-
-
Notifications
You must be signed in to change notification settings - Fork 1.2k
[hf seos] Carry when incrementing #3043
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
|
You are welcome to add an entry to the CHANGELOG.md as well |
|
Maybe make it a u16 reference and increase instead of this logic |
This wouldn't fully solve it, as then if the last 2 bytes are 0xFFFF it would still have the same issue it does now. It would need to be at least a u128 to be able to handle AES-128 properly (since the passed array of bytes is a full block size of the selected algoithm). |
|
highly unlikely scenario for the device to send the full u128 integer space. Make it a u32 ref and I promise you the command iteration never will go above it. You will most likely burnt out your proxmark device before. |
Will do. As it stands, the Proxmark always uses a RND.IFD value of all 0x00s so this issue won't ever appear under normal use, but it did appear while testing with custom provided values. |
|
We love using bad random numbers. |
|
Just tried to make it a |
|
in |
|
Excellent! |
Currently we only increment the last byte of the input, even if it overflows from 0xFF back to 0x00. I tested this behavior against a real Seos card by setting the RND.IFD to all-0xFFs and the card failed to read. After adding this patch and testing again, the card was successfully read.