mirror of
https://gitlab.winehq.org/wine/wine-gecko.git
synced 2024-09-13 09:24:08 -07:00
2b43284096
r=nelson
1822 lines
49 KiB
C
1822 lines
49 KiB
C
/* ***** BEGIN LICENSE BLOCK *****
|
|
* Version: MPL 1.1/GPL 2.0/LGPL 2.1
|
|
*
|
|
* The contents of this file are subject to the Mozilla Public License Version
|
|
* 1.1 (the "License"); you may not use this file except in compliance with
|
|
* the License. You may obtain a copy of the License at
|
|
* http://www.mozilla.org/MPL/
|
|
*
|
|
* Software distributed under the License is distributed on an "AS IS" basis,
|
|
* WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License
|
|
* for the specific language governing rights and limitations under the
|
|
* License.
|
|
*
|
|
* The Original Code is the Netscape security libraries.
|
|
*
|
|
* The Initial Developer of the Original Code is
|
|
* Netscape Communications Corporation.
|
|
* Portions created by the Initial Developer are Copyright (C) 1994-2000
|
|
* the Initial Developer. All Rights Reserved.
|
|
*
|
|
* Contributor(s):
|
|
* Dr Vipul Gupta <vipul.gupta@sun.com>, and
|
|
* Douglas Stebila <douglas@stebila.ca>, Sun Microsystems Laboratories
|
|
*
|
|
* Alternatively, the contents of this file may be used under the terms of
|
|
* either the GNU General Public License Version 2 or later (the "GPL"), or
|
|
* the GNU Lesser General Public License Version 2.1 or later (the "LGPL"),
|
|
* in which case the provisions of the GPL or the LGPL are applicable instead
|
|
* of those above. If you wish to allow use of your version of this file only
|
|
* under the terms of either the GPL or the LGPL, and not to allow others to
|
|
* use your version of this file under the terms of the MPL, indicate your
|
|
* decision by deleting the provisions above and replace them with the notice
|
|
* and other provisions required by the GPL or the LGPL. If you do not delete
|
|
* the provisions above, a recipient may use your version of this file under
|
|
* the terms of any one of the MPL, the GPL or the LGPL.
|
|
*
|
|
* ***** END LICENSE BLOCK ***** */
|
|
/*
|
|
* This file manages object type indepentent functions.
|
|
*/
|
|
#include "seccomon.h"
|
|
#include "secmod.h"
|
|
#include "secmodi.h"
|
|
#include "secmodti.h"
|
|
#include "pkcs11.h"
|
|
#include "pkcs11t.h"
|
|
#include "pk11func.h"
|
|
#include "key.h"
|
|
#include "secitem.h"
|
|
#include "secerr.h"
|
|
#include "sslerr.h"
|
|
|
|
#define PK11_SEARCH_CHUNKSIZE 10
|
|
|
|
/*
|
|
* Build a block big enough to hold the data
|
|
*/
|
|
SECItem *
|
|
PK11_BlockData(SECItem *data,unsigned long size) {
|
|
SECItem *newData;
|
|
|
|
newData = (SECItem *)PORT_Alloc(sizeof(SECItem));
|
|
if (newData == NULL) return NULL;
|
|
|
|
newData->len = (data->len + (size-1))/size;
|
|
newData->len *= size;
|
|
|
|
newData->data = (unsigned char *) PORT_ZAlloc(newData->len);
|
|
if (newData->data == NULL) {
|
|
PORT_Free(newData);
|
|
return NULL;
|
|
}
|
|
PORT_Memset(newData->data,newData->len-data->len,newData->len);
|
|
PORT_Memcpy(newData->data,data->data,data->len);
|
|
return newData;
|
|
}
|
|
|
|
|
|
SECStatus
|
|
PK11_DestroyObject(PK11SlotInfo *slot,CK_OBJECT_HANDLE object) {
|
|
CK_RV crv;
|
|
|
|
PK11_EnterSlotMonitor(slot);
|
|
crv = PK11_GETTAB(slot)->C_DestroyObject(slot->session,object);
|
|
PK11_ExitSlotMonitor(slot);
|
|
if (crv != CKR_OK) {
|
|
return SECFailure;
|
|
}
|
|
return SECSuccess;
|
|
}
|
|
|
|
SECStatus
|
|
PK11_DestroyTokenObject(PK11SlotInfo *slot,CK_OBJECT_HANDLE object) {
|
|
CK_RV crv;
|
|
SECStatus rv = SECSuccess;
|
|
CK_SESSION_HANDLE rwsession;
|
|
|
|
|
|
rwsession = PK11_GetRWSession(slot);
|
|
if (rwsession == CK_INVALID_SESSION) {
|
|
PORT_SetError(SEC_ERROR_BAD_DATA);
|
|
return SECFailure;
|
|
}
|
|
|
|
crv = PK11_GETTAB(slot)->C_DestroyObject(rwsession,object);
|
|
if (crv != CKR_OK) {
|
|
rv = SECFailure;
|
|
PORT_SetError(PK11_MapError(crv));
|
|
}
|
|
PK11_RestoreROSession(slot,rwsession);
|
|
return rv;
|
|
}
|
|
|
|
/*
|
|
* Read in a single attribute into a SECItem. Allocate space for it with
|
|
* PORT_Alloc unless an arena is supplied. In the latter case use the arena
|
|
* to allocate the space.
|
|
*/
|
|
SECStatus
|
|
PK11_ReadAttribute(PK11SlotInfo *slot, CK_OBJECT_HANDLE id,
|
|
CK_ATTRIBUTE_TYPE type, PRArenaPool *arena, SECItem *result) {
|
|
CK_ATTRIBUTE attr = { 0, NULL, 0 };
|
|
CK_RV crv;
|
|
|
|
attr.type = type;
|
|
|
|
PK11_EnterSlotMonitor(slot);
|
|
crv = PK11_GETTAB(slot)->C_GetAttributeValue(slot->session,id,&attr,1);
|
|
if (crv != CKR_OK) {
|
|
PK11_ExitSlotMonitor(slot);
|
|
PORT_SetError(PK11_MapError(crv));
|
|
return SECFailure;
|
|
}
|
|
if (arena) {
|
|
attr.pValue = PORT_ArenaAlloc(arena,attr.ulValueLen);
|
|
} else {
|
|
attr.pValue = PORT_Alloc(attr.ulValueLen);
|
|
}
|
|
if (attr.pValue == NULL) {
|
|
PK11_ExitSlotMonitor(slot);
|
|
return SECFailure;
|
|
}
|
|
crv = PK11_GETTAB(slot)->C_GetAttributeValue(slot->session,id,&attr,1);
|
|
PK11_ExitSlotMonitor(slot);
|
|
if (crv != CKR_OK) {
|
|
PORT_SetError(PK11_MapError(crv));
|
|
if (!arena) PORT_Free(attr.pValue);
|
|
return SECFailure;
|
|
}
|
|
|
|
result->data = (unsigned char*)attr.pValue;
|
|
result->len = attr.ulValueLen;
|
|
|
|
return SECSuccess;
|
|
}
|
|
|
|
/*
|
|
* Read in a single attribute into As a Ulong.
|
|
*/
|
|
CK_ULONG
|
|
PK11_ReadULongAttribute(PK11SlotInfo *slot, CK_OBJECT_HANDLE id,
|
|
CK_ATTRIBUTE_TYPE type) {
|
|
CK_ATTRIBUTE attr;
|
|
CK_ULONG value = CK_UNAVAILABLE_INFORMATION;
|
|
CK_RV crv;
|
|
|
|
PK11_SETATTRS(&attr,type,&value,sizeof(value));
|
|
|
|
PK11_EnterSlotMonitor(slot);
|
|
crv = PK11_GETTAB(slot)->C_GetAttributeValue(slot->session,id,&attr,1);
|
|
PK11_ExitSlotMonitor(slot);
|
|
if (crv != CKR_OK) {
|
|
PORT_SetError(PK11_MapError(crv));
|
|
}
|
|
return value;
|
|
}
|
|
|
|
/*
|
|
* check to see if a bool has been set.
|
|
*/
|
|
CK_BBOOL
|
|
PK11_HasAttributeSet( PK11SlotInfo *slot, CK_OBJECT_HANDLE id,
|
|
CK_ATTRIBUTE_TYPE type )
|
|
{
|
|
CK_BBOOL ckvalue = CK_FALSE;
|
|
CK_ATTRIBUTE theTemplate;
|
|
CK_RV crv;
|
|
|
|
/* Prepare to retrieve the attribute. */
|
|
PK11_SETATTRS( &theTemplate, type, &ckvalue, sizeof( CK_BBOOL ) );
|
|
|
|
/* Retrieve attribute value. */
|
|
PK11_EnterSlotMonitor(slot);
|
|
crv = PK11_GETTAB( slot )->C_GetAttributeValue( slot->session, id,
|
|
&theTemplate, 1 );
|
|
PK11_ExitSlotMonitor(slot);
|
|
if( crv != CKR_OK ) {
|
|
PORT_SetError( PK11_MapError( crv ) );
|
|
return CK_FALSE;
|
|
}
|
|
|
|
return ckvalue;
|
|
}
|
|
|
|
/*
|
|
* returns a full list of attributes. Allocate space for them. If an arena is
|
|
* provided, allocate space out of the arena.
|
|
*/
|
|
CK_RV
|
|
PK11_GetAttributes(PRArenaPool *arena,PK11SlotInfo *slot,
|
|
CK_OBJECT_HANDLE obj,CK_ATTRIBUTE *attr, int count)
|
|
{
|
|
int i;
|
|
/* make pedantic happy... note that it's only used arena != NULL */
|
|
void *mark = NULL;
|
|
CK_RV crv;
|
|
PORT_Assert(slot->session != CK_INVALID_SESSION);
|
|
if (slot->session == CK_INVALID_SESSION)
|
|
return CKR_SESSION_HANDLE_INVALID;
|
|
|
|
/*
|
|
* first get all the lengths of the parameters.
|
|
*/
|
|
PK11_EnterSlotMonitor(slot);
|
|
crv = PK11_GETTAB(slot)->C_GetAttributeValue(slot->session,obj,attr,count);
|
|
if (crv != CKR_OK) {
|
|
PK11_ExitSlotMonitor(slot);
|
|
return crv;
|
|
}
|
|
|
|
if (arena) {
|
|
mark = PORT_ArenaMark(arena);
|
|
if (mark == NULL) return CKR_HOST_MEMORY;
|
|
}
|
|
|
|
/*
|
|
* now allocate space to store the results.
|
|
*/
|
|
for (i=0; i < count; i++) {
|
|
if (attr[i].ulValueLen == 0)
|
|
continue;
|
|
if (arena) {
|
|
attr[i].pValue = PORT_ArenaAlloc(arena,attr[i].ulValueLen);
|
|
if (attr[i].pValue == NULL) {
|
|
/* arena failures, just release the mark */
|
|
PORT_ArenaRelease(arena,mark);
|
|
PK11_ExitSlotMonitor(slot);
|
|
return CKR_HOST_MEMORY;
|
|
}
|
|
} else {
|
|
attr[i].pValue = PORT_Alloc(attr[i].ulValueLen);
|
|
if (attr[i].pValue == NULL) {
|
|
/* Separate malloc failures, loop to release what we have
|
|
* so far */
|
|
int j;
|
|
for (j= 0; j < i; j++) {
|
|
PORT_Free(attr[j].pValue);
|
|
/* don't give the caller pointers to freed memory */
|
|
attr[j].pValue = NULL;
|
|
}
|
|
PK11_ExitSlotMonitor(slot);
|
|
return CKR_HOST_MEMORY;
|
|
}
|
|
}
|
|
}
|
|
|
|
/*
|
|
* finally get the results.
|
|
*/
|
|
crv = PK11_GETTAB(slot)->C_GetAttributeValue(slot->session,obj,attr,count);
|
|
PK11_ExitSlotMonitor(slot);
|
|
if (crv != CKR_OK) {
|
|
if (arena) {
|
|
PORT_ArenaRelease(arena,mark);
|
|
} else {
|
|
for (i= 0; i < count; i++) {
|
|
PORT_Free(attr[i].pValue);
|
|
/* don't give the caller pointers to freed memory */
|
|
attr[i].pValue = NULL;
|
|
}
|
|
}
|
|
} else if (arena && mark) {
|
|
PORT_ArenaUnmark(arena,mark);
|
|
}
|
|
return crv;
|
|
}
|
|
|
|
PRBool
|
|
PK11_IsPermObject(PK11SlotInfo *slot, CK_OBJECT_HANDLE handle)
|
|
{
|
|
return (PRBool) PK11_HasAttributeSet(slot, handle, CKA_TOKEN);
|
|
}
|
|
|
|
char *
|
|
PK11_GetObjectNickname(PK11SlotInfo *slot, CK_OBJECT_HANDLE id)
|
|
{
|
|
char *nickname = NULL;
|
|
SECItem result;
|
|
SECStatus rv;
|
|
|
|
rv = PK11_ReadAttribute(slot,id,CKA_LABEL,NULL,&result);
|
|
if (rv != SECSuccess) {
|
|
return NULL;
|
|
}
|
|
|
|
nickname = PORT_ZAlloc(result.len+1);
|
|
if (nickname == NULL) {
|
|
PORT_Free(result.data);
|
|
return NULL;
|
|
}
|
|
PORT_Memcpy(nickname, result.data, result.len);
|
|
PORT_Free(result.data);
|
|
return nickname;
|
|
}
|
|
|
|
SECStatus
|
|
PK11_SetObjectNickname(PK11SlotInfo *slot, CK_OBJECT_HANDLE id,
|
|
const char *nickname)
|
|
{
|
|
int len = PORT_Strlen(nickname);
|
|
CK_ATTRIBUTE setTemplate;
|
|
CK_RV crv;
|
|
CK_SESSION_HANDLE rwsession;
|
|
|
|
if (len < 0) {
|
|
return SECFailure;
|
|
}
|
|
|
|
PK11_SETATTRS(&setTemplate, CKA_LABEL, (CK_CHAR *) nickname, len);
|
|
rwsession = PK11_GetRWSession(slot);
|
|
if (rwsession == CK_INVALID_SESSION) {
|
|
PORT_SetError(SEC_ERROR_BAD_DATA);
|
|
return SECFailure;
|
|
}
|
|
crv = PK11_GETTAB(slot)->C_SetAttributeValue(rwsession, id,
|
|
&setTemplate, 1);
|
|
PK11_RestoreROSession(slot, rwsession);
|
|
if (crv != CKR_OK) {
|
|
PORT_SetError(PK11_MapError(crv));
|
|
return SECFailure;
|
|
}
|
|
return SECSuccess;
|
|
}
|
|
|
|
/*
|
|
* strip leading zero's from key material
|
|
*/
|
|
void
|
|
pk11_SignedToUnsigned(CK_ATTRIBUTE *attrib) {
|
|
char *ptr = (char *)attrib->pValue;
|
|
unsigned long len = attrib->ulValueLen;
|
|
|
|
while (len && (*ptr == 0)) {
|
|
len--;
|
|
ptr++;
|
|
}
|
|
attrib->pValue = ptr;
|
|
attrib->ulValueLen = len;
|
|
}
|
|
|
|
/*
|
|
* get a new session on a slot. If we run out of session, use the slot's
|
|
* 'exclusive' session. In this case owner becomes false.
|
|
*/
|
|
CK_SESSION_HANDLE
|
|
pk11_GetNewSession(PK11SlotInfo *slot,PRBool *owner)
|
|
{
|
|
CK_SESSION_HANDLE session;
|
|
*owner = PR_TRUE;
|
|
if (!slot->isThreadSafe) PK11_EnterSlotMonitor(slot);
|
|
if ( PK11_GETTAB(slot)->C_OpenSession(slot->slotID,CKF_SERIAL_SESSION,
|
|
slot,pk11_notify,&session) != CKR_OK) {
|
|
*owner = PR_FALSE;
|
|
session = slot->session;
|
|
}
|
|
if (!slot->isThreadSafe) PK11_ExitSlotMonitor(slot);
|
|
|
|
return session;
|
|
}
|
|
|
|
void
|
|
pk11_CloseSession(PK11SlotInfo *slot,CK_SESSION_HANDLE session,PRBool owner)
|
|
{
|
|
if (!owner) return;
|
|
if (!slot->isThreadSafe) PK11_EnterSlotMonitor(slot);
|
|
(void) PK11_GETTAB(slot)->C_CloseSession(session);
|
|
if (!slot->isThreadSafe) PK11_ExitSlotMonitor(slot);
|
|
}
|
|
|
|
|
|
SECStatus
|
|
PK11_CreateNewObject(PK11SlotInfo *slot, CK_SESSION_HANDLE session,
|
|
const CK_ATTRIBUTE *theTemplate, int count,
|
|
PRBool token, CK_OBJECT_HANDLE *objectID)
|
|
{
|
|
CK_SESSION_HANDLE rwsession;
|
|
CK_RV crv;
|
|
SECStatus rv = SECSuccess;
|
|
|
|
rwsession = session;
|
|
if (token) {
|
|
rwsession = PK11_GetRWSession(slot);
|
|
} else if (rwsession == CK_INVALID_SESSION) {
|
|
rwsession = slot->session;
|
|
if (rwsession != CK_INVALID_SESSION)
|
|
PK11_EnterSlotMonitor(slot);
|
|
}
|
|
if (rwsession == CK_INVALID_SESSION) {
|
|
PORT_SetError(SEC_ERROR_BAD_DATA);
|
|
return SECFailure;
|
|
}
|
|
crv = PK11_GETTAB(slot)->C_CreateObject(rwsession,
|
|
/* cast away const :-( */ (CK_ATTRIBUTE_PTR)theTemplate,
|
|
count, objectID);
|
|
if(crv != CKR_OK) {
|
|
PORT_SetError( PK11_MapError(crv) );
|
|
rv = SECFailure;
|
|
}
|
|
if (token) {
|
|
PK11_RestoreROSession(slot, rwsession);
|
|
} else if (session == CK_INVALID_SESSION) {
|
|
PK11_ExitSlotMonitor(slot);
|
|
}
|
|
|
|
return rv;
|
|
}
|
|
|
|
|
|
/* This function may add a maximum of 9 attributes. */
|
|
unsigned int
|
|
pk11_OpFlagsToAttributes(CK_FLAGS flags, CK_ATTRIBUTE *attrs, CK_BBOOL *ckTrue)
|
|
{
|
|
|
|
const static CK_ATTRIBUTE_TYPE attrTypes[12] = {
|
|
CKA_ENCRYPT, CKA_DECRYPT, 0 /* DIGEST */, CKA_SIGN,
|
|
CKA_SIGN_RECOVER, CKA_VERIFY, CKA_VERIFY_RECOVER, 0 /* GEN */,
|
|
0 /* GEN PAIR */, CKA_WRAP, CKA_UNWRAP, CKA_DERIVE
|
|
};
|
|
|
|
const CK_ATTRIBUTE_TYPE *pType = attrTypes;
|
|
CK_ATTRIBUTE *attr = attrs;
|
|
CK_FLAGS test = CKF_ENCRYPT;
|
|
|
|
|
|
PR_ASSERT(!(flags & ~CKF_KEY_OPERATION_FLAGS));
|
|
flags &= CKF_KEY_OPERATION_FLAGS;
|
|
|
|
for (; flags && test <= CKF_DERIVE; test <<= 1, ++pType) {
|
|
if (test & flags) {
|
|
flags ^= test;
|
|
PR_ASSERT(*pType);
|
|
PK11_SETATTRS(attr, *pType, ckTrue, sizeof *ckTrue);
|
|
++attr;
|
|
}
|
|
}
|
|
return (attr - attrs);
|
|
}
|
|
|
|
/*
|
|
* Check for conflicting flags, for example, if both PK11_ATTR_PRIVATE
|
|
* and PK11_ATTR_PUBLIC are set.
|
|
*/
|
|
PRBool
|
|
pk11_BadAttrFlags(PK11AttrFlags attrFlags)
|
|
{
|
|
PK11AttrFlags trueFlags = attrFlags & 0x55555555;
|
|
PK11AttrFlags falseFlags = (attrFlags >> 1) & 0x55555555;
|
|
return ((trueFlags & falseFlags) != 0);
|
|
}
|
|
|
|
/*
|
|
* This function may add a maximum of 5 attributes.
|
|
* The caller must make sure the attribute flags don't have conflicts.
|
|
*/
|
|
unsigned int
|
|
pk11_AttrFlagsToAttributes(PK11AttrFlags attrFlags, CK_ATTRIBUTE *attrs,
|
|
CK_BBOOL *ckTrue, CK_BBOOL *ckFalse)
|
|
{
|
|
const static CK_ATTRIBUTE_TYPE attrTypes[5] = {
|
|
CKA_TOKEN, CKA_PRIVATE, CKA_MODIFIABLE, CKA_SENSITIVE,
|
|
CKA_EXTRACTABLE
|
|
};
|
|
|
|
const CK_ATTRIBUTE_TYPE *pType = attrTypes;
|
|
CK_ATTRIBUTE *attr = attrs;
|
|
PK11AttrFlags test = PK11_ATTR_TOKEN;
|
|
|
|
PR_ASSERT(!pk11_BadAttrFlags(attrFlags));
|
|
|
|
/* we test two related bitflags in each iteration */
|
|
for (; attrFlags && test <= PK11_ATTR_EXTRACTABLE; test <<= 2, ++pType) {
|
|
if (test & attrFlags) {
|
|
attrFlags ^= test;
|
|
PK11_SETATTRS(attr, *pType, ckTrue, sizeof *ckTrue);
|
|
++attr;
|
|
} else if ((test << 1) & attrFlags) {
|
|
attrFlags ^= (test << 1);
|
|
PK11_SETATTRS(attr, *pType, ckFalse, sizeof *ckFalse);
|
|
++attr;
|
|
}
|
|
}
|
|
return (attr - attrs);
|
|
}
|
|
|
|
/*
|
|
* Some non-compliant PKCS #11 vendors do not give us the modulus, so actually
|
|
* set up a signature to get the signaure length.
|
|
*/
|
|
static int
|
|
pk11_backupGetSignLength(SECKEYPrivateKey *key)
|
|
{
|
|
PK11SlotInfo *slot = key->pkcs11Slot;
|
|
CK_MECHANISM mech = {0, NULL, 0 };
|
|
PRBool owner = PR_TRUE;
|
|
CK_SESSION_HANDLE session;
|
|
CK_ULONG len;
|
|
CK_RV crv;
|
|
unsigned char h_data[20] = { 0 };
|
|
unsigned char buf[20]; /* obviously to small */
|
|
CK_ULONG smallLen = sizeof(buf);
|
|
|
|
mech.mechanism = PK11_MapSignKeyType(key->keyType);
|
|
|
|
session = pk11_GetNewSession(slot,&owner);
|
|
if (!owner || !(slot->isThreadSafe)) PK11_EnterSlotMonitor(slot);
|
|
crv = PK11_GETTAB(slot)->C_SignInit(session,&mech,key->pkcs11ID);
|
|
if (crv != CKR_OK) {
|
|
if (!owner || !(slot->isThreadSafe)) PK11_ExitSlotMonitor(slot);
|
|
pk11_CloseSession(slot,session,owner);
|
|
PORT_SetError( PK11_MapError(crv) );
|
|
return -1;
|
|
}
|
|
len = 0;
|
|
crv = PK11_GETTAB(slot)->C_Sign(session,h_data,sizeof(h_data),
|
|
NULL, &len);
|
|
/* now call C_Sign with too small a buffer to clear the session state */
|
|
(void) PK11_GETTAB(slot)->
|
|
C_Sign(session,h_data,sizeof(h_data),buf,&smallLen);
|
|
|
|
if (!owner || !(slot->isThreadSafe)) PK11_ExitSlotMonitor(slot);
|
|
pk11_CloseSession(slot,session,owner);
|
|
if (crv != CKR_OK) {
|
|
PORT_SetError( PK11_MapError(crv) );
|
|
return -1;
|
|
}
|
|
return len;
|
|
}
|
|
|
|
/*
|
|
* get the length of a signature object based on the key
|
|
*/
|
|
int
|
|
PK11_SignatureLen(SECKEYPrivateKey *key)
|
|
{
|
|
int val;
|
|
CK_ATTRIBUTE theTemplate = { CKA_EC_PARAMS, NULL, 0 };
|
|
SECItem params = {siBuffer, NULL, 0};
|
|
int length;
|
|
|
|
switch (key->keyType) {
|
|
case rsaKey:
|
|
val = PK11_GetPrivateModulusLen(key);
|
|
if (val == -1) {
|
|
return pk11_backupGetSignLength(key);
|
|
}
|
|
return (unsigned long) val;
|
|
|
|
case fortezzaKey:
|
|
case dsaKey:
|
|
return 40;
|
|
case ecKey:
|
|
if (PK11_GetAttributes(NULL, key->pkcs11Slot, key->pkcs11ID,
|
|
&theTemplate, 1) == CKR_OK) {
|
|
if (theTemplate.pValue != NULL) {
|
|
params.len = theTemplate.ulValueLen;
|
|
params.data = (unsigned char *) theTemplate.pValue;
|
|
length = SECKEY_ECParamsToBasePointOrderLen(¶ms);
|
|
PORT_Free(theTemplate.pValue);
|
|
if (length == 0) {
|
|
return pk11_backupGetSignLength(key);
|
|
}
|
|
length = ((length + 7)/8) * 2;
|
|
return length;
|
|
}
|
|
}
|
|
break;
|
|
default:
|
|
break;
|
|
}
|
|
PORT_SetError( SEC_ERROR_INVALID_KEY );
|
|
return 0;
|
|
}
|
|
|
|
/*
|
|
* copy a key (or any other object) on a token
|
|
*/
|
|
CK_OBJECT_HANDLE
|
|
PK11_CopyKey(PK11SlotInfo *slot, CK_OBJECT_HANDLE srcObject)
|
|
{
|
|
CK_OBJECT_HANDLE destObject;
|
|
CK_RV crv;
|
|
|
|
PK11_EnterSlotMonitor(slot);
|
|
crv = PK11_GETTAB(slot)->C_CopyObject(slot->session,srcObject,NULL,0,
|
|
&destObject);
|
|
PK11_ExitSlotMonitor(slot);
|
|
if (crv == CKR_OK) return destObject;
|
|
PORT_SetError( PK11_MapError(crv) );
|
|
return CK_INVALID_HANDLE;
|
|
}
|
|
|
|
PRBool
|
|
pk11_FindAttrInTemplate(CK_ATTRIBUTE *attr, unsigned int numAttrs,
|
|
CK_ATTRIBUTE_TYPE target)
|
|
{
|
|
for (; numAttrs > 0; ++attr, --numAttrs) {
|
|
if (attr->type == target)
|
|
return PR_TRUE;
|
|
}
|
|
return PR_FALSE;
|
|
}
|
|
|
|
/*
|
|
* Recover the Signed data. We need this because our old verify can't
|
|
* figure out which hash algorithm to use until we decryptted this.
|
|
*/
|
|
SECStatus
|
|
PK11_VerifyRecover(SECKEYPublicKey *key,
|
|
SECItem *sig, SECItem *dsig, void *wincx)
|
|
{
|
|
PK11SlotInfo *slot = key->pkcs11Slot;
|
|
CK_OBJECT_HANDLE id = key->pkcs11ID;
|
|
CK_MECHANISM mech = {0, NULL, 0 };
|
|
PRBool owner = PR_TRUE;
|
|
CK_SESSION_HANDLE session;
|
|
CK_ULONG len;
|
|
CK_RV crv;
|
|
|
|
mech.mechanism = PK11_MapSignKeyType(key->keyType);
|
|
|
|
if (slot == NULL) {
|
|
slot = PK11_GetBestSlot(mech.mechanism,wincx);
|
|
if (slot == NULL) {
|
|
PORT_SetError( SEC_ERROR_NO_MODULE );
|
|
return SECFailure;
|
|
}
|
|
id = PK11_ImportPublicKey(slot,key,PR_FALSE);
|
|
} else {
|
|
PK11_ReferenceSlot(slot);
|
|
}
|
|
|
|
if (id == CK_INVALID_HANDLE) {
|
|
PK11_FreeSlot(slot);
|
|
PORT_SetError( SEC_ERROR_BAD_KEY );
|
|
return SECFailure;
|
|
}
|
|
|
|
session = pk11_GetNewSession(slot,&owner);
|
|
if (!owner || !(slot->isThreadSafe)) PK11_EnterSlotMonitor(slot);
|
|
crv = PK11_GETTAB(slot)->C_VerifyRecoverInit(session,&mech,id);
|
|
if (crv != CKR_OK) {
|
|
if (!owner || !(slot->isThreadSafe)) PK11_ExitSlotMonitor(slot);
|
|
pk11_CloseSession(slot,session,owner);
|
|
PORT_SetError( PK11_MapError(crv) );
|
|
PK11_FreeSlot(slot);
|
|
return SECFailure;
|
|
}
|
|
len = dsig->len;
|
|
crv = PK11_GETTAB(slot)->C_VerifyRecover(session,sig->data,
|
|
sig->len, dsig->data, &len);
|
|
if (!owner || !(slot->isThreadSafe)) PK11_ExitSlotMonitor(slot);
|
|
pk11_CloseSession(slot,session,owner);
|
|
dsig->len = len;
|
|
if (crv != CKR_OK) {
|
|
PORT_SetError( PK11_MapError(crv) );
|
|
PK11_FreeSlot(slot);
|
|
return SECFailure;
|
|
}
|
|
PK11_FreeSlot(slot);
|
|
return SECSuccess;
|
|
}
|
|
|
|
/*
|
|
* verify a signature from its hash.
