diff --git a/.gitmodules b/.gitmodules
new file mode 100644
index 0000000..f04abcd
--- /dev/null
+++ b/.gitmodules
@@ -0,0 +1,6 @@
+[submodule "FabAccessAPI/schema"]
+ path = FabAccessAPI/schema
+ url = https://gitlab.com/fabinfra/fabaccess/fabaccess-api.git
+[submodule "external/SASL"]
+ path = external/SASL
+ url = https://github.com/kjkriegel/S22.Sasl.git
diff --git a/Borepin.sln b/Borepin.sln
index 011075a..409eea6 100644
--- a/Borepin.sln
+++ b/Borepin.sln
@@ -9,12 +9,22 @@ Project("{FAE04EC0-301F-11D3-BF4B-00C04F79EFBC}") = "Borepin.Android", "Borepin\
EndProject
Project("{FAE04EC0-301F-11D3-BF4B-00C04F79EFBC}") = "Borepin.iOS", "Borepin\Borepin.iOS\Borepin.iOS.csproj", "{9985ED2B-0642-4DAC-98C3-F546196A1E36}"
EndProject
-Project("{FAE04EC0-301F-11D3-BF4B-00C04F79EFBC}") = "Borepin", "Borepin\Borepin\Borepin.csproj", "{F93856BD-0C8D-4469-A8DB-6E513002BFD7}"
+Project("{9A19103F-16F7-4668-BE54-9A1E7A4F7556}") = "Borepin", "Borepin\Borepin\Borepin.csproj", "{F93856BD-0C8D-4469-A8DB-6E513002BFD7}"
EndProject
Project("{FAE04EC0-301F-11D3-BF4B-00C04F79EFBC}") = "Borepin.GTK", "Borepin\Borepin.GTK\Borepin.GTK.csproj", "{61D956D2-5819-4736-BBD8-AD8208DE6A62}"
EndProject
Project("{FAE04EC0-301F-11D3-BF4B-00C04F79EFBC}") = "Borepin.macOS", "Borepin\Borepin.macOS\Borepin.macOS.csproj", "{3EC23FE7-395E-4BBC-B56B-9455354BDA34}"
EndProject
+Project("{9A19103F-16F7-4668-BE54-9A1E7A4F7556}") = "NFC_Test", "NFC_Test\NFC_Test.csproj", "{41EC0C17-B456-42AE-89F2-79DDB8ED9858}"
+EndProject
+Project("{9A19103F-16F7-4668-BE54-9A1E7A4F7556}") = "NFC", "NFC\NFC.csproj", "{9C2ED2EB-D91C-4D80-9580-6A135C05AF11}"
+EndProject
+Project("{9A19103F-16F7-4668-BE54-9A1E7A4F7556}") = "FabAccessAPI", "FabAccessAPI\FabAccessAPI.csproj", "{3251FCE9-FEA3-4662-8BEB-636BE6732D48}"
+EndProject
+Project("{9A19103F-16F7-4668-BE54-9A1E7A4F7556}") = "S22.Sasl", "external\SASL\S22.Sasl.csproj", "{7FEC3D5E-C240-41B6-BBFA-895C4F4D45CA}"
+EndProject
+Project("{FAE04EC0-301F-11D3-BF4B-00C04F79EFBC}") = "FabAccessAPI_Test", "FabAccessAPI_Test\FabAccessAPI_Test.csproj", "{1C85978A-9FC0-4064-8399-FA2455C5EC2A}"
+EndProject
Global
GlobalSection(SolutionConfigurationPlatforms) = preSolution
Debug|Any CPU = Debug|Any CPU
@@ -223,6 +233,126 @@ Global
{3EC23FE7-395E-4BBC-B56B-9455354BDA34}.Release|x64.Build.0 = Release|Any CPU
{3EC23FE7-395E-4BBC-B56B-9455354BDA34}.Release|x86.ActiveCfg = Release|Any CPU
{3EC23FE7-395E-4BBC-B56B-9455354BDA34}.Release|x86.Build.0 = Release|Any CPU
+ {41EC0C17-B456-42AE-89F2-79DDB8ED9858}.Debug|Any CPU.ActiveCfg = Debug|Any CPU
+ {41EC0C17-B456-42AE-89F2-79DDB8ED9858}.Debug|Any CPU.Build.0 = Debug|Any CPU
+ {41EC0C17-B456-42AE-89F2-79DDB8ED9858}.Debug|ARM.ActiveCfg = Debug|Any CPU
+ {41EC0C17-B456-42AE-89F2-79DDB8ED9858}.Debug|ARM.Build.0 = Debug|Any CPU
+ {41EC0C17-B456-42AE-89F2-79DDB8ED9858}.Debug|iPhone.ActiveCfg = Debug|Any CPU
+ {41EC0C17-B456-42AE-89F2-79DDB8ED9858}.Debug|iPhone.Build.0 = Debug|Any CPU
+ {41EC0C17-B456-42AE-89F2-79DDB8ED9858}.Debug|iPhoneSimulator.ActiveCfg = Debug|Any CPU
+ {41EC0C17-B456-42AE-89F2-79DDB8ED9858}.Debug|iPhoneSimulator.Build.0 = Debug|Any CPU
+ {41EC0C17-B456-42AE-89F2-79DDB8ED9858}.Debug|x64.ActiveCfg = Debug|Any CPU
+ {41EC0C17-B456-42AE-89F2-79DDB8ED9858}.Debug|x64.Build.0 = Debug|Any CPU
+ {41EC0C17-B456-42AE-89F2-79DDB8ED9858}.Debug|x86.ActiveCfg = Debug|Any CPU
+ {41EC0C17-B456-42AE-89F2-79DDB8ED9858}.Debug|x86.Build.0 = Debug|Any CPU
+ {41EC0C17-B456-42AE-89F2-79DDB8ED9858}.Release|Any CPU.ActiveCfg = Release|Any CPU
+ {41EC0C17-B456-42AE-89F2-79DDB8ED9858}.Release|Any CPU.Build.0 = Release|Any CPU
+ {41EC0C17-B456-42AE-89F2-79DDB8ED9858}.Release|ARM.ActiveCfg = Release|Any CPU
+ {41EC0C17-B456-42AE-89F2-79DDB8ED9858}.Release|ARM.Build.0 = Release|Any CPU
+ {41EC0C17-B456-42AE-89F2-79DDB8ED9858}.Release|iPhone.ActiveCfg = Release|Any CPU
+ {41EC0C17-B456-42AE-89F2-79DDB8ED9858}.Release|iPhone.Build.0 = Release|Any CPU
+ {41EC0C17-B456-42AE-89F2-79DDB8ED9858}.Release|iPhoneSimulator.ActiveCfg = Release|Any CPU
+ {41EC0C17-B456-42AE-89F2-79DDB8ED9858}.Release|iPhoneSimulator.Build.0 = Release|Any CPU
+ {41EC0C17-B456-42AE-89F2-79DDB8ED9858}.Release|x64.ActiveCfg = Release|Any CPU
+ {41EC0C17-B456-42AE-89F2-79DDB8ED9858}.Release|x64.Build.0 = Release|Any CPU
+ {41EC0C17-B456-42AE-89F2-79DDB8ED9858}.Release|x86.ActiveCfg = Release|Any CPU
+ {41EC0C17-B456-42AE-89F2-79DDB8ED9858}.Release|x86.Build.0 = Release|Any CPU
+ {9C2ED2EB-D91C-4D80-9580-6A135C05AF11}.Debug|Any CPU.ActiveCfg = Debug|Any CPU
+ {9C2ED2EB-D91C-4D80-9580-6A135C05AF11}.Debug|Any CPU.Build.0 = Debug|Any CPU
+ {9C2ED2EB-D91C-4D80-9580-6A135C05AF11}.Debug|ARM.ActiveCfg = Debug|Any CPU
+ {9C2ED2EB-D91C-4D80-9580-6A135C05AF11}.Debug|ARM.Build.0 = Debug|Any CPU
+ {9C2ED2EB-D91C-4D80-9580-6A135C05AF11}.Debug|iPhone.ActiveCfg = Debug|Any CPU
+ {9C2ED2EB-D91C-4D80-9580-6A135C05AF11}.Debug|iPhone.Build.0 = Debug|Any CPU
+ {9C2ED2EB-D91C-4D80-9580-6A135C05AF11}.Debug|iPhoneSimulator.ActiveCfg = Debug|Any CPU
+ {9C2ED2EB-D91C-4D80-9580-6A135C05AF11}.Debug|iPhoneSimulator.Build.0 = Debug|Any CPU
+ {9C2ED2EB-D91C-4D80-9580-6A135C05AF11}.Debug|x64.ActiveCfg = Debug|Any CPU
+ {9C2ED2EB-D91C-4D80-9580-6A135C05AF11}.Debug|x64.Build.0 = Debug|Any CPU
+ {9C2ED2EB-D91C-4D80-9580-6A135C05AF11}.Debug|x86.ActiveCfg = Debug|Any CPU
+ {9C2ED2EB-D91C-4D80-9580-6A135C05AF11}.Debug|x86.Build.0 = Debug|Any CPU
+ {9C2ED2EB-D91C-4D80-9580-6A135C05AF11}.Release|Any CPU.ActiveCfg = Release|Any CPU
+ {9C2ED2EB-D91C-4D80-9580-6A135C05AF11}.Release|Any CPU.Build.0 = Release|Any CPU
+ {9C2ED2EB-D91C-4D80-9580-6A135C05AF11}.Release|ARM.ActiveCfg = Release|Any CPU
+ {9C2ED2EB-D91C-4D80-9580-6A135C05AF11}.Release|ARM.Build.0 = Release|Any CPU
+ {9C2ED2EB-D91C-4D80-9580-6A135C05AF11}.Release|iPhone.ActiveCfg = Release|Any CPU
+ {9C2ED2EB-D91C-4D80-9580-6A135C05AF11}.Release|iPhone.Build.0 = Release|Any CPU
+ {9C2ED2EB-D91C-4D80-9580-6A135C05AF11}.Release|iPhoneSimulator.ActiveCfg = Release|Any CPU
+ {9C2ED2EB-D91C-4D80-9580-6A135C05AF11}.Release|iPhoneSimulator.Build.0 = Release|Any CPU
+ {9C2ED2EB-D91C-4D80-9580-6A135C05AF11}.Release|x64.ActiveCfg = Release|Any CPU
+ {9C2ED2EB-D91C-4D80-9580-6A135C05AF11}.Release|x64.Build.0 = Release|Any CPU
+ {9C2ED2EB-D91C-4D80-9580-6A135C05AF11}.Release|x86.ActiveCfg = Release|Any CPU
+ {9C2ED2EB-D91C-4D80-9580-6A135C05AF11}.Release|x86.Build.0 = Release|Any CPU
+ {3251FCE9-FEA3-4662-8BEB-636BE6732D48}.Debug|Any CPU.ActiveCfg = Debug|Any CPU
+ {3251FCE9-FEA3-4662-8BEB-636BE6732D48}.Debug|Any CPU.Build.0 = Debug|Any CPU
+ {3251FCE9-FEA3-4662-8BEB-636BE6732D48}.Debug|ARM.ActiveCfg = Debug|Any CPU
+ {3251FCE9-FEA3-4662-8BEB-636BE6732D48}.Debug|ARM.Build.0 = Debug|Any CPU
+ {3251FCE9-FEA3-4662-8BEB-636BE6732D48}.Debug|iPhone.ActiveCfg = Debug|Any CPU
+ {3251FCE9-FEA3-4662-8BEB-636BE6732D48}.Debug|iPhone.Build.0 = Debug|Any CPU
+ {3251FCE9-FEA3-4662-8BEB-636BE6732D48}.Debug|iPhoneSimulator.ActiveCfg = Debug|Any CPU
+ {3251FCE9-FEA3-4662-8BEB-636BE6732D48}.Debug|iPhoneSimulator.Build.0 = Debug|Any CPU
+ {3251FCE9-FEA3-4662-8BEB-636BE6732D48}.Debug|x64.ActiveCfg = Debug|Any CPU
+ {3251FCE9-FEA3-4662-8BEB-636BE6732D48}.Debug|x64.Build.0 = Debug|Any CPU
+ {3251FCE9-FEA3-4662-8BEB-636BE6732D48}.Debug|x86.ActiveCfg = Debug|Any CPU
+ {3251FCE9-FEA3-4662-8BEB-636BE6732D48}.Debug|x86.Build.0 = Debug|Any CPU
+ {3251FCE9-FEA3-4662-8BEB-636BE6732D48}.Release|Any CPU.ActiveCfg = Release|Any CPU
+ {3251FCE9-FEA3-4662-8BEB-636BE6732D48}.Release|Any CPU.Build.0 = Release|Any CPU
+ {3251FCE9-FEA3-4662-8BEB-636BE6732D48}.Release|ARM.ActiveCfg = Release|Any CPU
+ {3251FCE9-FEA3-4662-8BEB-636BE6732D48}.Release|ARM.Build.0 = Release|Any CPU
+ {3251FCE9-FEA3-4662-8BEB-636BE6732D48}.Release|iPhone.ActiveCfg = Release|Any CPU
+ {3251FCE9-FEA3-4662-8BEB-636BE6732D48}.Release|iPhone.Build.0 = Release|Any CPU
+ {3251FCE9-FEA3-4662-8BEB-636BE6732D48}.Release|iPhoneSimulator.ActiveCfg = Release|Any CPU
+ {3251FCE9-FEA3-4662-8BEB-636BE6732D48}.Release|iPhoneSimulator.Build.0 = Release|Any CPU
+ {3251FCE9-FEA3-4662-8BEB-636BE6732D48}.Release|x64.ActiveCfg = Release|Any CPU
+ {3251FCE9-FEA3-4662-8BEB-636BE6732D48}.Release|x64.Build.0 = Release|Any CPU
+ {3251FCE9-FEA3-4662-8BEB-636BE6732D48}.Release|x86.ActiveCfg = Release|Any CPU
+ {3251FCE9-FEA3-4662-8BEB-636BE6732D48}.Release|x86.Build.0 = Release|Any CPU
+ {7FEC3D5E-C240-41B6-BBFA-895C4F4D45CA}.Debug|Any CPU.ActiveCfg = Debug|Any CPU
+ {7FEC3D5E-C240-41B6-BBFA-895C4F4D45CA}.Debug|Any CPU.Build.0 = Debug|Any CPU
+ {7FEC3D5E-C240-41B6-BBFA-895C4F4D45CA}.Debug|ARM.ActiveCfg = Debug|Any CPU
+ {7FEC3D5E-C240-41B6-BBFA-895C4F4D45CA}.Debug|ARM.Build.0 = Debug|Any CPU
+ {7FEC3D5E-C240-41B6-BBFA-895C4F4D45CA}.Debug|iPhone.ActiveCfg = Debug|Any CPU
+ {7FEC3D5E-C240-41B6-BBFA-895C4F4D45CA}.Debug|iPhone.Build.0 = Debug|Any CPU
+ {7FEC3D5E-C240-41B6-BBFA-895C4F4D45CA}.Debug|iPhoneSimulator.ActiveCfg = Debug|Any CPU
+ {7FEC3D5E-C240-41B6-BBFA-895C4F4D45CA}.Debug|iPhoneSimulator.Build.0 = Debug|Any CPU
+ {7FEC3D5E-C240-41B6-BBFA-895C4F4D45CA}.Debug|x64.ActiveCfg = Debug|Any CPU
+ {7FEC3D5E-C240-41B6-BBFA-895C4F4D45CA}.Debug|x64.Build.0 = Debug|Any CPU
+ {7FEC3D5E-C240-41B6-BBFA-895C4F4D45CA}.Debug|x86.ActiveCfg = Debug|Any CPU
+ {7FEC3D5E-C240-41B6-BBFA-895C4F4D45CA}.Debug|x86.Build.0 = Debug|Any CPU
+ {7FEC3D5E-C240-41B6-BBFA-895C4F4D45CA}.Release|Any CPU.ActiveCfg = Release|Any CPU
+ {7FEC3D5E-C240-41B6-BBFA-895C4F4D45CA}.Release|Any CPU.Build.0 = Release|Any CPU
+ {7FEC3D5E-C240-41B6-BBFA-895C4F4D45CA}.Release|ARM.ActiveCfg = Release|Any CPU
+ {7FEC3D5E-C240-41B6-BBFA-895C4F4D45CA}.Release|ARM.Build.0 = Release|Any CPU
+ {7FEC3D5E-C240-41B6-BBFA-895C4F4D45CA}.Release|iPhone.ActiveCfg = Release|Any CPU
+ {7FEC3D5E-C240-41B6-BBFA-895C4F4D45CA}.Release|iPhone.Build.0 = Release|Any CPU
+ {7FEC3D5E-C240-41B6-BBFA-895C4F4D45CA}.Release|iPhoneSimulator.ActiveCfg = Release|Any CPU
+ {7FEC3D5E-C240-41B6-BBFA-895C4F4D45CA}.Release|iPhoneSimulator.Build.0 = Release|Any CPU
+ {7FEC3D5E-C240-41B6-BBFA-895C4F4D45CA}.Release|x64.ActiveCfg = Release|Any CPU
+ {7FEC3D5E-C240-41B6-BBFA-895C4F4D45CA}.Release|x64.Build.0 = Release|Any CPU
+ {7FEC3D5E-C240-41B6-BBFA-895C4F4D45CA}.Release|x86.ActiveCfg = Release|Any CPU
+ {7FEC3D5E-C240-41B6-BBFA-895C4F4D45CA}.Release|x86.Build.0 = Release|Any CPU
+ {1C85978A-9FC0-4064-8399-FA2455C5EC2A}.Debug|Any CPU.ActiveCfg = Debug|Any CPU
+ {1C85978A-9FC0-4064-8399-FA2455C5EC2A}.Debug|Any CPU.Build.0 = Debug|Any CPU
+ {1C85978A-9FC0-4064-8399-FA2455C5EC2A}.Debug|ARM.ActiveCfg = Debug|Any CPU
+ {1C85978A-9FC0-4064-8399-FA2455C5EC2A}.Debug|ARM.Build.0 = Debug|Any CPU
+ {1C85978A-9FC0-4064-8399-FA2455C5EC2A}.Debug|iPhone.ActiveCfg = Debug|Any CPU
+ {1C85978A-9FC0-4064-8399-FA2455C5EC2A}.Debug|iPhone.Build.0 = Debug|Any CPU
+ {1C85978A-9FC0-4064-8399-FA2455C5EC2A}.Debug|iPhoneSimulator.ActiveCfg = Debug|Any CPU
+ {1C85978A-9FC0-4064-8399-FA2455C5EC2A}.Debug|iPhoneSimulator.Build.0 = Debug|Any CPU
+ {1C85978A-9FC0-4064-8399-FA2455C5EC2A}.Debug|x64.ActiveCfg = Debug|Any CPU
+ {1C85978A-9FC0-4064-8399-FA2455C5EC2A}.Debug|x64.Build.0 = Debug|Any CPU
+ {1C85978A-9FC0-4064-8399-FA2455C5EC2A}.Debug|x86.ActiveCfg = Debug|Any CPU
+ {1C85978A-9FC0-4064-8399-FA2455C5EC2A}.Debug|x86.Build.0 = Debug|Any CPU
+ {1C85978A-9FC0-4064-8399-FA2455C5EC2A}.Release|Any CPU.ActiveCfg = Release|Any CPU
+ {1C85978A-9FC0-4064-8399-FA2455C5EC2A}.Release|Any CPU.Build.0 = Release|Any CPU
+ {1C85978A-9FC0-4064-8399-FA2455C5EC2A}.Release|ARM.ActiveCfg = Release|Any CPU
+ {1C85978A-9FC0-4064-8399-FA2455C5EC2A}.Release|ARM.Build.0 = Release|Any CPU
+ {1C85978A-9FC0-4064-8399-FA2455C5EC2A}.Release|iPhone.ActiveCfg = Release|Any CPU
+ {1C85978A-9FC0-4064-8399-FA2455C5EC2A}.Release|iPhone.Build.0 = Release|Any CPU
+ {1C85978A-9FC0-4064-8399-FA2455C5EC2A}.Release|iPhoneSimulator.ActiveCfg = Release|Any CPU
+ {1C85978A-9FC0-4064-8399-FA2455C5EC2A}.Release|iPhoneSimulator.Build.0 = Release|Any CPU
+ {1C85978A-9FC0-4064-8399-FA2455C5EC2A}.Release|x64.ActiveCfg = Release|Any CPU
+ {1C85978A-9FC0-4064-8399-FA2455C5EC2A}.Release|x64.Build.0 = Release|Any CPU
+ {1C85978A-9FC0-4064-8399-FA2455C5EC2A}.Release|x86.ActiveCfg = Release|Any CPU
+ {1C85978A-9FC0-4064-8399-FA2455C5EC2A}.Release|x86.Build.0 = Release|Any CPU
EndGlobalSection
GlobalSection(SolutionProperties) = preSolution
HideSolutionNode = FALSE
diff --git a/Borepin/Borepin.GTK/Borepin.GTK.csproj b/Borepin/Borepin.GTK/Borepin.GTK.csproj
index 56ab842..c2e3526 100644
--- a/Borepin/Borepin.GTK/Borepin.GTK.csproj
+++ b/Borepin/Borepin.GTK/Borepin.GTK.csproj
@@ -10,11 +10,12 @@
Properties
Borepin.GTK
Borepin.GTK
- v4.8
+ v4.7.2
512
true
+
true
@@ -76,18 +77,21 @@
-
+
..\..\packages\Xamarin.Forms.4.8.0.1364\lib\netstandard2.0\Xamarin.Forms.Core.dll
-
+
..\..\packages\Xamarin.Forms.4.8.0.1364\lib\netstandard2.0\Xamarin.Forms.Platform.dll
-
- ..\..\packages\Xamarin.Forms.Platform.GTK.4.8.0.1364\lib\net45\Xamarin.Forms.Platform.GTK.dll
-
-
+
..\..\packages\Xamarin.Forms.4.8.0.1364\lib\netstandard2.0\Xamarin.Forms.Xaml.dll
+
+ ..\..\packages\Xamarin.Forms.Platform.GTK.4.8.0.1364\lib\net45\webkit-sharp.dll
+
+
+ ..\..\packages\Xamarin.Forms.Platform.GTK.4.8.0.1364\lib\net45\Xamarin.Forms.Platform.GTK.dll
+
@@ -106,12 +110,5 @@
-
-
- Dieses Projekt verweist auf mindestens ein NuGet-Paket, das auf diesem Computer fehlt. Verwenden Sie die Wiederherstellung von NuGet-Paketen, um die fehlenden Dateien herunterzuladen. Weitere Informationen finden Sie unter "http://go.microsoft.com/fwlink/?LinkID=322105". Die fehlende Datei ist "{0}".
-
-
-
-
\ No newline at end of file
diff --git a/Borepin/Borepin.GTK/app.config b/Borepin/Borepin.GTK/app.config
index 3c31098..5c893eb 100644
--- a/Borepin/Borepin.GTK/app.config
+++ b/Borepin/Borepin.GTK/app.config
@@ -8,4 +8,4 @@
-
\ No newline at end of file
+
diff --git a/Borepin/Borepin.GTK/packages.config b/Borepin/Borepin.GTK/packages.config
index 6088e1e..3ec538e 100644
--- a/Borepin/Borepin.GTK/packages.config
+++ b/Borepin/Borepin.GTK/packages.config
@@ -1,6 +1,6 @@
-
-
-
+
+
+
\ No newline at end of file
diff --git a/Borepin/Borepin.GTK/webkit-sharp.dll.config b/Borepin/Borepin.GTK/webkit-sharp.dll.config
index 4384801..2c002a5 100644
--- a/Borepin/Borepin.GTK/webkit-sharp.dll.config
+++ b/Borepin/Borepin.GTK/webkit-sharp.dll.config
@@ -1,5 +1,5 @@
-
-
-
-
-
+
+
+
+
+
diff --git a/Borepin/Borepin.UWP/Borepin.UWP.csproj b/Borepin/Borepin.UWP/Borepin.UWP.csproj
index cff9dad..d9a65ed 100644
--- a/Borepin/Borepin.UWP/Borepin.UWP.csproj
+++ b/Borepin/Borepin.UWP/Borepin.UWP.csproj
@@ -143,7 +143,7 @@
-
+
diff --git a/Borepin/Borepin.iOS/Borepin.iOS.csproj b/Borepin/Borepin.iOS/Borepin.iOS.csproj
index c7b44d9..ee89ac0 100644
--- a/Borepin/Borepin.iOS/Borepin.iOS.csproj
+++ b/Borepin/Borepin.iOS/Borepin.iOS.csproj
@@ -26,7 +26,7 @@
prompt
4
x86_64
- None
+ Full
true
iPhone Developer
@@ -74,36 +74,87 @@
+
+
+
false
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
+
+ false
+
+
+ false
+
+
+ false
+
+
+ false
+
+
+ false
+
+
+ false
+
+
+ false
+
+
+ false
+
+
+ false
+
+
+ false
+
+
+ false
+
+
+ false
+
+
+ false
+
+
+ false
+
+
+ false
+
+
+ false
+
+
+ false
+
+
+ false
+
+
+ false
+
+
+ false
+
+
+ false
+
+
+ false
+
+
+ false
+
+
+ false
+
@@ -123,6 +174,10 @@
{F93856BD-0C8D-4469-A8DB-6E513002BFD7}
Borepin
+
+ {9C2ED2EB-D91C-4D80-9580-6A135C05AF11}
+ NFC
+
diff --git a/Borepin/Borepin.iOS/CNFC/Card.cs b/Borepin/Borepin.iOS/CNFC/Card.cs
new file mode 100644
index 0000000..34a573f
--- /dev/null
+++ b/Borepin/Borepin.iOS/CNFC/Card.cs
@@ -0,0 +1,67 @@
+using System;
+using System.Threading;
+using CoreNFC;
+using Foundation;
+using NFC;
+using NFC.ISO7816_4;
+
+namespace Borepin.iOS.CNFC
+{
+ public class Card : ICard
+ {
+ private NFCTagReaderSession _session;
+ private INFCMiFareTag _tag;
+
+ public Card(NFCTagReaderSession session, INFCMiFareTag tag)
+ {
+ _session = session;
+ _tag = tag;
+ }
+
+ public void Connect()
+ {
+ var counter = new CountdownEvent(1);
+ NSError err = null;
+
+ _session.ConnectTo(_tag, (error) =>
+ {
+ err = error;
+ counter.Signal();
+ });
+
+ counter.Wait();
+
+ if (err != null)
+ {
+ throw new Exception(err.LocalizedDescription);
+ }
+ }
+
+ public void Disconnect()
+ {
+ // TODO: decide on which should be used
+ //_session.RestartPolling();
+ _session.InvalidateSession("card disconnect");
+ }
+
+ public APDUResponse Transmit(APDUCommand cmd)
+ {
+ var counter = new CountdownEvent(1);
+ byte[] buf = null;
+
+ _tag.SendMiFareIso7816Command(new NFCIso7816Apdu(NSData.FromArray(cmd.Data)), (response, sw1, sw2, NSError) =>
+ {
+ // reassembly the original apdu message
+ buf = new byte[response.Length + 2];
+ response.ToArray().CopyTo(buf, 0);
+ buf[response.Length + 0] = sw1;
+ buf[response.Length + 1] = sw2;
+ counter.Signal();
+ });
+
+ counter.Wait();
+
+ return new APDUResponse(buf);
+ }
+ }
+}
diff --git a/Borepin/Borepin.iOS/CNFC/Hardware.cs b/Borepin/Borepin.iOS/CNFC/Hardware.cs
new file mode 100644
index 0000000..e523b9e
--- /dev/null
+++ b/Borepin/Borepin.iOS/CNFC/Hardware.cs
@@ -0,0 +1,24 @@
+using System;
+using CoreNFC;
+using NFC;
+
+namespace Borepin.iOS.CNFC
+{
+ public class Hardware : IHardware
+ {
+ public bool IsAvailable()
+ {
+ return NFCReaderSession.ReadingAvailable;
+ }
+
+ public String[] GetReaders()
+ {
+ return new String[] { "main" };
+ }
+
+ public IReader OpenReader(String readerID)
+ {
+ return new Reader();
+ }
+ }
+}
diff --git a/Borepin/Borepin.iOS/CNFC/Reader.cs b/Borepin/Borepin.iOS/CNFC/Reader.cs
new file mode 100644
index 0000000..992eb5e
--- /dev/null
+++ b/Borepin/Borepin.iOS/CNFC/Reader.cs
@@ -0,0 +1,66 @@
+using System;
+using CoreFoundation;
+using CoreNFC;
+using Foundation;
+using NFC;
+
+namespace Borepin.iOS.CNFC
+{
+ public class Reader : NFCTagReaderSessionDelegate, IReader
+ {
+ public event ReaderEventHandler CardDiscovered;
+ public event ReaderEventHandler CardLost;
+
+ private NFCReaderSession _session = null;
+ private DispatchQueue _queue;
+
+ public void Start()
+ {
+ _queue = new DispatchQueue("NFC Reader Queue", true);
+
+ // sessions cannot be reused
+ _session = new NFCTagReaderSession(NFCPollingOption.Iso14443, this, _queue)
+ {
+ AlertMessage = "TODO",
+ };
+
+ if (_session == null)
+ {
+ Console.WriteLine("Oh no! The session is null!");
+ }
+
+ _session.BeginSession();
+ }
+
+ public void Stop()
+ {
+ _session?.InvalidateSession();
+ _session = null;
+ }
+
+ public override void DidDetectTags(NFCTagReaderSession session, INFCTag[] tags)
+ {
+ Console.WriteLine("Did detect tags");
+
+ Console.WriteLine(tags[0].Type);
+
+ //INFCIso7816Tag tag = tags[0].GetNFCIso7816Tag();
+ INFCMiFareTag tag = tags[0].GetNFCMiFareTag();
+ if (tag != null)
+ {
+ Console.WriteLine("Card ist valid");
+ CardDiscovered?.Invoke(this, new Card(session, tag));
+ }
+ else
+ {
+ Console.WriteLine("Card is not ISO7816");
+ }
+ }
+
+ public override void DidInvalidate(NFCTagReaderSession session, NSError error)
+ {
+ // TODO: decide what to do
+ Console.WriteLine("reader session invalidated");
+ }
+ }
+}
diff --git a/Borepin/Borepin.iOS/Entitlements.plist b/Borepin/Borepin.iOS/Entitlements.plist
index e9a3005..91c9872 100644
--- a/Borepin/Borepin.iOS/Entitlements.plist
+++ b/Borepin/Borepin.iOS/Entitlements.plist
@@ -1,7 +1,11 @@
-
+
+ com.apple.developer.nfc.readersession.formats
+
+ NDEF
+ TAG
+
-
diff --git a/Borepin/Borepin.iOS/Info.plist b/Borepin/Borepin.iOS/Info.plist
index 9fcb7e2..b464cc1 100644
--- a/Borepin/Borepin.iOS/Info.plist
+++ b/Borepin/Borepin.iOS/Info.plist
@@ -38,5 +38,7 @@
0.2
ITSAppUsesNonExemptEncryption
+ NFCReaderUsageDescription
+ FabAccess needs to be able to read your card for authentication with the server.
diff --git a/Borepin/Borepin.macOS/Borepin.macOS.csproj b/Borepin/Borepin.macOS/Borepin.macOS.csproj
index 21177a9..144ef00 100644
--- a/Borepin/Borepin.macOS/Borepin.macOS.csproj
+++ b/Borepin/Borepin.macOS/Borepin.macOS.csproj
@@ -1,4 +1,4 @@
-
+
@@ -12,6 +12,8 @@
v2.0
Xamarin.Mac
Resources
+
+
true
@@ -28,15 +30,19 @@
false
true
true
-
-
-
+
+
+
+
+
+
pdbonly
true
bin\Release
-
+
+
prompt
4
false
@@ -47,8 +53,10 @@
true
Entitlements.plist
SdkOnly
-
-
+
+
+
+
diff --git a/FabAccessAPI/Auth.cs b/FabAccessAPI/Auth.cs
new file mode 100644
index 0000000..ab83078
--- /dev/null
+++ b/FabAccessAPI/Auth.cs
@@ -0,0 +1,165 @@
+using Capnp;
+using FabAccessAPI.Schema;
+using S22.Sasl;
+using System;
+using System.Collections.Generic;
+using System.IO;
+using System.Linq;
+using System.Threading.Tasks;
+using Exception = System.Exception;
+
+namespace FabAccessAPI {
+ /// Authentication Identity
+ ///
+ /// Under the hood a string because the form depends heavily on the method
+ public struct AuthCId {
+ public string Id { get; private set; }
+
+ public AuthCId(string id) : this() { Id = id; }
+ }
+
+ /// Authorization Identity
+ ///
+ /// This identity is internal to FabAccess and completely independent from the authentication
+ /// method or source
+ public struct AuthZId {
+ /// Main User ID. Generally an user name or similar
+ public string Uid;
+
+ /// Sub user ID.
+ ///
+ /// Can change scopes for permissions, e.g. having a +admin account with more permissions than
+ /// the default account and +dashboard et.al. accounts that have restricted permissions for
+ /// their applications
+ public string Subuid;
+
+ /// Realm this account originates.
+ ///
+ /// The Realm is usually described by a domain name but local policy may dictate an unrelated
+ /// mapping
+ public string Realm;
+ }
+
+ /// Authentication/Authorization user object.
+ ///
+ /// This struct contains the user as is passed to the actual authentication/authorization
+ /// subsystems
+ ///
+ public struct AuthUser {
+ /// Contains the Authentication ID used
+ ///
+ /// The authentication ID is an identifier for the authentication exchange. This is different
+ /// than the ID of the user to be authenticated; for example when using x509 the authcid is
+ /// the dn of the certificate, when using GSSAPI the authcid is of form `@`
+ public AuthCId Authcid;
+
+ /// Contains the Authorization ID
+ ///
+ /// This is the identifier of the user to *authenticate as*. This in several cases is different
+ /// to the `authcid`:
+ /// If somebody wants to authenticate as somebody else, su-style.
+ /// If a person wants to authenticate as a higher-permissions account, e.g. foo may set authzid foo+admin
+ /// to split normal user and "admin" accounts.
+ /// If a method requires a specific authcid that is different from the identifier of the user
+ /// to authenticate as, e.g. GSSAPI, x509 client certificates, API TOKEN authentication.
+ public AuthZId Authzid;
+
+ /// Contains the authentication method used
+ ///
+ /// For the most part this is the SASL method
+ public string AuthMethod;
+
+ /// Method-specific key-value pairs
+ ///
+ /// Each method can use their own key-value pairs.
+ /// E.g. EXTERNAL encodes the actual method used (x509 client certs, UID/GID for unix sockets,
+ /// ...)
+ public Dictionary Kvs;
+
+ }
+
+ // Authentication has two parts: Granting the authentication itself and then performing the
+ // authentication.
+ // Granting the authentication checks if
+ // a) the given authcid fits with the given (authMethod, kvs). In general a failure here indicates
+ // a programming failure — the authcid come from the same source as that tuple
+ // b) the given authcid may authenticate as the given authzid. E.g. if a given client certificate
+ // has been configured for that user, if a GSSAPI user maps to a given user,
+ public enum AuthError {
+ /// Authentication ID is bad/unknown/..
+ BadAuthcid,
+ /// Authorization ID is unknown/..
+ BadAuthzid,
+ /// Authorization ID is not of form user+uid@realm
+ MalformedAuthzid,
+ /// User may not use that authorization id
+ NotAllowedAuthzid,
+
+ }
+
+ public class UnauthorizedException : Exception{}
+ public class UnsupportedMechanismException : Exception{}
+
+ ///
+ /// THIS IS VERY INCOMPLETE!
+ ///
+ public class Auth {
+ #region Log
+ private static readonly log4net.ILog _Log = log4net.LogManager.GetLogger(System.Reflection.MethodBase.GetCurrentMethod().DeclaringType);
+ #endregion
+
+ private IAuthentication _authCap;
+ public Auth(IAuthentication authCap) {
+ _authCap = authCap;
+ }
+
+ public Task> GetMechanisms() {
+ return _authCap.Mechanisms();
+ }
+
+ public async Task Authenticate(string mech, Dictionary properties) {
+
+ var m = SaslFactory.Create(mech);
+ foreach (KeyValuePair entry in properties) {
+ m.Properties.Add(entry.Key, entry.Value);
+ }
+
+ var initialResponse = new Request.initialResponse();
+ if (m.HasInitial) {
+ initialResponse.Initial = m.GetResponse(new byte[0]);
+ }
+
+ var req = new Request {
+ Mechanism = m.Name,
+ InitialResponse = initialResponse
+ };
+
+ var resp = await _authCap.Start(req);
+ while (!m.IsCompleted) {
+ if (resp.which == Response.WHICH.Challence) {
+ var additional = m.GetResponse(resp.Challence.ToArray());
+ resp = await _authCap.Step(additional);
+ }
+ else {
+ break;
+ }
+ }
+
+ if (resp.which == Response.WHICH.Outcome) {
+ if (resp.Outcome.Result == Response.Result.successful) {
+ return true;
+ }
+ else {
+ //TODO: Provide meaningful info about auth failure
+ return false;
+ }
+ }
+
+ return false;
+ }
+
+
+
+ }
+
+}
diff --git a/FabAccessAPI/Connection.cs b/FabAccessAPI/Connection.cs
new file mode 100644
index 0000000..84386ab
--- /dev/null
+++ b/FabAccessAPI/Connection.cs
@@ -0,0 +1,64 @@
+using Capnp.Rpc;
+using FabAccessAPI.Schema;
+using System;
+using System.Collections.Generic;
+using System.Linq;
+using System.Threading.Tasks;
+
+namespace FabAccessAPI {
+ public class Connection {
+ #region private variables
+ private TcpRpcClient? _rpcClient = null;
+ private IBootstrap? _bootstrapCap = null;
+ private AuthUser? _authUser = null;
+ private Auth? _auth = null;
+ private Machines? _machines = null;
+ #endregion
+
+ public TcpRpcClient? RpcClient => _rpcClient;
+
+ #region Log
+ private static readonly log4net.ILog _Log = log4net.LogManager.GetLogger(System.Reflection.MethodBase.GetCurrentMethod().DeclaringType);
+ #endregion
+
+ ///
+ ///
+ ///
+ /// Should be an already configured and connected TcpRpcClient
+ public Connection(TcpRpcClient rpcClient) {
+ _rpcClient = rpcClient;
+ _bootstrapCap = _rpcClient.GetMain();
+ _Log.Debug($"Done bootstraping API connection.");
+ }
+
+ ///
+ /// Authenticate this connection.
+ /// Calling this more then once is UB
+ ///
+ /// The desired authentication mechanism
+ /// Key-Value data specific to the mechanism
+ ///
+ public async Task Auth(string mech, Dictionary kvs) {
+ // _bootstrapCap = await _bootstrapCap.Unwrap();
+ var authCap = await _bootstrapCap.Auth();
+ _auth = new Auth(authCap);
+ var mechs = await _auth.GetMechanisms().ConfigureAwait(false);
+ _Log.Debug($"The Server supports the following auth mechs: {string.Join(", ", mechs)}");
+
+ if (!mechs.Contains(mech)) {
+ throw new UnsupportedMechanismException();
+ }
+
+ await _auth.Authenticate(mech, kvs).ConfigureAwait(false);
+ }
+
+ ///
+ /// Get a wrapped capability to interact with machines
+ ///
+ /// A wrapped capability to interact with machines
+ public async Task AccessMachines() {
+ _machines ??= new Machines((await _bootstrapCap.Machines().ConfigureAwait(false)));
+ return _machines;
+ }
+ }
+}
diff --git a/FabAccessAPI/FabAccessAPI.csproj b/FabAccessAPI/FabAccessAPI.csproj
new file mode 100644
index 0000000..b616b61
--- /dev/null
+++ b/FabAccessAPI/FabAccessAPI.csproj
@@ -0,0 +1,20 @@
+
+
+
+ netstandard2.1
+ 8
+ enable
+
+
+
+
+
+
+
+
+
+
+
+
+
+
diff --git a/FabAccessAPI/Machines.cs b/FabAccessAPI/Machines.cs
new file mode 100644
index 0000000..1a3212c
--- /dev/null
+++ b/FabAccessAPI/Machines.cs
@@ -0,0 +1,204 @@
+using FabAccessAPI.Schema;
+using System;
+using System.Collections.Generic;
+using System.Linq;
+using System.Threading.Tasks;
+
+namespace FabAccessAPI {
+
+ public class MachineException : Exception { }
+
+ ///
+ /// Wraps a capability for accessing the Machines subsystem of BFFH
+ ///
+ public class Machines {
+ #region Log
+ private static readonly log4net.ILog _Log = log4net.LogManager.GetLogger(System.Reflection.MethodBase.GetCurrentMethod().DeclaringType);
+ #endregion
+
+
+ private IMachines _machinesCap;
+
+ ///
+ /// Constructs the Wrapper Class from a given capability.
+ ///
+ /// The capability that should be wrapped.
+ public Machines(IMachines machinesCap) {
+ _machinesCap = machinesCap;
+ }
+
+ ///
+ /// List of all machines that BFFH knows about the user has been granted at least read access on
+ ///
+ /// ReadOnlyList of available Machines
+ public async Task?> ListMachines() {
+ return (await _machinesCap.ListMachines().ConfigureAwait(false)).Select(x => new Machine(x)) as IReadOnlyList;
+ }
+
+ ///
+ /// Access a particular machine by known name. This may fail for two reasons:
+ /// The user has not been granted access to know the machine exists or the machine does in fact not exist.
+ /// In both cases the `machine` result will be a NULL-pointer
+ ///
+ /// Name of the Machine
+ /// The Machine we requested
+ public async Task GetMachine(string name) {
+ var mach = (await _machinesCap.GetMachine(name).ConfigureAwait(false)).Item1;
+ if (mach == null) {
+ //TODO: Throw a more specific exception!
+ throw new MachineException();
+ }
+ return new Machine(mach);
+ }
+ }
+
+ ///
+ /// A machine. This represents a machine as BFFH thinks about it which may mean
+ ///several machines or just part of a machine in the real world.
+ ///By itself this struct is completely useless since it contains only the information
+ ///that the machine exists the user is allowed to know about that fact. For all further
+ ///information the user has to call the contained capabilities which depending on the
+ ///access level may not be set. For example an admin will have every capability here
+ ///set but a simple user may only have `read` and `write` set while some users may not
+ /// even have `read` set and are unable to even see if the machine is currently in use.
+ ///
+ public class Machine {
+ private Schema.Machine _machine;
+
+ ///
+ /// Constructs the Wrapper Class from a given capability
+ ///
+ /// The capability that should be wrapped.
+ public Machine(Schema.Machine machine) {
+ _machine = machine;
+ }
+
+ // read operations
+
+ ///
+ /// Get the MInfo Struct for the Machine.
+ /// This contains everything BFFH knows about the Machine.
+ ///
+ ///
+ /// The MInfo Struct describing the Machine
+ public async Task GetMInfo() {
+ var readCap = _machine.Read;
+ if (readCap == null) {
+ throw new UnauthorizedException();
+ }
+
+ return (await _machine.Read.Info().ConfigureAwait(false)).Item1;
+ }
+
+ //write operations
+
+ ///
+ /// Try to use a machine. Throws a UnauthorizedException if the user does not have the required
+ /// permissions to use this machine.
+ ///
+ /// Use the Ret() Method of the returned Object to return the machine
+ ///
+ ///
+ /// Capability to give back the machine
+ public Task Use() {
+ var writeCap = _machine.Write;
+ if (writeCap == null) {
+ throw new UnauthorizedException();
+ }
+
+ return writeCap.Use();
+ }
+
+ ///
+ /// Try to reserve a machine. Throws a UnauthorizedException if the user does not have the required
+ /// permissions to use this machine.
+ ///
+ /// Use the Ret() Method of the returned Object to return the machine
+ /// Use the Use() Nethod of the Machine to use your reserved machine.
+ ///
+ ///
+ /// Capability to give back the machine
+ public Task Reserve()
+ {
+ var writeCap = _machine.Write;
+ if (writeCap == null)
+ {
+ throw new UnauthorizedException();
+ }
+
+ return writeCap.Reserve();
+ }
+
+
+ // public void GiveBack(Schema.Machine.WriteInterface.IGiveBack cap) {
+ // cap.Ret();
+ // }
+
+ //manage operations
+
+ ///
+ /// After a machine has been used by an user with low enough permissions it's
+ /// in the 'toCheck' state. This call then allows more priviledged users to
+ /// "check" the machine and move it to the `free` state.
+ ///
+ /// Calling this method signifies that the machine was checked and in an acceptable state.
+ ///
+ public async void MarkOk() {
+ var manageCap = _machine.Manage;
+ if (manageCap == null) {
+ throw new UnauthorizedException();
+ }
+ // TODO: Do we really want to check this here?
+ if ((await GetMInfo().ConfigureAwait(false)).State == State.toCheck) {
+ await _machine.Manage.Ok().ConfigureAwait(false);
+ }
+ }
+
+ ///
+ /// After a machine has been used by an user with low enough permissions it's
+ /// in the 'toCheck' state. This call then allows more priviledged users to
+ /// "check" the machine and move it to the `free` state.
+ ///
+ /// Calling this method signifies that the machine was checked and in an unacceptable state.
+ /// It will most likely be marked as `blocked` and the previous user will somehow be informed.
+ ///
+ public async void MarkNotOk() {
+ var manageCap = _machine.Manage;
+ if (manageCap == null) {
+ throw new UnauthorizedException();
+ }
+ // TODO: Do we really want to check this here?
+ if ((await GetMInfo().ConfigureAwait(false)).State == State.toCheck) {
+ await _machine.Manage.NotOk().ConfigureAwait(false);
+ }
+ }
+
+ //administrative operations
+
+ ///
+ /// Forcefully set a machine state.
+ ///
+ /// The desired machine state.
+ public async void ForceSetState(State state) {
+ var adminCap = _machine.Admin;
+ if (adminCap == null) {
+ throw new UnauthorizedException();
+ }
+
+ await adminCap.ForceSetState(state).ConfigureAwait(false);
+ }
+
+ ///
+ /// Set the given user as current responsible
+ ///
+ /// The user
+ public async void ForceSetUser(String user) {
+ var adminCap = _machine.Admin;
+ if (adminCap == null) {
+ throw new UnauthorizedException();
+ }
+
+ await adminCap.ForceSetUser(user).ConfigureAwait(false);
+ }
+ }
+}
diff --git a/FabAccessAPI/Permissions.cs b/FabAccessAPI/Permissions.cs
new file mode 100644
index 0000000..121aa3e
--- /dev/null
+++ b/FabAccessAPI/Permissions.cs
@@ -0,0 +1,13 @@
+using System;
+using System.Collections.Generic;
+using System.Text;
+
+
+//This is where the permissions subsystem will live
+namespace FabAccessAPI {
+ public class Permissions {
+ #region Log
+ private static readonly log4net.ILog _Log = log4net.LogManager.GetLogger(System.Reflection.MethodBase.GetCurrentMethod().DeclaringType);
+ #endregion
+ }
+}
diff --git a/FabAccessAPI/schema b/FabAccessAPI/schema
new file mode 160000
index 0000000..4adb053
--- /dev/null
+++ b/FabAccessAPI/schema
@@ -0,0 +1 @@
+Subproject commit 4adb05341763b96a43440a6a96e0d9959ba71e89
diff --git a/FabAccessAPI_Test/FabAccessAPITests.cs b/FabAccessAPI_Test/FabAccessAPITests.cs
new file mode 100644
index 0000000..a20f35a
--- /dev/null
+++ b/FabAccessAPI_Test/FabAccessAPITests.cs
@@ -0,0 +1,67 @@
+using System;
+using System.Collections.Generic;
+using System.Threading.Tasks;
+using NUnit.Framework;
+using FabAccessAPI;
+using Capnp;
+using Capnp.Rpc;
+using log4net.Config;
+using Microsoft.Extensions.Logging;
+
+namespace FabAccessAPI_Test {
+ public class Tests {
+ #region Log
+ private static readonly log4net.ILog _Log = log4net.LogManager.GetLogger(System.Reflection.MethodBase.GetCurrentMethod().DeclaringType);
+ #endregion
+
+ private static ILoggerFactory _loggerFactory;
+ private Connection _connection;
+
+ [OneTimeSetUp]
+ public void InitialSetup() {
+ XmlConfigurator.Configure(new System.IO.FileInfo("log4net.config"));
+ _loggerFactory = LoggerFactory.Create(builder => {
+ builder
+ .AddFilter("Microsoft", LogLevel.Warning)
+ .AddFilter("System", LogLevel.Warning);
+ });
+ _loggerFactory.AddLog4Net();
+ Logging.LoggerFactory = _loggerFactory;
+ }
+
+ [SetUp]
+ public void Setup() {
+ var rpcClient = new TcpRpcClient();
+ rpcClient.Connect("127.0.0.1", 59661);
+ _connection = new Connection(rpcClient);
+ }
+
+ [TearDown]
+ public void Teardown() {
+ _connection.RpcClient?.Dispose();
+ _connection = null;
+ }
+
+ [Test]
+ public void Connect() {
+ Assert.AreEqual(ConnectionState.Active, _connection.RpcClient.State);
+ }
+
+ [Test]
+ public async Task Authenticate() {
+ await _connection.Auth("PLAIN", new Dictionary{{"Username", "Testuser"}, {"Password", "secret"}});
+ }
+
+ [Test]
+ public async Task Machines() {
+ await _connection.Auth("PLAIN", new Dictionary{{"Username", "Testuser"}, {"Password", "secret"}});
+ var machines = await _connection.AccessMachines();
+
+ var testmachine = await machines.GetMachine("Testmachine");
+ Assert.NotNull(testmachine);
+ var minfo = await testmachine.GetMInfo();
+ Assert.NotNull(minfo);
+ _Log.Info($"Name: {minfo.Name}, Description: {minfo.Description}, State: {minfo.State.ToString()}");
+ }
+ }
+}
\ No newline at end of file
diff --git a/FabAccessAPI_Test/FabAccessAPI_Test.csproj b/FabAccessAPI_Test/FabAccessAPI_Test.csproj
new file mode 100644
index 0000000..7682803
--- /dev/null
+++ b/FabAccessAPI_Test/FabAccessAPI_Test.csproj
@@ -0,0 +1,26 @@
+
+
+
+ netcoreapp3.1
+
+ false
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ PreserveNewest
+
+
+
+
diff --git a/FabAccessAPI_Test/log4net.config b/FabAccessAPI_Test/log4net.config
new file mode 100644
index 0000000..3781ff0
--- /dev/null
+++ b/FabAccessAPI_Test/log4net.config
@@ -0,0 +1,16 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
\ No newline at end of file
diff --git a/LICENSE b/LICENSE
new file mode 100644
index 0000000..4a0e062
--- /dev/null
+++ b/LICENSE
@@ -0,0 +1,674 @@
+ GNU GENERAL PUBLIC LICENSE
+ Version 3, 29 June 2007
+
+ Copyright (C) 2007 Free Software Foundation, Inc.
+ Everyone is permitted to copy and distribute verbatim copies
+ of this license document, but changing it is not allowed.
+
+ Preamble
+
+ The GNU General Public License is a free, copyleft license for
+software and other kinds of works.
+
+ The licenses for most software and other practical works are designed
+to take away your freedom to share and change the works. By contrast,
+the GNU General Public License is intended to guarantee your freedom to
+share and change all versions of a program--to make sure it remains free
+software for all its users. We, the Free Software Foundation, use the
+GNU General Public License for most of our software; it applies also to
+any other work released this way by its authors. You can apply it to
+your programs, too.
+
+ When we speak of free software, we are referring to freedom, not
+price. Our General Public Licenses are designed to make sure that you
+have the freedom to distribute copies of free software (and charge for
+them if you wish), that you receive source code or can get it if you
+want it, that you can change the software or use pieces of it in new
+free programs, and that you know you can do these things.
+
+ To protect your rights, we need to prevent others from denying you
+these rights or asking you to surrender the rights. Therefore, you have
+certain responsibilities if you distribute copies of the software, or if
+you modify it: responsibilities to respect the freedom of others.
+
+ For example, if you distribute copies of such a program, whether
+gratis or for a fee, you must pass on to the recipients the same
+freedoms that you received. You must make sure that they, too, receive
+or can get the source code. And you must show them these terms so they
+know their rights.
+
+ Developers that use the GNU GPL protect your rights with two steps:
+(1) assert copyright on the software, and (2) offer you this License
+giving you legal permission to copy, distribute and/or modify it.
+
+ For the developers' and authors' protection, the GPL clearly explains
+that there is no warranty for this free software. For both users' and
+authors' sake, the GPL requires that modified versions be marked as
+changed, so that their problems will not be attributed erroneously to
+authors of previous versions.
+
+ Some devices are designed to deny users access to install or run
+modified versions of the software inside them, although the manufacturer
+can do so. This is fundamentally incompatible with the aim of
+protecting users' freedom to change the software. The systematic
+pattern of such abuse occurs in the area of products for individuals to
+use, which is precisely where it is most unacceptable. Therefore, we
+have designed this version of the GPL to prohibit the practice for those
+products. If such problems arise substantially in other domains, we
+stand ready to extend this provision to those domains in future versions
+of the GPL, as needed to protect the freedom of users.
+
+ Finally, every program is threatened constantly by software patents.
+States should not allow patents to restrict development and use of
+software on general-purpose computers, but in those that do, we wish to
+avoid the special danger that patents applied to a free program could
+make it effectively proprietary. To prevent this, the GPL assures that
+patents cannot be used to render the program non-free.
+
+ The precise terms and conditions for copying, distribution and
+modification follow.
+
+ TERMS AND CONDITIONS
+
+ 0. Definitions.
+
+ "This License" refers to version 3 of the GNU General Public License.
+
+ "Copyright" also means copyright-like laws that apply to other kinds of
+works, such as semiconductor masks.
+
+ "The Program" refers to any copyrightable work licensed under this
+License. Each licensee is addressed as "you". "Licensees" and
+"recipients" may be individuals or organizations.
+
+ To "modify" a work means to copy from or adapt all or part of the work
+in a fashion requiring copyright permission, other than the making of an
+exact copy. The resulting work is called a "modified version" of the
+earlier work or a work "based on" the earlier work.
+
+ A "covered work" means either the unmodified Program or a work based
+on the Program.
+
+ To "propagate" a work means to do anything with it that, without
+permission, would make you directly or secondarily liable for
+infringement under applicable copyright law, except executing it on a
+computer or modifying a private copy. Propagation includes copying,
+distribution (with or without modification), making available to the
+public, and in some countries other activities as well.
+
+ To "convey" a work means any kind of propagation that enables other
+parties to make or receive copies. Mere interaction with a user through
+a computer network, with no transfer of a copy, is not conveying.
+
+ An interactive user interface displays "Appropriate Legal Notices"
+to the extent that it includes a convenient and prominently visible
+feature that (1) displays an appropriate copyright notice, and (2)
+tells the user that there is no warranty for the work (except to the
+extent that warranties are provided), that licensees may convey the
+work under this License, and how to view a copy of this License. If
+the interface presents a list of user commands or options, such as a
+menu, a prominent item in the list meets this criterion.
+
+ 1. Source Code.
+
+ The "source code" for a work means the preferred form of the work
+for making modifications to it. "Object code" means any non-source
+form of a work.
+
+ A "Standard Interface" means an interface that either is an official
+standard defined by a recognized standards body, or, in the case of
+interfaces specified for a particular programming language, one that
+is widely used among developers working in that language.
+
+ The "System Libraries" of an executable work include anything, other
+than the work as a whole, that (a) is included in the normal form of
+packaging a Major Component, but which is not part of that Major
+Component, and (b) serves only to enable use of the work with that
+Major Component, or to implement a Standard Interface for which an
+implementation is available to the public in source code form. A
+"Major Component", in this context, means a major essential component
+(kernel, window system, and so on) of the specific operating system
+(if any) on which the executable work runs, or a compiler used to
+produce the work, or an object code interpreter used to run it.
+
+ The "Corresponding Source" for a work in object code form means all
+the source code needed to generate, install, and (for an executable
+work) run the object code and to modify the work, including scripts to
+control those activities. However, it does not include the work's
+System Libraries, or general-purpose tools or generally available free
+programs which are used unmodified in performing those activities but
+which are not part of the work. For example, Corresponding Source
+includes interface definition files associated with source files for
+the work, and the source code for shared libraries and dynamically
+linked subprograms that the work is specifically designed to require,
+such as by intimate data communication or control flow between those
+subprograms and other parts of the work.
+
+ The Corresponding Source need not include anything that users
+can regenerate automatically from other parts of the Corresponding
+Source.
+
+ The Corresponding Source for a work in source code form is that
+same work.
+
+ 2. Basic Permissions.
+
+ All rights granted under this License are granted for the term of
+copyright on the Program, and are irrevocable provided the stated
+conditions are met. This License explicitly affirms your unlimited
+permission to run the unmodified Program. The output from running a
+covered work is covered by this License only if the output, given its
+content, constitutes a covered work. This License acknowledges your
+rights of fair use or other equivalent, as provided by copyright law.
+
+ You may make, run and propagate covered works that you do not
+convey, without conditions so long as your license otherwise remains
+in force. You may convey covered works to others for the sole purpose
+of having them make modifications exclusively for you, or provide you
+with facilities for running those works, provided that you comply with
+the terms of this License in conveying all material for which you do
+not control copyright. Those thus making or running the covered works
+for you must do so exclusively on your behalf, under your direction
+and control, on terms that prohibit them from making any copies of
+your copyrighted material outside their relationship with you.
+
+ Conveying under any other circumstances is permitted solely under
+the conditions stated below. Sublicensing is not allowed; section 10
+makes it unnecessary.
+
+ 3. Protecting Users' Legal Rights From Anti-Circumvention Law.
+
+ No covered work shall be deemed part of an effective technological
+measure under any applicable law fulfilling obligations under article
+11 of the WIPO copyright treaty adopted on 20 December 1996, or
+similar laws prohibiting or restricting circumvention of such
+measures.
+
+ When you convey a covered work, you waive any legal power to forbid
+circumvention of technological measures to the extent such circumvention
+is effected by exercising rights under this License with respect to
+the covered work, and you disclaim any intention to limit operation or
+modification of the work as a means of enforcing, against the work's
+users, your or third parties' legal rights to forbid circumvention of
+technological measures.
+
+ 4. Conveying Verbatim Copies.
+
+ You may convey verbatim copies of the Program's source code as you
+receive it, in any medium, provided that you conspicuously and
+appropriately publish on each copy an appropriate copyright notice;
+keep intact all notices stating that this License and any
+non-permissive terms added in accord with section 7 apply to the code;
+keep intact all notices of the absence of any warranty; and give all
+recipients a copy of this License along with the Program.
+
+ You may charge any price or no price for each copy that you convey,
+and you may offer support or warranty protection for a fee.
+
+ 5. Conveying Modified Source Versions.
+
+ You may convey a work based on the Program, or the modifications to
+produce it from the Program, in the form of source code under the
+terms of section 4, provided that you also meet all of these conditions:
+
+ a) The work must carry prominent notices stating that you modified
+ it, and giving a relevant date.
+
+ b) The work must carry prominent notices stating that it is
+ released under this License and any conditions added under section
+ 7. This requirement modifies the requirement in section 4 to
+ "keep intact all notices".
+
+ c) You must license the entire work, as a whole, under this
+ License to anyone who comes into possession of a copy. This
+ License will therefore apply, along with any applicable section 7
+ additional terms, to the whole of the work, and all its parts,
+ regardless of how they are packaged. This License gives no
+ permission to license the work in any other way, but it does not
+ invalidate such permission if you have separately received it.
+
+ d) If the work has interactive user interfaces, each must display
+ Appropriate Legal Notices; however, if the Program has interactive
+ interfaces that do not display Appropriate Legal Notices, your
+ work need not make them do so.
+
+ A compilation of a covered work with other separate and independent
+works, which are not by their nature extensions of the covered work,
+and which are not combined with it such as to form a larger program,
+in or on a volume of a storage or distribution medium, is called an
+"aggregate" if the compilation and its resulting copyright are not
+used to limit the access or legal rights of the compilation's users
+beyond what the individual works permit. Inclusion of a covered work
+in an aggregate does not cause this License to apply to the other
+parts of the aggregate.
+
+ 6. Conveying Non-Source Forms.
+
+ You may convey a covered work in object code form under the terms
+of sections 4 and 5, provided that you also convey the
+machine-readable Corresponding Source under the terms of this License,
+in one of these ways:
+
+ a) Convey the object code in, or embodied in, a physical product
+ (including a physical distribution medium), accompanied by the
+ Corresponding Source fixed on a durable physical medium
+ customarily used for software interchange.
+
+ b) Convey the object code in, or embodied in, a physical product
+ (including a physical distribution medium), accompanied by a
+ written offer, valid for at least three years and valid for as
+ long as you offer spare parts or customer support for that product
+ model, to give anyone who possesses the object code either (1) a
+ copy of the Corresponding Source for all the software in the
+ product that is covered by this License, on a durable physical
+ medium customarily used for software interchange, for a price no
+ more than your reasonable cost of physically performing this
+ conveying of source, or (2) access to copy the
+ Corresponding Source from a network server at no charge.
+
+ c) Convey individual copies of the object code with a copy of the
+ written offer to provide the Corresponding Source. This
+ alternative is allowed only occasionally and noncommercially, and
+ only if you received the object code with such an offer, in accord
+ with subsection 6b.
+
+ d) Convey the object code by offering access from a designated
+ place (gratis or for a charge), and offer equivalent access to the
+ Corresponding Source in the same way through the same place at no
+ further charge. You need not require recipients to copy the
+ Corresponding Source along with the object code. If the place to
+ copy the object code is a network server, the Corresponding Source
+ may be on a different server (operated by you or a third party)
+ that supports equivalent copying facilities, provided you maintain
+ clear directions next to the object code saying where to find the
+ Corresponding Source. Regardless of what server hosts the
+ Corresponding Source, you remain obligated to ensure that it is
+ available for as long as needed to satisfy these requirements.
+
+ e) Convey the object code using peer-to-peer transmission, provided
+ you inform other peers where the object code and Corresponding
+ Source of the work are being offered to the general public at no
+ charge under subsection 6d.
+
+ A separable portion of the object code, whose source code is excluded
+from the Corresponding Source as a System Library, need not be
+included in conveying the object code work.
+
+ A "User Product" is either (1) a "consumer product", which means any
+tangible personal property which is normally used for personal, family,
+or household purposes, or (2) anything designed or sold for incorporation
+into a dwelling. In determining whether a product is a consumer product,
+doubtful cases shall be resolved in favor of coverage. For a particular
+product received by a particular user, "normally used" refers to a
+typical or common use of that class of product, regardless of the status
+of the particular user or of the way in which the particular user
+actually uses, or expects or is expected to use, the product. A product
+is a consumer product regardless of whether the product has substantial
+commercial, industrial or non-consumer uses, unless such uses represent
+the only significant mode of use of the product.
+
+ "Installation Information" for a User Product means any methods,
+procedures, authorization keys, or other information required to install
+and execute modified versions of a covered work in that User Product from
+a modified version of its Corresponding Source. The information must
+suffice to ensure that the continued functioning of the modified object
+code is in no case prevented or interfered with solely because
+modification has been made.
+
+ If you convey an object code work under this section in, or with, or
+specifically for use in, a User Product, and the conveying occurs as
+part of a transaction in which the right of possession and use of the
+User Product is transferred to the recipient in perpetuity or for a
+fixed term (regardless of how the transaction is characterized), the
+Corresponding Source conveyed under this section must be accompanied
+by the Installation Information. But this requirement does not apply
+if neither you nor any third party retains the ability to install
+modified object code on the User Product (for example, the work has
+been installed in ROM).
