 a99e6303d5
			
		
	
	a99e6303d5
	
	
	
		
			
			git-svn-id: svn://svn.h5l.se/heimdal/trunk/heimdal@17591 ec53bebd-3082-4978-b11e-865c3cabbd6b
		
			
				
	
	
		
			935 lines
		
	
	
		
			20 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			935 lines
		
	
	
		
			20 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
| /*
 | |
|  * Copyright (c) 2004 - 2006 Kungliga Tekniska Högskolan
 | |
|  * (Royal Institute of Technology, Stockholm, Sweden). 
 | |
|  * All rights reserved. 
 | |
|  *
 | |
|  * Redistribution and use in source and binary forms, with or without 
 | |
|  * modification, are permitted provided that the following conditions 
 | |
|  * are met: 
 | |
|  *
 | |
|  * 1. Redistributions of source code must retain the above copyright 
 | |
|  *    notice, this list of conditions and the following disclaimer. 
 | |
|  *
 | |
|  * 2. Redistributions in binary form must reproduce the above copyright 
 | |
|  *    notice, this list of conditions and the following disclaimer in the 
 | |
|  *    documentation and/or other materials provided with the distribution. 
 | |
|  *
 | |
|  * 3. Neither the name of the Institute nor the names of its contributors 
 | |
|  *    may be used to endorse or promote products derived from this software 
 | |
|  *    without specific prior written permission. 
 | |
|  *
 | |
|  * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND 
 | |
|  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 
 | |
|  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 
 | |
|  * ARE DISCLAIMED.  IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE 
 | |
|  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 
 | |
|  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 
 | |
|  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 
 | |
|  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 
 | |
|  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 
 | |
|  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 
 | |
|  * SUCH DAMAGE. 
 | |
|  */
 | |
| 
 | |
| #include "hx_locl.h"
 | |
| RCSID("$Id$");
 | |
| #include <dlfcn.h>
 | |
| 
 | |
| #include "pkcs11u.h"
 | |
| #include "pkcs11.h"
 | |
| 
 | |
| struct p11_slot {
 | |
|     int flags;
 | |
| #define P11_SESSION		1
 | |
| #define P11_LOGIN_REQ		2
 | |
| #define P11_LOGIN_DONE		4
 | |
|     CK_SLOT_ID id;
 | |
|     CK_BBOOL token;
 | |
|     char *name;
 | |
|     hx509_certs certs;
 | |
|     char *pin;
 | |
| };
 | |
| 
 | |
| struct p11_module {
 | |
|     void *dl_handle;
 | |
|     CK_FUNCTION_LIST_PTR funcs;
 | |
|     CK_ULONG num_slots;
 | |
|     unsigned int refcount;
 | |
|     struct p11_slot *slot;
 | |
| };
 | |
| 
 | |
| #define P11FUNC(module,f,args) (*(module)->funcs->C_##f)args
 | |
| 
 | |
| static int p11_get_session(struct p11_module *,
 | |
| 			   struct p11_slot *,
 | |
| 			   hx509_lock,
 | |
| 			   CK_SESSION_HANDLE *);
 | |
| static int p11_put_session(struct p11_module *,
 | |
| 			   struct p11_slot *,
 | |
| 			   CK_SESSION_HANDLE);
 | |
| static void p11_release_module(struct p11_module *);
 | |
| 
 | |
| static int p11_list_keys(hx509_context,
 | |
| 			 struct p11_module *,
 | |
| 			 struct p11_slot *, 
 | |
| 			 CK_SESSION_HANDLE,
 | |
| 			 hx509_lock,
 | |
| 			 hx509_certs *);
 | |
| 
 | |
| /*
 | |
|  *
 | |
|  */
 | |
| 
 | |
| struct p11_rsa {
 | |
|     struct p11_module *p;
 | |
|     struct p11_slot *slot;
 | |
|     CK_OBJECT_HANDLE private_key;
 | |
|     CK_OBJECT_HANDLE public_key;
 | |
| };
 | |
| 
 | |
| static int
 | |
| p11_rsa_public_encrypt(int flen,
 | |
| 		       const unsigned char *from,
 | |
| 		       unsigned char *to,
 | |
| 		       RSA *rsa,
 | |
| 		       int padding)
 | |
| {
 | |
|     return -1;
 | |
| }
 | |
| 
 | |
| static int
 | |
| p11_rsa_public_decrypt(int flen,
 | |
| 		       const unsigned char *from,
 | |
| 		       unsigned char *to,
 | |
| 		       RSA *rsa,
 | |
| 		       int padding)
 | |
| {
 | |
|     return -1;
 | |
| }
 | |
| 
 | |
| 
 | |
| static int
 | |
| p11_rsa_private_encrypt(int flen, 
 | |
| 			const unsigned char *from,
 | |
| 			unsigned char *to,
 | |
| 			RSA *rsa,
 | |
| 			int padding)
 | |
| {
 | |
|     struct p11_rsa *p11rsa = RSA_get_app_data(rsa);
 | |
|     CK_OBJECT_HANDLE key = p11rsa->private_key;
 | |
|     CK_SESSION_HANDLE session;
 | |
|     CK_MECHANISM mechanism;
 | |
|     CK_ULONG ck_sigsize;
 | |
|     int ret;
 | |
| 
 | |
|     if (padding != RSA_PKCS1_PADDING)
 | |
| 	return -1;
 | |
| 
 | |
|     memset(&mechanism, 0, sizeof(mechanism));
 | |
|     mechanism.mechanism = CKM_RSA_PKCS;
 | |
| 
 | |
|     ck_sigsize = RSA_size(rsa);
 | |
| 
 | |
|     ret = p11_get_session(p11rsa->p, p11rsa->slot, NULL, &session);
 | |
|     if (ret)
 | |
| 	return -1;
 | |
| 
 | |
|     ret = P11FUNC(p11rsa->p, SignInit, (session, &mechanism, key));
 | |
|     if (ret != CKR_OK) {
 | |
| 	p11_put_session(p11rsa->p, p11rsa->slot, session);
 | |
| 	return -1;
 | |
|     }
 | |
| 
 | |
|     ret = P11FUNC(p11rsa->p, Sign, 
 | |
| 		  (session, (CK_BYTE *)from, flen, to, &ck_sigsize));
 | |
|     if (ret != CKR_OK)
 | |
| 	return -1;
 | |
| 
 | |
|     p11_put_session(p11rsa->p, p11rsa->slot, session);
 | |
| 
 | |
|     return ck_sigsize;
 | |
| }
 | |
| 
 | |
| static int
 | |
| p11_rsa_private_decrypt(int flen, const unsigned char *from, unsigned char *to,
 | |
| 			RSA * rsa, int padding)
 | |
| {
 | |
|     struct p11_rsa *p11rsa = RSA_get_app_data(rsa);
 | |
|     CK_OBJECT_HANDLE key = p11rsa->private_key;
 | |
|     CK_SESSION_HANDLE session;
 | |
|     CK_MECHANISM mechanism;
 | |
|     CK_ULONG ck_sigsize;
 | |
|     int ret;
 | |
| 
 | |
|     if (padding != RSA_PKCS1_PADDING)
 | |
| 	return -1;
 | |
| 
 | |
|     memset(&mechanism, 0, sizeof(mechanism));
 | |
|     mechanism.mechanism = CKM_RSA_PKCS;
 | |
| 
 | |
|     ck_sigsize = RSA_size(rsa);
 | |
| 
 | |
|     ret = p11_get_session(p11rsa->p, p11rsa->slot, NULL, &session);
 | |
|     if (ret)
 | |
| 	return -1;
 | |
| 
 | |
|     ret = P11FUNC(p11rsa->p, DecryptInit, (session, &mechanism, key));
 | |
|     if (ret != CKR_OK) {
 | |
| 	p11_put_session(p11rsa->p, p11rsa->slot, session);
 | |
| 	return -1;
 | |
|     }
 | |
| 
 | |
|     ret = P11FUNC(p11rsa->p, Decrypt, 
 | |
| 		  (session, (CK_BYTE *)from, flen, to, &ck_sigsize));
 | |
|     if (ret != CKR_OK)
 | |
| 	return -1;
 | |
| 
 | |
|     p11_put_session(p11rsa->p, p11rsa->slot, session);
 | |
| 
 | |
|     return ck_sigsize;
 | |
| }
 | |
| 
 | |
| static int 
 | |
| p11_rsa_init(RSA *rsa)
 | |
| {
 | |
|     return 1;
 | |
| }
 | |
| 
 | |
| static int
 | |
| p11_rsa_finish(RSA *rsa)
 | |
| {
 | |
|     struct p11_rsa *p11rsa = RSA_get_app_data(rsa);
 | |
|     p11_release_module(p11rsa->p);
 | |
|     free(p11rsa);
 | |
|     return 1;
 | |
| }
 | |
| 
 | |
| static const RSA_METHOD rsa_pkcs1_method = {
 | |
|     "hx509 PKCS11 PKCS#1 RSA",
 | |
|     p11_rsa_public_encrypt,
 | |
|     p11_rsa_public_decrypt,
 | |
|     p11_rsa_private_encrypt,
 | |
|     p11_rsa_private_decrypt,
 | |
|     NULL,
 | |
|     NULL,
 | |
|     p11_rsa_init,
 | |
|     p11_rsa_finish,
 | |
|     0,
 | |
|     NULL,
 | |
|     NULL,
 | |
|     NULL
 | |
| };
 | |
| 
 | |
| /*
 | |
|  *
 | |
|  */
 | |
| 
 | |
| static int
 | |
| p11_init_slot(hx509_context context, 
 | |
| 	      struct p11_module *p,
 | |
| 	      hx509_lock lock,
 | |
| 	      CK_SLOT_ID id,
 | |
| 	      int num,
 | |
| 	      struct p11_slot *slot)
 | |
| {
 | |
|     CK_SESSION_HANDLE session;
 | |
|     CK_SLOT_INFO slot_info;
 | |
|     CK_TOKEN_INFO token_info;
 | |
|     int ret, i;
 | |
| 
 | |
|     slot->certs = NULL;
 | |
|     slot->id = id;
 | |
| 
 | |
|     ret = P11FUNC(p, GetSlotInfo, (slot->id, &slot_info));
 | |
|     if (ret) {
 | |
| 	hx509_set_error_string(context, 0, EINVAL,
 | |
| 			       "Failed to init PKCS11 slot %d",
 | |
| 			       num);
 | |
| 	return EINVAL;
 | |
|     }
 | |
| 
 | |
|     for (i = sizeof(slot_info.slotDescription) - 1; i > 0; i--) {
 | |
| 	char c = slot_info.slotDescription[i];
 | |
| 	if (c == ' ' || c == '\t' || c == '\n' || c == '\r' || c == '\0')
 | |
| 	    continue;
 | |
| 	i++;
 | |
| 	break;
 | |
|     }
 | |
| 
 | |
|     asprintf(&slot->name, "%.*s",
 | |
| 	     i, slot_info.slotDescription);
 | |
| 
 | |
|     if ((slot_info.flags & CKF_TOKEN_PRESENT) == 0) {
 | |
| 	return 0;
 | |
|     }
 | |
| 
 | |
|     ret = P11FUNC(p, GetTokenInfo, (slot->id, &token_info));
 | |
|     if (ret) {
 | |
| 	hx509_set_error_string(context, 0, EINVAL,
 | |
| 			       "Failed to init PKCS11 slot %d",
 | |
| 			       num);
 | |
| 	return EINVAL;
 | |
|     }
 | |
| 
 | |
|     if (token_info.flags & CKF_LOGIN_REQUIRED)
 | |
| 	slot->flags |= P11_LOGIN_REQ;
 | |
| 
 | |
|     ret = p11_get_session(p, slot, lock, &session);
 | |
|     if (ret) {
 | |
| 	hx509_set_error_string(context, 0, ret,
 | |
| 			       "Failed to get session PKCS11 slot %d",
 | |
| 			       num);
 | |
| 	return ret;
 | |
|     }
 | |
|     ret = p11_list_keys(context, p, slot, session, lock, &slot->certs);
 | |
|     p11_put_session(p, slot, session);
 | |
| 
 | |
|     return ret;
 | |
| }
 | |
| 
 | |
| static int
 | |
| p11_get_session(struct p11_module *p,
 | |
| 		struct p11_slot *slot,
 | |
| 		hx509_lock lock,
 | |
| 		CK_SESSION_HANDLE *psession)
 | |
| {
 | |
|     CK_SESSION_HANDLE session;
 | |
|     CK_RV ret;
 | |
| 
 | |
|     if (slot->flags & P11_SESSION)
 | |
| 	_hx509_abort("slot already in session");
 | |
| 
 | |
|     ret = P11FUNC(p, OpenSession, (slot->id, 
 | |
| 				   CKF_SERIAL_SESSION,
 | |
| 				   NULL,
 | |
| 				   NULL,
 | |
| 				   &session));
 | |
|     if (ret != CKR_OK)
 | |
| 	return EINVAL;
 | |
|     
 | |
|     slot->flags |= P11_SESSION;
 | |
|     
 | |
|     /* 
 | |
|      * If we have have to login, and haven't tried before and have a
 | |
|      * prompter or known to work pin code.
 | |
|      *
 | |
|      * This code is very conversative and only uses the prompter in
 | |
|      * the hx509_lock, the reason is that its bad to try many
 | |
|      * passwords on a pkcs11 token, it might lock up and have to be
 | |
|      * unlocked by a administrator.
 | |
|      *
 | |
|      * XXX try harder to not use pin several times on the same card.
 | |
|      */
 | |
| 
 | |
|     if (   (slot->flags & P11_LOGIN_REQ)
 | |
| 	&& (slot->flags & P11_LOGIN_DONE) == 0
 | |
| 	&& (lock || slot->pin))
 | |
|     {
 | |
| 	hx509_prompt prompt;
 | |
| 	char pin[20];
 | |
| 	char *str;
 | |
| 
 | |
| 	slot->flags |= P11_LOGIN_DONE;
 | |
| 
 | |
| 	if (slot->pin == NULL) {
 | |
| 
 | |
| 	    memset(&prompt, 0, sizeof(prompt));
 | |
| 
 | |
| 	    asprintf(&str, "PIN code for %s: ", slot->name);
 | |
| 	    prompt.prompt = str;
 | |
| 	    prompt.type = HX509_PROMPT_TYPE_PASSWORD;
 | |
| 	    prompt.reply.data = pin;
 | |
| 	    prompt.reply.length = sizeof(pin);
 | |
| 	    
 | |
| 	    ret = hx509_lock_prompt(lock, &prompt);
 | |
| 	    if (ret) {
 | |
| 		free(str);
 | |
| 		return ret;
 | |
| 	    }
 | |
| 	    free(str);
 | |
| 	} else {
 | |
| 	    strlcpy(pin, slot->pin, sizeof(pin));
 | |
| 	}
 | |
| 
 | |
| 	ret = P11FUNC(p, Login, (session, CKU_USER,
 | |
| 				 (unsigned char*)pin, strlen(pin)));
 | |
| 	if (ret != CKR_OK) {
 | |
| 	    p11_put_session(p, slot, session);
 | |
| 	    return EINVAL;
 | |
| 	}
 | |
| 	if (slot->pin == NULL) {
 | |
| 	    slot->pin = strdup(pin);
 | |
| 	    if (slot->pin == NULL) {
 | |
| 		p11_put_session(p, slot, session);
 | |
| 		return EINVAL;
 | |
| 	    }
 | |
| 	}
 | |
| 
 | |
|     } else
 | |
| 	slot->flags |= P11_LOGIN_DONE;
 | |
| 
 | |
|     *psession = session;
 | |
| 
 | |
|     return 0;
 | |
| }
 | |
| 
 | |
| static int
 | |
| p11_put_session(struct p11_module *p,
 | |
| 		struct p11_slot *slot, 
 | |
| 		CK_SESSION_HANDLE session)
 | |
| {
 | |
|     int ret;
 | |
| 
 | |
|     if ((slot->flags & P11_SESSION) == 0)
 | |
| 	_hx509_abort("slot not in session");
 | |
|     slot->flags &= ~P11_SESSION;
 | |
| 
 | |
|     ret = P11FUNC(p, CloseSession, (session));
 | |
|     if (ret != CKR_OK)
 | |
| 	return EINVAL;
 | |
| 
 | |
|     return 0;
 | |
| }
 | |
| 
 | |
| static int
 | |
| iterate_entries(struct p11_module *p, struct p11_slot *slot,
 | |
| 		CK_SESSION_HANDLE session,
 | |
| 		CK_ATTRIBUTE *search_data, int num_search_data,
 | |
| 		CK_ATTRIBUTE *query, int num_query,
 | |
| 		int (*func)(struct p11_module *, struct p11_slot *,
 | |
| 			    CK_SESSION_HANDLE session,
 | |
| 			    CK_OBJECT_HANDLE object,
 | |
| 			    void *, CK_ATTRIBUTE *, int), void *ptr)
 | |
| {
 | |
|     CK_OBJECT_HANDLE object;
 | |
|     CK_ULONG object_count;
 | |
|     int ret, i;
 | |
| 
 | |
|     ret = P11FUNC(p, FindObjectsInit, (session, search_data, num_search_data));
 | |
|     if (ret != CKR_OK) {
 | |
| 	return -1;
 | |
|     }
 | |
|     while (1) {
 | |
| 	ret = P11FUNC(p, FindObjects, (session, &object, 1, &object_count));
 | |
| 	if (ret != CKR_OK) {
 | |
| 	    return -1;
 | |
| 	}
 | |
| 	if (object_count == 0)
 | |
| 	    break;
 | |
| 	
 | |
| 	for (i = 0; i < num_query; i++)
 | |
| 	    query[i].pValue = NULL;
 | |
| 
 | |
| 	ret = P11FUNC(p, GetAttributeValue, 
 | |
| 		      (session, object, query, num_query));
 | |
| 	if (ret != CKR_OK) {
 | |
| 	    return -1;
 | |
| 	}
 | |
| 	for (i = 0; i < num_query; i++) {
 | |
| 	    query[i].pValue = malloc(query[i].ulValueLen);
 | |
| 	    if (query[i].pValue == NULL) {
 | |
| 		ret = ENOMEM;
 | |
| 		goto out;
 | |
| 	    }
 | |
| 	}
 | |
| 	ret = P11FUNC(p, GetAttributeValue,
 | |
| 		      (session, object, query, num_query));
 | |
| 	if (ret != CKR_OK) {
 | |
| 	    ret = -1;
 | |
| 	    goto out;
 | |
| 	}
 | |
| 	
 | |
| 	ret = (*func)(p, slot, session, object, ptr, query, num_query);
 | |
| 	if (ret)
 | |
| 	    goto out;
 | |
| 
 | |
| 	for (i = 0; i < num_query; i++) {
 | |
| 	    if (query[i].pValue)
 | |
| 		free(query[i].pValue);
 | |
| 	    query[i].pValue = NULL;
 | |
| 	}
 | |
|     }
 | |
|  out:
 | |
| 
 | |
|     for (i = 0; i < num_query; i++) {
 | |
| 	if (query[i].pValue)
 | |
| 	    free(query[i].pValue);
 | |
| 	query[i].pValue = NULL;
 | |
|     }
 | |
| 
 | |
|     ret = P11FUNC(p, FindObjectsFinal, (session));
 | |
|     if (ret != CKR_OK) {
 | |
| 	return -2;
 | |
|     }
 | |
| 
 | |
| 
 | |
|     return 0;
 | |
| }
 | |
| 		
 | |
| static BIGNUM *
 | |
| getattr_bn(struct p11_module *p,
 | |
| 	   struct p11_slot *slot,
 | |
| 	   CK_SESSION_HANDLE session,
 | |
| 	   CK_OBJECT_HANDLE object, 
 | |
| 	   unsigned int type)
 | |
| {
 | |
|     CK_ATTRIBUTE query;
 | |
|     BIGNUM *bn;
 | |
|     int ret;
 | |
| 
 | |
|     query.type = type;
 | |
|     query.pValue = NULL;
 | |
|     query.ulValueLen = 0;
 | |
| 
 | |
|     ret = P11FUNC(p, GetAttributeValue, 
 | |
| 		  (session, object, &query, 1));
 | |
|     if (ret != CKR_OK)
 | |
| 	return NULL;
 | |
| 
 | |
|     query.pValue = malloc(query.ulValueLen);
 | |
| 
 | |
|     ret = P11FUNC(p, GetAttributeValue, 
 | |
| 		  (session, object, &query, 1));
 | |
|     if (ret != CKR_OK) {
 | |
| 	free(query.pValue);
 | |
| 	return NULL;
 | |
|     }
 | |
|     bn = BN_bin2bn(query.pValue, query.ulValueLen, NULL);
 | |
|     free(query.pValue);
 | |
| 
 | |
|     return bn;
 | |
| }
 | |
| 
 | |
| struct p11_collector {
 | |
|     hx509_context context;
 | |
|     struct hx509_collector *c;
 | |
| };
 | |
| 
 | |
| static int
 | |
| collect_private_key(struct p11_module *p, struct p11_slot *slot,
 | |
| 		    CK_SESSION_HANDLE session,
 | |
| 		    CK_OBJECT_HANDLE object,
 | |
| 		    void *ptr, CK_ATTRIBUTE *query, int num_query)
 | |
| {
 | |
|     struct p11_collector *ctx = ptr;
 | |
|     AlgorithmIdentifier alg;
 | |
|     hx509_private_key key;
 | |
|     heim_octet_string localKeyId;
 | |
|     int ret;
 | |
|     RSA *rsa;
 | |
|     struct p11_rsa *p11rsa;
 | |
| 
 | |
|     memset(&alg, 0, sizeof(alg));
 | |
| 
 | |
|     localKeyId.data = query[0].pValue;
 | |
|     localKeyId.length = query[0].ulValueLen;
 | |
| 
 | |
|     ret = _hx509_new_private_key(&key);
 | |
|     if (ret)
 | |
| 	return ret;
 | |
| 
 | |
|     rsa = RSA_new();
 | |
|     if (rsa == NULL)
 | |
| 	_hx509_abort("out of memory");
 | |
| 
 | |
|     rsa->n = getattr_bn(p, slot, session, object, CKA_MODULUS);
 | |
|     if (rsa->n == NULL)
 | |
| 	_hx509_abort("CKA_MODULUS missing");
 | |
|     rsa->e = getattr_bn(p, slot, session, object, CKA_PUBLIC_EXPONENT);
 | |
|     if (rsa->e == NULL)
 | |
| 	_hx509_abort("CKA_PUBLIC_EXPONENT missing");
 | |
| 
 | |
|     p11rsa = calloc(1, sizeof(*p11rsa));
 | |
|     if (p11rsa == NULL)
 | |
| 	_hx509_abort("out of memory");
 | |
| 
 | |
|     p11rsa->p = p;
 | |
|     p11rsa->slot = slot;
 | |
|     p11rsa->private_key = object;
 | |
|     
 | |
|     p->refcount++;
 | |
|     if (p->refcount == 0)
 | |
| 	_hx509_abort("pkcs11 refcount to high");
 | |
| 
 | |
|     RSA_set_method(rsa, &rsa_pkcs1_method);
 | |
|     ret = RSA_set_app_data(rsa, p11rsa);
 | |
|     if (ret != 1)
 | |
| 	_hx509_abort("RSA_set_app_data");
 | |
| 
 | |
|     _hx509_private_key_assign_rsa(key, rsa);
 | |
| 
 | |
|     ret = _hx509_collector_private_key_add(ctx->c,
 | |
| 					   &alg,
 | |
| 					   key,
 | |
| 					   NULL,
 | |
| 					   &localKeyId);
 | |
| 
 | |
|     if (ret) {
 | |
| 	_hx509_free_private_key(&key);
 | |
| 	return ret;
 | |
|     }
 | |
|     return 0;
 | |
| }
 | |
| 
 | |
| static void
 | |
| p11_cert_release(hx509_cert cert, void *ctx)
 | |
| {
 | |
|     struct p11_module *p = ctx;
 | |
|     p11_release_module(p);
 | |
| }
 | |
| 
 | |
| 
 | |
| static int
 | |
| collect_cert(struct p11_module *p, struct p11_slot *slot,
 | |
| 	     CK_SESSION_HANDLE session,
 | |
| 	     CK_OBJECT_HANDLE object,
 | |
| 	     void *ptr, CK_ATTRIBUTE *query, int num_query)
 | |
| {
 | |
|     heim_octet_string localKeyId;
 | |
|     struct p11_collector *ctx = ptr;
 | |
|     hx509_cert cert;
 | |
|     Certificate t;
 | |
|     int ret;
 | |
| 
 | |
|     localKeyId.data = query[0].pValue;
 | |
|     localKeyId.length = query[0].ulValueLen;
 | |
| 
 | |
|     ret = decode_Certificate(query[1].pValue, query[1].ulValueLen,
 | |
| 			     &t, NULL);
 | |
|     if (ret)
 | |
| 	return 0;
 | |
| 
 | |
|     ret = hx509_cert_init(ctx->context, &t, &cert);
 | |
|     free_Certificate(&t);
 | |
|     if (ret)
 | |
| 	return ret;
 | |
| 
 | |
|     p->refcount++;
 | |
|     if (p->refcount == 0)
 | |
| 	_hx509_abort("pkcs11 refcount to high");
 | |
| 
 | |
|     _hx509_cert_set_release(cert, p11_cert_release, p);
 | |
| 
 | |
| 
 | |
|     _hx509_set_cert_attribute(ctx->context,
 | |
| 			      cert,
 | |
| 			      oid_id_pkcs_9_at_localKeyId(),
 | |
| 			      &localKeyId);
 | |
| 
 | |
|     ret = _hx509_collector_certs_add(ctx->context, ctx->c, cert);
 | |
|     if (ret) {
 | |
| 	hx509_cert_free(cert);
 | |
| 	return ret;
 | |
|     }
 | |
| 
 | |
|     return 0;
 | |
| }
 | |
| 
 | |
| 
 | |
| static int
 | |
| p11_list_keys(hx509_context context,
 | |
| 	      struct p11_module *p,
 | |
| 	      struct p11_slot *slot, 
 | |
| 	      CK_SESSION_HANDLE session,
 | |
| 	      hx509_lock lock,
 | |
| 	      hx509_certs *certs)
 | |
| {
 | |
|     struct p11_collector ctx;
 | |
|     CK_OBJECT_CLASS key_class;
 | |
|     CK_ATTRIBUTE search_data[] = {
 | |
| 	{CKA_CLASS, &key_class, sizeof(key_class)},
 | |
|     };
 | |
|     CK_ATTRIBUTE query_data[2] = {
 | |
| 	{CKA_ID, NULL, 0},
 | |
| 	{CKA_VALUE, NULL, 0}
 | |
|     };
 | |
|     int ret;
 | |
| 
 | |
|     if (lock == NULL)
 | |
| 	lock = _hx509_empty_lock;
 | |
| 
 | |
|     ctx.context = context;
 | |
| 
 | |
|     ctx.c = _hx509_collector_alloc(context, lock);
 | |
|     if (ctx.c == NULL)
 | |
| 	return ENOMEM;
 | |
| 
 | |
|     key_class = CKO_PRIVATE_KEY;
 | |
|     ret = iterate_entries(p, slot, session,
 | |
| 			  search_data, 1,
 | |
| 			  query_data, 1,
 | |
| 			  collect_private_key, &ctx);
 | |
|     if (ret)
 | |
| 	goto out;
 | |
| 
 | |
|     key_class = CKO_CERTIFICATE;
 | |
|     ret = iterate_entries(p, slot, session,
 | |
| 			  search_data, 1,
 | |
| 			  query_data, 2,
 | |
| 			  collect_cert, &ctx);
 | |
|     if (ret)
 | |
| 	goto out;
 | |
| 
 | |
|     ret = _hx509_collector_collect(context, ctx.c, &slot->certs);
 | |
| 
 | |
| out:
 | |
|     _hx509_collector_free(ctx.c);
 | |
| 
 | |
|     return ret;
 | |
| }
 | |
| 
 | |
| 
 | |
| static int
 | |
| p11_init(hx509_context context,
 | |
| 	 hx509_certs certs, void **data, int flags, 
 | |
| 	 const char *residue, hx509_lock lock)
 | |
| {
 | |
|     CK_C_GetFunctionList getFuncs;
 | |
|     struct p11_module *p;
 | |
|     char *list, *str;
 | |
|     int ret;
 | |
| 
 | |
|     *data = NULL;
 | |
| 
 | |
|     list = strdup(residue);
 | |
|     if (list == NULL)
 | |
| 	return ENOMEM;
 | |
| 
 | |
|     p = calloc(1, sizeof(*p));
 | |
|     if (p == NULL) {
 | |
| 	free(list);
 | |
| 	return ENOMEM;
 | |
|     }
 | |
| 
 | |
|     p->refcount = 1;
 | |
| 
 | |
|     str = strchr(list, ',');
 | |
|     if (str)
 | |
| 	*str++ = '\0';
 | |
|     while (str) {
 | |
| 	char *strnext;
 | |
| 	strnext = strchr(str, ',');
 | |
| 	if (strnext)
 | |
| 	    *strnext++ = '\0';
 | |
| #if 0
 | |
| 	if (strncasecmp(str, "slot=", 5) == 0)
 | |
| 	    p->selected_slot = atoi(str + 5);
 | |
| #endif
 | |
| 	str = strnext;
 | |
|     }
 | |
| 
 | |
|     p->dl_handle = dlopen(list, RTLD_NOW);
 | |
|     free(list);
 | |
|     if (p->dl_handle == NULL) {
 | |
| 	hx509_set_error_string(context, 0, EINVAL,
 | |
| 			       "Failed to open %s: %s", list, dlerror());
 | |
| 	ret = EINVAL; /* XXX */
 | |
| 	goto out;
 | |
|     }
 | |
| 
 | |
|     getFuncs = dlsym(p->dl_handle, "C_GetFunctionList");
 | |
|     if (getFuncs == NULL) {
 | |
| 	hx509_set_error_string(context, 0, EINVAL,
 | |
| 			       "C_GetFunctionList missing in %s: %s", 
 | |
| 			       list, dlerror());
 | |
| 	ret = EINVAL;
 | |
| 	goto out;
 | |
|     }
 | |
| 
 | |
|     ret = (*getFuncs)(&p->funcs);
 | |
|     if (ret) {
 | |
| 	hx509_set_error_string(context, 0, EINVAL,
 | |
| 			       "C_GetFunctionList failed in %s", list);
 | |
| 	ret = EINVAL;
 | |
| 	goto out;
 | |
|     }
 | |
| 
 | |
|     ret = P11FUNC(p, Initialize, (NULL_PTR));
 | |
|     if (ret != CKR_OK) {
 | |
| 	hx509_set_error_string(context, 0, EINVAL,
 | |
| 			       "Failed initialize the PKCS11 module");
 | |
| 	ret = EINVAL;
 | |
| 	goto out;
 | |
|     }
 | |
| 
 | |
|     ret = P11FUNC(p, GetSlotList, (FALSE, NULL, &p->num_slots));
 | |
|     if (ret) {
 | |
| 	hx509_set_error_string(context, 0, EINVAL,
 | |
| 			       "Failed to get number of PKCS11 slots");
 | |
| 	ret = EINVAL;
 | |
| 	goto out;
 | |
|     }
 | |
| 
 | |
|    if (p->num_slots == 0) {
 | |
| 	hx509_set_error_string(context, 0, EINVAL,
 | |
| 			       "Select PKCS11 module have no slots");
 | |
| 	ret = EINVAL;
 | |
| 	goto out;
 | |
|    }
 | |
| 
 | |
| 
 | |
|     {
 | |
| 	CK_SLOT_ID_PTR slot_ids;
 | |
| 	int i;
 | |
| 
 | |
| 	slot_ids = malloc(p->num_slots * sizeof(*slot_ids));
 | |
| 	if (slot_ids == NULL) {
 | |
| 	    hx509_clear_error_string(context);
 | |
| 	    ret = ENOMEM;
 | |
| 	    goto out;
 | |
| 	}
 | |
| 
 | |
| 	ret = P11FUNC(p, GetSlotList, (FALSE, slot_ids, &p->num_slots));
 | |
| 	if (ret) {
 | |
| 	    free(slot_ids);
 | |
| 	    hx509_set_error_string(context, 0, EINVAL,
 | |
| 				   "Failed getting slot-list from "
 | |
| 				   "PKCS11 module");
 | |
| 	    ret = EINVAL;
 | |
| 	    goto out;
 | |
| 	}
 | |
| 
 | |
| 	p->slot = calloc(p->num_slots, sizeof(p->slot[0]));
 | |
| 	if (p->slot == NULL) {
 | |
| 	    free(slot_ids);
 | |
| 	    hx509_set_error_string(context, 0, ENOMEM,
 | |
| 				   "Failed to get memory for slot-list");
 | |
| 	    ret = ENOMEM;
 | |
| 	    goto out;
 | |
| 	}
 | |
| 			 
 | |
| 	for (i = 0; i < p->num_slots; i++) {
 | |
| 	    ret = p11_init_slot(context, p, lock, slot_ids[i], i, &p->slot[i]);
 | |
| 	    if (ret)
 | |
| 		break;
 | |
| 	}
 | |
| 	free(slot_ids);
 | |
| 	if (ret) {
 | |
| 	    goto out;
 | |
| 	}
 | |
|     }
 | |
| 
 | |
|     *data = p;
 | |
| 
 | |
|     return 0;
 | |
|  out:    
 | |
|     p11_release_module(p);
 | |
|     return ret;
 | |
| }
 | |
| 
 | |
| static void
 | |
| p11_release_module(struct p11_module *p)
 | |
| {
 | |
|     int i;
 | |
|     if (p->refcount == 0)
 | |
| 	_hx509_abort("pkcs11 refcount to low");
 | |
|     if (--p->refcount > 0)
 | |
| 	return;
 | |
| 
 | |
|     if (p->dl_handle)
 | |
| 	dlclose(p->dl_handle);
 | |
| 
 | |
|     for (i = 0; i < p->num_slots; i++) {
 | |
| 	if (p->slot[i].certs)
 | |
| 	    hx509_certs_free(&p->slot[i].certs);
 | |
| 	if (p->slot[i].name)
 | |
| 	    free(p->slot[i].name);
 | |
| 	if (p->slot[i].pin) {
 | |
| 	    memset(p->slot[i].pin, 0, strlen(p->slot[i].pin));
 | |
| 	    free(p->slot[i].pin);
 | |
| 	}
 | |
| 	free(p->slot);
 | |
|     }
 | |
|     memset(p, 0, sizeof(*p));
 | |
|     free(p);
 | |
| }
 | |
| 
 | |
| static int
 | |
| p11_free(hx509_certs certs, void *data)
 | |
| {
 | |
|     p11_release_module((struct p11_module *)data);
 | |
|     return 0;
 | |
| }
 | |
| 
 | |
| struct p11_cursor {
 | |
|     hx509_certs certs;
 | |
|     void *cursor;
 | |
| };
 | |
| 
 | |
| static int 
 | |
| p11_iter_start(hx509_context context,
 | |
| 	       hx509_certs certs, void *data, void **cursor)
 | |
| {
 | |
|     struct p11_module *p = data;
 | |
|     struct p11_cursor *c;
 | |
|     int ret, i;
 | |
| 
 | |
|     c = malloc(sizeof(*c));
 | |
|     if (c == NULL) {
 | |
| 	hx509_clear_error_string(context);
 | |
| 	return ENOMEM;
 | |
|     }
 | |
|     ret = hx509_certs_init(context, "MEMORY:pkcs11-iter", 0, NULL, &c->certs);
 | |
|     if (ret) {
 | |
| 	free(c);
 | |
| 	return ret;
 | |
|     }
 | |
| 
 | |
|     for (i = 0 ; i < p->num_slots; i++) {
 | |
| 	ret = hx509_certs_merge(context, c->certs, p->slot[i].certs);
 | |
| 	if (ret) {
 | |
| 	    hx509_certs_free(&c->certs);
 | |
| 	    free(c);
 | |
| 	    return ret;
 | |
| 	}
 | |
|     }
 | |
| 
 | |
|     ret = hx509_certs_start_seq(context, c->certs, &c->cursor);
 | |
|     if (ret) {
 | |
| 	hx509_certs_free(&c->certs);
 | |
| 	free(c);
 | |
| 	return 0;
 | |
|     }
 | |
|     *cursor = c;
 | |
| 
 | |
|     return 0;
 | |
| }
 | |
| 
 | |
| static int
 | |
| p11_iter(hx509_context context,
 | |
| 	 hx509_certs certs, void *data, void *cursor, hx509_cert *cert)
 | |
| {
 | |
|     struct p11_cursor *c = cursor;
 | |
|     return hx509_certs_next_cert(context, c->certs, c->cursor, cert);
 | |
| }
 | |
| 
 | |
| static int
 | |
| p11_iter_end(hx509_context context,
 | |
| 	     hx509_certs certs, void *data, void *cursor)
 | |
| {
 | |
|     struct p11_cursor *c = cursor;
 | |
|     int ret;
 | |
|     ret = hx509_certs_end_seq(context, c->certs, c->cursor);
 | |
|     hx509_certs_free(&c->certs);
 | |
|     free(c);
 | |
|     return ret;
 | |
| }
 | |
| 
 | |
| static struct hx509_keyset_ops keyset_pkcs11 = {
 | |
|     "PKCS11",
 | |
|     0,
 | |
|     p11_init,
 | |
|     p11_free,
 | |
|     NULL,
 | |
|     NULL,
 | |
|     p11_iter_start,
 | |
|     p11_iter,
 | |
|     p11_iter_end
 | |
| };
 | |
| 
 | |
| void
 | |
| _hx509_ks_pkcs11_register(hx509_context context)
 | |
| {
 | |
|     _hx509_ks_register(context, &keyset_pkcs11);
 | |
| }
 |