mirror of
https://github.com/Proxmark/proxmark3.git
synced 2025-08-14 10:36:58 -07:00
more work towards iclass elite dumping.. not quite finished yet though :(
This commit is contained in:
parent
aa41c6058a
commit
9b82de75f4
4 changed files with 55 additions and 33 deletions
|
@ -68,7 +68,7 @@ int bruteforceItem(dumpdata item, uint16_t keytable[]);
|
|||
* @param k output
|
||||
*/
|
||||
void hash1(uint8_t csn[] , uint8_t k[]);
|
||||
|
||||
void hash2(uint8_t *key64, uint8_t *outp_keytable);
|
||||
/**
|
||||
* From dismantling iclass-paper:
|
||||
* Assume that an adversary somehow learns the first 16 bytes of hash2(K_cus ), i.e., y [0] and z [0] .
|
||||
|
|
|
@ -390,8 +390,8 @@ void diversifyKey(uint8_t csn[8], uint8_t key[8], uint8_t div_key[8])
|
|||
des_crypt_ecb(&ctx_enc,csn, crypted_csn);
|
||||
|
||||
//Calculate HASH0(DES))
|
||||
uint64_t crypt_csn = x_bytes_to_num(crypted_csn, 8);
|
||||
uint64_t crypted_csn_swapped = swapZvalues(crypt_csn);
|
||||
uint64_t crypt_csn = x_bytes_to_num(crypted_csn, 8);
|
||||
//uint64_t crypted_csn_swapped = swapZvalues(crypt_csn);
|
||||
|
||||
hash0(crypt_csn,div_key);
|
||||
}
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue