FreeCalypso > hg > fc-sim-tools
view uicc/pins.c @ 35:26d2ef843a99
fcsim1-mkprov utility implemented
author | Mychaela Falconia <falcon@freecalypso.org> |
---|---|
date | Wed, 17 Mar 2021 04:51:53 +0000 |
parents | b70d35f5476f |
children | a4ffd4e44b76 |
line wrap: on
line source
/* * This module implements the standard set of commands for working * with UICC PINs; because all of these commands take a user-specified * P2 key ID, they should work with ADM PINs as well. */ #include <sys/types.h> #include <stdio.h> #include "simresp.h" cmd_verify_pin(argc, argv) char **argv; { u_char cmd[13]; int rc; /* VERIFY PIN command APDU */ cmd[0] = 0x00; cmd[1] = 0x20; cmd[2] = 0x00; cmd[3] = strtoul(argv[1], 0, 0); cmd[4] = 8; rc = encode_pin_entry(argv[2], cmd + 5); if (rc < 0) return(rc); rc = apdu_exchange(cmd, 13); if (rc < 0) return(rc); if (sim_resp_sw != 0x9000) { fprintf(stderr, "bad SW response: %04X\n", sim_resp_sw); return(-1); } return(0); } cmd_verify_hex(argc, argv) char **argv; { u_char cmd[13]; int rc; /* VERIFY PIN command APDU */ cmd[0] = 0x00; cmd[1] = 0x20; cmd[2] = 0x00; cmd[3] = strtoul(argv[1], 0, 0); cmd[4] = 8; rc = decode_hex_data_from_string(argv[2], cmd + 5, 8, 8); if (rc < 0) return(rc); rc = apdu_exchange(cmd, 13); if (rc < 0) return(rc); if (sim_resp_sw != 0x9000) { fprintf(stderr, "bad SW response: %04X\n", sim_resp_sw); return(-1); } return(0); } cmd_change_pin(argc, argv) char **argv; { u_char cmd[21]; int rc; /* CHANGE PIN command APDU */ cmd[0] = 0x00; cmd[1] = 0x24; cmd[2] = 0x00; cmd[3] = strtoul(argv[1], 0, 0); cmd[4] = 16; rc = encode_pin_entry(argv[2], cmd + 5); if (rc < 0) return(rc); rc = encode_pin_entry(argv[3], cmd + 13); if (rc < 0) return(rc); rc = apdu_exchange(cmd, 21); if (rc < 0) return(rc); if (sim_resp_sw != 0x9000) { fprintf(stderr, "bad SW response: %04X\n", sim_resp_sw); return(-1); } return(0); } cmd_disable_pin(argc, argv) char **argv; { u_char cmd[13]; int rc; /* DISABLE PIN command APDU */ cmd[0] = 0x00; cmd[1] = 0x26; cmd[2] = 0x00; cmd[3] = strtoul(argv[1], 0, 0); cmd[4] = 8; rc = encode_pin_entry(argv[2], cmd + 5); if (rc < 0) return(rc); rc = apdu_exchange(cmd, 13); if (rc < 0) return(rc); if (sim_resp_sw != 0x9000) { fprintf(stderr, "bad SW response: %04X\n", sim_resp_sw); return(-1); } return(0); } cmd_enable_pin(argc, argv) char **argv; { u_char cmd[13]; int rc; /* ENABLE PIN command APDU */ cmd[0] = 0x00; cmd[1] = 0x28; cmd[2] = 0x00; cmd[3] = strtoul(argv[1], 0, 0); cmd[4] = 8; rc = encode_pin_entry(argv[2], cmd + 5); if (rc < 0) return(rc); rc = apdu_exchange(cmd, 13); if (rc < 0) return(rc); if (sim_resp_sw != 0x9000) { fprintf(stderr, "bad SW response: %04X\n", sim_resp_sw); return(-1); } return(0); } cmd_unblock_pin(argc, argv) char **argv; { u_char cmd[21]; int rc; /* UNBLOCK PIN command APDU */ cmd[0] = 0x00; cmd[1] = 0x2C; cmd[2] = 0x00; cmd[3] = strtoul(argv[1], 0, 0); cmd[4] = 16; rc = encode_pin_entry(argv[2], cmd + 5); if (rc < 0) return(rc); rc = encode_pin_entry(argv[3], cmd + 13); if (rc < 0) return(rc); rc = apdu_exchange(cmd, 21); if (rc < 0) return(rc); if (sim_resp_sw != 0x9000) { fprintf(stderr, "bad SW response: %04X\n", sim_resp_sw); return(-1); } return(0); } /* retrieving PIN attempt counters from the card */ cmd_pin_attempt_cnt(argc, argv) char **argv; { u_char cmd[5]; int rc; /* VERIFY PIN command APDU */ cmd[0] = 0x00; cmd[1] = 0x20; cmd[2] = 0x00; cmd[3] = strtoul(argv[1], 0, 0); cmd[4] = 0; rc = apdu_exchange(cmd, 5); if (rc < 0) return(rc); printf("%04X\n", sim_resp_sw); return(0); } cmd_puk_attempt_cnt(argc, argv) char **argv; { u_char cmd[5]; int rc; /* UNBLOCK PIN command APDU */ cmd[0] = 0x00; cmd[1] = 0x2C; cmd[2] = 0x00; cmd[3] = strtoul(argv[1], 0, 0); cmd[4] = 0; rc = apdu_exchange(cmd, 5); if (rc < 0) return(rc); printf("%04X\n", sim_resp_sw); return(0); }