oscam-2.26.01-11942-802-wit.../reader-videoguard-common.c
2026-02-17 09:41:05 +00:00

1150 lines
28 KiB
C
Executable File

//
// Common videoguard functions.
//
#include "globals.h"
#ifdef READER_VIDEOGUARD
#include "reader-common.h"
#include "reader-videoguard-common.h"
#define VG_EMMTYPE_MASK 0xC0
#define VG_EMMTYPE_G 0
#define VG_EMMTYPE_U 1
#define VG_EMMTYPE_S 2
typedef struct mailmsg_s
{
uint16_t caid;
uint32_t serial;
uint16_t date;
uint16_t id;
uint8_t nsubs;
uint16_t len;
uint8_t mask;
uint8_t written;
char *message;
char *subject;
} MAILMSG;
static LLIST *vg_msgs;
static void cCamCryptVG_LongMult(uint16_t *pData, uint16_t *pLen, uint32_t mult, uint32_t carry);
static void cCamCryptVG_PartialMod(uint16_t val, uint32_t count, uint16_t *outkey, const uint16_t *inkey);
static void cCamCryptVG_RotateRightAndHash(uint8_t *p);
static void cCamCryptVG_Reorder16A(uint8_t *dest, const uint8_t *src);
static void cCamCryptVG_ReorderAndEncrypt(struct s_reader *reader, uint8_t *p);
static void cCamCryptVG_Process_D0(struct s_reader *reader, const uint8_t *ins, uint8_t *data);
static void cCamCryptVG_Process_D1(struct s_reader *reader, const uint8_t *ins, uint8_t *data, const uint8_t *status);
static void cCamCryptVG_Decrypt_D3(struct s_reader *reader, uint8_t *ins, uint8_t *data, const uint8_t *status);
static void cCamCryptVG_PostProcess_Decrypt(struct s_reader *reader, uint8_t *rxbuff);
static int32_t cAES_Encrypt(struct s_reader *reader, const uint8_t *data, int32_t len, uint8_t *crypted);
static void swap_lb(uint8_t *buff, int32_t len);
// returns 1 if cw_is_valid, returns 0 if cw is all zeros
int32_t cw_is_valid(uint8_t *cw)
{
int32_t i;
for(i = 0; i < 8; i++)
{
if(cw[i] != 0) // test if cw = 00
{
return OK;
}
}
return ERROR;
}
void cAES_SetKey(struct s_reader *reader, const uint8_t *key)
{
struct videoguard_data *csystem_data = reader->csystem_data;
AES_set_encrypt_key(key, 128, &(csystem_data->ekey));
}
int32_t cAES_Encrypt(struct s_reader *reader, const uint8_t *data, int32_t len, uint8_t *crypted)
{
struct videoguard_data *csystem_data = reader->csystem_data;
len = (len + 15) & (~15); // pad up to a multiple of 16
int32_t i;
for(i = 0; i < len; i += 16) { AES_encrypt(data + i, crypted + i, &(csystem_data->ekey)); }
return len;
}
static void swap_lb(uint8_t *buff, int32_t len)
{
#if __BYTE_ORDER != __BIG_ENDIAN
return;
#endif
int32_t i;
uint8_t tmp;
for(i = 0; i < len / 2; i++)
{
tmp = buff[i * 2];
buff[i * 2] = buff[(i * 2) + 1];
buff[(i * 2) + 1] = tmp;
}
}
void __xxor(uint8_t *data, int32_t len, const uint8_t *v1, const uint8_t *v2)
{
uint32_t i;
switch(len)
{
case 16:
for(i = 0; i < 16; ++i)
{
data[i] = v1[i] ^ v2[i];
}
break;
case 8:
for(i = 0; i < 8; ++i)
{
data[i] = v1[i] ^ v2[i];
}
break;
case 4:
for(i = 0; i < 4; ++i)
{
data[i] = v1[i] ^ v2[i];
}
break;
default:
while(len--) { *data++ = *v1++ ^ *v2++; }
}
}
void cCamCryptVG_SetSeed(struct s_reader *reader)
{
#if __BYTE_ORDER != __BIG_ENDIAN
static const uint8_t key1[] =
{
0xb9, 0xd5, 0xef, 0xd5, 0xf5, 0xd5, 0xfb, 0xd5, 0x31, 0xd6, 0x43, 0xd6, 0x55, 0xd6, 0x61, 0xd6,
0x85, 0xd6, 0x9d, 0xd6, 0xaf, 0xd6, 0xc7, 0xd6, 0xd9, 0xd6, 0x09, 0xd7, 0x15, 0xd7, 0x21, 0xd7,
0x27, 0xd7, 0x3f, 0xd7, 0x45, 0xd7, 0xb1, 0xd7, 0xbd, 0xd7, 0xdb, 0xd7, 0x11, 0xd8, 0x23, 0xd8,
0x29, 0xd8, 0x2f, 0xd8, 0x4d, 0xd8, 0x8f, 0xd8, 0xa1, 0xd8, 0xad, 0xd8, 0xbf, 0xd8, 0xd7, 0xd8
};
static const uint8_t key2[] =
{
0x01, 0x00, 0xcf, 0x13, 0xe0, 0x60, 0x54, 0xac, 0xab, 0x99, 0xe6, 0x0c, 0x9f, 0x5b, 0x91, 0xb9,
0x72, 0x72, 0x4d, 0x5b, 0x5f, 0xd3, 0xb7, 0x5b, 0x01, 0x4d, 0xef, 0x9e, 0x6b, 0x8a, 0xb9, 0xd1,
0xc9, 0x9f, 0xa1, 0x2a, 0x8d, 0x86, 0xb6, 0xd6, 0x39, 0xb4, 0x64, 0x65, 0x13, 0x77, 0xa1, 0x0a,
0x0c, 0xcf, 0xb4, 0x2b, 0x3a, 0x2f, 0xd2, 0x09, 0x92, 0x15, 0x40, 0x47, 0x66, 0x5c, 0xda, 0xc9
};
#else
static const uint8_t key1[] =
{
0xd5, 0xb9, 0xd5, 0xef, 0xd5, 0xf5, 0xd5, 0xfb, 0xd6, 0x31, 0xd6, 0x43, 0xd6, 0x55, 0xd6, 0x61,
0xd6, 0x85, 0xd6, 0x9d, 0xd6, 0xaf, 0xd6, 0xc7, 0xd6, 0xd9, 0xd7, 0x09, 0xd7, 0x15, 0xd7, 0x21,
0xd7, 0x27, 0xd7, 0x3f, 0xd7, 0x45, 0xd7, 0xb1, 0xd7, 0xbd, 0xd7, 0xdb, 0xd8, 0x11, 0xd8, 0x23,
0xd8, 0x29, 0xd8, 0x2f, 0xd8, 0x4d, 0xd8, 0x8f, 0xd8, 0xa1, 0xd8, 0xad, 0xd8, 0xbf, 0xd8, 0xd7
};
static const uint8_t key2[] =
{
0x00, 0x01, 0x13, 0xcf, 0x60, 0xe0, 0xac, 0x54, 0x99, 0xab, 0x0c, 0xe6, 0x5b, 0x9f, 0xb9, 0x91,
0x72, 0x72, 0x5b, 0x4d, 0xd3, 0x5f, 0x5b, 0xb7, 0x4d, 0x01, 0x9e, 0xef, 0x8a, 0x6b, 0xd1, 0xb9,
0x9f, 0xc9, 0x2a, 0xa1, 0x86, 0x8d, 0xd6, 0xb6, 0xb4, 0x39, 0x65, 0x64, 0x77, 0x13, 0x0a, 0xa1,
0xcf, 0x0c, 0x2b, 0xb4, 0x2f, 0x3a, 0x09, 0xd2, 0x15, 0x92, 0x47, 0x40, 0x5c, 0x66, 0xc9, 0xda
};
#endif
struct videoguard_data *csystem_data = reader->csystem_data;
memcpy(csystem_data->cardkeys[1], key1, sizeof(csystem_data->cardkeys[1]));
memcpy(csystem_data->cardkeys[2], key2, sizeof(csystem_data->cardkeys[2]));
}
void cCamCryptVG_GetCamKey(struct s_reader *reader, uint16_t *tb2)
{
struct videoguard_data *csystem_data = reader->csystem_data;
uint16_t c = 1;
memset(tb2, 0, 64);
tb2[0] = 1;
int32_t i;
for(i = 0; i < 32; i++)
{
cCamCryptVG_LongMult(tb2, &c, csystem_data->cardkeys[1][i], 0);
}
swap_lb((uint8_t *)tb2, 64);
}
static void cCamCryptVG_PostProcess_Decrypt(struct s_reader *reader, uint8_t *rxbuff)
{
switch(rxbuff[0])
{
case 0xD0:
cCamCryptVG_Process_D0(reader, rxbuff, rxbuff + 5);
break;
case 0xD1:
cCamCryptVG_Process_D1(reader, rxbuff, rxbuff + 5, rxbuff + rxbuff[4] + 5);
break;
case 0xD3:
cCamCryptVG_Decrypt_D3(reader, rxbuff, rxbuff + 5, rxbuff + rxbuff[4] + 5);
break;
}
}
static void cCamCryptVG_Process_D0(struct s_reader *reader, const uint8_t *ins, uint8_t *data)
{
struct videoguard_data *csystem_data = reader->csystem_data;
switch(ins[1])
{
case 0xb4:
swap_lb(data, 64);
memcpy(csystem_data->cardkeys[0], data, sizeof(csystem_data->cardkeys[0]));
break;
case 0xbc:
{
swap_lb(data, 64);
const uint16_t *key1 = (const uint16_t *)csystem_data->cardkeys[1];
uint16_t key2[32];
memcpy(key2, csystem_data->cardkeys[2], sizeof(key2));
int32_t count2;
uint16_t iidata[32];
memcpy((uint8_t *)&iidata, data, 64);
for(count2 = 0; count2 < 32; count2++)
{
uint32_t rem = 0, divisor = key1[count2];
int8_t i;
for(i = 31; i >= 0; i--)
{
uint32_t x = iidata[i] | (rem << 16);
rem = (x % divisor) & 0xffff;
}
uint32_t carry = 1, t = val_by2on3(divisor) | 1;
while(t)
{
if(t & 1) { carry = ((carry * rem) % divisor) & 0xffff; }
rem = ((rem * rem) % divisor) & 0xffff;
t >>= 1;
}
cCamCryptVG_PartialMod(carry, count2, key2, key1);
}
uint16_t idatacount = 0;
int32_t i;
for(i = 31; i >= 0; i--)
{
cCamCryptVG_LongMult(iidata, &idatacount, key1[i], key2[i]);
}
memcpy(data, iidata, 64);
swap_lb(data, 64);
uint8_t stateD1[16];
cCamCryptVG_Reorder16A(stateD1, data);
cAES_SetKey(reader, stateD1);
break;
}
}
}
static void cCamCryptVG_Process_D1(struct s_reader *reader, const uint8_t *ins, uint8_t *data, const uint8_t *status)
{
struct videoguard_data *csystem_data = reader->csystem_data;
uint8_t iter[16], tmp[16];
memset(iter, 0, sizeof(iter));
memcpy(iter, ins, 5);
xor16(iter, csystem_data->stateD3A, iter);
memcpy(csystem_data->stateD3A, iter, sizeof(iter));
int32_t datalen = status - data;
int32_t datalen1 = datalen;
if(datalen < 0)
{
datalen1 += 15;
}
int32_t blocklen = datalen1 >> 4;
int32_t i;
int32_t iblock;
for(i = 0, iblock = 0; i < blocklen + 2; i++, iblock += 16)
{
uint8_t in[16];
int32_t docalc = 1;
if(blocklen == i && (docalc = datalen & 0xf))
{
memset(in, 0, sizeof(in));
memcpy(in, &data[iblock], datalen - (datalen1 & ~0xf));
}
else if(blocklen + 1 == i)
{
memset(in, 0, sizeof(in));
memcpy(&in[5], status, 2);
}
else
{
memcpy(in, &data[iblock], sizeof(in));
}
if(docalc)
{
xor16(iter, in, tmp);
cCamCryptVG_ReorderAndEncrypt(reader, tmp);
xor16(tmp, csystem_data->stateD3A, iter);
}
}
memcpy(csystem_data->stateD3A, tmp, 16);
}
static void cCamCryptVG_Decrypt_D3(struct s_reader *reader, uint8_t *ins, uint8_t *data, const uint8_t *status)
{
struct videoguard_data *csystem_data = reader->csystem_data;
if(ins[4] > 16)
{
ins[4] -= 16;
}
if(ins[1] == 0xbe)
{
memset(csystem_data->stateD3A, 0, sizeof(csystem_data->stateD3A));
}
uint8_t tmp[16];
memset(tmp, 0, sizeof(tmp));
memcpy(tmp, ins, 5);
xor16(tmp, csystem_data->stateD3A, csystem_data->stateD3A);
int32_t len1 = ins[4];
int32_t blocklen = len1 >> 4;
if(ins[1] != 0xbe)
{
blocklen++;
}
uint8_t iter[16], states[16][16];
memset(iter, 0, sizeof(iter));
int32_t blockindex;
for(blockindex = 0; blockindex < blocklen; blockindex++)
{
iter[0] += blockindex;
xor16(iter, csystem_data->stateD3A, iter);
cCamCryptVG_ReorderAndEncrypt(reader, iter);
xor16(iter, &data[blockindex * 16], states[blockindex]);
if(blockindex == (len1 >> 4))
{
int32_t c = len1 - (blockindex * 16);
if(c < 16)
{
memset(&states[blockindex][c], 0, 16 - c);
}
}
xor16(states[blockindex], csystem_data->stateD3A, csystem_data->stateD3A);
cCamCryptVG_RotateRightAndHash(csystem_data->stateD3A);
}
memset(tmp, 0, sizeof(tmp));
memcpy(tmp + 5, status, 2);
xor16(tmp, csystem_data->stateD3A, csystem_data->stateD3A);
cCamCryptVG_ReorderAndEncrypt(reader, csystem_data->stateD3A);
memcpy(csystem_data->stateD3A, status - 16, sizeof(csystem_data->stateD3A));
cCamCryptVG_ReorderAndEncrypt(reader, csystem_data->stateD3A);
memcpy(data, states[0], len1);
if(ins[1] == 0xbe)
{
cCamCryptVG_Reorder16A(tmp, states[0]);
cAES_SetKey(reader, tmp);
}
}
static void cCamCryptVG_ReorderAndEncrypt(struct s_reader *reader, uint8_t *p)
{
uint8_t tmp[16];
cCamCryptVG_Reorder16A(tmp, p);
cAES_Encrypt(reader, tmp, 16, tmp);
cCamCryptVG_Reorder16A(p, tmp);
}
// reorder AAAABBBBCCCCDDDD to ABCDABCDABCDABCD
static void cCamCryptVG_Reorder16A(uint8_t *dest, const uint8_t *src)
{
int32_t i;
int32_t j;
int32_t k;
for(i = 0, k = 0; i < 4; i++)
{
for(j = i; j < 16; j += 4, k++)
{
dest[k] = src[j];
}
}
}
static void cCamCryptVG_LongMult(uint16_t *pData, uint16_t *pLen, uint32_t mult, uint32_t carry)
{
int32_t i;
for(i = 0; i < *pLen; i++)
{
carry += pData[i] * mult;
pData[i] = (uint16_t)carry;
carry >>= 16;
}
if(carry) { pData[(*pLen)++] = carry; }
}
static void cCamCryptVG_PartialMod(uint16_t val, uint32_t count, uint16_t *outkey, const uint16_t *inkey)
{
if(count)
{
uint32_t mod = inkey[count];
uint16_t mult = (inkey[count] - outkey[count - 1]) & 0xffff;
uint32_t i;
uint32_t ib1;
for(i = 0, ib1 = count - 2; i < count - 1; i++, ib1--)
{
uint32_t t = (inkey[ib1] * mult) % mod;
mult = t - outkey[ib1];
if(mult > t)
{
mult += mod;
}
}
mult += val;
if((val > mult) || (mod < mult))
{
mult -= mod;
}
outkey[count] = (outkey[count] * mult) % mod;
}
else
{
outkey[0] = val;
}
}
static void cCamCryptVG_RotateRightAndHash(uint8_t *p)
{
static const uint8_t table1[256] =
{
0x63, 0x7c, 0x77, 0x7b, 0xf2, 0x6b, 0x6f, 0xc5, 0x30, 0x01, 0x67, 0x2b, 0xfe, 0xd7, 0xab, 0x76,
0xca, 0x82, 0xc9, 0x7d, 0xfa, 0x59, 0x47, 0xf0, 0xad, 0xd4, 0xa2, 0xaf, 0x9c, 0xa4, 0x72, 0xc0,
0xb7, 0xfd, 0x93, 0x26, 0x36, 0x3f, 0xf7, 0xcc, 0x34, 0xa5, 0xe5, 0xf1, 0x71, 0xd8, 0x31, 0x15,
0x04, 0xc7, 0x23, 0xc3, 0x18, 0x96, 0x05, 0x9a, 0x07, 0x12, 0x80, 0xe2, 0xeb, 0x27, 0xb2, 0x75,
0x09, 0x83, 0x2c, 0x1a, 0x1b, 0x6e, 0x5a, 0xa0, 0x52, 0x3b, 0xd6, 0xb3, 0x29, 0xe3, 0x2f, 0x84,
0x53, 0xd1, 0x00, 0xed, 0x20, 0xfc, 0xb1, 0x5b, 0x6a, 0xcb, 0xbe, 0x39, 0x4a, 0x4c, 0x58, 0xcf,
0xd0, 0xef, 0xaa, 0xfb, 0x43, 0x4d, 0x33, 0x85, 0x45, 0xf9, 0x02, 0x7f, 0x50, 0x3c, 0x9f, 0xa8,
0x51, 0xa3, 0x40, 0x8f, 0x92, 0x9d, 0x38, 0xf5, 0xbc, 0xb6, 0xda, 0x21, 0x10, 0xff, 0xf3, 0xd2,
0xcd, 0x0c, 0x13, 0xec, 0x5f, 0x97, 0x44, 0x17, 0xc4, 0xa7, 0x7e, 0x3d, 0x64, 0x5d, 0x19, 0x73,
0x60, 0x81, 0x4f, 0xdc, 0x22, 0x2a, 0x90, 0x88, 0x46, 0xee, 0xb8, 0x14, 0xde, 0x5e, 0x0b, 0xdb,
0xe0, 0x32, 0x3a, 0x0a, 0x49, 0x06, 0x24, 0x5c, 0xc2, 0xd3, 0xac, 0x62, 0x91, 0x95, 0xe4, 0x79,
0xe7, 0xc8, 0x37, 0x6d, 0x8d, 0xd5, 0x4e, 0xa9, 0x6c, 0x56, 0xf4, 0xea, 0x65, 0x7a, 0xae, 0x08,
0xba, 0x78, 0x25, 0x2e, 0x1c, 0xa6, 0xb4, 0xc6, 0xe8, 0xdd, 0x74, 0x1f, 0x4b, 0xbd, 0x8b, 0x8a,
0x70, 0x3e, 0xb5, 0x66, 0x48, 0x03, 0xf6, 0x0e, 0x61, 0x35, 0x57, 0xb9, 0x86, 0xc1, 0x1d, 0x9e,
0xe1, 0xf8, 0x98, 0x11, 0x69, 0xd9, 0x8e, 0x94, 0x9b, 0x1e, 0x87, 0xe9, 0xce, 0x55, 0x28, 0xdf,
0x8c, 0xa1, 0x89, 0x0d, 0xbf, 0xe6, 0x42, 0x68, 0x41, 0x99, 0x2d, 0x0f, 0xb0, 0x54, 0xbb, 0x16,
};
uint8_t t1 = p[15];
int32_t i;
for(i = 0; i < 16; i++)
{
uint8_t t2 = t1;
t1 = p[i];
p[i] = table1[(t1 >> 1) | ((t2 & 1) << 7)];
}
}
int32_t status_ok(const uint8_t *status)
{
//rdr_log(reader, "check status %02x%02x", status[0],status[1]);
return (status[0] == 0x90 || status[0] == 0x91) &&
(status[1] == 0x00 || status[1] == 0x01 || status[1] == 0x20 || status[1] == 0x21 ||
status[1] == 0x80 || status[1] == 0x81 || status[1] == 0xa0 || status[1] == 0xa1);
}
/*checksum for precam datas*/
int32_t checksum_ok(const uint8_t *ird_payload)
{
int32_t b, check = 0;
for (b = 0; b <= ird_payload[1]; b++)
{
check = (check + ird_payload[b]) & 0xFF;
}
if (ird_payload[ird_payload[1] + 1] == check)
{
return 1;
}
else
{
return 0; // Checksum error
}
}
void memorize_cmd_table(struct s_reader *reader, const uint8_t *mem, int32_t size)
{
struct videoguard_data *csystem_data = reader->csystem_data;
NULLFREE(csystem_data->cmd_table);
if(cs_malloc(&csystem_data->cmd_table, size))
{
memcpy(csystem_data->cmd_table, mem, size);
}
}
int32_t cmd_table_get_info(struct s_reader *reader, const uint8_t *cmd, uint8_t *rlen, uint8_t *rmode)
{
struct videoguard_data *csystem_data = reader->csystem_data;
struct s_CmdTabEntry *pcte = csystem_data->cmd_table->e;
int32_t i;
for(i = 0; i < csystem_data->cmd_table->Nentries; i++, pcte++)
{
if(cmd[1] == pcte->cmd)
{
*rlen = pcte->len;
*rmode = pcte->mode;
return 1;
}
}
return 0;
}
int32_t cmd_exists(struct s_reader *reader, const uint8_t *cmd)
{
struct videoguard_data *csystem_data = reader->csystem_data;
struct s_CmdTabEntry *pcte = csystem_data->cmd_table->e;
int32_t i;
for(i = 0; i < csystem_data->cmd_table->Nentries; i++, pcte++)
{
if(cmd[1] == pcte->cmd)
{
return 1;
}
}
return 0;
}
int32_t read_cmd_len(struct s_reader *reader, const uint8_t *cmd)
{
def_resp;
uint8_t cmd2[5];
memcpy(cmd2, cmd, 5);
if(cmd2[0] == 0xD3) // use classD1 for length request of classD3
{
cmd2[0] = 0xD1;
}
cmd2[3] |= 0x80;
cmd2[4] = 1;
uint8_t rxbuff[8];
memcpy(rxbuff, cmd2, 5);
// some card reply with L 91 00 (L being the command length).
if(!write_cmd_vg(cmd2, NULL) || !status_ok(cta_res + 1) || cta_res[0] == 0)
{
if(cta_res[0] == 0) // some cards reply len=0x00 for not supported ins
{
rdr_log_dbg(reader, D_READER, "failed to read %02x%02x cmd length (%02x %02x)",
cmd[1], cmd[2], cta_res[1], cta_res[2]);
}
else // others reply only status byte
{
rdr_log_dbg(reader, D_READER, "failed to read %02x%02x cmd length (%02x %02x)",
cmd[1], cmd[2], cta_res[0], cta_res[1]);
}
memcpy(rxbuff + 5, cta_res, 3);
cCamCryptVG_PostProcess_Decrypt(reader, rxbuff);
return -1;
}
memcpy(rxbuff + 5, cta_res, 3);
cCamCryptVG_PostProcess_Decrypt(reader, rxbuff);
return cta_res[0];
}
int32_t do_cmd(struct s_reader *reader, const uint8_t *ins, const uint8_t *txbuff, uint8_t *rxbuff, uint8_t *cta_res)
{
uint16_t cta_lr;
uint8_t ins2[5];
memcpy(ins2, ins, 5);
uint8_t len = 0, mode = 0;
if(cmd_table_get_info(reader, ins2, &len, &mode))
{
if(len == 0xFF && mode == 2)
{
if(ins2[4] == 0)
{
ins2[4] = len = read_cmd_len(reader, ins2);
if(len == 0xFF)
{
return -1;
}
}
}
else if((mode != 0) && ((ins2[3] != 0x7f) && (ins2[4] != 0x02)))
{
ins2[4] = len;
}
}
if(ins2[0] == 0xd3)
{
if(ins2[4] == 0)
{
return 0;
}
ins2[4] += 16;
}
len = ins2[4];
uint8_t tmp[264];
if(rxbuff == NULL)
{
rxbuff = tmp;
}
if(mode > 1)
{
if(!write_cmd_vg(ins2, NULL) || !status_ok(cta_res + len))
{
return -1;
}
memcpy(rxbuff, ins2, 5);
memcpy(rxbuff + 5, cta_res, len);
memcpy(rxbuff + 5 + len, cta_res + len, 2);
}
else
{
if(!write_cmd_vg(ins2, txbuff) || !status_ok(cta_res))
{
return -2;
}
memcpy(rxbuff, ins2, 5);
memcpy(rxbuff + 5, txbuff, len);
memcpy(rxbuff + 5 + len, cta_res, 2);
}
cCamCryptVG_PostProcess_Decrypt(reader, rxbuff);
if(ins2[0] == 0xd3)
{
rdr_log_dump_dbg(reader, D_READER, rxbuff + 5, rxbuff[4], "Decrypted payload");
}
return len;
}
int32_t videoguard_do_rawcmd(struct s_reader *reader, CMD_PACKET *cp)
{
int32_t rc;
unsigned char cta_res[CTA_RES_LEN];
memset(cta_res, 0, sizeof(cta_res));
reader->last_poll = time(0); // keep videoguard2_poll_status at bay, because it hurts consecutive commands
rc = do_cmd(reader, cp->cmd, &cp->cmd[5], NULL, cta_res);
return rc;
}
void rev_startdate_calc_tm(const uint8_t *Date, struct tm *timeinfo, int32_t startdate_base_month, int32_t startdate_base_year)
{
timeinfo->tm_year = Date[0] / 12 + startdate_base_year - 1900; // tm year starts at 1900
timeinfo->tm_mon = (Date[0] % 12) + (startdate_base_month - 1); // tm month starts with 0
timeinfo->tm_mday = Date[1] & 0x1f;
timeinfo->tm_hour = Date[2] / 8;
timeinfo->tm_min = (0x100 * (Date[2] - timeinfo->tm_hour * 8) + Date[3]) / 32;
timeinfo->tm_sec = (Date[3] - timeinfo->tm_min * 32) * 2;
}
void rev_expiredate_calc_tm(const uint8_t *Date, struct tm *timeinfo, int32_t expiredate_base_month, int32_t expiredate_base_year)
{
timeinfo->tm_year = Date[0] / 12 + expiredate_base_year - 1900; // tm year starts at 1900
timeinfo->tm_mon = (Date[0] % 12) + (expiredate_base_month - 1); // tm month starts with 0
timeinfo->tm_mday = Date[1] & 0x1f;
timeinfo->tm_hour = Date[2] / 8;
timeinfo->tm_min = (0x100 * (Date[2] - timeinfo->tm_hour * 8) + Date[3]) / 32;
timeinfo->tm_sec = (Date[3] - timeinfo->tm_min * 32) * 2;
}
int32_t videoguard_get_emm_type(EMM_PACKET *ep, struct s_reader *rdr)
{
int32_t i;
int32_t serial_count = ((ep->emm[3] >> 4) & 3) + 1;
int32_t serial_len = (ep->emm[3] & 0x80) ? 3 : 4;
uint8_t emmtype = (ep->emm[3] & VG_EMMTYPE_MASK) >> 6;
switch(emmtype)
{
case VG_EMMTYPE_G:
rdr_log_dbg(rdr, D_EMM, "GLOBAL");
ep->type = GLOBAL;
return 1;
case VG_EMMTYPE_U:
case VG_EMMTYPE_S:
rdr_log_dbg(rdr, D_EMM, "%s", (emmtype == VG_EMMTYPE_U) ? "UNIQUE" : "SHARED");
ep->type = emmtype;
if(ep->emm[1] == 0) // detected UNIQUE EMM from cccam (there is no serial)
{
rdr_log_dbg(rdr, D_EMM, "CCCam unique EMM detected, no serial available, skipping filter check");
ep->skip_filter_check = 1;
return 1;
}
for(i = 0; i < serial_count; i++)
{
if(!memcmp(&ep->emm[i * 4 + 4], rdr->hexserial + 2, serial_len))
{
memcpy(ep->hexserial, &ep->emm[i * 4 + 4], serial_len);
return 1;
}
}
return 0; // if UNIQUE or SHARED but no serial match return FALSE
default:
// remote emm without serial
rdr_log_dbg(rdr, D_EMM, "UNKNOWN");
ep->type = UNKNOWN;
return 1;
}
}
int32_t videoguard_do_emm(struct s_reader *reader, EMM_PACKET *ep, uint8_t CLA, void (*read_tiers)(struct s_reader *),
int32_t (*docmd)(struct s_reader *, const uint8_t *ins, const uint8_t *txbuff, uint8_t *rxbuff, uint8_t *cta_res))
{
uint8_t cta_res[CTA_RES_LEN];
uint8_t ins42[5] = { CLA, 0x42, 0x00, 0x00, 0xFF };
uint8_t *EmmIrdHeader;
int32_t rc = SKIPPED;
int32_t nsubs = ((ep->emm[3] & 0x30) >> 4) + 1;
int32_t offs = 4;
int32_t emmv2 = 0;
int32_t position, ua_position = -1;
int32_t serial_len = (ep->type == SHARED) ? 3 : 4;
int32_t vdrsc_fix = 0;
if(ep->type == UNIQUE || ep->type == SHARED)
{
if(ep->emm[1] == 0x00) // cccam sends emm-u without UA
{
nsubs = 1;
ua_position = 0;
}
else
{
int32_t i;
for(i = 0; i < nsubs; ++i)
{
if(memcmp(&ep->emm[4 + i * 4], &reader->hexserial[2], serial_len) == 0)
{
ua_position = i;
break;
}
}
offs += nsubs * 4;
}
if(ua_position == -1)
{
return ERROR;
}
}
if(ep->emm[offs] == 0x00 && (ep->emm[offs + 1] == 0x00 || ep->emm[offs + 1] == 0x01)) // unmodified emm from dvbapi
{
emmv2 = ep->emm[offs + 1];
offs += 2 + 1 + emmv2; // skip sub-emm len (2 bytes sub-emm len if 0x01);
}
for(position = 0; position < nsubs && offs + 2 < ep->emmlen; ++position)
{
if(ep->emm[offs] > 0x07) // workaround for mgcamd and emmv2
{
++offs;
}
if(ep->emm[offs] == 0x02 || ep->emm[offs] == 0x03 || ep->emm[offs] == 0x07)
{
if(ep->emm[offs+1] != 0) // Checksum test for sub-packets emm:
{
EmmIrdHeader = ep->emm + offs; // example:
int32_t chk; // 827097300000
chk = checksum_ok(EmmIrdHeader); // D002 0602C317ABA02F 1690144004A6... chk=2F
if (chk != 1) // D607 0E03A3010325070102810002000778 1B90154004A9... chk=78
{ // D607 0E03A301032507010281000200097A 1B9015400441... chk=7A
return rc;
}
}
if(ep->emm[offs] == 0x03)
{
if(position == ua_position || vdrsc_fix)
{
videoguard_mail_msg(reader, &ep->emm[offs + 2]);
return rc;
}
else
{
offs += ep->emm[offs + 1] + 2;
if(!(offs + 1 < ep->emmlen))
{
return rc;
}
if(ep->emm[offs] == 0x00 && (ep->emm[offs + 1] == 0x00 || ep->emm[offs + 1] == 0x01))
{
offs += 2 + 1 + emmv2;
}
continue;
}
}
offs += ep->emm[offs + 1] + 2;
if(!(offs + 1 < ep->emmlen))
{
return rc;
}
if(ep->emm[offs] != 0)
{
if(ep->type == GLOBAL || vdrsc_fix || position == ua_position)
{
ins42[4] = ep->emm[offs];
int32_t l = (*docmd)(reader, ins42, &ep->emm[offs + 1], NULL, cta_res);
rc = (l > 0 && status_ok(cta_res)) ? OK : ERROR;
rdr_log_dbg(reader, D_EMM, "request return code : %02X%02X", cta_res[0], cta_res[1]);
if(status_ok(cta_res) && (cta_res[1] & 0x01))
{
(*read_tiers)(reader);
}
}
offs += ep->emm[offs] + 1;
if(offs < ep->emmlen && ep->emm[offs] == 0x00)
{
++offs;
}
}
offs += 1 + emmv2;
if(vdrsc_fix)
{
--position;
}
}
else
{
return rc;
}
}
return rc;
}
uint8_t videoguard_get_emm_filter_address_byte(uint8_t isUnique, uint32_t n)
{
uint8_t ret;
switch(n)
{
default:
case 0:
// do not filter by sub-emm count
ret = 0;
break;
case 1:
// unused
// here we would need two filters,
// one with sub-emm count 1x, and one with 01
ret = 0x10;
break;
case 2:
// filter sub-emm count with 1x
ret = 0x20;
break;
case 3:
// filter sub-emm count with 11
ret = 0x30;
break;
}
if(isUnique)
{
ret |= 0x40;
}
else //shared
{
ret |= 0x80;
}
return ret;
}
uint8_t videoguard_get_emm_filter_address_mask(uint32_t n)
{
uint8_t ret = 0xC0;
switch(n)
{
default:
case 0:
// at least 1 sub-emm is always present, so we do not care
break;
case 1:
// must have 2 sub-emms or more (01, 10, 11, but not 00)
// we could create a 1x and 01 filter here,
// but atm we do not care, to keep the filter number low
break;
case 2:
// must have 3 sub-emms or more (10, 11, but not 00, 01)
ret |= 0x20;
break;
case 3:
// must have 4 sub-emms (11)
ret |= 0x30;
break;
}
return ret;
}
int32_t videoguard_get_emm_filter(struct s_reader *rdr, struct s_csystem_emm_filter **emm_filters, unsigned int *filter_count)
{
if(*emm_filters == NULL)
{
const unsigned int max_filter_count = 7;
if(!cs_malloc(emm_filters, max_filter_count * sizeof(struct s_csystem_emm_filter)))
{
return ERROR;
}
struct s_csystem_emm_filter *filters = *emm_filters;
*filter_count = 0;
int32_t idx = 0;
uint32_t n;
for(n = 0; n < 3; ++n)
{
filters[idx].type = EMM_UNIQUE;
filters[idx].enabled = 1;
filters[idx].filter[0] = 0x82;
filters[idx].mask[0] = 0xFF;
filters[idx].filter[1] = videoguard_get_emm_filter_address_byte(1, n);
filters[idx].mask[1] = videoguard_get_emm_filter_address_mask(n);
memcpy(&filters[idx].filter[2 + 4 * n], rdr->hexserial + 2, 4);
memset(&filters[idx].mask[2 + 4 * n], 0xFF, 4);
idx++;
}
// fourth serial position does not fit within the 16bytes demux filter
for(n = 0; n < 3; ++n)
{
filters[idx].type = EMM_SHARED;
filters[idx].enabled = 1;
filters[idx].filter[0] = 0x82;
filters[idx].mask[0] = 0xFF;
filters[idx].filter[1] = videoguard_get_emm_filter_address_byte(0, n);
filters[idx].mask[1] = videoguard_get_emm_filter_address_mask(n);
memcpy(&filters[idx].filter[2 + 4 * n], rdr->hexserial + 2, 3);
memset(&filters[idx].mask[2 + 4 * n], 0xFF, 3);
idx++;
}
