mirror of
https://github.com/RfidResearchGroup/proxmark3.git
synced 2024-11-10 17:49:32 +08:00
d19754567d
* .h include only the strict minimum for their own parsing * this forces all files to include explicitment their needs and not count on far streched dependencies * this helps Makefile to rebuild only the minimum * according to this rule, most standalone .h are now gone * big app.h is gone * remove seldom __cplusplus, if c++ happens, everything will have to be done properly anyway * all unrequired include were removed * split common/ into common/ (client+arm) and common_arm/ (os+bootloader) * bring zlib to common/ * bring stuff not really/not yet used in common back to armsrc/ or client/ * bring liblua into client/ * bring uart into client/ * move some portions of code around (dbprint, protocols,...) * rename unused files into *_disabled.[ch] to make it explicit * rename soft Uarts between 14a, 14b and iclass, so a standalone could use several without clash * remove PrintAndLogDevice * move deprecated-hid-flasher from client to tools * Makefiles * treat deps in armsrc/ as in client/ * client: stop on warning (-Werror), same as for armsrc/ Tested on: * all standalone modes * Linux |
||
---|---|---|
.. | ||
crapto1.c | ||
crapto1.h | ||
crypto1.c | ||
readme |
CRAPTO1 ------- Provides a set of library functions which aid the verification of crypto1 weaknesses. In short a partial implementation of: Dismantling MIFARE Classic URL: http://www.sos.cs.ru.nl/applications/rfid/2008-esorics.pdf Flavio D. Garcia, Gerhard de Koning Gans, Ruben Muijrers, Peter van Rossum, Roel Verdult, Ronny Wichers Schreur, Bart Jacobs Institute for Computing and Information Sciences, Radboud University Nijmegen, The Netherlands {{flaviog,petervr,ronny,bart}@cs, {gkoningg,rmuijrer,rverdult}@sci}.ru.nl and Wirelessly Pickpocketing a Mifare Classic Card URL: http://www.cs.ru.nl/~flaviog/publications/Pickpocketing.Mifare.pdf Flavio D. Garcia, Peter van Rossum, Roel Verdult, Ronny Wichers Schreur Radboud University Nijmegen, The Netherlands {flaviog,petervr,rverdult,ronny}@cs.ru.nl and THE DARK SIDE OF SECURITY BY OBSCURITY URL: http://eprint.iacr.org/2009/137 and Cloning MiFare Classic Rail and Building Passes, Anywhere, Anytime Nicolas T. Courtois University College London, Computer Science, Gower street, WC1E 6BT, London, UK