In my Java Card applet, I am using ECC to generate a secret, then using this to generate an DES key, which i then use to encrypt some plaintext. Whenever I try to output the result of this encryption, I get an APDUException.ILLEGAL_USE exception, whcih should be to do with previously invoking setOutgoing(), I have commented out all my previous setOutgoing() calls and it is still occuring.
Is anyone able to help me fix this problem?
I would really appeciate any help possible on this, i have been stuck on it for days.
My code and APDU script is below
Code: Select all
/*
* @file ECCSample.java
* @version v1.0
* Package AID: 4A617661436172644F53
* Applet AID: 4A617661436172644F5304
* @brief The ALgorithm of ECC Sample Code in JavaCard API Specification
* @comment The purpose of this example is only used to show the usage of API functions and there is no practical significance.
* @copyright Copyright(C) 2016 JavaCardOS Technologies Co., Ltd. All rights reserved.
*/
package SecureIMCard;
import javacard.framework.*;
import javacard.security.*;
import javacardx.crypto.Cipher;
public class SecureIMCard extends Applet
{
/*SELECT the APDU: 00 A4 04 00 0A A0 40 41 42 43 44 45 46 10 01 00
* Gen the ECC keypair: 80 41 01 00 00 -> 90 00
* Gen the secret: 80 50 00 00 00 -> B7 78 66 03 0E 65 5F 06 A0 74 17 CA DB C0 38 90 E7 6E 53 B4 [90 00] (20 byte hex secret)
* Pad to create DES key: 80 51 00 00 00 -> B7 78 66 03 0E 65 5F 06 A0 74 17 CA DB C0 38 90 E7 6E 53 B4 00 00 00 00 [90 00] (Above but with 4 bytes of 00 padding)
* Do DES Cipher (encryption): 80 60 00 00 08 68 65 6C 6C 6F 62 6F 62 00 -> 48 6F 9F 44 40 FC ED 44 [90 00] ("hellobob encrypted")
* Do DES Cipher (decryption): 80 60 01 00 08 48 6F 9F 44 40 FC ED 44 00 -> 68 65 6C 6C 6F 62 6F 62 [90 00] ("hellobob decrypted")
* */
private static final byte INS_ECC_GEN_KEYPAIR = (byte) 0x41;
private static final byte INS_ECC_GENA = (byte) 0x42;
private static final byte INS_ECC_GENP = (byte) 0x43;
private static final byte INS_ECC_GENS = (byte) 0x44;
private static final byte INS_ECC_GENW = (byte) 0x45;
private static final byte INS_ECC_SETS = (byte) 0x46;
private static final byte INS_ECC_SETW = (byte) 0x47;
private static final byte INS_ECC_SIGN = (byte) 0x48;
private static final byte INS_ECC_VERIFY = (byte) 0x49;
private static final byte INS_ECC_GEN_SECRET = (byte) 0x50;
private static final byte INS_ECC_GEN_3DES_KEY = (byte) 0x51;
private static final byte INS_ECC_SET_INPUT_TEXT = (byte) 0x59;
private static final byte INS_ECC_DO_DES_CIPHER = (byte) 0x60;
private static final short SW_CRYPTO_UNINITIALIZED_KEY = (short) 0x6B81;
private static final short SW_CRYPTO_INVALID_INIT = (short) 0x6B82;
private static final short SW_CRYPTO_ILLEGAL_USE = (short) 0x6B83;
private static final short SW_CRYPTO_ILLEGAL_VALUE = (short) 0x6B84;
private static final short SW_CRYPTO_NO_SUCH_ALGORITHM = (short) 0x6B85;
private static final short SW_APDU_ILLEGAL_USE = (short) 0x6C81;
private static final short SW_APDU_IO_ERROR = (short) 0x6C82;
private static final short SW_APDU_BAD_LENGTH = (short) 0x6C83;
private static final short SW_APDU_T1_IFD_ABORT = (short) 0x6C84;
private static final short SW_APDU_NO_T0_GETRESPONSE = (short) 0x6C85;
private static final short SW_APDU_NO_T0_REISSUE = (short) 0x6C86;
private static final short SW_APDU_BUFFER_BOUNDS = (short) 0x6C87;
private static final short SW_NEGATIVE_ARRAY = (short) 0x6D80;
private static final short SW_SYSTEM_EXCEPTION = (short) 0x6D80;
private static final short SW_ARRAY_INDEX_OOB = (short) 0x6B91;
private static final short SW_NULL_POINTER = (short) 0x6D80;
