Compare commits

...

6 Commits

Author SHA1 Message Date
37c5ed9540 fix typo 2023-10-06 20:31:54 -05:00
653e968ee2 Document constants 2023-10-06 20:31:21 -05:00
69b5c1a9bc Add a warning about ROCA 2023-10-06 20:01:36 -05:00
55c1a5edb3 Add a comment 2023-10-05 19:15:05 -05:00
27f845187f Add a comment 2023-10-05 19:14:50 -05:00
dd1b18e5cb Add words to spell check dictionary 2023-10-05 19:14:30 -05:00
6 changed files with 57 additions and 27 deletions

12
.vscode/settings.json vendored
View File

@ -3,5 +3,15 @@
"license.extension": ".txt", "license.extension": ".txt",
"license.default": "GPL-2.0", "license.default": "GPL-2.0",
"license.filename": "LICENSE", "license.filename": "LICENSE",
"license.year": "auto" "license.year": "auto",
"cSpell.words": [
"APDU",
"apdubuf",
"Infineon",
"minlen",
"nopad",
"offcdata",
"pkcs",
"smartpgp"
]
} }

View File

@ -32,9 +32,11 @@ public final class Common {
protected final RandomData random; protected final RandomData random;
protected Common() { protected Common() {
/* Get an instance of cryptography Ciphers */
cipher_aes_cbc_nopad = Cipher.getInstance(Cipher.ALG_AES_BLOCK_128_CBC_NOPAD, false); cipher_aes_cbc_nopad = Cipher.getInstance(Cipher.ALG_AES_BLOCK_128_CBC_NOPAD, false);
cipher_rsa_pkcs1 = Cipher.getInstance(Cipher.ALG_RSA_PKCS1, false); cipher_rsa_pkcs1 = Cipher.getInstance(Cipher.ALG_RSA_PKCS1, false);
/* Get an instance of the Secure Random Number Generator */
random = RandomData.getInstance(RandomData.ALG_SECURE_RANDOM); random = RandomData.getInstance(RandomData.ALG_SECURE_RANDOM);
} }
@ -158,8 +160,8 @@ public final class Common {
} }
} }
protected static final short writeAlgorithmInformation(final byte key_tag, protected static final short writeAlgorithmInformation(final byte key_tag, final byte[] buf, short off) {
final byte[] buf, short off) {
for(short m = 2; m <= 4; ++m) { for(short m = 2; m <= 4; ++m) {
for(byte form = Constants.RSA_IMPORT_SUPPORTS_FORMAT_1 ? 1 : 3; form <= 3; form += 2) { for(byte form = Constants.RSA_IMPORT_SUPPORTS_FORMAT_1 ? 1 : 3; form <= 3; form += 2) {
buf[off++] = key_tag; buf[off++] = key_tag;

View File

@ -30,40 +30,46 @@ public final class Constants {
protected static final short APDU_MAX_LENGTH = (short)0x400; protected static final short APDU_MAX_LENGTH = (short)0x400;
/* See section 4.3.2 of the specification; Default is NONE; Standard UTF-8 PWs*/
protected static final byte[] KEY_DERIVATION_FUNCTION_DEFAULT = { protected static final byte[] KEY_DERIVATION_FUNCTION_DEFAULT = {
(byte)0x81, (byte)0x01, (byte)0x00 (byte)0x81, (byte)0x01, (byte)0x00
}; };
protected static final byte USER_PIN_RETRY_COUNT = 3; protected static final byte USER_PIN_RETRY_COUNT = 3; /* Card gets locked after this many incorrect attempts */
protected static final byte USER_PIN_MIN_SIZE = 0x06; protected static final byte USER_PIN_MIN_SIZE = 0x06; /* 6 chars is minimum as defined by spec */
protected static final byte USER_PIN_MAX_SIZE = 0x7f; /* max is 0x7f because PIN format 2 */ protected static final byte USER_PIN_MAX_SIZE = 0x7f; /* 127 chars is maximum as defined by spec */
/* UTF-8 bytes for the default user pin: 123456 is the value defined by the specification */
protected static final byte[] USER_PIN_DEFAULT = { protected static final byte[] USER_PIN_DEFAULT = {
(byte)0x31, (byte)0x32, (byte)0x33, (byte)0x34, (byte)0x31, (byte)0x32, (byte)0x33, (byte)0x34,
(byte)0x35, (byte)0x36 (byte)0x35, (byte)0x36
}; };
/* Is the USER_PIN required for signing actions; default: true */
protected static final boolean USER_PIN_DEFAULT_FORCE_VERIFY_SIGNATURE = true; protected static final boolean USER_PIN_DEFAULT_FORCE_VERIFY_SIGNATURE = true;
protected static final byte USER_PUK_RETRY_COUNT = 3; protected static final byte USER_PUK_RETRY_COUNT = 3; /* */
protected static final byte USER_PUK_MIN_SIZE = 0x08; protected static final byte USER_PUK_MIN_SIZE = 0x08; /* 8 chars is minimum as defined by spec */
protected static final byte USER_PUK_MAX_SIZE = 0x7f; /* max is 0x7f because PIN format 2 */ protected static final byte USER_PUK_MAX_SIZE = 0x7f; /* 127 chars is maximum as defined by spec */
protected static final byte ADMIN_PIN_RETRY_COUNT = 3; protected static final byte ADMIN_PIN_RETRY_COUNT = 3; /* Card gets reset after this many failed attempts */
protected static final byte ADMIN_PIN_MIN_SIZE = 0x08; protected static final byte ADMIN_PIN_MIN_SIZE = 0x08; /* 8 chars is minimum as defined by spec */
protected static final byte ADMIN_PIN_MAX_SIZE = 0x7f; /* max is 0x7f because PIN format 2 */ protected static final byte ADMIN_PIN_MAX_SIZE = 0x7f; /* 127 chars is maximum as defined by spec */
protected static final byte[] ADMIN_PIN_DEFAULT = { protected static final byte[] ADMIN_PIN_DEFAULT = {
(byte)0x31, (byte)0x32, (byte)0x33, (byte)0x34, (byte)0x31, (byte)0x32, (byte)0x33, (byte)0x34,
(byte)0x35, (byte)0x36, (byte)0x37, (byte)0x38 (byte)0x35, (byte)0x36, (byte)0x37, (byte)0x38
}; };
protected static final byte FINGERPRINT_SIZE = 20; protected static final byte FINGERPRINT_SIZE = 20; /* size of each fingerprint in bytes */
protected static final byte GENERATION_DATE_SIZE = 4; protected static final byte GENERATION_DATE_SIZE = 4; /* number of bytes to store the date+time */
protected static final byte NAME_MAX_LENGTH = 39; protected static final byte NAME_MAX_LENGTH = 39; /* max number of chars in cardholder name */
protected static final byte LANG_MIN_LENGTH = 2; protected static final byte LANG_MIN_LENGTH = 2; /* 2 char language codes */
protected static final byte LANG_MAX_LENGTH = 8; protected static final byte LANG_MAX_LENGTH = 8; /* spec allows up to 4 languages */
protected static final byte[] LANG_DEFAULT = { (byte)0x65, (byte)0x6e }; protected static final byte[] LANG_DEFAULT = { (byte)0x65, (byte)0x6e }; /* utf-8: EN */
/* Unsure if the following bytes and shorts actually need to be in card memory */
protected static final byte SEX_NOT_KNOWN = (byte)0x30; protected static final byte SEX_NOT_KNOWN = (byte)0x30;
protected static final byte SEX_MALE = (byte)0x31; protected static final byte SEX_MALE = (byte)0x31;
@ -108,6 +114,8 @@ public final class Constants {
protected static final short TAG_KEY_DERIVATION_FUNCTION = (short)0x00f9; protected static final short TAG_KEY_DERIVATION_FUNCTION = (short)0x00f9;
protected static final short TAG_ALGORITHM_INFORMATION = (short)0x00fa; protected static final short TAG_ALGORITHM_INFORMATION = (short)0x00fa;
/* The bytes and shorts below appear to be needed */
protected static final byte CRT_TAG_AUTHENTICATION_KEY = (byte)0xa4; protected static final byte CRT_TAG_AUTHENTICATION_KEY = (byte)0xa4;
protected static final byte CRT_TAG_SIGNATURE_KEY = (byte)0xb6; protected static final byte CRT_TAG_SIGNATURE_KEY = (byte)0xb6;
protected static final byte CRT_TAG_DECRYPTION_KEY = (byte)0xb8; protected static final byte CRT_TAG_DECRYPTION_KEY = (byte)0xb8;
@ -169,9 +177,9 @@ public final class Constants {
0x02 | /* support PSO:DEC/ENC AES */ 0x02 | /* support PSO:DEC/ENC AES */
0x01), /* support KDF-DO */ 0x01), /* support KDF-DO */
(byte)0x00, /* SM 0x01 = 128 bits, 0x02 = 256 bits, 0x03 = SCP11b */ (byte)0x00, /* SM 0x01 = 128 bits, 0x02 = 256 bits, 0x03 = SCP11b */
(byte)0x00, (byte)0x20, /* max length get challenge */ (byte)0x00, (byte)0x20, /* max length of get challenge response in bytes (decimal: 32) */
(byte)0x04, (byte)0x80, /* max length of carholder certificate in Bytes (decimal: 1152) */ (byte)0x04, (byte)0x80, /* max length of cardholder certificate in bytes (decimal: 1152) */
(byte)0x00, (byte)0xff, /* max length of special DOs (private, login, url, KDF-DO) */ (byte)0x00, (byte)0xff, /* max length of special DOs (private, login, url, KDF-DO) in bytes (decimal: 255) */
(byte)0x00, /* PIN format 2 is not supported */ (byte)0x00, /* PIN format 2 is not supported */
(byte)0x00 /* MSE not supported */ (byte)0x00 /* MSE not supported */
}; };
@ -217,6 +225,7 @@ public final class Constants {
protected static final byte ALGORITHM_ATTRIBUTES_MIN_LENGTH = 6; protected static final byte ALGORITHM_ATTRIBUTES_MIN_LENGTH = 6;
protected static final byte ALGORITHM_ATTRIBUTES_MAX_LENGTH = 13; protected static final byte ALGORITHM_ATTRIBUTES_MAX_LENGTH = 13;
/* FIXME: Can I modify these to get safer private key generation? */
protected static final byte[] ALGORITHM_ATTRIBUTES_DEFAULT = { protected static final byte[] ALGORITHM_ATTRIBUTES_DEFAULT = {
(byte)0x01, /* RSA */ (byte)0x01, /* RSA */
(byte)0x08, (byte)0x00, /* 2048 bits modulus */ (byte)0x08, (byte)0x00, /* 2048 bits modulus */

View File

@ -179,6 +179,14 @@ public final class PGPKey {
return Util.getShort(attributes, (short)3); return Util.getShort(attributes, (short)3);
} }
/*
* !!! WARNING !!! - Read this if your JavaCard is Infineon SLE78
* The API called by this function is flawed and vulnerable to ROCA.
* Malicious actors are able to determine the private key using ONLY the public key.
*
* It's HIGHLY recommended that you do NOT use this API; Instead, you
* should generate your private key off-device, then import it later
*/
private final KeyPair generateRSA() { private final KeyPair generateRSA() {
final PrivateKey priv = (PrivateKey)KeyBuilder.buildKey(KeyBuilder.TYPE_RSA_CRT_PRIVATE, rsaModulusBitSize(), false); final PrivateKey priv = (PrivateKey)KeyBuilder.buildKey(KeyBuilder.TYPE_RSA_CRT_PRIVATE, rsaModulusBitSize(), false);
final RSAPublicKey pub = (RSAPublicKey)KeyBuilder.buildKey(KeyBuilder.TYPE_RSA_PUBLIC, rsaModulusBitSize(), false); final RSAPublicKey pub = (RSAPublicKey)KeyBuilder.buildKey(KeyBuilder.TYPE_RSA_PUBLIC, rsaModulusBitSize(), false);

View File

@ -87,8 +87,7 @@ public final class Persistent {
protected final OwnerPIN admin_pin; /* PW3 */ protected final OwnerPIN admin_pin; /* PW3 */
protected byte admin_pin_length; protected byte admin_pin_length;
/* Called at Applet Install time; Reserve memory of persistent data objects */
protected Persistent() { protected Persistent() {
login = new byte[Constants.specialDoMaxLength()]; login = new byte[Constants.specialDoMaxLength()];
login_length = 0; login_length = 0;

View File

@ -39,11 +39,13 @@ public final class SmartPGPApplet extends Applet implements ExtendedLength {
transients = new Transients(); transients = new Transients();
} }
/* Called on applet install */
public static final void install(byte[] buf, short off, byte len) { public static final void install(byte[] buf, short off, byte len) {
// Reserve memory immediately
new SmartPGPApplet().register(buf, (short)(off + 1), buf[off]); new SmartPGPApplet().register(buf, (short)(off + 1), buf[off]);
} }
private final PGPKey currentTagOccurenceToKey() { private final PGPKey currentTagOccurrenceToKey() {
switch(transients.currentTagOccurrence()) { switch(transients.currentTagOccurrence()) {
case 0: case 0:
return data.pgp_keys[Persistent.PGP_KEYS_OFFSET_AUT]; return data.pgp_keys[Persistent.PGP_KEYS_OFFSET_AUT];
@ -421,7 +423,7 @@ public final class SmartPGPApplet extends Applet implements ExtendedLength {
break; break;
case Constants.TAG_CARDHOLDER_CERTIFICATE: case Constants.TAG_CARDHOLDER_CERTIFICATE:
k = currentTagOccurenceToKey(); k = currentTagOccurrenceToKey();
if(k == null) { if(k == null) {
ISOException.throwIt(Constants.SW_REFERENCE_DATA_NOT_FOUND); ISOException.throwIt(Constants.SW_REFERENCE_DATA_NOT_FOUND);
@ -471,7 +473,7 @@ public final class SmartPGPApplet extends Applet implements ExtendedLength {
return 0; return 0;
} }
final PGPKey k = currentTagOccurenceToKey(); final PGPKey k = currentTagOccurrenceToKey();
if(k == null) { if(k == null) {
ISOException.throwIt(Constants.SW_REFERENCE_DATA_NOT_FOUND); ISOException.throwIt(Constants.SW_REFERENCE_DATA_NOT_FOUND);
@ -1063,7 +1065,7 @@ public final class SmartPGPApplet extends Applet implements ExtendedLength {
case Constants.TAG_CARDHOLDER_CERTIFICATE: case Constants.TAG_CARDHOLDER_CERTIFICATE:
assertAdmin(); assertAdmin();
k = currentTagOccurenceToKey(); k = currentTagOccurrenceToKey();
if(k == null) { if(k == null) {
ISOException.throwIt(Constants.SW_REFERENCE_DATA_NOT_FOUND); ISOException.throwIt(Constants.SW_REFERENCE_DATA_NOT_FOUND);
return; return;