fix: hf mf mifare - populate keylist (#568)

This will solve the long running of the attack, since all candidate keys will be tested.
This commit is contained in:
Iceman 2018-02-08 04:15:42 +01:00 committed by pwpiwi
parent 2ef3a5e99c
commit 02515642bc

View file

@ -201,9 +201,9 @@ int mfDarkside(uint64_t *key)
int size = keycount - i > max_keys ? max_keys : keycount - i;
for (int j = 0; j < size; j++) {
if (par_list == 0) {
num_to_bytes(last_keylist[i*max_keys + j], 6, keyBlock);
num_to_bytes(last_keylist[i*max_keys + j], 6, keyBlock+(j*6));
} else {
num_to_bytes(keylist[i*max_keys + j], 6, keyBlock);
num_to_bytes(keylist[i*max_keys + j], 6, keyBlock+(j*6));
}
}
if (!mfCheckKeys(0, 0, false, size, keyBlock, key)) {