Home
last modified time | relevance | path

Searched refs:send_apdu (Results 1 – 25 of 38) sorted by relevance

12

/dports/security/py-yubikey-manager/yubikey-manager-4.0.7/ykman/cli/
H A Dapdu.py102 def apdu(ctx, no_pretty, app, apdu, send_apdu): argument
129 if apdu and send_apdu:
131 elif not send_apdu:
145 if send_apdu: # Compatibility mode (full APDUs)
146 for apdu in send_apdu:
167 resp = protocol.send_apdu(*apdu)
/dports/security/py-yubikey-manager/yubikey-manager-4.0.7/ykman/
H A Dfido.py50 ctap.send_apdu(ins=INS_FIPS_VERIFY_FIPS_MODE)
74 ctap.send_apdu(ins=INS_FIPS_SET_PIN, data=data)
80 ctap.send_apdu(ins=INS_FIPS_VERIFY_PIN, data=pin.encode())
93 ctap.send_apdu(ins=INS_FIPS_RESET)
H A Dopenpgp.py325 protocol.send_apdu(0, INS.ACTIVATE, 0, 0)
336 return self._app.send_apdu(0, INS.GET_DATA, do >> 8, do & 0xFF)
339 self._app.send_apdu(0, INS.PUT_DATA, do >> 8, do & 0xFF, data)
348 self._app.send_apdu(
361 bcd_hex = self._app.send_apdu(0, INS.GET_VERSION, 0, 0).hex()
377 self._app.send_apdu(0, INS.VERIFY, 0, PW1, INVALID_PIN)
390 self._app.send_apdu(0, INS.TERMINATE, 0, 0)
391 self._app.send_apdu(0, INS.ACTIVATE, 0, 0)
403 self._app.send_apdu(0, INS.VERIFY, 0, pw, pin)
459 self._app.send_apdu(
[all …]
/dports/security/py-yubikey-manager/yubikey-manager-4.0.7/yubikit/
H A Dpiv.py445 self.protocol.send_apdu(0, INS_GET_VERSION, 0, 0)
475 self.protocol.send_apdu(0, INS_RESET, 0, 0)
483 response = self.protocol.send_apdu(
499 response = self.protocol.send_apdu(
527 self.protocol.send_apdu(
551 self.protocol.send_apdu(0, INS_VERIFY, 0, PIN_P2)
649 self.protocol.send_apdu(
661 self.protocol.send_apdu(
746 response = self.protocol.send_apdu(
758 self.protocol.send_apdu(
[all …]
H A Doath.py273 self.protocol.send_apdu(0, INS_RESET, 0xDE, 0xAD)
285 resp = self.protocol.send_apdu(0, INS_VALIDATE, 0, 0, data)
296 self.protocol.send_apdu(
310 self.protocol.send_apdu(0, INS_SET_CODE, 0, 0, Tlv(TAG_KEY))
331 self.protocol.send_apdu(0, INS_PUT, 0, 0, data)
348 self.protocol.send_apdu(
355 for tlv in Tlv.parse_list(self.protocol.send_apdu(0, INS_LIST, 0, 0)):
370 self.protocol.send_apdu(
381 self.protocol.send_apdu(0, INS_DELETE, 0, 0, Tlv(TAG_NAME, credential_id))
391 self.protocol.send_apdu(
[all …]
H A Dmanagement.py390 self.protocol.send_apdu(0, 0x01, SLOT_DEVICE_CONFIG, 0, data)
392 self.protocol.send_apdu(0, INS_SET_MODE, P1_DEVICE_CONFIG, 0, data)
395 return self.protocol.send_apdu(0, INS_READ_CONFIG, 0, 0)
398 self.protocol.send_apdu(0, INS_WRITE_CONFIG, 0, 0, config)
/dports/www/geckodriver/mozilla-central-e9783a644016aa9b317887076618425586730d73/testing/geckodriver/cargo-crates/authenticator-0.2.6/src/
H A Du2fprotocol.rs49 let (resp, status) = send_apdu(dev, U2F_REGISTER, flags, &register_data)?; in u2f_register()
83 let (resp, status) = send_apdu(dev, U2F_AUTHENTICATE, flags, &sign_data)?; in u2f_sign()
117 let (_, status) = send_apdu(dev, U2F_AUTHENTICATE, flags, &sign_data)?; in u2f_is_keyhandle_valid()
140 let (data, status) = send_apdu(dev, U2F_VERSION, 0x00, &[])?; in is_v2_device()
195 fn send_apdu<T>(dev: &mut T, cmd: u8, p1: u8, send: &[u8]) -> io::Result<(Vec<u8>, [u8; 2])> in send_apdu() function
219 use super::{init_device, send_apdu, sendrecv, U2FDevice};
397 let (result, status) = send_apdu(&mut device, U2FHID_PING, 0xaa, &data).unwrap(); in test_sendapdu()
/dports/lang/spidermonkey60/firefox-60.9.0/dom/webauthn/u2f-hid-rs/src/
H A Du2fprotocol.rs47 let (resp, status) = send_apdu(dev, U2F_REGISTER, flags, &register_data)?; in u2f_register()
81 let (resp, status) = send_apdu(dev, U2F_AUTHENTICATE, flags, &sign_data)?; in u2f_sign()
115 let (_, status) = send_apdu(dev, U2F_AUTHENTICATE, flags, &sign_data)?; in u2f_is_keyhandle_valid()
138 let (data, status) = send_apdu(dev, U2F_VERSION, 0x00, &[])?; in is_v2_device()
193 fn send_apdu<T>(dev: &mut T, cmd: u8, p1: u8, send: &[u8]) -> io::Result<(Vec<u8>, [u8; 2])> in send_apdu() function
217 use super::{init_device, send_apdu, sendrecv, U2FDevice};
395 let (result, status) = send_apdu(&mut device, U2FHID_PING, 0xaa, &data).unwrap(); in test_sendapdu()
/dports/lang/spidermonkey78/firefox-78.9.0/third_party/rust/authenticator/src/
H A Du2fprotocol.rs49 let (resp, status) = send_apdu(dev, U2F_REGISTER, flags, &register_data)?; in u2f_register()
83 let (resp, status) = send_apdu(dev, U2F_AUTHENTICATE, flags, &sign_data)?; in u2f_sign()
117 let (_, status) = send_apdu(dev, U2F_AUTHENTICATE, flags, &sign_data)?; in u2f_is_keyhandle_valid()
140 let (data, status) = send_apdu(dev, U2F_VERSION, 0x00, &[])?; in is_v2_device()
195 fn send_apdu<T>(dev: &mut T, cmd: u8, p1: u8, send: &[u8]) -> io::Result<(Vec<u8>, [u8; 2])> in send_apdu() function
219 use super::{init_device, send_apdu, sendrecv, U2FDevice};
397 let (result, status) = send_apdu(&mut device, U2FHID_PING, 0xaa, &data).unwrap(); in test_sendapdu()
/dports/security/py-fido2/fido2-0.9.2/fido2/
H A Dctap1.py214 def send_apdu(self, cla=0, ins=0, p1=0, p2=0, data=b""): member in Ctap1
243 return self.send_apdu(ins=Ctap1.INS.VERSION).decode()
253 response = self.send_apdu(ins=Ctap1.INS.REGISTER, data=data)
270 response = self.send_apdu(ins=Ctap1.INS.AUTHENTICATE, p1=p1, data=data)
/dports/www/firefox/firefox-99.0/third_party/rust/authenticator/src/
H A Du2fprotocol.rs49 let (resp, status) = send_apdu(dev, U2F_REGISTER, flags, &register_data)?; in u2f_register()
83 let (resp, status) = send_apdu(dev, U2F_AUTHENTICATE, flags, &sign_data)?; in u2f_sign()
117 let (_, status) = send_apdu(dev, U2F_AUTHENTICATE, flags, &sign_data)?; in u2f_is_keyhandle_valid()
158 let (data, status) = send_apdu(dev, U2F_VERSION, 0x00, &[])?; in is_v2_device()
213 fn send_apdu<T>(dev: &mut T, cmd: u8, p1: u8, send: &[u8]) -> io::Result<(Vec<u8>, [u8; 2])> in send_apdu() function
237 use super::{init_device, send_apdu, sendrecv, U2FDevice};
446 let (result, status) = send_apdu(&mut device, U2FHID_PING, 0xaa, &data).unwrap(); in test_sendapdu()
/dports/mail/thunderbird/thunderbird-91.8.0/third_party/rust/authenticator/src/
H A Du2fprotocol.rs49 let (resp, status) = send_apdu(dev, U2F_REGISTER, flags, &register_data)?; in u2f_register()
83 let (resp, status) = send_apdu(dev, U2F_AUTHENTICATE, flags, &sign_data)?; in u2f_sign()
117 let (_, status) = send_apdu(dev, U2F_AUTHENTICATE, flags, &sign_data)?; in u2f_is_keyhandle_valid()
158 let (data, status) = send_apdu(dev, U2F_VERSION, 0x00, &[])?; in is_v2_device()
213 fn send_apdu<T>(dev: &mut T, cmd: u8, p1: u8, send: &[u8]) -> io::Result<(Vec<u8>, [u8; 2])> in send_apdu() function
237 use super::{init_device, send_apdu, sendrecv, U2FDevice};
446 let (result, status) = send_apdu(&mut device, U2FHID_PING, 0xaa, &data).unwrap(); in test_sendapdu()
/dports/www/firefox-esr/firefox-91.8.0/third_party/rust/authenticator/src/
H A Du2fprotocol.rs49 let (resp, status) = send_apdu(dev, U2F_REGISTER, flags, &register_data)?; in u2f_register()
83 let (resp, status) = send_apdu(dev, U2F_AUTHENTICATE, flags, &sign_data)?; in u2f_sign()
117 let (_, status) = send_apdu(dev, U2F_AUTHENTICATE, flags, &sign_data)?; in u2f_is_keyhandle_valid()
158 let (data, status) = send_apdu(dev, U2F_VERSION, 0x00, &[])?; in is_v2_device()
213 fn send_apdu<T>(dev: &mut T, cmd: u8, p1: u8, send: &[u8]) -> io::Result<(Vec<u8>, [u8; 2])> in send_apdu() function
237 use super::{init_device, send_apdu, sendrecv, U2FDevice};
446 let (result, status) = send_apdu(&mut device, U2FHID_PING, 0xaa, &data).unwrap(); in test_sendapdu()
/dports/net/yaz/yaz-5.31.1/client/
H A Dadmin.c125 send_apdu(apdu); in sendAdminES()
256 send_apdu (apdu); in cmd_adm_import()
263 send_apdu(apdu); in cmd_adm_import()
265 send_apdu (apdu); in cmd_adm_import()
H A Dadmin.h38 int send_apdu(Z_APDU *a);
/dports/security/py-fido2/fido2-0.9.2/test/
H A Dtest_ctap1.py41 self.assertEqual(b"response", ctap.send_apdu(1, 2, 3, 4, b"foobar"))
49 ctap.send_apdu(1, 2, 3, 4, b"foobar")
/dports/security/gnupg/gnupg-2.3.3/tools/
H A Dcard-yubikey.c298 err = send_apdu (hexapdu, "YK.write_config", 0, NULL, NULL); in yk_enable_disable()
397 err = send_apdu ("00A4040008a000000527471117", "Select.YK-Manager", 0, in yubikey_commands()
402 err = send_apdu ("001D000000", "YK.read_config", 0, &config, &configlen); in yubikey_commands()
H A Dcard-misc.c85 send_apdu (const char *hexapdu, const char *desc, unsigned int ignore, in send_apdu() function
H A Dgpg-card.c3114 send_apdu ("0020008008FFFFFFFFFFFFFFFF", "VERIFY", 0xffff, in cmd_factoryreset()
3117 send_apdu ("002C008010FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF", in cmd_factoryreset()
3134 err = send_apdu ("reset-keep-lock", "reset", 0, NULL, NULL); in cmd_factoryreset()
3137 err = send_apdu ("undefined", "dummy select ", 0, NULL, NULL); in cmd_factoryreset()
3141 err = send_apdu ("00A4040006D27600012401", "SELECT AID", 0, in cmd_factoryreset()
3155 send_apdu ("0020008120" in cmd_factoryreset()
3160 send_apdu ("0020008320" in cmd_factoryreset()
3177 err = send_apdu ("00440000", "ACTIVATE DF", 0, NULL, NULL); in cmd_factoryreset()
3184 err = send_apdu ("reset-keep-lock", "reset", 0, NULL, NULL); in cmd_factoryreset()
3186 err = send_apdu (NULL, "RESET", 0, NULL, NULL); in cmd_factoryreset()
[all …]
H A Dgpg-card.h215 gpg_error_t send_apdu (const char *hexapdu, const char *desc,
/dports/security/py-yubikey-manager/yubikey-manager-4.0.7/yubikit/core/
H A Dsmartcard.py127 return self.send_apdu(0, INS_SELECT, P1_SELECT, P2_SELECT, aid)
137 def send_apdu( member in SmartCardProtocol
/dports/security/libu2f-host/libu2f-host-libu2f-host-1.1.10/u2f-host/
H A Dinternal.h71 u2fh_rc send_apdu (u2fh_devs * devs, int index, int cmd,
H A Dregister.c149 rc = send_apdu (devs, dev->id, U2F_REGISTER, data, sizeof (data), in _u2fh_register()
/dports/security/gnupg/gnupg-2.3.3/g10/
H A Dcard-util.c1863 send_apdu (const char *hexapdu, const char *desc, unsigned int ignore) in send_apdu() function
1972 err = send_apdu ("lock", "locking connection ", 0); in factory_reset()
1976 err = send_apdu ("reset-keep-lock", "reset", 0); in factory_reset()
1979 err = send_apdu ("undefined", "dummy select ", 0); in factory_reset()
1984 err = send_apdu ("00A4040006D27600012401", "SELECT AID", 0); in factory_reset()
1997 send_apdu ("0020008120" in factory_reset()
2001 send_apdu ("0020008320" in factory_reset()
2006 err = send_apdu ("00e60000", "TERMINATE DF", 0x6985); in factory_reset()
2013 err = send_apdu ("00440000", "ACTIVATE DF", 0); in factory_reset()
2018 err = send_apdu ("reset-keep-lock", "reset", 0); in factory_reset()
[all …]
/dports/security/opensc/OpenSC-0.22.0/src/tools/
H A Dpiv-tool.c419 static int send_apdu(void) in send_apdu() function
624 if ((err = send_apdu())) in main()

12