mirror of
https://github.com/RfidResearchGroup/proxmark3.git
synced 2025-08-21 05:43:48 -07:00
Fixed memory corruption after reader-attack in armsrc, fixed annoying LED
This commit is contained in:
parent
645c960f61
commit
7b941c8d7f
1 changed files with 3 additions and 1 deletions
|
@ -998,7 +998,7 @@ void SimulateIClass(uint32_t arg0, uint32_t arg1, uint32_t arg2, uint8_t *datain
|
||||||
else if(simType == 2)
|
else if(simType == 2)
|
||||||
{
|
{
|
||||||
|
|
||||||
uint8_t mac_responses[64] = { 0 };
|
uint8_t mac_responses[USB_CMD_DATA_SIZE] = { 0 };
|
||||||
Dbprintf("Going into attack mode, %d CSNS sent", numberOfCSNS);
|
Dbprintf("Going into attack mode, %d CSNS sent", numberOfCSNS);
|
||||||
// In this mode, a number of csns are within datain. We'll simulate each one, one at a time
|
// In this mode, a number of csns are within datain. We'll simulate each one, one at a time
|
||||||
// in order to collect MAC's from the reader. This can later be used in an offlne-attack
|
// in order to collect MAC's from the reader. This can later be used in an offlne-attack
|
||||||
|
@ -1248,6 +1248,8 @@ int doIClassSimulation(uint8_t csn[], int breakAfterMacReceived, uint8_t *reader
|
||||||
//Dbprintf("%x", cmdsRecvd);
|
//Dbprintf("%x", cmdsRecvd);
|
||||||
LED_A_OFF();
|
LED_A_OFF();
|
||||||
LED_B_OFF();
|
LED_B_OFF();
|
||||||
|
LED_C_OFF();
|
||||||
|
|
||||||
if(buttonPressed)
|
if(buttonPressed)
|
||||||
{
|
{
|
||||||
DbpString("Button pressed");
|
DbpString("Button pressed");
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue