oscam-2.26.01-11942-802-wit.../reader-cryptoworks.c
2026-02-17 09:41:05 +00:00

916 lines
24 KiB
C
Executable File

#include "globals.h"
#ifdef READER_CRYPTOWORKS
#include "cscrypt/bn.h"
#include "oscam-config.h"
#include "oscam-emm.h"
#include "reader-common.h"
struct bignum_st;
struct cryptoworks_data
{
BIGNUM *exp;
BIGNUM *ucpk;
int32_t ucpk_valid;
};
#define CMD_LEN 5
static const char *cs_cert = "oscam.cert";
static int search_boxkey(struct s_reader *rdr, uint16_t caid, char *key)
{
int i, rc = 0;
FILE *fp;
char c_caid[512];
fp = fopen(get_config_filename(c_caid, sizeof(c_caid), cs_cert), "r");
if(fp)
{
for(; (!rc) && fgets(c_caid, sizeof(c_caid), fp);)
{
char *c_provid, *c_key;
c_provid = strchr(c_caid, '#');
if(c_provid)
{ *c_provid = '\0'; }
if(!(c_provid = strchr(c_caid, ':')))
{ continue; }
*c_provid++ = '\0';
if(!(c_key = strchr(c_provid, ':')))
{ continue; }
*c_key++ = '\0';
if(word_atob(trim(c_caid)) != caid)
{ continue; }
if((i = (cs_strlen(trim(c_key)) >> 1)) > 256)
{ continue; }
if(cs_atob((uint8_t *)key, c_key, i) < 0)
{
rdr_log(rdr, "ERROR: wrong key in \"%s\"", cs_cert);
continue;
}
rc = 1;
}
fclose(fp);
}
return rc;
}
static void RotateBytes1(uint8_t *out, uint8_t *in, int32_t n)
{
// loop is executed atleast once, so it's not a good idea to
// call with n=0 !!
out += n;
do
{
*(--out) = *(in++);
}
while(--n);
}
static void RotateBytes2(uint8_t *in, int32_t n)
{
// loop is executed atleast once, so it's not a good idea to
// call with n=0 !!
uint8_t *e = in + n - 1;
do
{
uint8_t temp = *in;
*in++ = *e;
*e-- = temp;
}
while(in < e);
}
static int32_t Input(BIGNUM *d, uint8_t *in, int32_t n, int32_t LE)
{
if(LE)
{
uint8_t tmp[n];
RotateBytes1(tmp, in, n);
return (BN_bin2bn(tmp, n, d) != 0);
}
else
{ return (BN_bin2bn(in, n, d) != 0); }
}
static int32_t Output(struct s_reader *reader, uint8_t *out, int32_t n, BIGNUM *r, int32_t LE)
{
int32_t s = BN_num_bytes(r);
if(s > n)
{
uint8_t buff[s];
rdr_log_dbg(reader, D_READER, "rsa: RSA len %d > %d, truncating", s, n);
BN_bn2bin(r, buff);
memcpy(out, buff + s - n, n);
}
else if(s < n)
{
int32_t l = n - s;
rdr_log_dbg(reader, D_READER, "rsa: RSA len %d < %d, padding", s, n);
memset(out, 0, l);
BN_bn2bin(r, out + l);
}
else
{ BN_bn2bin(r, out); }
if(LE)
{ RotateBytes2(out, n); }
return (s);
}
static int32_t cw_RSA(struct s_reader *reader, uint8_t *out, uint8_t *in, int32_t n, BIGNUM *exp, BIGNUM *mod, int32_t LE)
{
int32_t rc = 0;
BN_CTX *ctx;
BIGNUM *r, *d;
ctx = BN_CTX_new();
r = BN_new();
d = BN_new();
if(Input(d, in, n, LE))
{
if(BN_mod_exp(r, d, exp, mod, ctx))
{ rc = Output(reader, out, n, r, LE); }
else
{ rdr_log(reader, "rsa: mod-exp failed"); }
}
BN_CTX_free(ctx);
BN_free(d);
BN_free(r);
return (rc);
}
static time_t chid_date(uint8_t *ptr, char *buf, int32_t l)
{
time_t rc = 0;
struct tm timeinfo;
memset(&timeinfo, 0, sizeof(struct tm));
if(buf)
{
timeinfo.tm_year = 90 + (ptr[0] >> 1);
timeinfo.tm_mon = (((ptr[0] & 1) << 3) | (ptr[1] >> 5)) - 1;
timeinfo.tm_mday = ptr[1] & 0x1f;
rc = mktime(&timeinfo);
strftime(buf, l, "%Y/%m/%d", &timeinfo);
}
return (rc);
}
static int32_t select_file(struct s_reader *reader, uint8_t f1, uint8_t f2, uint8_t *cta_res, uint16_t *p_cta_lr)
{
uint16_t cta_lr;
uint8_t insA4[] = { 0xA4, 0xA4, 0x00, 0x00, 0x02, 0x00, 0x00 };
insA4[5] = f1;
insA4[6] = f2;
write_cmd(insA4, insA4 + 5); // select file
*p_cta_lr = cta_lr;
return ((cta_res[0] == 0x9f) && (cta_res[1] == 0x11));
}
static int32_t read_record(struct s_reader *reader, uint8_t rec, uint8_t *cta_res)
{
uint16_t cta_lr;
uint8_t insA2[] = { 0xA4, 0xA2, 0x00, 0x00, 0x01, 0x00 };
uint8_t insB2[] = { 0xA4, 0xB2, 0x00, 0x00, 0x00 };
insA2[5] = rec;
write_cmd(insA2, insA2 + 5); // select record
if(cta_res[0] != 0x9f)
{ return (-1); }
insB2[4] = cta_res[1]; // get len
write_cmd(insB2, NULL); // read record
if((cta_res[cta_lr - 2] != 0x90) || (cta_res[cta_lr - 1]))
{ return (-1); }
return (cta_lr - 2);
}
/*
int32_t cryptoworks_send_pin(struct s_reader * reader)
{
uint8_t insPIN[] = { 0xA4, 0x20, 0x00, 0x00, 0x04, 0x00,0x00,0x00,0x00 }; //Verify PIN
if(reader->pincode[0] && (reader->pincode[0]&0xF0)==0x30)
{
memcpy(insPIN+5,reader->pincode,4);
write_cmd(insPIN, insPIN+5);
rdr_log_dbg(reader, D_READER, "Sent pincode to card.");
if((cta_res[0]==0x98)&&(cta_res[1]==0x04)) rdr_log(reader, "bad pincode");
return OK;
}
return(0);
}
*/
static int32_t cryptoworks_disable_pin(struct s_reader *reader)
{
def_resp;
uint8_t insPIN[] = { 0xA4, 0x26, 0x00, 0x00, 0x04, 0x00, 0x00, 0x00, 0x00 }; // disable PIN
if(reader->pincode[0] && (reader->pincode[0] & 0xF0) == 0x30)
{
memcpy(insPIN + 5, reader->pincode, 4);
write_cmd(insPIN, insPIN + 5);
rdr_log(reader, "disable pincode to card");
if((cta_res[0] == 0x98) && (cta_res[1] == 0x04)) { rdr_log(reader, "bad pincode"); }
return ERROR;
}
return OK;
}
static int32_t cryptoworks_card_init(struct s_reader *reader, ATR *newatr)
{
get_atr;
def_resp;
int32_t i;
uint32_t mfid = 0x3F20;
static const uint8_t cwexp[] = { 1, 0 , 1 };
uint8_t insA4C[] = { 0xA4, 0xC0, 0x00, 0x00, 0x11 };
uint8_t insB8[] = { 0xA4, 0xB8, 0x00, 0x00, 0x0C };
uint8_t issuerid = 0;
char issuer[20] = { 0 }, tmp[11];
char *unknown = "unknown", *pin = unknown, ptxt[CS_MAXPROV << 2] = {0};
if((atr[6] != 0xC4) || (atr[9] != 0x8F) || (atr[10] != 0xF1)) { return ERROR; }
if(!cs_malloc(&reader->csystem_data, sizeof(struct cryptoworks_data)))
{ return ERROR; }
struct cryptoworks_data *csystem_data = reader->csystem_data;
rdr_log(reader, "card detected");
rdr_log(reader, "type: CryptoWorks");
reader->caid = 0xD00;
reader->nprov = 0;
memset(reader->prid, 0, sizeof(reader->prid));
write_cmd(insA4C, NULL); // read masterfile-ID
if((cta_res[0] == 0xDF) && (cta_res[1] >= 6))
{ mfid = (cta_res[6] << 8) | cta_res[7]; }
select_file(reader, 0x3f, 0x20, cta_res, &cta_lr);
insB8[2] = insB8[3] = 0; // first
for(cta_res[0] = 0xdf; cta_res[0] == 0xdf;)
{
write_cmd(insB8, NULL); // read provider id's
if(cta_res[0] != 0xdf) { break; }
if(((cta_res[4] & 0x1f) == 0x1f) && (reader->nprov < CS_MAXPROV))
{
snprintf(ptxt + cs_strlen(ptxt), sizeof(ptxt) - cs_strlen(ptxt), ",%02X", cta_res[5]);
reader->prid[reader->nprov++][3] = cta_res[5];
}
insB8[2] = insB8[3] = 0xff; // next
}
for(i = reader->nprov; i < CS_MAXPROV; i++)
{ memset(&reader->prid[i][0], 0xff, 4); }
select_file(reader, 0x2f, 0x01, cta_res, &cta_lr); // read caid
if(read_record(reader, 0xD1, cta_res) >= 4)
{ reader->caid = (cta_res[2] << 8) | cta_res[3]; }
if(read_record(reader, 0x80, cta_res) >= 7) // read serial
{ memcpy(reader->hexserial, cta_res + 2, 5); }
rdr_log_sensitive(reader, "type: CryptoWorks, caid: %04X, ascii serial: {%llu}, hex serial: {%s}",
reader->caid, (unsigned long long) b2ll(5, reader->hexserial), cs_hexdump(0, reader->hexserial, 5, tmp, sizeof(tmp)));
if(read_record(reader, 0x9E, cta_res) >= 66) // read ISK
{
uint8_t keybuf[256];
BIGNUM *ipk;
if(search_boxkey(reader, reader->caid, (char *)keybuf))
{
ipk = BN_new();
BN_bin2bn(cwexp, sizeof(cwexp), csystem_data->exp);
BN_bin2bn(keybuf, 64, ipk);
cw_RSA(reader, cta_res + 2, cta_res + 2, 0x40, csystem_data->exp, ipk, 0);
BN_free(ipk);
csystem_data->ucpk_valid = (cta_res[2] == ((mfid & 0xFF) >> 1));
if(csystem_data->ucpk_valid)
{
cta_res[2] |= 0x80;
BN_bin2bn(cta_res + 2, 0x40, csystem_data->ucpk);
rdr_log_dump_dbg(reader, D_READER, cta_res + 2, 0x40, "IPK available -> session-key:");
}
else
{
csystem_data->ucpk_valid = (keybuf[0] == (((mfid & 0xFF) >> 1) | 0x80));
if(csystem_data->ucpk_valid)
{
BN_bin2bn(keybuf, 0x40, csystem_data->ucpk);
rdr_log_dump_dbg(reader, D_READER, keybuf, 0x40, "session-key found:");
}
else
{ rdr_log(reader, "invalid IPK or session-key for CAID %04X !", reader->caid); }
}
}
}
if(read_record(reader, 0x9F, cta_res) >= 3)
{ issuerid = cta_res[2]; }
if(read_record(reader, 0xC0, cta_res) >= 16)
{
cs_strncpy(issuer, (const char *)cta_res + 2, sizeof(issuer));
trim(issuer);
}
else
{ cs_strncpy(issuer, unknown, sizeof(issuer)); }
select_file(reader, 0x3f, 0x20, cta_res, &cta_lr);
select_file(reader, 0x2f, 0x11, cta_res, &cta_lr); // read pin
if(read_record(reader, atr[8], cta_res) >= 7)
{
cta_res[6] = 0;
pin = (char *)cta_res + 2;
}
rdr_log(reader, "issuer: %s, id: %02X, bios: v%d, pin: %s, mfid: %04X", issuer, issuerid, atr[7], pin, mfid);
rdr_log(reader, "providers: %d (%s)", reader->nprov, ptxt + 1);
cryptoworks_disable_pin(reader);
if (((reader->caid == 0x0D96) || (reader->caid == 0x0D98)) && reader->needsglobalfirst == 1)
{
if(!cs_malloc(&reader->last_g_emm, sizeof(EMM_PACKET)))
{
return ERROR;
}
reader->last_g_emm_valid = false;
rdr_log(reader, "Init for global EMM handling CAID %04X successful",reader->caid);
}
return OK;
}
static int32_t cryptoworks_do_ecm(struct s_reader *reader, const ECM_REQUEST *er, struct s_ecm_answer *ea)
{
def_resp;
int32_t r = 0;
uint8_t ins4C[] = { 0xA4, 0x4C, 0x00, 0x00, 0x00 };
uint8_t insC0[] = { 0xA4, 0xC0, 0x00, 0x00, 0x1C };
uint8_t nanoD4[10];
struct cryptoworks_data *csystem_data = reader->csystem_data;
int32_t secLen = check_sct_len(er->ecm, -5 + (csystem_data->ucpk_valid ? sizeof(nanoD4) : 0));
if(secLen > 5)
{
int32_t i;
const uint8_t *ecm = er->ecm;
uint8_t buff[MAX_LEN];
if(csystem_data->ucpk_valid)
{
memcpy(buff, er->ecm, secLen);
nanoD4[0] = 0xD4;
nanoD4[1] = 0x08;
for(i = 2; i < (int)sizeof(nanoD4); i++)
{ nanoD4[i] = rand(); }
memcpy(&buff[secLen], nanoD4, sizeof(nanoD4));
ecm = buff;
secLen += sizeof(nanoD4);
}
ins4C[3] = csystem_data->ucpk_valid ? 2 : 0;
ins4C[4] = secLen - 5;
write_cmd(ins4C, ecm + 5);
if(cta_res[cta_lr - 2] == 0x9f)
{
insC0[4] = cta_res[cta_lr - 1];
write_cmd(insC0, NULL);
for(i = 0; i < secLen && r < 2;)
{
int32_t n = cta_res[i + 1];
switch(cta_res[i])
{
case 0x80:
rdr_log_dbg(reader, D_READER, "nano 80 (serial)");
break;
case 0xD4:
rdr_log_dbg(reader, D_READER, "nano D4 (rand)");
if(n < 8 || memcmp(&cta_res[i], nanoD4, sizeof(nanoD4)))
{
rdr_log_dbg(reader, D_READER, "random data check failed after decrypt");
}
break;
case 0xDB: // CW
rdr_log_dbg(reader, D_READER, "nano DB (cw)");
if(n == 0x10)
{
memcpy(ea->cw, &cta_res[i + 2], 16);
r |= 1;
}
break;
case 0xDF: // signature
rdr_log_dbg(reader, D_READER, "nano DF %02x (sig)", n);
if(n == 0x08)
{
if((cta_res[i + 2] & 0x50) == 0x50 && !(cta_res[i + 3] & 0x01) && (cta_res[i + 5] & 0x80))
{ r |= 2; }
}
else if(n == 0x40) // camcrypt
{
if(csystem_data->ucpk_valid)
{
cw_RSA(reader, &cta_res[i + 2], &cta_res[i + 2], n, csystem_data->exp, csystem_data->ucpk, 0);
rdr_log_dbg(reader, D_READER, "after camcrypt");
r = 0;
secLen = n - 4;
n = 4;
}
else
{
rdr_log(reader, "valid UCPK needed for camcrypt!");
return ERROR;
}
}
break;
default:
rdr_log_dbg(reader, D_READER, "nano %02x (unhandled)", cta_res[i]);
break;
}
i += n + 2;
}
}
/*
#ifdef LALL
if ((cta_res[cta_lr-2]==0x9f)&&(cta_res[cta_lr-1]==0x1c))
{
write_cmd(insC0, NULL);
if ((cta_lr>26)&&(cta_res[cta_lr-2]==0x90)&&(cta_res[cta_lr-1]==0))
{
if (rc=(((cta_res[20]&0x50)==0x50) &&
(!(cta_res[21]&0x01)) &&
(cta_res[23]&0x80)))
memcpy(ea->cw, cta_res+2, 16);
}
}
#endif
*/
}
//return(rc ? 1 : 0);
return ((r == 3) ? 1 : 0);
}
static uint32_t cryptoworks_get_emm_provid(uint8_t *buffer, int32_t len)
{
uint32_t provid = 0;
int32_t i = 0;
for(i = 0; i < len;)
{
switch(buffer[i])
{
case 0x83:
provid = buffer[i + 2] & 0xfc;
return provid;
break;
default:
i += buffer[i + 1] + 2;
break;
}
}
return provid;
}
static int32_t cryptoworks_get_emm_type(EMM_PACKET *ep, struct s_reader *rdr)
{
char dumprdrserial[16], dumpemmserial[16];
rdr_log_dbg(rdr, D_EMM, "Entered cryptoworks_get_emm_type ep->emm[0]=%02x", ep->emm[0]);
switch(ep->emm[0])
{
case 0x82:
if(ep->emm[3] == 0xA9 && ep->emm[4] == 0xFF && ep->emm[13] == 0x80 && ep->emm[14] == 0x05)
{
ep->type = UNIQUE;
memset(ep->hexserial, 0, 8);
memcpy(ep->hexserial, ep->emm + 5, 5);
#ifdef WITH_DEBUG
if(cs_dblevel & D_EMM)
{
cs_hexdump(1, rdr->hexserial, 5, dumprdrserial, sizeof(dumprdrserial));
cs_hexdump(1, ep->hexserial, 5, dumpemmserial, sizeof(dumpemmserial));
}
#endif
i2b_buf(4, cryptoworks_get_emm_provid(ep->emm + 12, ep->emmlen - 12), ep->provid);
rdr_log_dbg_sensitive(rdr, D_EMM, "UNIQUE, ep = {%s} rdr = {%s}", dumpemmserial, dumprdrserial);
return (!memcmp(ep->emm + 5, rdr->hexserial, 5)); // check for serial
}
break;
case 0x84:
if(ep->emm[3] == 0xA9 && ep->emm[4] == 0xFF && ep->emm[12] == 0x80 && ep->emm[13] == 0x04)
{
ep->type = SHARED;
memset(ep->hexserial, 0, 8);
memcpy(ep->hexserial, ep->emm + 5, 4);
#ifdef WITH_DEBUG
if(cs_dblevel & D_EMM)
{
cs_hexdump(1, rdr->hexserial, 4, dumprdrserial, sizeof(dumprdrserial));
cs_hexdump(1, ep->hexserial, 4, dumpemmserial, sizeof(dumpemmserial));
}
#endif
i2b_buf(4, cryptoworks_get_emm_provid(ep->emm + 12, ep->emmlen - 12), ep->provid);
rdr_log_dbg_sensitive(rdr, D_EMM, "SHARED, ep = {%s} rdr = {%s}", dumpemmserial, dumprdrserial);
return (!memcmp(ep->emm + 5, rdr->hexserial, 4)); // check for SA
}
break;
case 0x86:
if(ep->emm[3] == 0xA9 && ep->emm[4] == 0xFF && ep->emm[5] == 0x83
&& ep->emm[6] == 0x01 && (ep->emm[8] == 0x85 || ep->emm[8] == 0x84 || ep->emm[8] == 0x8C))
{
rdr_log_dbg(rdr, D_EMM, "SHARED (Header)");
ep->type = SHARED;
i2b_buf(4, cryptoworks_get_emm_provid(ep->emm + 8, ep->emmlen - 8), ep->provid);
// We need those packets to pass otherwise we would never
// be able to complete EMM reassembly
return 1;
}
break;
case 0x88:
case 0x89:
if(ep->emm[3] == 0xA9 && ep->emm[4] == 0xFF && ep->emm[8] == 0x83 && ep->emm[9] == 0x01)
{
rdr_log_dbg(rdr, D_EMM, "GLOBAL");
ep->type = GLOBAL;
i2b_buf(4, cryptoworks_get_emm_provid(ep->emm + 8, ep->emmlen - 8), ep->provid);
return 1;
}
break;
case 0x8F:
ep->type = UNKNOWN;
rdr_log_dbg(rdr, D_EMM, "0x8F via camd3");
switch(ep->emm[4])
{
case 0x44:
i2b_buf(4, cryptoworks_get_emm_provid(ep->emm + 8, ep->emmlen - 8), ep->provid);
ep->type = GLOBAL;
break;
case 0x48:
i2b_buf(4, cryptoworks_get_emm_provid(ep->emm + 12, ep->emmlen - 12), ep->provid);
ep->type = SHARED;
break;
case 0x42:
i2b_buf(4, cryptoworks_get_emm_provid(ep->emm + 12, ep->emmlen - 12), ep->provid);
ep->type = UNIQUE;
break;
}
return 1;
/* FIXME: Seems to be that all other EMM types are rejected by the card */
default:
ep->type = UNKNOWN;
rdr_log_dbg(rdr, D_EMM, "UNKNOWN");
return 0; // skip emm
}
rdr_log_dbg(rdr, D_EMM, "invalid");
return 0;
}
static int32_t cryptoworks_get_emm_filter(struct s_reader *rdr, struct s_csystem_emm_filter **emm_filters, unsigned int *filter_count)
{
if(*emm_filters == NULL)
{
const unsigned int max_filter_count = 4;
if(!cs_malloc(emm_filters, max_filter_count * sizeof(struct s_csystem_emm_filter)))
{ return ERROR; }
struct s_csystem_emm_filter *filters = *emm_filters;
*filter_count = 0;
int32_t idx = 0;
filters[idx].type = EMM_GLOBAL;
filters[idx].enabled = 1;
filters[idx].filter[0] = 0x88;
filters[idx].mask[0] = 0xFE;
filters[idx].filter[1] = 0xA9;
filters[idx].mask[1] = 0xFF;
filters[idx].filter[2] = 0xFF;
filters[idx].mask[2] = 0xFF;
idx++;
filters[idx].type = EMM_SHARED;
filters[idx].enabled = 1;
filters[idx].filter[0] = 0x86;
filters[idx].mask[0] = 0xFF;
filters[idx].filter[1] = 0xA9;
filters[idx].mask[1] = 0xFF;
filters[idx].filter[2] = 0xFF;
filters[idx].mask[2] = 0xFF;
idx++;
filters[idx].type = EMM_SHARED;
filters[idx].enabled = 1;
filters[idx].filter[0] = 0x84;
filters[idx].mask[0] = 0xFF;
filters[idx].filter[1] = 0xA9;
filters[idx].mask[1] = 0xFF;
filters[idx].filter[2] = 0xFF;
filters[idx].mask[2] = 0xFF;
memcpy(&filters[idx].filter[3], rdr->hexserial, 4);
memset(&filters[idx].mask[3], 0xFF, 4);
idx++;
filters[idx].type = EMM_UNIQUE;
filters[idx].enabled = 1;
filters[idx].filter[0] = 0x82;
filters[idx].mask[0] = 0xFF;
filters[idx].filter[1] = 0xA9;
filters[idx].mask[1] = 0xFF;
filters[idx].filter[2] = 0xFF;
filters[idx].mask[2] = 0xFF;
memcpy(&filters[idx].filter[3], rdr->hexserial, 5);
memset(&filters[idx].mask[3], 0xFF, 5);
idx++;
*filter_count = idx;
}
return OK;
}
static int32_t cryptoworks_do_emm(struct s_reader *reader, EMM_PACKET *ep)
{
def_resp;
uint8_t insEMM_GA[] = { 0xA4, 0x44, 0x00, 0x00, 0x00 };
uint8_t insEMM_SA[] = { 0xA4, 0x48, 0x00, 0x00, 0x00 };
uint8_t insEMM_UA[] = { 0xA4, 0x42, 0x00, 0x00, 0x00 };
uint8_t *emm = ep->emm;
if(emm[0] == 0x8f && emm[3] == 0xA4)
{
// camd3 emm
write_cmd(emm + 3, emm + 3 + CMD_LEN);
}
else
{
switch(ep->type)
{
case GLOBAL: // GA
insEMM_GA[4] = ep->emm[2] - 2;
if(emm[7] == insEMM_GA[4] - 3)
{
write_cmd(insEMM_GA, emm + 5);
}
break;
case SHARED: // SA
insEMM_SA[4] = ep->emm[2] - 6;
if(emm[11] == insEMM_SA[4] - 3)
{
write_cmd(insEMM_SA, emm + 9);
}
break;
case UNIQUE: // UA
insEMM_UA[4] = ep->emm[2] - 7;
if(emm[12] == insEMM_UA[4] - 3)
{
//cryptoworks_send_pin(); //?? may be
write_cmd(insEMM_UA, emm + 10);
}
break;
}
}
if((cta_res[0] == 0x90) && (cta_res[1] == 0x00))
{
return OK;
}
// emm already written before, entitlement / key is already up to date -> skipped
if((cta_res[0] == 0x94) && (cta_res[1] == 0x04))
{
return SKIPPED;
}
rdr_log_dbg(reader, D_EMM, "%s(): type %d - response %02X %02X",
__func__, ep->type, cta_res[0], cta_res[1]);
return ERROR;
}
static int32_t cryptoworks_card_info(struct s_reader *reader)
{
def_resp;
int32_t i;
uint8_t insA21[] = { 0xA4, 0xA2, 0x01, 0x00, 0x05, 0x8C, 0x00, 0x00, 0x00, 0x00 };
uint8_t insB2[] = { 0xA4, 0xB2, 0x00, 0x00, 0x00 };
char l_name[20 + 8] = ", name: ";
cs_clear_entitlement(reader); // reset the entitlements
for(i = 0; i < reader->nprov; i++)
{
l_name[8] = 0;
select_file(reader, 0x1f, reader->prid[i][3], cta_res, &cta_lr); // select provider
select_file(reader, 0x0e, 0x11, cta_res, &cta_lr); // read provider name
if(read_record(reader, 0xD6, cta_res) >= 16)
{
cs_strncpy(l_name + 8, (const char *)cta_res + 2, sizeof(l_name) - 8);
l_name[sizeof(l_name) - 1] = 0;
trim(l_name + 8);
}
l_name[0] = (l_name[8]) ? ',' : 0;
rdr_log(reader, "provider: %d, id: %02X%s", i + 1, reader->prid[i][3], l_name);
select_file(reader, 0x0f, 0x20, cta_res, &cta_lr); // select provider class
write_cmd(insA21, insA21 + 5);
if(cta_res[0] == 0x9f)
{
insB2[4] = cta_res[1];
for(insB2[3] = 0; (cta_res[0] != 0x94) || (cta_res[1] != 0x2); insB2[3] = 1)
{
write_cmd(insB2, NULL); // read chid
if(cta_res[0] != 0x94)
{
char ds[16], de[16];
// todo: add entitlements to list but produces a warning related to date variable
cs_add_entitlement(reader, reader->caid, reader->prid[i][3], b2i(2, cta_res + 6), 0,
chid_date(cta_res + 28, ds, sizeof(ds) - 1),
chid_date(cta_res + 30, de, sizeof(de) - 1), 3, 1);
rdr_log(reader, "chid: %02X%02X, date: %s - %s, name: %s",
cta_res[6], cta_res[7], ds, de, trim((char *) cta_res + 10));
}
}
}
select_file(reader, 0x0f, 0x00, cta_res, &cta_lr); // select provider channel
write_cmd(insA21, insA21 + 5);
if(cta_res[0] == 0x9f)
{
insB2[4] = cta_res[1];
for(insB2[3] = 0; (cta_res[0] != 0x94) || (cta_res[1] != 0x2); insB2[3] = 1)
{
write_cmd(insB2, NULL); // read chid
if(cta_res[0] != 0x94)
{
char ds[16], de[16];
// todo: add entitlements to list but produces a warning related to date variable
cs_add_entitlement(reader, reader->caid, reader->prid[i][3], b2i(2, cta_res + 6), 0,
chid_date(cta_res + 28, ds, sizeof(ds) - 1),
chid_date(cta_res + 30, de, sizeof(de) - 1), 3, 1);
cta_res[27] = 0;
rdr_log(reader, "chid: %02X%02X, date: %s - %s, name: %s",
cta_res[6], cta_res[7], ds, de, trim((char *)cta_res + 10));
}
}
}
}
rdr_log(reader, "ready for requests");
return OK;
}
static int32_t cryptoworks_reassemble_emm(struct s_reader *rdr, struct s_client *client, EMM_PACKET *ep)
{
uint8_t *buffer = ep->emm;
int16_t *len = &ep->emmlen;
int16_t emm_len = 0;
// Cryptoworks
// Cryptoworks EMM-S have to be assembled by the client from an EMM-SH with table
// id 0x84 and a corresponding EMM-SB (body) with table id 0x86. A pseudo EMM-S
// with table id 0x84 has to be build containing all nano commands from both the
// original EMM-SH and EMM-SB in ascending order.
//
if(*len > 500) { return 0; }
if (!client->cw_rass && !cs_malloc(&client->cw_rass, sizeof(*client->cw_rass)))
{
cs_log("[cryptoworks] ERROR: Can't allocate EMM reassembly buffer.");
return 0;
}
struct emm_rass *r_emm = client->cw_rass;
switch(buffer[0])
{
case 0x82 : // emm-u
rdr_log_dbg(rdr, D_EMM, "unique emm (EMM-U)");
break;
case 0x84: // emm-sh
rdr_log_dbg(rdr, D_EMM, "shared emm (EMM-SH)");
if(!memcmp(r_emm->emm, buffer, *len))
{ return 0; }
if(ep->emm[11] == ep->emm[2] - 9)
{
rdr_log_dbg(rdr, D_EMM, "received assembled EMM-S");
return 1;
}
memcpy(r_emm->emm, buffer, *len);
r_emm->emmlen = *len;
rdr_log_dbg(rdr, D_EMM, "EMM-SH only in memcpy");
return 0;
case 0x86: // emm-sb
rdr_log_dbg(rdr, D_EMM, "shared emm (EMM-SB)");
if(!r_emm->emmlen)
{ return 0; }
// we keep the first 12 bytes of the 0x84 emm (EMM-SH)
// now we need to append the payload of the 0x86 emm (EMM-SB)
// starting after the header (&buffer[5])
// then the rest of the payload from EMM-SH
// so we should have :
// EMM-SH[0:12] + EMM-SB[5:len_EMM-SB] + EMM-SH[12:EMM-SH_len]
// then sort the nano in ascending order
// update the emm len (emmBuf[1:2])
//
emm_len = *len - 5 + r_emm->emmlen - 12;
uint8_t *tmp, *assembled;
if(!cs_malloc(&tmp, emm_len))
{ return 0; }
if(!cs_malloc(&assembled, emm_len + 12))
{
free(tmp);
return 0;
}
uint8_t *assembled_EMM;
if(!cs_malloc(&assembled_EMM, emm_len + 12))
{
free(assembled);
free(tmp);
return 0;
}
memcpy(tmp, &buffer[5], *len - 5);
memcpy(tmp + *len - 5, &r_emm->emm[12], r_emm->emmlen - 12);
memcpy(assembled_EMM, r_emm->emm, 12);
emm_sort_nanos(assembled_EMM + 12, tmp, emm_len);
assembled_EMM[1] = ((emm_len + 9) >> 8) | 0x70;
assembled_EMM[2] = (emm_len + 9) & 0xFF;
if(assembled_EMM[11] != emm_len) // sanity check
{
// error in emm assembly
rdr_log_dbg(rdr, D_EMM, "Error assembling EMM-S");
free(assembled_EMM);
return 0;
}
//copy back the assembled emm in the working buffer
memcpy(buffer, assembled_EMM, emm_len + 12);
*len = emm_len + 12;
free(tmp);
free(assembled);
r_emm->emmlen = 0;
rdr_log_dump_dbg(rdr, D_EMM, buffer, *len, "shared emm (assembled):");
free(assembled_EMM);
break;
case 0x88: // emm-g
case 0x89: // emm-g
rdr_log_dbg(rdr, D_EMM, "global emm (EMM-G)");
break;
}
return 1;
}
const struct s_cardsystem reader_cryptoworks =
{
.desc = "cryptoworks",
.caids = (uint16_t[]){ 0x0D, 0 },
.do_emm_reassembly = cryptoworks_reassemble_emm,
.do_emm = cryptoworks_do_emm,
.do_ecm = cryptoworks_do_ecm,
.card_info = cryptoworks_card_info,
.card_init = cryptoworks_card_init,
.get_emm_type = cryptoworks_get_emm_type,
.get_emm_filter = cryptoworks_get_emm_filter,
};
#endif