nfc_worker.c 48 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083
  1. #include "nfc_worker_i.h"
  2. #include <furi_hal.h>
  3. #include <lib/nfc_protocols/nfc_util.h>
  4. #include <lib/nfc_protocols/emv_decoder.h>
  5. #include <lib/nfc_protocols/mifare_ultralight.h>
  6. #include <lib/nfc_protocols/mifare_classic.h>
  7. #include <lib/nfc_protocols/mifare_desfire.h>
  8. #include "helpers/nfc_mf_classic_dict.h"
  9. #define TAG "NfcWorker"
  10. /***************************** NFC Worker API *******************************/
  11. NfcWorker* nfc_worker_alloc() {
  12. NfcWorker* nfc_worker = malloc(sizeof(NfcWorker));
  13. // Worker thread attributes
  14. nfc_worker->thread = furi_thread_alloc();
  15. furi_thread_set_name(nfc_worker->thread, "NfcWorker");
  16. furi_thread_set_stack_size(nfc_worker->thread, 8192);
  17. furi_thread_set_callback(nfc_worker->thread, nfc_worker_task);
  18. furi_thread_set_context(nfc_worker->thread, nfc_worker);
  19. nfc_worker->callback = NULL;
  20. nfc_worker->context = NULL;
  21. nfc_worker->storage = furi_record_open("storage");
  22. // Initialize rfal
  23. while(furi_hal_nfc_is_busy()) {
  24. osDelay(10);
  25. }
  26. nfc_worker_change_state(nfc_worker, NfcWorkerStateReady);
  27. return nfc_worker;
  28. }
  29. void nfc_worker_free(NfcWorker* nfc_worker) {
  30. furi_assert(nfc_worker);
  31. furi_thread_free(nfc_worker->thread);
  32. furi_record_close("storage");
  33. free(nfc_worker);
  34. }
  35. NfcWorkerState nfc_worker_get_state(NfcWorker* nfc_worker) {
  36. return nfc_worker->state;
  37. }
  38. void nfc_worker_start(
  39. NfcWorker* nfc_worker,
  40. NfcWorkerState state,
  41. NfcDeviceData* dev_data,
  42. NfcWorkerCallback callback,
  43. void* context) {
  44. furi_assert(nfc_worker);
  45. furi_assert(dev_data);
  46. while(furi_hal_nfc_is_busy()) {
  47. osDelay(10);
  48. }
  49. nfc_worker->callback = callback;
  50. nfc_worker->context = context;
  51. nfc_worker->dev_data = dev_data;
  52. nfc_worker_change_state(nfc_worker, state);
  53. furi_thread_start(nfc_worker->thread);
  54. }
  55. void nfc_worker_stop(NfcWorker* nfc_worker) {
  56. furi_assert(nfc_worker);
  57. if(nfc_worker->state == NfcWorkerStateBroken || nfc_worker->state == NfcWorkerStateReady) {
  58. return;
  59. }
  60. furi_hal_nfc_stop();
  61. nfc_worker_change_state(nfc_worker, NfcWorkerStateStop);
  62. furi_thread_join(nfc_worker->thread);
  63. }
  64. void nfc_worker_change_state(NfcWorker* nfc_worker, NfcWorkerState state) {
  65. nfc_worker->state = state;
  66. }
  67. /***************************** NFC Worker Thread *******************************/
  68. int32_t nfc_worker_task(void* context) {
  69. NfcWorker* nfc_worker = context;
  70. furi_hal_power_insomnia_enter();
  71. furi_hal_nfc_exit_sleep();
  72. if(nfc_worker->state == NfcWorkerStateDetect) {
  73. nfc_worker_detect(nfc_worker);
  74. } else if(nfc_worker->state == NfcWorkerStateEmulate) {
  75. nfc_worker_emulate(nfc_worker);
  76. } else if(nfc_worker->state == NfcWorkerStateReadEMVApp) {
  77. nfc_worker_read_emv_app(nfc_worker);
  78. } else if(nfc_worker->state == NfcWorkerStateReadEMV) {
  79. nfc_worker_read_emv(nfc_worker);
  80. } else if(nfc_worker->state == NfcWorkerStateEmulateApdu) {
  81. nfc_worker_emulate_apdu(nfc_worker);
  82. } else if(nfc_worker->state == NfcWorkerStateReadMifareUl) {
  83. nfc_worker_read_mifare_ul(nfc_worker);
  84. } else if(nfc_worker->state == NfcWorkerStateEmulateMifareUl) {
  85. nfc_worker_emulate_mifare_ul(nfc_worker);
  86. } else if(nfc_worker->state == NfcWorkerStateReadMifareClassic) {
  87. nfc_worker_mifare_classic_dict_attack(nfc_worker);
  88. } else if(nfc_worker->state == NfcWorkerStateReadMifareDesfire) {
  89. nfc_worker_read_mifare_desfire(nfc_worker);
  90. } else if(nfc_worker->state == NfcWorkerStateField) {
  91. nfc_worker_field(nfc_worker);
  92. }
  93. furi_hal_nfc_deactivate();
  94. nfc_worker_change_state(nfc_worker, NfcWorkerStateReady);
  95. furi_hal_power_insomnia_exit();
  96. return 0;
  97. }
  98. void nfc_worker_detect(NfcWorker* nfc_worker) {
  99. rfalNfcDevice* dev_list;
  100. rfalNfcDevice* dev;
  101. uint8_t dev_cnt;
  102. nfc_device_data_clear(nfc_worker->dev_data);
  103. NfcDeviceCommonData* result = &nfc_worker->dev_data->nfc_data;
  104. while(nfc_worker->state == NfcWorkerStateDetect) {
  105. if(furi_hal_nfc_detect(&dev_list, &dev_cnt, 1000, true)) {
  106. // Process first found device
  107. dev = &dev_list[0];
  108. result->uid_len = dev->nfcidLen;
  109. memcpy(result->uid, dev->nfcid, dev->nfcidLen);
  110. if(dev->type == RFAL_NFC_LISTEN_TYPE_NFCA) {
  111. result->device = NfcDeviceNfca;
  112. result->atqa[0] = dev->dev.nfca.sensRes.anticollisionInfo;
  113. result->atqa[1] = dev->dev.nfca.sensRes.platformInfo;
  114. result->sak = dev->dev.nfca.selRes.sak;
  115. if(mf_ul_check_card_type(
  116. dev->dev.nfca.sensRes.anticollisionInfo,
  117. dev->dev.nfca.sensRes.platformInfo,
  118. dev->dev.nfca.selRes.sak)) {
  119. result->protocol = NfcDeviceProtocolMifareUl;
  120. } else if(mf_classic_check_card_type(
  121. dev->dev.nfca.sensRes.anticollisionInfo,
  122. dev->dev.nfca.sensRes.platformInfo,
  123. dev->dev.nfca.selRes.sak)) {
  124. result->protocol = NfcDeviceProtocolMifareClassic;
  125. } else if(mf_df_check_card_type(
  126. dev->dev.nfca.sensRes.anticollisionInfo,
  127. dev->dev.nfca.sensRes.platformInfo,
  128. dev->dev.nfca.selRes.sak)) {
  129. result->protocol = NfcDeviceProtocolMifareDesfire;
  130. } else if(dev->rfInterface == RFAL_NFC_INTERFACE_ISODEP) {
  131. result->protocol = NfcDeviceProtocolEMV;
  132. } else {
  133. result->protocol = NfcDeviceProtocolUnknown;
  134. }
  135. } else if(dev->type == RFAL_NFC_LISTEN_TYPE_NFCB) {
  136. result->device = NfcDeviceNfcb;
  137. } else if(dev->type == RFAL_NFC_LISTEN_TYPE_NFCF) {
  138. result->device = NfcDeviceNfcf;
  139. } else if(dev->type == RFAL_NFC_LISTEN_TYPE_NFCV) {
  140. result->device = NfcDeviceNfcv;
  141. }
  142. // Notify caller and exit
  143. if(nfc_worker->callback) {
  144. nfc_worker->callback(NfcWorkerEventSuccess, nfc_worker->context);
  145. }
  146. break;
  147. }
  148. osDelay(100);
  149. }
  150. }
  151. bool nfc_worker_emulate_uid_callback(
  152. uint8_t* buff_rx,
  153. uint16_t buff_rx_len,
  154. uint8_t* buff_tx,
  155. uint16_t* buff_tx_len,
  156. uint32_t* data_type,
  157. void* context) {
  158. furi_assert(context);
  159. NfcWorker* nfc_worker = context;
  160. NfcReaderRequestData* reader_data = &nfc_worker->dev_data->reader_data;
  161. reader_data->size = buff_rx_len / 8;
  162. if(reader_data->size > 0) {
  163. memcpy(reader_data->data, buff_rx, reader_data->size);
  164. if(nfc_worker->callback) {
  165. nfc_worker->callback(NfcWorkerEventSuccess, nfc_worker->context);
  166. }
  167. }
  168. return true;
  169. }
  170. void nfc_worker_emulate(NfcWorker* nfc_worker) {
  171. NfcDeviceCommonData* data = &nfc_worker->dev_data->nfc_data;
  172. while(nfc_worker->state == NfcWorkerStateEmulate) {
  173. furi_hal_nfc_emulate_nfca(
  174. data->uid,
  175. data->uid_len,
  176. data->atqa,
  177. data->sak,
  178. nfc_worker_emulate_uid_callback,
  179. nfc_worker,
  180. 1000);
  181. }
  182. }
  183. void nfc_worker_read_emv_app(NfcWorker* nfc_worker) {
  184. ReturnCode err;
  185. rfalNfcDevice* dev_list;
  186. EmvApplication emv_app = {};
  187. uint8_t dev_cnt = 0;
  188. uint8_t tx_buff[255] = {};
  189. uint16_t tx_len = 0;
  190. uint8_t* rx_buff;
  191. uint16_t* rx_len;
  192. NfcDeviceData* result = nfc_worker->dev_data;
  193. nfc_device_data_clear(result);
  194. while(nfc_worker->state == NfcWorkerStateReadEMVApp) {
  195. memset(&emv_app, 0, sizeof(emv_app));
  196. if(furi_hal_nfc_detect(&dev_list, &dev_cnt, 1000, false)) {
  197. // Card was found. Check that it supports EMV
  198. if(dev_list[0].rfInterface == RFAL_NFC_INTERFACE_ISODEP) {
  199. result->nfc_data.uid_len = dev_list[0].dev.nfca.nfcId1Len;
  200. result->nfc_data.atqa[0] = dev_list[0].dev.nfca.sensRes.anticollisionInfo;
  201. result->nfc_data.atqa[1] = dev_list[0].dev.nfca.sensRes.platformInfo;
  202. result->nfc_data.sak = dev_list[0].dev.nfca.selRes.sak;
  203. memcpy(
  204. result->nfc_data.uid, dev_list[0].dev.nfca.nfcId1, result->nfc_data.uid_len);
  205. result->nfc_data.protocol = NfcDeviceProtocolEMV;
  206. FURI_LOG_D(TAG, "Send select PPSE command");
  207. tx_len = emv_prepare_select_ppse(tx_buff);
  208. err = furi_hal_nfc_data_exchange(tx_buff, tx_len, &rx_buff, &rx_len, false);
  209. if(err != ERR_NONE) {
  210. FURI_LOG_D(TAG, "Error during selection PPSE request: %d", err);
  211. furi_hal_nfc_deactivate();
  212. continue;
  213. }
  214. FURI_LOG_D(TAG, "Select PPSE response received. Start parsing response");
  215. if(emv_decode_ppse_response(rx_buff, *rx_len, &emv_app)) {
  216. FURI_LOG_D(TAG, "Select PPSE responce parced");
  217. // Notify caller and exit
  218. result->emv_data.aid_len = emv_app.aid_len;
  219. memcpy(result->emv_data.aid, emv_app.aid, emv_app.aid_len);
  220. if(nfc_worker->callback) {
  221. nfc_worker->callback(NfcWorkerEventSuccess, nfc_worker->context);
  222. }
  223. break;
  224. } else {
  225. FURI_LOG_D(TAG, "Can't find pay application");
  226. furi_hal_nfc_deactivate();
  227. continue;
  228. }
  229. } else {
  230. // Can't find EMV card
  231. FURI_LOG_W(TAG, "Card doesn't support EMV");
  232. furi_hal_nfc_deactivate();
  233. }
  234. } else {
  235. // Can't find EMV card
  236. FURI_LOG_D(TAG, "Can't find any cards");
  237. furi_hal_nfc_deactivate();
  238. }
  239. osDelay(20);
  240. }
  241. }
  242. void nfc_worker_read_emv(NfcWorker* nfc_worker) {
  243. ReturnCode err;
  244. rfalNfcDevice* dev_list;
  245. EmvApplication emv_app = {};
  246. uint8_t dev_cnt = 0;
  247. uint8_t tx_buff[255] = {};
  248. uint16_t tx_len = 0;
  249. uint8_t* rx_buff;
  250. uint16_t* rx_len;
  251. NfcDeviceData* result = nfc_worker->dev_data;
  252. nfc_device_data_clear(result);
  253. while(nfc_worker->state == NfcWorkerStateReadEMV) {
  254. memset(&emv_app, 0, sizeof(emv_app));
  255. if(furi_hal_nfc_detect(&dev_list, &dev_cnt, 1000, false)) {
  256. // Card was found. Check that it supports EMV
  257. if(dev_list[0].rfInterface == RFAL_NFC_INTERFACE_ISODEP) {
  258. result->nfc_data.uid_len = dev_list[0].dev.nfca.nfcId1Len;
  259. result->nfc_data.atqa[0] = dev_list[0].dev.nfca.sensRes.anticollisionInfo;
  260. result->nfc_data.atqa[1] = dev_list[0].dev.nfca.sensRes.platformInfo;
  261. result->nfc_data.sak = dev_list[0].dev.nfca.selRes.sak;
  262. memcpy(
  263. result->nfc_data.uid, dev_list[0].dev.nfca.nfcId1, result->nfc_data.uid_len);
  264. result->nfc_data.protocol = NfcDeviceProtocolEMV;
  265. FURI_LOG_D(TAG, "Send select PPSE command");
  266. tx_len = emv_prepare_select_ppse(tx_buff);
  267. err = furi_hal_nfc_data_exchange(tx_buff, tx_len, &rx_buff, &rx_len, false);
  268. if(err != ERR_NONE) {
  269. FURI_LOG_D(TAG, "Error during selection PPSE request: %d", err);
  270. furi_hal_nfc_deactivate();
  271. continue;
  272. }
  273. FURI_LOG_D(TAG, "Select PPSE response received. Start parsing response");
  274. if(emv_decode_ppse_response(rx_buff, *rx_len, &emv_app)) {
  275. FURI_LOG_D(TAG, "Select PPSE responce parced");
  276. result->emv_data.aid_len = emv_app.aid_len;
  277. memcpy(result->emv_data.aid, emv_app.aid, emv_app.aid_len);
  278. } else {
  279. FURI_LOG_D(TAG, "Can't find pay application");
  280. furi_hal_nfc_deactivate();
  281. continue;
  282. }
  283. FURI_LOG_D(TAG, "Starting application ...");
  284. tx_len = emv_prepare_select_app(tx_buff, &emv_app);
  285. err = furi_hal_nfc_data_exchange(tx_buff, tx_len, &rx_buff, &rx_len, false);
  286. if(err != ERR_NONE) {
  287. FURI_LOG_D(TAG, "Error during application selection request: %d", err);
  288. furi_hal_nfc_deactivate();
  289. continue;
  290. }
  291. FURI_LOG_D(TAG, "Select application response received. Start parsing response");
  292. if(emv_decode_select_app_response(rx_buff, *rx_len, &emv_app)) {
  293. FURI_LOG_D(TAG, "Card name: %s", emv_app.name);
  294. memcpy(result->emv_data.name, emv_app.name, sizeof(emv_app.name));
  295. } else if(emv_app.pdol.size > 0) {
  296. FURI_LOG_D(TAG, "Can't find card name, but PDOL is present.");
  297. } else {
  298. FURI_LOG_D(TAG, "Can't find card name or PDOL");
  299. furi_hal_nfc_deactivate();
  300. continue;
  301. }
  302. FURI_LOG_D(TAG, "Starting Get Processing Options command ...");
  303. tx_len = emv_prepare_get_proc_opt(tx_buff, &emv_app);
  304. err = furi_hal_nfc_data_exchange(tx_buff, tx_len, &rx_buff, &rx_len, false);
  305. if(err != ERR_NONE) {
  306. FURI_LOG_D(TAG, "Error during Get Processing Options command: %d", err);
  307. furi_hal_nfc_deactivate();
  308. continue;
  309. }
  310. if(emv_decode_get_proc_opt(rx_buff, *rx_len, &emv_app)) {
  311. FURI_LOG_D(TAG, "Card number parsed");
  312. result->emv_data.number_len = emv_app.card_number_len;
  313. memcpy(result->emv_data.number, emv_app.card_number, emv_app.card_number_len);
  314. // Notify caller and exit
  315. if(nfc_worker->callback) {
  316. nfc_worker->callback(NfcWorkerEventSuccess, nfc_worker->context);
  317. }
  318. break;
  319. } else {
  320. // Mastercard doesn't give PAN / card number as GPO response
  321. // Iterate over all files found in application
  322. bool pan_found = false;
  323. for(uint8_t i = 0; (i < emv_app.afl.size) && !pan_found; i += 4) {
  324. uint8_t sfi = emv_app.afl.data[i] >> 3;
  325. uint8_t record_start = emv_app.afl.data[i + 1];
  326. uint8_t record_end = emv_app.afl.data[i + 2];
  327. // Iterate over all records in file
  328. for(uint8_t record = record_start; record <= record_end; ++record) {
  329. tx_len = emv_prepare_read_sfi_record(tx_buff, sfi, record);
  330. err = furi_hal_nfc_data_exchange(
  331. tx_buff, tx_len, &rx_buff, &rx_len, false);
  332. if(err != ERR_NONE) {
  333. FURI_LOG_D(
  334. TAG,
  335. "Error reading application sfi %d, record %d",
  336. sfi,
  337. record);
  338. }
  339. if(emv_decode_read_sfi_record(rx_buff, *rx_len, &emv_app)) {
  340. pan_found = true;
  341. break;
  342. }
  343. }
  344. }
  345. if(pan_found) {
  346. FURI_LOG_D(TAG, "Card PAN found");
  347. result->emv_data.number_len = emv_app.card_number_len;
  348. memcpy(
  349. result->emv_data.number,
  350. emv_app.card_number,
  351. result->emv_data.number_len);
  352. if(emv_app.exp_month) {
  353. result->emv_data.exp_mon = emv_app.exp_month;
  354. result->emv_data.exp_year = emv_app.exp_year;
  355. }
  356. if(emv_app.country_code) {
  357. result->emv_data.country_code = emv_app.country_code;
  358. }
  359. if(emv_app.currency_code) {
  360. result->emv_data.currency_code = emv_app.currency_code;
  361. }
  362. // Notify caller and exit
  363. if(nfc_worker->callback) {
  364. nfc_worker->callback(NfcWorkerEventSuccess, nfc_worker->context);
  365. }
  366. break;
  367. } else {
  368. FURI_LOG_D(TAG, "Can't read card number");
  369. }
  370. furi_hal_nfc_deactivate();
  371. }
  372. } else {
  373. // Can't find EMV card
  374. FURI_LOG_W(TAG, "Card doesn't support EMV");
  375. furi_hal_nfc_deactivate();
  376. }
  377. } else {
  378. // Can't find EMV card
  379. FURI_LOG_D(TAG, "Can't find any cards");
  380. furi_hal_nfc_deactivate();
  381. }
  382. osDelay(20);
  383. }
  384. }
  385. void nfc_worker_emulate_apdu(NfcWorker* nfc_worker) {
  386. ReturnCode err;
  387. uint8_t tx_buff[255] = {};
  388. uint16_t tx_len = 0;
  389. uint8_t* rx_buff;
  390. uint16_t* rx_len;
  391. NfcDeviceCommonData params = {
  392. .uid = {0xCF, 0x72, 0xd4, 0x40},
  393. .uid_len = 4,
  394. .atqa = {0x00, 0x04},
  395. .sak = 0x20,
  396. .device = NfcDeviceNfca,
  397. .protocol = NfcDeviceProtocolEMV,
  398. };
  399. // Test RX data
  400. const uint8_t debug_rx[] = {
  401. 0xba, 0x0b, 0xba, 0xba, 0x20, 0x00, 0x02, 0x28, 0xde, 0xad, 0xbe, 0xef, 0x00, 0xca, 0xca,
  402. 0xca, 0xfe, 0xfa, 0xce, 0x14, 0x88, 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, 0x88,
  403. 0x99, 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xfe, 0xdc, 0xba, 0x98, 0x76, 0x54, 0x32, 0x10, 0xba,
  404. 0x0b, 0xba, 0xba, 0x20, 0x00, 0x02, 0x28, 0xde, 0xad, 0xbe, 0xef, 0x00, 0xca, 0xca, 0xca,
  405. 0xfe, 0xfa, 0xce, 0x14, 0x88, 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, 0x88, 0x99,
  406. 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xfe, 0xdc, 0xba, 0x98, 0x76, 0x54, 0x32, 0x10, 0xba, 0x0b,
  407. 0xba, 0xba, 0x20, 0x00, 0x02, 0x28, 0xde, 0xad, 0xbe, 0xef, 0x00, 0xca, 0xca, 0xca, 0xfe,
  408. 0xfa, 0xce, 0x14, 0x88, 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, 0x88, 0x99, 0xaa,
  409. 0xbb, 0xcc, 0xdd, 0xee, 0xfe, 0xdc, 0xba, 0x98, 0x76, 0x54, 0x32, 0x10, 0xba, 0x0b, 0xba,
  410. 0xba, 0x20, 0x00, 0x02, 0x28, 0xde, 0xad, 0xbe, 0xef, 0x00, 0xca, 0xca, 0xca, 0xfe, 0xfa,
  411. 0xce, 0x14, 0x88, 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, 0x88, 0x99, 0xaa, 0xbb,
  412. 0xcc, 0xdd, 0xee, 0xfe, 0xdc, 0xba, 0x98, 0x76, 0x54, 0x32, 0x10, 0xba, 0x0b, 0xba, 0xba,
  413. 0x20, 0x00, 0x02, 0x28, 0xde, 0xad, 0xbe, 0xef, 0x00, 0xca, 0xca, 0xca, 0xfe, 0xfa, 0xce,
  414. 0x14, 0x88, 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, 0x88, 0x99, 0xaa, 0xbb, 0xcc,
  415. 0xdd, 0xee, 0xfe, 0xdc, 0xba, 0x98, 0x76, 0x54, 0x32, 0x10, 0xba, 0x0b, 0xba, 0xba, 0x20,
  416. 0x00, 0x02, 0x28, 0xde, 0xad, 0xbe, 0xef, 0x00, 0xca, 0xca, 0xca, 0xfe, 0xfa, 0xce, 0x14,
  417. 0x88, 0x00};
  418. // Test TX data
  419. const uint8_t debug_tx[] = {
  420. 0x12, 0x34, 0x56, 0x78, 0x9a, 0xbc, 0xde, 0xff, 0xfe, 0xdc, 0xba, 0x98, 0x76, 0x54, 0x32,
  421. 0x10, 0x14, 0x88, 0x02, 0x28, 0x00, 0x00, 0xca, 0xca, 0x00, 0xc0, 0xc0, 0x00, 0xde, 0xad,
  422. 0xbe, 0xef, 0xce, 0xee, 0xec, 0xca, 0xfe, 0xba, 0xba, 0xb0, 0xb0, 0xac, 0xdc, 0x11, 0x12,
  423. 0x34, 0x56, 0x78, 0x9a, 0xbc, 0xde, 0xff, 0xfe, 0xdc, 0xba, 0x98, 0x76, 0x54, 0x32, 0x10,
  424. 0x14, 0x88, 0x02, 0x28, 0x00, 0x00, 0xca, 0xca, 0x00, 0xc0, 0xc0, 0x00, 0xde, 0xad, 0xbe,
  425. 0xef, 0xce, 0xee, 0xec, 0xca, 0xfe, 0xba, 0xba, 0xb0, 0xb0, 0xac, 0xdc, 0x11, 0x12, 0x34,
  426. 0x56, 0x78, 0x9a, 0xbc, 0xde, 0xff, 0xfe, 0xdc, 0xba, 0x98, 0x76, 0x54, 0x32, 0x10, 0x14,
  427. 0x88, 0x02, 0x28, 0x00, 0x00, 0xca, 0xca, 0x00, 0xc0, 0xc0, 0x00, 0xde, 0xad, 0xbe, 0xef,
  428. 0xce, 0xee, 0xec, 0xca, 0xfe, 0xba, 0xba, 0xb0, 0xb0, 0xac, 0xdc, 0x11, 0x12, 0x34, 0x56,
  429. 0x78, 0x9a, 0xbc, 0xde, 0xff, 0xfe, 0xdc, 0xba, 0x98, 0x76, 0x54, 0x32, 0x10, 0x14, 0x88,
  430. 0x02, 0x28, 0x00, 0x00, 0xca, 0xca, 0x00, 0xc0, 0xc0, 0x00, 0xde, 0xad, 0xbe, 0xef, 0xce,
  431. 0xee, 0xec, 0xca, 0xfe, 0xba, 0xba, 0xb0, 0xb0, 0xac, 0xdc, 0x11, 0x12, 0x34, 0x56, 0x78,
  432. 0x9a, 0xbc, 0xde, 0xff, 0xfe, 0xdc, 0xba, 0x98, 0x76, 0x54, 0x32, 0x10, 0x14, 0x88, 0x02,
  433. 0x28, 0x00, 0x00, 0xca, 0xca, 0x00, 0xc0, 0xc0, 0x00, 0xde, 0xad, 0xbe, 0xef, 0xce, 0xee,
  434. 0xec, 0xca, 0xfe, 0xba, 0xba, 0xb0, 0xb0, 0xac, 0xdc, 0x11, 0x12, 0x34, 0x56, 0x78, 0x9a,
  435. 0xbc, 0xde, 0xff, 0xfe, 0xdc, 0xba, 0x98, 0x76, 0x54, 0x32, 0x10, 0x14, 0x88, 0x02, 0x28,
  436. 0x00, 0x00};
  437. while(nfc_worker->state == NfcWorkerStateEmulateApdu) {
  438. if(furi_hal_nfc_listen(params.uid, params.uid_len, params.atqa, params.sak, false, 300)) {
  439. FURI_LOG_D(TAG, "POS terminal detected");
  440. // Read data from POS terminal
  441. err = furi_hal_nfc_data_exchange(NULL, 0, &rx_buff, &rx_len, false);
  442. if(err == ERR_NONE) {
  443. FURI_LOG_D(TAG, "Received Select PPSE");
  444. } else {
  445. FURI_LOG_D(TAG, "Error in 1st data exchange: select PPSE");
  446. furi_hal_nfc_deactivate();
  447. continue;
  448. }
  449. FURI_LOG_D(TAG, "Transive SELECT PPSE ANS");
  450. tx_len = emv_select_ppse_ans(tx_buff);
  451. err = furi_hal_nfc_data_exchange(tx_buff, tx_len, &rx_buff, &rx_len, false);
  452. if(err == ERR_NONE) {
  453. FURI_LOG_D(TAG, "Received Select APP");
  454. } else {
  455. FURI_LOG_D(TAG, "Error in 2nd data exchange: select APP");
  456. furi_hal_nfc_deactivate();
  457. continue;
  458. }
  459. FURI_LOG_D(TAG, "Transive SELECT APP ANS");
  460. tx_len = emv_select_app_ans(tx_buff);
  461. err = furi_hal_nfc_data_exchange(tx_buff, tx_len, &rx_buff, &rx_len, false);
  462. if(err == ERR_NONE) {
  463. FURI_LOG_D(TAG, "Received PDOL");
  464. } else {
  465. FURI_LOG_D(TAG, "Error in 3rd data exchange: receive PDOL");
  466. furi_hal_nfc_deactivate();
  467. continue;
  468. }
  469. FURI_LOG_D(TAG, "Transive PDOL ANS");
  470. tx_len = emv_get_proc_opt_ans(tx_buff);
  471. err = furi_hal_nfc_data_exchange(tx_buff, tx_len, &rx_buff, &rx_len, false);
  472. if(err == ERR_NONE) {
  473. FURI_LOG_D(TAG, "Transive PDOL ANS");
  474. } else {
  475. FURI_LOG_D(TAG, "Error in 4rd data exchange: Transive PDOL ANS");
  476. furi_hal_nfc_deactivate();
  477. continue;
  478. }
  479. if(*rx_len != sizeof(debug_rx) || memcmp(rx_buff, debug_rx, sizeof(debug_rx))) {
  480. FURI_LOG_D(TAG, "Failed long message test");
  481. } else {
  482. FURI_LOG_D(TAG, "Correct debug message received");
  483. tx_len = sizeof(debug_tx);
  484. err = furi_hal_nfc_data_exchange(
  485. (uint8_t*)debug_tx, tx_len, &rx_buff, &rx_len, false);
  486. if(err == ERR_NONE) {
  487. FURI_LOG_D(TAG, "Transive Debug message");
  488. }
  489. }
  490. furi_hal_nfc_deactivate();
  491. } else {
  492. FURI_LOG_D(TAG, "Can't find reader");
  493. }
  494. osDelay(20);
  495. }
  496. }
  497. void nfc_worker_read_mifare_ul(NfcWorker* nfc_worker) {
  498. ReturnCode err;
  499. rfalNfcDevice* dev_list;
  500. uint8_t dev_cnt = 0;
  501. uint8_t tx_buff[255] = {};
  502. uint16_t tx_len = 0;
  503. uint8_t* rx_buff;
  504. uint16_t* rx_len;
  505. MifareUlDevice mf_ul_read;
  506. NfcDeviceData* result = nfc_worker->dev_data;
  507. nfc_device_data_clear(result);
  508. while(nfc_worker->state == NfcWorkerStateReadMifareUl) {
  509. furi_hal_nfc_deactivate();
  510. memset(&mf_ul_read, 0, sizeof(mf_ul_read));
  511. if(furi_hal_nfc_detect(&dev_list, &dev_cnt, 300, false)) {
  512. if(dev_list[0].type == RFAL_NFC_LISTEN_TYPE_NFCA &&
  513. mf_ul_check_card_type(
  514. dev_list[0].dev.nfca.sensRes.anticollisionInfo,
  515. dev_list[0].dev.nfca.sensRes.platformInfo,
  516. dev_list[0].dev.nfca.selRes.sak)) {
  517. // Get Mifare Ultralight version
  518. FURI_LOG_D(TAG, "Found Mifare Ultralight tag. Reading tag version");
  519. tx_len = mf_ul_prepare_get_version(tx_buff);
  520. err = furi_hal_nfc_data_exchange(tx_buff, tx_len, &rx_buff, &rx_len, false);
  521. if(err == ERR_NONE) {
  522. mf_ul_parse_get_version_response(rx_buff, &mf_ul_read);
  523. FURI_LOG_D(
  524. TAG,
  525. "Mifare Ultralight Type: %d, Pages: %d",
  526. mf_ul_read.data.type,
  527. mf_ul_read.pages_to_read);
  528. FURI_LOG_D(TAG, "Reading signature ...");
  529. tx_len = mf_ul_prepare_read_signature(tx_buff);
  530. if(furi_hal_nfc_data_exchange(tx_buff, tx_len, &rx_buff, &rx_len, false)) {
  531. FURI_LOG_D(TAG, "Failed reading signature");
  532. memset(mf_ul_read.data.signature, 0, sizeof(mf_ul_read.data.signature));
  533. } else {
  534. mf_ul_parse_read_signature_response(rx_buff, &mf_ul_read);
  535. }
  536. } else if(err == ERR_TIMEOUT) {
  537. FURI_LOG_D(
  538. TAG,
  539. "Card doesn't respond to GET VERSION command. Setting default read parameters");
  540. err = ERR_NONE;
  541. mf_ul_set_default_version(&mf_ul_read);
  542. // Reinit device
  543. furi_hal_nfc_deactivate();
  544. if(!furi_hal_nfc_detect(&dev_list, &dev_cnt, 300, false)) {
  545. FURI_LOG_D(TAG, "Lost connection. Restarting search");
  546. continue;
  547. }
  548. } else {
  549. FURI_LOG_D(
  550. TAG, "Error getting Mifare Ultralight version. Error code: %d", err);
  551. continue;
  552. }
  553. if(mf_ul_read.support_fast_read) {
  554. FURI_LOG_D(TAG, "Reading pages ...");
  555. tx_len = mf_ul_prepare_fast_read(tx_buff, 0x00, mf_ul_read.pages_to_read - 1);
  556. if(furi_hal_nfc_data_exchange(tx_buff, tx_len, &rx_buff, &rx_len, false)) {
  557. FURI_LOG_D(TAG, "Failed reading pages");
  558. continue;
  559. } else {
  560. mf_ul_parse_fast_read_response(
  561. rx_buff, 0x00, mf_ul_read.pages_to_read - 1, &mf_ul_read);
  562. }
  563. FURI_LOG_D(TAG, "Reading 3 counters ...");
  564. for(uint8_t i = 0; i < 3; i++) {
  565. tx_len = mf_ul_prepare_read_cnt(tx_buff, i);
  566. if(furi_hal_nfc_data_exchange(tx_buff, tx_len, &rx_buff, &rx_len, false)) {
  567. FURI_LOG_W(TAG, "Failed reading Counter %d", i);
  568. mf_ul_read.data.counter[i] = 0;
  569. } else {
  570. mf_ul_parse_read_cnt_response(rx_buff, i, &mf_ul_read);
  571. }
  572. }
  573. FURI_LOG_D(TAG, "Checking tearing flags ...");
  574. for(uint8_t i = 0; i < 3; i++) {
  575. tx_len = mf_ul_prepare_check_tearing(tx_buff, i);
  576. if(furi_hal_nfc_data_exchange(tx_buff, tx_len, &rx_buff, &rx_len, false)) {
  577. FURI_LOG_D(TAG, "Error checking tearing flag %d", i);
  578. mf_ul_read.data.tearing[i] = MF_UL_TEARING_FLAG_DEFAULT;
  579. } else {
  580. mf_ul_parse_check_tearing_response(rx_buff, i, &mf_ul_read);
  581. }
  582. }
  583. } else {
  584. // READ card with READ command (4 pages at a time)
  585. for(uint8_t page = 0; page < mf_ul_read.pages_to_read; page += 4) {
  586. FURI_LOG_D(TAG, "Reading pages %d - %d ...", page, page + 3);
  587. tx_len = mf_ul_prepare_read(tx_buff, page);
  588. if(furi_hal_nfc_data_exchange(tx_buff, tx_len, &rx_buff, &rx_len, false)) {
  589. FURI_LOG_D(TAG, "Read pages %d - %d failed", page, page + 3);
  590. continue;
  591. } else {
  592. mf_ul_parse_read_response(rx_buff, page, &mf_ul_read);
  593. }
  594. }
  595. }
  596. // Fill result data
  597. result->nfc_data.uid_len = dev_list[0].dev.nfca.nfcId1Len;
  598. result->nfc_data.atqa[0] = dev_list[0].dev.nfca.sensRes.anticollisionInfo;
  599. result->nfc_data.atqa[1] = dev_list[0].dev.nfca.sensRes.platformInfo;
  600. result->nfc_data.sak = dev_list[0].dev.nfca.selRes.sak;
  601. result->nfc_data.protocol = NfcDeviceProtocolMifareUl;
  602. memcpy(
  603. result->nfc_data.uid, dev_list[0].dev.nfca.nfcId1, result->nfc_data.uid_len);
  604. result->mf_ul_data = mf_ul_read.data;
  605. // Notify caller and exit
  606. if(nfc_worker->callback) {
  607. nfc_worker->callback(NfcWorkerEventSuccess, nfc_worker->context);
  608. }
  609. break;
  610. } else {
  611. FURI_LOG_W(TAG, "Tag does not support Mifare Ultralight");
  612. }
  613. } else {
  614. FURI_LOG_D(TAG, "Can't find any tags");
  615. }
  616. osDelay(100);
  617. }
  618. }
  619. void nfc_worker_emulate_mifare_ul(NfcWorker* nfc_worker) {
  620. NfcDeviceCommonData* nfc_common = &nfc_worker->dev_data->nfc_data;
  621. MifareUlDevice mf_ul_emulate;
  622. mf_ul_prepare_emulation(&mf_ul_emulate, &nfc_worker->dev_data->mf_ul_data);
  623. while(nfc_worker->state == NfcWorkerStateEmulateMifareUl) {
  624. furi_hal_nfc_emulate_nfca(
  625. nfc_common->uid,
  626. nfc_common->uid_len,
  627. nfc_common->atqa,
  628. nfc_common->sak,
  629. mf_ul_prepare_emulation_response,
  630. &mf_ul_emulate,
  631. 5000);
  632. // Check if data was modified
  633. if(mf_ul_emulate.data_changed) {
  634. nfc_worker->dev_data->mf_ul_data = mf_ul_emulate.data;
  635. if(nfc_worker->callback) {
  636. nfc_worker->callback(NfcWorkerEventSuccess, nfc_worker->context);
  637. }
  638. mf_ul_emulate.data_changed = false;
  639. }
  640. }
  641. }
  642. void nfc_worker_mifare_classic_dict_attack(NfcWorker* nfc_worker) {
  643. furi_assert(nfc_worker->callback);
  644. rfalNfcDevice* dev_list;
  645. rfalNfcDevice* dev;
  646. NfcDeviceCommonData* nfc_common;
  647. uint8_t dev_cnt = 0;
  648. FuriHalNfcTxRxContext tx_rx_ctx = {};
  649. MfClassicAuthContext auth_ctx = {};
  650. MfClassicReader reader = {};
  651. uint64_t curr_key = 0;
  652. uint16_t curr_sector = 0;
  653. uint8_t total_sectors = 0;
  654. NfcWorkerEvent event;
  655. // Open dictionary
  656. nfc_worker->dict_stream = file_stream_alloc(nfc_worker->storage);
  657. if(!nfc_mf_classic_dict_open_file(nfc_worker->dict_stream)) {
  658. event = NfcWorkerEventNoDictFound;
  659. nfc_worker->callback(event, nfc_worker->context);
  660. nfc_mf_classic_dict_close_file(nfc_worker->dict_stream);
  661. stream_free(nfc_worker->dict_stream);
  662. return;
  663. }
  664. // Detect Mifare Classic card
  665. while(nfc_worker->state == NfcWorkerStateReadMifareClassic) {
  666. if(furi_hal_nfc_detect(&dev_list, &dev_cnt, 300, false)) {
  667. dev = &dev_list[0];
  668. if(mf_classic_get_type(
  669. dev->nfcid,
  670. dev->nfcidLen,
  671. dev->dev.nfca.sensRes.anticollisionInfo,
  672. dev->dev.nfca.sensRes.platformInfo,
  673. dev->dev.nfca.selRes.sak,
  674. &reader)) {
  675. total_sectors = mf_classic_get_total_sectors_num(&reader);
  676. if(reader.type == MfClassicType1k) {
  677. event = NfcWorkerEventDetectedClassic1k;
  678. } else {
  679. event = NfcWorkerEventDetectedClassic4k;
  680. }
  681. nfc_worker->callback(event, nfc_worker->context);
  682. break;
  683. }
  684. } else {
  685. event = NfcWorkerEventNoCardDetected;
  686. nfc_worker->callback(event, nfc_worker->context);
  687. }
  688. }
  689. if(nfc_worker->state == NfcWorkerStateReadMifareClassic) {
  690. bool card_removed_notified = false;
  691. bool card_found_notified = false;
  692. // Seek for mifare classic keys
  693. for(curr_sector = 0; curr_sector < total_sectors; curr_sector++) {
  694. FURI_LOG_I(TAG, "Sector: %d ...", curr_sector);
  695. event = NfcWorkerEventNewSector;
  696. nfc_worker->callback(event, nfc_worker->context);
  697. mf_classic_auth_init_context(&auth_ctx, reader.cuid, curr_sector);
  698. bool sector_key_found = false;
  699. while(nfc_mf_classic_dict_get_next_key(nfc_worker->dict_stream, &curr_key)) {
  700. furi_hal_nfc_deactivate();
  701. if(furi_hal_nfc_activate_nfca(300, &reader.cuid)) {
  702. if(!card_found_notified) {
  703. if(reader.type == MfClassicType1k) {
  704. event = NfcWorkerEventDetectedClassic1k;
  705. } else {
  706. event = NfcWorkerEventDetectedClassic4k;
  707. }
  708. nfc_worker->callback(event, nfc_worker->context);
  709. card_found_notified = true;
  710. card_removed_notified = false;
  711. }
  712. FURI_LOG_D(
  713. TAG,
  714. "Try to auth to sector %d with key %04lx%08lx",
  715. curr_sector,
  716. (uint32_t)(curr_key >> 32),
  717. (uint32_t)curr_key);
  718. if(mf_classic_auth_attempt(&tx_rx_ctx, &auth_ctx, curr_key)) {
  719. sector_key_found = true;
  720. if((auth_ctx.key_a != MF_CLASSIC_NO_KEY) &&
  721. (auth_ctx.key_b != MF_CLASSIC_NO_KEY))
  722. break;
  723. }
  724. } else {
  725. // Notify that no tag is availalble
  726. FURI_LOG_D(TAG, "Can't find tags");
  727. if(!card_removed_notified) {
  728. event = NfcWorkerEventNoCardDetected;
  729. nfc_worker->callback(event, nfc_worker->context);
  730. card_removed_notified = true;
  731. card_found_notified = false;
  732. }
  733. }
  734. if(nfc_worker->state != NfcWorkerStateReadMifareClassic) break;
  735. osDelay(1);
  736. }
  737. if(nfc_worker->state != NfcWorkerStateReadMifareClassic) break;
  738. if(sector_key_found) {
  739. // Notify that keys were found
  740. if(auth_ctx.key_a != MF_CLASSIC_NO_KEY) {
  741. FURI_LOG_I(
  742. TAG,
  743. "Sector %d key A: %04lx%08lx",
  744. curr_sector,
  745. (uint32_t)(auth_ctx.key_a >> 32),
  746. (uint32_t)auth_ctx.key_a);
  747. event = NfcWorkerEventFoundKeyA;
  748. nfc_worker->callback(event, nfc_worker->context);
  749. }
  750. if(auth_ctx.key_b != MF_CLASSIC_NO_KEY) {
  751. FURI_LOG_I(
  752. TAG,
  753. "Sector %d key B: %04lx%08lx",
  754. curr_sector,
  755. (uint32_t)(auth_ctx.key_b >> 32),
  756. (uint32_t)auth_ctx.key_b);
  757. event = NfcWorkerEventFoundKeyB;
  758. nfc_worker->callback(event, nfc_worker->context);
  759. }
  760. // Add sectors to read sequence
  761. mf_classic_reader_add_sector(&reader, curr_sector, auth_ctx.key_a, auth_ctx.key_b);
  762. }
  763. nfc_mf_classic_dict_reset(nfc_worker->dict_stream);
  764. }
  765. }
  766. if(nfc_worker->state == NfcWorkerStateReadMifareClassic) {
  767. FURI_LOG_I(TAG, "Found keys to %d sectors. Start reading sectors", reader.sectors_to_read);
  768. uint8_t sectors_read =
  769. mf_classic_read_card(&tx_rx_ctx, &reader, &nfc_worker->dev_data->mf_classic_data);
  770. if(sectors_read) {
  771. dev = &dev_list[0];
  772. nfc_common = &nfc_worker->dev_data->nfc_data;
  773. nfc_common->uid_len = dev->dev.nfca.nfcId1Len;
  774. nfc_common->atqa[0] = dev->dev.nfca.sensRes.anticollisionInfo;
  775. nfc_common->atqa[1] = dev->dev.nfca.sensRes.platformInfo;
  776. nfc_common->sak = dev->dev.nfca.selRes.sak;
  777. nfc_common->protocol = NfcDeviceProtocolMifareClassic;
  778. memcpy(nfc_common->uid, dev->dev.nfca.nfcId1, nfc_common->uid_len);
  779. event = NfcWorkerEventSuccess;
  780. FURI_LOG_I(TAG, "Successfully read %d sectors", sectors_read);
  781. } else {
  782. event = NfcWorkerEventFail;
  783. FURI_LOG_W(TAG, "Failed to read any sector");
  784. }
  785. nfc_worker->callback(event, nfc_worker->context);
  786. }
  787. nfc_mf_classic_dict_close_file(nfc_worker->dict_stream);
  788. stream_free(nfc_worker->dict_stream);
  789. }
  790. ReturnCode nfc_exchange_full(
  791. uint8_t* tx_buff,
  792. uint16_t tx_len,
  793. uint8_t* rx_buff,
  794. uint16_t rx_cap,
  795. uint16_t* rx_len) {
  796. ReturnCode err;
  797. uint8_t* part_buff;
  798. uint16_t* part_len;
  799. err = furi_hal_nfc_data_exchange(tx_buff, tx_len, &part_buff, &part_len, false);
  800. if(*part_len > rx_cap) {
  801. return ERR_OVERRUN;
  802. }
  803. memcpy(rx_buff, part_buff, *part_len);
  804. *rx_len = *part_len;
  805. while(err == ERR_NONE && rx_buff[0] == 0xAF) {
  806. err = furi_hal_nfc_data_exchange(rx_buff, 1, &part_buff, &part_len, false);
  807. if(*part_len > rx_cap - *rx_len) {
  808. return ERR_OVERRUN;
  809. }
  810. if(*part_len == 0) {
  811. return ERR_PROTO;
  812. }
  813. memcpy(rx_buff + *rx_len, part_buff + 1, *part_len - 1);
  814. *rx_buff = *part_buff;
  815. *rx_len += *part_len - 1;
  816. }
  817. return err;
  818. }
  819. void nfc_worker_read_mifare_desfire(NfcWorker* nfc_worker) {
  820. ReturnCode err;
  821. rfalNfcDevice* dev_list;
  822. uint8_t dev_cnt = 0;
  823. uint8_t tx_buff[64] = {};
  824. uint16_t tx_len = 0;
  825. uint8_t rx_buff[512] = {};
  826. uint16_t rx_len;
  827. NfcDeviceData* result = nfc_worker->dev_data;
  828. nfc_device_data_clear(result);
  829. MifareDesfireData* data = &result->mf_df_data;
  830. while(nfc_worker->state == NfcWorkerStateReadMifareDesfire) {
  831. furi_hal_nfc_deactivate();
  832. if(!furi_hal_nfc_detect(&dev_list, &dev_cnt, 300, false)) {
  833. osDelay(100);
  834. continue;
  835. }
  836. memset(data, 0, sizeof(MifareDesfireData));
  837. if(dev_list[0].type != RFAL_NFC_LISTEN_TYPE_NFCA ||
  838. !mf_df_check_card_type(
  839. dev_list[0].dev.nfca.sensRes.anticollisionInfo,
  840. dev_list[0].dev.nfca.sensRes.platformInfo,
  841. dev_list[0].dev.nfca.selRes.sak)) {
  842. FURI_LOG_D(TAG, "Tag is not DESFire");
  843. osDelay(100);
  844. continue;
  845. }
  846. FURI_LOG_D(TAG, "Found DESFire tag");
  847. // Fill non-DESFire result data
  848. result->nfc_data.uid_len = dev_list[0].dev.nfca.nfcId1Len;
  849. result->nfc_data.atqa[0] = dev_list[0].dev.nfca.sensRes.anticollisionInfo;
  850. result->nfc_data.atqa[1] = dev_list[0].dev.nfca.sensRes.platformInfo;
  851. result->nfc_data.sak = dev_list[0].dev.nfca.selRes.sak;
  852. result->nfc_data.device = NfcDeviceNfca;
  853. result->nfc_data.protocol = NfcDeviceProtocolMifareDesfire;
  854. memcpy(result->nfc_data.uid, dev_list[0].dev.nfca.nfcId1, result->nfc_data.uid_len);
  855. // Get DESFire version
  856. tx_len = mf_df_prepare_get_version(tx_buff);
  857. err = nfc_exchange_full(tx_buff, tx_len, rx_buff, sizeof(rx_buff), &rx_len);
  858. if(err != ERR_NONE) {
  859. FURI_LOG_W(TAG, "Bad exchange getting version, err: %d", err);
  860. continue;
  861. }
  862. if(!mf_df_parse_get_version_response(rx_buff, rx_len, &data->version)) {
  863. FURI_LOG_W(TAG, "Bad DESFire GET_VERSION response");
  864. continue;
  865. }
  866. tx_len = mf_df_prepare_get_free_memory(tx_buff);
  867. err = nfc_exchange_full(tx_buff, tx_len, rx_buff, sizeof(rx_buff), &rx_len);
  868. if(err == ERR_NONE) {
  869. data->free_memory = malloc(sizeof(MifareDesfireFreeMemory));
  870. memset(data->free_memory, 0, sizeof(MifareDesfireFreeMemory));
  871. if(!mf_df_parse_get_free_memory_response(rx_buff, rx_len, data->free_memory)) {
  872. FURI_LOG_D(TAG, "Bad DESFire GET_FREE_MEMORY response (normal for pre-EV1 cards)");
  873. free(data->free_memory);
  874. data->free_memory = NULL;
  875. }
  876. }
  877. tx_len = mf_df_prepare_get_key_settings(tx_buff);
  878. err = nfc_exchange_full(tx_buff, tx_len, rx_buff, sizeof(rx_buff), &rx_len);
  879. if(err != ERR_NONE) {
  880. FURI_LOG_D(TAG, "Bad exchange getting key settings, err: %d", err);
  881. } else {
  882. data->master_key_settings = malloc(sizeof(MifareDesfireKeySettings));
  883. memset(data->master_key_settings, 0, sizeof(MifareDesfireKeySettings));
  884. if(!mf_df_parse_get_key_settings_response(rx_buff, rx_len, data->master_key_settings)) {
  885. FURI_LOG_W(TAG, "Bad DESFire GET_KEY_SETTINGS response");
  886. free(data->master_key_settings);
  887. data->master_key_settings = NULL;
  888. }
  889. MifareDesfireKeyVersion** key_version_head =
  890. &data->master_key_settings->key_version_head;
  891. for(uint8_t key_id = 0; key_id < data->master_key_settings->max_keys; key_id++) {
  892. tx_len = mf_df_prepare_get_key_version(tx_buff, key_id);
  893. err = nfc_exchange_full(tx_buff, tx_len, rx_buff, sizeof(rx_buff), &rx_len);
  894. if(err != ERR_NONE) {
  895. FURI_LOG_W(TAG, "Bad exchange getting key version, err: %d", err);
  896. continue;
  897. }
  898. MifareDesfireKeyVersion* key_version = malloc(sizeof(MifareDesfireKeyVersion));
  899. memset(key_version, 0, sizeof(MifareDesfireKeyVersion));
  900. key_version->id = key_id;
  901. if(!mf_df_parse_get_key_version_response(rx_buff, rx_len, key_version)) {
  902. FURI_LOG_W(TAG, "Bad DESFire GET_KEY_VERSION response");
  903. free(key_version);
  904. continue;
  905. }
  906. *key_version_head = key_version;
  907. key_version_head = &key_version->next;
  908. }
  909. }
  910. tx_len = mf_df_prepare_get_application_ids(tx_buff);
  911. err = nfc_exchange_full(tx_buff, tx_len, rx_buff, sizeof(rx_buff), &rx_len);
  912. if(err != ERR_NONE) {
  913. FURI_LOG_W(TAG, "Bad exchange getting application IDs, err: %d", err);
  914. } else {
  915. if(!mf_df_parse_get_application_ids_response(rx_buff, rx_len, &data->app_head)) {
  916. FURI_LOG_W(TAG, "Bad DESFire GET_APPLICATION_IDS response");
  917. }
  918. }
  919. for(MifareDesfireApplication* app = data->app_head; app; app = app->next) {
  920. tx_len = mf_df_prepare_select_application(tx_buff, app->id);
  921. err = nfc_exchange_full(tx_buff, tx_len, rx_buff, sizeof(rx_buff), &rx_len);
  922. if(!mf_df_parse_select_application_response(rx_buff, rx_len)) {
  923. FURI_LOG_W(TAG, "Bad exchange selecting application, err: %d", err);
  924. continue;
  925. }
  926. tx_len = mf_df_prepare_get_key_settings(tx_buff);
  927. err = nfc_exchange_full(tx_buff, tx_len, rx_buff, sizeof(rx_buff), &rx_len);
  928. if(err != ERR_NONE) {
  929. FURI_LOG_W(TAG, "Bad exchange getting key settings, err: %d", err);
  930. } else {
  931. app->key_settings = malloc(sizeof(MifareDesfireKeySettings));
  932. memset(app->key_settings, 0, sizeof(MifareDesfireKeySettings));
  933. if(!mf_df_parse_get_key_settings_response(rx_buff, rx_len, app->key_settings)) {
  934. FURI_LOG_W(TAG, "Bad DESFire GET_KEY_SETTINGS response");
  935. free(app->key_settings);
  936. app->key_settings = NULL;
  937. }
  938. MifareDesfireKeyVersion** key_version_head = &app->key_settings->key_version_head;
  939. for(uint8_t key_id = 0; key_id < app->key_settings->max_keys; key_id++) {
  940. tx_len = mf_df_prepare_get_key_version(tx_buff, key_id);
  941. err = nfc_exchange_full(tx_buff, tx_len, rx_buff, sizeof(rx_buff), &rx_len);
  942. if(err != ERR_NONE) {
  943. FURI_LOG_W(TAG, "Bad exchange getting key version, err: %d", err);
  944. continue;
  945. }
  946. MifareDesfireKeyVersion* key_version = malloc(sizeof(MifareDesfireKeyVersion));
  947. memset(key_version, 0, sizeof(MifareDesfireKeyVersion));
  948. key_version->id = key_id;
  949. if(!mf_df_parse_get_key_version_response(rx_buff, rx_len, key_version)) {
  950. FURI_LOG_W(TAG, "Bad DESFire GET_KEY_VERSION response");
  951. free(key_version);
  952. continue;
  953. }
  954. *key_version_head = key_version;
  955. key_version_head = &key_version->next;
  956. }
  957. }
  958. tx_len = mf_df_prepare_get_file_ids(tx_buff);
  959. err = nfc_exchange_full(tx_buff, tx_len, rx_buff, sizeof(rx_buff), &rx_len);
  960. if(err != ERR_NONE) {
  961. FURI_LOG_W(TAG, "Bad exchange getting file IDs, err: %d", err);
  962. } else {
  963. if(!mf_df_parse_get_file_ids_response(rx_buff, rx_len, &app->file_head)) {
  964. FURI_LOG_W(TAG, "Bad DESFire GET_FILE_IDS response");
  965. }
  966. }
  967. for(MifareDesfireFile* file = app->file_head; file; file = file->next) {
  968. tx_len = mf_df_prepare_get_file_settings(tx_buff, file->id);
  969. err = nfc_exchange_full(tx_buff, tx_len, rx_buff, sizeof(rx_buff), &rx_len);
  970. if(err != ERR_NONE) {
  971. FURI_LOG_W(TAG, "Bad exchange getting file settings, err: %d", err);
  972. continue;
  973. }
  974. if(!mf_df_parse_get_file_settings_response(rx_buff, rx_len, file)) {
  975. FURI_LOG_W(TAG, "Bad DESFire GET_FILE_SETTINGS response");
  976. continue;
  977. }
  978. switch(file->type) {
  979. case MifareDesfireFileTypeStandard:
  980. case MifareDesfireFileTypeBackup:
  981. tx_len = mf_df_prepare_read_data(tx_buff, file->id, 0, 0);
  982. break;
  983. case MifareDesfireFileTypeValue:
  984. tx_len = mf_df_prepare_get_value(tx_buff, file->id);
  985. break;
  986. case MifareDesfireFileTypeLinearRecord:
  987. case MifareDesfireFileTypeCyclicRecord:
  988. tx_len = mf_df_prepare_read_records(tx_buff, file->id, 0, 0);
  989. break;
  990. }
  991. err = nfc_exchange_full(tx_buff, tx_len, rx_buff, sizeof(rx_buff), &rx_len);
  992. if(err != ERR_NONE) {
  993. FURI_LOG_W(TAG, "Bad exchange reading file %d, err: %d", file->id, err);
  994. continue;
  995. }
  996. if(!mf_df_parse_read_data_response(rx_buff, rx_len, file)) {
  997. FURI_LOG_W(TAG, "Bad response reading file %d", file->id);
  998. continue;
  999. }
  1000. }
  1001. }
  1002. // Notify caller and exit
  1003. if(nfc_worker->callback) {
  1004. nfc_worker->callback(NfcWorkerEventSuccess, nfc_worker->context);
  1005. }
  1006. break;
  1007. }
  1008. }
  1009. void nfc_worker_field(NfcWorker* nfc_worker) {
  1010. furi_hal_nfc_field_on();
  1011. while(nfc_worker->state == NfcWorkerStateField) {
  1012. osDelay(50);
  1013. }
  1014. furi_hal_nfc_field_off();
  1015. }