aboutsummaryrefslogtreecommitdiffstats
path: root/pySim/ts_31_102.py
diff options
context:
space:
mode:
Diffstat (limited to 'pySim/ts_31_102.py')
-rw-r--r--pySim/ts_31_102.py131
1 files changed, 131 insertions, 0 deletions
diff --git a/pySim/ts_31_102.py b/pySim/ts_31_102.py
index e7f27b0..02b0aea 100644
--- a/pySim/ts_31_102.py
+++ b/pySim/ts_31_102.py
@@ -263,3 +263,134 @@ EF_USIM_ADF_map = {
'ePDGIdEm': '6FF5',
'ePDGSelectionEm': '6FF6',
}
+
+######################################################################
+# ADF.USIM
+######################################################################
+
+from pySim.filesystem import *
+from pySim.ts_51_011 import EF_IMSI, EF_xPLMNwAcT, EF_SPN, EF_CBMI, EF_ACC, EF_PLMNsel, EF_AD
+from pySim.ts_51_011 import EF_CBMID, EF_ECC, EF_CBMIR
+
+import pySim.ts_102_221
+
+class EF_LI(TransRecEF):
+ def __init__(self, fid='6f05', sfid=None, name='EF.LI', size={2,None}, rec_len=2,
+ desc='Language Indication'):
+ super().__init__(fid, sfid=sfid, name=name, desc=desc, size=size, rec_len=rec_len)
+ def _decode_record_bin(self, in_bin):
+ if in_bin == b'\xff\xff':
+ return None
+ else:
+ # officially this is 7-bit GSM alphabet with one padding bit in each byte
+ return in_bin.decode('ascii')
+ def _encode_record_bin(self, in_json):
+ if in_json == None:
+ return b'\xff\xff'
+ else:
+ # officially this is 7-bit GSM alphabet with one padding bit in each byte
+ return in_json.encode('ascii')
+
+class EF_Keys(TransparentEF):
+ def __init__(self, fid='6f08', sfid=0x08, name='EF.Keys', size={33,33},
+ desc='Ciphering and Integrity Keys'):
+ super().__init__(fid, sfid=sfid, name=name, desc=desc, size=size)
+ def _decode_bin(self, in_bin):
+ return {'ksi': in_bin[0],
+ 'ck': b2h(in_bin[1:17]),
+ 'ik': b2h(in_bin[17:33])}
+ def _encode_bin(self, in_json):
+ return h2b(in_json['ksi']) + h2b(in_json['ck']) + h2b(in_json['ik'])
+
+# TS 31.103 Section 4.2.7
+class EF_UST(TransparentEF):
+ def __init__(self, fid='6f38', sfid=0x04, name='EF.UST', desc='USIM Service Table'):
+ super().__init__(fid=fid, sfid=sfid, name=name, desc=desc, size={1,17})
+ # add those commands to the general commands of a TransparentEF
+ self.shell_commands += [self.AddlShellCommands()]
+ def _decode_bin(self, in_bin):
+ ret = []
+ for i in range (0, len(in_bin)):
+ byte = in_bin[i]
+ for bitno in range(0,7):
+ if byte & (1 << bitno):
+ ret.append(i * 8 + bitno + 1)
+ return ret
+ def _encode_bin(self, in_json):
+ # FIXME: size this to length of file
+ ret = bytearray(20)
+ for srv in in_json:
+ print("srv=%d"%srv)
+ srv = srv-1
+ byte_nr = srv // 8
+ # FIXME: detect if service out of range was selected
+ bit_nr = srv % 8
+ ret[byte_nr] |= (1 << bit_nr)
+ return ret
+ @with_default_category('File-Specific Commands')
+ class AddlShellCommands(CommandSet):
+ def __init__(self):
+ super().__init__()
+
+ def do_ust_service_activate(self, arg):
+ """Activate a service within EF.UST"""
+ self._cmd.card.update_ust(int(arg), 1)
+
+ def do_ust_service_deactivate(self, arg):
+ """Deactivate a service within EF.UST"""
+ self._cmd.card.update_ust(int(arg), 0)
+
+
+class ADF_USIM(CardADF):
+ def __init__(self, aid='a0000000871002', name='ADF.USIM', fid=None, sfid=None,
+ desc='USIM Application'):
+ super().__init__(aid=aid, fid=fid, sfid=sfid, name=name, desc=desc)
+ self.shell_commands = [self.ShellCommands()]
+
+ files = [
+ EF_LI(sfid=0x02),
+ EF_IMSI(sfid=0x07),
+ EF_Keys(),
+ EF_Keys('6f09', 0x09, 'EF.KeysPS', desc='Ciphering and Integrity Keys for PS domain'),
+ EF_xPLMNwAcT('6f60', 0x0a, 'EF.PLMNwAcT',
+ 'User controlled PLMN Selector with Access Technology'),
+ TransparentEF('6f31', 0x12, 'EF.HPPLMN', 'Higher Priority PLMN search period'),
+ # EF.ACMmax
+ EF_UST(),
+ CyclicEF('6f39', None, 'EF.ACM', 'Accumulated call meter', rec_len={3,3}),
+ TransparentEF('6f3e', None, 'EF.GID1', 'Group Identifier Level 1'),
+ TransparentEF('6f3f', None, 'EF.GID2', 'Group Identifier Level 2'),
+ EF_SPN(),
+ TransparentEF('6f41', None, 'EF.PUCT', 'Price per unit and currency table', size={5,5}),
+ EF_CBMI(),
+ EF_ACC(sfid=0x06),
+ EF_PLMNsel('6f7b', 0x0d, 'EF.FPLMN', 'Forbidden PLMNs', size={12,None}),
+ TransparentEF('6f7e', 0x0b, 'EF.LOCI', 'Locationn information', size={11,11}),
+ EF_AD(sfid=0x03),
+ EF_CBMID(sfid=0x0e),
+ EF_ECC(sfid=0x01),
+ EF_CBMIR(),
+ ]
+ self.add_files(files)
+
+ def decode_select_response(self, data_hex):
+ return pySim.ts_102_221.decode_select_response(data_hex)
+
+ @with_default_category('File-Specific Commands')
+ class ShellCommands(CommandSet):
+ def __init__(self):
+ super().__init__()
+
+
+# TS 31.102 Section 7.3
+sw_usim = {
+ 'Security management': {
+ '9862': 'Authentication error, incorrect MAC',
+ '9864': 'Authentication error, security context not supported',
+ '9865': 'Key freshness failure',
+ '9866': 'Authentication error, no memory space available',
+ '9867': 'Authentication error, no memory space available in EF MUK',
+ }
+}
+
+CardApplicationUSIM = CardApplication('USIM', adf=ADF_USIM(), sw=sw_usim)