picopass_worker.c 21 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677
  1. #include "picopass_worker_i.h"
  2. #include <flipper_format/flipper_format.h>
  3. #define TAG "PicopassWorker"
  4. const uint8_t picopass_iclass_key[] = {0xaf, 0xa7, 0x85, 0xa7, 0xda, 0xb3, 0x33, 0x78};
  5. const uint8_t picopass_factory_credit_key[] = {0x76, 0x65, 0x54, 0x43, 0x32, 0x21, 0x10, 0x00};
  6. const uint8_t picopass_factory_debit_key[] = {0xf0, 0xe1, 0xd2, 0xc3, 0xb4, 0xa5, 0x96, 0x87};
  7. static void picopass_worker_enable_field() {
  8. furi_hal_nfc_ll_txrx_on();
  9. furi_hal_nfc_exit_sleep();
  10. furi_hal_nfc_ll_poll();
  11. }
  12. static ReturnCode picopass_worker_disable_field(ReturnCode rc) {
  13. furi_hal_nfc_ll_txrx_off();
  14. furi_hal_nfc_start_sleep();
  15. return rc;
  16. }
  17. /***************************** Picopass Worker API *******************************/
  18. PicopassWorker* picopass_worker_alloc() {
  19. PicopassWorker* picopass_worker = malloc(sizeof(PicopassWorker));
  20. // Worker thread attributes
  21. picopass_worker->thread =
  22. furi_thread_alloc_ex("PicopassWorker", 8192, picopass_worker_task, picopass_worker);
  23. picopass_worker->callback = NULL;
  24. picopass_worker->context = NULL;
  25. picopass_worker->storage = furi_record_open(RECORD_STORAGE);
  26. picopass_worker_change_state(picopass_worker, PicopassWorkerStateReady);
  27. return picopass_worker;
  28. }
  29. void picopass_worker_free(PicopassWorker* picopass_worker) {
  30. furi_assert(picopass_worker);
  31. furi_thread_free(picopass_worker->thread);
  32. furi_record_close(RECORD_STORAGE);
  33. free(picopass_worker);
  34. }
  35. PicopassWorkerState picopass_worker_get_state(PicopassWorker* picopass_worker) {
  36. return picopass_worker->state;
  37. }
  38. void picopass_worker_start(
  39. PicopassWorker* picopass_worker,
  40. PicopassWorkerState state,
  41. PicopassDeviceData* dev_data,
  42. PicopassWorkerCallback callback,
  43. void* context) {
  44. furi_assert(picopass_worker);
  45. furi_assert(dev_data);
  46. picopass_worker->callback = callback;
  47. picopass_worker->context = context;
  48. picopass_worker->dev_data = dev_data;
  49. picopass_worker_change_state(picopass_worker, state);
  50. furi_thread_start(picopass_worker->thread);
  51. }
  52. void picopass_worker_stop(PicopassWorker* picopass_worker) {
  53. furi_assert(picopass_worker);
  54. if(picopass_worker->state == PicopassWorkerStateBroken ||
  55. picopass_worker->state == PicopassWorkerStateReady) {
  56. return;
  57. }
  58. picopass_worker_disable_field(ERR_NONE);
  59. picopass_worker_change_state(picopass_worker, PicopassWorkerStateStop);
  60. furi_thread_join(picopass_worker->thread);
  61. }
  62. void picopass_worker_change_state(PicopassWorker* picopass_worker, PicopassWorkerState state) {
  63. picopass_worker->state = state;
  64. }
  65. /***************************** Picopass Worker Thread *******************************/
  66. ReturnCode picopass_detect_card(int timeout) {
  67. UNUSED(timeout);
  68. ReturnCode err;
  69. err = rfalPicoPassPollerInitialize();
  70. if(err != ERR_NONE) {
  71. FURI_LOG_E(TAG, "rfalPicoPassPollerInitialize error %d", err);
  72. return err;
  73. }
  74. err = rfalFieldOnAndStartGT();
  75. if(err != ERR_NONE) {
  76. FURI_LOG_E(TAG, "rfalFieldOnAndStartGT error %d", err);
  77. return err;
  78. }
  79. err = rfalPicoPassPollerCheckPresence();
  80. if(err != ERR_RF_COLLISION) {
  81. FURI_LOG_E(TAG, "rfalPicoPassPollerCheckPresence error %d", err);
  82. return err;
  83. }
  84. return ERR_NONE;
  85. }
  86. ReturnCode picopass_read_preauth(PicopassBlock* AA1) {
  87. rfalPicoPassIdentifyRes idRes;
  88. rfalPicoPassSelectRes selRes;
  89. ReturnCode err;
  90. err = rfalPicoPassPollerIdentify(&idRes);
  91. if(err != ERR_NONE) {
  92. FURI_LOG_E(TAG, "rfalPicoPassPollerIdentify error %d", err);
  93. return err;
  94. }
  95. err = rfalPicoPassPollerSelect(idRes.CSN, &selRes);
  96. if(err != ERR_NONE) {
  97. FURI_LOG_E(TAG, "rfalPicoPassPollerSelect error %d", err);
  98. return err;
  99. }
  100. memcpy(AA1[PICOPASS_CSN_BLOCK_INDEX].data, selRes.CSN, sizeof(selRes.CSN));
  101. FURI_LOG_D(
  102. TAG,
  103. "csn %02x%02x%02x%02x%02x%02x%02x%02x",
  104. AA1[PICOPASS_CSN_BLOCK_INDEX].data[0],
  105. AA1[PICOPASS_CSN_BLOCK_INDEX].data[1],
  106. AA1[PICOPASS_CSN_BLOCK_INDEX].data[2],
  107. AA1[PICOPASS_CSN_BLOCK_INDEX].data[3],
  108. AA1[PICOPASS_CSN_BLOCK_INDEX].data[4],
  109. AA1[PICOPASS_CSN_BLOCK_INDEX].data[5],
  110. AA1[PICOPASS_CSN_BLOCK_INDEX].data[6],
  111. AA1[PICOPASS_CSN_BLOCK_INDEX].data[7]);
  112. rfalPicoPassReadBlockRes cfg = {0};
  113. rfalPicoPassPollerReadBlock(PICOPASS_CONFIG_BLOCK_INDEX, &cfg);
  114. memcpy(AA1[PICOPASS_CONFIG_BLOCK_INDEX].data, cfg.data, sizeof(cfg.data));
  115. FURI_LOG_D(
  116. TAG,
  117. "config %02x%02x%02x%02x%02x%02x%02x%02x",
  118. AA1[PICOPASS_CONFIG_BLOCK_INDEX].data[0],
  119. AA1[PICOPASS_CONFIG_BLOCK_INDEX].data[1],
  120. AA1[PICOPASS_CONFIG_BLOCK_INDEX].data[2],
  121. AA1[PICOPASS_CONFIG_BLOCK_INDEX].data[3],
  122. AA1[PICOPASS_CONFIG_BLOCK_INDEX].data[4],
  123. AA1[PICOPASS_CONFIG_BLOCK_INDEX].data[5],
  124. AA1[PICOPASS_CONFIG_BLOCK_INDEX].data[6],
  125. AA1[PICOPASS_CONFIG_BLOCK_INDEX].data[7]);
  126. rfalPicoPassReadBlockRes aia;
  127. rfalPicoPassPollerReadBlock(PICOPASS_AIA_BLOCK_INDEX, &aia);
  128. memcpy(AA1[PICOPASS_AIA_BLOCK_INDEX].data, aia.data, sizeof(aia.data));
  129. FURI_LOG_D(
  130. TAG,
  131. "aia %02x%02x%02x%02x%02x%02x%02x%02x",
  132. AA1[PICOPASS_AIA_BLOCK_INDEX].data[0],
  133. AA1[PICOPASS_AIA_BLOCK_INDEX].data[1],
  134. AA1[PICOPASS_AIA_BLOCK_INDEX].data[2],
