// $Id: Ssh.java,v 1.3 2002/03/21 22:44:05 rees Exp $ // // Ssh.java // SSH / smartcard integration project, smartcard side // // Tomoko Fukuzawa, created, Feb., 2000 // // Naomaru Itoi, modified, Apr., 2000 // // copyright 2000 // the regents of the university of michigan // all rights reserved // // permission is granted to use, copy, create derivative works // and redistribute this software and such derivative works // for any purpose, so long as the name of the university of // michigan is not used in any advertising or publicity // pertaining to the use or distribution of this software // without specific, written prior authorization. if the // above copyright notice or any other identification of the // university of michigan is included in any copy of any // portion of this software, then the disclaimer below must // also be included. // // this software is provided as is, without representation // from the university of michigan as to its fitness for any // purpose, and without warranty by the university of // michigan of any kind, either express or implied, including // without limitation the implied warranties of // merchantability and fitness for a particular purpose. the // regents of the university of michigan shall not be liable // for any damages, including special, indirect, incidental, or // consequential damages, with respect to any claim arising // out of or in connection with the use of the software, even // if it has been or is hereafter advised of the possibility of // such damages. import javacard.framework.*; import javacardx.framework.*; import javacardx.crypto.*; public class Ssh extends javacard.framework.Applet { // Change this when the applet changes; hi byte is major, low byte is minor static final short applet_version = (short)0x0102; /* constants declaration */ // code of CLA byte in the command APDU header static final byte Ssh_CLA =(byte)0x05; // codes of INS byte in the command APDU header static final byte DECRYPT = (byte) 0x10; static final byte GET_KEYLENGTH = (byte) 0x20; static final byte GET_PUBKEY = (byte) 0x30; static final byte GET_VERSION = (byte) 0x32; static final byte GET_RESPONSE = (byte) 0xc0; static final short keysize = 1024; static final short root_fid = (short)0x3f00; static final short privkey_fid = (short)0x0012; static final short pubkey_fid = (short)(('s'<<8)|'h'); /* instance variables declaration */ AsymKey rsakey; CyberflexFile file; CyberflexOS os; private Ssh() { file = new CyberflexFile(); os = new CyberflexOS(); rsakey = new RSA_CRT_PrivateKey (keysize); if ( ! rsakey.isSupportedLength (keysize) ) ISOException.throwIt (ISO.SW_WRONG_LENGTH); register(); } // end of the constructor public boolean select() { if (!rsakey.isInitialized()) rsakey.setKeyInstance ((short)0xc8, (short)0x10); return true; } public static void install(APDU apdu) { new Ssh(); // create a Ssh applet instance (card) } // end of install method public static void main(String args[]) { ISOException.throwIt((short) 0x9000); } public void process(APDU apdu) { // APDU object carries a byte array (buffer) to // transfer incoming and outgoing APDU header // and data bytes between card and CAD byte buffer[] = apdu.getBuffer(); short size, st; // verify that if the applet can accept this // APDU message // NI: change suggested by Wayne Dyksen, Purdue if (buffer[ISO.OFFSET_INS] == ISO.INS_SELECT) ISOException.throwIt(ISO.SW_NO_ERROR); switch (buffer[ISO.OFFSET_INS]) { case DECRYPT: if (buffer[ISO.OFFSET_CLA] != Ssh_CLA) ISOException.throwIt(ISO.SW_CLA_NOT_SUPPORTED); //decrypt (apdu); size = (short) (buffer[ISO.OFFSET_LC] & 0x00FF); if (apdu.setIncomingAndReceive() != size) ISOException.throwIt (ISO.SW_WRONG_LENGTH); // check access; depends on bit 2 (x/a) file.selectFile(root_fid); file.selectFile(privkey_fid); st = os.checkAccess(ACL.EXECUTE); if (st != ST.ACCESS_CLEARED) { CyberflexAPDU.prepareSW1SW2(st); ISOException.throwIt(CyberflexAPDU.getSW1SW2()); } rsakey.cryptoUpdate (buffer, (short) ISO.OFFSET_CDATA, size, buffer, (short) ISO.OFFSET_CDATA); apdu.setOutgoingAndSend ((short) ISO.OFFSET_CDATA, size); break; case GET_PUBKEY: file.selectFile(root_fid); // select root file.selectFile(pubkey_fid); // select public key file size = (short)(file.getFileSize() - 16); st = os.readBinaryFile(buffer, (short)0, (short)0, size); if (st == ST.SUCCESS) apdu.setOutgoingAndSend((short)0, size); else { CyberflexAPDU.prepareSW1SW2(st); ISOException.throwIt(CyberflexAPDU.getSW1SW2()); } break; case GET_KEYLENGTH: Util.setShort(buffer, (short)0, keysize); apdu.setOutgoingAndSend ((short)0, (short)2); break; case GET_VERSION: Util.setShort(buffer, (short)0, applet_version); apdu.setOutgoingAndSend ((short)0, (short)2); break; case GET_RESPONSE: break; default: ISOException.throwIt (ISO.SW_INS_NOT_SUPPORTED); } } // end of process method } // end of class Ssh