mirror of
https://github.com/RfidResearchGroup/proxmark3.git
synced 2024-12-31 04:39:49 +08:00
FIX: 'hf 14a reader' - when card SAK was 0x00, it calls GetHF14AMfU_Type() to try to identify if it is a UL/NTAG etc. The bug is that it ignored the return value.
when return_value == UL_ERROR, it shall not print the mfu tagtype annotation. ---faulty behavior proxmark3> hf 14a reader UID : 65 93 7f d1 ATQA : 00 04 SAK : 00 [2] Tag is not Ultralight | NTAG | MY-D [ATQA: 00 04 SAK: 00] TYPE : MIFARE Ultralight (MF0ICU1) <magic> proprietary non iso14443-4 card found, RATS not supported Answers to chinese magic backdoor commands: NO
This commit is contained in:
parent
042db564ba
commit
3b875041dc
1 changed files with 2 additions and 3 deletions
|
@ -216,16 +216,15 @@ int CmdHF14AReader(const char *Cmd) {
|
|||
ul_switch_off_field();
|
||||
|
||||
uint32_t tagT = GetHF14AMfU_Type();
|
||||
ul_print_type(tagT, 0);
|
||||
if (tagT != UL_ERROR)
|
||||
ul_print_type(tagT, 0);
|
||||
|
||||
// reconnect for further tests
|
||||
c.arg[0] = ISO14A_CONNECT | ISO14A_NO_DISCONNECT;
|
||||
c.arg[1] = 0;
|
||||
c.arg[2] = 0;
|
||||
|
||||
clearCommandBuffer();
|
||||
SendCommand(&c);
|
||||
|
||||
UsbCommand resp;
|
||||
WaitForResponse(CMD_ACK, &resp);
|
||||
|
||||
|
|
Loading…
Reference in a new issue