]> git.zerfleddert.de Git - proxmark3-svn/blame_incremental - armsrc/mifareutil.h
Merge pull request #462 from pwpiwi/fix_hfmfsim
[proxmark3-svn] / armsrc / mifareutil.h
... / ...
CommitLineData
1//-----------------------------------------------------------------------------\r
2// Merlok, May 2011\r
3// Many authors, that makes it possible\r
4//\r
5// This code is licensed to you under the terms of the GNU GPL, version 2 or,\r
6// at your option, any later version. See the LICENSE.txt file for the text of\r
7// the license.\r
8//-----------------------------------------------------------------------------\r
9// code for work with mifare cards.\r
10//-----------------------------------------------------------------------------\r
11\r
12#ifndef __MIFAREUTIL_H\r
13#define __MIFAREUTIL_H\r
14\r
15#include <stdint.h>\r
16#include <stdbool.h>\r
17\r
18#include "crapto1/crapto1.h"\r
19#include "usb_cdc.h"\r
20\r
21// mifare authentication\r
22#define CRYPT_NONE 0\r
23#define CRYPT_ALL 1\r
24#define CRYPT_REQUEST 2\r
25#define AUTH_FIRST 0 \r
26#define AUTH_NESTED 2\r
27#define AUTHENTICATION_TIMEOUT 848 // card times out 1ms after wrong authentication (according to NXP documentation)\r
28#define PRE_AUTHENTICATION_LEADTIME 400 // some (non standard) cards need a pause after select before they are ready for first authentication\r
29\r
30// mifare 4bit card answers\r
31#define CARD_ACK 0x0A // 1010 - ACK\r
32#define CARD_NACK_NA 0x04 // 0100 - NACK, not allowed (command not allowed)\r
33#define CARD_NACK_TR 0x05 // 0101 - NACK, transmission error\r
34\r
35// reader voltage field detector\r
36#define MF_MINFIELDV 4000\r
37\r
38// debug\r
39// 0 - no debug messages 1 - error messages 2 - all messages 4 - extended debug mode\r
40#define MF_DBG_NONE 0\r
41#define MF_DBG_ERROR 1\r
42#define MF_DBG_ALL 2\r
43#define MF_DBG_EXTENDED 4\r
44\r
45extern int MF_DBGLEVEL;\r
46\r
47//functions\r
48int mifare_sendcmd(uint8_t cmd, uint8_t *data, uint8_t data_size, uint8_t* answer, uint8_t *answer_parity, uint32_t *timing);\r
49int mifare_sendcmd_short(struct Crypto1State *pcs, uint8_t crypted, uint8_t cmd, uint8_t data, uint8_t* answer, uint8_t *answer_parity, uint32_t *timing);\r
50\r
51// mifare classic\r
52int mifare_classic_auth(struct Crypto1State *pcs, uint32_t uid, uint8_t blockNo, uint8_t keyType, uint64_t ui64Key, uint8_t isNested);\r
53int mifare_classic_authex(struct Crypto1State *pcs, uint32_t uid, uint8_t blockNo, uint8_t keyType, uint64_t ui64Key, uint8_t isNested, uint32_t * ntptr, uint32_t *timing);\r
54int mifare_classic_readblock(struct Crypto1State *pcs, uint32_t uid, uint8_t blockNo, uint8_t *blockData);\r
55int mifare_classic_halt(struct Crypto1State *pcs, uint32_t uid); \r
56int mifare_classic_writeblock(struct Crypto1State *pcs, uint32_t uid, uint8_t blockNo, uint8_t *blockData);\r
57\r
58// Ultralight/NTAG...\r
59int mifare_ul_ev1_auth(uint8_t *key, uint8_t *pack);\r
60int mifare_ultra_auth(uint8_t *key);\r
61int mifare_ultra_readblock(uint8_t blockNo, uint8_t *blockData);\r
62//int mifare_ultra_writeblock_compat(uint8_t blockNo, uint8_t *blockData);\r
63int mifare_ultra_writeblock(uint8_t blockNo, uint8_t *blockData);\r
64int mifare_ultra_halt();\r
65\r
66// desfire\r
67int mifare_sendcmd_special(struct Crypto1State *pcs, uint8_t crypted, uint8_t cmd, uint8_t* data, uint8_t* answer, uint8_t *answer_parity, uint32_t *timing);\r
68int mifare_sendcmd_special2(struct Crypto1State *pcs, uint8_t crypted, uint8_t cmd, uint8_t* data, uint8_t* answer,uint8_t *answer_parity, uint32_t *timing);\r
69int mifare_desfire_des_auth1(uint32_t uid, uint8_t *blockData);\r
70int mifare_desfire_des_auth2(uint32_t uid, uint8_t *key, uint8_t *blockData);\r
71\r
72// crypto functions\r
73void mf_crypto1_decrypt(struct Crypto1State *pcs, uint8_t *receivedCmd, int len);\r
74void mf_crypto1_decryptEx(struct Crypto1State *pcs, uint8_t *data_in, int len, uint8_t *data_out);\r
75void mf_crypto1_encrypt(struct Crypto1State *pcs, uint8_t *data, uint16_t len, uint8_t *par);\r
76uint8_t mf_crypto1_encrypt4bit(struct Crypto1State *pcs, uint8_t data);\r
77\r
78// Mifare memory structure\r
79uint8_t NumBlocksPerSector(uint8_t sectorNo);\r
80uint8_t FirstBlockOfSector(uint8_t sectorNo);\r
81bool IsSectorTrailer(uint8_t blockNo);\r
82uint8_t SectorTrailer(uint8_t blockNo);\r
83\r
84// emulator functions\r
85void emlClearMem(void);\r
86void emlSetMem(uint8_t *data, int blockNum, int blocksCount);\r
87void emlGetMem(uint8_t *data, int blockNum, int blocksCount);\r
88void emlGetMemBt(uint8_t *data, int bytePtr, int byteCount);\r
89uint64_t emlGetKey(int sectorNum, int keyType);\r
90int emlGetValBl(uint32_t *blReg, uint8_t *blBlock, int blockNum);\r
91int emlSetValBl(uint32_t blReg, uint8_t blBlock, int blockNum);\r
92int emlCheckValBl(int blockNum);\r
93\r
94// mifare check keys\r
95typedef uint8_t TKeyIndex[2][40];\r
96int MifareChkBlockKey(uint8_t *uid, uint32_t *cuid, uint8_t *cascade_levels, uint64_t ui64Key, uint8_t blockNo, uint8_t keyType, uint8_t debugLevel);\r
97int MifareChkBlockKeys(uint8_t *keys, uint8_t keyCount, uint8_t blockNo, uint8_t keyType, uint8_t debugLevel);\r
98int MifareMultisectorChk(uint8_t *keys, uint8_t keyCount, uint8_t SectorCount, uint8_t keyType, uint8_t debugLevel, TKeyIndex *keyIndex);\r
99\r
100#endif\r
Impressum, Datenschutz