1 /*
2 * Copyright (c) 2004 - 2008 Kungliga Tekniska Högskolan
3 * (Royal Institute of Technology, Stockholm, Sweden).
4 * All rights reserved.
5 *
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions
8 * are met:
9 *
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
12 *
13 * 2. Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in the
15 * documentation and/or other materials provided with the distribution.
16 *
17 * 3. Neither the name of the Institute nor the names of its contributors
18 * may be used to endorse or promote products derived from this software
19 * without specific prior written permission.
20 *
21 * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31 * SUCH DAMAGE.
32 */
33
34 #include "hx_locl.h"
35 #ifdef HAVE_DLFCN_H
36 #include <dlfcn.h>
37 #endif
38
39 #ifdef HAVE_DLOPEN
40
41 #include "pkcs11.h"
42
43 struct p11_slot {
44 int flags;
45 #define P11_SESSION 1
46 #define P11_SESSION_IN_USE 2
47 #define P11_LOGIN_REQ 4
48 #define P11_LOGIN_DONE 8
49 #define P11_TOKEN_PRESENT 16
50 CK_SESSION_HANDLE session;
51 CK_SLOT_ID id;
52 CK_BBOOL token;
53 char *name;
54 hx509_certs certs;
55 char *pin;
56 struct {
57 CK_MECHANISM_TYPE_PTR list;
58 CK_ULONG num;
59 CK_MECHANISM_INFO_PTR *infos;
60 } mechs;
61 };
62
63 struct p11_module {
64 void *dl_handle;
65 CK_FUNCTION_LIST_PTR funcs;
66 CK_ULONG num_slots;
67 unsigned int ref;
68 struct p11_slot *slot;
69 };
70
71 #define P11FUNC(module,f,args) (*(module)->funcs->C_##f)args
72
73 static int p11_get_session(hx509_context,
74 struct p11_module *,
75 struct p11_slot *,
76 hx509_lock,
77 CK_SESSION_HANDLE *);
78 static int p11_put_session(struct p11_module *,
79 struct p11_slot *,
80 CK_SESSION_HANDLE);
81 static void p11_release_module(struct p11_module *);
82
83 static int p11_list_keys(hx509_context,
84 struct p11_module *,
85 struct p11_slot *,
86 CK_SESSION_HANDLE,
87 hx509_lock,
88 hx509_certs *);
89
90 /*
91 *
92 */
93
94 struct p11_rsa {
95 struct p11_module *p;
96 struct p11_slot *slot;
97 CK_OBJECT_HANDLE private_key;
98 CK_OBJECT_HANDLE public_key;
99 };
100
101 static int
p11_rsa_public_encrypt(int flen,const unsigned char * from,unsigned char * to,RSA * rsa,int padding)102 p11_rsa_public_encrypt(int flen,
103 const unsigned char *from,
104 unsigned char *to,
105 RSA *rsa,
106 int padding)
107 {
108 return -1;
109 }
110
111 static int
p11_rsa_public_decrypt(int flen,const unsigned char * from,unsigned char * to,RSA * rsa,int padding)112 p11_rsa_public_decrypt(int flen,
113 const unsigned char *from,
114 unsigned char *to,
115 RSA *rsa,
116 int padding)
117 {
118 return -1;
119 }
120
121
122 static int
p11_rsa_private_encrypt(int flen,const unsigned char * from,unsigned char * to,RSA * rsa,int padding)123 p11_rsa_private_encrypt(int flen,
124 const unsigned char *from,
125 unsigned char *to,
126 RSA *rsa,
127 int padding)
128 {
129 struct p11_rsa *p11rsa = RSA_get_app_data(rsa);
130 CK_OBJECT_HANDLE key = p11rsa->private_key;
131 CK_SESSION_HANDLE session;
132 CK_MECHANISM mechanism;
133 CK_ULONG ck_sigsize;
134 int ret;
135
136 if (padding != RSA_PKCS1_PADDING)
137 return -1;
138
139 memset(&mechanism, 0, sizeof(mechanism));
140 mechanism.mechanism = CKM_RSA_PKCS;
141
142 ck_sigsize = RSA_size(rsa);
143
144 ret = p11_get_session(NULL, p11rsa->p, p11rsa->slot, NULL, &session);
145 if (ret)
146 return -1;
147
148 ret = P11FUNC(p11rsa->p, SignInit, (session, &mechanism, key));
149 if (ret != CKR_OK) {
150 p11_put_session(p11rsa->p, p11rsa->slot, session);
151 return -1;
152 }
153
154 ret = P11FUNC(p11rsa->p, Sign,
155 (session, (CK_BYTE *)(intptr_t)from, flen, to, &ck_sigsize));
156 p11_put_session(p11rsa->p, p11rsa->slot, session);
157 if (ret != CKR_OK)
158 return -1;
159
160 return ck_sigsize;
161 }
162
163 static int
p11_rsa_private_decrypt(int flen,const unsigned char * from,unsigned char * to,RSA * rsa,int padding)164 p11_rsa_private_decrypt(int flen, const unsigned char *from, unsigned char *to,
165 RSA * rsa, int padding)
166 {
167 struct p11_rsa *p11rsa = RSA_get_app_data(rsa);
168 CK_OBJECT_HANDLE key = p11rsa->private_key;
169 CK_SESSION_HANDLE session;
170 CK_MECHANISM mechanism;
171 CK_ULONG ck_sigsize;
172 int ret;
173
174 if (padding != RSA_PKCS1_PADDING)
175 return -1;
176
177 memset(&mechanism, 0, sizeof(mechanism));
178 mechanism.mechanism = CKM_RSA_PKCS;
179
180 ck_sigsize = RSA_size(rsa);
181
182 ret = p11_get_session(NULL, p11rsa->p, p11rsa->slot, NULL, &session);
183 if (ret)
184 return -1;
185
186 ret = P11FUNC(p11rsa->p, DecryptInit, (session, &mechanism, key));
187 if (ret != CKR_OK) {
188 p11_put_session(p11rsa->p, p11rsa->slot, session);
189 return -1;
190 }
191
192 ret = P11FUNC(p11rsa->p, Decrypt,
193 (session, (CK_BYTE *)(intptr_t)from, flen, to, &ck_sigsize));
194 p11_put_session(p11rsa->p, p11rsa->slot, session);
195 if (ret != CKR_OK)
196 return -1;
197
198 return ck_sigsize;
199 }
200
201 static int
p11_rsa_init(RSA * rsa)202 p11_rsa_init(RSA *rsa)
203 {
204 return 1;
205 }
206
207 static int
p11_rsa_finish(RSA * rsa)208 p11_rsa_finish(RSA *rsa)
209 {
210 struct p11_rsa *p11rsa = RSA_get_app_data(rsa);
211 p11_release_module(p11rsa->p);
212 free(p11rsa);
213 return 1;
214 }
215
216 static const RSA_METHOD p11_rsa_pkcs1_method = {
217 "hx509 PKCS11 PKCS#1 RSA",
218 p11_rsa_public_encrypt,
219 p11_rsa_public_decrypt,
220 p11_rsa_private_encrypt,
221 p11_rsa_private_decrypt,
222 NULL,
223 NULL,
224 p11_rsa_init,
225 p11_rsa_finish,
226 0,
227 NULL,
228 NULL,
229 NULL
230 };
231
232 /*
233 *
234 */
235
236 static int
p11_mech_info(hx509_context context,struct p11_module * p,struct p11_slot * slot,int num)237 p11_mech_info(hx509_context context,
238 struct p11_module *p,
239 struct p11_slot *slot,
240 int num)
241 {
242 CK_ULONG i;
243 int ret;
244
245 ret = P11FUNC(p, GetMechanismList, (slot->id, NULL_PTR, &i));
246 if (ret) {
247 hx509_set_error_string(context, 0, HX509_PKCS11_NO_MECH,
248 "Failed to get mech list count for slot %d",
249 num);
250 return HX509_PKCS11_NO_MECH;
251 }
252 if (i == 0) {
253 hx509_set_error_string(context, 0, HX509_PKCS11_NO_MECH,
254 "no mech supported for slot %d", num);
255 return HX509_PKCS11_NO_MECH;
256 }
257 slot->mechs.list = calloc(i, sizeof(slot->mechs.list[0]));
258 if (slot->mechs.list == NULL) {
259 hx509_set_error_string(context, 0, ENOMEM,
260 "out of memory");
261 return ENOMEM;
262 }
263 slot->mechs.num = i;
264 ret = P11FUNC(p, GetMechanismList, (slot->id, slot->mechs.list, &i));
265 if (ret) {
266 hx509_set_error_string(context, 0, HX509_PKCS11_NO_MECH,
267 "Failed to get mech list for slot %d",
268 num);
269 return HX509_PKCS11_NO_MECH;
270 }
271 assert(i == slot->mechs.num);
272
273 slot->mechs.infos = calloc(i, sizeof(*slot->mechs.infos));
274 if (slot->mechs.list == NULL) {
275 hx509_set_error_string(context, 0, ENOMEM,
276 "out of memory");
277 return ENOMEM;
278 }
279
280 for (i = 0; i < slot->mechs.num; i++) {
281 slot->mechs.infos[i] = calloc(1, sizeof(*(slot->mechs.infos[0])));
282 if (slot->mechs.infos[i] == NULL) {
283 hx509_set_error_string(context, 0, ENOMEM,
284 "out of memory");
285 return ENOMEM;
286 }
287 ret = P11FUNC(p, GetMechanismInfo, (slot->id, slot->mechs.list[i],
288 slot->mechs.infos[i]));
289 if (ret) {
290 hx509_set_error_string(context, 0, HX509_PKCS11_NO_MECH,
291 "Failed to get mech info for slot %d",
292 num);
293 return HX509_PKCS11_NO_MECH;
294 }
295 }
296
297 return 0;
298 }
299
300 static int
p11_init_slot(hx509_context context,struct p11_module * p,hx509_lock lock,CK_SLOT_ID id,int num,struct p11_slot * slot)301 p11_init_slot(hx509_context context,
302 struct p11_module *p,
303 hx509_lock lock,
304 CK_SLOT_ID id,
305 int num,
306 struct p11_slot *slot)
307 {
308 CK_SESSION_HANDLE session;
309 CK_SLOT_INFO slot_info;
310 CK_TOKEN_INFO token_info;
311 size_t i;
312 int ret;
313
314 slot->certs = NULL;
315 slot->id = id;
316
317 ret = P11FUNC(p, GetSlotInfo, (slot->id, &slot_info));
318 if (ret) {
319 hx509_set_error_string(context, 0, HX509_PKCS11_TOKEN_CONFUSED,
320 "Failed to init PKCS11 slot %d",
321 num);
322 return HX509_PKCS11_TOKEN_CONFUSED;
323 }
324
325 for (i = sizeof(slot_info.slotDescription) - 1; i > 0; i--) {
326 char c = slot_info.slotDescription[i];
327 if (c == ' ' || c == '\t' || c == '\n' || c == '\r' || c == '\0')
328 continue;
329 i++;
330 break;
331 }
332
333 asprintf(&slot->name, "%.*s",
334 (int)i, slot_info.slotDescription);
335
336 if ((slot_info.flags & CKF_TOKEN_PRESENT) == 0)
337 return 0;
338
339 ret = P11FUNC(p, GetTokenInfo, (slot->id, &token_info));
340 if (ret) {
341 hx509_set_error_string(context, 0, HX509_PKCS11_NO_TOKEN,
342 "Failed to init PKCS11 slot %d "
343 "with error 0x08x",
344 num, ret);
345 return HX509_PKCS11_NO_TOKEN;
346 }
347 slot->flags |= P11_TOKEN_PRESENT;
348
349 if (token_info.flags & CKF_LOGIN_REQUIRED)
350 slot->flags |= P11_LOGIN_REQ;
351
352 ret = p11_get_session(context, p, slot, lock, &session);
353 if (ret)
354 return ret;
355
356 ret = p11_mech_info(context, p, slot, num);
357 if (ret)
358 goto out;
359
360 ret = p11_list_keys(context, p, slot, session, lock, &slot->certs);
361 out:
362 p11_put_session(p, slot, session);
363
364 return ret;
365 }
366
367 static int
p11_get_session(hx509_context context,struct p11_module * p,struct p11_slot * slot,hx509_lock lock,CK_SESSION_HANDLE * psession)368 p11_get_session(hx509_context context,
369 struct p11_module *p,
370 struct p11_slot *slot,
371 hx509_lock lock,
372 CK_SESSION_HANDLE *psession)
373 {
374 CK_RV ret;
375
376 if (slot->flags & P11_SESSION_IN_USE)
377 _hx509_abort("slot already in session");
378
379 if (slot->flags & P11_SESSION) {
380 slot->flags |= P11_SESSION_IN_USE;
381 *psession = slot->session;
382 return 0;
383 }
384
385 ret = P11FUNC(p, OpenSession, (slot->id,
386 CKF_SERIAL_SESSION,
387 NULL,
388 NULL,
389 &slot->session));
390 if (ret != CKR_OK) {
391 if (context)
392 hx509_set_error_string(context, 0, HX509_PKCS11_OPEN_SESSION,
393 "Failed to OpenSession for slot id %d "
394 "with error: 0x%08x",
395 (int)slot->id, ret);
396 return HX509_PKCS11_OPEN_SESSION;
397 }
398
399 slot->flags |= P11_SESSION;
400
401 /*
402 * If we have have to login, and haven't tried before and have a
403 * prompter or known to work pin code.
404 *
405 * This code is very conversative and only uses the prompter in
406 * the hx509_lock, the reason is that it's bad to try many
407 * passwords on a pkcs11 token, it might lock up and have to be
408 * unlocked by a administrator.
409 *
410 * XXX try harder to not use pin several times on the same card.
411 */
412
413 if ( (slot->flags & P11_LOGIN_REQ)
414 && (slot->flags & P11_LOGIN_DONE) == 0
415 && (lock || slot->pin))
416 {
417 hx509_prompt prompt;
418 char pin[20];
419 char *str;
420
421 if (slot->pin == NULL) {
422
423 memset(&prompt, 0, sizeof(prompt));
424
425 asprintf(&str, "PIN code for %s: ", slot->name);
426 prompt.prompt = str;
427 prompt.type = HX509_PROMPT_TYPE_PASSWORD;
428 prompt.reply.data = pin;
429 prompt.reply.length = sizeof(pin);
430
431 ret = hx509_lock_prompt(lock, &prompt);
432 if (ret) {
433 free(str);
434 if (context)
435 hx509_set_error_string(context, 0, ret,
436 "Failed to get pin code for slot "
437 "id %d with error: %d",
438 (int)slot->id, ret);
439 return ret;
440 }
441 free(str);
442 } else {
443 strlcpy(pin, slot->pin, sizeof(pin));
444 }
445
446 ret = P11FUNC(p, Login, (slot->session, CKU_USER,
447 (unsigned char*)pin, strlen(pin)));
448 if (ret != CKR_OK) {
449 if (context)
450 hx509_set_error_string(context, 0, HX509_PKCS11_LOGIN,
451 "Failed to login on slot id %d "
452 "with error: 0x%08x",
453 (int)slot->id, ret);
454 return HX509_PKCS11_LOGIN;
455 } else
456 slot->flags |= P11_LOGIN_DONE;
457
458 if (slot->pin == NULL) {
459 slot->pin = strdup(pin);
460 if (slot->pin == NULL) {
461 if (context)
462 hx509_set_error_string(context, 0, ENOMEM,
463 "out of memory");
464 return ENOMEM;
465 }
466 }
467 } else
468 slot->flags |= P11_LOGIN_DONE;
469
470 slot->flags |= P11_SESSION_IN_USE;
471
472 *psession = slot->session;
473
474 return 0;
475 }
476
477 static int
p11_put_session(struct p11_module * p,struct p11_slot * slot,CK_SESSION_HANDLE session)478 p11_put_session(struct p11_module *p,
479 struct p11_slot *slot,
480 CK_SESSION_HANDLE session)
481 {
482 if ((slot->flags & P11_SESSION_IN_USE) == 0)
483 _hx509_abort("slot not in session");
484 slot->flags &= ~P11_SESSION_IN_USE;
485
486 return 0;
487 }
488
489 static int
iterate_entries(hx509_context context,struct p11_module * p,struct p11_slot * slot,CK_SESSION_HANDLE session,CK_ATTRIBUTE * search_data,int num_search_data,CK_ATTRIBUTE * query,int num_query,int (* func)(hx509_context,struct p11_module *,struct p11_slot *,CK_SESSION_HANDLE session,CK_OBJECT_HANDLE object,void *,CK_ATTRIBUTE *,int),void * ptr)490 iterate_entries(hx509_context context,
491 struct p11_module *p, struct p11_slot *slot,
492 CK_SESSION_HANDLE session,
493 CK_ATTRIBUTE *search_data, int num_search_data,
494 CK_ATTRIBUTE *query, int num_query,
495 int (*func)(hx509_context,
496 struct p11_module *, struct p11_slot *,
497 CK_SESSION_HANDLE session,
498 CK_OBJECT_HANDLE object,
499 void *, CK_ATTRIBUTE *, int), void *ptr)
500 {
501 CK_OBJECT_HANDLE object;
502 CK_ULONG object_count;
503 int ret, ret2, i;
504
505 ret = P11FUNC(p, FindObjectsInit, (session, search_data, num_search_data));
506 if (ret != CKR_OK) {
507 return -1;
508 }
509 while (1) {
510 ret = P11FUNC(p, FindObjects, (session, &object, 1, &object_count));
511 if (ret != CKR_OK) {
512 return -1;
513 }
514 if (object_count == 0)
515 break;
516
517 for (i = 0; i < num_query; i++)
518 query[i].pValue = NULL;
519
520 ret = P11FUNC(p, GetAttributeValue,
521 (session, object, query, num_query));
522 if (ret != CKR_OK) {
523 return -1;
524 }
525 for (i = 0; i < num_query; i++) {
526 query[i].pValue = malloc(query[i].ulValueLen);
527 if (query[i].pValue == NULL) {
528 ret = ENOMEM;
529 goto out;
530 }
531 }
532 ret = P11FUNC(p, GetAttributeValue,
533 (session, object, query, num_query));
534 if (ret != CKR_OK) {
535 ret = -1;
536 goto out;
537 }
538
539 ret = (*func)(context, p, slot, session, object, ptr, query, num_query);
540 if (ret)
541 goto out;
542
543 for (i = 0; i < num_query; i++) {
544 if (query[i].pValue)
545 free(query[i].pValue);
546 query[i].pValue = NULL;
547 }
548 }
549 out:
550
551 for (i = 0; i < num_query; i++) {
552 if (query[i].pValue)
553 free(query[i].pValue);
554 query[i].pValue = NULL;
555 }
556
557 ret2 = P11FUNC(p, FindObjectsFinal, (session));
558 if (ret2 != CKR_OK) {
559 return ret2;
560 }
561
562 return ret;
563 }
564
565 static BIGNUM *
getattr_bn(struct p11_module * p,struct p11_slot * slot,CK_SESSION_HANDLE session,CK_OBJECT_HANDLE object,unsigned int type)566 getattr_bn(struct p11_module *p,
567 struct p11_slot *slot,
568 CK_SESSION_HANDLE session,
569 CK_OBJECT_HANDLE object,
570 unsigned int type)
571 {
572 CK_ATTRIBUTE query;
573 BIGNUM *bn;
574 int ret;
575
576 query.type = type;
577 query.pValue = NULL;
578 query.ulValueLen = 0;
579
580 ret = P11FUNC(p, GetAttributeValue,
581 (session, object, &query, 1));
582 if (ret != CKR_OK)
583 return NULL;
584
585 query.pValue = malloc(query.ulValueLen);
586
587 ret = P11FUNC(p, GetAttributeValue,
588 (session, object, &query, 1));
589 if (ret != CKR_OK) {
590 free(query.pValue);
591 return NULL;
592 }
593 bn = BN_bin2bn(query.pValue, query.ulValueLen, NULL);
594 free(query.pValue);
595
596 return bn;
597 }
598
599 static int
collect_private_key(hx509_context context,struct p11_module * p,struct p11_slot * slot,CK_SESSION_HANDLE session,CK_OBJECT_HANDLE object,void * ptr,CK_ATTRIBUTE * query,int num_query)600 collect_private_key(hx509_context context,
601 struct p11_module *p, struct p11_slot *slot,
602 CK_SESSION_HANDLE session,
603 CK_OBJECT_HANDLE object,
604 void *ptr, CK_ATTRIBUTE *query, int num_query)
605 {
606 struct hx509_collector *collector = ptr;
607 hx509_private_key key;
608 heim_octet_string localKeyId;
609 int ret;
610 RSA *rsa;
611 struct p11_rsa *p11rsa;
612
613 localKeyId.data = query[0].pValue;
614 localKeyId.length = query[0].ulValueLen;
615
616 ret = hx509_private_key_init(&key, NULL, NULL);
617 if (ret)
618 return ret;
619
620 rsa = RSA_new();
621 if (rsa == NULL)
622 _hx509_abort("out of memory");
623
624 /*
625 * The exponent and modulus should always be present according to
626 * the pkcs11 specification, but some smartcards leaves it out,
627 * let ignore any failure to fetch it.
