mirror of
https://github.com/RfidResearchGroup/proxmark3.git
synced 2025-08-21 13:53:55 -07:00
Fixed another issue where a buffer was filled with 0x44, affecting chinese cards-commands. see http://www.proxmark.org/forum/viewtopic.php?id=1467&p=6
This commit is contained in:
parent
ea73261dc6
commit
354d3a33fd
1 changed files with 7 additions and 3 deletions
|
@ -954,9 +954,13 @@ void MifareCGetBlock(uint32_t arg0, uint32_t arg1, uint32_t arg2, uint8_t *datai
|
||||||
// if (isOK) memcpy(ack.d.asBytes, data, 18);
|
// if (isOK) memcpy(ack.d.asBytes, data, 18);
|
||||||
|
|
||||||
// add trace trailer
|
// add trace trailer
|
||||||
memset(data, 0x44, 4);
|
/*
|
||||||
LogTrace(data, 4, 0, 0, TRUE);
|
* Removed by Martin, this piece of overwrites the 'data' variable
|
||||||
|
* which is sent two lines down, and is obviously not correct.
|
||||||
|
*
|
||||||
|
* memset(data, 0x44, 4);
|
||||||
|
* LogTrace(data, 4, 0, 0, TRUE);
|
||||||
|
*/
|
||||||
LED_B_ON();
|
LED_B_ON();
|
||||||
cmd_send(CMD_ACK,isOK,0,0,data,18);
|
cmd_send(CMD_ACK,isOK,0,0,data,18);
|
||||||
// UsbSendPacket((uint8_t *)&ack, sizeof(UsbCommand));
|
// UsbSendPacket((uint8_t *)&ack, sizeof(UsbCommand));
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue