diff --git a/OpenKeychain/src/main/java/org/sufficientlysecure/keychain/securitytoken/OpenPGPCapabilities.java b/OpenKeychain/src/main/java/org/sufficientlysecure/keychain/securitytoken/OpenPGPCapabilities.java new file mode 100644 index 000000000..5465b2f8a --- /dev/null +++ b/OpenKeychain/src/main/java/org/sufficientlysecure/keychain/securitytoken/OpenPGPCapabilities.java @@ -0,0 +1,174 @@ +/* + * Copyright (C) 2016 Nikita Mikhailov + * + * This program is free software: you can redistribute it and/or modify + * it under the terms of the GNU General Public License as published by + * the Free Software Foundation, either version 3 of the License, or + * (at your option) any later version. + * + * This program is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * GNU General Public License for more details. + * + * You should have received a copy of the GNU General Public License + * along with this program. If not, see . + */ + +package org.sufficientlysecure.keychain.securitytoken; + +import org.sufficientlysecure.keychain.util.Iso7816TLV; + +import java.io.IOException; +import java.util.HashMap; +import java.util.Map; + +public class OpenPGPCapabilities { + private final static int MASK_SM = 1 << 7; + private final static int MASK_KEY_IMPORT = 1 << 5; + private final static int MASK_ATTRIBUTES_CHANGABLE = 1 << 2; + + private boolean mPw1ValidForMultipleSignatures; + private byte[] mAid; + private byte[] mHistoricalBytes; + + private boolean mHasSM; + private boolean mAttriburesChangable; + private boolean mHasKeyImport; + + private byte mSMAlgo; + private int mMaxCmdLen; + private int mMaxRspLen; + + private Map mKeyFormats; + + public OpenPGPCapabilities(byte[] data) throws IOException { + Iso7816TLV[] tlvs = Iso7816TLV.readList(data, true); + mKeyFormats = new HashMap<>(); + + for (Iso7816TLV tlv : tlvs) { + switch (tlv.mT) { + case 0x4F: + mAid = tlv.mV; + break; + case 0x5F52: + mHistoricalBytes = tlv.mV; + break; + case 0x73: + parseDdo((Iso7816TLV.Iso7816CompositeTLV) tlv); + break; + } + } + } + + private void parseDdo(Iso7816TLV.Iso7816CompositeTLV tlvs) { + for (Iso7816TLV tlv : tlvs.mSubs) { + switch (tlv.mT) { + case 0xC0: + parseExtendedCaps(tlv.mV); + break; + case 0xC1: + parseAlgoCaps(KeyType.SIGN, tlv.mV); + break; + case 0xC2: + parseAlgoCaps(KeyType.ENCRYPT, tlv.mV); + break; + case 0xC3: + parseAlgoCaps(KeyType.AUTH, tlv.mV); + break; + case 0xC4: + mPw1ValidForMultipleSignatures = tlv.mV[0] == 1; + break; + } + } + } + + private void parseAlgoCaps(KeyType keyType, byte[] data) { + mKeyFormats.put(keyType, AlgorithmFormat.from(data[5])); + } + + private void parseExtendedCaps(byte[] v) { + mHasSM = (v[0] & MASK_SM) != 0; + mHasKeyImport = (v[0] & MASK_KEY_IMPORT) != 0; + mAttriburesChangable =(v[0] & MASK_ATTRIBUTES_CHANGABLE) != 0; + + mSMAlgo = v[1]; + + mMaxCmdLen = (v[6] << 8) + v[7]; + mMaxRspLen = (v[8] << 8) + v[9]; + } + + public boolean isPw1ValidForMultipleSignatures() { + return mPw1ValidForMultipleSignatures; + } + + public byte[] getAid() { + return mAid; + } + + public byte[] getHistoricalBytes() { + return mHistoricalBytes; + } + + public boolean isHasSM() { + return mHasSM; + } + + public boolean isAttriburesChangable() { + return mAttriburesChangable; + } + + public boolean isHasKeyImport() { + return mHasKeyImport; + } + + public byte getSMAlgo() { + return mSMAlgo; + } + + public int getMaxCmdLen() { + return mMaxCmdLen; + } + + public int getMaxRspLen() { + return mMaxRspLen; + } + + public AlgorithmFormat getFormatForKeyType(KeyType keyType) { + return mKeyFormats.get(keyType); + } + + public enum AlgorithmFormat { + STANDARD(0, false, false), + STANDARD_WITH_MODULUS(1, false, true), + CRT(2, true, false), + CRT_WITH_MODULUS(3, true, true); + + private int mValue; + private boolean mHasModulus; + private boolean mHasExtra; + + AlgorithmFormat(int value, boolean hasExtra, boolean hasModulus) { + mValue = value; + mHasModulus = hasModulus; + mHasExtra = hasExtra; + } + + public boolean isHasModulus() { + return mHasModulus; + } + + public boolean isHasExtra() { + return mHasExtra; + } + + public static AlgorithmFormat from(byte b) { + for (AlgorithmFormat format : values()) { + if (format.mValue == b) { + return format; + } + } + return null; + } + } +} diff --git a/OpenKeychain/src/main/java/org/sufficientlysecure/keychain/securitytoken/SecurityTokenHelper.java b/OpenKeychain/src/main/java/org/sufficientlysecure/keychain/securitytoken/SecurityTokenHelper.java index 3d484ad48..018b393b8 100644 --- a/OpenKeychain/src/main/java/org/sufficientlysecure/keychain/securitytoken/SecurityTokenHelper.java +++ b/OpenKeychain/src/main/java/org/sufficientlysecure/keychain/securitytoken/SecurityTokenHelper.java @@ -65,10 +65,10 @@ public class SecurityTokenHelper { private static final byte[] BLANK_FINGERPRINT = {0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0}; private Transport mTransport; private CardCapabilities mCardCapabilities; + private OpenPGPCapabilities mOpenPGPCapabilities; private Passphrase mPin; private Passphrase mAdminPin; - private boolean mPw1ValidForMultipleSignatures; private boolean mPw1ValidatedForSignature; private boolean mPw1ValidatedForDecrypt; // Mode 82 does other things; consider renaming? private boolean mPw3Validated; @@ -164,10 +164,9 @@ public class SecurityTokenHelper { throw new CardException("Initialization failed!", response.getSW()); } - mCardCapabilities = new CardCapabilities(getHistoricalBytes()); + mOpenPGPCapabilities = new OpenPGPCapabilities(getData(0x00, 0x65)); + mCardCapabilities = new CardCapabilities(mOpenPGPCapabilities.getHistoricalBytes()); - byte[] pwStatusBytes = getPwStatusBytes(); - mPw1ValidForMultipleSignatures = (pwStatusBytes[0] == 1); mPw1ValidatedForSignature = false; mPw1ValidatedForDecrypt = false; mPw3Validated = false; @@ -445,10 +444,6 @@ public class SecurityTokenHelper { return getHolderName(getData(0x00, 0x65)); } - private byte[] getHistoricalBytes() throws IOException { - return getData(0x5F, 0x52); - } - private byte[] getData(int p1, int p2) throws IOException { ResponseAPDU response = communicate(new CommandAPDU(0x00, 0xCA, p1, p2, MAX_APDU_NE_EXT)); if (response.getSW() != APDU_SW_SUCCESS) { @@ -525,7 +520,7 @@ public class SecurityTokenHelper { throw new CardException("Failed to sign", response.getSW()); } - if (!mPw1ValidForMultipleSignatures) { + if (!mOpenPGPCapabilities.isPw1ValidForMultipleSignatures()) { mPw1ValidatedForSignature = false; }