628 */
629 rsa->n = getattr_bn(p, slot, session, object, CKA_MODULUS);
630 rsa->e = getattr_bn(p, slot, session, object, CKA_PUBLIC_EXPONENT);
631
632 p11rsa = calloc(1, sizeof(*p11rsa));
633 if (p11rsa == NULL)
634 _hx509_abort("out of memory");
635
636 p11rsa->p = p;
637 p11rsa->slot = slot;
638 p11rsa->private_key = object;
639
640 if (p->ref == 0)
641 _hx509_abort("pkcs11 ref == 0 on alloc");
642 p->ref++;
643 if (p->ref == UINT_MAX)
644 _hx509_abort("pkcs11 ref == UINT_MAX on alloc");
645
646 RSA_set_method(rsa, &p11_rsa_pkcs1_method);
647 ret = RSA_set_app_data(rsa, p11rsa);
648 if (ret != 1)
649 _hx509_abort("RSA_set_app_data");
650
651 hx509_private_key_assign_rsa(key, rsa);
652
653 ret = _hx509_collector_private_key_add(context,
654 collector,
655 hx509_signature_rsa(),
656 key,
657 NULL,
658 &localKeyId);
659
660 if (ret) {
661 hx509_private_key_free(&key);
662 return ret;
663 }
664 return 0;
665 }
666
667 static void
p11_cert_release(hx509_cert cert,void * ctx)668 p11_cert_release(hx509_cert cert, void *ctx)
669 {
670 struct p11_module *p = ctx;
671 p11_release_module(p);
672 }
673
674
675 static int
collect_cert(hx509_context context,struct p11_module * p,struct p11_slot * slot,CK_SESSION_HANDLE session,CK_OBJECT_HANDLE object,void * ptr,CK_ATTRIBUTE * query,int num_query)676 collect_cert(hx509_context context,
677 struct p11_module *p, struct p11_slot *slot,
678 CK_SESSION_HANDLE session,
679 CK_OBJECT_HANDLE object,
680 void *ptr, CK_ATTRIBUTE *query, int num_query)
681 {
682 struct hx509_collector *collector = ptr;
683 hx509_cert cert;
684 int ret;
685
686 if ((CK_LONG)query[0].ulValueLen == -1 ||
687 (CK_LONG)query[1].ulValueLen == -1)
688 {
689 return 0;
690 }
691
692 ret = hx509_cert_init_data(context, query[1].pValue,
693 query[1].ulValueLen, &cert);
694 if (ret)
695 return ret;
696
697 if (p->ref == 0)
698 _hx509_abort("pkcs11 ref == 0 on alloc");
699 p->ref++;
700 if (p->ref == UINT_MAX)
701 _hx509_abort("pkcs11 ref to high");
702
703 _hx509_cert_set_release(cert, p11_cert_release, p);
704
705 {
706 heim_octet_string data;
707
708 data.data = query[0].pValue;
709 data.length = query[0].ulValueLen;
710
711 _hx509_set_cert_attribute(context,
712 cert,
713 &asn1_oid_id_pkcs_9_at_localKeyId,
714 &data);
715 }
716
717 if ((CK_LONG)query[2].ulValueLen != -1) {
718 char *str;
719
720 asprintf(&str, "%.*s",
721 (int)query[2].ulValueLen, (char *)query[2].pValue);
722 if (str) {
723 hx509_cert_set_friendly_name(cert, str);
724 free(str);
725 }
726 }
727
728 ret = _hx509_collector_certs_add(context, collector, cert);
729 hx509_cert_free(cert);
730
731 return ret;
732 }
733
734
735 static int
p11_list_keys(hx509_context context,struct p11_module * p,struct p11_slot * slot,CK_SESSION_HANDLE session,hx509_lock lock,hx509_certs * certs)736 p11_list_keys(hx509_context context,
737 struct p11_module *p,
738 struct p11_slot *slot,
739 CK_SESSION_HANDLE session,
740 hx509_lock lock,
741 hx509_certs *certs)
742 {
743 struct hx509_collector *collector;
744 CK_OBJECT_CLASS key_class;
745 CK_ATTRIBUTE search_data[] = {
746 {CKA_CLASS, NULL, 0},
747 };
748 CK_ATTRIBUTE query_data[3] = {
749 {CKA_ID, NULL, 0},
750 {CKA_VALUE, NULL, 0},
751 {CKA_LABEL, NULL, 0}
752 };
753 int ret;
754
755 search_data[0].pValue = &key_class;
756 search_data[0].ulValueLen = sizeof(key_class);
757
758 if (lock == NULL)
759 lock = _hx509_empty_lock;
760
761 ret = _hx509_collector_alloc(context, lock, &collector);
762 if (ret)
763 return ret;
764
765 key_class = CKO_PRIVATE_KEY;
766 ret = iterate_entries(context, p, slot, session,
767 search_data, 1,
768 query_data, 1,
769 collect_private_key, collector);
770 if (ret)
771 goto out;
772
773 key_class = CKO_CERTIFICATE;
774 ret = iterate_entries(context, p, slot, session,
775 search_data, 1,
776 query_data, 3,
777 collect_cert, collector);
778 if (ret)
779 goto out;
780
781 ret = _hx509_collector_collect_certs(context, collector, &slot->certs);
782
783 out:
784 _hx509_collector_free(collector);
785
786 return ret;
787 }
788
789
790 static int
p11_init(hx509_context context,hx509_certs certs,void ** data,int flags,const char * residue,hx509_lock lock)791 p11_init(hx509_context context,
792 hx509_certs certs, void **data, int flags,
793 const char *residue, hx509_lock lock)
794 {
795 CK_C_GetFunctionList getFuncs;
796 struct p11_module *p;
797 char *list, *str;
798 int ret;
799
800 *data = NULL;
801
802 list = strdup(residue);
803 if (list == NULL)
804 return ENOMEM;
805
806 p = calloc(1, sizeof(*p));
807 if (p == NULL) {
808 free(list);
809 return ENOMEM;
810 }
811
812 p->ref = 1;
813
814 str = strchr(list, ',');
815 if (str)
816 *str++ = '\0';
817 while (str) {
818 char *strnext;
819 strnext = strchr(str, ',');
820 if (strnext)
821 *strnext++ = '\0';
822 #if 0
823 if (strncasecmp(str, "slot=", 5) == 0)
824 p->selected_slot = atoi(str + 5);
825 #endif
826 str = strnext;
827 }
828
829 p->dl_handle = dlopen(list, RTLD_NOW);
830 free(list);
831 if (p->dl_handle == NULL) {
832 ret = HX509_PKCS11_LOAD;
833 hx509_set_error_string(context, 0, ret,
834 "Failed to open %s: %s", list, dlerror());
835 goto out;
836 }
837
838 getFuncs = (CK_C_GetFunctionList) dlsym(p->dl_handle, "C_GetFunctionList");
839 if (getFuncs == NULL) {
840 ret = HX509_PKCS11_LOAD;
841 hx509_set_error_string(context, 0, ret,
842 "C_GetFunctionList missing in %s: %s",
843 list, dlerror());
844 goto out;
845 }
846
847 ret = (*getFuncs)(&p->funcs);
848 if (ret) {
849 ret = HX509_PKCS11_LOAD;
850 hx509_set_error_string(context, 0, ret,
851 "C_GetFunctionList failed in %s", list);
852 goto out;
853 }
854
855 ret = P11FUNC(p, Initialize, (NULL_PTR));
856 if (ret != CKR_OK) {
857 ret = HX509_PKCS11_TOKEN_CONFUSED;
858 hx509_set_error_string(context, 0, ret,
859 "Failed initialize the PKCS11 module");
860 goto out;
861 }
862
863 ret = P11FUNC(p, GetSlotList, (FALSE, NULL, &p->num_slots));
864 if (ret) {
865 ret = HX509_PKCS11_TOKEN_CONFUSED;
866 hx509_set_error_string(context, 0, ret,
867 "Failed to get number of PKCS11 slots");
868 goto out;
869 }
870
871 if (p->num_slots == 0) {
872 ret = HX509_PKCS11_NO_SLOT;
873 hx509_set_error_string(context, 0, ret,
874 "Selected PKCS11 module have no slots");
875 goto out;
876 }
877
878
879 {
880 CK_SLOT_ID_PTR slot_ids;
881 int num_tokens = 0;
882 size_t i;
883
884 slot_ids = malloc(p->num_slots * sizeof(*slot_ids));
885 if (slot_ids == NULL) {
886 hx509_clear_error_string(context);
887 ret = ENOMEM;
888 goto out;
889 }
890
891 ret = P11FUNC(p, GetSlotList, (FALSE, slot_ids, &p->num_slots));
892 if (ret) {
893 free(slot_ids);
894 hx509_set_error_string(context, 0, HX509_PKCS11_TOKEN_CONFUSED,
895 "Failed getting slot-list from "
896 "PKCS11 module");
897 ret = HX509_PKCS11_TOKEN_CONFUSED;
898 goto out;
899 }
900
901 p->slot = calloc(p->num_slots, sizeof(p->slot[0]));
902 if (p->slot == NULL) {
903 free(slot_ids);
904 hx509_set_error_string(context, 0, ENOMEM,
905 "Failed to get memory for slot-list");
906 ret = ENOMEM;
907 goto out;
908 }
909
910 for (i = 0; i < p->num_slots; i++) {
911 ret = p11_init_slot(context, p, lock, slot_ids[i], i, &p->slot[i]);
912 if (ret)
913 break;
914 if (p->slot[i].flags & P11_TOKEN_PRESENT)
915 num_tokens++;
916 }
917 free(slot_ids);
918 if (ret)
919 goto out;
920 if (num_tokens == 0) {
921 ret = HX509_PKCS11_NO_TOKEN;
922 goto out;
923 }
924 }
925
