mirror of
https://github.com/RfidResearchGroup/proxmark3.git
synced 2025-02-02 05:20:01 +08:00
9cdd47c292
add: the experimental "hf 14a sim x" attack impl. chg: sorry, but I never liked that sniffing was called snooping in this command. So I changed it to "sniff".
26 lines
949 B
C
26 lines
949 B
C
//-----------------------------------------------------------------------------
|
|
// 2011, Merlok
|
|
// Copyright (C) 2010 iZsh <izsh at fail0verflow.com>
|
|
//
|
|
// This code is licensed to you under the terms of the GNU GPL, version 2 or,
|
|
// at your option, any later version. See the LICENSE.txt file for the text of
|
|
// the license.
|
|
//-----------------------------------------------------------------------------
|
|
// High frequency ISO14443A commands
|
|
//-----------------------------------------------------------------------------
|
|
|
|
#ifndef CMDHF14A_H__
|
|
#define CMDHF14A_H__
|
|
|
|
int CmdHF14A(const char *Cmd);
|
|
|
|
int CmdHF14AList(const char *Cmd);
|
|
int CmdHF14AMifare(const char *Cmd);
|
|
int CmdHF14AReader(const char *Cmd);
|
|
int CmdHF14ASim(const char *Cmd);
|
|
int CmdHF14ASniff(const char *Cmd);
|
|
|
|
char* getTagInfo(uint8_t uid);
|
|
int tryMfk32(uint64_t myuid, uint8_t *data, uint8_t *outputkey );
|
|
int tryMfk64(uint64_t myuid, uint8_t *data, uint8_t *outputkey );
|
|
#endif
|