AAL2ChangeEncryptedStaticPasswordEs
  • 22 Jan 2025
  • 1 Minute à lire
  • Sombre
    Lumière
  • PDF

AAL2ChangeEncryptedStaticPasswordEs

  • Sombre
    Lumière
  • PDF

The content is currently unavailable in French. You are viewing the default English version.
Résumé de l’article

Function prototype

aat_int32 AAL2ChangeEncryptedStaticPasswordEs (
                                         TDigipassBlob*   DPData,
                                         TKernelParms*    CallParms,
                                         aat_ascii*       Challenge,
                                         aat_ascii*       CESPR,
                                         aat_ascii*       aServerPublicKey);

Description

This function is an extension of AAL2ChangeEncryptedStaticPassword. It includes the enhanced security feature. This feature prevents potential man-in-the-middle attacks in the architecture integrating software Digipass authenticators. A server public key, such as a certificate, can be used in input to diversify the challenge.

This parameter is optional. If it is not used, this function is identical with AAL2ChangeEncryptedStaticPassword.

Parameters

  Table: Parameters (AAL2ChangeEncryptedStaticPasswordEs)
TypeNameUseDescription
TDigipassBlob *DPDataI/Oauthenticator application BLOB. Upon return from the function call, this BLOB must be rewritten to the application database to reflect changes.
TKernelParms * CallParmsIStructure of runtime parameters to use during this function call.
aat_ascii * ChallengeI

String of 16 numeric characters, left-justified, null-terminated or right-padded with spaces. This parameter holds the challenge that was proposed to the user to generate the CESPR. This parameter is mandatory.

aat_ascii * CESPRI16 hexadecimal characters, left-justified, null-terminated or right-padded with spaces. This parameter is the change-encrypted-static-password request generated by the Digipass 110 applet.
aat_ascii *aServerPublicKeyIString of up to 1024 hexadecimal characters, null-terminated. This parameter is used as a diversifier to prevent man-in-the-middle attacks. If this parameter is NULL, diversification will not take place.

Return codes

  Table: Return codes (AAL2ChangeEncryptedStaticPasswordEs)
CodeMeaningCodeMeaning
0Success809Encrypted static password not supported
131Missing required challenge1000Function does not support EMV-CAP
166Missing required CESPR1103Unlock Version 2 not supported
167Input data corrupted (challenge or CESPR)1118

Unsupported BLOB

169CESPR character invalid-101Challenge too short
412Invalid checksum software-102Challenge too long
413Invalid Base64 format-151CESPR too short
510Invalid Digipass data pointer-152CESPR too long
803New encrypted static password too short-1501Memory allocation failed
804New encrypted static password too long  

Cet article vous a-t-il été utile ?

Changing your password will log you out immediately. Use the new password to log back in.
First name must have atleast 2 characters. Numbers and special characters are not allowed.
Last name must have atleast 1 characters. Numbers and special characters are not allowed.
Enter a valid email
Enter a valid password
Your profile has been successfully updated.
ESC

Ozzy, facilitant la découverte de connaissances grâce à l’intelligence conversationnelle