# Preparation: # This testcase executes against a sysmoISIM-SJA5 card. Since this card model is # shipped with a classic DES key configuration, it is necessary to provision # AES128 test keys before this testcase may be executed. The the following # pySim-shell command sequence may be used: # # verify_adm 34173960 # <-- change to the ADM key of your card! # select /DF.SYSTEM/EF.0348_KEY # update_record 10 fe03601111111111111111111111111111111111111111111111111111111111111111 # update_record 11 fe03612222222222222222222222222222222222222222222222222222222222222222 # update_record 12 fe03623333333333333333333333333333333333333333333333333333333333333333 # # This overwrites one of the already existing 3DES SCP02 key (KVN 47) and replaces it # with an AES256 SCP80 key (KVN 3). # Card parameter: ICCID="8949440000001155314" # <-- change to the ICCID of your card! EID="" KIC='1111111111111111111111111111111111111111111111111111111111111111' KID='2222222222222222222222222222222222222222222222222222222222222222' KEY_INDEX=3 ALGO_CRYPT=aes_cbc ALGO_AUTH=aes_cmac TAR='B00010' # Testcase: Send OTA-SMS that selects DF.GSM and returns the select response APDU='A0A40000027F20A0C0000016' EXPECTED_RESPONSE='0000ffff7f2002000000000009b106350400838a838a 9000'