mirror of
https://github.com/RfidResearchGroup/proxmark3.git
synced 2025-08-21 05:43:48 -07:00
Merge pull request #2564 from archi/fix_SimulateIso14443aInit
Fix SimulateIso14443aInit usage
This commit is contained in:
commit
11d9336556
5 changed files with 6 additions and 6 deletions
|
@ -32,7 +32,7 @@ This project uses the changelog in accordance with [keepchangelog](http://keepac
|
||||||
- Added detection of a magic NTAG 215 (@iceman1001)
|
- Added detection of a magic NTAG 215 (@iceman1001)
|
||||||
- Fixed hardnested on AVX512F #2410 (@xianglin1998)
|
- Fixed hardnested on AVX512F #2410 (@xianglin1998)
|
||||||
- Added `hf 14a aidsim` - simulates a PICC (like `14a sim`), and allows you to respond to specific AIDs and getData responses (@evildaemond)
|
- Added `hf 14a aidsim` - simulates a PICC (like `14a sim`), and allows you to respond to specific AIDs and getData responses (@evildaemond)
|
||||||
- Fixed incorrect argument count for `SimulateIso14443aTag` in `hf_young.c`, `hf_aveful.c` and `hf_craftbyte.c`.
|
- Fixed arguments for `SimulateIso14443aTag` and `SimulateIso14443aInit` in `hf_young.c`, `hf_aveful.c`, `hf_msdsal.c`, `hf_cardhopper.c`, `hf_reblay.c`, `hf_tcprst.c` and `hf_craftbyte.c` (@archi)
|
||||||
|
|
||||||
## [Backdoor.4.18994][2024-09-10]
|
## [Backdoor.4.18994][2024-09-10]
|
||||||
- Changed flashing messages to be less scary (@iceman1001)
|
- Changed flashing messages to be less scary (@iceman1001)
|
||||||
|
|
|
@ -216,7 +216,7 @@ static void become_card(void) {
|
||||||
uint32_t counters[3] = { 0 };
|
uint32_t counters[3] = { 0 };
|
||||||
uint8_t tearings[3] = { 0xbd, 0xbd, 0xbd };
|
uint8_t tearings[3] = { 0xbd, 0xbd, 0xbd };
|
||||||
uint8_t pages;
|
uint8_t pages;
|
||||||
SimulateIso14443aInit(tagType, flags, data, &canned, &cuid, counters, tearings, &pages);
|
SimulateIso14443aInit(tagType, flags, data, NULL, &canned, &cuid, counters, tearings, &pages);
|
||||||
|
|
||||||
DbpString(_CYAN_("[@]") " Setup done - entering emulation loop");
|
DbpString(_CYAN_("[@]") " Setup done - entering emulation loop");
|
||||||
int fromReaderLen;
|
int fromReaderLen;
|
||||||
|
|
|
@ -378,7 +378,7 @@ void RunMod(void) {
|
||||||
BigBuf_free_keep_EM();
|
BigBuf_free_keep_EM();
|
||||||
|
|
||||||
// tag type: 11 = ISO/IEC 14443-4 - javacard (JCOP)
|
// tag type: 11 = ISO/IEC 14443-4 - javacard (JCOP)
|
||||||
if (SimulateIso14443aInit(11, flags, data, &responses, &cuid, NULL, NULL, NULL) == false) {
|
if (SimulateIso14443aInit(11, flags, data, NULL, &responses, &cuid, NULL, NULL, NULL) == false) {
|
||||||
BigBuf_free_keep_EM();
|
BigBuf_free_keep_EM();
|
||||||
reply_ng(CMD_HF_MIFARE_SIMULATE, PM3_EINIT, NULL, 0);
|
reply_ng(CMD_HF_MIFARE_SIMULATE, PM3_EINIT, NULL, 0);
|
||||||
DbpString(_RED_("Error initializing the emulation process!"));
|
DbpString(_RED_("Error initializing the emulation process!"));
|
||||||
|
|
|
@ -267,7 +267,7 @@ void RunMod() {
|
||||||
BigBuf_free_keep_EM();
|
BigBuf_free_keep_EM();
|
||||||
|
|
||||||
// 4 = ISO/IEC 14443-4 - javacard (JCOP)
|
// 4 = ISO/IEC 14443-4 - javacard (JCOP)
|
||||||
if (SimulateIso14443aInit(4, flags, data, &responses, &cuid, NULL, NULL, NULL) == false) {
|
if (SimulateIso14443aInit(4, flags, data, NULL, &responses, &cuid, NULL, NULL, NULL) == false) {
|
||||||
BigBuf_free_keep_EM();
|
BigBuf_free_keep_EM();
|
||||||
reply_ng(CMD_HF_MIFARE_SIMULATE, PM3_EINIT, NULL, 0);
|
reply_ng(CMD_HF_MIFARE_SIMULATE, PM3_EINIT, NULL, 0);
|
||||||
DbpString(_RED_("Error initializing the emulation process!"));
|
DbpString(_RED_("Error initializing the emulation process!"));
|
||||||
|
|
|
@ -192,7 +192,7 @@ void RunMod(void) {
|
||||||
|
|
||||||
memcpy(data, stuid, sizeof(stuid));
|
memcpy(data, stuid, sizeof(stuid));
|
||||||
|
|
||||||
if (SimulateIso14443aInit(tagType, flags, data, &responses, &cuid, counters, tearings, &pages) == false) {
|
if (SimulateIso14443aInit(tagType, flags, data, NULL, &responses, &cuid, counters, tearings, &pages) == false) {
|
||||||
BigBuf_free_keep_EM();
|
BigBuf_free_keep_EM();
|
||||||
reply_ng(CMD_HF_MIFARE_SIMULATE, PM3_EINIT, NULL, 0);
|
reply_ng(CMD_HF_MIFARE_SIMULATE, PM3_EINIT, NULL, 0);
|
||||||
DbpString(_YELLOW_("!!") "Error initializing the simulation process!");
|
DbpString(_YELLOW_("!!") "Error initializing the simulation process!");
|
||||||
|
@ -370,7 +370,7 @@ void RunMod(void) {
|
||||||
|
|
||||||
memcpy(data, stuid, sizeof(stuid));
|
memcpy(data, stuid, sizeof(stuid));
|
||||||
|
|
||||||
if (SimulateIso14443aInit(tagType, flags, data, &responses, &cuid, counters, tearings, &pages) == false) {
|
if (SimulateIso14443aInit(tagType, flags, data, NULL, &responses, &cuid, counters, tearings, &pages) == false) {
|
||||||
BigBuf_free_keep_EM();
|
BigBuf_free_keep_EM();
|
||||||
reply_ng(CMD_HF_MIFARE_SIMULATE, PM3_EINIT, NULL, 0);
|
reply_ng(CMD_HF_MIFARE_SIMULATE, PM3_EINIT, NULL, 0);
|
||||||
DbpString(_YELLOW_("!!") "Error initializing the simulation process!");
|
DbpString(_YELLOW_("!!") "Error initializing the simulation process!");
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue