/dports/security/py-yubikey-manager/yubikey-manager-4.0.7/ykman/cli/ |
H A D | apdu.py | 102 def apdu(ctx, no_pretty, app, apdu, send_apdu): argument 129 if apdu and send_apdu: 131 elif not send_apdu: 145 if send_apdu: # Compatibility mode (full APDUs) 146 for apdu in send_apdu: 167 resp = protocol.send_apdu(*apdu)
|
/dports/security/py-yubikey-manager/yubikey-manager-4.0.7/ykman/ |
H A D | fido.py | 50 ctap.send_apdu(ins=INS_FIPS_VERIFY_FIPS_MODE) 74 ctap.send_apdu(ins=INS_FIPS_SET_PIN, data=data) 80 ctap.send_apdu(ins=INS_FIPS_VERIFY_PIN, data=pin.encode()) 93 ctap.send_apdu(ins=INS_FIPS_RESET)
|
H A D | openpgp.py | 325 protocol.send_apdu(0, INS.ACTIVATE, 0, 0) 336 return self._app.send_apdu(0, INS.GET_DATA, do >> 8, do & 0xFF) 339 self._app.send_apdu(0, INS.PUT_DATA, do >> 8, do & 0xFF, data) 348 self._app.send_apdu( 361 bcd_hex = self._app.send_apdu(0, INS.GET_VERSION, 0, 0).hex() 377 self._app.send_apdu(0, INS.VERIFY, 0, PW1, INVALID_PIN) 390 self._app.send_apdu(0, INS.TERMINATE, 0, 0) 391 self._app.send_apdu(0, INS.ACTIVATE, 0, 0) 403 self._app.send_apdu(0, INS.VERIFY, 0, pw, pin) 459 self._app.send_apdu( [all …]
|
/dports/security/py-yubikey-manager/yubikey-manager-4.0.7/yubikit/ |
H A D | piv.py | 445 self.protocol.send_apdu(0, INS_GET_VERSION, 0, 0) 475 self.protocol.send_apdu(0, INS_RESET, 0, 0) 483 response = self.protocol.send_apdu( 499 response = self.protocol.send_apdu( 527 self.protocol.send_apdu( 551 self.protocol.send_apdu(0, INS_VERIFY, 0, PIN_P2) 649 self.protocol.send_apdu( 661 self.protocol.send_apdu( 746 response = self.protocol.send_apdu( 758 self.protocol.send_apdu( [all …]
|
H A D | oath.py | 273 self.protocol.send_apdu(0, INS_RESET, 0xDE, 0xAD) 285 resp = self.protocol.send_apdu(0, INS_VALIDATE, 0, 0, data) 296 self.protocol.send_apdu( 310 self.protocol.send_apdu(0, INS_SET_CODE, 0, 0, Tlv(TAG_KEY)) 331 self.protocol.send_apdu(0, INS_PUT, 0, 0, data) 348 self.protocol.send_apdu( 355 for tlv in Tlv.parse_list(self.protocol.send_apdu(0, INS_LIST, 0, 0)): 370 self.protocol.send_apdu( 381 self.protocol.send_apdu(0, INS_DELETE, 0, 0, Tlv(TAG_NAME, credential_id)) 391 self.protocol.send_apdu( [all …]
|
H A D | management.py | 390 self.protocol.send_apdu(0, 0x01, SLOT_DEVICE_CONFIG, 0, data) 392 self.protocol.send_apdu(0, INS_SET_MODE, P1_DEVICE_CONFIG, 0, data) 395 return self.protocol.send_apdu(0, INS_READ_CONFIG, 0, 0) 398 self.protocol.send_apdu(0, INS_WRITE_CONFIG, 0, 0, config)
|
/dports/www/geckodriver/mozilla-central-e9783a644016aa9b317887076618425586730d73/testing/geckodriver/cargo-crates/authenticator-0.2.6/src/ |
H A D | u2fprotocol.rs | 49 let (resp, status) = send_apdu(dev, U2F_REGISTER, flags, ®ister_data)?; in u2f_register() 83 let (resp, status) = send_apdu(dev, U2F_AUTHENTICATE, flags, &sign_data)?; in u2f_sign() 117 let (_, status) = send_apdu(dev, U2F_AUTHENTICATE, flags, &sign_data)?; in u2f_is_keyhandle_valid() 140 let (data, status) = send_apdu(dev, U2F_VERSION, 0x00, &[])?; in is_v2_device() 195 fn send_apdu<T>(dev: &mut T, cmd: u8, p1: u8, send: &[u8]) -> io::Result<(Vec<u8>, [u8; 2])> in send_apdu() function 219 use super::{init_device, send_apdu, sendrecv, U2FDevice}; 397 let (result, status) = send_apdu(&mut device, U2FHID_PING, 0xaa, &data).unwrap(); in test_sendapdu()
|
/dports/lang/spidermonkey60/firefox-60.9.0/dom/webauthn/u2f-hid-rs/src/ |
H A D | u2fprotocol.rs | 47 let (resp, status) = send_apdu(dev, U2F_REGISTER, flags, ®ister_data)?; in u2f_register() 81 let (resp, status) = send_apdu(dev, U2F_AUTHENTICATE, flags, &sign_data)?; in u2f_sign() 115 let (_, status) = send_apdu(dev, U2F_AUTHENTICATE, flags, &sign_data)?; in u2f_is_keyhandle_valid() 138 let (data, status) = send_apdu(dev, U2F_VERSION, 0x00, &[])?; in is_v2_device() 193 fn send_apdu<T>(dev: &mut T, cmd: u8, p1: u8, send: &[u8]) -> io::Result<(Vec<u8>, [u8; 2])> in send_apdu() function 217 use super::{init_device, send_apdu, sendrecv, U2FDevice}; 395 let (result, status) = send_apdu(&mut device, U2FHID_PING, 0xaa, &data).unwrap(); in test_sendapdu()
|
/dports/lang/spidermonkey78/firefox-78.9.0/third_party/rust/authenticator/src/ |
H A D | u2fprotocol.rs | 49 let (resp, status) = send_apdu(dev, U2F_REGISTER, flags, ®ister_data)?; in u2f_register() 83 let (resp, status) = send_apdu(dev, U2F_AUTHENTICATE, flags, &sign_data)?; in u2f_sign() 117 let (_, status) = send_apdu(dev, U2F_AUTHENTICATE, flags, &sign_data)?; in u2f_is_keyhandle_valid() 140 let (data, status) = send_apdu(dev, U2F_VERSION, 0x00, &[])?; in is_v2_device() 195 fn send_apdu<T>(dev: &mut T, cmd: u8, p1: u8, send: &[u8]) -> io::Result<(Vec<u8>, [u8; 2])> in send_apdu() function 219 use super::{init_device, send_apdu, sendrecv, U2FDevice}; 397 let (result, status) = send_apdu(&mut device, U2FHID_PING, 0xaa, &data).unwrap(); in test_sendapdu()
|
/dports/security/py-fido2/fido2-0.9.2/fido2/ |
H A D | ctap1.py | 214 def send_apdu(self, cla=0, ins=0, p1=0, p2=0, data=b""): member in Ctap1 243 return self.send_apdu(ins=Ctap1.INS.VERSION).decode() 253 response = self.send_apdu(ins=Ctap1.INS.REGISTER, data=data) 270 response = self.send_apdu(ins=Ctap1.INS.AUTHENTICATE, p1=p1, data=data)
|
/dports/www/firefox/firefox-99.0/third_party/rust/authenticator/src/ |
H A D | u2fprotocol.rs | 49 let (resp, status) = send_apdu(dev, U2F_REGISTER, flags, ®ister_data)?; in u2f_register() 83 let (resp, status) = send_apdu(dev, U2F_AUTHENTICATE, flags, &sign_data)?; in u2f_sign() 117 let (_, status) = send_apdu(dev, U2F_AUTHENTICATE, flags, &sign_data)?; in u2f_is_keyhandle_valid() 158 let (data, status) = send_apdu(dev, U2F_VERSION, 0x00, &[])?; in is_v2_device() 213 fn send_apdu<T>(dev: &mut T, cmd: u8, p1: u8, send: &[u8]) -> io::Result<(Vec<u8>, [u8; 2])> in send_apdu() function 237 use super::{init_device, send_apdu, sendrecv, U2FDevice}; 446 let (result, status) = send_apdu(&mut device, U2FHID_PING, 0xaa, &data).unwrap(); in test_sendapdu()
|
/dports/mail/thunderbird/thunderbird-91.8.0/third_party/rust/authenticator/src/ |
H A D | u2fprotocol.rs | 49 let (resp, status) = send_apdu(dev, U2F_REGISTER, flags, ®ister_data)?; in u2f_register() 83 let (resp, status) = send_apdu(dev, U2F_AUTHENTICATE, flags, &sign_data)?; in u2f_sign() 117 let (_, status) = send_apdu(dev, U2F_AUTHENTICATE, flags, &sign_data)?; in u2f_is_keyhandle_valid() 158 let (data, status) = send_apdu(dev, U2F_VERSION, 0x00, &[])?; in is_v2_device() 213 fn send_apdu<T>(dev: &mut T, cmd: u8, p1: u8, send: &[u8]) -> io::Result<(Vec<u8>, [u8; 2])> in send_apdu() function 237 use super::{init_device, send_apdu, sendrecv, U2FDevice}; 446 let (result, status) = send_apdu(&mut device, U2FHID_PING, 0xaa, &data).unwrap(); in test_sendapdu()
|
/dports/www/firefox-esr/firefox-91.8.0/third_party/rust/authenticator/src/ |
H A D | u2fprotocol.rs | 49 let (resp, status) = send_apdu(dev, U2F_REGISTER, flags, ®ister_data)?; in u2f_register() 83 let (resp, status) = send_apdu(dev, U2F_AUTHENTICATE, flags, &sign_data)?; in u2f_sign() 117 let (_, status) = send_apdu(dev, U2F_AUTHENTICATE, flags, &sign_data)?; in u2f_is_keyhandle_valid() 158 let (data, status) = send_apdu(dev, U2F_VERSION, 0x00, &[])?; in is_v2_device() 213 fn send_apdu<T>(dev: &mut T, cmd: u8, p1: u8, send: &[u8]) -> io::Result<(Vec<u8>, [u8; 2])> in send_apdu() function 237 use super::{init_device, send_apdu, sendrecv, U2FDevice}; 446 let (result, status) = send_apdu(&mut device, U2FHID_PING, 0xaa, &data).unwrap(); in test_sendapdu()
|
/dports/net/yaz/yaz-5.31.1/client/ |
H A D | admin.c | 125 send_apdu(apdu); in sendAdminES() 256 send_apdu (apdu); in cmd_adm_import() 263 send_apdu(apdu); in cmd_adm_import() 265 send_apdu (apdu); in cmd_adm_import()
|
H A D | admin.h | 38 int send_apdu(Z_APDU *a);
|
/dports/security/py-fido2/fido2-0.9.2/test/ |
H A D | test_ctap1.py | 41 self.assertEqual(b"response", ctap.send_apdu(1, 2, 3, 4, b"foobar")) 49 ctap.send_apdu(1, 2, 3, 4, b"foobar")
|
/dports/security/gnupg/gnupg-2.3.3/tools/ |
H A D | card-yubikey.c | 298 err = send_apdu (hexapdu, "YK.write_config", 0, NULL, NULL); in yk_enable_disable() 397 err = send_apdu ("00A4040008a000000527471117", "Select.YK-Manager", 0, in yubikey_commands() 402 err = send_apdu ("001D000000", "YK.read_config", 0, &config, &configlen); in yubikey_commands()
|
H A D | card-misc.c | 85 send_apdu (const char *hexapdu, const char *desc, unsigned int ignore, in send_apdu() function
|
H A D | gpg-card.c | 3114 send_apdu ("0020008008FFFFFFFFFFFFFFFF", "VERIFY", 0xffff, in cmd_factoryreset() 3117 send_apdu ("002C008010FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF", in cmd_factoryreset() 3134 err = send_apdu ("reset-keep-lock", "reset", 0, NULL, NULL); in cmd_factoryreset() 3137 err = send_apdu ("undefined", "dummy select ", 0, NULL, NULL); in cmd_factoryreset() 3141 err = send_apdu ("00A4040006D27600012401", "SELECT AID", 0, in cmd_factoryreset() 3155 send_apdu ("0020008120" in cmd_factoryreset() 3160 send_apdu ("0020008320" in cmd_factoryreset() 3177 err = send_apdu ("00440000", "ACTIVATE DF", 0, NULL, NULL); in cmd_factoryreset() 3184 err = send_apdu ("reset-keep-lock", "reset", 0, NULL, NULL); in cmd_factoryreset() 3186 err = send_apdu (NULL, "RESET", 0, NULL, NULL); in cmd_factoryreset() [all …]
|
H A D | gpg-card.h | 215 gpg_error_t send_apdu (const char *hexapdu, const char *desc,
|
/dports/security/py-yubikey-manager/yubikey-manager-4.0.7/yubikit/core/ |
H A D | smartcard.py | 127 return self.send_apdu(0, INS_SELECT, P1_SELECT, P2_SELECT, aid) 137 def send_apdu( member in SmartCardProtocol
|
/dports/security/libu2f-host/libu2f-host-libu2f-host-1.1.10/u2f-host/ |
H A D | internal.h | 71 u2fh_rc send_apdu (u2fh_devs * devs, int index, int cmd,
|
H A D | register.c | 149 rc = send_apdu (devs, dev->id, U2F_REGISTER, data, sizeof (data), in _u2fh_register()
|
/dports/security/gnupg/gnupg-2.3.3/g10/ |
H A D | card-util.c | 1863 send_apdu (const char *hexapdu, const char *desc, unsigned int ignore) in send_apdu() function 1972 err = send_apdu ("lock", "locking connection ", 0); in factory_reset() 1976 err = send_apdu ("reset-keep-lock", "reset", 0); in factory_reset() 1979 err = send_apdu ("undefined", "dummy select ", 0); in factory_reset() 1984 err = send_apdu ("00A4040006D27600012401", "SELECT AID", 0); in factory_reset() 1997 send_apdu ("0020008120" in factory_reset() 2001 send_apdu ("0020008320" in factory_reset() 2006 err = send_apdu ("00e60000", "TERMINATE DF", 0x6985); in factory_reset() 2013 err = send_apdu ("00440000", "ACTIVATE DF", 0); in factory_reset() 2018 err = send_apdu ("reset-keep-lock", "reset", 0); in factory_reset() [all …]
|
/dports/security/opensc/OpenSC-0.22.0/src/tools/ |
H A D | piv-tool.c | 419 static int send_apdu(void) in send_apdu() function 624 if ((err = send_apdu())) in main()
|