]> git.zerfleddert.de Git - proxmark3-svn/blame - armsrc/mifareutil.h
Check keys in hf mf nested and hf mf chk (#414)
[proxmark3-svn] / armsrc / mifareutil.h
CommitLineData
20f9a2a1
M
1//-----------------------------------------------------------------------------\r
2// Merlok, May 2011\r
3// Many authors, that makes it possible\r
4//\r
5// This code is licensed to you under the terms of the GNU GPL, version 2 or,\r
6// at your option, any later version. See the LICENSE.txt file for the text of\r
7// the license.\r
8//-----------------------------------------------------------------------------\r
9// code for work with mifare cards.\r
10//-----------------------------------------------------------------------------\r
9ca155ba 11\r
f397b5cc
M
12#ifndef __MIFAREUTIL_H\r
13#define __MIFAREUTIL_H\r
20f9a2a1 14\r
33443e7c 15#include "crapto1/crapto1.h"\r
275d9e61 16#include "usb_cdc.h"\r
33443e7c 17\r
9ca155ba 18// mifare authentication\r
4abe4f58
M
19#define CRYPT_NONE 0\r
20#define CRYPT_ALL 1\r
21#define CRYPT_REQUEST 2\r
6a1f2d82 22#define AUTH_FIRST 0 \r
4abe4f58 23#define AUTH_NESTED 2\r
275d9e61
OM
24#define AUTHENTICATION_TIMEOUT 848 // card times out 1ms after wrong authentication (according to NXP documentation)\r
25#define PRE_AUTHENTICATION_LEADTIME 400 // some (non standard) cards need a pause after select before they are ready for first authentication\r
4abe4f58 26\r
8f51ddb0
M
27// mifare 4bit card answers\r
28#define CARD_ACK 0x0A // 1010 - ACK\r
29#define CARD_NACK_NA 0x04 // 0100 - NACK, not allowed (command not allowed)\r
30#define CARD_NACK_TR 0x05 // 0101 - NACK, transmission error\r
31\r
9ca155ba
M
32// reader voltage field detector\r
33#define MF_MINFIELDV 4000\r
34\r
f397b5cc
M
35// debug\r
36// 0 - no debug messages 1 - error messages 2 - all messages 4 - extended debug mode\r
37#define MF_DBG_NONE 0\r
38#define MF_DBG_ERROR 1\r
39#define MF_DBG_ALL 2\r
40#define MF_DBG_EXTENDED 4\r
41\r
42extern int MF_DBGLEVEL;\r
43\r
9ca155ba 44//mifare emulator states\r
0014cb46
M
45#define MFEMUL_NOFIELD 0\r
46#define MFEMUL_IDLE 1\r
47#define MFEMUL_SELECT1 2\r
48#define MFEMUL_SELECT2 3\r
c872d8c1 49#define MFEMUL_SELECT3 4\r
50#define MFEMUL_AUTH1 5\r
51#define MFEMUL_AUTH2 6\r
52#define MFEMUL_WORK 7\r
53#define MFEMUL_WRITEBL2 8\r
54#define MFEMUL_INTREG_INC 9\r
55#define MFEMUL_INTREG_DEC 10\r
56#define MFEMUL_INTREG_REST 11\r
57#define MFEMUL_HALTED 12\r
0014cb46
M
58\r
59#define cardSTATE_TO_IDLE() cardSTATE = MFEMUL_IDLE; LED_B_OFF(); LED_C_OFF();\r
50193c1e 60\r
f168b263 61//functions\r
4973f23d 62int mifare_sendcmd(uint8_t cmd, uint8_t *data, uint8_t data_size, uint8_t* answer, uint8_t *answer_parity, uint32_t *timing);\r
e35031d2 63int mifare_sendcmd_short(struct Crypto1State *pcs, uint8_t crypted, uint8_t cmd, uint8_t data, uint8_t* answer, uint8_t *answer_parity, uint32_t *timing);\r
f168b263 64\r
4973f23d 65// mifare classic\r
6a1f2d82 66int mifare_classic_auth(struct Crypto1State *pcs, uint32_t uid, uint8_t blockNo, uint8_t keyType, uint64_t ui64Key, uint8_t isNested);\r
