All Downloads are FREE. Search and download functionalities are using the official Maven repository.

org.kapott.hbci.smartcardio.RSACardService Maven / Gradle / Ivy

There is a newer version: 4.0.0
Show newest version
/**
 * 
 */
package org.kapott.hbci.smartcardio;

import java.io.ByteArrayOutputStream;
import java.io.IOException;
import java.util.ArrayList;
import java.util.List;

import javax.smartcardio.Card;
import javax.smartcardio.CommandAPDU;

import org.kapott.hbci.exceptions.HBCI_Exception;
import org.kapott.hbci.manager.HBCIUtils;

/**
 * @author axel
 *
 */
public class RSACardService extends HBCICardService {
    
    final static int ISO7816_CLA_STD = SECCOS_CLA_STD;
    
    final static int ISO7816_INS_SELECT_FILE = SECCOS_INS_SELECT_FILE;
    final static int ISO7816_INS_VERIFY = SECCOS_INS_VERIFY;
    final static int ISO7816_INS_READ_BINARY = 0xB0;
    
    final static int ISO7816_PWD_TYPE_DF = SECCOS_PWD_TYPE_DF;
    
    private byte[] cid;
    
    @Override
    public void init(Card card) {
        super.init(card);
        
//        ATR atr = card.getATR();
//        if (!Arrays.equals(atr.getBytes(), new byte[]{
//            (byte) 0x3b,
//            (byte) 0xb7,
//            (byte) 0x94,
//            (byte) 0x00,
//            (byte) 0x81,
//            (byte) 0x31,
//            (byte) 0xfe,
//            (byte) 0x65,
//            (byte) 0x53,
//            (byte) 0x50,
//            (byte) 0x4b,
//            (byte) 0x32,
//            (byte) 0x33,
//            (byte) 0x90,
//            (byte) 0x00,
//            (byte) 0xd1
//            })) {
//            throw new HBCI_Exception("card has wrong ATR");
//        }
        
        selectFile(0x3F00);
        selectFile(0x2F02);
        byte[] data = readBinary(0, 0);
        
        SimpleTLV tlv = new SimpleTLV(data);
        if (tlv.isMalformed() || tlv.getSize() != 1 || tlv.getTag(0) != 0x5A) {
            throw new HBCI_Exception("malformed tlv for fid 0x2F02");
        }
        byte[] content = tlv.getContent(0);
        if (content.length != 10) {
            throw new HBCI_Exception("malformed tlv for fid 0x2F02");
        }
        
        cid = new byte[5];
        System.arraycopy(content, 4, cid, 0, 5);
        
        selectFile(0xA600);
    }
    
    public byte[] getCID() {
        return cid.clone();
    }
    
    private void selectFile(int fid) {
        byte[] data = {(byte) ((fid >> 8) & 0xFF), (byte) (fid & 0xFF)};
        
        CommandAPDU command = new CommandAPDU(ISO7816_CLA_STD, ISO7816_INS_SELECT_FILE, 0x00, 0x0C, data);
        
        send(command);
    }
    
    private byte[] readBinary(int offset, int length) {
        int p1 = (offset >> 8) & 0x7F;
        int p2 = offset & 0xFF;
        int ne = length == 0 ? 256 : length;
        
        CommandAPDU command = new CommandAPDU(ISO7816_CLA_STD, ISO7816_INS_READ_BINARY, p1, p2, ne);
        
