uint64_t par_list = 0, ks_list = 0, r_key = 0;\r
int16_t isOK = 0;\r
\r
- UsbCommand c = {CMD_READER_MIFARE, {true, 0, 0}};\r
+ uint8_t blockNo = 0, keyType = 0;\r
+ char cmdp = 0x00;\r
+\r
+ if (strlen(Cmd)<3) {\r
+ PrintAndLog("Usage: hf mf mifare <block number> <key A/B>");\r
+ PrintAndLog(" sample: hf mf mi 0 A");\r
+ return 0;\r
+ } \r
+\r
+ blockNo = param_get8(Cmd, 0);\r
+ cmdp = param_getchar(Cmd, 1);\r
+ if (cmdp == 0x00) {\r
+ PrintAndLog("Key type must be A or B");\r
+ return 1;\r
+ }\r
+ if (cmdp != 'A' && cmdp != 'a') keyType = 1;\r
+\r
+ UsbCommand c = {CMD_READER_MIFARE, {true, blockNo, keyType}};\r
\r
// message\r
printf("-------------------------------------------------------------------------\n");\r
case -1 : PrintAndLog("Button pressed. Aborted.\n"); break;\r
case -2 : PrintAndLog("Card is not vulnerable to Darkside attack (doesn't send NACK on authentication requests).\n"); break;\r
case -3 : PrintAndLog("Card is not vulnerable to Darkside attack (its random number generator is not predictable).\n"); break;\r
+ case -4 : PrintAndLog("Card is not vulnerable to Darkside attack (its random number generator seems to be based on the wellknown");\r
+ PrintAndLog("generating polynomial with 16 effective bits only, but shows unexpected behaviour.\n"); break;\r
default: ;\r
}\r
break;\r