* nfc: add new read scene * lib: refactore nfc library * mifare desfire: add read card fuction * lib nfc: add auto read worker * nfc: add supported cards * nfc: add mifare classic read success scene * nfc: add troyka support * submodule: update protobuf * nfc: mifare classic keys cache * nfc: rework mifare classic key cache * Correct spelling * nfc: add user dictionary * nfc: introduce block read map in fff * nfc: rework dict attack * nfc: improve dict attack * nfc: rework mifare classic format * nfc: rework MFC read with Reader * nfc: add gui for MFC read success scene * nfc: fix dict attack view gui * nfc: add retry and exit confirm scenes * nfc: add retry and exit scenes navigation * nfc: check user dictionary * nfc: remove unused scenes * nfc: rename functions in nfc worker * nfc: rename mf_classic_dict_attack -> dict_attack * nfc: change scenes names * nfc: remove scene tick events * nfc: rework dict calls with buffer streams * nfc: fix notifications * nfc: fix mf desfire navigation * nfc: remove notification from mf classic read success * nfc: fix read sectors calculation * nfc: add fallback for unknown card * nfc: show file name while emulating * nfc: fix build * nfc: fix memory leak * nfc: fix desfire read * nfc: add no dict found navigation * nfc: add read views * nfc: update card fix * nfc: fix access bytes save * nfc: add exit and retry confirm to mf ultralight read success * nfc: introduce detect reader * nfc: change record open arg to macros * nfc: fix start from archive Co-authored-by: Astra <astra@astrra.space> Co-authored-by: あく <alleteam@gmail.com>
		
			
				
	
	
		
			71 lines
		
	
	
		
			2.7 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			71 lines
		
	
	
		
			2.7 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
#include "nfc_supported_card.h"
 | 
						|
 | 
						|
#include <gui/modules/widget.h>
 | 
						|
#include <nfc_worker_i.h>
 | 
						|
 | 
						|
static const MfClassicAuthContext troyka_keys[] = {
 | 
						|
    {.sector = 0, .key_a = 0xa0a1a2a3a4a5, .key_b = 0xfbf225dc5d58},
 | 
						|
    {.sector = 1, .key_a = 0xa82607b01c0d, .key_b = 0x2910989b6880},
 | 
						|
    {.sector = 2, .key_a = 0x2aa05ed1856f, .key_b = 0xeaac88e5dc99},
 | 
						|
    {.sector = 3, .key_a = 0x2aa05ed1856f, .key_b = 0xeaac88e5dc99},
 | 
						|
    {.sector = 4, .key_a = 0x73068f118c13, .key_b = 0x2b7f3253fac5},
 | 
						|
    {.sector = 5, .key_a = 0xfbc2793d540b, .key_b = 0xd3a297dc2698},
 | 
						|
    {.sector = 6, .key_a = 0x2aa05ed1856f, .key_b = 0xeaac88e5dc99},
 | 
						|
    {.sector = 7, .key_a = 0xae3d65a3dad4, .key_b = 0x0f1c63013dba},
 | 
						|
    {.sector = 8, .key_a = 0xa73f5dc1d333, .key_b = 0xe35173494a81},
 | 
						|
    {.sector = 9, .key_a = 0x69a32f1c2f19, .key_b = 0x6b8bd9860763},
 | 
						|
    {.sector = 10, .key_a = 0x9becdf3d9273, .key_b = 0xf8493407799d},
 | 
						|
    {.sector = 11, .key_a = 0x08b386463229, .key_b = 0x5efbaecef46b},
 | 
						|
    {.sector = 12, .key_a = 0xcd4c61c26e3d, .key_b = 0x31c7610de3b0},
 | 
						|
    {.sector = 13, .key_a = 0xa82607b01c0d, .key_b = 0x2910989b6880},
 | 
						|
    {.sector = 14, .key_a = 0x0e8f64340ba4, .key_b = 0x4acec1205d75},
 | 
						|
    {.sector = 15, .key_a = 0x2aa05ed1856f, .key_b = 0xeaac88e5dc99},
 | 
						|
};
 | 
						|
 | 
						|
bool troyka_parser_verify(NfcWorker* nfc_worker, FuriHalNfcTxRxContext* tx_rx) {
 | 
						|
    furi_assert(nfc_worker);
 | 
						|
    UNUSED(nfc_worker);
 | 
						|
 | 
						|
    MfClassicAuthContext auth_ctx = {
 | 
						|
        .key_a = MF_CLASSIC_NO_KEY,
 | 
						|
        .key_b = MF_CLASSIC_NO_KEY,
 | 
						|
        .sector = 8,
 | 
						|
    };
 | 
						|
    return mf_classic_auth_attempt(tx_rx, &auth_ctx, 0xa73f5dc1d333);
 | 
						|
}
 | 
						|
 | 
						|
bool troyka_parser_read(NfcWorker* nfc_worker, FuriHalNfcTxRxContext* tx_rx) {
 | 
						|
    furi_assert(nfc_worker);
 | 
						|
 | 
						|
    MfClassicReader reader = {};
 | 
						|
    FuriHalNfcDevData* nfc_data = &nfc_worker->dev_data->nfc_data;
 | 
						|
    mf_classic_get_type(nfc_data->atqa[0], nfc_data->atqa[1], nfc_data->sak, &reader);
 | 
						|
    for(size_t i = 0; i < COUNT_OF(troyka_keys); i++) {
 | 
						|
        mf_classic_reader_add_sector(
 | 
						|
            &reader, troyka_keys[i].sector, troyka_keys[i].key_a, troyka_keys[i].key_b);
 | 
						|
    }
 | 
						|
 | 
						|
    return mf_classic_read_card(tx_rx, &reader, &nfc_worker->dev_data->mf_classic_data) == 16;
 | 
						|
}
 | 
						|
 | 
						|
bool troyka_parser_parse(NfcWorker* nfc_worker) {
 | 
						|
    MfClassicData* data = &nfc_worker->dev_data->mf_classic_data;
 | 
						|
    uint8_t* temp_ptr = &data->block[8 * 4 + 1].value[5];
 | 
						|
    uint16_t balance = ((temp_ptr[0] << 8) | temp_ptr[1]) / 25;
 | 
						|
    temp_ptr = &data->block[8 * 4].value[3];
 | 
						|
    uint32_t number = 0;
 | 
						|
    for(size_t i = 0; i < 4; i++) {
 | 
						|
        number <<= 8;
 | 
						|
        number |= temp_ptr[i];
 | 
						|
    }
 | 
						|
    number >>= 4;
 | 
						|
 | 
						|
    string_printf(
 | 
						|
        nfc_worker->dev_data->parsed_data,
 | 
						|
        "Troyka Transport card\nNumber: %ld\nBalance: %d rub",
 | 
						|
        number,
 | 
						|
        balance);
 | 
						|
 | 
						|
    return true;
 | 
						|
}
 |