
-               else 
-                       uid_len = 10;
+       return num_valid;
+}
 
-               DEBUGP("UID %s\n", rfid_hexdump(uid, uid_len));
-       }
+static int
+iso15693_select(struct rfid_layer2_handle *handle)
+{
+       struct iso15693_request_adressed tx_req;
+       int ret;
+       unsigned int rx_len, tx_len;
+
+       struct {
+               struct iso15693_response head;
+               u_int8_t error;
+               unsigned char crc[2];
+       } rx_buf;
+       rx_len = sizeof(rx_buf);
+
+       tx_req.head.command = ISO15693_CMD_SELECT;
+       tx_req.head.flags = RFID_15693_F4_ADDRESS | RFID_15693_F_SUBC_TWO ;
+       tx_req.uid = 0xE0070000020C1F18;
+       //req.uid = 0x181F0C02000007E0;
+       //req.uid = 0xe004010001950837;
+       //req.uid = 0x37089501000104e0;
+       tx_len = sizeof(tx_req);
+       DEBUGP("tx_len=%u", tx_len); DEBUGPC(" rx_len=%u\n",rx_len);
+       ret = iso15693_transceive(handle, RFID_15693_FRAME, (u_int8_t*)&tx_req,
+                                 tx_len, (u_int8_t*)&rx_buf, &rx_len, 50,0);
+       DEBUGP("ret: %d, error_flag: %d error: %d\n", ret,
+               rx_buf.head.flags&RFID_15693_RF_ERROR, 0);
+       return -1;
+}
 
-       if (sak[0] & 0x20) {
-               DEBUGP("we have a T=CL compliant PICC\n");
-               handle->priv.iso14443a.tcl_capable = 1;
-       } else {
-               DEBUGP("we have a T!=CL PICC\n");
-               handle->priv.iso14443a.tcl_capable = 0;
+static int
+iso15693_getopt(struct rfid_layer2_handle *handle,
+               int optname, void *optval, unsigned int *optlen)
+{
+       switch (optname) {
+       case RFID_OPT_15693_MOD_DEPTH:
+       case RFID_OPT_15693_VCD_CODING:
+       case RFID_OPT_15693_VICC_SUBC:
+       case RFID_OPT_15693_VICC_SPEED:
+       default:
+               return -EINVAL;
+               break;
        }
-
        return 0;
 }
 
 static int
-iso14443a_hlta(struct rfid_layer2_handle *handle)
+iso15693_setopt(struct rfid_layer2_handle *handle, int optname,
+               const void *optval, unsigned int optlen)
 {
-       int ret;
-       unsigned char tx_buf[2] = { 0x50, 0x00 };
-       unsigned char rx_buf[10];
-       unsigned int rx_len = sizeof(rx_buf);
-
+       switch (optname) {
+       case RFID_OPT_15693_MOD_DEPTH:
+       case RFID_OPT_15693_VCD_CODING:
+       case RFID_OPT_15693_VICC_SUBC:
+       case RFID_OPT_15693_VICC_SPEED:
+       default:
+               return -EINVAL;
+               break;
+       }
        return 0;
+}
 
-       ret = iso14443a_transceive(handle, tx_buf, sizeof(tx_buf),
-                                  rx_buf, &rx_len, 1000 /* 1ms */, 0);
-       if (ret < 0) {
-               /* "error" case: we don't get somethng back from the card */
-               return 0;
-       }
+static int transceive_inventory(struct rfid_layer2_handle *l2h)
+{
        return -1;
 }
-#endif
 
 static struct rfid_layer2_handle *
 iso15693_init(struct rfid_reader_handle *rh)
 {
        int ret;
-       struct rfid_layer2_handle *h = malloc(sizeof(*h));
+       struct rfid_layer2_handle *h = malloc_layer2_handle(sizeof(*h));
        if (!h)
                return NULL;
 
        h->l2 = &rfid_layer2_iso15693;
        h->rh = rh;
        h->priv.iso15693.state = ISO15693_STATE_NONE;
-
        ret = h->rh->reader->iso15693.init(h->rh);
        if (ret < 0) {
-               free(h);
+               free_layer2_handle(h);
                return NULL;
        }
 
@@ -283,20 +301,23 @@ iso15693_init(struct rfid_reader_handle *rh)
 static int
 iso15693_fini(struct rfid_layer2_handle *handle)
 {
-       free(handle);
+       free_layer2_handle(handle);
        return 0;
 }
 
 
-struct rfid_layer2 rfid_layer2_iso15693 = {
+const struct rfid_layer2 rfid_layer2_iso15693 = {
        .id     = RFID_LAYER2_ISO15693,
        .name   = "ISO 15693",
        .fn     = {
                .init           = &iso15693_init,
-               //.open                 = &iso15693_anticol,
+               .open           = &iso15693_anticol,
+               //.open         = &iso15693_select,
                //.transceive   = &iso15693_transceive,
                //.close                = &iso14443a_hlta,
                .fini           = &iso15693_fini,
+               .setopt         = &iso15693_setopt,
+               .getopt         = &iso15693_getopt,
        },
 };