916 lines
24 KiB
C
916 lines
24 KiB
C
|
|
#include "globals.h"
|
||
|
|
#ifdef READER_CRYPTOWORKS
|
||
|
|
#include "cscrypt/bn.h"
|
||
|
|
#include "oscam-config.h"
|
||
|
|
#include "oscam-emm.h"
|
||
|
|
#include "reader-common.h"
|
||
|
|
|
||
|
|
struct bignum_st;
|
||
|
|
struct cryptoworks_data
|
||
|
|
{
|
||
|
|
BIGNUM *exp;
|
||
|
|
BIGNUM *ucpk;
|
||
|
|
int32_t ucpk_valid;
|
||
|
|
};
|
||
|
|
|
||
|
|
#define CMD_LEN 5
|
||
|
|
|
||
|
|
static const char *cs_cert = "oscam.cert";
|
||
|
|
|
||
|
|
static int search_boxkey(struct s_reader *rdr, uint16_t caid, char *key)
|
||
|
|
{
|
||
|
|
int i, rc = 0;
|
||
|
|
FILE *fp;
|
||
|
|
char c_caid[512];
|
||
|
|
|
||
|
|
fp = fopen(get_config_filename(c_caid, sizeof(c_caid), cs_cert), "r");
|
||
|
|
if(fp)
|
||
|
|
{
|
||
|
|
for(; (!rc) && fgets(c_caid, sizeof(c_caid), fp);)
|
||
|
|
{
|
||
|
|
char *c_provid, *c_key;
|
||
|
|
|
||
|
|
c_provid = strchr(c_caid, '#');
|
||
|
|
if(c_provid)
|
||
|
|
{ *c_provid = '\0'; }
|
||
|
|
if(!(c_provid = strchr(c_caid, ':')))
|
||
|
|
{ continue; }
|
||
|
|
*c_provid++ = '\0';
|
||
|
|
if(!(c_key = strchr(c_provid, ':')))
|
||
|
|
{ continue; }
|
||
|
|
*c_key++ = '\0';
|
||
|
|
if(word_atob(trim(c_caid)) != caid)
|
||
|
|
{ continue; }
|
||
|
|
if((i = (cs_strlen(trim(c_key)) >> 1)) > 256)
|
||
|
|
{ continue; }
|
||
|
|
if(cs_atob((uint8_t *)key, c_key, i) < 0)
|
||
|
|
{
|
||
|
|
rdr_log(rdr, "ERROR: wrong key in \"%s\"", cs_cert);
|
||
|
|
continue;
|
||
|
|
}
|
||
|
|
rc = 1;
|
||
|
|
}
|
||
|
|
fclose(fp);
|
||
|
|
}
|
||
|
|
return rc;
|
||
|
|
}
|
||
|
|
|
||
|
|
static void RotateBytes1(uint8_t *out, uint8_t *in, int32_t n)
|
||
|
|
{
|
||
|
|
// loop is executed atleast once, so it's not a good idea to
|
||
|
|
// call with n=0 !!
|
||
|
|
out += n;
|
||
|
|
do
|
||
|
|
{
|
||
|
|
*(--out) = *(in++);
|
||
|
|
}
|
||
|
|
while(--n);
|
||
|
|
}
|
||
|
|
|
||
|
|
static void RotateBytes2(uint8_t *in, int32_t n)
|
||
|
|
{
|
||
|
|
// loop is executed atleast once, so it's not a good idea to
|
||
|
|
// call with n=0 !!
|
||
|
|
uint8_t *e = in + n - 1;
|
||
|
|
do
|
||
|
|
{
|
||
|
|
uint8_t temp = *in;
|
||
|
|
*in++ = *e;
|
||
|
|
*e-- = temp;
|
||
|
|
}
|
||
|
|
while(in < e);
|
||
|
|
}
|
||
|
|
|
||
|
|
static int32_t Input(BIGNUM *d, uint8_t *in, int32_t n, int32_t LE)
|
||
|
|
{
|
||
|
|
if(LE)
|
||
|
|
{
|
||
|
|
uint8_t tmp[n];
|
||
|
|
RotateBytes1(tmp, in, n);
|
||
|
|
return (BN_bin2bn(tmp, n, d) != 0);
|
||
|
|
}
|
||
|
|
else
|
||
|
|
{ return (BN_bin2bn(in, n, d) != 0); }
|
||
|
|
}
|
||
|
|
|
||
|
|
static int32_t Output(struct s_reader *reader, uint8_t *out, int32_t n, BIGNUM *r, int32_t LE)
|
||
|
|
{
|
||
|
|
int32_t s = BN_num_bytes(r);
|
||
|
|
if(s > n)
|
||
|
|
{
|
||
|
|
uint8_t buff[s];
|
||
|
|
rdr_log_dbg(reader, D_READER, "rsa: RSA len %d > %d, truncating", s, n);
|
||
|
|
BN_bn2bin(r, buff);
|
||
|
|
memcpy(out, buff + s - n, n);
|
||
|
|
}
|
||
|
|
else if(s < n)
|
||
|
|
{
|
||
|
|
int32_t l = n - s;
|
||
|
|
rdr_log_dbg(reader, D_READER, "rsa: RSA len %d < %d, padding", s, n);
|
||
|
|
memset(out, 0, l);
|
||
|
|
BN_bn2bin(r, out + l);
|
||
|
|
}
|
||
|
|
else
|
||
|
|
{ BN_bn2bin(r, out); }
|
||
|
|
if(LE)
|
||
|
|
{ RotateBytes2(out, n); }
|
||
|
|
return (s);
|
||
|
|
}
|
||
|
|
|
||
|
|
static int32_t cw_RSA(struct s_reader *reader, uint8_t *out, uint8_t *in, int32_t n, BIGNUM *exp, BIGNUM *mod, int32_t LE)
|
||
|
|
{
|
||
|
|
int32_t rc = 0;
|
||
|
|
BN_CTX *ctx;
|
||
|
|
BIGNUM *r, *d;
|
||
|
|
ctx = BN_CTX_new();
|
||
|
|
r = BN_new();
|
||
|
|
d = BN_new();
|
||
|
|
if(Input(d, in, n, LE))
|
||
|
|
{
|
||
|
|
if(BN_mod_exp(r, d, exp, mod, ctx))
|
||
|
|
{ rc = Output(reader, out, n, r, LE); }
|
||
|
|
else
|
||
|
|
{ rdr_log(reader, "rsa: mod-exp failed"); }
|
||
|
|
}
|
||
|
|
BN_CTX_free(ctx);
|
||
|
|
BN_free(d);
|
||
|
|
BN_free(r);
|
||
|
|
return (rc);
|
||
|
|
}
|
||
|
|
|
||
|
|
static time_t chid_date(uint8_t *ptr, char *buf, int32_t l)
|
||
|
|
{
|
||
|
|
time_t rc = 0;
|
||
|
|
struct tm timeinfo;
|
||
|
|
memset(&timeinfo, 0, sizeof(struct tm));
|
||
|
|
if(buf)
|
||
|
|
{
|
||
|
|
timeinfo.tm_year = 90 + (ptr[0] >> 1);
|
||
|
|
timeinfo.tm_mon = (((ptr[0] & 1) << 3) | (ptr[1] >> 5)) - 1;
|
||
|
|
timeinfo.tm_mday = ptr[1] & 0x1f;
|
||
|
|
rc = mktime(&timeinfo);
|
||
|
|
strftime(buf, l, "%Y/%m/%d", &timeinfo);
|
||
|
|
}
|
||
|
|
return (rc);
|
||
|
|
}
|
||
|
|
|
||
|
|
|
||
|
|
static int32_t select_file(struct s_reader *reader, uint8_t f1, uint8_t f2, uint8_t *cta_res, uint16_t *p_cta_lr)
|
||
|
|
{
|
||
|
|
uint16_t cta_lr;
|
||
|
|
uint8_t insA4[] = { 0xA4, 0xA4, 0x00, 0x00, 0x02, 0x00, 0x00 };
|
||
|
|
insA4[5] = f1;
|
||
|
|
insA4[6] = f2;
|
||
|
|
write_cmd(insA4, insA4 + 5); // select file
|
||
|
|
*p_cta_lr = cta_lr;
|
||
|
|
return ((cta_res[0] == 0x9f) && (cta_res[1] == 0x11));
|
||
|
|
}
|
||
|
|
|
||
|
|
static int32_t read_record(struct s_reader *reader, uint8_t rec, uint8_t *cta_res)
|
||
|
|
{
|
||
|
|
uint16_t cta_lr;
|
||
|
|
uint8_t insA2[] = { 0xA4, 0xA2, 0x00, 0x00, 0x01, 0x00 };
|
||
|
|
uint8_t insB2[] = { 0xA4, 0xB2, 0x00, 0x00, 0x00 };
|
||
|
|
|
||
|
|
insA2[5] = rec;
|
||
|
|
write_cmd(insA2, insA2 + 5); // select record
|
||
|
|
if(cta_res[0] != 0x9f)
|
||
|
|
{ return (-1); }
|
||
|
|
insB2[4] = cta_res[1]; // get len
|
||
|
|
write_cmd(insB2, NULL); // read record
|
||
|
|
if((cta_res[cta_lr - 2] != 0x90) || (cta_res[cta_lr - 1]))
|
||
|
|
{ return (-1); }
|
||
|
|
return (cta_lr - 2);
|
||
|
|
}
|
||
|
|
|
||
|
|
/*
|
||
|
|
int32_t cryptoworks_send_pin(struct s_reader * reader)
|
||
|
|
{
|
||
|
|
uint8_t insPIN[] = { 0xA4, 0x20, 0x00, 0x00, 0x04, 0x00,0x00,0x00,0x00 }; //Verify PIN
|
||
|
|
|
||
|
|
if(reader->pincode[0] && (reader->pincode[0]&0xF0)==0x30)
|
||
|
|
{
|
||
|
|
memcpy(insPIN+5,reader->pincode,4);
|
||
|
|
|
||
|
|
write_cmd(insPIN, insPIN+5);
|
||
|
|
rdr_log_dbg(reader, D_READER, "Sent pincode to card.");
|
||
|
|
if((cta_res[0]==0x98)&&(cta_res[1]==0x04)) rdr_log(reader, "bad pincode");
|
||
|
|
|
||
|
|
return OK;
|
||
|
|
}
|
||
|
|
|
||
|
|
return(0);
|
||
|
|
}
|
||
|
|
*/
|
||
|
|
|
||
|
|
static int32_t cryptoworks_disable_pin(struct s_reader *reader)
|
||
|
|
{
|
||
|
|
def_resp;
|
||
|
|
uint8_t insPIN[] = { 0xA4, 0x26, 0x00, 0x00, 0x04, 0x00, 0x00, 0x00, 0x00 }; // disable PIN
|
||
|
|
|
||
|
|
if(reader->pincode[0] && (reader->pincode[0] & 0xF0) == 0x30)
|
||
|
|
{
|
||
|
|
memcpy(insPIN + 5, reader->pincode, 4);
|
||
|
|
|
||
|
|
write_cmd(insPIN, insPIN + 5);
|
||
|
|
rdr_log(reader, "disable pincode to card");
|
||
|
|
if((cta_res[0] == 0x98) && (cta_res[1] == 0x04)) { rdr_log(reader, "bad pincode"); }
|
||
|
|
return ERROR;
|
||
|
|
}
|
||
|
|
return OK;
|
||
|
|
}
|
||
|
|
|
||
|
|
static int32_t cryptoworks_card_init(struct s_reader *reader, ATR *newatr)
|
||
|
|
{
|
||
|
|
get_atr;
|
||
|
|
def_resp;
|
||
|
|
int32_t i;
|
||
|
|
uint32_t mfid = 0x3F20;
|
||
|
|
static const uint8_t cwexp[] = { 1, 0 , 1 };
|
||
|
|
uint8_t insA4C[] = { 0xA4, 0xC0, 0x00, 0x00, 0x11 };
|
||
|
|
uint8_t insB8[] = { 0xA4, 0xB8, 0x00, 0x00, 0x0C };
|
||
|
|
uint8_t issuerid = 0;
|
||
|
|
char issuer[20] = { 0 }, tmp[11];
|
||
|
|
char *unknown = "unknown", *pin = unknown, ptxt[CS_MAXPROV << 2] = {0};
|
||
|
|
|
||
|
|
if((atr[6] != 0xC4) || (atr[9] != 0x8F) || (atr[10] != 0xF1)) { return ERROR; }
|
||
|
|
|
||
|
|
if(!cs_malloc(&reader->csystem_data, sizeof(struct cryptoworks_data)))
|
||
|
|
{ return ERROR; }
|
||
|
|
struct cryptoworks_data *csystem_data = reader->csystem_data;
|
||
|
|
|
||
|
|
rdr_log(reader, "card detected");
|
||
|
|
rdr_log(reader, "type: CryptoWorks");
|
||
|
|
|
||
|
|
reader->caid = 0xD00;
|
||
|
|
reader->nprov = 0;
|
||
|
|
memset(reader->prid, 0, sizeof(reader->prid));
|
||
|
|
|
||
|
|
write_cmd(insA4C, NULL); // read masterfile-ID
|
||
|
|
if((cta_res[0] == 0xDF) && (cta_res[1] >= 6))
|
||
|
|
{ mfid = (cta_res[6] << 8) | cta_res[7]; }
|
||
|
|
|
||
|
|
select_file(reader, 0x3f, 0x20, cta_res, &cta_lr);
|
||
|
|
insB8[2] = insB8[3] = 0; // first
|
||
|
|
for(cta_res[0] = 0xdf; cta_res[0] == 0xdf;)
|
||
|
|
{
|
||
|
|
write_cmd(insB8, NULL); // read provider id's
|
||
|
|
if(cta_res[0] != 0xdf) { break; }
|
||
|
|
if(((cta_res[4] & 0x1f) == 0x1f) && (reader->nprov < CS_MAXPROV))
|
||
|
|
{
|
||
|
|
snprintf(ptxt + cs_strlen(ptxt), sizeof(ptxt) - cs_strlen(ptxt), ",%02X", cta_res[5]);
|
||
|
|
reader->prid[reader->nprov++][3] = cta_res[5];
|
||
|
|
}
|
||
|
|
insB8[2] = insB8[3] = 0xff; // next
|
||
|
|
}
|
||
|
|
for(i = reader->nprov; i < CS_MAXPROV; i++)
|
||
|
|
{ memset(&reader->prid[i][0], 0xff, 4); }
|
||
|
|
|
||
|
|
select_file(reader, 0x2f, 0x01, cta_res, &cta_lr); // read caid
|
||
|
|
if(read_record(reader, 0xD1, cta_res) >= 4)
|
||
|
|
{ reader->caid = (cta_res[2] << 8) | cta_res[3]; }
|
||
|
|
|
||
|
|
if(read_record(reader, 0x80, cta_res) >= 7) // read serial
|
||
|
|
{ memcpy(reader->hexserial, cta_res + 2, 5); }
|
||
|
|
rdr_log_sensitive(reader, "type: CryptoWorks, caid: %04X, ascii serial: {%llu}, hex serial: {%s}",
|
||
|
|
reader->caid, (unsigned long long) b2ll(5, reader->hexserial), cs_hexdump(0, reader->hexserial, 5, tmp, sizeof(tmp)));
|
||
|
|
|
||
|
|
if(read_record(reader, 0x9E, cta_res) >= 66) // read ISK
|
||
|
|
{
|
||
|
|
uint8_t keybuf[256];
|
||
|
|
BIGNUM *ipk;
|
||
|
|
if(search_boxkey(reader, reader->caid, (char *)keybuf))
|
||
|
|
{
|
||
|
|
ipk = BN_new();
|
||
|
|
BN_bin2bn(cwexp, sizeof(cwexp), csystem_data->exp);
|
||
|
|
BN_bin2bn(keybuf, 64, ipk);
|
||
|
|
cw_RSA(reader, cta_res + 2, cta_res + 2, 0x40, csystem_data->exp, ipk, 0);
|
||
|
|
BN_free(ipk);
|
||
|
|
|
||
|
|
csystem_data->ucpk_valid = (cta_res[2] == ((mfid & 0xFF) >> 1));
|
||
|
|
if(csystem_data->ucpk_valid)
|
||
|
|
{
|
||
|
|
cta_res[2] |= 0x80;
|
||
|
|
BN_bin2bn(cta_res + 2, 0x40, csystem_data->ucpk);
|
||
|
|
rdr_log_dump_dbg(reader, D_READER, cta_res + 2, 0x40, "IPK available -> session-key:");
|
||
|
|
}
|
||
|
|
else
|
||
|
|
{
|
||
|
|
csystem_data->ucpk_valid = (keybuf[0] == (((mfid & 0xFF) >> 1) | 0x80));
|
||
|
|
if(csystem_data->ucpk_valid)
|
||
|
|
{
|
||
|
|
BN_bin2bn(keybuf, 0x40, csystem_data->ucpk);
|
||
|
|
rdr_log_dump_dbg(reader, D_READER, keybuf, 0x40, "session-key found:");
|
||
|
|
}
|
||
|
|
else
|
||
|
|
{ rdr_log(reader, "invalid IPK or session-key for CAID %04X !", reader->caid); }
|
||
|
|
}
|
||
|
|
}
|
||
|
|
}
|
||
|
|
if(read_record(reader, 0x9F, cta_res) >= 3)
|
||
|
|
{ issuerid = cta_res[2]; }
|
||
|
|
if(read_record(reader, 0xC0, cta_res) >= 16)
|
||
|
|
{
|
||
|
|
cs_strncpy(issuer, (const char *)cta_res + 2, sizeof(issuer));
|
||
|
|
trim(issuer);
|
||
|
|
}
|
||
|
|
else
|
||
|
|
{ cs_strncpy(issuer, unknown, sizeof(issuer)); }
|
||
|
|
|
||
|
|
select_file(reader, 0x3f, 0x20, cta_res, &cta_lr);
|
||
|
|
select_file(reader, 0x2f, 0x11, cta_res, &cta_lr); // read pin
|
||
|
|
|
||
|
|
if(read_record(reader, atr[8], cta_res) >= 7)
|
||
|
|
{
|
||
|
|
cta_res[6] = 0;
|
||
|
|
pin = (char *)cta_res + 2;
|
||
|
|
}
|
||
|
|
rdr_log(reader, "issuer: %s, id: %02X, bios: v%d, pin: %s, mfid: %04X", issuer, issuerid, atr[7], pin, mfid);
|
||
|
|
rdr_log(reader, "providers: %d (%s)", reader->nprov, ptxt + 1);
|
||
|
|
|
||
|
|
cryptoworks_disable_pin(reader);
|
||
|
|
|
||
|
|
if (((reader->caid == 0x0D96) || (reader->caid == 0x0D98)) && reader->needsglobalfirst == 1)
|
||
|
|
{
|
||
|
|
if(!cs_malloc(&reader->last_g_emm, sizeof(EMM_PACKET)))
|
||
|
|
{
|
||
|
|
return ERROR;
|
||
|
|
}
|
||
|
|
reader->last_g_emm_valid = false;
|
||
|
|
rdr_log(reader, "Init for global EMM handling CAID %04X successful",reader->caid);
|
||
|
|
}
|
||
|
|
|
||
|
|
return OK;
|
||
|
|
}
|
||
|
|
|
||
|
|
static int32_t cryptoworks_do_ecm(struct s_reader *reader, const ECM_REQUEST *er, struct s_ecm_answer *ea)
|
||
|
|
{
|
||
|
|
def_resp;
|
||
|
|
int32_t r = 0;
|
||
|
|
uint8_t ins4C[] = { 0xA4, 0x4C, 0x00, 0x00, 0x00 };
|
||
|
|
uint8_t insC0[] = { 0xA4, 0xC0, 0x00, 0x00, 0x1C };
|
||
|
|
uint8_t nanoD4[10];
|
||
|
|
struct cryptoworks_data *csystem_data = reader->csystem_data;
|
||
|
|
int32_t secLen = check_sct_len(er->ecm, -5 + (csystem_data->ucpk_valid ? sizeof(nanoD4) : 0));
|
||
|
|
|
||
|
|
if(secLen > 5)
|
||
|
|
{
|
||
|
|
int32_t i;
|
||
|
|
const uint8_t *ecm = er->ecm;
|
||
|
|
uint8_t buff[MAX_LEN];
|
||
|
|
|
||
|
|
if(csystem_data->ucpk_valid)
|
||
|
|
{
|
||
|
|
memcpy(buff, er->ecm, secLen);
|
||
|
|
nanoD4[0] = 0xD4;
|
||
|
|
nanoD4[1] = 0x08;
|
||
|
|
for(i = 2; i < (int)sizeof(nanoD4); i++)
|
||
|
|
{ nanoD4[i] = rand(); }
|
||
|
|
memcpy(&buff[secLen], nanoD4, sizeof(nanoD4));
|
||
|
|
ecm = buff;
|
||
|
|
secLen += sizeof(nanoD4);
|
||
|
|
}
|
||
|
|
|
||
|
|
ins4C[3] = csystem_data->ucpk_valid ? 2 : 0;
|
||
|
|
ins4C[4] = secLen - 5;
|
||
|
|
write_cmd(ins4C, ecm + 5);
|
||
|
|
|
||
|
|
if(cta_res[cta_lr - 2] == 0x9f)
|
||
|
|
{
|
||
|
|
insC0[4] = cta_res[cta_lr - 1];
|
||
|
|
write_cmd(insC0, NULL);
|
||
|
|
|
||
|
|
for(i = 0; i < secLen && r < 2;)
|
||
|
|
{
|
||
|
|
int32_t n = cta_res[i + 1];
|
||
|
|
switch(cta_res[i])
|
||
|
|
{
|
||
|
|
case 0x80:
|
||
|
|
rdr_log_dbg(reader, D_READER, "nano 80 (serial)");
|
||
|
|
break;
|
||
|
|
|
||
|
|
case 0xD4:
|
||
|
|
rdr_log_dbg(reader, D_READER, "nano D4 (rand)");
|
||
|
|
if(n < 8 || memcmp(&cta_res[i], nanoD4, sizeof(nanoD4)))
|
||
|
|
{
|
||
|
|
rdr_log_dbg(reader, D_READER, "random data check failed after decrypt");
|
||
|
|
}
|
||
|
|
break;
|
||
|
|
|
||
|
|
case 0xDB: // CW
|
||
|
|
rdr_log_dbg(reader, D_READER, "nano DB (cw)");
|
||
|
|
if(n == 0x10)
|
||
|
|
{
|
||
|
|
memcpy(ea->cw, &cta_res[i + 2], 16);
|
||
|
|
r |= 1;
|
||
|
|
}
|
||
|
|
break;
|
||
|
|
|
||
|
|
case 0xDF: // signature
|
||
|
|
rdr_log_dbg(reader, D_READER, "nano DF %02x (sig)", n);
|
||
|
|
if(n == 0x08)
|
||
|
|
{
|
||
|
|
if((cta_res[i + 2] & 0x50) == 0x50 && !(cta_res[i + 3] & 0x01) && (cta_res[i + 5] & 0x80))
|
||
|
|
{ r |= 2; }
|
||
|
|
}
|
||
|
|
else if(n == 0x40) // camcrypt
|
||
|
|
{
|
||
|
|
if(csystem_data->ucpk_valid)
|
||
|
|
{
|
||
|
|
cw_RSA(reader, &cta_res[i + 2], &cta_res[i + 2], n, csystem_data->exp, csystem_data->ucpk, 0);
|
||
|
|
rdr_log_dbg(reader, D_READER, "after camcrypt");
|
||
|
|
r = 0;
|
||
|
|
secLen = n - 4;
|
||
|
|
n = 4;
|
||
|
|
}
|
||
|
|
else
|
||
|
|
{
|
||
|
|
rdr_log(reader, "valid UCPK needed for camcrypt!");
|
||
|
|
return ERROR;
|
||
|
|
}
|
||
|
|
}
|
||
|
|
break;
|
||
|
|
|
||
|
|
default:
|
||
|
|
rdr_log_dbg(reader, D_READER, "nano %02x (unhandled)", cta_res[i]);
|
||
|
|
break;
|
||
|
|
}
|
||
|
|
i += n + 2;
|
||
|
|
}
|
||
|
|
}
|
||
|
|
|
||
|
|
/*
|
||
|
|
#ifdef LALL
|
||
|
|
if ((cta_res[cta_lr-2]==0x9f)&&(cta_res[cta_lr-1]==0x1c))
|
||
|
|
{
|
||
|
|
write_cmd(insC0, NULL);
|
||
|
|
if ((cta_lr>26)&&(cta_res[cta_lr-2]==0x90)&&(cta_res[cta_lr-1]==0))
|
||
|
|
{
|
||
|
|
if (rc=(((cta_res[20]&0x50)==0x50) &&
|
||
|
|
(!(cta_res[21]&0x01)) &&
|
||
|
|
(cta_res[23]&0x80)))
|
||
|
|
memcpy(ea->cw, cta_res+2, 16);
|
||
|
|
}
|
||
|
|
}
|
||
|
|
#endif
|
||
|
|
*/
|
||
|
|
}
|
||
|
|
|
||
|
|
//return(rc ? 1 : 0);
|
||
|
|
return ((r == 3) ? 1 : 0);
|
||
|
|
}
|
||
|
|
|
||
|
|
static uint32_t cryptoworks_get_emm_provid(uint8_t *buffer, int32_t len)
|
||
|
|
{
|
||
|
|
uint32_t provid = 0;
|
||
|
|
int32_t i = 0;
|
||
|
|
|
||
|
|
for(i = 0; i < len;)
|
||
|
|
{
|
||
|
|
switch(buffer[i])
|
||
|
|
{
|
||
|
|
case 0x83:
|
||
|
|
provid = buffer[i + 2] & 0xfc;
|
||
|
|
return provid;
|
||
|
|
break;
|
||
|
|
|
||
|
|
default:
|
||
|
|
i += buffer[i + 1] + 2;
|
||
|
|
break;
|
||
|
|
}
|
||
|
|
|
||
|
|
}
|
||
|
|
return provid;
|
||
|
|
}
|
||
|
|
|
||
|
|
static int32_t cryptoworks_get_emm_type(EMM_PACKET *ep, struct s_reader *rdr)
|
||
|
|
{
|
||
|
|
char dumprdrserial[16], dumpemmserial[16];
|
||
|
|
|
||
|
|
rdr_log_dbg(rdr, D_EMM, "Entered cryptoworks_get_emm_type ep->emm[0]=%02x", ep->emm[0]);
|
||
|
|
switch(ep->emm[0])
|
||
|
|
{
|
||
|
|
case 0x82:
|
||
|
|
if(ep->emm[3] == 0xA9 && ep->emm[4] == 0xFF && ep->emm[13] == 0x80 && ep->emm[14] == 0x05)
|
||
|
|
{
|
||
|
|
ep->type = UNIQUE;
|
||
|
|
memset(ep->hexserial, 0, 8);
|
||
|
|
memcpy(ep->hexserial, ep->emm + 5, 5);
|
||
|
|
#ifdef WITH_DEBUG
|
||
|
|
if(cs_dblevel & D_EMM)
|
||
|
|
{
|
||
|
|
cs_hexdump(1, rdr->hexserial, 5, dumprdrserial, sizeof(dumprdrserial));
|
||
|
|
cs_hexdump(1, ep->hexserial, 5, dumpemmserial, sizeof(dumpemmserial));
|
||
|
|
}
|
||
|
|
#endif
|
||
|
|
i2b_buf(4, cryptoworks_get_emm_provid(ep->emm + 12, ep->emmlen - 12), ep->provid);
|
||
|
|
rdr_log_dbg_sensitive(rdr, D_EMM, "UNIQUE, ep = {%s} rdr = {%s}", dumpemmserial, dumprdrserial);
|
||
|
|
return (!memcmp(ep->emm + 5, rdr->hexserial, 5)); // check for serial
|
||
|
|
}
|
||
|
|
break;
|
||
|
|
|
||
|
|
case 0x84:
|
||
|
|
if(ep->emm[3] == 0xA9 && ep->emm[4] == 0xFF && ep->emm[12] == 0x80 && ep->emm[13] == 0x04)
|
||
|
|
{
|
||
|
|
ep->type = SHARED;
|
||
|
|
memset(ep->hexserial, 0, 8);
|
||
|
|
memcpy(ep->hexserial, ep->emm + 5, 4);
|
||
|
|
#ifdef WITH_DEBUG
|
||
|
|
if(cs_dblevel & D_EMM)
|
||
|
|
{
|
||
|
|
cs_hexdump(1, rdr->hexserial, 4, dumprdrserial, sizeof(dumprdrserial));
|
||
|
|
cs_hexdump(1, ep->hexserial, 4, dumpemmserial, sizeof(dumpemmserial));
|
||
|
|
}
|
||
|
|
#endif
|
||
|
|
i2b_buf(4, cryptoworks_get_emm_provid(ep->emm + 12, ep->emmlen - 12), ep->provid);
|
||
|
|
rdr_log_dbg_sensitive(rdr, D_EMM, "SHARED, ep = {%s} rdr = {%s}", dumpemmserial, dumprdrserial);
|
||
|
|
return (!memcmp(ep->emm + 5, rdr->hexserial, 4)); // check for SA
|
||
|
|
}
|
||
|
|
break;
|
||
|
|
|
||
|
|
case 0x86:
|
||
|
|
if(ep->emm[3] == 0xA9 && ep->emm[4] == 0xFF && ep->emm[5] == 0x83
|
||
|
|
&& ep->emm[6] == 0x01 && (ep->emm[8] == 0x85 || ep->emm[8] == 0x84 || ep->emm[8] == 0x8C))
|
||
|
|
{
|
||
|
|
rdr_log_dbg(rdr, D_EMM, "SHARED (Header)");
|
||
|
|
ep->type = SHARED;
|
||
|
|
i2b_buf(4, cryptoworks_get_emm_provid(ep->emm + 8, ep->emmlen - 8), ep->provid);
|
||
|
|
// We need those packets to pass otherwise we would never
|
||
|
|
// be able to complete EMM reassembly
|
||
|
|
return 1;
|
||
|
|
}
|
||
|
|
break;
|
||
|
|
|
||
|
|
case 0x88:
|
||
|
|
case 0x89:
|
||
|
|
if(ep->emm[3] == 0xA9 && ep->emm[4] == 0xFF && ep->emm[8] == 0x83 && ep->emm[9] == 0x01)
|
||
|
|
{
|
||
|
|
rdr_log_dbg(rdr, D_EMM, "GLOBAL");
|
||
|
|
ep->type = GLOBAL;
|
||
|
|
i2b_buf(4, cryptoworks_get_emm_provid(ep->emm + 8, ep->emmlen - 8), ep->provid);
|
||
|
|
return 1;
|
||
|
|
}
|
||
|
|
break;
|
||
|
|
|
||
|
|
case 0x8F:
|
||
|
|
ep->type = UNKNOWN;
|
||
|
|
rdr_log_dbg(rdr, D_EMM, "0x8F via camd3");
|
||
|
|
|
||
|
|
switch(ep->emm[4])
|
||
|
|
{
|
||
|
|
case 0x44:
|
||
|
|
i2b_buf(4, cryptoworks_get_emm_provid(ep->emm + 8, ep->emmlen - 8), ep->provid);
|
||
|
|
ep->type = GLOBAL;
|
||
|
|
break;
|
||
|
|
|
||
|
|
case 0x48:
|
||
|
|
i2b_buf(4, cryptoworks_get_emm_provid(ep->emm + 12, ep->emmlen - 12), ep->provid);
|
||
|
|
ep->type = SHARED;
|
||
|
|
break;
|
||
|
|
|
||
|
|
case 0x42:
|
||
|
|
i2b_buf(4, cryptoworks_get_emm_provid(ep->emm + 12, ep->emmlen - 12), ep->provid);
|
||
|
|
ep->type = UNIQUE;
|
||
|
|
break;
|
||
|
|
}
|
||
|
|
return 1;
|
||
|
|
|
||
|
|
/* FIXME: Seems to be that all other EMM types are rejected by the card */
|
||
|
|
default:
|
||
|
|
ep->type = UNKNOWN;
|
||
|
|
rdr_log_dbg(rdr, D_EMM, "UNKNOWN");
|
||
|
|
return 0; // skip emm
|
||
|
|
}
|
||
|
|
|
||
|
|
rdr_log_dbg(rdr, D_EMM, "invalid");
|
||
|
|
return 0;
|
||
|
|
}
|
||
|
|
|
||
|
|
static int32_t cryptoworks_get_emm_filter(struct s_reader *rdr, struct s_csystem_emm_filter **emm_filters, unsigned int *filter_count)
|
||
|
|
{
|
||
|
|
if(*emm_filters == NULL)
|
||
|
|
{
|
||
|
|
const unsigned int max_filter_count = 4;
|
||
|
|
if(!cs_malloc(emm_filters, max_filter_count * sizeof(struct s_csystem_emm_filter)))
|
||
|
|
{ return ERROR; }
|
||
|
|
|
||
|
|
struct s_csystem_emm_filter *filters = *emm_filters;
|
||
|
|
*filter_count = 0;
|
||
|
|
|
||
|
|
int32_t idx = 0;
|
||
|
|
|
||
|
|
filters[idx].type = EMM_GLOBAL;
|
||
|
|
filters[idx].enabled = 1;
|
||
|
|
filters[idx].filter[0] = 0x88;
|
||
|
|
filters[idx].mask[0] = 0xFE;
|
||
|
|
filters[idx].filter[1] = 0xA9;
|
||
|
|
filters[idx].mask[1] = 0xFF;
|
||
|
|
filters[idx].filter[2] = 0xFF;
|
||
|
|
filters[idx].mask[2] = 0xFF;
|
||
|
|
idx++;
|
||
|
|
|
||
|
|
filters[idx].type = EMM_SHARED;
|
||
|
|
filters[idx].enabled = 1;
|
||
|
|
filters[idx].filter[0] = 0x86;
|
||
|
|
filters[idx].mask[0] = 0xFF;
|
||
|
|
filters[idx].filter[1] = 0xA9;
|
||
|
|
filters[idx].mask[1] = 0xFF;
|
||
|
|
filters[idx].filter[2] = 0xFF;
|
||
|
|
filters[idx].mask[2] = 0xFF;
|
||
|
|
idx++;
|
||
|
|
|
||
|
|
filters[idx].type = EMM_SHARED;
|
||
|
|
filters[idx].enabled = 1;
|
||
|
|
filters[idx].filter[0] = 0x84;
|
||
|
|
filters[idx].mask[0] = 0xFF;
|
||
|
|
filters[idx].filter[1] = 0xA9;
|
||
|
|
filters[idx].mask[1] = 0xFF;
|
||
|
|
filters[idx].filter[2] = 0xFF;
|
||
|
|
filters[idx].mask[2] = 0xFF;
|
||
|
|
memcpy(&filters[idx].filter[3], rdr->hexserial, 4);
|
||
|
|
memset(&filters[idx].mask[3], 0xFF, 4);
|
||
|
|
idx++;
|
||
|
|
|
||
|
|
filters[idx].type = EMM_UNIQUE;
|
||
|
|
filters[idx].enabled = 1;
|
||
|
|
filters[idx].filter[0] = 0x82;
|
||
|
|
filters[idx].mask[0] = 0xFF;
|
||
|
|
filters[idx].filter[1] = 0xA9;
|
||
|
|
filters[idx].mask[1] = 0xFF;
|
||
|
|
filters[idx].filter[2] = 0xFF;
|
||
|
|
filters[idx].mask[2] = 0xFF;
|
||
|
|
memcpy(&filters[idx].filter[3], rdr->hexserial, 5);
|
||
|
|
memset(&filters[idx].mask[3], 0xFF, 5);
|
||
|
|
idx++;
|
||
|
|
|
||
|
|
*filter_count = idx;
|
||
|
|
}
|
||
|
|
|
||
|
|
return OK;
|
||
|
|
}
|
||
|
|
|
||
|
|
static int32_t cryptoworks_do_emm(struct s_reader *reader, EMM_PACKET *ep)
|
||
|
|
{
|
||
|
|
def_resp;
|
||
|
|
uint8_t insEMM_GA[] = { 0xA4, 0x44, 0x00, 0x00, 0x00 };
|
||
|
|
uint8_t insEMM_SA[] = { 0xA4, 0x48, 0x00, 0x00, 0x00 };
|
||
|
|
uint8_t insEMM_UA[] = { 0xA4, 0x42, 0x00, 0x00, 0x00 };
|
||
|
|
uint8_t *emm = ep->emm;
|
||
|
|
|
||
|
|
if(emm[0] == 0x8f && emm[3] == 0xA4)
|
||
|
|
{
|
||
|
|
// camd3 emm
|
||
|
|
write_cmd(emm + 3, emm + 3 + CMD_LEN);
|
||
|
|
}
|
||
|
|
else
|
||
|
|
{
|
||
|
|
switch(ep->type)
|
||
|
|
{
|
||
|
|
case GLOBAL: // GA
|
||
|
|
insEMM_GA[4] = ep->emm[2] - 2;
|
||
|
|
if(emm[7] == insEMM_GA[4] - 3)
|
||
|
|
{
|
||
|
|
write_cmd(insEMM_GA, emm + 5);
|
||
|
|
}
|
||
|
|
break;
|
||
|
|
|
||
|
|
case SHARED: // SA
|
||
|
|
insEMM_SA[4] = ep->emm[2] - 6;
|
||
|
|
if(emm[11] == insEMM_SA[4] - 3)
|
||
|
|
{
|
||
|
|
write_cmd(insEMM_SA, emm + 9);
|
||
|
|
}
|
||
|
|
break;
|
||
|
|
|
||
|
|
case UNIQUE: // UA
|
||
|
|
insEMM_UA[4] = ep->emm[2] - 7;
|
||
|
|
if(emm[12] == insEMM_UA[4] - 3)
|
||
|
|
{
|
||
|
|
//cryptoworks_send_pin(); //?? may be
|
||
|
|
write_cmd(insEMM_UA, emm + 10);
|
||
|
|
}
|
||
|
|
break;
|
||
|
|
}
|
||
|
|
}
|
||
|
|
|
||
|
|
if((cta_res[0] == 0x90) && (cta_res[1] == 0x00))
|
||
|
|
{
|
||
|
|
return OK;
|
||
|
|
}
|
||
|
|
|
||
|
|
// emm already written before, entitlement / key is already up to date -> skipped
|
||
|
|
if((cta_res[0] == 0x94) && (cta_res[1] == 0x04))
|
||
|
|
{
|
||
|
|
return SKIPPED;
|
||
|
|
}
|
||
|
|
|
||
|
|
rdr_log_dbg(reader, D_EMM, "%s(): type %d - response %02X %02X",
|
||
|
|
__func__, ep->type, cta_res[0], cta_res[1]);
|
||
|
|
|
||
|
|
return ERROR;
|
||
|
|
}
|
||
|
|
|
||
|
|
static int32_t cryptoworks_card_info(struct s_reader *reader)
|
||
|
|
{
|
||
|
|
def_resp;
|
||
|
|
int32_t i;
|
||
|
|
uint8_t insA21[] = { 0xA4, 0xA2, 0x01, 0x00, 0x05, 0x8C, 0x00, 0x00, 0x00, 0x00 };
|
||
|
|
uint8_t insB2[] = { 0xA4, 0xB2, 0x00, 0x00, 0x00 };
|
||
|
|
char l_name[20 + 8] = ", name: ";
|
||
|
|
|
||
|
|
cs_clear_entitlement(reader); // reset the entitlements
|
||
|
|
|
||
|
|
for(i = 0; i < reader->nprov; i++)
|
||
|
|
{
|
||
|
|
l_name[8] = 0;
|
||
|
|
select_file(reader, 0x1f, reader->prid[i][3], cta_res, &cta_lr); // select provider
|
||
|
|
select_file(reader, 0x0e, 0x11, cta_res, &cta_lr); // read provider name
|
||
|
|
|
||
|
|
if(read_record(reader, 0xD6, cta_res) >= 16)
|
||
|
|
{
|
||
|
|
cs_strncpy(l_name + 8, (const char *)cta_res + 2, sizeof(l_name) - 8);
|
||
|
|
l_name[sizeof(l_name) - 1] = 0;
|
||
|
|
trim(l_name + 8);
|
||
|
|
}
|
||
|
|
|
||
|
|
l_name[0] = (l_name[8]) ? ',' : 0;
|
||
|
|
rdr_log(reader, "provider: %d, id: %02X%s", i + 1, reader->prid[i][3], l_name);
|
||
|
|
select_file(reader, 0x0f, 0x20, cta_res, &cta_lr); // select provider class
|
||
|
|
write_cmd(insA21, insA21 + 5);
|
||
|
|
|
||
|
|
if(cta_res[0] == 0x9f)
|
||
|
|
{
|
||
|
|
insB2[4] = cta_res[1];
|
||
|
|
for(insB2[3] = 0; (cta_res[0] != 0x94) || (cta_res[1] != 0x2); insB2[3] = 1)
|
||
|
|
{
|
||
|
|
write_cmd(insB2, NULL); // read chid
|
||
|
|
if(cta_res[0] != 0x94)
|
||
|
|
{
|
||
|
|
char ds[16], de[16];
|
||
|
|
|
||
|
|
// todo: add entitlements to list but produces a warning related to date variable
|
||
|
|
cs_add_entitlement(reader, reader->caid, reader->prid[i][3], b2i(2, cta_res + 6), 0,
|
||
|
|
chid_date(cta_res + 28, ds, sizeof(ds) - 1),
|
||
|
|
chid_date(cta_res + 30, de, sizeof(de) - 1), 3, 1);
|
||
|
|
|
||
|
|
rdr_log(reader, "chid: %02X%02X, date: %s - %s, name: %s",
|
||
|
|
cta_res[6], cta_res[7], ds, de, trim((char *) cta_res + 10));
|
||
|
|
}
|
||
|
|
}
|
||
|
|
}
|
||
|
|
|
||
|
|
select_file(reader, 0x0f, 0x00, cta_res, &cta_lr); // select provider channel
|
||
|
|
write_cmd(insA21, insA21 + 5);
|
||
|
|
|
||
|
|
if(cta_res[0] == 0x9f)
|
||
|
|
{
|
||
|
|
insB2[4] = cta_res[1];
|
||
|
|
for(insB2[3] = 0; (cta_res[0] != 0x94) || (cta_res[1] != 0x2); insB2[3] = 1)
|
||
|
|
{
|
||
|
|
write_cmd(insB2, NULL); // read chid
|
||
|
|
if(cta_res[0] != 0x94)
|
||
|
|
{
|
||
|
|
char ds[16], de[16];
|
||
|
|
|
||
|
|
// todo: add entitlements to list but produces a warning related to date variable
|
||
|
|
cs_add_entitlement(reader, reader->caid, reader->prid[i][3], b2i(2, cta_res + 6), 0,
|
||
|
|
chid_date(cta_res + 28, ds, sizeof(ds) - 1),
|
||
|
|
chid_date(cta_res + 30, de, sizeof(de) - 1), 3, 1);
|
||
|
|
|
||
|
|
cta_res[27] = 0;
|
||
|
|
rdr_log(reader, "chid: %02X%02X, date: %s - %s, name: %s",
|
||
|
|
cta_res[6], cta_res[7], ds, de, trim((char *)cta_res + 10));
|
||
|
|
}
|
||
|
|
}
|
||
|
|
}
|
||
|
|
}
|
||
|
|
rdr_log(reader, "ready for requests");
|
||
|
|
return OK;
|
||
|
|
}
|
||
|
|
|
||
|
|
static int32_t cryptoworks_reassemble_emm(struct s_reader *rdr, struct s_client *client, EMM_PACKET *ep)
|
||
|
|
{
|
||
|
|
uint8_t *buffer = ep->emm;
|
||
|
|
int16_t *len = &ep->emmlen;
|
||
|
|
int16_t emm_len = 0;
|
||
|
|
|
||
|
|
// Cryptoworks
|
||
|
|
// Cryptoworks EMM-S have to be assembled by the client from an EMM-SH with table
|
||
|
|
// id 0x84 and a corresponding EMM-SB (body) with table id 0x86. A pseudo EMM-S
|
||
|
|
// with table id 0x84 has to be build containing all nano commands from both the
|
||
|
|
// original EMM-SH and EMM-SB in ascending order.
|
||
|
|
//
|
||
|
|
if(*len > 500) { return 0; }
|
||
|
|
|
||
|
|
if (!client->cw_rass && !cs_malloc(&client->cw_rass, sizeof(*client->cw_rass)))
|
||
|
|
{
|
||
|
|
cs_log("[cryptoworks] ERROR: Can't allocate EMM reassembly buffer.");
|
||
|
|
return 0;
|
||
|
|
}
|
||
|
|
struct emm_rass *r_emm = client->cw_rass;
|
||
|
|
|
||
|
|
switch(buffer[0])
|
||
|
|
{
|
||
|
|
case 0x82 : // emm-u
|
||
|
|
rdr_log_dbg(rdr, D_EMM, "unique emm (EMM-U)");
|
||
|
|
break;
|
||
|
|
|
||
|
|
case 0x84: // emm-sh
|
||
|
|
rdr_log_dbg(rdr, D_EMM, "shared emm (EMM-SH)");
|
||
|
|
if(!memcmp(r_emm->emm, buffer, *len))
|
||
|
|
{ return 0; }
|
||
|
|
|
||
|
|
if(ep->emm[11] == ep->emm[2] - 9)
|
||
|
|
{
|
||
|
|
rdr_log_dbg(rdr, D_EMM, "received assembled EMM-S");
|
||
|
|
return 1;
|
||
|
|
}
|
||
|
|
|
||
|
|
memcpy(r_emm->emm, buffer, *len);
|
||
|
|
r_emm->emmlen = *len;
|
||
|
|
rdr_log_dbg(rdr, D_EMM, "EMM-SH only in memcpy");
|
||
|
|
return 0;
|
||
|
|
|
||
|
|
case 0x86: // emm-sb
|
||
|
|
rdr_log_dbg(rdr, D_EMM, "shared emm (EMM-SB)");
|
||
|
|
if(!r_emm->emmlen)
|
||
|
|
{ return 0; }
|
||
|
|
|
||
|
|
// we keep the first 12 bytes of the 0x84 emm (EMM-SH)
|
||
|
|
// now we need to append the payload of the 0x86 emm (EMM-SB)
|
||
|
|
// starting after the header (&buffer[5])
|
||
|
|
// then the rest of the payload from EMM-SH
|
||
|
|
// so we should have :
|
||
|
|
// EMM-SH[0:12] + EMM-SB[5:len_EMM-SB] + EMM-SH[12:EMM-SH_len]
|
||
|
|
// then sort the nano in ascending order
|
||
|
|
// update the emm len (emmBuf[1:2])
|
||
|
|
//
|
||
|
|
|
||
|
|
emm_len = *len - 5 + r_emm->emmlen - 12;
|
||
|
|
uint8_t *tmp, *assembled;
|
||
|
|
if(!cs_malloc(&tmp, emm_len))
|
||
|
|
{ return 0; }
|
||
|
|
if(!cs_malloc(&assembled, emm_len + 12))
|
||
|
|
{
|
||
|
|
free(tmp);
|
||
|
|
return 0;
|
||
|
|
}
|
||
|
|
uint8_t *assembled_EMM;
|
||
|
|
if(!cs_malloc(&assembled_EMM, emm_len + 12))
|
||
|
|
{
|
||
|
|
free(assembled);
|
||
|
|
free(tmp);
|
||
|
|
return 0;
|
||
|
|
}
|
||
|
|
memcpy(tmp, &buffer[5], *len - 5);
|
||
|
|
memcpy(tmp + *len - 5, &r_emm->emm[12], r_emm->emmlen - 12);
|
||
|
|
memcpy(assembled_EMM, r_emm->emm, 12);
|
||
|
|
emm_sort_nanos(assembled_EMM + 12, tmp, emm_len);
|
||
|
|
|
||
|
|
assembled_EMM[1] = ((emm_len + 9) >> 8) | 0x70;
|
||
|
|
assembled_EMM[2] = (emm_len + 9) & 0xFF;
|
||
|
|
|
||
|
|
if(assembled_EMM[11] != emm_len) // sanity check
|
||
|
|
{
|
||
|
|
// error in emm assembly
|
||
|
|
rdr_log_dbg(rdr, D_EMM, "Error assembling EMM-S");
|
||
|
|
free(assembled_EMM);
|
||
|
|
return 0;
|
||
|
|
}
|
||
|
|
|
||
|
|
//copy back the assembled emm in the working buffer
|
||
|
|
memcpy(buffer, assembled_EMM, emm_len + 12);
|
||
|
|
*len = emm_len + 12;
|
||
|
|
|
||
|
|
free(tmp);
|
||
|
|
free(assembled);
|
||
|
|
|
||
|
|
r_emm->emmlen = 0;
|
||
|
|
|
||
|
|
rdr_log_dump_dbg(rdr, D_EMM, buffer, *len, "shared emm (assembled):");
|
||
|
|
free(assembled_EMM);
|
||
|
|
break;
|
||
|
|
|
||
|
|
case 0x88: // emm-g
|
||
|
|
case 0x89: // emm-g
|
||
|
|
rdr_log_dbg(rdr, D_EMM, "global emm (EMM-G)");
|
||
|
|
break;
|
||
|
|
}
|
||
|
|
return 1;
|
||
|
|
}
|
||
|
|
|
||
|
|
const struct s_cardsystem reader_cryptoworks =
|
||
|
|
{
|
||
|
|
.desc = "cryptoworks",
|
||
|
|
.caids = (uint16_t[]){ 0x0D, 0 },
|
||
|
|
.do_emm_reassembly = cryptoworks_reassemble_emm,
|
||
|
|
.do_emm = cryptoworks_do_emm,
|
||
|
|
.do_ecm = cryptoworks_do_ecm,
|
||
|
|
.card_info = cryptoworks_card_info,
|
||
|
|
.card_init = cryptoworks_card_init,
|
||
|
|
.get_emm_type = cryptoworks_get_emm_type,
|
||
|
|
.get_emm_filter = cryptoworks_get_emm_filter,
|
||
|
|
};
|
||
|
|
|
||
|
|
#endif
|