picopass_worker.c 45 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292
  1. #include "picopass_worker_i.h"
  2. #include <flipper_format/flipper_format.h>
  3. #include <lib/nfc/protocols/nfcv.h>
  4. #define TAG "PicopassWorker"
  5. #define HAS_MASK(x, b) ((x & b) == b)
  6. // CSNs from Proxmark3 repo
  7. static const uint8_t loclass_csns[LOCLASS_NUM_CSNS][RFAL_PICOPASS_BLOCK_LEN] = {
  8. {0x01, 0x0A, 0x0F, 0xFF, 0xF7, 0xFF, 0x12, 0xE0},
  9. {0x0C, 0x06, 0x0C, 0xFE, 0xF7, 0xFF, 0x12, 0xE0},
  10. {0x10, 0x97, 0x83, 0x7B, 0xF7, 0xFF, 0x12, 0xE0},
  11. {0x13, 0x97, 0x82, 0x7A, 0xF7, 0xFF, 0x12, 0xE0},
  12. {0x07, 0x0E, 0x0D, 0xF9, 0xF7, 0xFF, 0x12, 0xE0},
  13. {0x14, 0x96, 0x84, 0x76, 0xF7, 0xFF, 0x12, 0xE0},
  14. {0x17, 0x96, 0x85, 0x71, 0xF7, 0xFF, 0x12, 0xE0},
  15. {0xCE, 0xC5, 0x0F, 0x77, 0xF7, 0xFF, 0x12, 0xE0},
  16. {0xD2, 0x5A, 0x82, 0xF8, 0xF7, 0xFF, 0x12, 0xE0},
  17. };
  18. static void picopass_worker_enable_field() {
  19. furi_hal_nfc_exit_sleep();
  20. furi_hal_nfc_ll_txrx_on();
  21. furi_hal_nfc_ll_poll();
  22. }
  23. static ReturnCode picopass_worker_disable_field(ReturnCode rc) {
  24. furi_hal_nfc_ll_txrx_off();
  25. furi_hal_nfc_start_sleep();
  26. return rc;
  27. }
  28. /***************************** Picopass Worker API *******************************/
  29. PicopassWorker* picopass_worker_alloc() {
  30. PicopassWorker* picopass_worker = malloc(sizeof(PicopassWorker));
  31. // Worker thread attributes
  32. picopass_worker->thread =
  33. furi_thread_alloc_ex("PicopassWorker", 8 * 1024, picopass_worker_task, picopass_worker);
  34. picopass_worker->callback = NULL;
  35. picopass_worker->context = NULL;
  36. picopass_worker->storage = furi_record_open(RECORD_STORAGE);
  37. picopass_worker_change_state(picopass_worker, PicopassWorkerStateReady);
  38. return picopass_worker;
  39. }
  40. void picopass_worker_free(PicopassWorker* picopass_worker) {
  41. furi_assert(picopass_worker);
  42. furi_thread_free(picopass_worker->thread);
  43. furi_record_close(RECORD_STORAGE);
  44. free(picopass_worker);
  45. }
  46. PicopassWorkerState picopass_worker_get_state(PicopassWorker* picopass_worker) {
  47. return picopass_worker->state;
  48. }
  49. void picopass_worker_start(
  50. PicopassWorker* picopass_worker,
  51. PicopassWorkerState state,
  52. PicopassDeviceData* dev_data,
  53. PicopassWorkerCallback callback,
  54. void* context) {
  55. furi_assert(picopass_worker);
  56. furi_assert(dev_data);
  57. picopass_worker->callback = callback;
  58. picopass_worker->context = context;
  59. picopass_worker->dev_data = dev_data;
  60. picopass_worker_change_state(picopass_worker, state);
  61. furi_thread_start(picopass_worker->thread);
  62. }
  63. void picopass_worker_stop(PicopassWorker* picopass_worker) {
  64. furi_assert(picopass_worker);
  65. furi_assert(picopass_worker->thread);
  66. if(furi_thread_get_state(picopass_worker->thread) == FuriThreadStateStopped) {
  67. return;
  68. }
  69. if(picopass_worker->state == PicopassWorkerStateBroken ||
  70. picopass_worker->state == PicopassWorkerStateReady) {
  71. return;
  72. }
  73. if(picopass_worker->state != PicopassWorkerStateEmulate &&
  74. picopass_worker->state != PicopassWorkerStateLoclass) {
  75. // Can't do this while emulating in transparent mode as SPI isn't active
  76. picopass_worker_disable_field(ERR_NONE);
  77. }
  78. if(furi_thread_get_state(picopass_worker->thread) != FuriThreadStateStopped) {
  79. picopass_worker_change_state(picopass_worker, PicopassWorkerStateStop);
  80. furi_thread_join(picopass_worker->thread);
  81. }
  82. }
  83. void picopass_worker_change_state(PicopassWorker* picopass_worker, PicopassWorkerState state) {
  84. picopass_worker->state = state;
  85. }
  86. /***************************** Picopass Worker Thread *******************************/
  87. ReturnCode picopass_detect_card(int timeout) {
  88. UNUSED(timeout);
  89. ReturnCode err;
  90. err = rfalPicoPassPollerInitialize();
  91. if(err != ERR_NONE) {
  92. FURI_LOG_E(TAG, "rfalPicoPassPollerInitialize error %d", err);
  93. return err;
  94. }
  95. err = rfalFieldOnAndStartGT();
  96. if(err != ERR_NONE) {
  97. FURI_LOG_E(TAG, "rfalFieldOnAndStartGT error %d", err);
  98. return err;
  99. }
  100. err = rfalPicoPassPollerCheckPresence();
  101. if(err != ERR_RF_COLLISION) {
  102. FURI_LOG_E(TAG, "rfalPicoPassPollerCheckPresence error %d", err);
  103. return err;
  104. }
  105. return ERR_NONE;
  106. }
  107. ReturnCode picopass_read_preauth(PicopassBlock* AA1) {
  108. rfalPicoPassIdentifyRes idRes;
  109. rfalPicoPassSelectRes selRes;
  110. ReturnCode err;
  111. err = rfalPicoPassPollerIdentify(&idRes);
  112. if(err != ERR_NONE) {
  113. FURI_LOG_E(TAG, "rfalPicoPassPollerIdentify error %d", err);
  114. return err;
  115. }
  116. err = rfalPicoPassPollerSelect(idRes.CSN, &selRes);
  117. if(err != ERR_NONE) {
  118. FURI_LOG_E(TAG, "rfalPicoPassPollerSelect error %d", err);
  119. return err;
  120. }
  121. memcpy(AA1[PICOPASS_CSN_BLOCK_INDEX].data, selRes.CSN, sizeof(selRes.CSN));
  122. FURI_LOG_D(
  123. TAG,
  124. "csn %02x%02x%02x%02x%02x%02x%02x%02x",
  125. AA1[PICOPASS_CSN_BLOCK_INDEX].data[0],
  126. AA1[PICOPASS_CSN_BLOCK_INDEX].data[1],
  127. AA1[PICOPASS_CSN_BLOCK_INDEX].data[2],
  128. AA1[PICOPASS_CSN_BLOCK_INDEX].data[3],
  129. AA1[PICOPASS_CSN_BLOCK_INDEX].data[4],
  130. AA1[PICOPASS_CSN_BLOCK_INDEX].data[5],
  131. AA1[PICOPASS_CSN_BLOCK_INDEX].data[6],
  132. AA1[PICOPASS_CSN_BLOCK_INDEX].data[7]);
  133. rfalPicoPassReadBlockRes cfg = {0};
  134. rfalPicoPassPollerReadBlock(PICOPASS_CONFIG_BLOCK_INDEX, &cfg);
  135. memcpy(AA1[PICOPASS_CONFIG_BLOCK_INDEX].data, cfg.data, sizeof(cfg.data));
  136. FURI_LOG_D(
  137. TAG,
  138. "config %02x%02x%02x%02x%02x%02x%02x%02x",
  139. AA1[PICOPASS_CONFIG_BLOCK_INDEX].data[0],
  140. AA1[PICOPASS_CONFIG_BLOCK_INDEX].data[1],
  141. AA1[PICOPASS_CONFIG_BLOCK_INDEX].data[2],
  142. AA1[PICOPASS_CONFIG_BLOCK_INDEX].data[3],
  143. AA1[PICOPASS_CONFIG_BLOCK_INDEX].data[4],
  144. AA1[PICOPASS_CONFIG_BLOCK_INDEX].data[5],
  145. AA1[PICOPASS_CONFIG_BLOCK_INDEX].data[6],
  146. AA1[PICOPASS_CONFIG_BLOCK_INDEX].data[7]);
  147. rfalPicoPassReadBlockRes aia;
  148. rfalPicoPassPollerReadBlock(PICOPASS_SECURE_AIA_BLOCK_INDEX, &aia);
  149. memcpy(AA1[PICOPASS_SECURE_AIA_BLOCK_INDEX].data, aia.data, sizeof(aia.data));
  150. FURI_LOG_D(
  151. TAG,
  152. "aia %02x%02x%02x%02x%02x%02x%02x%02x",
  153. AA1[PICOPASS_SECURE_AIA_BLOCK_INDEX].data[0],
  154. AA1[PICOPASS_SECURE_AIA_BLOCK_INDEX].data[1],
  155. AA1[PICOPASS_SECURE_AIA_BLOCK_INDEX].data[2],
  156. AA1[PICOPASS_SECURE_AIA_BLOCK_INDEX].data[3],
  157. AA1[PICOPASS_SECURE_AIA_BLOCK_INDEX].data[4],
  158. AA1[PICOPASS_SECURE_AIA_BLOCK_INDEX].data[5],
  159. AA1[PICOPASS_SECURE_AIA_BLOCK_INDEX].data[6],
  160. AA1[PICOPASS_SECURE_AIA_BLOCK_INDEX].data[7]);
  161. return ERR_NONE;
  162. }
  163. static ReturnCode
  164. picopass_auth_dict(PicopassWorker* picopass_worker, IclassEliteDictType dict_type) {
  165. rfalPicoPassReadCheckRes rcRes;
  166. rfalPicoPassCheckRes chkRes;
  167. bool elite = (dict_type != IclassStandardDictTypeFlipper);
  168. PicopassDeviceData* dev_data = picopass_worker->dev_data;
  169. PicopassBlock* AA1 = dev_data->AA1;
  170. PicopassPacs* pacs = &dev_data->pacs;
  171. uint8_t* csn = AA1[PICOPASS_CSN_BLOCK_INDEX].data;
  172. uint8_t* div_key = AA1[PICOPASS_SECURE_KD_BLOCK_INDEX].data;
  173. ReturnCode err = ERR_PARAM;
  174. uint8_t mac[4] = {0};
  175. uint8_t ccnr[12] = {0};
  176. size_t index = 0;
  177. uint8_t key[RFAL_PICOPASS_BLOCK_LEN] = {0};
  178. if(!iclass_elite_dict_check_presence(dict_type)) {
  179. FURI_LOG_E(TAG, "Dictionary not found");
  180. return ERR_PARAM;
  181. }
  182. IclassEliteDict* dict = iclass_elite_dict_alloc(dict_type);
  183. if(!dict) {
  184. FURI_LOG_E(TAG, "Dictionary not allocated");
  185. return ERR_PARAM;
  186. }
  187. FURI_LOG_D(TAG, "Loaded %lu keys", iclass_elite_dict_get_total_keys(dict));
  188. while(iclass_elite_dict_get_next_key(dict, key)) {
  189. FURI_LOG_D(
  190. TAG,
  191. "Try to %s auth with key %zu %02x%02x%02x%02x%02x%02x%02x%02x",
  192. elite ? "elite" : "standard",
  193. index++,
  194. key[0],
  195. key[1],
  196. key[2],
  197. key[3],
  198. key[4],
  199. key[5],
  200. key[6],
  201. key[7]);
  202. err = rfalPicoPassPollerReadCheck(&rcRes);
  203. if(err != ERR_NONE) {
  204. FURI_LOG_E(TAG, "rfalPicoPassPollerReadCheck error %d", err);
  205. break;
  206. }
  207. memcpy(ccnr, rcRes.CCNR, sizeof(rcRes.CCNR)); // last 4 bytes left 0
  208. loclass_iclass_calc_div_key(csn, key, div_key, elite);
  209. loclass_opt_doReaderMAC(ccnr, div_key, mac);
  210. err = rfalPicoPassPollerCheck(mac, &chkRes);
  211. if(err == ERR_NONE) {
  212. memcpy(pacs->key, key, RFAL_PICOPASS_BLOCK_LEN);
  213. break;
  214. }
  215. if(picopass_worker->state != PicopassWorkerStateDetect) break;
  216. }
  217. iclass_elite_dict_free(dict);
  218. return err;
  219. }
  220. ReturnCode picopass_auth(PicopassWorker* picopass_worker) {
  221. ReturnCode err;
  222. FURI_LOG_I(TAG, "Starting system dictionary attack [Standard KDF]");
  223. err = picopass_auth_dict(picopass_worker, IclassStandardDictTypeFlipper);
  224. if(err == ERR_NONE) {
  225. return ERR_NONE;
  226. }
  227. FURI_LOG_I(TAG, "Starting user dictionary attack [Elite KDF]");
  228. err = picopass_auth_dict(picopass_worker, IclassEliteDictTypeUser);
  229. if(err == ERR_NONE) {
  230. return ERR_NONE;
  231. }
  232. FURI_LOG_I(TAG, "Starting system dictionary attack [Elite KDF]");
  233. err = picopass_auth_dict(picopass_worker, IclassEliteDictTypeFlipper);
  234. if(err == ERR_NONE) {
  235. return ERR_NONE;
  236. }
  237. return err;
  238. }
  239. ReturnCode picopass_read_card(PicopassBlock* AA1) {
  240. ReturnCode err;
  241. size_t app_limit = AA1[PICOPASS_CONFIG_BLOCK_INDEX].data[0] < PICOPASS_MAX_APP_LIMIT ?
  242. AA1[PICOPASS_CONFIG_BLOCK_INDEX].data[0] :
  243. PICOPASS_MAX_APP_LIMIT;
  244. for(size_t i = 2; i < app_limit; i++) {
  245. if(i == PICOPASS_SECURE_KD_BLOCK_INDEX) {
  246. // Skip over Kd block which is populated earlier (READ of Kd returns all FF's)
  247. continue;
  248. }
  249. rfalPicoPassReadBlockRes block;
  250. err = rfalPicoPassPollerReadBlock(i, &block);
  251. if(err != ERR_NONE) {
  252. FURI_LOG_E(TAG, "rfalPicoPassPollerReadBlock error %d", err);
  253. return err;
  254. }
  255. FURI_LOG_D(
  256. TAG,
  257. "rfalPicoPassPollerReadBlock %d %02x%02x%02x%02x%02x%02x%02x%02x",
  258. i,
  259. block.data[0],
  260. block.data[1],
  261. block.data[2],
  262. block.data[3],
  263. block.data[4],
  264. block.data[5],
  265. block.data[6],
  266. block.data[7]);
  267. memcpy(AA1[i].data, block.data, sizeof(block.data));
  268. }
  269. return ERR_NONE;
  270. }
  271. ReturnCode picopass_write_card(PicopassBlock* AA1) {
  272. rfalPicoPassIdentifyRes idRes;
  273. rfalPicoPassSelectRes selRes;
  274. rfalPicoPassReadCheckRes rcRes;
  275. rfalPicoPassCheckRes chkRes;
  276. ReturnCode err;
  277. uint8_t div_key[8] = {0};
  278. uint8_t mac[4] = {0};
  279. uint8_t ccnr[12] = {0};
  280. err = rfalPicoPassPollerIdentify(&idRes);
  281. if(err != ERR_NONE) {
  282. FURI_LOG_E(TAG, "rfalPicoPassPollerIdentify error %d", err);
  283. return err;
  284. }
  285. err = rfalPicoPassPollerSelect(idRes.CSN, &selRes);
  286. if(err != ERR_NONE) {
  287. FURI_LOG_E(TAG, "rfalPicoPassPollerSelect error %d", err);
  288. return err;
  289. }
  290. err = rfalPicoPassPollerReadCheck(&rcRes);
  291. if(err != ERR_NONE) {
  292. FURI_LOG_E(TAG, "rfalPicoPassPollerReadCheck error %d", err);
  293. return err;
  294. }
  295. memcpy(ccnr, rcRes.CCNR, sizeof(rcRes.CCNR)); // last 4 bytes left 0
  296. loclass_iclass_calc_div_key(selRes.CSN, (uint8_t*)picopass_iclass_key, div_key, false);
  297. loclass_opt_doReaderMAC(ccnr, div_key, mac);
  298. err = rfalPicoPassPollerCheck(mac, &chkRes);
  299. if(err != ERR_NONE) {
  300. FURI_LOG_E(TAG, "rfalPicoPassPollerCheck error %d", err);
  301. return err;
  302. }
  303. for(size_t i = 6; i < 10; i++) {
  304. FURI_LOG_D(TAG, "rfalPicoPassPollerWriteBlock %d", i);
  305. uint8_t data[9] = {0};
  306. data[0] = i;
  307. memcpy(data + 1, AA1[i].data, RFAL_PICOPASS_BLOCK_LEN);
  308. loclass_doMAC_N(data, sizeof(data), div_key, mac);
  309. FURI_LOG_D(
  310. TAG,
  311. "loclass_doMAC_N %d %02x%02x%02x%02x%02x%02x%02x%02x %02x%02x%02x%02x",
  312. i,
  313. data[1],
  314. data[2],
  315. data[3],
  316. data[4],
  317. data[5],
  318. data[6],
  319. data[7],
  320. data[8],
  321. mac[0],
  322. mac[1],
  323. mac[2],
  324. mac[3]);
  325. err = rfalPicoPassPollerWriteBlock(i, AA1[i].data, mac);
  326. if(err != ERR_NONE) {
  327. FURI_LOG_E(TAG, "rfalPicoPassPollerWriteBlock error %d", err);
  328. return err;
  329. }
  330. }
  331. return ERR_NONE;
  332. }
  333. ReturnCode picopass_write_block(PicopassBlock* AA1, uint8_t blockNo, uint8_t* newBlock) {
  334. rfalPicoPassIdentifyRes idRes;
  335. rfalPicoPassSelectRes selRes;
  336. rfalPicoPassReadCheckRes rcRes;
  337. rfalPicoPassCheckRes chkRes;
  338. ReturnCode err;
  339. uint8_t mac[4] = {0};
  340. uint8_t ccnr[12] = {0};
  341. err = rfalPicoPassPollerIdentify(&idRes);
  342. if(err != ERR_NONE) {
  343. FURI_LOG_E(TAG, "rfalPicoPassPollerIdentify error %d", err);
  344. return err;
  345. }
  346. err = rfalPicoPassPollerSelect(idRes.CSN, &selRes);
  347. if(err != ERR_NONE) {
  348. FURI_LOG_E(TAG, "rfalPicoPassPollerSelect error %d", err);
  349. return err;
  350. }
  351. err = rfalPicoPassPollerReadCheck(&rcRes);
  352. if(err != ERR_NONE) {
  353. FURI_LOG_E(TAG, "rfalPicoPassPollerReadCheck error %d", err);
  354. return err;
  355. }
  356. memcpy(ccnr, rcRes.CCNR, sizeof(rcRes.CCNR)); // last 4 bytes left 0
  357. if(memcmp(selRes.CSN, AA1[PICOPASS_CSN_BLOCK_INDEX].data, RFAL_PICOPASS_BLOCK_LEN) != 0) {
  358. FURI_LOG_E(TAG, "Wrong CSN for write");
  359. return ERR_REQUEST;
  360. }
  361. loclass_opt_doReaderMAC(ccnr, AA1[PICOPASS_SECURE_KD_BLOCK_INDEX].data, mac);
  362. err = rfalPicoPassPollerCheck(mac, &chkRes);
  363. if(err != ERR_NONE) {
  364. FURI_LOG_E(TAG, "rfalPicoPassPollerCheck error %d", err);
  365. return err;
  366. }
  367. FURI_LOG_D(TAG, "rfalPicoPassPollerWriteBlock %d", blockNo);
  368. uint8_t data[9] = {
  369. blockNo,
  370. newBlock[0],
  371. newBlock[1],
  372. newBlock[2],
  373. newBlock[3],
  374. newBlock[4],
  375. newBlock[5],
  376. newBlock[6],
  377. newBlock[7]};
  378. loclass_doMAC_N(data, sizeof(data), AA1[PICOPASS_SECURE_KD_BLOCK_INDEX].data, mac);
  379. FURI_LOG_D(
  380. TAG,
  381. "loclass_doMAC_N %d %02x%02x%02x%02x%02x%02x%02x%02x %02x%02x%02x%02x",
  382. blockNo,
  383. data[1],
  384. data[2],
  385. data[3],
  386. data[4],
  387. data[5],
  388. data[6],
  389. data[7],
  390. data[8],
  391. mac[0],
  392. mac[1],
  393. mac[2],
  394. mac[3]);
  395. err = rfalPicoPassPollerWriteBlock(data[0], data + 1, mac);
  396. if(err != ERR_NONE) {
  397. FURI_LOG_E(TAG, "rfalPicoPassPollerWriteBlock error %d", err);
  398. return err;
  399. }
  400. return ERR_NONE;
  401. }
  402. void picopass_worker_elite_dict_attack(PicopassWorker* picopass_worker) {
  403. furi_assert(picopass_worker);
  404. furi_assert(picopass_worker->callback);
  405. picopass_device_data_clear(picopass_worker->dev_data);
  406. PicopassDeviceData* dev_data = picopass_worker->dev_data;
  407. PicopassBlock* AA1 = dev_data->AA1;
  408. PicopassPacs* pacs = &dev_data->pacs;
  409. for(size_t i = 0; i < PICOPASS_MAX_APP_LIMIT; i++) {
  410. memset(AA1[i].data, 0, sizeof(AA1[i].data));
  411. }
  412. memset(pacs, 0, sizeof(PicopassPacs));
  413. IclassEliteDictAttackData* dict_attack_data =
  414. &picopass_worker->dev_data->iclass_elite_dict_attack_data;
  415. bool elite = (dict_attack_data->type != IclassStandardDictTypeFlipper);
  416. rfalPicoPassReadCheckRes rcRes;
  417. rfalPicoPassCheckRes chkRes;
  418. ReturnCode err;
  419. uint8_t mac[4] = {0};
  420. uint8_t ccnr[12] = {0};
  421. size_t index = 0;
  422. uint8_t key[RFAL_PICOPASS_BLOCK_LEN] = {0};
  423. // Load dictionary
  424. IclassEliteDict* dict = dict_attack_data->dict;
  425. if(!dict) {
  426. FURI_LOG_E(TAG, "Dictionary not found");
  427. picopass_worker->callback(PicopassWorkerEventNoDictFound, picopass_worker->context);
  428. return;
  429. }
  430. do {
  431. if(picopass_detect_card(1000) == ERR_NONE) {
  432. picopass_worker->callback(PicopassWorkerEventCardDetected, picopass_worker->context);
  433. // Process first found device
  434. err = picopass_read_preauth(AA1);
  435. if(err != ERR_NONE) {
  436. FURI_LOG_E(TAG, "picopass_read_preauth error %d", err);
  437. picopass_worker->callback(PicopassWorkerEventAborted, picopass_worker->context);
  438. return;
  439. }
  440. // Thank you proxmark!
  441. pacs->legacy = picopass_is_memset(AA1[5].data, 0xFF, 8);
  442. pacs->se_enabled = (memcmp(AA1[5].data, "\xff\xff\xff\x00\x06\xff\xff\xff", 8) == 0);
  443. if(pacs->se_enabled) {
  444. FURI_LOG_D(TAG, "SE enabled");
  445. picopass_worker->callback(PicopassWorkerEventAborted, picopass_worker->context);
  446. return;
  447. }
  448. break;
  449. } else {
  450. picopass_worker->callback(PicopassWorkerEventNoCardDetected, picopass_worker->context);
  451. }
  452. if(picopass_worker->state != PicopassWorkerStateEliteDictAttack) break;
  453. furi_delay_ms(100);
  454. } while(true);
  455. FURI_LOG_D(
  456. TAG, "Start Dictionary attack, Key Count %lu", iclass_elite_dict_get_total_keys(dict));
  457. while(iclass_elite_dict_get_next_key(dict, key)) {
  458. FURI_LOG_T(TAG, "Key %zu", index);
  459. if(++index % PICOPASS_DICT_KEY_BATCH_SIZE == 0) {
  460. picopass_worker->callback(
  461. PicopassWorkerEventNewDictKeyBatch, picopass_worker->context);
  462. }
  463. err = rfalPicoPassPollerReadCheck(&rcRes);
  464. if(err != ERR_NONE) {
  465. FURI_LOG_E(TAG, "rfalPicoPassPollerReadCheck error %d", err);
  466. break;
  467. }
  468. memcpy(ccnr, rcRes.CCNR, sizeof(rcRes.CCNR)); // last 4 bytes left 0
  469. uint8_t* csn = AA1[PICOPASS_CSN_BLOCK_INDEX].data;
  470. uint8_t* div_key = AA1[PICOPASS_SECURE_KD_BLOCK_INDEX].data;
  471. loclass_iclass_calc_div_key(csn, key, div_key, elite);
  472. loclass_opt_doReaderMAC(ccnr, div_key, mac);
  473. err = rfalPicoPassPollerCheck(mac, &chkRes);
  474. if(err == ERR_NONE) {
  475. FURI_LOG_I(TAG, "Found key");
  476. memcpy(pacs->key, key, RFAL_PICOPASS_BLOCK_LEN);
  477. pacs->elite_kdf = elite;
  478. err = picopass_read_card(AA1);
  479. if(err != ERR_NONE) {
  480. FURI_LOG_E(TAG, "picopass_read_card error %d", err);
  481. picopass_worker->callback(PicopassWorkerEventFail, picopass_worker->context);
  482. break;
  483. }
  484. err = picopass_device_parse_credential(AA1, pacs);
  485. if(err != ERR_NONE) {
  486. FURI_LOG_E(TAG, "picopass_device_parse_credential error %d", err);
  487. picopass_worker->callback(PicopassWorkerEventFail, picopass_worker->context);
  488. break;
  489. }
  490. err = picopass_device_parse_wiegand(pacs->credential, &pacs->record);
  491. if(err != ERR_NONE) {
  492. FURI_LOG_E(TAG, "picopass_device_parse_wiegand error %d", err);
  493. picopass_worker->callback(PicopassWorkerEventFail, picopass_worker->context);
  494. break;
  495. }
  496. picopass_worker->callback(PicopassWorkerEventAborted, picopass_worker->context);
  497. break;
  498. }
  499. if(picopass_worker->state != PicopassWorkerStateEliteDictAttack) break;
  500. }
  501. FURI_LOG_D(TAG, "Dictionary complete");
  502. if(picopass_worker->state == PicopassWorkerStateEliteDictAttack) {
  503. picopass_worker->callback(PicopassWorkerEventSuccess, picopass_worker->context);
  504. } else {
  505. picopass_worker->callback(PicopassWorkerEventAborted, picopass_worker->context);
  506. }
  507. }
  508. int32_t picopass_worker_task(void* context) {
  509. PicopassWorker* picopass_worker = context;
  510. if(picopass_worker->state == PicopassWorkerStateDetect) {
  511. picopass_worker_enable_field();
  512. picopass_worker_detect(picopass_worker);
  513. } else if(picopass_worker->state == PicopassWorkerStateWrite) {
  514. picopass_worker_enable_field();
  515. picopass_worker_write(picopass_worker);
  516. } else if(picopass_worker->state == PicopassWorkerStateWriteKey) {
  517. picopass_worker_enable_field();
  518. picopass_worker_write_key(picopass_worker);
  519. } else if(picopass_worker->state == PicopassWorkerStateEliteDictAttack) {
  520. picopass_worker_enable_field();
  521. picopass_worker_elite_dict_attack(picopass_worker);
  522. } else if(picopass_worker->state == PicopassWorkerStateEmulate) {
  523. picopass_worker_emulate(picopass_worker, false);
  524. } else if(picopass_worker->state == PicopassWorkerStateLoclass) {
  525. picopass_worker_emulate(picopass_worker, true);
  526. } else if(picopass_worker->state == PicopassWorkerStateStop) {
  527. FURI_LOG_D(TAG, "Worker state stop");
  528. // no-op
  529. } else {
  530. FURI_LOG_W(TAG, "Unknown state %d", picopass_worker->state);
  531. }
  532. picopass_worker_disable_field(ERR_NONE);
  533. picopass_worker_change_state(picopass_worker, PicopassWorkerStateReady);
  534. return 0;
  535. }
  536. void picopass_worker_detect(PicopassWorker* picopass_worker) {
  537. picopass_device_data_clear(picopass_worker->dev_data);
  538. PicopassDeviceData* dev_data = picopass_worker->dev_data;
  539. PicopassBlock* AA1 = dev_data->AA1;
  540. PicopassPacs* pacs = &dev_data->pacs;
  541. ReturnCode err;
  542. // reset device data
  543. for(size_t i = 0; i < PICOPASS_MAX_APP_LIMIT; i++) {
  544. memset(AA1[i].data, 0, sizeof(AA1[i].data));
  545. }
  546. memset(pacs, 0, sizeof(PicopassPacs));
  547. PicopassWorkerEvent nextState = PicopassWorkerEventSuccess;
  548. while(picopass_worker->state == PicopassWorkerStateDetect) {
  549. if(picopass_detect_card(1000) == ERR_NONE) {
  550. // Process first found device
  551. err = picopass_read_preauth(AA1);
  552. if(err != ERR_NONE) {
  553. FURI_LOG_E(TAG, "picopass_read_preauth error %d", err);
  554. nextState = PicopassWorkerEventFail;
  555. }
  556. // Thank you proxmark!
