Merge pull request #64 from tjclement/master
UID changeable card support It is useful, thank you.
This commit is contained in:
200
MFRC522.cpp
200
MFRC522.cpp
@@ -1427,6 +1427,206 @@ void MFRC522::MIFARE_SetAccessBits( byte *accessBitBuffer, ///< Pointer to byte
|
||||
accessBitBuffer[2] = c3 << 4 | c2;
|
||||
} // End MIFARE_SetAccessBits()
|
||||
|
||||
|
||||
/**
|
||||
* Performs the "magic sequence" needed to get Chinese UID changeable
|
||||
* Mifare cards to allow writing to sector 0, where the card UID is stored.
|
||||
*
|
||||
* Note that you do not need to have selected the card through REQA or WUPA,
|
||||
* this sequence works immediately when the card is in the reader vicinity.
|
||||
* This means you can use this method even on "bricked" cards that your reader does
|
||||
* not recognise anymore (see MFRC522::MIFARE_UnbrickUidSector).
|
||||
*
|
||||
* Of course with non-bricked devices, you're free to select them before calling this function.
|
||||
*/
|
||||
bool MFRC522::MIFARE_OpenUidBackdoor(bool logErrors) {
|
||||
// Magic sequence:
|
||||
// > 50 00 57 CD (HALT + CRC)
|
||||
// > 40 (7 bits only)
|
||||
// < A (4 bits only)
|
||||
// > 43
|
||||
// < A (4 bits only)
|
||||
// Then you can write to sector 0 without authenticating
|
||||
|
||||
PICC_HaltA(); // 50 00 57 CD
|
||||
|
||||
byte cmd = 0x40;
|
||||
byte validBits = 7; /* Our command is only 7 bits. After receiving card response,
|
||||
this will contain amount of valid response bits. */
|
||||
byte response[32]; // Card's response is written here
|
||||
byte received;
|
||||
byte status = PCD_TransceiveData(&cmd, (byte)1, response, &received, &validBits, (byte)0, false); // 40
|
||||
if( status != STATUS_OK ) {
|
||||
if( logErrors ) {
|
||||
Serial.println("Card did not respond to 0x40 after HALT command. Are you sure it is a UID changeable one?");
|
||||
Serial.print("Error name: ");
|
||||
Serial.println(GetStatusCodeName(status));
|
||||
}
|
||||
return false;
|
||||
}
|
||||
if ( received != 1 || response[0] != 0x0A ) {
|
||||
if ( logErrors ) {
|
||||
Serial.print("Got bad response on backdoor 0x40 command: ");
|
||||
Serial.print(response[0], HEX);
|
||||
Serial.print(" (");
|
||||
Serial.print(validBits);
|
||||
Serial.print(" valid bits)\r\n");
|
||||
}
|
||||
return false;
|
||||
}
|
||||
|
||||
cmd = 0x43;
|
||||
validBits = 8;
|
||||
status = PCD_TransceiveData(&cmd, (byte)1, response, &received, &validBits, (byte)0, false); // 43
|
||||
if( status != STATUS_OK ) {
|
||||
if( logErrors ) {
|
||||
Serial.println("Error in communication at command 0x43, after successfully executing 0x40");
|
||||
Serial.print("Error name: ");
|
||||
Serial.println(GetStatusCodeName(status));
|
||||
}
|
||||
return false;
|
||||
}
|
||||
if ( received != 1 || response[0] != 0x0A ) {
|
||||
if ( logErrors ) {
|
||||
Serial.print("Got bad response on backdoor 0x43 command: ");
|
||||
Serial.print(response[0], HEX);
|
||||
Serial.print(" (");
|
||||
Serial.print(validBits);
|
||||
Serial.print(" valid bits)\r\n");
|
||||
}
|
||||
return false;
|
||||
}
|
||||
|
||||
// You can now write to sector 0 without authenticating!
|
||||
return true;
|
||||
} // End MIFARE_OpenUidBackdoor()
|
||||
|
||||
/**
|
||||
* Reads entire block 0, including all manufacturer data, and overwrites
|
||||
* that block with the new UID, a freshly calculated BCC, and the original
|
||||
* manufacturer data.
|
||||
*
|
||||
* It assumes a default KEY A of 0xFFFFFFFFFFFF.
|
||||
* Make sure to have selected the card before this function is called.
|
||||
*/
|
||||
bool MFRC522::MIFARE_SetUid(byte* newUid, byte uidSize, bool logErrors) {
|
||||
|
||||
// UID + BCC byte can not be larger than 16 together
|
||||
if ( !newUid || !uidSize || uidSize > 15) {
|
||||
if ( logErrors ) {
|
||||
Serial.println("New UID buffer empty, size 0, or size > 15 given");
|
||||
}
|
||||
return false;
|
||||
}
|
||||
|
||||
// Authenticate for reading
|
||||
MIFARE_Key key = {0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF};
|
||||
byte status = PCD_Authenticate(MFRC522::PICC_CMD_MF_AUTH_KEY_A, (byte)1, &key, &uid);
|
||||
if ( status != STATUS_OK ) {
|
||||
|
||||
if ( status == STATUS_TIMEOUT ) {
|
||||
// We get a read timeout if no card is selected yet, so let's select one
|
||||
|
||||
// Wake the card up again if sleeping
|
||||
// byte atqa_answer[2];
|
||||
// byte atqa_size = 2;
|
||||
// PICC_WakeupA(atqa_answer, &atqa_size);
|
||||
|
||||
if ( !PICC_IsNewCardPresent() || !PICC_ReadCardSerial() ) {
|
||||
Serial.println("No card was previously selected, and none are available. Failed to set UID.");
|
||||
return false;
|
||||
}
|
||||
|
||||
status = PCD_Authenticate(MFRC522::PICC_CMD_MF_AUTH_KEY_A, (byte)1, &key, &uid);
|
||||
if ( status != STATUS_OK ) {
|
||||
// We tried, time to give up
|
||||
if ( logErrors ) {
|
||||
Serial.println("Failed to authenticate to card for reading, could not set UID: ");
|
||||
Serial.println(GetStatusCodeName(status));
|
||||
}
|
||||
return false;
|
||||
}
|
||||
}
|
||||
else {
|
||||
if ( logErrors ) {
|
||||
Serial.print("PCD_Authenticate() failed: ");
|
||||
Serial.println(GetStatusCodeName(status));
|
||||
}
|
||||
return false;
|
||||
}
|
||||
}
|
||||
|
||||
// Read block 0
|
||||
byte block0_buffer[18];
|
||||
byte byteCount = sizeof(block0_buffer);
|
||||
status = MIFARE_Read((byte)0, block0_buffer, &byteCount);
|
||||
if ( status != STATUS_OK ) {
|
||||
if ( logErrors ) {
|
||||
Serial.print("MIFARE_Read() failed: ");
|
||||
Serial.println(GetStatusCodeName(status));
|
||||
Serial.println("Are you sure your KEY A for sector 0 is 0xFFFFFFFFFFFF?");
|
||||
}
|
||||
return false;
|
||||
}
|
||||
|
||||
// Write new UID to the data we just read, and calculate BCC byte
|
||||
byte bcc = 0;
|
||||
for ( int i = 0; i < uidSize; i++ ) {
|
||||
block0_buffer[i] = newUid[i];
|
||||
bcc ^= newUid[i];
|
||||
}
|
||||
|
||||
// Write BCC byte to buffer
|
||||
block0_buffer[uidSize] = bcc;
|
||||
|
||||
// Stop encrypted traffic so we can send raw bytes
|
||||
PCD_StopCrypto1();
|
||||
|
||||
// Activate UID backdoor
|
||||
if ( !MIFARE_OpenUidBackdoor(logErrors) ) {
|
||||
if ( logErrors ) {
|
||||
Serial.println("Activating the UID backdoor failed.");
|
||||
}
|
||||
return false;
|
||||
}
|
||||
|
||||
// Write modified block 0 back to card
|
||||
status = MIFARE_Write((byte)0, block0_buffer, (byte)16);
|
||||
if (status != STATUS_OK) {
|
||||
if ( logErrors ) {
|
||||
Serial.print("MIFARE_Write() failed: ");
|
||||
Serial.println(GetStatusCodeName(status));
|
||||
}
|
||||
return false;
|
||||
}
|
||||
|
||||
// Wake the card up again
|
||||
byte atqa_answer[2];
|
||||
byte atqa_size = 2;
|
||||
PICC_WakeupA(atqa_answer, &atqa_size);
|
||||
|
||||
return true;
|
||||
}
|
||||
|
||||
/**
|
||||
* Resets entire sector 0 to zeroes, so the card can be read again by readers.
|
||||
*/
|
||||
bool MFRC522::MIFARE_UnbrickUidSector(bool logErrors) {
|
||||
MIFARE_OpenUidBackdoor( logErrors );
|
||||
|
||||
byte block0_buffer[] = {0x01, 0x02, 0x03, 0x04, 0x04, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00};
|
||||
|
||||
// Write modified block 0 back to card
|
||||
byte status = MIFARE_Write((byte)0, block0_buffer, (byte)16);
|
||||
if (status != STATUS_OK) {
|
||||
if ( logErrors ) {
|
||||
Serial.print("MIFARE_Write() failed: ");
|
||||
Serial.println(GetStatusCodeName(status));
|
||||
}
|
||||
return false;
|
||||
}
|
||||
}
|
||||
|
||||
/////////////////////////////////////////////////////////////////////////////////////
|
||||
// Convenience functions - does not add extra functionality
|
||||
/////////////////////////////////////////////////////////////////////////////////////
|
||||
|
||||
Reference in New Issue
Block a user