Permalink
Browse files

Now with more examples!

  • Loading branch information...
ladyada committed Feb 1, 2012
1 parent 3dab651 commit 18d7144b476dc9e7444056771af967997f910d31
View
744 PN532.cpp

Large diffs are not rendered by default.

Oops, something went wrong.
View
171 PN532.h
@@ -1,49 +1,162 @@
-// PN532 library by adafruit/ladyada
-// MIT license
+/**************************************************************************/
+/*!
+ @file PN532.h
+ @author Adafruit Industries
+ @license BSD (see license.txt)
+
+ @section HISTORY
-#if ARDUINO >= 100
- #include "Arduino.h"
-#else
- #include "WProgram.h"
-#endif
+ v1.1 - Added full command list
+ - Added 'verbose' mode flag to constructor to toggle debug output
+ - Changed readPassiveTargetID() to return variable length values
+
+*/
+/**************************************************************************/
-#define PN532_PREAMBLE 0x00
-#define PN532_STARTCODE1 0x00
-#define PN532_STARTCODE2 0xFF
-#define PN532_POSTAMBLE 0x00
+#include <WProgram.h>
-#define PN532_HOSTTOPN532 0xD4
+#define PN532_PREAMBLE (0x00)
+#define PN532_STARTCODE1 (0x00)
+#define PN532_STARTCODE2 (0xFF)
+#define PN532_POSTAMBLE (0x00)
-#define PN532_FIRMWAREVERSION 0x02
-#define PN532_GETGENERALSTATUS 0x04
-#define PN532_SAMCONFIGURATION 0x14
-#define PN532_INLISTPASSIVETARGET 0x4A
-#define PN532_WAKEUP 0x55
+#define PN532_HOSTTOPN532 (0xD4)
+// PN532 Commands
+#define PN532_COMMAND_DIAGNOSE (0x00)
+#define PN532_COMMAND_GETFIRMWAREVERSION (0x02)
+#define PN532_COMMAND_GETGENERALSTATUS (0x04)
+#define PN532_COMMAND_READREGISTER (0x06)
+#define PN532_COMMAND_WRITEREGISTER (0x08)
+#define PN532_COMMAND_READGPIO (0x0C)
+#define PN532_COMMAND_WRITEGPIO (0x0E)
+#define PN532_COMMAND_SETSERIALBAUDRATE (0x10)
+#define PN532_COMMAND_SETPARAMETERS (0x12)
+#define PN532_COMMAND_SAMCONFIGURATION (0x14)
+#define PN532_COMMAND_POWERDOWN (0x16)
+#define PN532_COMMAND_RFCONFIGURATION (0x32)
+#define PN532_COMMAND_RFREGULATIONTEST (0x58)
+#define PN532_COMMAND_INJUMPFORDEP (0x56)
+#define PN532_COMMAND_INJUMPFORPSL (0x46)
+#define PN532_COMMAND_INLISTPASSIVETARGET (0x4A)
+#define PN532_COMMAND_INATR (0x50)
+#define PN532_COMMAND_INPSL (0x4E)
+#define PN532_COMMAND_INDATAEXCHANGE (0x40)
+#define PN532_COMMAND_INCOMMUNICATETHRU (0x42)
+#define PN532_COMMAND_INDESELECT (0x44)
+#define PN532_COMMAND_INRELEASE (0x52)
+#define PN532_COMMAND_INSELECT (0x54)
+#define PN532_COMMAND_INAUTOPOLL (0x60)
+#define PN532_COMMAND_TGINITASTARGET (0x8C)
+#define PN532_COMMAND_TGSETGENERALBYTES (0x92)
+#define PN532_COMMAND_TGGETDATA (0x86)
+#define PN532_COMMAND_TGSETDATA (0x8E)
+#define PN532_COMMAND_TGSETMETADATA (0x94)
+#define PN532_COMMAND_TGGETINITIATORCOMMAND (0x88)
+#define PN532_COMMAND_TGRESPONSETOINITIATOR (0x90)
+#define PN532_COMMAND_TGGETTARGETSTATUS (0x8A)
-#define PN532_SPI_STATREAD 0x02
-#define PN532_SPI_DATAWRITE 0x01
-#define PN532_SPI_DATAREAD 0x03
-#define PN532_SPI_READY 0x01
+#define PN532_WAKEUP (0x55)
-#define PN532_MIFARE_ISO14443A 0x0
+#define PN532_SPI_STATREAD (0x02)
+#define PN532_SPI_DATAWRITE (0x01)
+#define PN532_SPI_DATAREAD (0x03)
+#define PN532_SPI_READY (0x01)
+
+#define PN532_MIFARE_ISO14443A (0x00)
+
+// Mifare Commands
+#define MIFARE_CMD_AUTH_A (0x60)
+#define MIFARE_CMD_AUTH_B (0x61)
+#define MIFARE_CMD_READ (0x30)
+#define MIFARE_CMD_WRITE (0xA0)
+#define MIFARE_CMD_TRANSFER (0xB0)
+#define MIFARE_CMD_DECREMENT (0xC0)
+#define MIFARE_CMD_INCREMENT (0xC1)
+#define MIFARE_CMD_STORE (0xC2)
+
+// Prefixes for NDEF Records (to identify record type)
+#define NDEF_URIPREFIX_NONE (0x00)
+#define NDEF_URIPREFIX_HTTP_WWWDOT (0x01)
+#define NDEF_URIPREFIX_HTTPS_WWWDOT (0x02)
+#define NDEF_URIPREFIX_HTTP (0x03)
+#define NDEF_URIPREFIX_HTTPS (0x04)
+#define NDEF_URIPREFIX_TEL (0x05)
+#define NDEF_URIPREFIX_MAILTO (0x06)
+#define NDEF_URIPREFIX_FTP_ANONAT (0x07)
+#define NDEF_URIPREFIX_FTP_FTPDOT (0x08)
+#define NDEF_URIPREFIX_FTPS (0x09)
+#define NDEF_URIPREFIX_SFTP (0x0A)
+#define NDEF_URIPREFIX_SMB (0x0B)
+#define NDEF_URIPREFIX_NFS (0x0C)
+#define NDEF_URIPREFIX_FTP (0x0D)
+#define NDEF_URIPREFIX_DAV (0x0E)
+#define NDEF_URIPREFIX_NEWS (0x0F)
+#define NDEF_URIPREFIX_TELNET (0x10)
+#define NDEF_URIPREFIX_IMAP (0x11)
+#define NDEF_URIPREFIX_RTSP (0x12)
+#define NDEF_URIPREFIX_URN (0x13)
+#define NDEF_URIPREFIX_POP (0x14)
+#define NDEF_URIPREFIX_SIP (0x15)
+#define NDEF_URIPREFIX_SIPS (0x16)
+#define NDEF_URIPREFIX_TFTP (0x17)
+#define NDEF_URIPREFIX_BTSPP (0x18)
+#define NDEF_URIPREFIX_BTL2CAP (0x19)
+#define NDEF_URIPREFIX_BTGOEP (0x1A)
+#define NDEF_URIPREFIX_TCPOBEX (0x1B)
+#define NDEF_URIPREFIX_IRDAOBEX (0x1C)
+#define NDEF_URIPREFIX_FILE (0x1D)
+#define NDEF_URIPREFIX_URN_EPC_ID (0x1E)
+#define NDEF_URIPREFIX_URN_EPC_TAG (0x1F)
+#define NDEF_URIPREFIX_URN_EPC_PAT (0x20)
+#define NDEF_URIPREFIX_URN_EPC_RAW (0x21)
+#define NDEF_URIPREFIX_URN_EPC (0x22)
+#define NDEF_URIPREFIX_URN_NFC (0x23)
+
+#define PN532_GPIO_VALIDATIONBIT (0x80)
+#define PN532_GPIO_P30 (0)
+#define PN532_GPIO_P31 (1)
+#define PN532_GPIO_P32 (2)
+#define PN532_GPIO_P33 (3)
+#define PN532_GPIO_P34 (4)
+#define PN532_GPIO_P35 (5)
class PN532{
public:
PN532(uint8_t cs, uint8_t clk, uint8_t mosi, uint8_t miso);
-
void begin(void);
-
+
+ // Generic PN532 functions
boolean SAMConfig(void);
uint32_t getFirmwareVersion(void);
- uint32_t readPassiveTargetID(uint8_t cardbaudrate);
-
- boolean sendCommandCheckAck(uint8_t *cmd, uint8_t cmdlen, uint16_t timeout = 1000);
-
- //
+ boolean sendCommandCheckAck(uint8_t *cmd, uint8_t cmdlen, uint16_t timeout = 1000);
+ boolean writeGPIO(uint8_t pinstate);
+ uint8_t readGPIO(void);
+
+ // ISO14443A functions
+ boolean readPassiveTargetID(uint8_t cardbaudrate, uint8_t * uid, uint8_t * uidLength);
+
+ // Mifare Classic functions
+ bool mifareclassic_IsFirstBlock (uint32_t uiBlock);
+ bool mifareclassic_IsTrailerBlock (uint32_t uiBlock);
+ uint8_t mifareclassic_AuthenticateBlock (uint8_t * uid, uint8_t uidLen, uint32_t blockNumber, uint8_t keyNumber, uint8_t * keyData);
+ uint8_t mifareclassic_ReadDataBlock (uint8_t blockNumber, uint8_t * data);
+ uint8_t mifareclassic_WriteDataBlock (uint8_t blockNumber, uint8_t * data);
+ uint8_t mifareclassic_FormatNDEF (void);
+ uint8_t mifareclassic_WriteNDEFURI (uint8_t sectorNumber, uint8_t uriIdentifier, const char * url);
+
+ // Mifare Ultralight functions
+ uint8_t mifareultralight_ReadPage (uint8_t page, uint8_t * buffer);
+
+ // Help functions to display formatted text
+ static void PrintHex(const byte * data, const uint32_t numBytes);
+ static void PrintHexChar(const byte * pbtData, const uint32_t numBytes);
private:
uint8_t _ss, _clk, _mosi, _miso;
+ uint8_t _uid[7]; // ISO14443A uid
+ uint8_t _uidLen; // uid len
+ uint8_t _key[6]; // Mifare Classic key
boolean spi_readack();
uint8_t readspistatus(void);
@@ -0,0 +1,71 @@
+/**************************************************************************/
+/*!
+ @file iso14443a_uid.pde
+ @author Adafruit Industries
+ @license BSD (see license.txt)
+
+ This example will attempt to connect to an ISO14443A
+ card or tag and retrieve some basic information about it
+ that can be used to determine what type of card it is.
+
+ Note that you need the baud rate to be 115200 because we need to print
+ out the data and read from the card at the same time!
+*/
+/**************************************************************************/
+
+#include <PN532.h>
+
+#define SCK (2)
+#define MOSI (3)
+#define SS (4)
+#define MISO (5)
+
+PN532 nfc(SCK, MISO, MOSI, SS);
+
+void setup(void) {
+ Serial.begin(115200);
+ Serial.println("Hello!");
+
+ nfc.begin();
+
+ uint32_t versiondata = nfc.getFirmwareVersion();
+ if (! versiondata) {
+ Serial.print("Didn't find PN53x board");
+ while (1); // halt
+ }
+
+ // Got ok data, print it out!
+ Serial.print("Found chip PN5"); Serial.println((versiondata>>24) & 0xFF, HEX);
+ Serial.print("Firmware ver. "); Serial.print((versiondata>>16) & 0xFF, DEC);
+ Serial.print('.'); Serial.println((versiondata>>8) & 0xFF, DEC);
+
+ // configure board to read RFID tags
+ nfc.SAMConfig();
+
+ Serial.println("Waiting for an ISO14443A card");
+}
+
+
+void loop(void) {
+ boolean success;
+ uint8_t uid[] = { 0, 0, 0, 0, 0, 0, 0 }; // Buffer to store the returned UID
+ uint8_t uidLength; // Length of the UID (4 or 7 bytes depending on ISO14443A card type)
+
+ // Wait for an ISO14443A type cards (Mifare, etc.). When one is found
+ // 'uid' will be populated with the UID, and uidLength will indicate
+ // if the uid is 4 bytes (Mifare Classic) or 7 bytes (Mifare Ultralight)
+ success = nfc.readPassiveTargetID(PN532_MIFARE_ISO14443A, &uid[0], &uidLength);
+
+ if (success) {
+ Serial.println("Found a card!");
+ Serial.print("UID Length: ");Serial.print(uidLength, DEC);Serial.println(" bytes");
+ Serial.print("UID Value: ");
+ for (uint8_t i=0; i < uidLength; i++)
+ {
+ Serial.print(" 0x");Serial.print(uid[i], HEX);
+ }
+ Serial.println("");
+ // Wait 1 second before continuing
+ delay(1000);
+ }
+}
Oops, something went wrong.

0 comments on commit 18d7144

Please sign in to comment.