aboutsummaryrefslogtreecommitdiff
path: root/src/applets/ECKeyTester.java
diff options
context:
space:
mode:
authorJ08nY2016-11-02 00:21:42 +0100
committerJ08nY2016-11-21 14:09:47 +0100
commit6a68401612f5e61f966def58ed60eaff52b6f7f6 (patch)
tree5f87cc3ceff0aba994ffb58dde7c3dd25ebb5620 /src/applets/ECKeyTester.java
parentb4d72715e7d770b4925fef70a192665744a6273d (diff)
downloadECTester-6a68401612f5e61f966def58ed60eaff52b6f7f6.tar.gz
ECTester-6a68401612f5e61f966def58ed60eaff52b6f7f6.tar.zst
ECTester-6a68401612f5e61f966def58ed60eaff52b6f7f6.zip
EC_Consts: made parameters maskable
ECKeyGenerator: since parameters are maskable, one can now setCustomInvalidCurve(curve, PARAMETER_A | PARAMETER_B,...) and the resulting curve will have both A and B invalid.
Diffstat (limited to 'src/applets/ECKeyTester.java')
-rw-r--r--src/applets/ECKeyTester.java8
1 files changed, 2 insertions, 6 deletions
diff --git a/src/applets/ECKeyTester.java b/src/applets/ECKeyTester.java
index 757ece7..1031b06 100644
--- a/src/applets/ECKeyTester.java
+++ b/src/applets/ECKeyTester.java
@@ -13,10 +13,6 @@ public class ECKeyTester {
private KeyAgreement ecdhcKeyAgreement = null;
private Signature ecdsaSignature = null;
- //TODO: move these SW definitions to the main applet class.
- public final static short SW_SIG_LENGTH_MISMATCH = (short) 0xee4;
- public final static short SW_SIG_VERIFY_FAIL = (short) 0xee5;
-
public short allocateECDH() {
short result = ISO7816.SW_NO_ERROR;
try {
@@ -150,12 +146,12 @@ public class ECKeyTester {
short sigLength = ecdsaSignature.sign(inputBuffer, inputOffset, inputLength, sigBuffer, sigOffset);
if (sigLength != 20) { // per javacard.security.Signature an ALG_ECDSA_SHA should be 20 bytes.
- result = ECKeyTester.SW_SIG_LENGTH_MISMATCH;
+ result = SimpleECCApplet.SW_SIG_LENGTH_MISMATCH;
} else {
ecdsaSignature.init(verifyKey, Signature.MODE_VERIFY);
boolean correct = ecdsaSignature.verify(inputBuffer, inputOffset, inputLength, sigBuffer, sigOffset, sigLength);
if (!correct) {
- result = ECKeyTester.SW_SIG_VERIFY_FAIL;
+ result = SimpleECCApplet.SW_SIG_VERIFY_FAIL;
}
}
} catch (CryptoException ce) {