The sequence of APDUS obtained through pcscd -fda to the same sequence of
encrypt/decrypt is:

muscleTool [MuscleCard Applet] > crypt 3

Would you like to:
0. Abort this selection.
1. Verify
2. Encrypt

winscard_msg_srv.c:274:SHMProcessEventsContext() correctly processed client:
6
winscard.c:1454:SCardTransmit() Send Protocol: T=0
APDU: B0 3A 00 00 0B
ifdhandler.c:913:IFDHTransmitToICC() lun: 0
SW: 00 03 FF 04 00 00 00 00 00 00 00 90 00
winscard_msg_srv.c:274:SHMProcessEventsContext() correctly processed client:
6
winscard.c:1454:SCardTransmit() Send Protocol: T=0
APDU: B0 3A 01 00 0B
ifdhandler.c:913:IFDHTransmitToICC() lun: 0
SW: 01 03 FF 04 00 FF FF 00 02 00 02 90 00
winscard_msg_srv.c:274:SHMProcessEventsContext() correctly processed client:
6
winscard.c:1454:SCardTransmit() Send Protocol: T=0
APDU: B0 3A 01 00 0B
ifdhandler.c:913:IFDHTransmitToICC() lun: 0
SW: 02 01 FF 04 00 00 00 00 00 00 00 90 00
winscard_msg_srv.c:274:SHMProcessEventsContext() correctly processed client:
6
winscard.c:1454:SCardTransmit() Send Protocol: T=0
APDU: B0 3A 01 00 0B
ifdhandler.c:913:IFDHTransmitToICC() lun: 0
SW: 03 01 FF 04 00 00 02 00 02 00 00 90 00

Choose (0-2): 2

Please enter text to encrypt in hexadecimal ASCII (at most 1023 characters)
Example: 30313233 for 0123

'a' aborts this query.
Enter text :
3030303030303030303030303030303030303030303030303030303030303030303030303030303030303030303030303030303030303030303030303030303030303030303030303030303030303030303030303030303030303030303030303030303030303030303030303030303030303030303030303030303030303030

Select the algorithm:
0. Abort this selection.
1. RSA with no padding
2. RSA with PKCS#1 padding

Choose (0-2): 1
Result    :
50E10165723ADF21485AC80E0924590CFB13A5799DBF60329B1ED7DDF3DAB4DFF002BB9AB4B709B064629E679ED165A89D61B2CD8F8125CFAC884F7366220F5C92AFE442804F39D39EA59706A445D68B9737653C2E2E5CE2B0BCF61B75F6D1AF0D9A44C3A26127D89F96F86043D08E79B45DFAF800C96DFBF655F76863EA31E1
Crypt Successful.

winscard_msg_srv.c:274:SHMProcessEventsContext() correctly processed client:
6
winscard.c:1454:SCardTransmit() Send Protocol: T=0
APDU: B0 36 03 01 05 00 03 01 00 00
ifdhandler.c:913:IFDHTransmitToICC() lun: 0
SW: 90 00
winscard_msg_srv.c:274:SHMProcessEventsContext() correctly processed client:
6
winscard.c:1454:SCardTransmit() Send Protocol: T=0
APDU: B0 36 03 03 83 01 00 80 01 30 30 30 30 30 30 30 30 30 30 30 30 30 30
30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30
30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30
30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30
30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30
30 30 30 30 30 30 30 30 30 30 30 30 30
ifdhandler.c:913:IFDHTransmitToICC() lun: 0
SW: 61 82
winscard_msg_srv.c:274:SHMProcessEventsContext() correctly processed client:
6
winscard.c:1454:SCardTransmit() Send Protocol: T=0
APDU: 00 C0 00 00 82
ifdhandler.c:913:IFDHTransmitToICC() lun: 0
SW: 00 80 50 E1 01 65 72 3A DF 21 48 5A C8 0E 09 24 59 0C FB 13 A5 79 9D BF
60 32 9B 1E D7 DD F3 DA B4 DF F0 02 BB 9A B4 B7 09 B0 64 62 9E 67 9E D1 65
A8 9D 61 B2 CD 8F 81 25 CF AC 88 4F 73 66 22 0F 5C 92 AF E4 42 80 4F 39 D3
9E A5 97 06 A4 45 D6 8B 97 37 65 3C 2E 2E 5C E2 B0 BC F6 1B 75 F6 D1 AF 0D
9A 44 C3 A2 61 27 D8 9F 96 F8 60 43 D0 8E 79 B4 5D FA F8 00 C9 6D FB F6 55
F7 68 63 EA 31 E1 90 00

muscleTool [MuscleCard Applet] > muscleTool [MuscleCard Applet] > crypt 1

Would you like to:
0. Abort this selection.
1. Sign
2. Decrypt

winscard_msg_srv.c:274:SHMProcessEventsContext() correctly processed client:
6
winscard.c:1454:SCardTransmit() Send Protocol: T=0
APDU: B0 3A 00 00 0B
ifdhandler.c:913:IFDHTransmitToICC() lun: 0
SW: 00 03 FF 04 00 00 00 00 00 00 00 90 00
winscard_msg_srv.c:274:SHMProcessEventsContext() correctly processed client:
6
winscard.c:1454:SCardTransmit() Send Protocol: T=0
APDU: B0 3A 01 00 0B
ifdhandler.c:913:IFDHTransmitToICC() lun: 0
SW: 01 03 FF 04 00 FF FF 00 02 00 02 90 00

Choose (0-2): 2

Please enter text to decrypt in hexadecimal ASCII (at most 1023 characters)
Example: 30313233 for 0123

'a' aborts this query.
Enter text :
50E10165723ADF21485AC80E0924590CFB13A5799DBF60329B1ED7DDF3DAB4DFF002BB9AB4B709B064629E679ED165A89D61B2CD8F8125CFAC884F7366220F5C92AFE442804F39D39EA59706A445D68B9737653C2E2E5CE2B0BCF61B75F6D1AF0D9A44C3A26127D89F96F86043D08E79B45DFAF800C96DFBF655F76863EA31E1

Select the algorithm:
0. Abort this selection.
1. RSA with no padding
2. RSA with PKCS#1 padding

Choose (0-2): 1
Result    :
37030122C135C7BDF9B43DA916B8B59933E5741D38FE9E9C878416C26A14B3811D8A5442128FAB0D4D1D3172560B521AF095C8D731FAFA8F7E02D74A35C9F69F5790942AE8BEBA4E461740027924A8F8D6C4978AC394C95AE691771D922883A7F6F6A9F3913F7F4E329973F97DB29A74B91DB2F244FB2A0378F92C22FC1892BF
Crypt Successful.

winscard_msg_srv.c:274:SHMProcessEventsContext() correctly processed client:
6
winscard.c:1454:SCardTransmit() Send Protocol: T=0
APDU: B0 36 01 01 05 00 04 01 00 00
ifdhandler.c:913:IFDHTransmitToICC() lun: 0
SW: 90 00
winscard_msg_srv.c:274:SHMProcessEventsContext() correctly processed client:
6
winscard.c:1454:SCardTransmit() Send Protocol: T=0
APDU: B0 36 01 03 83 01 00 80 01 50 E1 01 65 72 3A DF 21 48 5A C8 0E 09 24
59 0C FB 13 A5 79 9D BF 60 32 9B 1E D7 DD F3 DA B4 DF F0 02 BB 9A B4 B7 09
B0 64 62 9E 67 9E D1 65 A8 9D 61 B2 CD 8F 81 25 CF AC 88 4F 73 66 22 0F 5C
92 AF E4 42 80 4F 39 D3 9E A5 97 06 A4 45 D6 8B 97 37 65 3C 2E 2E 5C E2 B0
BC F6 1B 75 F6 D1 AF 0D 9A 44 C3 A2 61 27 D8 9F 96 F8 60 43 D0 8E 79 B4 5D
FA F8 00 C9 6D FB F6 55 F7 68 63 EA 31
ifdhandler.c:913:IFDHTransmitToICC() lun: 0
SW: 61 82
winscard_msg_srv.c:274:SHMProcessEventsContext() correctly processed client:
6
winscard.c:1454:SCardTransmit() Send Protocol: T=0
APDU: 00 C0 00 00 82
ifdhandler.c:913:IFDHTransmitToICC() lun: 0
SW: 00 80 37 03 01 22 C1 35 C7 BD F9 B4 3D A9 16 B8 B5 99 33 E5 74 1D 38 FE
9E 9C 87 84 16 C2 6A 14 B3 81 1D 8A 54 42 12 8F AB 0D 4D 1D 31 72 56 0B 52
1A F0 95 C8 D7 31 FA FA 8F 7E 02 D7 4A 35 C9 F6 9F 57 90 94 2A E8 BE BA 4E
46 17 40 02 79 24 A8 F8 D6 C4 97 8A C3 94 C9 5A E6 91 77 1D 92 28 83 A7 F6
F6 A9 F3 91 3F 7F 4E 32 99 73 F9 7D B2 9A 74 B9 1D B2 F2 44 FB 2A 03 78 F9
2C 22 FC 18 92 BF 90 00

2008/3/21, Amanda Ortega <[EMAIL PROTECTED]>:
>
> I think it is very strange I can't execute the command challenge. I
> suppose this is basic for the operations of encryption. The output of pcscd
> when I try challenge at muscleTool is:
>
> winscard_msg_srv.c:274:SHMProcessEventsContext() correctly processed
> client: 6
> winscard.c:1454:SCardTransmit() Send Protocol: T=0
> APDU: B0 72 00 01 04 00 08 00 00
> ifdhandler.c:913:IFDHTransmitToICC() lun: 0
> SW: 6D 00
>
>
> 2008/3/14, Amanda Ortega <[EMAIL PROTECTED]>:
> >
> > Sylvain
> >
> > - you didn't confirm that the applet you're using is the one present at:
> > >
> > >
> > <http://www.linuxnet.com/musclecard/files/mcardapplet-0.9.8-GXPRAD.tgz>
> >
> >
> > Yes, it is this applet.
> >
> > - you didn't indicate (or I miss) the JavaCard platform you're using.
> >
> >
> > I am using JavaCard 2,1,1.
> >
> > Amanda
> >
>
>
_______________________________________________
Muscle mailing list
[email protected]
http://lists.drizzle.com/mailman/listinfo/muscle

Reply via email to