break;
}
case SNF_UID1:{\r
- if ((reader) && (len == 2) && (data[0] == 0x93) && (data[1] == 0x20)) { // Select ALL from reader
- sniffState = SNF_ANTICOL1;
- }\r
- \r
if ((reader) && (len == 9) && (data[0] == 0x93) && (data[1] == 0x70) && (CheckCrc14443(CRC_14443_A, data, 9))) { // Select 4 Byte UID from reader\r
memcpy(sniffUID + 3, &data[2], 4);\r
sniffState = SNF_SAK;\r
}\r
break;
}\r
- case SNF_ANTICOL1:{
- if ((!reader) && (len == 5) && ((data[0] ^ data[1] ^ data[2] ^ data[3]) == data[4])) { // UID from tag (CL1)
- sniffState = SNF_UID1;
- }
- break;
- }
case SNF_SAK:{
if ((!reader) && (len == 3) && (CheckCrc14443(CRC_14443_A, data, 3))) { // SAK from card?
sniffSAK = data[0];
}
break;
}
- case SNF_ANTICOL2:{
- if ((!reader) && (len == 5) && ((data[0] ^ data[1] ^ data[2] ^ data[3]) == data[4])) { // CL2 UID
- sniffState = SNF_UID2;
- }
- break;
- }
case SNF_UID2:{\r
- if ((reader) && (len == 2) && (data[0] == 0x95) && (data[1] == 0x20)) {\r
- sniffState = SNF_ANTICOL2;\r
- }\r
- \r
if ((reader) && (len == 9) && (data[0] == 0x95) && (data[1] == 0x70) && (CheckCrc14443(CRC_14443_A, data, 9))) {\r
memcpy(sniffUID + 3, &data[2], 4);\r
sniffState = SNF_SAK;\r