mirror of
https://github.com/RfidResearchGroup/proxmark3.git
synced 2025-08-01 20:34:24 -07:00
make style
This commit is contained in:
parent
0f83301825
commit
a0e110941a
5 changed files with 35 additions and 35 deletions
|
@ -56,7 +56,7 @@ void Vector(void) {
|
|||
char *src = &__data_src_start__;
|
||||
char *dst = &__data_start__;
|
||||
char *end = &__data_end__;
|
||||
while(dst < end) *dst++ = *src++;
|
||||
while (dst < end) *dst++ = *src++;
|
||||
dst = &__bss_start__;
|
||||
end = &__bss_end__;
|
||||
#else
|
||||
|
|
|
@ -675,10 +675,10 @@ int ul_print_type(uint32_t tagtype, uint8_t spaces) {
|
|||
if (ismagic)
|
||||
snprintf(typestr + strlen(typestr), 4, " (");
|
||||
|
||||
snprintf(typestr + strlen(typestr) , sizeof(typestr) - strlen(typestr), " %s ", (tagtype & MAGIC) ? _GREEN_("magic") : "");
|
||||
snprintf(typestr + strlen(typestr), sizeof(typestr) - strlen(typestr), " %s ", (tagtype & MAGIC) ? _GREEN_("magic") : "");
|
||||
tagtype ^= MAGIC;
|
||||
snprintf(typestr + strlen(typestr) , sizeof(typestr) - strlen(typestr), "%s", (tagtype & MAGIC_1A) ? _GREEN_("Gen 1a") : "");
|
||||
snprintf(typestr + strlen(typestr) , sizeof(typestr) - strlen(typestr), "%s", (tagtype & MAGIC_1B) ? _GREEN_("Gen 1b") : "");
|
||||
snprintf(typestr + strlen(typestr), sizeof(typestr) - strlen(typestr), "%s", (tagtype & MAGIC_1A) ? _GREEN_("Gen 1a") : "");
|
||||
snprintf(typestr + strlen(typestr), sizeof(typestr) - strlen(typestr), "%s", (tagtype & MAGIC_1B) ? _GREEN_("Gen 1b") : "");
|
||||
|
||||
if (ismagic)
|
||||
snprintf(typestr + strlen(typestr), 4, " )");
|
||||
|
@ -938,7 +938,7 @@ static int ulev1_print_signature(TagTypeUL_t tagtype, uint8_t *uid, uint8_t *sig
|
|||
PrintAndLogEx(INFO, "IC signature public key value: %s", nxp_mfu_public_keys[i].value);
|
||||
PrintAndLogEx(INFO, " Elliptic curve parameters: NID_secp128r1");
|
||||
PrintAndLogEx(INFO, " TAG IC Signature: %s", sprint_hex_inrow(signature, signature_len));
|
||||
PrintAndLogEx(SUCCESS, " Signature verification (" _GREEN_("successful") ")" );
|
||||
PrintAndLogEx(SUCCESS, " Signature verification (" _GREEN_("successful") ")");
|
||||
return PM3_SUCCESS;
|
||||
}
|
||||
|
||||
|
@ -1540,7 +1540,7 @@ static int CmdHF14AMfUWrBl(const char *Cmd) {
|
|||
has_auth_key = true;
|
||||
} else if (ak_len == 4) {
|
||||
has_pwd = true;
|
||||
} else if (ak_len != 0){
|
||||
} else if (ak_len != 0) {
|
||||
PrintAndLogEx(WARNING, "ERROR: Key is incorrect length\n");
|
||||
return PM3_EINVARG;
|
||||
}
|
||||
|
@ -1664,7 +1664,7 @@ static int CmdHF14AMfURdBl(const char *Cmd) {
|
|||
has_auth_key = true;
|
||||
} else if (ak_len == 4) {
|
||||
has_pwd = true;
|
||||
} else if (ak_len != 0){
|
||||
} else if (ak_len != 0) {
|
||||
PrintAndLogEx(WARNING, "ERROR: Key is incorrect length\n");
|
||||
return PM3_EINVARG;
|
||||
}
|
||||
|
@ -1932,13 +1932,13 @@ static int CmdHF14AMfUDump(const char *Cmd) {
|
|||
has_auth_key = true;
|
||||
} else if (ak_len == 4) {
|
||||
has_pwd = true;
|
||||
} else if (ak_len != 0){
|
||||
} else if (ak_len != 0) {
|
||||
PrintAndLogEx(WARNING, "ERROR: Key is incorrect length\n");
|
||||
return PM3_EINVARG;
|
||||
}
|
||||
|
||||
bool manual_pages = false;
|
||||
if ( start_page > 0)
|
||||
if (start_page > 0)
|
||||
manual_pages = true;
|
||||
|
||||
if (pages != 16)
|
||||
|
|
|
@ -198,8 +198,8 @@ Check column "offline" for their availability.
|
|||
|command |offline |description
|
||||
|------- |------- |-----------
|
||||
|`hf epa help `|Y |`This help`
|
||||
|`hf epa cnonces `|N |`<m> <n> <d> Acquire n>0 encrypted PACE nonces of size m>0 with d sec pauses`
|
||||
|`hf epa preplay `|N |`<mse> <get> <map> <pka> <ma> Perform PACE protocol by replaying given APDUs`
|
||||
|`hf epa cnonces `|N |`Acquire encrypted PACE nonces of specific size`
|
||||
|`hf epa preplay `|N |`Perform PACE protocol by replaying given APDUs`
|
||||
|
||||
|
||||
### hf emrtd
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue