Module_RFID.c 25 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051
  1. /*
  2. * Module_RFID.c
  3. *
  4. * Created on: 2019-10-24
  5. * Update: 2022-08-09
  6. * Author: Eason Yang
  7. * Version: V0.04
  8. *
  9. * History
  10. * 1. Added : Reyax code.
  11. *
  12. *
  13. *
  14. *
  15. *
  16. */
  17. #include "Module_RFID.h"
  18. //==================================
  19. // PRINT OUT LOG FORMAT
  20. //==================================
  21. #define SystemLogMessage
  22. #define DEBUG_INFO_1(format, args...) StoreLogMessage("[%s:%d][%s][Info] "format, __FILE__, __LINE__, __FUNCTION__, ##args)
  23. #define DEBUG_WARN_1(format, args...) StoreLogMessage("[%s:%d][%s][Warn] "format, __FILE__, __LINE__, __FUNCTION__, ##args)
  24. #define DEBUG_ERROR_1(format, args...) StoreLogMessage("[%s:%d][%s][Error] "format, __FILE__, __LINE__, __FUNCTION__, ##args)
  25. //==================================
  26. // SYSTEM CONSTANT
  27. //==================================
  28. #define Debug
  29. #define ARRAY_SIZE(A) (sizeof(A) / sizeof(A[0]))
  30. #define PASS 1
  31. #define FAIL -1
  32. //==================================
  33. // RFID CMD CONSTANT
  34. //==================================
  35. unsigned int RFID_CMD_ISO1443A_REQUEST = 0x20;
  36. unsigned int RFID_CMD_ISO1443B_REQUEST = 0x60;
  37. unsigned int RFID_CMD_FELICA_POLLING_REQUEST = 0x2F;
  38. unsigned int RFID_CMD_HALT_14443A = 0x28;
  39. unsigned int RFID_CMD_BLOCK_READ = 0x21;
  40. unsigned int RFID_CMD_BLOCK_WRITE = 0x22;
  41. unsigned int RFID_CMD_BUZZER_SET = 0x14;
  42. unsigned int RFID_CMD_RF_OUTPUT_LEVEL_SET = 0x02;
  43. unsigned int RFID_CMD_DEFAULT_AUTO_DETECTING_CARD = 0x1D;
  44. //==================================
  45. // RFID MODE CONSTANT
  46. //==================================
  47. unsigned char WUPA = 0;
  48. unsigned char REQA = 1;
  49. unsigned char AFI = 0;
  50. //==================================
  51. // MIFARE CARD LENGTH
  52. //==================================
  53. unsigned int LENGTH_0 = 0;
  54. unsigned int LENGTH_4 = 4;
  55. unsigned int LENGTH_6 = 6;
  56. unsigned int LENGTH_7 = 7;
  57. unsigned int LENGTH_8 = 8;
  58. unsigned int LENGTH_10 = 10;
  59. //==================================
  60. // RF output Level constant
  61. //==================================
  62. unsigned int RF_STRONGEST = 0x00;
  63. unsigned int RF_STRONGER = 0x01;
  64. unsigned int RF_WEAK = 0x02;
  65. unsigned int RF_WEAKEST = 0x03;
  66. //==================================
  67. // Default of Automatic Detecting constant
  68. //==================================
  69. unsigned int TURN_OFF = 0x00;
  70. unsigned int TURN_ON = 0X01;
  71. unsigned int TURN_TEMPORARILY = 0x11;
  72. //==================================
  73. // MIFARE SECTOR SPACE
  74. //==================================
  75. #define ROW 6
  76. #define COLUMN 16
  77. unsigned char sectorKeyA[COLUMN][ROW] = { {0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF},
  78. {0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF},
  79. {0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF},
  80. {0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF},
  81. {0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF},
  82. {0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF},
  83. {0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF},
  84. {0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF},
  85. {0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF},
  86. {0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF},
  87. {0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF},
  88. {0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF},
  89. {0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF},
  90. {0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF},
  91. {0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF},
  92. {0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF}
  93. };
  94. unsigned char serialNumber[32];
  95. unsigned int cardLength;
  96. //==================================
  97. // SystemLog message
  98. //==================================
  99. #ifdef SystemLogMessage
  100. int StoreLogMessage(const char *fmt, ...)
  101. {
  102. char Buf[4096 + 256];
  103. char buffer[4096];
  104. time_t CurrentTime;
  105. struct tm *tm;
  106. va_list args;
  107. va_start(args, fmt);
  108. int rc = vsnprintf(buffer, sizeof(buffer), fmt, args);
  109. va_end(args);
  110. memset(Buf, 0, sizeof(Buf));
  111. CurrentTime = time(NULL);
  112. tm = localtime(&CurrentTime);
  113. sprintf(Buf,
  114. "echo \"[%04d.%02d.%02d %02d:%02d:%02d] - %s\" >> /Storage/SystemLog/[%04d.%02d]RFID_SystemLog",
  115. tm->tm_year + 1900, tm->tm_mon + 1, tm->tm_mday, tm->tm_hour,
  116. tm->tm_min, tm->tm_sec, buffer, tm->tm_year + 1900, tm->tm_mon + 1);
  117. system(Buf);
  118. #ifdef Debug
  119. printf("[%04d.%02d.%02d %02d:%02d:%02d] - %s", tm->tm_year + 1900,
  120. tm->tm_mon + 1, tm->tm_mday, tm->tm_hour, tm->tm_min, tm->tm_sec,
  121. buffer);
  122. #endif
  123. return rc;
  124. }
  125. #endif
  126. //==========================================
  127. // Module's command send/receive
  128. //==========================================
  129. int system_command(int uart, unsigned char* cmd,int length, unsigned char* rx)
  130. {
  131. int len;
  132. //sleep(2); //required to make flush work, for some reason
  133. tcflush(uart,TCIOFLUSH);
  134. if(write(uart, cmd, length) >= 0)
  135. {
  136. usleep(100000);
  137. len = read(uart, rx, 256);
  138. }
  139. else
  140. {
  141. DEBUG_ERROR_1("system command %s response fail.\n", cmd);
  142. }
  143. return len;
  144. }
  145. //==========================================
  146. // Module's AT command send/receive (REYAX)
  147. //==========================================
  148. int at_command(int uart, unsigned char* cmd,int length, unsigned char* rx)
  149. {
  150. int len;
  151. //sleep(2); //required to make flush work, for some reason
  152. tcflush(uart,TCIOFLUSH);
  153. if(write(uart, cmd, length) >= ARRAY_SIZE(cmd))
  154. {
  155. usleep(100000);
  156. len = read(uart, rx, 512);
  157. }
  158. else
  159. {
  160. DEBUG_ERROR_1("AT command %s response fail.\n", cmd);
  161. }
  162. return len;
  163. }
  164. //==========================================
  165. // Calculation checksum function
  166. //==========================================
  167. char ClaCheckSum(unsigned char *buffer, int len)
  168. {
  169. int idx;
  170. char chksum = 0;
  171. for(idx = 0 ; idx < len-1 ; idx++)
  172. {
  173. chksum ^= *(buffer+idx);
  174. }
  175. return chksum;
  176. }
  177. int chksumValid(unsigned char * buffer)
  178. {
  179. int result = FAIL;
  180. int chksum = 0;
  181. if(buffer[0] > 2)
  182. {
  183. for(int idx=0;idx<(buffer[0]);idx++)
  184. {
  185. chksum ^= buffer[idx];
  186. }
  187. if(chksum == buffer[buffer[0]])
  188. result = PASS;
  189. }
  190. return result;
  191. }
  192. bool getRequestCardSN(int Fd, int moduleType, RFID* rfid)
  193. {
  194. bool isSuccess = false;
  195. if(ISO14443A_REQUEST_SN(Fd,moduleType,serialNumber) == true)
  196. {
  197. rfid->cardType = ISO14443A;
  198. if(cardLength == LENGTH_4)
  199. {
  200. rfid->snType = RFID_SN_TYPE_4BYTE;
  201. memcpy(rfid->currentCard, &serialNumber, 32);
  202. }
  203. else if(cardLength == LENGTH_7)
  204. {
  205. rfid->snType = RFID_SN_TYPE_7BYTE;
  206. memcpy(rfid->currentCard, &serialNumber, 32);
  207. }
  208. isSuccess = true;
  209. }
  210. else if(ISO14443B_REQUEST_SN(Fd,moduleType,serialNumber) == true)
  211. {
  212. rfid->cardType = IS014443B;
  213. rfid->snType = RFID_SN_TYPE_4BYTE;
  214. memcpy(rfid->currentCard, &serialNumber, 32);
  215. sleep(2);
  216. isSuccess = true;
  217. }
  218. else if(FELICA_REQUEST_SN(Fd,moduleType,serialNumber) == true)
  219. {
  220. rfid->cardType = FELICA;
  221. rfid->snType = RFID_SN_TYPE_8BYTE;
  222. memcpy(rfid->currentCard, &serialNumber, 32);
  223. sleep(2);
  224. isSuccess = true;
  225. }
  226. else
  227. {}
  228. return isSuccess;
  229. }
  230. //==========================================
  231. // ISO14443A Request SN function
  232. //==========================================
  233. bool ISO14443A_REQUEST_SN(int Fd, int moduleType, unsigned char *data)
  234. {
  235. bool isSuccess = false;
  236. int tx_len = 4;
  237. unsigned char txByte[4] = {0};
  238. unsigned char rxByte[254] = {0};
  239. unsigned char TX_MESSAGE[254] = {0};
  240. unsigned char RX_MESSAGE[254] = {0};
  241. unsigned char TMP_MESSAGE[254] = {0};
  242. unsigned char TX_LENGTH = 0;
  243. unsigned char RX_LENGTH = 0;
  244. switch(moduleType)
  245. {
  246. case MODULE_EWT:
  247. default:
  248. //===============================
  249. // Command
  250. //===============================
  251. txByte[0] = tx_len-1;
  252. txByte[1] = RFID_CMD_ISO1443A_REQUEST;
  253. txByte[2] = REQA;
  254. txByte[ARRAY_SIZE(txByte)-1] = ClaCheckSum(txByte,ARRAY_SIZE(txByte));
  255. if(Fd > 0)
  256. {
  257. if(system_command(Fd, txByte, tx_len, rxByte) > 0)
  258. {
  259. if(chksumValid(rxByte) == PASS)
  260. {
  261. if((rxByte[1] == RFID_CMD_ISO1443A_REQUEST))
  262. {
  263. if(rxByte[0] == 0x09)
  264. {
  265. cardLength = LENGTH_4;
  266. memcpy(data, rxByte+2, cardLength);
  267. DEBUG_INFO_1("MIFARE CLASSIC SN: %02X-%02X-%02X-%02X\n", data[0], data[1], data[2], data[3]);
  268. isSuccess = true;
  269. }
  270. else if(rxByte[0] == 0x0C)
  271. {
  272. cardLength = LENGTH_7;
  273. memcpy(data, rxByte+2, cardLength);
  274. DEBUG_INFO_1("MIFARE PLUS SN: %02X-%02X-%02X-%02X-%02X-%02X-%02X\n", data[0], data[1], data[2], data[3], data[4], data[5], data[6]);
  275. isSuccess = true;
  276. }
  277. else
  278. {}
  279. }
  280. else if (rxByte[1] == 0xDF)
  281. {
  282. cardLength = LENGTH_0;
  283. isSuccess = false;
  284. }
  285. else
  286. {}
  287. }
  288. else
  289. {
  290. //DEBUG_ERROR_1("Response check sum mismatch.\n");
  291. }
  292. }
  293. else
  294. {}
  295. }
  296. else
  297. {}
  298. break;
  299. case MODULE_REYAX:
  300. if(Fd > 0)
  301. {
  302. memset(TX_MESSAGE, 0, sizeof(TX_MESSAGE));
  303. memset(RX_MESSAGE, 0, sizeof(RX_MESSAGE));
  304. strcpy((char*)TX_MESSAGE, "AT+SCAN=1\r\n");
  305. TX_LENGTH = strlen((char*)TX_MESSAGE);
  306. //DEBUG_INFO_1("ISO14443A TX_LENGTH : %d.\n", TX_LENGTH);
  307. //DEBUG_INFO_1("ISO14443A TX_MESSAGE : %s.\n", TX_MESSAGE);
  308. if((RX_LENGTH = at_command(Fd, TX_MESSAGE, TX_LENGTH, RX_MESSAGE)) > 0)
  309. {
  310. //DEBUG_INFO_1("ISO14443A RX_LENGTH : %d.\n", RX_LENGTH);
  311. //DEBUG_INFO_1("ISO14443A RX_MESSAGE : %s.\n", RX_MESSAGE);
  312. memset(TMP_MESSAGE, 0, sizeof(TMP_MESSAGE));
  313. if(strstr((char*)RX_MESSAGE, "+SCAN=ISO14443A:"))
  314. {
  315. if(RX_LENGTH == 26)
  316. {
  317. cardLength = LENGTH_4;
  318. memcpy(TMP_MESSAGE, RX_MESSAGE+16, (LENGTH_4*2));
  319. DEBUG_INFO_1("Mifare Classic tmp message : %s.\n", TMP_MESSAGE);
  320. sscanf((char*)TMP_MESSAGE, "%2X%2X%2X%2X", (unsigned int *)&data[0],
  321. (unsigned int *)&data[1],
  322. (unsigned int *)&data[2],
  323. (unsigned int *)&data[3]);
  324. isSuccess = true;
  325. }
  326. else if(RX_LENGTH == 32)
  327. {
  328. cardLength = LENGTH_7;
  329. memcpy(TMP_MESSAGE, RX_MESSAGE+16, (RFID_SN_TYPE_7BYTE*2));
  330. DEBUG_INFO_1("Mifare Plus tmp message : %s.\n", TMP_MESSAGE);
  331. sscanf((char*)TMP_MESSAGE, "%2X%2X%2X%2X%2X%2X%2X", (unsigned int *)&data[0],
  332. (unsigned int *)&data[1],
  333. (unsigned int *)&data[2],
  334. (unsigned int *)&data[3],
  335. (unsigned int *)&data[4],
  336. (unsigned int *)&data[5],
  337. (unsigned int *)&data[6]);
  338. isSuccess = true;
  339. }
  340. else
  341. {
  342. cardLength = LENGTH_0;
  343. isSuccess = false;
  344. }
  345. }
  346. else
  347. {}
  348. }
  349. else
  350. {}
  351. }
  352. else
  353. {}
  354. break;
  355. }
  356. return isSuccess;
  357. }
  358. //==========================================
  359. // ISO14443B Request SN function
  360. //==========================================
  361. bool ISO14443B_REQUEST_SN(int Fd, int moduleType, unsigned char *data)
  362. {
  363. bool isSuccess = false;
  364. int cardLength;
  365. int tx_len = 5;
  366. unsigned char txByte[5] = {0};
  367. unsigned char rxByte[254] = {0};
  368. /*
  369. unsigned char TX_MESSAGE[254];
  370. unsigned char RX_MESSAGE[254];
  371. unsigned char TMP_MESSAGE[254];
  372. unsigned char TX_LENGTH;
  373. unsigned char RX_LENGTH;
  374. */
  375. switch(moduleType)
  376. {
  377. case MODULE_EWT:
  378. default:
  379. //===============================
  380. // Command
  381. //===============================
  382. txByte[0] = tx_len-1;
  383. txByte[1] = RFID_CMD_ISO1443B_REQUEST;
  384. txByte[2] = WUPA;
  385. txByte[3] = AFI;
  386. txByte[ARRAY_SIZE(txByte)-1] = ClaCheckSum(txByte,ARRAY_SIZE(txByte));
  387. if(Fd > 0)
  388. {
  389. if(system_command(Fd, txByte, tx_len, rxByte) > 0)
  390. {
  391. if(chksumValid(rxByte) == PASS)
  392. {
  393. if((rxByte[1] == RFID_CMD_ISO1443B_REQUEST) && (rxByte[0] >= 12))
  394. {
  395. cardLength = LENGTH_4;
  396. memcpy(data, rxByte+3, cardLength);
  397. DEBUG_INFO_1("ISO14443-B SN: %02X-%02X-%02X-%02X\n", data[0], data[1], data[2], data[3]);
  398. isSuccess = true;
  399. }
  400. else if(rxByte[1] == 0x9F)
  401. {
  402. cardLength = LENGTH_0;
  403. isSuccess = false;
  404. }
  405. else
  406. {}
  407. }
  408. else
  409. {
  410. //DEBUG_ERROR_1("Response check sum mismatch.\n");
  411. }
  412. }
  413. else
  414. {}
  415. }
  416. else
  417. {}
  418. break;
  419. case MODULE_REYAX:
  420. /*
  421. if(Fd > 0)
  422. {
  423. memset(TX_MESSAGE, 0, sizeof(TX_MESSAGE));
  424. memset(RX_MESSAGE, 0, sizeof(RX_MESSAGE));
  425. strcpy((char*)TX_MESSAGE, "AT+SCAN=2\r\n");
  426. TX_LENGTH = strlen((char*)TX_MESSAGE);
  427. //DEBUG_INFO_1("IS014443B TX_LENGTH : %d.\n", TX_LENGTH);
  428. //DEBUG_INFO_1("IS014443B TX_MESSAGE : %s.\n", TX_MESSAGE);
  429. if((RX_LENGTH = at_command(Fd, TX_MESSAGE, TX_LENGTH, RX_MESSAGE);) > 0)
  430. {
  431. //DEBUG_INFO_1("IS014443B RX_LENGTH : %d.\n", RX_LENGTH);
  432. //DEBUG_INFO_1("IS014443B RX MESSAGE : %s.\n", RX_MESSAGE);
  433. memset(TMP_MESSAGE, 0, sizeof TMP_MESSAGE);
  434. if(strstr((char*)RX_MESSAGE,"+SCAN=Felica:"))
  435. {
  436. if(RX_MESSAGE_LENGTH == 31)
  437. {
  438. cardLength = LENGTH_6;
  439. memcpy(TMP_MESSAGE, RX_MESSAGE+17, (LENGTH_6*2));
  440. DEBUG_INFO_1("IS014443B tmp message : %s...\n", TMP_MESSAGE);
  441. sscanf((char*)TMP_MESSAGE, "%2X%2X%2X%2X%2X%2X", (unsigned int *)&data[0],
  442. (unsigned int *)&data[1],
  443. (unsigned int *)&data[2],
  444. (unsigned int *)&data[3],
  445. (unsigned int *)&data[4],
  446. (unsigned int *)&data[5]);
  447. isSuccess = true;
  448. }
  449. else
  450. {
  451. cardLength = LENGTH_0;
  452. isSuccess = false;
  453. }
  454. }
  455. else
  456. {}
  457. }
  458. else
  459. {}
  460. }
  461. else
  462. {}
  463. */
  464. break;
  465. }
  466. return isSuccess;
  467. }
  468. //==========================================
  469. // FELICA Request SN function
  470. //==========================================
  471. bool FELICA_REQUEST_SN(int Fd, int moduleType, unsigned char *data)
  472. {
  473. bool isSuccess = false;
  474. int cardLength;
  475. int tx_len = 9;
  476. unsigned char txByte[9] = {0};
  477. unsigned char rxByte[254] = {0};
  478. unsigned char TX_MESSAGE[254] = {0};
  479. unsigned char RX_MESSAGE[254] = {0};
  480. unsigned char TMP_MESSAGE[254] = {0};
  481. unsigned char TX_LENGTH = 0;
  482. unsigned char RX_LENGTH = 0;
  483. switch(moduleType)
  484. {
  485. case MODULE_EWT:
  486. default:
  487. //===============================
  488. // Command
  489. //===============================
  490. txByte[0] = tx_len-1;
  491. txByte[1] = RFID_CMD_FELICA_POLLING_REQUEST;
  492. txByte[2] = 0x06;
  493. txByte[3] = 0x00;
  494. txByte[4] = 0xFF;
  495. txByte[5] = 0xFF;
  496. txByte[6] = 0x01;
  497. txByte[7] = 0x00;
  498. txByte[ARRAY_SIZE(txByte)-1] = ClaCheckSum(txByte,ARRAY_SIZE(txByte));
  499. if(Fd > 0)
  500. {
  501. memset(rxByte, 0, sizeof (rxByte));
  502. if(system_command(Fd, txByte, tx_len, rxByte) > 0)
  503. {
  504. if(chksumValid(rxByte) == PASS)
  505. {
  506. if((rxByte[1] == RFID_CMD_FELICA_POLLING_REQUEST) && (rxByte[0] >= 22))
  507. {
  508. cardLength = LENGTH_8;
  509. memcpy(data, rxByte+4, cardLength);
  510. DEBUG_INFO_1("FELICA SN: %02X-%02X-%02X-%02X-%02X-%02X-%02X-%02X\n", data[0], data[1], data[2], data[3], data[4], data[5], data[6], data[7]);
  511. isSuccess = true;
  512. }
  513. else if(rxByte[1] == 0xD0)
  514. {
  515. cardLength = LENGTH_0;
  516. isSuccess = false;
  517. }
  518. else
  519. {}
  520. }
  521. else
  522. {
  523. //DEBUG_ERROR_1("Response check sum mismatch.\n");
  524. }
  525. }
  526. else
  527. {}
  528. }
  529. else
  530. {}
  531. break;
  532. case MODULE_REYAX:
  533. if(Fd > 0)
  534. {
  535. memset(TX_MESSAGE, 0, sizeof(TX_MESSAGE));
  536. memset(RX_MESSAGE, 0, sizeof(RX_MESSAGE));
  537. strcpy((char*)TX_MESSAGE, "AT+SCAN=4\r\n");
  538. TX_LENGTH = strlen((char*)TX_MESSAGE);
  539. //DEBUG_INFO_1("FELICA TX_LENGTH : %d.\n", TX_LENGTH);
  540. //DEBUG_INFO_1("FELICA TX_MESSAGE : %s.\n", TX_MESSAGE);
  541. if((RX_LENGTH = at_command(Fd, TX_MESSAGE, TX_LENGTH, RX_MESSAGE)) > 0)
  542. {
  543. //DEBUG_INFO_1("FELICA RX_LENGTH : %d.\n", RX_LENGTH);
  544. //DEBUG_INFO_1("FELICA RX_MESSAGE : %s.\n", RX_MESSAGE);
  545. memset(TMP_MESSAGE, 0, sizeof(TMP_MESSAGE));
  546. if(strstr((char*)RX_MESSAGE,"+SCAN=Felica:"))
  547. {
  548. if(RX_LENGTH == 31)
  549. {
  550. cardLength = LENGTH_6;
  551. memcpy(TMP_MESSAGE, RX_MESSAGE+17, (LENGTH_6*2));
  552. DEBUG_INFO_1("Felica tmp message : %s.\n", TMP_MESSAGE);
  553. sscanf((char*)TMP_MESSAGE, "%2X%2X%2X%2X%2X%2X", (unsigned int *)&data[0],
  554. (unsigned int *)&data[1],
  555. (unsigned int *)&data[2],
  556. (unsigned int *)&data[3],
  557. (unsigned int *)&data[4],
  558. (unsigned int *)&data[5]);
  559. isSuccess = true;
  560. }
  561. else
  562. {
  563. cardLength = LENGTH_0;
  564. isSuccess = false;
  565. }
  566. }
  567. else
  568. {}
  569. }
  570. else
  571. {}
  572. }
  573. else
  574. {}
  575. break;
  576. }
  577. return isSuccess;
  578. }
  579. //==========================================
  580. // Read block data from RFID card
  581. //==========================================
  582. bool getBlockRead(int Fd, int moduleType, int block, unsigned char keyId, unsigned char *data)
  583. {
  584. bool isSuccess = false;
  585. int i;
  586. int j = 0;
  587. int len = 11;
  588. unsigned char txByte[len];
  589. unsigned char rxByte[254];
  590. unsigned char tmp[254];
  591. switch(moduleType)
  592. {
  593. case MODULE_EWT:
  594. default:
  595. //===============================
  596. // Command
  597. //===============================
  598. txByte[0] = 0x0A;
  599. txByte[1] = RFID_CMD_BLOCK_READ;
  600. txByte[2] = keyId;
  601. txByte[3] = block;
  602. for(i = 4; i < 10; i++)
  603. {
  604. if( j < sizeof (sectorKeyA[0]))
  605. {
  606. txByte[i] = sectorKeyA[(int)(block/4)][j];
  607. j++;
  608. }
  609. }
  610. txByte[ARRAY_SIZE(txByte)-1] = ClaCheckSum(txByte,ARRAY_SIZE(txByte));
  611. if(Fd > 0)
  612. {
  613. memset(rxByte, 0, sizeof(rxByte));
  614. if(system_command(Fd, txByte, len, rxByte) > 0)
  615. {
  616. memset(tmp, 0, sizeof tmp);
  617. memcpy(tmp, rxByte, sizeof (rxByte));
  618. if((tmp[1] == RFID_CMD_BLOCK_READ))
  619. {
  620. DEBUG_INFO_1("Read block successfully.\n");
  621. memcpy(data, rxByte+2, 16);
  622. isSuccess = true;
  623. }
  624. else if (tmp[1] == 0xDE)
  625. {
  626. DEBUG_INFO_1("Read block unsuccessfully.\n");
  627. }
  628. else
  629. {}
  630. }
  631. else
  632. {}
  633. }
  634. else
  635. {}
  636. break;
  637. }
  638. return isSuccess;
  639. }
  640. //==========================================
  641. // Write data into RFID card block
  642. //==========================================
  643. bool setBlockWrite(int Fd, int moduleType, int block, unsigned char keyid, unsigned char *data)
  644. {
  645. bool isSuccess = false;
  646. int i;
  647. int j = 0;
  648. int len = 27;
  649. unsigned char txByte[len];
  650. unsigned char rxByte[254];
  651. unsigned char tmp[254];
  652. switch(moduleType)
  653. {
  654. case MODULE_EWT:
  655. default:
  656. //===============================
  657. // Command
  658. //===============================
  659. txByte[0] = 0x1A;
  660. txByte[1] = RFID_CMD_BLOCK_WRITE;
  661. txByte[2] = keyid;
  662. txByte[3] = block;
  663. for(i = 4; i < 10; i++)
  664. {
  665. if( j < sizeof (sectorKeyA[0]))
  666. {
  667. txByte[i] = sectorKeyA[(int)(block/4)][j];
  668. j++;
  669. }
  670. }
  671. memcpy(txByte+10, data, 16);
  672. txByte[ARRAY_SIZE(txByte)-1] = ClaCheckSum(txByte,(ARRAY_SIZE(txByte)));
  673. if(Fd > 0)
  674. {
  675. memset(rxByte, 0, sizeof(rxByte));
  676. if(system_command(Fd, txByte, len, rxByte) > 0)
  677. {
  678. memset(tmp, 0, sizeof tmp);
  679. memcpy(tmp, rxByte, sizeof (rxByte));
  680. if(tmp[1] == RFID_CMD_BLOCK_WRITE)
  681. {
  682. DEBUG_INFO_1("Write block successfully.\n");
  683. isSuccess = true;
  684. }
  685. else if(tmp[1] == 0xDD)
  686. {
  687. DEBUG_INFO_1("Write block unsuccessfully.\n");
  688. isSuccess = false;
  689. }
  690. else
  691. {}
  692. }
  693. else
  694. {}
  695. }
  696. else
  697. {}
  698. break;
  699. }
  700. return isSuccess;
  701. }
  702. //==========================================
  703. // Buzzer set (EWT Module)
  704. //==========================================
  705. void setBuzzer(int Fd, int moduleType, unsigned char time)
  706. {
  707. int len = 4;
  708. unsigned char txByte[len];
  709. unsigned char rxByte[254];
  710. unsigned char tmp[254];
  711. switch(moduleType)
  712. {
  713. case MODULE_EWT:
  714. default:
  715. //===============================
  716. // Command
  717. //===============================
  718. txByte[0] = 0x03;
  719. txByte[1] = RFID_CMD_BUZZER_SET;
  720. if(time > 0x0A)
  721. {
  722. time = 0x05;
  723. txByte[2] = time;
  724. DEBUG_WARN_1("Value is out of range.\n");
  725. }
  726. else
  727. {
  728. txByte[2] = time;
  729. }
  730. txByte[ARRAY_SIZE(txByte)-1] = ClaCheckSum(txByte,ARRAY_SIZE(txByte));
  731. if(Fd > 0)
  732. {
  733. memset(rxByte, 0, sizeof(rxByte));
  734. if(system_command(Fd, txByte, len, rxByte) > 0)
  735. {
  736. memset(tmp, 0, sizeof tmp);
  737. memcpy(tmp, rxByte, sizeof (rxByte));
  738. if(tmp[1] == 0x14)
  739. {
  740. DEBUG_INFO_1("Set Buzzer ok.\n");
  741. DEBUG_INFO_1("Set Buzzer %d ms.\n",time);
  742. }
  743. else if(tmp[1] == 0xEC)
  744. {
  745. DEBUG_INFO_1("Set Buzzer fail.\n");
  746. }
  747. else
  748. {}
  749. }
  750. else
  751. {}
  752. }
  753. else
  754. {}
  755. break;
  756. }
  757. }
  758. //==========================================
  759. // Halt RFID card (EWT)
  760. //==========================================
  761. void sethaltCard(int Fd, int moduleType)
  762. {
  763. int len = 3;
  764. unsigned char txByte[len];
  765. unsigned char rxByte[254];
  766. unsigned char tmp[254];
  767. switch(moduleType)
  768. {
  769. case MODULE_EWT:
  770. default:
  771. //===============================
  772. // Command
  773. //===============================
  774. txByte[0] = 0x02;
  775. txByte[1] = RFID_CMD_HALT_14443A;
  776. txByte[ARRAY_SIZE(txByte)-1] = ClaCheckSum(txByte,ARRAY_SIZE(txByte));
  777. if(Fd > 0)
  778. {
  779. memset(rxByte, 0, sizeof(rxByte));
  780. if(system_command(Fd, txByte, len, rxByte) > 0)
  781. {
  782. memset(tmp, 0, sizeof tmp);
  783. memcpy(tmp, rxByte, sizeof (rxByte));
  784. if(tmp[1] == 0x28)
  785. {
  786. DEBUG_INFO_1("Halt card pass.\n");
  787. }
  788. else if(tmp[1] == 0xD7)
  789. {
  790. DEBUG_INFO_1("Halt card fail.\n");
  791. }
  792. else
  793. {}
  794. }
  795. else
  796. {}
  797. }
  798. else
  799. {}
  800. break;
  801. }
  802. }
  803. //==========================================
  804. // Set the RF Output Level
  805. //==========================================
  806. bool setRfOutputLevel(int Fd, int moduleType, int Value)
  807. {
  808. bool isSuccess = false;
  809. int len = 4;
  810. unsigned char txByte[len];
  811. unsigned char rxByte[254];
  812. unsigned char tmp[254];
  813. switch(moduleType)
  814. {
  815. case MODULE_EWT:
  816. default:
  817. //===============================
  818. // Command
  819. //===============================
  820. txByte[0] = 0x03;
  821. txByte[1] = RFID_CMD_RF_OUTPUT_LEVEL_SET;
  822. txByte[2] = Value;
  823. txByte[ARRAY_SIZE(txByte)-1] = ClaCheckSum(txByte,ARRAY_SIZE(txByte));
  824. if(Fd > 0)
  825. {
  826. memset(rxByte, 0, sizeof(rxByte));
  827. if(system_command(Fd, txByte, len, rxByte) > 0)
  828. {
  829. memset(tmp, 0, sizeof tmp);
  830. memcpy(tmp, rxByte, sizeof (rxByte));
  831. if(tmp[1] == RFID_CMD_RF_OUTPUT_LEVEL_SET)
  832. {
  833. DEBUG_INFO_1("Set the RF Output Level : Pass...\n");
  834. if(Value == RF_STRONGEST)
  835. {
  836. DEBUG_INFO_1("Strongest...\n");
  837. }
  838. else if(Value == RF_STRONGER)
  839. {
  840. DEBUG_INFO_1("Strong...\n");
  841. }
  842. else if(Value == RF_WEAK)
  843. {
  844. DEBUG_INFO_1("Weak...\n");
  845. }
  846. else if(Value == RF_WEAKEST)
  847. {
  848. DEBUG_INFO_1("Weakest...\n");
  849. }
  850. isSuccess = true;
  851. }
  852. else if(tmp[1] == 0xFD)
  853. {
  854. DEBUG_INFO_1("Set the RF Output Level : Fail...\n");
  855. DEBUG_INFO_1("Unknow value !!! \n");
  856. DEBUG_INFO_1("Strongest : SET_RF_STRONGEST...\n");
  857. DEBUG_INFO_1("Strong : SET_RF_STRONGER...\n");
  858. DEBUG_INFO_1("Weak : SET_RF_WEAK...\n");
  859. DEBUG_INFO_1("Weakest : SET_RF_WEAKEST...\n");
  860. isSuccess = false;
  861. }
  862. else
  863. {}
  864. }
  865. else
  866. {}
  867. }
  868. else
  869. {}
  870. break;
  871. }
  872. return isSuccess;
  873. }
  874. //==========================================
  875. // Set the Default of Automatic Detecting Card
  876. //==========================================
  877. bool setDefaultOfAutomaticDetectingCard(int Fd, int moduleType, int Value)
  878. {
  879. bool isSuccess = false;
  880. int len = 4;
  881. unsigned char txByte[len];
  882. unsigned char rxByte[254];
  883. unsigned char tmp[254];
  884. switch(moduleType)
  885. {
  886. case MODULE_EWT:
  887. default:
  888. //===============================
  889. // Command
  890. //===============================
  891. txByte[0] = 0x03;
  892. txByte[1] = RFID_CMD_DEFAULT_AUTO_DETECTING_CARD;
  893. txByte[2] = Value;
  894. txByte[ARRAY_SIZE(txByte)-1] = ClaCheckSum(txByte,ARRAY_SIZE(txByte));
  895. if(Fd > 0)
  896. {
  897. memset(rxByte, 0, sizeof(rxByte));
  898. if(system_command(Fd, txByte, len, rxByte) > 0)
  899. {
  900. memset(tmp, 0, sizeof tmp);
  901. memcpy(tmp, rxByte, sizeof (rxByte));
  902. if(tmp[1] == RFID_CMD_DEFAULT_AUTO_DETECTING_CARD)
  903. {
  904. if(Value == TURN_OFF)
  905. {
  906. DEBUG_INFO_1("Default of Automatic Detecting Card : OFF...\n");
  907. }
  908. else if (Value == TURN_ON)
  909. {
  910. DEBUG_INFO_1("Default of Automatic Detecting Card : ON...\n");
  911. }
  912. else if (Value == TURN_TEMPORARILY)
  913. {
  914. DEBUG_INFO_1("Default of Automatic Detecting Card : Temporarily open and close automatically detect card...\n");
  915. }
  916. isSuccess = true;
  917. }
  918. else if(tmp[1] == 0xE2)
  919. {
  920. DEBUG_INFO_1("Value : SET_DETECTING_OFF = OFF...\n");
  921. DEBUG_INFO_1("Value : SET_DETECTING_ON = ON...\n");
  922. DEBUG_INFO_1("Value : SET_DETECTING_TEMPORARILY = Temporarily open and close...\n");
  923. isSuccess = false;
  924. }
  925. else
  926. {}
  927. }
  928. else
  929. {}
  930. }
  931. else
  932. {}
  933. break;
  934. }
  935. return isSuccess;
  936. }