- };\r
- \r
- // authenticate here.\r
- if ( usePwd ) {\r
-\r
- uint8_t a[8] = { 0x01 };\r
- uint8_t b[8] = { 0x00 };\r
- uint8_t enc_b[8] = { 0x00 };\r
- uint8_t ab[16] = { 0x00 };\r
- \r
- uint8_t transKey[8] = { 0x00 };\r
- \r
- uint16_t len;\r
- uint8_t receivedAnswer[MAX_MIFARE_FRAME_SIZE];\r
- uint8_t receivedAnswerPar[MAX_MIFARE_PARITY_SIZE];\r
- \r
- len = mifare_sendcmd_short(NULL, 1, 0x1A, 0x00, receivedAnswer,receivedAnswerPar ,NULL);\r
- if (len == 1) {\r
- if (MF_DBGLEVEL >= MF_DBG_ERROR)\r
- Dbprintf("Cmd Error: %02x", receivedAnswer[0]);\r
- OnError(1);\r
- return;\r
- }\r
- \r
-// memcpy(dataout, receivedAnswer, 11);\r
- \r
- // tag nonce.\r
- memcpy(enc_b,receivedAnswer+1,8);\r
-\r
- // decrypt nonce.\r
- des_dec(enc_b, b, key );\r
-\r
- Dbprintf("enc_B: %02x %02x %02x %02x %02x %02x %02x %02x", enc_b[0],enc_b[1],enc_b[2],enc_b[3],enc_b[4],enc_b[5],enc_b[6],enc_b[7] );\r
-\r
- rol(b,8);\r
- \r
- memcpy(ab ,a,8);\r
- memcpy(ab+8,b,8);\r
-\r
- Dbprintf("AB: %02x %02x %02x %02x %02x %02x %02x %02x", ab[0],ab[1],ab[2],ab[3],ab[4],ab[5],ab[6],ab[7] );\r
- Dbprintf("AB: %02x %02x %02x %02x %02x %02x %02x %02x", ab[8],ab[9],ab[10],ab[11],ab[12],ab[13],ab[14],ab[15] );\r
-\r
- // encrypt\r
- des_enc(ab, ab, key);\r