]>
Commit | Line | Data |
---|---|---|
20f9a2a1 M |
1 | //-----------------------------------------------------------------------------\r |
2 | // Merlok, May 2011\r | |
3 | // Many authors, that makes it possible\r | |
4 | //\r | |
5 | // This code is licensed to you under the terms of the GNU GPL, version 2 or,\r | |
6 | // at your option, any later version. See the LICENSE.txt file for the text of\r | |
7 | // the license.\r | |
8 | //-----------------------------------------------------------------------------\r | |
9 | // code for work with mifare cards.\r | |
10 | //-----------------------------------------------------------------------------\r | |
9ca155ba | 11 | \r |
f397b5cc M |
12 | #ifndef __MIFAREUTIL_H\r |
13 | #define __MIFAREUTIL_H\r | |
20f9a2a1 | 14 | \r |
9ca155ba | 15 | // mifare authentication\r |
4abe4f58 M |
16 | #define CRYPT_NONE 0\r |
17 | #define CRYPT_ALL 1\r | |
18 | #define CRYPT_REQUEST 2\r | |
6a1f2d82 | 19 | #define AUTH_FIRST 0 \r |
4abe4f58 M |
20 | #define AUTH_NESTED 2\r |
21 | \r | |
8f51ddb0 M |
22 | // mifare 4bit card answers\r |
23 | #define CARD_ACK 0x0A // 1010 - ACK\r | |
24 | #define CARD_NACK_NA 0x04 // 0100 - NACK, not allowed (command not allowed)\r | |
25 | #define CARD_NACK_TR 0x05 // 0101 - NACK, transmission error\r | |
26 | \r | |
9ca155ba M |
27 | // reader voltage field detector\r |
28 | #define MF_MINFIELDV 4000\r | |
29 | \r | |
f397b5cc M |
30 | // debug\r |
31 | // 0 - no debug messages 1 - error messages 2 - all messages 4 - extended debug mode\r | |
32 | #define MF_DBG_NONE 0\r | |
33 | #define MF_DBG_ERROR 1\r | |
34 | #define MF_DBG_ALL 2\r | |
35 | #define MF_DBG_EXTENDED 4\r | |
36 | \r | |
37 | extern int MF_DBGLEVEL;\r | |
38 | \r | |
9ca155ba | 39 | //mifare emulator states\r |
0014cb46 M |
40 | #define MFEMUL_NOFIELD 0\r |
41 | #define MFEMUL_IDLE 1\r | |
42 | #define MFEMUL_SELECT1 2\r | |
43 | #define MFEMUL_SELECT2 3\r | |
44 | #define MFEMUL_AUTH1 4\r | |
45 | #define MFEMUL_AUTH2 5\r | |
46 | #define MFEMUL_WORK 6\r | |
47 | #define MFEMUL_WRITEBL2 7\r | |
48 | #define MFEMUL_INTREG_INC 8\r | |
49 | #define MFEMUL_INTREG_DEC 9\r | |
50 | #define MFEMUL_INTREG_REST 10\r | |
51 | #define MFEMUL_HALTED 11\r | |
52 | \r | |
53 | #define cardSTATE_TO_IDLE() cardSTATE = MFEMUL_IDLE; LED_B_OFF(); LED_C_OFF();\r | |
50193c1e | 54 | \r |
f168b263 | 55 | //functions\r |
56 | int mifare_sendcmd_short(struct Crypto1State *pcs, uint8_t crypted, uint8_t cmd, uint8_t data, uint8_t* answer, uint8_t *answer_parity, uint32_t *timing);\r | |
57 | int mifare_sendcmd_short_special(struct Crypto1State *pcs, uint8_t crypted, uint8_t cmd, uint8_t *data, uint8_t* answer, uint8_t *answer_parity, uint32_t *timing);\r | |
a631936e | 58 | \r |
59 | int mifare_sendcmd_short_mfucauth(struct Crypto1State *pcs, uint8_t crypted, uint8_t cmd, uint8_t *data, uint8_t *answer, uint8_t *answer_parity, uint32_t *timing);\r | |
