I just returned to smart card work to find that Gemplus has killed my favorite card, the Cryptoflex. So I bought some Aladdin PRO 32k cards (not usb tokens). But I can't get them to init. Any suggestions?
Here's the failure: manihiki# pkcs15-init -E manihiki# pkcs15-init -CT New Security Officer PIN (Optional - press return for no PIN). Please enter Security Officer PIN: manihiki# pkcs15-init -PT -a 1 -l rees -v Connecting to card in reader CCID Compatible... Using card driver Siemens CardOS. Found OpenSC Card About to store PIN. New User PIN. Please enter User PIN: 0000 Please type again to verify: Unblock Code for New User PIN (Optional - press return for no PIN). Please enter User unblocking PIN (PUK): 1111 Please type again to verify: [pkcs15-init] reader-openct.c:334:openct_reader_transmit: unable to transmit [pkcs15-init] apdu.c:394:do_single_transmit: unable to transmit APDU [pkcs15-init] iso7816.c:288:iso7816_update_binary: APDU transmit failed: Generic reader error [pkcs15-init] card.c:514:sc_update_binary: returning with: Generic reader error [pkcs15-init] card.c:499:sc_update_binary: sc_update_binary() failed: Generic reader error Failed to store PIN: Generic reader error [pkcs15-init] pkcs15-lib.c:372:sc_pkcs15init_unbind: Failed to update TokenInfo: Generic reader error And here's more info: # lsusb |grep -i smart Bus 003 Device 002: ID 04e6:5116 SCM Microsystems, Inc. SCR331-LC1 SmartCard Reader manihiki# pkcs11-tool -t C_SeedRandom() and C_GenerateRandom(): not implemented Digests: all 4 digest functions seem to work MD5: OK SHA-1: OK RIPEMD160: OK Signatures (currently only RSA signatures) Signatures: no private key found in this slot Verify (currently only for RSA): No private key found for testing Key unwrap (RSA) Decryption (RSA) Testing card detection manihiki# opensc-explorer OpenSC Explorer version 0.11.4 OpenSC [3F00]> ls FileID Type Size [6666] DF 27285 Name: AKS OpenSC [3F00]> info Dedicated File ID 3F00 File path: 3F00 File size: 27285 bytes ACL for SELECT: N/A ACL for LOCK: NEVR ACL for DELETE: NONE ACL for CREATE: NONE ACL for REHABILITATE: NONE ACL for INVALIDATE: NONE ACL for LIST FILES: N/A ACL for CRYPTO: N/A ACL for DELETE SELF: N/A Proprietary attributes: 01 04 00 Security attributes: 00 00 00 00 00 00 FF 00 manihiki# cardos-info 3b:f2:98:00:ff:c1:10:31:fe:55:c8:03:15 Info : CardOS/M4.01 (C) Siemens AG 1994-2001 Chip type: 96 Serial number: 24 7e 4f 0b 26 17 Full prom dump: 33 66 00 45 FF FF FF FF 60 FF 24 7E 4F 0B 26 17 3f.E....`.$~O.&. 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 ................ OS Version: 200.3 (that's CardOS M4.01) Current life cycle: 32 (administration) Security Status of current DF: Free memory : 1024 ATR Status: 0x0 ROM-ATR Packages installed: Ram size: 2, Eeprom size: 32, cpu type: 66, chip config: 63 Free eeprom memory: 22241 System keys: PackageLoadKey (version 0x00, retries 10) System keys: StartKey (version 0xff, retries 10) Path to current DF: _______________________________________________ opensc-devel mailing list opensc-devel@lists.opensc-project.org http://www.opensc-project.org/mailman/listinfo/opensc-devel