//-----------------------------------------------------------------------------
// This code is licensed to you under the terms of the GNU GPL, version 2 or,
// at your option, any later version. See the LICENSE.txt file for the text of
// the license.
//-----------------------------------------------------------------------------
// LEFIC's obfuscation function
//-----------------------------------------------------------------------------

#include "legic_prng.h"

struct lfsr {
  uint8_t  a;
  uint8_t  b;
  uint32_t c;
} lfsr;

void legic_prng_init(uint8_t init) {
  lfsr.c = 0;
  lfsr.a = init;
  if(init == 0) /* hack to get a always 0 keystream */
    lfsr.b = 0;
  else
    lfsr.b = (init << 1) | 1;
}

void legic_prng_forward(int count) {
  lfsr.c += count;
  while(count--) {
    //lfsr.a = lfsr.a >> 1 | (lfsr.a ^ lfsr.a >> 6) << 6;
	// According: http://www.proxmark.org/forum/viewtopic.php?pid=5437#p5437
	lfsr.a = (lfsr.a >> 1 | (lfsr.a ^ lfsr.a >> 6) << 6) & 0x7F;
    lfsr.b = lfsr.b >> 1 | (lfsr.b ^ lfsr.b >> 2 ^ lfsr.b >> 3 ^ lfsr.b >> 7) << 7;
  }
}

int legic_prng_count() {
  return lfsr.c;
}

uint8_t legic_prng_get_bit() {
  uint8_t idx = 7 - ( (lfsr.a & 4) | (lfsr.a >> 2 & 2) | (lfsr.a >> 4 & 1) );
  return lfsr.b >> idx & 1;
}