nfc_worker.c 48 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082
  1. #include "nfc_worker_i.h"
  2. #include <furi_hal.h>
  3. #include <lib/nfc_protocols/nfc_util.h>
  4. #include <lib/nfc_protocols/emv_decoder.h>
  5. #include <lib/nfc_protocols/mifare_ultralight.h>
  6. #include <lib/nfc_protocols/mifare_classic.h>
  7. #include <lib/nfc_protocols/mifare_desfire.h>
  8. #include "helpers/nfc_mf_classic_dict.h"
  9. #define TAG "NfcWorker"
  10. /***************************** NFC Worker API *******************************/
  11. NfcWorker* nfc_worker_alloc() {
  12. NfcWorker* nfc_worker = malloc(sizeof(NfcWorker));
  13. // Worker thread attributes
  14. nfc_worker->thread = furi_thread_alloc();
  15. furi_thread_set_name(nfc_worker->thread, "NfcWorker");
  16. furi_thread_set_stack_size(nfc_worker->thread, 8192);
  17. furi_thread_set_callback(nfc_worker->thread, nfc_worker_task);
  18. furi_thread_set_context(nfc_worker->thread, nfc_worker);
  19. nfc_worker->callback = NULL;
  20. nfc_worker->context = NULL;
  21. nfc_worker->storage = furi_record_open("storage");
  22. // Initialize rfal
  23. while(furi_hal_nfc_is_busy()) {
  24. osDelay(10);
  25. }
  26. nfc_worker_change_state(nfc_worker, NfcWorkerStateReady);
  27. return nfc_worker;
  28. }
  29. void nfc_worker_free(NfcWorker* nfc_worker) {
  30. furi_assert(nfc_worker);
  31. furi_thread_free(nfc_worker->thread);
  32. furi_record_close("storage");
  33. free(nfc_worker);
  34. }
  35. NfcWorkerState nfc_worker_get_state(NfcWorker* nfc_worker) {
  36. return nfc_worker->state;
  37. }
  38. void nfc_worker_start(
  39. NfcWorker* nfc_worker,
  40. NfcWorkerState state,
  41. NfcDeviceData* dev_data,
  42. NfcWorkerCallback callback,
  43. void* context) {
  44. furi_assert(nfc_worker);
  45. furi_assert(dev_data);
  46. while(furi_hal_nfc_is_busy()) {
  47. osDelay(10);
  48. }
  49. nfc_worker->callback = callback;
  50. nfc_worker->context = context;
  51. nfc_worker->dev_data = dev_data;
  52. nfc_worker_change_state(nfc_worker, state);
  53. furi_thread_start(nfc_worker->thread);
  54. }
  55. void nfc_worker_stop(NfcWorker* nfc_worker) {
  56. furi_assert(nfc_worker);
  57. if(nfc_worker->state == NfcWorkerStateBroken || nfc_worker->state == NfcWorkerStateReady) {
  58. return;
  59. }
  60. furi_hal_nfc_stop();
  61. nfc_worker_change_state(nfc_worker, NfcWorkerStateStop);
  62. furi_thread_join(nfc_worker->thread);
  63. }
  64. void nfc_worker_change_state(NfcWorker* nfc_worker, NfcWorkerState state) {
  65. nfc_worker->state = state;
  66. }
  67. /***************************** NFC Worker Thread *******************************/
  68. int32_t nfc_worker_task(void* context) {
  69. NfcWorker* nfc_worker = context;
  70. furi_hal_power_insomnia_enter();
  71. furi_hal_nfc_exit_sleep();
  72. if(nfc_worker->state == NfcWorkerStateDetect) {
  73. nfc_worker_detect(nfc_worker);
  74. } else if(nfc_worker->state == NfcWorkerStateEmulate) {
  75. nfc_worker_emulate(nfc_worker);
  76. } else if(nfc_worker->state == NfcWorkerStateReadEMVApp) {
  77. nfc_worker_read_emv_app(nfc_worker);
  78. } else if(nfc_worker->state == NfcWorkerStateReadEMV) {
  79. nfc_worker_read_emv(nfc_worker);
  80. } else if(nfc_worker->state == NfcWorkerStateEmulateApdu) {
  81. nfc_worker_emulate_apdu(nfc_worker);
  82. } else if(nfc_worker->state == NfcWorkerStateReadMifareUl) {
  83. nfc_worker_read_mifare_ul(nfc_worker);
  84. } else if(nfc_worker->state == NfcWorkerStateEmulateMifareUl) {
  85. nfc_worker_emulate_mifare_ul(nfc_worker);
  86. } else if(nfc_worker->state == NfcWorkerStateReadMifareClassic) {
  87. nfc_worker_mifare_classic_dict_attack(nfc_worker);
  88. } else if(nfc_worker->state == NfcWorkerStateReadMifareDesfire) {
  89. nfc_worker_read_mifare_desfire(nfc_worker);
  90. } else if(nfc_worker->state == NfcWorkerStateField) {
  91. nfc_worker_field(nfc_worker);
  92. }
  93. furi_hal_nfc_deactivate();
  94. nfc_worker_change_state(nfc_worker, NfcWorkerStateReady);
  95. furi_hal_power_insomnia_exit();
  96. return 0;
  97. }
  98. void nfc_worker_detect(NfcWorker* nfc_worker) {
  99. rfalNfcDevice* dev_list;
  100. rfalNfcDevice* dev;
  101. uint8_t dev_cnt;
  102. nfc_device_data_clear(nfc_worker->dev_data);
  103. NfcDeviceCommonData* result = &nfc_worker->dev_data->nfc_data;
  104. while(nfc_worker->state == NfcWorkerStateDetect) {
  105. if(furi_hal_nfc_detect(&dev_list, &dev_cnt, 1000, true)) {
  106. // Process first found device
  107. dev = &dev_list[0];
  108. result->uid_len = dev->nfcidLen;
  109. memcpy(result->uid, dev->nfcid, dev->nfcidLen);
  110. if(dev->type == RFAL_NFC_LISTEN_TYPE_NFCA) {
  111. result->device = NfcDeviceNfca;
  112. result->atqa[0] = dev->dev.nfca.sensRes.anticollisionInfo;
  113. result->atqa[1] = dev->dev.nfca.sensRes.platformInfo;
  114. result->sak = dev->dev.nfca.selRes.sak;
  115. if(mf_ul_check_card_type(
  116. dev->dev.nfca.sensRes.anticollisionInfo,
  117. dev->dev.nfca.sensRes.platformInfo,
  118. dev->dev.nfca.selRes.sak)) {
  119. result->protocol = NfcDeviceProtocolMifareUl;
  120. } else if(mf_classic_check_card_type(
  121. dev->dev.nfca.sensRes.anticollisionInfo,
  122. dev->dev.nfca.sensRes.platformInfo,
  123. dev->dev.nfca.selRes.sak)) {
  124. result->protocol = NfcDeviceProtocolMifareClassic;
  125. } else if(mf_df_check_card_type(
  126. dev->dev.nfca.sensRes.anticollisionInfo,
  127. dev->dev.nfca.sensRes.platformInfo,
  128. dev->dev.nfca.selRes.sak)) {
  129. result->protocol = NfcDeviceProtocolMifareDesfire;
  130. } else if(dev->rfInterface == RFAL_NFC_INTERFACE_ISODEP) {
  131. result->protocol = NfcDeviceProtocolEMV;
  132. } else {
  133. result->protocol = NfcDeviceProtocolUnknown;
  134. }
  135. } else if(dev->type == RFAL_NFC_LISTEN_TYPE_NFCB) {
  136. result->device = NfcDeviceNfcb;
  137. } else if(dev->type == RFAL_NFC_LISTEN_TYPE_NFCF) {
  138. result->device = NfcDeviceNfcf;
  139. } else if(dev->type == RFAL_NFC_LISTEN_TYPE_NFCV) {
  140. result->device = NfcDeviceNfcv;
  141. }
  142. // Notify caller and exit
  143. if(nfc_worker->callback) {
  144. nfc_worker->callback(NfcWorkerEventSuccess, nfc_worker->context);
  145. }
  146. break;
  147. }
  148. osDelay(100);
  149. }
  150. }
  151. bool nfc_worker_emulate_uid_callback(
  152. uint8_t* buff_rx,
  153. uint16_t buff_rx_len,
  154. uint8_t* buff_tx,
  155. uint16_t* buff_tx_len,
  156. uint32_t* data_type,
  157. void* context) {
  158. furi_assert(context);
  159. NfcWorker* nfc_worker = context;
  160. NfcReaderRequestData* reader_data = &nfc_worker->dev_data->reader_data;
  161. reader_data->size = buff_rx_len / 8;
  162. if(reader_data->size > 0) {
  163. memcpy(reader_data->data, buff_rx, reader_data->size);
  164. if(nfc_worker->callback) {
  165. nfc_worker->callback(NfcWorkerEventSuccess, nfc_worker->context);
  166. }
  167. }
  168. return true;
  169. }
  170. void nfc_worker_emulate(NfcWorker* nfc_worker) {
  171. NfcDeviceCommonData* data = &nfc_worker->dev_data->nfc_data;
  172. while(nfc_worker->state == NfcWorkerStateEmulate) {
  173. furi_hal_nfc_emulate_nfca(
  174. data->uid,
  175. data->uid_len,
  176. data->atqa,
  177. data->sak,
  178. nfc_worker_emulate_uid_callback,
  179. nfc_worker,
  180. 1000);
  181. }
  182. }
  183. void nfc_worker_read_emv_app(NfcWorker* nfc_worker) {
  184. ReturnCode err;
  185. rfalNfcDevice* dev_list;
  186. EmvApplication emv_app = {};
  187. uint8_t dev_cnt = 0;
  188. uint8_t tx_buff[255] = {};
  189. uint16_t tx_len = 0;
  190. uint8_t* rx_buff;
  191. uint16_t* rx_len;
  192. NfcDeviceData* result = nfc_worker->dev_data;
  193. nfc_device_data_clear(result);
  194. while(nfc_worker->state == NfcWorkerStateReadEMVApp) {
  195. memset(&emv_app, 0, sizeof(emv_app));
  196. if(furi_hal_nfc_detect(&dev_list, &dev_cnt, 1000, false)) {
  197. // Card was found. Check that it supports EMV
  198. if(dev_list[0].rfInterface == RFAL_NFC_INTERFACE_ISODEP) {
  199. result->nfc_data.uid_len = dev_list[0].dev.nfca.nfcId1Len;
  200. result->nfc_data.atqa[0] = dev_list[0].dev.nfca.sensRes.anticollisionInfo;
  201. result->nfc_data.atqa[1] = dev_list[0].dev.nfca.sensRes.platformInfo;
  202. result->nfc_data.sak = dev_list[0].dev.nfca.selRes.sak;
  203. memcpy(
  204. result->nfc_data.uid, dev_list[0].dev.nfca.nfcId1, result->nfc_data.uid_len);
  205. result->nfc_data.protocol = NfcDeviceProtocolEMV;
  206. FURI_LOG_D(TAG, "Send select PPSE command");
  207. tx_len = emv_prepare_select_ppse(tx_buff);
  208. err = furi_hal_nfc_data_exchange(tx_buff, tx_len, &rx_buff, &rx_len, false);
  209. if(err != ERR_NONE) {
  210. FURI_LOG_D(TAG, "Error during selection PPSE request: %d", err);
  211. furi_hal_nfc_deactivate();
  212. continue;
  213. }
  214. FURI_LOG_D(TAG, "Select PPSE response received. Start parsing response");
  215. if(emv_decode_ppse_response(rx_buff, *rx_len, &emv_app)) {
  216. FURI_LOG_D(TAG, "Select PPSE responce parced");
  217. // Notify caller and exit
  218. result->emv_data.aid_len = emv_app.aid_len;
  219. memcpy(result->emv_data.aid, emv_app.aid, emv_app.aid_len);
  220. if(nfc_worker->callback) {
  221. nfc_worker->callback(NfcWorkerEventSuccess, nfc_worker->context);
  222. }
  223. break;
  224. } else {
  225. FURI_LOG_D(TAG, "Can't find pay application");
  226. furi_hal_nfc_deactivate();
  227. continue;
  228. }
  229. } else {
  230. // Can't find EMV card
  231. FURI_LOG_W(TAG, "Card doesn't support EMV");
  232. furi_hal_nfc_deactivate();
  233. }
  234. } else {
  235. // Can't find EMV card
  236. FURI_LOG_D(TAG, "Can't find any cards");
  237. furi_hal_nfc_deactivate();
  238. }
  239. osDelay(20);
  240. }
  241. }
  242. void nfc_worker_read_emv(NfcWorker* nfc_worker) {
  243. ReturnCode err;
  244. rfalNfcDevice* dev_list;
  245. EmvApplication emv_app = {};
  246. uint8_t dev_cnt = 0;
  247. uint8_t tx_buff[255] = {};
  248. uint16_t tx_len = 0;
  249. uint8_t* rx_buff;
  250. uint16_t* rx_len;
  251. NfcDeviceData* result = nfc_worker->dev_data;
  252. nfc_device_data_clear(result);
  253. while(nfc_worker->state == NfcWorkerStateReadEMV) {
  254. memset(&emv_app, 0, sizeof(emv_app));
  255. if(furi_hal_nfc_detect(&dev_list, &dev_cnt, 1000, false)) {
  256. // Card was found. Check that it supports EMV
  257. if(dev_list[0].rfInterface == RFAL_NFC_INTERFACE_ISODEP) {
  258. result->nfc_data.uid_len = dev_list[0].dev.nfca.nfcId1Len;
  259. result->nfc_data.atqa[0] = dev_list[0].dev.nfca.sensRes.anticollisionInfo;
  260. result->nfc_data.atqa[1] = dev_list[0].dev.nfca.sensRes.platformInfo;
  261. result->nfc_data.sak = dev_list[0].dev.nfca.selRes.sak;
  262. memcpy(
  263. result->nfc_data.uid, dev_list[0].dev.nfca.nfcId1, result->nfc_data.uid_len);