  557. pacs->legacy = picopass_is_memset(AA1[5].data, 0xFF, 8);
  558. pacs->se_enabled = (memcmp(AA1[5].data, "\xff\xff\xff\x00\x06\xff\xff\xff", 8) == 0);
  559. if(pacs->se_enabled) {
  560. FURI_LOG_D(TAG, "SE enabled");
  561. nextState = PicopassWorkerEventFail;
  562. }
  563. if(nextState == PicopassWorkerEventSuccess) {
  564. err = picopass_auth(picopass_worker);
  565. if(err != ERR_NONE) {
  566. FURI_LOG_E(TAG, "picopass_try_auth error %d", err);
  567. nextState = PicopassWorkerEventFail;
  568. }
  569. }
  570. if(nextState == PicopassWorkerEventSuccess) {
  571. err = picopass_read_card(AA1);
  572. if(err != ERR_NONE) {
  573. FURI_LOG_E(TAG, "picopass_read_card error %d", err);
  574. nextState = PicopassWorkerEventFail;
  575. }
  576. }
  577. if(nextState == PicopassWorkerEventSuccess) {
  578. err = picopass_device_parse_credential(AA1, pacs);
  579. if(err != ERR_NONE) {
  580. FURI_LOG_E(TAG, "picopass_device_parse_credential error %d", err);
  581. nextState = PicopassWorkerEventFail;
  582. }
  583. }
  584. if(nextState == PicopassWorkerEventSuccess) {
  585. err = picopass_device_parse_wiegand(pacs->credential, &pacs->record);
  586. if(err != ERR_NONE) {
  587. FURI_LOG_E(TAG, "picopass_device_parse_wiegand error %d", err);
  588. nextState = PicopassWorkerEventFail;
  589. }
  590. }
  591. // Notify caller and exit
  592. if(picopass_worker->callback) {
  593. picopass_worker->callback(nextState, picopass_worker->context);
  594. }
  595. break;
  596. }
  597. furi_delay_ms(100);
  598. }
  599. }
  600. void picopass_worker_write(PicopassWorker* picopass_worker) {
  601. PicopassDeviceData* dev_data = picopass_worker->dev_data;
  602. PicopassBlock* AA1 = dev_data->AA1;
  603. ReturnCode err;
  604. PicopassWorkerEvent nextState = PicopassWorkerEventSuccess;
  605. while(picopass_worker->state == PicopassWorkerStateWrite) {
  606. if(picopass_detect_card(1000) == ERR_NONE) {
  607. err = picopass_write_card(AA1);
  608. if(err != ERR_NONE) {
  609. FURI_LOG_E(TAG, "picopass_write_card error %d", err);
  610. nextState = PicopassWorkerEventFail;
  611. }
  612. // Notify caller and exit
  613. if(picopass_worker->callback) {
  614. picopass_worker->callback(nextState, picopass_worker->context);
  615. }
  616. break;
  617. }
  618. furi_delay_ms(100);
  619. }
  620. }
  621. void picopass_worker_write_key(PicopassWorker* picopass_worker) {
  622. PicopassDeviceData* dev_data = picopass_worker->dev_data;
  623. PicopassBlock* AA1 = dev_data->AA1;
  624. PicopassPacs* pacs = &dev_data->pacs;
  625. ReturnCode err;
  626. PicopassWorkerEvent nextState = PicopassWorkerEventSuccess;
  627. uint8_t* csn = AA1[PICOPASS_CSN_BLOCK_INDEX].data;
  628. uint8_t* configBlock = AA1[PICOPASS_CONFIG_BLOCK_INDEX].data;
  629. uint8_t fuses = configBlock[7];
  630. uint8_t* oldKey = AA1[PICOPASS_SECURE_KD_BLOCK_INDEX].data;
  631. uint8_t newKey[RFAL_PICOPASS_BLOCK_LEN] = {0};
  632. loclass_iclass_calc_div_key(csn, pacs->key, newKey, pacs->elite_kdf);
  633. if((fuses & 0x80) == 0x80) {
  634. FURI_LOG_D(TAG, "Plain write for personalized mode key change");
  635. } else {
  636. FURI_LOG_D(TAG, "XOR write for application mode key change");
  637. // XOR when in application mode
  638. for(size_t i = 0; i < RFAL_PICOPASS_BLOCK_LEN; i++) {
  639. newKey[i] ^= oldKey[i];
  640. }
  641. }
  642. while(picopass_worker->state == PicopassWorkerStateWriteKey) {
  643. if(picopass_detect_card(1000) == ERR_NONE) {
  644. err = picopass_write_block(AA1, PICOPASS_SECURE_KD_BLOCK_INDEX, newKey);
  645. if(err != ERR_NONE) {
  646. FURI_LOG_E(TAG, "picopass_write_block error %d", err);
  647. nextState = PicopassWorkerEventFail;
  648. }
  649. // Notify caller and exit
  650. if(picopass_worker->callback) {
  651. picopass_worker->callback(nextState, picopass_worker->context);
  652. }
  653. break;
  654. }
  655. furi_delay_ms(100);
  656. }
  657. }
  658. // from proxmark3 armsrc/iclass.c rotateCSN
  659. static void picopass_anticoll_csn(uint8_t* rotated_csn, const uint8_t* original_csn) {
  660. for(uint8_t i = 0; i < 8; i++) {
  661. rotated_csn[i] = (original_csn[i] >> 3) | (original_csn[(i + 1) % 8] << 5);
  662. }
  663. }
  664. static void picopass_append_crc(uint8_t* buf, uint16_t size) {
  665. uint16_t crc = rfalPicoPassCalculateCcitt(0xE012, buf, size);
  666. buf[size] = crc & 0xFF;
  667. buf[size + 1] = crc >> 8;
  668. }
  669. static inline void picopass_emu_read_blocks(
  670. NfcVData* nfcv_data,
  671. uint8_t* buf,
  672. uint8_t block_num,
  673. uint8_t block_count) {
  674. memcpy(
  675. buf,
  676. nfcv_data->data + (block_num * RFAL_PICOPASS_BLOCK_LEN),
  677. block_count * RFAL_PICOPASS_BLOCK_LEN);
  678. }
  679. static inline void picopass_emu_write_blocks(
  680. NfcVData* nfcv_data,
  681. const uint8_t* buf,
  682. uint8_t block_num,
  683. uint8_t block_count) {
  684. memcpy(
  685. nfcv_data->data + (block_num * RFAL_PICOPASS_BLOCK_LEN),
  686. buf,
  687. block_count * RFAL_PICOPASS_BLOCK_LEN);
  688. }
  689. static void picopass_init_cipher_state(NfcVData* nfcv_data, PicopassEmulatorCtx* ctx) {
  690. uint8_t cc[RFAL_PICOPASS_BLOCK_LEN];
  691. uint8_t key[RFAL_PICOPASS_BLOCK_LEN];
  692. picopass_emu_read_blocks(nfcv_data, cc, PICOPASS_SECURE_EPURSE_BLOCK_INDEX, 1);
  693. picopass_emu_read_blocks(nfcv_data, key, ctx->key_block_num, 1);
  694. ctx->cipher_state = loclass_opt_doTagMAC_1(cc, key);
  695. }
  696. static void
  697. loclass_update_csn(FuriHalNfcDevData* nfc_data, NfcVData* nfcv_data, PicopassEmulatorCtx* ctx) {
  698. // collect two nonces in a row for each CSN
  699. uint8_t csn_num = (ctx->key_block_num / 2) % LOCLASS_NUM_CSNS;
  700. memcpy(nfc_data->uid, loclass_csns[csn_num], RFAL_PICOPASS_BLOCK_LEN);
  701. picopass_emu_write_blocks(nfcv_data, loclass_csns[csn_num], PICOPASS_CSN_BLOCK_INDEX, 1);
  702. }
  703. static void picopass_emu_handle_packet(
  704. FuriHalNfcTxRxContext* tx_rx,
  705. FuriHalNfcDevData* nfc_data,
  706. void* nfcv_data_in) {
  707. NfcVData* nfcv_data = (NfcVData*)nfcv_data_in;
  708. PicopassEmulatorCtx* ctx = nfcv_data->emu_protocol_ctx;
  709. uint8_t response[34];
  710. uint8_t response_length = 0;
  711. uint8_t key_block_num = PICOPASS_SECURE_KD_BLOCK_INDEX;
  712. const uint8_t block_ff[8] = {0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF};
  713. if(nfcv_data->frame_length < 1) {
  714. return;
  715. }
  716. switch(nfcv_data->frame[0]) {
  717. case RFAL_PICOPASS_CMD_ACTALL: // No args
  718. if(nfcv_data->frame_length != 1) {
  719. return;
  720. }
  721. if(ctx->state != PicopassEmulatorStateHalt) {
  722. ctx->state = PicopassEmulatorStateActive;
  723. }
  724. // Send SOF only
  725. break;
  726. case RFAL_PICOPASS_CMD_ACT: // No args
  727. if(nfcv_data->frame_length != 1 || ctx->state != PicopassEmulatorStateActive) {
  728. return;
  729. }
  730. // Send SOF only
  731. break;
  732. case RFAL_PICOPASS_CMD_HALT: // No args
  733. if(nfcv_data->frame_length != 1 || ctx->state != PicopassEmulatorStateSelected) {
  734. return;
  735. }
  736. // Technically we should go to StateHalt, but since we can't detect the field dropping we drop to idle instead
  737. ctx->state = PicopassEmulatorStateIdle;
  738. // Send SOF only
  739. break;
  740. case RFAL_PICOPASS_CMD_READ_OR_IDENTIFY:
  741. if(nfcv_data->frame_length == 1 &&
  742. ctx->state == PicopassEmulatorStateActive) { // PICOPASS_CMD_IDENTIFY
  743. // ASNB(8) CRC16(2)
  744. picopass_anticoll_csn(response, nfc_data->uid);
  745. picopass_append_crc(response, RFAL_PICOPASS_BLOCK_LEN);
  746. response_length = RFAL_PICOPASS_BLOCK_LEN + 2;
  747. break;
  748. } else if(
  749. nfcv_data->frame_length == 4 &&
  750. ctx->state == PicopassEmulatorStateSelected) { // PICOPASS_CMD_READ ADDRESS(1) CRC16(2)
  751. if(nfcv_data->frame[1] >= PICOPASS_MAX_APP_LIMIT) {
  752. return;
  753. }
  754. // TODO: Check CRC?
  755. // TODO: Check auth?
  756. // DATA(8) CRC16(2)
  757. if(nfcv_data->frame[1] == PICOPASS_SECURE_KD_BLOCK_INDEX ||
  758. nfcv_data->frame[1] == PICOPASS_SECURE_KC_BLOCK_INDEX) {
  759. // Reading Kd or Kc blocks always returns FF's
  760. memcpy(response, block_ff, RFAL_PICOPASS_BLOCK_LEN);
  761. } else {
  762. picopass_emu_read_blocks(nfcv_data, response, nfcv_data->frame[1], 1);
  763. }
  764. picopass_append_crc(response, RFAL_PICOPASS_BLOCK_LEN);
  765. response_length = RFAL_PICOPASS_BLOCK_LEN + 2;
  766. break;
  767. }
  768. return;
  769. case RFAL_PICOPASS_CMD_READ4: // ADDRESS(1) CRC16(2)
  770. if(nfcv_data->frame_length != 4 || ctx->state != PicopassEmulatorStateSelected ||
  771. nfcv_data->frame[1] + 4 >= PICOPASS_MAX_APP_LIMIT) {
  772. return;
  773. }
  774. // TODO: Check CRC?
  775. // TODO: Check auth?
  776. uint8_t blockNum = nfcv_data->frame[1];
  777. // DATA(32) CRC16(2)
  778. picopass_emu_read_blocks(nfcv_data, response, blockNum, 4);
  779. if(blockNum == 4) {
  780. // Kc is block 4, so just redact first block of response
  781. memcpy(response, block_ff, RFAL_PICOPASS_BLOCK_LEN);
  782. } else if(blockNum < 4) {
  783. // Kd is block 3
  784. uint8_t* kdOffset = response + ((3 - blockNum) * RFAL_PICOPASS_BLOCK_LEN);
  785. memcpy(kdOffset, block_ff, RFAL_PICOPASS_BLOCK_LEN);
  786. if(blockNum != 0) {
  787. // Redact Kc
  788. memcpy(kdOffset + RFAL_PICOPASS_BLOCK_LEN, block_ff, RFAL_PICOPASS_BLOCK_LEN);
  789. }
  790. }
  791. picopass_append_crc(response, RFAL_PICOPASS_BLOCK_LEN * 4);
  792. response_length = (RFAL_PICOPASS_BLOCK_LEN * 4) + 2;
  793. break;
  794. case RFAL_PICOPASS_CMD_SELECT: // ASNB(8)|SERIALNB(8)
  795. if(nfcv_data->frame_length != 9) {
  796. return;
  797. }
  798. uint8_t select_csn[RFAL_PICOPASS_BLOCK_LEN];
  799. if(ctx->state == PicopassEmulatorStateHalt || ctx->state == PicopassEmulatorStateIdle) {
  800. memcpy(select_csn, nfc_data->uid, RFAL_PICOPASS_BLOCK_LEN);
  801. } else {
  802. picopass_anticoll_csn(select_csn, nfc_data->uid);
  803. }
  804. if(memcmp(nfcv_data->frame + 1, select_csn, RFAL_PICOPASS_BLOCK_LEN)) {
  805. if(ctx->state == PicopassEmulatorStateActive) {
  806. ctx->state = PicopassEmulatorStateIdle;
  807. } else if(ctx->state == PicopassEmulatorStateSelected) {
  808. // Technically we should go to StateHalt, but since we can't detect the field dropping we drop to idle instead
  809. ctx->state = PicopassEmulatorStateIdle;
  810. }
  811. return;
  812. }
  813. ctx->state = PicopassEmulatorStateSelected;
  814. // SERIALNB(8) CRC16(2)
  815. memcpy(response, nfc_data->uid, RFAL_PICOPASS_BLOCK_LEN);
  816. picopass_append_crc(response, RFAL_PICOPASS_BLOCK_LEN);
  817. response_length = RFAL_PICOPASS_BLOCK_LEN + 2;
  818. break;
  819. case RFAL_PICOPASS_CMD_READCHECK_KC: // ADDRESS(1)
  820. key_block_num = PICOPASS_SECURE_KC_BLOCK_INDEX;
  821. // fallthrough
  822. case RFAL_PICOPASS_CMD_READCHECK_KD: // ADDRESS(1)
  823. if(nfcv_data->frame_length != 2 ||
  824. nfcv_data->frame[1] != PICOPASS_SECURE_EPURSE_BLOCK_INDEX ||
  825. ctx->state != PicopassEmulatorStateSelected) {
  826. return;
  827. }
  828. if(ctx->key_block_num != key_block_num && !ctx->loclass_mode) {
  829. ctx->key_block_num = key_block_num;
  830. picopass_init_cipher_state(nfcv_data, ctx);
  831. }
  832. // DATA(8)
  833. picopass_emu_read_blocks(nfcv_data, response, nfcv_data->frame[1], 1);
  834. response_length = RFAL_PICOPASS_BLOCK_LEN;
  835. break;
  836. case RFAL_PICOPASS_CMD_CHECK: // CHALLENGE(4) READERSIGNATURE(4)
  837. if(nfcv_data->frame_length != 9 || ctx->state != PicopassEmulatorStateSelected) {
  838. return;
  839. }
  840. if(ctx->loclass_mode) {
  841. // LOCLASS Reader attack mode
  842. // Copy EPURSE
  843. uint8_t cc[RFAL_PICOPASS_BLOCK_LEN];
  844. picopass_emu_read_blocks(nfcv_data, cc, PICOPASS_SECURE_EPURSE_BLOCK_INDEX, 1);
  845. // Check if the nonce is from a standard key
  846. uint8_t key[RFAL_PICOPASS_BLOCK_LEN];
  847. loclass_iclass_calc_div_key(nfc_data->uid, picopass_iclass_key, key, false);
  848. ctx->cipher_state = loclass_opt_doTagMAC_1(cc, key);
  849. uint8_t rmac[4];
  850. loclass_opt_doBothMAC_2(ctx->cipher_state, nfcv_data->frame + 1, rmac, response, key);
  851. if(!memcmp(nfcv_data->frame + 5, rmac, 4)) {
  852. // MAC from reader matches Standard Key, keyroll mode or non-elite keyed reader.
  853. // Either way no point logging it.
  854. FURI_LOG_W(TAG, "loclass: standard key detected during collection");
  855. ctx->loclass_got_std_key = true;
  856. ctx->state = PicopassEmulatorStateIdle;
  857. return;
  858. }
  859. // Copy CHALLENGE (nr) and READERSIGNATURE (mac) from frame
  860. uint8_t nr[4];
  861. memcpy(nr, nfcv_data->frame + 1, 4);
  862. uint8_t mac[4];
  863. memcpy(mac, nfcv_data->frame + 5, 4);
  864. FURI_LOG_I(TAG, "loclass: got nr/mac pair");
  865. loclass_writer_write_params(
  866. ctx->loclass_writer, ctx->key_block_num, nfc_data->uid, cc, nr, mac);
  867. // Rotate to the next CSN
  868. ctx->key_block_num = (ctx->key_block_num + 1) % (LOCLASS_NUM_CSNS * 2);
  869. loclass_update_csn(nfc_data, nfcv_data, ctx);
  870. ctx->state = PicopassEmulatorStateIdle;
  871. return;
  872. }
  873. uint8_t key[RFAL_PICOPASS_BLOCK_LEN];
  874. picopass_emu_read_blocks(nfcv_data, key, ctx->key_block_num, 1);
  875. uint8_t rmac[4];
  876. loclass_opt_doBothMAC_2(ctx->cipher_state, nfcv_data->frame + 1, rmac, response, key);
  877. #ifndef PICOPASS_DEBUG_IGNORE_BAD_RMAC
  878. if(memcmp(nfcv_data->frame + 5, rmac, 4)) {
  879. // Bad MAC from reader, do not send a response.
  880. FURI_LOG_I(TAG, "Got bad MAC from reader");
  881. // Reset the cipher state since we don't do it in READCHECK
  882. picopass_init_cipher_state(nfcv_data, ctx);
  883. return;
  884. }
  885. #endif
  886. // CHIPRESPONSE(4)
  887. response_length = 4;
  888. break;
  889. case RFAL_PICOPASS_CMD_UPDATE: // ADDRESS(1) DATA(8) SIGN(4)|CRC16(2)
  890. if((nfcv_data->frame_length != 12 && nfcv_data->frame_length != 14) ||
  891. ctx->state != PicopassEmulatorStateSelected) {
  892. return;
  893. }
  894. if(nfcv_data->frame[1] >= PICOPASS_MAX_APP_LIMIT) {
  895. return;
  896. }
  897. uint8_t cfgBlock[RFAL_PICOPASS_BLOCK_LEN];
  898. picopass_emu_read_blocks(nfcv_data, cfgBlock, PICOPASS_CONFIG_BLOCK_INDEX, 1);
  899. bool persMode = HAS_MASK(cfgBlock[7], PICOPASS_FUSE_PERS);
  900. if((nfcv_data->frame[1] == PICOPASS_CSN_BLOCK_INDEX) // CSN is always read only
  901. ||
  902. (!persMode &&
  903. !HAS_MASK(cfgBlock[3], 0x80)) // Chip is in RO mode, no updated possible (even ePurse)
  904. || (!persMode &&
  905. nfcv_data->frame[1] ==
  906. PICOPASS_SECURE_AIA_BLOCK_INDEX) // AIA can only be set in personalisation mode
  907. || (!persMode &&
  908. (nfcv_data->frame[1] == PICOPASS_SECURE_KD_BLOCK_INDEX ||
  909. nfcv_data->frame[1] == PICOPASS_SECURE_KC_BLOCK_INDEX) &&
  910. (!HAS_MASK(cfgBlock[7], PICOPASS_FUSE_CRYPT10)))) {
  911. return; // TODO: Is this the right response?
  912. }
  913. if(nfcv_data->frame[1] >= 6 && nfcv_data->frame[1] <= 12) {
  914. if(!HAS_MASK(
  915. cfgBlock[3],
  916. 1 << (nfcv_data->frame[1] - 6))) { // bit0 is block6, up to bit6 being block12
  917. // Block is marked as read-only, deny writing
  918. return; // TODO: Is this the right response?
  919. }
  920. }
  921. // TODO: Check CRC/SIGN depending on if in secure mode
  922. // Check correct key
  923. // -> Kd only allows decrementing e-Purse
  924. // -> per-app controlled by key access config
  925. //bool keyAccess = HAS_MASK(cfgBlock[5], 0x01);
  926. // -> must auth with that key to change it
  927. uint8_t blockOffset = nfcv_data->frame[1];
  928. uint8_t block[RFAL_PICOPASS_BLOCK_LEN];
  929. switch(nfcv_data->frame[1]) {
  930. case PICOPASS_CONFIG_BLOCK_INDEX:
  931. block[0] = cfgBlock[0]; // Applications Limit
  932. block[1] = cfgBlock[1] & nfcv_data->frame[3]; // OTP
  933. block[2] = cfgBlock[2] & nfcv_data->frame[4]; // OTP
  934. block[3] = cfgBlock[3] & nfcv_data->frame[5]; // Block Write Lock
  935. block[4] = cfgBlock[4]; // Chip Config
  936. block[5] = cfgBlock[5]; // Memory Config
  937. block[6] = nfcv_data->frame[8]; // EAS
  938. block[7] = cfgBlock[7]; // Fuses
  939. // Some parts allow w (but not e) if in persMode
  940. if(persMode) {
  941. block[0] &= nfcv_data->frame[2]; // Applications Limit
  942. block[4] &= nfcv_data->frame[6]; // Chip Config
  943. block[5] &= nfcv_data->frame[7]; // Memory Config
  944. block[7] &= nfcv_data->frame[9]; // Fuses
  945. } else {
  946. // Fuses allows setting Crypt1/0 from 1 to 0 only during application mode
  947. block[7] &= nfcv_data->frame[9] | ~PICOPASS_FUSE_CRYPT10;
  948. }
  949. break;
  950. case PICOPASS_SECURE_EPURSE_BLOCK_INDEX:
  951. // ePurse updates swap first and second half of the block each update
  952. memcpy(block + 4, nfcv_data->frame + 2, 4);
  953. memcpy(block, nfcv_data->frame + 6, 4);
  954. break;
  955. case PICOPASS_SECURE_KD_BLOCK_INDEX:
  956. // fallthrough
  957. case PICOPASS_SECURE_KC_BLOCK_INDEX:
  958. if(!persMode) {
  959. picopass_emu_read_blocks(nfcv_data, block, blockOffset, 1);
  960. for(uint8_t i = 0; i < sizeof(RFAL_PICOPASS_BLOCK_LEN); i++)
  961. block[i] ^= nfcv_data->frame[i + 2];
  962. break;
  963. }
  964. // Use default case when in personalisation mode
  965. // fallthrough
  966. default:
  967. memcpy(block, nfcv_data->frame + 2, RFAL_PICOPASS_BLOCK_LEN);
  968. break;
  969. }
  970. picopass_emu_write_blocks(nfcv_data, block, blockOffset, 1);
  971. if((nfcv_data->frame[1] == ctx->key_block_num ||
  972. nfcv_data->frame[1] == PICOPASS_SECURE_EPURSE_BLOCK_INDEX) &&
  973. !ctx->loclass_mode)
  974. picopass_init_cipher_state(nfcv_data, ctx);
  975. // DATA(8) CRC16(2)
  976. if(nfcv_data->frame[1] == PICOPASS_SECURE_KD_BLOCK_INDEX ||
  977. nfcv_data->frame[1] == PICOPASS_SECURE_KD_BLOCK_INDEX) {
  978. // Key updates always return FF's
  979. memcpy(response, block_ff, RFAL_PICOPASS_BLOCK_LEN);
  980. } else {
  981. memcpy(response, block, RFAL_PICOPASS_BLOCK_LEN);
  982. }
  983. picopass_append_crc(response, RFAL_PICOPASS_BLOCK_LEN);
  984. response_length = RFAL_PICOPASS_BLOCK_LEN + 2;
  985. break;
  986. case RFAL_PICOPASS_CMD_PAGESEL: // PAGE(1) CRC16(2)
  987. // Chips with a single page do not answer to this command
  988. // BLOCK1(8) CRC16(2)
  989. return;
  990. case RFAL_PICOPASS_CMD_DETECT:
  991. // TODO - not used by iClass though
  992. return;
  993. default:
  994. return;
  995. }
  996. NfcVSendFlags flags = NfcVSendFlagsSof | NfcVSendFlagsOneSubcarrier | NfcVSendFlagsHighRate;
  997. if(response_length > 0) {
  998. flags |= NfcVSendFlagsEof;
  999. }
  1000. nfcv_emu_send(
  1001. tx_rx,
  1002. nfcv_data,
  1003. response,
  1004. response_length,
  1005. flags,
  1006. nfcv_data->eof_timestamp + NFCV_FDT_FC(4000)); // 3650 is ~254uS 4000 is ~283uS
  1007. }
  1008. void picopass_worker_emulate(PicopassWorker* picopass_worker, bool loclass_mode) {
  1009. furi_hal_nfc_exit_sleep();
  1010. FuriHalNfcTxRxContext tx_rx = {};
  1011. PicopassEmulatorCtx emu_ctx = {
  1012. .state = PicopassEmulatorStateIdle,
  1013. .key_block_num = PICOPASS_SECURE_KD_BLOCK_INDEX,
  1014. .loclass_mode = loclass_mode,
  1015. .loclass_got_std_key = false,
  1016. .loclass_writer = NULL,
  1017. };
  1018. FuriHalNfcDevData nfc_data = {
  1019. .uid_len = RFAL_PICOPASS_UID_LEN,
  1020. };
  1021. NfcVData* nfcv_data = malloc(sizeof(NfcVData));
  1022. nfcv_data->block_size = RFAL_PICOPASS_BLOCK_LEN;
  1023. nfcv_data->emu_protocol_ctx = &emu_ctx;
  1024. nfcv_data->emu_protocol_handler = &picopass_emu_handle_packet;
  1025. PicopassDeviceData* dev_data = picopass_worker->dev_data;
  1026. PicopassBlock* blocks = dev_data->AA1;
  1027. if(loclass_mode) {
  1028. emu_ctx.loclass_writer = loclass_writer_alloc();
  1029. if(emu_ctx.loclass_writer == NULL) {
  1030. picopass_worker->callback(
  1031. PicopassWorkerEventLoclassFileError, picopass_worker->context);
  1032. while(picopass_worker->state == PicopassWorkerStateEmulate ||
  1033. picopass_worker->state == PicopassWorkerStateLoclass) {
  1034. furi_delay_ms(1);
  1035. }
  1036. free(nfcv_data);
  1037. return;
  1038. }
  1039. // Setup blocks for loclass attack
  1040. emu_ctx.key_block_num = 0;
  1041. loclass_update_csn(&nfc_data, nfcv_data, &emu_ctx);
  1042. uint8_t conf[8] = {0x12, 0xFF, 0xFF, 0xFF, 0x7F, 0x1F, 0xFF, 0x3C};
  1043. picopass_emu_write_blocks(nfcv_data, conf, PICOPASS_CONFIG_BLOCK_INDEX, 1);
  1044. uint8_t epurse[8] = {0xFE, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF};
  1045. picopass_emu_write_blocks(nfcv_data, epurse, PICOPASS_SECURE_EPURSE_BLOCK_INDEX, 1);
  1046. uint8_t aia[8] = {0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF};
  1047. picopass_emu_write_blocks(nfcv_data, aia, PICOPASS_SECURE_AIA_BLOCK_INDEX, 1);
  1048. loclass_writer_write_start_stop(emu_ctx.loclass_writer, true);
  1049. } else {
  1050. memcpy(nfc_data.uid, blocks[PICOPASS_CSN_BLOCK_INDEX].data, RFAL_PICOPASS_BLOCK_LEN);
  1051. memcpy(nfcv_data->data, blocks, sizeof(dev_data->AA1));
  1052. picopass_init_cipher_state(nfcv_data, &emu_ctx);
  1053. }
  1054. uint8_t last_loclass_csn_num = 0;
  1055. bool loclass_got_std_key = false;
  1056. nfcv_emu_init(&nfc_data, nfcv_data);
  1057. while(picopass_worker->state == PicopassWorkerStateEmulate ||
  1058. picopass_worker->state == PicopassWorkerStateLoclass) {
  1059. if(nfcv_emu_loop(&tx_rx, &nfc_data, nfcv_data, 500)) {
  1060. if(picopass_worker->callback) {
  1061. if((loclass_mode) && (last_loclass_csn_num != emu_ctx.key_block_num)) {
  1062. last_loclass_csn_num = emu_ctx.key_block_num;
  1063. picopass_worker->callback(
  1064. PicopassWorkerEventLoclassGotMac, picopass_worker->context);
  1065. } else if((loclass_mode) && !loclass_got_std_key && emu_ctx.loclass_got_std_key) {
  1066. loclass_got_std_key = true;
  1067. picopass_worker->callback(
  1068. PicopassWorkerEventLoclassGotStandardKey, picopass_worker->context);
  1069. } else {
  1070. picopass_worker->callback(
  1071. PicopassWorkerEventSuccess, picopass_worker->context);
  1072. }
  1073. }
  1074. }
  1075. furi_delay_us(1);
  1076. }
  1077. if(emu_ctx.loclass_writer) {
  1078. loclass_writer_write_start_stop(emu_ctx.loclass_writer, false);
  1079. loclass_writer_free(emu_ctx.loclass_writer);
  1080. }
  1081. nfcv_emu_deinit(nfcv_data);
  1082. free(nfcv_data);
  1083. }