+bool NTParityChk(TAuthData *ad, uint32_t ntx) {
+ if (
+ (oddparity8(ntx >> 8 & 0xff) ^ (ntx & 0x01) ^ ((ad->nt_enc_par >> 5) & 0x01) ^ (ad->nt_enc & 0x01)) ||
+ (oddparity8(ntx >> 16 & 0xff) ^ (ntx >> 8 & 0x01) ^ ((ad->nt_enc_par >> 6) & 0x01) ^ (ad->nt_enc >> 8 & 0x01)) ||
+ (oddparity8(ntx >> 24 & 0xff) ^ (ntx >> 16 & 0x01) ^ ((ad->nt_enc_par >> 7) & 0x01) ^ (ad->nt_enc >> 16 & 0x01))
+ )
+ return false;
+
+ uint32_t ar = prng_successor(ntx, 64);
+ if (
+ (oddparity8(ar >> 8 & 0xff) ^ (ar & 0x01) ^ ((ad->ar_enc_par >> 5) & 0x01) ^ (ad->ar_enc & 0x01)) ||
+ (oddparity8(ar >> 16 & 0xff) ^ (ar >> 8 & 0x01) ^ ((ad->ar_enc_par >> 6) & 0x01) ^ (ad->ar_enc >> 8 & 0x01)) ||
+ (oddparity8(ar >> 24 & 0xff) ^ (ar >> 16 & 0x01) ^ ((ad->ar_enc_par >> 7) & 0x01) ^ (ad->ar_enc >> 16 & 0x01))
+ )
+ return false;
+
+ uint32_t at = prng_successor(ntx, 96);
+ if (
+ (oddparity8(ar & 0xff) ^ (at >> 24 & 0x01) ^ ((ad->ar_enc_par >> 4) & 0x01) ^ (ad->at_enc >> 24 & 0x01)) ||
+ (oddparity8(at >> 8 & 0xff) ^ (at & 0x01) ^ ((ad->at_enc_par >> 5) & 0x01) ^ (ad->at_enc & 0x01)) ||
+ (oddparity8(at >> 16 & 0xff) ^ (at >> 8 & 0x01) ^ ((ad->at_enc_par >> 6) & 0x01) ^ (ad->at_enc >> 8 & 0x01)) ||
+ (oddparity8(at >> 24 & 0xff) ^ (at >> 16 & 0x01) ^ ((ad->at_enc_par >> 7) & 0x01) ^ (ad->at_enc >> 16 & 0x01))
+ )
+ return false;
+
+ return true;
+}
+
+bool NestedCheckKey(uint64_t key, TAuthData *ad, uint8_t *cmd, uint8_t cmdsize, uint8_t *parity) {
+ uint8_t buf[32] = {0};
+ struct Crypto1State *pcs;
+
+ AuthData.ks2 = 0;
+ AuthData.ks3 = 0;
+
+ pcs = crypto1_create(key);
+ uint32_t nt1 = crypto1_word(pcs, ad->nt_enc ^ ad->uid, 1) ^ ad->nt_enc;
+ uint32_t ar = prng_successor(nt1, 64);
+ uint32_t at = prng_successor(nt1, 96);
+
+ crypto1_word(pcs, ad->nr_enc, 1);
+// uint32_t nr1 = crypto1_word(pcs, ad->nr_enc, 1) ^ ad->nr_enc; // if needs deciphered nr
+ uint32_t ar1 = crypto1_word(pcs, 0, 0) ^ ad->ar_enc;
+ uint32_t at1 = crypto1_word(pcs, 0, 0) ^ ad->at_enc;
+
+ if (!(ar == ar1 && at == at1 && NTParityChk(ad, nt1)))
+ return false;
+
+ memcpy(buf, cmd, cmdsize);
+ mf_crypto1_decrypt(pcs, buf, cmdsize, 0);
+
+ crypto1_destroy(pcs);
+
+ if (!CheckCrypto1Parity(cmd, cmdsize, buf, parity))
+ return false;
+
+ if(!CheckCrc14443(CRC_14443_A, buf, cmdsize))
+ return false;
+
+ AuthData.nt = nt1;
+ AuthData.ks2 = AuthData.ar_enc ^ ar;
+ AuthData.ks3 = AuthData.at_enc ^ at;
+
+ return true;
+}
+
+bool CheckCrypto1Parity(uint8_t *cmd_enc, uint8_t cmdsize, uint8_t *cmd, uint8_t *parity_enc) {
+ for (int i = 0; i < cmdsize - 1; i++) {
+ if (oddparity8(cmd[i]) ^ (cmd[i + 1] & 0x01) ^ ((parity_enc[i / 8] >> (7 - i % 8)) & 0x01) ^ (cmd_enc[i + 1] & 0x01))
+ return false;
+ }
+
+ return true;
+}
+
+uint64_t GetCrypto1ProbableKey(TAuthData *ad) {
+ struct Crypto1State *revstate = lfsr_recovery64(ad->ks2, ad->ks3);
+ lfsr_rollback_word(revstate, 0, 0);
+ lfsr_rollback_word(revstate, 0, 0);
+ lfsr_rollback_word(revstate, ad->nr_enc, 1);
+ lfsr_rollback_word(revstate, ad->uid ^ ad->nt, 0);
+
+ uint64_t lfsr = 0;
+ crypto1_get_lfsr(revstate, &lfsr);
+ crypto1_destroy(revstate);
+
+ return lfsr;
+}