  264. result->nfc_data.protocol = NfcDeviceProtocolEMV;
  265. FURI_LOG_D(TAG, "Send select PPSE command");
  266. tx_len = emv_prepare_select_ppse(tx_buff);
  267. err = furi_hal_nfc_data_exchange(tx_buff, tx_len, &rx_buff, &rx_len, false);
  268. if(err != ERR_NONE) {
  269. FURI_LOG_D(TAG, "Error during selection PPSE request: %d", err);
  270. furi_hal_nfc_deactivate();
  271. continue;
  272. }
  273. FURI_LOG_D(TAG, "Select PPSE response received. Start parsing response");
  274. if(emv_decode_ppse_response(rx_buff, *rx_len, &emv_app)) {
  275. FURI_LOG_D(TAG, "Select PPSE responce parced");
  276. result->emv_data.aid_len = emv_app.aid_len;
  277. memcpy(result->emv_data.aid, emv_app.aid, emv_app.aid_len);
  278. } else {
  279. FURI_LOG_D(TAG, "Can't find pay application");
  280. furi_hal_nfc_deactivate();
  281. continue;
  282. }
  283. FURI_LOG_D(TAG, "Starting application ...");
  284. tx_len = emv_prepare_select_app(tx_buff, &emv_app);
  285. err = furi_hal_nfc_data_exchange(tx_buff, tx_len, &rx_buff, &rx_len, false);
  286. if(err != ERR_NONE) {
  287. FURI_LOG_D(TAG, "Error during application selection request: %d", err);
  288. furi_hal_nfc_deactivate();
  289. continue;
  290. }
  291. FURI_LOG_D(TAG, "Select application response received. Start parsing response");
  292. if(emv_decode_select_app_response(rx_buff, *rx_len, &emv_app)) {
  293. FURI_LOG_D(TAG, "Card name: %s", emv_app.name);
  294. memcpy(result->emv_data.name, emv_app.name, sizeof(emv_app.name));
  295. } else if(emv_app.pdol.size > 0) {
  296. FURI_LOG_D(TAG, "Can't find card name, but PDOL is present.");
  297. } else {
  298. FURI_LOG_D(TAG, "Can't find card name or PDOL");
  299. furi_hal_nfc_deactivate();
  300. continue;
  301. }
  302. FURI_LOG_D(TAG, "Starting Get Processing Options command ...");
  303. tx_len = emv_prepare_get_proc_opt(tx_buff, &emv_app);
  304. err = furi_hal_nfc_data_exchange(tx_buff, tx_len, &rx_buff, &rx_len, false);
  305. if(err != ERR_NONE) {
  306. FURI_LOG_D(TAG, "Error during Get Processing Options command: %d", err);
  307. furi_hal_nfc_deactivate();
  308. continue;
  309. }
  310. if(emv_decode_get_proc_opt(rx_buff, *rx_len, &emv_app)) {
  311. FURI_LOG_D(TAG, "Card number parsed");
  312. result->emv_data.number_len = emv_app.card_number_len;
  313. memcpy(result->emv_data.number, emv_app.card_number, emv_app.card_number_len);
  314. // Notify caller and exit
  315. if(nfc_worker->callback) {
  316. nfc_worker->callback(NfcWorkerEventSuccess, nfc_worker->context);
  317. }
  318. break;
  319. } else {
  320. // Mastercard doesn't give PAN / card number as GPO response
  321. // Iterate over all files found in application
  322. bool pan_found = false;
  323. for(uint8_t i = 0; (i < emv_app.afl.size) && !pan_found; i += 4) {
  324. uint8_t sfi = emv_app.afl.data[i] >> 3;
  325. uint8_t record_start = emv_app.afl.data[i + 1];
  326. uint8_t record_end = emv_app.afl.data[i + 2];
  327. // Iterate over all records in file
  328. for(uint8_t record = record_start; record <= record_end; ++record) {
  329. tx_len = emv_prepare_read_sfi_record(tx_buff, sfi, record);
  330. err = furi_hal_nfc_data_exchange(
  331. tx_buff, tx_len, &rx_buff, &rx_len, false);
  332. if(err != ERR_NONE) {
  333. FURI_LOG_D(
  334. TAG,
  335. "Error reading application sfi %d, record %d",
  336. sfi,
  337. record);
  338. }
  339. if(emv_decode_read_sfi_record(rx_buff, *rx_len, &emv_app)) {
  340. pan_found = true;
  341. break;
  342. }
  343. }
  344. }
  345. if(pan_found) {
  346. FURI_LOG_D(TAG, "Card PAN found");
  347. result->emv_data.number_len = emv_app.card_number_len;
  348. memcpy(
  349. result->emv_data.number,
  350. emv_app.card_number,
  351. result->emv_data.number_len);
  352. if(emv_app.exp_month) {
  353. result->emv_data.exp_mon = emv_app.exp_month;
  354. result->emv_data.exp_year = emv_app.exp_year;
  355. }
  356. if(emv_app.country_code) {
  357. result->emv_data.country_code = emv_app.country_code;
  358. }
  359. if(emv_app.currency_code) {
  360. result->emv_data.currency_code = emv_app.currency_code;
  361. }
  362. // Notify caller and exit
  363. if(nfc_worker->callback) {
  364. nfc_worker->callback(NfcWorkerEventSuccess, nfc_worker->context);
  365. }
  366. break;
  367. } else {
  368. FURI_LOG_D(TAG, "Can't read card number");
  369. }
  370. furi_hal_nfc_deactivate();
  371. }
  372. } else {
  373. // Can't find EMV card
  374. FURI_LOG_W(TAG, "Card doesn't support EMV");
  375. furi_hal_nfc_deactivate();
  376. }
  377. } else {
  378. // Can't find EMV card
  379. FURI_LOG_D(TAG, "Can't find any cards");
  380. furi_hal_nfc_deactivate();
  381. }
  382. osDelay(20);
  383. }
  384. }
  385. void nfc_worker_emulate_apdu(NfcWorker* nfc_worker) {
  386. ReturnCode err;
  387. uint8_t tx_buff[255] = {};
  388. uint16_t tx_len = 0;
  389. uint8_t* rx_buff;
  390. uint16_t* rx_len;
  391. NfcDeviceCommonData params = {
  392. .uid = {0xCF, 0x72, 0xd4, 0x40},
  393. .uid_len = 4,
  394. .atqa = {0x00, 0x04},
  395. .sak = 0x20,
  396. .device = NfcDeviceNfca,
  397. .protocol = NfcDeviceProtocolEMV,
  398. };
  399. // Test RX data
  400. const uint8_t debug_rx[] = {
  401. 0xba, 0x0b, 0xba, 0xba, 0x20, 0x00, 0x02, 0x28, 0xde, 0xad, 0xbe, 0xef, 0x00, 0xca, 0xca,
  402. 0xca, 0xfe, 0xfa, 0xce, 0x14, 0x88, 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, 0x88,
  403. 0x99, 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xfe, 0xdc, 0xba, 0x98, 0x76, 0x54, 0x32, 0x10, 0xba,
  404. 0x0b, 0xba, 0xba, 0x20, 0x00, 0x02, 0x28, 0xde, 0xad, 0xbe, 0xef, 0x00, 0xca, 0xca, 0xca,
  405. 0xfe, 0xfa, 0xce, 0x14, 0x88, 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, 0x88, 0x99,
  406. 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xfe, 0xdc, 0xba, 0x98, 0x76, 0x54, 0x32, 0x10, 0xba, 0x0b,
  407. 0xba, 0xba, 0x20, 0x00, 0x02, 0x28, 0xde, 0xad, 0xbe, 0xef, 0x00, 0xca, 0xca, 0xca, 0xfe,
  408. 0xfa, 0xce, 0x14, 0x88, 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, 0x88, 0x99, 0xaa,
  409. 0xbb, 0xcc, 0xdd, 0xee, 0xfe, 0xdc, 0xba, 0x98, 0x76, 0x54, 0x32, 0x10, 0xba, 0x0b, 0xba,
  410. 0xba, 0x20, 0x00, 0x02, 0x28, 0xde, 0xad, 0xbe, 0xef, 0x00, 0xca, 0xca, 0xca, 0xfe, 0xfa,
  411. 0xce, 0x14, 0x88, 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, 0x88, 0x99, 0xaa, 0xbb,
  412. 0xcc, 0xdd, 0xee, 0xfe, 0xdc, 0xba, 0x98, 0x76, 0x54, 0x32, 0x10, 0xba, 0x0b, 0xba, 0xba,
  413. 0x20, 0x00, 0x02, 0x28, 0xde, 0xad, 0xbe, 0xef, 0x00, 0xca, 0xca, 0xca, 0xfe, 0xfa, 0xce,
  414. 0x14, 0x88, 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, 0x88, 0x99, 0xaa, 0xbb, 0xcc,
  415. 0xdd, 0xee, 0xfe, 0xdc, 0xba, 0x98, 0x76, 0x54, 0x32, 0x10, 0xba, 0x0b, 0xba, 0xba, 0x20,
  416. 0x00, 0x02, 0x28, 0xde, 0xad, 0xbe, 0xef, 0x00, 0xca, 0xca, 0xca, 0xfe, 0xfa, 0xce, 0x14,
  417. 0x88, 0x00};
  418. // Test TX data
  419. const uint8_t debug_tx[] = {
  420. 0x12, 0x34, 0x56, 0x78, 0x9a, 0xbc, 0xde, 0xff, 0xfe, 0xdc, 0xba, 0x98, 0x76, 0x54, 0x32,
  421. 0x10, 0x14, 0x88, 0x02, 0x28, 0x00, 0x00, 0xca, 0xca, 0x00, 0xc0, 0xc0, 0x00, 0xde, 0xad,
  422. 0xbe, 0xef, 0xce, 0xee, 0xec, 0xca, 0xfe, 0xba, 0xba, 0xb0, 0xb0, 0xac, 0xdc, 0x11, 0x12,
  423. 0x34, 0x56, 0x78, 0x9a, 0xbc, 0xde, 0xff, 0xfe, 0xdc, 0xba, 0x98, 0x76, 0x54, 0x32, 0x10,
  424. 0x14, 0x88, 0x02, 0x28, 0x00, 0x00, 0xca, 0xca, 0x00, 0xc0, 0xc0, 0x00, 0xde, 0xad, 0xbe,
  425. 0xef, 0xce, 0xee, 0xec, 0xca, 0xfe, 0xba, 0xba, 0xb0, 0xb0, 0xac, 0xdc, 0x11, 0x12, 0x34,
  426. 0x56, 0x78, 0x9a, 0xbc, 0xde, 0xff, 0xfe, 0xdc, 0xba, 0x98, 0x76, 0x54, 0x32, 0x10, 0x14,
  427. 0x88, 0x02, 0x28, 0x00, 0x00, 0xca, 0xca, 0x00, 0xc0, 0xc0, 0x00, 0xde, 0xad, 0xbe, 0xef,
  428. 0xce, 0xee, 0xec, 0xca, 0xfe, 0xba, 0xba, 0xb0, 0xb0, 0xac, 0xdc, 0x11, 0x12, 0x34, 0x56,
  429. 0x78, 0x9a, 0xbc, 0xde, 0xff, 0xfe, 0xdc, 0xba, 0x98, 0x76, 0x54, 0x32, 0x10, 0x14, 0x88,
  430. 0x02, 0x28, 0x00, 0x00, 0xca, 0xca, 0x00, 0xc0, 0xc0, 0x00, 0xde, 0xad, 0xbe, 0xef, 0xce,
  431. 0xee, 0xec, 0xca, 0xfe, 0xba, 0xba, 0xb0, 0xb0, 0xac, 0xdc, 0x11, 0x12, 0x34, 0x56, 0x78,
  432. 0x9a, 0xbc, 0xde, 0xff, 0xfe, 0xdc, 0xba, 0x98, 0x76, 0x54, 0x32, 0x10, 0x14, 0x88, 0x02,
  433. 0x28, 0x00, 0x00, 0xca, 0xca, 0x00, 0xc0, 0xc0, 0x00, 0xde, 0xad, 0xbe, 0xef, 0xce, 0xee,
  434. 0xec, 0xca, 0xfe, 0xba, 0xba, 0xb0, 0xb0, 0xac, 0xdc, 0x11, 0x12, 0x34, 0x56, 0x78, 0x9a,
  435. 0xbc, 0xde, 0xff, 0xfe, 0xdc, 0xba, 0x98, 0x76, 0x54, 0x32, 0x10, 0x14, 0x88, 0x02, 0x28,
  436. 0x00, 0x00};
  437. while(nfc_worker->state == NfcWorkerStateEmulateApdu) {
  438. if(furi_hal_nfc_listen(params.uid, params.uid_len, params.atqa, params.sak, false, 300)) {
  439. FURI_LOG_D(TAG, "POS terminal detected");
  440. // Read data from POS terminal
  441. err = furi_hal_nfc_data_exchange(NULL, 0, &rx_buff, &rx_len, false);
  442. if(err == ERR_NONE) {
  443. FURI_LOG_D(TAG, "Received Select PPSE");
  444. } else {
  445. FURI_LOG_D(TAG, "Error in 1st data exchange: select PPSE");
  446. furi_hal_nfc_deactivate();
  447. continue;
  448. }
  449. FURI_LOG_D(TAG, "Transive SELECT PPSE ANS");
  450. tx_len = emv_select_ppse_ans(tx_buff);
  451. err = furi_hal_nfc_data_exchange(tx_buff, tx_len, &rx_buff, &rx_len, false);
  452. if(err == ERR_NONE) {
  453. FURI_LOG_D(TAG, "Received Select APP");
  454. } else {
  455. FURI_LOG_D(TAG, "Error in 2nd data exchange: select APP");
  456. furi_hal_nfc_deactivate();
  457. continue;
  458. }
  459. FURI_LOG_D(TAG, "Transive SELECT APP ANS");
  460. tx_len = emv_select_app_ans(tx_buff);
  461. err = furi_hal_nfc_data_exchange(tx_buff, tx_len, &rx_buff, &rx_len, false);
  462. if(err == ERR_NONE) {
  463. FURI_LOG_D(TAG, "Received PDOL");
  464. } else {
  465. FURI_LOG_D(TAG, "Error in 3rd data exchange: receive PDOL");
  466. furi_hal_nfc_deactivate();
  467. continue;
  468. }
  469. FURI_LOG_D(TAG, "Transive PDOL ANS");
  470. tx_len = emv_get_proc_opt_ans(tx_buff);
  471. err = furi_hal_nfc_data_exchange(tx_buff, tx_len, &rx_buff, &rx_len, false);
  472. if(err == ERR_NONE) {
  473. FURI_LOG_D(TAG, "Transive PDOL ANS");
  474. } else {
  475. FURI_LOG_D(TAG, "Error in 4rd data exchange: Transive PDOL ANS");
  476. furi_hal_nfc_deactivate();
  477. continue;
  478. }
  479. if(*rx_len != sizeof(debug_rx) || memcmp(rx_buff, debug_rx, sizeof(debug_rx))) {
  480. FURI_LOG_D(TAG, "Failed long message test");
  481. } else {
  482. FURI_LOG_D(TAG, "Correct debug message received");
  483. tx_len = sizeof(debug_tx);
  484. err = furi_hal_nfc_data_exchange(
  485. (uint8_t*)debug_tx, tx_len, &rx_buff, &rx_len, false);
  486. if(err == ERR_NONE) {
  487. FURI_LOG_D(TAG, "Transive Debug message");
  488. }
  489. }
  490. furi_hal_nfc_deactivate();
  491. } else {
  492. FURI_LOG_D(TAG, "Can't find reader");
  493. }
  494. osDelay(20);
  495. }
  496. }
  497. void nfc_worker_read_mifare_ul(NfcWorker* nfc_worker) {
  498. ReturnCode err;
  499. rfalNfcDevice* dev_list;
  500. uint8_t dev_cnt = 0;
  501. uint8_t tx_buff[255] = {};
  502. uint16_t tx_len = 0;
  503. uint8_t* rx_buff;
  504. uint16_t* rx_len;
  505. MifareUlDevice mf_ul_read;
  506. NfcDeviceData* result = nfc_worker->dev_data;
  507. nfc_device_data_clear(result);
  508. while(nfc_worker->state == NfcWorkerStateReadMifareUl) {
  509. furi_hal_nfc_deactivate();
  510. memset(&mf_ul_read, 0, sizeof(mf_ul_read));
  511. if(furi_hal_nfc_detect(&dev_list, &dev_cnt, 300, false)) {
  512. if(dev_list[0].type == RFAL_NFC_LISTEN_TYPE_NFCA &&
  513. mf_ul_check_card_type(
  514. dev_list[0].dev.nfca.sensRes.anticollisionInfo,
  515. dev_list[0].dev.nfca.sensRes.platformInfo,
  516. dev_list[0].dev.nfca.selRes.sak)) {
  517. // Get Mifare Ultralight version
  518. FURI_LOG_D(TAG, "Found Mifare Ultralight tag. Reading tag version");
  519. tx_len = mf_ul_prepare_get_version(tx_buff);
  520. err = furi_hal_nfc_data_exchange(tx_buff, tx_len, &rx_buff, &rx_len, false);
  521. if(err == ERR_NONE) {
  522. mf_ul_parse_get_version_response(rx_buff, &mf_ul_read);
  523. FURI_LOG_D(
  524. TAG,
  525. "Mifare Ultralight Type: %d, Pages: %d",
  526. mf_ul_read.data.type,
  527. mf_ul_read.pages_to_read);
  528. FURI_LOG_D(TAG, "Reading signature ...");
  529. tx_len = mf_ul_prepare_read_signature(tx_buff);
  530. if(furi_hal_nfc_data_exchange(tx_buff, tx_len, &rx_buff, &rx_len, false)) {
  531. FURI_LOG_D(TAG, "Failed reading signature");
  532. memset(mf_ul_read.data.signature, 0, sizeof(mf_ul_read.data.signature));
  533. } else {
  534. mf_ul_parse_read_signature_response(rx_buff, &mf_ul_read);
  535. }
  536. } else if(err == ERR_TIMEOUT) {
  537. FURI_LOG_D(
  538. TAG,
  539. "Card doesn't respond to GET VERSION command. Setting default read parameters");
  540. err = ERR_NONE;
  541. mf_ul_set_default_version(&mf_ul_read);
  542. // Reinit device
  543. furi_hal_nfc_deactivate();
  544. if(!furi_hal_nfc_detect(&dev_list, &dev_cnt, 300, false)) {
  545. FURI_LOG_D(TAG, "Lost connection. Restarting search");
  546. continue;
  547. }
  548. } else {
  549. FURI_LOG_D(
  550. TAG, "Error getting Mifare Ultralight version. Error code: %d", err);
  551. continue;
  552. }
  553. if(mf_ul_read.support_fast_read) {
  554. FURI_LOG_D(TAG, "Reading pages ...");
  555. tx_len = mf_ul_prepare_fast_read(tx_buff, 0x00, mf_ul_read.pages_to_read - 1);
  556. if(furi_hal_nfc_data_exchange(tx_buff, tx_len, &rx_buff, &rx_len, false)) {
  557. FURI_LOG_D(TAG, "Failed reading pages");
  558. continue;
  559. } else {
  560. mf_ul_parse_fast_read_response(
  561. rx_buff, 0x00, mf_ul_read.pages_to_read - 1, &mf_ul_read);
  562. }
  563. FURI_LOG_D(TAG, "Reading 3 counters ...");
  564. for(uint8_t i = 0; i < 3; i++) {
  565. tx_len = mf_ul_prepare_read_cnt(tx_buff, i);
  566. if(furi_hal_nfc_data_exchange(tx_buff, tx_len, &rx_buff, &rx_len, false)) {
  567. FURI_LOG_W(TAG, "Failed reading Counter %d", i);
  568. mf_ul_read.data.counter[i] = 0;
  569. } else {
  570. mf_ul_parse_read_cnt_response(rx_buff, i, &mf_ul_read);
  571. }
  572. }
  573. FURI_LOG_D(TAG, "Checking tearing flags ...");
  574. for(uint8_t i = 0; i < 3; i++) {
  575. tx_len = mf_ul_prepare_check_tearing(tx_buff, i);
  576. if(furi_hal_nfc_data_exchange(tx_buff, tx_len, &rx_buff, &rx_len, false)) {
  577. FURI_LOG_D(TAG, "Error checking tearing flag %d", i);
  578. mf_ul_read.data.tearing[i] = MF_UL_TEARING_FLAG_DEFAULT;
  579. } else {
  580. mf_ul_parse_check_tearing_response(rx_buff, i, &mf_ul_read);
  581. }
  582. }
  583. } else {
  584. // READ card with READ command (4 pages at a time)
  585. for(uint8_t page = 0; page < mf_ul_read.pages_to_read; page += 4) {
  586. FURI_LOG_D(TAG, "Reading pages %d - %d ...", page, page + 3);
  587. tx_len = mf_ul_prepare_read(tx_buff, page);
  588. if(furi_hal_nfc_data_exchange(tx_buff, tx_len, &rx_buff, &rx_len, false)) {
  589. FURI_LOG_D(TAG, "Read pages %d - %d failed", page, page + 3);
  590. continue;
  591. } else {
  592. mf_ul_parse_read_response(rx_buff, page, &mf_ul_read);
  593. }
  594. }
  595. }
  596. // Fill result data
  597. result->nfc_data.uid_len = dev_list[0].dev.nfca.nfcId1Len;
  598. result->nfc_data.atqa[0] = dev_list[0].dev.nfca.sensRes.anticollisionInfo;
  599. result->nfc_data.atqa[1] = dev_list[0].dev.nfca.sensRes.platformInfo;
  600. result->nfc_data.sak = dev_list[0].dev.nfca.selRes.sak;
  601. result->nfc_data.protocol = NfcDeviceProtocolMifareUl;
  602. memcpy(
  603. result->nfc_data.uid, dev_list[0].dev.nfca.nfcId1, result->nfc_data.uid_len);
  604. result->mf_ul_data = mf_ul_read.data;
  605. // Notify caller and exit
  606. if(nfc_worker->callback) {
  607. nfc_worker->callback(NfcWorkerEventSuccess, nfc_worker->context);
  608. }
  609. break;
  610. } else {
  611. FURI_LOG_W(TAG, "Tag does not support Mifare Ultralight");
  612. }
  613. } else {
  614. FURI_LOG_D(TAG, "Can't find any tags");
  615. }
  616. osDelay(100);
  617. }
  618. }
  619. void nfc_worker_emulate_mifare_ul(NfcWorker* nfc_worker) {
  620. NfcDeviceCommonData* nfc_common = &nfc_worker->dev_data->nfc_data;
  621. MifareUlDevice mf_ul_emulate;
  622. mf_ul_prepare_emulation(&mf_ul_emulate, &nfc_worker->dev_data->mf_ul_data);
  623. while(nfc_worker->state == NfcWorkerStateEmulateMifareUl) {
  624. furi_hal_nfc_emulate_nfca(
  625. nfc_common->uid,
  626. nfc_common->uid_len,
  627. nfc_common->atqa,
  628. nfc_common->sak,
  629. mf_ul_prepare_emulation_response,
  630. &mf_ul_emulate,
  631. 5000);
  632. // Check if data was modified
  633. if(mf_ul_emulate.data_changed) {
  634. nfc_worker->dev_data->mf_ul_data = mf_ul_emulate.data;
  635. if(nfc_worker->callback) {
  636. nfc_worker->callback(NfcWorkerEventSuccess, nfc_worker->context);
  637. }
  638. mf_ul_emulate.data_changed = false;
  639. }
  640. }
  641. }
  642. void nfc_worker_mifare_classic_dict_attack(NfcWorker* nfc_worker) {
  643. furi_assert(nfc_worker->callback);
  644. rfalNfcDevice* dev_list;
  645. rfalNfcDevice* dev;
  646. NfcDeviceCommonData* nfc_common;
  647. uint8_t dev_cnt = 0;
  648. FuriHalNfcTxRxContext tx_rx_ctx = {};
  649. MfClassicAuthContext auth_ctx = {};
  650. MfClassicReader reader = {};
  651. uint64_t curr_key = 0;
  652. uint16_t curr_sector = 0;
  653. uint8_t total_sectors = 0;
  654. NfcWorkerEvent event;
  655. // Open dictionary
  656. nfc_worker->dict_stream = file_stream_alloc(nfc_worker->storage);
  657. if(!nfc_mf_classic_dict_open_file(nfc_worker->dict_stream)) {
  658. event = NfcWorkerEventNoDictFound;
  659. nfc_worker->callback(event, nfc_worker->context);
  660. nfc_mf_classic_dict_close_file(nfc_worker->dict_stream);
  661. stream_free(nfc_worker->dict_stream);
  662. return;
  663. }
  664. // Detect Mifare Classic card
  665. while(nfc_worker->state == NfcWorkerStateReadMifareClassic) {
  666. if(furi_hal_nfc_detect(&dev_list, &dev_cnt, 300, false)) {
  667. dev = &dev_list[0];
  668. if(mf_classic_get_type(
  669. dev->nfcid,
  670. dev->nfcidLen,
  671. dev->dev.nfca.sensRes.anticollisionInfo,
  672. dev->dev.nfca.sensRes.platformInfo,
  673. dev->dev.nfca.selRes.sak,
  674. &reader)) {
  675. total_sectors = mf_classic_get_total_sectors_num(&reader);
  676. if(reader.type == MfClassicType1k) {
  677. event = NfcWorkerEventDetectedClassic1k;
  678. } else {
  679. event = NfcWorkerEventDetectedClassic4k;
  680. }
  681. nfc_worker->callback(event, nfc_worker->context);
  682. break;
  683. }
  684. } else {
  685. event = NfcWorkerEventNoCardDetected;
  686. nfc_worker->callback(event, nfc_worker->context);
  687. }
  688. }
  689. if(nfc_worker->state == NfcWorkerStateReadMifareClassic) {
  690. bool card_removed_notified = false;
  691. bool card_found_notified = false;
  692. // Seek for mifare classic keys
  693. for(curr_sector = 0; curr_sector < total_sectors; curr_sector++) {
  694. FURI_LOG_I(TAG, "Sector: %d ...", curr_sector);
  695. event = NfcWorkerEventNewSector;
  696. nfc_worker->callback(event, nfc_worker->context);
  697. mf_classic_auth_init_context(&auth_ctx, reader.cuid, curr_sector);
  698. bool sector_key_found = false;
  699. while(nfc_mf_classic_dict_get_next_key(nfc_worker->dict_stream, &curr_key)) {
  700. furi_hal_nfc_deactivate();
  701. if(furi_hal_nfc_activate_nfca(300, &reader.cuid)) {
  702. if(!card_found_notified) {
  703. if(reader.type == MfClassicType1k) {
  704. event = NfcWorkerEventDetectedClassic1k;
  705. } else {
  706. event = NfcWorkerEventDetectedClassic4k;
  707. }
  708. nfc_worker->callback(event, nfc_worker->context);
  709. card_found_notified = true;
  710. card_removed_notified = false;
  711. }
  712. FURI_LOG_D(
  713. TAG,
  714. "Try to auth to sector %d with key %04lx%08lx",
  715. curr_sector,
  716. (uint32_t)(curr_key >> 32),
  717. (uint32_t)curr_key);
  718. if(mf_classic_auth_attempt(&tx_rx_ctx, &auth_ctx, curr_key)) {
  719. sector_key_found = true;
  720. if((auth_ctx.key_a != MF_CLASSIC_NO_KEY) &&
  721. (auth_ctx.key_b != MF_CLASSIC_NO_KEY))
  722. break;
  723. }
  724. } else {
  725. // Notify that no tag is availalble
  726. FURI_LOG_D(TAG, "Can't find tags");
  727. if(!card_removed_notified) {
  728. event = NfcWorkerEventNoCardDetected;
  729. nfc_worker->callback(event, nfc_worker->context);
  730. card_removed_notified = true;
  731. card_found_notified = false;
  732. }
  733. }
  734. if(nfc_worker->state != NfcWorkerStateReadMifareClassic) break;
  735. }
  736. if(nfc_worker->state != NfcWorkerStateReadMifareClassic) break;
  737. if(sector_key_found) {
  738. // Notify that keys were found
  739. if(auth_ctx.key_a != MF_CLASSIC_NO_KEY) {
  740. FURI_LOG_I(
  741. TAG,
  742. "Sector %d key A: %04lx%08lx",
  743. curr_sector,
  744. (uint32_t)(auth_ctx.key_a >> 32),
  745. (uint32_t)auth_ctx.key_a);
  746. event = NfcWorkerEventFoundKeyA;
  747. nfc_worker->callback(event, nfc_worker->context);
  748. }
  749. if(auth_ctx.key_b != MF_CLASSIC_NO_KEY) {
  750. FURI_LOG_I(
  751. TAG,
  752. "Sector %d key B: %04lx%08lx",
  753. curr_sector,
  754. (uint32_t)(auth_ctx.key_b >> 32),
  755. (uint32_t)auth_ctx.key_b);
  756. event = NfcWorkerEventFoundKeyB;
  757. nfc_worker->callback(event, nfc_worker->context);
  758. }
  759. // Add sectors to read sequence
  760. mf_classic_reader_add_sector(&reader, curr_sector, auth_ctx.key_a, auth_ctx.key_b);
  761. }
  762. nfc_mf_classic_dict_reset(nfc_worker->dict_stream);
  763. }
  764. }
  765. if(nfc_worker->state == NfcWorkerStateReadMifareClassic) {
  766. FURI_LOG_I(TAG, "Found keys to %d sectors. Start reading sectors", reader.sectors_to_read);
  767. uint8_t sectors_read =
  768. mf_classic_read_card(&tx_rx_ctx, &reader, &nfc_worker->dev_data->mf_classic_data);
  769. if(sectors_read) {
  770. dev = &dev_list[0];
  771. nfc_common = &nfc_worker->dev_data->nfc_data;
  772. nfc_common->uid_len = dev->dev.nfca.nfcId1Len;
  773. nfc_common->atqa[0] = dev->dev.nfca.sensRes.anticollisionInfo;
  774. nfc_common->atqa[1] = dev->dev.nfca.sensRes.platformInfo;
  775. nfc_common->sak = dev->dev.nfca.selRes.sak;
  776. nfc_common->protocol = NfcDeviceProtocolMifareClassic;
  777. memcpy(nfc_common->uid, dev->dev.nfca.nfcId1, nfc_common->uid_len);
  778. event = NfcWorkerEventSuccess;
  779. FURI_LOG_I(TAG, "Successfully read %d sectors", sectors_read);
  780. } else {
  781. event = NfcWorkerEventFail;
  782. FURI_LOG_W(TAG, "Failed to read any sector");
  783. }
  784. nfc_worker->callback(event, nfc_worker->context);
  785. }
  786. nfc_mf_classic_dict_close_file(nfc_worker->dict_stream);
  787. stream_free(nfc_worker->dict_stream);
  788. }
  789. ReturnCode nfc_exchange_full(
  790. uint8_t* tx_buff,
  791. uint16_t tx_len,
  792. uint8_t* rx_buff,
  793. uint16_t rx_cap,
  794. uint16_t* rx_len) {
  795. ReturnCode err;
  796. uint8_t* part_buff;
  797. uint16_t* part_len;
  798. err = furi_hal_nfc_data_exchange(tx_buff, tx_len, &part_buff, &part_len, false);
  799. if(*part_len > rx_cap) {
  800. return ERR_OVERRUN;
  801. }
  802. memcpy(rx_buff, part_buff, *part_len);
  803. *rx_len = *part_len;
  804. while(err == ERR_NONE && rx_buff[0] == 0xAF) {
  805. err = furi_hal_nfc_data_exchange(rx_buff, 1, &part_buff, &part_len, false);
  806. if(*part_len > rx_cap - *rx_len) {
  807. return ERR_OVERRUN;
  808. }
  809. if(*part_len == 0) {
  810. return ERR_PROTO;
  811. }
  812. memcpy(rx_buff + *rx_len, part_buff + 1, *part_len - 1);
  813. *rx_buff = *part_buff;
  814. *rx_len += *part_len - 1;
  815. }
  816. return err;
  817. }
  818. void nfc_worker_read_mifare_desfire(NfcWorker* nfc_worker) {
  819. ReturnCode err;
  820. rfalNfcDevice* dev_list;
  821. uint8_t dev_cnt = 0;
  822. uint8_t tx_buff[64] = {};
  823. uint16_t tx_len = 0;
  824. uint8_t rx_buff[512] = {};
  825. uint16_t rx_len;
  826. NfcDeviceData* result = nfc_worker->dev_data;
  827. nfc_device_data_clear(result);
  828. MifareDesfireData* data = &result->mf_df_data;
  829. while(nfc_worker->state == NfcWorkerStateReadMifareDesfire) {
  830. furi_hal_nfc_deactivate();
  831. if(!furi_hal_nfc_detect(&dev_list, &dev_cnt, 300, false)) {
  832. osDelay(100);
  833. continue;
  834. }
  835. memset(data, 0, sizeof(MifareDesfireData));
  836. if(dev_list[0].type != RFAL_NFC_LISTEN_TYPE_NFCA ||
  837. !mf_df_check_card_type(
  838. dev_list[0].dev.nfca.sensRes.anticollisionInfo,
  839. dev_list[0].dev.nfca.sensRes.platformInfo,
  840. dev_list[0].dev.nfca.selRes.sak)) {
  841. FURI_LOG_D(TAG, "Tag is not DESFire");
  842. osDelay(100);
  843. continue;
  844. }
  845. FURI_LOG_D(TAG, "Found DESFire tag");
  846. // Fill non-DESFire result data
  847. result->nfc_data.uid_len = dev_list[0].dev.nfca.nfcId1Len;
  848. result->nfc_data.atqa[0] = dev_list[0].dev.nfca.sensRes.anticollisionInfo;
  849. result->nfc_data.atqa[1] = dev_list[0].dev.nfca.sensRes.platformInfo;
  850. result->nfc_data.sak = dev_list[0].dev.nfca.selRes.sak;
  851. result->nfc_data.device = NfcDeviceNfca;
  852. result->nfc_data.protocol = NfcDeviceProtocolMifareDesfire;
  853. memcpy(result->nfc_data.uid, dev_list[0].dev.nfca.nfcId1, result->nfc_data.uid_len);
  854. // Get DESFire version
  855. tx_len = mf_df_prepare_get_version(tx_buff);
  856. err = nfc_exchange_full(tx_buff, tx_len, rx_buff, sizeof(rx_buff), &rx_len);
  857. if(err != ERR_NONE) {
  858. FURI_LOG_W(TAG, "Bad exchange getting version, err: %d", err);
  859. continue;
  860. }
  861. if(!mf_df_parse_get_version_response(rx_buff, rx_len, &data->version)) {
  862. FURI_LOG_W(TAG, "Bad DESFire GET_VERSION response");
  863. continue;
  864. }
  865. tx_len = mf_df_prepare_get_free_memory(tx_buff);
  866. err = nfc_exchange_full(tx_buff, tx_len, rx_buff, sizeof(rx_buff), &rx_len);
  867. if(err == ERR_NONE) {
  868. data->free_memory = malloc(sizeof(MifareDesfireFreeMemory));
  869. memset(data->free_memory, 0, sizeof(MifareDesfireFreeMemory));
  870. if(!mf_df_parse_get_free_memory_response(rx_buff, rx_len, data->free_memory)) {
  871. FURI_LOG_D(TAG, "Bad DESFire GET_FREE_MEMORY response (normal for pre-EV1 cards)");
  872. free(data->free_memory);
  873. data->free_memory = NULL;
  874. }
  875. }
  876. tx_len = mf_df_prepare_get_key_settings(tx_buff);
  877. err = nfc_exchange_full(tx_buff, tx_len, rx_buff, sizeof(rx_buff), &rx_len);
  878. if(err != ERR_NONE) {
  879. FURI_LOG_D(TAG, "Bad exchange getting key settings, err: %d", err);
  880. } else {
  881. data->master_key_settings = malloc(sizeof(MifareDesfireKeySettings));
  882. memset(data->master_key_settings, 0, sizeof(MifareDesfireKeySettings));
  883. if(!mf_df_parse_get_key_settings_response(rx_buff, rx_len, data->master_key_settings)) {
  884. FURI_LOG_W(TAG, "Bad DESFire GET_KEY_SETTINGS response");
  885. free(data->master_key_settings);
  886. data->master_key_settings = NULL;
  887. }
  888. MifareDesfireKeyVersion** key_version_head =
  889. &data->master_key_settings->key_version_head;
  890. for(uint8_t key_id = 0; key_id < data->master_key_settings->max_keys; key_id++) {
  891. tx_len = mf_df_prepare_get_key_version(tx_buff, key_id);
  892. err = nfc_exchange_full(tx_buff, tx_len, rx_buff, sizeof(rx_buff), &rx_len);
  893. if(err != ERR_NONE) {
  894. FURI_LOG_W(TAG, "Bad exchange getting key version, err: %d", err);
  895. continue;
  896. }
  897. MifareDesfireKeyVersion* key_version = malloc(sizeof(MifareDesfireKeyVersion));
  898. memset(key_version, 0, sizeof(MifareDesfireKeyVersion));
  899. key_version->id = key_id;
  900. if(!mf_df_parse_get_key_version_response(rx_buff, rx_len, key_version)) {
  901. FURI_LOG_W(TAG, "Bad DESFire GET_KEY_VERSION response");
  902. free(key_version);
  903. continue;
  904. }
  905. *key_version_head = key_version;
  906. key_version_head = &key_version->next;
  907. }
  908. }
  909. tx_len = mf_df_prepare_get_application_ids(tx_buff);
  910. err = nfc_exchange_full(tx_buff, tx_len, rx_buff, sizeof(rx_buff), &rx_len);
  911. if(err != ERR_NONE) {
  912. FURI_LOG_W(TAG, "Bad exchange getting application IDs, err: %d", err);
  913. } else {
  914. if(!mf_df_parse_get_application_ids_response(rx_buff, rx_len, &data->app_head)) {
  915. FURI_LOG_W(TAG, "Bad DESFire GET_APPLICATION_IDS response");
  916. }
  917. }
  918. for(MifareDesfireApplication* app = data->app_head; app; app = app->next) {
  919. tx_len = mf_df_prepare_select_application(tx_buff, app->id);
  920. err = nfc_exchange_full(tx_buff, tx_len, rx_buff, sizeof(rx_buff), &rx_len);
  921. if(!mf_df_parse_select_application_response(rx_buff, rx_len)) {
  922. FURI_LOG_W(TAG, "Bad exchange selecting application, err: %d", err);
  923. continue;
  924. }
  925. tx_len = mf_df_prepare_get_key_settings(tx_buff);
  926. err = nfc_exchange_full(tx_buff, tx_len, rx_buff, sizeof(rx_buff), &rx_len);
  927. if(err != ERR_NONE) {
  928. FURI_LOG_W(TAG, "Bad exchange getting key settings, err: %d", err);
  929. } else {
  930. app->key_settings = malloc(sizeof(MifareDesfireKeySettings));
  931. memset(app->key_settings, 0, sizeof(MifareDesfireKeySettings));
  932. if(!mf_df_parse_get_key_settings_response(rx_buff, rx_len, app->key_settings)) {
  933. FURI_LOG_W(TAG, "Bad DESFire GET_KEY_SETTINGS response");
  934. free(app->key_settings);
  935. app->key_settings = NULL;
  936. }
  937. MifareDesfireKeyVersion** key_version_head = &app->key_settings->key_version_head;
  938. for(uint8_t key_id = 0; key_id < app->key_settings->max_keys; key_id++) {
  939. tx_len = mf_df_prepare_get_key_version(tx_buff, key_id);
  940. err = nfc_exchange_full(tx_buff, tx_len, rx_buff, sizeof(rx_buff), &rx_len);
  941. if(err != ERR_NONE) {
  942. FURI_LOG_W(TAG, "Bad exchange getting key version, err: %d", err);
  943. continue;
  944. }
  945. MifareDesfireKeyVersion* key_version = malloc(sizeof(MifareDesfireKeyVersion));
  946. memset(key_version, 0, sizeof(MifareDesfireKeyVersion));
  947. key_version->id = key_id;
  948. if(!mf_df_parse_get_key_version_response(rx_buff, rx_len, key_version)) {
  949. FURI_LOG_W(TAG, "Bad DESFire GET_KEY_VERSION response");
  950. free(key_version);
  951. continue;
  952. }
  953. *key_version_head = key_version;
  954. key_version_head = &key_version->next;
  955. }
  956. }
  957. tx_len = mf_df_prepare_get_file_ids(tx_buff);
  958. err = nfc_exchange_full(tx_buff, tx_len, rx_buff, sizeof(rx_buff), &rx_len);
  959. if(err != ERR_NONE) {
  960. FURI_LOG_W(TAG, "Bad exchange getting file IDs, err: %d", err);
  961. } else {
  962. if(!mf_df_parse_get_file_ids_response(rx_buff, rx_len, &app->file_head)) {
  963. FURI_LOG_W(TAG, "Bad DESFire GET_FILE_IDS response");
  964. }
  965. }
  966. for(MifareDesfireFile* file = app->file_head; file; file = file->next) {
  967. tx_len = mf_df_prepare_get_file_settings(tx_buff, file->id);
  968. err = nfc_exchange_full(tx_buff, tx_len, rx_buff, sizeof(rx_buff), &rx_len);
  969. if(err != ERR_NONE) {
  970. FURI_LOG_W(TAG, "Bad exchange getting file settings, err: %d", err);
  971. continue;
  972. }
  973. if(!mf_df_parse_get_file_settings_response(rx_buff, rx_len, file)) {
  974. FURI_LOG_W(TAG, "Bad DESFire GET_FILE_SETTINGS response");
  975. continue;
  976. }
  977. switch(file->type) {
  978. case MifareDesfireFileTypeStandard:
  979. case MifareDesfireFileTypeBackup:
  980. tx_len = mf_df_prepare_read_data(tx_buff, file->id, 0, 0);
  981. break;
  982. case MifareDesfireFileTypeValue:
  983. tx_len = mf_df_prepare_get_value(tx_buff, file->id);
  984. break;
  985. case MifareDesfireFileTypeLinearRecord:
  986. case MifareDesfireFileTypeCyclicRecord:
  987. tx_len = mf_df_prepare_read_records(tx_buff, file->id, 0, 0);
  988. break;
  989. }
  990. err = nfc_exchange_full(tx_buff, tx_len, rx_buff, sizeof(rx_buff), &rx_len);
  991. if(err != ERR_NONE) {
  992. FURI_LOG_W(TAG, "Bad exchange reading file %d, err: %d", file->id, err);
  993. continue;
  994. }
  995. if(!mf_df_parse_read_data_response(rx_buff, rx_len, file)) {
  996. FURI_LOG_W(TAG, "Bad response reading file %d", file->id);
  997. continue;
  998. }
  999. }
  1000. }
  1001. // Notify caller and exit
  1002. if(nfc_worker->callback) {
  1003. nfc_worker->callback(NfcWorkerEventSuccess, nfc_worker->context);
  1004. }
  1005. break;
  1006. }
  1007. }
  1008. void nfc_worker_field(NfcWorker* nfc_worker) {
  1009. furi_hal_nfc_field_on();
  1010. while(nfc_worker->state == NfcWorkerStateField) {
  1011. osDelay(50);
  1012. }
  1013. furi_hal_nfc_field_off();
  1014. }