ADD: HF 14A READER is now able to see if a presented card responses to the chinese magic backdoor commands.

FIX: simple namechange of some defines where it hinted it was related to "eml" when it wasn't.
This commit is contained in:
iceman1001 2014-12-26 21:32:58 +01:00
commit d52e4e8819
6 changed files with 73 additions and 39 deletions

View file

@ -854,12 +854,15 @@ void UsbPacketReceived(uint8_t *packet, int len)
break;
// Work with "magic Chinese" card
case CMD_MIFARE_EML_CSETBLOCK:
case CMD_MIFARE_CSETBLOCK:
MifareCSetBlock(c->arg[0], c->arg[1], c->arg[2], c->d.asBytes);
break;
case CMD_MIFARE_EML_CGETBLOCK:
case CMD_MIFARE_CGETBLOCK:
MifareCGetBlock(c->arg[0], c->arg[1], c->arg[2], c->d.asBytes);
break;
case CMD_MIFARE_CIDENT:
MifareCIdent();
break;
// mifare sniffer
case CMD_MIFARE_SNIFFER: