AusweisApp2
governikus-Namensbereichsreferenz

Implementation of ActivationContext for Intent based activation on Android systems. Mehr ...

Namensbereiche

 KnownOIDs
 

Klassen

class  ActivationContext
 
class  ActivationController
 
class  InternalActivationContext
 
class  CustomSchemeActivationContext
 
class  CustomSchemeActivationHandler
 This ActivationHandler implements an API by opening custom URLs with scheme 'eid', as specified by TR-03124-1. Mehr ...
 
class  IntentActivationContext
 
class  IntentActivationHandler
 This ActivationHandler implements an API by opening custom URLs registered in the Android manifest, as specified by TR-03124-1. Mehr ...
 
class  Template
 
class  WebserviceActivationContext
 
class  WebserviceActivationHandler
 This ActivationHandler implements an API through a local web service, as specified by TR-03124-1. Mehr ...
 
class  Apdu
 
class  Asn1Util
 
class  Asn1ObjectUtil
 Utility for OpenSSL type ASN1_OBJECT, i.e. Mehr ...
 
class  Asn1OctetStringUtil
 Utility for OpenSSL type ASN1_OCTET_STRING, i.e. Mehr ...
 
class  Asn1StringUtil
 Utility for OpenSSL type ASN1_STRING, i.e. Mehr ...
 
class  Asn1TypeUtil
 Utility for OpenSSL type ASN1_TYPE, i.e. Mehr ...
 
class  Asn1IntegerUtil
 Utility for OpenSSL type ASN1_INTEGER, i.e. Mehr ...
 
class  Asn1BCDDateUtil
 Utility for BCD coded dates. Mehr ...
 
class  AuthenticatedAuxiliaryData
 
struct  CertificateDescription
 
class  ChainBuilder
 
struct  chipauthenticationinfo_st
 
class  ChipAuthenticationInfo
 
struct  SIGNATURE
 According to. Mehr ...
 
class  CVCertificateChain
 
class  CVCertificateChainBuilder
 
class  EFCardSecurity
 EF.CardSecurity is defined in TR-03110-3 as ContentInfo with contentType id-signedData, where the SignedData has eContentType id-SecurityObject. Mehr ...
 
struct  paceinfo_st
 
class  PaceInfo
 
struct  securityinfo_st
 
class  SecurityInfo
 
class  SecurityInfos
 SecurityInfos ::= SET OF SecurityInfo. Mehr ...
 
class  SignatureChecker
 
class  Card
 
class  CardConnection
 This class represents a connection to a smart card. Mehr ...
 
class  CardConnectionWorker
 This class represents a connection to a smart card. Mehr ...
 
class  CardInfo
 Holds smart card informations. Mehr ...
 
class  CardInfoFactory
 Factory for creation of CardInfo instances. Mehr ...
 
class  BaseCardCommand
 
class  CreateCardConnectionCommand
 
class  DestroyPaceChannelCommand
 
class  DidAuthenticateEAC1Command
 
class  DidAuthenticateEAC2Command
 
class  EstablishPaceChannelCommand
 
class  SetEidPinCommand
 
class  TransmitCommand
 
class  UnblockPinCommand
 
class  UpdateRetryCounterCommand
 
class  CommandApdu
 
class  CommandApduBuilder
 
class  DestroyPaceChannelBuilder
 
class  EABuilder
 
struct  ESTABLISHPACECHANNELINPUT
 As defined in TR-03119: Mehr ...
 
class  EstablishPaceChannel
 
struct  ESTABLISHPACECHANNELOUTPUT
 As defined in TR-03119: Mehr ...
 
class  EstablishPaceChannelOutput
 
struct  FileRef
 
class  GABuilder
 
class  GAResponseApdu
 
class  GAEncryptedNonceResponse
 
class  GAMapNonceResponse
 
class  GAPerformKeyAgreementResponse
 
class  GAMutualAuthenticationResponse
 
class  GAChipAuthenticationResponse
 
class  GetChallengeBuilder
 
class  InputAPDUInfo
 
class  LengthValue
 
class  MSEBuilder
 
class  CipherMac
 
class  DomainParameterMapping
 
class  EcdhGenericMapping
 
class  EcdhKeyAgreement
 
class  EcUtil
 
class  EllipticCurveFactory
 
class  KeyAgreement
 
class  KeyDerivationFunction
 
class  PaceHandler
 
struct  SM_PROTECTED_LE
 Message part of the Secure Messaging command APDU containing the expected length. Mehr ...
 
class  SecureMessaging
 
class  SymmetricCipher
 
class  PinModify
 
class  PinModifyOutput
 
class  PSOBuilder
 
class  ReadBinaryBuilder
 
class  Reader
 
class  ConnectableReader
 
class  ReaderFilter
 
class  ReaderInfo
 
class  ReaderManager
 
class  ReaderManagerPlugIn
 
class  ReaderManagerWorker
 
class  ResetRetryCounterBuilder
 
class  ResponseApdu
 
struct  ResponseApduResult
 
struct  SM_ENCRYPTED_DATA
 Message part of the Secure Messaging response APDU containing the encrypted data. Mehr ...
 
struct  SM_PROCESSING_STATUS
 Message part of the Secure Messaging response APDU containing the processing status. Mehr ...
 
struct  SM_CHECKSUM
 Message part of the Secure Messaging response APDU containing the cryptographic checksum. Mehr ...
 
class  SecureMessagingResponse
 Response APDU for Secure Messaging as defined in TR-03110-3. Mehr ...
 
class  SelectBuilder
 
class  DeviceListener
 
class  ReaderDetector
 
class  IosCard
 
struct  IosCardPointer
 Implementation detail which can only be used by Object-C++ since it stores a pointer to an Objective-C protocol. Mehr ...
 
class  IosReader
 
class  IosReaderManagerPlugIn
 
class  NfcCard
 
class  NfcReader
 
class  NfcReaderManagerPlugIn
 
class  PcscCard
 
class  PcscReader
 
class  PcscReaderManagerPlugIn
 
class  PcscUtils
 
class  CallCost
 
class  LanguageString
 
class  ProviderConfiguration
 
class  ProviderConfigurationInfo
 
class  ProviderConfigurationParser
 
class  ReaderConfiguration
 
class  ReaderConfigurationInfo
 
class  ReaderConfigurationParser
 
class  ReleaseInformation
 
struct  ContentItem
 
class  DiagnosisContext
 
class  WorkflowRequest
 
class  AppController
 
class  DiagnosisController
 
class  AntivirInfo
 
class  DiagnosisAntivirusDetection
 
class  DiagnosisConnectionTest
 
class  FirewallProfile
 
class  FirewallSoftware
 
class  DiagnosisFirewallDetection
 
class  DiagnosisModel
 
class  SectionModel
 
class  PdfCreator
 
class  PdfExporter
 
class  Downloader
 
class  FileProvider
 
class  UpdatableFile
 
class  BuildHelper
 
class  DeviceInfo
 
class  ECardApiResult
 
class  Enum
 
class  Env
 
class  FileDestination
 
class  GlobalStatus
 
class  LanguageLoader
 
class  LogEventHandler
 
class  LogHandler
 
class  Randomizer
 
class  ResourceLoader
 
class  UsbId
 
class  VersionInfo
 
class  VersionNumber
 
class  CommandLineParser
 
class  SignalHandler
 
class  DatagramHandler
 
class  DatagramHandlerImpl
 
class  HttpRequest
 
class  HttpResponse
 
class  HttpServer
 
class  HttpServerRequestor
 
class  HttpServerStatusParser
 
class  MulticastLock
 
class  NetworkManager
 
class  NetworkReplyError
 
class  NetworkReplyTimeout
 
class  PortFile
 
class  TlsChecker
 
class  UrlUtil
 Utility class for checking various constraints on URLs. Mehr ...
 
class  WifiInfo
 
class  ConnectRequest
 
class  DataChannel
 
class  Discovery
 
class  IfdConnect
 
class  IfdConnectResponse
 
class  IfdDisconnect
 
class  IfdDisconnectResponse
 
class  IfdError
 
class  IfdEstablishContext
 
class  IfdEstablishContextResponse
 
class  IfdEstablishPaceChannel
 
class  IfdEstablishPaceChannelResponse
 
class  IfdGetStatus
 
class  IfdModifyPin
 
class  IfdModifyPinResponse
 
class  IfdStatus
 
class  IfdTransmit
 
class  IfdTransmitResponse
 
class  IfdVersion
 
class  RemoteMessageResponse
 
class  RemoteCard
 
class  RemoteReader
 
class  RemoteReaderManagerPlugIn
 
class  RemoteClient
 
class  RemoteClientImpl
 
class  RemoteConnectorImpl
 
class  RemoteDeviceDescriptor
 
class  RemoteDeviceListEntry
 
class  RemoteDeviceList
 
class  RemoteDeviceListImpl
 
class  RemoteDispatcher
 
class  RemoteDispatcherClient
 
class  RemoteDispatcherServer
 
class  RemoteReaderAdvertiser
 
class  RemoteReaderAdvertiserImpl
 
class  RemoteServer
 
class  RemoteServerImpl
 
class  RemoteTlsServer
 
class  RemoteWebSocketServer
 
class  RemoteWebSocketServerImpl
 
class  ServerMessageHandler
 
class  ServerMessageHandlerImpl
 
class  WebSocketChannel
 
class  SecureStorage
 
class  SslCipherList
 
class  SslEllipticCurveVector
 
class  TlsConfiguration
 
class  AppUpdateData
 
class  AppUpdater
 
class  Service
 
class  AbstractSettings
 
class  AppSettings
 Represents application settings. Mehr ...
 
class  AutoStart
 
class  GeneralSettings
 
class  HistoryInfo
 Represents a history entry, i.e. Mehr ...
 
class  KeyPair
 
class  PreVerificationSettings
 
class  RemoteServiceSettings
 
class  VolatileSettings
 
class  PskManager
 
class  UIPlugInAidl
 
class  HelpAction
 
class  PlatformTools
 
class  ReaderDriverModel
 
class  RemoteDeviceModelEntry
 
class  RemoteDeviceModel
 
class  TrayIcon
 
class  UIPlugInFunctional
 
class  MessageDispatcher
 
class  MsgContext
 
class  MsgDispatcherContext
 
class  MsgHandler
 
class  MsgHandlerAccessRights
 
class  MsgHandlerApiLevel
 
class  MsgHandlerAuth
 
class  MsgHandlerBadState
 
class  MsgHandlerCertificate
 
class  MsgHandlerChangePin
 
class  MsgHandlerEnterCan
 
class  MsgHandlerEnterNewPin
 
class  MsgHandlerEnterNumber
 
class  MsgHandlerEnterPin
 
class  MsgHandlerEnterPuk
 
class  MsgHandlerInfo
 
class  MsgHandlerInsertCard
 
class  MsgHandlerInternalError
 
class  MsgHandlerInvalid
 
class  MsgHandlerLog
 
class  MsgHandlerReader
 
class  MsgHandlerReaderList
 
class  MsgHandlerUnknownCommand
 
class  UIPlugInJson
 
class  ApplicationModel
 
class  AppUpdateDataModel
 
class  AuthModel
 
class  CardPosition
 
class  CardPositionModel
 
class  CertificateDescriptionModel
 
class  ChangePinModel
 
class  ChatModel
 
class  CheckIDCardModel
 
class  ConnectivityManager
 
class  FormattedTextModel
 
class  HistoryModel
 
class  HistoryModelSearchFilter
 
class  HistoryProxyModel
 
class  LogModel
 
class  NotificationModel
 
class  NumberModel
 
class  ProviderCategoryFilterModel
 
class  ProviderModel
 
class  ProviderNameFilterModel
 
class  ProxyCredentials
 
class  Random
 
class  ReaderScanEnabler
 
class  ReleaseInformationModel
 
class  RemoteServiceModel
 
class  SelfAuthModel
 
class  SelfDiagnosisModel
 
class  SettingsModel
 
class  UIPlugInQml
 
class  VersionInformationModel
 
class  WorkflowModel
 
class  UIPlugInWebSocket
 
class  SurveyModel
 
class  CertificateChecker
 Utility class for checking various constraints on certificates. Mehr ...
 
class  AccessRightManager
 
class  AuthContext
 
class  ChangePinContext
 
class  SelfAuthContext
 
class  WorkflowContext
 
class  AuthController
 
class  ChangePinController
 
class  SelfAuthController
 
class  WorkflowController
 
class  ConnectionHandle
 
class  ConnectionHandleParser
 
class  Eac1InputType
 
class  Eac2InputType
 
class  ElementParser
 
class  SupportedAPI
 
class  UserAgent
 
class  ElementDetector
 
class  DIDAuthenticateResponseEAC1
 
class  DIDAuthenticateResponseEAC2
 
class  DIDListResponse
 
class  DisconnectResponse
 
class  InitializeFrameworkResponse
 
class  PaosCreator
 
class  StartPaos
 
class  TransmitResponse
 
class  PaosHandler
 
class  PaosMessage
 
class  RequestType
 
class  ResponseType
 
class  DIDAuthenticateEAC1
 
class  DidAuthenticateEac1Parser
 
class  DIDAuthenticateEAC2
 
class  DidAuthenticateEac2Parser
 
class  DIDAuthenticateEACAdditional
 
class  DidAuthenticateEacAdditionalParser
 
class  DIDList
 
class  Disconnect
 
class  InitializeFramework
 
class  PaosParser
 
class  StartPaosResponse
 
class  Transmit
 
class  TransmitParser
 
class  SelfAuthenticationData
 
class  AbstractState
 
class  CompositeStatePace
 
class  CompositeStateProcessCvcsAndSetRights
 
class  CompositeStateTrustedChannel
 
class  FinalState
 
class  GenericContextContainer
 
class  StateActivateStoreFeedbackDialog
 
class  StateBuilder
 
class  StateCertificateDescriptionCheck
 
class  StateChangePin
 
class  StateCheckCertificates
 
class  StateCheckError
 
class  StateCheckRefreshAddress
 
class  StateCleanUpReaderManager
 
class  StateClearPacePasswords
 
class  StateConnectCard
 
class  StateDestroyPace
 
class  StateDidAuthenticateEac1
 
class  StateDidAuthenticateEac2
 
class  StateDidList
 
class  StateEACAdditionalInputType
 
class  StateEditAccessRights
 
class  StateEnterNewPacePin
 
class  StateEnterPacePassword
 
class  StateEstablishPaceChannel
 
class  StateExtractCvcsFromEac1InputType
 
class  StateGenericSendReceive
 
class  StateSendStartPaos
 
class  StateSendInitializeFrameworkResponse
 
class  StateSendDIDListResponse
 
class  StateSendDIDAuthenticateResponseEAC1
 
class  StateSendDIDAuthenticateResponseEACAdditionalInputType
 
class  StateSendDIDAuthenticateResponseEAC2
 
class  StateSendTransmitResponse
 
class  StateSendDisconnectResponse
 
class  StateGetSelfAuthenticationData
 
class  StateGetTcToken
 
class  StateInitializeFramework
 
class  StateLoadTcTokenUrl
 
class  StateMaintainCardConnection
 
class  StateParseTcTokenUrl
 
class  StatePrepareChangePin
 
class  StatePreparePace
 
class  StatePreVerification
 
class  StateProcessCertificatesFromEac2
 
class  StateProcessing
 
class  StateRedirectBrowser
 
class  StateSelectReader
 
class  StateSendWhitelistSurvey
 
class  StateShowSelfInfo
 
class  StateStartPaos
 
class  StateStartPaosResponse
 
class  StateTransmit
 
class  StateUnfortunateCardPosition
 
class  StateUpdateRetryCounter
 
class  StateVerifyRetryCounter
 
class  StateWriteHistory
 
class  TcToken
 
class  RemoteServiceContext
 
class  RemoteServiceController
 
class  StateChangePinRemote
 
class  StateChangePinResponse
 
class  StateEnterNewPacePinRemote
 
class  StateEnterPacePasswordRemote
 
class  StateEstablishPaceChannelRemote
 
class  StateEstablishPaceChannelResponse
 
class  StatePrepareChangePinRemote
 
class  StatePreparePaceRemote
 
class  StateProcessRemoteMessages
 
class  StateStartRemoteService
 
class  StateStopRemoteService
 

Typdefinitionen

using CommunityID = TYPE(AccessRight::READ_DG18)
 
using ValidityDate = ASN1_OCTET_STRING
 
using AgeVerificationDate = ASN1_STRING
 
using AuxDataTemplate = struct auxdatatemplate_st { ASN1_OBJECT *mAuxId
 
using AuthenticatedAuxiliaryDataInternal = stack_st_AuxDataTemplate
 
using CHAT = struct chat_st { ASN1_OBJECT *mType
 According to. Mehr ...
 
using CVCertificate = struct cvcertificate_st { CVCertificateBody *mBody
 
using CERTIFICATEEXTENSION = struct CERTIFICATEEXTENSION_st { ASN1_OBJECT *mOid
 
using CVCertificateBody = struct certificateprofilebody_st { ASN1_OCTET_STRING *mCertificateProfileIdentifier
 
using EcdsaPublicKey = struct ecdsapublickey_st { ASN1_OBJECT *mObjectIdentifier
 According to TR-03110-3 chapter D elliptic curve public keys are defined as follows: Mehr ...
 
using securityinfos_st = struct stack_st_securityinfo_st
 
using EFCardAccess = SecurityInfos
 EFCardAccess ::= SecurityInfos. Mehr ...
 
using GA_ENCRYPTEDNONCEDATA = struct ga_encryptednoncedata_st { ASN1_OCTET_STRING *mEncryptedNonce
 According to TR-03110-3 the ASN.1 the response APDU has one protocol specific data: Mehr ...
 
using GA_MAPNONCEDATA = struct ga_mapnoncedata_st { ASN1_OCTET_STRING *mMappingData
 According to TR-03110-3 the ASN.1 the response APDU has one protocol specific data: Mehr ...
 
using GA_PERFORMKEYAGREEMENTDATA = struct ga_performkeyagreementdata_st { ASN1_OCTET_STRING *mEphemeralPublicKey
 According to TR-03110-3 the ASN.1 the response APDU has one protocol specific data: Mehr ...
 
using GA_MUTUALAUTHENTICATIONDATA = struct ga_mutualauthenticationdata_st { ASN1_OCTET_STRING *mAuthenticationToken
 According to TR-03110-3 the ASN.1 the response APDU has three protocol specific data: Mehr ...
 
using GA_CHIPAUTHENTICATIONDATA = struct ga_chipauthenticationdata_st { ASN1_OCTET_STRING *mNonce
 According to TR-03110-3 the ASN.1 the response APDU has three protocol specific data: Mehr ...
 
using Origin = GlobalStatus::Origin
 

Aufzählungen

enum class  KeyAgreementStatus {
  SUCCESS , RETRY_ALLOWED , COMMUNICATION_ERROR , FAILED ,
  PROTOCOL_ERROR
}
 

Funktionen

 defineTypedEnumType (AccessRight, uint, WRITE_DG17=37, WRITE_DG18=36, WRITE_DG19=35, WRITE_DG20=34, WRITE_DG21=33, RFU_32=32, RFU_31=31, RFU_30=30, RFU_29=29, READ_DG21=28, READ_DG20=27, READ_DG19=26, READ_DG18=25, READ_DG17=24, READ_DG16=23, READ_DG15=22, READ_DG14=21, READ_DG13=20, READ_DG12=19, READ_DG11=18, READ_DG10=17, READ_DG09=16, READ_DG08=15, READ_DG07=14, READ_DG06=13, READ_DG05=12, READ_DG04=11, READ_DG03=10, READ_DG02=9, READ_DG01=8, INSTALL_QUAL_CERT=7, INSTALL_CERT=6, PIN_MANAGEMENT=5, CAN_ALLOWED=4, PRIVILEGED_TERMINAL=3, RESTRICTED_IDENTIFICATION=2, COMMUNITY_ID_VERIFICATION=1, AGE_VERIFICATION=0) defineTypedEnumType(AccessRightNames
 
QByteArray getOpenSslError ()
 
template<typename T >
TnewAsn1Object ()
 Default template function for creating an OpenSSL type. Mehr ...
 
template<typename T >
QSharedPointer< TnewObject (T *pObject=newAsn1Object< T >())
 Template function for creating a SharedPointer holding an ASN.1 OpenSSL type. Mehr ...
 
template<typename T >
int encodeAsn1Object (T *, unsigned char **)
 Default template function for encoding an OpenSSL type. Mehr ...
 
template<typename T >
QByteArray encodeObject (T *pObject)
 Template function for encoding an OpenSSL type as DER encoded QByteArray. Mehr ...
 
template<typename T >
TdecodeAsn1Object (T **, const unsigned char **, long)
 Default template function for decoding an OpenSSL type. Mehr ...
 
template<typename T >
void freeAsn1Object (T *)
 Default template function for freeing an OpenSSL type. Mehr ...
 
template<typename T >
QSharedPointer< TdecodeObject (const QByteArray &pData, bool pLogging=true)
 Template function for decoding an OpenSSL type from DER encoded QByteArray. Mehr ...
 
QByteArray encode () const
 
 chat_st (const chat_st &pCopy)
 
chat_stoperator= (const chat_st &)=delete
 
 ~chat_st ()
 
void setType (const QByteArray &pOidAsText)
 
QByteArray getType () const
 
void setTemplate (const QByteArray &pValue)
 
QByteArray getTemplate () const
 
void setAccessRole (AccessRole pRole)
 
AccessRole getAccessRole () const
 
QSet< AccessRight > getAccessRights () const
 
void setAccessRights (const QSet< AccessRight > &pAccessRights)
 
bool hasAccessRight (AccessRight pAccessRight) const
 
void removeAllAccessRights ()
 
void removeAccessRight (AccessRight pAccessRight)
 
template<>
chipauthenticationinfo_stdecodeAsn1Object< chipauthenticationinfo_st > (chipauthenticationinfo_st **pObject, const unsigned char **pData, long pDataLen)
 
template<>
void freeAsn1Object< chipauthenticationinfo_st > (chipauthenticationinfo_st *pObject)
 
const CVCertificateBodygetBody () const
 
QByteArray getRawBody () const
 
const ECDSA_SIG * getEcdsaSignature () const
 
QByteArray getRawSignature () const
 
QByteArray getDerSignature () const
 
bool isValidOn (const QDateTime &pValidationDate) const
 
bool isIssuedBy (const cvcertificate_st &pIssuer) const
 
bool operator== (const CVCertificate &pLeft, const CVCertificate &pRight)
 
bool operator!= (const CVCertificate &pLeft, const CVCertificate &pRight)
 
 STACK_OF (CERTIFICATEEXTENSION) *mExtensions
 
QByteArray getCertificateProfileIdentifier () const
 
QByteArray getCertificationAuthorityReference () const
 
const EcdsaPublicKeygetPublicKey () const
 
QByteArray getCertificateHolderReference () const
 
const CHATgetCHAT () const
 
void setCertificateExpirationDate (QDate date)
 
QDate getCertificateExpirationDate () const
 
void setCertificateEffectiveDate (QDate date)
 
QDate getCertificateEffectiveDate () const
 
QCryptographicHash::Algorithm getHashAlgorithm () const
 
QMap< QByteArray, QByteArray > getExtensions () const
 
QByteArray getPublicKeyOid () const
 
QByteArray getPublicKeyOidValueBytes () const
 
QByteArray getUncompressedPublicPoint () const
 
const EC_KEY * getEcKey () const
 
template<>
CMS_ContentInfo * decodeAsn1Object< CMS_ContentInfo > (CMS_ContentInfo **pObject, const unsigned char **pData, long pDataLen)
 
template<>
void freeAsn1Object< CMS_ContentInfo > (CMS_ContentInfo *pObject)
 
 defineEnumType (KeyAgreementType, DH, ECDH) defineEnumType(MappingType
 Method used for key agreement: Mehr ...
 
template<>
paceinfo_stdecodeAsn1Object< paceinfo_st > (paceinfo_st **pObject, const unsigned char **pData, long pDataLen)
 
template<>
void freeAsn1Object< paceinfo_st > (paceinfo_st *pObject)
 
QDebug operator<< (QDebug pDbg, const CardInfo &pCardInfo)
 
 defineEnumType (ReaderManagerPlugInType, UNKNOWN, PCSC, NFC, REMOTE) class ReaderManagerPlugInInfo
 
 defineTypedEnumType (StatusCode, quint16, EMPTY=0x0000, INVALID=0x0001, SUCCESS=0x9000, NO_PKCS15_APP=0x6200, END_OF_FILE=0x6282, PIN_DEACTIVATED=0x6283, FCI_NO_ISO7816_4=0x6284, VERIFICATION_FAILED=0x6300, INPUT_TIMEOUT=0x6400, INPUT_CANCELLED=0x6401, PASSWORDS_DIFFER=0x6402, PASSWORD_OUTOF_RANGE=0x6403, CARD_EJECTED_AND_REINSERTED=0x64a2, EEPROM_CELL_DEFECT=0x6581, SECURITY_ENVIRONMENT=0x6600, WRONG_LENGTH=0x6700, NO_BINARY_FILE=0x6981, LAST_CHAIN_CMD_EXPECTED=0x6883, ACCESS_DENIED=0x6982, PASSWORD_COUNTER_EXPIRED=0x6983, DIRECTORY_OR_PASSWORD_LOCKED_OR_NOT_ALLOWED=0x6984, NO_PARENT_FILE=0x6985, NOT_YET_INITIALIZED=0x6985, NO_CURRENT_DIRECTORY_SELECTED=0x6986, DATAFIELD_EXPECTED=0x6987, INVALID_SM_OBJECTS=0x6988, COMMAND_NOT_ALLOWED=0x69f0, INVALID_DATAFIELD=0x6a80, ALGORITHM_ID=0x6a81, FILE_NOT_FOUND=0x6a82, RECORD_NOT_FOUND=0x6a83, INVALID_PARAMETER=0x6a86, LC_INCONSISTANT=0x6a87, PASSWORD_NOT_FOUND=0x6a88, ILLEGAL_OFFSET=0x6b00, UNSUPPORTED_CLA=0x6e00, CANT_DISPLAY=0x6410, INVALID_P1P2=0x6a00, UNSUPPORTED_INS=0x6d00, PIN_BLOCKED=0x63c0, PIN_SUSPENDED=0x63c1, PIN_RETRY_COUNT_2=0x63c2,) defineTypedEnumType(SW1
 
bool operator== (const ResponseApduResult &pLeft, const ResponseApduResult &pRight)
 
 defineEnumType (CardType, NONE, UNKNOWN, PASSPORT, EID_CARD) defineTypedEnumType(PacePasswordId
 
 defineEnumType (FeatureID, VERIFY_PIN_START=0x1, VERIFY_PIN_FINISH=0x2, MODIFY_PIN_START=0x3, MODIFY_PIN_FINISH=0x4, GET_KEY_PRESSED=0x5, VERIFY_PIN_DIRECT=0x6, MODIFY_PIN_DIRECT=0x7, MCT_READERDIRECT=0x8, MCT_UNIVERSAL=0x9, IFD_PIN_PROP=0xa, ABORT=0xb, SET_SPE_MESSAGE=0x0c, VERIFY_PIN_DIRECT_APP_ID=0x0d, MODIFY_PIN_DIRECT_APP_ID=0x0e, WRITE_DISPLAY=0x0f, GET_KEY=0x10, IFD_DISPLAY_PROPERTIES=0x11, TLV_PROPERTIES=0x12, CCID_ESC_COMMAND=0x13, EXECUTE_PACE=0x20) class PcscReaderFeature
 
QDebug operator<< (QDebug pDbg, const governikus::PcscReaderFeature &pPcscReaderFeature)
 
bool operator== (const CallCost &pLeft, const CallCost &pRight)
 
bool operator== (const LanguageString &pLeft, const LanguageString &pRight)
 
auto qHash (const ReaderConfigurationInfo &info)
 
 defineEnumType (Action, NONE, AUTH, SELF, PIN, READER_SETTINGS, REMOTE_SERVICE) class WorkflowController
 
 defineEnumType (CardReturnCode, UNDEFINED, OK, OK_PUK, RETRY_ALLOWED, CARD_NOT_FOUND, UNKNOWN, INPUT_TIME_OUT, INVALID_CAN, INVALID_PASSWORD, INVALID_PIN, INVALID_PIN_2, INVALID_PIN_3, INVALID_PUK, COMMAND_FAILED, CANCELLATION_BY_USER, NEW_PIN_MISMATCH, NEW_PIN_INVALID_LENGTH, PIN_BLOCKED, PIN_NOT_BLOCKED, PUK_INOPERATIVE, NO_ACTIVE_PIN_SET, PROTOCOL_ERROR, UNEXPECTED_TRANSMIT_STATUS) class CardReturnCodeUtil
 
template<typename T >
QLatin1String getEnumName (T pType)
 
template<typename T >
Tsingleton ()
 
template<typename T , typename ... Args>
T createNewObject (Args &&... pArgs)
 
template<typename S , typename T >
std::enable_if<!std::is_void< T >::value, QList< T > >::type map (const std::function< T(const S &)> &pFunc, const QList< S > &pItems)
 
template<typename T >
std::enable_if<!std::is_void< T >::value, QVector< T > >::type filter (const std::function< bool(const T &)> &pFunc, const QVector< T > &pItems)
 
QDebug operator<< (QDebug pDbg, const governikus::LogHandler &pHandler)
 
bool operator== (const VersionNumber &pLeft, const VersionNumber &pRight)
 
bool operator!= (const VersionNumber &pLeft, const VersionNumber &pRight)
 
bool operator< (const VersionNumber &pLeft, const VersionNumber &pRight)
 
bool operator> (const VersionNumber &pLeft, const VersionNumber &pRight)
 
int initApp (int &argc, char **argv)
 
template<>
DatagramHandlercreateNewObject< DatagramHandler * > ()
 
template<>
DatagramHandlercreateNewObject< DatagramHandler *, bool > (bool &&pEnableListening)
 
QDebug operator<< (QDebug pDbg, const IfdVersion &pVersion)
 
 defineEnumType (RemoteCardMessageType, IFDEstablishContext, IFDEstablishContextResponse, IFDGetStatus, IFDStatus, IFDConnect, IFDConnectResponse, IFDDisconnect, IFDDisconnectResponse, IFDError, IFDTransmit, IFDTransmitResponse, IFDEstablishPACEChannel, IFDEstablishPACEChannelResponse, IFDModifyPIN, IFDModifyPINResponse, UNDEFINED) class RemoteMessage
 
template<>
RemoteClientcreateNewObject< RemoteClient * > ()
 
template<>
RemoteConnector * createNewObject< RemoteConnector * > ()
 
QDebug operator<< (QDebug pDbg, const RemoteDeviceDescriptor &pRemoteDeviceDescriptor)
 
template<>
RemoteDispatcherClientcreateNewObject< RemoteDispatcherClient *, IfdVersion::Version &&, const QSharedPointer< DataChannel > & > (IfdVersion::Version &&pVersion, const QSharedPointer< DataChannel > &pChannel)
 
template<>
RemoteDispatcherServercreateNewObject< RemoteDispatcherServer *, const QSharedPointer< DataChannel > & > (const QSharedPointer< DataChannel > &pChannel)
 
template<>
RemoteReaderAdvertisercreateNewObject< RemoteReaderAdvertiser *, const QString &, const QString &, quint16 & > (const QString &pIfdName, const QString &pIfdId, quint16 &pPort)
 
template<>
RemoteReaderAdvertisercreateNewObject< RemoteReaderAdvertiser *, const QString &, const QString &, quint16 &, int & > (const QString &pIfdName, const QString &pIfdId, quint16 &pPort, int &pTimerInterval)
 
template<>
RemoteServercreateNewObject< RemoteServer * > ()
 
template<>
RemoteWebSocketServercreateNewObject< RemoteWebSocketServer * > ()
 
template<>
ServerMessageHandlercreateNewObject< ServerMessageHandler *, QSharedPointer< governikus::DataChannel > & > (QSharedPointer< DataChannel > &pChannel)
 
bool operator== (const TlsConfiguration &pLeft, const TlsConfiguration &pRight)
 
bool operator!= (const TlsConfiguration &pLeft, const TlsConfiguration &pRight)
 
QString generateMailBody (const GlobalStatus &pStatus, const QUrl &pServiceUrl, bool pPercentEncoding, bool pAddLogNotice)
 
Q_DECL_EXPORT void ausweisapp2_init_internal ()
 
Q_DECL_EXPORT bool ausweisapp2_is_running_internal ()
 
Q_DECL_EXPORT void ausweisapp2_started_internal ()
 
Q_DECL_EXPORT AusweisApp2Callback ausweisapp2_get_callback_internal ()
 
Q_DECL_EXPORT void ausweisapp2_join_thread_internal ()
 
chartoString (const MessageDispatcher::Msg &pMsg)
 
QDebug operator<< (QDebug pDbg, const MsgHandler &pMsg)
 
 defineEnumType (MsgLevel, v1=1) defineEnumType(MsgType
 
bool isPlatform (const QObject &object, const Platform selector)
 
 defineEnumType (Platform, ANDROID, IOS, MOBILE, DESKTOP) bool isPlatform(const QObject &
 Determine platform at runtime. Use this instead of the preprocessor to allow running the mobile UI on the desktop. Mehr ...
 
 defineEnumType (SelfAuthDataPermission, UNKNOWN, ALLOWED, PROHIBITED, NOTONCHIP) defineEnumType(SelfAuthData
 

Variablen

 ResidencePermitII = TYPE(AccessRight::READ_DG20)
 
 ResidencePermitI = TYPE(AccessRight::READ_DG19)
 
 Address = TYPE(AccessRight::READ_DG17)
 
 BirthName = TYPE(AccessRight::READ_DG13)
 
 Nationality = TYPE(AccessRight::READ_DG10)
 
 PlaceOfBirth = TYPE(AccessRight::READ_DG09)
 
 DateOfBirth = TYPE(AccessRight::READ_DG08)
 
 DoctoralDegree = TYPE(AccessRight::READ_DG07)
 
 ArtisticName = TYPE(AccessRight::READ_DG06)
 
 FamilyName = TYPE(AccessRight::READ_DG05)
 
 GivenNames = TYPE(AccessRight::READ_DG04)
 
 ValidUntil = TYPE(AccessRight::READ_DG03)
 
 IssuingCountry = TYPE(AccessRight::READ_DG02)
 
 DocumentType = TYPE(AccessRight::READ_DG01)
 
 CanAllowed = TYPE(AccessRight::CAN_ALLOWED)
 
 Pseudonym = TYPE(AccessRight::RESTRICTED_IDENTIFICATION)
 
 AddressVerification = TYPE(AccessRight::COMMUNITY_ID_VERIFICATION)
 
 AgeVerification = TYPE(AccessRight::AGE_VERIFICATION)
 
 WriteAddress = TYPE(AccessRight::WRITE_DG17)
 
 WriteCommunityID = TYPE(AccessRight::WRITE_DG18)
 
 WriteResidencePermitI = TYPE(AccessRight::WRITE_DG19)
 
 WriteResidencePermitII = TYPE(AccessRight::WRITE_DG20)
 
 PinManagement
 
ASN1_TYPE * mExtInfo
 
ASN1_OCTET_STRING * mTemplate
 
SIGNATUREmSignature
 
ECDSA_SIG * mEcdsaSignature
 
ASN1_OCTET_STRING * mObject1
 
ASN1_OCTET_STRING * mObject2
 
ASN1_OCTET_STRING * mObject3
 
ASN1_OCTET_STRING * mObject4
 
ASN1_OCTET_STRING * mObject5
 
ASN1_OCTET_STRING * mObject6
 
ASN1_OCTET_STRING * mObject7
 
ASN1_OCTET_STRING * mObject8
 
ASN1_STRING * mCertificationAuthorityReference
 
EcdsaPublicKeymPublicKey
 
ASN1_STRING * mCertificateHolderReference
 
CHATmChat
 
ASN1_OCTET_STRING * mEffectiveDate
 
ASN1_OCTET_STRING * mExpirationDate
 
ASN1_OCTET_STRING * mPrimeModulus
 
ASN1_OCTET_STRING * mFirstCoefficient
 
ASN1_OCTET_STRING * mSecondCoefficient
 
ASN1_OCTET_STRING * mBasePoint
 
ASN1_OCTET_STRING * mOrderOfTheBasePoint
 
ASN1_OCTET_STRING * mPublicPoint
 
ASN1_OCTET_STRING * mCofactor
 
EC_KEY * mEcKey
 
 GM
 
ASN1_OCTET_STRING * mCarCurr
 
ASN1_OCTET_STRING * mCarPrev
 
ASN1_OCTET_STRING * mAuthenticationToken
 
 quint8
 
 INVALID = 0x00
 
 MORE_DATA_AVAILABLE = 0x61
 
 NONVOLATILE_MEMORY_UNCHANGED_1 = 0x62
 
 NONVOLATILE_MEMORY_CHANGED_1 = 0x63
 
 NONVOLATILE_MEMORY_UNCHANGED_2 = 0x64
 
 NONVOLATILE_MEMORY_CHANGED_2 = 0x65
 
 SECURITY_ISSUE = 0x66
 
 WRONG_LENGTH = 0x67
 
 FUNCTIONS_IN_CLASS_NOT_SUPPORTED = 0x68
 
 ERROR_COMMAND_NOT_ALLOWED = 0x69
 
 WRONG_PARAMETERS_P1_P2 = 0x6a
 
 WRONG_PARAMETERS_P1_P2_NO_INFO = 0x6b
 
 WRONG_LE_FIELD = 0x6c
 
 INSTRUCTION_CODE_INVALID = 0x6d
 
 CLASS_NOT_SUPPORTED = 0x6e
 
 NO_PRECISE_DIAGNOSIS = 0x6f
 
 SUCCESS = 0x90
 
 char
 
 UNKNOWN = 0x00
 
 PACE_MRZ = 0x01
 
 PACE_CAN = 0x02
 
 PACE_PIN = 0x03
 
 UNKNOWN_COMMAND
 
 INTERNAL_ERROR
 
 LOG
 
 INFO
 
 API_LEVEL
 
 READER
 
 READER_LIST
 
 BAD_STATE
 
 AUTH
 
 CHANGE_PIN
 
 CERTIFICATE
 
 ACCESS_RIGHTS
 
 INSERT_CARD
 
 ENTER_PIN
 
 ENTER_NEW_PIN
 
 ENTER_CAN
 
Platform selector
 
 IssuingState
 
 DateOfExpiry
 
 FamilyNames
 
 AcademicTitle
 
 PlaceOfResidence
 
 RestrictedID
 
 PlaceVerification
 
 PlaceOfResidenceStreet
 
 PlaceOfResidenceCity
 
 PlaceOfResidenceCountry
 
 PlaceOfResidenceZipCode
 

AusfĂĽhrliche Beschreibung

Implementation of ActivationContext for Intent based activation on Android systems.

Stop the remote service.

Start the remote service.

This state executes the remote message PACE channel establish.

This state executes the remote message IfdModifyPin.

Controller for the remote service process.

Remote service context.

State to process StartPaosResponse from Server.

State machine state: Start PAOS.

Send a redirect to the browser.

Sends a HTTP-Processing to the browser.

State to process certificates from EAC2.

Implements the parsing of TcTokenUrl in header of browser request.

Loads the tcTokenUrl for triggering the self authentication from secure storage.

State to process InputType of EAC1.

This state waits for editing of the effective CHAT.

Performs clean up of the ReaderManager, e.g.

Helper state to decide whether an error has been occurred that should be reported to the user.

Checks whether the hashes of the certificates encountered so far (i.e.

Builder for states.

Template base class for all steps taken by the state machine.

A final state which blocks the state machine before termination.

Composite state for selecting a card.

Base class for all states taken by the state machine.

Parses self authentication data from JSON data and provides its content.

Parser for the PAOS Transmit element.

Transmit objects hold a transmit request and provide access to the transmitted data via member functions.

Class represents the retrieved PAOS StartPaosResponse.

Base class for PAOS message parsers.

Class to parse InitializeFramework from server.

Class represents the retrieved PAOS Disconnect.

Class represents the retrieved PAOS DIDList.

Parse information for DidAuthenticateEacAdditional.

Class to hold information of DIDAuthenticateEACAdditional.

Parse information for DidAuthenticateEac2.

Class represents the retrieved PAOS EAC2InputType.

Parser for the PAOS DidAuthenticateEac1 element.

Class represents the retrieved PAOS EAC1InputType.

Represents a PAOS response type according to ISOCommon.xsd.

Represents a PAOS request type according to ISOCommon.xsd.

All possible paos types.

Generic Handler to detect and parse paos types.

Generate information for TransmitResponse.

Base class to create a PaosMessage.

Generate information for InitializeFrameworkResponse.

Generate information for DisconnectResponse.

Generate information for DIDListResponse.

Generate information for DIDAuthenticateResponseEAC2.

Generate information for DIDAuthenticateResponseEAC1.

Example class.

XML element for "SupportedAPI".

Base class for all XML element parser.

Store information of Eac1InputType.

Parse an XML connection handle from given stream.

Object hold the paos connection handle.

Base class for controllers controlling a workflow (using a state machine).

Controller for the self authentication process.

Controller for the PIN changing process.

Controller for the authentication process.

Workflow context.

Self authentication context.

Context for changing the Pin.

Contains the definition of the CertificateChecker class.

UIPlugIn implementation of the Websocket.

UIPlugIn implementation of QML.

Model implementation for the settings.

Model implementation for the self authentication workflow.

Model implementation for the remote service component.

Model implementation for the providers.

Model for accessing PIN, CAN, PUK, according to the currently active workflow.

A filter to search the history model.

Model implementation for displaying simple formatted text.

Model implementation for checking the ID card in "playground".

Model implementation for the PIN action.

Model implementation for the CV certificate description.

Description of recommended card position.

Model implementation for the authentication action.

Model implementation for the application.

UIPlugIn implementation of the Json API.

Enumerations of message types and additional stuff.

MsgHandlerUnknownCommand of JSON API.

Message ReaderList of JSON API.

Message Reader of JSON API.

Message Log of JSON API.

Message Invalid of JSON API.

Message INTERNAL_ERROR of JSON API.

Message InsertCard of JSON API.

Message Info of JSON API.

Message EnterPuk of JSON API.

Message EnterPin of JSON API.

Helper handler for EnterCan, EnterPin and EnterPuk of JSON API.

Message EnterNewPin of JSON API.

Message EnterCan of JSON API.

Message Change PIN of JSON API.

Message handler for GET_CERTIFICATE of JSON API.

Message BadState of JSON API.

Message Auth of JSON API.

Message API_LEVEL of JSON API.

Message MsgHandlerAccessRights of JSON API.

Base of all messages of JSON API.

Context of JSON API.

UIPlugIn implementation of the integrated SDK (C-API).

Model implementation for the reader driver table.

Abstract layer to UI implementations.

Loader to initialize UIPlugIns.

UIPlugIn implementation of the AIDL UI.

Represents history settings.

Contains the definition of the AppSettings class.

Update data implementation for application version.

Implementation of DataChannel base on web sockets.

Handler for messages on the server side of a smartphone as card reader (SaC) scenario.

WebSocketServer on the server side of a smartphone as card reader (SaC) scenario.

QTcpServer with necessary TLS handling of remote device configuration.

Remote server service to offer smartphones as card readers (SaCs).

Component advertising the smartphone as card reader (SaC) functionality on the server side.

Class that dispatches incoming and outgoing remote messages.

An interface for RemoteHandleImpl, meant to omit the dependency between card_base and remote_device.

Interface for RemoteDeviceList.

Information needed to display a remote device in the GUI and to open a websocket connection to it.

Module that creates and manages connections from a remote client to a remote server.

An interface for RemoteClientImpl, meant to omit the dependency between card_base and remote_device.

Implementation of ReaderManagerPlugIn for smartphone as card reader (SaC).

Implementation of Reader for smartphone as card reader (SaC).

Implementation of Card for smartphone as card reader (SaC).

Interface modelling a component that can send and receive data blocks in the form of QByteArray objects.

Helper to convert Result to Redirect-Result-String and some other URL stuff.

Helper to check certificates and other security stuff of TLS/SSL.

Utility class to set a timeout on a QNetworkReply.

Sends a status request to given url:port and tries to detect details and server header.

Provide a HTTP server.

Class to create http response.

Provides an UDP socket to send and receive datagrams.

Extension to QVersionNumber.

Helper to get a Randomizer.

A global mapping for errors.

Template functions that allow to map and filter over QVectors.

Helper class to provide a QMetaObject handler for enumerations.

Implements a wrapper for different APIs to get device information like android device name.

Global error code definitions.

Class that holds a table of the UpdatableFile instances currently in use.

Generic class that allows to download files from a server to the local application cache.

Tool to export data of history or selfauthentication result.

Tool to create PDF-Documents.

Controller for retrieving and presenting diagnosis info.

Contains information collected by the diagnosis functionality.

Provides information about the App release.

Class to provide information about available card readers.

Class to store configuration data about available card readers.

Parser for provider configuration files.

Class to provide information about providers.

Phone call cost representation.

Implementation of ReaderManagerPlugIn for PCSC.

Implementation of Reader for PCSC.

Implementation of card object for PC/SC *.

Implementation of ReaderManagerPlugIn for NFC on Android.

Implementation of Reader for NFC.

Implementation of Card for NFC.

Implementation of ReaderManagerPlugIn for NFC on iOS.

Implementation of Card for iOS.

Interface specifying classes that can detect the attached card reader devices on a specific platform.

Response APDU for SecureMessaging.

Worker implementation of ReaderManger thread.

Data object providing information about a reader manager plug-in.

PlugIn to control different kinds of reader managers that will be used in ReaderManager.

A configured filter used to retrieve readers.

Symmetric decryption method used for PACE.

Implements TR-03110 v2 part3 --> Secure Messaging.

Creates key according to TR 03110 Part 3 chapters A.2.3 ff.

the key agreement protocol use in PACE.

EstablishPaceChannel error code definitions.

Elliptic curve utility.

Mapping protocol for PACE domain parameters.

CMAC implementation to be used in PACE protocol.

Functions to read and write PCSC messages with a length-value encoding.

Holds the data of an InputAPDUInfo element.

Implementation of GeneralAuthenticate response APDUs.

Reference information for files on smart cards.

Data object for output of card command EstablishPaceChannel.

Data object for creation of card command DestroyPACEChannel.

Contains the CardInfo and the CardInfoFactory.

Worker for CardConnection that will do the job in ReaderManagerWorker.

Class representing a smart card.

Implementation of SecurityInfos.

Implementation of SecurityInfo.

Implementation of PACEInfo.

Implementation of EFCardSecurity.

Builder for CVC chains.

A CV certificate chain is an ordered list, where the CV certificates are ordered by the holder to authority reference relation (The holder is equivalent to the Subject-DN, the authority reference is equivalent to the Issuer-DN.)

Implementation of Card Verifiable Certificate, CVC.

Implementation of ChipAuthenticationInfo.

Implementation of Certificate Holder Authorization Template, CHAT.

Generic implementation for chain building, i.e.

Implementation of ASN.1 type CertificateDescription with OpenSSL.

Utility functions, templates and other ASN.1 related helper stuff.

Utility template functions for encoding and decoding of ASN.1 types.

Defines the AccessRight and AccessRole enum.

A simple template renderer.

Note: When using a QHash<AccessRight,...> directly or indirectly (e.g. via QSet), this header must be included before <QHash> (also indirectly via <QSet> or <QList>), or otherwise they complain about the qHash() function for AccessRight not being found.

OpenSSL type declarations

building ordered lists. The ChainBuilder is initialized with a pool of objects and a (pointer to a) function that decides if two objects have a parent child relation. Duplicates are filtered out.

All found chains are returned by the function /ref ChainBuilder::getChains().

See TR 03110.

For details see TR 03110.

If you implement a class of this PlugIn you need to register it in ReaderManager, otherwise it won't be used.

According to the concept this is done by sending the message REMOTE_READER_OFFER as a UDP broadcast.

This class controls the advertising over UDP as well as the Websocket connection management.

See TR-03112-7.

It is parameterized over the model type and contains a getter for the model. We cannot parameterize the super class AbstractState because Qt does not support template classes.

those stored in the AuthContext) are in the CertificateDescription extension of the eService certificate.

disconnects all readers, clears the card connection, ...

Extract certificates and set it to context.

Dokumentation der benutzerdefinierten Typen

◆ AgeVerificationDate

using governikus::AgeVerificationDate = typedef ASN1_STRING

◆ AuthenticatedAuxiliaryDataInternal

using governikus::AuthenticatedAuxiliaryDataInternal = typedef stack_st_AuxDataTemplate

◆ AuxDataTemplate

using governikus::AuxDataTemplate = typedef struct auxdatatemplate_st { ASN1_OBJECT* mAuxId

Defined in TR-03110-3, chapter D.2:

AuthenticatedAuxiliaryData ::= [APPLICATION 0x07] IMPLICIT SET OF AuxDataTemplate

AuxDataTemplate ::= [APPLICATION 0x13] IMPLICIT SEQUENCE { auxID OBJECT IDENTIFIER, extInfo ANY DEFINED BY auxID }

CommunityID ::= [APPLICATION 0x13] IMPLICIT OCTETSTRING

ValidityDate ::= [APPLICATION 0x13] IMPLICIT Date

AgeVerificationDate ::= [APPLICATION 0x13] IMPLICIT Date

Date ::= NumericString (SIZE (8)) – YYYYMMDD

◆ CERTIFICATEEXTENSION

using governikus::CERTIFICATEEXTENSION = typedef struct CERTIFICATEEXTENSION_st { ASN1_OBJECT* mOid

◆ CHAT

using governikus::CHAT = typedef struct chat_st { ASN1_OBJECT* mType

According to.

  • TR-03110-3, chapter C.1.5 and
  • TR-03110-3, chapter D.2 and
  • TR-03110-4, chapter 2.2.3.2 and a Certificate Holder Authorization Template for Authentication Terminals has the following structure:

Chat ::= APPLICATION [0x4C] IMPLICIT SEQUENCE { type OBJECT IDENTIFIER, template DiscretionaryData }

DiscretionaryData ::= APPLICATION [0x13] IMPLICIT OCTET STRING SIZE(5)

where the DiscretionaryData bits have the following meaning: 39 38 37 ... 32 31 30 29 ... 8 7 6 5 4 3 2 1 0 Description x x - - - - - - - - - - - - - - - - Role 1 1 - - - - - - - - - - - - - - - - CVCA 1 0 - - - - - - - - - - - - - - - - DV (official domestic) 0 1 - - - - - - - - - - - - - - - - DV (non-official / foreign) 0 0 - - - - - - - - - - - - - - - - Authentication Terminal

  • - x x x - - - - - - - - - - - - - Write Access (eID)
  • - 1 - - - - - - - - - - - - - - - DG 17
  • - - ... - - - - - - - - - - - - - - ...
  • - - - 1 - - - - - - - - - - - - - DG 22
  • - - - - x x - - - - - - - - - - - RFU: R/W Access
  • - - - - - - x x x - - - - - - - - Read Access (eID)
  • - - - - - - 1 - - - - - - - - - - DG 22
  • - - - - - - - ... - - - - - - - - - ...
  • - - - - - - - - 1 - - - - - - - - DG 1
  • - - - - - - - - - x x x x x x x x Special Functions
  • - - - - - - - - - 1 - - - - - - - Install Qualified Certificate
  • - - - - - - - - - - 1 - - - - - - Install Certificate
  • - - - - - - - - - - - 1 - - - - - PIN Management
  • - - - - - - - - - - - - 1 - - - - CAN allowed
  • - - - - - - - - - - - - - 1 - - - Privileged Terminal
  • - - - - - - - - - - - - - - 1 - - Restricted Identification
  • - - - - - - - - - - - - - - - 1 - Municipality ID Verification
  • - - - - - - - - - - - - - - - - 1 Age Verification

◆ CommunityID

governikus::CommunityID = TYPE(AccessRight::READ_DG18)

◆ CVCertificate

using governikus::CVCertificate = typedef struct cvcertificate_st { CVCertificateBody* mBody

◆ CVCertificateBody

using governikus::CVCertificateBody = typedef struct certificateprofilebody_st { ASN1_OCTET_STRING* mCertificateProfileIdentifier

◆ EcdsaPublicKey

using governikus::EcdsaPublicKey = typedef struct ecdsapublickey_st { ASN1_OBJECT* mObjectIdentifier

According to TR-03110-3 chapter D elliptic curve public keys are defined as follows:

EcdsaPublicKey ::= [APPLICATION 0x49] IMPLICIT SEQUENCE { ObjectIdentifier OBJECT IDENTIFIER, PrimeModulus [0x01] IMPLICIT UnsignedInteger OPTIONAL FirstCoefficient [0x02] IMPLICIT UnsignedInteger OPTIONAL SecondCoefficient [0x03] IMPLICIT UnsignedInteger OPTIONAL BasePoint [0x04] IMPLICIT UncompressedEllipticCurvePoint OPTIONAL OrderOfTheBasePoint [0x05] IMPLICIT UnsignedInteger OPTIONAL PublicPoint [0x06] IMPLICIT UncompressedEllipticCurvePoint Cofactor [0x07] IMPLICIT UnsignedInteger OPTIONAL }

UncompressedEllipticCurvePoint ::= OCTET STRING – see TR-03111

UnsignedInteger – see TR-03110 D.2.1.1

◆ EFCardAccess

EFCardAccess ::= SecurityInfos.

defined in TR 3110 Part 3

◆ GA_CHIPAUTHENTICATIONDATA

using governikus::GA_CHIPAUTHENTICATIONDATA = typedef struct ga_chipauthenticationdata_st { ASN1_OCTET_STRING* mNonce

According to TR-03110-3 the ASN.1 the response APDU has three protocol specific data:

Nonce ::= APPLICATION [0x01] IMPLICIT OCTET_STRING AuthenticationToken ::= APPLICATION [0x02] IMPLICIT OCTET_STRING

◆ GA_ENCRYPTEDNONCEDATA

using governikus::GA_ENCRYPTEDNONCEDATA = typedef struct ga_encryptednoncedata_st { ASN1_OCTET_STRING* mEncryptedNonce

According to TR-03110-3 the ASN.1 the response APDU has one protocol specific data:

EncryptedNonce ::= APPLICATION [0x00] IMPLICIT OCTET_STRING

◆ GA_MAPNONCEDATA

using governikus::GA_MAPNONCEDATA = typedef struct ga_mapnoncedata_st { ASN1_OCTET_STRING* mMappingData

According to TR-03110-3 the ASN.1 the response APDU has one protocol specific data:

MappingData ::= APPLICATION [0x02] IMPLICIT OCTET_STRING

◆ GA_MUTUALAUTHENTICATIONDATA

using governikus::GA_MUTUALAUTHENTICATIONDATA = typedef struct ga_mutualauthenticationdata_st { ASN1_OCTET_STRING* mAuthenticationToken

According to TR-03110-3 the ASN.1 the response APDU has three protocol specific data:

AuthenticationToken ::= APPLICATION [0x00] IMPLICIT OCTET_STRING CarCurr ::= APPLICATION [0x00] IMPLICIT OCTET_STRING OPTIONAL CarPrev ::= APPLICATION [0x00] IMPLICIT OCTET_STRING OPTIONAL

◆ GA_PERFORMKEYAGREEMENTDATA

using governikus::GA_PERFORMKEYAGREEMENTDATA = typedef struct ga_performkeyagreementdata_st { ASN1_OCTET_STRING* mEphemeralPublicKey

According to TR-03110-3 the ASN.1 the response APDU has one protocol specific data:

EphemeralPublicKey ::= APPLICATION [0x04] IMPLICIT OCTET_STRING

◆ Origin

◆ securityinfos_st

using governikus::securityinfos_st = typedef struct stack_st_securityinfo_st

◆ ValidityDate

using governikus::ValidityDate = typedef ASN1_OCTET_STRING

Dokumentation der Aufzählungstypen

◆ KeyAgreementStatus

Aufzählungswerte
SUCCESS 
RETRY_ALLOWED 
COMMUNICATION_ERROR 
FAILED 
PROTOCOL_ERROR 

Dokumentation der Funktionen

◆ ausweisapp2_get_callback_internal()

AusweisApp2Callback governikus::ausweisapp2_get_callback_internal ( )

◆ ausweisapp2_init_internal()

void governikus::ausweisapp2_init_internal ( )
Hier ist ein Graph, der zeigt, was diese Funktion aufruft:
Hier ist ein Graph der zeigt, wo diese Funktion aufgerufen wird:

◆ ausweisapp2_is_running_internal()

bool governikus::ausweisapp2_is_running_internal ( )
Hier ist ein Graph der zeigt, wo diese Funktion aufgerufen wird:

◆ ausweisapp2_join_thread_internal()

void governikus::ausweisapp2_join_thread_internal ( )
Hier ist ein Graph der zeigt, wo diese Funktion aufgerufen wird:

◆ ausweisapp2_started_internal()

void governikus::ausweisapp2_started_internal ( )

◆ chat_st()

chat_st::chat_st ( const chat_st &  pCopy)
Hier ist ein Graph, der zeigt, was diese Funktion aufruft:

◆ createNewObject()

template<typename T , typename ... Args>
T governikus::createNewObject ( Args &&...  pArgs)

◆ createNewObject< DatagramHandler * >()

◆ createNewObject< DatagramHandler *, bool >()

template<>
DatagramHandler* governikus::createNewObject< DatagramHandler *, bool > ( bool &&  pEnableListening)

◆ createNewObject< RemoteClient * >()

◆ createNewObject< RemoteConnector * >()

template<>
RemoteConnector* governikus::createNewObject< RemoteConnector * > ( )

◆ createNewObject< RemoteDispatcherClient *, IfdVersion::Version &&, const QSharedPointer< DataChannel > & >()

template<>
RemoteDispatcherClient* governikus::createNewObject< RemoteDispatcherClient *, IfdVersion::Version &&, const QSharedPointer< DataChannel > & > ( IfdVersion::Version &&  pVersion,
const QSharedPointer< DataChannel > &  pChannel 
)

◆ createNewObject< RemoteDispatcherServer *, const QSharedPointer< DataChannel > & >()

template<>
RemoteDispatcherServer* governikus::createNewObject< RemoteDispatcherServer *, const QSharedPointer< DataChannel > & > ( const QSharedPointer< DataChannel > &  pChannel)

◆ createNewObject< RemoteReaderAdvertiser *, const QString &, const QString &, quint16 & >()

template<>
RemoteReaderAdvertiser* governikus::createNewObject< RemoteReaderAdvertiser *, const QString &, const QString &, quint16 & > ( const QString &  pIfdName,
const QString &  pIfdId,
quint16 &  pPort 
)

◆ createNewObject< RemoteReaderAdvertiser *, const QString &, const QString &, quint16 &, int & >()

template<>
RemoteReaderAdvertiser* governikus::createNewObject< RemoteReaderAdvertiser *, const QString &, const QString &, quint16 &, int & > ( const QString &  pIfdName,
const QString &  pIfdId,
quint16 &  pPort,
int &  pTimerInterval 
)

◆ createNewObject< RemoteServer * >()

◆ createNewObject< RemoteWebSocketServer * >()

◆ createNewObject< ServerMessageHandler *, QSharedPointer< governikus::DataChannel > & >()

template<>
ServerMessageHandler* governikus::createNewObject< ServerMessageHandler *, QSharedPointer< governikus::DataChannel > & > ( QSharedPointer< DataChannel > &  pChannel)

◆ decodeAsn1Object()

template<typename T >
T* governikus::decodeAsn1Object ( T **  ,
const unsigned char **  ,
long   
)

Default template function for decoding an OpenSSL type.

This must be specialized for each ASN.1 type.

Hier ist ein Graph der zeigt, wo diese Funktion aufgerufen wird:

◆ decodeAsn1Object< chipauthenticationinfo_st >()

template<>
chipauthenticationinfo_st* governikus::decodeAsn1Object< chipauthenticationinfo_st > ( chipauthenticationinfo_st **  pObject,
const unsigned char **  pData,
long  pDataLen 
)

◆ decodeAsn1Object< CMS_ContentInfo >()

template<>
CMS_ContentInfo * governikus::decodeAsn1Object< CMS_ContentInfo > ( CMS_ContentInfo **  pObject,
const unsigned char **  pData,
long  pDataLen 
)

◆ decodeAsn1Object< paceinfo_st >()

template<>
paceinfo_st* governikus::decodeAsn1Object< paceinfo_st > ( paceinfo_st **  pObject,
const unsigned char **  pData,
long  pDataLen 
)

◆ decodeObject()

template<typename T >
QSharedPointer<T> governikus::decodeObject ( const QByteArray &  pData,
bool  pLogging = true 
)

Template function for decoding an OpenSSL type from DER encoded QByteArray.

Hier ist ein Graph, der zeigt, was diese Funktion aufruft:

◆ defineEnumType() [1/10]

governikus::defineEnumType ( Action  ,
NONE  ,
AUTH  ,
SELF  ,
PIN  ,
READER_SETTINGS  ,
REMOTE_SERVICE   
)

◆ defineEnumType() [2/10]

governikus::defineEnumType ( CardReturnCode  ,
UNDEFINED  ,
OK  ,
OK_PUK  ,
RETRY_ALLOWED  ,
CARD_NOT_FOUND  ,
UNKNOWN  ,
INPUT_TIME_OUT  ,
INVALID_CAN  ,
INVALID_PASSWORD  ,
INVALID_PIN  ,
INVALID_PIN_2  ,
INVALID_PIN_3  ,
INVALID_PUK  ,
COMMAND_FAILED  ,
CANCELLATION_BY_USER  ,
NEW_PIN_MISMATCH  ,
NEW_PIN_INVALID_LENGTH  ,
PIN_BLOCKED  ,
PIN_NOT_BLOCKED  ,
PUK_INOPERATIVE  ,
NO_ACTIVE_PIN_SET  ,
PROTOCOL_ERROR  ,
UNEXPECTED_TRANSMIT_STATUS   
)

◆ defineEnumType() [3/10]

governikus::defineEnumType ( CardType  ,
NONE  ,
UNKNOWN  ,
PASSPORT  ,
EID_CARD   
)

◆ defineEnumType() [4/10]

governikus::defineEnumType ( FeatureID  ,
VERIFY_PIN_START  = 0x1,
VERIFY_PIN_FINISH  = 0x2,
MODIFY_PIN_START  = 0x3,
MODIFY_PIN_FINISH  = 0x4,
GET_KEY_PRESSED  = 0x5,
VERIFY_PIN_DIRECT  = 0x6,
MODIFY_PIN_DIRECT  = 0x7,
MCT_READERDIRECT  = 0x8,
MCT_UNIVERSAL  = 0x9,
IFD_PIN_PROP  = 0xa,
ABORT  = 0xb,
SET_SPE_MESSAGE  = 0x0c,
VERIFY_PIN_DIRECT_APP_ID  = 0x0d,
MODIFY_PIN_DIRECT_APP_ID  = 0x0e,
WRITE_DISPLAY  = 0x0f,
GET_KEY  = 0x10,
IFD_DISPLAY_PROPERTIES  = 0x11,
TLV_PROPERTIES  = 0x12,
CCID_ESC_COMMAND  = 0x13,
EXECUTE_PACE  = 0x20 
)

Check with contains first for existence of the feature, otherwise this will cause an exception.

Hier ist ein Graph, der zeigt, was diese Funktion aufruft:

◆ defineEnumType() [5/10]

governikus::defineEnumType ( KeyAgreementType  ,
DH  ,
ECDH   
)

Method used for key agreement:

  • DH, i.e. Diffie-Hellman
  • ECDH, i.e. elliptic curve Diffie-Hellman

Method used for mapping:

  • GM, i.e. generic mapping
  • IM, i.e. integrated mapping

◆ defineEnumType() [6/10]

governikus::defineEnumType ( MsgLevel  ,
v1  = 1 
)

◆ defineEnumType() [7/10]

governikus::defineEnumType ( Platform  ,
ANDROID  ,
IOS  ,
MOBILE  ,
DESKTOP   
) const &

Determine platform at runtime. Use this instead of the preprocessor to allow running the mobile UI on the desktop.

◆ defineEnumType() [8/10]

governikus::defineEnumType ( ReaderManagerPlugInType  ,
UNKNOWN  ,
PCSC  ,
NFC  ,
REMOTE   
)

Is the interface / daemon process etc. enabled?

Is there a device/interface?

◆ defineEnumType() [9/10]

governikus::defineEnumType ( RemoteCardMessageType  ,
IFDEstablishContext  ,
IFDEstablishContextResponse  ,
IFDGetStatus  ,
IFDStatus  ,
IFDConnect  ,
IFDConnectResponse  ,
IFDDisconnect  ,
IFDDisconnectResponse  ,
IFDError  ,
IFDTransmit  ,
IFDTransmitResponse  ,
IFDEstablishPACEChannel  ,
IFDEstablishPACEChannelResponse  ,
IFDModifyPIN  ,
IFDModifyPINResponse  ,
UNDEFINED   
)
Hier ist ein Graph, der zeigt, was diese Funktion aufruft:

◆ defineEnumType() [10/10]

governikus::defineEnumType ( SelfAuthDataPermission  ,
UNKNOWN  ,
ALLOWED  ,
PROHIBITED  ,
NOTONCHIP   
)

◆ defineTypedEnumType() [1/2]

governikus::defineTypedEnumType ( AccessRight  ,
uint  ,
WRITE_DG17  = 37,
WRITE_DG18  = 36,
WRITE_DG19  = 35,
WRITE_DG20  = 34,
WRITE_DG21  = 33,
RFU_32  = 32,
RFU_31  = 31,
RFU_30  = 30,
RFU_29  = 29,
READ_DG21  = 28,
READ_DG20  = 27,
READ_DG19  = 26,
READ_DG18  = 25,
READ_DG17  = 24,
READ_DG16  = 23,
READ_DG15  = 22,
READ_DG14  = 21,
READ_DG13  = 20,
READ_DG12  = 19,
READ_DG11  = 18,
READ_DG10  = 17,
READ_DG09  = 16,
READ_DG08  = 15,
READ_DG07  = 14,
READ_DG06  = 13,
READ_DG05  = 12,
READ_DG04  = 11,
READ_DG03  = 10,
READ_DG02  = 9,
READ_DG01  = 8,
INSTALL_QUAL_CERT  = 7,
INSTALL_CERT  = 6,
PIN_MANAGEMENT  = 5,
CAN_ALLOWED  = 4,
PRIVILEGED_TERMINAL  = 3,
RESTRICTED_IDENTIFICATION  = 2,
COMMUNITY_ID_VERIFICATION  = 1,
AGE_VERIFICATION  = 0 
)

◆ defineTypedEnumType() [2/2]

governikus::defineTypedEnumType ( StatusCode  ,
quint16  ,
EMPTY  = 0x0000,
INVALID  = 0x0001,
SUCCESS  = 0x9000,
NO_PKCS15_APP  = 0x6200,
END_OF_FILE  = 0x6282,
PIN_DEACTIVATED  = 0x6283,
FCI_NO_ISO7816_4  = 0x6284,
VERIFICATION_FAILED  = 0x6300,
INPUT_TIMEOUT  = 0x6400,
INPUT_CANCELLED  = 0x6401,
PASSWORDS_DIFFER  = 0x6402,
PASSWORD_OUTOF_RANGE  = 0x6403,
CARD_EJECTED_AND_REINSERTED  = 0x64a2,
EEPROM_CELL_DEFECT  = 0x6581,
SECURITY_ENVIRONMENT  = 0x6600,
WRONG_LENGTH  = 0x6700,
NO_BINARY_FILE  = 0x6981,
LAST_CHAIN_CMD_EXPECTED  = 0x6883,
ACCESS_DENIED  = 0x6982,
PASSWORD_COUNTER_EXPIRED  = 0x6983,
DIRECTORY_OR_PASSWORD_LOCKED_OR_NOT_ALLOWED  = 0x6984,
NO_PARENT_FILE  = 0x6985,
NOT_YET_INITIALIZED  = 0x6985,
NO_CURRENT_DIRECTORY_SELECTED  = 0x6986,
DATAFIELD_EXPECTED  = 0x6987,
INVALID_SM_OBJECTS  = 0x6988,
COMMAND_NOT_ALLOWED  = 0x69f0,
INVALID_DATAFIELD  = 0x6a80,
ALGORITHM_ID  = 0x6a81,
FILE_NOT_FOUND  = 0x6a82,
RECORD_NOT_FOUND  = 0x6a83,
INVALID_PARAMETER  = 0x6a86,
LC_INCONSISTANT  = 0x6a87,
PASSWORD_NOT_FOUND  = 0x6a88,
ILLEGAL_OFFSET  = 0x6b00,
UNSUPPORTED_CLA  = 0x6e00,
CANT_DISPLAY  = 0x6410,
INVALID_P1P2  = 0x6a00,
UNSUPPORTED_INS  = 0x6d00,
PIN_BLOCKED  = 0x63c0,
PIN_SUSPENDED  = 0x63c1,
PIN_RETRY_COUNT_2  = 0x63c2 
)

◆ encode()

QByteArray governikus::encode ( ) const

◆ encodeAsn1Object()

template<typename T >
int governikus::encodeAsn1Object ( T ,
unsigned char **   
)

Default template function for encoding an OpenSSL type.

This must be specialized for each ASN.1 type.

Hier ist ein Graph der zeigt, wo diese Funktion aufgerufen wird:

◆ encodeObject()

template<typename T >
QByteArray governikus::encodeObject ( T pObject)

Template function for encoding an OpenSSL type as DER encoded QByteArray.

Hier ist ein Graph, der zeigt, was diese Funktion aufruft:
Hier ist ein Graph der zeigt, wo diese Funktion aufgerufen wird:

◆ filter()

template<typename T >
std::enable_if<!std::is_void<T>::value, QVector<T> >::type governikus::filter ( const std::function< bool(const T &)> &  pFunc,
const QVector< T > &  pItems 
)

◆ freeAsn1Object()

template<typename T >
void governikus::freeAsn1Object ( T )

Default template function for freeing an OpenSSL type.

This must be specialized for each ASN.1 type.

Hier ist ein Graph der zeigt, wo diese Funktion aufgerufen wird:

◆ freeAsn1Object< chipauthenticationinfo_st >()

◆ freeAsn1Object< CMS_ContentInfo >()

template<>
void governikus::freeAsn1Object< CMS_ContentInfo > ( CMS_ContentInfo *  pObject)

◆ freeAsn1Object< paceinfo_st >()

template<>
void governikus::freeAsn1Object< paceinfo_st > ( paceinfo_st pObject)

◆ generateMailBody()

QString governikus::generateMailBody ( const GlobalStatus pStatus,
const QUrl &  pServiceUrl,
bool  pPercentEncoding,
bool  pAddLogNotice 
)
Hier ist ein Graph, der zeigt, was diese Funktion aufruft:
Hier ist ein Graph der zeigt, wo diese Funktion aufgerufen wird:

◆ getAccessRights()

QSet<AccessRight> governikus::getAccessRights ( ) const
Hier ist ein Graph der zeigt, wo diese Funktion aufgerufen wird:

◆ getAccessRole()

AccessRole CHAT::getAccessRole ( ) const

◆ getBody()

const CVCertificateBody& governikus::getBody ( ) const
Hier ist ein Graph der zeigt, wo diese Funktion aufgerufen wird:

◆ getCertificateEffectiveDate()

QDate CVCertificateBody::getCertificateEffectiveDate ( ) const
Hier ist ein Graph, der zeigt, was diese Funktion aufruft:
Hier ist ein Graph der zeigt, wo diese Funktion aufgerufen wird:

◆ getCertificateExpirationDate()

QDate CVCertificateBody::getCertificateExpirationDate ( ) const
Hier ist ein Graph, der zeigt, was diese Funktion aufruft:
Hier ist ein Graph der zeigt, wo diese Funktion aufgerufen wird:

◆ getCertificateHolderReference()

QByteArray CVCertificateBody::getCertificateHolderReference ( ) const
Hier ist ein Graph, der zeigt, was diese Funktion aufruft:

◆ getCertificateProfileIdentifier()

QByteArray CVCertificateBody::getCertificateProfileIdentifier ( ) const
Hier ist ein Graph, der zeigt, was diese Funktion aufruft:

◆ getCertificationAuthorityReference()

QByteArray CVCertificateBody::getCertificationAuthorityReference ( ) const
Hier ist ein Graph, der zeigt, was diese Funktion aufruft:

◆ getCHAT()

const CHAT & CVCertificateBody::getCHAT ( ) const

◆ getDerSignature()

QByteArray CVCertificate::getDerSignature ( ) const

◆ getEcdsaSignature()

const ECDSA_SIG * CVCertificate::getEcdsaSignature ( ) const

◆ getEcKey()

const EC_KEY * EcdsaPublicKey::getEcKey ( ) const

◆ getEnumName()

template<typename T >
QLatin1String governikus::getEnumName ( T  pType)
inline
Hier ist ein Graph, der zeigt, was diese Funktion aufruft:
Hier ist ein Graph der zeigt, wo diese Funktion aufgerufen wird:

◆ getExtensions()

QMap< QByteArray, QByteArray > CVCertificateBody::getExtensions ( ) const
Hier ist ein Graph, der zeigt, was diese Funktion aufruft:

◆ getHashAlgorithm()

QCryptographicHash::Algorithm CVCertificateBody::getHashAlgorithm ( ) const
Hier ist ein Graph, der zeigt, was diese Funktion aufruft:

◆ getOpenSslError()

QByteArray governikus::getOpenSslError ( )
Hier ist ein Graph der zeigt, wo diese Funktion aufgerufen wird:

◆ getPublicKey()

const EcdsaPublicKey & CVCertificateBody::getPublicKey ( ) const
Hier ist ein Graph der zeigt, wo diese Funktion aufgerufen wird:

◆ getPublicKeyOid()

QByteArray EcdsaPublicKey::getPublicKeyOid ( ) const
Hier ist ein Graph, der zeigt, was diese Funktion aufruft:

◆ getPublicKeyOidValueBytes()

QByteArray EcdsaPublicKey::getPublicKeyOidValueBytes ( ) const

Returns the raw bytes of the OID value, i.e. not the tag and not the length structure, but the value bytes.

Hier ist ein Graph, der zeigt, was diese Funktion aufruft:

◆ getRawBody()

QByteArray CVCertificate::getRawBody ( ) const

◆ getRawSignature()

QByteArray CVCertificate::getRawSignature ( ) const
Hier ist ein Graph, der zeigt, was diese Funktion aufruft:

◆ getTemplate()

QByteArray CHAT::getTemplate ( ) const

◆ getType()

QByteArray governikus::getType ( ) const
Hier ist ein Graph der zeigt, wo diese Funktion aufgerufen wird:

◆ getUncompressedPublicPoint()

QByteArray EcdsaPublicKey::getUncompressedPublicPoint ( ) const
Hier ist ein Graph, der zeigt, was diese Funktion aufruft:

◆ hasAccessRight()

bool CHAT::hasAccessRight ( AccessRight  pAccessRight) const
Hier ist ein Graph, der zeigt, was diese Funktion aufruft:

◆ initApp()

int governikus::initApp ( int &  argc,
char **  argv 
)
Hier ist ein Graph der zeigt, wo diese Funktion aufgerufen wird:

◆ isIssuedBy()

bool governikus::isIssuedBy ( const cvcertificate_st &  pIssuer) const

◆ isPlatform()

bool governikus::isPlatform ( const QObject &  object,
const Platform  selector 
)
Hier ist ein Graph der zeigt, wo diese Funktion aufgerufen wird:

◆ isValidOn()

bool CVCertificate::isValidOn ( const QDateTime &  pValidationDate) const
Hier ist ein Graph, der zeigt, was diese Funktion aufruft:

◆ map()

template<typename S , typename T >
std::enable_if<!std::is_void<T>::value, QList<T> >::type governikus::map ( const std::function< T(const S &)> &  pFunc,
const QList< S > &  pItems 
)

◆ newAsn1Object()

template<typename T >
T* governikus::newAsn1Object ( )

Default template function for creating an OpenSSL type.

This must be specialized for each ASN.1 type.

◆ newObject()

template<typename T >
QSharedPointer<T> governikus::newObject ( T pObject = newAsn1Object<T>())

Template function for creating a SharedPointer holding an ASN.1 OpenSSL type.

Hier ist ein Graph, der zeigt, was diese Funktion aufruft:

◆ operator!=() [1/3]

bool governikus::operator!= ( const CVCertificate pLeft,
const CVCertificate pRight 
)
inline

◆ operator!=() [2/3]

bool governikus::operator!= ( const TlsConfiguration pLeft,
const TlsConfiguration pRight 
)
inline

◆ operator!=() [3/3]

bool governikus::operator!= ( const VersionNumber pLeft,
const VersionNumber pRight 
)
inline

◆ operator<()

bool governikus::operator< ( const VersionNumber pLeft,
const VersionNumber pRight 
)
inline
Hier ist ein Graph, der zeigt, was diese Funktion aufruft:

◆ operator<<() [1/6]

QDebug governikus::operator<< ( QDebug  pDbg,
const CardInfo pCardInfo 
)
Hier ist ein Graph der zeigt, wo diese Funktion aufgerufen wird:

◆ operator<<() [2/6]

QDebug governikus::operator<< ( QDebug  pDbg,
const governikus::LogHandler pHandler 
)
inline

◆ operator<<() [3/6]

QDebug governikus::operator<< ( QDebug  pDbg,
const governikus::PcscReaderFeature &  pPcscReaderFeature 
)
inline

◆ operator<<() [4/6]

QDebug governikus::operator<< ( QDebug  pDbg,
const IfdVersion pVersion 
)
inline
Hier ist ein Graph, der zeigt, was diese Funktion aufruft:

◆ operator<<() [5/6]

QDebug governikus::operator<< ( QDebug  pDbg,
const MsgHandler pMsg 
)
inline
Hier ist ein Graph, der zeigt, was diese Funktion aufruft:

◆ operator<<() [6/6]

QDebug governikus::operator<< ( QDebug  pDbg,
const RemoteDeviceDescriptor pRemoteDeviceDescriptor 
)
inline
Hier ist ein Graph, der zeigt, was diese Funktion aufruft:

◆ operator=()

chat_st& governikus::operator= ( const chat_st )
delete

◆ operator==() [1/6]

bool governikus::operator== ( const CallCost pLeft,
const CallCost pRight 
)
inline

◆ operator==() [2/6]

bool governikus::operator== ( const CVCertificate pLeft,
const CVCertificate pRight 
)
inline

◆ operator==() [3/6]

bool governikus::operator== ( const LanguageString pLeft,
const LanguageString pRight 
)
inline

◆ operator==() [4/6]

bool governikus::operator== ( const ResponseApduResult pLeft,
const ResponseApduResult pRight 
)
inline
Hier ist ein Graph, der zeigt, was diese Funktion aufruft:

◆ operator==() [5/6]

bool governikus::operator== ( const TlsConfiguration pLeft,
const TlsConfiguration pRight 
)
inline

◆ operator==() [6/6]

bool governikus::operator== ( const VersionNumber pLeft,
const VersionNumber pRight 
)
inline

◆ operator>()

bool governikus::operator> ( const VersionNumber pLeft,
const VersionNumber pRight 
)
inline
Hier ist ein Graph, der zeigt, was diese Funktion aufruft:

◆ qHash()

auto governikus::qHash ( const ReaderConfigurationInfo info)
inline
Hier ist ein Graph, der zeigt, was diese Funktion aufruft:

◆ removeAccessRight()

void CHAT::removeAccessRight ( AccessRight  pAccessRight)
Hier ist ein Graph der zeigt, wo diese Funktion aufgerufen wird:

◆ removeAllAccessRights()

void CHAT::removeAllAccessRights ( )
Hier ist ein Graph, der zeigt, was diese Funktion aufruft:

◆ setAccessRights()

void CHAT::setAccessRights ( const QSet< AccessRight > &  pAccessRights)

◆ setAccessRole()

void CHAT::setAccessRole ( AccessRole  pRole)

◆ setCertificateEffectiveDate()

void CVCertificateBody::setCertificateEffectiveDate ( QDate  date)
Hier ist ein Graph, der zeigt, was diese Funktion aufruft:

◆ setCertificateExpirationDate()

void CVCertificateBody::setCertificateExpirationDate ( QDate  date)
Hier ist ein Graph, der zeigt, was diese Funktion aufruft:

◆ setTemplate()

void CHAT::setTemplate ( const QByteArray &  pValue)

◆ setType()

void CHAT::setType ( const QByteArray &  pOidAsText)

◆ singleton()

template<typename T >
T* governikus::singleton ( )

◆ STACK_OF()

governikus::STACK_OF ( CERTIFICATEEXTENSION  )

◆ toString()

char* governikus::toString ( const MessageDispatcher::Msg pMsg)
Hier ist ein Graph der zeigt, wo diese Funktion aufgerufen wird:

◆ ~chat_st()

chat_st::~chat_st ( )

Variablen-Dokumentation

◆ AcademicTitle

governikus::AcademicTitle

◆ ACCESS_RIGHTS

governikus::ACCESS_RIGHTS

◆ Address

governikus::Address = TYPE(AccessRight::READ_DG17)

◆ AddressVerification

governikus::AddressVerification = TYPE(AccessRight::COMMUNITY_ID_VERIFICATION)

◆ AgeVerification

governikus::AgeVerification = TYPE(AccessRight::AGE_VERIFICATION)

◆ API_LEVEL

governikus::API_LEVEL

◆ ArtisticName

governikus::ArtisticName = TYPE(AccessRight::READ_DG06)

◆ AUTH

governikus::AUTH

◆ BAD_STATE

governikus::BAD_STATE

◆ BirthName

governikus::BirthName = TYPE(AccessRight::READ_DG13)

◆ CanAllowed

governikus::CanAllowed = TYPE(AccessRight::CAN_ALLOWED)

◆ CERTIFICATE

governikus::CERTIFICATE

◆ CHANGE_PIN

governikus::CHANGE_PIN

◆ char

governikus::char

◆ CLASS_NOT_SUPPORTED

governikus::CLASS_NOT_SUPPORTED = 0x6e

◆ DateOfBirth

governikus::DateOfBirth = TYPE(AccessRight::READ_DG08)

◆ DateOfExpiry

governikus::DateOfExpiry

◆ DoctoralDegree

governikus::DoctoralDegree = TYPE(AccessRight::READ_DG07)

◆ DocumentType

governikus::DocumentType = TYPE(AccessRight::READ_DG01)

◆ ENTER_CAN

governikus::ENTER_CAN

◆ ENTER_NEW_PIN

governikus::ENTER_NEW_PIN

◆ ENTER_PIN

governikus::ENTER_PIN

◆ ERROR_COMMAND_NOT_ALLOWED

governikus::ERROR_COMMAND_NOT_ALLOWED = 0x69

◆ FamilyName

governikus::FamilyName = TYPE(AccessRight::READ_DG05)

◆ FamilyNames

governikus::FamilyNames

◆ FUNCTIONS_IN_CLASS_NOT_SUPPORTED

governikus::FUNCTIONS_IN_CLASS_NOT_SUPPORTED = 0x68

◆ GivenNames

governikus::GivenNames = TYPE(AccessRight::READ_DG04)

◆ GM

governikus::GM

◆ INFO

governikus::INFO

◆ INSERT_CARD

governikus::INSERT_CARD

◆ INSTRUCTION_CODE_INVALID

governikus::INSTRUCTION_CODE_INVALID = 0x6d

◆ INTERNAL_ERROR

governikus::INTERNAL_ERROR

◆ INVALID

governikus::INVALID = 0x00

◆ IssuingCountry

governikus::IssuingCountry = TYPE(AccessRight::READ_DG02)

◆ IssuingState

governikus::IssuingState

◆ LOG

governikus::LOG

◆ mAuthenticationToken

ASN1_OCTET_STRING* governikus::mAuthenticationToken

◆ mBasePoint

ASN1_OCTET_STRING* governikus::mBasePoint

◆ mCarCurr

ASN1_OCTET_STRING* governikus::mCarCurr

◆ mCarPrev

ASN1_OCTET_STRING* governikus::mCarPrev

◆ mCertificateHolderReference

ASN1_STRING* governikus::mCertificateHolderReference

◆ mCertificationAuthorityReference

ASN1_STRING* governikus::mCertificationAuthorityReference

◆ mChat

CHAT* governikus::mChat

◆ mCofactor

ASN1_OCTET_STRING* governikus::mCofactor

◆ mEcdsaSignature

ECDSA_SIG* governikus::mEcdsaSignature

◆ mEcKey

EC_KEY* governikus::mEcKey

◆ mEffectiveDate

ASN1_OCTET_STRING* governikus::mEffectiveDate

◆ mExpirationDate

ASN1_OCTET_STRING* governikus::mExpirationDate

◆ mExtInfo

ASN1_TYPE* governikus::mExtInfo

◆ mFirstCoefficient

ASN1_OCTET_STRING* governikus::mFirstCoefficient

◆ mObject1

ASN1_OCTET_STRING* governikus::mObject1

◆ mObject2

ASN1_OCTET_STRING* governikus::mObject2

◆ mObject3

ASN1_OCTET_STRING* governikus::mObject3

◆ mObject4

ASN1_OCTET_STRING* governikus::mObject4

◆ mObject5

ASN1_OCTET_STRING* governikus::mObject5

◆ mObject6

ASN1_OCTET_STRING* governikus::mObject6

◆ mObject7

ASN1_OCTET_STRING* governikus::mObject7

◆ mObject8

ASN1_OCTET_STRING* governikus::mObject8

◆ mOrderOfTheBasePoint

ASN1_OCTET_STRING* governikus::mOrderOfTheBasePoint

◆ MORE_DATA_AVAILABLE

governikus::MORE_DATA_AVAILABLE = 0x61

◆ mPrimeModulus

ASN1_OCTET_STRING* governikus::mPrimeModulus

◆ mPublicKey

EcdsaPublicKey* governikus::mPublicKey

◆ mPublicPoint

ASN1_OCTET_STRING* governikus::mPublicPoint

◆ mSecondCoefficient

ASN1_OCTET_STRING* governikus::mSecondCoefficient

◆ mSignature

SIGNATURE* governikus::mSignature

◆ mTemplate

ASN1_OCTET_STRING* governikus::mTemplate

◆ Nationality

governikus::Nationality = TYPE(AccessRight::READ_DG10)

◆ NO_PRECISE_DIAGNOSIS

governikus::NO_PRECISE_DIAGNOSIS = 0x6f

◆ NONVOLATILE_MEMORY_CHANGED_1

governikus::NONVOLATILE_MEMORY_CHANGED_1 = 0x63

◆ NONVOLATILE_MEMORY_CHANGED_2

governikus::NONVOLATILE_MEMORY_CHANGED_2 = 0x65

◆ NONVOLATILE_MEMORY_UNCHANGED_1

governikus::NONVOLATILE_MEMORY_UNCHANGED_1 = 0x62

◆ NONVOLATILE_MEMORY_UNCHANGED_2

governikus::NONVOLATILE_MEMORY_UNCHANGED_2 = 0x64

◆ PACE_CAN

governikus::PACE_CAN = 0x02

◆ PACE_MRZ

governikus::PACE_MRZ = 0x01

◆ PACE_PIN

governikus::PACE_PIN = 0x03

◆ PinManagement

governikus::PinManagement

◆ PlaceOfBirth

governikus::PlaceOfBirth = TYPE(AccessRight::READ_DG09)

◆ PlaceOfResidence

governikus::PlaceOfResidence

◆ PlaceOfResidenceCity

governikus::PlaceOfResidenceCity

◆ PlaceOfResidenceCountry

governikus::PlaceOfResidenceCountry

◆ PlaceOfResidenceStreet

governikus::PlaceOfResidenceStreet

◆ PlaceOfResidenceZipCode

governikus::PlaceOfResidenceZipCode

◆ PlaceVerification

governikus::PlaceVerification

◆ Pseudonym

governikus::Pseudonym = TYPE(AccessRight::RESTRICTED_IDENTIFICATION)

◆ quint8

governikus::quint8

◆ READER

governikus::READER

◆ READER_LIST

governikus::READER_LIST

◆ ResidencePermitI

governikus::ResidencePermitI = TYPE(AccessRight::READ_DG19)

◆ ResidencePermitII

governikus::ResidencePermitII = TYPE(AccessRight::READ_DG20)

◆ RestrictedID

governikus::RestrictedID

◆ SECURITY_ISSUE

governikus::SECURITY_ISSUE = 0x66

◆ selector

Platform governikus::selector

◆ SUCCESS

governikus::SUCCESS = 0x90

◆ UNKNOWN

governikus::UNKNOWN = 0x00

◆ UNKNOWN_COMMAND

governikus::UNKNOWN_COMMAND

◆ ValidUntil

governikus::ValidUntil = TYPE(AccessRight::READ_DG03)

◆ WriteAddress

governikus::WriteAddress = TYPE(AccessRight::WRITE_DG17)

◆ WriteCommunityID

governikus::WriteCommunityID = TYPE(AccessRight::WRITE_DG18)

◆ WriteResidencePermitI

governikus::WriteResidencePermitI = TYPE(AccessRight::WRITE_DG19)

◆ WriteResidencePermitII

governikus::WriteResidencePermitII = TYPE(AccessRight::WRITE_DG20)

◆ WRONG_LE_FIELD

governikus::WRONG_LE_FIELD = 0x6c

◆ WRONG_LENGTH

governikus::WRONG_LENGTH = 0x67

◆ WRONG_PARAMETERS_P1_P2

governikus::WRONG_PARAMETERS_P1_P2 = 0x6a

◆ WRONG_PARAMETERS_P1_P2_NO_INFO

governikus::WRONG_PARAMETERS_P1_P2_NO_INFO = 0x6b