*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software
- * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
+ * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA
*/
#include <stdio.h>
printf( " -h --help Print this help message\n"
" -r --read Read a mifare sector\n"
" -l --loop-read Loop reading a mifare sector\n"
+ " -s --smartx Read sectors 0-3 (with -k key) and 4-7 with this key\n"
" -w --write Write a mifare sector\n"
- " -k --key Specify mifare access key (in hex tuples)\n");
+ " -k --key Specify mifare access key (in hex tuples)\n"
+ " -b --brute-force n Brute Force read sector n\n");
}
static struct option mifare_opts[] = {
{ "key", 1, 0, 'k' },
{ "read", 1, 0, 'r' },
+ { "smartx", 1, 0, 's' },
{ "loop-read", 1, 0, 'l' },
{ "write", 1 ,0, 'w' },
{ "help", 0, 0, 'h' },
+ { "brute-force", 1, 0, 'b' },
{ 0, 0, 0, 0 }
};
return 0;
}
-static void mifare_l3(void)
+static int mifare_l3(void)
{
+ int retry;
+
while (l2_init(RFID_LAYER2_ISO14443A) < 0) ;
printf("ISO14443-3A anticollision succeeded\n");
- while (l3_init(RFID_PROTOCOL_MIFARE_CLASSIC) < 0) ;
+ retry = 0;
+ while (l3_init(RFID_PROTOCOL_MIFARE_CLASSIC) < 0 && retry++ < 10) ;
- printf("Mifare card available\n");
+ if ( retry < 10 ) {
+ printf("Mifare card available\n");
+ return 1;
+ } else {
+ printf("ERROR l3_init\n");
+ return 0;
+ }
}
int main(int argc, char **argv)
int len, rc, c, option_index = 0;
unsigned int page,uid,uid_len;
char key[MIFARE_CL_KEY_LEN];
+ char key2[MIFARE_CL_KEY_LEN];
char buf[MIFARE_CL_PAGE_SIZE];
#ifdef __MINGW32__
}
while (1) {
- c = getopt_long(argc, argv, "k:r:l:w:", mifare_opts,
+ c = getopt_long(argc, argv, "k:r:s:l:w:b:h", mifare_opts,
&option_index);
if (c == -1)
break;
switch (c) {
+ int i;
+ case 'b':
+ page = atoi(optarg);
+ printf("key: %s\n", hexdump(key, MIFARE_CL_KEY_LEN));
+ len = MIFARE_CL_PAGE_SIZE;
+ mifare_l3();
+ for (i = 0; i <= 0xff; i++) {
+ key[MIFARE_CL_KEY_LEN-1]=i;
+ if (mifare_cl_auth(key, page) >= 0)
+ printf("KEY: %s\n",hexdump(key, MIFARE_CL_KEY_LEN));
+ }
+
+ break;
case 'k':
hexread(key, optarg, strlen(optarg));
printf("key: %s\n", hexdump(key, MIFARE_CL_KEY_LEN));
printf("read(key='%s',page=%u):",
hexdump(key, MIFARE_CL_KEY_LEN), page);
len = MIFARE_CL_PAGE_SIZE;
- mifare_l3();
+ if (! mifare_l3())
+ exit(1);
if (mifare_cl_auth(key, page) < 0)
exit(1);
#endif
}
break;
+ case 's':
+ hexread(key2, optarg, strlen(optarg));
+ printf("key2: %s\n", hexdump(key2, MIFARE_CL_KEY_LEN));
+ len = MIFARE_CL_PAGE_SIZE;
+ if (! mifare_l3())
+ exit(1);
+ for(page = 0; page < 8; page++) {
+ if (mifare_cl_auth( page < 4 ? key : key2, page) < 0)
+ exit(1);
+
+ if ( page == 0 ) {
+ uid_len=sizeof(uid);
+ uid=0;
+ if(rfid_layer2_getopt(l2h,RFID_OPT_LAYER2_UID,&uid,&uid_len)>=0)
+ printf("UID=%08X (len=%u)\n",uid,uid_len);
+ }
+
+ len=MIFARE_CL_PAGE_SIZE;
+ rc = rfid_protocol_read(ph, page, buf, &len);
+ if (rc < 0) {
+ printf("\n");
+ fprintf(stderr, "error during read\n");
+ break;
+ }
+ printf("page=%d len=%u data=%s\n", page, len, hexdump(buf, len));
+ }
+ break;
case 'l':
page = atoi(optarg);
printf("read_loop(key='%s',page=%u):\n",