mirror of
https://github.com/RfidResearchGroup/proxmark3.git
synced 2024-11-11 10:14:34 +08:00
46cd801c5a
MOV: moved the try32/try64 attacks (mfkey32/mfkey64) into the nonce2key.c file CHG: added @marshmellow42 changes to hf mfu dump layout. ADD: an extra call to BigBuf_free in readcard.. just to make sure that it doesn't leak memory. ADD: expermimental call to "try32" for "hf mf sim x".
25 lines
818 B
C
25 lines
818 B
C
//-----------------------------------------------------------------------------
|
|
// 2011, Merlok
|
|
// Copyright (C) 2010 iZsh <izsh at fail0verflow.com>
|
|
//
|
|
// This code is licensed to you under the terms of the GNU GPL, version 2 or,
|
|
// at your option, any later version. See the LICENSE.txt file for the text of
|
|
// the license.
|
|
//-----------------------------------------------------------------------------
|
|
// High frequency ISO14443A commands
|
|
//-----------------------------------------------------------------------------
|
|
|
|
#ifndef CMDHF14A_H__
|
|
#define CMDHF14A_H__
|
|
|
|
int CmdHF14A(const char *Cmd);
|
|
|
|
int CmdHF14AList(const char *Cmd);
|
|
int CmdHF14AMifare(const char *Cmd);
|
|
int CmdHF14AReader(const char *Cmd);
|
|
int CmdHF14ASim(const char *Cmd);
|
|
int CmdHF14ASniff(const char *Cmd);
|
|
|
|
char* getTagInfo(uint8_t uid);
|
|
|
|
#endif
|