mirror of
https://github.com/RfidResearchGroup/proxmark3.git
synced 2025-04-04 11:29:57 +08:00
CHG: applied https://github.com/Proxmark/proxmark3/pull/553 (@arnie97) and in some more places
This commit is contained in:
parent
aad1e65b97
commit
a13ecc4a4e
14 changed files with 62 additions and 62 deletions
|
@ -2305,7 +2305,7 @@ int CmdHF14AMfECFill(const char *Cmd) {
|
|||
c = param_getchar(Cmd, 1);
|
||||
numSectors = NumOfSectors(c);
|
||||
|
||||
printf("--params: numSectors: %d, keyType:%d", numSectors, keyType);
|
||||
printf("--params: numSectors: %d, keyType: %c\n", numSectors, (keyType==0) ? 'A' : 'B');
|
||||
UsbCommand cmd = {CMD_MIFARE_EML_CARDLOAD, {numSectors, keyType, 0}};
|
||||
clearCommandBuffer();
|
||||
SendCommand(&cmd);
|
||||
|
|
|
@ -2,7 +2,7 @@
|
|||
This is a library to read 14443a tags. It can be used something like this
|
||||
|
||||
local reader = require('read14a')
|
||||
result, err = reader.read1443a()
|
||||
result, err = reader.read14443a()
|
||||
if not result then
|
||||
print(err)
|
||||
return
|
||||
|
@ -43,11 +43,11 @@ ISO14443a_TYPES[0x88] = "Infineon MIFARE CLASSIC 1K"
|
|||
ISO14443a_TYPES[0x98] = "Gemplus MPCOS"
|
||||
|
||||
|
||||
local function tostring_1443a(sak)
|
||||
local function tostring_14443a(sak)
|
||||
return ISO14443a_TYPES[sak] or ("Unknown (SAK=%x)"):format(sak)
|
||||
end
|
||||
|
||||
local function parse1443a(data)
|
||||
local function parse14443a(data)
|
||||
--[[
|
||||
|
||||
Based on this struct :
|
||||
|
@ -67,7 +67,7 @@ local function parse1443a(data)
|
|||
uid = uid:sub(1,2*uidlen)
|
||||
--print("uid, atqa, sak: ",uid, atqa, sak)
|
||||
--print("TYPE: ", tostring_1443a(sak))
|
||||
return { uid = uid, atqa = atqa, sak = sak, name = tostring_1443a(sak)}
|
||||
return { uid = uid, atqa = atqa, sak = sak, name = tostring_14443a(sak)}
|
||||
end
|
||||
|
||||
--- Sends a USBpacket to the device
|
||||
|
@ -77,7 +77,6 @@ end
|
|||
-- response of type CMD_ACK
|
||||
-- @return packet,nil if successfull
|
||||
-- nil, errormessage if unsuccessfull
|
||||
|
||||
local function sendToDevice(command, ignoreresponse)
|
||||
--core.clearCommandBuffer()
|
||||
local err = core.SendCommand(command:getBytes())
|
||||
|
@ -98,14 +97,15 @@ end
|
|||
local function read14443a(dont_disconnect, no_rats)
|
||||
local command, result, info, err, data
|
||||
|
||||
command = Command:new{cmd = cmds.CMD_READER_ISO_14443a,
|
||||
arg1 = ISO14A_COMMAND.ISO14A_CONNECT }
|
||||
command = Command:new{cmd = cmds.CMD_READER_ISO_14443a, arg1 = ISO14A_COMMAND.ISO14A_CONNECT }
|
||||
|
||||
if dont_disconnect then
|
||||
command.arg1 = command.arg1 + ISO14A_COMMAND.ISO14A_NO_DISCONNECT
|
||||
end
|
||||
if no_rats then
|
||||
command.arg1 = command.arg1 + ISO14A_COMMAND.ISO14A_NO_RATS
|
||||
end
|
||||
|
||||
local result,err = sendToDevice(command)
|
||||
if result then
|
||||
local count,cmd,arg0,arg1,arg2 = bin.unpack('LLLL',result)
|
||||
|
@ -113,7 +113,7 @@ local function read14443a(dont_disconnect, no_rats)
|
|||
return nil, "iso14443a card select failed"
|
||||
end
|
||||
data = string.sub(result,count)
|
||||
info, err = parse1443a(data)
|
||||
info, err = parse14443a(data)
|
||||
else
|
||||
err ="No response from card"
|
||||
end
|
||||
|
@ -139,10 +139,10 @@ local function waitFor14443a()
|
|||
return nil, "Aborted by user"
|
||||
end
|
||||
local library = {
|
||||
read1443a = read14443a,
|
||||
read = read14443a,
|
||||
read = read14443a,
|
||||
waitFor14443a = waitFor14443a,
|
||||
parse1443a = parse1443a,
|
||||
parse14443a = parse14443a,
|
||||
sendToDevice = sendToDevice,
|
||||
ISO14A_COMMAND = ISO14A_COMMAND,
|
||||
}
|
||||
|
|
|
@ -98,7 +98,7 @@ function main(args)
|
|||
dbg("doconnect")
|
||||
-- We reuse the connect functionality from a
|
||||
-- common library
|
||||
info, err = lib14a.read1443a(true, no_rats)
|
||||
info, err = lib14a.read(true, no_rats)
|
||||
|
||||
if err then return oops(err) end
|
||||
print(("Connected to card, uid = %s"):format(info.uid))
|
||||
|
|
|
@ -152,7 +152,7 @@ local function main(args)
|
|||
if #uid ~= 14 then return oops('uid wrong length. Should be 7 hex bytes') end
|
||||
else
|
||||
-- GET TAG UID
|
||||
local tag, err = lib14a.read1443a(false, true)
|
||||
local tag, err = lib14a.read(false, true)
|
||||
if not tag then return oops(err) end
|
||||
core.clearCommandBuffer()
|
||||
|
||||
|
|
|
@ -161,7 +161,7 @@ local function main(args)
|
|||
if #uid ~= 14 then return oops('uid wrong length. Should be 7 hex bytes') end
|
||||
else
|
||||
-- GET TAG UID
|
||||
local tag, err = lib14a.read1443a(false, true)
|
||||
local tag, err = lib14a.read(false, true)
|
||||
if not tag then return oops(err) end
|
||||
core.clearCommandBuffer()
|
||||
uid = tag.uid
|
||||
|
|
|
@ -173,7 +173,7 @@ local function main(args)
|
|||
if #uid ~= 8 then return oops('uid wrong length. Should be 4 hex bytes') end
|
||||
else
|
||||
-- GET TAG UID
|
||||
local tag, err = lib14a.read1443a(false, true)
|
||||
local tag, err = lib14a.read(false, true)
|
||||
if not tag then return oops(err) end
|
||||
core.clearCommandBuffer()
|
||||
|
||||
|
|
|
@ -561,7 +561,7 @@ function main(args)
|
|||
setdevicedebug(false)
|
||||
|
||||
-- GET TAG UID
|
||||
tag, err = lib14a.read1443a(false, true)
|
||||
tag, err = lib14a.read(false, true)
|
||||
if not tag then return oops(err) end
|
||||
core.clearCommandBuffer()
|
||||
|
||||
|
|
|
@ -81,7 +81,7 @@ end
|
|||
--
|
||||
-- Read information from a card
|
||||
function GetCardInfo()
|
||||
result, err = lib14a.read1443a(false, true)
|
||||
result, err = lib14a.read(false, true)
|
||||
if not result then
|
||||
print(err)
|
||||
return
|
||||
|
|
|
@ -15,6 +15,7 @@ local keylist = require('mf_default_keys')
|
|||
-- Ability to read what card is there
|
||||
local lib14a = require('read14a')
|
||||
local getopt = require('getopt')
|
||||
-- Asks the user for input
|
||||
local utils = require('utils')
|
||||
|
||||
example =[[
|
||||
|
@ -22,7 +23,8 @@ example =[[
|
|||
]]
|
||||
author = "Holiman"
|
||||
usage = "script run mfkeys"
|
||||
desc = ("This script implements Mifare check keys. It utilises a large list of default keys (currently %d keys).\
|
||||
desc = ("This script implements Mifare check keys.\
|
||||
It utilises a large list of default keys (currently %d keys).\
|
||||
If you want to add more, just put them inside /lualibs/mf_default_keys.lua\n"):format(#keylist) ..
|
||||
[[
|
||||
|
||||
|
@ -212,7 +214,7 @@ local function perform_check(numsectors)
|
|||
if keyB then succB = 1; keylist = placeFirst(keyB, keylist) end
|
||||
keyB = keyB or '------------'
|
||||
|
||||
keys[sector] = {succA, succB, keyA, keyB }
|
||||
keys[sector] = {succA, succB, keyA, keyB}
|
||||
end
|
||||
|
||||
display_results(keys)
|
||||
|
@ -247,7 +249,7 @@ local function taginfo(tag)
|
|||
end
|
||||
---
|
||||
-- The main entry point
|
||||
local function main( args)
|
||||
local function main(args)
|
||||
|
||||
local start_time = os.time()
|
||||
local numSectors = 16
|
||||
|
@ -257,9 +259,8 @@ local function main( args)
|
|||
if o == "h" then return help() end
|
||||
if o == "p" then return printkeys() end
|
||||
end
|
||||
|
||||
-- identify tag
|
||||
tag, err = lib14a.read1443a(false, true)
|
||||
tag, err = lib14a.read(false, true)
|
||||
if not tag then return oops(err) end
|
||||
|
||||
-- detect sectors and print taginfo
|
||||
|
@ -272,4 +273,3 @@ local function main( args)
|
|||
end
|
||||
|
||||
main( args)
|
||||
|
||||
|
|
|
@ -1,5 +1,5 @@
|
|||
local getopt = require('getopt')
|
||||
local reader = require('read14a')
|
||||
local lib14a = require('read14a')
|
||||
local cmds = require('commands')
|
||||
local utils = require('utils')
|
||||
|
||||
|
@ -61,7 +61,7 @@ end
|
|||
-- @return if unsuccessfull : nil, error
|
||||
local function wait_for_mifare()
|
||||
while not core.ukbhit() do
|
||||
res, err = reader.read1443a()
|
||||
res, err = lib14a.read()
|
||||
if res then return res end
|
||||
-- err means that there was no response from card
|
||||
end
|
||||
|
|
|
@ -359,7 +359,7 @@ local function main(args)
|
|||
if #uid ~= 14 then return oops('uid wrong length. Should be 7 hex bytes') end
|
||||
else
|
||||
-- GET TAG UID
|
||||
local tag, err = lib14a.read1443a(false, true)
|
||||
local tag, err = lib14a.read(false, true)
|
||||
if not tag then return oops(err) end
|
||||
core.clearCommandBuffer()
|
||||
uid = tag.uid
|
||||
|
|
|
@ -122,7 +122,7 @@ local function main(args)
|
|||
|
||||
|
||||
-- find tag
|
||||
result, err = lib14a.read1443a(false, true)
|
||||
result, err = lib14a.read(false, true)
|
||||
if not result then return oops(err) end
|
||||
|
||||
-- load keys
|
||||
|
|
|
@ -126,7 +126,7 @@ local function main(args)
|
|||
local cmdSetDbgOff = "hf mf dbg 0"
|
||||
core.console( cmdSetDbgOff)
|
||||
|
||||
result, err = lib14a.read1443a(false, true)
|
||||
result, err = lib14a.read(false, true)
|
||||
if not result then
|
||||
return oops(err)
|
||||
end
|
||||
|
|
|
@ -125,7 +125,7 @@ function main(args)
|
|||
endblock = endblock or 20
|
||||
|
||||
-- First of all, connect
|
||||
info, err = lib14a.read1443a(true, true)
|
||||
info, err = lib14a.read(true, true)
|
||||
if err then disconnect() return oops(err) end
|
||||
core.clearCommandBuffer()
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue