X-Git-Url: http://git.rot13.org/?a=blobdiff_plain;f=utils%2Fmifare-tool.c;h=f650355e59202684f2db229ad781aab56851f49e;hb=refs%2Fheads%2Fsmartx;hp=58c069257dbed9dd6fc87e019689715dd339286d;hpb=b450423b5aec1e1bc2f9627f064ffba33c419aa7;p=librfid diff --git a/utils/mifare-tool.c b/utils/mifare-tool.c index 58c0692..18c1157 100644 --- a/utils/mifare-tool.c +++ b/utils/mifare-tool.c @@ -13,7 +13,7 @@ * * You should have received a copy of the GNU General Public License * along with this program; if not, write to the Free Software - * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA + * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA */ #include @@ -21,7 +21,10 @@ #include #include #include -//#include + +#ifndef __MINGW32__ +#include +#endif #define _GNU_SOURCE #include @@ -46,16 +49,20 @@ static void help(void) printf( " -h --help Print this help message\n" " -r --read Read a mifare sector\n" " -l --loop-read Loop reading a mifare sector\n" + " -s --smartx Read sectors 0-3 (with -k key) and 4-7 with this key\n" " -w --write Write a mifare sector\n" - " -k --key Specify mifare access key (in hex tuples)\n"); + " -k --key Specify mifare access key (in hex tuples)\n" + " -b --brute-force n Brute Force read sector n\n"); } static struct option mifare_opts[] = { { "key", 1, 0, 'k' }, { "read", 1, 0, 'r' }, + { "smartx", 1, 0, 's' }, { "loop-read", 1, 0, 'l' }, { "write", 1 ,0, 'w' }, { "help", 0, 0, 'h' }, + { "brute-force", 1, 0, 'b' }, { 0, 0, 0, 0 } }; @@ -78,15 +85,24 @@ static int mifare_cl_auth(unsigned char *key, int page) return 0; } -static void mifare_l3(void) +static int mifare_l3(void) { + int retry; + while (l2_init(RFID_LAYER2_ISO14443A) < 0) ; printf("ISO14443-3A anticollision succeeded\n"); - while (l3_init(RFID_PROTOCOL_MIFARE_CLASSIC) < 0) ; + retry = 0; + while (l3_init(RFID_PROTOCOL_MIFARE_CLASSIC) < 0 && retry++ < 10) ; - printf("Mifare card available\n"); + if ( retry < 10 ) { + printf("Mifare card available\n"); + return 1; + } else { + printf("ERROR l3_init\n"); + return 0; + } } int main(int argc, char **argv) @@ -94,6 +110,7 @@ int main(int argc, char **argv) int len, rc, c, option_index = 0; unsigned int page,uid,uid_len; char key[MIFARE_CL_KEY_LEN]; + char key2[MIFARE_CL_KEY_LEN]; char buf[MIFARE_CL_PAGE_SIZE]; #ifdef __MINGW32__ @@ -102,8 +119,7 @@ int main(int argc, char **argv) program_name = basename(argv[0]); #endif/*__MINGW32__*/ - memcpy(key, MIFARE_CL_KEYA_DEFAULT_INFINEON, - sizeof(MIFARE_CL_KEYA_DEFAULT_INFINEON)); + memcpy(key, MIFARE_CL_KEYA_DEFAULT_INFINEON, MIFARE_CL_KEY_LEN); printf("%s - (C) 2006 by Harald Welte\n" "This program is Free Software and has " @@ -118,12 +134,25 @@ int main(int argc, char **argv) } while (1) { - c = getopt_long(argc, argv, "k:r:l:w:", mifare_opts, + c = getopt_long(argc, argv, "k:r:s:l:w:b:h", mifare_opts, &option_index); if (c == -1) break; switch (c) { + int i; + case 'b': + page = atoi(optarg); + printf("key: %s\n", hexdump(key, MIFARE_CL_KEY_LEN)); + len = MIFARE_CL_PAGE_SIZE; + mifare_l3(); + for (i = 0; i <= 0xff; i++) { + key[MIFARE_CL_KEY_LEN-1]=i; + if (mifare_cl_auth(key, page) >= 0) + printf("KEY: %s\n",hexdump(key, MIFARE_CL_KEY_LEN)); + } + + break; case 'k': hexread(key, optarg, strlen(optarg)); printf("key: %s\n", hexdump(key, MIFARE_CL_KEY_LEN)); @@ -133,7 +162,8 @@ int main(int argc, char **argv) printf("read(key='%s',page=%u):", hexdump(key, MIFARE_CL_KEY_LEN), page); len = MIFARE_CL_PAGE_SIZE; - mifare_l3(); + if (! mifare_l3()) + exit(1); if (mifare_cl_auth(key, page) < 0) exit(1); @@ -170,6 +200,33 @@ int main(int argc, char **argv) #endif } break; + case 's': + hexread(key2, optarg, strlen(optarg)); + printf("key2: %s\n", hexdump(key2, MIFARE_CL_KEY_LEN)); + len = MIFARE_CL_PAGE_SIZE; + if (! mifare_l3()) + exit(1); + for(page = 0; page < 8; page++) { + if (mifare_cl_auth( page < 4 ? key : key2, page) < 0) + exit(1); + + if ( page == 0 ) { + uid_len=sizeof(uid); + uid=0; + if(rfid_layer2_getopt(l2h,RFID_OPT_LAYER2_UID,&uid,&uid_len)>=0) + printf("UID=%08X (len=%u)\n",uid,uid_len); + } + + len=MIFARE_CL_PAGE_SIZE; + rc = rfid_protocol_read(ph, page, buf, &len); + if (rc < 0) { + printf("\n"); + fprintf(stderr, "error during read\n"); + break; + } + printf("page=%d len=%u data=%s\n", page, len, hexdump(buf, len)); + } + break; case 'l': page = atoi(optarg); printf("read_loop(key='%s',page=%u):\n",