-//-----------------------------------------------------------------------------\r
-// Merlok, May 2011\r
-// Many authors, that makes it possible\r
-//\r
-// This code is licensed to you under the terms of the GNU GPL, version 2 or,\r
-// at your option, any later version. See the LICENSE.txt file for the text of\r
-// the license.\r
-//-----------------------------------------------------------------------------\r
-// code for work with mifare cards.\r
-//-----------------------------------------------------------------------------\r
-\r
-#ifndef __MIFAREUTIL_H\r
-#define __MIFAREUTIL_H\r
-\r
-// mifare authentication\r
-#define CRYPT_NONE 0\r
-#define CRYPT_ALL 1\r
-#define CRYPT_REQUEST 2\r
-#define AUTH_FIRST 0\r
-#define AUTH_NESTED 2\r
-\r
-// mifare 4bit card answers\r
-#define CARD_ACK 0x0A // 1010 - ACK\r
-#define CARD_NACK_NA 0x04 // 0100 - NACK, not allowed (command not allowed)\r
-#define CARD_NACK_TR 0x05 // 0101 - NACK, transmission error\r
-\r
-// reader voltage field detector\r
-#define MF_MINFIELDV 4000\r
-\r
-// debug\r
-// 0 - no debug messages 1 - error messages 2 - all messages 4 - extended debug mode\r
-#define MF_DBG_NONE 0\r
-#define MF_DBG_ERROR 1\r
-#define MF_DBG_ALL 2\r
-#define MF_DBG_EXTENDED 4\r
-\r
-extern int MF_DBGLEVEL;\r
-\r
-//mifare emulator states\r
-#define MFEMUL_NOFIELD 0\r
-#define MFEMUL_IDLE 1\r
-#define MFEMUL_SELECT1 2\r
-#define MFEMUL_SELECT2 3\r
-#define MFEMUL_AUTH1 4\r
-#define MFEMUL_AUTH2 5\r
-#define MFEMUL_WORK 6\r
-#define MFEMUL_WRITEBL2 7\r
-#define MFEMUL_INTREG_INC 8\r
-#define MFEMUL_INTREG_DEC 9\r
-#define MFEMUL_INTREG_REST 10\r
-#define MFEMUL_HALTED 11\r
-\r
-#define cardSTATE_TO_IDLE() cardSTATE = MFEMUL_IDLE; LED_B_OFF(); LED_C_OFF();\r
-\r
-//functions\r
-uint8_t* mifare_get_bigbufptr(void);\r
-int mifare_sendcmd_short(struct Crypto1State *pcs, uint8_t crypted, uint8_t cmd, uint8_t data, uint8_t* answer, uint32_t *timing);\r
-int mifare_sendcmd_shortex(struct Crypto1State *pcs, uint8_t crypted, uint8_t cmd, uint8_t data, uint8_t* answer, uint32_t * parptr, uint32_t *timing);\r
-\r
-int mifare_classic_auth(struct Crypto1State *pcs, uint32_t uid, \\r
- uint8_t blockNo, uint8_t keyType, uint64_t ui64Key, uint64_t isNested);\r
-int mifare_classic_authex(struct Crypto1State *pcs, uint32_t uid, \\r
- uint8_t blockNo, uint8_t keyType, uint64_t ui64Key, uint64_t isNested, uint32_t * ntptr, uint32_t *timing);\r
-int mifare_classic_readblock(struct Crypto1State *pcs, uint32_t uid, uint8_t blockNo, uint8_t *blockData); \r
-int mifare_classic_writeblock(struct Crypto1State *pcs, uint32_t uid, uint8_t blockNo, uint8_t *blockData);\r
-int mifare_classic_halt(struct Crypto1State *pcs, uint32_t uid); \r
-\r
-// crypto functions\r
-void mf_crypto1_decrypt(struct Crypto1State *pcs, uint8_t *receivedCmd, int len);\r
-void mf_crypto1_encrypt(struct Crypto1State *pcs, uint8_t *data, int len, uint32_t *par);\r
-uint8_t mf_crypto1_encrypt4bit(struct Crypto1State *pcs, uint8_t data);\r
-\r
-// memory management\r
-uint8_t* mifare_get_bigbufptr(void);\r
-uint8_t* eml_get_bigbufptr_sendbuf(void);\r
-uint8_t* eml_get_bigbufptr_recbuf(void);\r
-\r
-// emulator functions\r
-void emlClearMem(void);\r
-void emlSetMem(uint8_t *data, int blockNum, int blocksCount);\r
-void emlGetMem(uint8_t *data, int blockNum, int blocksCount);\r
-void emlGetMemBt(uint8_t *data, int bytePtr, int byteCount);\r
-uint64_t emlGetKey(int sectorNum, int keyType);\r
-int emlGetValBl(uint32_t *blReg, uint8_t *blBlock, int blockNum);\r
-int emlSetValBl(uint32_t blReg, uint8_t blBlock, int blockNum);\r
-int emlCheckValBl(int blockNum);\r
-\r
-#endif
\ No newline at end of file
+//-----------------------------------------------------------------------------
+// Merlok, May 2011
+// Many authors, that makes it possible
+//
+// This code is licensed to you under the terms of the GNU GPL, version 2 or,
+// at your option, any later version. See the LICENSE.txt file for the text of
+// the license.
+//-----------------------------------------------------------------------------
+// code for work with mifare cards.
+//-----------------------------------------------------------------------------
+
+#ifndef __MIFAREUTIL_H
+#define __MIFAREUTIL_H
+
+// mifare authentication
+#define CRYPT_NONE 0
+#define CRYPT_ALL 1
+#define CRYPT_REQUEST 2
+#define AUTH_FIRST 0
+#define AUTH_NESTED 2
+
+// mifare 4bit card answers
+#define CARD_ACK 0x0A // 1010 - ACK
+#define CARD_NACK_NA 0x04 // 0100 - NACK, not allowed (command not allowed)
+#define CARD_NACK_TR 0x05 // 0101 - NACK, transmission error
+
+// reader voltage field detector
+#define MF_MINFIELDV 4000
+
+// debug
+// 0 - no debug messages 1 - error messages 2 - all messages 4 - extended debug mode
+#define MF_DBG_NONE 0
+#define MF_DBG_ERROR 1
+#define MF_DBG_ALL 2
+#define MF_DBG_EXTENDED 4
+
+extern int MF_DBGLEVEL;
+
+//mifare emulator states
+#define MFEMUL_NOFIELD 0
+#define MFEMUL_IDLE 1
+#define MFEMUL_SELECT1 2
+#define MFEMUL_SELECT2 3
+#define MFEMUL_AUTH1 4
+#define MFEMUL_AUTH2 5
+#define MFEMUL_WORK 6
+#define MFEMUL_WRITEBL2 7
+#define MFEMUL_INTREG_INC 8
+#define MFEMUL_INTREG_DEC 9
+#define MFEMUL_INTREG_REST 10
+#define MFEMUL_HALTED 11
+
+#define cardSTATE_TO_IDLE() cardSTATE = MFEMUL_IDLE; LED_B_OFF(); LED_C_OFF();
+
+//functions
+uint8_t* mifare_get_bigbufptr(void);
+int mifare_sendcmd_short(struct Crypto1State *pcs, uint8_t crypted, uint8_t cmd, uint8_t data, uint8_t* answer, uint32_t *timing);
+int mifare_sendcmd_short_special(struct Crypto1State *pcs, uint8_t crypted, uint8_t cmd, uint8_t *data, uint8_t* amswer, uint8_t *timing);
+int mifare_sendcmd_short_mfucauth(struct Crypto1State *pcs, uint8_t crypted, uint8_t cmd, uint8_t *data, uint8_t* amswer, uint32_t *timing);
+int mifare_sendcmd_shortex(struct Crypto1State *pcs, uint8_t crypted, uint8_t cmd, uint8_t data, uint8_t* answer, uint32_t * parptr, uint32_t *timing);
+
+int mifare_classic_auth(struct Crypto1State *pcs, uint32_t uid, \
+uint8_t blockNo, uint8_t keyType, uint64_t ui64Key, uint64_t isNested);
+int mifare_classic_authex(struct Crypto1State *pcs, uint32_t uid, \
+uint8_t blockNo, uint8_t keyType, uint64_t ui64Key, uint64_t isNested, uint32_t * ntptr, uint32_t *timing);
+int mifare_classic_readblock(struct Crypto1State *pcs, uint32_t uid, uint8_t blockNo, uint8_t *blockData);
+int mifare_ultra_auth1(uint32_t cuid, uint8_t *blockData);
+int mifare_ultra_auth2(uint32_t cuid, uint8_t *key, uint8_t *blockData);
+int mifare_ultra_readblock(uint32_t uid, uint8_t blockNo, uint8_t *blockData);
+int mifare_classic_writeblock(struct Crypto1State *pcs, uint32_t uid, uint8_t blockNo, uint8_t *blockData);
+int mifare_ultra_writeblock(uint32_t uid, uint8_t blockNo, uint8_t *blockData);
+int mifare_ultra_special_writeblock(uint32_t uid, uint8_t blockNo, uint8_t *blockData);
+int mifare_classic_halt(struct Crypto1State *pcs, uint32_t uid);
+int mifare_ultra_halt(uint32_t uid);
+
+//desfire
+int mifare_desfire_des_auth1(uint32_t uid, uint8_t *blockData);
+int mifare_desfire_des_auth2(uint32_t uid, uint8_t *key, uint8_t *blockData);
+
+// crypto functions
+void mf_crypto1_decrypt(struct Crypto1State *pcs, uint8_t *receivedCmd, int len);
+void mf_crypto1_encrypt(struct Crypto1State *pcs, uint8_t *data, int len, uint32_t *par);
+uint8_t mf_crypto1_encrypt4bit(struct Crypto1State *pcs, uint8_t data);
+
+// memory management
+uint8_t* mifare_get_bigbufptr(void);
+uint8_t* eml_get_bigbufptr_sendbuf(void);
+uint8_t* eml_get_bigbufptr_recbuf(void);
+
+// emulator functions
+void emlClearMem(void);
+void emlSetMem(uint8_t *data, int blockNum, int blocksCount);
+void emlGetMem(uint8_t *data, int blockNum, int blocksCount);
+void emlGetMemBt(uint8_t *data, int bytePtr, int byteCount);
+uint64_t emlGetKey(int sectorNum, int keyType);
+int emlGetValBl(uint32_t *blReg, uint8_t *blBlock, int blockNum);
+int emlSetValBl(uint32_t blReg, uint8_t blBlock, int blockNum);
+int emlCheckValBl(int blockNum);
+
+#endif