int mifare_desfire_change_key_settings (MifareTag tag, uint8_t settings) { ASSERT_ACTIVE (tag); ASSERT_MIFARE_DESFIRE (tag); ASSERT_AUTHENTICATED (tag); BUFFER_INIT (cmd, 9); BUFFER_INIT (res, 1); BUFFER_APPEND (cmd, 0x54); uint8_t data[8]; data[0] = settings; iso14443a_crc (data, 1, data + 1); bzero (data+3, 5); mifare_cbc_des (MIFARE_DESFIRE (tag)->session_key, data, 8, MD_SEND, 0); BUFFER_APPEND_BYTES (cmd, data, 8); DESFIRE_TRANSCEIVE (tag, cmd, res); return 0; }
int mifare_desfire_change_key (MifareTag tag, uint8_t key_no, MifareDESFireKey new_key, MifareDESFireKey old_key) { ASSERT_ACTIVE (tag); ASSERT_MIFARE_DESFIRE (tag); ASSERT_AUTHENTICATED (tag); BUFFER_INIT (cmd, 1+1+24); BUFFER_INIT (res, 1); BUFFER_APPEND (cmd, 0xC4); BUFFER_APPEND (cmd, key_no); uint8_t data[24]; if ((MIFARE_DESFIRE (tag)->authenticated_key_no != key_no) /* FIXME && (ChangeKey key != 0x0E)*/) { if (old_key) { memcpy (data, old_key->data, 16); } else { bzero (data, 16); } for (int n=0; n<16; n++) { data[n] ^= new_key->data[n]; } // Append XORed data CRC iso14443a_crc (data, 16, data+16); // Append new key CRC iso14443a_crc (new_key->data, 16, data+18); // Padding for (int n=20; n<24; n++) { data[n] = 0x00; } } else { memcpy (data, new_key->data, 16); // Append new key CRC iso14443a_crc (data, 16, data+16); // Padding for (int n=18; n<24; n++) { data[n] = 0x00; } } mifare_cbc_des (MIFARE_DESFIRE (tag)->session_key, data, 24, MD_SEND, 0); BUFFER_APPEND_BYTES (cmd, data, 24); DESFIRE_TRANSCEIVE (tag, cmd, res); return 0; }
static ssize_t write_data (MifareTag tag, uint8_t command, uint8_t file_no, off_t offset, size_t length, void *data, int cs) { size_t bytes_left; size_t bytes_send = 0; void *p = data; ASSERT_ACTIVE (tag); ASSERT_MIFARE_DESFIRE (tag); BUFFER_INIT (cmd, MAX_FRAME_SIZE); BUFFER_INIT (res, 1); BUFFER_APPEND (cmd, command); BUFFER_APPEND (cmd, file_no); BUFFER_APPEND_LE (cmd, offset, 3, sizeof (off_t)); BUFFER_APPEND_LE (cmd, length, 3, sizeof (size_t)); p = mifare_cryto_preprocess_data (tag, data, &length, cs); bytes_left = 52; while (bytes_send < length) { size_t frame_bytes = MIN(bytes_left, length - bytes_send); BUFFER_APPEND_BYTES (cmd, (uint8_t *)p + bytes_send, frame_bytes); DESFIRE_TRANSCEIVE (tag, cmd, res); bytes_send += frame_bytes; if (0x00 == res[0]) break; // PICC returned 0xAF and expects more data BUFFER_CLEAR (cmd); BUFFER_APPEND (cmd, 0xAF); bytes_left = 0x59; } if (0x00 != res[0]) { // 0xAF (additionnal Frame) failure can happen here (wrong crypto method). MIFARE_DESFIRE (tag)->last_picc_error = res[0]; bytes_send = -1; } return bytes_send; }
int mifare_desfire_change_file_settings (MifareTag tag, uint8_t file_no, uint8_t communication_settings, uint16_t access_rights) { ASSERT_ACTIVE (tag); ASSERT_MIFARE_DESFIRE (tag); // TODO: Use a current application files settings cache. struct mifare_desfire_file_settings settings; int res = mifare_desfire_get_file_settings (tag, file_no, &settings); if (res < 0) return res; if (MDAR_CHANGE_AR(settings.access_rights) == MDAR_FREE) { BUFFER_INIT (cmd, 5); BUFFER_INIT (res, 1); BUFFER_APPEND (cmd, 0x5F); BUFFER_APPEND (cmd, file_no); BUFFER_APPEND (cmd, communication_settings); BUFFER_APPEND_LE (cmd, access_rights, 2, sizeof (uint16_t)); DESFIRE_TRANSCEIVE (tag, cmd, res); } else { BUFFER_INIT (cmd, 10); BUFFER_INIT (res, 1); uint8_t data[8]; BUFFER_APPEND (cmd, 0x5F); BUFFER_APPEND (cmd, file_no); data[0] = communication_settings; uint16_t le_ar = htole16 (access_rights); memcpy (data + 1, &le_ar, sizeof (le_ar)); iso14443a_crc (data, 3, data+3); bzero (data + 5, 3); mifare_cbc_des (MIFARE_DESFIRE (tag)->session_key, data, 8, MD_SEND, 0); BUFFER_APPEND_BYTES (cmd, data, 8); DESFIRE_TRANSCEIVE (tag, cmd, res); } return 0; }
/* * Read data to the provided MIFARE tag. */ int mifare_ultralight_write (MifareTag tag, const MifareUltralightPageNumber page, const MifareUltralightPage data) { ASSERT_ACTIVE (tag); ASSERT_MIFARE_ULTRALIGHT (tag); ASSERT_VALID_PAGE (tag, page, true); BUFFER_INIT (cmd, 6); BUFFER_INIT (res, 1); BUFFER_APPEND (cmd, 0xA2); BUFFER_APPEND (cmd, page); BUFFER_APPEND_BYTES (cmd, data, sizeof (MifareUltralightPage)); ULTRALIGHT_TRANSCEIVE (tag, cmd, res); /* Invalidate page in cache */ MIFARE_ULTRALIGHT(tag)->cached_pages[page] = 0; return 0; }
int mifare_desfire_limited_credit_ex (MifareTag tag, uint8_t file_no, int32_t amount, int cs) { ASSERT_ACTIVE (tag); ASSERT_MIFARE_DESFIRE (tag); BUFFER_INIT (cmd, 10); BUFFER_INIT (res, 1); BUFFER_INIT (data, 4); BUFFER_APPEND_LE (data, amount, 4, sizeof (int32_t)); BUFFER_APPEND (cmd, 0x1C); BUFFER_APPEND (cmd, file_no); size_t n = 4; void *d = mifare_cryto_preprocess_data (tag, data, &n, cs); BUFFER_APPEND_BYTES (cmd, d, n); DESFIRE_TRANSCEIVE (tag, cmd, res); return 0; }
/* * Authenticate to the provided MIFARE tag. */ int mifare_ultralightc_authenticate (MifareTag tag, const MifareDESFireKey key) { ASSERT_ACTIVE (tag); ASSERT_MIFARE_ULTRALIGHT_C (tag); BUFFER_INIT (cmd1, 2); BUFFER_INIT (res, 9); BUFFER_APPEND (cmd1, 0x1A); BUFFER_APPEND (cmd1, 0x00); ULTRALIGHT_TRANSCEIVE_RAW(tag, cmd1, res); uint8_t PICC_E_RndB[8]; memcpy (PICC_E_RndB, res+1, 8); uint8_t PICC_RndB[8]; memcpy (PICC_RndB, PICC_E_RndB, 8); uint8_t ivect[8]; memset (ivect, '\0', sizeof (ivect)); mifare_cypher_single_block (key, PICC_RndB, ivect, MCD_RECEIVE, MCO_DECYPHER, 8); uint8_t PCD_RndA[8]; DES_random_key ((DES_cblock*)&PCD_RndA); uint8_t PCD_r_RndB[8]; memcpy (PCD_r_RndB, PICC_RndB, 8); rol (PCD_r_RndB, 8); uint8_t token[16]; memcpy (token, PCD_RndA, 8); memcpy (token+8, PCD_r_RndB, 8); size_t offset = 0; while (offset < 16) { mifare_cypher_single_block (key, token + offset, ivect, MCD_SEND, MCO_ENCYPHER, 8); offset += 8; } BUFFER_INIT (cmd2, 17); BUFFER_APPEND (cmd2, 0xAF); BUFFER_APPEND_BYTES (cmd2, token, 16); ULTRALIGHT_TRANSCEIVE_RAW(tag, cmd2, res); uint8_t PICC_E_RndA_s[8]; memcpy (PICC_E_RndA_s, res+1, 8); uint8_t PICC_RndA_s[8]; memcpy (PICC_RndA_s, PICC_E_RndA_s, 8); mifare_cypher_single_block (key, PICC_RndA_s, ivect, MCD_RECEIVE, MCO_DECYPHER, 8); uint8_t PCD_RndA_s[8]; memcpy (PCD_RndA_s, PCD_RndA, 8); rol (PCD_RndA_s, 8); if (0 != memcmp (PCD_RndA_s, PICC_RndA_s, 8)) { return -1; } // XXX Should we store the state "authenticated" in the tag struct?? return 0; }
int mifare_desfire_authenticate (MifareTag tag, uint8_t key_no, MifareDESFireKey key) { ASSERT_ACTIVE (tag); ASSERT_MIFARE_DESFIRE (tag); MIFARE_DESFIRE (tag)->last_picc_error = OPERATION_OK; MIFARE_DESFIRE (tag)->authenticated_key_no = NOT_YET_AUTHENTICATED; free (MIFARE_DESFIRE (tag)->session_key); MIFARE_DESFIRE (tag)->session_key = NULL; BUFFER_INIT (cmd1, 2); BUFFER_INIT (res, 9); BUFFER_APPEND (cmd1, 0x0A); BUFFER_APPEND (cmd1, key_no); DESFIRE_TRANSCEIVE (tag, cmd1, res); uint8_t PICC_E_RndB[8]; memcpy (PICC_E_RndB, res+1, 8); uint8_t PICC_RndB[8]; memcpy (PICC_RndB, PICC_E_RndB, 8); mifare_cbc_des (key, PICC_RndB, 8, MD_RECEIVE, 0); uint8_t PCD_RndA[8]; DES_random_key ((DES_cblock*)&PCD_RndA); uint8_t PCD_r_RndB[8]; memcpy (PCD_r_RndB, PICC_RndB, 8); rol8 (PCD_r_RndB); uint8_t token[16]; memcpy (token, PCD_RndA, 8); memcpy (token+8, PCD_r_RndB, 8); mifare_cbc_des (key, token, 16, MD_SEND, 0); BUFFER_INIT (cmd2, 17); BUFFER_APPEND (cmd2, 0xAF); BUFFER_APPEND_BYTES (cmd2, token, 16); DESFIRE_TRANSCEIVE (tag, cmd2, res); uint8_t PICC_E_RndA_s[8]; memcpy (PICC_E_RndA_s, res+1, 8); uint8_t PICC_RndA_s[8]; memcpy (PICC_RndA_s, PICC_E_RndA_s, 8); mifare_cbc_des (key, PICC_RndA_s, 8, MD_RECEIVE, 0); uint8_t PCD_RndA_s[8]; memcpy (PCD_RndA_s, PCD_RndA, 8); rol8 (PCD_RndA_s); if (0 != memcmp (PCD_RndA_s, PICC_RndA_s, 8)) { printf ("PCD_RndA_s != PICC_RndA_s"); return -1; } MIFARE_DESFIRE (tag)->authenticated_key_no = key_no; MIFARE_DESFIRE (tag)->session_key = mifare_desfire_session_key_new (PCD_RndA, PICC_RndB, key); return 0; }