f168b263 67int mifare_classic_authex(struct Crypto1State *pcs, uint32_t uid, uint8_t blockNo, uint8_t keyType, uint64_t ui64Key, uint8_t isNested, uint32_t * ntptr, uint32_t *timing);\r
cceabb79 68int mifare_classic_readblock(struct Crypto1State *pcs, uint32_t uid, uint8_t blockNo, uint8_t *blockData);\r
4973f23d 69int mifare_classic_halt(struct Crypto1State *pcs, uint32_t uid); \r
70int mifare_classic_writeblock(struct Crypto1State *pcs, uint32_t uid, uint8_t blockNo, uint8_t *blockData);\r
71\r
72// Ultralight/NTAG...\r
cceabb79 73int mifare_ul_ev1_auth(uint8_t *key, uint8_t *pack);\r
8258f409 74int mifare_ultra_auth(uint8_t *key);\r
f168b263 75int mifare_ultra_readblock(uint8_t blockNo, uint8_t *blockData);\r
4973f23d 76//int mifare_ultra_writeblock_compat(uint8_t blockNo, uint8_t *blockData);\r
f168b263 77int mifare_ultra_writeblock(uint8_t blockNo, uint8_t *blockData);\r
f168b263 78int mifare_ultra_halt();\r
a631936e 79\r
c8b6da22 80// desfire\r
81int mifare_sendcmd_special(struct Crypto1State *pcs, uint8_t crypted, uint8_t cmd, uint8_t* data, uint8_t* answer, uint8_t *answer_parity, uint32_t *timing);\r
82int mifare_sendcmd_special2(struct Crypto1State *pcs, uint8_t crypted, uint8_t cmd, uint8_t* data, uint8_t* answer,uint8_t *answer_parity, uint32_t *timing);\r
83int mifare_desfire_des_auth1(uint32_t uid, uint8_t *blockData);\r
84int mifare_desfire_des_auth2(uint32_t uid, uint8_t *key, uint8_t *blockData);\r
f168b263 85\r
86// crypto functions\r
87void mf_crypto1_decrypt(struct Crypto1State *pcs, uint8_t *receivedCmd, int len);\r
6a1f2d82 88void mf_crypto1_encrypt(struct Crypto1State *pcs, uint8_t *data, uint16_t len, uint8_t *par);\r
8f51ddb0
M
89uint8_t mf_crypto1_encrypt4bit(struct Crypto1State *pcs, uint8_t data);\r
90\r
baeaf579 91// Mifare memory structure\r
92uint8_t NumBlocksPerSector(uint8_t sectorNo);\r
93uint8_t FirstBlockOfSector(uint8_t sectorNo);\r
94\r
8f51ddb0
M
95// emulator functions\r
96void emlClearMem(void);\r
97void emlSetMem(uint8_t *data, int blockNum, int blocksCount);\r
98void emlGetMem(uint8_t *data, int blockNum, int blocksCount);\r
99void emlGetMemBt(uint8_t *data, int bytePtr, int byteCount);\r
8556b852 100uint64_t emlGetKey(int sectorNum, int keyType);\r
0014cb46 101int emlGetValBl(uint32_t *blReg, uint8_t *blBlock, int blockNum);\r
f168b263 102int emlSetValBl(uint32_t blReg, uint8_t blBlock, int blockNum);\r
103int emlCheckValBl(int blockNum);\r
104\r
275d9e61
OM
105// mifare check keys\r
106typedef uint8_t TKeyIndex[2][40];\r
107int MifareChkBlockKey(uint8_t *uid, uint32_t *cuid, uint8_t *cascade_levels, uint64_t ui64Key, uint8_t blockNo, uint8_t keyType, uint8_t debugLevel);\r
108int MifareChkBlockKeys(uint8_t *keys, uint8_t keyCount, uint8_t blockNo, uint8_t keyType, uint8_t debugLevel);\r
109int MifareMultisectorChk(uint8_t *keys, uint8_t keyCount, uint8_t SectorCount, uint8_t keyType, uint8_t debugLevel, TKeyIndex *keyIndex);\r
110\r
f168b263 111#endif\r
Impressum, Datenschutz