view uicc/pins.c @ 99:97ba63d9361a

scripts/fcsim1-sst: turn off STK & OTA services In the initial unprogrammed state of the cards from Grcard, SST has services 25 through 29 set to allocated and activated. However, these cards appear to not actually support OTA, ENVELOPE commands do nothing (just return SW 9000), and they were never observed issuing any proactive SIM commands, even after a feature-generous TERMINAL PROFILE. Therefore, let's list these STK & OTA services as allocated, but not activated in our FCSIM1 SST.
author Mychaela Falconia <falcon@freecalypso.org>
date Wed, 05 May 2021 04:26:07 +0000
parents 97646b363eaa
children
line wrap: on
line source

/*
 * This module implements the standard set of commands for working
 * with UICC PINs; because all of these commands take a user-specified
 * P2 key ID, they should work with ADM PINs as well.
 */

#include <sys/types.h>
#include <stdio.h>
#include <stdlib.h>
#include "simresp.h"

cmd_verify_pin(argc, argv)
	char **argv;
{
	u_char cmd[13];
	int rc;

	/* VERIFY PIN command APDU */
	cmd[0] = 0x00;
	cmd[1] = 0x20;
	cmd[2] = 0x00;
	cmd[3] = strtoul(argv[1], 0, 0);
	cmd[4] = 8;
	rc = encode_pin_entry(argv[2], cmd + 5);
	if (rc < 0)
		return(rc);
	rc = apdu_exchange(cmd, 13);
	if (rc < 0)
		return(rc);
	if (sim_resp_sw != 0x9000) {
		fprintf(stderr, "bad SW response: %04X\n", sim_resp_sw);
		return(-1);
	}
	return(0);
}

cmd_verify_hex(argc, argv)
	char **argv;
{
	u_char cmd[13];
	int rc;

	/* VERIFY PIN command APDU */
	cmd[0] = 0x00;
	cmd[1] = 0x20;
	cmd[2] = 0x00;
	cmd[3] = strtoul(argv[1], 0, 0);
	cmd[4] = 8;
	rc = decode_hex_data_from_string(argv[2], cmd + 5, 8, 8);
	if (rc < 0)
		return(rc);
	rc = apdu_exchange(cmd, 13);
	if (rc < 0)
		return(rc);
	if (sim_resp_sw != 0x9000) {
		fprintf(stderr, "bad SW response: %04X\n", sim_resp_sw);
		return(-1);
	}
	return(0);
}

verify_pin_func(p2, pin)
	unsigned p2;
	char *pin;
{
	u_char cmd[13];
	int rc;

	/* VERIFY PIN command APDU */
	cmd[0] = 0x00;
	cmd[1] = 0x20;
	cmd[2] = 0x00;
	cmd[3] = p2;
	cmd[4] = 8;
	rc = encode_pin_entry(pin, cmd + 5);
	if (rc < 0)
		return(rc);
	rc = apdu_exchange(cmd, 13);
	if (rc < 0)
		return(rc);
	if (sim_resp_sw != 0x9000) {
		fprintf(stderr, "bad SW response to VERIFY PIN: %04X\n",
			sim_resp_sw);
		return(-1);
	}
	return(0);
}

cmd_change_pin(argc, argv)
	char **argv;
{
	u_char cmd[21];
	int rc;

	/* CHANGE PIN command APDU */
	cmd[0] = 0x00;
	cmd[1] = 0x24;
	cmd[2] = 0x00;
	cmd[3] = strtoul(argv[1], 0, 0);
	cmd[4] = 16;
	rc = encode_pin_entry(argv[2], cmd + 5);
	if (rc < 0)
		return(rc);
	rc = encode_pin_entry(argv[3], cmd + 13);
	if (rc < 0)
		return(rc);
	rc = apdu_exchange(cmd, 21);
	if (rc < 0)
		return(rc);
	if (sim_resp_sw != 0x9000) {
		fprintf(stderr, "bad SW response: %04X\n", sim_resp_sw);
		return(-1);
	}
	return(0);
}

cmd_disable_pin(argc, argv)
	char **argv;
{
	u_char cmd[13];
	int rc;

	/* DISABLE PIN command APDU */
	cmd[0] = 0x00;
	cmd[1] = 0x26;
	cmd[2] = 0x00;
	cmd[3] = strtoul(argv[1], 0, 0);
	cmd[4] = 8;
	rc = encode_pin_entry(argv[2], cmd + 5);
	if (rc < 0)
		return(rc);
	rc = apdu_exchange(cmd, 13);
	if (rc < 0)
		return(rc);
	if (sim_resp_sw != 0x9000) {
		fprintf(stderr, "bad SW response: %04X\n", sim_resp_sw);
		return(-1);
	}
	return(0);
}

cmd_enable_pin(argc, argv)
	char **argv;
{
	u_char cmd[13];
	int rc;

	/* ENABLE PIN command APDU */
	cmd[0] = 0x00;
	cmd[1] = 0x28;
	cmd[2] = 0x00;
	cmd[3] = strtoul(argv[1], 0, 0);
	cmd[4] = 8;
	rc = encode_pin_entry(argv[2], cmd + 5);
	if (rc < 0)
		return(rc);
	rc = apdu_exchange(cmd, 13);
	if (rc < 0)
		return(rc);
	if (sim_resp_sw != 0x9000) {
		fprintf(stderr, "bad SW response: %04X\n", sim_resp_sw);
		return(-1);
	}
	return(0);
}

cmd_unblock_pin(argc, argv)
	char **argv;
{
	u_char cmd[21];
	int rc;

	/* UNBLOCK PIN command APDU */
	cmd[0] = 0x00;
	cmd[1] = 0x2C;
	cmd[2] = 0x00;
	cmd[3] = strtoul(argv[1], 0, 0);
	cmd[4] = 16;
	rc = encode_pin_entry(argv[2], cmd + 5);
	if (rc < 0)
		return(rc);
	rc = encode_pin_entry(argv[3], cmd + 13);
	if (rc < 0)
		return(rc);
	rc = apdu_exchange(cmd, 21);
	if (rc < 0)
		return(rc);
	if (sim_resp_sw != 0x9000) {
		fprintf(stderr, "bad SW response: %04X\n", sim_resp_sw);
		return(-1);
	}
	return(0);
}

/* retrieving PIN attempt counters from the card */

cmd_pin_attempt_cnt(argc, argv)
	char **argv;
{
	u_char cmd[5];
	int rc;

	/* VERIFY PIN command APDU */
	cmd[0] = 0x00;
	cmd[1] = 0x20;
	cmd[2] = 0x00;
	cmd[3] = strtoul(argv[1], 0, 0);
	cmd[4] = 0;
	rc = apdu_exchange(cmd, 5);
	if (rc < 0)
		return(rc);
	printf("%04X\n", sim_resp_sw);
	return(0);
}

cmd_puk_attempt_cnt(argc, argv)
	char **argv;
{
	u_char cmd[5];
	int rc;

	/* UNBLOCK PIN command APDU */
	cmd[0] = 0x00;
	cmd[1] = 0x2C;
	cmd[2] = 0x00;
	cmd[3] = strtoul(argv[1], 0, 0);
	cmd[4] = 0;
	rc = apdu_exchange(cmd, 5);
	if (rc < 0)
		return(rc);
	printf("%04X\n", sim_resp_sw);
	return(0);
}