The sequence of APDUS obtained through pcscd -fda to the same sequence of encrypt/decrypt is:
muscleTool [MuscleCard Applet] > crypt 3 Would you like to: 0. Abort this selection. 1. Verify 2. Encrypt winscard_msg_srv.c:274:SHMProcessEventsContext() correctly processed client: 6 winscard.c:1454:SCardTransmit() Send Protocol: T=0 APDU: B0 3A 00 00 0B ifdhandler.c:913:IFDHTransmitToICC() lun: 0 SW: 00 03 FF 04 00 00 00 00 00 00 00 90 00 winscard_msg_srv.c:274:SHMProcessEventsContext() correctly processed client: 6 winscard.c:1454:SCardTransmit() Send Protocol: T=0 APDU: B0 3A 01 00 0B ifdhandler.c:913:IFDHTransmitToICC() lun: 0 SW: 01 03 FF 04 00 FF FF 00 02 00 02 90 00 winscard_msg_srv.c:274:SHMProcessEventsContext() correctly processed client: 6 winscard.c:1454:SCardTransmit() Send Protocol: T=0 APDU: B0 3A 01 00 0B ifdhandler.c:913:IFDHTransmitToICC() lun: 0 SW: 02 01 FF 04 00 00 00 00 00 00 00 90 00 winscard_msg_srv.c:274:SHMProcessEventsContext() correctly processed client: 6 winscard.c:1454:SCardTransmit() Send Protocol: T=0 APDU: B0 3A 01 00 0B ifdhandler.c:913:IFDHTransmitToICC() lun: 0 SW: 03 01 FF 04 00 00 02 00 02 00 00 90 00 Choose (0-2): 2 Please enter text to encrypt in hexadecimal ASCII (at most 1023 characters) Example: 30313233 for 0123 'a' aborts this query. Enter text : 3030303030303030303030303030303030303030303030303030303030303030303030303030303030303030303030303030303030303030303030303030303030303030303030303030303030303030303030303030303030303030303030303030303030303030303030303030303030303030303030303030303030303030 Select the algorithm: 0. Abort this selection. 1. RSA with no padding 2. RSA with PKCS#1 padding Choose (0-2): 1 Result : 50E10165723ADF21485AC80E0924590CFB13A5799DBF60329B1ED7DDF3DAB4DFF002BB9AB4B709B064629E679ED165A89D61B2CD8F8125CFAC884F7366220F5C92AFE442804F39D39EA59706A445D68B9737653C2E2E5CE2B0BCF61B75F6D1AF0D9A44C3A26127D89F96F86043D08E79B45DFAF800C96DFBF655F76863EA31E1 Crypt Successful. winscard_msg_srv.c:274:SHMProcessEventsContext() correctly processed client: 6 winscard.c:1454:SCardTransmit() Send Protocol: T=0 APDU: B0 36 03 01 05 00 03 01 00 00 ifdhandler.c:913:IFDHTransmitToICC() lun: 0 SW: 90 00 winscard_msg_srv.c:274:SHMProcessEventsContext() correctly processed client: 6 winscard.c:1454:SCardTransmit() Send Protocol: T=0 APDU: B0 36 03 03 83 01 00 80 01 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 ifdhandler.c:913:IFDHTransmitToICC() lun: 0 SW: 61 82 winscard_msg_srv.c:274:SHMProcessEventsContext() correctly processed client: 6 winscard.c:1454:SCardTransmit() Send Protocol: T=0 APDU: 00 C0 00 00 82 ifdhandler.c:913:IFDHTransmitToICC() lun: 0 SW: 00 80 50 E1 01 65 72 3A DF 21 48 5A C8 0E 09 24 59 0C FB 13 A5 79 9D BF 60 32 9B 1E D7 DD F3 DA B4 DF F0 02 BB 9A B4 B7 09 B0 64 62 9E 67 9E D1 65 A8 9D 61 B2 CD 8F 81 25 CF AC 88 4F 73 66 22 0F 5C 92 AF E4 42 80 4F 39 D3 9E A5 97 06 A4 45 D6 8B 97 37 65 3C 2E 2E 5C E2 B0 BC F6 1B 75 F6 D1 AF 0D 9A 44 C3 A2 61 27 D8 9F 96 F8 60 43 D0 8E 79 B4 5D FA F8 00 C9 6D FB F6 55 F7 68 63 EA 31 E1 90 00 muscleTool [MuscleCard Applet] > muscleTool [MuscleCard Applet] > crypt 1 Would you like to: 0. Abort this selection. 1. Sign 2. Decrypt winscard_msg_srv.c:274:SHMProcessEventsContext() correctly processed client: 6 winscard.c:1454:SCardTransmit() Send Protocol: T=0 APDU: B0 3A 00 00 0B ifdhandler.c:913:IFDHTransmitToICC() lun: 0 SW: 00 03 FF 04 00 00 00 00 00 00 00 90 00 winscard_msg_srv.c:274:SHMProcessEventsContext() correctly processed client: 6 winscard.c:1454:SCardTransmit() Send Protocol: T=0 APDU: B0 3A 01 00 0B ifdhandler.c:913:IFDHTransmitToICC() lun: 0 SW: 01 03 FF 04 00 FF FF 00 02 00 02 90 00 Choose (0-2): 2 Please enter text to decrypt in hexadecimal ASCII (at most 1023 characters) Example: 30313233 for 0123 'a' aborts this query. Enter text : 50E10165723ADF21485AC80E0924590CFB13A5799DBF60329B1ED7DDF3DAB4DFF002BB9AB4B709B064629E679ED165A89D61B2CD8F8125CFAC884F7366220F5C92AFE442804F39D39EA59706A445D68B9737653C2E2E5CE2B0BCF61B75F6D1AF0D9A44C3A26127D89F96F86043D08E79B45DFAF800C96DFBF655F76863EA31E1 Select the algorithm: 0. Abort this selection. 1. RSA with no padding 2. RSA with PKCS#1 padding Choose (0-2): 1 Result : 37030122C135C7BDF9B43DA916B8B59933E5741D38FE9E9C878416C26A14B3811D8A5442128FAB0D4D1D3172560B521AF095C8D731FAFA8F7E02D74A35C9F69F5790942AE8BEBA4E461740027924A8F8D6C4978AC394C95AE691771D922883A7F6F6A9F3913F7F4E329973F97DB29A74B91DB2F244FB2A0378F92C22FC1892BF Crypt Successful. winscard_msg_srv.c:274:SHMProcessEventsContext() correctly processed client: 6 winscard.c:1454:SCardTransmit() Send Protocol: T=0 APDU: B0 36 01 01 05 00 04 01 00 00 ifdhandler.c:913:IFDHTransmitToICC() lun: 0 SW: 90 00 winscard_msg_srv.c:274:SHMProcessEventsContext() correctly processed client: 6 winscard.c:1454:SCardTransmit() Send Protocol: T=0 APDU: B0 36 01 03 83 01 00 80 01 50 E1 01 65 72 3A DF 21 48 5A C8 0E 09 24 59 0C FB 13 A5 79 9D BF 60 32 9B 1E D7 DD F3 DA B4 DF F0 02 BB 9A B4 B7 09 B0 64 62 9E 67 9E D1 65 A8 9D 61 B2 CD 8F 81 25 CF AC 88 4F 73 66 22 0F 5C 92 AF E4 42 80 4F 39 D3 9E A5 97 06 A4 45 D6 8B 97 37 65 3C 2E 2E 5C E2 B0 BC F6 1B 75 F6 D1 AF 0D 9A 44 C3 A2 61 27 D8 9F 96 F8 60 43 D0 8E 79 B4 5D FA F8 00 C9 6D FB F6 55 F7 68 63 EA 31 ifdhandler.c:913:IFDHTransmitToICC() lun: 0 SW: 61 82 winscard_msg_srv.c:274:SHMProcessEventsContext() correctly processed client: 6 winscard.c:1454:SCardTransmit() Send Protocol: T=0 APDU: 00 C0 00 00 82 ifdhandler.c:913:IFDHTransmitToICC() lun: 0 SW: 00 80 37 03 01 22 C1 35 C7 BD F9 B4 3D A9 16 B8 B5 99 33 E5 74 1D 38 FE 9E 9C 87 84 16 C2 6A 14 B3 81 1D 8A 54 42 12 8F AB 0D 4D 1D 31 72 56 0B 52 1A F0 95 C8 D7 31 FA FA 8F 7E 02 D7 4A 35 C9 F6 9F 57 90 94 2A E8 BE BA 4E 46 17 40 02 79 24 A8 F8 D6 C4 97 8A C3 94 C9 5A E6 91 77 1D 92 28 83 A7 F6 F6 A9 F3 91 3F 7F 4E 32 99 73 F9 7D B2 9A 74 B9 1D B2 F2 44 FB 2A 03 78 F9 2C 22 FC 18 92 BF 90 00 2008/3/21, Amanda Ortega <[EMAIL PROTECTED]>: > > I think it is very strange I can't execute the command challenge. I > suppose this is basic for the operations of encryption. The output of pcscd > when I try challenge at muscleTool is: > > winscard_msg_srv.c:274:SHMProcessEventsContext() correctly processed > client: 6 > winscard.c:1454:SCardTransmit() Send Protocol: T=0 > APDU: B0 72 00 01 04 00 08 00 00 > ifdhandler.c:913:IFDHTransmitToICC() lun: 0 > SW: 6D 00 > > > 2008/3/14, Amanda Ortega <[EMAIL PROTECTED]>: > > > > Sylvain > > > > - you didn't confirm that the applet you're using is the one present at: > > > > > > > > <http://www.linuxnet.com/musclecard/files/mcardapplet-0.9.8-GXPRAD.tgz> > > > > > > Yes, it is this applet. > > > > - you didn't indicate (or I miss) the JavaCard platform you're using. > > > > > > I am using JavaCard 2,1,1. > > > > Amanda > > > >
_______________________________________________ Muscle mailing list [email protected] http://lists.drizzle.com/mailman/listinfo/muscle
