/dports/net/yazproxy/yazproxy-1.3.9/src/ |
H A D | yaz-proxy.cpp | 92 Z_APDU *apdu; in handle() local 3639 if (apdu) in handle_incoming_Z_PDU_2() 3640 apdu = handle_syntax_validation(apdu); in handle_incoming_Z_PDU_2() 3642 if (apdu) in handle_incoming_Z_PDU_2() 3643 apdu = handle_query_transformation(apdu); in handle_incoming_Z_PDU_2() 3645 if (apdu) in handle_incoming_Z_PDU_2() 3646 apdu = handle_target_charset_conversion(apdu); in handle_incoming_Z_PDU_2() 3648 if (apdu) in handle_incoming_Z_PDU_2() 3649 apdu = handle_query_validation(apdu); in handle_incoming_Z_PDU_2() 3651 if (apdu) in handle_incoming_Z_PDU_2() [all …]
|
/dports/deskutils/ausweisapp2/AusweisApp2-1.22.2/test/qt/card/base/ |
H A D | test_CommandApdu.cpp | 70 CommandApdu apdu = CommandApdu(data); in test_getLc() local 71 QCOMPARE(apdu.getLc(), lc); in test_getLc() 80 CommandApdu apdu = CommandApdu(array); in test_LcExtendedLength() local 81 QCOMPARE(apdu.getLc(), 0); in test_LcExtendedLength() 91 QCOMPARE(apdu.getLe(), 0x010000); in test_getLe() 111 CommandApdu apdu = CommandApdu(data); in test_getP2() local 112 QCOMPARE(apdu.getP2(), p2); in test_getP2() 132 CommandApdu apdu = CommandApdu(data); in test_getP1() local 133 QCOMPARE(apdu.getP1(), p1); in test_getP1() 154 QCOMPARE(apdu.getINS(), ins); in test_getINS() [all …]
|
H A D | test_Commands.cpp | 45 CommandApdu apdu = builder.build(); in test_Build_PSOBuilder() local 46 QCOMPARE(apdu.getINS(), 0x2a); in test_Build_PSOBuilder() 47 QCOMPARE(apdu.getP1(), 0x00); in test_Build_PSOBuilder() 48 QCOMPARE(apdu.getP2(), '\xbe'); in test_Build_PSOBuilder() 49 QCOMPARE(apdu.getData(), QByteArray()); in test_Build_PSOBuilder() 69 CommandApdu apdu = builder.build(); in test_Build_EABuilder() local 71 QCOMPARE(apdu.getINS(), char(0x82)); in test_Build_EABuilder() 72 QCOMPARE(apdu.getP1(), 0); in test_Build_EABuilder() 73 QCOMPARE(apdu.getP2(), 0); in test_Build_EABuilder() 74 QCOMPARE(apdu.getData(), data); in test_Build_EABuilder()
|
/dports/security/opensc/OpenSC-0.22.0/src/smm/ |
H A D | sm-cwa14890.c | 247 apdu = &new_rapdu->apdu; in sm_cwa_initialize() 284 apdu->cla = 0x00; in sm_cwa_initialize() 285 apdu->ins = 0x82; in sm_cwa_initialize() 286 apdu->p1 = 0x00; in sm_cwa_initialize() 287 apdu->p2 = 0x00; in sm_cwa_initialize() 305 struct sc_apdu *apdu = &rapdu->apdu; in sm_cwa_securize_apdu() local 315 apdu->cla, apdu->ins, apdu->p1, apdu->p2, apdu->datalen, in sm_cwa_securize_apdu() 316 apdu->data); in sm_cwa_securize_apdu() 401 apdu->cla |= 0x0C; in sm_cwa_securize_apdu() 402 apdu->lc = offs; in sm_cwa_securize_apdu() [all …]
|
/dports/security/opensc/OpenSC-0.22.0/src/libopensc/ |
H A D | card-esteid2018.c | 82 struct sc_apdu apdu; in esteid_select() local 93 apdu.cse = SC_APDU_CASE_3_SHORT; in esteid_select() 94 apdu.lc = 2; in esteid_select() 95 apdu.data = sbuf; in esteid_select() 96 apdu.datalen = 2; in esteid_select() 98 apdu.le = 0; in esteid_select() 99 apdu.resplen = 0; in esteid_select() 158 struct sc_apdu apdu; in esteid_set_security_env() local 191 struct sc_apdu apdu; in esteid_compute_signature() local 221 struct sc_apdu apdu; in esteid_get_pin_remaining_tries() local [all …]
|
H A D | sm.c | 98 int ref_rv, struct sc_apdu *apdu) in sc_sm_update_apdu_response() argument 103 if (!apdu) in sc_sm_update_apdu_response() 114 if (sm_resp.mac_len > sizeof(apdu->mac)) in sc_sm_update_apdu_response() 116 memcpy(apdu->mac, sm_resp.mac, sm_resp.mac_len); in sc_sm_update_apdu_response() 117 apdu->mac_len = sm_resp.mac_len; in sc_sm_update_apdu_response() 120 apdu->sw1 = sm_resp.sw1; in sc_sm_update_apdu_response() 121 apdu->sw2 = sm_resp.sw2; in sc_sm_update_apdu_response() 143 rv = card->reader->ops->transmit(card->reader, apdu); in sc_sm_single_transmit() 154 card->sm_ctx.ops.free_sm_apdu(card, apdu, &sm_apdu); in sc_sm_single_transmit() 163 card->sm_ctx.ops.free_sm_apdu(card, apdu, &sm_apdu); in sc_sm_single_transmit() [all …]
|
H A D | cwa14890.c | 89 apdu->cla, apdu->ins, apdu->p1, apdu->p2, in cwa_trace_apdu() 90 apdu->lc, apdu->le, apdu->datalen, buf); in cwa_trace_apdu() 94 apdu->cla, apdu->ins, apdu->p1, apdu->p2, in cwa_trace_apdu() 95 apdu->lc, apdu->le); in cwa_trace_apdu() 101 apdu->sw1, apdu->sw2, apdu->resplen, buf); in cwa_trace_apdu() 417 result = sc_check_sw(card, apdu.sw1, apdu.sw2); in cwa_verify_cvc_certificate() 457 result = sc_check_sw(card, apdu.sw1, apdu.sw2); in cwa_set_security_env() 496 result = sc_check_sw(card, apdu.sw1, apdu.sw2); in cwa_internal_auth() 1625 if (!apdu->resp || (apdu->resplen == 0)) { in cwa_decode_response() 1651 memcpy(buffer, apdu->resp, apdu->resplen); in cwa_decode_response() [all …]
|
/dports/security/py-fido2/fido2-0.9.2/fido2/ |
H A D | pcsc.py | 108 def apdu_exchange(self, apdu, protocol=None): argument 115 logger.debug("SEND: %s", b2a_hex(apdu)) 139 resp, sw1, sw2 = self.apdu_exchange(apdu) 167 def _call_apdu(self, apdu): argument 168 if len(apdu) >= 7 and six.indexbytes(apdu, 4) == 0: 170 data_len = struct.unpack("!H", apdu[5:7])[0] 171 data = apdu[7 : 7 + data_len] 172 elif len(apdu) == 4: 176 data_len = six.indexbytes(apdu, 4) 177 data = apdu[5 : 5 + data_len] [all …]
|
H A D | nfc.py | 100 apdu = struct.pack("!BBBB", cla, ins, p1, p2) 102 apdu += struct.pack("!B", len(data)) + data 103 resp, sw1, sw2 = self._dev.apdu_exchange(apdu + b"\x00") 106 lres, sw1, sw2 = self._dev.apdu_exchange(apdu) 110 def _call_apdu(self, apdu): argument 111 if len(apdu) >= 7 and six.indexbytes(apdu, 4) == 0: 113 data_len = struct.unpack("!H", apdu[5:7])[0] 114 data = apdu[7 : 7 + data_len] 117 data_len = six.indexbytes(apdu, 4) 118 data = apdu[5 : 5 + data_len] [all …]
|
/dports/net/yazproxy/yazproxy-1.3.9/include/yazproxy/ |
H A D | proxy.h | 72 Z_APDU *result_set_optimize(Z_APDU *apdu); 122 void handle_max_record_retrieve(Z_APDU *apdu); 129 Z_APDU *handle_query_validation(Z_APDU *apdu); 133 Z_APDU *handle_syntax_validation(Z_APDU *apdu); 169 int send_PDU_convert(Z_APDU *apdu); 229 int handle_authentication(Z_APDU *apdu); 232 void handle_init(Z_APDU *apdu); 234 void recv_GDU(Z_GDU *apdu, int len); 239 void handle_incoming_Z_PDU(Z_APDU *apdu); 240 void handle_incoming_Z_PDU_2(Z_APDU *apdu); [all …]
|
/dports/security/opensc/OpenSC-0.22.0/src/sm/ |
H A D | sm-eac.c | 639 r = sc_check_sw(card, apdu.sw1, apdu.sw2); in eac_gen_auth_1_encrypted_nonce() 725 r = sc_check_sw(card, apdu.sw1, apdu.sw2); in eac_gen_auth_2_map_nonce() 811 r = sc_check_sw(card, apdu.sw1, apdu.sw2); in eac_gen_auth_3_perform_key_agreement() 899 r = sc_check_sw(card, apdu.sw1, apdu.sw2); in eac_gen_auth_4_mutual_authentication() 1395 r = sc_check_sw(card, apdu.sw1, apdu.sw2); in eac_get_challenge() 1408 memset(&apdu, 0, sizeof apdu); in eac_verify() 1428 r = sc_check_sw(card, apdu.sw1, apdu.sw2); in eac_verify() 1439 memset(&apdu, 0, sizeof apdu); in eac_external_authenticate() 2119 if (apdu->ins == 0x2a && apdu->p1 == 0x00 && apdu->p2 == 0xbe) { in eac_sm_pre_transmit() 2244 } else if (apdu->ins == 0x82 && apdu->p1 == 0x00 && apdu->p2 == 0x00) { in eac_sm_pre_transmit() [all …]
|
/dports/net/google-cloud-sdk/google-cloud-sdk/platform/gsutil/third_party/pyu2f/pyu2f/tests/ |
H A D | apdu_test.py | 20 from pyu2f import apdu 32 cmd = apdu.CommandApdu(0, 0x01, 0x03, 0x04, bytearray([0x10, 0x20, 0x30])) 43 cmd = apdu.CommandApdu(0, 0x01, 0x03, 0x04) 51 self.assertRaises(errors.InvalidCommandError, apdu.CommandApdu, 0, 0x01, 55 resp = apdu.ResponseApdu(bytearray([0x05, 0x04, 0x90, 0x00])) 62 resp = apdu.ResponseApdu(bytearray([0x69, 0x85])) 68 self.assertRaises(errors.InvalidResponseError, apdu.ResponseApdu, 72 resp = apdu.ResponseApdu(bytearray([0x69, 0x85])) 76 resp = apdu.ResponseApdu(bytearray([0x6a, 0x80])) 80 resp = apdu.ResponseApdu(bytearray([0xfa, 0x05]))
|
/dports/www/chromium-legacy/chromium-88.0.4324.182/third_party/catapult/third_party/gsutil/third_party/pyu2f/pyu2f/tests/ |
H A D | apdu_test.py | 20 from pyu2f import apdu 32 cmd = apdu.CommandApdu(0, 0x01, 0x03, 0x04, bytearray([0x10, 0x20, 0x30])) 43 cmd = apdu.CommandApdu(0, 0x01, 0x03, 0x04) 51 self.assertRaises(errors.InvalidCommandError, apdu.CommandApdu, 0, 0x01, 55 resp = apdu.ResponseApdu(bytearray([0x05, 0x04, 0x90, 0x00])) 62 resp = apdu.ResponseApdu(bytearray([0x69, 0x85])) 68 self.assertRaises(errors.InvalidResponseError, apdu.ResponseApdu, 72 resp = apdu.ResponseApdu(bytearray([0x69, 0x85])) 76 resp = apdu.ResponseApdu(bytearray([0x6a, 0x80])) 80 resp = apdu.ResponseApdu(bytearray([0xfa, 0x05]))
|
/dports/net/wireshark-lite/wireshark-3.6.1/epan/dissectors/asn1/tcap/ |
H A D | tcap.cnf | 5 RLRQ-apdu 6 RLRE-apdu 31 AUDT-apdu/_untag/protocol-version AUDT_protocol_version 32 AARQ-apdu/_untag/protocol-version AARQ_protocol_version 33 AARE-apdu/_untag/protocol-version AARE_protocol_version 39 AARQ-apdu/_untag/user-information AARQ_user_information 40 AARE-apdu/_untag/user-information AARE_user_information 41 ABRT-apdu/_untag/user-information ABRT_user_information 42 AUDT-apdu/_untag/user-information AUDT_user_information 45 AUDT-apdu/_untag/protocol-version audt_protocol_version [all …]
|
/dports/net/tshark-lite/wireshark-3.6.1/epan/dissectors/asn1/tcap/ |
H A D | tcap.cnf | 5 RLRQ-apdu 6 RLRE-apdu 31 AUDT-apdu/_untag/protocol-version AUDT_protocol_version 32 AARQ-apdu/_untag/protocol-version AARQ_protocol_version 33 AARE-apdu/_untag/protocol-version AARE_protocol_version 39 AARQ-apdu/_untag/user-information AARQ_user_information 40 AARE-apdu/_untag/user-information AARE_user_information 41 ABRT-apdu/_untag/user-information ABRT_user_information 42 AUDT-apdu/_untag/user-information AUDT_user_information 45 AUDT-apdu/_untag/protocol-version audt_protocol_version [all …]
|
/dports/net/tshark/wireshark-3.6.1/epan/dissectors/asn1/tcap/ |
H A D | tcap.cnf | 5 RLRQ-apdu 6 RLRE-apdu 31 AUDT-apdu/_untag/protocol-version AUDT_protocol_version 32 AARQ-apdu/_untag/protocol-version AARQ_protocol_version 33 AARE-apdu/_untag/protocol-version AARE_protocol_version 39 AARQ-apdu/_untag/user-information AARQ_user_information 40 AARE-apdu/_untag/user-information AARE_user_information 41 ABRT-apdu/_untag/user-information ABRT_user_information 42 AUDT-apdu/_untag/user-information AUDT_user_information 45 AUDT-apdu/_untag/protocol-version audt_protocol_version [all …]
|
/dports/net/wireshark/wireshark-3.6.1/epan/dissectors/asn1/tcap/ |
H A D | tcap.cnf | 5 RLRQ-apdu 6 RLRE-apdu 31 AUDT-apdu/_untag/protocol-version AUDT_protocol_version 32 AARQ-apdu/_untag/protocol-version AARQ_protocol_version 33 AARE-apdu/_untag/protocol-version AARE_protocol_version 39 AARQ-apdu/_untag/user-information AARQ_user_information 40 AARE-apdu/_untag/user-information AARE_user_information 41 ABRT-apdu/_untag/user-information ABRT_user_information 42 AUDT-apdu/_untag/user-information AUDT_user_information 45 AUDT-apdu/_untag/protocol-version audt_protocol_version [all …]
|
/dports/security/py-yubikey-manager/yubikey-manager-4.0.7/ykman/cli/ |
H A D | apdu.py | 102 def apdu(ctx, no_pretty, app, apdu, send_apdu): function 129 if apdu and send_apdu: 132 apdus = [_parse_apdu(data) for data in apdu] 146 for apdu in send_apdu: 151 apdu = a2b_hex(apdu) 152 click.echo("SEND: " + _hex(apdu)) 153 resp, sw = protocol.connection.send_and_receive(apdu) 156 for apdu, check in apdus: 161 header, body = apdu[:4], apdu[4] 167 resp = protocol.send_apdu(*apdu)
|
/dports/www/chromium-legacy/chromium-88.0.4324.182/device/fido/ |
H A D | virtual_u2f_device.cc | 39 apdu::ApduResponse::Status status) { in ErrorStatus() 40 return apdu::ApduResponse(std::vector<uint8_t>(), status) in ErrorStatus() 73 auto parsed_command = apdu::ApduCommand::CreateFromMessage(command); in DeviceTransact() 87 auto response = apdu::ApduResponse(std::move(nonsense), in DeviceTransact() 133 return ErrorStatus(apdu::ApduResponse::Status::SW_WRONG_LENGTH); in DoRegister() 194 return apdu::ApduResponse(std::move(response), in DoRegister() 195 apdu::ApduResponse::Status::SW_NO_ERROR) in DoRegister() 207 return ErrorStatus(apdu::ApduResponse::Status::SW_WRONG_DATA); in DoSign() 215 return ErrorStatus(apdu::ApduResponse::Status::SW_WRONG_LENGTH); in DoSign() 226 return ErrorStatus(apdu::ApduResponse::Status::SW_WRONG_DATA); in DoSign() [all …]
|
H A D | u2f_register_operation.cc | 78 auto result = apdu::ApduResponse::Status::SW_WRONG_DATA; in OnCheckForExcludedKeyHandle() 81 apdu::ApduResponse::CreateFromMessage(std::move(*device_response)); in OnCheckForExcludedKeyHandle() 90 static_cast<apdu::ApduResponse::Status>(excluded_key_handle().size())) { in OnCheckForExcludedKeyHandle() 91 result = apdu::ApduResponse::Status::SW_WRONG_LENGTH; in OnCheckForExcludedKeyHandle() 95 case apdu::ApduResponse::Status::SW_NO_ERROR: in OnCheckForExcludedKeyHandle() 103 case apdu::ApduResponse::Status::SW_CONDITIONS_NOT_SATISFIED: in OnCheckForExcludedKeyHandle() 112 case apdu::ApduResponse::Status::SW_WRONG_DATA: in OnCheckForExcludedKeyHandle() 113 case apdu::ApduResponse::Status::SW_WRONG_LENGTH: in OnCheckForExcludedKeyHandle() 161 auto result = apdu::ApduResponse::Status::SW_WRONG_DATA; in OnRegisterResponseReceived() 171 case apdu::ApduResponse::Status::SW_NO_ERROR: { in OnRegisterResponseReceived() [all …]
|
H A D | u2f_sign_operation.cc | 68 auto result = apdu::ApduResponse::Status::SW_WRONG_DATA; in OnSignResponseReceived() 71 ? apdu::ApduResponse::CreateFromMessage(std::move(*device_response)) in OnSignResponseReceived() 80 result = apdu::ApduResponse::Status::SW_WRONG_LENGTH; in OnSignResponseReceived() 84 case apdu::ApduResponse::Status::SW_NO_ERROR: { in OnSignResponseReceived() 109 case apdu::ApduResponse::Status::SW_WRONG_DATA: in OnSignResponseReceived() 110 case apdu::ApduResponse::Status::SW_WRONG_LENGTH: in OnSignResponseReceived() 129 case apdu::ApduResponse::Status::SW_CONDITIONS_NOT_SATISFIED: in OnSignResponseReceived() 164 auto result = apdu::ApduResponse::Status::SW_WRONG_DATA; in OnEnrollmentResponseReceived() 167 apdu::ApduResponse::CreateFromMessage(std::move(*device_response)); in OnEnrollmentResponseReceived() 174 case apdu::ApduResponse::Status::SW_NO_ERROR: in OnEnrollmentResponseReceived() [all …]
|
/dports/security/beid/eid-mw-5.0.8/cardcomm/tokend/Tokend-36720/BELPIC/ |
H A D | BELPICToken.cpp | 257 size_t apduSize = sizeof(apdu); in readBinary() 272 apdu[OFF_LC], in readBinary() 273 (apdu[OFF_P1] << 8 | apdu[OFF_P2])); in readBinary() 299 apdu[OFF_P1] = offset >> 8; in readBinary() 300 apdu[OFF_P2] = offset & 0xFF; in readBinary() 418 apdu[offset++] = 0x20 + oldPinLength; in changePIN() 440 mPinStatus = exchangeAPDU(apdu, sizeof(apdu), result, resultLength); in changePIN() 441 memset(apdu + 5, 0, 16); in changePIN() 552 apdu[offset++] = 0x20 + pinLength; in _verifyPIN() 563 exchangeAPDU(apdu, sizeof(apdu), result, in _verifyPIN() [all …]
|
/dports/security/libfido2/libfido2-1.9.0/src/ |
H A D | u2f.c | 145 iso7816_apdu_t *apdu = NULL; in send_dummy_register() local 185 iso7816_free(&apdu); in send_dummy_register() 194 iso7816_apdu_t *apdu = NULL; in key_lookup() local 232 iso7816_len(apdu), ms) < 0) { in key_lookup() 258 iso7816_free(&apdu); in key_lookup() 300 iso7816_apdu_t *apdu = NULL; in do_auth() local 366 iso7816_free(&apdu); in do_auth() 644 iso7816_apdu_t *apdu = NULL; in u2f_register() local 723 iso7816_free(&apdu); in u2f_register() 834 iso7816_apdu_t *apdu = NULL; in u2f_get_touch_begin() local [all …]
|
/dports/www/qt5-webengine/qtwebengine-everywhere-src-5.15.2/src/3rdparty/chromium/device/fido/ |
H A D | u2f_register_operation.cc | 78 auto result = apdu::ApduResponse::Status::SW_WRONG_DATA; in OnCheckForExcludedKeyHandle() 81 apdu::ApduResponse::CreateFromMessage(std::move(*device_response)); in OnCheckForExcludedKeyHandle() 90 static_cast<apdu::ApduResponse::Status>(excluded_key_handle().size())) { in OnCheckForExcludedKeyHandle() 91 result = apdu::ApduResponse::Status::SW_WRONG_LENGTH; in OnCheckForExcludedKeyHandle() 95 case apdu::ApduResponse::Status::SW_NO_ERROR: in OnCheckForExcludedKeyHandle() 103 case apdu::ApduResponse::Status::SW_CONDITIONS_NOT_SATISFIED: in OnCheckForExcludedKeyHandle() 112 case apdu::ApduResponse::Status::SW_WRONG_DATA: in OnCheckForExcludedKeyHandle() 113 case apdu::ApduResponse::Status::SW_WRONG_LENGTH: in OnCheckForExcludedKeyHandle() 161 auto result = apdu::ApduResponse::Status::SW_WRONG_DATA; in OnRegisterResponseReceived() 171 case apdu::ApduResponse::Status::SW_NO_ERROR: { in OnRegisterResponseReceived() [all …]
|
H A D | u2f_sign_operation.cc | 68 auto result = apdu::ApduResponse::Status::SW_WRONG_DATA; in OnSignResponseReceived() 71 ? apdu::ApduResponse::CreateFromMessage(std::move(*device_response)) in OnSignResponseReceived() 80 result = apdu::ApduResponse::Status::SW_WRONG_LENGTH; in OnSignResponseReceived() 84 case apdu::ApduResponse::Status::SW_NO_ERROR: { in OnSignResponseReceived() 109 case apdu::ApduResponse::Status::SW_WRONG_DATA: in OnSignResponseReceived() 110 case apdu::ApduResponse::Status::SW_WRONG_LENGTH: in OnSignResponseReceived() 129 case apdu::ApduResponse::Status::SW_CONDITIONS_NOT_SATISFIED: in OnSignResponseReceived() 164 auto result = apdu::ApduResponse::Status::SW_WRONG_DATA; in OnEnrollmentResponseReceived() 167 apdu::ApduResponse::CreateFromMessage(std::move(*device_response)); in OnEnrollmentResponseReceived() 174 case apdu::ApduResponse::Status::SW_NO_ERROR: in OnEnrollmentResponseReceived() [all …]
|