]> cvs.zerfleddert.de Git - proxmark3-svn/blame - armsrc/mifareutil.h
Merge pull request #969 from pwpiwi/gcc10_fixes
[proxmark3-svn] / armsrc / mifareutil.h
CommitLineData
20f9a2a1
M
1//-----------------------------------------------------------------------------\r
2// Merlok, May 2011\r
3// Many authors, that makes it possible\r
4//\r
5// This code is licensed to you under the terms of the GNU GPL, version 2 or,\r
6// at your option, any later version. See the LICENSE.txt file for the text of\r
7// the license.\r
8//-----------------------------------------------------------------------------\r
9// code for work with mifare cards.\r
10//-----------------------------------------------------------------------------\r
9ca155ba 11\r
a749b1e5 12#ifndef MIFAREUTIL_H__\r
13#define MIFAREUTIL_H__\r
20f9a2a1 14\r
b35e04a7 15#include <stdint.h>\r
16#include <stdbool.h>\r
17\r
33443e7c 18#include "crapto1/crapto1.h"\r
275d9e61 19#include "usb_cdc.h"\r
33443e7c 20\r
9ca155ba 21// mifare authentication\r
a749b1e5 22#define CRYPT_NONE 0\r
23#define CRYPT_ALL 1\r
24#define CRYPT_REQUEST 2\r
25#define AUTH_FIRST 0\r
26#define AUTH_NESTED 2\r
4abe4f58 27\r
9ca155ba
M
28// reader voltage field detector\r
29#define MF_MINFIELDV 4000\r
30\r
f397b5cc 31// debug\r
a8561e35 32#define MF_DBG_NONE 0 // no messages\r
33#define MF_DBG_ERROR 1 // errors only\r
34#define MF_DBG_INFO 2 // errors + info messages\r
35#define MF_DBG_DEBUG 3 // errors + info + debug messages\r
36#define MF_DBG_EXTENDED 4 // errors + info + debug + breaking debug messages\r
f397b5cc
M
37\r
38extern int MF_DBGLEVEL;\r
39\r
f168b263 40//functions\r
4973f23d 41int mifare_sendcmd(uint8_t cmd, uint8_t *data, uint8_t data_size, uint8_t* answer, uint8_t *answer_parity, uint32_t *timing);\r
e35031d2 42int mifare_sendcmd_short(struct Crypto1State *pcs, uint8_t crypted, uint8_t cmd, uint8_t data, uint8_t* answer, uint8_t *answer_parity, uint32_t *timing);\r
f168b263 43\r
4973f23d 44// mifare classic\r
a749b1e5 45int mifare_classic_auth(struct Crypto1State *pcs, uint32_t uid, uint8_t blockNo, uint8_t keyType, uint64_t ui64Key, uint8_t isNested, uint32_t *auth_timeout);\r
46int mifare_classic_authex(struct Crypto1State *pcs, uint32_t uid, uint8_t blockNo, uint8_t keyType, uint64_t ui64Key, uint8_t isNested, uint32_t * ntptr, uint32_t *timing, uint32_t *auth_timeout);\r
cceabb79 47int mifare_classic_readblock(struct Crypto1State *pcs, uint32_t uid, uint8_t blockNo, uint8_t *blockData);\r
a749b1e5 48int mifare_classic_halt(struct Crypto1State *pcs, uint32_t uid);\r
4973f23d 49int mifare_classic_writeblock(struct Crypto1State *pcs, uint32_t uid, uint8_t blockNo, uint8_t *blockData);\r
50\r
51// Ultralight/NTAG...\r
cceabb79 52int mifare_ul_ev1_auth(uint8_t *key, uint8_t *pack);\r
8258f409 53int mifare_ultra_auth(uint8_t *key);\r
f168b263 54int mifare_ultra_readblock(uint8_t blockNo, uint8_t *blockData);\r
4973f23d 55//int mifare_ultra_writeblock_compat(uint8_t blockNo, uint8_t *blockData);\r
f168b263 56int mifare_ultra_writeblock(uint8_t blockNo, uint8_t *blockData);\r
f168b263 57int mifare_ultra_halt();\r
a631936e 58\r
c8b6da22 59// desfire\r
60int mifare_sendcmd_special(struct Crypto1State *pcs, uint8_t crypted, uint8_t cmd, uint8_t* data, uint8_t* answer, uint8_t *answer_parity, uint32_t *timing);\r
61int mifare_sendcmd_special2(struct Crypto1State *pcs, uint8_t crypted, uint8_t cmd, uint8_t* data, uint8_t* answer,uint8_t *answer_parity, uint32_t *timing);\r
62int mifare_desfire_des_auth1(uint32_t uid, uint8_t *blockData);\r
63int mifare_desfire_des_auth2(uint32_t uid, uint8_t *key, uint8_t *blockData);\r
f168b263 64\r
65// crypto functions\r
66void mf_crypto1_decrypt(struct Crypto1State *pcs, uint8_t *receivedCmd, int len);\r
6e49717b 67void mf_crypto1_decryptEx(struct Crypto1State *pcs, uint8_t *data_in, int len, uint8_t *data_out);\r
6a1f2d82 68void mf_crypto1_encrypt(struct Crypto1State *pcs, uint8_t *data, uint16_t len, uint8_t *par);\r
a8561e35 69void mf_crypto1_encryptEx(struct Crypto1State *pcs, uint8_t *data, uint8_t *in, uint16_t len, uint8_t *par);\r
8f51ddb0
M
70uint8_t mf_crypto1_encrypt4bit(struct Crypto1State *pcs, uint8_t data);\r
71\r
baeaf579 72// Mifare memory structure\r
73uint8_t NumBlocksPerSector(uint8_t sectorNo);\r
74uint8_t FirstBlockOfSector(uint8_t sectorNo);\r
b35e04a7 75bool IsSectorTrailer(uint8_t blockNo);\r
76uint8_t SectorTrailer(uint8_t blockNo);\r
baeaf579 77\r
8f51ddb0
M
78// emulator functions\r
79void emlClearMem(void);\r
80void emlSetMem(uint8_t *data, int blockNum, int blocksCount);\r
81void emlGetMem(uint8_t *data, int blockNum, int blocksCount);\r
82void emlGetMemBt(uint8_t *data, int bytePtr, int byteCount);\r
8556b852 83uint64_t emlGetKey(int sectorNum, int keyType);\r
0014cb46 84int emlGetValBl(uint32_t *blReg, uint8_t *blBlock, int blockNum);\r
f168b263 85int emlSetValBl(uint32_t blReg, uint8_t blBlock, int blockNum);\r
86int emlCheckValBl(int blockNum);\r
87\r
275d9e61
OM
88// mifare check keys\r
89typedef uint8_t TKeyIndex[2][40];\r
aa8ff592 90int MifareChkBlockKeysFixedNonce(uint8_t *ar_par, uint8_t ar_par_cnt, uint8_t blockNo, uint8_t keyType, uint32_t *auth_timeout, uint8_t debugLevel);\r
a749b1e5 91int MifareChkBlockKeys(uint8_t *keys, uint8_t keyCount, uint8_t blockNo, uint8_t keyType, uint32_t *auth_timeout, uint8_t debugLevel);\r
92int MifareMultisectorChk(uint8_t *keys, uint8_t keyCount, uint8_t SectorCount, uint8_t keyType, uint32_t *auth_timeout, uint8_t debugLevel, TKeyIndex *keyIndex);\r
275d9e61 93\r
f168b263 94#endif\r
Impressum, Datenschutz