picopass_worker.c 47 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336
  1. #include "picopass_worker_i.h"
  2. #include <flipper_format/flipper_format.h>
  3. #include <lib/nfc/protocols/nfcv.h>
  4. #define TAG "PicopassWorker"
  5. #define HAS_MASK(x, b) ((x & b) == b)
  6. // CSNs from Proxmark3 repo
  7. static const uint8_t loclass_csns[LOCLASS_NUM_CSNS][PICOPASS_BLOCK_LEN] = {
  8. {0x01, 0x0A, 0x0F, 0xFF, 0xF7, 0xFF, 0x12, 0xE0},
  9. {0x0C, 0x06, 0x0C, 0xFE, 0xF7, 0xFF, 0x12, 0xE0},
  10. {0x10, 0x97, 0x83, 0x7B, 0xF7, 0xFF, 0x12, 0xE0},
  11. {0x13, 0x97, 0x82, 0x7A, 0xF7, 0xFF, 0x12, 0xE0},
  12. {0x07, 0x0E, 0x0D, 0xF9, 0xF7, 0xFF, 0x12, 0xE0},
  13. {0x14, 0x96, 0x84, 0x76, 0xF7, 0xFF, 0x12, 0xE0},
  14. {0x17, 0x96, 0x85, 0x71, 0xF7, 0xFF, 0x12, 0xE0},
  15. {0xCE, 0xC5, 0x0F, 0x77, 0xF7, 0xFF, 0x12, 0xE0},
  16. {0xD2, 0x5A, 0x82, 0xF8, 0xF7, 0xFF, 0x12, 0xE0},
  17. };
  18. static void picopass_worker_enable_field() {
  19. furi_hal_nfc_exit_sleep();
  20. furi_hal_nfc_ll_txrx_on();
  21. furi_hal_nfc_ll_poll();
  22. }
  23. static ReturnCode picopass_worker_disable_field(ReturnCode rc) {
  24. furi_hal_nfc_ll_txrx_off();
  25. furi_hal_nfc_start_sleep();
  26. return rc;
  27. }
  28. /***************************** Picopass Worker API *******************************/
  29. PicopassWorker* picopass_worker_alloc() {
  30. PicopassWorker* picopass_worker = malloc(sizeof(PicopassWorker));
  31. // Worker thread attributes
  32. picopass_worker->thread =
  33. furi_thread_alloc_ex("PicopassWorker", 8 * 1024, picopass_worker_task, picopass_worker);
  34. picopass_worker->callback = NULL;
  35. picopass_worker->context = NULL;
  36. picopass_worker->storage = furi_record_open(RECORD_STORAGE);
  37. picopass_worker_change_state(picopass_worker, PicopassWorkerStateReady);
  38. return picopass_worker;
  39. }
  40. void picopass_worker_free(PicopassWorker* picopass_worker) {
  41. furi_assert(picopass_worker);
  42. furi_thread_free(picopass_worker->thread);
  43. furi_record_close(RECORD_STORAGE);
  44. free(picopass_worker);
  45. }
  46. PicopassWorkerState picopass_worker_get_state(PicopassWorker* picopass_worker) {
  47. return picopass_worker->state;
  48. }
  49. void picopass_worker_start(
  50. PicopassWorker* picopass_worker,
  51. PicopassWorkerState state,
  52. PicopassDeviceData* dev_data,
  53. PicopassWorkerCallback callback,
  54. void* context) {
  55. furi_assert(picopass_worker);
  56. furi_assert(dev_data);
  57. picopass_worker->callback = callback;
  58. picopass_worker->context = context;
  59. picopass_worker->dev_data = dev_data;
  60. picopass_worker_change_state(picopass_worker, state);
  61. furi_thread_start(picopass_worker->thread);
  62. }
  63. void picopass_worker_stop(PicopassWorker* picopass_worker) {
  64. furi_assert(picopass_worker);
  65. furi_assert(picopass_worker->thread);
  66. if(furi_thread_get_state(picopass_worker->thread) == FuriThreadStateStopped) {
  67. return;
  68. }
  69. if(picopass_worker->state == PicopassWorkerStateBroken ||
  70. picopass_worker->state == PicopassWorkerStateReady) {
  71. return;
  72. }
  73. if(picopass_worker->state != PicopassWorkerStateEmulate &&
  74. picopass_worker->state != PicopassWorkerStateLoclass) {
  75. // Can't do this while emulating in transparent mode as SPI isn't active
  76. picopass_worker_disable_field(ERR_NONE);
  77. }
  78. if(furi_thread_get_state(picopass_worker->thread) != FuriThreadStateStopped) {
  79. picopass_worker_change_state(picopass_worker, PicopassWorkerStateStop);
  80. furi_thread_join(picopass_worker->thread);
  81. }
  82. }
  83. void picopass_worker_change_state(PicopassWorker* picopass_worker, PicopassWorkerState state) {
  84. picopass_worker->state = state;
  85. }
  86. /***************************** Picopass Worker Thread *******************************/
  87. ReturnCode picopass_detect_card(int timeout) {
  88. UNUSED(timeout);
  89. ReturnCode err;
  90. err = rfalPicoPassPollerInitialize();
  91. if(err != ERR_NONE) {
  92. FURI_LOG_E(TAG, "rfalPicoPassPollerInitialize error %d", err);
  93. return err;
  94. }
  95. err = rfalFieldOnAndStartGT();
  96. if(err != ERR_NONE) {
  97. FURI_LOG_E(TAG, "rfalFieldOnAndStartGT error %d", err);
  98. return err;
  99. }
  100. err = rfalPicoPassPollerCheckPresence();
  101. if(err != ERR_RF_COLLISION) {
  102. FURI_LOG_E(TAG, "rfalPicoPassPollerCheckPresence error %d", err);
  103. return err;
  104. }
  105. return ERR_NONE;
  106. }
  107. ReturnCode picopass_read_preauth(PicopassBlock* AA1) {
  108. rfalPicoPassIdentifyRes idRes;
  109. rfalPicoPassSelectRes selRes;
  110. ReturnCode err;
  111. err = rfalPicoPassPollerIdentify(&idRes);
  112. if(err != ERR_NONE) {
  113. FURI_LOG_E(TAG, "rfalPicoPassPollerIdentify error %d", err);
  114. return err;
  115. }
  116. err = rfalPicoPassPollerSelect(idRes.CSN, &selRes);
  117. if(err != ERR_NONE) {
  118. FURI_LOG_E(TAG, "rfalPicoPassPollerSelect error %d", err);
  119. return err;
  120. }
  121. memcpy(AA1[PICOPASS_CSN_BLOCK_INDEX].data, selRes.CSN, sizeof(selRes.CSN));
  122. FURI_LOG_D(
  123. TAG,
  124. "csn %02x%02x%02x%02x%02x%02x%02x%02x",
  125. AA1[PICOPASS_CSN_BLOCK_INDEX].data[0],
  126. AA1[PICOPASS_CSN_BLOCK_INDEX].data[1],
  127. AA1[PICOPASS_CSN_BLOCK_INDEX].data[2],
  128. AA1[PICOPASS_CSN_BLOCK_INDEX].data[3],
  129. AA1[PICOPASS_CSN_BLOCK_INDEX].data[4],
  130. AA1[PICOPASS_CSN_BLOCK_INDEX].data[5],
  131. AA1[PICOPASS_CSN_BLOCK_INDEX].data[6],
  132. AA1[PICOPASS_CSN_BLOCK_INDEX].data[7]);
  133. rfalPicoPassReadBlockRes cfg = {0};
  134. rfalPicoPassPollerReadBlock(PICOPASS_CONFIG_BLOCK_INDEX, &cfg);
  135. memcpy(AA1[PICOPASS_CONFIG_BLOCK_INDEX].data, cfg.data, sizeof(cfg.data));
  136. FURI_LOG_D(
  137. TAG,
  138. "config %02x%02x%02x%02x%02x%02x%02x%02x",
  139. AA1[PICOPASS_CONFIG_BLOCK_INDEX].data[0],
  140. AA1[PICOPASS_CONFIG_BLOCK_INDEX].data[1],
  141. AA1[PICOPASS_CONFIG_BLOCK_INDEX].data[2],
  142. AA1[PICOPASS_CONFIG_BLOCK_INDEX].data[3],
  143. AA1[PICOPASS_CONFIG_BLOCK_INDEX].data[4],
  144. AA1[PICOPASS_CONFIG_BLOCK_INDEX].data[5],
  145. AA1[PICOPASS_CONFIG_BLOCK_INDEX].data[6],
  146. AA1[PICOPASS_CONFIG_BLOCK_INDEX].data[7]);
  147. rfalPicoPassReadBlockRes aia;
  148. rfalPicoPassPollerReadBlock(PICOPASS_SECURE_AIA_BLOCK_INDEX, &aia);
  149. memcpy(AA1[PICOPASS_SECURE_AIA_BLOCK_INDEX].data, aia.data, sizeof(aia.data));
  150. FURI_LOG_D(
  151. TAG,
  152. "aia %02x%02x%02x%02x%02x%02x%02x%02x",
  153. AA1[PICOPASS_SECURE_AIA_BLOCK_INDEX].data[0],
  154. AA1[PICOPASS_SECURE_AIA_BLOCK_INDEX].data[1],
  155. AA1[PICOPASS_SECURE_AIA_BLOCK_INDEX].data[2],
  156. AA1[PICOPASS_SECURE_AIA_BLOCK_INDEX].data[3],
  157. AA1[PICOPASS_SECURE_AIA_BLOCK_INDEX].data[4],
  158. AA1[PICOPASS_SECURE_AIA_BLOCK_INDEX].data[5],
  159. AA1[PICOPASS_SECURE_AIA_BLOCK_INDEX].data[6],
  160. AA1[PICOPASS_SECURE_AIA_BLOCK_INDEX].data[7]);
  161. return ERR_NONE;
  162. }
  163. static ReturnCode
  164. picopass_auth_dict(PicopassWorker* picopass_worker, IclassEliteDictType dict_type) {
  165. rfalPicoPassReadCheckRes rcRes;
  166. rfalPicoPassCheckRes chkRes;
  167. bool elite = (dict_type != IclassStandardDictTypeFlipper);
  168. PicopassDeviceData* dev_data = picopass_worker->dev_data;
  169. PicopassBlock* AA1 = dev_data->AA1;
  170. PicopassPacs* pacs = &dev_data->pacs;
  171. uint8_t* csn = AA1[PICOPASS_CSN_BLOCK_INDEX].data;
  172. uint8_t* div_key = AA1[PICOPASS_SECURE_KD_BLOCK_INDEX].data;
  173. ReturnCode err = ERR_PARAM;
  174. uint8_t mac[4] = {0};
  175. uint8_t ccnr[12] = {0};
  176. size_t index = 0;
  177. uint8_t key[PICOPASS_BLOCK_LEN] = {0};
  178. if(!iclass_elite_dict_check_presence(dict_type)) {
  179. FURI_LOG_E(TAG, "Dictionary not found");
  180. return ERR_PARAM;
  181. }
  182. IclassEliteDict* dict = iclass_elite_dict_alloc(dict_type);
  183. if(!dict) {
  184. FURI_LOG_E(TAG, "Dictionary not allocated");
  185. return ERR_PARAM;
  186. }
  187. FURI_LOG_D(TAG, "Loaded %lu keys", iclass_elite_dict_get_total_keys(dict));
  188. while(iclass_elite_dict_get_next_key(dict, key)) {
  189. FURI_LOG_D(
  190. TAG,
  191. "Try to %s auth with key %zu %02x%02x%02x%02x%02x%02x%02x%02x",
  192. elite ? "elite" : "standard",
  193. index++,
  194. key[0],
  195. key[1],
  196. key[2],
  197. key[3],
  198. key[4],
  199. key[5],
  200. key[6],
  201. key[7]);
  202. err = rfalPicoPassPollerReadCheck(&rcRes);
  203. if(err != ERR_NONE) {
  204. FURI_LOG_E(TAG, "rfalPicoPassPollerReadCheck error %d", err);
  205. break;
  206. }
  207. memcpy(ccnr, rcRes.CCNR, sizeof(rcRes.CCNR)); // last 4 bytes left 0
  208. loclass_iclass_calc_div_key(csn, key, div_key, elite);
  209. loclass_opt_doReaderMAC(ccnr, div_key, mac);
  210. err = rfalPicoPassPollerCheck(mac, &chkRes);
  211. if(err == ERR_NONE) {
  212. memcpy(pacs->key, key, PICOPASS_BLOCK_LEN);
  213. break;
  214. }
  215. if(picopass_worker->state != PicopassWorkerStateDetect) break;
  216. }
  217. iclass_elite_dict_free(dict);
  218. return err;
  219. }
  220. ReturnCode picopass_auth(PicopassWorker* picopass_worker) {
  221. ReturnCode err;
  222. FURI_LOG_I(TAG, "Starting system dictionary attack [Standard KDF]");
  223. err = picopass_auth_dict(picopass_worker, IclassStandardDictTypeFlipper);
  224. if(err == ERR_NONE) {
  225. return ERR_NONE;
  226. }
  227. /* Because size of the user dictionary and could introduce confusing delay
  228. * to the read screen (since there is no feedback), we omit checking it.
  229. * It will be checked when the user uses Elite Dict. Attack, which has a progress bar
  230. */
  231. FURI_LOG_I(TAG, "Starting system dictionary attack [Elite KDF]");
  232. err = picopass_auth_dict(picopass_worker, IclassEliteDictTypeFlipper);
  233. if(err == ERR_NONE) {
  234. return ERR_NONE;
  235. }
  236. return err;
  237. }
  238. ReturnCode picopass_read_card(PicopassBlock* AA1) {
  239. ReturnCode err;
  240. size_t app_limit = AA1[PICOPASS_CONFIG_BLOCK_INDEX].data[0] < PICOPASS_MAX_APP_LIMIT ?
  241. AA1[PICOPASS_CONFIG_BLOCK_INDEX].data[0] :
  242. PICOPASS_MAX_APP_LIMIT;
  243. for(size_t i = 2; i < app_limit; i++) {
  244. if(i == PICOPASS_SECURE_KD_BLOCK_INDEX) {
  245. // Skip over Kd block which is populated earlier (READ of Kd returns all FF's)
  246. continue;
  247. }
  248. rfalPicoPassReadBlockRes block;
  249. err = rfalPicoPassPollerReadBlock(i, &block);
  250. if(err != ERR_NONE) {
  251. FURI_LOG_E(TAG, "rfalPicoPassPollerReadBlock error %d", err);
  252. return err;
  253. }
  254. FURI_LOG_D(
  255. TAG,
  256. "rfalPicoPassPollerReadBlock %d %02x%02x%02x%02x%02x%02x%02x%02x",
  257. i,
  258. block.data[0],
  259. block.data[1],
  260. block.data[2],
  261. block.data[3],
  262. block.data[4],
  263. block.data[5],
  264. block.data[6],
  265. block.data[7]);
  266. memcpy(AA1[i].data, block.data, sizeof(block.data));
  267. }
  268. return ERR_NONE;
  269. }
  270. ReturnCode picopass_write_card(PicopassBlock* AA1) {
  271. rfalPicoPassIdentifyRes idRes;
  272. rfalPicoPassSelectRes selRes;
  273. rfalPicoPassReadCheckRes rcRes;
  274. rfalPicoPassCheckRes chkRes;
  275. ReturnCode err;
  276. uint8_t div_key[8] = {0};
  277. uint8_t mac[4] = {0};
  278. uint8_t ccnr[12] = {0};
  279. err = rfalPicoPassPollerIdentify(&idRes);
  280. if(err != ERR_NONE) {
  281. FURI_LOG_E(TAG, "rfalPicoPassPollerIdentify error %d", err);
  282. return err;
  283. }
  284. err = rfalPicoPassPollerSelect(idRes.CSN, &selRes);
  285. if(err != ERR_NONE) {
  286. FURI_LOG_E(TAG, "rfalPicoPassPollerSelect error %d", err);
  287. return err;
  288. }
  289. err = rfalPicoPassPollerReadCheck(&rcRes);
  290. if(err != ERR_NONE) {
  291. FURI_LOG_E(TAG, "rfalPicoPassPollerReadCheck error %d", err);
  292. return err;
  293. }
  294. memcpy(ccnr, rcRes.CCNR, sizeof(rcRes.CCNR)); // last 4 bytes left 0
  295. loclass_iclass_calc_div_key(selRes.CSN, (uint8_t*)picopass_iclass_key, div_key, false);
  296. loclass_opt_doReaderMAC(ccnr, div_key, mac);
  297. err = rfalPicoPassPollerCheck(mac, &chkRes);
  298. if(err != ERR_NONE) {
  299. FURI_LOG_E(TAG, "rfalPicoPassPollerCheck error %d", err);
  300. return err;
  301. }
  302. for(size_t i = 6; i < 10; i++) {
  303. FURI_LOG_D(TAG, "rfalPicoPassPollerWriteBlock %d", i);
  304. uint8_t data[9] = {0};
  305. data[0] = i;
  306. memcpy(data + 1, AA1[i].data, PICOPASS_BLOCK_LEN);
  307. loclass_doMAC_N(data, sizeof(data), div_key, mac);
  308. FURI_LOG_D(
  309. TAG,
  310. "loclass_doMAC_N %d %02x%02x%02x%02x%02x%02x%02x%02x %02x%02x%02x%02x",
  311. i,
  312. data[1],
  313. data[2],
  314. data[3],
  315. data[4],
  316. data[5],
  317. data[6],
  318. data[7],
  319. data[8],
  320. mac[0],
  321. mac[1],
  322. mac[2],
  323. mac[3]);
  324. err = rfalPicoPassPollerWriteBlock(i, AA1[i].data, mac);
  325. if(err != ERR_NONE) {
  326. FURI_LOG_E(TAG, "rfalPicoPassPollerWriteBlock error %d", err);
  327. return err;
  328. }
  329. }
  330. return ERR_NONE;
  331. }
  332. ReturnCode picopass_write_block(PicopassBlock* AA1, uint8_t blockNo, uint8_t* newBlock) {
  333. rfalPicoPassIdentifyRes idRes;
  334. rfalPicoPassSelectRes selRes;
  335. rfalPicoPassReadCheckRes rcRes;
  336. rfalPicoPassCheckRes chkRes;
  337. ReturnCode err;
  338. uint8_t mac[4] = {0};
  339. uint8_t ccnr[12] = {0};
  340. err = rfalPicoPassPollerIdentify(&idRes);
  341. if(err != ERR_NONE) {
  342. FURI_LOG_E(TAG, "rfalPicoPassPollerIdentify error %d", err);
  343. return err;
  344. }
  345. err = rfalPicoPassPollerSelect(idRes.CSN, &selRes);
  346. if(err != ERR_NONE) {
  347. FURI_LOG_E(TAG, "rfalPicoPassPollerSelect error %d", err);
  348. return err;
  349. }
  350. err = rfalPicoPassPollerReadCheck(&rcRes);
  351. if(err != ERR_NONE) {
  352. FURI_LOG_E(TAG, "rfalPicoPassPollerReadCheck error %d", err);
  353. return err;
  354. }
  355. memcpy(ccnr, rcRes.CCNR, sizeof(rcRes.CCNR)); // last 4 bytes left 0
  356. if(memcmp(selRes.CSN, AA1[PICOPASS_CSN_BLOCK_INDEX].data, PICOPASS_BLOCK_LEN) != 0) {
  357. FURI_LOG_E(TAG, "Wrong CSN for write");
  358. return ERR_REQUEST;
  359. }
  360. loclass_opt_doReaderMAC(ccnr, AA1[PICOPASS_SECURE_KD_BLOCK_INDEX].data, mac);
  361. err = rfalPicoPassPollerCheck(mac, &chkRes);
  362. if(err != ERR_NONE) {
  363. FURI_LOG_E(TAG, "rfalPicoPassPollerCheck error %d", err);
  364. return err;
  365. }
  366. FURI_LOG_D(TAG, "rfalPicoPassPollerWriteBlock %d", blockNo);
  367. uint8_t data[9] = {
  368. blockNo,
  369. newBlock[0],
  370. newBlock[1],
  371. newBlock[2],
  372. newBlock[3],
  373. newBlock[4],
  374. newBlock[5],
  375. newBlock[6],
  376. newBlock[7]};
  377. loclass_doMAC_N(data, sizeof(data), AA1[PICOPASS_SECURE_KD_BLOCK_INDEX].data, mac);
  378. FURI_LOG_D(
  379. TAG,
  380. "loclass_doMAC_N %d %02x%02x%02x%02x%02x%02x%02x%02x %02x%02x%02x%02x",
  381. blockNo,
  382. data[1],
  383. data[2],
  384. data[3],
  385. data[4],
  386. data[5],
  387. data[6],
  388. data[7],
  389. data[8],
  390. mac[0],
  391. mac[1],
  392. mac[2],
  393. mac[3]);
  394. err = rfalPicoPassPollerWriteBlock(data[0], data + 1, mac);
  395. if(err != ERR_NONE) {
  396. FURI_LOG_E(TAG, "rfalPicoPassPollerWriteBlock error %d", err);
  397. return err;
  398. }
  399. return ERR_NONE;
  400. }
  401. void picopass_worker_elite_dict_attack(PicopassWorker* picopass_worker) {
  402. furi_assert(picopass_worker);
  403. furi_assert(picopass_worker->callback);
  404. picopass_device_data_clear(picopass_worker->dev_data);
  405. PicopassDeviceData* dev_data = picopass_worker->dev_data;
  406. PicopassBlock* AA1 = dev_data->AA1;
  407. PicopassPacs* pacs = &dev_data->pacs;
  408. for(size_t i = 0; i < PICOPASS_MAX_APP_LIMIT; i++) {
  409. memset(AA1[i].data, 0, sizeof(AA1[i].data));
  410. }
  411. memset(pacs, 0, sizeof(PicopassPacs));
  412. IclassEliteDictAttackData* dict_attack_data =
  413. &picopass_worker->dev_data->iclass_elite_dict_attack_data;
  414. bool elite = (dict_attack_data->type != IclassStandardDictTypeFlipper);
  415. rfalPicoPassReadCheckRes rcRes;
  416. rfalPicoPassCheckRes chkRes;
  417. ReturnCode err;
  418. uint8_t mac[4] = {0};
  419. uint8_t ccnr[12] = {0};
  420. size_t index = 0;
  421. uint8_t key[PICOPASS_BLOCK_LEN] = {0};
  422. // Load dictionary
  423. IclassEliteDict* dict = dict_attack_data->dict;
  424. if(!dict) {
  425. FURI_LOG_E(TAG, "Dictionary not found");
  426. picopass_worker->callback(PicopassWorkerEventNoDictFound, picopass_worker->context);
  427. return;
  428. }
  429. do {
  430. if(picopass_detect_card(1000) == ERR_NONE) {
  431. picopass_worker->callback(PicopassWorkerEventCardDetected, picopass_worker->context);
  432. // Process first found device
  433. err = picopass_read_preauth(AA1);
  434. if(err != ERR_NONE) {
  435. FURI_LOG_E(TAG, "picopass_read_preauth error %d", err);
  436. picopass_worker->callback(PicopassWorkerEventAborted, picopass_worker->context);
  437. return;
  438. }
  439. // Thank you proxmark!
  440. pacs->legacy = picopass_is_memset(AA1[5].data, 0xFF, 8);
  441. pacs->se_enabled = (memcmp(AA1[5].data, "\xff\xff\xff\x00\x06\xff\xff\xff", 8) == 0);
  442. if(pacs->se_enabled) {
  443. FURI_LOG_D(TAG, "SE enabled");
  444. picopass_worker->callback(PicopassWorkerEventAborted, picopass_worker->context);
  445. return;
  446. }
  447. break;
  448. } else {
  449. picopass_worker->callback(PicopassWorkerEventNoCardDetected, picopass_worker->context);
  450. }
  451. if(picopass_worker->state != PicopassWorkerStateEliteDictAttack) break;
  452. furi_delay_ms(100);
  453. } while(true);
  454. FURI_LOG_D(
  455. TAG, "Start Dictionary attack, Key Count %lu", iclass_elite_dict_get_total_keys(dict));
  456. while(iclass_elite_dict_get_next_key(dict, key)) {
  457. FURI_LOG_T(TAG, "Key %zu", index);
  458. if(++index % PICOPASS_DICT_KEY_BATCH_SIZE == 0) {
  459. picopass_worker->callback(
  460. PicopassWorkerEventNewDictKeyBatch, picopass_worker->context);
  461. }
  462. err = rfalPicoPassPollerReadCheck(&rcRes);
  463. if(err != ERR_NONE) {
  464. FURI_LOG_E(TAG, "rfalPicoPassPollerReadCheck error %d", err);
  465. break;
  466. }
  467. memcpy(ccnr, rcRes.CCNR, sizeof(rcRes.CCNR)); // last 4 bytes left 0
  468. uint8_t* csn = AA1[PICOPASS_CSN_BLOCK_INDEX].data;
  469. uint8_t* div_key = AA1[PICOPASS_SECURE_KD_BLOCK_INDEX].data;
  470. loclass_iclass_calc_div_key(csn, key, div_key, elite);
  471. loclass_opt_doReaderMAC(ccnr, div_key, mac);
  472. err = rfalPicoPassPollerCheck(mac, &chkRes);
  473. if(err == ERR_NONE) {
  474. FURI_LOG_I(
  475. TAG,
  476. "Found key: %02x%02x%02x%02x%02x%02x%02x%02x",
  477. key[0],
  478. key[1],
  479. key[2],
  480. key[3],
  481. key[4],
  482. key[5],
  483. key[6],
  484. key[7]);
  485. memcpy(pacs->key, key, PICOPASS_BLOCK_LEN);
  486. pacs->elite_kdf = elite;
  487. err = picopass_read_card(AA1);
  488. if(err != ERR_NONE) {
  489. FURI_LOG_E(TAG, "picopass_read_card error %d", err);
  490. picopass_worker->callback(PicopassWorkerEventFail, picopass_worker->context);
  491. break;
  492. }
  493. err = picopass_device_parse_credential(AA1, pacs);
  494. if(err != ERR_NONE) {
  495. FURI_LOG_E(TAG, "picopass_device_parse_credential error %d", err);
  496. picopass_worker->callback(PicopassWorkerEventFail, picopass_worker->context);
  497. break;
  498. }
  499. err = picopass_device_parse_wiegand(pacs->credential, pacs);
  500. if(err != ERR_NONE) {
  501. FURI_LOG_E(TAG, "picopass_device_parse_wiegand error %d", err);
  502. picopass_worker->callback(PicopassWorkerEventFail, picopass_worker->context);
  503. break;
  504. }
  505. picopass_worker->callback(PicopassWorkerEventAborted, picopass_worker->context);
  506. break;
  507. }
  508. if(picopass_worker->state != PicopassWorkerStateEliteDictAttack) break;
  509. }
  510. FURI_LOG_D(TAG, "Dictionary complete");
  511. if(picopass_worker->state == PicopassWorkerStateEliteDictAttack) {
  512. picopass_worker->callback(PicopassWorkerEventSuccess, picopass_worker->context);
  513. } else {
  514. picopass_worker->callback(PicopassWorkerEventAborted, picopass_worker->context);
  515. }
  516. }
  517. int32_t picopass_worker_task(void* context) {
  518. PicopassWorker* picopass_worker = context;
  519. if(picopass_worker->state == PicopassWorkerStateDetect) {
  520. picopass_worker_enable_field();
  521. picopass_worker_detect(picopass_worker);
  522. } else if(picopass_worker->state == PicopassWorkerStateWrite) {
  523. picopass_worker_enable_field();
  524. picopass_worker_write(picopass_worker);
  525. } else if(picopass_worker->state == PicopassWorkerStateWriteKey) {
  526. picopass_worker_enable_field();
  527. picopass_worker_write_key(picopass_worker);
  528. } else if(picopass_worker->state == PicopassWorkerStateEliteDictAttack) {
  529. picopass_worker_enable_field();
  530. picopass_worker_elite_dict_attack(picopass_worker);
  531. } else if(picopass_worker->state == PicopassWorkerStateEmulate) {
  532. picopass_worker_emulate(picopass_worker, false);
  533. } else if(picopass_worker->state == PicopassWorkerStateLoclass) {
  534. picopass_worker_emulate(picopass_worker, true);
  535. } else if(picopass_worker->state == PicopassWorkerStateStop) {
  536. FURI_LOG_D(TAG, "Worker state stop");
  537. // no-op
  538. } else {
  539. FURI_LOG_W(TAG, "Unknown state %d", picopass_worker->state);
  540. }
  541. picopass_worker_disable_field(ERR_NONE);
  542. picopass_worker_change_state(picopass_worker, PicopassWorkerStateReady);
  543. return 0;
  544. }
  545. void picopass_worker_detect(PicopassWorker* picopass_worker) {
  546. picopass_device_data_clear(picopass_worker->dev_data);
  547. PicopassDeviceData* dev_data = picopass_worker->dev_data;
  548. PicopassBlock* AA1 = dev_data->AA1;
  549. PicopassPacs* pacs = &dev_data->pacs;
  550. ReturnCode err;
  551. // reset device data
  552. for(size_t i = 0; i < PICOPASS_MAX_APP_LIMIT; i++) {
  553. memset(AA1[i].data, 0, sizeof(AA1[i].data));
  554. }
  555. memset(pacs, 0, sizeof(PicopassPacs));
  556. PicopassWorkerEvent nextState = PicopassWorkerEventSuccess;
  557. while(picopass_worker->state == PicopassWorkerStateDetect) {
  558. if(picopass_detect_card(1000) == ERR_NONE) {
  559. // Process first found device
  560. err = picopass_read_preauth(AA1);
  561. if(err != ERR_NONE) {
  562. FURI_LOG_E(TAG, "picopass_read_preauth error %d", err);
  563. nextState = PicopassWorkerEventFail;
  564. }
  565. // Thank you proxmark!
  566. pacs->legacy = picopass_is_memset(AA1[5].data, 0xFF, 8);
  567. pacs->se_enabled = (memcmp(AA1[5].data, "\xff\xff\xff\x00\x06\xff\xff\xff", 8) == 0);
  568. if(pacs->se_enabled) {
  569. FURI_LOG_D(TAG, "SE enabled");
  570. nextState = PicopassWorkerEventFail;
  571. }
  572. if(nextState == PicopassWorkerEventSuccess) {
  573. err = picopass_auth(picopass_worker);
  574. if(err != ERR_NONE) {
  575. FURI_LOG_E(TAG, "picopass_try_auth error %d", err);
  576. nextState = PicopassWorkerEventFail;
  577. }
  578. }
  579. if(nextState == PicopassWorkerEventSuccess) {
  580. err = picopass_read_card(AA1);
  581. if(err != ERR_NONE) {
  582. FURI_LOG_E(TAG, "picopass_read_card error %d", err);
  583. nextState = PicopassWorkerEventFail;
  584. }
  585. }
  586. if(nextState == PicopassWorkerEventSuccess) {
  587. err = picopass_device_parse_credential(AA1, pacs);
  588. if(err != ERR_NONE) {
  589. FURI_LOG_E(TAG, "picopass_device_parse_credential error %d", err);
  590. nextState = PicopassWorkerEventFail;
  591. }
  592. }
  593. if(nextState == PicopassWorkerEventSuccess) {
  594. err = picopass_device_parse_wiegand(pacs->credential, pacs);
  595. if(err != ERR_NONE) {
  596. FURI_LOG_E(TAG, "picopass_device_parse_wiegand error %d", err);
  597. nextState = PicopassWorkerEventFail;
  598. }
  599. }
  600. // Notify caller and exit
  601. if(picopass_worker->callback) {
  602. picopass_worker->callback(nextState, picopass_worker->context);
  603. }
  604. break;
  605. }
  606. furi_delay_ms(100);
  607. }
  608. }
  609. void picopass_worker_write(PicopassWorker* picopass_worker) {
  610. PicopassDeviceData* dev_data = picopass_worker->dev_data;
  611. PicopassBlock* AA1 = dev_data->AA1;
  612. ReturnCode err;
  613. PicopassWorkerEvent nextState = PicopassWorkerEventSuccess;
  614. while(picopass_worker->state == PicopassWorkerStateWrite) {
  615. if(picopass_detect_card(1000) == ERR_NONE) {
  616. err = picopass_write_card(AA1);
  617. if(err != ERR_NONE) {
  618. FURI_LOG_E(TAG, "picopass_write_card error %d", err);
  619. nextState = PicopassWorkerEventFail;
  620. }
  621. // Notify caller and exit
  622. if(picopass_worker->callback) {
  623. picopass_worker->callback(nextState, picopass_worker->context);
  624. }
  625. break;
  626. }
  627. furi_delay_ms(100);
  628. }
  629. }
  630. void picopass_worker_write_key(PicopassWorker* picopass_worker) {
  631. PicopassDeviceData* dev_data = picopass_worker->dev_data;
  632. PicopassBlock* AA1 = dev_data->AA1;
  633. PicopassPacs* pacs = &dev_data->pacs;
  634. ReturnCode err;
  635. PicopassWorkerEvent nextState = PicopassWorkerEventSuccess;
  636. uint8_t* csn = AA1[PICOPASS_CSN_BLOCK_INDEX].data;
  637. uint8_t* configBlock = AA1[PICOPASS_CONFIG_BLOCK_INDEX].data;
  638. uint8_t fuses = configBlock[7];
  639. uint8_t* oldKey = AA1[PICOPASS_SECURE_KD_BLOCK_INDEX].data;
  640. uint8_t newKey[PICOPASS_BLOCK_LEN] = {0};
  641. loclass_iclass_calc_div_key(csn, pacs->key, newKey, pacs->elite_kdf);
  642. if((fuses & 0x80) == 0x80) {
  643. FURI_LOG_D(TAG, "Plain write for personalized mode key change");
  644. } else {
  645. FURI_LOG_D(TAG, "XOR write for application mode key change");
  646. // XOR when in application mode
  647. for(size_t i = 0; i < PICOPASS_BLOCK_LEN; i++) {
  648. newKey[i] ^= oldKey[i];
  649. }
  650. }
  651. while(picopass_worker->state == PicopassWorkerStateWriteKey) {
  652. if(picopass_detect_card(1000) == ERR_NONE) {
  653. err = picopass_write_block(AA1, PICOPASS_SECURE_KD_BLOCK_INDEX, newKey);
  654. if(err != ERR_NONE) {
  655. FURI_LOG_E(TAG, "picopass_write_block error %d", err);
  656. nextState = PicopassWorkerEventFail;
  657. }
  658. // Notify caller and exit
  659. if(picopass_worker->callback) {
  660. picopass_worker->callback(nextState, picopass_worker->context);
  661. }
  662. break;
  663. }
  664. furi_delay_ms(100);
  665. }
  666. }
  667. // from proxmark3 armsrc/iclass.c rotateCSN
  668. static void picopass_anticoll_csn(uint8_t* rotated_csn, const uint8_t* original_csn) {
  669. for(uint8_t i = 0; i < 8; i++) {
  670. rotated_csn[i] = (original_csn[i] >> 3) | (original_csn[(i + 1) % 8] << 5);
  671. }
  672. }
  673. static void picopass_append_crc(uint8_t* buf, uint16_t size) {
  674. uint16_t crc = rfalPicoPassCalculateCcitt(0xE012, buf, size);
  675. buf[size] = crc & 0xFF;
  676. buf[size + 1] = crc >> 8;
  677. }
  678. static inline void picopass_emu_read_blocks(
  679. NfcVData* nfcv_data,
  680. uint8_t* buf,
  681. uint8_t block_num,
  682. uint8_t block_count) {
  683. memcpy(
  684. buf, nfcv_data->data + (block_num * PICOPASS_BLOCK_LEN), block_count * PICOPASS_BLOCK_LEN);
  685. }
  686. static inline void picopass_emu_write_blocks(
  687. NfcVData* nfcv_data,
  688. const uint8_t* buf,
  689. uint8_t block_num,
  690. uint8_t block_count) {
  691. memcpy(
  692. nfcv_data->data + (block_num * PICOPASS_BLOCK_LEN), buf, block_count * PICOPASS_BLOCK_LEN);
  693. }
  694. static void picopass_init_cipher_state_key(
  695. NfcVData* nfcv_data,
  696. PicopassEmulatorCtx* ctx,
  697. const uint8_t key[PICOPASS_BLOCK_LEN]) {
  698. uint8_t cc[PICOPASS_BLOCK_LEN];
  699. picopass_emu_read_blocks(nfcv_data, cc, PICOPASS_SECURE_EPURSE_BLOCK_INDEX, 1);
  700. ctx->cipher_state = loclass_opt_doTagMAC_1(cc, key);
  701. }
  702. static void picopass_init_cipher_state(NfcVData* nfcv_data, PicopassEmulatorCtx* ctx) {
  703. uint8_t key[PICOPASS_BLOCK_LEN];
  704. picopass_emu_read_blocks(nfcv_data, key, ctx->key_block_num, 1);
  705. picopass_init_cipher_state_key(nfcv_data, ctx, key);
  706. }
  707. static void
  708. loclass_update_csn(FuriHalNfcDevData* nfc_data, NfcVData* nfcv_data, PicopassEmulatorCtx* ctx) {
  709. // collect LOCLASS_NUM_PER_CSN nonces in a row for each CSN
  710. const uint8_t* csn =
  711. loclass_csns[(ctx->key_block_num / LOCLASS_NUM_PER_CSN) % LOCLASS_NUM_CSNS];
  712. memcpy(nfc_data->uid, csn, PICOPASS_BLOCK_LEN);
  713. picopass_emu_write_blocks(nfcv_data, csn, PICOPASS_CSN_BLOCK_INDEX, 1);
  714. uint8_t key[PICOPASS_BLOCK_LEN];
  715. loclass_iclass_calc_div_key(csn, picopass_iclass_key, key, false);
  716. picopass_emu_write_blocks(nfcv_data, key, PICOPASS_SECURE_KD_BLOCK_INDEX, 1);
  717. picopass_init_cipher_state_key(nfcv_data, ctx, key);
  718. }
  719. static void picopass_emu_handle_packet(
  720. FuriHalNfcTxRxContext* tx_rx,
  721. FuriHalNfcDevData* nfc_data,
  722. void* nfcv_data_in) {
