mirror of
https://github.com/RfidResearchGroup/proxmark3.git
synced 2025-08-19 21:03:48 -07:00
Fix typos
Thanks to Debian lintian for the reports: I: proxmark3: spelling-error-in-binary usr/share/proxmark3/firmware/fullimage.elf dont don't I: proxmark3: spelling-error-in-binary usr/share/proxmark3/firmware/fullimage.elf succesful successful I: proxmark3: spelling-error-in-binary usr/share/proxmark3/firmware/fullimage.elf Uknown Unknown I: proxmark3: spelling-error-in-binary usr/share/proxmark3/firmware/fullimage.elf requestes requests I: proxmark3: spelling-error-in-binary usr/share/proxmark3/firmware/fullimage.elf unkown unknown I: proxmark3: spelling-error-in-binary usr/share/proxmark3/firmware/fullimage.elf ambigous ambiguous
This commit is contained in:
parent
a1852eaa4b
commit
f961c1c551
8 changed files with 20 additions and 20 deletions
|
@ -427,7 +427,7 @@ static bool hitag2_password(uint8_t *rx, const size_t rxlen, uint8_t *tx, size_t
|
||||||
}
|
}
|
||||||
|
|
||||||
if (blocknr > 7) {
|
if (blocknr > 7) {
|
||||||
DbpString("Read succesful!");
|
DbpString("Read successful!");
|
||||||
bSuccessful = true;
|
bSuccessful = true;
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
|
@ -440,7 +440,7 @@ static bool hitag2_password(uint8_t *rx, const size_t rxlen, uint8_t *tx, size_t
|
||||||
|
|
||||||
// Unexpected response
|
// Unexpected response
|
||||||
default: {
|
default: {
|
||||||
Dbprintf("Uknown frame length: %d", rxlen);
|
Dbprintf("Unknown frame length: %d", rxlen);
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
break;
|
break;
|
||||||
|
@ -532,7 +532,7 @@ static bool hitag2_crypto(uint8_t *rx, const size_t rxlen, uint8_t *tx, size_t *
|
||||||
blocknr++;
|
blocknr++;
|
||||||
}
|
}
|
||||||
if (blocknr > 7) {
|
if (blocknr > 7) {
|
||||||
DbpString("Read succesful!");
|
DbpString("Read successful!");
|
||||||
bSuccessful = true;
|
bSuccessful = true;
|
||||||
return false;
|
return false;
|
||||||
} else {
|
} else {
|
||||||
|
@ -546,7 +546,7 @@ static bool hitag2_crypto(uint8_t *rx, const size_t rxlen, uint8_t *tx, size_t *
|
||||||
|
|
||||||
// Unexpected response
|
// Unexpected response
|
||||||
default: {
|
default: {
|
||||||
Dbprintf("Uknown frame length: %d", rxlen);
|
Dbprintf("Unknown frame length: %d", rxlen);
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
break;
|
break;
|
||||||
|
@ -588,7 +588,7 @@ static bool hitag2_authenticate(uint8_t *rx, const size_t rxlen, uint8_t *tx, si
|
||||||
memcpy(tx, NrAr, 8);
|
memcpy(tx, NrAr, 8);
|
||||||
bCrypto = true;
|
bCrypto = true;
|
||||||
} else {
|
} else {
|
||||||
DbpString("Authentication succesful!");
|
DbpString("Authentication successful!");
|
||||||
return true;
|
return true;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -596,7 +596,7 @@ static bool hitag2_authenticate(uint8_t *rx, const size_t rxlen, uint8_t *tx, si
|
||||||
|
|
||||||
// Unexpected response
|
// Unexpected response
|
||||||
default: {
|
default: {
|
||||||
Dbprintf("Uknown frame length: %d", rxlen);
|
Dbprintf("Unknown frame length: %d", rxlen);
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
break;
|
break;
|
||||||
|
@ -655,7 +655,7 @@ static bool hitag2_test_auth_attempts(uint8_t *rx, const size_t rxlen, uint8_t *
|
||||||
break;
|
break;
|
||||||
|
|
||||||
default: {
|
default: {
|
||||||
Dbprintf("Uknown frame length: %d", rxlen);
|
Dbprintf("Unknown frame length: %d", rxlen);
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
break;
|
break;
|
||||||
|
@ -696,7 +696,7 @@ static bool hitag2_read_uid(uint8_t *rx, const size_t rxlen, uint8_t *tx, size_t
|
||||||
break;
|
break;
|
||||||
// Unexpected response
|
// Unexpected response
|
||||||
default: {
|
default: {
|
||||||
Dbprintf("Uknown frame length: %d", rxlen);
|
Dbprintf("Unknown frame length: %d", rxlen);
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
break;
|
break;
|
||||||
|
|
|
@ -1005,7 +1005,7 @@ static bool SimulateIso14443aInit(int tagType, int flags, uint8_t *data, tag_res
|
||||||
}
|
}
|
||||||
break;
|
break;
|
||||||
default: {
|
default: {
|
||||||
if (DBGLEVEL >= DBG_ERROR) Dbprintf("Error: unkown tagtype (%d)", tagType);
|
if (DBGLEVEL >= DBG_ERROR) Dbprintf("Error: unknown tagtype (%d)", tagType);
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
break;
|
break;
|
||||||
|
@ -2999,7 +2999,7 @@ void ReaderMifare(bool first_try, uint8_t block, uint8_t keytype) {
|
||||||
|
|
||||||
mf_nr_ar[3] &= 0x1F;
|
mf_nr_ar[3] &= 0x1F;
|
||||||
|
|
||||||
if (DBGLEVEL >= DBG_EXTENDED) Dbprintf("Number of sent auth requestes: %u", i);
|
if (DBGLEVEL >= DBG_EXTENDED) Dbprintf("Number of sent auth requests: %u", i);
|
||||||
|
|
||||||
uint8_t buf[32] = {0x00};
|
uint8_t buf[32] = {0x00};
|
||||||
memset(buf, 0x00, sizeof(buf));
|
memset(buf, 0x00, sizeof(buf));
|
||||||
|
|
|
@ -766,7 +766,7 @@ void DbdecodeIso15693Answer(int len, uint8_t *d) {
|
||||||
strncat(status, "0F: no info", DBD15STATLEN - strlen(status));
|
strncat(status, "0F: no info", DBD15STATLEN - strlen(status));
|
||||||
break;
|
break;
|
||||||
case 0x10:
|
case 0x10:
|
||||||
strncat(status, "10: dont exist", DBD15STATLEN - strlen(status));
|
strncat(status, "10: don't exist", DBD15STATLEN - strlen(status));
|
||||||
break;
|
break;
|
||||||
case 0x11:
|
case 0x11:
|
||||||
strncat(status, "11: lock again", DBD15STATLEN - strlen(status));
|
strncat(status, "11: lock again", DBD15STATLEN - strlen(status));
|
||||||
|
|
|
@ -1038,7 +1038,7 @@ void MifareNested(uint32_t arg0, uint32_t arg1, uint32_t arg2, uint8_t *datain)
|
||||||
|
|
||||||
if (valid_nonce(nttest, nt2, ks1, par_array)) {
|
if (valid_nonce(nttest, nt2, ks1, par_array)) {
|
||||||
if (ncount > 0) { // we are only interested in disambiguous nonces, try again
|
if (ncount > 0) { // we are only interested in disambiguous nonces, try again
|
||||||
if (DBGLEVEL >= 3) Dbprintf("Nonce#%d: dismissed (ambigous), ntdist=%d", i + 1, j);
|
if (DBGLEVEL >= 3) Dbprintf("Nonce#%d: dismissed (ambiguous), ntdist=%d", i + 1, j);
|
||||||
target_nt[i] = 0;
|
target_nt[i] = 0;
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
|
|
|
@ -245,7 +245,7 @@ static int CmdLFHitagList(const char *Cmd) {
|
||||||
|
|
||||||
if (f) {
|
if (f) {
|
||||||
fclose(f);
|
fclose(f);
|
||||||
PrintAndLogEx(NORMAL, "Recorded activity succesfully written to file: %s", filename);
|
PrintAndLogEx(NORMAL, "Recorded activity successfully written to file: %s", filename);
|
||||||
}
|
}
|
||||||
|
|
||||||
free(got);
|
free(got);
|
||||||
|
|
|
@ -1397,7 +1397,7 @@ static int CmdT55xxWriteBlock(const char *Cmd) {
|
||||||
//t55xxVerifyWrite( uint8_t block, bool page1, bool usepwd, uint8_t override, uint32_t password, uint8_t downlink_mode, uint32_t data) {
|
//t55xxVerifyWrite( uint8_t block, bool page1, bool usepwd, uint8_t override, uint32_t password, uint8_t downlink_mode, uint32_t data) {
|
||||||
bool isOK = t55xxVerifyWrite(block, page1, usepwd, 1, password, downlink_mode, data);
|
bool isOK = t55xxVerifyWrite(block, page1, usepwd, 1, password, downlink_mode, data);
|
||||||
if (isOK)
|
if (isOK)
|
||||||
PrintAndLogEx(SUCCESS, "Write OK, validation succesful");
|
PrintAndLogEx(SUCCESS, "Write OK, validation successful");
|
||||||
else
|
else
|
||||||
PrintAndLogEx(WARNING, "Write could not validate the written data");
|
PrintAndLogEx(WARNING, "Write could not validate the written data");
|
||||||
}
|
}
|
||||||
|
|
|
@ -191,7 +191,7 @@ const APDUCode APDUCodeTable[] = {
|
||||||
{"9681", APDUCODE_TYPE_NONE, "Slave not found"},
|
{"9681", APDUCODE_TYPE_NONE, "Slave not found"},
|
||||||
{"9700", APDUCODE_TYPE_NONE, "PIN blocked and Unblock Try Counter is 1 or 2"},
|
{"9700", APDUCODE_TYPE_NONE, "PIN blocked and Unblock Try Counter is 1 or 2"},
|
||||||
{"9702", APDUCODE_TYPE_NONE, "Main keys are blocked"},
|
{"9702", APDUCODE_TYPE_NONE, "Main keys are blocked"},
|
||||||
{"9704", APDUCODE_TYPE_NONE, "PIN not succesfully verified, 3 or more PIN tries left"},
|
{"9704", APDUCODE_TYPE_NONE, "PIN not successfully verified, 3 or more PIN tries left"},
|
||||||
{"9784", APDUCODE_TYPE_NONE, "Base key"},
|
{"9784", APDUCODE_TYPE_NONE, "Base key"},
|
||||||
{"9785", APDUCODE_TYPE_NONE, "Limit exceeded - C-MAC key"},
|
{"9785", APDUCODE_TYPE_NONE, "Limit exceeded - C-MAC key"},
|
||||||
{"9786", APDUCODE_TYPE_NONE, "SM error - Limit exceeded - R-MAC key"},
|
{"9786", APDUCODE_TYPE_NONE, "SM error - Limit exceeded - R-MAC key"},
|
||||||
|
@ -205,13 +205,13 @@ const APDUCode APDUCodeTable[] = {
|
||||||
{"9850", APDUCODE_TYPE_ERROR, "INCREASE or DECREASE could not be executed because a limit has been reached."},
|
{"9850", APDUCODE_TYPE_ERROR, "INCREASE or DECREASE could not be executed because a limit has been reached."},
|
||||||
{"9862", APDUCODE_TYPE_ERROR, "Authentication Error, application specific (incorrect MAC)"},
|
{"9862", APDUCODE_TYPE_ERROR, "Authentication Error, application specific (incorrect MAC)"},
|
||||||
{"9900", APDUCODE_TYPE_NONE, "1 PIN try left"},
|
{"9900", APDUCODE_TYPE_NONE, "1 PIN try left"},
|
||||||
{"9904", APDUCODE_TYPE_NONE, "PIN not succesfully verified, 1 PIN try left"},
|
{"9904", APDUCODE_TYPE_NONE, "PIN not successfully verified, 1 PIN try left"},
|
||||||
{"9985", APDUCODE_TYPE_NONE, "Wrong status - Cardholder lock"},
|
{"9985", APDUCODE_TYPE_NONE, "Wrong status - Cardholder lock"},
|
||||||
{"9986", APDUCODE_TYPE_ERROR, "Missing privilege"},
|
{"9986", APDUCODE_TYPE_ERROR, "Missing privilege"},
|
||||||
{"9987", APDUCODE_TYPE_NONE, "PIN is not installed"},
|
{"9987", APDUCODE_TYPE_NONE, "PIN is not installed"},
|
||||||
{"9988", APDUCODE_TYPE_NONE, "Wrong status - R-MAC state"},
|
{"9988", APDUCODE_TYPE_NONE, "Wrong status - R-MAC state"},
|
||||||
{"9A00", APDUCODE_TYPE_NONE, "2 PIN try left"},
|
{"9A00", APDUCODE_TYPE_NONE, "2 PIN try left"},
|
||||||
{"9A04", APDUCODE_TYPE_NONE, "PIN not succesfully verified, 2 PIN try left"},
|
{"9A04", APDUCODE_TYPE_NONE, "PIN not successfully verified, 2 PIN try left"},
|
||||||
{"9A71", APDUCODE_TYPE_NONE, "Wrong parameter value - Double agent AID"},
|
{"9A71", APDUCODE_TYPE_NONE, "Wrong parameter value - Double agent AID"},
|
||||||
{"9A72", APDUCODE_TYPE_NONE, "Wrong parameter value - Double agent Type"},
|
{"9A72", APDUCODE_TYPE_NONE, "Wrong parameter value - Double agent Type"},
|
||||||
{"9D05", APDUCODE_TYPE_ERROR, "Incorrect certificate type"},
|
{"9D05", APDUCODE_TYPE_ERROR, "Incorrect certificate type"},
|
||||||
|
@ -258,9 +258,9 @@ const APDUCode APDUCodeTable[] = {
|
||||||
{"9D63", APDUCODE_TYPE_ERROR, "Crypto functions not available"},
|
{"9D63", APDUCODE_TYPE_ERROR, "Crypto functions not available"},
|
||||||
{"9D64", APDUCODE_TYPE_ERROR, "No application loaded"},
|
{"9D64", APDUCODE_TYPE_ERROR, "No application loaded"},
|
||||||
{"9E00", APDUCODE_TYPE_NONE, "PIN not installed"},
|
{"9E00", APDUCODE_TYPE_NONE, "PIN not installed"},
|
||||||
{"9E04", APDUCODE_TYPE_NONE, "PIN not succesfully verified, PIN not installed"},
|
{"9E04", APDUCODE_TYPE_NONE, "PIN not successfully verified, PIN not installed"},
|
||||||
{"9F00", APDUCODE_TYPE_NONE, "PIN blocked and Unblock Try Counter is 3"},
|
{"9F00", APDUCODE_TYPE_NONE, "PIN blocked and Unblock Try Counter is 3"},
|
||||||
{"9F04", APDUCODE_TYPE_NONE, "PIN not succesfully verified, PIN blocked and Unblock Try Counter is 3"},
|
{"9F04", APDUCODE_TYPE_NONE, "PIN not successfully verified, PIN blocked and Unblock Try Counter is 3"},
|
||||||
{"9FXX", APDUCODE_TYPE_NONE, "Command successfully executed; 'xx' bytes of data are available and can be requested using GET RESPONSE."},
|
{"9FXX", APDUCODE_TYPE_NONE, "Command successfully executed; 'xx' bytes of data are available and can be requested using GET RESPONSE."},
|
||||||
{"9XXX", APDUCODE_TYPE_NONE, "Application related status, (ISO 7816-3)"}
|
{"9XXX", APDUCODE_TYPE_NONE, "Application related status, (ISO 7816-3)"}
|
||||||
};
|
};
|
||||||
|
|
|
@ -528,7 +528,7 @@ int mbedtls_ecp_tls_write_point(const mbedtls_ecp_group *grp, const mbedtls_ecp_
|
||||||
*
|
*
|
||||||
* \return \c 0 on success,
|
* \return \c 0 on success,
|
||||||
* \return An \c MBEDTLS_ERR_MPI_XXX error code on initialization failure.
|
* \return An \c MBEDTLS_ERR_MPI_XXX error code on initialization failure.
|
||||||
* \return #MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE for unkownn groups.
|
* \return #MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE for unknown groups.
|
||||||
|
|
||||||
*/
|
*/
|
||||||
int mbedtls_ecp_group_load(mbedtls_ecp_group *grp, mbedtls_ecp_group_id id);
|
int mbedtls_ecp_group_load(mbedtls_ecp_group *grp, mbedtls_ecp_group_id id);
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue