mirror of
https://github.com/RfidResearchGroup/proxmark3.git
synced 2025-08-21 05:43:48 -07:00
CHG: the mifare Auth command can make use of a random nonce aswell.
CHG: since sim commands are timing critical, I'm testing a smaller prand prng function from Intel
This commit is contained in:
parent
76c0ec0ba8
commit
e99acd00cc
5 changed files with 81 additions and 64 deletions
|
@ -121,7 +121,10 @@ int mifare_classic_authex(struct Crypto1State *pcs, uint32_t uid, uint8_t blockN
|
|||
|
||||
// "random" reader nonce:
|
||||
//byte_t nr[4] = {0x55, 0x41, 0x49, 0x92};
|
||||
byte_t nr[4] = {0x01, 0x01, 0x01, 0x01};
|
||||
fast_prand();
|
||||
byte_t nr[4];
|
||||
num_to_bytes(prand(), 4, nr);
|
||||
//byte_t nr[4] = {0x01, 0x01, 0x01, 0x01};
|
||||
|
||||
uint32_t nt, ntpp; // Supplied tag nonce
|
||||
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue