nfcutils/src/lsnfc.c
Romuald Conty f6bd5014bd nfcutils: fix minor warnings
git-svn-id: https://nfc-tools.googlecode.com/svn/trunk/nfcutils@1134 ba5c3050-9c55-11de-a262-85a698460a8e
2015-04-07 14:23:13 +02:00

372 lines
12 KiB
C

/**
* NFC utils - lsnfc
*
* Copyright (C) 2009, 2010, Romuald Conty
*
* This program is free software: you can redistribute it and/or modify it
* under the terms of the GNU General Public License as published by the Free
* Software Foundation, either version 3 of the License, or (at your option)
* any later version.
*
* This program is distributed in the hope that it will be useful, but WITHOUT
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
* more details.
*
* You should have received a copy of the GNU General Public License along with
* this program. If not, see <http://www.gnu.org/licenses/>
*/
/*
* This implementation was written based on information provided by the
* following documents:
*
* MIFARE Type Identification Procedure
* AN10833
* Rev. 3.1 — 07 July 2009
* Application note
*
* ISO14443 tags list
* http://www.libnfc.org/documentation/hardware/tags/iso14443
*/
#include "config.h"
#include <stdio.h>
#include <stddef.h>
#include <stdlib.h>
#include <string.h>
#include <nfc/nfc.h>
static nfc_device *pnd;
#define ERR(x, ...) printf("ERROR: " x "\n", __VA_ARGS__ )
#define MAX_DEVICE_COUNT 16
#define MAX_TARGET_COUNT 16
#define MAX_ATS_LENGTH 32
typedef char *(*identication_hook)(const nfc_iso14443a_info nai);
struct iso14443a_tag {
uint8_t SAK;
const char *name;
size_t ATS_length;
uint8_t ATS[MAX_ATS_LENGTH];
identication_hook identication_fct;
};
struct felica_tag {
uint8_t abtSysCode[2];
const char *name;
};
static void
print_hex(const uint8_t *pbtData, size_t szData)
{
for (size_t i = 0; i < szData; i++) {
printf("%02x", pbtData[i]);
}
printf("\n");
}
static char *
mifare_ultralight_identification(const nfc_iso14443a_info nai)
{
uint8_t abtCmd[2];
uint8_t abtRx[265];
int res = 0;
abtCmd[0] = 0x1A; // MIFARE UltralightC Auth command
abtCmd[1] = 0x00; //
nfc_modulation nm = {
.nmt = NMT_ISO14443A,
.nbr = NBR_106
};
if ((res = nfc_initiator_select_passive_target(pnd, nm, nai.abtUid, nai.szUidLen, NULL)) >= 0) {
nfc_device_set_property_bool(pnd, NP_EASY_FRAMING, false);
if ((res = nfc_initiator_transceive_bytes(pnd, abtCmd, sizeof(abtCmd), abtRx, sizeof(abtRx), 0)) >= 0) {
// AUTH step1 command success, so it's a Ultralight C
nfc_device_set_property_bool(pnd, NP_EASY_FRAMING, true);
nfc_initiator_deselect_target(pnd);
return strdup(" C");
} else {
// When a Auth failed, the tag returns in HALT state, so we don't need to deselect tag
nfc_device_set_property_bool(pnd, NP_EASY_FRAMING, true);
return NULL;
}
} else {
// Unable to reselect Ultralight tag
return NULL;
}
return NULL;
}
/*
Document used to code this function:
NXP Semiconductors
AN094533
DESFire EV1- Features and Hints
*/
static char *
mifare_desfire_identification(const nfc_iso14443a_info nai)
{
uint8_t abtCmd[] = { 0x60 }; // MIFARE DESFire GetVersion command
uint8_t abtRx[265];
uint8_t abtDESFireVersion[14];
char *res = NULL;
int nfcRes = 0;
nfc_modulation nm = {
.nmt = NMT_ISO14443A,
.nbr = NBR_106
};
if ((nfcRes = nfc_initiator_select_passive_target(pnd, nm, nai.abtUid, nai.szUidLen, NULL)) >= 0) {
if ((nfcRes = nfc_initiator_transceive_bytes(pnd, abtCmd, sizeof(abtCmd), abtRx, sizeof(abtRx), 0)) >= 0) {
// MIFARE DESFire GetVersion command success, decoding...
if (nfcRes == 8) { // GetVersion should reply 8 bytes
memcpy(abtDESFireVersion, abtRx + 1, 7);
abtCmd[0] = 0xAF; // ask for GetVersion next bytes
if ((nfcRes = nfc_initiator_transceive_bytes(pnd, abtCmd, sizeof(abtCmd), abtRx, sizeof(abtRx), 0)) >= 0) {
if (nfcRes == 8) { // GetVersion should reply 8 bytes
memcpy(abtDESFireVersion + 7, abtRx + 1, 7);
res = malloc(16); // We can alloc res: we will be able to provide information
bool bEV1 = ((abtDESFireVersion[3] == 0x01) && (abtDESFireVersion[10] == 0x01)); // Hardware major version and software major version should be equals to 1 to be an DESFire EV1
snprintf(res, 16, " %s%dk", bEV1 ? "EV1 " : "", (uint16_t)(1 << ((abtDESFireVersion[5] >> 1) - 10)));
}
}
}
}
} else {
// Select failed, tag may have been removed, so we can't provide more info and we don't have to deselect tag
return res;
}
nfc_initiator_deselect_target(pnd);
return res;
}
struct iso14443a_tag iso14443a_tags[] = {
{ 0x00, "NXP MIFARE UltraLight", 0, { 0 }, mifare_ultralight_identification },
{ 0x09, "NXP MIFARE Mini", 0, { 0 }, NULL },
{ 0x08, "NXP MIFARE Classic 1k", 0, { 0 }, NULL },
{ 0x18, "NXP MIFARE Classic 4k", 0, { 0 }, NULL },
{ 0x20, "NXP MIFARE DESFire", 5, { 0x75, 0x77, 0x81, 0x02, 0x80 }, mifare_desfire_identification },
{ 0x08, "NXP MIFARE Plus 1k", 0, { 0 }, NULL },
{ 0x18, "NXP MIFARE Plus 4k", 0, { 0 }, NULL },
{ 0x10, "NXP MIFARE Plus 1k", 0, { 0 }, NULL },
{ 0x11, "NXP MIFARE Plus 4k", 0, { 0 }, NULL },
{ 0x20, "NXP MIFARE Plus 1k", 0, { 0 }, NULL },
{ 0x20, "NXP MIFARE Plus 4k", 0, { 0 }, NULL },
{ 0x20, "NXP MIFARE Plus 1k/4k", 11, { 0x75, 0x77, 0x80, 0x02, 0xc1, 0x05, 0x2f, 0x2f, 0x01, 0xbc, 0xd6}, NULL },
{ 0x20, "NXP MIFARE Plus 2k/4k", 11, { 0x75, 0x77, 0x80, 0x02, 0xc1, 0x05, 0x2f, 0x2f, 0x01, 0xbc, 0xd6 }, NULL },
{ 0x88, "Infineon MIFARE Classic 1k", 0, { 0 }, NULL },
{ 0x38, "Nokia MIFARE Classic 4k (Emulated)", 0, { 0 }, NULL },
{ 0x28, "NXP JCOP31", 0, { 0 }, NULL },
/* @todo handle ATS to be able to know which one is it. */
{ 0x20, "NXP JCOP31 or JCOP41", 0, { 0 }, NULL },
{ 0x28, "NXP JCOP41", 0, { 0 }, NULL },
{ 0x98, "Gemplus MPCOS", 0, { 0 }, NULL },
/* @note I'm not sure that Jewel can be detected using this modulation but I haven't Jewel tags to test. */
{ 0x98, "Innovision R&T Jewel", 0, { 0 }, NULL },
};
static void
print_iso14443a_name(const nfc_iso14443a_info nai)
{
const char *tag_name[sizeof(iso14443a_tags) / sizeof(struct iso14443a_tag)];
int matches = 0;
char *additionnal_info[sizeof(iso14443a_tags) / sizeof(struct iso14443a_tag)];
for (size_t i = 0; i < sizeof(iso14443a_tags) / sizeof(struct iso14443a_tag); i++) {
if ((nai.btSak == iso14443a_tags[i].SAK)) {
// printf("DBG: iso14443a_tags[i].ATS_length = %d , nai.szAtsLen = %d", iso14443a_tags[i].ATS_length, nai.szAtsLen);
if (iso14443a_tags[i].identication_fct != NULL) {
additionnal_info[matches] = iso14443a_tags[i].identication_fct(nai);
} else {
additionnal_info[matches] = NULL;
}
if (iso14443a_tags[i].ATS_length == 0) {
tag_name[matches++] = (iso14443a_tags[i].name);
continue;
}
if (iso14443a_tags[i].ATS_length == nai.szAtsLen) {
if (memcmp(nai.abtAts, iso14443a_tags[i].ATS, iso14443a_tags[i].ATS_length) == 0) {
tag_name[matches++] = (iso14443a_tags[i].name);
continue;
}
}
}
}
int i;
if (matches != 0) {
printf("UID=");
print_hex(nai.abtUid, nai.szUidLen);
printf("\n");
if (matches > 1) {
printf("Several possible matches:\n");
}
for (i = 0; i < matches; i++) {
printf("* %s", tag_name[i]);
if (additionnal_info[i] != NULL) {
printf("%s", additionnal_info[i]);
free(additionnal_info[i]);
}
printf("\n");
}
} else {
printf("Unknown ISO14443A tag type: ");
