2555 lines
85 KiB
C
2555 lines
85 KiB
C
#include "globals.h"
|
|
|
|
#ifdef READER_VIACCESS
|
|
|
|
#include "oscam-aes.h"
|
|
#include "oscam-time.h"
|
|
#include "oscam-emm.h"
|
|
#include "reader-common.h"
|
|
#include "cscrypt/des.h"
|
|
#include "oscam-work.h"
|
|
|
|
typedef unsigned int uint;
|
|
typedef unsigned char byte;
|
|
|
|
struct geo_cache
|
|
{
|
|
uint32_t provid;
|
|
uint8_t geo[256];
|
|
uint8_t geo_len;
|
|
int32_t number_ecm;
|
|
};
|
|
|
|
struct viaccess_data
|
|
{
|
|
struct geo_cache last_geo;
|
|
uint8_t availkeys[CS_MAXPROV][16];
|
|
};
|
|
|
|
struct via_date
|
|
{
|
|
uint16_t day_s : 5;
|
|
uint16_t month_s : 4;
|
|
uint16_t year_s : 7;
|
|
uint16_t day_e : 5;
|
|
uint16_t month_e : 4;
|
|
uint16_t year_e : 7;
|
|
};
|
|
|
|
uint8_t N98Init = 0;
|
|
uint KeyS[132];
|
|
char SBoxInverse[] =
|
|
{
|
|
13, 3, 11, 0, 10, 6, 5, 12, 1, 14, 4, 7, 15, 9, 8, 2,
|
|
5, 8, 2, 14, 15, 6, 12, 3, 11, 4, 7, 9, 1, 13, 10, 0,
|
|
12, 9, 15, 4, 11, 14, 1, 2, 0, 3, 6, 13, 5, 8, 10, 7,
|
|
0, 9, 10, 7, 11, 14, 6, 13, 3, 5, 12, 2, 4, 8, 15, 1,
|
|
5, 0, 8, 3, 10, 9, 7, 14, 2, 12, 11, 6, 4, 15, 13, 1,
|
|
8, 15, 2, 9, 4, 1, 13, 14, 11, 6, 5, 3, 7, 12, 10, 0,
|
|
15, 10, 1, 13, 5, 3, 6, 0, 4, 9, 14, 7, 2, 12, 8, 11,
|
|
3, 0, 6, 13, 9, 14, 15, 8, 5, 12, 11, 7, 10, 1, 4, 2
|
|
};
|
|
|
|
static void parse_via_date(const uint8_t *buf, struct via_date *vd, int32_t fend)
|
|
{
|
|
uint16_t date;
|
|
date = (buf[0] << 8) | buf[1];
|
|
vd->day_s = date & 0x1f;
|
|
vd->month_s = (date >> 5) & 0x0f;
|
|
vd->year_s = (date >> 9) & 0x7f;
|
|
|
|
if(fend)
|
|
{
|
|
date = (buf[2] << 8) | buf[3];
|
|
vd->day_e = date & 0x1f;
|
|
vd->month_e = (date >> 5) & 0x0f;
|
|
vd->year_e = (date >> 9) & 0x7f;
|
|
}
|
|
}
|
|
|
|
struct emm_rass *find_rabuf(struct s_client *client, int32_t provid, uint8_t nano, int8_t add)
|
|
{
|
|
struct emm_rass *e;
|
|
LL_ITER it;
|
|
|
|
if(!client->ra_buf)
|
|
{
|
|
client->ra_buf = ll_create("client->ra_buf");
|
|
}
|
|
|
|
it = ll_iter_create(client->ra_buf);
|
|
|
|
while((e = ll_iter_next(&it)) != NULL)
|
|
{
|
|
if(!add && e->provid == provid && e->emmlen != 0)
|
|
{
|
|
return e;
|
|
}
|
|
if(add && e->provid == provid && e->emm[0] == nano)
|
|
{
|
|
return e;
|
|
}
|
|
}
|
|
|
|
if(!add)
|
|
{
|
|
return NULL;
|
|
}
|
|
|
|
if(!cs_malloc(&e, sizeof(struct emm_rass)))
|
|
{
|
|
return NULL;
|
|
}
|
|
|
|
e->provid = provid;
|
|
ll_append(client->ra_buf, e);
|
|
|
|
return e;
|
|
}
|
|
|
|
static void show_class(struct s_reader *reader, const char *p, uint32_t provid, const uint8_t *b, int32_t l)
|
|
{
|
|
int32_t i, j;
|
|
// b -> via date (4 uint8_ts)
|
|
b += 4;
|
|
l -= 4;
|
|
j = l - 1;
|
|
|
|
for(; j >= 0; j--)
|
|
{
|
|
for(i = 0; i < 8; i++)
|
|
{
|
|
if(b[j] & (1 << (i & 7)))
|
|
{
|
|
uint8_t cls;
|
|
struct via_date vd;
|
|
parse_via_date(b - 4, &vd, 1);
|
|
cls = (l - (j + 1)) * 8 + i;
|
|
|
|
if(p) // just show class info, dont add entitlement!
|
|
{
|
|
rdr_log(reader, "%sclass: %02X, expiry date: %04d/%02d/%02d - %04d/%02d/%02d", p, cls,
|
|
vd.year_s + 1980, vd.month_s, vd.day_s,
|
|
vd.year_e + 1980, vd.month_e, vd.day_e);
|
|
}
|
|
else
|
|
{
|
|
rdr_log(reader, "class: %02X, expiry date: %04d/%02d/%02d - %04d/%02d/%02d", cls,
|
|
vd.year_s + 1980, vd.month_s, vd.day_s,
|
|
vd.year_e + 1980, vd.month_e, vd.day_e);
|
|
//convert time:
|
|
time_t start_t, end_t;
|
|
struct tm tm;
|
|
memset(&tm, 0, sizeof(tm));
|
|
tm.tm_year = vd.year_s + 80; //via year starts in 1980, tm_year starts in 1900
|
|
tm.tm_mon = vd.month_s - 1; // january is 0 in tm_mon
|
|
tm.tm_mday = vd.day_s;
|
|
start_t = cs_timegm(&tm);
|
|
tm.tm_year = vd.year_e + 80; //via year starts in 1980, tm_year starts in 1900
|
|
tm.tm_mon = vd.month_e - 1; // january is 0 in tm_mon
|
|
tm.tm_mday = vd.day_e;
|
|
end_t = cs_timegm(&tm);
|
|
cs_add_entitlement(reader, reader->caid, provid, cls, cls, start_t, end_t, 5, 1);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
static int8_t add_find_class(struct s_reader *reader, uint32_t provid, const uint8_t *b, int32_t l, int8_t add)
|
|
{
|
|
int32_t i, j, freshdate = 0;
|
|
// b -> via date (4 uint8_ts)
|
|
b += 4;
|
|
l -= 4;
|
|
j = l - 1;
|
|
|
|
for(; j >= 0; j--)
|
|
{
|
|
for(i = 0; i < 8; i++)
|
|
{
|
|
if(b[j] & (1 << (i & 7)))
|
|
{
|
|
uint8_t cls;
|
|
cls = (l - (j + 1)) * 8 + i;
|
|
if(cs_add_entitlement(reader, reader->caid, provid, cls, cls, 0, 0, 5, 0) == NULL && !add)
|
|
{
|
|
rdr_log(reader, "provid %06X class %02X not found", provid, cls);
|
|
freshdate = 1;
|
|
}
|
|
else
|
|
{
|
|
if(!add)
|
|
{
|
|
rdr_log(reader, "provid %06X has matching class %02X", provid, cls);
|
|
}
|
|
struct via_date vd;
|
|
parse_via_date(b - 4, &vd, 1);
|
|
time_t start_t, end_t;
|
|
struct tm tm;
|
|
//convert time:
|
|
memset(&tm, 0, sizeof(tm));
|
|
tm.tm_year = vd.year_s + 80; // via year starts in 1980, tm_year starts in 1900
|
|
tm.tm_mon = vd.month_s - 1; // january is 0 in tm_mon
|
|
tm.tm_mday = vd.day_s;
|
|
start_t = cs_timegm(&tm);
|
|
tm.tm_year = vd.year_e + 80; //via year starts in 1980, tm_year starts in 1900
|
|
tm.tm_mon = vd.month_e - 1; // january is 0 in tm_mon
|
|
tm.tm_mday = vd.day_e;
|
|
end_t = cs_timegm(&tm);
|
|
|
|
if(cs_add_entitlement(reader, reader->caid, provid, cls, cls, start_t, end_t, 5, add) != NULL)
|
|
{
|
|
if(!add)
|
|
{
|
|
rdr_log(reader, "class %02X provid %06X has already this daterange or newer entitled", cls, provid);
|
|
}
|
|
}
|
|
else
|
|
{
|
|
freshdate = 1;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
if(freshdate == 0)
|
|
{
|
|
return -2;
|
|
}
|
|
|
|
return 1; // emmdate is fresh!
|
|
}
|
|
|
|
static void show_subs(struct s_reader *reader, const uint8_t *emm)
|
|
{
|
|
switch(emm[0])
|
|
{
|
|
case 0xA9:
|
|
{
|
|
show_class(reader, "nano A9: ", 1, emm + 2, emm[1]);
|
|
break;
|
|
}
|
|
|
|
case 0xA6:
|
|
{
|
|
char szGeo[256];
|
|
memset(szGeo, 0, 256);
|
|
cs_strncpy(szGeo, (char *)emm + 2, emm[1]);
|
|
rdr_log(reader, "nano A6: geo %s", szGeo);
|
|
break;
|
|
}
|
|
|
|
case 0xB6:
|
|
{
|
|
uint8_t m; // modexp
|
|
struct via_date vd;
|
|
m = emm[emm[1] + 1];
|
|
parse_via_date(emm + 2, &vd, 0);
|
|
rdr_log(reader, "nano B6: modexp %d%d%d%d%d%d: %02d/%02d/%04d",
|
|
(m & 0x20) ? 1 : 0,
|
|
(m & 0x10) ? 1 : 0,
|
|
(m & 0x08) ? 1 : 0,
|
|
(m & 0x04) ? 1 : 0,
|
|
(m & 0x02) ? 1 : 0,
|
|
(m & 0x01) ? 1 : 0,
|
|
vd.day_s, vd.month_s, vd.year_s + 1980);
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
|
|
static int32_t chk_prov(struct s_reader *reader, uint8_t *id, uint8_t keynr)
|
|
{
|
|
struct viaccess_data *csystem_data = reader->csystem_data;
|
|
|
|
int32_t i, j, rc;
|
|
for(rc = i = 0; (!rc) && (i < reader->nprov); i++)
|
|
{
|
|
if(!memcmp(&reader->prid[i][1], id, 3))
|
|
{
|
|
for(j = 0; (!rc) && (j < 16); j++)
|
|
{
|
|
if(csystem_data->availkeys[i][j] == keynr)
|
|
{
|
|
rc = 1;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
return (rc);
|
|
}
|
|
|
|
static int32_t get_maturity(struct s_reader *reader)
|
|
{
|
|
/* retrieve maturity rating on the card */
|
|
def_resp;
|
|
uint8_t insac[] = { 0xca, 0xac, 0x00, 0x00, 0x00 }; // select data
|
|
uint8_t insb8[] = { 0xca, 0xb8, 0x00, 0x00, 0x00 }; // read selected data
|
|
insac[2] = 0x06;
|
|
write_cmd(insac, NULL); // request maturity rating
|
|
insb8[4] = 0x02;
|
|
write_cmd(insb8, NULL); // read maturity rating nano + len
|
|
insb8[4] = cta_res[1];
|
|
write_cmd(insb8, NULL); // read maturity rating
|
|
reader->maturity = cta_res[cta_lr - 3] & 0x0F;
|
|
|
|
if (reader->maturity < 0xF)
|
|
{
|
|
rdr_log(reader, "Maturity level [%X]= older than %i years", reader->maturity, reader->maturity);
|
|
}
|
|
else
|
|
{
|
|
rdr_log(reader, "Maturity level [%X]=no age limit", reader->maturity);
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int32_t unlock_parental(struct s_reader *reader)
|
|
{
|
|
/* disabling parental lock. assuming pin "0000" if no pin code is provided in the config */
|
|
static const uint8_t inDPL[] = { 0xca, 0x24, 0x02, 0x00, 0x09 };
|
|
uint8_t cmDPL[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x0F };
|
|
def_resp;
|
|
|
|
if(strcmp(reader->pincode, "none"))
|
|
{
|
|
rdr_log(reader, "Using PIN %s", reader->pincode);
|
|
// the pin need to be coded in bcd, so we need to convert from ascii to bcd, so '1234' -> 0x12 0x34
|
|
cmDPL[6] = ((reader->pincode[0] - 0x30) << 4) | ((reader->pincode[1] - 0x30) & 0x0f);
|
|
cmDPL[7] = ((reader->pincode[2] - 0x30) << 4) | ((reader->pincode[3] - 0x30) & 0x0f);
|
|
}
|
|
else
|
|
{
|
|
rdr_log(reader, "Using PIN 0000!");
|
|
}
|
|
|
|
write_cmd(inDPL, cmDPL);
|
|
|
|
if(!(cta_res[cta_lr - 2] == 0x90 && cta_res[cta_lr - 1] == 0))
|
|
{
|
|
if(strcmp(reader->pincode, "none"))
|
|
{
|
|
rdr_log(reader, "Can't disable parental lock. Wrong PIN? OSCam used %s!", reader->pincode);
|
|
}
|
|
else
|
|
{
|
|
rdr_log(reader, "Can't disable parental lock. Wrong PIN? OSCam used 0000!");
|
|
}
|
|
}
|
|
else
|
|
{
|
|
rdr_log(reader, "Parental lock disabled");
|
|
get_maturity(reader);
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
int32_t hdSurEncBasicCrypt_D2_0F_11(int32_t Value, int32_t XorVal)
|
|
{
|
|
int32_t i = (Value << 13) - Value + 0x1B59;
|
|
i = (i * Value) + 0x07CF;
|
|
return (i ^ XorVal);
|
|
}
|
|
|
|
int32_t hdSurEncCryptLookup_D2_0F_11(uint8_t Value, uint8_t AddrInd)
|
|
{
|
|
static const uint8_t lookup[] =
|
|
{
|
|
0x94, 0xB2, 0xA9, 0x79, 0xC4, 0xC7, 0x0D, 0x36, 0x6F, 0x24, 0x11, 0xD1, 0xDB, 0x59, 0xD2, 0xA5,
|
|
0xE1, 0x00, 0xD4, 0x97, 0xA3, 0x2B, 0x11, 0xFA, 0x5F, 0xF1, 0xC1, 0x44, 0xBF, 0x9B, 0x5A, 0xC8,
|
|
0xF1, 0xE1, 0x99, 0x82, 0x0E, 0xB2, 0x01, 0x09, 0x0C, 0xC8, 0xB3, 0x3B, 0xD1, 0x80, 0x50, 0xE8,
|
|
0xF5, 0x52, 0x4C, 0xE6, 0x82, 0xAC, 0x58, 0x40, 0xD4, 0x71, 0x87, 0x52, 0x06, 0xEA, 0xA6, 0x27,
|
|
0xB7, 0xFE, 0x6C, 0x49, 0x47, 0x3B, 0x70, 0x6C, 0xEB, 0xCD, 0xC5, 0x0B, 0x8C, 0x31, 0x29, 0x42,
|
|
0x4E, 0x10, 0x2B, 0x2D, 0x46, 0xEC, 0x39, 0xA3, 0x90, 0x4B, 0x25, 0x60, 0x9C, 0x62, 0xD4, 0x20,
|
|
0xF6, 0x16, 0xA8, 0x9C, 0xE4, 0x20, 0xED, 0xC7, 0xBA, 0x5E, 0xB6, 0x4E, 0x03, 0x15, 0xA6, 0xF6,
|
|
0x23, 0x98, 0x32, 0xC0, 0xAE, 0xA3, 0xFD, 0xD3, 0x7F, 0xF8, 0xED, 0xF0, 0x29, 0x29, 0x12, 0xB3,
|
|
0xB7, 0x58, 0xAD, 0xA2, 0x58, 0x2C, 0x70, 0x1B, 0xA4, 0x25, 0xE8, 0xA5, 0x43, 0xF1, 0xB9, 0x8F,
|
|
0x1E, 0x3B, 0x10, 0xDF, 0x52, 0xFE, 0x58, 0x29, 0xAD, 0x3F, 0x99, 0x4D, 0xDF, 0xD2, 0x08, 0x06,
|
|
0xA1, 0x1C, 0x66, 0x29, 0x26, 0x80, 0x52, 0x8A, 0x5A, 0x73, 0xE7, 0xDF, 0xC1, 0xC4, 0x47, 0x82,
|
|
0xAB, 0x5C, 0x32, 0xAE, 0x96, 0x04, 0x2B, 0xC3, 0x2D, 0x5A, 0xD2, 0xB0, 0x64, 0x88, 0x97, 0xBF,
|
|
0x7E, 0x99, 0x60, 0xCC, 0x63, 0x76, 0x66, 0xE9, 0x9A, 0x3D, 0xBB, 0xF7, 0x7F, 0xE4, 0x7C, 0x3F,
|
|
0xB8, 0x4D, 0x10, 0x8D, 0x2A, 0xEA, 0x3C, 0xD3, 0x03, 0x74, 0xE6, 0x46, 0xC0, 0x29, 0xAE, 0xB0,
|
|
0x79, 0xBE, 0xCB, 0x18, 0x34, 0xBE, 0x5A, 0xE9, 0x19, 0x8F, 0xA3, 0x8F, 0xD6, 0x6A, 0x6C, 0x88,
|
|
0x1E, 0x21, 0x08, 0x15, 0xC4, 0xE7, 0xE6, 0xBA, 0x97, 0x9C, 0x4F, 0x89, 0x9F, 0x1A, 0x67, 0x4F,
|
|
0xC0, 0xD5, 0x72, 0x51, 0x16, 0xB4, 0xD3, 0x8A, 0x1F, 0xE3, 0x92, 0x02, 0x7F, 0x59, 0x56, 0x8F,
|
|
0x07, 0x8D, 0xC1, 0xC2, 0x42, 0x69, 0x3C, 0xA6, 0xBF, 0x3D, 0xDF, 0x0D, 0xAA, 0x4F, 0x7E, 0x80,
|
|
0x07, 0x11, 0xE2, 0x94, 0x19, 0x9B, 0x16, 0x26, 0x1A, 0x46, 0x09, 0x0D, 0xB5, 0xB8, 0x8E, 0x01,
|
|
0x9C, 0xFE, 0x09, 0xB3, 0x60, 0xC2, 0xAE, 0x50, 0x3C, 0x68, 0x75, 0x4A, 0x57, 0xD8, 0x4F, 0xD7,
|
|
0xA2, 0x76, 0x2C, 0xC1, 0xA2, 0x23, 0xBC, 0x54, 0x2A, 0xDD, 0xF3, 0xDD, 0xA7, 0x34, 0xF7, 0x5C,
|
|
0xF4, 0x86, 0x23, 0x48, 0x7C, 0x3F, 0x05, 0x40, 0x0E, 0xB0, 0xE5, 0xEB, 0x3E, 0xDF, 0x6A, 0x83,
|
|
0x65, 0xA0, 0xB2, 0x06, 0xD1, 0x40, 0x79, 0x0D, 0xDE, 0x95, 0x84, 0x96, 0x87, 0x6F, 0xCE, 0x48,
|
|
0x24, 0x13, 0x0B, 0xF5, 0xC7, 0xF5, 0xA8, 0x7F, 0x2E, 0xC7, 0xE1, 0xBA, 0xAE, 0x2B, 0xF7, 0xF0,
|
|
0x8E, 0xF7, 0x54, 0x0B, 0xF0, 0xD2, 0x41, 0x81, 0x68, 0x3B, 0x1E, 0x35, 0xAB, 0xD9, 0x2B, 0x46,
|
|
0x57, 0xE8, 0x53, 0xDF, 0xDE, 0x10, 0xEF, 0xCB, 0x4C, 0xE0, 0x52, 0x18, 0x2C, 0x4E, 0xB9, 0x20,
|
|
0xE9, 0x7E, 0x85, 0xDF, 0x75, 0x32, 0xE6, 0x10, 0xE9, 0x9C, 0x7B, 0x2E, 0x4C, 0xDA, 0x46, 0xE6,
|
|
0xCC, 0x77, 0x36, 0x1D, 0x4A, 0x15, 0xF5, 0x32, 0x18, 0x6B, 0x7E, 0xAA, 0xCC, 0x97, 0xCC, 0xD1,
|
|
0x2F, 0xE5, 0x58, 0x03, 0x35, 0x35, 0x3D, 0xA0, 0x2B, 0x13, 0x3A, 0x65, 0xFF, 0x24, 0x72, 0xCF,
|
|
0xA7, 0x6D, 0x52, 0x55, 0xF6, 0xC2, 0x30, 0x23, 0x7D, 0x9B, 0x9E, 0xB0, 0x94, 0x02, 0xAD, 0x60,
|
|
0x8A, 0x9F, 0xBC, 0xC8, 0xE4, 0x2B, 0x92, 0x96, 0xF5, 0xAE, 0x04, 0xA4, 0x33, 0x0C, 0x90, 0x67,
|
|
0xF0, 0xB9, 0x1E, 0x7E, 0xBE, 0x02, 0x18, 0xB2, 0x03, 0xB6, 0x40, 0xBF, 0x05, 0xE3, 0x76, 0x98,
|
|
0x21, 0x38, 0xC9, 0x5F, 0xD3, 0x51, 0x8B, 0x43, 0x0B, 0x1A, 0x0B, 0xF9, 0x3C, 0x21, 0x6C, 0x3D,
|
|
0xB8, 0xA0, 0x57, 0xCA, 0x68, 0xCD, 0x1E, 0xD2, 0x2C, 0x50, 0xEE, 0xC0, 0xDF, 0x25, 0x88, 0x52,
|
|
0x37, 0xE1, 0x44, 0xC6, 0x76, 0x3B, 0x91, 0x95, 0x86, 0x76, 0x87, 0x49, 0x21, 0x93, 0x44, 0x0A,
|
|
0x52, 0xB9, 0x2D, 0x2B, 0xE3, 0x1D, 0xB0, 0xE4, 0x98, 0xC6, 0xEE, 0x3D, 0x96, 0x53, 0x4B, 0xFF,
|
|
0x39, 0x00, 0xD5, 0x42, 0x7E, 0xE1, 0x4C, 0x6F, 0xD5, 0xB7, 0xE6, 0x99, 0x2A, 0x5B, 0x67, 0xEE,
|
|
0x3E, 0xBA, 0xF7, 0xEC, 0x43, 0x2A, 0x1C, 0xB6, 0xB5, 0x04, 0x26, 0x59, 0xB1, 0x4C, 0x17, 0xCC,
|
|
0x83, 0xB9, 0x00, 0x3E, 0x36, 0x91, 0x90, 0xF7, 0x5E, 0x38, 0xDC, 0xE4, 0x15, 0xC7, 0x67, 0xF0,
|
|
0xCA, 0xC8, 0xD2, 0x91, 0x5D, 0x74, 0xAC, 0x97, 0x56, 0x36, 0x1A, 0x82, 0x0A, 0xAA, 0xB4, 0x4E,
|
|
0xBF, 0x29, 0x5C, 0xBF, 0x58, 0xB3, 0x97, 0xF9, 0xEB, 0x7C, 0x85, 0xB4, 0xA5, 0x13, 0x2F, 0xD1,
|
|
0xDE, 0x1C, 0xEC, 0x97, 0xDD, 0xE2, 0x39, 0xE4, 0xFB, 0x0A, 0x02, 0xE0, 0xC3, 0xBA, 0x39, 0x79,
|
|
0xAA, 0x1C, 0x37, 0x75, 0x25, 0x54, 0xBE, 0x85, 0x74, 0x2C, 0xFA, 0x0C, 0xFA, 0x50, 0xF6, 0xBE,
|
|
0x9F, 0x2A, 0x53, 0x7C, 0x27, 0x46, 0x68, 0x2D, 0x74, 0x2B, 0x46, 0xDA, 0xF5, 0x07, 0x95, 0x09,
|
|
0x6A, 0x91, 0xB7, 0xB1, 0x34, 0x07, 0x5F, 0xEA, 0xBE, 0x0F, 0x87, 0x28, 0x68, 0x97, 0x43, 0x77,
|
|
0xD5, 0x38, 0x2B, 0x11, 0x11, 0x4F, 0xD9, 0x75, 0x5E, 0xE1, 0x06, 0xA0, 0x3B, 0xAC, 0x32, 0xFE,
|
|
0xBF, 0x73, 0x59, 0x5B, 0xA2, 0xA8, 0x7E, 0x10, 0x4C, 0x6E, 0x78, 0xF0, 0x4A, 0x4E, 0x95, 0xD6,
|
|
0xDD, 0x05, 0x7A, 0xBB, 0xF1, 0xEB, 0xA8, 0xA4, 0x5D, 0x91, 0xF0, 0xED, 0xDB, 0xB8, 0x01, 0x41,
|
|
0xF8, 0x97, 0x7F, 0xC3, 0x91, 0x53, 0xBF, 0xE9, 0xEA, 0x33, 0x1F, 0xDC, 0xA6, 0xE6, 0x8D, 0xCB,
|
|
0x75, 0xD0, 0x69, 0xD0, 0xA4, 0x59, 0xA5, 0x02, 0xFC, 0x60, 0x0D, 0x6A, 0xA0, 0x05, 0x1A, 0x54,
|
|
0x8A, 0xA7, 0x57, 0xA3, 0xF0, 0x90, 0x8A, 0xD5, 0x6F, 0x1E, 0x2E, 0x10, 0x9A, 0x93, 0x2B, 0x51,
|
|
0x2C, 0xFD, 0x99, 0xE5, 0x9B, 0x5D, 0xB2, 0xA7, 0x37, 0x99, 0x26, 0x35, 0xCA, 0xDD, 0x22, 0x19,
|
|
0x59, 0x2A, 0xB0, 0x99, 0x23, 0xDF, 0xA7, 0xA9, 0x85, 0x12, 0xCF, 0xBF, 0xFC, 0x74, 0x80, 0x87,
|
|
0xE1, 0x97, 0xD0, 0xF9, 0xEF, 0x5F, 0x1B, 0x45, 0xF7, 0x76, 0xDB, 0x66, 0x39, 0x05, 0x43, 0x06,
|
|
0xA9, 0x9F, 0x2E, 0x14, 0x9F, 0x1C, 0x0C, 0x1F, 0xD5, 0xD9, 0xA4, 0x8D, 0x18, 0x6F, 0x08, 0x53,
|
|
0x0B, 0x92, 0x9A, 0x0C, 0xEA, 0x4C, 0xE4, 0x1D, 0x9E, 0x9A, 0x51, 0xB8, 0x7E, 0x2D, 0xE7, 0x3C,
|
|
0xFF, 0x84, 0x5C, 0xBF, 0x8F, 0x8C, 0x89, 0x09, 0x1B, 0x7E, 0x4B, 0xE7, 0x85, 0xEC, 0x04, 0xB5,
|
|
0x20, 0x18, 0x1E, 0x55, 0xD5, 0x5B, 0xAC, 0xC6, 0x25, 0x5A, 0xA1, 0x81, 0xC1, 0x31, 0x9C, 0xF5,
|
|
0xB5, 0x54, 0x07, 0x65, 0x0A, 0x5B, 0x90, 0x06, 0x4F, 0x84, 0xB2, 0x7F, 0xD1, 0xAD, 0x16, 0x81,
|
|
0x25, 0xAF, 0xAF, 0xE2, 0x03, 0xA9, 0x1F, 0x13, 0x02, 0x5D, 0x54, 0x89, 0xCD, 0x44, 0x51, 0xEB,
|
|
0xA4, 0x2B, 0xBD, 0x47, 0xB0, 0xB6, 0x27, 0x1D, 0x9B, 0x14, 0x6F, 0xBF, 0xCD, 0x59, 0xBC, 0x0A,
|
|
0x37, 0xA8, 0x74, 0x7D, 0x16, 0x90, 0x28, 0xD5, 0x94, 0xC3, 0xE4, 0x23, 0xC4, 0x98, 0x91, 0xCE,
|
|
0x55, 0xBD, 0x21, 0x3B, 0x84, 0xBD, 0x44, 0x3C, 0xF9, 0xCD, 0x37, 0x43, 0x4A, 0xC6, 0x8C, 0x23,
|
|
0x04, 0x28, 0x63, 0x7A, 0x03, 0x85, 0xD2, 0x46, 0x93, 0xCA, 0xFE, 0xC3, 0x83, 0x0B, 0x13, 0xCC,
|
|
0x5D, 0xCB, 0xBA, 0xCA, 0x68, 0xAB, 0x05, 0xF7, 0xEC, 0x4A, 0x9C, 0x0F, 0xD5, 0xC4, 0x5A, 0xA5,
|
|
0xA0, 0x04, 0x41, 0x6A, 0xF6, 0xEF, 0x16, 0x9B, 0x69, 0x38, 0xF6, 0x2D, 0xAA, 0xEB, 0x2D, 0xE2,
|
|
0x82, 0xA2, 0x9F, 0x6F, 0xBD, 0x2A, 0xE3, 0x66, 0x6B, 0x21, 0xDA, 0x56, 0xAD, 0x82, 0x2B, 0x93,
|
|
0xF3, 0x25, 0xEA, 0xFC, 0xFD, 0xFD, 0x1B, 0xA9, 0xFC, 0xB8, 0xC6, 0x98, 0x45, 0xF2, 0x70, 0x03,
|
|
0x4A, 0x9C, 0x60, 0x82, 0x65, 0xB6, 0x68, 0x4C, 0xE7, 0x41, 0x10, 0x9D, 0x59, 0x40, 0x03, 0x02,
|
|
0x07, 0x12, 0x33, 0xAF, 0x79, 0xE1, 0xC4, 0xEB, 0xB8, 0xCE, 0x6A, 0x90, 0x72, 0x61, 0x5D, 0x56,
|
|
0xC7, 0x59, 0x31, 0xCB, 0x45, 0x2D, 0x42, 0x9F, 0x10, 0x1D, 0x09, 0x63, 0x59, 0x8C, 0x6C, 0xDB,
|
|
0x11, 0xCF, 0xA1, 0xDF, 0x5F, 0x4D, 0xDF, 0xB4, 0xC3, 0x82, 0xEE, 0x58, 0x16, 0xB4, 0x74, 0xFA,
|
|
0xBE, 0x11, 0x9C, 0x1E, 0x98, 0x29, 0xDE, 0xE3, 0xE5, 0x9E, 0xCF, 0xD7, 0x91, 0x0A, 0xA3, 0xA4,
|
|
0x42, 0xA1, 0x95, 0x09, 0x9E, 0x16, 0xD5, 0xA8, 0x24, 0x56, 0x5B, 0x23, 0xC8, 0x56, 0x4C, 0xCB,
|
|
0x89, 0x18, 0x69, 0xEB, 0x0C, 0x1F, 0xC0, 0x41, 0x5C, 0x63, 0x04, 0x68, 0xB2, 0x0F, 0x3F, 0x88,
|
|
0x36, 0xDD, 0x23, 0x4D, 0x4C, 0xC0, 0x81, 0xE3, 0xE9, 0xAD, 0xE0, 0x27, 0xD5, 0xE5, 0x46, 0xEB,
|
|
0xFF, 0x32, 0xA2, 0xB7, 0x14, 0x64, 0x0B, 0x6D, 0x1B, 0xE5, 0xD8, 0xAE, 0x9D, 0xE8, 0x55, 0xB9,
|
|
0x52, 0x70, 0x59, 0xB8, 0x72, 0x92, 0x69, 0x37, 0x95, 0x61, 0x0A, 0xE5, 0xF6, 0x55, 0x97, 0x1D,
|
|
0xBF, 0xF7, 0x29, 0x77, 0x0F, 0x72, 0x80, 0xB2, 0x7E, 0x56, 0xBF, 0xFD, 0xE9, 0xF5, 0x9B, 0x62,
|
|
0xE9, 0xBD, 0x0B, 0xC2, 0x07, 0x55, 0x31, 0x4C, 0x57, 0x3A, 0x05, 0xB9, 0x27, 0x41, 0x4A, 0xC3,
|
|
0xEC, 0x72, 0x20, 0xB3, 0x0C, 0xF9, 0xD9, 0x3A, 0x14, 0x6A, 0x03, 0x44, 0x6A, 0xF1, 0x41, 0x55,
|
|
0x7F, 0x81, 0xC2, 0x04, 0xA8, 0x05, 0xB9, 0x49, 0x2E, 0x43, 0xC4, 0x00, 0x87, 0x86, 0x04, 0xAC,
|
|
0xAF, 0x73, 0x78, 0x0E, 0xA4, 0x43, 0x5B, 0x36, 0xA2, 0x8F, 0x9C, 0xF7, 0x66, 0x4A, 0x5A, 0x09,
|
|
0x6B, 0xAA, 0x69, 0x6F, 0xB1, 0x20, 0x0D, 0x56, 0x85, 0x0A, 0x5E, 0x06, 0xBF, 0xE2, 0x32, 0xB4,
|
|
0x5C, 0x46, 0x33, 0x0D, 0x27, 0xA3, 0x6B, 0xE1, 0xB2, 0x6A, 0x7D, 0x4A, 0xA7, 0x81, 0x0F, 0x2B,
|
|
0x16, 0x7C, 0x51, 0xD6, 0xC0, 0x3D, 0xB9, 0xFE, 0xB4, 0x66, 0xC4, 0xB6, 0x54, 0x53, 0x67, 0xDA,
|
|
0x70, 0x96, 0x9A, 0x0A, 0x07, 0x1A, 0x26, 0xBA, 0x85, 0x50, 0xF5, 0x27, 0x53, 0x9C, 0x3A, 0x94,
|
|
0x0A, 0x7D, 0xDB, 0xE1, 0xC3, 0xE3, 0x6A, 0x3E, 0x9E, 0xD5, 0x13, 0x0A, 0xA3, 0xD2, 0x21, 0x75,
|
|
0x79, 0x17, 0x26, 0xAC, 0x48, 0x5F, 0x3D, 0xE1, 0x7D, 0xA4, 0xB1, 0x56, 0x0F, 0x92, 0x2C, 0x60,
|
|
0xE6, 0xCB, 0x87, 0x35, 0xB8, 0x75, 0xC3, 0xA2, 0x03, 0x50, 0x4B, 0xA2, 0x6E, 0x01, 0xE1, 0xDD,
|
|
0x87, 0xA5, 0x33, 0xC6, 0x2F, 0xA2, 0x41, 0xFC, 0x72, 0x98, 0xA2, 0x69, 0x4C, 0x3F, 0xF0, 0x53,
|
|
0xF5, 0x41, 0x2B, 0x23, 0x24, 0x3B, 0xCE, 0x9D, 0x39, 0x31, 0x17, 0x08, 0xE1, 0x3F, 0x5F, 0xFB,
|
|
0x00, 0xFA, 0xF1, 0xE3, 0xE1, 0x7B, 0x0C, 0xDF, 0x8D, 0xA2, 0xC4, 0xCD, 0x62, 0x3D, 0xAE, 0xC7,
|
|
0x48, 0x09, 0x1C, 0x66, 0xCB, 0x0E, 0x23, 0xE8, 0x1B, 0x9F, 0x1B, 0xCB, 0xF8, 0x14, 0xC3, 0x34,
|
|
0x91, 0x32, 0x2B, 0x39, 0x1C, 0xBA, 0x1C, 0xA0, 0x19, 0xF2, 0x57, 0x9D, 0x78, 0x00, 0x55, 0x1F,
|
|
0x15, 0x12, 0x9A, 0xA2, 0xF2, 0xC2, 0xB7, 0x4E, 0xEA, 0x46, 0x01, 0xC2, 0xE9, 0x76, 0xBF, 0xDE,
|
|
0xCF, 0x8B, 0xC7, 0x50, 0x80, 0xEE, 0x46, 0x91, 0x93, 0x1E, 0x5C, 0x48, 0x5D, 0xC8, 0xC8, 0x63,
|
|
0xD1, 0x89, 0x02, 0x29, 0xE9, 0x90, 0x9F, 0x0B, 0x0A, 0x1A, 0x44, 0x17, 0xE7, 0x4E, 0xAD, 0x58,
|
|
0x55, 0xF8, 0x38, 0xF6, 0x4F, 0xD8, 0x1C, 0x7E, 0x25, 0x9B, 0x59, 0x16, 0xBC, 0x65, 0x24, 0xC5,
|
|
0xA7, 0x56, 0xE5, 0x20, 0x3F, 0xD9, 0x27, 0xE0, 0x32, 0x24, 0xE1, 0x7B, 0xE1, 0x32, 0xEA, 0xF4,
|
|
0xFE, 0xD9, 0xA5, 0xFF, 0x35, 0xAE, 0xA9, 0x1B, 0x38, 0x28, 0x6A, 0xC0, 0x1A, 0x42, 0xD9, 0x5E,
|
|
0x14, 0x2C, 0xC2, 0x2D, 0x9B, 0x94, 0x5B, 0xCF, 0x83, 0x30, 0xB9, 0x06, 0xAF, 0x4B, 0xD7, 0xF6,
|
|
0x38, 0x7C, 0xFF, 0xB4, 0xA5, 0x1A, 0xA0, 0xE9, 0xF3, 0x01, 0xE3, 0x97, 0xC4, 0xA9, 0x57, 0xF5,
|
|
0xB9, 0x96, 0xA7, 0xA3, 0xB8, 0x10, 0x0E, 0xFB, 0x1D, 0x39, 0x44, 0x16, 0x97, 0x94, 0x3E, 0x5F,
|
|
0xAF, 0x0F, 0xE3, 0x99, 0xDC, 0xA0, 0xE9, 0x8D, 0x26, 0x2B, 0xD9, 0xAE, 0xEC, 0x4C, 0x4F, 0x09,
|
|
0x86, 0x7E, 0x7B, 0xC3, 0xE3, 0xC6, 0x17, 0xAE, 0x30, 0x9C, 0x31, 0xD1, 0x84, 0x47, 0xAF, 0xCB,
|
|
0xEA, 0x69, 0x2A, 0x08, 0x3E, 0x13, 0x00, 0xDE, 0xF6, 0x4A, 0x42, 0xD3, 0xBE, 0x33, 0xD9, 0x50,
|
|
0x6B, 0x8D, 0x59, 0x12, 0x1A, 0xD3, 0xA7, 0x7C, 0x0A, 0xE7, 0x87, 0x47, 0xCA, 0xAA, 0x33, 0xFD,
|
|
0xC1, 0xF6, 0x28, 0xC1, 0x62, 0xA2, 0x4C, 0x79, 0x83, 0x48, 0x86, 0x0E, 0xA4, 0x67, 0x34, 0x95,
|
|
0xAE, 0x7D, 0xD6, 0xEE, 0x91, 0x05, 0x35, 0x91, 0xE8, 0x34, 0x39, 0xA3, 0xE5, 0xE6, 0x80, 0x53,
|
|
0x76, 0x1F, 0x94, 0xA0, 0xF6, 0xA5, 0x41, 0x79, 0x82, 0xD3, 0xB0, 0x1F, 0xCE, 0xE1, 0x86, 0x64,
|
|
0x65, 0x0C, 0x8D, 0xD6, 0xFA, 0xC1, 0x10, 0x6C, 0x07, 0xD5, 0xF0, 0x77, 0x65, 0xB9, 0x0C, 0xBD,
|
|
0xAE, 0x2D, 0x62, 0x6C, 0x42, 0x7E, 0x2A, 0xBE, 0x5F, 0xC1, 0x17, 0x3B, 0x07, 0xFF, 0x5E, 0xD7,
|
|
0x31, 0x52, 0x26, 0x2F, 0x9F, 0x12, 0xD8, 0x2E, 0xA3, 0xF5, 0xB5, 0xD2, 0xFC, 0x6E, 0x08, 0x1F,
|
|
0xC8, 0x93, 0xA1, 0xEB, 0xF9, 0x13, 0x1D, 0x1F, 0x98, 0x5E, 0xB0, 0x0C, 0x65, 0x6C, 0xAE, 0x07,
|
|
0x78, 0xF8, 0x12, 0xD2, 0xD1, 0x1E, 0x77, 0x5C, 0x24, 0x62, 0xE5, 0x94, 0xD6, 0x6A, 0x8E, 0xD0,
|
|
0x72, 0x59, 0xDA, 0x48, 0x38, 0x2F, 0x31, 0x75, 0x0C, 0x52, 0xF0, 0x0C, 0x8F, 0x5C, 0xE9, 0x5E,
|
|
0x5A, 0x94, 0xE8, 0xD2, 0x80, 0xF8, 0x4F, 0xE7, 0xAA, 0x6C, 0xBE, 0x47, 0xFB, 0xDD, 0x57, 0x0A,
|
|
0xD8, 0x5E, 0xCC, 0x0D, 0x8F, 0x42, 0x5E, 0xDC, 0x5D, 0x95, 0x95, 0x60, 0x9B, 0x6F, 0x05, 0x5E,
|
|
0x08, 0x45, 0x91, 0xE4, 0xB8, 0x06, 0xB1, 0xF2, 0xC0, 0xD7, 0xE3, 0x47, 0xB7, 0x38, 0x08, 0xA8,
|
|
0x58, 0xE4, 0x55, 0xFC, 0xE2, 0x37, 0x1F, 0x38, 0xA2, 0x18, 0x9E, 0xC2, 0x0F, 0x90, 0x14, 0x20,
|
|
0x50, 0xD1, 0xD0, 0xAB, 0x36, 0x7F, 0xAA, 0x03, 0x1C, 0xE6, 0x0A, 0xF9, 0x8E, 0x41, 0xDB, 0x32,
|
|
0x1C, 0x68, 0xA0, 0xA0, 0xED, 0x4A, 0xF4, 0x4B, 0x09, 0xD0, 0xF0, 0x01, 0x8B, 0x17, 0x44, 0xE1,
|
|
0xEA, 0xC5, 0x9D, 0x3B, 0x37, 0x7A, 0x68, 0xF1, 0x78, 0x46, 0xCF, 0xB6, 0x57, 0xDB, 0x4B, 0x5C,
|
|
0x03, 0xE1, 0x9D, 0xC0, 0x37, 0x55, 0x8D, 0x03, 0xFB, 0x6A, 0x00, 0x82, 0x19, 0xD1, 0xC0, 0x76,
|
|
0x97, 0xEE, 0xC9, 0xAD, 0x0D, 0x72, 0x0B, 0xE9, 0xA8, 0x09, 0x92, 0x03, 0xA4, 0xAA, 0x2C, 0xCF,
|
|
0xFD, 0xDE, 0x86, 0xD0, 0x06, 0x4A, 0xAE, 0x7E, 0xC1, 0xB8, 0x2A, 0x4E, 0x9F, 0xA3, 0x5E, 0x8C,
|
|
0x12, 0x40, 0x74, 0x38, 0xE7, 0xEA, 0xB0, 0x51, 0xC2, 0xB9, 0x6D, 0x4A, 0x50, 0xBF, 0x59, 0x9C,
|
|
0x05, 0xB2, 0x42, 0xE2, 0x0F, 0x71, 0x44, 0xDB, 0x97, 0x0B, 0xD0, 0xDB, 0x44, 0x1F, 0x9A, 0x3B,
|
|
0x18, 0x2A, 0x7B, 0xD9, 0x03, 0x83, 0x0B, 0xCF, 0x27, 0x20, 0x43, 0xA6, 0x42, 0xED, 0x89, 0x63,
|
|
0xDB, 0x2D, 0x27, 0xC2, 0x3B, 0xE6, 0x0D, 0x3E, 0xB6, 0x96, 0x33, 0x70, 0xA6, 0xF3, 0xF5, 0x56,
|
|
0xEA, 0xEB, 0xF1, 0xE7, 0xD8, 0xCB, 0x04, 0x48, 0x99, 0x4C, 0x00, 0xA4, 0x2A, 0xA5, 0x8A, 0xF1,
|
|
0x58, 0xD5, 0x17, 0x4C, 0xC5, 0x88, 0x06, 0x8F, 0xA6, 0x67, 0xA6, 0x14, 0xC7, 0xB9, 0xE0, 0x86,
|
|
0xAC, 0x67, 0xFD, 0xB3, 0x5B, 0x3E, 0xDF, 0x03, 0xFD, 0xC8, 0xC4, 0x4A, 0x32, 0x78, 0x6B, 0xD1,
|
|
0xC1, 0xE2, 0x36, 0x9D, 0x0B, 0xF2, 0x54, 0x25, 0xB8, 0xB7, 0xB2, 0x10, 0x7A, 0xA6, 0x79, 0x52,
|
|
0xC2, 0xEE, 0x98, 0xA5, 0x3D, 0xF0, 0x07, 0x8D, 0x25, 0xC3, 0xAC, 0xFD, 0xCF, 0x83, 0x98, 0x80,
|
|
0x56, 0x95, 0xC4, 0x14, 0xA2, 0xA5, 0x93, 0xFE, 0x24, 0x59, 0x44, 0x73, 0xDF, 0xD6, 0x47, 0xDA,
|
|
0x22, 0x3A, 0x82, 0xC5, 0xD1, 0x59, 0x40, 0x9D, 0x0C, 0x1A, 0xB7, 0x79, 0x45, 0x9A, 0xF8, 0x6D,
|
|
0x5A, 0x5C, 0xC2, 0x80, 0xFC, 0xAA, 0x8A, 0xA4, 0xFE, 0x68, 0x61, 0x7D, 0xFE, 0x2C, 0x36, 0xE3,
|
|
0xE0, 0x59, 0x28, 0x40, 0x79, 0xAD, 0x2D, 0x28, 0x12, 0x30, 0xFC, 0x56, 0x2E, 0x1D, 0xEC, 0x48,
|
|
0x3A, 0xF0, 0xC5, 0x6C, 0x31, 0xE0, 0x2E, 0xB3, 0x91, 0x70, 0xB9, 0x9E, 0xBD, 0xE7, 0x96, 0x58,
|
|
0xCB, 0xBC, 0x1C, 0xE4, 0xC7, 0x78, 0xC7, 0x1E, 0x39, 0xDB, 0xB8, 0x77, 0x50, 0xB7, 0x65, 0x20,
|
|
0x04, 0x16, 0x8B, 0xFC, 0x66, 0xC4, 0x6D, 0x05, 0x8C, 0x3C, 0xB6, 0x32, 0x2F, 0xDE, 0xC3, 0x6F,
|
|
0xFC, 0x82, 0x06, 0x02, 0x87, 0x47, 0xFD, 0xD8, 0xDA, 0x75, 0xE0, 0x4E, 0x8C, 0x40, 0x00, 0xB2,
|
|
0x9B, 0x35, 0x78, 0xA4, 0x61, 0x64, 0x96, 0x62, 0x37, 0xF6, 0x3E, 0x39, 0xFA, 0x14, 0x5B, 0xC4,
|
|
0x70, 0x17, 0xDC, 0x0C, 0x9E, 0x31, 0x82, 0x2C, 0x63, 0xCC, 0x8A, 0x43, 0x7C, 0x69, 0x12, 0x05,
|
|
0x18, 0xA3, 0x62, 0xCC, 0xA2, 0x13, 0x96, 0x25, 0xA6, 0x1B, 0xF2, 0x10, 0xC8, 0x73, 0x4F, 0xCB,
|
|
0x80, 0xCA, 0xAF, 0x73, 0xC9, 0x78, 0xB1, 0xAE, 0x87, 0xB8, 0xDF, 0x50, 0xD3, 0x55, 0x1E, 0x3A,
|
|
0x81, 0xF6, 0x84, 0xD6, 0x57, 0x36, 0xCF, 0x38, 0xB7, 0xBC, 0xBC, 0x1E, 0x48, 0x62, 0x9F, 0x0F,
|
|
0x0C, 0xE5, 0xF0, 0x63, 0x33, 0xE6, 0x59, 0x6B, 0x1E, 0xE6, 0x1C, 0x8A, 0xF9, 0xDD, 0x6B, 0xA3,
|
|
0xDC, 0x02, 0x4A, 0x2F, 0x8C, 0x6A, 0x8D, 0x16, 0x7E, 0x2F, 0xF1, 0x75, 0xD5, 0x15, 0x93, 0x07,
|
|
0x27, 0xD9, 0x6F, 0x1A, 0x5D, 0x43, 0xF3, 0x47, 0xC4, 0xED, 0xAD, 0x05, 0x9F, 0xEC, 0x8F, 0xD0,
|
|
0xBE, 0xB5, 0x58, 0xF4, 0xF6, 0xBE, 0x08, 0x73, 0x96, 0x19, 0x05, 0x25, 0xEC, 0x3D, 0x26, 0xF4,
|
|
0x93, 0xDB, 0x9F, 0x56, 0x48, 0x4C, 0xBC, 0xD0, 0x02, 0x59, 0xD1, 0x40, 0x4C, 0xA6, 0x06, 0x41,
|
|
0xE8, 0x7D, 0x47, 0xAE, 0x3A, 0x9E, 0x1A, 0x71, 0x52, 0xD4, 0x67, 0xC1, 0x14, 0x7E, 0x40, 0x6F,
|
|
0x1C, 0x75, 0x30, 0x7B, 0x70, 0x3A, 0xE0, 0x37, 0xB7, 0x41, 0x7F, 0xCB, 0x4A, 0xBA, 0xA7, 0xCE,
|
|
0x56, 0x54, 0xC5, 0x46, 0x65, 0x6F, 0xB4, 0xB6, 0xF0, 0x57, 0xCE, 0x2E, 0x4F, 0xA9, 0xF0, 0x14,
|
|
0x50, 0xC3, 0x30, 0xC5, 0xBA, 0xE1, 0x5E, 0xD6, 0xDC, 0xC5, 0x78, 0x55, 0x32, 0xAA, 0xCB, 0x29,
|
|
0x35, 0x81, 0x46, 0x5E, 0x92, 0xE7, 0xDE, 0xCC, 0x92, 0x29, 0x86, 0xE0, 0x8F, 0x91, 0x3C, 0x74,
|
|
0x97, 0x79, 0x63, 0x97, 0x4A, 0xCC, 0x88, 0xB5, 0xA3, 0x7A, 0xF0, 0xF0, 0x33, 0x87, 0xCD, 0xBD
|
|
};
|
|
uint8_t b = Value ^ hdSurEncBasicCrypt_D2_0F_11(Value, lookup[(((AddrInd * 2) + 0) * 256) + Value]);
|
|
|
|
return (Value ^ hdSurEncBasicCrypt_D2_0F_11(b, lookup[(((AddrInd * 2) + 1) * 256) + b]));
|
|
}
|
|
|
|
void hdSurEncPhase1_D2_0F_11(uint8_t *CWs)
|
|
{
|
|
static const uint8_t lookup1[] =
|
|
{
|
|
0x16, 0x71, 0xCA, 0x14, 0xC4, 0xF4, 0xA3, 0x5A, 0x9D, 0x5F, 0x85, 0x8B, 0xA6, 0x77, 0xFD, 0x3C,
|
|
0x5F, 0x13, 0x2A, 0x5F, 0x61, 0x36, 0xE4, 0xDC, 0x0D, 0x82, 0x92, 0xC5, 0x25, 0xE1, 0x7A, 0x1C,
|
|
0x29, 0x19, 0x94, 0x2F, 0xC5, 0xD2, 0xDC, 0xBA, 0x86, 0x60, 0x64, 0x60, 0x86, 0x92, 0xA3, 0x4E,
|
|
0x3D, 0x9B, 0xCC, 0x16, 0xBB, 0xBA, 0xD2, 0xF0, 0x6A, 0xD3, 0x2F, 0x07, 0x75, 0xBD, 0x28, 0xDB
|
|
};
|
|
static const int8_t lookup2[] = { 1, -1, -1, 1, -1, 2, 1, -2, -1, 1, 2, -2, 1, -2, -2, 4 };
|
|
static const int8_t CAddrIndex[] = { 0, 1, 3, 4 };
|
|
|
|
int32_t i, j, i1, i2, i3;
|
|
for(i = 3; i >= 0; --i)
|
|
{
|
|
for(j = 0; j <= 15; ++j)
|
|
{
|
|
CWs[j] = CWs[j] ^ hdSurEncBasicCrypt_D2_0F_11(j , lookup1 [(16 * i) + j]);
|
|
}
|
|
|
|
uint8_t Buffer[16];
|
|
uint32_t k;
|
|
for(i1 = 0; i1 <= 3; ++i1)
|
|
{
|
|
for(i2 = 0; i2 <= 3; ++i2)
|
|
{
|
|
k = 0;
|
|
for(i3 = 0; i3 <= 3; ++i3)
|
|
{
|
|
k = k + (CWs[(i2 * 4) + i3] * lookup2[(i3 * 4) + i1]);
|
|
Buffer[(i2 * 4) + i1] = (uint8_t)k;
|
|
}
|
|
}
|
|
}
|
|
|
|
memcpy(CWs, Buffer, 16);
|
|
// CW positions are mixed around here
|
|
uint8_t a4[4];
|
|
|
|
for(i1 = 1; i1 <= 3; ++i1)
|
|
{
|
|
for(i2 = 0; i2 <= 3; ++i2)
|
|
{
|
|
a4[i2] = i1 + (i2 * 4);
|
|
}
|
|
|
|
for(i2 = 0; i2 <= i1 - 1; ++i2) // the given code in Func1_3 seems to be wrong here(3 instead of i1-1)!
|
|
{
|
|
uint8_t tmp = CWs[a4[0]];
|
|
for(i3 = 1; i3 <= 3; ++i3)
|
|
{
|
|
CWs[a4[i3 - 1]] = CWs[a4[i3]];
|
|
}
|
|
CWs[a4[3]] = tmp;
|
|
}
|
|
|
|
}
|
|
|
|
for(i1 = 0; i1 <= 15; ++i1)
|
|
{
|
|
CWs[i1] = hdSurEncCryptLookup_D2_0F_11(CWs[i1], CAddrIndex[i1 & 3]);
|
|
}
|
|
}
|
|
}
|
|
|
|
void hdSurEncPhase2_D2_0F_11_sub(uint8_t *CWa, uint8_t *CWb, uint8_t AddrInd)
|
|
{
|
|
uint8_t Buffer[8];
|
|
uint8_t tmp, i;
|
|
for(i = 0; i <= 7; ++i)
|
|
{
|
|
Buffer[i] = hdSurEncCryptLookup_D2_0F_11(CWb[i], AddrInd);
|
|
}
|
|
|
|
// some bitshifting
|
|
tmp = Buffer[7];
|
|
|
|
for(i = 7; i >= 1; --i)
|
|
{
|
|
Buffer[i] = ((Buffer[1] >> 4) & 0xFF) | ((Buffer[i - 1] << 4) & 0xFF);
|
|
}
|
|
|
|
Buffer[0] = ((Buffer[0] >> 4) & 0xFF) | ((tmp << 4) & 0xFF);
|
|
|
|
// saving the result
|
|
for(i = 0; i <= 7; ++i)
|
|
{
|
|
CWa[i] = CWa[i] ^ Buffer[i];
|
|
}
|
|
}
|
|
|
|
void hdSurEncPhase2_D2_0F_11(uint8_t *CWs)
|
|
{
|
|
hdSurEncPhase2_D2_0F_11_sub(CWs, CWs + 8, 0);
|
|
hdSurEncPhase2_D2_0F_11_sub(CWs + 8, CWs, 1);
|
|
hdSurEncPhase2_D2_0F_11_sub(CWs, CWs + 8, 2);
|
|
hdSurEncPhase2_D2_0F_11_sub(CWs + 8, CWs, 3);
|
|
hdSurEncPhase2_D2_0F_11_sub(CWs, CWs + 8, 4);
|
|
}
|
|
|
|
void CommonMain_1_D2_13_15(const uint8_t *datain, uint8_t *dataout)
|
|
{
|
|
const uint8_t Tab3[88] =
|
|
{
|
|
0x1B, 0x12, 0x12, 0x0C, 0x12, 0x0C, 0x0C, 0x08, 0x09, 0x09, 0x06, 0x06, 0x06, 0x06, 0x04, 0x04,
|
|
0x08, 0x04, 0x04, 0x02, 0x04, 0x02, 0x02, 0x01, 0x09, 0x06, 0x09, 0x06, 0x06, 0x04, 0x06, 0x04,
|
|
0x03, 0x03, 0x03, 0x03, 0x02, 0x02, 0x02, 0x02, 0x04, 0x04, 0x02, 0x02, 0x02, 0x02, 0x01, 0x01,
|
|
0x09, 0x06, 0x06, 0x04, 0x09, 0x06, 0x06, 0x04, 0x03, 0x03, 0x02, 0x02, 0x03, 0x03, 0x02, 0x02,
|
|
0x04, 0x02, 0x04, 0x02, 0x02, 0x01, 0x02, 0x01, 0x03, 0x02, 0x03, 0x02, 0x03, 0x02, 0x03, 0x02,
|
|
0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01
|
|
};
|
|
|
|
int i1,i2;
|
|
unsigned long bb;
|
|
for (i1 = 0; i1 < 11; i1++)
|
|
{
|
|
bb = 0;
|
|
for (i2 = 0; i2 < 8; i2++)
|
|
{
|
|
bb += (Tab3[(i1 * 8) + i2] * datain[i2]);
|
|
}
|
|
|
|
dataout[i1] = (bb & 0xFF);
|
|
}
|
|
}
|
|
|
|
unsigned short CommonMain_2_D2_13_15(const uint8_t *data, const unsigned long num)
|
|
{
|
|
unsigned long bb1, bb2;
|
|
bb1 = num >> 3;
|
|
bb2 = (data[bb1] << 24) + (data[bb1 + 1] << 16) + (data[bb1 + 2] << 8);
|
|
return ((bb2 >> (21 - (num & 7))) & 0x7FF);
|
|
}
|
|
|
|
void CommonMain_3_D2_13_15(uint8_t *data0, uint8_t *data1, int nbrloop)
|
|
{
|
|
int i;
|
|
unsigned long bb1, bb2;
|
|
bb1 = 0;
|
|
bb2 = 0;
|
|
for (i = nbrloop - 1; i >= 0; i--)
|
|
{
|
|
bb1 += (data0[i] * 2) + data1[i];
|
|
bb2 += data0[i] + data1[i];
|
|
data0[i] = (bb1 & 0xFF);
|
|
data1[i] = (bb2 & 0xFF);
|
|
bb1 >>= 8;
|
|
bb2 >>= 8;
|
|
}
|
|
}
|
|
|
|
void CommonMain_D2_13_15(const uint8_t *datain, uint8_t *dataout, int loopval)
|
|
{
|
|
const uint8_t Tab0_Comp[0x800] =
|
|
{
|
|
0x54, 0x75, 0x01, 0x0C, 0x7C, 0xE2, 0xC3, 0xC2, 0x5E, 0x13, 0x26, 0xCA, 0xB2, 0xCD, 0xB8, 0x3D,
|
|
0x02, 0x2C, 0xE4, 0x19, 0x41, 0x3D, 0xE4, 0x0F, 0xEC, 0xF1, 0x45, 0x83, 0xE2, 0xE2, 0x72, 0xF9,
|
|
0xCD, 0x75, 0x1E, 0x41, 0xCC, 0x0C, 0x1F, 0x39, 0x87, 0x9B, 0x46, 0xFF, 0x68, 0x1F, 0x00, 0xD8,
|
|
0x41, 0x82, 0xCA, 0xC6, 0xEF, 0x87, 0x90, 0xA2, 0x7E, 0xD9, 0xDE, 0xC8, 0x25, 0xEA, 0xC9, 0x75,
|
|
0x6E, 0x18, 0x81, 0xD8, 0x5A, 0xA6, 0x74, 0x05, 0xAF, 0xAE, 0xE0, 0x4F, 0x85, 0xAD, 0x94, 0xF6,
|
|
0x45, 0xF4, 0xF5, 0x55, 0xA8, 0xEB, 0xEC, 0xDB, 0x6C, 0xFF, 0x2F, 0xC2, 0xC3, 0x7D, 0x93, 0xE6,
|
|
0xF5, 0x31, 0x96, 0xB7, 0x9A, 0xDB, 0xE5, 0x76, 0x66, 0xFB, 0xDD, 0xBC, 0x19, 0x18, 0x42, 0xC6,
|
|
0x36, 0xCD, 0x46, 0x33, 0xEA, 0xF1, 0x4C, 0xC0, 0x72, 0x07, 0xCD, 0x61, 0xCE, 0x0E, 0x08, 0x01,
|
|
0xA3, 0xFA, 0x84, 0x21, 0xF2, 0x43, 0x37, 0x1C, 0xDE, 0x25, 0x8A, 0x1A, 0xF4, 0xBB, 0x40, 0xF3,
|
|
0x53, 0xFE, 0x17, 0x60, 0x91, 0x6D, 0x7B, 0x6D, 0x5F, 0x1C, 0x15, 0x73, 0xCC, 0x6E, 0x73, 0x46,
|
|
0x27, 0x73, 0xA3, 0x10, 0x16, 0x32, 0xB3, 0x39, 0x45, 0xA6, 0x55, 0xE7, 0x91, 0x32, 0x24, 0xC8,
|
|
0xAE, 0xAF, 0x1B, 0x28, 0x69, 0x22, 0x2F, 0xE9, 0x77, 0x72, 0xBF, 0x4B, 0x8B, 0x07, 0x82, 0x31,
|
|
0xB0, 0x95, 0x10, 0x78, 0x9F, 0xC5, 0xF3, 0x73, 0xE1, 0xF8, 0x36, 0x84, 0xFE, 0x1B, 0x92, 0xB2,
|
|
0xE6, 0xA5, 0xCE, 0xDA, 0x56, 0x48, 0x52, 0x77, 0x9D, 0x9D, 0x8E, 0x37, 0x4B, 0xC8, 0x35, 0x7E,
|
|
0xB9, 0x5D, 0xA4, 0xAE, 0x3F, 0xD0, 0xAA, 0x60, 0xA8, 0x4C, 0x85, 0x49, 0xF6, 0x0C, 0x27, 0xE8,
|
|
