mirror of
https://github.com/RfidResearchGroup/proxmark3.git
synced 2025-01-10 18:24:27 +08:00
6c84c90017
FIX: The flushing of logentries. ADD: "hf mf sniff" - added the sniffing of UID's with a uidlen of 10. Whats left? The key is not always found even if we use the "mfkey64" approach. ADD: added the parity_zero attack in "hf mf mifare". Still not working since piwi's changes to the iso14443a.c, maybe needs a param to tell it to collect nonces for this special attack. CHG: extracted some help-texts into usage_* methods. Changed some text as well FIX: "hf mf sim" command now uses both mfkey32 and mfkey32_moebius version to find the key in attack mode. CHG: "hf mf sim" also now defaults to emul_memory to read a 4 byte UID.
65 lines
2.3 KiB
C
65 lines
2.3 KiB
C
// Merlok, 2011
|
|
// people from mifare@nethemba.com, 2010
|
|
//
|
|
// This code is licensed to you under the terms of the GNU GPL, version 2 or,
|
|
// at your option, any later version. See the LICENSE.txt file for the text of
|
|
// the license.
|
|
//-----------------------------------------------------------------------------
|
|
// High frequency ISO14443A commands
|
|
//-----------------------------------------------------------------------------
|
|
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <unistd.h>
|
|
#include "common.h"
|
|
#include "cmdmain.h"
|
|
#include "ui.h"
|
|
#include "data.h"
|
|
#include "util.h"
|
|
#include "nonce2key/nonce2key.h"
|
|
#include "nonce2key/crapto1.h"
|
|
#include "iso14443crc.h"
|
|
#include "protocols.h"
|
|
|
|
#define MEM_CHUNK 1000000
|
|
#define NESTED_SECTOR_RETRY 10
|
|
|
|
// mifare tracer flags
|
|
#define TRACE_IDLE 0x00
|
|
#define TRACE_AUTH1 0x01
|
|
#define TRACE_AUTH2 0x02
|
|
#define TRACE_AUTH_OK 0x03
|
|
#define TRACE_READ_DATA 0x04
|
|
#define TRACE_WRITE_OK 0x05
|
|
#define TRACE_WRITE_DATA 0x06
|
|
|
|
#define TRACE_ERROR 0xFF
|
|
|
|
typedef struct {
|
|
uint64_t Key[2];
|
|
int foundKey[2];
|
|
} sector;
|
|
|
|
int compar_int(const void * a, const void * b);
|
|
extern char logHexFileName[FILE_PATH_SIZE];
|
|
|
|
int mfnested(uint8_t blockNo, uint8_t keyType, uint8_t * key, uint8_t trgBlockNo, uint8_t trgKeyType, uint8_t * ResultKeys, bool calibrate);
|
|
int mfCheckKeys (uint8_t blockNo, uint8_t keyType, bool clear_trace, uint8_t keycnt, uint8_t * keyBlock, uint64_t * key);
|
|
|
|
int mfEmlGetMem(uint8_t *data, int blockNum, int blocksCount);
|
|
int mfEmlSetMem(uint8_t *data, int blockNum, int blocksCount);
|
|
int mfEmlSetMem_xt(uint8_t *data, int blockNum, int blocksCount, int blockBtWidth);
|
|
|
|
int mfCSetUID(uint8_t *uid, uint8_t *atqa, uint8_t *sak, uint8_t *oldUID, uint8_t wipecard);
|
|
int mfCSetBlock(uint8_t blockNo, uint8_t *data, uint8_t *uid, uint8_t params);
|
|
int mfCGetBlock(uint8_t blockNo, uint8_t *data, uint8_t params);
|
|
|
|
int mfTraceInit(uint8_t *tuid, uint8_t uidlen, uint8_t *atqa, uint8_t sak, bool wantSaveToEmlFile);
|
|
int mfTraceDecode(uint8_t *data_src, int len, bool wantSaveToEmlFile);
|
|
|
|
int isTraceCardEmpty(void);
|
|
int isBlockEmpty(int blockN);
|
|
int isBlockTrailer(int blockN);
|
|
int loadTraceCard(uint8_t *tuid, uint8_t uidlen);
|
|
int saveTraceCard(void);
|
|
int tryDecryptWord(uint32_t nt, uint32_t ar_enc, uint32_t at_enc, uint8_t *data, int len);
|