]>
Commit | Line | Data |
---|---|---|
20f9a2a1 M |
1 | //-----------------------------------------------------------------------------\r |
2 | // Merlok, May 2011\r | |
3 | // Many authors, that makes it possible\r | |
4 | //\r | |
5 | // This code is licensed to you under the terms of the GNU GPL, version 2 or,\r | |
6 | // at your option, any later version. See the LICENSE.txt file for the text of\r | |
7 | // the license.\r | |
8 | //-----------------------------------------------------------------------------\r | |
9 | // code for work with mifare cards.\r | |
10 | //-----------------------------------------------------------------------------\r | |
9ca155ba | 11 | \r |
a749b1e5 | 12 | #ifndef MIFAREUTIL_H__\r |
13 | #define MIFAREUTIL_H__\r | |
20f9a2a1 | 14 | \r |
b35e04a7 | 15 | #include <stdint.h>\r |
16 | #include <stdbool.h>\r | |
17 | \r | |
33443e7c | 18 | #include "crapto1/crapto1.h"\r |
275d9e61 | 19 | #include "usb_cdc.h"\r |
33443e7c | 20 | \r |
9ca155ba | 21 | // mifare authentication\r |
a749b1e5 | 22 | #define CRYPT_NONE 0\r |
23 | #define CRYPT_ALL 1\r | |
24 | #define CRYPT_REQUEST 2\r | |
25 | #define AUTH_FIRST 0\r | |
26 | #define AUTH_NESTED 2\r | |
4abe4f58 | 27 | \r |
9ca155ba M |
28 | // reader voltage field detector\r |
29 | #define MF_MINFIELDV 4000\r | |
30 | \r | |
f397b5cc | 31 | // debug\r |
a8561e35 | 32 | #define MF_DBG_NONE 0 // no messages\r |
33 | #define MF_DBG_ERROR 1 // errors only\r | |
34 | #define MF_DBG_INFO 2 // errors + info messages\r | |
35 | #define MF_DBG_DEBUG 3 // errors + info + debug messages\r | |
36 | #define MF_DBG_EXTENDED 4 // errors + info + debug + breaking debug messages\r | |
f397b5cc M |
37 | \r |
38 | extern int MF_DBGLEVEL;\r | |
39 | \r | |
f168b263 | 40 | //functions\r |
4973f23d | 41 | int mifare_sendcmd(uint8_t cmd, uint8_t *data, uint8_t data_size, uint8_t* answer, uint8_t *answer_parity, uint32_t *timing);\r |
e35031d2 | 42 | int mifare_sendcmd_short(struct Crypto1State *pcs, uint8_t crypted, uint8_t cmd, uint8_t data, uint8_t* answer, uint8_t *answer_parity, uint32_t *timing);\r |
f168b263 | 43 | \r |
4973f23d | 44 | // mifare classic\r |
a749b1e5 | 45 | int mifare_classic_auth(struct Crypto1State *pcs, uint32_t uid, uint8_t blockNo, uint8_t keyType, uint64_t ui64Key, uint8_t isNested, uint32_t *auth_timeout);\r |
46 | int mifare_classic_authex(struct Crypto1State *pcs, uint32_t uid, uint8_t blockNo, uint8_t keyType, uint64_t ui64Key, uint8_t isNested, uint32_t * ntptr, uint32_t *timing, uint32_t *auth_timeout);\r | |
cceabb79 | 47 | int mifare_classic_readblock(struct Crypto1State *pcs, uint32_t uid, uint8_t blockNo, uint8_t *blockData);\r |
a749b1e5 | 48 | int mifare_classic_halt(struct Crypto1State *pcs, uint32_t uid);\r |
4973f23d | 49 | int mifare_classic_writeblock(struct Crypto1State *pcs, uint32_t uid, uint8_t blockNo, uint8_t *blockData);\r |
50 | \r | |
51 | // Ultralight/NTAG...\r | |
cceabb79 | 52 | int mifare_ul_ev1_auth(uint8_t *key, uint8_t *pack);\r |
8258f409 | 53 | int mifare_ultra_auth(uint8_t *key);\r |
f168b263 | 54 | int mifare_ultra_readblock(uint8_t blockNo, uint8_t *blockData);\r |
4973f23d | 55 | //int mifare_ultra_writeblock_compat(uint8_t blockNo, uint8_t *blockData);\r |
f168b263 | 56 | int mifare_ultra_writeblock(uint8_t blockNo, uint8_t *blockData);\r |
f168b263 | 57 | int mifare_ultra_halt();\r |
a631936e | 58 | \r |
c8b6da22 | 59 | // desfire\r |
60 | int mifare_sendcmd_special(struct Crypto1State *pcs, uint8_t crypted, uint8_t cmd, uint8_t* data, uint8_t* answer, uint8_t *answer_parity, uint32_t *timing);\r | |
61 | int mifare_sendcmd_special2(struct Crypto1State *pcs, uint8_t crypted, uint8_t cmd, uint8_t* data, uint8_t* answer,uint8_t *answer_parity, uint32_t *timing);\r | |
62 | int mifare_desfire_des_auth1(uint32_t uid, uint8_t *blockData);\r | |
63 | int mifare_desfire_des_auth2(uint32_t uid, uint8_t *key, uint8_t *blockData);\r | |
f168b263 | 64 | \r |
65 | // crypto functions\r | |
66 | void mf_crypto1_decrypt(struct Crypto1State *pcs, uint8_t *receivedCmd, int len);\r | |
6e49717b | 67 | void mf_crypto1_decryptEx(struct Crypto1State *pcs, uint8_t *data_in, int len, uint8_t *data_out);\r |
6a1f2d82 | 68 | void mf_crypto1_encrypt(struct Crypto1State *pcs, uint8_t *data, uint16_t len, uint8_t *par);\r |
a8561e35 | 69 | void mf_crypto1_encryptEx(struct Crypto1State *pcs, uint8_t *data, uint8_t *in, uint16_t len, uint8_t *par);\r |
8f51ddb0 M |
70 | uint8_t mf_crypto1_encrypt4bit(struct Crypto1State *pcs, uint8_t data);\r |
71 | \r | |
baeaf579 | 72 | // Mifare memory structure\r |
73 | uint8_t NumBlocksPerSector(uint8_t sectorNo);\r | |
74 | uint8_t FirstBlockOfSector(uint8_t sectorNo);\r | |
b35e04a7 | 75 | bool IsSectorTrailer(uint8_t blockNo);\r |
76 | uint8_t SectorTrailer(uint8_t blockNo);\r | |
baeaf579 | 77 | \r |
8f51ddb0 M |
78 | // emulator functions\r |
79 | void emlClearMem(void);\r | |
80 | void emlSetMem(uint8_t *data, int blockNum, int blocksCount);\r | |
81 | void emlGetMem(uint8_t *data, int blockNum, int blocksCount);\r | |
82 | void emlGetMemBt(uint8_t *data, int bytePtr, int byteCount);\r | |
8556b852 | 83 | uint64_t emlGetKey(int sectorNum, int keyType);\r |
0014cb46 | 84 | int emlGetValBl(uint32_t *blReg, uint8_t *blBlock, int blockNum);\r |
f168b263 | 85 | int emlSetValBl(uint32_t blReg, uint8_t blBlock, int blockNum);\r |
86 | int emlCheckValBl(int blockNum);\r | |
87 | \r | |
275d9e61 OM |
88 | // mifare check keys\r |
89 | typedef uint8_t TKeyIndex[2][40];\r | |
aa8ff592 | 90 | int MifareChkBlockKeysFixedNonce(uint8_t *ar_par, uint8_t ar_par_cnt, uint8_t blockNo, uint8_t keyType, uint32_t *auth_timeout, uint8_t debugLevel);\r |
a749b1e5 | 91 | int MifareChkBlockKeys(uint8_t *keys, uint8_t keyCount, uint8_t blockNo, uint8_t keyType, uint32_t *auth_timeout, uint8_t debugLevel);\r |
92 | int MifareMultisectorChk(uint8_t *keys, uint8_t keyCount, uint8_t SectorCount, uint8_t keyType, uint32_t *auth_timeout, uint8_t debugLevel, TKeyIndex *keyIndex);\r | |
275d9e61 | 93 | \r |
f168b263 | 94 | #endif\r |