respsize = sizeof(response6);
} else {
// Never seen this command before
- Dbprintf("Received unknown command (len=%d): %02x %02x %02x %02x %02x %02x %02x %02x %02x",
+ Dbprintf("Received (len=%d): %02x %02x %02x %02x %02x %02x %02x %02x %02x",
len,
receivedCmd[0], receivedCmd[1], receivedCmd[2],
receivedCmd[3], receivedCmd[4], receivedCmd[5],
if(respLen > 0) {
EmSendCmd14443aRaw(resp, respLen, receivedCmd[0] == 0x52);
}
-
- // After sending the response, print out some debug data.
- if (receivedCmd[0] == 0x60 || receivedCmd[0] == 0x61) {
- Dbprintf("Authenticate request from reader: %02x %02x",receivedCmd[0],receivedCmd[1]);
- } else if (receivedCmd[0] == 0xE0) {
- Dbprintf("RATS request from reader: %02x %02x",receivedCmd[0],receivedCmd[1]);
- } else if (receivedCmd[0] == 0x30) {
- Dbprintf("READ request from reader: %02x %02x",receivedCmd[0],receivedCmd[1]);
- }
-
if (tracing) {
LogTrace(receivedCmd,len, 0, Uart.parityBits, TRUE);
{
if ( (parameter != 0) && (memcmp(nt, nt_noattack, 4) == 0) ) continue;
- isNULL = (nt_attacked[0] == 0) && (nt_attacked[1] == 0) && (nt_attacked[2] == 0) && (nt_attacked[3] == 0);
+ isNULL = !(nt_attacked[0] == 0) && (nt_attacked[1] == 0) && (nt_attacked[2] == 0) && (nt_attacked[3] == 0);
if ( (isNULL != 0 ) && (memcmp(nt, nt_attacked, 4) != 0) ) continue;
if (nt_diff == 0)