I just returned to smart card work to find that Gemplus has killed my
favorite card, the Cryptoflex.  So I bought some Aladdin PRO 32k cards (not
usb tokens).  But I can't get them to init.  Any suggestions?

Here's the failure:

manihiki# pkcs15-init -E
manihiki# pkcs15-init -CT
New Security Officer PIN (Optional - press return for no PIN).
Please enter Security Officer PIN: 
manihiki# pkcs15-init -PT -a 1 -l rees -v
Connecting to card in reader CCID Compatible...
Using card driver Siemens CardOS.
Found OpenSC Card
About to store PIN.
New User PIN.
Please enter User PIN: 0000
Please type again to verify: 
Unblock Code for New User PIN (Optional - press return for no PIN).
Please enter User unblocking PIN (PUK): 1111
Please type again to verify: 
[pkcs15-init] reader-openct.c:334:openct_reader_transmit: unable to transmit
[pkcs15-init] apdu.c:394:do_single_transmit: unable to transmit APDU
[pkcs15-init] iso7816.c:288:iso7816_update_binary: APDU transmit failed: 
Generic reader error
[pkcs15-init] card.c:514:sc_update_binary: returning with: Generic reader error
[pkcs15-init] card.c:499:sc_update_binary: sc_update_binary() failed: Generic 
reader error
Failed to store PIN: Generic reader error
[pkcs15-init] pkcs15-lib.c:372:sc_pkcs15init_unbind: Failed to update 
TokenInfo: Generic reader error

And here's more info:

# lsusb |grep -i smart
Bus 003 Device 002: ID 04e6:5116 SCM Microsystems, Inc. SCR331-LC1 SmartCard 
Reader

manihiki# pkcs11-tool -t
C_SeedRandom() and C_GenerateRandom():
  not implemented
Digests:
  all 4 digest functions seem to work
  MD5: OK
  SHA-1: OK
  RIPEMD160: OK
Signatures (currently only RSA signatures)
Signatures: no private key found in this slot
Verify (currently only for RSA):
  No private key found for testing
Key unwrap (RSA)
Decryption (RSA)
Testing card detection

manihiki# opensc-explorer
OpenSC Explorer version 0.11.4
OpenSC [3F00]> ls
FileID  Type  Size
[6666]    DF 27285      Name: AKS
OpenSC [3F00]> info

Dedicated File  ID 3F00

File path:     3F00
File size:     27285 bytes
ACL for SELECT:          N/A
ACL for LOCK:            NEVR
ACL for DELETE:          NONE
ACL for CREATE:          NONE
ACL for REHABILITATE:    NONE
ACL for INVALIDATE:      NONE
ACL for LIST FILES:      N/A
ACL for CRYPTO:          N/A
ACL for DELETE SELF:     N/A
Proprietary attributes:  01 04 00 
Security attributes:     00 00 00 00 00 00 FF 00 

manihiki# cardos-info
3b:f2:98:00:ff:c1:10:31:fe:55:c8:03:15
Info : CardOS/M4.01 (C) Siemens AG 1994-2001
Chip type: 96
Serial number: 24 7e 4f 0b 26 17
Full prom dump:
33 66 00 45 FF FF FF FF 60 FF 24 7E 4F 0B 26 17 3f.E....`.$~O.&.
00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 ................
OS Version: 200.3 (that's CardOS M4.01)
Current life cycle: 32 (administration)
Security Status of current DF:
Free memory : 1024
ATR Status: 0x0 ROM-ATR
Packages installed:
Ram size: 2, Eeprom size: 32, cpu type: 66, chip config: 63
Free eeprom memory: 22241
System keys: PackageLoadKey (version 0x00, retries 10)
System keys: StartKey (version 0xff, retries 10)
Path to current DF:
_______________________________________________
opensc-devel mailing list
opensc-devel@lists.opensc-project.org
http://www.opensc-project.org/mailman/listinfo/opensc-devel

Reply via email to