From a5f19cde79521c9f96052abdbbfc5150b598ca2a Mon Sep 17 00:00:00 2001
From: iceman1001 <iceman@iuse.se>
Date: Tue, 7 May 2019 23:46:37 +0200
Subject: [PATCH] textual

---
 client/scripts/mifare_autopwn.lua | 8 ++++----
 1 file changed, 4 insertions(+), 4 deletions(-)

diff --git a/client/scripts/mifare_autopwn.lua b/client/scripts/mifare_autopwn.lua
index cc37f6103..a9859ac25 100644
--- a/client/scripts/mifare_autopwn.lua
+++ b/client/scripts/mifare_autopwn.lua
@@ -5,7 +5,7 @@ local utils = require('utils')
 
 copyright = ''
 author = "Martin Holst Swende"
-version = 'v1.0.1'
+version = 'v1.0.2'
 desc = [[
 This is a script which automates cracking and dumping mifare classic cards. It sets itself into
 'listening'-mode, after which it cracks and dumps any mifare classic card that you
@@ -148,7 +148,7 @@ end
 -- The main entry point
 local function main(args)
 
-    local verbose, exit, res, uid, err, _, sak
+    local verbose, _exit, res, uid, err, _, sak
     local seen_uids = {}
     local key = ''
     local print_message = true
@@ -159,7 +159,7 @@ local function main(args)
         if o == 'k' then key = a end
     end
 
-    while not exit do
+    while not _exit do
         if print_message then
             print('Waiting for card or press any key to stop')
             print_message = false
@@ -205,7 +205,7 @@ local function main(args)
                 -- Dump info
                 dump(uid, sak)
 
-                if #key == 12 then exit = true end
+                if #key == 12 then _exit = true end
             else
                 print('Card found, darkside attack useless PRNG hardend on UID', uid)
             end