 4bf29827f8
			
		
	
	
		4bf29827f8
		
			
		
	
	
	
	
		
			
			* Quicksave 1 * Header stage complete * Source stage complete * Lint & merge fixes * Includes * Documentation step 1 * FBT: output free size considering BT STACK * Documentation step 2 * py lint * Fix music player plugin * unit test stage 1: string allocator, mem, getters, setters, appends, compare, search. * unit test: string equality * unit test: string replace * unit test: string start_with, end_with * unit test: string trim * unit test: utf-8 * Rename * Revert fw_size changes * Simplify CLI backspace handling * Simplify CLI character insert * Merge fixes * Furi: correct filenaming and spelling * Bt: remove furi string include Co-authored-by: Aleksandr Kutuzov <alleteam@gmail.com>
		
			
				
	
	
		
			88 lines
		
	
	
		
			3.4 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			88 lines
		
	
	
		
			3.4 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
| #include "nfc_supported_card.h"
 | |
| 
 | |
| #include <gui/modules/widget.h>
 | |
| #include <nfc_worker_i.h>
 | |
| 
 | |
| static const MfClassicAuthContext troika_keys[] = {
 | |
|     {.sector = 0, .key_a = 0xa0a1a2a3a4a5, .key_b = 0xfbf225dc5d58},
 | |
|     {.sector = 1, .key_a = 0xa82607b01c0d, .key_b = 0x2910989b6880},
 | |
|     {.sector = 2, .key_a = 0x2aa05ed1856f, .key_b = 0xeaac88e5dc99},
 | |
|     {.sector = 3, .key_a = 0x2aa05ed1856f, .key_b = 0xeaac88e5dc99},
 | |
|     {.sector = 4, .key_a = 0x73068f118c13, .key_b = 0x2b7f3253fac5},
 | |
|     {.sector = 5, .key_a = 0xfbc2793d540b, .key_b = 0xd3a297dc2698},
 | |
|     {.sector = 6, .key_a = 0x2aa05ed1856f, .key_b = 0xeaac88e5dc99},
 | |
|     {.sector = 7, .key_a = 0xae3d65a3dad4, .key_b = 0x0f1c63013dba},
 | |
|     {.sector = 8, .key_a = 0xa73f5dc1d333, .key_b = 0xe35173494a81},
 | |
|     {.sector = 9, .key_a = 0x69a32f1c2f19, .key_b = 0x6b8bd9860763},
 | |
|     {.sector = 10, .key_a = 0x9becdf3d9273, .key_b = 0xf8493407799d},
 | |
|     {.sector = 11, .key_a = 0x08b386463229, .key_b = 0x5efbaecef46b},
 | |
|     {.sector = 12, .key_a = 0xcd4c61c26e3d, .key_b = 0x31c7610de3b0},
 | |
|     {.sector = 13, .key_a = 0xa82607b01c0d, .key_b = 0x2910989b6880},
 | |
|     {.sector = 14, .key_a = 0x0e8f64340ba4, .key_b = 0x4acec1205d75},
 | |
|     {.sector = 15, .key_a = 0x2aa05ed1856f, .key_b = 0xeaac88e5dc99},
 | |
| };
 | |
| 
 | |
| bool troika_parser_verify(NfcWorker* nfc_worker, FuriHalNfcTxRxContext* tx_rx) {
 | |
|     furi_assert(nfc_worker);
 | |
|     UNUSED(nfc_worker);
 | |
|     if(nfc_worker->dev_data->mf_classic_data.type != MfClassicType1k) {
 | |
|         return false;
 | |
|     }
 | |
| 
 | |
|     uint8_t sector = 11;
 | |
|     uint8_t block = mf_classic_get_sector_trailer_block_num_by_sector(sector);
 | |
|     FURI_LOG_D("Troika", "Verifying sector %d", sector);
 | |
|     if(mf_classic_authenticate(tx_rx, block, 0x08b386463229, MfClassicKeyA)) {
 | |
|         FURI_LOG_D("Troika", "Sector %d verified", sector);
 | |
|         return true;
 | |
|     }
 | |
|     return false;
 | |
| }
 | |
| 
 | |
| bool troika_parser_read(NfcWorker* nfc_worker, FuriHalNfcTxRxContext* tx_rx) {
 | |
|     furi_assert(nfc_worker);
 | |
| 
 | |
|     MfClassicReader reader = {};
 | |
|     FuriHalNfcDevData* nfc_data = &nfc_worker->dev_data->nfc_data;
 | |
|     reader.type = mf_classic_get_classic_type(nfc_data->atqa[0], nfc_data->atqa[1], nfc_data->sak);
 | |
| 
 | |
|     for(size_t i = 0; i < COUNT_OF(troika_keys); i++) {
 | |
|         mf_classic_reader_add_sector(
 | |
|             &reader, troika_keys[i].sector, troika_keys[i].key_a, troika_keys[i].key_b);
 | |
|     }
 | |
| 
 | |
|     return mf_classic_read_card(tx_rx, &reader, &nfc_worker->dev_data->mf_classic_data) == 16;
 | |
| }
 | |
| 
 | |
| bool troika_parser_parse(NfcDeviceData* dev_data) {
 | |
|     MfClassicData* data = &dev_data->mf_classic_data;
 | |
|     bool troika_parsed = false;
 | |
| 
 | |
|     do {
 | |
|         // Verify key
 | |
|         MfClassicSectorTrailer* sec_tr = mf_classic_get_sector_trailer_by_sector(data, 8);
 | |
|         uint64_t key = nfc_util_bytes2num(sec_tr->key_a, 6);
 | |
|         if(key != troika_keys[8].key_a) break;
 | |
| 
 | |
|         // Verify card type
 | |
|         if(data->type != MfClassicType1k) break;
 | |
| 
 | |
|         // Parse data
 | |
|         uint8_t* temp_ptr = &data->block[8 * 4 + 1].value[5];
 | |
|         uint16_t balance = ((temp_ptr[0] << 8) | temp_ptr[1]) / 25;
 | |
|         temp_ptr = &data->block[8 * 4].value[3];
 | |
|         uint32_t number = 0;
 | |
|         for(size_t i = 0; i < 4; i++) {
 | |
|             number <<= 8;
 | |
|             number |= temp_ptr[i];
 | |
|         }
 | |
|         number >>= 4;
 | |
| 
 | |
|         furi_string_printf(
 | |
|             dev_data->parsed_data, "\e#Troika\nNum: %ld\nBalance: %d rur.", number, balance);
 | |
|         troika_parsed = true;
 | |
|     } while(false);
 | |
| 
 | |
|     return troika_parsed;
 | |
| }
 |