From 512bba335b373067b3a5d9ec22bacad9e374a868 Mon Sep 17 00:00:00 2001
From: Willy-JL <49810075+Willy-JL@users.noreply.github.com>
Date: Mon, 20 Mar 2023 17:31:36 +0000
Subject: [PATCH] Add mfkey32 app (#157)
---
applications/external/mfkey32/LICENSE | 674 +++++++++
applications/external/mfkey32/application.fam | 16 +
.../external/mfkey32/images/mfkey.png | Bin 0 -> 9060 bytes
applications/external/mfkey32/mfkey.png | Bin 0 -> 9060 bytes
applications/external/mfkey32/mfkey32.c | 1285 +++++++++++++++++
5 files changed, 1975 insertions(+)
create mode 100644 applications/external/mfkey32/LICENSE
create mode 100644 applications/external/mfkey32/application.fam
create mode 100644 applications/external/mfkey32/images/mfkey.png
create mode 100644 applications/external/mfkey32/mfkey.png
create mode 100644 applications/external/mfkey32/mfkey32.c
diff --git a/applications/external/mfkey32/LICENSE b/applications/external/mfkey32/LICENSE
new file mode 100644
index 000000000..f288702d2
--- /dev/null
+++ b/applications/external/mfkey32/LICENSE
@@ -0,0 +1,674 @@
+ GNU GENERAL PUBLIC LICENSE
+ Version 3, 29 June 2007
+
+ Copyright (C) 2007 Free Software Foundation, Inc.
+ Everyone is permitted to copy and distribute verbatim copies
+ of this license document, but changing it is not allowed.
+
+ Preamble
+
+ The GNU General Public License is a free, copyleft license for
+software and other kinds of works.
+
+ The licenses for most software and other practical works are designed
+to take away your freedom to share and change the works. By contrast,
+the GNU General Public License is intended to guarantee your freedom to
+share and change all versions of a program--to make sure it remains free
+software for all its users. We, the Free Software Foundation, use the
+GNU General Public License for most of our software; it applies also to
+any other work released this way by its authors. You can apply it to
+your programs, too.
+
+ When we speak of free software, we are referring to freedom, not
+price. Our General Public Licenses are designed to make sure that you
+have the freedom to distribute copies of free software (and charge for
+them if you wish), that you receive source code or can get it if you
+want it, that you can change the software or use pieces of it in new
+free programs, and that you know you can do these things.
+
+ To protect your rights, we need to prevent others from denying you
+these rights or asking you to surrender the rights. Therefore, you have
+certain responsibilities if you distribute copies of the software, or if
+you modify it: responsibilities to respect the freedom of others.
+
+ For example, if you distribute copies of such a program, whether
+gratis or for a fee, you must pass on to the recipients the same
+freedoms that you received. You must make sure that they, too, receive
+or can get the source code. And you must show them these terms so they
+know their rights.
+
+ Developers that use the GNU GPL protect your rights with two steps:
+(1) assert copyright on the software, and (2) offer you this License
+giving you legal permission to copy, distribute and/or modify it.
+
+ For the developers' and authors' protection, the GPL clearly explains
+that there is no warranty for this free software. For both users' and
+authors' sake, the GPL requires that modified versions be marked as
+changed, so that their problems will not be attributed erroneously to
+authors of previous versions.
+
+ Some devices are designed to deny users access to install or run
+modified versions of the software inside them, although the manufacturer
+can do so. This is fundamentally incompatible with the aim of
+protecting users' freedom to change the software. The systematic
+pattern of such abuse occurs in the area of products for individuals to
+use, which is precisely where it is most unacceptable. Therefore, we
+have designed this version of the GPL to prohibit the practice for those
+products. If such problems arise substantially in other domains, we
+stand ready to extend this provision to those domains in future versions
+of the GPL, as needed to protect the freedom of users.
+
+ Finally, every program is threatened constantly by software patents.
+States should not allow patents to restrict development and use of
+software on general-purpose computers, but in those that do, we wish to
+avoid the special danger that patents applied to a free program could
+make it effectively proprietary. To prevent this, the GPL assures that
+patents cannot be used to render the program non-free.
+
+ The precise terms and conditions for copying, distribution and
+modification follow.
+
+ TERMS AND CONDITIONS
+
+ 0. Definitions.
+
+ "This License" refers to version 3 of the GNU General Public License.
+
+ "Copyright" also means copyright-like laws that apply to other kinds of
+works, such as semiconductor masks.
+
+ "The Program" refers to any copyrightable work licensed under this
+License. Each licensee is addressed as "you". "Licensees" and
+"recipients" may be individuals or organizations.
+
+ To "modify" a work means to copy from or adapt all or part of the work
+in a fashion requiring copyright permission, other than the making of an
+exact copy. The resulting work is called a "modified version" of the
+earlier work or a work "based on" the earlier work.
+
+ A "covered work" means either the unmodified Program or a work based
+on the Program.
+
+ To "propagate" a work means to do anything with it that, without
+permission, would make you directly or secondarily liable for
+infringement under applicable copyright law, except executing it on a
+computer or modifying a private copy. Propagation includes copying,
+distribution (with or without modification), making available to the
+public, and in some countries other activities as well.
+
+ To "convey" a work means any kind of propagation that enables other
+parties to make or receive copies. Mere interaction with a user through
+a computer network, with no transfer of a copy, is not conveying.
+
+ An interactive user interface displays "Appropriate Legal Notices"
+to the extent that it includes a convenient and prominently visible
+feature that (1) displays an appropriate copyright notice, and (2)
+tells the user that there is no warranty for the work (except to the
+extent that warranties are provided), that licensees may convey the
+work under this License, and how to view a copy of this License. If
+the interface presents a list of user commands or options, such as a
+menu, a prominent item in the list meets this criterion.
+
+ 1. Source Code.
+
+ The "source code" for a work means the preferred form of the work
+for making modifications to it. "Object code" means any non-source
+form of a work.
+
+ A "Standard Interface" means an interface that either is an official
+standard defined by a recognized standards body, or, in the case of
+interfaces specified for a particular programming language, one that
+is widely used among developers working in that language.
+
+ The "System Libraries" of an executable work include anything, other
+than the work as a whole, that (a) is included in the normal form of
+packaging a Major Component, but which is not part of that Major
+Component, and (b) serves only to enable use of the work with that
+Major Component, or to implement a Standard Interface for which an
+implementation is available to the public in source code form. A
+"Major Component", in this context, means a major essential component
+(kernel, window system, and so on) of the specific operating system
+(if any) on which the executable work runs, or a compiler used to
+produce the work, or an object code interpreter used to run it.
+
+ The "Corresponding Source" for a work in object code form means all
+the source code needed to generate, install, and (for an executable
+work) run the object code and to modify the work, including scripts to
+control those activities. However, it does not include the work's
+System Libraries, or general-purpose tools or generally available free
+programs which are used unmodified in performing those activities but
+which are not part of the work. For example, Corresponding Source
+includes interface definition files associated with source files for
+the work, and the source code for shared libraries and dynamically
+linked subprograms that the work is specifically designed to require,
+such as by intimate data communication or control flow between those
+subprograms and other parts of the work.
+
+ The Corresponding Source need not include anything that users
+can regenerate automatically from other parts of the Corresponding
+Source.
+
+ The Corresponding Source for a work in source code form is that
+same work.
+
+ 2. Basic Permissions.
+
+ All rights granted under this License are granted for the term of
+copyright on the Program, and are irrevocable provided the stated
+conditions are met. This License explicitly affirms your unlimited
+permission to run the unmodified Program. The output from running a
+covered work is covered by this License only if the output, given its
+content, constitutes a covered work. This License acknowledges your
+rights of fair use or other equivalent, as provided by copyright law.
+
+ You may make, run and propagate covered works that you do not
+convey, without conditions so long as your license otherwise remains
+in force. You may convey covered works to others for the sole purpose
+of having them make modifications exclusively for you, or provide you
+with facilities for running those works, provided that you comply with
+the terms of this License in conveying all material for which you do
+not control copyright. Those thus making or running the covered works
+for you must do so exclusively on your behalf, under your direction
+and control, on terms that prohibit them from making any copies of
+your copyrighted material outside their relationship with you.
+
+ Conveying under any other circumstances is permitted solely under
+the conditions stated below. Sublicensing is not allowed; section 10
+makes it unnecessary.
+
+ 3. Protecting Users' Legal Rights From Anti-Circumvention Law.
+
+ No covered work shall be deemed part of an effective technological
+measure under any applicable law fulfilling obligations under article
+11 of the WIPO copyright treaty adopted on 20 December 1996, or
+similar laws prohibiting or restricting circumvention of such
+measures.
+
+ When you convey a covered work, you waive any legal power to forbid
+circumvention of technological measures to the extent such circumvention
+is effected by exercising rights under this License with respect to
+the covered work, and you disclaim any intention to limit operation or
+modification of the work as a means of enforcing, against the work's
+users, your or third parties' legal rights to forbid circumvention of
+technological measures.
+
+ 4. Conveying Verbatim Copies.
+
+ You may convey verbatim copies of the Program's source code as you
+receive it, in any medium, provided that you conspicuously and
+appropriately publish on each copy an appropriate copyright notice;
+keep intact all notices stating that this License and any
+non-permissive terms added in accord with section 7 apply to the code;
+keep intact all notices of the absence of any warranty; and give all
+recipients a copy of this License along with the Program.
+
+ You may charge any price or no price for each copy that you convey,
+and you may offer support or warranty protection for a fee.
+
+ 5. Conveying Modified Source Versions.
+
+ You may convey a work based on the Program, or the modifications to
+produce it from the Program, in the form of source code under the
+terms of section 4, provided that you also meet all of these conditions:
+
+ a) The work must carry prominent notices stating that you modified
+ it, and giving a relevant date.
+
+ b) The work must carry prominent notices stating that it is
+ released under this License and any conditions added under section
+ 7. This requirement modifies the requirement in section 4 to
+ "keep intact all notices".
+
+ c) You must license the entire work, as a whole, under this
+ License to anyone who comes into possession of a copy. This
+ License will therefore apply, along with any applicable section 7
+ additional terms, to the whole of the work, and all its parts,
+ regardless of how they are packaged. This License gives no
+ permission to license the work in any other way, but it does not
+ invalidate such permission if you have separately received it.
+
+ d) If the work has interactive user interfaces, each must display
+ Appropriate Legal Notices; however, if the Program has interactive
+ interfaces that do not display Appropriate Legal Notices, your
+ work need not make them do so.
+
+ A compilation of a covered work with other separate and independent
+works, which are not by their nature extensions of the covered work,
+and which are not combined with it such as to form a larger program,
+in or on a volume of a storage or distribution medium, is called an
+"aggregate" if the compilation and its resulting copyright are not
+used to limit the access or legal rights of the compilation's users
+beyond what the individual works permit. Inclusion of a covered work
+in an aggregate does not cause this License to apply to the other
+parts of the aggregate.
+
+ 6. Conveying Non-Source Forms.
+
+ You may convey a covered work in object code form under the terms
+of sections 4 and 5, provided that you also convey the
+machine-readable Corresponding Source under the terms of this License,
+in one of these ways:
+
+ a) Convey the object code in, or embodied in, a physical product
+ (including a physical distribution medium), accompanied by the
+ Corresponding Source fixed on a durable physical medium
+ customarily used for software interchange.
+
+ b) Convey the object code in, or embodied in, a physical product
+ (including a physical distribution medium), accompanied by a
+ written offer, valid for at least three years and valid for as
+ long as you offer spare parts or customer support for that product
+ model, to give anyone who possesses the object code either (1) a
+ copy of the Corresponding Source for all the software in the
+ product that is covered by this License, on a durable physical
+ medium customarily used for software interchange, for a price no
+ more than your reasonable cost of physically performing this
+ conveying of source, or (2) access to copy the
+ Corresponding Source from a network server at no charge.
+
+ c) Convey individual copies of the object code with a copy of the
+ written offer to provide the Corresponding Source. This
+ alternative is allowed only occasionally and noncommercially, and
+ only if you received the object code with such an offer, in accord
+ with subsection 6b.
+
+ d) Convey the object code by offering access from a designated
+ place (gratis or for a charge), and offer equivalent access to the
+ Corresponding Source in the same way through the same place at no
+ further charge. You need not require recipients to copy the
+ Corresponding Source along with the object code. If the place to
+ copy the object code is a network server, the Corresponding Source
+ may be on a different server (operated by you or a third party)
+ that supports equivalent copying facilities, provided you maintain
+ clear directions next to the object code saying where to find the
+ Corresponding Source. Regardless of what server hosts the
+ Corresponding Source, you remain obligated to ensure that it is
+ available for as long as needed to satisfy these requirements.
+
+ e) Convey the object code using peer-to-peer transmission, provided
+ you inform other peers where the object code and Corresponding
+ Source of the work are being offered to the general public at no
+ charge under subsection 6d.
+
+ A separable portion of the object code, whose source code is excluded
+from the Corresponding Source as a System Library, need not be
+included in conveying the object code work.
+
+ A "User Product" is either (1) a "consumer product", which means any
+tangible personal property which is normally used for personal, family,
+or household purposes, or (2) anything designed or sold for incorporation
+into a dwelling. In determining whether a product is a consumer product,
+doubtful cases shall be resolved in favor of coverage. For a particular
+product received by a particular user, "normally used" refers to a
+typical or common use of that class of product, regardless of the status
+of the particular user or of the way in which the particular user
+actually uses, or expects or is expected to use, the product. A product
+is a consumer product regardless of whether the product has substantial
+commercial, industrial or non-consumer uses, unless such uses represent
+the only significant mode of use of the product.
+
+ "Installation Information" for a User Product means any methods,
+procedures, authorization keys, or other information required to install
+and execute modified versions of a covered work in that User Product from
+a modified version of its Corresponding Source. The information must
+suffice to ensure that the continued functioning of the modified object
+code is in no case prevented or interfered with solely because
+modification has been made.
+
+ If you convey an object code work under this section in, or with, or
+specifically for use in, a User Product, and the conveying occurs as
+part of a transaction in which the right of possession and use of the
+User Product is transferred to the recipient in perpetuity or for a
+fixed term (regardless of how the transaction is characterized), the
+Corresponding Source conveyed under this section must be accompanied
+by the Installation Information. But this requirement does not apply
+if neither you nor any third party retains the ability to install
+modified object code on the User Product (for example, the work has
+been installed in ROM).
+
+ The requirement to provide Installation Information does not include a
+requirement to continue to provide support service, warranty, or updates
+for a work that has been modified or installed by the recipient, or for
+the User Product in which it has been modified or installed. Access to a
+network may be denied when the modification itself materially and
+adversely affects the operation of the network or violates the rules and
+protocols for communication across the network.
+
+ Corresponding Source conveyed, and Installation Information provided,
+in accord with this section must be in a format that is publicly
+documented (and with an implementation available to the public in
+source code form), and must require no special password or key for
+unpacking, reading or copying.
+
+ 7. Additional Terms.
+
+ "Additional permissions" are terms that supplement the terms of this
+License by making exceptions from one or more of its conditions.
+Additional permissions that are applicable to the entire Program shall
+be treated as though they were included in this License, to the extent
+that they are valid under applicable law. If additional permissions
+apply only to part of the Program, that part may be used separately
+under those permissions, but the entire Program remains governed by
+this License without regard to the additional permissions.
+
+ When you convey a copy of a covered work, you may at your option
+remove any additional permissions from that copy, or from any part of
+it. (Additional permissions may be written to require their own
+removal in certain cases when you modify the work.) You may place
+additional permissions on material, added by you to a covered work,
+for which you have or can give appropriate copyright permission.
+
+ Notwithstanding any other provision of this License, for material you
+add to a covered work, you may (if authorized by the copyright holders of
+that material) supplement the terms of this License with terms:
+
+ a) Disclaiming warranty or limiting liability differently from the
+ terms of sections 15 and 16 of this License; or
+
+ b) Requiring preservation of specified reasonable legal notices or
+ author attributions in that material or in the Appropriate Legal
+ Notices displayed by works containing it; or
+
+ c) Prohibiting misrepresentation of the origin of that material, or
+ requiring that modified versions of such material be marked in
+ reasonable ways as different from the original version; or
+
+ d) Limiting the use for publicity purposes of names of licensors or
+ authors of the material; or
+
+ e) Declining to grant rights under trademark law for use of some
+ trade names, trademarks, or service marks; or
+
+ f) Requiring indemnification of licensors and authors of that
+ material by anyone who conveys the material (or modified versions of
+ it) with contractual assumptions of liability to the recipient, for
+ any liability that these contractual assumptions directly impose on
+ those licensors and authors.
+
+ All other non-permissive additional terms are considered "further
+restrictions" within the meaning of section 10. If the Program as you
+received it, or any part of it, contains a notice stating that it is
+governed by this License along with a term that is a further
+restriction, you may remove that term. If a license document contains
+a further restriction but permits relicensing or conveying under this
+License, you may add to a covered work material governed by the terms
+of that license document, provided that the further restriction does
+not survive such relicensing or conveying.
+
+ If you add terms to a covered work in accord with this section, you
+must place, in the relevant source files, a statement of the
+additional terms that apply to those files, or a notice indicating
+where to find the applicable terms.
+
+ Additional terms, permissive or non-permissive, may be stated in the
+form of a separately written license, or stated as exceptions;
+the above requirements apply either way.
+
+ 8. Termination.
+
+ You may not propagate or modify a covered work except as expressly
+provided under this License. Any attempt otherwise to propagate or
+modify it is void, and will automatically terminate your rights under
+this License (including any patent licenses granted under the third
+paragraph of section 11).
+
+ However, if you cease all violation of this License, then your
+license from a particular copyright holder is reinstated (a)
+provisionally, unless and until the copyright holder explicitly and
+finally terminates your license, and (b) permanently, if the copyright
+holder fails to notify you of the violation by some reasonable means
+prior to 60 days after the cessation.
+
+ Moreover, your license from a particular copyright holder is
+reinstated permanently if the copyright holder notifies you of the
+violation by some reasonable means, this is the first time you have
+received notice of violation of this License (for any work) from that
+copyright holder, and you cure the violation prior to 30 days after
+your receipt of the notice.
+
+ Termination of your rights under this section does not terminate the
+licenses of parties who have received copies or rights from you under
+this License. If your rights have been terminated and not permanently
+reinstated, you do not qualify to receive new licenses for the same
+material under section 10.
+
+ 9. Acceptance Not Required for Having Copies.
+
+ You are not required to accept this License in order to receive or
+run a copy of the Program. Ancillary propagation of a covered work
+occurring solely as a consequence of using peer-to-peer transmission
+to receive a copy likewise does not require acceptance. However,
+nothing other than this License grants you permission to propagate or
+modify any covered work. These actions infringe copyright if you do
+not accept this License. Therefore, by modifying or propagating a
+covered work, you indicate your acceptance of this License to do so.
+
+ 10. Automatic Licensing of Downstream Recipients.
+
+ Each time you convey a covered work, the recipient automatically
+receives a license from the original licensors, to run, modify and
+propagate that work, subject to this License. You are not responsible
+for enforcing compliance by third parties with this License.
+
+ An "entity transaction" is a transaction transferring control of an
+organization, or substantially all assets of one, or subdividing an
+organization, or merging organizations. If propagation of a covered
+work results from an entity transaction, each party to that
+transaction who receives a copy of the work also receives whatever
+licenses to the work the party's predecessor in interest had or could
+give under the previous paragraph, plus a right to possession of the
+Corresponding Source of the work from the predecessor in interest, if
+the predecessor has it or can get it with reasonable efforts.
+
+ You may not impose any further restrictions on the exercise of the
+rights granted or affirmed under this License. For example, you may
+not impose a license fee, royalty, or other charge for exercise of
+rights granted under this License, and you may not initiate litigation
+(including a cross-claim or counterclaim in a lawsuit) alleging that
+any patent claim is infringed by making, using, selling, offering for
+sale, or importing the Program or any portion of it.
+
+ 11. Patents.
+
+ A "contributor" is a copyright holder who authorizes use under this
+License of the Program or a work on which the Program is based. The
+work thus licensed is called the contributor's "contributor version".
+
+ A contributor's "essential patent claims" are all patent claims
+owned or controlled by the contributor, whether already acquired or
+hereafter acquired, that would be infringed by some manner, permitted
+by this License, of making, using, or selling its contributor version,
+but do not include claims that would be infringed only as a
+consequence of further modification of the contributor version. For
+purposes of this definition, "control" includes the right to grant
+patent sublicenses in a manner consistent with the requirements of
+this License.
+
+ Each contributor grants you a non-exclusive, worldwide, royalty-free
+patent license under the contributor's essential patent claims, to
+make, use, sell, offer for sale, import and otherwise run, modify and
+propagate the contents of its contributor version.
+
+ In the following three paragraphs, a "patent license" is any express
+agreement or commitment, however denominated, not to enforce a patent
+(such as an express permission to practice a patent or covenant not to
+sue for patent infringement). To "grant" such a patent license to a
+party means to make such an agreement or commitment not to enforce a
+patent against the party.
+
+ If you convey a covered work, knowingly relying on a patent license,
+and the Corresponding Source of the work is not available for anyone
+to copy, free of charge and under the terms of this License, through a
+publicly available network server or other readily accessible means,
+then you must either (1) cause the Corresponding Source to be so
+available, or (2) arrange to deprive yourself of the benefit of the
+patent license for this particular work, or (3) arrange, in a manner
+consistent with the requirements of this License, to extend the patent
+license to downstream recipients. "Knowingly relying" means you have
+actual knowledge that, but for the patent license, your conveying the
+covered work in a country, or your recipient's use of the covered work
+in a country, would infringe one or more identifiable patents in that
+country that you have reason to believe are valid.
+
+ If, pursuant to or in connection with a single transaction or
+arrangement, you convey, or propagate by procuring conveyance of, a
+covered work, and grant a patent license to some of the parties
+receiving the covered work authorizing them to use, propagate, modify
+or convey a specific copy of the covered work, then the patent license
+you grant is automatically extended to all recipients of the covered
+work and works based on it.
+
+ A patent license is "discriminatory" if it does not include within
+the scope of its coverage, prohibits the exercise of, or is
+conditioned on the non-exercise of one or more of the rights that are
+specifically granted under this License. You may not convey a covered
+work if you are a party to an arrangement with a third party that is
+in the business of distributing software, under which you make payment
+to the third party based on the extent of your activity of conveying
+the work, and under which the third party grants, to any of the
+parties who would receive the covered work from you, a discriminatory
+patent license (a) in connection with copies of the covered work
+conveyed by you (or copies made from those copies), or (b) primarily
+for and in connection with specific products or compilations that
+contain the covered work, unless you entered into that arrangement,
+or that patent license was granted, prior to 28 March 2007.
+
+ Nothing in this License shall be construed as excluding or limiting
+any implied license or other defenses to infringement that may
+otherwise be available to you under applicable patent law.
+
+ 12. No Surrender of Others' Freedom.
+
+ If conditions are imposed on you (whether by court order, agreement or
+otherwise) that contradict the conditions of this License, they do not
+excuse you from the conditions of this License. If you cannot convey a
+covered work so as to satisfy simultaneously your obligations under this
+License and any other pertinent obligations, then as a consequence you may
+not convey it at all. For example, if you agree to terms that obligate you
+to collect a royalty for further conveying from those to whom you convey
+the Program, the only way you could satisfy both those terms and this
+License would be to refrain entirely from conveying the Program.
+
+ 13. Use with the GNU Affero General Public License.
+
+ Notwithstanding any other provision of this License, you have
+permission to link or combine any covered work with a work licensed
+under version 3 of the GNU Affero General Public License into a single
+combined work, and to convey the resulting work. The terms of this
+License will continue to apply to the part which is the covered work,
+but the special requirements of the GNU Affero General Public License,
+section 13, concerning interaction through a network will apply to the
+combination as such.
+
+ 14. Revised Versions of this License.
+
+ The Free Software Foundation may publish revised and/or new versions of
+the GNU General Public License from time to time. Such new versions will
+be similar in spirit to the present version, but may differ in detail to
+address new problems or concerns.
+
+ Each version is given a distinguishing version number. If the
+Program specifies that a certain numbered version of the GNU General
+Public License "or any later version" applies to it, you have the
+option of following the terms and conditions either of that numbered
+version or of any later version published by the Free Software
+Foundation. If the Program does not specify a version number of the
+GNU General Public License, you may choose any version ever published
+by the Free Software Foundation.
+
+ If the Program specifies that a proxy can decide which future
+versions of the GNU General Public License can be used, that proxy's
+public statement of acceptance of a version permanently authorizes you
+to choose that version for the Program.
+
+ Later license versions may give you additional or different
+permissions. However, no additional obligations are imposed on any
+author or copyright holder as a result of your choosing to follow a
+later version.
+
+ 15. Disclaimer of Warranty.
+
+ THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY
+APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT
+HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY
+OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO,
+THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
+PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM
+IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF
+ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
+
+ 16. Limitation of Liability.
+
+ IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
+WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS
+THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY
+GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE
+USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF
+DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD
+PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS),
+EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF
+SUCH DAMAGES.
+
+ 17. Interpretation of Sections 15 and 16.
+
+ If the disclaimer of warranty and limitation of liability provided
+above cannot be given local legal effect according to their terms,
+reviewing courts shall apply local law that most closely approximates
+an absolute waiver of all civil liability in connection with the
+Program, unless a warranty or assumption of liability accompanies a
+copy of the Program in return for a fee.
+
+ END OF TERMS AND CONDITIONS
+
+ How to Apply These Terms to Your New Programs
+
+ If you develop a new program, and you want it to be of the greatest
+possible use to the public, the best way to achieve this is to make it
+free software which everyone can redistribute and change under these terms.
+
+ To do so, attach the following notices to the program. It is safest
+to attach them to the start of each source file to most effectively
+state the exclusion of warranty; and each file should have at least
+the "copyright" line and a pointer to where the full notice is found.
+
+
+ Copyright (C)
+
+ This program is free software: you can redistribute it and/or modify
+ it under the terms of the GNU General Public License as published by
+ the Free Software Foundation, either version 3 of the License, or
+ (at your option) any later version.
+
+ This program is distributed in the hope that it will be useful,
+ but WITHOUT ANY WARRANTY; without even the implied warranty of
+ MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ GNU General Public License for more details.
+
+ You should have received a copy of the GNU General Public License
+ along with this program. If not, see .
+
+Also add information on how to contact you by electronic and paper mail.
+
+ If the program does terminal interaction, make it output a short
+notice like this when it starts in an interactive mode:
+
+ Copyright (C)
+ This program comes with ABSOLUTELY NO WARRANTY; for details type `show w'.
+ This is free software, and you are welcome to redistribute it
+ under certain conditions; type `show c' for details.
+
+The hypothetical commands `show w' and `show c' should show the appropriate
+parts of the General Public License. Of course, your program's commands
+might be different; for a GUI interface, you would use an "about box".
+
+ You should also get your employer (if you work as a programmer) or school,
+if any, to sign a "copyright disclaimer" for the program, if necessary.
+For more information on this, and how to apply and follow the GNU GPL, see
+.
+
+ The GNU General Public License does not permit incorporating your program
+into proprietary programs. If your program is a subroutine library, you
+may consider it more useful to permit linking proprietary applications with
+the library. If this is what you want to do, use the GNU Lesser General
+Public License instead of this License. But first, please read
+.
diff --git a/applications/external/mfkey32/application.fam b/applications/external/mfkey32/application.fam
new file mode 100644
index 000000000..14ce32d45
--- /dev/null
+++ b/applications/external/mfkey32/application.fam
@@ -0,0 +1,16 @@
+App(
+ appid="mfkey32",
+ name="Mfkey32",
+ apptype=FlipperAppType.EXTERNAL,
+ entry_point="mfkey32_main",
+ requires=[
+ "gui",
+ "storage",
+ ],
+ stack_size=1 * 1024,
+ fap_icon="mfkey.png",
+ fap_category="Tools",
+ fap_author="noproto",
+ fap_icon_assets="images",
+ fap_weburl="https://github.com/noproto/FlipperMfkey"
+)
diff --git a/applications/external/mfkey32/images/mfkey.png b/applications/external/mfkey32/images/mfkey.png
new file mode 100644
index 0000000000000000000000000000000000000000..52ab29efb92bf5aa7c790b8043d2d07a7e74704d
GIT binary patch
literal 9060
zcmeHLc|4SB`ya`gt&*%Y21OdPF9tD_coPmO>|@kR(yI
zB1+a0Qo0o*glK}z+_2)bH
zofwBpEttwGMFgchm(ef6MoJ!5%BERtYs?BBRG*a@G-?C$&T4
z>l-HDO-E)QRNbuTd}d~^O`ni%^(}aH_>BXK7S&h=H?U4t(jOEkSbeJ&2NVh9yho`S3uecDk^
zGsl~HI*z?%loB30T)tUQvKza5#=NTPPM2ij)d9)Tu{aUjQEKhPhK{((+>GuQWQCANmXV3iq%wW4RXAVlDYK~Py`b~rCH;a``1xuH
zu;N0?^P;mU0ej<%U3fJNq~nBeSM+#DVEG=KGmTWRvURONsP6n@*xh~cVwgIKj
z3H*{079-s?6d|p8_xKJejmM)o7v(+TwZsRye@fn|+K_5%tM;YyF|0*VzsqwnVif$0f^Ex-Ry>Y*2b$jwh1mA4y_dt(Yq0MWG!l
zQD8=mzzecWIMJof`+j4ncC#46MW7_Y@;pt(`$k_;Y9X+}xSHAG>nrL^1QOn69=}nf^by)#38K@bPdb^ja
zU4DFmb{$aOL^>`};g;}J=)fHL#=MT)TJd9hx2=C0qVjrI{H5F=V`R4>T4~|J55^K#
zS~`h#ZXrW9`^%)O>ejj3*H>g?68D|(PPwcQ13D={ih9{HSlT!M3#iNuo+5}TPZ6%S
z1--2Goa++35v-@off(1(xJp-~B4zJ3su|iAJ{LgDX88#ZEAB5lUtz6!!#O0U=$F3m
zv6X3sC3}vGt|79Wo}go6A*!1nBurDn$X4}LilvvVc7-XIrkgrRIUA_esN>bC>l^$Y
zjYA9fMrqHQol_WSNUUUI)=L8eu=6Nf-dK+QQ)&Z&uE(U>BWb!n=D(J?HU-#dQJJX
zQu*N9H_!85=c-FA-YtXGEVh=i+;`WY5fp`8_l6a$G~>`3tCEB{^`-&AACDYR@!K{u
zjg8$?#c7B2p2|XY1f4r`-AcYl$atk1-lpfhIKiScyTj|?^qGpRif%i2D=SW}PfzL1
zpy}PU%7p>f4!vH4&&VVfjRr);89vyhe431X5#8&g*%oXsZ51XVdqH5uG41383hHFc
zs%*+dzX^TuRqZNAcU+bDfD*rcw6|ErLBeZ;Q(?9cS<1i=Eg2nNLRBj1&_8c}&V5nN
z;nT|T%7RCmowlDR9L&mYGilr@IN+ST)m_=_A~n@L#ZTaMgWOEaB4yo%j-!wT=wEnJerb6OScXPK^54z&?-3mEo
zEnU70zXSzTYpS!^n!9(8-3wyR}`3UTtl(ntI
zh^q9XW=-f>`eK2L@kG)UwxV#F%As)BL(sH|w;o4ow~0{n4#7jm=YDQjGI8y%$l$i@<1+#wt@pThrQSJ8WWeT=ejysE-J(2vPP$7AA
z7t#PjEQ_{4@noYyVd_GvOwtD*)Qn(eXC?U)^nCzjFnP9UHc_}g)lPq+Mnkr0CcSV}
zu3azNGwDMnvE!;~w&D7FF_-QHM!pi_&Gc3Ti6}y^Z1Vc0&_K*fLl9}vm~85jbk4m*
zb9VJ(HI=lV#2f9Pg-_MH@>mB-w357%XQeEQTnjhNNl66U4;{wXoKqbW^CQ>?=l~hVsW)}qN)C|duida%|Evc4^S=B*=YjEOwwGID8a0gQmld8Eu5TMsd+x5HVmZ@w
ziI^~u4Lz$#vKtdz#54z3Np~#FUvtp96BhGO25GID*R$?%yKHD+#{BK08#bGmOH3Yn
zkh!^Pb8YVCrcS?mM=~D9C1&cpuiwslI^zUeDCg#ej>}bU{P7*p%hlNIbCzOdb;6qx
z(P4~R$D|nlS{smP8fWymUw51TaqS)Zq(yFJNOt(+-^v^96hOPRk!b6ZtIS4qU)lN?
z7i4y~$q0U0@tV@ZB_8g_b3H_!l*jzY$ZUGnz*G?x)9`|;r$RQDBw7TYJ*m=(Jex*|
zn`0{Y79OPS@FMKIZv%panjC4kcvUmeg_0O=+~w65R+c%cZ8QVd%o*HyY@hV8(XPDx
zWWuAV`QXvuM`oXRJ`WB)7S)PL6TOu!W#sEd5)asGMz&0^-*G-)^>Qyr$)zXP%6zz2
zWMYdwtn~Fc17%$a0|e*N+-VmBd}yIc6#sL
z6nd%Q;m6_|q)Eu4jYLE`D|zrv)?E8NjVbjE3yY5;oy6Fx#>uy~I4YyJLh^&o!cpjg
z_{1uo6Rd}?pDnD9n@C|zPnm6Gr<&%tHRs%CcNDa>9XKplo@V(XN~~!8AyQX%$~5B*
zQaJFj+)=8kivtkr)%zz
z$d^?n9!pgoc;%QfF;Ll@le@UDjQ5I?n9)RjMpi7KzaLy5%X6Ge3pnqbq5t4bXj&_5
zc%iwxG1>jxifW7vDHiQ3@#zD~>Dsdfc(;7E`Qz4g7a|T~1}`6ybGf&wHwE*`liQ6l4oAm{WMG@s9wP+7(TzUQ`oY1
zvtZp-d#RbTTH9TcZ=qg#T0CM~eoE08n@kESNza?K{MeWLRXCzngUV;jrfu)wWC)8R
zMix%^#&s^7AIm)_r}R{rtfpQMy5`szWQ0K4|?)7vFus?R867(PxIA#s%=kCR7qxUnwFJa
z_crVOZTvl=J!;E+eIb>DAg_G37nmpB(o6q6+QQax)ltiObZ_pqeKUKZ~?StM+0=L_bfEmCs3R=3!k-TGmNa=AFEK*lTDQN@z=DPof(`B+@;
z&>r8nrB437e%)Pl4l*k@f{S&mkLlRHsA8Tc#f#|74cCr*u9|Z-ERf4!lqU$BW@W}Y
z*<0rCZn&)-Hfjosf$N~|pGwKY>yM9T-6))Z=-;oNY=3Qwk`oMrOl?J3W(GwDg>+)^
zlWUJS?Q@K6k2STr0iIIpNh8$yJ*e9Hw)J?1W$W4_M;lyMX+vAzT`+rzkOu0t}W}?MSzI9alzUxKIQF*!2m0}Rt)Ln+Fv5;%yc}`{>!H@53ANr)h(fVmi
z_z9|j#{T1bw}05Ukaaoj?3seiLb-H}fjx140v|e$0uJ)=W^oBY29PCQ0&veChC#qf5Z(a;h?A8Kn8@bP!Dt<{4jf7f
zVg?`~+r+{892$dQYi#m`0(dfj?C0@(2{2e-V4zMQN{7wygducwbzyKM42gsS2q-t0
z#iIm4SzI+f#WII6olE5~eR)ha3(V)Fc(DC>1`r4!2Y(?4q*PK6F!;p)|9Od?%cH@_
zzylhH2LQm3a5x?cM?#Uhu1NZ5H=S7J+=if+)T)gbp0$e_llI8DpOvzR@Uv>Ct
z^kn+@E@|-5-y><%uQ*?Sj`tFVMupM6={|rXT!0zz8$ACr%vX)y#KV{T&JiAy@lW7<
z$?xERcYjR&YkHSlUz!GjF`Meo_mOOD0O5y6ps}e;8e!=cL1SR4SQ-{e#nZ7+G!{#T
z;&H&mgHFeI;NU0(4vqSbip=8jC@dBE)-2iVWD^i9S%hz=@bl&
zip8Pm=p`!tv=NMK$OaIk4*c7QjW>nIU~_y7AeKy)f6zC9J=2G7$D{C*hQQ*`SUeUe
zTr?hw`4Zg{pCg^a1=a+g69Lyj;Fr{CRDub>NC9e-=|l0P!+cquO9K8Z5^R`3bZ;kP
zfSt9hidgpMo6!09LjHsjfHVM8Lg6n$z^5g~rEz|Fd;9Z;9av1jDDs=g>6^>|f&&78
z!(j;i^&72}BN^!lN4lKY$w!bO{8IUbHqh;5erA+
zD0m<+49i&~|U;5&I(gYa%w~@b;
z-@nuKce?&k2L2NG@9O$HU4JP9e+m3|b^Y7YCI0P`8Jz{Zkpu!C#G)SBy#hX_iTRp2
zb3ve0YxzF`(CIVsz@P|^Y()|o5m1m**Icz`(|KTsNH#XIm+wqSB#VRKqJnFuKD${<
z+lqOd=k9Vf5imS?kD?ArPBsfDKavwMx2f2_Do?p$?=KNlw!ZwhcI`XYiHy&no*dYF
T2_+RDfDS|^SsNGcaF6&O#taN}
literal 0
HcmV?d00001
diff --git a/applications/external/mfkey32/mfkey.png b/applications/external/mfkey32/mfkey.png
new file mode 100644
index 0000000000000000000000000000000000000000..52ab29efb92bf5aa7c790b8043d2d07a7e74704d
GIT binary patch
literal 9060
zcmeHLc|4SB`ya`gt&*%Y21OdPF9tD_coPmO>|@kR(yI
zB1+a0Qo0o*glK}z+_2)bH
zofwBpEttwGMFgchm(ef6MoJ!5%BERtYs?BBRG*a@G-?C$&T4
z>l-HDO-E)QRNbuTd}d~^O`ni%^(}aH_>BXK7S&h=H?U4t(jOEkSbeJ&2NVh9yho`S3uecDk^
zGsl~HI*z?%loB30T)tUQvKza5#=NTPPM2ij)d9)Tu{aUjQEKhPhK{((+>GuQWQCANmXV3iq%wW4RXAVlDYK~Py`b~rCH;a``1xuH
zu;N0?^P;mU0ej<%U3fJNq~nBeSM+#DVEG=KGmTWRvURONsP6n@*xh~cVwgIKj
z3H*{079-s?6d|p8_xKJejmM)o7v(+TwZsRye@fn|+K_5%tM;YyF|0*VzsqwnVif$0f^Ex-Ry>Y*2b$jwh1mA4y_dt(Yq0MWG!l
zQD8=mzzecWIMJof`+j4ncC#46MW7_Y@;pt(`$k_;Y9X+}xSHAG>nrL^1QOn69=}nf^by)#38K@bPdb^ja
zU4DFmb{$aOL^>`};g;}J=)fHL#=MT)TJd9hx2=C0qVjrI{H5F=V`R4>T4~|J55^K#
zS~`h#ZXrW9`^%)O>ejj3*H>g?68D|(PPwcQ13D={ih9{HSlT!M3#iNuo+5}TPZ6%S
z1--2Goa++35v-@off(1(xJp-~B4zJ3su|iAJ{LgDX88#ZEAB5lUtz6!!#O0U=$F3m
zv6X3sC3}vGt|79Wo}go6A*!1nBurDn$X4}LilvvVc7-XIrkgrRIUA_esN>bC>l^$Y
zjYA9fMrqHQol_WSNUUUI)=L8eu=6Nf-dK+QQ)&Z&uE(U>BWb!n=D(J?HU-#dQJJX
zQu*N9H_!85=c-FA-YtXGEVh=i+;`WY5fp`8_l6a$G~>`3tCEB{^`-&AACDYR@!K{u
zjg8$?#c7B2p2|XY1f4r`-AcYl$atk1-lpfhIKiScyTj|?^qGpRif%i2D=SW}PfzL1
zpy}PU%7p>f4!vH4&&VVfjRr);89vyhe431X5#8&g*%oXsZ51XVdqH5uG41383hHFc
zs%*+dzX^TuRqZNAcU+bDfD*rcw6|ErLBeZ;Q(?9cS<1i=Eg2nNLRBj1&_8c}&V5nN
z;nT|T%7RCmowlDR9L&mYGilr@IN+ST)m_=_A~n@L#ZTaMgWOEaB4yo%j-!wT=wEnJerb6OScXPK^54z&?-3mEo
zEnU70zXSzTYpS!^n!9(8-3wyR}`3UTtl(ntI
zh^q9XW=-f>`eK2L@kG)UwxV#F%As)BL(sH|w;o4ow~0{n4#7jm=YDQjGI8y%$l$i@<1+#wt@pThrQSJ8WWeT=ejysE-J(2vPP$7AA
z7t#PjEQ_{4@noYyVd_GvOwtD*)Qn(eXC?U)^nCzjFnP9UHc_}g)lPq+Mnkr0CcSV}
zu3azNGwDMnvE!;~w&D7FF_-QHM!pi_&Gc3Ti6}y^Z1Vc0&_K*fLl9}vm~85jbk4m*
zb9VJ(HI=lV#2f9Pg-_MH@>mB-w357%XQeEQTnjhNNl66U4;{wXoKqbW^CQ>?=l~hVsW)}qN)C|duida%|Evc4^S=B*=YjEOwwGID8a0gQmld8Eu5TMsd+x5HVmZ@w
ziI^~u4Lz$#vKtdz#54z3Np~#FUvtp96BhGO25GID*R$?%yKHD+#{BK08#bGmOH3Yn
zkh!^Pb8YVCrcS?mM=~D9C1&cpuiwslI^zUeDCg#ej>}bU{P7*p%hlNIbCzOdb;6qx
z(P4~R$D|nlS{smP8fWymUw51TaqS)Zq(yFJNOt(+-^v^96hOPRk!b6ZtIS4qU)lN?
z7i4y~$q0U0@tV@ZB_8g_b3H_!l*jzY$ZUGnz*G?x)9`|;r$RQDBw7TYJ*m=(Jex*|
zn`0{Y79OPS@FMKIZv%panjC4kcvUmeg_0O=+~w65R+c%cZ8QVd%o*HyY@hV8(XPDx
zWWuAV`QXvuM`oXRJ`WB)7S)PL6TOu!W#sEd5)asGMz&0^-*G-)^>Qyr$)zXP%6zz2
zWMYdwtn~Fc17%$a0|e*N+-VmBd}yIc6#sL
z6nd%Q;m6_|q)Eu4jYLE`D|zrv)?E8NjVbjE3yY5;oy6Fx#>uy~I4YyJLh^&o!cpjg
z_{1uo6Rd}?pDnD9n@C|zPnm6Gr<&%tHRs%CcNDa>9XKplo@V(XN~~!8AyQX%$~5B*
zQaJFj+)=8kivtkr)%zz
z$d^?n9!pgoc;%QfF;Ll@le@UDjQ5I?n9)RjMpi7KzaLy5%X6Ge3pnqbq5t4bXj&_5
zc%iwxG1>jxifW7vDHiQ3@#zD~>Dsdfc(;7E`Qz4g7a|T~1}`6ybGf&wHwE*`liQ6l4oAm{WMG@s9wP+7(TzUQ`oY1
zvtZp-d#RbTTH9TcZ=qg#T0CM~eoE08n@kESNza?K{MeWLRXCzngUV;jrfu)wWC)8R
zMix%^#&s^7AIm)_r}R{rtfpQMy5`szWQ0K4|?)7vFus?R867(PxIA#s%=kCR7qxUnwFJa
z_crVOZTvl=J!;E+eIb>DAg_G37nmpB(o6q6+QQax)ltiObZ_pqeKUKZ~?StM+0=L_bfEmCs3R=3!k-TGmNa=AFEK*lTDQN@z=DPof(`B+@;
z&>r8nrB437e%)Pl4l*k@f{S&mkLlRHsA8Tc#f#|74cCr*u9|Z-ERf4!lqU$BW@W}Y
z*<0rCZn&)-Hfjosf$N~|pGwKY>yM9T-6))Z=-;oNY=3Qwk`oMrOl?J3W(GwDg>+)^
zlWUJS?Q@K6k2STr0iIIpNh8$yJ*e9Hw)J?1W$W4_M;lyMX+vAzT`+rzkOu0t}W}?MSzI9alzUxKIQF*!2m0}Rt)Ln+Fv5;%yc}`{>!H@53ANr)h(fVmi
z_z9|j#{T1bw}05Ukaaoj?3seiLb-H}fjx140v|e$0uJ)=W^oBY29PCQ0&veChC#qf5Z(a;h?A8Kn8@bP!Dt<{4jf7f
zVg?`~+r+{892$dQYi#m`0(dfj?C0@(2{2e-V4zMQN{7wygducwbzyKM42gsS2q-t0
z#iIm4SzI+f#WII6olE5~eR)ha3(V)Fc(DC>1`r4!2Y(?4q*PK6F!;p)|9Od?%cH@_
zzylhH2LQm3a5x?cM?#Uhu1NZ5H=S7J+=if+)T)gbp0$e_llI8DpOvzR@Uv>Ct
z^kn+@E@|-5-y><%uQ*?Sj`tFVMupM6={|rXT!0zz8$ACr%vX)y#KV{T&JiAy@lW7<
z$?xERcYjR&YkHSlUz!GjF`Meo_mOOD0O5y6ps}e;8e!=cL1SR4SQ-{e#nZ7+G!{#T
z;&H&mgHFeI;NU0(4vqSbip=8jC@dBE)-2iVWD^i9S%hz=@bl&
zip8Pm=p`!tv=NMK$OaIk4*c7QjW>nIU~_y7AeKy)f6zC9J=2G7$D{C*hQQ*`SUeUe
zTr?hw`4Zg{pCg^a1=a+g69Lyj;Fr{CRDub>NC9e-=|l0P!+cquO9K8Z5^R`3bZ;kP
zfSt9hidgpMo6!09LjHsjfHVM8Lg6n$z^5g~rEz|Fd;9Z;9av1jDDs=g>6^>|f&&78
z!(j;i^&72}BN^!lN4lKY$w!bO{8IUbHqh;5erA+
zD0m<+49i&~|U;5&I(gYa%w~@b;
z-@nuKce?&k2L2NG@9O$HU4JP9e+m3|b^Y7YCI0P`8Jz{Zkpu!C#G)SBy#hX_iTRp2
zb3ve0YxzF`(CIVsz@P|^Y()|o5m1m**Icz`(|KTsNH#XIm+wqSB#VRKqJnFuKD${<
z+lqOd=k9Vf5imS?kD?ArPBsfDKavwMx2f2_Do?p$?=KNlw!ZwhcI`XYiHy&no*dYF
T2_+RDfDS|^SsNGcaF6&O#taN}
literal 0
HcmV?d00001
diff --git a/applications/external/mfkey32/mfkey32.c b/applications/external/mfkey32/mfkey32.c
new file mode 100644
index 000000000..ac08d2ddc
--- /dev/null
+++ b/applications/external/mfkey32/mfkey32.c
@@ -0,0 +1,1285 @@
+#pragma GCC optimize("O3")
+#pragma GCC optimize("-funroll-all-loops")
+
+// TODO: Handle back button correctly
+// TODO: Add keys to top of the user dictionary, not the bottom
+
+#include
+#include
+#include "time.h"
+#include
+#include
+#include
+#include
+#include "mfkey32_icons.h"
+#include
+#include
+#include
+#include
+#include
+#include
+#include
+#include
+#include
+
+#define MF_CLASSIC_DICT_FLIPPER_PATH EXT_PATH("nfc/assets/mf_classic_dict.nfc")
+#define MF_CLASSIC_DICT_USER_PATH EXT_PATH("nfc/assets/mf_classic_dict_user.nfc")
+#define MF_CLASSIC_NONCE_PATH EXT_PATH("nfc/.mfkey32.log")
+#define TAG "Mfkey32"
+#define NFC_MF_CLASSIC_KEY_LEN (13)
+
+// MSB_LIMIT: Chunk size (out of 256)
+#define MSB_LIMIT 16
+#define MIN_RAM 114500
+#define LF_POLY_ODD (0x29CE5C)
+#define LF_POLY_EVEN (0x870804)
+#define CONST_M1_1 (LF_POLY_EVEN << 1 | 1)
+#define CONST_M2_1 (LF_POLY_ODD << 1)
+#define CONST_M1_2 (LF_POLY_ODD)
+#define CONST_M2_2 (LF_POLY_EVEN << 1 | 1)
+#define BIT(x, n) ((x) >> (n)&1)
+#define BEBIT(x, n) BIT(x, (n) ^ 24)
+#define SWAPENDIAN(x) (x = (x >> 8 & 0xff00ff) | (x & 0xff00ff) << 8, x = x >> 16 | x << 16)
+//#define SIZEOF(arr) sizeof(arr) / sizeof(*arr)
+
+struct Crypto1State {
+ uint32_t odd, even;
+};
+struct Crypto1Params {
+ uint64_t key;
+ uint32_t nr0_enc, uid_xor_nt0, uid_xor_nt1, nr1_enc, p64b, ar1_enc;
+};
+struct Msb {
+ int tail;
+ uint32_t states[768];
+};
+
+typedef enum {
+ EventTypeTick,
+ EventTypeKey,
+} EventType;
+
+typedef struct {
+ EventType type;
+ InputEvent input;
+} PluginEvent;
+
+typedef enum {
+ MissingNonces,
+ ZeroNonces,
+ OutOfMemory,
+} MfkeyError;
+
+typedef enum {
+ Ready,
+ Initializing,
+ DictionaryAttack,
+ MfkeyAttack,
+ Complete,
+ Error,
+ Help,
+} MfkeyState;
+
+typedef struct {
+ FuriMutex* mutex;
+ MfkeyError err;
+ MfkeyState mfkey_state;
+ int cracked;
+ int unique_cracked;
+ int total;
+ int dict_count;
+ int search;
+ bool is_thread_running;
+ bool close_thread_please;
+ FuriThread* mfkeythread;
+} ProgramState;
+
+// TODO: Merge this with Crypto1Params?
+typedef struct {
+ uint32_t uid; // serial number
+ uint32_t nt0; // tag challenge first
+ uint32_t nt1; // tag challenge second
+ uint32_t nr0_enc; // first encrypted reader challenge
+ uint32_t ar0_enc; // first encrypted reader response
+ uint32_t nr1_enc; // second encrypted reader challenge
+ uint32_t ar1_enc; // second encrypted reader response
+} MfClassicNonce;
+
+typedef struct {
+ Stream* stream;
+ uint32_t total_nonces;
+ MfClassicNonce* remaining_nonce_array;
+ size_t remaining_nonces;
+} MfClassicNonceArray;
+
+struct MfClassicDict {
+ Stream* stream;
+ uint32_t total_keys;
+};
+
+static const uint8_t table[256] = {
+ 0, 1, 1, 2, 1, 2, 2, 3, 1, 2, 2, 3, 2, 3, 3, 4, 1, 2, 2, 3, 2, 3, 3, 4, 2, 3, 3, 4, 3,
+ 4, 4, 5, 1, 2, 2, 3, 2, 3, 3, 4, 2, 3, 3, 4, 3, 4, 4, 5, 2, 3, 3, 4, 3, 4, 4, 5, 3, 4,
+ 4, 5, 4, 5, 5, 6, 1, 2, 2, 3, 2, 3, 3, 4, 2, 3, 3, 4, 3, 4, 4, 5, 2, 3, 3, 4, 3, 4, 4,
+ 5, 3, 4, 4, 5, 4, 5, 5, 6, 2, 3, 3, 4, 3, 4, 4, 5, 3, 4, 4, 5, 4, 5, 5, 6, 3, 4, 4, 5,
+ 4, 5, 5, 6, 4, 5, 5, 6, 5, 6, 6, 7, 1, 2, 2, 3, 2, 3, 3, 4, 2, 3, 3, 4, 3, 4, 4, 5, 2,
+ 3, 3, 4, 3, 4, 4, 5, 3, 4, 4, 5, 4, 5, 5, 6, 2, 3, 3, 4, 3, 4, 4, 5, 3, 4, 4, 5, 4, 5,
+ 5, 6, 3, 4, 4, 5, 4, 5, 5, 6, 4, 5, 5, 6, 5, 6, 6, 7, 2, 3, 3, 4, 3, 4, 4, 5, 3, 4, 4,
+ 5, 4, 5, 5, 6, 3, 4, 4, 5, 4, 5, 5, 6, 4, 5, 5, 6, 5, 6, 6, 7, 3, 4, 4, 5, 4, 5, 5, 6,
+ 4, 5, 5, 6, 5, 6, 6, 7, 4, 5, 5, 6, 5, 6, 6, 7, 5, 6, 6, 7, 6, 7, 7, 8};
+static const uint8_t lookup1[256] = {
+ 0, 0, 16, 16, 0, 16, 0, 0, 0, 16, 0, 0, 16, 16, 16, 16, 0, 0, 16, 16, 0, 16, 0, 0,
+ 0, 16, 0, 0, 16, 16, 16, 16, 0, 0, 16, 16, 0, 16, 0, 0, 0, 16, 0, 0, 16, 16, 16, 16,
+ 8, 8, 24, 24, 8, 24, 8, 8, 8, 24, 8, 8, 24, 24, 24, 24, 8, 8, 24, 24, 8, 24, 8, 8,
+ 8, 24, 8, 8, 24, 24, 24, 24, 8, 8, 24, 24, 8, 24, 8, 8, 8, 24, 8, 8, 24, 24, 24, 24,
+ 0, 0, 16, 16, 0, 16, 0, 0, 0, 16, 0, 0, 16, 16, 16, 16, 0, 0, 16, 16, 0, 16, 0, 0,
+ 0, 16, 0, 0, 16, 16, 16, 16, 8, 8, 24, 24, 8, 24, 8, 8, 8, 24, 8, 8, 24, 24, 24, 24,
+ 0, 0, 16, 16, 0, 16, 0, 0, 0, 16, 0, 0, 16, 16, 16, 16, 0, 0, 16, 16, 0, 16, 0, 0,
+ 0, 16, 0, 0, 16, 16, 16, 16, 8, 8, 24, 24, 8, 24, 8, 8, 8, 24, 8, 8, 24, 24, 24, 24,
+ 8, 8, 24, 24, 8, 24, 8, 8, 8, 24, 8, 8, 24, 24, 24, 24, 0, 0, 16, 16, 0, 16, 0, 0,
+ 0, 16, 0, 0, 16, 16, 16, 16, 8, 8, 24, 24, 8, 24, 8, 8, 8, 24, 8, 8, 24, 24, 24, 24,
+ 8, 8, 24, 24, 8, 24, 8, 8, 8, 24, 8, 8, 24, 24, 24, 24};
+static const uint8_t lookup2[256] = {
+ 0, 0, 4, 4, 0, 4, 0, 0, 0, 4, 0, 0, 4, 4, 4, 4, 0, 0, 4, 4, 0, 4, 0, 0, 0, 4, 0, 0, 4,
+ 4, 4, 4, 2, 2, 6, 6, 2, 6, 2, 2, 2, 6, 2, 2, 6, 6, 6, 6, 2, 2, 6, 6, 2, 6, 2, 2, 2, 6,
+ 2, 2, 6, 6, 6, 6, 0, 0, 4, 4, 0, 4, 0, 0, 0, 4, 0, 0, 4, 4, 4, 4, 2, 2, 6, 6, 2, 6, 2,
+ 2, 2, 6, 2, 2, 6, 6, 6, 6, 0, 0, 4, 4, 0, 4, 0, 0, 0, 4, 0, 0, 4, 4, 4, 4, 0, 0, 4, 4,
+ 0, 4, 0, 0, 0, 4, 0, 0, 4, 4, 4, 4, 0, 0, 4, 4, 0, 4, 0, 0, 0, 4, 0, 0, 4, 4, 4, 4, 2,
+ 2, 6, 6, 2, 6, 2, 2, 2, 6, 2, 2, 6, 6, 6, 6, 0, 0, 4, 4, 0, 4, 0, 0, 0, 4, 0, 0, 4, 4,
+ 4, 4, 0, 0, 4, 4, 0, 4, 0, 0, 0, 4, 0, 0, 4, 4, 4, 4, 2, 2, 6, 6, 2, 6, 2, 2, 2, 6, 2,
+ 2, 6, 6, 6, 6, 2, 2, 6, 6, 2, 6, 2, 2, 2, 6, 2, 2, 6, 6, 6, 6, 2, 2, 6, 6, 2, 6, 2, 2,
+ 2, 6, 2, 2, 6, 6, 6, 6, 2, 2, 6, 6, 2, 6, 2, 2, 2, 6, 2, 2, 6, 6, 6, 6};
+
+uint32_t prng_successor(uint32_t x, uint32_t n) {
+ SWAPENDIAN(x);
+ while(n--) x = x >> 1 | (x >> 16 ^ x >> 18 ^ x >> 19 ^ x >> 21) << 31;
+ return SWAPENDIAN(x);
+}
+
+static inline int filter(uint32_t const x) {
+ uint32_t f;
+ f = lookup1[x & 0xff] | lookup2[(x >> 8) & 0xff];
+ f |= 0x0d938 >> (x >> 16 & 0xf) & 1;
+ return BIT(0xEC57E80A, f);
+}
+
+static inline uint8_t evenparity32(uint32_t x) {
+ if((table[x & 0xff] + table[(x >> 8) & 0xff] + table[(x >> 16) & 0xff] + table[x >> 24]) % 2 ==
+ 0) {
+ return 0;
+ } else {
+ return 1;
+ }
+ //return ((table[x & 0xff] + table[(x >> 8) & 0xff] + table[(x >> 16) & 0xff] + table[x >> 24]) % 2) & 0xFF;
+}
+
+static inline void update_contribution(unsigned int data[], int item, int mask1, int mask2) {
+ int p = data[item] >> 25;
+ p = p << 1 | evenparity32(data[item] & mask1);
+ p = p << 1 | evenparity32(data[item] & mask2);
+ data[item] = p << 24 | (data[item] & 0xffffff);
+}
+
+void crypto1_get_lfsr(struct Crypto1State* state, uint64_t* lfsr) {
+ int i;
+ for(*lfsr = 0, i = 23; i >= 0; --i) {
+ *lfsr = *lfsr << 1 | BIT(state->odd, i ^ 3);
+ *lfsr = *lfsr << 1 | BIT(state->even, i ^ 3);
+ }
+}
+
+static inline uint32_t crypt_word(struct Crypto1State* s) {
+ // "in" and "x" are always 0 (last iteration)
+ uint32_t res_ret = 0;
+ uint32_t feedin, t;
+ for(int i = 0; i <= 31; i++) {
+ res_ret |= (filter(s->odd) << (24 ^ i));
+ feedin = LF_POLY_EVEN & s->even;
+ feedin ^= LF_POLY_ODD & s->odd;
+ s->even = s->even << 1 | (evenparity32(feedin));
+ t = s->odd, s->odd = s->even, s->even = t;
+ }
+ return res_ret;
+}
+
+static inline void crypt_word_noret(struct Crypto1State* s, uint32_t in, int x) {
+ uint8_t ret;
+ uint32_t feedin, t, next_in;
+ for(int i = 0; i <= 31; i++) {
+ next_in = BEBIT(in, i);
+ ret = filter(s->odd);
+ feedin = ret & (!!x);
+ feedin ^= LF_POLY_EVEN & s->even;
+ feedin ^= LF_POLY_ODD & s->odd;
+ feedin ^= !!next_in;
+ s->even = s->even << 1 | (evenparity32(feedin));
+ t = s->odd, s->odd = s->even, s->even = t;
+ }
+ return;
+}
+
+static inline void rollback_word_noret(struct Crypto1State* s, uint32_t in, int x) {
+ uint8_t ret;
+ uint32_t feedin, t, next_in;
+ for(int i = 31; i >= 0; i--) {
+ next_in = BEBIT(in, i);
+ s->odd &= 0xffffff;
+ t = s->odd, s->odd = s->even, s->even = t;
+ ret = filter(s->odd);
+ feedin = ret & (!!x);
+ feedin ^= s->even & 1;
+ feedin ^= LF_POLY_EVEN & (s->even >>= 1);
+ feedin ^= LF_POLY_ODD & s->odd;
+ feedin ^= !!next_in;
+ s->even |= (evenparity32(feedin)) << 23;
+ }
+ return;
+}
+
+int key_already_found_for_nonce(
+ uint64_t* keyarray,
+ int keyarray_size,
+ uint32_t uid_xor_nt1,
+ uint32_t nr1_enc,
+ uint32_t p64b,
+ uint32_t ar1_enc) {
+ for(int k = 0; k < keyarray_size; k++) {
+ struct Crypto1State temp = {0, 0};
+
+ for(int i = 0; i < 24; i++) {
+ (&temp)->odd |= (BIT(keyarray[k], 2 * i + 1) << (i ^ 3));
+ (&temp)->even |= (BIT(keyarray[k], 2 * i) << (i ^ 3));
+ }
+
+ crypt_word_noret(&temp, uid_xor_nt1, 0);
+ crypt_word_noret(&temp, nr1_enc, 1);
+
+ if(ar1_enc == (crypt_word(&temp) ^ p64b)) {
+ return 1;
+ }
+ }
+ return 0;
+}
+
+int check_state(struct Crypto1State* t, struct Crypto1Params* p) {
+ if(!(t->odd | t->even)) return 0;
+ rollback_word_noret(t, 0, 0);
+ rollback_word_noret(t, p->nr0_enc, 1);
+ rollback_word_noret(t, p->uid_xor_nt0, 0);
+ struct Crypto1State temp = {t->odd, t->even};
+ crypt_word_noret(t, p->uid_xor_nt1, 0);
+ crypt_word_noret(t, p->nr1_enc, 1);
+ if(p->ar1_enc == (crypt_word(t) ^ p->p64b)) {
+ crypto1_get_lfsr(&temp, &(p->key));
+ return 1;
+ }
+ return 0;
+}
+
+static inline int state_loop(unsigned int* states_buffer, int xks, int m1, int m2) {
+ int states_tail = 0;
+ int round = 0, s = 0, xks_bit = 0;
+
+ for(round = 1; round <= 12; round++) {
+ xks_bit = BIT(xks, round);
+
+ for(s = 0; s <= states_tail; s++) {
+ states_buffer[s] <<= 1;
+
+ if((filter(states_buffer[s]) ^ filter(states_buffer[s] | 1)) != 0) {
+ states_buffer[s] |= filter(states_buffer[s]) ^ xks_bit;
+ if(round > 4) {
+ update_contribution(states_buffer, s, m1, m2);
+ }
+ } else if(filter(states_buffer[s]) == xks_bit) {
+ // TODO: Refactor
+ if(round > 4) {
+ states_buffer[++states_tail] = states_buffer[s + 1];
+ states_buffer[s + 1] = states_buffer[s] | 1;
+ update_contribution(states_buffer, s, m1, m2);
+ s++;
+ update_contribution(states_buffer, s, m1, m2);
+ } else {
+ states_buffer[++states_tail] = states_buffer[++s];
+ states_buffer[s] = states_buffer[s - 1] | 1;
+ }
+ } else {
+ states_buffer[s--] = states_buffer[states_tail--];
+ }
+ }
+ }
+
+ return states_tail;
+}
+
+int binsearch(unsigned int data[], int start, int stop) {
+ int mid, val = data[stop] & 0xff000000;
+ while(start != stop) {
+ mid = (stop - start) >> 1;
+ if((data[start + mid] ^ 0x80000000) > (val ^ 0x80000000))
+ stop = start + mid;
+ else
+ start += mid + 1;
+ }
+ return start;
+}
+void quicksort(unsigned int array[], int low, int high) {
+ //if (SIZEOF(array) == 0)
+ // return;
+ if(low >= high) return;
+ int middle = low + (high - low) / 2;
+ unsigned int pivot = array[middle];
+ int i = low, j = high;
+ while(i <= j) {
+ while(array[i] < pivot) {
+ i++;
+ }
+ while(array[j] > pivot) {
+ j--;
+ }
+ if(i <= j) { // swap
+ int temp = array[i];
+ array[i] = array[j];
+ array[j] = temp;
+ i++;
+ j--;
+ }
+ }
+ if(low < j) {
+ quicksort(array, low, j);
+ }
+ if(high > i) {
+ quicksort(array, i, high);
+ }
+}
+int extend_table(unsigned int data[], int tbl, int end, int bit, int m1, int m2) {
+ for(data[tbl] <<= 1; tbl <= end; data[++tbl] <<= 1) {
+ if((filter(data[tbl]) ^ filter(data[tbl] | 1)) != 0) {
+ data[tbl] |= filter(data[tbl]) ^ bit;
+ update_contribution(data, tbl, m1, m2);
+ } else if(filter(data[tbl]) == bit) {
+ data[++end] = data[tbl + 1];
+ data[tbl + 1] = data[tbl] | 1;
+ update_contribution(data, tbl, m1, m2);
+ tbl++;
+ update_contribution(data, tbl, m1, m2);
+ } else {
+ data[tbl--] = data[end--];
+ }
+ }
+ return end;
+}
+
+int old_recover(
+ unsigned int odd[],
+ int o_head,
+ int o_tail,
+ int oks,
+ unsigned int even[],
+ int e_head,
+ int e_tail,
+ int eks,
+ int rem,
+ int s,
+ struct Crypto1Params* p,
+ int first_run) {
+ int o, e, i;
+ if(rem == -1) {
+ for(e = e_head; e <= e_tail; ++e) {
+ even[e] = (even[e] << 1) ^ evenparity32(even[e] & LF_POLY_EVEN);
+ for(o = o_head; o <= o_tail; ++o, ++s) {
+ struct Crypto1State temp = {0, 0};
+ temp.even = odd[o];
+ temp.odd = even[e] ^ evenparity32(odd[o] & LF_POLY_ODD);
+ if(check_state(&temp, p)) {
+ return -1;
+ }
+ }
+ }
+ return s;
+ }
+ if(first_run == 0) {
+ for(i = 0; (i < 4) && (rem-- != 0); i++) {
+ oks >>= 1;
+ eks >>= 1;
+ o_tail = extend_table(
+ odd, o_head, o_tail, oks & 1, LF_POLY_EVEN << 1 | 1, LF_POLY_ODD << 1);
+ if(o_head > o_tail) return s;
+ e_tail =
+ extend_table(even, e_head, e_tail, eks & 1, LF_POLY_ODD, LF_POLY_EVEN << 1 | 1);
+ if(e_head > e_tail) return s;
+ }
+ }
+ first_run = 0;
+ quicksort(odd, o_head, o_tail);
+ quicksort(even, e_head, e_tail);
+ while(o_tail >= o_head && e_tail >= e_head) {
+ if(((odd[o_tail] ^ even[e_tail]) >> 24) == 0) {
+ o_tail = binsearch(odd, o_head, o = o_tail);
+ e_tail = binsearch(even, e_head, e = e_tail);
+ s = old_recover(odd, o_tail--, o, oks, even, e_tail--, e, eks, rem, s, p, first_run);
+ if(s == -1) {
+ break;
+ }
+ } else if((odd[o_tail] ^ 0x80000000) > (even[e_tail] ^ 0x80000000)) {
+ o_tail = binsearch(odd, o_head, o_tail) - 1;
+ } else {
+ e_tail = binsearch(even, e_head, e_tail) - 1;
+ }
+ }
+ return s;
+}
+
+int calculate_msb_tables(
+ int oks,
+ int eks,
+ int msb_round,
+ struct Crypto1Params* p,
+ unsigned int* states_buffer,
+ struct Msb* odd_msbs,
+ struct Msb* even_msbs,
+ unsigned int* temp_states_odd,
+ unsigned int* temp_states_even) {
+ //FURI_LOG_I(TAG, "MSB GO %i", msb_iter); // DEBUG
+ unsigned int msb_head = (MSB_LIMIT * msb_round); // msb_iter ranges from 0 to (256/MSB_LIMIT)-1
+ unsigned int msb_tail = (MSB_LIMIT * (msb_round + 1));
+ int states_tail = 0, tail = 0;
+ int i = 0, j = 0, semi_state = 0, found = 0;
+ unsigned int msb = 0;
+ // TODO: Why is this necessary?
+ memset(odd_msbs, 0, MSB_LIMIT * sizeof(struct Msb));
+ memset(even_msbs, 0, MSB_LIMIT * sizeof(struct Msb));
+
+ for(semi_state = 1 << 20; semi_state >= 0; semi_state--) {
+ //if (main_iter % 2048 == 0) {
+ // FURI_LOG_I(TAG, "On main_iter %i", main_iter); // DEBUG
+ //}
+ if(filter(semi_state) == (oks & 1)) {
+ states_buffer[0] = semi_state;
+ states_tail = state_loop(states_buffer, oks, CONST_M1_1, CONST_M2_1);
+
+ for(i = states_tail; i >= 0; i--) {
+ msb = states_buffer[i] >> 24;
+ if((msb >= msb_head) && (msb < msb_tail)) {
+ found = 0;
+ for(j = 0; j < odd_msbs[msb - msb_head].tail - 1; j++) {
+ if(odd_msbs[msb - msb_head].states[j] == states_buffer[i]) {
+ found = 1;
+ break;
+ }
+ }
+
+ if(!found) {
+ tail = odd_msbs[msb - msb_head].tail++;
+ odd_msbs[msb - msb_head].states[tail] = states_buffer[i];
+ }
+ }
+ }
+ }
+
+ if(filter(semi_state) == (eks & 1)) {
+ states_buffer[0] = semi_state;
+ states_tail = state_loop(states_buffer, eks, CONST_M1_2, CONST_M2_2);
+
+ for(i = 0; i <= states_tail; i++) {
+ msb = states_buffer[i] >> 24;
+ if((msb >= msb_head) && (msb < msb_tail)) {
+ found = 0;
+
+ for(j = 0; j < even_msbs[msb - msb_head].tail; j++) {
+ if(even_msbs[msb - msb_head].states[j] == states_buffer[i]) {
+ found = 1;
+ break;
+ }
+ }
+
+ if(!found) {
+ tail = even_msbs[msb - msb_head].tail++;
+ even_msbs[msb - msb_head].states[tail] = states_buffer[i];
+ }
+ }
+ }
+ }
+ }
+
+ oks >>= 12;
+ eks >>= 12;
+
+ for(i = 0; i < MSB_LIMIT; i++) {
+ memcpy(temp_states_odd, odd_msbs[i].states, odd_msbs[i].tail * sizeof(unsigned int));
+ memcpy(temp_states_even, even_msbs[i].states, even_msbs[i].tail * sizeof(unsigned int));
+ int res = old_recover(
+ temp_states_odd,
+ 0,
+ odd_msbs[i].tail,
+ oks,
+ temp_states_even,
+ 0,
+ even_msbs[i].tail,
+ eks,
+ 3,
+ 0,
+ p,
+ 1);
+ if(res == -1) {
+ return 1;
+ }
+ //odd_msbs[i].tail = 0;
+ //even_msbs[i].tail = 0;
+ }
+
+ return 0;
+}
+
+int recover(struct Crypto1Params* p, int ks2, ProgramState* const program_state) {
+ unsigned int* states_buffer = malloc(sizeof(unsigned int) * (2 << 9));
+ struct Msb* odd_msbs = (struct Msb*)malloc(MSB_LIMIT * sizeof(struct Msb));
+ struct Msb* even_msbs = (struct Msb*)malloc(MSB_LIMIT * sizeof(struct Msb));
+ unsigned int* temp_states_odd = malloc(sizeof(unsigned int) * (1280));
+ unsigned int* temp_states_even = malloc(sizeof(unsigned int) * (1280));
+ int oks = 0, eks = 0;
+ int i = 0, msb = 0;
+ for(i = 31; i >= 0; i -= 2) {
+ oks = oks << 1 | BEBIT(ks2, i);
+ }
+ for(i = 30; i >= 0; i -= 2) {
+ eks = eks << 1 | BEBIT(ks2, i);
+ }
+ int bench_start = furi_hal_rtc_get_timestamp();
+ for(msb = 0; msb <= ((256 / MSB_LIMIT) - 1); msb++) {
+ //printf("MSB: %i\n", msb);
+ program_state->search = msb;
+ if(calculate_msb_tables(
+ oks,
+ eks,
+ msb,
+ p,
+ states_buffer,
+ odd_msbs,
+ even_msbs,
+ temp_states_odd,
+ temp_states_even)) {
+ int bench_stop = furi_hal_rtc_get_timestamp();
+ FURI_LOG_I(TAG, "Cracked in %i seconds", bench_stop - bench_start);
+ free(states_buffer);
+ free(odd_msbs);
+ free(even_msbs);
+ free(temp_states_odd);
+ free(temp_states_even);
+ return 1;
+ }
+ }
+ return 0;
+}
+
+bool napi_mf_classic_dict_check_presence(MfClassicDictType dict_type) {
+ Storage* storage = furi_record_open(RECORD_STORAGE);
+
+ bool dict_present = false;
+ if(dict_type == MfClassicDictTypeSystem) {
+ dict_present = storage_common_stat(storage, MF_CLASSIC_DICT_FLIPPER_PATH, NULL) == FSE_OK;
+ } else if(dict_type == MfClassicDictTypeUser) {
+ dict_present = storage_common_stat(storage, MF_CLASSIC_DICT_USER_PATH, NULL) == FSE_OK;
+ }
+
+ furi_record_close(RECORD_STORAGE);
+
+ return dict_present;
+}
+
+MfClassicDict* napi_mf_classic_dict_alloc(MfClassicDictType dict_type) {
+ MfClassicDict* dict = malloc(sizeof(MfClassicDict));
+ Storage* storage = furi_record_open(RECORD_STORAGE);
+ dict->stream = buffered_file_stream_alloc(storage);
+ furi_record_close(RECORD_STORAGE);
+
+ bool dict_loaded = false;
+ do {
+ if(dict_type == MfClassicDictTypeSystem) {
+ if(!buffered_file_stream_open(
+ dict->stream,
+ MF_CLASSIC_DICT_FLIPPER_PATH,
+ FSAM_READ_WRITE,
+ FSOM_OPEN_EXISTING)) {
+ buffered_file_stream_close(dict->stream);
+ break;
+ }
+ } else if(dict_type == MfClassicDictTypeUser) {
+ if(!buffered_file_stream_open(
+ dict->stream, MF_CLASSIC_DICT_USER_PATH, FSAM_READ_WRITE, FSOM_OPEN_ALWAYS)) {
+ buffered_file_stream_close(dict->stream);
+ break;
+ }
+ }
+
+ // Check for newline ending
+ if(!stream_eof(dict->stream)) {
+ if(!stream_seek(dict->stream, -1, StreamOffsetFromEnd)) break;
+ uint8_t last_char = 0;
+ if(stream_read(dict->stream, &last_char, 1) != 1) break;
+ if(last_char != '\n') {
+ FURI_LOG_D(TAG, "Adding new line ending");
+ if(stream_write_char(dict->stream, '\n') != 1) break;
+ }
+ if(!stream_rewind(dict->stream)) break;
+ }
+
+ // Read total amount of keys
+ FuriString* next_line;
+ next_line = furi_string_alloc();
+ while(true) {
+ if(!stream_read_line(dict->stream, next_line)) {
+ FURI_LOG_T(TAG, "No keys left in dict");
+ break;
+ }
+ FURI_LOG_T(
+ TAG,
+ "Read line: %s, len: %zu",
+ furi_string_get_cstr(next_line),
+ furi_string_size(next_line));
+ if(furi_string_get_char(next_line, 0) == '#') continue;
+ if(furi_string_size(next_line) != NFC_MF_CLASSIC_KEY_LEN) continue;
+ dict->total_keys++;
+ }
+ furi_string_free(next_line);
+ stream_rewind(dict->stream);
+
+ dict_loaded = true;
+ FURI_LOG_I(TAG, "Loaded dictionary with %lu keys", dict->total_keys);
+ } while(false);
+
+ if(!dict_loaded) {
+ buffered_file_stream_close(dict->stream);
+ free(dict);
+ dict = NULL;
+ }
+
+ return dict;
+}
+
+bool napi_mf_classic_dict_add_key_str(MfClassicDict* dict, FuriString* key) {
+ furi_assert(dict);
+ furi_assert(dict->stream);
+ FURI_LOG_I(TAG, "Saving key: %s", furi_string_get_cstr(key));
+
+ furi_string_cat_printf(key, "\n");
+
+ bool key_added = false;
+ do {
+ if(!stream_seek(dict->stream, 0, StreamOffsetFromEnd)) break;
+ if(!stream_insert_string(dict->stream, key)) break;
+ dict->total_keys++;
+ key_added = true;
+ } while(false);
+
+ furi_string_left(key, 12);
+ return key_added;
+}
+
+void napi_mf_classic_dict_free(MfClassicDict* dict) {
+ furi_assert(dict);
+ furi_assert(dict->stream);
+
+ buffered_file_stream_close(dict->stream);
+ stream_free(dict->stream);
+ free(dict);
+}
+
+static void napi_mf_classic_dict_int_to_str(uint8_t* key_int, FuriString* key_str) {
+ furi_string_reset(key_str);
+ for(size_t i = 0; i < 6; i++) {
+ furi_string_cat_printf(key_str, "%02X", key_int[i]);
+ }
+}
+
+static void napi_mf_classic_dict_str_to_int(FuriString* key_str, uint64_t* key_int) {
+ uint8_t key_byte_tmp;
+
+ *key_int = 0ULL;
+ for(uint8_t i = 0; i < 12; i += 2) {
+ args_char_to_hex(
+ furi_string_get_char(key_str, i), furi_string_get_char(key_str, i + 1), &key_byte_tmp);
+ *key_int |= (uint64_t)key_byte_tmp << (8 * (5 - i / 2));
+ }
+}
+
+uint32_t napi_mf_classic_dict_get_total_keys(MfClassicDict* dict) {
+ furi_assert(dict);
+
+ return dict->total_keys;
+}
+
+bool napi_mf_classic_dict_rewind(MfClassicDict* dict) {
+ furi_assert(dict);
+ furi_assert(dict->stream);
+
+ return stream_rewind(dict->stream);
+}
+
+bool napi_mf_classic_dict_get_next_key_str(MfClassicDict* dict, FuriString* key) {
+ furi_assert(dict);
+ furi_assert(dict->stream);
+
+ bool key_read = false;
+ furi_string_reset(key);
+ while(!key_read) {
+ if(!stream_read_line(dict->stream, key)) break;
+ if(furi_string_get_char(key, 0) == '#') continue;
+ if(furi_string_size(key) != NFC_MF_CLASSIC_KEY_LEN) continue;
+ furi_string_left(key, 12);
+ key_read = true;
+ }
+
+ return key_read;
+}
+
+bool napi_mf_classic_dict_get_next_key(MfClassicDict* dict, uint64_t* key) {
+ furi_assert(dict);
+ furi_assert(dict->stream);
+
+ FuriString* temp_key;
+ temp_key = furi_string_alloc();
+ bool key_read = napi_mf_classic_dict_get_next_key_str(dict, temp_key);
+ if(key_read) {
+ napi_mf_classic_dict_str_to_int(temp_key, key);
+ }
+ furi_string_free(temp_key);
+ return key_read;
+}
+
+bool napi_mf_classic_dict_is_key_present_str(MfClassicDict* dict, FuriString* key) {
+ furi_assert(dict);
+ furi_assert(dict->stream);
+
+ FuriString* next_line;
+ next_line = furi_string_alloc();
+
+ bool key_found = false;
+ stream_rewind(dict->stream);
+ while(!key_found) { //-V654
+ if(!stream_read_line(dict->stream, next_line)) break;
+ if(furi_string_get_char(next_line, 0) == '#') continue;
+ if(furi_string_size(next_line) != NFC_MF_CLASSIC_KEY_LEN) continue;
+ furi_string_left(next_line, 12);
+ if(!furi_string_equal(key, next_line)) continue;
+ key_found = true;
+ }
+
+ furi_string_free(next_line);
+ return key_found;
+}
+
+bool napi_mf_classic_dict_is_key_present(MfClassicDict* dict, uint8_t* key) {
+ FuriString* temp_key;
+
+ temp_key = furi_string_alloc();
+ napi_mf_classic_dict_int_to_str(key, temp_key);
+ bool key_found = napi_mf_classic_dict_is_key_present_str(dict, temp_key);
+ furi_string_free(temp_key);
+ return key_found;
+}
+
+bool napi_key_already_found_for_nonce(
+ MfClassicDict* dict,
+ uint32_t uid_xor_nt1,
+ uint32_t nr1_enc,
+ uint32_t p64b,
+ uint32_t ar1_enc) {
+ bool found = false;
+ uint64_t k = 0;
+ napi_mf_classic_dict_rewind(dict);
+ while(napi_mf_classic_dict_get_next_key(dict, &k)) {
+ struct Crypto1State temp = {0, 0};
+ int i;
+ for(i = 0; i < 24; i++) {
+ (&temp)->odd |= (BIT(k, 2 * i + 1) << (i ^ 3));
+ (&temp)->even |= (BIT(k, 2 * i) << (i ^ 3));
+ }
+ crypt_word_noret(&temp, uid_xor_nt1, 0);
+ crypt_word_noret(&temp, nr1_enc, 1);
+ if(ar1_enc == (crypt_word(&temp) ^ p64b)) {
+ found = true;
+ break;
+ }
+ }
+ return found;
+}
+
+bool napi_mf_classic_nonces_check_presence() {
+ Storage* storage = furi_record_open(RECORD_STORAGE);
+
+ bool nonces_present = storage_common_stat(storage, MF_CLASSIC_NONCE_PATH, NULL) == FSE_OK;
+
+ furi_record_close(RECORD_STORAGE);
+
+ return nonces_present;
+}
+
+MfClassicNonceArray* napi_mf_classic_nonce_array_alloc(
+ MfClassicDict* system_dict,
+ bool system_dict_exists,
+ MfClassicDict* user_dict,
+ bool user_dict_exists,
+ ProgramState* const program_state) {
+ MfClassicNonceArray* nonce_array = malloc(sizeof(MfClassicNonceArray));
+ MfClassicNonce* remaining_nonce_array_init = malloc(sizeof(MfClassicNonce) * 1);
+ nonce_array->remaining_nonce_array = remaining_nonce_array_init;
+ Storage* storage = furi_record_open(RECORD_STORAGE);
+ nonce_array->stream = buffered_file_stream_alloc(storage);
+ furi_record_close(RECORD_STORAGE);
+
+ bool array_loaded = false;
+ do {
+ // https://github.com/flipperdevices/flipperzero-firmware/blob/5134f44c09d39344a8747655c0d59864bb574b96/applications/services/storage/filesystem_api_defines.h#L8-L22
+ if(!buffered_file_stream_open(
+ nonce_array->stream, MF_CLASSIC_NONCE_PATH, FSAM_READ_WRITE, FSOM_OPEN_EXISTING)) {
+ buffered_file_stream_close(nonce_array->stream);
+ break;
+ }
+
+ // Check for newline ending
+ if(!stream_eof(nonce_array->stream)) {
+ if(!stream_seek(nonce_array->stream, -1, StreamOffsetFromEnd)) break;
+ uint8_t last_char = 0;
+ if(stream_read(nonce_array->stream, &last_char, 1) != 1) break;
+ if(last_char != '\n') {
+ FURI_LOG_D(TAG, "Adding new line ending");
+ if(stream_write_char(nonce_array->stream, '\n') != 1) break;
+ }
+ if(!stream_rewind(nonce_array->stream)) break;
+ }
+
+ // Read total amount of nonces
+ FuriString* next_line;
+ next_line = furi_string_alloc();
+ while(true) {
+ if(!stream_read_line(nonce_array->stream, next_line)) {
+ FURI_LOG_T(TAG, "No nonces left");
+ break;
+ }
+ FURI_LOG_T(
+ TAG,
+ "Read line: %s, len: %zu",
+ furi_string_get_cstr(next_line),
+ furi_string_size(next_line));
+ if(!furi_string_start_with_str(next_line, "Sec")) continue;
+ const char* next_line_cstr = furi_string_get_cstr(next_line);
+ MfClassicNonce res = {0};
+ char token[20];
+ int i = 0;
+ const char* ptr = next_line_cstr;
+ while(sscanf(ptr, "%s", token) == 1) {
+ switch(i) {
+ case 5:
+ sscanf(token, "%lx", &res.uid);
+ break;
+ case 7:
+ sscanf(token, "%lx", &res.nt0);
+ break;
+ case 9:
+ sscanf(token, "%lx", &res.nr0_enc);
+ break;
+ case 11:
+ sscanf(token, "%lx", &res.ar0_enc);
+ break;
+ case 13:
+ sscanf(token, "%lx", &res.nt1);
+ break;
+ case 15:
+ sscanf(token, "%lx", &res.nr1_enc);
+ break;
+ case 17:
+ sscanf(token, "%lx", &res.ar1_enc);
+ break;
+ default:
+ break; // Do nothing
+ }
+ i++;
+ ptr = strchr(ptr, ' ');
+ if(!ptr) {
+ break;
+ }
+ ptr++;
+ }
+ (program_state->total)++;
+ uint32_t p64b = prng_successor(res.nt1, 64);
+ if((system_dict_exists &&
+ napi_key_already_found_for_nonce(
+ system_dict, res.uid ^ res.nt1, res.nr1_enc, p64b, res.ar1_enc)) ||
+ (user_dict_exists &&
+ napi_key_already_found_for_nonce(
+ user_dict, res.uid ^ res.nt1, res.nr1_enc, p64b, res.ar1_enc))) {
+ (program_state->cracked)++;
+ continue;
+ }
+ FURI_LOG_I(TAG, "No key found for %lx %lx", res.uid, res.ar1_enc);
+ // TODO: Refactor
+ nonce_array->remaining_nonce_array = realloc(
+ nonce_array->remaining_nonce_array,
+ sizeof(MfClassicNonce) * ((nonce_array->remaining_nonces) + 1));
+ nonce_array->remaining_nonces++;
+ nonce_array->remaining_nonce_array[(nonce_array->remaining_nonces) - 1] = res;
+ nonce_array->total_nonces++;
+ }
+ furi_string_free(next_line);
+ stream_rewind(nonce_array->stream);
+
+ array_loaded = true;
+ FURI_LOG_I(TAG, "Loaded %lu nonces", nonce_array->total_nonces);
+ } while(false);
+
+ if(!array_loaded) {
+ buffered_file_stream_close(nonce_array->stream);
+ free(nonce_array);
+ nonce_array = NULL;
+ }
+
+ return nonce_array;
+}
+
+void napi_mf_classic_nonce_array_free(MfClassicNonceArray* nonce_array) {
+ furi_assert(nonce_array);
+ furi_assert(nonce_array->stream);
+
+ buffered_file_stream_close(nonce_array->stream);
+ stream_free(nonce_array->stream);
+ free(nonce_array);
+}
+
+static void finished_beep() {
+ // Beep to indicate completion if the speaker is available
+ if(furi_hal_speaker_acquire(1000)) { // Wait up to a second for the speaker
+ float freq = 3000;
+ float volume = 1.0f; // 100% volume
+ furi_hal_speaker_start(freq, volume);
+ furi_delay_ms(75);
+ furi_hal_speaker_stop();
+ furi_hal_speaker_release();
+ }
+}
+
+void mfkey32(ProgramState* const program_state) {
+ uint64_t found_key; // recovered key
+ size_t keyarray_size = 0;
+ uint64_t* keyarray = malloc(sizeof(uint64_t) * 1);
+ uint32_t i = 0;
+ // Check for nonces
+ if(!napi_mf_classic_nonces_check_presence()) {
+ program_state->err = MissingNonces;
+ program_state->mfkey_state = Error;
+ return;
+ }
+ // Read dictionaries (optional)
+ MfClassicDict* system_dict = {0};
+ bool system_dict_exists = napi_mf_classic_dict_check_presence(MfClassicDictTypeSystem);
+ MfClassicDict* user_dict = {0};
+ bool user_dict_exists = napi_mf_classic_dict_check_presence(MfClassicDictTypeUser);
+ uint32_t total_dict_keys = 0;
+ if(system_dict_exists) {
+ system_dict = napi_mf_classic_dict_alloc(MfClassicDictTypeSystem);
+ total_dict_keys += napi_mf_classic_dict_get_total_keys(system_dict);
+ }
+ user_dict = napi_mf_classic_dict_alloc(MfClassicDictTypeUser);
+ if(user_dict_exists) {
+ total_dict_keys += napi_mf_classic_dict_get_total_keys(user_dict);
+ }
+ user_dict_exists = true;
+ program_state->dict_count = total_dict_keys;
+ program_state->mfkey_state = DictionaryAttack;
+ // Read nonces
+ MfClassicNonceArray* nonce_arr;
+ nonce_arr = napi_mf_classic_nonce_array_alloc(
+ system_dict, system_dict_exists, user_dict, user_dict_exists, program_state);
+ if(system_dict_exists) {
+ napi_mf_classic_dict_free(system_dict);
+ }
+ if(nonce_arr->total_nonces == 0) {
+ // Nothing to crack
+ program_state->err = ZeroNonces;
+ program_state->mfkey_state = Error;
+ napi_mf_classic_nonce_array_free(nonce_arr);
+ napi_mf_classic_dict_free(user_dict);
+ free(keyarray);
+ return;
+ }
+ if(memmgr_get_free_heap() < MIN_RAM) {
+ // Insufficient RAM
+ program_state->err = OutOfMemory;
+ program_state->mfkey_state = Error;
+ napi_mf_classic_nonce_array_free(nonce_arr);
+ napi_mf_classic_dict_free(user_dict);
+ free(keyarray);
+ return;
+ }
+ program_state->mfkey_state = MfkeyAttack;
+ for(i = 0; i < nonce_arr->total_nonces; i++) {
+ MfClassicNonce next_nonce = nonce_arr->remaining_nonce_array[i];
+ uint32_t p64 = prng_successor(next_nonce.nt0, 64);
+ uint32_t p64b = prng_successor(next_nonce.nt1, 64);
+ if(key_already_found_for_nonce(
+ keyarray,
+ keyarray_size,
+ next_nonce.uid ^ next_nonce.nt1,
+ next_nonce.nr1_enc,
+ p64b,
+ next_nonce.ar1_enc)) {
+ nonce_arr->remaining_nonces--;
+ (program_state->cracked)++;
+ continue;
+ }
+ FURI_LOG_I(TAG, "Cracking %lx %lx", next_nonce.uid, next_nonce.ar1_enc);
+ struct Crypto1Params p = {
+ 0,
+ next_nonce.nr0_enc,
+ next_nonce.uid ^ next_nonce.nt0,
+ next_nonce.uid ^ next_nonce.nt1,
+ next_nonce.nr1_enc,
+ p64b,
+ next_nonce.ar1_enc};
+ if(recover(&p, next_nonce.ar0_enc ^ p64, program_state) == 0) {
+ // No key found in recover()
+ continue;
+ }
+ found_key = p.key;
+ bool already_found = false;
+ for(i = 0; i < keyarray_size; i++) {
+ if(keyarray[i] == found_key) {
+ already_found = true;
+ break;
+ }
+ }
+ if(already_found == false) {
+ // New key
+ keyarray = realloc(keyarray, sizeof(uint64_t) * (keyarray_size + 1));
+ keyarray_size += 1;
+ keyarray[keyarray_size - 1] = found_key;
+ (program_state->cracked)++;
+ (program_state->unique_cracked)++;
+ }
+ }
+ // TODO: Update display to show all keys were found
+ // TODO: Prepend found key(s) to user dictionary file
+ //FURI_LOG_I(TAG, "Unique keys found:");
+ for(i = 0; i < keyarray_size; i++) {
+ //FURI_LOG_I(TAG, "%012" PRIx64, keyarray[i]);
+ FuriString* temp_key = furi_string_alloc();
+ furi_string_cat_printf(temp_key, "%012" PRIX64, keyarray[i]);
+ napi_mf_classic_dict_add_key_str(user_dict, temp_key);
+ furi_string_free(temp_key);
+ }
+ napi_mf_classic_nonce_array_free(nonce_arr);
+ if(user_dict_exists) {
+ napi_mf_classic_dict_free(user_dict);
+ }
+ free(keyarray);
+ //FURI_LOG_I(TAG, "mfkey32 function completed normally"); // DEBUG
+ program_state->mfkey_state = Complete;
+ finished_beep();
+ return;
+}
+
+// Screen is 128x64 px
+static void render_callback(Canvas* const canvas, void* ctx) {
+ furi_assert(ctx);
+ const ProgramState* program_state = ctx;
+ furi_mutex_acquire(program_state->mutex, FuriWaitForever);
+ char draw_str[32] = {};
+ canvas_clear(canvas);
+ canvas_draw_frame(canvas, 0, 0, 128, 64);
+ canvas_draw_frame(canvas, 0, 15, 128, 64);
+ canvas_set_font(canvas, FontPrimary);
+ canvas_draw_str_aligned(canvas, 5, 4, AlignLeft, AlignTop, "Mfkey32");
+ canvas_draw_icon(canvas, 114, 4, &I_mfkey);
+ if(program_state->is_thread_running && program_state->mfkey_state == MfkeyAttack) {
+ float progress = (float)program_state->cracked / (float)program_state->total;
+ elements_progress_bar_with_text(canvas, 5, 18, 118, progress, draw_str);
+ canvas_set_font(canvas, FontSecondary);
+ snprintf(
+ draw_str,
+ sizeof(draw_str),
+ "Keys found: %d/%d (in prog.)",
+ program_state->cracked,
+ program_state->total);
+ canvas_draw_str_aligned(canvas, 5, 31, AlignLeft, AlignTop, draw_str);
+ snprintf(
+ draw_str, sizeof(draw_str), "Search: %d/%d", program_state->search, 256 / MSB_LIMIT);
+ canvas_draw_str_aligned(canvas, 26, 41, AlignLeft, AlignTop, draw_str);
+ } else if(program_state->is_thread_running && program_state->mfkey_state == DictionaryAttack) {
+ elements_progress_bar_with_text(canvas, 5, 18, 118, 0, draw_str);
+ canvas_set_font(canvas, FontSecondary);
+ snprintf(
+ draw_str, sizeof(draw_str), "Dict solves: %d (in progress)", program_state->cracked);
+ canvas_draw_str_aligned(canvas, 10, 31, AlignLeft, AlignTop, draw_str);
+ snprintf(draw_str, sizeof(draw_str), "Keys in dict: %d", program_state->dict_count);
+ canvas_draw_str_aligned(canvas, 26, 41, AlignLeft, AlignTop, draw_str);
+ } else if(program_state->mfkey_state == Complete) {
+ // TODO: Scrollable list view to see cracked keys if user presses down
+ elements_progress_bar_with_text(canvas, 5, 18, 118, 1, draw_str);
+ canvas_set_font(canvas, FontSecondary);
+ snprintf(draw_str, sizeof(draw_str), "Complete");
+ canvas_draw_str_aligned(canvas, 40, 31, AlignLeft, AlignTop, draw_str);
+ snprintf(
+ draw_str,
+ sizeof(draw_str),
+ "Keys added to user dict: %d",
+ program_state->unique_cracked);
+ canvas_draw_str_aligned(canvas, 10, 41, AlignLeft, AlignTop, draw_str);
+ } else if(program_state->mfkey_state == Ready) {
+ canvas_set_font(canvas, FontSecondary);
+ canvas_draw_str_aligned(canvas, 50, 30, AlignLeft, AlignTop, "Ready");
+ elements_button_center(canvas, "Start");
+ elements_button_right(canvas, "Help");
+ } else if(program_state->mfkey_state == Help) {
+ canvas_set_font(canvas, FontSecondary);
+ canvas_draw_str_aligned(canvas, 7, 20, AlignLeft, AlignTop, "Collect nonces using");
+ canvas_draw_str_aligned(canvas, 7, 30, AlignLeft, AlignTop, "Detect Reader.");
+ canvas_draw_str_aligned(canvas, 7, 40, AlignLeft, AlignTop, "Developers: noproto, AG");
+ canvas_draw_str_aligned(canvas, 7, 50, AlignLeft, AlignTop, "Thanks: bettse");
+ } else if(program_state->mfkey_state == Error) {
+ canvas_draw_str_aligned(canvas, 50, 25, AlignLeft, AlignTop, "Error");
+ canvas_set_font(canvas, FontSecondary);
+ if(program_state->err == MissingNonces) {
+ canvas_draw_str_aligned(canvas, 25, 36, AlignLeft, AlignTop, "No nonces found");
+ } else if(program_state->err == ZeroNonces) {
+ canvas_draw_str_aligned(canvas, 25, 36, AlignLeft, AlignTop, "No nonces to crack");
+ } else if(program_state->err == OutOfMemory) {
+ canvas_draw_str_aligned(canvas, 25, 36, AlignLeft, AlignTop, "Insufficient memory");
+ } else {
+ // Unhandled error
+ }
+ } else {
+ // Unhandled program state
+ }
+ furi_mutex_release(program_state->mutex);
+}
+
+static void input_callback(InputEvent* input_event, FuriMessageQueue* event_queue) {
+ furi_assert(event_queue);
+
+ PluginEvent event = {.type = EventTypeKey, .input = *input_event};
+ furi_message_queue_put(event_queue, &event, FuriWaitForever);
+}
+
+static void mfkey32_state_init(ProgramState* const program_state) {
+ program_state->is_thread_running = false;
+ program_state->mfkey_state = Ready;
+ program_state->cracked = 0;
+ program_state->unique_cracked = 0;
+ program_state->total = 0;
+ program_state->dict_count = 0;
+}
+
+// Entrypoint for worker thread
+static int32_t mfkey32_worker_thread(void* ctx) {
+ ProgramState* program_state = ctx;
+ program_state->is_thread_running = true;
+ program_state->mfkey_state = Initializing;
+ //FURI_LOG_I(TAG, "Hello from the mfkey32 worker thread"); // DEBUG
+ mfkey32(program_state);
+ program_state->is_thread_running = false;
+ return 0;
+}
+
+void start_mfkey32_thread(ProgramState* program_state) {
+ if(!program_state->is_thread_running) {
+ furi_thread_start(program_state->mfkeythread);
+ }
+}
+
+int32_t mfkey32_main() {
+ FuriMessageQueue* event_queue = furi_message_queue_alloc(8, sizeof(PluginEvent));
+
+ ProgramState* program_state = malloc(sizeof(ProgramState));
+
+ mfkey32_state_init(program_state);
+
+ program_state->mutex = furi_mutex_alloc(FuriMutexTypeNormal);
+ if(!program_state->mutex) {
+ FURI_LOG_E(TAG, "cannot create mutex\r\n");
+ free(program_state);
+ return 255;
+ }
+
+ // Set system callbacks
+ ViewPort* view_port = view_port_alloc();
+ view_port_draw_callback_set(view_port, render_callback, program_state);
+ view_port_input_callback_set(view_port, input_callback, event_queue);
+
+ // Open GUI and register view_port
+ Gui* gui = furi_record_open(RECORD_GUI);
+ gui_add_view_port(gui, view_port, GuiLayerFullscreen);
+
+ program_state->mfkeythread = furi_thread_alloc();
+ furi_thread_set_name(program_state->mfkeythread, "Mfkey32 Worker");
+ furi_thread_set_stack_size(program_state->mfkeythread, 2048);
+ furi_thread_set_context(program_state->mfkeythread, program_state);
+ furi_thread_set_callback(program_state->mfkeythread, mfkey32_worker_thread);
+
+ PluginEvent event;
+ for(bool main_loop = true; main_loop;) {
+ FuriStatus event_status = furi_message_queue_get(event_queue, &event, 100);
+
+ furi_mutex_acquire(program_state->mutex, FuriWaitForever);
+
+ if(event_status == FuriStatusOk) {
+ // press events
+ if(event.type == EventTypeKey) {
+ if(event.input.type == InputTypePress) {
+ switch(event.input.key) {
+ case InputKeyUp:
+ break;
+ case InputKeyDown:
+ break;
+ case InputKeyRight:
+ if(!program_state->is_thread_running &&
+ program_state->mfkey_state == Ready) {
+ program_state->mfkey_state = Help;
+ view_port_update(view_port);
+ }
+ break;
+ case InputKeyLeft:
+ break;
+ case InputKeyOk:
+ if(!program_state->is_thread_running &&
+ program_state->mfkey_state == Ready) {
+ start_mfkey32_thread(program_state);
+ view_port_update(view_port);
+ }
+ break;
+ case InputKeyBack:
+ if(!program_state->is_thread_running &&
+ program_state->mfkey_state == Help) {
+ program_state->mfkey_state = Ready;
+ view_port_update(view_port);
+ } else {
+ program_state->close_thread_please = true;
+ if(program_state->is_thread_running && program_state->mfkeythread) {
+ // Wait until thread is finished
+ furi_thread_join(program_state->mfkeythread);
+ }
+ program_state->close_thread_please = false;
+ main_loop = false;
+ }
+ break;
+ default:
+ break;
+ }
+ }
+ }
+ }
+
+ view_port_update(view_port);
+ furi_mutex_release(program_state->mutex);
+ }
+
+ furi_thread_free(program_state->mfkeythread);
+ view_port_enabled_set(view_port, false);
+ gui_remove_view_port(gui, view_port);
+ furi_record_close("gui");
+ view_port_free(view_port);
+ furi_message_queue_free(event_queue);
+ furi_mutex_free(program_state->mutex);
+ free(program_state);
+
+ return 0;
+}