  135. AA1[PICOPASS_AIA_BLOCK_INDEX].data[3],
  136. AA1[PICOPASS_AIA_BLOCK_INDEX].data[4],
  137. AA1[PICOPASS_AIA_BLOCK_INDEX].data[5],
  138. AA1[PICOPASS_AIA_BLOCK_INDEX].data[6],
  139. AA1[PICOPASS_AIA_BLOCK_INDEX].data[7]);
  140. return ERR_NONE;
  141. }
  142. static ReturnCode picopass_auth_standard(uint8_t* csn, uint8_t* div_key) {
  143. rfalPicoPassReadCheckRes rcRes;
  144. rfalPicoPassCheckRes chkRes;
  145. ReturnCode err;
  146. uint8_t mac[4] = {0};
  147. uint8_t ccnr[12] = {0};
  148. err = rfalPicoPassPollerReadCheck(&rcRes);
  149. if(err != ERR_NONE) {
  150. FURI_LOG_E(TAG, "rfalPicoPassPollerReadCheck error %d", err);
  151. return err;
  152. }
  153. memcpy(ccnr, rcRes.CCNR, sizeof(rcRes.CCNR)); // last 4 bytes left 0
  154. loclass_diversifyKey(csn, picopass_iclass_key, div_key);
  155. loclass_opt_doReaderMAC(ccnr, div_key, mac);
  156. return rfalPicoPassPollerCheck(mac, &chkRes);
  157. }
  158. static ReturnCode picopass_auth_factory(uint8_t* csn, uint8_t* div_key) {
  159. rfalPicoPassReadCheckRes rcRes;
  160. rfalPicoPassCheckRes chkRes;
  161. ReturnCode err;
  162. uint8_t mac[4] = {0};
  163. uint8_t ccnr[12] = {0};
  164. err = rfalPicoPassPollerReadCheck(&rcRes);
  165. if(err != ERR_NONE) {
  166. FURI_LOG_E(TAG, "rfalPicoPassPollerReadCheck error %d", err);
  167. return err;
  168. }
  169. memcpy(ccnr, rcRes.CCNR, sizeof(rcRes.CCNR)); // last 4 bytes left 0
  170. loclass_diversifyKey(csn, picopass_factory_debit_key, div_key);
  171. loclass_opt_doReaderMAC(ccnr, div_key, mac);
  172. return rfalPicoPassPollerCheck(mac, &chkRes);
  173. }
  174. static ReturnCode picopass_auth_dict(
  175. uint8_t* csn,
  176. PicopassPacs* pacs,
  177. uint8_t* div_key,
  178. IclassEliteDictType dict_type) {
  179. rfalPicoPassReadCheckRes rcRes;
  180. rfalPicoPassCheckRes chkRes;
  181. ReturnCode err = ERR_PARAM;
  182. uint8_t mac[4] = {0};
  183. uint8_t ccnr[12] = {0};
  184. size_t index = 0;
  185. uint8_t key[PICOPASS_BLOCK_LEN] = {0};
  186. if(!iclass_elite_dict_check_presence(dict_type)) {
  187. FURI_LOG_E(TAG, "Dictionary not found");
  188. return ERR_PARAM;
  189. }
  190. IclassEliteDict* dict = iclass_elite_dict_alloc(dict_type);
  191. if(!dict) {
  192. FURI_LOG_E(TAG, "Dictionary not allocated");
  193. return ERR_PARAM;
  194. }
  195. FURI_LOG_D(TAG, "Loaded %lu keys", iclass_elite_dict_get_total_keys(dict));
  196. while(iclass_elite_dict_get_next_key(dict, key)) {
  197. FURI_LOG_D(
  198. TAG,
  199. "Try to auth with key %zu %02x%02x%02x%02x%02x%02x%02x%02x",
  200. index++,
  201. key[0],
  202. key[1],
  203. key[2],
  204. key[3],
  205. key[4],
  206. key[5],
  207. key[6],
  208. key[7]);
  209. err = rfalPicoPassPollerReadCheck(&rcRes);
  210. if(err != ERR_NONE) {
  211. FURI_LOG_E(TAG, "rfalPicoPassPollerReadCheck error %d", err);
  212. break;
  213. }
  214. memcpy(ccnr, rcRes.CCNR, sizeof(rcRes.CCNR)); // last 4 bytes left 0
  215. loclass_iclass_calc_div_key(csn, key, div_key, true);
  216. loclass_opt_doReaderMAC(ccnr, div_key, mac);
  217. err = rfalPicoPassPollerCheck(mac, &chkRes);
  218. if(err == ERR_NONE) {
  219. memcpy(pacs->key, key, PICOPASS_BLOCK_LEN);
  220. break;
  221. }
  222. }
  223. iclass_elite_dict_free(dict);
  224. return err;
  225. }
  226. ReturnCode picopass_auth(PicopassBlock* AA1, PicopassPacs* pacs) {
  227. ReturnCode err;
  228. FURI_LOG_I(TAG, "Trying standard legacy key");
  229. err = picopass_auth_standard(
  230. AA1[PICOPASS_CSN_BLOCK_INDEX].data, AA1[PICOPASS_KD_BLOCK_INDEX].data);
  231. if(err == ERR_NONE) {
  232. memcpy(pacs->key, picopass_iclass_key, PICOPASS_BLOCK_LEN);
  233. return ERR_NONE;
  234. }
  235. FURI_LOG_I(TAG, "Trying factory default key");
  236. err = picopass_auth_factory(
  237. AA1[PICOPASS_CSN_BLOCK_INDEX].data, AA1[PICOPASS_KD_BLOCK_INDEX].data);
  238. if(err == ERR_NONE) {
  239. memcpy(pacs->key, picopass_factory_debit_key, PICOPASS_BLOCK_LEN);
  240. return ERR_NONE;
  241. }
  242. FURI_LOG_I(TAG, "Starting user dictionary attack");
  243. err = picopass_auth_dict(
  244. AA1[PICOPASS_CSN_BLOCK_INDEX].data,
  245. pacs,
  246. AA1[PICOPASS_KD_BLOCK_INDEX].data,
  247. IclassEliteDictTypeUser);
  248. if(err == ERR_NONE) {
  249. return ERR_NONE;
  250. }
  251. FURI_LOG_I(TAG, "Starting system dictionary attack");
  252. err = picopass_auth_dict(
  253. AA1[PICOPASS_CSN_BLOCK_INDEX].data,
  254. pacs,
  255. AA1[PICOPASS_KD_BLOCK_INDEX].data,
  256. IclassEliteDictTypeFlipper);
  257. if(err == ERR_NONE) {
  258. return ERR_NONE;
  259. }
  260. return err;
  261. }
  262. ReturnCode picopass_read_card(PicopassBlock* AA1) {
  263. ReturnCode err;
  264. size_t app_limit = AA1[PICOPASS_CONFIG_BLOCK_INDEX].data[0] < PICOPASS_MAX_APP_LIMIT ?
  265. AA1[PICOPASS_CONFIG_BLOCK_INDEX].data[0] :
  266. PICOPASS_MAX_APP_LIMIT;
  267. for(size_t i = 2; i < app_limit; i++) {
  268. if(i == PICOPASS_KD_BLOCK_INDEX) {
  269. // Skip over Kd block which is populated earlier (READ of Kd returns all FF's)
  270. continue;
  271. }
  272. rfalPicoPassReadBlockRes block;
  273. err = rfalPicoPassPollerReadBlock(i, &block);
  274. if(err != ERR_NONE) {
  275. FURI_LOG_E(TAG, "rfalPicoPassPollerReadBlock error %d", err);
  276. return err;
  277. }
  278. FURI_LOG_D(
  279. TAG,
  280. "rfalPicoPassPollerReadBlock %d %02x%02x%02x%02x%02x%02x%02x%02x",
  281. i,
  282. block.data[0],
  283. block.data[1],
  284. block.data[2],
  285. block.data[3],
  286. block.data[4],
  287. block.data[5],
  288. block.data[6],
  289. block.data[7]);
  290. memcpy(AA1[i].data, block.data, sizeof(block.data));
  291. }
  292. return ERR_NONE;
  293. }
  294. ReturnCode picopass_write_card(PicopassBlock* AA1) {