// fourth serial position does not fit within the 16bytes demux filter
filters[idx].type = EMM_GLOBAL;
filters[idx].enabled = 1;
filters[idx].filter[0] = 0x82;
filters[idx].mask[0] = 0xFF;
filters[idx].filter[1] = 0x00;
filters[idx].mask[1] = 0xC0;
idx++;
*filter_count = idx;
}
return OK;
}
static MAILMSG *find_msg(uint16_t caid, uint32_t serial, uint16_t date, uint16_t msg_id)
{
MAILMSG *msg;
LL_ITER it = ll_iter_create(vg_msgs);
while((msg = (MAILMSG *)ll_iter_next(&it)))
{
if(msg->caid == caid && msg->serial == serial && msg->date == date && msg->id == msg_id)
{
return msg;
}
}
return 0;
}
static void write_msg(struct s_reader *reader, MAILMSG *msg, uint32_t basemonth, uint32_t baseyear)
{
FILE *fp = fopen(cfg.mailfile, "a");
if(fp == 0)
{
rdr_log(reader, "Cannot open mailfile %s", cfg.mailfile);
return;
}
uint16_t i;
for(i = 0; i < msg->len - 1; ++i)
{
if(msg->message[i] == 0x00 && msg->message[i + 1] == 0x32)
{
msg->subject = &msg->message[i + 3];
break;
}
}
int32_t year = (msg->date >> 8) / 12 + baseyear;
int32_t mon = ((msg->date >> 8) % 12) + (basemonth - 1) + 1;
int32_t day = msg->date & 0x1f;
fprintf(fp, "%04X:%08X:%02d/%02d/%04d:%04X:\"%s\":\"%s\"\n",
msg->caid,
msg->serial,
day,
mon,
year,
msg->id,
msg->subject,
msg->message);
fclose(fp);
NULLFREE(msg->message);
msg->message = msg->subject = 0;
msg->written = 1;
}
static void msgs_init(uint32_t basemonth, uint32_t baseyear)
{
vg_msgs = ll_create("vg_msgs");
FILE *fp = fopen(cfg.mailfile, "r");
if(fp == 0)
{
return;
}
int32_t year, mon, day;
char buffer[2048];
while(fgets(buffer, sizeof(buffer), fp))
{
MAILMSG *msg;
if(!cs_malloc(&msg, sizeof(MAILMSG)))
{
fclose(fp);
return;
}
sscanf(buffer, "%04hX:%08X:%02d/%02d/%04d:%04hX", &msg->caid, &msg->serial, &day, &mon, &year, &msg->id);
year -= baseyear;
mon += basemonth - 1;
msg->date = ((year * 12) + mon - 1) << 8 | day;
msg->message = msg->subject = 0;
msg->written = 1;
ll_append(vg_msgs, msg);
}
fclose(fp);
}
void videoguard_mail_msg(struct s_reader *rdr, uint8_t *data)
{
if(cfg.disablemail)
{
return;
}
if(vg_msgs == 0)
{
msgs_init(rdr->card_expiredate_basemonth, rdr->card_expiredate_baseyear);
}
if(data[0] != 0xFF || data[1] != 0xFF)
{
return;
}
uint16_t msg_id = (data[2] << 8) | data[3];
uint8_t idx = data[4] & 0x0F;
int32_t msg_size = data[5] * 10 + 2;
uint16_t date = (data[9] << 8) | data[10];
int32_t submsg_len = data[12] - 2;
uint16_t submsg_idx = (data[13] << 8) | data[14];
uint32_t serial = (rdr->hexserial[2] << 24) | (rdr->hexserial[3] << 16) | (rdr->hexserial[4] << 8) | rdr->hexserial[5];
MAILMSG *msg = find_msg(rdr->caid, serial, date, msg_id);
if(msg == 0)
{
if(!cs_malloc(&msg, sizeof(MAILMSG)))
{
return;
}
msg->caid = rdr->caid;
msg->serial = serial;
msg->date = date;
msg->id = msg_id;
msg->nsubs = (data[4] & 0xF0) >> 4;
msg->mask = 1 << idx;
msg->written = 0;
msg->len = submsg_len;
if(!cs_malloc(&msg->message, msg_size))
{
NULLFREE(msg);
return;
}
memset(msg->message, 0, msg_size);
memcpy(&msg->message[submsg_idx], &data[15], submsg_len);
msg->subject = 0;
ll_append(vg_msgs, msg);
}
else
{
if(msg->written == 1 || msg->mask & (1 << idx))
{
return;
}
msg->mask |= 1 << idx;
msg->len += submsg_len;
memcpy(&msg->message[submsg_idx], &data[15], submsg_len);
}
if(msg->mask == (1 << msg->nsubs) - 1)
{
write_msg(rdr, msg, rdr->card_expiredate_basemonth, rdr->card_expiredate_baseyear);
}
}
#endif