picopass_device.c 21 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569
  1. #include "picopass_device.h"
  2. #include <toolbox/path.h>
  3. #include <flipper_format/flipper_format.h>
  4. #include <picopass_icons.h>
  5. #include <toolbox/protocols/protocol_dict.h>
  6. #include <toolbox/hex.h>
  7. #include <lfrfid/protocols/lfrfid_protocols.h>
  8. #include <lfrfid/lfrfid_dict_file.h>
  9. #define TAG "PicopassDevice"
  10. static const char* picopass_file_header = "Flipper Picopass device";
  11. static const uint32_t picopass_file_version = 1;
  12. const uint8_t picopass_iclass_decryptionkey[] =
  13. {0xb4, 0x21, 0x2c, 0xca, 0xb7, 0xed, 0x21, 0x0f, 0x7b, 0x93, 0xd4, 0x59, 0x39, 0xc7, 0xdd, 0x36};
  14. const char unknown_block[] = "?? ?? ?? ?? ?? ?? ?? ??";
  15. PicopassDevice* picopass_device_alloc() {
  16. PicopassDevice* picopass_dev = malloc(sizeof(PicopassDevice));
  17. memset(picopass_dev, 0, sizeof(PicopassDevice));
  18. picopass_dev->storage = furi_record_open(RECORD_STORAGE);
  19. picopass_dev->dialogs = furi_record_open(RECORD_DIALOGS);
  20. picopass_dev->load_path = furi_string_alloc();
  21. return picopass_dev;
  22. }
  23. void picopass_device_set_name(PicopassDevice* dev, const char* name) {
  24. furi_assert(dev);
  25. strlcpy(dev->dev_name, name, sizeof(dev->dev_name));
  26. }
  27. // For use with Seader's virtual card processing.
  28. static bool picopass_device_save_file_seader(
  29. PicopassDevice* dev,
  30. FlipperFormat* file,
  31. FuriString* file_path) {
  32. furi_assert(dev);
  33. PicopassPacs* pacs = &dev->dev_data.pacs;
  34. PicopassBlock* card_data = dev->dev_data.card_data;
  35. bool result = false;
  36. const char* seader_file_header = "Flipper Seader Credential";
  37. const uint32_t seader_file_version = 1;
  38. do {
  39. FURI_LOG_D(
  40. TAG,
  41. "Save %s %ld to %s",
  42. seader_file_header,
  43. seader_file_version,
  44. furi_string_get_cstr(file_path));
  45. storage_simply_mkdir(dev->storage, EXT_PATH("apps_data/seader"));
  46. if(!flipper_format_file_open_always(file, furi_string_get_cstr(file_path))) break;
  47. if(!flipper_format_write_header_cstr(file, seader_file_header, seader_file_version)) break;
  48. if(!flipper_format_write_uint32(file, "Bits", (uint32_t*)&pacs->bitLength, 1)) break;
  49. if(!flipper_format_write_hex(file, "Credential", pacs->credential, PICOPASS_BLOCK_LEN))
  50. break;
  51. // Seader only captures 64 byte SIO so I'm going to leave it at that
  52. uint8_t sio[64];
  53. // TODO: save SR vs SE more properly
  54. if(pacs->sio) { // SR
  55. for(uint8_t i = 0; i < 8; i++) {
  56. memcpy(sio + (i * 8), card_data[10 + i].data, PICOPASS_BLOCK_LEN);
  57. }
  58. if(!flipper_format_write_hex(file, "SIO", sio, sizeof(sio))) break;
  59. } else if(pacs->se_enabled) { //SE
  60. for(uint8_t i = 0; i < 8; i++) {
  61. memcpy(sio + (i * 8), card_data[6 + i].data, PICOPASS_BLOCK_LEN);
  62. }
  63. if(!flipper_format_write_hex(file, "SIO", sio, sizeof(sio))) break;
  64. }
  65. if(!flipper_format_write_hex(
  66. file, "Diversifier", card_data[PICOPASS_CSN_BLOCK_INDEX].data, PICOPASS_BLOCK_LEN))
  67. break;
  68. result = true;
  69. } while(false);
  70. return result;
  71. }
  72. static bool picopass_device_save_file_lfrfid(PicopassDevice* dev, FuriString* file_path) {
  73. furi_assert(dev);
  74. PicopassPacs* pacs = &dev->dev_data.pacs;
  75. ProtocolDict* dict = protocol_dict_alloc(lfrfid_protocols, LFRFIDProtocolMax);
  76. ProtocolId protocol = LFRFIDProtocolHidGeneric;
  77. bool result = false;
  78. uint64_t target = 0;
  79. uint64_t sentinel = 1ULL << pacs->bitLength;
  80. memcpy(&target, pacs->credential, PICOPASS_BLOCK_LEN);
  81. target = __builtin_bswap64(target);
  82. FURI_LOG_D(TAG, "Original (%d): %016llx", pacs->bitLength, target);
  83. if(pacs->bitLength == 26) {
  84. //3 bytes
  85. protocol = LFRFIDProtocolH10301;
  86. // Remove parity
  87. target = (target >> 1) & 0xFFFFFF;
  88. // Reverse order since it'll get reversed again
  89. target = __builtin_bswap64(target) >> (64 - 24);
  90. } else if(pacs->bitLength < 44) {
  91. // https://gist.github.com/blark/e8f125e402f576bdb7e2d7b3428bdba6
  92. protocol = LFRFIDProtocolHidGeneric;
  93. if(pacs->bitLength <= 36) {
  94. uint64_t header = 1ULL << 37;
  95. target = __builtin_bswap64((target | sentinel | header) << 4) >> (64 - 48);
  96. } else {
  97. target = __builtin_bswap64((target | sentinel) << 4) >> (64 - 48);
  98. }
  99. } else {
  100. //8 bytes
  101. protocol = LFRFIDProtocolHidExGeneric;
  102. target = __builtin_bswap64(target);
  103. }
  104. size_t data_size = protocol_dict_get_data_size(dict, protocol);
  105. uint8_t* data = malloc(data_size);
  106. if(data_size < 8) {
  107. memcpy(data, (void*)&target, data_size);
  108. } else {
  109. // data_size 12 for LFRFIDProtocolHidExGeneric
  110. memcpy(data + 4, (void*)&target, 8);
  111. }
  112. protocol_dict_set_data(dict, protocol, data, data_size);
  113. free(data);
  114. FuriString* briefStr;
  115. briefStr = furi_string_alloc();
  116. protocol_dict_render_brief_data(dict, briefStr, protocol);
  117. FURI_LOG_D(TAG, "LFRFID Brief: %s", furi_string_get_cstr(briefStr));
  118. furi_string_free(briefStr);
  119. storage_simply_mkdir(dev->storage, EXT_PATH("lfrfid"));
  120. result = lfrfid_dict_file_save(dict, protocol, furi_string_get_cstr(file_path));
  121. if(result) {
  122. FURI_LOG_D(TAG, "Written: %d", result);
  123. } else {
  124. FURI_LOG_D(TAG, "Failed to write");
  125. }
  126. protocol_dict_free(dict);
  127. return result;
  128. }
  129. static bool picopass_device_save_file(
  130. PicopassDevice* dev,
  131. const char* dev_name,
  132. const char* folder,
  133. const char* extension,
  134. bool use_load_path) {
  135. furi_assert(dev);
  136. FURI_LOG_D(TAG, "Save File %s %s %s", folder, dev_name, extension);
  137. bool saved = false;
  138. FlipperFormat* file = flipper_format_file_alloc(dev->storage);
  139. PicopassPacs* pacs = &dev->dev_data.pacs;
  140. PicopassBlock* card_data = dev->dev_data.card_data;
  141. FuriString* temp_str;
  142. temp_str = furi_string_alloc();
  143. do {
  144. if(use_load_path && !furi_string_empty(dev->load_path)) {
  145. // Get directory name
  146. path_extract_dirname(furi_string_get_cstr(dev->load_path), temp_str);
  147. // Make path to file to save
  148. furi_string_cat_printf(temp_str, "/%s%s", dev_name, extension);
  149. } else {
  150. // First remove picopass device file if it was saved
  151. furi_string_printf(temp_str, "%s/%s%s", folder, dev_name, extension);
  152. }
  153. if(dev->format == PicopassDeviceSaveFormatOriginal ||
  154. dev->format == PicopassDeviceSaveFormatLegacy ||
  155. dev->format == PicopassDeviceSaveFormatPartial) {
  156. // Open file
  157. if(!flipper_format_file_open_always(file, furi_string_get_cstr(temp_str))) break;
  158. // Write header
  159. if(!flipper_format_write_header_cstr(file, picopass_file_header, picopass_file_version))
  160. break;
  161. if(!flipper_format_write_hex(file, "Credential", pacs->credential, PICOPASS_BLOCK_LEN))
  162. break;
  163. // TODO: Add elite
  164. if(!flipper_format_write_comment_cstr(file, "Picopass blocks")) break;
  165. bool block_saved = true;
  166. size_t app_limit = card_data[PICOPASS_CONFIG_BLOCK_INDEX].data[0] <
  167. PICOPASS_MAX_APP_LIMIT ?
  168. card_data[PICOPASS_CONFIG_BLOCK_INDEX].data[0] :
  169. PICOPASS_MAX_APP_LIMIT;
  170. for(size_t i = 0; i < app_limit; i++) {
  171. furi_string_printf(temp_str, "Block %d", i);
  172. if(card_data[i].valid) {
  173. if(dev->format == PicopassDeviceSaveFormatLegacy) {
  174. if(i == PICOPASS_ICLASS_PACS_CFG_BLOCK_INDEX) {
  175. card_data[i].data[0] = 0x03;
  176. }
  177. }
  178. if(!flipper_format_write_hex(
  179. file,
  180. furi_string_get_cstr(temp_str),
  181. card_data[i].data,
  182. PICOPASS_BLOCK_LEN)) {
  183. block_saved = false;
  184. break;
  185. }
  186. } else {
  187. if(!flipper_format_write_string_cstr(
  188. file, furi_string_get_cstr(temp_str), unknown_block)) {
  189. block_saved = false;
  190. break;
  191. }
  192. }
  193. }
  194. if(!block_saved) break;
  195. saved = true;
  196. } else if(dev->format == PicopassDeviceSaveFormatLF) {
  197. saved = picopass_device_save_file_lfrfid(dev, temp_str);
  198. } else if(dev->format == PicopassDeviceSaveFormatSeader) {
  199. saved = picopass_device_save_file_seader(dev, file, temp_str);
  200. }
  201. } while(false);
  202. if(!saved) {
  203. dialog_message_show_storage_error(dev->dialogs, "Can not save\nfile");
  204. }
  205. furi_string_free(temp_str);
  206. flipper_format_free(file);
  207. return saved;
  208. }
  209. bool picopass_device_save(PicopassDevice* dev, const char* dev_name) {
  210. if(dev->format == PicopassDeviceSaveFormatOriginal) {
  211. return picopass_device_save_file(
  212. dev, dev_name, STORAGE_APP_DATA_PATH_PREFIX, PICOPASS_APP_EXTENSION, true);
  213. } else if(dev->format == PicopassDeviceSaveFormatLF) {
  214. return picopass_device_save_file(dev, dev_name, ANY_PATH("lfrfid"), ".rfid", false);
  215. } else if(dev->format == PicopassDeviceSaveFormatSeader) {
  216. return picopass_device_save_file(
  217. dev, dev_name, EXT_PATH("apps_data/seader"), ".credential", false);
  218. } else if(dev->format == PicopassDeviceSaveFormatPartial) {
  219. return picopass_device_save_file(
  220. dev, dev_name, STORAGE_APP_DATA_PATH_PREFIX, PICOPASS_APP_EXTENSION, true);
  221. } else if(dev->format == PicopassDeviceSaveFormatLegacy) {
  222. return picopass_device_save_file(
  223. dev, dev_name, STORAGE_APP_DATA_PATH_PREFIX, PICOPASS_APP_EXTENSION, true);
  224. } else {
  225. FURI_LOG_E(TAG, "Unknown format");
  226. }
  227. return false;
  228. }
  229. bool picopass_hex_str_to_uint8(const char* value_str, size_t max, uint8_t* value) {
  230. furi_check(value_str);
  231. furi_check(value);
  232. bool parse_success = false;
  233. size_t count = 0;
  234. while(value_str[0] && value_str[1]) {
  235. if(count++ >= max) {
  236. parse_success = true;
  237. break;
  238. }
  239. parse_success = hex_char_to_uint8(value_str[0], value_str[1], value++);
  240. if(!parse_success) break;
  241. value_str += 3;
  242. }
  243. return parse_success;
  244. }
  245. static bool picopass_device_load_data(PicopassDevice* dev, FuriString* path, bool show_dialog) {
  246. bool parsed = false;
  247. FlipperFormat* file = flipper_format_file_alloc(dev->storage);
  248. PicopassBlock* card_data = dev->dev_data.card_data;
  249. PicopassPacs* pacs = &dev->dev_data.pacs;
  250. FuriString* temp_str;
  251. temp_str = furi_string_alloc();
  252. bool deprecated_version = false;
  253. if(dev->loading_cb) {
  254. dev->loading_cb(dev->loading_cb_ctx, true);
  255. }
  256. do {
  257. picopass_device_data_clear(&dev->dev_data);
  258. if(!flipper_format_file_open_existing(file, furi_string_get_cstr(path))) break;
  259. // Read and verify file header
  260. uint32_t version = 0;
  261. if(!flipper_format_read_header(file, temp_str, &version)) break;
  262. if(!furi_string_equal_str(temp_str, picopass_file_header) ||
  263. (version != picopass_file_version)) {
  264. deprecated_version = true;
  265. break;
  266. }
  267. FuriString* block_str = furi_string_alloc();
  268. // Parse header blocks
  269. bool block_read = true;
  270. for(size_t i = 0; i < 6; i++) {
  271. furi_string_printf(temp_str, "Block %d", i);
  272. if(!flipper_format_read_string(file, furi_string_get_cstr(temp_str), block_str)) {
  273. block_read = false;
  274. break;
  275. }
  276. if(furi_string_equal_str(block_str, unknown_block)) {
  277. FURI_LOG_D(TAG, "Block %i: %s (unknown)", i, furi_string_get_cstr(block_str));
  278. card_data[i].valid = false;
  279. memset(card_data[i].data, 0, PICOPASS_BLOCK_LEN);
  280. } else {
  281. FURI_LOG_D(TAG, "Block %i: %s (hex)", i, furi_string_get_cstr(block_str));
  282. if(!picopass_hex_str_to_uint8(
  283. furi_string_get_cstr(block_str), PICOPASS_BLOCK_LEN, card_data[i].data)) {
  284. block_read = false;
  285. break;
  286. }
  287. card_data[i].valid = true;
  288. }
  289. }
  290. // Check if legacy or SE
  291. PicopassBlock temp_block = {};
  292. memset(temp_block.data, 0xff, PICOPASS_BLOCK_LEN);
  293. pacs->legacy =
  294. (memcmp(
  295. card_data[PICOPASS_SECURE_AIA_BLOCK_INDEX].data,
  296. temp_block.data,
  297. PICOPASS_BLOCK_LEN) == 0);
  298. temp_block.data[3] = 0x00;
  299. temp_block.data[4] = 0x06;
  300. pacs->se_enabled =
  301. (memcmp(
  302. card_data[PICOPASS_SECURE_AIA_BLOCK_INDEX].data,
  303. temp_block.data,
  304. PICOPASS_BLOCK_LEN) == 0);
  305. size_t app_limit = card_data[PICOPASS_CONFIG_BLOCK_INDEX].data[0];
  306. // Fix for unpersonalized cards that have app_limit set to 0xFF
  307. if(app_limit > PICOPASS_MAX_APP_LIMIT) app_limit = PICOPASS_MAX_APP_LIMIT;
  308. for(size_t i = 6; i < app_limit; i++) {
  309. furi_string_printf(temp_str, "Block %d", i);
  310. if(!flipper_format_read_string(file, furi_string_get_cstr(temp_str), block_str)) {
  311. block_read = false;
  312. break;
  313. }
  314. if(furi_string_equal_str(block_str, unknown_block)) {
  315. FURI_LOG_D(TAG, "Block %i: %s (unknown)", i, furi_string_get_cstr(block_str));
  316. card_data[i].valid = false;
  317. memset(card_data[i].data, 0, PICOPASS_BLOCK_LEN);
  318. } else {
  319. FURI_LOG_D(TAG, "Block %i: %s (hex)", i, furi_string_get_cstr(block_str));
  320. if(!picopass_hex_str_to_uint8(
  321. furi_string_get_cstr(block_str), PICOPASS_BLOCK_LEN, card_data[i].data)) {
  322. block_read = false;
  323. break;
  324. }
  325. card_data[i].valid = true;
  326. }
  327. }
  328. if(!block_read) break;
  329. if(pacs->se_enabled) {
  330. FURI_LOG_D(TAG, "Skipping parsing: SE enabled");
  331. } else if(card_data[PICOPASS_ICLASS_PACS_CFG_BLOCK_INDEX].valid) {
  332. picopass_device_parse_credential(card_data, pacs);
  333. picopass_device_parse_wiegand(pacs);
  334. }
  335. parsed = true;
  336. } while(false);
  337. if(dev->loading_cb) {
  338. dev->loading_cb(dev->loading_cb_ctx, false);
  339. }
  340. if((!parsed) && (show_dialog)) {
  341. if(deprecated_version) {
  342. dialog_message_show_storage_error(dev->dialogs, "File format deprecated");
  343. } else {
  344. dialog_message_show_storage_error(dev->dialogs, "Can not parse\nfile");
  345. }
  346. }
  347. furi_string_free(temp_str);
  348. flipper_format_free(file);
  349. return parsed;
  350. }
  351. void picopass_device_clear(PicopassDevice* dev) {
  352. furi_assert(dev);
  353. picopass_device_data_clear(&dev->dev_data);
  354. memset(&dev->dev_data, 0, sizeof(dev->dev_data));
  355. dev->format = PicopassDeviceSaveFormatOriginal;
  356. furi_string_reset(dev->load_path);
  357. }
  358. void picopass_device_free(PicopassDevice* picopass_dev) {
  359. furi_assert(picopass_dev);
  360. picopass_device_clear(picopass_dev);
  361. furi_record_close(RECORD_STORAGE);
  362. furi_record_close(RECORD_DIALOGS);
  363. furi_string_free(picopass_dev->load_path);
  364. free(picopass_dev);
  365. }
  366. bool picopass_file_select(PicopassDevice* dev) {
  367. furi_assert(dev);
  368. FuriString* picopass_app_folder;
  369. picopass_app_folder = furi_string_alloc_set(STORAGE_APP_DATA_PATH_PREFIX);
  370. DialogsFileBrowserOptions browser_options;
  371. dialog_file_browser_set_basic_options(&browser_options, PICOPASS_APP_EXTENSION, &I_Nfc_10px);
  372. browser_options.base_path = STORAGE_APP_DATA_PATH_PREFIX;
  373. bool res = dialog_file_browser_show(
  374. dev->dialogs, dev->load_path, picopass_app_folder, &browser_options);
  375. furi_string_free(picopass_app_folder);
  376. if(res) {
  377. FuriString* filename;
  378. filename = furi_string_alloc();
  379. path_extract_filename(dev->load_path, filename, true);
  380. strlcpy(dev->dev_name, furi_string_get_cstr(filename), sizeof(dev->dev_name));
  381. res = picopass_device_load_data(dev, dev->load_path, true);
  382. if(res) {
  383. picopass_device_set_name(dev, dev->dev_name);
  384. }
  385. furi_string_free(filename);
  386. }
  387. return res;
  388. }
  389. void picopass_device_data_clear(PicopassDeviceData* dev_data) {
  390. for(size_t i = 0; i < PICOPASS_MAX_APP_LIMIT; i++) {
  391. memset(dev_data->card_data[i].data, 0, sizeof(dev_data->card_data[i].data));
  392. dev_data->card_data[i].valid = false;
  393. }
  394. memset(dev_data->pacs.credential, 0, sizeof(dev_data->pacs.credential));
  395. dev_data->auth = PicopassDeviceAuthMethodUnset;
  396. dev_data->pacs.legacy = false;
  397. dev_data->pacs.se_enabled = false;
  398. dev_data->pacs.elite_kdf = false;
  399. dev_data->pacs.sio = false;
  400. dev_data->pacs.pin_length = 0;
  401. dev_data->pacs.bitLength = 0;
  402. }
  403. bool picopass_device_delete(PicopassDevice* dev, bool use_load_path) {
  404. furi_assert(dev);
  405. if(dev->format != PicopassDeviceSaveFormatOriginal) {
  406. // Never delete other formats (LF, Seader, etc)
  407. return false;
  408. }
  409. bool deleted = false;
  410. FuriString* file_path;
  411. file_path = furi_string_alloc();
  412. do {
  413. // Delete original file
  414. if(use_load_path && !furi_string_empty(dev->load_path)) {
  415. furi_string_set(file_path, dev->load_path);
  416. } else {
  417. furi_string_printf(
  418. file_path, APP_DATA_PATH("%s%s"), dev->dev_name, PICOPASS_APP_EXTENSION);
  419. }
  420. if(!storage_simply_remove(dev->storage, furi_string_get_cstr(file_path))) break;
  421. deleted = true;
  422. } while(0);
  423. if(!deleted) {
  424. dialog_message_show_storage_error(dev->dialogs, "Can not remove file");
  425. }
  426. furi_string_free(file_path);
  427. return deleted;
  428. }
  429. void picopass_device_set_loading_callback(
  430. PicopassDevice* dev,
  431. PicopassLoadingCallback callback,
  432. void* context) {
  433. furi_assert(dev);
  434. dev->loading_cb = callback;
  435. dev->loading_cb_ctx = context;
  436. }
  437. void picopass_device_decrypt(uint8_t* enc_data, uint8_t* dec_data) {
  438. uint8_t key[32] = {0};
  439. memcpy(key, picopass_iclass_decryptionkey, sizeof(picopass_iclass_decryptionkey));
  440. mbedtls_des3_context ctx;
  441. mbedtls_des3_init(&ctx);
  442. mbedtls_des3_set2key_dec(&ctx, key);
  443. mbedtls_des3_crypt_ecb(&ctx, enc_data, dec_data);
  444. mbedtls_des3_free(&ctx);
  445. }
  446. void picopass_device_parse_credential(PicopassBlock* card_data, PicopassPacs* pacs) {
  447. pacs->biometrics = card_data[6].data[4];
  448. pacs->pin_length = card_data[6].data[6] & 0x0F;
  449. pacs->encryption = card_data[6].data[7];
  450. if(pacs->encryption == PicopassDeviceEncryption3DES) {
  451. FURI_LOG_D(TAG, "3DES Encrypted");
  452. picopass_device_decrypt(card_data[7].data, pacs->credential);
  453. picopass_device_decrypt(card_data[8].data, pacs->pin0);
  454. picopass_device_decrypt(card_data[9].data, pacs->pin1);
  455. } else if(pacs->encryption == PicopassDeviceEncryptionNone) {
  456. FURI_LOG_D(TAG, "No Encryption");
  457. memcpy(pacs->credential, card_data[7].data, PICOPASS_BLOCK_LEN);
  458. memcpy(pacs->pin0, card_data[8].data, PICOPASS_BLOCK_LEN);
  459. memcpy(pacs->pin1, card_data[9].data, PICOPASS_BLOCK_LEN);
  460. } else if(pacs->encryption == PicopassDeviceEncryptionDES) {
  461. FURI_LOG_D(TAG, "DES Encrypted");
  462. } else {
  463. FURI_LOG_D(TAG, "Unknown encryption");
  464. }
  465. pacs->sio = (card_data[10].data[0] == 0x30); // rough check
  466. }
  467. void picopass_device_parse_wiegand(PicopassPacs* pacs) {
  468. uint8_t* credential = pacs->credential;
  469. uint32_t* halves = (uint32_t*)credential;
  470. if(halves[0] == 0) {
  471. uint8_t leading0s = __builtin_clz(REVERSE_BYTES_U32(halves[1]));
  472. pacs->bitLength = 31 - leading0s;
  473. } else {
  474. uint8_t leading0s = __builtin_clz(REVERSE_BYTES_U32(halves[0]));
  475. pacs->bitLength = 63 - leading0s;
  476. }
  477. // Remove sentinel bit from credential. Byteswapping to handle array of bytes vs 64bit value
  478. uint64_t sentinel = __builtin_bswap64(1ULL << pacs->bitLength);
  479. uint64_t swapped = 0;
  480. memcpy(&swapped, credential, sizeof(uint64_t));
  481. swapped = swapped ^ sentinel;
  482. memcpy(credential, &swapped, sizeof(uint64_t));
  483. FURI_LOG_D(TAG, "PACS: (%d) %016llx", pacs->bitLength, swapped);
  484. }
  485. bool picopass_device_hid_csn(PicopassDevice* dev) {
  486. furi_assert(dev);
  487. PicopassBlock* card_data = dev->dev_data.card_data;
  488. uint8_t* csn = card_data[PICOPASS_CSN_BLOCK_INDEX].data;
  489. // From Proxmark3 RRG sourcecode
  490. bool isHidRange = (memcmp(csn + 5, "\xFF\x12\xE0", 3) == 0) && ((csn[4] & 0xF0) == 0xF0);
  491. return isHidRange;
  492. }