/dports/net/tshark-lite/wireshark-3.6.1/epan/dissectors/asn1/acse/ |
H A D | acse.asn | 47 ACSE-apdu ::= CHOICE { 49 -- aarq AARQ-apdu, 50 aarq [APPLICATION 0] IMPLICIT AARQ-apdu, 52 -- aare AARE-apdu, 55 -- rlrq RLRQ-apdu, 58 -- rlre RLRE-apdu, 61 -- abrt ABRT-apdu, 66 -- adt A-DT-apdu, 69 -- acrq ACRQ-apdu, 72 -- acrp ACRP-apdu [all …]
|
/dports/net/wireshark/wireshark-3.6.1/epan/dissectors/asn1/acse/ |
H A D | acse.asn | 47 ACSE-apdu ::= CHOICE { 49 -- aarq AARQ-apdu, 50 aarq [APPLICATION 0] IMPLICIT AARQ-apdu, 52 -- aare AARE-apdu, 55 -- rlrq RLRQ-apdu, 58 -- rlre RLRE-apdu, 61 -- abrt ABRT-apdu, 66 -- adt A-DT-apdu, 69 -- acrq ACRQ-apdu, 72 -- acrp ACRP-apdu [all …]
|
/dports/net/tshark/wireshark-3.6.1/epan/dissectors/asn1/acse/ |
H A D | acse.asn | 47 ACSE-apdu ::= CHOICE { 49 -- aarq AARQ-apdu, 50 aarq [APPLICATION 0] IMPLICIT AARQ-apdu, 52 -- aare AARE-apdu, 55 -- rlrq RLRQ-apdu, 58 -- rlre RLRE-apdu, 61 -- abrt ABRT-apdu, 66 -- adt A-DT-apdu, 69 -- acrq ACRQ-apdu, 72 -- acrp ACRP-apdu [all …]
|
/dports/security/py-pyscard/pyscard-2.0.0/smartcard/Examples/simple/ |
H A D | selectDF_TELECOM.py | 56 apdu = SELECT + DF_TELECOM variable 57 response, sw1, sw2 = cardservice.connection.transmit(apdu) 61 apdu = GET_RESPONSE + [sw2] variable 62 response, sw1, sw2 = cardservice.connection.transmit(apdu)
|
/dports/security/opensc/OpenSC-0.22.0/src/tools/ |
H A D | sceac-example.c | 52 sc_apdu_t apdu; in main() local 112 r = sc_bytes2apdu(ctx, apdubuf, sizeof apdubuf, &apdu); in main() 117 apdu.resp = buf; in main() 118 apdu.resplen = sizeof buf; in main() 121 r = sc_transmit_apdu(card, &apdu); in main()
|
H A D | gids-tool.c | 310 sc_apdu_t apdu; in gids_get_DO() local 317 sc_format_apdu(card, &apdu, in gids_get_DO() 319 apdu.lc = 04; in gids_get_DO() 320 apdu.data = data; in gids_get_DO() 321 apdu.datalen = 04; in gids_get_DO() 322 apdu.resp = buffer; in gids_get_DO() 323 apdu.resplen = sizeof(buffer); in gids_get_DO() 324 apdu.le = 256; in gids_get_DO() 326 r = sc_transmit_apdu(card, &apdu); in gids_get_DO() 329 r = sc_check_sw(card, apdu.sw1, apdu.sw2); in gids_get_DO()
|
H A D | piv-tool.c | 421 sc_apdu_t apdu; in send_apdu() local 431 r = sc_bytes2apdu(card->ctx, buf, len0, &apdu); in send_apdu() 437 apdu.resp = rbuf; in send_apdu() 438 apdu.resplen = sizeof(rbuf); in send_apdu() 444 r = sc_transmit_apdu(card, &apdu); in send_apdu() 449 printf("Received (SW1=0x%02X, SW2=0x%02X)%s\n", apdu.sw1, apdu.sw2, in send_apdu() 450 apdu.resplen ? ":" : ""); in send_apdu() 451 if (apdu.resplen) in send_apdu() 452 util_hex_dump_asc(stdout, apdu.resp, apdu.resplen, -1); in send_apdu()
|
/dports/net-p2p/go-ethereum/go-ethereum-1.10.14/vendor/github.com/status-im/keycard-go/globalplatform/ |
H A D | normal_channel.go | 26 func (c *NormalChannel) Send(cmd *apdu.Command) (*apdu.Response, error) { 39 resp, err := apdu.ParseResponse(rawResp) 49 return apdu.ParseResponse(rawResp)
|
H A D | session_test.go | 16 resp, err := apdu.ParseResponse(raw) 26 resp, err := apdu.ParseResponse(raw) 32 resp, err = apdu.ParseResponse(raw) 39 resp, err = apdu.ParseResponse(raw)
|
H A D | session.go | 23 func NewSession(cardKeys *SCP02Keys, resp *apdu.Response, hostChallenge []byte) (*Session, error) { 25 return nil, apdu.NewErrBadResponse(resp.Sw, "security condition not satisfied") 29 return nil, apdu.NewErrBadResponse(resp.Sw, "authentication method blocked") 33 …return nil, apdu.NewErrBadResponse(resp.Sw, fmt.Sprintf("bad data length, expected 28, got %d", le…
|
/dports/net-p2p/go-ethereum/go-ethereum-1.10.14/vendor/github.com/status-im/keycard-go/types/ |
H A D | application_status.go | 23 tpl, err := apdu.FindTag(data, TagApplicationStatusTemplate) 30 if pinRetryCount, err := apdu.FindTag(tpl, uint8(0x02)); err == nil && len(pinRetryCount) == 1 { 34 …if pukRetryCount, err := apdu.FindTagN(tpl, 1, uint8(0x02)); err == nil && len(pukRetryCount) == 1… 38 if keyInitialized, err := apdu.FindTag(tpl, uint8(0x01)); err == nil {
|
/dports/security/beid/eid-mw-5.0.8/cardcomm/tokend/Tokend-36720/BELPIC/ |
H A D | BELPICRecord.cpp | 240 unsigned char apdu[apduSize]; in computeCrypt() local 244 apdu[0] = 0x00; in computeCrypt() 245 apdu[1] = 0x2A; in computeCrypt() 246 apdu[2] = 0x9E; in computeCrypt() 247 apdu[3] = 0x9A; in computeCrypt() 248 apdu[4] = dataLength; in computeCrypt() 249 memcpy(apdu + 5, data, dataLength); in computeCrypt() 250 BELPICError::check(belpicToken.exchangeAPDU(apdu, apduSize, result, in computeCrypt()
|
/dports/net/yaz++/yazpp-1.6.1/include/yazpp/ |
H A D | z-server.h | 58 virtual int recv(Z_Server *server, Z_APDU *apdu) = 0; 72 int recv(Z_Server *server, Z_APDU *apdu); 88 int recv(Z_Server *server, Z_APDU *apdu); 111 int recv(Z_Server *server, Z_APDU *apdu); 148 void recv_Z_PDU(Z_APDU *apdu, int len); 149 virtual void recv_GDU(Z_GDU *apdu, int len);
|
/dports/security/py-pyscard/pyscard-2.0.0/smartcard/Examples/framework/ |
H A D | sample_ExclusiveCardConnection.py | 65 apdu = SELECT + DF_TELECOM variable 66 response, sw1, sw2 = cardservice.connection.transmit(apdu) 69 apdu = GET_RESPONSE + [sw2] variable 70 response, sw1, sw2 = cardservice.connection.transmit(apdu)
|
H A D | sample_MonitorCardsAndTransmit.py | 58 apdu = SELECT + DF_TELECOM 59 response, sw1, sw2 = card.connection.transmit(apdu) 61 apdu = GET_RESPONSE + [sw2] 62 response, sw1, sw2 = card.connection.transmit(apdu)
|
H A D | sample_apduTracerInterpreter.py | 80 apdu = SELECT + DF_TELECOM variable 81 response, sw1, sw2 = cardservice.connection.transmit(apdu) 83 apdu = GET_RESPONSE + [sw2] variable 84 response, sw1, sw2 = cardservice.connection.transmit(apdu)
|
H A D | sample_CustomErrorChecker.py | 74 apdu = SELECT + DF_TELECOM variable 75 response, sw1, sw2 = cardservice.connection.transmit(apdu) 78 apdu = GET_RESPONSE + [sw2] variable 79 response, sw1, sw2 = cardservice.connection.transmit(apdu)
|
H A D | sample_ErrorChecking.py | 74 apdu = SELECT + DF_TELECOM 75 response, sw1, sw2 = cardservice.connection.transmit(apdu) 78 apdu = GET_RESPONSE + [sw2] variable 79 response, sw1, sw2 = cardservice.connection.transmit(apdu)
|
H A D | sample_CardConnectionDecorator.py | 104 apdu = SELECT + DF_TELECOM variable 105 response, sw1, sw2 = cardservice.connection.transmit(apdu) 108 apdu = GET_RESPONSE + [sw2] variable 109 response, sw1, sw2 = cardservice.connection.transmit(apdu)
|
/dports/security/opensc/OpenSC-0.22.0/src/libopensc/ |
H A D | card-npa.c | 618 sc_apdu_t apdu; in npa_reset_retry_counter() local 650 apdu.data = (u8 *) new; in npa_reset_retry_counter() 651 apdu.datalen = new_len; in npa_reset_retry_counter() 652 apdu.lc = apdu.datalen; in npa_reset_retry_counter() 655 apdu.p1 = 0x02; in npa_reset_retry_counter() 656 apdu.cse = SC_APDU_CASE_3_SHORT; in npa_reset_retry_counter() 658 apdu.p1 = 0x03; in npa_reset_retry_counter() 659 apdu.cse = SC_APDU_CASE_1; in npa_reset_retry_counter() 664 data.apdu = &apdu; in npa_reset_retry_counter() 776 struct sc_apdu apdu; in npa_logout() local [all …]
|
H A D | card-muscle.c | 80 sc_apdu_t apdu; in muscle_match_card() local 91 apdu.cla = 0xB0; in muscle_match_card() 92 apdu.le = 64; in muscle_match_card() 93 apdu.resplen = 64; in muscle_match_card() 94 apdu.resp = response; in muscle_match_card() 556 sc_apdu_t apdu; in muscle_pin_cmd() local 559 cmd->apdu = &apdu; in muscle_pin_cmd() 577 sc_apdu_t apdu; in muscle_pin_cmd() local 579 cmd->apdu = &apdu; in muscle_pin_cmd() 593 sc_apdu_t apdu; in muscle_pin_cmd() local [all …]
|
/dports/net/yaz++/yazpp-1.6.1/zlint/ |
H A D | test-init-07.cpp | 26 Z_APDU *apdu = z->create_Z_PDU(Z_APDU_initRequest); in init() local 27 Z_InitRequest *init = apdu->u.initRequest; in init() 34 yaz_oi_APDU(apdu, &oi); in init() 64 int r = z->send_Z_PDU(apdu, &len); in init()
|
/dports/security/py-pyscard/pyscard-2.0.0/smartcard/test/framework/ |
H A D | testcase_ExclusiveCardConnection.py | 100 apdu = SELECT + DF_TELECOM 101 response, sw1, sw2 = connection.transmit(apdu) 104 apdu = GET_RESPONSE + [sw2] 105 response, sw1, sw2 = connection.transmit(apdu)
|
/dports/net/yaz/yaz-5.31.1/util/ |
H A D | yaz-illclient.c | 454 ILL_APDU *apdu; in createrequest() local 460 apdu = (ILL_APDU *) odr_malloc( odr, sizeof(*apdu) ); in createrequest() 461 apdu->which=ILL_APDU_ILL_Request; in createrequest() 463 apdu->u.illRequest=req; in createrequest() 477 return apdu; in createrequest() 487 if (!ill_APDU (odr, &apdu, 0, 0)) { in sendrequest() 566 void dumpapdu( ILL_APDU *apdu) { in dumpapdu() argument 568 ill_APDU (print_odr, &apdu, 0, 0); in dumpapdu() 678 ILL_APDU *apdu; in main() local 687 dumpapdu(apdu); in main() [all …]
|
/dports/lang/erlang-runtime24/otp-OTP-24.1.7/lib/asn1/test/asn1_SUITE_data/rfcs/ |
H A D | ACSE-1.asn1 | 29 ACSE-apdu ::= CHOICE { 30 aarq AARQ-apdu, 31 aare AARE-apdu, 32 rlrq RLRQ-apdu, 33 rlre RLRE-apdu, 34 abrt ABRT-apdu, 38 AARQ-apdu ::= [APPLICATION 0] IMPLICIT SEQUENCE { 66 AARE-apdu ::= [APPLICATION 1] IMPLICIT SEQUENCE { 94 RLRQ-apdu ::= [APPLICATION 2] IMPLICIT SEQUENCE { 101 RLRE-apdu ::= [APPLICATION 3] IMPLICIT SEQUENCE { [all …]
|