picopass.c 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397
  1. #include "picopass.h"
  2. #include <furi.h>
  3. #include <gui/gui.h>
  4. #include <input/input.h>
  5. #include <stdlib.h>
  6. #include <st25r3916.h>
  7. #include <rfal_analogConfig.h>
  8. #include <rfal_rf.h>
  9. #include <rfal_nfc.h>
  10. #include <storage/storage.h>
  11. #include <lib/toolbox/path.h>
  12. #define TAG "PicoPass"
  13. typedef enum {
  14. EventTypeTick,
  15. EventTypeKey,
  16. } EventType;
  17. typedef struct {
  18. EventType type;
  19. InputEvent input;
  20. } PluginEvent;
  21. typedef struct {
  22. bool valid;
  23. uint8_t bitLength;
  24. uint8_t FacilityCode;
  25. uint16_t CardNumber;
  26. } WiegandRecord;
  27. typedef struct {
  28. bool biometrics;
  29. uint8_t encryption;
  30. uint8_t credential[8];
  31. uint8_t pin0[8];
  32. uint8_t pin1[8];
  33. WiegandRecord record;
  34. } PACS;
  35. enum State { INIT, READY, RESULT };
  36. typedef struct {
  37. enum State state;
  38. PACS pacs;
  39. } PluginState;
  40. uint8_t iclass_key[8] = {0xaf, 0xa7, 0x85, 0xa7, 0xda, 0xb3, 0x33, 0x78};
  41. uint8_t iclass_decryptionkey[16] =
  42. {0xb4, 0x21, 0x2c, 0xca, 0xb7, 0xed, 0x21, 0x0f, 0x7b, 0x93, 0xd4, 0x59, 0x39, 0xc7, 0xdd, 0x36};
  43. ApplicationArea AA1;
  44. static void render_callback(Canvas* const canvas, void* ctx) {
  45. const PluginState* plugin_state = acquire_mutex((ValueMutex*)ctx, 25);
  46. if(plugin_state == NULL) {
  47. return;
  48. }
  49. // border around the edge of the screen
  50. canvas_draw_frame(canvas, 0, 0, 128, 64);
  51. canvas_set_font(canvas, FontPrimary);
  52. if(plugin_state->state == INIT) {
  53. canvas_draw_str_aligned(canvas, 64, 32, AlignCenter, AlignTop, "Loading...");
  54. } else if(plugin_state->state == READY) {
  55. canvas_draw_str_aligned(canvas, 64, 32, AlignCenter, AlignTop, "Push center to scan");
  56. } else if(plugin_state->state == RESULT) {
  57. char raw_credential[25] = {0};
  58. sprintf(
  59. raw_credential,
  60. "%02x %02x %02x %02x %02x %02x %02x %02x",
  61. plugin_state->pacs.credential[0],
  62. plugin_state->pacs.credential[1],
  63. plugin_state->pacs.credential[2],
  64. plugin_state->pacs.credential[3],
  65. plugin_state->pacs.credential[4],
  66. plugin_state->pacs.credential[5],
  67. plugin_state->pacs.credential[6],
  68. plugin_state->pacs.credential[7]);
  69. canvas_draw_str_aligned(canvas, 64, 34, AlignCenter, AlignTop, raw_credential);
  70. if(plugin_state->pacs.record.valid) {
  71. char parsed[20] = {0};
  72. sprintf(
  73. parsed,
  74. "FC: %03u CN: %05u",
  75. plugin_state->pacs.record.FacilityCode,
  76. plugin_state->pacs.record.CardNumber);
  77. canvas_draw_str_aligned(canvas, 64, 32, AlignCenter, AlignBottom, parsed);
  78. }
  79. }
  80. release_mutex((ValueMutex*)ctx, plugin_state);
  81. }
  82. static void input_callback(InputEvent* input_event, osMessageQueueId_t event_queue) {
  83. furi_assert(event_queue);
  84. PluginEvent event = {.type = EventTypeKey, .input = *input_event};
  85. osMessageQueuePut(event_queue, &event, 0, osWaitForever);
  86. }
  87. static void picopass_state_init(PluginState* const plugin_state) {
  88. plugin_state->state = READY;
  89. }
  90. ReturnCode decrypt(uint8_t* enc_data, uint8_t* dec_data) {
  91. uint8_t key[32] = {0};
  92. memcpy(key, iclass_decryptionkey, sizeof(iclass_decryptionkey));
  93. mbedtls_des3_context ctx;
  94. mbedtls_des3_init(&ctx);
  95. mbedtls_des3_set2key_dec(&ctx, key);
  96. mbedtls_des3_crypt_ecb(&ctx, enc_data, dec_data);
  97. mbedtls_des3_free(&ctx);
  98. return ERR_NONE;
  99. }
  100. ReturnCode parseWiegand(uint8_t* data, WiegandRecord* record) {
  101. uint32_t* halves = (uint32_t*)data;
  102. if(halves[0] == 0) {
  103. uint8_t leading0s = __builtin_clz(REVERSE_BYTES_U32(halves[1]));
  104. record->bitLength = 31 - leading0s;
  105. } else {
  106. uint8_t leading0s = __builtin_clz(REVERSE_BYTES_U32(halves[0]));
  107. record->bitLength = 63 - leading0s;
  108. }
  109. FURI_LOG_D(TAG, "bitLength: %d", record->bitLength);
  110. if(record->bitLength == 26) {
  111. uint8_t* v4 = data + 4;
  112. v4[0] = 0;
  113. uint32_t bot = v4[3] | (v4[2] << 8) | (v4[1] << 16) | (v4[0] << 24);
  114. record->CardNumber = (bot >> 1) & 0xFFFF;
  115. record->FacilityCode = (bot >> 17) & 0xFF;
  116. record->valid = true;
  117. } else {
  118. record->CardNumber = 0;
  119. record->FacilityCode = 0;
  120. record->valid = false;
  121. }
  122. return ERR_NONE;
  123. }
  124. ReturnCode disable_field(ReturnCode rc) {
  125. st25r3916TxRxOff();
  126. rfalLowPowerModeStart();
  127. return rc;
  128. }
  129. ReturnCode picopass_read_card(ApplicationArea* AA1) {
  130. rfalPicoPassIdentifyRes idRes;
  131. rfalPicoPassSelectRes selRes;
  132. rfalPicoPassReadCheckRes rcRes;
  133. rfalPicoPassCheckRes chkRes;
  134. ReturnCode err;
  135. uint8_t div_key[8] = {0};
  136. uint8_t mac[4] = {0};
  137. uint8_t ccnr[12] = {0};
  138. st25r3916TxRxOn();
  139. rfalLowPowerModeStop();
  140. rfalWorker();
  141. err = rfalPicoPassPollerInitialize();
  142. if(err != ERR_NONE) {
  143. FURI_LOG_E(TAG, "rfalPicoPassPollerInitialize error %d\n", err);
  144. return disable_field(err);
  145. }
  146. err = rfalFieldOnAndStartGT();
  147. if(err != ERR_NONE) {
  148. FURI_LOG_E(TAG, "rfalFieldOnAndStartGT error %d\n", err);
  149. return disable_field(err);
  150. }
  151. err = rfalPicoPassPollerCheckPresence();
  152. if(err != ERR_RF_COLLISION) {
  153. FURI_LOG_E(TAG, "rfalPicoPassPollerCheckPresence error %d\n", err);
  154. return disable_field(err);
  155. }
  156. err = rfalPicoPassPollerIdentify(&idRes);
  157. if(err != ERR_NONE) {
  158. FURI_LOG_E(TAG, "rfalPicoPassPollerIdentify error %d\n", err);
  159. return disable_field(err);
  160. }
  161. err = rfalPicoPassPollerSelect(idRes.CSN, &selRes);
  162. if(err != ERR_NONE) {
  163. FURI_LOG_E(TAG, "rfalPicoPassPollerSelect error %d\n", err);
  164. return disable_field(err);
  165. }
  166. err = rfalPicoPassPollerReadCheck(&rcRes);
  167. if(err != ERR_NONE) {
  168. FURI_LOG_E(TAG, "rfalPicoPassPollerReadCheck error %d", err);
  169. return disable_field(err);
  170. }
  171. memcpy(ccnr, rcRes.CCNR, sizeof(rcRes.CCNR)); // last 4 bytes left 0
  172. diversifyKey(selRes.CSN, iclass_key, div_key);
  173. opt_doReaderMAC(ccnr, div_key, mac);
  174. err = rfalPicoPassPollerCheck(mac, &chkRes);
  175. if(err != ERR_NONE) {
  176. FURI_LOG_E(TAG, "rfalPicoPassPollerCheck error %d", err);
  177. return disable_field(err);
  178. }
  179. for(size_t i = 0; i < 4; i++) {
  180. FURI_LOG_D(TAG, "rfalPicoPassPollerReadBlock block %d", i + 6);
  181. err = rfalPicoPassPollerReadBlock(i + 6, &(AA1->block[i]));
  182. if(err != ERR_NONE) {
  183. FURI_LOG_E(TAG, "rfalPicoPassPollerReadBlock error %d", err);
  184. return disable_field(err);
  185. }
  186. }
  187. return disable_field(ERR_NONE);
  188. }
  189. int32_t picopass_app(void* p) {
  190. UNUSED(p);
  191. osMessageQueueId_t event_queue = osMessageQueueNew(8, sizeof(PluginEvent), NULL);
  192. PluginState* plugin_state = malloc(sizeof(PluginState));
  193. picopass_state_init(plugin_state);
  194. ValueMutex state_mutex;
  195. if(!init_mutex(&state_mutex, plugin_state, sizeof(PluginState))) {
  196. FURI_LOG_E("Hello_world", "cannot create mutex\r\n");
  197. free(plugin_state);
  198. return 255;
  199. }
  200. // Set system callbacks
  201. ViewPort* view_port = view_port_alloc();
  202. view_port_draw_callback_set(view_port, render_callback, &state_mutex);
  203. view_port_input_callback_set(view_port, input_callback, event_queue);
  204. // Open GUI and register view_port
  205. Gui* gui = furi_record_open("gui");
  206. gui_add_view_port(gui, view_port, GuiLayerFullscreen);
  207. PluginEvent event;
  208. ReturnCode err;
  209. for(bool processing = true; processing;) {
  210. osStatus_t event_status = osMessageQueueGet(event_queue, &event, NULL, 100);
  211. PluginState* plugin_state = (PluginState*)acquire_mutex_block(&state_mutex);
  212. if(event_status == osOK) {
  213. // press events
  214. if(event.type == EventTypeKey) {
  215. if(event.input.type == InputTypePress) {
  216. switch(event.input.key) {
  217. case InputKeyUp:
  218. FURI_LOG_D(TAG, "Input Up");
  219. break;
  220. case InputKeyDown:
  221. FURI_LOG_D(TAG, "Input Down");
  222. break;
  223. case InputKeyRight:
  224. FURI_LOG_D(TAG, "Input Right");
  225. break;
  226. case InputKeyLeft:
  227. FURI_LOG_D(TAG, "Input Left");
  228. break;
  229. case InputKeyOk:
  230. FURI_LOG_D(TAG, "Input OK");
  231. err = picopass_read_card(&AA1);
  232. if(err != ERR_NONE) {
  233. FURI_LOG_E(TAG, "picopass_read_card error %d", err);
  234. plugin_state->state = READY;
  235. break;
  236. }
  237. FURI_LOG_D(TAG, "read OK");
  238. plugin_state->pacs.biometrics = AA1.block[0].data[4];
  239. plugin_state->pacs.encryption = AA1.block[0].data[7];
  240. if(plugin_state->pacs.encryption == 0x17) {
  241. FURI_LOG_D(TAG, "3DES Encrypted");
  242. err = decrypt(AA1.block[1].data, plugin_state->pacs.credential);
  243. if(err != ERR_NONE) {
  244. FURI_LOG_E(TAG, "decrypt error %d", err);
  245. break;
  246. }
  247. FURI_LOG_D(TAG, "Decrypted 7");
  248. err = decrypt(AA1.block[2].data, plugin_state->pacs.pin0);
  249. if(err != ERR_NONE) {
  250. FURI_LOG_E(TAG, "decrypt error %d", err);
  251. break;
  252. }
  253. FURI_LOG_D(TAG, "Decrypted 8");
  254. err = decrypt(AA1.block[3].data, plugin_state->pacs.pin1);
  255. if(err != ERR_NONE) {
  256. FURI_LOG_E(TAG, "decrypt error %d", err);
  257. break;
  258. }
  259. FURI_LOG_D(TAG, "Decrypted 9");
  260. } else if(plugin_state->pacs.encryption == 0x14) {
  261. FURI_LOG_D(TAG, "No Encryption");
  262. memcpy(
  263. plugin_state->pacs.credential,
  264. AA1.block[1].data,
  265. RFAL_PICOPASS_MAX_BLOCK_LEN);
  266. memcpy(
  267. plugin_state->pacs.pin0,
  268. AA1.block[2].data,
  269. RFAL_PICOPASS_MAX_BLOCK_LEN);
  270. memcpy(
  271. plugin_state->pacs.pin1,
  272. AA1.block[3].data,
  273. RFAL_PICOPASS_MAX_BLOCK_LEN);
  274. } else if(plugin_state->pacs.encryption == 0x15) {
  275. FURI_LOG_D(TAG, "DES Encrypted");
  276. } else {
  277. FURI_LOG_D(TAG, "Unknown encryption");
  278. break;
  279. }
  280. FURI_LOG_D(
  281. TAG,
  282. "credential %02x%02x%02x%02x%02x%02x%02x%02x",
  283. plugin_state->pacs.credential[0],
  284. plugin_state->pacs.credential[1],
  285. plugin_state->pacs.credential[2],
  286. plugin_state->pacs.credential[3],
  287. plugin_state->pacs.credential[4],
  288. plugin_state->pacs.credential[5],
  289. plugin_state->pacs.credential[6],
  290. plugin_state->pacs.credential[7]);
  291. FURI_LOG_D(
  292. TAG,
  293. "pin0 %02x%02x%02x%02x%02x%02x%02x%02x",
  294. plugin_state->pacs.pin0[0],
  295. plugin_state->pacs.pin0[1],
  296. plugin_state->pacs.pin0[2],
  297. plugin_state->pacs.pin0[3],
  298. plugin_state->pacs.pin0[4],
  299. plugin_state->pacs.pin0[5],
  300. plugin_state->pacs.pin0[6],
  301. plugin_state->pacs.pin0[7]);
  302. FURI_LOG_D(
  303. TAG,
  304. "pin1 %02x%02x%02x%02x%02x%02x%02x%02x",
  305. plugin_state->pacs.pin1[0],
  306. plugin_state->pacs.pin1[1],
  307. plugin_state->pacs.pin1[2],
  308. plugin_state->pacs.pin1[3],
  309. plugin_state->pacs.pin1[4],
  310. plugin_state->pacs.pin1[5],
  311. plugin_state->pacs.pin1[6],
  312. plugin_state->pacs.pin1[7]);
  313. err = parseWiegand(
  314. plugin_state->pacs.credential, &plugin_state->pacs.record);
  315. if(err != ERR_NONE) {
  316. FURI_LOG_E(TAG, "parse error %d", err);
  317. break;
  318. }
  319. if(plugin_state->pacs.record.valid) {
  320. FURI_LOG_D(
  321. TAG,
  322. "FC: %03d CN: %05d",
  323. plugin_state->pacs.record.FacilityCode,
  324. plugin_state->pacs.record.CardNumber);
  325. }
  326. plugin_state->state = RESULT;
  327. break;
  328. case InputKeyBack:
  329. FURI_LOG_D(TAG, "Input Back");
  330. processing = false;
  331. break;
  332. }
  333. }
  334. }
  335. } else {
  336. // FURI_LOG_D(TAG, "osMessageQueue: event timeout");
  337. // event timeout
  338. }
  339. view_port_update(view_port);
  340. release_mutex(&state_mutex, plugin_state);
  341. }
  342. view_port_enabled_set(view_port, false);
  343. gui_remove_view_port(gui, view_port);
  344. furi_record_close("gui");
  345. view_port_free(view_port);
  346. osMessageQueueDelete(event_queue);
  347. return 0;
  348. }