AusweisApp
|
Implementation of GeneralAuthenticate response APDUs. Mehr ...
Namensbereiche | |
namespace | pcsc |
namespace | privacy |
Typdefinitionen | |
using | GA_ENCRYPTEDNONCEDATA |
According to TR-03110-3 the ASN.1 the response APDU has one protocol specific data: | |
using | GA_MAPNONCEDATA |
According to TR-03110-3 the ASN.1 the response APDU has one protocol specific data: | |
using | GA_PERFORMKEYAGREEMENTDATA |
According to TR-03110-3 the ASN.1 the response APDU has one protocol specific data: | |
using | GA_MUTUALAUTHENTICATIONDATA |
According to TR-03110-3 the ASN.1 the response APDU has three protocol specific data: | |
using | GA_CHIPAUTHENTICATIONDATA |
According to TR-03110-3 the ASN.1 the response APDU has three protocol specific data: | |
using | ApplicationTemplate |
using | ApplicationTemplatesInternal = STACK_OF(ApplicationTemplate) |
EF.DIR = ApplicationTemplates ::= SET OF ApplicationTemplate. | |
using | CommunityID = ASN1_OCTET_STRING |
using | ValidityDate = ASN1_OCTET_STRING |
using | AgeVerificationDate = ASN1_STRING |
using | AuxDataTemplate |
using | AuthenticatedAuxiliaryDataInternal = STACK_OF(AuxDataTemplate) |
using | CHAT |
According to. | |
using | CVCertificate |
using | CVCertificateBody |
using | EcdsaPublicKey |
According to TR-03110-3 chapter D elliptic curve public keys are defined as follows: | |
using | securityinfos_st = struct stack_st_securityinfo_st |
using | EFCardAccess = SecurityInfos |
EFCardAccess ::= SecurityInfos. | |
using | Origin = GlobalStatus::Origin |
Aufzählungen | |
enum class | KeyAgreementStatus { SUCCESS , RETRY_ALLOWED , COMMUNICATION_ERROR , FAILED , PROTOCOL_ERROR } |
Implementation of GeneralAuthenticate response APDUs.
Loads the tcTokenUrl for triggering the self authentication from secure storage.
Parses self authentication data from JSON data and provides its content.
Controller for the self authentication process.
Self authentication context.
State that retrieves the Smart-eID TcTokenURL from the Secure Storage.
State that checks if the Smart-eID function is given.
Controller for the initialising a smartie.
This state executes the remote message IfdModifyPin.
Controller for the remote service process.
Remote service context.
State machine state: Start PAOS.
Implements the parsing of TcTokenUrl in header of browser request.
This state waits for editing of the effective CHAT.
Performs clean up of the ReaderManager, e.g.
Helper state to decide whether an error has been occurred that should be reported to the user.
Checks whether the hashes of the certificates encountered so far (i.e.
Builder for states.
Template base class for all steps taken by the state machine.
A final state which blocks the state machine before termination.
Composite state for selecting a card.
Parser for the PAOS Transmit element.
Transmit objects hold a transmit request and provide access to the transmitted data via member functions.
Class represents the retrieved PAOS StartPaosResponse.
Base class for PAOS message parsers.
Class to parse InitializeFramework from server.
Parse information for DidAuthenticateEacAdditional.
Class to hold information of DIDAuthenticateEACAdditional.
Parse information for DidAuthenticateEac2.
Class represents the retrieved PAOS EAC2InputType.
Parser for the PAOS DidAuthenticateEac1 element.
Class represents the retrieved PAOS EAC1InputType.
Represents a PAOS response type according to ISOCommon.xsd.
Represents a PAOS request type according to ISOCommon.xsd.
All possible paos types.
Generic Handler to detect and parse paos types.
Generate information for TransmitResponse.
Base class to create a PaosMessage.
Generate information for InitializeFrameworkResponse.
Generate information for DIDAuthenticateResponseEAC2.
Generate information for DIDAuthenticateResponseEAC1.
Example class.
XML element for "SupportedAPI".
Store information of Eac1InputType.
Parse an XML connection handle from given stream.
Object hold the paos connection handle.
Controller for the PIN changing process.
Controller for the authentication process.
Workflow context.
Context for changing the Pin.
Contains the definition of the CertificateChecker class.
UiPlugin implementation of the Websocket.
Model implementation for the settings.
Model implementation for checking the ID card in "playground".
Description of recommended card position.
Enumerations of message types and additional stuff.
Generic class for Workflows.
MsgHandlerUnknownCommand of JSON API.
Message ReaderList of JSON API.
Message Reader of JSON API.
Message PAUSE of JSON API.
Message Log of JSON API.
Message Invalid of JSON API.
Message INTERNAL_ERROR of JSON API.
Message InsertCard of JSON API.
Message Info of JSON API.
Message EnterPuk of JSON API.
Message EnterPin of JSON API.
Helper handler for EnterCan, EnterPin and EnterPuk of JSON API.
Message EnterNewPin of JSON API.
Message EnterCan of JSON API.
Message Change PIN of JSON API.
Message handler for GET_CERTIFICATE of JSON API.
Message BadState of JSON API.
Message Auth of JSON API.
Message API_LEVEL of JSON API.
Message MsgHandlerAccessRights of JSON API.
Base of all messages of JSON API.
Context of JSON API.
Msg wrapper of JSON API.
UiPlugin implementation of the integrated SDK (C-API).
Abstract layer to UI implementations.
UiPlugin implementation of the AIDL UI.
Update data implementation for application version.
Helper to check certificates and other security stuff of TLS/SSL.
A simple template renderer.
Sends a status request to given url:port and tries to detect details and server header.
Provide a HTTP server.
Class to create http response.
Provides an UDP socket to send and receive datagrams.
Component advertising the smartphone as card reader (SaC) functionality on the server side.
Remote Ifd server service to offer smartphones as card readers (SaCs).
Implementation of LocalWebSocketServer interface.
Extension of WebSocketServer interface for local PSK connections.
Local Ifd server service to offer SaC to localhost websocket connections.
WebSocketServer on the server side of a smartphone as card reader (SaC) scenario.
Implementation of DataChannel base on web sockets.
QTcpServer with necessary TLS handling of remote device configuration.
Handler for messages on the server side of a smartphone as card reader (SaC) scenario.
Ifd server service to offer smartphones as card readers (SaCs).
Implementation of Reader for smartphone as card reader (SaC).
Interface for IfdList.
Class that dispatches incoming and outgoing ifd messages.
An interface for Ifd dispatchers, meant to omit the dependency between card_base and ifd.
Information needed to display a remote device in the GUI and to open a websocket connection to it.
Module that creates and manages connections from a remote client to a remote server.
An interface for IfdClients, meant to omit the dependency between card_base and ifd.
Implementation of Card for smartphone as card reader (SaC).
Interface modelling a component that can send and receive data blocks in the form of QByteArray objects.
Extension to QVersionNumber.
A global mapping for errors.
Template functions that allow to map and filter over QLists.
Status class that tracks reasons for aborting a Workflow.
Implements a wrapper for different APIs to get device information like android device name.
Global error code definitions.
Class that holds a table of the UpdatableFile instances currently in use.
Generic class that allows to download files from a server to the local application cache.
Controller for retrieving and presenting diagnosis info.
Contains information collected by the diagnosis functionality.
Handles updating information about the App release.
Provides information about the App release.
Class to provide information about available card readers.
Class to store configuration data about available card readers.
Parser for provider configuration files.
Class to provide information about providers.
Provides information of provider json.
Phone call cost representation.
Implementation of ReaderManagerPlugin for Smart-eID card.
Wrapper for calls to eID applet interface.
Implementation of Smart-eID card.
Implementation of Reader for PCSC.
Implementation of card object for PC/SC *.
Implementation of ReaderManagerPlugin for NFC on Android.
Implementation of Reader for NFC.
Implementation of Card for NFC.
Interface specifying classes that can detect the attached card reader devices on a specific platform.
Worker implementation of ReaderManger thread.
Data object providing information about a reader manager plug-in.
Plugin to control different kinds of reader managers that will be used in ReaderManager.
A configured filter used to retrieve readers.
Functions to read and write PCSC messages with a length-value encoding.
Data object for output of card command EstablishPaceChannel.
Data object for creation of card command DestroyPACEChannel.
Symmetric decryption method used for PACE.
Implements TR-03110 v2 part3 --> Secure Messaging.
Creates key according to TR 03110 Part 3 chapters A.2.3 ff.
the key agreement protocol use in PACE.
EstablishPaceChannel error code definitions.
Elliptic curve utility.
CMAC implementation to be used in PACE protocol.
Holds the data of an InputAPDUInfo element.
Reference information for files on smart cards.
Execute function on ReaderManager-Thread.
Contains the CardInfo and the CardInfoFactory.
Worker for CardConnection that will do the job in ReaderManagerWorker.
Class representing a smart card.
Implementation of SecurityInfos.
Implementation of SecurityInfo.
Implementation of MobileEIDTypeInfo.
Implementation of EFCardSecurity.
Builder for CVC chains.
A CV certificate chain is an ordered list, where the CV certificates are ordered by the holder to authority reference relation (The holder is equivalent to the Subject-DN, the authority reference is equivalent to the Issuer-DN.)
Implementation of Card Verifiable Certificate, CVC.
Implementation of ChipAuthenticationInfo.
Implementation of Certificate Holder Authorization Template, CHAT.
Generic implementation for chain building, i.e.
Implementation of ASN.1 type CertificateDescription with OpenSSL.
Utility functions, templates and other ASN.1 related helper stuff.
Utility template functions for encoding and decoding of ASN.1 types.
Implementation of the ISO 7816 EF.DIR data structure (set of application template)
Implementation of ISO 7816 application template.
Defines the AccessRight and AccessRole enum.
ASN.1 types for SecureMessaging.
Response APDU for SecureMessaging.
APDU for SecureMessaging.
Copyright (c) 2014-2024 Governikus GmbH & Co. KG, Germany
Copyright (c) 2015-2024 Governikus GmbH & Co. KG, Germany
Copyright (c) 2022-2024 Governikus GmbH & Co. KG, Germany
Copyright (c) 2021-2024 Governikus GmbH & Co. KG, Germany
Copyright (c) 2014-2024 Governikus GmbH & Co. KG, Germany
Note: When using a QHash<AccessRight,...> directly or indirectly (e.g. via QSet), this header must be included before <QHash> (also indirectly via <QSet> or <QList>), or otherwise they complain about the qHash() function for AccessRight not being found.
Copyright (c) 2015-2024 Governikus GmbH & Co. KG, Germany
building ordered lists. The ChainBuilder is initialized with a pool of objects and a (pointer to a) function that decides if two objects have a parent child relation. Duplicates are filtered out.
All found chains are returned by the function /ref ChainBuilder::getChains().
Copyright (c) 2014-2024 Governikus GmbH & Co. KG, Germany
See TR 03110.
Copyright (c) 2017-2024 Governikus GmbH & Co. KG, Germany
Copyright (c) 2014-2024 Governikus GmbH & Co. KG, Germany
For details see TR 03110.
Copyright (c) 2014-2024 Governikus GmbH & Co. KG, Germany
If you implement a class of this Plugin you need to register it in ReaderManager, otherwise it won't be used.
Copyright (c) 2016-2024 Governikus GmbH & Co. KG, Germany
Copyright (c) 2020-2024 Governikus GmbH & Co. KG, Germany
Copyright (c) 2018-2024 Governikus GmbH & Co. KG, Germany
Copyright (c) 2017-2024 Governikus GmbH & Co. KG, Germany
This class controls the advertising over UDP as well as the Websocket connection management.
Copyright (c) 2024 Governikus GmbH & Co. KG, Germany
Copyright (c) 2017-2024 Governikus GmbH & Co. KG, Germany
According to the concept this is done by sending the message REMOTE_READER_OFFER as a UDP broadcast.
Copyright (c) 2019-2024 Governikus GmbH & Co. KG, Germany
Copyright (c) 2014-2024 Governikus GmbH & Co. KG, Germany
See TR-03112-7.
Copyright (c) 2014-2024 Governikus GmbH & Co. KG, Germany
It is parameterized over the context type and contains a getter for the context. We cannot parameterize the super class AbstractState because Qt does not support template classes.
Copyright (c) 2014-2024 Governikus GmbH & Co. KG, Germany
those stored in the AuthContext) are in the CertificateDescription extension of the eService certificate.
Copyright (c) 2016-2024 Governikus GmbH & Co. KG, Germany
disconnects all readers, clears the card connection, ...
Copyright (c) 2023-2024 Governikus GmbH & Co. KG, Germany
ApplicationTemplate ::= SET { applicationIdentifier OBJECT IDENTIFIER, applicationLabel PrintableString OPTIONAL, fileReference OCTET STRING OPTIONAL, commandApdu OCTET STRING OPTIONAL, discretionaryData OCTET STRING OPTIONAL, discretionaryTemplate OCTET STRING OPTIONAL, uniformResourceLocator OCTET STRING OPTIONAL, applicationRelatedDataObjects ANY DEFINED BY applicationIdentifier OPTIONAL }
derived from the description in 7816-4:2005 8.2.1
EF.DIR = ApplicationTemplates ::= SET OF ApplicationTemplate.
defined in ISO 7816-4:2005 8.2.1.1
Defined in TR-03110-3, chapter D.2:
AuthenticatedAuxiliaryData ::= [APPLICATION 0x07] IMPLICIT SET OF AuxDataTemplate
AuxDataTemplate ::= [APPLICATION 0x13] IMPLICIT SEQUENCE { auxID OBJECT IDENTIFIER, extInfo ANY DEFINED BY auxID }
CommunityID ::= [APPLICATION 0x13] IMPLICIT OCTETSTRING
ValidityDate ::= [APPLICATION 0x13] IMPLICIT Date
AgeVerificationDate ::= [APPLICATION 0x13] IMPLICIT Date
Date ::= NumericString (SIZE (8)) – YYYYMMDD
According to.
Chat ::= APPLICATION [0x4C] IMPLICIT SEQUENCE { type OBJECT IDENTIFIER, template DiscretionaryData }
DiscretionaryData ::= APPLICATION [0x13] IMPLICIT OCTET STRING SIZE(5)
where the DiscretionaryData bits have the following meaning: 39 38 37 ... 32 31 30 29 ... 8 7 6 5 4 3 2 1 0 Description x x - - - - - - - - - - - - - - - - Role 1 1 - - - - - - - - - - - - - - - - CVCA 1 0 - - - - - - - - - - - - - - - - DV (official domestic) 0 1 - - - - - - - - - - - - - - - - DV (non-official / foreign) 0 0 - - - - - - - - - - - - - - - - Authentication Terminal
governikus::CommunityID = ASN1_OCTET_STRING |
According to TR-03110-3 chapter D elliptic curve public keys are defined as follows:
EcdsaPublicKey ::= [APPLICATION 0x49] IMPLICIT SEQUENCE { ObjectIdentifier OBJECT IDENTIFIER, PrimeModulus [0x01] IMPLICIT UnsignedInteger OPTIONAL FirstCoefficient [0x02] IMPLICIT UnsignedInteger OPTIONAL SecondCoefficient [0x03] IMPLICIT UnsignedInteger OPTIONAL BasePoint [0x04] IMPLICIT UncompressedEllipticCurvePoint OPTIONAL OrderOfTheBasePoint [0x05] IMPLICIT UnsignedInteger OPTIONAL PublicPoint [0x06] IMPLICIT UncompressedEllipticCurvePoint Cofactor [0x07] IMPLICIT UnsignedInteger OPTIONAL }
UncompressedEllipticCurvePoint ::= OCTET STRING – see TR-03111
UnsignedInteger – see TR-03110 D.2.1.1
EFCardAccess ::= SecurityInfos.
defined in TR 3110 Part 3
According to TR-03110-3 the ASN.1 the response APDU has three protocol specific data:
Nonce ::= APPLICATION [0x01] IMPLICIT OCTET_STRING AuthenticationToken ::= APPLICATION [0x02] IMPLICIT OCTET_STRING
According to TR-03110-3 the ASN.1 the response APDU has one protocol specific data:
EncryptedNonce ::= APPLICATION [0x00] IMPLICIT OCTET_STRING
According to TR-03110-3 the ASN.1 the response APDU has one protocol specific data:
MappingData ::= APPLICATION [0x02] IMPLICIT OCTET_STRING
According to TR-03110-3 the ASN.1 the response APDU has three protocol specific data:
AuthenticationToken ::= APPLICATION [0x00] IMPLICIT OCTET_STRING CarCurr ::= APPLICATION [0x00] IMPLICIT OCTET_STRING OPTIONAL CarPrev ::= APPLICATION [0x00] IMPLICIT OCTET_STRING OPTIONAL
According to TR-03110-3 the ASN.1 the response APDU has one protocol specific data:
EphemeralPublicKey ::= APPLICATION [0x04] IMPLICIT OCTET_STRING
using governikus::ValidityDate = ASN1_OCTET_STRING |
AusweisApp2Callback governikus::ausweisapp2_get_callback_internal | ( | ) |
void governikus::ausweisapp2_init_internal | ( | const QByteArray & | pCmdline | ) |
bool governikus::ausweisapp2_is_running_internal | ( | ) |
void governikus::ausweisapp2_join_thread_internal | ( | ) |
void governikus::ausweisapp2_started_internal | ( | ) |
DatagramHandler * governikus::createNewObject< DatagramHandler * > | ( | ) |
DatagramHandler * governikus::createNewObject< DatagramHandler *, bool > | ( | bool && | pEnableListening | ) |
IfdConnector * governikus::createNewObject< IfdConnector * > | ( | ) |
IfdDispatcherClient * governikus::createNewObject< IfdDispatcherClient *, IfdVersion::Version &&, const QSharedPointer< DataChannel > & > | ( | IfdVersion::Version && | pVersion, |
const QSharedPointer< DataChannel > & | pChannel ) |
IfdDispatcherServer * governikus::createNewObject< IfdDispatcherServer *, const QSharedPointer< DataChannel > & > | ( | const QSharedPointer< DataChannel > & | pChannel | ) |
IfdList * governikus::createNewObject< IfdList * > | ( | ) |
IfdList * governikus::createNewObject< IfdList *, int, int > | ( | int && | pCheckInterval, |
int && | pTimeout ) |
LocalWebSocketServer * governikus::createNewObject< LocalWebSocketServer * > | ( | ) |
RemoteReaderAdvertiser * governikus::createNewObject< RemoteReaderAdvertiser *, const QString &, const QString &, quint16 &, bool & > | ( | const QString & | pIfdName, |
const QString & | pIfdId, | ||
quint16 & | pPort, | ||
bool & | pIsPairing ) |
RemoteWebSocketServer * governikus::createNewObject< RemoteWebSocketServer * > | ( | ) |
Default template function for decoding an OpenSSL type.
This must be specialized for each ASN.1 type.
QSharedPointer< T > governikus::decodeObject | ( | const QByteArray & | pData, |
bool | pLogging = true ) |
Template function for decoding an OpenSSL type from DER encoded QByteArray.
governikus::defineEnumType | ( | CertificateType | , |
UNKNOWN | , | ||
PRODUCTION | , | ||
DEVELOPER | ) |
governikus::defineEnumType | ( | FeatureID | , |
VERIFY_PIN_START | = 0x1, | ||
VERIFY_PIN_FINISH | = 0x2, | ||
MODIFY_PIN_START | = 0x3, | ||
MODIFY_PIN_FINISH | = 0x4, | ||
GET_KEY_PRESSED | = 0x5, | ||
VERIFY_PIN_DIRECT | = 0x6, | ||
MODIFY_PIN_DIRECT | = 0x7, | ||
MCT_READERDIRECT | = 0x8, | ||
MCT_UNIVERSAL | = 0x9, | ||
IFD_PIN_PROP | = 0xA, | ||
ABORT | = 0xB, | ||
SET_SPE_MESSAGE | = 0x0C, | ||
VERIFY_PIN_DIRECT_APP_ID | = 0x0D, | ||
MODIFY_PIN_DIRECT_APP_ID | = 0x0E, | ||
WRITE_DISPLAY | = 0x0F, | ||
GET_KEY | = 0x10, | ||
IFD_DISPLAY_PROPERTIES | = 0x11, | ||
TLV_PROPERTIES | = 0x12, | ||
CCID_ESC_COMMAND | = 0x13, | ||
EXECUTE_PACE | = 0x20 ) |
Check with contains first for existence of the feature, otherwise this will cause an exception.
governikus::defineEnumType | ( | IfdMessageType | , |
IFDEstablishContext | , | ||
IFDEstablishContextResponse | , | ||
IFDGetStatus | , | ||
IFDStatus | , | ||
IFDConnect | , | ||
IFDConnectResponse | , | ||
IFDDisconnect | , | ||
IFDDisconnectResponse | , | ||
IFDError | , | ||
IFDTransmit | , | ||
IFDTransmitResponse | , | ||
IFDEstablishPACEChannel | , | ||
IFDEstablishPACEChannelResponse | , | ||
IFDDestroyPACEChannel | , | ||
IFDDestroyPACEChannelResponse | , | ||
IFDModifyPIN | , | ||
IFDModifyPINResponse | , | ||
UNDEFINED | ) |
governikus::defineEnumType | ( | SelfAuthDataPermission | , |
UNKNOWN | , | ||
ALLOWED | , | ||
PROHIBITED | , | ||
NOTONCHIP | ) |
ECDH AES_256_CBC governikus::defineEnumType | ( | SignatureType | , |
UNDEFINED | , | ||
RSA | , | ||
ECDSA | ) |
governikus::defineEnumType | ( | StatusFormat | , |
PLAIN | , | ||
JSON | ) |
governikus::defineEnumType | ( | UrlQueryRequest | , |
UNKNOWN | , | ||
SHOWUI | , | ||
STATUS | , | ||
TCTOKENURL | ) |
Utility class for checking various constraints on URLs.
Determines the URL origin, i.e. the protocol, host name and port part of the full URL.
Checks whether the same origin policy is satisfied for the two specified URL.
governikus::defineEnumType | ( | WorkflowControl | , |
UNHANDLED | , | ||
SKIP | , | ||
ENQUEUE | ) |
governikus::defineEnumTypeQmlExposed | ( | CardReturnCode | , |
UNDEFINED | , | ||
OK | , | ||
OK_PUK | , | ||
OK_CAN | , | ||
RESPONSE_EMPTY | , | ||
CARD_NOT_FOUND | , | ||
UNKNOWN | , | ||
INPUT_TIME_OUT | , | ||
INVALID_CAN | , | ||
INVALID_PASSWORD | , | ||
INVALID_PIN | , | ||
INVALID_PIN_2 | , | ||
INVALID_PIN_3 | , | ||
INVALID_PUK | , | ||
COMMAND_FAILED | , | ||
CANCELLATION_BY_USER | , | ||
NEW_PIN_MISMATCH | , | ||
NEW_PIN_INVALID_LENGTH | , | ||
PIN_BLOCKED | , | ||
PIN_NOT_BLOCKED | , | ||
PUK_INOPERATIVE | , | ||
PROTOCOL_ERROR | , | ||
WRONG_LENGTH | , | ||
UNEXPECTED_TRANSMIT_STATUS | ) |
governikus::defineEnumTypeQmlExposed | ( | ReaderManagerPluginType | , |
UNKNOWN | , | ||
MOCK | , | ||
PCSC | , | ||
NFC | , | ||
REMOTE_IFD | , | ||
LOCAL_IFD | , | ||
SMART | , | ||
SIMULATOR | ) |
Is the interface / daemon process etc. enabled?
Is there a device/interface?
governikus::defineTypedEnumType | ( | AccessRight | , |
uint | , | ||
WRITE_DG17 | = 37, | ||
WRITE_DG18 | = 36, | ||
WRITE_DG19 | = 35, | ||
WRITE_DG20 | = 34, | ||
WRITE_DG21 | = 33, | ||
WRITE_DG22 | = 32, | ||
RFU | = 31, | ||
PSA | = 30, | ||
READ_DG22 | = 29, | ||
READ_DG21 | = 28, | ||
READ_DG20 | = 27, | ||
READ_DG19 | = 26, | ||
READ_DG18 | = 25, | ||
READ_DG17 | = 24, | ||
READ_DG16 | = 23, | ||
READ_DG15 | = 22, | ||
READ_DG14 | = 21, | ||
READ_DG13 | = 20, | ||
READ_DG12 | = 19, | ||
READ_DG11 | = 18, | ||
READ_DG10 | = 17, | ||
READ_DG09 | = 16, | ||
READ_DG08 | = 15, | ||
READ_DG07 | = 14, | ||
READ_DG06 | = 13, | ||
READ_DG05 | = 12, | ||
READ_DG04 | = 11, | ||
READ_DG03 | = 10, | ||
READ_DG02 | = 9, | ||
READ_DG01 | = 8, | ||
INSTALL_QUAL_CERT | = 7, | ||
INSTALL_CERT | = 6, | ||
PIN_MANAGEMENT | = 5, | ||
CAN_ALLOWED | = 4, | ||
PRIVILEGED_TERMINAL | = 3, | ||
RESTRICTED_IDENTIFICATION | = 2, | ||
COMMUNITY_ID_VERIFICATION | = 1, | ||
AGE_VERIFICATION | = 0 ) |
governikus::defineTypedEnumType | ( | Ins | , |
uchar | , | ||
UNKNOWN | = 0x00, | ||
DEACTIVATE | = 0x04, | ||
VERIFY | = 0x20, | ||
MSE_SET | = 0x22, | ||
ACTIVATE | = 0x44, | ||
EXTERNAL_AUTHENTICATE | = 0x82, | ||
GET_CHALLENGE | = 0x84, | ||
GENERAL_AUTHENTICATE | = 0x86, | ||
PSO_VERIFY | = 0x2A, | ||
PSO_COMPUTE | = 0x2B, | ||
RESET_RETRY_COUNTER | = 0x2C, | ||
SELECT | = 0xA4, | ||
READ_BINARY | = 0xB0, | ||
GET_RESPONSE | = 0xC0, | ||
UPDATE_BINARY | = 0xD6 ) |
QString governikus::dequeueReceivedParameter | ( | ) |
Default template function for encoding an OpenSSL type.
This must be specialized for each ASN.1 type.
QByteArray governikus::encodeObject | ( | T * | pObject | ) |
Template function for encoding an OpenSSL type as DER encoded QByteArray.
std::enable_if_t<!std::is_void_v< T >, QList< T > > governikus::filter | ( | const std::function< bool(const T &)> & | pFunc, |
const QList< T > & | pItems ) |
Default template function for freeing an OpenSSL type.
This must be specialized for each ASN.1 type.
QString governikus::generateMailBody | ( | const GlobalStatus & | pStatus, |
const QUrl & | pServiceUrl, | ||
bool | pPercentEncoding, | ||
bool | pAddLogNotice ) |
|
inline |
QByteArray governikus::getOpenSslError | ( | ) |
Copyright (c) 2018-2024 Governikus GmbH & Co. KG, Germany
void governikus::initMock | ( | ) |
std::enable_if_t<!std::is_void_v< T >, QList< T > > governikus::map | ( | const std::function< T(const S &)> & | pFunc, |
const QList< S > & | pItems ) |
Default template function for creating an OpenSSL type.
This must be specialized for each ASN.1 type.
QSharedPointer< T > governikus::newObject | ( | T * | pObject = newAsn1Object<T>() | ) |
Template function for creating a SharedPointer holding an ASN.1 OpenSSL type.
|
inline |
|
inline |
|
inline |
|
inline |
QDebug governikus::operator<< | ( | QDebug | pDbg, |
const ASN1Struct & | pASN1Struct ) |
QDebug governikus::operator<< | ( | QDebug | pDbg, |
const CardInfo & | pCardInfo ) |
|
inline |
|
inline |
|
inline |
|
inline |
|
inline |
|
inline |
|
inline |
|
inline |
QDebug governikus::operator<< | ( | QDebug | pDbg, |
const Oid & | pOid ) |
|
inline |
|
inline |
|
inline |
|
inline |
|
inline |
|
inline |
|
inline |
|
inline |
|
inline |
|
inline |
|
inline |
|
inline |
|
inline |
|
inline |
|
inline |
|
inline |
|
inline |
|
inline |
|
inline |
QObject * governikus::registerSingletonModel | ( | QObject * | pModel | ) |
void governikus::setApduCommandResult | ( | const GenericDataResult & | pResult | ) |
void governikus::setDeletePersonalizationResult | ( | EidServiceResult | pResult | ) |
void governikus::setDeleteSmartEidResult | ( | EidServiceResult | pResult | ) |
void governikus::setInitializePersonalizationResult | ( | const InitializeResult & | pResult | ) |
void governikus::setInstallSmartEidResult | ( | EidServiceResult | pResult | ) |
void governikus::setPersonalizationResult | ( | const GenericDataResult & | pResult | ) |
void governikus::setServiceInformation | ( | const ServiceInformationResult & | pResult | ) |
void governikus::setSmartEidSupportStatus | ( | EidSupportStatus | pStatus | ) |
void governikus::setSmartEidSupportStatusResult | ( | EidSupportStatusResult | pStatus | ) |
void governikus::shutdownApp | ( | ) |
char * governikus::toString | ( | const CommandApdu & | pCommandApdu | ) |
char * governikus::toString | ( | const ResponseApdu & | pResponseApdu | ) |
governikus::AcademicTitle |
governikus::ACCESS_RIGHTS |
governikus::Address = TYPE(AccessRight::READ_DG17) |
governikus::AddressVerification = TYPE(AccessRight::COMMUNITY_ID_VERIFICATION) |
ECDH governikus::AES_128_CBC |
ECDH governikus::AES_192_CBC |
governikus::AgeVerification = TYPE(AccessRight::AGE_VERIFICATION) |
governikus::API_LEVEL |
governikus::ArtisticName = TYPE(AccessRight::READ_DG06) |
governikus::AUTH |
governikus::BAD_STATE |
governikus::BirthName = TYPE(AccessRight::READ_DG13) |
governikus::CanAllowed = TYPE(AccessRight::CAN_ALLOWED) |
governikus::CERTIFICATE |
governikus::CHANGE_PIN |
governikus::char |
governikus::CLASS_NOT_SUPPORTED = 0x6E |
governikus::DateOfBirth = TYPE(AccessRight::READ_DG08) |
governikus::DateOfExpiry |
ECDH governikus::DES3_CBC |
governikus::DH |
governikus::DoctoralDegree = TYPE(AccessRight::READ_DG07) |
governikus::DocumentType = TYPE(AccessRight::READ_DG01) |
governikus::ENTER_CAN |
governikus::ENTER_NEW_PIN |
governikus::ENTER_PIN |
governikus::ENTER_PUK |
governikus::ERROR_COMMAND_NOT_ALLOWED = 0x69 |
governikus::FamilyName = TYPE(AccessRight::READ_DG05) |
governikus::FamilyNames |
governikus::FUNCTIONS_IN_CLASS_NOT_SUPPORTED = 0x68 |
governikus::GivenNames = TYPE(AccessRight::READ_DG04) |
governikus::INFO |
governikus::INSERT_CARD |
governikus::INSTRUCTION_CODE_INVALID = 0x6D |
governikus::INTERNAL_ERROR |
governikus::INVALID |
governikus::IssuingCountry = TYPE(AccessRight::READ_DG02) |
governikus::IssuingState |
governikus::LOG |
governikus::MORE_DATA_AVAILABLE = 0x61 |
governikus::Nationality = TYPE(AccessRight::READ_DG10) |
governikus::NO_PRECISE_DIAGNOSIS = 0x6F |
governikus::NONVOLATILE_MEMORY_CHANGED_1 = 0x63 |
governikus::NONVOLATILE_MEMORY_CHANGED_2 = 0x65 |
governikus::NONVOLATILE_MEMORY_UNCHANGED_1 = 0x62 |
governikus::NONVOLATILE_MEMORY_UNCHANGED_2 = 0x64 |
governikus::PACE_CAN = 0x02 |
governikus::PACE_MRZ = 0x01 |
governikus::PACE_PIN = 0x03 |
governikus::PERSONALIZATION |
governikus::PinManagement |
governikus::PlaceOfBirth = TYPE(AccessRight::READ_DG09) |
governikus::PlaceOfResidence |
governikus::PlaceOfResidenceCity |
governikus::PlaceOfResidenceCountry |
governikus::PlaceOfResidenceStreet |
governikus::PlaceOfResidenceZipCode |
governikus::PlaceVerification |
governikus::Pseudonym = TYPE(AccessRight::RESTRICTED_IDENTIFICATION) |
governikus::quint8 |
governikus::READER |
governikus::READER_LIST |
governikus::ResidencePermitI = TYPE(AccessRight::READ_DG19) |
governikus::ResidencePermitII = TYPE(AccessRight::READ_DG20) |
governikus::RestrictedID |
governikus::SECURITY_ISSUE = 0x66 |
governikus::STATUS |
governikus::SUCCESS |
ECDH governikus::UNDEFINED |
governikus::UNKNOWN = 0x00 |
governikus::UNKNOWN_COMMAND |
governikus::ValidUntil = TYPE(AccessRight::READ_DG03) |
governikus::VOID |
governikus::WriteAddress = TYPE(AccessRight::WRITE_DG17) |
governikus::WriteCommunityID = TYPE(AccessRight::WRITE_DG18) |
governikus::WriteResidencePermitI = TYPE(AccessRight::WRITE_DG19) |
governikus::WriteResidencePermitII = TYPE(AccessRight::WRITE_DG20) |
governikus::WRONG_LE_FIELD = 0x6C |
governikus::WRONG_LENGTH = 0x67 |
governikus::WRONG_PARAMETERS_P1_P2 = 0x6A |
governikus::WRONG_PARAMETERS_P1_P2_NO_INFO = 0x6B |