mirror of
https://github.com/DarkFlippers/unleashed-firmware.git
synced 2024-11-29 03:43:51 +03:00
6b47bc1af4
* nfc: MFUL minor cleanup * nfc: Add mechanism to pass event data * nfc: Add NTAG authentication event to emulation * nfc: Rename enum member to align with existing convention * nfc: Add function to determine whether MFUL is fully captured * nfc: Fix emulation of incompletely-read password-protected MFUL * nfc: Add reader password capture scene * nfc: Set default MFUL password input to 0xFFFFFFFF * nfc: Fix MFUL auth counter loading * nfc: Be explicit about using manual auth method when using auto unlock * nfc: Fill in MFUL has_auth when loading file * nfc: Fix MFUL auth success usage, remove unused variable * nfc: Display PWD and PACK in MFUL info if available * nfc: Remove unnecessary include * nfc: Add unlock options to loaded MFUL menu * nfc: Move set default MFUL password. This way it can be edited if needed instead of reentered * nfc: Fix unlock menu not maintaining selection index * nfc: Move captured MFUL auth data from worker to device data * nfc: Attempt to authenticate with default PWD when possible when reading NTAG * nfc: Don't try to auth NTAG on read if we already authed * nfc: Add title for all pages read but failed auth for NTAG auth * nfc: Add faster auth callback patch * lib: Remove scons submodule from index * nfc: Revise MFUL unlock UI flow * nfc: Disallow MFUL unlock with reader if card not read yet. Trying to read first results in either needing to make a new scene or badly jury rigging other scenes, so let's just not do that * f7: Bump API symbols * Format code Co-authored-by: gornekich <n.gorbadey@gmail.com> Co-authored-by: あく <alleteam@gmail.com>
148 lines
6.0 KiB
C
148 lines
6.0 KiB
C
#include "../nfc_i.h"
|
|
|
|
void nfc_scene_nfc_data_info_widget_callback(GuiButtonType result, InputType type, void* context) {
|
|
Nfc* nfc = context;
|
|
if(type == InputTypeShort) {
|
|
view_dispatcher_send_custom_event(nfc->view_dispatcher, result);
|
|
}
|
|
}
|
|
|
|
void nfc_scene_nfc_data_info_on_enter(void* context) {
|
|
Nfc* nfc = context;
|
|
Widget* widget = nfc->widget;
|
|
FuriHalNfcDevData* nfc_data = &nfc->dev->dev_data.nfc_data;
|
|
NfcDeviceData* dev_data = &nfc->dev->dev_data;
|
|
NfcProtocol protocol = dev_data->protocol;
|
|
uint8_t text_scroll_height = 0;
|
|
if((protocol == NfcDeviceProtocolMifareDesfire) || (protocol == NfcDeviceProtocolMifareUl)) {
|
|
widget_add_button_element(
|
|
widget, GuiButtonTypeRight, "More", nfc_scene_nfc_data_info_widget_callback, nfc);
|
|
text_scroll_height = 52;
|
|
} else {
|
|
text_scroll_height = 64;
|
|
}
|
|
|
|
FuriString* temp_str;
|
|
temp_str = furi_string_alloc();
|
|
// Set name if present
|
|
if(nfc->dev->dev_name[0] != '\0') {
|
|
furi_string_printf(temp_str, "\ec%s\n", nfc->dev->dev_name);
|
|
}
|
|
|
|
// Set tag type
|
|
if(protocol == NfcDeviceProtocolEMV) {
|
|
furi_string_cat_printf(temp_str, "\e#EMV Bank Card\n");
|
|
} else if(protocol == NfcDeviceProtocolMifareUl) {
|
|
furi_string_cat_printf(
|
|
temp_str, "\e#%s\n", nfc_mf_ul_type(dev_data->mf_ul_data.type, true));
|
|
} else if(protocol == NfcDeviceProtocolMifareClassic) {
|
|
furi_string_cat_printf(
|
|
temp_str, "\e#%s\n", nfc_mf_classic_type(dev_data->mf_classic_data.type));
|
|
} else if(protocol == NfcDeviceProtocolMifareDesfire) {
|
|
furi_string_cat_printf(temp_str, "\e#MIFARE DESfire\n");
|
|
} else {
|
|
furi_string_cat_printf(temp_str, "\e#Unknown ISO tag\n");
|
|
}
|
|
|
|
// Set tag iso data
|
|
char iso_type = FURI_BIT(nfc_data->sak, 5) ? '4' : '3';
|
|
furi_string_cat_printf(temp_str, "ISO 14443-%c (NFC-A)\n", iso_type);
|
|
furi_string_cat_printf(temp_str, "UID:");
|
|