926 *data = p;
927
928 return 0;
929 out:
930 p11_release_module(p);
931 return ret;
932 }
933
934 static void
p11_release_module(struct p11_module * p)935 p11_release_module(struct p11_module *p)
936 {
937 size_t i;
938
939 if (p->ref == 0)
940 _hx509_abort("pkcs11 ref to low");
941 if (--p->ref > 0)
942 return;
943
944 for (i = 0; i < p->num_slots; i++) {
945 if (p->slot[i].flags & P11_SESSION_IN_USE)
946 _hx509_abort("pkcs11 module release while session in use");
947 if (p->slot[i].flags & P11_SESSION) {
948 P11FUNC(p, CloseSession, (p->slot[i].session));
949 }
950
951 if (p->slot[i].name)
952 free(p->slot[i].name);
953 if (p->slot[i].pin) {
954 memset(p->slot[i].pin, 0, strlen(p->slot[i].pin));
955 free(p->slot[i].pin);
956 }
957 if (p->slot[i].mechs.num) {
958 free(p->slot[i].mechs.list);
959
960 if (p->slot[i].mechs.infos) {
961 size_t j;
962
963 for (j = 0 ; j < p->slot[i].mechs.num ; j++)
964 free(p->slot[i].mechs.infos[j]);
965 free(p->slot[i].mechs.infos);
966 }
967 }
968 }
969 free(p->slot);
970
971 if (p->funcs)
972 P11FUNC(p, Finalize, (NULL));
973
974 if (p->dl_handle)
975 dlclose(p->dl_handle);
976
977 memset(p, 0, sizeof(*p));
978 free(p);
979 }
980
981 static int
p11_free(hx509_certs certs,void * data)982 p11_free(hx509_certs certs, void *data)
983 {
984 struct p11_module *p = data;
985 size_t i;
986
987 for (i = 0; i < p->num_slots; i++) {
988 if (p->slot[i].certs)
989 hx509_certs_free(&p->slot[i].certs);
990 }
991 p11_release_module(p);
992 return 0;
993 }
994
995 struct p11_cursor {
996 hx509_certs certs;
997 void *cursor;
998 };
999
1000 static int
p11_iter_start(hx509_context context,hx509_certs certs,void * data,void ** cursor)1001 p11_iter_start(hx509_context context,
1002 hx509_certs certs, void *data, void **cursor)
1003 {
1004 struct p11_module *p = data;
1005 struct p11_cursor *c;
1006 int ret;
1007 size_t i;
1008
1009 c = malloc(sizeof(*c));
1010 if (c == NULL) {
1011 hx509_clear_error_string(context);
1012 return ENOMEM;
1013 }
1014 ret = hx509_certs_init(context, "MEMORY:pkcs11-iter", 0, NULL, &c->certs);
1015 if (ret) {
1016 free(c);
1017 return ret;
1018 }
1019
1020 for (i = 0 ; i < p->num_slots; i++) {
1021 if (p->slot[i].certs == NULL)
1022 continue;
1023 ret = hx509_certs_merge(context, c->certs, p->slot[i].certs);
1024 if (ret) {
1025 hx509_certs_free(&c->certs);
1026 free(c);
1027 return ret;
1028 }
1029 }
1030
1031 ret = hx509_certs_start_seq(context, c->certs, &c->cursor);
1032 if (ret) {
1033 hx509_certs_free(&c->certs);
1034 free(c);
1035 return 0;
1036 }
1037 *cursor = c;
1038
1039 return 0;
1040 }
1041
1042 static int
p11_iter(hx509_context context,hx509_certs certs,void * data,void * cursor,hx509_cert * cert)1043 p11_iter(hx509_context context,
1044 hx509_certs certs, void *data, void *cursor, hx509_cert *cert)
1045 {
1046 struct p11_cursor *c = cursor;
1047 return hx509_certs_next_cert(context, c->certs, c->cursor, cert);
1048 }
1049
1050 static int
p11_iter_end(hx509_context context,hx509_certs certs,void * data,void * cursor)1051 p11_iter_end(hx509_context context,
1052 hx509_certs certs, void *data, void *cursor)
1053 {
1054 struct p11_cursor *c = cursor;
1055 int ret;
1056 ret = hx509_certs_end_seq(context, c->certs, c->cursor);
1057 hx509_certs_free(&c->certs);
1058 free(c);
1059 return ret;
1060 }
1061
1062 #define MECHFLAG(x) { "unknown-flag-" #x, x }
1063 static struct units mechflags[] = {
1064 MECHFLAG(0x80000000),
1065 MECHFLAG(0x40000000),
1066 MECHFLAG(0x20000000),
1067 MECHFLAG(0x10000000),
1068 MECHFLAG(0x08000000),
1069 MECHFLAG(0x04000000),
1070 {"ec-compress", 0x2000000 },
1071 {"ec-uncompress", 0x1000000 },
1072 {"ec-namedcurve", 0x0800000 },
1073 {"ec-ecparameters", 0x0400000 },
1074 {"ec-f-2m", 0x0200000 },
1075 {"ec-f-p", 0x0100000 },
1076 {"derive", 0x0080000 },
1077 {"unwrap", 0x0040000 },
1078 {"wrap", 0x0020000 },
1079 {"genereate-key-pair", 0x0010000 },
1080 {"generate", 0x0008000 },
1081 {"verify-recover", 0x0004000 },
1082 {"verify", 0x0002000 },
1083 {"sign-recover", 0x0001000 },
1084 {"sign", 0x0000800 },
1085 {"digest", 0x0000400 },
1086 {"decrypt", 0x0000200 },
1087 {"encrypt", 0x0000100 },
1088 MECHFLAG(0x00080),
1089 MECHFLAG(0x00040),
1090 MECHFLAG(0x00020),
1091 MECHFLAG(0x00010),
1092 MECHFLAG(0x00008),
1093 MECHFLAG(0x00004),
1094 MECHFLAG(0x00002),
1095 {"hw", 0x0000001 },
1096 { NULL, 0x0000000 }
1097 };
1098 #undef MECHFLAG
1099
1100 static int
p11_printinfo(hx509_context context,hx509_certs certs,void * data,int (* func)(void *,const char *),void * ctx)1101 p11_printinfo(hx509_context context,
1102 hx509_certs certs,
1103 void *data,
1104 int (*func)(void *, const char *),
1105 void *ctx)
1106 {
1107 struct p11_module *p = data;
1108 size_t i, j;
1109
1110 _hx509_pi_printf(func, ctx, "pkcs11 driver with %d slot%s",
1111 p->num_slots, p->num_slots > 1 ? "s" : "");
1112
1113 for (i = 0; i < p->num_slots; i++) {
1114 struct p11_slot *s = &p->slot[i];
1115
1116 _hx509_pi_printf(func, ctx, "slot %d: id: %d name: %s flags: %08x",
1117 i, (int)s->id, s->name, s->flags);
1118
1119 _hx509_pi_printf(func, ctx, "number of supported mechanisms: %lu",
1120 (unsigned long)s->mechs.num);
1121 for (j = 0; j < s->mechs.num; j++) {
1122 const char *mechname = "unknown";
1123 char flags[256], unknownname[40];
1124 #define MECHNAME(s,n) case s: mechname = n; break
1125 switch(s->mechs.list[j]) {
1126 MECHNAME(CKM_RSA_PKCS_KEY_PAIR_GEN, "rsa-pkcs-key-pair-gen");
1127 MECHNAME(CKM_RSA_PKCS, "rsa-pkcs");
1128 MECHNAME(CKM_RSA_X_509, "rsa-x-509");
1129 MECHNAME(CKM_MD5_RSA_PKCS, "md5-rsa-pkcs");
1130 MECHNAME(CKM_SHA1_RSA_PKCS, "sha1-rsa-pkcs");
1131 MECHNAME(CKM_SHA256_RSA_PKCS, "sha256-rsa-pkcs");
1132 MECHNAME(CKM_SHA384_RSA_PKCS, "sha384-rsa-pkcs");
1133 MECHNAME(CKM_SHA512_RSA_PKCS, "sha512-rsa-pkcs");
1134 MECHNAME(CKM_RIPEMD160_RSA_PKCS, "ripemd160-rsa-pkcs");
1135 MECHNAME(CKM_RSA_PKCS_OAEP, "rsa-pkcs-oaep");
1136 MECHNAME(CKM_SHA512_HMAC, "sha512-hmac");
1137 MECHNAME(CKM_SHA512, "sha512");
1138 MECHNAME(CKM_SHA384_HMAC, "sha384-hmac");
1139 MECHNAME(CKM_SHA384, "sha384");
1140 MECHNAME(CKM_SHA256_HMAC, "sha256-hmac");
1141 MECHNAME(CKM_SHA256, "sha256");
1142 MECHNAME(CKM_SHA_1, "sha1");
1143 MECHNAME(CKM_MD5, "md5");
1144 MECHNAME(CKM_RIPEMD160, "ripemd-160");
1145 MECHNAME(CKM_DES_ECB, "des-ecb");
1146 MECHNAME(CKM_DES_CBC, "des-cbc");
1147 MECHNAME(CKM_AES_ECB, "aes-ecb");
1148 MECHNAME(CKM_AES_CBC, "aes-cbc");
1149 MECHNAME(CKM_DH_PKCS_PARAMETER_GEN, "dh-pkcs-parameter-gen");
1150 default:
1151 snprintf(unknownname, sizeof(unknownname),
1152 "unknown-mech-%lu",
1153 (unsigned long)s->mechs.list[j]);
1154 mechname = unknownname;
1155 break;
1156 }
1157 #undef MECHNAME
1158 unparse_flags(s->mechs.infos[j]->flags, mechflags,
1159 flags, sizeof(flags));
1160
1161 _hx509_pi_printf(func, ctx, " %s: %s", mechname, flags);
1162 }
1163 }
1164
1165 return 0;
1166 }
1167
1168 static struct hx509_keyset_ops keyset_pkcs11 = {
1169 "PKCS11",
1170 0,
1171 p11_init,
1172 NULL,
1173 p11_free,
1174 NULL,
1175 NULL,
1176 p11_iter_start,
1177 p11_iter,
1178 p11_iter_end,
1179 p11_printinfo
1180 };
1181
1182 #endif /* HAVE_DLOPEN */
1183
1184 void
_hx509_ks_pkcs11_register(hx509_context context)1185 _hx509_ks_pkcs11_register(hx509_context context)
1186 {
1187 #ifdef HAVE_DLOPEN
1188 _hx509_ks_register(context, &keyset_pkcs11);
1189 #endif
1190 }
1191