mirror of
https://github.com/RfidResearchGroup/proxmark3.git
synced 2025-08-19 21:03:48 -07:00
fix #682 - hf mf sim - not working good with MCT Tool app. Actually it didnt work at all
This commit is contained in:
parent
7ee49df717
commit
054f28e783
1 changed files with 0 additions and 10 deletions
|
@ -739,16 +739,6 @@ void Mifare1ksim(uint16_t flags, uint8_t exitAfterNReads, uint8_t *datain, uint1
|
||||||
// RCV: 61 XX => Using KEY B
|
// RCV: 61 XX => Using KEY B
|
||||||
// XX: Block number
|
// XX: Block number
|
||||||
|
|
||||||
// iceman, u8 can never be larger than 256
|
|
||||||
// if authenticating to a block that shouldn't exist - as long as we are not doing the reader attack
|
|
||||||
if (((flags & FLAG_NR_AR_ATTACK) != FLAG_NR_AR_ATTACK)) {
|
|
||||||
EmSend4bit(mf_crypto1_encrypt4bit(pcs, CARD_NACK_NA));
|
|
||||||
FpgaDisableTracing();
|
|
||||||
|
|
||||||
if (DBGLEVEL >= DBG_EXTENDED) Dbprintf("Reader tried to operate (0x%02x) on out of range block: %d (0x%02x), nacking", receivedCmd_dec[0], receivedCmd_dec[1], receivedCmd_dec[1]);
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
|
|
||||||
authTimer = GetTickCount();
|
authTimer = GetTickCount();
|
||||||
|
|
||||||
// received block num -> sector
|
// received block num -> sector
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue