// PrintAndLog(" u : 4, 7 or 10 byte UID");
PrintAndLog(" u : 4, 7 byte UID");
PrintAndLog(" x : (Optional) performs the 'reader attack', nr/ar attack against a legitimate reader");
- PrintAndLog(" m : (Optional) Show maths used for cracking reader. Useful for debugging.");
+ PrintAndLog(" v : (Optional) show maths used for cracking reader. Useful for debugging.");
PrintAndLog("\n sample : hf 14a sim t 1 u 11223344 x");
PrintAndLog(" : hf 14a sim t 1 u 11223344");
PrintAndLog(" : hf 14a sim t 1 u 11223344556677");
case 'h':
case 'H':
return usage_hf_14a_sim();
- case 'm':
- case 'M':
- showMaths = true;
- cmdp++;
- break;
case 't':
case 'T':
// Retrieve the tag type
}
cmdp += 2;
break;
+ case 'v':
+ case 'V':
+ showMaths = true;
+ cmdp++;
+ break;
case 'x':
case 'X':
flags |= FLAG_NR_AR_ATTACK;
PrintAndLog(" i (Optional) Interactive, means that console will not be returned until simulation finishes or is aborted");\r
PrintAndLog(" x (Optional) Crack, performs the 'reader attack', nr/ar attack against a legitimate reader, fishes out the key(s)");\r
PrintAndLog(" e (Optional) Fill simulator keys from what we crack");\r
- PrintAndLog(" m (Optional) Show maths used for cracking reader. Useful for debugging.");\r
+ PrintAndLog(" v (Optional) Show maths used for cracking reader. Useful for debugging.");\r
PrintAndLog("samples:");\r
PrintAndLog(" hf mf sim u 0a0a0a0a");\r
PrintAndLog(" hf mf sim u 11223344556677");\r
flags |= FLAG_INTERACTIVE;\r
cmdp++;\r
break;\r
- case 'm':\r
- case 'M':\r
- showMaths = true;\r
- cmdp++;\r
- break;\r
case 'n':\r
case 'N':\r
exitAfterNReads = param_get8(Cmd, cmdp+1);\r
}\r
cmdp +=2;\r
break;\r
+ case 'v':\r
+ case 'V':\r
+ showMaths = true;\r
+ cmdp++;\r
+ break;\r
case 'x':\r
case 'X':\r
flags |= FLAG_NR_AR_ATTACK;\r