From: Iceman Date: Thu, 8 Feb 2018 03:15:42 +0000 (+0100) Subject: fix: hf mf mifare - populate keylist (#568) X-Git-Tag: v3.1.0~74 X-Git-Url: https://git.zerfleddert.de/cgi-bin/gitweb.cgi/proxmark3-svn/commitdiff_plain/02515642bc81dc44d08e47b2f3454e29609dd0fe?hp=2ef3a5e99c8b27b06f860988783e1040a6dea705 fix: hf mf mifare - populate keylist (#568) This will solve the long running of the attack, since all candidate keys will be tested. --- diff --git a/client/mifarehost.c b/client/mifarehost.c index a01d3b5f..2bd21077 100644 --- a/client/mifarehost.c +++ b/client/mifarehost.c @@ -201,9 +201,9 @@ int mfDarkside(uint64_t *key) int size = keycount - i > max_keys ? max_keys : keycount - i; for (int j = 0; j < size; j++) { if (par_list == 0) { - num_to_bytes(last_keylist[i*max_keys + j], 6, keyBlock); + num_to_bytes(last_keylist[i*max_keys + j], 6, keyBlock+(j*6)); } else { - num_to_bytes(keylist[i*max_keys + j], 6, keyBlock); + num_to_bytes(keylist[i*max_keys + j], 6, keyBlock+(j*6)); } } if (!mfCheckKeys(0, 0, false, size, keyBlock, key)) {