AFAIR the wireshark dissector only knows about the SIM RUN GSM ALGORITHM APDU format (with
Kc), but not the USIM AUTHENTICATE APDU format (with CK and IK).
https://github.com/wireshark/wireshark/blob/master/epan/dissectors/packet-g…
This is why it should always return a malformed packet (due to the dissector decoder).
Did you check if the raw bytes actually match the USIM APDU and include CK+IK, or are
bytes also missing there?
On Tue, Dec 13, 2016 at 09:22:13PM +0800, joranglequeen(a)sina.com wrote:
Dear Sir or Madam: I've bought two simtrace
development boards two months ago in order to research the communication between the
SIM-card and the mobile phone. However, recently when I need to analyse the packet which
contains CK and IK, I sadly found that the packet was not captured every time. Mostly it
returns as a malformed packet in the wireshark, which blocks my future studying. I read
the user manual and it says that for some high speed cards the firmware can lose bytes,
and to solve that we can reduce the size of the buffer. So I'm writing to ask the
specific steps to reduce the buffer and recompile the firmware, and I've tried by
myself but I couldn't find a proper toolchain which includes a GCC but not an
EABI. I'm looking forward to your reply. Best wishes! Yours,
sincerely Luna-Qi