|
|
@@ -0,0 +1,752 @@
|
|
|
+#include "picopass_worker_i.h"
|
|
|
+
|
|
|
+#include <flipper_format/flipper_format.h>
|
|
|
+
|
|
|
+#define TAG "PicopassWorker"
|
|
|
+
|
|
|
+static void picopass_worker_enable_field() {
|
|
|
+ furi_hal_nfc_ll_txrx_on();
|
|
|
+ furi_hal_nfc_exit_sleep();
|
|
|
+ furi_hal_nfc_ll_poll();
|
|
|
+}
|
|
|
+
|
|
|
+static ReturnCode picopass_worker_disable_field(ReturnCode rc) {
|
|
|
+ furi_hal_nfc_ll_txrx_off();
|
|
|
+ furi_hal_nfc_start_sleep();
|
|
|
+ return rc;
|
|
|
+}
|
|
|
+
|
|
|
+/***************************** Picopass Worker API *******************************/
|
|
|
+
|
|
|
+PicopassWorker* picopass_worker_alloc() {
|
|
|
+ PicopassWorker* picopass_worker = malloc(sizeof(PicopassWorker));
|
|
|
+
|
|
|
+ // Worker thread attributes
|
|
|
+ picopass_worker->thread =
|
|
|
+ furi_thread_alloc_ex("PicopassWorker", 8 * 1024, picopass_worker_task, picopass_worker);
|
|
|
+
|
|
|
+ picopass_worker->callback = NULL;
|
|
|
+ picopass_worker->context = NULL;
|
|
|
+ picopass_worker->storage = furi_record_open(RECORD_STORAGE);
|
|
|
+
|
|
|
+ picopass_worker_change_state(picopass_worker, PicopassWorkerStateReady);
|
|
|
+
|
|
|
+ return picopass_worker;
|
|
|
+}
|
|
|
+
|
|
|
+void picopass_worker_free(PicopassWorker* picopass_worker) {
|
|
|
+ furi_assert(picopass_worker);
|
|
|
+
|
|
|
+ furi_thread_free(picopass_worker->thread);
|
|
|
+
|
|
|
+ furi_record_close(RECORD_STORAGE);
|
|
|
+
|
|
|
+ free(picopass_worker);
|
|
|
+}
|
|
|
+
|
|
|
+PicopassWorkerState picopass_worker_get_state(PicopassWorker* picopass_worker) {
|
|
|
+ return picopass_worker->state;
|
|
|
+}
|
|
|
+
|
|
|
+void picopass_worker_start(
|
|
|
+ PicopassWorker* picopass_worker,
|
|
|
+ PicopassWorkerState state,
|
|
|
+ PicopassDeviceData* dev_data,
|
|
|
+ PicopassWorkerCallback callback,
|
|
|
+ void* context) {
|
|
|
+ furi_assert(picopass_worker);
|
|
|
+ furi_assert(dev_data);
|
|
|
+
|
|
|
+ picopass_worker->callback = callback;
|
|
|
+ picopass_worker->context = context;
|
|
|
+ picopass_worker->dev_data = dev_data;
|
|
|
+ picopass_worker_change_state(picopass_worker, state);
|
|
|
+ furi_thread_start(picopass_worker->thread);
|
|
|
+}
|
|
|
+
|
|
|
+void picopass_worker_stop(PicopassWorker* picopass_worker) {
|
|
|
+ furi_assert(picopass_worker);
|
|
|
+ furi_assert(picopass_worker->thread);
|
|
|
+
|
|
|
+ if(furi_thread_get_state(picopass_worker->thread) != FuriThreadStateStopped) {
|
|
|
+ picopass_worker_change_state(picopass_worker, PicopassWorkerStateStop);
|
|
|
+ furi_thread_join(picopass_worker->thread);
|
|
|
+ }
|
|
|
+}
|
|
|
+
|
|
|
+void picopass_worker_change_state(PicopassWorker* picopass_worker, PicopassWorkerState state) {
|
|
|
+ picopass_worker->state = state;
|
|
|
+}
|
|
|
+
|
|
|
+/***************************** Picopass Worker Thread *******************************/
|
|
|
+
|
|
|
+ReturnCode picopass_detect_card(int timeout) {
|
|
|
+ UNUSED(timeout);
|
|
|
+
|
|
|
+ ReturnCode err;
|
|
|
+
|
|
|
+ err = rfalPicoPassPollerInitialize();
|
|
|
+ if(err != ERR_NONE) {
|
|
|
+ FURI_LOG_E(TAG, "rfalPicoPassPollerInitialize error %d", err);
|
|
|
+ return err;
|
|
|
+ }
|
|
|
+
|
|
|
+ err = rfalFieldOnAndStartGT();
|
|
|
+ if(err != ERR_NONE) {
|
|
|
+ FURI_LOG_E(TAG, "rfalFieldOnAndStartGT error %d", err);
|
|
|
+ return err;
|
|
|
+ }
|
|
|
+
|
|
|
+ err = rfalPicoPassPollerCheckPresence();
|
|
|
+ if(err != ERR_RF_COLLISION) {
|
|
|
+ //FURI_LOG_E(TAG, "rfalPicoPassPollerCheckPresence error %d", err);
|
|
|
+ return err;
|
|
|
+ }
|
|
|
+
|
|
|
+ return ERR_NONE;
|
|
|
+}
|
|
|
+
|
|
|
+ReturnCode picopass_read_preauth(PicopassBlock* AA1) {
|
|
|
+ rfalPicoPassIdentifyRes idRes;
|
|
|
+ rfalPicoPassSelectRes selRes;
|
|
|
+
|
|
|
+ ReturnCode err;
|
|
|
+
|
|
|
+ err = rfalPicoPassPollerIdentify(&idRes);
|
|
|
+ if(err != ERR_NONE) {
|
|
|
+ FURI_LOG_E(TAG, "rfalPicoPassPollerIdentify error %d", err);
|
|
|
+ return err;
|
|
|
+ }
|
|
|
+
|
|
|
+ err = rfalPicoPassPollerSelect(idRes.CSN, &selRes);
|
|
|
+ if(err != ERR_NONE) {
|
|
|
+ FURI_LOG_E(TAG, "rfalPicoPassPollerSelect error %d", err);
|
|
|
+ return err;
|
|
|
+ }
|
|
|
+
|
|
|
+ memcpy(AA1[PICOPASS_CSN_BLOCK_INDEX].data, selRes.CSN, sizeof(selRes.CSN));
|
|
|
+ FURI_LOG_D(
|
|
|
+ TAG,
|
|
|
+ "csn %02x%02x%02x%02x%02x%02x%02x%02x",
|
|
|
+ AA1[PICOPASS_CSN_BLOCK_INDEX].data[0],
|
|
|
+ AA1[PICOPASS_CSN_BLOCK_INDEX].data[1],
|
|
|
+ AA1[PICOPASS_CSN_BLOCK_INDEX].data[2],
|
|
|
+ AA1[PICOPASS_CSN_BLOCK_INDEX].data[3],
|
|
|
+ AA1[PICOPASS_CSN_BLOCK_INDEX].data[4],
|
|
|
+ AA1[PICOPASS_CSN_BLOCK_INDEX].data[5],
|
|
|
+ AA1[PICOPASS_CSN_BLOCK_INDEX].data[6],
|
|
|
+ AA1[PICOPASS_CSN_BLOCK_INDEX].data[7]);
|
|
|
+
|
|
|
+ rfalPicoPassReadBlockRes cfg = {0};
|
|
|
+ rfalPicoPassPollerReadBlock(PICOPASS_CONFIG_BLOCK_INDEX, &cfg);
|
|
|
+ memcpy(AA1[PICOPASS_CONFIG_BLOCK_INDEX].data, cfg.data, sizeof(cfg.data));
|
|
|
+ FURI_LOG_D(
|
|
|
+ TAG,
|
|
|
+ "config %02x%02x%02x%02x%02x%02x%02x%02x",
|
|
|
+ AA1[PICOPASS_CONFIG_BLOCK_INDEX].data[0],
|
|
|
+ AA1[PICOPASS_CONFIG_BLOCK_INDEX].data[1],
|
|
|
+ AA1[PICOPASS_CONFIG_BLOCK_INDEX].data[2],
|
|
|
+ AA1[PICOPASS_CONFIG_BLOCK_INDEX].data[3],
|
|
|
+ AA1[PICOPASS_CONFIG_BLOCK_INDEX].data[4],
|
|
|
+ AA1[PICOPASS_CONFIG_BLOCK_INDEX].data[5],
|
|
|
+ AA1[PICOPASS_CONFIG_BLOCK_INDEX].data[6],
|
|
|
+ AA1[PICOPASS_CONFIG_BLOCK_INDEX].data[7]);
|
|
|
+
|
|
|
+ rfalPicoPassReadBlockRes aia;
|
|
|
+ rfalPicoPassPollerReadBlock(PICOPASS_AIA_BLOCK_INDEX, &aia);
|
|
|
+ memcpy(AA1[PICOPASS_AIA_BLOCK_INDEX].data, aia.data, sizeof(aia.data));
|
|
|
+ FURI_LOG_D(
|
|
|
+ TAG,
|
|
|
+ "aia %02x%02x%02x%02x%02x%02x%02x%02x",
|
|
|
+ AA1[PICOPASS_AIA_BLOCK_INDEX].data[0],
|
|
|
+ AA1[PICOPASS_AIA_BLOCK_INDEX].data[1],
|
|
|
+ AA1[PICOPASS_AIA_BLOCK_INDEX].data[2],
|
|
|
+ AA1[PICOPASS_AIA_BLOCK_INDEX].data[3],
|
|
|
+ AA1[PICOPASS_AIA_BLOCK_INDEX].data[4],
|
|
|
+ AA1[PICOPASS_AIA_BLOCK_INDEX].data[5],
|
|
|
+ AA1[PICOPASS_AIA_BLOCK_INDEX].data[6],
|
|
|
+ AA1[PICOPASS_AIA_BLOCK_INDEX].data[7]);
|
|
|
+
|
|
|
+ return ERR_NONE;
|
|
|
+}
|
|
|
+
|
|
|
+static ReturnCode
|
|
|
+ picopass_auth_dict(PicopassWorker* picopass_worker, IclassEliteDictType dict_type) {
|
|
|
+ rfalPicoPassReadCheckRes rcRes;
|
|
|
+ rfalPicoPassCheckRes chkRes;
|
|
|
+ bool elite = (dict_type != IclassStandardDictTypeFlipper);
|
|
|
+
|
|
|
+ PicopassDeviceData* dev_data = picopass_worker->dev_data;
|
|
|
+ PicopassBlock* AA1 = dev_data->AA1;
|
|
|
+ PicopassPacs* pacs = &dev_data->pacs;
|
|
|
+
|
|
|
+ uint8_t* csn = AA1[PICOPASS_CSN_BLOCK_INDEX].data;
|
|
|
+ uint8_t* div_key = AA1[PICOPASS_KD_BLOCK_INDEX].data;
|
|
|
+
|
|
|
+ ReturnCode err = ERR_PARAM;
|
|
|
+
|
|
|
+ uint8_t mac[4] = {0};
|
|
|
+ uint8_t ccnr[12] = {0};
|
|
|
+
|
|
|
+ size_t index = 0;
|
|
|
+ uint8_t key[PICOPASS_BLOCK_LEN] = {0};
|
|
|
+
|
|
|
+ if(!iclass_elite_dict_check_presence(dict_type)) {
|
|
|
+ FURI_LOG_E(TAG, "Dictionary not found");
|
|
|
+ return ERR_PARAM;
|
|
|
+ }
|
|
|
+
|
|
|
+ IclassEliteDict* dict = iclass_elite_dict_alloc(dict_type);
|
|
|
+ if(!dict) {
|
|
|
+ FURI_LOG_E(TAG, "Dictionary not allocated");
|
|
|
+ return ERR_PARAM;
|
|
|
+ }
|
|
|
+
|
|
|
+ FURI_LOG_D(TAG, "Loaded %lu keys", iclass_elite_dict_get_total_keys(dict));
|
|
|
+ while(iclass_elite_dict_get_next_key(dict, key)) {
|
|
|
+ FURI_LOG_D(
|
|
|
+ TAG,
|
|
|
+ "Try to %s auth with key %zu %02x%02x%02x%02x%02x%02x%02x%02x",
|
|
|
+ elite ? "elite" : "standard",
|
|
|
+ index++,
|
|
|
+ key[0],
|
|
|
+ key[1],
|
|
|
+ key[2],
|
|
|
+ key[3],
|
|
|
+ key[4],
|
|
|
+ key[5],
|
|
|
+ key[6],
|
|
|
+ key[7]);
|
|
|
+
|
|
|
+ err = rfalPicoPassPollerReadCheck(&rcRes);
|
|
|
+ if(err != ERR_NONE) {
|
|
|
+ FURI_LOG_E(TAG, "rfalPicoPassPollerReadCheck error %d", err);
|
|
|
+ break;
|
|
|
+ }
|
|
|
+ memcpy(ccnr, rcRes.CCNR, sizeof(rcRes.CCNR)); // last 4 bytes left 0
|
|
|
+
|
|
|
+ loclass_iclass_calc_div_key(csn, key, div_key, elite);
|
|
|
+ loclass_opt_doReaderMAC(ccnr, div_key, mac);
|
|
|
+
|
|
|
+ err = rfalPicoPassPollerCheck(mac, &chkRes);
|
|
|
+ if(err == ERR_NONE) {
|
|
|
+ memcpy(pacs->key, key, PICOPASS_BLOCK_LEN);
|
|
|
+ break;
|
|
|
+ }
|
|
|
+
|
|
|
+ if(picopass_worker->state != PicopassWorkerStateDetect) break;
|
|
|
+ }
|
|
|
+
|
|
|
+ iclass_elite_dict_free(dict);
|
|
|
+
|
|
|
+ return err;
|
|
|
+}
|
|
|
+
|
|
|
+ReturnCode picopass_auth(PicopassWorker* picopass_worker) {
|
|
|
+ ReturnCode err;
|
|
|
+
|
|
|
+ FURI_LOG_I(TAG, "Starting system dictionary attack [Standard KDF]");
|
|
|
+ err = picopass_auth_dict(picopass_worker, IclassStandardDictTypeFlipper);
|
|
|
+ if(err == ERR_NONE) {
|
|
|
+ return ERR_NONE;
|
|
|
+ }
|
|
|
+
|
|
|
+ FURI_LOG_I(TAG, "Starting user dictionary attack [Elite KDF]");
|
|
|
+ err = picopass_auth_dict(picopass_worker, IclassEliteDictTypeUser);
|
|
|
+ if(err == ERR_NONE) {
|
|
|
+ return ERR_NONE;
|
|
|
+ }
|
|
|
+
|
|
|
+ FURI_LOG_I(TAG, "Starting system dictionary attack [Elite KDF]");
|
|
|
+ err = picopass_auth_dict(picopass_worker, IclassEliteDictTypeFlipper);
|
|
|
+ if(err == ERR_NONE) {
|
|
|
+ return ERR_NONE;
|
|
|
+ }
|
|
|
+
|
|
|
+ return err;
|
|
|
+}
|
|
|
+
|
|
|
+ReturnCode picopass_read_card(PicopassBlock* AA1) {
|
|
|
+ ReturnCode err;
|
|
|
+
|
|
|
+ size_t app_limit = AA1[PICOPASS_CONFIG_BLOCK_INDEX].data[0] < PICOPASS_MAX_APP_LIMIT ?
|
|
|
+ AA1[PICOPASS_CONFIG_BLOCK_INDEX].data[0] :
|
|
|
+ PICOPASS_MAX_APP_LIMIT;
|
|
|
+
|
|
|
+ for(size_t i = 2; i < app_limit; i++) {
|
|
|
+ if(i == PICOPASS_KD_BLOCK_INDEX) {
|
|
|
+ // Skip over Kd block which is populated earlier (READ of Kd returns all FF's)
|
|
|
+ continue;
|
|
|
+ }
|
|
|
+
|
|
|
+ rfalPicoPassReadBlockRes block;
|
|
|
+ err = rfalPicoPassPollerReadBlock(i, &block);
|
|
|
+ if(err != ERR_NONE) {
|
|
|
+ FURI_LOG_E(TAG, "rfalPicoPassPollerReadBlock error %d", err);
|
|
|
+ return err;
|
|
|
+ }
|
|
|
+
|
|
|
+ FURI_LOG_D(
|
|
|
+ TAG,
|
|
|
+ "rfalPicoPassPollerReadBlock %d %02x%02x%02x%02x%02x%02x%02x%02x",
|
|
|
+ i,
|
|
|
+ block.data[0],
|
|
|
+ block.data[1],
|
|
|
+ block.data[2],
|
|
|
+ block.data[3],
|
|
|
+ block.data[4],
|
|
|
+ block.data[5],
|
|
|
+ block.data[6],
|
|
|
+ block.data[7]);
|
|
|
+
|
|
|
+ memcpy(AA1[i].data, block.data, sizeof(block.data));
|
|
|
+ }
|
|
|
+
|
|
|
+ return ERR_NONE;
|
|
|
+}
|
|
|
+
|
|
|
+ReturnCode picopass_write_card(PicopassBlock* AA1) {
|
|
|
+ rfalPicoPassIdentifyRes idRes;
|
|
|
+ rfalPicoPassSelectRes selRes;
|
|
|
+ rfalPicoPassReadCheckRes rcRes;
|
|
|
+ rfalPicoPassCheckRes chkRes;
|
|
|
+
|
|
|
+ ReturnCode err;
|
|
|
+
|
|
|
+ uint8_t div_key[8] = {0};
|
|
|
+ uint8_t mac[4] = {0};
|
|
|
+ uint8_t ccnr[12] = {0};
|
|
|
+
|
|
|
+ err = rfalPicoPassPollerIdentify(&idRes);
|
|
|
+ if(err != ERR_NONE) {
|
|
|
+ FURI_LOG_E(TAG, "rfalPicoPassPollerIdentify error %d", err);
|
|
|
+ return err;
|
|
|
+ }
|
|
|
+
|
|
|
+ err = rfalPicoPassPollerSelect(idRes.CSN, &selRes);
|
|
|
+ if(err != ERR_NONE) {
|
|
|
+ FURI_LOG_E(TAG, "rfalPicoPassPollerSelect error %d", err);
|
|
|
+ return err;
|
|
|
+ }
|
|
|
+
|
|
|
+ err = rfalPicoPassPollerReadCheck(&rcRes);
|
|
|
+ if(err != ERR_NONE) {
|
|
|
+ FURI_LOG_E(TAG, "rfalPicoPassPollerReadCheck error %d", err);
|
|
|
+ return err;
|
|
|
+ }
|
|
|
+ memcpy(ccnr, rcRes.CCNR, sizeof(rcRes.CCNR)); // last 4 bytes left 0
|
|
|
+
|
|
|
+ loclass_iclass_calc_div_key(selRes.CSN, (uint8_t*)picopass_iclass_key, div_key, false);
|
|
|
+ loclass_opt_doReaderMAC(ccnr, div_key, mac);
|
|
|
+
|
|
|
+ err = rfalPicoPassPollerCheck(mac, &chkRes);
|
|
|
+ if(err != ERR_NONE) {
|
|
|
+ FURI_LOG_E(TAG, "rfalPicoPassPollerCheck error %d", err);
|
|
|
+ return err;
|
|
|
+ }
|
|
|
+
|
|
|
+ for(size_t i = 6; i < 10; i++) {
|
|
|
+ FURI_LOG_D(TAG, "rfalPicoPassPollerWriteBlock %d", i);
|
|
|
+ uint8_t data[9] = {0};
|
|
|
+ data[0] = i;
|
|
|
+ memcpy(data + 1, AA1[i].data, RFAL_PICOPASS_MAX_BLOCK_LEN);
|
|
|
+ loclass_doMAC_N(data, sizeof(data), div_key, mac);
|
|
|
+ FURI_LOG_D(
|
|
|
+ TAG,
|
|
|
+ "loclass_doMAC_N %d %02x%02x%02x%02x%02x%02x%02x%02x %02x%02x%02x%02x",
|
|
|
+ i,
|
|
|
+ data[1],
|
|
|
+ data[2],
|
|
|
+ data[3],
|
|
|
+ data[4],
|
|
|
+ data[5],
|
|
|
+ data[6],
|
|
|
+ data[7],
|
|
|
+ data[8],
|
|
|
+ mac[0],
|
|
|
+ mac[1],
|
|
|
+ mac[2],
|
|
|
+ mac[3]);
|
|
|
+
|
|
|
+ err = rfalPicoPassPollerWriteBlock(i, AA1[i].data, mac);
|
|
|
+ if(err != ERR_NONE) {
|
|
|
+ FURI_LOG_E(TAG, "rfalPicoPassPollerWriteBlock error %d", err);
|
|
|
+ return err;
|
|
|
+ }
|
|
|
+ }
|
|
|
+
|
|
|
+ return ERR_NONE;
|
|
|
+}
|
|
|
+
|
|
|
+ReturnCode picopass_write_block(PicopassBlock* AA1, uint8_t blockNo, uint8_t* newBlock) {
|
|
|
+ rfalPicoPassIdentifyRes idRes;
|
|
|
+ rfalPicoPassSelectRes selRes;
|
|
|
+ rfalPicoPassReadCheckRes rcRes;
|
|
|
+ rfalPicoPassCheckRes chkRes;
|
|
|
+
|
|
|
+ ReturnCode err;
|
|
|
+
|
|
|
+ uint8_t mac[4] = {0};
|
|
|
+ uint8_t ccnr[12] = {0};
|
|
|
+
|
|
|
+ err = rfalPicoPassPollerIdentify(&idRes);
|
|
|
+ if(err != ERR_NONE) {
|
|
|
+ FURI_LOG_E(TAG, "rfalPicoPassPollerIdentify error %d", err);
|
|
|
+ return err;
|
|
|
+ }
|
|
|
+
|
|
|
+ err = rfalPicoPassPollerSelect(idRes.CSN, &selRes);
|
|
|
+ if(err != ERR_NONE) {
|
|
|
+ FURI_LOG_E(TAG, "rfalPicoPassPollerSelect error %d", err);
|
|
|
+ return err;
|
|
|
+ }
|
|
|
+
|
|
|
+ err = rfalPicoPassPollerReadCheck(&rcRes);
|
|
|
+ if(err != ERR_NONE) {
|
|
|
+ FURI_LOG_E(TAG, "rfalPicoPassPollerReadCheck error %d", err);
|
|
|
+ return err;
|
|
|
+ }
|
|
|
+ memcpy(ccnr, rcRes.CCNR, sizeof(rcRes.CCNR)); // last 4 bytes left 0
|
|
|
+
|
|
|
+ if(memcmp(selRes.CSN, AA1[PICOPASS_CSN_BLOCK_INDEX].data, PICOPASS_BLOCK_LEN) != 0) {
|
|
|
+ FURI_LOG_E(TAG, "Wrong CSN for write");
|
|
|
+ return ERR_REQUEST;
|
|
|
+ }
|
|
|
+
|
|
|
+ loclass_opt_doReaderMAC(ccnr, AA1[PICOPASS_KD_BLOCK_INDEX].data, mac);
|
|
|
+ err = rfalPicoPassPollerCheck(mac, &chkRes);
|
|
|
+ if(err != ERR_NONE) {
|
|
|
+ FURI_LOG_E(TAG, "rfalPicoPassPollerCheck error %d", err);
|
|
|
+ return err;
|
|
|
+ }
|
|
|
+
|
|
|
+ FURI_LOG_D(TAG, "rfalPicoPassPollerWriteBlock %d", blockNo);
|
|
|
+ uint8_t data[9] = {
|
|
|
+ blockNo,
|
|
|
+ newBlock[0],
|
|
|
+ newBlock[1],
|
|
|
+ newBlock[2],
|
|
|
+ newBlock[3],
|
|
|
+ newBlock[4],
|
|
|
+ newBlock[5],
|
|
|
+ newBlock[6],
|
|
|
+ newBlock[7]};
|
|
|
+ loclass_doMAC_N(data, sizeof(data), AA1[PICOPASS_KD_BLOCK_INDEX].data, mac);
|
|
|
+ FURI_LOG_D(
|
|
|
+ TAG,
|
|
|
+ "loclass_doMAC_N %d %02x%02x%02x%02x%02x%02x%02x%02x %02x%02x%02x%02x",
|
|
|
+ blockNo,
|
|
|
+ data[1],
|
|
|
+ data[2],
|
|
|
+ data[3],
|
|
|
+ data[4],
|
|
|
+ data[5],
|
|
|
+ data[6],
|
|
|
+ data[7],
|
|
|
+ data[8],
|
|
|
+ mac[0],
|
|
|
+ mac[1],
|
|
|
+ mac[2],
|
|
|
+ mac[3]);
|
|
|
+
|
|
|
+ err = rfalPicoPassPollerWriteBlock(data[0], data + 1, mac);
|
|
|
+ if(err != ERR_NONE) {
|
|
|
+ FURI_LOG_E(TAG, "rfalPicoPassPollerWriteBlock error %d", err);
|
|
|
+ return err;
|
|
|
+ }
|
|
|
+
|
|
|
+ return ERR_NONE;
|
|
|
+}
|
|
|
+
|
|
|
+void picopass_worker_elite_dict_attack(PicopassWorker* picopass_worker) {
|
|
|
+ furi_assert(picopass_worker);
|
|
|
+ furi_assert(picopass_worker->callback);
|
|
|
+
|
|
|
+ picopass_device_data_clear(picopass_worker->dev_data);
|
|
|
+ PicopassDeviceData* dev_data = picopass_worker->dev_data;
|
|
|
+ PicopassBlock* AA1 = dev_data->AA1;
|
|
|
+ PicopassPacs* pacs = &dev_data->pacs;
|
|
|
+
|
|
|
+ for(size_t i = 0; i < PICOPASS_MAX_APP_LIMIT; i++) {
|
|
|
+ memset(AA1[i].data, 0, sizeof(AA1[i].data));
|
|
|
+ }
|
|
|
+ memset(pacs, 0, sizeof(PicopassPacs));
|
|
|
+
|
|
|
+ IclassEliteDictAttackData* dict_attack_data =
|
|
|
+ &picopass_worker->dev_data->iclass_elite_dict_attack_data;
|
|
|
+ bool elite = (dict_attack_data->type != IclassStandardDictTypeFlipper);
|
|
|
+
|
|
|
+ rfalPicoPassReadCheckRes rcRes;
|
|
|
+ rfalPicoPassCheckRes chkRes;
|
|
|
+
|
|
|
+ ReturnCode err;
|
|
|
+ uint8_t mac[4] = {0};
|
|
|
+ uint8_t ccnr[12] = {0};
|
|
|
+
|
|
|
+ size_t index = 0;
|
|
|
+ uint8_t key[PICOPASS_BLOCK_LEN] = {0};
|
|
|
+
|
|
|
+ // Load dictionary
|
|
|
+ IclassEliteDict* dict = dict_attack_data->dict;
|
|
|
+ if(!dict) {
|
|
|
+ FURI_LOG_E(TAG, "Dictionary not found");
|
|
|
+ picopass_worker->callback(PicopassWorkerEventNoDictFound, picopass_worker->context);
|
|
|
+ return;
|
|
|
+ }
|
|
|
+
|
|
|
+ do {
|
|
|
+ if(picopass_detect_card(1000) == ERR_NONE) {
|
|
|
+ picopass_worker->callback(PicopassWorkerEventCardDetected, picopass_worker->context);
|
|
|
+
|
|
|
+ // Process first found device
|
|
|
+ err = picopass_read_preauth(AA1);
|
|
|
+ if(err != ERR_NONE) {
|
|
|
+ FURI_LOG_E(TAG, "picopass_read_preauth error %d", err);
|
|
|
+ picopass_worker->callback(PicopassWorkerEventAborted, picopass_worker->context);
|
|
|
+ return;
|
|
|
+ }
|
|
|
+
|
|
|
+ // Thank you proxmark!
|
|
|
+ pacs->legacy = picopass_is_memset(AA1[5].data, 0xFF, 8);
|
|
|
+ pacs->se_enabled = (memcmp(AA1[5].data, "\xff\xff\xff\x00\x06\xff\xff\xff", 8) == 0);
|
|
|
+ if(pacs->se_enabled) {
|
|
|
+ FURI_LOG_D(TAG, "SE enabled");
|
|
|
+ picopass_worker->callback(PicopassWorkerEventAborted, picopass_worker->context);
|
|
|
+ return;
|
|
|
+ }
|
|
|
+
|
|
|
+ break;
|
|
|
+ } else {
|
|
|
+ picopass_worker->callback(PicopassWorkerEventNoCardDetected, picopass_worker->context);
|
|
|
+ }
|
|
|
+ if(picopass_worker->state != PicopassWorkerStateEliteDictAttack) break;
|
|
|
+
|
|
|
+ furi_delay_ms(100);
|
|
|
+ } while(true);
|
|
|
+
|
|
|
+ FURI_LOG_D(
|
|
|
+ TAG, "Start Dictionary attack, Key Count %lu", iclass_elite_dict_get_total_keys(dict));
|
|
|
+ while(iclass_elite_dict_get_next_key(dict, key)) {
|
|
|
+ FURI_LOG_T(TAG, "Key %zu", index);
|
|
|
+ if(++index % PICOPASS_DICT_KEY_BATCH_SIZE == 0) {
|
|
|
+ picopass_worker->callback(
|
|
|
+ PicopassWorkerEventNewDictKeyBatch, picopass_worker->context);
|
|
|
+ }
|
|
|
+
|
|
|
+ err = rfalPicoPassPollerReadCheck(&rcRes);
|
|
|
+ if(err != ERR_NONE) {
|
|
|
+ FURI_LOG_E(TAG, "rfalPicoPassPollerReadCheck error %d", err);
|
|
|
+ break;
|
|
|
+ }
|
|
|
+ memcpy(ccnr, rcRes.CCNR, sizeof(rcRes.CCNR)); // last 4 bytes left 0
|
|
|
+
|
|
|
+ uint8_t* csn = AA1[PICOPASS_CSN_BLOCK_INDEX].data;
|
|
|
+ uint8_t* div_key = AA1[PICOPASS_KD_BLOCK_INDEX].data;
|
|
|
+
|
|
|
+ loclass_iclass_calc_div_key(csn, key, div_key, elite);
|
|
|
+ loclass_opt_doReaderMAC(ccnr, div_key, mac);
|
|
|
+
|
|
|
+ err = rfalPicoPassPollerCheck(mac, &chkRes);
|
|
|
+ if(err == ERR_NONE) {
|
|
|
+ FURI_LOG_I(TAG, "Found key");
|
|
|
+ memcpy(pacs->key, key, PICOPASS_BLOCK_LEN);
|
|
|
+ pacs->elite_kdf = elite;
|
|
|
+ err = picopass_read_card(AA1);
|
|
|
+ if(err != ERR_NONE) {
|
|
|
+ FURI_LOG_E(TAG, "picopass_read_card error %d", err);
|
|
|
+ picopass_worker->callback(PicopassWorkerEventFail, picopass_worker->context);
|
|
|
+ break;
|
|
|
+ }
|
|
|
+
|
|
|
+ err = picopass_device_parse_credential(AA1, pacs);
|
|
|
+ if(err != ERR_NONE) {
|
|
|
+ FURI_LOG_E(TAG, "picopass_device_parse_credential error %d", err);
|
|
|
+ picopass_worker->callback(PicopassWorkerEventFail, picopass_worker->context);
|
|
|
+ break;
|
|
|
+ }
|
|
|
+
|
|
|
+ err = picopass_device_parse_wiegand(pacs->credential, &pacs->record);
|
|
|
+ if(err != ERR_NONE) {
|
|
|
+ FURI_LOG_E(TAG, "picopass_device_parse_wiegand error %d", err);
|
|
|
+ picopass_worker->callback(PicopassWorkerEventFail, picopass_worker->context);
|
|
|
+ break;
|
|
|
+ }
|
|
|
+ picopass_worker->callback(PicopassWorkerEventAborted, picopass_worker->context);
|
|
|
+ break;
|
|
|
+ }
|
|
|
+
|
|
|
+ if(picopass_worker->state != PicopassWorkerStateEliteDictAttack) break;
|
|
|
+ }
|
|
|
+ FURI_LOG_D(TAG, "Dictionary complete");
|
|
|
+ if(picopass_worker->state == PicopassWorkerStateEliteDictAttack) {
|
|
|
+ picopass_worker->callback(PicopassWorkerEventSuccess, picopass_worker->context);
|
|
|
+ } else {
|
|
|
+ picopass_worker->callback(PicopassWorkerEventAborted, picopass_worker->context);
|
|
|
+ }
|
|
|
+}
|
|
|
+
|
|
|
+int32_t picopass_worker_task(void* context) {
|
|
|
+ PicopassWorker* picopass_worker = context;
|
|
|
+
|
|
|
+ picopass_worker_enable_field();
|
|
|
+ if(picopass_worker->state == PicopassWorkerStateDetect) {
|
|
|
+ picopass_worker_detect(picopass_worker);
|
|
|
+ } else if(picopass_worker->state == PicopassWorkerStateWrite) {
|
|
|
+ picopass_worker_write(picopass_worker);
|
|
|
+ } else if(picopass_worker->state == PicopassWorkerStateWriteKey) {
|
|
|
+ picopass_worker_write_key(picopass_worker);
|
|
|
+ } else if(picopass_worker->state == PicopassWorkerStateEliteDictAttack) {
|
|
|
+ picopass_worker_elite_dict_attack(picopass_worker);
|
|
|
+ } else if(picopass_worker->state == PicopassWorkerStateStop) {
|
|
|
+ FURI_LOG_D(TAG, "Worker state stop");
|
|
|
+ // no-op
|
|
|
+ } else {
|
|
|
+ FURI_LOG_W(TAG, "Unknown state %d", picopass_worker->state);
|
|
|
+ }
|
|
|
+ picopass_worker_disable_field(ERR_NONE);
|
|
|
+ picopass_worker_change_state(picopass_worker, PicopassWorkerStateReady);
|
|
|
+
|
|
|
+ return 0;
|
|
|
+}
|
|
|
+
|
|
|
+void picopass_worker_detect(PicopassWorker* picopass_worker) {
|
|
|
+ picopass_device_data_clear(picopass_worker->dev_data);
|
|
|
+ PicopassDeviceData* dev_data = picopass_worker->dev_data;
|
|
|
+
|
|
|
+ PicopassBlock* AA1 = dev_data->AA1;
|
|
|
+ PicopassPacs* pacs = &dev_data->pacs;
|
|
|
+ ReturnCode err;
|
|
|
+
|
|
|
+ // reset device data
|
|
|
+ for(size_t i = 0; i < PICOPASS_MAX_APP_LIMIT; i++) {
|
|
|
+ memset(AA1[i].data, 0, sizeof(AA1[i].data));
|
|
|
+ }
|
|
|
+ memset(pacs, 0, sizeof(PicopassPacs));
|
|
|
+
|
|
|
+ PicopassWorkerEvent nextState = PicopassWorkerEventSuccess;
|
|
|
+
|
|
|
+ while(picopass_worker->state == PicopassWorkerStateDetect) {
|
|
|
+ if(picopass_detect_card(1000) == ERR_NONE) {
|
|
|
+ // Process first found device
|
|
|
+ err = picopass_read_preauth(AA1);
|
|
|
+ if(err != ERR_NONE) {
|
|
|
+ FURI_LOG_E(TAG, "picopass_read_preauth error %d", err);
|
|
|
+ nextState = PicopassWorkerEventFail;
|
|
|
+ }
|
|
|
+
|
|
|
+ // Thank you proxmark!
|
|
|
+ pacs->legacy = picopass_is_memset(AA1[5].data, 0xFF, 8);
|
|
|
+ pacs->se_enabled = (memcmp(AA1[5].data, "\xff\xff\xff\x00\x06\xff\xff\xff", 8) == 0);
|
|
|
+ if(pacs->se_enabled) {
|
|
|
+ FURI_LOG_D(TAG, "SE enabled");
|
|
|
+ nextState = PicopassWorkerEventFail;
|
|
|
+ }
|
|
|
+
|
|
|
+ if(nextState == PicopassWorkerEventSuccess) {
|
|
|
+ err = picopass_auth(picopass_worker);
|
|
|
+ if(err != ERR_NONE) {
|
|
|
+ FURI_LOG_E(TAG, "picopass_try_auth error %d", err);
|
|
|
+ nextState = PicopassWorkerEventFail;
|
|
|
+ }
|
|
|
+ }
|
|
|
+
|
|
|
+ if(nextState == PicopassWorkerEventSuccess) {
|
|
|
+ err = picopass_read_card(AA1);
|
|
|
+ if(err != ERR_NONE) {
|
|
|
+ FURI_LOG_E(TAG, "picopass_read_card error %d", err);
|
|
|
+ nextState = PicopassWorkerEventFail;
|
|
|
+ }
|
|
|
+ }
|
|
|
+
|
|
|
+ if(nextState == PicopassWorkerEventSuccess) {
|
|
|
+ err = picopass_device_parse_credential(AA1, pacs);
|
|
|
+ if(err != ERR_NONE) {
|
|
|
+ FURI_LOG_E(TAG, "picopass_device_parse_credential error %d", err);
|
|
|
+ nextState = PicopassWorkerEventFail;
|
|
|
+ }
|
|
|
+ }
|
|
|
+
|
|
|
+ if(nextState == PicopassWorkerEventSuccess) {
|
|
|
+ err = picopass_device_parse_wiegand(pacs->credential, &pacs->record);
|
|
|
+ if(err != ERR_NONE) {
|
|
|
+ FURI_LOG_E(TAG, "picopass_device_parse_wiegand error %d", err);
|
|
|
+ nextState = PicopassWorkerEventFail;
|
|
|
+ }
|
|
|
+ }
|
|
|
+
|
|
|
+ // Notify caller and exit
|
|
|
+ if(picopass_worker->callback) {
|
|
|
+ picopass_worker->callback(nextState, picopass_worker->context);
|
|
|
+ }
|
|
|
+ break;
|
|
|
+ }
|
|
|
+ furi_delay_ms(100);
|
|
|
+ }
|
|
|
+}
|
|
|
+
|
|
|
+void picopass_worker_write(PicopassWorker* picopass_worker) {
|
|
|
+ PicopassDeviceData* dev_data = picopass_worker->dev_data;
|
|
|
+ PicopassBlock* AA1 = dev_data->AA1;
|
|
|
+ ReturnCode err;
|
|
|
+ PicopassWorkerEvent nextState = PicopassWorkerEventSuccess;
|
|
|
+
|
|
|
+ while(picopass_worker->state == PicopassWorkerStateWrite) {
|
|
|
+ if(picopass_detect_card(1000) == ERR_NONE) {
|
|
|
+ err = picopass_write_card(AA1);
|
|
|
+ if(err != ERR_NONE) {
|
|
|
+ FURI_LOG_E(TAG, "picopass_write_card error %d", err);
|
|
|
+ nextState = PicopassWorkerEventFail;
|
|
|
+ }
|
|
|
+
|
|
|
+ // Notify caller and exit
|
|
|
+ if(picopass_worker->callback) {
|
|
|
+ picopass_worker->callback(nextState, picopass_worker->context);
|
|
|
+ }
|
|
|
+ break;
|
|
|
+ }
|
|
|
+ furi_delay_ms(100);
|
|
|
+ }
|
|
|
+}
|
|
|
+
|
|
|
+void picopass_worker_write_key(PicopassWorker* picopass_worker) {
|
|
|
+ PicopassDeviceData* dev_data = picopass_worker->dev_data;
|
|
|
+ PicopassBlock* AA1 = dev_data->AA1;
|
|
|
+ PicopassPacs* pacs = &dev_data->pacs;
|
|
|
+ ReturnCode err;
|
|
|
+ PicopassWorkerEvent nextState = PicopassWorkerEventSuccess;
|
|
|
+
|
|
|
+ uint8_t* csn = AA1[PICOPASS_CSN_BLOCK_INDEX].data;
|
|
|
+ uint8_t* configBlock = AA1[PICOPASS_CONFIG_BLOCK_INDEX].data;
|
|
|
+ uint8_t fuses = configBlock[7];
|
|
|
+ uint8_t* oldKey = AA1[PICOPASS_KD_BLOCK_INDEX].data;
|
|
|
+
|
|
|
+ uint8_t newKey[PICOPASS_BLOCK_LEN] = {0};
|
|
|
+ loclass_iclass_calc_div_key(csn, pacs->key, newKey, pacs->elite_kdf);
|
|
|
+
|
|
|
+ if((fuses & 0x80) == 0x80) {
|
|
|
+ FURI_LOG_D(TAG, "Plain write for personalized mode key change");
|
|
|
+ } else {
|
|
|
+ FURI_LOG_D(TAG, "XOR write for application mode key change");
|
|
|
+ // XOR when in application mode
|
|
|
+ for(size_t i = 0; i < PICOPASS_BLOCK_LEN; i++) {
|
|
|
+ newKey[i] ^= oldKey[i];
|
|
|
+ }
|
|
|
+ }
|
|
|
+
|
|
|
+ while(picopass_worker->state == PicopassWorkerStateWriteKey) {
|
|
|
+ if(picopass_detect_card(1000) == ERR_NONE) {
|
|
|
+ err = picopass_write_block(AA1, PICOPASS_KD_BLOCK_INDEX, newKey);
|
|
|
+ if(err != ERR_NONE) {
|
|
|
+ FURI_LOG_E(TAG, "picopass_write_block error %d", err);
|
|
|
+ nextState = PicopassWorkerEventFail;
|
|
|
+ }
|
|
|
+
|
|
|
+ // Notify caller and exit
|
|
|
+ if(picopass_worker->callback) {
|
|
|
+ picopass_worker->callback(nextState, picopass_worker->context);
|
|
|
+ }
|
|
|
+ break;
|
|
|
+ }
|
|
|
+ furi_delay_ms(100);
|
|
|
+ }
|
|
|
+}
|