 8af2198684
			
		
	
	
		8af2198684
		
			
		
	
	
	
	
		
			
			* Move structs to header * roll mbedtls into loclass * Picopass with scene for reading card * Picopass: fix memory leak * Lib: return mbedtls back * Picopass: rename symbols to match naming guide Co-authored-by: Aleksandr Kutuzov <alleteam@gmail.com>
		
			
				
	
	
		
			67 lines
		
	
	
		
			2.5 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			67 lines
		
	
	
		
			2.5 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
| //-----------------------------------------------------------------------------
 | ||
| // Borrowed initially from https://github.com/holiman/loclass
 | ||
| // More recently from https://github.com/RfidResearchGroup/proxmark3
 | ||
| // Copyright (C) 2014 Martin Holst Swende
 | ||
| // Copyright (C) Proxmark3 contributors. See AUTHORS.md for details.
 | ||
| //
 | ||
| // This program is free software: you can redistribute it and/or modify
 | ||
| // it under the terms of the GNU General Public License as published by
 | ||
| // the Free Software Foundation, either version 3 of the License, or
 | ||
| // (at your option) any later version.
 | ||
| //
 | ||
| // This program is distributed in the hope that it will be useful,
 | ||
| // but WITHOUT ANY WARRANTY; without even the implied warranty of
 | ||
| // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 | ||
| // GNU General Public License for more details.
 | ||
| //
 | ||
| // See LICENSE.txt for the text of the license.
 | ||
| //-----------------------------------------------------------------------------
 | ||
| // WARNING
 | ||
| //
 | ||
| // THIS CODE IS CREATED FOR EXPERIMENTATION AND EDUCATIONAL USE ONLY.
 | ||
| //
 | ||
| // USAGE OF THIS CODE IN OTHER WAYS MAY INFRINGE UPON THE INTELLECTUAL
 | ||
| // PROPERTY OF OTHER PARTIES, SUCH AS INSIDE SECURE AND HID GLOBAL,
 | ||
| // AND MAY EXPOSE YOU TO AN INFRINGEMENT ACTION FROM THOSE PARTIES.
 | ||
| //
 | ||
| // THIS CODE SHOULD NEVER BE USED TO INFRINGE PATENTS OR INTELLECTUAL PROPERTY RIGHTS.
 | ||
| //-----------------------------------------------------------------------------
 | ||
| // It is a reconstruction of the cipher engine used in iClass, and RFID techology.
 | ||
| //
 | ||
| // The implementation is based on the work performed by
 | ||
| // Flavio D. Garcia, Gerhard de Koning Gans, Roel Verdult and
 | ||
| // Milosch Meriac in the paper "Dismantling IClass".
 | ||
| //-----------------------------------------------------------------------------
 | ||
| #ifndef IKEYS_H
 | ||
| #define IKEYS_H
 | ||
| 
 | ||
| #include <inttypes.h>
 | ||
| 
 | ||
| /**
 | ||
|  * @brief
 | ||
|  *Definition 11. Let the function hash0 : F 82 × F 82 × (F 62 ) 8 → (F 82 ) 8 be defined as
 | ||
|  *  hash0(x, y, z [0] . . . z [7] ) = k [0] . . . k [7] where
 | ||
|  * z'[i] = (z[i] mod (63-i)) + i        i =  0...3
 | ||
|  * z'[i+4] = (z[i+4] mod (64-i)) + i    i =  0...3
 | ||
|  * ẑ = check(z');
 | ||
|  * @param c
 | ||
|  * @param k this is where the diversified key is put (should be 8 bytes)
 | ||
|  * @return
 | ||
|  */
 | ||
| void hash0(uint64_t c, uint8_t k[8]);
 | ||
| /**
 | ||
|  * @brief Performs Elite-class key diversification
 | ||
|  * @param csn
 | ||
|  * @param key
 | ||
|  * @param div_key
 | ||
|  */
 | ||
| 
 | ||
| void diversifyKey(uint8_t *csn, const uint8_t *key, uint8_t *div_key);
 | ||
| /**
 | ||
|  * @brief Permutes a key from standard NIST format to Iclass specific format
 | ||
|  * @param key
 | ||
|  * @param dest
 | ||
|  */
 | ||
| 
 | ||
| #endif // IKEYS_H
 |