Lines Matching refs:cmd

813 	unsigned char cmd[50] = { SIM_CMD_SELECT };  in _scard_select_file()  local
819 cmd[0] = USIM_CLA; in _scard_select_file()
820 cmd[3] = 0x04; in _scard_select_file()
828 if (5 + aidlen > sizeof(cmd)) in _scard_select_file()
830 cmd[2] = 0x04; /* Select by AID */ in _scard_select_file()
831 cmd[4] = aidlen; /* len */ in _scard_select_file()
832 os_memcpy(cmd + 5, aid, aidlen); in _scard_select_file()
835 cmd[5] = file_id >> 8; in _scard_select_file()
836 cmd[6] = file_id & 0xff; in _scard_select_file()
840 ret = scard_transmit(scard, cmd, cmdlen, resp, &len); in _scard_select_file()
899 unsigned char cmd[5] = { SIM_CMD_READ_RECORD /* , len */ }; in scard_get_record_len() local
904 cmd[0] = USIM_CLA; in scard_get_record_len()
905 cmd[2] = recnum; in scard_get_record_len()
906 cmd[3] = mode; in scard_get_record_len()
907 cmd[4] = sizeof(buf); in scard_get_record_len()
910 ret = scard_transmit(scard, cmd, sizeof(cmd), buf, &blen); in scard_get_record_len()
934 unsigned char cmd[5] = { SIM_CMD_READ_RECORD /* , len */ }; in scard_read_record() local
940 cmd[0] = USIM_CLA; in scard_read_record()
941 cmd[2] = recnum; in scard_read_record()
942 cmd[3] = mode; in scard_read_record()
943 cmd[4] = len; in scard_read_record()
949 ret = scard_transmit(scard, cmd, sizeof(cmd), buf, &blen); in scard_read_record()
980 unsigned char cmd[5] = { SIM_CMD_READ_BIN /* , len */ }; in scard_read_file() local
985 cmd[4] = len; in scard_read_file()
992 cmd[0] = USIM_CLA; in scard_read_file()
993 ret = scard_transmit(scard, cmd, sizeof(cmd), buf, &blen); in scard_read_file()
1025 unsigned char cmd[5 + 8] = { SIM_CMD_VERIFY_CHV1 }; in scard_verify_pin() local
1034 cmd[0] = USIM_CLA; in scard_verify_pin()
1035 os_memcpy(cmd + 5, pin, os_strlen(pin)); in scard_verify_pin()
1036 os_memset(cmd + 5 + os_strlen(pin), 0xff, 8 - os_strlen(pin)); in scard_verify_pin()
1039 ret = scard_transmit(scard, cmd, sizeof(cmd), resp, &len); in scard_verify_pin()
1057 unsigned char cmd[5] = { SIM_CMD_VERIFY_CHV1 }; in scard_get_pin_retry_counter() local
1064 cmd[0] = USIM_CLA; in scard_get_pin_retry_counter()
1065 cmd[4] = 0; /* Empty data */ in scard_get_pin_retry_counter()
1068 ret = scard_transmit(scard, cmd, sizeof(cmd), resp, &len); in scard_get_pin_retry_counter()
1244 unsigned char cmd[5 + 1 + 16] = { SIM_CMD_RUN_GSM_ALG }; in scard_gsm_auth() local
1257 os_memcpy(cmd + 5, _rand, 16); in scard_gsm_auth()
1260 cmd[0] = USIM_CLA; in scard_gsm_auth()
1261 cmd[3] = 0x80; in scard_gsm_auth()
1262 cmd[4] = 17; in scard_gsm_auth()
1263 cmd[5] = 16; in scard_gsm_auth()
1264 os_memcpy(cmd + 6, _rand, 16); in scard_gsm_auth()
1268 ret = scard_transmit(scard, cmd, cmdlen, resp, &len); in scard_gsm_auth()
1345 unsigned char cmd[5 + 1 + AKA_RAND_LEN + 1 + AKA_AUTN_LEN] = in scard_umts_auth() local
1363 cmd[5] = AKA_RAND_LEN; in scard_umts_auth()
1364 os_memcpy(cmd + 6, _rand, AKA_RAND_LEN); in scard_umts_auth()
1365 cmd[6 + AKA_RAND_LEN] = AKA_AUTN_LEN; in scard_umts_auth()
1366 os_memcpy(cmd + 6 + AKA_RAND_LEN + 1, autn, AKA_AUTN_LEN); in scard_umts_auth()
1369 ret = scard_transmit(scard, cmd, sizeof(cmd), resp, &len); in scard_umts_auth()