|
|
*/
|
|
SECStatus
|
|
PK11_Verify(SECKEYPublicKey *key, SECItem *sig, SECItem *hash, void *wincx)
|
|
{
|
|
PK11SlotInfo *slot = key->pkcs11Slot;
|
|
CK_OBJECT_HANDLE id = key->pkcs11ID;
|
|
CK_MECHANISM mech = {0, NULL, 0 };
|
|
PRBool owner = PR_TRUE;
|
|
CK_SESSION_HANDLE session;
|
|
CK_RV crv;
|
|
|
|
mech.mechanism = PK11_MapSignKeyType(key->keyType);
|
|
|
|
if (slot == NULL) {
|
|
slot = PK11_GetBestSlot(mech.mechanism,wincx);
|
|
|
|
if (slot == NULL) {
|
|
PORT_SetError( SEC_ERROR_NO_MODULE );
|
|
return SECFailure;
|
|
}
|
|
id = PK11_ImportPublicKey(slot,key,PR_FALSE);
|
|
|
|
} else {
|
|
PK11_ReferenceSlot(slot);
|
|
}
|
|
|
|
if (id == CK_INVALID_HANDLE) {
|
|
PK11_FreeSlot(slot);
|
|
PORT_SetError( SEC_ERROR_BAD_KEY );
|
|
return SECFailure;
|
|
}
|
|
|
|
session = pk11_GetNewSession(slot,&owner);
|
|
if (!owner || !(slot->isThreadSafe)) PK11_EnterSlotMonitor(slot);
|
|
crv = PK11_GETTAB(slot)->C_VerifyInit(session,&mech,id);
|
|
if (crv != CKR_OK) {
|
|
if (!owner || !(slot->isThreadSafe)) PK11_ExitSlotMonitor(slot);
|
|
pk11_CloseSession(slot,session,owner);
|
|
PK11_FreeSlot(slot);
|
|
PORT_SetError( PK11_MapError(crv) );
|
|
return SECFailure;
|
|
}
|
|
crv = PK11_GETTAB(slot)->C_Verify(session,hash->data,
|
|
hash->len, sig->data, sig->len);
|
|
if (!owner || !(slot->isThreadSafe)) PK11_ExitSlotMonitor(slot);
|
|
pk11_CloseSession(slot,session,owner);
|
|
PK11_FreeSlot(slot);
|
|
if (crv != CKR_OK) {
|
|
PORT_SetError( PK11_MapError(crv) );
|
|
return SECFailure;
|
|
}
|
|
return SECSuccess;
|
|
}
|
|
|
|
/*
|
|
* sign a hash. The algorithm is determined by the key.
|
|
*/
|
|
SECStatus
|
|
PK11_Sign(SECKEYPrivateKey *key, SECItem *sig, SECItem *hash)
|
|
{
|
|
PK11SlotInfo *slot = key->pkcs11Slot;
|
|
CK_MECHANISM mech = {0, NULL, 0 };
|
|
PRBool owner = PR_TRUE;
|
|
CK_SESSION_HANDLE session;
|
|
CK_ULONG len;
|
|
CK_RV crv;
|
|
|
|
mech.mechanism = PK11_MapSignKeyType(key->keyType);
|
|
|
|
if (SECKEY_HAS_ATTRIBUTE_SET(key,CKA_PRIVATE)) {
|
|
PK11_HandlePasswordCheck(slot, key->wincx);
|
|
}
|
|
|
|
session = pk11_GetNewSession(slot,&owner);
|
|
if (!owner || !(slot->isThreadSafe)) PK11_EnterSlotMonitor(slot);
|
|
crv = PK11_GETTAB(slot)->C_SignInit(session,&mech,key->pkcs11ID);
|
|
if (crv != CKR_OK) {
|
|
if (!owner || !(slot->isThreadSafe)) PK11_ExitSlotMonitor(slot);
|
|
pk11_CloseSession(slot,session,owner);
|
|
PORT_SetError( PK11_MapError(crv) );
|
|
return SECFailure;
|
|
}
|
|
len = sig->len;
|
|
crv = PK11_GETTAB(slot)->C_Sign(session,hash->data,
|
|
hash->len, sig->data, &len);
|
|
if (!owner || !(slot->isThreadSafe)) PK11_ExitSlotMonitor(slot);
|
|
pk11_CloseSession(slot,session,owner);
|
|
sig->len = len;
|
|
if (crv != CKR_OK) {
|
|
PORT_SetError( PK11_MapError(crv) );
|
|
return SECFailure;
|
|
}
|
|
return SECSuccess;
|
|
}
|
|
|
|
/*
|
|
* Now SSL 2.0 uses raw RSA stuff. These next to functions *must* use
|
|
* RSA keys, or they'll fail. We do the checks up front. If anyone comes
|
|
* up with a meaning for rawdecrypt for any other public key operation,
|
|
* then we need to move this check into some of PK11_PubDecrypt callers,
|
|
* (namely SSL 2.0).
|
|
*/
|
|
static SECStatus
|
|
pk11_PrivDecryptRaw(SECKEYPrivateKey *key, unsigned char *data,
|
|
unsigned *outLen, unsigned int maxLen, unsigned char *enc,
|
|
unsigned encLen, CK_MECHANISM_PTR mech)
|
|
{
|
|
PK11SlotInfo *slot = key->pkcs11Slot;
|
|
CK_ULONG out = maxLen;
|
|
PRBool owner = PR_TRUE;
|
|
CK_SESSION_HANDLE session;
|
|
CK_RV crv;
|
|
|
|
if (key->keyType != rsaKey) {
|
|
PORT_SetError( SEC_ERROR_INVALID_KEY );
|
|
return SECFailure;
|
|
}
|
|
|
|
/* Why do we do a PK11_handle check here? for simple
|
|
* decryption? .. because the user may have asked for 'ask always'
|
|
* and this is a private key operation. In practice, thought, it's mute
|
|
* since only servers wind up using this function */
|
|
if (SECKEY_HAS_ATTRIBUTE_SET(key,CKA_PRIVATE)) {
|
|
PK11_HandlePasswordCheck(slot, key->wincx);
|
|
}
|
|
session = pk11_GetNewSession(slot,&owner);
|
|
if (!owner || !(slot->isThreadSafe)) PK11_EnterSlotMonitor(slot);
|
|
crv = PK11_GETTAB(slot)->C_DecryptInit(session, mech, key->pkcs11ID);
|
|
if (crv != CKR_OK) {
|
|
if (!owner || !(slot->isThreadSafe)) PK11_ExitSlotMonitor(slot);
|
|
pk11_CloseSession(slot,session,owner);
|
|
PORT_SetError( PK11_MapError(crv) );
|
|
return SECFailure;
|
|
}
|
|
crv = PK11_GETTAB(slot)->C_Decrypt(session,enc, encLen, data, &out);
|
|
if (!owner || !(slot->isThreadSafe)) PK11_ExitSlotMonitor(slot);
|
|
pk11_CloseSession(slot,session,owner);
|
|
*outLen = out;
|
|
if (crv != CKR_OK) {
|
|
PORT_SetError( PK11_MapError(crv) );
|
|
return SECFailure;
|
|
}
|
|
return SECSuccess;
|
|
}
|
|
|
|
SECStatus
|
|
PK11_PubDecryptRaw(SECKEYPrivateKey *key, unsigned char *data,
|
|
unsigned *outLen, unsigned int maxLen, unsigned char *enc,
|
|
unsigned encLen)
|
|
{
|
|
CK_MECHANISM mech = {CKM_RSA_X_509, NULL, 0 };
|
|
return pk11_PrivDecryptRaw(key, data, outLen, maxLen, enc, encLen, &mech);
|
|
}
|
|
|
|
SECStatus
|
|
PK11_PrivDecryptPKCS1(SECKEYPrivateKey *key, unsigned char *data,
|
|
unsigned *outLen, unsigned int maxLen, unsigned char *enc,
|
|
unsigned encLen)
|
|
{
|
|
CK_MECHANISM mech = {CKM_RSA_PKCS, NULL, 0 };
|
|
return pk11_PrivDecryptRaw(key, data, outLen, maxLen, enc, encLen, &mech);
|
|
}
|
|
|
|
static SECStatus
|
|
pk11_PubEncryptRaw(SECKEYPublicKey *key, unsigned char *enc,
|
|
unsigned char *data, unsigned dataLen,
|
|
CK_MECHANISM_PTR mech, void *wincx)
|
|
{
|
|
PK11SlotInfo *slot;
|
|
CK_OBJECT_HANDLE id;
|
|
CK_ULONG out;
|
|
PRBool owner = PR_TRUE;
|
|
CK_SESSION_HANDLE session;
|
|
CK_RV crv;
|
|
|
|
if (!key || key->keyType != rsaKey) {
|
|
PORT_SetError( SEC_ERROR_BAD_KEY );
|
|
return SECFailure;
|
|
}
|
|
out = SECKEY_PublicKeyStrength(key);
|
|
|
|
slot = PK11_GetBestSlot(mech->mechanism, wincx);
|
|
if (slot == NULL) {
|
|
PORT_SetError( SEC_ERROR_NO_MODULE );
|
|
return SECFailure;
|
|
}
|
|
|
|
id = PK11_ImportPublicKey(slot,key,PR_FALSE);
|
|
|
|
if (id == CK_INVALID_HANDLE) {
|
|
PK11_FreeSlot(slot);
|
|
PORT_SetError( SEC_ERROR_BAD_KEY );
|
|
return SECFailure;
|
|
}
|
|
|
|
session = pk11_GetNewSession(slot,&owner);
|
|
if (!owner || !(slot->isThreadSafe)) PK11_EnterSlotMonitor(slot);
|
|
crv = PK11_GETTAB(slot)->C_EncryptInit(session, mech, id);
|
|
if (crv != CKR_OK) {
|
|
if (!owner || !(slot->isThreadSafe)) PK11_ExitSlotMonitor(slot);
|
|
pk11_CloseSession(slot,session,owner);
|
|
PK11_FreeSlot(slot);
|
|
PORT_SetError( PK11_MapError(crv) );
|
|
return SECFailure;
|
|
}
|
|
crv = PK11_GETTAB(slot)->C_Encrypt(session,data,dataLen,enc,&out);
|
|
if (!owner || !(slot->isThreadSafe)) PK11_ExitSlotMonitor(slot);
|
|
pk11_CloseSession(slot,session,owner);
|
|
PK11_FreeSlot(slot);
|
|
if (crv != CKR_OK) {
|
|
PORT_SetError( PK11_MapError(crv) );
|
|
return SECFailure;
|
|
}
|
|
return SECSuccess;
|
|
}
|
|
|
|
SECStatus
|
|
PK11_PubEncryptRaw(SECKEYPublicKey *key, unsigned char *enc,
|
|
unsigned char *data, unsigned dataLen, void *wincx)
|
|
{
|
|
CK_MECHANISM mech = {CKM_RSA_X_509, NULL, 0 };
|
|
return pk11_PubEncryptRaw(key, enc, data, dataLen, &mech, wincx);
|
|
}
|
|
|
|
SECStatus
|
|
PK11_PubEncryptPKCS1(SECKEYPublicKey *key, unsigned char *enc,
|
|
unsigned char *data, unsigned dataLen, void *wincx)
|
|
{
|
|
CK_MECHANISM mech = {CKM_RSA_PKCS, NULL, 0 };
|
|
return pk11_PubEncryptRaw(key, enc, data, dataLen, &mech, wincx);
|
|
}
|
|
|
|
SECKEYPrivateKey *
|
|
PK11_UnwrapPrivKey(PK11SlotInfo *slot, PK11SymKey *wrappingKey,
|
|
CK_MECHANISM_TYPE wrapType, SECItem *param,
|
|
SECItem *wrappedKey, SECItem *label,
|
|
SECItem *idValue, PRBool perm, PRBool sensitive,
|
|
CK_KEY_TYPE keyType, CK_ATTRIBUTE_TYPE *usage,
|
|
int usageCount, void *wincx)
|
|
{
|
|
CK_BBOOL cktrue = CK_TRUE;
|
|
CK_BBOOL ckfalse = CK_FALSE;
|
|
CK_OBJECT_CLASS keyClass = CKO_PRIVATE_KEY;
|
|
CK_ATTRIBUTE keyTemplate[15] ;
|
|
int templateCount = 0;
|
|
CK_OBJECT_HANDLE privKeyID;
|
|
CK_MECHANISM mechanism;
|
|
CK_ATTRIBUTE *attrs = keyTemplate;
|
|
SECItem *param_free = NULL, *ck_id;
|
|
CK_RV crv;
|
|
CK_SESSION_HANDLE rwsession;
|
|
PK11SymKey *newKey = NULL;
|
|
int i;
|
|
|
|
if(!slot || !wrappedKey || !idValue) {
|
|
/* SET AN ERROR!!! */
|
|
return NULL;
|
|
}
|
|
|
|
ck_id = PK11_MakeIDFromPubKey(idValue);
|
|
if(!ck_id) {
|
|
return NULL;
|
|
}
|
|
|
|
PK11_SETATTRS(attrs, CKA_TOKEN, perm ? &cktrue : &ckfalse,
|
|
sizeof(cktrue)); attrs++;
|
|
PK11_SETATTRS(attrs, CKA_CLASS, &keyClass, sizeof(keyClass)); attrs++;
|
|
PK11_SETATTRS(attrs, CKA_KEY_TYPE, &keyType, sizeof(keyType)); attrs++;
|
|
PK11_SETATTRS(attrs, CKA_PRIVATE, sensitive ? &cktrue : &ckfalse,
|
|
sizeof(cktrue)); attrs++;
|
|
PK11_SETATTRS(attrs, CKA_SENSITIVE, sensitive ? &cktrue : &ckfalse,
|
|
sizeof(cktrue)); attrs++;
|
|
if (label && label->data) {
|
|
PK11_SETATTRS(attrs, CKA_LABEL, label->data, label->len); attrs++;
|
|
}
|
|
PK11_SETATTRS(attrs, CKA_ID, ck_id->data, ck_id->len); attrs++;
|
|
for (i=0; i < usageCount; i++) {
|
|
PK11_SETATTRS(attrs, usage[i], &cktrue, sizeof(cktrue)); attrs++;
|
|
}
|
|
|
|
if (PK11_IsInternal(slot)) {
|
|
PK11_SETATTRS(attrs, CKA_NETSCAPE_DB, idValue->data,
|
|
idValue->len); attrs++;
|
|
}
|
|
|
|
templateCount = attrs - keyTemplate;
|
|
PR_ASSERT(templateCount <= (sizeof(keyTemplate) / sizeof(CK_ATTRIBUTE)) );
|
|
|
|
mechanism.mechanism = wrapType;
|
|
if(!param) param = param_free= PK11_ParamFromIV(wrapType, NULL);
|
|
if(param) {
|
|
mechanism.pParameter = param->data;
|
|
mechanism.ulParameterLen = param->len;
|
|
} else {
|
|
mechanism.pParameter = NULL;
|
|
mechanism.ulParameterLen = 0;
|
|
}
|
|
|
|
if (wrappingKey->slot != slot) {
|
|
newKey = pk11_CopyToSlot(slot,wrapType,CKA_UNWRAP,wrappingKey);
|
|
} else {
|
|
newKey = PK11_ReferenceSymKey(wrappingKey);
|
|
}
|
|
|
|
if (newKey) {
|
|
if (perm) {
|
|
/* Get RW Session will either lock the monitor if necessary,
|
|
* or return a thread safe session handle, or fail. */
|
|
rwsession = PK11_GetRWSession(slot);
|
|
} else {
|
|
rwsession = slot->session;
|
|
if (rwsession != CK_INVALID_SESSION)
|
|
PK11_EnterSlotMonitor(slot);
|
|
}
|
|
if (rwsession == CK_INVALID_SESSION) {
|
|
PK11_FreeSymKey(newKey);
|
|
PORT_SetError(SEC_ERROR_BAD_DATA);
|
|
return NULL;
|
|
}
|
|
crv = PK11_GETTAB(slot)->C_UnwrapKey(rwsession, &mechanism,
|
|
newKey->objectID,
|
|
wrappedKey->data,
|
|
wrappedKey->len, keyTemplate,
|
|
templateCount, &privKeyID);
|
|
|
|
if (perm) {
|
|
PK11_RestoreROSession(slot, rwsession);
|
|
} else {
|
|
PK11_ExitSlotMonitor(slot);
|
|
}
|
|
PK11_FreeSymKey(newKey);
|
|
} else {
|
|
crv = CKR_FUNCTION_NOT_SUPPORTED;
|
|
}
|
|
|
|
if(ck_id) {
|
|
SECITEM_FreeItem(ck_id, PR_TRUE);
|
|
ck_id = NULL;
|
|
}
|
|
|
|
if (crv != CKR_OK) {
|
|
/* we couldn't unwrap the key, use the internal module to do the
|
|
* unwrap, then load the new key into the token */
|
|
PK11SlotInfo *int_slot = PK11_GetInternalSlot();
|
|
|
|
if (int_slot && (slot != int_slot)) {
|
|
SECKEYPrivateKey *privKey = PK11_UnwrapPrivKey(int_slot,
|
|
wrappingKey, wrapType, param, wrappedKey, label,
|
|
idValue, PR_FALSE, PR_FALSE,
|
|
keyType, usage, usageCount, wincx);
|
|
if (privKey) {
|
|
SECKEYPrivateKey *newPrivKey = PK11_LoadPrivKey(slot,privKey,
|
|
NULL,perm,sensitive);
|
|
SECKEY_DestroyPrivateKey(privKey);
|
|
PK11_FreeSlot(int_slot);
|
|
return newPrivKey;
|
|
}
|
|
}
|
|
if (int_slot) PK11_FreeSlot(int_slot);
|
|
PORT_SetError( PK11_MapError(crv) );
|
|
return NULL;
|
|
}
|
|
return PK11_MakePrivKey(slot, nullKey, PR_FALSE, privKeyID, wincx);
|
|
}
|
|
|
|
/*
|
|
* Now we're going to wrap a SECKEYPrivateKey with a PK11SymKey
|
|
* The strategy is to get both keys to reside in the same slot,
|
|
* one that can perform the desired crypto mechanism and then
|
|
* call C_WrapKey after all the setup has taken place.
|
|
*/
|
|
SECStatus
|
|
PK11_WrapPrivKey(PK11SlotInfo *slot, PK11SymKey *wrappingKey,
|
|
SECKEYPrivateKey *privKey, CK_MECHANISM_TYPE wrapType,
|
|
SECItem *param, SECItem *wrappedKey, void *wincx)
|
|
{
|
|
PK11SlotInfo *privSlot = privKey->pkcs11Slot; /* The slot where
|
|
* the private key
|
|
* we are going to
|
|
* wrap lives.
|
|
*/
|
|
PK11SymKey *newSymKey = NULL;
|
|
SECKEYPrivateKey *newPrivKey = NULL;
|
|
SECItem *param_free = NULL;
|
|
CK_ULONG len = wrappedKey->len;
|
|
CK_MECHANISM mech;
|
|
CK_RV crv;
|
|
|
|
if (!privSlot || !PK11_DoesMechanism(privSlot, wrapType)) {
|
|
/* Figure out a slot that does the mechanism and try to import
|
|
* the private key onto that slot.
|
|
*/
|
|
PK11SlotInfo *int_slot = PK11_GetInternalSlot();
|
|
|
|
privSlot = int_slot; /* The private key has a new home */
|
|
newPrivKey = PK11_LoadPrivKey(privSlot,privKey,NULL,PR_FALSE,PR_FALSE);
|
|
/* newPrivKey has allocated its own reference to the slot, so it's
|
|
* safe until we destroy newPrivkey.
|
|
*/
|
|
PK11_FreeSlot(int_slot);
|
|
if (newPrivKey == NULL) {
|
|
return SECFailure;
|
|
}
|
|
privKey = newPrivKey;
|
|
}
|
|
|
|
if (privSlot != wrappingKey->slot) {
|
|
newSymKey = pk11_CopyToSlot (privSlot, wrapType, CKA_WRAP,
|
|
wrappingKey);
|
|
wrappingKey = newSymKey;
|
|
}
|
|
|
|
if (wrappingKey == NULL) {
|
|
if (newPrivKey) {
|
|
SECKEY_DestroyPrivateKey(newPrivKey);
|
|
}
|
|
return SECFailure;
|
|
}
|
|
mech.mechanism = wrapType;
|
|
if (!param) {
|
|
param = param_free = PK11_ParamFromIV(wrapType, NULL);
|
|
}
|
|
if (param) {
|
|
mech.pParameter = param->data;
|
|
mech.ulParameterLen = param->len;
|
|
} else {
|
|
mech.pParameter = NULL;
|
|
mech.ulParameterLen = 0;
|
|
}
|
|
|
|
PK11_EnterSlotMonitor(privSlot);
|
|
crv = PK11_GETTAB(privSlot)->C_WrapKey(privSlot->session, &mech,
|
|
wrappingKey->objectID,
|
|
privKey->pkcs11ID,
|
|
wrappedKey->data, &len);
|
|
PK11_ExitSlotMonitor(privSlot);
|
|
|
|
if (newSymKey) {
|
|
PK11_FreeSymKey(newSymKey);
|
|
}
|
|
if (newPrivKey) {
|
|
SECKEY_DestroyPrivateKey(newPrivKey);
|
|
}
|
|
if (param_free) {
|
|
SECITEM_FreeItem(param_free,PR_TRUE);
|
|
}
|
|
|
|
if (crv != CKR_OK) {
|
|
PORT_SetError( PK11_MapError(crv) );
|
|
return SECFailure;
|
|
}
|
|
|
|
wrappedKey->len = len;
|
|
return SECSuccess;
|
|
}
|
|
|
|
#if 0
|
|
/*
|
|
* Sample code relating to linked list returned by PK11_FindGenericObjects
|
|
*/
|
|
|
|
/*
|
|
* You can walk the list with the following code:
|
|
*/
|
|
firstObj = PK11_FindGenericObjects(slot, objClass);
|
|
for (thisObj=firstObj;
|
|
thisObj;
|
|
thisObj=PK11_GetNextGenericObject(thisObj)) {
|
|
/* operate on thisObj */
|
|
}
|
|
/*
|
|
* If you want a particular object from the list...
|
|
*/
|
|
firstObj = PK11_FindGenericObjects(slot, objClass);
|
|
for (thisObj=firstObj;
|
|
thisObj;
|
|
thisObj=PK11_GetNextGenericObject(thisObj)) {
|
|
if (isMyObj(thisObj)) {
|
|
if ( thisObj == firstObj) {
|
|
/* NOTE: firstObj could be NULL at this point */
|
|
firstObj = PK11_GetNextGenericObject(thsObj);
|
|
}
|
|
PK11_UnlinkGenericObject(thisObj);
|
|
myObj = thisObj;
|
|
break;
|
|
}
|
|
}
|
|
|
|
PK11_DestroyGenericObjects(firstObj);
|
|
|
|
/* use myObj */
|
|
|
|
PK11_DestroyGenericObject(myObj);
|
|
#endif /* sample code */
|
|
|
|
/*
|
|
* return a linked, non-circular list of generic objects.
|
|
* If you are only interested
|
|
* in one object, just use the first object in the list. To find the
|
|
* rest of the list use PK11_GetNextGenericObject() to return the next object.
|
|
*/
|
|
PK11GenericObject *
|
|
PK11_FindGenericObjects(PK11SlotInfo *slot, CK_OBJECT_CLASS objClass)
|
|
{
|
|
CK_ATTRIBUTE template[1];
|
|
CK_ATTRIBUTE *attrs = template;
|
|
CK_OBJECT_HANDLE *objectIDs = NULL;
|
|
PK11GenericObject *lastObj = NULL, *obj;
|
|
PK11GenericObject *firstObj = NULL;
|
|
int i, count = 0;
|
|
|
|
|
|
PK11_SETATTRS(attrs, CKA_CLASS, &objClass, sizeof(objClass)); attrs++;
|
|
|
|
objectIDs = pk11_FindObjectsByTemplate(slot,template,1,&count);
|
|
if (objectIDs == NULL) {
|
|
return NULL;
|
|
}
|
|
|
|
/* where we connect our object once we've created it.. */
|
|
for (i=0; i < count; i++) {
|
|
obj = PORT_New(PK11GenericObject);
|
|
if ( !obj ) {
|
|
if (firstObj) {
|
|
PK11_DestroyGenericObjects(firstObj);
|
|
}
|
|
PORT_Free(objectIDs);
|
|
return NULL;
|
|
}
|
|
/* initialize it */
|
|
obj->slot = PK11_ReferenceSlot(slot);
|
|
obj->objectID = objectIDs[i];
|
|
obj->next = NULL;
|
|
obj->prev = NULL;
|
|
|
|
/* link it in */
|
|
if (firstObj == NULL) {
|
|
firstObj = obj;
|
|
} else {
|
|
PK11_LinkGenericObject(lastObj, obj);
|
|
}
|
|
lastObj = obj;
|
|
}
|
|
PORT_Free(objectIDs);
|
|
return firstObj;
|
|
}
|
|
|
|
/*
|
|
* get the Next Object in the list.
|
|
*/
|
|
PK11GenericObject *
|
|
PK11_GetNextGenericObject(PK11GenericObject *object)
|
|
{
|
|
return object->next;
|
|
}
|
|
|
|
PK11GenericObject *
|
|
PK11_GetPrevGenericObject(PK11GenericObject *object)
|
|
{
|
|
return object->prev;
|
|
}
|
|
|
|
/*
|
|
* Link a single object into a new list.
|
|
* if the object is already in another list, remove it first.
|
|
*/
|
|
SECStatus
|
|
PK11_LinkGenericObject(PK11GenericObject *list, PK11GenericObject *object)
|
|
{
|
|
PK11_UnlinkGenericObject(object);
|
|
object->prev = list;
|
|
object->next = list->next;
|
|
list->next = object;
|
|
if (object->next != NULL) {
|
|
object->next->prev = object;
|
|
}
|
|
return SECSuccess;
|
|
}
|
|
|
|
/*
|
|
* remove an object from the list. If the object isn't already in
|
|
* a list unlink becomes a noop.
|
|
*/
|
|
SECStatus
|
|
PK11_UnlinkGenericObject(PK11GenericObject *object)
|
|
{
|
|
if (object->prev != NULL) {
|
|
object->prev->next = object->next;
|
|
}
|
|
if (object->next != NULL) {
|
|
object->next->prev = object->prev;
|
|
}
|
|
|
|
object->next = NULL;
|
|
object->prev = NULL;
|
|
return SECSuccess;
|
|
}
|
|
|
|
/*
|
|
* This function removes a single object from the list and destroys it.
|
|
* For an already unlinked object there is no difference between
|
|
* PK11_DestroyGenericObject and PK11_DestroyGenericObjects
|
|
*/
|
|
SECStatus
|
|
PK11_DestroyGenericObject(PK11GenericObject *object)
|
|
{
|
|
if (object == NULL) {
|
|
return SECSuccess;
|
|
}
|
|
|
|
PK11_UnlinkGenericObject(object);
|
|
if (object->slot) {
|
|
PK11_FreeSlot(object->slot);
|
|
}
|
|
PORT_Free(object);
|
|
return SECSuccess;
|
|
}
|
|
|
|
/*
|
|
* walk down a link list of generic objects destroying them.
|
|
* This will destroy all objects in a list that the object is linked into.
|
|
* (the list is traversed in both directions).
|
|
*/
|
|
SECStatus
|
|
PK11_DestroyGenericObjects(PK11GenericObject *objects)
|
|
{
|
|
PK11GenericObject *nextObject;
|
|
PK11GenericObject *prevObject;
|
|
|
|
if (objects == NULL) {
|
|
return SECSuccess;
|
|
}
|
|
|
|
nextObject = objects->next;
|
|
prevObject = objects->prev;
|
|
|
|
/* delete all the objects after it in the list */
|
|
for (; objects; objects = nextObject) {
|
|
nextObject = objects->next;
|
|
PK11_DestroyGenericObject(objects);
|
|
}
|
|
/* delete all the objects before it in the list */
|
|
for (objects = prevObject; objects; objects = prevObject) {
|
|
prevObject = objects->prev;
|
|
PK11_DestroyGenericObject(objects);
|
|
}
|
|
return SECSuccess;
|
|
}
|
|
|
|
|
|
/*
|
|
* Hand Create a new object and return the Generic object for our new object.
|
|
*/
|
|
PK11GenericObject *
|
|
PK11_CreateGenericObject(PK11SlotInfo *slot, const CK_ATTRIBUTE *pTemplate,
|
|
int count, PRBool token)
|
|
{
|
|
CK_OBJECT_HANDLE objectID;
|
|
PK11GenericObject *obj;
|
|
CK_RV crv;
|
|
|
|
PK11_EnterSlotMonitor(slot);
|
|
crv = PK11_CreateNewObject(slot, slot->session, pTemplate, count,
|
|
token, &objectID);
|
|
PK11_ExitSlotMonitor(slot);
|
|
if (crv != CKR_OK) {
|
|
PORT_SetError(PK11_MapError(crv));
|
|
return NULL;
|
|
}
|
|
|
|
obj = PORT_New(PK11GenericObject);
|
|
if ( !obj ) {
|
|
/* error set by PORT_New */
|
|
return NULL;
|
|
}
|
|
|
|
/* initialize it */
|
|
obj->slot = PK11_ReferenceSlot(slot);
|
|
obj->objectID = objectID;
|
|
obj->next = NULL;
|
|
obj->prev = NULL;
|
|
return obj;
|
|
}
|
|
|
|
/*
|
|
* Change an attribute on a raw object
|
|
*/
|
|
SECStatus
|
|
PK11_WriteRawAttribute(PK11ObjectType objType, void *objSpec,
|
|
CK_ATTRIBUTE_TYPE attrType, SECItem *item)
|
|
{
|
|
PK11SlotInfo *slot = NULL;
|
|
CK_OBJECT_HANDLE handle;
|
|
CK_ATTRIBUTE setTemplate;
|
|
CK_RV crv;
|
|
CK_SESSION_HANDLE rwsession;
|
|
|
|
switch (objType) {
|
|
case PK11_TypeGeneric:
|
|
slot = ((PK11GenericObject *)objSpec)->slot;
|
|
handle = ((PK11GenericObject *)objSpec)->objectID;
|
|
break;
|
|
case PK11_TypePrivKey:
|
|
slot = ((SECKEYPrivateKey *)objSpec)->pkcs11Slot;
|
|
handle = ((SECKEYPrivateKey *)objSpec)->pkcs11ID;
|
|
break;
|
|
case PK11_TypePubKey:
|
|
slot = ((SECKEYPublicKey *)objSpec)->pkcs11Slot;
|
|
handle = ((SECKEYPublicKey *)objSpec)->pkcs11ID;
|
|
break;
|
|
case PK11_TypeSymKey:
|
|
slot = ((PK11SymKey *)objSpec)->slot;
|
|
handle = ((PK11SymKey *)objSpec)->objectID;
|
|
break;
|
|
case PK11_TypeCert: /* don't handle cert case for now */
|
|
default:
|
|
break;
|
|
}
|
|
if (slot == NULL) {
|
|
PORT_SetError(SEC_ERROR_UNKNOWN_OBJECT_TYPE);
|
|
return SECFailure;
|
|
}
|
|
|
|
PK11_SETATTRS(&setTemplate, attrType, (CK_CHAR *) item->data, item->len);
|
|
rwsession = PK11_GetRWSession(slot);
|
|
if (rwsession == CK_INVALID_SESSION) {
|
|
PORT_SetError(SEC_ERROR_BAD_DATA);
|
|
return SECFailure;
|
|
}
|
|
crv = PK11_GETTAB(slot)->C_SetAttributeValue(rwsession, handle,
|
|
&setTemplate, 1);
|
|
PK11_RestoreROSession(slot, rwsession);
|
|
if (crv != CKR_OK) {
|
|
PORT_SetError(PK11_MapError(crv));
|
|
return SECFailure;
|
|
}
|
|
return SECSuccess;
|
|
}
|
|
|
|
|
|
SECStatus
|
|
PK11_ReadRawAttribute(PK11ObjectType objType, void *objSpec,
|
|
CK_ATTRIBUTE_TYPE attrType, SECItem *item)
|
|
{
|
|
PK11SlotInfo *slot = NULL;
|
|
CK_OBJECT_HANDLE handle;
|
|
|
|
switch (objType) {
|
|
case PK11_TypeGeneric:
|
|
slot = ((PK11GenericObject *)objSpec)->slot;
|
|
handle = ((PK11GenericObject *)objSpec)->objectID;
|
|
break;
|
|
case PK11_TypePrivKey:
|
|
slot = ((SECKEYPrivateKey *)objSpec)->pkcs11Slot;
|
|
handle = ((SECKEYPrivateKey *)objSpec)->pkcs11ID;
|
|
break;
|
|
case PK11_TypePubKey:
|
|
slot = ((SECKEYPublicKey *)objSpec)->pkcs11Slot;
|
|
handle = ((SECKEYPublicKey *)objSpec)->pkcs11ID;
|
|
break;
|
|
case PK11_TypeSymKey:
|
|
slot = ((PK11SymKey *)objSpec)->slot;
|
|
handle = ((PK11SymKey *)objSpec)->objectID;
|
|
break;
|
|
case PK11_TypeCert: /* don't handle cert case for now */
|
|
default:
|
|
break;
|
|
}
|
|
if (slot == NULL) {
|
|
PORT_SetError(SEC_ERROR_UNKNOWN_OBJECT_TYPE);
|
|
return SECFailure;
|
|
}
|
|
|
|
return PK11_ReadAttribute(slot, handle, attrType, NULL, item);
|
|
}
|
|
|
|
|
|
/*
|
|
* return the object handle that matches the template
|
|
*/
|
|
CK_OBJECT_HANDLE
|
|
pk11_FindObjectByTemplate(PK11SlotInfo *slot,CK_ATTRIBUTE *theTemplate,int tsize)
|
|
{
|
|
CK_OBJECT_HANDLE object;
|
|
CK_RV crv = CKR_SESSION_HANDLE_INVALID;
|
|
CK_ULONG objectCount;
|
|
|
|
/*
|
|
* issue the find
|
|
*/
|
|
PK11_EnterSlotMonitor(slot);
|
|
if (slot->session != CK_INVALID_SESSION) {
|
|
crv = PK11_GETTAB(slot)->C_FindObjectsInit(slot->session,
|
|
theTemplate, tsize);
|
|
}
|
|
if (crv != CKR_OK) {
|
|
PK11_ExitSlotMonitor(slot);
|
|
PORT_SetError( PK11_MapError(crv) );
|
|
return CK_INVALID_HANDLE;
|
|
}
|
|
|
|
crv=PK11_GETTAB(slot)->C_FindObjects(slot->session,&object,1,&objectCount);
|
|
PK11_GETTAB(slot)->C_FindObjectsFinal(slot->session);
|
|
PK11_ExitSlotMonitor(slot);
|
|
if ((crv != CKR_OK) || (objectCount < 1)) {
|
|
/* shouldn't use SSL_ERROR... here */
|
|
PORT_SetError( crv != CKR_OK ? PK11_MapError(crv) :
|
|
SSL_ERROR_NO_CERTIFICATE);
|
|
return CK_INVALID_HANDLE;
|
|
}
|
|
|
|
/* blow up if the PKCS #11 module returns us and invalid object handle */
|
|
PORT_Assert(object != CK_INVALID_HANDLE);
|
|
return object;
|
|
}
|
|
|
|
/*
|
|
* return all the object handles that matches the template
|
|
*/
|
|
CK_OBJECT_HANDLE *
|
|
pk11_FindObjectsByTemplate(PK11SlotInfo *slot, CK_ATTRIBUTE *findTemplate,
|
|
int templCount, int *object_count)
|
|
{
|
|
CK_OBJECT_HANDLE *objID = NULL;
|
|
CK_ULONG returned_count = 0;
|
|
CK_RV crv = CKR_SESSION_HANDLE_INVALID;
|
|
|
|
PK11_EnterSlotMonitor(slot);
|
|
if (slot->session != CK_INVALID_SESSION) {
|
|
crv = PK11_GETTAB(slot)->C_FindObjectsInit(slot->session,
|
|
findTemplate, templCount);
|
|
}
|
|
if (crv != CKR_OK) {
|
|
PK11_ExitSlotMonitor(slot);
|
|
PORT_SetError( PK11_MapError(crv) );
|
|
*object_count = -1;
|
|
return NULL;
|
|
}
|
|
|
|
|
|
/*
|
|
* collect all the Matching Objects
|
|
*/
|
|
do {
|
|
CK_OBJECT_HANDLE *oldObjID = objID;
|
|
|
|
if (objID == NULL) {
|
|
objID = (CK_OBJECT_HANDLE *) PORT_Alloc(sizeof(CK_OBJECT_HANDLE)*
|
|
(*object_count+ PK11_SEARCH_CHUNKSIZE));
|
|
} else {
|
|
objID = (CK_OBJECT_HANDLE *) PORT_Realloc(objID,
|
|
sizeof(CK_OBJECT_HANDLE)*(*object_count+PK11_SEARCH_CHUNKSIZE));
|
|
}
|
|
|
|
if (objID == NULL) {
|
|
if (oldObjID) PORT_Free(oldObjID);
|
|
break;
|
|
}
|
|
crv = PK11_GETTAB(slot)->C_FindObjects(slot->session,
|
|
&objID[*object_count],PK11_SEARCH_CHUNKSIZE,&returned_count);
|
|
if (crv != CKR_OK) {
|
|
PORT_SetError( PK11_MapError(crv) );
|
|
PORT_Free(objID);
|
|
objID = NULL;
|
|
break;
|
|
}
|
|
*object_count += returned_count;
|
|
} while (returned_count == PK11_SEARCH_CHUNKSIZE);
|
|
|
|
PK11_GETTAB(slot)->C_FindObjectsFinal(slot->session);
|
|
PK11_ExitSlotMonitor(slot);
|
|
|
|
if (objID && (*object_count == 0)) {
|
|
PORT_Free(objID);
|
|
return NULL;
|
|
}
|
|
if (objID == NULL) *object_count = -1;
|
|
return objID;
|
|
}
|
|
/*
|
|
* given a PKCS #11 object, match it's peer based on the KeyID. searchID
|
|
* is typically a privateKey or a certificate while the peer is the opposite
|
|
*/
|
|
CK_OBJECT_HANDLE
|
|
PK11_MatchItem(PK11SlotInfo *slot, CK_OBJECT_HANDLE searchID,
|
|
CK_OBJECT_CLASS matchclass)
|
|
{
|
|
CK_ATTRIBUTE theTemplate[] = {
|
|
{ CKA_ID, NULL, 0 },
|
|
{ CKA_CLASS, NULL, 0 }
|
|
};
|
|
/* if you change the array, change the variable below as well */
|
|
CK_ATTRIBUTE *keyclass = &theTemplate[1];
|
|
int tsize = sizeof(theTemplate)/sizeof(theTemplate[0]);
|
|
/* if you change the array, change the variable below as well */
|
|
CK_OBJECT_HANDLE peerID;
|
|
CK_OBJECT_HANDLE parent;
|
|
PRArenaPool *arena;
|
|
CK_RV crv;
|
|
|
|
/* now we need to create space for the public key */
|
|
arena = PORT_NewArena( DER_DEFAULT_CHUNKSIZE);
|
|
if (arena == NULL) return CK_INVALID_HANDLE;
|
|
|
|
crv = PK11_GetAttributes(arena,slot,searchID,theTemplate,tsize);
|
|
if (crv != CKR_OK) {
|
|
PORT_FreeArena(arena,PR_FALSE);
|
|
PORT_SetError( PK11_MapError(crv) );
|
|
return CK_INVALID_HANDLE;
|
|
}
|
|
|
|
if ((theTemplate[0].ulValueLen == 0) || (theTemplate[0].ulValueLen == -1)) {
|
|
PORT_FreeArena(arena,PR_FALSE);
|
|
if (matchclass == CKO_CERTIFICATE)
|
|
PORT_SetError(SEC_ERROR_BAD_KEY);
|
|
else
|
|
PORT_SetError(SEC_ERROR_NO_KEY);
|
|
return CK_INVALID_HANDLE;
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
* issue the find
|
|
*/
|
|
parent = *(CK_OBJECT_CLASS *)(keyclass->pValue);
|
|
*(CK_OBJECT_CLASS *)(keyclass->pValue) = matchclass;
|
|
|
|
peerID = pk11_FindObjectByTemplate(slot,theTemplate,tsize);
|
|
PORT_FreeArena(arena,PR_FALSE);
|
|
|
|
return peerID;
|
|
}
|
|
|
|
/*
|
|
* count the number of objects that match the template.
|
|
*/
|
|
int
|
|
PK11_NumberObjectsFor(PK11SlotInfo *slot, CK_ATTRIBUTE *findTemplate,
|
|
int templCount)
|
|
{
|
|
CK_OBJECT_HANDLE objID[PK11_SEARCH_CHUNKSIZE];
|
|
int object_count = 0;
|
|
CK_ULONG returned_count = 0;
|
|
CK_RV crv = CKR_SESSION_HANDLE_INVALID;
|
|
|
|
PK11_EnterSlotMonitor(slot);
|
|
if (slot->session != CK_INVALID_SESSION) {
|
|
crv = PK11_GETTAB(slot)->C_FindObjectsInit(slot->session,
|
|
findTemplate, templCount);
|
|
}
|
|
if (crv != CKR_OK) {
|
|
PK11_ExitSlotMonitor(slot);
|
|
PORT_SetError( PK11_MapError(crv) );
|
|
return object_count;
|
|
}
|
|
|
|
/*
|
|
* collect all the Matching Objects
|
|
*/
|
|
do {
|
|
crv = PK11_GETTAB(slot)->C_FindObjects(slot->session, objID,
|
|
PK11_SEARCH_CHUNKSIZE,
|
|
&returned_count);
|
|
if (crv != CKR_OK) {
|
|
PORT_SetError( PK11_MapError(crv) );
|
|
break;
|
|
}
|
|
object_count += returned_count;
|
|
} while (returned_count == PK11_SEARCH_CHUNKSIZE);
|
|
|
|
PK11_GETTAB(slot)->C_FindObjectsFinal(slot->session);
|
|
PK11_ExitSlotMonitor(slot);
|
|
return object_count;
|
|
}
|
|
|
|
/*
|
|
* Traverse all the objects in a given slot.
|
|
*/
|
|
SECStatus
|
|
PK11_TraverseSlot(PK11SlotInfo *slot, void *arg)
|
|
{
|
|
int i;
|
|
CK_OBJECT_HANDLE *objID = NULL;
|
|
int object_count = 0;
|
|
pk11TraverseSlot *slotcb = (pk11TraverseSlot*) arg;
|
|
|
|
objID = pk11_FindObjectsByTemplate(slot,slotcb->findTemplate,
|
|
slotcb->templateCount,&object_count);
|
|
|
|
/*Actually this isn't a failure... there just were no objs to be found*/
|
|
if (object_count == 0) {
|
|
return SECSuccess;
|
|
}
|
|
|
|
if (objID == NULL) {
|
|
return SECFailure;
|
|
}
|
|
|
|
for (i=0; i < object_count; i++) {
|
|
(*slotcb->callback)(slot,objID[i],slotcb->callbackArg);
|
|
}
|
|
PORT_Free(objID);
|
|
return SECSuccess;
|
|
}
|
|
|
|
/*
|
|
* Traverse all the objects in all slots.
|
|
*/
|
|
SECStatus
|
|
pk11_TraverseAllSlots( SECStatus (*callback)(PK11SlotInfo *,void *),
|
|
void *arg, PRBool forceLogin, void *wincx) {
|
|
PK11SlotList *list;
|
|
PK11SlotListElement *le;
|
|
SECStatus rv;
|
|
|
|
/* get them all! */
|
|
list = PK11_GetAllTokens(CKM_INVALID_MECHANISM,PR_FALSE,PR_FALSE,wincx);
|
|
if (list == NULL) return SECFailure;
|
|
|
|
/* look at each slot and authenticate as necessary */
|
|
for (le = list->head ; le; le = le->next) {
|
|
if (forceLogin) {
|
|
rv = pk11_AuthenticateUnfriendly(le->slot, PR_FALSE, wincx);
|
|
if (rv != SECSuccess) {
|
|
continue;
|
|
}
|
|
}
|
|
if (callback) {
|
|
(*callback)(le->slot,arg);
|
|
}
|
|
}
|
|
|
|
PK11_FreeSlotList(list);
|
|
|
|
return SECSuccess;
|
|
}
|
|
|
|
CK_OBJECT_HANDLE *
|
|
PK11_FindObjectsFromNickname(char *nickname,PK11SlotInfo **slotptr,
|
|
CK_OBJECT_CLASS objclass, int *returnCount, void *wincx)
|
|
{
|
|
char *tokenName;
|
|
char *delimit;
|
|
PK11SlotInfo *slot;
|
|
CK_OBJECT_HANDLE *objID;
|
|
CK_ATTRIBUTE findTemplate[] = {
|
|
{ CKA_LABEL, NULL, 0},
|
|
{ CKA_CLASS, NULL, 0},
|
|
};
|
|
int findCount = sizeof(findTemplate)/sizeof(findTemplate[0]);
|
|
SECStatus rv;
|
|
PK11_SETATTRS(&findTemplate[1], CKA_CLASS, &objclass, sizeof(objclass));
|
|
|
|
*slotptr = slot = NULL;
|
|
*returnCount = 0;
|
|
/* first find the slot associated with this nickname */
|
|
if ((delimit = PORT_Strchr(nickname,':')) != NULL) {
|
|
int len = delimit - nickname;
|
|
tokenName = (char*)PORT_Alloc(len+1);
|
|
PORT_Memcpy(tokenName,nickname,len);
|
|
tokenName[len] = 0;
|
|
|
|
slot = *slotptr = PK11_FindSlotByName(tokenName);
|
|
PORT_Free(tokenName);
|
|
/* if we couldn't find a slot, assume the nickname is an internal cert
|
|
* with no proceding slot name */
|
|
if (slot == NULL) {
|
|
slot = *slotptr = PK11_GetInternalKeySlot();
|
|
} else {
|
|
nickname = delimit+1;
|
|
}
|
|
} else {
|
|
*slotptr = slot = PK11_GetInternalKeySlot();
|
|
}
|
|
if (slot == NULL) {
|
|
return CK_INVALID_HANDLE;
|
|
}
|
|
|
|
rv = pk11_AuthenticateUnfriendly(slot, PR_TRUE, wincx);
|
|
if (rv != SECSuccess) {
|
|
PK11_FreeSlot(slot);
|
|
*slotptr = NULL;
|
|
return CK_INVALID_HANDLE;
|
|
}
|
|
|
|
findTemplate[0].pValue = nickname;
|
|
findTemplate[0].ulValueLen = PORT_Strlen(nickname);
|
|
objID = pk11_FindObjectsByTemplate(slot,findTemplate,findCount,returnCount);
|
|
if (objID == NULL) {
|
|
/* PKCS #11 isn't clear on whether or not the NULL is
|
|
* stored in the template.... try the find again with the
|
|
* full null terminated string. */
|
|
findTemplate[0].ulValueLen += 1;
|
|
objID = pk11_FindObjectsByTemplate(slot,findTemplate,findCount,
|
|
returnCount);
|
|
if (objID == NULL) {
|
|
/* Well that's the best we can do. It's just not here */
|
|
/* what about faked nicknames? */
|
|
PK11_FreeSlot(slot);
|
|
*slotptr = NULL;
|
|
*returnCount = 0;
|
|
}
|
|
}
|
|
|
|
return objID;
|
|
}
|
|
|
|
SECItem *
|
|
pk11_GetLowLevelKeyFromHandle(PK11SlotInfo *slot, CK_OBJECT_HANDLE handle)
|
|
{
|
|
CK_ATTRIBUTE theTemplate[] = {
|
|
{ CKA_ID, NULL, 0 },
|
|
};
|
|
int tsize = sizeof(theTemplate)/sizeof(theTemplate[0]);
|
|
CK_RV crv;
|
|
SECItem *item;
|
|
|
|
item = SECITEM_AllocItem(NULL, NULL, 0);
|
|
|
|
if (item == NULL) {
|
|
return NULL;
|
|
}
|
|
|
|
crv = PK11_GetAttributes(NULL,slot,handle,theTemplate,tsize);
|
|
if (crv != CKR_OK) {
|
|
SECITEM_FreeItem(item,PR_TRUE);
|
|
PORT_SetError( PK11_MapError(crv) );
|
|
return NULL;
|
|
}
|
|
|
|
item->data = (unsigned char*) theTemplate[0].pValue;
|
|
item->len =theTemplate[0].ulValueLen;
|
|
|
|
return item;
|
|
}
|
|
|