mifare_ultralight.c 15 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416
  1. #include "mifare_ultralight.h"
  2. #include <furi.h>
  3. #define TAG "MfUltralight"
  4. bool mf_ul_check_card_type(uint8_t ATQA0, uint8_t ATQA1, uint8_t SAK) {
  5. if((ATQA0 == 0x44) && (ATQA1 == 0x00) && (SAK == 0x00)) {
  6. return true;
  7. }
  8. return false;
  9. }
  10. static void mf_ul_set_default_version(MfUltralightReader* reader, MfUltralightData* data) {
  11. data->type = MfUltralightTypeUnknown;
  12. reader->pages_to_read = 16;
  13. reader->support_fast_read = false;
  14. reader->support_tearing_flags = false;
  15. reader->support_counters = false;
  16. }
  17. bool mf_ultralight_read_version(
  18. FuriHalNfcTxRxContext* tx_rx,
  19. MfUltralightReader* reader,
  20. MfUltralightData* data) {
  21. bool version_read = false;
  22. do {
  23. FURI_LOG_D(TAG, "Reading version");
  24. tx_rx->tx_data[0] = MF_UL_GET_VERSION_CMD;
  25. tx_rx->tx_bits = 8;
  26. tx_rx->tx_rx_type = FuriHalNfcTxRxTypeDefault;
  27. if(!furi_hal_nfc_tx_rx(tx_rx, 50)) {
  28. FURI_LOG_D(TAG, "Failed reading version");
  29. mf_ul_set_default_version(reader, data);
  30. furi_hal_nfc_sleep();
  31. furi_hal_nfc_activate_nfca(300, NULL);
  32. break;
  33. }
  34. MfUltralightVersion* version = (MfUltralightVersion*)tx_rx->rx_data;
  35. data->version = *version;
  36. if(version->storage_size == 0x0B || version->storage_size == 0x00) {
  37. data->type = MfUltralightTypeUL11;
  38. reader->pages_to_read = 20;
  39. reader->support_fast_read = true;
  40. reader->support_tearing_flags = true;
  41. reader->support_counters = true;
  42. } else if(version->storage_size == 0x0E) {
  43. data->type = MfUltralightTypeUL21;
  44. reader->pages_to_read = 41;
  45. reader->support_fast_read = true;
  46. reader->support_tearing_flags = true;
  47. reader->support_counters = true;
  48. } else if(version->storage_size == 0x0F) {
  49. data->type = MfUltralightTypeNTAG213;
  50. reader->pages_to_read = 45;
  51. reader->support_fast_read = true;
  52. reader->support_tearing_flags = false;
  53. reader->support_counters = false;
  54. } else if(version->storage_size == 0x11) {
  55. data->type = MfUltralightTypeNTAG215;
  56. reader->pages_to_read = 135;
  57. reader->support_fast_read = true;
  58. reader->support_tearing_flags = false;
  59. reader->support_counters = false;
  60. } else if(version->storage_size == 0x13) {
  61. data->type = MfUltralightTypeNTAG216;
  62. reader->pages_to_read = 231;
  63. reader->support_fast_read = true;
  64. reader->support_tearing_flags = false;
  65. reader->support_counters = false;
  66. } else {
  67. mf_ul_set_default_version(reader, data);
  68. break;
  69. }
  70. version_read = true;
  71. } while(false);
  72. return version_read;
  73. }
  74. bool mf_ultralight_read_pages(
  75. FuriHalNfcTxRxContext* tx_rx,
  76. MfUltralightReader* reader,
  77. MfUltralightData* data) {
  78. uint8_t pages_read_cnt = 0;
  79. for(size_t i = 0; i < reader->pages_to_read; i += 4) {
  80. FURI_LOG_D(TAG, "Reading pages %d - %d", i, i + 3);
  81. tx_rx->tx_data[0] = MF_UL_READ_CMD;
  82. tx_rx->tx_data[1] = i;
  83. tx_rx->tx_bits = 16;
  84. tx_rx->tx_rx_type = FuriHalNfcTxRxTypeDefault;
  85. if(!furi_hal_nfc_tx_rx(tx_rx, 50)) {
  86. FURI_LOG_D(TAG, "Failed to read pages %d - %d", i, i + 3);
  87. break;
  88. }
  89. if(i + 4 <= reader->pages_to_read) {
  90. pages_read_cnt = 4;
  91. } else {
  92. pages_read_cnt = reader->pages_to_read - reader->pages_read;
  93. }
  94. reader->pages_read += pages_read_cnt;
  95. data->data_size = reader->pages_read * 4;
  96. memcpy(&data->data[i * 4], tx_rx->rx_data, pages_read_cnt * 4);
  97. }
  98. return reader->pages_read == reader->pages_to_read;
  99. }
  100. bool mf_ultralight_fast_read_pages(
  101. FuriHalNfcTxRxContext* tx_rx,
  102. MfUltralightReader* reader,
  103. MfUltralightData* data) {
  104. FURI_LOG_D(TAG, "Reading pages 0 - %d", reader->pages_to_read);
  105. tx_rx->tx_data[0] = MF_UL_FAST_READ_CMD;
  106. tx_rx->tx_data[1] = 0;
  107. tx_rx->tx_data[2] = reader->pages_to_read - 1;
  108. tx_rx->tx_bits = 24;
  109. tx_rx->tx_rx_type = FuriHalNfcTxRxTypeDefault;
  110. if(furi_hal_nfc_tx_rx(tx_rx, 50)) {
  111. reader->pages_read = reader->pages_to_read;
  112. data->data_size = reader->pages_read * 4;
  113. memcpy(data->data, tx_rx->rx_data, data->data_size);
  114. } else {
  115. FURI_LOG_D(TAG, "Failed to read pages 0 - %d", reader->pages_to_read);
  116. }
  117. return reader->pages_read == reader->pages_to_read;
  118. }
  119. bool mf_ultralight_read_signature(FuriHalNfcTxRxContext* tx_rx, MfUltralightData* data) {
  120. bool signature_read = false;
  121. FURI_LOG_D(TAG, "Reading signature");
  122. tx_rx->tx_data[0] = MF_UL_READ_SIG;
  123. tx_rx->tx_data[1] = 0;
  124. tx_rx->tx_bits = 16;
  125. tx_rx->tx_rx_type = FuriHalNfcTxRxTypeDefault;
  126. if(furi_hal_nfc_tx_rx(tx_rx, 50)) {
  127. memcpy(data->signature, tx_rx->rx_data, sizeof(data->signature));
  128. signature_read = true;
  129. } else {
  130. FURI_LOG_D(TAG, "Failed redaing signature");
  131. }
  132. return signature_read;
  133. }
  134. bool mf_ultralight_read_counters(FuriHalNfcTxRxContext* tx_rx, MfUltralightData* data) {
  135. uint8_t counter_read = 0;
  136. FURI_LOG_D(TAG, "Reading counters");
  137. for(size_t i = 0; i < 3; i++) {
  138. tx_rx->tx_data[0] = MF_UL_READ_CNT;
  139. tx_rx->rx_data[1] = i;
  140. tx_rx->tx_bits = 16;
  141. tx_rx->tx_rx_type = FuriHalNfcTxRxTypeDefault;
  142. if(!furi_hal_nfc_tx_rx(tx_rx, 50)) {
  143. FURI_LOG_D(TAG, "Failed to read %d counter", i);
  144. break;
  145. }
  146. data->counter[i] = (tx_rx->rx_data[2] << 16) | (tx_rx->rx_data[1] << 8) |
  147. tx_rx->rx_data[0];
  148. counter_read++;
  149. }
  150. return counter_read == 2;
  151. }
