]> git.zerfleddert.de Git - proxmark3-svn/blame - armsrc/apps.h
Add Mifare Classic EV1 set load modulation command
[proxmark3-svn] / armsrc / apps.h
CommitLineData
15c4dc5a 1//-----------------------------------------------------------------------------
15c4dc5a 2// Jonathan Westhues, Aug 2005
cee5a30d 3// Gerhard de Koning Gans, April 2008, May 2011
bd20f8f4 4//
5// This code is licensed to you under the terms of the GNU GPL, version 2 or,
6// at your option, any later version. See the LICENSE.txt file for the text of
7// the license.
8//-----------------------------------------------------------------------------
9// Definitions internal to the app source.
15c4dc5a 10//-----------------------------------------------------------------------------
15c4dc5a 11#ifndef __APPS_H
12#define __APPS_H
13
53d5dc64 14#ifdef __cplusplus
15extern "C" {
16#endif
17
f38a1528 18#include <stdlib.h>
53d5dc64 19#include <stdarg.h>
7838f4be 20#include "common.h"
53d5dc64 21#include "usb_cdc.h"
7838f4be 22#include "crc32.h"
23#include "lfdemod.h"
117d9ec2 24#include "BigBuf.h"
9783989b 25#include "fpgaloader.h"
db25599d 26#include "hitag2.h"
0db11b71 27#include "hitagS.h"
db25599d 28#include "mifare.h"
36804420 29#include "pcf7931.h"
0ec548dc 30#include "desfire.h"
6fc68747 31#include "iso14443b.h"
99136c6e 32#include "emvcard.h"
a501c82b 33
1e262141 34extern int rsamples; // = 0;
35extern int tracing; // = TRUE;
36extern uint8_t trigger;
15c4dc5a 37
6c1e2d95 38// This may be used (sparingly) to declare a function to be copied to
39// and executed from RAM
40#define RAMFUNC __attribute((long_call, section(".ramfunc")))
41
15c4dc5a 42/// appmain.h
43void ReadMem(int addr);
44void __attribute__((noreturn)) AppMain(void);
45void SamyRun(void);
46//void DbpIntegers(int a, int b, int c);
47void DbpString(char *str);
48void Dbprintf(const char *fmt, ...);
b069fb8b 49void DbprintfEx(uint32_t cmd, const char *fmt, ...);
d19929cb 50void Dbhexdump(int len, uint8_t *d, bool bAsci);
15c4dc5a 51
3b692427 52// ADC Vref = 3300mV, and an (10M+1M):1M voltage divider on the HF input can measure voltages up to 36300 mV
53#define MAX_ADC_HF_VOLTAGE 36300
54// ADC Vref = 3300mV, and an (10000k+240k):240k voltage divider on the LF input can measure voltages up to 140800 mV
55#define MAX_ADC_LF_VOLTAGE 140800
9ca155ba
M
56int AvgAdc(int ch);
57
53d5dc64 58void print_result(char *name, uint8_t *buf, size_t len);
dccddaef 59void PrintToSendBuffer(void);
15c4dc5a 60void ToSendStuffBit(int b);
61void ToSendReset(void);
62void ListenReaderField(int limit);
15c4dc5a 63extern int ToSendMax;
f7e3ed82 64extern uint8_t ToSend[];
15c4dc5a 65
15c4dc5a 66/// lfops.h
f6d9fb17
MHS
67extern uint8_t decimation;
68extern uint8_t bits_per_sample ;
69extern bool averaging;
70
bf7163bd 71void AcquireRawAdcSamples125k(int divisor);
9276e859 72void ModThenAcquireRawAdcSamples125k(uint32_t delay_off, uint32_t period_0, uint32_t period_1, uint8_t *command);
15c4dc5a 73void ReadTItag(void);
f7e3ed82 74void WriteTItag(uint32_t idhi, uint32_t idlo, uint16_t crc);
9276e859 75
15c4dc5a 76void AcquireTiType(void);
77void AcquireRawBitsTI(void);
74daee24 78void SimulateTagLowFrequency(int period, int gap, int ledcontrol);
a126332a 79void SimulateTagLowFrequencyBidir(int divisor, int max_bitlen);
385f3987 80void CmdHIDsimTAG(int hi, int lo, int ledcontrol);
abd6112f 81void CmdFSKsimTAG(uint16_t arg1, uint16_t arg2, size_t size, uint8_t *BitStream);
82void CmdASKsimTag(uint16_t arg1, uint16_t arg2, size_t size, uint8_t *BitStream);
872e3d4d 83void CmdPSKsimTag(uint16_t arg1, uint16_t arg2, size_t size, uint8_t *BitStream);
15c4dc5a 84void CmdHIDdemodFSK(int findone, int *high, int *low, int ledcontrol);
db25599d 85void CmdAWIDdemodFSK(int findone, int *high, int *low, int ledcontrol); // Realtime demodulation mode for AWID26
6ff6ade2 86void CmdEM410xdemod(int findone, int *high, int *low, int ledcontrol);
a1f3bb12 87void CmdIOdemodFSK(int findone, int *high, int *low, int ledcontrol);
94422fa2 88void CopyIOtoT55x7(uint32_t hi, uint32_t lo); // Clone an ioProx card to T5557/T5567
54a942b0 89void CopyHIDtoT55x7(uint32_t hi2, uint32_t hi, uint32_t lo, uint8_t longFMT); // Clone an HID card to T5557/T5567
a126332a 90void CopyVikingtoT55xx(uint32_t block1, uint32_t block2, uint8_t Q5);
2d4eae76 91void WriteEM410x(uint32_t card, uint32_t id_hi, uint32_t id_lo);
1d0ccbe0 92void CopyIndala64toT55x7(uint32_t hi, uint32_t lo); // Clone Indala 64-bit tag by UID to T55x7
93void CopyIndala224toT55x7(uint32_t uid1, uint32_t uid2, uint32_t uid3, uint32_t uid4, uint32_t uid5, uint32_t uid6, uint32_t uid7); // Clone Indala 224-bit tag by UID to T55x7
94422fa2 94void T55xxResetRead(void);
a126332a 95void T55xxWriteBlock(uint32_t Data, uint8_t Block, uint32_t Pwd, uint8_t PwdMode);
96void T55xxWriteBlockExt(uint32_t Data, uint8_t Block, uint32_t Pwd, uint8_t PwdMode);
9276e859 97void T55xxReadBlock(uint16_t arg0, uint8_t Block, uint32_t Pwd);
9276e859 98void T55xxWakeUp(uint32_t Pwd);
8ddfbc34 99void TurnReadLFOn(uint32_t delay);
cb1ba30a 100void EM4xReadWord(uint8_t addr, uint32_t pwd, uint8_t usepwd);
101void EM4xWriteWord(uint32_t flag, uint32_t data, uint32_t pwd);
5f5b83b7 102void Cotag(uint32_t arg0);
15c4dc5a 103
df007486 104/// iso14443b.h
dccddaef 105void SimulateIso14443bTag(uint32_t pupi);
abb21530 106void AcquireRawAdcSamplesIso14443b(uint32_t parameter);
6fc68747 107void ReadSTMemoryIso14443b(uint8_t numofblocks);
abb21530 108void RAMFUNC SnoopIso14443b(void);
7cf3ef20 109void SendRawCommand14443B(uint32_t, uint32_t, uint8_t, uint8_t[]);
53d5dc64 110void SendRawCommand14443B_Ex(UsbCommand *c);
111void AppendCrc14443b(uint8_t* data, int len);
112void ClearFpgaShiftingRegisters(void);
15c4dc5a 113
df007486 114// iso14443a.h
4d2e4eea 115void RAMFUNC SniffIso14443a(uint8_t param);
0db6ed9a 116void SimulateIso14443aTag(int tagType, int flags, byte_t* data);
902cb3c0 117void ReaderIso14443a(UsbCommand * c);
1e262141 118// Also used in iclass.c
e46642ca 119//bool RAMFUNC LogTrace(const uint8_t *btBytes, uint16_t len, uint32_t timestamp_start, uint32_t timestamp_end, uint8_t *parity, bool readerToTag);
6a1f2d82 120void GetParity(const uint8_t *pbtCmd, uint16_t len, uint8_t *parity);
902cb3c0 121void iso14a_set_trigger(bool enable);
99136c6e 122// also used in emv
123bool prepare_allocated_tag_modulation(tag_response_info_t * response_info);
124int GetIso14443aCommandFromReader(uint8_t *received, uint8_t *parity, int *len);
3000dc4e 125
df007486 126// epa.h
902cb3c0 127void EPA_PACE_Collect_Nonce(UsbCommand * c);
d0f3338e 128void EPA_PACE_Replay(UsbCommand *c);
5acd09bd 129
8556b852 130// mifarecmd.h
20f9a2a1 131void MifareReadBlock(uint8_t arg0, uint8_t arg1, uint8_t arg2, uint8_t *data);
0ec548dc 132void MifareUReadBlock(uint8_t arg0, uint8_t arg1, uint8_t *datain);
4d2e4eea 133void MifareUC_Auth(uint8_t arg0, uint8_t *datain);
74daee24 134void MifareUReadCard(uint8_t arg0, uint16_t arg1, uint8_t arg2, uint8_t *datain);
20f9a2a1
M
135void MifareReadSector(uint8_t arg0, uint8_t arg1, uint8_t arg2, uint8_t *datain);
136void MifareWriteBlock(uint8_t arg0, uint8_t arg1, uint8_t arg2, uint8_t *datain);
95aeb706 137//void MifareUWriteBlockCompat(uint8_t arg0,uint8_t *datain);
138void MifareUWriteBlock(uint8_t arg0, uint8_t arg1, uint8_t *datain);
f397b5cc 139void MifareNested(uint32_t arg0, uint32_t arg1, uint32_t arg2, uint8_t *datain);
c188b1b9 140void MifareAcquireEncryptedNonces(uint32_t arg0, uint32_t arg1, uint32_t flags, uint8_t *datain);
b10a759f 141void MifareChkKeys(uint16_t arg0, uint8_t arg1, uint8_t arg2, uint8_t *datain);
20f9a2a1 142void Mifare1ksim(uint8_t arg0, uint8_t arg1, uint8_t arg2, uint8_t *datain);
8556b852
M
143void MifareSetDbgLvl(uint32_t arg0, uint32_t arg1, uint32_t arg2, uint8_t *datain);
144void MifareEMemClr(uint32_t arg0, uint32_t arg1, uint32_t arg2, uint8_t *datain);
145void MifareEMemSet(uint32_t arg0, uint32_t arg1, uint32_t arg2, uint8_t *datain);
146void MifareEMemGet(uint32_t arg0, uint32_t arg1, uint32_t arg2, uint8_t *datain);
147void MifareECardLoad(uint32_t arg0, uint32_t arg1, uint32_t arg2, uint8_t *datain);
c2731f37 148void MifareCSetBlock(uint32_t arg0, uint32_t arg1, uint8_t *datain); // Work with "magic Chinese" card
149void MifareCGetBlock(uint32_t arg0, uint32_t arg1, uint8_t *datain);
d52e4e88 150void MifareCIdent(); // is "magic chinese" card?
ece631fd 151void MifareSetMod(uint8_t mod, uint8_t *key);
aa60d156 152void MifareUSetPwd(uint8_t arg0, uint8_t *datain);
c2731f37 153void OnSuccessMagic();
154void OnErrorMagic(uint8_t reason);
add0504d 155
df007486 156int32_t dist_nt(uint32_t nt1, uint32_t nt2);
157void ReaderMifare(bool first_try, uint8_t block, uint8_t keytype );
158void RAMFUNC SniffMifare(uint8_t param);
159
6ff6ade2 160//desfire
161void Mifare_DES_Auth1(uint8_t arg0,uint8_t *datain);
162void Mifare_DES_Auth2(uint32_t arg0, uint8_t *datain);
163
f38a1528 164// mifaredesfire.h
df007486 165bool InitDesfireCard();
166void MifareSendCommand(uint8_t arg0,uint8_t arg1, uint8_t *datain);
167void MifareDesfireGetInformation();
168void MifareDES_Auth1(uint8_t arg0,uint8_t arg1,uint8_t arg2, uint8_t *datain);
169void ReaderMifareDES(uint32_t param, uint32_t param2, uint8_t * datain);
170int DesfireAPDU(uint8_t *cmd, size_t cmd_len, uint8_t *dataout);
171size_t CreateAPDU( uint8_t *datain, size_t len, uint8_t *dataout);
172void OnSuccess();
173void OnError(uint8_t reason);
f6c18637 174
0ec548dc 175// desfire_crypto.h
df007486 176void *mifare_cryto_preprocess_data (desfiretag_t tag, void *data, size_t *nbytes, size_t offset, int communication_settings);
177void *mifare_cryto_postprocess_data (desfiretag_t tag, void *data, size_t *nbytes, int communication_settings);
178void mifare_cypher_single_block (desfirekey_t key, uint8_t *data, uint8_t *ivect, MifareCryptoDirection direction, MifareCryptoOperation operation, size_t block_size);
179void mifare_cypher_blocks_chained (desfiretag_t tag, desfirekey_t key, uint8_t *ivect, uint8_t *data, size_t data_size, MifareCryptoDirection direction, MifareCryptoOperation operation);
