]> git.zerfleddert.de Git - proxmark3-svn/blame - armsrc/mifareutil.h
Merge branch 'master' of https://github.com/Proxmark/proxmark3
[proxmark3-svn] / armsrc / mifareutil.h
CommitLineData
20f9a2a1
M
1//-----------------------------------------------------------------------------\r
2// Merlok, May 2011\r
3// Many authors, that makes it possible\r
4//\r
5// This code is licensed to you under the terms of the GNU GPL, version 2 or,\r
6// at your option, any later version. See the LICENSE.txt file for the text of\r
7// the license.\r
8//-----------------------------------------------------------------------------\r
9// code for work with mifare cards.\r
10//-----------------------------------------------------------------------------\r
9ca155ba 11\r
f397b5cc
M
12#ifndef __MIFAREUTIL_H\r
13#define __MIFAREUTIL_H\r
20f9a2a1 14\r
9ca155ba 15// mifare authentication\r
4abe4f58
M
16#define CRYPT_NONE 0\r
17#define CRYPT_ALL 1\r
18#define CRYPT_REQUEST 2\r
6a1f2d82 19#define AUTH_FIRST 0 \r
4abe4f58
M
20#define AUTH_NESTED 2\r
21\r
8f51ddb0
M
22// mifare 4bit card answers\r
23#define CARD_ACK 0x0A // 1010 - ACK\r
24#define CARD_NACK_NA 0x04 // 0100 - NACK, not allowed (command not allowed)\r
25#define CARD_NACK_TR 0x05 // 0101 - NACK, transmission error\r
26\r
9ca155ba
M
27// reader voltage field detector\r
28#define MF_MINFIELDV 4000\r
29\r
f397b5cc
M
30// debug\r
31// 0 - no debug messages 1 - error messages 2 - all messages 4 - extended debug mode\r
32#define MF_DBG_NONE 0\r
33#define MF_DBG_ERROR 1\r
34#define MF_DBG_ALL 2\r
35#define MF_DBG_EXTENDED 4\r
36\r
37extern int MF_DBGLEVEL;\r
38\r
9ca155ba 39//mifare emulator states\r
0014cb46
M
40#define MFEMUL_NOFIELD 0\r
41#define MFEMUL_IDLE 1\r
42#define MFEMUL_SELECT1 2\r
43#define MFEMUL_SELECT2 3\r
44#define MFEMUL_AUTH1 4\r
45#define MFEMUL_AUTH2 5\r
46#define MFEMUL_WORK 6\r
47#define MFEMUL_WRITEBL2 7\r
48#define MFEMUL_INTREG_INC 8\r
49#define MFEMUL_INTREG_DEC 9\r
50#define MFEMUL_INTREG_REST 10\r
51#define MFEMUL_HALTED 11\r
52\r
53#define cardSTATE_TO_IDLE() cardSTATE = MFEMUL_IDLE; LED_B_OFF(); LED_C_OFF();\r
50193c1e 54\r
981bd429 55//functions
56uint8_t* mifare_get_bigbufptr(void);
6a1f2d82 57int mifare_sendcmd_short(struct Crypto1State *pcs, uint8_t crypted, uint8_t cmd, uint8_t data, uint8_t* answer, uint8_t *answer_parity, uint32_t *timing);
58int mifare_sendcmd_short_special(struct Crypto1State *pcs, uint8_t crypted, uint8_t cmd, uint8_t *data, uint8_t* answer, uint8_t *answer_parity, uint32_t *timing);
a631936e 59\r
60int mifare_sendcmd_short_mfucauth(struct Crypto1State *pcs, uint8_t crypted, uint8_t cmd, uint8_t *data, uint8_t *answer, uint8_t *answer_parity, uint32_t *timing);\r
6a1f2d82 61int mifare_sendcmd_shortex(struct Crypto1State *pcs, uint8_t crypted, uint8_t cmd, uint8_t data, uint8_t* answer, uint8_t *answer_parity, uint32_t *timing);
981bd429 62
6a1f2d82 63int mifare_classic_auth(struct Crypto1State *pcs, uint32_t uid, uint8_t blockNo, uint8_t keyType, uint64_t ui64Key, uint8_t isNested);\r
64int mifare_classic_authex(struct Crypto1State *pcs, uint32_t uid, uint8_t blockNo, uint8_t keyType, uint64_t ui64Key, uint8_t isNested, uint32_t * ntptr, uint32_t *timing);
981bd429 65int mifare_classic_readblock(struct Crypto1State *pcs, uint32_t uid, uint8_t blockNo, uint8_t *blockData);
a631936e 66int mifare_ultra_auth1(uint32_t cuid, uint8_t *blockData);\r
67int mifare_ultra_auth2(uint32_t cuid, uint8_t *key, uint8_t *blockData);\r
981bd429 68int mifare_ultra_readblock(uint32_t uid, uint8_t blockNo, uint8_t *blockData);
69int mifare_classic_writeblock(struct Crypto1State *pcs, uint32_t uid, uint8_t blockNo, uint8_t *blockData);
70int mifare_ultra_writeblock(uint32_t uid, uint8_t blockNo, uint8_t *blockData);
71int mifare_ultra_special_writeblock(uint32_t uid, uint8_t blockNo, uint8_t *blockData);
72int mifare_classic_halt(struct Crypto1State *pcs, uint32_t uid);
73int mifare_ultra_halt(uint32_t uid);
a631936e 74\r
981bd429 75
76// crypto functions
77void mf_crypto1_decrypt(struct Crypto1State *pcs, uint8_t *receivedCmd, int len);
6a1f2d82 78void mf_crypto1_encrypt(struct Crypto1State *pcs, uint8_t *data, uint16_t len, uint8_t *par);\r
8f51ddb0
M
79uint8_t mf_crypto1_encrypt4bit(struct Crypto1State *pcs, uint8_t data);\r
80\r
81// memory management\r
6a1f2d82 82uint8_t* get_bigbufptr_recvrespbuf(void);\r
83uint8_t* get_bigbufptr_recvcmdbuf(void);\r
84uint8_t* get_bigbufptr_emlcardmem(void);\r
8f51ddb0 85\r
baeaf579 86// Mifare memory structure\r
87uint8_t NumBlocksPerSector(uint8_t sectorNo);\r
88uint8_t FirstBlockOfSector(uint8_t sectorNo);\r
89\r
8f51ddb0
M
90// emulator functions\r
91void emlClearMem(void);\r
92void emlSetMem(uint8_t *data, int blockNum, int blocksCount);\r
93void emlGetMem(uint8_t *data, int blockNum, int blocksCount);\r
94void emlGetMemBt(uint8_t *data, int bytePtr, int byteCount);\r
8556b852 95uint64_t emlGetKey(int sectorNum, int keyType);\r
0014cb46 96int emlGetValBl(uint32_t *blReg, uint8_t *blBlock, int blockNum);\r
981bd429 97int emlSetValBl(uint32_t blReg, uint8_t blBlock, int blockNum);
98int emlCheckValBl(int blockNum);
99
100#endif
Impressum, Datenschutz