diff options
author | tkellner <tkellner@8a26b1a7-26f0-462f-b9ef-d0e30c41f5a4> | 2012-07-10 12:16:53 +0000 |
---|---|---|
committer | tkellner <tkellner@8a26b1a7-26f0-462f-b9ef-d0e30c41f5a4> | 2012-07-10 12:16:53 +0000 |
commit | 10511e7cd7cc64b5d2ff115057ad31b84127f333 (patch) | |
tree | 580bbfef4cde878b43275188525b65b652a70350 /smcc/src/main/java/at | |
parent | 545b95a682cccde0938c9a2c4047f2fbeb30d7d2 (diff) | |
download | mocca-10511e7cd7cc64b5d2ff115057ad31b84127f333.tar.gz mocca-10511e7cd7cc64b5d2ff115057ad31b84127f333.tar.bz2 mocca-10511e7cd7cc64b5d2ff115057ad31b84127f333.zip |
Changes for cypriotic EID
git-svn-id: https://joinup.ec.europa.eu/svn/mocca/trunk@1093 8a26b1a7-26f0-462f-b9ef-d0e30c41f5a4
Diffstat (limited to 'smcc/src/main/java/at')
-rw-r--r-- | smcc/src/main/java/at/gv/egiz/smcc/CypriotEID.java | 476 | ||||
-rw-r--r-- | smcc/src/main/java/at/gv/egiz/smcc/SignatureCardFactory.java | 18 |
2 files changed, 494 insertions, 0 deletions
diff --git a/smcc/src/main/java/at/gv/egiz/smcc/CypriotEID.java b/smcc/src/main/java/at/gv/egiz/smcc/CypriotEID.java new file mode 100644 index 00000000..35556049 --- /dev/null +++ b/smcc/src/main/java/at/gv/egiz/smcc/CypriotEID.java @@ -0,0 +1,476 @@ +/* + * Copyright 2011 by Graz University of Technology, Austria + * MOCCA has been developed by the E-Government Innovation Center EGIZ, a joint + * initiative of the Federal Chancellery Austria and Graz University of Technology. + * + * Licensed under the EUPL, Version 1.1 or - as soon they will be approved by + * the European Commission - subsequent versions of the EUPL (the "Licence"); + * You may not use this work except in compliance with the Licence. + * You may obtain a copy of the Licence at: + * http://www.osor.eu/eupl/ + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the Licence is distributed on an "AS IS" basis, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the Licence for the specific language governing permissions and + * limitations under the Licence. + * + * This product combines work with different licenses. See the "NOTICE" text + * file for details on the various modules and licenses. + * The "NOTICE" text file is part of the distribution. Any derivative works + * that you distribute must include a readable copy of the "NOTICE" text file. + */ + +package at.gv.egiz.smcc; + +import iaik.me.asn1.*; + +import java.io.ByteArrayOutputStream; +import java.io.IOException; +import java.io.InputStream; +import java.io.OutputStream; +import java.nio.ByteBuffer; +import java.nio.CharBuffer; +import java.nio.charset.Charset; +import java.security.MessageDigest; +import java.security.NoSuchAlgorithmException; + +import javax.smartcardio.Card; +import javax.smartcardio.CardChannel; +import javax.smartcardio.CardException; +import javax.smartcardio.CardTerminal; +import javax.smartcardio.CommandAPDU; +import javax.smartcardio.ResponseAPDU; + +import org.slf4j.Logger; +import org.slf4j.LoggerFactory; + +import at.gv.egiz.smcc.SignatureCard.KeyboxName; +import at.gv.egiz.smcc.cio.ObjectDirectory; +import at.gv.egiz.smcc.pin.gui.ModifyPINGUI; +import at.gv.egiz.smcc.pin.gui.PINGUI; +import at.gv.egiz.smcc.util.ISO7816Utils; +import at.gv.egiz.smcc.util.SMCCHelper; +import at.gv.egiz.smcc.util.TransparentFileInputStream; + +public class CypriotEID extends AbstractSignatureCard implements + PINMgmtSignatureCard { + + private final Logger log = LoggerFactory.getLogger(ACOSCard.class); + + public static final byte KID_PUK_SIG = (byte) 0x02; + + public static final byte KID_PIN_SIG = (byte) 0x01; + + public static final byte[] CD_ID = new byte[] { (byte) 0x70, (byte) 0x05 }; + + public static final byte[] MF_ID = new byte[] { (byte) 0x3f, (byte) 0x00 }; + + public static final byte[] ADF_AWP_ID = new byte[] { (byte) 0xad, + (byte) 0xf1 }; + + public static final byte[] AID_SIG = new byte[] { (byte) 0xA0, (byte) 0x00, + (byte) 0x00, (byte) 0x00, (byte) 0x77, (byte) 0x01, (byte) 0x08, + (byte) 0x00, (byte) 0x07, (byte) 0x00, (byte) 0x00, (byte) 0xFE, + (byte) 0x00, (byte) 0x00, (byte) 0x01, (byte) 0x00 }; + + PinInfo pinPinInfo, pukPinInfo; + + ObjectDirectory od; + + protected byte[] cert_id; + + @Override + public void init(Card card, CardTerminal cardTerminal) { + super.init(card, cardTerminal); + + log.info("Cypriot EID found"); + + pinPinInfo = new PinInfo(4, 8, "[0-9]", "at/gv/egiz/smcc/CypriotEID", + "sig.pin", KID_PIN_SIG, AID_SIG, 3); + + //pinPinInfo.setActive(3); + + pukPinInfo = new PinInfo(4, 8, "[0-9]", "at/gv/egiz/smcc/CypriotEID", + "sig.puk", KID_PUK_SIG, AID_SIG, 3); + + try { + this.exec_readcd(getCardChannel()); + } catch (CardException e) { + // TODO Auto-generated catch block + e.printStackTrace(); + } catch (SignatureCardException e) { + // TODO Auto-generated catch block + e.printStackTrace(); + } catch (IOException e) { + // TODO Auto-generated catch block + e.printStackTrace(); + } + } + + @Override + public byte[] getCertificate(KeyboxName keyboxName, PINGUI pinGUI) + throws SignatureCardException, InterruptedException { + CardChannel channel = getCardChannel(); + + try { + return exec_readcert(channel); + } catch (CardException e) { + // TODO Auto-generated catch block + e.printStackTrace(); + } catch (IOException e) { + // TODO Auto-generated catch block + e.printStackTrace(); + } + + return null; + } + + @Override + public byte[] getInfobox(String infobox, PINGUI pinGUI, String domainId) + throws SignatureCardException, InterruptedException { + throw new IllegalArgumentException("Infobox '" + infobox + + "' not supported."); + } + + @Override + public byte[] createSignature(InputStream input, KeyboxName keyboxName, + PINGUI pinGUI, String alg) throws SignatureCardException, + InterruptedException, IOException { + + byte AlgID = 0; + + MessageDigest md; + try { + if (KeyboxName.SECURE_SIGNATURE_KEYPAIR.equals(keyboxName) + && (alg == null || "http://www.w3.org/2000/09/xmldsig#rsa-sha1".equals(alg))) { + AlgID = (byte) 0x12; // SHA-1 with padding according to PKCS#1 block type 01 + md = MessageDigest.getInstance("SHA-1"); + } else if (KeyboxName.SECURE_SIGNATURE_KEYPAIR.equals(keyboxName) + && "http://www.w3.org/2001/04/xmldsig-more#rsa-sha256".equals(alg)) { + AlgID = (byte) 0x41; // SHA-256 with padding according to PKCS#1 + md = MessageDigest.getInstance("SHA256"); + } else { + throw new SignatureCardException("Card does not support signature algorithm " + alg + "."); + } + } catch (NoSuchAlgorithmException e) { + log.error("Failed to get MessageDigest.", e); + throw new SignatureCardException(e); + } + + byte[] digest = new byte[md.getDigestLength()]; + for (int l; (l = input.read(digest)) != -1;) { + md.update(digest, 0, l); + } + digest = md.digest(); + + try + { + CardChannel channel = getCardChannel(); + + // SELECT application + exec_selectADF(channel); + + // MANAGE SECURITY ENVIRONMENT : SET DST + exec_MSE(channel, AlgID); + // VERIFY + verifyPINLoop(channel, pinPinInfo, pinGUI); + + // PERFORM SECURITY OPERATION : COMPUTE DIGITAL SIGNATRE + return exec_sign(channel, digest); + } + catch (Exception e) { + e.printStackTrace(); + return null; + } + } + + @Override + public PinInfo[] getPinInfos() throws SignatureCardException { + // TODO Auto-generated method stub + return new PinInfo[] { pinPinInfo }; + } + + @Override + public void verifyPIN(PinInfo pinInfo, PINGUI pinGUI) + throws LockedException, NotActivatedException, CancelledException, + SignatureCardException, InterruptedException { + CardChannel channel = getCardChannel(); + + try { + // SELECT application + exec_selectADF(channel); + // VERIFY + verifyPINLoop(channel, pinInfo, pinGUI); + } catch (CardException e) { + log.info("Failed to verify PIN.", e); + throw new SignatureCardException("Failed to verify PIN.", e); + } + } + + @Override + public void changePIN(PinInfo pinInfo, ModifyPINGUI changePINGUI) + throws LockedException, NotActivatedException, CancelledException, + PINFormatException, SignatureCardException, InterruptedException { + CardChannel channel = getCardChannel(); + + exec_unblockPIN(channel, changePINGUI); + } + + @Override + public void activatePIN(PinInfo pinInfo, ModifyPINGUI activatePINGUI) + throws CancelledException, SignatureCardException, + InterruptedException { + log.error("ACTIVATE PIN not supported by Cypriotic EID"); + throw new SignatureCardException("PIN activation not supported by this card."); + } + + @Override + public void unblockPIN(PinInfo pinInfo, ModifyPINGUI pukGUI) + throws CancelledException, SignatureCardException, + InterruptedException { + CardChannel channel = getCardChannel(); + + exec_unblockPIN(channel, pukGUI); + } + + // ////////////////////////////////////////////////////////////////////// + // PROTECTED METHODS (assume exclusive card access) + // ////////////////////////////////////////////////////////////////////// + + protected void verifyPINLoop(CardChannel channel, PinInfo spec, + PINGUI provider) throws InterruptedException, CardException, + SignatureCardException { + + int retries = -1; + do { + retries = verifyPIN(channel, spec, provider, retries); + } while (retries > 0); + } + + protected int verifyPIN(CardChannel channel, PinInfo pinInfo, + PINGUI provider, int retries) throws InterruptedException, + CardException, SignatureCardException { + + char[] pin = provider.providePIN(pinInfo, pinInfo.retries); + + byte[] ascii_pin = encodePIN(pin); + exec_selectADF(channel); + + ResponseAPDU resp = channel.transmit(new CommandAPDU(0x00, 0x20, 0x00, + pinInfo.getKID(), ascii_pin)); + + if (resp.getSW() == 0x9000) { + pinInfo.setActive(pinInfo.maxRetries); + return -1; + } + if (resp.getSW() >> 4 == 0x63c) { + pinInfo.setActive(0x0f & resp.getSW()); + return 0x0f & resp.getSW(); + } + + switch (resp.getSW()) { + case 0x6983: + // authentication method blocked + pinInfo.setBlocked(); + throw new LockedException(); + + default: + String msg = "VERIFY failed. SW=" + + Integer.toHexString(resp.getSW()); + log.info(msg); + pinInfo.setUnknown(); + throw new SignatureCardException(msg); + } + + } + + private byte[] encodePIN(char[] pin) + { + return Charset.forName("ASCII").encode( + CharBuffer.wrap(pin)).array(); + } + + protected void exec_unblockPIN(CardChannel channel, ModifyPINGUI changePINGUI) throws CancelledException, InterruptedException + { + char[] PUK = changePINGUI.provideCurrentPIN(pukPinInfo, pukPinInfo.retries); + char[] newPIN = changePINGUI.provideNewPIN(pinPinInfo); + + byte[] ascii_puk = encodePIN(PUK); + + byte[] ascii_pin = encodePIN(newPIN); + + try { + log.debug("PUK: " + new String(PUK) + "(" + getHexString(ascii_puk) + ") NEW PIN: " + + new String(newPIN) + "(" + getHexString(ascii_pin) + ")"); + } catch (Exception e) { + // TODO Auto-generated catch block + e.printStackTrace(); + } + + // TODO: INPUT checking PIN SIZES etc. + /* + try { + exec_selectADF(channel); + + ResponseAPDU resp = channel.transmit(new CommandAPDU(0x00, 0x20, 0x00, + pukPinInfo.getKID(), ascii_puk)); + + if (resp.getSW() == 0x9000) { + pukPinInfo.setActive(pukPinInfo.maxRetries); + } + else + { + log.debug("WRONG PUK CODE!! SW=" + resp.getSW()); + return; + } + + resp = channel.transmit(new CommandAPDU(0x00, 0x2C, 0x02, + pinPinInfo.getKID(), ascii_pin)); + + if (resp.getSW() == 0x9000) { + pinPinInfo.setActive(pinPinInfo.maxRetries); + } + else + { + log.debug("FAILED TO SET PIN! SW=" + resp.getSW()); + } + + } catch (CardException e) { + // TODO Auto-generated catch block + e.printStackTrace(); + } catch (SignatureCardException e) { + // TODO Auto-generated catch block + e.printStackTrace(); + } + */ + } + + protected byte[] exec_readcert(CardChannel channel) throws CardException, + SignatureCardException, IOException { + if(cert_id == null) + { + exec_readcd(channel); + } + + /*if(cert_id == null) + { + throw CardException("Failed to read the certificate id"); + }*/ + + exec_selectADF(channel); + exec_selectFILE(channel, cert_id); + + return exec_readBinary(channel); + } + + protected void exec_readcd(CardChannel channel) throws CardException, + SignatureCardException, IOException + { + exec_selectADF(channel); + exec_selectFILE(channel, CD_ID); + + byte[] cd_buffer = exec_readBinary(channel); + + // TODO interpret CD => get CERT ID + + cert_id = new byte[] { (byte) 0x34, (byte) 0x01 }; + } + + protected void exec_selectADF(CardChannel channel) throws CardException, + SignatureCardException { + + exec_selectFILE(channel, MF_ID); + exec_selectFILE(channel, ADF_AWP_ID); + + } + + + + protected byte[] exec_selectFILE(CardChannel channel, byte[] file_id) + throws CardException, SignatureCardException { + ResponseAPDU resp = channel.transmit(new CommandAPDU(0x00, 0xA4, 0x01, + 0x0C, file_id)); + + if (resp.getSW() != 0x9000) { + String msg = "Failed to select File=" + + SMCCHelper.toString(file_id) + " SW=" + + Integer.toHexString(resp.getSW()) + "."; + log.info(msg); + throw new SignatureCardException(msg); + } + + return resp.getBytes(); + } + + protected void exec_MSE(CardChannel channel, byte algoID) throws CardException + { + byte[] secure_setup = new byte[] { (byte) 0x80, (byte) 0x01, algoID, // Algorithm setup + (byte) 0x84, (byte) 0x01, (byte) 0x81 }; // Key setup + + ResponseAPDU resp = channel.transmit(new CommandAPDU(0x00, 0x22, + 0x41, 0xB6, secure_setup)); + } + + protected byte[] exec_sign(CardChannel channel, byte[] hash) throws CardException + { + ResponseAPDU resp = channel.transmit(new CommandAPDU(0x00, 0x2A, + 0x9E, 0x9A, hash)); + + return resp.getData(); + } + + protected byte[] exec_readBinary(CardChannel channel) throws CardException, + IOException, SignatureCardException { + ByteArrayOutputStream buffer = new ByteArrayOutputStream(); + boolean repeat = true; + + int offset = 0; + + do { + int offset_lo = offset % 0xFF; + int offset_hi = offset / 0xFF; + + ResponseAPDU resp = channel.transmit(new CommandAPDU(0x00, 0xB0, + offset_hi, offset_lo, 0x00)); + + if (resp.getSW() != 0x9000) { + String msg = "Failed to read binary SW=" + + Integer.toHexString(resp.getSW()) + "."; + log.info(msg); + throw new SignatureCardException(msg); + } + + byte[] data = resp.getData(); + + buffer.write(data); + + repeat = data.length == 231; + + offset += data.length; + } while (repeat); + + byte[] buf = buffer.toByteArray(); + + log.debug("BINARY READ: "); + + try { + log.debug(getHexString(buf)); + } catch (Exception e) { + // TODO Auto-generated catch block + e.printStackTrace(); + } + + return buf; + } + + + public static String getHexString(byte[] b) throws Exception { + String result = ""; + for (int i=0; i < b.length; i++) { + result += ":" + + Integer.toString( ( b[i] & 0xff ) + 0x100, 16).substring( 1 ); + } + return result; + } +} diff --git a/smcc/src/main/java/at/gv/egiz/smcc/SignatureCardFactory.java b/smcc/src/main/java/at/gv/egiz/smcc/SignatureCardFactory.java index 6984e0d5..2d43e375 100644 --- a/smcc/src/main/java/at/gv/egiz/smcc/SignatureCardFactory.java +++ b/smcc/src/main/java/at/gv/egiz/smcc/SignatureCardFactory.java @@ -387,6 +387,24 @@ public class SignatureCardFactory { (byte) 0xff, (byte) 0xff }, "at.gv.egiz.smcc.BELPICCard")); + // Cypriotic EID + supportedCards.add(new SupportedCard( + // ATR [3B:DD:18:00:81:31:FE.45:80:F9:A0:00:00:00:77:01:08:00:07::90:00:FE] + new byte[] { (byte) 0x3b, (byte) 0xdd, (byte) 0x18, + (byte) 0x00, (byte) 0x81, (byte) 0x31, (byte) 0xfe, + (byte) 0x45, (byte) 0x80, (byte) 0xf9, (byte) 0xa0, + (byte) 0x00, (byte) 0x00, (byte) 0x00, (byte) 0x77, + (byte) 0x01, (byte) 0x08, (byte) 0x00, (byte) 0x07, + (byte) 0x90, (byte) 0x00, (byte) 0xfe}, + // mas (ff:ff:ff:ff:ff:ff:ff:ff:ff:ff:ff:ff:ff:ff:ff:ff:ff:ff:ff:ff:ff:ff) + new byte[] { (byte) 0xff, (byte) 0xff, (byte) 0xff, + (byte) 0xff, (byte) 0xff, (byte) 0xff, (byte) 0xff, + (byte) 0xff, (byte) 0xff, (byte) 0xff, (byte) 0xff, + (byte) 0xff, (byte) 0xff, (byte) 0xff, (byte) 0xff, + (byte) 0xff, (byte) 0xff, (byte) 0xff, (byte) 0xff, + (byte) 0xff, (byte) 0xff, (byte) 0xff}, + "at.gv.egiz.smcc.CypriotEID")); + // ES DNIe supportedCards.add(new SupportedCard( // ATR [3b:7f:38:00:00:00:6a:44:4e:49:65:20:02:4c:34:01:13:03:90:00] |