Keyple Card Calypso C++ Library 2.2.2
Reference Terminal Reader API for C++
CmdSamDataCipher.cpp
Go to the documentation of this file.
1/**************************************************************************************************
2 * Copyright (c) 2022 Calypso Networks Association https://calypsonet.org/ *
3 * *
4 * See the NOTICE file(s) distributed with this work for additional information regarding *
5 * copyright ownership. *
6 * *
7 * This program and the accompanying materials are made available under the terms of the Eclipse *
8 * Public License 2.0 which is available at http://www.eclipse.org/legal/epl-2.0 *
9 * *
10 * SPDX-License-Identifier: EPL-2.0 *
11 **************************************************************************************************/
12
13#include "CmdSamDataCipher.h"
14
15/* Keyple Card Calypso */
16#include "CalypsoCardAdapter.h"
23#include "SamUtilAdapter.h"
24
25/* Keyple Core Util */
26#include "ApduUtil.h"
27#include "Arrays.h"
28#include "System.h"
29
30namespace keyple {
31namespace card {
32namespace calypso {
33
34using namespace keyple::core::util;
35using namespace keyple::core::util::cpp;
36
37const std::map<const int, const std::shared_ptr<StatusProperties>>
38 CmdSamDataCipher::STATUS_TABLE = initStatusTable();
39
40const std::map<const int, const std::shared_ptr<StatusProperties>>
41 CmdSamDataCipher::initStatusTable()
42{
43 std::map<const int, const std::shared_ptr<StatusProperties>> m =
45
46 m.insert({0x6700,
47 std::make_shared<StatusProperties>("Incorrect Lc.",
48 typeid(CalypsoSamIllegalParameterException))});
49 m.insert({0x6900,
50 std::make_shared<StatusProperties>("An event counter cannot be incremented.",
51 typeid(CalypsoSamCounterOverflowException))});
52 m.insert({0x6985,
53 std::make_shared<StatusProperties>(
54 "Preconditions not satisfied:\n" \
55 "- The SAM is locked.\n" \
56 "- Cipher or sign forbidden (DataCipherEnableBit of PAR5 is 0).\n" \
57 "- Ciphering or signing mode, and ciphering forbidden (CipherEnableBit of PAR1 " \
58 "is 0).\n" \
59 "- Decipher mode, and deciphering forbidden (DecipherDataEnableBit of PAR1 is " \
60 "0).\n" \
61 "- AES key.",
62 typeid(CalypsoSamAccessForbiddenException))});
63 m.insert({0x6A83,
64 std::make_shared<StatusProperties>("Record not found: ciphering key not found.",
65 typeid(CalypsoSamDataAccessException))});
66 m.insert({0x6B00,
67 std::make_shared<StatusProperties>("Incorrect P1.",
68 typeid(CalypsoSamIllegalParameterException))});
69
70 return m;
71}
72
74 const CalypsoSam::ProductType productType,
75 const std::shared_ptr<BasicSignatureComputationDataAdapter> signatureComputationData,
76 const std::shared_ptr<BasicSignatureVerificationDataAdapter> signatureVerificationData)
77: AbstractSamCommand(CalypsoSamCommand::DATA_CIPHER, 0),
78 mSignatureComputationData(signatureComputationData),
79 mSignatureVerificationData(signatureVerificationData)
80{
81 const uint8_t cla = SamUtilAdapter::getClassByte(productType);
82 const uint8_t ins = getCommandRef().getInstructionByte();
83 const uint8_t p1 = 0x40; /* TODO implement the other modes (cipher, decipher) */
84 const uint8_t p2 = 0x00;
85
86 std::vector<uint8_t> dataIn;
87
88 if (signatureComputationData != nullptr) {
89 dataIn = std::vector<uint8_t>(2 + signatureComputationData->getData().size());
90 dataIn[0] = signatureComputationData->getKif();
91 dataIn[1] = signatureComputationData->getKvc();
92 System::arraycopy(signatureComputationData->getData(),
93 0,
94 dataIn,
95 2,
96 signatureComputationData->getData().size());
97 } else if (signatureVerificationData != nullptr) {
98 dataIn = std::vector<uint8_t>(2 + signatureVerificationData->getData().size());
99 dataIn[0] = signatureVerificationData->getKif();
100 dataIn[1] = signatureVerificationData->getKvc();
101 System::arraycopy(signatureVerificationData->getData(),
102 0,
103 dataIn,
104 2,
105 signatureVerificationData->getData().size());
106 } else {
107 dataIn = std::vector<uint8_t>(0);
108 }
109
110 setApduRequest(std::make_shared<ApduRequestAdapter>(ApduUtil::build(cla, ins, p1, p2, dataIn)));
111}
112
113const std::map<const int, const std::shared_ptr<StatusProperties>>&
115{
116 return STATUS_TABLE;
117}
118
120 const std::shared_ptr<ApduResponseApi> apduResponse)
121{
123
124 if (apduResponse->getDataOut().size() > 0) {
125 if (mSignatureComputationData != nullptr) {
126 mSignatureComputationData->setSignature(
127 Arrays::copyOfRange(apduResponse->getDataOut(),
128 0,
129 mSignatureComputationData->getSignatureSize()));
130
131 } else if (mSignatureVerificationData != nullptr) {
132 const std::vector<uint8_t> computedSignature =
133 Arrays::copyOfRange(apduResponse->getDataOut(),
134 0,
135 mSignatureVerificationData->getSignature().size());
136 mSignatureVerificationData->setSignatureValid(
137 Arrays::equals(computedSignature, mSignatureVerificationData->getSignature()));
138 }
139 }
140
141 return *this;
142}
143
145{
147
148 if (mSignatureVerificationData != nullptr && !mSignatureVerificationData->isSignatureValid()) {
149 throw CalypsoSamSecurityDataException("Incorrect signature.", getCommandRef(), 0);
150 }
151}
152
153}
154}
155}
virtual void setApduRequest(const std::shared_ptr< ApduRequestAdapter > apduRequest) final
AbstractSamCommand & setApduResponse(const std::shared_ptr< ApduResponseApi > apduResponse) override
static const std::map< const int, const std::shared_ptr< StatusProperties > > STATUS_TABLE
const CalypsoSamCommand & getCommandRef() const override
CmdSamDataCipher(const CalypsoSam::ProductType productType, const std::shared_ptr< BasicSignatureComputationDataAdapter > signatureComputationData, const std::shared_ptr< BasicSignatureVerificationDataAdapter > signatureVerificationData)
const std::map< const int, const std::shared_ptr< StatusProperties > > & getStatusTable() const override
AbstractSamCommand & setApduResponse(const std::shared_ptr< ApduResponseApi > apduResponse) override
static uint8_t getClassByte(const ProductType productType)
CalypsoSam::ProductType ProductType