aboutsummaryrefslogtreecommitdiffstats
path: root/scripts/deactivate-ims.script
blob: e5029da467cddd4b10e2a721ea26e47ad644aa8b (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
# script to be used with pySim-shell.py which is part of the Osmocom pysim package,
# found at https://osmocom.org/projects/pysim/wiki
set echo true

# this script will deactivate all IMS related services and files.  This can be used
# in case you do not wish to use any IMS services, or you do not wish to configure
# the IMS specific files on the USIM/ISIM cards.  The card will then behave like a 3G USIM
# without any IMS capability, using the default fall-back mechanisms specified by 3GPP.

# TODO: add your card-specific ADM pin at the end of the verify_adm line below
verify_adm

# deactivate any IMS related services in EF.UST
select ADF.USIM
select EF.UST
ust_service_deactivate 93
ust_service_deactivate 95
ust_service_deactivate 104
ust_service_deactivate 105
ust_service_deactivate 106
ust_service_deactivate 107
ust_service_deactivate 108
ust_service_deactivate 109
ust_service_deactivate 110
ust_service_deactivate 112
ust_service_deactivate 114
ust_service_deactivate 115
ust_service_deactivate 118
ust_service_deactivate 120
ust_service_deactivate 131
ust_service_deactivate 134

# deactivate all IMS related files in ADF.USIM
select ADF.USIM

select EF.UICCIARI
deactivate_file

select EF.ePDGId
deactivate_file

select EF.ePDGSelection
deactivate_file

select EF.ePDGIdEm
deactivate_file

select EF.ePDGSelectionEm
deactivate_file

select EF.FromPreferred
deactivate_file

select EF.IMSConfigData
deactivate_file

select EF.3GPPPSDATAOFF
deactivate_file

select EF.3GPPPSDATAOFFservicelist
deactivate_file

select EF.XCAPConfigData
deactivate_file

select EF.MuDMiDConfigData
deactivate_file

echo "Please make sure to manually disable the ISIM applet as described in the end of the script"
# you can currently only manually do this via GlobalPlatformPro or some other tool using
# java -jar ./gp.jar --key-enc KIC1 --key-mac KID1 --key-dek KIK1 --lock-applet A0000000871004FFFFFFFF8907090000
# (substituting KIC1/KID1/KIK1 with the card-specific keys, of course)

quit