mirror of
https://gitlab.winehq.org/wine/wine-gecko.git
synced 2024-09-13 09:24:08 -07:00
2347 lines
55 KiB
C
2347 lines
55 KiB
C
/* ***** BEGIN LICENSE BLOCK *****
|
|
* Version: MPL 1.1/GPL 2.0/LGPL 2.1
|
|
*
|
|
* The contents of this file are subject to the Mozilla Public License Version
|
|
* 1.1 (the "License"); you may not use this file except in compliance with
|
|
* the License. You may obtain a copy of the License at
|
|
* http://www.mozilla.org/MPL/
|
|
*
|
|
* Software distributed under the License is distributed on an "AS IS" basis,
|
|
* WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License
|
|
* for the specific language governing rights and limitations under the
|
|
* License.
|
|
*
|
|
* The Original Code is the Netscape security libraries.
|
|
*
|
|
* The Initial Developer of the Original Code is
|
|
* Netscape Communications Corporation.
|
|
* Portions created by the Initial Developer are Copyright (C) 1994-2000
|
|
* the Initial Developer. All Rights Reserved.
|
|
* Portions created by Red Hat, Inc, are Copyright (C) 2005
|
|
*
|
|
* Contributor(s):
|
|
* Bob Relyea (rrelyea@redhat.com)
|
|
*
|
|
* Alternatively, the contents of this file may be used under the terms of
|
|
* either the GNU General Public License Version 2 or later (the "GPL"), or
|
|
* the GNU Lesser General Public License Version 2.1 or later (the "LGPL"),
|
|
* in which case the provisions of the GPL or the LGPL are applicable instead
|
|
* of those above. If you wish to allow use of your version of this file only
|
|
* under the terms of either the GPL or the LGPL, and not to allow others to
|
|
* use your version of this file under the terms of the MPL, indicate your
|
|
* decision by deleting the provisions above and replace them with the notice
|
|
* and other provisions required by the GPL or the LGPL. If you do not delete
|
|
* the provisions above, a recipient may use your version of this file under
|
|
* the terms of any one of the MPL, the GPL or the LGPL.
|
|
*
|
|
* ***** END LICENSE BLOCK ***** */
|
|
#ifdef DEBUG
|
|
static const char CVS_ID[] = "@(#) $RCSfile: cobject.c,v $ $Revision: 1.6 $ $Date: 2009/07/29 20:15:19 $";
|
|
#endif /* DEBUG */
|
|
|
|
#include "ckcapi.h"
|
|
#include "nssbase.h"
|
|
|
|
/*
|
|
* ckcapi/cobject.c
|
|
*
|
|
* This file implements the NSSCKMDObject object for the
|
|
* "nss to capi objects" cryptoki module.
|
|
*/
|
|
|
|
const CK_ATTRIBUTE_TYPE certAttrs[] = {
|
|
CKA_CLASS,
|
|
CKA_TOKEN,
|
|
CKA_PRIVATE,
|
|
CKA_MODIFIABLE,
|
|
CKA_LABEL,
|
|
CKA_CERTIFICATE_TYPE,
|
|
CKA_SUBJECT,
|
|
CKA_ISSUER,
|
|
CKA_SERIAL_NUMBER,
|
|
CKA_VALUE
|
|
};
|
|
const PRUint32 certAttrsCount = NSS_CKCAPI_ARRAY_SIZE(certAttrs);
|
|
|
|
/* private keys, for now only support RSA */
|
|
const CK_ATTRIBUTE_TYPE privKeyAttrs[] = {
|
|
CKA_CLASS,
|
|
CKA_TOKEN,
|
|
CKA_PRIVATE,
|
|
CKA_MODIFIABLE,
|
|
CKA_LABEL,
|
|
CKA_KEY_TYPE,
|
|
CKA_DERIVE,
|
|
CKA_LOCAL,
|
|
CKA_SUBJECT,
|
|
CKA_SENSITIVE,
|
|
CKA_DECRYPT,
|
|
CKA_SIGN,
|
|
CKA_SIGN_RECOVER,
|
|
CKA_UNWRAP,
|
|
CKA_EXTRACTABLE,
|
|
CKA_ALWAYS_SENSITIVE,
|
|
CKA_NEVER_EXTRACTABLE,
|
|
CKA_MODULUS,
|
|
CKA_PUBLIC_EXPONENT,
|
|
};
|
|
const PRUint32 privKeyAttrsCount = NSS_CKCAPI_ARRAY_SIZE(privKeyAttrs);
|
|
|
|
/* public keys, for now only support RSA */
|
|
const CK_ATTRIBUTE_TYPE pubKeyAttrs[] = {
|
|
CKA_CLASS,
|
|
CKA_TOKEN,
|
|
CKA_PRIVATE,
|
|
CKA_MODIFIABLE,
|
|
CKA_LABEL,
|
|
CKA_KEY_TYPE,
|
|
CKA_DERIVE,
|
|
CKA_LOCAL,
|
|
CKA_SUBJECT,
|
|
CKA_ENCRYPT,
|
|
CKA_VERIFY,
|
|
CKA_VERIFY_RECOVER,
|
|
CKA_WRAP,
|
|
CKA_MODULUS,
|
|
CKA_PUBLIC_EXPONENT,
|
|
};
|
|
const PRUint32 pubKeyAttrsCount = NSS_CKCAPI_ARRAY_SIZE(pubKeyAttrs);
|
|
static const CK_BBOOL ck_true = CK_TRUE;
|
|
static const CK_BBOOL ck_false = CK_FALSE;
|
|
static const CK_CERTIFICATE_TYPE ckc_x509 = CKC_X_509;
|
|
static const CK_KEY_TYPE ckk_rsa = CKK_RSA;
|
|
static const CK_OBJECT_CLASS cko_certificate = CKO_CERTIFICATE;
|
|
static const CK_OBJECT_CLASS cko_private_key = CKO_PRIVATE_KEY;
|
|
static const CK_OBJECT_CLASS cko_public_key = CKO_PUBLIC_KEY;
|
|
static const NSSItem ckcapi_trueItem = {
|
|
(void *)&ck_true, (PRUint32)sizeof(CK_BBOOL) };
|
|
static const NSSItem ckcapi_falseItem = {
|
|
(void *)&ck_false, (PRUint32)sizeof(CK_BBOOL) };
|
|
static const NSSItem ckcapi_x509Item = {
|
|
(void *)&ckc_x509, (PRUint32)sizeof(CK_CERTIFICATE_TYPE) };
|
|
static const NSSItem ckcapi_rsaItem = {
|
|
(void *)&ckk_rsa, (PRUint32)sizeof(CK_KEY_TYPE) };
|
|
static const NSSItem ckcapi_certClassItem = {
|
|
(void *)&cko_certificate, (PRUint32)sizeof(CK_OBJECT_CLASS) };
|
|
static const NSSItem ckcapi_privKeyClassItem = {
|
|
(void *)&cko_private_key, (PRUint32)sizeof(CK_OBJECT_CLASS) };
|
|
static const NSSItem ckcapi_pubKeyClassItem = {
|
|
(void *)&cko_public_key, (PRUint32)sizeof(CK_OBJECT_CLASS) };
|
|
static const NSSItem ckcapi_emptyItem = {
|
|
(void *)&ck_true, 0};
|
|
|
|
/*
|
|
* these are utilities. The chould be moved to a new utilities file.
|
|
*/
|
|
|
|
/*
|
|
* unwrap a single DER value
|
|
*/
|
|
char *
|
|
nss_ckcapi_DERUnwrap
|
|
(
|
|
char *src,
|
|
int size,
|
|
int *outSize,
|
|
char **next
|
|
)
|
|
{
|
|
unsigned char *start = src;
|
|
unsigned char *end = src+size;
|
|
unsigned int len = 0;
|
|
|
|
/* initialize error condition return values */
|
|
*outSize = 0;
|
|
if (next) {
|
|
*next = src;
|
|
}
|
|
|
|
if (size < 2) {
|
|
return start;
|
|
}
|
|
src ++ ; /* skip the tag -- should check it against an expected value! */
|
|
len = (unsigned) *src++;
|
|
if (len & 0x80) {
|
|
int count = len & 0x7f;
|
|
len =0;
|
|
|
|
if (count+2 > size) {
|
|
return start;
|
|
}
|
|
while (count-- > 0) {
|
|
len = (len << 8) | (unsigned) *src++;
|
|
}
|
|
}
|
|
if (len + ((unsigned char *)src-start) > (unsigned int)size) {
|
|
return start;
|
|
}
|
|
if (next) {
|
|
*next = src+len;
|
|
}
|
|
*outSize = len;
|
|
|
|
return src;
|
|
}
|
|
|
|
/*
|
|
* convert a PKCS #11 bytestrin into a CK_ULONG, the byte stream must be
|
|
* less than sizeof (CK_ULONG).
|
|
*/
|
|
CK_ULONG
|
|
nss_ckcapi_DataToInt
|
|
(
|
|
NSSItem *data,
|
|
CK_RV *pError
|
|
)
|
|
{
|
|
CK_ULONG value = 0;
|
|
unsigned long count = data->size;
|
|
unsigned char *dataPtr = data->data;
|
|
unsigned long size = 0;
|
|
|
|
*pError = CKR_OK;
|
|
|
|
while (count--) {
|
|
value = value << 8;
|
|
value = value + *dataPtr++;
|
|
if (size || value) {
|
|
size++;
|
|
}
|
|
}
|
|
if (size > sizeof(CK_ULONG)) {
|
|
*pError = CKR_ATTRIBUTE_VALUE_INVALID;
|
|
}
|
|
return value;
|
|
}
|
|
|
|
/*
|
|
* convert a CK_ULONG to a bytestream. Data is stored in the buffer 'buf'
|
|
* and must be at least CK_ULONG. Caller must provide buf.
|
|
*/
|
|
CK_ULONG
|
|
nss_ckcapi_IntToData
|
|
(
|
|
CK_ULONG value,
|
|
NSSItem *data,
|
|
unsigned char *dataPtr,
|
|
CK_RV *pError
|
|
)
|
|
{
|
|
unsigned long count = 0;
|
|
unsigned long i;
|
|
#define SHIFT ((sizeof(CK_ULONG)-1)*8)
|
|
PRBool first = 0;
|
|
|
|
*pError = CKR_OK;
|
|
|
|
data->data = dataPtr;
|
|
for (i=0; i < sizeof(CK_ULONG); i++) {
|
|
unsigned char digit = (unsigned char)((value >> SHIFT) & 0xff);
|
|
|
|
value = value << 8;
|
|
|
|
/* drop leading zero bytes */
|
|
if (first && (0 == digit)) {
|
|
continue;
|
|
}
|
|
*dataPtr++ = digit;
|
|
count++;
|
|
}
|
|
data->size = count;
|
|
return count;
|
|
}
|
|
|
|
/*
|
|
* get an attribute from a template. Value is returned in NSS item.
|
|
* data for the item is owned by the template.
|
|
*/
|
|
CK_RV
|
|
nss_ckcapi_GetAttribute
|
|
(
|
|
CK_ATTRIBUTE_TYPE type,
|
|
CK_ATTRIBUTE *template,
|
|
CK_ULONG templateSize,
|
|
NSSItem *item
|
|
)
|
|
{
|
|
CK_ULONG i;
|
|
|
|
for (i=0; i < templateSize; i++) {
|
|
if (template[i].type == type) {
|
|
item->data = template[i].pValue;
|
|
item->size = template[i].ulValueLen;
|
|
return CKR_OK;
|
|
}
|
|
}
|
|
return CKR_TEMPLATE_INCOMPLETE;
|
|
}
|
|
|
|
/*
|
|
* get an attribute which is type CK_ULONG.
|
|
*/
|
|
CK_ULONG
|
|
nss_ckcapi_GetULongAttribute
|
|
(
|
|
CK_ATTRIBUTE_TYPE type,
|
|
CK_ATTRIBUTE *template,
|
|
CK_ULONG templateSize,
|
|
CK_RV *pError
|
|
)
|
|
{
|
|
NSSItem item;
|
|
|
|
*pError = nss_ckcapi_GetAttribute(type, template, templateSize, &item);
|
|
if (CKR_OK != *pError) {
|
|
return (CK_ULONG) 0;
|
|
}
|
|
if (item.size != sizeof(CK_ULONG)) {
|
|
*pError = CKR_ATTRIBUTE_VALUE_INVALID;
|
|
return (CK_ULONG) 0;
|
|
}
|
|
return *(CK_ULONG *)item.data;
|
|
}
|
|
|
|
/*
|
|
* get an attribute which is type CK_BBOOL.
|
|
*/
|
|
CK_BBOOL
|
|
nss_ckcapi_GetBoolAttribute
|
|
(
|
|
CK_ATTRIBUTE_TYPE type,
|
|
CK_ATTRIBUTE *template,
|
|
CK_ULONG templateSize,
|
|
CK_RV *pError
|
|
)
|
|
{
|
|
NSSItem item;
|
|
|
|
*pError = nss_ckcapi_GetAttribute(type, template, templateSize, &item);
|
|
if (CKR_OK != *pError) {
|
|
return (CK_BBOOL) 0;
|
|
}
|
|
if (item.size != sizeof(CK_BBOOL)) {
|
|
*pError = CKR_ATTRIBUTE_VALUE_INVALID;
|
|
return (CK_BBOOL) 0;
|
|
}
|
|
return *(CK_BBOOL *)item.data;
|
|
}
|
|
|
|
/*
|
|
* get an attribute which is type CK_BBOOL.
|
|
*/
|
|
char *
|
|
nss_ckcapi_GetStringAttribute
|
|
(
|
|
CK_ATTRIBUTE_TYPE type,
|
|
CK_ATTRIBUTE *template,
|
|
CK_ULONG templateSize,
|
|
CK_RV *pError
|
|
)
|
|
{
|
|
NSSItem item;
|
|
char *str;
|
|
|
|
/* get the attribute */
|
|
*pError = nss_ckcapi_GetAttribute(type, template, templateSize, &item);
|
|
if (CKR_OK != *pError) {
|
|
return (char *)NULL;
|
|
}
|
|
/* make sure it is null terminated */
|
|
str = nss_ZNEWARRAY(NULL, char, item.size+1);
|
|
if ((char *)NULL == str) {
|
|
*pError = CKR_HOST_MEMORY;
|
|
return (char *)NULL;
|
|
}
|
|
|
|
nsslibc_memcpy(str, item.data, item.size);
|
|
str[item.size] = 0;
|
|
|
|
return str;
|
|
}
|
|
|
|
/*
|
|
* Return the size in bytes of a wide string
|
|
*/
|
|
int
|
|
nss_ckcapi_WideSize
|
|
(
|
|
LPCWSTR wide
|
|
)
|
|
{
|
|
DWORD size;
|
|
|
|
if ((LPWSTR)NULL == wide) {
|
|
return 0;
|
|
}
|
|
size = wcslen(wide)+1;
|
|
return size*2;
|
|
}
|
|
|
|
/*
|
|
* Covert a Unicode wide character string to a UTF8 string
|
|
*/
|
|
char *
|
|
nss_ckcapi_WideToUTF8
|
|
(
|
|
LPCWSTR wide
|
|
)
|
|
{
|
|
DWORD len;
|
|
DWORD size;
|
|
char *buf;
|
|
|
|
if ((LPWSTR)NULL == wide) {
|
|
return (char *)NULL;
|
|
}
|
|
|
|
len = nss_ckcapi_WideSize(wide);
|
|
|
|
size = WideCharToMultiByte(CP_UTF8, 0, wide, len, NULL, 0, NULL, 0);
|
|
if (size == 0) {
|
|
return (char *)NULL;
|
|
}
|
|
buf = nss_ZNEWARRAY(NULL, char, size);
|
|
size = WideCharToMultiByte(CP_UTF8, 0, wide, len, buf, size, NULL, 0);
|
|
if (size == 0) {
|
|
nss_ZFreeIf(buf);
|
|
return (char *)NULL;
|
|
}
|
|
return buf;
|
|
}
|
|
|
|
/*
|
|
* Return a Wide String duplicated with nss allocated memory.
|
|
*/
|
|
LPWSTR
|
|
nss_ckcapi_WideDup
|
|
(
|
|
LPCWSTR wide
|
|
)
|
|
{
|
|
DWORD len = nss_ckcapi_WideSize(wide);
|
|
LPWSTR buf;
|
|
|
|
if ((LPWSTR)NULL == wide) {
|
|
return (LPWSTR)NULL;
|
|
}
|
|
|
|
len = nss_ckcapi_WideSize(wide);
|
|
|
|
buf = (LPWSTR) nss_ZNEWARRAY(NULL, char, len);
|
|
if ((LPWSTR) NULL == buf) {
|
|
return buf;
|
|
}
|
|
nsslibc_memcpy(buf, wide, len);
|
|
return buf;
|
|
}
|
|
|
|
/*
|
|
* Covert a UTF8 string to Unicode wide character
|
|
*/
|
|
LPWSTR
|
|
nss_ckcapi_UTF8ToWide
|
|
(
|
|
char *buf
|
|
)
|
|
{
|
|
DWORD size;
|
|
DWORD len = strlen(buf)+1;
|
|
LPWSTR wide;
|
|
|
|
if ((char *)NULL == buf) {
|
|
return (LPWSTR) NULL;
|
|
}
|
|
|
|
len = strlen(buf)+1;
|
|
|
|
size = MultiByteToWideChar(CP_UTF8, 0, buf, len, NULL, 0);
|
|
if (size == 0) {
|
|
return (LPWSTR) NULL;
|
|
}
|
|
wide = nss_ZNEWARRAY(NULL, WCHAR, size);
|
|
size = MultiByteToWideChar(CP_UTF8, 0, buf, len, wide, size);
|
|
if (size == 0) {
|
|
nss_ZFreeIf(wide);
|
|
return (LPWSTR) NULL;
|
|
}
|
|
return wide;
|
|
}
|
|
|
|
|
|
/*
|
|
* keep all the knowlege of how the internalObject is laid out in this function
|
|
*
|
|
* nss_ckcapi_FetchKeyContainer
|
|
*
|
|
* fetches the Provider container and info as well as a key handle for a
|
|
* private key. If something other than a private key is passed in,
|
|
* this function fails with CKR_KEY_TYPE_INCONSISTENT
|
|
*/
|
|
NSS_EXTERN CK_RV
|
|
nss_ckcapi_FetchKeyContainer
|
|
(
|
|
ckcapiInternalObject *iKey,
|
|
HCRYPTPROV *hProv,
|
|
DWORD *keySpec,
|
|
HCRYPTKEY *hKey
|
|
)
|
|
{
|
|
ckcapiCertObject *co;
|
|
ckcapiKeyObject *ko;
|
|
BOOL rc, dummy;
|
|
DWORD msError;
|
|
|
|
|
|
switch (iKey->type) {
|
|
default:
|
|
case ckcapiRaw:
|
|
/* can't have raw private keys */
|
|
return CKR_KEY_TYPE_INCONSISTENT;
|
|
case ckcapiCert:
|
|
if (iKey->objClass != CKO_PRIVATE_KEY) {
|
|
/* Only private keys have private key provider handles */
|
|
return CKR_KEY_TYPE_INCONSISTENT;
|
|
}
|
|
co = &iKey->u.cert;
|
|
|
|
/* OK, get the Provider */
|
|
rc = CryptAcquireCertificatePrivateKey(co->certContext,
|
|
CRYPT_ACQUIRE_CACHE_FLAG|CRYPT_ACQUIRE_COMPARE_KEY_FLAG, NULL, hProv,
|
|
keySpec, &dummy);
|
|
if (!rc) {
|
|
goto loser;
|
|
}
|
|
break;
|
|
case ckcapiBareKey:
|
|
if (iKey->objClass != CKO_PRIVATE_KEY) {
|
|
/* Only private keys have private key provider handles */
|
|
return CKR_KEY_TYPE_INCONSISTENT;
|
|
}
|
|
ko = &iKey->u.key;
|
|
|
|
/* OK, get the Provider */
|
|
if (0 == ko->hProv) {
|
|
rc = CryptAcquireContext(hProv,
|
|
ko->containerName,
|
|
ko->provName,
|
|
ko->provInfo.dwProvType , 0);
|
|
if (!rc) {
|
|
goto loser;
|
|
}
|
|
} else {
|
|
*hProv = ko->hProv;
|
|
}
|
|
*keySpec = ko->provInfo.dwKeySpec;
|
|
break;
|
|
}
|
|
|
|
/* and get the crypto handle */
|
|
rc = CryptGetUserKey(*hProv, *keySpec, hKey);
|
|
if (!rc) {
|
|
goto loser;
|
|
}
|
|
return CKR_OK;
|
|
loser:
|
|
/* map the microsoft error before leaving */
|
|
msError = GetLastError();
|
|
switch (msError) {
|
|
case ERROR_INVALID_HANDLE:
|
|
case ERROR_INVALID_PARAMETER:
|
|
case NTE_BAD_KEY:
|
|
case NTE_NO_KEY:
|
|
case NTE_BAD_PUBLIC_KEY:
|
|
case NTE_BAD_KEYSET:
|
|
case NTE_KEYSET_NOT_DEF:
|
|
return CKR_KEY_TYPE_INCONSISTENT;
|
|
case NTE_BAD_UID:
|
|
case NTE_KEYSET_ENTRY_BAD:
|
|
return CKR_DEVICE_ERROR;
|
|
}
|
|
return CKR_GENERAL_ERROR;
|
|
}
|
|
|
|
|
|
/*
|
|
* take a DER PUBLIC Key block and return the modulus and exponent
|
|
*/
|
|
static void
|
|
ckcapi_CertPopulateModulusExponent
|
|
(
|
|
ckcapiInternalObject *io
|
|
)
|
|
{
|
|
ckcapiKeyParams *kp = &io->u.cert.key;
|
|
PCCERT_CONTEXT certContext = io->u.cert.certContext;
|
|
char *pkData = certContext->pCertInfo->SubjectPublicKeyInfo.PublicKey.pbData;
|
|
CK_ULONG size= certContext->pCertInfo->SubjectPublicKeyInfo.PublicKey.cbData;
|
|
CK_ULONG newSize;
|
|
char *ptr, *newptr;
|
|
|
|
/* find the start of the modulus -- this will not give good results if
|
|
* the key isn't an rsa key! */
|
|
ptr = nss_ckcapi_DERUnwrap(pkData, size, &newSize, NULL);
|
|
kp->modulus.data = nss_ckcapi_DERUnwrap(ptr, newSize,
|
|
&kp->modulus.size, &newptr);
|
|
/* changed from signed to unsigned int */
|
|
if (0 == *(char *)kp->modulus.data) {
|
|
kp->modulus.data = ((char *)kp->modulus.data)+1;
|
|
kp->modulus.size = kp->modulus.size - 1;
|
|
}
|
|
/* changed from signed to unsigned int */
|
|
kp->exponent.data = nss_ckcapi_DERUnwrap(newptr, (newptr-ptr)+newSize,
|
|
&kp->exponent.size, NULL);
|
|
if (0 == *(char *)kp->exponent.data) {
|
|
kp->exponent.data = ((char *)kp->exponent.data)+1;
|
|
kp->exponent.size = kp->exponent.size - 1;
|
|
}
|
|
return;
|
|
}
|
|
|
|
typedef struct _CAPI_RSA_KEY_BLOB {
|
|
PUBLICKEYSTRUC header;
|
|
RSAPUBKEY rsa;
|
|
char data[1];
|
|
} CAPI_RSA_KEY_BLOB;
|
|
|
|
#define CAPI_MODULUS_OFFSET(modSize) 0
|
|
#define CAPI_PRIME_1_OFFSET(modSize) (modSize)
|
|
#define CAPI_PRIME_2_OFFSET(modSize) ((modSize)+(modSize)/2)
|
|
#define CAPI_EXPONENT_1_OFFSET(modSize) ((modSize)*2)
|
|
#define CAPI_EXPONENT_2_OFFSET(modSize) ((modSize)*2+(modSize)/2)
|
|
#define CAPI_COEFFICIENT_OFFSET(modSize) ((modSize)*3)
|
|
#define CAPI_PRIVATE_EXP_OFFSET(modSize) ((modSize)*3+(modSize)/2)
|
|
|
|
void
|
|
ckcapi_FetchPublicKey
|
|
(
|
|
ckcapiInternalObject *io
|
|
)
|
|
{
|
|
ckcapiKeyParams *kp;
|
|
HCRYPTPROV hProv;
|
|
DWORD keySpec;
|
|
HCRYPTKEY hKey = 0;
|
|
CK_RV error;
|
|
DWORD bufLen;
|
|
BOOL rc;
|
|
unsigned long modulus;
|
|
char *buf = NULL;
|
|
CAPI_RSA_KEY_BLOB *blob;
|
|
|
|
error = nss_ckcapi_FetchKeyContainer(io, &hProv, &keySpec, &hKey);
|
|
if (CKR_OK != error) {
|
|
goto loser;
|
|
}
|
|
kp = (ckcapiCert == io->type) ? &io->u.cert.key : &io->u.key.key;
|
|
|
|
rc = CryptExportKey(hKey, 0, PUBLICKEYBLOB, 0, buf, &bufLen);
|
|
if (!rc) {
|
|
goto loser;
|
|
}
|
|
buf = nss_ZNEWARRAY(NULL, char, bufLen);
|
|
rc = CryptExportKey(hKey, 0, PUBLICKEYBLOB, 0, buf, &bufLen);
|
|
if (!rc) {
|
|
goto loser;
|
|
}
|
|
/* validate the blob */
|
|
blob = (CAPI_RSA_KEY_BLOB *)buf;
|
|
if ((PUBLICKEYBLOB != blob->header.bType) ||
|
|
(0x02 != blob->header.bVersion) ||
|
|
(0x31415352 != blob->rsa.magic)) {
|
|
goto loser;
|
|
}
|
|
modulus = blob->rsa.bitlen/8;
|
|
kp->pubKey = buf;
|
|
buf = NULL;
|
|
|
|
kp->modulus.data = &blob->data[CAPI_MODULUS_OFFSET(modulus)];
|
|
kp->modulus.size = modulus;
|
|
ckcapi_ReverseData(&kp->modulus);
|
|
nss_ckcapi_IntToData(blob->rsa.pubexp, &kp->exponent,
|
|
kp->publicExponentData, &error);
|
|
|
|
loser:
|
|
nss_ZFreeIf(buf);
|
|
if (0 != hKey) {
|
|
CryptDestroyKey(hKey);
|
|
}
|
|
return;
|
|
}
|
|
|
|
void
|
|
ckcapi_FetchPrivateKey
|
|
(
|
|
ckcapiInternalObject *io
|
|
)
|
|
{
|
|
ckcapiKeyParams *kp;
|
|
HCRYPTPROV hProv;
|
|
DWORD keySpec;
|
|
HCRYPTKEY hKey = 0;
|
|
CK_RV error;
|
|
DWORD bufLen;
|
|
BOOL rc;
|
|
unsigned long modulus;
|
|
char *buf = NULL;
|
|
CAPI_RSA_KEY_BLOB *blob;
|
|
|
|
error = nss_ckcapi_FetchKeyContainer(io, &hProv, &keySpec, &hKey);
|
|
if (CKR_OK != error) {
|
|
goto loser;
|
|
}
|
|
kp = (ckcapiCert == io->type) ? &io->u.cert.key : &io->u.key.key;
|
|
|
|
rc = CryptExportKey(hKey, 0, PRIVATEKEYBLOB, 0, buf, &bufLen);
|
|
if (!rc) {
|
|
goto loser;
|
|
}
|
|
buf = nss_ZNEWARRAY(NULL, char, bufLen);
|
|
rc = CryptExportKey(hKey, 0, PRIVATEKEYBLOB, 0, buf, &bufLen);
|
|
if (!rc) {
|
|
goto loser;
|
|
}
|
|
/* validate the blob */
|
|
blob = (CAPI_RSA_KEY_BLOB *)buf;
|
|
if ((PRIVATEKEYBLOB != blob->header.bType) ||
|
|
(0x02 != blob->header.bVersion) ||
|
|
(0x32415352 != blob->rsa.magic)) {
|
|
goto loser;
|
|
}
|
|
modulus = blob->rsa.bitlen/8;
|
|
kp->privateKey = buf;
|
|
buf = NULL;
|
|
|
|
kp->privateExponent.data = &blob->data[CAPI_PRIVATE_EXP_OFFSET(modulus)];
|
|
kp->privateExponent.size = modulus;
|
|
ckcapi_ReverseData(&kp->privateExponent);
|
|
kp->prime1.data = &blob->data[CAPI_PRIME_1_OFFSET(modulus)];
|
|
kp->prime1.size = modulus/2;
|
|
ckcapi_ReverseData(&kp->prime1);
|
|
kp->prime2.data = &blob->data[CAPI_PRIME_2_OFFSET(modulus)];
|
|
kp->prime2.size = modulus/2;
|
|
ckcapi_ReverseData(&kp->prime2);
|
|
kp->exponent1.data = &blob->data[CAPI_EXPONENT_1_OFFSET(modulus)];
|
|
kp->exponent1.size = modulus/2;
|
|
ckcapi_ReverseData(&kp->exponent1);
|
|
kp->exponent2.data = &blob->data[CAPI_EXPONENT_2_OFFSET(modulus)];
|
|
kp->exponent2.size = modulus/2;
|
|
ckcapi_ReverseData(&kp->exponent2);
|
|
kp->coefficient.data = &blob->data[CAPI_COEFFICIENT_OFFSET(modulus)];
|
|
kp->coefficient.size = modulus/2;
|
|
ckcapi_ReverseData(&kp->coefficient);
|
|
|
|
loser:
|
|
nss_ZFreeIf(buf);
|
|
if (0 != hKey) {
|
|
CryptDestroyKey(hKey);
|
|
}
|
|
return;
|
|
}
|
|
|
|
|
|
void
|
|
ckcapi_PopulateModulusExponent
|
|
(
|
|
ckcapiInternalObject *io
|
|
)
|
|
{
|
|
if (ckcapiCert == io->type) {
|
|
ckcapi_CertPopulateModulusExponent(io);
|
|
} else {
|
|
ckcapi_FetchPublicKey(io);
|
|
}
|
|
return;
|
|
}
|
|
|
|
/*
|
|
* fetch the friendly name attribute.
|
|
* can only be called with ckcapiCert type objects!
|
|
*/
|
|
void
|
|
ckcapi_FetchLabel
|
|
(
|
|
ckcapiInternalObject *io
|
|
)
|
|
{
|
|
ckcapiCertObject *co = &io->u.cert;
|
|
char *label;
|
|
PCCERT_CONTEXT certContext = io->u.cert.certContext;
|
|
char labelDataUTF16[128];
|
|
DWORD size = sizeof(labelDataUTF16);
|
|
DWORD size8 = sizeof(co->labelData);
|
|
BOOL rv;
|
|
|
|
rv = CertGetCertificateContextProperty(certContext,
|
|
CERT_FRIENDLY_NAME_PROP_ID, labelDataUTF16, &size);
|
|
if (rv) {
|
|
co->labelData = nss_ckcapi_WideToUTF8((LPCWSTR)labelDataUTF16);
|
|
if ((CHAR *)NULL == co->labelData) {
|
|
rv = 0;
|
|
} else {
|
|
size = strlen(co->labelData);
|
|
}
|
|
}
|
|
label = co->labelData;
|
|
/* we are presuming a user cert, make sure it has a nickname, even if
|
|
* Microsoft never gave it one */
|
|
if (!rv && co->hasID) {
|
|
DWORD mserror = GetLastError();
|
|
#define DEFAULT_NICKNAME "no Microsoft nickname"
|
|
label = DEFAULT_NICKNAME;
|
|
size = sizeof(DEFAULT_NICKNAME);
|
|
rv = 1;
|
|
}
|
|
|
|
if (rv) {
|
|
co->label.data = label;
|
|
co->label.size = size;
|
|
}
|
|
return;
|
|
}
|
|
|
|
void
|
|
ckcapi_FetchSerial
|
|
(
|
|
ckcapiInternalObject *io
|
|
)
|
|
{
|
|
ckcapiCertObject *co = &io->u.cert;
|
|
PCCERT_CONTEXT certContext = io->u.cert.certContext;
|
|
DWORD size = sizeof(co->derSerial);
|
|
|
|
BOOL rc = CryptEncodeObject(X509_ASN_ENCODING,
|
|
X509_MULTI_BYTE_INTEGER,
|
|
&certContext->pCertInfo->SerialNumber,
|
|
co->derSerial,
|
|
&size);
|
|
if (rc) {
|
|
co->serial.data = co->derSerial;
|
|
co->serial.size = size;
|
|
}
|
|
return;
|
|
}
|
|
|
|
/*
|
|
* fetch the key ID.
|
|
*/
|
|
void
|
|
ckcapi_FetchID
|
|
(
|
|
ckcapiInternalObject *io
|
|
)
|
|
{
|
|
PCCERT_CONTEXT certContext = io->u.cert.certContext;
|
|
DWORD size = 0;
|
|
BOOL rc;
|
|
|
|
rc = CertGetCertificateContextProperty(certContext,
|
|
CERT_KEY_IDENTIFIER_PROP_ID, NULL, &size);
|
|
if (!rc) {
|
|
return;
|
|
}
|
|
io->idData = nss_ZNEWARRAY(NULL, char, size);
|
|
if (io->idData == NULL) {
|
|
return;
|
|
}
|
|
|
|
rc = CertGetCertificateContextProperty(certContext,
|
|
CERT_KEY_IDENTIFIER_PROP_ID, io->idData, &size);
|
|
if (!rc) {
|
|
nss_ZFreeIf(io->idData);
|
|
io->idData = NULL;
|
|
return;
|
|
}
|
|
io->id.data = io->idData;
|
|
io->id.size = size;
|
|
return;
|
|
}
|
|
|
|
/*
|
|
* fetch the hash key.
|
|
*/
|
|
void
|
|
ckcapi_CertFetchHashKey
|
|
(
|
|
ckcapiInternalObject *io
|
|
)
|
|
{
|
|
ckcapiCertObject *co = &io->u.cert;
|
|
PCCERT_CONTEXT certContext = io->u.cert.certContext;
|
|
DWORD size = certContext->cbCertEncoded;
|
|
DWORD max = sizeof(io->hashKeyData)-1;
|
|
DWORD offset = 0;
|
|
|
|
/* make sure we don't over flow. NOTE: cutting the top of a cert is
|
|
* not a big issue because the signature for will be unique for the cert */
|
|
if (size > max) {
|
|
offset = size - max;
|
|
size = max;
|
|
}
|
|
|
|
nsslibc_memcpy(io->hashKeyData,certContext->pbCertEncoded+offset, size);
|
|
io->hashKeyData[size] = (char)(io->objClass & 0xff);
|
|
|
|
io->hashKey.data = io->hashKeyData;
|
|
io->hashKey.size = size+1;
|
|
return;
|
|
}
|
|
|
|
/*
|
|
* fetch the hash key.
|
|
*/
|
|
void
|
|
ckcapi_KeyFetchHashKey
|
|
(
|
|
ckcapiInternalObject *io
|
|
)
|
|
{
|
|
ckcapiKeyObject *ko = &io->u.key;
|
|
DWORD size;
|
|
DWORD max = sizeof(io->hashKeyData)-2;
|
|
DWORD offset = 0;
|
|
DWORD provLen = strlen(ko->provName);
|
|
DWORD containerLen = strlen(ko->containerName);
|
|
|
|
|
|
size = provLen + containerLen;
|
|
|
|
/* make sure we don't overflow, try to keep things unique */
|
|
if (size > max) {
|
|
DWORD diff = ((size - max)+1)/2;
|
|
provLen -= diff;
|
|
containerLen -= diff;
|
|
size = provLen+containerLen;
|
|
}
|
|
|
|
nsslibc_memcpy(io->hashKeyData, ko->provName, provLen);
|
|
nsslibc_memcpy(&io->hashKeyData[provLen],
|
|
ko->containerName,
|
|
containerLen);
|
|
io->hashKeyData[size] = (char)(io->objClass & 0xff);
|
|
io->hashKeyData[size+1] = (char)(ko->provInfo.dwKeySpec & 0xff);
|
|
|
|
io->hashKey.data = io->hashKeyData;
|
|
io->hashKey.size = size+2;
|
|
return;
|
|
}
|
|
|
|
/*
|
|
* fetch the hash key.
|
|
*/
|
|
void
|
|
ckcapi_FetchHashKey
|
|
(
|
|
ckcapiInternalObject *io
|
|
)
|
|
{
|
|
if (ckcapiCert == io->type) {
|
|
ckcapi_CertFetchHashKey(io);
|
|
} else {
|
|
ckcapi_KeyFetchHashKey(io);
|
|
}
|
|
return;
|
|
}
|
|
|
|
const NSSItem *
|
|
ckcapi_FetchCertAttribute
|
|
(
|
|
ckcapiInternalObject *io,
|
|
CK_ATTRIBUTE_TYPE type
|
|
)
|
|
{
|
|
PCCERT_CONTEXT certContext = io->u.cert.certContext;
|
|
switch(type) {
|
|
case CKA_CLASS:
|
|
return &ckcapi_certClassItem;
|
|
case CKA_TOKEN:
|
|
return &ckcapi_trueItem;
|
|
case CKA_MODIFIABLE:
|
|
case CKA_PRIVATE:
|
|
return &ckcapi_falseItem;
|
|
case CKA_CERTIFICATE_TYPE:
|
|
return &ckcapi_x509Item;
|
|
case CKA_LABEL:
|
|
if (0 == io->u.cert.label.size) {
|
|
ckcapi_FetchLabel(io);
|
|
}
|
|
return &io->u.cert.label;
|
|
case CKA_SUBJECT:
|
|
if (0 == io->u.cert.subject.size) {
|
|
io->u.cert.subject.data = certContext->pCertInfo->Subject.pbData;
|
|
io->u.cert.subject.size = certContext->pCertInfo->Subject.cbData;
|
|
}
|
|
return &io->u.cert.subject;
|
|
case CKA_ISSUER:
|
|
if (0 == io->u.cert.issuer.size) {
|
|
io->u.cert.issuer.data = certContext->pCertInfo->Issuer.pbData;
|
|
io->u.cert.issuer.size = certContext->pCertInfo->Issuer.cbData;
|
|
}
|
|
return &io->u.cert.issuer;
|
|
case CKA_SERIAL_NUMBER:
|
|
if (0 == io->u.cert.serial.size) {
|
|
/* not exactly right. This should be the encoded serial number, but
|
|
* it's the decoded serial number! */
|
|
ckcapi_FetchSerial(io);
|
|
}
|
|
return &io->u.cert.serial;
|
|
case CKA_VALUE:
|
|
if (0 == io->u.cert.derCert.size) {
|
|
io->u.cert.derCert.data = io->u.cert.certContext->pbCertEncoded;
|
|
io->u.cert.derCert.size = io->u.cert.certContext->cbCertEncoded;
|
|
}
|
|
return &io->u.cert.derCert;
|
|
case CKA_ID:
|
|
if (!io->u.cert.hasID) {
|
|
return NULL;
|
|
}
|
|
if (0 == io->id.size) {
|
|
ckcapi_FetchID(io);
|
|
}
|
|
return &io->id;
|
|
default:
|
|
break;
|
|
}
|
|
return NULL;
|
|
}
|
|
|
|
const NSSItem *
|
|
ckcapi_FetchPubKeyAttribute
|
|
(
|
|
ckcapiInternalObject *io,
|
|
CK_ATTRIBUTE_TYPE type
|
|
)
|
|
{
|
|
PRBool isCertType = (ckcapiCert == io->type);
|
|
ckcapiKeyParams *kp = isCertType ? &io->u.cert.key : &io->u.key.key;
|
|
|
|
switch(type) {
|
|
case CKA_CLASS:
|
|
return &ckcapi_pubKeyClassItem;
|
|
case CKA_TOKEN:
|
|
case CKA_LOCAL:
|
|
case CKA_ENCRYPT:
|
|
case CKA_VERIFY:
|
|
case CKA_VERIFY_RECOVER:
|
|
return &ckcapi_trueItem;
|
|
case CKA_PRIVATE:
|
|
case CKA_MODIFIABLE:
|
|
case CKA_DERIVE:
|
|
case CKA_WRAP:
|
|
return &ckcapi_falseItem;
|
|
case CKA_KEY_TYPE:
|
|
return &ckcapi_rsaItem;
|
|
case CKA_LABEL:
|
|
if (!isCertType) {
|
|
return &ckcapi_emptyItem;
|
|
}
|
|
if (0 == io->u.cert.label.size) {
|
|
ckcapi_FetchLabel(io);
|
|
}
|
|
return &io->u.cert.label;
|
|
case CKA_SUBJECT:
|
|
if (!isCertType) {
|
|
return &ckcapi_emptyItem;
|
|
}
|
|
if (0 == io->u.cert.subject.size) {
|
|
PCCERT_CONTEXT certContext= io->u.cert.certContext;
|
|
io->u.cert.subject.data = certContext->pCertInfo->Subject.pbData;
|
|
io->u.cert.subject.size = certContext->pCertInfo->Subject.cbData;
|
|
}
|
|
return &io->u.cert.subject;
|
|
case CKA_MODULUS:
|
|
if (0 == kp->modulus.size) {
|
|
ckcapi_PopulateModulusExponent(io);
|
|
}
|
|
return &kp->modulus;
|
|
case CKA_PUBLIC_EXPONENT:
|
|
if (0 == kp->modulus.size) {
|
|
ckcapi_PopulateModulusExponent(io);
|
|
}
|
|
return &kp->exponent;
|
|
case CKA_ID:
|
|
if (0 == io->id.size) {
|
|
ckcapi_FetchID(io);
|
|
}
|
|
return &io->id;
|
|
default:
|
|
break;
|
|
}
|
|
return NULL;
|
|
}
|
|
|
|
const NSSItem *
|
|
ckcapi_FetchPrivKeyAttribute
|
|
(
|
|
ckcapiInternalObject *io,
|
|
CK_ATTRIBUTE_TYPE type
|
|
)
|
|
{
|
|
PRBool isCertType = (ckcapiCert == io->type);
|
|
ckcapiKeyParams *kp = isCertType ? &io->u.cert.key : &io->u.key.key;
|
|
|
|
switch(type) {
|
|
case CKA_CLASS:
|
|
return &ckcapi_privKeyClassItem;
|
|
case CKA_TOKEN:
|
|
case CKA_LOCAL:
|
|
case CKA_SIGN:
|
|
case CKA_DECRYPT:
|
|
case CKA_SIGN_RECOVER:
|
|
return &ckcapi_trueItem;
|
|
case CKA_SENSITIVE:
|
|
case CKA_PRIVATE: /* should move in the future */
|
|
case CKA_MODIFIABLE:
|
|
case CKA_DERIVE:
|
|
case CKA_UNWRAP:
|
|
case CKA_EXTRACTABLE: /* will probably move in the future */
|
|
case CKA_ALWAYS_SENSITIVE:
|
|
case CKA_NEVER_EXTRACTABLE:
|
|
return &ckcapi_falseItem;
|
|
case CKA_KEY_TYPE:
|
|
return &ckcapi_rsaItem;
|
|
case CKA_LABEL:
|
|
if (!isCertType) {
|
|
return &ckcapi_emptyItem;
|
|
}
|
|
if (0 == io->u.cert.label.size) {
|
|
ckcapi_FetchLabel(io);
|
|
}
|
|
return &io->u.cert.label;
|
|
case CKA_SUBJECT:
|
|
if (!isCertType) {
|
|
return &ckcapi_emptyItem;
|
|
}
|
|
if (0 == io->u.cert.subject.size) {
|
|
PCCERT_CONTEXT certContext= io->u.cert.certContext;
|
|
io->u.cert.subject.data = certContext->pCertInfo->Subject.pbData;
|
|
io->u.cert.subject.size = certContext->pCertInfo->Subject.cbData;
|
|
}
|
|
return &io->u.cert.subject;
|
|
case CKA_MODULUS:
|
|
if (0 == kp->modulus.size) {
|
|
ckcapi_PopulateModulusExponent(io);
|
|
}
|
|
return &kp->modulus;
|
|
case CKA_PUBLIC_EXPONENT:
|
|
if (0 == kp->modulus.size) {
|
|
ckcapi_PopulateModulusExponent(io);
|
|
}
|
|
return &kp->exponent;
|
|
case CKA_PRIVATE_EXPONENT:
|
|
if (0 == kp->privateExponent.size) {
|
|
ckcapi_FetchPrivateKey(io);
|
|
}
|
|
return &kp->privateExponent;
|
|
case CKA_PRIME_1:
|
|
if (0 == kp->privateExponent.size) {
|
|
ckcapi_FetchPrivateKey(io);
|
|
}
|
|
return &kp->prime1;
|
|
case CKA_PRIME_2:
|
|
if (0 == kp->privateExponent.size) {
|
|
ckcapi_FetchPrivateKey(io);
|
|
}
|
|
return &kp->prime2;
|
|
case CKA_EXPONENT_1:
|
|
if (0 == kp->privateExponent.size) {
|
|
ckcapi_FetchPrivateKey(io);
|
|
}
|
|
return &kp->exponent1;
|
|
case CKA_EXPONENT_2:
|
|
if (0 == kp->privateExponent.size) {
|
|
ckcapi_FetchPrivateKey(io);
|
|
}
|
|
return &kp->exponent2;
|
|
case CKA_COEFFICIENT:
|
|
if (0 == kp->privateExponent.size) {
|
|
ckcapi_FetchPrivateKey(io);
|
|
}
|
|
return &kp->coefficient;
|
|
case CKA_ID:
|
|
if (0 == io->id.size) {
|
|
ckcapi_FetchID(io);
|
|
}
|
|
return &io->id;
|
|
default:
|
|
return NULL;
|
|
}
|
|
}
|
|
|
|
const NSSItem *
|
|
nss_ckcapi_FetchAttribute
|
|
(
|
|
ckcapiInternalObject *io,
|
|
CK_ATTRIBUTE_TYPE type
|
|
)
|
|
{
|
|
CK_ULONG i;
|
|
|
|
if (io->type == ckcapiRaw) {
|
|
for( i = 0; i < io->u.raw.n; i++ ) {
|
|
if( type == io->u.raw.types[i] ) {
|
|
return &io->u.raw.items[i];
|
|
}
|
|
}
|
|
return NULL;
|
|
}
|
|
/* deal with the common attributes */
|
|
switch (io->objClass) {
|
|
case CKO_CERTIFICATE:
|
|
return ckcapi_FetchCertAttribute(io, type);
|
|
case CKO_PRIVATE_KEY:
|
|
return ckcapi_FetchPrivKeyAttribute(io, type);
|
|
case CKO_PUBLIC_KEY:
|
|
return ckcapi_FetchPubKeyAttribute(io, type);
|
|
}
|
|
return NULL;
|
|
}
|
|
|
|
/*
|
|
* check to see if the certificate already exists
|
|
*/
|
|
static PRBool
|
|
ckcapi_cert_exists(
|
|
NSSItem *value,
|
|
ckcapiInternalObject **io
|
|
)
|
|
{
|
|
int count,i;
|
|
PRUint32 size = 0;
|
|
ckcapiInternalObject **listp = NULL;
|
|
CK_ATTRIBUTE myTemplate[2];
|
|
CK_OBJECT_CLASS cert_class = CKO_CERTIFICATE;
|
|
CK_ULONG templateCount = 2;
|
|
CK_RV error;
|
|
PRBool found = PR_FALSE;
|
|
|
|
myTemplate[0].type = CKA_CLASS;
|
|
myTemplate[0].pValue = &cert_class;
|
|
myTemplate[0].ulValueLen = sizeof(cert_class);
|
|
myTemplate[1].type = CKA_VALUE;
|
|
myTemplate[1].pValue = value->data;
|
|
myTemplate[1].ulValueLen = value->size;
|
|
|
|
count = nss_ckcapi_collect_all_certs(myTemplate, templateCount, &listp,
|
|
&size, 0, &error);
|
|
|
|
/* free them */
|
|
if (count > 1) {
|
|
*io = listp[0];
|
|
found = PR_TRUE;
|
|
}
|
|
|
|
for (i=1; i < count; i++) {
|
|
nss_ckcapi_DestroyInternalObject(listp[i]);
|
|
}
|
|
nss_ZFreeIf(listp);
|
|
return found;
|
|
}
|
|
|
|
static PRBool
|
|
ckcapi_cert_hasEmail
|
|
(
|
|
PCCERT_CONTEXT certContext
|
|
)
|
|
{
|
|
int count;
|
|
|
|
count = CertGetNameString(certContext, CERT_NAME_EMAIL_TYPE,
|
|
0, NULL, NULL, 0);
|
|
|
|
return count > 1 ? PR_TRUE : PR_FALSE;
|
|
}
|
|
|
|
static PRBool
|
|
ckcapi_cert_isRoot
|
|
(
|
|
PCCERT_CONTEXT certContext
|
|
)
|
|
{
|
|
return CertCompareCertificateName(certContext->dwCertEncodingType,
|
|
&certContext->pCertInfo->Issuer, &certContext->pCertInfo->Subject);
|
|
}
|
|
|
|
static PRBool
|
|
ckcapi_cert_isCA
|
|
(
|
|
PCCERT_CONTEXT certContext
|
|
)
|
|
{
|
|
PCERT_EXTENSION extension;
|
|
CERT_BASIC_CONSTRAINTS2_INFO basicInfo;
|
|
DWORD size = sizeof(basicInfo);
|
|
BOOL rc;
|
|
|
|
extension = CertFindExtension (szOID_BASIC_CONSTRAINTS,
|
|
certContext->pCertInfo->cExtension,
|
|
certContext->pCertInfo->rgExtension);
|
|
if ((PCERT_EXTENSION) NULL == extension ) {
|
|
return PR_FALSE;
|
|
}
|
|
rc = CryptDecodeObject(X509_ASN_ENCODING, szOID_BASIC_CONSTRAINTS2,
|
|
extension->Value.pbData, extension->Value.cbData,
|
|
0, &basicInfo, &size);
|
|
if (!rc) {
|
|
return PR_FALSE;
|
|
}
|
|
return (PRBool) basicInfo.fCA;
|
|
}
|
|
|
|
static CRYPT_KEY_PROV_INFO *
|
|
ckcapi_cert_getPrivateKeyInfo
|
|
(
|
|
PCCERT_CONTEXT certContext,
|
|
NSSItem *keyID
|
|
)
|
|
{
|
|
BOOL rc;
|
|
CRYPT_HASH_BLOB msKeyID;
|
|
DWORD size = 0;
|
|
CRYPT_KEY_PROV_INFO *prov = NULL;
|
|
|
|
msKeyID.cbData = keyID->size;
|
|
msKeyID.pbData = keyID->data;
|
|
|
|
rc = CryptGetKeyIdentifierProperty(
|
|
&msKeyID,
|
|
CERT_KEY_PROV_INFO_PROP_ID,
|
|
0, NULL, NULL, NULL, &size);
|
|
if (!rc) {
|
|
return (CRYPT_KEY_PROV_INFO *)NULL;
|
|
}
|
|
prov = (CRYPT_KEY_PROV_INFO *)nss_ZAlloc(NULL, size);
|
|
if ((CRYPT_KEY_PROV_INFO *)prov == NULL) {
|
|
return (CRYPT_KEY_PROV_INFO *) NULL;
|
|
}
|
|
rc = CryptGetKeyIdentifierProperty(
|
|
&msKeyID,
|
|
CERT_KEY_PROV_INFO_PROP_ID,
|
|
0, NULL, NULL, prov, &size);
|
|
if (!rc) {
|
|
nss_ZFreeIf(prov);
|
|
return (CRYPT_KEY_PROV_INFO *)NULL;
|
|
}
|
|
|
|
return prov;
|
|
}
|
|
|
|
static CRYPT_KEY_PROV_INFO *
|
|
ckcapi_cert_getProvInfo
|
|
(
|
|
ckcapiInternalObject *io
|
|
)
|
|
{
|
|
BOOL rc;
|
|
DWORD size = 0;
|
|
CRYPT_KEY_PROV_INFO *prov = NULL;
|
|
|
|
rc = CertGetCertificateContextProperty(
|
|
io->u.cert.certContext,
|
|
CERT_KEY_PROV_INFO_PROP_ID,
|
|
NULL, &size);
|
|
if (!rc) {
|
|
return (CRYPT_KEY_PROV_INFO *)NULL;
|
|
}
|
|
prov = (CRYPT_KEY_PROV_INFO *)nss_ZAlloc(NULL, size);
|
|
if ((CRYPT_KEY_PROV_INFO *)prov == NULL) {
|
|
return (CRYPT_KEY_PROV_INFO *) NULL;
|
|
}
|
|
rc = CertGetCertificateContextProperty(
|
|
io->u.cert.certContext,
|
|
CERT_KEY_PROV_INFO_PROP_ID,
|
|
prov, &size);
|
|
if (!rc) {
|
|
nss_ZFreeIf(prov);
|
|
return (CRYPT_KEY_PROV_INFO *)NULL;
|
|
}
|
|
|
|
return prov;
|
|
}
|
|
|
|
/* forward declaration */
|
|
static void
|
|
ckcapi_removeObjectFromHash
|
|
(
|
|
ckcapiInternalObject *io
|
|
);
|
|
|
|
/*
|
|
* Finalize - unneeded
|
|
* Destroy
|
|
* IsTokenObject - CK_TRUE
|
|
* GetAttributeCount
|
|
* GetAttributeTypes
|
|
* GetAttributeSize
|
|
* GetAttribute
|
|
* SetAttribute
|
|
* GetObjectSize
|
|
*/
|
|
|
|
static CK_RV
|
|
ckcapi_mdObject_Destroy
|
|
(
|
|
NSSCKMDObject *mdObject,
|
|
NSSCKFWObject *fwObject,
|
|
NSSCKMDSession *mdSession,
|
|
NSSCKFWSession *fwSession,
|
|
NSSCKMDToken *mdToken,
|
|
NSSCKFWToken *fwToken,
|
|
NSSCKMDInstance *mdInstance,
|
|
NSSCKFWInstance *fwInstance
|
|
)
|
|
{
|
|
ckcapiInternalObject *io = (ckcapiInternalObject *)mdObject->etc;
|
|
CK_OBJECT_CLASS objClass;
|
|
BOOL rc;
|
|
DWORD provType;
|
|
DWORD msError;
|
|
PRBool isCertType = (PRBool)(ckcapiCert == io->type);
|
|
HCERTSTORE hStore = 0;
|
|
|
|
if (ckcapiRaw == io->type) {
|
|
/* there is not 'object write protected' error, use the next best thing */
|
|
return CKR_TOKEN_WRITE_PROTECTED;
|
|
}
|
|
|
|
objClass = io->objClass;
|
|
if (CKO_CERTIFICATE == objClass) {
|
|
PCCERT_CONTEXT certContext;
|
|
|
|
/* get the store */
|
|
hStore = CertOpenSystemStore(0, io->u.cert.certStore);
|
|
if (0 == hStore) {
|
|
rc = 0;
|
|
goto loser;
|
|
}
|
|
certContext = CertFindCertificateInStore(hStore, X509_ASN_ENCODING, 0,
|
|
CERT_FIND_EXISTING, io->u.cert.certContext, NULL);
|
|
if ((PCCERT_CONTEXT)NULL == certContext) {
|
|
rc = 0;
|
|
goto loser;
|
|
}
|
|
rc = CertDeleteCertificateFromStore(certContext);
|
|
CertFreeCertificateContext(certContext);
|
|
} else {
|
|
char *provName = NULL;
|
|
char *containerName = NULL;
|
|
HCRYPTPROV hProv;
|
|
CRYPT_HASH_BLOB msKeyID;
|
|
|
|
if (0 == io->id.size) {
|
|
ckcapi_FetchID(io);
|
|
}
|
|
|
|
if (isCertType) {
|
|
CRYPT_KEY_PROV_INFO * provInfo = ckcapi_cert_getProvInfo(io);
|
|
provName = nss_ckcapi_WideToUTF8(provInfo->pwszProvName);
|
|
containerName = nss_ckcapi_WideToUTF8(provInfo->pwszContainerName);
|
|
provType = provInfo->dwProvType;
|
|
nss_ZFreeIf(provInfo);
|
|
} else {
|
|
provName = io->u.key.provName;
|
|
containerName = io->u.key.containerName;
|
|
provType = io->u.key.provInfo.dwProvType;
|
|
io->u.key.provName = NULL;
|
|
io->u.key.containerName = NULL;
|
|
}
|
|
/* first remove the key id pointer */
|
|
msKeyID.cbData = io->id.size;
|
|
msKeyID.pbData = io->id.data;
|
|
rc = CryptSetKeyIdentifierProperty(&msKeyID,
|
|
CERT_KEY_PROV_INFO_PROP_ID, CRYPT_KEYID_DELETE_FLAG, NULL, NULL, NULL);
|
|
if (rc) {
|
|
rc = CryptAcquireContext(&hProv, containerName, provName, provType,
|
|
CRYPT_DELETEKEYSET);
|
|
}
|
|
nss_ZFreeIf(provName);
|
|
nss_ZFreeIf(containerName);
|
|
}
|
|
loser:
|
|
|
|
if (hStore) {
|
|
CertCloseStore(hStore, 0);
|
|
}
|
|
if (!rc) {
|
|
msError = GetLastError();
|
|
return CKR_GENERAL_ERROR;
|
|
}
|
|
|
|
/* remove it from the hash */
|
|
ckcapi_removeObjectFromHash(io);
|
|
|
|
/* free the puppy.. */
|
|
nss_ckcapi_DestroyInternalObject(io);
|
|
return CKR_OK;
|
|
}
|
|
|
|
static CK_BBOOL
|
|
ckcapi_mdObject_IsTokenObject
|
|
(
|
|
NSSCKMDObject *mdObject,
|
|
NSSCKFWObject *fwObject,
|
|
NSSCKMDSession *mdSession,
|
|
NSSCKFWSession *fwSession,
|
|
NSSCKMDToken *mdToken,
|
|
NSSCKFWToken *fwToken,
|
|
NSSCKMDInstance *mdInstance,
|
|
NSSCKFWInstance *fwInstance
|
|
)
|
|
{
|
|
return CK_TRUE;
|
|
}
|
|
|
|
static CK_ULONG
|
|
ckcapi_mdObject_GetAttributeCount
|
|
(
|
|
NSSCKMDObject *mdObject,
|
|
NSSCKFWObject *fwObject,
|
|
NSSCKMDSession *mdSession,
|
|
NSSCKFWSession *fwSession,
|
|
NSSCKMDToken *mdToken,
|
|
NSSCKFWToken *fwToken,
|
|
NSSCKMDInstance *mdInstance,
|
|
NSSCKFWInstance *fwInstance,
|
|
CK_RV *pError
|
|
)
|
|
{
|
|
ckcapiInternalObject *io = (ckcapiInternalObject *)mdObject->etc;
|
|
|
|
if (ckcapiRaw == io->type) {
|
|
return io->u.raw.n;
|
|
}
|
|
switch (io->objClass) {
|
|
case CKO_CERTIFICATE:
|
|
return certAttrsCount;
|
|
case CKO_PUBLIC_KEY:
|
|
return pubKeyAttrsCount;
|
|
case CKO_PRIVATE_KEY:
|
|
return privKeyAttrsCount;
|
|
default:
|
|
break;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
static CK_RV
|
|
ckcapi_mdObject_GetAttributeTypes
|
|
(
|
|
NSSCKMDObject *mdObject,
|
|
NSSCKFWObject *fwObject,
|
|
NSSCKMDSession *mdSession,
|
|
NSSCKFWSession *fwSession,
|
|
NSSCKMDToken *mdToken,
|
|
NSSCKFWToken *fwToken,
|
|
NSSCKMDInstance *mdInstance,
|
|
NSSCKFWInstance *fwInstance,
|
|
CK_ATTRIBUTE_TYPE_PTR typeArray,
|
|
CK_ULONG ulCount
|
|
)
|
|
{
|
|
ckcapiInternalObject *io = (ckcapiInternalObject *)mdObject->etc;
|
|
CK_ULONG i;
|
|
CK_RV error = CKR_OK;
|
|
const CK_ATTRIBUTE_TYPE *attrs = NULL;
|
|
CK_ULONG size = ckcapi_mdObject_GetAttributeCount(
|
|
mdObject, fwObject, mdSession, fwSession,
|
|
mdToken, fwToken, mdInstance, fwInstance, &error);
|
|
|
|
if( size != ulCount ) {
|
|
return CKR_BUFFER_TOO_SMALL;
|
|
}
|
|
if (io->type == ckcapiRaw) {
|
|
attrs = io->u.raw.types;
|
|
} else switch(io->objClass) {
|
|
case CKO_CERTIFICATE:
|
|
attrs = certAttrs;
|
|
break;
|
|
case CKO_PUBLIC_KEY:
|
|
attrs = pubKeyAttrs;
|
|
break;
|
|
case CKO_PRIVATE_KEY:
|
|
attrs = privKeyAttrs;
|
|
break;
|
|
default:
|
|
return CKR_OK;
|
|
}
|
|
|
|
for( i = 0; i < size; i++) {
|
|
typeArray[i] = attrs[i];
|
|
}
|
|
|
|
return CKR_OK;
|
|
}
|
|
|
|
static CK_ULONG
|
|
ckcapi_mdObject_GetAttributeSize
|
|
(
|
|
NSSCKMDObject *mdObject,
|
|
NSSCKFWObject *fwObject,
|
|
NSSCKMDSession *mdSession,
|
|
NSSCKFWSession *fwSession,
|
|
NSSCKMDToken *mdToken,
|
|
NSSCKFWToken *fwToken,
|
|
NSSCKMDInstance *mdInstance,
|
|
NSSCKFWInstance *fwInstance,
|
|
CK_ATTRIBUTE_TYPE attribute,
|
|
CK_RV *pError
|
|
)
|
|
{
|
|
ckcapiInternalObject *io = (ckcapiInternalObject *)mdObject->etc;
|
|
|
|
const NSSItem *b;
|
|
|
|
b = nss_ckcapi_FetchAttribute(io, attribute);
|
|
|
|
if ((const NSSItem *)NULL == b) {
|
|
*pError = CKR_ATTRIBUTE_TYPE_INVALID;
|
|
return 0;
|
|
}
|
|
return b->size;
|
|
}
|
|
|
|
static CK_RV
|
|
ckcapi_mdObject_SetAttribute
|
|
(
|
|
NSSCKMDObject *mdObject,
|
|
NSSCKFWObject *fwObject,
|
|
NSSCKMDSession *mdSession,
|
|
NSSCKFWSession *fwSession,
|
|
NSSCKMDToken *mdToken,
|
|
NSSCKFWToken *fwToken,
|
|
NSSCKMDInstance *mdInstance,
|
|
NSSCKFWInstance *fwInstance,
|
|
CK_ATTRIBUTE_TYPE attribute,
|
|
NSSItem *value
|
|
)
|
|
{
|
|
return CKR_OK;
|
|
}
|
|
|
|
static NSSCKFWItem
|
|
ckcapi_mdObject_GetAttribute
|
|
(
|
|
NSSCKMDObject *mdObject,
|
|
NSSCKFWObject *fwObject,
|
|
NSSCKMDSession *mdSession,
|
|
NSSCKFWSession *fwSession,
|
|
NSSCKMDToken *mdToken,
|
|
NSSCKFWToken *fwToken,
|
|
NSSCKMDInstance *mdInstance,
|
|
NSSCKFWInstance *fwInstance,
|
|
CK_ATTRIBUTE_TYPE attribute,
|
|
CK_RV *pError
|
|
)
|
|
{
|
|
NSSCKFWItem mdItem;
|
|
ckcapiInternalObject *io = (ckcapiInternalObject *)mdObject->etc;
|
|
|
|
mdItem.needsFreeing = PR_FALSE;
|
|
mdItem.item = (NSSItem*)nss_ckcapi_FetchAttribute(io, attribute);
|
|
|
|
if ((NSSItem *)NULL == mdItem.item) {
|
|
*pError = CKR_ATTRIBUTE_TYPE_INVALID;
|
|
}
|
|
|
|
return mdItem;
|
|
}
|
|
|
|
static CK_ULONG
|
|
ckcapi_mdObject_GetObjectSize
|
|
(
|
|
NSSCKMDObject *mdObject,
|
|
NSSCKFWObject *fwObject,
|
|
NSSCKMDSession *mdSession,
|
|
NSSCKFWSession *fwSession,
|
|
NSSCKMDToken *mdToken,
|
|
NSSCKFWToken *fwToken,
|
|
NSSCKMDInstance *mdInstance,
|
|
NSSCKFWInstance *fwInstance,
|
|
CK_RV *pError
|
|
)
|
|
{
|
|
ckcapiInternalObject *io = (ckcapiInternalObject *)mdObject->etc;
|
|
CK_ULONG rv = 1;
|
|
|
|
/* size is irrelevant to this token */
|
|
return rv;
|
|
}
|
|
|
|
static const NSSCKMDObject
|
|
ckcapi_prototype_mdObject = {
|
|
(void *)NULL, /* etc */
|
|
NULL, /* Finalize */
|
|
ckcapi_mdObject_Destroy,
|
|
ckcapi_mdObject_IsTokenObject,
|
|
ckcapi_mdObject_GetAttributeCount,
|
|
ckcapi_mdObject_GetAttributeTypes,
|
|
ckcapi_mdObject_GetAttributeSize,
|
|
ckcapi_mdObject_GetAttribute,
|
|
NULL, /* FreeAttribute */
|
|
ckcapi_mdObject_SetAttribute,
|
|
ckcapi_mdObject_GetObjectSize,
|
|
(void *)NULL /* null terminator */
|
|
};
|
|
|
|
static nssHash *ckcapiInternalObjectHash = NULL;
|
|
|
|
NSS_IMPLEMENT NSSCKMDObject *
|
|
nss_ckcapi_CreateMDObject
|
|
(
|
|
NSSArena *arena,
|
|
ckcapiInternalObject *io,
|
|
CK_RV *pError
|
|
)
|
|
{
|
|
if ((nssHash *)NULL == ckcapiInternalObjectHash) {
|
|
ckcapiInternalObjectHash = nssHash_CreateItem(NULL, 10);
|
|
}
|
|
if (ckcapiCert == io->type) {
|
|
/* the hash key, not a cryptographic key */
|
|
NSSItem *key = &io->hashKey;
|
|
ckcapiInternalObject *old_o = NULL;
|
|
|
|
if (key->size == 0) {
|
|
ckcapi_FetchHashKey(io);
|
|
}
|
|
old_o = (ckcapiInternalObject *)
|
|
nssHash_Lookup(ckcapiInternalObjectHash, key);
|
|
if (!old_o) {
|
|
nssHash_Add(ckcapiInternalObjectHash, key, io);
|
|
} else if (old_o != io) {
|
|
nss_ckcapi_DestroyInternalObject(io);
|
|
io = old_o;
|
|
}
|
|
}
|
|
|
|
if ( (void*)NULL == io->mdObject.etc) {
|
|
(void) nsslibc_memcpy(&io->mdObject,&ckcapi_prototype_mdObject,
|
|
sizeof(ckcapi_prototype_mdObject));
|
|
io->mdObject.etc = (void *)io;
|
|
}
|
|
return &io->mdObject;
|
|
}
|
|
|
|
static void
|
|
ckcapi_removeObjectFromHash
|
|
(
|
|
ckcapiInternalObject *io
|
|
)
|
|
{
|
|
NSSItem *key = &io->hashKey;
|
|
|
|
if ((nssHash *)NULL == ckcapiInternalObjectHash) {
|
|
return;
|
|
}
|
|
if (key->size == 0) {
|
|
ckcapi_FetchHashKey(io);
|
|
}
|
|
nssHash_Remove(ckcapiInternalObjectHash, key);
|
|
return;
|
|
}
|
|
|
|
void
|
|
nss_ckcapi_DestroyInternalObject
|
|
(
|
|
ckcapiInternalObject *io
|
|
)
|
|
{
|
|
switch (io->type) {
|
|
case ckcapiRaw:
|
|
return;
|
|
case ckcapiCert:
|
|
CertFreeCertificateContext(io->u.cert.certContext);
|
|
nss_ZFreeIf(io->u.cert.labelData);
|
|
nss_ZFreeIf(io->u.cert.key.privateKey);
|
|
nss_ZFreeIf(io->u.cert.key.pubKey);
|
|
nss_ZFreeIf(io->idData);
|
|
break;
|
|
case ckcapiBareKey:
|
|
nss_ZFreeIf(io->u.key.provInfo.pwszContainerName);
|
|
nss_ZFreeIf(io->u.key.provInfo.pwszProvName);
|
|
nss_ZFreeIf(io->u.key.provName);
|
|
nss_ZFreeIf(io->u.key.containerName);
|
|
nss_ZFreeIf(io->u.key.key.privateKey);
|
|
nss_ZFreeIf(io->u.key.key.pubKey);
|
|
if (0 != io->u.key.hProv) {
|
|
CryptReleaseContext(io->u.key.hProv, 0);
|
|
}
|
|
nss_ZFreeIf(io->idData);
|
|
break;
|
|
}
|
|
nss_ZFreeIf(io);
|
|
return;
|
|
}
|
|
|
|
static ckcapiInternalObject *
|
|
nss_ckcapi_CreateCertificate
|
|
(
|
|
NSSCKFWSession *fwSession,
|
|
CK_ATTRIBUTE_PTR pTemplate,
|
|
CK_ULONG ulAttributeCount,
|
|
CK_RV *pError
|
|
)
|
|
{
|
|
NSSItem value;
|
|
NSSItem keyID;
|
|
char *storeStr;
|
|
ckcapiInternalObject *io = NULL;
|
|
PCCERT_CONTEXT certContext = NULL;
|
|
PCCERT_CONTEXT storedCertContext = NULL;
|
|
CRYPT_KEY_PROV_INFO *prov_info = NULL;
|
|
char *nickname = NULL;
|
|
HCERTSTORE hStore = 0;
|
|
DWORD msError = 0;
|
|
PRBool hasID;
|
|
CK_RV dummy;
|
|
BOOL rc;
|
|
|
|
*pError = nss_ckcapi_GetAttribute(CKA_VALUE, pTemplate,
|
|
ulAttributeCount, &value);
|
|
|
|
if (CKR_OK != *pError) {
|
|
return (ckcapiInternalObject *)NULL;
|
|
}
|
|
|
|
*pError = nss_ckcapi_GetAttribute(CKA_ID, pTemplate,
|
|
ulAttributeCount, &keyID);
|
|
|
|
if (CKR_OK != *pError) {
|
|
return (ckcapiInternalObject *)NULL;
|
|
}
|
|
|
|
if (ckcapi_cert_exists(&value, &io)) {
|
|
return io;
|
|
}
|
|
|
|
/* OK, we are creating a new one, figure out what store it belongs to..
|
|
* first get a certContext handle.. */
|
|
certContext = CertCreateCertificateContext(X509_ASN_ENCODING,
|
|
value.data, value.size);
|
|
if ((PCCERT_CONTEXT) NULL == certContext) {
|
|
msError = GetLastError();
|
|
*pError = CKR_ATTRIBUTE_VALUE_INVALID;
|
|
goto loser;
|
|
}
|
|
|
|
/* do we have a private key laying around... */
|
|
prov_info = ckcapi_cert_getPrivateKeyInfo(certContext, &keyID);
|
|
if (prov_info) {
|
|
CRYPT_DATA_BLOB msKeyID;
|
|
storeStr = "My";
|
|
hasID = PR_TRUE;
|
|
rc = CertSetCertificateContextProperty(certContext,
|
|
CERT_KEY_PROV_INFO_PROP_ID,
|
|
0, prov_info);
|
|
nss_ZFreeIf(prov_info);
|
|
if (!rc) {
|
|
msError = GetLastError();
|
|
*pError = CKR_DEVICE_ERROR;
|
|
goto loser;
|
|
}
|
|
msKeyID.cbData = keyID.size;
|
|
msKeyID.pbData = keyID.data;
|
|
rc = CertSetCertificateContextProperty(certContext,
|
|
CERT_KEY_IDENTIFIER_PROP_ID,
|
|
0, &msKeyID);
|
|
if (!rc) {
|
|
msError = GetLastError();
|
|
*pError = CKR_DEVICE_ERROR;
|
|
goto loser;
|
|
}
|
|
|
|
/* does it look like a CA */
|
|
} else if (ckcapi_cert_isCA(certContext)) {
|
|
storeStr = ckcapi_cert_isRoot(certContext) ? "CA" : "Root";
|
|
/* does it look like an S/MIME cert */
|
|
} else if (ckcapi_cert_hasEmail(certContext)) {
|
|
storeStr = "AddressBook";
|
|
} else {
|
|
/* just pick a store */
|
|
storeStr = "CA";
|
|
}
|
|
|
|
/* get the nickname, not an error if we can't find it */
|
|
nickname = nss_ckcapi_GetStringAttribute(CKA_LABEL, pTemplate,
|
|
ulAttributeCount, &dummy);
|
|
if (nickname) {
|
|
LPWSTR nicknameUTF16 = NULL;
|
|
CRYPT_DATA_BLOB nicknameBlob;
|
|
|
|
nicknameUTF16 = nss_ckcapi_UTF8ToWide(nickname);
|
|
nss_ZFreeIf(nickname);
|
|
nickname = NULL;
|
|
if ((LPWSTR)NULL == nicknameUTF16) {
|
|
*pError = CKR_HOST_MEMORY;
|
|
goto loser;
|
|
}
|
|
nicknameBlob.cbData = nss_ckcapi_WideSize(nicknameUTF16);
|
|
nicknameBlob.pbData = (BYTE *)nicknameUTF16;
|
|
rc = CertSetCertificateContextProperty(certContext,
|
|
CERT_FRIENDLY_NAME_PROP_ID, 0, &nicknameBlob);
|
|
nss_ZFreeIf(nicknameUTF16);
|
|
if (!rc) {
|
|
msError = GetLastError();
|
|
*pError = CKR_DEVICE_ERROR;
|
|
goto loser;
|
|
}
|
|
}
|
|
|
|
hStore = CertOpenSystemStore((HCRYPTPROV) NULL, storeStr);
|
|
if (0 == hStore) {
|
|
msError = GetLastError();
|
|
*pError = CKR_DEVICE_ERROR;
|
|
goto loser;
|
|
}
|
|
|
|
rc = CertAddCertificateContextToStore(hStore, certContext,
|
|
CERT_STORE_ADD_REPLACE_EXISTING_INHERIT_PROPERTIES, &storedCertContext);
|
|
CertFreeCertificateContext(certContext);
|
|
certContext = NULL;
|
|
CertCloseStore(hStore, 0);
|
|
hStore = 0;
|
|
if (!rc) {
|
|
msError = GetLastError();
|
|
*pError = CKR_DEVICE_ERROR;
|
|
goto loser;
|
|
}
|
|
|
|
io = nss_ZNEW(NULL, ckcapiInternalObject);
|
|
if ((ckcapiInternalObject *)NULL == io) {
|
|
*pError = CKR_HOST_MEMORY;
|
|
goto loser;
|
|
}
|
|
io->type = ckcapiCert;
|
|
io->objClass = CKO_CERTIFICATE;
|
|
io->u.cert.certContext = storedCertContext;
|
|
io->u.cert.hasID = hasID;
|
|
return io;
|
|
|
|
loser:
|
|
if (certContext) {
|
|
CertFreeCertificateContext(certContext);
|
|
certContext = NULL;
|
|
}
|
|
if (storedCertContext) {
|
|
CertFreeCertificateContext(storedCertContext);
|
|
storedCertContext = NULL;
|
|
}
|
|
if (0 != hStore) {
|
|
CertCloseStore(hStore, 0);
|
|
}
|
|
return (ckcapiInternalObject *)NULL;
|
|
|
|
}
|
|
|
|
static char *
|
|
ckcapi_getDefaultProvider
|
|
(
|
|
CK_RV *pError
|
|
)
|
|
{
|
|
char *name = NULL;
|
|
BOOL rc;
|
|
DWORD nameLength = 0;
|
|
|
|
rc = CryptGetDefaultProvider(PROV_RSA_FULL, NULL, CRYPT_USER_DEFAULT, NULL,
|
|
&nameLength);
|
|
if (!rc) {
|
|
return (char *)NULL;
|
|
}
|
|
|
|
name = nss_ZNEWARRAY(NULL, char, nameLength);
|
|
if ((char *)NULL == name ) {
|
|
return (char *)NULL;
|
|
}
|
|
rc = CryptGetDefaultProvider(PROV_RSA_FULL, NULL, CRYPT_USER_DEFAULT, name,
|
|
&nameLength);
|
|
if (!rc) {
|
|
nss_ZFreeIf(name);
|
|
return (char *)NULL;
|
|
}
|
|
|
|
return name;
|
|
}
|
|
|
|
static char *
|
|
ckcapi_getContainer
|
|
(
|
|
CK_RV *pError,
|
|
NSSItem *id
|
|
)
|
|
{
|
|
RPC_STATUS rstat;
|
|
UUID uuid;
|
|
char *uuidStr;
|
|
char *container;
|
|
|
|
rstat = UuidCreate(&uuid);
|
|
rstat = UuidToString(&uuid, &uuidStr);
|
|
|
|
/* convert it from rcp memory to our own */
|
|
container = nssUTF8_Duplicate(uuidStr, NULL);
|
|
RpcStringFree(&uuidStr);
|
|
|
|
return container;
|
|
}
|
|
|
|
static CK_RV
|
|
ckcapi_buildPrivateKeyBlob
|
|
(
|
|
NSSItem *keyBlob,
|
|
NSSItem *modulus,
|
|
NSSItem *publicExponent,
|
|
NSSItem *privateExponent,
|
|
NSSItem *prime1,
|
|
NSSItem *prime2,
|
|
NSSItem *exponent1,
|
|
NSSItem *exponent2,
|
|
NSSItem *coefficient,
|
|
PRBool isKeyExchange
|
|
)
|
|
{
|
|
CAPI_RSA_KEY_BLOB *keyBlobData = NULL;
|
|
unsigned char *target;
|
|
unsigned long modSize = modulus->size;
|
|
unsigned long dataSize;
|
|
CK_RV error = CKR_OK;
|
|
|
|
/* validate extras */
|
|
if (privateExponent->size != modSize) {
|
|
error = CKR_ATTRIBUTE_VALUE_INVALID;
|
|
goto loser;
|
|
}
|
|
if (prime1->size != modSize/2) {
|
|
error = CKR_ATTRIBUTE_VALUE_INVALID;
|
|
goto loser;
|
|
}
|
|
if (prime2->size != modSize/2) {
|
|
error = CKR_ATTRIBUTE_VALUE_INVALID;
|
|
goto loser;
|
|
}
|
|
if (exponent1->size != modSize/2) {
|
|
error = CKR_ATTRIBUTE_VALUE_INVALID;
|
|
goto loser;
|
|
}
|
|
if (exponent2->size != modSize/2) {
|
|
error = CKR_ATTRIBUTE_VALUE_INVALID;
|
|
goto loser;
|
|
}
|
|
if (coefficient->size != modSize/2) {
|
|
error = CKR_ATTRIBUTE_VALUE_INVALID;
|
|
goto loser;
|
|
}
|
|
dataSize = (modSize*4)+(modSize/2) + sizeof(CAPI_RSA_KEY_BLOB);
|
|
keyBlobData = (CAPI_RSA_KEY_BLOB *)nss_ZAlloc(NULL, dataSize);
|
|
if ((CAPI_RSA_KEY_BLOB *)NULL == keyBlobData) {
|
|
error = CKR_HOST_MEMORY;
|
|
goto loser;
|
|
}
|
|
|
|
keyBlobData->header.bType = PRIVATEKEYBLOB;
|
|
keyBlobData->header.bVersion = 0x02;
|
|
keyBlobData->header.reserved = 0x00;
|
|
keyBlobData->header.aiKeyAlg = isKeyExchange ? CALG_RSA_KEYX:CALG_RSA_SIGN;
|
|
keyBlobData->rsa.magic = 0x32415352;
|
|
keyBlobData->rsa.bitlen = modSize * 8;
|
|
keyBlobData->rsa.pubexp = nss_ckcapi_DataToInt(publicExponent,&error);
|
|
if (CKR_OK != error) {
|
|
goto loser;
|
|
}
|
|
|
|
target = &keyBlobData->data[CAPI_MODULUS_OFFSET(modSize)];
|
|
nsslibc_memcpy(target, modulus->data, modulus->size);
|
|
modulus->data = target;
|
|
ckcapi_ReverseData(modulus);
|
|
|
|
target = &keyBlobData->data[CAPI_PRIVATE_EXP_OFFSET(modSize)];
|
|
nsslibc_memcpy(target, privateExponent->data, privateExponent->size);
|
|
privateExponent->data = target;
|
|
ckcapi_ReverseData(privateExponent);
|
|
|
|
target = &keyBlobData->data[CAPI_PRIME_1_OFFSET(modSize)];
|
|
nsslibc_memcpy(target, prime1->data, prime1->size);
|
|
prime1->data = target;
|
|
ckcapi_ReverseData(prime1);
|
|
|
|
target = &keyBlobData->data[CAPI_PRIME_2_OFFSET(modSize)];
|
|
nsslibc_memcpy(target, prime2->data, prime2->size);
|
|
prime2->data = target;
|
|
ckcapi_ReverseData(prime2);
|
|
|
|
target = &keyBlobData->data[CAPI_EXPONENT_1_OFFSET(modSize)];
|
|
nsslibc_memcpy(target, exponent1->data, exponent1->size);
|
|
exponent1->data = target;
|
|
ckcapi_ReverseData(exponent1);
|
|
|
|
target = &keyBlobData->data[CAPI_EXPONENT_2_OFFSET(modSize)];
|
|
nsslibc_memcpy(target, exponent2->data, exponent2->size);
|
|
exponent2->data = target;
|
|
ckcapi_ReverseData(exponent2);
|
|
|
|
target = &keyBlobData->data[CAPI_COEFFICIENT_OFFSET(modSize)];
|
|
nsslibc_memcpy(target, coefficient->data, coefficient->size);
|
|
coefficient->data = target;
|
|
ckcapi_ReverseData(coefficient);
|
|
|
|
keyBlob->data = keyBlobData;
|
|
keyBlob->size = dataSize;
|
|
|
|
return CKR_OK;
|
|
|
|
loser:
|
|
nss_ZFreeIf(keyBlobData);
|
|
return error;
|
|
}
|
|
|
|
static ckcapiInternalObject *
|
|
nss_ckcapi_CreatePrivateKey
|
|
(
|
|
NSSCKFWSession *fwSession,
|
|
CK_ATTRIBUTE_PTR pTemplate,
|
|
CK_ULONG ulAttributeCount,
|
|
CK_RV *pError
|
|
)
|
|
{
|
|
NSSItem modulus;
|
|
NSSItem publicExponent;
|
|
NSSItem privateExponent;
|
|
NSSItem exponent1;
|
|
NSSItem exponent2;
|
|
NSSItem prime1;
|
|
NSSItem prime2;
|
|
NSSItem coefficient;
|
|
NSSItem keyID;
|
|
NSSItem keyBlob;
|
|
ckcapiInternalObject *io = NULL;
|
|
char *providerName = NULL;
|
|
char *containerName = NULL;
|
|
char *idData = NULL;
|
|
CRYPT_KEY_PROV_INFO provInfo;
|
|
CRYPT_HASH_BLOB msKeyID;
|
|
CK_KEY_TYPE keyType;
|
|
HCRYPTPROV hProv = 0;
|
|
HCRYPTKEY hKey = 0;
|
|
PRBool decrypt;
|
|
DWORD keySpec;
|
|
DWORD msError;
|
|
BOOL rc;
|
|
|
|
keyType = nss_ckcapi_GetULongAttribute
|
|
(CKA_KEY_TYPE, pTemplate, ulAttributeCount, pError);
|
|
if (CKR_OK != *pError) {
|
|
return (ckcapiInternalObject *)NULL;
|
|
}
|
|
if (CKK_RSA != keyType) {
|
|
*pError = CKR_ATTRIBUTE_VALUE_INVALID;
|
|
return (ckcapiInternalObject *)NULL;
|
|
}
|
|
|
|
decrypt = nss_ckcapi_GetBoolAttribute(CKA_DECRYPT,
|
|
pTemplate, ulAttributeCount, pError);
|
|
if (CKR_TEMPLATE_INCOMPLETE == *pError) {
|
|
decrypt = PR_TRUE; /* default to true */
|
|
}
|
|
decrypt = decrypt || nss_ckcapi_GetBoolAttribute(CKA_UNWRAP,
|
|
pTemplate, ulAttributeCount, pError);
|
|
if (CKR_TEMPLATE_INCOMPLETE == *pError) {
|
|
decrypt = PR_TRUE; /* default to true */
|
|
}
|
|
keySpec = decrypt ? AT_KEYEXCHANGE : AT_SIGNATURE;
|
|
|
|
*pError = nss_ckcapi_GetAttribute(CKA_MODULUS, pTemplate,
|
|
ulAttributeCount, &modulus);
|
|
if (CKR_OK != *pError) {
|
|
return (ckcapiInternalObject *)NULL;
|
|
}
|
|
*pError = nss_ckcapi_GetAttribute(CKA_PUBLIC_EXPONENT, pTemplate,
|
|
ulAttributeCount, &publicExponent);
|
|
if (CKR_OK != *pError) {
|
|
return (ckcapiInternalObject *)NULL;
|
|
}
|
|
*pError = nss_ckcapi_GetAttribute(CKA_PRIVATE_EXPONENT, pTemplate,
|
|
ulAttributeCount, &privateExponent);
|
|
if (CKR_OK != *pError) {
|
|
return (ckcapiInternalObject *)NULL;
|
|
}
|
|
*pError = nss_ckcapi_GetAttribute(CKA_PRIME_1, pTemplate,
|
|
ulAttributeCount, &prime1);
|
|
if (CKR_OK != *pError) {
|
|
return (ckcapiInternalObject *)NULL;
|
|
}
|
|
*pError = nss_ckcapi_GetAttribute(CKA_PRIME_2, pTemplate,
|
|
ulAttributeCount, &prime2);
|
|
if (CKR_OK != *pError) {
|
|
return (ckcapiInternalObject *)NULL;
|
|
}
|
|
*pError = nss_ckcapi_GetAttribute(CKA_EXPONENT_1, pTemplate,
|
|
ulAttributeCount, &exponent1);
|
|
if (CKR_OK != *pError) {
|
|
return (ckcapiInternalObject *)NULL;
|
|
}
|
|
*pError = nss_ckcapi_GetAttribute(CKA_EXPONENT_2, pTemplate,
|
|
ulAttributeCount, &exponent2);
|
|
if (CKR_OK != *pError) {
|
|
return (ckcapiInternalObject *)NULL;
|
|
}
|
|
*pError = nss_ckcapi_GetAttribute(CKA_COEFFICIENT, pTemplate,
|
|
ulAttributeCount, &coefficient);
|
|
if (CKR_OK != *pError) {
|
|
return (ckcapiInternalObject *)NULL;
|
|
}
|
|
*pError = nss_ckcapi_GetAttribute(CKA_ID, pTemplate,
|
|
ulAttributeCount, &keyID);
|
|
if (CKR_OK != *pError) {
|
|
return (ckcapiInternalObject *)NULL;
|
|
}
|
|
providerName = ckcapi_getDefaultProvider(pError);
|
|
if ((char *)NULL == providerName ) {
|
|
return (ckcapiInternalObject *)NULL;
|
|
}
|
|
containerName = ckcapi_getContainer(pError, &keyID);
|
|
if ((char *)NULL == providerName ) {
|
|
goto loser;
|
|
}
|
|
rc = CryptAcquireContext(&hProv, containerName, providerName,
|
|
PROV_RSA_FULL, CRYPT_NEWKEYSET);
|
|
if (!rc) {
|
|
msError = GetLastError();
|
|
*pError = CKR_DEVICE_ERROR;
|
|
goto loser;
|
|
}
|
|
|
|
*pError = ckcapi_buildPrivateKeyBlob(
|
|
&keyBlob,
|
|
&modulus,
|
|
&publicExponent,
|
|
&privateExponent,
|
|
&prime1,
|
|
&prime2,
|
|
&exponent1,
|
|
&exponent2,
|
|
&coefficient,
|
|
decrypt);
|
|
if (CKR_OK != *pError) {
|
|
goto loser;
|
|
}
|
|
|
|
rc = CryptImportKey(hProv, keyBlob.data, keyBlob.size,
|
|
0, CRYPT_EXPORTABLE, &hKey);
|
|
if (!rc) {
|
|
msError = GetLastError();
|
|
*pError = CKR_DEVICE_ERROR;
|
|
goto loser;
|
|
}
|
|
|
|
idData = nss_ZNEWARRAY(NULL, char, keyID.size);
|
|
if ((void *)NULL == idData) {
|
|
*pError = CKR_HOST_MEMORY;
|
|
goto loser;
|
|
}
|
|
nsslibc_memcpy(idData, keyID.data, keyID.size);
|
|
|
|
provInfo.pwszContainerName = nss_ckcapi_UTF8ToWide(containerName);
|
|
provInfo.pwszProvName = nss_ckcapi_UTF8ToWide(providerName);
|
|
provInfo.dwProvType = PROV_RSA_FULL;
|
|
provInfo.dwFlags = 0;
|
|
provInfo.cProvParam = 0;
|
|
provInfo.rgProvParam = NULL;
|
|
provInfo.dwKeySpec = keySpec;
|
|
|
|
msKeyID.cbData = keyID.size;
|
|
msKeyID.pbData = keyID.data;
|
|
|
|
rc = CryptSetKeyIdentifierProperty(&msKeyID, CERT_KEY_PROV_INFO_PROP_ID,
|
|
0, NULL, NULL, &provInfo);
|
|
if (!rc) {
|
|
goto loser;
|
|
}
|
|
|
|
/* handle error here */
|
|
io = nss_ZNEW(NULL, ckcapiInternalObject);
|
|
if ((ckcapiInternalObject *)NULL == io) {
|
|
*pError = CKR_HOST_MEMORY;
|
|
goto loser;
|
|
}
|
|
io->type = ckcapiBareKey;
|
|
io->objClass = CKO_PRIVATE_KEY;
|
|
io->u.key.provInfo = provInfo;
|
|
io->u.key.provName = providerName;
|
|
io->u.key.containerName = containerName;
|
|
io->u.key.hProv = hProv; /* save the handle */
|
|
io->idData = idData;
|
|
io->id.data = idData;
|
|
io->id.size = keyID.size;
|
|
/* done with the key handle */
|
|
CryptDestroyKey(hKey);
|
|
return io;
|
|
|
|
loser:
|
|
nss_ZFreeIf(containerName);
|
|
nss_ZFreeIf(providerName);
|
|
nss_ZFreeIf(idData);
|
|
if (0 != hProv) {
|
|
CryptReleaseContext(hProv, 0);
|
|
}
|
|
if (0 != hKey) {
|
|
CryptDestroyKey(hKey);
|
|
}
|
|
return (ckcapiInternalObject *)NULL;
|
|
}
|
|
|
|
|
|
NSS_EXTERN NSSCKMDObject *
|
|
nss_ckcapi_CreateObject
|
|
(
|
|
NSSCKFWSession *fwSession,
|
|
CK_ATTRIBUTE_PTR pTemplate,
|
|
CK_ULONG ulAttributeCount,
|
|
CK_RV *pError
|
|
)
|
|
{
|
|
CK_OBJECT_CLASS objClass;
|
|
ckcapiInternalObject *io;
|
|
CK_BBOOL isToken;
|
|
|
|
/*
|
|
* only create token objects
|
|
*/
|
|
isToken = nss_ckcapi_GetBoolAttribute(CKA_TOKEN, pTemplate,
|
|
ulAttributeCount, pError);
|
|
if (CKR_OK != *pError) {
|
|
return (NSSCKMDObject *) NULL;
|
|
}
|
|
if (!isToken) {
|
|
*pError = CKR_ATTRIBUTE_VALUE_INVALID;
|
|
return (NSSCKMDObject *) NULL;
|
|
}
|
|
|
|
/*
|
|
* only create keys and certs.
|
|
*/
|
|
objClass = nss_ckcapi_GetULongAttribute(CKA_CLASS, pTemplate,
|
|
ulAttributeCount, pError);
|
|
if (CKR_OK != *pError) {
|
|
return (NSSCKMDObject *) NULL;
|
|
}
|
|
#ifdef notdef
|
|
if (objClass == CKO_PUBLIC_KEY) {
|
|
return CKR_OK; /* fake public key creation, happens as a side effect of
|
|
* private key creation */
|
|
}
|
|
#endif
|
|
if (objClass == CKO_CERTIFICATE) {
|
|
io = nss_ckcapi_CreateCertificate(fwSession, pTemplate,
|
|
ulAttributeCount, pError);
|
|
} else if (objClass == CKO_PRIVATE_KEY) {
|
|
io = nss_ckcapi_CreatePrivateKey(fwSession, pTemplate,
|
|
ulAttributeCount, pError);
|
|
} else {
|
|
*pError = CKR_ATTRIBUTE_VALUE_INVALID;
|
|
}
|
|
|
|
if ((ckcapiInternalObject *)NULL == io) {
|
|
return (NSSCKMDObject *) NULL;
|
|
}
|
|
return nss_ckcapi_CreateMDObject(NULL, io, pError);
|
|
}
|