mirror of
https://github.com/RfidResearchGroup/proxmark3.git
synced 2025-01-02 21:54:10 +08:00
FIX: 'hf 14a reader' - when card SAK was 0x00, it calls GetHF14AMfU_Type() to try to identify if it is a UL/NTAG etc. The bug is that it ignored the return value.
when return_value == UL_ERROR, it shall not print the mfu tagtype annotation. ---faulty behavior proxmark3> hf 14a reader UID : 65 93 7f d1 ATQA : 00 04 SAK : 00 [2] Tag is not Ultralight | NTAG | MY-D [ATQA: 00 04 SAK: 00] TYPE : MIFARE Ultralight (MF0ICU1) <magic> proprietary non iso14443-4 card found, RATS not supported Answers to chinese magic backdoor commands: NO
This commit is contained in:
parent
042db564ba
commit
3b875041dc
1 changed files with 2 additions and 3 deletions
|
@ -216,16 +216,15 @@ int CmdHF14AReader(const char *Cmd) {
|
||||||
ul_switch_off_field();
|
ul_switch_off_field();
|
||||||
|
|
||||||
uint32_t tagT = GetHF14AMfU_Type();
|
uint32_t tagT = GetHF14AMfU_Type();
|
||||||
ul_print_type(tagT, 0);
|
if (tagT != UL_ERROR)
|
||||||
|
ul_print_type(tagT, 0);
|
||||||
|
|
||||||
// reconnect for further tests
|
// reconnect for further tests
|
||||||
c.arg[0] = ISO14A_CONNECT | ISO14A_NO_DISCONNECT;
|
c.arg[0] = ISO14A_CONNECT | ISO14A_NO_DISCONNECT;
|
||||||
c.arg[1] = 0;
|
c.arg[1] = 0;
|
||||||
c.arg[2] = 0;
|
c.arg[2] = 0;
|
||||||
|
|
||||||
clearCommandBuffer();
|
clearCommandBuffer();
|
||||||
SendCommand(&c);
|
SendCommand(&c);
|
||||||
|
|
||||||
UsbCommand resp;
|
UsbCommand resp;
|
||||||
WaitForResponse(CMD_ACK, &resp);
|
WaitForResponse(CMD_ACK, &resp);
|
||||||
|
|
||||||
|
|
Loading…
Reference in a new issue