        return receive(command);
    }
    
    @Override
    protected byte[] createPINVerificationDataStructure(int pwdId) throws IOException {
        ByteArrayOutputStream verifyCommand = new ByteArrayOutputStream();
        verifyCommand.write(0xff); // bTimeOut
        verifyCommand.write(0x00); // bTimeOut2
        verifyCommand.write(0x82); // bmFormatString
        verifyCommand.write(0x00); // bmPINBlockString
        verifyCommand.write(0x00); // bmPINLengthFormat
        verifyCommand.write(new byte[] {(byte) 0x20,(byte) 0x00}); // PIN size (max/min)
        verifyCommand.write(0x02); // bEntryValidationCondition
        verifyCommand.write(0x01); // bNumberMessage
        verifyCommand.write(new byte[] { 0x04, 0x09 }); // wLangId
        verifyCommand.write(0x00); // bMsgIndex
        verifyCommand.write(new byte[] { 0x00, 0x00, 0x00 }); // bTeoPrologue
        byte[] verifyApdu = new byte[] {
            ISO7816_CLA_STD, // CLA
            ISO7816_INS_VERIFY, // INS
            0x00, // P1
            (byte) (ISO7816_PWD_TYPE_DF | pwdId), // P2
            0x08, // Lc = 8 bytes in command data
            (byte) 0x20, (byte) 0x20, (byte) 0x20, (byte) 0x20,
            (byte) 0x20, (byte) 0x20, (byte) 0x20, (byte) 0x20 };
        verifyCommand.write(verifyApdu.length & 0xff); // ulDataLength[0]
        verifyCommand.write(0x00); // ulDataLength[1]
        verifyCommand.write(0x00); // ulDataLength[2]
        verifyCommand.write(0x00); // ulDataLength[3]
        verifyCommand.write(verifyApdu); // abData
        return verifyCommand.toByteArray();
    }
    
    //
    // this seems to be needed only when data on chip card should be changed
    //
//    private void verifyModifyPIN(int pwdId) {
//        byte[] body = new byte[] {(byte) 0x20, (byte) 0x20, (byte) 0x20, (byte) 0x20, 
//                                  (byte) 0x20, (byte) 0x20, (byte) 0x20, (byte) 0x20};
//        
//        System.arraycopy(cid, 0, body, 0, cid.length);
//        
//        CommandAPDU command = new CommandAPDU(ISO7816_CLA_STD, ISO7816_INS_VERIFY,
//                                              (byte) 0x00, (byte) (ISO7816_PWD_TYPE_DF | pwdId),
//                                              body);
//        send(command);
//    }
    
    @Override
    public void verifySoftPIN(int pwdId, byte[] softPin) {
        if (softPin.length > 8)
            throw new HBCI_Exception("illegal PIN size");
        
        byte[] body = new byte[] {(byte) 0x20, (byte) 0x20, (byte) 0x20, (byte) 0x20, 
                                  (byte) 0x20, (byte) 0x20, (byte) 0x20, (byte) 0x20};
        
        System.arraycopy(softPin, 0, body, 0, softPin.length);
        
        CommandAPDU command = new CommandAPDU(ISO7816_CLA_STD, ISO7816_INS_VERIFY,
                                              (byte) 0x00, (byte) (ISO7816_PWD_TYPE_DF | pwdId),
                                              body);
        send(command);
    }
    
    public RSABankData readBankData(int idx) {
        selectFile(0xA603);
        byte[] rawData  = readRecordBySFI(0x00, idx);
        if (rawData == null)
            return null;
        
        byte[] customerIdData = null;
        try {
            selectFile(0xA604);
            byte[] prefix = readBinary(0, 1);
            HBCIUtils.log("A604 prefix = " + prefix[0], HBCIUtils.LOG_DEBUG);
            int max = prefix[0] >> 4;
            byte[] states = readBinary(1, max);
            for (int n = 0; n < max; n++) {
                if ((states[n] >> 4) == (idx + 1) && (states[n] & 0x01) != 0) {
                    customerIdData = readBinary(1 + max + (n * 3 * 30), 30);
                    break;
                }
            }
        } catch (HBCI_Exception e) {
            HBCIUtils.log(e, HBCIUtils.LOG_DEBUG);
            // properly there are no information about customer id on this card
            customerIdData = null;
        }
        
        return new RSABankData(idx, rawData, customerIdData);
    }
    
    private String toHex(byte[] bytes)
    {
      StringBuffer sb = new StringBuffer();
      for (byte b:bytes)
      {
        String s = Integer.toHexString(b & 0xff).toUpperCase();
        if (s.length() == 1)
          sb.append("0");
        sb.append(s);
        sb.append(" ");
      }
      return sb.toString();
    }
    
    public void writeBankData(int idx, RSABankData bankData) {
        byte[] rawData = bankData.toRecord();
        
        HBCIUtils.log("bankData=" + toHex(rawData), HBCIUtils.LOG_DEBUG);
//        selectFile(0xA603);
//        updateRecordBySFI(0x00, idx, rawData);
    }
    
    public RSAKeyData[] readKeyData(int idx) {
        selectFile(0xB300);
        byte[] verifyPKData = null;
        byte[] encipherPKData = null;
        byte[] signPKData = null;
        byte[] decipherPKData = null;
        byte[] pkCount = readBinary(0, 1);
        if (pkCount != null && pkCount.length == 1) {
            for (int n = 0; n < pkCount[0]; n++) {
                byte[] pkData = readBinary(1 + (n * 0x79), 0x79);
                if (pkData != null && pkData.length == 0x79) {
                    if (pkData[0] == (byte) (0x91 + idx))
                        verifyPKData = pkData;
                    if (pkData[0] == (byte) (0x96 + idx))
                        encipherPKData = pkData;
                    if (pkData[0] == (byte) (0x81 + idx))
                        signPKData = pkData;
                    if (pkData[0] == (byte) (0x86 + idx))
                        decipherPKData = pkData;
                }
            }
        }
        selectFile(0xA602);
        byte[] rawData = readBinary(1 + (idx * 4 * 8), 4 * 8);
        if (rawData == null)
            return null;
        return new RSAKeyData[]{
                        new RSAKeyData(idx, RSAKeyData.Type.VERIFY, rawData, verifyPKData),
                        new RSAKeyData(idx, RSAKeyData.Type.ENCIPHER, rawData, encipherPKData),
                        new RSAKeyData(idx, RSAKeyData.Type.SIGN, rawData, signPKData),
                        new RSAKeyData(idx, RSAKeyData.Type.DECIPHER, rawData, decipherPKData)
                        };
    }
    
    public int readSigId(int idx) {
        selectFile(0xA601);
        byte[] rawData  = readRecordBySFI(0x00, idx);
        if (rawData == null)
            return 0;
        return ((((int) rawData[0]) & 0xFF) << 24) | ((((int) rawData[1]) & 0xFF) << 16) | ((((int) rawData[2]) & 0xFF) << 8) | (((int) rawData[3]) & 0xFF);
    }
    
    public void writeSigId(int idx, int sigId) {
        // Dont' write anything! SigId is incremented by card itself.
//        byte[] rawData=new byte[4];
//        rawData[0]=(byte) ((sigId >> 24) & 0xFF);
//        rawData[1]=(byte) ((sigId >> 16) & 0xFF);
//        rawData[2]=(byte) ((sigId >>  8) & 0xFF);
//        rawData[3]=(byte)  (sigId        & 0xFF);
//        
//        HBCIUtils.log("sidId=" + toHex(rawData), HBCIUtils.LOG_DEBUG);
//        //selectFile(0xA601);
//        //updateRecordBySFI(0x00, idx, rawData);
    }
    
    public byte[] sign(int idx, byte[] data) {
        // MANAGE SE (activate my sig key)
        send(new CommandAPDU(ISO7816_CLA_STD, 0x22, 0x41, 0xB6 /*signature*/, new byte[]{
                        (byte) 0x84, // private key
                        (byte) 0x01, // length
                        (byte) (0x81 + idx), // kid
                        (byte) 0x83, // public key
                        (byte) 0x01, // length
                        (byte) (0x81 + idx), // kid
                        (byte) 0x80, // algorithm
                        (byte) 0x01, // length
                        (byte) 0x25  // HBCI
                        }));
        // PUT HASH
        send(new CommandAPDU(ISO7816_CLA_STD, 0x2a, 0x90, 0x81, data));
        // SIGN
        return receive(new CommandAPDU(ISO7816_CLA_STD, 0x2a, 0x9e, 0x9a, 256));
    }
    
    public boolean verify(int idx, byte[] data, byte[] sig) {
        // MANAGE SE (activate inst sig key)
        send(new CommandAPDU(ISO7816_CLA_STD, 0x22, 0x41, 0xB6 /*signature*/, new byte[]{
                        (byte) 0x84, // private key
                        (byte) 0x01, // length
                        (byte) (0x81 + idx), // kid
                        (byte) 0x83, // public key
                        (byte) 0x01, // length
                        (byte) (0x91 + idx), // kid
                        (byte) 0x80, // algorithm
                        (byte) 0x01, // length
                        (byte) 0x25  // HBCI
                        }));
        // PUT HASH
        send(new CommandAPDU(ISO7816_CLA_STD, 0x2a, 0x90, 0x81, data));
        // VERIFY
        try {
            send(new CommandAPDU(ISO7816_CLA_STD, 0x2a, 0x00, 0xa8, sig));
        } catch (HBCI_Exception e) {
            return false;
        }
        return true;
    }
    
    public byte[] encipher(int idx, byte[] data) {
        // MANAGE SE (activate inst enc key)
        send(new CommandAPDU(ISO7816_CLA_STD, 0x22, 0x41, 0xB8 /*cipher*/, new byte[]{
                        (byte) 0x84, // private key
                        (byte) 0x01, // length
                        (byte) (0x86 + idx), // kid
                        (byte) 0x83, // public key
                        (byte) 0x01, // length
                        (byte) (0x96 + idx) // kid
                        }));
        // ENCIPHER
        byte[] buffer = receive(new CommandAPDU(ISO7816_CLA_STD, 0x2a, 0x86, 0x80, data, 256));
        // strip padding indicator
        byte[] result = new byte[buffer.length - 1];
        System.arraycopy(buffer, 1, result, 0, result.length);
        return result;
    }
    
    public byte[] decipher(int idx, byte[] data) {
        // insert padding indicator
        byte[] buffer = new byte[data.length + 1];
        buffer[0] = 0;
        System.arraycopy(data, 0, buffer, 1, data.length);
        // MANAGE SE (activate my enc key)
        send(new CommandAPDU(ISO7816_CLA_STD, 0x22, 0x41, 0xB8 /*cipher*/, new byte[]{
                        (byte) 0x84, // private key
                        (byte) 0x01, // length
                        (byte) (0x86 + idx), // kid
                        (byte) 0x83, // public key
                        (byte) 0x01, // length
                        (byte) (0x86 + idx) // kid
        }));
        // DECIPHER
        return receive(new CommandAPDU(ISO7816_CLA_STD, 0x2a, 0x80, 0x86, buffer, 256));
    }
    
    static class SimpleTLV {
        
        private final boolean malformed;
        private final byte[] data;
        private final byte[] tags;
        private final byte[][] contents;
        
        public SimpleTLV(byte[] data) {
            List tags = new ArrayList();
            List contents = new ArrayList();
            
            int pos = 0;
            while (pos < data.length) {
                if (data[pos] == (byte) 0x00 || data[pos] == (byte) 0xFF) {
                    pos++;
                } else {
                    if (data.length < (pos + 2)) {
                        pos = Integer.MAX_VALUE;
                        break;
                    }
                    byte tag = data[pos++];
                    byte len = data[pos++];
                    int length;
                    if (len == (byte) 0xFF) {
                        if (data.length < (pos + 2)) {
                            pos = Integer.MAX_VALUE;
                            break;
                        }
                        byte len1 = data[pos++];
                        byte len2 = data[pos++];
                        length = ((((int) len1) & 0xFF) << 8) | (((int) len2) & 0xFF);
                    } else {
                        length = ((int) len) & 0xFF;
                    }
                    if (data.length < (pos + length)) {
                        pos = Integer.MAX_VALUE;
                        break;
                    }
                    byte[] content = new byte[length];
                    System.arraycopy(data, pos, content, 0, length);
                    pos += length;
                    tags.add(tag);
                    contents.add(content);
                }
            }
            
            byte[] tempTags = new byte[tags.size()];
            for (int n = 0; n < tags.size(); n++)
                tempTags[n] = tags.get(n);
            
            this.malformed = pos == Integer.MAX_VALUE;
            this.data = data.clone();
            this.tags = this.malformed ? new byte[0] : tempTags;
            this.contents = this.malformed ? new byte[0][0] : contents.toArray(new byte[contents.size()][]);
        }
        
        public boolean isMalformed() {
            return malformed;
        }
        
        public byte[] getData() {
            return data.clone();
        }
        
        public int getSize() {
            return tags.length;
        }
        
        public byte getTag(int idx) {
            return tags[idx];
        }
        
        public byte[] getContent(int idx) {
            return contents[idx].clone();
        }
        
    }

}




© 2015 - 2024 Weber Informatics LLC | Privacy Policy