+
+bool DecodeMifareData(uint8_t *cmd, uint8_t cmdsize, bool isResponse, uint8_t *mfData, size_t *mfDataLen) {
+ *mfDataLen = 0;
+
+ if (cmdsize > 32)
+ return false;
+
+ if (MifareAuthState == masFirstData) {
+ if (AuthData.first_auth) {
+ uint32_t ks2 = AuthData.ar_enc ^ prng_successor(AuthData.nt, 64);
+ uint32_t ks3 = AuthData.at_enc ^ prng_successor(AuthData.nt, 96);
+ struct Crypto1State *revstate = lfsr_recovery64(ks2, ks3);
+ lfsr_rollback_word(revstate, 0, 0);
+ lfsr_rollback_word(revstate, 0, 0);
+ lfsr_rollback_word(revstate, AuthData.nr_enc, 1);
+ lfsr_rollback_word(revstate, AuthData.uid ^ AuthData.nt, 0);
+
+ uint64_t lfsr = 0;
+ crypto1_get_lfsr(revstate, &lfsr);
+ crypto1_destroy(revstate);
+// LastKey = lfsr;
+ PrintAndLog(" | * | key | probable key:%x%x Prng:%s ks2:%08x ks3:%08x | |",
+ (unsigned int)((lfsr & 0xFFFFFFFF00000000) >> 32), (unsigned int)(lfsr & 0xFFFFFFFF),
+ validate_prng_nonce(AuthData.nt) ? "WEAK": "HARD",
+ ks2,
+ ks3);
+
+ AuthData.first_auth = false;
+ } else {
+ printf("uid:%x nt:%x ar_enc:%x at_enc:%x\n", AuthData.uid, AuthData.nt, AuthData.ar_enc, AuthData.at_enc);
+ }
+
+
+
+ MifareAuthState = masData;
+ return true;
+ }
+
+ if (MifareAuthState == masData) {
+ }
+
+ return *mfDataLen > 0;
+}
+