mirror of
https://github.com/RfidResearchGroup/proxmark3.git
synced 2025-02-23 23:55:15 +08:00
fix #682 - hf mf sim - not working good with MCT Tool app. Actually it didnt work at all
This commit is contained in:
parent
7ee49df717
commit
054f28e783
1 changed files with 0 additions and 10 deletions
|
@ -739,16 +739,6 @@ void Mifare1ksim(uint16_t flags, uint8_t exitAfterNReads, uint8_t *datain, uint1
|
|||
// RCV: 61 XX => Using KEY B
|
||||
// XX: Block number
|
||||
|
||||
// iceman, u8 can never be larger than 256
|
||||
// if authenticating to a block that shouldn't exist - as long as we are not doing the reader attack
|
||||
if (((flags & FLAG_NR_AR_ATTACK) != FLAG_NR_AR_ATTACK)) {
|
||||
EmSend4bit(mf_crypto1_encrypt4bit(pcs, CARD_NACK_NA));
|
||||
FpgaDisableTracing();
|
||||
|
||||
if (DBGLEVEL >= DBG_EXTENDED) Dbprintf("Reader tried to operate (0x%02x) on out of range block: %d (0x%02x), nacking", receivedCmd_dec[0], receivedCmd_dec[1], receivedCmd_dec[1]);
|
||||
break;
|
||||
}
|
||||
|
||||
authTimer = GetTickCount();
|
||||
|
||||
// received block num -> sector
|
||||
|
|
Loading…
Reference in a new issue