使用STM32控制NXP的NFC读卡器芯片CLRC663读写ST公司的NFC标签芯片M24SR64的问题

coolmoonlight 2018-10-24 09:52:41
现在项目上要求把NXP公司的 CLRC663芯片用STM32来控制读写操作

有没有大佬做过这方面的移植啊,
本人对于14443A的协议看得一脸蒙蔽,求大佬们帮帮忙啊,
能读出标签的UID,
我把main函数贴出来了,这是抄的网上的代码,用这个读写NXP 的MIFARE卡没有问题(SAK=0X08);

但是只能读st公司的m24sr(14443A标准)的UID,读写数据就不行,每次执行到
phKeyStore_SetKey 成功(这个函数里面只有支持PH_KEYSTORE_KEY_TYPE_MIFARE的stwch case,其他类型的case都是空 ),但是不知道与me24sr是否符合,
之后
phalMfc_Authenticate函数执行失败,返回0x201或其他非0数值而跳出循环。
这个历程用的官方的库,实在没有办法了,又折腾了一个月了。
跪求大佬拉一波,指个路

/* Includes ------------------------------------------------------------------*/
#include "public.h"

// Forward declarations
static void Fill_Block (uint8_t *pBlock, uint8_t MaxNr);

/* Set the key for the Mifare (R) Classic cards. */
static /* const */ uint8_t Key[6] = {0xFFU, 0xFFU, 0xFFU, 0xFFU, 0xFFU, 0xFFU};

// Don't change the following line
static /* const */ uint8_t Original_Key[6] = {0xFFU, 0xFFU, 0xFFU, 0xFFU, 0xFFU, 0xFFU};

/*******************************************************************************
** Fill Block
** This function is just used to generate some example data for
** write operations on the card.
*******************************************************************************/
static void Fill_Block (uint8_t *pBlock, uint8_t MaxNr)
{
uint8_t i;

for (i = 0; i <= MaxNr; i++)
{
*pBlock++ = i;
}
}
//PA8 蜂鸣、PB5绿灯
extern int32_t BspGetSysTicks(void);
extern uint8_t BspGetDlyTicks(int32_t TicksHome,int32_t Ticks);

#define IndicateON() {GPIO_SetBits(GPIOA,GPIO_Pin_8); GPIO_ResetBits(GPIOB,GPIO_Pin_3);}
#define IndicateOFF(){GPIO_ResetBits(GPIOA,GPIO_Pin_8);GPIO_SetBits(GPIOB,GPIO_Pin_3);}
void GpioInit(void)
{
GPIO_InitTypeDef GPIO_InitStructure;

RCC_APB2PeriphClockCmd(RCC_APB2Periph_GPIOA|RCC_APB2Periph_GPIOB, ENABLE);

GPIO_InitStructure.GPIO_Pin = GPIO_Pin_8;
GPIO_InitStructure.GPIO_Mode = GPIO_Mode_Out_PP;
GPIO_InitStructure.GPIO_Speed = GPIO_Speed_50MHz;
GPIO_Init(GPIOA, &GPIO_InitStructure);

GPIO_InitStructure.GPIO_Pin = GPIO_Pin_3;
GPIO_InitStructure.GPIO_Mode = GPIO_Mode_Out_PP;
GPIO_InitStructure.GPIO_Speed = GPIO_Speed_50MHz;
GPIO_Init(GPIOB, &GPIO_InitStructure);

IndicateOFF();
}

uint32_t BeepDevTicks;
uint8_t BeepFlag;
void BeepON(void)
{
IndicateON();
BeepDevTicks = BspGetSysTicks();
BeepFlag = 1;
}
void BeepRun(void)
{
if(BeepFlag)
{
if(BspGetDlyTicks(BeepDevTicks,20))
{
BeepFlag = 0;
IndicateOFF();
}
}
}
/*******************************************************************************
** Main Function
*******************************************************************************/
uint8_t bHalBufferReader[0x40];
uint8_t bBufferReader[0x60];
uint8_t Win[11]={'W','h','a','t','a','f','u','c','k','e','r'};
uint8_t Rout[11];
int main (void)
{
unsigned int volatile i;

/*BFL(Basic Function Library) data parameter storage*/
phbalReg_Stub_DataParams_t balReader;
phhalHw_Rc663_DataParams_t halReader;
phpalI14443p3a_Sw_DataParams_t I14443p3a;
phpalI14443p4_Sw_DataParams_t I14443p4;
phpalMifare_Sw_DataParams_t palMifare;
phKeyStore_Rc663_DataParams_t Rc663keyStore;
phalMfc_Sw_DataParams_t alMfc;
phStatus_t status;
void *pHal;
uint8_t bSak[1];
uint8_t bUid[10];
uint8_t bMoreCardsAvailable;
uint8_t bLength;

/* Initialize GPIO (sets up clock) */
SystemInit(); //72M
SysTick_Config(720000); //10ms
GpioInit();
//SPI1_Init();
RegCtl_SpiHwInit();
/* Perform a hardware reset */
Reset_RC663_device();
/* Initialize the Reader BAL (Bus Abstraction Layer) component */
phbalReg_Stub_Init(&balReader, sizeof(phbalReg_Stub_DataParams_t));
/* Initialize the Reader HAL (Hardware Abstraction Layer) component */
status = phhalHw_Rc663_Init(&halReader,sizeof(phhalHw_Rc663_DataParams_t),&balReader,0,bHalBufferReader,sizeof(bHalBufferReader),bHalBufferReader,sizeof(bHalBufferReader));
/* Set the parameter to use the SPI interface */
halReader.bBalConnectionType = PHHAL_HW_BAL_CONNECTION_SPI;
/* Set the generic pointer */
pHal = &halReader;
/* Initializing specific objects for the communication with
* Mifare (R) Classic cards.
* The Mifare (R) Classic card is compliant of
* ISO 14443-3 and ISO 14443-4
*/
/* Initialize the 14443-3A PAL (Protocol Abstraction Layer) component */
PH_CHECK_SUCCESS_FCT(status, phpalI14443p3a_Sw_Init(&I14443p3a,sizeof(phpalI14443p3a_Sw_DataParams_t), pHal));
/* Initialize the 14443-4 PAL component */
PH_CHECK_SUCCESS_FCT(status, phpalI14443p4_Sw_Init(&I14443p4,sizeof(phpalI14443p4_Sw_DataParams_t), pHal));
/* Initialize the Mifare PAL component */
PH_CHECK_SUCCESS_FCT(status, phpalMifare_Sw_Init(&palMifare,sizeof(phpalMifare_Sw_DataParams_t), pHal, &I14443p4));
/* Initialize the keystore component */
PH_CHECK_SUCCESS_FCT(status, phKeyStore_Rc663_Init(&Rc663keyStore,sizeof(phKeyStore_Rc663_DataParams_t), pHal));
/* Initialize the Mifare (R) Classic AL component - set NULL because
* the keys are loaded in E2 by the function */
/* phKeyStore_SetKey */
PH_CHECK_SUCCESS_FCT(status, phalMfc_Sw_Init(&alMfc,sizeof(phalMfc_Sw_DataParams_t), &palMifare,NULL));
/* SoftReset the IC.The SoftReset only resets the RC663 to EEPROM configuration. */
PH_CHECK_SUCCESS_FCT(status, phhalHw_Rc663_Cmd_SoftReset(pHal));
/* Read the version of the reader IC */
PH_CHECK_SUCCESS_FCT(status, phhalHw_ReadRegister(&halReader,PHHAL_HW_RC663_REG_VERSION, bBufferReader));
/* Reset the Rf field */
PH_CHECK_SUCCESS_FCT(status, phhalHw_FieldReset(pHal));
/* Apply the type A protocol settings and activate the RF field. */
PH_CHECK_SUCCESS_FCT(status, phhalHw_ApplyProtocolSettings(pHal,PHHAL_HW_CARDTYPE_ISO14443A));
/* Activate the communication layer part 3 of the ISO 14443A standard. */
//BeepON();

while(1)
{
BeepRun();
status = phpalI14443p3a_ActivateCard(&I14443p3a, NULL, 0x00, bUid, &bLength, bSak, &bMoreCardsAvailable);

/* Check if we have a card in the RF field.
* If so, check what card it is. */
if (PH_ERR_SUCCESS == status)
{
/* Check if there is an ISO-4 compliant in the RF field */
if (0x20 == (*bSak & 0x20))
{
//<<<<<<<<<<<<<
//BeepON();
/* Mifare Classic card, set Key Store */
PH_CHECK_SUCCESS_FCT(status, phKeyStore_SetKey(&Rc663keyStore, 0, 0,PH_KEYSTORE_KEY_TYPE_AES128, &Key[0], 0));//663的驱动写的只支持MIFARE类型的秘钥,硬件手册写的支持14443A
/* Authenticate with the Key
* We can authenticate at any block of a sector and we will get the access to all blocks of the same sector
* For example authenticating at block 5, we will get the access to blocks 4, 5, 6 and 7.
*/
/* Send authentication for block 6 */
status = phalMfc_Authenticate(&alMfc, 6, PHHAL_HW_MFC_KEYA, 1, 0, bUid, bLength);

/* Check for Status */
if ((status & PH_ERR_MASK) != PH_ERR_SUCCESS)
{
/* Print Error info */
// DEBUG_PRINTF("\nAuthentication Failed!!!");
// DEBUG_PRINTF("\nPlease correct the used key");
// DEBUG_PRINTF("\nExecution aborted!!!\n");
break;
}

// DEBUG_PRINTF("\nAuthentication Successful");

/* Empty the bDataBuffer */
// memset(bDataBuffer, '\0', DATA_BUFFER_LEN);

// DEBUG_PRINTF("\nRead data from Block 4");

/* Read data from block 4 */
status = phalMfc_Read(&alMfc, 4, Rout);

/* Check for Status */
if (status != PH_ERR_SUCCESS)
{
/* Print Error info */
// DEBUG_PRINTF("\nRead operation failed!!!\n");
// DEBUG_PRINTF("\nExecution aborted!!!\n\n");
break; /* Break from the loop*/
}

// DEBUG_PRINTF("\nRead Success");
// DEBUG_PRINTF("\nThe content of Block 4 is:\n");

// phApp_Print_Buff(&bDataBuffer[0], MFC_BLOCK_DATA_SIZE);
// DEBUG_PRINTF("\n\n --- End of Read Operation --- \n");

// DEBUG_PRINTF("\nWrite data to Block 4");

/* Write data to block 4 */
status = phalMfc_Write(&alMfc, 4, Win);

/* Check for Status */
if (status != PH_ERR_SUCCESS)
{
/* Print Error info */
// DEBUG_PRINTF("\nWrite operation failed!!!\n");
// DEBUG_PRINTF("\nExecution aborted!!!\n");
break; /* Break from the loop*/
}
// debug_printf_msg("ISO-4 compliant card detected");
}
/* Check if th
...全文
2021 14 打赏 收藏 转发到动态 举报
写回复
用AI写文章
14 条回复
切换为时间正序
请发表友善的回复…
发表回复
觉皇嵌入式 2020-12-21
  • 打赏
  • 举报
回复 1
请问楼主这个问题解决了吗?我现在使用PN5180模块,ISO15693已经调通,ISO14443协议的卡目前能读取到UID,但是验证KEA就是不通过,返回值为2,也就是超时,搞了很长时间,使用NXP官方的库是可以认证通过,我自己写的代码认证不通过,对比官方库也没发现哪里的问题
oBenson123 2019-04-05
  • 打赏
  • 举报
回复
你的流程错了,
qq_40099432 2019-01-16
  • 打赏
  • 举报
回复
Mifare是2类卡,M24SR是4类A卡,卡片遵循卡片的命令格式,直接调用Mifare的库肯定不行 去ST官网下载M24SR的资料,也可以参考ST的reader芯片代码
coolmoonlight 2018-11-18
  • 打赏
  • 举报
回复
能否分享你的代码啊,我始终读写不出来,感觉是密码不对还是怎么回事
yxpm 2018-11-07
  • 打赏
  • 举报
回复
我去,和我遇到的情况一样的,我现在也是只能读到公交卡的UID,怎么读块里数据还在摸索,你这个库函数的DEMO,我也网上看到过。不过663绝对能够读到,我之前用663的15693协议都成功读写到ST的M24LR04这个芯片的所有数据。
coolmoonlight 2018-10-30
  • 打赏
  • 举报
回复
有没有大佬帮忙看看啊
xqhrs232 2018-10-26
  • 打赏
  • 举报
回复
663全协议的芯片,肯定可以读iso1443a协议的卡!!!
coolmoonlight 2018-10-26
  • 打赏
  • 举报
回复
你好,xqhrs232

请问我应该怎么入手做呢,现在伙只能度UID,进不了读写在函数
coolmoonlight 2018-10-25
  • 打赏
  • 举报
回复
大佬们帮忙看看,读卡器和卡支持的协议兼容吗
coolmoonlight 2018-10-25
  • 打赏
  • 举报
回复
你好,
1.reader就是用的NXP的,所以用的NXP的库函数。
2.M24SR64是14443A协议的卡。
3.我想知道NXP的reader到底能不能读ST的14443A的卡。。。。
xqhrs232 2018-10-24
  • 打赏
  • 举报
回复
你这用的是nxp的库函数! ST公司的NFC标签芯片M24SR64这个没玩过,这个一般做出来的是什么卡?
coolmoonlight 2018-10-24
  • 打赏
  • 举报
回复
我现在就是读出来TAG的UID,但是无法匹配密码密钥。不知道RC633对支持的NFC芯片厂家有没有限制。现在读写NXP公司的MIFARE卡没有问题,但是我现在想用的TAG是ST公司的M24SR,读出UID之后始终不能读写。
想问问是不是就算TAG没有密码,也需要进行密码密钥匹配才能进入读写流程啊。我试了不用密码密钥匹配函数,读写函数也执行不了啊。
coolmoonlight 2018-10-24
  • 打赏
  • 举报
回复
HELLO DaLao,



May I ask you a question about how can I shoud use clrc663 to read 14443a tag (m24sr64) by a wireless way?



Now,I can read and write MIFARE tag succesful, but can't do with 14443A tag?



This do sucessful:

status = phpalI14443p3a_ActivateCard(&I14443p3a, NULL, 0x00, bUid, &bLength, bSak, &bMoreCardsAvailable);



This failed:



PH_CHECK_SUCCESS_FCT(status, phKeyStore_SetKey(&Rc663keyStore, 0, 0,PH_KEYSTORE_KEY_TYPE_AES128, &Key[0], 0)); this function return 0x201.



And I find that PH_KEYSTORE_KEY_TYPE_AES128 is not supported by this software lib, in that function the case of "PH_KEYSTORE_KEY_TYPE_AES128" is EMPTY!



Finally, may I ask if the clrc663 can read/write with 14443a tag produced by other company?

And, wether the software lib is complete to support to read/write with 14443a tag?



Tanks a lot,

have a nice day!
coolmoonlight 2018-10-24
  • 打赏
  • 举报
回复
/* Check if there is a Mifare Classic card in the RF field */
else if (0x08 == (*bSak & 0x08))
{
BeepON();
// debug_printf_msg("Mifare Classic card detected");
// debug_printf_msg("\nThe original key is:");
// debug_printf_hex_msg(&Original_Key[0], 6);
// debug_printf_msg("\nThe used key for authentication is:");
// debug_printf_hex_msg(&Key[0], 6);
/* First step for us is to authenticate with the Key at the Mifare
* Classic in the field.
* You need to authenticate at any block of a sector and you
* may get access to all other blocks of the sector.
* For example authenticating at block 5 you will get access to
* the blocks 4, 5, 6, 7.
*/
/* Mifare Classic card, set Key Store */
PH_CHECK_SUCCESS_FCT(status, phKeyStore_SetKey(&Rc663keyStore, 0, 0,PH_KEYSTORE_KEY_TYPE_MIFARE, &Key[0], 0));
// debug_printf_msg("\n**** Set Key Store successful");

/* Mifare Classic card, send authentication for sector 0 */
status = phalMfc_Authenticate(&alMfc, 0, PHHAL_HW_MFC_KEYA, 0, 0, bUid, bLength);
if(status)
{
// debug_printf_msg("\n!!! Authentication was not successful.\n"
// "!!! Please correct the key at line 86.");
// debug_printf_msg("\n/****** Abort of execution ******/");
continue;
}
// debug_printf_msg("\n**** Authentication successful");

/* Mifare Classic card, send authentication - alternative way */
// PH_CHECK_SUCCESS_FCT(status, phpalMifare_MfcAuthenticate(&palMifare,
// 0, PHHAL_HW_MFC_KEYA, Key, bUid));

/* Check the UID of the Classic card in the field */
PH_CHECK_SUCCESS_FCT(status, phalMfc_Read(&alMfc, 0,&bBufferReader[0]));

/*
* We need this #ifdefs because we would get errors when compiling
* for Release configuration.
*/
// #ifdef DEBUG
// debug_printf_msg("\nThe UID is:");

if(bLength == 0x04)
{
// debug_printf_hex_msg(&bBufferReader[0], 4);

// debug_printf_msg("\nThe Check Byte for the UID is:");
// debug_printf_hex_msg(&bBufferReader[4], 1);
}
else if(bLength == 0x07)
{
// debug_printf_hex_msg(&bBufferReader[0], 7);
//
// debug_printf_msg("\nThe Check Byte for the UID is:");
// debug_printf_hex_msg(&bBufferReader[7], 1);
}
else
{
// debug_printf("\nLength of the UID not supported.");
}

// #endif
/* Mifare Classic card, send authentication for sector 1 */
PH_CHECK_SUCCESS_FCT(status, phalMfc_Authenticate(&alMfc, 6,PHHAL_HW_MFC_KEYA, 0, 0, bUid, bLength));

/* fill block with data */
Fill_Block(bBufferReader, 15);

/* Write data @ block 4 */
PH_CHECK_SUCCESS_FCT(status, phalMfc_Write(&alMfc, 4, Win));//写
// debug_printf_msg("\nWrite successful 16 bytes");

/* Empty the bBufferReader */
memset(bBufferReader, '\0', 0x60);

/* Read the just written data.
* In one reading action we always get the whole Block.
*/
// debug_printf_msg("\nReading the just written 16 bytes");
PH_CHECK_SUCCESS_FCT(status, phalMfc_Read(&alMfc, 4, Rout));//读
while(1);

#ifdef DEBUG
int i;
// debug_printf_msg("\nThe content of Block 4 is:");
for (i=0; i < 4; i++)
{
// debug_printf_hex_msg(&bBufferReader[i*4], 4);
// debug_printf_msg("-----Cut-----\n");
}
#endif
}
/* The last possibility is a Mifare UltraLight card */
else
{
// debug_printf_msg("Mifare UltraLight card detected");
}
// GPIOSetValue( LED_PORT, LED_BIT, LED_OFF );
}
else
{
// debug_printf_msg("No card detected");
}
}
}

27,375

社区成员

发帖
与我相关
我的任务
社区描述
硬件/嵌入开发 单片机/工控
社区管理员
  • 单片机/工控社区
加入社区
  • 近7日
  • 近30日
  • 至今
社区公告
暂无公告

试试用AI创作助手写篇文章吧