f168b263 | 60 | int mifare_sendcmd_shortex(struct Crypto1State *pcs, uint8_t crypted, uint8_t cmd, uint8_t data, uint8_t* answer, uint8_t *answer_parity, uint32_t *timing);\r |
61 | \r | |
6a1f2d82 | 62 | int mifare_classic_auth(struct Crypto1State *pcs, uint32_t uid, uint8_t blockNo, uint8_t keyType, uint64_t ui64Key, uint8_t isNested);\r |
f168b263 | 63 | int mifare_classic_authex(struct Crypto1State *pcs, uint32_t uid, uint8_t blockNo, uint8_t keyType, uint64_t ui64Key, uint8_t isNested, uint32_t * ntptr, uint32_t *timing);\r |
64 | int mifare_classic_readblock(struct Crypto1State *pcs, uint32_t uid, uint8_t blockNo, uint8_t *blockData); \r | |
65 | int mifare_ultra_auth1(uint8_t *blockData);\r | |
66 | int mifare_ultra_auth2(uint8_t *key, uint8_t *blockData);\r | |
67 | int mifare_ultra_readblock(uint8_t blockNo, uint8_t *blockData);\r | |
68 | int mifare_classic_writeblock(struct Crypto1State *pcs, uint32_t uid, uint8_t blockNo, uint8_t *blockData);\r | |
69 | int mifare_ultra_writeblock(uint8_t blockNo, uint8_t *blockData);\r | |
70 | int mifare_ultra_special_writeblock(uint8_t blockNo, uint8_t *blockData);\r | |
71 | int mifare_classic_halt(struct Crypto1State *pcs, uint32_t uid); \r | |
72 | int mifare_ultra_halt();\r | |
a631936e | 73 | \r |
c8b6da22 | 74 | // desfire\r |
75 | int mifare_sendcmd_special(struct Crypto1State *pcs, uint8_t crypted, uint8_t cmd, uint8_t* data, uint8_t* answer, uint8_t *answer_parity, uint32_t *timing);\r | |
76 | int mifare_sendcmd_special2(struct Crypto1State *pcs, uint8_t crypted, uint8_t cmd, uint8_t* data, uint8_t* answer,uint8_t *answer_parity, uint32_t *timing);\r | |
77 | int mifare_desfire_des_auth1(uint32_t uid, uint8_t *blockData);\r | |
78 | int mifare_desfire_des_auth2(uint32_t uid, uint8_t *key, uint8_t *blockData);\r | |
f168b263 | 79 | \r |
80 | // crypto functions\r | |
81 | void mf_crypto1_decrypt(struct Crypto1State *pcs, uint8_t *receivedCmd, int len);\r | |
6a1f2d82 | 82 | void mf_crypto1_encrypt(struct Crypto1State *pcs, uint8_t *data, uint16_t len, uint8_t *par);\r |
8f51ddb0 M |
83 | uint8_t mf_crypto1_encrypt4bit(struct Crypto1State *pcs, uint8_t data);\r |
84 | \r | |
baeaf579 | 85 | // Mifare memory structure\r |
86 | uint8_t NumBlocksPerSector(uint8_t sectorNo);\r | |
87 | uint8_t FirstBlockOfSector(uint8_t sectorNo);\r | |
88 | \r | |
8f51ddb0 M |
89 | // emulator functions\r |
90 | void emlClearMem(void);\r | |
91 | void emlSetMem(uint8_t *data, int blockNum, int blocksCount);\r | |
92 | void emlGetMem(uint8_t *data, int blockNum, int blocksCount);\r | |
93 | void emlGetMemBt(uint8_t *data, int bytePtr, int byteCount);\r | |
8556b852 | 94 | uint64_t emlGetKey(int sectorNum, int keyType);\r |
0014cb46 | 95 | int emlGetValBl(uint32_t *blReg, uint8_t *blBlock, int blockNum);\r |
f168b263 | 96 | int emlSetValBl(uint32_t blReg, uint8_t blBlock, int blockNum);\r |
97 | int emlCheckValBl(int blockNum);\r | |
98 | \r | |
99 | #endif\r |