\r
\r
void MifareUC_Auth1(uint8_t arg0, uint8_t *datain){\r
- // variables\r
+\r
byte_t isOK = 0;\r
byte_t dataoutbuf[16] = {0x00};\r
uint8_t uid[10] = {0x00};\r
uint32_t cuid;\r
- \r
- // clear trace\r
- iso14a_clear_trace();\r
- iso14443a_setup(FPGA_HF_ISO14443A_READER_LISTEN);\r
- \r
+\r
LED_A_ON();\r
LED_B_OFF();\r
LED_C_OFF();\r
- \r
+ \r
+ iso14a_clear_trace();\r
+ iso14443a_setup(FPGA_HF_ISO14443A_READER_LISTEN);\r
\r
if(!iso14443a_select_card(uid, NULL, &cuid)) {\r
- if (MF_DBGLEVEL >= 1) Dbprintf("Can't select card, something went wrong before auth");\r
+ if (MF_DBGLEVEL >= MF_DBG_ERROR)\r
+ Dbprintf("Can't select card");\r
+ OnError(0);\r
+ return;\r
};\r
\r
if(mifare_ultra_auth1(cuid, dataoutbuf)){\r
- if (MF_DBGLEVEL >= 1) Dbprintf("Authentication part1: Fail."); \r
+ if (MF_DBGLEVEL >= MF_DBG_ERROR) \r
+ Dbprintf("Authentication part1: Fail.");\r
+ OnError(1);\r
+ return;\r
}\r
\r
- isOK=1;\r
- if (MF_DBGLEVEL >= 2) DbpString("AUTH 1 FINISHED");\r
+ isOK = 1;\r
+ if (MF_DBGLEVEL >= MF_DBG_EXTENDED)\r
+ DbpString("AUTH 1 FINISHED");\r
\r
- LED_B_ON();\r
cmd_send(CMD_ACK,isOK,cuid,0,dataoutbuf,11);\r
- \r
LEDsoff();\r
}\r
void MifareUC_Auth2(uint32_t arg0, uint8_t *datain){\r
LED_C_OFF();\r
\r
if(mifare_ultra_auth2(cuid, key, dataoutbuf)){\r
- if (MF_DBGLEVEL >= 1) Dbprintf("Authentication part2: Fail..."); \r
+ if (MF_DBGLEVEL >= MF_DBG_ERROR) \r
+ Dbprintf("Authentication part2: Fail...");\r
+ OnError(1);\r
+ return; \r
}\r
+ \r
isOK = 1;\r
- if (MF_DBGLEVEL >= 2) DbpString("AUTH 2 FINISHED");\r
+ if (MF_DBGLEVEL >= MF_DBG_EXTENDED)\r
+ DbpString("AUTH 2 FINISHED");\r
\r
- LED_B_ON();\r
cmd_send(CMD_ACK,isOK,0,0,dataoutbuf,11);\r
- LED_B_OFF();\r
- \r
FpgaWriteConfWord(FPGA_MAJOR_MODE_OFF);\r
LEDsoff();\r
}\r
};\r
\r
nttmp = prng_successor(nt1, 100); //NXP Mifare is typical around 840,but for some unlicensed/compatible mifare card this can be 160\r
- for (i = 141; i < 1200; i++) {\r
+ for (i = 101; i < 1200; i++) {\r
nttmp = prng_successor(nttmp, 1);\r
if (nttmp == nt2) break;\r
}\r