]>
Commit | Line | Data |
---|---|---|
15c4dc5a | 1 | //----------------------------------------------------------------------------- |
15c4dc5a | 2 | // Jonathan Westhues, Aug 2005 |
cee5a30d | 3 | // Gerhard de Koning Gans, April 2008, May 2011 |
bd20f8f4 | 4 | // |
5 | // This code is licensed to you under the terms of the GNU GPL, version 2 or, | |
6 | // at your option, any later version. See the LICENSE.txt file for the text of | |
7 | // the license. | |
8 | //----------------------------------------------------------------------------- | |
9 | // Definitions internal to the app source. | |
15c4dc5a | 10 | //----------------------------------------------------------------------------- |
15c4dc5a | 11 | #ifndef __APPS_H |
12 | #define __APPS_H | |
13 | ||
f7e3ed82 | 14 | #include <stdint.h> |
15 | #include <stddef.h> | |
f38a1528 | 16 | #include <stdlib.h> |
7838f4be | 17 | #include <sys/types.h> |
18 | #include "common.h" | |
19 | #include "crc32.h" | |
20 | #include "lfdemod.h" | |
117d9ec2 | 21 | #include "BigBuf.h" |
9783989b | 22 | #include "fpgaloader.h" |
6427695b | 23 | #include "usb_cdc.h" |
db25599d | 24 | #include "hitag2.h" |
0db11b71 | 25 | #include "hitagS.h" |
db25599d | 26 | #include "mifare.h" |
36804420 | 27 | #include "pcf7931.h" |
0ec548dc | 28 | //#include "des.h" |
29 | //#include "aes.h" | |
30 | #include "desfire.h" | |
6fc68747 | 31 | #include "iso14443b.h" |
a501c82b | 32 | |
33 | extern const uint8_t OddByteParity[256]; | |
1e262141 | 34 | extern int rsamples; // = 0; |
35 | extern int tracing; // = TRUE; | |
36 | extern uint8_t trigger; | |
15c4dc5a | 37 | |
6c1e2d95 | 38 | // This may be used (sparingly) to declare a function to be copied to |
39 | // and executed from RAM | |
40 | #define RAMFUNC __attribute((long_call, section(".ramfunc"))) | |
41 | ||
15c4dc5a | 42 | /// appmain.h |
43 | void ReadMem(int addr); | |
44 | void __attribute__((noreturn)) AppMain(void); | |
45 | void SamyRun(void); | |
46 | //void DbpIntegers(int a, int b, int c); | |
47 | void DbpString(char *str); | |
48 | void Dbprintf(const char *fmt, ...); | |
d19929cb | 49 | void Dbhexdump(int len, uint8_t *d, bool bAsci); |
15c4dc5a | 50 | |
3b692427 | 51 | // ADC Vref = 3300mV, and an (10M+1M):1M voltage divider on the HF input can measure voltages up to 36300 mV |
52 | #define MAX_ADC_HF_VOLTAGE 36300 | |
53 | // ADC Vref = 3300mV, and an (10000k+240k):240k voltage divider on the LF input can measure voltages up to 140800 mV | |
54 | #define MAX_ADC_LF_VOLTAGE 140800 | |
9ca155ba M |
55 | int AvgAdc(int ch); |
56 | ||
15c4dc5a | 57 | void ToSendStuffBit(int b); |
58 | void ToSendReset(void); | |
59 | void ListenReaderField(int limit); | |
15c4dc5a | 60 | extern int ToSendMax; |
f7e3ed82 | 61 | extern uint8_t ToSend[]; |
15c4dc5a | 62 | |
15c4dc5a | 63 | |
64 | /// lfops.h | |
f6d9fb17 MHS |
65 | extern uint8_t decimation; |
66 | extern uint8_t bits_per_sample ; | |
67 | extern bool averaging; | |
68 | ||
bf7163bd | 69 | void AcquireRawAdcSamples125k(int divisor); |
9276e859 | 70 | void ModThenAcquireRawAdcSamples125k(uint32_t delay_off, uint32_t period_0, uint32_t period_1, uint8_t *command); |
15c4dc5a | 71 | void ReadTItag(void); |
f7e3ed82 | 72 | void WriteTItag(uint32_t idhi, uint32_t idlo, uint16_t crc); |
9276e859 | 73 | |
15c4dc5a | 74 | void AcquireTiType(void); |
75 | void AcquireRawBitsTI(void); | |
74daee24 | 76 | void SimulateTagLowFrequency(int period, int gap, int ledcontrol); |
a126332a | 77 | void SimulateTagLowFrequencyBidir(int divisor, int max_bitlen); |
385f3987 | 78 | void CmdHIDsimTAG(int hi, int lo, int ledcontrol); |
abd6112f | 79 | void CmdFSKsimTAG(uint16_t arg1, uint16_t arg2, size_t size, uint8_t *BitStream); |
80 | void CmdASKsimTag(uint16_t arg1, uint16_t arg2, size_t size, uint8_t *BitStream); | |
872e3d4d | 81 | void CmdPSKsimTag(uint16_t arg1, uint16_t arg2, size_t size, uint8_t *BitStream); |
15c4dc5a | 82 | void CmdHIDdemodFSK(int findone, int *high, int *low, int ledcontrol); |
db25599d | 83 | void CmdAWIDdemodFSK(int findone, int *high, int *low, int ledcontrol); // Realtime demodulation mode for AWID26 |
6ff6ade2 | 84 | void CmdEM410xdemod(int findone, int *high, int *low, int ledcontrol); |
a1f3bb12 | 85 | void CmdIOdemodFSK(int findone, int *high, int *low, int ledcontrol); |
94422fa2 | 86 | void CopyIOtoT55x7(uint32_t hi, uint32_t lo); // Clone an ioProx card to T5557/T5567 |
54a942b0 | 87 | void CopyHIDtoT55x7(uint32_t hi2, uint32_t hi, uint32_t lo, uint8_t longFMT); // Clone an HID card to T5557/T5567 |
a126332a | 88 | void CopyVikingtoT55xx(uint32_t block1, uint32_t block2, uint8_t Q5); |
2d4eae76 | 89 | void WriteEM410x(uint32_t card, uint32_t id_hi, uint32_t id_lo); |
1d0ccbe0 | 90 | void CopyIndala64toT55x7(uint32_t hi, uint32_t lo); // Clone Indala 64-bit tag by UID to T55x7 |
91 | void CopyIndala224toT55x7(uint32_t uid1, uint32_t uid2, uint32_t uid3, uint32_t uid4, uint32_t uid5, uint32_t uid6, uint32_t uid7); // Clone Indala 224-bit tag by UID to T55x7 | |
94422fa2 | 92 | void T55xxResetRead(void); |
a126332a | 93 | void T55xxWriteBlock(uint32_t Data, uint8_t Block, uint32_t Pwd, uint8_t PwdMode); |
94 | void T55xxWriteBlockExt(uint32_t Data, uint8_t Block, uint32_t Pwd, uint8_t PwdMode); | |
9276e859 | 95 | void T55xxReadBlock(uint16_t arg0, uint8_t Block, uint32_t Pwd); |
9276e859 | 96 | void T55xxWakeUp(uint32_t Pwd); |
f6c18637 | 97 | void TurnReadLFOn(); |
36804420 | 98 | void EM4xReadWord(uint8_t Address, uint32_t Pwd, uint8_t PwdMode); |
99 | void EM4xWriteWord(uint32_t Data, uint8_t Address, uint32_t Pwd, uint8_t PwdMode); | |
15c4dc5a | 100 | |
101 | /// iso14443.h | |
abb21530 | 102 | void SimulateIso14443bTag(void); |
103 | void AcquireRawAdcSamplesIso14443b(uint32_t parameter); | |
6fc68747 | 104 | void ReadSTMemoryIso14443b(uint8_t numofblocks); |
abb21530 | 105 | void RAMFUNC SnoopIso14443b(void); |
7cf3ef20 | 106 | void SendRawCommand14443B(uint32_t, uint32_t, uint8_t, uint8_t[]); |
15c4dc5a | 107 | |
108 | /// iso14443a.h | |
4d2e4eea | 109 | void RAMFUNC SniffIso14443a(uint8_t param); |
0db6ed9a | 110 | void SimulateIso14443aTag(int tagType, int flags, byte_t* data); |
902cb3c0 | 111 | void ReaderIso14443a(UsbCommand * c); |
1e262141 | 112 | // Also used in iclass.c |
a501c82b | 113 | bool RAMFUNC LogTrace(const uint8_t *btBytes, uint16_t len, uint32_t timestamp_start, uint32_t timestamp_end, uint8_t *parity, bool readerToTag); |
6a1f2d82 | 114 | void GetParity(const uint8_t *pbtCmd, uint16_t len, uint8_t *parity); |
902cb3c0 | 115 | void iso14a_set_trigger(bool enable); |
3000dc4e | 116 | |
5cd9ec01 | 117 | void RAMFUNC SniffMifare(uint8_t param); |
8556b852 | 118 | |
5acd09bd | 119 | /// epa.h |
902cb3c0 | 120 | void EPA_PACE_Collect_Nonce(UsbCommand * c); |
d0f3338e | 121 | void EPA_PACE_Replay(UsbCommand *c); |
5acd09bd | 122 | |
8556b852 | 123 | // mifarecmd.h |
810f5379 | 124 | //void ReaderMifare(bool first_try); |
125 | void ReaderMifare(bool first_try, uint8_t block ); | |
9492e0b0 | 126 | int32_t dist_nt(uint32_t nt1, uint32_t nt2); |
20f9a2a1 | 127 | void MifareReadBlock(uint8_t arg0, uint8_t arg1, uint8_t arg2, uint8_t *data); |
0ec548dc | 128 | void MifareUReadBlock(uint8_t arg0, uint8_t arg1, uint8_t *datain); |
4d2e4eea | 129 | void MifareUC_Auth(uint8_t arg0, uint8_t *datain); |
74daee24 | 130 | void MifareUReadCard(uint8_t arg0, uint16_t arg1, uint8_t arg2, uint8_t *datain); |
20f9a2a1 M |
131 | void MifareReadSector(uint8_t arg0, uint8_t arg1, uint8_t arg2, uint8_t *datain); |
132 | void MifareWriteBlock(uint8_t arg0, uint8_t arg1, uint8_t arg2, uint8_t *datain); | |
95aeb706 | 133 | //void MifareUWriteBlockCompat(uint8_t arg0,uint8_t *datain); |
134 | void MifareUWriteBlock(uint8_t arg0, uint8_t arg1, uint8_t *datain); | |
f397b5cc | 135 | void MifareNested(uint32_t arg0, uint32_t arg1, uint32_t arg2, uint8_t *datain); |
c188b1b9 | 136 | void MifareAcquireEncryptedNonces(uint32_t arg0, uint32_t arg1, uint32_t flags, uint8_t *datain); |
b10a759f | 137 | void MifareChkKeys(uint16_t arg0, uint8_t arg1, uint8_t arg2, uint8_t *datain); |
20f9a2a1 | 138 | void Mifare1ksim(uint8_t arg0, uint8_t arg1, uint8_t arg2, uint8_t *datain); |
8556b852 M |
139 | void MifareSetDbgLvl(uint32_t arg0, uint32_t arg1, uint32_t arg2, uint8_t *datain); |
140 | void MifareEMemClr(uint32_t arg0, uint32_t arg1, uint32_t arg2, uint8_t *datain); | |
141 | void MifareEMemSet(uint32_t arg0, uint32_t arg1, uint32_t arg2, uint8_t *datain); | |
142 | void MifareEMemGet(uint32_t arg0, uint32_t arg1, uint32_t arg2, uint8_t *datain); | |
143 | void MifareECardLoad(uint32_t arg0, uint32_t arg1, uint32_t arg2, uint8_t *datain); | |
c2731f37 | 144 | void MifareCSetBlock(uint32_t arg0, uint32_t arg1, uint8_t *datain); // Work with "magic Chinese" card |
145 | void MifareCGetBlock(uint32_t arg0, uint32_t arg1, uint8_t *datain); | |
d52e4e88 | 146 | void MifareCIdent(); // is "magic chinese" card? |
aa60d156 | 147 | void MifareUSetPwd(uint8_t arg0, uint8_t *datain); |
c2731f37 | 148 | void OnSuccessMagic(); |
149 | void OnErrorMagic(uint8_t reason); | |
add0504d | 150 | |
6ff6ade2 | 151 | //desfire |
152 | void Mifare_DES_Auth1(uint8_t arg0,uint8_t *datain); | |
153 | void Mifare_DES_Auth2(uint32_t arg0, uint8_t *datain); | |
154 | ||
f38a1528 | 155 | // mifaredesfire.h |
f6c18637 | 156 | bool InitDesfireCard(); |
157 | void MifareSendCommand(uint8_t arg0,uint8_t arg1, uint8_t *datain); | |
158 | void MifareDesfireGetInformation(); | |
159 | void MifareDES_Auth1(uint8_t arg0,uint8_t arg1,uint8_t arg2, uint8_t *datain); | |
160 | void ReaderMifareDES(uint32_t param, uint32_t param2, uint8_t * datain); | |
161 | int DesfireAPDU(uint8_t *cmd, size_t cmd_len, uint8_t *dataout); | |
162 | size_t CreateAPDU( uint8_t *datain, size_t len, uint8_t *dataout); | |
163 | void OnSuccess(); | |
225ccb91 | 164 | void OnError(uint8_t reason); |
f6c18637 | 165 | |
166 | ||
0ec548dc | 167 | // desfire_crypto.h |
168 | void *mifare_cryto_preprocess_data (desfiretag_t tag, void *data, size_t *nbytes, off_t offset, int communication_settings); | |
169 | void *mifare_cryto_postprocess_data (desfiretag_t tag, void *data, ssize_t *nbytes, int communication_settings); | |
170 | void mifare_cypher_single_block (desfirekey_t key, uint8_t *data, uint8_t *ivect, MifareCryptoDirection direction, MifareCryptoOperation operation, size_t block_size); | |
171 | void mifare_cypher_blocks_chained (desfiretag_t tag, desfirekey_t key, uint8_t *ivect, uint8_t *data, size_t data_size, MifareCryptoDirection direction, MifareCryptoOperation operation); | |
172 | size_t key_block_size (const desfirekey_t key); | |
173 | size_t padded_data_length (const size_t nbytes, const size_t block_size); | |
174 | size_t maced_data_length (const desfirekey_t key, const size_t nbytes); | |
175 | size_t enciphered_data_length (const desfiretag_t tag, const size_t nbytes, int communication_settings); | |
176 | void cmac_generate_subkeys (desfirekey_t key); | |
177 | void cmac (const desfirekey_t key, uint8_t *ivect, const uint8_t *data, size_t len, uint8_t *cmac); | |
f38a1528 | 178 | |
15c4dc5a | 179 | /// iso15693.h |
9455b51c | 180 | void RecordRawAdcSamplesIso15693(void); |
15c4dc5a | 181 | void AcquireRawAdcSamplesIso15693(void); |
f7e3ed82 | 182 | void ReaderIso15693(uint32_t parameter); // Simulate an ISO15693 reader - greg |
3649b640 | 183 | void SimTagIso15693(uint32_t parameter, uint8_t *uid); // simulate an ISO15693 tag - greg |
9455b51c | 184 | void BruteforceIso15693Afi(uint32_t speed); // find an AFI of a tag - atrox |
185 | void DirectTag15693Command(uint32_t datalen,uint32_t speed, uint32_t recv, uint8_t data[]); // send arbitrary commands from CLI - atrox | |
186 | void SetDebugIso15693(uint32_t flag); | |
15c4dc5a | 187 | |
cee5a30d | 188 | /// iclass.h |
189 | void RAMFUNC SnoopIClass(void); | |
ff7bb4ef | 190 | void SimulateIClass(uint32_t arg0, uint32_t arg1, uint32_t arg2, uint8_t *datain); |
1e262141 | 191 | void ReaderIClass(uint8_t arg0); |
f38a1528 | 192 | void ReaderIClass_Replay(uint8_t arg0,uint8_t *MAC); |
193 | void IClass_iso14443A_GetPublic(uint8_t arg0); | |
e98572a1 | 194 | void iClass_Authentication(uint8_t *MAC); |
195 | void iClass_WriteBlock(uint8_t blockNo, uint8_t *data); | |
196 | void iClass_ReadBlk(uint8_t blockNo); | |
197 | bool iClass_ReadBlock(uint8_t blockNo, uint8_t *readdata); | |
198 | void iClass_Dump(uint8_t blockno, uint8_t numblks); | |
199 | void iClass_Clone(uint8_t startblock, uint8_t endblock, uint8_t *data); | |
200 | void iClass_ReadCheck(uint8_t blockNo, uint8_t keyType); | |
cee5a30d | 201 | |
36804420 | 202 | |
d19929cb | 203 | // hitag2.h |
204 | void SnoopHitag(uint32_t type); | |
205 | void SimulateHitagTag(bool tag_mem_supplied, byte_t* data); | |
206 | void ReaderHitag(hitag_function htf, hitag_data* htd); | |
207 | ||
0db11b71 | 208 | //hitagS.h |
209 | void SimulateHitagSTag(bool tag_mem_supplied, byte_t* data); | |
210 | void ReadHitagS(hitag_function htf, hitag_data* htd); | |
211 | void WritePageHitagS(hitag_function htf, hitag_data* htd,int page); | |
212 | void check_challenges(bool file_given, byte_t* data); | |
213 | ||
214 | ||
6e82300d | 215 | // cmd.h |
216 | bool cmd_receive(UsbCommand* cmd); | |
79a73ab2 | 217 | bool cmd_send(uint32_t cmd, uint32_t arg0, uint32_t arg1, uint32_t arg2, void* data, size_t len); |
6e82300d | 218 | |
15c4dc5a | 219 | /// util.h |
1d0ccbe0 | 220 | void HfSnoop(int , int); |
810f5379 | 221 | //EMV functions emvcmd.h |
222 | void EMVTransaction(void); | |
223 | void EMVgetUDOL(void); | |
224 | void EMVloadvalue(uint32_t tag, uint8_t* datain); | |
225 | void EMVdumpcard(void); | |
15c4dc5a | 226 | |
227 | #endif |