180size_t key_block_size (const desfirekey_t key);
181size_t padded_data_length (const size_t nbytes, const size_t block_size);
182size_t maced_data_length (const desfirekey_t key, const size_t nbytes);
183size_t enciphered_data_length (const desfiretag_t tag, const size_t nbytes, int communication_settings);
184void cmac_generate_subkeys (desfirekey_t key);
185void cmac (const desfirekey_t key, uint8_t *ivect, const uint8_t *data, size_t len, uint8_t *cmac);
f38a1528 186
9c624f67 187// iso15693.h
9455b51c 188void RecordRawAdcSamplesIso15693(void);
15c4dc5a 189void AcquireRawAdcSamplesIso15693(void);
f7e3ed82 190void ReaderIso15693(uint32_t parameter); // Simulate an ISO15693 reader - greg
3649b640 191void SimTagIso15693(uint32_t parameter, uint8_t *uid); // simulate an ISO15693 tag - greg
9455b51c 192void BruteforceIso15693Afi(uint32_t speed); // find an AFI of a tag - atrox
193void DirectTag15693Command(uint32_t datalen,uint32_t speed, uint32_t recv, uint8_t data[]); // send arbitrary commands from CLI - atrox
194void SetDebugIso15693(uint32_t flag);
15c4dc5a 195
9c624f67 196// iclass.h
cee5a30d 197void RAMFUNC SnoopIClass(void);
ff7bb4ef 198void SimulateIClass(uint32_t arg0, uint32_t arg1, uint32_t arg2, uint8_t *datain);
1e262141 199void ReaderIClass(uint8_t arg0);
f38a1528 200void ReaderIClass_Replay(uint8_t arg0,uint8_t *MAC);
201void IClass_iso14443A_GetPublic(uint8_t arg0);
e98572a1 202void iClass_Authentication(uint8_t *MAC);
203void iClass_WriteBlock(uint8_t blockNo, uint8_t *data);
204void iClass_ReadBlk(uint8_t blockNo);
205bool iClass_ReadBlock(uint8_t blockNo, uint8_t *readdata);
206void iClass_Dump(uint8_t blockno, uint8_t numblks);
207void iClass_Clone(uint8_t startblock, uint8_t endblock, uint8_t *data);
208void iClass_ReadCheck(uint8_t blockNo, uint8_t keyType);
cee5a30d 209
d19929cb 210// hitag2.h
211void SnoopHitag(uint32_t type);
212void SimulateHitagTag(bool tag_mem_supplied, byte_t* data);
213void ReaderHitag(hitag_function htf, hitag_data* htd);
214
0db11b71 215//hitagS.h
216void SimulateHitagSTag(bool tag_mem_supplied, byte_t* data);
217void ReadHitagS(hitag_function htf, hitag_data* htd);
218void WritePageHitagS(hitag_function htf, hitag_data* htd,int page);
219void check_challenges(bool file_given, byte_t* data);
220
6e82300d 221// cmd.h
222bool cmd_receive(UsbCommand* cmd);
79a73ab2 223bool cmd_send(uint32_t cmd, uint32_t arg0, uint32_t arg1, uint32_t arg2, void* data, size_t len);
6e82300d 224
df007486 225// util.h
1d0ccbe0 226void HfSnoop(int , int);
df007486 227
99136c6e 228//EMV functions
229// emvcmd.h
810f5379 230void EMVTransaction(void);
231void EMVgetUDOL(void);
232void EMVloadvalue(uint32_t tag, uint8_t* datain);
233void EMVdumpcard(void);
9c624f67 234//void EMVSelect(uint8_t arg0, uint8_t arg1, uint8_t arg2, uint8_t *data);
99136c6e 235void EMVFuzz_RATS(uint8_t ratslen, uint8_t* RATS);
9c624f67 236void EMVReadRecord(uint8_t arg0, uint8_t arg1,emvcard* inputcard);
237void EMVSelectPPSE();
238void EMVSelectAID(uint8_t *AID, uint8_t AIDlen, emvcard* inputcard);
99136c6e 239void EMVTransaction();
240void EMVClone(uint8_t maxsfi, uint8_t maxrecord);
9c624f67 241void EMVSim();
99136c6e 242void EMVTest();
243void SimulateEMVcard();
9c624f67 244
53d5dc64 245#ifdef __cplusplus
246}
247#endif
248
15c4dc5a 249#endif
Impressum, Datenschutz