Provided by: libnfc-examples_1.7.1-4build1_amd64 bug


       nfc-poll - poll first available NFC target




       nfc-poll is a utility for polling any available target (tags but also NFCIP targets) using
       ISO14443-A, FeliCa, Jewel and ISO14443-B modulations.

       This tool uses hardware polling feature  if  available  (ie.  PN532)  or  switch  back  to
       software polling, it will display available information retrieved from the tag.


       -v     Tells  nfc-poll  to  be  verbose and display detailed information about the targets
              shown.  This includes SAK decoding and fingerprinting is available.


       There are some well-know limits with this example:
        - Even with NDO_AUTO_14443_4A enabled (default), nfc-poll can miss ATS. That due  to  the
       way  the  PN532  use  to poll for ISO14443 type A, it will attempt to find ISO14443-4-only
       targets, then ISO14443-3. If your ISO14443-4  target  is  present  when  PN532  looks  for
       ISO14443-4-only,  ATS  will  be  retrieved.  But  if  your  target  enter the field during
       ISO14443-3, RATS will not be sent and ATS not retrieved.
        - nfc-poll can show up only one card while two are in field. That's due,  again,  to  the
       way  the PN532 poll for targets. It will stop polling when one modulation got a result, so
       if you have, for example, one ISO14443-3 (eg. Mifare Ultralight) and one  ISO14443-4  (eg.
       Mifare DESFire), it will probably return only the ISO14443-4.


       Please report any bugs on the libnfc issue tracker at:


       libnfc is licensed under the GNU Lesser General Public License (LGPL), version 3.
       libnfc-utils and libnfc-examples are covered by the the BSD 2-Clause license.


       Romuald Conty <>

       This  manual page was written by Romuald Conty <>.  It is licensed under
       the terms of the GNU GPL (version 2 or later).