Removed some crap-scripts for testing

This commit is contained in:
martin.holst@gmail.com 2013-06-26 20:49:04 +00:00
parent 3b33bda694
commit c6e2bfcda1
2 changed files with 0 additions and 51 deletions

View file

@ -1,14 +0,0 @@
print("Helleo world!");
print("hf:", hf);
print("hf.mf:",hf.mf);
print("and now... ");
print("hf.mf.mifare",hf.mf.mifare);
hf.mf.nested("");
function foo()
print("Hi I am the foo function!");
end

View file

@ -1,37 +0,0 @@
local desc = "How would the classic mifare hack look in lua? Let's find out "
print(desc);
print("This script isn't even remotely finished!")
print("Checking preconditions");
print("core", core)
print("core.SendCommand", core.SendCommand)
print("core.WaitForResponseTimeout", core.WaitForResponseTimeout)
print("core.nonce2key", core.nonce2key)
-- To actually send something meaningful, we need to include the 'Binlib' or 'lpack' library.
local cmd = 0x0611 -- CMD_READER_MIFARE - uint_64
local arg1, arg2, arg3 = "0","0","0" -- 3 x uint_64
local d = string.rep("00",512)-- 512 bytes
local usbcommand = bin.pack("LLLLH",cmd, arg1, arg2, arg3,d);
print("len(usbcommand): ", string.len(usbcommand));
local x = core.SendCommand(usbcommand);
local result
repeat
result = core.WaitForResponseTimeout(cmd,1000)
print(".")
until result
local r_cmd, r_arg1, r_arg2, r_arg3,r_data;
--[[
response = bin.unpack()
isOK = resp.arg[0] & 0xff;
uid = (uint32_t)bytes_to_num(resp.d.asBytes + 0, 4);
nt = (uint32_t)bytes_to_num(resp.d.asBytes + 4, 4);
par_list = bytes_to_num(resp.d.asBytes + 8, 8);
ks_list = bytes_to_num(resp.d.asBytes + 16, 8);
end
--]]
--- Oh, and nonce2Key is not 'glued' yet.
print("err", result)