/**
* NFC utils - lsnfc
*
* Copyright (C) 2009, 2010, Romuald Conty
*
* This program is free software: you can redistribute it and/or modify it
* under the terms of the GNU General Public License as published by the Free
* Software Foundation, either version 3 of the License, or (at your option)
* any later version.
*
* This program is distributed in the hope that it will be useful, but WITHOUT
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
* more details.
*
* You should have received a copy of the GNU General Public License along with
* this program. If not, see
*/
/*
* This implementation was written based on information provided by the
* following documents:
*
* MIFARE Type Identification Procedure
* AN10833
* Rev. 3.1 — 07 July 2009
* Application note
*
* ISO14443 tags list
* http://www.libnfc.org/documentation/hardware/tags/iso14443
*/
#include "config.h"
#include
#include
#include
#include
#include
static nfc_device *pnd;
#define ERR(x, ...) printf("ERROR: " x "\n", __VA_ARGS__ )
#define MAX_DEVICE_COUNT 16
#define MAX_TARGET_COUNT 16
#define MAX_ATS_LENGTH 32
typedef char* (*identication_hook)(const nfc_iso14443a_info nai);
struct iso14443a_tag {
uint8_t SAK;
const char *name;
size_t ATS_length;
uint8_t ATS[MAX_ATS_LENGTH];
identication_hook identication_fct;
};
struct felica_tag {
uint8_t abtSysCode[2];
const char *name;
};
void
print_hex (const uint8_t* pbtData, size_t szData)
{
for (size_t i = 0; i < szData; i++) {
printf ("%02x", pbtData[i]);
}
printf ("\n");
}
char*
mifare_ultralight_identification(const nfc_iso14443a_info nai)
{
uint8_t abtCmd[2];
uint8_t abtRx[265];
size_t szRxLen;
int res = 0;
abtCmd[0] = 0x1A; // MIFARE UltralightC Auth command
abtCmd[1] = 0x00; //
nfc_modulation nm = {
.nmt = NMT_ISO14443A,
.nbr = NBR_106
};
if((res = nfc_initiator_select_passive_target(pnd, nm, nai.abtUid, nai.szUidLen, NULL)) >= 0 ) {
nfc_device_set_property_bool (pnd, NP_EASY_FRAMING, false);
if ((res = nfc_initiator_transceive_bytes(pnd, abtCmd,sizeof(abtCmd), abtRx, sizeof(abtRx), 0)) >= 0) {
// AUTH step1 command success, so it's a Ultralight C
nfc_device_set_property_bool (pnd, NP_EASY_FRAMING, true);
nfc_initiator_deselect_target(pnd);
return strdup(" C");
} else {
// When a Auth failed, the tag returns in HALT state, so we don't need to deselect tag
nfc_device_set_property_bool (pnd, NP_EASY_FRAMING, true);
return NULL;
}
} else {
// Unable to reselect Ultralight tag
return NULL;
}
return NULL;
}
/*
Document used to code this function:
NXP Semiconductors
AN094533
DESFire EV1- Features and Hints
*/
char*
mifare_desfire_identification(const nfc_iso14443a_info nai)
{
uint8_t abtCmd[] = { 0x60 }; // MIFARE DESFire GetVersion command
uint8_t abtRx[265];
size_t szRxLen;
uint8_t abtDESFireVersion[14];
char* res = NULL;
int nfcRes = 0;
nfc_modulation nm = {
.nmt = NMT_ISO14443A,
.nbr = NBR_106
};
if((nfcRes = nfc_initiator_select_passive_target(pnd, nm, nai.abtUid, nai.szUidLen, NULL)) >= 0 ) {
if ((nfcRes = nfc_initiator_transceive_bytes(pnd, abtCmd, sizeof(abtCmd), abtRx, sizeof(abtRx), 0)) >= 0) {
// MIFARE DESFire GetVersion command success, decoding...
