2009-04-29 14:51:13 +02:00
|
|
|
/*
|
|
|
|
|
|
|
|
Public platform independent Near Field Communication (NFC) library
|
|
|
|
Copyright (C) 2009, Roel Verdult
|
|
|
|
|
|
|
|
This program is free software: you can redistribute it and/or modify
|
2009-06-26 11:05:25 +02:00
|
|
|
it under the terms of the GNU Lesser General Public License as published by
|
2009-04-29 14:51:13 +02:00
|
|
|
the Free Software Foundation, either version 3 of the License, or
|
|
|
|
(at your option) any later version.
|
|
|
|
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
GNU General Public License for more details.
|
|
|
|
|
2009-06-26 11:05:25 +02:00
|
|
|
You should have received a copy of the GNU Lesser General Public License
|
|
|
|
along with this program. If not, see <http://www.gnu.org/licenses/>
|
2009-04-29 14:51:13 +02:00
|
|
|
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <stdlib.h>
|
2009-05-27 12:13:19 +02:00
|
|
|
#include <stdint.h>
|
2009-05-27 14:18:21 +02:00
|
|
|
#include <stddef.h>
|
2009-05-27 16:05:07 +02:00
|
|
|
#include <stdbool.h>
|
2009-05-27 14:18:21 +02:00
|
|
|
|
2009-04-29 14:51:13 +02:00
|
|
|
#include <string.h>
|
|
|
|
#include <ctype.h>
|
|
|
|
|
|
|
|
#include "libnfc.h"
|
|
|
|
#include "mifaretag.h"
|
|
|
|
|
|
|
|
static dev_info* pdi;
|
|
|
|
static tag_info ti;
|
|
|
|
static mifare_param mp;
|
|
|
|
static mifare_tag mtKeys;
|
|
|
|
static mifare_tag mtDump;
|
|
|
|
static bool bUseKeyA;
|
2009-10-05 14:47:00 +02:00
|
|
|
static bool bUseKeyFile;
|
2009-05-27 12:13:19 +02:00
|
|
|
static uint32_t uiBlocks;
|
2009-10-05 14:47:00 +02:00
|
|
|
static byte_t keys[] = {
|
|
|
|
0xFF,0xFF,0xFF,0xFF,0xFF,0xFF,
|
|
|
|
0xd3,0xf7,0xd3,0xf7,0xd3,0xf7,
|
|
|
|
0xa0,0xa1,0xa2,0xa3,0xa4,0xa5,
|
|
|
|
0xb0,0xb1,0xb2,0xb3,0xb4,0xb5,
|
|
|
|
0x4d,0x3a,0x99,0xc3,0x51,0xdd,
|
|
|
|
0x1a,0x98,0x2c,0x7e,0x45,0x9a,
|
|
|
|
0xaa,0xbb,0xcc,0xdd,0xee,0xff,
|
|
|
|
0x00,0x00,0x00,0x00,0x00,0x00
|
|
|
|
};
|
|
|
|
static size_t num_keys = sizeof(keys) / 6;
|
2009-04-29 14:51:13 +02:00
|
|
|
|
2009-05-27 12:13:19 +02:00
|
|
|
bool is_first_block(uint32_t uiBlock)
|
2009-04-29 14:51:13 +02:00
|
|
|
{
|
|
|
|
// Test if we are in the small or big sectors
|
|
|
|
if (uiBlock < 128) return ((uiBlock)%4 == 0); else return ((uiBlock)%16 == 0);
|
|
|
|
}
|
|
|
|
|
2009-05-27 12:13:19 +02:00
|
|
|
bool is_trailer_block(uint32_t uiBlock)
|
2009-04-29 14:51:13 +02:00
|
|
|
{
|
|
|
|
// Test if we are in the small or big sectors
|
|
|
|
if (uiBlock < 128) return ((uiBlock+1)%4 == 0); else return ((uiBlock+1)%16 == 0);
|
|
|
|
}
|
|
|
|
|
2009-05-27 12:13:19 +02:00
|
|
|
uint32_t get_trailer_block(uint32_t uiFirstBlock)
|
2009-04-29 14:51:13 +02:00
|
|
|
{
|
|
|
|
// Test if we are in the small or big sectors
|
|
|
|
if (uiFirstBlock<128) return uiFirstBlock+3; else return uiFirstBlock+15;
|
|
|
|
}
|
|
|
|
|
2009-10-05 14:47:00 +02:00
|
|
|
bool authenticate(uint32_t uiBlock)
|
|
|
|
{
|
|
|
|
mifare_cmd mc;
|
|
|
|
uint32_t uiTrailerBlock;
|
|
|
|
size_t key_index;
|
|
|
|
|
|
|
|
// Key file authentication.
|
|
|
|
if (bUseKeyFile)
|
|
|
|
{
|
|
|
|
// Set the authentication information (uid)
|
|
|
|
memcpy(mp.mpa.abtUid,ti.tia.abtUid,4);
|
|
|
|
|
|
|
|
// Locate the trailer (with the keys) used for this sector
|
|
|
|
uiTrailerBlock = get_trailer_block(uiBlock);
|
|
|
|
|
|
|
|
// Determin if we should use the a or the b key
|
|
|
|
if (bUseKeyA)
|
|
|
|
{
|
|
|
|
mc = MC_AUTH_A;
|
|
|
|
memcpy(mp.mpa.abtKey,mtKeys.amb[uiTrailerBlock].mbt.abtKeyA,6);
|
|
|
|
} else {
|
|
|
|
mc = MC_AUTH_B;
|
|
|
|
memcpy(mp.mpa.abtKey,mtKeys.amb[uiTrailerBlock].mbt.abtKeyB,6);
|
|
|
|
}
|
|
|
|
|
|
|
|
// Try to authenticate for the current sector
|
|
|
|
if (nfc_initiator_mifare_cmd(pdi,mc,uiBlock,&mp))
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Auto authentication.
|
|
|
|
else
|
|
|
|
{
|
|
|
|
// Determin if we should use the a or the b key
|
|
|
|
mc = (bUseKeyA) ? MC_AUTH_A : MC_AUTH_B;
|
|
|
|
|
|
|
|
// Set the authentication information (uid)
|
|
|
|
memcpy(mp.mpa.abtUid,ti.tia.abtUid,4);
|
|
|
|
|
|
|
|
for (key_index = 0; key_index < num_keys; key_index++)
|
|
|
|
{
|
|
|
|
memcpy(mp.mpa.abtKey, keys + (key_index*6), 6);
|
|
|
|
if (nfc_initiator_mifare_cmd(pdi, mc, uiBlock, &mp))
|
|
|
|
{
|
|
|
|
/**
|
|
|
|
* @note: what about the other key?
|
|
|
|
*/
|
|
|
|
if (bUseKeyA)
|
|
|
|
memcpy(mtKeys.amb[uiBlock].mbt.abtKeyA,&mp.mpa.abtKey,6);
|
|
|
|
else
|
|
|
|
memcpy(mtKeys.amb[uiBlock].mbt.abtKeyB,&mp.mpa.abtKey,6);
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
nfc_initiator_select_tag(pdi, IM_ISO14443A_106, mp.mpa.abtUid, 4, NULL);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2009-04-29 14:51:13 +02:00
|
|
|
bool read_card()
|
|
|
|
{
|
2009-05-27 12:13:19 +02:00
|
|
|
int32_t iBlock;
|
2009-04-29 14:51:13 +02:00
|
|
|
bool bFailure = false;
|
|
|
|
|
|
|
|
printf("Reading out %d blocks |",uiBlocks+1);
|
|
|
|
|
|
|
|
// Read the card from end to begin
|
|
|
|
for (iBlock=uiBlocks; iBlock>=0; iBlock--)
|
|
|
|
{
|
|
|
|
// Authenticate everytime we reach a trailer block
|
|
|
|
if (is_trailer_block(iBlock))
|
|
|
|
{
|
|
|
|
// Show if the readout went well
|
|
|
|
if (bFailure)
|
|
|
|
{
|
|
|
|
printf("x");
|
|
|
|
// When a failure occured we need to redo the anti-collision
|
2009-07-23 12:24:04 +02:00
|
|
|
if (!nfc_initiator_select_tag(pdi,IM_ISO14443A_106,NULL,0,&ti))
|
2009-04-29 14:51:13 +02:00
|
|
|
{
|
|
|
|
printf("!\nError: tag was removed\n");
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
bFailure = false;
|
|
|
|
} else {
|
|
|
|
// Skip this the first time, bFailure it means nothing (yet)
|
|
|
|
if (iBlock != uiBlocks)
|
|
|
|
{
|
|
|
|
printf(".");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
fflush(stdout);
|
2009-10-05 14:47:00 +02:00
|
|
|
|
2009-04-29 14:51:13 +02:00
|
|
|
// Try to authenticate for the current sector
|
2009-10-05 14:47:00 +02:00
|
|
|
if (!authenticate(iBlock))
|
2009-04-29 14:51:13 +02:00
|
|
|
{
|
|
|
|
printf("!\nError: authentication failed for block %02x\n",iBlock);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Try to read out the trailer
|
2009-07-23 12:24:04 +02:00
|
|
|
if (nfc_initiator_mifare_cmd(pdi,MC_READ,iBlock,&mp))
|
2009-04-29 14:51:13 +02:00
|
|
|
{
|
|
|
|
// Copy the keys over from our key dump and store the retrieved access bits
|
|
|
|
memcpy(mtDump.amb[iBlock].mbt.abtKeyA,mtKeys.amb[iBlock].mbt.abtKeyA,6);
|
|
|
|
memcpy(mtDump.amb[iBlock].mbt.abtAccessBits,mp.mpd.abtData+6,4);
|
|
|
|
memcpy(mtDump.amb[iBlock].mbt.abtKeyB,mtKeys.amb[iBlock].mbt.abtKeyB,6);
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
// Make sure a earlier readout did not fail
|
|
|
|
if (!bFailure)
|
|
|
|
{
|
|
|
|
// Try to read out the data block
|
2009-07-23 12:24:04 +02:00
|
|
|
if (nfc_initiator_mifare_cmd(pdi,MC_READ,iBlock,&mp))
|
2009-04-29 14:51:13 +02:00
|
|
|
{
|
|
|
|
memcpy(mtDump.amb[iBlock].mbd.abtData,mp.mpd.abtData,16);
|
|
|
|
} else {
|
|
|
|
bFailure = true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
printf("%c|\n",(bFailure)?'x':'.');
|
|
|
|
fflush(stdout);
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool write_card()
|
|
|
|
{
|
2009-05-27 12:13:19 +02:00
|
|
|
uint32_t uiBlock;
|
2009-04-29 14:51:13 +02:00
|
|
|
bool bFailure = false;
|
|
|
|
|
|
|
|
printf("Writing %d blocks |",uiBlocks+1);
|
|
|
|
|
|
|
|
// Write the card from begin to end;
|
|
|
|
for (uiBlock=0; uiBlock<=uiBlocks; uiBlock++)
|
|
|
|
{
|
|
|
|
// Authenticate everytime we reach the first sector of a new block
|
|
|
|
if (is_first_block(uiBlock))
|
|
|
|
{
|
|
|
|
// Show if the readout went well
|
|
|
|
if (bFailure)
|
|
|
|
{
|
|
|
|
printf("x");
|
|
|
|
// When a failure occured we need to redo the anti-collision
|
2009-07-23 12:24:04 +02:00
|
|
|
if (!nfc_initiator_select_tag(pdi,IM_ISO14443A_106,NULL,0,&ti))
|
2009-04-29 14:51:13 +02:00
|
|
|
{
|
|
|
|
printf("!\nError: tag was removed\n");
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
bFailure = false;
|
|
|
|
} else {
|
|
|
|
// Skip this the first time, bFailure it means nothing (yet)
|
|
|
|
if (uiBlock != 0)
|
|
|
|
{
|
|
|
|
printf(".");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
fflush(stdout);
|
|
|
|
|
|
|
|
// Try to authenticate for the current sector
|
2009-10-05 14:47:00 +02:00
|
|
|
if (!authenticate(uiBlock))
|
2009-04-29 14:51:13 +02:00
|
|
|
{
|
|
|
|
printf("!\nError: authentication failed for block %02x\n",uiBlock);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
2009-10-02 11:52:02 +02:00
|
|
|
|
2009-04-29 14:51:13 +02:00
|
|
|
if (is_trailer_block(uiBlock))
|
|
|
|
{
|
|
|
|
// Copy the keys over from our key dump and store the retrieved access bits
|
|
|
|
memcpy(mp.mpd.abtData,mtDump.amb[uiBlock].mbt.abtKeyA,6);
|
|
|
|
memcpy(mp.mpd.abtData+6,mtDump.amb[uiBlock].mbt.abtAccessBits,4);
|
|
|
|
memcpy(mp.mpd.abtData+10,mtDump.amb[uiBlock].mbt.abtKeyB,6);
|
|
|
|
|
|
|
|
// Try to write the trailer
|
2009-07-23 12:24:04 +02:00
|
|
|
nfc_initiator_mifare_cmd(pdi,MC_WRITE,uiBlock,&mp);
|
2009-10-02 11:52:02 +02:00
|
|
|
|
2009-04-29 14:51:13 +02:00
|
|
|
} else {
|
|
|
|
|
|
|
|
// The first block 0x00 is read only, skip this
|
|
|
|
if (uiBlock == 0) continue;
|
|
|
|
|
|
|
|
// Make sure a earlier write did not fail
|
|
|
|
if (!bFailure)
|
|
|
|
{
|
|
|
|
// Try to write the data block
|
|
|
|
memcpy(mp.mpd.abtData,mtDump.amb[uiBlock].mbd.abtData,16);
|
2009-07-23 12:24:04 +02:00
|
|
|
if (!nfc_initiator_mifare_cmd(pdi,MC_WRITE,uiBlock,&mp)) bFailure = true;
|
2009-04-29 14:51:13 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
printf("%c|\n",(bFailure)?'x':'.');
|
|
|
|
fflush(stdout);
|
2009-10-02 11:52:02 +02:00
|
|
|
|
2009-04-29 14:51:13 +02:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
int main(int argc, const char* argv[])
|
2009-10-02 11:52:02 +02:00
|
|
|
{
|
2009-04-29 14:51:13 +02:00
|
|
|
bool b4K;
|
|
|
|
bool bReadAction;
|
2009-07-16 14:09:06 +02:00
|
|
|
byte_t* pbtUID;
|
2009-10-05 14:47:00 +02:00
|
|
|
FILE* pfKeys = NULL;
|
|
|
|
FILE* pfDump = NULL;
|
2009-04-29 14:51:13 +02:00
|
|
|
|
2009-10-05 14:47:00 +02:00
|
|
|
if (argc < 4)
|
2009-04-29 14:51:13 +02:00
|
|
|
{
|
|
|
|
printf("\n");
|
2009-10-05 17:01:08 +02:00
|
|
|
printf("%s r|w a|b <dump.mfd> [<keys.mfd>]\n", argv[0]);
|
2009-04-29 14:51:13 +02:00
|
|
|
printf("\n");
|
2009-10-05 17:01:08 +02:00
|
|
|
printf("r|w - Perform read from (r) or write to (w) card\n");
|
|
|
|
printf("a|b - Use A or B keys for action\n");
|
|
|
|
printf("<dump.mfd> - MiFare Dump (MFD) used to write (card to MFD) or (MFD to card)\n");
|
|
|
|
printf("<keys.mfd> - MiFare Dump (MFD) that contain the keys (optional)\n");
|
2009-04-29 14:51:13 +02:00
|
|
|
printf("\n");
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
printf("\nChecking arguments and settings\n");
|
|
|
|
|
|
|
|
bReadAction = (tolower(*(argv[1])) == 'r');
|
|
|
|
bUseKeyA = (tolower(*(argv[2])) == 'a');
|
2009-10-05 14:47:00 +02:00
|
|
|
bUseKeyFile = (argc > 4);
|
2009-04-29 14:51:13 +02:00
|
|
|
|
2009-10-05 14:47:00 +02:00
|
|
|
if (bUseKeyFile)
|
2009-04-29 14:51:13 +02:00
|
|
|
{
|
2009-10-05 14:47:00 +02:00
|
|
|
pfKeys = fopen(argv[4],"rb");
|
|
|
|
if (pfKeys == NULL)
|
|
|
|
{
|
|
|
|
printf("Could not open file: %s\n",argv[3]);
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
if (fread(&mtKeys,1,sizeof(mtKeys),pfKeys) != sizeof(mtKeys))
|
|
|
|
{
|
|
|
|
printf("Could not read from keys file: %s\n",argv[4]);
|
|
|
|
fclose(pfKeys);
|
|
|
|
return 1;
|
|
|
|
}
|
2009-04-29 14:51:13 +02:00
|
|
|
fclose(pfKeys);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (bReadAction)
|
|
|
|
{
|
|
|
|
memset(&mtDump,0x00,sizeof(mtDump));
|
|
|
|
} else {
|
2009-10-05 14:47:00 +02:00
|
|
|
pfDump = fopen(argv[3],"rb");
|
2009-04-29 14:51:13 +02:00
|
|
|
|
2009-05-27 14:18:21 +02:00
|
|
|
if (pfDump == NULL)
|
2009-04-29 14:51:13 +02:00
|
|
|
{
|
2009-10-05 14:47:00 +02:00
|
|
|
printf("Could not open dump file: %s\n",argv[3]);
|
2009-04-29 14:51:13 +02:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (fread(&mtDump,1,sizeof(mtDump),pfDump) != sizeof(mtDump))
|
|
|
|
{
|
2009-10-05 14:47:00 +02:00
|
|
|
printf("Could not read from dump file: %s\n",argv[3]);
|
2009-04-29 14:51:13 +02:00
|
|
|
fclose(pfDump);
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
fclose(pfDump);
|
|
|
|
}
|
|
|
|
printf("Succesful opened MIFARE the required files\n");
|
|
|
|
|
|
|
|
// Try to open the NFC reader
|
2009-09-04 15:24:34 +02:00
|
|
|
pdi = nfc_connect(NULL);
|
2009-04-29 14:51:13 +02:00
|
|
|
if (pdi == INVALID_DEVICE_INFO)
|
|
|
|
{
|
|
|
|
printf("Error connecting NFC reader\n");
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2009-07-23 12:24:04 +02:00
|
|
|
nfc_initiator_init(pdi);
|
2009-04-29 14:51:13 +02:00
|
|
|
|
|
|
|
// Drop the field for a while
|
|
|
|
nfc_configure(pdi,DCO_ACTIVATE_FIELD,false);
|
2009-10-02 11:52:02 +02:00
|
|
|
|
2009-04-29 14:51:13 +02:00
|
|
|
// Let the reader only try once to find a tag
|
|
|
|
nfc_configure(pdi,DCO_INFINITE_SELECT,false);
|
|
|
|
nfc_configure(pdi,DCO_HANDLE_CRC,true);
|
|
|
|
nfc_configure(pdi,DCO_HANDLE_PARITY,true);
|
|
|
|
|
|
|
|
// Enable field so more power consuming cards can power themselves up
|
|
|
|
nfc_configure(pdi,DCO_ACTIVATE_FIELD,true);
|
|
|
|
|
|
|
|
printf("Connected to NFC reader: %s\n",pdi->acName);
|
|
|
|
|
|
|
|
// Try to find a MIFARE Classic tag
|
2009-07-23 12:24:04 +02:00
|
|
|
if (!nfc_initiator_select_tag(pdi,IM_ISO14443A_106,NULL,0,&ti))
|
2009-04-29 14:51:13 +02:00
|
|
|
{
|
|
|
|
printf("Error: no tag was found\n");
|
|
|
|
nfc_disconnect(pdi);
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Test if we are dealing with a MIFARE compatible tag
|
|
|
|
if ((ti.tia.btSak & 0x08) == 0)
|
|
|
|
{
|
|
|
|
printf("Error: tag is not a MIFARE Classic card\n");
|
|
|
|
nfc_disconnect(pdi);
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2009-10-05 14:47:00 +02:00
|
|
|
if (bUseKeyFile)
|
2009-04-29 14:51:13 +02:00
|
|
|
{
|
2009-10-05 14:47:00 +02:00
|
|
|
// Get the info from the key dump
|
|
|
|
b4K = (mtKeys.amb[0].mbm.abtATQA[1] == 0x02);
|
|
|
|
pbtUID = mtKeys.amb[0].mbm.abtUID;
|
|
|
|
|
|
|
|
// Compare if key dump UID is the same as the current tag UID
|
|
|
|
if (memcmp(ti.tia.abtUid,pbtUID,4) != 0)
|
|
|
|
{
|
|
|
|
printf("Expected MIFARE Classic %cK card with uid: %08x\n",b4K?'4':'1',swap_endian32(pbtUID));
|
|
|
|
}
|
2009-04-29 14:51:13 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// Get the info from the current tag
|
|
|
|
pbtUID = ti.tia.abtUid;
|
|
|
|
b4K = (ti.tia.abtAtqa[1] == 0x02);
|
|
|
|
printf("Found MIFARE Classic %cK card with uid: %08x\n",b4K?'4':'1',swap_endian32(pbtUID));
|
|
|
|
|
|
|
|
uiBlocks = (b4K)?0xff:0x3f;
|
|
|
|
|
|
|
|
if (bReadAction)
|
|
|
|
{
|
|
|
|
if (read_card())
|
|
|
|
{
|
2009-10-05 14:47:00 +02:00
|
|
|
printf("Writing data to file: %s\n",argv[3]);
|
2009-04-29 14:51:13 +02:00
|
|
|
fflush(stdout);
|
2009-10-05 14:47:00 +02:00
|
|
|
pfDump = fopen(argv[3],"wb");
|
2009-04-29 14:51:13 +02:00
|
|
|
if (fwrite(&mtDump,1,sizeof(mtDump),pfDump) != sizeof(mtDump))
|
|
|
|
{
|
2009-10-05 14:47:00 +02:00
|
|
|
printf("Could not write to file: %s\n",argv[3]);
|
2009-04-29 14:51:13 +02:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
fclose(pfDump);
|
|
|
|
printf("Done, all bytes dumped to file!\n");
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
if (write_card())
|
|
|
|
{
|
|
|
|
printf("Done, all data is written to the card!\n");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
nfc_disconnect(pdi);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
2009-10-05 17:01:08 +02:00
|
|
|
|