2018-08-21 02:14:22 +00:00
|
|
|
# Adafruit PN532 NFC/RFID control library.
|
|
|
|
# Author: Tony DiCola
|
2018-08-25 05:45:47 +00:00
|
|
|
#
|
|
|
|
# The MIT License (MIT)
|
|
|
|
#
|
2018-08-21 02:14:22 +00:00
|
|
|
# Copyright (c) 2015-2018 Adafruit Industries
|
|
|
|
#
|
|
|
|
# Permission is hereby granted, free of charge, to any person obtaining a copy
|
|
|
|
# of this software and associated documentation files (the "Software"), to deal
|
|
|
|
# in the Software without restriction, including without limitation the rights
|
|
|
|
# to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
|
|
|
|
# copies of the Software, and to permit persons to whom the Software is
|
|
|
|
# furnished to do so, subject to the following conditions:
|
|
|
|
#
|
|
|
|
# The above copyright notice and this permission notice shall be included in all
|
|
|
|
# copies or substantial portions of the Software.
|
|
|
|
#
|
|
|
|
# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
|
|
|
# IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
|
|
|
# FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
|
|
|
# AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
|
|
|
# LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
|
|
|
# OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
|
|
|
|
# SOFTWARE.
|
2018-08-25 05:45:47 +00:00
|
|
|
"""
|
2018-08-25 20:39:16 +00:00
|
|
|
``adafruit_pn532``
|
2018-08-25 05:45:47 +00:00
|
|
|
====================================================
|
|
|
|
|
|
|
|
This module will let you communicate with a PN532 RFID/NFC shield or breakout
|
|
|
|
using I2C, SPI or UART.
|
|
|
|
|
|
|
|
* Author(s): Original Raspberry Pi code by Tony DiCola, CircuitPython by ladyada
|
|
|
|
|
|
|
|
Implementation Notes
|
|
|
|
--------------------
|
|
|
|
|
|
|
|
**Hardware:**
|
|
|
|
|
|
|
|
* Adafruit `PN532 Breakout <https://www.adafruit.com/product/364>`_
|
|
|
|
* Adafruit `PN532 Shield <https://www.adafruit.com/product/789>`_
|
|
|
|
|
|
|
|
**Software and Dependencies:**
|
|
|
|
|
|
|
|
* Adafruit CircuitPython firmware for the supported boards:
|
|
|
|
https://github.com/adafruit/circuitpython/releases
|
2018-08-25 20:39:16 +00:00
|
|
|
* Adafruit's Bus Device library: https://github.com/adafruit/Adafruit_CircuitPython_BusDevice
|
2018-08-25 05:45:47 +00:00
|
|
|
"""
|
|
|
|
|
2018-08-21 02:14:22 +00:00
|
|
|
import time
|
2018-08-25 20:39:16 +00:00
|
|
|
from digitalio import Direction
|
2018-08-21 02:14:22 +00:00
|
|
|
|
|
|
|
from micropython import const
|
|
|
|
|
2018-08-25 05:45:47 +00:00
|
|
|
__version__ = "0.0.0-auto.0"
|
|
|
|
__repo__ = "https://github.com/adafruit/Adafruit_CircuitPython_PN532.git"
|
|
|
|
|
2018-08-25 20:39:16 +00:00
|
|
|
# pylint: disable=bad-whitespace
|
2020-03-16 20:00:49 +00:00
|
|
|
_PREAMBLE = const(0x00)
|
|
|
|
_STARTCODE1 = const(0x00)
|
|
|
|
_STARTCODE2 = const(0xFF)
|
|
|
|
_POSTAMBLE = const(0x00)
|
2018-08-21 02:14:22 +00:00
|
|
|
|
2020-03-16 20:00:49 +00:00
|
|
|
_HOSTTOPN532 = const(0xD4)
|
|
|
|
_PN532TOHOST = const(0xD5)
|
2018-08-21 02:14:22 +00:00
|
|
|
|
|
|
|
# PN532 Commands
|
2020-03-16 20:00:49 +00:00
|
|
|
_COMMAND_DIAGNOSE = const(0x00)
|
|
|
|
_COMMAND_GETFIRMWAREVERSION = const(0x02)
|
|
|
|
_COMMAND_GETGENERALSTATUS = const(0x04)
|
|
|
|
_COMMAND_READREGISTER = const(0x06)
|
|
|
|
_COMMAND_WRITEREGISTER = const(0x08)
|
|
|
|
_COMMAND_READGPIO = const(0x0C)
|
|
|
|
_COMMAND_WRITEGPIO = const(0x0E)
|
|
|
|
_COMMAND_SETSERIALBAUDRATE = const(0x10)
|
|
|
|
_COMMAND_SETPARAMETERS = const(0x12)
|
|
|
|
_COMMAND_SAMCONFIGURATION = const(0x14)
|
|
|
|
_COMMAND_POWERDOWN = const(0x16)
|
|
|
|
_COMMAND_RFCONFIGURATION = const(0x32)
|
|
|
|
_COMMAND_RFREGULATIONTEST = const(0x58)
|
|
|
|
_COMMAND_INJUMPFORDEP = const(0x56)
|
|
|
|
_COMMAND_INJUMPFORPSL = const(0x46)
|
|
|
|
_COMMAND_INLISTPASSIVETARGET = const(0x4A)
|
|
|
|
_COMMAND_INATR = const(0x50)
|
|
|
|
_COMMAND_INPSL = const(0x4E)
|
|
|
|
_COMMAND_INDATAEXCHANGE = const(0x40)
|
|
|
|
_COMMAND_INCOMMUNICATETHRU = const(0x42)
|
|
|
|
_COMMAND_INDESELECT = const(0x44)
|
|
|
|
_COMMAND_INRELEASE = const(0x52)
|
|
|
|
_COMMAND_INSELECT = const(0x54)
|
|
|
|
_COMMAND_INAUTOPOLL = const(0x60)
|
|
|
|
_COMMAND_TGINITASTARGET = const(0x8C)
|
|
|
|
_COMMAND_TGSETGENERALBYTES = const(0x92)
|
|
|
|
_COMMAND_TGGETDATA = const(0x86)
|
|
|
|
_COMMAND_TGSETDATA = const(0x8E)
|
|
|
|
_COMMAND_TGSETMETADATA = const(0x94)
|
2018-08-21 04:10:46 +00:00
|
|
|
_COMMAND_TGGETINITIATORCOMMAND = const(0x88)
|
|
|
|
_COMMAND_TGRESPONSETOINITIATOR = const(0x90)
|
2020-03-16 20:00:49 +00:00
|
|
|
_COMMAND_TGGETTARGETSTATUS = const(0x8A)
|
2018-08-21 02:14:22 +00:00
|
|
|
|
2020-03-16 20:00:49 +00:00
|
|
|
_RESPONSE_INDATAEXCHANGE = const(0x41)
|
|
|
|
_RESPONSE_INLISTPASSIVETARGET = const(0x4B)
|
2018-08-21 02:14:22 +00:00
|
|
|
|
2020-03-16 20:00:49 +00:00
|
|
|
_WAKEUP = const(0x55)
|
2018-08-21 02:14:22 +00:00
|
|
|
|
2020-03-16 20:00:49 +00:00
|
|
|
_MIFARE_ISO14443A = const(0x00)
|
2018-08-21 02:14:22 +00:00
|
|
|
|
|
|
|
# Mifare Commands
|
2020-03-16 20:00:49 +00:00
|
|
|
MIFARE_CMD_AUTH_A = const(0x60)
|
|
|
|
MIFARE_CMD_AUTH_B = const(0x61)
|
|
|
|
MIFARE_CMD_READ = const(0x30)
|
|
|
|
MIFARE_CMD_WRITE = const(0xA0)
|
|
|
|
MIFARE_CMD_TRANSFER = const(0xB0)
|
|
|
|
MIFARE_CMD_DECREMENT = const(0xC0)
|
|
|
|
MIFARE_CMD_INCREMENT = const(0xC1)
|
|
|
|
MIFARE_CMD_STORE = const(0xC2)
|
|
|
|
MIFARE_ULTRALIGHT_CMD_WRITE = const(0xA2)
|
2018-08-21 02:14:22 +00:00
|
|
|
|
|
|
|
# Prefixes for NDEF Records (to identify record type)
|
2020-03-16 20:00:49 +00:00
|
|
|
NDEF_URIPREFIX_NONE = const(0x00)
|
|
|
|
NDEF_URIPREFIX_HTTP_WWWDOT = const(0x01)
|
|
|
|
NDEF_URIPREFIX_HTTPS_WWWDOT = const(0x02)
|
|
|
|
NDEF_URIPREFIX_HTTP = const(0x03)
|
|
|
|
NDEF_URIPREFIX_HTTPS = const(0x04)
|
|
|
|
NDEF_URIPREFIX_TEL = const(0x05)
|
|
|
|
NDEF_URIPREFIX_MAILTO = const(0x06)
|
|
|
|
NDEF_URIPREFIX_FTP_ANONAT = const(0x07)
|
|
|
|
NDEF_URIPREFIX_FTP_FTPDOT = const(0x08)
|
|
|
|
NDEF_URIPREFIX_FTPS = const(0x09)
|
|
|
|
NDEF_URIPREFIX_SFTP = const(0x0A)
|
|
|
|
NDEF_URIPREFIX_SMB = const(0x0B)
|
|
|
|
NDEF_URIPREFIX_NFS = const(0x0C)
|
|
|
|
NDEF_URIPREFIX_FTP = const(0x0D)
|
|
|
|
NDEF_URIPREFIX_DAV = const(0x0E)
|
|
|
|
NDEF_URIPREFIX_NEWS = const(0x0F)
|
|
|
|
NDEF_URIPREFIX_TELNET = const(0x10)
|
|
|
|
NDEF_URIPREFIX_IMAP = const(0x11)
|
|
|
|
NDEF_URIPREFIX_RTSP = const(0x12)
|
|
|
|
NDEF_URIPREFIX_URN = const(0x13)
|
|
|
|
NDEF_URIPREFIX_POP = const(0x14)
|
|
|
|
NDEF_URIPREFIX_SIP = const(0x15)
|
|
|
|
NDEF_URIPREFIX_SIPS = const(0x16)
|
|
|
|
NDEF_URIPREFIX_TFTP = const(0x17)
|
|
|
|
NDEF_URIPREFIX_BTSPP = const(0x18)
|
|
|
|
NDEF_URIPREFIX_BTL2CAP = const(0x19)
|
|
|
|
NDEF_URIPREFIX_BTGOEP = const(0x1A)
|
|
|
|
NDEF_URIPREFIX_TCPOBEX = const(0x1B)
|
|
|
|
NDEF_URIPREFIX_IRDAOBEX = const(0x1C)
|
|
|
|
NDEF_URIPREFIX_FILE = const(0x1D)
|
|
|
|
NDEF_URIPREFIX_URN_EPC_ID = const(0x1E)
|
|
|
|
NDEF_URIPREFIX_URN_EPC_TAG = const(0x1F)
|
|
|
|
NDEF_URIPREFIX_URN_EPC_PAT = const(0x20)
|
|
|
|
NDEF_URIPREFIX_URN_EPC_RAW = const(0x21)
|
|
|
|
NDEF_URIPREFIX_URN_EPC = const(0x22)
|
|
|
|
NDEF_URIPREFIX_URN_NFC = const(0x23)
|
|
|
|
|
|
|
|
_GPIO_VALIDATIONBIT = const(0x80)
|
|
|
|
_GPIO_P30 = const(0)
|
|
|
|
_GPIO_P31 = const(1)
|
|
|
|
_GPIO_P32 = const(2)
|
|
|
|
_GPIO_P33 = const(3)
|
|
|
|
_GPIO_P34 = const(4)
|
|
|
|
_GPIO_P35 = const(5)
|
|
|
|
|
|
|
|
_ACK = b"\x00\x00\xFF\x00\xFF\x00"
|
|
|
|
_FRAME_START = b"\x00\x00\xFF"
|
2018-08-25 20:39:16 +00:00
|
|
|
# pylint: enable=bad-whitespace
|
|
|
|
|
|
|
|
|
|
|
|
def _reset(pin):
|
|
|
|
"""Perform a hardware reset toggle"""
|
|
|
|
pin.direction = Direction.OUTPUT
|
|
|
|
pin.value = True
|
|
|
|
time.sleep(0.1)
|
|
|
|
pin.value = False
|
|
|
|
time.sleep(0.5)
|
|
|
|
pin.value = True
|
|
|
|
time.sleep(0.1)
|
2018-08-21 02:14:22 +00:00
|
|
|
|
2018-08-25 04:18:08 +00:00
|
|
|
|
2018-08-21 04:10:46 +00:00
|
|
|
class BusyError(Exception):
|
|
|
|
"""Base class for exceptions in this module."""
|
2018-08-21 02:14:22 +00:00
|
|
|
|
2018-08-28 19:36:54 +00:00
|
|
|
|
2018-08-24 18:57:05 +00:00
|
|
|
class PN532:
|
|
|
|
"""PN532 driver base, must be extended for I2C/SPI/UART interfacing"""
|
2018-08-21 02:14:22 +00:00
|
|
|
|
2018-08-24 18:57:05 +00:00
|
|
|
def __init__(self, *, debug=False, reset=None):
|
|
|
|
"""Create an instance of the PN532 class
|
2018-08-21 02:14:22 +00:00
|
|
|
"""
|
2018-08-21 03:46:15 +00:00
|
|
|
self.debug = debug
|
2018-08-24 18:36:52 +00:00
|
|
|
if reset:
|
2018-08-25 20:39:16 +00:00
|
|
|
if debug:
|
|
|
|
print("Resetting")
|
|
|
|
_reset(reset)
|
|
|
|
|
2018-08-21 04:12:35 +00:00
|
|
|
try:
|
2018-08-25 05:32:00 +00:00
|
|
|
self._wakeup()
|
2020-03-03 01:41:07 +00:00
|
|
|
_ = self.firmware_version # first time often fails, try 2ce
|
2018-08-21 04:12:35 +00:00
|
|
|
return
|
2018-08-25 20:39:16 +00:00
|
|
|
except (BusyError, RuntimeError):
|
2018-08-21 04:12:35 +00:00
|
|
|
pass
|
2020-03-03 01:41:07 +00:00
|
|
|
_ = self.firmware_version
|
2018-08-24 18:57:05 +00:00
|
|
|
|
|
|
|
def _read_data(self, count):
|
|
|
|
# Read raw data from device, not including status bytes:
|
|
|
|
# Subclasses MUST implement this!
|
|
|
|
raise NotImplementedError
|
2018-08-25 20:39:16 +00:00
|
|
|
|
2018-08-24 18:57:05 +00:00
|
|
|
def _write_data(self, framebytes):
|
|
|
|
# Write raw bytestring data to device, not including status bytes:
|
|
|
|
# Subclasses MUST implement this!
|
|
|
|
raise NotImplementedError
|
|
|
|
|
|
|
|
def _wait_ready(self, timeout):
|
|
|
|
# Check if busy up to max length of 'timeout' seconds
|
|
|
|
# Subclasses MUST implement this!
|
|
|
|
raise NotImplementedError
|
|
|
|
|
2018-08-25 20:39:16 +00:00
|
|
|
def _wakeup(self):
|
|
|
|
# Send special command to wake up
|
|
|
|
raise NotImplementedError
|
2018-08-24 18:57:05 +00:00
|
|
|
|
2018-08-21 02:14:22 +00:00
|
|
|
def _write_frame(self, data):
|
|
|
|
"""Write a frame to the PN532 with the specified data bytearray."""
|
2020-03-16 20:00:49 +00:00
|
|
|
assert (
|
|
|
|
data is not None and 1 < len(data) < 255
|
|
|
|
), "Data must be array of 1 to 255 bytes."
|
2018-08-21 02:14:22 +00:00
|
|
|
# Build frame to send as:
|
|
|
|
# - Preamble (0x00)
|
|
|
|
# - Start code (0x00, 0xFF)
|
|
|
|
# - Command length (1 byte)
|
|
|
|
# - Command length checksum
|
|
|
|
# - Command bytes
|
|
|
|
# - Checksum
|
|
|
|
# - Postamble (0x00)
|
|
|
|
length = len(data)
|
2020-03-16 20:00:49 +00:00
|
|
|
frame = bytearray(length + 8)
|
2018-08-21 04:10:46 +00:00
|
|
|
frame[0] = _PREAMBLE
|
|
|
|
frame[1] = _STARTCODE1
|
|
|
|
frame[2] = _STARTCODE2
|
2018-08-21 03:46:15 +00:00
|
|
|
checksum = sum(frame[0:3])
|
|
|
|
frame[3] = length & 0xFF
|
|
|
|
frame[4] = (~length + 1) & 0xFF
|
|
|
|
frame[5:-2] = data
|
|
|
|
checksum += sum(data)
|
2018-08-21 02:14:22 +00:00
|
|
|
frame[-2] = ~checksum & 0xFF
|
2018-08-21 04:10:46 +00:00
|
|
|
frame[-1] = _POSTAMBLE
|
2018-08-21 02:14:22 +00:00
|
|
|
# Send frame.
|
2018-08-21 03:46:15 +00:00
|
|
|
if self.debug:
|
2020-03-16 20:00:49 +00:00
|
|
|
print("Write frame: ", [hex(i) for i in frame])
|
2018-08-24 18:57:05 +00:00
|
|
|
self._write_data(bytes(frame))
|
2018-08-21 02:14:22 +00:00
|
|
|
|
|
|
|
def _read_frame(self, length):
|
|
|
|
"""Read a response frame from the PN532 of at most length bytes in size.
|
|
|
|
Returns the data inside the frame if found, otherwise raises an exception
|
|
|
|
if there is an error parsing the frame. Note that less than length bytes
|
|
|
|
might be returned!
|
|
|
|
"""
|
|
|
|
# Read frame with expected length of data.
|
2020-03-16 20:00:49 +00:00
|
|
|
response = self._read_data(length + 8)
|
2018-08-21 03:46:15 +00:00
|
|
|
if self.debug:
|
2020-03-16 20:00:49 +00:00
|
|
|
print("Read frame:", [hex(i) for i in response])
|
2018-08-25 20:39:16 +00:00
|
|
|
|
2018-08-21 02:14:22 +00:00
|
|
|
# Swallow all the 0x00 values that preceed 0xFF.
|
2018-08-24 18:44:09 +00:00
|
|
|
offset = 0
|
2018-08-21 02:14:22 +00:00
|
|
|
while response[offset] == 0x00:
|
|
|
|
offset += 1
|
|
|
|
if offset >= len(response):
|
2020-03-16 20:00:49 +00:00
|
|
|
raise RuntimeError("Response frame preamble does not contain 0x00FF!")
|
2018-08-21 02:14:22 +00:00
|
|
|
if response[offset] != 0xFF:
|
2020-03-16 20:00:49 +00:00
|
|
|
raise RuntimeError("Response frame preamble does not contain 0x00FF!")
|
2018-08-21 02:14:22 +00:00
|
|
|
offset += 1
|
|
|
|
if offset >= len(response):
|
2020-03-16 20:00:49 +00:00
|
|
|
raise RuntimeError("Response contains no data!")
|
2018-08-21 02:14:22 +00:00
|
|
|
# Check length & length checksum match.
|
|
|
|
frame_len = response[offset]
|
2020-03-16 20:00:49 +00:00
|
|
|
if (frame_len + response[offset + 1]) & 0xFF != 0:
|
|
|
|
raise RuntimeError("Response length checksum did not match length!")
|
2018-08-21 02:14:22 +00:00
|
|
|
# Check frame checksum value matches bytes.
|
2020-03-16 20:00:49 +00:00
|
|
|
checksum = sum(response[offset + 2 : offset + 2 + frame_len + 1]) & 0xFF
|
2018-08-21 02:14:22 +00:00
|
|
|
if checksum != 0:
|
2020-03-16 20:00:49 +00:00
|
|
|
raise RuntimeError(
|
|
|
|
"Response checksum did not match expected value: ", checksum
|
|
|
|
)
|
2018-08-21 02:14:22 +00:00
|
|
|
# Return frame data.
|
2020-03-16 20:00:49 +00:00
|
|
|
return response[offset + 2 : offset + 2 + frame_len]
|
2018-08-21 02:14:22 +00:00
|
|
|
|
2020-03-16 20:00:49 +00:00
|
|
|
def call_function(
|
|
|
|
self, command, response_length=0, params=[], timeout=1
|
|
|
|
): # pylint: disable=dangerous-default-value
|
2018-08-21 02:14:22 +00:00
|
|
|
"""Send specified command to the PN532 and expect up to response_length
|
|
|
|
bytes back in a response. Note that less than the expected bytes might
|
|
|
|
be returned! Params can optionally specify an array of bytes to send as
|
2018-08-21 03:46:15 +00:00
|
|
|
parameters to the function call. Will wait up to timeout seconds
|
2018-08-21 02:14:22 +00:00
|
|
|
for a response and return a bytearray of response bytes, or None if no
|
|
|
|
response is available within the timeout.
|
|
|
|
"""
|
|
|
|
# Build frame data with command and parameters.
|
2020-03-16 20:00:49 +00:00
|
|
|
data = bytearray(2 + len(params))
|
2018-08-25 20:39:16 +00:00
|
|
|
data[0] = _HOSTTOPN532
|
|
|
|
data[1] = command & 0xFF
|
|
|
|
for i, val in enumerate(params):
|
2020-03-16 20:00:49 +00:00
|
|
|
data[2 + i] = val
|
2018-08-21 02:14:22 +00:00
|
|
|
# Send frame and wait for response.
|
2018-08-25 20:39:16 +00:00
|
|
|
try:
|
|
|
|
self._write_frame(data)
|
|
|
|
except OSError:
|
|
|
|
self._wakeup()
|
|
|
|
return None
|
2018-08-21 03:46:15 +00:00
|
|
|
if not self._wait_ready(timeout):
|
2018-08-21 02:14:22 +00:00
|
|
|
return None
|
|
|
|
# Verify ACK response and wait to be ready for function response.
|
2018-08-21 04:10:46 +00:00
|
|
|
if not _ACK == self._read_data(len(_ACK)):
|
2020-03-16 20:00:49 +00:00
|
|
|
raise RuntimeError("Did not receive expected ACK from PN532!")
|
2018-08-21 03:46:15 +00:00
|
|
|
if not self._wait_ready(timeout):
|
2018-08-21 02:14:22 +00:00
|
|
|
return None
|
|
|
|
# Read response bytes.
|
2020-03-16 20:00:49 +00:00
|
|
|
response = self._read_frame(response_length + 2)
|
2018-08-21 02:14:22 +00:00
|
|
|
# Check that response is for the called function.
|
2020-03-16 20:00:49 +00:00
|
|
|
if not (response[0] == _PN532TOHOST and response[1] == (command + 1)):
|
|
|
|
raise RuntimeError("Received unexpected command response!")
|
2018-08-21 02:14:22 +00:00
|
|
|
# Return response data.
|
|
|
|
return response[2:]
|
|
|
|
|
2020-02-29 17:59:23 +00:00
|
|
|
@property
|
|
|
|
def firmware_version(self):
|
2018-08-21 02:14:22 +00:00
|
|
|
"""Call PN532 GetFirmwareVersion function and return a tuple with the IC,
|
|
|
|
Ver, Rev, and Support values.
|
|
|
|
"""
|
2018-08-25 04:31:36 +00:00
|
|
|
response = self.call_function(_COMMAND_GETFIRMWAREVERSION, 4, timeout=0.5)
|
2018-08-21 02:14:22 +00:00
|
|
|
if response is None:
|
2020-03-16 20:00:49 +00:00
|
|
|
raise RuntimeError("Failed to detect the PN532")
|
2018-08-21 04:10:46 +00:00
|
|
|
return tuple(response)
|
2018-08-21 02:14:22 +00:00
|
|
|
|
2020-03-16 20:00:49 +00:00
|
|
|
def SAM_configuration(self): # pylint: disable=invalid-name
|
2018-08-21 02:14:22 +00:00
|
|
|
"""Configure the PN532 to read MiFare cards."""
|
|
|
|
# Send SAM configuration command with configuration for:
|
|
|
|
# - 0x01, normal mode
|
|
|
|
# - 0x14, timeout 50ms * 20 = 1 second
|
|
|
|
# - 0x01, use IRQ pin
|
|
|
|
# Note that no other verification is necessary as call_function will
|
|
|
|
# check the command was executed as expected.
|
2018-08-21 04:10:46 +00:00
|
|
|
self.call_function(_COMMAND_SAMCONFIGURATION, params=[0x01, 0x14, 0x01])
|
2018-08-21 02:14:22 +00:00
|
|
|
|
2018-08-21 04:10:46 +00:00
|
|
|
def read_passive_target(self, card_baud=_MIFARE_ISO14443A, timeout=1):
|
2018-08-21 02:14:22 +00:00
|
|
|
"""Wait for a MiFare card to be available and return its UID when found.
|
2018-08-21 03:46:15 +00:00
|
|
|
Will wait up to timeout seconds and return None if no card is found,
|
2018-08-21 02:14:22 +00:00
|
|
|
otherwise a bytearray with the UID of the found card is returned.
|
|
|
|
"""
|
|
|
|
# Send passive read command for 1 card. Expect at most a 7 byte UUID.
|
2018-08-21 04:10:46 +00:00
|
|
|
try:
|
2020-03-16 20:00:49 +00:00
|
|
|
response = self.call_function(
|
|
|
|
_COMMAND_INLISTPASSIVETARGET,
|
|
|
|
params=[0x01, card_baud],
|
|
|
|
response_length=19,
|
|
|
|
timeout=timeout,
|
|
|
|
)
|
2018-08-21 04:10:46 +00:00
|
|
|
except BusyError:
|
2020-03-16 20:00:49 +00:00
|
|
|
return None # no card found!
|
2018-08-21 02:14:22 +00:00
|
|
|
# If no response is available return None to indicate no card is present.
|
|
|
|
if response is None:
|
|
|
|
return None
|
|
|
|
# Check only 1 card with up to a 7 byte UID is present.
|
|
|
|
if response[0] != 0x01:
|
2020-03-16 20:00:49 +00:00
|
|
|
raise RuntimeError("More than one card detected!")
|
2018-08-21 02:14:22 +00:00
|
|
|
if response[5] > 7:
|
2020-03-16 20:00:49 +00:00
|
|
|
raise RuntimeError("Found card with unexpectedly long UID!")
|
2018-08-21 02:14:22 +00:00
|
|
|
# Return UID of card.
|
2020-03-16 20:00:49 +00:00
|
|
|
return response[6 : 6 + response[5]]
|
2018-08-21 02:14:22 +00:00
|
|
|
|
2020-03-16 20:00:49 +00:00
|
|
|
def mifare_classic_authenticate_block(
|
|
|
|
self, uid, block_number, key_number, key
|
|
|
|
): # pylint: disable=invalid-name
|
2018-08-21 02:14:22 +00:00
|
|
|
"""Authenticate specified block number for a MiFare classic card. Uid
|
|
|
|
should be a byte array with the UID of the card, block number should be
|
|
|
|
the block to authenticate, key number should be the key type (like
|
|
|
|
MIFARE_CMD_AUTH_A or MIFARE_CMD_AUTH_B), and key should be a byte array
|
|
|
|
with the key data. Returns True if the block was authenticated, or False
|
|
|
|
if not authenticated.
|
|
|
|
"""
|
|
|
|
# Build parameters for InDataExchange command to authenticate MiFare card.
|
|
|
|
uidlen = len(uid)
|
|
|
|
keylen = len(key)
|
2020-03-16 20:00:49 +00:00
|
|
|
params = bytearray(3 + uidlen + keylen)
|
2018-08-21 02:14:22 +00:00
|
|
|
params[0] = 0x01 # Max card numbers
|
|
|
|
params[1] = key_number & 0xFF
|
|
|
|
params[2] = block_number & 0xFF
|
2020-03-16 20:00:49 +00:00
|
|
|
params[3 : 3 + keylen] = key
|
|
|
|
params[3 + keylen :] = uid
|
2018-08-21 02:14:22 +00:00
|
|
|
# Send InDataExchange request and verify response is 0x00.
|
2020-03-16 20:00:49 +00:00
|
|
|
response = self.call_function(
|
|
|
|
_COMMAND_INDATAEXCHANGE, params=params, response_length=1
|
|
|
|
)
|
2018-08-21 02:14:22 +00:00
|
|
|
return response[0] == 0x00
|
|
|
|
|
|
|
|
def mifare_classic_read_block(self, block_number):
|
|
|
|
"""Read a block of data from the card. Block number should be the block
|
|
|
|
to read. If the block is successfully read a bytearray of length 16 with
|
|
|
|
data starting at the specified block will be returned. If the block is
|
|
|
|
not read then None will be returned.
|
|
|
|
"""
|
|
|
|
# Send InDataExchange request to read block of MiFare data.
|
2020-03-16 20:00:49 +00:00
|
|
|
response = self.call_function(
|
|
|
|
_COMMAND_INDATAEXCHANGE,
|
|
|
|
params=[0x01, MIFARE_CMD_READ, block_number & 0xFF],
|
|
|
|
response_length=17,
|
|
|
|
)
|
2018-08-21 02:14:22 +00:00
|
|
|
# Check first response is 0x00 to show success.
|
|
|
|
if response[0] != 0x00:
|
|
|
|
return None
|
|
|
|
# Return first 4 bytes since 16 bytes are always returned.
|
|
|
|
return response[1:]
|
|
|
|
|
|
|
|
def mifare_classic_write_block(self, block_number, data):
|
|
|
|
"""Write a block of data to the card. Block number should be the block
|
|
|
|
to write and data should be a byte array of length 16 with the data to
|
|
|
|
write. If the data is successfully written then True is returned,
|
|
|
|
otherwise False is returned.
|
|
|
|
"""
|
2020-03-16 20:00:49 +00:00
|
|
|
assert (
|
|
|
|
data is not None and len(data) == 16
|
|
|
|
), "Data must be an array of 16 bytes!"
|
2018-08-21 02:14:22 +00:00
|
|
|
# Build parameters for InDataExchange command to do MiFare classic write.
|
|
|
|
params = bytearray(19)
|
|
|
|
params[0] = 0x01 # Max card numbers
|
|
|
|
params[1] = MIFARE_CMD_WRITE
|
|
|
|
params[2] = block_number & 0xFF
|
|
|
|
params[3:] = data
|
|
|
|
# Send InDataExchange request.
|
2020-03-16 20:00:49 +00:00
|
|
|
response = self.call_function(
|
|
|
|
_COMMAND_INDATAEXCHANGE, params=params, response_length=1
|
|
|
|
)
|
2018-08-24 18:57:05 +00:00
|
|
|
return response[0] == 0x0
|
|
|
|
|
2018-08-25 21:04:21 +00:00
|
|
|
def ntag2xx_write_block(self, block_number, data):
|
|
|
|
"""Write a block of data to the card. Block number should be the block
|
|
|
|
to write and data should be a byte array of length 4 with the data to
|
|
|
|
write. If the data is successfully written then True is returned,
|
|
|
|
otherwise False is returned.
|
|
|
|
"""
|
2020-03-16 20:00:49 +00:00
|
|
|
assert data is not None and len(data) == 4, "Data must be an array of 4 bytes!"
|
2018-08-25 21:04:21 +00:00
|
|
|
# Build parameters for InDataExchange command to do NTAG203 classic write.
|
2020-03-16 20:00:49 +00:00
|
|
|
params = bytearray(3 + len(data))
|
2018-08-25 21:04:21 +00:00
|
|
|
params[0] = 0x01 # Max card numbers
|
|
|
|
params[1] = MIFARE_ULTRALIGHT_CMD_WRITE
|
|
|
|
params[2] = block_number & 0xFF
|
|
|
|
params[3:] = data
|
|
|
|
# Send InDataExchange request.
|
2020-03-16 20:00:49 +00:00
|
|
|
response = self.call_function(
|
|
|
|
_COMMAND_INDATAEXCHANGE, params=params, response_length=1
|
|
|
|
)
|
2018-08-25 21:04:21 +00:00
|
|
|
return response[0] == 0x00
|
2018-08-25 21:07:50 +00:00
|
|
|
|
2018-08-25 21:04:21 +00:00
|
|
|
def ntag2xx_read_block(self, block_number):
|
|
|
|
"""Read a block of data from the card. Block number should be the block
|
|
|
|
to read. If the block is successfully read a bytearray of length 16 with
|
|
|
|
data starting at the specified block will be returned. If the block is
|
|
|
|
not read then None will be returned.
|
|
|
|
"""
|
2020-03-16 20:00:49 +00:00
|
|
|
return self.mifare_classic_read_block(block_number)[
|
|
|
|
0:4
|
|
|
|
] # only 4 bytes per page
|