Warning: file_get_contents(/data/phpspider/zhask/data//catemap/3/android/215.json): failed to open stream: No such file or directory in /data/phpspider/zhask/libs/function.php on line 167

Warning: Invalid argument supplied for foreach() in /data/phpspider/zhask/libs/tag.function.php on line 1116

Notice: Undefined index: in /data/phpspider/zhask/libs/function.php on line 180

Warning: array_chunk() expects parameter 1 to be array, null given in /data/phpspider/zhask/libs/function.php on line 181
Android 收发器(字节[]数据)抛出标记性异常_Android_Authentication_Exception_Nfc_Mifare - Fatal编程技术网

Android 收发器(字节[]数据)抛出标记性异常

Android 收发器(字节[]数据)抛出标记性异常,android,authentication,exception,nfc,mifare,Android,Authentication,Exception,Nfc,Mifare,一切都开始了。那边的问题解决了,现在我面临着使用收发方法的问题 我的代码如下所示: private void writeAndProtectTag(final Intent intent, final String message) { // Run the entire process in its own thread as NfcA.transceive(byte[] data); // Should not be run in main thread according

一切都开始了。那边的问题解决了,现在我面临着使用收发方法的问题

我的代码如下所示:

private void writeAndProtectTag(final Intent intent, final String message) {
    // Run the entire process in its own thread as NfcA.transceive(byte[] data);
    // Should not be run in main thread according to <https://developer.android.com/reference/android/nfc/tech/NfcA.html#transceive(byte[])>
    (new Thread(new Runnable() {
        // Password has to be 4 characters
        // Password Acknowledge has to be 2 characters
        byte[] pwd      = "-_bA".getBytes();
        byte[] pack     = "cC".getBytes();

        @Override
        public void run() {
            // Store tag object for use in NfcA and Ndef
            Tag tag = intent.getParcelableExtra(NfcAdapter.EXTRA_TAG);
            // Using NfcA instead of MifareUltralight should make no difference in this method
            NfcA nfca = null;

            // Whole process is put into a big try-catch trying to catch the transceive's IOException
            try {
                nfca = NfcA.get(tag);

                nfca.connect();

                byte[] response;

                // Authenticate with the tag first
                // In case it's already been locked
                try {
                    response = nfca.transceive(new byte[]{
                            (byte) 0x1B, // PWD_AUTH
                            pwd[0], pwd[1], pwd[2], pwd[3]
                    });

                    // Check if PACK is matching expected PACK
                    // This is a (not that) secure method to check if tag is genuine
                    if ((response != null) && (response.length >= 2)) {
                        byte[] packResponse = Arrays.copyOf(response, 2);
                        if (!(pack[0] == packResponse[0] && pack[1] == packResponse[1])) {
                            Toast.makeText(ctx, "Tag could not be authenticated:\n" + packResponse.toString() + "≠" + pack.toString(), Toast.LENGTH_LONG).show();
                        }
                    }
                }catch(TagLostException e){
                    e.printStackTrace();
                }

                // Get Page 2Ah
                response = nfca.transceive(new byte[] {
                        (byte) 0x30, // READ
                        (byte) 0x2A  // page address
                });
                // configure tag as write-protected with unlimited authentication tries
                if ((response != null) && (response.length >= 16)) {    // read always returns 4 pages
                    boolean prot = false;                               // false = PWD_AUTH for write only, true = PWD_AUTH for read and write
                    int authlim = 0;                                    // 0 = unlimited tries
                    nfca.transceive(new byte[] {
                            (byte) 0xA2, // WRITE
                            (byte) 0x2A, // page address
                            (byte) ((response[0] & 0x078) | (prot ? 0x080 : 0x000) | (authlim & 0x007)),    // set ACCESS byte according to our settings
                            0, 0, 0                                                                         // fill rest as zeros as stated in datasheet (RFUI must be set as 0b)
                    });
                }
                // Get page 29h
                response = nfca.transceive(new byte[] {
                        (byte) 0x30, // READ
                        (byte) 0x29  // page address
                });
                // Configure tag to protect entire storage (page 0 and above)
                if ((response != null) && (response.length >= 16)) {  // read always returns 4 pages
                    int auth0 = 0;                                    // first page to be protected
                    nfca.transceive(new byte[] {
                            (byte) 0xA2, // WRITE
                            (byte) 0x29, // page address
                            response[0], 0, response[2],              // Keep old mirror values and write 0 in RFUI byte as stated in datasheet
                            (byte) (auth0 & 0x0ff)
                    });
                }

                // Send PACK and PWD
                // set PACK:
                nfca.transceive(new byte[] {
                        (byte)0xA2,
                        (byte)0x2C,
                        pack[0], pack[1], 0, 0  // Write PACK into first 2 Bytes and 0 in RFUI bytes
                });
                // set PWD:
                nfca.transceive(new byte[] {
                        (byte)0xA2,
                        (byte)0x2B,
                        pwd[0], pwd[1], pwd[2], pwd[3] // Write all 4 PWD bytes into Page 43
                });

                // Generate NdefMessage to be written onto the tag
                NdefMessage msg = null;
                try {
                    NdefRecord r1 = NdefRecord.createMime("text/plain", message.getBytes("UTF-8"));
                    NdefRecord r2 = NdefRecord.createApplicationRecord("com.example.alex.nfcapppcekunde");
                    msg = new NdefMessage(r1, r2);
                } catch (UnsupportedEncodingException e) {
                    e.printStackTrace();
                }

                byte[] ndefMessage = msg.toByteArray();

                nfca.transceive(new byte[] {
                        (byte)0xA2, // WRITE
                        (byte)3,    // block address
                        (byte)0xE1, (byte)0x10, (byte)0x12, (byte)0x00
                });

                // wrap into TLV structure
                byte[] tlvEncodedData = null;

                tlvEncodedData = new byte[ndefMessage.length + 3];
                tlvEncodedData[0] = (byte)0x03;  // NDEF TLV tag
                tlvEncodedData[1] = (byte)(ndefMessage.length & 0x0FF);  // NDEF TLV length (1 byte)
                System.arraycopy(ndefMessage, 0, tlvEncodedData, 2, ndefMessage.length);
                tlvEncodedData[2 + ndefMessage.length] = (byte)0xFE;  // Terminator TLV tag

                // fill up with zeros to block boundary:
                tlvEncodedData = Arrays.copyOf(tlvEncodedData, (tlvEncodedData.length / 4 + 1) * 4);
                for (int i = 0; i < tlvEncodedData.length; i += 4) {
                    byte[] command = new byte[] {
                            (byte)0xA2, // WRITE
                            (byte)((4 + i / 4) & 0x0FF), // block address
                            0, 0, 0, 0
                    };
                    System.arraycopy(tlvEncodedData, i, command, 2, 4);
                    try {
                        response = nfca.transceive(command);
                    } catch (IOException e) {
                        e.printStackTrace();
                    }
                }
                runOnUiThread(new Runnable() {
                    @Override
                    public void run() {
                        //UI related things, not important for NFC
                        btn.setImageResource(R.drawable.arrow_red);
                        tv.setText("");
                    }
                });
                curAction = "handle";

                try {
                    nfca.close();
                } catch (IOException e) {
                    e.printStackTrace();
                }

            } catch (IOException e) {
                //Trying to catch any ioexception that may be thrown
                e.printStackTrace();
            } catch (Exception e) {
                //Trying to catch any exception that may be thrown
                e.printStackTrace();
            }

        }
    })).start();
}
已解决:

当尝试使用没有保护的标记进行身份验证时,通信只是崩溃,而不是抛出适当的异常来捕获,因为我没有捕获异常,所以应用程序继续尝试收发数据,但标记“丢失”,正如现在调用的异常告诉我的那样

要知道标记是否已受保护,请检查Auth0以获取设置保护:

byte[] response;

//Read page 41 on NTAG213, will be different for other tags
response = mifare.transceive(new byte[] {
        (byte) 0x30, // READ
        41           // page address
});
// Authenticate with the tag first
// only if the Auth0 byte is not 0xFF,
// which is the default value meaning unprotected
if(response[3] != (byte)0xFF) {
    try {
        response = mifare.transceive(new byte[]{
                (byte) 0x1B, // PWD_AUTH
                pwd[0], pwd[1], pwd[2], pwd[3]
        });
        // Check if PACK is matching expected PACK
        // This is a (not that) secure method to check if tag is genuine
        if ((response != null) && (response.length >= 2)) {
            final byte[] packResponse = Arrays.copyOf(response, 2);
            if (!(pack[0] == packResponse[0] && pack[1] == packResponse[1])) {runOnUiThread(new Runnable() {
                @Override
                public void run() {
                    Toast.makeText(ctx, "Tag could not be authenticated:\n" + packResponse.toString() + "≠" + pack.toString(), Toast.LENGTH_LONG).show();
                }
            });
            }else{
                runOnUiThread(new Runnable() {
                    @Override
                    public void run() {
                        Toast.makeText(ctx, "Tag successfully authenticated!", Toast.LENGTH_SHORT).show();
                    }
                });
            }
        }
    } catch (TagLostException e) {
        e.printStackTrace();
    }
}else{
    // Protect tag with your password in case
    // it's not protected yet

    // Get Page 2Ah
    response = mifare.transceive(new byte[] {
            (byte) 0x30, // READ
            (byte) 0x2A  // page address
    });
    // configure tag as write-protected with unlimited authentication tries
    if ((response != null) && (response.length >= 16)) {    // read always returns 4 pages
        boolean prot = false;                               // false = PWD_AUTH for write only, true = PWD_AUTH for read and write
        int authlim = 0;                                    // 0 = unlimited tries
        mifare.transceive(new byte[] {
                (byte) 0xA2, // WRITE
                (byte) 0x2A, // page address
                (byte) ((response[0] & 0x078) | (prot ? 0x080 : 0x000) | (authlim & 0x007)),    // set ACCESS byte according to our settings
                0, 0, 0                                                                         // fill rest as zeros as stated in datasheet (RFUI must be set as 0b)
        });
    }
    // Get page 29h
    response = mifare.transceive(new byte[] {
            (byte) 0x30, // READ
            (byte) 0x29  // page address
    });
    // Configure tag to protect entire storage (page 0 and above)
    if ((response != null) && (response.length >= 16)) {  // read always returns 4 pages
        int auth0 = 0;                                    // first page to be protected
        mifare.transceive(new byte[] {
                (byte) 0xA2, // WRITE
                (byte) 0x29, // page address
                response[0], 0, response[2],              // Keep old mirror values and write 0 in RFUI byte as stated in datasheet
                (byte) (auth0 & 0x0ff)
        });
    }

    // Send PACK and PWD
    // set PACK:
    mifare.transceive(new byte[] {
            (byte)0xA2,
            (byte)0x2C,
            pack[0], pack[1], 0, 0  // Write PACK into first 2 Bytes and 0 in RFUI bytes
    });
    // set PWD:
    mifare.transceive(new byte[] {
            (byte)0xA2,
            (byte)0x2B,
            pwd[0], pwd[1], pwd[2], pwd[3] // Write all 4 PWD bytes into Page 43
    });
}

您尝试在读取任何数据之前对标记进行身份验证。根据您使用的特定Android设备,如果身份验证失败,您将收到NACK响应或
IOException
(通常,但不总是(?),一个
TagLostException
)。在这两种情况下,您当前都忽略了此错误(您删除了异常,并且只处理成功的结果(
(response!=null)&&(response.length>=2)
)。因此,当身份验证失败时,您的标记处于(并保持)错误状态

因此,您需要正确处理这些错误情况。通常,您希望在每次出现错误(NACK响应、
null
response和
IOException
)时关闭并重新打开连接。您可以在代码中轻松实现这一点:

nfca.connect();

byte[] response;
boolean authError = true;

// Authenticate with the tag first
try {
    response = nfca.transceive(new byte[]{
            (byte) 0x1B, // PWD_AUTH
            pwd[0], pwd[1], pwd[2], pwd[3]
    });

    // Check if PACK is matching expected PACK
    if ((response != null) && (response.length >= 2)) {
        authError = false;

        [...]
    }
} catch (IOException e) {
    e.printStackTrace();
}

if (authError) {
    try {
        nfca.close();
    } catch (Exception ignored) {}
    nfca.connect();
}

// Get Page 2Ah
response = nfca.transceive(new byte[] {
        (byte) 0x30, // READ
        (byte) 0x2A  // page address
});

[...]

我尝试过这个代码,但在设置密码后无法工作。
nfca.connect();

byte[] response;
boolean authError = true;

// Authenticate with the tag first
try {
    response = nfca.transceive(new byte[]{
            (byte) 0x1B, // PWD_AUTH
            pwd[0], pwd[1], pwd[2], pwd[3]
    });

    // Check if PACK is matching expected PACK
    if ((response != null) && (response.length >= 2)) {
        authError = false;

        [...]
    }
} catch (IOException e) {
    e.printStackTrace();
}

if (authError) {
    try {
        nfca.close();
    } catch (Exception ignored) {}
    nfca.connect();
}

// Get Page 2Ah
response = nfca.transceive(new byte[] {
        (byte) 0x30, // READ
        (byte) 0x2A  // page address
});

[...]