gecko/security/nss/lib/ckfw/capi/cobject.c

2306 lines
53 KiB
C

/* This Source Code Form is subject to the terms of the Mozilla Public
* License, v. 2.0. If a copy of the MPL was not distributed with this
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
#include "ckcapi.h"
#include "nssbase.h"
/*
* ckcapi/cobject.c
*
* This file implements the NSSCKMDObject object for the
* "nss to capi objects" cryptoki module.
*/
const CK_ATTRIBUTE_TYPE certAttrs[] = {
CKA_CLASS,
CKA_TOKEN,
CKA_PRIVATE,
CKA_MODIFIABLE,
CKA_LABEL,
CKA_CERTIFICATE_TYPE,
CKA_SUBJECT,
CKA_ISSUER,
CKA_SERIAL_NUMBER,
CKA_VALUE
};
const PRUint32 certAttrsCount = NSS_CKCAPI_ARRAY_SIZE(certAttrs);
/* private keys, for now only support RSA */
const CK_ATTRIBUTE_TYPE privKeyAttrs[] = {
CKA_CLASS,
CKA_TOKEN,
CKA_PRIVATE,
CKA_MODIFIABLE,
CKA_LABEL,
CKA_KEY_TYPE,
CKA_DERIVE,
CKA_LOCAL,
CKA_SUBJECT,
CKA_SENSITIVE,
CKA_DECRYPT,
CKA_SIGN,
CKA_SIGN_RECOVER,
CKA_UNWRAP,
CKA_EXTRACTABLE,
CKA_ALWAYS_SENSITIVE,
CKA_NEVER_EXTRACTABLE,
CKA_MODULUS,
CKA_PUBLIC_EXPONENT,
};
const PRUint32 privKeyAttrsCount = NSS_CKCAPI_ARRAY_SIZE(privKeyAttrs);
/* public keys, for now only support RSA */
const CK_ATTRIBUTE_TYPE pubKeyAttrs[] = {
CKA_CLASS,
CKA_TOKEN,
CKA_PRIVATE,
CKA_MODIFIABLE,
CKA_LABEL,
CKA_KEY_TYPE,
CKA_DERIVE,
CKA_LOCAL,
CKA_SUBJECT,
CKA_ENCRYPT,
CKA_VERIFY,
CKA_VERIFY_RECOVER,
CKA_WRAP,
CKA_MODULUS,
CKA_PUBLIC_EXPONENT,
};
const PRUint32 pubKeyAttrsCount = NSS_CKCAPI_ARRAY_SIZE(pubKeyAttrs);
static const CK_BBOOL ck_true = CK_TRUE;
static const CK_BBOOL ck_false = CK_FALSE;
static const CK_CERTIFICATE_TYPE ckc_x509 = CKC_X_509;
static const CK_KEY_TYPE ckk_rsa = CKK_RSA;
static const CK_OBJECT_CLASS cko_certificate = CKO_CERTIFICATE;
static const CK_OBJECT_CLASS cko_private_key = CKO_PRIVATE_KEY;
static const CK_OBJECT_CLASS cko_public_key = CKO_PUBLIC_KEY;
static const NSSItem ckcapi_trueItem = {
(void *)&ck_true, (PRUint32)sizeof(CK_BBOOL) };
static const NSSItem ckcapi_falseItem = {
(void *)&ck_false, (PRUint32)sizeof(CK_BBOOL) };
static const NSSItem ckcapi_x509Item = {
(void *)&ckc_x509, (PRUint32)sizeof(CK_CERTIFICATE_TYPE) };
static const NSSItem ckcapi_rsaItem = {
(void *)&ckk_rsa, (PRUint32)sizeof(CK_KEY_TYPE) };
static const NSSItem ckcapi_certClassItem = {
(void *)&cko_certificate, (PRUint32)sizeof(CK_OBJECT_CLASS) };
static const NSSItem ckcapi_privKeyClassItem = {
(void *)&cko_private_key, (PRUint32)sizeof(CK_OBJECT_CLASS) };
static const NSSItem ckcapi_pubKeyClassItem = {
(void *)&cko_public_key, (PRUint32)sizeof(CK_OBJECT_CLASS) };
static const NSSItem ckcapi_emptyItem = {
(void *)&ck_true, 0};
/*
* these are utilities. The chould be moved to a new utilities file.
*/
/*
* unwrap a single DER value
*/
unsigned char *
nss_ckcapi_DERUnwrap
(
unsigned char *src,
unsigned int size,
unsigned int *outSize,
unsigned char **next
)
{
unsigned char *start = src;
unsigned char *end = src+size;
unsigned int len = 0;
/* initialize error condition return values */
*outSize = 0;
if (next) {
*next = src;
}
if (size < 2) {
return start;
}
src++; /* skip the tag -- should check it against an expected value! */
len = (unsigned) *src++;
if (len & 0x80) {
unsigned int count = len & 0x7f;
len = 0;
if (count+2 > size) {
return start;
}
while (count-- > 0) {
len = (len << 8) | (unsigned) *src++;
}
}
if (len + (src-start) > size) {
return start;
}
if (next) {
*next = src+len;
}
*outSize = len;
return src;
}
/*
* convert a PKCS #11 bytestrin into a CK_ULONG, the byte stream must be
* less than sizeof (CK_ULONG).
*/
CK_ULONG
nss_ckcapi_DataToInt
(
NSSItem *data,
CK_RV *pError
)
{
CK_ULONG value = 0;
unsigned long count = data->size;
unsigned char *dataPtr = data->data;
unsigned long size = 0;
*pError = CKR_OK;
while (count--) {
value = value << 8;
value = value + *dataPtr++;
if (size || value) {
size++;
}
}
if (size > sizeof(CK_ULONG)) {
*pError = CKR_ATTRIBUTE_VALUE_INVALID;
}
return value;
}
/*
* convert a CK_ULONG to a bytestream. Data is stored in the buffer 'buf'
* and must be at least CK_ULONG. Caller must provide buf.
*/
CK_ULONG
nss_ckcapi_IntToData
(
CK_ULONG value,
NSSItem *data,
unsigned char *dataPtr,
CK_RV *pError
)
{
unsigned long count = 0;
unsigned long i;
#define SHIFT ((sizeof(CK_ULONG)-1)*8)
PRBool first = 0;
*pError = CKR_OK;
data->data = dataPtr;
for (i=0; i < sizeof(CK_ULONG); i++) {
unsigned char digit = (unsigned char)((value >> SHIFT) & 0xff);
value = value << 8;
/* drop leading zero bytes */
if (first && (0 == digit)) {
continue;
}
*dataPtr++ = digit;
count++;
}
data->size = count;
return count;
}
/*
* get an attribute from a template. Value is returned in NSS item.
* data for the item is owned by the template.
*/
CK_RV
nss_ckcapi_GetAttribute
(
CK_ATTRIBUTE_TYPE type,
CK_ATTRIBUTE *template,
CK_ULONG templateSize,
NSSItem *item
)
{
CK_ULONG i;
for (i=0; i < templateSize; i++) {
if (template[i].type == type) {
item->data = template[i].pValue;
item->size = template[i].ulValueLen;
return CKR_OK;
}
}
return CKR_TEMPLATE_INCOMPLETE;
}
/*
* get an attribute which is type CK_ULONG.
*/
CK_ULONG
nss_ckcapi_GetULongAttribute
(
CK_ATTRIBUTE_TYPE type,
CK_ATTRIBUTE *template,
CK_ULONG templateSize,
CK_RV *pError
)
{
NSSItem item;
*pError = nss_ckcapi_GetAttribute(type, template, templateSize, &item);
if (CKR_OK != *pError) {
return (CK_ULONG) 0;
}
if (item.size != sizeof(CK_ULONG)) {
*pError = CKR_ATTRIBUTE_VALUE_INVALID;
return (CK_ULONG) 0;
}
return *(CK_ULONG *)item.data;
}
/*
* get an attribute which is type CK_BBOOL.
*/
CK_BBOOL
nss_ckcapi_GetBoolAttribute
(
CK_ATTRIBUTE_TYPE type,
CK_ATTRIBUTE *template,
CK_ULONG templateSize,
CK_RV *pError
)
{
NSSItem item;
*pError = nss_ckcapi_GetAttribute(type, template, templateSize, &item);
if (CKR_OK != *pError) {
return (CK_BBOOL) 0;
}
if (item.size != sizeof(CK_BBOOL)) {
*pError = CKR_ATTRIBUTE_VALUE_INVALID;
return (CK_BBOOL) 0;
}
return *(CK_BBOOL *)item.data;
}
/*
* get an attribute which is type CK_BBOOL.
*/
char *
nss_ckcapi_GetStringAttribute
(
CK_ATTRIBUTE_TYPE type,
CK_ATTRIBUTE *template,
CK_ULONG templateSize,
CK_RV *pError
)
{
NSSItem item;
char *str;
/* get the attribute */
*pError = nss_ckcapi_GetAttribute(type, template, templateSize, &item);
if (CKR_OK != *pError) {
return (char *)NULL;
}
/* make sure it is null terminated */
str = nss_ZNEWARRAY(NULL, char, item.size+1);
if ((char *)NULL == str) {
*pError = CKR_HOST_MEMORY;
return (char *)NULL;
}
nsslibc_memcpy(str, item.data, item.size);
str[item.size] = 0;
return str;
}
/*
* Return the size in bytes of a wide string, including the terminating null
* character
*/
int
nss_ckcapi_WideSize
(
LPCWSTR wide
)
{
DWORD size;
if ((LPWSTR)NULL == wide) {
return 0;
}
size = wcslen(wide)+1;
return size*sizeof(WCHAR);
}
/*
* Covert a Unicode wide character string to a UTF8 string
*/
char *
nss_ckcapi_WideToUTF8
(
LPCWSTR wide
)
{
DWORD size;
char *buf;
if ((LPWSTR)NULL == wide) {
return (char *)NULL;
}
size = WideCharToMultiByte(CP_UTF8, 0, wide, -1, NULL, 0, NULL, 0);
if (size == 0) {
return (char *)NULL;
}
buf = nss_ZNEWARRAY(NULL, char, size);
size = WideCharToMultiByte(CP_UTF8, 0, wide, -1, buf, size, NULL, 0);
if (size == 0) {
nss_ZFreeIf(buf);
return (char *)NULL;
}
return buf;
}
/*
* Return a Wide String duplicated with nss allocated memory.
*/
LPWSTR
nss_ckcapi_WideDup
(
LPCWSTR wide
)
{
DWORD len;
LPWSTR buf;
if ((LPWSTR)NULL == wide) {
return (LPWSTR)NULL;
}
len = wcslen(wide)+1;
buf = nss_ZNEWARRAY(NULL, WCHAR, len);
if ((LPWSTR) NULL == buf) {
return buf;
}
nsslibc_memcpy(buf, wide, len*sizeof(WCHAR));
return buf;
}
/*
* Covert a UTF8 string to Unicode wide character
*/
LPWSTR
nss_ckcapi_UTF8ToWide
(
char *buf
)
{
DWORD size;
LPWSTR wide;
if ((char *)NULL == buf) {
return (LPWSTR) NULL;
}
size = MultiByteToWideChar(CP_UTF8, 0, buf, -1, NULL, 0);
if (size == 0) {
return (LPWSTR) NULL;
}
wide = nss_ZNEWARRAY(NULL, WCHAR, size);
size = MultiByteToWideChar(CP_UTF8, 0, buf, -1, wide, size);
if (size == 0) {
nss_ZFreeIf(wide);
return (LPWSTR) NULL;
}
return wide;
}
/*
* keep all the knowlege of how the internalObject is laid out in this function
*
* nss_ckcapi_FetchKeyContainer
*
* fetches the Provider container and info as well as a key handle for a
* private key. If something other than a private key is passed in,
* this function fails with CKR_KEY_TYPE_INCONSISTENT
*/
NSS_EXTERN CK_RV
nss_ckcapi_FetchKeyContainer
(
ckcapiInternalObject *iKey,
HCRYPTPROV *hProv,
DWORD *keySpec,
HCRYPTKEY *hKey
)
{
ckcapiCertObject *co;
ckcapiKeyObject *ko;
BOOL rc, dummy;
DWORD msError;
switch (iKey->type) {
default:
case ckcapiRaw:
/* can't have raw private keys */
return CKR_KEY_TYPE_INCONSISTENT;
case ckcapiCert:
if (iKey->objClass != CKO_PRIVATE_KEY) {
/* Only private keys have private key provider handles */
return CKR_KEY_TYPE_INCONSISTENT;
}
co = &iKey->u.cert;
/* OK, get the Provider */
rc = CryptAcquireCertificatePrivateKey(co->certContext,
CRYPT_ACQUIRE_CACHE_FLAG|CRYPT_ACQUIRE_COMPARE_KEY_FLAG, NULL, hProv,
keySpec, &dummy);
if (!rc) {
goto loser;
}
break;
case ckcapiBareKey:
if (iKey->objClass != CKO_PRIVATE_KEY) {
/* Only private keys have private key provider handles */
return CKR_KEY_TYPE_INCONSISTENT;
}
ko = &iKey->u.key;
/* OK, get the Provider */
if (0 == ko->hProv) {
rc = CryptAcquireContext(hProv,
ko->containerName,
ko->provName,
ko->provInfo.dwProvType , 0);
if (!rc) {
goto loser;
}
} else {
*hProv = ko->hProv;
}
*keySpec = ko->provInfo.dwKeySpec;
break;
}
/* and get the crypto handle */
rc = CryptGetUserKey(*hProv, *keySpec, hKey);
if (!rc) {
goto loser;
}
return CKR_OK;
loser:
/* map the microsoft error before leaving */
msError = GetLastError();
switch (msError) {
case ERROR_INVALID_HANDLE:
case ERROR_INVALID_PARAMETER:
case NTE_BAD_KEY:
case NTE_NO_KEY:
case NTE_BAD_PUBLIC_KEY:
case NTE_BAD_KEYSET:
case NTE_KEYSET_NOT_DEF:
return CKR_KEY_TYPE_INCONSISTENT;
case NTE_BAD_UID:
case NTE_KEYSET_ENTRY_BAD:
return CKR_DEVICE_ERROR;
}
return CKR_GENERAL_ERROR;
}
/*
* take a DER PUBLIC Key block and return the modulus and exponent
*/
static void
ckcapi_CertPopulateModulusExponent
(
ckcapiInternalObject *io
)
{
ckcapiKeyParams *kp = &io->u.cert.key;
PCCERT_CONTEXT certContext = io->u.cert.certContext;
unsigned char *pkData =
certContext->pCertInfo->SubjectPublicKeyInfo.PublicKey.pbData;
unsigned int size=
certContext->pCertInfo->SubjectPublicKeyInfo.PublicKey.cbData;
unsigned int newSize;
unsigned char *ptr, *newptr;
/* find the start of the modulus -- this will not give good results if
* the key isn't an rsa key! */
ptr = nss_ckcapi_DERUnwrap(pkData, size, &newSize, NULL);
kp->modulus.data = nss_ckcapi_DERUnwrap(ptr, newSize,
&kp->modulus.size, &newptr);
/* changed from signed to unsigned int */
if (0 == *(char *)kp->modulus.data) {
kp->modulus.data = ((char *)kp->modulus.data)+1;
kp->modulus.size = kp->modulus.size - 1;
}
/* changed from signed to unsigned int */
kp->exponent.data = nss_ckcapi_DERUnwrap(newptr, (newptr-ptr)+newSize,
&kp->exponent.size, NULL);
if (0 == *(char *)kp->exponent.data) {
kp->exponent.data = ((char *)kp->exponent.data)+1;
kp->exponent.size = kp->exponent.size - 1;
}
return;
}
typedef struct _CAPI_RSA_KEY_BLOB {
PUBLICKEYSTRUC header;
RSAPUBKEY rsa;
char data[1];
} CAPI_RSA_KEY_BLOB;
#define CAPI_MODULUS_OFFSET(modSize) 0
#define CAPI_PRIME_1_OFFSET(modSize) (modSize)
#define CAPI_PRIME_2_OFFSET(modSize) ((modSize)+(modSize)/2)
#define CAPI_EXPONENT_1_OFFSET(modSize) ((modSize)*2)
#define CAPI_EXPONENT_2_OFFSET(modSize) ((modSize)*2+(modSize)/2)
#define CAPI_COEFFICIENT_OFFSET(modSize) ((modSize)*3)
#define CAPI_PRIVATE_EXP_OFFSET(modSize) ((modSize)*3+(modSize)/2)
void
ckcapi_FetchPublicKey
(
ckcapiInternalObject *io
)
{
ckcapiKeyParams *kp;
HCRYPTPROV hProv;
DWORD keySpec;
HCRYPTKEY hKey = 0;
CK_RV error;
DWORD bufLen;
BOOL rc;
unsigned long modulus;
char *buf = NULL;
CAPI_RSA_KEY_BLOB *blob;
error = nss_ckcapi_FetchKeyContainer(io, &hProv, &keySpec, &hKey);
if (CKR_OK != error) {
goto loser;
}
kp = (ckcapiCert == io->type) ? &io->u.cert.key : &io->u.key.key;
rc = CryptExportKey(hKey, 0, PUBLICKEYBLOB, 0, buf, &bufLen);
if (!rc) {
goto loser;
}
buf = nss_ZNEWARRAY(NULL, char, bufLen);
rc = CryptExportKey(hKey, 0, PUBLICKEYBLOB, 0, buf, &bufLen);
if (!rc) {
goto loser;
}
/* validate the blob */
blob = (CAPI_RSA_KEY_BLOB *)buf;
if ((PUBLICKEYBLOB != blob->header.bType) ||
(0x02 != blob->header.bVersion) ||
(0x31415352 != blob->rsa.magic)) {
goto loser;
}
modulus = blob->rsa.bitlen/8;
kp->pubKey = buf;
buf = NULL;
kp->modulus.data = &blob->data[CAPI_MODULUS_OFFSET(modulus)];
kp->modulus.size = modulus;
ckcapi_ReverseData(&kp->modulus);
nss_ckcapi_IntToData(blob->rsa.pubexp, &kp->exponent,
kp->publicExponentData, &error);
loser:
nss_ZFreeIf(buf);
if (0 != hKey) {
CryptDestroyKey(hKey);
}
return;
}
void
ckcapi_FetchPrivateKey
(
ckcapiInternalObject *io
)
{
ckcapiKeyParams *kp;
HCRYPTPROV hProv;
DWORD keySpec;
HCRYPTKEY hKey = 0;
CK_RV error;
DWORD bufLen;
BOOL rc;
unsigned long modulus;
char *buf = NULL;
CAPI_RSA_KEY_BLOB *blob;
error = nss_ckcapi_FetchKeyContainer(io, &hProv, &keySpec, &hKey);
if (CKR_OK != error) {
goto loser;
}
kp = (ckcapiCert == io->type) ? &io->u.cert.key : &io->u.key.key;
rc = CryptExportKey(hKey, 0, PRIVATEKEYBLOB, 0, buf, &bufLen);
if (!rc) {
goto loser;
}
buf = nss_ZNEWARRAY(NULL, char, bufLen);
rc = CryptExportKey(hKey, 0, PRIVATEKEYBLOB, 0, buf, &bufLen);
if (!rc) {
goto loser;
}
/* validate the blob */
blob = (CAPI_RSA_KEY_BLOB *)buf;
if ((PRIVATEKEYBLOB != blob->header.bType) ||
(0x02 != blob->header.bVersion) ||
(0x32415352 != blob->rsa.magic)) {
goto loser;
}
modulus = blob->rsa.bitlen/8;
kp->privateKey = buf;
buf = NULL;
kp->privateExponent.data = &blob->data[CAPI_PRIVATE_EXP_OFFSET(modulus)];
kp->privateExponent.size = modulus;
ckcapi_ReverseData(&kp->privateExponent);
kp->prime1.data = &blob->data[CAPI_PRIME_1_OFFSET(modulus)];
kp->prime1.size = modulus/2;
ckcapi_ReverseData(&kp->prime1);
kp->prime2.data = &blob->data[CAPI_PRIME_2_OFFSET(modulus)];
kp->prime2.size = modulus/2;
ckcapi_ReverseData(&kp->prime2);
kp->exponent1.data = &blob->data[CAPI_EXPONENT_1_OFFSET(modulus)];
kp->exponent1.size = modulus/2;
ckcapi_ReverseData(&kp->exponent1);
kp->exponent2.data = &blob->data[CAPI_EXPONENT_2_OFFSET(modulus)];
kp->exponent2.size = modulus/2;
ckcapi_ReverseData(&kp->exponent2);
kp->coefficient.data = &blob->data[CAPI_COEFFICIENT_OFFSET(modulus)];
kp->coefficient.size = modulus/2;
ckcapi_ReverseData(&kp->coefficient);
loser:
nss_ZFreeIf(buf);
if (0 != hKey) {
CryptDestroyKey(hKey);
}
return;
}
void
ckcapi_PopulateModulusExponent
(
ckcapiInternalObject *io
)
{
if (ckcapiCert == io->type) {
ckcapi_CertPopulateModulusExponent(io);
} else {
ckcapi_FetchPublicKey(io);
}
return;
}
/*
* fetch the friendly name attribute.
* can only be called with ckcapiCert type objects!
*/
void
ckcapi_FetchLabel
(
ckcapiInternalObject *io
)
{
ckcapiCertObject *co = &io->u.cert;
char *label;
PCCERT_CONTEXT certContext = io->u.cert.certContext;
char labelDataUTF16[128];
DWORD size = sizeof(labelDataUTF16);
DWORD size8 = sizeof(co->labelData);
BOOL rv;
rv = CertGetCertificateContextProperty(certContext,
CERT_FRIENDLY_NAME_PROP_ID, labelDataUTF16, &size);
if (rv) {
co->labelData = nss_ckcapi_WideToUTF8((LPCWSTR)labelDataUTF16);
if ((CHAR *)NULL == co->labelData) {
rv = 0;
} else {
size = strlen(co->labelData);
}
}
label = co->labelData;
/* we are presuming a user cert, make sure it has a nickname, even if
* Microsoft never gave it one */
if (!rv && co->hasID) {
DWORD mserror = GetLastError();
#define DEFAULT_NICKNAME "no Microsoft nickname"
label = DEFAULT_NICKNAME;
size = sizeof(DEFAULT_NICKNAME);
rv = 1;
}
if (rv) {
co->label.data = label;
co->label.size = size;
}
return;
}
void
ckcapi_FetchSerial
(
ckcapiInternalObject *io
)
{
ckcapiCertObject *co = &io->u.cert;
PCCERT_CONTEXT certContext = io->u.cert.certContext;
DWORD size = sizeof(co->derSerial);
BOOL rc = CryptEncodeObject(X509_ASN_ENCODING,
X509_MULTI_BYTE_INTEGER,
&certContext->pCertInfo->SerialNumber,
co->derSerial,
&size);
if (rc) {
co->serial.data = co->derSerial;
co->serial.size = size;
}
return;
}
/*
* fetch the key ID.
*/
void
ckcapi_FetchID
(
ckcapiInternalObject *io
)
{
PCCERT_CONTEXT certContext = io->u.cert.certContext;
DWORD size = 0;
BOOL rc;
rc = CertGetCertificateContextProperty(certContext,
CERT_KEY_IDENTIFIER_PROP_ID, NULL, &size);
if (!rc) {
return;
}
io->idData = nss_ZNEWARRAY(NULL, char, size);
if (io->idData == NULL) {
return;
}
rc = CertGetCertificateContextProperty(certContext,
CERT_KEY_IDENTIFIER_PROP_ID, io->idData, &size);
if (!rc) {
nss_ZFreeIf(io->idData);
io->idData = NULL;
return;
}
io->id.data = io->idData;
io->id.size = size;
return;
}
/*
* fetch the hash key.
*/
void
ckcapi_CertFetchHashKey
(
ckcapiInternalObject *io
)
{
ckcapiCertObject *co = &io->u.cert;
PCCERT_CONTEXT certContext = io->u.cert.certContext;
DWORD size = certContext->cbCertEncoded;
DWORD max = sizeof(io->hashKeyData)-1;
DWORD offset = 0;
/* make sure we don't over flow. NOTE: cutting the top of a cert is
* not a big issue because the signature for will be unique for the cert */
if (size > max) {
offset = size - max;
size = max;
}
nsslibc_memcpy(io->hashKeyData,certContext->pbCertEncoded+offset, size);
io->hashKeyData[size] = (char)(io->objClass & 0xff);
io->hashKey.data = io->hashKeyData;
io->hashKey.size = size+1;
return;
}
/*
* fetch the hash key.
*/
void
ckcapi_KeyFetchHashKey
(
ckcapiInternalObject *io
)
{
ckcapiKeyObject *ko = &io->u.key;
DWORD size;
DWORD max = sizeof(io->hashKeyData)-2;
DWORD offset = 0;
DWORD provLen = strlen(ko->provName);
DWORD containerLen = strlen(ko->containerName);
size = provLen + containerLen;
/* make sure we don't overflow, try to keep things unique */
if (size > max) {
DWORD diff = ((size - max)+1)/2;
provLen -= diff;
containerLen -= diff;
size = provLen+containerLen;
}
nsslibc_memcpy(io->hashKeyData, ko->provName, provLen);
nsslibc_memcpy(&io->hashKeyData[provLen],
ko->containerName,
containerLen);
io->hashKeyData[size] = (char)(io->objClass & 0xff);
io->hashKeyData[size+1] = (char)(ko->provInfo.dwKeySpec & 0xff);
io->hashKey.data = io->hashKeyData;
io->hashKey.size = size+2;
return;
}
/*
* fetch the hash key.
*/
void
ckcapi_FetchHashKey
(
ckcapiInternalObject *io
)
{
if (ckcapiCert == io->type) {
ckcapi_CertFetchHashKey(io);
} else {
ckcapi_KeyFetchHashKey(io);
}
return;
}
const NSSItem *
ckcapi_FetchCertAttribute
(
ckcapiInternalObject *io,
CK_ATTRIBUTE_TYPE type
)
{
PCCERT_CONTEXT certContext = io->u.cert.certContext;
switch(type) {
case CKA_CLASS:
return &ckcapi_certClassItem;
case CKA_TOKEN:
return &ckcapi_trueItem;
case CKA_MODIFIABLE:
case CKA_PRIVATE:
return &ckcapi_falseItem;
case CKA_CERTIFICATE_TYPE:
return &ckcapi_x509Item;
case CKA_LABEL:
if (0 == io->u.cert.label.size) {
ckcapi_FetchLabel(io);
}
return &io->u.cert.label;
case CKA_SUBJECT:
if (0 == io->u.cert.subject.size) {
io->u.cert.subject.data = certContext->pCertInfo->Subject.pbData;
io->u.cert.subject.size = certContext->pCertInfo->Subject.cbData;
}
return &io->u.cert.subject;
case CKA_ISSUER:
if (0 == io->u.cert.issuer.size) {
io->u.cert.issuer.data = certContext->pCertInfo->Issuer.pbData;
io->u.cert.issuer.size = certContext->pCertInfo->Issuer.cbData;
}
return &io->u.cert.issuer;
case CKA_SERIAL_NUMBER:
if (0 == io->u.cert.serial.size) {
/* not exactly right. This should be the encoded serial number, but
* it's the decoded serial number! */
ckcapi_FetchSerial(io);
}
return &io->u.cert.serial;
case CKA_VALUE:
if (0 == io->u.cert.derCert.size) {
io->u.cert.derCert.data = io->u.cert.certContext->pbCertEncoded;
io->u.cert.derCert.size = io->u.cert.certContext->cbCertEncoded;
}
return &io->u.cert.derCert;
case CKA_ID:
if (!io->u.cert.hasID) {
return NULL;
}
if (0 == io->id.size) {
ckcapi_FetchID(io);
}
return &io->id;
default:
break;
}
return NULL;
}
const NSSItem *
ckcapi_FetchPubKeyAttribute
(
ckcapiInternalObject *io,
CK_ATTRIBUTE_TYPE type
)
{
PRBool isCertType = (ckcapiCert == io->type);
ckcapiKeyParams *kp = isCertType ? &io->u.cert.key : &io->u.key.key;
switch(type) {
case CKA_CLASS:
return &ckcapi_pubKeyClassItem;
case CKA_TOKEN:
case CKA_LOCAL:
case CKA_ENCRYPT:
case CKA_VERIFY:
case CKA_VERIFY_RECOVER:
return &ckcapi_trueItem;
case CKA_PRIVATE:
case CKA_MODIFIABLE:
case CKA_DERIVE:
case CKA_WRAP:
return &ckcapi_falseItem;
case CKA_KEY_TYPE:
return &ckcapi_rsaItem;
case CKA_LABEL:
if (!isCertType) {
return &ckcapi_emptyItem;
}
if (0 == io->u.cert.label.size) {
ckcapi_FetchLabel(io);
}
return &io->u.cert.label;
case CKA_SUBJECT:
if (!isCertType) {
return &ckcapi_emptyItem;
}
if (0 == io->u.cert.subject.size) {
PCCERT_CONTEXT certContext= io->u.cert.certContext;
io->u.cert.subject.data = certContext->pCertInfo->Subject.pbData;
io->u.cert.subject.size = certContext->pCertInfo->Subject.cbData;
}
return &io->u.cert.subject;
case CKA_MODULUS:
if (0 == kp->modulus.size) {
ckcapi_PopulateModulusExponent(io);
}
return &kp->modulus;
case CKA_PUBLIC_EXPONENT:
if (0 == kp->modulus.size) {
ckcapi_PopulateModulusExponent(io);
}
return &kp->exponent;
case CKA_ID:
if (0 == io->id.size) {
ckcapi_FetchID(io);
}
return &io->id;
default:
break;
}
return NULL;
}
const NSSItem *
ckcapi_FetchPrivKeyAttribute
(
ckcapiInternalObject *io,
CK_ATTRIBUTE_TYPE type
)
{
PRBool isCertType = (ckcapiCert == io->type);
ckcapiKeyParams *kp = isCertType ? &io->u.cert.key : &io->u.key.key;
switch(type) {
case CKA_CLASS:
return &ckcapi_privKeyClassItem;
case CKA_TOKEN:
case CKA_LOCAL:
case CKA_SIGN:
case CKA_DECRYPT:
case CKA_SIGN_RECOVER:
return &ckcapi_trueItem;
case CKA_SENSITIVE:
case CKA_PRIVATE: /* should move in the future */
case CKA_MODIFIABLE:
case CKA_DERIVE:
case CKA_UNWRAP:
case CKA_EXTRACTABLE: /* will probably move in the future */
case CKA_ALWAYS_SENSITIVE:
case CKA_NEVER_EXTRACTABLE:
return &ckcapi_falseItem;
case CKA_KEY_TYPE:
return &ckcapi_rsaItem;
case CKA_LABEL:
if (!isCertType) {
return &ckcapi_emptyItem;
}
if (0 == io->u.cert.label.size) {
ckcapi_FetchLabel(io);
}
return &io->u.cert.label;
case CKA_SUBJECT:
if (!isCertType) {
return &ckcapi_emptyItem;
}
if (0 == io->u.cert.subject.size) {
PCCERT_CONTEXT certContext= io->u.cert.certContext;
io->u.cert.subject.data = certContext->pCertInfo->Subject.pbData;
io->u.cert.subject.size = certContext->pCertInfo->Subject.cbData;
}
return &io->u.cert.subject;
case CKA_MODULUS:
if (0 == kp->modulus.size) {
ckcapi_PopulateModulusExponent(io);
}
return &kp->modulus;
case CKA_PUBLIC_EXPONENT:
if (0 == kp->modulus.size) {
ckcapi_PopulateModulusExponent(io);
}
return &kp->exponent;
case CKA_PRIVATE_EXPONENT:
if (0 == kp->privateExponent.size) {
ckcapi_FetchPrivateKey(io);
}
return &kp->privateExponent;
case CKA_PRIME_1:
if (0 == kp->privateExponent.size) {
ckcapi_FetchPrivateKey(io);
}
return &kp->prime1;
case CKA_PRIME_2:
if (0 == kp->privateExponent.size) {
ckcapi_FetchPrivateKey(io);
}
return &kp->prime2;
case CKA_EXPONENT_1:
if (0 == kp->privateExponent.size) {
ckcapi_FetchPrivateKey(io);
}
return &kp->exponent1;
case CKA_EXPONENT_2:
if (0 == kp->privateExponent.size) {
ckcapi_FetchPrivateKey(io);
}
return &kp->exponent2;
case CKA_COEFFICIENT:
if (0 == kp->privateExponent.size) {
ckcapi_FetchPrivateKey(io);
}
return &kp->coefficient;
case CKA_ID:
if (0 == io->id.size) {
ckcapi_FetchID(io);
}
return &io->id;
default:
return NULL;
}
}
const NSSItem *
nss_ckcapi_FetchAttribute
(
ckcapiInternalObject *io,
CK_ATTRIBUTE_TYPE type
)
{
CK_ULONG i;
if (io->type == ckcapiRaw) {
for( i = 0; i < io->u.raw.n; i++ ) {
if( type == io->u.raw.types[i] ) {
return &io->u.raw.items[i];
}
}
return NULL;
}
/* deal with the common attributes */
switch (io->objClass) {
case CKO_CERTIFICATE:
return ckcapi_FetchCertAttribute(io, type);
case CKO_PRIVATE_KEY:
return ckcapi_FetchPrivKeyAttribute(io, type);
case CKO_PUBLIC_KEY:
return ckcapi_FetchPubKeyAttribute(io, type);
}
return NULL;
}
/*
* check to see if the certificate already exists
*/
static PRBool
ckcapi_cert_exists(
NSSItem *value,
ckcapiInternalObject **io
)
{
int count,i;
PRUint32 size = 0;
ckcapiInternalObject **listp = NULL;
CK_ATTRIBUTE myTemplate[2];
CK_OBJECT_CLASS cert_class = CKO_CERTIFICATE;
CK_ULONG templateCount = 2;
CK_RV error;
PRBool found = PR_FALSE;
myTemplate[0].type = CKA_CLASS;
myTemplate[0].pValue = &cert_class;
myTemplate[0].ulValueLen = sizeof(cert_class);
myTemplate[1].type = CKA_VALUE;
myTemplate[1].pValue = value->data;
myTemplate[1].ulValueLen = value->size;
count = nss_ckcapi_collect_all_certs(myTemplate, templateCount, &listp,
&size, 0, &error);
/* free them */
if (count > 1) {
*io = listp[0];
found = PR_TRUE;
}
for (i=1; i < count; i++) {
nss_ckcapi_DestroyInternalObject(listp[i]);
}
nss_ZFreeIf(listp);
return found;
}
static PRBool
ckcapi_cert_hasEmail
(
PCCERT_CONTEXT certContext
)
{
int count;
count = CertGetNameString(certContext, CERT_NAME_EMAIL_TYPE,
0, NULL, NULL, 0);
return count > 1 ? PR_TRUE : PR_FALSE;
}
static PRBool
ckcapi_cert_isRoot
(
PCCERT_CONTEXT certContext
)
{
return CertCompareCertificateName(certContext->dwCertEncodingType,
&certContext->pCertInfo->Issuer, &certContext->pCertInfo->Subject);
}
static PRBool
ckcapi_cert_isCA
(
PCCERT_CONTEXT certContext
)
{
PCERT_EXTENSION extension;
CERT_BASIC_CONSTRAINTS2_INFO basicInfo;
DWORD size = sizeof(basicInfo);
BOOL rc;
extension = CertFindExtension (szOID_BASIC_CONSTRAINTS,
certContext->pCertInfo->cExtension,
certContext->pCertInfo->rgExtension);
if ((PCERT_EXTENSION) NULL == extension ) {
return PR_FALSE;
}
rc = CryptDecodeObject(X509_ASN_ENCODING, szOID_BASIC_CONSTRAINTS2,
extension->Value.pbData, extension->Value.cbData,
0, &basicInfo, &size);
if (!rc) {
return PR_FALSE;
}
return (PRBool) basicInfo.fCA;
}
static CRYPT_KEY_PROV_INFO *
ckcapi_cert_getPrivateKeyInfo
(
PCCERT_CONTEXT certContext,
NSSItem *keyID
)
{
BOOL rc;
CRYPT_HASH_BLOB msKeyID;
DWORD size = 0;
CRYPT_KEY_PROV_INFO *prov = NULL;
msKeyID.cbData = keyID->size;
msKeyID.pbData = keyID->data;
rc = CryptGetKeyIdentifierProperty(
&msKeyID,
CERT_KEY_PROV_INFO_PROP_ID,
0, NULL, NULL, NULL, &size);
if (!rc) {
return (CRYPT_KEY_PROV_INFO *)NULL;
}
prov = (CRYPT_KEY_PROV_INFO *)nss_ZAlloc(NULL, size);
if ((CRYPT_KEY_PROV_INFO *)prov == NULL) {
return (CRYPT_KEY_PROV_INFO *) NULL;
}
rc = CryptGetKeyIdentifierProperty(
&msKeyID,
CERT_KEY_PROV_INFO_PROP_ID,
0, NULL, NULL, prov, &size);
if (!rc) {
nss_ZFreeIf(prov);
return (CRYPT_KEY_PROV_INFO *)NULL;
}
return prov;
}
static CRYPT_KEY_PROV_INFO *
ckcapi_cert_getProvInfo
(
ckcapiInternalObject *io
)
{
BOOL rc;
DWORD size = 0;
CRYPT_KEY_PROV_INFO *prov = NULL;
rc = CertGetCertificateContextProperty(
io->u.cert.certContext,
CERT_KEY_PROV_INFO_PROP_ID,
NULL, &size);
if (!rc) {
return (CRYPT_KEY_PROV_INFO *)NULL;
}
prov = (CRYPT_KEY_PROV_INFO *)nss_ZAlloc(NULL, size);
if ((CRYPT_KEY_PROV_INFO *)prov == NULL) {
return (CRYPT_KEY_PROV_INFO *) NULL;
}
rc = CertGetCertificateContextProperty(
io->u.cert.certContext,
CERT_KEY_PROV_INFO_PROP_ID,
prov, &size);
if (!rc) {
nss_ZFreeIf(prov);
return (CRYPT_KEY_PROV_INFO *)NULL;
}
return prov;
}
/* forward declaration */
static void
ckcapi_removeObjectFromHash
(
ckcapiInternalObject *io
);
/*
* Finalize - unneeded
* Destroy
* IsTokenObject - CK_TRUE
* GetAttributeCount
* GetAttributeTypes
* GetAttributeSize
* GetAttribute
* SetAttribute
* GetObjectSize
*/
static CK_RV
ckcapi_mdObject_Destroy
(
NSSCKMDObject *mdObject,
NSSCKFWObject *fwObject,
NSSCKMDSession *mdSession,
NSSCKFWSession *fwSession,
NSSCKMDToken *mdToken,
NSSCKFWToken *fwToken,
NSSCKMDInstance *mdInstance,
NSSCKFWInstance *fwInstance
)
{
ckcapiInternalObject *io = (ckcapiInternalObject *)mdObject->etc;
CK_OBJECT_CLASS objClass;
BOOL rc;
DWORD provType;
DWORD msError;
PRBool isCertType = (PRBool)(ckcapiCert == io->type);
HCERTSTORE hStore = 0;
if (ckcapiRaw == io->type) {
/* there is not 'object write protected' error, use the next best thing */
return CKR_TOKEN_WRITE_PROTECTED;
}
objClass = io->objClass;
if (CKO_CERTIFICATE == objClass) {
PCCERT_CONTEXT certContext;
/* get the store */
hStore = CertOpenSystemStore(0, io->u.cert.certStore);
if (0 == hStore) {
rc = 0;
goto loser;
}
certContext = CertFindCertificateInStore(hStore, X509_ASN_ENCODING, 0,
CERT_FIND_EXISTING, io->u.cert.certContext, NULL);
if ((PCCERT_CONTEXT)NULL == certContext) {
rc = 0;
goto loser;
}
rc = CertDeleteCertificateFromStore(certContext);
} else {
char *provName = NULL;
char *containerName = NULL;
HCRYPTPROV hProv;
CRYPT_HASH_BLOB msKeyID;
if (0 == io->id.size) {
ckcapi_FetchID(io);
}
if (isCertType) {
CRYPT_KEY_PROV_INFO * provInfo = ckcapi_cert_getProvInfo(io);
provName = nss_ckcapi_WideToUTF8(provInfo->pwszProvName);
containerName = nss_ckcapi_WideToUTF8(provInfo->pwszContainerName);
provType = provInfo->dwProvType;
nss_ZFreeIf(provInfo);
} else {
provName = io->u.key.provName;
containerName = io->u.key.containerName;
provType = io->u.key.provInfo.dwProvType;
io->u.key.provName = NULL;
io->u.key.containerName = NULL;
}
/* first remove the key id pointer */
msKeyID.cbData = io->id.size;
msKeyID.pbData = io->id.data;
rc = CryptSetKeyIdentifierProperty(&msKeyID,
CERT_KEY_PROV_INFO_PROP_ID, CRYPT_KEYID_DELETE_FLAG, NULL, NULL, NULL);
if (rc) {
rc = CryptAcquireContext(&hProv, containerName, provName, provType,
CRYPT_DELETEKEYSET);
}
nss_ZFreeIf(provName);
nss_ZFreeIf(containerName);
}
loser:
if (hStore) {
CertCloseStore(hStore, 0);
}
if (!rc) {
msError = GetLastError();
return CKR_GENERAL_ERROR;
}
/* remove it from the hash */
ckcapi_removeObjectFromHash(io);
/* free the puppy.. */
nss_ckcapi_DestroyInternalObject(io);
return CKR_OK;
}
static CK_BBOOL
ckcapi_mdObject_IsTokenObject
(
NSSCKMDObject *mdObject,
NSSCKFWObject *fwObject,
NSSCKMDSession *mdSession,
NSSCKFWSession *fwSession,
NSSCKMDToken *mdToken,
NSSCKFWToken *fwToken,
NSSCKMDInstance *mdInstance,
NSSCKFWInstance *fwInstance
)
{
return CK_TRUE;
}
static CK_ULONG
ckcapi_mdObject_GetAttributeCount
(
NSSCKMDObject *mdObject,
NSSCKFWObject *fwObject,
NSSCKMDSession *mdSession,
NSSCKFWSession *fwSession,
NSSCKMDToken *mdToken,
NSSCKFWToken *fwToken,
NSSCKMDInstance *mdInstance,
NSSCKFWInstance *fwInstance,
CK_RV *pError
)
{
ckcapiInternalObject *io = (ckcapiInternalObject *)mdObject->etc;
if (ckcapiRaw == io->type) {
return io->u.raw.n;
}
switch (io->objClass) {
case CKO_CERTIFICATE:
return certAttrsCount;
case CKO_PUBLIC_KEY:
return pubKeyAttrsCount;
case CKO_PRIVATE_KEY:
return privKeyAttrsCount;
default:
break;
}
return 0;
}
static CK_RV
ckcapi_mdObject_GetAttributeTypes
(
NSSCKMDObject *mdObject,
NSSCKFWObject *fwObject,
NSSCKMDSession *mdSession,
NSSCKFWSession *fwSession,
NSSCKMDToken *mdToken,
NSSCKFWToken *fwToken,
NSSCKMDInstance *mdInstance,
NSSCKFWInstance *fwInstance,
CK_ATTRIBUTE_TYPE_PTR typeArray,
CK_ULONG ulCount
)
{
ckcapiInternalObject *io = (ckcapiInternalObject *)mdObject->etc;
CK_ULONG i;
CK_RV error = CKR_OK;
const CK_ATTRIBUTE_TYPE *attrs = NULL;
CK_ULONG size = ckcapi_mdObject_GetAttributeCount(
mdObject, fwObject, mdSession, fwSession,
mdToken, fwToken, mdInstance, fwInstance, &error);
if( size != ulCount ) {
return CKR_BUFFER_TOO_SMALL;
}
if (io->type == ckcapiRaw) {
attrs = io->u.raw.types;
} else switch(io->objClass) {
case CKO_CERTIFICATE:
attrs = certAttrs;
break;
case CKO_PUBLIC_KEY:
attrs = pubKeyAttrs;
break;
case CKO_PRIVATE_KEY:
attrs = privKeyAttrs;
break;
default:
return CKR_OK;
}
for( i = 0; i < size; i++) {
typeArray[i] = attrs[i];
}
return CKR_OK;
}
static CK_ULONG
ckcapi_mdObject_GetAttributeSize
(
NSSCKMDObject *mdObject,
NSSCKFWObject *fwObject,
NSSCKMDSession *mdSession,
NSSCKFWSession *fwSession,
NSSCKMDToken *mdToken,
NSSCKFWToken *fwToken,
NSSCKMDInstance *mdInstance,
NSSCKFWInstance *fwInstance,
CK_ATTRIBUTE_TYPE attribute,
CK_RV *pError
)
{
ckcapiInternalObject *io = (ckcapiInternalObject *)mdObject->etc;
const NSSItem *b;
b = nss_ckcapi_FetchAttribute(io, attribute);
if ((const NSSItem *)NULL == b) {
*pError = CKR_ATTRIBUTE_TYPE_INVALID;
return 0;
}
return b->size;
}
static CK_RV
ckcapi_mdObject_SetAttribute
(
NSSCKMDObject *mdObject,
NSSCKFWObject *fwObject,
NSSCKMDSession *mdSession,
NSSCKFWSession *fwSession,
NSSCKMDToken *mdToken,
NSSCKFWToken *fwToken,
NSSCKMDInstance *mdInstance,
NSSCKFWInstance *fwInstance,
CK_ATTRIBUTE_TYPE attribute,
NSSItem *value
)
{
return CKR_OK;
}
static NSSCKFWItem
ckcapi_mdObject_GetAttribute
(
NSSCKMDObject *mdObject,
NSSCKFWObject *fwObject,
NSSCKMDSession *mdSession,
NSSCKFWSession *fwSession,
NSSCKMDToken *mdToken,
NSSCKFWToken *fwToken,
NSSCKMDInstance *mdInstance,
NSSCKFWInstance *fwInstance,
CK_ATTRIBUTE_TYPE attribute,
CK_RV *pError
)
{
NSSCKFWItem mdItem;
ckcapiInternalObject *io = (ckcapiInternalObject *)mdObject->etc;
mdItem.needsFreeing = PR_FALSE;
mdItem.item = (NSSItem*)nss_ckcapi_FetchAttribute(io, attribute);
if ((NSSItem *)NULL == mdItem.item) {
*pError = CKR_ATTRIBUTE_TYPE_INVALID;
}
return mdItem;
}
static CK_ULONG
ckcapi_mdObject_GetObjectSize
(
NSSCKMDObject *mdObject,
NSSCKFWObject *fwObject,
NSSCKMDSession *mdSession,
NSSCKFWSession *fwSession,
NSSCKMDToken *mdToken,
NSSCKFWToken *fwToken,
NSSCKMDInstance *mdInstance,
NSSCKFWInstance *fwInstance,
CK_RV *pError
)
{
ckcapiInternalObject *io = (ckcapiInternalObject *)mdObject->etc;
CK_ULONG rv = 1;
/* size is irrelevant to this token */
return rv;
}
static const NSSCKMDObject
ckcapi_prototype_mdObject = {
(void *)NULL, /* etc */
NULL, /* Finalize */
ckcapi_mdObject_Destroy,
ckcapi_mdObject_IsTokenObject,
ckcapi_mdObject_GetAttributeCount,
ckcapi_mdObject_GetAttributeTypes,
ckcapi_mdObject_GetAttributeSize,
ckcapi_mdObject_GetAttribute,
NULL, /* FreeAttribute */
ckcapi_mdObject_SetAttribute,
ckcapi_mdObject_GetObjectSize,
(void *)NULL /* null terminator */
};
static nssHash *ckcapiInternalObjectHash = NULL;
NSS_IMPLEMENT NSSCKMDObject *
nss_ckcapi_CreateMDObject
(
NSSArena *arena,
ckcapiInternalObject *io,
CK_RV *pError
)
{
if ((nssHash *)NULL == ckcapiInternalObjectHash) {
ckcapiInternalObjectHash = nssHash_CreateItem(NULL, 10);
}
if (ckcapiCert == io->type) {
/* the hash key, not a cryptographic key */
NSSItem *key = &io->hashKey;
ckcapiInternalObject *old_o = NULL;
if (key->size == 0) {
ckcapi_FetchHashKey(io);
}
old_o = (ckcapiInternalObject *)
nssHash_Lookup(ckcapiInternalObjectHash, key);
if (!old_o) {
nssHash_Add(ckcapiInternalObjectHash, key, io);
} else if (old_o != io) {
nss_ckcapi_DestroyInternalObject(io);
io = old_o;
}
}
if ( (void*)NULL == io->mdObject.etc) {
(void) nsslibc_memcpy(&io->mdObject,&ckcapi_prototype_mdObject,
sizeof(ckcapi_prototype_mdObject));
io->mdObject.etc = (void *)io;
}
return &io->mdObject;
}
static void
ckcapi_removeObjectFromHash
(
ckcapiInternalObject *io
)
{
NSSItem *key = &io->hashKey;
if ((nssHash *)NULL == ckcapiInternalObjectHash) {
return;
}
if (key->size == 0) {
ckcapi_FetchHashKey(io);
}
nssHash_Remove(ckcapiInternalObjectHash, key);
return;
}
void
nss_ckcapi_DestroyInternalObject
(
ckcapiInternalObject *io
)
{
switch (io->type) {
case ckcapiRaw:
return;
case ckcapiCert:
CertFreeCertificateContext(io->u.cert.certContext);
nss_ZFreeIf(io->u.cert.labelData);
nss_ZFreeIf(io->u.cert.key.privateKey);
nss_ZFreeIf(io->u.cert.key.pubKey);
nss_ZFreeIf(io->idData);
break;
case ckcapiBareKey:
nss_ZFreeIf(io->u.key.provInfo.pwszContainerName);
nss_ZFreeIf(io->u.key.provInfo.pwszProvName);
nss_ZFreeIf(io->u.key.provName);
nss_ZFreeIf(io->u.key.containerName);
nss_ZFreeIf(io->u.key.key.privateKey);
nss_ZFreeIf(io->u.key.key.pubKey);
if (0 != io->u.key.hProv) {
CryptReleaseContext(io->u.key.hProv, 0);
}
nss_ZFreeIf(io->idData);
break;
}
nss_ZFreeIf(io);
return;
}
static ckcapiInternalObject *
nss_ckcapi_CreateCertificate
(
NSSCKFWSession *fwSession,
CK_ATTRIBUTE_PTR pTemplate,
CK_ULONG ulAttributeCount,
CK_RV *pError
)
{
NSSItem value;
NSSItem keyID;
char *storeStr;
ckcapiInternalObject *io = NULL;
PCCERT_CONTEXT certContext = NULL;
PCCERT_CONTEXT storedCertContext = NULL;
CRYPT_KEY_PROV_INFO *prov_info = NULL;
char *nickname = NULL;
HCERTSTORE hStore = 0;
DWORD msError = 0;
PRBool hasID;
CK_RV dummy;
BOOL rc;
*pError = nss_ckcapi_GetAttribute(CKA_VALUE, pTemplate,
ulAttributeCount, &value);
if (CKR_OK != *pError) {
return (ckcapiInternalObject *)NULL;
}
*pError = nss_ckcapi_GetAttribute(CKA_ID, pTemplate,
ulAttributeCount, &keyID);
if (CKR_OK != *pError) {
return (ckcapiInternalObject *)NULL;
}
if (ckcapi_cert_exists(&value, &io)) {
return io;
}
/* OK, we are creating a new one, figure out what store it belongs to..
* first get a certContext handle.. */
certContext = CertCreateCertificateContext(X509_ASN_ENCODING,
value.data, value.size);
if ((PCCERT_CONTEXT) NULL == certContext) {
msError = GetLastError();
*pError = CKR_ATTRIBUTE_VALUE_INVALID;
goto loser;
}
/* do we have a private key laying around... */
prov_info = ckcapi_cert_getPrivateKeyInfo(certContext, &keyID);
if (prov_info) {
CRYPT_DATA_BLOB msKeyID;
storeStr = "My";
hasID = PR_TRUE;
rc = CertSetCertificateContextProperty(certContext,
CERT_KEY_PROV_INFO_PROP_ID,
0, prov_info);
nss_ZFreeIf(prov_info);
if (!rc) {
msError = GetLastError();
*pError = CKR_DEVICE_ERROR;
goto loser;
}
msKeyID.cbData = keyID.size;
msKeyID.pbData = keyID.data;
rc = CertSetCertificateContextProperty(certContext,
CERT_KEY_IDENTIFIER_PROP_ID,
0, &msKeyID);
if (!rc) {
msError = GetLastError();
*pError = CKR_DEVICE_ERROR;
goto loser;
}
/* does it look like a CA */
} else if (ckcapi_cert_isCA(certContext)) {
storeStr = ckcapi_cert_isRoot(certContext) ? "CA" : "Root";
/* does it look like an S/MIME cert */
} else if (ckcapi_cert_hasEmail(certContext)) {
storeStr = "AddressBook";
} else {
/* just pick a store */
storeStr = "CA";
}
/* get the nickname, not an error if we can't find it */
nickname = nss_ckcapi_GetStringAttribute(CKA_LABEL, pTemplate,
ulAttributeCount, &dummy);
if (nickname) {
LPWSTR nicknameUTF16 = NULL;
CRYPT_DATA_BLOB nicknameBlob;
nicknameUTF16 = nss_ckcapi_UTF8ToWide(nickname);
nss_ZFreeIf(nickname);
nickname = NULL;
if ((LPWSTR)NULL == nicknameUTF16) {
*pError = CKR_HOST_MEMORY;
goto loser;
}
nicknameBlob.cbData = nss_ckcapi_WideSize(nicknameUTF16);
nicknameBlob.pbData = (BYTE *)nicknameUTF16;
rc = CertSetCertificateContextProperty(certContext,
CERT_FRIENDLY_NAME_PROP_ID, 0, &nicknameBlob);
nss_ZFreeIf(nicknameUTF16);
if (!rc) {
msError = GetLastError();
*pError = CKR_DEVICE_ERROR;
goto loser;
}
}
hStore = CertOpenSystemStore((HCRYPTPROV) NULL, storeStr);
if (0 == hStore) {
msError = GetLastError();
*pError = CKR_DEVICE_ERROR;
goto loser;
}
rc = CertAddCertificateContextToStore(hStore, certContext,
CERT_STORE_ADD_REPLACE_EXISTING_INHERIT_PROPERTIES, &storedCertContext);
CertFreeCertificateContext(certContext);
certContext = NULL;
CertCloseStore(hStore, 0);
hStore = 0;
if (!rc) {
msError = GetLastError();
*pError = CKR_DEVICE_ERROR;
goto loser;
}
io = nss_ZNEW(NULL, ckcapiInternalObject);
if ((ckcapiInternalObject *)NULL == io) {
*pError = CKR_HOST_MEMORY;
goto loser;
}
io->type = ckcapiCert;
io->objClass = CKO_CERTIFICATE;
io->u.cert.certContext = storedCertContext;
io->u.cert.hasID = hasID;
return io;
loser:
if (certContext) {
CertFreeCertificateContext(certContext);
certContext = NULL;
}
if (storedCertContext) {
CertFreeCertificateContext(storedCertContext);
storedCertContext = NULL;
}
if (0 != hStore) {
CertCloseStore(hStore, 0);
}
return (ckcapiInternalObject *)NULL;
}
static char *
ckcapi_getDefaultProvider
(
CK_RV *pError
)
{
char *name = NULL;
BOOL rc;
DWORD nameLength = 0;
rc = CryptGetDefaultProvider(PROV_RSA_FULL, NULL, CRYPT_USER_DEFAULT, NULL,
&nameLength);
if (!rc) {
return (char *)NULL;
}
name = nss_ZNEWARRAY(NULL, char, nameLength);
if ((char *)NULL == name ) {
return (char *)NULL;
}
rc = CryptGetDefaultProvider(PROV_RSA_FULL, NULL, CRYPT_USER_DEFAULT, name,
&nameLength);
if (!rc) {
nss_ZFreeIf(name);
return (char *)NULL;
}
return name;
}
static char *
ckcapi_getContainer
(
CK_RV *pError,
NSSItem *id
)
{
RPC_STATUS rstat;
UUID uuid;
char *uuidStr;
char *container;
rstat = UuidCreate(&uuid);
rstat = UuidToString(&uuid, &uuidStr);
/* convert it from rcp memory to our own */
container = nssUTF8_Duplicate(uuidStr, NULL);
RpcStringFree(&uuidStr);
return container;
}
static CK_RV
ckcapi_buildPrivateKeyBlob
(
NSSItem *keyBlob,
NSSItem *modulus,
NSSItem *publicExponent,
NSSItem *privateExponent,
NSSItem *prime1,
NSSItem *prime2,
NSSItem *exponent1,
NSSItem *exponent2,
NSSItem *coefficient,
PRBool isKeyExchange
)
{
CAPI_RSA_KEY_BLOB *keyBlobData = NULL;
unsigned char *target;
unsigned long modSize = modulus->size;
unsigned long dataSize;
CK_RV error = CKR_OK;
/* validate extras */
if (privateExponent->size != modSize) {
error = CKR_ATTRIBUTE_VALUE_INVALID;
goto loser;
}
if (prime1->size != modSize/2) {
error = CKR_ATTRIBUTE_VALUE_INVALID;
goto loser;
}
if (prime2->size != modSize/2) {
error = CKR_ATTRIBUTE_VALUE_INVALID;
goto loser;
}
if (exponent1->size != modSize/2) {
error = CKR_ATTRIBUTE_VALUE_INVALID;
goto loser;
}
if (exponent2->size != modSize/2) {
error = CKR_ATTRIBUTE_VALUE_INVALID;
goto loser;
}
if (coefficient->size != modSize/2) {
error = CKR_ATTRIBUTE_VALUE_INVALID;
goto loser;
}
dataSize = (modSize*4)+(modSize/2) + sizeof(CAPI_RSA_KEY_BLOB);
keyBlobData = (CAPI_RSA_KEY_BLOB *)nss_ZAlloc(NULL, dataSize);
if ((CAPI_RSA_KEY_BLOB *)NULL == keyBlobData) {
error = CKR_HOST_MEMORY;
goto loser;
}
keyBlobData->header.bType = PRIVATEKEYBLOB;
keyBlobData->header.bVersion = 0x02;
keyBlobData->header.reserved = 0x00;
keyBlobData->header.aiKeyAlg = isKeyExchange ? CALG_RSA_KEYX:CALG_RSA_SIGN;
keyBlobData->rsa.magic = 0x32415352;
keyBlobData->rsa.bitlen = modSize * 8;
keyBlobData->rsa.pubexp = nss_ckcapi_DataToInt(publicExponent,&error);
if (CKR_OK != error) {
goto loser;
}
target = &keyBlobData->data[CAPI_MODULUS_OFFSET(modSize)];
nsslibc_memcpy(target, modulus->data, modulus->size);
modulus->data = target;
ckcapi_ReverseData(modulus);
target = &keyBlobData->data[CAPI_PRIVATE_EXP_OFFSET(modSize)];
nsslibc_memcpy(target, privateExponent->data, privateExponent->size);
privateExponent->data = target;
ckcapi_ReverseData(privateExponent);
target = &keyBlobData->data[CAPI_PRIME_1_OFFSET(modSize)];
nsslibc_memcpy(target, prime1->data, prime1->size);
prime1->data = target;
ckcapi_ReverseData(prime1);
target = &keyBlobData->data[CAPI_PRIME_2_OFFSET(modSize)];
nsslibc_memcpy(target, prime2->data, prime2->size);
prime2->data = target;
ckcapi_ReverseData(prime2);
target = &keyBlobData->data[CAPI_EXPONENT_1_OFFSET(modSize)];
nsslibc_memcpy(target, exponent1->data, exponent1->size);
exponent1->data = target;
ckcapi_ReverseData(exponent1);
target = &keyBlobData->data[CAPI_EXPONENT_2_OFFSET(modSize)];
nsslibc_memcpy(target, exponent2->data, exponent2->size);
exponent2->data = target;
ckcapi_ReverseData(exponent2);
target = &keyBlobData->data[CAPI_COEFFICIENT_OFFSET(modSize)];
