mirror of
https://github.com/Proxmark/proxmark3.git
synced 2025-08-20 13:23:25 -07:00
Code cleanup: Refactoring nonce2key
- include nonce2key() in mifarehost.c - remove tools/nonce2key - simplify mifare_autopwn.lua
This commit is contained in:
parent
de867f502f
commit
7779d73c71
14 changed files with 378 additions and 609 deletions
|
@ -1,21 +0,0 @@
|
|||
VPATH = ../../common/crapto1
|
||||
CC = gcc
|
||||
LD = gcc
|
||||
CFLAGS = -I../../common -Wall -O4
|
||||
LDFLAGS =
|
||||
|
||||
OBJS = crypto1.o crapto1.o
|
||||
HEADERS = crapto1.h
|
||||
EXES = nonce2key
|
||||
WINEXES = $(patsubst %, %.exe, $(EXES))
|
||||
|
||||
all: $(OBJS) $(EXES)
|
||||
|
||||
%.o : %.c
|
||||
$(CC) $(CFLAGS) -c -o $@ $<
|
||||
|
||||
% : %.c $(OBJS)
|
||||
$(CC) $(CFLAGS) $(LDFLAGS) -o $@ $(OBJS) $<
|
||||
|
||||
clean:
|
||||
rm -f $(OBJS) $(EXES) $(WINEXES)
|
|
@ -1,57 +0,0 @@
|
|||
#include "crapto1/crapto1.h"
|
||||
#include <inttypes.h>
|
||||
#include <stdio.h>
|
||||
typedef unsigned char byte_t;
|
||||
|
||||
int main(const int argc, const char* argv[]) {
|
||||
struct Crypto1State *state;
|
||||
uint32_t pos, uid, nt, nr, rr, nr_diff;
|
||||
byte_t bt, i, ks3x[8], par[8][8];
|
||||
uint64_t key_recovered;
|
||||
uint64_t par_info;
|
||||
uint64_t ks_info;
|
||||
nr = rr = 0;
|
||||
|
||||
if (argc < 5) {
|
||||
printf("\nsyntax: %s <uid> <nt> <par> <ks>\n\n",argv[0]);
|
||||
return 1;
|
||||
}
|
||||
sscanf(argv[1],"%08x",&uid);
|
||||
sscanf(argv[2],"%08x",&nt);
|
||||
sscanf(argv[3],"%016" SCNx64,&par_info);
|
||||
sscanf(argv[4],"%016" SCNx64,&ks_info);
|
||||
|
||||
// Reset the last three significant bits of the reader nonce
|
||||
nr &= 0xffffff1f;
|
||||
|
||||
printf("\nuid(%08x) nt(%08x) par(%016" PRIx64 ") ks(%016" PRIx64 ")\n\n",uid,nt,par_info,ks_info);
|
||||
|
||||
for (pos=0; pos<8; pos++)
|
||||
{
|
||||
ks3x[7-pos] = (ks_info >> (pos*8)) & 0x0f;
|
||||
bt = (par_info >> (pos*8)) & 0xff;
|
||||
for (i=0; i<8; i++)
|
||||
{
|
||||
par[7-pos][i] = (bt >> i) & 0x01;
|
||||
}
|
||||
}
|
||||
|
||||
printf("|diff|{nr} |ks3|ks3^5|parity |\n");
|
||||
printf("+----+--------+---+-----+---------------+\n");
|
||||
for (i=0; i<8; i++)
|
||||
{
|
||||
nr_diff = nr | i << 5;
|
||||
printf("| %02x |%08x|",i << 5, nr_diff);
|
||||
printf(" %01x | %01x |",ks3x[i], ks3x[i]^5);
|
||||
for (pos=0; pos<7; pos++) printf("%01x,",par[i][pos]);
|
||||
printf("%01x|\n",par[i][7]);
|
||||
}
|
||||
|
||||
state = lfsr_common_prefix(nr,rr,ks3x,par,0);
|
||||
lfsr_rollback_word(state,uid^nt,0);
|
||||
crypto1_get_lfsr(state,&key_recovered);
|
||||
printf("\nkey recovered: %012" PRIx64 "\n\n",key_recovered);
|
||||
crypto1_destroy(state);
|
||||
|
||||
return 0;
|
||||
}
|
|
@ -1,7 +0,0 @@
|
|||
To test the nonce2key tool.
|
||||
|
||||
:: tip
|
||||
You can use the output from "hf mf mifare" to use with this tool.
|
||||
|
||||
:: sample
|
||||
./nonce2key e9cadd9c a8bf4a12 a020a8285858b090 050f010607060e07
|
Loading…
Add table
Add a link
Reference in a new issue