mirror of
https://github.com/Proxmark/proxmark3.git
synced 2025-07-15 01:33:00 -07:00
fix: hf mf mifare - populate keylist (#568)
This will solve the long running of the attack, since all candidate keys will be tested.
This commit is contained in:
parent
2ef3a5e99c
commit
02515642bc
1 changed files with 2 additions and 2 deletions
|
@ -201,9 +201,9 @@ int mfDarkside(uint64_t *key)
|
|||
int size = keycount - i > max_keys ? max_keys : keycount - i;
|
||||
for (int j = 0; j < size; j++) {
|
||||
if (par_list == 0) {
|
||||
num_to_bytes(last_keylist[i*max_keys + j], 6, keyBlock);
|
||||
num_to_bytes(last_keylist[i*max_keys + j], 6, keyBlock+(j*6));
|
||||
} else {
|
||||
num_to_bytes(keylist[i*max_keys + j], 6, keyBlock);
|
||||
num_to_bytes(keylist[i*max_keys + j], 6, keyBlock+(j*6));
|
||||
}
|
||||
}
|
||||
if (!mfCheckKeys(0, 0, false, size, keyBlock, key)) {
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue