You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Bug: The same key (a0a1a2a3a4a5) is always recovered. This is because the phone performs an authentication attempt before sending the RATS and extraction commands. The card thus captures the authentication attempt and overwrites the first captures.
Trace from a scan, where the KeyExtractor app is already opened:
The source of this authentication attempt is unknown, but could be a part of the identification procedure of android. A broader intent filter may capture the card before such scanning is done.
The text was updated successfully, but these errors were encountered:
Key a0a1a2a3a4a5 is the mifare application directory key. After looking through android sources, this authentication is probably part of the card identification procedure, to resolve which tech the card supports.
It would probably require changes to the android source, starting point could be external/libnfc-nxp/src/phFriNfc_MifareStdMap.c
./external/libnfc-nxp/src/phFriNfc_MifareStdMap.c
...
authentication happens in phFriNfc_MifStd_H_AuthSector()
called by phFriNfc_MifStd_H_RemainTLV()
called by phFriNfc_MifareStdMap_Process()
referenced in phFriNfc_NdefMap.c / phFriNfc_NdefMap_Process
This is a callback, set e.g. by
NdefMap->MapCompletionInfo.CompletionRoutine = phFriNfc_NdefMap_Process;
Called by ./external/libnfc-nxp/src/phFriNfc_OvrHal.c
phFriNfc_OvrHal_CB_Send()
via phFriNfc_OvrHal_Send()
From ./external/libnfc-nxp/src/phFriNfc_LlcpMacNfcip.c
Bug: The same key (a0a1a2a3a4a5) is always recovered. This is because the phone performs an authentication attempt before sending the RATS and extraction commands. The card thus captures the authentication attempt and overwrites the first captures.
Trace from a scan, where the KeyExtractor app is already opened:
The source of this authentication attempt is unknown, but could be a part of the identification procedure of android. A broader intent filter may capture the card before such scanning is done.
The text was updated successfully, but these errors were encountered: