mirror of
https://github.com/Proxmark/proxmark3.git
synced 2024-11-11 09:59:45 +08:00
6e49717b5e
* move to separate files mifaresim.[ch] * check CRC of commands * don't execute commands without successfull authentication * ensure correct timing of REQA, WUPA, ANTICOL and SELECT responses * trace reader commands immediately, only fix start time after tag response. Decreases time to be ready for next reader command. * remove iso14443-4 remnants * trace raw reader commands instead of decrypted ones * some refactoring * fix hf mf sim * timing: decrease time to get ready for new reader commands
56 lines
2.5 KiB
C
56 lines
2.5 KiB
C
//-----------------------------------------------------------------------------
|
|
// Merlok - June 2011
|
|
// Gerhard de Koning Gans - May 2008
|
|
// Hagen Fritsch - June 2010
|
|
//
|
|
// This code is licensed to you under the terms of the GNU GPL, version 2 or,
|
|
// at your option, any later version. See the LICENSE.txt file for the text of
|
|
// the license.
|
|
//-----------------------------------------------------------------------------
|
|
// Routines to support ISO 14443 type A.
|
|
//-----------------------------------------------------------------------------
|
|
|
|
#ifndef __ISO14443A_H
|
|
#define __ISO14443A_H
|
|
|
|
#include <stdint.h>
|
|
#include <stdbool.h>
|
|
#include "usb_cmd.h"
|
|
#include "mifare.h"
|
|
|
|
typedef struct {
|
|
uint8_t* response;
|
|
uint8_t* modulation;
|
|
uint16_t response_n;
|
|
uint16_t modulation_n;
|
|
uint32_t ProxToAirDuration;
|
|
uint8_t par; // enough for precalculated parity of 8 Byte responses
|
|
} tag_response_info_t;
|
|
|
|
extern void GetParity(const uint8_t *pbtCmd, uint16_t len, uint8_t *par);
|
|
extern void AppendCrc14443a(uint8_t *data, int len);
|
|
|
|
extern void RAMFUNC SnoopIso14443a(uint8_t param);
|
|
extern void SimulateIso14443aTag(int tagType, int uid_1st, int uid_2nd, byte_t *data);
|
|
extern void ReaderIso14443a(UsbCommand *c);
|
|
extern void ReaderTransmit(uint8_t *frame, uint16_t len, uint32_t *timing);
|
|
extern void ReaderTransmitBitsPar(uint8_t *frame, uint16_t bits, uint8_t *par, uint32_t *timing);
|
|
extern void ReaderTransmitPar(uint8_t *frame, uint16_t len, uint8_t *par, uint32_t *timing);
|
|
extern int ReaderReceive(uint8_t *receivedAnswer, uint8_t *par);
|
|
extern void ReaderMifare(bool first_try);
|
|
|
|
extern int EmGetCmd(uint8_t *received, uint16_t *len, uint8_t *parity);
|
|
extern int EmSendCmd(uint8_t *resp, uint16_t respLen);
|
|
extern int EmSendCmdEx(uint8_t *resp, uint16_t respLen, bool correctionNeeded);
|
|
extern int EmSend4bit(uint8_t resp);
|
|
extern int EmSendCmdPar(uint8_t *resp, uint16_t respLen, uint8_t *par);
|
|
extern int EmSendPrecompiledCmd(tag_response_info_t *response_info, bool correctionNeeded);
|
|
|
|
extern bool prepare_allocated_tag_modulation(tag_response_info_t *response_info, uint8_t **buffer, size_t *buffer_size);
|
|
|
|
extern void iso14443a_setup(uint8_t fpga_minor_mode);
|
|
extern int iso14_apdu(uint8_t *cmd, uint16_t cmd_len, void *data);
|
|
extern int iso14443a_select_card(uint8_t *uid_ptr, iso14a_card_select_t *resp_data, uint32_t *cuid_ptr, bool anticollision, uint8_t num_cascades, bool no_rats);
|
|
extern void iso14a_set_trigger(bool enable);
|
|
extern void iso14a_set_timeout(uint32_t timeout);
|
|
#endif /* __ISO14443A_H */
|