| 12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340 |
- #include "picopass_worker_i.h"
- #include <flipper_format/flipper_format.h>
- #include <lib/nfc/protocols/nfcv.h>
- #define TAG "PicopassWorker"
- #define HAS_MASK(x, b) ((x & b) == b)
- // CSNs from Proxmark3 repo
- static const uint8_t loclass_csns[LOCLASS_NUM_CSNS][RFAL_PICOPASS_BLOCK_LEN] = {
- {0x01, 0x0A, 0x0F, 0xFF, 0xF7, 0xFF, 0x12, 0xE0},
- {0x0C, 0x06, 0x0C, 0xFE, 0xF7, 0xFF, 0x12, 0xE0},
- {0x10, 0x97, 0x83, 0x7B, 0xF7, 0xFF, 0x12, 0xE0},
- {0x13, 0x97, 0x82, 0x7A, 0xF7, 0xFF, 0x12, 0xE0},
- {0x07, 0x0E, 0x0D, 0xF9, 0xF7, 0xFF, 0x12, 0xE0},
- {0x14, 0x96, 0x84, 0x76, 0xF7, 0xFF, 0x12, 0xE0},
- {0x17, 0x96, 0x85, 0x71, 0xF7, 0xFF, 0x12, 0xE0},
- {0xCE, 0xC5, 0x0F, 0x77, 0xF7, 0xFF, 0x12, 0xE0},
- {0xD2, 0x5A, 0x82, 0xF8, 0xF7, 0xFF, 0x12, 0xE0},
- };
- static void picopass_worker_enable_field() {
- furi_hal_nfc_exit_sleep();
- furi_hal_nfc_ll_txrx_on();
- furi_hal_nfc_ll_poll();
- }
- static ReturnCode picopass_worker_disable_field(ReturnCode rc) {
- furi_hal_nfc_ll_txrx_off();
- furi_hal_nfc_start_sleep();
- return rc;
- }
- /***************************** Picopass Worker API *******************************/
- PicopassWorker* picopass_worker_alloc() {
- PicopassWorker* picopass_worker = malloc(sizeof(PicopassWorker));
- // Worker thread attributes
- picopass_worker->thread =
- furi_thread_alloc_ex("PicopassWorker", 8 * 1024, picopass_worker_task, picopass_worker);
- picopass_worker->callback = NULL;
- picopass_worker->context = NULL;
- picopass_worker->storage = furi_record_open(RECORD_STORAGE);
- picopass_worker_change_state(picopass_worker, PicopassWorkerStateReady);
- return picopass_worker;
- }
- void picopass_worker_free(PicopassWorker* picopass_worker) {
- furi_assert(picopass_worker);
- furi_thread_free(picopass_worker->thread);
- furi_record_close(RECORD_STORAGE);
- free(picopass_worker);
- }
- PicopassWorkerState picopass_worker_get_state(PicopassWorker* picopass_worker) {
- return picopass_worker->state;
- }
- void picopass_worker_start(
- PicopassWorker* picopass_worker,
- PicopassWorkerState state,
- PicopassDeviceData* dev_data,
- PicopassWorkerCallback callback,
- void* context) {
- furi_assert(picopass_worker);
- furi_assert(dev_data);
- picopass_worker->callback = callback;
- picopass_worker->context = context;
- picopass_worker->dev_data = dev_data;
- picopass_worker_change_state(picopass_worker, state);
- furi_thread_start(picopass_worker->thread);
- }
- void picopass_worker_stop(PicopassWorker* picopass_worker) {
- furi_assert(picopass_worker);
- furi_assert(picopass_worker->thread);
- if(furi_thread_get_state(picopass_worker->thread) == FuriThreadStateStopped) {
- return;
- }
- if(picopass_worker->state == PicopassWorkerStateBroken ||
- picopass_worker->state == PicopassWorkerStateReady) {
- return;
- }
- if(picopass_worker->state != PicopassWorkerStateEmulate &&
- picopass_worker->state != PicopassWorkerStateLoclass) {
- // Can't do this while emulating in transparent mode as SPI isn't active
- picopass_worker_disable_field(ERR_NONE);
- }
- if(furi_thread_get_state(picopass_worker->thread) != FuriThreadStateStopped) {
- picopass_worker_change_state(picopass_worker, PicopassWorkerStateStop);
- furi_thread_join(picopass_worker->thread);
- }
- }
- void picopass_worker_change_state(PicopassWorker* picopass_worker, PicopassWorkerState state) {
- picopass_worker->state = state;
- }
- /***************************** Picopass Worker Thread *******************************/
- ReturnCode picopass_detect_card(int timeout) {
- UNUSED(timeout);
- ReturnCode err;
- err = rfalPicoPassPollerInitialize();
- if(err != ERR_NONE) {
- FURI_LOG_E(TAG, "rfalPicoPassPollerInitialize error %d", err);
- return err;
- }
- err = rfalFieldOnAndStartGT();
- if(err != ERR_NONE) {
- FURI_LOG_E(TAG, "rfalFieldOnAndStartGT error %d", err);
- return err;
- }
- err = rfalPicoPassPollerCheckPresence();
- if(err != ERR_RF_COLLISION) {
- FURI_LOG_E(TAG, "rfalPicoPassPollerCheckPresence error %d", err);
- return err;
- }
- return ERR_NONE;
- }
- ReturnCode picopass_read_preauth(PicopassBlock* AA1) {
- rfalPicoPassIdentifyRes idRes;
- rfalPicoPassSelectRes selRes;
- ReturnCode err;
- err = rfalPicoPassPollerIdentify(&idRes);
- if(err != ERR_NONE) {
- FURI_LOG_E(TAG, "rfalPicoPassPollerIdentify error %d", err);
- return err;
- }
- err = rfalPicoPassPollerSelect(idRes.CSN, &selRes);
- if(err != ERR_NONE) {
- FURI_LOG_E(TAG, "rfalPicoPassPollerSelect error %d", err);
- return err;
- }
- memcpy(AA1[PICOPASS_CSN_BLOCK_INDEX].data, selRes.CSN, sizeof(selRes.CSN));
- FURI_LOG_D(
- TAG,
- "csn %02x%02x%02x%02x%02x%02x%02x%02x",
- AA1[PICOPASS_CSN_BLOCK_INDEX].data[0],
- AA1[PICOPASS_CSN_BLOCK_INDEX].data[1],
- AA1[PICOPASS_CSN_BLOCK_INDEX].data[2],
- AA1[PICOPASS_CSN_BLOCK_INDEX].data[3],
- AA1[PICOPASS_CSN_BLOCK_INDEX].data[4],
- AA1[PICOPASS_CSN_BLOCK_INDEX].data[5],
- AA1[PICOPASS_CSN_BLOCK_INDEX].data[6],
- AA1[PICOPASS_CSN_BLOCK_INDEX].data[7]);
- rfalPicoPassReadBlockRes cfg = {0};
- rfalPicoPassPollerReadBlock(PICOPASS_CONFIG_BLOCK_INDEX, &cfg);
- memcpy(AA1[PICOPASS_CONFIG_BLOCK_INDEX].data, cfg.data, sizeof(cfg.data));
- FURI_LOG_D(
- TAG,
- "config %02x%02x%02x%02x%02x%02x%02x%02x",
- AA1[PICOPASS_CONFIG_BLOCK_INDEX].data[0],
- AA1[PICOPASS_CONFIG_BLOCK_INDEX].data[1],
- AA1[PICOPASS_CONFIG_BLOCK_INDEX].data[2],
- AA1[PICOPASS_CONFIG_BLOCK_INDEX].data[3],
- AA1[PICOPASS_CONFIG_BLOCK_INDEX].data[4],
- AA1[PICOPASS_CONFIG_BLOCK_INDEX].data[5],
- AA1[PICOPASS_CONFIG_BLOCK_INDEX].data[6],
- AA1[PICOPASS_CONFIG_BLOCK_INDEX].data[7]);
- rfalPicoPassReadBlockRes aia;
- rfalPicoPassPollerReadBlock(PICOPASS_SECURE_AIA_BLOCK_INDEX, &aia);
- memcpy(AA1[PICOPASS_SECURE_AIA_BLOCK_INDEX].data, aia.data, sizeof(aia.data));
- FURI_LOG_D(
- TAG,
- "aia %02x%02x%02x%02x%02x%02x%02x%02x",
- AA1[PICOPASS_SECURE_AIA_BLOCK_INDEX].data[0],
- AA1[PICOPASS_SECURE_AIA_BLOCK_INDEX].data[1],
- AA1[PICOPASS_SECURE_AIA_BLOCK_INDEX].data[2],
- AA1[PICOPASS_SECURE_AIA_BLOCK_INDEX].data[3],
- AA1[PICOPASS_SECURE_AIA_BLOCK_INDEX].data[4],
- AA1[PICOPASS_SECURE_AIA_BLOCK_INDEX].data[5],
- AA1[PICOPASS_SECURE_AIA_BLOCK_INDEX].data[6],
- AA1[PICOPASS_SECURE_AIA_BLOCK_INDEX].data[7]);
- return ERR_NONE;
- }
- static ReturnCode
- picopass_auth_dict(PicopassWorker* picopass_worker, IclassEliteDictType dict_type) {
- rfalPicoPassReadCheckRes rcRes;
- rfalPicoPassCheckRes chkRes;
- bool elite = (dict_type != IclassStandardDictTypeFlipper);
- PicopassDeviceData* dev_data = picopass_worker->dev_data;
- PicopassBlock* AA1 = dev_data->AA1;
- PicopassPacs* pacs = &dev_data->pacs;
- uint8_t* csn = AA1[PICOPASS_CSN_BLOCK_INDEX].data;
- uint8_t* div_key = AA1[PICOPASS_SECURE_KD_BLOCK_INDEX].data;
- ReturnCode err = ERR_PARAM;
- uint8_t mac[4] = {0};
- uint8_t ccnr[12] = {0};
- size_t index = 0;
- uint8_t key[RFAL_PICOPASS_BLOCK_LEN] = {0};
- if(!iclass_elite_dict_check_presence(dict_type)) {
- FURI_LOG_E(TAG, "Dictionary not found");
- return ERR_PARAM;
- }
- IclassEliteDict* dict = iclass_elite_dict_alloc(dict_type);
- if(!dict) {
- FURI_LOG_E(TAG, "Dictionary not allocated");
- return ERR_PARAM;
- }
- FURI_LOG_D(TAG, "Loaded %lu keys", iclass_elite_dict_get_total_keys(dict));
- while(iclass_elite_dict_get_next_key(dict, key)) {
- FURI_LOG_D(
- TAG,
- "Try to %s auth with key %zu %02x%02x%02x%02x%02x%02x%02x%02x",
- elite ? "elite" : "standard",
- index++,
- key[0],
- key[1],
- key[2],
- key[3],
- key[4],
- key[5],
- key[6],
- key[7]);
- err = rfalPicoPassPollerReadCheck(&rcRes);
- if(err != ERR_NONE) {
- FURI_LOG_E(TAG, "rfalPicoPassPollerReadCheck error %d", err);
- break;
- }
- memcpy(ccnr, rcRes.CCNR, sizeof(rcRes.CCNR)); // last 4 bytes left 0
- loclass_iclass_calc_div_key(csn, key, div_key, elite);
- loclass_opt_doReaderMAC(ccnr, div_key, mac);
- err = rfalPicoPassPollerCheck(mac, &chkRes);
- if(err == ERR_NONE) {
- memcpy(pacs->key, key, RFAL_PICOPASS_BLOCK_LEN);
- break;
- }
- if(picopass_worker->state != PicopassWorkerStateDetect) break;
- }
- iclass_elite_dict_free(dict);
- return err;
- }
- ReturnCode picopass_auth(PicopassWorker* picopass_worker) {
- ReturnCode err;
- FURI_LOG_I(TAG, "Starting system dictionary attack [Standard KDF]");
- err = picopass_auth_dict(picopass_worker, IclassStandardDictTypeFlipper);
- if(err == ERR_NONE) {
- return ERR_NONE;
- }
- /* Because size of the user dictionary and could introduce confusing delay
- * to the read screen (since there is no feedback), we omit checking it.
- * It will be checked when the user uses Elite Dict. Attack, which has a progress bar
- */
- FURI_LOG_I(TAG, "Starting system dictionary attack [Elite KDF]");
- err = picopass_auth_dict(picopass_worker, IclassEliteDictTypeFlipper);
- if(err == ERR_NONE) {
- return ERR_NONE;
- }
- return err;
- }
- ReturnCode picopass_read_card(PicopassBlock* AA1) {
- ReturnCode err;
- size_t app_limit = AA1[PICOPASS_CONFIG_BLOCK_INDEX].data[0] < PICOPASS_MAX_APP_LIMIT ?
- AA1[PICOPASS_CONFIG_BLOCK_INDEX].data[0] :
- PICOPASS_MAX_APP_LIMIT;
- for(size_t i = 2; i < app_limit; i++) {
- if(i == PICOPASS_SECURE_KD_BLOCK_INDEX) {
- // Skip over Kd block which is populated earlier (READ of Kd returns all FF's)
- continue;
- }
- rfalPicoPassReadBlockRes block;
- err = rfalPicoPassPollerReadBlock(i, &block);
- if(err != ERR_NONE) {
- FURI_LOG_E(TAG, "rfalPicoPassPollerReadBlock error %d", err);
- return err;
- }
- FURI_LOG_D(
- TAG,
- "rfalPicoPassPollerReadBlock %d %02x%02x%02x%02x%02x%02x%02x%02x",
- i,
- block.data[0],
- block.data[1],
- block.data[2],
- block.data[3],
- block.data[4],
- block.data[5],
- block.data[6],
- block.data[7]);
- memcpy(AA1[i].data, block.data, sizeof(block.data));
- }
- return ERR_NONE;
- }
- ReturnCode picopass_write_card(PicopassBlock* AA1) {
- rfalPicoPassIdentifyRes idRes;
- rfalPicoPassSelectRes selRes;
- rfalPicoPassReadCheckRes rcRes;
- rfalPicoPassCheckRes chkRes;
- ReturnCode err;
- uint8_t div_key[8] = {0};
- uint8_t mac[4] = {0};
- uint8_t ccnr[12] = {0};
- err = rfalPicoPassPollerIdentify(&idRes);
- if(err != ERR_NONE) {
- FURI_LOG_E(TAG, "rfalPicoPassPollerIdentify error %d", err);
- return err;
- }
- err = rfalPicoPassPollerSelect(idRes.CSN, &selRes);
- if(err != ERR_NONE) {
- FURI_LOG_E(TAG, "rfalPicoPassPollerSelect error %d", err);
- return err;
- }
- err = rfalPicoPassPollerReadCheck(&rcRes);
- if(err != ERR_NONE) {
- FURI_LOG_E(TAG, "rfalPicoPassPollerReadCheck error %d", err);
- return err;
- }
- memcpy(ccnr, rcRes.CCNR, sizeof(rcRes.CCNR)); // last 4 bytes left 0
- loclass_iclass_calc_div_key(selRes.CSN, (uint8_t*)picopass_iclass_key, div_key, false);
- loclass_opt_doReaderMAC(ccnr, div_key, mac);
- err = rfalPicoPassPollerCheck(mac, &chkRes);
- if(err != ERR_NONE) {
- FURI_LOG_E(TAG, "rfalPicoPassPollerCheck error %d", err);
- return err;
- }
- for(size_t i = 6; i < 10; i++) {
- FURI_LOG_D(TAG, "rfalPicoPassPollerWriteBlock %d", i);
- uint8_t data[9] = {0};
- data[0] = i;
- memcpy(data + 1, AA1[i].data, RFAL_PICOPASS_BLOCK_LEN);
- loclass_doMAC_N(data, sizeof(data), div_key, mac);
- FURI_LOG_D(
- TAG,
- "loclass_doMAC_N %d %02x%02x%02x%02x%02x%02x%02x%02x %02x%02x%02x%02x",
- i,
- data[1],
- data[2],
- data[3],
- data[4],
- data[5],
- data[6],
- data[7],
- data[8],
- mac[0],
- mac[1],
- mac[2],
- mac[3]);
- err = rfalPicoPassPollerWriteBlock(i, AA1[i].data, mac);
- if(err != ERR_NONE) {
- FURI_LOG_E(TAG, "rfalPicoPassPollerWriteBlock error %d", err);
- return err;
- }
- }
- return ERR_NONE;
- }
- ReturnCode picopass_write_block(PicopassBlock* AA1, uint8_t blockNo, uint8_t* newBlock) {
- rfalPicoPassIdentifyRes idRes;
- rfalPicoPassSelectRes selRes;
- rfalPicoPassReadCheckRes rcRes;
- rfalPicoPassCheckRes chkRes;
- ReturnCode err;
- uint8_t mac[4] = {0};
- uint8_t ccnr[12] = {0};
- err = rfalPicoPassPollerIdentify(&idRes);
- if(err != ERR_NONE) {
- FURI_LOG_E(TAG, "rfalPicoPassPollerIdentify error %d", err);
- return err;
- }
- err = rfalPicoPassPollerSelect(idRes.CSN, &selRes);
- if(err != ERR_NONE) {
- FURI_LOG_E(TAG, "rfalPicoPassPollerSelect error %d", err);
- return err;
- }
- err = rfalPicoPassPollerReadCheck(&rcRes);
- if(err != ERR_NONE) {
- FURI_LOG_E(TAG, "rfalPicoPassPollerReadCheck error %d", err);
- return err;
- }
- memcpy(ccnr, rcRes.CCNR, sizeof(rcRes.CCNR)); // last 4 bytes left 0
- if(memcmp(selRes.CSN, AA1[PICOPASS_CSN_BLOCK_INDEX].data, RFAL_PICOPASS_BLOCK_LEN) != 0) {
- FURI_LOG_E(TAG, "Wrong CSN for write");
- return ERR_REQUEST;
- }
- loclass_opt_doReaderMAC(ccnr, AA1[PICOPASS_SECURE_KD_BLOCK_INDEX].data, mac);
- err = rfalPicoPassPollerCheck(mac, &chkRes);
- if(err != ERR_NONE) {
- FURI_LOG_E(TAG, "rfalPicoPassPollerCheck error %d", err);
- return err;
- }
- FURI_LOG_D(TAG, "rfalPicoPassPollerWriteBlock %d", blockNo);
- uint8_t data[9] = {
- blockNo,
- newBlock[0],
- newBlock[1],
- newBlock[2],
- newBlock[3],
- newBlock[4],
- newBlock[5],
- newBlock[6],
- newBlock[7]};
- loclass_doMAC_N(data, sizeof(data), AA1[PICOPASS_SECURE_KD_BLOCK_INDEX].data, mac);
- FURI_LOG_D(
- TAG,
- "loclass_doMAC_N %d %02x%02x%02x%02x%02x%02x%02x%02x %02x%02x%02x%02x",
- blockNo,
- data[1],
- data[2],
- data[3],
- data[4],
- data[5],
- data[6],
- data[7],
- data[8],
- mac[0],
- mac[1],
- mac[2],
- mac[3]);
- err = rfalPicoPassPollerWriteBlock(data[0], data + 1, mac);
- if(err != ERR_NONE) {
- FURI_LOG_E(TAG, "rfalPicoPassPollerWriteBlock error %d", err);
- return err;
- }
- return ERR_NONE;
- }
- void picopass_worker_elite_dict_attack(PicopassWorker* picopass_worker) {
- furi_assert(picopass_worker);
- furi_assert(picopass_worker->callback);
- picopass_device_data_clear(picopass_worker->dev_data);
- PicopassDeviceData* dev_data = picopass_worker->dev_data;
- PicopassBlock* AA1 = dev_data->AA1;
- PicopassPacs* pacs = &dev_data->pacs;
- for(size_t i = 0; i < PICOPASS_MAX_APP_LIMIT; i++) {
- memset(AA1[i].data, 0, sizeof(AA1[i].data));
- }
- memset(pacs, 0, sizeof(PicopassPacs));
- IclassEliteDictAttackData* dict_attack_data =
- &picopass_worker->dev_data->iclass_elite_dict_attack_data;
- bool elite = (dict_attack_data->type != IclassStandardDictTypeFlipper);
- rfalPicoPassReadCheckRes rcRes;
- rfalPicoPassCheckRes chkRes;
- ReturnCode err;
- uint8_t mac[4] = {0};
- uint8_t ccnr[12] = {0};
- size_t index = 0;
- uint8_t key[RFAL_PICOPASS_BLOCK_LEN] = {0};
- // Load dictionary
- IclassEliteDict* dict = dict_attack_data->dict;
- if(!dict) {
- FURI_LOG_E(TAG, "Dictionary not found");
- picopass_worker->callback(PicopassWorkerEventNoDictFound, picopass_worker->context);
- return;
- }
- do {
- if(picopass_detect_card(1000) == ERR_NONE) {
- picopass_worker->callback(PicopassWorkerEventCardDetected, picopass_worker->context);
- // Process first found device
- err = picopass_read_preauth(AA1);
- if(err != ERR_NONE) {
- FURI_LOG_E(TAG, "picopass_read_preauth error %d", err);
- picopass_worker->callback(PicopassWorkerEventAborted, picopass_worker->context);
- return;
- }
- // Thank you proxmark!
- pacs->legacy = picopass_is_memset(AA1[5].data, 0xFF, 8);
- pacs->se_enabled = (memcmp(AA1[5].data, "\xff\xff\xff\x00\x06\xff\xff\xff", 8) == 0);
- if(pacs->se_enabled) {
- FURI_LOG_D(TAG, "SE enabled");
- picopass_worker->callback(PicopassWorkerEventAborted, picopass_worker->context);
- return;
- }
- break;
- } else {
- picopass_worker->callback(PicopassWorkerEventNoCardDetected, picopass_worker->context);
- }
- if(picopass_worker->state != PicopassWorkerStateEliteDictAttack) break;
- furi_delay_ms(100);
- } while(true);
- FURI_LOG_D(
- TAG, "Start Dictionary attack, Key Count %lu", iclass_elite_dict_get_total_keys(dict));
- while(iclass_elite_dict_get_next_key(dict, key)) {
- FURI_LOG_T(TAG, "Key %zu", index);
- if(++index % PICOPASS_DICT_KEY_BATCH_SIZE == 0) {
- picopass_worker->callback(
- PicopassWorkerEventNewDictKeyBatch, picopass_worker->context);
- }
- err = rfalPicoPassPollerReadCheck(&rcRes);
- if(err != ERR_NONE) {
- FURI_LOG_E(TAG, "rfalPicoPassPollerReadCheck error %d", err);
- break;
- }
- memcpy(ccnr, rcRes.CCNR, sizeof(rcRes.CCNR)); // last 4 bytes left 0
- uint8_t* csn = AA1[PICOPASS_CSN_BLOCK_INDEX].data;
- uint8_t* div_key = AA1[PICOPASS_SECURE_KD_BLOCK_INDEX].data;
- loclass_iclass_calc_div_key(csn, key, div_key, elite);
- loclass_opt_doReaderMAC(ccnr, div_key, mac);
- err = rfalPicoPassPollerCheck(mac, &chkRes);
- if(err == ERR_NONE) {
- FURI_LOG_I(
- TAG,
- "Found key: %02x%02x%02x%02x%02x%02x%02x%02x",
- key[0],
- key[1],
- key[2],
- key[3],
- key[4],
- key[5],
- key[6],
- key[7]);
- memcpy(pacs->key, key, RFAL_PICOPASS_BLOCK_LEN);
- pacs->elite_kdf = elite;
- err = picopass_read_card(AA1);
- if(err != ERR_NONE) {
- FURI_LOG_E(TAG, "picopass_read_card error %d", err);
- picopass_worker->callback(PicopassWorkerEventFail, picopass_worker->context);
- break;
- }
- err = picopass_device_parse_credential(AA1, pacs);
- if(err != ERR_NONE) {
- FURI_LOG_E(TAG, "picopass_device_parse_credential error %d", err);
- picopass_worker->callback(PicopassWorkerEventFail, picopass_worker->context);
- break;
- }
- err = picopass_device_parse_wiegand(pacs->credential, pacs);
- if(err != ERR_NONE) {
- FURI_LOG_E(TAG, "picopass_device_parse_wiegand error %d", err);
- picopass_worker->callback(PicopassWorkerEventFail, picopass_worker->context);
- break;
- }
- picopass_worker->callback(PicopassWorkerEventAborted, picopass_worker->context);
- break;
- }
- if(picopass_worker->state != PicopassWorkerStateEliteDictAttack) break;
- }
- FURI_LOG_D(TAG, "Dictionary complete");
- if(picopass_worker->state == PicopassWorkerStateEliteDictAttack) {
- picopass_worker->callback(PicopassWorkerEventSuccess, picopass_worker->context);
- } else {
- picopass_worker->callback(PicopassWorkerEventAborted, picopass_worker->context);
- }
- }
- int32_t picopass_worker_task(void* context) {
- PicopassWorker* picopass_worker = context;
- if(picopass_worker->state == PicopassWorkerStateDetect) {
- picopass_worker_enable_field();
- picopass_worker_detect(picopass_worker);
- } else if(picopass_worker->state == PicopassWorkerStateWrite) {
- picopass_worker_enable_field();
- picopass_worker_write(picopass_worker);
- } else if(picopass_worker->state == PicopassWorkerStateWriteKey) {
- picopass_worker_enable_field();
- picopass_worker_write_key(picopass_worker);
- } else if(picopass_worker->state == PicopassWorkerStateEliteDictAttack) {
- picopass_worker_enable_field();
- picopass_worker_elite_dict_attack(picopass_worker);
- } else if(picopass_worker->state == PicopassWorkerStateEmulate) {
- picopass_worker_emulate(picopass_worker, false);
- } else if(picopass_worker->state == PicopassWorkerStateLoclass) {
- picopass_worker_emulate(picopass_worker, true);
- } else if(picopass_worker->state == PicopassWorkerStateStop) {
- FURI_LOG_D(TAG, "Worker state stop");
- // no-op
- } else {
- FURI_LOG_W(TAG, "Unknown state %d", picopass_worker->state);
- }
- picopass_worker_disable_field(ERR_NONE);
- picopass_worker_change_state(picopass_worker, PicopassWorkerStateReady);
- return 0;
- }
- void picopass_worker_detect(PicopassWorker* picopass_worker) {
- picopass_device_data_clear(picopass_worker->dev_data);
- PicopassDeviceData* dev_data = picopass_worker->dev_data;
- PicopassBlock* AA1 = dev_data->AA1;
- PicopassPacs* pacs = &dev_data->pacs;
- ReturnCode err;
- // reset device data
- for(size_t i = 0; i < PICOPASS_MAX_APP_LIMIT; i++) {
- memset(AA1[i].data, 0, sizeof(AA1[i].data));
- }
- memset(pacs, 0, sizeof(PicopassPacs));
- PicopassWorkerEvent nextState = PicopassWorkerEventSuccess;
- while(picopass_worker->state == PicopassWorkerStateDetect) {
- if(picopass_detect_card(1000) == ERR_NONE) {
- // Process first found device
- err = picopass_read_preauth(AA1);
- if(err != ERR_NONE) {
- FURI_LOG_E(TAG, "picopass_read_preauth error %d", err);
- nextState = PicopassWorkerEventFail;
- }
- // Thank you proxmark!
- pacs->legacy = picopass_is_memset(AA1[5].data, 0xFF, 8);
- pacs->se_enabled = (memcmp(AA1[5].data, "\xff\xff\xff\x00\x06\xff\xff\xff", 8) == 0);
- if(pacs->se_enabled) {
- FURI_LOG_D(TAG, "SE enabled");
- nextState = PicopassWorkerEventFail;
- }
- if(nextState == PicopassWorkerEventSuccess) {
- err = picopass_auth(picopass_worker);
- if(err != ERR_NONE) {
- FURI_LOG_E(TAG, "picopass_try_auth error %d", err);
- nextState = PicopassWorkerEventFail;
- }
- }
- if(nextState == PicopassWorkerEventSuccess) {
- err = picopass_read_card(AA1);
- if(err != ERR_NONE) {
- FURI_LOG_E(TAG, "picopass_read_card error %d", err);
- nextState = PicopassWorkerEventFail;
- }
- }
- if(nextState == PicopassWorkerEventSuccess) {
- err = picopass_device_parse_credential(AA1, pacs);
- if(err != ERR_NONE) {
- FURI_LOG_E(TAG, "picopass_device_parse_credential error %d", err);
- nextState = PicopassWorkerEventFail;
- }
- }
- if(nextState == PicopassWorkerEventSuccess) {
- err = picopass_device_parse_wiegand(pacs->credential, pacs);
- if(err != ERR_NONE) {
- FURI_LOG_E(TAG, "picopass_device_parse_wiegand error %d", err);
- nextState = PicopassWorkerEventFail;
- }
- }
- // Notify caller and exit
- if(picopass_worker->callback) {
- picopass_worker->callback(nextState, picopass_worker->context);
- }
- break;
- }
- furi_delay_ms(100);
- }
- }
- void picopass_worker_write(PicopassWorker* picopass_worker) {
- PicopassDeviceData* dev_data = picopass_worker->dev_data;
- PicopassBlock* AA1 = dev_data->AA1;
- ReturnCode err;
- PicopassWorkerEvent nextState = PicopassWorkerEventSuccess;
- while(picopass_worker->state == PicopassWorkerStateWrite) {
- if(picopass_detect_card(1000) == ERR_NONE) {
- err = picopass_write_card(AA1);
- if(err != ERR_NONE) {
- FURI_LOG_E(TAG, "picopass_write_card error %d", err);
- nextState = PicopassWorkerEventFail;
- }
- // Notify caller and exit
- if(picopass_worker->callback) {
- picopass_worker->callback(nextState, picopass_worker->context);
- }
- break;
- }
- furi_delay_ms(100);
- }
- }
- void picopass_worker_write_key(PicopassWorker* picopass_worker) {
- PicopassDeviceData* dev_data = picopass_worker->dev_data;
- PicopassBlock* AA1 = dev_data->AA1;
- PicopassPacs* pacs = &dev_data->pacs;
- ReturnCode err;
- PicopassWorkerEvent nextState = PicopassWorkerEventSuccess;
- uint8_t* csn = AA1[PICOPASS_CSN_BLOCK_INDEX].data;
- uint8_t* configBlock = AA1[PICOPASS_CONFIG_BLOCK_INDEX].data;
- uint8_t fuses = configBlock[7];
- uint8_t* oldKey = AA1[PICOPASS_SECURE_KD_BLOCK_INDEX].data;
- uint8_t newKey[RFAL_PICOPASS_BLOCK_LEN] = {0};
- loclass_iclass_calc_div_key(csn, pacs->key, newKey, pacs->elite_kdf);
- if((fuses & 0x80) == 0x80) {
- FURI_LOG_D(TAG, "Plain write for personalized mode key change");
- } else {
- FURI_LOG_D(TAG, "XOR write for application mode key change");
- // XOR when in application mode
- for(size_t i = 0; i < RFAL_PICOPASS_BLOCK_LEN; i++) {
- newKey[i] ^= oldKey[i];
- }
- }
- while(picopass_worker->state == PicopassWorkerStateWriteKey) {
- if(picopass_detect_card(1000) == ERR_NONE) {
- err = picopass_write_block(AA1, PICOPASS_SECURE_KD_BLOCK_INDEX, newKey);
- if(err != ERR_NONE) {
- FURI_LOG_E(TAG, "picopass_write_block error %d", err);
- nextState = PicopassWorkerEventFail;
- }
- // Notify caller and exit
- if(picopass_worker->callback) {
- picopass_worker->callback(nextState, picopass_worker->context);
- }
- break;
- }
- furi_delay_ms(100);
- }
- }
- // from proxmark3 armsrc/iclass.c rotateCSN
- static void picopass_anticoll_csn(uint8_t* rotated_csn, const uint8_t* original_csn) {
- for(uint8_t i = 0; i < 8; i++) {
- rotated_csn[i] = (original_csn[i] >> 3) | (original_csn[(i + 1) % 8] << 5);
- }
- }
- static void picopass_append_crc(uint8_t* buf, uint16_t size) {
- uint16_t crc = rfalPicoPassCalculateCcitt(0xE012, buf, size);
- buf[size] = crc & 0xFF;
- buf[size + 1] = crc >> 8;
- }
- static inline void picopass_emu_read_blocks(
- NfcVData* nfcv_data,
- uint8_t* buf,
- uint8_t block_num,
- uint8_t block_count) {
- memcpy(
- buf,
- nfcv_data->data + (block_num * RFAL_PICOPASS_BLOCK_LEN),
- block_count * RFAL_PICOPASS_BLOCK_LEN);
- }
- static inline void picopass_emu_write_blocks(
- NfcVData* nfcv_data,
- const uint8_t* buf,
- uint8_t block_num,
- uint8_t block_count) {
- memcpy(
- nfcv_data->data + (block_num * RFAL_PICOPASS_BLOCK_LEN),
- buf,
- block_count * RFAL_PICOPASS_BLOCK_LEN);
- }
- static void picopass_init_cipher_state_key(
- NfcVData* nfcv_data,
- PicopassEmulatorCtx* ctx,
- const uint8_t key[RFAL_PICOPASS_BLOCK_LEN]) {
- uint8_t cc[RFAL_PICOPASS_BLOCK_LEN];
- picopass_emu_read_blocks(nfcv_data, cc, PICOPASS_SECURE_EPURSE_BLOCK_INDEX, 1);
- ctx->cipher_state = loclass_opt_doTagMAC_1(cc, key);
- }
- static void picopass_init_cipher_state(NfcVData* nfcv_data, PicopassEmulatorCtx* ctx) {
- uint8_t key[RFAL_PICOPASS_BLOCK_LEN];
- picopass_emu_read_blocks(nfcv_data, key, ctx->key_block_num, 1);
- picopass_init_cipher_state_key(nfcv_data, ctx, key);
- }
- static void
- loclass_update_csn(FuriHalNfcDevData* nfc_data, NfcVData* nfcv_data, PicopassEmulatorCtx* ctx) {
- // collect LOCLASS_NUM_PER_CSN nonces in a row for each CSN
- const uint8_t* csn =
- loclass_csns[(ctx->key_block_num / LOCLASS_NUM_PER_CSN) % LOCLASS_NUM_CSNS];
- memcpy(nfc_data->uid, csn, RFAL_PICOPASS_BLOCK_LEN);
- picopass_emu_write_blocks(nfcv_data, csn, PICOPASS_CSN_BLOCK_INDEX, 1);
- uint8_t key[RFAL_PICOPASS_BLOCK_LEN];
- loclass_iclass_calc_div_key(csn, picopass_iclass_key, key, false);
- picopass_emu_write_blocks(nfcv_data, key, PICOPASS_SECURE_KD_BLOCK_INDEX, 1);
- picopass_init_cipher_state_key(nfcv_data, ctx, key);
- }
- static void picopass_emu_handle_packet(
- FuriHalNfcTxRxContext* tx_rx,
- FuriHalNfcDevData* nfc_data,
- void* nfcv_data_in) {
- NfcVData* nfcv_data = (NfcVData*)nfcv_data_in;
- PicopassEmulatorCtx* ctx = nfcv_data->emu_protocol_ctx;
- uint8_t response[34];
- uint8_t response_length = 0;
- uint8_t key_block_num = PICOPASS_SECURE_KD_BLOCK_INDEX;
- const uint8_t block_ff[8] = {0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF};
- if(nfcv_data->frame_length < 1 || ctx->state == PicopassEmulatorStateStopEmulation) {
- return;
- }
- switch(nfcv_data->frame[0]) {
- case RFAL_PICOPASS_CMD_ACTALL: // No args
- if(nfcv_data->frame_length != 1) {
- return;
- }
- if(ctx->state != PicopassEmulatorStateHalt) {
- ctx->state = PicopassEmulatorStateActive;
- }
- // Send SOF only
- break;
- case RFAL_PICOPASS_CMD_ACT: // No args
- if(nfcv_data->frame_length != 1 || ctx->state != PicopassEmulatorStateActive) {
- return;
- }
- // Send SOF only
- break;
- case RFAL_PICOPASS_CMD_HALT: // No args
- if(nfcv_data->frame_length != 1 || ctx->state != PicopassEmulatorStateSelected) {
- return;
- }
- // Technically we should go to StateHalt, but since we can't detect the field dropping we drop to idle instead
- ctx->state = PicopassEmulatorStateIdle;
- // Send SOF only
- break;
- case RFAL_PICOPASS_CMD_READ_OR_IDENTIFY:
- if(nfcv_data->frame_length == 1 &&
- ctx->state == PicopassEmulatorStateActive) { // PICOPASS_CMD_IDENTIFY
- // ASNB(8) CRC16(2)
- picopass_anticoll_csn(response, nfc_data->uid);
- picopass_append_crc(response, RFAL_PICOPASS_BLOCK_LEN);
- response_length = RFAL_PICOPASS_BLOCK_LEN + 2;
- break;
- } else if(
- nfcv_data->frame_length == 4 &&
- ctx->state == PicopassEmulatorStateSelected) { // PICOPASS_CMD_READ ADDRESS(1) CRC16(2)
- if(nfcv_data->frame[1] >= PICOPASS_MAX_APP_LIMIT) {
- return;
- }
- // TODO: Check CRC?
- // TODO: Check auth?
- // DATA(8) CRC16(2)
- if(nfcv_data->frame[1] == PICOPASS_SECURE_KD_BLOCK_INDEX ||
- nfcv_data->frame[1] == PICOPASS_SECURE_KC_BLOCK_INDEX) {
- // Reading Kd or Kc blocks always returns FF's
- memcpy(response, block_ff, RFAL_PICOPASS_BLOCK_LEN);
- } else {
- picopass_emu_read_blocks(nfcv_data, response, nfcv_data->frame[1], 1);
- }
- picopass_append_crc(response, RFAL_PICOPASS_BLOCK_LEN);
- response_length = RFAL_PICOPASS_BLOCK_LEN + 2;
- break;
- }
- return;
- case RFAL_PICOPASS_CMD_READ4: // ADDRESS(1) CRC16(2)
- if(nfcv_data->frame_length != 4 || ctx->state != PicopassEmulatorStateSelected ||
- nfcv_data->frame[1] + 4 >= PICOPASS_MAX_APP_LIMIT) {
- return;
- }
- // TODO: Check CRC?
- // TODO: Check auth?
- uint8_t blockNum = nfcv_data->frame[1];
- // DATA(32) CRC16(2)
- picopass_emu_read_blocks(nfcv_data, response, blockNum, 4);
- if(blockNum == 4) {
- // Kc is block 4, so just redact first block of response
- memcpy(response, block_ff, RFAL_PICOPASS_BLOCK_LEN);
- } else if(blockNum < 4) {
- // Kd is block 3
- uint8_t* kdOffset = response + ((3 - blockNum) * RFAL_PICOPASS_BLOCK_LEN);
- memcpy(kdOffset, block_ff, RFAL_PICOPASS_BLOCK_LEN);
- if(blockNum != 0) {
- // Redact Kc
- memcpy(kdOffset + RFAL_PICOPASS_BLOCK_LEN, block_ff, RFAL_PICOPASS_BLOCK_LEN);
- }
- }
- picopass_append_crc(response, RFAL_PICOPASS_BLOCK_LEN * 4);
- response_length = (RFAL_PICOPASS_BLOCK_LEN * 4) + 2;
- break;
- case RFAL_PICOPASS_CMD_SELECT: // ASNB(8)|SERIALNB(8)
- if(nfcv_data->frame_length != 9) {
- return;
- }
- uint8_t select_csn[RFAL_PICOPASS_BLOCK_LEN];
- if(ctx->state == PicopassEmulatorStateHalt || ctx->state == PicopassEmulatorStateIdle) {
- memcpy(select_csn, nfc_data->uid, RFAL_PICOPASS_BLOCK_LEN);
- } else {
- picopass_anticoll_csn(select_csn, nfc_data->uid);
- }
- if(memcmp(nfcv_data->frame + 1, select_csn, RFAL_PICOPASS_BLOCK_LEN)) {
- if(ctx->state == PicopassEmulatorStateActive) {
- ctx->state = PicopassEmulatorStateIdle;
- } else if(ctx->state == PicopassEmulatorStateSelected) {
- // Technically we should go to StateHalt, but since we can't detect the field dropping we drop to idle instead
- ctx->state = PicopassEmulatorStateIdle;
- }
- return;
- }
- ctx->state = PicopassEmulatorStateSelected;
- // SERIALNB(8) CRC16(2)
- memcpy(response, nfc_data->uid, RFAL_PICOPASS_BLOCK_LEN);
- picopass_append_crc(response, RFAL_PICOPASS_BLOCK_LEN);
- response_length = RFAL_PICOPASS_BLOCK_LEN + 2;
- break;
- case RFAL_PICOPASS_CMD_READCHECK_KC: // ADDRESS(1)
- key_block_num = PICOPASS_SECURE_KC_BLOCK_INDEX;
- // fallthrough
- case RFAL_PICOPASS_CMD_READCHECK_KD: // ADDRESS(1)
- if(nfcv_data->frame_length != 2 ||
- nfcv_data->frame[1] != PICOPASS_SECURE_EPURSE_BLOCK_INDEX ||
- ctx->state != PicopassEmulatorStateSelected) {
- return;
- }
- // loclass mode doesn't do any card side crypto, just logs the readers crypto, so no-op in this mode
- // we can also no-op if the key block is the same, CHECK re-inits if it failed already
- if(ctx->key_block_num != key_block_num && !ctx->loclass_mode) {
- ctx->key_block_num = key_block_num;
- picopass_init_cipher_state(nfcv_data, ctx);
- }
- // DATA(8)
- picopass_emu_read_blocks(nfcv_data, response, nfcv_data->frame[1], 1);
- response_length = RFAL_PICOPASS_BLOCK_LEN;
- break;
- case RFAL_PICOPASS_CMD_CHECK: // CHALLENGE(4) READERSIGNATURE(4)
- if(nfcv_data->frame_length != 9 || ctx->state != PicopassEmulatorStateSelected) {
- return;
- }
- if(ctx->loclass_mode) {
- // LOCLASS Reader attack mode
- // Copy EPURSE
- uint8_t cc[RFAL_PICOPASS_BLOCK_LEN];
- picopass_emu_read_blocks(nfcv_data, cc, PICOPASS_SECURE_EPURSE_BLOCK_INDEX, 1);
- #ifndef PICOPASS_DEBUG_IGNORE_LOCLASS_STD_KEY
- uint8_t key[RFAL_PICOPASS_BLOCK_LEN];
- // loclass mode stores the derived standard debit key in Kd to check
- picopass_emu_read_blocks(nfcv_data, key, PICOPASS_SECURE_KD_BLOCK_INDEX, 1);
- uint8_t rmac[4];
- loclass_opt_doReaderMAC_2(ctx->cipher_state, nfcv_data->frame + 1, rmac, key);
- if(!memcmp(nfcv_data->frame + 5, rmac, 4)) {
- // MAC from reader matches Standard Key, keyroll mode or non-elite keyed reader.
- // Either way no point logging it.
- FURI_LOG_W(TAG, "loclass: standard key detected during collection");
- ctx->loclass_got_std_key = true;
- // Don't reset the state as the reader may try a different key next without going through anticoll
- // The reader is always free to redo the anticoll if it wants to anyway
- return;
- }
- #endif
- // Save to buffer to defer flushing when we rotate CSN
- memcpy(
- ctx->loclass_mac_buffer + ((ctx->key_block_num % LOCLASS_NUM_PER_CSN) * 8),
- nfcv_data->frame + 1,
- 8);
- // Rotate to the next CSN/attempt
- ctx->key_block_num++;
- // CSN changed
- if(ctx->key_block_num % LOCLASS_NUM_PER_CSN == 0) {
- // Flush NR-MACs for this CSN to SD card
- uint8_t cc[RFAL_PICOPASS_BLOCK_LEN];
- picopass_emu_read_blocks(nfcv_data, cc, PICOPASS_SECURE_EPURSE_BLOCK_INDEX, 1);
- for(int i = 0; i < LOCLASS_NUM_PER_CSN; i++) {
- loclass_writer_write_params(
- ctx->loclass_writer,
- ctx->key_block_num + i - LOCLASS_NUM_PER_CSN,
- nfc_data->uid,
- cc,
- ctx->loclass_mac_buffer + (i * 8),
- ctx->loclass_mac_buffer + (i * 8) + 4);
- }
- if(ctx->key_block_num < LOCLASS_NUM_CSNS * LOCLASS_NUM_PER_CSN) {
- loclass_update_csn(nfc_data, nfcv_data, ctx);
- // Only reset the state when we change to a new CSN for the same reason as when we get a standard key
- ctx->state = PicopassEmulatorStateIdle;
- } else {
- ctx->state = PicopassEmulatorStateStopEmulation;
- }
- }
- return;
- }
- uint8_t key[RFAL_PICOPASS_BLOCK_LEN];
- picopass_emu_read_blocks(nfcv_data, key, ctx->key_block_num, 1);
- uint8_t rmac[4];
- loclass_opt_doBothMAC_2(ctx->cipher_state, nfcv_data->frame + 1, rmac, response, key);
- #ifndef PICOPASS_DEBUG_IGNORE_BAD_RMAC
- if(memcmp(nfcv_data->frame + 5, rmac, 4)) {
- // Bad MAC from reader, do not send a response.
- FURI_LOG_I(TAG, "Got bad MAC from reader");
- // Reset the cipher state since we don't do it in READCHECK
- picopass_init_cipher_state(nfcv_data, ctx);
- return;
- }
- #endif
- // CHIPRESPONSE(4)
- response_length = 4;
- break;
- case RFAL_PICOPASS_CMD_UPDATE: // ADDRESS(1) DATA(8) SIGN(4)|CRC16(2)
- if((nfcv_data->frame_length != 12 && nfcv_data->frame_length != 14) ||
- ctx->state != PicopassEmulatorStateSelected || ctx->loclass_mode) {
- return;
- }
- if(nfcv_data->frame[1] >= PICOPASS_MAX_APP_LIMIT) {
- return;
- }
- uint8_t cfgBlock[RFAL_PICOPASS_BLOCK_LEN];
- picopass_emu_read_blocks(nfcv_data, cfgBlock, PICOPASS_CONFIG_BLOCK_INDEX, 1);
- bool persMode = HAS_MASK(cfgBlock[7], PICOPASS_FUSE_PERS);
- if((nfcv_data->frame[1] == PICOPASS_CSN_BLOCK_INDEX) // CSN is always read only
- ||
- (!persMode &&
- !HAS_MASK(cfgBlock[3], 0x80)) // Chip is in RO mode, no updated possible (even ePurse)
- || (!persMode &&
- nfcv_data->frame[1] ==
- PICOPASS_SECURE_AIA_BLOCK_INDEX) // AIA can only be set in personalisation mode
- || (!persMode &&
- (nfcv_data->frame[1] == PICOPASS_SECURE_KD_BLOCK_INDEX ||
- nfcv_data->frame[1] == PICOPASS_SECURE_KC_BLOCK_INDEX) &&
- (!HAS_MASK(cfgBlock[7], PICOPASS_FUSE_CRYPT10)))) {
- return; // TODO: Is this the right response?
- }
- if(nfcv_data->frame[1] >= 6 && nfcv_data->frame[1] <= 12) {
- if(!HAS_MASK(
- cfgBlock[3],
- 1 << (nfcv_data->frame[1] - 6))) { // bit0 is block6, up to bit6 being block12
- // Block is marked as read-only, deny writing
- return; // TODO: Is this the right response?
- }
- }
- // TODO: Check CRC/SIGN depending on if in secure mode
- // Check correct key
- // -> Kd only allows decrementing e-Purse
- // -> per-app controlled by key access config
- //bool keyAccess = HAS_MASK(cfgBlock[5], 0x01);
- // -> must auth with that key to change it
- uint8_t blockOffset = nfcv_data->frame[1];
- uint8_t block[RFAL_PICOPASS_BLOCK_LEN];
- switch(nfcv_data->frame[1]) {
- case PICOPASS_CONFIG_BLOCK_INDEX:
- block[0] = cfgBlock[0]; // Applications Limit
- block[1] = cfgBlock[1] & nfcv_data->frame[3]; // OTP
- block[2] = cfgBlock[2] & nfcv_data->frame[4]; // OTP
- block[3] = cfgBlock[3] & nfcv_data->frame[5]; // Block Write Lock
- block[4] = cfgBlock[4]; // Chip Config
- block[5] = cfgBlock[5]; // Memory Config
- block[6] = nfcv_data->frame[8]; // EAS
- block[7] = cfgBlock[7]; // Fuses
- // Some parts allow w (but not e) if in persMode
- if(persMode) {
- block[0] &= nfcv_data->frame[2]; // Applications Limit
- block[4] &= nfcv_data->frame[6]; // Chip Config
- block[5] &= nfcv_data->frame[7]; // Memory Config
- block[7] &= nfcv_data->frame[9]; // Fuses
- } else {
- // Fuses allows setting Crypt1/0 from 1 to 0 only during application mode
- block[7] &= nfcv_data->frame[9] | ~PICOPASS_FUSE_CRYPT10;
- }
- break;
- case PICOPASS_SECURE_EPURSE_BLOCK_INDEX:
- // ePurse updates swap first and second half of the block each update
- memcpy(block + 4, nfcv_data->frame + 2, 4);
- memcpy(block, nfcv_data->frame + 6, 4);
- break;
- case PICOPASS_SECURE_KD_BLOCK_INDEX:
- // fallthrough
- case PICOPASS_SECURE_KC_BLOCK_INDEX:
- if(!persMode) {
- picopass_emu_read_blocks(nfcv_data, block, blockOffset, 1);
- for(uint8_t i = 0; i < sizeof(RFAL_PICOPASS_BLOCK_LEN); i++)
- block[i] ^= nfcv_data->frame[i + 2];
- break;
- }
- // Use default case when in personalisation mode
- // fallthrough
- default:
- memcpy(block, nfcv_data->frame + 2, RFAL_PICOPASS_BLOCK_LEN);
- break;
- }
- picopass_emu_write_blocks(nfcv_data, block, blockOffset, 1);
- if((nfcv_data->frame[1] == ctx->key_block_num ||
- nfcv_data->frame[1] == PICOPASS_SECURE_EPURSE_BLOCK_INDEX) &&
- !ctx->loclass_mode)
- picopass_init_cipher_state(nfcv_data, ctx);
- // DATA(8) CRC16(2)
- if(nfcv_data->frame[1] == PICOPASS_SECURE_KD_BLOCK_INDEX ||
- nfcv_data->frame[1] == PICOPASS_SECURE_KD_BLOCK_INDEX) {
- // Key updates always return FF's
- memcpy(response, block_ff, RFAL_PICOPASS_BLOCK_LEN);
- } else {
- memcpy(response, block, RFAL_PICOPASS_BLOCK_LEN);
- }
- picopass_append_crc(response, RFAL_PICOPASS_BLOCK_LEN);
- response_length = RFAL_PICOPASS_BLOCK_LEN + 2;
- break;
- case RFAL_PICOPASS_CMD_PAGESEL: // PAGE(1) CRC16(2)
- // Chips with a single page do not answer to this command
- // BLOCK1(8) CRC16(2)
- return;
- case RFAL_PICOPASS_CMD_DETECT:
- // TODO - not used by iClass though
- return;
- default:
- return;
- }
- NfcVSendFlags flags = NfcVSendFlagsSof | NfcVSendFlagsOneSubcarrier | NfcVSendFlagsHighRate;
- if(response_length > 0) {
- flags |= NfcVSendFlagsEof;
- }
- nfcv_emu_send(
- tx_rx,
- nfcv_data,
- response,
- response_length,
- flags,
- nfcv_data->eof_timestamp + NFCV_FDT_FC(4000)); // 3650 is ~254uS 4000 is ~283uS
- }
- void picopass_worker_emulate(PicopassWorker* picopass_worker, bool loclass_mode) {
- furi_hal_nfc_exit_sleep();
- FuriHalNfcTxRxContext tx_rx = {};
- PicopassEmulatorCtx emu_ctx = {
- .state = PicopassEmulatorStateIdle,
- .key_block_num = PICOPASS_SECURE_KD_BLOCK_INDEX,
- .loclass_mode = loclass_mode,
- .loclass_got_std_key = false,
- .loclass_writer = NULL,
- };
- FuriHalNfcDevData nfc_data = {
- .uid_len = RFAL_PICOPASS_UID_LEN,
- };
- NfcVData* nfcv_data = malloc(sizeof(NfcVData));
- nfcv_data->block_size = RFAL_PICOPASS_BLOCK_LEN;
- nfcv_data->emu_protocol_ctx = &emu_ctx;
- nfcv_data->emu_protocol_handler = &picopass_emu_handle_packet;
- PicopassDeviceData* dev_data = picopass_worker->dev_data;
- PicopassBlock* blocks = dev_data->AA1;
- if(loclass_mode) {
- emu_ctx.loclass_writer = loclass_writer_alloc();
- if(emu_ctx.loclass_writer == NULL) {
- picopass_worker->callback(
- PicopassWorkerEventLoclassFileError, picopass_worker->context);
- while(picopass_worker->state == PicopassWorkerStateEmulate ||
- picopass_worker->state == PicopassWorkerStateLoclass) {
- furi_delay_ms(1);
- }
- free(nfcv_data);
- return;
- }
- // Setup blocks for loclass attack
- uint8_t conf[8] = {0x12, 0xFF, 0xFF, 0xFF, 0x7F, 0x1F, 0xFF, 0x3C};
- picopass_emu_write_blocks(nfcv_data, conf, PICOPASS_CONFIG_BLOCK_INDEX, 1);
- uint8_t epurse[8] = {0xFE, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF};
- picopass_emu_write_blocks(nfcv_data, epurse, PICOPASS_SECURE_EPURSE_BLOCK_INDEX, 1);
- uint8_t aia[8] = {0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF};
- picopass_emu_write_blocks(nfcv_data, aia, PICOPASS_SECURE_AIA_BLOCK_INDEX, 1);
- emu_ctx.key_block_num = 0;
- loclass_update_csn(&nfc_data, nfcv_data, &emu_ctx);
- loclass_writer_write_start_stop(emu_ctx.loclass_writer, true);
- } else {
- memcpy(nfc_data.uid, blocks[PICOPASS_CSN_BLOCK_INDEX].data, RFAL_PICOPASS_BLOCK_LEN);
- memcpy(nfcv_data->data, blocks, sizeof(dev_data->AA1));
- picopass_init_cipher_state(nfcv_data, &emu_ctx);
- }
- uint8_t last_loclass_csn_num = 0;
- bool loclass_got_std_key = false;
- nfcv_emu_init(&nfc_data, nfcv_data);
- while(picopass_worker->state == PicopassWorkerStateEmulate ||
- picopass_worker->state == PicopassWorkerStateLoclass) {
- if(nfcv_emu_loop(&tx_rx, &nfc_data, nfcv_data, 500)) {
- if(picopass_worker->callback) {
- if((loclass_mode) && (last_loclass_csn_num != emu_ctx.key_block_num)) {
- last_loclass_csn_num = emu_ctx.key_block_num;
- picopass_worker->callback(
- PicopassWorkerEventLoclassGotMac, picopass_worker->context);
- } else if((loclass_mode) && !loclass_got_std_key && emu_ctx.loclass_got_std_key) {
- loclass_got_std_key = true;
- picopass_worker->callback(
- PicopassWorkerEventLoclassGotStandardKey, picopass_worker->context);
- } else {
- picopass_worker->callback(
- PicopassWorkerEventSuccess, picopass_worker->context);
- }
- }
- }
- furi_delay_us(1);
- }
- if(emu_ctx.loclass_writer) {
- loclass_writer_write_start_stop(emu_ctx.loclass_writer, false);
- loclass_writer_free(emu_ctx.loclass_writer);
- }
- nfcv_emu_deinit(nfcv_data);
- free(nfcv_data);
- }
|