]> git.zerfleddert.de Git - proxmark3-svn/blame_incremental - armsrc/apps.h
ADD: some more keys found on a pastebin
[proxmark3-svn] / armsrc / apps.h
... / ...
CommitLineData
1//-----------------------------------------------------------------------------
2// Jonathan Westhues, Aug 2005
3// Gerhard de Koning Gans, April 2008, May 2011
4//
5// This code is licensed to you under the terms of the GNU GPL, version 2 or,
6// at your option, any later version. See the LICENSE.txt file for the text of
7// the license.
8//-----------------------------------------------------------------------------
9// Definitions internal to the app source.
10//-----------------------------------------------------------------------------
11
12#ifndef __APPS_H
13#define __APPS_H
14
15#include <stdint.h>
16#include <stddef.h>
17#include <stdlib.h>
18#include <sys/types.h>
19#include "common.h"
20#include "crc32.h"
21#include "lfdemod.h"
22#include "BigBuf.h"
23#include "fpgaloader.h"
24#include "usb_cdc.h"
25#include "hitag2.h"
26#include "mifare.h"
27#include "pcf7931.h"
28//#include "des.h"
29//#include "aes.h"
30#include "desfire.h"
31
32
33extern const uint8_t OddByteParity[256];
34extern int rsamples; // = 0;
35extern int tracing; // = TRUE;
36extern uint8_t trigger;
37
38// This may be used (sparingly) to declare a function to be copied to
39// and executed from RAM
40#define RAMFUNC __attribute((long_call, section(".ramfunc")))
41
42/// appmain.h
43void ReadMem(int addr);
44void __attribute__((noreturn)) AppMain(void);
45void SamyRun(void);
46//void DbpIntegers(int a, int b, int c);
47void DbpString(char *str);
48void Dbprintf(const char *fmt, ...);
49void Dbhexdump(int len, uint8_t *d, bool bAsci);
50
51// ADC Vref = 3300mV, and an (10M+1M):1M voltage divider on the HF input can measure voltages up to 36300 mV
52#define MAX_ADC_HF_VOLTAGE 36300
53// ADC Vref = 3300mV, and an (10000k+240k):240k voltage divider on the LF input can measure voltages up to 140800 mV
54#define MAX_ADC_LF_VOLTAGE 140800
55int AvgAdc(int ch);
56
57void ToSendStuffBit(int b);
58void ToSendReset(void);
59void ListenReaderField(int limit);
60extern int ToSendMax;
61extern uint8_t ToSend[];
62
63
64/// lfops.h
65extern uint8_t decimation;
66extern uint8_t bits_per_sample ;
67extern bool averaging;
68
69void AcquireRawAdcSamples125k(int divisor);
70void ModThenAcquireRawAdcSamples125k(int delay_off,int period_0,int period_1,uint8_t *command);
71void ReadTItag(void);
72void WriteTItag(uint32_t idhi, uint32_t idlo, uint16_t crc);
73void AcquireTiType(void);
74void AcquireRawBitsTI(void);
75void SimulateTagLowFrequency(int period, int gap, int ledcontrol);
76void CmdHIDsimTAG(int hi, int lo, int ledcontrol);
77void CmdFSKsimTAG(uint16_t arg1, uint16_t arg2, size_t size, uint8_t *BitStream);
78void CmdASKsimTag(uint16_t arg1, uint16_t arg2, size_t size, uint8_t *BitStream);
79void CmdPSKsimTag(uint16_t arg1, uint16_t arg2, size_t size, uint8_t *BitStream);
80void CmdHIDdemodFSK(int findone, int *high, int *low, int ledcontrol);
81void CmdAWIDdemodFSK(int findone, int *high, int *low, int ledcontrol); // Realtime demodulation mode for AWID26
82void CmdEM410xdemod(int findone, int *high, int *low, int ledcontrol);
83void CmdIOdemodFSK(int findone, int *high, int *low, int ledcontrol);
84void CopyIOtoT55x7(uint32_t hi, uint32_t lo, uint8_t longFMT); // Clone an ioProx card to T5557/T5567
85void SimulateTagLowFrequencyBidir(int divisor, int max_bitlen);
86void CopyHIDtoT55x7(uint32_t hi2, uint32_t hi, uint32_t lo, uint8_t longFMT); // Clone an HID card to T5557/T5567
87void WriteEM410x(uint32_t card, uint32_t id_hi, uint32_t id_lo);
88void CopyIndala64toT55x7(int hi, int lo); // Clone Indala 64-bit tag by UID to T55x7
89void CopyIndala224toT55x7(int uid1, int uid2, int uid3, int uid4, int uid5, int uid6, int uid7); // Clone Indala 224-bit tag by UID to T55x7
90void T55xxWriteBlock(uint32_t Data, uint32_t Block, uint32_t Pwd, uint8_t PwdMode);
91void T55xxReadBlock(uint32_t Block, uint32_t Pwd, uint8_t PwdMode );
92void T55xxReadTrace(void);
93void TurnReadLFOn();
94void EM4xReadWord(uint8_t Address, uint32_t Pwd, uint8_t PwdMode);
95void EM4xWriteWord(uint32_t Data, uint8_t Address, uint32_t Pwd, uint8_t PwdMode);
96void CopyViKingtoT55x7(uint32_t block1,uint32_t block2);
97
98
99/// iso14443.h
100void SimulateIso14443bTag(void);
101void AcquireRawAdcSamplesIso14443b(uint32_t parameter);
102void ReadSTMemoryIso14443b(uint32_t);
103void RAMFUNC SnoopIso14443b(void);
104void SendRawCommand14443B(uint32_t, uint32_t, uint8_t, uint8_t[]);
105
106/// iso14443a.h
107void RAMFUNC SniffIso14443a(uint8_t param);
108void SimulateIso14443aTag(int tagType, int flags, byte_t* data);
109void ReaderIso14443a(UsbCommand * c);
110// Also used in iclass.c
111bool RAMFUNC LogTrace(const uint8_t *btBytes, uint16_t len, uint32_t timestamp_start, uint32_t timestamp_end, uint8_t *parity, bool readerToTag);
112void GetParity(const uint8_t *pbtCmd, uint16_t len, uint8_t *parity);
113void iso14a_set_trigger(bool enable);
114
115void RAMFUNC SniffMifare(uint8_t param);
116
117/// epa.h
118void EPA_PACE_Collect_Nonce(UsbCommand * c);
119void EPA_PACE_Replay(UsbCommand *c);
120
121// mifarecmd.h
122void ReaderMifare(bool first_try);
123int32_t dist_nt(uint32_t nt1, uint32_t nt2);
124void MifareReadBlock(uint8_t arg0, uint8_t arg1, uint8_t arg2, uint8_t *data);
125void MifareUReadBlock(uint8_t arg0, uint8_t arg1, uint8_t *datain);
126void MifareUC_Auth(uint8_t arg0, uint8_t *datain);
127void MifareUReadCard(uint8_t arg0, uint16_t arg1, uint8_t arg2, uint8_t *datain);
128void MifareReadSector(uint8_t arg0, uint8_t arg1, uint8_t arg2, uint8_t *datain);
129void MifareWriteBlock(uint8_t arg0, uint8_t arg1, uint8_t arg2, uint8_t *datain);
130//void MifareUWriteBlockCompat(uint8_t arg0,uint8_t *datain);
131void MifareUWriteBlock(uint8_t arg0, uint8_t arg1, uint8_t *datain);
132void MifareNested(uint32_t arg0, uint32_t arg1, uint32_t arg2, uint8_t *datain);
133void MifareChkKeys(uint16_t arg0, uint8_t arg1, uint8_t arg2, uint8_t *datain);
134void Mifare1ksim(uint8_t arg0, uint8_t arg1, uint8_t arg2, uint8_t *datain);
135void MifareSetDbgLvl(uint32_t arg0, uint32_t arg1, uint32_t arg2, uint8_t *datain);
136void MifareEMemClr(uint32_t arg0, uint32_t arg1, uint32_t arg2, uint8_t *datain);
137void MifareEMemSet(uint32_t arg0, uint32_t arg1, uint32_t arg2, uint8_t *datain);
138void MifareEMemGet(uint32_t arg0, uint32_t arg1, uint32_t arg2, uint8_t *datain);
139void MifareECardLoad(uint32_t arg0, uint32_t arg1, uint32_t arg2, uint8_t *datain);
140void MifareCSetBlock(uint32_t arg0, uint32_t arg1, uint32_t arg2, uint8_t *datain); // Work with "magic Chinese" card
141void MifareCGetBlock(uint32_t arg0, uint32_t arg1, uint32_t arg2, uint8_t *datain);
142void MifareCIdent(); // is "magic chinese" card?
143void MifareUSetPwd(uint8_t arg0, uint8_t *datain);
144
145void MifareCollectNonces(uint32_t arg0, uint32_t arg1);
146
147//desfire
148void Mifare_DES_Auth1(uint8_t arg0,uint8_t *datain);
149void Mifare_DES_Auth2(uint32_t arg0, uint8_t *datain);
150
151// mifaredesfire.h
152bool InitDesfireCard();
153void MifareSendCommand(uint8_t arg0,uint8_t arg1, uint8_t *datain);
154void MifareDesfireGetInformation();
155void MifareDES_Auth1(uint8_t arg0,uint8_t arg1,uint8_t arg2, uint8_t *datain);
156void ReaderMifareDES(uint32_t param, uint32_t param2, uint8_t * datain);
157int DesfireAPDU(uint8_t *cmd, size_t cmd_len, uint8_t *dataout);
158size_t CreateAPDU( uint8_t *datain, size_t len, uint8_t *dataout);
159void OnSuccess();
160void OnError(uint8_t reason);
161
162
163// desfire_crypto.h
164void *mifare_cryto_preprocess_data (desfiretag_t tag, void *data, size_t *nbytes, off_t offset, int communication_settings);
165void *mifare_cryto_postprocess_data (desfiretag_t tag, void *data, ssize_t *nbytes, int communication_settings);
166void mifare_cypher_single_block (desfirekey_t key, uint8_t *data, uint8_t *ivect, MifareCryptoDirection direction, MifareCryptoOperation operation, size_t block_size);
167void mifare_cypher_blocks_chained (desfiretag_t tag, desfirekey_t key, uint8_t *ivect, uint8_t *data, size_t data_size, MifareCryptoDirection direction, MifareCryptoOperation operation);
168size_t key_block_size (const desfirekey_t key);
169size_t padded_data_length (const size_t nbytes, const size_t block_size);
170size_t maced_data_length (const desfirekey_t key, const size_t nbytes);
171size_t enciphered_data_length (const desfiretag_t tag, const size_t nbytes, int communication_settings);
172void cmac_generate_subkeys (desfirekey_t key);
173void cmac (const desfirekey_t key, uint8_t *ivect, const uint8_t *data, size_t len, uint8_t *cmac);
174
175/// iso15693.h
176void RecordRawAdcSamplesIso15693(void);
177void AcquireRawAdcSamplesIso15693(void);
178void ReaderIso15693(uint32_t parameter); // Simulate an ISO15693 reader - greg
179void SimTagIso15693(uint32_t parameter, uint8_t *uid); // simulate an ISO15693 tag - greg
180void BruteforceIso15693Afi(uint32_t speed); // find an AFI of a tag - atrox
181void DirectTag15693Command(uint32_t datalen,uint32_t speed, uint32_t recv, uint8_t data[]); // send arbitrary commands from CLI - atrox
182void SetDebugIso15693(uint32_t flag);
183
184/// iclass.h
185void RAMFUNC SnoopIClass(void);
186void SimulateIClass(uint32_t arg0, uint32_t arg1, uint32_t arg2, uint8_t *datain);
187void ReaderIClass(uint8_t arg0);
188void ReaderIClass_Replay(uint8_t arg0,uint8_t *MAC);
189void IClass_iso14443A_GetPublic(uint8_t arg0);
190void iClass_Authentication(uint8_t *MAC);
191void iClass_WriteBlock(uint8_t blockNo, uint8_t *data);
192void iClass_ReadBlk(uint8_t blockNo);
193bool iClass_ReadBlock(uint8_t blockNo, uint8_t *readdata);
194void iClass_Dump(uint8_t blockno, uint8_t numblks);
195void iClass_Clone(uint8_t startblock, uint8_t endblock, uint8_t *data);
196void iClass_ReadCheck(uint8_t blockNo, uint8_t keyType);
197
198
199// hitag2.h
200void SnoopHitag(uint32_t type);
201void SimulateHitagTag(bool tag_mem_supplied, byte_t* data);
202void ReaderHitag(hitag_function htf, hitag_data* htd);
203
204// cmd.h
205bool cmd_receive(UsbCommand* cmd);
206bool cmd_send(uint32_t cmd, uint32_t arg0, uint32_t arg1, uint32_t arg2, void* data, size_t len);
207
208/// util.h
209
210#endif
Impressum, Datenschutz