mirror of
https://github.com/DarkFlippers/unleashed-firmware.git
synced 2024-12-20 11:51:48 +03:00
3d872cf37a
* firmware: remove nfc lib build settings section * furi hal nfc: fix nfc irq gpio deinit * lib nfc: remove deprecated exception from sources * nfc: use ASK demodulator in transparent mode * mf ultralight: add upper page bound for NTAGI2C1K * furi hal nfc: set event if nfc event was started * nfc: fix PVS warnings * lib signal reader: remove gpio pull setting in alloc * furi: added math.h include for compatibility with existing apps * nfc: remove resolved TODO in mf desfire poller * bump api symbol version Co-authored-by: hedger <hedger@nanode.su> Co-authored-by: あく <alleteam@gmail.com>
628 lines
23 KiB
C
628 lines
23 KiB
C
#include "mf_ultralight.h"
|
|
|
|
#include <nfc/helpers/nfc_util.h>
|
|
#include <furi.h>
|
|
|
|
#define MF_ULTRALIGHT_PROTOCOL_NAME "NTAG/Ultralight"
|
|
|
|
#define MF_ULTRALIGHT_FORMAT_VERSION_KEY "Data format version"
|
|
#define MF_ULTRALIGHT_TYPE_KEY MF_ULTRALIGHT_PROTOCOL_NAME " type"
|
|
#define MF_ULTRALIGHT_SIGNATURE_KEY "Signature"
|
|
#define MF_ULTRALIGHT_MIFARE_VERSION_KEY "Mifare version"
|
|
#define MF_ULTRALIGHT_COUNTER_KEY "Counter"
|
|
#define MF_ULTRALIGHT_TEARING_KEY "Tearing"
|
|
#define MF_ULTRALIGHT_PAGES_TOTAL_KEY "Pages total"
|
|
#define MF_ULTRALIGHT_PAGES_READ_KEY "Pages read"
|
|
#define MF_ULTRALIGHT_PAGE_KEY "Page"
|
|
#define MF_ULTRALIGHT_FAILED_ATTEMPTS_KEY "Failed authentication attempts"
|
|
|
|
typedef struct {
|
|
const char* device_name;
|
|
uint16_t total_pages;
|
|
uint16_t config_page;
|
|
uint32_t feature_set;
|
|
} MfUltralightFeatures;
|
|
|
|
static const uint32_t mf_ultralight_data_format_version = 2;
|
|
|
|
static const MfUltralightFeatures mf_ultralight_features[MfUltralightTypeNum] = {
|
|
[MfUltralightTypeUnknown] =
|
|
{
|
|
.device_name = "Mifare Ultralight",
|
|
.total_pages = 16,
|
|
.config_page = 0,
|
|
.feature_set = MfUltralightFeatureSupportCompatibleWrite,
|
|
},
|
|
[MfUltralightTypeMfulC] =
|
|
{
|
|
.device_name = "Mifare Ultralight C",
|
|
.total_pages = 48,
|
|
.config_page = 0,
|
|
.feature_set = MfUltralightFeatureSupportCompatibleWrite |
|
|
MfUltralightFeatureSupportAuthenticate,
|
|
},
|
|
[MfUltralightTypeNTAG203] =
|
|
{
|
|
.device_name = "NTAG203",
|
|
.total_pages = 42,
|
|
.config_page = 0,
|
|
.feature_set = MfUltralightFeatureSupportCompatibleWrite |
|
|
MfUltralightFeatureSupportCounterInMemory,
|
|
},
|
|
[MfUltralightTypeUL11] =
|
|
{
|
|
.device_name = "Mifare Ultralight 11",
|
|
.total_pages = 20,
|
|
.config_page = 16,
|
|
.feature_set =
|
|
MfUltralightFeatureSupportReadVersion | MfUltralightFeatureSupportReadSignature |
|
|
MfUltralightFeatureSupportReadCounter |
|
|
MfUltralightFeatureSupportCheckTearingFlag | MfUltralightFeatureSupportFastRead |
|
|
MfUltralightFeatureSupportIncCounter | MfUltralightFeatureSupportCompatibleWrite |
|
|
MfUltralightFeatureSupportPasswordAuth | MfUltralightFeatureSupportVcsl,
|
|
},
|
|
[MfUltralightTypeUL21] =
|
|
{
|
|
.device_name = "Mifare Ultralight 21",
|
|
.total_pages = 41,
|
|
.config_page = 37,
|
|
.feature_set =
|
|
MfUltralightFeatureSupportReadVersion | MfUltralightFeatureSupportReadSignature |
|
|
MfUltralightFeatureSupportReadCounter |
|
|
MfUltralightFeatureSupportCheckTearingFlag | MfUltralightFeatureSupportFastRead |
|
|
MfUltralightFeatureSupportIncCounter | MfUltralightFeatureSupportCompatibleWrite |
|
|
MfUltralightFeatureSupportPasswordAuth | MfUltralightFeatureSupportVcsl |
|
|
MfUltralightFeatureSupportDynamicLock,
|
|
},
|
|
[MfUltralightTypeNTAG213] =
|
|
{
|
|
.device_name = "NTAG213",
|
|
.total_pages = 45,
|
|
.config_page = 41,
|
|
.feature_set =
|
|
MfUltralightFeatureSupportReadVersion | MfUltralightFeatureSupportReadSignature |
|
|
MfUltralightFeatureSupportReadCounter | MfUltralightFeatureSupportFastRead |
|
|
MfUltralightFeatureSupportCompatibleWrite |
|
|
MfUltralightFeatureSupportPasswordAuth | MfUltralightFeatureSupportSingleCounter |
|
|
MfUltralightFeatureSupportAsciiMirror | MfUltralightFeatureSupportDynamicLock,
|
|
},
|
|
[MfUltralightTypeNTAG215] =
|
|
{
|
|
.device_name = "NTAG215",
|
|
.total_pages = 135,
|
|
.config_page = 131,
|
|
.feature_set =
|
|
MfUltralightFeatureSupportReadVersion | MfUltralightFeatureSupportReadSignature |
|
|
MfUltralightFeatureSupportReadCounter | MfUltralightFeatureSupportFastRead |
|
|
MfUltralightFeatureSupportCompatibleWrite |
|
|
MfUltralightFeatureSupportPasswordAuth | MfUltralightFeatureSupportSingleCounter |
|
|
MfUltralightFeatureSupportAsciiMirror | MfUltralightFeatureSupportDynamicLock,
|
|
},
|
|
[MfUltralightTypeNTAG216] =
|
|
{
|
|
.device_name = "NTAG216",
|
|
.total_pages = 231,
|
|
.config_page = 227,
|
|
.feature_set =
|
|
MfUltralightFeatureSupportReadVersion | MfUltralightFeatureSupportReadSignature |
|
|
MfUltralightFeatureSupportReadCounter | MfUltralightFeatureSupportFastRead |
|
|
MfUltralightFeatureSupportCompatibleWrite |
|
|
MfUltralightFeatureSupportPasswordAuth | MfUltralightFeatureSupportSingleCounter |
|
|
MfUltralightFeatureSupportAsciiMirror | MfUltralightFeatureSupportDynamicLock,
|
|
},
|
|
[MfUltralightTypeNTAGI2C1K] =
|
|
{
|
|
.device_name = "NTAG I2C 1K",
|
|
.total_pages = 231,
|
|
.config_page = 0,
|
|
.feature_set =
|
|
MfUltralightFeatureSupportReadVersion | MfUltralightFeatureSupportFastRead |
|
|
MfUltralightFeatureSupportSectorSelect | MfUltralightFeatureSupportDynamicLock,
|
|
},
|
|
[MfUltralightTypeNTAGI2C2K] =
|
|
{
|
|
.device_name = "NTAG I2C 2K",
|
|
.total_pages = 485,
|
|
.config_page = 0,
|
|
.feature_set =
|
|
MfUltralightFeatureSupportReadVersion | MfUltralightFeatureSupportFastRead |
|
|
MfUltralightFeatureSupportSectorSelect | MfUltralightFeatureSupportDynamicLock,
|
|
},
|
|
[MfUltralightTypeNTAGI2CPlus1K] =
|
|
{
|
|
.device_name = "NTAG I2C Plus 1K",
|
|
.total_pages = 236,
|
|
.config_page = 227,
|
|
.feature_set =
|
|
MfUltralightFeatureSupportReadVersion | MfUltralightFeatureSupportReadSignature |
|
|
MfUltralightFeatureSupportFastRead | MfUltralightFeatureSupportPasswordAuth |
|
|
MfUltralightFeatureSupportSectorSelect | MfUltralightFeatureSupportFastWrite |
|
|
MfUltralightFeatureSupportDynamicLock,
|
|
},
|
|
[MfUltralightTypeNTAGI2CPlus2K] =
|
|
{
|
|
.device_name = "NTAG I2C Plus 2K",
|
|
.total_pages = 492,
|
|
.config_page = 227,
|
|
.feature_set =
|
|
MfUltralightFeatureSupportReadVersion | MfUltralightFeatureSupportReadSignature |
|
|
MfUltralightFeatureSupportFastRead | MfUltralightFeatureSupportPasswordAuth |
|
|
MfUltralightFeatureSupportSectorSelect | MfUltralightFeatureSupportFastWrite |
|
|
MfUltralightFeatureSupportDynamicLock,
|
|
},
|
|
};
|
|
|
|
const NfcDeviceBase nfc_device_mf_ultralight = {
|
|
.protocol_name = MF_ULTRALIGHT_PROTOCOL_NAME,
|
|
.alloc = (NfcDeviceAlloc)mf_ultralight_alloc,
|
|
.free = (NfcDeviceFree)mf_ultralight_free,
|
|
.reset = (NfcDeviceReset)mf_ultralight_reset,
|
|
.copy = (NfcDeviceCopy)mf_ultralight_copy,
|
|
.verify = (NfcDeviceVerify)mf_ultralight_verify,
|
|
.load = (NfcDeviceLoad)mf_ultralight_load,
|
|
.save = (NfcDeviceSave)mf_ultralight_save,
|
|
.is_equal = (NfcDeviceEqual)mf_ultralight_is_equal,
|
|
.get_name = (NfcDeviceGetName)mf_ultralight_get_device_name,
|
|
.get_uid = (NfcDeviceGetUid)mf_ultralight_get_uid,
|
|
.set_uid = (NfcDeviceSetUid)mf_ultralight_set_uid,
|
|
.get_base_data = (NfcDeviceGetBaseData)mf_ultralight_get_base_data,
|
|
};
|
|
|
|
MfUltralightData* mf_ultralight_alloc() {
|
|
MfUltralightData* data = malloc(sizeof(MfUltralightData));
|
|
data->iso14443_3a_data = iso14443_3a_alloc();
|
|
return data;
|
|
}
|
|
|
|
void mf_ultralight_free(MfUltralightData* data) {
|
|
furi_assert(data);
|
|
|
|
iso14443_3a_free(data->iso14443_3a_data);
|
|
free(data);
|
|
}
|
|
|
|
void mf_ultralight_reset(MfUltralightData* data) {
|
|
furi_assert(data);
|
|
|
|
iso14443_3a_reset(data->iso14443_3a_data);
|
|
}
|
|
|
|
void mf_ultralight_copy(MfUltralightData* data, const MfUltralightData* other) {
|
|
furi_assert(data);
|
|
furi_assert(other);
|
|
|
|
iso14443_3a_copy(data->iso14443_3a_data, other->iso14443_3a_data);
|
|
for(size_t i = 0; i < COUNT_OF(data->counter); i++) {
|
|
data->counter[i] = other->counter[i];
|
|
}
|
|
for(size_t i = 0; i < COUNT_OF(data->tearing_flag); i++) {
|
|
data->tearing_flag[i] = other->tearing_flag[i];
|
|
}
|
|
for(size_t i = 0; i < COUNT_OF(data->page); i++) {
|
|
data->page[i] = other->page[i];
|
|
}
|
|
|
|
data->type = other->type;
|
|
data->version = other->version;
|
|
data->signature = other->signature;
|
|
|
|
data->pages_read = other->pages_read;
|
|
data->pages_total = other->pages_total;
|
|
data->auth_attempts = other->auth_attempts;
|
|
}
|
|
|
|
static const char*
|
|
mf_ultralight_get_device_name_by_type(MfUltralightType type, NfcDeviceNameType name_type) {
|
|
if(name_type == NfcDeviceNameTypeShort &&
|
|
(type == MfUltralightTypeUL11 || type == MfUltralightTypeUL21)) {
|
|
type = MfUltralightTypeUnknown;
|
|
}
|
|
|
|
return mf_ultralight_features[type].device_name;
|
|
}
|
|
|
|
bool mf_ultralight_verify(MfUltralightData* data, const FuriString* device_type) {
|
|
furi_assert(data);
|
|
|
|
bool verified = false;
|
|
|
|
for(MfUltralightType i = 0; i < MfUltralightTypeNum; i++) {
|
|
const char* name = mf_ultralight_get_device_name_by_type(i, NfcDeviceNameTypeFull);
|
|
verified = furi_string_equal(device_type, name);
|
|
if(verified) {
|
|
data->type = i;
|
|
break;
|
|
}
|
|
}
|
|
|
|
return verified;
|
|
}
|
|
|
|
bool mf_ultralight_load(MfUltralightData* data, FlipperFormat* ff, uint32_t version) {
|
|
furi_assert(data);
|
|
|
|
FuriString* temp_str = furi_string_alloc();
|
|
bool parsed = false;
|
|
|
|
do {
|
|
// Read ISO14443_3A data
|
|
if(!iso14443_3a_load(data->iso14443_3a_data, ff, version)) break;
|
|
|
|
// Read Ultralight specific data
|
|
// Read Mifare Ultralight format version
|
|
uint32_t data_format_version = 0;
|
|
if(!flipper_format_read_uint32(
|
|
ff, MF_ULTRALIGHT_FORMAT_VERSION_KEY, &data_format_version, 1)) {
|
|
if(!flipper_format_rewind(ff)) break;
|
|
}
|
|
|
|
// Read Mifare Ultralight type
|
|
if(data_format_version > 1) {
|
|
if(!flipper_format_read_string(ff, MF_ULTRALIGHT_TYPE_KEY, temp_str)) break;
|
|
if(!mf_ultralight_verify(data, temp_str)) break;
|
|
}
|
|
|
|
// Read signature
|
|
if(!flipper_format_read_hex(
|
|
ff,
|
|
MF_ULTRALIGHT_SIGNATURE_KEY,
|
|
data->signature.data,
|
|
sizeof(MfUltralightSignature)))
|
|
break;
|
|
// Read Mifare version
|
|
if(!flipper_format_read_hex(
|
|
ff,
|
|
MF_ULTRALIGHT_MIFARE_VERSION_KEY,
|
|
(uint8_t*)&data->version,
|
|
sizeof(MfUltralightVersion)))
|
|
break;
|
|
// Read counters and tearing flags
|
|
bool counters_parsed = true;
|
|
for(size_t i = 0; i < 3; i++) {
|
|
furi_string_printf(temp_str, "%s %d", MF_ULTRALIGHT_COUNTER_KEY, i);
|
|
if(!flipper_format_read_uint32(
|
|
ff, furi_string_get_cstr(temp_str), &data->counter[i].counter, 1)) {
|
|
counters_parsed = false;
|
|
break;
|
|
}
|
|
furi_string_printf(temp_str, "%s %d", MF_ULTRALIGHT_TEARING_KEY, i);
|
|
if(!flipper_format_read_hex(
|
|
ff, furi_string_get_cstr(temp_str), &data->tearing_flag[i].data, 1)) {
|
|
counters_parsed = false;
|
|
break;
|
|
}
|
|
}
|
|
if(!counters_parsed) break;
|
|
// Read pages
|
|
uint32_t pages_total = 0;
|
|
if(!flipper_format_read_uint32(ff, MF_ULTRALIGHT_PAGES_TOTAL_KEY, &pages_total, 1)) break;
|
|
uint32_t pages_read = 0;
|
|
if(data_format_version < mf_ultralight_data_format_version) { //-V547
|
|
pages_read = pages_total;
|
|
} else {
|
|
if(!flipper_format_read_uint32(ff, MF_ULTRALIGHT_PAGES_READ_KEY, &pages_read, 1))
|
|
break;
|
|
}
|
|
data->pages_total = pages_total;
|
|
data->pages_read = pages_read;
|
|
|
|
if((pages_read > MF_ULTRALIGHT_MAX_PAGE_NUM) || (pages_total > MF_ULTRALIGHT_MAX_PAGE_NUM))
|
|
break;
|
|
|
|
bool pages_parsed = true;
|
|
for(size_t i = 0; i < pages_total; i++) {
|
|
furi_string_printf(temp_str, "%s %d", MF_ULTRALIGHT_PAGE_KEY, i);
|
|
if(!flipper_format_read_hex(
|
|
ff,
|
|
furi_string_get_cstr(temp_str),
|
|
data->page[i].data,
|
|
sizeof(MfUltralightPage))) {
|
|
pages_parsed = false;
|
|
break;
|
|
}
|
|
}
|
|
if(!pages_parsed) break;
|
|
|
|
// Read authentication counter
|
|
if(!flipper_format_read_uint32(
|
|
ff, MF_ULTRALIGHT_FAILED_ATTEMPTS_KEY, &data->auth_attempts, 1)) {
|
|
data->auth_attempts = 0;
|
|
}
|
|
|
|
parsed = true;
|
|
} while(false);
|
|
|
|
furi_string_free(temp_str);
|
|
|
|
return parsed;
|
|
}
|
|
|
|
bool mf_ultralight_save(const MfUltralightData* data, FlipperFormat* ff) {
|
|
furi_assert(data);
|
|
|
|
FuriString* temp_str = furi_string_alloc();
|
|
bool saved = false;
|
|
|
|
do {
|
|
if(!iso14443_3a_save(data->iso14443_3a_data, ff)) break;
|
|
|
|
if(!flipper_format_write_comment_cstr(ff, MF_ULTRALIGHT_PROTOCOL_NAME " specific data"))
|
|
break;
|
|
if(!flipper_format_write_uint32(
|
|
ff, MF_ULTRALIGHT_FORMAT_VERSION_KEY, &mf_ultralight_data_format_version, 1))
|
|
break;
|
|
|
|
const char* device_type_name =
|
|
mf_ultralight_get_device_name_by_type(data->type, NfcDeviceNameTypeFull);
|
|
if(!flipper_format_write_string_cstr(ff, MF_ULTRALIGHT_TYPE_KEY, device_type_name)) break;
|
|
if(!flipper_format_write_hex(
|
|
ff,
|
|
MF_ULTRALIGHT_SIGNATURE_KEY,
|
|
data->signature.data,
|
|
sizeof(MfUltralightSignature)))
|
|
break;
|
|
if(!flipper_format_write_hex(
|
|
ff,
|
|
MF_ULTRALIGHT_MIFARE_VERSION_KEY,
|
|
(uint8_t*)&data->version,
|
|
sizeof(MfUltralightVersion)))
|
|
break;
|
|
|
|
// Write conters and tearing flags data
|
|
bool counters_saved = true;
|
|
for(size_t i = 0; i < 3; i++) {
|
|
furi_string_printf(temp_str, "%s %d", MF_ULTRALIGHT_COUNTER_KEY, i);
|
|
if(!flipper_format_write_uint32(
|
|
ff, furi_string_get_cstr(temp_str), &data->counter[i].counter, 1)) {
|
|
counters_saved = false;
|
|
break;
|
|
}
|
|
furi_string_printf(temp_str, "%s %d", MF_ULTRALIGHT_TEARING_KEY, i);
|
|
if(!flipper_format_write_hex(
|
|
ff, furi_string_get_cstr(temp_str), &data->tearing_flag[i].data, 1)) {
|
|
counters_saved = false;
|
|
break;
|
|
}
|
|
}
|
|
if(!counters_saved) break;
|
|
|
|
// Write pages data
|
|
uint32_t pages_total = data->pages_total;
|
|
uint32_t pages_read = data->pages_read;
|
|
if(!flipper_format_write_uint32(ff, MF_ULTRALIGHT_PAGES_TOTAL_KEY, &pages_total, 1)) break;
|
|
if(!flipper_format_write_uint32(ff, MF_ULTRALIGHT_PAGES_READ_KEY, &pages_read, 1)) break;
|
|
bool pages_saved = true;
|
|
for(size_t i = 0; i < data->pages_total; i++) {
|
|
furi_string_printf(temp_str, "%s %d", MF_ULTRALIGHT_PAGE_KEY, i);
|
|
if(!flipper_format_write_hex(
|
|
ff,
|
|
furi_string_get_cstr(temp_str),
|
|
data->page[i].data,
|
|
sizeof(MfUltralightPage))) {
|
|
pages_saved = false;
|
|
break;
|
|
}
|
|
}
|
|
if(!pages_saved) break;
|
|
|
|
// Write authentication counter
|
|
if(!flipper_format_write_uint32(
|
|
ff, MF_ULTRALIGHT_FAILED_ATTEMPTS_KEY, &data->auth_attempts, 1))
|
|
break;
|
|
|
|
saved = true;
|
|
} while(false);
|
|
|
|
furi_string_free(temp_str);
|
|
|
|
return saved;
|
|
}
|
|
|
|
bool mf_ultralight_is_equal(const MfUltralightData* data, const MfUltralightData* other) {
|
|
bool is_equal = false;
|
|
bool data_array_is_equal = true;
|
|
|
|
do {
|
|
if(!iso14443_3a_is_equal(data->iso14443_3a_data, other->iso14443_3a_data)) break;
|
|
if(data->type != other->type) break;
|
|
if(data->pages_read != other->pages_read) break;
|
|
if(data->pages_total != other->pages_total) break;
|
|
if(data->auth_attempts != other->auth_attempts) break;
|
|
|
|
if(memcmp(&data->version, &other->version, sizeof(data->version)) != 0) break;
|
|
if(memcmp(&data->signature, &other->signature, sizeof(data->signature)) != 0) break;
|
|
|
|
for(size_t i = 0; i < COUNT_OF(data->counter); i++) {
|
|
if(memcmp(&data->counter[i], &other->counter[i], sizeof(data->counter[i])) != 0) {
|
|
data_array_is_equal = false;
|
|
break;
|
|
}
|
|
}
|
|
if(!data_array_is_equal) break;
|
|
|
|
for(size_t i = 0; i < COUNT_OF(data->tearing_flag); i++) {
|
|
if(memcmp(
|
|
&data->tearing_flag[i],
|
|
&other->tearing_flag[i],
|
|
sizeof(data->tearing_flag[i])) != 0) {
|
|
data_array_is_equal = false;
|
|
break;
|
|
}
|
|
}
|
|
if(!data_array_is_equal) break;
|
|
|
|
for(size_t i = 0; i < COUNT_OF(data->page); i++) {
|
|
if(memcmp(&data->page[i], &other->page[i], sizeof(data->page[i])) != 0) {
|
|
data_array_is_equal = false;
|
|
break;
|
|
}
|
|
}
|
|
if(!data_array_is_equal) break;
|
|
|
|
is_equal = true;
|
|
} while(false);
|
|
|
|
return is_equal;
|
|
}
|
|
|
|
const char*
|
|
mf_ultralight_get_device_name(const MfUltralightData* data, NfcDeviceNameType name_type) {
|
|
furi_assert(data);
|
|
furi_assert(data->type < MfUltralightTypeNum);
|
|
|
|
return mf_ultralight_get_device_name_by_type(data->type, name_type);
|
|
}
|
|
|
|
const uint8_t* mf_ultralight_get_uid(const MfUltralightData* data, size_t* uid_len) {
|
|
furi_assert(data);
|
|
|
|
return iso14443_3a_get_uid(data->iso14443_3a_data, uid_len);
|
|
}
|
|
|
|
bool mf_ultralight_set_uid(MfUltralightData* data, const uint8_t* uid, size_t uid_len) {
|
|
furi_assert(data);
|
|
|
|
return iso14443_3a_set_uid(data->iso14443_3a_data, uid, uid_len);
|
|
}
|
|
|
|
Iso14443_3aData* mf_ultralight_get_base_data(const MfUltralightData* data) {
|
|
furi_assert(data);
|
|
|
|
return data->iso14443_3a_data;
|
|
}
|
|
|
|
MfUltralightType mf_ultralight_get_type_by_version(MfUltralightVersion* version) {
|
|
furi_assert(version);
|
|
|
|
MfUltralightType type = MfUltralightTypeUnknown;
|
|
|
|
if(version->storage_size == 0x0B || version->storage_size == 0x00) {
|
|
type = MfUltralightTypeUL11;
|
|
} else if(version->storage_size == 0x0E) {
|
|
type = MfUltralightTypeUL21;
|
|
} else if(version->storage_size == 0x0F) {
|
|
type = MfUltralightTypeNTAG213;
|
|
} else if(version->storage_size == 0x11) {
|
|
type = MfUltralightTypeNTAG215;
|
|
} else if(version->prod_subtype == 5 && version->prod_ver_major == 2) {
|
|
if(version->prod_ver_minor == 1) {
|
|
if(version->storage_size == 0x13) {
|
|
type = MfUltralightTypeNTAGI2C1K;
|
|
} else if(version->storage_size == 0x15) {
|
|
type = MfUltralightTypeNTAGI2C2K;
|
|
}
|
|
} else if(version->prod_ver_minor == 2) {
|
|
if(version->storage_size == 0x13) {
|
|
type = MfUltralightTypeNTAGI2CPlus1K;
|
|
} else if(version->storage_size == 0x15) {
|
|
type = MfUltralightTypeNTAGI2CPlus2K;
|
|
}
|
|
}
|
|
} else if(version->storage_size == 0x13) {
|
|
type = MfUltralightTypeNTAG216;
|
|
}
|
|
|
|
return type;
|
|
}
|
|
|
|
uint16_t mf_ultralight_get_pages_total(MfUltralightType type) {
|
|
return mf_ultralight_features[type].total_pages;
|
|
}
|
|
|
|
uint32_t mf_ultralight_get_feature_support_set(MfUltralightType type) {
|
|
return mf_ultralight_features[type].feature_set;
|
|
}
|
|
|
|
bool mf_ultralight_detect_protocol(const Iso14443_3aData* iso14443_3a_data) {
|
|
furi_assert(iso14443_3a_data);
|
|
|
|
bool mfu_detected = (iso14443_3a_data->atqa[0] == 0x44) &&
|
|
(iso14443_3a_data->atqa[1] == 0x00) && (iso14443_3a_data->sak == 0x00);
|
|
|
|
return mfu_detected;
|
|
}
|
|
|
|
uint16_t mf_ultralight_get_config_page_num(MfUltralightType type) {
|
|
return mf_ultralight_features[type].config_page;
|
|
}
|
|
|
|
uint8_t mf_ultralight_get_pwd_page_num(MfUltralightType type) {
|
|
uint8_t config_page = mf_ultralight_features[type].config_page;
|
|
return (config_page != 0) ? config_page + 2 : 0;
|
|
}
|
|
|
|
bool mf_ultralight_is_page_pwd_or_pack(MfUltralightType type, uint16_t page) {
|
|
uint8_t pwd_page = mf_ultralight_get_pwd_page_num(type);
|
|
uint8_t pack_page = pwd_page + 1;
|
|
return ((pwd_page != 0) && (page == pwd_page || page == pack_page));
|
|
}
|
|
|
|
bool mf_ultralight_support_feature(const uint32_t feature_set, const uint32_t features_to_check) {
|
|
return (feature_set & features_to_check) != 0;
|
|
}
|
|
|
|
bool mf_ultralight_get_config_page(const MfUltralightData* data, MfUltralightConfigPages** config) {
|
|
furi_assert(data);
|
|
furi_assert(config);
|
|
|
|
bool config_pages_found = false;
|
|
|
|
uint16_t config_page = mf_ultralight_features[data->type].config_page;
|
|
if(config_page != 0) {
|
|
*config = (MfUltralightConfigPages*)&data->page[config_page]; //-V1027
|
|
config_pages_found = true;
|
|
}
|
|
|
|
return config_pages_found;
|
|
}
|
|
|
|
bool mf_ultralight_is_all_data_read(const MfUltralightData* data) {
|
|
furi_assert(data);
|
|
|
|
bool all_read = false;
|
|
if(data->pages_read == data->pages_total ||
|
|
(data->type == MfUltralightTypeMfulC && data->pages_read == data->pages_total - 4)) {
|
|
// Having read all the pages doesn't mean that we've got everything.
|
|
// By default PWD is 0xFFFFFFFF, but if read back it is always 0x00000000,
|
|
// so a default read on an auth-supported NTAG is never complete.
|
|
uint32_t feature_set = mf_ultralight_get_feature_support_set(data->type);
|
|
if(!mf_ultralight_support_feature(feature_set, MfUltralightFeatureSupportPasswordAuth)) {
|
|
all_read = true;
|
|
} else {
|
|
MfUltralightConfigPages* config = NULL;
|
|
if(mf_ultralight_get_config_page(data, &config)) {
|
|
uint32_t pass =
|
|
nfc_util_bytes2num(config->password.data, sizeof(MfUltralightAuthPassword));
|
|
uint16_t pack =
|
|
nfc_util_bytes2num(config->pack.data, sizeof(MfUltralightAuthPack));
|
|
all_read = ((pass != 0) || (pack != 0));
|
|
}
|
|
}
|
|
}
|
|
|
|
return all_read;
|
|
}
|
|
|
|
bool mf_ultralight_is_counter_configured(const MfUltralightData* data) {
|
|
furi_assert(data);
|
|
|
|
MfUltralightConfigPages* config = NULL;
|
|
bool configured = false;
|
|
|
|
switch(data->type) {
|
|
case MfUltralightTypeNTAG213:
|
|
case MfUltralightTypeNTAG215:
|
|
case MfUltralightTypeNTAG216:
|
|
if(mf_ultralight_get_config_page(data, &config)) {
|
|
configured = config->access.nfc_cnt_en;
|
|
}
|
|
break;
|
|
|
|
default:
|
|
configured = true;
|
|
break;
|
|
}
|
|
|
|
return configured;
|
|
}
|