d098bf623f
Please note that according to the NXP documentation of the Mifare DESFire EV1, the mifare_desfire_authenticate_iso() function can be used using either 3DES or 3K3DES keys. The former has not been tested yet and is likely not to work. To word it differently, this is a 3K3DES crypto support, not a ISO authentication support...
84 lines
2.8 KiB
C
84 lines
2.8 KiB
C
/*-
|
|
* Copyright (C) 2010, Romain Tartiere.
|
|
*
|
|
* This program is free software: you can redistribute it and/or modify it
|
|
* under the terms of the GNU Lesser General Public License as published by the
|
|
* Free Software Foundation, either version 3 of the License, or (at your
|
|
* option) any later version.
|
|
*
|
|
* This program is distributed in the hope that it will be useful, but WITHOUT
|
|
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
|
|
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
|
|
* more details.
|
|
*
|
|
* You should have received a copy of the GNU Lesser General Public License
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>
|
|
*
|
|
* $Id$
|
|
*/
|
|
|
|
#include <cutter.h>
|
|
|
|
#include <freefare.h>
|
|
|
|
#include "mifare_desfire_auto_authenticate.h"
|
|
|
|
uint8_t key_data_null[8] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 };
|
|
uint8_t key_data_des[8] = { 'A', 'B', 'C', 'D', 'E', 'F', 'G', 'H' };
|
|
uint8_t key_data_3des[16] = { 'C', 'a', 'r', 'd', ' ', 'M', 'a', 's', 't', 'e', 'r', ' ', 'K', 'e', 'y', '!' };
|
|
uint8_t key_data_aes[16] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 };
|
|
uint8_t key_data_3k3des[24] = { 0x00, 0x01, 0x00, 0x01, 0x00, 0x01, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00};
|
|
|
|
const uint8_t key_data_aes_version = 0x42;
|
|
|
|
void
|
|
mifare_desfire_auto_authenticate (MifareTag tag, uint8_t key_no)
|
|
{
|
|
/* Determine which key is currently the master one */
|
|
uint8_t key_version;
|
|
int res = mifare_desfire_get_key_version (tag, key_no, &key_version);
|
|
cut_assert_equal_int (0, res, cut_message ("mifare_desfire_get_key_version()"));
|
|
|
|
MifareDESFireKey key;
|
|
|
|
switch (key_version) {
|
|
case 0x00:
|
|
key = mifare_desfire_des_key_new_with_version (key_data_null);
|
|
break;
|
|
case 0x42:
|
|
key = mifare_desfire_aes_key_new_with_version (key_data_aes, key_data_aes_version);
|
|
break;
|
|
case 0xAA:
|
|
key = mifare_desfire_des_key_new_with_version (key_data_des);
|
|
break;
|
|
case 0xC7:
|
|
key = mifare_desfire_3des_key_new_with_version (key_data_3des);
|
|
break;
|
|
case 0x55:
|
|
key = mifare_desfire_3k3des_key_new_with_version (key_data_3k3des);
|
|
break;
|
|
default:
|
|
cut_fail ("Unknown master key.");
|
|
}
|
|
|
|
cut_assert_not_null (key, cut_message ("Cannot allocate key"));
|
|
|
|
/* Authenticate with this key */
|
|
switch (key_version) {
|
|
case 0x00:
|
|
case 0xAA:
|
|
case 0xC7:
|
|
res = mifare_desfire_authenticate (tag, key_no, key);
|
|
break;
|
|
case 0x55:
|
|
res = mifare_desfire_authenticate_iso (tag, key_no, key);
|
|
break;
|
|
case 0x42:
|
|
res = mifare_desfire_authenticate_aes (tag, key_no, key);
|
|
break;
|
|
}
|
|
cut_assert_equal_int (0, res, cut_message ("mifare_desfire_authenticate()"));
|
|
|
|
mifare_desfire_key_free (key);
|
|
}
|