fake_worker.c 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587
  1. #include "fake_worker.h"
  2. #include "protocol_i.h"
  3. #include <timer.h>
  4. #include <lib/toolbox/hex.h>
  5. #include <toolbox/stream/stream.h>
  6. #include <toolbox/stream/buffered_file_stream.h>
  7. #define TAG "Fuzzer worker"
  8. #if defined(RFID_125_PROTOCOL)
  9. #include <lib/lfrfid/lfrfid_dict_file.h>
  10. #include <lib/lfrfid/lfrfid_worker.h>
  11. #include <lfrfid/protocols/lfrfid_protocols.h>
  12. #else
  13. #include <lib/ibutton/ibutton_worker.h>
  14. #include <lib/ibutton/ibutton_key.h>
  15. #endif
  16. #include <toolbox/stream/stream.h>
  17. typedef uint8_t FuzzerWorkerPayload[MAX_PAYLOAD_SIZE];
  18. struct FuzzerWorker {
  19. #if defined(RFID_125_PROTOCOL)
  20. LFRFIDWorker* proto_worker;
  21. ProtocolId protocol_id;
  22. ProtocolDict* protocols_items;
  23. #else
  24. iButtonWorker* proto_worker;
  25. iButtonProtocolId protocol_id; // TODO
  26. iButtonProtocols* protocols_items;
  27. iButtonKey* key;
  28. #endif
  29. const FuzzerProtocol* protocol;
  30. FuzzerWorkerPayload payload;
  31. FuzzerWorkerAttackType attack_type;
  32. uint16_t index;
  33. Stream* uids_stream;
  34. uint8_t chusen_byte;
  35. bool treead_running;
  36. bool in_emu_phase;
  37. FuriTimer* timer;
  38. uint16_t timer_idle_time_ms;
  39. uint16_t timer_emu_time_ms;
  40. FuzzerWorkerUidChagedCallback tick_callback;
  41. void* tick_context;
  42. FuzzerWorkerEndCallback end_callback;
  43. void* end_context;
  44. };
  45. static void hardware_worker_alloc_init(FuzzerWorker* instance) {
  46. #if defined(RFID_125_PROTOCOL)
  47. instance->protocols_items = protocol_dict_alloc(lfrfid_protocols, LFRFIDProtocolMax);
  48. instance->proto_worker = lfrfid_worker_alloc(instance->protocols_items);
  49. #else
  50. instance->protocols_items = ibutton_protocols_alloc();
  51. instance->key =
  52. ibutton_key_alloc(ibutton_protocols_get_max_data_size(instance->protocols_items));
  53. instance->proto_worker = ibutton_worker_alloc(instance->protocols_items);
  54. #endif
  55. }
  56. static void hardware_worker_free(FuzzerWorker* instance) {
  57. #if defined(RFID_125_PROTOCOL)
  58. lfrfid_worker_free(instance->proto_worker);
  59. protocol_dict_free(instance->protocols_items);
  60. #else
  61. ibutton_worker_free(instance->proto_worker);
  62. ibutton_key_free(instance->key);
  63. ibutton_protocols_free(instance->protocols_items);
  64. #endif
  65. }
  66. static void hardware_worker_start_thread(FuzzerWorker* instance) {
  67. #if defined(RFID_125_PROTOCOL)
  68. lfrfid_worker_start_thread(instance->proto_worker);
  69. #else
  70. ibutton_worker_start_thread(instance->proto_worker);
  71. #endif
  72. }
  73. static void hardware_worker_stop_thread(FuzzerWorker* instance) {
  74. #if defined(RFID_125_PROTOCOL)
  75. lfrfid_worker_stop(instance->proto_worker);
  76. lfrfid_worker_stop_thread(instance->proto_worker);
  77. #else
  78. ibutton_worker_stop(instance->proto_worker);
  79. ibutton_worker_stop_thread(instance->proto_worker);
  80. #endif
  81. }
  82. static void hardware_worker_emulate_start(FuzzerWorker* instance) {
  83. #if defined(RFID_125_PROTOCOL)
  84. lfrfid_worker_emulate_start(instance->proto_worker, instance->protocol_id);
  85. #else
  86. ibutton_worker_emulate_start(instance->proto_worker, instance->key);
  87. #endif
  88. }
  89. static void hardware_worker_stop(FuzzerWorker* instance) {
  90. #if defined(RFID_125_PROTOCOL)
  91. lfrfid_worker_stop(instance->proto_worker);
  92. #else
  93. ibutton_worker_stop(instance->proto_worker);
  94. #endif
  95. }
  96. static void
  97. hardware_worker_set_protocol_data(FuzzerWorker* instance, FuzzerWorkerPayload payload) {
  98. #if defined(RFID_125_PROTOCOL)
  99. protocol_dict_set_data(
  100. instance->protocols_items, instance->protocol_id, payload, MAX_PAYLOAD_SIZE);
  101. #else
  102. ibutton_key_set_protocol_id(instance->key, instance->protocol_id);
  103. iButtonEditableData data;
  104. ibutton_protocols_get_editable_data(instance->protocols_items, instance->key, &data);
  105. // TODO check data.size logic
  106. data.size = MAX_PAYLOAD_SIZE;
  107. memcpy(data.ptr, payload, MAX_PAYLOAD_SIZE); // data.size);
  108. #endif
  109. }
  110. static void
  111. hardware_worker_set_protocol(FuzzerWorker* instance, FuzzerProtocolsID protocol_index) {
  112. instance->protocol = &fuzzer_proto_items[protocol_index];
  113. #if defined(RFID_125_PROTOCOL)
  114. instance->protocol_id =
  115. protocol_dict_get_protocol_by_name(instance->protocols_items, instance->protocol->name);
  116. #else
  117. // TODO iButtonProtocolIdInvalid check
  118. instance->protocol_id =
  119. ibutton_protocols_get_id_by_name(instance->protocols_items, instance->protocol->name);
  120. #endif
  121. }
  122. // TODO make it protocol independent
  123. bool fuzzer_worker_load_key_from_file(
  124. FuzzerWorker* instance,
  125. FuzzerProtocolsID protocol_index,
  126. const char* filename) {
  127. furi_assert(instance);
  128. bool res = false;
  129. hardware_worker_set_protocol(instance, protocol_index);
  130. #if defined(RFID_125_PROTOCOL)
  131. ProtocolId loaded_proto_id = lfrfid_dict_file_load(instance->protocols_items, filename);
  132. if(loaded_proto_id == PROTOCOL_NO) {
  133. // Err Cant load file
  134. FURI_LOG_W(TAG, "Cant load file");
  135. } else if(instance->protocol_id != loaded_proto_id) { // Err wrong protocol
  136. FURI_LOG_W(TAG, "Wrong protocol");
  137. FURI_LOG_W(
  138. TAG,
  139. "Selected: %s Loaded: %s",
  140. instance->protocol->name,
  141. protocol_dict_get_name(instance->protocols_items, loaded_proto_id));
  142. } else {
  143. protocol_dict_get_data(
  144. instance->protocols_items, instance->protocol_id, instance->payload, MAX_PAYLOAD_SIZE);
  145. res = true;
  146. }
  147. #else
  148. if(!ibutton_protocols_load(instance->protocols_items, instance->key, filename)) {
  149. // Err Cant load file
  150. FURI_LOG_W(TAG, "Cant load file");
  151. } else {
  152. if(instance->protocol_id != ibutton_key_get_protocol_id(instance->key)) {
  153. // Err wrong protocol
  154. FURI_LOG_W(TAG, "Wrong protocol");
  155. FURI_LOG_W(
  156. TAG,
  157. "Selected: %s Loaded: %s",
  158. instance->protocol->name,
  159. ibutton_protocols_get_name(
  160. instance->protocols_items, ibutton_key_get_protocol_id(instance->key)));
  161. } else {
  162. iButtonEditableData data;
  163. ibutton_protocols_get_editable_data(instance->protocols_items, instance->key, &data);
  164. memcpy(instance->payload, data.ptr, data.size);
  165. res = true;
  166. }
  167. }
  168. #endif
  169. return res;
  170. }
  171. static bool fuzzer_worker_load_key(FuzzerWorker* instance, bool next) {
  172. furi_assert(instance);
  173. furi_assert(instance->protocol);
  174. bool res = false;
  175. const FuzzerProtocol* protocol = instance->protocol;
  176. switch(instance->attack_type) {
  177. case FuzzerWorkerAttackTypeDefaultDict:
  178. if(next) {
  179. if(instance->index < (protocol->dict.len - 1)) {
  180. instance->index++;
  181. } else {
  182. break;
  183. }
  184. }
  185. if(instance->index < protocol->dict.len) {
  186. memcpy(
  187. instance->payload,
  188. &protocol->dict.val[instance->index * protocol->data_size],
  189. protocol->data_size);
  190. res = true;
  191. }
  192. break;
  193. case FuzzerWorkerAttackTypeLoadFileCustomUids: {
  194. if(next) {
  195. instance->index++;
  196. }
  197. uint8_t str_len = protocol->data_size * 2 + 1;
  198. FuriString* data_str = furi_string_alloc();
  199. while(true) {
  200. furi_string_reset(data_str);
  201. if(!stream_read_line(instance->uids_stream, data_str)) {
  202. stream_rewind(instance->uids_stream);
  203. // TODO Check empty file & close stream and storage
  204. break;
  205. } else if(furi_string_get_char(data_str, 0) == '#') {
  206. // Skip comment string
  207. continue;
  208. } else if(furi_string_size(data_str) != str_len) {
  209. // Ignore strin with bad length
  210. FURI_LOG_W(TAG, "Bad string length");
  211. continue;
  212. } else {
  213. FURI_LOG_D(TAG, "Uid candidate: \"%s\"", furi_string_get_cstr(data_str));
  214. bool parse_ok = true;
  215. for(uint8_t i = 0; i < protocol->data_size; i++) {
  216. if(!hex_char_to_uint8(
  217. furi_string_get_cstr(data_str)[i * 2],
  218. furi_string_get_cstr(data_str)[i * 2 + 1],
  219. &instance->payload[i])) {
  220. parse_ok = false;
  221. break;
  222. }
  223. }
  224. res = parse_ok;
  225. }
  226. break;
  227. }
  228. }
  229. break;
  230. case FuzzerWorkerAttackTypeLoadFile:
  231. if(instance->payload[instance->index] != 0xFF) {
  232. instance->payload[instance->index]++;
  233. res = true;
  234. }
  235. break;
  236. default:
  237. break;
  238. }
  239. if(res) {
  240. hardware_worker_set_protocol_data(instance, instance->payload);
  241. }
  242. return res;
  243. }
  244. static bool fuzzer_worker_load_previous_key(FuzzerWorker* instance) {
  245. furi_assert(instance);
  246. furi_assert(instance->protocol);
  247. bool res = false;
  248. const FuzzerProtocol* protocol = instance->protocol;
  249. switch(instance->attack_type) {
  250. case FuzzerWorkerAttackTypeDefaultDict:
  251. if(instance->index > 0) {
  252. instance->index--;
  253. memcpy(
  254. instance->payload,
  255. &protocol->dict.val[instance->index * protocol->data_size],
  256. protocol->data_size);
  257. res = true;
  258. }
  259. break;
  260. case FuzzerWorkerAttackTypeLoadFile:
  261. if(instance->payload[instance->index] != 0x00) {
  262. instance->payload[instance->index]--;
  263. res = true;
  264. }
  265. break;
  266. default:
  267. break;
  268. }
  269. if(res) {
  270. hardware_worker_set_protocol_data(instance, instance->payload);
  271. }
  272. return res;
  273. }
  274. static void fuzzer_worker_on_tick_callback(void* context) {
  275. furi_assert(context);
  276. FuzzerWorker* instance = context;
  277. if(instance->in_emu_phase) {
  278. if(instance->treead_running) {
  279. hardware_worker_stop(instance);
  280. }
  281. instance->in_emu_phase = false;
  282. furi_timer_start(instance->timer, furi_ms_to_ticks(instance->timer_idle_time_ms));
  283. } else {
  284. if(!fuzzer_worker_load_key(instance, true)) {
  285. fuzzer_worker_pause(instance); // XXX
  286. if(instance->end_callback) {
  287. instance->end_callback(instance->end_context);
  288. }
  289. } else {
  290. if(instance->treead_running) {
  291. hardware_worker_emulate_start(instance);
  292. }
  293. instance->in_emu_phase = true;
  294. furi_timer_start(instance->timer, furi_ms_to_ticks(instance->timer_emu_time_ms));
  295. if(instance->tick_callback) {
  296. instance->tick_callback(instance->tick_context);
  297. }
  298. }
  299. }
  300. }
  301. void fuzzer_worker_get_current_key(FuzzerWorker* instance, FuzzerPayload* output_key) {
  302. furi_assert(instance);
  303. furi_assert(output_key);
  304. furi_assert(instance->protocol);
  305. output_key->data_size = instance->protocol->data_size;
  306. memcpy(output_key->data, instance->payload, instance->protocol->data_size);
  307. }
  308. bool fuzzer_worker_next_key(FuzzerWorker* instance) {
  309. furi_assert(instance);
  310. furi_assert(instance->protocol);
  311. return fuzzer_worker_load_key(instance, true);
  312. }
  313. bool fuzzer_worker_previous_key(FuzzerWorker* instance) {
  314. furi_assert(instance);
  315. furi_assert(instance->protocol);
  316. return fuzzer_worker_load_previous_key(instance);
  317. }
  318. bool fuzzer_worker_init_attack_dict(FuzzerWorker* instance, FuzzerProtocolsID protocol_index) {
  319. furi_assert(instance);
  320. bool res = false;
  321. hardware_worker_set_protocol(instance, protocol_index);
  322. instance->attack_type = FuzzerWorkerAttackTypeDefaultDict;
  323. instance->index = 0;
  324. if(!fuzzer_worker_load_key(instance, false)) {
  325. instance->attack_type = FuzzerWorkerAttackTypeMax;
  326. } else {
  327. res = true;
  328. }
  329. return res;
  330. }
  331. bool fuzzer_worker_init_attack_file_dict(
  332. FuzzerWorker* instance,
  333. FuzzerProtocolsID protocol_index,
  334. FuriString* file_path) {
  335. furi_assert(instance);
  336. furi_assert(file_path);
  337. bool res = false;
  338. hardware_worker_set_protocol(instance, protocol_index);
  339. Storage* storage = furi_record_open(RECORD_STORAGE);
  340. instance->uids_stream = buffered_file_stream_alloc(storage);
  341. if(!buffered_file_stream_open(
  342. instance->uids_stream, furi_string_get_cstr(file_path), FSAM_READ, FSOM_OPEN_EXISTING)) {
  343. buffered_file_stream_close(instance->uids_stream);
  344. return res;
  345. }
  346. instance->attack_type = FuzzerWorkerAttackTypeLoadFileCustomUids;
  347. instance->index = 0;
  348. if(!fuzzer_worker_load_key(instance, false)) {
  349. instance->attack_type = FuzzerWorkerAttackTypeMax;
  350. buffered_file_stream_close(instance->uids_stream);
  351. furi_record_close(RECORD_STORAGE);
  352. } else {
  353. res = true;
  354. }
  355. return res;
  356. }
  357. bool fuzzer_worker_init_attack_bf_byte(
  358. FuzzerWorker* instance,
  359. FuzzerProtocolsID protocol_index,
  360. const FuzzerPayload* new_uid,
  361. uint8_t chusen) {
  362. furi_assert(instance);
  363. bool res = false;
  364. hardware_worker_set_protocol(instance, protocol_index);
  365. instance->attack_type = FuzzerWorkerAttackTypeLoadFile;
  366. instance->index = chusen;
  367. memcpy(instance->payload, new_uid->data, instance->protocol->data_size);
  368. res = true;
  369. return res;
  370. }
  371. FuzzerWorker* fuzzer_worker_alloc() {
  372. FuzzerWorker* instance = malloc(sizeof(FuzzerWorker));
  373. hardware_worker_alloc_init(instance);
  374. instance->attack_type = FuzzerWorkerAttackTypeMax;
  375. instance->index = 0;
  376. instance->treead_running = false;
  377. instance->in_emu_phase = false;
  378. memset(instance->payload, 0x00, sizeof(instance->payload));
  379. instance->timer_idle_time_ms = PROTOCOL_DEF_IDLE_TIME * 100;
  380. instance->timer_emu_time_ms = PROTOCOL_DEF_EMU_TIME * 100;
  381. instance->timer =
  382. furi_timer_alloc(fuzzer_worker_on_tick_callback, FuriTimerTypeOnce, instance);
  383. return instance;
  384. }
  385. void fuzzer_worker_free(FuzzerWorker* instance) {
  386. furi_assert(instance);
  387. fuzzer_worker_stop(instance);
  388. furi_timer_free(instance->timer);
  389. hardware_worker_free(instance);
  390. free(instance);
  391. }
  392. bool fuzzer_worker_start(FuzzerWorker* instance, uint8_t idle_time, uint8_t emu_time) {
  393. furi_assert(instance);
  394. if(instance->attack_type < FuzzerWorkerAttackTypeMax) {
  395. if(idle_time == 0) {
  396. instance->timer_idle_time_ms = 10;
  397. } else {
  398. instance->timer_idle_time_ms = idle_time * 100;
  399. }
  400. if(emu_time == 0) {
  401. instance->timer_emu_time_ms = 10;
  402. } else {
  403. instance->timer_emu_time_ms = emu_time * 100;
  404. }
  405. FURI_LOG_D(
  406. TAG,
  407. "Emu_time %u ms Idle_time %u ms",
  408. instance->timer_emu_time_ms,
  409. instance->timer_idle_time_ms);
  410. if(!instance->treead_running) {
  411. hardware_worker_start_thread(instance);
  412. FURI_LOG_D(TAG, "Worker Starting");
  413. instance->treead_running = true;
  414. } else {
  415. FURI_LOG_D(TAG, "Worker UnPaused");
  416. }
  417. hardware_worker_emulate_start(instance);
  418. instance->in_emu_phase = true;
  419. furi_timer_start(instance->timer, furi_ms_to_ticks(instance->timer_emu_time_ms));
  420. return true;
  421. }
  422. return false;
  423. }
  424. void fuzzer_worker_start_emulate(FuzzerWorker* instance) {
  425. furi_assert(instance);
  426. if(!instance->treead_running) {
  427. hardware_worker_start_thread(instance);
  428. FURI_LOG_D(TAG, "Worker Starting");
  429. instance->treead_running = true;
  430. } else {
  431. FURI_LOG_D(TAG, "Worker UnPaused");
  432. }
  433. hardware_worker_emulate_start(instance);
  434. }
  435. void fuzzer_worker_pause(FuzzerWorker* instance) {
  436. furi_assert(instance);
  437. furi_timer_stop(instance->timer);
  438. if(instance->treead_running) {
  439. hardware_worker_stop(instance);
  440. FURI_LOG_D(TAG, "Worker Paused");
  441. }
  442. }
  443. void fuzzer_worker_stop(FuzzerWorker* instance) {
  444. furi_assert(instance);
  445. furi_timer_stop(instance->timer);
  446. if(instance->treead_running) {
  447. hardware_worker_stop_thread(instance);
  448. FURI_LOG_D(TAG, "Worker Stopping");
  449. instance->treead_running = false;
  450. }
  451. if(instance->attack_type == FuzzerWorkerAttackTypeLoadFileCustomUids) {
  452. buffered_file_stream_close(instance->uids_stream);
  453. furi_record_close(RECORD_STORAGE);
  454. instance->attack_type = FuzzerWorkerAttackTypeMax;
  455. }
  456. // TODO anything else
  457. }
  458. void fuzzer_worker_set_uid_chaged_callback(
  459. FuzzerWorker* instance,
  460. FuzzerWorkerUidChagedCallback callback,
  461. void* context) {
  462. furi_assert(instance);
  463. instance->tick_callback = callback;
  464. instance->tick_context = context;
  465. }
  466. void fuzzer_worker_set_end_callback(
  467. FuzzerWorker* instance,
  468. FuzzerWorkerEndCallback callback,
  469. void* context) {
  470. furi_assert(instance);
  471. instance->end_callback = callback;
  472. instance->end_context = context;
  473. }