Skip to main content

Show Posts

This section allows you to view all Show Posts made by this member. Note that you can only see Show Posts made in areas you currently have access to.

Messages - elfuego

1
Bus Pirate Support / Re: PSC Code SLE4442
Hi USBEprom,

I'm little bit busy with other activities.

I don't have any tool for meauring the clock frequency...

I will still try to measure signals with SPI sniffer utility 0.3 but I'm not expect a great result.

One thing: I never connected external pullup resistors (2k-10k) on signals. Could be a problem?

I'm thinking to buy and try an "Open Bench Logic Sniffer".

For now, thank you for support  8) . I will let you know something

Regards
Fuego
2
Bus Pirate Support / Re: PSC Code SLE4442
HI USBEProm,

Thank you so much for all support!
My BP is a v3.6a (Sparkfun), Firmware v6.3-beta1 r2088  Bootloader v4.4, DEVID:0x0447 REVID:0x3046 (24FJ64GA002 B8)

I tested several ways:

I connected directly MOSI, CLK and GND BP to the Smart Card Reader pins I/O, CLK and GND.
I put in Card SLE4442 and manage the content with a custom software.

I tried I2C sniffer and this is the result:
[0x0C+0x00+][0x0C-0x00+][0x0C+0x80+][0x0C-0x80+][0x0C+0x40+][0x0C-0x40+]...
Data seem correct and I can see the PSC verification sequence (0x31,0x39,0x33,0x33,0x33,0x39,0x31) but just the command code not the PSC code.

I tried SPI sniffer using teraterm directly on BP and this is the result:
0x45 0xC8 0x08 0x89 0x86 0x18 0x00 0x30 0x05...
Here I can see 0x45 0xC8 0x08 0x89.
Unfortunately, I cannot read PSC verification sequence like I2C sniffer. Randomly I detect "0xCC 0x80..." or "0xCC 0x40..." or "0xCC 0xC0..."
translated they are "0x33 0x01..." or "0x33 0x02..." or "0x33 0x03..."

After last test in Logic Analyzer Mode, data are similar like SPI sniffer but the Analyzer go timeout after few samples.
I sampling 100kHz and trigger is set on MOSI and CLK pins.
After sampling I analyze data with SPI mode 0.
When I connect the Card I see the correct ATR:
[attachment=0]

I have already tried SPIsniffer.v0.3 utility but I obtain result like SPI sniffer using teraterm. In my little test I simple run "SPIsniffer -d COM5" into SPIsniffer.bat
However, I would like to tried one more time but before could you explain me your idea about connect the BP and what's the right configuration for SPIsniffer.v0.3 utility?

I'm stuck because I optain always the same results.
I cannot go on :-( and now I'm not sure if BP is the right hardware for my job. Maybe there's alternatives?

Thanks and Regards,
Fuego
3
Bus Pirate Support / Re: PSC Code SLE4442
Hi USB Eprom,

I tested but there's a strange Behavior.
BP go out from acquisition mode too early and I always obtain ~1850 samples, no more.

Below ols-0.9.7.2 config:
[attachment=3]
[attachment=2]
[attachment=1]
[attachment=0]

I have few samples data and I don't see the command code 0x33.
Do you have any idea why?
4
Bus Pirate Support / Re: PSC Code SLE4442
Hi USBEprom,

Thank you, all clear but I have two more things before test it...

You describe channel connection :

CH0 = Bus Pirate CS = SLE4442 RESET
CH1 = Bus Pirate MISO = SLE4442 CLK
CH2 = Bus Pirate CLK = SLE4442 I/O

1. Bus Pirate MISO = SLE4442 CLOCK and Bus Pirate CLK = SLE4442 I/O... They are reversed or it's correct?

and you describe settings for SPI decoder:

MOSI [2-'MOSI']
MISO [None]
Clock[1-'clk']
Enable[None]
Least Significant Bit First
8 Bits per Transfer (Standard)
Clock is Low when inactive (CPOL = 0)
Data is Valid on Clock Leading Edge (CPHA = 0)
Enable line is Active Low (Standard)

2. MISO is set for acquisition but for SPI decoder is set MOSI. It's correct?

Regards
Fuego
5
Bus Pirate Support / Re: PSC Code SLE4442
Hi USBEprom,
Thank you for reply and support. I'm studying SLE4442 there is no fraudulent intentions.

I would like try Bus Pirate as a logic analyzer and I have some questions:

1. CH3 = Bus Pirate MOSI = SLE4442 SC_PRES ...what it's the PIN SC_PRES on SLE4442?
2. I'm using ols-0.9.7.2 like SUMP Client, it's ok or there is another version?

Thanks and Regards
Fuego
6
Bus Pirate Support / PSC Code SLE4442
Hello Everybody,

someone could explain me how setup my Bus Pirate v3.6a for sniff the communication between a Smart Card Reader and SLE4442?
I need to discovery the PSC code.

Thanks in advance
Fuego

( ! ) Fatal error: Uncaught exception 'Elk_Exception' with message 'Please try again. If you come back to this error screen, report the error to an administrator.' in /var/www/dangerousprototypes/forum/sources/database/Db-mysql.class.php on line 696
( ! ) Elk_Exception: Please try again. If you come back to this error screen, report the error to an administrator. in /var/www/dangerousprototypes/forum/sources/database/Db-mysql.class.php on line 696
Call Stack
#TimeMemoryFunctionLocation
10.01282321616session_write_close ( )...(null):0
20.01322453192ElkArte\sources\subs\SessionHandler\DatabaseHandler->write( )...(null):0
30.01322453968Database_MySQL->query( ).../DatabaseHandler.php:119
40.05672592688Database_MySQL->error( ).../Db-mysql.class.php:273