+int CmdAnalyseCRC(const char *Cmd) {
+
+ char cmdp = param_getchar(Cmd, 0);
+ if (strlen(Cmd) == 0 || cmdp == 'h' || cmdp == 'H') return usage_analyse_crc();
+
+ int len = strlen(Cmd);
+ if ( len & 1 ) return usage_analyse_crc();
+
+ // add 1 for null terminator.
+ uint8_t *data = malloc(len+1);
+ if ( data == NULL ) return 1;
+
+ if ( param_gethex(Cmd, 0, data, len)) {
+ free(data);
+ return usage_analyse_crc();
+ }
+ len >>= 1;
+
+ //PrintAndLog("\nTests with '%s' hex bytes", sprint_hex(data, len));
+
+ PrintAndLog("\nTests of reflection. Two current methods in source code");
+ PrintAndLog(" reflect(0x3e23L,3) is %04X == 0x3e26", reflect(0x3e23L,3) );
+ PrintAndLog(" SwapBits(0x3e23L,3) is %04X == 0x3e26", SwapBits(0x3e23L,3) );
+ PrintAndLog(" 0xB400 == %04X", reflect( (1 << 16 | 0xb400),16) );
+
+ //
+ // Test of CRC16, '123456789' string.
+ //
+ PrintAndLog("\nTests with '123456789' string");
+ uint8_t dataStr[] = { 0x31,0x32,0x33,0x34,0x35,0x36,0x37,0x38,0x39 };
+ uint8_t legic8 = CRC8Legic(dataStr, sizeof(dataStr));
+
+ PrintAndLog("LEGIC: CRC16: %X", CRC16Legic(dataStr, sizeof(dataStr), legic8));
+
+ //these below has been tested OK.
+ PrintAndLog("Confirmed CRC Implementations");
+ PrintAndLog("LEGIC: CRC8 : %X (0xC6 expected)", legic8);
+ PrintAndLog("MAXIM: CRC8 : %X (0xA1 expected)", CRC8Maxim(dataStr, sizeof(dataStr)));
+ PrintAndLog("DNP : CRC16: %X (0x82EA expected)", CRC16_DNP(dataStr, sizeof(dataStr)));
+ PrintAndLog("CCITT: CRC16: %X (0xE5CC expected)", CRC16_CCITT(dataStr, sizeof(dataStr)));
+
+ PrintAndLog("ICLASS org: CRC16: %X (0x expected)",iclass_crc16( (char*)dataStr, sizeof(dataStr)));
+ PrintAndLog("ICLASS ice: CRC16: %X (0x expected)",CRC16_ICLASS(dataStr, sizeof(dataStr)));
+
+
+
+ uint8_t dataStr1234[] = { 0x1,0x2,0x3,0x4};
+ PrintAndLog("ISO15693 org: : CRC16: %X (0xF0B8 expected)", Iso15693Crc(dataStr1234, sizeof(dataStr1234)));
+ PrintAndLog("ISO15693 ice: : CRC16: %X (0xF0B8 expected)", CRC16_Iso15693(dataStr1234, sizeof(dataStr1234)));
+
+ free(data);
+ return 0;
+}
+int CmdAnalyseCHKSUM(const char *Cmd){
+
+ uint8_t data[50];
+ uint8_t cmdp = 0;
+ uint32_t mask = 0xFF;
+ bool errors = false;
+ int len = 0;
+ memset(data, 0x0, sizeof(data));
+
+ while(param_getchar(Cmd, cmdp) != 0x00) {
+ switch(param_getchar(Cmd, cmdp)) {
+ case 'b':
+ case 'B':
+ param_gethex_ex(Cmd, cmdp+1, data, &len);
+ if ( len%2 ) errors = true;
+ len >>= 1;
+ cmdp += 2;
+ break;
+ case 'm':
+ case 'M':
+ mask = param_get32ex(Cmd, cmdp+1, 0, 16);
+ cmdp += 2;
+ break;
+ case 'h':
+ case 'H':
+ return usage_analyse_checksum();
+ default:
+ PrintAndLog("Unknown parameter '%c'", param_getchar(Cmd, cmdp));
+ errors = true;
+ break;
+ }
+ if(errors) break;
+ }
+ //Validations
+ if(errors) return usage_analyse_checksum();
+
+ PrintAndLog("\nByte Add | 0x%X", calcSumByteAdd(data, len, mask));
+ PrintAndLog("Nibble Add | 0x%X", calcSumNibbleAdd(data, len, mask));
+ PrintAndLog("Crumb Add | 0x%X", calcSumCrumbAdd(data, len, mask));
+
+ PrintAndLog("\nByte Subtract | 0x%X", calcSumByteSub(data, len, mask));
+ PrintAndLog("Nibble Subtract | 0x%X", calcSumNibbleSub(data, len, mask));
+
+ PrintAndLog("\nCHECKSUM - One's complement");
+ PrintAndLog("Byte Add | 0x%X", calcSumByteAddOnes(data, len, mask));
+ PrintAndLog("Nibble Add | 0x%X", calcSumNibbleAddOnes(data, len, mask));
+ PrintAndLog("Crumb Add | 0x%X", calcSumCrumbAddOnes(data, len, mask));
+
+ PrintAndLog("Byte Subtract | 0x%X", calcSumByteSubOnes(data, len, mask));
+ PrintAndLog("Nibble Subtract | 0x%X", calcSumNibbleSubOnes(data, len, mask));
+
+ return 0;
+}
+
+int CmdAnalyseDates(const char *Cmd){
+ // look for datestamps in a given array of bytes
+ PrintAndLog("To be implemented. Feel free to contribute!");
+ return 0;
+}
+int CmdAnalyseTEASelfTest(const char *Cmd){
+
+ uint8_t v[8], v_le[8];
+ memset(v, 0x00, sizeof(v));
+ memset(v_le, 0x00, sizeof(v_le));
+ uint8_t* v_ptr = v_le;
+
+ uint8_t cmdlen = strlen(Cmd);
+ cmdlen = ( sizeof(v)<<2 < cmdlen ) ? sizeof(v)<<2 : cmdlen;
+
+ if ( param_gethex(Cmd, 0, v, cmdlen) > 0 ){
+ PrintAndLog("can't read hex chars, uneven? :: %u", cmdlen);
+ return 1;
+ }
+
+ SwapEndian64ex(v , 8, 4, v_ptr);
+
+ // ENCRYPTION KEY:
+ uint8_t key[16] = {0x55,0xFE,0xF6,0x30,0x62,0xBF,0x0B,0xC1,0xC9,0xB3,0x7C,0x34,0x97,0x3E,0x29,0xFB };
+ uint8_t keyle[16];
+ uint8_t* key_ptr = keyle;
+ SwapEndian64ex(key , sizeof(key), 4, key_ptr);
+
+ PrintAndLog("TEST LE enc| %s", sprint_hex(v_ptr, 8));
+
+ tea_decrypt(v_ptr, key_ptr);
+ PrintAndLog("TEST LE dec | %s", sprint_hex_ascii(v_ptr, 8));
+
+ tea_encrypt(v_ptr, key_ptr);
+ tea_encrypt(v_ptr, key_ptr);
+ PrintAndLog("TEST enc2 | %s", sprint_hex_ascii(v_ptr, 8));
+
+ return 0;
+}