picopass_device.c 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476
  1. #include "picopass_device.h"
  2. #include <toolbox/path.h>
  3. #include <flipper_format/flipper_format.h>
  4. #include <picopass_icons.h>
  5. #include <toolbox/protocols/protocol_dict.h>
  6. #include <lfrfid/protocols/lfrfid_protocols.h>
  7. #include <lfrfid/lfrfid_dict_file.h>
  8. #define TAG "PicopassDevice"
  9. static const char* picopass_file_header = "Flipper Picopass device";
  10. static const uint32_t picopass_file_version = 1;
  11. const uint8_t picopass_iclass_decryptionkey[] =
  12. {0xb4, 0x21, 0x2c, 0xca, 0xb7, 0xed, 0x21, 0x0f, 0x7b, 0x93, 0xd4, 0x59, 0x39, 0xc7, 0xdd, 0x36};
  13. PicopassDevice* picopass_device_alloc() {
  14. PicopassDevice* picopass_dev = malloc(sizeof(PicopassDevice));
  15. picopass_dev->dev_data.pacs.legacy = false;
  16. picopass_dev->dev_data.pacs.se_enabled = false;
  17. picopass_dev->dev_data.pacs.elite_kdf = false;
  18. picopass_dev->dev_data.pacs.pin_length = 0;
  19. picopass_dev->storage = furi_record_open(RECORD_STORAGE);
  20. picopass_dev->dialogs = furi_record_open(RECORD_DIALOGS);
  21. picopass_dev->load_path = furi_string_alloc();
  22. return picopass_dev;
  23. }
  24. void picopass_device_set_name(PicopassDevice* dev, const char* name) {
  25. furi_assert(dev);
  26. strlcpy(dev->dev_name, name, sizeof(dev->dev_name));
  27. }
  28. // For use with Seader's virtual card processing.
  29. static bool picopass_device_save_file_seader(
  30. PicopassDevice* dev,
  31. FlipperFormat* file,
  32. FuriString* file_path) {
  33. furi_assert(dev);
  34. PicopassPacs* pacs = &dev->dev_data.pacs;
  35. PicopassBlock* AA1 = dev->dev_data.AA1;
  36. bool result = false;
  37. const char* seader_file_header = "Flipper Seader Credential";
  38. const uint32_t seader_file_version = 1;
  39. do {
  40. FURI_LOG_D(
  41. TAG,
  42. "Save %s %ld to %s",
  43. seader_file_header,
  44. seader_file_version,
  45. furi_string_get_cstr(file_path));
  46. if(!flipper_format_file_open_always(file, furi_string_get_cstr(file_path))) break;
  47. if(!flipper_format_write_header_cstr(file, seader_file_header, seader_file_version)) break;
  48. if(!flipper_format_write_uint32(file, "Bits", (uint32_t*)&pacs->bitLength, 1)) break;
  49. if(!flipper_format_write_hex(file, "Credential", pacs->credential, PICOPASS_BLOCK_LEN))
  50. break;
  51. FURI_LOG_D(TAG, "Pre-sio");
  52. // Seader only captures 64 byte SIO so I'm going to leave it at that
  53. uint8_t sio[64];
  54. // TODO: save SR vs SE more properly
  55. if(pacs->sio) { // SR
  56. for(uint8_t i = 0; i < 8; i++) {
  57. memcpy(sio + (i * 8), AA1[10 + i].data, PICOPASS_BLOCK_LEN);
  58. }
  59. if(!flipper_format_write_hex(file, "SIO", sio, sizeof(sio))) break;
  60. } else if(pacs->se_enabled) { //SE
  61. for(uint8_t i = 0; i < 8; i++) {
  62. memcpy(sio + (i * 8), AA1[6 + i].data, PICOPASS_BLOCK_LEN);
  63. }
  64. if(!flipper_format_write_hex(file, "SIO", sio, sizeof(sio))) break;
  65. }
  66. FURI_LOG_D(TAG, "post sio");
  67. if(!flipper_format_write_hex(
  68. file, "Diversifier", AA1[PICOPASS_CSN_BLOCK_INDEX].data, PICOPASS_BLOCK_LEN))
  69. break;
  70. result = true;
  71. } while(false);
  72. return result;
  73. }
  74. static bool picopass_device_save_file_lfrfid(PicopassDevice* dev, FuriString* file_path) {
  75. furi_assert(dev);
  76. PicopassPacs* pacs = &dev->dev_data.pacs;
  77. ProtocolDict* dict = protocol_dict_alloc(lfrfid_protocols, LFRFIDProtocolMax);
  78. ProtocolId protocol = LFRFIDProtocolHidGeneric;
  79. bool result = false;
  80. uint64_t target = 0;
  81. uint64_t sentinel = 1ULL << pacs->bitLength;
  82. memcpy(&target, pacs->credential, PICOPASS_BLOCK_LEN);
  83. target = __builtin_bswap64(target);
  84. FURI_LOG_D(TAG, "Original (%d): %016llx", pacs->bitLength, target);
  85. if(pacs->bitLength == 26) {
  86. //3 bytes
  87. protocol = LFRFIDProtocolH10301;
  88. // Remove parity
  89. target = (target >> 1) & 0xFFFFFF;
  90. // Reverse order since it'll get reversed again
  91. target = __builtin_bswap64(target) >> (64 - 24);
  92. } else if(pacs->bitLength < 44) {
  93. // https://gist.github.com/blark/e8f125e402f576bdb7e2d7b3428bdba6
  94. protocol = LFRFIDProtocolHidGeneric;
  95. if(pacs->bitLength <= 36) {
  96. uint64_t header = 1ULL << 37;
  97. target = __builtin_bswap64((target | sentinel | header) << 4) >> (64 - 48);
  98. } else {
  99. target = __builtin_bswap64((target | sentinel) << 4) >> (64 - 48);
  100. }
  101. } else {
  102. //8 bytes
  103. protocol = LFRFIDProtocolHidExGeneric;
  104. target = __builtin_bswap64(target);
  105. }
  106. size_t data_size = protocol_dict_get_data_size(dict, protocol);
  107. uint8_t* data = malloc(data_size);
  108. if(data_size < 8) {
  109. memcpy(data, (void*)&target, data_size);
  110. } else {
  111. // data_size 12 for LFRFIDProtocolHidExGeneric
  112. memcpy(data + 4, (void*)&target, 8);
  113. }
  114. protocol_dict_set_data(dict, protocol, data, data_size);
  115. free(data);
  116. FuriString* briefStr;
  117. briefStr = furi_string_alloc();
  118. protocol_dict_render_brief_data(dict, briefStr, protocol);
  119. FURI_LOG_D(TAG, "LFRFID Brief: %s", furi_string_get_cstr(briefStr));
  120. furi_string_free(briefStr);
  121. result = lfrfid_dict_file_save(dict, protocol, furi_string_get_cstr(file_path));
  122. if(result) {
  123. FURI_LOG_D(TAG, "Written: %d", result);
  124. } else {
  125. FURI_LOG_D(TAG, "Failed to write");
  126. }
  127. protocol_dict_free(dict);
  128. return result;
  129. }
  130. static bool picopass_device_save_file(
  131. PicopassDevice* dev,
  132. const char* dev_name,
  133. const char* folder,
  134. const char* extension,
  135. bool use_load_path) {
  136. furi_assert(dev);
  137. FURI_LOG_D(TAG, "Save File");
  138. bool saved = false;
  139. FlipperFormat* file = flipper_format_file_alloc(dev->storage);
  140. PicopassPacs* pacs = &dev->dev_data.pacs;
  141. PicopassBlock* AA1 = dev->dev_data.AA1;
  142. FuriString* temp_str;
  143. temp_str = furi_string_alloc();
  144. if(dev->format == PicopassDeviceSaveFormatPartial) {
  145. // Clear key that may have been set when doing key tests for legacy
  146. memset(AA1[PICOPASS_SECURE_KD_BLOCK_INDEX].data, 0, PICOPASS_BLOCK_LEN);
  147. }
  148. do {
  149. if(use_load_path && !furi_string_empty(dev->load_path)) {
  150. // Get directory name
  151. path_extract_dirname(furi_string_get_cstr(dev->load_path), temp_str);
  152. // Make path to file to save
  153. furi_string_cat_printf(temp_str, "/%s%s", dev_name, extension);
  154. } else {
  155. // First remove picopass device file if it was saved
  156. furi_string_printf(temp_str, "%s/%s%s", folder, dev_name, extension);
  157. }
  158. if(dev->format == PicopassDeviceSaveFormatHF ||
  159. dev->format == PicopassDeviceSaveFormatPartial) {
  160. // Open file
  161. if(!flipper_format_file_open_always(file, furi_string_get_cstr(temp_str))) break;
  162. // Write header
  163. if(!flipper_format_write_header_cstr(file, picopass_file_header, picopass_file_version))
  164. break;
  165. if(!flipper_format_write_hex(file, "Credential", pacs->credential, PICOPASS_BLOCK_LEN))
  166. break;
  167. // TODO: Add elite
  168. if(!flipper_format_write_comment_cstr(file, "Picopass blocks")) break;
  169. bool block_saved = true;
  170. size_t app_limit = AA1[PICOPASS_CONFIG_BLOCK_INDEX].data[0] < PICOPASS_MAX_APP_LIMIT ?
  171. AA1[PICOPASS_CONFIG_BLOCK_INDEX].data[0] :
  172. PICOPASS_MAX_APP_LIMIT;
  173. for(size_t i = 0; i < app_limit; i++) {
  174. furi_string_printf(temp_str, "Block %d", i);
  175. if(!flipper_format_write_hex(
  176. file, furi_string_get_cstr(temp_str), AA1[i].data, PICOPASS_BLOCK_LEN)) {
  177. block_saved = false;
  178. break;
  179. }
  180. }
  181. if(!block_saved) break;
  182. saved = true;
  183. } else if(dev->format == PicopassDeviceSaveFormatLF) {
  184. saved = picopass_device_save_file_lfrfid(dev, temp_str);
  185. } else if(dev->format == PicopassDeviceSaveFormatSeader) {
  186. saved = picopass_device_save_file_seader(dev, file, temp_str);
  187. }
  188. } while(false);
  189. if(!saved) {
  190. dialog_message_show_storage_error(dev->dialogs, "Can not save\nfile");
  191. }
  192. furi_string_free(temp_str);
  193. flipper_format_free(file);
  194. return saved;
  195. }
  196. bool picopass_device_save(PicopassDevice* dev, const char* dev_name) {
  197. if(dev->format == PicopassDeviceSaveFormatHF) {
  198. return picopass_device_save_file(
  199. dev, dev_name, STORAGE_APP_DATA_PATH_PREFIX, PICOPASS_APP_EXTENSION, true);
  200. } else if(dev->format == PicopassDeviceSaveFormatLF) {
  201. return picopass_device_save_file(dev, dev_name, ANY_PATH("lfrfid"), ".rfid", true);
  202. } else if(dev->format == PicopassDeviceSaveFormatSeader) {
  203. return picopass_device_save_file(
  204. dev, dev_name, EXT_PATH("apps_data/seader"), ".credential", true);
  205. } else if(dev->format == PicopassDeviceSaveFormatPartial) {
  206. return picopass_device_save_file(
  207. dev, dev_name, STORAGE_APP_DATA_PATH_PREFIX, PICOPASS_APP_EXTENSION, true);
  208. }
  209. return false;
  210. }
  211. static bool picopass_device_load_data(PicopassDevice* dev, FuriString* path, bool show_dialog) {
  212. bool parsed = false;
  213. FlipperFormat* file = flipper_format_file_alloc(dev->storage);
  214. PicopassBlock* AA1 = dev->dev_data.AA1;
  215. PicopassPacs* pacs = &dev->dev_data.pacs;
  216. FuriString* temp_str;
  217. temp_str = furi_string_alloc();
  218. bool deprecated_version = false;
  219. if(dev->loading_cb) {
  220. dev->loading_cb(dev->loading_cb_ctx, true);
  221. }
  222. do {
  223. if(!flipper_format_file_open_existing(file, furi_string_get_cstr(path))) break;
  224. // Read and verify file header
  225. uint32_t version = 0;
  226. if(!flipper_format_read_header(file, temp_str, &version)) break;
  227. if(furi_string_cmp_str(temp_str, picopass_file_header) ||
  228. (version != picopass_file_version)) {
  229. deprecated_version = true;
  230. break;
  231. }
  232. // Parse header blocks
  233. bool block_read = true;
  234. for(size_t i = 0; i < 6; i++) {
  235. furi_string_printf(temp_str, "Block %d", i);
  236. if(!flipper_format_read_hex(
  237. file, furi_string_get_cstr(temp_str), AA1[i].data, PICOPASS_BLOCK_LEN)) {
  238. block_read = false;
  239. break;
  240. }
  241. }
  242. size_t app_limit = AA1[PICOPASS_CONFIG_BLOCK_INDEX].data[0];
  243. // Fix for unpersonalized cards that have app_limit set to 0xFF
  244. if(app_limit > PICOPASS_MAX_APP_LIMIT) app_limit = PICOPASS_MAX_APP_LIMIT;
  245. for(size_t i = 6; i < app_limit; i++) {
  246. furi_string_printf(temp_str, "Block %d", i);
  247. if(!flipper_format_read_hex(
  248. file, furi_string_get_cstr(temp_str), AA1[i].data, PICOPASS_BLOCK_LEN)) {
  249. block_read = false;
  250. break;
  251. }
  252. }
  253. if(!block_read) break;
  254. picopass_device_parse_credential(AA1, pacs);
  255. picopass_device_parse_wiegand(pacs->credential, pacs);
  256. parsed = true;
  257. } while(false);
  258. if(dev->loading_cb) {
  259. dev->loading_cb(dev->loading_cb_ctx, false);
  260. }
  261. if((!parsed) && (show_dialog)) {
  262. if(deprecated_version) {
  263. dialog_message_show_storage_error(dev->dialogs, "File format deprecated");
  264. } else {
  265. dialog_message_show_storage_error(dev->dialogs, "Can not parse\nfile");
  266. }
  267. }
  268. furi_string_free(temp_str);
  269. flipper_format_free(file);
  270. return parsed;
  271. }
  272. void picopass_device_clear(PicopassDevice* dev) {
  273. furi_assert(dev);
  274. picopass_device_data_clear(&dev->dev_data);
  275. memset(&dev->dev_data, 0, sizeof(dev->dev_data));
  276. dev->format = PicopassDeviceSaveFormatHF;
  277. furi_string_reset(dev->load_path);
  278. }
  279. void picopass_device_free(PicopassDevice* picopass_dev) {
  280. furi_assert(picopass_dev);
  281. picopass_device_clear(picopass_dev);
  282. furi_record_close(RECORD_STORAGE);
  283. furi_record_close(RECORD_DIALOGS);
  284. furi_string_free(picopass_dev->load_path);
  285. free(picopass_dev);
  286. }
  287. bool picopass_file_select(PicopassDevice* dev) {
  288. furi_assert(dev);
  289. FuriString* picopass_app_folder;
  290. picopass_app_folder = furi_string_alloc_set(STORAGE_APP_DATA_PATH_PREFIX);
  291. DialogsFileBrowserOptions browser_options;
  292. dialog_file_browser_set_basic_options(&browser_options, PICOPASS_APP_EXTENSION, &I_Nfc_10px);
  293. browser_options.base_path = STORAGE_APP_DATA_PATH_PREFIX;
  294. bool res = dialog_file_browser_show(
  295. dev->dialogs, dev->load_path, picopass_app_folder, &browser_options);
  296. furi_string_free(picopass_app_folder);
  297. if(res) {
  298. FuriString* filename;
  299. filename = furi_string_alloc();
  300. path_extract_filename(dev->load_path, filename, true);
  301. strlcpy(dev->dev_name, furi_string_get_cstr(filename), sizeof(dev->dev_name));
  302. res = picopass_device_load_data(dev, dev->load_path, true);
  303. if(res) {
  304. picopass_device_set_name(dev, dev->dev_name);
  305. }
  306. furi_string_free(filename);
  307. }
  308. return res;
  309. }
  310. void picopass_device_data_clear(PicopassDeviceData* dev_data) {
  311. for(size_t i = 0; i < PICOPASS_MAX_APP_LIMIT; i++) {
  312. memset(dev_data->AA1[i].data, 0, sizeof(dev_data->AA1[i].data));
  313. }
  314. dev_data->pacs.legacy = false;
  315. dev_data->pacs.se_enabled = false;
  316. dev_data->pacs.elite_kdf = false;
  317. dev_data->pacs.pin_length = 0;
  318. }
  319. bool picopass_device_delete(PicopassDevice* dev, bool use_load_path) {
  320. furi_assert(dev);
  321. bool deleted = false;
  322. FuriString* file_path;
  323. file_path = furi_string_alloc();
  324. do {
  325. // Delete original file
  326. if(use_load_path && !furi_string_empty(dev->load_path)) {
  327. furi_string_set(file_path, dev->load_path);
  328. } else {
  329. furi_string_printf(
  330. file_path, APP_DATA_PATH("%s%s"), dev->dev_name, PICOPASS_APP_EXTENSION);
  331. }
  332. if(!storage_simply_remove(dev->storage, furi_string_get_cstr(file_path))) break;
  333. deleted = true;
  334. } while(0);
  335. if(!deleted) {
  336. dialog_message_show_storage_error(dev->dialogs, "Can not remove file");
  337. }
  338. furi_string_free(file_path);
  339. return deleted;
  340. }
  341. void picopass_device_set_loading_callback(
  342. PicopassDevice* dev,
  343. PicopassLoadingCallback callback,
  344. void* context) {
  345. furi_assert(dev);
  346. dev->loading_cb = callback;
  347. dev->loading_cb_ctx = context;
  348. }
  349. void picopass_device_decrypt(uint8_t* enc_data, uint8_t* dec_data) {
  350. uint8_t key[32] = {0};
  351. memcpy(key, picopass_iclass_decryptionkey, sizeof(picopass_iclass_decryptionkey));
  352. mbedtls_des3_context ctx;
  353. mbedtls_des3_init(&ctx);
  354. mbedtls_des3_set2key_dec(&ctx, key);
  355. mbedtls_des3_crypt_ecb(&ctx, enc_data, dec_data);
  356. mbedtls_des3_free(&ctx);
  357. }
  358. void picopass_device_parse_credential(PicopassBlock* AA1, PicopassPacs* pacs) {
  359. pacs->biometrics = AA1[6].data[4];
  360. pacs->pin_length = AA1[6].data[6] & 0x0F;
  361. pacs->encryption = AA1[6].data[7];
  362. if(pacs->encryption == PicopassDeviceEncryption3DES) {
  363. FURI_LOG_D(TAG, "3DES Encrypted");
  364. picopass_device_decrypt(AA1[7].data, pacs->credential);
  365. picopass_device_decrypt(AA1[8].data, pacs->pin0);
  366. picopass_device_decrypt(AA1[9].data, pacs->pin1);
  367. } else if(pacs->encryption == PicopassDeviceEncryptionNone) {
  368. FURI_LOG_D(TAG, "No Encryption");
  369. memcpy(pacs->credential, AA1[7].data, PICOPASS_BLOCK_LEN);
  370. memcpy(pacs->pin0, AA1[8].data, PICOPASS_BLOCK_LEN);
  371. memcpy(pacs->pin1, AA1[9].data, PICOPASS_BLOCK_LEN);
  372. } else if(pacs->encryption == PicopassDeviceEncryptionDES) {
  373. FURI_LOG_D(TAG, "DES Encrypted");
  374. } else {
  375. FURI_LOG_D(TAG, "Unknown encryption");
  376. }
  377. pacs->sio = (AA1[10].data[0] == 0x30); // rough check
  378. }
  379. void picopass_device_parse_wiegand(uint8_t* credential, PicopassPacs* pacs) {
  380. uint32_t* halves = (uint32_t*)credential;
  381. if(halves[0] == 0) {
  382. uint8_t leading0s = __builtin_clz(REVERSE_BYTES_U32(halves[1]));
  383. pacs->bitLength = 31 - leading0s;
  384. } else {
  385. uint8_t leading0s = __builtin_clz(REVERSE_BYTES_U32(halves[0]));
  386. pacs->bitLength = 63 - leading0s;
  387. }
  388. // Remove sentinel bit from credential. Byteswapping to handle array of bytes vs 64bit value
  389. uint64_t sentinel = __builtin_bswap64(1ULL << pacs->bitLength);
  390. uint64_t swapped = 0;
  391. memcpy(&swapped, credential, sizeof(uint64_t));
  392. swapped = swapped ^ sentinel;
  393. memcpy(credential, &swapped, sizeof(uint64_t));
  394. FURI_LOG_D(TAG, "PACS: (%d) %016llx", pacs->bitLength, swapped);
  395. }
  396. bool picopass_device_hid_csn(PicopassDevice* dev) {
  397. furi_assert(dev);
  398. PicopassBlock* AA1 = dev->dev_data.AA1;
  399. uint8_t* csn = AA1[PICOPASS_CSN_BLOCK_INDEX].data;
  400. // From Proxmark3 RRG sourcecode
  401. bool isHidRange = (memcmp(csn + 5, "\xFF\x12\xE0", 3) == 0) && ((csn[4] & 0xF0) == 0xF0);
  402. return isHidRange;
  403. }