private static final short SW_UNKNOWN_CRYPTO_EXCEPTION = (short) 0x6E80;
private static final short SW_UNKNOWN_APDU_EXCEPTION = (short) 0x6E81;
private static final short SW_TRANSACTION_EXCEPTIOn = (short) 0x6F80;
private static final short SW_SECURITY_EXCEPTION = (short) 6E80;
private static final short FLAGS_SIZE = (short) 5;
private byte[] inputText;
private byte[] tempBuffer;
private byte[] flags;
private short eccKeyLen = (short) 0;
private Signature ecdsa;
private KeyAgreement ecdhc;
private KeyPair eccKey = null;
// private byte[] guestPublicKey;
private byte[] secret;
private Cipher desEcbCipher;
private byte desKeyLen;
private DESKey desKey;
private byte[] desKeyData;
private KeyPair testEccKey = null;
private boolean test;
private short inputTextLength;
public SecureIMCard()
{
try
{
//Create a transient byte array to store the temporary data
tempBuffer = JCSystem.makeTransientByteArray((short) 256, JCSystem.CLEAR_ON_DESELECT);
inputText = JCSystem.makeTransientByteArray((short) 256, JCSystem.CLEAR_ON_DESELECT);
flags = JCSystem.makeTransientByteArray(FLAGS_SIZE, JCSystem.CLEAR_ON_DESELECT);
//Create a ECC(ALG_ECDSA_SHA) object instance
ecdsa = Signature.getInstance(Signature.ALG_ECDSA_SHA, false);
ecdhc = KeyAgreement.getInstance(KeyAgreement.ALG_EC_SVDP_DH, false);
secret = new byte[24];
desEcbCipher = Cipher.getInstance(Cipher.ALG_DES_ECB_PKCS5, false);
test = false;
JCSystem.requestObjectDeletion();
}
catch (NegativeArraySizeException e)
{
ISOException.throwIt(SW_NEGATIVE_ARRAY);
}
catch (SystemException e)
{
ISOException.throwIt(SW_SYSTEM_EXCEPTION);
}
catch (CryptoException e)
{
HandleCryptoException(e);
}
}
public static void install(byte[] bArray, short bOffset, byte bLength)
{
new SecureIMCard().register(bArray, (short) (bOffset + 1), bArray[bOffset]);
}
public void process(APDU apdu)
{
try
{
if (selectingApplet())
{
return;
}
byte[] buf = apdu.getBuffer();
byte apduState = apdu.getCurrentState();
switch (buf[ISO7816.OFFSET_INS])
{
case INS_ECC_GEN_KEYPAIR:
// GEN_KEYPAIR
GenEccKeyPair(apdu);
break;
case INS_ECC_GENA:
// ECC_GENA
getEccKeyA(apdu);
break;
case INS_ECC_GENP:
// ECC_GENP
getEccKeyP(apdu);
break;
case INS_ECC_GENS:
// ECC_GENS
getEccKeyS(apdu);
break;
case INS_ECC_GENW:
// ECC_GENW
getEccKeyW(apdu);
break;
case INS_ECC_SETS: //PrivateKey
// ECC_SETS
setEccKeyS(apdu);
break;
case INS_ECC_SETW: //PublicKey
// ECC_SETW
setGuestEccKeyW(apdu);
break;
case INS_ECC_SIGN:
// ECC_SIGN
Ecc_Sign(apdu);
break;
case INS_ECC_VERIFY:
//ECC_VERIFY
Ecc_Verify(apdu);
case INS_ECC_GEN_SECRET:
Ecc_Gen_Secret(apdu);
break;
case INS_ECC_GEN_3DES_KEY:
gen3DESKeyFromSecret(apdu, secret, (short) secret.length, (short) 24);
break;
case INS_ECC_SET_INPUT_TEXT:
setInputText(apdu);
break;
case INS_ECC_DO_DES_CIPHER:
doDesCipher(apdu);
break;
default:
ISOException.throwIt(ISO7816.SW_INS_NOT_SUPPORTED);
}
}
catch (APDUException e)
{
HandleAPDUException(e);
}
}
private byte[] padSecret(byte[] unpaddedSecret, short secretSize, short keySize)
{
short amountToPad = (short) (keySize - secretSize);
for (short i = 0; i < amountToPad; i++)
{
unpaddedSecret[(short) (secretSize + i)] = (byte) 0xFF;
}
return unpaddedSecret;
}
private void gen3DESKeyFromSecret(final APDU apdu, byte[] secret, short secretSize, short keySize)
{
try
{
byte apduState = apdu.getCurrentState();
byte[] buffer = apdu.getBuffer();
desKey = (DESKey) KeyBuilder.buildKey(KeyBuilder.TYPE_DES_TRANSIENT_RESET, KeyBuilder.LENGTH_DES3_3KEY, false);
desKeyData = padSecret(secret, secretSize, keySize);
desKey.setKey(desKeyData, (short) 0);
desKeyLen = desKey.getKey(buffer, (short) 0);
// Util.arrayCopyNonAtomic(publicKey, (short) 0, buffer, (short) 0, publicKeyLength);
// Util.arrayCopyNonAtomic(privateKeyByte, (short) 0, buffer, (short) 0, privateKeyLength);
/*apdu.setOutgoingAndSend((short) 0, desKeyLen);*/
sendAPDU(apdu, buffer, (short) 0, desKeyLen);
apduState = apdu.getCurrentState();
}
catch (CryptoException e)
{
HandleCryptoException(e);
}
catch (APDUException e)
{
HandleAPDUException(e);
}
// return desKey;
}
//Get the key that set into the 'desKey' in setDesKey() function, and return the DESKey object.
//The plain text length of input key data is 8 bytes for DES, 16 bytes for 2-key triple DES and 24 bytes for 3-key triple DES.
private Key getDesKey()
{
try
{
Key tempDesKey = null;
switch (desKeyLen)
{
case (byte) 24:
tempDesKey = desKey;
break;
default:
ISOException.throwIt(ISO7816.SW_CONDITIONS_NOT_SATISFIED);
break;
}
//Set the 'desKey' key data value into the internal representation
((DESKey) tempDesKey).setKey(desKeyData, (short) 0);
return tempDesKey;
}
catch (CryptoException e)
{
HandleCryptoException(e);
}
catch (NullPointerException e)
{
ISOException.throwIt(SW_NULL_POINTER);
}
catch (ArrayIndexOutOfBoundsException e)
{
ISOException.throwIt(SW_ARRAY_INDEX_OOB);
}
return null;
}
private void setInputText(final APDU apdu)
{
byte apduState = apdu.getCurrentState();
byte[] buffer = apdu.getBuffer();
short len = apdu.setIncomingAndReceive();
Util.arrayCopyNonAtomic(buffer, ISO7816.OFFSET_CDATA, inputText, (short) 0, len);
inputTextLength = len;
}
private void sendAPDU(final APDU apdu, byte[] data, short offset, short length)
{
try
{
byte apduState = apdu.getCurrentState();
// apdu.setOutgoing(); // set transmission to outgoing data
// apdu.setOutgoingLength((short)length); // set the number of bytes to send to the IFD
// apdu.sendBytesLong(data, (short)offset, (short)length); // send the requested number of bytes to the IFD
apduState = apdu.getCurrentState();
}
catch (APDUException e)
{
HandleAPDUException(e);
}
catch (SecurityException e)
{
ISOException.throwIt(SW_SECURITY_EXCEPTION);
}
}
private void doDesCipher(final APDU apdu)
{
try
{
// byte[] buffer = apdu.getBuffer();
// short len = apdu.setIncomingAndReceive();
//
// byte mode = buffer[ISO7816.OFFSET_P1] == (byte) 0x00 ? Cipher.MODE_ENCRYPT : Cipher.MODE_DECRYPT;
// Cipher cipher = desEcbCipher;
//
// Key key = getDesKey();
//
// cipher.init(key, mode);
//
// cipher.doFinal(buffer, ISO7816.OFFSET_CDATA, len, buffer, (short) 0);
// apdu.setOutgoingAndSend((short) 0, len);
byte apduState = apdu.getCurrentState();
byte[] buffer = apdu.getBuffer();
byte[] output = new byte[512];
byte mode = buffer[ISO7816.OFFSET_P1] == (byte) 0x00 ? Cipher.MODE_ENCRYPT : Cipher.MODE_DECRYPT;
Cipher cipher = desEcbCipher;
Key key = getDesKey();
cipher.init(key, mode);
short encryptedLength = cipher.doFinal(inputText, (short) 0, inputTextLength, output, (short) 0);
// apdu.setOutgoingAndSend((short) 0, inputTextLength);
// sendAPDU(apdu, output, (short) 0, encryptedLength);
apdu.setOutgoing();
apdu.setOutgoingLength(encryptedLength);
apdu.sendBytesLong(output, (short) 0, encryptedLength);
apduState = apdu.getCurrentState();
}
catch (CryptoException e)
{
HandleCryptoException(e);
}
catch (APDUException e)
{
HandleAPDUException(e);
}
}
private void Ecc_Gen_Secret(final APDU apdu)
{
try
{
byte apduState = apdu.getCurrentState();
byte[] buffer = apdu.getBuffer();
byte[] otherPublicKeyArray = new byte[49];
testEccKey.genKeyPair();
short otherPublicKeyLength = Util.getShort(tempBuffer, (short) 128);
// Sets the point of the curve comprising the public key.
((ECPublicKey) testEccKey.getPublic()).setW(tempBuffer, (short) 130, otherPublicKeyLength);
// if (test)
// {
// publicKeyLength = ((ECPublicKey) (testEccKey.getPublic())).getW(publicKey, (short) 0);
// }
// else
// {
// Util.arrayCopyNonAtomic(buffer, ISO7816.OFFSET_CDATA, publicKey, (short) 0, len);
// publicKeyLength = (short) len;
// }
// short publicKeyLength = ((ECPublicKey) (eccKey.getPublic())).getW(publicKey, (short) 0);
ECPrivateKey privateKey = (ECPrivateKey) eccKey.getPrivate();
ecdhc.init(privateKey);
// byte[] privateKeyArray = new byte[24];
// short privateKeyLength = privateKey.getS(privateKeyArray, (short) 0);
PublicKey otherPublicKey = testEccKey.getPublic();
otherPublicKeyLength = ((ECPublicKey) otherPublicKey).getW(otherPublicKeyArray, (short) 0);
short secretSize = ecdhc.generateSecret(otherPublicKeyArray, (short) 0, otherPublicKeyLength, secret, (short) 0);
Util.arrayCopyNonAtomic(secret, (short) 0, buffer, (short) 0, (short) eccKeyLen);
// Util.arrayCopyNonAtomic(publicKey, (short) 0, buffer, (short) 0, publicKeyLength);
// Util.arrayCopyNonAtomic(privateKeyByte, (short) 0, buffer, (short) 0, privateKeyLength);
/*apdu.setOutgoingAndSend((short) 0, (short) eccKeyLen);*/
sendAPDU(apdu, buffer, (short) 0, eccKeyLen);
apduState = apdu.getCurrentState();
// apdu.setOutgoingAndSend((short) 0, publicKeyLength);
// apdu.setOutgoingAndSend((short) 0, privateKeyLength);
}
catch (CryptoException e)
{
HandleCryptoException(e);
}
catch (APDUException e)
{
HandleAPDUException(e);
}
catch (ArrayIndexOutOfBoundsException e)
{
ISOException.throwIt(SW_ARRAY_INDEX_OOB);
}
catch (NullPointerException e)
{
ISOException.throwIt(SW_NULL_POINTER);
}
}
//According to the different key length specified in the incoming APDU , generate ECC key pair and store in the global variable 'eccKey'
private void GenEccKeyPair(APDU apdu)
{
try
{
byte apduState = apdu.getCurrentState();
byte[] buffer = apdu.getBuffer();
short keyLen = (short) 0;
switch (buffer[ISO7816.OFFSET_P1])
{
case (byte) 0x01: // 192
//Constructs a KeyPair instance for the specified algorithm and keylength;
eccKey = new KeyPair(KeyPair.ALG_EC_FP, KeyBuilder.LENGTH_EC_FP_192);
keyLen = (short) 24;
testEccKey = new KeyPair(KeyPair.ALG_EC_FP, KeyBuilder.LENGTH_EC_FP_192);
break;
default:
eccKey = new KeyPair(KeyPair.ALG_EC_FP, KeyBuilder.LENGTH_EC_FP_192);
keyLen = (short) 24;
testEccKey = new KeyPair(KeyPair.ALG_EC_FP, KeyBuilder.LENGTH_EC_FP_192);
break;
}
//(Re)Initializes the key objects encapsulated in this 'eccKey' KeyPair instance with new key values.
eccKey.genKeyPair();
testEccKey.genKeyPair();
eccKeyLen = keyLen;
apduState = apdu.getCurrentState();
}
catch (CryptoException e)
{
HandleCryptoException(e);
}
}
//Returns the first coefficient 'A' of the curve of the key.
private void getEccKeyA(APDU apdu)
{
byte[] buffer = apdu.getBuffer();
((ECPrivateKey) eccKey.getPrivate()).getA(buffer, (short) 0);
apdu.setOutgoingAndSend((short) 0, eccKeyLen);
}
//Returns the field specification parameter value of the key.
private void getEccKeyP(APDU apdu)
{
byte[] buffer = apdu.getBuffer();
((ECPrivateKey) eccKey.getPrivate()).getField(buffer, (short) 0);
apdu.setOutgoingAndSend((short) 0, eccKeyLen);
}
//Returns the coefficient 'S' of the curve of the key.
private void getEccKeyS(APDU apdu)
{
try
{
byte[] buffer = apdu.getBuffer();
short length = ((ECPrivateKey) eccKey.getPrivate()).getS(buffer, (short) 0);
/*apdu.setOutgoingAndSend((short) 0, length);*/
sendAPDU(apdu, buffer, (short) 0, length);
}
catch (CryptoException e)
{
HandleCryptoException(e);
}
catch (APDUException e)
{
HandleAPDUException(e);
}
}
//Returns the coefficient 'W' of the curve of the key.
private void getEccKeyW(APDU apdu)
{
try
{
byte[] buffer = apdu.getBuffer();
short length = ((ECPublicKey) eccKey.getPublic()).getW(buffer, (short) 0);
/*apdu.setOutgoingAndSend((short) 0, length);*/
sendAPDU(apdu, buffer, (short) 0, length);
}
catch (CryptoException e)
{
HandleCryptoException(e);
}
catch (APDUException e)
{
HandleAPDUException(e);
}
}
//Set the value of ECC private key(SetS)
private void setEccKeyS(APDU apdu)
{
byte[] buffer = apdu.getBuffer();
short len = apdu.setIncomingAndReceive();
switch (buffer[ISO7816.OFFSET_P1])
{
case (byte) 0x01: // 192 key
if (len != 24)
{
ISOException.throwIt(ISO7816.SW_WRONG_LENGTH);
}
eccKeyLen = 24;
//Constructs a KeyPai instance for the ALG_EC_FP algorithm and keylength is 192;
eccKey = new KeyPair(KeyPair.ALG_EC_FP, KeyBuilder.LENGTH_EC_FP_192);
break;
// case (byte) 0x02:
// if (len != 32)
// {
// ISOException.throwIt(ISO7816.SW_WRONG_LENGTH);
// }
// eccKeyLen = 32;
// //Constructs a KeyPai instance for the ALG_EC_FP algorithm and keylength is 256;
// //Here, the KeyBuilder.LENGTH_EC_FP_256 only be used in JavaCard API 3.0.4
// eccKey = new KeyPair(KeyPair.ALG_EC_FP, KeyBuilder.LENGTH_EC_FP_256);
// break;
// case (byte) 0x03: // 384 key
// if (len != 48)
// {
// ISOException.throwIt(ISO7816.SW_WRONG_LENGTH);
// }
// eccKeyLen = 48;
// //Constructs a KeyPai instance for the ALG_EC_FP algorithm and keylength is 384;
// //Here, the KeyBuilder.LENGTH_EC_FP_384 only be used in JavaCard API 3.0.4
// eccKey = new KeyPair(KeyPair.ALG_EC_FP, KeyBuilder.LENGTH_EC_FP_384);
// break;
default:
// ISOException.throwIt(ISO7816.SW_CONDITIONS_NOT_SATISFIED);
if (len != 24)
{
ISOException.throwIt(ISO7816.SW_WRONG_LENGTH);
}
eccKeyLen = 24;
//Constructs a KeyPai instance for the ALG_EC_FP algorithm and keylength is 192;
eccKey = new KeyPair(KeyPair.ALG_EC_FP, KeyBuilder.LENGTH_EC_FP_192);
break;
}
//In tempBuffer, the offset from 0 to 1 positions stored ECC private key, including 0 to 0 store the private key length, 130 to 255 store the private key data
Util.setShort(tempBuffer, (short) 0, len);
Util.arrayCopyNonAtomic(buffer, ISO7816.OFFSET_CDATA, tempBuffer, (short) 2, len);
}
//Set the value of ECC public key(SetW)
private void setEccKeyW(APDU apdu, short len)
{
byte[] buffer = apdu.getBuffer();
switch (buffer[ISO7816.OFFSET_P1])
{
case (byte) 0x01: // 192 key
if (len != 24 * 2 + 1)
{
ISOException.throwIt(ISO7816.SW_WRONG_LENGTH);
}
eccKeyLen = 24;
//Constructs a KeyPair instance for the ALG_EC_FP algorithm and keylength is 192;
eccKey = new KeyPair(KeyPair.ALG_EC_FP, KeyBuilder.LENGTH_EC_FP_192);
break;
default:
if (len != 24 * 2 + 1)
{
ISOException.throwIt(ISO7816.SW_WRONG_LENGTH);
}
eccKeyLen = 24;
//Constructs a KeyPair instance for the ALG_EC_FP algorithm and keylength is 192;
eccKey = new KeyPair(KeyPair.ALG_EC_FP, KeyBuilder.LENGTH_EC_FP_192);
// ISOException.throwIt(ISO7816.SW_CONDITIONS_NOT_SATISFIED);
break;
}
//In tempBuffer, the offset from 128 to 255 positions stored ECC public key, including 128 to 129 store the public key length, 130 to 255 store the private key data
Util.setShort(tempBuffer, (short) 128, len);
Util.arrayCopyNonAtomic(buffer, ISO7816.OFFSET_CDATA, tempBuffer, (short) 130, len);
}
//Set the value of ECC public key(SetW)
private void setGuestEccKeyW(APDU apdu)
{
try
{
byte[] buffer = apdu.getBuffer();
short len = apdu.setIncomingAndReceive();
switch (buffer[ISO7816.OFFSET_P1])
{
case (byte) 0x01: // 192 key
if (len != 24 * 2 + 1)
{
ISOException.throwIt(ISO7816.SW_WRONG_LENGTH);
}
eccKeyLen = 24;
//Constructs a KeyPair instance for the ALG_EC_FP algorithm and keylength is 192;
testEccKey = new KeyPair(KeyPair.ALG_EC_FP, KeyBuilder.LENGTH_EC_FP_192);
break;
default:
if (len != 24 * 2 + 1)
{
ISOException.throwIt(ISO7816.SW_WRONG_LENGTH);
}
eccKeyLen = 24;
//Constructs a KeyPair instance for the ALG_EC_FP algorithm and keylength is 192;
testEccKey = new KeyPair(KeyPair.ALG_EC_FP, KeyBuilder.LENGTH_EC_FP_192);
// ISOException.throwIt(ISO7816.SW_CONDITIONS_NOT_SATISFIED);
break;
}
//In tempBuffer, the offset from 128 to 255 positions stored ECC public key, including 128 to 129 store the public key length, 130 to 255 store the private key data
Util.setShort(tempBuffer, (short) 128, len);
Util.arrayCopyNonAtomic(buffer, ISO7816.OFFSET_CDATA, tempBuffer, (short) 130, len);
}
catch (CryptoException e)
{
HandleCryptoException(e);
}
catch (TransactionException e)
{
ISOException.throwIt(SW_TRANSACTION_EXCEPTIOn);
}
catch (NullPointerException e)
{
ISOException.throwIt(SW_NULL_POINTER);
}
catch (ArrayIndexOutOfBoundsException e)
{
ISOException.throwIt(SW_ARRAY_INDEX_OOB);
}
}
//ECC signature
private void Ecc_Sign(APDU apdu)
{
try
{
byte[] buffer = apdu.getBuffer();
short len = apdu.setIncomingAndReceive();
//(Re)Initializes the key objects encapsulated in this KeyPair instance with new key values.
eccKey.genKeyPair();
short eccPriKeyLen = Util.getShort(tempBuffer, (short) 0);
//Returns a reference to the private key component of this ECC KeyPair object.
((ECPrivateKey) eccKey.getPrivate()).setS(tempBuffer, (short) 2, eccPriKeyLen);
//Initializes the Signature object with the ecdsa Key
ecdsa.init(eccKey.getPrivate(), Signature.MODE_SIGN);
//Generates the signature of all input data.
short lenTmp = ecdsa.sign(buffer, ISO7816.OFFSET_CDATA, len, buffer, (short) 0);
apdu.setOutgoingAndSend((short) 0, lenTmp);
}
catch (CryptoException e)
{
HandleCryptoException(e);
}
catch (APDUException e)
{
HandleAPDUException(e);
}
}
//Verify the ECC signature, the format of APDU data field is : the signature data and the data to be verified
private void Ecc_Verify(APDU apdu)
{
try
{
byte[] buffer = apdu.getBuffer();
short len = apdu.setIncomingAndReceive();
short signLen = buffer[ISO7816.OFFSET_P1];
//(Re)Initializes the key objects encapsulated in 'eccKey' KeyPair instance with new key values.
eccKey.genKeyPair();
short eccPubKeyLen = Util.getShort(tempBuffer, (short) 128);
// Sets the point of the curve comprising the public key.
((ECPublicKey) eccKey.getPublic()).setW(tempBuffer, (short) 130, eccPubKeyLen);
short plainLen = (short) (len - signLen);
short tmpOff = (short) (ISO7816.OFFSET_CDATA + signLen);
//Initializes the Signature object with the appropriate Key
ecdsa.init(eccKey.getPublic(), Signature.MODE_VERIFY);
//Verify the signature of input data against the passed in ECC signature.
boolean ret = ecdsa.verify(buffer, (short) tmpOff, plainLen, buffer, ISO7816.OFFSET_CDATA, signLen);
buffer[(short) 0] = ret ? (byte) 1 : (byte) 0;
apdu.setOutgoingAndSend((short) 0, (short) 1);
}
catch (CryptoException e)
{
HandleCryptoException(e);
}
catch (APDUException e)
{
HandleAPDUException(e);
}
}
private void HandleCryptoException(final CryptoException e)
{
switch (e.getReason())
{
case CryptoException.UNINITIALIZED_KEY:
ISOException.throwIt(SW_CRYPTO_UNINITIALIZED_KEY);
break;
case CryptoException.INVALID_INIT:
ISOException.throwIt(SW_CRYPTO_INVALID_INIT);
break;
case CryptoException.ILLEGAL_USE:
ISOException.throwIt(SW_CRYPTO_ILLEGAL_USE);
break;
case CryptoException.ILLEGAL_VALUE:
ISOException.throwIt(SW_CRYPTO_ILLEGAL_VALUE);
break;
case CryptoException.NO_SUCH_ALGORITHM:
ISOException.throwIt(SW_CRYPTO_NO_SUCH_ALGORITHM);
break;
default:
ISOException.throwIt(SW_UNKNOWN_CRYPTO_EXCEPTION);
break;
}
}
private void HandleAPDUException(final APDUException e)
{
switch (e.getReason())
{
case APDUException.ILLEGAL_USE:
ISOException.throwIt(SW_APDU_ILLEGAL_USE);
break;
case APDUException.IO_ERROR:
ISOException.throwIt(SW_APDU_IO_ERROR);
break;
case APDUException.BAD_LENGTH:
ISOException.throwIt(SW_APDU_BAD_LENGTH);
break;
case APDUException.T1_IFD_ABORT:
ISOException.throwIt(SW_APDU_T1_IFD_ABORT);
break;
case APDUException.BUFFER_BOUNDS:
ISOException.throwIt(SW_APDU_BUFFER_BOUNDS);
break;
case APDUException.NO_T0_GETRESPONSE:
ISOException.throwIt(SW_APDU_NO_T0_GETRESPONSE);
break;
case APDUException.NO_T0_REISSUE:
ISOException.throwIt(SW_APDU_NO_T0_REISSUE);
break;
default:
ISOException.throwIt(SW_UNKNOWN_APDU_EXCEPTION);
break;
}
}
}
Code: Select all
00 A4 04 00 0A A0 40 41 42 43 44 45 46 10 00 00;
80 41 00 00 00;
80 44 00 00 00;
80 45 00 00 00;
80 47 00 00 31 04 ED A4 1B 60 A0 33 5F 6A CA 84 E0 4B 86 8F 70 CF EE 1B 0B E6 1A E2 03 BF DE EB 75 82 DB 89 8F E4 FF F9 D5 BF A0 94 E2 DA A7 E0 74 25 A9 53 B4 75 00;
80 50 00 00 00;
80 51 00 00 00;
80 59 00 00 08 68 65 6C 6C 6F 62 6F 62 00;
80 60 00 00 00;