if( nfcRes == 8 ) { // GetVersion should reply 8 bytes
memcpy( abtDESFireVersion, abtRx + 1, 7 );
abtCmd[0] = 0xAF; // ask for GetVersion next bytes
if ((nfcRes = nfc_initiator_transceive_bytes(pnd, abtCmd, sizeof(abtCmd), abtRx, sizeof(abtRx), 0)) >= 0) {
if( nfcRes == 8 ) { // GetVersion should reply 8 bytes
memcpy( abtDESFireVersion + 7, abtRx + 1, 7 );
res = malloc(16); // We can alloc res: we will be able to provide information
bool bEV1 = ( ( abtDESFireVersion[3] == 0x01 ) && ( abtDESFireVersion[10] == 0x01 ) ); // Hardware major version and software major version should be equals to 1 to be an DESFire EV1
snprintf(res, 16, " %s%dk", bEV1 ? "EV1 " : "", (uint16_t)(1 << ((abtDESFireVersion[5] >> 1) - 10)));
}
}
}
}
} else {
// Select failed, tag may have been removed, so we can't provide more info and we don't have to deselect tag
return res;
}
nfc_initiator_deselect_target(pnd);
return res;
}
struct iso14443a_tag iso14443a_tags[] = {
{ 0x00, "NXP MIFARE UltraLight", 0, { 0 }, mifare_ultralight_identification },
{ 0x09, "NXP MIFARE Mini", 0, { 0 }, NULL },
{ 0x08, "NXP MIFARE Classic 1k", 0, { 0 }, NULL },
{ 0x18, "NXP MIFARE Classic 4k", 0, { 0 }, NULL },
{ 0x20, "NXP MIFARE DESFire", 5, { 0x75, 0x77, 0x81, 0x02, 0x80 }, mifare_desfire_identification },
{ 0x08, "NXP MIFARE Plus 1k", 0, { 0 }, NULL },
{ 0x18, "NXP MIFARE Plus 4k", 0, { 0 }, NULL },
{ 0x10, "NXP MIFARE Plus 1k", 0, { 0 }, NULL },
{ 0x11, "NXP MIFARE Plus 4k", 0, { 0 }, NULL },
{ 0x20, "NXP MIFARE Plus 1k", 0, { 0 }, NULL },
{ 0x20, "NXP MIFARE Plus 4k", 0, { 0 }, NULL },
{ 0x20, "NXP MIFARE Plus 1k/4k", 11, { 0x75, 0x77, 0x80, 0x02, 0xc1, 0x05, 0x2f, 0x2f, 0x01, 0xbc, 0xd6}, NULL },
{ 0x20, "NXP MIFARE Plus 2k/4k", 11, { 0x75, 0x77, 0x80, 0x02, 0xc1, 0x05, 0x2f, 0x2f, 0x01, 0xbc, 0xd6 }, NULL },
{ 0x88, "Infineon MIFARE Classic 1k", 0, { 0 }, NULL },
{ 0x38, "Nokia MIFARE Classic 4k (Emulated)", 0, { 0 }, NULL },
{ 0x28, "NXP JCOP31", 0, { 0 }, NULL },
/* @todo handle ATS to be able to know which one is it. */
{ 0x20, "NXP JCOP31 or JCOP41", 0, { 0 }, NULL },
{ 0x28, "NXP JCOP41", 0, { 0 }, NULL },
{ 0x98, "Gemplus MPCOS", 0, { 0 }, NULL },
/* @note I'm not sure that Jewel can be detected using this modulation but I haven't Jewel tags to test. */
{ 0x98, "Innovision R&T Jewel", 0, { 0 }, NULL },
};
void
print_iso14443a_name(const nfc_iso14443a_info nai)
{
const char *tag_name[sizeof (iso14443a_tags) / sizeof (struct iso14443a_tag)];
int matches=0;
char *additionnal_info[sizeof (iso14443a_tags) / sizeof (struct iso14443a_tag)];
for (size_t i = 0; i < sizeof (iso14443a_tags) / sizeof (struct iso14443a_tag); i++) {
if ( (nai.btSak == iso14443a_tags[i].SAK) ) {
// printf("DBG: iso14443a_tags[i].ATS_length = %d , nai.szAtsLen = %d", iso14443a_tags[i].ATS_length, nai.szAtsLen);
if ( iso14443a_tags[i].identication_fct != NULL ) {
additionnal_info[matches] = iso14443a_tags[i].identication_fct(nai);
} else {
additionnal_info[matches] = NULL;
}
if( iso14443a_tags[i].ATS_length == 0 ) {
tag_name[matches++] = (iso14443a_tags[i].name);
continue;
}
if( iso14443a_tags[i].ATS_length == nai.szAtsLen ) {
if ( memcmp( nai.abtAts, iso14443a_tags[i].ATS, iso14443a_tags[i].ATS_length ) == 0 ) {
tag_name[matches++] = (iso14443a_tags[i].name);
continue;
}
}
}
}
int i;
if (matches != 0) {
printf("UID=");
print_hex (nai.abtUid, nai.szUidLen);
printf ("\n");
if (matches > 1) {
printf ("Several possible matches:\n");
}
for (i = 0; i < matches; i++ ) {
printf("* %s", tag_name[i]);
if( additionnal_info[i] != NULL ) {
printf("%s", additionnal_info[i]);
free(additionnal_info[i]);
}
printf ("\n");
}
} else {
printf ("Unknown ISO14443A tag type: ");
printf ("ATQA (SENS_RES): ");
print_hex (nai.abtAtqa, 2);
printf (", UID (NFCID%c): ", (nai.abtUid[0] == 0x08 ? '3' : '1'));
print_hex (nai.abtUid, nai.szUidLen);
printf (", SAK (SEL_RES): ");
print_hex (&nai.btSak, 1);
if (nai.szAtsLen) {
printf (", ATS (ATR): ");
print_hex (nai.abtAts, nai.szAtsLen);
}
printf ("\n");
}
}
struct felica_tag felica_tags[] = {
{ { 0x88, 0xb4 }, "FeliCa Lite" },
{ { 0x12, 0xfc }, "NFC Forum (NDEF)" },
{ { 0xfe, 0xe1 }, "NFC Dynamic Tag (FeliCa Plug)" },
};
void
print_nfc_felica_info (const nfc_felica_info nfi)
{
printf (" ID (NFCID2): ");
print_hex (nfi.abtId, 8);
printf (" Parameter (PAD): ");
print_hex (nfi.abtPad, 8);
printf (" System Code (SC): ");
print_hex (nfi.abtSysCode, 2);
for (size_t i = 0; i < sizeof (felica_tags) / sizeof (struct felica_tag); i++) {
if ( (nfi.abtSysCode[0] == felica_tags[i].abtSysCode[0]) && (nfi.abtSysCode[1] == felica_tags[i].abtSysCode[1]) ) {
printf (" %s\n", felica_tags[i].name);
}
}
}
int
main (int argc, const char *argv[])
{
uint8_t device_count = 0;
uint8_t device_tag_count = 0; // per device
uint8_t tag_count = 0; // total
size_t szDeviceFound;
size_t szTargetFound;
int res = 0;
(void)(argc);
(void)(argv);
nfc_init(NULL);
// Try to open the NFC device
nfc_connstring connstrings[MAX_DEVICE_COUNT];
szDeviceFound = nfc_list_devices (NULL, connstrings, MAX_DEVICE_COUNT);
if (szDeviceFound == 0) {
ERR ("%s", "No device found.");
}
for (size_t i = 0; i < szDeviceFound; i++) {
pnd = nfc_open (NULL, connstrings[i]);
nfc_target ant[MAX_TARGET_COUNT];
device_count++;
device_tag_count = 0;
if (pnd == NULL) {
ERR ("%s", "Unable to connect to NFC device.");
return EXIT_FAILURE;
}
nfc_initiator_init (pnd);
// Drop the field for a while
nfc_device_set_property_bool (pnd, NP_ACTIVATE_FIELD, false);
// Let the reader only try once to find a tag
nfc_device_set_property_bool (pnd, NP_INFINITE_SELECT, false);
// Enable field so more power consuming cards can power themselves up
nfc_device_set_property_bool (pnd, NP_ACTIVATE_FIELD, true);
printf ("NFC device: %s \n", nfc_device_get_name (pnd));
nfc_modulation nm = {
.nmt = NMT_ISO14443A,
.nbr = NBR_106
};
if ((res = nfc_initiator_list_passive_targets(pnd, nm, ant, MAX_TARGET_COUNT )) >= 0) {
size_t n;
for(n = 0; n < res; n++) {
print_iso14443a_name (ant[n].nti.nai);
}
device_tag_count += res;
}
nm.nmt = NMT_ISO14443B;
if ((res = nfc_initiator_list_passive_targets(pnd, nm, ant, MAX_TARGET_COUNT )) >= 0) {
size_t n;
for(n=0; n= 0) {
int n;
for (n = 0; n < res; n++) {
print_nfc_felica_info (ant[n].nti.nfi);
printf ("\n");
}
device_tag_count += res;
}
nm.nbr = NBR_424;
if ((res = nfc_initiator_list_passive_targets (pnd, nm, ant, MAX_TARGET_COUNT)) >= 0) {
int n;
for (n = 0; n < res; n++) {
print_nfc_felica_info (ant[n].nti.nfi);
printf ("\n");
}
device_tag_count += res;
}
printf ("%d tag(s) on device.\n", device_tag_count);
tag_count += device_tag_count;
// Disable field
nfc_device_set_property_bool (pnd, NP_ACTIVATE_FIELD, false);
nfc_close (pnd);
}
if (device_count > 1) {
printf ("Total: %d tag(s) on %d device(s).\n", tag_count, device_count);
}
nfc_exit(NULL);
return EXIT_SUCCESS;
}