/* * passportapplet - A reference implementation of the MRTD standards. * * Copyright (C) 2006 SoS group, Radboud University * * This library is free software; you can redistribute it and/or * modify it under the terms of the GNU Lesser General Public * License as published by the Free Software Foundation; either * version 2.1 of the License, or (at your option) any later version. * * This library is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU * Lesser General Public License for more details. * * You should have received a copy of the GNU Lesser General Public * License along with this library; if not, write to the Free Software * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA * * $Id: FileSystem.java 143 2006-08-03 15:52:19Z ceesb $ */ package sos.passportapplet; import javacard.framework.JCSystem; import javacard.security.DESKey; import javacard.security.ECPrivateKey; import javacard.security.ECPublicKey; import javacard.security.KeyBuilder; import javacard.security.RSAPrivateKey; import javacard.security.RSAPublicKey; /** * Class that implements a Very Simple key store. * * @author ceesb * */ public class KeyStore { public static final byte KEY_A = 0; public static final byte KEY_B = 1; private DESKey sm_kMac_a, sm_kMac_b, sm_kMac; private DESKey ma_kMac_a, ma_kMac_b, ma_kMac; private DESKey ma_kEnc, sm_kEnc; private byte mode; RSAPrivateKey rsaPrivateKey; RSAPublicKey rsaPublicKey; byte[] tmpKeys; ECPrivateKey ecPrivateKey; ECPublicKey ecPublicKey; KeyStore(byte mode) { this.mode = mode; sm_kEnc = (DESKey) KeyBuilder.buildKey(KeyBuilder.TYPE_DES_TRANSIENT_RESET, KeyBuilder.LENGTH_DES3_2KEY, false); ma_kEnc = (DESKey) KeyBuilder.buildKey(KeyBuilder.TYPE_DES, KeyBuilder.LENGTH_DES3_2KEY, false); switch(mode) { case PassportCrypto.JCOP41_MODE: case PassportCrypto.PERFECTWORLD_MODE: rsaPrivateKey = (RSAPrivateKey)KeyBuilder.buildKey(KeyBuilder.TYPE_RSA_PRIVATE, KeyBuilder.LENGTH_RSA_1024, false); rsaPublicKey = (RSAPublicKey)KeyBuilder.buildKey(KeyBuilder.TYPE_RSA_PUBLIC, KeyBuilder.LENGTH_RSA_1024, false); ecPrivateKey = (ECPrivateKey)KeyBuilder.buildKey(KeyBuilder.TYPE_EC_F2M_PRIVATE, KeyBuilder.LENGTH_EC_F2M_163, false); ecPublicKey = (ECPublicKey)KeyBuilder.buildKey(KeyBuilder.TYPE_EC_F2M_PUBLIC, KeyBuilder.LENGTH_EC_F2M_163, false); break; } switch(mode) { case PassportCrypto.PERFECTWORLD_MODE: sm_kMac = (DESKey) KeyBuilder.buildKey(KeyBuilder.TYPE_DES_TRANSIENT_RESET, KeyBuilder.LENGTH_DES3_2KEY, false); ma_kMac = (DESKey) KeyBuilder.buildKey(KeyBuilder.TYPE_DES, KeyBuilder.LENGTH_DES3_2KEY, false); break; case PassportCrypto.CREF_MODE: case PassportCrypto.JCOP41_MODE: sm_kMac_a = (DESKey) KeyBuilder.buildKey(KeyBuilder.TYPE_DES_TRANSIENT_RESET, KeyBuilder.LENGTH_DES, false); sm_kMac_b = (DESKey) KeyBuilder.buildKey(KeyBuilder.TYPE_DES_TRANSIENT_RESET, KeyBuilder.LENGTH_DES, false); ma_kMac_a = (DESKey) KeyBuilder.buildKey(KeyBuilder.TYPE_DES, KeyBuilder.LENGTH_DES, false); ma_kMac_b = (DESKey) KeyBuilder.buildKey(KeyBuilder.TYPE_DES, KeyBuilder.LENGTH_DES, false); break; } tmpKeys = JCSystem.makeTransientByteArray((short)32, JCSystem.CLEAR_ON_DESELECT); } public DESKey getMacKey() { if(PassportApplet.hasMutuallyAuthenticated()) { return sm_kMac; } else { return ma_kMac; } } public DESKey getMacKey(byte aOrb) { if(PassportApplet.hasMutuallyAuthenticated()) { if(aOrb == KEY_A) { return sm_kMac_a; } else { return sm_kMac_b; } } else { if(aOrb == KEY_A) { return ma_kMac_a; } else { return ma_kMac_b; } } } public DESKey getCryptKey() { if(PassportApplet.hasMutuallyAuthenticated()) { return sm_kEnc; } else { return ma_kEnc; } } public void setMutualAuthenticationKeys(byte[] kMac, short kMac_offset, byte[] kEnc, short kEnc_offset) { ma_kEnc.setKey(kEnc, kEnc_offset); switch(mode) { case PassportCrypto.PERFECTWORLD_MODE: ma_kMac.setKey(kMac, kMac_offset); break; case PassportCrypto.CREF_MODE: case PassportCrypto.JCOP41_MODE: ma_kMac_a.setKey(kMac, kMac_offset); ma_kMac_b.setKey(kMac, (short)(kMac_offset + 8)); break; } } public void setSecureMessagingKeys(byte[] kMac, short kMac_offset, byte[] kEnc, short kEnc_offset) { sm_kEnc.setKey(kEnc, kEnc_offset); switch(mode) { case PassportCrypto.PERFECTWORLD_MODE: sm_kMac.setKey(kMac, kMac_offset); break; case PassportCrypto.CREF_MODE: case PassportCrypto.JCOP41_MODE: sm_kMac_a.setKey(kMac, kMac_offset); sm_kMac_b.setKey(kMac, (short)(kMac_offset + 8)); break; } } }