/* * MyCryptoSmartCardSession.java * * Copyright � 1998-2011 Research In Motion Limited * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. * * Note: For the sake of simplicity, this sample application may not leverage * resource bundles and resource strings. However, it is STRONGLY recommended * that application developers make use of the localization features available * within the BlackBerry development platform to ensure a seamless application * experience across a variety of languages and geographies. For more information * on localizing your application, please refer to the BlackBerry Java Development * Environment Development Guide associated with this release. */ package com.rim.samples.device.smartcarddriverdemo; import net.rim.device.api.crypto.CryptoSmartCardKeyStoreData; import net.rim.device.api.crypto.CryptoSmartCardSession; import net.rim.device.api.crypto.CryptoTokenException; import net.rim.device.api.crypto.CryptoUnsupportedOperationException; import net.rim.device.api.crypto.RSACryptoSystem; import net.rim.device.api.crypto.RSACryptoToken; import net.rim.device.api.crypto.RSAPrivateKey; import net.rim.device.api.crypto.SHA1Digest; import net.rim.device.api.crypto.UnsupportedCryptoSystemException; import net.rim.device.api.crypto.certificate.Certificate; import net.rim.device.api.crypto.certificate.CertificateParsingException; import net.rim.device.api.crypto.certificate.x509.X509Certificate; import net.rim.device.api.crypto.keystore.KeyStore; import net.rim.device.api.smartcard.CommandAPDU; import net.rim.device.api.smartcard.ResponseAPDU; import net.rim.device.api.smartcard.SmartCard; import net.rim.device.api.smartcard.SmartCardException; import net.rim.device.api.smartcard.SmartCardID; import net.rim.device.api.smartcard.SmartCardLockedException; import net.rim.device.api.smartcard.SmartCardReaderSession; import net.rim.device.api.util.Arrays; /** * A class which represents a communication session with a physical smart card. * Over this session, APDUs may be exchanged with the smart card to provide the * desired functionality. Sessions are short lived and should not be held open * when not in use. As a security precaution, only one open session is allowed * to exist per SmartCardReader, and subsequent openSession requests will block * until the current session is closed. */ public class MyCryptoSmartCardSession extends CryptoSmartCardSession { // We assume that the smart card has 3 certificates identified by: ID_PKI, // SIGNING_PKI and ENCRYPION_PKI. Your particular smart card may have a // different number of certificates or be identified differently. These 3 // certificates are merely an example of what a smart card might contain. private static final byte ID_PKI = (byte) 0x00; private static final byte SIGNING_PKI = (byte) 0x01; private static final byte ENCRYPTION_PKI = (byte) 0x02; private static final String WAITING_MSG = "Please Wait"; private static final String ID_STRING = "John H. Smith"; private static final String ID_CERT = "ID Certificate"; private static final String SIGNING_CERT = "Signing Certificate"; private static final String ENCRYPTION_CERT = "Encryption Certificate"; /** * Constructs a <code>MyCryptoSmartCardSession</code> object. * * @param smartCard * the smart card type associated with this session. * @param readerSession * the reader session which will be used to send the commands to. */ public MyCryptoSmartCardSession(final SmartCard smartCard, final SmartCardReaderSession readerSession) { super(smartCard, readerSession); } /** * Closes the session with the smartcard. Implementations should not close * the underlying SmartCardReaderSession; this will be done by the smart * card framework or the application. */ protected void closeImpl() { // Do any session cleanup needed here. } /** * Returns the maximum number of login attempts allowed, or * Integer.MAX_VALUE if an infinite number of attempts are allowed. */ protected int getMaxLoginAttemptsImpl() throws SmartCardException { return 5; } /** * Returns the remaining number of login attempts allowed before the * smartcard will lock, or Integer.MAX_VALUE if the smart card will not * lock. */ protected int getRemainingLoginAttemptsImpl() throws SmartCardException { // Return then number of remaining attempts. return 4; } /** * Attempts to log the user into the smart card with the given password. * Implementation should not bring up UI. */ protected boolean loginImpl(final String password) throws SmartCardException { // TODO: Create a CommandAPDU which your smart card will understand. final CommandAPDU command = new CommandAPDU((byte) 0x00, (byte) 0x20, (byte) 0x00, (byte) 0x00); command.setLcData(password.getBytes()); final ResponseAPDU response = new ResponseAPDU(); sendAPDU(command, response); // TODO: Check for response codes specific to your smart card. if (response.checkStatusWords((byte) 0x90, (byte) 0x00)) { return true; } else if (response.checkStatusWords((byte) 0x64, (byte) 0xF8)) { throw new SmartCardLockedException(); } else { // Authentication failed. return false; } } /** * Get a <code>SmartCardID</code> associated with the specific smart card * which this session is using. Each smart card *must* return a unique ID, * otherwise the system will not be able to distinguish between two * different smart cards. */ protected SmartCardID getSmartCardIDImpl() throws SmartCardException { // Retrieve a unique ID off the card. final byte[] uniqueCardData = new byte[] { 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b }; // Convert byte array to long. final SHA1Digest digest = new SHA1Digest(); digest.update(uniqueCardData); final long idLong = byteArrayToLong(Arrays.copy(digest.getDigest(), 0, 8)); // Using friendly display name. return new SmartCardID(idLong, ID_STRING, getSmartCard()); } /** * Converts <code>array</code> into a long integer (Note: the returned value * should be considered as an unsigned value). * * @throws IllegalArgumentException * if <code>array</code> contains a number bigger than 64 bits. * * Note: If your smart card driver is only designed to work with * BlackBerry 4.2+, you can replace this method with a call to * CryptoByteArrayArithmetic.valueOf( byte [] ). */ private long byteArrayToLong(byte[] array) { if (array == null) { throw new IllegalArgumentException(); } // Remove the leading zeros from given byte[] and returns a new byte[] // without them. int zeros = 0; for (int i = 0; i < array.length && array[i] == 0; i++) { zeros++; } if (zeros != 0) { array = Arrays.copy(array, zeros, array.length - zeros); } final int length = array.length; if (length > 8) { throw new IllegalArgumentException(); } long n = 0; for (int i = 0; i < length; i++) { n <<= 8; n += array[i] & 0xff; } return n; } /** * Returns random bytes of data from the smart card's internal RNG. */ protected byte[] getRandomBytesImpl(final int maxBytes) throws SmartCardException { // TODO: Create a CommandAPDU which your smart card will understand. final CommandAPDU command = new CommandAPDU((byte) 0x00, (byte) 0x4C, (byte) 0x00, (byte) 0x00, maxBytes); final ResponseAPDU response = new ResponseAPDU(); sendAPDU(command, response); // TODO: Check for response codes specific to your smart card. if (response.checkStatusWords((byte) 0x90, (byte) 0x00)) { return response.getData(); } return null; } /** * Extract the certificates off of the smart card. * * @return An array of certificates which are present on the smart card. */ protected CryptoSmartCardKeyStoreData[] getKeyStoreDataArrayImpl() throws SmartCardException, CryptoTokenException { try { // Show a progress dialog to the user as this operation may take a // long time. displayProgressDialog(WAITING_MSG, 4); // The certificates need to be associated with a particular smart // card. final SmartCardID smartCardID = getSmartCardID(); final RSACryptoToken token = new MyRSACryptoToken(); final RSACryptoSystem cryptoSystem = new RSACryptoSystem(token, 1024); RSAPrivateKey privateKey; final CryptoSmartCardKeyStoreData[] keyStoreDataArray = new CryptoSmartCardKeyStoreData[3]; // For this sample we use a hard coded certificate contained below. // This encoding would be extracted from the card using a series of // APDU commands. Certificate certificate = null; try { certificate = new X509Certificate(CERTIFICATE_ENCODING); } catch (final CertificateParsingException e) { // Should not happen. } stepProgressDialog(1); privateKey = new RSAPrivateKey(cryptoSystem, new MyCryptoTokenData( smartCardID, ID_PKI)); keyStoreDataArray[0] = new CryptoSmartCardKeyStoreData(null, ID_CERT, privateKey, null, KeyStore.SECURITY_LEVEL_HIGH, certificate, null, null, 0); stepProgressDialog(1); privateKey = new RSAPrivateKey(cryptoSystem, new MyCryptoTokenData( smartCardID, SIGNING_PKI)); keyStoreDataArray[1] = new CryptoSmartCardKeyStoreData(null, SIGNING_CERT, privateKey, null, KeyStore.SECURITY_LEVEL_HIGH, certificate, null, null, 0); stepProgressDialog(1); privateKey = new RSAPrivateKey(cryptoSystem, new MyCryptoTokenData( smartCardID, ENCRYPTION_PKI)); keyStoreDataArray[2] = new CryptoSmartCardKeyStoreData(null, ENCRYPTION_CERT, privateKey, null, KeyStore.SECURITY_LEVEL_HIGH, certificate, null, null, 0); stepProgressDialog(1); // Sleep so the user sees the last step of the progress dialog move // to 100% try { Thread.sleep(250); } catch (final InterruptedException e) { } dismissProgressDialog(); return keyStoreDataArray; } catch (final CryptoUnsupportedOperationException e) { } catch (final UnsupportedCryptoSystemException e) { } catch (final CryptoTokenException e) { } throw new SmartCardException(); } /** * Send some data to the smart card to be signed or decrypted. */ /* package */void signDecrypt(final RSACryptoSystem cryptoSystem, final MyCryptoTokenData privateKeyData, final byte[] input, final int inputOffset, final byte[] output, final int outputOffset) throws SmartCardException { // Check for nulls. if (cryptoSystem == null || privateKeyData == null || input == null || output == null) { throw new IllegalArgumentException(); } // Validate the input parameters. final int modulusLength = cryptoSystem.getModulusLength(); if (input.length < inputOffset + modulusLength || output.length < outputOffset + modulusLength) { throw new IllegalArgumentException(); } // Construct the response Application Protocol Data Unit. final ResponseAPDU response = new ResponseAPDU(); // Construct the command and set its information. // TODO: Create a CommandAPDU which your smart card will understand. final CommandAPDU signAPDU = new CommandAPDU((byte) 0x80, (byte) 0x56, (byte) 0x00, (byte) 0x00, modulusLength); signAPDU.setLcData(input, inputOffset, input.length - inputOffset); // Send the command to the smart card sendAPDU(signAPDU, response); // Validate the status words of the response. // TODO: Check for response codes specific to your smart card. if (response.checkStatusWords((byte) 0x90, (byte) 0x00)) { final byte[] responseData = response.getData(); System.arraycopy(responseData, 0, output, outputOffset, responseData.length); } else { throw new SmartCardException("Invalid response code, sw1=" + Integer.toHexString(response.getSW1() & 0xff) + " sw2=" + Integer.toHexString(response.getSW2() & 0xff)); } } private static byte[] CERTIFICATE_ENCODING = new byte[] { (byte) 0x30, (byte) 0x82, (byte) 0x03, (byte) 0x2d, (byte) 0x30, (byte) 0x82, (byte) 0x02, (byte) 0x96, (byte) 0xa0, (byte) 0x03, (byte) 0x02, (byte) 0x01, (byte) 0x02, (byte) 0x02, (byte) 0x01, (byte) 0x00, (byte) 0x30, (byte) 0x0d, (byte) 0x06, (byte) 0x09, (byte) 0x2a, (byte) 0x86, (byte) 0x48, (byte) 0x86, (byte) 0xf7, (byte) 0x0d, (byte) 0x01, (byte) 0x01, (byte) 0x04, (byte) 0x05, (byte) 0x00, (byte) 0x30, (byte) 0x81, (byte) 0xd1, (byte) 0x31, (byte) 0x0b, (byte) 0x30, (byte) 0x09, (byte) 0x06, (byte) 0x03, (byte) 0x55, (byte) 0x04, (byte) 0x06, (byte) 0x13, (byte) 0x02, (byte) 0x5a, (byte) 0x41, (byte) 0x31, (byte) 0x15, (byte) 0x30, (byte) 0x13, (byte) 0x06, (byte) 0x03, (byte) 0x55, (byte) 0x04, (byte) 0x08, (byte) 0x13, (byte) 0x0c, (byte) 0x57, (byte) 0x65, (byte) 0x73, (byte) 0x74, (byte) 0x65, (byte) 0x72, (byte) 0x6e, (byte) 0x20, (byte) 0x43, (byte) 0x61, (byte) 0x70, (byte) 0x65, (byte) 0x31, (byte) 0x12, (byte) 0x30, (byte) 0x10, (byte) 0x06, (byte) 0x03, (byte) 0x55, (byte) 0x04, (byte) 0x07, (byte) 0x13, (byte) 0x09, (byte) 0x43, (byte) 0x61, (byte) 0x70, (byte) 0x65, (byte) 0x20, (byte) 0x54, (byte) 0x6f, (byte) 0x77, (byte) 0x6e, (byte) 0x31, (byte) 0x1a, (byte) 0x30, (byte) 0x18, (byte) 0x06, (byte) 0x03, (byte) 0x55, (byte) 0x04, (byte) 0x0a, (byte) 0x13, (byte) 0x11, (byte) 0x54, (byte) 0x68, (byte) 0x61, (byte) 0x77, (byte) 0x74, (byte) 0x65, (byte) 0x20, (byte) 0x43, (byte) 0x6f, (byte) 0x6e, (byte) 0x73, (byte) 0x75, (byte) 0x6c, (byte) 0x74, (byte) 0x69, (byte) 0x6e, (byte) 0x67, (byte) 0x31, (byte) 0x28, (byte) 0x30, (byte) 0x26, (byte) 0x06, (byte) 0x03, (byte) 0x55, (byte) 0x04, (byte) 0x0b, (byte) 0x13, (byte) 0x1f, (byte) 0x43, (byte) 0x65, (byte) 0x72, (byte) 0x74, (byte) 0x69, (byte) 0x66, (byte) 0x69, (byte) 0x63, (byte) 0x61, (byte) 0x74, (byte) 0x69, (byte) 0x6f, (byte) 0x6e, (byte) 0x20, (byte) 0x53, (byte) 0x65, (byte) 0x72, (byte) 0x76, (byte) 0x69, (byte) 0x63, (byte) 0x65, (byte) 0x73, (byte) 0x20, (byte) 0x44, (byte) 0x69, (byte) 0x76, (byte) 0x69, (byte) 0x73, (byte) 0x69, (byte) 0x6f, (byte) 0x6e, (byte) 0x31, (byte) 0x24, (byte) 0x30, (byte) 0x22, (byte) 0x06, (byte) 0x03, (byte) 0x55, (byte) 0x04, (byte) 0x03, (byte) 0x13, (byte) 0x1b, (byte) 0x54, (byte) 0x68, (byte) 0x61, (byte) 0x77, (byte) 0x74, (byte) 0x65, (byte) 0x20, (byte) 0x50, (byte) 0x65, (byte) 0x72, (byte) 0x73, (byte) 0x6f, (byte) 0x6e, (byte) 0x61, (byte) 0x6c, (byte) 0x20, (byte) 0x46, (byte) 0x72, (byte) 0x65, (byte) 0x65, (byte) 0x6d, (byte) 0x61, (byte) 0x69, (byte) 0x6c, (byte) 0x20, (byte) 0x43, (byte) 0x41, (byte) 0x31, (byte) 0x2b, (byte) 0x30, (byte) 0x29, (byte) 0x06, (byte) 0x09, (byte) 0x2a, (byte) 0x86, (byte) 0x48, (byte) 0x86, (byte) 0xf7, (byte) 0x0d, (byte) 0x01, (byte) 0x09, (byte) 0x01, (byte) 0x16, (byte) 0x1c, (byte) 0x70, (byte) 0x65, (byte) 0x72, (byte) 0x73, (byte) 0x6f, (byte) 0x6e, (byte) 0x61, (byte) 0x6c, (byte) 0x2d, (byte) 0x66, (byte) 0x72, (byte) 0x65, (byte) 0x65, (byte) 0x6d, (byte) 0x61, (byte) 0x69, (byte) 0x6c, (byte) 0x40, (byte) 0x74, (byte) 0x68, (byte) 0x61, (byte) 0x77, (byte) 0x74, (byte) 0x65, (byte) 0x2e, (byte) 0x63, (byte) 0x6f, (byte) 0x6d, (byte) 0x30, (byte) 0x1e, (byte) 0x17, (byte) 0x0d, (byte) 0x39, (byte) 0x36, (byte) 0x30, (byte) 0x31, (byte) 0x30, (byte) 0x31, (byte) 0x30, (byte) 0x30, (byte) 0x30, (byte) 0x30, (byte) 0x30, (byte) 0x30, (byte) 0x5a, (byte) 0x17, (byte) 0x0d, (byte) 0x32, (byte) 0x30, (byte) 0x31, (byte) 0x32, (byte) 0x33, (byte) 0x31, (byte) 0x32, (byte) 0x33, (byte) 0x35, (byte) 0x39, (byte) 0x35, (byte) 0x39, (byte) 0x5a, (byte) 0x30, (byte) 0x81, (byte) 0xd1, (byte) 0x31, (byte) 0x0b, (byte) 0x30, (byte) 0x09, (byte) 0x06, (byte) 0x03, (byte) 0x55, (byte) 0x04, (byte) 0x06, (byte) 0x13, (byte) 0x02, (byte) 0x5a, (byte) 0x41, (byte) 0x31, (byte) 0x15, (byte) 0x30, (byte) 0x13, (byte) 0x06, (byte) 0x03, (byte) 0x55, (byte) 0x04, (byte) 0x08, (byte) 0x13, (byte) 0x0c, (byte) 0x57, (byte) 0x65, (byte) 0x73, (byte) 0x74, (byte) 0x65, (byte) 0x72, (byte) 0x6e, (byte) 0x20, (byte) 0x43, (byte) 0x61, (byte) 0x70, (byte) 0x65, (byte) 0x31, (byte) 0x12, (byte) 0x30, (byte) 0x10, (byte) 0x06, (byte) 0x03, (byte) 0x55, (byte) 0x04, (byte) 0x07, (byte) 0x13, (byte) 0x09, (byte) 0x43, (byte) 0x61, (byte) 0x70, (byte) 0x65, (byte) 0x20, (byte) 0x54, (byte) 0x6f, (byte) 0x77, (byte) 0x6e, (byte) 0x31, (byte) 0x1a, (byte) 0x30, (byte) 0x18, (byte) 0x06, (byte) 0x03, (byte) 0x55, (byte) 0x04, (byte) 0x0a, (byte) 0x13, (byte) 0x11, (byte) 0x54, (byte) 0x68, (byte) 0x61, (byte) 0x77, (byte) 0x74, (byte) 0x65, (byte) 0x20, (byte) 0x43, (byte) 0x6f, (byte) 0x6e, (byte) 0x73, (byte) 0x75, (byte) 0x6c, (byte) 0x74, (byte) 0x69, (byte) 0x6e, (byte) 0x67, (byte) 0x31, (byte) 0x28, (byte) 0x30, (byte) 0x26, (byte) 0x06, (byte) 0x03, (byte) 0x55, (byte) 0x04, (byte) 0x0b, (byte) 0x13, (byte) 0x1f, (byte) 0x43, (byte) 0x65, (byte) 0x72, (byte) 0x74, (byte) 0x69, (byte) 0x66, (byte) 0x69, (byte) 0x63, (byte) 0x61, (byte) 0x74, (byte) 0x69, (byte) 0x6f, (byte) 0x6e, (byte) 0x20, (byte) 0x53, (byte) 0x65, (byte) 0x72, (byte) 0x76, (byte) 0x69, (byte) 0x63, (byte) 0x65, (byte) 0x73, (byte) 0x20, (byte) 0x44, (byte) 0x69, (byte) 0x76, (byte) 0x69, (byte) 0x73, (byte) 0x69, (byte) 0x6f, (byte) 0x6e, (byte) 0x31, (byte) 0x24, (byte) 0x30, (byte) 0x22, (byte) 0x06, (byte) 0x03, (byte) 0x55, (byte) 0x04, (byte) 0x03, (byte) 0x13, (byte) 0x1b, (byte) 0x54, (byte) 0x68, (byte) 0x61, (byte) 0x77, (byte) 0x74, (byte) 0x65, (byte) 0x20, (byte) 0x50, (byte) 0x65, (byte) 0x72, (byte) 0x73, (byte) 0x6f, (byte) 0x6e, (byte) 0x61, (byte) 0x6c, (byte) 0x20, (byte) 0x46, (byte) 0x72, (byte) 0x65, (byte) 0x65, (byte) 0x6d, (byte) 0x61, (byte) 0x69, (byte) 0x6c, (byte) 0x20, (byte) 0x43, (byte) 0x41, (byte) 0x31, (byte) 0x2b, (byte) 0x30, (byte) 0x29, (byte) 0x06, (byte) 0x09, (byte) 0x2a, (byte) 0x86, (byte) 0x48, (byte) 0x86, (byte) 0xf7, (byte) 0x0d, (byte) 0x01, (byte) 0x09, (byte) 0x01, (byte) 0x16, (byte) 0x1c, (byte) 0x70, (byte) 0x65, (byte) 0x72, (byte) 0x73, (byte) 0x6f, (byte) 0x6e, (byte) 0x61, (byte) 0x6c, (byte) 0x2d, (byte) 0x66, (byte) 0x72, (byte) 0x65, (byte) 0x65, (byte) 0x6d, (byte) 0x61, (byte) 0x69, (byte) 0x6c, (byte) 0x40, (byte) 0x74, (byte) 0x68, (byte) 0x61, (byte) 0x77, (byte) 0x74, (byte) 0x65, (byte) 0x2e, (byte) 0x63, (byte) 0x6f, (byte) 0x6d, (byte) 0x30, (byte) 0x81, (byte) 0x9f, (byte) 0x30, (byte) 0x0d, (byte) 0x06, (byte) 0x09, (byte) 0x2a, (byte) 0x86, (byte) 0x48, (byte) 0x86, (byte) 0xf7, (byte) 0x0d, (byte) 0x01, (byte) 0x01, (byte) 0x01, (byte) 0x05, (byte) 0x00, (byte) 0x03, (byte) 0x81, (byte) 0x8d, (byte) 0x00, (byte) 0x30, (byte) 0x81, (byte) 0x89, (byte) 0x02, (byte) 0x81, (byte) 0x81, (byte) 0x00, (byte) 0xd4, (byte) 0x69, (byte) 0xd7, (byte) 0xd4, (byte) 0xb0, (byte) 0x94, (byte) 0x64, (byte) 0x5b, (byte) 0x71, (byte) 0xe9, (byte) 0x47, (byte) 0xd8, (byte) 0x0c, (byte) 0x51, (byte) 0xb6, (byte) 0xea, (byte) 0x72, (byte) 0x91, (byte) 0xb0, (byte) 0x84, (byte) 0x5e, (byte) 0x7d, (byte) 0x2d, (byte) 0x0d, (byte) 0x8f, (byte) 0x7b, (byte) 0x12, (byte) 0xdf, (byte) 0x85, (byte) 0x25, (byte) 0x75, (byte) 0x28, (byte) 0x74, (byte) 0x3a, (byte) 0x42, (byte) 0x2c, (byte) 0x63, (byte) 0x27, (byte) 0x9f, (byte) 0x95, (byte) 0x7b, (byte) 0x4b, (byte) 0xef, (byte) 0x7e, (byte) 0x19, (byte) 0x87, (byte) 0x1d, (byte) 0x86, (byte) 0xea, (byte) 0xa3, (byte) 0xdd, (byte) 0xb9, (byte) 0xce, (byte) 0x96, (byte) 0x64, (byte) 0x1a, (byte) 0xc2, (byte) 0x14, (byte) 0x6e, (byte) 0x44, (byte) 0xac, (byte) 0x7c, (byte) 0xe6, (byte) 0x8f, (byte) 0xe8, (byte) 0x4d, (byte) 0x0f, (byte) 0x71, (byte) 0x1f, (byte) 0x40, (byte) 0x38, (byte) 0xa6, (byte) 0x00, (byte) 0xa3, (byte) 0x87, (byte) 0x78, (byte) 0xf6, (byte) 0xf9, (byte) 0x94, (byte) 0x86, (byte) 0x5e, (byte) 0xad, (byte) 0xea, (byte) 0xc0, (byte) 0x5e, (byte) 0x76, (byte) 0xeb, (byte) 0xd9, (byte) 0x14, (byte) 0xa3, (byte) 0x5d, (byte) 0x6e, (byte) 0x7a, (byte) 0x7c, (byte) 0x0c, (byte) 0xa5, (byte) 0x4b, (byte) 0x55, (byte) 0x7f, (byte) 0x06, (byte) 0x19, (byte) 0x29, (byte) 0x7f, (byte) 0x9e, (byte) 0x9a, (byte) 0x26, (byte) 0xd5, (byte) 0x6a, (byte) 0xbb, (byte) 0x38, (byte) 0x24, (byte) 0x08, (byte) 0x6a, (byte) 0x98, (byte) 0xc7, (byte) 0xb1, (byte) 0xda, (byte) 0xa3, (byte) 0x98, (byte) 0x91, (byte) 0xfd, (byte) 0x79, (byte) 0xdb, (byte) 0xe5, (byte) 0x5a, (byte) 0xc4, (byte) 0x1c, (byte) 0xb9, (byte) 0x02, (byte) 0x03, (byte) 0x01, (byte) 0x00, (byte) 0x01, (byte) 0xa3, (byte) 0x13, (byte) 0x30, (byte) 0x11, (byte) 0x30, (byte) 0x0f, (byte) 0x06, (byte) 0x03, (byte) 0x55, (byte) 0x1d, (byte) 0x13, (byte) 0x01, (byte) 0x01, (byte) 0xff, (byte) 0x04, (byte) 0x05, (byte) 0x30, (byte) 0x03, (byte) 0x01, (byte) 0x01, (byte) 0xff, (byte) 0x30, (byte) 0x0d, (byte) 0x06, (byte) 0x09, (byte) 0x2a, (byte) 0x86, (byte) 0x48, (byte) 0x86, (byte) 0xf7, (byte) 0x0d, (byte) 0x01, (byte) 0x01, (byte) 0x04, (byte) 0x05, (byte) 0x00, (byte) 0x03, (byte) 0x81, (byte) 0x81, (byte) 0x00, (byte) 0xc7, (byte) 0xec, (byte) 0x92, (byte) 0x7e, (byte) 0x4e, (byte) 0xf8, (byte) 0xf5, (byte) 0x96, (byte) 0xa5, (byte) 0x67, (byte) 0x62, (byte) 0x2a, (byte) 0xa4, (byte) 0xf0, (byte) 0x4d, (byte) 0x11, (byte) 0x60, (byte) 0xd0, (byte) 0x6f, (byte) 0x8d, (byte) 0x60, (byte) 0x58, (byte) 0x61, (byte) 0xac, (byte) 0x26, (byte) 0xbb, (byte) 0x52, (byte) 0x35, (byte) 0x5c, (byte) 0x08, (byte) 0xcf, (byte) 0x30, (byte) 0xfb, (byte) 0xa8, (byte) 0x4a, (byte) 0x96, (byte) 0x8a, (byte) 0x1f, (byte) 0x62, (byte) 0x42, (byte) 0x23, (byte) 0x8c, (byte) 0x17, (byte) 0x0f, (byte) 0xf4, (byte) 0xba, (byte) 0x64, (byte) 0x9c, (byte) 0x17, (byte) 0xac, (byte) 0x47, (byte) 0x29, (byte) 0xdf, (byte) 0x9d, (byte) 0x98, (byte) 0x5e, (byte) 0xd2, (byte) 0x6c, (byte) 0x60, (byte) 0x71, (byte) 0x5c, (byte) 0xa2, (byte) 0xac, (byte) 0xdc, (byte) 0x79, (byte) 0xe3, (byte) 0xe7, (byte) 0x6e, (byte) 0x00, (byte) 0x47, (byte) 0x1f, (byte) 0xb5, (byte) 0x0d, (byte) 0x28, (byte) 0xe8, (byte) 0x02, (byte) 0x9d, (byte) 0xe4, (byte) 0x9a, (byte) 0xfd, (byte) 0x13, (byte) 0xf4, (byte) 0xa6, (byte) 0xd9, (byte) 0x7c, (byte) 0xb1, (byte) 0xf8, (byte) 0xdc, (byte) 0x5f, (byte) 0x23, (byte) 0x26, (byte) 0x09, (byte) 0x91, (byte) 0x80, (byte) 0x73, (byte) 0xd0, (byte) 0x14, (byte) 0x1b, (byte) 0xde, (byte) 0x43, (byte) 0xa9, (byte) 0x83, (byte) 0x25, (byte) 0xf2, (byte) 0xe6, (byte) 0x9c, (byte) 0x2f, (byte) 0x15, (byte) 0xca, (byte) 0xfe, (byte) 0xa6, (byte) 0xab, (byte) 0x8a, (byte) 0x07, (byte) 0x75, (byte) 0x8b, (byte) 0x0c, (byte) 0xdd, (byte) 0x51, (byte) 0x84, (byte) 0x6b, (byte) 0xe4, (byte) 0xf8, (byte) 0xd1, (byte) 0xce, (byte) 0x77, (byte) 0xa2, (byte) 0x81 }; }