mirror of
https://github.com/RfidResearchGroup/proxmark3.git
synced 2025-08-14 18:48:13 -07:00
typos
This commit is contained in:
parent
0ed66781a7
commit
88308ea727
98 changed files with 271 additions and 271 deletions
|
@ -475,7 +475,7 @@ static struct Crypto1State *check_pfx_parity(uint32_t prefix, uint32_t rresp, ui
|
|||
|
||||
#if !defined(__arm__) || defined(__linux__) || defined(_WIN32) || defined(__APPLE__) // bare metal ARM Proxmark lacks malloc()/free()
|
||||
/** lfsr_common_prefix
|
||||
* Implentation of the common prefix attack.
|
||||
* Implementation of the common prefix attack.
|
||||
* Requires the 28 bit constant prefix used as reader nonce (pfx)
|
||||
* The reader response used (rr)
|
||||
* The keystream used to encrypt the observed NACK's (ks)
|
||||
|
|
|
@ -243,7 +243,7 @@ void sm_auth(const uint8_t *Gc, const uint8_t *Ci, const uint8_t *Q, uint8_t *Ch
|
|||
|
||||
initialize(false, Gc, Ci, Q, 1, s);
|
||||
|
||||
// Generate challange answer for Tag and Reader
|
||||
// Generate challenge answer for Tag and Reader
|
||||
for (pos = 0; pos < 8; pos++) {
|
||||
Ci_1[pos] = sm_byte(s);
|
||||
Ch[pos] = sm_byte(s);
|
||||
|
@ -255,7 +255,7 @@ void cm_auth(const uint8_t *Gc, const uint8_t *Ci, const uint8_t *Q, uint8_t *Ch
|
|||
|
||||
initialize(true, Gc, Ci, Q, 3, s);
|
||||
|
||||
// Construct the reader-answer (challange)
|
||||
// Construct the reader-answer (challenge)
|
||||
next_n(true, 6, 0, s);
|
||||
Ch[0] = cm_byte(s);
|
||||
for (pos = 1; pos < 8; pos++) {
|
||||
|
|
|
@ -23,8 +23,8 @@
|
|||
#include "mbedtls/sha1.h"
|
||||
#include "crc16.h" // crc16 ccitt
|
||||
|
||||
// Implemetation tips:
|
||||
// For each implementation of the algos, I recommend adding a self test for easy "simple unit" tests when Travic CI / Appveyour runs.
|
||||
// Implementation tips:
|
||||
// For each implementation of the algos, I recommend adding a self test for easy "simple unit" tests when Travis CI / Appveyor runs.
|
||||
// See special note for MFC based algos.
|
||||
|
||||
//------------------------------------
|
||||
|
|
|
@ -36,7 +36,7 @@
|
|||
|
||||
//RESPONSE FLAGS
|
||||
#define ISO15_RES_ERROR 0x01
|
||||
#define ISO15_RES_EXT 0x08 // Protocol Extention
|
||||
#define ISO15_RES_EXT 0x08 // Protocol Extension
|
||||
|
||||
// RESPONSE ERROR CODES
|
||||
#define ISO15_NOERROR 0x00
|
||||
|
|
|
@ -9,7 +9,7 @@
|
|||
// many others who came before
|
||||
//
|
||||
// NOTES:
|
||||
// LF Demod functions are placed here to allow the flexability to use client or
|
||||
// LF Demod functions are placed here to allow the flexibility to use client or
|
||||
// device side. Most BUT NOT ALL of these functions are currenlty safe for
|
||||
// device side use currently. (DetectST for example...)
|
||||
//
|
||||
|
@ -1883,7 +1883,7 @@ static size_t fsk_wave_demod(uint8_t *dest, size_t size, uint8_t fchigh, uint8_t
|
|||
|
||||
// process:
|
||||
// count width from 0-1 transition to 1-0.
|
||||
// determine the width is withing FUZZ_min and FUZZ_max tolerances
|
||||
// determine the width is within FUZZ_min and FUZZ_max tolerances
|
||||
// width should be divided with exp_one. i:e 6+7+6+2=21, 21/5 = 4,
|
||||
// the 1-0 to 0-1 width should be divided with exp_zero. Ie: 3+5+6+7 = 21/6 = 3
|
||||
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue