mirror of
https://github.com/RfidResearchGroup/proxmark3.git
synced 2025-08-19 21:03:48 -07:00
Fix typos
Thanks to Debian lintian for the reports: I: proxmark3: spelling-error-in-binary usr/share/proxmark3/firmware/fullimage.elf dont don't I: proxmark3: spelling-error-in-binary usr/share/proxmark3/firmware/fullimage.elf succesful successful I: proxmark3: spelling-error-in-binary usr/share/proxmark3/firmware/fullimage.elf Uknown Unknown I: proxmark3: spelling-error-in-binary usr/share/proxmark3/firmware/fullimage.elf requestes requests I: proxmark3: spelling-error-in-binary usr/share/proxmark3/firmware/fullimage.elf unkown unknown I: proxmark3: spelling-error-in-binary usr/share/proxmark3/firmware/fullimage.elf ambigous ambiguous
This commit is contained in:
parent
a1852eaa4b
commit
f961c1c551
8 changed files with 20 additions and 20 deletions
|
@ -427,7 +427,7 @@ static bool hitag2_password(uint8_t *rx, const size_t rxlen, uint8_t *tx, size_t
|
|||
}
|
||||
|
||||
if (blocknr > 7) {
|
||||
DbpString("Read succesful!");
|
||||
DbpString("Read successful!");
|
||||
bSuccessful = true;
|
||||
return false;
|
||||
}
|
||||
|
@ -440,7 +440,7 @@ static bool hitag2_password(uint8_t *rx, const size_t rxlen, uint8_t *tx, size_t
|
|||
|
||||
// Unexpected response
|
||||
default: {
|
||||
Dbprintf("Uknown frame length: %d", rxlen);
|
||||
Dbprintf("Unknown frame length: %d", rxlen);
|
||||
return false;
|
||||
}
|
||||
break;
|
||||
|
@ -532,7 +532,7 @@ static bool hitag2_crypto(uint8_t *rx, const size_t rxlen, uint8_t *tx, size_t *
|
|||
blocknr++;
|
||||
}
|
||||
if (blocknr > 7) {
|
||||
DbpString("Read succesful!");
|
||||
DbpString("Read successful!");
|
||||
bSuccessful = true;
|
||||
return false;
|
||||
} else {
|
||||
|
@ -546,7 +546,7 @@ static bool hitag2_crypto(uint8_t *rx, const size_t rxlen, uint8_t *tx, size_t *
|
|||
|
||||
// Unexpected response
|
||||
default: {
|
||||
Dbprintf("Uknown frame length: %d", rxlen);
|
||||
Dbprintf("Unknown frame length: %d", rxlen);
|
||||
return false;
|
||||
}
|
||||
break;
|
||||
|
@ -588,7 +588,7 @@ static bool hitag2_authenticate(uint8_t *rx, const size_t rxlen, uint8_t *tx, si
|
|||
memcpy(tx, NrAr, 8);
|
||||
bCrypto = true;
|
||||
} else {
|
||||
DbpString("Authentication succesful!");
|
||||
DbpString("Authentication successful!");
|
||||
return true;
|
||||
}
|
||||
}
|
||||
|
@ -596,7 +596,7 @@ static bool hitag2_authenticate(uint8_t *rx, const size_t rxlen, uint8_t *tx, si
|
|||
|
||||
// Unexpected response
|
||||
default: {
|
||||
Dbprintf("Uknown frame length: %d", rxlen);
|
||||
Dbprintf("Unknown frame length: %d", rxlen);
|
||||
return false;
|
||||
}
|
||||
break;
|
||||
|
@ -655,7 +655,7 @@ static bool hitag2_test_auth_attempts(uint8_t *rx, const size_t rxlen, uint8_t *
|
|||
break;
|
||||
|
||||
default: {
|
||||
Dbprintf("Uknown frame length: %d", rxlen);
|
||||
Dbprintf("Unknown frame length: %d", rxlen);
|
||||
return false;
|
||||
}
|
||||
break;
|
||||
|
@ -696,7 +696,7 @@ static bool hitag2_read_uid(uint8_t *rx, const size_t rxlen, uint8_t *tx, size_t
|
|||
break;
|
||||
// Unexpected response
|
||||
default: {
|
||||
Dbprintf("Uknown frame length: %d", rxlen);
|
||||
Dbprintf("Unknown frame length: %d", rxlen);
|
||||
return false;
|
||||
}
|
||||
break;
|
||||
|
|
|
@ -1005,7 +1005,7 @@ static bool SimulateIso14443aInit(int tagType, int flags, uint8_t *data, tag_res
|
|||
}
|
||||
break;
|
||||
default: {
|
||||
if (DBGLEVEL >= DBG_ERROR) Dbprintf("Error: unkown tagtype (%d)", tagType);
|
||||
if (DBGLEVEL >= DBG_ERROR) Dbprintf("Error: unknown tagtype (%d)", tagType);
|
||||
return false;
|
||||
}
|
||||
break;
|
||||
|
@ -2999,7 +2999,7 @@ void ReaderMifare(bool first_try, uint8_t block, uint8_t keytype) {
|
|||
|
||||
mf_nr_ar[3] &= 0x1F;
|
||||
|
||||
if (DBGLEVEL >= DBG_EXTENDED) Dbprintf("Number of sent auth requestes: %u", i);
|
||||
if (DBGLEVEL >= DBG_EXTENDED) Dbprintf("Number of sent auth requests: %u", i);
|
||||
|
||||
uint8_t buf[32] = {0x00};
|
||||
memset(buf, 0x00, sizeof(buf));
|
||||
|
|
|
@ -766,7 +766,7 @@ void DbdecodeIso15693Answer(int len, uint8_t *d) {
|
|||
strncat(status, "0F: no info", DBD15STATLEN - strlen(status));
|
||||
break;
|
||||
case 0x10:
|
||||
strncat(status, "10: dont exist", DBD15STATLEN - strlen(status));
|
||||
strncat(status, "10: don't exist", DBD15STATLEN - strlen(status));
|
||||
break;
|
||||
case 0x11:
|
||||
strncat(status, "11: lock again", DBD15STATLEN - strlen(status));
|
||||
|
|
|
@ -1038,7 +1038,7 @@ void MifareNested(uint32_t arg0, uint32_t arg1, uint32_t arg2, uint8_t *datain)
|
|||
|
||||
if (valid_nonce(nttest, nt2, ks1, par_array)) {
|
||||
if (ncount > 0) { // we are only interested in disambiguous nonces, try again
|
||||
if (DBGLEVEL >= 3) Dbprintf("Nonce#%d: dismissed (ambigous), ntdist=%d", i + 1, j);
|
||||
if (DBGLEVEL >= 3) Dbprintf("Nonce#%d: dismissed (ambiguous), ntdist=%d", i + 1, j);
|
||||
target_nt[i] = 0;
|
||||
break;
|
||||
}
|
||||
|
|
|
@ -245,7 +245,7 @@ static int CmdLFHitagList(const char *Cmd) {
|
|||
|
||||
if (f) {
|
||||
fclose(f);
|
||||
PrintAndLogEx(NORMAL, "Recorded activity succesfully written to file: %s", filename);
|
||||
PrintAndLogEx(NORMAL, "Recorded activity successfully written to file: %s", filename);
|
||||
}
|
||||
|
||||
free(got);
|
||||
|
|
|
@ -1397,7 +1397,7 @@ static int CmdT55xxWriteBlock(const char *Cmd) {
|
|||
//t55xxVerifyWrite( uint8_t block, bool page1, bool usepwd, uint8_t override, uint32_t password, uint8_t downlink_mode, uint32_t data) {
|
||||
bool isOK = t55xxVerifyWrite(block, page1, usepwd, 1, password, downlink_mode, data);
|
||||
if (isOK)
|
||||
PrintAndLogEx(SUCCESS, "Write OK, validation succesful");
|
||||
PrintAndLogEx(SUCCESS, "Write OK, validation successful");
|
||||
else
|
||||
PrintAndLogEx(WARNING, "Write could not validate the written data");
|
||||
}
|
||||
|
|
|
@ -191,7 +191,7 @@ const APDUCode APDUCodeTable[] = {
|
|||
{"9681", APDUCODE_TYPE_NONE, "Slave not found"},
|
||||
{"9700", APDUCODE_TYPE_NONE, "PIN blocked and Unblock Try Counter is 1 or 2"},
|
||||
{"9702", APDUCODE_TYPE_NONE, "Main keys are blocked"},
|
||||
{"9704", APDUCODE_TYPE_NONE, "PIN not succesfully verified, 3 or more PIN tries left"},
|
||||
{"9704", APDUCODE_TYPE_NONE, "PIN not successfully verified, 3 or more PIN tries left"},
|
||||
{"9784", APDUCODE_TYPE_NONE, "Base key"},
|
||||
{"9785", APDUCODE_TYPE_NONE, "Limit exceeded - C-MAC key"},
|
||||
{"9786", APDUCODE_TYPE_NONE, "SM error - Limit exceeded - R-MAC key"},
|
||||
|
@ -205,13 +205,13 @@ const APDUCode APDUCodeTable[] = {
|
|||
{"9850", APDUCODE_TYPE_ERROR, "INCREASE or DECREASE could not be executed because a limit has been reached."},
|
||||
{"9862", APDUCODE_TYPE_ERROR, "Authentication Error, application specific (incorrect MAC)"},
|
||||
{"9900", APDUCODE_TYPE_NONE, "1 PIN try left"},
|
||||
{"9904", APDUCODE_TYPE_NONE, "PIN not succesfully verified, 1 PIN try left"},
|
||||
{"9904", APDUCODE_TYPE_NONE, "PIN not successfully verified, 1 PIN try left"},
|
||||
{"9985", APDUCODE_TYPE_NONE, "Wrong status - Cardholder lock"},
|
||||
{"9986", APDUCODE_TYPE_ERROR, "Missing privilege"},
|
||||
{"9987", APDUCODE_TYPE_NONE, "PIN is not installed"},
|
||||
{"9988", APDUCODE_TYPE_NONE, "Wrong status - R-MAC state"},
|
||||
{"9A00", APDUCODE_TYPE_NONE, "2 PIN try left"},
|
||||
{"9A04", APDUCODE_TYPE_NONE, "PIN not succesfully verified, 2 PIN try left"},
|
||||
{"9A04", APDUCODE_TYPE_NONE, "PIN not successfully verified, 2 PIN try left"},
|
||||
{"9A71", APDUCODE_TYPE_NONE, "Wrong parameter value - Double agent AID"},
|
||||
{"9A72", APDUCODE_TYPE_NONE, "Wrong parameter value - Double agent Type"},
|
||||
{"9D05", APDUCODE_TYPE_ERROR, "Incorrect certificate type"},
|
||||
|
@ -258,9 +258,9 @@ const APDUCode APDUCodeTable[] = {
|
|||
{"9D63", APDUCODE_TYPE_ERROR, "Crypto functions not available"},
|
||||
{"9D64", APDUCODE_TYPE_ERROR, "No application loaded"},
|
||||
{"9E00", APDUCODE_TYPE_NONE, "PIN not installed"},
|
||||
{"9E04", APDUCODE_TYPE_NONE, "PIN not succesfully verified, PIN not installed"},
|
||||
{"9E04", APDUCODE_TYPE_NONE, "PIN not successfully verified, PIN not installed"},
|
||||
{"9F00", APDUCODE_TYPE_NONE, "PIN blocked and Unblock Try Counter is 3"},
|
||||
{"9F04", APDUCODE_TYPE_NONE, "PIN not succesfully verified, PIN blocked and Unblock Try Counter is 3"},
|
||||
{"9F04", APDUCODE_TYPE_NONE, "PIN not successfully verified, PIN blocked and Unblock Try Counter is 3"},
|
||||
{"9FXX", APDUCODE_TYPE_NONE, "Command successfully executed; 'xx' bytes of data are available and can be requested using GET RESPONSE."},
|
||||
{"9XXX", APDUCODE_TYPE_NONE, "Application related status, (ISO 7816-3)"}
|
||||
};
|
||||
|
|
|
@ -528,7 +528,7 @@ int mbedtls_ecp_tls_write_point(const mbedtls_ecp_group *grp, const mbedtls_ecp_
|
|||
*
|
||||
* \return \c 0 on success,
|
||||
* \return An \c MBEDTLS_ERR_MPI_XXX error code on initialization failure.
|
||||
* \return #MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE for unkownn groups.
|
||||
* \return #MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE for unknown groups.
|
||||
|
||||
*/
|
||||
int mbedtls_ecp_group_load(mbedtls_ecp_group *grp, mbedtls_ecp_group_id id);
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue