Comment # 14
on bug 9119
from Tyson Key
It seems to be related to the heuristics used when matching on the 28 bytes
payload generated by my VISA card (4 byte UID, 2 byte ATQA, 1 byte SAK, 15 byte
ATS - with the usual padding/length counter bytes in between)
In that case nfc-list reports:
1 ISO14443A passive target(s) found:
ISO/IEC 14443A (106 kbps) target:
ATQA (SENS_RES): 00 04
UID (NFCID1): ee 4a ab bb
SAK (SEL_RES): 20
ATS: 78 80 70 02 00 31 c0 64 1f 27 01 00 00 90 00
I'd have to look at an older trace file, but I think that it could be just a
fluke - since upon initial inspection, the data seems OK.
You are receiving this mail because:
- You are watching all bug changes.