ANNOUNCEMENT: Live Wireshark University & Allegro Packets online APAC Wireshark Training Session
July 17th, 2024 | 10:00am-11:55am SGT (UTC+8) | Online

Wireshark-bugs: [Wireshark-bugs] [Bug 9119] NFC: PN532 implement half of specification

Date: Wed, 11 Sep 2013 13:50:45 +0000

Comment # 14 on bug 9119 from
It seems to be related to the heuristics used when matching on the 28 bytes
payload generated by my VISA card (4 byte UID, 2 byte ATQA, 1 byte SAK, 15 byte
ATS - with the usual padding/length counter bytes in between)

In that case nfc-list reports:

1 ISO14443A passive target(s) found:
ISO/IEC 14443A (106 kbps) target:
    ATQA (SENS_RES): 00  04  
       UID (NFCID1): ee  4a  ab  bb  
      SAK (SEL_RES): 20  
                ATS: 78  80  70  02  00  31  c0  64  1f  27  01  00  00  90  00

I'd have to look at an older trace file, but I think that it could be just a
fluke - since upon initial inspection, the data seems OK.


You are receiving this mail because:
  • You are watching all bug changes.