len = mifare_sendcmd_short_mfuev1auth(NULL, 0, 0x1B, key, resp, respPar, NULL);\r
if (len != 4) {\r
if (MF_DBGLEVEL >= MF_DBG_ERROR) Dbprintf("Cmd Error: %02x %u", resp[0], len);\r
- OnError(1);\r
- return 1;\r
+ return 0;\r
}\r
\r
if (MF_DBGLEVEL >= MF_DBG_EXTENDED)\r
Dbprintf("Auth Resp: %02x%02x%02x%02x", resp[0],resp[1],resp[2],resp[3]);\r
\r
memcpy(pack, resp, 4);\r
- return 0;\r
+ return 1;\r
}\r
\r
int mifare_ultra_auth(uint8_t *keybytes){\r
len = mifare_sendcmd_short(NULL, 1, 0x1A, 0x00, resp, respPar ,NULL);\r
if (len != 11) {\r
if (MF_DBGLEVEL >= MF_DBG_ERROR) Dbprintf("Cmd Error: %02x", resp[0]);\r
- OnError(1);\r
- return 1;\r
+ return 0;\r
}\r
\r
// tag nonce.\r
len = mifare_sendcmd_short_mfucauth(NULL, 1, 0xAF, rnd_ab, resp, respPar, NULL);\r
if (len != 11) {\r
if (MF_DBGLEVEL >= MF_DBG_ERROR) Dbprintf("Cmd Error: %02x", resp[0]);\r
- OnError(1);\r
- return 1;\r
+ return 0;\r
}\r
\r
uint8_t enc_resp[8] = { 0,0,0,0,0,0,0,0 };\r
tdes_2key_dec(resp_random_a, enc_resp, 8, key, enc_random_b);\r
if ( memcmp(resp_random_a, random_a, 8) != 0 ) {\r
if (MF_DBGLEVEL >= MF_DBG_ERROR) Dbprintf("failed authentication");\r
- return 1;\r
+ return 0;\r
}\r
\r
if (MF_DBGLEVEL >= MF_DBG_EXTENDED) {\r
resp_random_a[0],resp_random_a[1],resp_random_a[2],resp_random_a[3],\r
resp_random_a[4],resp_random_a[5],resp_random_a[6],resp_random_a[7]);\r
}\r
- return 0;\r
+ return 1;\r
}\r
\r
int mifare_ultra_readblock(uint8_t blockNo, uint8_t *blockData)\r
int len;\r
// load key, keynumber\r
uint8_t data[2]={0x0a, 0x00};\r
- uint8_t receivedAnswer[MAX_MIFARE_FRAME_SIZE];\r
- uint8_t receivedAnswerPar[MAX_MIFARE_PARITY_SIZE];\r
+ uint8_t receivedAnswer[MAX_FRAME_SIZE];\r
+ uint8_t receivedAnswerPar[MAX_PARITY_SIZE];\r
\r
len = mifare_sendcmd_special(NULL, 1, 0x02, data, receivedAnswer,receivedAnswerPar,NULL);\r
if (len == 1) {\r