]>
Commit | Line | Data |
---|---|---|
1 | /***************************************************************************** | |
2 | * WARNING | |
3 | * | |
4 | * THIS CODE IS CREATED FOR EXPERIMENTATION AND EDUCATIONAL USE ONLY. | |
5 | * | |
6 | * USAGE OF THIS CODE IN OTHER WAYS MAY INFRINGE UPON THE INTELLECTUAL | |
7 | * PROPERTY OF OTHER PARTIES, SUCH AS INSIDE SECURE AND HID GLOBAL, | |
8 | * AND MAY EXPOSE YOU TO AN INFRINGEMENT ACTION FROM THOSE PARTIES. | |
9 | * | |
10 | * THIS CODE SHOULD NEVER BE USED TO INFRINGE PATENTS OR INTELLECTUAL PROPERTY RIGHTS. | |
11 | * | |
12 | ***************************************************************************** | |
13 | * | |
14 | * This file is part of loclass. It is a reconstructon of the cipher engine | |
15 | * used in iClass, and RFID techology. | |
16 | * | |
17 | * The implementation is based on the work performed by | |
18 | * Flavio D. Garcia, Gerhard de Koning Gans, Roel Verdult and | |
19 | * Milosch Meriac in the paper "Dismantling IClass". | |
20 | * | |
21 | * Copyright (C) 2014 Martin Holst Swende | |
22 | * | |
23 | * This is free software: you can redistribute it and/or modify | |
24 | * it under the terms of the GNU General Public License version 2 as published | |
25 | * by the Free Software Foundation. | |
26 | * | |
27 | * This file is distributed in the hope that it will be useful, | |
28 | * but WITHOUT ANY WARRANTY; without even the implied warranty of | |
29 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
30 | * GNU General Public License for more details. | |
31 | * | |
32 | * You should have received a copy of the GNU General Public License | |
33 | * along with loclass. If not, see <http://www.gnu.org/licenses/>. | |
34 | * | |
35 | * | |
36 | * | |
37 | ****************************************************************************/ | |
38 | ||
39 | #ifndef IKEYS_H | |
40 | #define IKEYS_H | |
41 | ||
42 | ||
43 | /** | |
44 | * @brief | |
45 | *Definition 11. Let the function hash0 : F 82 × F 82 × (F 62 ) 8 → (F 82 ) 8 be defined as | |
46 | * hash0(x, y, z [0] . . . z [7] ) = k [0] . . . k [7] where | |
47 | * z'[i] = (z[i] mod (63-i)) + i i = 0...3 | |
48 | * z'[i+4] = (z[i+4] mod (64-i)) + i i = 0...3 | |
49 | * ẑ = check(z'); | |
50 | * @param c | |
51 | * @param k this is where the diversified key is put (should be 8 bytes) | |
52 | * @return | |
53 | */ | |
54 | void hash0(uint64_t c, uint8_t k[8]); | |
55 | int doKeyTests(uint8_t debuglevel); | |
56 | /** | |
57 | * @brief Performs Elite-class key diversification | |
58 | * @param csn | |
59 | * @param key | |
60 | * @param div_key | |
61 | */ | |
62 | ||
63 | void diversifyKey(uint8_t csn[8], uint8_t key[8], uint8_t div_key[8]); | |
64 | /** | |
65 | * @brief Permutes a key from standard NIST format to Iclass specific format | |
66 | * @param key | |
67 | * @param dest | |
68 | */ | |
69 | ||
70 | #endif // IKEYS_H |