From: Iceman Date: Wed, 7 Feb 2018 20:56:27 +0000 (+0100) Subject: fix: hf mf mifare - populate keylist X-Git-Url: https://git.zerfleddert.de/cgi-bin/gitweb.cgi/proxmark3-svn/commitdiff_plain/refs/heads/iceman1001-patch-2?ds=inline;hp=2ef3a5e99c8b27b06f860988783e1040a6dea705 fix: hf mf mifare - populate keylist This will solve the long running of the attack, since all candidate keys will be tested. --- diff --git a/client/mifarehost.c b/client/mifarehost.c index a01d3b5f..2bd21077 100644 --- a/client/mifarehost.c +++ b/client/mifarehost.c @@ -201,9 +201,9 @@ int mfDarkside(uint64_t *key) int size = keycount - i > max_keys ? max_keys : keycount - i; for (int j = 0; j < size; j++) { if (par_list == 0) { - num_to_bytes(last_keylist[i*max_keys + j], 6, keyBlock); + num_to_bytes(last_keylist[i*max_keys + j], 6, keyBlock+(j*6)); } else { - num_to_bytes(keylist[i*max_keys + j], 6, keyBlock); + num_to_bytes(keylist[i*max_keys + j], 6, keyBlock+(j*6)); } } if (!mfCheckKeys(0, 0, false, size, keyBlock, key)) {