troika_4k_parser.c 4.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105
  1. #include "nfc_supported_card.h"
  2. #include <gui/modules/widget.h>
  3. #include <nfc_worker_i.h>
  4. static const MfClassicAuthContext troika_4k_keys[] = {
  5. {.sector = 0, .key_a = 0xa0a1a2a3a4a5, .key_b = 0xfbf225dc5d58},
  6. {.sector = 1, .key_a = 0xa82607b01c0d, .key_b = 0x2910989b6880},
  7. {.sector = 2, .key_a = 0x2aa05ed1856f, .key_b = 0xeaac88e5dc99},
  8. {.sector = 3, .key_a = 0x2aa05ed1856f, .key_b = 0xeaac88e5dc99},
  9. {.sector = 4, .key_a = 0x73068f118c13, .key_b = 0x2b7f3253fac5},
  10. {.sector = 5, .key_a = 0xFBC2793D540B, .key_b = 0xd3a297dc2698},
  11. {.sector = 6, .key_a = 0x2aa05ed1856f, .key_b = 0xeaac88e5dc99},
  12. {.sector = 7, .key_a = 0xae3d65a3dad4, .key_b = 0x0f1c63013dbb},
  13. {.sector = 8, .key_a = 0xa73f5dc1d333, .key_b = 0xe35173494a81},
  14. {.sector = 9, .key_a = 0x69a32f1c2f19, .key_b = 0x6b8bd9860763},
  15. {.sector = 10, .key_a = 0x9becdf3d9273, .key_b = 0xf8493407799d},
  16. {.sector = 11, .key_a = 0x08b386463229, .key_b = 0x5efbaecef46b},
  17. {.sector = 12, .key_a = 0xcd4c61c26e3d, .key_b = 0x31c7610de3b0},
  18. {.sector = 13, .key_a = 0xa82607b01c0d, .key_b = 0x2910989b6880},
  19. {.sector = 14, .key_a = 0x0e8f64340ba4, .key_b = 0x4acec1205d75},
  20. {.sector = 15, .key_a = 0x2aa05ed1856f, .key_b = 0xeaac88e5dc99},
  21. {.sector = 16, .key_a = 0x6b02733bb6ec, .key_b = 0x7038cd25c408},
  22. {.sector = 17, .key_a = 0x403d706ba880, .key_b = 0xb39d19a280df},
  23. {.sector = 18, .key_a = 0xc11f4597efb5, .key_b = 0x70d901648cb9},
  24. {.sector = 19, .key_a = 0x0db520c78c1c, .key_b = 0x73e5b9d9d3a4},
  25. {.sector = 20, .key_a = 0x3ebce0925b2f, .key_b = 0x372cc880f216},
  26. {.sector = 21, .key_a = 0x16a27af45407, .key_b = 0x9868925175ba},
  27. {.sector = 22, .key_a = 0xaba208516740, .key_b = 0xce26ecb95252},
  28. {.sector = 23, .key_a = 0xCD64E567ABCD, .key_b = 0x8f79c4fd8a01},
  29. {.sector = 24, .key_a = 0x764cd061f1e6, .key_b = 0xa74332f74994},
  30. {.sector = 25, .key_a = 0x1cc219e9fec1, .key_b = 0xb90de525ceb6},
  31. {.sector = 26, .key_a = 0x2fe3cb83ea43, .key_b = 0xfba88f109b32},
  32. {.sector = 27, .key_a = 0x07894ffec1d6, .key_b = 0xefcb0e689db3},
  33. {.sector = 28, .key_a = 0x04c297b91308, .key_b = 0xc8454c154cb5},
  34. {.sector = 29, .key_a = 0x7a38e3511a38, .key_b = 0xab16584c972a},
  35. {.sector = 30, .key_a = 0x7545df809202, .key_b = 0xecf751084a80},
  36. {.sector = 31, .key_a = 0x5125974cd391, .key_b = 0xd3eafb5df46d},
  37. {.sector = 32, .key_a = 0x7a86aa203788, .key_b = 0xe41242278ca2},
  38. {.sector = 33, .key_a = 0xafcef64c9913, .key_b = 0x9db96dca4324},
  39. {.sector = 34, .key_a = 0x04eaa462f70b, .key_b = 0xac17b93e2fae},
  40. {.sector = 35, .key_a = 0xe734c210f27e, .key_b = 0x29ba8c3e9fda},
  41. {.sector = 36, .key_a = 0xd5524f591eed, .key_b = 0x5daf42861b4d},
  42. {.sector = 37, .key_a = 0xe4821a377b75, .key_b = 0xe8709e486465},
  43. {.sector = 38, .key_a = 0x518dc6eea089, .key_b = 0x97c64ac98ca4},
  44. {.sector = 39, .key_a = 0xbb52f8cce07f, .key_b = 0x6b6119752c70},
  45. };
  46. bool troika_4k_parser_verify(NfcWorker* nfc_worker, FuriHalNfcTxRxContext* tx_rx) {
  47. furi_assert(nfc_worker);
  48. if(nfc_worker->dev_data->mf_classic_data.type != MfClassicType4k) {
  49. return false;
  50. }
  51. uint8_t sector = 11;
  52. uint8_t block = mf_classic_get_sector_trailer_block_num_by_sector(sector);
  53. FURI_LOG_D("Troika", "Verifying sector %d", sector);
  54. if(mf_classic_authenticate(tx_rx, block, 0x08b386463229, MfClassicKeyA)) {
  55. FURI_LOG_D("Troika", "Sector %d verified", sector);
  56. return true;
  57. }
  58. return false;
  59. }
  60. bool troika_4k_parser_read(NfcWorker* nfc_worker, FuriHalNfcTxRxContext* tx_rx) {
  61. furi_assert(nfc_worker);
  62. MfClassicReader reader = {};
  63. FuriHalNfcDevData* nfc_data = &nfc_worker->dev_data->nfc_data;
  64. reader.type = mf_classic_get_classic_type(nfc_data->atqa[0], nfc_data->atqa[1], nfc_data->sak);
  65. for(size_t i = 0; i < COUNT_OF(troika_4k_keys); i++) {
  66. mf_classic_reader_add_sector(
  67. &reader, troika_4k_keys[i].sector, troika_4k_keys[i].key_a, troika_4k_keys[i].key_b);
  68. }
  69. return mf_classic_read_card(tx_rx, &reader, &nfc_worker->dev_data->mf_classic_data) == 40;
  70. }
  71. bool troika_4k_parser_parse(NfcDeviceData* dev_data) {
  72. MfClassicData* data = &dev_data->mf_classic_data;
  73. // Verify key
  74. MfClassicSectorTrailer* sec_tr = mf_classic_get_sector_trailer_by_sector(data, 4);
  75. uint64_t key = nfc_util_bytes2num(sec_tr->key_a, 6);
  76. if(key != troika_4k_keys[4].key_a) return false;
  77. // Verify card type
  78. if(data->type != MfClassicType4k) return false;
  79. uint8_t* temp_ptr = &data->block[8 * 4 + 1].value[5];
  80. uint16_t balance = ((temp_ptr[0] << 8) | temp_ptr[1]) / 25;
  81. temp_ptr = &data->block[8 * 4].value[3];
  82. uint32_t number = 0;
  83. for(size_t i = 0; i < 4; i++) {
  84. number <<= 8;
  85. number |= temp_ptr[i];
  86. }
  87. number >>= 4;
  88. furi_string_printf(
  89. dev_data->parsed_data, "\e#Troika\nNum: %ld\nBalance: %d rur.", number, balance);
  90. return true;
  91. }