xref: /freebsd/crypto/heimdal/lib/hx509/ks_p11.c (revision b077aed33b7b6aefca7b17ddb250cf521f938613)
1 /*
2  * Copyright (c) 2004 - 2008 Kungliga Tekniska Högskolan
3  * (Royal Institute of Technology, Stockholm, Sweden).
4  * All rights reserved.
5  *
6  * Redistribution and use in source and binary forms, with or without
7  * modification, are permitted provided that the following conditions
8  * are met:
9  *
10  * 1. Redistributions of source code must retain the above copyright
11  *    notice, this list of conditions and the following disclaimer.
12  *
13  * 2. Redistributions in binary form must reproduce the above copyright
14  *    notice, this list of conditions and the following disclaimer in the
15  *    documentation and/or other materials provided with the distribution.
16  *
17  * 3. Neither the name of the Institute nor the names of its contributors
18  *    may be used to endorse or promote products derived from this software
19  *    without specific prior written permission.
20  *
21  * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
22  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24  * ARE DISCLAIMED.  IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
25  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31  * SUCH DAMAGE.
32  */
33 
34 #include "hx_locl.h"
35 #ifdef HAVE_DLFCN_H
36 #include <dlfcn.h>
37 #endif
38 
39 #ifdef HAVE_DLOPEN
40 
41 #include "pkcs11.h"
42 
43 struct p11_slot {
44     int flags;
45 #define P11_SESSION		1
46 #define P11_SESSION_IN_USE	2
47 #define P11_LOGIN_REQ		4
48 #define P11_LOGIN_DONE		8
49 #define P11_TOKEN_PRESENT	16
50     CK_SESSION_HANDLE session;
51     CK_SLOT_ID id;
52     CK_BBOOL token;
53     char *name;
54     hx509_certs certs;
55     char *pin;
56     struct {
57 	CK_MECHANISM_TYPE_PTR list;
58 	CK_ULONG num;
59 	CK_MECHANISM_INFO_PTR *infos;
60     } mechs;
61 };
62 
63 struct p11_module {
64     void *dl_handle;
65     CK_FUNCTION_LIST_PTR funcs;
66     CK_ULONG num_slots;
67     unsigned int ref;
68     struct p11_slot *slot;
69 };
70 
71 #define P11FUNC(module,f,args) (*(module)->funcs->C_##f)args
72 
73 static int p11_get_session(hx509_context,
74 			   struct p11_module *,
75 			   struct p11_slot *,
76 			   hx509_lock,
77 			   CK_SESSION_HANDLE *);
78 static int p11_put_session(struct p11_module *,
79 			   struct p11_slot *,
80 			   CK_SESSION_HANDLE);
81 static void p11_release_module(struct p11_module *);
82 
83 static int p11_list_keys(hx509_context,
84 			 struct p11_module *,
85 			 struct p11_slot *,
86 			 CK_SESSION_HANDLE,
87 			 hx509_lock,
88 			 hx509_certs *);
89 
90 /*
91  *
92  */
93 
94 struct p11_rsa {
95     struct p11_module *p;
96     struct p11_slot *slot;
97     CK_OBJECT_HANDLE private_key;
98     CK_OBJECT_HANDLE public_key;
99 };
100 
101 static int
102 p11_rsa_public_encrypt(int flen,
103 		       const unsigned char *from,
104 		       unsigned char *to,
105 		       RSA *rsa,
106 		       int padding)
107 {
108     return -1;
109 }
110 
111 static int
112 p11_rsa_public_decrypt(int flen,
113 		       const unsigned char *from,
114 		       unsigned char *to,
115 		       RSA *rsa,
116 		       int padding)
117 {
118     return -1;
119 }
120 
121 
122 static int
123 p11_rsa_private_encrypt(int flen,
124 			const unsigned char *from,
125 			unsigned char *to,
126 			RSA *rsa,
127 			int padding)
128 {
129     struct p11_rsa *p11rsa = RSA_get_app_data(rsa);
130     CK_OBJECT_HANDLE key = p11rsa->private_key;
131     CK_SESSION_HANDLE session;
132     CK_MECHANISM mechanism;
133     CK_ULONG ck_sigsize;
134     int ret;
135 
136     if (padding != RSA_PKCS1_PADDING)
137 	return -1;
138 
139     memset(&mechanism, 0, sizeof(mechanism));
140     mechanism.mechanism = CKM_RSA_PKCS;
141 
142     ck_sigsize = RSA_size(rsa);
143 
144     ret = p11_get_session(NULL, p11rsa->p, p11rsa->slot, NULL, &session);
145     if (ret)
146 	return -1;
147 
148     ret = P11FUNC(p11rsa->p, SignInit, (session, &mechanism, key));
149     if (ret != CKR_OK) {
150 	p11_put_session(p11rsa->p, p11rsa->slot, session);
151 	return -1;
152     }
153 
154     ret = P11FUNC(p11rsa->p, Sign,
155 		  (session, (CK_BYTE *)(intptr_t)from, flen, to, &ck_sigsize));
156     p11_put_session(p11rsa->p, p11rsa->slot, session);
157     if (ret != CKR_OK)
158 	return -1;
159 
160     return ck_sigsize;
161 }
162 
163 static int
164 p11_rsa_private_decrypt(int flen, const unsigned char *from, unsigned char *to,
165 			RSA * rsa, int padding)
166 {
167     struct p11_rsa *p11rsa = RSA_get_app_data(rsa);
168     CK_OBJECT_HANDLE key = p11rsa->private_key;
169     CK_SESSION_HANDLE session;
170     CK_MECHANISM mechanism;
171     CK_ULONG ck_sigsize;
172     int ret;
173 
174     if (padding != RSA_PKCS1_PADDING)
175 	return -1;
176 
177     memset(&mechanism, 0, sizeof(mechanism));
178     mechanism.mechanism = CKM_RSA_PKCS;
179 
180     ck_sigsize = RSA_size(rsa);
181 
182     ret = p11_get_session(NULL, p11rsa->p, p11rsa->slot, NULL, &session);
183     if (ret)
184 	return -1;
185 
186     ret = P11FUNC(p11rsa->p, DecryptInit, (session, &mechanism, key));
187     if (ret != CKR_OK) {
188 	p11_put_session(p11rsa->p, p11rsa->slot, session);
189 	return -1;
190     }
191 
192     ret = P11FUNC(p11rsa->p, Decrypt,
193 		  (session, (CK_BYTE *)(intptr_t)from, flen, to, &ck_sigsize));
194     p11_put_session(p11rsa->p, p11rsa->slot, session);
195     if (ret != CKR_OK)
196 	return -1;
197 
198     return ck_sigsize;
199 }
200 
201 static int
202 p11_rsa_init(RSA *rsa)
203 {
204     return 1;
205 }
206 
207 static int
208 p11_rsa_finish(RSA *rsa)
209 {
210     struct p11_rsa *p11rsa = RSA_get_app_data(rsa);
211     p11_release_module(p11rsa->p);
212     free(p11rsa);
213     return 1;
214 }
215 
216 static const RSA_METHOD *
217 get_p11_rsa_pkcs1_method(void)
218 {
219     static const RSA_METHOD *p11_rsa_pkcs1_method;
220     RSA_METHOD *new_method;
221 
222     if (p11_rsa_pkcs1_method != NULL)
223 	return p11_rsa_pkcs1_method;
224 
225     new_method = RSA_meth_new("hx509 PKCS11 PKCS#1 RSA", 0);
226     if (new_method == NULL)
227 	return NULL;
228 
229     if (RSA_meth_set_pub_enc(new_method, p11_rsa_public_encrypt) != 1)
230 	goto out;
231 
232     if (RSA_meth_set_pub_dec(new_method, p11_rsa_public_decrypt) != 1)
233 	goto out;
234 
235     if (RSA_meth_set_priv_enc(new_method, p11_rsa_private_encrypt) != 1)
236 	goto out;
237 
238     if (RSA_meth_set_priv_dec(new_method, p11_rsa_private_decrypt) != 1)
239 	goto out;
240 
241     if (RSA_meth_set_init(new_method, p11_rsa_init) != 1)
242 	goto out;
243 
244     if (RSA_meth_set_finish(new_method, p11_rsa_finish) != 1)
245 	goto out;
246 
247     /*
248      * This might overwrite a previously-created method if multiple
249      * threads invoke this concurrently which will leak memory.
250      */
251     p11_rsa_pkcs1_method = new_method;
252     return p11_rsa_pkcs1_method;
253 out:
254     RSA_meth_free(new_method);
255     return NULL;
256 }
257 
258 /*
259  *
260  */
261 
262 static int
263 p11_mech_info(hx509_context context,
264 	      struct p11_module *p,
265 	      struct p11_slot *slot,
266 	      int num)
267 {
268     CK_ULONG i;
269     int ret;
270 
271     ret = P11FUNC(p, GetMechanismList, (slot->id, NULL_PTR, &i));
272     if (ret) {
273 	hx509_set_error_string(context, 0, HX509_PKCS11_NO_MECH,
274 			       "Failed to get mech list count for slot %d",
275 			       num);
276 	return HX509_PKCS11_NO_MECH;
277     }
278     if (i == 0) {
279 	hx509_set_error_string(context, 0, HX509_PKCS11_NO_MECH,
280 			       "no mech supported for slot %d", num);
281 	return HX509_PKCS11_NO_MECH;
282     }
283     slot->mechs.list = calloc(i, sizeof(slot->mechs.list[0]));
284     if (slot->mechs.list == NULL) {
285 	hx509_set_error_string(context, 0, ENOMEM,
286 			       "out of memory");
287 	return ENOMEM;
288     }
289     slot->mechs.num = i;
290     ret = P11FUNC(p, GetMechanismList, (slot->id, slot->mechs.list, &i));
291     if (ret) {
292 	hx509_set_error_string(context, 0, HX509_PKCS11_NO_MECH,
293 			       "Failed to get mech list for slot %d",
294 			       num);
295 	return HX509_PKCS11_NO_MECH;
296     }
297     assert(i == slot->mechs.num);
298 
299     slot->mechs.infos = calloc(i, sizeof(*slot->mechs.infos));
300     if (slot->mechs.list == NULL) {
301 	hx509_set_error_string(context, 0, ENOMEM,
302 			       "out of memory");
303 	return ENOMEM;
304     }
305 
306     for (i = 0; i < slot->mechs.num; i++) {
307 	slot->mechs.infos[i] = calloc(1, sizeof(*(slot->mechs.infos[0])));
308 	if (slot->mechs.infos[i] == NULL) {
309 	    hx509_set_error_string(context, 0, ENOMEM,
310 				   "out of memory");
311 	    return ENOMEM;
312 	}
313 	ret = P11FUNC(p, GetMechanismInfo, (slot->id, slot->mechs.list[i],
314 					    slot->mechs.infos[i]));
315 	if (ret) {
316 	    hx509_set_error_string(context, 0, HX509_PKCS11_NO_MECH,
317 				   "Failed to get mech info for slot %d",
318 				   num);
319 	    return HX509_PKCS11_NO_MECH;
320 	}
321     }
322 
323     return 0;
324 }
325 
326 static int
327 p11_init_slot(hx509_context context,
328 	      struct p11_module *p,
329 	      hx509_lock lock,
330 	      CK_SLOT_ID id,
331 	      int num,
332 	      struct p11_slot *slot)
333 {
334     CK_SESSION_HANDLE session;
335     CK_SLOT_INFO slot_info;
336     CK_TOKEN_INFO token_info;
337     size_t i;
338     int ret;
339 
340     slot->certs = NULL;
341     slot->id = id;
342 
343     ret = P11FUNC(p, GetSlotInfo, (slot->id, &slot_info));
344     if (ret) {
345 	hx509_set_error_string(context, 0, HX509_PKCS11_TOKEN_CONFUSED,
346 			       "Failed to init PKCS11 slot %d",
347 			       num);
348 	return HX509_PKCS11_TOKEN_CONFUSED;
349     }
350 
351     for (i = sizeof(slot_info.slotDescription) - 1; i > 0; i--) {
352 	char c = slot_info.slotDescription[i];
353 	if (c == ' ' || c == '\t' || c == '\n' || c == '\r' || c == '\0')
354 	    continue;
355 	i++;
356 	break;
357     }
358 
359     asprintf(&slot->name, "%.*s",
360 	     (int)i, slot_info.slotDescription);
361 
362     if ((slot_info.flags & CKF_TOKEN_PRESENT) == 0)
363 	return 0;
364 
365     ret = P11FUNC(p, GetTokenInfo, (slot->id, &token_info));
366     if (ret) {
367 	hx509_set_error_string(context, 0, HX509_PKCS11_NO_TOKEN,
368 			       "Failed to init PKCS11 slot %d "
369 			       "with error 0x08x",
370 			       num, ret);
371 	return HX509_PKCS11_NO_TOKEN;
372     }
373     slot->flags |= P11_TOKEN_PRESENT;
374 
375     if (token_info.flags & CKF_LOGIN_REQUIRED)
376 	slot->flags |= P11_LOGIN_REQ;
377 
378     ret = p11_get_session(context, p, slot, lock, &session);
379     if (ret)
380 	return ret;
381 
382     ret = p11_mech_info(context, p, slot, num);
383     if (ret)
384 	goto out;
385 
386     ret = p11_list_keys(context, p, slot, session, lock, &slot->certs);
387  out:
388     p11_put_session(p, slot, session);
389 
390     return ret;
391 }
392 
393 static int
394 p11_get_session(hx509_context context,
395 		struct p11_module *p,
396 		struct p11_slot *slot,
397 		hx509_lock lock,
398 		CK_SESSION_HANDLE *psession)
399 {
400     CK_RV ret;
401 
402     if (slot->flags & P11_SESSION_IN_USE)
403 	_hx509_abort("slot already in session");
404 
405     if (slot->flags & P11_SESSION) {
406 	slot->flags |= P11_SESSION_IN_USE;
407 	*psession = slot->session;
408 	return 0;
409     }
410 
411     ret = P11FUNC(p, OpenSession, (slot->id,
412 				   CKF_SERIAL_SESSION,
413 				   NULL,
414 				   NULL,
415 				   &slot->session));
416     if (ret != CKR_OK) {
417 	if (context)
418 	    hx509_set_error_string(context, 0, HX509_PKCS11_OPEN_SESSION,
419 				   "Failed to OpenSession for slot id %d "
420 				   "with error: 0x%08x",
421 				   (int)slot->id, ret);
422 	return HX509_PKCS11_OPEN_SESSION;
423     }
424 
425     slot->flags |= P11_SESSION;
426 
427     /*
428      * If we have have to login, and haven't tried before and have a
429      * prompter or known to work pin code.
430      *
431      * This code is very conversative and only uses the prompter in
432      * the hx509_lock, the reason is that it's bad to try many
433      * passwords on a pkcs11 token, it might lock up and have to be
434      * unlocked by a administrator.
435      *
436      * XXX try harder to not use pin several times on the same card.
437      */
438 
439     if (   (slot->flags & P11_LOGIN_REQ)
440 	&& (slot->flags & P11_LOGIN_DONE) == 0
441 	&& (lock || slot->pin))
442     {
443 	hx509_prompt prompt;
444 	char pin[20];
445 	char *str;
446 
447 	if (slot->pin == NULL) {
448 
449 	    memset(&prompt, 0, sizeof(prompt));
450 
451 	    asprintf(&str, "PIN code for %s: ", slot->name);
452 	    prompt.prompt = str;
453 	    prompt.type = HX509_PROMPT_TYPE_PASSWORD;
454 	    prompt.reply.data = pin;
455 	    prompt.reply.length = sizeof(pin);
456 
457 	    ret = hx509_lock_prompt(lock, &prompt);
458 	    if (ret) {
459 		free(str);
460 		if (context)
461 		    hx509_set_error_string(context, 0, ret,
462 					   "Failed to get pin code for slot "
463 					   "id %d with error: %d",
464 					   (int)slot->id, ret);
465 		return ret;
466 	    }
467 	    free(str);
468 	} else {
469 	    strlcpy(pin, slot->pin, sizeof(pin));
470 	}
471 
472 	ret = P11FUNC(p, Login, (slot->session, CKU_USER,
473 				 (unsigned char*)pin, strlen(pin)));
474 	if (ret != CKR_OK) {
475 	    if (context)
476 		hx509_set_error_string(context, 0, HX509_PKCS11_LOGIN,
477 				       "Failed to login on slot id %d "
478 				       "with error: 0x%08x",
479 				       (int)slot->id, ret);
480 	    return HX509_PKCS11_LOGIN;
481 	} else
482 	    slot->flags |= P11_LOGIN_DONE;
483 
484 	if (slot->pin == NULL) {
485 	    slot->pin = strdup(pin);
486 	    if (slot->pin == NULL) {
487 		if (context)
488 		    hx509_set_error_string(context, 0, ENOMEM,
489 					   "out of memory");
490 		return ENOMEM;
491 	    }
492 	}
493     } else
494 	slot->flags |= P11_LOGIN_DONE;
495 
496     slot->flags |= P11_SESSION_IN_USE;
497 
498     *psession = slot->session;
499 
500     return 0;
501 }
502 
503 static int
504 p11_put_session(struct p11_module *p,
505 		struct p11_slot *slot,
506 		CK_SESSION_HANDLE session)
507 {
508     if ((slot->flags & P11_SESSION_IN_USE) == 0)
509 	_hx509_abort("slot not in session");
510     slot->flags &= ~P11_SESSION_IN_USE;
511 
512     return 0;
513 }
514 
515 static int
516 iterate_entries(hx509_context context,
517 		struct p11_module *p, struct p11_slot *slot,
518 		CK_SESSION_HANDLE session,
519 		CK_ATTRIBUTE *search_data, int num_search_data,
520 		CK_ATTRIBUTE *query, int num_query,
521 		int (*func)(hx509_context,
522 			    struct p11_module *, struct p11_slot *,
523 			    CK_SESSION_HANDLE session,
524 			    CK_OBJECT_HANDLE object,
525 			    void *, CK_ATTRIBUTE *, int), void *ptr)
526 {
527     CK_OBJECT_HANDLE object;
528     CK_ULONG object_count;
529     int ret, ret2, i;
530 
531     ret = P11FUNC(p, FindObjectsInit, (session, search_data, num_search_data));
532     if (ret != CKR_OK) {
533 	return -1;
534     }
535     while (1) {
536 	ret = P11FUNC(p, FindObjects, (session, &object, 1, &object_count));
537 	if (ret != CKR_OK) {
538 	    return -1;
539 	}
540 	if (object_count == 0)
541 	    break;
542 
543 	for (i = 0; i < num_query; i++)
544 	    query[i].pValue = NULL;
545 
546 	ret = P11FUNC(p, GetAttributeValue,
547 		      (session, object, query, num_query));
548 	if (ret != CKR_OK) {
549 	    return -1;
550 	}
551 	for (i = 0; i < num_query; i++) {
552 	    query[i].pValue = malloc(query[i].ulValueLen);
553 	    if (query[i].pValue == NULL) {
554 		ret = ENOMEM;
555 		goto out;
556 	    }
557 	}
558 	ret = P11FUNC(p, GetAttributeValue,
559 		      (session, object, query, num_query));
560 	if (ret != CKR_OK) {
561 	    ret = -1;
562 	    goto out;
563 	}
564 
565 	ret = (*func)(context, p, slot, session, object, ptr, query, num_query);
566 	if (ret)
567 	    goto out;
568 
569 	for (i = 0; i < num_query; i++) {
570 	    if (query[i].pValue)
571 		free(query[i].pValue);
572 	    query[i].pValue = NULL;
573 	}
574     }
575  out:
576 
577     for (i = 0; i < num_query; i++) {
578 	if (query[i].pValue)
579 	    free(query[i].pValue);
580 	query[i].pValue = NULL;
581     }
582 
583     ret2 = P11FUNC(p, FindObjectsFinal, (session));
584     if (ret2 != CKR_OK) {
585 	return ret2;
586     }
587 
588     return ret;
589 }
590 
591 static BIGNUM *
592 getattr_bn(struct p11_module *p,
593 	   struct p11_slot *slot,
594 	   CK_SESSION_HANDLE session,
595 	   CK_OBJECT_HANDLE object,
596 	   unsigned int type)
597 {
598     CK_ATTRIBUTE query;
599     BIGNUM *bn;
600     int ret;
601 
602     query.type = type;
603     query.pValue = NULL;
604     query.ulValueLen = 0;
605 
606     ret = P11FUNC(p, GetAttributeValue,
607 		  (session, object, &query, 1));
608     if (ret != CKR_OK)
609 	return NULL;
610 
611     query.pValue = malloc(query.ulValueLen);
612 
613     ret = P11FUNC(p, GetAttributeValue,
614 		  (session, object, &query, 1));
615     if (ret != CKR_OK) {
616 	free(query.pValue);
617 	return NULL;
618     }
619     bn = BN_bin2bn(query.pValue, query.ulValueLen, NULL);
620     free(query.pValue);
621 
622     return bn;
623 }
624 
625 static int
626 collect_private_key(hx509_context context,
627 		    struct p11_module *p, struct p11_slot *slot,
628 		    CK_SESSION_HANDLE session,
629 		    CK_OBJECT_HANDLE object,
630 		    void *ptr, CK_ATTRIBUTE *query, int num_query)
631 {
632     struct hx509_collector *collector = ptr;
633     hx509_private_key key;
634     heim_octet_string localKeyId;
635     int ret;
636     const RSA_METHOD *meth;
637     BIGNUM *n, *e;
638     RSA *rsa;
639     struct p11_rsa *p11rsa;
640 
641     localKeyId.data = query[0].pValue;
642     localKeyId.length = query[0].ulValueLen;
643 
644     ret = hx509_private_key_init(&key, NULL, NULL);
645     if (ret)
646 	return ret;
647 
648     rsa = RSA_new();
649     if (rsa == NULL)
650 	_hx509_abort("out of memory");
651 
652     /*
653      * The exponent and modulus should always be present according to
654      * the pkcs11 specification, but some smartcards leaves it out,
655      * let ignore any failure to fetch it.
656      */
657     n = getattr_bn(p, slot, session, object, CKA_MODULUS);
658     e = getattr_bn(p, slot, session, object, CKA_PUBLIC_EXPONENT);
659     if (RSA_set0_key(rsa, n, e, NULL) != 1) {
660 	BN_free(n);
661 	BN_free(e);
662 	RSA_free(rsa);
663 	hx509_private_key_free(&key);
664 	return EINVAL;
665     }
666 
667     p11rsa = calloc(1, sizeof(*p11rsa));
668     if (p11rsa == NULL)
669 	_hx509_abort("out of memory");
670 
671     p11rsa->p = p;
672     p11rsa->slot = slot;
673     p11rsa->private_key = object;
674 
675     if (p->ref == 0)
676 	_hx509_abort("pkcs11 ref == 0 on alloc");
677     p->ref++;
678     if (p->ref == UINT_MAX)
679 	_hx509_abort("pkcs11 ref == UINT_MAX on alloc");
680 
681     meth = get_p11_rsa_pkcs1_method();
682     if (meth == NULL)
683 	_hx509_abort("failed to create RSA method");
684     RSA_set_method(rsa, meth);
685     ret = RSA_set_app_data(rsa, p11rsa);
686     if (ret != 1)
687 	_hx509_abort("RSA_set_app_data");
688 
689     hx509_private_key_assign_rsa(key, rsa);
690 
691     ret = _hx509_collector_private_key_add(context,
692 					   collector,
693 					   hx509_signature_rsa(),
694 					   key,
695 					   NULL,
696 					   &localKeyId);
697 
698     if (ret) {
699 	hx509_private_key_free(&key);
700 	return ret;
701     }
702     return 0;
703 }
704 
705 static void
706 p11_cert_release(hx509_cert cert, void *ctx)
707 {
708     struct p11_module *p = ctx;
709     p11_release_module(p);
710 }
711 
712 
713 static int
714 collect_cert(hx509_context context,
715 	     struct p11_module *p, struct p11_slot *slot,
716 	     CK_SESSION_HANDLE session,
717 	     CK_OBJECT_HANDLE object,
718 	     void *ptr, CK_ATTRIBUTE *query, int num_query)
719 {
720     struct hx509_collector *collector = ptr;
721     hx509_cert cert;
722     int ret;
723 
724     if ((CK_LONG)query[0].ulValueLen == -1 ||
725 	(CK_LONG)query[1].ulValueLen == -1)
726     {
727 	return 0;
728     }
729 
730     ret = hx509_cert_init_data(context, query[1].pValue,
731 			       query[1].ulValueLen, &cert);
732     if (ret)
733 	return ret;
734 
735     if (p->ref == 0)
736 	_hx509_abort("pkcs11 ref == 0 on alloc");
737     p->ref++;
738     if (p->ref == UINT_MAX)
739 	_hx509_abort("pkcs11 ref to high");
740 
741     _hx509_cert_set_release(cert, p11_cert_release, p);
742 
743     {
744 	heim_octet_string data;
745 
746 	data.data = query[0].pValue;
747 	data.length = query[0].ulValueLen;
748 
749 	_hx509_set_cert_attribute(context,
750 				  cert,
751 				  &asn1_oid_id_pkcs_9_at_localKeyId,
752 				  &data);
753     }
754 
755     if ((CK_LONG)query[2].ulValueLen != -1) {
756 	char *str;
757 
758 	asprintf(&str, "%.*s",
759 		 (int)query[2].ulValueLen, (char *)query[2].pValue);
760 	if (str) {
761 	    hx509_cert_set_friendly_name(cert, str);
762 	    free(str);
763 	}
764     }
765 
766     ret = _hx509_collector_certs_add(context, collector, cert);
767     hx509_cert_free(cert);
768 
769     return ret;
770 }
771 
772 
773 static int
774 p11_list_keys(hx509_context context,
775 	      struct p11_module *p,
776 	      struct p11_slot *slot,
777 	      CK_SESSION_HANDLE session,
778 	      hx509_lock lock,
779 	      hx509_certs *certs)
780 {
781     struct hx509_collector *collector;
782     CK_OBJECT_CLASS key_class;
783     CK_ATTRIBUTE search_data[] = {
784 	{CKA_CLASS, NULL, 0},
785     };
786     CK_ATTRIBUTE query_data[3] = {
787 	{CKA_ID, NULL, 0},
788 	{CKA_VALUE, NULL, 0},
789 	{CKA_LABEL, NULL, 0}
790     };
791     int ret;
792 
793     search_data[0].pValue = &key_class;
794     search_data[0].ulValueLen = sizeof(key_class);
795 
796     if (lock == NULL)
797 	lock = _hx509_empty_lock;
798 
799     ret = _hx509_collector_alloc(context, lock, &collector);
800     if (ret)
801 	return ret;
802 
803     key_class = CKO_PRIVATE_KEY;
804     ret = iterate_entries(context, p, slot, session,
805 			  search_data, 1,
806 			  query_data, 1,
807 			  collect_private_key, collector);
808     if (ret)
809 	goto out;
810 
811     key_class = CKO_CERTIFICATE;
812     ret = iterate_entries(context, p, slot, session,
813 			  search_data, 1,
814 			  query_data, 3,
815 			  collect_cert, collector);
816     if (ret)
817 	goto out;
818 
819     ret = _hx509_collector_collect_certs(context, collector, &slot->certs);
820 
821 out:
822     _hx509_collector_free(collector);
823 
824     return ret;
825 }
826 
827 
828 static int
829 p11_init(hx509_context context,
830 	 hx509_certs certs, void **data, int flags,
831 	 const char *residue, hx509_lock lock)
832 {
833     CK_C_GetFunctionList getFuncs;
834     struct p11_module *p;
835     char *list, *str;
836     int ret;
837 
838     *data = NULL;
839 
840     list = strdup(residue);
841     if (list == NULL)
842 	return ENOMEM;
843 
844     p = calloc(1, sizeof(*p));
845     if (p == NULL) {
846 	free(list);
847 	return ENOMEM;
848     }
849 
850     p->ref = 1;
851 
852     str = strchr(list, ',');
853     if (str)
854 	*str++ = '\0';
855     while (str) {
856 	char *strnext;
857 	strnext = strchr(str, ',');
858 	if (strnext)
859 	    *strnext++ = '\0';
860 #if 0
861 	if (strncasecmp(str, "slot=", 5) == 0)
862 	    p->selected_slot = atoi(str + 5);
863 #endif
864 	str = strnext;
865     }
866 
867     p->dl_handle = dlopen(list, RTLD_NOW);
868     free(list);
869     if (p->dl_handle == NULL) {
870 	ret = HX509_PKCS11_LOAD;
871 	hx509_set_error_string(context, 0, ret,
872 			       "Failed to open %s: %s", list, dlerror());
873 	goto out;
874     }
875 
876     getFuncs = (CK_C_GetFunctionList) dlsym(p->dl_handle, "C_GetFunctionList");
877     if (getFuncs == NULL) {
878 	ret = HX509_PKCS11_LOAD;
879 	hx509_set_error_string(context, 0, ret,
880 			       "C_GetFunctionList missing in %s: %s",
881 			       list, dlerror());
882 	goto out;
883     }
884 
885     ret = (*getFuncs)(&p->funcs);
886     if (ret) {
887 	ret = HX509_PKCS11_LOAD;
888 	hx509_set_error_string(context, 0, ret,
889 			       "C_GetFunctionList failed in %s", list);
890 	goto out;
891     }
892 
893     ret = P11FUNC(p, Initialize, (NULL_PTR));
894     if (ret != CKR_OK) {
895 	ret = HX509_PKCS11_TOKEN_CONFUSED;
896 	hx509_set_error_string(context, 0, ret,
897 			       "Failed initialize the PKCS11 module");
898 	goto out;
899     }
900 
901     ret = P11FUNC(p, GetSlotList, (FALSE, NULL, &p->num_slots));
902     if (ret) {
903 	ret = HX509_PKCS11_TOKEN_CONFUSED;
904 	hx509_set_error_string(context, 0, ret,
905 			       "Failed to get number of PKCS11 slots");
906 	goto out;
907     }
908 
909    if (p->num_slots == 0) {
910 	ret = HX509_PKCS11_NO_SLOT;
911 	hx509_set_error_string(context, 0, ret,
912 			       "Selected PKCS11 module have no slots");
913 	goto out;
914    }
915 
916 
917     {
918 	CK_SLOT_ID_PTR slot_ids;
919 	int num_tokens = 0;
920 	size_t i;
921 
922 	slot_ids = malloc(p->num_slots * sizeof(*slot_ids));
923 	if (slot_ids == NULL) {
924 	    hx509_clear_error_string(context);
925 	    ret = ENOMEM;
926 	    goto out;
927 	}
928 
929 	ret = P11FUNC(p, GetSlotList, (FALSE, slot_ids, &p->num_slots));
930 	if (ret) {
931 	    free(slot_ids);
932 	    hx509_set_error_string(context, 0, HX509_PKCS11_TOKEN_CONFUSED,
933 				   "Failed getting slot-list from "
934 				   "PKCS11 module");
935 	    ret = HX509_PKCS11_TOKEN_CONFUSED;
936 	    goto out;
937 	}
938 
939 	p->slot = calloc(p->num_slots, sizeof(p->slot[0]));
940 	if (p->slot == NULL) {
941 	    free(slot_ids);
942 	    hx509_set_error_string(context, 0, ENOMEM,
943 				   "Failed to get memory for slot-list");
944 	    ret = ENOMEM;
945 	    goto out;
946 	}
947 
948 	for (i = 0; i < p->num_slots; i++) {
949 	    ret = p11_init_slot(context, p, lock, slot_ids[i], i, &p->slot[i]);
950 	    if (ret)
951 		break;
952 	    if (p->slot[i].flags & P11_TOKEN_PRESENT)
953 		num_tokens++;
954 	}
955 	free(slot_ids);
956 	if (ret)
957 	    goto out;
958 	if (num_tokens == 0) {
959 	    ret = HX509_PKCS11_NO_TOKEN;
960 	    goto out;
961 	}
962     }
963 
964     *data = p;
965 
966     return 0;
967  out:
968     p11_release_module(p);
969     return ret;
970 }
971 
972 static void
973 p11_release_module(struct p11_module *p)
974 {
975     size_t i;
976 
977     if (p->ref == 0)
978 	_hx509_abort("pkcs11 ref to low");
979     if (--p->ref > 0)
980 	return;
981 
982     for (i = 0; i < p->num_slots; i++) {
983 	if (p->slot[i].flags & P11_SESSION_IN_USE)
984 	    _hx509_abort("pkcs11 module release while session in use");
985 	if (p->slot[i].flags & P11_SESSION) {
986 	    P11FUNC(p, CloseSession, (p->slot[i].session));
987 	}
988 
989 	if (p->slot[i].name)
990 	    free(p->slot[i].name);
991 	if (p->slot[i].pin) {
992 	    memset(p->slot[i].pin, 0, strlen(p->slot[i].pin));
993 	    free(p->slot[i].pin);
994 	}
995 	if (p->slot[i].mechs.num) {
996 	    free(p->slot[i].mechs.list);
997 
998 	    if (p->slot[i].mechs.infos) {
999 		size_t j;
1000 
1001 		for (j = 0 ; j < p->slot[i].mechs.num ; j++)
1002 		    free(p->slot[i].mechs.infos[j]);
1003 		free(p->slot[i].mechs.infos);
1004 	    }
1005 	}
1006     }
1007     free(p->slot);
1008 
1009     if (p->funcs)
1010 	P11FUNC(p, Finalize, (NULL));
1011 
1012     if (p->dl_handle)
1013 	dlclose(p->dl_handle);
1014 
1015     memset(p, 0, sizeof(*p));
1016     free(p);
1017 }
1018 
1019 static int
1020 p11_free(hx509_certs certs, void *data)
1021 {
1022     struct p11_module *p = data;
1023     size_t i;
1024 
1025     for (i = 0; i < p->num_slots; i++) {
1026 	if (p->slot[i].certs)
1027 	    hx509_certs_free(&p->slot[i].certs);
1028     }
1029     p11_release_module(p);
1030     return 0;
1031 }
1032 
1033 struct p11_cursor {
1034     hx509_certs certs;
1035     void *cursor;
1036 };
1037 
1038 static int
1039 p11_iter_start(hx509_context context,
1040 	       hx509_certs certs, void *data, void **cursor)
1041 {
1042     struct p11_module *p = data;
1043     struct p11_cursor *c;
1044     int ret;
1045     size_t i;
1046 
1047     c = malloc(sizeof(*c));
1048     if (c == NULL) {
1049 	hx509_clear_error_string(context);
1050 	return ENOMEM;
1051     }
1052     ret = hx509_certs_init(context, "MEMORY:pkcs11-iter", 0, NULL, &c->certs);
1053     if (ret) {
1054 	free(c);
1055 	return ret;
1056     }
1057 
1058     for (i = 0 ; i < p->num_slots; i++) {
1059 	if (p->slot[i].certs == NULL)
1060 	    continue;
1061 	ret = hx509_certs_merge(context, c->certs, p->slot[i].certs);
1062 	if (ret) {
1063 	    hx509_certs_free(&c->certs);
1064 	    free(c);
1065 	    return ret;
1066 	}
1067     }
1068 
1069     ret = hx509_certs_start_seq(context, c->certs, &c->cursor);
1070     if (ret) {
1071 	hx509_certs_free(&c->certs);
1072 	free(c);
1073 	return 0;
1074     }
1075     *cursor = c;
1076 
1077     return 0;
1078 }
1079 
1080 static int
1081 p11_iter(hx509_context context,
1082 	 hx509_certs certs, void *data, void *cursor, hx509_cert *cert)
1083 {
1084     struct p11_cursor *c = cursor;
1085     return hx509_certs_next_cert(context, c->certs, c->cursor, cert);
1086 }
1087 
1088 static int
1089 p11_iter_end(hx509_context context,
1090 	     hx509_certs certs, void *data, void *cursor)
1091 {
1092     struct p11_cursor *c = cursor;
1093     int ret;
1094     ret = hx509_certs_end_seq(context, c->certs, c->cursor);
1095     hx509_certs_free(&c->certs);
1096     free(c);
1097     return ret;
1098 }
1099 
1100 #define MECHFLAG(x) { "unknown-flag-" #x, x }
1101 static struct units mechflags[] = {
1102 	MECHFLAG(0x80000000),
1103 	MECHFLAG(0x40000000),
1104 	MECHFLAG(0x20000000),
1105 	MECHFLAG(0x10000000),
1106 	MECHFLAG(0x08000000),
1107 	MECHFLAG(0x04000000),
1108 	{"ec-compress",		0x2000000 },
1109 	{"ec-uncompress",	0x1000000 },
1110 	{"ec-namedcurve",	0x0800000 },
1111 	{"ec-ecparameters",	0x0400000 },
1112 	{"ec-f-2m",		0x0200000 },
1113 	{"ec-f-p",		0x0100000 },
1114 	{"derive",		0x0080000 },
1115 	{"unwrap",		0x0040000 },
1116 	{"wrap",		0x0020000 },
1117 	{"genereate-key-pair",	0x0010000 },
1118 	{"generate",		0x0008000 },
1119 	{"verify-recover",	0x0004000 },
1120 	{"verify",		0x0002000 },
1121 	{"sign-recover",	0x0001000 },
1122 	{"sign",		0x0000800 },
1123 	{"digest",		0x0000400 },
1124 	{"decrypt",		0x0000200 },
1125 	{"encrypt",		0x0000100 },
1126 	MECHFLAG(0x00080),
1127 	MECHFLAG(0x00040),
1128 	MECHFLAG(0x00020),
1129 	MECHFLAG(0x00010),
1130 	MECHFLAG(0x00008),
1131 	MECHFLAG(0x00004),
1132 	MECHFLAG(0x00002),
1133 	{"hw",			0x0000001 },
1134 	{ NULL,			0x0000000 }
1135 };
1136 #undef MECHFLAG
1137 
1138 static int
1139 p11_printinfo(hx509_context context,
1140 	      hx509_certs certs,
1141 	      void *data,
1142 	      int (*func)(void *, const char *),
1143 	      void *ctx)
1144 {
1145     struct p11_module *p = data;
1146     size_t i, j;
1147 
1148     _hx509_pi_printf(func, ctx, "pkcs11 driver with %d slot%s",
1149 		     p->num_slots, p->num_slots > 1 ? "s" : "");
1150 
1151     for (i = 0; i < p->num_slots; i++) {
1152 	struct p11_slot *s = &p->slot[i];
1153 
1154 	_hx509_pi_printf(func, ctx, "slot %d: id: %d name: %s flags: %08x",
1155 			 i, (int)s->id, s->name, s->flags);
1156 
1157 	_hx509_pi_printf(func, ctx, "number of supported mechanisms: %lu",
1158 			 (unsigned long)s->mechs.num);
1159 	for (j = 0; j < s->mechs.num; j++) {
1160 	    const char *mechname = "unknown";
1161 	    char flags[256], unknownname[40];
1162 #define MECHNAME(s,n) case s: mechname = n; break
1163 	    switch(s->mechs.list[j]) {
1164 		MECHNAME(CKM_RSA_PKCS_KEY_PAIR_GEN, "rsa-pkcs-key-pair-gen");
1165 		MECHNAME(CKM_RSA_PKCS, "rsa-pkcs");
1166 		MECHNAME(CKM_RSA_X_509, "rsa-x-509");
1167 		MECHNAME(CKM_MD5_RSA_PKCS, "md5-rsa-pkcs");
1168 		MECHNAME(CKM_SHA1_RSA_PKCS, "sha1-rsa-pkcs");
1169 		MECHNAME(CKM_SHA256_RSA_PKCS, "sha256-rsa-pkcs");
1170 		MECHNAME(CKM_SHA384_RSA_PKCS, "sha384-rsa-pkcs");
1171 		MECHNAME(CKM_SHA512_RSA_PKCS, "sha512-rsa-pkcs");
1172 		MECHNAME(CKM_RIPEMD160_RSA_PKCS, "ripemd160-rsa-pkcs");
1173 		MECHNAME(CKM_RSA_PKCS_OAEP, "rsa-pkcs-oaep");
1174 		MECHNAME(CKM_SHA512_HMAC, "sha512-hmac");
1175 		MECHNAME(CKM_SHA512, "sha512");
1176 		MECHNAME(CKM_SHA384_HMAC, "sha384-hmac");
1177 		MECHNAME(CKM_SHA384, "sha384");
1178 		MECHNAME(CKM_SHA256_HMAC, "sha256-hmac");
1179 		MECHNAME(CKM_SHA256, "sha256");
1180 		MECHNAME(CKM_SHA_1, "sha1");
1181 		MECHNAME(CKM_MD5, "md5");
1182 		MECHNAME(CKM_RIPEMD160, "ripemd-160");
1183 		MECHNAME(CKM_DES_ECB, "des-ecb");
1184 		MECHNAME(CKM_DES_CBC, "des-cbc");
1185 		MECHNAME(CKM_AES_ECB, "aes-ecb");
1186 		MECHNAME(CKM_AES_CBC, "aes-cbc");
1187 		MECHNAME(CKM_DH_PKCS_PARAMETER_GEN, "dh-pkcs-parameter-gen");
1188 	    default:
1189 		snprintf(unknownname, sizeof(unknownname),
1190 			 "unknown-mech-%lu",
1191 			 (unsigned long)s->mechs.list[j]);
1192 		mechname = unknownname;
1193 		break;
1194 	    }
1195 #undef MECHNAME
1196 	    unparse_flags(s->mechs.infos[j]->flags, mechflags,
1197 			  flags, sizeof(flags));
1198 
1199 	    _hx509_pi_printf(func, ctx, "  %s: %s", mechname, flags);
1200 	}
1201     }
1202 
1203     return 0;
1204 }
1205 
1206 static struct hx509_keyset_ops keyset_pkcs11 = {
1207     "PKCS11",
1208     0,
1209     p11_init,
1210     NULL,
1211     p11_free,
1212     NULL,
1213     NULL,
1214     p11_iter_start,
1215     p11_iter,
1216     p11_iter_end,
1217     p11_printinfo
1218 };
1219 
1220 #endif /* HAVE_DLOPEN */
1221 
1222 void
1223 _hx509_ks_pkcs11_register(hx509_context context)
1224 {
1225 #ifdef HAVE_DLOPEN
1226     _hx509_ks_register(context, &keyset_pkcs11);
1227 #endif
1228 }
1229