82 lines
2.9 KiB
Java
82 lines
2.9 KiB
Java
![]() |
/*
|
||
|
SmartPGP : JavaCard implementation of OpenPGP card v3 specification
|
||
|
https://github.com/ANSSI-FR/smartpgp
|
||
|
Copyright (C) 2016 ANSSI
|
||
|
|
||
|
This program is free software; you can redistribute it and/or
|
||
|
modify it under the terms of the GNU General Public License
|
||
|
as published by the Free Software Foundation; either version 2
|
||
|
of the License, or (at your option) any later version.
|
||
|
|
||
|
This program is distributed in the hope that it will be useful,
|
||
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||
|
GNU General Public License for more details.
|
||
|
|
||
|
You should have received a copy of the GNU General Public License
|
||
|
along with this program; if not, write to the Free Software
|
||
|
Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
|
||
|
*/
|
||
|
|
||
|
package fr.anssi.smartpgp;
|
||
|
|
||
|
import javacard.framework.*;
|
||
|
import javacard.security.*;
|
||
|
import javacardx.apdu.*;
|
||
|
import javacardx.crypto.*;
|
||
|
|
||
|
public final class CmacKey {
|
||
|
|
||
|
protected final AESKey key;
|
||
|
protected final byte[] k1;
|
||
|
protected final byte[] k2;
|
||
|
|
||
|
protected CmacKey() {
|
||
|
key = (AESKey)KeyBuilder.buildKey(KeyBuilder.TYPE_AES_TRANSIENT_DESELECT,
|
||
|
(short)(Constants.aesKeyLength() * 8),
|
||
|
false);
|
||
|
|
||
|
k1 = JCSystem.makeTransientByteArray(Constants.AES_BLOCK_SIZE, JCSystem.CLEAR_ON_DESELECT);
|
||
|
|
||
|
k2 = JCSystem.makeTransientByteArray(Constants.AES_BLOCK_SIZE, JCSystem.CLEAR_ON_DESELECT);
|
||
|
}
|
||
|
|
||
|
protected final boolean isInitialized() {
|
||
|
return key.isInitialized();
|
||
|
}
|
||
|
|
||
|
protected final void clearKey() {
|
||
|
key.clearKey();
|
||
|
Util.arrayFillNonAtomic(k1, (short)0, (short)k1.length, (byte)0);
|
||
|
Util.arrayFillNonAtomic(k2, (short)0, (short)k2.length, (byte)0);
|
||
|
}
|
||
|
|
||
|
protected final void setKey(final byte[] buf, final short bufOff) {
|
||
|
key.setKey(buf, bufOff);
|
||
|
|
||
|
final Cipher cipher = Cipher.getInstance(Cipher.ALG_AES_BLOCK_128_CBC_NOPAD, false);
|
||
|
|
||
|
cipher.init(key, Cipher.MODE_ENCRYPT);
|
||
|
|
||
|
Util.arrayFillNonAtomic(k2, (short)0, Constants.AES_BLOCK_SIZE, (byte)0);
|
||
|
cipher.doFinal(k2, (short)0, Constants.AES_BLOCK_SIZE,
|
||
|
k1, (short)0);
|
||
|
|
||
|
final boolean mark = ((k1[0] & (byte)0x80) != (byte)0);
|
||
|
Common.arrayLeftShift(k1, (short)0,
|
||
|
k1, (short)0,
|
||
|
Constants.AES_BLOCK_SIZE);
|
||
|
if(mark) {
|
||
|
k1[(short)(Constants.AES_BLOCK_SIZE - 1)] = (byte)(k1[(short)(Constants.AES_BLOCK_SIZE - 1)] ^ (byte)0x87);
|
||
|
}
|
||
|
|
||
|
Common.arrayLeftShift(k1, (short)0,
|
||
|
k2, (short)0,
|
||
|
Constants.AES_BLOCK_SIZE);
|
||
|
if((k1[0] & (byte)0x80) != (byte)0) {
|
||
|
k2[(short)(Constants.AES_BLOCK_SIZE - 1)] = (byte)(k2[(short)(Constants.AES_BLOCK_SIZE - 1)] ^ (byte)0x87);
|
||
|
}
|
||
|
}
|
||
|
|
||
|
}
|