//-----------------------------------------------------------------------------\r
// Work with mifare cards.\r
//-----------------------------------------------------------------------------\r
-\r
-#include "proxmark3.h"\r
-#include "apps.h"\r
-#include "util.h"\r
-#include "string.h"\r
-\r
-#include "iso14443crc.h"\r
-#include "iso14443a.h"\r
-#include "crapto1.h"\r
#include "mifareutil.h"\r
-#include "parity.h"\r
-#include "des.h"\r
\r
int MF_DBGLEVEL = MF_DBG_ALL;\r
\r
memcpy(enc_random_b,resp+1,8);\r
\r
// decrypt nonce.\r
- tdes_2key_dec(random_b, enc_random_b, sizeof(random_b), key, IV );\r
+ tdes_2key_dec((void*)random_b, (void*)enc_random_b, sizeof(random_b), (const void*)key, IV );\r
rol(random_b,8);\r
memcpy(rnd_ab ,random_a,8);\r
memcpy(rnd_ab+8,random_b,8);\r
return 0;\r
}\r
int mifare_classic_halt_ex(struct Crypto1State *pcs) {\r
- uint16_t len = 0; \r
uint8_t receivedAnswer[4] = {0x00, 0x00, 0x00, 0x00};\r
- len = mifare_sendcmd_short(pcs, (pcs == NULL) ? CRYPT_NONE : CRYPT_ALL, 0x50, 0x00, receivedAnswer, NULL, NULL);\r
+ uint16_t len = mifare_sendcmd_short(pcs, (pcs == NULL) ? CRYPT_NONE : CRYPT_ALL, 0x50, 0x00, receivedAnswer, NULL, NULL);\r
if (len != 0) {\r
- if (MF_DBGLEVEL >= MF_DBG_ERROR) \r
- Dbprintf("halt error. response len: %x data:%02X %02X %02X %02X", len, receivedAnswer[0],receivedAnswer[1],receivedAnswer[2],receivedAnswer[3]); \r
- if (len == 1 && receivedAnswer[0] == 0x04)\r
- return 4;\r
+ if (MF_DBGLEVEL >= MF_DBG_EXTENDED) Dbprintf("halt warning. response len: %x", len);\r
return 1;\r
}\r
return 0;\r