[android-developers] Re: NFC Secure Element

2016-06-08 Thread Максим Зайцев
Hi, Fernando!

Recently I started working with Nexus S concerning Mifare Card Emulation. I 
was searching for manual to do this, but haven't found anything.

I would like to know, if you have detailed instructions on how to emulate 
Mifare Classic 1K/4K cards. Thanks in advance.  

вторник, 19 июля 2011 г., 14:48:39 UTC+4 пользователь Fernando Miguélez 
Palomo написал:
>
> I got it working on 2.3.4_r1!!!
>
> The key was enabling discoverability but in card emulation mode. The 
> strange thing is now I can detect two smart card types with an Arcontia 
> smart card reader:
>
>- ISO14443A tag CL1 tag (This is the Mifare 4K)
>- FELICA RCS-885 424kbs tag (I suppose this is really the Javacard, 
>not a Felica card)
>
> I managed to write and read a block (4) to the Mifare 4K with default 
> keys. Next thing will be investigating wheter 2.3.4 adds support by means 
> of nxp-nfc library to directly send APDUs to the SE. You and Michael Roland 
> already confirmed it was not possible with prior gingerbread versions.
>
> I post the corrected patch to get card emulation on 2.3.4_r1.
>
> One thing. Card stops being readable from an external reader after screen 
> goes off and back on. However if you disable NFC and re-enable it (from 
> settings) card is discoverable again.
>
> Thanks nemik for your work (you can update your patches with these 
> corretions to work with gingerbread 2.3.4_r1 at your site if you want).
>
>
>

-- 
You received this message because you are subscribed to the Google Groups 
"Android Developers" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to android-developers+unsubscr...@googlegroups.com.
To post to this group, send email to android-developers@googlegroups.com.
Visit this group at https://groups.google.com/group/android-developers.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/android-developers/6e89631a-b25e-48d9-aef8-445f791f54e5%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [android-developers] Re: NFC Secure Element

2013-02-20 Thread Factionwars
Might take a look at this 
url: 
http://intrepidusgroup.com/insight/2011/09/a-brave-new-wallet-first-look-at-decompiling-google-wallet/
 
He notices a debug menu in a old version of google wallet.

On Friday, April 6, 2012 4:16:12 PM UTC+2, Nikolay Elenkov wrote:

 On Fri, Apr 6, 2012 at 10:06 PM, xanium4332 xaniu...@gmail.comjavascript: 
 wrote:
 

  I've recently read through a lot of information regarding the 
 implementation
  of NFC, Google Wallet, card emulation etc.. on the Galaxy S

 Nice write up, you should put it in a blog post somewhere. Sounds about
 right, but can't really commend on the finer points. Maybe someone else 
 will.
 You might also get better info/response on XDA. This list is not exactly
 dedicated to analyzing third party apps and/or hardware.

 
  Now for things I'm not sure about:
 
  Does Google Wallet make use of native APIs or Java APIs to communicate to
  the secure element. I.e., is it talking to the NXP NFC stack directly, or
  through some Android-like API?

 AFAIK, it uses only Java code. You can send APDU via the Java APIs,
 so that's basically all you need.

 
  People who are receiving the 'secure element not responding' error are
  presumably failing to authenticate with the Google Wallet javacard app 
 which
  has been installed. However, people seem to be mentioning that this error
  means the SE is 'bricked', which I would interpret as the lockout from 
 the
  GlobalPlatform app due to 10 failed auths. Anybody know exactly what is
  going on here?

 You can't say for sure until you see the response APDU. IIRC, if you lock
 the card you will get 'Security condition not satisfied', SW= 0x6982.
 If seen this a few times :)

 
  I think I read somewhere that the google wallet javacard app is only
  installed onto the SE after successful setup of the Google Wallet app. 
 I.e.
  it is not factory installed.

 This appears to be correct.

  If so, how does secure communication occur with
  the GlobalPlatform app. Does Google Wallet perform this (I guess not, as 
 we
  could find the keys from the APK). How do the GlobalPlatform keys get
  securely transmitted to the SE? With SIM cards I think binary SMSs are 
 used
  to OTA chat with the radio interface, but obviously that can't happen 
 here.
 

 You don't really need to transmit the actual keys to the card, you only 
 need to
 compute the correct session key based on the card manager key. Maybe they
 are in the APK (unlikely), or processing is offloaded to a server. You 
 might
 want to look yourself :)



-- 
-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en
--- 
You received this message because you are subscribed to the Google Groups 
Android Developers group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to android-developers+unsubscr...@googlegroups.com.
For more options, visit https://groups.google.com/groups/opt_out.




[android-developers] Re: NFC Secure Element

2012-08-06 Thread ThyMythos
Am Mittwoch, 11. April 2012 09:05:34 UTC+2 schrieb Alexander Sytnik:
 Great work!
 It helped me very much. My current goal - to download into the Secure Element 
 a
 cardlet, which can securely manage MIFARE part and communicate with our own 
 TSM
 through an additional application in a phone. But this possibility, that can 
 be
 used even in old Nokia 3220 with NFC cover, seems to be blocked in new 
 Android platforms.
 
 
 Additional
 information (how I understand it):
 
 
 - 
 Google
 wallet is Mastercard PayPass payment application;
 
 
 - 
 Document
 that defines the requirements for UICCs intended to host a payment system’s
 mobile payment application within mobile consumer device are called 
 “EMVProfiles of Global Platform UICC Configuration”. It can be free 
 downloaded. It can be useful for understanding
 architecture of infrastructure that used by Google to download and manage 
 Google
 Wallet. Also there is second interesting document “EMV Contactless Mobile
 Payment - Application Activation User Interface”.
 
 
 - 
 The
 document with may describe a target state of secure element it the phone (how 
 I
 think) is Global Platform UICC Configuration v1.0.1. But it cost about 1.5K 
 and it is
 silly to download the document that can’t help you download your applet in NFC
 phone.
 
 
 Resume: Joe
 doesn’t share food! Google wants to use single-handedly new business 
 possibilities
 which are given to us by new technologies. Nick Pelly: “So we did not put card
 emulation APIs in Gingerbread because we want to make sure that we have a
 compelling user story before we do that. And we really think that peer-to-peer
 is the way to go for future NFC uses.”, “There are a bunch of
 different reasons. Again, the secure element is a very limited resource. It
 can't hold a large amount of data in there. And if we open it up to any
 third-party application, there's going to be a huge resource contention over
 the secure element.”.
 
 
 P.S.: Please correct me if I'm wrong.
 P.P.S.: Sorry
 for my English.

Latest official update on that:
http://www.youtube.com/watch?v=HkzPc8ZvCco#t=3490s

-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en


[android-developers] Re: NFC Secure Element

2012-06-30 Thread Cristina Jerez
Hi! 

So is possible that the phone ( I have Galaxy S III) acts like a Mifare 
card and with him I can comunicat with the infraestructure of NFC of one 
office to use the phone to open dors ?

I'm trying to develop this applicacion for the University but I'm not sure 
that the comunicacion with this element could be correctly.

Can you help me?


El martes, 7 de diciembre de 2010 12:42:29 UTC+1, Dominik escribió:

 Hi everyone,

 Do I see it right, that the Android 2.3 NFC API does not provide 
 functionality to access a secure element? A secure element is a smartcard 
 connected to the NFC controller, i.e. a secure storage in the device, 
 either embedded in the mobile phone, on the SIM card or on a SD card.

 With JavaME access to the secure element was provided with JSR177 which 
 supported the communication with smart card applications usind APDU 
 commands. I have not seen comparable functionality in package android.nfc.

 Thanks for any hints
 Dominik



-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en

[android-developers] Re: NFC Secure Element

2012-04-12 Thread Alexander Sytnik


Great work! It helped me very much. My current goal - to download into the 
Secure Element a cardlet, which can securely manage MIFARE part and 
communicate with our own TSM through an additional application in a phone. 
But this possibility, that can be used even in old Nokia 3220 with NFC 
cover, seems to be blocked in new Android platforms.

Additional information (how I understand it):

-  Google wallet is Mastercard PayPass payment application;

-  Document that defines the requirements for UICCs intended to 
host a payment system’s mobile payment application within mobile consumer 
device are called “EMVProfiles of Global Platform UICC 
Configurationhttp://www.emvco.com/specifications.aspx?id=22”. 
It can be free downloaded. It can be useful for understanding architecture 
of infrastructure that used by Google to download and manage Google Wallet. 
Also there is second interesting document “EMV Contactless Mobile Payment - 
Application Activation User Interface”.

-  The document with may describe a target state of secure element 
it the phone (how I think) is Global Platform UICC Configuration 
v1.0.1http://www.globalplatform.org/specificationscard.asp. 
But it cost about 1.5K and it is silly to download the document that can’t 
help you download your applet in NFC phone.

Resume: Joe doesn’t share food! Google wants to use single-handedly new 
business possibilities which are given to us by new technologies. Nick 
Pelly: “*So we did not put card emulation APIs in Gingerbread because we 
want to make sure that we have a compelling user story before we do that. 
And we really think that peer-to-peer is the way to go for future NFC uses.*”, 
“*There are a bunch of different reasons. Again, the secure element is a 
very limited resource. It can't hold a large amount of data in there. And 
if we open it up to any third-party application, there's going to be a huge 
resource contention over the secure element.*”.

P.S.: Please correct me if I'm wrong.

P.P.S.: Sorry for my English.

-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en

[android-developers] Re: NFC Secure Element

2012-04-06 Thread xanium4332


Hi everyone,

Firstly I'm extremely sorry for hijacking this thread, but this appears to 
be where all the activity regarding NFC on Android is occuring, and so 
should reach the relevant audience.

I've recently read through a lot of information regarding the 
implementation of NFC, Google Wallet, card emulation etc.. on the Galaxy S. 
I've tried to document all that I have learned below. It would be extremely 
helpful if people could read this, pull it apart, point out bits that are 
wrong etc.. Hopefully this can help other people who are trying to learn 
about the implementation, saving them some time. I've not discussed 
absolute specifics about protocols and whatever, but if I've mixed up terms 
(such as incorrectly mentioning the use of ADPUs), please correct them as 
well :)

This documentation should hopefully prevent some repeated questions also...



Within the Nexus S is contained an NXP PN65N nfc ic, which is similar to a 
PN544, but with an internally connected SmartMX 'secure element'.

The secure element (SE) is 'logically connected' to the PN544 via an NFC-WI 
interface. All of this is contained within the PN65N.

The SE runs a JavaCard operating system. One Java application included on 
the SE is an implementation of the GlobalPlatform specs. Through 
communication to and from this app (using the correct keys), other javacard 
apps can be installed. (such as a Google wallet app).

The SE is also configured to emulate a Mifare classic 4K card. Currently, 
the default keys allow read/write access to this emulated 'card'.

The PN544 has 3 modes of operation. Reader/Writer mode, peer-to-peer mode, 
and card emulation mode. In card emulation mode, there two different 
'sub-modes' of operation:

1. The PN544 acts as a dumb 'frontend' to the secure element. This allows 
contactless communication directly with the secure element using external 
reader/writers. At this point, the entire system is functionaly identical 
to a wireless JavaCard, which is capable of both emulating a normal Mifare 
4K card, (ISO14443-3) and allowing access to javacard apps (using ADPUs) 
(ISO 14443-4).

2. The PN544 acts as a reader/writer, with the secure element appearing as 
an attached wireless card. This presents a similar situation as 1), but in 
reverse (the host can now communicate with the secure element, pretending 
it is a contactless javacard).

The PN544 supports using 'emulation mode' with either a secure element 
(using the NFC-WI protocol), or a UICC (a.k.a SIM card), using an SWP bus. 
However, when using a UICC, sub-mode 2) is unavailable. Therefore, a host 
can only communicate (via the PN544) to the secure element. The word 
'communication', in this context, means the ability to pass ADPUs 
back/forth from the host to the 'emulated' card (either SE or UICC).

Typically this is not a problem, as the host can normally communicate (pass 
ADPUs) directly to the UICC via other channels. In Android, however, the 
RIL does not currently provide direct access to the SIM card, so ADPU 
exchange with the SIM card is not currently possible.

Android currently contains official APIs to make use of the reader/writer 
and peer-to-peer modes of the PN544. The official NXP host stack also 
contains code to use the 'card emulation' mode also. The code used to be 
commented out, but later versions of Android have the code present. No 
public Java Android APIs currently exist to make use of this however.

Google have preprogrammed the GlobalPlatform access keys, and so are in 
control of exactly what javacard apps are loaded onto the secure element. 
They are a 'TSM'.

Google Wallet makes use of undocumented Java Android APIs to enable card 
emulation mode on the PN544. This is only possible because of the recently 
uncommented code within the native official NXP host stack code. Google 
Wallet also communicates with an installed javacard app, to setup 
'whatever-it-is-the-credit-card-companies-need-on-the-card'. This is the 
same javacard app that is interacted with by external pay-terminal 
reader/writers.

For a normal, un-rooted phone, communication with the secure element (using 
ADPUs) (a.k.a enabling card emulation mode 2) is only possible using an APK 
that has been signed with a special key, which Google hold. The Android OS 
verifies the keys before allowing use of some (currently undocumented) Java 
API.*

Having an rooted phone allows bypassing of this restriction, such that any 
APK can successfully enable emulation mode, perform ADPU communication with 
the secure element, and thus interract with javacard apps (including the 
GlobalPlatform app). However, as we do not know the GlobalPlatform keys, we 
are unable to add/remove javacard apps from the secure element.

10 failed authentications with the GlobalPlatform app will cause a 
permenant lockout, preventing any future add/remove operations for javacard 
apps. Existing javacard apps will continue to work, however.

---

Now for things 

Re: [android-developers] Re: NFC Secure Element

2012-04-06 Thread Nikolay Elenkov
On Fri, Apr 6, 2012 at 10:06 PM, xanium4332 xanium4...@gmail.com wrote:


 I've recently read through a lot of information regarding the implementation
 of NFC, Google Wallet, card emulation etc.. on the Galaxy S

Nice write up, you should put it in a blog post somewhere. Sounds about
right, but can't really commend on the finer points. Maybe someone else will.
You might also get better info/response on XDA. This list is not exactly
dedicated to analyzing third party apps and/or hardware.


 Now for things I'm not sure about:

 Does Google Wallet make use of native APIs or Java APIs to communicate to
 the secure element. I.e., is it talking to the NXP NFC stack directly, or
 through some Android-like API?

AFAIK, it uses only Java code. You can send APDU via the Java APIs,
so that's basically all you need.


 People who are receiving the 'secure element not responding' error are
 presumably failing to authenticate with the Google Wallet javacard app which
 has been installed. However, people seem to be mentioning that this error
 means the SE is 'bricked', which I would interpret as the lockout from the
 GlobalPlatform app due to 10 failed auths. Anybody know exactly what is
 going on here?

You can't say for sure until you see the response APDU. IIRC, if you lock
the card you will get 'Security condition not satisfied', SW= 0x6982.
If seen this a few times :)


 I think I read somewhere that the google wallet javacard app is only
 installed onto the SE after successful setup of the Google Wallet app. I.e.
 it is not factory installed.

This appears to be correct.

 If so, how does secure communication occur with
 the GlobalPlatform app. Does Google Wallet perform this (I guess not, as we
 could find the keys from the APK). How do the GlobalPlatform keys get
 securely transmitted to the SE? With SIM cards I think binary SMSs are used
 to OTA chat with the radio interface, but obviously that can't happen here.


You don't really need to transmit the actual keys to the card, you only need to
compute the correct session key based on the card manager key. Maybe they
are in the APK (unlikely), or processing is offloaded to a server. You might
want to look yourself :)

-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en


Re: [android-developers] Re: NFC Secure Element

2012-04-06 Thread Jānis Jansons
Someone wrote that you can't emulate cards on Nexus S (or maybe only mifare
ultralight cards), even if you have the opennfc driver and the rest of it
set up.
Any comments on this?

On 6 April 2012 17:16, Nikolay Elenkov nikolay.elen...@gmail.com wrote:

 On Fri, Apr 6, 2012 at 10:06 PM, xanium4332 xanium4...@gmail.com wrote:
 

  I've recently read through a lot of information regarding the
 implementation
  of NFC, Google Wallet, card emulation etc.. on the Galaxy S

 Nice write up, you should put it in a blog post somewhere. Sounds about
 right, but can't really commend on the finer points. Maybe someone else
 will.
 You might also get better info/response on XDA. This list is not exactly
 dedicated to analyzing third party apps and/or hardware.

 
  Now for things I'm not sure about:
 
  Does Google Wallet make use of native APIs or Java APIs to communicate to
  the secure element. I.e., is it talking to the NXP NFC stack directly, or
  through some Android-like API?

 AFAIK, it uses only Java code. You can send APDU via the Java APIs,
 so that's basically all you need.

 
  People who are receiving the 'secure element not responding' error are
  presumably failing to authenticate with the Google Wallet javacard app
 which
  has been installed. However, people seem to be mentioning that this error
  means the SE is 'bricked', which I would interpret as the lockout from
 the
  GlobalPlatform app due to 10 failed auths. Anybody know exactly what is
  going on here?

 You can't say for sure until you see the response APDU. IIRC, if you lock
 the card you will get 'Security condition not satisfied', SW= 0x6982.
 If seen this a few times :)

 
  I think I read somewhere that the google wallet javacard app is only
  installed onto the SE after successful setup of the Google Wallet app.
 I.e.
  it is not factory installed.

 This appears to be correct.

  If so, how does secure communication occur with
  the GlobalPlatform app. Does Google Wallet perform this (I guess not, as
 we
  could find the keys from the APK). How do the GlobalPlatform keys get
  securely transmitted to the SE? With SIM cards I think binary SMSs are
 used
  to OTA chat with the radio interface, but obviously that can't happen
 here.
 

 You don't really need to transmit the actual keys to the card, you only
 need to
 compute the correct session key based on the card manager key. Maybe they
 are in the APK (unlikely), or processing is offloaded to a server. You
 might
 want to look yourself :)

 --
 You received this message because you are subscribed to the Google
 Groups Android Developers group.
 To post to this group, send email to android-developers@googlegroups.com
 To unsubscribe from this group, send email to
 android-developers+unsubscr...@googlegroups.com
 For more options, visit this group at
 http://groups.google.com/group/android-developers?hl=en


-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en

[android-developers] Re: NFC Secure Element

2012-03-08 Thread Janhouse
Anyone tried it on ICS yet?
And are there new patches or something?

On Friday, February 10, 2012 9:47:18 PM UTC+2, malls wrote:

 When the card emulation is detected, the call is routed 
 to nfc_jni_transaction_callback() of SecureElement. From here the event is 
 posted to NfcService for example AID_SELECTED events are all posted to 
 NfcService. I was wondering if there is way to communicate to SecureElement 
 through this handle. If I try to open SecureElement parallel y, the call 
 throws error that External RF Field is detected, when this channel is 
 open, I believe there must be a way to wait until this mode is finished and 
 communicate back to SecureElement or use the same channel to communicate.

 In fact, If I view the ice-scream sandwich code, there is new event 
 subscription  APDU_RECIEVED in the secure element callback.  It looks like 
 the PICC interface is open now. Hopefully we should be able to communicate.




-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en

[android-developers] Re: NFC Secure Element

2012-03-04 Thread choumarin
Hi all,

Before digging deeply in all this. I wonder if it will be worth it. My aim 
is to emulate the key I have to enter my building.
It is a Mifare 1k, 16secrots, of which I have the keys.

Would this be possible ?

Le vendredi 10 février 2012 20:47:18 UTC+1, malls a écrit :

 When the card emulation is detected, the call is routed 
 to nfc_jni_transaction_callback() of SecureElement. From here the event is 
 posted to NfcService for example AID_SELECTED events are all posted to 
 NfcService. I was wondering if there is way to communicate to SecureElement 
 through this handle. If I try to open SecureElement parallel y, the call 
 throws error that External RF Field is detected, when this channel is 
 open, I believe there must be a way to wait until this mode is finished and 
 communicate back to SecureElement or use the same channel to communicate.

 In fact, If I view the ice-scream sandwich code, there is new event 
 subscription  APDU_RECIEVED in the secure element callback.  It looks like 
 the PICC interface is open now. Hopefully we should be able to communicate.



Le vendredi 10 février 2012 20:47:18 UTC+1, malls a écrit :

 When the card emulation is detected, the call is routed 
 to nfc_jni_transaction_callback() of SecureElement. From here the event is 
 posted to NfcService for example AID_SELECTED events are all posted to 
 NfcService. I was wondering if there is way to communicate to SecureElement 
 through this handle. If I try to open SecureElement parallel y, the call 
 throws error that External RF Field is detected, when this channel is 
 open, I believe there must be a way to wait until this mode is finished and 
 communicate back to SecureElement or use the same channel to communicate.

 In fact, If I view the ice-scream sandwich code, there is new event 
 subscription  APDU_RECIEVED in the secure element callback.  It looks like 
 the PICC interface is open now. Hopefully we should be able to communicate.



Le vendredi 10 février 2012 20:47:18 UTC+1, malls a écrit :

 When the card emulation is detected, the call is routed 
 to nfc_jni_transaction_callback() of SecureElement. From here the event is 
 posted to NfcService for example AID_SELECTED events are all posted to 
 NfcService. I was wondering if there is way to communicate to SecureElement 
 through this handle. If I try to open SecureElement parallel y, the call 
 throws error that External RF Field is detected, when this channel is 
 open, I believe there must be a way to wait until this mode is finished and 
 communicate back to SecureElement or use the same channel to communicate.

 In fact, If I view the ice-scream sandwich code, there is new event 
 subscription  APDU_RECIEVED in the secure element callback.  It looks like 
 the PICC interface is open now. Hopefully we should be able to communicate.



Le vendredi 10 février 2012 20:47:18 UTC+1, malls a écrit :

 When the card emulation is detected, the call is routed 
 to nfc_jni_transaction_callback() of SecureElement. From here the event is 
 posted to NfcService for example AID_SELECTED events are all posted to 
 NfcService. I was wondering if there is way to communicate to SecureElement 
 through this handle. If I try to open SecureElement parallel y, the call 
 throws error that External RF Field is detected, when this channel is 
 open, I believe there must be a way to wait until this mode is finished and 
 communicate back to SecureElement or use the same channel to communicate.

 In fact, If I view the ice-scream sandwich code, there is new event 
 subscription  APDU_RECIEVED in the secure element callback.  It looks like 
 the PICC interface is open now. Hopefully we should be able to communicate.




-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en

Re: [android-developers] Re: NFC Secure Element

2012-02-12 Thread s.rawat
is  *nfc_jni_transaction_callback() *inside the (HAL)Libnfc-nxp or
framewrok code.?Where is it?Which Android Version?*ICS?? PLz post *
*
*
*Rgds,*
*Saurabh
*..pain is temporary.quitting lasts forever..



On Sat, Feb 11, 2012 at 5:11 PM, Michael Roland mi.rol...@gmail.com wrote:

 Hallo malls,

  I could listen to AID_SELECTED event from NfcService. I am trying to
  send data to SE. I get error that External RF Field detected, what
  does this mean.

 It means that you are trying to access the secure element from two sides
 simultaneously (from an external reader and from the application
 processor). You can only communicate through one interface at a time.

 br
 Michael

 --
 You received this message because you are subscribed to the Google
 Groups Android Developers group.
 To post to this group, send email to android-developers@googlegroups.com
 To unsubscribe from this group, send email to
 android-developers+unsubscr...@googlegroups.com
 For more options, visit this group at
 http://groups.google.com/group/android-developers?hl=en


-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en

Re: [android-developers] Re: NFC Secure Element

2012-02-11 Thread Michael Roland
Hallo malls,

 I could listen to AID_SELECTED event from NfcService. I am trying to
 send data to SE. I get error that External RF Field detected, what
 does this mean.

It means that you are trying to access the secure element from two sides
simultaneously (from an external reader and from the application
processor). You can only communicate through one interface at a time.

br
Michael

-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en


[android-developers] Re: NFC Secure Element

2012-02-10 Thread malls
When the card emulation is detected, the call is routed 
to nfc_jni_transaction_callback() of SecureElement. From here the event is 
posted to NfcService for example AID_SELECTED events are all posted to 
NfcService. I was wondering if there is way to communicate to SecureElement 
through this handle. If I try to open SecureElement parallel y, the call 
throws error that External RF Field is detected, when this channel is 
open, I believe there must be a way to wait until this mode is finished and 
communicate back to SecureElement or use the same channel to communicate.

In fact, If I view the ice-scream sandwich code, there is new event 
subscription  APDU_RECIEVED in the secure element callback.  It looks like 
the PICC interface is open now. Hopefully we should be able to communicate.


-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en

[android-developers] Re: NFC Secure Element

2012-02-08 Thread malls
I am not sure if anybody explored NfcExecutionEnvironment class. There
are APIs to communicate to secure element. I don't see any key
requirement.

I could listen to AID_SELECTED event from NfcService. I am trying to
send data to SE. I get error that External RF Field detected, what
does this mean.

Should I be waiting until the external reader sets mode or i have to
initiate the NFC mode.

regards
malls
On Feb 6, 5:51 am, s.rawat imsaurabhra...@gmail.com wrote:
 Hi Nemik,
 You wrote :
 *Yea, that's right. All it does currently is read; at least via the
 Java API. If you look at the kernel source though, a bunch of ifdefs
 which allow for emulation were all disabled. So full compliance with
 the NFC standard will have to wait for a future kernel release. *

 waht are these JAVA APIs ?Can we use them for reading NFC Secure Element -
 Mifare 4k?
 Rgds,
 Saurabh

 ..pain is temporary.quitting lasts forever..



 On Mon, Feb 6, 2012 at 7:08 PM, s.rawat imsaurabhra...@gmail.com wrote:
  Any comments...plz respond if you are reading this mail !
  rgds,
  Saurabh

  ..pain is temporary.quitting lasts forever..

  On Wed, Feb 1, 2012 at 1:21 PM, p z ymdo...@gmail.com wrote:

  I think maybe you can.
  and plesae share your rom when you finished.thx.

  On 2月1日, 上午8时15分, malls masubha...@gmail.com wrote:
   Fernando,

   I was wondering if I can emulate the card in my application and send it
  to
   the terminal.

   regards
   malls

  --
  You received this message because you are subscribed to the Google
  Groups Android Developers group.
  To post to this group, send email to android-developers@googlegroups.com
  To unsubscribe from this group, send email to
  android-developers+unsubscr...@googlegroups.com
  For more options, visit this group at
 http://groups.google.com/group/android-developers?hl=en- Hide quoted text -

 - Show quoted text -

-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en


Re: [android-developers] Re: NFC Secure Element

2012-02-06 Thread s.rawat
Any comments...plz respond if you are reading this mail !
rgds,
Saurabh
..pain is temporary.quitting lasts forever..



On Wed, Feb 1, 2012 at 1:21 PM, p z ymdo...@gmail.com wrote:

 I think maybe you can.
 and plesae share your rom when you finished.thx.

 On 2月1日, 上午8时15分, malls masubha...@gmail.com wrote:
  Fernando,
 
  I was wondering if I can emulate the card in my application and send it
 to
  the terminal.
 
  regards
  malls

 --
 You received this message because you are subscribed to the Google
 Groups Android Developers group.
 To post to this group, send email to android-developers@googlegroups.com
 To unsubscribe from this group, send email to
 android-developers+unsubscr...@googlegroups.com
 For more options, visit this group at
 http://groups.google.com/group/android-developers?hl=en


-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en

Re: [android-developers] Re: NFC Secure Element

2012-02-06 Thread s.rawat
Hi Nemik,
You wrote :
*Yea, that's right. All it does currently is read; at least via the
Java API. If you look at the kernel source though, a bunch of ifdefs
which allow for emulation were all disabled. So full compliance with
the NFC standard will have to wait for a future kernel release. *


waht are these JAVA APIs ?Can we use them for reading NFC Secure Element -
Mifare 4k?
Rgds,
Saurabh



..pain is temporary.quitting lasts forever..



On Mon, Feb 6, 2012 at 7:08 PM, s.rawat imsaurabhra...@gmail.com wrote:

 Any comments...plz respond if you are reading this mail !
 rgds,
 Saurabh

 ..pain is temporary.quitting lasts forever..



 On Wed, Feb 1, 2012 at 1:21 PM, p z ymdo...@gmail.com wrote:

 I think maybe you can.
 and plesae share your rom when you finished.thx.

 On 2月1日, 上午8时15分, malls masubha...@gmail.com wrote:
  Fernando,
 
  I was wondering if I can emulate the card in my application and send it
 to
  the terminal.
 
  regards
  malls

 --
 You received this message because you are subscribed to the Google
 Groups Android Developers group.
 To post to this group, send email to android-developers@googlegroups.com
 To unsubscribe from this group, send email to
 android-developers+unsubscr...@googlegroups.com
 For more options, visit this group at
 http://groups.google.com/group/android-developers?hl=en




-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en

Re: [android-developers] Re: NFC Secure Element

2012-02-03 Thread s.rawat
Hi All,
Recently I have tried with another Card reader , I got this message.

MIFARE 4K card on reader
ATR : 3B 8F 80 01 80 4F 0C A0 00 00 03 06 03 00 02 00 00 00 00 69

00 02 -- Shows the *Mifare *4K

Earlier with another Card I was getting -- *3B 8A 80 01 00 31 C1 73 C8 40
00 00 90 00 90* and I read in this group that it is for emulated Card Smart
MX.
I wanted to know
(1) Can the  two Card readers produce different ATR for the same card?If
yes , Why so?
(2) Can I get the notification or any type of logs when the read /write
transaction is happening.or do I have to put the LOG messages , preferably
in the NFC framework files.
(3) Is it possible to READ(not Write ) the SE element(i.e Mifare 4k )
memory Area using the APDU(I think this is same as what others have
mentioned in this group)


Rgds,
Saurabh




..pain is temporary.quitting lasts forever..



On Fri, Feb 3, 2012 at 5:04 AM, mickae1 mickamus...@gmail.com wrote:

 theoritacally is it possible to change the chip with one that we know
 the key ? Will it be difficult to access to the chip ?

 On Feb 2, 7:19 am, Fernando Miguélez fernando.migue...@gmail.com
 wrote:
  Keys are used in raw communication through APDUs
 
 
 
 
 
 
 
  On Wed, Feb 1, 2012 at 7:46 PM, malls masubha...@gmail.com wrote:
   I don't see any interface of passing the keys to open secure element in
   the android code. I am not sure how many people claims that you need
 google
   Keys to open SecureElement. May be I am missing something.
 
--
   You received this message because you are subscribed to the Google
   Groups Android Developers group.
   To post to this group, send email to
 android-developers@googlegroups.com
   To unsubscribe from this group, send email to
   android-developers+unsubscr...@googlegroups.com
   For more options, visit this group at
  http://groups.google.com/group/android-developers?hl=en

 --
 You received this message because you are subscribed to the Google
 Groups Android Developers group.
 To post to this group, send email to android-developers@googlegroups.com
 To unsubscribe from this group, send email to
 android-developers+unsubscr...@googlegroups.com
 For more options, visit this group at
 http://groups.google.com/group/android-developers?hl=en


-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en

[android-developers] Re: NFC Secure Element

2012-02-03 Thread Cadu Silvestre
And besides that, Google took out microSD from the major NFC phones,
so, basically, we won't be able to do nothing when it comes card
emulation - as for an obvius reason, the SE keys are not available.

As far as I can gather from the giants in this matter (like our friend
Michael Roland), SWP is the only way out.

On 31 jan, 05:52, Fernando Miguélez fernando.migue...@gmail.com
wrote:
 No, you cannot read/write APDUs from your application while working with an
 external reader. When card emulation is enabled APDUs are routed directly
 to SE from NFC Controller. APDU communication with SE has other objective,
 main application processor can not emulate a PICC, that is the task of SE.
 When communicating main processor with SE you can theoretically load/remove
 cardlets, interact with them and so on. For the time being Mifare embedded
 inside SmartMX chip can not be accessed from an application. At least
 AFAIK.







 On Tue, Jan 31, 2012 at 2:22 AM, malls masubha...@gmail.com wrote:
  Fernando,

  Thanks I could create custom image with nfc enabled by using your
  help.

  Just to clarify myself, if we are connected to external reader, I
  should be able to directly read/write APDUs from my app right.
  should I be using NFCService.transceive(..) method to read/write from
  the external reader.

  regards
  malls

  On Jan 4, 6:17 am, Fernando Miguélez fernando.migue...@gmail.com
  wrote:
   Well, options are enabled in cascade. The problem comes because the first
   option is not enabled. Besides, if you look at the Wireless Settings
   screen, there is only the NFC Settings option, but not the one that
  lets
   you enalbe/disable NFC directly from that screen. That is beacuse the Nfc
   service in not available. Connection to a computer in debug mode will
  draw
   some light.

   Instead of compiling the whole image again I suggest you to compile just
   the Nfc.apk system application and replace the original one. You must
   remount /system partition in read/write mode and overwrite the apk inside
   /system/app. Then you must kill the nfc service by means of DDMS view of
   the ADT (you must connnect the phone in debug mode and since you have
   compiled in userdebug mode you will see all the running proccesses). The
   service will restart automatically.

   When it comes to read/write the card by means of an external reader, any
   Mifare Classic 4K compatible RFID reader will do. If you try to access
   directly to the SE from an Android application I am afraid to disappoint
   you but that is not possible, at least I wasn't successful at it and
  nobody
   I know either. The reasons are well described in other posts and on
   stackoverflow.

   Regards

   On Wed, Jan 4, 2012 at 2:56 PM, s.rawat imsaurabhra...@gmail.com
  wrote:
Thanks !
I will also try from my side recompiling it.So you mean I should get
  the
Check boxes enabled for
 *Only Card EmulationMode*
and
 *Use External SE*

My main aim is to write to the NFC card in card emulation mode so that
  it
can be read by any Card Reader.is it possible after your patches are
applied using teh android SDKs or do we have to write some native
application.
Rgds,
Softy
..pain is temporary.quitting lasts forever..

2012/1/4 Fernando Miguélez fernando.migue...@gmail.com

Great work.

Obviously there is something wrong with the compilation. Have you
  tried
to connect in debug mode the phone to a computer with Android
  Development
Tools and see what the traces look like. They may offer a clue. My
suspicion is that NfcService is crashing. I will review my notes
  tomorrow
if I find something different to the steps you followed to build the
  image.

On Wed, Jan 4, 2012 at 9:17 AM, softy imsaurabhra...@gmail.com
  wrote:

Hi All,
Thanks Fernando Miguélez Palomo for posting the patches.I have
  applied
it to 2.3.4-r1 Android gingerbread and compiled /flashed it on
  Samsung
Nexus S and was able to see the NFC Settings changed(though i cant
  select
them, they are disabled)
I have blogged the whole steps here
 http://techshek4u.blogspot.com/2012/01/applying-card-emulation-patch-Plz
  let me know if I miss something.

@ Fernando Miguélez Palomo
What next after that.How can i test this.Any source code or tool
  /card
reader description will be enlightening.
Rgds,
softy

--
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to
  android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
   http://groups.google.com/group/android-developers?hl=en

 --
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to
  

[android-developers] Re: NFC Secure Element

2012-02-03 Thread p z
I think maybe you can.
and plesae share your rom when you finished.thx.

On 2月1日, 上午8时15分, malls masubha...@gmail.com wrote:
 Fernando,

 I was wondering if I can emulate the card in my application and send it to
 the terminal.

 regards
 malls

-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en


[android-developers] Re: NFC Secure Element

2012-02-02 Thread mickae1
theoritacally is it possible to change the chip with one that we know
the key ? Will it be difficult to access to the chip ?

On Feb 2, 7:19 am, Fernando Miguélez fernando.migue...@gmail.com
wrote:
 Keys are used in raw communication through APDUs







 On Wed, Feb 1, 2012 at 7:46 PM, malls masubha...@gmail.com wrote:
  I don't see any interface of passing the keys to open secure element in
  the android code. I am not sure how many people claims that you need google
  Keys to open SecureElement. May be I am missing something.

   --
  You received this message because you are subscribed to the Google
  Groups Android Developers group.
  To post to this group, send email to android-developers@googlegroups.com
  To unsubscribe from this group, send email to
  android-developers+unsubscr...@googlegroups.com
  For more options, visit this group at
 http://groups.google.com/group/android-developers?hl=en

-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en


Re: [android-developers] Re: NFC Secure Element

2012-02-01 Thread malls
I don't see any interface of passing the keys to open secure element in the 
android code. I am not sure how many people claims that you need google 
Keys to open SecureElement. May be I am missing something.


-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en

Re: [android-developers] Re: NFC Secure Element

2012-02-01 Thread Fernando Miguélez
Keys are used in raw communication through APDUs

On Wed, Feb 1, 2012 at 7:46 PM, malls masubha...@gmail.com wrote:

 I don't see any interface of passing the keys to open secure element in
 the android code. I am not sure how many people claims that you need google
 Keys to open SecureElement. May be I am missing something.



  --
 You received this message because you are subscribed to the Google
 Groups Android Developers group.
 To post to this group, send email to android-developers@googlegroups.com
 To unsubscribe from this group, send email to
 android-developers+unsubscr...@googlegroups.com
 For more options, visit this group at
 http://groups.google.com/group/android-developers?hl=en


-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en

Re: [android-developers] Re: NFC Secure Element

2012-01-31 Thread malls
Fernando,

In that case, what's api to send apdu to external SE and how can we have 
external SE added to the phone.

regards
malls

-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en

Re: [android-developers] Re: NFC Secure Element

2012-01-31 Thread malls
Fernando,

I was wondering if I can emulate the card in my application and send it to 
the terminal.

regards
malls

-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en

[android-developers] Re: NFC Secure Element

2012-01-30 Thread malls
Fernando,

Here is the logcat output that I am getting. Is libpn544.so supposed to be 
built as part of this build process or am i missing something. I have 
checked, there were no errors during the compilation anywhere.

D/NFC JNI ( 4179): NFC Service : loading JNI
I/NfcService( 4179): Starting NFC service
D/NFC JNI ( 4179): **  Init Native Structure **
D/NFC JNI ( 4179): **  Init Native Structure **
D/NFC JNI ( 4179): ** Init Native Structure OK **
D/NFC JNI ( 4179): ** Init Native Structure OK **
I/RegisteredComponentCache( 4179): ComponentInfo: ResolveInfo{405641b0 
com.andro
id.apps.tag.TagViewer p=0 o=0 m=0x108000}, techs: android.nfc.tech.Ndef,
D/NFC JNI ( 4179):  Set LLCP LTO to 150
D/NFC JNI ( 4179):  Set LLCP LTO to 150
D/NFC JNI ( 4179):  Set LLCP MIU to 128
D/NFC JNI ( 4179):  Set LLCP MIU to 128
D/NFC JNI ( 4179):  Set LLCP WKS to 1
D/NFC JNI ( 4179):  Set LLCP WKS to 1
D/NFC JNI ( 4179):  Set LLCP OPT to 0
D/NFC JNI ( 4179):  Set LLCP OPT to 0
D/NFC JNI ( 4179):  Set NFC DISCOVERY A to 1
D/NFC JNI ( 4179):  Set NFC DISCOVERY A to 1
D/NFC JNI ( 4179):  Set NFC DISCOVERY B to 1
D/NFC JNI ( 4179):  Set NFC DISCOVERY B to 1
D/NFC JNI ( 4179):  Set NFC DISCOVERY F to 1
D/NFC JNI ( 4179):  Set NFC DISCOVERY F to 1
D/NFC JNI ( 4179):  Set NFC DISCOVERY 15693 to 1
D/NFC JNI ( 4179):  Set NFC DISCOVERY 15693 to 1
D/NFC JNI ( 4179):  Set NFC DISCOVERY NFCIP to 1
D/NFC JNI ( 4179):  Set NFC DISCOVERY 15693 to 1
D/NFC JNI ( 4179): Start Initialization
D/NFC_LIST( 4179): Allocated node: 0x292868 (0x4496fa70)
D/NFC JNI ( 4179): phLibNfc_Mgt_ConfigureDriver(0x00295ad8, 0x0008)
D/NFC JNI ( 4179): phLibNfc_Mgt_ConfigureDriver(0x00295ad8, 0x0008)
W/NFC_i2c ( 4179): sleeping a little longer...
D/NFC JNI ( 4179): phLibNfc_Mgt_ConfigureDriver() returned 
0x[NFCSTATUS_SUCC
ESS]
D/NFC JNI ( 4179): phLibNfc_Mgt_Initialize()
D/NFC JNI ( 4179): phLibNfc_Mgt_Initialize()
E/NFC-HCI ( 4179): Could not open libpn544.so
D/NFC JNI ( 4179): phLibNfc_Mgt_Initialize returned 
0x000d[NFCSTATUS_PENDING]
D/NFC JNI ( 4179): phLibNfc_Mgt_Initialize returned 
0x000d[NFCSTATUS_PENDING]
D/NFC JNI ( 4179): NFC client started
D/NFC JNI ( 4179): NFC client started
D/NFC JNI ( 4179): Callback: nfc_jni_init_callback() - 
status=0x[NFCSTATUS_S
UCCESS]
I/DEBUG   ( 3190): *** *** *** *** *** *** *** *** *** *** *** ***^C

-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en

Re: [android-developers] Re: NFC Secure Element

2012-01-30 Thread malls
Dear Fernando

I tried to patch as per your instructions and root the device. I get error 
saying libpn544.so not found. I don't see this file created after the 
compilation. Where is it trying to load from.

regards
malls

-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en

Re: [android-developers] Re: NFC Secure Element

2012-01-30 Thread malls
Softy

Could you please share android client code snippet to send APDU command to 
SE after the patch.

regards
malls

-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en

[android-developers] Re: NFC Secure Element

2012-01-30 Thread malls
Thanks Saurabh and Fernando, that worked just adding the library. Just
Curious is it supposed to be part of android build, not sure why am I
missing that file.


On Jan 26, 11:09 pm, s.rawat imsaurabhra...@gmail.com wrote:
 Hi,

 I faced this issue.Plz paste the file attached in the mail to the *
 /system/lib* directory as suggested by * Fernando* .And yes you have to do
 remount the system partition as RW.
 Rgds,
 Saurabh

 ..pain is temporary.quitting lasts forever..

 2012/1/27 Fernando Miguélez fernando.migue...@gmail.com







  There must be an error with patches since other person had the same issue.
  Just copy it manually to the /system/lib directory of the phone (you have
  to remount the system partition as RW).

  2012/1/27 malls masubha...@gmail.com

  Dear Fernando

  I tried to patch as per your instructions and root the device. I get
  error saying libpn544.so not found. I don't see this file created after the
  compilation. Where is it trying to load from.

  regards
  malls

   --
  You received this message because you are subscribed to the Google
  Groups Android Developers group.
  To post to this group, send email to android-developers@googlegroups.com
  To unsubscribe from this group, send email to
  android-developers+unsubscr...@googlegroups.com
  For more options, visit this group at
 http://groups.google.com/group/android-developers?hl=en



  libpn544_fw.so
 77KViewDownload

-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en


[android-developers] Re: NFC Secure Element

2012-01-30 Thread malls
Fernando,

Thanks I could create custom image with nfc enabled by using your
help.

Just to clarify myself, if we are connected to external reader, I
should be able to directly read/write APDUs from my app right.
should I be using NFCService.transceive(..) method to read/write from
the external reader.

regards
malls

On Jan 4, 6:17 am, Fernando Miguélez fernando.migue...@gmail.com
wrote:
 Well, options are enabled in cascade. The problem comes because the first
 option is not enabled. Besides, if you look at the Wireless Settings
 screen, there is only the NFC Settings option, but not the one that lets
 you enalbe/disable NFC directly from that screen. That is beacuse the Nfc
 service in not available. Connection to a computer in debug mode will draw
 some light.

 Instead of compiling the whole image again I suggest you to compile just
 the Nfc.apk system application and replace the original one. You must
 remount /system partition in read/write mode and overwrite the apk inside
 /system/app. Then you must kill the nfc service by means of DDMS view of
 the ADT (you must connnect the phone in debug mode and since you have
 compiled in userdebug mode you will see all the running proccesses). The
 service will restart automatically.

 When it comes to read/write the card by means of an external reader, any
 Mifare Classic 4K compatible RFID reader will do. If you try to access
 directly to the SE from an Android application I am afraid to disappoint
 you but that is not possible, at least I wasn't successful at it and nobody
 I know either. The reasons are well described in other posts and on
 stackoverflow.

 Regards







 On Wed, Jan 4, 2012 at 2:56 PM, s.rawat imsaurabhra...@gmail.com wrote:
  Thanks !
  I will also try from my side recompiling it.So you mean I should get the
  Check boxes enabled for
   *Only Card EmulationMode*
  and
   *Use External SE*

  My main aim is to write to the NFC card in card emulation mode so that it
  can be read by any Card Reader.is it possible after your patches are
  applied using teh android SDKs or do we have to write some native
  application.
  Rgds,
  Softy
  ..pain is temporary.quitting lasts forever..

  2012/1/4 Fernando Miguélez fernando.migue...@gmail.com

  Great work.

  Obviously there is something wrong with the compilation. Have you tried
  to connect in debug mode the phone to a computer with Android Development
  Tools and see what the traces look like. They may offer a clue. My
  suspicion is that NfcService is crashing. I will review my notes tomorrow
  if I find something different to the steps you followed to build the image.

  On Wed, Jan 4, 2012 at 9:17 AM, softy imsaurabhra...@gmail.com wrote:

  Hi All,
  Thanks Fernando Miguélez Palomo for posting the patches.I have applied
  it to 2.3.4-r1 Android gingerbread and compiled /flashed it on Samsung
  Nexus S and was able to see the NFC Settings changed(though i cant select
  them, they are disabled)
  I have blogged the whole steps 
  herehttp://techshek4u.blogspot.com/2012/01/applying-card-emulation-patch-Plz
   let me know if I miss something.

  @ Fernando Miguélez Palomo
  What next after that.How can i test this.Any source code or tool /card
  reader description will be enlightening.
  Rgds,
  softy

  --
  You received this message because you are subscribed to the Google
  Groups Android Developers group.
  To post to this group, send email to android-developers@googlegroups.com
  To unsubscribe from this group, send email to
  android-developers+unsubscr...@googlegroups.com
  For more options, visit this group at
 http://groups.google.com/group/android-developers?hl=en

   --
  You received this message because you are subscribed to the Google
  Groups Android Developers group.
  To post to this group, send email to android-developers@googlegroups.com
  To unsubscribe from this group, send email to
  android-developers+unsubscr...@googlegroups.com
  For more options, visit this group at
 http://groups.google.com/group/android-developers?hl=en

   --
  You received this message because you are subscribed to the Google
  Groups Android Developers group.
  To post to this group, send email to android-developers@googlegroups.com
  To unsubscribe from this group, send email to
  android-developers+unsubscr...@googlegroups.com
  For more options, visit this group at
 http://groups.google.com/group/android-developers?hl=en

-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en


Re: [android-developers] Re: NFC Secure Element

2012-01-30 Thread s.rawat
Could you please share android client code snippet to send APDU command to
SE after the patch.
 Well actually I haven't got here yet , but still trying , if you happen
to find this ,do plz share it.
I checked in other devices this shared library is present there, i think
somehow it got deleted by the build process.Ideally it should bundle it up
from the system folder.(but there is no system folder as well :( )
Rgds
Saurabh

..pain is temporary.quitting lasts forever..



On Tue, Jan 31, 2012 at 1:59 AM, malls masubha...@gmail.com wrote:

 Thanks Saurabh and Fernando, that worked just adding the library. Just
 Curious is it supposed to be part of android build, not sure why am I
 missing that file.


 On Jan 26, 11:09 pm, s.rawat imsaurabhra...@gmail.com wrote:
  Hi,
 
  I faced this issue.Plz paste the file attached in the mail to the *
  /system/lib* directory as suggested by * Fernando* .And yes you have to
 do
  remount the system partition as RW.
  Rgds,
  Saurabh
 
  ..pain is temporary.quitting lasts forever..
 
  2012/1/27 Fernando Miguélez fernando.migue...@gmail.com
 
 
 
 
 
 
 
   There must be an error with patches since other person had the same
 issue.
   Just copy it manually to the /system/lib directory of the phone (you
 have
   to remount the system partition as RW).
 
   2012/1/27 malls masubha...@gmail.com
 
   Dear Fernando
 
   I tried to patch as per your instructions and root the device. I get
   error saying libpn544.so not found. I don't see this file created
 after the
   compilation. Where is it trying to load from.
 
   regards
   malls
 
--
   You received this message because you are subscribed to the Google
   Groups Android Developers group.
   To post to this group, send email to
 android-developers@googlegroups.com
   To unsubscribe from this group, send email to
   android-developers+unsubscr...@googlegroups.com
   For more options, visit this group at
  http://groups.google.com/group/android-developers?hl=en
 
 
 
   libpn544_fw.so
  77KViewDownload

 --
 You received this message because you are subscribed to the Google
 Groups Android Developers group.
 To post to this group, send email to android-developers@googlegroups.com
 To unsubscribe from this group, send email to
 android-developers+unsubscr...@googlegroups.com
 For more options, visit this group at
 http://groups.google.com/group/android-developers?hl=en


-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en

Re: [android-developers] Re: NFC Secure Element

2012-01-30 Thread Fernando Miguélez
No, you cannot read/write APDUs from your application while working with an
external reader. When card emulation is enabled APDUs are routed directly
to SE from NFC Controller. APDU communication with SE has other objective,
main application processor can not emulate a PICC, that is the task of SE.
When communicating main processor with SE you can theoretically load/remove
cardlets, interact with them and so on. For the time being Mifare embedded
inside SmartMX chip can not be accessed from an application. At least
AFAIK.

On Tue, Jan 31, 2012 at 2:22 AM, malls masubha...@gmail.com wrote:

 Fernando,

 Thanks I could create custom image with nfc enabled by using your
 help.

 Just to clarify myself, if we are connected to external reader, I
 should be able to directly read/write APDUs from my app right.
 should I be using NFCService.transceive(..) method to read/write from
 the external reader.

 regards
 malls

 On Jan 4, 6:17 am, Fernando Miguélez fernando.migue...@gmail.com
 wrote:
  Well, options are enabled in cascade. The problem comes because the first
  option is not enabled. Besides, if you look at the Wireless Settings
  screen, there is only the NFC Settings option, but not the one that
 lets
  you enalbe/disable NFC directly from that screen. That is beacuse the Nfc
  service in not available. Connection to a computer in debug mode will
 draw
  some light.
 
  Instead of compiling the whole image again I suggest you to compile just
  the Nfc.apk system application and replace the original one. You must
  remount /system partition in read/write mode and overwrite the apk inside
  /system/app. Then you must kill the nfc service by means of DDMS view of
  the ADT (you must connnect the phone in debug mode and since you have
  compiled in userdebug mode you will see all the running proccesses). The
  service will restart automatically.
 
  When it comes to read/write the card by means of an external reader, any
  Mifare Classic 4K compatible RFID reader will do. If you try to access
  directly to the SE from an Android application I am afraid to disappoint
  you but that is not possible, at least I wasn't successful at it and
 nobody
  I know either. The reasons are well described in other posts and on
  stackoverflow.
 
  Regards
 
 
 
 
 
 
 
  On Wed, Jan 4, 2012 at 2:56 PM, s.rawat imsaurabhra...@gmail.com
 wrote:
   Thanks !
   I will also try from my side recompiling it.So you mean I should get
 the
   Check boxes enabled for
*Only Card EmulationMode*
   and
*Use External SE*
 
   My main aim is to write to the NFC card in card emulation mode so that
 it
   can be read by any Card Reader.is it possible after your patches are
   applied using teh android SDKs or do we have to write some native
   application.
   Rgds,
   Softy
   ..pain is temporary.quitting lasts forever..
 
   2012/1/4 Fernando Miguélez fernando.migue...@gmail.com
 
   Great work.
 
   Obviously there is something wrong with the compilation. Have you
 tried
   to connect in debug mode the phone to a computer with Android
 Development
   Tools and see what the traces look like. They may offer a clue. My
   suspicion is that NfcService is crashing. I will review my notes
 tomorrow
   if I find something different to the steps you followed to build the
 image.
 
   On Wed, Jan 4, 2012 at 9:17 AM, softy imsaurabhra...@gmail.com
 wrote:
 
   Hi All,
   Thanks Fernando Miguélez Palomo for posting the patches.I have
 applied
   it to 2.3.4-r1 Android gingerbread and compiled /flashed it on
 Samsung
   Nexus S and was able to see the NFC Settings changed(though i cant
 select
   them, they are disabled)
   I have blogged the whole steps here
 http://techshek4u.blogspot.com/2012/01/applying-card-emulation-patch-Plz
 let me know if I miss something.
 
   @ Fernando Miguélez Palomo
   What next after that.How can i test this.Any source code or tool
 /card
   reader description will be enlightening.
   Rgds,
   softy
 
   --
   You received this message because you are subscribed to the Google
   Groups Android Developers group.
   To post to this group, send email to
 android-developers@googlegroups.com
   To unsubscribe from this group, send email to
   android-developers+unsubscr...@googlegroups.com
   For more options, visit this group at
  http://groups.google.com/group/android-developers?hl=en
 
--
   You received this message because you are subscribed to the Google
   Groups Android Developers group.
   To post to this group, send email to
 android-developers@googlegroups.com
   To unsubscribe from this group, send email to
   android-developers+unsubscr...@googlegroups.com
   For more options, visit this group at
  http://groups.google.com/group/android-developers?hl=en
 
--
   You received this message because you are subscribed to the Google
   Groups Android Developers group.
   To post to this group, send email to
 android-developers@googlegroups.com
   To unsubscribe from this group, send email 

Re: [android-developers] Re: NFC Secure Element

2012-01-27 Thread Michael Roland
Hallo Saurabh,

 What is the significance of this : 
 
I just looked through my code and found that I also explicitly disabled
ISO 14443-4 activation (before polling) using this command:
 FF0003D41224

See page 9 of the reader API manual:

Some Type A Tags may support both ISO14443-3 Type A and ISO14443-4 Type
A operating modes. For example, JCOP30 supports MIFARE 1K emulation
(ISO14443-3) and ISO14443-4. If the reader sends a RATS command to the
tag, the ISO14443-4 mode will be activated, or the tag remains in MIFARE
1K emulation mode (ISO14443-3). It is up to the
application to decide which operating mode to be activated. By default,
the reader will perform automatic ISO14443-4 activation if the tag
supports ISO14443-4.
* To disable automatic ISO14443-4 activation: FF 00 00 00 03 D4 12 24
* To Enable automatic ISO14443-4 activation: FF 00 00 00 03 D4 12 34

So you need to disable ISO 14443-4 activation *before* you start the
anti-collision sequence. Once the RATS command is sent, the SmartMX will
not accept raw MIFARE classic commands anymore.

br
Michael

-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en


Re: [android-developers] Re: NFC Secure Element

2012-01-26 Thread Fernando Miguélez
There must be an error with patches since other person had the same issue.
Just copy it manually to the /system/lib directory of the phone (you have
to remount the system partition as RW).

2012/1/27 malls masubha...@gmail.com

 Dear Fernando

 I tried to patch as per your instructions and root the device. I get error
 saying libpn544.so not found. I don't see this file created after the
 compilation. Where is it trying to load from.

 regards
 malls


-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en

Re: [android-developers] Re: NFC Secure Element

2012-01-24 Thread s.rawat
Hi Michael* ** *.
Yes i have followed the aforesaid method but as soon as I execute these
commands.:

*Step 1) Polling for the MIFARE 1K/4K Tags, 106 kbps*
 FF 00 00 00 04 D4 4A 01 00
* d5 4b 00 90 00* ( I am getting this)
- which shows no NFC tag.

and 63 00 for rest of the of the commands.

I am using the same reader(ACR 122U ) as suggested by you.

Is it possible to share your Nexus S Images, so that I could try them out
here and confirm whether the files I have generated by compiling the
Android 2.3.4-r1 source code with the card emulation patches , is correct
or not.

What is the significance of this :

I just looked through my code and found that I also explicitly disabled
ISO 14443-4 activation (before polling) using this command:
 FF0003D41224

Rgds,
Saurabh

..pain is temporary.quitting lasts forever..



On Fri, Jan 20, 2012 at 10:16 PM, Michael Roland mi.rol...@gmail.comwrote:

 FF0003D41224

-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en

[android-developers] Re: NFC Secure Element

2012-01-20 Thread anton krasnoff
Hi, Tommy! 
Could you, please, build a new version your Nexus S ROM of Card Emulation with 
fresh patch from m0rtadelohttp://forum.xda-developers.com/member.php?u=3284560
 ?
http://forum.xda-developers.com/showthread.php?t=1281946

Many thanks!

-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en

Re: [android-developers] Re: NFC Secure Element

2012-01-20 Thread Michael Roland
Hallo Saurabh,

 You mean page 12 , section *5.3 Reading Binary Block*.
I didn't find any section *5.3 Reading Binary Block* on that page. In
fact, I mean have you tried the whole command sequence described for
Card Access -- How to access MIFARE Classic Tags? on that page.

You have to do the polling using these commands to access the card. The
standard PC/SC commands will not work.

I just looked through my code and found that I also explicitly disabled
ISO 14443-4 activation (before polling) using this command:
  FF0003D41224

 Can you tell me the name of card reader where we cant see
 this behavior (reader automatically performed protocol selection up to
 ISO 14443-4 / APDU layer)
The ACR 122U was the only reader with which I successfully accessed the
MIFARE area of the SmartMX so far.

br,
Michael



 On Thu, Jan 19, 2012 at 6:14 PM, Michael Roland mi.rol...@gmail.com
 mailto:mi.rol...@gmail.com wrote:
 
 Hallo Saurabh,
 
  I am getting This ATR now : *3B 8A 80 01 00 31 C1 73 C8 40 00 00 90 00
  90* , which I have read in this group that it is for SmartMX.
 
 Correct, that's the PC/SC ATR for the SmartMX.
 
  I am looking into writing onto it but so far I am getting 63 00
  response(which means error)
  I am trying to load., authenticate the keys and then read -write and
  then read back from the SmartMX (Secure Element).
 
  *_Here is my list of commands : _*
 
  FF82006006// load keys
  FF86050100026000// authenticate
  FFB210//read sector 2
  FFD6000210// write sector 2
  FFB210 // read sector 2 again
 
  I followed this --  http://www.nfc-reader.com/
  NFC-smart-card-reader/ACR122-API-Manual/API_ACR122.pdf
 
 I would guess, that the reader automatically performed protocol
 selection up to ISO 14443-4 / APDU layer. In that state it is not
 possible to access the MIFARE part of the chip with reader-side MIFARE
 emulation. You could try the example on page 12ff of this document.
 
 br,
 Michael
 
 --
 You received this message because you are subscribed to the Google
 Groups Android Developers group.
 To post to this group, send email to
 android-developers@googlegroups.com
 mailto:android-developers@googlegroups.com
 To unsubscribe from this group, send email to
 android-developers+unsubscr...@googlegroups.com
 mailto:android-developers%2bunsubscr...@googlegroups.com
 For more options, visit this group at
 http://groups.google.com/group/android-developers?hl=en
 
 
 -- 
 You received this message because you are subscribed to the Google
 Groups Android Developers group.
 To post to this group, send email to android-developers@googlegroups.com
 To unsubscribe from this group, send email to
 android-developers+unsubscr...@googlegroups.com
 For more options, visit this group at
 http://groups.google.com/group/android-developers?hl=en

-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en


Re: [android-developers] Re: NFC Secure Element

2012-01-19 Thread s.rawat
Hi All,

I am getting This ATR now : *3B 8A 80 01 00 31 C1 73 C8 40 00 00 90 00
90*, which I have read in this group that it is for SmartMX.
I am looking into writing onto it but so far I am getting 63 00
response(which means error)
I am trying to load., authenticate the keys and then read -write and then
read back from the SmartMX (Secure Element).

*Here is my list of commands : *

FF82006006 // load keys
FF86050100026000 // authenticate
FFB210 //read sector 2
FFD6000210 // write sector 2
FFB210 // read sector 2 again

I followed this -- 
http://www.nfc-reader.com/NFC-smart-card-reader/ACR122-API-Manual/API_ACR122.pdf

My main aim is to get the notification programatically or any logs that
comes out as the result of doing this.I will try sending these by combining
them in APDUs from the application code.I think that will be possible.If
successfull I will plan the next step.PLz assist me on this.

Rgds,
Saurabh


..pain is temporary.quitting lasts forever..



On Fri, Jan 13, 2012 at 1:54 PM, s.rawat imsaurabhra...@gmail.com wrote:

 HI,
 I am gettign an ATR : A card is present. ATR: 3B 8F 80 01 80 4F 0C A0 00
 00 03 06 03 *FF 40* 00 00 00 00 D4 .


 I dont htink it emulated the card.Does it.For 1k/4k Mifare Classic Card it
 has to be 00 01(Mifare 1k) or 00 02(Mifare 1k) instead of *FF 40* .PLz
 correct my understanding.I have used the patches to enable to the phone in
 Card emulation mode.


 Rgds,
 Saurabh
 ..pain is temporary.quitting lasts forever..



 On Fri, Jan 6, 2012 at 11:24 AM, s.rawat imsaurabhra...@gmail.com wrote:

 Yes you are correct, now it looks fine and I can see the options getting
 ticked on the NFC Setting UI.But i was getting the segmentation fault as
 well.Plz find attached the logs( showing the logs at the boot time ).It
 shows the stack trace as well.

 Rgds,
 Saurabh
 ..pain is temporary.quitting lasts forever..



 On Thu, Jan 5, 2012 at 6:04 PM, s.rawat imsaurabhra...@gmail.com wrote:

 Sure I will try that  and post the results !

 ..pain is temporary.quitting lasts forever..



 2012/1/5 Fernando Miguélez fernando.migue...@gmail.com

 Saurabh,

 After reflashing my phone and verifying that the NFC toggle option was
 available also in main Wireless Settings Screen, and after examining your
 problem I reached the conclusion that your generated image does not include
 NFC support, only the settings screen. I reviewed the patches and *there
 was a bug. *The NFC was not enabled in building proccess because the
 wrong file was patched (device.mk instead of device_base.mk). Sorry
 for the incovenience.

 I have just updated the patches and uploaded to
 http://forum.xda-developers.com/showthread.php?p=17965091 . Could you
 please check from the beginning that now the patches are completely correct
 by rebuilding the image? It is safe to apply again over the patches files,
 since the changes apply to another file.

 On Thu, Jan 5, 2012 at 9:31 AM, s.rawat imsaurabhra...@gmail.comwrote:

 I did re-flashing from the patched Android Source and again the same
 thing.Here are the logcat logs on clicking the NFC Settings :

 D/dalvikvm(  298): GC_EXPLICIT freed 91K, 45% free 3160K/5703K,
 external 4731K/5234K, paused 290ms
 I/ActivityManager(  106): Starting: Intent {
 act=android.intent.action.MAIN cmp=com.android.settings/.WirelessSettings 
 }
 from pid 493
 D/dalvikvm(  493): GC_EXTERNAL_ALLOC freed 55K, 50% free 2933K/5831K,
 external 2878K/3220K, paused 20ms
 E/NFC (  493): could not retrieve NFC service
 I/ActivityManager(  106): Displayed
 com.android.settings/.WirelessSettings: +351ms
 D/dalvikvm(  493): GC_EXTERNAL_ALLOC freed 43K, 49% free 3022K/5831K,
 external 3171K/3241K, paused 21ms
 I/ActivityManager(  106): Starting: Intent {
 act=android.intent.action.MAIN cmp=com.android.settings/.nfc.NfcSettings }
 from pid 493
 I/ActivityManager(  106): Displayed
 com.android.settings/.nfc.NfcSettings: +261ms


 Any clue on this.
 Rgds,
 Saurabh



 ..pain is temporary.quitting lasts forever..



 2012/1/4 Fernando Miguélez fernando.migue...@gmail.com

 Well, options are enabled in cascade. The problem comes because the
 first option is not enabled. Besides, if you look at the Wireless 
 Settings
 screen, there is only the NFC Settings option, but not the one that 
 lets
 you enalbe/disable NFC directly from that screen. That is beacuse the Nfc
 service in not available. Connection to a computer in debug mode will 
 draw
 some light.

 Instead of compiling the whole image again I suggest you to compile
 just the Nfc.apk system application and replace the original one. You 
 must
 remount /system partition in read/write mode and overwrite the apk inside
 /system/app. Then you must kill the nfc service by means of DDMS view of
 the ADT (you must connnect the phone in debug mode and since you have
 compiled in userdebug mode you will see all the running proccesses). The
 service will 

Re: [android-developers] Re: NFC Secure Element

2012-01-19 Thread Michael Roland
Hallo Saurabh,

 I am getting This ATR now : *3B 8A 80 01 00 31 C1 73 C8 40 00 00 90 00
 90* , which I have read in this group that it is for SmartMX.

Correct, that's the PC/SC ATR for the SmartMX.

 I am looking into writing onto it but so far I am getting 63 00
 response(which means error)
 I am trying to load., authenticate the keys and then read -write and
 then read back from the SmartMX (Secure Element).
 
 *_Here is my list of commands : _*
 
 FF82006006// load keys
 FF86050100026000// authenticate
 FFB210//read sector 2
 FFD6000210// write sector 2
 FFB210 // read sector 2 again

 I followed this --  http://www.nfc-reader.com/
 NFC-smart-card-reader/ACR122-API-Manual/API_ACR122.pdf

I would guess, that the reader automatically performed protocol
selection up to ISO 14443-4 / APDU layer. In that state it is not
possible to access the MIFARE part of the chip with reader-side MIFARE
emulation. You could try the example on page 12ff of this document.

br,
Michael

-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en


Re: [android-developers] Re: NFC Secure Element

2012-01-19 Thread s.rawat
Hi  Michael ,
You mean page 12 , section *5.3 Reading Binary Block*.
I tried that, i found as soon as I send the command the green light on the
card reader turns Red for the time being(which I fear is some operation
failed signal) , accompanied by the 63 00 response .I am using the *TestResMan
*tool.Even though it shows Command is sent successfully and response
is received in XXX secs.
Can you tell me the name of card reader where we cant see
this behavior (reader automatically performed protocol selection up to ISO
14443-4 / APDU layer)

Rgds,
Saurabh

..pain is temporary.quitting lasts forever..



On Thu, Jan 19, 2012 at 6:14 PM, Michael Roland mi.rol...@gmail.com wrote:

 Hallo Saurabh,

  I am getting This ATR now : *3B 8A 80 01 00 31 C1 73 C8 40 00 00 90 00
  90* , which I have read in this group that it is for SmartMX.

 Correct, that's the PC/SC ATR for the SmartMX.

  I am looking into writing onto it but so far I am getting 63 00
  response(which means error)
  I am trying to load., authenticate the keys and then read -write and
  then read back from the SmartMX (Secure Element).
 
  *_Here is my list of commands : _*
 
  FF82006006// load keys
  FF86050100026000// authenticate
  FFB210//read sector 2
  FFD6000210// write sector 2
  FFB210 // read sector 2 again
 
  I followed this --  http://www.nfc-reader.com/
  NFC-smart-card-reader/ACR122-API-Manual/API_ACR122.pdf

 I would guess, that the reader automatically performed protocol
 selection up to ISO 14443-4 / APDU layer. In that state it is not
 possible to access the MIFARE part of the chip with reader-side MIFARE
 emulation. You could try the example on page 12ff of this document.

 br,
 Michael

 --
 You received this message because you are subscribed to the Google
 Groups Android Developers group.
 To post to this group, send email to android-developers@googlegroups.com
 To unsubscribe from this group, send email to
 android-developers+unsubscr...@googlegroups.com
 For more options, visit this group at
 http://groups.google.com/group/android-developers?hl=en


-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en

Re: [android-developers] Re: NFC Secure Element

2012-01-13 Thread s.rawat
HI,
I am gettign an ATR : A card is present. ATR: 3B 8F 80 01 80 4F 0C A0 00 00
03 06 03 *FF 40* 00 00 00 00 D4 .


I dont htink it emulated the card.Does it.For 1k/4k Mifare Classic Card it
has to be 00 01(Mifare 1k) or 00 02(Mifare 1k) instead of *FF 40* .PLz
correct my understanding.I have used the patches to enable to the phone in
Card emulation mode.


Rgds,
Saurabh
..pain is temporary.quitting lasts forever..



On Fri, Jan 6, 2012 at 11:24 AM, s.rawat imsaurabhra...@gmail.com wrote:

 Yes you are correct, now it looks fine and I can see the options getting
 ticked on the NFC Setting UI.But i was getting the segmentation fault as
 well.Plz find attached the logs( showing the logs at the boot time ).It
 shows the stack trace as well.

 Rgds,
 Saurabh
 ..pain is temporary.quitting lasts forever..



 On Thu, Jan 5, 2012 at 6:04 PM, s.rawat imsaurabhra...@gmail.com wrote:

 Sure I will try that  and post the results !

 ..pain is temporary.quitting lasts forever..



 2012/1/5 Fernando Miguélez fernando.migue...@gmail.com

 Saurabh,

 After reflashing my phone and verifying that the NFC toggle option was
 available also in main Wireless Settings Screen, and after examining your
 problem I reached the conclusion that your generated image does not include
 NFC support, only the settings screen. I reviewed the patches and *there
 was a bug. *The NFC was not enabled in building proccess because the
 wrong file was patched (device.mk instead of device_base.mk). Sorry for
 the incovenience.

 I have just updated the patches and uploaded to
 http://forum.xda-developers.com/showthread.php?p=17965091 . Could you
 please check from the beginning that now the patches are completely correct
 by rebuilding the image? It is safe to apply again over the patches files,
 since the changes apply to another file.

 On Thu, Jan 5, 2012 at 9:31 AM, s.rawat imsaurabhra...@gmail.comwrote:

 I did re-flashing from the patched Android Source and again the same
 thing.Here are the logcat logs on clicking the NFC Settings :

 D/dalvikvm(  298): GC_EXPLICIT freed 91K, 45% free 3160K/5703K,
 external 4731K/5234K, paused 290ms
 I/ActivityManager(  106): Starting: Intent {
 act=android.intent.action.MAIN cmp=com.android.settings/.WirelessSettings }
 from pid 493
 D/dalvikvm(  493): GC_EXTERNAL_ALLOC freed 55K, 50% free 2933K/5831K,
 external 2878K/3220K, paused 20ms
 E/NFC (  493): could not retrieve NFC service
 I/ActivityManager(  106): Displayed
 com.android.settings/.WirelessSettings: +351ms
 D/dalvikvm(  493): GC_EXTERNAL_ALLOC freed 43K, 49% free 3022K/5831K,
 external 3171K/3241K, paused 21ms
 I/ActivityManager(  106): Starting: Intent {
 act=android.intent.action.MAIN cmp=com.android.settings/.nfc.NfcSettings }
 from pid 493
 I/ActivityManager(  106): Displayed
 com.android.settings/.nfc.NfcSettings: +261ms


 Any clue on this.
 Rgds,
 Saurabh



 ..pain is temporary.quitting lasts forever..



 2012/1/4 Fernando Miguélez fernando.migue...@gmail.com

 Well, options are enabled in cascade. The problem comes because the
 first option is not enabled. Besides, if you look at the Wireless Settings
 screen, there is only the NFC Settings option, but not the one that lets
 you enalbe/disable NFC directly from that screen. That is beacuse the Nfc
 service in not available. Connection to a computer in debug mode will draw
 some light.

 Instead of compiling the whole image again I suggest you to compile
 just the Nfc.apk system application and replace the original one. You must
 remount /system partition in read/write mode and overwrite the apk inside
 /system/app. Then you must kill the nfc service by means of DDMS view of
 the ADT (you must connnect the phone in debug mode and since you have
 compiled in userdebug mode you will see all the running proccesses). The
 service will restart automatically.

 When it comes to read/write the card by means of an external reader,
 any Mifare Classic 4K compatible RFID reader will do. If you try to access
 directly to the SE from an Android application I am afraid to disappoint
 you but that is not possible, at least I wasn't successful at it and 
 nobody
 I know either. The reasons are well described in other posts and on
 stackoverflow.

 Regards


 On Wed, Jan 4, 2012 at 2:56 PM, s.rawat imsaurabhra...@gmail.comwrote:

 Thanks !
 I will also try from my side recompiling it.So you mean I should get
 the Check boxes enabled for
  *Only Card EmulationMode*
 and
  *Use External SE*

 My main aim is to write to the NFC card in card emulation mode so
 that it can be read by any Card Reader.is it possible after your patches
 are applied using teh android SDKs or do we have to write some native
 application.
 Rgds,
 Softy
 ..pain is temporary.quitting lasts forever..




 2012/1/4 Fernando Miguélez fernando.migue...@gmail.com

 Great work.

 Obviously there is something wrong with the compilation. Have you
 tried to connect in debug mode the phone to a 

Re: [android-developers] Re: NFC Secure Element

2012-01-05 Thread s.rawat
I did re-flashing from the patched Android Source and again the same
thing.Here are the logcat logs on clicking the NFC Settings :

D/dalvikvm(  298): GC_EXPLICIT freed 91K, 45% free 3160K/5703K, external
4731K/5234K, paused 290ms
I/ActivityManager(  106): Starting: Intent { act=android.intent.action.MAIN
cmp=com.android.settings/.WirelessSettings } from pid 493
D/dalvikvm(  493): GC_EXTERNAL_ALLOC freed 55K, 50% free 2933K/5831K,
external 2878K/3220K, paused 20ms
E/NFC (  493): could not retrieve NFC service
I/ActivityManager(  106): Displayed com.android.settings/.WirelessSettings:
+351ms
D/dalvikvm(  493): GC_EXTERNAL_ALLOC freed 43K, 49% free 3022K/5831K,
external 3171K/3241K, paused 21ms
I/ActivityManager(  106): Starting: Intent { act=android.intent.action.MAIN
cmp=com.android.settings/.nfc.NfcSettings } from pid 493
I/ActivityManager(  106): Displayed com.android.settings/.nfc.NfcSettings:
+261ms


Any clue on this.
Rgds,
Saurabh


..pain is temporary.quitting lasts forever..



2012/1/4 Fernando Miguélez fernando.migue...@gmail.com

 Well, options are enabled in cascade. The problem comes because the first
 option is not enabled. Besides, if you look at the Wireless Settings
 screen, there is only the NFC Settings option, but not the one that lets
 you enalbe/disable NFC directly from that screen. That is beacuse the Nfc
 service in not available. Connection to a computer in debug mode will draw
 some light.

 Instead of compiling the whole image again I suggest you to compile just
 the Nfc.apk system application and replace the original one. You must
 remount /system partition in read/write mode and overwrite the apk inside
 /system/app. Then you must kill the nfc service by means of DDMS view of
 the ADT (you must connnect the phone in debug mode and since you have
 compiled in userdebug mode you will see all the running proccesses). The
 service will restart automatically.

 When it comes to read/write the card by means of an external reader, any
 Mifare Classic 4K compatible RFID reader will do. If you try to access
 directly to the SE from an Android application I am afraid to disappoint
 you but that is not possible, at least I wasn't successful at it and nobody
 I know either. The reasons are well described in other posts and on
 stackoverflow.

 Regards


 On Wed, Jan 4, 2012 at 2:56 PM, s.rawat imsaurabhra...@gmail.com wrote:

 Thanks !
 I will also try from my side recompiling it.So you mean I should get the
 Check boxes enabled for
  *Only Card EmulationMode*
 and
  *Use External SE*

 My main aim is to write to the NFC card in card emulation mode so that it
 can be read by any Card Reader.is it possible after your patches are
 applied using teh android SDKs or do we have to write some native
 application.
 Rgds,
 Softy
 ..pain is temporary.quitting lasts forever..




 2012/1/4 Fernando Miguélez fernando.migue...@gmail.com

 Great work.

 Obviously there is something wrong with the compilation. Have you tried
 to connect in debug mode the phone to a computer with Android Development
 Tools and see what the traces look like. They may offer a clue. My
 suspicion is that NfcService is crashing. I will review my notes tomorrow
 if I find something different to the steps you followed to build the image.

 On Wed, Jan 4, 2012 at 9:17 AM, softy imsaurabhra...@gmail.com wrote:

 Hi All,
 Thanks Fernando Miguélez Palomo for posting the patches.I have applied
 it to 2.3.4-r1 Android gingerbread and compiled /flashed it on Samsung
 Nexus S and was able to see the NFC Settings changed(though i cant select
 them, they are disabled)
 I have blogged the whole steps 
 herehttp://techshek4u.blogspot.com/2012/01/applying-card-emulation-patch-to_03.html.Plz
  let me know if I miss something.

 @ Fernando Miguélez Palomo
 What next after that.How can i test this.Any source code or tool /card
 reader description will be enlightening.
 Rgds,
 softy

 --
 You received this message because you are subscribed to the Google
 Groups Android Developers group.
 To post to this group, send email to
 android-developers@googlegroups.com
 To unsubscribe from this group, send email to
 android-developers+unsubscr...@googlegroups.com
 For more options, visit this group at
 http://groups.google.com/group/android-developers?hl=en


  --
 You received this message because you are subscribed to the Google
 Groups Android Developers group.
 To post to this group, send email to android-developers@googlegroups.com
 To unsubscribe from this group, send email to
 android-developers+unsubscr...@googlegroups.com
 For more options, visit this group at
 http://groups.google.com/group/android-developers?hl=en


  --
 You received this message because you are subscribed to the Google
 Groups Android Developers group.
 To post to this group, send email to android-developers@googlegroups.com
 To unsubscribe from this group, send email to
 android-developers+unsubscr...@googlegroups.com
 For more options, visit this 

Re: [android-developers] Re: NFC Secure Element

2012-01-05 Thread Fernando Miguélez
Hi Saurabdh,

I reviewed my notes and I definetly built the image with lunch
full_crespo-eng. Try building in engineer mode so the traces can be more
verbose. Apart from that the process to compile the firmware is the same
you described in your blog.



On Thu, Jan 5, 2012 at 9:31 AM, s.rawat imsaurabhra...@gmail.com wrote:

 I did re-flashing from the patched Android Source and again the same
 thing.Here are the logcat logs on clicking the NFC Settings :

 D/dalvikvm(  298): GC_EXPLICIT freed 91K, 45% free 3160K/5703K, external
 4731K/5234K, paused 290ms
 I/ActivityManager(  106): Starting: Intent {
 act=android.intent.action.MAIN cmp=com.android.settings/.WirelessSettings }
 from pid 493
 D/dalvikvm(  493): GC_EXTERNAL_ALLOC freed 55K, 50% free 2933K/5831K,
 external 2878K/3220K, paused 20ms
 E/NFC (  493): could not retrieve NFC service
 I/ActivityManager(  106): Displayed
 com.android.settings/.WirelessSettings: +351ms
 D/dalvikvm(  493): GC_EXTERNAL_ALLOC freed 43K, 49% free 3022K/5831K,
 external 3171K/3241K, paused 21ms
 I/ActivityManager(  106): Starting: Intent {
 act=android.intent.action.MAIN cmp=com.android.settings/.nfc.NfcSettings }
 from pid 493
 I/ActivityManager(  106): Displayed com.android.settings/.nfc.NfcSettings:
 +261ms


 Any clue on this.
 Rgds,
 Saurabh



 ..pain is temporary.quitting lasts forever..



 2012/1/4 Fernando Miguélez fernando.migue...@gmail.com

 Well, options are enabled in cascade. The problem comes because the first
 option is not enabled. Besides, if you look at the Wireless Settings
 screen, there is only the NFC Settings option, but not the one that lets
 you enalbe/disable NFC directly from that screen. That is beacuse the Nfc
 service in not available. Connection to a computer in debug mode will draw
 some light.

 Instead of compiling the whole image again I suggest you to compile just
 the Nfc.apk system application and replace the original one. You must
 remount /system partition in read/write mode and overwrite the apk inside
 /system/app. Then you must kill the nfc service by means of DDMS view of
 the ADT (you must connnect the phone in debug mode and since you have
 compiled in userdebug mode you will see all the running proccesses). The
 service will restart automatically.

 When it comes to read/write the card by means of an external reader, any
 Mifare Classic 4K compatible RFID reader will do. If you try to access
 directly to the SE from an Android application I am afraid to disappoint
 you but that is not possible, at least I wasn't successful at it and nobody
 I know either. The reasons are well described in other posts and on
 stackoverflow.

 Regards


 On Wed, Jan 4, 2012 at 2:56 PM, s.rawat imsaurabhra...@gmail.com wrote:

 Thanks !
 I will also try from my side recompiling it.So you mean I should get the
 Check boxes enabled for
  *Only Card EmulationMode*
 and
  *Use External SE*

 My main aim is to write to the NFC card in card emulation mode so that
 it can be read by any Card Reader.is it possible after your patches are
 applied using teh android SDKs or do we have to write some native
 application.
 Rgds,
 Softy
 ..pain is temporary.quitting lasts forever..




 2012/1/4 Fernando Miguélez fernando.migue...@gmail.com

 Great work.

 Obviously there is something wrong with the compilation. Have you tried
 to connect in debug mode the phone to a computer with Android Development
 Tools and see what the traces look like. They may offer a clue. My
 suspicion is that NfcService is crashing. I will review my notes tomorrow
 if I find something different to the steps you followed to build the image.

 On Wed, Jan 4, 2012 at 9:17 AM, softy imsaurabhra...@gmail.com wrote:

 Hi All,
 Thanks Fernando Miguélez Palomo for posting the patches.I have applied
 it to 2.3.4-r1 Android gingerbread and compiled /flashed it on Samsung
 Nexus S and was able to see the NFC Settings changed(though i cant select
 them, they are disabled)
 I have blogged the whole steps 
 herehttp://techshek4u.blogspot.com/2012/01/applying-card-emulation-patch-to_03.html.Plz
  let me know if I miss something.

 @ Fernando Miguélez Palomo
 What next after that.How can i test this.Any source code or tool /card
 reader description will be enlightening.
 Rgds,
 softy

 --
 You received this message because you are subscribed to the Google
 Groups Android Developers group.
 To post to this group, send email to
 android-developers@googlegroups.com
 To unsubscribe from this group, send email to
 android-developers+unsubscr...@googlegroups.com
 For more options, visit this group at
 http://groups.google.com/group/android-developers?hl=en


  --
 You received this message because you are subscribed to the Google
 Groups Android Developers group.
 To post to this group, send email to
 android-developers@googlegroups.com
 To unsubscribe from this group, send email to
 android-developers+unsubscr...@googlegroups.com
 For more options, visit this group at
 

Re: [android-developers] Re: NFC Secure Element

2012-01-05 Thread Fernando Miguélez
Saurabh,

After reflashing my phone and verifying that the NFC toggle option was
available also in main Wireless Settings Screen, and after examining your
problem I reached the conclusion that your generated image does not include
NFC support, only the settings screen. I reviewed the patches and *there
was a bug. *The NFC was not enabled in building proccess because the wrong
file was patched (device.mk instead of device_base.mk). Sorry for the
incovenience.

I have just updated the patches and uploaded to
http://forum.xda-developers.com/showthread.php?p=17965091 . Could you
please check from the beginning that now the patches are completely correct
by rebuilding the image? It is safe to apply again over the patches files,
since the changes apply to another file.

On Thu, Jan 5, 2012 at 9:31 AM, s.rawat imsaurabhra...@gmail.com wrote:

 I did re-flashing from the patched Android Source and again the same
 thing.Here are the logcat logs on clicking the NFC Settings :

 D/dalvikvm(  298): GC_EXPLICIT freed 91K, 45% free 3160K/5703K, external
 4731K/5234K, paused 290ms
 I/ActivityManager(  106): Starting: Intent {
 act=android.intent.action.MAIN cmp=com.android.settings/.WirelessSettings }
 from pid 493
 D/dalvikvm(  493): GC_EXTERNAL_ALLOC freed 55K, 50% free 2933K/5831K,
 external 2878K/3220K, paused 20ms
 E/NFC (  493): could not retrieve NFC service
 I/ActivityManager(  106): Displayed
 com.android.settings/.WirelessSettings: +351ms
 D/dalvikvm(  493): GC_EXTERNAL_ALLOC freed 43K, 49% free 3022K/5831K,
 external 3171K/3241K, paused 21ms
 I/ActivityManager(  106): Starting: Intent {
 act=android.intent.action.MAIN cmp=com.android.settings/.nfc.NfcSettings }
 from pid 493
 I/ActivityManager(  106): Displayed com.android.settings/.nfc.NfcSettings:
 +261ms


 Any clue on this.
 Rgds,
 Saurabh



 ..pain is temporary.quitting lasts forever..



 2012/1/4 Fernando Miguélez fernando.migue...@gmail.com

 Well, options are enabled in cascade. The problem comes because the first
 option is not enabled. Besides, if you look at the Wireless Settings
 screen, there is only the NFC Settings option, but not the one that lets
 you enalbe/disable NFC directly from that screen. That is beacuse the Nfc
 service in not available. Connection to a computer in debug mode will draw
 some light.

 Instead of compiling the whole image again I suggest you to compile just
 the Nfc.apk system application and replace the original one. You must
 remount /system partition in read/write mode and overwrite the apk inside
 /system/app. Then you must kill the nfc service by means of DDMS view of
 the ADT (you must connnect the phone in debug mode and since you have
 compiled in userdebug mode you will see all the running proccesses). The
 service will restart automatically.

 When it comes to read/write the card by means of an external reader, any
 Mifare Classic 4K compatible RFID reader will do. If you try to access
 directly to the SE from an Android application I am afraid to disappoint
 you but that is not possible, at least I wasn't successful at it and nobody
 I know either. The reasons are well described in other posts and on
 stackoverflow.

 Regards


 On Wed, Jan 4, 2012 at 2:56 PM, s.rawat imsaurabhra...@gmail.com wrote:

 Thanks !
 I will also try from my side recompiling it.So you mean I should get the
 Check boxes enabled for
  *Only Card EmulationMode*
 and
  *Use External SE*

 My main aim is to write to the NFC card in card emulation mode so that
 it can be read by any Card Reader.is it possible after your patches are
 applied using teh android SDKs or do we have to write some native
 application.
 Rgds,
 Softy
 ..pain is temporary.quitting lasts forever..




 2012/1/4 Fernando Miguélez fernando.migue...@gmail.com

 Great work.

 Obviously there is something wrong with the compilation. Have you tried
 to connect in debug mode the phone to a computer with Android Development
 Tools and see what the traces look like. They may offer a clue. My
 suspicion is that NfcService is crashing. I will review my notes tomorrow
 if I find something different to the steps you followed to build the image.

 On Wed, Jan 4, 2012 at 9:17 AM, softy imsaurabhra...@gmail.com wrote:

 Hi All,
 Thanks Fernando Miguélez Palomo for posting the patches.I have applied
 it to 2.3.4-r1 Android gingerbread and compiled /flashed it on Samsung
 Nexus S and was able to see the NFC Settings changed(though i cant select
 them, they are disabled)
 I have blogged the whole steps 
 herehttp://techshek4u.blogspot.com/2012/01/applying-card-emulation-patch-to_03.html.Plz
  let me know if I miss something.

 @ Fernando Miguélez Palomo
 What next after that.How can i test this.Any source code or tool /card
 reader description will be enlightening.
 Rgds,
 softy

 --
 You received this message because you are subscribed to the Google
 Groups Android Developers group.
 To post to this group, send email to
 android-developers@googlegroups.com
 To 

Re: [android-developers] Re: NFC Secure Element

2012-01-05 Thread s.rawat
Sure I will try that  and post the results !
..pain is temporary.quitting lasts forever..



2012/1/5 Fernando Miguélez fernando.migue...@gmail.com

 Saurabh,

 After reflashing my phone and verifying that the NFC toggle option was
 available also in main Wireless Settings Screen, and after examining your
 problem I reached the conclusion that your generated image does not include
 NFC support, only the settings screen. I reviewed the patches and *there
 was a bug. *The NFC was not enabled in building proccess because the
 wrong file was patched (device.mk instead of device_base.mk). Sorry for
 the incovenience.

 I have just updated the patches and uploaded to
 http://forum.xda-developers.com/showthread.php?p=17965091 . Could you
 please check from the beginning that now the patches are completely correct
 by rebuilding the image? It is safe to apply again over the patches files,
 since the changes apply to another file.

 On Thu, Jan 5, 2012 at 9:31 AM, s.rawat imsaurabhra...@gmail.com wrote:

 I did re-flashing from the patched Android Source and again the same
 thing.Here are the logcat logs on clicking the NFC Settings :

 D/dalvikvm(  298): GC_EXPLICIT freed 91K, 45% free 3160K/5703K, external
 4731K/5234K, paused 290ms
 I/ActivityManager(  106): Starting: Intent {
 act=android.intent.action.MAIN cmp=com.android.settings/.WirelessSettings }
 from pid 493
 D/dalvikvm(  493): GC_EXTERNAL_ALLOC freed 55K, 50% free 2933K/5831K,
 external 2878K/3220K, paused 20ms
 E/NFC (  493): could not retrieve NFC service
 I/ActivityManager(  106): Displayed
 com.android.settings/.WirelessSettings: +351ms
 D/dalvikvm(  493): GC_EXTERNAL_ALLOC freed 43K, 49% free 3022K/5831K,
 external 3171K/3241K, paused 21ms
 I/ActivityManager(  106): Starting: Intent {
 act=android.intent.action.MAIN cmp=com.android.settings/.nfc.NfcSettings }
 from pid 493
 I/ActivityManager(  106): Displayed
 com.android.settings/.nfc.NfcSettings: +261ms


 Any clue on this.
 Rgds,
 Saurabh



 ..pain is temporary.quitting lasts forever..



 2012/1/4 Fernando Miguélez fernando.migue...@gmail.com

 Well, options are enabled in cascade. The problem comes because the
 first option is not enabled. Besides, if you look at the Wireless Settings
 screen, there is only the NFC Settings option, but not the one that lets
 you enalbe/disable NFC directly from that screen. That is beacuse the Nfc
 service in not available. Connection to a computer in debug mode will draw
 some light.

 Instead of compiling the whole image again I suggest you to compile just
 the Nfc.apk system application and replace the original one. You must
 remount /system partition in read/write mode and overwrite the apk inside
 /system/app. Then you must kill the nfc service by means of DDMS view of
 the ADT (you must connnect the phone in debug mode and since you have
 compiled in userdebug mode you will see all the running proccesses). The
 service will restart automatically.

 When it comes to read/write the card by means of an external reader, any
 Mifare Classic 4K compatible RFID reader will do. If you try to access
 directly to the SE from an Android application I am afraid to disappoint
 you but that is not possible, at least I wasn't successful at it and nobody
 I know either. The reasons are well described in other posts and on
 stackoverflow.

 Regards


 On Wed, Jan 4, 2012 at 2:56 PM, s.rawat imsaurabhra...@gmail.comwrote:

 Thanks !
 I will also try from my side recompiling it.So you mean I should get
 the Check boxes enabled for
  *Only Card EmulationMode*
 and
  *Use External SE*

 My main aim is to write to the NFC card in card emulation mode so that
 it can be read by any Card Reader.is it possible after your patches are
 applied using teh android SDKs or do we have to write some native
 application.
 Rgds,
 Softy
 ..pain is temporary.quitting lasts forever..




 2012/1/4 Fernando Miguélez fernando.migue...@gmail.com

 Great work.

 Obviously there is something wrong with the compilation. Have you
 tried to connect in debug mode the phone to a computer with Android
 Development Tools and see what the traces look like. They may offer a 
 clue.
 My suspicion is that NfcService is crashing. I will review my notes
 tomorrow if I find something different to the steps you followed to build
 the image.

 On Wed, Jan 4, 2012 at 9:17 AM, softy imsaurabhra...@gmail.comwrote:

 Hi All,
 Thanks Fernando Miguélez Palomo for posting the patches.I have
 applied it to 2.3.4-r1 Android gingerbread and compiled /flashed it on
 Samsung Nexus S and was able to see the NFC Settings changed(though i 
 cant
 select them, they are disabled)
 I have blogged the whole steps 
 herehttp://techshek4u.blogspot.com/2012/01/applying-card-emulation-patch-to_03.html.Plz
  let me know if I miss something.

 @ Fernando Miguélez Palomo
 What next after that.How can i test this.Any source code or tool
 /card reader description will be enlightening.
 Rgds,
 softy

 --
 You 

[android-developers] Re: NFC Secure Element

2012-01-04 Thread softy
Hi All, 
Thanks Fernando Miguélez Palomo for posting the patches.I have applied it 
to 2.3.4-r1 Android gingerbread and compiled /flashed it on Samsung Nexus S 
and was able to see the NFC Settings changed(though i cant select them, 
they are disabled)
I have blogged the whole steps 
herehttp://techshek4u.blogspot.com/2012/01/applying-card-emulation-patch-to_03.html.Plz
 let me know if I miss something.

@ Fernando Miguélez Palomo
What next after that.How can i test this.Any source code or tool /card 
reader description will be enlightening.
Rgds,
softy

-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en

Re: [android-developers] Re: NFC Secure Element

2012-01-04 Thread Fernando Miguélez
Great work.

Obviously there is something wrong with the compilation. Have you tried to
connect in debug mode the phone to a computer with Android Development
Tools and see what the traces look like. They may offer a clue. My
suspicion is that NfcService is crashing. I will review my notes tomorrow
if I find something different to the steps you followed to build the image.

On Wed, Jan 4, 2012 at 9:17 AM, softy imsaurabhra...@gmail.com wrote:

 Hi All,
 Thanks Fernando Miguélez Palomo for posting the patches.I have applied it
 to 2.3.4-r1 Android gingerbread and compiled /flashed it on Samsung Nexus S
 and was able to see the NFC Settings changed(though i cant select them,
 they are disabled)
 I have blogged the whole steps 
 herehttp://techshek4u.blogspot.com/2012/01/applying-card-emulation-patch-to_03.html.Plz
  let me know if I miss something.

 @ Fernando Miguélez Palomo
 What next after that.How can i test this.Any source code or tool /card
 reader description will be enlightening.
 Rgds,
 softy

 --
 You received this message because you are subscribed to the Google
 Groups Android Developers group.
 To post to this group, send email to android-developers@googlegroups.com
 To unsubscribe from this group, send email to
 android-developers+unsubscr...@googlegroups.com
 For more options, visit this group at
 http://groups.google.com/group/android-developers?hl=en


-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en

Re: [android-developers] Re: NFC Secure Element

2012-01-04 Thread s.rawat
Thanks !
I will also try from my side recompiling it.So you mean I should get the
Check boxes enabled for
 *Only Card EmulationMode*
and
 *Use External SE*

My main aim is to write to the NFC card in card emulation mode so that it
can be read by any Card Reader.is it possible after your patches are
applied using teh android SDKs or do we have to write some native
application.
Rgds,
Softy
..pain is temporary.quitting lasts forever..



2012/1/4 Fernando Miguélez fernando.migue...@gmail.com

 Great work.

 Obviously there is something wrong with the compilation. Have you tried to
 connect in debug mode the phone to a computer with Android Development
 Tools and see what the traces look like. They may offer a clue. My
 suspicion is that NfcService is crashing. I will review my notes tomorrow
 if I find something different to the steps you followed to build the image.

 On Wed, Jan 4, 2012 at 9:17 AM, softy imsaurabhra...@gmail.com wrote:

 Hi All,
 Thanks Fernando Miguélez Palomo for posting the patches.I have applied it
 to 2.3.4-r1 Android gingerbread and compiled /flashed it on Samsung Nexus S
 and was able to see the NFC Settings changed(though i cant select them,
 they are disabled)
 I have blogged the whole steps 
 herehttp://techshek4u.blogspot.com/2012/01/applying-card-emulation-patch-to_03.html.Plz
  let me know if I miss something.

 @ Fernando Miguélez Palomo
 What next after that.How can i test this.Any source code or tool /card
 reader description will be enlightening.
 Rgds,
 softy

 --
 You received this message because you are subscribed to the Google
 Groups Android Developers group.
 To post to this group, send email to android-developers@googlegroups.com
 To unsubscribe from this group, send email to
 android-developers+unsubscr...@googlegroups.com
 For more options, visit this group at
 http://groups.google.com/group/android-developers?hl=en


  --
 You received this message because you are subscribed to the Google
 Groups Android Developers group.
 To post to this group, send email to android-developers@googlegroups.com
 To unsubscribe from this group, send email to
 android-developers+unsubscr...@googlegroups.com
 For more options, visit this group at
 http://groups.google.com/group/android-developers?hl=en


-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en

Re: [android-developers] Re: NFC Secure Element

2012-01-04 Thread Fernando Miguélez
Well, options are enabled in cascade. The problem comes because the first
option is not enabled. Besides, if you look at the Wireless Settings
screen, there is only the NFC Settings option, but not the one that lets
you enalbe/disable NFC directly from that screen. That is beacuse the Nfc
service in not available. Connection to a computer in debug mode will draw
some light.

Instead of compiling the whole image again I suggest you to compile just
the Nfc.apk system application and replace the original one. You must
remount /system partition in read/write mode and overwrite the apk inside
/system/app. Then you must kill the nfc service by means of DDMS view of
the ADT (you must connnect the phone in debug mode and since you have
compiled in userdebug mode you will see all the running proccesses). The
service will restart automatically.

When it comes to read/write the card by means of an external reader, any
Mifare Classic 4K compatible RFID reader will do. If you try to access
directly to the SE from an Android application I am afraid to disappoint
you but that is not possible, at least I wasn't successful at it and nobody
I know either. The reasons are well described in other posts and on
stackoverflow.

Regards

On Wed, Jan 4, 2012 at 2:56 PM, s.rawat imsaurabhra...@gmail.com wrote:

 Thanks !
 I will also try from my side recompiling it.So you mean I should get the
 Check boxes enabled for
  *Only Card EmulationMode*
 and
  *Use External SE*

 My main aim is to write to the NFC card in card emulation mode so that it
 can be read by any Card Reader.is it possible after your patches are
 applied using teh android SDKs or do we have to write some native
 application.
 Rgds,
 Softy
 ..pain is temporary.quitting lasts forever..




 2012/1/4 Fernando Miguélez fernando.migue...@gmail.com

 Great work.

 Obviously there is something wrong with the compilation. Have you tried
 to connect in debug mode the phone to a computer with Android Development
 Tools and see what the traces look like. They may offer a clue. My
 suspicion is that NfcService is crashing. I will review my notes tomorrow
 if I find something different to the steps you followed to build the image.

 On Wed, Jan 4, 2012 at 9:17 AM, softy imsaurabhra...@gmail.com wrote:

 Hi All,
 Thanks Fernando Miguélez Palomo for posting the patches.I have applied
 it to 2.3.4-r1 Android gingerbread and compiled /flashed it on Samsung
 Nexus S and was able to see the NFC Settings changed(though i cant select
 them, they are disabled)
 I have blogged the whole steps 
 herehttp://techshek4u.blogspot.com/2012/01/applying-card-emulation-patch-to_03.html.Plz
  let me know if I miss something.

 @ Fernando Miguélez Palomo
 What next after that.How can i test this.Any source code or tool /card
 reader description will be enlightening.
 Rgds,
 softy

 --
 You received this message because you are subscribed to the Google
 Groups Android Developers group.
 To post to this group, send email to android-developers@googlegroups.com
 To unsubscribe from this group, send email to
 android-developers+unsubscr...@googlegroups.com
 For more options, visit this group at
 http://groups.google.com/group/android-developers?hl=en


  --
 You received this message because you are subscribed to the Google
 Groups Android Developers group.
 To post to this group, send email to android-developers@googlegroups.com
 To unsubscribe from this group, send email to
 android-developers+unsubscr...@googlegroups.com
 For more options, visit this group at
 http://groups.google.com/group/android-developers?hl=en


  --
 You received this message because you are subscribed to the Google
 Groups Android Developers group.
 To post to this group, send email to android-developers@googlegroups.com
 To unsubscribe from this group, send email to
 android-developers+unsubscr...@googlegroups.com
 For more options, visit this group at
 http://groups.google.com/group/android-developers?hl=en


-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en

Re: [android-developers] Re: NFC Secure Element

2011-12-21 Thread mickae1
Hi,

I would like to know if it's possible to wirte data on the card with an 
android application ? Or is it the problem that you have been talking about 
a secret key that no one know ?

Thx for the answer,

-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en

Re: [android-developers] Re: NFC Secure Element

2011-11-29 Thread fuful
I only have a checkbox 'NFC', to activate the NFC reader.
Activated (or not), the phone doesn't act as a Mifare tag on every Mifare 
test system I own.
Is there something else I can check ?

-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en

Re: [android-developers] Re: NFC Secure Element

2011-11-29 Thread Fernando Miguélez
Then the patches are not correctly applied.

On Tue, Nov 29, 2011 at 9:56 AM, fuful ludwig.fulg...@gmail.com wrote:

 I only have a checkbox 'NFC', to activate the NFC reader.
 Activated (or not), the phone doesn't act as a Mifare tag on every Mifare
 test system I own.
 Is there something else I can check ?

 --
 You received this message because you are subscribed to the Google
 Groups Android Developers group.
 To post to this group, send email to android-developers@googlegroups.com
 To unsubscribe from this group, send email to
 android-developers+unsubscr...@googlegroups.com
 For more options, visit this group at
 http://groups.google.com/group/android-developers?hl=en


-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en

Re: [android-developers] Re: NFC Secure Element

2011-11-29 Thread fuful
OK, understood.
Now my next question will be about this patch : how can I apply it ?
I'm totally new at Android, and I have no idea how to add this patch to my 
phone.
Is there some information on the web somewhere I can follow do perform this 
?
Thank for your answer.

-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en

[android-developers] Re: NFC Secure Element

2011-11-28 Thread fuful
Dear all,
I've downloaded rom from Tommy, but I don't see the option Fernando is 
speaking of, about card emulation.
Wherre these options are placed ?
Thanks in advance.

-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en

Re: [android-developers] Re: NFC Secure Element

2011-11-28 Thread Fernando Miguélez
There should be an option in Settings Screen (NFC Settings)

On Fri, Nov 25, 2011 at 11:41 AM, fuful ludwig.fulg...@gmail.com wrote:

 Dear all,
 I've downloaded rom from Tommy, but I don't see the option Fernando is
 speaking of, about card emulation.
 Wherre these options are placed ?
 Thanks in advance.

 --
 You received this message because you are subscribed to the Google
 Groups Android Developers group.
 To post to this group, send email to android-developers@googlegroups.com
 To unsubscribe from this group, send email to
 android-developers+unsubscr...@googlegroups.com
 For more options, visit this group at
 http://groups.google.com/group/android-developers?hl=en


-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en

[android-developers] Re: NFC Secure Element

2011-09-29 Thread Fernando Miguélez Palomo
I polished the patches so now you have some options from Settings 
application:

Card Emulation Only Mode. This disables reader function. Card emulation mode 
is always enabled. Be careful because P2P mode may not work (not tested)
Use External Secure Element if Available. This makes the phone to use the SE 
of the UICC if available instead of embedded one.
I posted the patches on 
xda-developershttp://forum.xda-developers.com/showthread.php?t=1281946

As a bonus I also removed the stupid time-limit when enable discoverable 
option of Bluetooth.

-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en

[android-developers] Re: NFC Secure Element

2011-09-29 Thread Fernando Miguélez Palomo
For the time being I can not share the ROM but you can compile it yourself 
with the supplied patches. Take a look at the last ones: 
https://groups.google.com/d/msg/android-developers/1fw1qfFqpGc/pvhc11jVDEUJ

-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en

[android-developers] Re: NFC Secure Element

2011-09-29 Thread Tommy


On 9月19日, 下午5时20分, Rames P rame...@gmail.com wrote:
 Hi Fernando Miguélez Palomo

 Did you get the ROM working for Nexus S with NFC card emulation enabled? I
 so can you please share the rom? Your answer might be very useful
 to achieve a position in my carrer.

 Thanks

Here is my Nexus S ROM of Card Emulation  http://dl.dbank.com/c0wutpddbv
.I modified the source code base on Fernando's.You can download and
test it.Good Luck!

-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en


[android-developers] Re: NFC Secure Element

2011-09-19 Thread Rames P
Hi Fernando Miguélez Palomo

Did you get the ROM working for Nexus S with NFC card emulation enabled? I 
so can you please share the rom? Your answer might be very useful 
to achieve a position in my carrer.

Thanks

-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en

[android-developers] Re: NFC Secure Element

2011-08-26 Thread Tommy
hi all:
Now i modified the download android source code 2.3.4 for card
emulation like Fernando's diffs.I make the modified source code on my
vmware+ubuntu success,make the sdk success,and make the download
samsung kernal code success.But now how can i use these changes on my
Nexus S phone?What can i do, step by step to make my Nexus S to be
card emulation. Thanks for any help.

tommy.yang

-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en


[android-developers] Re: NFC Secure Element

2011-08-16 Thread JhonatanAA(Colombia)
hello 
You did as reading and writing a block in Mifare 4K Nexus emulates inside S 
with 
a external card reader.
You can post the step by step or guide us in this process
thanks

-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en

[android-developers] Re: NFC Secure Element

2011-08-05 Thread Tommy
Hi.
   Now i modified the source code like the nemik's diffs before for my
Nexus S.But when i make the source code i got errors

packages/apps/Nfc/src/com/android/nfc/NfcService.java:47: cannot find
symbol
symbol  : class INfcSecureElement
location: package android.nfc
import android.nfc.INfcSecureElement;

i think it's because i used the @hide methods.How can i find a way to
make it work?
Thanks for any tips.

Regards
tommy.yang

-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en


[android-developers] Re: NFC Secure Element

2011-08-04 Thread Xiang
Hi,

Thanks for the information and patches for manually enabling the card
emulation in Android. I am able to read and write a block into the
Mifare 4K emulated inside Nexus S using an external card reader. Is it
possible to read the data inside the Mifare 4K from Android
application? Is SEEK patches able to perform that?

Thanks again.


Regards,
Xiang


On Jul 19, 6:48 pm, Fernando Miguélez Palomo
fernando.migue...@gmail.com wrote:
 I got it working on 2.3.4_r1!!!

 The key was enabling discoverability but in card emulation mode. The strange
 thing is now I can detect two smart card types with an Arcontia smart card
 reader:

    - ISO14443A tag CL1 tag (This is the Mifare 4K)
    - FELICA RCS-885 424kbs tag (I suppose this is really the Javacard, not a
    Felica card)

 I managed to write and read a block (4) to the Mifare 4K with default keys.
 Next thing will be investigating wheter 2.3.4 adds support by means of
 nxp-nfc library to directly send APDUs to the SE. You and Michael Roland
 already confirmed it was not possible with prior gingerbread versions.

 I post the corrected patch to get card emulation on 2.3.4_r1.

 One thing. Card stops being readable from an external reader after screen
 goes off and back on. However if you disable NFC and re-enable it (from
 settings) card is discoverable again.

 Thanks nemik for your work (you can update your patches with these
 corretions to work with gingerbread 2.3.4_r1 at your site if you want).

  Nfc-app-2_3_4_r1.diff
 31KViewDownload

-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en


Re: [android-developers] Re: NFC Secure Element

2011-08-04 Thread Fernando Miguélez
If you follow the complete thread you will answer yourself to both
questions, no.
El 05/08/2011 00:15, Xiang xiang...@gmail.com escribió:
 Hi,

 Thanks for the information and patches for manually enabling the card
 emulation in Android. I am able to read and write a block into the
 Mifare 4K emulated inside Nexus S using an external card reader. Is it
 possible to read the data inside the Mifare 4K from Android
 application? Is SEEK patches able to perform that?

 Thanks again.


 Regards,
 Xiang


 On Jul 19, 6:48 pm, Fernando Miguélez Palomo
 fernando.migue...@gmail.com wrote:
 I got it working on 2.3.4_r1!!!

 The key was enabling discoverability but in card emulation mode. The
strange
 thing is now I can detect two smart card types with an Arcontia smart
card
 reader:

- ISO14443A tag CL1 tag (This is the Mifare 4K)
- FELICA RCS-885 424kbs tag (I suppose this is really the Javacard,
not a
Felica card)

 I managed to write and read a block (4) to the Mifare 4K with default
keys.
 Next thing will be investigating wheter 2.3.4 adds support by means of
 nxp-nfc library to directly send APDUs to the SE. You and Michael Roland
 already confirmed it was not possible with prior gingerbread versions.

 I post the corrected patch to get card emulation on 2.3.4_r1.

 One thing. Card stops being readable from an external reader after screen
 goes off and back on. However if you disable NFC and re-enable it (from
 settings) card is discoverable again.

 Thanks nemik for your work (you can update your patches with these
 corretions to work with gingerbread 2.3.4_r1 at your site if you want).

  Nfc-app-2_3_4_r1.diff
 31KViewDownload

 --
 You received this message because you are subscribed to the Google
 Groups Android Developers group.
 To post to this group, send email to android-developers@googlegroups.com
 To unsubscribe from this group, send email to
 android-developers+unsubscr...@googlegroups.com
 For more options, visit this group at
 http://groups.google.com/group/android-developers?hl=en

-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en

Re: [android-developers] Re: NFC Secure Element

2011-08-01 Thread Michael Roland
Hallo Fernando,

 From what I've read in the PN544 User Manual, I don't think that there
 is an equvalent for the wired mode with SWP/HCI (I would be happy to be
 proven wrong).

 Well, here is where the  phHal4Nfc_Switch_Swp_Mode()  comes. It is
 analog to the phHal4Nfc_Switch_SMX_Mode() which is used to set the
 wired mode to work with the SmartMX.
 I modified the function to use phHal4Nfc_Switch_Swp_Mode() with
 parameter eSWP_Switch_On (this parameter has an incorrect value by
 default, it must be enabled by using nemik's patches).

If you are refering to this patch:
http://nemik.net/code/android-nfc/libnfc-nxp.diff

Then I don't see how it changes the value of eSWP_Switch_On

typedef enum phHal_eSWP_Mode{
  eSWP_Switch_Off  = 0x00U,   /* SWP Link is Switched off */
+ //eSWP_Switch_Off,   /* SWP Link is Switched off */
  eSWP_Switch_Default, /* SWP is in Default Configuration Mode */
- eSWP_Switch_On   /* SWP Link is Switched on */
+ eSWP_Switch_On   /* SWP Link is Switched on */
+ //eSWP_Switch_On= 0x00U /* SWP Link is Switched on */
} phHal_eSWP_Mode_t;

After this patch eSWP_Switch_On still is 0x02. Which is in fact the
correct value according to PN544 user manual:

  SWP Switch Mode Event Parameters:
  -
  Value   Description
  -
  0x00Off (deactivated)
  0x01Default mode
  0x02On (activated)
  others  RFU

So there is no equivalent to the wired mode, but only options to
enable/disable external emulation.

 When it comes to RIL issue. I patched the sources with SEEK diffs too
 but rild daemon crashes. SEEK mantainers say it is due to baseband
 processor not implementing required (AT+CSIM, AT+CCHO, AT+CCHC, AT+CGLA)
 commands (http://code.google.com/p/seek-for-android/wiki/UICCSupport).

Correct.

 Is there any way to reverse engineer baseband firmware or get access to
 a modified version implementing those commands? Or has anyone discovered
 whether Samsung has other propietary commands achieving the same results
 (raw APDU exchange with SIM/UICC)?

I believe this would be the most promising direction. Unfortunately, I
haven't found much information on this.

br
Michael


-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en


Re: [android-developers] Re: NFC Secure Element

2011-07-27 Thread Fernando Miguélez Palomo
Hi Michael,

Correct, for the SE connected through NFC-WI/S2C, the NFC controller has
 three modes: off, wired and virtual mode. Off means that there is no
 communication with the secure element. Wired mode means that the secure
 element is visible to the application processor as if it was a
 (contactless) smartcard connected to the RF reader. Virtual mode means
 that the secure element is visible to external readers as if the phone
 were a contactless smartcard.

 That's right.
 

 From what I've read in the PN544 User Manual, I don't think that there
 is an equvalent for the wired mode with SWP/HCI (I would be happy to be
 proven wrong). Usually for the wired mode, the contact interface of
 the UICC would be used so it wouldn't really make sense if the NFC
 controller allowed for an additional* channel between the UICC and the
 application processor.

 *) Additional once the RIL supported APDU exchange with the UICC.

 Well, here is where the  *phHal4Nfc_Switch_Swp_Mode()  *comes*. *It is 
analog to the *phHal4Nfc_Switch_SMX_Mode() *which is used to set the wired 
mode to work with the SmartMX. In function *phLibNfc_SE_SetMode() *when told 
to enable wired mode it ignores to enable it if secure element is UICC 
instead of SmartMX. In this last case it uses *phHal4Nfc_Switch_SMX_Mode()  
*with the parameter *eSmartMx_Wired. *I modified the function to use 
*phHal4Nfc_Switch_Swp_Mode() 
*with parameter *eSWP_Switch_On *(this parameter has an incorrect value by 
default, it must be enabled by using nemik's patches). This function 
(phHal4Hnfc_Switch_Swp_Mode()) succeeds, which makes me think there could be 
a wired SWP mode. 

Although the SWP mode is enabled, no SE seems to be detected this way. When 
opening SMX in wired mode from  
*com_android_nfc_NativeNfcSecureElement_doOpenSecureElementConnection() 
*the callback is called twice after calling  *phLibNfc_SE_SetMode(). *However 
if SWP is enabled (using external SE element) callback is only called once 
after *phLibNfc_SE_SetMode(). *If we avoid waiting for second callback *
phLibNfc_RemoteDev_Connect()* always fails (internally no SE has been 
discovered).

When it comes to RIL issue. I patched the sources with SEEK diffs too but 
rild daemon crashes. SEEK mantainers say it is due to baseband processor not 
implementing required (AT+CSIM, AT+CCHO, AT+CCHC, AT+CGLA) commands (
http://code.google.com/p/seek-for-android/wiki/UICCSupport). Is there any 
way to reverse engineer baseband firmware or get access to a modified 
version implementing those commands? Or has anyone discovered whether 
Samsung has other propietary commands achieving the same results (raw APDU 
exchange with SIM/UICC)?

regards,

Fernando



-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en

Re: [android-developers] Re: NFC Secure Element

2011-07-25 Thread Michael Roland
Hallo Fernando,

 As far as I understand sending APDUs to the SmartMX SE element is
 possible because the NFC Controller (PN544) is told to enable the NFC-WI
 interface with SE. This is carried out by calling
 phHal4Nfc_Switch_SMX_Mode(), with parameter eSmartMx_Wired (function
 phLibNfc_SE_SetMode()).

Correct, for the SE connected through NFC-WI/S2C, the NFC controller has
three modes: off, wired and virtual mode. Off means that there is no
communication with the secure element. Wired mode means that the secure
element is visible to the application processor as if it was a
(contactless) smartcard connected to the RF reader. Virtual mode means
that the secure element is visible to external readers as if the phone
were a contactless smartcard.

 Wouldn't it be possible to use the SWP channel to send APDUs to UICC SE
 through NFC Controller in an wired mode from an application the same
 way it is performed when sending APDUs to the SmartMX element?

From what I've read in the PN544 User Manual, I don't think that there
is an equvalent for the wired mode with SWP/HCI (I would be happy to be
proven wrong). Usually for the wired mode, the contact interface of
the UICC would be used so it wouldn't really make sense if the NFC
controller allowed for an additional* channel between the UICC and the
application processor.

*) Additional once the RIL supported APDU exchange with the UICC.

 Or is SWP only supposed for raw RF Communication and has no such
 equivalent capabilities used by NFC-WI?

In fact it is quite the opposite. NFC-WI is the protocol for raw RF
communication. SWP has several more capabilities. There is three
protocols used on top of SWP: ACT, CLT and SHDLC. ACT is used for
interface activation. CLT is a tunneling protocol for raw frames of the
contactless protocol (used for e.g. MIFARE protocol). SHDLC is the high
level data link protocol. On top of this HCI (Host Controller Interface)
is used for communication between the UICC and the NFC controller.

br,
Michael

-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en


Re: [android-developers] Re: NFC Secure Element

2011-07-21 Thread Fernando Miguélez Palomo
Hi Michael,

As far as I understand sending APDUs to the SmartMX SE element is possible 
because the NFC Controller (PN544) is told to enable the NFC-WI interface 
with SE. This is carried out by calling *phHal4Nfc_Switch_SMX_Mode()*, with 
parameter *eSmartMx_Wired *(function *phLibNfc_SE_SetMode()).*
*
*
Wouldn't it be possible to use the SWP channel to send APDUs to UICC SE 
through NFC Controller in an wired mode from an application the same way 
it is performed when sending APDUs to the SmartMX element? Or is SWP only 
supposed for raw RF Communication and has no such equivalent capabilities 
used by NFC-WI?

Taking a look at the libnfc-nxp library theare are some SWP related 
functions that are not being used.Maybe *phHal4Nfc_Switch_Swp_Mode() *could 
be used in a similar fashion to *phHal4Nfc_Switch_SMX_Mode()*?
*
*
*
*

-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en

[android-developers] Re: NFC Secure Element

2011-07-21 Thread nemik
Great job Fernando! Thank you for sharing your diff on this, it's
fantastic news.

On Jul 19, 5:48 am, Fernando Miguélez Palomo
fernando.migue...@gmail.com wrote:
 I got it working on 2.3.4_r1!!!

 The key was enabling discoverability but in card emulation mode. The strange
 thing is now I can detect two smart card types with an Arcontia smart card
 reader:

    - ISO14443A tag CL1 tag (This is the Mifare 4K)
    - FELICA RCS-885 424kbs tag (I suppose this is really the Javacard, not a
    Felica card)

 I managed to write and read a block (4) to the Mifare 4K with default keys.
 Next thing will be investigating wheter 2.3.4 adds support by means of
 nxp-nfc library to directly send APDUs to the SE. You and Michael Roland
 already confirmed it was not possible with prior gingerbread versions.

 I post the corrected patch to get card emulation on 2.3.4_r1.

 One thing. Card stops being readable from an external reader after screen
 goes off and back on. However if you disable NFC and re-enable it (from
 settings) card is discoverable again.

 Thanks nemik for your work (you can update your patches with these
 corretions to work with gingerbread 2.3.4_r1 at your site if you want).

  Nfc-app-2_3_4_r1.diff
 31KViewDownload

-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en


[android-developers] Re: NFC Secure Element

2011-07-20 Thread Michael Roland
Hallo,

 Did you get it tweaking the code by yourself as described above or you
 used SEEK patches? I am currently trying to get some results myself but
 I am new to Android platform development and I am a little bit lost.

I tweaked the code by myself. The SEEK patches won't enable card
emulation through NFC. They enable secure element access from within
Android apps.

br
Michael

-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en


Re: [android-developers] Re: NFC Secure Element

2011-07-20 Thread Michael Roland
Hallo,

 I managed to write and read a block (4) to the Mifare 4K with default
 keys. Next thing will be investigating wheter 2.3.4 adds support by
 means of nxp-nfc library to directly send APDUs to the SE. You and
 Michael Roland already confirmed it was not possible with prior
 gingerbread versions.

Just to be clear on that: From within Android apps it *is* possible to
send APDUs to the internal secure element (SmartMX). But it *is not*
possible to send APDus to an SWP-UICC.

br,
Michael

-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en


[android-developers] Re: NFC Secure Element

2011-07-19 Thread Fernando Miguélez Palomo
I got it working on 2.3.4_r1!!!

The key was enabling discoverability but in card emulation mode. The strange 
thing is now I can detect two smart card types with an Arcontia smart card 
reader:

   - ISO14443A tag CL1 tag (This is the Mifare 4K)
   - FELICA RCS-885 424kbs tag (I suppose this is really the Javacard, not a 
   Felica card)
   
I managed to write and read a block (4) to the Mifare 4K with default keys. 
Next thing will be investigating wheter 2.3.4 adds support by means of 
nxp-nfc library to directly send APDUs to the SE. You and Michael Roland 
already confirmed it was not possible with prior gingerbread versions.

I post the corrected patch to get card emulation on 2.3.4_r1.

One thing. Card stops being readable from an external reader after screen 
goes off and back on. However if you disable NFC and re-enable it (from 
settings) card is discoverable again.

Thanks nemik for your work (you can update your patches with these 
corretions to work with gingerbread 2.3.4_r1 at your site if you want).


-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=endiff -urBNp Nfc.orig/jni/com_android_nfc_NativeNfcManager.cpp Nfc/jni/com_android_nfc_NativeNfcManager.cpp
--- Nfc.orig/jni/com_android_nfc_NativeNfcManager.cpp	2011-07-19 12:32:17.545611859 +0200
+++ Nfc/jni/com_android_nfc_NativeNfcManager.cpp	2011-07-18 10:50:27.665620770 +0200
@@ -341,6 +341,7 @@ static int nfc_jni_initialize(struct nfc
/* == CONFIGURE DRIVER === */
 
TRACE(phLibNfc_Mgt_ConfigureDriver(0x%08x, 0x%08x), gDrvCfg.nClientId, gDrvCfg.nLinkType);
+   LOGD(phLibNfc_Mgt_ConfigureDriver(0x%08x, 0x%08x), gDrvCfg.nClientId, gDrvCfg.nLinkType);
REENTRANCE_LOCK();
status = phLibNfc_Mgt_ConfigureDriver(gDrvCfg, gHWRef);
REENTRANCE_UNLOCK();
@@ -364,6 +365,7 @@ static int nfc_jni_initialize(struct nfc
/* == INITIALIZE === */
 
TRACE(phLibNfc_Mgt_Initialize());
+   LOGD(phLibNfc_Mgt_Initialize());
REENTRANCE_LOCK();
status = phLibNfc_Mgt_Initialize(gHWRef, nfc_jni_init_callback, (void *)cb_data);
REENTRANCE_UNLOCK();
@@ -373,6 +375,7 @@ static int nfc_jni_initialize(struct nfc
   goto clean_and_return;
}
TRACE(phLibNfc_Mgt_Initialize returned 0x%04x[%s], status, nfc_jni_get_status_name(status));
+   LOGD(phLibNfc_Mgt_Initialize returned 0x%04x[%s], status, nfc_jni_get_status_name(status));
   
/* Wait for callback response */
if(sem_wait(cb_data.sem))
@@ -433,6 +436,7 @@ static int nfc_jni_initialize(struct nfc
 
// Update EEPROM settings
TRACE(**  START EEPROM SETTINGS UPDATE **);
+   LOGD(**  START EEPROM SETTINGS UPDATE **);
for (i = 0; i  EEDATA_SETTINGS_NUMBER; i++)
{
   gInputParam.buffer = EEDATA_Settings[i];
@@ -440,6 +444,7 @@ static int nfc_jni_initialize(struct nfc
   gOutputParam.buffer = resp;
 
   TRACE( EEPROM SETTING: %d, i);
+  LOGD( EEPROM SETTING: %d, i);
   REENTRANCE_LOCK();
   status = phLibNfc_Mgt_IoCtl(gHWRef, NFC_MEM_WRITE, gInputParam, gOutputParam, nfc_jni_ioctl_callback, (void *)cb_data);
   REENTRANCE_UNLOCK();
@@ -461,6 +466,7 @@ static int nfc_jni_initialize(struct nfc
   }
}
TRACE(**  ALL EEPROM SETTINGS UPDATED  **);
+   LOGD(**  ALL EEPROM SETTINGS UPDATED  **);
 
/* == SECURE ELEMENTS === */
 
@@ -511,6 +517,7 @@ static int nfc_jni_initialize(struct nfc
 
/* LLCP Params */
TRACE(**  NFC Config Mode NFCIP1 - LLCP **);
+   LOGD(**  NFC Config Mode NFCIP1 - LLCP **);
LlcpConfigInfo.miu= nat-miu;
LlcpConfigInfo.lto= nat-lto;
LlcpConfigInfo.wks= nat-wks;
@@ -529,6 +536,8 @@ static int nfc_jni_initialize(struct nfc
}
TRACE(phLibNfc_Mgt_SetLlcp_ConfigParams returned 0x%04x[%s], status,
  nfc_jni_get_status_name(status));
+   LOGD(phLibNfc_Mgt_SetLlcp_ConfigParams returned 0x%04x[%s], status,
+ nfc_jni_get_status_name(status));
 
/* Wait for callback response */
if(sem_wait(cb_data.sem))
@@ -602,6 +611,7 @@ void nfc_jni_restart_discovery_locked(st
struct nfc_jni_callback_data cb_data;
 
TRACE(Restarting polling loop);
+   LOGD(Restarting polling loop);

/* Create the local semaphore */
if (!nfc_cb_data_init(cb_data, NULL))
@@ -614,6 +624,7 @@ void nfc_jni_restart_discovery_locked(st
 
/* Restart Polling loop */
TRACE(**  Start NFC Discovery **);
+   LOGD(**  Start NFC Discovery **);
REENTRANCE_LOCK();
ret = phLibNfc_Mgt_ConfigureDiscovery(NFC_DISCOVERY_RESUME,nat-discovery_cfg, nfc_jni_discover_callback, (void *)cb_data);
REENTRANCE_UNLOCK();
@@ -626,7 +637,16 @@ void 

[android-developers] Re: NFC Secure Element

2011-07-18 Thread Fernando Miguélez Palomo
Hi Nemik,

I just applied your patches to 2.3.4_r1 version (I had to change them a 
little bit) but card emulation does not seem to work (an external reader 
detects nothing). Could you please tell us what tag of AOSP gingerbread did 
you use?

Thanks

-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en

[android-developers] Re: NFC Secure Element

2011-07-18 Thread nemik
Fernando, the patches were against 2.3.1 or 2.3.2 I believe, a long
time ago (relatively). I have not had a chance to revisit this but I'm
fairly sure it will not work on 2.3.4+.

I'm sure some of the header defines have changed as well but try to re-
enable the ones I had if they exist? Good luck.

On Jul 18, 10:26 am, Fernando Miguélez Palomo
fernando.migue...@gmail.com wrote:
 Hi Nemik,

 I just applied your patches to 2.3.4_r1 version (I had to change them a
 little bit) but card emulation does not seem to work (an external reader
 detects nothing). Could you please tell us what tag of AOSP gingerbread did
 you use?

 Thanks

-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en


[android-developers] Re: NFC Secure Element

2011-07-18 Thread Fernando Miguélez Palomo
Yes I know. I revised them manually and adapted to 2.3.4_r1. However I must 
be missing something. 

I see the Secure Element SMX selected, the embedded Mifare card is not 
detected by means of external readers. The external reader detects a memory 
card but it can not read the CSN (UID). It seems as if the card emulation 
were enabled but then disabled. 

This is my init sequence as seen by logcat: http://pastebin.com/XpyLUGaJ

I can see the following sequence. So I assume the embedded secure element is 
enabled:

I/NFC JNI (  198): NFC Initialized
D/NfcService(  198): NFC-EE routing ON
D/NFC JNI (  198): **  Select Secure Element **
D/NFC JNI (  198): phLibNfc_SE_SetMode(0x00abcdef, ...)
D/NFC JNI (  198): phLibNfc_SE_SetMode() returned 0x000d[NFCSTATUS_PENDING]

What is the correct message sequence?

I attach your patches modified to compile against 2.3.4_r1. Someone could 
find them useful. By the way in this tag Nfc is disabled by default. So the 
patch device_base_2_3_4_r1.diff must be also applied.

-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=endiff -urBNp libnfc-nxp.orig/inc/phNfcConfig.h libnfc-nxp/inc/phNfcConfig.h
--- libnfc-nxp.orig/inc/phNfcConfig.h	2011-07-18 18:15:27.215614224 +0200
+++ libnfc-nxp/inc/phNfcConfig.h	2011-07-18 18:20:33.823504089 +0200
@@ -286,6 +286,7 @@
 
 #ifndef NXP_UICC_RD_RIGHTS
 #define NXP_UICC_RD_RIGHTS  0x00U
+//#define NXP_UICC_RD_RIGHTS  0x0FU
 #endif 
 
 
@@ -367,7 +368,7 @@
 #define RECONNECT_SUPPORT
 
 /** Macro to Enable the Card Emulation Feature */
-/* #define HOST_EMULATION */
+#define HOST_EMULATION
 
 /** Macro to Enable the Download Mode Feature */
 #define FW_DOWNLOAD
diff -urBNp Nfc.orig/jni/com_android_nfc_NativeNfcManager.cpp Nfc/jni/com_android_nfc_NativeNfcManager.cpp
--- Nfc.orig/jni/com_android_nfc_NativeNfcManager.cpp	2011-07-18 18:03:05.825613188 +0200
+++ Nfc/jni/com_android_nfc_NativeNfcManager.cpp	2011-07-18 10:50:27.665620770 +0200
@@ -341,6 +341,7 @@ static int nfc_jni_initialize(struct nfc
/* == CONFIGURE DRIVER === */
 
TRACE(phLibNfc_Mgt_ConfigureDriver(0x%08x, 0x%08x), gDrvCfg.nClientId, gDrvCfg.nLinkType);
+   LOGD(phLibNfc_Mgt_ConfigureDriver(0x%08x, 0x%08x), gDrvCfg.nClientId, gDrvCfg.nLinkType);
REENTRANCE_LOCK();
status = phLibNfc_Mgt_ConfigureDriver(gDrvCfg, gHWRef);
REENTRANCE_UNLOCK();
@@ -364,6 +365,7 @@ static int nfc_jni_initialize(struct nfc
/* == INITIALIZE === */
 
TRACE(phLibNfc_Mgt_Initialize());
+   LOGD(phLibNfc_Mgt_Initialize());
REENTRANCE_LOCK();
status = phLibNfc_Mgt_Initialize(gHWRef, nfc_jni_init_callback, (void *)cb_data);
REENTRANCE_UNLOCK();
@@ -373,6 +375,7 @@ static int nfc_jni_initialize(struct nfc
   goto clean_and_return;
}
TRACE(phLibNfc_Mgt_Initialize returned 0x%04x[%s], status, nfc_jni_get_status_name(status));
+   LOGD(phLibNfc_Mgt_Initialize returned 0x%04x[%s], status, nfc_jni_get_status_name(status));
   
/* Wait for callback response */
if(sem_wait(cb_data.sem))
@@ -433,6 +436,7 @@ static int nfc_jni_initialize(struct nfc
 
// Update EEPROM settings
TRACE(**  START EEPROM SETTINGS UPDATE **);
+   LOGD(**  START EEPROM SETTINGS UPDATE **);
for (i = 0; i  EEDATA_SETTINGS_NUMBER; i++)
{
   gInputParam.buffer = EEDATA_Settings[i];
@@ -440,6 +444,7 @@ static int nfc_jni_initialize(struct nfc
   gOutputParam.buffer = resp;
 
   TRACE( EEPROM SETTING: %d, i);
+  LOGD( EEPROM SETTING: %d, i);
   REENTRANCE_LOCK();
   status = phLibNfc_Mgt_IoCtl(gHWRef, NFC_MEM_WRITE, gInputParam, gOutputParam, nfc_jni_ioctl_callback, (void *)cb_data);
   REENTRANCE_UNLOCK();
@@ -461,6 +466,7 @@ static int nfc_jni_initialize(struct nfc
   }
}
TRACE(**  ALL EEPROM SETTINGS UPDATED  **);
+   LOGD(**  ALL EEPROM SETTINGS UPDATED  **);
 
/* == SECURE ELEMENTS === */
 
@@ -511,6 +517,7 @@ static int nfc_jni_initialize(struct nfc
 
/* LLCP Params */
TRACE(**  NFC Config Mode NFCIP1 - LLCP **);
+   LOGD(**  NFC Config Mode NFCIP1 - LLCP **);
LlcpConfigInfo.miu= nat-miu;
LlcpConfigInfo.lto= nat-lto;
LlcpConfigInfo.wks= nat-wks;
@@ -529,6 +536,8 @@ static int nfc_jni_initialize(struct nfc
}
TRACE(phLibNfc_Mgt_SetLlcp_ConfigParams returned 0x%04x[%s], status,
  nfc_jni_get_status_name(status));
+   LOGD(phLibNfc_Mgt_SetLlcp_ConfigParams returned 0x%04x[%s], status,
+ nfc_jni_get_status_name(status));
 
/* Wait for callback response */
if(sem_wait(cb_data.sem))
@@ -602,6 +611,7 @@ void nfc_jni_restart_discovery_locked(st
struct 

[android-developers] Re: NFC Secure Element

2011-07-18 Thread Fernando Miguélez Palomo
For convenience I post the filtered NFC related I can see after 
initialization. As I said the card is detected on reader but only after 
phone restarts (however it can not read any UID). If I approach it latter it 
is not recognized.

07-18 17:01:54.800: DEBUG/NFC JNI(283): NFC Service : loading JNI
07-18 17:01:54.847: INFO/NfcService(283): Starting NFC service
07-18 17:01:54.992: DEBUG/NFC JNI(283):  Set NFC DISCOVERY A to 1
07-18 17:01:54.992: DEBUG/NFC JNI(283):  Set NFC DISCOVERY B to 1
07-18 17:01:54.992: DEBUG/NFC JNI(283):  Set NFC DISCOVERY F to 1
07-18 17:01:54.992: DEBUG/NFC JNI(283):  Set NFC DISCOVERY 15693 to 1
07-18 17:01:54.992: DEBUG/NFC JNI(283):  Set NFC DISCOVERY 15693 to 1
07-18 17:01:55.089: DEBUG/NFC JNI(283): phLibNfc_Mgt_Initialize returned 
0x000d[NFCSTATUS_PENDING]
07-18 17:01:55.113: DEBUG/NFC JNI(283): NFC client started
07-18 17:01:55.250: DEBUG/NFC JNI(283): NFC capabilities: HAL = 8150100, FW 
= a70414, HW = 620003, Model = 0, HCI = 1, Full_FW = 104, FW Update Info = 0
07-18 17:01:55.582: DEBUG/NFC JNI(283): phLibNfc_SE_SetMode() returned 
0x000d[NFCSTATUS_PENDING]
07-18 17:01:55.597: DEBUG/NFC JNI(283): **  NFC Config Mode NFCIP1 - 
LLCP **
07-18 17:01:55.597: DEBUG/NFC JNI(283): phLibNfc_Mgt_SetLlcp_ConfigParams 
returned 0x000d[NFCSTATUS_PENDING]
07-18 17:01:55.644: INFO/NFC JNI(283): NFC Initialized
07-18 17:01:55.644: DEBUG/NfcService(283): NFC-EE routing ON
07-18 17:01:55.644: DEBUG/NFC JNI(283): phLibNfc_SE_SetMode() returned 
0x000d[NFCSTATUS_PENDING]
07-18 17:01:55.664: DEBUG/NfcService(283): NFC-C discovery OFF
07-18 17:01:55.664: DEBUG/NFC JNI(283): **  Stop NFC Discovery **
07-18 17:01:55.746: DEBUG/NFC JNI(283): phLibNfc_Llcp_Socket() returned 
0x[NFCSTATUS_SUCCESS]
07-18 17:01:55.750: DEBUG/NFC JNI(283): phLibNfc_Llcp_Bind() returned 
0x[NFCSTATUS_SUCCESS]
07-18 17:01:55.750: DEBUG/NFC JNI(283): phLibNfc_Llcp_Listen() returned 
0x[NFCSTATUS_SUCCESS]

-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en

[android-developers] Re: NFC Secure Element

2011-07-15 Thread Rui Campos
Do any of you have an image that can be applied directly to a Nexus S?

-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en


Re: [android-developers] Re: NFC Secure Element

2011-07-14 Thread Fernando Miguélez Palomo


  Have somebody activate the Card Emulation with UICC?

 Yes.

  I tryed it, with SmartMX SE it was no problem Card Emulation was
  running.
  When I tried the ID of my UICC in the Method doSelectSecureElement
  from NFC Service,
  then the Card Emulation was not running, Reader dont detect a Tag.
  
  Somebody knows why doSelectSecureElement Method dont working with
  UICC?

 If the UICC supports SWP, the doSelectSecureElement method works just
 fine here. (ID is 11259376 for UICC)


 Hi Michael,

I am new to this forum and I am impressed of the level your mastership and 
the rest of the members.

Do you mean you could enable card emulation mode from UICC? Could you read 
the contents of a smartcard through an external reader and also from an 
android application?
 

-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en

[android-developers] Re: NFC Secure Element

2011-07-14 Thread Michael Roland
Hallo,

 Do you mean you could enable card emulation mode from UICC? Could you
 read the contents of a smartcard through an external reader and also
 from an android application?


Yes, I managed to enable card emulation mode with a SWP-UICC as secure
element. As the NFC controller allows only external card emulation for
secure elements connected through SWP, I could only access the smartcard
from an external reader but not through an Android app.

br
Michael

-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en


[android-developers] Re: NFC Secure Element

2011-07-14 Thread Fernando Miguélez
Interesting.

Did you get it tweaking the code by yourself as described above or you used
SEEK patches? I am currently trying to get some results myself but I am new
to Android platform development and I am a little bit lost.

2011/7/14 Michael Roland mi.rol...@gmail.com

 Hallo,

  Do you mean you could enable card emulation mode from UICC? Could you
  read the contents of a smartcard through an external reader and also
  from an android application?


 Yes, I managed to enable card emulation mode with a SWP-UICC as secure
 element. As the NFC controller allows only external card emulation for
 secure elements connected through SWP, I could only access the smartcard
 from an external reader but not through an Android app.

 br
 Michael



-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en

[android-developers] Re: NFC Secure Element

2011-06-29 Thread CK
Hello all,

Any has customer rom 2.3.4 to support card emulation.

Thanks in advance!
CK

On May 20, 1:51 am, Martin martin.buellesb...@googlemail.com wrote:
 Hello all,

 Michael as you already mentioned, it is possible to activate the card
 emulation mode and theSecureElementin the Nexus S.
 I did that and also changed the permissions from
 android.permission.WRITE_SECURE_SETTINGS to android.permission.NFC in
 NfcService.java to get access to theSecureElement.
 Now I am able to create and open a connection to theSecureElement
 and get its UID.
 After enabling the card emulation mode on the Nexus S, I am able to
 read and write data to the emulated MiFare Classic 4k card by an
 external NFC reader. I would like to do that within an android app.
 Why is that not possible through an android application? You have
 spoken about the access keys, but aren't they the same for internal
 and external access?
 If I have understood you correctly, there is nothing more I can do so
 far, right?

 Thanks a lot!

 Martin

 On 19 Mai, 00:59, Michael Roland mi.rol...@gmail.com wrote:







  Hallo,

   I more or less understand how to do it but I don't understand if after
   is possible to build application on card emulation.

  Regarding the internalsecureelement(SmartMX): No. Even if you
  activate this chip as thesecureelement, you could only use its UID for
  your application. To edit data on it/install applications into it you
  would need to have the access keys for thatsecureelement.

  Regarding an externalsecureelementon the UICC (SIM card): Partly
  yes. You can activate an SWP-UICC assecureelement. But access is
  limited to external readers for the moment. Until now, there is no known
  way to get access to application on the UICC from a phone application.

   Moreover some of you speak about authentication, and about a password
   that is not possible to have? (What are you talking about when you
   speak about this stuff).

  The SmartMX in the Nexus S contains a JavaCard operating system that is
  compliant to GlobalPlatform. GlobalPlatform defines methods to manage
  multiple applications on this JavaCard. A central component of this card
  management is the Card Manager, which itself is one application on 
  thesecureelement. The card manager provides an interface to load, install,
  ... delete applications on thesecureelement. Additionally it controls
  access to these methods. To establish asecurechannel with the card
  manager (i.e. a connection that provides authenticity, integrity and
  possibly confidentiality) both, the entity that wants to manage the card
  and the card manager need to know one or more shared secrets, the
  authentication keys.

   Anyway some news aboutNFCcard emulation
   [nearfieldcommunicationworld]
   it seems that Google dev will not give use api about that in the next
   future.

  Still there is some developments towards card emulation going on 
  (cf.http://www.nfctimes.com/news/android-card-emulation-expected-despite-...
  )

   Moreover, what does it mean And if you improperly authenticate
   yourself a certain number of times, there aresecureelements out
   there that will physically destroy themselves and can never be
   recovered? Is related to the password of my previous questions?

  While the card manager is protected by access keys, there still exist
  some methods to find such keys. One of these methods would be brute
  forces (i.e. trying each possible key value). While such methods are
  usually very inefficient (if the key has an appropriate length) there
  might be some methods that could significantly speed up this process. As
  a safety mechanism the card manager usually implements an additional
  protection against such an attack: After ten consecutive authentication
  failures, the card manager locks itself and refuses any further
  commands. (Other applications that were previously installed on that
  card will continue to function as usual.) Once this lockdown has
  happened, there is *NO* way of reversing this. THerefore, once in
  lockdown no applications can be installed on, removed from, ... 
  thesecureelement.

  br
  Michael

   On May 16, 3:48 pm, Goo_Goo danny.w.s...@gmail.com wrote:
   Could someone please post the the image withcardemulationenabled
   for Nexus S?

   On May 13, 5:08 am, Markus markus.tau...@gmail.com wrote:

   mtk
   you wrote after call
   phLibNfc_SE_SetMode(seID,phLibNfc_SE_ActModeWired,nfc_jni_se_set_mode_callb
ack,
   (void *)nat);
   your nexus s was incardemulation

   I called it with mode default
   phLibNfc_SE_SetMode(seID,phLibNfc_SE_ActModeDefault,nfc_jni_se_set_mode_cal
lback,
   (void *)nat);
   and get following log
   5-12 22:08:54.421: DEBUG/NFCJNI(303):NFCcapabilities: HAL =
   8150100, FW = a70414, HW = 620003, Model = 0, HCI = 1, Full_FW = 104,
   FW Update Info = 0
   05-12 22:08:54.769: DEBUG/NFCJNI(303):
   phLibNfc_SE_GetSecureElementList()
   05-12 22:08:54.769: DEBUG/NFCJNI(303):  Number 

[android-developers] Re: NFC Secure Element

2011-06-28 Thread Michael Roland
Hallo Dominik,

 What would be the use-case which requires access to the emulated
 Mifare card from within an android application?
 Or asked another way round: What could be done additionally compared
 to NDEF Push?

Have a look at my reply a while ago in this thread:
https://groups.google.com/group/android-developers/tree/browse_frm/thread/418c9b370f08a9f7/f1d824274a797adf?rnum=1#doc_55a8c6f6ba10f98c

br,
Michael

-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en


[android-developers] Re: NFC Secure Element

2011-06-27 Thread Dominik
Hello Michael,

 So now we would only need to find a way to access the MIFARE area from
 within an application on the phone.

 I'm currently testing with a modified version of the 2.3.4 firmware. But
 as with the smart card readers, the SmartMX is automatically activated
 up to the ISO 14443-4/APDU layer. So far I was unable to use any MIFARE
 Classic commands to access the secure element.

What would be the use-case which requires access to the emulated
Mifare card from within an android application?
Or asked another way round: What could be done additionally compared
to NDEF Push?

Dominik

-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en


Re: [android-developers] Re: NFC Secure Element

2011-06-26 Thread Michael Roland
Hallo Markus,

 You are sure its not possible to access it [SWP-UICC] from an android
 application?
 In Madlmayers Blog he wrote, its possible because of the additional AT
 Commands in RIL since 2.3.2.

Where did you find this information in Gerald's blog? I only found When
Android switched from 2.3.1 to 2.3.2, Google made some changes in the
telephony API, which are required by GD's smartcard stack., which
referes to the Telephony API and not to the RIL itself. According to the
information in the SEEK project
(http://code.google.com/p/seek-for-android/) the RIL itself is still not
able to handle the additional AT commands.

 Have somebody activate the Card Emulation with UICC?

Yes.

 I tryed it, with SmartMX SE it was no problem Card Emulation was
 running.
 When I tried the ID of my UICC in the Method doSelectSecureElement
 from NFC Service,
 then the Card Emulation was not running, Reader dont detect a Tag.
 
 Somebody knows why doSelectSecureElement Method dont working with
 UICC?

If the UICC supports SWP, the doSelectSecureElement method works just
fine here. (ID is 11259376 for UICC)

br,
Michael

-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en


Re: [android-developers] Re: NFC Secure Element

2011-06-26 Thread Michael Roland
Hallo Markus,

 But by loading the Key, occurs an error:
 
 /send FF82201A06
 = FF 82 20 1A 06 FF FF FF FF FF FF   .. 
 (407461 nsec)
 = 69 86  i.
 Status: Command not allowed (no current EF)

Actually this response means Volatile memory is not available
according to the PC/SC standard. This suggests that the key number 0x1A
is not usable with your reader.

br,
Michael

-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en


Re: [android-developers] Re: NFC Secure Element

2011-06-26 Thread Michael Roland
Hallo,

 Opening a connection with it - using doOpenSecureElementConnection, like
 you can with the Smart-MX - will most definitely not work for a UICC SE
 though. As
 the NativeNfcSecureElement will only open a connection with the Smart-MX
 SE - completely ignoring a UICC even if it is detected.
 Perhaps you could tweak this code to force a connection with a UICC if
 it's detected, but I doubt that will work (correctly).

No, unfortunately this will not work. Neither the libnfc-nxp nor the
PN544 NFC chip support internal access to the UICC through this method.
Therefore, we will have to wait until UICC access gets available through
the Telephony API.

br,
Michael

-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en


[android-developers] Re: NFC Secure Element

2011-06-23 Thread JMC114
[0] command (0x60 for key A, 0x61 for key B)
[1] block number (will authenticate entire sector)
[2-5] last 4 bytes of uid
[6-11] 6 byte key

Also, here's how Android does the authentication: 
clickhttp://grepcode.com/file/repository.grepcode.com/java/ext/com.google.android/android/2.3.4_r1/android/nfc/tech/MifareClassic.java#MifareClassic.authenticate%28int%2Cbyte%5B%5D%2Cboolean%29

-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en

[android-developers] Re: NFC Secure Element

2011-06-21 Thread Markus
Hello,
I cant load the key ff ff ff ff ff ff to the 4k MIFARE.
If my Nexus S is in Card Emulation I tried with JCShell to do
something.
Reading UID and ATR is no problem it works.
But by loading the Key, occurs an error:

/send FF82201A06
= FF 82 20 1A 06 FF FF FF FF FF FF   .. 
(407461 nsec)
= 69 86  i.
Status: Command not allowed (no current EF)

Anybody know where is the fault???


greets
Markus


On 19 Mai, 19:51, Martin martin.buellesb...@googlemail.com wrote:
 Hello all,

 Michael as you already mentioned, it is possible to activate the card
 emulation mode and theSecureElementin the Nexus S.
 I did that and also changed the permissions from
 android.permission.WRITE_SECURE_SETTINGS to android.permission.NFCin
 NfcService.java to get access to theSecureElement.
 Now I am able to create and open a connection to theSecureElement
 and get its UID.
 After enabling the card emulation mode on the Nexus S, I am able to
 read and write data to the emulated MiFare Classic 4k card by an
 externalNFCreader. I would like to do that within an android app.
 Why is that not possible through an android application? You have
 spoken about the access keys, but aren't they the same for internal
 and external access?
 If I have understood you correctly, there is nothing more I can do so
 far, right?

 Thanks a lot!

 Martin

 On 19 Mai, 00:59, Michael Roland mi.rol...@gmail.com wrote:







  Hallo,

   I more or less understand how to do it but I don't understand if after
   is possible to build application on card emulation.

  Regarding the internalsecureelement(SmartMX): No. Even if you
  activate this chip as thesecureelement, you could only use its UID for
  your application. To edit data on it/install applications into it you
  would need to have the access keys for thatsecureelement.

  Regarding an externalsecureelementon the UICC (SIM card): Partly
  yes. You can activate an SWP-UICC assecureelement. But access is
  limited to external readers for the moment. Until now, there is no known
  way to get access to application on the UICC from a phone application.

   Moreover some of you speak about authentication, and about a password
   that is not possible to have? (What are you talking about when you
   speak about this stuff).

  The SmartMX in the Nexus S contains a JavaCard operating system that is
  compliant to GlobalPlatform. GlobalPlatform defines methods to manage
  multiple applications on this JavaCard. A central component of this card
  management is the Card Manager, which itself is one application on 
  thesecureelement. The card manager provides an interface to load, install,
  ... delete applications on thesecureelement. Additionally it controls
  access to these methods. To establish asecurechannel with the card
  manager (i.e. a connection that provides authenticity, integrity and
  possibly confidentiality) both, the entity that wants to manage the card
  and the card manager need to know one or more shared secrets, the
  authentication keys.

   Anyway some news aboutNFCcard emulation
   [nearfieldcommunicationworld]
   it seems that Google dev will not give use api about that in the next
   future.

  Still there is some developments towards card emulation going on 
  (cf.http://www.nfctimes.com/news/android-card-emulation-expected-despite-...
  )

   Moreover, what does it mean And if you improperly authenticate
   yourself a certain number of times, there aresecureelements out
   there that will physically destroy themselves and can never be
   recovered? Is related to the password of my previous questions?

  While the card manager is protected by access keys, there still exist
  some methods to find such keys. One of these methods would be brute
  forces (i.e. trying each possible key value). While such methods are
  usually very inefficient (if the key has an appropriate length) there
  might be some methods that could significantly speed up this process. As
  a safety mechanism the card manager usually implements an additional
  protection against such an attack: After ten consecutive authentication
  failures, the card manager locks itself and refuses any further
  commands. (Other applications that were previously installed on that
  card will continue to function as usual.) Once this lockdown has
  happened, there is *NO* way of reversing this. THerefore, once in
  lockdown no applications can be installed on, removed from, ... 
  thesecureelement.

  br
  Michael

   On May 16, 3:48 pm, Goo_Goo danny.w.s...@gmail.com wrote:
   Could someone please post the the image withcardemulationenabled
   for Nexus S?

   On May 13, 5:08 am, Markus markus.tau...@gmail.com wrote:

   mtk
   you wrote after call
   phLibNfc_SE_SetMode(seID,phLibNfc_SE_ActModeWired,nfc_jni_se_set_mode_callb
ack,
   (void *)nat);
   your nexus s was incardemulation

   I called it with mode default
   

[android-developers] Re: NFC Secure Element

2011-06-21 Thread JMC114
doSelectSecureElement *should* work for the UICC. (code 
herehttp://android.git.kernel.org/?p=platform/packages/apps/Nfc.git;a=blob;f=jni/com_android_nfc_NativeNfcManager.cpp;h=7f000885e7c286f3fa90209220b5936d0c62b8c9;hb=HEAD)
 
I haven't got a SWP compliant SIM handy though so I can't test it, but I 
can't see any reason it wouldn't work (judging from the linked code).

Opening a connection with it - using doOpenSecureElementConnection, like you 
can with the Smart-MX - will most definitely not work for a UICC SE though. 
(code 
here)http://android.git.kernel.org/?p=platform/packages/apps/Nfc.git;a=blob;f=jni/com_android_nfc_NativeNfcSecureElement.cpp;h=1e70839ce3b7dc49db7fa5b00141d9166d262cf1;hb=HEAD
 As 
the NativeNfcSecureElement will only open a connection with the Smart-MX SE 
- completely ignoring a UICC even if it is detected.
Perhaps you could tweak this code to force a connection with a UICC if it's 
detected, but I doubt that will work (correctly).

-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en

[android-developers] Re: NFC Secure Element

2011-06-20 Thread Markus
Hi Michael,

On 19 Mai, 00:59, Michael Roland mi.rol...@gmail.com wrote:
 Regarding an external secure element on the UICC (SIM card): Partly
 yes. You can activate an SWP-UICC as secure element. But access is
 limited to external readers for the moment. Until now, there is no known
 way to get access to application on the UICC from a phone application.

You are sure its not possible to access it from an android
application?
In Madlmayers Blog he wrote, its possible because of the additional AT
Commands in RIL since 2.3.2.

Question about UICC

Have somebody activate the Card Emulation with UICC?
I tryed it, with SmartMX SE it was no problem Card Emulation was
running.
When I tried the ID of my UICC in the Method doSelectSecureElement
from NFC Service,
then the Card Emulation was not running, Reader dont detect a Tag.

Somebody knows why doSelectSecureElement Method dont working with
UICC?




-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en


[android-developers] Re: NFC Secure Element

2011-06-14 Thread Marcus
Ok thanks for advices Michael,

I will try to modify the mifare area of the Nexus in order to
reproduce my badge.

Best regards

Marcus



On Jun 11, 11:33 am, Michael Roland mi.rol...@gmail.com wrote:
 Hallo Marcus,

  At time, I'm able to put my devices into emulation mode.
  I'm getting ATR and UID throuth my OMNIKEY CardMan 5321 :
     - ATR: 3B 8A 80 01 00 31 C1 73 C8 40 00 00 90 00 90

 Correct, this is the ATR generated for the SmartMX.

     - The ID of the emulated card is constant even if i start a new
  power cycle .

 Correct, the UID of the SmartMX is static (by default).

  My question is how can I found my UID on the NXP chip ?

 What do you mean by find?

  - Do you want to read the UID value from Android?

 This can be done through some hidden/internalNFCAPIs.

  Can you give me more information about the 0x key? I don't
  understant how to use it ...

 This is the authentication key to the MIFARE Classic area of the
 SmartMX. You can use this key to read  write data to the 4K MIFARE area
 on the SmartMX. You would use this key with your reader's MIFARE access
 methods (either reader specific or compliant to the PC/SC standard for
 access to contactless memory cards).

 With your Omnikey reader it will be quite difficult to use the MIFARE
 area as it automatically activates the SmartMX up to its highest
 protocol level (APDU-based access to the JavaCard). So the MIFARE
 protocol will not work on this activation level. (As far as I remember
 you might be able to disable the automatic protocol activation with some
 registry tweaks.)

 br,
 Michael

-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en


[android-developers] Re: NFC Secure Element

2011-06-14 Thread JMC114
Note that the uid is contained inside the first sector, which is a read-only 
sector and is therefore impossible to modify. As such, it's impossible to 
fully reproduce your badge. If the system you wish to reproduce it for 
depends on the card's uid for identification, the procedure won't work.

-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en

[android-developers] Re: NFC Secure Element

2011-06-11 Thread Michael Roland
Hallo Marcus,

 At time, I'm able to put my devices into emulation mode.
 I'm getting ATR and UID throuth my OMNIKEY CardMan 5321 :
- ATR: 3B 8A 80 01 00 31 C1 73 C8 40 00 00 90 00 90

Correct, this is the ATR generated for the SmartMX.

- The ID of the emulated card is constant even if i start a new
 power cycle .

Correct, the UID of the SmartMX is static (by default).

 My question is how can I found my UID on the NXP chip ?

What do you mean by find?

 - Do you want to read the UID value from Android?

This can be done through some hidden/internal NFC APIs.

 Can you give me more information about the 0x key? I don't
 understant how to use it ...

This is the authentication key to the MIFARE Classic area of the
SmartMX. You can use this key to read  write data to the 4K MIFARE area
on the SmartMX. You would use this key with your reader's MIFARE access
methods (either reader specific or compliant to the PC/SC standard for
access to contactless memory cards).

With your Omnikey reader it will be quite difficult to use the MIFARE
area as it automatically activates the SmartMX up to its highest
protocol level (APDU-based access to the JavaCard). So the MIFARE
protocol will not work on this activation level. (As far as I remember
you might be able to disable the automatic protocol activation with some
registry tweaks.)

br,
Michael

-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en


[android-developers] Re: NFC Secure Element

2011-06-10 Thread Marcus
Hello,

I'm in university and i'm working on NFC in Nexus S for three weeks.

At time, I'm able to put my devices into emulation mode.
I'm getting ATR and UID throuth my OMNIKEY CardMan 5321 :
   - ATR: 3B 8A 80 01 00 31 C1 73 C8 40 00 00 90 00 90
   - The ID of the emulated card is constant even if i start a new
power cycle .

My question is how can I found my UID on the NXP chip ?
Can you give me more information about the 0x key? I don't
understant how to use it ...

Thanks for your help,

Regards,

Marcus

-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en


[android-developers] Re: NFC Secure Element

2011-06-03 Thread Michael Roland
Hallo Steve,

 I can confirm the ATR's as Michael pointed and add an interesting
 follow on. When I do scardconnect and then scardsttus to get uid I get
 the 5 byte (4 byte dynamic first by 08 static e.g. 080A97A6) from the
 phone whenever the NFC service is running.

The UID (or actually the NFCID1) you get should be 4 bytes in total,
starting with 0x08 to mark that bytes 1 to 3 are randomly generated.

 if I leave the connection
 open and run multiple commands the uid stays the same but if i
 disconnect and reconnect the uid dynamically changes.

Correct. A random UID/NFCID1 must stay constant during one power cycle
(i.e. whenever the magnetic field of the reader switches from POWER-OFF
state to the IDLE state.) As the UID is used for anti-collision of
multiple transponders in the field of the reader it needs to be constant
during the communication phase.

 Is there a way
 to capture this uid as it is being created/sent from the phone?
 Is this uid generated by the secure element?

At least with the 3 phones I tried so far, the UID of the secure element
was static. Only the NFCID1 generated for peer-to-peer mode was dynamic
(as required by the standard).

For the UID of the secure element: Yes it can be captured through the phone.
For the NFCID1 in peer-to-peer mode: I guess there could be some way to
capture the current NFCID1 through libnfc-nxp but I haven't tried.


Best regards,
Michael

-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en


[android-developers] Re: NFC Secure Element

2011-06-02 Thread Michael Roland
Hallo JMC,

 Are you guys sure it's a MIFARE 4k card it's emulating?

Yes, I'm very sure it is emulating a MIFARE Classic 4K card and an APDU
based smart card (depending on the protocol activation level).


 When I put the device in emulation mode and read its ATR, I'm getting:
 3B 8F 80 01 80 4F 0C A0 00 00 03 06 03 00 00 00 00 00 00 6B

Decoding this PC/SC ATR gives this:
3B ... Contactless card
  8F ... Number of historical bytes: 0xF (15)
  80
  01
80 ... Category indicator: A status indicator may be present
   in an optional COMPACT-TLV data object.
4F ... Application identifier Presence indicator
0C ... Length of application identifier: 0x0C (12)
  Application identifier:
A0 00 00 03 06 ... RID: PC/SC Working Group
03 ... Byte for Standard: ISO 14443 A, part 3
00 00 ... Bytes for Card Name: not in standard
00 00 00 00 ... RFU (Shall be set to zero)
  6B ... Checksum

This is a typical ATR if the card emulation mode is not activated. I
receive that ATR if I put the phone in peer-to-peer communication mode
(which is the default if card emulation is disabled).


 While I'm actually expecting:
 3B 8F 80 01 80 4F 0C A0 00 00 03 06 03 00 02 00 00 00 00 69

With the phone you would not normally receive such an ATR for the card
emulation mode either. Usually a contactless smart card reader (like the
Omnikey 5321) activates the contactless smart card up to its highest
supported protocol layer. For the SmartMX, this means that ISO 14443-4
protocol layer is activated for APDU based communication with the
JavaCard. Thus, the ATR generated by the smart card reader would reflect
the properties of the APDU-based JavaCard and not those of the MIFARE 4K
area. This is the value I recieve when card emulation is on:
  3B 8A 80 01 00 31 C1 73 C8 40 00 00 90 00 90


Best regards,
Michael

-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en


[android-developers] Re: NFC Secure Element

2011-06-02 Thread Jorn Cruijsen
Hey Michael,

Oh, it seems I failed terribly.. That's the value I thought to receive when
the device is in peer-to-peer mode. I confused the two.

Thanks for the clarification.

--
Met vriendelijke groet, | Best regards,
Jorn Cruijsen
jorncruij...@gmail.com
(+31) (0)6 272 492 91



On Thu, Jun 2, 2011 at 1:15 PM, Michael Roland mi.rol...@gmail.com wrote:

 Hallo JMC,

  Are you guys sure it's a MIFARE 4k card it's emulating?

 Yes, I'm very sure it is emulating a MIFARE Classic 4K card and an APDU
 based smart card (depending on the protocol activation level).


  When I put the device in emulation mode and read its ATR, I'm getting:
  3B 8F 80 01 80 4F 0C A0 00 00 03 06 03 00 00 00 00 00 00 6B

 Decoding this PC/SC ATR gives this:
 3B ... Contactless card
  8F ... Number of historical bytes: 0xF (15)
  80
  01
80 ... Category indicator: A status indicator may be present
   in an optional COMPACT-TLV data object.
4F ... Application identifier Presence indicator
0C ... Length of application identifier: 0x0C (12)
  Application identifier:
A0 00 00 03 06 ... RID: PC/SC Working Group
03 ... Byte for Standard: ISO 14443 A, part 3
00 00 ... Bytes for Card Name: not in standard
00 00 00 00 ... RFU (Shall be set to zero)
  6B ... Checksum

 This is a typical ATR if the card emulation mode is not activated. I
 receive that ATR if I put the phone in peer-to-peer communication mode
 (which is the default if card emulation is disabled).


  While I'm actually expecting:
  3B 8F 80 01 80 4F 0C A0 00 00 03 06 03 00 02 00 00 00 00 69

 With the phone you would not normally receive such an ATR for the card
 emulation mode either. Usually a contactless smart card reader (like the
 Omnikey 5321) activates the contactless smart card up to its highest
 supported protocol layer. For the SmartMX, this means that ISO 14443-4
 protocol layer is activated for APDU based communication with the
 JavaCard. Thus, the ATR generated by the smart card reader would reflect
 the properties of the APDU-based JavaCard and not those of the MIFARE 4K
 area. This is the value I recieve when card emulation is on:
  3B 8A 80 01 00 31 C1 73 C8 40 00 00 90 00 90


 Best regards,
 Michael



-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en

[android-developers] Re: NFC Secure Element

2011-06-02 Thread Alberto González
Have anyone read this?

2.3.4. adds hidden classes for secure element and related:
http://gibraltarsf.com/blog/?p=247

On Jun 2, 2:55 pm, Jorn Cruijsen jorncruij...@gmail.com wrote:
 Hey Michael,

 Oh, it seems I failed terribly.. That's the value I thought to receive when
 the device is in peer-to-peer mode. I confused the two.

 Thanks for the clarification.

 --
 Met vriendelijke groet, | Best regards,
 Jorn Cruijsen
 jorncruij...@gmail.com
 (+31) (0)6 272 492 91







 On Thu, Jun 2, 2011 at 1:15 PM, Michael Roland mi.rol...@gmail.com wrote:
  Hallo JMC,

   Are you guys sure it's a MIFARE 4k card it's emulating?

  Yes, I'm very sure it is emulating a MIFARE Classic 4K card and an APDU
  based smart card (depending on the protocol activation level).

   When I put the device in emulation mode and read its ATR, I'm getting:
   3B 8F 80 01 80 4F 0C A0 00 00 03 06 03 00 00 00 00 00 00 6B

  Decoding this PC/SC ATR gives this:
  3B ... Contactless card
   8F ... Number of historical bytes: 0xF (15)
   80
   01
     80 ... Category indicator: A status indicator may be present
            in an optional COMPACT-TLV data object.
     4F ... Application identifier Presence indicator
     0C ... Length of application identifier: 0x0C (12)
       Application identifier:
         A0 00 00 03 06 ... RID: PC/SC Working Group
         03 ... Byte for Standard: ISO 14443 A, part 3
         00 00 ... Bytes for Card Name: not in standard
         00 00 00 00 ... RFU (Shall be set to zero)
   6B ... Checksum

  This is a typical ATR if the card emulation mode is not activated. I
  receive that ATR if I put the phone in peer-to-peer communication mode
  (which is the default if card emulation is disabled).

   While I'm actually expecting:
   3B 8F 80 01 80 4F 0C A0 00 00 03 06 03 00 02 00 00 00 00 69

  With the phone you would not normally receive such an ATR for the card
  emulation mode either. Usually a contactless smart card reader (like the
  Omnikey 5321) activates the contactless smart card up to its highest
  supported protocol layer. For the SmartMX, this means that ISO 14443-4
  protocol layer is activated for APDU based communication with the
  JavaCard. Thus, the ATR generated by the smart card reader would reflect
  the properties of the APDU-based JavaCard and not those of the MIFARE 4K
  area. This is the value I recieve when card emulation is on:
   3B 8A 80 01 00 31 C1 73 C8 40 00 00 90 00 90

  Best regards,
  Michael

-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en


[android-developers] Re: NFC Secure Element

2011-06-02 Thread Steve McRae
I can confirm the ATR's as Michael pointed and add an interesting
follow on. When I do scardconnect and then scardsttus to get uid I get
the 5 byte (4 byte dynamic first by 08 static e.g. 080A97A6) from the
phone whenever the NFC service is running. if I leave the connection
open and run multiple commands the uid stays the same but if i
disconnect and reconnect the uid dynamically changes. Is there a way
to capture this uid as it is being created/sent from the phone? Is
this uid generated by the secure element?

On Jun 2, 11:21 am, Alberto González doctorg...@gmail.com wrote:
 Have anyone read this?

 2.3.4. adds hidden classes for secure element and 
 related:http://gibraltarsf.com/blog/?p=247

 On Jun 2, 2:55 pm, Jorn Cruijsen jorncruij...@gmail.com wrote:







  Hey Michael,

  Oh, it seems I failed terribly.. That's the value I thought to receive when
  the device is in peer-to-peer mode. I confused the two.

  Thanks for the clarification.

  --
  Met vriendelijke groet, | Best regards,
  Jorn Cruijsen
  jorncruij...@gmail.com
  (+31) (0)6 272 492 91

  On Thu, Jun 2, 2011 at 1:15 PM, Michael Roland mi.rol...@gmail.com wrote:
   Hallo JMC,

Are you guys sure it's a MIFARE 4k card it's emulating?

   Yes, I'm very sure it is emulating a MIFARE Classic 4K card and an APDU
   based smart card (depending on the protocol activation level).

When I put the device in emulation mode and read its ATR, I'm getting:
3B 8F 80 01 80 4F 0C A0 00 00 03 06 03 00 00 00 00 00 00 6B

   Decoding this PC/SC ATR gives this:
   3B ... Contactless card
    8F ... Number of historical bytes: 0xF (15)
    80
    01
      80 ... Category indicator: A status indicator may be present
             in an optional COMPACT-TLV data object.
      4F ... Application identifier Presence indicator
      0C ... Length of application identifier: 0x0C (12)
        Application identifier:
          A0 00 00 03 06 ... RID: PC/SC Working Group
          03 ... Byte for Standard: ISO 14443 A, part 3
          00 00 ... Bytes for Card Name: not in standard
          00 00 00 00 ... RFU (Shall be set to zero)
    6B ... Checksum

   This is a typical ATR if the card emulation mode is not activated. I
   receive that ATR if I put the phone in peer-to-peer communication mode
   (which is the default if card emulation is disabled).

While I'm actually expecting:
3B 8F 80 01 80 4F 0C A0 00 00 03 06 03 00 02 00 00 00 00 69

   With the phone you would not normally receive such an ATR for the card
   emulation mode either. Usually a contactless smart card reader (like the
   Omnikey 5321) activates the contactless smart card up to its highest
   supported protocol layer. For the SmartMX, this means that ISO 14443-4
   protocol layer is activated for APDU based communication with the
   JavaCard. Thus, the ATR generated by the smart card reader would reflect
   the properties of the APDU-based JavaCard and not those of the MIFARE 4K
   area. This is the value I recieve when card emulation is on:
    3B 8A 80 01 00 31 C1 73 C8 40 00 00 90 00 90

   Best regards,
   Michael

-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en


Re: [android-developers] Re: NFC Secure Element

2011-06-01 Thread JMC114
Are you guys sure it's a MIFARE 4k card it's emulating?

When I put the device in emulation mode and read its ATR, I'm getting:

3B 8F 80 01 80 4F 0C A0 00 00 03 06 03 00 00 00 00 00 00 6B

While I'm actually expecting:

3B 8F 80 01 80 4F 0C A0 00 00 03 06 03 00 02 00 00 00 00 69

Similar - but not quite.

Thoughts?

Regards,

JMC

-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en

[android-developers] Re: NFC Secure Element

2011-06-01 Thread Martin
Hi JMC,

I can not check this at the moment, because I do not have the device
at the moment.
After some changes in the the android cpp sources, I got additional
information about the Secure Element, when I open a secure element
connection via reflection. So there I can see that it has the Mifare
technology.

But
3B 8F 80 01 80 4F 0C A0 00 00 03 06 03 00 00 00 00 00 00 6B
does not even represent a Mifare Classic 1k card.

Log output:
2 Tags discovered.

Tag Technology:
3 - ISO_DEP
1 - NFC_A
8 - MIFARE_CLASSIC

Tech Type - don't know what this is...
9
9
12

Tech handle
3211564 - just an example
3211564 - just an example
3211495 - just an example

Best wishes,

Martin



On 1 Jun., 10:36, JMC114 jorncruij...@gmail.com wrote:
 Are you guys sure it's a MIFARE 4k card it's emulating?

 When I put the device in emulation mode and read its ATR, I'm getting:

 3B 8F 80 01 80 4F 0C A0 00 00 03 06 03 00 00 00 00 00 00 6B

 While I'm actually expecting:

 3B 8F 80 01 80 4F 0C A0 00 00 03 06 03 00 02 00 00 00 00 69

 Similar - but not quite.

 Thoughts?

 Regards,

 JMC

-- 
You received this message because you are subscribed to the Google
Groups Android Developers group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en


  1   2   >