+
+ The requirement to provide Installation Information does not include a
+requirement to continue to provide support service, warranty, or updates
+for a work that has been modified or installed by the recipient, or for
+the User Product in which it has been modified or installed. Access to a
+network may be denied when the modification itself materially and
+adversely affects the operation of the network or violates the rules and
+protocols for communication across the network.
+
+ Corresponding Source conveyed, and Installation Information provided,
+in accord with this section must be in a format that is publicly
+documented (and with an implementation available to the public in
+source code form), and must require no special password or key for
+unpacking, reading or copying.
+
+ 7. Additional Terms.
+
+ "Additional permissions" are terms that supplement the terms of this
+License by making exceptions from one or more of its conditions.
+Additional permissions that are applicable to the entire Program shall
+be treated as though they were included in this License, to the extent
+that they are valid under applicable law. If additional permissions
+apply only to part of the Program, that part may be used separately
+under those permissions, but the entire Program remains governed by
+this License without regard to the additional permissions.
+
+ When you convey a copy of a covered work, you may at your option
+remove any additional permissions from that copy, or from any part of
+it. (Additional permissions may be written to require their own
+removal in certain cases when you modify the work.) You may place
+additional permissions on material, added by you to a covered work,
+for which you have or can give appropriate copyright permission.
+
+ Notwithstanding any other provision of this License, for material you
+add to a covered work, you may (if authorized by the copyright holders of
+that material) supplement the terms of this License with terms:
+
+ a) Disclaiming warranty or limiting liability differently from the
+ terms of sections 15 and 16 of this License; or
+
+ b) Requiring preservation of specified reasonable legal notices or
+ author attributions in that material or in the Appropriate Legal
+ Notices displayed by works containing it; or
+
+ c) Prohibiting misrepresentation of the origin of that material, or
+ requiring that modified versions of such material be marked in
+ reasonable ways as different from the original version; or
+
+ d) Limiting the use for publicity purposes of names of licensors or
+ authors of the material; or
+
+ e) Declining to grant rights under trademark law for use of some
+ trade names, trademarks, or service marks; or
+
+ f) Requiring indemnification of licensors and authors of that
+ material by anyone who conveys the material (or modified versions of
+ it) with contractual assumptions of liability to the recipient, for
+ any liability that these contractual assumptions directly impose on
+ those licensors and authors.
+
+ All other non-permissive additional terms are considered "further
+restrictions" within the meaning of section 10. If the Program as you
+received it, or any part of it, contains a notice stating that it is
+governed by this License along with a term that is a further
+restriction, you may remove that term. If a license document contains
+a further restriction but permits relicensing or conveying under this
+License, you may add to a covered work material governed by the terms
+of that license document, provided that the further restriction does
+not survive such relicensing or conveying.
+
+ If you add terms to a covered work in accord with this section, you
+must place, in the relevant source files, a statement of the
+additional terms that apply to those files, or a notice indicating
+where to find the applicable terms.
+
+ Additional terms, permissive or non-permissive, may be stated in the
+form of a separately written license, or stated as exceptions;
+the above requirements apply either way.
+
+ 8. Termination.
+
+ You may not propagate or modify a covered work except as expressly
+provided under this License. Any attempt otherwise to propagate or
+modify it is void, and will automatically terminate your rights under
+this License (including any patent licenses granted under the third
+paragraph of section 11).
+
+ However, if you cease all violation of this License, then your
+license from a particular copyright holder is reinstated (a)
+provisionally, unless and until the copyright holder explicitly and
+finally terminates your license, and (b) permanently, if the copyright
+holder fails to notify you of the violation by some reasonable means
+prior to 60 days after the cessation.
+
+ Moreover, your license from a particular copyright holder is
+reinstated permanently if the copyright holder notifies you of the
+violation by some reasonable means, this is the first time you have
+received notice of violation of this License (for any work) from that
+copyright holder, and you cure the violation prior to 30 days after
+your receipt of the notice.
+
+ Termination of your rights under this section does not terminate the
+licenses of parties who have received copies or rights from you under
+this License. If your rights have been terminated and not permanently
+reinstated, you do not qualify to receive new licenses for the same
+material under section 10.
+
+ 9. Acceptance Not Required for Having Copies.
+
+ You are not required to accept this License in order to receive or
+run a copy of the Program. Ancillary propagation of a covered work
+occurring solely as a consequence of using peer-to-peer transmission
+to receive a copy likewise does not require acceptance. However,
+nothing other than this License grants you permission to propagate or
+modify any covered work. These actions infringe copyright if you do
+not accept this License. Therefore, by modifying or propagating a
+covered work, you indicate your acceptance of this License to do so.
+
+ 10. Automatic Licensing of Downstream Recipients.
+
+ Each time you convey a covered work, the recipient automatically
+receives a license from the original licensors, to run, modify and
+propagate that work, subject to this License. You are not responsible
+for enforcing compliance by third parties with this License.
+
+ An "entity transaction" is a transaction transferring control of an
+organization, or substantially all assets of one, or subdividing an
+organization, or merging organizations. If propagation of a covered
+work results from an entity transaction, each party to that
+transaction who receives a copy of the work also receives whatever
+licenses to the work the party's predecessor in interest had or could
+give under the previous paragraph, plus a right to possession of the
+Corresponding Source of the work from the predecessor in interest, if
+the predecessor has it or can get it with reasonable efforts.
+
+ You may not impose any further restrictions on the exercise of the
+rights granted or affirmed under this License. For example, you may
+not impose a license fee, royalty, or other charge for exercise of
+rights granted under this License, and you may not initiate litigation
+(including a cross-claim or counterclaim in a lawsuit) alleging that
+any patent claim is infringed by making, using, selling, offering for
+sale, or importing the Program or any portion of it.
+
+ 11. Patents.
+
+ A "contributor" is a copyright holder who authorizes use under this
+License of the Program or a work on which the Program is based. The
+work thus licensed is called the contributor's "contributor version".
+
+ A contributor's "essential patent claims" are all patent claims
+owned or controlled by the contributor, whether already acquired or
+hereafter acquired, that would be infringed by some manner, permitted
+by this License, of making, using, or selling its contributor version,
+but do not include claims that would be infringed only as a
+consequence of further modification of the contributor version. For
+purposes of this definition, "control" includes the right to grant
+patent sublicenses in a manner consistent with the requirements of
+this License.
+
+ Each contributor grants you a non-exclusive, worldwide, royalty-free
+patent license under the contributor's essential patent claims, to
+make, use, sell, offer for sale, import and otherwise run, modify and
+propagate the contents of its contributor version.
+
+ In the following three paragraphs, a "patent license" is any express
+agreement or commitment, however denominated, not to enforce a patent
+(such as an express permission to practice a patent or covenant not to
+sue for patent infringement). To "grant" such a patent license to a
+party means to make such an agreement or commitment not to enforce a
+patent against the party.
+
+ If you convey a covered work, knowingly relying on a patent license,
+and the Corresponding Source of the work is not available for anyone
+to copy, free of charge and under the terms of this License, through a
+publicly available network server or other readily accessible means,
+then you must either (1) cause the Corresponding Source to be so
+available, or (2) arrange to deprive yourself of the benefit of the
+patent license for this particular work, or (3) arrange, in a manner
+consistent with the requirements of this License, to extend the patent
+license to downstream recipients. "Knowingly relying" means you have
+actual knowledge that, but for the patent license, your conveying the
+covered work in a country, or your recipient's use of the covered work
+in a country, would infringe one or more identifiable patents in that
+country that you have reason to believe are valid.
+
+ If, pursuant to or in connection with a single transaction or
+arrangement, you convey, or propagate by procuring conveyance of, a
+covered work, and grant a patent license to some of the parties
+receiving the covered work authorizing them to use, propagate, modify
+or convey a specific copy of the covered work, then the patent license
+you grant is automatically extended to all recipients of the covered
+work and works based on it.
+
+ A patent license is "discriminatory" if it does not include within
+the scope of its coverage, prohibits the exercise of, or is
+conditioned on the non-exercise of one or more of the rights that are
+specifically granted under this License. You may not convey a covered
+work if you are a party to an arrangement with a third party that is
+in the business of distributing software, under which you make payment
+to the third party based on the extent of your activity of conveying
+the work, and under which the third party grants, to any of the
+parties who would receive the covered work from you, a discriminatory
+patent license (a) in connection with copies of the covered work
+conveyed by you (or copies made from those copies), or (b) primarily
+for and in connection with specific products or compilations that
+contain the covered work, unless you entered into that arrangement,
+or that patent license was granted, prior to 28 March 2007.
+
+ Nothing in this License shall be construed as excluding or limiting
+any implied license or other defenses to infringement that may
+otherwise be available to you under applicable patent law.
+
+ 12. No Surrender of Others' Freedom.
+
+ If conditions are imposed on you (whether by court order, agreement or
+otherwise) that contradict the conditions of this License, they do not
+excuse you from the conditions of this License. If you cannot convey a
+covered work so as to satisfy simultaneously your obligations under this
+License and any other pertinent obligations, then as a consequence you may
+not convey it at all. For example, if you agree to terms that obligate you
+to collect a royalty for further conveying from those to whom you convey
+the Program, the only way you could satisfy both those terms and this
+License would be to refrain entirely from conveying the Program.
+
+ 13. Use with the GNU Affero General Public License.
+
+ Notwithstanding any other provision of this License, you have
+permission to link or combine any covered work with a work licensed
+under version 3 of the GNU Affero General Public License into a single
+combined work, and to convey the resulting work. The terms of this
+License will continue to apply to the part which is the covered work,
+but the special requirements of the GNU Affero General Public License,
+section 13, concerning interaction through a network will apply to the
+combination as such.
+
+ 14. Revised Versions of this License.
+
+ The Free Software Foundation may publish revised and/or new versions of
+the GNU General Public License from time to time. Such new versions will
+be similar in spirit to the present version, but may differ in detail to
+address new problems or concerns.
+
+ Each version is given a distinguishing version number. If the
+Program specifies that a certain numbered version of the GNU General
+Public License "or any later version" applies to it, you have the
+option of following the terms and conditions either of that numbered
+version or of any later version published by the Free Software
+Foundation. If the Program does not specify a version number of the
+GNU General Public License, you may choose any version ever published
+by the Free Software Foundation.
+
+ If the Program specifies that a proxy can decide which future
+versions of the GNU General Public License can be used, that proxy's
+public statement of acceptance of a version permanently authorizes you
+to choose that version for the Program.
+
+ Later license versions may give you additional or different
+permissions. However, no additional obligations are imposed on any
+author or copyright holder as a result of your choosing to follow a
+later version.
+
+ 15. Disclaimer of Warranty.
+
+ THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY
+APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT
+HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY
+OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO,
+THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
+PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM
+IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF
+ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
+
+ 16. Limitation of Liability.
+
+ IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
+WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS
+THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY
+GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE
+USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF
+DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD
+PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS),
+EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF
+SUCH DAMAGES.
+
+ 17. Interpretation of Sections 15 and 16.
+
+ If the disclaimer of warranty and limitation of liability provided
+above cannot be given local legal effect according to their terms,
+reviewing courts shall apply local law that most closely approximates
+an absolute waiver of all civil liability in connection with the
+Program, unless a warranty or assumption of liability accompanies a
+copy of the Program in return for a fee.
+
+ END OF TERMS AND CONDITIONS
+
+ How to Apply These Terms to Your New Programs
+
+ If you develop a new program, and you want it to be of the greatest
+possible use to the public, the best way to achieve this is to make it
+free software which everyone can redistribute and change under these terms.
+
+ To do so, attach the following notices to the program. It is safest
+to attach them to the start of each source file to most effectively
+state the exclusion of warranty; and each file should have at least
+the "copyright" line and a pointer to where the full notice is found.
+
+ Borepin
+ Copyright (C) 2020 FabInfra / FabAccess
+
+ This program is free software: you can redistribute it and/or modify
+ it under the terms of the GNU General Public License as published by
+ the Free Software Foundation, either version 3 of the License, or
+ (at your option) any later version.
+
+ This program is distributed in the hope that it will be useful,
+ but WITHOUT ANY WARRANTY; without even the implied warranty of
+ MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ GNU General Public License for more details.
+
+ You should have received a copy of the GNU General Public License
+ along with this program. If not, see .
+
+Also add information on how to contact you by electronic and paper mail.
+
+ If the program does terminal interaction, make it output a short
+notice like this when it starts in an interactive mode:
+
+ Borepin Copyright (C) 2020 FabInfra / FabAccess
+ This program comes with ABSOLUTELY NO WARRANTY; for details type `show w'.
+ This is free software, and you are welcome to redistribute it
+ under certain conditions; type `show c' for details.
+
+The hypothetical commands `show w' and `show c' should show the appropriate
+parts of the General Public License. Of course, your program's commands
+might be different; for a GUI interface, you would use an "about box".
+
+ You should also get your employer (if you work as a programmer) or school,
+if any, to sign a "copyright disclaimer" for the program, if necessary.
+For more information on this, and how to apply and follow the GNU GPL, see
+.
+
+ The GNU General Public License does not permit incorporating your program
+into proprietary programs. If your program is a subroutine library, you
+may consider it more useful to permit linking proprietary applications with
+the library. If this is what you want to do, use the GNU Lesser General
+Public License instead of this License. But first, please read
+.
diff --git a/NFC/Crypto/CRC/CRC16.cs b/NFC/Crypto/CRC/CRC16.cs
new file mode 100644
index 0000000..1530396
--- /dev/null
+++ b/NFC/Crypto/CRC/CRC16.cs
@@ -0,0 +1,44 @@
+using System;
+
+namespace NFC.Crypto
+{
+ ///
+ /// CRC16 for DESFire Card
+ ///
+ public class CRC16
+ {
+ public UInt16 Polynomial { get; } = 0x8408;
+
+ public UInt16 InitValue { get; } = 0x6363;
+
+ public UInt16 Calculate(byte[] data, UInt16 crc16)
+ {
+ for (int i = 0; i < data.Length; i++)
+ {
+ crc16 ^= data[i];
+ for (int b = 0; b < 8; b++)
+ {
+ bool b_Bit = (crc16 & 0x01) > 0;
+ crc16 >>= 1;
+ if (b_Bit)
+ {
+ crc16 ^= Polynomial;
+ }
+ }
+ }
+ return crc16;
+ }
+
+ public byte[] Calculate(params byte[][] data)
+ {
+ UInt16 crc16 = InitValue;
+
+ foreach(byte[] d in data)
+ {
+ crc16 = Calculate(d, crc16);
+ }
+
+ return BitConverter.GetBytes(crc16);
+ }
+ }
+}
diff --git a/NFC/Crypto/CRC/CRC32.cs b/NFC/Crypto/CRC/CRC32.cs
new file mode 100644
index 0000000..1d1c45a
--- /dev/null
+++ b/NFC/Crypto/CRC/CRC32.cs
@@ -0,0 +1,44 @@
+using System;
+
+namespace NFC.Crypto
+{
+ ///
+ /// CRC32 for DESFire Card
+ ///
+ public class CRC32
+ {
+ public UInt32 Polynomial { get; } = 0xEDB88320;
+
+ public UInt32 InitValue { get; } = 0xFFFFFFFF;
+
+ public UInt32 Calculate(byte[] data, UInt32 crc32)
+ {
+ for (int i = 0; i < data.Length; i++)
+ {
+ crc32 ^= data[i];
+ for (int b = 0; b < 8; b++)
+ {
+ bool b_Bit = (crc32 & 0x01) > 0;
+ crc32 >>= 1;
+ if (b_Bit)
+ {
+ crc32 ^= Polynomial;
+ }
+ }
+ }
+ return crc32;
+ }
+
+ public byte[] Calculate(params byte[][] data)
+ {
+ UInt32 crc32 = InitValue;
+
+ foreach(byte[] d in data)
+ {
+ crc32 = Calculate(d, crc32);
+ }
+
+ return BitConverter.GetBytes(crc32);
+ }
+ }
+}
diff --git a/NFC/Crypto/Cipher/AES.cs b/NFC/Crypto/Cipher/AES.cs
new file mode 100644
index 0000000..83a7676
--- /dev/null
+++ b/NFC/Crypto/Cipher/AES.cs
@@ -0,0 +1,48 @@
+using Org.BouncyCastle.Crypto;
+using Org.BouncyCastle.Crypto.Engines;
+using Org.BouncyCastle.Crypto.Modes;
+using Org.BouncyCastle.Crypto.Parameters;
+
+namespace NFC.Crypto
+{
+ public class AES : ICipher
+ {
+ public uint BlockSize { get; } = 16;
+
+ public uint KeySize { get; } = 16;
+
+ public byte[] Encrypt(byte[] data, byte[] key, byte[] iv)
+ {
+ AesEngine engine = new AesEngine();
+ CbcBlockCipher blockCipher = new CbcBlockCipher(engine);
+ BufferedBlockCipher cipher = new BufferedBlockCipher(blockCipher);
+ KeyParameter keyParam = new KeyParameter(key);
+ ParametersWithIV keyParamWithIV = new ParametersWithIV(keyParam, iv);
+
+ // Encrypt
+ cipher.Init(true, keyParamWithIV);
+ byte[] outputBytes = new byte[cipher.GetOutputSize(data.Length)];
+ int length = cipher.ProcessBytes(data, outputBytes, 0);
+ cipher.DoFinal(outputBytes, length);
+
+ return outputBytes;
+ }
+
+ public byte[] Decrypt(byte[] data, byte[] key, byte[] iv)
+ {
+ AesEngine engine = new AesEngine();
+ CbcBlockCipher blockCipher = new CbcBlockCipher(engine);
+ BufferedBlockCipher cipher = new BufferedBlockCipher(blockCipher);
+ KeyParameter keyParam = new KeyParameter(key);
+ ParametersWithIV keyParamWithIV = new ParametersWithIV(keyParam, iv);
+
+ // Decrypt
+ cipher.Init(false, keyParamWithIV);
+ byte[] outputBytes = new byte[cipher.GetOutputSize(data.Length)];
+ int length = cipher.ProcessBytes(data, outputBytes, 0);
+ cipher.DoFinal(outputBytes, length);
+
+ return outputBytes;
+ }
+ }
+}
diff --git a/NFC/Crypto/Cipher/TDES.cs b/NFC/Crypto/Cipher/TDES.cs
new file mode 100644
index 0000000..59e591e
--- /dev/null
+++ b/NFC/Crypto/Cipher/TDES.cs
@@ -0,0 +1,49 @@
+using Org.BouncyCastle.Crypto;
+using Org.BouncyCastle.Crypto.Engines;
+using Org.BouncyCastle.Crypto.Modes;
+using Org.BouncyCastle.Crypto.Parameters;
+
+namespace NFC.Crypto
+{
+ public class TDES : ICipher
+ {
+ public uint BlockSize { get; } = 8;
+
+ // Two times the DES Key
+ public uint KeySize { get; } = 16;
+
+ public byte[] Encrypt(byte[] data, byte[] key, byte[] iv)
+ {
+ DesEngine engine = new DesEdeEngine();
+ CbcBlockCipher blockCipher = new CbcBlockCipher(engine);
+ BufferedBlockCipher cipher = new BufferedBlockCipher(blockCipher);
+ KeyParameter keyParam = new KeyParameter(key);
+ ParametersWithIV keyParamWithIV = new ParametersWithIV(keyParam, iv);
+
+ // Encrypt
+ cipher.Init(true, keyParamWithIV);
+ byte[] outputBytes = new byte[cipher.GetOutputSize(data.Length)];
+ int length = cipher.ProcessBytes(data, outputBytes, 0);
+ cipher.DoFinal(outputBytes, length);
+
+ return outputBytes;
+ }
+
+ public byte[] Decrypt(byte[] data, byte[] key, byte[] iv)
+ {
+ DesEngine engine = new DesEdeEngine();
+ CbcBlockCipher blockCipher = new CbcBlockCipher(engine);
+ BufferedBlockCipher cipher = new BufferedBlockCipher(blockCipher);
+ KeyParameter keyParam = new KeyParameter(key);
+ ParametersWithIV keyParamWithIV = new ParametersWithIV(keyParam, iv);
+
+ // Decrypt
+ cipher.Init(false, keyParamWithIV);
+ byte[] outputBytes = new byte[cipher.GetOutputSize(data.Length)];
+ int length = cipher.ProcessBytes(data, outputBytes, 0);
+ cipher.DoFinal(outputBytes, length);
+
+ return outputBytes;
+ }
+ }
+}
diff --git a/NFC/Crypto/Cipher/TDES_2K.cs b/NFC/Crypto/Cipher/TDES_2K.cs
new file mode 100644
index 0000000..142f6cc
--- /dev/null
+++ b/NFC/Crypto/Cipher/TDES_2K.cs
@@ -0,0 +1,48 @@
+using Org.BouncyCastle.Crypto;
+using Org.BouncyCastle.Crypto.Engines;
+using Org.BouncyCastle.Crypto.Modes;
+using Org.BouncyCastle.Crypto.Parameters;
+
+namespace NFC.Crypto
+{
+ public class TDES_2K : ICipher
+ {
+ public uint BlockSize { get; } = 8;
+
+ public uint KeySize { get; } = 16;
+
+ public byte[] Encrypt(byte[] data, byte[] key, byte[] iv)
+ {
+ DesEngine engine = new DesEdeEngine();
+ CbcBlockCipher blockCipher = new CbcBlockCipher(engine);
+ BufferedBlockCipher cipher = new BufferedBlockCipher(blockCipher);
+ KeyParameter keyParam = new KeyParameter(key);
+ ParametersWithIV keyParamWithIV = new ParametersWithIV(keyParam, iv);
+
+ // Encrypt
+ cipher.Init(true, keyParamWithIV);
+ byte[] outputBytes = new byte[cipher.GetOutputSize(data.Length)];
+ int length = cipher.ProcessBytes(data, outputBytes, 0);
+ cipher.DoFinal(outputBytes, length);
+
+ return outputBytes;
+ }
+
+ public byte[] Decrypt(byte[] data, byte[] key, byte[] iv)
+ {
+ DesEngine engine = new DesEdeEngine();
+ CbcBlockCipher blockCipher = new CbcBlockCipher(engine);
+ BufferedBlockCipher cipher = new BufferedBlockCipher(blockCipher);
+ KeyParameter keyParam = new KeyParameter(key);
+ ParametersWithIV keyParamWithIV = new ParametersWithIV(keyParam, iv);
+
+ // Decrypt
+ cipher.Init(false, keyParamWithIV);
+ byte[] outputBytes = new byte[cipher.GetOutputSize(data.Length)];
+ int length = cipher.ProcessBytes(data, outputBytes, 0);
+ cipher.DoFinal(outputBytes, length);
+
+ return outputBytes;
+ }
+ }
+}
diff --git a/NFC/Crypto/Cipher/TDES_3K.cs b/NFC/Crypto/Cipher/TDES_3K.cs
new file mode 100644
index 0000000..87a3bf5
--- /dev/null
+++ b/NFC/Crypto/Cipher/TDES_3K.cs
@@ -0,0 +1,48 @@
+using Org.BouncyCastle.Crypto;
+using Org.BouncyCastle.Crypto.Engines;
+using Org.BouncyCastle.Crypto.Modes;
+using Org.BouncyCastle.Crypto.Parameters;
+
+namespace NFC.Crypto
+{
+ public class TDES_3K : ICipher
+ {
+ public uint BlockSize { get; } = 8;
+
+ public uint KeySize { get; } = 24;
+
+ public byte[] Encrypt(byte[] data, byte[] key, byte[] iv)
+ {
+ DesEngine engine = new DesEdeEngine();
+ CbcBlockCipher blockCipher = new CbcBlockCipher(engine);
+ BufferedBlockCipher cipher = new BufferedBlockCipher(blockCipher);
+ KeyParameter keyParam = new KeyParameter(key);
+ ParametersWithIV keyParamWithIV = new ParametersWithIV(keyParam, iv);
+
+ // Encrypt
+ cipher.Init(true, keyParamWithIV);
+ byte[] outputBytes = new byte[cipher.GetOutputSize(data.Length)];
+ int length = cipher.ProcessBytes(data, outputBytes, 0);
+ cipher.DoFinal(outputBytes, length);
+
+ return outputBytes;
+ }
+
+ public byte[] Decrypt(byte[] data, byte[] key, byte[] iv)
+ {
+ DesEngine engine = new DesEdeEngine();
+ CbcBlockCipher blockCipher = new CbcBlockCipher(engine);
+ BufferedBlockCipher cipher = new BufferedBlockCipher(blockCipher);
+ KeyParameter keyParam = new KeyParameter(key);
+ ParametersWithIV keyParamWithIV = new ParametersWithIV(keyParam, iv);
+
+ // Decrypt
+ cipher.Init(false, keyParamWithIV);
+ byte[] outputBytes = new byte[cipher.GetOutputSize(data.Length)];
+ int length = cipher.ProcessBytes(data, outputBytes, 0);
+ cipher.DoFinal(outputBytes, length);
+
+ return outputBytes;
+ }
+ }
+}
diff --git a/NFC/Crypto/CipherKey.cs b/NFC/Crypto/CipherKey.cs
new file mode 100644
index 0000000..3280381
--- /dev/null
+++ b/NFC/Crypto/CipherKey.cs
@@ -0,0 +1,182 @@
+using System;
+
+namespace NFC.Crypto
+{
+ ///
+ /// Key for DESFire Card
+ ///
+ public class CipherKey
+ {
+ #region Constructors
+ ///
+ /// Creates Key from Array
+ ///
+ /// Key
+ /// Cipher for Key
+ /// Version of Key
+ public CipherKey(byte[] key, CipherType cipher, byte keyVersion)
+ {
+ _Cipher = cipher;
+
+ if (cipher == CipherType.AES && keyVersion < 0x10)
+ {
+ throw new ArgumentOutOfRangeException("KeyVersion is to low for AES Key (Minimum = 0x10)");
+ }
+ _KeyVersion = keyVersion;
+
+ if (!CheckKey(key, cipher))
+ {
+ throw new ArgumentException("Key is not vaild for CipherType");
+ }
+
+ if (cipher == CipherType.TDES || cipher == CipherType.TDES_2K || cipher == CipherType.TDES_3K)
+ {
+ _Key = SetKeyVersion(key, keyVersion);
+ }
+ else
+ {
+ _Key = key;
+ }
+ }
+
+ ///
+ /// Creates Key from String
+ ///
+ /// Key
+ /// Cipher for Key
+ /// Version of Key
+ public CipherKey(string key, CipherType cipher, byte keyVersion) : this(HexConverter.ConvertFromHexString(key), cipher, keyVersion)
+ {
+
+ }
+
+ ///
+ /// Generates Empty Key
+ ///
+ /// Cipher for Key
+ ///
+ public CipherKey(CipherType cipher)
+ {
+ _Cipher = cipher;
+ _Key = GenerateEmptyKey(cipher);
+
+ if (cipher == CipherType.AES)
+ {
+ _KeyVersion = 0x10;
+ }
+ else
+ {
+ _KeyVersion = 0x00;
+ }
+ }
+ #endregion
+
+ #region Properties
+ ///
+ /// Key as Array
+ ///
+ public byte[] _Key { get; private set; }
+
+ ///
+ /// CipherType of Key
+ ///
+ public CipherType _Cipher { get; private set; }
+
+ ///
+ /// KeyVersion of Key
+ /// For AES 0x10 is minimum
+ ///
+ public byte _KeyVersion { get; private set; }
+ #endregion
+
+ #region Methods
+ ///
+ /// Generate Empty Key for CipherType
+ ///
+ /// Type of Cipher
+ public byte[] GenerateEmptyKey(CipherType cipher)
+ {
+ uint size = GetKeySize(cipher);
+
+ byte[] key = new byte[size];
+ for (int i = 0; i < size; i++)
+ {
+ key[i] = 0;
+ }
+
+ return key;
+ }
+
+ ///
+ /// Check Key Array
+ ///
+ /// Key
+ /// Cipher Type of Key
+ public bool CheckKey(byte[] key, CipherType cipher)
+ {
+ if (key.Length != GetKeySize(cipher))
+ {
+ return false;
+ }
+ else
+ {
+ return true;
+ }
+ }
+
+ ///
+ /// Get KeySize for CipherType
+ ///
+ /// Type of Cipher
+ public uint GetKeySize(CipherType cipher)
+ {
+ switch (cipher)
+ {
+ case CipherType.TDES:
+ return 16;
+ case CipherType.TDES_2K:
+ return 16;
+ case CipherType.TDES_3K:
+ return 24;
+ case CipherType.AES:
+ return 16;
+ default:
+ throw new ArgumentOutOfRangeException("Unknown CipherType.");
+ }
+ }
+
+ ///
+ /// Set Key Version for DES/TDES Keys
+ /// KeyVersion is stored in the LSBits of the first 8 Bytes
+ /// Parity Bits are not used from DESFire Cars
+ ///
+ ///
+ ///
+ ///
+ public byte[] SetKeyVersion(byte[] key, byte version)
+ {
+ byte[] pow2 = new byte[]
+ {
+ 0x01, 0x02, 0x04, 0x08, 0x10, 0x20, 0x40, 0x80
+ };
+
+ byte[] new_key = new byte[key.Length];
+ key.CopyTo(new_key, 0);
+
+ for (int i = 0; i < 8; i++)
+ {
+ if ((version & pow2[i]) > 0)
+ {
+ new_key[i] = (byte)(new_key[5] | 0x01);
+ }
+ else
+ {
+ new_key[i] = (byte)(new_key[5] & 0x7F);
+ }
+ }
+
+ return new_key;
+ }
+ #endregion
+ }
+}
\ No newline at end of file
diff --git a/NFC/Crypto/CipherType.cs b/NFC/Crypto/CipherType.cs
new file mode 100644
index 0000000..c0b7dfa
--- /dev/null
+++ b/NFC/Crypto/CipherType.cs
@@ -0,0 +1,25 @@
+namespace NFC.Crypto
+{
+ public enum CipherType
+ {
+ ///
+ /// DES / Triple DES
+ ///
+ TDES,
+
+ ///
+ /// Triple DES with 2 DES Keys
+ ///
+ TDES_2K,
+
+ ///
+ /// Triple DES with 3 DES Keys
+ ///
+ TDES_3K,
+
+ ///
+ /// AES
+ ///
+ AES
+ }
+}
diff --git a/NFC/Crypto/ICipher.cs b/NFC/Crypto/ICipher.cs
new file mode 100644
index 0000000..84583a4
--- /dev/null
+++ b/NFC/Crypto/ICipher.cs
@@ -0,0 +1,32 @@
+namespace NFC.Crypto
+{
+ public interface ICipher
+ {
+ ///
+ /// Size of Cipher Block in Byte
+ ///
+ public uint BlockSize { get; }
+
+ ///
+ /// Size of Key in Byte
+ ///
+ public uint KeySize { get; }
+
+ ///
+ /// Encrypt Data
+ ///
+ /// Data in BlockSize
+ /// Key
+ /// Initialisation Vector
+ ///
+ public byte[] Encrypt(byte[] data, byte[] key, byte[] IV);
+
+ ///
+ /// Decrypt Data
+ ///
+ /// Data in BlockSize
+ /// Key
+ /// Initialisation Vector
+ public byte[] Decrypt(byte[] data, byte[] key, byte[] IV);
+ }
+}
diff --git a/NFC/HexConverter.cs b/NFC/HexConverter.cs
new file mode 100644
index 0000000..b6e07a7
--- /dev/null
+++ b/NFC/HexConverter.cs
@@ -0,0 +1,51 @@
+using System;
+
+namespace NFC
+{
+ ///
+ /// Converts to and from Byte Array from and to String
+ ///
+ public static class HexConverter
+ {
+ ///
+ /// Converts byte[] to string with HEX Code
+ /// No 0x is created
+ ///
+ /// Data
+ public static string ConvertToHexString(byte[] data)
+ {
+ return BitConverter.ToString(data).Replace("-", "").ToLower();
+ }
+
+ ///
+ /// Converts string with HEX Code to byte[]
+ /// No 0x is requiered
+ ///
+ /// Data
+ public static byte[] ConvertFromHexString(string data)
+ {
+ if (data.Length % 2 == 1)
+ throw new Exception("Data Length is uneven.");
+
+ byte[] arr = new byte[data.Length >> 1];
+
+ for (int i = 0; i < data.Length >> 1; ++i)
+ {
+ arr[i] = (byte)((GetHexVal(data[i << 1]) << 4) + (GetHexVal(data[(i << 1) + 1])));
+ }
+
+ return arr;
+ }
+
+ private static int GetHexVal(char hex)
+ {
+ int val = (int)hex;
+ //For uppercase A-F letters:
+ //return val - (val < 58 ? 48 : 55);
+ //For lowercase a-f letters:
+ //return val - (val < 58 ? 48 : 87);
+ //Or the two combined, but a bit slower:
+ return val - (val < 58 ? 48 : (val < 97 ? 55 : 87));
+ }
+ }
+}
diff --git a/NFC/IReader.cs b/NFC/IReader.cs
new file mode 100644
index 0000000..b130cc6
--- /dev/null
+++ b/NFC/IReader.cs
@@ -0,0 +1,77 @@
+using System;
+using NFC.ISO7816_4;
+
+namespace NFC
+{
+ ///
+ /// Abstract representation of the platform specific NFC Hardware.
+ ///
+ public interface IHardware
+ {
+ ///
+ /// Check if the device has nfc support.
+ ///
+ /// Returns true if the device supports NFC.
+ bool IsAvailable();
+
+ /// Returns all available readers.
+ string[] GetReaders();
+
+ ///
+ /// Create a new reader instance from the specified id.
+ ///
+ /// Returns the spatform specific reader that corresponds to the id.
+ /// Invalid reader id.
+ IReader OpenReader(string readerID);
+ }
+
+ public delegate void ReaderEventHandler(object sender, ICard card);
+
+ ///
+ /// Abstraction of a platform-specifc reader that can communicate with NFC cards.
+ ///
+ public interface IReader
+ {
+ ///
+ /// Event that will be called when a new tag was discovered.
+ ///
+ event ReaderEventHandler CardDiscovered;
+
+ ///
+ /// Event that will be called when a tag that is in use gets disconnected.
+ ///
+ event ReaderEventHandler CardLost;
+
+ void Start();
+
+ void Stop();
+ }
+
+ public interface ICard
+ {
+ ///
+ /// Connect to Smartcard
+ ///
+ void Connect();
+
+ ///
+ /// Disconnect from Smartcard
+ ///
+ void Disconnect();
+
+ ///
+ /// Transmit APDU Command to Smartcard
+ ///
+ /// Application Protocol Data Unit Command - ISO 7816
+ /// Application Protocol Data Unit Response - ISO 7816
+ APDUResponse Transmit(APDUCommand apdu_cmd);
+ }
+
+ public class ReaderUnavailableException : Exception { }
+
+ public class CardUnavailableException : Exception { }
+
+ public class APDUException : Exception {
+ public readonly byte ResponseCode;
+ }
+}
diff --git a/NFC/ISO7816-4/APDUCommand.cs b/NFC/ISO7816-4/APDUCommand.cs
new file mode 100644
index 0000000..a0ffaa4
--- /dev/null
+++ b/NFC/ISO7816-4/APDUCommand.cs
@@ -0,0 +1,83 @@
+using PCSC;
+using PCSC.Iso7816;
+using System;
+using System.Linq;
+
+namespace NFC.ISO7816_4
+{
+ public class APDUCommand : CommandApdu
+ {
+ public APDUCommand(IsoCase isoCase) : base(isoCase, SCardProtocol.Any)
+ {
+
+ }
+
+ public override bool Equals(object obj)
+ {
+ return obj is APDUCommand command &&
+ Case == command.Case &&
+ Protocol == command.Protocol &&
+ CLA == command.CLA &&
+ INS == command.INS &&
+ P1 == command.P1 &&
+ P2 == command.P2 &&
+ Data.SequenceEqual(command.Data) &&
+ Le == command.Le;
+ }
+
+ public override int GetHashCode()
+ {
+ HashCode hash = new HashCode();
+ hash.Add(Case);
+ hash.Add(Protocol);
+ hash.Add(IsValid);
+ hash.Add(CLA);
+ hash.Add(INS);
+ hash.Add(P1);
+ hash.Add(P2);
+ hash.Add(P1P2);
+ hash.Add(Data);
+ hash.Add(Lc);
+ hash.Add(P3);
+ hash.Add(Le);
+ hash.Add(ExpectedResponseLength);
+ hash.Add(IsValid);
+ return hash.ToHashCode();
+ }
+
+ public static bool operator ==(APDUCommand obj1, APDUCommand obj2)
+ {
+ return obj1.Equals(obj2);
+ }
+
+ public static bool operator !=(APDUCommand obj1, APDUCommand obj2)
+ {
+ return !(obj1.Equals(obj2));
+ }
+
+ public override string ToString()
+ {
+ string pattern_case1 = "(CASE: 1) CLA: 0x{0:x} | INS: 0x{1:x} | P1: 0x{2:x} | P2: 0x{3:x}";
+ string pattern_case2 = "(CASE: 2) CLA: 0x{0:x} | INS: 0x{1:x} | P1: 0x{2:x} | P2: 0x{3:x} | LE: 0x{4:x} |";
+ string pattern_case3 = "(CASE: 3) CLA: 0x{0:x} | INS: 0x{1:x} | P1: 0x{2:x} | P2: 0x{3:x} | LC: 0x{4:x} | Data: {5:x}";
+ string pattern_case4 = "(CASE: 4) CLA: 0x{0:x} | INS: 0x{1:x} | P1: 0x{2:x} | P2: 0x{3:x} | LC: 0x{4:x} | Data: {5:x} | LE: 0x{6:x} |";
+
+ switch (Case)
+ {
+ case IsoCase.Case1:
+ return string.Format(pattern_case1, CLA, INS, P1, P2);
+ case IsoCase.Case2Short:
+ case IsoCase.Case2Extended:
+ return string.Format(pattern_case2, CLA, INS, P1, P2, Le);
+ case IsoCase.Case3Short:
+ case IsoCase.Case3Extended:
+ return string.Format(pattern_case3, CLA, INS, P1, P2, Lc, BitConverter.ToString(Data).Replace("-", "").ToLower());
+ case IsoCase.Case4Short:
+ case IsoCase.Case4Extended:
+ return string.Format(pattern_case4, CLA, INS, P1, P2, Lc, BitConverter.ToString(Data).Replace("-", "").ToLower(), Le);
+ default:
+ throw new Exception("Unknown IsoCase");
+ }
+ }
+ }
+}
diff --git a/NFC/ISO7816-4/APDUResponse.cs b/NFC/ISO7816-4/APDUResponse.cs
new file mode 100644
index 0000000..d5ef0e3
--- /dev/null
+++ b/NFC/ISO7816-4/APDUResponse.cs
@@ -0,0 +1,161 @@
+using System;
+using System.Collections.Generic;
+using System.Linq;
+using NFC.Mifare_DESFire;
+
+namespace NFC.ISO7816_4
+{
+ public class APDUResponse
+ {
+ #region constructor
+ public APDUResponse()
+ {
+
+ }
+
+ ///
+ /// Creates a new APDUResponse from the raw received data.
+ ///
+ public APDUResponse(byte[] raw)
+ {
+ Body = raw.Take(raw.Length - 1).ToArray();
+ SW1 = raw[raw.Length - 2];
+ SW2 = raw[raw.Length - 3];
+ }
+ #endregion
+
+ #region Properties
+ ///
+ /// ISO 7816-4-4 - Body - Body
+ ///
+ public byte[] Body { get; set; }
+
+ ///
+ /// ISO 7816-4 - SW1 - Status Word 1
+ ///
+ public byte SW1 { get; set; }
+
+ ///
+ /// ISO 7816-4 - SW2 - Status Word 2
+ ///
+ public byte SW2 { get; set; }
+
+ public APDUStatusWords StatusWord
+ {
+ get
+ {
+ // Some status words only require a specific first byte
+ // and in some cases SW2 contains additional information.
+ // This will filter out those errors. When there is more information separate methods for getting those are available.
+ switch(SW1) {
+ case 0x61:
+ // Kommando erfolgreich ausgeführt. xx Datenbytes können mit dem ‚GET RESPONSE‘-Kommando abgeholt werden. Statuswort zur Steuerung des T=0-Protokolls
+ return APDUStatusWords.DATA_READY;
+ case 0x62:
+ // Warnung; Zustand des nichtflüchtigen Speichers nicht verändert
+ return APDUStatusWords.STORAGE_NOT_CHANGED;
+ case 0x63:
+ if((SW2 & 0xF0) == 0xC0) {
+ // Zähler hat den Wert x erreicht (die genaue Bedeutung ist vom Kommando abhängig)
+ return APDUStatusWords.COUNTER_REACHED;
+ }
+ // Warnung; Zustand des nichtflüchtigen Speichers verändert
+ return APDUStatusWords.STORAGE_CHANGED;
+ case 0x64:
+ // Ausführungsfehler; Zustand des nichtflüchtigen Speichers nicht verändert
+ return APDUStatusWords.EXECUTION_ERROR_WITHOUT_CHANGE;
+ case 0x65:
+ // Ausführungsfehler; Zustand des nichtflüchtigen Speichers verändert
+ return APDUStatusWords.EXECUTION_ERROR_WITH_CHANGE;
+ case 0x6C:
+ // Falsche Länge Le; xx gibt die korrekte Länge an Statuswort zur Steuerung des T=0-Protokolls
+ return APDUStatusWords.INVALID_LE;
+ }
+ return (APDUStatusWords) (((UInt16) SW1) << 8 | ((UInt16) SW2));
+ }
+ }
+
+ ///
+ /// If the reponse status is DATA_READY this method can be used to get the amount of data that can be read from the card.
+ ///
+ public byte DataLength
+ {
+ get
+ {
+ return SW2;
+ }
+ }
+
+ ///
+ /// If the reponse status is COUNTER_REACHED this method can be used to get the value that the counter reached.
+ ///
+ public byte Counter
+ {
+ get
+ {
+ return (byte)(SW2 & 0x0F);
+ }
+ }
+
+ ///
+ /// If the reponse status is INVALID_LE this method can be used to get the correct LE.
+ ///
+ public byte CorrectLE
+ {
+ get
+ {
+ return SW2;
+ }
+ }
+ #endregion
+
+ #region Methodes
+ public byte[] ToArray()
+ {
+ byte[] array = null;
+ if (Body != null)
+ {
+ array = new byte[Body.Length + 2];
+ Body.CopyTo(array, 0);
+
+ array[Body.Length] = SW1;
+ array[Body.Length + 1] = SW2;
+ }
+ else
+ {
+ array = new byte[2];
+ array[0] = SW1;
+ array[1] = SW2;
+ }
+
+ return array;
+ }
+
+ public override bool Equals(object obj)
+ {
+ return obj is APDUResponse response &&
+ EqualityComparer.Default.Equals(Body, response.Body) &&
+ SW1 == response.SW1 &&
+ SW2 == response.SW2;
+ }
+
+ public override int GetHashCode()
+ {
+ return HashCode.Combine(Body, SW1, SW2);
+ }
+
+ public override string ToString()
+ {
+ if(Body == null)
+ {
+ return string.Format("SW1: 0x{0:x} | SW2: 0x{1:x}", SW1, SW2);
+ }
+ else
+ {
+ return string.Format("SW1: 0x{0:x} | SW2: 0x{1:x} | Body: {2:x}", SW1, SW2, BitConverter.ToString(Body).Replace("-", "").ToLower());
+ }
+
+ }
+ #endregion
+ }
+}
diff --git a/NFC/ISO7816-4/APDUStatusWords.cs b/NFC/ISO7816-4/APDUStatusWords.cs
new file mode 100644
index 0000000..c6db0cb
--- /dev/null
+++ b/NFC/ISO7816-4/APDUStatusWords.cs
@@ -0,0 +1,212 @@
+using System;
+
+namespace NFC.Mifare_DESFire
+{
+ public enum APDUStatusWords : UInt16
+ {
+ ///
+ /// Kommando erfolgreich ausgefhrt. xx Datenbytes knnen mit dem GET RESPONSE-Kommando abgeholt werden. Statuswort zur Steuerung des T=0-Protokolls
+ ///
+ DATA_READY = 0x6100,
+
+ ///
+ /// Die zurckgegebenen Daten knnen fehlerhaft sein.
+ ///
+ FAULTY_DATA = 0x6281,
+
+ ///
+ /// Da das Dateiende vorher erreicht wurde, konnten nur weniger als Le Bytes gelesen werden.
+ ///
+ UNEXPECTED_END_OF_FILE = 0x6282,
+
+ ///
+ /// Die ausgewhlte Datei ist gesperrt (englisch invalidated, wrtlich ungltig).
+ ///
+ INVALIDATED_FILE = 0x6283,
+
+ ///
+ /// Die File Control Information (FCI) ist inkonform zu ISO 7816-4.
+ ///
+ FCI_NOT_CONFORM = 0x6284,
+
+ ///
+ /// Warnung; Zustand des nichtflchtigen Speichers nicht verndert
+ ///
+ STORAGE_NOT_CHANGED = 0x6200,
+
+ ///
+ /// Zhler hat den Wert x erreicht (die genaue Bedeutung ist vom Kommando abhngig)
+ ///
+ COUNTER_REACHED = 0x63C0,
+
+ ///
+ /// Warnung; Zustand des nichtflchtigen Speichers verndert
+ ///
+ STORAGE_CHANGED = 0x6300,
+
+ ///
+ /// Ausfhrungsfehler; Zustand des nichtflchtigen Speichers nicht verndert
+ ///
+ EXECUTION_ERROR_WITHOUT_CHANGE = 0x6400,
+
+ ///
+ /// Speicherfehler
+ ///
+ MEMORY_ERROR = 0x6581,
+
+ ///
+ /// Ausfhrungsfehler; Zustand des nichtflchtigen Speichers verndert
+ ///
+ EXECUTION_ERROR_WITH_CHANGE = 0x6500,
+
+ ///
+ /// Befehlslnge (Lc) oder erwartete Antwortlnge (Le) falsch
+ ///
+ INVALID_LC_LE = 0x6700,
+
+ ///
+ /// Funktionen im Class-Byte werden nicht untersttzt
+ ///
+ CLASS_FEATURE_NOT_SUPPORTED = 0x6800,
+
+ ///
+ /// Logische Kanle werden nicht untersttzt
+ ///
+ LOGIC_CHANNEL_NOT_SUPPORTED = 0x6881,
+
+ ///
+ /// Secure Messaging wird nicht untersttzt
+ ///
+ SECURE_MESSAGING_NOT_SUPPORTED = 0x6882,
+
+ ///
+ /// Kommando nicht erlaubt
+ ///
+ COMMAND_NOT_ALLOWED = 0x6900,
+
+ ///
+ /// Kommando inkompatibel zur Dateistruktur
+ ///
+ COMMAND_INCOMPATIBLE = 0x6981,
+
+ ///
+ /// Sicherheitszustand nicht erfllt
+ ///
+ SAFETY_STATUS_NOT_FULFILLED = 0x6982,
+
+ ///
+ /// Authentisierungsmethode ist gesperrt
+ ///
+ AUTHENTICATION_METHOD_LOCKED = 0x6983,
+
+ ///
+ /// Referenzierte Daten sind gesperrt
+ ///
+ REFERENCED_FILE_LOCKED = 0x6984,
+
+ ///
+ /// Nutzungsbedingungen sind nicht erfllt
+ ///
+ TERMS_OF_SERVICE_NOT_FULFILLED = 0x6985,
+
+ ///
+ /// Kommando nicht erlaubt (kein EF selektiert)
+ ///
+ COMMAND_NOT_ALLOWED_NO_EF_SELECTED = 0x6986,
+
+ ///
+ /// Erwartete Secure-Messaging-Objekte nicht gefunden
+ ///
+ EXPECTED_SECURE_MESSAGING_OBJECTS_NOT_FOUND = 0x6987,
+
+ ///
+ /// Secure-Messaging-Datenobjekte sind inkorrekt
+ ///
+ INVALID_SECURE_MESSAGING_OBJECTS = 0x6988,
+
+ ///
+ /// Falsche Parameter P1/P2
+ ///
+ WRONG_PARAMETERS = 0x6A00,
+
+ ///
+ /// Falsche Daten
+ ///
+ WRONG_DATA = 0x6A80,
+
+ ///
+ /// Funktion wird nicht untersttzt
+ ///
+ FEATURE_NOT_SUPPORTED = 0x6A81,
+
+ ///
+ /// Datei wurde nicht gefunden
+ ///
+ FILE_NOT_FOUND = 0x6A82,
+
+ ///
+ /// Datensatz (engl. record) der Datei nicht gefunden
+ ///
+ RECORD_NOT_FOUND = 0x6A83,
+
+ ///
+ /// Nicht gengend Speicherplatz in der Datei
+ ///
+ INSUFFICIENT_SPACE = 0x6A84,
+
+ ///
+ /// Lc nicht konsistent mit der TLV-Struktur
+ ///
+ LC_TLV_INCONSISTENT = 0x6A85,
+
+ ///
+ /// Inkorrekte Parameter P1/P2
+ ///
+ INCORRECT_PARAMETERs = 0x6A86,
+
+ ///
+ /// Lc inkonsistent mit P1/P2
+ ///
+ LC_PARAMETERS_INCONSISTENT = 0x6A87,
+
+ ///
+ /// Referenzierte Daten nicht gefunden
+ ///
+ REFERENCED_FILE_NOT_FOUND = 0x6A88,
+
+ ///
+ /// Parameter P1/P2 falsch
+ ///
+ WRONG_PARAMETERS_2 = 0x6B00,
+
+ ///
+ /// Falsche Lnge Le; xx gibt die korrekte Lnge an Statuswort zur Steuerung des T=0-Protokolls
+ ///
+ INVALID_LE = 0x6C00,
+
+ ///
+ /// Das Kommando (INS) wird nicht untersttzt
+ ///
+ INSTRUCTION_NOT_SUPPORTED = 0x6D00,
+
+ ///
+ /// Die Kommandoklasse (CLA) wird nicht untersttzt
+ ///
+ CLASS_NOT_SUPPORTED = 0x6E00,
+
+ ///
+ /// Kommando wurde mit unbekanntem Fehler abgebrochen
+ ///
+ UNKNOWN_ERROR = 0x6F00,
+
+ ///
+ /// Kommando erfolgreich ausgefhrt
+ ///
+ SUCCESS = 0x9000,
+
+ ///
+ /// OK
+ ///
+ OK = 0x9100,
+ }
+}
diff --git a/NFC/NFC.csproj b/NFC/NFC.csproj
new file mode 100644
index 0000000..d823efa
--- /dev/null
+++ b/NFC/NFC.csproj
@@ -0,0 +1,13 @@
+
+
+
+ netstandard2.1
+
+
+
+
+
+
+
+
+
diff --git a/NFC/NXP MIFARE DESFire/APDUInstructions.cs b/NFC/NXP MIFARE DESFire/APDUInstructions.cs
new file mode 100644
index 0000000..934c08d
--- /dev/null
+++ b/NFC/NXP MIFARE DESFire/APDUInstructions.cs
@@ -0,0 +1,44 @@
+namespace NFC.Mifare_DESFire
+{
+ enum APDUInstructions : byte
+ {
+ AUTHENTICATE_ISO = 0x1A,
+ AUTHENTICATE_AES = 0xAA,
+ CHANGE_KEY_SETTINGS = 0x54,
+ SET_CONFIGURATION = 0x5C,
+ CHANGE_KEY = 0xC4,
+ GET_KEY_VERSION = 0x64,
+ CREATE_APPLICATION = 0xCA,
+ DELETE_APPLICATION = 0xDA,
+ GET_APPLICATION_IDS = 0x6A,
+ FREE_MEMORY = 0x6E,
+ GET_DF_NAMES = 0x6D,
+ GET_KEY_SETTINGS = 0x45,
+ SELECT_APPLICATION = 0x5A,
+ FORMAT_PICC = 0xFC,
+ GET_VERSION = 0x60,
+ GET_CARD_UID = 0x51,
+ GET_FILE_IDS = 0x6F,
+ GET_FILE_SETTINGS = 0xF5,
+ CHANGE_FILE_SETTINGS = 0x5F,
+ CREATE_STDDATAFILE = 0xCD,
+ CREATE_BACKUPDATAFILE = 0xCB,
+ CREATE_VALUE_FILE = 0xCC,
+ CREATE_LINEAR_RECORD_FILE = 0xC1,
+ CREATE_CYCLIC_RECORD_FILE = 0xC0,
+ DELETE_FILE = 0xDF,
+ GET_ISO_FILE_IDS = 0x61,
+ READ_DATA = 0xBD,
+ WRITE_DATA = 0x3D,
+ GET_VALUE = 0x6C,
+ CREDIT = 0x0C,
+ DEBIT = 0xDC,
+ LIMITED_CREDIT = 0x1C,
+ WRITE_RECORD = 0x3B,
+ READ_RECORDS = 0xBB,
+ CLEAR_RECORD_FILE = 0xEB,
+ COMMIT_TRANSACTION = 0xC7,
+ ABORT_TRANSACTION = 0xA7,
+ CONTINUE = 0xAF,
+ }
+}
diff --git a/NFC/NXP MIFARE DESFire/APDUStatusCodes.cs b/NFC/NXP MIFARE DESFire/APDUStatusCodes.cs
new file mode 100644
index 0000000..06fa336
--- /dev/null
+++ b/NFC/NXP MIFARE DESFire/APDUStatusCodes.cs
@@ -0,0 +1,30 @@
+using System;
+
+namespace NFC.Mifare_DESFire
+{
+ public enum APDUStatusCodes : UInt16
+ {
+ OPERATION_OK = 0x9000, // = Successful operation
+ NO_CHANGES = 0x900C, // = No changes done to backup files, CommitTransaction / AbortTransaction not necessary
+ OUT_OF_EEPROM_ERROR = 0x900E, // = Insufficient NV-Memory to complete command
+ ILLEGAL_COMMAND_CODE = 0x901C, // = Command code not supported
+ INTEGRITY_ERROR = 0x901E, // = CRC or MAC does not match data Padding bytes not valid
+ NO_SUCH_KEY = 0x9040, // = Invalid key number specified
+ LENGTH_ERROR = 0x907E, // = Length of command string invalid
+ PERMISSION_DENIED = 0x909D, // = Current configuration / status does not allow the requested command
+ PARAMETER_ERROR = 0x909E, // = Value of the parameter(s) invalid
+ APPLICATION_NOT_FOUND = 0x90A0, // = Requested AID not present on PICC
+ APPL_INTEGRITY_ERROR = 0x90A1, // = Unrecoverable error within application, application will be disabled
+ AUTHENTICATION_ERROR = 0x90AE, // = Current authentication status does not allow the requested command
+ ADDITIONAL_FRAME = 0x90AF, // = Additional data frame is expected to be sent
+ BOUNDARY_ERROR = 0x90BE, // = Attempt to read/write data from/to beyond the file\'s/record\'s limits. Attempt to exceed the limits of a value file.
+ PICC_INTEGRITY_ERROR = 0x90C1, // = Unrecoverable error within PICC, PICC will be disabled
+ COMMAND_ABORTED = 0x90CA, // = Previous Command was not fully completed Not all Frames were requested or provided by the PCD
+ PICC_DISABLED_ERROR = 0x90CD, // = PICC was disabled by an unrecoverable error
+ COUNT_ERROR = 0x90CE, // = Number of Applications limited to 28, no additional CreateApplication possible
+ DUPLICATE_ERROR = 0x90DE, // = Creation of file/application failed because file/application with same number already exists
+ EEPROM_ERROR = 0x90EE, // = Could not complete NV-write operation due to loss of power, internal backup/rollback mechanism activated
+ FILE_NOT_FOUND = 0x90F0, // = Specified file number does not exist
+ FILE_INTEGRITY_ERROR = 0x90F1, // = Unrecoverable error within file, file will be disabled
+ }
+}
\ No newline at end of file
diff --git a/NFC/NXP MIFARE DESFire/Enums/ChangeApplicationKey.cs b/NFC/NXP MIFARE DESFire/Enums/ChangeApplicationKey.cs
new file mode 100644
index 0000000..18305e1
--- /dev/null
+++ b/NFC/NXP MIFARE DESFire/Enums/ChangeApplicationKey.cs
@@ -0,0 +1,21 @@
+namespace NFC.Mifare_DESFire.Enums
+{
+ ///
+ /// hold the Access Rights for changing application keys (Change Key command)
+ ///
+ public enum ChangeApplicationKey : byte
+ {
+ ///
+ /// Application master key authentication is necessary to change any key (default)
+ ///
+ MASTERKEY = 0x00,
+ ///
+ /// Authentication with the key to be changed (same Key#) is necessary to change a key
+ ///
+ SAMEKEY = 0x0E,
+ ///
+ /// All keys (except application master key, see Bit 0) within this application are frozen
+ ///
+ ALLKEYS = 0x0F
+ }
+}
diff --git a/NFC/NXP MIFARE DESFire/Enums/ChangeMasterKey.cs b/NFC/NXP MIFARE DESFire/Enums/ChangeMasterKey.cs
new file mode 100644
index 0000000..ae16dd8
--- /dev/null
+++ b/NFC/NXP MIFARE DESFire/Enums/ChangeMasterKey.cs
@@ -0,0 +1,18 @@
+namespace NFC.Mifare_DESFire.Enums
+{
+ ///
+ /// codes whether the application master key is changeable
+ ///
+ public enum ChangeMasterKey : byte
+ {
+ ///
+ /// Application master key is not changeable anymore (frozen)
+ ///
+ FROZEN = 0x00,
+
+ ///
+ /// Application master key is changeable (authentication with the current application master key necessary, default)
+ ///
+ CHANGEABLE = 0x01,
+ }
+}
diff --git a/NFC/NXP MIFARE DESFire/Enums/ChangeMasterKeySettings.cs b/NFC/NXP MIFARE DESFire/Enums/ChangeMasterKeySettings.cs
new file mode 100644
index 0000000..75bae21
--- /dev/null
+++ b/NFC/NXP MIFARE DESFire/Enums/ChangeMasterKeySettings.cs
@@ -0,0 +1,19 @@
+namespace NFC.Mifare_DESFire.Enums
+{
+ ///
+ /// codes whether a change of the application master key settings is allowed
+ ///
+ public enum ChangeMasterKeySettings : byte
+ {
+
+ ///
+ /// configuration not changeable anymore (frozen)
+ ///
+ FROZEN = 0x00,
+
+ ///
+ /// this configuration is changeable if authenticated with the application master key (default)
+ ///
+ WITHMASTERKEY = 0x08
+ }
+}
diff --git a/NFC/NXP MIFARE DESFire/Enums/CreateDeleteFile.cs b/NFC/NXP MIFARE DESFire/Enums/CreateDeleteFile.cs
new file mode 100644
index 0000000..b50b7b8
--- /dev/null
+++ b/NFC/NXP MIFARE DESFire/Enums/CreateDeleteFile.cs
@@ -0,0 +1,18 @@
+namespace NFC.Mifare_DESFire.Enums
+{
+ ///
+ /// codes whether application master key authentication is needed before “Create File” / “Delete File”
+ ///
+ public enum CreateDeleteFile : byte
+ {
+ ///
+ /// “Create File”/ “Delete File”is permitted only with application master key authentication
+ ///
+ ONLYMASTERKEY = 0x00,
+
+ ///
+ /// “Create File”/ “Delete File”is permitted also without application master key authentication (default)
+ ///
+ NOKEY = 0x04,
+ }
+}
diff --git a/NFC/NXP MIFARE DESFire/Enums/CryptoOperationsType.cs b/NFC/NXP MIFARE DESFire/Enums/CryptoOperationsType.cs
new file mode 100644
index 0000000..d395466
--- /dev/null
+++ b/NFC/NXP MIFARE DESFire/Enums/CryptoOperationsType.cs
@@ -0,0 +1,12 @@
+namespace NFC.Mifare_DESFire.Enums
+{
+ ///
+ /// Crypto method of the application
+ ///
+ public enum CryptoOperationsType : byte
+ {
+ TDES = 0x00,
+ TKTDES = 0x40,
+ AES = 0x80,
+ }
+}
\ No newline at end of file
diff --git a/NFC/NXP MIFARE DESFire/Enums/FileAccessRights.cs b/NFC/NXP MIFARE DESFire/Enums/FileAccessRights.cs
new file mode 100644
index 0000000..fd91f3a
--- /dev/null
+++ b/NFC/NXP MIFARE DESFire/Enums/FileAccessRights.cs
@@ -0,0 +1,8 @@
+namespace NFC.Mifare_DESFire.Enums
+{
+ public enum FileAccessRights : byte
+ {
+ FREE = 0x0E,
+ NEVER = 0x0F
+ }
+}
diff --git a/NFC/NXP MIFARE DESFire/Enums/FileCommunication.cs b/NFC/NXP MIFARE DESFire/Enums/FileCommunication.cs
new file mode 100644
index 0000000..47e976c
--- /dev/null
+++ b/NFC/NXP MIFARE DESFire/Enums/FileCommunication.cs
@@ -0,0 +1,20 @@
+namespace NFC.Mifare_DESFire.Enums
+{
+ public enum FileCommunication : byte
+ {
+ ///
+ /// "Plain communication"
+ ///
+ PLAIN = 0x00,
+
+ ///
+ /// Plain communication secured by DES/3DES MACing
+ ///
+ MAC = 0x01,
+
+ ///
+ /// Fully DES/3DES enciphered communication
+ ///
+ ENCRYPT = 0x03
+ }
+}
diff --git a/NFC/NXP MIFARE DESFire/Enums/FileDirectoryAccess.cs b/NFC/NXP MIFARE DESFire/Enums/FileDirectoryAccess.cs
new file mode 100644
index 0000000..e2e9db4
--- /dev/null
+++ b/NFC/NXP MIFARE DESFire/Enums/FileDirectoryAccess.cs
@@ -0,0 +1,18 @@
+namespace NFC.Mifare_DESFire.Enums
+{
+ ///
+ /// codes whether application master key authentication is needed for file directory access
+ ///
+ public enum FileDirectoryAccess : byte
+ {
+ ///
+ /// Successful application master key authentication is required for executing the “Get FID List”, “Get File Settings”and “Get Key Settings”commands
+ ///
+ ONLYMASTERKEY = 0x00,
+
+ ///
+ /// “Get FID List”, “Get File Settings” and “Get Key Settings” commands succeed independentlyof a preceding application master key authentication (default)
+ ///
+ NOKEY = 0x02,
+ }
+}
diff --git a/NFC/NXP MIFARE DESFire/Enums/FileIdentifies.cs b/NFC/NXP MIFARE DESFire/Enums/FileIdentifies.cs
new file mode 100644
index 0000000..25873f1
--- /dev/null
+++ b/NFC/NXP MIFARE DESFire/Enums/FileIdentifies.cs
@@ -0,0 +1,11 @@
+namespace NFC.Mifare_DESFire.Enums
+{
+ ///
+ /// Indicates use of 2 byte ISO/IEC 7816-4 File Identifies for files within the Application
+ ///
+ public enum FileIdentifies : byte
+ {
+ NOTUSED = 0x00,
+ USED = 0x20
+ }
+}
diff --git a/NFC/NXP MIFARE DESFire/Enums/FileTypes.cs b/NFC/NXP MIFARE DESFire/Enums/FileTypes.cs
new file mode 100644
index 0000000..0a18ea3
--- /dev/null
+++ b/NFC/NXP MIFARE DESFire/Enums/FileTypes.cs
@@ -0,0 +1,30 @@
+namespace NFC.Mifare_DESFire.Enums
+{
+ enum FileTypes : byte
+ {
+ ///
+ /// Standard Data File
+ ///
+ STANDARD = 0x00,
+
+ ///
+ /// Backup Data Files
+ ///
+ BACKUP = 0x01,
+
+ ///
+ /// Value Files with Backup
+ ///
+ VALUE = 0x02,
+
+ ///
+ /// Linear Record Files with Backup
+ ///
+ LINEARRECORD = 0x03,
+
+ ///
+ /// Cyclic Record Files with Backup
+ ///
+ CYCLICRECORD = 0x04
+ }
+}
diff --git a/NFC/NXP MIFARE DESFire/Exceptions/AuthenticationDelayException.cs b/NFC/NXP MIFARE DESFire/Exceptions/AuthenticationDelayException.cs
new file mode 100644
index 0000000..160eceb
--- /dev/null
+++ b/NFC/NXP MIFARE DESFire/Exceptions/AuthenticationDelayException.cs
@@ -0,0 +1,26 @@
+using System;
+
+namespace NFC.NXP_MIFARE_DESFire.Exceptions
+{
+ ///
+ /// Currently not allowed to authenticate. Keeptrying until full delay is spent.
+ /// 0x91AD
+ ///
+ public class AuthenticationDelayException : Exception
+ {
+ public AuthenticationDelayException()
+ {
+
+ }
+
+ public AuthenticationDelayException(string message) : base(message)
+ {
+
+ }
+
+ public AuthenticationDelayException(string message, Exception inner) : base(message, inner)
+ {
+
+ }
+ }
+}
diff --git a/NFC/NXP MIFARE DESFire/Exceptions/AuthenticationErrorException.cs b/NFC/NXP MIFARE DESFire/Exceptions/AuthenticationErrorException.cs
new file mode 100644
index 0000000..368e0eb
--- /dev/null
+++ b/NFC/NXP MIFARE DESFire/Exceptions/AuthenticationErrorException.cs
@@ -0,0 +1,26 @@
+using System;
+
+namespace NFC.NXP_MIFARE_DESFire.Exceptions
+{
+ ///
+ /// Current authentication status does not allow there- quested command.
+ /// 0x91AE
+ ///
+ public class AuthenticationErrorException : Exception
+ {
+ public AuthenticationErrorException()
+ {
+
+ }
+
+ public AuthenticationErrorException(string message) : base(message)
+ {
+
+ }
+
+ public AuthenticationErrorException(string message, Exception inner) : base(message, inner)
+ {
+
+ }
+ }
+}
diff --git a/NFC/NXP MIFARE DESFire/Exceptions/AuthenticationMissingException.cs b/NFC/NXP MIFARE DESFire/Exceptions/AuthenticationMissingException.cs
new file mode 100644
index 0000000..04c19cd
--- /dev/null
+++ b/NFC/NXP MIFARE DESFire/Exceptions/AuthenticationMissingException.cs
@@ -0,0 +1,26 @@
+using System;
+
+namespace NFC.NXP_MIFARE_DESFire.Exceptions
+{
+ ///
+ /// Current authentication status does not allow there- quested command.
+ /// 0x91AE
+ ///
+ public class AuthenticationMissingException : Exception
+ {
+ public AuthenticationMissingException()
+ {
+
+ }
+
+ public AuthenticationMissingException(string message) : base(message)
+ {
+
+ }
+
+ public AuthenticationMissingException(string message, Exception inner) : base(message, inner)
+ {
+
+ }
+ }
+}
diff --git a/NFC/NXP MIFARE DESFire/Exceptions/BoundaryErrorException.cs b/NFC/NXP MIFARE DESFire/Exceptions/BoundaryErrorException.cs
new file mode 100644
index 0000000..f46e5ea
--- /dev/null
+++ b/NFC/NXP MIFARE DESFire/Exceptions/BoundaryErrorException.cs
@@ -0,0 +1,26 @@
+using System;
+
+namespace NFC.NXP_MIFARE_DESFire.Exceptions
+{
+ ///
+ /// Attempt toread/write data from/to beyond thefile’s/record’s limits. Attempt to exceed the limitsof a value file.
+ /// 0x91BE
+ ///
+ public class BoundaryErrorException : Exception
+ {
+ public BoundaryErrorException()
+ {
+
+ }
+
+ public BoundaryErrorException(string message) : base(message)
+ {
+
+ }
+
+ public BoundaryErrorException(string message, Exception inner) : base(message, inner)
+ {
+
+ }
+ }
+}
diff --git a/NFC/NXP MIFARE DESFire/Exceptions/CommandAbortedException.cs b/NFC/NXP MIFARE DESFire/Exceptions/CommandAbortedException.cs
new file mode 100644
index 0000000..34e1534
--- /dev/null
+++ b/NFC/NXP MIFARE DESFire/Exceptions/CommandAbortedException.cs
@@ -0,0 +1,26 @@
+using System;
+
+namespace NFC.NXP_MIFARE_DESFire.Exceptions
+{
+ ///
+ /// Previous Command was not fully completed.Not all Frames were requested or provided bythe PCD.
+ /// 0x91CA
+ ///
+ public class CommandAbortedException : Exception
+ {
+ public CommandAbortedException()
+ {
+
+ }
+
+ public CommandAbortedException(string message) : base(message)
+ {
+
+ }
+
+ public CommandAbortedException(string message, Exception inner) : base(message, inner)
+ {
+
+ }
+ }
+}
diff --git a/NFC/NXP MIFARE DESFire/Exceptions/DuplicateErrorException.cs b/NFC/NXP MIFARE DESFire/Exceptions/DuplicateErrorException.cs
new file mode 100644
index 0000000..8b09b29
--- /dev/null
+++ b/NFC/NXP MIFARE DESFire/Exceptions/DuplicateErrorException.cs
@@ -0,0 +1,26 @@
+using System;
+
+namespace NFC.NXP_MIFARE_DESFire.Exceptions
+{
+ ///
+ /// Creation of file/application failed because file/application with same number already exists
+ /// 0x91DE
+ ///
+ public class DuplicateErrorException : Exception
+ {
+ public DuplicateErrorException()
+ {
+
+ }
+
+ public DuplicateErrorException(string message) : base(message)
+ {
+
+ }
+
+ public DuplicateErrorException(string message, Exception inner) : base(message, inner)
+ {
+
+ }
+ }
+}
diff --git a/NFC/NXP MIFARE DESFire/Exceptions/FileNotFoundException.cs b/NFC/NXP MIFARE DESFire/Exceptions/FileNotFoundException.cs
new file mode 100644
index 0000000..1de1e7c
--- /dev/null
+++ b/NFC/NXP MIFARE DESFire/Exceptions/FileNotFoundException.cs
@@ -0,0 +1,26 @@
+using System;
+
+namespace NFC.NXP_MIFARE_DESFire.Exceptions
+{
+ ///
+ /// Specified file number does not exist.
+ /// 0x91F0
+ ///
+ public class FileNotFoundException : Exception
+ {
+ public FileNotFoundException()
+ {
+
+ }
+
+ public FileNotFoundException(string message) : base(message)
+ {
+
+ }
+
+ public FileNotFoundException(string message, Exception inner) : base(message, inner)
+ {
+
+ }
+ }
+}
diff --git a/NFC/NXP MIFARE DESFire/Exceptions/IllegalCommandCodeException.cs b/NFC/NXP MIFARE DESFire/Exceptions/IllegalCommandCodeException.cs
new file mode 100644
index 0000000..18f4992
--- /dev/null
+++ b/NFC/NXP MIFARE DESFire/Exceptions/IllegalCommandCodeException.cs
@@ -0,0 +1,26 @@
+using System;
+
+namespace NFC.NXP_MIFARE_DESFire.Exceptions
+{
+ ///
+ /// Command code not supported.
+ /// 0x911C
+ ///
+ public class IllegalCommandCodeException : Exception
+ {
+ public IllegalCommandCodeException()
+ {
+
+ }
+
+ public IllegalCommandCodeException(string message) : base(message)
+ {
+
+ }
+
+ public IllegalCommandCodeException(string message, Exception inner) : base(message, inner)
+ {
+
+ }
+ }
+}
diff --git a/NFC/NXP MIFARE DESFire/Exceptions/IntegrityErrorException.cs b/NFC/NXP MIFARE DESFire/Exceptions/IntegrityErrorException.cs
new file mode 100644
index 0000000..6dce4f3
--- /dev/null
+++ b/NFC/NXP MIFARE DESFire/Exceptions/IntegrityErrorException.cs
@@ -0,0 +1,26 @@
+using System;
+
+namespace NFC.NXP_MIFARE_DESFire.Exceptions
+{
+ ///
+ /// CRC or MAC does not match data. Paddingbytes not valid.
+ /// 0x911E
+ ///
+ public class IntegrityErrorException : Exception
+ {
+ public IntegrityErrorException()
+ {
+
+ }
+
+ public IntegrityErrorException(string message) : base(message)
+ {
+
+ }
+
+ public IntegrityErrorException(string message, Exception inner) : base(message, inner)
+ {
+
+ }
+ }
+}
diff --git a/NFC/NXP MIFARE DESFire/Exceptions/LengthErrorException.cs b/NFC/NXP MIFARE DESFire/Exceptions/LengthErrorException.cs
new file mode 100644
index 0000000..b817242
--- /dev/null
+++ b/NFC/NXP MIFARE DESFire/Exceptions/LengthErrorException.cs
@@ -0,0 +1,26 @@
+using System;
+
+namespace NFC.NXP_MIFARE_DESFire.Exceptions
+{
+ ///
+ /// Length of command string invalid.
+ /// 0x917E
+ ///
+ public class LengthErrorException : Exception
+ {
+ public LengthErrorException()
+ {
+
+ }
+
+ public LengthErrorException(string message) : base(message)
+ {
+
+ }
+
+ public LengthErrorException(string message, Exception inner) : base(message, inner)
+ {
+
+ }
+ }
+}
diff --git a/NFC/NXP MIFARE DESFire/Exceptions/NoSuchKeyException.cs b/NFC/NXP MIFARE DESFire/Exceptions/NoSuchKeyException.cs
new file mode 100644
index 0000000..d534bbc
--- /dev/null
+++ b/NFC/NXP MIFARE DESFire/Exceptions/NoSuchKeyException.cs
@@ -0,0 +1,26 @@
+using System;
+
+namespace NFC.NXP_MIFARE_DESFire.Exceptions
+{
+ ///
+ /// Invalid key number specified.
+ /// 0x9140
+ ///
+ public class NoSuchKeyException : Exception
+ {
+ public NoSuchKeyException()
+ {
+
+ }
+
+ public NoSuchKeyException(string message) : base(message)
+ {
+
+ }
+
+ public NoSuchKeyException(string message, Exception inner) : base(message, inner)
+ {
+
+ }
+ }
+}
diff --git a/NFC/NXP MIFARE DESFire/Exceptions/ParameterErrorException.cs b/NFC/NXP MIFARE DESFire/Exceptions/ParameterErrorException.cs
new file mode 100644
index 0000000..c4e3d3f
--- /dev/null
+++ b/NFC/NXP MIFARE DESFire/Exceptions/ParameterErrorException.cs
@@ -0,0 +1,26 @@
+using System;
+
+namespace NFC.NXP_MIFARE_DESFire.Exceptions
+{
+ ///
+ /// Value of the parameter(s) invalid.
+ /// 0x919E
+ ///
+ public class ParameterErrorException : Exception
+ {
+ public ParameterErrorException()
+ {
+
+ }
+
+ public ParameterErrorException(string message) : base(message)
+ {
+
+ }
+
+ public ParameterErrorException(string message, Exception inner) : base(message, inner)
+ {
+
+ }
+ }
+}
diff --git a/NFC/NXP MIFARE DESFire/Exceptions/PermissionDeniedException.cs b/NFC/NXP MIFARE DESFire/Exceptions/PermissionDeniedException.cs
new file mode 100644
index 0000000..12a0928
--- /dev/null
+++ b/NFC/NXP MIFARE DESFire/Exceptions/PermissionDeniedException.cs
@@ -0,0 +1,26 @@
+using System;
+
+namespace NFC.NXP_MIFARE_DESFire.Exceptions
+{
+ ///
+ /// Current configuration / status does not allow the requested command.
+ /// 0x919D
+ ///
+ public class PermissionDeniedException : Exception
+ {
+ public PermissionDeniedException()
+ {
+
+ }
+
+ public PermissionDeniedException(string message) : base(message)
+ {
+
+ }
+
+ public PermissionDeniedException(string message, Exception inner) : base(message, inner)
+ {
+
+ }
+ }
+}
diff --git a/NFC/NXP MIFARE DESFire/MIFARE_DESFire.cs b/NFC/NXP MIFARE DESFire/MIFARE_DESFire.cs
new file mode 100644
index 0000000..9dd39d7
--- /dev/null
+++ b/NFC/NXP MIFARE DESFire/MIFARE_DESFire.cs
@@ -0,0 +1,1087 @@
+using NFC.Crypto;
+using NFC.ISO7816_4;
+using NFC.Mifare_DESFire.Enums;
+using NFC.NXP_MIFARE_DESFire.Exceptions;
+using PCSC.Iso7816;
+using System;
+using System.Collections.Generic;
+using System.Linq;
+
+namespace NFC.Mifare_DESFire
+{
+ public class MIFARE_DESFire
+ {
+ // Docs https://hackmd.io/qATu8uYdRnOC40aFrB9afg
+
+ #region Log
+ private static readonly log4net.ILog _Log = log4net.LogManager.GetLogger(System.Reflection.MethodBase.GetCurrentMethod().DeclaringType);
+ #endregion
+
+ #region Contructors
+ ///
+ /// Construct MIFRARE_DESFire Object with ICard Interface
+ ///
+ /// Implementation of ICard, only transmit is used
+ public MIFARE_DESFire(ICard card)
+ {
+ _Card = card;
+ }
+ #endregion
+
+ #region Properties
+ ///
+ /// ICard Implementation used to transmit APDUCommands and recive APDUResponses
+ ///
+ private ICard _Card;
+
+ ///
+ /// SessionKey, is set after Successfull Authentication
+ ///
+ public byte[] _SessionKey;
+
+ ///
+ /// Initialation Vector for CBC Encryption
+ /// Is 0 bytes after Successfull Authentication
+ ///
+ public byte[] _IV;
+ #endregion
+
+ #region Methods
+ #region Helper Methods
+ ///
+ /// Generate Byte Array filled with 0
+ ///
+ /// Size of Array
+ public byte[] GenerateEmptyArray(uint size)
+ {
+ byte[] key = new byte[size];
+ for (int i = 0; i < size; i++)
+ {
+ key[i] = 0;
+ }
+
+ return key;
+ }
+
+ ///
+ /// Get Range of Array Elements
+ ///
+ /// Array
+ /// Offset in Byte
+ /// Lenght to read in Byte
+ /// new Array with Range of Array Elements
+ public byte[] GetSubArray(byte[] array, long offset, long length)
+ {
+ byte[] subarray = new byte[length];
+ for (long i = offset; i < offset + length; i++)
+ {
+ subarray[i - offset] = array[i];
+ }
+ return subarray;
+ }
+
+ ///
+ /// Check APDU Response for DESFire Error Codes
+ /// https://www.nxp.com/docs/en/data-sheet/MF2DLHX0.pdf
+ /// Section: 11.3
+ ///
+ public void CheckAPDUResponse(APDUResponse response)
+ {
+ if (response == null)
+ {
+ throw new ArgumentNullException("Response cannot be null.");
+ }
+
+ if (response.SW1 == 0x91)
+ {
+ switch (response.SW2)
+ {
+ case 0x00: // OPERATION_OK
+ return;
+ case 0x0C: // NO_CHANGES
+ return;
+ case 0x1C: // ILLEGAL_COMMAND_CODE
+ throw new IllegalCommandCodeException();
+ case 0x1E: // INTEGRITY_ERROR
+ throw new IntegrityErrorException();
+ case 0x40: // NO_SUCH_KEY
+ throw new NoSuchKeyException();
+ case 0x7E: // LENGTH_ERROR
+ throw new LengthErrorException();
+ case 0x9D: // PERMISSION_DENIED
+ throw new PermissionDeniedException();
+ case 0x9E: // PARAMETER_ERROR
+ throw new ParameterErrorException();
+ case 0xAD: // AUTHENTICATION_DELAY
+ throw new AuthenticationDelayException();
+ case 0xAE: // AUTHENTICATION_ERROR
+ throw new AuthenticationErrorException();
+ case 0xAF: // ADDITIONAL_FRAME
+ return;
+ case 0xBE: // BOUNDARY_ERROR
+ throw new BoundaryErrorException();
+ case 0xCA: // COMMAND_ABORTED
+ throw new CommandAbortedException();
+ case 0xDE: // DUPLICATE_ERROR
+ throw new DuplicateErrorException();
+ case 0xF0: // FILE_NOT_FOUND
+ throw new FileNotFoundException();
+ default:
+ break;
+ }
+ }
+
+ throw new Exception(string.Format("Unknown Response Code: 0x{0}.", BitConverter.ToString(new byte[] { response.SW1, response.SW2 }).Replace("-", string.Empty)));
+ }
+ #endregion
+
+ #region Crypto Operation
+ ///
+ /// Return a copy of the last Block of data
+ ///
+ /// Data compatible to blocksize
+ /// in byte
+ public byte[] ExtractLastBlock(byte[] data, uint blocksize)
+ {
+ if (data == null)
+ {
+ throw new ArgumentNullException("Data cannot be null.");
+ }
+
+ if (data.Length % blocksize != 0)
+ {
+ throw new ArgumentException(string.Format("Data is not compatible with blocksize(data(length):{0}, blocksize:{1}.", data.Length, blocksize));
+ }
+
+ byte[] lastblock = new byte[blocksize];
+
+ for (int i = 0; i < blocksize; i++)
+ {
+ lastblock[i] = data[data.Length - blocksize + i];
+ }
+
+ return lastblock;
+ }
+
+ ///
+ /// Expand Array to Block Size, fill with 0x00
+ ///
+ ///
+ public byte[] ExpandToBlockSize(byte[] data, uint bocksize)
+ {
+ if (data == null)
+ {
+ throw new ArgumentNullException("Data cannot be null.");
+ }
+
+ int diff = data.Length % (int)bocksize;
+ if (diff == 0)
+ {
+ return data;
+ }
+
+ byte[] expand = new byte[data.Length + bocksize - diff];
+
+ data.CopyTo(expand, 0);
+
+ for (int i = expand.Length - 1; i > data.Length - 1; i--)
+ {
+ expand[i] = 0x00;
+ }
+
+ return expand;
+ }
+
+ ///
+ /// Rotates Array to the left
+ ///
+ /// Data
+ /// Copy of data
+ public byte[] RotateLeft(byte[] data)
+ {
+ if (data == null)
+ {
+ throw new ArgumentNullException("Data cannot be null.");
+ }
+
+ byte[] rotate = new byte[data.Length];
+ data.CopyTo(rotate, 0);
+
+ byte tmp = rotate[0];
+ for (var i = 0; i < rotate.Length - 1; i++)
+ {
+ rotate[i] = rotate[i + 1];
+ }
+ rotate[rotate.Length - 1] = tmp;
+
+ return rotate;
+ }
+
+ ///
+ /// Rotates Array to the right
+ ///
+ /// Data
+ /// Copy of data
+ public byte[] RotateRight(byte[] data)
+ {
+ if (data == null)
+ {
+ throw new ArgumentNullException("Data cannot be null.");
+ }
+
+ byte[] rotate = new byte[data.Length];
+ data.CopyTo(rotate, 0);
+
+ byte tmp = rotate[rotate.Length - 1];
+ for (var i = rotate.Length - 1; i > 0; i--)
+ {
+ rotate[i] = rotate[i - 1];
+ }
+ rotate[0] = tmp;
+
+ return rotate;
+ }
+
+ ///
+ /// Concatenates Arrays
+ ///
+ /// List of Byte Array
+ public byte[] Concatenate(params byte[][] data)
+ {
+ if (data == null)
+ {
+ throw new ArgumentNullException("Data cannot be null.");
+ }
+
+ List cat = new List();
+
+ foreach(byte[] d in data)
+ {
+ cat.AddRange(d);
+ }
+
+ return cat.ToArray();
+ }
+
+ ///
+ /// Boolean Operation XOR on all Bytes
+ ///
+ /// Array A
+ /// Array B
+ /// Copy of Data
+ public byte[] XOR(byte[] a, byte[] b)
+ {
+ if (a == null)
+ {
+ throw new ArgumentNullException("Array A cannot be null.");
+ }
+
+ if (b == null)
+ {
+ throw new ArgumentNullException("Array B cannot be null.");
+ }
+
+ if (a.Length != b.Length)
+ {
+ throw new ArgumentException(string.Format("Arrays are not same Length(Length A:{0}, Lenght B:{1})", a.Length, b.Length));
+ }
+
+ byte[] c = new byte[a.Length];
+
+ for(int i = 0; i < a.Length; i++)
+ {
+ c[i] = (byte)(a[i] ^ b[i]);
+ }
+
+ return c;
+ }
+
+
+ ///
+ /// Generates SessionKey for DES Authentification
+ ///
+ /// 16Byte SessionKey
+ public byte[] GenerateSesionKey_DES(byte[] rndA, byte[] rndB)
+ {
+ byte[] sesssionkey = new byte[8];
+
+ for (int i = 0; i < sesssionkey.Length; i++)
+ {
+ if (i < 4)
+ {
+ sesssionkey[i] = rndA[i];
+ }
+ else
+ {
+ sesssionkey[i] = rndB[i - 4];
+ }
+ }
+
+ // DES SessionKey is a double DES Key
+ return Concatenate(sesssionkey, sesssionkey);
+ }
+
+ ///
+ /// Generates SessionKey for AES Authentification
+ ///
+ /// 16Byte SessionKey
+ public byte[] GenerateSesionKey_AES(byte[] rndA, byte[] rndB)
+ {
+ byte[] sesssionkey = new byte[16];
+
+ for (int i = 0; i < sesssionkey.Length; i++)
+ {
+ if (i < 4)
+ {
+ sesssionkey[i] = rndA[i];
+ }
+ else if(i >= 4 && i < 8)
+ {
+ sesssionkey[i] = rndB[i - 4];
+ }
+ else if (i >= 8 && i < 12)
+ {
+ sesssionkey[i] = rndA[i + 4];
+ }
+ else
+ {
+ sesssionkey[i] = rndB[i];
+ }
+ }
+
+ return sesssionkey;
+ }
+ #endregion
+
+ #region Configuration Generator
+ ///
+ /// Genearte KeySetting1 for Application Settings or PICC Setting
+ ///
+ public byte GenerateKeySetting1(ChangeApplicationKey changeKey, ChangeMasterKeySettings changeMasterKeySettings, CreateDeleteFile createDeleteFile, FileDirectoryAccess fileDirectoryAccess, ChangeMasterKey changeMasterKey)
+ {
+ return (byte)(((byte)changeKey << 4) | (byte)changeMasterKeySettings | (byte)createDeleteFile | (byte)fileDirectoryAccess | (byte)changeMasterKey);
+ }
+
+ ///
+ /// Genearte KeySetting1 for Application Settings or PICC Setting
+ ///
+ /// ID of Key for changing Application Keys
+ ///
+ public byte GenerateKeySetting1(byte changeKey, ChangeMasterKeySettings changeMasterKeySettings, CreateDeleteFile createDeleteFile, FileDirectoryAccess fileDirectoryAccess, ChangeMasterKey changeMasterKey)
+ {
+ if (changeKey < 0x01 || changeKey >= 0x0E)
+ {
+ throw new ArgumentOutOfRangeException();
+ }
+ return GenerateKeySetting1((ChangeApplicationKey)changeKey, changeMasterKeySettings, createDeleteFile, fileDirectoryAccess, changeMasterKey);
+ }
+
+ ///
+ /// Genearte KeySetting2 for Application Creation
+ ///
+ /// Number of keys that can be stored within the application (0x01-0x0D)
+ ///
+ public byte GenerateKeySetting2(CryptoOperationsType cryptoOperations, FileIdentifies fileIdentifies, byte numberOfKeys)
+ {
+ if (numberOfKeys < 0x01 || numberOfKeys >= 0x0D)
+ {
+ throw new ArgumentOutOfRangeException();
+ }
+
+ return (byte)((byte)cryptoOperations | (byte)fileIdentifies | numberOfKeys);
+ }
+
+ ///
+ /// Generate FileAccess Rights for File Settings
+ /// Use enum AccesRights for Free or Never Option
+ ///
+ /// KeyID for Read Access
+ /// KeyID for Write Access
+ /// KeyID for Read and Write Access
+ /// KeyID for Configuration Access
+ public UInt16 GenerateFileAccessRights(byte read, byte write, byte read_write, byte configure)
+ {
+ if (read > 0x0F || write > 0x0F || read_write > 0x0F || configure > 0x0F)
+ {
+ throw new ArgumentOutOfRangeException("One KeyID is not valid");
+ }
+
+ return (UInt16)((read << 12) | (write << 8) | (read_write << 4) | configure);
+ }
+ #endregion
+
+ #region DESFire Commands
+ ///
+ /// Select Application by ApplicationID (AID)
+ ///
+ /// 3 Byte AID
+ public void SelectApplication(UInt32 aid)
+ {
+ if(aid > 0xFFFFFF)
+ {
+ throw new ArgumentOutOfRangeException("AID is too large");
+ }
+
+ byte[] id_byte = BitConverter.GetBytes(aid);
+ _Log.InfoFormat("Select Application: {0}", HexConverter.ConvertToHexString(id_byte.ToArray()));
+
+ APDUCommand cmd_SelectApplication = new APDUCommand(IsoCase.Case4Short)
+ {
+ CLA = 0x90,
+ INS = (byte)APDUInstructions.SELECT_APPLICATION,
+ Data = new byte[]
+ {
+ id_byte[0],
+ id_byte[1],
+ id_byte[2]
+ }
+ };
+ _Log.Debug(cmd_SelectApplication.ToString());
+ HexConverter.ConvertToHexString(cmd_SelectApplication.ToArray());
+ APDUResponse response = _Card.Transmit(cmd_SelectApplication);
+ _Log.DebugFormat(response.ToString());
+
+ CheckAPDUResponse(response);
+ }
+
+ ///
+ /// Authenticate to PICC, with ISO Authenticate for DES Key
+ ///
+ /// 0x01 - 0x0D
+ /// Array of 8/16 Bytes
+ /// !!! WARNING For Testing only !!!
+ public void AuthenticateISO_DES(byte key_id, byte[] key, byte[] rndA = null)
+ {
+ if(key_id >= 0x0E)
+ {
+ throw new ArgumentOutOfRangeException("KeyID is invalid");
+ }
+
+ _Log.InfoFormat("Authenticate with DES Key No: 0x{0:x}", key_id);
+
+ // Sepearte Initialisation Vector for Authentication Process
+ byte[] iv = new byte[8];
+
+ APDUCommand cmd_challange_request = new APDUCommand(IsoCase.Case4Short)
+ {
+ CLA = 0x90,
+ INS = 0x1A,
+ Data = new byte[]
+ {
+ key_id
+ }
+ };
+ _Log.Debug(cmd_challange_request.ToString());
+
+ APDUResponse response = _Card.Transmit(cmd_challange_request);
+ _Log.Debug(response.ToString());
+
+ CheckAPDUResponse(response);
+
+ byte[] rndB_enc = response.Body;
+ _Log.DebugFormat("rndB_enc: {0}", HexConverter.ConvertToHexString(rndB_enc));
+
+ TDES des = new TDES();
+ byte[] rndB = des.Decrypt(rndB_enc, key, GenerateEmptyArray(8));
+ _Log.DebugFormat("rndB: {0}", HexConverter.ConvertToHexString(rndB));
+
+ rndB.CopyTo(iv, 0);
+
+ byte[] rndB_rl = RotateLeft(rndB);
+ _Log.DebugFormat("rndB_enc: {0}", HexConverter.ConvertToHexString(rndB_rl));
+
+ if (rndA == null)
+ {
+ Random rnd = new Random();
+ rndA = new byte[8];
+ rnd.NextBytes(rndA);
+ }
+ _Log.DebugFormat("rndA: {0}", HexConverter.ConvertToHexString(rndA));
+
+ byte[] rndAB = Concatenate(rndA, rndB_rl);
+ _Log.DebugFormat("rndAB: {0}", HexConverter.ConvertToHexString(rndAB));
+
+ byte[] rndAB_enc = des.Encrypt(rndAB, key, rndB_enc);
+ _Log.DebugFormat("rndAB_enc: {0}", HexConverter.ConvertToHexString(rndAB_enc));
+ iv = ExtractLastBlock(rndAB_enc, 8);
+
+ APDUCommand cmd_challange_response = new APDUCommand(IsoCase.Case4Short)
+ {
+ CLA = 0x90,
+ INS = 0xAF,
+ Data = rndAB_enc
+ };
+ _Log.Debug(cmd_challange_response.ToString());
+
+ response = _Card.Transmit(cmd_challange_response);
+ _Log.Debug(response.ToString());
+
+ CheckAPDUResponse(response);
+
+ byte[] encryptedRndAFromCard = response.Body;
+ _Log.DebugFormat("encryptedRndAFromCard: {0}", HexConverter.ConvertToHexString(encryptedRndAFromCard));
+
+ byte[] rotatedRndAFromCard = des.Decrypt(encryptedRndAFromCard, key, iv);
+ _Log.DebugFormat("rotatedRndAFromCard: {0}", HexConverter.ConvertToHexString(rotatedRndAFromCard));
+
+ byte[] rndAFromCard = RotateRight(rotatedRndAFromCard);
+ _Log.DebugFormat("rndAFromCard: {0}", HexConverter.ConvertToHexString(rndAFromCard));
+
+ if (!rndA.SequenceEqual(rndAFromCard))
+ {
+ throw new Exception("Authentication failed, PICC Challenge is invalid.");
+ }
+
+ _Log.Info("Authenticated");
+
+ _SessionKey = GenerateSesionKey_DES(rndA, rndB);
+ _Log.DebugFormat("SessionKey: {0}", HexConverter.ConvertToHexString(_SessionKey));
+
+ _IV = GenerateEmptyArray(8);
+ _Log.DebugFormat("IV: {0}", HexConverter.ConvertToHexString(_IV));
+ }
+
+ ///
+ /// Format PICC
+ /// Need Authentication for PICC / Application 0x000000
+ ///
+ public void Format()
+ {
+ _Log.Info("Format PICC");
+
+ APDUCommand cmd_format = new APDUCommand(IsoCase.Case2Short)
+ {
+ CLA = 0x90,
+ INS = 0xFC,
+ };
+ _Log.Debug(cmd_format.ToString());
+
+ APDUResponse response = _Card.Transmit(cmd_format);
+ _Log.Debug(response.ToString());
+
+ CheckAPDUResponse(response);
+ }
+
+ ///
+ /// Create Application for ApplicationID
+ ///
+ /// 3 Byte ID
+ public void CreateApplication(UInt32 aid, byte keysetting1, byte keysetting2)
+ {
+ if (aid > 0xFFFFFF)
+ {
+ throw new ArgumentOutOfRangeException("AID is too large");
+ }
+
+ byte[] id_byte = BitConverter.GetBytes(aid);
+ _Log.InfoFormat("Create Application: {0}", HexConverter.ConvertToHexString(id_byte.ToArray()));
+
+ APDUCommand cmd_CreateApplication = new APDUCommand(IsoCase.Case4Short)
+ {
+ CLA = 0x90,
+ INS = 0xCA,
+ Data = new byte[]
+ {
+ id_byte[0],
+ id_byte[1],
+ id_byte[2],
+ keysetting1,
+ keysetting2
+ }
+ };
+ _Log.Debug(cmd_CreateApplication.ToString());
+
+ APDUResponse response = _Card.Transmit(cmd_CreateApplication);
+ _Log.Debug(response.ToString());
+
+ CheckAPDUResponse(response);
+ }
+
+ ///
+ /// Authenticate to PICC, with ISO Authenticate
+ ///
+ /// 0x01 - 0x0D
+ /// Array of 16 Bytes
+ /// !!! WARNING For Testing only !!!
+ public void AuthenticateISO_AES(byte key_id, byte[] key, byte[] rndA = null)
+ {
+ if (key_id >= 0x0E)
+ {
+ throw new ArgumentOutOfRangeException("KeyID is invalid");
+ }
+
+ _Log.InfoFormat("Authenticate with AES Key No: 0x{0:x}", key_id);
+
+ // Sepearte InitialisationVector for Authentication
+ byte[] iv = new byte[16];
+
+ APDUCommand cmd_challange_request = new APDUCommand(IsoCase.Case4Short)
+ {
+ CLA = 0x90,
+ INS = 0xAA,
+ Data = new byte[]
+ {
+ key_id
+ }
+ };
+ _Log.Debug(cmd_challange_request.ToString());
+
+ APDUResponse response = _Card.Transmit(cmd_challange_request);
+ _Log.Debug(response.ToString());
+
+ CheckAPDUResponse(response);
+
+ byte[] rndB_enc = response.Body;
+ _Log.DebugFormat("rndB_enc: {0}", HexConverter.ConvertToHexString(rndB_enc));
+
+ AES aes = new AES();
+ byte[] rndB = aes.Decrypt(rndB_enc, key, GenerateEmptyArray(16));
+ _Log.DebugFormat("rndB: {0}", HexConverter.ConvertToHexString(rndB));
+
+ rndB.CopyTo(iv, 0);
+
+ byte[] rndB_rl = RotateLeft(rndB);
+ _Log.DebugFormat("rndB_enc: {0}", HexConverter.ConvertToHexString(rndB_rl));
+
+ if (rndA == null)
+ {
+ Random rnd = new Random();
+ rndA = new byte[16];
+ rnd.NextBytes(rndA);
+ }
+ _Log.DebugFormat("rndA: {0}", HexConverter.ConvertToHexString(rndA));
+
+ byte[] rndAB = Concatenate(rndA, rndB_rl);
+ _Log.DebugFormat("rndAB: {0}", HexConverter.ConvertToHexString(rndAB));
+
+ byte[] rndAB_enc = aes.Encrypt(rndAB, key, rndB_enc);
+ _Log.DebugFormat("rndAB_enc: {0}", HexConverter.ConvertToHexString(rndAB_enc));
+ iv = ExtractLastBlock(rndAB_enc, 16);
+
+ APDUCommand cmd_challange_response = new APDUCommand(IsoCase.Case4Short)
+ {
+ CLA = 0x90,
+ INS = 0xAF,
+ Data = rndAB_enc
+ };
+ _Log.Debug(cmd_challange_response.ToString());
+
+ response = _Card.Transmit(cmd_challange_response);
+ _Log.Debug(response.ToString());
+
+ CheckAPDUResponse(response);
+
+ byte[] encryptedRndAFromCard = response.Body;
+ _Log.DebugFormat("encryptedRndAFromCard: {0}", HexConverter.ConvertToHexString(encryptedRndAFromCard));
+
+ byte[] rotatedRndAFromCard = aes.Decrypt(encryptedRndAFromCard, key, iv);
+ _Log.DebugFormat("rotatedRndAFromCard: {0}", HexConverter.ConvertToHexString(rotatedRndAFromCard));
+
+ byte[] rndAFromCard = RotateRight(rotatedRndAFromCard);
+ _Log.DebugFormat("rndAFromCard: {0}", HexConverter.ConvertToHexString(rndAFromCard));
+
+ if (!rndA.SequenceEqual(rndAFromCard))
+ {
+ throw new Exception("Authentication failed, PICC Challenge is invalid.");
+ }
+
+ _SessionKey = GenerateSesionKey_AES(rndA, rndB);
+ _Log.DebugFormat("SessionKey: {0}", HexConverter.ConvertToHexString(_SessionKey));
+
+ _IV = GenerateEmptyArray(16);
+ _Log.DebugFormat("IV: {0}", HexConverter.ConvertToHexString(_IV));
+ }
+
+ ///
+ /// Change AES key, the same as Authenticated
+ ///
+ /// 0x01 - 0x0D
+ /// Array of 16 Bytes
+ /// Version of Key(min. 0x10)
+ public void ChangeKey_AES(byte key_id, byte[] new_key, byte key_version)
+ {
+ if (key_id >= 0x0E)
+ {
+ throw new ArgumentOutOfRangeException("KeyID is invalid");
+ }
+
+ _Log.InfoFormat("Change AES Key No: 0x{0:x}", key_id);
+
+ byte[] header = new byte[]
+ {
+ 0xC4, key_id
+ };
+ _Log.DebugFormat("header: {0}", HexConverter.ConvertToHexString(header));
+
+ // AES Key Version is Append to Key
+ byte[] key_and_version = Concatenate(new_key, new byte[] { key_version });
+ byte[] command = Concatenate(header, key_and_version);
+ _Log.DebugFormat("command: {0}", HexConverter.ConvertToHexString(command));
+
+ CRC32 crc32 = new CRC32();
+ byte[] crc = crc32.Calculate(command);
+ _Log.DebugFormat("crc: {0}", HexConverter.ConvertToHexString(crc));
+
+ byte[] cryptogram = Concatenate(key_and_version, crc);
+ _Log.DebugFormat("cryptogram: {0}", HexConverter.ConvertToHexString(cryptogram));
+
+ byte[] cryptogram_block = ExpandToBlockSize(cryptogram, 16);
+ _Log.DebugFormat("cryptogram_block: {0}", HexConverter.ConvertToHexString(cryptogram_block));
+
+ AES aes = new AES();
+ byte[] cryptogram_enc = aes.Encrypt(cryptogram_block, _SessionKey, _IV);
+ _Log.DebugFormat("cryptogram_enc: {0}", HexConverter.ConvertToHexString(cryptogram_enc));
+
+ _IV = ExtractLastBlock(cryptogram_enc, 16);
+ _Log.DebugFormat("_IV: {0}", HexConverter.ConvertToHexString(_IV));
+
+ byte[] data = Concatenate(new byte[] { key_id }, cryptogram_enc);
+ _Log.DebugFormat("data: {0}", HexConverter.ConvertToHexString(data));
+
+ APDUCommand cmd_ChangeKey = new APDUCommand(IsoCase.Case4Short)
+ {
+ CLA = 0x90,
+ INS = 0xC4,
+ Data = data
+ };
+ _Log.Debug(cmd_ChangeKey.ToString());
+
+ APDUResponse response = _Card.Transmit(cmd_ChangeKey);
+ _Log.Debug(response.ToString());
+
+ CheckAPDUResponse(response);
+ }
+
+ ///
+ /// Change AES key, other than Authenticated
+ ///
+ /// 0x01 - 0x0D
+ /// Array of 16 Bytes
+ /// Version of Key(min. 0x10)
+ public void ChangeOtherKey_AES(byte key_id, byte[] new_key, byte[] old_key, byte key_version)
+ {
+ if (key_id >= 0x0E)
+ {
+ throw new ArgumentOutOfRangeException("KeyID is invalid");
+ }
+
+ _Log.InfoFormat("Change AES Key No: 0x{0:x}", key_id);
+
+ byte[] header = new byte[]
+ {
+ 0xC4, key_id
+ };
+ _Log.DebugFormat("header: {0}", HexConverter.ConvertToHexString(header));
+
+ byte[] key_xor = XOR(new_key, old_key);
+
+ // AES Key Version is Append to Key
+ byte[] key_and_version = Concatenate(key_xor, new byte[] { key_version });
+ byte[] command = Concatenate(header, key_and_version);
+ _Log.DebugFormat("command: {0}", HexConverter.ConvertToHexString(command));
+
+ CRC32 crc32 = new CRC32();
+ byte[] crc_cmd = crc32.Calculate(command);
+ _Log.DebugFormat("crc_cmd: {0}", HexConverter.ConvertToHexString(crc_cmd));
+ byte[] crc_key = crc32.Calculate(new_key);
+ _Log.DebugFormat("crc_key: {0}", HexConverter.ConvertToHexString(crc_key));
+
+ byte[] cryptogram = Concatenate(key_and_version, crc_cmd);
+ cryptogram = Concatenate(cryptogram, crc_key);
+ _Log.DebugFormat("cryptogram: {0}", HexConverter.ConvertToHexString(cryptogram));
+
+ byte[] cryptogram_block = ExpandToBlockSize(cryptogram, 16);
+ _Log.DebugFormat("cryptogram_block: {0}", HexConverter.ConvertToHexString(cryptogram_block));
+
+ AES aes = new AES();
+ byte[] cryptogram_enc = aes.Encrypt(cryptogram_block, _SessionKey, _IV);
+ _Log.DebugFormat("cryptogram_enc: {0}", HexConverter.ConvertToHexString(cryptogram_enc));
+
+ _IV = ExtractLastBlock(cryptogram_enc, 16);
+ _Log.DebugFormat("_IV: {0}", HexConverter.ConvertToHexString(_IV));
+
+ byte[] data = Concatenate(new byte[] { key_id }, cryptogram_enc);
+ _Log.DebugFormat("data: {0}", HexConverter.ConvertToHexString(data));
+
+ APDUCommand cmd_ChangeKey = new APDUCommand(IsoCase.Case4Short)
+ {
+ CLA = 0x90,
+ INS = 0xC4,
+ Data = data
+ };
+ _Log.Debug(cmd_ChangeKey.ToString());
+
+ APDUResponse response = _Card.Transmit(cmd_ChangeKey);
+ _Log.Debug(response.ToString());
+
+ CheckAPDUResponse(response);
+ }
+
+ ///
+ /// Create Standard Data File
+ ///
+ /// ID of File (0x00 - 0x20)
+ /// Type of File Communicaton
+ /// Access Rights for File
+ /// Size of File in Bytes
+ public void CreateFile_Standard(byte file_id, FileCommunication communication, UInt16 accessRights, UInt32 size)
+ {
+ if (file_id >= 0x20)
+ {
+ throw new ArgumentOutOfRangeException("FileID is to large");
+ }
+ _Log.DebugFormat("Create STD File: {0}", file_id);
+
+ byte[] accessRights_byte = BitConverter.GetBytes(accessRights);
+ byte[] size_byte_tolong = BitConverter.GetBytes(size);
+ // Use only 3 Bytes
+ byte[] size_byte = new byte[]
+ {
+ size_byte_tolong[0],
+ size_byte_tolong[1],
+ size_byte_tolong[2],
+ };
+
+ byte[] data = new byte[]
+ {
+ file_id,
+ (byte)communication
+ };
+
+ APDUCommand cmd_CreateFile_Standard = new APDUCommand(IsoCase.Case4Short)
+ {
+ CLA = 0x90,
+ INS = (byte)APDUInstructions.CREATE_STDDATAFILE,
+ Data = Concatenate(data, accessRights_byte, size_byte)
+ };
+ _Log.Debug(cmd_CreateFile_Standard.ToString());
+
+ APDUResponse response = _Card.Transmit(cmd_CreateFile_Standard);
+ _Log.DebugFormat(response.ToString());
+
+ CheckAPDUResponse(response);
+ }
+
+ ///
+ /// Write Data to File
+ ///
+ /// ID of File (0x00 - 0x20)
+ /// Offset for File
+ /// Data to write
+ public void WriteData(byte file_id, UInt32 offset, byte[] data)
+ {
+ if (file_id >= 0x20)
+ {
+ throw new ArgumentOutOfRangeException("FileID is to large");
+ }
+ _Log.DebugFormat("Write Data to File: {0}", file_id);
+
+ int max_write_bytes_pre_transaction = 47;
+ byte[] write_buffer;
+
+ long bytes_writed = 0;
+ long length = data.Length;
+
+ while (bytes_writed != data.Length)
+ {
+ byte[] file_id_array = new byte[]
+ {
+ file_id
+ };
+
+ byte[] offset_byte_tolong = BitConverter.GetBytes(offset + bytes_writed);
+ // Use only 3 Bytes
+ byte[] offset_byte = new byte[]
+ {
+ offset_byte_tolong[0],
+ offset_byte_tolong[1],
+ offset_byte_tolong[2],
+ };
+
+ long bytes_towrite = 0;
+
+ if (length - bytes_writed < max_write_bytes_pre_transaction)
+ {
+ bytes_towrite = length - bytes_writed;
+ }
+ else
+ {
+ bytes_towrite = max_write_bytes_pre_transaction;
+ }
+
+ byte[] length_byte_tolong = BitConverter.GetBytes(bytes_towrite);
+
+ write_buffer = GetSubArray(data, bytes_writed, bytes_towrite);
+ bytes_writed += bytes_towrite;
+
+ // Use only 3 Bytes
+ byte[] length_byte = new byte[]
+ {
+ length_byte_tolong[0],
+ length_byte_tolong[1],
+ length_byte_tolong[2],
+ };
+
+ APDUCommand cmd_WriteData = new APDUCommand(IsoCase.Case4Short)
+ {
+ CLA = 0x90,
+ INS = (byte)APDUInstructions.WRITE_DATA,
+ Data = Concatenate(file_id_array, offset_byte, length_byte, write_buffer)
+ };
+ _Log.Debug(cmd_WriteData.ToString());
+
+ APDUResponse response = _Card.Transmit(cmd_WriteData);
+ _Log.Debug(response.ToString());
+
+ CheckAPDUResponse(response);
+ }
+ }
+
+ ///
+ /// Read Data from File
+ ///
+ /// ID of File (0x00 - 0x20)
+ /// Offset for File
+ /// Lenght of Data
+ public byte[] ReadData(byte file_id, UInt32 offset, UInt32 length)
+ {
+ if (file_id >= 0x20)
+ {
+ throw new ArgumentOutOfRangeException("FileID is to large");
+ }
+ _Log.DebugFormat("Read Data from File: {0}", file_id);
+
+ int max_read_bytes_pre_transaction = 47;
+ long bytes_readed = 0;
+ byte[] readbuffer = new byte[47];
+
+ List read_data = new List();
+
+ while (bytes_readed != length)
+ {
+ byte[] data = new byte[]
+ {
+ file_id
+ };
+
+ byte[] offset_byte_tolong = BitConverter.GetBytes(offset + bytes_readed);
+ // Use only 3 Bytes
+ byte[] offset_byte = new byte[]
+ {
+ offset_byte_tolong[0],
+ offset_byte_tolong[1],
+ offset_byte_tolong[2],
+ };
+
+ long bytes_toread = 0;
+
+ if (length - bytes_readed < max_read_bytes_pre_transaction)
+ {
+ bytes_toread = length - bytes_readed;
+ }
+ else
+ {
+ bytes_toread = max_read_bytes_pre_transaction;
+ }
+
+ byte[] length_byte_tolong = BitConverter.GetBytes(bytes_toread);
+ bytes_readed += bytes_toread;
+
+ // Use only 3 Bytes
+ byte[] length_byte = new byte[]
+ {
+ length_byte_tolong[0],
+ length_byte_tolong[1],
+ length_byte_tolong[2],
+ };
+
+ APDUCommand cmd_ReadData = new APDUCommand(IsoCase.Case4Short)
+ {
+ CLA = 0x90,
+ INS = (byte)APDUInstructions.READ_DATA,
+ Data = Concatenate(data, offset_byte, length_byte)
+ };
+ _Log.Debug(cmd_ReadData.ToString());
+
+ APDUResponse response = _Card.Transmit(cmd_ReadData);
+ _Log.Debug(response.ToString());
+
+ CheckAPDUResponse(response);
+
+ // Remove CMAC from Body
+ read_data.AddRange(GetSubArray(response.Body, 0, bytes_toread));
+ }
+
+ return read_data.ToArray();
+ }
+
+ ///
+ /// Get all ApplicationIDS from PICC
+ ///
+ /// AIDs (3 Byte) as Array
+ //public UInt32[] GetApplicationIDs()
+ //{
+ // _Log.Debug("Start GetApplicationIDs");
+
+ // APDUCommand cmd = new APDUCommand(IsoCase.Case2Short)
+ // {
+ // CLA = 0x90,
+ // INS = (byte)APDUInstructions.GET_APPLICATION_IDS
+ // };
+
+ // APDUResponse response = _Card.Transmit(cmd);
+
+ // CheckAPDUResponse(response);
+
+ // if (response.Body.Length % 3 != 0)
+ // {
+ // throw new Exception(string.Format("Invalid body length (was: {0}).", response.Body.Length));
+ // }
+
+ // if (response.Body.Length == 0)
+ // {
+ // throw new Exception("Missing PICC Entry 0x000000.");
+ // }
+
+ // List applicationIDs = new List();
+
+ // for (int i = 0; i < response.Body.Length; i += 3)
+ // {
+ // UInt32 new_applicationID = 0;
+ // new_applicationID = (UInt32)((response.Body[i] << 16) + (response.Body[i + 1] << 8) + response.Body[i + 2]);
+ // applicationIDs.Add(new_applicationID);
+ // }
+
+ // _Log.Debug("End GetApplicationIDs");
+
+ // return applicationIDs.ToArray();
+ //}
+
+ ///
+ /// Delete Application by ID
+ ///
+ /// 3 Byte ID
+ //public void DeleteApplication(UInt32 id)
+ //{
+ // byte[] id_byte = BitConverter.GetBytes(id);
+
+ // APDUCommand cmd = new APDUCommand(IsoCase.Case4Short)
+ // {
+ // CLA = 0x90,
+ // INS = (byte)APDUInstructions.DELETE_APPLICATION,
+ // Data = new byte[]
+ // {
+ // id_byte[0],
+ // id_byte[1],
+ // id_byte[2]
+ // },
+ // Le = 0x00
+ // };
+
+ // APDUResponse response = _Card.Transmit(cmd);
+ // CheckAPDUResponse(response);
+ //}
+ #endregion
+ #endregion
+ }
+}
diff --git a/NFC/Readers/PCSC/Card.cs b/NFC/Readers/PCSC/Card.cs
new file mode 100644
index 0000000..83ae2e9
--- /dev/null
+++ b/NFC/Readers/PCSC/Card.cs
@@ -0,0 +1,53 @@
+using PCSC;
+using PCSC.Iso7816;
+using NFC.ISO7816_4;
+
+namespace NFC.Readers.PCSC
+{
+ public class Card : ICard
+ {
+ private IsoReader _ISOReader;
+ private string _ReaderID;
+
+ public Card(IsoReader isoreader, string readerID)
+ {
+ _ISOReader = isoreader;
+ _ReaderID = readerID;
+ }
+ public void Connect()
+ {
+ _ISOReader.Connect(_ReaderID, SCardShareMode.Shared, SCardProtocol.Any);
+ }
+
+ public void Disconnect()
+ {
+ _ISOReader.Disconnect(SCardReaderDisposition.Eject);
+ }
+
+ public APDUResponse Transmit(APDUCommand apdu_cmd)
+ {
+ Response response = _ISOReader.Transmit(Convert(apdu_cmd));
+ return Convert(response);
+ }
+
+ public CommandApdu Convert(APDUCommand apdu_cmd)
+ {
+ CommandApdu apdu = (CommandApdu)apdu_cmd;
+ return apdu;
+ }
+
+ public APDUResponse Convert(Response response)
+ {
+ ResponseApdu responseApdu = response.Get(0);
+
+ APDUResponse apduResponse = new APDUResponse()
+ {
+ SW1 = responseApdu.SW1,
+ SW2 = responseApdu.SW2,
+ Body = responseApdu.GetData()
+ };
+
+ return apduResponse;
+ }
+ }
+}
diff --git a/NFC/Readers/PCSC/PCSC_Hardware.cs b/NFC/Readers/PCSC/PCSC_Hardware.cs
new file mode 100644
index 0000000..3f86805
--- /dev/null
+++ b/NFC/Readers/PCSC/PCSC_Hardware.cs
@@ -0,0 +1,33 @@
+using PCSC;
+
+namespace NFC.Readers.PCSC
+{
+ public class PCSC_Hardware : IHardware
+ {
+ public string[] GetReaders()
+ {
+ var contextFactory = ContextFactory.Instance;
+ using (var context = contextFactory.Establish(SCardScope.System))
+ {
+ return context.GetReaders();
+ }
+ }
+
+ public bool IsAvailable()
+ {
+ if(GetReaders().Length == 0)
+ {
+ return false;
+ }
+ else
+ {
+ return true;
+ }
+ }
+
+ public IReader OpenReader(string readerID)
+ {
+ return new PCSC_Reader(readerID);
+ }
+ }
+}
diff --git a/NFC/Readers/PCSC/PCSC_Reader.cs b/NFC/Readers/PCSC/PCSC_Reader.cs
new file mode 100644
index 0000000..c0a399c
--- /dev/null
+++ b/NFC/Readers/PCSC/PCSC_Reader.cs
@@ -0,0 +1,49 @@
+using PCSC;
+using PCSC.Iso7816;
+using System;
+
+namespace NFC.Readers.PCSC
+{
+
+ public class PCSC_Reader : IReader, IDisposable
+ {
+ private string _ReaderID;
+ private IContextFactory _ContextFactory;
+ private ISCardContext _SCardContext;
+ private IsoReader _ISOReader;
+ private ICard _Card;
+
+ public PCSC_Reader(string readerID)
+ {
+ _ReaderID = readerID;
+ }
+
+ public event ReaderEventHandler CardDiscovered;
+ public event ReaderEventHandler CardLost;
+
+ public void Dispose()
+ {
+ Stop();
+ }
+
+ public void Start()
+ {
+ _ContextFactory = ContextFactory.Instance;
+ _SCardContext = _ContextFactory.Establish(SCardScope.System);
+
+ _ISOReader = new IsoReader(_SCardContext);
+
+ _Card = new Card(_ISOReader, _ReaderID);
+
+ CardDiscovered?.Invoke(this, _Card);
+ }
+
+ public void Stop()
+ {
+ CardLost?.Invoke(this, _Card);
+
+ _ISOReader.Dispose();
+ _SCardContext.Dispose();
+ }
+ }
+}
diff --git a/NFC_Test/Crypto/AES_Test.cs b/NFC_Test/Crypto/AES_Test.cs
new file mode 100644
index 0000000..df41197
--- /dev/null
+++ b/NFC_Test/Crypto/AES_Test.cs
@@ -0,0 +1,24 @@
+using NFC;
+using NFC.Crypto;
+using NUnit.Framework;
+
+namespace NFC_Unit_Test.Crypto
+{
+ [TestFixture]
+ public class AES_Test
+ {
+ [Test]
+ public void Encrypt()
+ {
+ byte[] data = HexConverter.ConvertFromHexString("8db1f942f2d7cc82f6fa1486a30f8c12104a3b07e8eb77a7ac00000000000000");
+ byte[] key = HexConverter.ConvertFromHexString("e7aff3361c3e85347993c3219a87d24b");
+ byte[] iv = HexConverter.ConvertFromHexString("00000000000000000000000000000000");
+
+ AES aes = new AES();
+ byte[] data_enc = aes.Encrypt(data, key, iv);
+
+ byte[] data_enc_expected = HexConverter.ConvertFromHexString("3c79d74a4969ba7123e5d8f6df24493112d221fd131a4617d0eda5d92ccc1b46");
+ Assert.AreEqual(data_enc_expected, data_enc);
+ }
+ }
+}
\ No newline at end of file
diff --git a/NFC_Test/Crypto/CRC16_Test.cs b/NFC_Test/Crypto/CRC16_Test.cs
new file mode 100644
index 0000000..3098f35
--- /dev/null
+++ b/NFC_Test/Crypto/CRC16_Test.cs
@@ -0,0 +1,23 @@
+using NFC;
+using NFC.Crypto;
+using NUnit.Framework;
+
+namespace NFC_Unit_Test.Crypto
+{
+ [TestFixture]
+ public class CRC16_Test
+ {
+ [Test]
+ [Ignore("Unknown Expected Data")]
+ public void Caluclate()
+ {
+ byte[] data = HexConverter.ConvertFromHexString("");
+ byte[] crc_expected = HexConverter.ConvertFromHexString("");
+
+ CRC16 crc16 = new CRC16();
+ byte[] crc = crc16.Calculate(data);
+
+ Assert.AreEqual(crc_expected, crc);
+ }
+ }
+}
diff --git a/NFC_Test/Crypto/CRC32_Test.cs b/NFC_Test/Crypto/CRC32_Test.cs
new file mode 100644
index 0000000..f2ce5a8
--- /dev/null
+++ b/NFC_Test/Crypto/CRC32_Test.cs
@@ -0,0 +1,22 @@
+using NFC;
+using NFC.Crypto;
+using NUnit.Framework;
+
+namespace NFC_Unit_Test.Crypto
+{
+ [TestFixture]
+ public class CRC32_Test
+ {
+ [Test]
+ public void Caluclate()
+ {
+ byte[] data = HexConverter.ConvertFromHexString("c40045eeb8338ae8f49a032e85bb1114353010");
+ byte[] crc_expected = HexConverter.ConvertFromHexString("95c3894b");
+
+ CRC32 crc32 = new CRC32();
+ byte[] crc = crc32.Calculate(data);
+
+ Assert.AreEqual(crc_expected, crc);
+ }
+ }
+}
diff --git a/NFC_Test/Crypto/CipherKey_Test.cs b/NFC_Test/Crypto/CipherKey_Test.cs
new file mode 100644
index 0000000..492d2d1
--- /dev/null
+++ b/NFC_Test/Crypto/CipherKey_Test.cs
@@ -0,0 +1,13 @@
+using NUnit.Framework;
+using System;
+using System.Collections.Generic;
+using System.Text;
+
+namespace NFC_Unit_Test.Crypto
+{
+ [TestFixture]
+ public class CipherKey_Test
+ {
+
+ }
+}
diff --git a/NFC_Test/Crypto/TDES_Test.cs b/NFC_Test/Crypto/TDES_Test.cs
new file mode 100644
index 0000000..fbf8ba0
--- /dev/null
+++ b/NFC_Test/Crypto/TDES_Test.cs
@@ -0,0 +1,55 @@
+using NFC;
+using NFC.Crypto;
+using NUnit.Framework;
+
+namespace NFC_Unit_Test.Crypto
+{
+ [TestFixture]
+ public class TDES_Test
+ {
+ [Test]
+ [Ignore("Unknown Expected Data")]
+ public void Encrypt_TDES()
+ {
+ byte[] data = HexConverter.ConvertFromHexString("");
+ byte[] key = HexConverter.ConvertFromHexString("");
+ byte[] iv = HexConverter.ConvertFromHexString("0000000000000000");
+
+ TDES des = new TDES();
+ byte[] data_enc = des.Encrypt(data, key, iv);
+
+ byte[] data_enc_expected = HexConverter.ConvertFromHexString("");
+ Assert.AreEqual(data_enc_expected, data_enc);
+ }
+
+ [Test]
+ [Ignore("Unknown Expected Data")]
+ public void Encrypt_TDES_2K()
+ {
+ byte[] data = HexConverter.ConvertFromHexString("");
+ byte[] key = HexConverter.ConvertFromHexString("");
+ byte[] iv = HexConverter.ConvertFromHexString("0000000000000000");
+
+ TDES_2K des = new TDES_2K();
+ byte[] data_enc = des.Encrypt(data, key, iv);
+
+ byte[] data_enc_expected = HexConverter.ConvertFromHexString("");
+ Assert.AreEqual(data_enc_expected, data_enc);
+ }
+
+ [Test]
+ [Ignore("Unknown Expected Data")]
+ public void Encrypt_TDES_3K()
+ {
+ byte[] data = HexConverter.ConvertFromHexString("");
+ byte[] key = HexConverter.ConvertFromHexString("");
+ byte[] iv = HexConverter.ConvertFromHexString("0000000000000000");
+
+ TDES_3K des = new TDES_3K();
+ byte[] data_enc = des.Encrypt(data, key, iv);
+
+ byte[] data_enc_expected = HexConverter.ConvertFromHexString("");
+ Assert.AreEqual(data_enc_expected, data_enc);
+ }
+ }
+}
\ No newline at end of file
diff --git a/NFC_Test/HexConverter_Test.cs b/NFC_Test/HexConverter_Test.cs
new file mode 100644
index 0000000..f20669c
--- /dev/null
+++ b/NFC_Test/HexConverter_Test.cs
@@ -0,0 +1,34 @@
+using NFC;
+using NUnit.Framework;
+
+namespace NFC_Unit_Test
+{
+ public class HexConverter_Test
+ {
+ [Test]
+ public void ConvertFromHexString()
+ {
+ string s = "0180ff0a";
+
+ byte[] expected_s =
+ {
+ 0x01, 0x80, 0xFF, 0x0A
+ };
+
+ Assert.AreEqual(expected_s, HexConverter.ConvertFromHexString(s));
+ }
+
+ [Test]
+ public void ConvertToHexString()
+ {
+ byte[] s =
+ {
+ 0x01, 0x80, 0xFF, 0x0A
+ };
+
+ string expected_s = "0180ff0a";
+
+ Assert.AreEqual(expected_s, HexConverter.ConvertToHexString(s));
+ }
+ }
+}
diff --git a/NFC_Test/ISO7816-4/APDUCommand_Test.cs b/NFC_Test/ISO7816-4/APDUCommand_Test.cs
new file mode 100644
index 0000000..1688aea
--- /dev/null
+++ b/NFC_Test/ISO7816-4/APDUCommand_Test.cs
@@ -0,0 +1,119 @@
+using System;
+using NFC.ISO7816_4;
+using NUnit.Framework;
+using PCSC.Iso7816;
+
+namespace NFC_Unit_Test.ISO7816_4
+{
+ [TestFixture]
+ public class APDUCommand_Test
+ {
+ [Test]
+ public void Compare()
+ {
+ APDUCommand command1 = new APDUCommand(IsoCase.Case4Short)
+ {
+ CLA = 0x90,
+ INS = 0xAA,
+ Data = new byte[]
+ {
+ 0x01, 0x02, 0x03
+ }
+ };
+
+ APDUCommand command2 = new APDUCommand(IsoCase.Case4Short)
+ {
+ CLA = 0x90,
+ INS = 0xAA,
+ Data = new byte[]
+ {
+ 0x01, 0x02, 0x03
+ }
+ };
+
+ Assert.IsTrue(command1 == command2);
+ }
+
+ [Test]
+ public void Compare_Diff()
+ {
+ APDUCommand command1 = new APDUCommand(IsoCase.Case4Short)
+ {
+ CLA = 0x90,
+ INS = 0xAA,
+ Data = new byte[]
+ {
+ 0x01, 0x02, 0x03
+ }
+ };
+
+ APDUCommand command2 = new APDUCommand(IsoCase.Case4Short)
+ {
+ CLA = 0x90,
+ INS = 0x1A,
+ Data = new byte[]
+ {
+ 0x01, 0x02, 0x03
+ }
+ };
+
+ Assert.IsFalse(command1 == command2);
+ }
+
+ [Test]
+ public void ToString_Case1()
+ {
+ APDUCommand command = new APDUCommand(IsoCase.Case1)
+ {
+ CLA = 0x90,
+ INS = 0x1A
+ };
+
+ Console.WriteLine(command.ToString());
+ }
+
+ [Test]
+ public void ToString_Case2()
+ {
+ APDUCommand command = new APDUCommand(IsoCase.Case2Short)
+ {
+ CLA = 0x90,
+ INS = 0x1A
+ };
+
+ Console.WriteLine(command.ToString());
+ }
+
+ [Test]
+ public void ToString_Case3()
+ {
+ APDUCommand command = new APDUCommand(IsoCase.Case3Short)
+ {
+ CLA = 0x90,
+ INS = 0x1A,
+ Data = new byte[]
+ {
+ 0x01, 0x02, 0x03
+ }
+ };
+
+ Console.WriteLine(command.ToString());
+ }
+
+ [Test]
+ public void ToString_Case4()
+ {
+ APDUCommand command = new APDUCommand(IsoCase.Case4Short)
+ {
+ CLA = 0x90,
+ INS = 0x1A,
+ Data = new byte[]
+ {
+ 0x01, 0x02, 0x03
+ }
+ };
+
+ Console.WriteLine(command.ToString());
+ }
+ }
+}
diff --git a/NFC_Test/NFC_Test.csproj b/NFC_Test/NFC_Test.csproj
new file mode 100644
index 0000000..28d0baf
--- /dev/null
+++ b/NFC_Test/NFC_Test.csproj
@@ -0,0 +1,18 @@
+
+
+
+ netcoreapp3.1
+
+
+
+
+
+
+
+
+
+
+
+
+
+
diff --git a/NFC_Test/NXP MIFARE DESFire/MIFARE_DESFire_Test.cs b/NFC_Test/NXP MIFARE DESFire/MIFARE_DESFire_Test.cs
new file mode 100644
index 0000000..f39d986
--- /dev/null
+++ b/NFC_Test/NXP MIFARE DESFire/MIFARE_DESFire_Test.cs
@@ -0,0 +1,1135 @@
+using NFC;
+using NFC.Mifare_DESFire.Enums;
+using NFC.ISO7816_4;
+using NFC.Mifare_DESFire;
+using NFC.NXP_MIFARE_DESFire.Exceptions;
+using NSubstitute;
+using NUnit.Framework;
+using System;
+using System.Text;
+
+namespace NFC_Unit_Test.NXP_MIFARE_DESFire
+{
+ [TestFixture]
+ public class MIFARE_DESFire_Test
+ {
+ #region Helper Methods
+ [Test]
+ public void GenerateEmptyArray()
+ {
+ uint i = 16;
+
+ MIFARE_DESFire desfire = new MIFARE_DESFire(null);
+
+ byte[] data = desfire.GenerateEmptyArray(i);
+
+ for (int e = 0; e < i; e++)
+ {
+ if (data[e] != 0x00)
+ {
+ Assert.Fail("Data is not 0x00");
+ }
+ }
+ }
+
+ [Test]
+ public void GetSubArray()
+ {
+ byte[] array = new byte[]
+ {
+ 0x01, 0x02, 0x03, 0x04, 0x05
+ };
+
+ byte[] expected_subarray = new byte[]
+ {
+ 0x02, 0x03, 0x04
+ };
+
+ MIFARE_DESFire desfire = new MIFARE_DESFire(null);
+
+ Assert.AreEqual(expected_subarray, desfire.GetSubArray(array, 1, 3));
+ }
+
+ [Test]
+ public void CheckAPDUResponse__NULL()
+ {
+ MIFARE_DESFire desfire = new MIFARE_DESFire(null);
+ Assert.Throws(
+ delegate
+ {
+ desfire.CheckAPDUResponse(null);
+ });
+ }
+
+ [Test]
+ public void CheckAPDUResponse__UNKNOWN()
+ {
+ APDUResponse response = new APDUResponse()
+ {
+ SW1 = 0x00,
+ SW2 = 0x00
+ };
+
+ MIFARE_DESFire desfire = new MIFARE_DESFire(null);
+ Assert.Throws(
+ delegate
+ {
+ desfire.CheckAPDUResponse(response);
+ });
+ }
+
+ [Test]
+ public void CheckAPDUResponse__OPERATION_OK()
+ {
+ APDUResponse response = new APDUResponse()
+ {
+ SW1 = 0x91,
+ SW2 = 0x00
+ };
+
+ MIFARE_DESFire desfire = new MIFARE_DESFire(null);
+
+ desfire.CheckAPDUResponse(response);
+ }
+
+ [Test]
+ public void CheckAPDUResponse__NO_CHANGES()
+ {
+ APDUResponse response = new APDUResponse()
+ {
+ SW1 = 0x91,
+ SW2 = 0x0C
+ };
+
+ MIFARE_DESFire desfire = new MIFARE_DESFire(null);
+ desfire.CheckAPDUResponse(response);
+ }
+
+ [Test]
+ public void CheckAPDUResponse__ILLEGAL_COMMAND_CODE()
+ {
+ APDUResponse response = new APDUResponse()
+ {
+ SW1 = 0x91,
+ SW2 = 0x1C
+ };
+
+ MIFARE_DESFire desfire = new MIFARE_DESFire(null);
+
+ Assert.Throws(
+ delegate
+ {
+ desfire.CheckAPDUResponse(response);
+ });
+ }
+
+ [Test]
+ public void CheckAPDUResponse__INTEGRITY_ERROR()
+ {
+ APDUResponse response = new APDUResponse()
+ {
+ SW1 = 0x91,
+ SW2 = 0x1E
+ };
+
+ MIFARE_DESFire desfire = new MIFARE_DESFire(null);
+
+ Assert.Throws(
+ delegate
+ {
+ desfire.CheckAPDUResponse(response);
+ });
+ }
+
+ [Test]
+ public void CheckAPDUResponse__NO_SUCH_KEY()
+ {
+ APDUResponse response = new APDUResponse()
+ {
+ SW1 = 0x91,
+ SW2 = 0x40
+ };
+
+ MIFARE_DESFire desfire = new MIFARE_DESFire(null);
+
+ Assert.Throws(
+ delegate
+ {
+ desfire.CheckAPDUResponse(response);
+ });
+ }
+
+ [Test]
+ public void CheckAPDUResponse__LENGTH_ERROR()
+ {
+ APDUResponse response = new APDUResponse()
+ {
+ SW1 = 0x91,
+ SW2 = 0x7E
+ };
+
+ MIFARE_DESFire desfire = new MIFARE_DESFire(null);
+
+ Assert.Throws(
+ delegate
+ {
+ desfire.CheckAPDUResponse(response);
+ });
+ }
+
+ [Test]
+ public void CheckAPDUResponse__PERMISSION_DENIED()
+ {
+ APDUResponse response = new APDUResponse()
+ {
+ SW1 = 0x91,
+ SW2 = 0x9D
+ };
+
+ MIFARE_DESFire desfire = new MIFARE_DESFire(null);
+
+ Assert.Throws(
+ delegate
+ {
+ desfire.CheckAPDUResponse(response);
+ });
+ }
+
+ [Test]
+ public void CheckAPDUResponse__PARAMETER_ERROR()
+ {
+ APDUResponse response = new APDUResponse()
+ {
+ SW1 = 0x91,
+ SW2 = 0x9E
+ };
+
+ MIFARE_DESFire desfire = new MIFARE_DESFire(null);
+
+ Assert.Throws(
+ delegate
+ {
+ desfire.CheckAPDUResponse(response);
+ });
+ }
+
+ [Test]
+ public void CheckAPDUResponse__AUTHENTICATION_DELAY()
+ {
+ APDUResponse response = new APDUResponse()
+ {
+ SW1 = 0x91,
+ SW2 = 0xAD
+ };
+
+ MIFARE_DESFire desfire = new MIFARE_DESFire(null);
+
+ Assert.Throws(
+ delegate
+ {
+ desfire.CheckAPDUResponse(response);
+ });
+ }
+
+ [Test]
+ public void CheckAPDUResponse__AUTHENTICATION_ERROR()
+ {
+ APDUResponse response = new APDUResponse()
+ {
+ SW1 = 0x91,
+ SW2 = 0xAE
+ };
+
+ MIFARE_DESFire desfire = new MIFARE_DESFire(null);
+
+ Assert.Throws(
+ delegate
+ {
+ desfire.CheckAPDUResponse(response);
+ });
+ }
+
+ [Test]
+ public void CheckAPDUResponse__ADDITIONAL_FRAME()
+ {
+ APDUResponse response = new APDUResponse()
+ {
+ SW1 = 0x91,
+ SW2 = 0xAF
+ };
+
+ MIFARE_DESFire desfire = new MIFARE_DESFire(null);
+
+ desfire.CheckAPDUResponse(response);
+ }
+
+ [Test]
+ public void CheckAPDUResponse__BOUNDARY_ERROR()
+ {
+ APDUResponse response = new APDUResponse()
+ {
+ SW1 = 0x91,
+ SW2 = 0xBE
+ };
+
+ MIFARE_DESFire desfire = new MIFARE_DESFire(null);
+
+ Assert.Throws(
+ delegate
+ {
+ desfire.CheckAPDUResponse(response);
+ });
+ }
+
+ [Test]
+ public void CheckAPDUResponse__COMMAND_ABORTED()
+ {
+ APDUResponse response = new APDUResponse()
+ {
+ SW1 = 0x91,
+ SW2 = 0xCA
+ };
+
+ MIFARE_DESFire desfire = new MIFARE_DESFire(null);
+
+ Assert.Throws(
+ delegate
+ {
+ desfire.CheckAPDUResponse(response);
+ });
+ }
+
+ [Test]
+ public void CheckAPDUResponse__DUPLICATE_ERROR()
+ {
+ APDUResponse response = new APDUResponse()
+ {
+ SW1 = 0x91,
+ SW2 = 0xDE
+ };
+
+ MIFARE_DESFire desfire = new MIFARE_DESFire(null);
+
+ Assert.Throws(
+ delegate
+ {
+ desfire.CheckAPDUResponse(response);
+ });
+ }
+
+ [Test]
+ public void CheckAPDUResponse__FILE_NOT_FOUND()
+ {
+ APDUResponse response = new APDUResponse()
+ {
+ SW1 = 0x91,
+ SW2 = 0xF0
+ };
+
+ MIFARE_DESFire desfire = new MIFARE_DESFire(null);
+
+ Assert.Throws(
+ delegate
+ {
+ desfire.CheckAPDUResponse(response);
+ });
+ }
+ #endregion
+
+ #region Crypto Operation
+ [Test]
+ public void ExtractLastBlock()
+ {
+ byte[] data = new byte[]
+ {
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01
+ };
+
+ byte[] expected_lastblock = new byte[]
+ {
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01
+ };
+
+ MIFARE_DESFire desfire = new MIFARE_DESFire(null);
+
+ byte[] lastblock = desfire.ExtractLastBlock(data, 8);
+
+ Assert.AreEqual(expected_lastblock, lastblock);
+ }
+
+ [Test]
+ public void ExtractLastBlock_WrongBlocksize()
+ {
+ byte[] data = new byte[]
+ {
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01
+ };
+
+ MIFARE_DESFire desfire = new MIFARE_DESFire(null);
+
+ Assert.Throws(
+ delegate
+ {
+ byte[] lastblock = desfire.ExtractLastBlock(data, 7);
+ });
+ }
+
+ [Test]
+ public void ExtractLastBlock_Null()
+ {
+ byte[] data = null;
+
+ MIFARE_DESFire desfire = new MIFARE_DESFire(null);
+
+ Assert.Throws(
+ delegate
+ {
+ byte[] lastblock = desfire.ExtractLastBlock(data, 7);
+ });
+ }
+
+ [Test]
+ public void ExpandToBlockSize()
+ {
+ byte[] data = new byte[]
+ {
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x01
+ };
+
+ byte[] expected_lastblock = new byte[]
+ {
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00
+ };
+
+ MIFARE_DESFire desfire = new MIFARE_DESFire(null);
+
+ byte[] lastblock = desfire.ExpandToBlockSize(data, 8);
+
+ Assert.AreEqual(expected_lastblock, lastblock);
+ }
+
+ [Test]
+ public void ExpandToBlockSize_Null()
+ {
+ byte[] data = null;
+
+ MIFARE_DESFire desfire = new MIFARE_DESFire(null);
+
+ Assert.Throws(
+ delegate
+ {
+ byte[] lastblock = desfire.ExpandToBlockSize(data, 8);
+ });
+ }
+
+ [Test]
+ public void RotateLeft()
+ {
+ byte[] data = new byte[]
+ {
+ 0x01, 0x02, 0x03, 0x04
+ };
+
+ byte[] expected_data_left = new byte[]
+ {
+ 0x02, 0x03, 0x04, 0x01
+ };
+
+ MIFARE_DESFire desfire = new MIFARE_DESFire(null);
+
+ byte[] data_left = desfire.RotateLeft(data);
+
+ Assert.AreEqual(expected_data_left, data_left);
+ }
+
+ [Test]
+ public void RotateLeft_Null()
+ {
+ MIFARE_DESFire desfire = new MIFARE_DESFire(null);
+
+ Assert.Throws(
+ delegate
+ {
+ byte[] lastblock = desfire.RotateLeft(null);
+ });
+ }
+
+ [Test]
+ public void RotateRight()
+ {
+ byte[] data = new byte[]
+ {
+ 0x01, 0x02, 0x03, 0x04
+ };
+
+ byte[] expected_data_left = new byte[]
+ {
+ 0x04, 0x01, 0x02, 0x03
+ };
+
+ MIFARE_DESFire desfire = new MIFARE_DESFire(null);
+
+ byte[] data_left = desfire.RotateRight(data);
+
+ Assert.AreEqual(expected_data_left, data_left);
+ }
+
+ [Test]
+ public void RotateRight_Null()
+ {
+ MIFARE_DESFire desfire = new MIFARE_DESFire(null);
+
+ Assert.Throws(
+ delegate
+ {
+ byte[] lastblock = desfire.RotateRight(null);
+ });
+ }
+
+ [Test]
+ public void Concatenate()
+ {
+ byte[] data_a = new byte[]
+ {
+ 0x01, 0x02, 0x03, 0x04
+ };
+
+ byte[] data_b = new byte[]
+ {
+ 0x05, 0x06, 0x07, 0x08
+ };
+
+ byte[] expected_data_c = new byte[]
+ {
+ 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08
+ };
+
+ MIFARE_DESFire desfire = new MIFARE_DESFire(null);
+
+ byte[] data_c = desfire.Concatenate(data_a, data_b);
+
+ Assert.AreEqual(expected_data_c, data_c);
+ }
+
+ [Test]
+ public void Concatenate_ABC()
+ {
+ byte[] data_a = new byte[]
+ {
+ 0x01, 0x02, 0x03, 0x04
+ };
+
+ byte[] data_b = new byte[]
+ {
+ 0x05, 0x06, 0x07, 0x08
+ };
+
+ byte[] data_c = new byte[]
+ {
+ 0x09, 0xA0, 0xB0, 0xC0
+ };
+
+ byte[] expected_data_d = new byte[]
+ {
+ 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0xA0, 0xB0, 0xC0
+ };
+
+ MIFARE_DESFire desfire = new MIFARE_DESFire(null);
+
+ byte[] data_d = desfire.Concatenate(data_a, data_b, data_c);
+
+ Assert.AreEqual(expected_data_d, data_d);
+ }
+
+ [Test]
+ public void Concatenate_Null()
+ {
+ MIFARE_DESFire desfire = new MIFARE_DESFire(null);
+
+ Assert.Throws(
+ delegate
+ {
+ byte[] lastblock = desfire.Concatenate(null, null);
+ });
+ }
+
+ [Test]
+ public void XOR()
+ {
+ byte[] data_a = new byte[]
+ {
+ 0x00, 0xF0, 0x00, 0xF0
+ };
+
+ byte[] data_b = new byte[]
+ {
+ 0x0F, 0x00, 0x0F, 0x00
+ };
+
+ byte[] expected_data_c = new byte[]
+ {
+ 0x0F, 0xF0, 0x0F, 0xF0
+ };
+
+ MIFARE_DESFire desfire = new MIFARE_DESFire(null);
+
+ byte[] data_c = desfire.XOR(data_a, data_b);
+
+ Assert.AreEqual(expected_data_c, data_c);
+ }
+
+ [Test]
+ public void XOR_null()
+ {
+ MIFARE_DESFire desfire = new MIFARE_DESFire(null);
+
+ Assert.Throws(
+ delegate
+ {
+ byte[] lastblock = desfire.XOR(null, null);
+ });
+ }
+
+ [Test]
+ public void GenerateSessionKey_DES()
+ {
+ MIFARE_DESFire desfire = new MIFARE_DESFire(null);
+
+ byte[] rndA = HexConverter.ConvertFromHexString("a541a9dc9138df07");
+ Console.WriteLine(HexConverter.ConvertToHexString(rndA));
+ byte[] rndB = HexConverter.ConvertFromHexString("cbe55aa893b2da25");
+ Console.WriteLine(HexConverter.ConvertToHexString(rndB));
+
+ byte[] expected_sessionkey = HexConverter.ConvertFromHexString("a541a9dccbe55aa8a541a9dccbe55aa8");
+ Console.WriteLine(HexConverter.ConvertToHexString(expected_sessionkey));
+
+ byte[] sessionkey = desfire.GenerateSesionKey_DES(rndA, rndB);
+ Console.WriteLine(HexConverter.ConvertToHexString(sessionkey));
+ Assert.AreEqual(expected_sessionkey, sessionkey);
+ }
+
+ [Test]
+ public void GenerateSessionKey_AES()
+ {
+ MIFARE_DESFire desfire = new MIFARE_DESFire(null);
+
+ byte[] rndA = HexConverter.ConvertFromHexString("bc14dfde20074617e45a8822f06fdd91");
+ Console.WriteLine(HexConverter.ConvertToHexString(rndA));
+ byte[] rndB = HexConverter.ConvertFromHexString("482ddc54426e6dee560413b8d95471f5");
+ Console.WriteLine(HexConverter.ConvertToHexString(rndB));
+
+ byte[] expected_sessionkey = HexConverter.ConvertFromHexString("bc14dfde482ddc54f06fdd91d95471f5");
+ Console.WriteLine(HexConverter.ConvertToHexString(expected_sessionkey));
+
+ byte[] sessionkey = desfire.GenerateSesionKey_AES(rndA, rndB);
+ Console.WriteLine(HexConverter.ConvertToHexString(sessionkey));
+ Assert.AreEqual(expected_sessionkey, sessionkey);
+ }
+ #endregion
+
+ #region Configuration Generator
+ [Test]
+ public void GenerateKeySetting1()
+ {
+ MIFARE_DESFire desfire = new MIFARE_DESFire(null);
+
+ Assert.AreEqual(0x0B, desfire.GenerateKeySetting1(ChangeApplicationKey.MASTERKEY, ChangeMasterKeySettings.WITHMASTERKEY, CreateDeleteFile.ONLYMASTERKEY, FileDirectoryAccess.NOKEY, ChangeMasterKey.CHANGEABLE));
+ }
+
+ [Test]
+ public void GenerateKeySetting1_ChangeKey()
+ {
+ MIFARE_DESFire desfire = new MIFARE_DESFire(null);
+ Assert.AreEqual(0x1B, desfire.GenerateKeySetting1(0x01, ChangeMasterKeySettings.WITHMASTERKEY, CreateDeleteFile.ONLYMASTERKEY, FileDirectoryAccess.NOKEY, ChangeMasterKey.CHANGEABLE));
+ }
+
+ [Test]
+ public void GenerateKeySetting1_Wrong_KeyID()
+ {
+ MIFARE_DESFire desfire = new MIFARE_DESFire(null);
+
+ Assert.Throws(
+ delegate
+ {
+ desfire.GenerateKeySetting1(0x10, ChangeMasterKeySettings.WITHMASTERKEY, CreateDeleteFile.ONLYMASTERKEY, FileDirectoryAccess.NOKEY, ChangeMasterKey.CHANGEABLE);
+ });
+ }
+
+ [Test]
+ public void GenerateKeySetting2()
+ {
+ MIFARE_DESFire desfire = new MIFARE_DESFire(null);
+
+ Assert.AreEqual(0x82, desfire.GenerateKeySetting2(CryptoOperationsType.AES, FileIdentifies.NOTUSED, 0x02));
+ }
+
+ [Test]
+ public void GenerateKeySetting2_Wrong_KeyNumbers()
+ {
+ MIFARE_DESFire desfire = new MIFARE_DESFire(null);
+
+ Assert.Throws(
+ delegate
+ {
+ desfire.GenerateKeySetting2(CryptoOperationsType.AES, FileIdentifies.NOTUSED, 0x10);
+ });
+ }
+
+
+ [Test]
+ public void GenerateFileAccessRights()
+ {
+ MIFARE_DESFire desfire = new MIFARE_DESFire(null);
+
+ Assert.AreEqual(0x1234, desfire.GenerateFileAccessRights(0x01, 0x02, 0x03, 0x04));
+ }
+
+ [Test]
+ public void GenerateFileAccessRights_OutOfRange()
+ {
+ MIFARE_DESFire desfire = new MIFARE_DESFire(null);
+
+ Assert.Throws(
+ delegate
+ {
+ desfire.GenerateFileAccessRights(0x10, 0x00, 0x00, 0x00);
+ });
+ }
+ #endregion
+
+ #region DESFire Commands
+ [Test]
+ public void SelectApplication()
+ {
+ ICard card = Substitute.For();
+
+ MIFARE_DESFire desfire = new MIFARE_DESFire(card);
+
+ APDUResponse response = new APDUResponse()
+ {
+ SW1 = 0x91,
+ SW2 = 0x00
+ };
+
+ card.Transmit(Arg.Is(x => HexConverter.ConvertToHexString(x.ToArray()) == "905a00000333221100")).Returns(response);
+
+ desfire.SelectApplication(0x112233);
+ }
+
+ [Test]
+ public void SelectApplication_InvalidAID()
+ {
+ ICard card = Substitute.For();
+
+ MIFARE_DESFire desfire = new MIFARE_DESFire(null);
+
+ Assert.Throws(
+ delegate
+ {
+ desfire.SelectApplication(0xFF000000);
+ });
+ }
+
+ [Test]
+ public void AuthenticateISO_DES()
+ {
+ ICard card = Substitute.For();
+
+ MIFARE_DESFire desfire = new MIFARE_DESFire(card);
+
+ APDUResponse response_challenge_request = new APDUResponse()
+ {
+ SW1 = 0x91,
+ SW2 = 0xAF,
+ Body = HexConverter.ConvertFromHexString("2bf9a938ecca02e2")
+ };
+
+ APDUResponse response_challenge_response = new APDUResponse()
+ {
+ SW1 = 0x91,
+ SW2 = 0x00,
+ Body = HexConverter.ConvertFromHexString("07d825607a552e2e")
+ };
+
+ byte[] rndA = HexConverter.ConvertFromHexString("5f7d1dd12d979173");
+ byte[] key = HexConverter.ConvertFromHexString("00000000000000000000000000000000");
+
+ card.Transmit(Arg.Is(x => HexConverter.ConvertToHexString(x.ToArray()) == "901a0000010000")).Returns(response_challenge_request);
+ card.Transmit(Arg.Is(x => HexConverter.ConvertToHexString(x.ToArray()) == "90af000010f8cdb2eaa42a3167dfcb53852ce267fd00")).Returns(response_challenge_response);
+
+ desfire.AuthenticateISO_DES(0x00, key, rndA);
+
+ byte[] expected_sessionkey = HexConverter.ConvertFromHexString("5f7d1dd1f449db5c5f7d1dd1f449db5c");
+ byte[] expected_iv = HexConverter.ConvertFromHexString("0000000000000000");
+
+ Assert.AreEqual(expected_sessionkey, desfire._SessionKey);
+ Assert.AreEqual(expected_iv, desfire._IV);
+ }
+
+ [Test]
+ public void AuthenticateISO_DES_InvalidKeyNo()
+ {
+ MIFARE_DESFire desfire = new MIFARE_DESFire(null);
+
+ Assert.Throws(
+ delegate
+ {
+ desfire.AuthenticateISO_DES(0x0F, null);
+ });
+ }
+
+ [Test]
+ public void Format()
+ {
+ ICard card = Substitute.For();
+
+ MIFARE_DESFire desfire = new MIFARE_DESFire(card);
+
+ APDUResponse response = new APDUResponse()
+ {
+ SW1 = 0x91,
+ SW2 = 0x00
+ };
+
+ card.Transmit(Arg.Is(x => HexConverter.ConvertToHexString(x.ToArray()) == "90fc000000")).Returns(response);
+
+ desfire.Format();
+ }
+
+ [Test]
+ public void CreateApplication()
+ {
+ ICard card = Substitute.For();
+
+ MIFARE_DESFire desfire = new MIFARE_DESFire(card);
+
+ APDUResponse response = new APDUResponse()
+ {
+ SW1 = 0x91,
+ SW2 = 0x00
+ };
+
+ card.Transmit(Arg.Is(x => HexConverter.ConvertToHexString(x.ToArray()) == "90ca000005eeffaa0b8200")).Returns(response);
+
+ desfire.CreateApplication(0xAAFFEE, 0x0b, 0x82);
+ }
+
+ [Test]
+ public void CreateApplication_InvalidAID()
+ {
+ ICard card = Substitute.For();
+
+ MIFARE_DESFire desfire = new MIFARE_DESFire(null);
+
+ Assert.Throws(
+ delegate
+ {
+ desfire.CreateApplication(0xFF000000, 0x00, 0x00);
+ });
+ }
+
+ [Test]
+ public void AuthenticateISO_AES()
+ {
+ ICard card = Substitute.For();
+
+ MIFARE_DESFire desfire = new MIFARE_DESFire(card);
+
+ APDUResponse response_challenge_request = new APDUResponse()
+ {
+ SW1 = 0x91,
+ SW2 = 0xAF,
+ Body = HexConverter.ConvertFromHexString("a33856932308775cf464610c2b17a558")
+ };
+
+ APDUResponse response_challenge_response = new APDUResponse()
+ {
+ SW1 = 0x91,
+ SW2 = 0x00,
+ Body = HexConverter.ConvertFromHexString("8fdc476f6bac44fe9150e285abd68d48")
+ };
+
+ byte[] rndA = HexConverter.ConvertFromHexString("2176770e7a6eb4bef00d5e4b201d1e57");
+ byte[] key = HexConverter.ConvertFromHexString("00000000000000000000000000000000");
+
+ card.Transmit(Arg.Is(x => HexConverter.ConvertToHexString(x.ToArray()) == "90aa0000010000")).Returns(response_challenge_request);
+ card.Transmit(Arg.Is(x => HexConverter.ConvertToHexString(x.ToArray()) == "90af000020cbe9726faf54bc76b2055d0b9700e7dc97ecad5627f1d1702a16e8408d2a0ada00")).Returns(response_challenge_response);
+
+ desfire.AuthenticateISO_AES(0x00, key, rndA);
+
+ byte[] expected_sessionkey = HexConverter.ConvertFromHexString("2176770e11c512ca201d1e57fde6e15a");
+ byte[] expected_iv = HexConverter.ConvertFromHexString("00000000000000000000000000000000");
+
+ Assert.AreEqual(expected_sessionkey, desfire._SessionKey);
+ Assert.AreEqual(expected_iv, desfire._IV);
+ }
+
+ [Test]
+ public void AuthenticateISO_AES_InvalidKeyNo()
+ {
+ MIFARE_DESFire desfire = new MIFARE_DESFire(null);
+
+ Assert.Throws(
+ delegate
+ {
+ desfire.AuthenticateISO_AES(0x0F, null);
+ });
+ }
+
+ [Test]
+ public void ChangeKey_AES()
+ {
+ ICard card = Substitute.For();
+
+ MIFARE_DESFire desfire = new MIFARE_DESFire(card);
+
+ APDUResponse response = new APDUResponse()
+ {
+ SW1 = 0x91,
+ SW2 = 0x00
+ };
+
+ card.Transmit(Arg.Is(x => HexConverter.ConvertToHexString(x.ToArray()) == "90c400002100c2b54a718d0251845653199909bb32e8e38bd6719e8dc21799c29c922a0984fc00")).Returns(response);
+
+ byte[] new_key = HexConverter.ConvertFromHexString("25432a462d4a614e645267556b587032");
+
+ byte[] sessionkey = HexConverter.ConvertFromHexString("a8514dd0350f3dfbc86e80744bcc9b57");
+ byte[] iv = HexConverter.ConvertFromHexString("00000000000000000000000000000000");
+
+ desfire._SessionKey = sessionkey;
+ desfire._IV = iv;
+
+ desfire.ChangeKey_AES(0x00, new_key, 0x10);
+ }
+
+ [Test]
+ public void ChangeKey_AES_InvalidKeyNo()
+ {
+ MIFARE_DESFire desfire = new MIFARE_DESFire(null);
+
+ Assert.Throws(
+ delegate
+ {
+ desfire.ChangeKey_AES(0x0F, null, 0x10);
+ });
+ }
+
+ [Test]
+ public void ChangeOtherKey_AES()
+ {
+ ICard card = Substitute.For();
+
+ MIFARE_DESFire desfire = new MIFARE_DESFire(card);
+
+ APDUResponse response = new APDUResponse()
+ {
+ SW1 = 0x91,
+ SW2 = 0x00
+ };
+
+ card.Transmit(Arg.Is(x => HexConverter.ConvertToHexString(x.ToArray()) == "90c400002101a8c5a61a06f56f38dc91266fed2e87dc00a5ad72a634ff0e62c8d6d80707dd6000")).Returns(response);
+
+ byte[] new_key = HexConverter.ConvertFromHexString("25432a462d4a614e645267556b587032");
+ byte[] old_key = HexConverter.ConvertFromHexString("00000000000000000000000000000000");
+
+ byte[] sessionkey = HexConverter.ConvertFromHexString("1677623e1e158a62dc3d128db55f947d");
+ byte[] iv = HexConverter.ConvertFromHexString("00000000000000000000000000000000");
+
+ desfire._SessionKey = sessionkey;
+ desfire._IV = iv;
+
+ desfire.ChangeOtherKey_AES(0x01, new_key, old_key, 0x10);
+ }
+
+ [Test]
+ public void ChangeOtherKey_AES_InvalidKeyNo()
+ {
+ MIFARE_DESFire desfire = new MIFARE_DESFire(null);
+
+ Assert.Throws(
+ delegate
+ {
+ desfire.ChangeKey_AES(0x0F, null, 0x10);
+ });
+ }
+
+ [Test]
+ public void CreateFile_Standard()
+ {
+ ICard card = Substitute.For();
+
+ MIFARE_DESFire desfire = new MIFARE_DESFire(card);
+
+ APDUResponse response = new APDUResponse()
+ {
+ SW1 = 0x91,
+ SW2 = 0x00
+ };
+
+ card.Transmit(Arg.Is(x => HexConverter.ConvertToHexString(x.ToArray()) == "90cd000007010000e0f0000000")).Returns(response);
+
+ UInt16 accesRights = desfire.GenerateFileAccessRights((byte)FileAccessRights.FREE, 0x00, 0x00, 0x00);
+ desfire.CreateFile_Standard(0x01, FileCommunication.PLAIN, accesRights, 0xF0);
+ }
+
+ [Test]
+ public void CreateFile_Standard_InvalidFID()
+ {
+ ICard card = Substitute.For();
+
+ MIFARE_DESFire desfire = new MIFARE_DESFire(card);
+
+ Assert.Throws(
+ delegate
+ {
+ desfire.CreateFile_Standard(0x21, FileCommunication.PLAIN, 0x0000, 0xF0);
+ });
+ }
+
+ [Test]
+ public void WriteData()
+ {
+ ICard card = Substitute.For();
+
+ MIFARE_DESFire desfire = new MIFARE_DESFire(card);
+
+ APDUResponse response = new APDUResponse()
+ {
+ SW1 = 0x91,
+ SW2 = 0x00
+ };
+
+ card.Transmit(Arg.Is(x => HexConverter.ConvertToHexString(x.ToArray()) == "903d00000f01000000080000546573743132333400")).Returns(response);
+
+ desfire.WriteData(0x01, 0, Encoding.ASCII.GetBytes("Test1234"));
+ }
+
+ [Test]
+ public void WriteData_Long()
+ {
+ ICard card = Substitute.For();
+
+ MIFARE_DESFire desfire = new MIFARE_DESFire(card);
+
+ APDUResponse response = new APDUResponse()
+ {
+ SW1 = 0x91,
+ SW2 = 0x00
+ };
+
+ card.Transmit(Arg.Is(x => HexConverter.ConvertToHexString(x.ToArray()) == "903d000036010000002f0000546573743132333454657374313233345465737431323334546573743132333454657374313233345465737431323300")).Returns(response);
+ card.Transmit(Arg.Is(x => HexConverter.ConvertToHexString(x.ToArray()) == "903d000036012f00002f0000345465737431323334546573743132333454657374313233345465737431323334546573743132333454657374313200")).Returns(response);
+ card.Transmit(Arg.Is(x => HexConverter.ConvertToHexString(x.ToArray()) == "903d000019015e000012000033345465737431323334546573743132333400")).Returns(response);
+
+ desfire.WriteData(0x01, 0, Encoding.ASCII.GetBytes("Test1234Test1234Test1234Test1234Test1234Test1234Test1234Test1234Test1234Test1234Test1234Test1234Test1234Test1234"));
+ }
+
+ [Test]
+ public void WriteData_InvalidFileID()
+ {
+ ICard card = Substitute.For();
+
+ MIFARE_DESFire desfire = new MIFARE_DESFire(card);
+
+ Assert.Throws(
+ delegate
+ {
+ desfire.WriteData(0x21, 0x00, Encoding.ASCII.GetBytes("Test1234"));
+ });
+ }
+
+ [Test]
+ public void ReadData()
+ {
+ ICard card = Substitute.For();
+
+ MIFARE_DESFire desfire = new MIFARE_DESFire(card);
+
+ APDUResponse response = new APDUResponse()
+ {
+ SW1 = 0x91,
+ SW2 = 0x00,
+ Body = HexConverter.ConvertFromHexString("54657374313233340000000000000000000000000000000000000000000000009100")
+ };
+
+ card.Transmit(Arg.Is(x => HexConverter.ConvertToHexString(x.ToArray()) == "90bd0000070100000020000000")).Returns(response);
+
+ byte[] data = desfire.ReadData(0x01, 0x00, 0x20);
+
+ Assert.AreEqual("Test1234", Encoding.ASCII.GetString(data).Replace("\u0000", ""));
+ }
+
+ [Test]
+ public void ReadData_CMAC()
+ {
+ ICard card = Substitute.For();
+
+ MIFARE_DESFire desfire = new MIFARE_DESFire(card);
+
+ APDUResponse response = new APDUResponse()
+ {
+ SW1 = 0x91,
+ SW2 = 0x00,
+ Body = HexConverter.ConvertFromHexString("5465737431323334000000000000000000000000000000000000000000000000809a9bedbc559a5b9100")
+ };
+
+ card.Transmit(Arg.Is(x => HexConverter.ConvertToHexString(x.ToArray()) == "90bd0000070100000020000000")).Returns(response);
+
+ byte[] data = desfire.ReadData(0x01, 0x00, 0x20);
+
+ Assert.AreEqual("Test1234", Encoding.ASCII.GetString(data).Replace("\u0000", ""));
+ }
+
+ [Test]
+ public void ReadData_Long()
+ {
+ ICard card = Substitute.For();
+
+ MIFARE_DESFire desfire = new MIFARE_DESFire(card);
+
+ APDUResponse response_1 = new APDUResponse()
+ {
+ SW1 = 0x91,
+ SW2 = 0x00,
+ Body = HexConverter.ConvertFromHexString("54657374313233340000000000000000000000000000000000000000000000000000000000000000000000000000009100")
+ };
+
+ APDUResponse response_2 = new APDUResponse()
+ {
+ SW1 = 0x91,
+ SW2 = 0x00,
+ Body = HexConverter.ConvertFromHexString("00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009100")
+ };
+
+ APDUResponse response_3 = new APDUResponse()
+ {
+ SW1 = 0x91,
+ SW2 = 0x00,
+ Body = HexConverter.ConvertFromHexString("00009100")
+ };
+
+ card.Transmit(Arg.Is(x => HexConverter.ConvertToHexString(x.ToArray()) == "90bd000007010000002f000000")).Returns(response_1);
+ card.Transmit(Arg.Is(x => HexConverter.ConvertToHexString(x.ToArray()) == "90bd000007012f00002f000000")).Returns(response_2);
+ card.Transmit(Arg.Is(x => HexConverter.ConvertToHexString(x.ToArray()) == "90bd000007015e000002000000")).Returns(response_3);
+
+ byte[] data = desfire.ReadData(0x01, 0x00, 0x60);
+
+ Assert.AreEqual("Test1234", Encoding.ASCII.GetString(data).Replace("\u0000", ""));
+ }
+
+ [Test]
+ public void ReadData_InvalidFileID()
+ {
+ ICard card = Substitute.For();
+
+ MIFARE_DESFire desfire = new MIFARE_DESFire(card);
+
+ Assert.Throws(
+ delegate
+ {
+ desfire.ReadData(0x21, 0x00, 0x20);
+ });
+ }
+ #endregion
+ }
+}
diff --git a/NFC_Test/NamespaceSetUp.cs b/NFC_Test/NamespaceSetUp.cs
new file mode 100644
index 0000000..64b4adc
--- /dev/null
+++ b/NFC_Test/NamespaceSetUp.cs
@@ -0,0 +1,34 @@
+using log4net.Config;
+using NUnit.Framework;
+
+namespace NFC_Unit_Test
+{
+ ///
+ /// Add log4net Output to Console Out
+ ///
+ [SetUpFixture]
+ public class NamespaceSetUp
+ {
+ [OneTimeSetUp]
+ public void OneTimeSetUp()
+ {
+ BasicConfigurator.Configure();
+ }
+ }
+}
+
+namespace NFC_Real_Test
+{
+ ///
+ /// Add log4net Output to Console Out
+ ///
+ [SetUpFixture]
+ public class NamespaceSetUp
+ {
+ [OneTimeSetUp]
+ public void OneTimeSetUp()
+ {
+ BasicConfigurator.Configure();
+ }
+ }
+}
diff --git a/NFC_Test/REAL_DESFireCommands.cs b/NFC_Test/REAL_DESFireCommands.cs
new file mode 100644
index 0000000..5808d54
--- /dev/null
+++ b/NFC_Test/REAL_DESFireCommands.cs
@@ -0,0 +1,477 @@
+using NFC;
+using NFC.Crypto;
+using NFC.Mifare_DESFire;
+using NFC.Mifare_DESFire.Enums;
+using NFC.Readers.PCSC;
+using NUnit.Framework;
+using System;
+using System.Text;
+
+namespace NFC_Real_Test
+{
+ ///
+ /// Test all DESFire Commands with an Empty Card
+ /// The Test are ordered to check the Commands one by one
+ ///
+ [TestFixture, Explicit]
+ public class REAL_DESFireCommands
+ {
+ ///
+ /// Set ReaderID for PCSC Interface
+ /// You can get the ID from REAL_Reader_PCSC
+ ///
+ public readonly string ReaderID = "ACS ACR122U PICC Interface 0";
+
+ #region Fixed Config Properties
+ public readonly UInt32 ApplicationID = 0xAAFFEE;
+ public readonly string ApplicationMasterKey = "25432A462D4A614E645267556B587032";
+ public readonly string ApplicationKey_1 = "25432A462D4A614E645267556B587032";
+ public readonly byte FileID = 0x01;
+ public readonly byte FileSize = 0xF0;
+ #endregion
+
+ [Test, Order(1)]
+ public void SelectApplication()
+ {
+ IHardware hardware = new PCSC_Hardware();
+ IReader reader = hardware.OpenReader(ReaderID);
+
+ bool test_successfully = false;
+
+ ReaderEventHandler handler = (sender, card) =>
+ {
+ card.Connect();
+
+ MIFARE_DESFire desfire = new MIFARE_DESFire(card);
+
+ desfire.SelectApplication(0x000000);
+
+ test_successfully = true;
+
+ card.Disconnect();
+ };
+
+ reader.CardDiscovered += handler;
+ reader.Start();
+
+ Assert.AreEqual(true, test_successfully);
+
+ reader.Stop();
+ reader.CardDiscovered -= handler;
+ }
+
+ [Test, Order(2)]
+ public void Authenticate_DES()
+ {
+ IHardware hardware = new PCSC_Hardware();
+ IReader reader = hardware.OpenReader(ReaderID);
+
+ bool test_successfully = false;
+
+ ReaderEventHandler handler = (sender, card) =>
+ {
+ card.Connect();
+
+ MIFARE_DESFire desfire = new MIFARE_DESFire(card);
+
+ desfire.SelectApplication(0x000000);
+
+ CipherKey key = new CipherKey(CipherType.TDES);
+ desfire.AuthenticateISO_DES(0x00, key._Key);
+
+ test_successfully = true;
+
+ card.Disconnect();
+ };
+
+ reader.CardDiscovered += handler;
+ reader.Start();
+
+ Assert.AreEqual(true, test_successfully);
+
+ reader.Stop();
+ reader.CardDiscovered -= handler;
+ }
+
+ [Test, Order(3)]
+ public void Format()
+ {
+ IHardware hardware = new PCSC_Hardware();
+ IReader reader = hardware.OpenReader(ReaderID);
+
+ bool test_successfully = false;
+
+ ReaderEventHandler handler = (sender, card) =>
+ {
+ card.Connect();
+
+ MIFARE_DESFire desfire = new MIFARE_DESFire(card);
+
+ desfire.SelectApplication(0x000000);
+
+ CipherKey key = new CipherKey(CipherType.TDES);
+ desfire.AuthenticateISO_DES(0x00, key._Key);
+
+ desfire.Format();
+
+ test_successfully = true;
+
+ card.Disconnect();
+ };
+
+ reader.CardDiscovered += handler;
+ reader.Start();
+
+ Assert.AreEqual(true, test_successfully);
+
+ reader.Stop();
+ reader.CardDiscovered -= handler;
+ }
+
+ [Test, Order(4)]
+ public void CreateApplication()
+ {
+ IHardware hardware = new PCSC_Hardware();
+ IReader reader = hardware.OpenReader(ReaderID);
+
+ bool test_successfully = false;
+
+ ReaderEventHandler handler = (sender, card) =>
+ {
+ card.Connect();
+
+ MIFARE_DESFire desfire = new MIFARE_DESFire(card);
+
+ desfire.SelectApplication(0x000000);
+
+ CipherKey key = new CipherKey(CipherType.TDES);
+ desfire.AuthenticateISO_DES(0x00, key._Key);
+
+ desfire.Format();
+
+ desfire.AuthenticateISO_DES(0x00, key._Key);
+
+ byte keysetting1 = desfire.GenerateKeySetting1(ChangeApplicationKey.MASTERKEY, ChangeMasterKeySettings.WITHMASTERKEY, CreateDeleteFile.ONLYMASTERKEY, FileDirectoryAccess.NOKEY, ChangeMasterKey.CHANGEABLE);
+ byte keysetting2 = desfire.GenerateKeySetting2(CryptoOperationsType.AES, FileIdentifies.NOTUSED, 2);
+
+ desfire.CreateApplication(ApplicationID, keysetting1, keysetting2);
+
+ test_successfully = true;
+
+ card.Disconnect();
+ };
+
+ reader.CardDiscovered += handler;
+ reader.Start();
+
+ Assert.AreEqual(true, test_successfully);
+
+ reader.Stop();
+ reader.CardDiscovered -= handler;
+ }
+
+ [Test, Order(5)]
+ public void Authenticate_AES()
+ {
+ IHardware hardware = new PCSC_Hardware();
+ IReader reader = hardware.OpenReader(ReaderID);
+
+ bool test_successfully = false;
+
+ ReaderEventHandler handler = (sender, card) =>
+ {
+ card.Connect();
+
+ MIFARE_DESFire desfire = new MIFARE_DESFire(card);
+
+ desfire.SelectApplication(0x000000);
+
+ CipherKey key = new CipherKey(CipherType.TDES);
+ desfire.AuthenticateISO_DES(0x00, key._Key);
+
+ desfire.Format();
+
+ desfire.AuthenticateISO_DES(0x00, key._Key);
+
+ byte keysetting1 = desfire.GenerateKeySetting1(ChangeApplicationKey.MASTERKEY, ChangeMasterKeySettings.WITHMASTERKEY, CreateDeleteFile.ONLYMASTERKEY, FileDirectoryAccess.NOKEY, ChangeMasterKey.CHANGEABLE);
+ byte keysetting2 = desfire.GenerateKeySetting2(CryptoOperationsType.AES, FileIdentifies.NOTUSED, 2);
+
+ desfire.CreateApplication(ApplicationID, keysetting1, keysetting2);
+
+ desfire.SelectApplication(ApplicationID);
+
+ CipherKey key_aes = new CipherKey(CipherType.AES);
+ desfire.AuthenticateISO_AES(0x00, key_aes._Key);
+
+ test_successfully = true;
+
+ card.Disconnect();
+ };
+
+ reader.CardDiscovered += handler;
+ reader.Start();
+
+ Assert.AreEqual(true, test_successfully);
+
+ reader.Stop();
+ reader.CardDiscovered -= handler;
+ }
+
+ [Test, Order(6)]
+ public void ChangeApplicationMasterKey()
+ {
+ IHardware hardware = new PCSC_Hardware();
+ IReader reader = hardware.OpenReader(ReaderID);
+
+ bool test_successfully = false;
+
+ ReaderEventHandler handler = (sender, card) =>
+ {
+ card.Connect();
+
+ MIFARE_DESFire desfire = new MIFARE_DESFire(card);
+
+ desfire.SelectApplication(0x000000);
+
+ CipherKey key = new CipherKey(CipherType.TDES);
+ desfire.AuthenticateISO_DES(0x00, key._Key);
+
+ desfire.Format();
+
+ desfire.AuthenticateISO_DES(0x00, key._Key);
+
+ byte keysetting1 = desfire.GenerateKeySetting1(ChangeApplicationKey.MASTERKEY, ChangeMasterKeySettings.WITHMASTERKEY, CreateDeleteFile.ONLYMASTERKEY, FileDirectoryAccess.NOKEY, ChangeMasterKey.CHANGEABLE);
+ byte keysetting2 = desfire.GenerateKeySetting2(CryptoOperationsType.AES, FileIdentifies.NOTUSED, 2);
+
+ desfire.CreateApplication(ApplicationID, keysetting1, keysetting2);
+
+ desfire.SelectApplication(ApplicationID);
+
+ CipherKey key_aes = new CipherKey(CipherType.AES);
+ desfire.AuthenticateISO_AES(0x00, key_aes._Key);
+
+ CipherKey key_aes_new = new CipherKey(ApplicationMasterKey, CipherType.AES, 0x10);
+ desfire.ChangeKey_AES(0x00, key_aes_new._Key, key_aes_new._KeyVersion);
+
+ test_successfully = true;
+
+ card.Disconnect();
+ };
+
+ reader.CardDiscovered += handler;
+ reader.Start();
+
+ Assert.AreEqual(true, test_successfully);
+
+ reader.Stop();
+ reader.CardDiscovered -= handler;
+ }
+
+ [Test, Order(7)]
+ public void ChangeApplicationKey_1()
+ {
+ IHardware hardware = new PCSC_Hardware();
+ IReader reader = hardware.OpenReader(ReaderID);
+
+ bool test_successfully = false;
+
+ ReaderEventHandler handler = (sender, card) =>
+ {
+ card.Connect();
+
+ MIFARE_DESFire desfire = new MIFARE_DESFire(card);
+
+ desfire.SelectApplication(0x000000);
+
+ CipherKey key = new CipherKey(CipherType.TDES);
+ desfire.AuthenticateISO_DES(0x00, key._Key);
+
+ desfire.Format();
+
+ desfire.AuthenticateISO_DES(0x00, key._Key);
+
+ byte keysetting1 = desfire.GenerateKeySetting1(ChangeApplicationKey.MASTERKEY, ChangeMasterKeySettings.WITHMASTERKEY, CreateDeleteFile.ONLYMASTERKEY, FileDirectoryAccess.NOKEY, ChangeMasterKey.CHANGEABLE);
+ byte keysetting2 = desfire.GenerateKeySetting2(CryptoOperationsType.AES, FileIdentifies.NOTUSED, 2);
+
+ desfire.CreateApplication(ApplicationID, keysetting1, keysetting2);
+
+ desfire.SelectApplication(ApplicationID);
+
+ CipherKey key_aes = new CipherKey(CipherType.AES);
+ desfire.AuthenticateISO_AES(0x00, key_aes._Key);
+
+ CipherKey key_new = new CipherKey(ApplicationKey_1, CipherType.AES, 0x10);
+ desfire.ChangeOtherKey_AES(0x01, key_new._Key, key_aes._Key, key_new._KeyVersion);
+
+ test_successfully = true;
+
+ card.Disconnect();
+ };
+
+ reader.CardDiscovered += handler;
+ reader.Start();
+
+ Assert.AreEqual(true, test_successfully);
+
+ reader.Stop();
+ reader.CardDiscovered -= handler;
+ }
+
+ [Test, Order(8)]
+ public void CreateFile()
+ {
+ IHardware hardware = new PCSC_Hardware();
+ IReader reader = hardware.OpenReader(ReaderID);
+
+ bool test_successfully = false;
+
+ ReaderEventHandler handler = (sender, card) =>
+ {
+ card.Connect();
+
+ MIFARE_DESFire desfire = new MIFARE_DESFire(card);
+
+ desfire.SelectApplication(0x000000);
+
+ CipherKey key = new CipherKey(CipherType.TDES);
+ desfire.AuthenticateISO_DES(0x00, key._Key);
+
+ desfire.Format();
+
+ desfire.AuthenticateISO_DES(0x00, key._Key);
+
+ byte keysetting1 = desfire.GenerateKeySetting1(ChangeApplicationKey.MASTERKEY, ChangeMasterKeySettings.WITHMASTERKEY, CreateDeleteFile.ONLYMASTERKEY, FileDirectoryAccess.NOKEY, ChangeMasterKey.CHANGEABLE);
+ byte keysetting2 = desfire.GenerateKeySetting2(CryptoOperationsType.AES, FileIdentifies.NOTUSED, 2);
+
+ desfire.CreateApplication(ApplicationID, keysetting1, keysetting2);
+
+ desfire.SelectApplication(ApplicationID);
+
+ CipherKey key_aes = new CipherKey(CipherType.AES);
+ desfire.AuthenticateISO_AES(0x00, key_aes._Key);
+
+ UInt16 accesRights = desfire.GenerateFileAccessRights((byte)FileAccessRights.FREE, 0x00, 0x00, 0x00);
+ desfire.CreateFile_Standard(FileID, FileCommunication.PLAIN, accesRights, FileSize);
+
+ test_successfully = true;
+
+ card.Disconnect();
+ };
+
+ reader.CardDiscovered += handler;
+ reader.Start();
+
+ Assert.AreEqual(true, test_successfully);
+
+ reader.Stop();
+ reader.CardDiscovered -= handler;
+ }
+
+ [Test, Order(9)]
+ public void WriteFile()
+ {
+ IHardware hardware = new PCSC_Hardware();
+ IReader reader = hardware.OpenReader(ReaderID);
+
+ bool test_successfully = false;
+
+ ReaderEventHandler handler = (sender, card) =>
+ {
+ card.Connect();
+
+ MIFARE_DESFire desfire = new MIFARE_DESFire(card);
+
+ desfire.SelectApplication(0x000000);
+
+ CipherKey key = new CipherKey(CipherType.TDES);
+ desfire.AuthenticateISO_DES(0x00, key._Key);
+
+ desfire.Format();
+
+ desfire.AuthenticateISO_DES(0x00, key._Key);
+
+ byte keysetting1 = desfire.GenerateKeySetting1(ChangeApplicationKey.MASTERKEY, ChangeMasterKeySettings.WITHMASTERKEY, CreateDeleteFile.ONLYMASTERKEY, FileDirectoryAccess.NOKEY, ChangeMasterKey.CHANGEABLE);
+ byte keysetting2 = desfire.GenerateKeySetting2(CryptoOperationsType.AES, FileIdentifies.NOTUSED, 2);
+
+ desfire.CreateApplication(ApplicationID, keysetting1, keysetting2);
+
+ desfire.SelectApplication(ApplicationID);
+
+ CipherKey key_aes = new CipherKey(CipherType.AES);
+ desfire.AuthenticateISO_AES(0x00, key_aes._Key);
+
+ UInt16 accesRights = desfire.GenerateFileAccessRights((byte)FileAccessRights.FREE, 0x00, 0x00, 0x00);
+ desfire.CreateFile_Standard(FileID, FileCommunication.PLAIN, accesRights, FileSize);
+
+ desfire.WriteData(FileID, 0, Encoding.ASCII.GetBytes("Test1234"));
+
+ test_successfully = true;
+
+ card.Disconnect();
+ };
+
+ reader.CardDiscovered += handler;
+ reader.Start();
+
+ Assert.AreEqual(true, test_successfully);
+
+ reader.Stop();
+ reader.CardDiscovered -= handler;
+ }
+
+ [Test, Order(10)]
+ public void ReadFile()
+ {
+ IHardware hardware = new PCSC_Hardware();
+ IReader reader = hardware.OpenReader(ReaderID);
+
+ bool test_successfully = false;
+
+ ReaderEventHandler handler = (sender, card) =>
+ {
+ card.Connect();
+
+ MIFARE_DESFire desfire = new MIFARE_DESFire(card);
+
+ desfire.SelectApplication(0x000000);
+
+ CipherKey key = new CipherKey(CipherType.TDES);
+ desfire.AuthenticateISO_DES(0x00, key._Key);
+
+ desfire.Format();
+
+ desfire.AuthenticateISO_DES(0x00, key._Key);
+
+ byte keysetting1 = desfire.GenerateKeySetting1(ChangeApplicationKey.MASTERKEY, ChangeMasterKeySettings.WITHMASTERKEY, CreateDeleteFile.ONLYMASTERKEY, FileDirectoryAccess.NOKEY, ChangeMasterKey.CHANGEABLE);
+ byte keysetting2 = desfire.GenerateKeySetting2(CryptoOperationsType.AES, FileIdentifies.NOTUSED, 2);
+
+ desfire.CreateApplication(ApplicationID, keysetting1, keysetting2);
+
+ desfire.SelectApplication(ApplicationID);
+
+ CipherKey key_aes = new CipherKey(CipherType.AES);
+ desfire.AuthenticateISO_AES(0x00, key_aes._Key);
+
+ UInt16 accesRights = desfire.GenerateFileAccessRights((byte)FileAccessRights.FREE, 0x00, 0x00, 0x00);
+ desfire.CreateFile_Standard(FileID, FileCommunication.PLAIN, accesRights, FileSize);
+
+ desfire.WriteData(FileID, 0, Encoding.ASCII.GetBytes("Test1234"));
+
+ byte[] data = desfire.ReadData(FileID, 0, FileSize);
+ Console.WriteLine(Encoding.ASCII.GetString(data).Replace("\u0000", ""));
+
+ test_successfully = true;
+
+ card.Disconnect();
+ };
+
+ reader.CardDiscovered += handler;
+ reader.Start();
+
+ Assert.AreEqual(true, test_successfully);
+
+ reader.Stop();
+ reader.CardDiscovered -= handler;
+ }
+ }
+}
diff --git a/NFC_Test/REAL_FabAccess_OTA.cs b/NFC_Test/REAL_FabAccess_OTA.cs
new file mode 100644
index 0000000..a17c0dc
--- /dev/null
+++ b/NFC_Test/REAL_FabAccess_OTA.cs
@@ -0,0 +1,130 @@
+using NUnit.Framework;
+using NFC;
+using NFC.Readers.PCSC;
+using NFC.Mifare_DESFire;
+using NFC.Mifare_DESFire.Enums;
+using System;
+using System.Text;
+using NFC.Crypto;
+
+namespace NFC_Real_Test
+{
+ [TestFixture, Explicit]
+ public class REAL_FabAccess_OTA
+ {
+ private string _ReaderID = "ACS ACR122U PICC Interface 0";
+ private UInt32 _FabAccess_AID = 0x2A472D;
+ private byte _FabAccess_FID = 0x01;
+ private UInt32 _FabAccess_FSize = 0xF0;
+
+ // Change of PICC Key is not implementet yet
+ // private CipherKey _FabAccess_Card_MasterKey = new CipherKey("294A404E635266556A576E5A72347537", CipherType.AES, 0x10);
+
+ private CipherKey _FabAccess_Application_MasterKey = new CipherKey("50645367566B59703273357638792F42", CipherType.AES, 0x10);
+ private CipherKey _FabAccess_Application_AuthKey = new CipherKey("6D5A7134743677397A24432646294A40", CipherType.AES, 0x10);
+
+ private string _FabAccess_UserDomain = "verrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrylooooooooooooooooooongusssssssssssssssssssssssernaaaaaaaaaaaaaaaaaaaaaaaame@fvm.fab-access.org";
+ private string _FabAccess_Domain = "fvm.fab-access.org";
+
+ private CipherKey _Default_DESKey = new CipherKey(CipherType.TDES);
+ private CipherKey _Default_AESKey = new CipherKey(CipherType.AES);
+
+ ///
+ /// Create FabAccess Application and UserData File
+ ///
+ [Test, Order(1)]
+ public void Init_EmptyCard()
+ {
+ IHardware hardware = new PCSC_Hardware();
+ IReader reader = hardware.OpenReader(_ReaderID);
+
+ bool transmit_successfully = false;
+
+ ReaderEventHandler handler = (sender, card) =>
+ {
+ card.Connect();
+
+ MIFARE_DESFire desfire = new MIFARE_DESFire(card);
+
+ desfire.SelectApplication(0x000000);
+ desfire.AuthenticateISO_DES(0x00, _Default_DESKey._Key);
+ desfire.Format();
+
+ desfire.AuthenticateISO_DES(0x00, _Default_DESKey._Key);
+
+ byte keySetting1 = desfire.GenerateKeySetting1(ChangeApplicationKey.MASTERKEY, ChangeMasterKeySettings.WITHMASTERKEY, CreateDeleteFile.ONLYMASTERKEY, FileDirectoryAccess.NOKEY, ChangeMasterKey.CHANGEABLE);
+ byte keySetting2 = desfire.GenerateKeySetting2(CryptoOperationsType.AES, FileIdentifies.NOTUSED, 0x02);
+ desfire.CreateApplication(_FabAccess_AID, keySetting1, keySetting2);
+
+ desfire.SelectApplication(_FabAccess_AID);
+ desfire.AuthenticateISO_AES(0x00, _Default_AESKey._Key);
+
+ desfire.ChangeKey_AES(0x00, _FabAccess_Application_MasterKey._Key, _FabAccess_Application_MasterKey._KeyVersion);
+
+ desfire.AuthenticateISO_AES(0x00, _FabAccess_Application_MasterKey._Key);
+ desfire.ChangeOtherKey_AES(0x01, _FabAccess_Application_AuthKey._Key, _Default_AESKey._Key, _FabAccess_Application_AuthKey._KeyVersion);
+
+ UInt16 accesRights = desfire.GenerateFileAccessRights((byte)FileAccessRights.FREE, 0x00, 0x00, 0x00);
+ desfire.CreateFile_Standard(_FabAccess_FID, FileCommunication.PLAIN, accesRights, _FabAccess_FSize);
+
+ desfire.WriteData(_FabAccess_FID, 0, Encoding.ASCII.GetBytes(_FabAccess_UserDomain));
+
+ transmit_successfully = true;
+
+ card.Disconnect();
+ };
+
+ reader.CardDiscovered += handler;
+ reader.Start();
+
+ Assert.AreEqual(true, transmit_successfully);
+
+ reader.Stop();
+ reader.CardDiscovered -= handler;
+ }
+
+ ///
+ /// Authenticate with UserData File and AuthKey
+ ///
+ [Test, Order(2)]
+ public void Authenticate()
+ {
+ IHardware hardware = new PCSC_Hardware();
+ IReader reader = hardware.OpenReader(_ReaderID);
+
+ bool transmit_successfully = false;
+
+ ReaderEventHandler handler = (sender, card) =>
+ {
+ card.Connect();
+
+ MIFARE_DESFire desfire = new MIFARE_DESFire(card);
+
+ desfire.SelectApplication(_FabAccess_AID);
+ byte[] card_data = desfire.ReadData(_FabAccess_FID, 0x00, _FabAccess_FSize);
+ string userdomain = Encoding.ASCII.GetString(card_data).Replace("\u0000", "");
+
+ string domain = userdomain.Split('@')[1];
+ if(domain != _FabAccess_Domain)
+ {
+ throw new Exception("Incorrect Domain");
+ }
+
+ desfire.SelectApplication(_FabAccess_AID);
+ desfire.AuthenticateISO_AES(0x01, _FabAccess_Application_AuthKey._Key);
+
+ transmit_successfully = true;
+
+ card.Disconnect();
+ };
+
+ reader.CardDiscovered += handler;
+ reader.Start();
+
+ Assert.AreEqual(true, transmit_successfully);
+
+ reader.Stop();
+ reader.CardDiscovered -= handler;
+ }
+ }
+}
diff --git a/NFC_Test/REAL_Reader_PCSC.cs b/NFC_Test/REAL_Reader_PCSC.cs
new file mode 100644
index 0000000..9510556
--- /dev/null
+++ b/NFC_Test/REAL_Reader_PCSC.cs
@@ -0,0 +1,62 @@
+using NFC;
+using NFC.Readers.PCSC;
+using NUnit.Framework;
+using System;
+
+namespace NFC_Real_Test
+{
+ [TestFixture, Explicit]
+ public class REAL_Reader_PCSC
+ {
+ ///
+ /// Print PCSC ReaderIDs to Console Out
+ ///
+ [Test]
+ public void GetReaders()
+ {
+ IHardware hardware = new PCSC_Hardware();
+ string[] readers = hardware.GetReaders();
+
+ Console.WriteLine("PCSC Readers detected: {0}", readers.Length);
+
+ if (readers.Length > 0)
+ {
+ Console.WriteLine("List of ReaderIDs:");
+ foreach (string readerID in readers)
+ {
+ Console.WriteLine("{0}", readerID);
+ }
+ }
+ }
+
+ ///
+ /// Connect to specific PCSC Reader by ReaderID
+ ///
+ /// ReaderID from GetReaders
+ [TestCase("ACS ACR122U PICC Interface 0")]
+ public void Connect(string readerID)
+ {
+ IHardware hardware = new PCSC_Hardware();
+ IReader reader = hardware.OpenReader(readerID);
+
+ bool connected_successfully = false;
+
+ ReaderEventHandler handler = (sender, card) =>
+ {
+ card.Connect();
+
+ connected_successfully = true;
+
+ card.Disconnect();
+ };
+
+ reader.CardDiscovered += handler;
+ reader.Start();
+
+ Assert.AreEqual(true, connected_successfully);
+
+ reader.Stop();
+ reader.CardDiscovered -= handler;
+ }
+ }
+}
diff --git a/README.md b/README.md
new file mode 100644
index 0000000..6a792c0
--- /dev/null
+++ b/README.md
@@ -0,0 +1,56 @@
+Borepin
+===
+
+# Building
+
+## On Windows
+1. Install Visual Studio 2019
+ [download Visual Studio](https://visualstudio.microsoft.com/de/)
+ * with Xamarin
+ * with UWP
+ * with .NET Desktop
+2. Install GTKSharp for Windows
+ [download GTKSharp](https://www.mono-project.com/download/stable/#download-win)
+3. Install capnproto
+
+ 3.1 If you have Chocolatey installed
+ ```shell
+ $ choco install capnproto
+ ```
+ 3.2 else you can download it from [here](https://capnproto.org/install.html) and add it to your PATH
+
+4. Clone Borepin
+ [download Borepin](https://gitlab.com/fabinfra/fabaccess/client)
+6. Load Borepin
+7. Build Borepin
+
+If Step 5. Build Borepin is failing because of GTKSharp, it could help to restart your PC.
+
+## Build GTK Project
+1. Install mono, gtk-sharp, msbuild, nuget
+ 1.1 Debian based
+ ```shell
+ $ apt install mono-complete, gtk-sharp2, nuget, capnproto
+ ```
+ 1.2 ArchLinux based
+ ```shell
+ $ pacman -S mono, mono-msbuild, gtk-sharp-2, nuget, capnproto
+ ```
+2. Clone Borepin
+ ```shell
+ $ git clone https://gitlab.com/fabinfra/fabaccess/client.git
+ ```
+
+3. Build Borepin
+ ```shell
+ $ cd client
+ $ msbuild -t:Borepin_GTK
+ ```
+4. Run Borepin
+ ```shell
+ $ mono ./Borepin/Borepin.GTK/bin/Debug/Borepin.GTK.exe
+ ```
+You can also use Rider or monodevelop as an IDE for development on Borepin
+
+## Testing
+We use [NUnit](https://nunit.org/) for testing.
diff --git a/external/SASL b/external/SASL
new file mode 160000
index 0000000..cb9a991
--- /dev/null
+++ b/external/SASL
@@ -0,0 +1 @@
+Subproject commit cb9a9919c971e00c52732fba983e82d795fbe4ad