mirror of
https://github.com/RfidResearchGroup/proxmark3.git
synced 2024-11-22 21:40:18 -08:00
66 lines
2.4 KiB
C
66 lines
2.4 KiB
C
//-----------------------------------------------------------------------------
|
||
// Borrowed initially from https://github.com/holiman/loclass
|
||
// Copyright (C) 2014 Martin Holst Swende
|
||
// Copyright (C) Proxmark3 contributors. See AUTHORS.md for details.
|
||
//
|
||
// This program is free software: you can redistribute it and/or modify
|
||
// it under the terms of the GNU General Public License as published by
|
||
// the Free Software Foundation, either version 3 of the License, or
|
||
// (at your option) any later version.
|
||
//
|
||
// This program is distributed in the hope that it will be useful,
|
||
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||
// GNU General Public License for more details.
|
||
//
|
||
// See LICENSE.txt for the text of the license.
|
||
//-----------------------------------------------------------------------------
|
||
// WARNING
|
||
//
|
||
// THIS CODE IS CREATED FOR EXPERIMENTATION AND EDUCATIONAL USE ONLY.
|
||
//
|
||
// USAGE OF THIS CODE IN OTHER WAYS MAY INFRINGE UPON THE INTELLECTUAL
|
||
// PROPERTY OF OTHER PARTIES, SUCH AS INSIDE SECURE AND HID GLOBAL,
|
||
// AND MAY EXPOSE YOU TO AN INFRINGEMENT ACTION FROM THOSE PARTIES.
|
||
//
|
||
// THIS CODE SHOULD NEVER BE USED TO INFRINGE PATENTS OR INTELLECTUAL PROPERTY RIGHTS.
|
||
//-----------------------------------------------------------------------------
|
||
// It is a reconstruction of the cipher engine used in iClass, and RFID techology.
|
||
//
|
||
// The implementation is based on the work performed by
|
||
// Flavio D. Garcia, Gerhard de Koning Gans, Roel Verdult and
|
||
// Milosch Meriac in the paper "Dismantling IClass".
|
||
//-----------------------------------------------------------------------------
|
||
#ifndef IKEYS_H
|
||
#define IKEYS_H
|
||
|
||
#include <inttypes.h>
|
||
|
||
/**
|
||
* @brief
|
||
*Definition 11. Let the function hash0 : F 82 × F 82 × (F 62 ) 8 → (F 82 ) 8 be defined as
|
||
* hash0(x, y, z [0] . . . z [7] ) = k [0] . . . k [7] where
|
||
* z'[i] = (z[i] mod (63-i)) + i i = 0...3
|
||
* z'[i+4] = (z[i+4] mod (64-i)) + i i = 0...3
|
||
* ẑ = check(z');
|
||
* @param c
|
||
* @param k this is where the diversified key is put (should be 8 bytes)
|
||
* @return
|
||
*/
|
||
void hash0(uint64_t c, uint8_t k[8]);
|
||
/**
|
||
* @brief Performs Elite-class key diversification
|
||
* @param csn
|
||
* @param key
|
||
* @param div_key
|
||
*/
|
||
|
||
void diversifyKey(uint8_t *csn, uint8_t *key, uint8_t *div_key);
|
||
/**
|
||
* @brief Permutes a key from standard NIST format to Iclass specific format
|
||
* @param key
|
||
* @param dest
|
||
*/
|
||
|
||
#endif // IKEYS_H
|