/aosp12/packages/apps/SecureElement/src/com/android/se/ |
H A D | CommandApduValidator.java | 54 if (apdu.length < CMD_APDU_LENGTH_CASE1) { in execute() 57 checkCla(apdu[OFFSET_CLA]); in execute() 58 checkIns(apdu[OFFSET_INS]); in execute() 60 if (apdu.length == CMD_APDU_LENGTH_CASE1) { in execute() 64 if (apdu.length == CMD_APDU_LENGTH_CASE2) { in execute() 69 if (apdu[OFFSET_P3] != (byte) 0x00) { in execute() 75 checkLe((int) 0x0FF & apdu[apdu.length - 1]); in execute() 87 if (apdu.length <= OFFSET_DATA_EXTENDED) { in execute() 91 int lc = (((int) 0x0FF & apdu[OFFSET_DATA]) << 8) + ((int) 0x0FF & apdu[OFFSET_DATA + 1]); in execute() 102 checkLe((((int) 0x0FF & apdu[apdu.length - 2]) << 8) in execute() [all …]
|
/aosp12/hardware/st/secure_element2/secure_element/1.0/ |
H A D | SecureElement.cpp | 163 uint8_t *apdu; in transmit() local 175 if (apdu != NULL) { in transmit() 195 if(apdu) free(apdu); in transmit() 218 uint8_t *apdu; //65536 in openLogicalChannel() local 252 if(apdu) free(apdu); in openLogicalChannel() 269 if(apdu) free(apdu); in openLogicalChannel() 275 if(apdu) free(apdu); in openLogicalChannel() 344 if(apdu) free(apdu); in openLogicalChannel() 375 if (apdu != NULL) { in openBasicChannel() 421 if(apdu) free(apdu); in openBasicChannel() [all …]
|
H A D | SecureElement.h | 59 …static int run_apdu(struct se_gto_ctx *ctx, const uint8_t *apdu, uint8_t *resp, int n, int verbose…
|
/aosp12/hardware/st/secure_element2/secure_element/1.1/ |
H A D | SecureElement.cpp | 191 uint8_t *apdu; in transmit() local 203 if (apdu != NULL) { in transmit() 223 if(apdu) free(apdu); in transmit() 251 uint8_t *apdu; //65536 in openLogicalChannel() local 285 if(apdu) free(apdu); in openLogicalChannel() 302 if(apdu) free(apdu); in openLogicalChannel() 308 if(apdu) free(apdu); in openLogicalChannel() 377 if(apdu) free(apdu); in openLogicalChannel() 413 if (apdu != NULL) { in openBasicChannel() 459 if(apdu) free(apdu); in openBasicChannel() [all …]
|
H A D | SecureElement.h | 63 …static int run_apdu(struct se_gto_ctx *ctx, const uint8_t *apdu, uint8_t *resp, int n, int verbose…
|
/aosp12/hardware/st/secure_element2/secure_element/1.2/ |
H A D | SecureElement.cpp | 196 uint8_t *apdu; in transmit() local 208 if (apdu != NULL) { in transmit() 228 if(apdu) free(apdu); in transmit() 256 uint8_t *apdu; //65536 in openLogicalChannel() local 290 if(apdu) free(apdu); in openLogicalChannel() 307 if(apdu) free(apdu); in openLogicalChannel() 313 if(apdu) free(apdu); in openLogicalChannel() 382 if(apdu) free(apdu); in openLogicalChannel() 418 if (apdu != NULL) { in openBasicChannel() 464 if(apdu) free(apdu); in openBasicChannel() [all …]
|
H A D | SecureElement.h | 65 …static int run_apdu(struct se_gto_ctx *ctx, const uint8_t *apdu, uint8_t *resp, int n, int verbose…
|
/aosp12/packages/apps/SecureElement/src/com/android/se/security/ |
H A D | CommandApdu.java | 166 apdu[index] = (byte) mP1; in toBytes() 168 apdu[index] = (byte) mP2; in toBytes() 180 return apdu; in toBytes() 186 apdu.mCla = mCla; in clone() 187 apdu.mIns = mIns; in clone() 188 apdu.mP1 = mP1; in clone() 189 apdu.mP2 = mP2; in clone() 190 apdu.mLc = mLc; in clone() 193 apdu.mLe = mLe; in clone() 194 apdu.mLeUsed = mLeUsed; in clone() [all …]
|
H A D | ApduFilter.java | 50 public ApduFilter(byte[] apdu, byte[] mask) { in ApduFilter() argument 51 if (apdu.length != 4) { in ApduFilter() 57 mApdu = apdu; in ApduFilter() 82 public void setApdu(byte[] apdu) { in setApdu() argument 83 if (apdu.length != 4) { in setApdu() 86 mApdu = apdu; in setApdu()
|
/aosp12/packages/apps/SecureElement/src/com/android/se/security/ara/ |
H A D | AccessRuleApplet.java | 73 CommandApdu apdu = (CommandApdu) GET_ALL_CMD.clone(); in readAllAccessRules() local 74 ResponseApdu response = send(apdu); in readAllAccessRules() 105 apdu = (CommandApdu) GET_NEXT_CMD.clone(); in readAllAccessRules() 106 apdu.setLe(le); in readAllAccessRules() 108 response = send(apdu); in readAllAccessRules() 134 CommandApdu apdu = (CommandApdu) GET_REFRESH_TAG.clone(); in readRefreshTag() local 135 ResponseApdu response = send(apdu); in readRefreshTag()
|
/aosp12/hardware/st/secure_element2/secure_element/1.0/esehal/src/ |
H A D | libse-gto.c | 180 se_gto_apdu_transmit(struct se_gto_ctx *ctx, const void *apdu, int n, void *resp, int r) in se_gto_apdu_transmit() argument 182 if (!apdu || (n < 4) || !resp || (r < 2)) { in se_gto_apdu_transmit() 186 r = isot1_transceive(&ctx->t1, apdu, n, resp, r); in se_gto_apdu_transmit() 246 unsigned char apdu[5]= {0x80,0xCA,0x9F,0x7F,0x2D}; in gtoSPI_checkAlive() local 251 ret = se_gto_apdu_transmit(ctx, apdu, 5, resp, sizeof(resp)); in gtoSPI_checkAlive()
|
/aosp12/frameworks/base/core/java/android/nfc/cardemulation/ |
H A D | HostApduService.java | 256 byte[] apdu = dataBundle.getByteArray(KEY_DATA); in handleMessage() 257 if (apdu != null) { in handleMessage() 258 byte[] responseApdu = processCommandApdu(apdu, null); in handleMessage()
|
/aosp12/hardware/ril/librilutils/proto/ |
H A D | sap-api.options | 22 #RIL_SIM_SAP_REQUEST.apdu type:FT_POINTER 23 #RIL_SIM_SAP_RESPONSE.apdu type:FT_POINTER
|
/aosp12/frameworks/opt/telephony/src/java/com/android/internal/telephony/uicc/euicc/apdu/ |
H A D | RequestProvider.java | 17 package com.android.internal.telephony.uicc.euicc.apdu;
|
H A D | ApduSenderResultCallback.java | 17 package com.android.internal.telephony.uicc.euicc.apdu;
|
H A D | ApduException.java | 17 package com.android.internal.telephony.uicc.euicc.apdu;
|
H A D | ApduCommand.java | 17 package com.android.internal.telephony.uicc.euicc.apdu;
|
H A D | CloseLogicalChannelInvocation.java | 17 package com.android.internal.telephony.uicc.euicc.apdu;
|
H A D | RequestBuilder.java | 17 package com.android.internal.telephony.uicc.euicc.apdu;
|
H A D | TransmitApduLogicalChannelInvocation.java | 17 package com.android.internal.telephony.uicc.euicc.apdu;
|
H A D | OpenLogicalChannelInvocation.java | 17 package com.android.internal.telephony.uicc.euicc.apdu;
|
/aosp12/hardware/st/secure_element2/secure_element/1.0/esehal/src/se-gto/ |
H A D | libse-gto.h | 187 int se_gto_apdu_transmit(struct se_gto_ctx *ctx, const void *apdu, int n, void *resp, int r);
|
/aosp12/frameworks/opt/telephony/src/java/com/android/internal/telephony/uicc/euicc/ |
H A D | EuiccCardErrorException.java | 23 import com.android.internal.telephony.uicc.euicc.apdu.ApduSender;
|
/aosp12/hardware/ril/reference-ril/ |
H A D | reference-ril.c | 1854 RIL_SIM_APDU *apdu = (RIL_SIM_APDU *)data; local 1856 if (apdu == NULL || datalen != sizeof(RIL_SIM_APDU)) { 1861 cmd_size = 10 + (apdu->data ? strlen(apdu->data) : 0); 1863 apdu->sessionid, cmd_size, apdu->cla, apdu->instruction, 1864 apdu->p1, apdu->p2, apdu->p3, apdu->data ? apdu->data : "");
|
/aosp12/packages/apps/Bluetooth/src/com/android/bluetooth/sap/ |
H A D | SapMessage.java | 281 public void setApdu(byte[] apdu) { in setApdu() argument 282 this.mApdu = apdu; in setApdu() 289 public void setApdu7816(byte[] apdu) { in setApdu7816() argument 290 this.mApdu7816 = apdu; in setApdu7816()
|