unleashed-firmware/lib/nfc/protocols/mf_ultralight/mf_ultralight.c
gornekich 3d872cf37a
[FL-3637] NFC RC fixes (#3165)
* firmware: remove nfc lib build settings section
* furi hal nfc: fix nfc irq gpio deinit
* lib nfc: remove deprecated exception from sources
* nfc: use ASK demodulator in transparent mode
* mf ultralight: add upper page bound for NTAGI2C1K
* furi hal nfc: set event if nfc event was started
* nfc: fix PVS warnings
* lib signal reader: remove gpio pull setting in alloc
* furi: added math.h include for compatibility with existing apps
* nfc: remove resolved TODO in mf desfire poller
* bump api symbol version

Co-authored-by: hedger <hedger@nanode.su>
Co-authored-by: あく <alleteam@gmail.com>
2023-10-28 23:22:07 +09:00

628 lines
23 KiB
C

#include "mf_ultralight.h"
#include <nfc/helpers/nfc_util.h>
#include <furi.h>
#define MF_ULTRALIGHT_PROTOCOL_NAME "NTAG/Ultralight"
#define MF_ULTRALIGHT_FORMAT_VERSION_KEY "Data format version"
#define MF_ULTRALIGHT_TYPE_KEY MF_ULTRALIGHT_PROTOCOL_NAME " type"
#define MF_ULTRALIGHT_SIGNATURE_KEY "Signature"
#define MF_ULTRALIGHT_MIFARE_VERSION_KEY "Mifare version"
#define MF_ULTRALIGHT_COUNTER_KEY "Counter"
#define MF_ULTRALIGHT_TEARING_KEY "Tearing"
#define MF_ULTRALIGHT_PAGES_TOTAL_KEY "Pages total"
#define MF_ULTRALIGHT_PAGES_READ_KEY "Pages read"
#define MF_ULTRALIGHT_PAGE_KEY "Page"
#define MF_ULTRALIGHT_FAILED_ATTEMPTS_KEY "Failed authentication attempts"
typedef struct {
const char* device_name;
uint16_t total_pages;
uint16_t config_page;
uint32_t feature_set;
} MfUltralightFeatures;
static const uint32_t mf_ultralight_data_format_version = 2;
static const MfUltralightFeatures mf_ultralight_features[MfUltralightTypeNum] = {
[MfUltralightTypeUnknown] =
{
.device_name = "Mifare Ultralight",
.total_pages = 16,
.config_page = 0,
.feature_set = MfUltralightFeatureSupportCompatibleWrite,
},
[MfUltralightTypeMfulC] =
{
.device_name = "Mifare Ultralight C",
.total_pages = 48,
.config_page = 0,
.feature_set = MfUltralightFeatureSupportCompatibleWrite |
MfUltralightFeatureSupportAuthenticate,
},
[MfUltralightTypeNTAG203] =
{
.device_name = "NTAG203",
.total_pages = 42,
.config_page = 0,
.feature_set = MfUltralightFeatureSupportCompatibleWrite |
MfUltralightFeatureSupportCounterInMemory,
},
[MfUltralightTypeUL11] =
{
.device_name = "Mifare Ultralight 11",
.total_pages = 20,
.config_page = 16,
.feature_set =
MfUltralightFeatureSupportReadVersion | MfUltralightFeatureSupportReadSignature |
MfUltralightFeatureSupportReadCounter |
MfUltralightFeatureSupportCheckTearingFlag | MfUltralightFeatureSupportFastRead |
MfUltralightFeatureSupportIncCounter | MfUltralightFeatureSupportCompatibleWrite |
MfUltralightFeatureSupportPasswordAuth | MfUltralightFeatureSupportVcsl,
},
[MfUltralightTypeUL21] =
{
.device_name = "Mifare Ultralight 21",
.total_pages = 41,
.config_page = 37,
.feature_set =
MfUltralightFeatureSupportReadVersion | MfUltralightFeatureSupportReadSignature |
MfUltralightFeatureSupportReadCounter |
MfUltralightFeatureSupportCheckTearingFlag | MfUltralightFeatureSupportFastRead |
MfUltralightFeatureSupportIncCounter | MfUltralightFeatureSupportCompatibleWrite |
MfUltralightFeatureSupportPasswordAuth | MfUltralightFeatureSupportVcsl |
MfUltralightFeatureSupportDynamicLock,
},
[MfUltralightTypeNTAG213] =
{
.device_name = "NTAG213",
.total_pages = 45,
.config_page = 41,
.feature_set =
MfUltralightFeatureSupportReadVersion | MfUltralightFeatureSupportReadSignature |
MfUltralightFeatureSupportReadCounter | MfUltralightFeatureSupportFastRead |
MfUltralightFeatureSupportCompatibleWrite |
MfUltralightFeatureSupportPasswordAuth | MfUltralightFeatureSupportSingleCounter |
MfUltralightFeatureSupportAsciiMirror | MfUltralightFeatureSupportDynamicLock,
},
[MfUltralightTypeNTAG215] =
{
.device_name = "NTAG215",
.total_pages = 135,
.config_page = 131,
.feature_set =
MfUltralightFeatureSupportReadVersion | MfUltralightFeatureSupportReadSignature |
MfUltralightFeatureSupportReadCounter | MfUltralightFeatureSupportFastRead |
MfUltralightFeatureSupportCompatibleWrite |
MfUltralightFeatureSupportPasswordAuth | MfUltralightFeatureSupportSingleCounter |
MfUltralightFeatureSupportAsciiMirror | MfUltralightFeatureSupportDynamicLock,
},
[MfUltralightTypeNTAG216] =
{
.device_name = "NTAG216",
.total_pages = 231,
.config_page = 227,
.feature_set =
MfUltralightFeatureSupportReadVersion | MfUltralightFeatureSupportReadSignature |
MfUltralightFeatureSupportReadCounter | MfUltralightFeatureSupportFastRead |
MfUltralightFeatureSupportCompatibleWrite |
MfUltralightFeatureSupportPasswordAuth | MfUltralightFeatureSupportSingleCounter |
MfUltralightFeatureSupportAsciiMirror | MfUltralightFeatureSupportDynamicLock,
},
[MfUltralightTypeNTAGI2C1K] =
{
.device_name = "NTAG I2C 1K",
.total_pages = 231,
.config_page = 0,
.feature_set =
MfUltralightFeatureSupportReadVersion | MfUltralightFeatureSupportFastRead |
MfUltralightFeatureSupportSectorSelect | MfUltralightFeatureSupportDynamicLock,
},
[MfUltralightTypeNTAGI2C2K] =
{
.device_name = "NTAG I2C 2K",
.total_pages = 485,
.config_page = 0,
.feature_set =
MfUltralightFeatureSupportReadVersion | MfUltralightFeatureSupportFastRead |
MfUltralightFeatureSupportSectorSelect | MfUltralightFeatureSupportDynamicLock,
},
[MfUltralightTypeNTAGI2CPlus1K] =
{
.device_name = "NTAG I2C Plus 1K",
.total_pages = 236,
.config_page = 227,
.feature_set =
MfUltralightFeatureSupportReadVersion | MfUltralightFeatureSupportReadSignature |
MfUltralightFeatureSupportFastRead | MfUltralightFeatureSupportPasswordAuth |
MfUltralightFeatureSupportSectorSelect | MfUltralightFeatureSupportFastWrite |
MfUltralightFeatureSupportDynamicLock,
},
[MfUltralightTypeNTAGI2CPlus2K] =
{
.device_name = "NTAG I2C Plus 2K",
.total_pages = 492,
.config_page = 227,
.feature_set =
MfUltralightFeatureSupportReadVersion | MfUltralightFeatureSupportReadSignature |
MfUltralightFeatureSupportFastRead | MfUltralightFeatureSupportPasswordAuth |
MfUltralightFeatureSupportSectorSelect | MfUltralightFeatureSupportFastWrite |
MfUltralightFeatureSupportDynamicLock,
},
};
const NfcDeviceBase nfc_device_mf_ultralight = {
.protocol_name = MF_ULTRALIGHT_PROTOCOL_NAME,
.alloc = (NfcDeviceAlloc)mf_ultralight_alloc,
.free = (NfcDeviceFree)mf_ultralight_free,
.reset = (NfcDeviceReset)mf_ultralight_reset,
.copy = (NfcDeviceCopy)mf_ultralight_copy,
.verify = (NfcDeviceVerify)mf_ultralight_verify,
.load = (NfcDeviceLoad)mf_ultralight_load,
.save = (NfcDeviceSave)mf_ultralight_save,
.is_equal = (NfcDeviceEqual)mf_ultralight_is_equal,
.get_name = (NfcDeviceGetName)mf_ultralight_get_device_name,
.get_uid = (NfcDeviceGetUid)mf_ultralight_get_uid,
.set_uid = (NfcDeviceSetUid)mf_ultralight_set_uid,
.get_base_data = (NfcDeviceGetBaseData)mf_ultralight_get_base_data,
};
MfUltralightData* mf_ultralight_alloc() {
MfUltralightData* data = malloc(sizeof(MfUltralightData));
data->iso14443_3a_data = iso14443_3a_alloc();
return data;
}
void mf_ultralight_free(MfUltralightData* data) {
furi_assert(data);
iso14443_3a_free(data->iso14443_3a_data);
free(data);
}
void mf_ultralight_reset(MfUltralightData* data) {
furi_assert(data);
iso14443_3a_reset(data->iso14443_3a_data);
}
void mf_ultralight_copy(MfUltralightData* data, const MfUltralightData* other) {
furi_assert(data);
furi_assert(other);
iso14443_3a_copy(data->iso14443_3a_data, other->iso14443_3a_data);
for(size_t i = 0; i < COUNT_OF(data->counter); i++) {
data->counter[i] = other->counter[i];
}
for(size_t i = 0; i < COUNT_OF(data->tearing_flag); i++) {
data->tearing_flag[i] = other->tearing_flag[i];
}
for(size_t i = 0; i < COUNT_OF(data->page); i++) {
data->page[i] = other->page[i];
}
data->type = other->type;
data->version = other->version;
data->signature = other->signature;
data->pages_read = other->pages_read;
data->pages_total = other->pages_total;
data->auth_attempts = other->auth_attempts;
}
static const char*
mf_ultralight_get_device_name_by_type(MfUltralightType type, NfcDeviceNameType name_type) {
if(name_type == NfcDeviceNameTypeShort &&
(type == MfUltralightTypeUL11 || type == MfUltralightTypeUL21)) {
type = MfUltralightTypeUnknown;
}
return mf_ultralight_features[type].device_name;
}
bool mf_ultralight_verify(MfUltralightData* data, const FuriString* device_type) {
furi_assert(data);
bool verified = false;
for(MfUltralightType i = 0; i < MfUltralightTypeNum; i++) {
const char* name = mf_ultralight_get_device_name_by_type(i, NfcDeviceNameTypeFull);
verified = furi_string_equal(device_type, name);
if(verified) {
data->type = i;
break;
}
}
return verified;
}
bool mf_ultralight_load(MfUltralightData* data, FlipperFormat* ff, uint32_t version) {
furi_assert(data);
FuriString* temp_str = furi_string_alloc();
bool parsed = false;
do {
// Read ISO14443_3A data
if(!iso14443_3a_load(data->iso14443_3a_data, ff, version)) break;
// Read Ultralight specific data
// Read Mifare Ultralight format version
uint32_t data_format_version = 0;
if(!flipper_format_read_uint32(
ff, MF_ULTRALIGHT_FORMAT_VERSION_KEY, &data_format_version, 1)) {
if(!flipper_format_rewind(ff)) break;
}
// Read Mifare Ultralight type
if(data_format_version > 1) {
if(!flipper_format_read_string(ff, MF_ULTRALIGHT_TYPE_KEY, temp_str)) break;
if(!mf_ultralight_verify(data, temp_str)) break;
}
// Read signature
if(!flipper_format_read_hex(
ff,
MF_ULTRALIGHT_SIGNATURE_KEY,
data->signature.data,
sizeof(MfUltralightSignature)))
break;
// Read Mifare version
if(!flipper_format_read_hex(
ff,
MF_ULTRALIGHT_MIFARE_VERSION_KEY,
(uint8_t*)&data->version,
sizeof(MfUltralightVersion)))
break;
// Read counters and tearing flags
bool counters_parsed = true;
for(size_t i = 0; i < 3; i++) {
furi_string_printf(temp_str, "%s %d", MF_ULTRALIGHT_COUNTER_KEY, i);
if(!flipper_format_read_uint32(
ff, furi_string_get_cstr(temp_str), &data->counter[i].counter, 1)) {
counters_parsed = false;
break;
}
furi_string_printf(temp_str, "%s %d", MF_ULTRALIGHT_TEARING_KEY, i);
if(!flipper_format_read_hex(
ff, furi_string_get_cstr(temp_str), &data->tearing_flag[i].data, 1)) {
counters_parsed = false;
break;
}
}
if(!counters_parsed) break;
// Read pages
uint32_t pages_total = 0;
if(!flipper_format_read_uint32(ff, MF_ULTRALIGHT_PAGES_TOTAL_KEY, &pages_total, 1)) break;
uint32_t pages_read = 0;
if(data_format_version < mf_ultralight_data_format_version) { //-V547
pages_read = pages_total;
} else {
if(!flipper_format_read_uint32(ff, MF_ULTRALIGHT_PAGES_READ_KEY, &pages_read, 1))
break;
}
data->pages_total = pages_total;
data->pages_read = pages_read;
if((pages_read > MF_ULTRALIGHT_MAX_PAGE_NUM) || (pages_total > MF_ULTRALIGHT_MAX_PAGE_NUM))
break;
bool pages_parsed = true;
for(size_t i = 0; i < pages_total; i++) {
furi_string_printf(temp_str, "%s %d", MF_ULTRALIGHT_PAGE_KEY, i);
if(!flipper_format_read_hex(
ff,
furi_string_get_cstr(temp_str),
data->page[i].data,
sizeof(MfUltralightPage))) {
pages_parsed = false;
break;
}
}
if(!pages_parsed) break;
// Read authentication counter
if(!flipper_format_read_uint32(
ff, MF_ULTRALIGHT_FAILED_ATTEMPTS_KEY, &data->auth_attempts, 1)) {
data->auth_attempts = 0;
}
parsed = true;
} while(false);
furi_string_free(temp_str);
return parsed;
}
bool mf_ultralight_save(const MfUltralightData* data, FlipperFormat* ff) {
furi_assert(data);
FuriString* temp_str = furi_string_alloc();
bool saved = false;
do {
if(!iso14443_3a_save(data->iso14443_3a_data, ff)) break;
if(!flipper_format_write_comment_cstr(ff, MF_ULTRALIGHT_PROTOCOL_NAME " specific data"))
break;
if(!flipper_format_write_uint32(
ff, MF_ULTRALIGHT_FORMAT_VERSION_KEY, &mf_ultralight_data_format_version, 1))
break;
const char* device_type_name =
mf_ultralight_get_device_name_by_type(data->type, NfcDeviceNameTypeFull);
if(!flipper_format_write_string_cstr(ff, MF_ULTRALIGHT_TYPE_KEY, device_type_name)) break;
if(!flipper_format_write_hex(
ff,
MF_ULTRALIGHT_SIGNATURE_KEY,
data->signature.data,
sizeof(MfUltralightSignature)))
break;
if(!flipper_format_write_hex(
ff,
MF_ULTRALIGHT_MIFARE_VERSION_KEY,
(uint8_t*)&data->version,
sizeof(MfUltralightVersion)))
break;
// Write conters and tearing flags data
bool counters_saved = true;
for(size_t i = 0; i < 3; i++) {
furi_string_printf(temp_str, "%s %d", MF_ULTRALIGHT_COUNTER_KEY, i);
if(!flipper_format_write_uint32(
ff, furi_string_get_cstr(temp_str), &data->counter[i].counter, 1)) {
counters_saved = false;
break;
}
furi_string_printf(temp_str, "%s %d", MF_ULTRALIGHT_TEARING_KEY, i);
if(!flipper_format_write_hex(
ff, furi_string_get_cstr(temp_str), &data->tearing_flag[i].data, 1)) {
counters_saved = false;
break;
}
}
if(!counters_saved) break;
// Write pages data
uint32_t pages_total = data->pages_total;
uint32_t pages_read = data->pages_read;
if(!flipper_format_write_uint32(ff, MF_ULTRALIGHT_PAGES_TOTAL_KEY, &pages_total, 1)) break;
if(!flipper_format_write_uint32(ff, MF_ULTRALIGHT_PAGES_READ_KEY, &pages_read, 1)) break;
bool pages_saved = true;
for(size_t i = 0; i < data->pages_total; i++) {
furi_string_printf(temp_str, "%s %d", MF_ULTRALIGHT_PAGE_KEY, i);
if(!flipper_format_write_hex(
ff,
furi_string_get_cstr(temp_str),
data->page[i].data,
sizeof(MfUltralightPage))) {
pages_saved = false;
break;
}
}
if(!pages_saved) break;
// Write authentication counter
if(!flipper_format_write_uint32(
ff, MF_ULTRALIGHT_FAILED_ATTEMPTS_KEY, &data->auth_attempts, 1))
break;
saved = true;
} while(false);
furi_string_free(temp_str);
return saved;
}
bool mf_ultralight_is_equal(const MfUltralightData* data, const MfUltralightData* other) {
bool is_equal = false;
bool data_array_is_equal = true;
do {
if(!iso14443_3a_is_equal(data->iso14443_3a_data, other->iso14443_3a_data)) break;
if(data->type != other->type) break;
if(data->pages_read != other->pages_read) break;
if(data->pages_total != other->pages_total) break;
if(data->auth_attempts != other->auth_attempts) break;
if(memcmp(&data->version, &other->version, sizeof(data->version)) != 0) break;
if(memcmp(&data->signature, &other->signature, sizeof(data->signature)) != 0) break;
for(size_t i = 0; i < COUNT_OF(data->counter); i++) {
if(memcmp(&data->counter[i], &other->counter[i], sizeof(data->counter[i])) != 0) {
data_array_is_equal = false;
break;
}
}
if(!data_array_is_equal) break;
for(size_t i = 0; i < COUNT_OF(data->tearing_flag); i++) {
if(memcmp(
&data->tearing_flag[i],
&other->tearing_flag[i],
sizeof(data->tearing_flag[i])) != 0) {
data_array_is_equal = false;
break;
}
}
if(!data_array_is_equal) break;
for(size_t i = 0; i < COUNT_OF(data->page); i++) {
if(memcmp(&data->page[i], &other->page[i], sizeof(data->page[i])) != 0) {
data_array_is_equal = false;
break;
}
}
if(!data_array_is_equal) break;
is_equal = true;
} while(false);
return is_equal;
}
const char*
mf_ultralight_get_device_name(const MfUltralightData* data, NfcDeviceNameType name_type) {
furi_assert(data);
furi_assert(data->type < MfUltralightTypeNum);
return mf_ultralight_get_device_name_by_type(data->type, name_type);
}
const uint8_t* mf_ultralight_get_uid(const MfUltralightData* data, size_t* uid_len) {
furi_assert(data);
return iso14443_3a_get_uid(data->iso14443_3a_data, uid_len);
}
bool mf_ultralight_set_uid(MfUltralightData* data, const uint8_t* uid, size_t uid_len) {
furi_assert(data);
return iso14443_3a_set_uid(data->iso14443_3a_data, uid, uid_len);
}
Iso14443_3aData* mf_ultralight_get_base_data(const MfUltralightData* data) {
furi_assert(data);
return data->iso14443_3a_data;
}
MfUltralightType mf_ultralight_get_type_by_version(MfUltralightVersion* version) {
furi_assert(version);
MfUltralightType type = MfUltralightTypeUnknown;
if(version->storage_size == 0x0B || version->storage_size == 0x00) {
type = MfUltralightTypeUL11;
} else if(version->storage_size == 0x0E) {
type = MfUltralightTypeUL21;
} else if(version->storage_size == 0x0F) {
type = MfUltralightTypeNTAG213;
} else if(version->storage_size == 0x11) {
type = MfUltralightTypeNTAG215;
} else if(version->prod_subtype == 5 && version->prod_ver_major == 2) {
if(version->prod_ver_minor == 1) {
if(version->storage_size == 0x13) {
type = MfUltralightTypeNTAGI2C1K;
} else if(version->storage_size == 0x15) {
type = MfUltralightTypeNTAGI2C2K;
}
} else if(version->prod_ver_minor == 2) {
if(version->storage_size == 0x13) {
type = MfUltralightTypeNTAGI2CPlus1K;
} else if(version->storage_size == 0x15) {
type = MfUltralightTypeNTAGI2CPlus2K;
}
}
} else if(version->storage_size == 0x13) {
type = MfUltralightTypeNTAG216;
}
return type;
}
uint16_t mf_ultralight_get_pages_total(MfUltralightType type) {
return mf_ultralight_features[type].total_pages;
}
uint32_t mf_ultralight_get_feature_support_set(MfUltralightType type) {
return mf_ultralight_features[type].feature_set;
}
bool mf_ultralight_detect_protocol(const Iso14443_3aData* iso14443_3a_data) {
furi_assert(iso14443_3a_data);
bool mfu_detected = (iso14443_3a_data->atqa[0] == 0x44) &&
(iso14443_3a_data->atqa[1] == 0x00) && (iso14443_3a_data->sak == 0x00);
return mfu_detected;
}
uint16_t mf_ultralight_get_config_page_num(MfUltralightType type) {
return mf_ultralight_features[type].config_page;
}
uint8_t mf_ultralight_get_pwd_page_num(MfUltralightType type) {
uint8_t config_page = mf_ultralight_features[type].config_page;
return (config_page != 0) ? config_page + 2 : 0;
}
bool mf_ultralight_is_page_pwd_or_pack(MfUltralightType type, uint16_t page) {
uint8_t pwd_page = mf_ultralight_get_pwd_page_num(type);
uint8_t pack_page = pwd_page + 1;
return ((pwd_page != 0) && (page == pwd_page || page == pack_page));
}
bool mf_ultralight_support_feature(const uint32_t feature_set, const uint32_t features_to_check) {
return (feature_set & features_to_check) != 0;
}
bool mf_ultralight_get_config_page(const MfUltralightData* data, MfUltralightConfigPages** config) {
furi_assert(data);
furi_assert(config);
bool config_pages_found = false;
uint16_t config_page = mf_ultralight_features[data->type].config_page;
if(config_page != 0) {
*config = (MfUltralightConfigPages*)&data->page[config_page]; //-V1027
config_pages_found = true;
}
return config_pages_found;
}
bool mf_ultralight_is_all_data_read(const MfUltralightData* data) {
furi_assert(data);
bool all_read = false;
if(data->pages_read == data->pages_total ||
(data->type == MfUltralightTypeMfulC && data->pages_read == data->pages_total - 4)) {
// Having read all the pages doesn't mean that we've got everything.
// By default PWD is 0xFFFFFFFF, but if read back it is always 0x00000000,
// so a default read on an auth-supported NTAG is never complete.
uint32_t feature_set = mf_ultralight_get_feature_support_set(data->type);
if(!mf_ultralight_support_feature(feature_set, MfUltralightFeatureSupportPasswordAuth)) {
all_read = true;
} else {
MfUltralightConfigPages* config = NULL;
if(mf_ultralight_get_config_page(data, &config)) {
uint32_t pass =
nfc_util_bytes2num(config->password.data, sizeof(MfUltralightAuthPassword));
uint16_t pack =
nfc_util_bytes2num(config->pack.data, sizeof(MfUltralightAuthPack));
all_read = ((pass != 0) || (pack != 0));
}
}
}
return all_read;
}
bool mf_ultralight_is_counter_configured(const MfUltralightData* data) {
furi_assert(data);
MfUltralightConfigPages* config = NULL;
bool configured = false;
switch(data->type) {
case MfUltralightTypeNTAG213:
case MfUltralightTypeNTAG215:
case MfUltralightTypeNTAG216:
if(mf_ultralight_get_config_page(data, &config)) {
configured = config->access.nfc_cnt_en;
}
break;
default:
configured = true;
break;
}
return configured;
}