virtualsmartcard.cards.cryptoflex.
CryptoflexMF
(filedescriptor=56, lifecycle=5, simpletlv_data=None, bertlv_data=None, dfname=None)¶Bases: virtualsmartcard.SmartcardFilesystem.MF
_selectFile
(p1, p2, data)¶Returns the file specified by ‘p1’ and ‘data’ from the select file command APDU.
append
(file)¶Appends ‘file’ to the content of the DF.
appendRecord
(p1, p2, data)¶Function for instruction 0xe2. Takes the parameter bytes ‘p1’, ‘p2’ as integers and ‘data’ as binary string.
the status bytes as two byte long integer and the response data as binary string.
appendrecord
(*argz, **args)¶Only a template, will raise an error.
bertlv_data
¶list of (tag, length, value)-tuples of BER-TLV coded data objects (encrypted)
content
¶list of files of the DF
create
(p1, p2, data)¶Creates and returns a list of files according to the parameters of a create file command.
createFile
(p1, p2, data)¶Function for instruction 0xe0. Takes the parameter bytes ‘p1’, ‘p2’ as integers and ‘data’ as binary string.
the status bytes as two byte long integer and the response data as binary string.
current
¶the currently selected file
currentDF
()¶Returns the current DF.
currentEF
()¶Returns the current EF or None if not available.
data
¶unknown
dataObjectHandlingDecodeEncapsulated
(p1, p2, data)¶Decodes ‘p1’, ‘p2’ and ‘data’ from a data object handling command (i. e. get/put data) with odd instruction code.
the specified file, True if the following list regards SIMPLE-TLV data objects False otherwise and a list of (tag, length, value)-tuples.
dataObjectHandlingDecodePlain
(p1, p2, data)¶Decodes ‘p1’, ‘p2’ and ‘data’ from a data object handling command (i. e. get/put data) with even instruction code.
the specified file, True if the following list regards SIMPLE-TLV data objects False otherwise and a list of (tag, length, value)-tuples.
dataUnitsDecodeEncapsulated
(p1, p2, data)¶Decodes ‘p1’, ‘p2’ and ‘data’ from a data unit command (i. e. read/write/update/search/erase binary) with odd instruction code.
list of data strings.
dataUnitsDecodePlain
(p1, p2, data)¶Decodes ‘p1’, ‘p2’ and ‘data’ from a data unit command (i. e. read/write/update/search/erase binary) with even instruction code.
the specified TransparentStructureEF, a list of offsets and a list of data strings.
decrypt
(path, data)¶deleteFile
(p1, p2, data)¶Function for instruction 0xe4. Takes the parameter bytes ‘p1’, ‘p2’ as integers and ‘data’ as binary string.
the status bytes as two byte long integer and the response data as binary string.
dfname
¶string with up to 16 bytes. DF name,which can also be used as applicationidentifier.
encodeFileControlParameter
(file)¶Returns a string of TLV-coded file control information of ‘file’. Note: The result is not prepended with tag and length for neither TCP, FMD nor FCI template.
encrypt
(path, data)¶eraseBinaryEncapsulated
(p1, p2, data)¶Function for instruction 0x0f. Takes the parameter bytes ‘p1’, ‘p2’ as integers and ‘data’ as binary string.
the status bytes as two byte long integer and the response data as binary string.
eraseBinaryPlain
(p1, p2, data)¶Function for instruction 0x0e. Takes the parameter bytes ‘p1’, ‘p2’ as integers and ‘data’ as binary string.
the status bytes as two byte long integer and the response data as binary string.
eraseRecord
(p1, p2, data)¶Function for instruction 0x0c. Takes the parameter bytes ‘p1’, ‘p2’ as integers and ‘data’ as binary string.
the status bytes as two byte long integer and the response data as binary string.
erasebinary
(*argz, **args)¶Only a template, will raise an error.
fid
¶file identifier
filedescriptor
¶file descriptor byte
firstSFT
¶string of length 1. The firstsoftware function table from thehistorical bytes.
getDataEncapsulated
(p1, p2, data)¶Function for instruction 0xcb. Takes the parameter bytes ‘p1’, ‘p2’ as integers and ‘data’ as binary string.
the status bytes as two byte long integer and the response data as binary string.
getDataPlain
(p1, p2, data)¶Function for instruction 0xca. Takes the parameter bytes ‘p1’, ‘p2’ as integers and ‘data’ as binary string.
the status bytes as two byte long integer and the response data as binary string.
getMF
()¶Return MF of the card that contains this file
getdata
(isSimpleTlv, requestedTL)¶Returns a string of either the file’s BER-TLV or the file’s SIMPLE-TLV coded data objects depending on the bool ‘isSimpleTlv’. ‘requestedTL’ is a list of (tag, length)-tuples that specify which tags should be returned in what size.
getpath
()¶Returns the path to this file beginning with the MF’s fid.
lifecycle
¶life cycle byte
makeFirstSoftwareFunctionTable
(DFSelectionByFullDFName=True, DFSelectionByPartialDFName=True, DFSelectionByPath=True, DFSelectionByFID=True, DFSelectionByApplication_implicite=True, ShortFIDSupported=True, RecordNumberSupported=True, RecordIdentifierSupported=True)¶Returns a byte according to the first software function table from the historical bytes of the card capabilities.
makeSecondSoftwareFunctionTable
(DCB=1)¶The second software function table from the historical bytes contains the data coding byte.
named_dfs
¶list of DFs with dfname specified
parent
¶parent DF
putDataEncapsulated
(p1, p2, data)¶Function for instruction 0xdb. Takes the parameter bytes ‘p1’, ‘p2’ as integers and ‘data’ as binary string.
the status bytes as two byte long integer and the response data as binary string.
putDataPlain
(p1, p2, data)¶Function for instruction 0xda. Takes the parameter bytes ‘p1’, ‘p2’ as integers and ‘data’ as binary string.
the status bytes as two byte long integer and the response data as binary string.
putdata
(isSimpleTlv, newtlvlist)¶Sets either the file’s BER-TLV or the file’s SIMPLE-TLV coded data objects depending on the bool ‘isSimpleTlv’. ‘newtlvlist’ is a list of (tag, length, value)-tuples of new data.
readBinaryEncapsulated
(p1, p2, data)¶Function for instruction 0xb1. Takes the parameter bytes ‘p1’, ‘p2’ as integers and ‘data’ as binary string.
the status bytes as two byte long integer and the response data as binary string.
readBinaryPlain
(p1, p2, data)¶Function for instruction 0xb0. Takes the parameter bytes ‘p1’, ‘p2’ as integers and ‘data’ as binary string.
the status bytes as two byte long integer and the response data as binary string.
readRecordEncapsulated
(p1, p2, data)¶Function for instruction 0xb3. Takes the parameter bytes ‘p1’, ‘p2’ as integers and ‘data’ as binary string.
the status bytes as two byte long integer and the response data as binary string.
readRecordPlain
(p1, p2, data)¶Function for instruction 0xb2. Takes the parameter bytes ‘p1’, ‘p2’ as integers and ‘data’ as binary string.
the status bytes as two byte long integer and the response data as binary string.
readbinary
(*argz, **args)¶Only a template, will raise an error.
readrecord
(*argz, **args)¶Only a template, will raise an error.
recordHandlingDecode
(p1, p2)¶Decodes ‘p1’ and ‘p2’ from a record handling command (i. e. read/write/update/append/search/erase record).
the specified RecordStructureEF, the number or identifier of the record and a reference, that specifies which record to select (i. e. the last 3 bits of ‘p1’).
remove
(file)¶Removes ‘file’ from the content of the DF
searchBinaryEncapsulated
(p1, p2, data)¶searchBinaryPlain
(p1, p2, data)¶secondSFT
¶string of length 1. The secondsoftware function table from thehistorical bytes.
select
(attribute, value, reference=0, index_current=0)¶Returns the first file of the DF, that has the ‘attribute’ with the specified ‘value’. For partial DF name selection you must specify the first/last/next or previous occurence with ‘reference’ and the index of the current file ‘index_current’ (-1 for None).
selectFile
(p1, p2, data)¶Function for instruction 0xa4. Takes the parameter bytes ‘p1’, ‘p2’ as integers and ‘data’ as binary string. Returns the status bytes as two byte long integer and the response data as binary string.
simpletlv_data
¶list of (tag, length, value)-tuples of SIMPLE-TLV coded data objects (encrypted)
updateBinaryEncapsulated
(p1, p2, data)¶Function for instruction 0xd7. Takes the parameter bytes ‘p1’, ‘p2’ as integers and ‘data’ as binary string.
the status bytes as two byte long integer and the response data as binary string.
updateBinaryPlain
(p1, p2, data)¶Function for instruction 0xd6. Takes the parameter bytes ‘p1’, ‘p2’ as integers and ‘data’ as binary string.
the status bytes as two byte long integer and the response data as binary string.
updateRecordEncapsulated
(p1, p2, data)¶Function for instruction 0xdd. Takes the parameter bytes ‘p1’, ‘p2’ as integers and ‘data’ as binary string.
the status bytes as two byte long integer and the response data as binary string.
updateRecordPlain
(p1, p2, data)¶Function for instruction 0xdc. Takes the parameter bytes ‘p1’, ‘p2’ as integers and ‘data’ as binary string.
the status bytes as two byte long integer and the response data as binary string.
updatebinary
(*argz, **args)¶Only a template, will raise an error.
updaterecord
(*argz, **args)¶Only a template, will raise an error.
writeBinaryEncapsulated
(p1, p2, data)¶Function for instruction 0xd1. Takes the parameter bytes ‘p1’, ‘p2’ as integers and ‘data’ as binary string. Returns the status bytes as two byte long integer and the response data as binary string.
writeBinaryPlain
(p1, p2, data)¶Function for instruction 0xd0. Takes the parameter bytes ‘p1’, ‘p2’ as integers and ‘data’ as binary string.
the status bytes as two byte long integer and the response data as binary string.
writeRecord
(p1, p2, data)¶Function for instruction 0xd2. Takes the parameter bytes ‘p1’, ‘p2’ as integers and ‘data’ as binary string.
the status bytes as two byte long integer and the response data as binary string.
writebinary
(*argz, **args)¶Only a template, will raise an error.
writerecord
(*argz, **args)¶Only a template, will raise an error.
virtualsmartcard.cards.cryptoflex.
CryptoflexOS
(mf, sam, ins2handler=None, maxle=256)¶Bases: virtualsmartcard.VirtualSmartcard.Iso7816OS
SAM
¶secure access module
execute
(msg)¶Returns response to the given APDU as string of characters
msg – the APDU as string of characters
formatResult
(ins, le, data, sw)¶getATR
()¶Returns the ATR of the card as string of characters
getResponse
(p1, p2, data)¶makeATR
(**args)¶Calculate Answer to Reset (ATR) and returns the bitstring.
- directConvention (bool): Whether to use direct convention or
inverse convention.
- TAi, TBi, TCi (optional): Value between 0 and 0xff. Interface
Characters (for meaning see ISO 7816-3). Note that if no transmission protocol is given, it is automatically selected with T=max{j-1|TAj in args OR TBj in args OR TCj in args}.
- T (optional): Value between 0 and 15. Transmission Protocol.
Note that if T is set, TAi/TBi/TCi for i>T are omitted.
- histChars (optional): Bitstring with 0 <= len(histChars) <= 15.
Historical Characters T1 to T15 (for meaning see ISO 7816-4).
T0, TDi and TCK are automatically calculated.
makeThirdSoftwareFunctionTable
(commandChainging=False, extendedLe=False, assignLogicalChannel=0, maximumChannels=0)¶Returns a byte according to the third software function table from the historical bytes of the card capabilities.
mf
¶master file
powerDown
()¶Powers down the card
powerUp
()¶Powers up the card
reset
()¶Performs a warm reset of the card (no power down)
seekable
(ins)¶virtualsmartcard.cards.cryptoflex.
CryptoflexSAM
(mf=None)¶Bases: virtualsmartcard.SmartcardSAM.SAM
FSdecrypt
(data)¶Decrypt the given data, using the parameters stored in the SAM. Right now we do not encrypt the data. In memory encryption might or might not be added in a future version.
FSencrypt
(data)¶Encrypt the given data, using the parameters stored in the SAM. Right now we do not encrypt the data. In memory encryption might or might not be added in a future version.
_get_referenced_key
(p1, p2)¶This method returns the key specified by the p2 parameter. The key may be stored on the cards filesystem.
p1 – Specifies the algorithm to use.
p2 –
Specifies a reference to the key to be used for encryption.
b8 |
b7 |
b6 |
b5 |
b4 |
b3 |
b2 |
b1 |
Meaning |
---|---|---|---|---|---|---|---|---|
0 |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
No information is given |
0 |
Global reference data(e.g. MF specific key) |
|||||||
1 |
Specific reference data(e.g. DF specific key) |
|||||||
x |
x |
x |
x |
x |
Number of the secret |
Any other value RFU
change_reference_data
(p1, p2, data)¶Change the specified referenced data (e.g. CHV) of the card
erase_SE
(SEID)¶Erases a Security Environment stored under SEID from the SAM
external_authenticate
(p1, p2, data)¶Authenticate the terminal to the card. Check whether Terminal correctly encrypted the given challenge or not
generate_public_key_pair
(p1, p2, data)¶get_card_number
()¶get_challenge
(p1, p2, data)¶Generate a random number of maximum 8 Byte and return it.
internal_authenticate
(p1, p2, data)¶Authenticate card to terminal. Encrypt the challenge of the terminal to prove key posession
manage_security_environment
(p1, p2, data)¶mutual_authenticate
(p1, p2, mutual_challenge)¶Takes an encrypted challenge in the form ‘Terminal Challenge | Card Challenge | Card number’ and checks it for validity. If the challenge is successful the card encrypts ‘Card Challenge | Terminal challenge’ and returns this value
parse_SM_CAPDU
(CAPDU, header_authentication)¶Parse a command APDU protected by Secure Messaging and return the unprotected command APDU
perform_security_operation
(p1, p2, data)¶pezorform_security_operation
(p1, p2, data)¶In the cryptoflex card, this is the verify key command. A key is send to the card in plain text and compared to a key stored in the card. This is used for authentication
data – Contains the key to be verified
SW[NORMAL] in case of success otherwise SW[WARN_NOINFO63]
protect_result
(sw, unprotected_result)¶Protect a plain response APDU by Secure Messaging
restore_SE
(SEID)¶Restores a Security Environment from the SAM and replaces the current SE with it.