  295. rfalPicoPassIdentifyRes idRes;
  296. rfalPicoPassSelectRes selRes;
  297. rfalPicoPassReadCheckRes rcRes;
  298. rfalPicoPassCheckRes chkRes;
  299. ReturnCode err;
  300. uint8_t div_key[8] = {0};
  301. uint8_t mac[4] = {0};
  302. uint8_t ccnr[12] = {0};
  303. err = rfalPicoPassPollerIdentify(&idRes);
  304. if(err != ERR_NONE) {
  305. FURI_LOG_E(TAG, "rfalPicoPassPollerIdentify error %d", err);
  306. return err;
  307. }
  308. err = rfalPicoPassPollerSelect(idRes.CSN, &selRes);
  309. if(err != ERR_NONE) {
  310. FURI_LOG_E(TAG, "rfalPicoPassPollerSelect error %d", err);
  311. return err;
  312. }
  313. err = rfalPicoPassPollerReadCheck(&rcRes);
  314. if(err != ERR_NONE) {
  315. FURI_LOG_E(TAG, "rfalPicoPassPollerReadCheck error %d", err);
  316. return err;
  317. }
  318. memcpy(ccnr, rcRes.CCNR, sizeof(rcRes.CCNR)); // last 4 bytes left 0
  319. loclass_diversifyKey(selRes.CSN, picopass_iclass_key, div_key);
  320. loclass_opt_doReaderMAC(ccnr, div_key, mac);
  321. err = rfalPicoPassPollerCheck(mac, &chkRes);
  322. if(err != ERR_NONE) {
  323. FURI_LOG_E(TAG, "rfalPicoPassPollerCheck error %d", err);
  324. return err;
  325. }
  326. for(size_t i = 6; i < 10; i++) {
  327. FURI_LOG_D(TAG, "rfalPicoPassPollerWriteBlock %d", i);
  328. uint8_t data[9] = {0};
  329. data[0] = i;
  330. memcpy(data + 1, AA1[i].data, RFAL_PICOPASS_MAX_BLOCK_LEN);
  331. loclass_doMAC_N(data, sizeof(data), div_key, mac);
  332. FURI_LOG_D(
  333. TAG,
  334. "loclass_doMAC_N %d %02x%02x%02x%02x%02x%02x%02x%02x %02x%02x%02x%02x",
  335. i,
  336. data[1],
  337. data[2],
  338. data[3],
  339. data[4],
  340. data[5],
  341. data[6],
  342. data[7],
  343. data[8],
  344. mac[0],
  345. mac[1],
  346. mac[2],
  347. mac[3]);
  348. err = rfalPicoPassPollerWriteBlock(i, AA1[i].data, mac);
  349. if(err != ERR_NONE) {
  350. FURI_LOG_E(TAG, "rfalPicoPassPollerWriteBlock error %d", err);
  351. return err;
  352. }
  353. }
  354. return ERR_NONE;
  355. }
  356. ReturnCode picopass_write_block(PicopassPacs* pacs, uint8_t blockNo, uint8_t* newBlock) {
  357. rfalPicoPassIdentifyRes idRes;
  358. rfalPicoPassSelectRes selRes;
  359. rfalPicoPassReadCheckRes rcRes;
  360. rfalPicoPassCheckRes chkRes;
  361. ReturnCode err;
  362. uint8_t div_key[8] = {0};
  363. uint8_t mac[4] = {0};
  364. uint8_t ccnr[12] = {0};
  365. err = rfalPicoPassPollerIdentify(&idRes);
  366. if(err != ERR_NONE) {
  367. FURI_LOG_E(TAG, "rfalPicoPassPollerIdentify error %d", err);
  368. return err;
  369. }
  370. err = rfalPicoPassPollerSelect(idRes.CSN, &selRes);
  371. if(err != ERR_NONE) {
  372. FURI_LOG_E(TAG, "rfalPicoPassPollerSelect error %d", err);
  373. return err;
  374. }
  375. err = rfalPicoPassPollerReadCheck(&rcRes);
  376. if(err != ERR_NONE) {
  377. FURI_LOG_E(TAG, "rfalPicoPassPollerReadCheck error %d", err);
  378. return err;
  379. }
  380. memcpy(ccnr, rcRes.CCNR, sizeof(rcRes.CCNR)); // last 4 bytes left 0
  381. loclass_diversifyKey(selRes.CSN, pacs->key, div_key);
  382. loclass_opt_doReaderMAC(ccnr, div_key, mac);
  383. err = rfalPicoPassPollerCheck(mac, &chkRes);
  384. if(err != ERR_NONE) {
  385. FURI_LOG_E(TAG, "rfalPicoPassPollerCheck error %d", err);
  386. return err;
  387. }
  388. FURI_LOG_D(TAG, "rfalPicoPassPollerWriteBlock %d", blockNo);
  389. uint8_t data[9] = {
  390. blockNo,
  391. newBlock[0],
  392. newBlock[1],
  393. newBlock[2],
  394. newBlock[3],
  395. newBlock[4],
  396. newBlock[5],
  397. newBlock[6],
  398. newBlock[7]};
  399. loclass_doMAC_N(data, sizeof(data), div_key, mac);
  400. FURI_LOG_D(
  401. TAG,
  402. "loclass_doMAC_N %d %02x%02x%02x%02x%02x%02x%02x%02x %02x%02x%02x%02x",
  403. blockNo,
  404. data[1],
  405. data[2],
  406. data[3],
  407. data[4],
  408. data[5],
  409. data[6],
  410. data[7],
  411. data[8],
  412. mac[0],
  413. mac[1],
  414. mac[2],
  415. mac[3]);
  416. err = rfalPicoPassPollerWriteBlock(data[0], data + 1, mac);
  417. if(err != ERR_NONE) {
  418. FURI_LOG_E(TAG, "rfalPicoPassPollerWriteBlock error %d", err);
  419. return err;
  420. }
  421. return ERR_NONE;
  422. }
  423. int32_t picopass_worker_task(void* context) {
  424. PicopassWorker* picopass_worker = context;
  425. picopass_worker_enable_field();
  426. if(picopass_worker->state == PicopassWorkerStateDetect) {
  427. picopass_worker_detect(picopass_worker);
  428. } else if(picopass_worker->state == PicopassWorkerStateWrite) {
  429. picopass_worker_write(picopass_worker);
  430. } else if(picopass_worker->state == PicopassWorkerStateWriteStandardKey) {
  431. picopass_worker_write_standard_key(picopass_worker);
  432. }
  433. picopass_worker_disable_field(ERR_NONE);
  434. picopass_worker_change_state(picopass_worker, PicopassWorkerStateReady);
  435. return 0;
  436. }
  437. void picopass_worker_detect(PicopassWorker* picopass_worker) {
  438. picopass_device_data_clear(picopass_worker->dev_data);
  439. PicopassDeviceData* dev_data = picopass_worker->dev_data;
  440. PicopassBlock* AA1 = dev_data->AA1;
  441. PicopassPacs* pacs = &dev_data->pacs;
  442. ReturnCode err;
  443. // reset device data
  444. for(size_t i = 0; i < PICOPASS_MAX_APP_LIMIT; i++) {
  445. memset(AA1[i].data, 0, sizeof(AA1[i].data));
  446. }
  447. memset(pacs, 0, sizeof(PicopassPacs));
  448. PicopassWorkerEvent nextState = PicopassWorkerEventSuccess;
  449. while(picopass_worker->state == PicopassWorkerStateDetect) {
  450. if(picopass_detect_card(1000) == ERR_NONE) {
  451. // Process first found device
  452. err = picopass_read_preauth(AA1);
  453. if(err != ERR_NONE) {
  454. FURI_LOG_E(TAG, "picopass_read_preauth error %d", err);
  455. nextState = PicopassWorkerEventFail;
  456. }
  457. // Thank you proxmark!
  458. pacs->legacy = picopass_is_memset(AA1[5].data, 0xFF, 8);
  459. pacs->se_enabled = (memcmp(AA1[5].data, "\xff\xff\xff\x00\x06\xff\xff\xff", 8) == 0);
  460. if(pacs->se_enabled) {
  461. FURI_LOG_D(TAG, "SE enabled");
  462. nextState = PicopassWorkerEventFail;
  463. }
  464. if(nextState == PicopassWorkerEventSuccess) {
  465. err = picopass_auth(AA1, pacs);
  466. if(err != ERR_NONE) {
  467. FURI_LOG_E(TAG, "picopass_try_auth error %d", err);
  468. nextState = PicopassWorkerEventFail;
  469. }
  470. }
  471. if(nextState == PicopassWorkerEventSuccess) {
  472. err = picopass_read_card(AA1);
  473. if(err != ERR_NONE) {
  474. FURI_LOG_E(TAG, "picopass_read_card error %d", err);
  475. nextState = PicopassWorkerEventFail;
  476. }
  477. }
  478. if(nextState == PicopassWorkerEventSuccess) {
  479. err = picopass_device_parse_credential(AA1, pacs);
  480. if(err != ERR_NONE) {
  481. FURI_LOG_E(TAG, "picopass_device_parse_credential error %d", err);
  482. nextState = PicopassWorkerEventFail;
  483. }
  484. }
  485. if(nextState == PicopassWorkerEventSuccess) {
  486. err = picopass_device_parse_wiegand(pacs->credential, &pacs->record);
  487. if(err != ERR_NONE) {
  488. FURI_LOG_E(TAG, "picopass_device_parse_wiegand error %d", err);
  489. nextState = PicopassWorkerEventFail;
  490. }
  491. }
  492. // Notify caller and exit
  493. if(picopass_worker->callback) {
  494. picopass_worker->callback(nextState, picopass_worker->context);
  495. }
  496. break;
  497. }
  498. furi_delay_ms(100);
  499. }
  500. }
  501. void picopass_worker_write(PicopassWorker* picopass_worker) {
  502. PicopassDeviceData* dev_data = picopass_worker->dev_data;
  503. PicopassBlock* AA1 = dev_data->AA1;
  504. ReturnCode err;
  505. PicopassWorkerEvent nextState = PicopassWorkerEventSuccess;
  506. while(picopass_worker->state == PicopassWorkerStateWrite) {
  507. if(picopass_detect_card(1000) == ERR_NONE) {
  508. err = picopass_write_card(AA1);
  509. if(err != ERR_NONE) {
  510. FURI_LOG_E(TAG, "picopass_write_card error %d", err);
  511. nextState = PicopassWorkerEventFail;
  512. }
  513. // Notify caller and exit
  514. if(picopass_worker->callback) {
  515. picopass_worker->callback(nextState, picopass_worker->context);
  516. }
  517. break;
  518. }
  519. furi_delay_ms(100);
  520. }
  521. }
  522. void picopass_worker_write_standard_key(PicopassWorker* picopass_worker) {
  523. PicopassDeviceData* dev_data = picopass_worker->dev_data;
  524. PicopassBlock* AA1 = dev_data->AA1;
  525. PicopassPacs* pacs = &dev_data->pacs;
  526. ReturnCode err;
  527. PicopassWorkerEvent nextState = PicopassWorkerEventSuccess;
  528. uint8_t* csn = AA1[PICOPASS_CSN_BLOCK_INDEX].data;
  529. uint8_t* configBlock = AA1[PICOPASS_CONFIG_BLOCK_INDEX].data;
  530. uint8_t fuses = configBlock[7];
  531. uint8_t* oldKey = AA1[PICOPASS_KD_BLOCK_INDEX].data;
  532. uint8_t newKey[PICOPASS_BLOCK_LEN] = {0};
  533. loclass_diversifyKey(csn, picopass_iclass_key, newKey);
  534. if((fuses & 0x80) == 0x80) {
  535. FURI_LOG_D(TAG, "Plain write for personalized mode key change");
  536. } else {
  537. FURI_LOG_D(TAG, "XOR write for application mode key change");
  538. // XOR when in application mode
  539. for(size_t i = 0; i < PICOPASS_BLOCK_LEN; i++) {
  540. newKey[i] ^= oldKey[i];
  541. }
  542. }
  543. while(picopass_worker->state == PicopassWorkerStateWriteStandardKey) {
  544. if(picopass_detect_card(1000) == ERR_NONE) {
  545. err = picopass_write_block(pacs, PICOPASS_KD_BLOCK_INDEX, newKey);
  546. if(err != ERR_NONE) {
  547. FURI_LOG_E(TAG, "picopass_write_block error %d", err);
  548. nextState = PicopassWorkerEventFail;
  549. }
  550. // Notify caller and exit
  551. if(picopass_worker->callback) {
  552. picopass_worker->callback(nextState, picopass_worker->context);
  553. }
  554. break;
  555. }
  556. furi_delay_ms(100);
  557. }
  558. }