752 lines
		
	
	
		
			24 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			752 lines
		
	
	
		
			24 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
| #include "picopass_worker_i.h"
 | |
| 
 | |
| #include <flipper_format/flipper_format.h>
 | |
| 
 | |
| #define TAG "PicopassWorker"
 | |
| 
 | |
| static void picopass_worker_enable_field() {
 | |
|     furi_hal_nfc_ll_txrx_on();
 | |
|     furi_hal_nfc_exit_sleep();
 | |
|     furi_hal_nfc_ll_poll();
 | |
| }
 | |
| 
 | |
| static ReturnCode picopass_worker_disable_field(ReturnCode rc) {
 | |
|     furi_hal_nfc_ll_txrx_off();
 | |
|     furi_hal_nfc_start_sleep();
 | |
|     return rc;
 | |
| }
 | |
| 
 | |
| /***************************** Picopass Worker API *******************************/
 | |
| 
 | |
| PicopassWorker* picopass_worker_alloc() {
 | |
|     PicopassWorker* picopass_worker = malloc(sizeof(PicopassWorker));
 | |
| 
 | |
|     // Worker thread attributes
 | |
|     picopass_worker->thread =
 | |
|         furi_thread_alloc_ex("PicopassWorker", 8 * 1024, picopass_worker_task, picopass_worker);
 | |
| 
 | |
|     picopass_worker->callback = NULL;
 | |
|     picopass_worker->context = NULL;
 | |
|     picopass_worker->storage = furi_record_open(RECORD_STORAGE);
 | |
| 
 | |
|     picopass_worker_change_state(picopass_worker, PicopassWorkerStateReady);
 | |
| 
 | |
|     return picopass_worker;
 | |
| }
 | |
| 
 | |
| void picopass_worker_free(PicopassWorker* picopass_worker) {
 | |
|     furi_assert(picopass_worker);
 | |
| 
 | |
|     furi_thread_free(picopass_worker->thread);
 | |
| 
 | |
|     furi_record_close(RECORD_STORAGE);
 | |
| 
 | |
|     free(picopass_worker);
 | |
| }
 | |
| 
 | |
| PicopassWorkerState picopass_worker_get_state(PicopassWorker* picopass_worker) {
 | |
|     return picopass_worker->state;
 | |
| }
 | |
| 
 | |
| void picopass_worker_start(
 | |
|     PicopassWorker* picopass_worker,
 | |
|     PicopassWorkerState state,
 | |
|     PicopassDeviceData* dev_data,
 | |
|     PicopassWorkerCallback callback,
 | |
|     void* context) {
 | |
|     furi_assert(picopass_worker);
 | |
|     furi_assert(dev_data);
 | |
| 
 | |
|     picopass_worker->callback = callback;
 | |
|     picopass_worker->context = context;
 | |
|     picopass_worker->dev_data = dev_data;
 | |
|     picopass_worker_change_state(picopass_worker, state);
 | |
|     furi_thread_start(picopass_worker->thread);
 | |
| }
 | |
| 
 | |
| void picopass_worker_stop(PicopassWorker* picopass_worker) {
 | |
|     furi_assert(picopass_worker);
 | |
|     furi_assert(picopass_worker->thread);
 | |
| 
 | |
|     if(furi_thread_get_state(picopass_worker->thread) != FuriThreadStateStopped) {
 | |
|         picopass_worker_change_state(picopass_worker, PicopassWorkerStateStop);
 | |
|         furi_thread_join(picopass_worker->thread);
 | |
|     }
 | |
| }
 | |
| 
 | |
| void picopass_worker_change_state(PicopassWorker* picopass_worker, PicopassWorkerState state) {
 | |
|     picopass_worker->state = state;
 | |
| }
 | |
| 
 | |
| /***************************** Picopass Worker Thread *******************************/
 | |
| 
 | |
| ReturnCode picopass_detect_card(int timeout) {
 | |
|     UNUSED(timeout);
 | |
| 
 | |
|     ReturnCode err;
 | |
| 
 | |
|     err = rfalPicoPassPollerInitialize();
 | |
|     if(err != ERR_NONE) {
 | |
|         FURI_LOG_E(TAG, "rfalPicoPassPollerInitialize error %d", err);
 | |
|         return err;
 | |
|     }
 | |
| 
 | |
|     err = rfalFieldOnAndStartGT();
 | |
|     if(err != ERR_NONE) {
 | |
|         FURI_LOG_E(TAG, "rfalFieldOnAndStartGT error %d", err);
 | |
|         return err;
 | |
|     }
 | |
| 
 | |
|     err = rfalPicoPassPollerCheckPresence();
 | |
|     if(err != ERR_RF_COLLISION) {
 | |
|         FURI_LOG_E(TAG, "rfalPicoPassPollerCheckPresence error %d", err);
 | |
|         return err;
 | |
|     }
 | |
| 
 | |
|     return ERR_NONE;
 | |
| }
 | |
| 
 | |
| ReturnCode picopass_read_preauth(PicopassBlock* AA1) {
 | |
|     rfalPicoPassIdentifyRes idRes;
 | |
|     rfalPicoPassSelectRes selRes;
 | |
| 
 | |
|     ReturnCode err;
 | |
| 
 | |
|     err = rfalPicoPassPollerIdentify(&idRes);
 | |
|     if(err != ERR_NONE) {
 | |
|         FURI_LOG_E(TAG, "rfalPicoPassPollerIdentify error %d", err);
 | |
|         return err;
 | |
|     }
 | |
| 
 | |
|     err = rfalPicoPassPollerSelect(idRes.CSN, &selRes);
 | |
|     if(err != ERR_NONE) {
 | |
|         FURI_LOG_E(TAG, "rfalPicoPassPollerSelect error %d", err);
 | |
|         return err;
 | |
|     }
 | |
| 
 | |
|     memcpy(AA1[PICOPASS_CSN_BLOCK_INDEX].data, selRes.CSN, sizeof(selRes.CSN));
 | |
|     FURI_LOG_D(
 | |
|         TAG,
 | |
|         "csn %02x%02x%02x%02x%02x%02x%02x%02x",
 | |
|         AA1[PICOPASS_CSN_BLOCK_INDEX].data[0],
 | |
|         AA1[PICOPASS_CSN_BLOCK_INDEX].data[1],
 | |
|         AA1[PICOPASS_CSN_BLOCK_INDEX].data[2],
 | |
|         AA1[PICOPASS_CSN_BLOCK_INDEX].data[3],
 | |
|         AA1[PICOPASS_CSN_BLOCK_INDEX].data[4],
 | |
|         AA1[PICOPASS_CSN_BLOCK_INDEX].data[5],
 | |
|         AA1[PICOPASS_CSN_BLOCK_INDEX].data[6],
 | |
|         AA1[PICOPASS_CSN_BLOCK_INDEX].data[7]);
 | |
| 
 | |
|     rfalPicoPassReadBlockRes cfg = {0};
 | |
|     rfalPicoPassPollerReadBlock(PICOPASS_CONFIG_BLOCK_INDEX, &cfg);
 | |
|     memcpy(AA1[PICOPASS_CONFIG_BLOCK_INDEX].data, cfg.data, sizeof(cfg.data));
 | |
|     FURI_LOG_D(
 | |
|         TAG,
 | |
|         "config %02x%02x%02x%02x%02x%02x%02x%02x",
 | |
|         AA1[PICOPASS_CONFIG_BLOCK_INDEX].data[0],
 | |
|         AA1[PICOPASS_CONFIG_BLOCK_INDEX].data[1],
 | |
|         AA1[PICOPASS_CONFIG_BLOCK_INDEX].data[2],
 | |
|         AA1[PICOPASS_CONFIG_BLOCK_INDEX].data[3],
 | |
|         AA1[PICOPASS_CONFIG_BLOCK_INDEX].data[4],
 | |
|         AA1[PICOPASS_CONFIG_BLOCK_INDEX].data[5],
 | |
|         AA1[PICOPASS_CONFIG_BLOCK_INDEX].data[6],
 | |
|         AA1[PICOPASS_CONFIG_BLOCK_INDEX].data[7]);
 | |
| 
 | |
|     rfalPicoPassReadBlockRes aia;
 | |
|     rfalPicoPassPollerReadBlock(PICOPASS_AIA_BLOCK_INDEX, &aia);
 | |
|     memcpy(AA1[PICOPASS_AIA_BLOCK_INDEX].data, aia.data, sizeof(aia.data));
 | |
|     FURI_LOG_D(
 | |
|         TAG,
 | |
|         "aia %02x%02x%02x%02x%02x%02x%02x%02x",
 | |
|         AA1[PICOPASS_AIA_BLOCK_INDEX].data[0],
 | |
|         AA1[PICOPASS_AIA_BLOCK_INDEX].data[1],
 | |
|         AA1[PICOPASS_AIA_BLOCK_INDEX].data[2],
 | |
|         AA1[PICOPASS_AIA_BLOCK_INDEX].data[3],
 | |
|         AA1[PICOPASS_AIA_BLOCK_INDEX].data[4],
 | |
|         AA1[PICOPASS_AIA_BLOCK_INDEX].data[5],
 | |
|         AA1[PICOPASS_AIA_BLOCK_INDEX].data[6],
 | |
|         AA1[PICOPASS_AIA_BLOCK_INDEX].data[7]);
 | |
| 
 | |
|     return ERR_NONE;
 | |
| }
 | |
| 
 | |
| static ReturnCode
 | |
|     picopass_auth_dict(PicopassWorker* picopass_worker, IclassEliteDictType dict_type) {
 | |
|     rfalPicoPassReadCheckRes rcRes;
 | |
|     rfalPicoPassCheckRes chkRes;
 | |
|     bool elite = (dict_type != IclassStandardDictTypeFlipper);
 | |
| 
 | |
|     PicopassDeviceData* dev_data = picopass_worker->dev_data;
 | |
|     PicopassBlock* AA1 = dev_data->AA1;
 | |
|     PicopassPacs* pacs = &dev_data->pacs;
 | |
| 
 | |
|     uint8_t* csn = AA1[PICOPASS_CSN_BLOCK_INDEX].data;
 | |
|     uint8_t* div_key = AA1[PICOPASS_KD_BLOCK_INDEX].data;
 | |
| 
 | |
|     ReturnCode err = ERR_PARAM;
 | |
| 
 | |
|     uint8_t mac[4] = {0};
 | |
|     uint8_t ccnr[12] = {0};
 | |
| 
 | |
|     size_t index = 0;
 | |
|     uint8_t key[PICOPASS_BLOCK_LEN] = {0};
 | |
| 
 | |
|     if(!iclass_elite_dict_check_presence(dict_type)) {
 | |
|         FURI_LOG_E(TAG, "Dictionary not found");
 | |
|         return ERR_PARAM;
 | |
|     }
 | |
| 
 | |
|     IclassEliteDict* dict = iclass_elite_dict_alloc(dict_type);
 | |
|     if(!dict) {
 | |
|         FURI_LOG_E(TAG, "Dictionary not allocated");
 | |
|         return ERR_PARAM;
 | |
|     }
 | |
| 
 | |
|     FURI_LOG_D(TAG, "Loaded %lu keys", iclass_elite_dict_get_total_keys(dict));
 | |
|     while(iclass_elite_dict_get_next_key(dict, key)) {
 | |
|         FURI_LOG_D(
 | |
|             TAG,
 | |
|             "Try to %s auth with key %zu %02x%02x%02x%02x%02x%02x%02x%02x",
 | |
|             elite ? "elite" : "standard",
 | |
|             index++,
 | |
|             key[0],
 | |
|             key[1],
 | |
|             key[2],
 | |
|             key[3],
 | |
|             key[4],
 | |
|             key[5],
 | |
|             key[6],
 | |
|             key[7]);
 | |
| 
 | |
|         err = rfalPicoPassPollerReadCheck(&rcRes);
 | |
|         if(err != ERR_NONE) {
 | |
|             FURI_LOG_E(TAG, "rfalPicoPassPollerReadCheck error %d", err);
 | |
|             break;
 | |
|         }
 | |
|         memcpy(ccnr, rcRes.CCNR, sizeof(rcRes.CCNR)); // last 4 bytes left 0
 | |
| 
 | |
|         loclass_iclass_calc_div_key(csn, key, div_key, elite);
 | |
|         loclass_opt_doReaderMAC(ccnr, div_key, mac);
 | |
| 
 | |
|         err = rfalPicoPassPollerCheck(mac, &chkRes);
 | |
|         if(err == ERR_NONE) {
 | |
|             memcpy(pacs->key, key, PICOPASS_BLOCK_LEN);
 | |
|             break;
 | |
|         }
 | |
| 
 | |
|         if(picopass_worker->state != PicopassWorkerStateDetect) break;
 | |
|     }
 | |
| 
 | |
|     iclass_elite_dict_free(dict);
 | |
| 
 | |
|     return err;
 | |
| }
 | |
| 
 | |
| ReturnCode picopass_auth(PicopassWorker* picopass_worker) {
 | |
|     ReturnCode err;
 | |
| 
 | |
|     FURI_LOG_I(TAG, "Starting system dictionary attack [Standard KDF]");
 | |
|     err = picopass_auth_dict(picopass_worker, IclassStandardDictTypeFlipper);
 | |
|     if(err == ERR_NONE) {
 | |
|         return ERR_NONE;
 | |
|     }
 | |
| 
 | |
|     FURI_LOG_I(TAG, "Starting user dictionary attack [Elite KDF]");
 | |
|     err = picopass_auth_dict(picopass_worker, IclassEliteDictTypeUser);
 | |
|     if(err == ERR_NONE) {
 | |
|         return ERR_NONE;
 | |
|     }
 | |
| 
 | |
|     FURI_LOG_I(TAG, "Starting system dictionary attack [Elite KDF]");
 | |
|     err = picopass_auth_dict(picopass_worker, IclassEliteDictTypeFlipper);
 | |
|     if(err == ERR_NONE) {
 | |
|         return ERR_NONE;
 | |
|     }
 | |
| 
 | |
|     return err;
 | |
| }
 | |
| 
 | |
| ReturnCode picopass_read_card(PicopassBlock* AA1) {
 | |
|     ReturnCode err;
 | |
| 
 | |
|     size_t app_limit = AA1[PICOPASS_CONFIG_BLOCK_INDEX].data[0] < PICOPASS_MAX_APP_LIMIT ?
 | |
|                            AA1[PICOPASS_CONFIG_BLOCK_INDEX].data[0] :
 | |
|                            PICOPASS_MAX_APP_LIMIT;
 | |
| 
 | |
|     for(size_t i = 2; i < app_limit; i++) {
 | |
|         if(i == PICOPASS_KD_BLOCK_INDEX) {
 | |
|             // Skip over Kd block which is populated earlier (READ of Kd returns all FF's)
 | |
|             continue;
 | |
|         }
 | |
| 
 | |
|         rfalPicoPassReadBlockRes block;
 | |
|         err = rfalPicoPassPollerReadBlock(i, &block);
 | |
|         if(err != ERR_NONE) {
 | |
|             FURI_LOG_E(TAG, "rfalPicoPassPollerReadBlock error %d", err);
 | |
|             return err;
 | |
|         }
 | |
| 
 | |
|         FURI_LOG_D(
 | |
|             TAG,
 | |
|             "rfalPicoPassPollerReadBlock %d %02x%02x%02x%02x%02x%02x%02x%02x",
 | |
|             i,
 | |
|             block.data[0],
 | |
|             block.data[1],
 | |
|             block.data[2],
 | |
|             block.data[3],
 | |
|             block.data[4],
 | |
|             block.data[5],
 | |
|             block.data[6],
 | |
|             block.data[7]);
 | |
| 
 | |
|         memcpy(AA1[i].data, block.data, sizeof(block.data));
 | |
|     }
 | |
| 
 | |
|     return ERR_NONE;
 | |
| }
 | |
| 
 | |
| ReturnCode picopass_write_card(PicopassBlock* AA1) {
 | |
|     rfalPicoPassIdentifyRes idRes;
 | |
|     rfalPicoPassSelectRes selRes;
 | |
|     rfalPicoPassReadCheckRes rcRes;
 | |
|     rfalPicoPassCheckRes chkRes;
 | |
| 
 | |
|     ReturnCode err;
 | |
| 
 | |
|     uint8_t div_key[8] = {0};
 | |
|     uint8_t mac[4] = {0};
 | |
|     uint8_t ccnr[12] = {0};
 | |
| 
 | |
|     err = rfalPicoPassPollerIdentify(&idRes);
 | |
|     if(err != ERR_NONE) {
 | |
|         FURI_LOG_E(TAG, "rfalPicoPassPollerIdentify error %d", err);
 | |
|         return err;
 | |
|     }
 | |
| 
 | |
|     err = rfalPicoPassPollerSelect(idRes.CSN, &selRes);
 | |
|     if(err != ERR_NONE) {
 | |
|         FURI_LOG_E(TAG, "rfalPicoPassPollerSelect error %d", err);
 | |
|         return err;
 | |
|     }
 | |
| 
 | |
|     err = rfalPicoPassPollerReadCheck(&rcRes);
 | |
|     if(err != ERR_NONE) {
 | |
|         FURI_LOG_E(TAG, "rfalPicoPassPollerReadCheck error %d", err);
 | |
|         return err;
 | |
|     }
 | |
|     memcpy(ccnr, rcRes.CCNR, sizeof(rcRes.CCNR)); // last 4 bytes left 0
 | |
| 
 | |
|     loclass_iclass_calc_div_key(selRes.CSN, (uint8_t*)picopass_iclass_key, div_key, false);
 | |
|     loclass_opt_doReaderMAC(ccnr, div_key, mac);
 | |
| 
 | |
|     err = rfalPicoPassPollerCheck(mac, &chkRes);
 | |
|     if(err != ERR_NONE) {
 | |
|         FURI_LOG_E(TAG, "rfalPicoPassPollerCheck error %d", err);
 | |
|         return err;
 | |
|     }
 | |
| 
 | |
|     for(size_t i = 6; i < 10; i++) {
 | |
|         FURI_LOG_D(TAG, "rfalPicoPassPollerWriteBlock %d", i);
 | |
|         uint8_t data[9] = {0};
 | |
|         data[0] = i;
 | |
|         memcpy(data + 1, AA1[i].data, RFAL_PICOPASS_MAX_BLOCK_LEN);
 | |
|         loclass_doMAC_N(data, sizeof(data), div_key, mac);
 | |
|         FURI_LOG_D(
 | |
|             TAG,
 | |
|             "loclass_doMAC_N %d %02x%02x%02x%02x%02x%02x%02x%02x %02x%02x%02x%02x",
 | |
|             i,
 | |
|             data[1],
 | |
|             data[2],
 | |
|             data[3],
 | |
|             data[4],
 | |
|             data[5],
 | |
|             data[6],
 | |
|             data[7],
 | |
|             data[8],
 | |
|             mac[0],
 | |
|             mac[1],
 | |
|             mac[2],
 | |
|             mac[3]);
 | |
| 
 | |
|         err = rfalPicoPassPollerWriteBlock(i, AA1[i].data, mac);
 | |
|         if(err != ERR_NONE) {
 | |
|             FURI_LOG_E(TAG, "rfalPicoPassPollerWriteBlock error %d", err);
 | |
|             return err;
 | |
|         }
 | |
|     }
 | |
| 
 | |
|     return ERR_NONE;
 | |
| }
 | |
| 
 | |
| ReturnCode picopass_write_block(PicopassBlock* AA1, uint8_t blockNo, uint8_t* newBlock) {
 | |
|     rfalPicoPassIdentifyRes idRes;
 | |
|     rfalPicoPassSelectRes selRes;
 | |
|     rfalPicoPassReadCheckRes rcRes;
 | |
|     rfalPicoPassCheckRes chkRes;
 | |
| 
 | |
|     ReturnCode err;
 | |
| 
 | |
|     uint8_t mac[4] = {0};
 | |
|     uint8_t ccnr[12] = {0};
 | |
| 
 | |
|     err = rfalPicoPassPollerIdentify(&idRes);
 | |
|     if(err != ERR_NONE) {
 | |
|         FURI_LOG_E(TAG, "rfalPicoPassPollerIdentify error %d", err);
 | |
|         return err;
 | |
|     }
 | |
| 
 | |
|     err = rfalPicoPassPollerSelect(idRes.CSN, &selRes);
 | |
|     if(err != ERR_NONE) {
 | |
|         FURI_LOG_E(TAG, "rfalPicoPassPollerSelect error %d", err);
 | |
|         return err;
 | |
|     }
 | |
| 
 | |
|     err = rfalPicoPassPollerReadCheck(&rcRes);
 | |
|     if(err != ERR_NONE) {
 | |
|         FURI_LOG_E(TAG, "rfalPicoPassPollerReadCheck error %d", err);
 | |
|         return err;
 | |
|     }
 | |
|     memcpy(ccnr, rcRes.CCNR, sizeof(rcRes.CCNR)); // last 4 bytes left 0
 | |
| 
 | |
|     if(memcmp(selRes.CSN, AA1[PICOPASS_CSN_BLOCK_INDEX].data, PICOPASS_BLOCK_LEN) != 0) {
 | |
|         FURI_LOG_E(TAG, "Wrong CSN for write");
 | |
|         return ERR_REQUEST;
 | |
|     }
 | |
| 
 | |
|     loclass_opt_doReaderMAC(ccnr, AA1[PICOPASS_KD_BLOCK_INDEX].data, mac);
 | |
|     err = rfalPicoPassPollerCheck(mac, &chkRes);
 | |
|     if(err != ERR_NONE) {
 | |
|         FURI_LOG_E(TAG, "rfalPicoPassPollerCheck error %d", err);
 | |
|         return err;
 | |
|     }
 | |
| 
 | |
|     FURI_LOG_D(TAG, "rfalPicoPassPollerWriteBlock %d", blockNo);
 | |
|     uint8_t data[9] = {
 | |
|         blockNo,
 | |
|         newBlock[0],
 | |
|         newBlock[1],
 | |
|         newBlock[2],
 | |
|         newBlock[3],
 | |
|         newBlock[4],
 | |
|         newBlock[5],
 | |
|         newBlock[6],
 | |
|         newBlock[7]};
 | |
|     loclass_doMAC_N(data, sizeof(data), AA1[PICOPASS_KD_BLOCK_INDEX].data, mac);
 | |
|     FURI_LOG_D(
 | |
|         TAG,
 | |
|         "loclass_doMAC_N %d %02x%02x%02x%02x%02x%02x%02x%02x %02x%02x%02x%02x",
 | |
|         blockNo,
 | |
|         data[1],
 | |
|         data[2],
 | |
|         data[3],
 | |
|         data[4],
 | |
|         data[5],
 | |
|         data[6],
 | |
|         data[7],
 | |
|         data[8],
 | |
|         mac[0],
 | |
|         mac[1],
 | |
|         mac[2],
 | |
|         mac[3]);
 | |
| 
 | |
|     err = rfalPicoPassPollerWriteBlock(data[0], data + 1, mac);
 | |
|     if(err != ERR_NONE) {
 | |
|         FURI_LOG_E(TAG, "rfalPicoPassPollerWriteBlock error %d", err);
 | |
|         return err;
 | |
|     }
 | |
| 
 | |
|     return ERR_NONE;
 | |
| }
 | |
| 
 | |
| void picopass_worker_elite_dict_attack(PicopassWorker* picopass_worker) {
 | |
|     furi_assert(picopass_worker);
 | |
|     furi_assert(picopass_worker->callback);
 | |
| 
 | |
|     picopass_device_data_clear(picopass_worker->dev_data);
 | |
|     PicopassDeviceData* dev_data = picopass_worker->dev_data;
 | |
|     PicopassBlock* AA1 = dev_data->AA1;
 | |
|     PicopassPacs* pacs = &dev_data->pacs;
 | |
| 
 | |
|     for(size_t i = 0; i < PICOPASS_MAX_APP_LIMIT; i++) {
 | |
|         memset(AA1[i].data, 0, sizeof(AA1[i].data));
 | |
|     }
 | |
|     memset(pacs, 0, sizeof(PicopassPacs));
 | |
| 
 | |
|     IclassEliteDictAttackData* dict_attack_data =
 | |
|         &picopass_worker->dev_data->iclass_elite_dict_attack_data;
 | |
|     bool elite = (dict_attack_data->type != IclassStandardDictTypeFlipper);
 | |
| 
 | |
|     rfalPicoPassReadCheckRes rcRes;
 | |
|     rfalPicoPassCheckRes chkRes;
 | |
| 
 | |
|     ReturnCode err;
 | |
|     uint8_t mac[4] = {0};
 | |
|     uint8_t ccnr[12] = {0};
 | |
| 
 | |
|     size_t index = 0;
 | |
|     uint8_t key[PICOPASS_BLOCK_LEN] = {0};
 | |
| 
 | |
|     // Load dictionary
 | |
|     IclassEliteDict* dict = dict_attack_data->dict;
 | |
|     if(!dict) {
 | |
|         FURI_LOG_E(TAG, "Dictionary not found");
 | |
|         picopass_worker->callback(PicopassWorkerEventNoDictFound, picopass_worker->context);
 | |
|         return;
 | |
|     }
 | |
| 
 | |
|     do {
 | |
|         if(picopass_detect_card(1000) == ERR_NONE) {
 | |
|             picopass_worker->callback(PicopassWorkerEventCardDetected, picopass_worker->context);
 | |
| 
 | |
|             // Process first found device
 | |
|             err = picopass_read_preauth(AA1);
 | |
|             if(err != ERR_NONE) {
 | |
|                 FURI_LOG_E(TAG, "picopass_read_preauth error %d", err);
 | |
|                 picopass_worker->callback(PicopassWorkerEventAborted, picopass_worker->context);
 | |
|                 return;
 | |
|             }
 | |
| 
 | |
|             // Thank you proxmark!
 | |
|             pacs->legacy = picopass_is_memset(AA1[5].data, 0xFF, 8);
 | |
|             pacs->se_enabled = (memcmp(AA1[5].data, "\xff\xff\xff\x00\x06\xff\xff\xff", 8) == 0);
 | |
|             if(pacs->se_enabled) {
 | |
|                 FURI_LOG_D(TAG, "SE enabled");
 | |
|                 picopass_worker->callback(PicopassWorkerEventAborted, picopass_worker->context);
 | |
|                 return;
 | |
|             }
 | |
| 
 | |
|             break;
 | |
|         } else {
 | |
|             picopass_worker->callback(PicopassWorkerEventNoCardDetected, picopass_worker->context);
 | |
|         }
 | |
|         if(picopass_worker->state != PicopassWorkerStateEliteDictAttack) break;
 | |
| 
 | |
|         furi_delay_ms(100);
 | |
|     } while(true);
 | |
| 
 | |
|     FURI_LOG_D(
 | |
|         TAG, "Start Dictionary attack, Key Count %lu", iclass_elite_dict_get_total_keys(dict));
 | |
|     while(iclass_elite_dict_get_next_key(dict, key)) {
 | |
|         FURI_LOG_T(TAG, "Key %zu", index);
 | |
|         if(++index % PICOPASS_DICT_KEY_BATCH_SIZE == 0) {
 | |
|             picopass_worker->callback(
 | |
|                 PicopassWorkerEventNewDictKeyBatch, picopass_worker->context);
 | |
|         }
 | |
| 
 | |
|         err = rfalPicoPassPollerReadCheck(&rcRes);
 | |
|         if(err != ERR_NONE) {
 | |
|             FURI_LOG_E(TAG, "rfalPicoPassPollerReadCheck error %d", err);
 | |
|             break;
 | |
|         }
 | |
|         memcpy(ccnr, rcRes.CCNR, sizeof(rcRes.CCNR)); // last 4 bytes left 0
 | |
| 
 | |
|         uint8_t* csn = AA1[PICOPASS_CSN_BLOCK_INDEX].data;
 | |
|         uint8_t* div_key = AA1[PICOPASS_KD_BLOCK_INDEX].data;
 | |
| 
 | |
|         loclass_iclass_calc_div_key(csn, key, div_key, elite);
 | |
|         loclass_opt_doReaderMAC(ccnr, div_key, mac);
 | |
| 
 | |
|         err = rfalPicoPassPollerCheck(mac, &chkRes);
 | |
|         if(err == ERR_NONE) {
 | |
|             FURI_LOG_I(TAG, "Found key");
 | |
|             memcpy(pacs->key, key, PICOPASS_BLOCK_LEN);
 | |
|             err = picopass_read_card(AA1);
 | |
|             if(err != ERR_NONE) {
 | |
|                 FURI_LOG_E(TAG, "picopass_read_card error %d", err);
 | |
|                 picopass_worker->callback(PicopassWorkerEventFail, picopass_worker->context);
 | |
|                 break;
 | |
|             }
 | |
| 
 | |
|             err = picopass_device_parse_credential(AA1, pacs);
 | |
|             if(err != ERR_NONE) {
 | |
|                 FURI_LOG_E(TAG, "picopass_device_parse_credential error %d", err);
 | |
|                 picopass_worker->callback(PicopassWorkerEventFail, picopass_worker->context);
 | |
|                 break;
 | |
|             }
 | |
| 
 | |
|             err = picopass_device_parse_wiegand(pacs->credential, &pacs->record);
 | |
|             if(err != ERR_NONE) {
 | |
|                 FURI_LOG_E(TAG, "picopass_device_parse_wiegand error %d", err);
 | |
|                 picopass_worker->callback(PicopassWorkerEventFail, picopass_worker->context);
 | |
|                 break;
 | |
|             }
 | |
|             picopass_worker->callback(PicopassWorkerEventAborted, picopass_worker->context);
 | |
|             break;
 | |
|         }
 | |
| 
 | |
|         if(picopass_worker->state != PicopassWorkerStateEliteDictAttack) break;
 | |
|     }
 | |
|     FURI_LOG_D(TAG, "Dictionary complete");
 | |
|     if(picopass_worker->state == PicopassWorkerStateEliteDictAttack) {
 | |
|         picopass_worker->callback(PicopassWorkerEventSuccess, picopass_worker->context);
 | |
|     } else {
 | |
|         picopass_worker->callback(PicopassWorkerEventAborted, picopass_worker->context);
 | |
|     }
 | |
| }
 | |
| 
 | |
| int32_t picopass_worker_task(void* context) {
 | |
|     PicopassWorker* picopass_worker = context;
 | |
| 
 | |
|     picopass_worker_enable_field();
 | |
|     if(picopass_worker->state == PicopassWorkerStateDetect) {
 | |
|         picopass_worker_detect(picopass_worker);
 | |
|     } else if(picopass_worker->state == PicopassWorkerStateWrite) {
 | |
|         picopass_worker_write(picopass_worker);
 | |
|     } else if(picopass_worker->state == PicopassWorkerStateWriteKey) {
 | |
|         picopass_worker_write_key(picopass_worker);
 | |
|     } else if(picopass_worker->state == PicopassWorkerStateEliteDictAttack) {
 | |
|         picopass_worker_elite_dict_attack(picopass_worker);
 | |
|     } else if(picopass_worker->state == PicopassWorkerStateStop) {
 | |
|         FURI_LOG_D(TAG, "Worker state stop");
 | |
|         // no-op
 | |
|     } else {
 | |
|         FURI_LOG_W(TAG, "Unknown state %d", picopass_worker->state);
 | |
|     }
 | |
|     picopass_worker_disable_field(ERR_NONE);
 | |
|     picopass_worker_change_state(picopass_worker, PicopassWorkerStateReady);
 | |
| 
 | |
|     return 0;
 | |
| }
 | |
| 
 | |
| void picopass_worker_detect(PicopassWorker* picopass_worker) {
 | |
|     picopass_device_data_clear(picopass_worker->dev_data);
 | |
|     PicopassDeviceData* dev_data = picopass_worker->dev_data;
 | |
| 
 | |
|     PicopassBlock* AA1 = dev_data->AA1;
 | |
|     PicopassPacs* pacs = &dev_data->pacs;
 | |
|     ReturnCode err;
 | |
| 
 | |
|     // reset device data
 | |
|     for(size_t i = 0; i < PICOPASS_MAX_APP_LIMIT; i++) {
 | |
|         memset(AA1[i].data, 0, sizeof(AA1[i].data));
 | |
|     }
 | |
|     memset(pacs, 0, sizeof(PicopassPacs));
 | |
| 
 | |
|     PicopassWorkerEvent nextState = PicopassWorkerEventSuccess;
 | |
| 
 | |
|     while(picopass_worker->state == PicopassWorkerStateDetect) {
 | |
|         if(picopass_detect_card(1000) == ERR_NONE) {
 | |
|             // Process first found device
 | |
|             err = picopass_read_preauth(AA1);
 | |
|             if(err != ERR_NONE) {
 | |
|                 FURI_LOG_E(TAG, "picopass_read_preauth error %d", err);
 | |
|                 nextState = PicopassWorkerEventFail;
 | |
|             }
 | |
| 
 | |
|             // Thank you proxmark!
 | |
|             pacs->legacy = picopass_is_memset(AA1[5].data, 0xFF, 8);
 | |
|             pacs->se_enabled = (memcmp(AA1[5].data, "\xff\xff\xff\x00\x06\xff\xff\xff", 8) == 0);
 | |
|             if(pacs->se_enabled) {
 | |
|                 FURI_LOG_D(TAG, "SE enabled");
 | |
|                 nextState = PicopassWorkerEventFail;
 | |
|             }
 | |
| 
 | |
|             if(nextState == PicopassWorkerEventSuccess) {
 | |
|                 err = picopass_auth(picopass_worker);
 | |
|                 if(err != ERR_NONE) {
 | |
|                     FURI_LOG_E(TAG, "picopass_try_auth error %d", err);
 | |
|                     nextState = PicopassWorkerEventFail;
 | |
|                 }
 | |
|             }
 | |
| 
 | |
|             if(nextState == PicopassWorkerEventSuccess) {
 | |
|                 err = picopass_read_card(AA1);
 | |
|                 if(err != ERR_NONE) {
 | |
|                     FURI_LOG_E(TAG, "picopass_read_card error %d", err);
 | |
|                     nextState = PicopassWorkerEventFail;
 | |
|                 }
 | |
|             }
 | |
| 
 | |
|             if(nextState == PicopassWorkerEventSuccess) {
 | |
|                 err = picopass_device_parse_credential(AA1, pacs);
 | |
|                 if(err != ERR_NONE) {
 | |
|                     FURI_LOG_E(TAG, "picopass_device_parse_credential error %d", err);
 | |
|                     nextState = PicopassWorkerEventFail;
 | |
|                 }
 | |
|             }
 | |
| 
 | |
|             if(nextState == PicopassWorkerEventSuccess) {
 | |
|                 err = picopass_device_parse_wiegand(pacs->credential, &pacs->record);
 | |
|                 if(err != ERR_NONE) {
 | |
|                     FURI_LOG_E(TAG, "picopass_device_parse_wiegand error %d", err);
 | |
|                     nextState = PicopassWorkerEventFail;
 | |
|                 }
 | |
|             }
 | |
| 
 | |
|             // Notify caller and exit
 | |
|             if(picopass_worker->callback) {
 | |
|                 picopass_worker->callback(nextState, picopass_worker->context);
 | |
|             }
 | |
|             break;
 | |
|         }
 | |
|         furi_delay_ms(100);
 | |
|     }
 | |
| }
 | |
| 
 | |
| void picopass_worker_write(PicopassWorker* picopass_worker) {
 | |
|     PicopassDeviceData* dev_data = picopass_worker->dev_data;
 | |
|     PicopassBlock* AA1 = dev_data->AA1;
 | |
|     ReturnCode err;
 | |
|     PicopassWorkerEvent nextState = PicopassWorkerEventSuccess;
 | |
| 
 | |
|     while(picopass_worker->state == PicopassWorkerStateWrite) {
 | |
|         if(picopass_detect_card(1000) == ERR_NONE) {
 | |
|             err = picopass_write_card(AA1);
 | |
|             if(err != ERR_NONE) {
 | |
|                 FURI_LOG_E(TAG, "picopass_write_card error %d", err);
 | |
|                 nextState = PicopassWorkerEventFail;
 | |
|             }
 | |
| 
 | |
|             // Notify caller and exit
 | |
|             if(picopass_worker->callback) {
 | |
|                 picopass_worker->callback(nextState, picopass_worker->context);
 | |
|             }
 | |
|             break;
 | |
|         }
 | |
|         furi_delay_ms(100);
 | |
|     }
 | |
| }
 | |
| 
 | |
| void picopass_worker_write_key(PicopassWorker* picopass_worker) {
 | |
|     PicopassDeviceData* dev_data = picopass_worker->dev_data;
 | |
|     PicopassBlock* AA1 = dev_data->AA1;
 | |
|     PicopassPacs* pacs = &dev_data->pacs;
 | |
|     ReturnCode err;
 | |
|     PicopassWorkerEvent nextState = PicopassWorkerEventSuccess;
 | |
| 
 | |
|     uint8_t* csn = AA1[PICOPASS_CSN_BLOCK_INDEX].data;
 | |
|     uint8_t* configBlock = AA1[PICOPASS_CONFIG_BLOCK_INDEX].data;
 | |
|     uint8_t fuses = configBlock[7];
 | |
|     uint8_t* oldKey = AA1[PICOPASS_KD_BLOCK_INDEX].data;
 | |
| 
 | |
|     uint8_t newKey[PICOPASS_BLOCK_LEN] = {0};
 | |
|     loclass_iclass_calc_div_key(csn, pacs->key, newKey, false);
 | |
| 
 | |
|     if((fuses & 0x80) == 0x80) {
 | |
|         FURI_LOG_D(TAG, "Plain write for personalized mode key change");
 | |
|     } else {
 | |
|         FURI_LOG_D(TAG, "XOR write for application mode key change");
 | |
|         // XOR when in application mode
 | |
|         for(size_t i = 0; i < PICOPASS_BLOCK_LEN; i++) {
 | |
|             newKey[i] ^= oldKey[i];
 | |
|         }
 | |
|     }
 | |
| 
 | |
|     while(picopass_worker->state == PicopassWorkerStateWriteKey) {
 | |
|         if(picopass_detect_card(1000) == ERR_NONE) {
 | |
|             err = picopass_write_block(AA1, PICOPASS_KD_BLOCK_INDEX, newKey);
 | |
|             if(err != ERR_NONE) {
 | |
|                 FURI_LOG_E(TAG, "picopass_write_block error %d", err);
 | |
|                 nextState = PicopassWorkerEventFail;
 | |
|             }
 | |
| 
 | |
|             // Notify caller and exit
 | |
|             if(picopass_worker->callback) {
 | |
|                 picopass_worker->callback(nextState, picopass_worker->context);
 | |
|             }
 | |
|             break;
 | |
|         }
 | |
|         furi_delay_ms(100);
 | |
|     }
 | |
| }
 | 
