Thank you so much for all support! My BP is a v3.6a (Sparkfun), Firmware v6.3-beta1 r2088 Bootloader v4.4, DEVID:0x0447 REVID:0x3046 (24FJ64GA002 B8)
I tested several ways:
I connected directly MOSI, CLK and GND BP to the Smart Card Reader pins I/O, CLK and GND. I put in Card SLE4442 and manage the content with a custom software.
I tried I2C sniffer and this is the result: [0x0C+0x00+][0x0C-0x00+][0x0C+0x80+][0x0C-0x80+][0x0C+0x40+][0x0C-0x40+]... Data seem correct and I can see the PSC verification sequence (0x31,0x39,0x33,0x33,0x33,0x39,0x31) but just the command code not the PSC code.
I tried SPI sniffer using teraterm directly on BP and this is the result: 0x45 0xC8 0x08 0x89 0x86 0x18 0x00 0x30 0x05... Here I can see 0x45 0xC8 0x08 0x89. Unfortunately, I cannot read PSC verification sequence like I2C sniffer. Randomly I detect "0xCC 0x80..." or "0xCC 0x40..." or "0xCC 0xC0..." translated they are "0x33 0x01..." or "0x33 0x02..." or "0x33 0x03..."
After last test in Logic Analyzer Mode, data are similar like SPI sniffer but the Analyzer go timeout after few samples. I sampling 100kHz and trigger is set on MOSI and CLK pins. After sampling I analyze data with SPI mode 0. When I connect the Card I see the correct ATR: [attachment=0]
I have already tried SPIsniffer.v0.3 utility but I obtain result like SPI sniffer using teraterm. In my little test I simple run "SPIsniffer -d COM5" into SPIsniffer.bat However, I would like to tried one more time but before could you explain me your idea about connect the BP and what's the right configuration for SPIsniffer.v0.3 utility?
I'm stuck because I optain always the same results. I cannot go on :-( and now I'm not sure if BP is the right hardware for my job. Maybe there's alternatives?
Thank you, all clear but I have two more things before test it...
You describe channel connection :
CH0 = Bus Pirate CS = SLE4442 RESET CH1 = Bus Pirate MISO = SLE4442 CLK CH2 = Bus Pirate CLK = SLE4442 I/O
1. Bus Pirate MISO = SLE4442 CLOCK and Bus Pirate CLK = SLE4442 I/O... They are reversed or it's correct?
and you describe settings for SPI decoder:
MOSI [2-'MOSI'] MISO [None] Clock[1-'clk'] Enable[None] Least Significant Bit First 8 Bits per Transfer (Standard) Clock is Low when inactive (CPOL = 0) Data is Valid on Clock Leading Edge (CPHA = 0) Enable line is Active Low (Standard)
2. MISO is set for acquisition but for SPI decoder is set MOSI. It's correct?
Hi USBEprom, Thank you for reply and support. I'm studying SLE4442 there is no fraudulent intentions.
I would like try Bus Pirate as a logic analyzer and I have some questions:
1. CH3 = Bus Pirate MOSI = SLE4442 SC_PRES ...what it's the PIN SC_PRES on SLE4442? 2. I'm using ols-0.9.7.2 like SUMP Client, it's ok or there is another version?
someone could explain me how setup my Bus Pirate v3.6a for sniff the communication between a Smart Card Reader and SLE4442? I need to discovery the PSC code.