Quantcast
Channel: Thales Simulator Library
Viewing all 332 articles
Browse latest View live

Reviewed: Version 0.9.6 (Jun 22, 2014)

$
0
0
Rated 5 Stars (out of 5) - For a software HSM simulator this is an excellent piece of software. I have coded a comprehensive card issuance and testing system with it over the last 2 years. Great work and thank you.

New Post: Problem with verification of pin block generated with ZPK

$
0
0
Dear all,
I have generated an encrypted pin block under clear ZPK with my application.
now i want to verify the pin with hsm 8000.but i obtain veification failure.

my application is c# and i'm using .Net Tdes provider.i also crypted the pin under the thales simulator i get same pin block.

Please any help will be very appreciated.

Best Regards.

New Post: Problem with verification of pin block generated with ZPK

$
0
0
Hi!

Give us pls more details what you have actually done and the error code HSM responds you.

Regards,
Juris

New Post: Problem with verification of pin block generated with ZPK

$
0
0
Also. send us pls the PIN you want to verify, the card number and type of PIN-block (of course if that is test card :) ) you are trying to verify.

New Post: Problem with verification of pin block generated with ZPK

$
0
0
hi thanks for the reply,
here are the details you have requested:
account number= 196009475168 pin number=1111
pin block format=03
clear ZPK is 1A75A146A31B5F61ED2DE4DDD52B4C0A
actually i get the pin block 531AB0D823862DD9 using ECB methode in tdes .Net

but with command EC i'm actually getting verification Failiure.

Your help is very appreciated.

thanks.

Best Regards.

New Post: Problem with verification of pin block generated with ZPK

$
0
0
Hi!

Show pls the command to HSM you are sending.

Regards,
Juris

New Post: Problem with verification of pin block generated with ZPK

$
0
0
hi,

here is the command :
ECU425F4E50D22391AB8E8E9BF88ED4403E231F696E6D0C77941E4DC6005BE56FF4531AB0D823862

U425F4E50D22391AB8E8E9BF88ED4403E is the crypted key under ZMK.

i have also generated a Pin block with HSM commands BA and then JG the result with EC for this pinblock is veridication success.
thanks for your assistance.

Best regards.


2014-07-15 8:00 GMT+00:00 Manshtein <[email removed]>:

From: Manshtein

Hi!

Show pls the command to HSM you are sending.

Regards,
Juris

Read the full discussion online.

To add a post to this discussion, reply to this email ([email removed])

To start a new discussion for this project, email [email removed]

You are receiving this email because you subscribed to this discussion on CodePlex. You can unsubscribe on CodePlex.com.

Please note: Images and attachments will be removed from emails. Any posts to this discussion will also be available online at CodePlex.com


New Post: Problem with verification of pin block generated with ZPK

$
0
0
Hi,

just notice please the pin block that was generated for account number= 196009475168 pin number=1111
pin block format=03 under clear ZPK 1A75A146A31B5F61ED2DE4DDD52B4C0A is 531AB0D823862DD9

the pin block was created using thales dll library as follow :


PIN = 1111
PINBlock = PIN.PadRight(16, 'F');
HexKey ZPKHex = new HexKey(ZPK);
EncryptedPINBlock = ThalesSim.Core.Cryptography.TripleDES.TripleDESEncrypt(ZPKHex, PINBlock);


Command HSM for verification is : ECU425F4E50D22391AB8E8E9BF88ED4403E231F696E6D0C77941E4DC6005BE56FF4531AB0D823862
result ED 24 : PIN is fewer than 4 or more than 12 digits
Best regards.

New Post: Problem with verification of pin block generated with ZPK

$
0
0
Hi!

Looks like the page can not display whole command you are sending.

My command:
EC
U6D344B2D3EEB2CD5F19CC0CB645BD006
UE69ACD0494852B45369F7D08EC3C7F95
531AB0D823862DD9
03
196009475168
1
1234
Returns ED01, that means 03 PIN block is suppoted in this command (note that keys are under my LMK).

Could you pls send whole command and VR console command output (REMOVE SERIAL NUMBER FROM OUTPUT)?

Regards,
Juris

New Post: Problem with verification of pin block generated with ZPK

$
0
0
Here is my command EC

EC
Uxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx key ZPK under LMK
231F696E6D0C7794
1E4DC6005BE56FF4
531AB0D823862DD9
03
196009475168
17611


the command returns ED24 witch is related to the pin block encryption.

hsm is thales 8000.

Best regards.

New Post: Problem with verification of pin block generated with ZPK

$
0
0
Hi,
Could you please specify by witch command i can verify the generated pin block format 03 with the HSM.

Thanks for your help.

Best Regards.

New Post: A2 command fail

$
0
0
Hi, I send command A2 to simulator and getting error in events. I using socket.
First I send command PA:
0000PA>L>003^0>033^1>L>003KEY COMPONENT PART 1: ^P;>L>003 KEY CHECK VALUE: ^T;>L>L>003 DO NOT DISCLOSE THIS COMPONENT TO ANYONE ELSE>L>F

Hex:
00883030303050413e4c3e3030335e303e3033335e313e4c3e3030334b455920434f4d504f4e454e54205041525420313a205e503b3e4c3e303033204b455920434845434b2056414c55453a205e543b3e4c3e4c3e30303320444f204e4f5420444953434c4f5345205448495320434f4d504f4e454e5420544f20414e594f4e4520454c53453e4c3e46

Response:
000000PB00


And send A2 command:
0001A20000A2000U >L>003^0>033^1>L>003KEY COMPONENT PART 1: ^P;>L>003 KEY CHECK VALUE: ^T;>L>L>003 DO NOT DISCLOSE THIS COMPONENT TO ANYONE ELSE>L>F

Hex:
009330303031413230303030413230303055203e4c3e3030335e303e3033335e313e4c3e3030334b455920434f4d504f4e454e54205041525420313a205e503b3e4c3e303033204b455920434845434b2056414c55453a205e543b3e4c3e4c3e30303320444f204e4f5420444953434c4f5345205448495320434f4d504f4e454e5420544f20414e594f4e4520454c53453e4c3e46

The error is:
Client from 127.0.0.1:63550 is connected
Client: 127.0.0.1:63550
Request: 0001A20000A2000U >L>003^0>033^1>L>003KEY COMPONENT PART 1: ^P;>L>003 KEY CHECK VALUE: ^T;>L>L>003 DO NOT DISCLOSE THIS COMPONENT TO ANYONE ELSE>L>F
Parsing header and code of message 0001A20000A2000U >L>003^0>033^1>L>003KEY COMPONENT PART 1: ^P;>L>003 KEY CHECK VALUE: ^T;>L>L>003 DO NOT DISCLOSE THIS COMPONENT TO ANYONE ELSE>L>F...
Searching for implementor of A2...
Found implementor ThalesSim.Core.HostCommands.BuildIn.GenerateAndPrintComponent_A2, instantiating...
Calling AcceptMessage()...
Calling ConstructResponse()...
Exception while processing message
System.InvalidOperationException: Invalid key scheme [Unspecified]
at ThalesSim.Core.Utility.CreateRandomKey(KeyScheme ks)
at ThalesSim.Core.HostCommands.BuildIn.GenerateAndPrintComponent_A2.ConstructResponse()
at ThalesSim.Core.ThalesMain.WCMessageArrived(WorkerClient sender, Byte[]& b, Int32 len)
Disconnecting client.
Calling Terminate()...

What is wrong ?

New Post: A2 command fail

$
0
0
After click in "Change Authorized Mode" the command A2 return this:

000001A317

Meaning what ?

New Post: Problem with verification of pin block generated with ZPK

$
0
0
Hi!

You can also try to verify the PIN block using Terminal key and host command DC. The only thing, you should form your plain ZPK using console command FK with key type 002 (TPK).

What firmware version your HSM running?

Currently I have tried 2 units of HSM8000 which I have online and both of them processes EC request with 03 PIN-block well.

Regards,
Juris

New Post: A2 command fail

$
0
0
Hi!
You have a mistake in your A2 command. It should look like below:
A2000U>L>003^0>033^1>L>003KEY COMPONENT PART 1: ^P;>L>003 KEY CHECK VALUE: ^T;>L>L>003 DO NOT DISCLOSE THIS COMPONENT TO ANYONE ELSE>L>F 
000001A317 means, that HSM needs to be in authorised state :)

New Post: Problem with verification of pin block generated with ZPK

$
0
0
thanks Manshtein,
i'll try the folowing and come back to you soon.
Best regards.


2014-07-18 7:44 GMT+00:00 Manshtein <[email removed]>:

From: Manshtein

Hi!

You can also try to verify the PIN block using Terminal key and host command DC. The only thing, you should form your plain ZPK using console command FK with key type 002 (TPK).

What firmware version your HSM running?

Currently I have tried 2 units of HSM8000 which I have online and both of them processes EC request with 03 PIN-block well.

Regards,
Juris

Read the full discussion online.

To add a post to this discussion, reply to this email ([email removed])

To start a new discussion for this project, email [email removed]

You are receiving this email because you subscribed to this discussion on CodePlex. You can unsubscribe on CodePlex.com.

Please note: Images and attachments will be removed from emails. Any posts to this discussion will also be available online at CodePlex.com


New Post: Problem with verification of pin block generated with ZPK

$
0
0
Hi Manshtein,
sorry for my late response. i guesse the problem is the clear key i 'm using.
actually i have decrypted my ZPK/ZMK as follow : with a des calculator i used the data = zpk/zmk and key = zmk/lmk then crypt the pin block with the result.

could you please confirm that the good approach. or else give me a procedure on how to get the clear ZPK key .

Thanks.

New Post: Problem with verification of pin block generated with ZPK

$
0
0
i also tried with format 01 as follow
gen pin block =
PINBlock1 = ("02" + PIN + "FFFFFFFFFF");
PINBlock2 = "0000" + AccountNumber ;

PIN BLOCK = XORHexS (PINBlock1, PINBlock2);

Cipher PINBLOCK = TripleDESEncrypt (ZPKHex, PINBlock);

but always same problem EC........ return ED20 ( pinblock does not contain valid value )

Thanks for your assistance.

Kind regards.

New Post: Problem with verification of pin block generated with ZPK

$
0
0
Hi!

To decrypt ZPK you should do the following steps:
1) generate ZMK component with GC console command;
2) form ZMK component into the key in U scheme using FK console command;
3) export your ZPK under ZMK in X scheme using KE console command;
4) decrypt ZPK under ZMK with ZMK component generated in 1st step using DES calculator.

I assume, you are using different keys under LMK and on your application side. When HSM decrypts PIN-block it validates PIN-block quality. If the PIN-block was encrypted with different key the decryption result will be compleately wrong.

Regards,
Juris

New Post: Get Response from HSM using Java

$
0
0
I am using Java to connect to the HSM on Windows 2008
I am sending a 'GC' command for getting clear components of key.
I am expecting receive something like
Clear component: XXXX XXXX XXXX XXXX XXXX XXXX XXXX XXXX 
Encrypted component: U XXXX XXXX XXXX XXXX XXXX XXXX XXXX XXXX 
Key check value: XXXXXX
The answer from HSM is:
Output from HSM : 000b3015

The code is below:
public class TestHSMJava {
public static void main(String args[]) {
    System.out.println("<<< Main Method Entry >>>");
    String command = null;
    Socket socket = null;
    DataOutputStream out = null;
    DataInputStream in = null;
    byte[] b= new byte[100];
    try {
        socket = new Socket("10.10.10.10", 7500);
        System.out.println("<<< Socket >>> :" + socket);
        if (socket != null) {
            System.out.println("<<< Connected to HSM  >>>:"
                    + socket.isConnected());
            in = new DataInputStream (new BufferedInputStream(socket.getInputStream()));
            out = new DataOutputStream (new BufferedOutputStream(socket.getOutputStream()));
            command = "000b3030303041303030303255";
            out.writeUTF(command);
            System.out.println("Input to HSM : " +command);
            out.flush();
            String response = in.readUTF();
            System.out.println("Output from HSM : " +response);
            System.out.println("");
        }
    }
}
Viewing all 332 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>