GPD_SPE_013 Table 6-3 defines two types of AID-REF-DO objects (both are fully independed TLV IEs with the same name). The version with tag '4F' identifies an SE application. It may contain an AID prefix or even be of length 0 in case the rule should apply to all SE applications. Then there is the version with tag 'C0', which must always have length 0 and serves a flag to apply the rule to the implicitly selected SE application. Technically both are completely different things, so we must also treat them separately in the pySim-shell code. Related: OS#6681 Change-Id: I771d5e860b12215280e3d0a8c314ce843fe0d6a2
21 lines
1.4 KiB
Plaintext
21 lines
1.4 KiB
Plaintext
################################################################################
|
|
# MF/ADF.ARA-M #
|
|
################################################################################
|
|
# directory: MF/ADF.ARA-M (3f00/a00000015141434c00)
|
|
# file: ADF.ARA-M (None)
|
|
# RAW FCP Template: None
|
|
# Decoded FCP Template: None
|
|
select MF/ADF.ARA-M
|
|
aram_delete_all
|
|
aram_store_ref_ar_do --aid "" --device-app-id a1234567890123bb1f140de987aaa891bbbf0bdd --apdu-filter aabbccdd010203041122334405060708 --nfc-never --android-permissions 0000000000000004
|
|
aram_store_ref_ar_do --aid ffffffffffcc --device-app-id a1234567890aaabb1f140de987657891a04f0bdd --apdu-filter aabbccdd01020304 --nfc-always --android-permissions 0000000000000004
|
|
aram_store_ref_ar_do --aid ffffffffffbb --device-app-id aa6872f28b340b2345678905d5c2bbd5a04f0bdd --apdu-always --nfc-always --android-permissions 0000000000000004
|
|
aram_store_ref_ar_do --aid ffffffffffaa --device-app-id aa6872787654334567840de535c2bbd5a04f0baa --apdu-never --nfc-never --android-permissions 0000000000000004
|
|
#
|
|
################################################################################
|
|
# Export summary #
|
|
################################################################################
|
|
# total files visited: 1
|
|
# bad files: 0
|
|
# skipped dedicated files(s): 0
|