From d332b2f993ccf58f6e54705a3647922665b6d61e Mon Sep 17 00:00:00 2001 From: Dobrica Pavlinusic Date: Tue, 1 Feb 2011 00:17:54 +0100 Subject: [PATCH] pad dumps to 4k for correct key loading --- nfc-card-dumper.pl | 10 ++++++++-- 1 file changed, 8 insertions(+), 2 deletions(-) diff --git a/nfc-card-dumper.pl b/nfc-card-dumper.pl index d6a8af3..143ac04 100755 --- a/nfc-card-dumper.pl +++ b/nfc-card-dumper.pl @@ -9,9 +9,10 @@ use Digest::MD5 qw(md5_hex); use Data::Dump qw(dump); +my $debug = $ENV{DEBUG} || 0; my $keyfile = shift @ARGV; -my $r = RFID::Libnfc::Reader->new(debug => 1); +my $r = RFID::Libnfc::Reader->new(debug => $debug); if ($r->init()) { printf ("Reader: %s\n", $r->name); my $tag = $r->connect(IM_ISO14443A_106); @@ -78,6 +79,11 @@ if ($r->init()) { warn "sector $i keys re-inserted at $o\n"; } + if ( my $padding = 4096 - length($card) ) { + warn "add $padding bytes up to 4k dump (needed for keys loading)\n"; + $card .= "\x00" x $padding; + } + my $md5 = md5_hex($card); if ( glob "cards/$uid.$md5.*" ) { warn "SKIPPING, same dump allready exits\n"; @@ -89,7 +95,7 @@ if ($r->init()) { symlink $out_file, "cards/$uid.key" || die "cards/$uid.key: $!"; warn "using keys as default for card $uid\n"; } - system "./mifare-mad.pl $out_file | vi -R -"; + $ENV{MAD} && system "./mifare-mad.pl $out_file | vi -R -"; } } -- 2.20.1