  152. bool mf_ultralight_read_tearing_flags(FuriHalNfcTxRxContext* tx_rx, MfUltralightData* data) {
  153. uint8_t flag_read = 0;
  154. FURI_LOG_D(TAG, "Reading tearing flags");
  155. for(size_t i = 0; i < 3; i++) {
  156. tx_rx->tx_data[0] = MF_UL_CHECK_TEARING;
  157. tx_rx->rx_data[1] = i;
  158. tx_rx->tx_bits = 16;
  159. tx_rx->tx_rx_type = FuriHalNfcTxRxTypeDefault;
  160. if(!furi_hal_nfc_tx_rx(tx_rx, 50)) {
  161. FURI_LOG_D(TAG, "Failed to read %d tearing flag", i);
  162. break;
  163. }
  164. data->tearing[i] = tx_rx->rx_data[0];
  165. flag_read++;
  166. }
  167. return flag_read == 2;
  168. }
  169. bool mf_ul_read_card(
  170. FuriHalNfcTxRxContext* tx_rx,
  171. MfUltralightReader* reader,
  172. MfUltralightData* data) {
  173. furi_assert(tx_rx);
  174. furi_assert(reader);
  175. furi_assert(data);
  176. bool card_read = false;
  177. // Read Mifare Ultralight version
  178. if(mf_ultralight_read_version(tx_rx, reader, data)) {
  179. // Read Signature
  180. mf_ultralight_read_signature(tx_rx, data);
  181. }
  182. if(reader->support_counters) {
  183. mf_ultralight_read_counters(tx_rx, data);
  184. }
  185. if(reader->support_tearing_flags) {
  186. mf_ultralight_read_tearing_flags(tx_rx, data);
  187. }
  188. card_read = mf_ultralight_read_pages(tx_rx, reader, data);
  189. return card_read;
  190. }
  191. // TODO rework
  192. static void mf_ul_protect_auth_data_on_read_command(
  193. uint8_t* tx_buff,
  194. uint8_t start_page,
  195. uint8_t end_page,
  196. MfUltralightEmulator* emulator) {
  197. if(emulator->data.type >= MfUltralightTypeNTAG213) {
  198. uint8_t pwd_page = (emulator->data.data_size / 4) - 2;
  199. uint8_t pack_page = pwd_page + 1;
  200. if((start_page <= pwd_page) && (end_page >= pwd_page)) {
  201. memset(&tx_buff[(pwd_page - start_page) * 4], 0, 4);
  202. }
  203. if((start_page <= pack_page) && (end_page >= pack_page)) {
  204. memset(&tx_buff[(pack_page - start_page) * 4], 0, 2);
  205. }
  206. }
  207. }
  208. void mf_ul_prepare_emulation(MfUltralightEmulator* emulator, MfUltralightData* data) {
  209. emulator->data = *data;
  210. emulator->auth_data = NULL;
  211. emulator->data_changed = false;
  212. emulator->comp_write_cmd_started = false;
  213. if(data->type == MfUltralightTypeUnknown) {
  214. emulator->support_fast_read = false;
  215. } else if(data->type == MfUltralightTypeUL11) {
  216. emulator->support_fast_read = true;
  217. } else if(data->type == MfUltralightTypeUL21) {
  218. emulator->support_fast_read = true;
  219. } else if(data->type == MfUltralightTypeNTAG213) {
  220. emulator->support_fast_read = true;
  221. } else if(data->type == MfUltralightTypeNTAG215) {
  222. emulator->support_fast_read = true;
  223. } else if(data->type == MfUltralightTypeNTAG216) {
  224. emulator->support_fast_read = true;
  225. }
  226. if(data->type >= MfUltralightTypeNTAG213) {
  227. uint16_t pwd_page = (data->data_size / 4) - 2;
  228. emulator->auth_data = (MfUltralightAuth*)&data->data[pwd_page * 4];
  229. }
  230. }
  231. bool mf_ul_prepare_emulation_response(
  232. uint8_t* buff_rx,
  233. uint16_t buff_rx_len,
  234. uint8_t* buff_tx,
  235. uint16_t* buff_tx_len,
  236. uint32_t* data_type,
  237. void* context) {
  238. furi_assert(context);
  239. MfUltralightEmulator* emulator = context;
  240. uint8_t cmd = buff_rx[0];
  241. uint16_t page_num = emulator->data.data_size / 4;
  242. uint16_t tx_bytes = 0;
  243. uint16_t tx_bits = 0;
  244. bool command_parsed = false;
  245. // Check composite commands
  246. if(emulator->comp_write_cmd_started) {
  247. // Compatibility write is the only one composit command
  248. if(buff_rx_len == 16) {
  249. memcpy(&emulator->data.data[emulator->comp_write_page_addr * 4], buff_rx, 4);
  250. emulator->data_changed = true;
  251. // Send ACK message
  252. buff_tx[0] = 0x0A;
  253. tx_bits = 4;
  254. *data_type = FURI_HAL_NFC_TXRX_RAW;
  255. command_parsed = true;
  256. }
  257. emulator->comp_write_cmd_started = false;
  258. } else if(cmd == MF_UL_GET_VERSION_CMD) {
  259. if(emulator->data.type != MfUltralightTypeUnknown) {
  260. tx_bytes = sizeof(emulator->data.version);
  261. memcpy(buff_tx, &emulator->data.version, tx_bytes);
  262. *data_type = FURI_HAL_NFC_TXRX_DEFAULT;
  263. command_parsed = true;
  264. }
  265. } else if(cmd == MF_UL_READ_CMD) {
  266. uint8_t start_page = buff_rx[1];
  267. if(start_page < page_num) {
  268. tx_bytes = 16;
  269. if(start_page + 4 > page_num) {
  270. // Handle roll-over mechanism
  271. uint8_t end_pages_num = page_num - start_page;
  272. memcpy(buff_tx, &emulator->data.data[start_page * 4], end_pages_num * 4);
  273. memcpy(&buff_tx[end_pages_num * 4], emulator->data.data, (4 - end_pages_num) * 4);
  274. } else {
  275. memcpy(buff_tx, &emulator->data.data[start_page * 4], tx_bytes);
  276. }
  277. mf_ul_protect_auth_data_on_read_command(
  278. buff_tx, start_page, (start_page + 4), emulator);
  279. *data_type = FURI_HAL_NFC_TXRX_DEFAULT;
  280. command_parsed = true;
  281. }
  282. } else if(cmd == MF_UL_FAST_READ_CMD) {
  283. if(emulator->support_fast_read) {
  284. uint8_t start_page = buff_rx[1];
  285. uint8_t end_page = buff_rx[2];
  286. if((start_page < page_num) && (end_page < page_num) && (start_page < (end_page + 1))) {
  287. tx_bytes = ((end_page + 1) - start_page) * 4;
  288. memcpy(buff_tx, &emulator->data.data[start_page * 4], tx_bytes);
  289. mf_ul_protect_auth_data_on_read_command(buff_tx, start_page, end_page, emulator);
  290. *data_type = FURI_HAL_NFC_TXRX_DEFAULT;
  291. command_parsed = true;
  292. }
  293. }
  294. } else if(cmd == MF_UL_WRITE) {
  295. uint8_t write_page = buff_rx[1];
  296. if((write_page > 1) && (write_page < page_num - 2)) {
  297. memcpy(&emulator->data.data[write_page * 4], &buff_rx[2], 4);
  298. emulator->data_changed = true;
  299. // ACK
  300. buff_tx[0] = 0x0A;
  301. tx_bits = 4;
  302. *data_type = FURI_HAL_NFC_TXRX_RAW;
  303. command_parsed = true;
  304. }
  305. } else if(cmd == MF_UL_COMP_WRITE) {
  306. uint8_t write_page = buff_rx[1];
  307. if((write_page > 1) && (write_page < page_num - 2)) {
  308. emulator->comp_write_cmd_started = true;
  309. emulator->comp_write_page_addr = write_page;
  310. // ACK
  311. buff_tx[0] = 0x0A;
  312. tx_bits = 4;
  313. *data_type = FURI_HAL_NFC_TXRX_RAW;
  314. command_parsed = true;
  315. }
  316. } else if(cmd == MF_UL_READ_CNT) {
  317. uint8_t cnt_num = buff_rx[1];
  318. if(cnt_num < 3) {
  319. buff_tx[0] = emulator->data.counter[cnt_num] >> 16;
  320. buff_tx[1] = emulator->data.counter[cnt_num] >> 8;
  321. buff_tx[2] = emulator->data.counter[cnt_num];
  322. tx_bytes = 3;
  323. *data_type = FURI_HAL_NFC_TXRX_DEFAULT;
  324. command_parsed = true;
  325. }
  326. } else if(cmd == MF_UL_INC_CNT) {
  327. uint8_t cnt_num = buff_rx[1];
  328. uint32_t inc = (buff_rx[2] | (buff_rx[3] << 8) | (buff_rx[4] << 16));
  329. if((cnt_num < 3) && (emulator->data.counter[cnt_num] + inc < 0x00FFFFFF)) {
  330. emulator->data.counter[cnt_num] += inc;
  331. emulator->data_changed = true;
  332. // ACK
  333. buff_tx[0] = 0x0A;
  334. tx_bits = 4;
  335. *data_type = FURI_HAL_NFC_TXRX_RAW;
  336. command_parsed = true;
  337. }
  338. } else if(cmd == MF_UL_AUTH) {
  339. if(emulator->data.type >= MfUltralightTypeNTAG213) {
  340. if(memcmp(&buff_rx[1], emulator->auth_data->pwd, 4) == 0) {
  341. buff_tx[0] = emulator->auth_data->pack.raw[0];
  342. buff_tx[1] = emulator->auth_data->pack.raw[1];
  343. tx_bytes = 2;
  344. *data_type = FURI_HAL_NFC_TXRX_DEFAULT;
  345. command_parsed = true;
  346. } else if(!emulator->auth_data->pack.value) {
  347. buff_tx[0] = 0x80;
  348. buff_tx[1] = 0x80;
  349. tx_bytes = 2;
  350. *data_type = FURI_HAL_NFC_TXRX_DEFAULT;
  351. command_parsed = true;
  352. }
  353. }
  354. } else if(cmd == MF_UL_READ_SIG) {
  355. // Check 2nd byte = 0x00 - RFU
  356. if(buff_rx[1] == 0x00) {
  357. tx_bytes = sizeof(emulator->data.signature);
  358. memcpy(buff_tx, emulator->data.signature, tx_bytes);
  359. *data_type = FURI_HAL_NFC_TXRX_DEFAULT;
  360. command_parsed = true;
  361. }
  362. } else if(cmd == MF_UL_CHECK_TEARING) {
  363. uint8_t cnt_num = buff_rx[1];
  364. if(cnt_num < 3) {
  365. buff_tx[0] = emulator->data.tearing[cnt_num];
  366. tx_bytes = 1;
  367. *data_type = FURI_HAL_NFC_TXRX_DEFAULT;
  368. command_parsed = true;
  369. }
  370. } else if(cmd == MF_UL_HALT_START) {
  371. tx_bits = 0;
  372. command_parsed = true;
  373. }
  374. if(!command_parsed) {
  375. // Send NACK
  376. buff_tx[0] = 0x00;
  377. tx_bits = 4;
  378. *data_type = FURI_HAL_NFC_TXRX_RAW;
  379. }
  380. // Return tx buffer size in bits
  381. if(tx_bytes) {
  382. tx_bits = tx_bytes * 8;
  383. }
  384. *buff_tx_len = tx_bits;
  385. return tx_bits > 0;
  386. }