mirror of
https://github.com/RfidResearchGroup/proxmark3.git
synced 2025-01-17 21:52:22 +08:00
46cd801c5a
MOV: moved the try32/try64 attacks (mfkey32/mfkey64) into the nonce2key.c file CHG: added @marshmellow42 changes to hf mfu dump layout. ADD: an extra call to BigBuf_free in readcard.. just to make sure that it doesn't leak memory. ADD: expermimental call to "try32" for "hf mf sim x".
24 lines
893 B
C
24 lines
893 B
C
//-----------------------------------------------------------------------------
|
|
// Merlok - June 2011
|
|
// Roel - Dec 2009
|
|
// Unknown author
|
|
// icemane - may 2015
|
|
// This code is licensed to you under the terms of the GNU GPL, version 2 or,
|
|
// at your option, any later version. See the LICENSE.txt file for the text of
|
|
// the license.
|
|
//-----------------------------------------------------------------------------
|
|
// MIFARE Darkside hack
|
|
//-----------------------------------------------------------------------------
|
|
|
|
#ifndef __NONCE2KEY_H
|
|
#define __NONCE2KEY_H
|
|
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include "crapto1.h"
|
|
#include "common.h"
|
|
|
|
int nonce2key(uint32_t uid, uint32_t nt, uint32_t nr, uint64_t par_info, uint64_t ks_info, uint64_t * key);
|
|
int tryMfk32(uint64_t myuid, uint8_t *data, uint8_t *outputkey );
|
|
int tryMfk64(uint64_t myuid, uint8_t *data, uint8_t *outputkey );
|
|
#endif
|