-
Notifications
You must be signed in to change notification settings - Fork 8
/
cie_PN532.cpp
992 lines (825 loc) · 35.6 KB
/
cie_PN532.cpp
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
/**************************************************************************/
/*!
@file cie_PN532.cpp
@author Developers Italia
@license BSD (see License)
This is a library for the PN532 NFC/RFID breakout boards
This library works with the Adafruit NFC breakout
----> https://www.adafruit.com/products/364
Check out the links above for our tutorials and wiring diagrams
These chips use SPI or I2C to communicate.
This library uses SPI to communicate.
@section HISTORY
v1.0 - Binary reading of unencrypted elementary files
*/
/**************************************************************************/
#include "cie_PN532.h"
#define PN532DEBUGPRINT Serial
/**************************************************************************/
/*!
@brief Create with the typical breakout wiring, as described by Adafruit: https://learn.adafruit.com/adafruit-pn532-rfid-nfc/breakout-wiring
*/
/**************************************************************************/
cie_PN532::cie_PN532 () : cie_PN532(2, 5, 3, 4) {
}
/**************************************************************************/
/*!
@brief Create with a customized wiring
@param clk The CLK pin number
@param miso The MISO pin number
@param mosi The MOSI pin number
@param ss The SS pin number
*/
/**************************************************************************/
cie_PN532::cie_PN532 (byte clk, byte miso, byte mosi, byte ss)
{
_nfc = new cie_Nfc_Adafruit(clk, miso, mosi, ss);
initFields();
}
/**************************************************************************/
/*!
@brief Create with a custom instance of the Adafruit_PN532 class
*/
/**************************************************************************/
cie_PN532::cie_PN532 (cie_Nfc *nfc)
{
_nfc = nfc;
initFields();
}
/**************************************************************************/
/*!
@brief Set default values to some private fields
*/
/**************************************************************************/
void cie_PN532::initFields() {
_currentDedicatedFile = NULL_DF;
_currentElementaryFile = NULL_EF;
_berReader = new cie_BerReader(this);
_atrReader = new cie_AtrReader(this);
verbose = false;
}
/**************************************************************************/
/*!
@brief Initializes the PN532 board
*/
/**************************************************************************/
void cie_PN532::begin() {
_nfc->begin();
PN532DEBUGPRINT.println(F("PN53x initialized, waiting for a CIE card..."));
}
/**************************************************************************/
/*!
@brief Dumps all values present in the CIE. Call this in your loop
*/
/**************************************************************************/
bool cie_PN532::detectCard() {
bool success = _nfc->detectCard();
if (success) {
_currentDedicatedFile = NULL_DF;
_currentDedicatedFile = NULL_EF;
}
return success;
}
/**************************************************************************/
/*!
@brief Prints an hex representation of a buffer
@param buffer The pointer to the byte buffer
@param length The length of the buffer
*/
/**************************************************************************/
void cie_PN532::printHex(byte *buffer, const word length) {
for (word szPos=0; szPos < length; szPos++)
{
PN532DEBUGPRINT.print(F("0x"));
// Append leading 0 for small values
if (buffer[szPos] <= 0xF) {
PN532DEBUGPRINT.print(F("0"));
}
PN532DEBUGPRINT.print(buffer[szPos]&0xff, HEX);
if ((length > 1) && (szPos != length - 1))
{
PN532DEBUGPRINT.print(F(" "));
}
}
PN532DEBUGPRINT.println();
}
/**************************************************************************/
/*!
@brief Reads the binary content the EF_DH elementary file
@param contentBuffer The pointer to data containing the contents of the file
@param contentLength The length of the file
@returns A boolean value indicating whether the operation succeeded or not
*/
/**************************************************************************/
bool cie_PN532::read_EF_DH(byte *contentBuffer, word *contentLength) {
//cie_EFPath filePath = { ROOT_MF, SELECT_BY_SFI, 0x1B }; //efid 0xD004
cie_EFPath filePath = { ROOT_MF, SELECT_BY_EFID, 0xD004 }; //efid 0xD004
return readElementaryFile(filePath, contentBuffer, contentLength, AUTODETECT_BER_LENGTH);
}
/**************************************************************************/
/*!
@brief Reads the binary content of the EF_ATR elementary file
@param contentBuffer The pointer to data containing the contents of the file
@param contentLength The length of the file
@returns A boolean value indicating whether the operation succeeded or not
*/
/**************************************************************************/
bool cie_PN532::read_EF_ATR(byte *contentBuffer, word *contentLength) {
cie_EFPath filePath = { ROOT_MF, SELECT_BY_SFI, 0x1D }; //efid 0x2F01
return readElementaryFile(filePath, contentBuffer, contentLength, AUTODETECT_ATR_LENGTH);
}
/**************************************************************************/
/*!
@brief Reads the binary content of the SN_ICC elementary file
@param contentBuffer The pointer to data containing the contents of the file
@param contentLength The length of the file
@returns A boolean value indicating whether the operation succeeded or not
*/
/**************************************************************************/
bool cie_PN532::read_EF_SN_ICC(byte *contentBuffer, word *contentLength) {
cie_EFPath filePath = { ROOT_MF, SELECT_BY_EFID, 0xD003 }; //What's the sfi for this file?
*contentLength = clamp(*contentLength, EF_SN_ICC_LENGTH);
return readElementaryFile(filePath, contentBuffer, contentLength, FIXED_LENGTH);
}
/**************************************************************************/
/*!
@brief Reads the binary content of the EF_ID_Servizi elementary file
@param contentBuffer The pointer to data containing the contents of the file
@param contentLength The length of the file
@returns A boolean value indicating whether the operation succeeded or not
*/
/**************************************************************************/
bool cie_PN532::read_EF_ID_Servizi(byte *contentBuffer, word *contentLength) {
cie_EFPath filePath = { CIE_DF, SELECT_BY_SFI, 0x01 }; //efid 0x1001
*contentLength = clamp(*contentLength, EF_ID_SERVIZI_LENGTH);
return readElementaryFile(filePath, contentBuffer, contentLength, FIXED_LENGTH);
}
/**************************************************************************/
/*!
@brief Reads the binary content of the EF.Int.Kpub elementary file
@param key The pointer to a cie_Key object which will be populated with the modulus and exponent values
@returns A boolean value indicating whether the operation succeeded or not
*/
/**************************************************************************/
bool cie_PN532::read_EF_Int_Kpub(cie_Key *key) {
cie_EFPath filePath = { CIE_DF, SELECT_BY_SFI, 0x04 }; //efid 0x1004
return readKey(filePath, key);
}
/**************************************************************************/
/*!
@brief Reads the binary content of the EF.Servizi_Int.Kpub elementary file
@param key The pointer to a cie_Key object which will be populated with the modulus and exponent values
@returns A boolean value indicating whether the operation succeeded or not
*/
/**************************************************************************/
bool cie_PN532::read_EF_Servizi_Int_Kpub(cie_Key *key) {
cie_EFPath filePath = { CIE_DF, SELECT_BY_SFI, 0x05 }; //efid 0x1005
return readKey(filePath, key);
}
/**************************************************************************/
/*!
@brief Performs the challenge/response algorithm with the SDO.Int_Servizi.Kpub to check where this is a valid or cloned card
@returns A boolean value indicating whether the card is valid or not
*/
/**************************************************************************/
bool cie_PN532::isCardValid() {
cie_Key *key = new cie_Key();
if (!read_EF_Servizi_Int_Kpub(key)) {
return false;
}
word responseLength = key->modulusLength + STATUS_WORD_LENGTH;
byte *response = new byte[responseLength];
byte challengeLength = CHALLENGE_LENGTH;
byte *challenge = new byte[challengeLength];
_nfc->generateRandomBytes(challenge, 0, challengeLength);
bool success = true;
//Steps for checking this is not a cloned card
//1. Select the SDO.Servizi_Int.Kpriv key
//2. Send the Internal Authenticate APDU command
//3. Verify the response is correct
//4. Check if EF.Servizi_int.Kpub has a correct signature in EF_SOD
if (!select_SDO_Servizi_Int_Kpriv()
|| !internalAuthenticate(response, &responseLength, challenge, challengeLength)
|| !verifyInternalAuthenticateResponse(key, response, responseLength, challenge, challengeLength)
//|| !verify_Servizi_Int_Kpub(...)
) {
success = false;
}
delete [] challenge;
delete [] response;
return success;
}
/**************************************************************************/
/*!
@brief Print the binary content of the EF_SOD elementary file
@param contentLength The reported length of the file
@returns A boolean value indicating whether the operation succeeded or not
*/
/**************************************************************************/
bool cie_PN532::print_EF_SOD(word *contentLength) {
cie_EFPath filePath = { CIE_DF, SELECT_BY_SFI, 0x06 }; //efid 0x1006
if (!determineLength(filePath, contentLength, AUTODETECT_BER_LENGTH)) {
return false;
}
word offset = READ_FROM_START;
while (offset < *contentLength) {
word contentPageLength = clamp(*contentLength-offset, PAGE_LENGTH);
byte *pageBuffer = new byte[contentPageLength];
bool success = readBinaryContent(filePath, pageBuffer, offset, contentPageLength);
if (success) {
printHex(pageBuffer, contentPageLength);
}
delete [] pageBuffer;
offset += contentPageLength;
if (!success) {
return false;
}
}
return true;
}
/**************************************************************************/
/*!
@brief Parses the BER content of the EF_SOD file
@param callback A function which will be invoked when a new triple has been read
@returns A boolean value indicating whether the operation succeeded or not
*/
/**************************************************************************/
bool cie_PN532::parse_EF_SOD(cieBerTripleCallbackFunc callback) {
word payloadLength;
cie_EFPath filePath = { CIE_DF, SELECT_BY_SFI, 0x06 }; //efid 0x1006
return _berReader->readTriples(filePath, callback, &payloadLength, 30);
}
/**************************************************************************/
/*!
@brief Selects the SDO.Servizi_Int.Kpriv private key for internal authentication
@returns A boolean value indicating whether the operation succeeded or not
*/
/**************************************************************************/
bool cie_PN532::select_SDO_Servizi_Int_Kpriv() {
cie_EFPath filePath = { CIE_DF, SELECT_BY_SDOID, 0x03 };
return ensureSdoIsSelected(filePath);
}
/**************************************************************************/
/*!
@brief Sends an APDU command which won't return any data to the CIE via the PN532 terminal and checks whether the response has a valid status word
@param command A pointer to the APDU command bytes
@param commandLength Length of the command
@returns A boolean value indicating whether the operation succeeded or not
*/
/**************************************************************************/
bool cie_PN532::sendCommand(byte *command, const word commandLength) {
word responseLength = STATUS_WORD_LENGTH;
byte *responseBuffer = new byte[responseLength];
bool success = sendCommand(command, commandLength, responseBuffer, &responseLength);
delete [] responseBuffer;
return success;
}
/**************************************************************************/
/*!
@brief Sends an APDU command to the CIE via the PN532 terminal and checks whether the response has a valid status word
@param command A pointer to the APDU command bytes
@param commandLength Length of the command
@param response A pointer to the buffer which will contain the response bytes
@param responseLength The length of the desired response
@returns A boolean value indicating whether the operation succeeded or not
*/
/**************************************************************************/
bool cie_PN532::sendCommand(byte *command, const byte commandLength, byte *responseBuffer, word *responseLength) {
bool success = true;
if (!_nfc->sendCommand(command, commandLength, responseBuffer, responseLength)
|| !hasSuccessStatusWord(responseBuffer, *responseLength)) {
success = false;
}
if (verbose) {
PN532DEBUGPRINT.print(F("Command ("));
PN532DEBUGPRINT.print(success ? F("success") : F("failure"));
PN532DEBUGPRINT.print(F("): "));
printHex(command, commandLength);
}
return success;
}
/**************************************************************************/
/*!
@brief Performs internal authentication
@param responseBuffer A pointer to the buffer which will contain the response for the internal authentication command
@param responseLength The length of the response
@param challenge A pointer to the challenge
@param challengeLength The length of the provided challenge
@returns A boolean value indicating whether the operation succeeded or not
*/
/**************************************************************************/
bool cie_PN532::internalAuthenticate(byte *responseBuffer, word *responseLength, byte *challenge, const byte challengeLength) {
byte internalAuthenticateCommandLength = 6+challengeLength;
byte *internalAuthenticateCommand = new byte[internalAuthenticateCommandLength] {
0x00, //CLA
0x88, //INS: INTERNAL AUTHENTICATE PK-DH scheme
0x00, //P1: algorithm reference -> no further information (information available in the current SE)
0x00, //P2: secret reference -> no further information (information available in the current SE)
0x08, //Lc: Length of the rndIfd
};
memcpy(internalAuthenticateCommand+5, challenge, challengeLength);
internalAuthenticateCommand[internalAuthenticateCommandLength-1] = 0x00; //Return all bytes
bool success = sendCommand(internalAuthenticateCommand, internalAuthenticateCommandLength, responseBuffer, responseLength);
if (!success) {
PN532DEBUGPRINT.println(F("Couldn't perform internal authentication"));
}
*responseLength -= STATUS_WORD_LENGTH;
delete [] internalAuthenticateCommand;
return success;
}
/**************************************************************************/
/*!
@brief Verify if the response returned for an INTERNAL AUTHENTICATE command is valid
@param pubKey A pointer to public key that is going to be used for decryption
@param cypher The encrypted response returned for the INTERNAL AUTHENTICATE command
@param cypherLength The length of the cypher, should be the same size of the public key modulus
@param message A pointer to the original message to be verified
@param messageLength The length of the message
@returns A boolean value indicating whether the response was valid or not
*/
/**************************************************************************/
bool cie_PN532::verifyInternalAuthenticateResponse(cie_Key *pubKey, byte *cypher, const word cypherLength, const byte *message, const word messageLength) {
//To be implemented
return false;
}
/**************************************************************************/
/*!
@brief Performs mutual authentication
@param snIccBuffer A pointer to the buffer containing the SN.ICC (card serial number)
@param snIccBufferLength The length of the SN.ICC buffer
@param rndIccBuffer A pointer to the buffer containing the RND.ICC (a random number generated by the card chip)
@param rndIccBufferLength The length of the RND.ICC buffer
@returns A boolean value indicating whether the operation succeeded or not
*/
/**************************************************************************/
bool cie_PN532::mutualAuthenticate(byte *snIccBuffer, const byte snIccBufferLength, byte *rndIccBuffer, const byte rndIccBufferLength) {
/*
//Prepare randoms
byte *rndIfd = new byte[CHALLENGE_LENGTH];
_nfc->generateRandomBytes(rndIfd, 0, CHALLENGE_LENGTH);
byte *kIfd = new byte[K_LENGTH];
_nfc->generateRandomBytes(kIfd, 0, CHALLENGE_LENGTH);
delete [] rndIfd;
delete [] kIfd;
//TODO: Page 59 - 5.2.2.2 Authentication steps
//http://www.unsads.com/specs/IASECC/IAS_ECC_v1.0.1_UK.pdf
PN532DEBUGPRINT.println(F("Not yet implemented"));*/
return false;
}
/**************************************************************************/
/*!
@brief Establishes a secure messaging context by performing mutual authentication
@returns A boolean value indicating whether the operation succeeded or not
*/
/**************************************************************************/
bool cie_PN532::establishSecureMessaging() {
/*word snIccLength = EF_SN_ICC_LENGTH;
byte *snIcc = new byte[snIccLength];
word rndIccLength = CHALLENGE_LENGTH + STATUS_WORD_LENGTH;
byte *rndIcc = new byte[rndIccLength];
//Steps
//1. Send a READ BINARY command for the SN.ICC Elementary File
//2. Retrieval of the card key set for device authentication
//3. Send a GET CHALLENGE command and retrieve the RND.ICC
//4. Send a MUTUAL AUTHENTICATE command
//5. Verify the MAC is correct
bool success = true;
if (!read_EF_SN_ICC(snIcc, &snIccLength)
|| !getChallenge(rndIcc, &rndIccLength)
|| !mutualAuthenticate(snIcc, snIccLength, rndIcc, rndIccLength)
//|| !verifyMac(...)
) {
success = false;
}
if (!success) {
PN532DEBUGPRINT.println(F("Couldn't establish a secure messaging context"));
}
delete [] snIcc;
delete [] rndIcc;
return success;*/
return false;
}
/**************************************************************************/
/*!
@brief Reads the binary content of an Elementary File given its Dedicated File and EFID or SFI identifier
@param contentBuffer Pointer to the response data
@param contentLength The length of the response
@returns A boolean value indicating whether the operation succeeded or not
*/
/**************************************************************************/
bool cie_PN532::getChallenge(byte *contentBuffer, word *contentLength) {
/*byte getChallengeCommand[] = {
0x00, //CLA
0x84, //INS: GET CHALLENGE
0x00, //P1: not used
0x00, //P2: not used
0x08 //Le: Length of the rndIcc
};
bool success = sendCommand(getChallengeCommand, sizeof(getChallengeCommand), contentBuffer, contentLength);
if (!success) {
PN532DEBUGPRINT.println(F("Couldn't get challenge"));
}
*contentLength = CHALLENGE_LENGTH;
return success;*/
return false;
}
/**************************************************************************/
/*!
@brief Reads the binary content of an Elementary File given its Dedicated File and EFID or SFI identifier
@param df The containing Dedicated File (either ROOT_MF or CIE_DF)
@param filePath a structure indicating the parent Dedicated File (either ROOT_MF or CIE_DF), the selection mode (either SELECT_BY_EFID or SELECT_BY_SFI) and the file identifier (either a sfi or an efid)
@param contentBuffer Pointer to the response data
@param response The maximum desired length of the response
@param lengthStrategy How to determine the length of the file (either FIXED_LENGTH or AUTODETECT_BER_LENGTH or AUTODETECT_ATR_LENGTH)
@returns A boolean value indicating whether the operation succeeded or not
*/
/**************************************************************************/
bool cie_PN532::readElementaryFile(cie_EFPath filePath, byte *contentBuffer, word *contentLength, const byte lengthStrategy) {
//Some arguments passed around but more testable
if (!determineLength(filePath, contentLength, lengthStrategy) ||
!readBinaryContent(filePath, contentBuffer, READ_FROM_START, *contentLength)) {
return false;
}
return true;
}
/**************************************************************************/
/*!
@brief Ensures an Elementary file is selected (does nothing if it was already selected)
@param filePath a structure indicating the parent Dedicated File (either ROOT_MF or CIE_DF), the selection mode (either SELECT_BY_EFID or SELECT_BY_SFI) and the file identifier (either a sfi or an efid)
@returns A boolean value indicating whether the operation succeeded or not
*/
/**************************************************************************/
bool cie_PN532::ensureElementaryFileIsSelected(cie_EFPath filePath) {
if (filePath.selectionMode != SELECT_BY_EFID) {
PN532DEBUGPRINT.println(F("This method should be called just for EFID selection"));
return false;
}
if (!ensureDedicatedFileIsSelected(filePath.df)) {
return false;
}
//If it's already selected, no need to select it again
if (_currentElementaryFile == filePath.id) {
return true;
}
byte efid[2] = { (byte) (filePath.id >> 8), (byte) (filePath.id & 0b11111111) };
byte selectCommand[] = {
0x00, //CLA
0xA4, //INS: SELECT FILE
0x02, //P1: Select by EFID
0x0C, //P2: No data in response
0x02, //Lc: Length of EFID
efid[0], efid[1] //EFID
};
bool success = sendCommand(selectCommand, sizeof(selectCommand));
if (!success) {
PN532DEBUGPRINT.print(F("Couldn't select the EF by its EFID "));
printHex(efid, 2);
return false;
}
_currentElementaryFile = filePath.id;
return true;
}
/**************************************************************************/
/*!
@brief Ensures an elementary file is selected by its SDO ID, that is by sending an MSE mode SET (with AT template) command
@param filePath a structure indicating the parent Dedicated File (either ROOT_MF or CIE_DF), the selection mode (either SELECT_BY_EFID or SELECT_BY_SFI) and the file identifier (either a sfi or an efid)
@returns A boolean value indicating whether the operation succeeded or not
*/
/**************************************************************************/
bool cie_PN532::ensureSdoIsSelected(cie_EFPath filePath) {
if (filePath.selectionMode != SELECT_BY_SDOID) {
PN532DEBUGPRINT.println(F("This method should be called just for SDO selection"));
return false;
}
if (!ensureDedicatedFileIsSelected(filePath.df)) {
return false;
}
//If it's already selected, no need to select it again
if (_currentElementaryFile == filePath.id) {
return true;
}
byte selectCommand[] = {
0x00, //CLA
0x22, //INS: MSE mode SET
0x41, //P1: Template AT
0xA4, //P2
0x06, //Lc: Length of the data (composed of two TLV triples)
0x80, 0x01, 0x02, //First TLV triple: Selection of the RSA PKCS#1 - SHA1 with not data formatting
0x84, 0x01, (byte)(0b10000000 | filePath.id) //Second TLV triple: SDO ID OR'ed with 0b10000000 to indicate it's in the currently selected DF
};
bool success = sendCommand(selectCommand, sizeof(selectCommand));
if (!success) {
PN532DEBUGPRINT.println(F("Couldn't select the EF by its SDO ID "));
return false;
}
_currentElementaryFile = filePath.id;
return true;
}
/**************************************************************************/
/*!
@brief Selects a dedicated file in the IAS application
@param df The Dedicated File (either ROOT_MF or CIE_DF)
@returns A boolean value indicating whether the operation succeeded or not
*/
/**************************************************************************/
bool cie_PN532::ensureDedicatedFileIsSelected (const byte df) {
//No need to re-select the same Dedicated File if it's already the selected one
if (_currentDedicatedFile == df) {
return true;
} else {
//We're chaging Dedicated File, the current Elementary File will be deselected to prevent id collision
_currentElementaryFile = NULL_EF;
}
if (!selectIasApplication()) {
return false;
}
switch (df) {
case ROOT_MF:
if (!selectRootMasterFile()) {
return false;
}
break;
case CIE_DF:
if (!selectCieDedicatedFile()) {
return false;
}
break;
default:
PN532DEBUGPRINT.println(F("The DF must be either ROOT_MF or CIE_DF"));
return false;
}
_currentDedicatedFile = df;
return true;
}
/**************************************************************************/
/*!
@brief Sets the length value of a currently selected Elementary File
@param filePath a structure indicating the parent Dedicated File (either ROOT_MF or CIE_DF), the selection mode (either SELECT_BY_EFID or SELECT_BY_SFI) and the file identifier (either a sfi or an efid)
@param contentLength The pointer to the length value
@param lengthStrategy The chosen strategy by user (either AUTODETECT_BER_LENGTH or FIXED_LENGTH)
@returns A boolean value indicating whether the operation succeeded or not
*/
/**************************************************************************/
bool cie_PN532::determineLength(const cie_EFPath filePath, word *contentLength, const byte lengthStrategy) {
switch (lengthStrategy) {
case FIXED_LENGTH:
//do nothing, size is already known
break;
case AUTODETECT_BER_LENGTH:
if (!_berReader->readTriples(filePath, nullptr, contentLength, 1)) {
return false;
}
break;
case AUTODETECT_ATR_LENGTH:
if (!_atrReader->detectLength(filePath, contentLength)) {
return false;
}
break;
default:
PN532DEBUGPRINT.println(F("The length strategy must be either AUTODETECT_BER_LENGTH or FIXED_LENGTH"));
return false;
}
return true;
}
/**************************************************************************/
/*!
@brief Reads the binary content of the currently selected Elementary File
@param filePath a structure indicating the parent Dedicated File (either ROOT_MF or CIE_DF), the selection mode (either SELECT_BY_EFID or SELECT_BY_SFI) and the file identifier (either a sfi or an efid)
@param contentBuffer The pointer to the data buffer
@param contentLength The number of bytes to read
@returns A boolean value indicating whether the operation succeeded or not
*/
/**************************************************************************/
bool cie_PN532::readBinaryContent(const cie_EFPath filePath, byte *contentBuffer, word startingOffset, const word contentLength) {
byte fileId;
switch (filePath.selectionMode) {
case SELECT_BY_EFID:
if (!ensureElementaryFileIsSelected(filePath)) {
return false;
}
fileId = 0x00; //Current selected file
break;
case SELECT_BY_SFI:
if (!ensureDedicatedFileIsSelected(filePath.df)) {
return false;
}
fileId = (byte) (filePath.id & 0b11111);
break;
default:
PN532DEBUGPRINT.println(F("The selection mode must be either SELECT_BY_EFID or SELECT_BY_SFI"));
return false;
}
bool success = false;
word offset = startingOffset;
do {
word contentPageLength = clamp(contentLength+startingOffset-offset, PAGE_LENGTH);
byte preambleOctets = contentPageLength > 0x80 ? 3 : 2; //Discretionary data: three bytes for responses of length > 0x80
byte readCommand[] = {
0x00, //CLA
0xB1, //INS: READ BINARY (ODD INS)
0x00, //P1: zeroes
fileId, //P2: sfi to select or zeroes (i.e. keep current selected file)
0x04, //Lc: data field is made of 4 bytes
0x54, 0x02, //Data field: here comes an offset of 2 bytes
(byte) (offset >> 8), (byte) (offset & 0b11111111), //the offset
(byte) (contentPageLength + preambleOctets) //Le: bytes to be returned in the response
};
word responseLength = ((byte) contentPageLength) + preambleOctets + STATUS_WORD_LENGTH;
byte *responseBuffer = new byte[responseLength];
success = sendCommand(readCommand, sizeof(readCommand), responseBuffer, &responseLength);
//Copy data over to the buffer
if (success) {
//The read binary command with ODD INS incapsulated the response with two or three preamble octets. Don't include them, they're not part of the content.
//See page 147 in the Gixel manual http://www.unsads.com/specs/IASECC/IAS_ECC_v1.0.1_UK.pdf
for (word i = preambleOctets; i < contentPageLength + preambleOctets; i++) {
contentBuffer[offset - startingOffset + i - preambleOctets] = responseBuffer[i];
}
}
delete [] responseBuffer;
offset += contentPageLength;
} while(success && (offset < contentLength));
if (!success) {
PN532DEBUGPRINT.println(F("Couldn't fetch the elementary file content"));
}
return success;
}
/**************************************************************************/
/*!
@brief Reads the key content (BER encoded modulus and exponent) from the indicated Elementary File
@param filePath a structure indicating the parent Dedicated File (either ROOT_MF or CIE_DF), the selection mode (either SELECT_BY_EFID or SELECT_BY_SFI) and the file identifier (either a sfi or an efid)
@param key A pointer to a which object which will be populated with the modulus and exponent
@returns A boolean value indicating whether the operation succeeded or not
*/
/**************************************************************************/
bool cie_PN532::readKey(const cie_EFPath filePath, cie_Key *key) {
//This is the fasted way but assumes we'll find a 2048-bit key and a 24-bit exponent valued 0x010001
//TODO: proper BER parsing by using the cie_BerReader class
key->exponentLength = 3;
key->exponent = new byte[key->exponentLength] { 0x01, 0x00, 0x01 };
key->modulusLength = 257;
key->modulus = new byte[key->modulusLength];
return readBinaryContent(filePath, key->modulus, 8, key->modulusLength);
}
/**************************************************************************/
/*!
@brief Selects the ROOT Master File
@returns A boolean value indicating whether the operation succeeded or not
*/
/**************************************************************************/
bool cie_PN532::selectRootMasterFile(void) {
byte command[] = {
0x00, //CLA
0xA4, //INS: SELECT FILE
0x00, //P1: Select root
0x0C, //P2: No data in response field
0x02, //Lc: Length of root id
0x3F, 0x00 //root id
};
bool success = sendCommand(command, sizeof(command));
if (!success) {
PN532DEBUGPRINT.println(F("Couldn't select root"));
}
return success;
}
/**************************************************************************/
/*!
@brief Selects the IAS Application
@returns A value indicating whether the operation succeeded or not
*/
/**************************************************************************/
bool cie_PN532::selectIasApplication(void) {
byte command[] = {
0x00, //CLA
0xA4, //INS: SELECT FILE
0x04, //P1: Select by AID
0x0C, //P2: No data in response field
0x0D, //Lc: Length of AID
0xA0, 0x00, 0x00, 0x00, 0x30, 0x80, 0x00, 0x00, 0x00, 0x09, 0x81, 0x60, 0x01 //AID
};
bool success = sendCommand(command, sizeof(command));
if (!success) {
PN532DEBUGPRINT.println(F("Couldn't select the IAS application"));
}
return success;
}
/**************************************************************************/
/*!
@brief Selects the CIE DF
@returns A value indicating whether the operation succeeded or not
*/
/**************************************************************************/
bool cie_PN532::selectCieDedicatedFile(void) {
byte command[] = {
0x00, //CLA
0xA4, //INS: SELECT FILE
0x04, //P1: Select by ID
0x0C, //P2: No data in response field
0x06, //Lc: length of ID
0xA0, 0x00, 0x00, 0x00, 0x00, 0x39 //ID
};
bool success = sendCommand(command, sizeof(command));
if (!success) {
PN532DEBUGPRINT.println(F("Couldn't select the CIE DF"));
}
return success;
}
/**************************************************************************/
/*!
@brief Reads the EF contents by its SFI under the current DF
@param response Pointer to the response data
@param responseLength The length of the response
@returns A value indicating whether the operation succeeded or not
*/
/**************************************************************************/
bool cie_PN532::hasSuccessStatusWord(byte *response, const word responseLength) {
byte msByte = response[responseLength-2];
byte lsByte = response[responseLength-1];
bool success = msByte == 0x90 && lsByte == 0x00;
if (success) {
return true;
}
if (msByte == 0x62 && lsByte == 0x83) {
PN532DEBUGPRINT.print(F("Warning selected file deactivated"));
} else if (msByte == 0x62 && lsByte == 0x85) {
PN532DEBUGPRINT.print(F("The selected file is in terminate state"));
} else if (msByte == 0x62 && lsByte == 0x82) {
PN532DEBUGPRINT.print(F("End of file/record reached before reading Le bytes"));
} else if (msByte == 0x67 && lsByte == 0x00) {
PN532DEBUGPRINT.print(F("Wrong length"));
} else if (msByte == 0x69 && lsByte == 0x82) {
PN532DEBUGPRINT.print(F("Security condition not satisfied"));
} else if (msByte == 0x6A && lsByte == 0x82) {
PN532DEBUGPRINT.print(F("File or application not found"));
} else if (msByte == 0x6A && lsByte == 0x86) {
PN532DEBUGPRINT.print(F("Incorrect parameters P1-P2"));
} else if (msByte == 0x6A && lsByte == 0x87) {
PN532DEBUGPRINT.print(F("Nc inconsistent with parameters P1-P2"));
} else if (msByte == 0x6D && lsByte == 0x00) {
PN532DEBUGPRINT.print(F("Instruction code not supported or invalid"));
} else {
PN532DEBUGPRINT.print(F("Unknown error"));
}
PN532DEBUGPRINT.print(F(" "));
byte statusWord[2] = { msByte, lsByte };
printHex(statusWord, 2);
return false;
}
/**************************************************************************/
/*!
@brief Ensures a value is less or equal than a max value
@param value The value that should be checked
@param maxValue The maximum value
@returns The clamped value
*/
/**************************************************************************/
word cie_PN532::clamp(const word value, const byte maxValue) {
if (value > maxValue) {
return maxValue;
} else {
return value;
}
}
/**************************************************************************/
/*!
@brief Calculates the SKENC or the SKMAC session key from the K.IFD and K.ICC random values
@param valueType The type of the value (either SK_ENC or SK_MAC)
@param kIfd The pointer to the K.IFD generated by the terminal (must be of K_LENGTH bytes)
@param kIcc The pointer to the K.ICC generated by the card (must be of K_LENGTH bytes)
@param sk A pointer to a buffer which will contain the computed SKENC or SKMAC
@param skLength The reported length of the session key
*/
/**************************************************************************/
void calculateSk(const byte valueType, byte *kIfd, byte *kIcc, byte *sk, byte *skLength) {
//7.1.4 Secure messaging - Session keys computation
//http://www.unsads.com/specs/IASECC/IAS_ECC_v1.0.1_UK.pdf
byte *hash;
//Here we could use: https://github.com/Snowda/CryptoC
//Sha256.init();
for (byte i = 0; i < K_LENGTH + 4; i++) {
byte data;
if (i < K_LENGTH) {
data = kIfd[i] ^ kIcc[i];
} else if (i < K_LENGTH-1) {
data = 0x00;
} else {
data = valueType;
}
//Sha256.write(data);
}
//hash = Sha256.result();
for (byte i = 0; i < SK_LENGTH; i++) {
sk[i] = hash[i];
}
*skLength = SK_LENGTH;
}
/**************************************************************************/
/*!
@brief Frees resources
*/
/**************************************************************************/
cie_PN532::~cie_PN532()
{
delete _atrReader;
delete _berReader;
delete _nfc;
}