{"id":17,"date":"2006-03-05T13:29:49","date_gmt":"2006-03-05T18:29:49","guid":{"rendered":"http:\/\/blogs.terrorware.com\/geoff\/2006\/03\/05\/cardreader-notes\/"},"modified":"2006-03-05T13:29:49","modified_gmt":"2006-03-05T18:29:49","slug":"cardreader-notes","status":"publish","type":"post","link":"http:\/\/blogs.terrorware.com\/geoff\/2006\/03\/05\/cardreader-notes\/","title":{"rendered":"cardreader notes"},"content":{"rendered":"<p>Fluffy and I got together yesterday and made a flyer for the silicon user&#8217;s group.\u00c2\u00a0 I fucked around with the cardreader he had bought agess ago.\u00c2\u00a0 I finally got the cardreader to recognize cards using the openct software.\u00c2\u00a0 Here are some notes with my plight.\u00c2\u00a0 I had to compile openct 0.6.6 from source because 0.6.5 didn&#8217;t support his cardreader.<\/p>\n<p>Oh yeah, the cards we&#8217;re interested in are an\u00c2\u00a0 sle4442.<\/p>\n<pre>From hotplug script test as recommended by http:\/\/www.opensc-project.org\/openct\/wiki\/TroubleShooting:\r\n\r\nroot@ender:\/home\/ghing\/download\/openct-0.6.6# cat \/root\/testplug.log\r\n\r\n...\r\n\r\n\/root\/testplug: usb\r\ndeclare -x ACTION=\"add\"\r\ndeclare -x DEVPATH=\"\/devices\/pci0000:00\/0000:00:07.2\/usb1\/1-1\"\r\ndeclare -x HOME=\"\/\"\r\ndeclare -x OLDPWD\r\ndeclare -x PATH=\"\/sbin:\/bin:\/usr\/sbin:\/usr\/bin\"\r\ndeclare -x PHYSDEVBUS=\"usb\"\r\ndeclare -x PHYSDEVDRIVER=\"usb\"\r\ndeclare -x PWD=\"\/\"\r\ndeclare -x SEQNUM=\"1185\"\r\ndeclare -x SHLVL=\"1\"\r\ndeclare -x SUBSYSTEM=\"usb\"\r\n\r\n\/root\/testplug: usb\r\ndeclare -x ACTION=\"add\"\r\ndeclare -x DEVICE=\"\/proc\/bus\/usb\/001\/009\"\r\ndeclare -x DEVPATH=\"\/devices\/pci0000:00\/0000:00:07.2\/usb1\/1-1\/1-1:1.0\"\r\ndeclare -x HOME=\"\/\"\r\ndeclare -x INTERFACE=\"0\/0\/0\"\r\ndeclare -x MODALIAS=\"usb:v072Fp0001d0200dc00dsc00dp00ic00isc00ip00\"\r\ndeclare -x OLDPWD\r\ndeclare -x PATH=\"\/sbin:\/bin:\/usr\/sbin:\/usr\/bin\"\r\ndeclare -x PHYSDEVBUS=\"usb\"\r\ndeclare -x PRODUCT=\"72f\/1\/200\"\r\ndeclare -x PWD=\"\/\"\r\ndeclare -x SEQNUM=\"1186\"\r\ndeclare -x SHLVL=\"1\"\r\ndeclare -x SUBSYSTEM=\"usb\"\r\ndeclare -x TYPE=\"0\/0\/0\"\r\n\r\nBased on this info, I then tried to attach the device manually:\r\n\r\nroot@ender:\/home\/ghing\/download\/openct-0.6.6# openct-control attach \/proc\/bus\/usb\/001\/009 usb:72f\/1\/200\r\nNo driver for this device\r\n\r\nI then took a look at my \/etc\/openct.conf file and found the entry for the driver was listed as:\r\n\r\ndriver pertosmart1030 {\r\nids = {\r\nusb:072f\/0001,\r\nusb:072f\/8009,\r\n};\r\n};\r\n\r\nI modified the entry to read like this:\r\n\r\ndriver pertosmart1030 {\r\nids = {\r\nusb:072f\/0001,\r\nusb:72f\/1\/200,\r\nusb:072f\/8009,\r\n};\r\n};\r\n\r\nAnd re-ran the above command.  It found the reader!\r\n\r\nroot@ender:\/home\/ghing\/download\/openct-0.6.6# openct-control -f \/etc\/openct.conf  status\r\nNo.   Name                         Info\r\n===================================================\r\n0   PertoSmart (AC1030, USB)     slot0: card present<\/pre>\n","protected":false},"excerpt":{"rendered":"<p>Fluffy and I got together yesterday and made a flyer for the silicon user&#8217;s group.\u00c2\u00a0 I fucked around with the cardreader he had bought agess ago.\u00c2\u00a0 I finally got the cardreader to recognize cards using the openct software.\u00c2\u00a0 Here are some notes with my plight.\u00c2\u00a0 I had to compile openct 0.6.6 from source because 0.6.5&hellip; <a class=\"more-link\" href=\"http:\/\/blogs.terrorware.com\/geoff\/2006\/03\/05\/cardreader-notes\/\">Continue reading <span class=\"screen-reader-text\">cardreader notes<\/span><\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[1],"tags":[],"class_list":["post-17","post","type-post","status-publish","format-standard","hentry","category-uncategorized","entry"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4wnIz-h","_links":{"self":[{"href":"http:\/\/blogs.terrorware.com\/geoff\/wp-json\/wp\/v2\/posts\/17","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/blogs.terrorware.com\/geoff\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/blogs.terrorware.com\/geoff\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/blogs.terrorware.com\/geoff\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"http:\/\/blogs.terrorware.com\/geoff\/wp-json\/wp\/v2\/comments?post=17"}],"version-history":[{"count":0,"href":"http:\/\/blogs.terrorware.com\/geoff\/wp-json\/wp\/v2\/posts\/17\/revisions"}],"wp:attachment":[{"href":"http:\/\/blogs.terrorware.com\/geoff\/wp-json\/wp\/v2\/media?parent=17"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/blogs.terrorware.com\/geoff\/wp-json\/wp\/v2\/categories?post=17"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/blogs.terrorware.com\/geoff\/wp-json\/wp\/v2\/tags?post=17"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}