mirror of
https://github.com/RfidResearchGroup/proxmark3.git
synced 2025-08-20 13:23:51 -07:00
make style
This commit is contained in:
parent
842e321cdb
commit
346af6e3d1
5 changed files with 29 additions and 32 deletions
|
@ -1279,7 +1279,7 @@ void ReaderHitag(hitag_function htf, hitag_data *htd) {
|
||||||
}
|
}
|
||||||
|
|
||||||
FpgaDownloadAndGo(FPGA_BITSTREAM_LF);
|
FpgaDownloadAndGo(FPGA_BITSTREAM_LF);
|
||||||
BigBuf_free();
|
BigBuf_free();
|
||||||
clear_trace();
|
clear_trace();
|
||||||
set_tracing(true);
|
set_tracing(true);
|
||||||
|
|
||||||
|
@ -1338,11 +1338,11 @@ void ReaderHitag(hitag_function htf, hitag_data *htd) {
|
||||||
// DbpString("Configured for hitag2 reader");
|
// DbpString("Configured for hitag2 reader");
|
||||||
} else {
|
} else {
|
||||||
Dbprintf("Error, unknown hitag reader type: %d", htf);
|
Dbprintf("Error, unknown hitag reader type: %d", htf);
|
||||||
goto out;
|
goto out;
|
||||||
}
|
}
|
||||||
uint8_t attempt_count = 0;
|
uint8_t attempt_count = 0;
|
||||||
|
|
||||||
while (!bStop && !BUTTON_PRESS() && !usb_poll_validate_length() ) {
|
while (!bStop && !BUTTON_PRESS() && !usb_poll_validate_length()) {
|
||||||
|
|
||||||
WDT_HIT();
|
WDT_HIT();
|
||||||
|
|
||||||
|
@ -1376,7 +1376,7 @@ void ReaderHitag(hitag_function htf, hitag_data *htd) {
|
||||||
attempt_count++; //attempt 3 times to get uid then quit
|
attempt_count++; //attempt 3 times to get uid then quit
|
||||||
if (!bStop && attempt_count == 3)
|
if (!bStop && attempt_count == 3)
|
||||||
bStop = true;
|
bStop = true;
|
||||||
|
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
default: {
|
default: {
|
||||||
|
@ -1474,8 +1474,8 @@ void ReaderHitag(hitag_function htf, hitag_data *htd) {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
out:
|
out:
|
||||||
LEDsoff();
|
LEDsoff();
|
||||||
AT91C_BASE_TC1->TC_CCR = AT91C_TC_CLKDIS;
|
AT91C_BASE_TC1->TC_CCR = AT91C_TC_CLKDIS;
|
||||||
AT91C_BASE_TC0->TC_CCR = AT91C_TC_CLKDIS;
|
AT91C_BASE_TC0->TC_CCR = AT91C_TC_CLKDIS;
|
||||||
|
|
|
@ -239,9 +239,9 @@ uint32_t ReadLF(bool activeField, bool silent, int sample_size) {
|
||||||
if (!silent)
|
if (!silent)
|
||||||
printConfig();
|
printConfig();
|
||||||
LFSetupFPGAForADC(config.divisor, activeField);
|
LFSetupFPGAForADC(config.divisor, activeField);
|
||||||
uint32_t ret = DoAcquisition_config(silent, sample_size);
|
uint32_t ret = DoAcquisition_config(silent, sample_size);
|
||||||
FpgaWriteConfWord(FPGA_MAJOR_MODE_OFF);
|
FpgaWriteConfWord(FPGA_MAJOR_MODE_OFF);
|
||||||
return ret;
|
return ret;
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
|
@ -250,7 +250,7 @@ uint32_t ReadLF(bool activeField, bool silent, int sample_size) {
|
||||||
**/
|
**/
|
||||||
uint32_t SampleLF(bool printCfg, int sample_size) {
|
uint32_t SampleLF(bool printCfg, int sample_size) {
|
||||||
BigBuf_Clear_ext(false);
|
BigBuf_Clear_ext(false);
|
||||||
return ReadLF(true, printCfg, sample_size);
|
return ReadLF(true, printCfg, sample_size);
|
||||||
}
|
}
|
||||||
/**
|
/**
|
||||||
* Initializes the FPGA for snoop-mode (field off), and acquires the samples.
|
* Initializes the FPGA for snoop-mode (field off), and acquires the samples.
|
||||||
|
@ -258,7 +258,7 @@ uint32_t SampleLF(bool printCfg, int sample_size) {
|
||||||
**/
|
**/
|
||||||
uint32_t SnoopLF() {
|
uint32_t SnoopLF() {
|
||||||
BigBuf_Clear_ext(false);
|
BigBuf_Clear_ext(false);
|
||||||
return ReadLF(false, true, 0);
|
return ReadLF(false, true, 0);
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
|
@ -427,12 +427,10 @@ uint32_t doCotagAcquisitionManchester() {
|
||||||
if (sample > COTAG_ONE_THRESHOLD) {
|
if (sample > COTAG_ONE_THRESHOLD) {
|
||||||
prev = curr;
|
prev = curr;
|
||||||
curr = 1;
|
curr = 1;
|
||||||
}
|
} else if (sample < COTAG_ZERO_THRESHOLD) {
|
||||||
else if ( sample < COTAG_ZERO_THRESHOLD) {
|
|
||||||
prev = curr;
|
prev = curr;
|
||||||
curr = 0;
|
curr = 0;
|
||||||
}
|
} else {
|
||||||
else {
|
|
||||||
curr = prev;
|
curr = prev;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -42,7 +42,7 @@ int CmdHFSearch(const char *Cmd) {
|
||||||
if (cmdp == 'h') return usage_hf_search();
|
if (cmdp == 'h') return usage_hf_search();
|
||||||
|
|
||||||
PrintAndLogEx(INFO, "Checking for known tags...\n");
|
PrintAndLogEx(INFO, "Checking for known tags...\n");
|
||||||
|
|
||||||
int ans = CmdHF14AInfo("s");
|
int ans = CmdHF14AInfo("s");
|
||||||
if (ans > 0) {
|
if (ans > 0) {
|
||||||
PrintAndLogEx(SUCCESS, "\nValid " _GREEN_("ISO14443-A tag") " found\n");
|
PrintAndLogEx(SUCCESS, "\nValid " _GREEN_("ISO14443-A tag") " found\n");
|
||||||
|
|
|
@ -216,7 +216,7 @@ int CmdFlexdemod(const char *Cmd) {
|
||||||
}
|
}
|
||||||
|
|
||||||
if (start == size - LONG_WAIT) {
|
if (start == size - LONG_WAIT) {
|
||||||
PrintAndLogEx(WARNING, "nothing to wait for");
|
PrintAndLogEx(WARNING, "nothing to wait for");
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -839,12 +839,12 @@ bool CheckChipType(bool getDeviceData) {
|
||||||
|
|
||||||
//check for t55xx chip...
|
//check for t55xx chip...
|
||||||
if (tryDetectP1(true)) {
|
if (tryDetectP1(true)) {
|
||||||
PrintAndLogEx(SUCCESS, "\nChipset detection : " _GREEN_("Atmel T55xx") " found");
|
PrintAndLogEx(SUCCESS, "\nChipset detection : " _GREEN_("Atmel T55xx") " found");
|
||||||
PrintAndLogEx(SUCCESS, "Try " _YELLOW_("`lf t55xx`")" commands");
|
PrintAndLogEx(SUCCESS, "Try " _YELLOW_("`lf t55xx`")" commands");
|
||||||
retval = true;
|
retval = true;
|
||||||
goto out;
|
goto out;
|
||||||
}
|
}
|
||||||
|
|
||||||
out:
|
out:
|
||||||
save_restoreGB(GRAPH_RESTORE);
|
save_restoreGB(GRAPH_RESTORE);
|
||||||
save_restoreDB(GRAPH_RESTORE);
|
save_restoreDB(GRAPH_RESTORE);
|
||||||
|
@ -945,19 +945,19 @@ int CmdLFfind(const char *Cmd) {
|
||||||
bool st = true;
|
bool st = true;
|
||||||
if (ASKDemod_ext("0 0 0", true, false, 1, &st)) {
|
if (ASKDemod_ext("0 0 0", true, false, 1, &st)) {
|
||||||
PrintAndLogEx(NORMAL, "\nUnknown ASK Modulated and Manchester encoded Tag found!");
|
PrintAndLogEx(NORMAL, "\nUnknown ASK Modulated and Manchester encoded Tag found!");
|
||||||
PrintAndLogEx(NORMAL, "if it does not look right it could instead be ASK/Biphase - try " _YELLOW_("'data rawdemod ab'") );
|
PrintAndLogEx(NORMAL, "if it does not look right it could instead be ASK/Biphase - try " _YELLOW_("'data rawdemod ab'"));
|
||||||
goto out;
|
goto out;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (CmdPSK1rawDemod("")) {
|
if (CmdPSK1rawDemod("")) {
|
||||||
PrintAndLogEx(NORMAL, "Possible unknown PSK1 Modulated Tag found above!");
|
PrintAndLogEx(NORMAL, "Possible unknown PSK1 Modulated Tag found above!");
|
||||||
PrintAndLogEx(NORMAL, " Could also be PSK2 - try " _YELLOW_("'data rawdemod p2'") );
|
PrintAndLogEx(NORMAL, " Could also be PSK2 - try " _YELLOW_("'data rawdemod p2'"));
|
||||||
PrintAndLogEx(NORMAL, " Could also be PSK3 - [currently not supported]");
|
PrintAndLogEx(NORMAL, " Could also be PSK3 - [currently not supported]");
|
||||||
PrintAndLogEx(NORMAL, " Could also be NRZ - try " _YELLOW_("'data rawdemod nr") );
|
PrintAndLogEx(NORMAL, " Could also be NRZ - try " _YELLOW_("'data rawdemod nr"));
|
||||||
goto out;
|
goto out;
|
||||||
}
|
}
|
||||||
|
|
||||||
PrintAndLogEx(FAILED, _RED_("\nNo data found!") );
|
PrintAndLogEx(FAILED, _RED_("\nNo data found!"));
|
||||||
}
|
}
|
||||||
out:
|
out:
|
||||||
// identify chipset
|
// identify chipset
|
||||||
|
|
|
@ -29,8 +29,7 @@ size_t nbytes(size_t nbits) {
|
||||||
return (nbits / 8) + ((nbits % 8) > 0);
|
return (nbits / 8) + ((nbits % 8) > 0);
|
||||||
}
|
}
|
||||||
|
|
||||||
int usage_hitag_reader(void)
|
int usage_hitag_reader(void) {
|
||||||
{
|
|
||||||
PrintAndLogEx(NORMAL, "Usage: lf hitag reader [h] <reader function #>");
|
PrintAndLogEx(NORMAL, "Usage: lf hitag reader [h] <reader function #>");
|
||||||
PrintAndLogEx(NORMAL, "Options:");
|
PrintAndLogEx(NORMAL, "Options:");
|
||||||
PrintAndLogEx(NORMAL, " h This help");
|
PrintAndLogEx(NORMAL, " h This help");
|
||||||
|
@ -43,7 +42,7 @@ int usage_hitag_reader(void)
|
||||||
PrintAndLogEx(NORMAL, " 22 <nr> <ar> Authentication");
|
PrintAndLogEx(NORMAL, " 22 <nr> <ar> Authentication");
|
||||||
PrintAndLogEx(NORMAL, " 23 <key> Authentication, key is in format: ISK high + ISK low");
|
PrintAndLogEx(NORMAL, " 23 <key> Authentication, key is in format: ISK high + ISK low");
|
||||||
PrintAndLogEx(NORMAL, " 25 Test recorded authentications");
|
PrintAndLogEx(NORMAL, " 25 Test recorded authentications");
|
||||||
PrintAndLogEx(NORMAL, " 26 Just read UID");
|
PrintAndLogEx(NORMAL, " 26 Just read UID");
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -228,25 +227,25 @@ int CmdLFHitagReader(const char *Cmd) {
|
||||||
c.cmd = CMD_READ_HITAG_S;
|
c.cmd = CMD_READ_HITAG_S;
|
||||||
num_to_bytes(param_get32ex(Cmd, 1, 0, 16), 4, htd->auth.NrAr);
|
num_to_bytes(param_get32ex(Cmd, 1, 0, 16), 4, htd->auth.NrAr);
|
||||||
num_to_bytes(param_get32ex(Cmd, 2, 0, 16), 4, htd->auth.NrAr + 4);
|
num_to_bytes(param_get32ex(Cmd, 2, 0, 16), 4, htd->auth.NrAr + 4);
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
case RHTSF_KEY: {
|
case RHTSF_KEY: {
|
||||||
c.cmd = CMD_READ_HITAG_S;
|
c.cmd = CMD_READ_HITAG_S;
|
||||||
num_to_bytes(param_get64ex(Cmd, 1, 0, 16), 6, htd->crypto.key);
|
num_to_bytes(param_get64ex(Cmd, 1, 0, 16), 6, htd->crypto.key);
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
case RHT2F_PASSWORD: {
|
case RHT2F_PASSWORD: {
|
||||||
num_to_bytes(param_get32ex(Cmd, 1, 0, 16), 4, htd->pwd.password);
|
num_to_bytes(param_get32ex(Cmd, 1, 0, 16), 4, htd->pwd.password);
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
case RHT2F_AUTHENTICATE: {
|
case RHT2F_AUTHENTICATE: {
|
||||||
num_to_bytes(param_get32ex(Cmd, 1, 0, 16), 4, htd->auth.NrAr);
|
num_to_bytes(param_get32ex(Cmd, 1, 0, 16), 4, htd->auth.NrAr);
|
||||||
num_to_bytes(param_get32ex(Cmd, 2, 0, 16), 4, htd->auth.NrAr + 4);
|
num_to_bytes(param_get32ex(Cmd, 2, 0, 16), 4, htd->auth.NrAr + 4);
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
case RHT2F_CRYPTO: {
|
case RHT2F_CRYPTO: {
|
||||||
num_to_bytes(param_get64ex(Cmd, 1, 0, 16), 6, htd->crypto.key);
|
num_to_bytes(param_get64ex(Cmd, 1, 0, 16), 6, htd->crypto.key);
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
case RHT2F_TEST_AUTH_ATTEMPTS: {
|
case RHT2F_TEST_AUTH_ATTEMPTS: {
|
||||||
// No additional parameters needed
|
// No additional parameters needed
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue