/* * copyright 1997, 2000 * the regents of the university of michigan * all rights reserved * * permission is granted to use, copy, create derivative works * and redistribute this software and such derivative works * for any purpose, so long as the name of the university of * michigan is not used in any advertising or publicity * pertaining to the use or distribution of this software * without specific, written prior authorization. if the * above copyright notice or any other identification of the * university of michigan is included in any copy of any * portion of this software, then the disclaimer below must * also be included. * * this software is provided as is, without representation * from the university of michigan as to its fitness for any * purpose, and without warranty by the university of * michigan of any kind, either express or implied, including * without limitation the implied warranties of * merchantability and fitness for a particular purpose. the * regents of the university of michigan shall not be liable * for any damages, including special, indirect, incidental, or * consequential damages, with respect to any claim arising * out of or in connection with the use of the software, even * if it has been or is hereafter advised of the possibility of * such damages. * * SSH / smartcard integration project, smartcard side * * Tomoko Fukuzawa, created, Feb., 2000 * Naomaru Itoi, modified, Apr., 2000 */ import javacard.framework.*; import javacardx.framework.*; import javacardx.crypto.*; public class Ssh extends javacard.framework.Applet { /* constants declaration */ // code of CLA byte in the command APDU header private final byte Ssh_CLA =(byte)0x05; // codes of INS byte in the command APDU header private final byte DECRYPT = (byte) 0x10; private final byte GET_KEYLENGTH = (byte) 0x20; private final byte GET_PUBKEY = (byte) 0x30; private final byte GET_RESPONSE = (byte) 0xc0; /* instance variables declaration */ private final short keysize = 1024; //RSA_CRT_PrivateKey rsakey; AsymKey rsakey; CyberflexFile file; CyberflexOS os; byte buffer[]; //byte pubkey[]; static byte[] keyHdr = {(byte)0xC2, (byte)0x01, (byte)0x05}; private Ssh() { file = new CyberflexFile(); os = new CyberflexOS(); rsakey = new RSA_CRT_PrivateKey (keysize); rsakey.setKeyInstance ((short)0xc8, (short)0x10); if ( ! rsakey.isSupportedLength (keysize) ) ISOException.throwIt (ISO.SW_WRONG_LENGTH); /* pubkey = new byte[keysize/8]; file.selectFile((short)(0x3f<<8)); // select root file.selectFile((short)(('s'<<8)|'h')); // select public key file os.readBinaryFile (pubkey, (short)0, (short)0, (short)(keysize/8)); */ register(); } // end of the constructor public static void install(APDU apdu) { new Ssh(); // create a Ssh applet instance (card) } // end of install method public void process(APDU apdu) { // APDU object carries a byte array (buffer) to // transfer incoming and outgoing APDU header // and data bytes between card and CAD buffer = apdu.getBuffer(); // verify that if the applet can accept this // APDU message // NI: change suggested by Wayne Dyksen, Purdue if (buffer[ISO.OFFSET_INS] == ISO.INS_SELECT) ISOException.throwIt(ISO.SW_NO_ERROR); switch (buffer[ISO.OFFSET_INS]) { case DECRYPT: if (buffer[ISO.OFFSET_CLA] != Ssh_CLA) ISOException.throwIt(ISO.SW_CLA_NOT_SUPPORTED); //decrypt (apdu); short size = (short) (buffer[ISO.OFFSET_LC] & 0x00FF); if (apdu.setIncomingAndReceive() != size) ISOException.throwIt (ISO.SW_WRONG_LENGTH); rsakey.cryptoUpdate (buffer, (short) ISO.OFFSET_CDATA, size, buffer, (short) ISO.OFFSET_CDATA); apdu.setOutgoingAndSend ((short) ISO.OFFSET_CDATA, size); return; case GET_PUBKEY: file.selectFile((short)(0x3f<<8)); // select root file.selectFile((short)(('s'<<8)|'h')); // select public key file os.readBinaryFile (buffer, (short)0, (short)0, (short)(keysize/8)); apdu.setOutgoingAndSend((short)0, (short)(keysize/8)); /* apdu.setOutgoing(); apdu.setOutgoingLength((short)(keysize/8)); apdu.sendBytesLong(pubkey, (short)0, (short)(keysize/8)); */ return; case GET_KEYLENGTH: buffer[0] = (byte)((keysize >> 8) & 0xff); buffer[1] = (byte)(keysize & 0xff); apdu.setOutgoingAndSend ((short)0, (short)2); return; case GET_RESPONSE: return; default: ISOException.throwIt (ISO.SW_INS_NOT_SUPPORTED); } } // end of process method /* private void decrypt (APDU apdu) { short size = (short) (buffer[ISO.OFFSET_LC] & 0x00FF); if (apdu.setIncomingAndReceive() != size) ISOException.throwIt (ISO.SW_WRONG_LENGTH); //short offset = (short) ISO.OFFSET_CDATA; rsakey.cryptoUpdate (buffer, (short) ISO.OFFSET_CDATA, size, buffer, (short) ISO.OFFSET_CDATA); apdu.setOutgoingAndSend ((short) ISO.OFFSET_CDATA, size); } */ } // end of class Ssh