printf("ATQA (SENS_RES): ");
print_hex(nai.abtAtqa, 2);
printf(", UID (NFCID%c): ", (nai.abtUid[0] == 0x08 ? '3' : '1'));
print_hex(nai.abtUid, nai.szUidLen);
printf(", SAK (SEL_RES): ");
print_hex(&nai.btSak, 1);
if (nai.szAtsLen) {
printf(", ATS (ATR): ");
print_hex(nai.abtAts, nai.szAtsLen);
}
printf("\n");
}
}
struct felica_tag felica_tags[] = {
{ { 0x88, 0xb4 }, "FeliCa Lite" },
{ { 0x12, 0xfc }, "NFC Forum (NDEF)" },
{ { 0xfe, 0xe1 }, "NFC Dynamic Tag (FeliCa Plug)" },
};
static void
print_nfc_felica_info(const nfc_felica_info nfi)
{
printf(" ID (NFCID2): ");
print_hex(nfi.abtId, 8);
printf(" Parameter (PAD): ");
print_hex(nfi.abtPad, 8);
printf(" System Code (SC): ");
print_hex(nfi.abtSysCode, 2);
for (size_t i = 0; i < sizeof(felica_tags) / sizeof(struct felica_tag); i++) {
if ((nfi.abtSysCode[0] == felica_tags[i].abtSysCode[0]) && (nfi.abtSysCode[1] == felica_tags[i].abtSysCode[1])) {
printf(" %s\n", felica_tags[i].name);
}
}
}
int
main(int argc, const char *argv[])
{
uint8_t device_count = 0;
uint8_t device_tag_count = 0; // per device
uint8_t tag_count = 0; // total
size_t szDeviceFound;
int res = 0;
(void)(argc);
(void)(argv);
nfc_context *context;
nfc_init(&context);
// Try to open the NFC device
nfc_connstring connstrings[MAX_DEVICE_COUNT];
szDeviceFound = nfc_list_devices(context, connstrings, MAX_DEVICE_COUNT);
if (szDeviceFound == 0) {
ERR("%s", "No device found.");
}
for (size_t i = 0; i < szDeviceFound; i++) {
pnd = nfc_open(context, connstrings[i]);
nfc_target ant[MAX_TARGET_COUNT];
device_count++;
device_tag_count = 0;
if (pnd == NULL) {
ERR("%s", "Unable to connect to NFC device.");
return EXIT_FAILURE;
}
nfc_initiator_init(pnd);
// Drop the field for a while
nfc_device_set_property_bool(pnd, NP_ACTIVATE_FIELD, false);
// Let the reader only try once to find a tag
nfc_device_set_property_bool(pnd, NP_INFINITE_SELECT, false);
// Enable field so more power consuming cards can power themselves up
nfc_device_set_property_bool(pnd, NP_ACTIVATE_FIELD, true);
printf("NFC device: %s \n", nfc_device_get_name(pnd));
nfc_modulation nm = {
.nmt = NMT_ISO14443A,
.nbr = NBR_106
};
if ((res = nfc_initiator_list_passive_targets(pnd, nm, ant, MAX_TARGET_COUNT)) >= 0) {
for (int n = 0; n < res; n++) {
print_iso14443a_name(ant[n].nti.nai);
}
device_tag_count += res;
}
nm.nmt = NMT_ISO14443B;
if ((res = nfc_initiator_list_passive_targets(pnd, nm, ant, MAX_TARGET_COUNT)) >= 0) {
for (int n = 0; n < res; n++) {
printf(" ISO14443B: ");
printf("PUPI: ");
print_hex(ant[n].nti.nbi.abtPupi, 4);
printf(" Application Data: ");
print_hex(ant[n].nti.nbi.abtApplicationData, 4);
printf(" Protocol Info: ");
print_hex(ant[n].nti.nbi.abtProtocolInfo, 3);
printf("\n");
}
device_tag_count += res;
} else {
nfc_perror(pnd, "nfc_initiator_list_passive_targets");
}
nm.nmt = NMT_FELICA;
nm.nbr = NBR_212;
// List Felica tags
if ((res = nfc_initiator_list_passive_targets(pnd, nm, ant, MAX_TARGET_COUNT)) >= 0) {
for (int n = 0; n < res; n++) {
print_nfc_felica_info(ant[n].nti.nfi);
printf("\n");
}
device_tag_count += res;
}
nm.nbr = NBR_424;
if ((res = nfc_initiator_list_passive_targets(pnd, nm, ant, MAX_TARGET_COUNT)) >= 0) {
for (int n = 0; n < res; n++) {
print_nfc_felica_info(ant[n].nti.nfi);
printf("\n");
}
device_tag_count += res;
}
printf("%d tag(s) on device.\n", device_tag_count);
tag_count += device_tag_count;
// Disable field
nfc_device_set_property_bool(pnd, NP_ACTIVATE_FIELD, false);
nfc_close(pnd);
}
if (device_count > 1) {
printf("Total: %d tag(s) on %d device(s).\n", tag_count, device_count);
}
nfc_exit(context);
return EXIT_SUCCESS;
}