picopass_device.c 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384
  1. #include "picopass_device.h"
  2. #include <toolbox/path.h>
  3. #include <flipper_format/flipper_format.h>
  4. #include <picopass_icons.h>
  5. #define TAG "PicopassDevice"
  6. static const char* picopass_file_header = "Flipper Picopass device";
  7. static const uint32_t picopass_file_version = 1;
  8. const uint8_t picopass_iclass_decryptionkey[] =
  9. {0xb4, 0x21, 0x2c, 0xca, 0xb7, 0xed, 0x21, 0x0f, 0x7b, 0x93, 0xd4, 0x59, 0x39, 0xc7, 0xdd, 0x36};
  10. PicopassDevice* picopass_device_alloc() {
  11. PicopassDevice* picopass_dev = malloc(sizeof(PicopassDevice));
  12. picopass_dev->dev_data.pacs.legacy = false;
  13. picopass_dev->dev_data.pacs.se_enabled = false;
  14. picopass_dev->dev_data.pacs.elite_kdf = false;
  15. picopass_dev->dev_data.pacs.pin_length = 0;
  16. picopass_dev->storage = furi_record_open(RECORD_STORAGE);
  17. picopass_dev->dialogs = furi_record_open(RECORD_DIALOGS);
  18. picopass_dev->load_path = furi_string_alloc();
  19. return picopass_dev;
  20. }
  21. void picopass_device_set_name(PicopassDevice* dev, const char* name) {
  22. furi_assert(dev);
  23. strlcpy(dev->dev_name, name, PICOPASS_DEV_NAME_MAX_LEN);
  24. }
  25. static bool picopass_device_save_file(
  26. PicopassDevice* dev,
  27. const char* dev_name,
  28. const char* folder,
  29. const char* extension,
  30. bool use_load_path) {
  31. furi_assert(dev);
  32. bool saved = false;
  33. FlipperFormat* file = flipper_format_file_alloc(dev->storage);
  34. PicopassPacs* pacs = &dev->dev_data.pacs;
  35. PicopassBlock* AA1 = dev->dev_data.AA1;
  36. FuriString* temp_str;
  37. temp_str = furi_string_alloc();
  38. do {
  39. if(use_load_path && !furi_string_empty(dev->load_path)) {
  40. // Get directory name
  41. path_extract_dirname(furi_string_get_cstr(dev->load_path), temp_str);
  42. // Make path to file to save
  43. furi_string_cat_printf(temp_str, "/%s%s", dev_name, extension);
  44. } else {
  45. // First remove picopass device file if it was saved
  46. furi_string_printf(temp_str, "%s/%s%s", folder, dev_name, extension);
  47. }
  48. // Open file
  49. if(!flipper_format_file_open_always(file, furi_string_get_cstr(temp_str))) break;
  50. if(dev->format == PicopassDeviceSaveFormatHF) {
  51. uint32_t fc = pacs->record.FacilityCode;
  52. uint32_t cn = pacs->record.CardNumber;
  53. // Write header
  54. if(!flipper_format_write_header_cstr(file, picopass_file_header, picopass_file_version))
  55. break;
  56. if(pacs->record.valid) {
  57. if(!flipper_format_write_uint32(file, "Facility Code", &fc, 1)) break;
  58. if(!flipper_format_write_uint32(file, "Card Number", &cn, 1)) break;
  59. if(!flipper_format_write_hex(
  60. file, "Credential", pacs->credential, RFAL_PICOPASS_BLOCK_LEN))
  61. break;
  62. if(pacs->pin_length > 0) {
  63. if(!flipper_format_write_hex(
  64. file, "PIN\t\t", pacs->pin0, RFAL_PICOPASS_BLOCK_LEN))
  65. break;
  66. if(!flipper_format_write_hex(
  67. file, "PIN(cont.)\t", pacs->pin1, RFAL_PICOPASS_BLOCK_LEN))
  68. break;
  69. }
  70. }
  71. // TODO: Add elite
  72. if(!flipper_format_write_comment_cstr(file, "Picopass blocks")) break;
  73. bool block_saved = true;
  74. size_t app_limit = AA1[PICOPASS_CONFIG_BLOCK_INDEX].data[0] < PICOPASS_MAX_APP_LIMIT ?
  75. AA1[PICOPASS_CONFIG_BLOCK_INDEX].data[0] :
  76. PICOPASS_MAX_APP_LIMIT;
  77. for(size_t i = 0; i < app_limit; i++) {
  78. furi_string_printf(temp_str, "Block %d", i);
  79. if(!flipper_format_write_hex(
  80. file,
  81. furi_string_get_cstr(temp_str),
  82. AA1[i].data,
  83. RFAL_PICOPASS_BLOCK_LEN)) {
  84. block_saved = false;
  85. break;
  86. }
  87. }
  88. if(!block_saved) break;
  89. } else if(dev->format == PicopassDeviceSaveFormatLF) {
  90. const char* lf_header = "Flipper RFID key";
  91. // Write header
  92. if(!flipper_format_write_header_cstr(file, lf_header, 1)) break;
  93. if(!flipper_format_write_comment_cstr(
  94. file,
  95. "This was generated from the Picopass plugin and may not match current lfrfid"))
  96. break;
  97. // When lfrfid supports more formats, update this
  98. if(!flipper_format_write_string_cstr(file, "Key type", "H10301")) break;
  99. uint8_t H10301[3] = {0};
  100. H10301[0] = pacs->record.FacilityCode;
  101. H10301[1] = pacs->record.CardNumber >> 8;
  102. H10301[2] = pacs->record.CardNumber & 0x00FF;
  103. if(!flipper_format_write_hex(file, "Data", H10301, 3)) break;
  104. }
  105. saved = true;
  106. } while(0);
  107. if(!saved) {
  108. dialog_message_show_storage_error(dev->dialogs, "Can not save\nfile");
  109. }
  110. furi_string_free(temp_str);
  111. flipper_format_free(file);
  112. return saved;
  113. }
  114. bool picopass_device_save(PicopassDevice* dev, const char* dev_name) {
  115. if(dev->format == PicopassDeviceSaveFormatHF) {
  116. return picopass_device_save_file(
  117. dev, dev_name, STORAGE_APP_DATA_PATH_PREFIX, PICOPASS_APP_EXTENSION, true);
  118. } else if(dev->format == PicopassDeviceSaveFormatLF) {
  119. return picopass_device_save_file(dev, dev_name, ANY_PATH("lfrfid"), ".rfid", true);
  120. }
  121. return false;
  122. }
  123. static bool picopass_device_load_data(PicopassDevice* dev, FuriString* path, bool show_dialog) {
  124. bool parsed = false;
  125. FlipperFormat* file = flipper_format_file_alloc(dev->storage);
  126. PicopassBlock* AA1 = dev->dev_data.AA1;
  127. PicopassPacs* pacs = &dev->dev_data.pacs;
  128. FuriString* temp_str;
  129. temp_str = furi_string_alloc();
  130. bool deprecated_version = false;
  131. if(dev->loading_cb) {
  132. dev->loading_cb(dev->loading_cb_ctx, true);
  133. }
  134. do {
  135. if(!flipper_format_file_open_existing(file, furi_string_get_cstr(path))) break;
  136. // Read and verify file header
  137. uint32_t version = 0;
  138. if(!flipper_format_read_header(file, temp_str, &version)) break;
  139. if(furi_string_cmp_str(temp_str, picopass_file_header) ||
  140. (version != picopass_file_version)) {
  141. deprecated_version = true;
  142. break;
  143. }
  144. // Parse header blocks
  145. bool block_read = true;
  146. for(size_t i = 0; i < 6; i++) {
  147. furi_string_printf(temp_str, "Block %d", i);
  148. if(!flipper_format_read_hex(
  149. file, furi_string_get_cstr(temp_str), AA1[i].data, RFAL_PICOPASS_BLOCK_LEN)) {
  150. block_read = false;
  151. break;
  152. }
  153. }
  154. size_t app_limit = AA1[PICOPASS_CONFIG_BLOCK_INDEX].data[0];
  155. // Fix for unpersonalized cards that have app_limit set to 0xFF
  156. if(app_limit > PICOPASS_MAX_APP_LIMIT) app_limit = PICOPASS_MAX_APP_LIMIT;
  157. for(size_t i = 6; i < app_limit; i++) {
  158. furi_string_printf(temp_str, "Block %d", i);
  159. if(!flipper_format_read_hex(
  160. file, furi_string_get_cstr(temp_str), AA1[i].data, RFAL_PICOPASS_BLOCK_LEN)) {
  161. block_read = false;
  162. break;
  163. }
  164. }
  165. if(!block_read) break;
  166. if(picopass_device_parse_credential(AA1, pacs) != ERR_NONE) break;
  167. if(picopass_device_parse_wiegand(pacs->credential, &pacs->record) != ERR_NONE) break;
  168. parsed = true;
  169. } while(false);
  170. if(dev->loading_cb) {
  171. dev->loading_cb(dev->loading_cb_ctx, false);
  172. }
  173. if((!parsed) && (show_dialog)) {
  174. if(deprecated_version) {
  175. dialog_message_show_storage_error(dev->dialogs, "File format deprecated");
  176. } else {
  177. dialog_message_show_storage_error(dev->dialogs, "Can not parse\nfile");
  178. }
  179. }
  180. furi_string_free(temp_str);
  181. flipper_format_free(file);
  182. return parsed;
  183. }
  184. void picopass_device_clear(PicopassDevice* dev) {
  185. furi_assert(dev);
  186. picopass_device_data_clear(&dev->dev_data);
  187. memset(&dev->dev_data, 0, sizeof(dev->dev_data));
  188. dev->format = PicopassDeviceSaveFormatHF;
  189. furi_string_reset(dev->load_path);
  190. }
  191. void picopass_device_free(PicopassDevice* picopass_dev) {
  192. furi_assert(picopass_dev);
  193. picopass_device_clear(picopass_dev);
  194. furi_record_close(RECORD_STORAGE);
  195. furi_record_close(RECORD_DIALOGS);
  196. furi_string_free(picopass_dev->load_path);
  197. free(picopass_dev);
  198. }
  199. bool picopass_file_select(PicopassDevice* dev) {
  200. furi_assert(dev);
  201. FuriString* picopass_app_folder;
  202. picopass_app_folder = furi_string_alloc_set(STORAGE_APP_DATA_PATH_PREFIX);
  203. DialogsFileBrowserOptions browser_options;
  204. dialog_file_browser_set_basic_options(&browser_options, PICOPASS_APP_EXTENSION, &I_Nfc_10px);
  205. browser_options.base_path = STORAGE_APP_DATA_PATH_PREFIX;
  206. bool res = dialog_file_browser_show(
  207. dev->dialogs, dev->load_path, picopass_app_folder, &browser_options);
  208. furi_string_free(picopass_app_folder);
  209. if(res) {
  210. FuriString* filename;
  211. filename = furi_string_alloc();
  212. path_extract_filename(dev->load_path, filename, true);
  213. strncpy(dev->dev_name, furi_string_get_cstr(filename), PICOPASS_DEV_NAME_MAX_LEN);
  214. res = picopass_device_load_data(dev, dev->load_path, true);
  215. if(res) {
  216. picopass_device_set_name(dev, dev->dev_name);
  217. }
  218. furi_string_free(filename);
  219. }
  220. return res;
  221. }
  222. void picopass_device_data_clear(PicopassDeviceData* dev_data) {
  223. for(size_t i = 0; i < PICOPASS_MAX_APP_LIMIT; i++) {
  224. memset(dev_data->AA1[i].data, 0, sizeof(dev_data->AA1[i].data));
  225. }
  226. dev_data->pacs.legacy = false;
  227. dev_data->pacs.se_enabled = false;
  228. dev_data->pacs.elite_kdf = false;
  229. dev_data->pacs.pin_length = 0;
  230. }
  231. bool picopass_device_delete(PicopassDevice* dev, bool use_load_path) {
  232. furi_assert(dev);
  233. bool deleted = false;
  234. FuriString* file_path;
  235. file_path = furi_string_alloc();
  236. do {
  237. // Delete original file
  238. if(use_load_path && !furi_string_empty(dev->load_path)) {
  239. furi_string_set(file_path, dev->load_path);
  240. } else {
  241. furi_string_printf(
  242. file_path, APP_DATA_PATH("%s%s"), dev->dev_name, PICOPASS_APP_EXTENSION);
  243. }
  244. if(!storage_simply_remove(dev->storage, furi_string_get_cstr(file_path))) break;
  245. deleted = true;
  246. } while(0);
  247. if(!deleted) {
  248. dialog_message_show_storage_error(dev->dialogs, "Can not remove file");
  249. }
  250. furi_string_free(file_path);
  251. return deleted;
  252. }
  253. void picopass_device_set_loading_callback(
  254. PicopassDevice* dev,
  255. PicopassLoadingCallback callback,
  256. void* context) {
  257. furi_assert(dev);
  258. dev->loading_cb = callback;
  259. dev->loading_cb_ctx = context;
  260. }
  261. ReturnCode picopass_device_decrypt(uint8_t* enc_data, uint8_t* dec_data) {
  262. uint8_t key[32] = {0};
  263. memcpy(key, picopass_iclass_decryptionkey, sizeof(picopass_iclass_decryptionkey));
  264. mbedtls_des3_context ctx;
  265. mbedtls_des3_init(&ctx);
  266. mbedtls_des3_set2key_dec(&ctx, key);
  267. mbedtls_des3_crypt_ecb(&ctx, enc_data, dec_data);
  268. mbedtls_des3_free(&ctx);
  269. return ERR_NONE;
  270. }
  271. ReturnCode picopass_device_parse_credential(PicopassBlock* AA1, PicopassPacs* pacs) {
  272. ReturnCode err;
  273. pacs->biometrics = AA1[6].data[4];
  274. pacs->pin_length = AA1[6].data[6] & 0x0F;
  275. pacs->encryption = AA1[6].data[7];
  276. if(pacs->encryption == PicopassDeviceEncryption3DES) {
  277. FURI_LOG_D(TAG, "3DES Encrypted");
  278. err = picopass_device_decrypt(AA1[7].data, pacs->credential);
  279. if(err != ERR_NONE) {
  280. FURI_LOG_E(TAG, "decrypt error %d", err);
  281. return err;
  282. }
  283. err = picopass_device_decrypt(AA1[8].data, pacs->pin0);
  284. if(err != ERR_NONE) {
  285. FURI_LOG_E(TAG, "decrypt error %d", err);
  286. return err;
  287. }
  288. err = picopass_device_decrypt(AA1[9].data, pacs->pin1);
  289. if(err != ERR_NONE) {
  290. FURI_LOG_E(TAG, "decrypt error %d", err);
  291. return err;
  292. }
  293. } else if(pacs->encryption == PicopassDeviceEncryptionNone) {
  294. FURI_LOG_D(TAG, "No Encryption");
  295. memcpy(pacs->credential, AA1[7].data, RFAL_PICOPASS_BLOCK_LEN);
  296. memcpy(pacs->pin0, AA1[8].data, RFAL_PICOPASS_BLOCK_LEN);
  297. memcpy(pacs->pin1, AA1[9].data, RFAL_PICOPASS_BLOCK_LEN);
  298. } else if(pacs->encryption == PicopassDeviceEncryptionDES) {
  299. FURI_LOG_D(TAG, "DES Encrypted");
  300. } else {
  301. FURI_LOG_D(TAG, "Unknown encryption");
  302. }
  303. pacs->sio = (AA1[10].data[0] == 0x30); // rough check
  304. return ERR_NONE;
  305. }
  306. ReturnCode picopass_device_parse_wiegand(uint8_t* data, PicopassWiegandRecord* record) {
  307. uint32_t* halves = (uint32_t*)data;
  308. if(halves[0] == 0) {
  309. uint8_t leading0s = __builtin_clz(REVERSE_BYTES_U32(halves[1]));
  310. record->bitLength = 31 - leading0s;
  311. } else {
  312. uint8_t leading0s = __builtin_clz(REVERSE_BYTES_U32(halves[0]));
  313. record->bitLength = 63 - leading0s;
  314. }
  315. FURI_LOG_D(TAG, "bitLength: %d", record->bitLength);
  316. if(record->bitLength == 26) {
  317. uint8_t* v4 = data + 4;
  318. uint32_t bot = v4[3] | (v4[2] << 8) | (v4[1] << 16) | (v4[0] << 24);
  319. record->CardNumber = (bot >> 1) & 0xFFFF;
  320. record->FacilityCode = (bot >> 17) & 0xFF;
  321. FURI_LOG_D(TAG, "FC: %u CN: %u", record->FacilityCode, record->CardNumber);
  322. record->valid = true;
  323. } else {
  324. record->CardNumber = 0;
  325. record->FacilityCode = 0;
  326. record->valid = false;
  327. }
  328. return ERR_NONE;
  329. }