nsslibc_memcpy(target, coefficient->data, coefficient->size);
coefficient->data = target;
ckcapi_ReverseData(coefficient);
keyBlob->data = keyBlobData;
keyBlob->size = dataSize;
return CKR_OK;
loser:
nss_ZFreeIf(keyBlobData);
return error;
}
static ckcapiInternalObject *
nss_ckcapi_CreatePrivateKey
(
NSSCKFWSession *fwSession,
CK_ATTRIBUTE_PTR pTemplate,
CK_ULONG ulAttributeCount,
CK_RV *pError
)
{
NSSItem modulus;
NSSItem publicExponent;
NSSItem privateExponent;
NSSItem exponent1;
NSSItem exponent2;
NSSItem prime1;
NSSItem prime2;
NSSItem coefficient;
NSSItem keyID;
NSSItem keyBlob;
ckcapiInternalObject *io = NULL;
char *providerName = NULL;
char *containerName = NULL;
char *idData = NULL;
CRYPT_KEY_PROV_INFO provInfo;
CRYPT_HASH_BLOB msKeyID;
CK_KEY_TYPE keyType;
HCRYPTPROV hProv = 0;
HCRYPTKEY hKey = 0;
PRBool decrypt;
DWORD keySpec;
DWORD msError;
BOOL rc;
keyType = nss_ckcapi_GetULongAttribute
(CKA_KEY_TYPE, pTemplate, ulAttributeCount, pError);
if (CKR_OK != *pError) {
return (ckcapiInternalObject *)NULL;
}
if (CKK_RSA != keyType) {
*pError = CKR_ATTRIBUTE_VALUE_INVALID;
return (ckcapiInternalObject *)NULL;
}
decrypt = nss_ckcapi_GetBoolAttribute(CKA_DECRYPT,
pTemplate, ulAttributeCount, pError);
if (CKR_TEMPLATE_INCOMPLETE == *pError) {
decrypt = PR_TRUE; /* default to true */
}
decrypt = decrypt || nss_ckcapi_GetBoolAttribute(CKA_UNWRAP,
pTemplate, ulAttributeCount, pError);
if (CKR_TEMPLATE_INCOMPLETE == *pError) {
decrypt = PR_TRUE; /* default to true */
}
keySpec = decrypt ? AT_KEYEXCHANGE : AT_SIGNATURE;
*pError = nss_ckcapi_GetAttribute(CKA_MODULUS, pTemplate,
ulAttributeCount, &modulus);
if (CKR_OK != *pError) {
return (ckcapiInternalObject *)NULL;
}
*pError = nss_ckcapi_GetAttribute(CKA_PUBLIC_EXPONENT, pTemplate,
ulAttributeCount, &publicExponent);
if (CKR_OK != *pError) {
return (ckcapiInternalObject *)NULL;
}
*pError = nss_ckcapi_GetAttribute(CKA_PRIVATE_EXPONENT, pTemplate,
ulAttributeCount, &privateExponent);
if (CKR_OK != *pError) {
return (ckcapiInternalObject *)NULL;
}
*pError = nss_ckcapi_GetAttribute(CKA_PRIME_1, pTemplate,
ulAttributeCount, &prime1);
if (CKR_OK != *pError) {
return (ckcapiInternalObject *)NULL;
}
*pError = nss_ckcapi_GetAttribute(CKA_PRIME_2, pTemplate,
ulAttributeCount, &prime2);
if (CKR_OK != *pError) {
return (ckcapiInternalObject *)NULL;
}
*pError = nss_ckcapi_GetAttribute(CKA_EXPONENT_1, pTemplate,
ulAttributeCount, &exponent1);
if (CKR_OK != *pError) {
return (ckcapiInternalObject *)NULL;
}
*pError = nss_ckcapi_GetAttribute(CKA_EXPONENT_2, pTemplate,
ulAttributeCount, &exponent2);
if (CKR_OK != *pError) {
return (ckcapiInternalObject *)NULL;
}
*pError = nss_ckcapi_GetAttribute(CKA_COEFFICIENT, pTemplate,
ulAttributeCount, &coefficient);
if (CKR_OK != *pError) {
return (ckcapiInternalObject *)NULL;
}
*pError = nss_ckcapi_GetAttribute(CKA_ID, pTemplate,
ulAttributeCount, &keyID);
if (CKR_OK != *pError) {
return (ckcapiInternalObject *)NULL;
}
providerName = ckcapi_getDefaultProvider(pError);
if ((char *)NULL == providerName ) {
return (ckcapiInternalObject *)NULL;
}
containerName = ckcapi_getContainer(pError, &keyID);
if ((char *)NULL == containerName) {
goto loser;
}
rc = CryptAcquireContext(&hProv, containerName, providerName,
PROV_RSA_FULL, CRYPT_NEWKEYSET);
if (!rc) {
msError = GetLastError();
*pError = CKR_DEVICE_ERROR;
goto loser;
}
*pError = ckcapi_buildPrivateKeyBlob(
&keyBlob,
&modulus,
&publicExponent,
&privateExponent,
&prime1,
&prime2,
&exponent1,
&exponent2,
&coefficient,
decrypt);
if (CKR_OK != *pError) {
goto loser;
}
rc = CryptImportKey(hProv, keyBlob.data, keyBlob.size,
0, CRYPT_EXPORTABLE, &hKey);
if (!rc) {
msError = GetLastError();
*pError = CKR_DEVICE_ERROR;
goto loser;
}
idData = nss_ZNEWARRAY(NULL, char, keyID.size);
if ((void *)NULL == idData) {
*pError = CKR_HOST_MEMORY;
goto loser;
}
nsslibc_memcpy(idData, keyID.data, keyID.size);
provInfo.pwszContainerName = nss_ckcapi_UTF8ToWide(containerName);
provInfo.pwszProvName = nss_ckcapi_UTF8ToWide(providerName);
provInfo.dwProvType = PROV_RSA_FULL;
provInfo.dwFlags = 0;
provInfo.cProvParam = 0;
provInfo.rgProvParam = NULL;
provInfo.dwKeySpec = keySpec;
msKeyID.cbData = keyID.size;
msKeyID.pbData = keyID.data;
rc = CryptSetKeyIdentifierProperty(&msKeyID, CERT_KEY_PROV_INFO_PROP_ID,
0, NULL, NULL, &provInfo);
if (!rc) {
goto loser;
}
/* handle error here */
io = nss_ZNEW(NULL, ckcapiInternalObject);
if ((ckcapiInternalObject *)NULL == io) {
*pError = CKR_HOST_MEMORY;
goto loser;
}
io->type = ckcapiBareKey;
io->objClass = CKO_PRIVATE_KEY;
io->u.key.provInfo = provInfo;
io->u.key.provName = providerName;
io->u.key.containerName = containerName;
io->u.key.hProv = hProv; /* save the handle */
io->idData = idData;
io->id.data = idData;
io->id.size = keyID.size;
/* done with the key handle */
CryptDestroyKey(hKey);
return io;
loser:
nss_ZFreeIf(containerName);
nss_ZFreeIf(providerName);
nss_ZFreeIf(idData);
if (0 != hProv) {
CryptReleaseContext(hProv, 0);
}
if (0 != hKey) {
CryptDestroyKey(hKey);
}
return (ckcapiInternalObject *)NULL;
}
NSS_EXTERN NSSCKMDObject *
nss_ckcapi_CreateObject
(
NSSCKFWSession *fwSession,
CK_ATTRIBUTE_PTR pTemplate,
CK_ULONG ulAttributeCount,
CK_RV *pError
)
{
CK_OBJECT_CLASS objClass;
ckcapiInternalObject *io = NULL;
CK_BBOOL isToken;
/*
* only create token objects
*/
isToken = nss_ckcapi_GetBoolAttribute(CKA_TOKEN, pTemplate,
ulAttributeCount, pError);
if (CKR_OK != *pError) {
return (NSSCKMDObject *) NULL;
}
if (!isToken) {
*pError = CKR_ATTRIBUTE_VALUE_INVALID;
return (NSSCKMDObject *) NULL;
}
/*
* only create keys and certs.
*/
objClass = nss_ckcapi_GetULongAttribute(CKA_CLASS, pTemplate,
ulAttributeCount, pError);
if (CKR_OK != *pError) {
return (NSSCKMDObject *) NULL;
}
#ifdef notdef
if (objClass == CKO_PUBLIC_KEY) {
return CKR_OK; /* fake public key creation, happens as a side effect of
* private key creation */
}
#endif
if (objClass == CKO_CERTIFICATE) {
io = nss_ckcapi_CreateCertificate(fwSession, pTemplate,
ulAttributeCount, pError);
} else if (objClass == CKO_PRIVATE_KEY) {
io = nss_ckcapi_CreatePrivateKey(fwSession, pTemplate,
ulAttributeCount, pError);
} else {
*pError = CKR_ATTRIBUTE_VALUE_INVALID;
}
if ((ckcapiInternalObject *)NULL == io) {
return (NSSCKMDObject *) NULL;
}
return nss_ckcapi_CreateMDObject(NULL, io, pError);
}