From c2092ee2ed6331b3ecc363cd56b4697af9f6e081 Mon Sep 17 00:00:00 2001 From: Philippe Teuwen Date: Thu, 17 Feb 2022 01:41:46 +0100 Subject: [PATCH] make style --- client/src/proxgui.cpp | 2 +- doc/commands.json | 13 ++++++------- tools/mfd_aes_brute/mfd_multi_brute.c | 2 +- 3 files changed, 8 insertions(+), 9 deletions(-) diff --git a/client/src/proxgui.cpp b/client/src/proxgui.cpp index c27c0e59b..5019e1946 100644 --- a/client/src/proxgui.cpp +++ b/client/src/proxgui.cpp @@ -70,7 +70,7 @@ extern "C" void RepaintGraphWindow(void) { extern "C" void ShowPictureWindow(char *fn) { // No support for jpeg2000 in Qt Image since a while... // https://doc.qt.io/qt-5/qtimageformats-index.html - if(strlen(fn) > 4 && !strcmp(fn + strlen(fn) - 4, ".jp2")) + if (strlen(fn) > 4 && !strcmp(fn + strlen(fn) - 4, ".jp2")) return; if (!gui) { // Show a notice if X11/XQuartz isn't available diff --git a/doc/commands.json b/doc/commands.json index d38d11b93..1e63c0baf 100644 --- a/doc/commands.json +++ b/doc/commands.json @@ -3659,13 +3659,13 @@ "hf mf chk --4k -k ffffffffffff -> check all sectors, all keys against mifare 4k", "hf mf chk --1k --emu -> check all sectors, all keys, 1k, and write to emulator memory", "hf mf chk --1k --dump -> check all sectors, all keys, 1k, and write to file", - "hf mf chk -a --blk 0 -f mfc_default_keys.dic -> check dictionary against block 0, key a" + "hf mf chk -a --tblk 0 -f mfc_default_keys.dic -> check dictionary against block 0, key a" ], "offline": false, "options": [ "-h, --help this help", "-k, --key key specified as 12 hex symbols", - "--blk input block number", + "--tblk target block number", "-a target key a", "-b target key b", "-*, --all target both key a & b (default)", @@ -3677,7 +3677,7 @@ "--dump dump found keys to binary file", "-f, --file filename of dictionary" ], - "usage": "hf mf chk [-hab*] [-k ]... [--blk ] [--mini] [--1k] [--2k] [--4k] [--emu] [--dump] [-f ]" + "usage": "hf mf chk [-hab*] [-k ]... [--tblk ] [--mini] [--1k] [--2k] [--4k] [--emu] [--dump] [-f ]" }, "hf mf cload": { "command": "hf mf cload", @@ -4182,7 +4182,7 @@ "command": "hf mf nested", "description": "execute nested attack against mifare classic card for key recovery", "notes": [ - "hf mf nested --single --blk 0 -a ffffffffffff --tblk 4 --ta -> single sector key recovery. use block 0 key a to find block 4 key a", + "hf mf nested --blk 0 -a -k ffffffffffff --tblk 4 --ta -> use block 0 key a to find block 4 key a (single sector key recovery)", "hf mf nested --mini --blk 0 -a -k ffffffffffff -> key recovery against mifare mini", "hf mf nested --1k --blk 0 -a -k ffffffffffff -> key recovery against mifare classic 1k", "hf mf nested --2k --blk 0 -a -k ffffffffffff -> key recovery against mifare 2k", @@ -4204,10 +4204,9 @@ "--tb target b key", "--emu fill simulator keys from found keys", "--dump dump found keys to file", - "--single single sector (defaults to all)", "--mem use dictionary from flashmemory" ], - "usage": "hf mf nested [-hab] [-k ] [--mini] [--1k] [--2k] [--4k] [--blk ] [--tblk ] [--ta] [--tb] [--emu] [--dump] [--single] [--mem]" + "usage": "hf mf nested [-hab] [-k ] [--mini] [--1k] [--2k] [--4k] [--blk ] [--tblk ] [--ta] [--tb] [--emu] [--dump] [--mem]" }, "hf mf personalize": { "command": "hf mf personalize", @@ -10890,6 +10889,6 @@ "metadata": { "commands_extracted": 687, "extracted_by": "PM3Help2JSON v1.00", - "extracted_on": "2022-02-16T13:50:08" + "extracted_on": "2022-02-17T00:41:11" } } \ No newline at end of file diff --git a/tools/mfd_aes_brute/mfd_multi_brute.c b/tools/mfd_aes_brute/mfd_multi_brute.c index e8e9de084..413c47a17 100644 --- a/tools/mfd_aes_brute/mfd_multi_brute.c +++ b/tools/mfd_aes_brute/mfd_multi_brute.c @@ -1,6 +1,6 @@ // MIFARE bruteforce tool // It's Multi threaded and supports all DES/2TDEA/3TDEA/AES crypto authentication modes. -// also supports six different LCG random generators. +// also supports six different LCG random generators. // as a consequece this tools also work on MIFARE Ultralight-C challenges // //