]>
Commit | Line | Data |
---|---|---|
15c4dc5a | 1 | //----------------------------------------------------------------------------- |
15c4dc5a | 2 | // Jonathan Westhues, Aug 2005 |
cee5a30d | 3 | // Gerhard de Koning Gans, April 2008, May 2011 |
bd20f8f4 | 4 | // |
5 | // This code is licensed to you under the terms of the GNU GPL, version 2 or, | |
6 | // at your option, any later version. See the LICENSE.txt file for the text of | |
7 | // the license. | |
8 | //----------------------------------------------------------------------------- | |
9 | // Definitions internal to the app source. | |
15c4dc5a | 10 | //----------------------------------------------------------------------------- |
11 | ||
12 | #ifndef __APPS_H | |
13 | #define __APPS_H | |
14 | ||
f7e3ed82 | 15 | #include <stdint.h> |
16 | #include <stddef.h> | |
f38a1528 | 17 | #include <stdlib.h> |
7838f4be | 18 | #include <sys/types.h> |
19 | #include "common.h" | |
20 | #include "crc32.h" | |
21 | #include "lfdemod.h" | |
117d9ec2 | 22 | #include "BigBuf.h" |
9783989b | 23 | #include "fpgaloader.h" |
6427695b | 24 | #include "usb_cdc.h" |
db25599d | 25 | #include "hitag2.h" |
0db11b71 | 26 | #include "hitagS.h" |
db25599d | 27 | #include "mifare.h" |
36804420 | 28 | #include "pcf7931.h" |
0ec548dc | 29 | //#include "des.h" |
30 | //#include "aes.h" | |
31 | #include "desfire.h" | |
32 | ||
a501c82b | 33 | |
34 | extern const uint8_t OddByteParity[256]; | |
1e262141 | 35 | extern int rsamples; // = 0; |
36 | extern int tracing; // = TRUE; | |
37 | extern uint8_t trigger; | |
15c4dc5a | 38 | |
6c1e2d95 | 39 | // This may be used (sparingly) to declare a function to be copied to |
40 | // and executed from RAM | |
41 | #define RAMFUNC __attribute((long_call, section(".ramfunc"))) | |
42 | ||
15c4dc5a | 43 | /// appmain.h |
44 | void ReadMem(int addr); | |
45 | void __attribute__((noreturn)) AppMain(void); | |
46 | void SamyRun(void); | |
47 | //void DbpIntegers(int a, int b, int c); | |
48 | void DbpString(char *str); | |
49 | void Dbprintf(const char *fmt, ...); | |
d19929cb | 50 | void Dbhexdump(int len, uint8_t *d, bool bAsci); |
15c4dc5a | 51 | |
3b692427 | 52 | // ADC Vref = 3300mV, and an (10M+1M):1M voltage divider on the HF input can measure voltages up to 36300 mV |
53 | #define MAX_ADC_HF_VOLTAGE 36300 | |
54 | // ADC Vref = 3300mV, and an (10000k+240k):240k voltage divider on the LF input can measure voltages up to 140800 mV | |
55 | #define MAX_ADC_LF_VOLTAGE 140800 | |
9ca155ba M |
56 | int AvgAdc(int ch); |
57 | ||
15c4dc5a | 58 | void ToSendStuffBit(int b); |
59 | void ToSendReset(void); | |
60 | void ListenReaderField(int limit); | |
15c4dc5a | 61 | extern int ToSendMax; |
f7e3ed82 | 62 | extern uint8_t ToSend[]; |
15c4dc5a | 63 | |
15c4dc5a | 64 | |
65 | /// lfops.h | |
f6d9fb17 MHS |
66 | extern uint8_t decimation; |
67 | extern uint8_t bits_per_sample ; | |
68 | extern bool averaging; | |
69 | ||
bf7163bd | 70 | void AcquireRawAdcSamples125k(int divisor); |
9276e859 | 71 | void ModThenAcquireRawAdcSamples125k(uint32_t delay_off, uint32_t period_0, uint32_t period_1, uint8_t *command); |
15c4dc5a | 72 | void ReadTItag(void); |
f7e3ed82 | 73 | void WriteTItag(uint32_t idhi, uint32_t idlo, uint16_t crc); |
9276e859 | 74 | |
15c4dc5a | 75 | void AcquireTiType(void); |
76 | void AcquireRawBitsTI(void); | |
74daee24 | 77 | void SimulateTagLowFrequency(int period, int gap, int ledcontrol); |
a126332a | 78 | void SimulateTagLowFrequencyBidir(int divisor, int max_bitlen); |
385f3987 | 79 | void CmdHIDsimTAG(int hi, int lo, int ledcontrol); |
abd6112f | 80 | void CmdFSKsimTAG(uint16_t arg1, uint16_t arg2, size_t size, uint8_t *BitStream); |
81 | void CmdASKsimTag(uint16_t arg1, uint16_t arg2, size_t size, uint8_t *BitStream); | |
872e3d4d | 82 | void CmdPSKsimTag(uint16_t arg1, uint16_t arg2, size_t size, uint8_t *BitStream); |
15c4dc5a | 83 | void CmdHIDdemodFSK(int findone, int *high, int *low, int ledcontrol); |
db25599d | 84 | void CmdAWIDdemodFSK(int findone, int *high, int *low, int ledcontrol); // Realtime demodulation mode for AWID26 |
6ff6ade2 | 85 | void CmdEM410xdemod(int findone, int *high, int *low, int ledcontrol); |
a1f3bb12 | 86 | void CmdIOdemodFSK(int findone, int *high, int *low, int ledcontrol); |
94422fa2 | 87 | void CopyIOtoT55x7(uint32_t hi, uint32_t lo); // Clone an ioProx card to T5557/T5567 |
54a942b0 | 88 | void CopyHIDtoT55x7(uint32_t hi2, uint32_t hi, uint32_t lo, uint8_t longFMT); // Clone an HID card to T5557/T5567 |
a126332a | 89 | void CopyVikingtoT55xx(uint32_t block1, uint32_t block2, uint8_t Q5); |
2d4eae76 | 90 | void WriteEM410x(uint32_t card, uint32_t id_hi, uint32_t id_lo); |
1d0ccbe0 | 91 | void CopyIndala64toT55x7(uint32_t hi, uint32_t lo); // Clone Indala 64-bit tag by UID to T55x7 |
92 | void CopyIndala224toT55x7(uint32_t uid1, uint32_t uid2, uint32_t uid3, uint32_t uid4, uint32_t uid5, uint32_t uid6, uint32_t uid7); // Clone Indala 224-bit tag by UID to T55x7 | |
94422fa2 | 93 | void T55xxResetRead(void); |
a126332a | 94 | void T55xxWriteBlock(uint32_t Data, uint8_t Block, uint32_t Pwd, uint8_t PwdMode); |
95 | void T55xxWriteBlockExt(uint32_t Data, uint8_t Block, uint32_t Pwd, uint8_t PwdMode); | |
9276e859 | 96 | void T55xxReadBlock(uint16_t arg0, uint8_t Block, uint32_t Pwd); |
9276e859 | 97 | void T55xxWakeUp(uint32_t Pwd); |
f6c18637 | 98 | void TurnReadLFOn(); |
36804420 | 99 | void EM4xReadWord(uint8_t Address, uint32_t Pwd, uint8_t PwdMode); |
100 | void EM4xWriteWord(uint32_t Data, uint8_t Address, uint32_t Pwd, uint8_t PwdMode); | |
15c4dc5a | 101 | |
102 | /// iso14443.h | |
abb21530 | 103 | void SimulateIso14443bTag(void); |
104 | void AcquireRawAdcSamplesIso14443b(uint32_t parameter); | |
105 | void ReadSTMemoryIso14443b(uint32_t); | |
106 | void RAMFUNC SnoopIso14443b(void); | |
7cf3ef20 | 107 | void SendRawCommand14443B(uint32_t, uint32_t, uint8_t, uint8_t[]); |
15c4dc5a | 108 | |
109 | /// iso14443a.h | |
4d2e4eea | 110 | void RAMFUNC SniffIso14443a(uint8_t param); |
0db6ed9a | 111 | void SimulateIso14443aTag(int tagType, int flags, byte_t* data); |
902cb3c0 | 112 | void ReaderIso14443a(UsbCommand * c); |
1e262141 | 113 | // Also used in iclass.c |
a501c82b | 114 | bool RAMFUNC LogTrace(const uint8_t *btBytes, uint16_t len, uint32_t timestamp_start, uint32_t timestamp_end, uint8_t *parity, bool readerToTag); |
6a1f2d82 | 115 | void GetParity(const uint8_t *pbtCmd, uint16_t len, uint8_t *parity); |
902cb3c0 | 116 | void iso14a_set_trigger(bool enable); |
3000dc4e | 117 | |
5cd9ec01 | 118 | void RAMFUNC SniffMifare(uint8_t param); |
8556b852 | 119 | |
5acd09bd | 120 | /// epa.h |
902cb3c0 | 121 | void EPA_PACE_Collect_Nonce(UsbCommand * c); |
d0f3338e | 122 | void EPA_PACE_Replay(UsbCommand *c); |
5acd09bd | 123 | |
8556b852 | 124 | // mifarecmd.h |
810f5379 | 125 | //void ReaderMifare(bool first_try); |
126 | void ReaderMifare(bool first_try, uint8_t block ); | |
9492e0b0 | 127 | int32_t dist_nt(uint32_t nt1, uint32_t nt2); |
20f9a2a1 | 128 | void MifareReadBlock(uint8_t arg0, uint8_t arg1, uint8_t arg2, uint8_t *data); |
0ec548dc | 129 | void MifareUReadBlock(uint8_t arg0, uint8_t arg1, uint8_t *datain); |
4d2e4eea | 130 | void MifareUC_Auth(uint8_t arg0, uint8_t *datain); |
74daee24 | 131 | void MifareUReadCard(uint8_t arg0, uint16_t arg1, uint8_t arg2, uint8_t *datain); |
20f9a2a1 M |
132 | void MifareReadSector(uint8_t arg0, uint8_t arg1, uint8_t arg2, uint8_t *datain); |
133 | void MifareWriteBlock(uint8_t arg0, uint8_t arg1, uint8_t arg2, uint8_t *datain); | |
95aeb706 | 134 | //void MifareUWriteBlockCompat(uint8_t arg0,uint8_t *datain); |
135 | void MifareUWriteBlock(uint8_t arg0, uint8_t arg1, uint8_t *datain); | |
f397b5cc | 136 | void MifareNested(uint32_t arg0, uint32_t arg1, uint32_t arg2, uint8_t *datain); |
c188b1b9 | 137 | void MifareAcquireEncryptedNonces(uint32_t arg0, uint32_t arg1, uint32_t flags, uint8_t *datain); |
b10a759f | 138 | void MifareChkKeys(uint16_t arg0, uint8_t arg1, uint8_t arg2, uint8_t *datain); |
20f9a2a1 | 139 | void Mifare1ksim(uint8_t arg0, uint8_t arg1, uint8_t arg2, uint8_t *datain); |
8556b852 M |
140 | void MifareSetDbgLvl(uint32_t arg0, uint32_t arg1, uint32_t arg2, uint8_t *datain); |
141 | void MifareEMemClr(uint32_t arg0, uint32_t arg1, uint32_t arg2, uint8_t *datain); | |
142 | void MifareEMemSet(uint32_t arg0, uint32_t arg1, uint32_t arg2, uint8_t *datain); | |
143 | void MifareEMemGet(uint32_t arg0, uint32_t arg1, uint32_t arg2, uint8_t *datain); | |
144 | void MifareECardLoad(uint32_t arg0, uint32_t arg1, uint32_t arg2, uint8_t *datain); | |
c2731f37 | 145 | void MifareCSetBlock(uint32_t arg0, uint32_t arg1, uint8_t *datain); // Work with "magic Chinese" card |
146 | void MifareCGetBlock(uint32_t arg0, uint32_t arg1, uint8_t *datain); | |
d52e4e88 | 147 | void MifareCIdent(); // is "magic chinese" card? |
aa60d156 | 148 | void MifareUSetPwd(uint8_t arg0, uint8_t *datain); |
c2731f37 | 149 | void OnSuccessMagic(); |
150 | void OnErrorMagic(uint8_t reason); | |
add0504d | 151 | void MifareCollectNonces(uint32_t arg0, uint32_t arg1); |
152 | ||
6ff6ade2 | 153 | //desfire |
154 | void Mifare_DES_Auth1(uint8_t arg0,uint8_t *datain); | |
155 | void Mifare_DES_Auth2(uint32_t arg0, uint8_t *datain); | |
156 | ||
f38a1528 | 157 | // mifaredesfire.h |
f6c18637 | 158 | bool InitDesfireCard(); |
159 | void MifareSendCommand(uint8_t arg0,uint8_t arg1, uint8_t *datain); | |
160 | void MifareDesfireGetInformation(); | |
161 | void MifareDES_Auth1(uint8_t arg0,uint8_t arg1,uint8_t arg2, uint8_t *datain); | |
162 | void ReaderMifareDES(uint32_t param, uint32_t param2, uint8_t * datain); | |
163 | int DesfireAPDU(uint8_t *cmd, size_t cmd_len, uint8_t *dataout); | |
164 | size_t CreateAPDU( uint8_t *datain, size_t len, uint8_t *dataout); | |
165 | void OnSuccess(); | |
225ccb91 | 166 | void OnError(uint8_t reason); |
f6c18637 | 167 | |
168 | ||
0ec548dc | 169 | // desfire_crypto.h |
170 | void *mifare_cryto_preprocess_data (desfiretag_t tag, void *data, size_t *nbytes, off_t offset, int communication_settings); | |
171 | void *mifare_cryto_postprocess_data (desfiretag_t tag, void *data, ssize_t *nbytes, int communication_settings); | |
172 | void mifare_cypher_single_block (desfirekey_t key, uint8_t *data, uint8_t *ivect, MifareCryptoDirection direction, MifareCryptoOperation operation, size_t block_size); | |
173 | void mifare_cypher_blocks_chained (desfiretag_t tag, desfirekey_t key, uint8_t *ivect, uint8_t *data, size_t data_size, MifareCryptoDirection direction, MifareCryptoOperation operation); | |
174 | size_t key_block_size (const desfirekey_t key); | |
175 | size_t padded_data_length (const size_t nbytes, const size_t block_size); | |
176 | size_t maced_data_length (const desfirekey_t key, const size_t nbytes); | |
177 | size_t enciphered_data_length (const desfiretag_t tag, const size_t nbytes, int communication_settings); | |
178 | void cmac_generate_subkeys (desfirekey_t key); | |
179 | void cmac (const desfirekey_t key, uint8_t *ivect, const uint8_t *data, size_t len, uint8_t *cmac); | |
f38a1528 | 180 | |
15c4dc5a | 181 | /// iso15693.h |
9455b51c | 182 | void RecordRawAdcSamplesIso15693(void); |
15c4dc5a | 183 | void AcquireRawAdcSamplesIso15693(void); |
f7e3ed82 | 184 | void ReaderIso15693(uint32_t parameter); // Simulate an ISO15693 reader - greg |
3649b640 | 185 | void SimTagIso15693(uint32_t parameter, uint8_t *uid); // simulate an ISO15693 tag - greg |
9455b51c | 186 | void BruteforceIso15693Afi(uint32_t speed); // find an AFI of a tag - atrox |
187 | void DirectTag15693Command(uint32_t datalen,uint32_t speed, uint32_t recv, uint8_t data[]); // send arbitrary commands from CLI - atrox | |
188 | void SetDebugIso15693(uint32_t flag); | |
15c4dc5a | 189 | |
cee5a30d | 190 | /// iclass.h |
191 | void RAMFUNC SnoopIClass(void); | |
ff7bb4ef | 192 | void SimulateIClass(uint32_t arg0, uint32_t arg1, uint32_t arg2, uint8_t *datain); |
1e262141 | 193 | void ReaderIClass(uint8_t arg0); |
f38a1528 | 194 | void ReaderIClass_Replay(uint8_t arg0,uint8_t *MAC); |
195 | void IClass_iso14443A_GetPublic(uint8_t arg0); | |
e98572a1 | 196 | void iClass_Authentication(uint8_t *MAC); |
197 | void iClass_WriteBlock(uint8_t blockNo, uint8_t *data); | |
198 | void iClass_ReadBlk(uint8_t blockNo); | |
199 | bool iClass_ReadBlock(uint8_t blockNo, uint8_t *readdata); | |
200 | void iClass_Dump(uint8_t blockno, uint8_t numblks); | |
201 | void iClass_Clone(uint8_t startblock, uint8_t endblock, uint8_t *data); | |
202 | void iClass_ReadCheck(uint8_t blockNo, uint8_t keyType); | |
cee5a30d | 203 | |
36804420 | 204 | |
d19929cb | 205 | // hitag2.h |
206 | void SnoopHitag(uint32_t type); | |
207 | void SimulateHitagTag(bool tag_mem_supplied, byte_t* data); | |
208 | void ReaderHitag(hitag_function htf, hitag_data* htd); | |
209 | ||
0db11b71 | 210 | //hitagS.h |
211 | void SimulateHitagSTag(bool tag_mem_supplied, byte_t* data); | |
212 | void ReadHitagS(hitag_function htf, hitag_data* htd); | |
213 | void WritePageHitagS(hitag_function htf, hitag_data* htd,int page); | |
214 | void check_challenges(bool file_given, byte_t* data); | |
215 | ||
216 | ||
6e82300d | 217 | // cmd.h |
218 | bool cmd_receive(UsbCommand* cmd); | |
79a73ab2 | 219 | bool cmd_send(uint32_t cmd, uint32_t arg0, uint32_t arg1, uint32_t arg2, void* data, size_t len); |
6e82300d | 220 | |
15c4dc5a | 221 | /// util.h |
1d0ccbe0 | 222 | void HfSnoop(int , int); |
810f5379 | 223 | //EMV functions emvcmd.h |
224 | void EMVTransaction(void); | |
225 | void EMVgetUDOL(void); | |
226 | void EMVloadvalue(uint32_t tag, uint8_t* datain); | |
227 | void EMVdumpcard(void); | |
15c4dc5a | 228 | |
229 | #endif |