0x94, 0x84, 0xA0, 0xAA, 0x06, 0x4D, 0xAC, 0x58, 0x8B, 0x61, 0x29, 0x3D, 0x68, 0x25, 0xD3, 0xD3,
|
|
0x8E, 0xA1, 0xE0, 0x71, 0xBF, 0x21, 0x0C, 0xC7, 0x18, 0x19, 0xF1, 0x25, 0x98, 0x5F, 0x79, 0x5E,
|
|
0x51, 0xBA, 0x8C, 0x2F, 0x52, 0x43, 0xF3, 0x5A, 0xE3, 0x58, 0x97, 0x64, 0x23, 0xE0, 0x44, 0x4F,
|
|
0x30, 0x2A, 0xE0, 0x16, 0x8D, 0x4D, 0xD1, 0x1F, 0x7B, 0xC9, 0xC5, 0x74, 0x11, 0x23, 0x5D, 0x95,
|
|
0xAC, 0x7F, 0x2E, 0x30, 0xBE, 0x2D, 0xE3, 0xB5, 0xC6, 0xA7, 0x69, 0x99, 0x1F, 0x18, 0x3C, 0x96,
|
|
0x30, 0x45, 0x99, 0x71, 0x28, 0x08, 0x3C, 0xF7, 0x37, 0x4F, 0x6A, 0xD6, 0xAE, 0x9B, 0x57, 0xC1,
|
|
0xCC, 0x2C, 0xE2, 0x0F, 0x7D, 0x66, 0xF4, 0x36, 0x0C, 0x3B, 0x35, 0xF6, 0x28, 0x03, 0xA3, 0x7A,
|
|
0x83, 0x15, 0xF5, 0x61, 0x5E, 0xE8, 0xB7, 0xD8, 0x54, 0x33, 0x93, 0x63, 0x80, 0x40, 0x43, 0xD0,
|
|
0x9C, 0xAA, 0x3A, 0x98, 0x50, 0xD2, 0xB8, 0x80, 0x5D, 0x16, 0xDF, 0x1C, 0x03, 0xAA, 0x87, 0xC7,
|
|
0x63, 0xA5, 0x8D, 0xA9, 0x2E, 0xFB, 0x4F, 0x7C, 0x2B, 0xF5, 0xF9, 0x57, 0xB5, 0x90, 0xD8, 0x75,
|
|
0xAB, 0x81, 0x4C, 0x1B, 0xAF, 0x6C, 0x0E, 0xCB, 0xB1, 0x4F, 0xD3, 0xE3, 0x69, 0x18, 0x8C, 0x7A,
|
|
0x3C, 0xE1, 0x11, 0x86, 0x47, 0x78, 0x11, 0xA0, 0xD4, 0x28, 0xC3, 0x0D, 0xAC, 0xC6, 0x17, 0xA1,
|
|
0x32, 0x9F, 0x8F, 0x42, 0xD9, 0x3F, 0x66, 0xD7, 0x2D, 0x87, 0x7B, 0x65, 0xD3, 0xD6, 0x90, 0x83,
|
|
0xA2, 0x75, 0xE8, 0x98, 0x90, 0x9D, 0xDE, 0x81, 0x9E, 0x3D, 0xE4, 0xA9, 0xE4, 0x0B, 0xBC, 0xBA,
|
|
0x96, 0xDD, 0x05, 0xCA, 0xAE, 0x78, 0x69, 0x24, 0xDB, 0xA7, 0x3E, 0x7A, 0x3B, 0xB4, 0xC4, 0x59,
|
|
0x61, 0xD2, 0xF2, 0xE3, 0x99, 0x8F, 0x8F, 0x8A, 0x82, 0x33, 0xB8, 0x17, 0x5E, 0x7A, 0x32, 0x41,
|
|
0x10, 0x8D, 0xC2, 0xEF, 0xAA, 0xF8, 0x5A, 0xF7, 0xD2, 0x1D, 0xC0, 0xCB, 0x5E, 0xB7, 0x8A, 0x78,
|
|
0x49, 0x42, 0xEB, 0x19, 0x1B, 0x61, 0xA0, 0x77, 0x5A, 0xF4, 0x6D, 0x55, 0xDA, 0xEB, 0xCE, 0x4E,
|
|
0xB8, 0xE6, 0x32, 0xD7, 0x51, 0x3F, 0x73, 0x14, 0x34, 0x6E, 0x38, 0xD6, 0xA7, 0x28, 0x87, 0x4A,
|
|
0x59, 0xCA, 0x1C, 0x80, 0xB5, 0x8C, 0x9D, 0x94, 0xCB, 0xFE, 0x29, 0x41, 0xE5, 0x69, 0xCF, 0xFD,
|
|
0x0B, 0xE1, 0x7C, 0xA1, 0x70, 0x12, 0x76, 0x43, 0xDA, 0xB9, 0xD4, 0xC3, 0x31, 0xBC, 0x94, 0x77,
|
|
0x04, 0xB4, 0x1C, 0xAA, 0xEC, 0x6F, 0xA5, 0x12, 0x9D, 0x6F, 0x34, 0x65, 0x77, 0xA0, 0xD2, 0x6F,
|
|
0x60, 0xC6, 0x47, 0xC2, 0xDF, 0x6A, 0x10, 0x53, 0xD4, 0xBA, 0xF3, 0xB7, 0x38, 0x79, 0x63, 0xC9,
|
|
0xD4, 0x77, 0xBC, 0x54, 0xE9, 0x79, 0x42, 0xD5, 0xE0, 0x71, 0xE7, 0x9E, 0x5A, 0x62, 0x0C, 0xAD,
|
|
0x01, 0x09, 0xA8, 0x9F, 0x8E, 0x67, 0x4A, 0x30, 0xA4, 0xB1, 0x08, 0xFC, 0x0A, 0xEA, 0x7A, 0x1D,
|
|
0x4C, 0x4A, 0x21, 0xDE, 0x00, 0xD7, 0x41, 0x98, 0x6B, 0x38, 0x50, 0x3E, 0x1F, 0x25, 0x06, 0xE3,
|
|
0x6C, 0xA3, 0x84, 0x5B, 0xC1, 0xED, 0x47, 0xDD, 0xB3, 0x83, 0x46, 0x72, 0x69, 0xCE, 0x72, 0x04,
|
|
0x43, 0x67, 0x3A, 0x19, 0xD9, 0x0A, 0xF7, 0x43, 0x88, 0xCA, 0xC7, 0x31, 0x34, 0x21, 0x4E, 0x4C,
|
|
0xE8, 0xD1, 0x70, 0x00, 0xBD, 0xB1, 0xB6, 0x76, 0x6F, 0x5B, 0xF9, 0xF5, 0xF4, 0x19, 0x20, 0x21,
|
|
0xC1, 0xF0, 0x11, 0x36, 0x66, 0xAB, 0x15, 0xBD, 0x69, 0x92, 0xC6, 0x46, 0xDE, 0xDC, 0xE9, 0x9A,
|
|
0xF8, 0x6C, 0x15, 0x29, 0x15, 0xA6, 0x35, 0x3E, 0x08, 0xE5, 0x90, 0x62, 0x9F, 0x86, 0x56, 0x83,
|
|
0x5D, 0x60, 0x0D, 0x22, 0x77, 0xA7, 0x60, 0x9B, 0x26, 0x80, 0x16, 0x67, 0xB4, 0x46, 0xBF, 0x74,
|
|
0x55, 0x92, 0x5B, 0x34, 0xFF, 0xC8, 0x28, 0x37, 0xFF, 0x14, 0x62, 0xFA, 0xBD, 0x03, 0x78, 0x04,
|
|
0x1B, 0x65, 0x7F, 0x99, 0x05, 0x27, 0x14, 0xC0, 0x06, 0x4D, 0x4B, 0x0E, 0x98, 0x34, 0x6A, 0xB3,
|
|
0xA1, 0xFE, 0xBC, 0x45, 0x7D, 0x52, 0x50, 0x0E, 0x2C, 0xFB, 0x91, 0xF5, 0xFB, 0x2A, 0xB7, 0xD9,
|
|
0xB8, 0xB8, 0x54, 0x31, 0x81, 0x03, 0x93, 0x2C, 0xE1, 0x5C, 0xB9, 0x2C, 0xE8, 0x38, 0xC0, 0xA7,
|
|
0x58, 0x18, 0x92, 0xC5, 0x8B, 0xEF, 0x1E, 0x33, 0xA4, 0xBA, 0x86, 0x2B, 0xE9, 0xEE, 0xB1, 0xDF,
|
|
0xAB, 0xB8, 0x48, 0xDA, 0x84, 0xF1, 0x68, 0x05, 0x4E, 0xDE, 0xB5, 0x9E, 0x88, 0x12, 0xC9, 0x60,
|
|
0x50, 0x58, 0x56, 0x9D, 0x26, 0x84, 0xB6, 0x1A, 0xE6, 0x4B, 0x40, 0x94, 0x6D, 0xE9, 0x1D, 0x0D,
|
|
0x8A, 0xF9, 0x2A, 0xB5, 0xBC, 0xDB, 0x06, 0x8F, 0x13, 0x7E, 0x1D, 0x1C, 0xC7, 0xFD, 0x8F, 0x78,
|
|
0x55, 0x3F, 0x16, 0x84, 0x48, 0xDA, 0x1A, 0xD1, 0x93, 0x95, 0x20, 0x58, 0x92, 0x39, 0xF6, 0x73,
|
|
0x4E, 0x9E, 0x7B, 0x70, 0xFC, 0x1E, 0x5B, 0x20, 0x48, 0x96, 0xB3, 0x7C, 0x50, 0x09, 0x5B, 0x61,
|
|
0x57, 0x97, 0x36, 0x04, 0x29, 0x2C, 0x32, 0x8E, 0x93, 0x4A, 0x45, 0xFA, 0xD5, 0x24, 0x14, 0x1A,
|
|
0x28, 0x9C, 0x1A, 0x71, 0xAE, 0x85, 0x4B, 0x26, 0x79, 0x99, 0x65, 0xD0, 0x07, 0x98, 0xED, 0xC9,
|
|
0x1B, 0x39, 0x57, 0x5B, 0xDB, 0x3D, 0x87, 0x69, 0x66, 0x9B, 0x03, 0x23, 0x54, 0x6B, 0x4B, 0xAC,
|
|
0x6E, 0x7A, 0x25, 0x1E, 0xB6, 0x97, 0xCF, 0x1D, 0x07, 0xCB, 0x2A, 0x3E, 0x85, 0x02, 0x93, 0x31,
|
|
0x12, 0x27, 0xF0, 0xA6, 0x6D, 0x0F, 0x9A, 0xB6, 0xFC, 0x22, 0x79, 0x6C, 0x77, 0xFD, 0x3F, 0xDC,
|
|
0x19, 0xD0, 0xDF, 0xBD, 0x9E, 0xE0, 0xBE, 0x20, 0x13, 0xA3, 0x0A, 0x0B, 0x22, 0xF2, 0xC8, 0x6B,
|
|
0xA1, 0xDD, 0x6C, 0x67, 0xB3, 0xFD, 0x71, 0xC2, 0x7B, 0x08, 0x3B, 0xF1, 0x37, 0xB5, 0x0F, 0x86,
|
|
0xFA, 0xA9, 0xE9, 0x42, 0xD1, 0xE8, 0xCD, 0x05, 0xEF, 0xD3, 0xCC, 0x0B, 0x70, 0x51, 0x5B, 0x97,
|
|
0x06, 0xC4, 0x9D, 0x88, 0x11, 0x3E, 0x99, 0x9F, 0xBE, 0x76, 0x8C, 0x8D, 0xE6, 0xBA, 0xDA, 0x48,
|
|
0xD0, 0x04, 0x86, 0x4F, 0xA9, 0xC6, 0xB0, 0xED, 0xA4, 0x94, 0x46, 0x96, 0x27, 0xEE, 0x9F, 0xBD,
|
|
0xDA, 0x9B, 0x3D, 0x11, 0x80, 0xD3, 0x7B, 0x5A, 0x48, 0x94, 0xE5, 0xCC, 0x48, 0xEA, 0xE4, 0x18,
|
|
0xDF, 0x51, 0xB3, 0x02, 0x57, 0x20, 0x4B, 0x0F, 0x07, 0xFF, 0x41, 0x33, 0x0F, 0x6B, 0x2E, 0xAA,
|
|
0xDE, 0xB2, 0x56, 0xF7, 0xFB, 0xA2, 0x48, 0x3C, 0x97, 0x1A, 0x64, 0x2C, 0xD1, 0x74, 0x40, 0xCF,
|
|
0x65, 0x7F, 0x14, 0x08, 0x59, 0xC4, 0x35, 0xD3, 0x8A, 0x0F, 0xFD, 0x71, 0x7A, 0x71, 0xAC, 0x2D,
|
|
0xF3, 0xFD, 0x7B, 0x12, 0x5F, 0xC0, 0xBC, 0x4E, 0x96, 0x12, 0xF2, 0x8E, 0x41, 0x84, 0x01, 0x0F,
|
|
0xED, 0x7B, 0xC1, 0xB9, 0x39, 0x03, 0x35, 0x40, 0x49, 0x53, 0xB8, 0xB4, 0x6B, 0xA6, 0xE7, 0x0A,
|
|
0x14, 0xBB, 0x29, 0x16, 0xEC, 0x2A, 0x3A, 0xD6, 0x09, 0xBB, 0x5C, 0x20, 0xF8, 0x09, 0xFD, 0x86,
|
|
0xC4, 0x25, 0x09, 0x85, 0x0B, 0xD5, 0xD8, 0x51, 0xB1, 0xA2, 0xCB, 0xDC, 0xC4, 0xDD, 0x34, 0xDF,
|
|
0xE2, 0x85, 0xA9, 0xCC, 0x4E, 0x66, 0x51, 0xFA, 0x9C, 0x4D, 0xB7, 0x1E, 0x3E, 0x49, 0x34, 0x9C,
|
|
0x21, 0x66, 0x07, 0x44, 0xB2, 0xEC, 0x73, 0xC5, 0xBB, 0x27, 0x9A, 0xA5, 0x91, 0x5A, 0xB9, 0x9F,
|
|
0xBE, 0xC8, 0xA2, 0x27, 0x89, 0x21, 0xA7, 0xEE, 0x50, 0x4D, 0x43, 0x50, 0x67, 0xC2, 0x3B, 0x7C,
|
|
0x20, 0x0B, 0x95, 0x40, 0xBE, 0xEA, 0xB5, 0xD9, 0x82, 0xD7, 0x9C, 0xB5, 0x21, 0xAD, 0xA6, 0xF9,
|
|
0x70, 0xEA, 0xCD, 0x04, 0xDD, 0x58, 0x91, 0x89, 0xB2, 0xA9, 0xF9, 0xB4, 0x12, 0xA2, 0x63, 0x89,
|
|
0x40, 0x8E, 0xEA, 0x62, 0xEE, 0x0B, 0x01, 0x82, 0x6F, 0xB3, 0x5E, 0x5C, 0x36, 0xBE, 0xF4, 0x97,
|
|
0x2C, 0xCF, 0x96, 0x7C, 0x0D, 0xAD, 0x62, 0xCE, 0xD4, 0x38, 0xC5, 0x32, 0x02, 0x24, 0x57, 0x27,
|
|
0xE0, 0xCF, 0x56, 0xA5, 0x72, 0x6D, 0x90, 0x89, 0x2D, 0x4C, 0x34, 0xF6, 0x1D, 0xDD, 0x88, 0x5E,
|
|
0x7A, 0x23, 0xE3, 0x6F, 0x42, 0xA3, 0xD9, 0x58, 0x7E, 0xE3, 0x52, 0x74, 0x57, 0x63, 0xB7, 0xB2,
|
|
0xC1, 0xA3, 0x30, 0x92, 0x2E, 0xB0, 0x91, 0x01, 0x13, 0x36, 0x9A, 0x6A, 0xA7, 0x5B, 0x3C, 0x07,
|
|
0xFB, 0xD8, 0x1E, 0x7E, 0xCF, 0x49, 0xAB, 0x3F, 0xCA, 0xCE, 0x74, 0x40, 0x54, 0x8D, 0x83, 0x61,
|
|
0xCA, 0xC3, 0x76, 0x59, 0x5C, 0x9F, 0x49, 0x8A, 0x7D, 0xD1, 0x17, 0x9C, 0xA4, 0xDB, 0xB9, 0x16,
|
|
0x4D, 0x64, 0xF7, 0xC7, 0xF0, 0x24, 0xE7, 0x00, 0xB6, 0x98, 0xD5, 0x8B, 0x54, 0xCB, 0x1E, 0x8B,
|
|
0xA2, 0x2B, 0x7D, 0x50, 0x51, 0x8A, 0xF0, 0xEF, 0x47, 0xAE, 0xD0, 0xD6, 0xA0, 0x42, 0x8A, 0xD8,
|
|
0x22, 0xAF, 0x02, 0x99, 0x4A, 0xE0, 0x8D, 0x8D, 0xBF, 0x11, 0x05, 0xA4, 0xC4, 0x9D, 0xB3, 0x89,
|
|
0xB4, 0x4C, 0xC9, 0xF7, 0x4D, 0xC5, 0x2A, 0x35, 0x95, 0x30, 0xF3, 0x0E, 0x2F, 0xEC, 0x6E, 0x3A,
|
|
0x8B, 0x05, 0x76, 0xED, 0x1A, 0x7C, 0xC0, 0xE7, 0x22, 0xCB, 0x59, 0xFF, 0xE6, 0x37, 0x78, 0x44,
|
|
0xD4, 0xEE, 0xAD, 0xD7, 0xBD, 0x2E, 0xB7, 0x6A, 0xA4, 0x4E, 0x0E, 0xFB, 0xB0, 0xF5, 0xCB, 0x87,
|
|
0xCF, 0xC3, 0x18, 0x64, 0x6F, 0x26, 0x5C, 0xD7, 0x16, 0xC8, 0x7F, 0xAB, 0x29, 0xC4, 0xBA, 0xFF,
|
|
0xCD, 0x1C, 0xE4, 0x3A, 0xF2, 0xEB, 0x6A, 0x38, 0xE4, 0x65, 0xC2, 0x33, 0x03, 0x26, 0x7D, 0x9B,
|
|
0x7E, 0x1D, 0x83, 0x00, 0x04, 0x2D, 0x2B, 0x5F, 0xFE, 0x39, 0x7E, 0xF1, 0x3C, 0xA2, 0x8C, 0x52,
|
|
0x95, 0xBF, 0x46, 0x81, 0x24, 0x44, 0xF8, 0x10, 0xC3, 0x87, 0x8E, 0x64, 0x80, 0x17, 0x44, 0xE2,
|
|
0x8B, 0xD1, 0x3C, 0x4A, 0xE2, 0x1F, 0xA9, 0xDE, 0x75, 0x13, 0xFC, 0x2E, 0x86, 0x0A, 0x5C, 0x5F,
|
|
0x92, 0x2B, 0x92, 0x2D, 0x2A, 0xEC, 0xD2, 0x5C, 0x82, 0x6B, 0x76, 0x1E, 0xED, 0xE6, 0x56, 0xF7,
|
|
0xD2, 0xDB, 0x96, 0x68, 0x02, 0x68, 0x99, 0x49, 0xEE, 0x88, 0x66, 0xCE, 0x5D, 0x08, 0x88, 0xA8,
|
|
0xB9, 0x24, 0xB0, 0xB4, 0xDC, 0xA6, 0xC9, 0xD8, 0x68, 0x80, 0xBF, 0x6B, 0x32, 0x57, 0x7F, 0x91,
|
|
0x0E, 0x37, 0x59, 0xF6, 0x76, 0xD2, 0xC5, 0x0B, 0xF3, 0x23, 0xBF, 0x38, 0x52, 0x0D, 0x97, 0x81,
|
|
0x17, 0xBB, 0x9A, 0xC2, 0x55, 0x44, 0x72, 0xCE, 0xEE, 0xFA, 0xBB, 0xDA, 0xAB, 0xB0, 0x09, 0xEA,
|
|
0xDB, 0xBF, 0x45, 0x95, 0x07, 0x88, 0xD4, 0xD2, 0x0D, 0x2E, 0x15, 0x31, 0xBE, 0x6A, 0xF4, 0xEF,
|
|
0xA3, 0x7D, 0x22, 0x81, 0x3B, 0xA8, 0x83, 0xF9, 0x42, 0xE5, 0x9B, 0x79, 0x01, 0xF5, 0xDC, 0x19,
|
|
0x64, 0xEB, 0x47, 0x67, 0xAF, 0xA4, 0xB2, 0xAE, 0xF8, 0xF9, 0x4D, 0x63, 0xAD, 0x54, 0xE1, 0x02,
|
|
0x56, 0x89, 0x4E, 0x0A, 0xE8, 0x3E, 0x03, 0xFA, 0x33, 0x61, 0x58, 0x80, 0x64, 0x55, 0x3C, 0x8C,
|
|
0x2A, 0x3D, 0x70, 0x3E, 0xE5, 0xC1, 0xA7, 0x75, 0xFC, 0x91, 0x75, 0x05, 0x8C, 0x6E, 0x3A, 0x74,
|
|
0x10, 0xF1, 0x30, 0xE6, 0xF6, 0xF7, 0xAB, 0x6C, 0xB1, 0x2B, 0xF0, 0x2F, 0x13, 0x6E, 0xD4, 0x0A,
|
|
0x64, 0x29, 0xF8, 0xBB, 0xA1, 0xAA, 0x55, 0x09, 0x93, 0x47, 0x2F, 0x8C, 0x7D, 0xF1, 0x2D, 0x81,
|
|
0xFE, 0x78, 0xFC, 0xEE, 0x3F, 0xDD, 0x49, 0xDC, 0x0D, 0x52, 0x5C, 0x3B, 0x8F, 0x08, 0xB0, 0xDF,
|
|
0xDC, 0xFC, 0xBE, 0x5F, 0x3B, 0x53, 0x82, 0xE2, 0xBD, 0x6D, 0x5D, 0xF2, 0x8D, 0xFB, 0x5A, 0x1D,
|
|
0x15, 0x1B, 0xE4, 0xB1, 0x56, 0x06, 0x1A, 0xF8, 0x9C, 0xB9, 0x44, 0xF2, 0xD9, 0xF4, 0xB2, 0x00,
|
|
0x9A, 0x94, 0x62, 0x33, 0x7E, 0x0A, 0xB0, 0x0C, 0xD5, 0xEF, 0x8E, 0xA8, 0xEB, 0x47, 0xE9, 0x20,
|
|
0xA8, 0x68, 0xEF, 0x53, 0xA0, 0x59, 0x1B, 0xA0, 0x2B, 0xC5, 0x2B, 0x30, 0xB6, 0x5D, 0xAB, 0xB4,
|
|
0x5F, 0x86, 0x71, 0x95, 0x89, 0xFC, 0xC7, 0x9A, 0xC3, 0xED, 0x82, 0xA0, 0x3D, 0x73, 0xC1, 0x36,
|
|
0x01, 0x5F, 0x9E, 0xD7, 0xE3, 0xC0, 0x62, 0x74, 0xED, 0x13, 0xB6, 0xD6, 0xD5, 0x37, 0x17, 0xE1,
|
|
0x39, 0xC7, 0x6D, 0x31, 0xBA, 0x02, 0xAF, 0xD5, 0xCC, 0x51, 0xA8, 0x09, 0x3F, 0x00, 0x4A, 0x8F,
|
|
0xA6, 0x23, 0x13, 0x88, 0xCD, 0x1F, 0x38, 0x60, 0xE7, 0xE7, 0x53, 0xDC, 0x65, 0xE8, 0x53, 0x26,
|
|
0xBB, 0xE1, 0x1F, 0x65, 0xF0, 0xAD, 0x53, 0x3B, 0xBD, 0xAD, 0x97, 0xAC, 0xD1, 0xA5, 0xD0, 0xE9,
|
|
0xEB, 0xD6, 0x11, 0xD5, 0x00, 0xDF, 0x72, 0x9C, 0xCC, 0x7F, 0xD3, 0x67, 0xA1, 0x3A, 0x79, 0xE1,
|
|
0x85, 0x70, 0xE5, 0x43, 0xC9, 0x28, 0xA5, 0x2F, 0x9E, 0xE7, 0xFE, 0xEB, 0x14, 0x10, 0x23, 0xC7,
|
|
0xAF, 0xB1, 0x24, 0xC8, 0xE5, 0x44, 0x6F, 0x4C, 0x04, 0xEC, 0xC1, 0xF0, 0x23, 0x1C, 0xF6, 0xAC,
|
|
0xAF, 0xC4, 0x0E, 0x2D, 0x59, 0x39, 0x47, 0xA9, 0x9E, 0xD9, 0x2E, 0x79, 0xBA, 0xFE, 0x4F, 0x12,
|
|
0x7F, 0x63, 0x7F, 0x62, 0x67, 0x7C, 0x52, 0x2F, 0xCA, 0x8B, 0x6B, 0x4F, 0x10, 0x8F, 0x14, 0xC6,
|
|
0xA1, 0x9B, 0x45, 0x15, 0x90, 0x63, 0x22, 0x5D, 0x68, 0x4B, 0xCF, 0xFA, 0x6A, 0x06, 0xF0, 0x26,
|
|
0xAC, 0x6C, 0x3A, 0x89, 0x25, 0xF3, 0x5E, 0x90, 0x06, 0x93, 0xB6, 0x35, 0x0D, 0x85, 0x60, 0x98,
|
|
0xBC, 0x6E, 0xF2, 0xA5, 0x17, 0x29, 0x70, 0xD6, 0xFF, 0x0C, 0xD0, 0xC0, 0x35, 0xD7, 0x4A, 0xFD
|
|
};
|
|
const uint8_t Tab1_Comp[11 * 8] =
|
|
{
|
|
0x70, 0x49, 0xD7, 0xE3, 0xDF, 0x3C, 0x96, 0x03, 0x2A, 0x70, 0x82, 0xA6, 0x5F, 0xDE, 0xCC, 0x0C,
|
|
0x2A, 0x62, 0x2A, 0x3E, 0xA4, 0x0C, 0x0A, 0xAB, 0x4F, 0x06, 0x5D, 0xD4, 0x14, 0xAA, 0xE1, 0xC3,
|
|
0x96, 0xDA, 0x16, 0x36, 0x45, 0x3C, 0x63, 0xC2, 0x97, 0x71, 0x87, 0xAB, 0xFA, 0xB2, 0xFC, 0xD6,
|
|
0x8F, 0x85, 0xC9, 0x04, 0x56, 0xBA, 0xEB, 0x3F, 0x42, 0x9F, 0xCB, 0x66, 0x55, 0x45, 0x1C, 0x96,
|
|
0xFF, 0x4D, 0x35, 0xDF, 0x88, 0x0E, 0xDC, 0xC8, 0x4E, 0x3F, 0x81, 0x74, 0xD8, 0x77, 0x4C, 0x8E,
|
|
0x00, 0xC0, 0x64, 0x83, 0x4E, 0xBB, 0xF0, 0xB1
|
|
};
|
|
unsigned short buff8[8];
|
|
uint8_t buff11[11 + 1]; // +1 to avoid func2 bug
|
|
int i1, i2;
|
|
buff11[11] = 0;
|
|
CommonMain_1_D2_13_15(datain, buff11);
|
|
|
|
for (i1 = 0; i1 < 11; i1++)
|
|
{
|
|
buff11[i1] ^= Tab1_Comp[(loopval * 11) + i1];
|
|
}
|
|
|
|
for (i1 = 0; i1 < 8; i1++)
|
|
{
|
|
buff8[i1] = CommonMain_2_D2_13_15(buff11, i1 * 11);
|
|
}
|
|
|
|
for (i1 = 0; i1 < 8; i1++)
|
|
{
|
|
dataout[i1] = Tab0_Comp[buff8[i1]];
|
|
}
|
|
|
|
i1 = 1;
|
|
while (i1 < 8)
|
|
{
|
|
i2 = 0 ;
|
|
|
|
while (i2 < 8)
|
|
{
|
|
CommonMain_3_D2_13_15(&dataout[i2], &dataout[i1 + i2], i1);
|
|
i2 += (i1 * 2);
|
|
}
|
|
|
|
i1 *= 2;
|
|
}
|
|
}
|
|
|
|
void Common_D2_13_15(uint8_t *cw0, const uint8_t *cw1, int loopval)
|
|
{
|
|
int i;
|
|
uint8_t buff8[8];
|
|
CommonMain_D2_13_15(cw1, buff8, loopval);
|
|
|
|
for (i = 0; i < 8; i++)
|
|
{
|
|
cw0[i] ^= buff8[i];
|
|
}
|
|
}
|
|
|
|
void ExchangeCWs(uint8_t *cw0, uint8_t *cw1)
|
|
{
|
|
int i;
|
|
uint8_t b;
|
|
for (i = 0; i < 8; i++)
|
|
{
|
|
b = cw1[i];
|
|
cw1[i] = cw0[i];
|
|
cw0[i] = b;
|
|
}
|
|
}
|
|
|
|
void hdSurEncPhase1_D2_13_15(uint8_t *cws)
|
|
{
|
|
int i;
|
|
for (i = 0; i <= 7; i++)
|
|
{
|
|
// Possible code
|
|
if ((i & 1) == 0)
|
|
{
|
|
Common_D2_13_15((uint8_t *) &cws[0], (uint8_t *) &cws[8], i);
|
|
}
|
|
else
|
|
{
|
|
Common_D2_13_15((uint8_t *) &cws[8], (uint8_t *) &cws[0], i);
|
|
}
|
|
}
|
|
ExchangeCWs((uint8_t *) &cws[0], (uint8_t *) &cws[8]);
|
|
}
|
|
|
|
void hdSurEncPhase2_D2_13_15(uint8_t *cws)
|
|
{
|
|
int i;
|
|
for (i = 7; i >= 0; i--)
|
|
{
|
|
// Possible code
|
|
if ((i & 1) == 0)
|
|
{
|
|
Common_D2_13_15((uint8_t *) &cws[8], (uint8_t *) &cws[0], i);
|
|
}
|
|
else
|
|
{
|
|
Common_D2_13_15((uint8_t *) &cws[0], (uint8_t *) &cws[8], i);
|
|
}
|
|
}
|
|
ExchangeCWs((uint8_t *) &cws[8], (uint8_t *) &cws[0]);
|
|
}
|
|
|
|
uint getBit(uint number, int bt)
|
|
{
|
|
return (number >> bt ) & 1;
|
|
}
|
|
|
|
void SBitslice(uint* Iarray, int offsetin, uint* Oarray, int offsetout, int row, char* box)
|
|
{
|
|
int bi, input, l, output;
|
|
uint calcArray[4] = {0, 0, 0, 0};
|
|
|
|
for (bi = 0; bi < 32; bi++)
|
|
{
|
|
input = 0;
|
|
|
|
for (l = 0; l < 4; l++)
|
|
{
|
|
input += getBit(Iarray[l + offsetin], bi) << l;
|
|
}
|
|
|
|
output = box[input + 16 * row];
|
|
|
|
for (l = 0; l < 4; l++)
|
|
{
|
|
calcArray[l] += getBit(output, l) << bi;
|
|
}
|
|
}
|
|
|
|
for (l = 0; l < 4; l++)
|
|
{
|
|
Oarray[l + offsetout] = calcArray[l];
|
|
}
|
|
}
|
|
|
|
void xorBlock(uint* data, int offset)
|
|
{
|
|
int i;
|
|
for (i = 0; i < 4; i++)
|
|
{
|
|
data[i] ^= KeyS[i + 4*offset];
|
|
}
|
|
}
|
|
|
|
uint rotr(uint val, int nbits)
|
|
{
|
|
return ((val >> nbits) + (val << (32 - nbits)));
|
|
}
|
|
|
|
void LTBitsliceInverse(uint* data)
|
|
{
|
|
uint C0 = data[0];
|
|
uint C1 = data[1];
|
|
uint C2 = data[2];
|
|
uint C3 = data[3];
|
|
C2 = rotr(C2, 22);
|
|
C0 = rotr(C0, 5);
|
|
C2 ^= C3 ^ (C1 << 7);
|
|
C0 ^= C1 ^ C3;
|
|
C3 = rotr(C3, 7);
|
|
C3 ^= C2 ^ (C0 << 3);
|
|
C1 = rotr(C1, 1);
|
|
C1 ^= C0 ^ C2;
|
|
C2 = rotr(C2, 3);
|
|
C0 = rotr(C0, 13);
|
|
data[0] = C0;
|
|
data[1] = C1;
|
|
data[2] = C2;
|
|
data[3] = C3;
|
|
}
|
|
|
|
void N98_decrypt(byte* data)
|
|
{
|
|
int r; // round
|
|
int i, j;
|
|
uint N98[4]; // make 32 bits words
|
|
|
|
for(i = 0; i < 4; i++)
|
|
{
|
|
N98[i] = data[4 * i] + (data[4 * i + 1] << 8) + (data[4 * i + 2] << 16) + (data[4 * i + 3] << 24);
|
|
}
|
|
|
|
for(r = 31; r >= 0; r--) // decrypt, inverse order
|
|
{
|
|
if (r == 31)
|
|
{
|
|
xorBlock(N98, 32);
|
|
}
|
|
else
|
|
{
|
|
LTBitsliceInverse(N98); // inverse Linear Transform
|
|
}
|
|
SBitslice(N98, 0, N98, 0, (r & 7), SBoxInverse); // SBox inverse, bitslice mode
|
|
xorBlock(N98, r);
|
|
}
|
|
|
|
for(i = 0; i < 4; i++) // set bytes to caller's array
|
|
{
|
|
for(j = 0; j < 4; j++)
|
|
{
|
|
data[4 * i + j] = (N98[i] >> 8 * j) & 0xFF;
|
|
}
|
|
}
|
|
}
|
|
|
|
void MakeSubKeys(uint* KeySch, char key98Idx)
|
|
{
|
|
int i, k;
|
|
char j;
|
|
uint w[140] = {0};
|
|
char Sbox[128];
|
|
// uint KeyS[132];
|
|
|
|
// calc SBox , inverse of SBoxInverse
|
|
for(i = 0; i < 8; i++) //row
|
|
{
|
|
for(j = 0; j < 16; j++) // search for column
|
|
{
|
|
k = 0;
|
|
while (SBoxInverse[k+16*i] != j)
|
|
{
|
|
k = k +1;
|
|
}
|
|
Sbox[j + 16 * i] = k;
|
|
}
|
|
}
|
|
|
|
switch (key98Idx)
|
|
{
|
|
case 0x21:
|
|
{
|
|
w[0] = 0x6341F22E;
|
|
w[1] = 0x002E2D10;
|
|
w[2] = 0x181D7704;
|
|
w[3] = 0x1D93A0F3;
|
|
w[4] = 1;
|
|
w[5] = 0;
|
|
w[6] = 0;
|
|
w[7] = 0;
|
|
break;
|
|
}
|
|
}
|
|
|
|
for(i = 0; i < 132; i++)
|
|
{
|
|
w[i + 8] = rotr((w[i + 0] ^ w[i + 3] ^ w[i + 5] ^ w[i + 7] ^ 0x9E3779B9 ^ i), 21);
|
|
}
|
|
for(i = 0; i < 33; i++)
|
|
{
|
|
SBitslice(w, (4 * i + 8), KeySch, (4 * i), ((35 - i) & 7), Sbox); // SBox , bitslice mode
|
|
}
|
|
}
|
|
|
|
static int32_t viaccess_card_init(struct s_reader *reader, ATR *newatr)
|
|
{
|
|
get_atr;
|
|
def_resp;
|
|
int32_t i;
|
|
uint8_t buf[256];
|
|
uint8_t insac[] = { 0xca, 0xac, 0x00, 0x00, 0x00 }; // select data
|
|
uint8_t insb8[] = { 0xca, 0xb8, 0x00, 0x00, 0x00 }; // read selected data
|
|
uint8_t insa4[] = { 0xca, 0xa4, 0x00, 0x00, 0x00 }; // select issuer
|
|
uint8_t insc0[] = { 0xca, 0xc0, 0x00, 0x00, 0x00 }; // read data item
|
|
static const uint8_t insFAC[] = { 0x87, 0x02, 0x00, 0x00, 0x03 }; // init FAC
|
|
static const uint8_t FacDat[] = { 0x00, 0x00, 0x28 };
|
|
static uint8_t ins8702_data[] = { 0x00, 0x00, 0x11};
|
|
static uint8_t ins8704[] = { 0x87, 0x04, 0x00, 0x00, 0x07 };
|
|
static uint8_t ins8706[] = { 0x87, 0x06, 0x00, 0x00, 0x04 };
|
|
|
|
if((atr[1] != 0x77) || ((atr[2] != 0x18) && (atr[2] != 0x11) && (atr[2] != 0x19)) || ((atr[9] != 0x68) && (atr[9] != 0x6C) && (atr[9] != 0x64)))
|
|
{
|
|
return ERROR;
|
|
}
|
|
|
|
write_cmd(insFAC, FacDat);
|
|
if(!(cta_res[cta_lr - 2] == 0x90 && cta_res[cta_lr - 1] == 0))
|
|
{
|
|
return ERROR;
|
|
}
|
|
|
|
if(!cs_malloc(&reader->csystem_data, sizeof(struct viaccess_data)))
|
|
{
|
|
return ERROR;
|
|
}
|
|
|
|
struct viaccess_data *csystem_data = reader->csystem_data;
|
|
write_cmd(insFAC, ins8702_data);
|
|
if((cta_res[cta_lr - 2] == 0x90) && (cta_res[cta_lr - 1] == 0x00))
|
|
{
|
|
write_cmd(ins8704, NULL);
|
|
if((cta_res[cta_lr - 2] == 0x90) && (cta_res[cta_lr - 1] == 0x00))
|
|
{
|
|
write_cmd(ins8706, NULL);
|
|
if((cta_res[cta_lr - 2] == 0x90) && (cta_res[cta_lr - 1] == 0x00))
|
|
{
|
|
csystem_data->last_geo.number_ecm = (cta_res[2] << 8) | (cta_res[3]);
|
|
rdr_log(reader, "using ecm #%x for long viaccess ecm", csystem_data->last_geo.number_ecm);
|
|
}
|
|
}
|
|
}
|
|
|
|
reader->caid = 0x500;
|
|
memset(reader->prid, 0xff, sizeof(reader->prid));
|
|
|
|
insac[2] = 0xa4;
|
|
write_cmd(insac, NULL); // request unique id
|
|
|
|
insb8[4] = 0x07;
|
|
write_cmd(insb8, NULL); // read unique id
|
|
memcpy(reader->hexserial, cta_res + 2, 5);
|
|
// rdr_log(reader, "[viaccess-reader] type: Viaccess, ver: %s serial: %llu", ver, b2ll(5, cta_res+2));
|
|
rdr_log_sensitive(reader, "type: Viaccess (%sstandard atr), caid: %04X, serial: {%llu}",
|
|
atr[9] == 0x68 ? "" : "non-", reader->caid, (unsigned long long) b2ll(5, cta_res + 2));
|
|
|
|
i = 0;
|
|
insa4[2] = 0x00;
|
|
write_cmd(insa4, NULL); // select issuer 0
|
|
buf[0] = 0;
|
|
while((cta_res[cta_lr - 2] == 0x90) && (cta_res[cta_lr - 1] == 0))
|
|
{
|
|
insc0[4] = 0x1a;
|
|
write_cmd(insc0, NULL); // show provider properties
|
|
cta_res[2] &= 0xF0;
|
|
reader->prid[i][0] = 0;
|
|
memcpy(&reader->prid[i][1], cta_res, 3);
|
|
memcpy(&csystem_data->availkeys[i][0], cta_res + 10, 16);
|
|
|
|
snprintf((char *)buf + cs_strlen((char *)buf), sizeof(buf) - cs_strlen((char *)buf), ",%06X", b2i(3, &reader->prid[i][1]));
|
|
// rdr_log(reader, "[viaccess-reader] buf: %s", buf);
|
|
|
|
insac[2] = 0xa5;
|
|
write_cmd(insac, NULL); // request sa
|
|
|
|
insb8[4] = 0x06;
|
|
write_cmd(insb8, NULL); // read sa
|
|
memcpy(&reader->sa[i][0], cta_res + 2, 4);
|
|
|
|
insa4[2] = 0x02;
|
|
write_cmd(insa4, NULL); // select next issuer
|
|
|
|
i++;
|
|
}
|
|
|
|
reader->nprov = i;
|
|
rdr_log(reader, "providers: %d (%s)", reader->nprov, buf + 1);
|
|
|
|
get_maturity(reader);
|
|
|
|
if(cfg.ulparent)
|
|
{
|
|
unlock_parental(reader);
|
|
}
|
|
|
|
rdr_log(reader, "ready for requests");
|
|
|
|
return OK;
|
|
}
|
|
|
|
bool dcw_crc(uint8_t *dw)
|
|
{
|
|
int8_t i;
|
|
for(i = 0; i < 16; i += 4)
|
|
{
|
|
if(dw[i + 3] != ((dw[i] + dw[i + 1] + dw[i + 2]) & 0xFF))
|
|
{
|
|
return 0;
|
|
}
|
|
}
|
|
|
|
return 1;
|
|
}
|
|
|
|
static int32_t viaccess_do_ecm(struct s_reader *reader, const ECM_REQUEST *er, struct s_ecm_answer *ea)
|
|
{
|
|
def_resp;
|
|
static const uint8_t insa4[] = { 0xca, 0xa4, 0x04, 0x00, 0x03 }; // set provider id
|
|
uint8_t ins88[] = { 0xca, 0x88, 0x00, 0x00, 0x00 }; // set ecm
|
|
uint8_t insf8[] = { 0xca, 0xf8, 0x00, 0x00, 0x00 }; // set geographic info
|
|
static const uint8_t insc0[] = { 0xca, 0xc0, 0x00, 0x00, 0x12 }; // read dcw
|
|
|
|
struct viaccess_data *csystem_data = reader->csystem_data;
|
|
|
|
// //XXX what is the 4th uint8_t for ??
|
|
int32_t ecm88Len = MIN(MAX_ECM_SIZE - 4, SCT_LEN(er->ecm) - 4);
|
|
if(ecm88Len < 1)
|
|
{
|
|
rdr_log(reader, "ECM: Size of ECM couldn't be correctly calculated.");
|
|
return ERROR;
|
|
}
|
|
|
|
uint8_t ecmData[ecm88Len];
|
|
memset(ecmData, 0, ecm88Len);
|
|
memcpy(ecmData, er->ecm + 4, ecm88Len);
|
|
uint8_t *ecm88Data = &ecmData[0];
|
|
uint32_t provid = 0;
|
|
int32_t rc = 0;
|
|
int32_t hasD2 = 0;
|
|
uint8_t hasE0 = 0;
|
|
int32_t has98 = 0;
|
|
int32_t has9635 = 0;
|
|
int32_t has9632 = 0;
|
|
int32_t curEcm88len = 0;
|
|
int32_t nanoLen = 0;
|
|
uint8_t *nextEcm;
|
|
uint8_t DE04[MAX_ECM_SIZE];
|
|
uint8_t nano9635ecm88Data[MAX_ECM_SIZE];
|
|
uint8_t nano9632ecm88Data[MAX_ECM_SIZE];
|
|
int32_t D2KeyID = 0;
|
|
int32_t curnumber_ecm = 0;
|
|
uint8_t SubECM = 0;
|
|
char key98Idx = 0;
|
|
// nanoD2 d2 02 0d 02 -> D2 nano, len 2
|
|
// 0b, 0f, 13 -> pre AES decrypt CW
|
|
// 0d, 11, 15 -> post AES decrypt CW
|
|
int32_t nanoD2 = 0; // knowns D2 nanos: 0x0b ,0x0d ,0x0f ,0x11, 0x13, 0x15
|
|
memset(DE04, 0, sizeof(DE04)); //fix dorcel de04 bug
|
|
|
|
nextEcm = ecm88Data;
|
|
while(ecm88Len > 0 && !rc)
|
|
{
|
|
if(ecm88Data[0] == 0x00 && ecm88Data[1] == 0x00)
|
|
{
|
|
// nano 0x00 and len 0x00 aren't valid... something is obviously wrong with this ecm.
|
|
rdr_log(reader, "ECM: Invalid ECM structure. Rejecting");
|
|
return ERROR;
|
|
}
|
|
|
|
// 80 33 nano 80 (ecm) + len (33)
|
|
if(ecm88Data[0] == 0x80) // nano 80, give ecm len
|
|
{
|
|
curEcm88len = ecm88Data[1];
|
|
nextEcm = ecm88Data + curEcm88len + 2;
|
|
ecm88Data += 2;
|
|
ecm88Len -= 2;
|
|
}
|
|
|
|
if(!curEcm88len) // there was no nano 80 -> simple ecm
|
|
{
|
|
curEcm88len = ecm88Len;
|
|
}
|
|
|
|
// d2 02 0d 02 -> D2 nano, len 2, select the AES key to be used
|
|
if(ecm88Data[0] == 0xd2)
|
|
{
|
|
// test if it needs AES decrypt
|
|
if(ecm88Data[2] == 0x0b)
|
|
{
|
|
nanoD2 = 0x0b;
|
|
rdr_log_dbg(reader, D_READER, "ECM: nano D2 0x0b");
|
|
}
|
|
|
|
if(ecm88Data[2] == 0x0d)
|
|
{
|
|
nanoD2 = 0x0d;
|
|
rdr_log_dbg(reader, D_READER, "ECM: nano D2 0x0d");
|
|
}
|
|
|
|
if(ecm88Data[2] == 0x0f)
|
|
{
|
|
nanoD2 = 0x0f;
|
|
rdr_log_dbg(reader, D_READER, "ECM: nano D2 0x0f");
|
|
}
|
|
|
|
if(ecm88Data[2] == 0x11)
|
|
{
|
|
nanoD2 = 0x11;
|
|
rdr_log_dbg(reader, D_READER, "ECM: nano D2 0x11");
|
|
}
|
|
|
|
if(ecm88Data[2] == 0x13)
|
|
{
|
|
nanoD2 = 0x13;
|
|
rdr_log_dbg(reader, D_READER, "ECM: nano D2 0x13");
|
|
}
|
|
|
|
if(ecm88Data[2] == 0x15)
|
|
{
|
|
nanoD2 = 0x15;
|
|
rdr_log_dbg(reader, D_READER, "ECM: nano D2 0x15");
|
|
}
|
|
|
|
// use the d2 arguments to get the key # to be used
|
|
int32_t len = ecm88Data[1] + 2;
|
|
D2KeyID = ecm88Data[3];
|
|
ecm88Data += len;
|
|
ecm88Len -= len;
|
|
curEcm88len -= len;
|
|
hasD2 = 1;
|
|
}
|
|
else
|
|
{
|
|
hasD2 = 0;
|
|
}
|
|
|
|
// 40 07 03 0b 00 -> nano 40, len =7 ident 030B00 (tntsat), key #0 <== we're pointing here
|
|
// 09 -> use key #9
|
|
// 05 67 00
|
|
if((ecm88Data[0] == 0x90 || ecm88Data[0] == 0x40) && (ecm88Data[1] == 0x03 || ecm88Data[1] == 0x07))
|
|
{
|
|
uint8_t ident[3], keynr;
|
|
uint8_t *ecmf8Data = 0;
|
|
int32_t ecmf8Len = 0;
|
|
nanoLen = ecm88Data[1] + 2;
|
|
keynr = ecm88Data[4] & 0x0F;
|
|
// 40 07 03 0b 00 -> nano 40, len =7 ident 030B00 (tntsat), key #0 <== we're pointing here
|
|
// 09 -> use key #9
|
|
|
|
if(nanoLen > 5)
|
|
{
|
|
curnumber_ecm = (ecm88Data[6] << 8) | (ecm88Data[7]);
|
|
rdr_log_dbg(reader, D_READER, "checking if the ecm number (%x) match the card one (%x)", curnumber_ecm, csystem_data->last_geo.number_ecm);
|
|
|
|
// if we have an ecm number we check it.
|
|
// we can't assume that if the nano len is 5 or more we have an ecm number
|
|
// as some card don't support this
|
|
if(csystem_data->last_geo.number_ecm > 0)
|
|
{
|
|
if(csystem_data->last_geo.number_ecm == curnumber_ecm && !(ecm88Data[nanoLen - 1] == 0x01))
|
|
{
|
|
keynr = ecm88Data[5];
|
|
rdr_log_dbg(reader, D_READER, "keyToUse = %02x, ECM ending with %02x", ecm88Data[5], ecm88Data[nanoLen - 1]);
|
|
}
|
|
else
|
|
{
|
|
if(ecm88Data[nanoLen - 1] == 0x01)
|
|
{
|
|
rdr_log_dbg(reader, D_READER, "Skip ECM ending with = %02x for ecm number (%x) for provider %02x%02x%02x", ecm88Data[nanoLen - 1], curnumber_ecm, ecm88Data[2], ecm88Data[3], ecm88Data[4]);
|
|
}
|
|
|
|
rdr_log_dbg(reader, D_READER, "Skip ECM ending with = %02x for ecm number (%x)", ecm88Data[nanoLen - 1], curnumber_ecm);
|
|
ecm88Data = nextEcm;
|
|
ecm88Len -= curEcm88len;
|
|
|
|
continue; // loop to next ecm
|
|
}
|
|
}
|
|
else // long ecm but we don't have an ecm number so we have to try them all.
|
|
{
|
|
keynr = ecm88Data[5];
|
|
rdr_log_dbg(reader, D_READER, "keyToUse = %02x", ecm88Data[5]);
|
|
}
|
|
}
|
|
|
|
memcpy(ident, &ecm88Data[2], sizeof(ident));
|
|
provid = b2i(3, ident);
|
|
ident[2] &= 0xF0;
|
|
|
|
if(hasD2 && reader->aes_list)
|
|
{
|
|
// check that we have the AES key to decode the CW
|
|
// if not there is no need to send the ecm to the card
|
|
if(!aes_present(reader->aes_list, 0x500, (uint32_t)(provid & 0xFFFFF0) , D2KeyID))
|
|
{
|
|
return ERROR;
|
|
}
|
|
}
|
|
|
|
if(!chk_prov(reader, ident, keynr))
|
|
{
|
|
rdr_log_dbg(reader, D_READER, "ECM: provider or key not found on card");
|
|
snprintf(ea->msglog, MSGLOGSIZE, "provider(%02x%02x%02x) or key(%d) not found on card", ident[0], ident[1], ident[2], keynr);
|
|
return ERROR;
|
|
}
|
|
|
|
SubECM = ecm88Data[nanoLen - 1] ; // 01 permut 4 , FF no permut
|
|
ecm88Data += nanoLen;
|
|
ecm88Len -= nanoLen;
|
|
curEcm88len -= nanoLen;
|
|
|
|
if(ecm88Data[0] == 0x96 && ecm88Data[1] == 0x35)
|
|
{
|
|
rdr_log_dbg(reader, D_READER, "[viaccess-reader] nano 96/35 ECM detected!");
|
|
ecm88Data += 55;
|
|
has9635 = 1;
|
|
}
|
|
|
|
if(ecm88Data[0] == 0x96 && ecm88Data[1] == 0x32)
|
|
{
|
|
rdr_log_dbg(reader, D_READER, "[viaccess-reader] nano 96/32 ECM detected!");
|
|
ecm88Data += 52;
|
|
has9632 = 1;
|
|
}
|
|
|
|
if(ecm88Data[0] == 0xDE && ecm88Data[1] == 0x04)
|
|
{
|
|
rdr_log_dbg(reader, D_READER, "[viaccess-reader] nano DE/04 ECM detected!");
|
|
memcpy(DE04, &ecm88Data[0], 6);
|
|
ecm88Data += 6;
|
|
}
|
|
|
|
if((ecm88Data[0] == 0xD9) && (ecm88Data[1] == 0x0A))
|
|
{
|
|
rdr_log_dbg(reader, D_READER,"[viaccess-reader] nano D9/0A ECM detected!");
|
|
|
|
if((ecm88Data[12] == 0xE0) && (ecm88Data[13] == 0x02) && (ecm88Data[15] == 0x02)) // accept parental data 0F for ecm88Data[2]
|
|
{
|
|
rdr_log_dbg(reader, D_READER,"[viaccess-reader] nano E0/02 ECM detected!");
|
|
hasE0 = 1;
|
|
}
|
|
|
|
if((ecm88Data[16] == 0x98) && (ecm88Data[17] == 0x08))
|
|
{
|
|
rdr_log_dbg(reader, D_READER,"[viaccess-reader] nano 98/08 ECM detected!");
|
|
has98 = 1;
|
|
key98Idx = ecm88Data[25];
|
|
rdr_log_dbg(reader, D_READER,"[viaccess-reader] nano 98 Index : %02X", key98Idx);
|
|
}
|
|
|
|
if((ecm88Data[19] == 0x98) && (ecm88Data[20] == 0x08))
|
|
{
|
|
rdr_log_dbg(reader, D_READER,"[viaccess-reader] nano 98/08 ECM detected!");
|
|
has98 = 1;
|
|
key98Idx = ecm88Data[28];
|
|
rdr_log_dbg(reader, D_READER,"[viaccess-reader] nano 98 Index : %02X", key98Idx);
|
|
}
|
|
}
|
|
|
|
if((ecm88Data[0] == 0xE0) && (ecm88Data[1] == 0x02) && (ecm88Data[3] == 0x02)) // accept parental data 0F for ecm88Data[2]
|
|
{
|
|
rdr_log_dbg(reader, D_READER,"[viaccess-reader] nano E0/02 ECM detected!");
|
|
hasE0 = 1;
|
|
|
|
if((ecm88Data[4] == 0x98) && (ecm88Data[5] == 0x08))
|
|
{
|
|
rdr_log_dbg(reader, D_READER,"[viaccess-reader] nano 98/08 ECM detected!");
|
|
has98 = 1;
|
|
key98Idx = ecm88Data[13];
|
|
rdr_log_dbg(reader, D_READER,"[viaccess-reader] nano 98 Index : %02X", key98Idx);
|
|
}
|
|
}
|
|
|
|
if(csystem_data->last_geo.provid != provid)
|
|
{
|
|
csystem_data->last_geo.provid = provid;
|
|
csystem_data->last_geo.geo_len = 0;
|
|
csystem_data->last_geo.geo[0] = 0;
|
|
write_cmd(insa4, ident); // set provider
|
|
}
|
|
|
|
// Nano D2 0x0b, 0x0f, 0x13 -> pre AES decrypt CW
|
|
if(hasD2 && (nanoD2 == 0x0b|| nanoD2 == 0x0f|| nanoD2 == 0x13))
|
|
{
|
|
uint8_t *ecm88DataCW = ecm88Data;
|
|
int32_t cwStart = 0;
|
|
//int32_t cwStartRes = 0;
|
|
int32_t must_exit = 0;
|
|
|
|
// find CW start
|
|
while(cwStart < curEcm88len - 1 && !must_exit)
|
|
{
|
|
if(ecm88Data[cwStart] == 0xEA && ecm88Data[cwStart + 1] == 0x10)
|
|
{
|
|
ecm88DataCW = ecm88DataCW + cwStart + 2;
|
|
must_exit = 1;
|
|
}
|
|
|
|
cwStart = cwStart + ecm88Data[cwStart + 1] + 2; // parse via nanos
|
|
//cwStart++; // error if EA 10 in nanos datas
|
|
}
|
|
|
|
if(nanoD2 == 0x0f)
|
|
{
|
|
hdSurEncPhase1_D2_0F_11(ecm88DataCW);
|
|
hdSurEncPhase2_D2_0F_11(ecm88DataCW);
|
|
}
|
|
|
|
if(nanoD2 == 0x13)
|
|
{
|
|
hdSurEncPhase1_D2_13_15(ecm88DataCW);
|
|
}
|
|
|
|
// use AES from list to decrypt CW
|
|
rdr_log_dbg(reader, D_READER, "Decoding CW : using AES key id %d for provider %06x", D2KeyID, (provid & 0xFFFFF0));
|
|
|
|
if(aes_decrypt_from_list(reader->aes_list, 0x500, (uint32_t)(provid & 0xFFFFF0), D2KeyID, &ecm88DataCW[0], 16) == 0)
|
|
{
|
|
snprintf(ea->msglog, MSGLOGSIZE, "Missing AES key(%d)[aka E%X]",D2KeyID, D2KeyID);
|
|
}
|
|
|
|
if(nanoD2 == 0x0f)
|
|
{
|
|
hdSurEncPhase1_D2_0F_11(ecm88DataCW);
|
|
}
|
|
|
|
if(nanoD2 == 0x13)
|
|
{
|
|
hdSurEncPhase2_D2_13_15(ecm88DataCW);
|
|
}
|
|
}
|
|
|
|
while(ecm88Len > 1 && ecm88Data[0] < 0xA0)
|
|
{
|
|
nanoLen = ecm88Data[1] + 2;
|
|
|
|
if(!ecmf8Data)
|
|
{
|
|
ecmf8Data = (uint8_t *)ecm88Data;
|
|
}
|
|
|
|
ecmf8Len += nanoLen;
|
|
ecm88Len -= nanoLen;
|
|
curEcm88len -= nanoLen;
|
|
ecm88Data += nanoLen;
|
|
}
|
|
|
|
if(ecmf8Len)
|
|
{
|
|
if(csystem_data->last_geo.geo_len != ecmf8Len || memcmp(csystem_data->last_geo.geo, ecmf8Data, csystem_data->last_geo.geo_len))
|
|
{
|
|
memcpy(csystem_data->last_geo.geo, ecmf8Data, ecmf8Len);
|
|
csystem_data->last_geo.geo_len = ecmf8Len;
|
|
insf8[3] = keynr;
|
|
insf8[4] = ecmf8Len;
|
|
write_cmd(insf8, ecmf8Data);
|
|
}
|
|
}
|
|
|
|
ins88[2] = ecmf8Len ? 1 : 0;
|
|
ins88[3] = keynr;
|
|
ins88[4] = (curEcm88len > 0xFF) ? 0x00 : curEcm88len;
|
|
|
|
//
|
|
// we should check the nano to make sure the ecm is valid
|
|
// we should look for at least 1 E3 nano, 1 EA nano and the F0 signature nano
|
|
//
|
|
// DE04
|
|
if(DE04[0] == 0xDE)
|
|
{
|
|
uint32_t l = curEcm88len - 6;
|
|
if(l > MAX_ECM_SIZE || curEcm88len <= 6) //don't known if this is ok...
|
|
{
|
|
rdr_log(reader, "ecm invalid/too long! len=%d", curEcm88len);
|
|
return ERROR;
|
|
}
|
|
|
|
memcpy(DE04 + 6, (uint8_t *)ecm88Data, l);
|
|
write_cmd(ins88, DE04); // request dcw
|
|
}
|
|
else if(has9635)
|
|
{
|
|
ins88[4] -= 0x37;
|
|
memcpy(nano9635ecm88Data, (uint8_t *)ecm88Data, ins88[4]);
|
|
write_cmd(ins88, nano9635ecm88Data);
|
|
}
|
|
else if(has9632)
|
|
{
|
|
ins88[4] -= 0x34;
|
|
memcpy(nano9632ecm88Data, (uint8_t *)ecm88Data, ins88[4]);
|
|
write_cmd(ins88, nano9632ecm88Data);
|
|
}
|
|
else
|
|
{
|
|
write_cmd(ins88, (uint8_t *)ecm88Data); // request dcw
|
|
}
|
|
|
|
write_cmd(insc0, NULL); // read dcw
|
|
|
|
switch(cta_res[0])
|
|
{
|
|
case 0xe8: // even
|
|
if(cta_res[1] == 8)
|
|
{
|
|
memcpy(ea->cw, cta_res + 2, 8);
|
|
rc = 1;
|
|
} break;
|
|
|
|
case 0xe9: // odd
|
|
if(cta_res[1] == 8)
|
|
{
|
|
memcpy(ea->cw + 8, cta_res + 2, 8);
|
|
rc = 1;
|
|
} break;
|
|
|
|
case 0xea: // complete
|
|
if(cta_res[1] == 16)
|
|
{
|
|
memcpy(ea->cw, cta_res + 2, 16);
|
|
rc = 1;
|
|
} break;
|
|
|
|
default :
|
|
ecm88Data = nextEcm;
|
|
ecm88Len -= curEcm88len;
|
|
rdr_log_dbg(reader, D_READER, "Error: card respondend %02X %02X, trying next ECM", cta_res[0], cta_res[1]);
|
|
snprintf(ea->msglog, MSGLOGSIZE, "key to use is not the current one, trying next ECM");
|
|
}
|
|
}
|
|
else
|
|
{
|
|
//ecm88Data = nextEcm;
|
|
//ecm88Len -= curEcm88len;
|
|
rdr_log_dbg(reader, D_READER, "ECM: Unknown ECM type");
|
|
snprintf(ea->msglog, MSGLOGSIZE, "Unknown ECM type");
|
|
|
|
return ERROR; /*Lets interupt the loop and exit, because we don't know this ECM type.*/
|
|
}
|
|
}
|
|
|
|
// Nano D2 0d, 11, 15 -> post AES decrypt CW
|
|
if(hasD2 && !dcw_crc(ea->cw) && (nanoD2 == 0x0d || nanoD2 == 0x11 || nanoD2 == 0x15))
|
|
{
|
|
if(nanoD2 == 0x11)
|
|
{
|
|
hdSurEncPhase1_D2_0F_11(ea->cw);
|
|
hdSurEncPhase2_D2_0F_11(ea->cw);
|
|
}
|
|
|
|
if(nanoD2 == 0x15)
|
|
{
|
|
hdSurEncPhase1_D2_13_15(ea->cw);
|
|
}
|
|
|
|
rdr_log_dbg(reader, D_READER, "Decoding CW : using AES key id %d for provider %06x", D2KeyID, (provid & 0xFFFFF0));
|
|
|
|
rc = aes_decrypt_from_list(reader->aes_list, 0x500, (uint32_t)(provid & 0xFFFFF0), D2KeyID, ea->cw, 16);
|
|
if(rc == 0)
|
|
{
|
|
snprintf(ea->msglog, MSGLOGSIZE, "Missing AES key(%d)[aka E%X]",D2KeyID, D2KeyID);
|
|
}
|
|
|
|
if(nanoD2 == 0x11)
|
|
{
|
|
hdSurEncPhase1_D2_0F_11(ea->cw);
|
|
}
|
|
|
|
if(nanoD2 == 0x15)
|
|
{
|
|
hdSurEncPhase2_D2_13_15(ea->cw);
|
|
}
|
|
}
|
|
|
|
if (has98)
|
|
{
|
|
if (N98Init == 0)
|
|
{
|
|
MakeSubKeys(KeyS, key98Idx);
|
|
N98Init = 1;
|
|
}
|
|
|
|
uint8_t inp[16];
|
|
memcpy(inp, ea->cw, 16);
|
|
N98_decrypt(inp);
|
|
memcpy(ea->cw, inp, 16);
|
|
}
|
|
|
|
if (hasE0)
|
|
{
|
|
if (reader->initCA28)
|
|
{
|
|
uint8_t returnedcw[16];
|
|
memcpy(returnedcw, ea->cw, 16);
|
|
// Processing 3DES
|
|
// Processing even cw
|
|
des(returnedcw, reader->key_schedule1, 0); // decrypt
|
|
des(returnedcw, reader->key_schedule2, 1); // crypt
|
|
des(returnedcw, reader->key_schedule1, 0); // decrypt
|
|
// Processing odd cw
|
|
des(returnedcw + 8, reader->key_schedule1, 0); // decrypt
|
|
des(returnedcw + 8, reader->key_schedule2, 1); // crypt
|
|
des(returnedcw + 8, reader->key_schedule1, 0); // decrypt
|
|
// returning value
|
|
memcpy(ea->cw, returnedcw, 16);
|
|
}
|
|
else
|
|
{
|
|
snprintf(ea->msglog, MSGLOGSIZE, "Nano E0 detected, no valid boxkey + deskey defined: no decoding");
|
|
}
|
|
}
|
|
|
|
if (SubECM == 1)
|
|
{
|
|
uint8_t rw[16];
|
|
memcpy(rw, ea->cw, 16);
|
|
memcpy(ea->cw, rw + 4, 4);
|
|
memcpy(ea->cw + 4, rw, 4);
|
|
memcpy(ea->cw + 8, rw + 12, 4);
|
|
memcpy(ea->cw + 12, rw + 8, 4);
|
|
}
|
|
|
|
return (rc ? OK : ERROR);
|
|
}
|
|
|
|
static int32_t viaccess_get_emm_type(EMM_PACKET *ep, struct s_reader *rdr)
|
|
{
|
|
uint32_t provid = 0;
|
|
rdr_log_dbg(rdr, D_EMM, "Entered viaccess_get_emm_type ep->emm[0]=%02x", ep->emm[0]);
|
|
|
|
if(ep->emm[3] == 0x90 && ep->emm[4] == 0x03)
|
|
{
|
|
provid = b2i(3, ep->emm + 5);
|
|
provid &= 0xFFFFF0;
|
|
i2b_buf(4, provid, ep->provid);
|
|
}
|
|
|
|
switch(ep->emm[0])
|
|
{
|
|
case 0x88:
|
|
ep->type = UNIQUE;
|
|
memset(ep->hexserial, 0, 8);
|
|
memcpy(ep->hexserial, ep->emm + 4, 4);
|
|
rdr_log_dbg(rdr, D_EMM, "UNIQUE");
|
|
if(!is_network_reader(rdr))
|
|
{
|
|
return (!memcmp(rdr->hexserial + 1, ep->hexserial, 4)); // local reader
|
|
}
|
|
else
|
|
{
|
|
return 1; // let server decide!
|
|
}
|
|
|
|
case 0x8A:
|
|
case 0x8B:
|
|
ep->type = GLOBAL;
|
|
rdr_log_dbg(rdr, D_EMM, "GLOBAL");
|
|
return 1;
|
|
|
|
case 0x8C:
|
|
case 0x8D:
|
|
ep->type = SHARED;
|
|
rdr_log_dbg(rdr, D_EMM, "SHARED (part)");
|
|
// We need those packets to pass otherwise we would never
|
|
// be able to complete EMM reassembly
|
|
return 1;
|
|
|
|
case 0x8E:
|
|
ep->type = SHARED;
|
|
rdr_log_dbg(rdr, D_EMM, "SHARED");
|
|
memset(ep->hexserial, 0, 8);
|
|
memcpy(ep->hexserial, ep->emm + 3, 3);
|
|
// local reader
|
|
int8_t i;
|
|
for(i = 0; i < rdr->nprov; i++)
|
|
{
|
|
if(!memcmp(&rdr->prid[i][2], ep->hexserial+1, 2))
|
|
{
|
|
return 1;
|
|
}
|
|
return (!memcmp(&rdr->sa[0][0], ep->hexserial, 3));
|
|
} /* fallthrough */
|
|
|
|
default:
|
|
ep->type = UNKNOWN;
|
|
rdr_log_dbg(rdr, D_EMM, "UNKNOWN");
|
|
return 1;
|
|
}
|
|
}
|
|
|
|
static int32_t viaccess_get_emm_filter(struct s_reader *rdr, struct s_csystem_emm_filter **emm_filters, unsigned int *filter_count)
|
|
{
|
|
if(*emm_filters == NULL)
|
|
{
|
|
bool network = is_network_reader(rdr);
|
|
int8_t device_emm = ((rdr->deviceemm > 0) ? 1 : 0); // set to 1 if device specific emms should be catched too
|
|
const unsigned int max_filter_count = 4 + ((device_emm != 0 && rdr->nprov > 0) ? 1:0) + (3 * ((rdr->nprov > 0) ? (rdr->nprov - 1) : 0));
|
|
|
|
if(!cs_malloc(emm_filters, max_filter_count * sizeof(struct s_csystem_emm_filter)))
|
|
{
|
|
return ERROR;
|
|
}
|
|
|
|
struct s_csystem_emm_filter *filters = *emm_filters;
|
|
*filter_count = 0;
|
|
int32_t idx = 0;
|
|
int32_t prov;
|
|
|
|
if(rdr->nprov > 0 && device_emm == 1)
|
|
{
|
|
filters[idx].type = EMM_GLOBAL; // 8A or 8B no reassembly needed!
|
|
filters[idx].enabled = 1;
|
|
filters[idx].filter[0] = 0x8A;
|
|
filters[idx].mask[0] = 0xFE;
|
|
filters[idx].filter[3] = 0x80; // device specific emms
|
|
filters[idx].mask[3] = 0x80;
|
|
idx++;
|
|
}
|
|
|
|
// shared are most important put them on top, define first since viaccess produces a lot of filters!
|
|
for(prov = 0; (prov < rdr->nprov); prov++)
|
|
{
|
|
if((rdr->prid[prov][2] &0xF0) == 0xF0) // skip this not useful provider
|
|
{
|
|
continue;
|
|
}
|
|
|
|
filters[idx].type = EMM_SHARED; // 8C or 8D always first part of shared, second part delivered by 8E!
|
|
filters[idx].enabled = 1;
|
|
filters[idx].filter[0] = 0x8C;
|
|
filters[idx].mask[0] = 0xFE;
|
|
|
|
if(rdr->nprov > 0)
|
|
{
|
|
memcpy(&filters[idx].filter[4], &rdr->prid[prov][2], 2);
|
|
filters[idx].mask[4] = 0xFF;
|
|
filters[idx].mask[5] = 0xF0; // ignore last digit since this is key on card indicator!
|
|
}
|
|
|
|
idx++;
|
|
filters[idx].type = EMM_SHARED; // 8E second part reassembly with 8c/8d needed!
|
|
filters[idx].enabled = 1;
|
|
filters[idx].filter[0] = 0x8E;
|
|
filters[idx].mask[0] = 0xFF;
|
|
|
|
if(rdr->nprov > 0)
|
|
{
|
|
memcpy(&filters[idx].filter[1], &rdr->sa[prov][0], 3);
|
|
memset(&filters[idx].mask[1], 0xFF, 3);
|
|
}
|
|
|
|
idx++;
|
|
}
|
|
|
|
// globals are less important, define last since viaccess produces a lot of filters!
|
|
for(prov = 0; (prov < rdr->nprov); prov++)
|
|
{
|
|
if((rdr->prid[prov][2] &0xF0) == 0xF0) // skip this not useful provider
|
|
{
|
|
continue;
|
|
}
|
|
|
|
filters[idx].type = EMM_GLOBAL; // 8A or 8B no reassembly needed!
|
|
filters[idx].enabled = 1;
|
|
filters[idx].filter[0] = 0x8A;
|
|
filters[idx].mask[0] = 0xFE;
|
|
|
|
if(rdr->nprov > 0)
|
|
{
|
|
memcpy(&filters[idx].filter[4], &rdr->prid[prov][2], 2);
|
|
filters[idx].mask[4] = 0xFF;
|
|
filters[idx].mask[5] = 0xF0; // ignore last digit since this is key on card indicator!
|
|
}
|
|
else if (device_emm == 0)
|
|
{
|
|
filters[idx].filter[3] = 0x00; // additional filter to cancel device specific emms
|
|
filters[idx].mask[3] = 0x80;
|
|
}
|
|
|
|
idx++;
|
|
}
|
|
|
|
filters[idx].type = EMM_UNIQUE;
|
|
filters[idx].enabled = 1;
|
|
filters[idx].filter[0] = 0x88;
|
|
filters[idx].mask[0] = 0xFF;
|
|
|
|
if(!network) // network has only 3 digits out of 4
|
|
{
|
|
memcpy(&filters[idx].filter[1], rdr->hexserial + 1, 4);
|
|
memset(&filters[idx].mask[1], 0xFF, 4);
|
|
}
|
|
else
|
|
{
|
|
memcpy(&filters[idx].filter[1], rdr->hexserial + 1, 3);
|
|
memset(&filters[idx].mask[1], 0xFF, 3);
|
|
}
|
|
|
|
idx++;
|
|
*filter_count = idx;
|
|
}
|
|
return OK;
|
|
}
|
|
|
|
static int32_t viaccess_do_emm(struct s_reader *reader, EMM_PACKET *ep)
|
|
{
|
|
def_resp;
|
|
static const uint8_t insa4[] = { 0xca, 0xa4, 0x04, 0x00, 0x03 }; // set provider id
|
|
uint8_t insf0[] = { 0xca, 0xf0, 0x00, 0x01, 0x22 }; // set adf
|
|
uint8_t insf4[] = { 0xca, 0xf4, 0x00, 0x01, 0x00 }; // set adf, encrypted
|
|
uint8_t ins18[] = { 0xca, 0x18, 0x01, 0x01, 0x00 }; // set subscription
|
|
uint8_t ins1c[] = { 0xca, 0x1c, 0x01, 0x01, 0x00 }; // set subscription, encrypted
|
|
struct viaccess_data *csystem_data = reader->csystem_data;
|
|
int32_t emmdatastart = 7;
|
|
|
|
if (ep->emm[1] == 0x01) // emm from cccam
|
|
{
|
|
emmdatastart = 12;
|
|
ep->emm[1] = 0x70; // (& 0x0f) of this byte is length, so 0x01 would increase the length by 256
|
|
ep->emm[2] -= 1;
|
|
|
|
if (ep->type == SHARED || ep->type == GLOBAL) // build missing 0x90 nano from provider at serial position
|
|
{
|
|
memcpy(ep->emm + 7, ep->emm + 3, 3);
|
|
ep->emm[5] = 0x90;
|
|
ep->emm[6] = 0x03;
|
|
ep->emm[9] |= 0x01;
|
|
ep->emm[10] = 0x9E;
|
|
ep->emm[11] = 0x20;
|
|
emmdatastart = 5;
|
|
}
|
|
}
|
|
|
|
if(ep->type == UNIQUE)
|
|
{
|
|
emmdatastart++;
|
|
}
|
|
|
|
if(ep->type == GLOBAL && emmdatastart == 7)
|
|
{
|
|
emmdatastart -= 4;
|
|
}
|
|
|
|
int32_t emmLen = SCT_LEN(ep->emm) - emmdatastart;
|
|
int32_t rc = 0;
|
|
rdr_log_dump(reader, ep->emm, emmLen + emmdatastart, "RECEIVED EMM VIACCESS");
|
|
int32_t emmUpToEnd;
|
|
uint8_t *emmParsed = ep->emm + emmdatastart;
|
|
int32_t provider_ok = 0;
|
|
uint32_t emm_provid = 0;
|
|
uint8_t keynr = 0;
|
|
int32_t ins18Len = 0;
|
|
uint8_t ins18Data[512];
|
|
uint8_t insData[512];
|
|
uint8_t *nano81Data = 0;
|
|
uint8_t *nano91Data = 0;
|
|
uint8_t *nano92Data = 0;
|
|
uint8_t *nano9EData = 0;
|
|
uint8_t *nanoF0Data = 0;
|
|
uint8_t *nanoA9Data = 0;
|
|
|
|
for(emmUpToEnd = emmLen; (emmParsed[1] != 0) && (emmUpToEnd > 0); emmUpToEnd -= (2 + emmParsed[1]), emmParsed += (2 + emmParsed[1]))
|
|
{
|
|
rdr_log_dump(reader, emmParsed, emmParsed[1] + 2, "NANO");
|
|
|
|
if(emmParsed[0] == 0x90 && emmParsed[1] == 0x03)
|
|
{
|
|
/* identification of the service operator */
|
|
uint8_t soid[3], ident[3], i;
|
|
for(i = 0; i < 3; i++)
|
|
{
|
|
soid[i] = ident[i] = emmParsed[2 + i];
|
|
}
|
|
|
|
ident[2] &= 0xF0;
|
|
emm_provid = b2i(3, ident);
|
|
keynr = soid[2] & 0x0F;
|
|
|
|
if(chk_prov(reader, ident, keynr))
|
|
{
|
|
provider_ok = 1;
|
|
}
|
|
else
|
|
{
|
|
rdr_log(reader, "EMM: ignored since provider or key not present on card (%x, %x)", emm_provid, keynr);
|
|
return SKIPPED;
|
|
}
|
|
|
|
// check if the provider changes. If yes, set the new one. If not, don't... card will return an error if we do.
|
|
if(csystem_data->last_geo.provid != emm_provid)
|
|
{
|
|
write_cmd(insa4, ident);
|
|
if(cta_res[cta_lr - 2] != 0x90 || cta_res[cta_lr - 1] != 0x00)
|
|
{
|
|
rdr_log_dump(reader, insa4, 5, "set provider cmd:");
|
|
rdr_log_dump(reader, soid, 3, "set provider data:");
|
|
rdr_log(reader, "update error: %02X %02X", cta_res[cta_lr - 2], cta_res[cta_lr - 1]);
|
|
return ERROR;
|
|
}
|
|
}
|
|
|
|
// as we are maybe changing the used provider, clear the cache, so the next ecm will re-select the correct one
|
|
csystem_data->last_geo.provid = 0;
|
|
csystem_data->last_geo.geo_len = 0;
|
|
csystem_data->last_geo.geo[0] = 0;
|
|
}
|
|
else if(emmParsed[0] == 0x9e && emmParsed[1] == 0x20)
|
|
{
|
|
/* adf */
|
|
if(!nano91Data)
|
|
{
|
|
/* adf is not crypted, so test it */
|
|
uint8_t custwp;
|
|
uint8_t *afd;
|
|
custwp = reader->sa[0][3];
|
|
afd = (uint8_t *)emmParsed + 2;
|
|
|
|
if(afd[31 - custwp / 8] & (1 << (custwp & 7)))
|
|
{
|
|
rdr_log_dbg(reader, D_READER, "emm for our card %08X", b2i(4, &reader->sa[0][0]));
|
|
}
|
|
else
|
|
{
|
|
rdr_log_dbg(reader, D_READER, "emm not suitable for our card %08X", b2i(4, &reader->sa[0][0]));
|
|
return SKIPPED;
|
|
}
|
|
}
|
|
|
|
// memorize
|
|
nano9EData = emmParsed;
|
|
}
|
|
else if(emmParsed[0] == 0x81)
|
|
{
|
|
nano81Data = emmParsed;
|
|
}
|
|
else if(emmParsed[0] == 0x91 && emmParsed[1] == 0x08)
|
|
{
|
|
nano91Data = emmParsed;
|
|
}
|
|
else if(emmParsed[0] == 0x92 && emmParsed[1] == 0x08)
|
|
{
|
|
nano92Data = emmParsed;
|
|
}
|
|
else if(emmParsed[0] == 0xF0 && emmParsed[1] == 0x08)
|
|
{
|
|
nanoF0Data = emmParsed;
|
|
}
|
|
else if(emmParsed[0] == 0xF0 && emmParsed[1] == 0x10 && (((emm_provid >> 8) == 0x0419) || ((emm_provid >> 8) == 0x0702)))
|
|
{
|
|
nanoF0Data = emmParsed;
|
|
}
|
|
else if(emmParsed[0] == 0xD8 && emmParsed[2] == 0x45)
|
|
{
|
|
uint8_t pos = 4 + emmParsed[3];
|
|
char *tmpbuf;
|
|
if(emmParsed[pos] == 0x46 && ((emmParsed[pos+1] - emmParsed[1]) == pos))
|
|
{
|
|
if(cs_malloc(&tmpbuf, emmParsed[pos + 1]))
|
|
{
|
|
cs_strncpy(tmpbuf, (char *)emmParsed + pos + 2, emmParsed[pos + 1]);
|
|
rdr_log(reader, "Viaccess EMM-text: %s", tmpbuf);
|
|
NULLFREE(tmpbuf);
|
|
}
|
|
}
|
|
}
|
|
else
|
|
{
|
|
/* other nanos */
|
|
show_subs(reader, emmParsed);
|
|
if(emmParsed[0] == 0xA9 && ep->type == SHARED) // check on shared (reassembled) emm if all classes are present and up to date on card: error 90 40
|
|
{
|
|
if(!emm_provid)
|
|
{
|
|
rdr_log(reader, "no provid in shared emm -> skipped!");
|
|
return SKIPPED;
|
|
}
|
|
int8_t match = add_find_class(reader, emm_provid, emmParsed + 2, emmParsed[1], 0);
|
|
|
|
if(match == -2)
|
|
{
|
|
rdr_log(reader, "shared emm provid %06X all classes have entitlementdate already same or newer -> skipped!", emm_provid);
|
|
return SKIPPED;
|
|
}
|
|
|
|
nanoA9Data = emmParsed;
|
|
}
|
|
|
|
memcpy(ins18Data + ins18Len, emmParsed, emmParsed[1] + 2);
|
|
ins18Len += emmParsed [1] + 2;
|
|
}
|
|
}
|
|
|
|
if(!provider_ok)
|
|
{
|
|
rdr_log_dbg(reader, D_READER, "provider not found in emm, continue anyway");
|
|
// force key to 1...
|
|
keynr = 1;
|
|
// return ERROR;
|
|
}
|
|
|
|
if(!nanoF0Data)
|
|
{
|
|
rdr_log_dump(reader, ep->emm, ep->emmlen, "can't find 0xf0 in emm...");
|
|
return ERROR; // error
|
|
}
|
|
|
|
if(nano9EData)
|
|
{
|
|
if(!nano91Data)
|
|
{
|
|
// set adf
|
|
insf0[3] = keynr; // key
|
|
insf0[4] = nano9EData[1] + 2;
|
|
write_cmd(insf0, nano9EData);
|
|
|
|
if(cta_res[cta_lr - 2] != 0x90 || cta_res[cta_lr - 1] != 0x00)
|
|
{
|
|
rdr_log_dump(reader, insf0, 5, "set adf cmd:");
|
|
rdr_log_dump(reader, nano9EData, insf0[4] , "set adf data:");
|
|
rdr_log(reader, "update error: %02X %02X", cta_res[cta_lr - 2], cta_res[cta_lr - 1]);
|
|
return ERROR;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
// set adf crypte
|
|
insf4[3] = keynr; // key
|
|
insf4[4] = nano91Data[1] + 2 + nano9EData[1] + 2;
|
|
memcpy(insData, nano91Data, nano91Data[1] + 2);
|
|
memcpy(insData + nano91Data[1] + 2, nano9EData, nano9EData[1] + 2);
|
|
write_cmd(insf4, insData);
|
|
|
|
if((cta_res[cta_lr - 2] != 0x90 && cta_res[cta_lr - 2] != 0x91) || cta_res[cta_lr - 1] != 0x00)
|
|
{
|
|
rdr_log_dump(reader, insf4, 5, "set adf encrypted cmd:");
|
|
rdr_log_dump(reader, insData, insf4[4], "set adf encrypted data:");
|
|
rdr_log(reader, "update error: %02X %02X", cta_res[cta_lr - 2], cta_res[cta_lr - 1]);
|
|
return ERROR;
|
|
}
|
|
}
|
|
}
|
|
|
|
if(!nano92Data)
|
|
{
|
|
// send subscription
|
|
ins18[2] = nano9EData ? 0x01 : 0x00; // found 9E nano ?
|
|
ins18[3] = keynr; // key
|
|
ins18[4] = ins18Len + nanoF0Data[1] + 2;
|
|
memcpy(insData, ins18Data, ins18Len);
|
|
memcpy(insData + ins18Len, nanoF0Data, nanoF0Data[1] + 2);
|
|
write_cmd(ins18, insData);
|
|
|
|
if((cta_res[cta_lr - 2] == 0x90 || cta_res[cta_lr - 2] == 0x91) && cta_res[cta_lr - 1] == 0x00)
|
|
{
|
|
if(nanoA9Data)
|
|
{
|
|
add_find_class(reader, emm_provid, nanoA9Data + 2, nanoA9Data[1], 1);
|
|
rdr_log(reader, "Your subscription data was updated.");
|
|
}
|
|
rc = 1; // written
|
|
}
|
|
else
|
|
{
|
|
rdr_log_dump(reader, ins18, 5, "set subscription cmd:");
|
|
rdr_log_dump(reader, insData, ins18[4], "set subscription data:");
|
|
|
|
if(!(cta_res[cta_lr -2] == 0x90 && cta_res[cta_lr - 1] == 0x40)) // dont throw softerror 9040 in log!
|
|
{
|
|
rdr_log(reader, "update error: %02X %02X", cta_res[cta_lr - 2], cta_res[cta_lr - 1]);
|
|
}
|
|
else
|
|
{
|
|
rc = 2; // skipped
|
|
}
|
|
}
|
|
}
|
|
else
|
|
{
|
|
// send subscription encrypted
|
|
if(!nano81Data)
|
|
{
|
|
rdr_log_dump(reader, ep->emm, ep->emmlen, "0x92 found, but can't find 0x81 in emm...");
|
|
return ERROR; // error
|
|
}
|
|
|
|
ins1c[2] = nano9EData ? 0x01 : 0x00; // found 9E nano ?
|
|
|
|
if(ep->type == UNIQUE)
|
|
{
|
|
ins1c[2] = 0x02;
|
|
}
|
|
|
|
ins1c[3] = keynr; // key
|
|
ins1c[4] = nano92Data[1] + 2 + nano81Data[1] + 2 + nanoF0Data[1] + 2;
|
|
memcpy(insData, nano92Data, nano92Data[1] + 2);
|
|
memcpy(insData + nano92Data[1] + 2, nano81Data, nano81Data[1] + 2);
|
|
memcpy(insData + nano92Data[1] + 2 + nano81Data[1] + 2, nanoF0Data, nanoF0Data[1] + 2);
|
|
write_cmd(ins1c, insData);
|
|
|
|
if((cta_res[cta_lr - 2] == 0x90 || cta_res[cta_lr - 2] == 0x91) && (cta_res[cta_lr - 1] == 0x00 || cta_res[cta_lr - 1] == 0x08))
|
|
{
|
|
rdr_log(reader, "update successfully written");
|
|
}
|
|
|
|
if(cta_res[cta_lr - 2] == 0x98 && cta_res[cta_lr - 1] == 0x00 )
|
|
{
|
|
static const uint8_t insFAC[] = { 0x87, 0x02, 0x00, 0x00, 0x03 }; // init FAC
|
|
static uint8_t ins8702_data[] = { 0x00, 0x00, 0x11};
|
|
static uint8_t ins8704[] = { 0x87, 0x04, 0x00, 0x00, 0x07 };
|
|
static uint8_t ins8706[] = { 0x87, 0x06, 0x00, 0x00, 0x04 };
|
|
write_cmd(insFAC, ins8702_data);
|
|
|
|
if((cta_res[cta_lr - 2] == 0x90) && (cta_res[cta_lr - 1] == 0x00))
|
|
{
|
|
write_cmd(ins8704, NULL);
|
|
|
|
if((cta_res[cta_lr - 2] == 0x90) && (cta_res[cta_lr - 1] == 0x00))
|
|
{
|
|
write_cmd(ins8706, NULL);
|
|
|
|
if((cta_res[cta_lr - 2] == 0x90) && (cta_res[cta_lr - 1] == 0x00))
|
|
{
|
|
csystem_data->last_geo.number_ecm = (cta_res[2] << 8) | (cta_res[3]);
|
|
rdr_log(reader, "using ecm #%x for long viaccess ecm", csystem_data->last_geo.number_ecm);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
rc = 1;
|
|
}
|
|
|
|
return rc;
|
|
}
|
|
static int32_t viaccess_card_info(struct s_reader *reader)
|
|
{
|
|
def_resp;
|
|
int32_t i, l;
|
|
time_t now;
|
|
|
|
struct tm timeinfo;
|
|
|
|
uint16_t tmpdate;
|
|
uint8_t insac[] = { 0xca, 0xac, 0x00, 0x00, 0x00 }; // select data
|
|
uint8_t insb8[] = { 0xca, 0xb8, 0x00, 0x00, 0x00 }; // read selected data
|
|
uint8_t insa4[] = { 0xca, 0xa4, 0x00, 0x00, 0x00 }; // select issuer
|
|
uint8_t insc0[] = { 0xca, 0xc0, 0x00, 0x00, 0x00 }; // read data item
|
|
static const uint8_t ins24[] = { 0xca, 0x24, 0x00, 0x00, 0x09 }; // set pin
|
|
uint8_t cls[] = { 0x00, 0x21, 0xff, 0x9f};
|
|
uint8_t prebook[] = {0xFC, 0x00, 0x00, 0xFE, 0xFF, 0xFF};
|
|
static const uint8_t pin[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x04};
|
|
|
|
struct viaccess_data *csystem_data = reader->csystem_data;
|
|
|
|
csystem_data->last_geo.provid = 0;
|
|
csystem_data->last_geo.geo_len = 0;
|
|
csystem_data->last_geo.geo[0] = 0;
|
|
rdr_log(reader, "card detected");
|
|
cs_clear_entitlement(reader); //reset the entitlements
|
|
|
|
// set pin
|
|
write_cmd(ins24, pin);
|
|
|
|
insac[2] = 0xa4;
|
|
write_cmd(insac, NULL); // request unique id
|
|
|
|
insb8[4] = 0x07;
|
|
write_cmd(insb8, NULL); // read unique id
|
|
rdr_log_sensitive(reader, "serial: {%llu}", (unsigned long long) b2ll(5, cta_res + 2));
|
|
|
|
insa4[2] = 0x00;
|
|
write_cmd(insa4, NULL); // select issuer 0
|
|
for(i = 1; (cta_res[cta_lr - 2] == 0x90) && (cta_res[cta_lr - 1] == 0); i++)
|
|
{
|
|
bool added = false;
|
|
uint32_t l_provid, l_sa;
|
|
uint8_t l_name[64];
|
|
|
|
insc0[4] = 0x1a;
|
|
write_cmd(insc0, NULL); // show provider properties
|
|
cta_res[2] &= 0xF0;
|
|
l_provid = b2i(3, cta_res);
|
|
|
|
insac[2] = 0xa5;
|
|
write_cmd(insac, NULL); // request sa
|
|
|
|
insb8[4] = 0x06;
|
|
write_cmd(insb8, NULL); // read sa
|
|
l_sa = b2i(4, cta_res + 2);
|
|
|
|
insac[2] = 0xa7;
|
|
write_cmd(insac, NULL); // request name
|
|
|
|
insb8[4] = 0x02;
|
|
write_cmd(insb8, NULL); // read name nano + len
|
|
l = cta_res[1];
|
|
|
|
insb8[4] = l;
|
|
write_cmd(insb8, NULL); // read name
|
|
cta_res[l] = 0;
|
|
trim((char *)cta_res);
|
|
if(cta_res[0])
|
|
{
|
|
snprintf((char *)l_name, sizeof(l_name), ", name: %.55s", cta_res);
|
|
}
|
|
else
|
|
{
|
|
l_name[0] = 0;
|
|
}
|
|
|
|
// read GEO
|
|
insac[2] = 0xa6;
|
|
write_cmd(insac, NULL); // request GEO
|
|
|
|
insb8[4] = 0x02;
|
|
write_cmd(insb8, NULL); // read GEO nano + len
|
|
l = cta_res[1];
|
|
char tmp[l * 3 + 1];
|
|
insb8[4] = l;
|
|
write_cmd(insb8, NULL); // read geo
|
|
rdr_log_sensitive(reader, "provider: %d, id: {%06X%s}, sa: {%08X}, geo: %s", i, l_provid, l_name, l_sa, (l < 4) ? "empty" : cs_hexdump(1, cta_res, l, tmp, sizeof(tmp)));
|
|
|
|
// read classes subscription
|
|
insac[2] = 0xa9;
|
|
insac[4] = 4;
|
|
if(!reader->read_old_classes)
|
|
{
|
|
now = time(NULL) - (24 * 60 * 60);
|
|
cs_gmtime_r(&now, &timeinfo);
|
|
tmpdate = timeinfo.tm_mday | ((timeinfo.tm_mon + 1) << 5) | ((timeinfo.tm_year - 80) << 9);
|
|
cls[0] = tmpdate >> 8;
|
|
cls[1] = tmpdate & 0xff;
|
|
}
|
|
write_cmd(insac, cls); // request class subs
|
|
while((cta_res[cta_lr - 2] == 0x90) && (cta_res[cta_lr - 1] == 0))
|
|
{
|
|
insb8[4] = 0x02;
|
|
write_cmd(insb8, NULL); // read class subs nano + len
|
|
if((cta_res[cta_lr - 2] == 0x90) && (cta_res[cta_lr - 1] == 0))
|
|
{
|
|
l = cta_res[1];
|
|
insb8[4] = l;
|
|
write_cmd(insb8, NULL); // read class subs
|
|
if((cta_res[cta_lr - 2] == 0x90) && (cta_res[cta_lr - 1] == 0x00 || cta_res[cta_lr - 1] == 0x08))
|
|
{
|
|
show_class(reader, NULL, l_provid, cta_res, cta_lr - 2);
|
|
added = true;
|
|
}
|
|
}
|
|
}
|
|
if(!added)
|
|
{
|
|
// add entitlement info for provid without class
|
|
cs_add_entitlement(reader, reader->caid, l_provid, 0, 0, 0, 0, 5, 1);
|
|
}
|
|
|
|
// Read List of «pre-booked pay-per-view per programme» entitlements within the range [INUMB, FNUMB]
|
|
insac[2] = 0xaa;
|
|
insac[4] = 6;
|
|
write_cmd(insac, prebook); // request class subs
|
|
while((cta_res[cta_lr - 2] == 0x90) && (cta_res[cta_lr - 1] == 0x00))
|
|
{
|
|
insb8[4] = 0x02;
|
|
write_cmd(insb8, NULL); // read PPV
|
|
if((cta_res[cta_lr - 2] == 0x90) && (cta_res[cta_lr - 1] == 0))
|
|
{
|
|
l = cta_res[1];
|
|
insb8[4] = l;
|
|
write_cmd(insb8, NULL); // read PPV
|
|
if((cta_res[cta_lr - 2] == 0x90) && (cta_res[cta_lr - 1] == 0x00 || cta_res[cta_lr - 1] == 0x08))
|
|
{
|
|
time_t start_t, end_t;
|
|
struct tm tm;
|
|
memset(&tm, 0, sizeof(tm));
|
|
|
|
tm.tm_year = (cta_res[2] >> 4) + 116;
|
|
tm.tm_mon = (cta_res[2] & 0xF) - 1;
|
|
tm.tm_mday = 1;
|
|
start_t = cs_timegm(&tm);
|
|
|
|
tm.tm_year = (cta_res[5] >> 4) + 116;
|
|
tm.tm_mon = (cta_res[5] & 0xF) - 1;
|
|
if ((tm.tm_mon == 0) || (tm.tm_mon == 2) || (tm.tm_mon == 4) || (tm.tm_mon == 6) || (tm.tm_mon == 7) || (tm.tm_mon == 9) || (tm.tm_mon == 11))
|
|
{
|
|
tm.tm_mday = 31;
|
|
}
|
|
else if ((tm.tm_mon == 3) || (tm.tm_mon == 5) || (tm.tm_mon == 8) || (tm.tm_mon == 10))
|
|
{
|
|
tm.tm_mday = 30;
|
|
}
|
|
else if ((tm.tm_mon == 1) && (((cta_res[5] >> 4) % 4) == 0))
|
|
{
|
|
tm.tm_mday = 29;
|
|
}
|
|
else
|
|
{
|
|
tm.tm_mday = 28;
|
|
}
|
|
end_t = cs_timegm(&tm);
|
|
|
|
cs_add_entitlement(reader, reader->caid, l_provid, cta_res[1], 0, start_t, end_t, 2, 1);
|
|
}
|
|
}
|
|
}
|
|
insac[4] = 0;
|
|
insa4[2] = 0x02;
|
|
write_cmd(insa4, NULL); // select next provider
|
|
}
|
|
// return ERROR;
|
|
|
|
// Start process init CA 28
|
|
reader->initCA28=0;
|
|
int32_t lenboxkey = reader->boxkey_length;
|
|
int32_t lendeskey = reader->des_key_length;
|
|
|
|
if ((lenboxkey >= 4) && (lendeskey > 0))
|
|
{
|
|
uint8_t ins28[] = { 0xCA, 0x28, 0x00, 0x00, 0x04 }; //Init for nanoE0 ca28
|
|
ins28[4] = (uint8_t) lenboxkey;
|
|
uint8_t ins28_data[4];
|
|
memcpy(ins28_data, reader->boxkey, 4);
|
|
write_cmd(ins28, ins28_data); // unlock card to reply on E002xxyy
|
|
if((cta_res[cta_lr - 2] == 0x90) && (cta_res[cta_lr - 1] == 0))
|
|
{
|
|
rdr_log(reader, "CA 28 initialisation successful!");
|
|
// init 3DES key
|
|
des_set_key(reader->des_key, reader->key_schedule1);
|
|
des_set_key(reader->des_key+8, reader->key_schedule2);
|
|
reader->initCA28=1;
|
|
}
|
|
else
|
|
{
|
|
rdr_log(reader, "CA 28 initialisation failed! CA 28 refused");
|
|
}
|
|
}
|
|
//end process init CA 28
|
|
|
|
return OK;
|
|
}
|
|
|
|
static int32_t viaccess_reassemble_emm(struct s_reader *rdr, struct s_client *client, EMM_PACKET *ep)
|
|
{
|
|
uint8_t *buffer = ep->emm;
|
|
int16_t *len = &ep->emmlen;
|
|
int32_t pos = 0, i;
|
|
int16_t k;
|
|
int32_t prov, provid = 0;
|
|
|
|
struct emm_rass *r_emm = NULL;
|
|
|
|
// Viaccess
|
|
if(*len > 500)
|
|
{
|
|
return 0;
|
|
}
|
|
|
|
switch(buffer[0])
|
|
{
|
|
case 0x8c:
|
|
case 0x8d:
|
|
// emm-s part 1
|
|
provid = b2i(3, ep->emm + 5); // extract provid from emm
|
|
provid &= 0xFFFFF0; // last digit is dont care
|
|
r_emm = find_rabuf(client, provid, (uint8_t) buffer[0], 1);
|
|
if(!r_emm)
|
|
{
|
|
cs_log("[viaccess] ERROR: Can't allocate EMM reassembly buffer.");
|
|
return 0;
|
|
}
|
|
if(!memcmp(&r_emm->emm, &buffer[0], *len)) // skip same shared emm, this make sure emmlen isnt replaced. emmlen = 0 means this shared emm has been used for reassembly
|
|
{
|
|
return 0;
|
|
}
|
|
memset(&r_emm->emm[0], 0, sizeof(r_emm->emm)); // zero it!
|
|
memcpy(&r_emm->emm[0], &buffer[0], *len); // put the fresh new shared emm
|
|
r_emm->emmlen = *len; // put the emmlen indicating that this shared emm isnt being reassembled
|
|
rdr_log_dump_dbg(rdr, D_EMM, r_emm->emm, r_emm->emmlen, "%s: received fresh emm-gh for provid %06X", __func__, provid);
|
|
return 0;
|
|
|
|
case 0x8e:
|
|
// emm-s part 2
|
|
for(prov = 0; prov < rdr->nprov ; prov++)
|
|
{
|
|
if(!memcmp(&buffer[3], &rdr->sa[prov][0], 3))
|
|
{
|
|
//matching sa found!
|
|
if(is_network_reader(rdr))
|
|
{
|
|
provid = b2i(4, ep->provid); // use provid from emm since we have nothing better!
|
|
provid &= 0xFFFFF0; // last digit is dont care
|
|
}
|
|
else
|
|
{
|
|
provid = b2i(4, rdr->prid[prov]); // get corresponding provid from reader since there is no provid in emm payload!
|
|
provid &= 0xFFFFF0; // last digit is dont care
|
|
}
|
|
r_emm = find_rabuf(client, provid, 0, 0); // nano = don't care, the shared 8c or 8d not been written gets returned!
|
|
if(!r_emm || !r_emm->emmlen)
|
|
{
|
|
continue; // match but no emm-gh found for this provider
|
|
}
|
|
else
|
|
{
|
|
break; // stop searching-> emm-gh found!
|
|
}
|
|
}
|
|
}
|
|
if(!r_emm || !r_emm->emmlen)
|
|
{
|
|
return 0; // stop -> no emm-gh found!
|
|
}
|
|
//extract nanos from emm-gh and emm-s
|
|
uint8_t emmbuf[512];
|
|
rdr_log_dbg(rdr, D_EMM, "%s: start extracting nanos", __func__);
|
|
//extract from emm-gh
|
|
for(i = 3; i < r_emm->emmlen; i += r_emm->emm[i + 1] + 2)
|
|
{
|
|
//copy nano (length determined by i+1)
|
|
memcpy(emmbuf + pos, r_emm->emm + i, r_emm->emm[i + 1] + 2);
|
|
pos += r_emm->emm[i + 1] + 2;
|
|
}
|
|
if(buffer[2] == 0x2c)
|
|
{
|
|
//add 9E 20 nano + first 32 uint8_ts of emm content
|
|
memcpy(emmbuf + pos, "\x9E\x20", 2);
|
|
memcpy(emmbuf + pos + 2, buffer + 7, 32);
|
|
pos += 34;
|
|
//add F0 08 nano + 8 subsequent uint8_ts of emm content
|
|
memcpy(emmbuf + pos, "\xF0\x08", 2);
|
|
memcpy(emmbuf + pos + 2, buffer + 39, 8);
|
|
pos += 10;
|
|
}
|
|
else if(buffer[2] == 0x34 && (((provid >> 8) == 0x0419) || ((provid >> 8) == 0x0702)))
|
|
{
|
|
//add 9E 20 nano + first 32 uint8_ts of emm content
|
|
memcpy(emmbuf + pos, "\x9E\x20", 2);
|
|
memcpy(emmbuf + pos + 2, buffer + 7, 32);
|
|
pos += 34;
|
|
//add F0 10 nano + 16 subsequent uint8_ts of emm content
|
|
memcpy(emmbuf + pos, "\xF0\x10", 2);
|
|
memcpy(emmbuf + pos + 2, buffer + 39, 16);
|
|
pos += 18;
|
|
}
|
|
else
|
|
{
|
|
//extract from variable emm-s
|
|
for(k = 7; k < (*len); k += buffer[k + 1] + 2)
|
|
{
|
|
//copy nano (length determined by k+1)
|
|
memcpy(emmbuf + pos, buffer + k, buffer[k + 1] + 2);
|
|
pos += buffer[k + 1] + 2;
|
|
}
|
|
}
|
|
rdr_log_dump_dbg(rdr, D_EMM, buffer, *len, "%s: %s emm-s", __func__, (buffer[2] == 0x2c) ? "fixed" : "variable");
|
|
emm_sort_nanos(buffer + 7, emmbuf, pos);
|
|
pos += 7;
|
|
//calculate emm length and set it on position 2
|
|
buffer[2] = pos - 3;
|
|
rdr_log_dump_dbg(rdr, D_EMM, r_emm->emm, r_emm->emmlen, "%s: emm-gh provid %06X", __func__, provid);
|
|
rdr_log_dump_dbg(rdr, D_EMM, buffer, pos, "%s: assembled emm", __func__);
|
|
*len = pos;
|
|
r_emm->emmlen = 0; // mark this shared 8c or 8d as being used for reassembly and send to reader!
|
|
break;
|
|
}
|
|
|
|
return 1;
|
|
}
|
|
|
|
const struct s_cardsystem reader_viaccess =
|
|
{
|
|
.desc = "viaccess",
|
|
.caids = (uint16_t[]){ 0x05, 0 },
|
|
.do_emm_reassembly = viaccess_reassemble_emm,
|
|
.do_emm = viaccess_do_emm,
|
|
.do_ecm = viaccess_do_ecm,
|
|
.card_info = viaccess_card_info,
|
|
.card_init = viaccess_card_init,
|
|
.get_emm_type = viaccess_get_emm_type,
|
|
.get_emm_filter = viaccess_get_emm_filter,
|
|
};
|
|
|
|
#endif
|