for(size_t i = 0; i < nfc_data->uid_len; i++) {
|
|
furi_string_cat_printf(temp_str, " %02X", nfc_data->uid[i]);
|
|
}
|
|
furi_string_cat_printf(temp_str, "\nATQA: %02X %02X ", nfc_data->atqa[1], nfc_data->atqa[0]);
|
|
furi_string_cat_printf(temp_str, " SAK: %02X", nfc_data->sak);
|
|
|
|
// Set application specific data
|
|
if(protocol == NfcDeviceProtocolMifareDesfire) {
|
|
MifareDesfireData* data = &dev_data->mf_df_data;
|
|
uint32_t bytes_total = 1 << (data->version.sw_storage >> 1);
|
|
uint32_t bytes_free = data->free_memory ? data->free_memory->bytes : 0;
|
|
furi_string_cat_printf(temp_str, "\n%ld", bytes_total);
|
|
if(data->version.sw_storage & 1) {
|
|
furi_string_push_back(temp_str, '+');
|
|
}
|
|
furi_string_cat_printf(temp_str, " bytes, %ld bytes free\n", bytes_free);
|
|
|
|
uint16_t n_apps = 0;
|
|
uint16_t n_files = 0;
|
|
for(MifareDesfireApplication* app = data->app_head; app; app = app->next) {
|
|
n_apps++;
|
|
for(MifareDesfireFile* file = app->file_head; file; file = file->next) {
|
|
n_files++;
|
|
}
|
|
}
|
|
furi_string_cat_printf(temp_str, "%d Application", n_apps);
|
|
if(n_apps != 1) {
|
|
furi_string_push_back(temp_str, 's');
|
|
}
|
|
furi_string_cat_printf(temp_str, ", %d file", n_files);
|
|
if(n_files != 1) {
|
|
furi_string_push_back(temp_str, 's');
|
|
}
|
|
} else if(protocol == NfcDeviceProtocolMifareUl) {
|
|
MfUltralightData* data = &dev_data->mf_ul_data;
|
|
furi_string_cat_printf(
|
|
temp_str, "\nPages Read %d/%d", data->data_read / 4, data->data_size / 4);
|
|
if(data->data_size > data->data_read) {
|
|
furi_string_cat_printf(temp_str, "\nPassword-protected");
|
|
} else if(data->auth_success) {
|
|
MfUltralightConfigPages* config_pages = mf_ultralight_get_config_pages(data);
|
|
furi_string_cat_printf(
|
|
temp_str,
|
|
"\nPassword: %02X %02X %02X %02X",
|
|
config_pages->auth_data.pwd.raw[0],
|
|
config_pages->auth_data.pwd.raw[1],
|
|
config_pages->auth_data.pwd.raw[2],
|
|
config_pages->auth_data.pwd.raw[3]);
|
|
furi_string_cat_printf(
|
|
temp_str,
|
|
"\nPACK: %02X %02X",
|
|
config_pages->auth_data.pack.raw[0],
|
|
config_pages->auth_data.pack.raw[1]);
|
|
}
|
|
} else if(protocol == NfcDeviceProtocolMifareClassic) {
|
|
MfClassicData* data = &dev_data->mf_classic_data;
|
|
uint8_t sectors_total = mf_classic_get_total_sectors_num(data->type);
|
|
uint8_t keys_total = sectors_total * 2;
|
|
uint8_t keys_found = 0;
|
|
uint8_t sectors_read = 0;
|
|
mf_classic_get_read_sectors_and_keys(data, §ors_read, &keys_found);
|
|
furi_string_cat_printf(temp_str, "\nKeys Found %d/%d", keys_found, keys_total);
|
|
furi_string_cat_printf(temp_str, "\nSectors Read %d/%d", sectors_read, sectors_total);
|
|
}
|
|
|
|
// Add text scroll widget
|
|
widget_add_text_scroll_element(
|
|
widget, 0, 0, 128, text_scroll_height, furi_string_get_cstr(temp_str));
|
|
furi_string_free(temp_str);
|
|
|
|
view_dispatcher_switch_to_view(nfc->view_dispatcher, NfcViewWidget);
|
|
}
|
|
|
|
bool nfc_scene_nfc_data_info_on_event(void* context, SceneManagerEvent event) {
|
|
Nfc* nfc = context;
|
|
NfcProtocol protocol = nfc->dev->dev_data.protocol;
|
|
bool consumed = false;
|
|
|
|
if(event.type == SceneManagerEventTypeCustom) {
|
|
if(event.event == GuiButtonTypeRight) {
|
|
if(protocol == NfcDeviceProtocolMifareDesfire) {
|
|
scene_manager_next_scene(nfc->scene_manager, NfcSceneMfDesfireData);
|
|
consumed = true;
|
|
} else if(protocol == NfcDeviceProtocolMifareUl) {
|
|
scene_manager_next_scene(nfc->scene_manager, NfcSceneMfUltralightData);
|
|
consumed = true;
|
|
}
|
|
}
|
|
}
|
|
|
|
return consumed;
|
|
}
|
|
|
|
void nfc_scene_nfc_data_info_on_exit(void* context) {
|
|
Nfc* nfc = context;
|
|
|
|
widget_reset(nfc->widget);
|
|
} |