mirror of
https://github.com/Next-Flip/Momentum-Firmware.git
synced 2026-05-13 07:48:35 -07:00
nfc related changes
This commit is contained in:
@@ -21,6 +21,7 @@ ADD_SCENE(nfc, mf_ultralight_emulate, MfUltralightEmulate)
|
|||||||
ADD_SCENE(nfc, mf_ultralight_read_auth, MfUltralightReadAuth)
|
ADD_SCENE(nfc, mf_ultralight_read_auth, MfUltralightReadAuth)
|
||||||
ADD_SCENE(nfc, mf_ultralight_read_auth_result, MfUltralightReadAuthResult)
|
ADD_SCENE(nfc, mf_ultralight_read_auth_result, MfUltralightReadAuthResult)
|
||||||
ADD_SCENE(nfc, mf_ultralight_key_input, MfUltralightKeyInput)
|
ADD_SCENE(nfc, mf_ultralight_key_input, MfUltralightKeyInput)
|
||||||
|
ADD_SCENE(nfc, mf_ultralight_unlock_auto, MfUltralightUnlockAuto)
|
||||||
ADD_SCENE(nfc, mf_ultralight_unlock_menu, MfUltralightUnlockMenu)
|
ADD_SCENE(nfc, mf_ultralight_unlock_menu, MfUltralightUnlockMenu)
|
||||||
ADD_SCENE(nfc, mf_ultralight_unlock_warn, MfUltralightUnlockWarn)
|
ADD_SCENE(nfc, mf_ultralight_unlock_warn, MfUltralightUnlockWarn)
|
||||||
ADD_SCENE(nfc, mf_desfire_read_success, MfDesfireReadSuccess)
|
ADD_SCENE(nfc, mf_desfire_read_success, MfDesfireReadSuccess)
|
||||||
|
|||||||
@@ -1,7 +1,8 @@
|
|||||||
#include "../nfc_i.h"
|
#include "../nfc_i.h"
|
||||||
|
|
||||||
enum SubmenuIndex {
|
enum SubmenuIndex {
|
||||||
SubmenuIndexUnlock,
|
SubmenuIndexUnlockByReader,
|
||||||
|
SubmenuIndexUnlockByPassword,
|
||||||
SubmenuIndexSave,
|
SubmenuIndexSave,
|
||||||
SubmenuIndexEmulate,
|
SubmenuIndexEmulate,
|
||||||
SubmenuIndexInfo,
|
SubmenuIndexInfo,
|
||||||
@@ -18,11 +19,17 @@ void nfc_scene_mf_ultralight_menu_on_enter(void* context) {
|
|||||||
Submenu* submenu = nfc->submenu;
|
Submenu* submenu = nfc->submenu;
|
||||||
MfUltralightData* data = &nfc->dev->dev_data.mf_ul_data;
|
MfUltralightData* data = &nfc->dev->dev_data.mf_ul_data;
|
||||||
|
|
||||||
if(data->data_read != data->data_size) {
|
if(!mf_ul_is_full_capture(data)) {
|
||||||
|
submenu_add_item(
|
||||||
|
submenu,
|
||||||
|
"Unlock With Reader",
|
||||||
|
SubmenuIndexUnlockByReader,
|
||||||
|
nfc_scene_mf_ultralight_menu_submenu_callback,
|
||||||
|
nfc);
|
||||||
submenu_add_item(
|
submenu_add_item(
|
||||||
submenu,
|
submenu,
|
||||||
"Unlock With Password",
|
"Unlock With Password",
|
||||||
SubmenuIndexUnlock,
|
SubmenuIndexUnlockByPassword,
|
||||||
nfc_scene_mf_ultralight_menu_submenu_callback,
|
nfc_scene_mf_ultralight_menu_submenu_callback,
|
||||||
nfc);
|
nfc);
|
||||||
}
|
}
|
||||||
@@ -57,7 +64,10 @@ bool nfc_scene_mf_ultralight_menu_on_event(void* context, SceneManagerEvent even
|
|||||||
} else if(event.event == SubmenuIndexEmulate) {
|
} else if(event.event == SubmenuIndexEmulate) {
|
||||||
scene_manager_next_scene(nfc->scene_manager, NfcSceneMfUltralightEmulate);
|
scene_manager_next_scene(nfc->scene_manager, NfcSceneMfUltralightEmulate);
|
||||||
consumed = true;
|
consumed = true;
|
||||||
} else if(event.event == SubmenuIndexUnlock) {
|
} else if(event.event == SubmenuIndexUnlockByReader) {
|
||||||
|
scene_manager_next_scene(nfc->scene_manager, NfcSceneMfUltralightUnlockAuto);
|
||||||
|
consumed = true;
|
||||||
|
} else if(event.event == SubmenuIndexUnlockByPassword) {
|
||||||
scene_manager_next_scene(nfc->scene_manager, NfcSceneMfUltralightUnlockMenu);
|
scene_manager_next_scene(nfc->scene_manager, NfcSceneMfUltralightUnlockMenu);
|
||||||
consumed = true;
|
consumed = true;
|
||||||
} else if(event.event == SubmenuIndexInfo) {
|
} else if(event.event == SubmenuIndexInfo) {
|
||||||
|
|||||||
@@ -20,16 +20,19 @@ void nfc_scene_mf_ultralight_read_auth_result_on_enter(void* context) {
|
|||||||
MfUltralightData* mf_ul_data = &nfc->dev->dev_data.mf_ul_data;
|
MfUltralightData* mf_ul_data = &nfc->dev->dev_data.mf_ul_data;
|
||||||
MfUltralightConfigPages* config_pages = mf_ultralight_get_config_pages(mf_ul_data);
|
MfUltralightConfigPages* config_pages = mf_ultralight_get_config_pages(mf_ul_data);
|
||||||
Widget* widget = nfc->widget;
|
Widget* widget = nfc->widget;
|
||||||
|
const char* title;
|
||||||
FuriString* temp_str;
|
FuriString* temp_str;
|
||||||
temp_str = furi_string_alloc();
|
temp_str = furi_string_alloc();
|
||||||
|
|
||||||
if((mf_ul_data->data_read == mf_ul_data->data_size) && (mf_ul_data->data_read > 0)) {
|
if((mf_ul_data->data_read == mf_ul_data->data_size) && (mf_ul_data->data_read > 0)) {
|
||||||
widget_add_string_element(
|
if(mf_ul_data->auth_success)
|
||||||
widget, 64, 0, AlignCenter, AlignTop, FontPrimary, "All pages are unlocked!");
|
title = "All pages are unlocked!";
|
||||||
|
else
|
||||||
|
title = "All unlocked but failed auth!";
|
||||||
} else {
|
} else {
|
||||||
widget_add_string_element(
|
title = "Not all pages unlocked!";
|
||||||
widget, 64, 0, AlignCenter, AlignTop, FontPrimary, "Not all pages unlocked!");
|
|
||||||
}
|
}
|
||||||
|
widget_add_string_element(widget, 64, 0, AlignCenter, AlignTop, FontPrimary, title);
|
||||||
furi_string_set(temp_str, "UID:");
|
furi_string_set(temp_str, "UID:");
|
||||||
for(size_t i = 0; i < nfc_data->uid_len; i++) {
|
for(size_t i = 0; i < nfc_data->uid_len; i++) {
|
||||||
furi_string_cat_printf(temp_str, " %02X", nfc_data->uid[i]);
|
furi_string_cat_printf(temp_str, " %02X", nfc_data->uid[i]);
|
||||||
|
|||||||
@@ -0,0 +1,56 @@
|
|||||||
|
#include "../nfc_i.h"
|
||||||
|
|
||||||
|
bool nfc_scene_mf_ultralight_unlock_auto_worker_callback(NfcWorkerEvent event, void* context) {
|
||||||
|
Nfc* nfc = context;
|
||||||
|
|
||||||
|
view_dispatcher_send_custom_event(nfc->view_dispatcher, event);
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
|
||||||
|
void nfc_scene_mf_ultralight_unlock_auto_on_enter(void* context) {
|
||||||
|
Nfc* nfc = context;
|
||||||
|
|
||||||
|
// Setup view
|
||||||
|
popup_set_text(nfc->popup, "Touch the reader", 44, 31, AlignLeft, AlignCenter);
|
||||||
|
popup_set_icon(nfc->popup, 0, 16, &I_Tap_reader_36x38);
|
||||||
|
view_dispatcher_switch_to_view(nfc->view_dispatcher, NfcViewPopup);
|
||||||
|
|
||||||
|
// Start worker
|
||||||
|
nfc_worker_start(
|
||||||
|
nfc->worker,
|
||||||
|
NfcWorkerStateMfUltralightEmulate,
|
||||||
|
&nfc->dev->dev_data,
|
||||||
|
nfc_scene_mf_ultralight_unlock_auto_worker_callback,
|
||||||
|
nfc);
|
||||||
|
|
||||||
|
nfc_blink_emulate_start(nfc);
|
||||||
|
}
|
||||||
|
|
||||||
|
bool nfc_scene_mf_ultralight_unlock_auto_on_event(void* context, SceneManagerEvent event) {
|
||||||
|
Nfc* nfc = context;
|
||||||
|
bool consumed = false;
|
||||||
|
|
||||||
|
if(event.type == SceneManagerEventTypeCustom) {
|
||||||
|
if((event.event == NfcWorkerEventMfUltralightPwdAuth)) {
|
||||||
|
MfUltralightAuth* auth = &nfc->dev->dev_data.mf_ul_auth;
|
||||||
|
memcpy(nfc->byte_input_store, auth->pwd.raw, sizeof(auth->pwd.raw));
|
||||||
|
nfc->dev->dev_data.mf_ul_data.auth_method = MfUltralightAuthMethodManual;
|
||||||
|
nfc_worker_stop(nfc->worker);
|
||||||
|
notification_message(nfc->notifications, &sequence_success);
|
||||||
|
scene_manager_next_scene(nfc->scene_manager, NfcSceneMfUltralightUnlockWarn);
|
||||||
|
consumed = true;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return consumed;
|
||||||
|
}
|
||||||
|
|
||||||
|
void nfc_scene_mf_ultralight_unlock_auto_on_exit(void* context) {
|
||||||
|
Nfc* nfc = context;
|
||||||
|
|
||||||
|
// Stop worker
|
||||||
|
nfc_worker_stop(nfc->worker);
|
||||||
|
// Clear view
|
||||||
|
popup_reset(nfc->popup);
|
||||||
|
|
||||||
|
nfc_blink_stop(nfc);
|
||||||
|
}
|
||||||
@@ -58,7 +58,8 @@ bool nfc_scene_mf_ultralight_unlock_menu_on_event(void* context, SceneManagerEve
|
|||||||
scene_manager_next_scene(nfc->scene_manager, NfcSceneMfUltralightUnlockWarn);
|
scene_manager_next_scene(nfc->scene_manager, NfcSceneMfUltralightUnlockWarn);
|
||||||
consumed = true;
|
consumed = true;
|
||||||
}
|
}
|
||||||
scene_manager_set_scene_state(nfc->scene_manager, NfcSceneExtraActions, event.event);
|
scene_manager_set_scene_state(
|
||||||
|
nfc->scene_manager, NfcSceneMfUltralightUnlockMenu, event.event);
|
||||||
}
|
}
|
||||||
return consumed;
|
return consumed;
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -87,6 +87,20 @@ void nfc_scene_nfc_data_info_on_enter(void* context) {
|
|||||||
temp_str, "\nPages Read %d/%d", data->data_read / 4, data->data_size / 4);
|
temp_str, "\nPages Read %d/%d", data->data_read / 4, data->data_size / 4);
|
||||||
if(data->data_size > data->data_read) {
|
if(data->data_size > data->data_read) {
|
||||||
furi_string_cat_printf(temp_str, "\nPassword-protected");
|
furi_string_cat_printf(temp_str, "\nPassword-protected");
|
||||||
|
} else if(data->auth_success) {
|
||||||
|
MfUltralightConfigPages* config_pages = mf_ultralight_get_config_pages(data);
|
||||||
|
furi_string_cat_printf(
|
||||||
|
temp_str,
|
||||||
|
"\nPassword: %02X %02X %02X %02X",
|
||||||
|
config_pages->auth_data.pwd.raw[0],
|
||||||
|
config_pages->auth_data.pwd.raw[1],
|
||||||
|
config_pages->auth_data.pwd.raw[2],
|
||||||
|
config_pages->auth_data.pwd.raw[3]);
|
||||||
|
furi_string_cat_printf(
|
||||||
|
temp_str,
|
||||||
|
"\nPACK: %02X %02X",
|
||||||
|
config_pages->auth_data.pack.raw[0],
|
||||||
|
config_pages->auth_data.pack.raw[1]);
|
||||||
}
|
}
|
||||||
} else if(protocol == NfcDeviceProtocolMifareClassic) {
|
} else if(protocol == NfcDeviceProtocolMifareClassic) {
|
||||||
MfClassicData* data = &dev_data->mf_classic_data;
|
MfClassicData* data = &dev_data->mf_classic_data;
|
||||||
@@ -131,4 +145,4 @@ void nfc_scene_nfc_data_info_on_exit(void* context) {
|
|||||||
Nfc* nfc = context;
|
Nfc* nfc = context;
|
||||||
|
|
||||||
widget_reset(nfc->widget);
|
widget_reset(nfc->widget);
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -69,6 +69,8 @@ bool nfc_scene_read_on_event(void* context, SceneManagerEvent event) {
|
|||||||
consumed = true;
|
consumed = true;
|
||||||
} else if(event.event == NfcWorkerEventReadMfUltralight) {
|
} else if(event.event == NfcWorkerEventReadMfUltralight) {
|
||||||
notification_message(nfc->notifications, &sequence_success);
|
notification_message(nfc->notifications, &sequence_success);
|
||||||
|
// Set unlock password input to 0xFFFFFFFF only on fresh read
|
||||||
|
memset(nfc->byte_input_store, 0xFF, 4);
|
||||||
scene_manager_next_scene(nfc->scene_manager, NfcSceneMfUltralightReadSuccess);
|
scene_manager_next_scene(nfc->scene_manager, NfcSceneMfUltralightReadSuccess);
|
||||||
consumed = true;
|
consumed = true;
|
||||||
} else if(event.event == NfcWorkerEventReadMfClassicDone) {
|
} else if(event.event == NfcWorkerEventReadMfClassicDone) {
|
||||||
|
|||||||
@@ -7,6 +7,8 @@ enum SubmenuIndex {
|
|||||||
SubmenuIndexDelete,
|
SubmenuIndexDelete,
|
||||||
SubmenuIndexInfo,
|
SubmenuIndexInfo,
|
||||||
SubmenuIndexRestoreOriginal,
|
SubmenuIndexRestoreOriginal,
|
||||||
|
SubmenuIndexMfUlUnlockByReader,
|
||||||
|
SubmenuIndexMfUlUnlockByPassword,
|
||||||
};
|
};
|
||||||
|
|
||||||
void nfc_scene_saved_menu_submenu_callback(void* context, uint32_t index) {
|
void nfc_scene_saved_menu_submenu_callback(void* context, uint32_t index) {
|
||||||
@@ -43,6 +45,21 @@ void nfc_scene_saved_menu_on_enter(void* context) {
|
|||||||
}
|
}
|
||||||
submenu_add_item(
|
submenu_add_item(
|
||||||
submenu, "Info", SubmenuIndexInfo, nfc_scene_saved_menu_submenu_callback, nfc);
|
submenu, "Info", SubmenuIndexInfo, nfc_scene_saved_menu_submenu_callback, nfc);
|
||||||
|
if(nfc->dev->format == NfcDeviceSaveFormatMifareUl &&
|
||||||
|
!mf_ul_is_full_capture(&nfc->dev->dev_data.mf_ul_data)) {
|
||||||
|
submenu_add_item(
|
||||||
|
submenu,
|
||||||
|
"Unlock With Reader",
|
||||||
|
SubmenuIndexMfUlUnlockByReader,
|
||||||
|
nfc_scene_saved_menu_submenu_callback,
|
||||||
|
nfc);
|
||||||
|
submenu_add_item(
|
||||||
|
submenu,
|
||||||
|
"Unlock With Password",
|
||||||
|
SubmenuIndexMfUlUnlockByPassword,
|
||||||
|
nfc_scene_saved_menu_submenu_callback,
|
||||||
|
nfc);
|
||||||
|
}
|
||||||
if(nfc->dev->shadow_file_exist) {
|
if(nfc->dev->shadow_file_exist) {
|
||||||
submenu_add_item(
|
submenu_add_item(
|
||||||
submenu,
|
submenu,
|
||||||
@@ -105,6 +122,12 @@ bool nfc_scene_saved_menu_on_event(void* context, SceneManagerEvent event) {
|
|||||||
} else if(event.event == SubmenuIndexRestoreOriginal) {
|
} else if(event.event == SubmenuIndexRestoreOriginal) {
|
||||||
scene_manager_next_scene(nfc->scene_manager, NfcSceneRestoreOriginalConfirm);
|
scene_manager_next_scene(nfc->scene_manager, NfcSceneRestoreOriginalConfirm);
|
||||||
consumed = true;
|
consumed = true;
|
||||||
|
} else if(event.event == SubmenuIndexMfUlUnlockByReader) {
|
||||||
|
scene_manager_next_scene(nfc->scene_manager, NfcSceneMfUltralightUnlockAuto);
|
||||||
|
consumed = true;
|
||||||
|
} else if(event.event == SubmenuIndexMfUlUnlockByPassword) {
|
||||||
|
scene_manager_next_scene(nfc->scene_manager, NfcSceneMfUltralightUnlockMenu);
|
||||||
|
consumed = true;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@@ -3721,3 +3721,6 @@ BC305FE2DA65
|
|||||||
CF0EC6ACF2F9
|
CF0EC6ACF2F9
|
||||||
F7A545095C49
|
F7A545095C49
|
||||||
6862FD600F78
|
6862FD600F78
|
||||||
|
# RENFE MADRID (TRAIN) Extracted with detect reader
|
||||||
|
701AA491A4A5
|
||||||
|
12BA20088ED3
|
||||||
|
|||||||
@@ -213,6 +213,9 @@ bool nfc_device_load_mifare_ul_data(FlipperFormat* file, NfcDevice* dev) {
|
|||||||
uint32_t auth_counter;
|
uint32_t auth_counter;
|
||||||
if(!flipper_format_read_uint32(file, "Failed authentication attempts", &auth_counter, 1))
|
if(!flipper_format_read_uint32(file, "Failed authentication attempts", &auth_counter, 1))
|
||||||
auth_counter = 0;
|
auth_counter = 0;
|
||||||
|
data->curr_authlim = auth_counter;
|
||||||
|
|
||||||
|
data->auth_success = mf_ul_is_full_capture(data);
|
||||||
|
|
||||||
parsed = true;
|
parsed = true;
|
||||||
} while(false);
|
} while(false);
|
||||||
|
|||||||
@@ -53,6 +53,7 @@ typedef struct {
|
|||||||
union {
|
union {
|
||||||
NfcReaderRequestData reader_data;
|
NfcReaderRequestData reader_data;
|
||||||
NfcMfClassicDictAttackData mf_classic_dict_attack_data;
|
NfcMfClassicDictAttackData mf_classic_dict_attack_data;
|
||||||
|
MfUltralightAuth mf_ul_auth;
|
||||||
};
|
};
|
||||||
union {
|
union {
|
||||||
EmvData emv_data;
|
EmvData emv_data;
|
||||||
|
|||||||
@@ -448,10 +448,25 @@ void nfc_worker_emulate_apdu(NfcWorker* nfc_worker) {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
void nfc_worker_mf_ultralight_auth_received_callback(MfUltralightAuth auth, void* context) {
|
||||||
|
furi_assert(context);
|
||||||
|
|
||||||
|
NfcWorker* nfc_worker = context;
|
||||||
|
nfc_worker->dev_data->mf_ul_auth = auth;
|
||||||
|
if(nfc_worker->callback) {
|
||||||
|
nfc_worker->callback(NfcWorkerEventMfUltralightPwdAuth, nfc_worker->context);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
void nfc_worker_emulate_mf_ultralight(NfcWorker* nfc_worker) {
|
void nfc_worker_emulate_mf_ultralight(NfcWorker* nfc_worker) {
|
||||||
FuriHalNfcDevData* nfc_data = &nfc_worker->dev_data->nfc_data;
|
FuriHalNfcDevData* nfc_data = &nfc_worker->dev_data->nfc_data;
|
||||||
MfUltralightEmulator emulator = {};
|
MfUltralightEmulator emulator = {};
|
||||||
mf_ul_prepare_emulation(&emulator, &nfc_worker->dev_data->mf_ul_data);
|
mf_ul_prepare_emulation(&emulator, &nfc_worker->dev_data->mf_ul_data);
|
||||||
|
|
||||||
|
// TODO rework with reader analyzer
|
||||||
|
emulator.auth_received_callback = nfc_worker_mf_ultralight_auth_received_callback;
|
||||||
|
emulator.context = nfc_worker;
|
||||||
|
|
||||||
while(nfc_worker->state == NfcWorkerStateMfUltralightEmulate) {
|
while(nfc_worker->state == NfcWorkerStateMfUltralightEmulate) {
|
||||||
mf_ul_reset_emulation(&emulator, true);
|
mf_ul_reset_emulation(&emulator, true);
|
||||||
furi_hal_nfc_emulate_nfca(
|
furi_hal_nfc_emulate_nfca(
|
||||||
|
|||||||
@@ -61,7 +61,8 @@ typedef enum {
|
|||||||
NfcWorkerEventDetectReaderMfkeyCollected,
|
NfcWorkerEventDetectReaderMfkeyCollected,
|
||||||
|
|
||||||
// Mifare Ultralight events
|
// Mifare Ultralight events
|
||||||
NfcWorkerEventMfUltralightPassKey,
|
NfcWorkerEventMfUltralightPassKey, // NFC worker requesting manual key
|
||||||
|
NfcWorkerEventMfUltralightPwdAuth, // Reader sent auth command
|
||||||
|
|
||||||
} NfcWorkerEvent;
|
} NfcWorkerEvent;
|
||||||
|
|
||||||
|
|||||||
@@ -51,7 +51,7 @@ void mf_ul_reset(MfUltralightData* data) {
|
|||||||
data->data_size = 0;
|
data->data_size = 0;
|
||||||
data->data_read = 0;
|
data->data_read = 0;
|
||||||
data->curr_authlim = 0;
|
data->curr_authlim = 0;
|
||||||
data->has_auth = false;
|
data->auth_success = false;
|
||||||
}
|
}
|
||||||
|
|
||||||
static MfUltralightFeatures mf_ul_get_features(MfUltralightType type) {
|
static MfUltralightFeatures mf_ul_get_features(MfUltralightType type) {
|
||||||
@@ -756,6 +756,34 @@ bool mf_ul_read_card(
|
|||||||
mf_ultralight_read_tearing_flags(tx_rx, data);
|
mf_ultralight_read_tearing_flags(tx_rx, data);
|
||||||
}
|
}
|
||||||
data->curr_authlim = 0;
|
data->curr_authlim = 0;
|
||||||
|
|
||||||
|
if(reader->pages_read == reader->pages_to_read &&
|
||||||
|
reader->supported_features & MfUltralightSupportAuth && !data->auth_success) {
|
||||||
|
MfUltralightConfigPages* config = mf_ultralight_get_config_pages(data);
|
||||||
|
if(config->access.authlim == 0) {
|
||||||
|
// Attempt to auth with default PWD
|
||||||
|
uint16_t pack;
|
||||||
|
data->auth_success = mf_ultralight_authenticate(tx_rx, MF_UL_DEFAULT_PWD, &pack);
|
||||||
|
if(data->auth_success) {
|
||||||
|
config->auth_data.pwd.value = MF_UL_DEFAULT_PWD;
|
||||||
|
config->auth_data.pack.value = pack;
|
||||||
|
} else {
|
||||||
|
furi_hal_nfc_sleep();
|
||||||
|
furi_hal_nfc_activate_nfca(300, NULL);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if(reader->pages_read != reader->pages_to_read) {
|
||||||
|
if(reader->supported_features & MfUltralightSupportAuth) {
|
||||||
|
// Probably password protected, fix AUTH0 and PROT so before AUTH0
|
||||||
|
// can be written and since AUTH0 won't be readable, like on the
|
||||||
|
// original card
|
||||||
|
MfUltralightConfigPages* config = mf_ultralight_get_config_pages(data);
|
||||||
|
config->auth0 = reader->pages_read;
|
||||||
|
config->access.prot = true;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
return card_read;
|
return card_read;
|
||||||
@@ -1201,6 +1229,8 @@ static void mf_ul_emulate_write(
|
|||||||
}
|
}
|
||||||
|
|
||||||
void mf_ul_reset_emulation(MfUltralightEmulator* emulator, bool is_power_cycle) {
|
void mf_ul_reset_emulation(MfUltralightEmulator* emulator, bool is_power_cycle) {
|
||||||
|
emulator->comp_write_cmd_started = false;
|
||||||
|
emulator->sector_select_cmd_started = false;
|
||||||
emulator->curr_sector = 0;
|
emulator->curr_sector = 0;
|
||||||
emulator->ntag_i2c_plus_sector3_lockout = false;
|
emulator->ntag_i2c_plus_sector3_lockout = false;
|
||||||
emulator->auth_success = false;
|
emulator->auth_success = false;
|
||||||
@@ -1244,8 +1274,7 @@ void mf_ul_prepare_emulation(MfUltralightEmulator* emulator, MfUltralightData* d
|
|||||||
emulator->config = mf_ultralight_get_config_pages(&emulator->data);
|
emulator->config = mf_ultralight_get_config_pages(&emulator->data);
|
||||||
emulator->page_num = emulator->data.data_size / 4;
|
emulator->page_num = emulator->data.data_size / 4;
|
||||||
emulator->data_changed = false;
|
emulator->data_changed = false;
|
||||||
emulator->comp_write_cmd_started = false;
|
memset(&emulator->auth_attempt, 0, sizeof(MfUltralightAuth));
|
||||||
emulator->sector_select_cmd_started = false;
|
|
||||||
mf_ul_reset_emulation(emulator, true);
|
mf_ul_reset_emulation(emulator, true);
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -1706,6 +1735,17 @@ bool mf_ul_prepare_emulation_response(
|
|||||||
} else if(cmd == MF_UL_AUTH) {
|
} else if(cmd == MF_UL_AUTH) {
|
||||||
if(emulator->supported_features & MfUltralightSupportAuth) {
|
if(emulator->supported_features & MfUltralightSupportAuth) {
|
||||||
if(buff_rx_len == (1 + 4) * 8) {
|
if(buff_rx_len == (1 + 4) * 8) {
|
||||||
|
// Record password sent by PCD
|
||||||
|
memcpy(
|
||||||
|
emulator->auth_attempt.pwd.raw,
|
||||||
|
&buff_rx[1],
|
||||||
|
sizeof(emulator->auth_attempt.pwd.raw));
|
||||||
|
emulator->auth_attempted = true;
|
||||||
|
if(emulator->auth_received_callback) {
|
||||||
|
emulator->auth_received_callback(
|
||||||
|
emulator->auth_attempt, emulator->context);
|
||||||
|
}
|
||||||
|
|
||||||
uint16_t scaled_authlim = mf_ultralight_calc_auth_count(&emulator->data);
|
uint16_t scaled_authlim = mf_ultralight_calc_auth_count(&emulator->data);
|
||||||
if(scaled_authlim != 0 && emulator->data.curr_authlim >= scaled_authlim) {
|
if(scaled_authlim != 0 && emulator->data.curr_authlim >= scaled_authlim) {
|
||||||
if(emulator->data.curr_authlim != UINT16_MAX) {
|
if(emulator->data.curr_authlim != UINT16_MAX) {
|
||||||
@@ -1863,3 +1903,14 @@ bool mf_ul_prepare_emulation_response(
|
|||||||
|
|
||||||
return tx_bits > 0;
|
return tx_bits > 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
bool mf_ul_is_full_capture(MfUltralightData* data) {
|
||||||
|
if(data->data_read != data->data_size) return false;
|
||||||
|
|
||||||
|
// Having read all the pages doesn't mean that we've got everything.
|
||||||
|
// By default PWD is 0xFFFFFFFF, but if read back it is always 0x00000000,
|
||||||
|
// so a default read on an auth-supported NTAG is never complete.
|
||||||
|
if(!(mf_ul_get_features(data->type) & MfUltralightSupportAuth)) return true;
|
||||||
|
MfUltralightConfigPages* config = mf_ultralight_get_config_pages(data);
|
||||||
|
return config->auth_data.pwd.value != 0 || config->auth_data.pack.value != 0;
|
||||||
|
}
|
||||||
|
|||||||
@@ -28,6 +28,8 @@
|
|||||||
|
|
||||||
#define MF_UL_NTAG203_COUNTER_PAGE (41)
|
#define MF_UL_NTAG203_COUNTER_PAGE (41)
|
||||||
|
|
||||||
|
#define MF_UL_DEFAULT_PWD (0xFFFFFFFF)
|
||||||
|
|
||||||
typedef enum {
|
typedef enum {
|
||||||
MfUltralightAuthMethodManual,
|
MfUltralightAuthMethodManual,
|
||||||
MfUltralightAuthMethodAmeebo,
|
MfUltralightAuthMethodAmeebo,
|
||||||
@@ -110,7 +112,6 @@ typedef struct {
|
|||||||
uint8_t signature[32];
|
uint8_t signature[32];
|
||||||
uint32_t counter[3];
|
uint32_t counter[3];
|
||||||
uint8_t tearing[3];
|
uint8_t tearing[3];
|
||||||
bool has_auth;
|
|
||||||
MfUltralightAuthMethod auth_method;
|
MfUltralightAuthMethod auth_method;
|
||||||
uint8_t auth_key[4];
|
uint8_t auth_key[4];
|
||||||
bool auth_success;
|
bool auth_success;
|
||||||
@@ -169,6 +170,9 @@ typedef struct {
|
|||||||
MfUltralightFeatures supported_features;
|
MfUltralightFeatures supported_features;
|
||||||
} MfUltralightReader;
|
} MfUltralightReader;
|
||||||
|
|
||||||
|
// TODO rework with reader analyzer
|
||||||
|
typedef void (*MfUltralightAuthReceivedCallback)(MfUltralightAuth auth, void* context);
|
||||||
|
|
||||||
typedef struct {
|
typedef struct {
|
||||||
MfUltralightData data;
|
MfUltralightData data;
|
||||||
MfUltralightConfigPages* config;
|
MfUltralightConfigPages* config;
|
||||||
@@ -185,6 +189,12 @@ typedef struct {
|
|||||||
bool sector_select_cmd_started;
|
bool sector_select_cmd_started;
|
||||||
bool ntag_i2c_plus_sector3_lockout;
|
bool ntag_i2c_plus_sector3_lockout;
|
||||||
bool read_counter_incremented;
|
bool read_counter_incremented;
|
||||||
|
bool auth_attempted;
|
||||||
|
MfUltralightAuth auth_attempt;
|
||||||
|
|
||||||
|
// TODO rework with reader analyzer
|
||||||
|
MfUltralightAuthReceivedCallback auth_received_callback;
|
||||||
|
void* context;
|
||||||
} MfUltralightEmulator;
|
} MfUltralightEmulator;
|
||||||
|
|
||||||
void mf_ul_reset(MfUltralightData* data);
|
void mf_ul_reset(MfUltralightData* data);
|
||||||
@@ -241,3 +251,5 @@ bool mf_ul_prepare_emulation_response(
|
|||||||
uint32_t mf_ul_pwdgen_amiibo(FuriHalNfcDevData* data);
|
uint32_t mf_ul_pwdgen_amiibo(FuriHalNfcDevData* data);
|
||||||
|
|
||||||
uint32_t mf_ul_pwdgen_xiaomi(FuriHalNfcDevData* data);
|
uint32_t mf_ul_pwdgen_xiaomi(FuriHalNfcDevData* data);
|
||||||
|
|
||||||
|
bool mf_ul_is_full_capture(MfUltralightData* data);
|
||||||
|
|||||||
Reference in New Issue
Block a user