  723. NfcVData* nfcv_data = (NfcVData*)nfcv_data_in;
  724. PicopassEmulatorCtx* ctx = nfcv_data->emu_protocol_ctx;
  725. uint8_t response[34];
  726. uint8_t response_length = 0;
  727. uint8_t key_block_num = PICOPASS_SECURE_KD_BLOCK_INDEX;
  728. const uint8_t block_ff[8] = {0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF};
  729. if(nfcv_data->frame_length < 1 || ctx->state == PicopassEmulatorStateStopEmulation) {
  730. return;
  731. }
  732. switch(nfcv_data->frame[0]) {
  733. case RFAL_PICOPASS_CMD_ACTALL: // No args
  734. if(nfcv_data->frame_length != 1) {
  735. return;
  736. }
  737. if(ctx->state != PicopassEmulatorStateHalt) {
  738. ctx->state = PicopassEmulatorStateActive;
  739. }
  740. // Send SOF only
  741. break;
  742. case RFAL_PICOPASS_CMD_ACT: // No args
  743. if(nfcv_data->frame_length != 1 || ctx->state != PicopassEmulatorStateActive) {
  744. return;
  745. }
  746. // Send SOF only
  747. break;
  748. case RFAL_PICOPASS_CMD_HALT: // No args
  749. if(nfcv_data->frame_length != 1 || ctx->state != PicopassEmulatorStateSelected) {
  750. return;
  751. }
  752. // Technically we should go to StateHalt, but since we can't detect the field dropping we drop to idle instead
  753. ctx->state = PicopassEmulatorStateIdle;
  754. // Send SOF only
  755. break;
  756. case RFAL_PICOPASS_CMD_READ_OR_IDENTIFY:
  757. if(nfcv_data->frame_length == 1 &&
  758. ctx->state == PicopassEmulatorStateActive) { // PICOPASS_CMD_IDENTIFY
  759. // ASNB(8) CRC16(2)
  760. picopass_anticoll_csn(response, nfc_data->uid);
  761. picopass_append_crc(response, PICOPASS_BLOCK_LEN);
  762. response_length = PICOPASS_BLOCK_LEN + 2;
  763. break;
  764. } else if(
  765. nfcv_data->frame_length == 4 &&
  766. ctx->state == PicopassEmulatorStateSelected) { // PICOPASS_CMD_READ ADDRESS(1) CRC16(2)
  767. if(nfcv_data->frame[1] >= PICOPASS_MAX_APP_LIMIT) {
  768. return;
  769. }
  770. // TODO: Check CRC?
  771. // TODO: Check auth?
  772. // DATA(8) CRC16(2)
  773. if(nfcv_data->frame[1] == PICOPASS_SECURE_KD_BLOCK_INDEX ||
  774. nfcv_data->frame[1] == PICOPASS_SECURE_KC_BLOCK_INDEX) {
  775. // Reading Kd or Kc blocks always returns FF's
  776. memcpy(response, block_ff, PICOPASS_BLOCK_LEN);
  777. } else {
  778. picopass_emu_read_blocks(nfcv_data, response, nfcv_data->frame[1], 1);
  779. }
  780. picopass_append_crc(response, PICOPASS_BLOCK_LEN);
  781. response_length = PICOPASS_BLOCK_LEN + 2;
  782. break;
  783. }
  784. return;
  785. case RFAL_PICOPASS_CMD_READ4: // ADDRESS(1) CRC16(2)
  786. if(nfcv_data->frame_length != 4 || ctx->state != PicopassEmulatorStateSelected ||
  787. nfcv_data->frame[1] + 4 >= PICOPASS_MAX_APP_LIMIT) {
  788. return;
  789. }
  790. // TODO: Check CRC?
  791. // TODO: Check auth?
  792. uint8_t blockNum = nfcv_data->frame[1];
  793. // DATA(32) CRC16(2)
  794. picopass_emu_read_blocks(nfcv_data, response, blockNum, 4);
  795. if(blockNum == 4) {
  796. // Kc is block 4, so just redact first block of response
  797. memcpy(response, block_ff, PICOPASS_BLOCK_LEN);
  798. } else if(blockNum < 4) {
  799. // Kd is block 3
  800. uint8_t* kdOffset = response + ((3 - blockNum) * PICOPASS_BLOCK_LEN);
  801. memcpy(kdOffset, block_ff, PICOPASS_BLOCK_LEN);
  802. if(blockNum != 0) {
  803. // Redact Kc
  804. memcpy(kdOffset + PICOPASS_BLOCK_LEN, block_ff, PICOPASS_BLOCK_LEN);
  805. }
  806. }
  807. picopass_append_crc(response, PICOPASS_BLOCK_LEN * 4);
  808. response_length = (PICOPASS_BLOCK_LEN * 4) + 2;
  809. break;
  810. case RFAL_PICOPASS_CMD_SELECT: // ASNB(8)|SERIALNB(8)
  811. if(nfcv_data->frame_length != 9) {
  812. return;
  813. }
  814. uint8_t select_csn[PICOPASS_BLOCK_LEN];
  815. if(ctx->state == PicopassEmulatorStateHalt || ctx->state == PicopassEmulatorStateIdle) {
  816. memcpy(select_csn, nfc_data->uid, PICOPASS_BLOCK_LEN);
  817. } else {
  818. picopass_anticoll_csn(select_csn, nfc_data->uid);
  819. }
  820. if(memcmp(nfcv_data->frame + 1, select_csn, PICOPASS_BLOCK_LEN)) {
  821. if(ctx->state == PicopassEmulatorStateActive) {
  822. ctx->state = PicopassEmulatorStateIdle;
  823. } else if(ctx->state == PicopassEmulatorStateSelected) {
  824. // Technically we should go to StateHalt, but since we can't detect the field dropping we drop to idle instead
  825. ctx->state = PicopassEmulatorStateIdle;
  826. }
  827. return;
  828. }
  829. ctx->state = PicopassEmulatorStateSelected;
  830. // SERIALNB(8) CRC16(2)
  831. memcpy(response, nfc_data->uid, PICOPASS_BLOCK_LEN);
  832. picopass_append_crc(response, PICOPASS_BLOCK_LEN);
  833. response_length = PICOPASS_BLOCK_LEN + 2;
  834. break;
  835. case RFAL_PICOPASS_CMD_READCHECK_KC: // ADDRESS(1)
  836. key_block_num = PICOPASS_SECURE_KC_BLOCK_INDEX;
  837. // fallthrough
  838. case RFAL_PICOPASS_CMD_READCHECK_KD: // ADDRESS(1)
  839. if(nfcv_data->frame_length != 2 ||
  840. nfcv_data->frame[1] != PICOPASS_SECURE_EPURSE_BLOCK_INDEX ||
  841. ctx->state != PicopassEmulatorStateSelected) {
  842. return;
  843. }
  844. // loclass mode doesn't do any card side crypto, just logs the readers crypto, so no-op in this mode
  845. // we can also no-op if the key block is the same, CHECK re-inits if it failed already
  846. if(ctx->key_block_num != key_block_num && !ctx->loclass_mode) {
  847. ctx->key_block_num = key_block_num;
  848. picopass_init_cipher_state(nfcv_data, ctx);
  849. }
  850. // DATA(8)
  851. picopass_emu_read_blocks(nfcv_data, response, nfcv_data->frame[1], 1);
  852. response_length = PICOPASS_BLOCK_LEN;
  853. break;
  854. case RFAL_PICOPASS_CMD_CHECK: // CHALLENGE(4) READERSIGNATURE(4)
  855. if(nfcv_data->frame_length != 9 || ctx->state != PicopassEmulatorStateSelected) {
  856. return;
  857. }
  858. if(ctx->loclass_mode) {
  859. // LOCLASS Reader attack mode
  860. // Copy EPURSE
  861. uint8_t cc[PICOPASS_BLOCK_LEN];
  862. picopass_emu_read_blocks(nfcv_data, cc, PICOPASS_SECURE_EPURSE_BLOCK_INDEX, 1);
  863. #ifndef PICOPASS_DEBUG_IGNORE_LOCLASS_STD_KEY
  864. uint8_t key[PICOPASS_BLOCK_LEN];
  865. // loclass mode stores the derived standard debit key in Kd to check
  866. picopass_emu_read_blocks(nfcv_data, key, PICOPASS_SECURE_KD_BLOCK_INDEX, 1);
  867. uint8_t rmac[4];
  868. loclass_opt_doReaderMAC_2(ctx->cipher_state, nfcv_data->frame + 1, rmac, key);
  869. if(!memcmp(nfcv_data->frame + 5, rmac, 4)) {
  870. // MAC from reader matches Standard Key, keyroll mode or non-elite keyed reader.
  871. // Either way no point logging it.
  872. FURI_LOG_W(TAG, "loclass: standard key detected during collection");
  873. ctx->loclass_got_std_key = true;
  874. // Don't reset the state as the reader may try a different key next without going through anticoll
  875. // The reader is always free to redo the anticoll if it wants to anyway
  876. return;
  877. }
  878. #endif
  879. // Save to buffer to defer flushing when we rotate CSN
  880. memcpy(
  881. ctx->loclass_mac_buffer + ((ctx->key_block_num % LOCLASS_NUM_PER_CSN) * 8),
  882. nfcv_data->frame + 1,
  883. 8);
  884. // Rotate to the next CSN/attempt
  885. ctx->key_block_num++;
  886. // CSN changed
  887. if(ctx->key_block_num % LOCLASS_NUM_PER_CSN == 0) {
  888. // Flush NR-MACs for this CSN to SD card
  889. uint8_t cc[PICOPASS_BLOCK_LEN];
  890. picopass_emu_read_blocks(nfcv_data, cc, PICOPASS_SECURE_EPURSE_BLOCK_INDEX, 1);
  891. for(int i = 0; i < LOCLASS_NUM_PER_CSN; i++) {
  892. loclass_writer_write_params(
  893. ctx->loclass_writer,
  894. ctx->key_block_num + i - LOCLASS_NUM_PER_CSN,
  895. nfc_data->uid,
  896. cc,
  897. ctx->loclass_mac_buffer + (i * 8),
  898. ctx->loclass_mac_buffer + (i * 8) + 4);
  899. }
  900. if(ctx->key_block_num < LOCLASS_NUM_CSNS * LOCLASS_NUM_PER_CSN) {
  901. loclass_update_csn(nfc_data, nfcv_data, ctx);
  902. // Only reset the state when we change to a new CSN for the same reason as when we get a standard key
  903. ctx->state = PicopassEmulatorStateIdle;
  904. } else {
  905. ctx->state = PicopassEmulatorStateStopEmulation;
  906. }
  907. }
  908. return;
  909. }
  910. uint8_t key[PICOPASS_BLOCK_LEN];
  911. picopass_emu_read_blocks(nfcv_data, key, ctx->key_block_num, 1);
  912. uint8_t rmac[4];
  913. loclass_opt_doBothMAC_2(ctx->cipher_state, nfcv_data->frame + 1, rmac, response, key);
  914. #ifndef PICOPASS_DEBUG_IGNORE_BAD_RMAC
  915. if(memcmp(nfcv_data->frame + 5, rmac, 4)) {
  916. // Bad MAC from reader, do not send a response.
  917. FURI_LOG_I(TAG, "Got bad MAC from reader");
  918. // Reset the cipher state since we don't do it in READCHECK
  919. picopass_init_cipher_state(nfcv_data, ctx);
  920. return;
  921. }
  922. #endif
  923. // CHIPRESPONSE(4)
  924. response_length = 4;
  925. break;
  926. case RFAL_PICOPASS_CMD_UPDATE: // ADDRESS(1) DATA(8) SIGN(4)|CRC16(2)
  927. if((nfcv_data->frame_length != 12 && nfcv_data->frame_length != 14) ||
  928. ctx->state != PicopassEmulatorStateSelected || ctx->loclass_mode) {
  929. return;
  930. }
  931. if(nfcv_data->frame[1] >= PICOPASS_MAX_APP_LIMIT) {
  932. return;
  933. }
  934. uint8_t cfgBlock[PICOPASS_BLOCK_LEN];
  935. picopass_emu_read_blocks(nfcv_data, cfgBlock, PICOPASS_CONFIG_BLOCK_INDEX, 1);
  936. bool persMode = HAS_MASK(cfgBlock[7], PICOPASS_FUSE_PERS);
  937. if((nfcv_data->frame[1] == PICOPASS_CSN_BLOCK_INDEX) // CSN is always read only
  938. ||
  939. (!persMode &&
  940. !HAS_MASK(cfgBlock[3], 0x80)) // Chip is in RO mode, no updated possible (even ePurse)
  941. || (!persMode &&
  942. nfcv_data->frame[1] ==
  943. PICOPASS_SECURE_AIA_BLOCK_INDEX) // AIA can only be set in personalisation mode
  944. || (!persMode &&
  945. (nfcv_data->frame[1] == PICOPASS_SECURE_KD_BLOCK_INDEX ||
  946. nfcv_data->frame[1] == PICOPASS_SECURE_KC_BLOCK_INDEX) &&
  947. (!HAS_MASK(cfgBlock[7], PICOPASS_FUSE_CRYPT10)))) {
  948. return; // TODO: Is this the right response?
  949. }
  950. if(nfcv_data->frame[1] >= 6 && nfcv_data->frame[1] <= 12) {
  951. if(!HAS_MASK(
  952. cfgBlock[3],
  953. 1 << (nfcv_data->frame[1] - 6))) { // bit0 is block6, up to bit6 being block12
  954. // Block is marked as read-only, deny writing
  955. return; // TODO: Is this the right response?
  956. }
  957. }
  958. // TODO: Check CRC/SIGN depending on if in secure mode
  959. // Check correct key
  960. // -> Kd only allows decrementing e-Purse
  961. // -> per-app controlled by key access config
  962. //bool keyAccess = HAS_MASK(cfgBlock[5], 0x01);
  963. // -> must auth with that key to change it
  964. uint8_t blockOffset = nfcv_data->frame[1];
  965. uint8_t block[PICOPASS_BLOCK_LEN];
  966. switch(nfcv_data->frame[1]) {
  967. case PICOPASS_CONFIG_BLOCK_INDEX:
  968. block[0] = cfgBlock[0]; // Applications Limit
  969. block[1] = cfgBlock[1] & nfcv_data->frame[3]; // OTP
  970. block[2] = cfgBlock[2] & nfcv_data->frame[4]; // OTP
  971. block[3] = cfgBlock[3] & nfcv_data->frame[5]; // Block Write Lock
  972. block[4] = cfgBlock[4]; // Chip Config
  973. block[5] = cfgBlock[5]; // Memory Config
  974. block[6] = nfcv_data->frame[8]; // EAS
  975. block[7] = cfgBlock[7]; // Fuses
  976. // Some parts allow w (but not e) if in persMode
  977. if(persMode) {
  978. block[0] &= nfcv_data->frame[2]; // Applications Limit
  979. block[4] &= nfcv_data->frame[6]; // Chip Config
  980. block[5] &= nfcv_data->frame[7]; // Memory Config
  981. block[7] &= nfcv_data->frame[9]; // Fuses
  982. } else {
  983. // Fuses allows setting Crypt1/0 from 1 to 0 only during application mode
  984. block[7] &= nfcv_data->frame[9] | ~PICOPASS_FUSE_CRYPT10;
  985. }
  986. break;
  987. case PICOPASS_SECURE_EPURSE_BLOCK_INDEX:
  988. // ePurse updates swap first and second half of the block each update
  989. memcpy(block + 4, nfcv_data->frame + 2, 4);
  990. memcpy(block, nfcv_data->frame + 6, 4);
  991. break;
  992. case PICOPASS_SECURE_KD_BLOCK_INDEX:
  993. // fallthrough
  994. case PICOPASS_SECURE_KC_BLOCK_INDEX:
  995. if(!persMode) {
  996. picopass_emu_read_blocks(nfcv_data, block, blockOffset, 1);
  997. for(uint8_t i = 0; i < sizeof(PICOPASS_BLOCK_LEN); i++)
  998. block[i] ^= nfcv_data->frame[i + 2];
  999. break;
  1000. }
  1001. // Use default case when in personalisation mode
  1002. // fallthrough
  1003. default:
  1004. memcpy(block, nfcv_data->frame + 2, PICOPASS_BLOCK_LEN);
  1005. break;
  1006. }
  1007. picopass_emu_write_blocks(nfcv_data, block, blockOffset, 1);
  1008. if((nfcv_data->frame[1] == ctx->key_block_num ||
  1009. nfcv_data->frame[1] == PICOPASS_SECURE_EPURSE_BLOCK_INDEX) &&
  1010. !ctx->loclass_mode)
  1011. picopass_init_cipher_state(nfcv_data, ctx);
  1012. // DATA(8) CRC16(2)
  1013. if(nfcv_data->frame[1] == PICOPASS_SECURE_KD_BLOCK_INDEX ||
  1014. nfcv_data->frame[1] == PICOPASS_SECURE_KD_BLOCK_INDEX) {
  1015. // Key updates always return FF's
  1016. memcpy(response, block_ff, PICOPASS_BLOCK_LEN);
  1017. } else {
  1018. memcpy(response, block, PICOPASS_BLOCK_LEN);
  1019. }
  1020. picopass_append_crc(response, PICOPASS_BLOCK_LEN);
  1021. response_length = PICOPASS_BLOCK_LEN + 2;
  1022. break;
  1023. case RFAL_PICOPASS_CMD_PAGESEL: // PAGE(1) CRC16(2)
  1024. // Chips with a single page do not answer to this command
  1025. // BLOCK1(8) CRC16(2)
  1026. return;
  1027. case RFAL_PICOPASS_CMD_DETECT:
  1028. // TODO - not used by iClass though
  1029. return;
  1030. default:
  1031. return;
  1032. }
  1033. NfcVSendFlags flags = NfcVSendFlagsSof | NfcVSendFlagsOneSubcarrier | NfcVSendFlagsHighRate;
  1034. if(response_length > 0) {
  1035. flags |= NfcVSendFlagsEof;
  1036. }
  1037. nfcv_emu_send(
  1038. tx_rx,
  1039. nfcv_data,
  1040. response,
  1041. response_length,
  1042. flags,
  1043. nfcv_data->eof_timestamp + NFCV_FDT_FC(4000)); // 3650 is ~254uS 4000 is ~283uS
  1044. }
  1045. void picopass_worker_emulate(PicopassWorker* picopass_worker, bool loclass_mode) {
  1046. furi_hal_nfc_exit_sleep();
  1047. FuriHalNfcTxRxContext tx_rx = {};
  1048. PicopassEmulatorCtx emu_ctx = {
  1049. .state = PicopassEmulatorStateIdle,
  1050. .key_block_num = PICOPASS_SECURE_KD_BLOCK_INDEX,
  1051. .loclass_mode = loclass_mode,
  1052. .loclass_got_std_key = false,
  1053. .loclass_writer = NULL,
  1054. };
  1055. FuriHalNfcDevData nfc_data = {
  1056. .uid_len = RFAL_PICOPASS_UID_LEN,
  1057. };
  1058. NfcVData* nfcv_data = malloc(sizeof(NfcVData));
  1059. nfcv_data->block_size = PICOPASS_BLOCK_LEN;
  1060. nfcv_data->emu_protocol_ctx = &emu_ctx;
  1061. nfcv_data->emu_protocol_handler = &picopass_emu_handle_packet;
  1062. PicopassDeviceData* dev_data = picopass_worker->dev_data;
  1063. PicopassBlock* blocks = dev_data->AA1;
  1064. if(loclass_mode) {
  1065. emu_ctx.loclass_writer = loclass_writer_alloc();
  1066. if(emu_ctx.loclass_writer == NULL) {
  1067. picopass_worker->callback(
  1068. PicopassWorkerEventLoclassFileError, picopass_worker->context);
  1069. while(picopass_worker->state == PicopassWorkerStateEmulate ||
  1070. picopass_worker->state == PicopassWorkerStateLoclass) {
  1071. furi_delay_ms(1);
  1072. }
  1073. free(nfcv_data);
  1074. return;
  1075. }
  1076. // Setup blocks for loclass attack
  1077. uint8_t conf[8] = {0x12, 0xFF, 0xFF, 0xFF, 0x7F, 0x1F, 0xFF, 0x3C};
  1078. picopass_emu_write_blocks(nfcv_data, conf, PICOPASS_CONFIG_BLOCK_INDEX, 1);
  1079. uint8_t epurse[8] = {0xFE, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF};
  1080. picopass_emu_write_blocks(nfcv_data, epurse, PICOPASS_SECURE_EPURSE_BLOCK_INDEX, 1);
  1081. uint8_t aia[8] = {0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF};
  1082. picopass_emu_write_blocks(nfcv_data, aia, PICOPASS_SECURE_AIA_BLOCK_INDEX, 1);
  1083. emu_ctx.key_block_num = 0;
  1084. loclass_update_csn(&nfc_data, nfcv_data, &emu_ctx);
  1085. loclass_writer_write_start_stop(emu_ctx.loclass_writer, true);
  1086. } else {
  1087. memcpy(nfc_data.uid, blocks[PICOPASS_CSN_BLOCK_INDEX].data, PICOPASS_BLOCK_LEN);
  1088. memcpy(nfcv_data->data, blocks, sizeof(dev_data->AA1));
  1089. picopass_init_cipher_state(nfcv_data, &emu_ctx);
  1090. }
  1091. uint8_t last_loclass_csn_num = 0;
  1092. bool loclass_got_std_key = false;
  1093. nfcv_emu_init(&nfc_data, nfcv_data);
  1094. while(picopass_worker->state == PicopassWorkerStateEmulate ||
  1095. picopass_worker->state == PicopassWorkerStateLoclass) {
  1096. if(nfcv_emu_loop(&tx_rx, &nfc_data, nfcv_data, 500)) {
  1097. if(picopass_worker->callback) {
  1098. if((loclass_mode) && (last_loclass_csn_num != emu_ctx.key_block_num)) {
  1099. last_loclass_csn_num = emu_ctx.key_block_num;
  1100. picopass_worker->callback(
  1101. PicopassWorkerEventLoclassGotMac, picopass_worker->context);
  1102. } else if((loclass_mode) && !loclass_got_std_key && emu_ctx.loclass_got_std_key) {
  1103. loclass_got_std_key = true;
  1104. picopass_worker->callback(
  1105. PicopassWorkerEventLoclassGotStandardKey, picopass_worker->context);
  1106. } else {
  1107. picopass_worker->callback(
  1108. PicopassWorkerEventSuccess, picopass_worker->context);
  1109. }
  1110. }
  1111. }
  1112. furi_delay_us(1);
  1113. }
  1114. if(emu_ctx.loclass_writer) {
  1115. loclass_writer_write_start_stop(emu_ctx.loclass_writer, false);
  1116. loclass_writer_free(emu_ctx.loclass_writer);
  1117. }
  1118. nfcv_emu_deinit(nfcv_data);
  1119. free(nfcv_data);
  1120. }