X-Git-Url: http://cvs.zerfleddert.de/cgi-bin/gitweb.cgi/proxmark3-svn/blobdiff_plain/6c0f60ca7bcd7737b5d3867004f1cbdc9532720c..3ad48540d4d77f50cc62d16acb78f17019ef431d:/client/loclass/main.c
diff --git a/client/loclass/main.c b/client/loclass/main.c
new file mode 100644
index 00000000..42019072
--- /dev/null
+++ b/client/loclass/main.c
@@ -0,0 +1,96 @@
+/*****************************************************************************
+ * This file is part of iClassCipher. It is a reconstructon of the cipher engine
+ * used in iClass, and RFID techology.
+ *
+ * The implementation is based on the work performed by
+ * Flavio D. Garcia, Gerhard de Koning Gans, Roel Verdult and
+ * Milosch Meriac in the paper "Dismantling IClass".
+ *
+ * Copyright (C) 2014 Martin Holst Swende
+ *
+ * This is free software: you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License version 2 as published
+ * by the Free Software Foundation.
+ *
+ * This file is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with IClassCipher. If not, see .
+ ****************************************************************************/
+
+#include
+#include
+#include
+#include
+#include
+#include
+#include
+#include "cipherutils.h"
+#include "cipher.h"
+#include "ikeys.h"
+#include "fileutils.h"
+#include "elite_crack.h"
+
+int unitTests()
+{
+ int errors = testCipherUtils();
+ errors += testMAC();
+ errors += doKeyTests(0);
+ errors += testElite();
+ return errors;
+}
+int showHelp()
+{
+ prnlog("Usage: iclazz [options]");
+ prnlog("Options:");
+ prnlog("-t Perform self-test");
+ prnlog("-h Show this help");
+ prnlog("-f Bruteforce iclass dumpfile");
+ prnlog(" An iclass dumpfile is assumed to consist of an arbitrary number of malicious CSNs, and their protocol responses");
+ prnlog(" The the binary format of the file is expected to be as follows: ");
+ prnlog(" <8 byte CSN><8 byte CC><4 byte NR><4 byte MAC>");
+ prnlog(" <8 byte CSN><8 byte CC><4 byte NR><4 byte MAC>");
+ prnlog(" <8 byte CSN><8 byte CC><4 byte NR><4 byte MAC>");
+ prnlog(" ... totalling N*24 bytes");
+ prnlog(" Check iclass_dump.bin for an example");
+
+ return 0;
+}
+
+int main (int argc, char **argv)
+{
+ prnlog("IClass Cipher version 1.2, Copyright (C) 2014 Martin Holst Swende\n");
+ prnlog("Comes with ABSOLUTELY NO WARRANTY");
+ prnlog("This is free software, and you are welcome to use, abuse and repackage, please keep the credits\n");
+ char *fileName = NULL;
+ int c;
+ while ((c = getopt (argc, argv, "thf:")) != -1)
+ switch (c)
+ {
+ case 't':
+ return unitTests();
+ case 'h':
+ return showHelp();
+ case 'f':
+ fileName = optarg;
+ return bruteforceFileNoKeys(fileName);
+ case '?':
+ if (optopt == 'f')
+ fprintf (stderr, "Option -%c requires an argument.\n", optopt);
+ else if (isprint (optopt))
+ fprintf (stderr, "Unknown option `-%c'.\n", optopt);
+ else
+ fprintf (stderr,
+ "Unknown option character `\\x%x'.\n",
+ optopt);
+ return 1;
+ //default:
+ //showHelp();
+ }
+ showHelp();
+ return 0;
+}
+