/hardware/st/secure_element2/secure_element/1.0/ |
D | SecureElement.cpp | 163 uint8_t *apdu; in transmit() local 169 apdu = (uint8_t*)malloc(apdu_len * sizeof(uint8_t)); in transmit() 175 if (apdu != NULL) { in transmit() 176 memcpy(apdu, data.data(), data.size()); in transmit() 177 dump_bytes("CMD: ", ':', apdu, apdu_len, stdout); in transmit() 178 resp_len = se_gto_apdu_transmit(ctx, apdu, apdu_len, resp, 65536); in transmit() 195 if(apdu) free(apdu); in transmit() 224 uint8_t *apdu; //65536 in openLogicalChannel() local 232 apdu = (uint8_t*)malloc(apdu_len * sizeof(uint8_t)); in openLogicalChannel() 235 if (apdu != NULL && resp!=NULL) { in openLogicalChannel() [all …]
|
D | SecureElement.h | 59 …static int run_apdu(struct se_gto_ctx *ctx, const uint8_t *apdu, uint8_t *resp, int n, int verbose…
|
/hardware/st/secure_element2/secure_element/aidl/ |
D | SecureElement.cpp | 178 uint8_t *apdu; in transmit() local 184 apdu = (uint8_t*)malloc(apdu_len * sizeof(uint8_t)); in transmit() 190 if (apdu != NULL) { in transmit() 191 memcpy(apdu, data.data(), data.size()); in transmit() 192 dump_bytes("CMD: ", ':', apdu, apdu_len, stdout); in transmit() 193 resp_len = se_gto_apdu_transmit(ctx, apdu, apdu_len, resp, 65536); in transmit() 212 if(apdu) free(apdu); in transmit() 243 uint8_t *apdu; //65536 in openLogicalChannel() local 251 apdu = (uint8_t*)malloc(apdu_len * sizeof(uint8_t)); in openLogicalChannel() 254 if (apdu != NULL && resp!=NULL) { in openLogicalChannel() [all …]
|
D | SecureElement.h | 53 …static int run_apdu(struct se_gto_ctx *ctx, const uint8_t *apdu, uint8_t *resp, int n, int verbose…
|
/hardware/st/secure_element2/secure_element/1.1/ |
D | SecureElement.cpp | 192 uint8_t *apdu; in transmit() local 198 apdu = (uint8_t*)malloc(apdu_len * sizeof(uint8_t)); in transmit() 204 if (apdu != NULL) { in transmit() 205 memcpy(apdu, data.data(), data.size()); in transmit() 206 dump_bytes("CMD: ", ':', apdu, apdu_len, stdout); in transmit() 207 resp_len = se_gto_apdu_transmit(ctx, apdu, apdu_len, resp, 65536); in transmit() 224 if(apdu) free(apdu); in transmit() 258 uint8_t *apdu; //65536 in openLogicalChannel() local 266 apdu = (uint8_t*)malloc(apdu_len * sizeof(uint8_t)); in openLogicalChannel() 269 if (apdu != NULL && resp!=NULL) { in openLogicalChannel() [all …]
|
D | SecureElement.h | 63 …static int run_apdu(struct se_gto_ctx *ctx, const uint8_t *apdu, uint8_t *resp, int n, int verbose…
|
/hardware/st/secure_element2/secure_element/1.2/ |
D | SecureElement.cpp | 222 uint8_t *apdu; in transmit() local 228 apdu = (uint8_t*)malloc(apdu_len * sizeof(uint8_t)); in transmit() 234 if (apdu != NULL) { in transmit() 235 memcpy(apdu, data.data(), data.size()); in transmit() 236 dump_bytes("CMD: ", ':', apdu, apdu_len, stdout); in transmit() 237 resp_len = se_gto_apdu_transmit(ctx, apdu, apdu_len, resp, 65536); in transmit() 254 if(apdu) free(apdu); in transmit() 284 uint8_t *apdu; //65536 in openLogicalChannel() local 292 apdu = (uint8_t*)malloc(apdu_len * sizeof(uint8_t)); in openLogicalChannel() 295 if (apdu != NULL && resp!=NULL) { in openLogicalChannel() [all …]
|
D | SecureElement.h | 65 …static int run_apdu(struct se_gto_ctx *ctx, const uint8_t *apdu, uint8_t *resp, int n, int verbose…
|
/hardware/interfaces/radio/aidl/compat/libradiocompat/sim/ |
D | structs.cpp | 43 V1_0::SimApdu toHidl(const aidl::SimApdu& apdu) { in toHidl() argument 45 .sessionId = apdu.sessionId, in toHidl() 46 .cla = apdu.cla, in toHidl() 47 .instruction = apdu.instruction, in toHidl() 48 .p1 = apdu.p1, in toHidl() 49 .p2 = apdu.p2, in toHidl() 50 .p3 = apdu.p3, in toHidl() 51 .data = apdu.data, in toHidl()
|
D | structs.h | 36 V1_0::SimApdu toHidl(const ::aidl::android::hardware::radio::sim::SimApdu& apdu);
|
/hardware/nxp/keymint/transport/ |
D | OmapiTransport.cpp | 205 std::vector<uint8_t> apdu, std::vector<uint8_t>& transmitResponse) { in internalTransmitApdu() argument 259 res = channel->transmit(apdu, &transmitResponse); in internalTransmitApdu() 283 std::vector<uint8_t> apdu(inData); in sendData() local 307 bool status = internalProtectedTransmitApdu(eSEReader, std::move(apdu), output); in sendData() 309 bool status = internalTransmitApdu(eSEReader, apdu, output); in sendData() 370 std::vector<uint8_t> apdu, std::vector<uint8_t>& transmitResponse) { in internalProtectedTransmitApdu() argument 404 if (!mSBAccessController.isOperationAllowed(apdu[APDU_INS_OFFSET])) { in internalProtectedTransmitApdu() 440 if (mSBAccessController.isOperationAllowed(apdu[APDU_INS_OFFSET])) { in internalProtectedTransmitApdu() 442 LOGD_OMAPI("constructed apdu: " << apdu); in internalProtectedTransmitApdu() 444 res = channel->transmit(apdu, &transmitResponse); in internalProtectedTransmitApdu() [all …]
|
/hardware/interfaces/secure_element/aidl/default/ |
D | main.cpp | 170 virtual RawApdu Process(Apdu const& apdu) = 0; 215 se::RawApdu Process(se::Apdu const& apdu) override { in Process() argument 217 uint16_t le = apdu.get_le(); in Process() 218 uint8_t p1 = apdu.get_p1(); in Process() 219 uint8_t p2 = apdu.get_p2(); in Process() 221 switch (apdu.get_ins()) { in Process() 239 return ReadNextResponseChunk(apdu.get_le()); in Process() 264 return ReadNextResponseChunk(std::min<uint16_t>(apdu.get_le(), 256)); in Process() 271 return ReadNextResponseChunk(apdu.get_le()); in Process() 281 return ReadNextResponseChunk(apdu.get_le()); in Process() [all …]
|
/hardware/st/secure_element2/secure_element/esehal/src/ |
D | libse-gto.c | 180 se_gto_apdu_transmit(struct se_gto_ctx *ctx, const void *apdu, int n, void *resp, int r) in se_gto_apdu_transmit() argument 182 if (!apdu || (n < 4) || !resp || (r < 2)) { in se_gto_apdu_transmit() 186 r = isot1_transceive(&ctx->t1, apdu, n, resp, r); in se_gto_apdu_transmit() 246 unsigned char apdu[5]= {0x80,0xCA,0x9F,0x7F,0x2D}; in gtoSPI_checkAlive() local 251 ret = se_gto_apdu_transmit(ctx, apdu, 5, resp, sizeof(resp)); in gtoSPI_checkAlive()
|
/hardware/nxp/keymint/KM200/ |
D | JavacardSecureElement.cpp | 78 std::vector<uint8_t> apdu; in sendData() local 80 ret = constructApduMessage(ins, inData, apdu); in sendData() 86 if (!transport_->sendData(apdu, response)) { in sendData()
|
/hardware/ril/librilutils/proto/ |
D | sap-api.options | 22 #RIL_SIM_SAP_REQUEST.apdu type:FT_POINTER 23 #RIL_SIM_SAP_RESPONSE.apdu type:FT_POINTER
|
/hardware/nxp/keymint/KM300/ |
D | JavacardSecureElement.cpp | 104 std::vector<uint8_t> apdu; in sendData() local 106 ret = constructApduMessage(ins, inData, apdu); in sendData() 112 if (!transport_->sendData(apdu, response)) { in sendData()
|
/hardware/interfaces/secure_element/aidl/vts/ |
D | VtsHalSecureElementTargetTest.cpp | 136 std::vector<uint8_t> apdu = kDataApdu; in transmit() local 141 apdu[0] |= channel_number; in transmit() 143 apdu[0] |= (channel_number - 4) | 0x40; in transmit() 149 auto status = secure_element_->transmit(apdu, &response); in transmit()
|
/hardware/nxp/keymint/transport/include/ |
D | OmapiTransport.h | 144 std::vector<uint8_t> apdu, std::vector<uint8_t>& transmitResponse); 154 std::vector<uint8_t> apdu, std::vector<uint8_t>& transmitResponse);
|
/hardware/st/secure_element2/secure_element/aidl/se-gto/ |
D | libse-gto.h | 187 int se_gto_apdu_transmit(struct se_gto_ctx *ctx, const void *apdu, int n, void *resp, int r);
|
/hardware/st/secure_element2/secure_element/esehal/src/se-gto/ |
D | libse-gto.h | 187 int se_gto_apdu_transmit(struct se_gto_ctx *ctx, const void *apdu, int n, void *resp, int r);
|
/hardware/st/secure_element2/secure_element/1.0/se-gto/ |
D | libse-gto.h | 188 int se_gto_apdu_transmit(struct se_gto_ctx *ctx, const void *apdu, int n, void *resp, int r);
|
/hardware/st/secure_element2/secure_element/1.2/se-gto/ |
D | libse-gto.h | 188 int se_gto_apdu_transmit(struct se_gto_ctx *ctx, const void *apdu, int n, void *resp, int r);
|
/hardware/st/secure_element2/secure_element/1.1/se-gto/ |
D | libse-gto.h | 188 int se_gto_apdu_transmit(struct se_gto_ctx *ctx, const void *apdu, int n, void *resp, int r);
|
/hardware/ril/reference-ril/ |
D | reference-ril.c | 1854 RIL_SIM_APDU *apdu = (RIL_SIM_APDU *)data; local 1856 if (apdu == NULL || datalen != sizeof(RIL_SIM_APDU)) { 1861 cmd_size = 10 + (apdu->data ? strlen(apdu->data) : 0); 1863 apdu->sessionid, cmd_size, apdu->cla, apdu->instruction, 1864 apdu->p1, apdu->p2, apdu->p3, apdu->data ? apdu->data : "");
|
/hardware/ril/libril/ |
D | ril_service.cpp | 705 RIL_SIM_APDU apdu = {}; in dispatchIccApdu() local 707 apdu.sessionid = message.sessionId; in dispatchIccApdu() 708 apdu.cla = message.cla; in dispatchIccApdu() 709 apdu.instruction = message.instruction; in dispatchIccApdu() 710 apdu.p1 = message.p1; in dispatchIccApdu() 711 apdu.p2 = message.p2; in dispatchIccApdu() 712 apdu.p3 = message.p3; in dispatchIccApdu() 714 if (!copyHidlStringToRil(&apdu.data, message.data, pRI)) { in dispatchIccApdu() 718 CALL_ONREQUEST(request, &apdu, sizeof(apdu), pRI, slotId); in dispatchIccApdu() 720 memsetAndFreeStrings(1, apdu.data); in dispatchIccApdu()
|