set_MF
(mf)¶Setter function for the internal reference to the Filesystem. The SAM needs a reference to the filesystem in order to store/retrieve keys.
set_asym_algorithm
(cipher, keytype)¶cipher – Public/private key object from used for encryption
keytype – Type of the public key (e.g. RSA, DSA)
store_SE
(SEID)¶Stores the current Security environment in the secure access module. The SEID is used as a reference to identify the SE.
verify
(p1, p2, PIN)¶Authenticate the card user. Check if he entered a valid PIN. If the PIN is invalid decrement retry counter. If retry counter equals zero, block the card until reset with correct PUK
virtualsmartcard.cards.cryptoflex.
CryptoflexSE
(MF, SAM)¶Bases: virtualsmartcard.SEutils.Security_Environment
_set_SE
(p2, data)¶Manipulate the current Security Environment. P2 is the tag of a control reference template, data contains control reference objects
compute_cryptographic_checksum
(p1, p2, data)¶Compute a cryptographic checksum (e.g. MAC) for the given data. Algorithm and key are specified in the current SE
compute_digital_signature
(p1, p2, data)¶Compute a digital signature for the given data. Algorithm and key are specified in the current SE
p1 – Must be 0x9E = Secure Messaging class for digital signatures
p2 – Must be one of 0x9A, 0xAC, 0xBC. Indicates what kind of data is included in the data field.
decipher
(p1, p2, data)¶Decipher data using key, algorithm, IV and Padding specified by the current Security environment.
raw data (no TLV coding). Padding is not removed!!!
encipher
(p1, p2, data)¶Encipher data using key, algorithm, IV and Padding specified by the current Security environment.
raw data (no TLV coding).
generate_public_key_pair
(p1, p2, data)¶In the Cryptoflex card this command only supports RSA keys.
data – Contains the public exponent used for key generation
p1 – The key number. Can be used later to refer to the generated key
p2 – Used to specify the key length. The mapping is: 0x40 => 256 Bit, 0x60 => 512 Bit, 0x80 => 1024
hash
(p1, p2, data)¶Hash the given data using the algorithm specified by the current Security environment.
raw data (no TLV coding).
manage_security_environment
(p1, p2, data)¶This method is used to store, restore or erase Security Environments or to manipulate the various parameters of the current SE. P1 specifies the operation to perform, p2 is either the SEID for the referred SE or the tag of a control reference template
p1 –
Bitmask according to this table
b8 |
b7 |
b6 |
b5 |
b4 |
b3 |
b2 |
b1 |
Meaning |
---|---|---|---|---|---|---|---|---|
1 |
Secure messaging in command data field |
|||||||
1 |
Secure messaging in response data field |
|||||||
1 |
Computation, decipherment, internal authentication and key agreement |
|||||||
1 |
Verification, encipherment, external authentication and key agreement |
|||||||
0 |
0 |
0 |
1 |
SET |
||||
1 |
1 |
1 |
1 |
0 |
0 |
1 |
0 |
STORE |
1 |
1 |
1 |
1 |
0 |
0 |
1 |
1 |
RESTORE |
1 |
1 |
1 |
1 |
0 |
1 |
0 |
0 |
ERASE |
parse_SM_CAPDU
(CAPDU, authenticate_header)¶This methods parses a data field including Secure Messaging objects. SM_header indicates whether or not the header of the message shall be authenticated. It returns an unprotected command APDU
CAPDU – The protected CAPDU to be parsed
authenticate_header – Whether or not the header should be included in authentication mechanisms
Unprotected command APDU
perform_security_operation
(p1, p2, data)¶In the end this command is nothing but a big switch for all the other commands in ISO 7816-8. It will invoke the appropriate command and return its result
protect_response
(sw, result)¶This method protects a response APDU using secure messaging mechanisms
the protected data and the SW bytes
verify_certificate
(p1, p2, data)¶Verify a certificate send by the terminal using the internal trust anchors. This method is currently not implemented.
verify_cryptographic_checksum
(p1, p2, data)¶Verify the cryptographic checksum contained in the data field. Data field must contain a cryptographic checksum (tag 0x8E) and a plain value (tag 0x80)
verify_digital_signature
(p1, p2, data)¶Verify the digital signature contained in the data field. Data must contain a data to sign (tag 0x9A, 0xAC or 0xBC) and a digital signature (0x9E)