root / libcacard / vcard_emul_nss.c @ fc27eefe
History | View | Annotate | Download (33.1 kB)
1 |
/*
|
---|---|
2 |
* This is the actual card emulator.
|
3 |
*
|
4 |
* These functions can be implemented in different ways on different platforms
|
5 |
* using the underlying system primitives. For Linux it uses NSS, though direct
|
6 |
* to PKCS #11, openssl+pkcs11, or even gnu crypto libraries+pkcs #11 could be
|
7 |
* used. On Windows CAPI could be used.
|
8 |
*
|
9 |
* This work is licensed under the terms of the GNU LGPL, version 2.1 or later.
|
10 |
* See the COPYING.LIB file in the top-level directory.
|
11 |
*/
|
12 |
|
13 |
/*
|
14 |
* NSS headers
|
15 |
*/
|
16 |
|
17 |
/* avoid including prototypes.h that redefines uint32 */
|
18 |
#define NO_NSPR_10_SUPPORT
|
19 |
|
20 |
#include <nss.h> |
21 |
#include <pk11pub.h> |
22 |
#include <cert.h> |
23 |
#include <key.h> |
24 |
#include <secmod.h> |
25 |
#include <prthread.h> |
26 |
#include <secerr.h> |
27 |
|
28 |
#include "qemu-common.h" |
29 |
|
30 |
#include "vcard.h" |
31 |
#include "card_7816t.h" |
32 |
#include "vcard_emul.h" |
33 |
#include "vreader.h" |
34 |
#include "vevent.h" |
35 |
|
36 |
struct VCardKeyStruct {
|
37 |
CERTCertificate *cert; |
38 |
PK11SlotInfo *slot; |
39 |
SECKEYPrivateKey *key; |
40 |
}; |
41 |
|
42 |
|
43 |
typedef struct VirtualReaderOptionsStruct VirtualReaderOptions; |
44 |
|
45 |
struct VReaderEmulStruct {
|
46 |
PK11SlotInfo *slot; |
47 |
VCardEmulType default_type; |
48 |
char *type_params;
|
49 |
PRBool present; |
50 |
int series;
|
51 |
VCard *saved_vcard; |
52 |
}; |
53 |
|
54 |
/*
|
55 |
* NSS Specific options
|
56 |
*/
|
57 |
struct VirtualReaderOptionsStruct {
|
58 |
char *name;
|
59 |
char *vname;
|
60 |
VCardEmulType card_type; |
61 |
char *type_params;
|
62 |
char **cert_name;
|
63 |
int cert_count;
|
64 |
}; |
65 |
|
66 |
struct VCardEmulOptionsStruct {
|
67 |
void *nss_db;
|
68 |
VirtualReaderOptions *vreader; |
69 |
int vreader_count;
|
70 |
VCardEmulType hw_card_type; |
71 |
const char *hw_type_params; |
72 |
PRBool use_hw; |
73 |
}; |
74 |
|
75 |
static int nss_emul_init; |
76 |
|
77 |
/* if we have more that just the slot, define
|
78 |
* VCardEmulStruct here */
|
79 |
|
80 |
/*
|
81 |
* allocate the set of arrays for certs, cert_len, key
|
82 |
*/
|
83 |
static PRBool
|
84 |
vcard_emul_alloc_arrays(unsigned char ***certsp, int **cert_lenp, |
85 |
VCardKey ***keysp, int cert_count)
|
86 |
{ |
87 |
*certsp = NULL;
|
88 |
*cert_lenp = NULL;
|
89 |
*keysp = NULL;
|
90 |
*certsp = (unsigned char **)qemu_malloc(sizeof(unsigned char *)*cert_count); |
91 |
*cert_lenp = (int *)qemu_malloc(sizeof(int)*cert_count); |
92 |
*keysp = (VCardKey **)qemu_malloc(sizeof(VCardKey *)*cert_count);
|
93 |
return PR_TRUE;
|
94 |
} |
95 |
|
96 |
/*
|
97 |
* Emulator specific card information
|
98 |
*/
|
99 |
typedef struct CardEmulCardStruct CardEmulPrivate; |
100 |
|
101 |
static VCardEmul *
|
102 |
vcard_emul_new_card(PK11SlotInfo *slot) |
103 |
{ |
104 |
PK11_ReferenceSlot(slot); |
105 |
/* currently we don't need anything other than the slot */
|
106 |
return (VCardEmul *)slot;
|
107 |
} |
108 |
|
109 |
static void |
110 |
vcard_emul_delete_card(VCardEmul *vcard_emul) |
111 |
{ |
112 |
PK11SlotInfo *slot = (PK11SlotInfo *)vcard_emul; |
113 |
if (slot == NULL) { |
114 |
return;
|
115 |
} |
116 |
PK11_FreeSlot(slot); |
117 |
} |
118 |
|
119 |
static PK11SlotInfo *
|
120 |
vcard_emul_card_get_slot(VCard *card) |
121 |
{ |
122 |
/* note, the card is holding the reference, no need to get another one */
|
123 |
return (PK11SlotInfo *)vcard_get_private(card);
|
124 |
} |
125 |
|
126 |
|
127 |
/*
|
128 |
* key functions
|
129 |
*/
|
130 |
/* private constructure */
|
131 |
static VCardKey *
|
132 |
vcard_emul_make_key(PK11SlotInfo *slot, CERTCertificate *cert) |
133 |
{ |
134 |
VCardKey *key; |
135 |
|
136 |
key = (VCardKey *)qemu_malloc(sizeof(VCardKey));
|
137 |
key->slot = PK11_ReferenceSlot(slot); |
138 |
key->cert = CERT_DupCertificate(cert); |
139 |
/* NOTE: if we aren't logged into the token, this could return NULL */
|
140 |
/* NOTE: the cert is a temp cert, not necessarily the cert in the token,
|
141 |
* use the DER version of this function */
|
142 |
key->key = PK11_FindKeyByDERCert(slot, cert, NULL);
|
143 |
return key;
|
144 |
} |
145 |
|
146 |
/* destructor */
|
147 |
void
|
148 |
vcard_emul_delete_key(VCardKey *key) |
149 |
{ |
150 |
if (!nss_emul_init || (key == NULL)) { |
151 |
return;
|
152 |
} |
153 |
if (key->key) {
|
154 |
SECKEY_DestroyPrivateKey(key->key); |
155 |
key->key = NULL;
|
156 |
} |
157 |
if (key->cert) {
|
158 |
CERT_DestroyCertificate(key->cert); |
159 |
} |
160 |
if (key->slot) {
|
161 |
PK11_FreeSlot(key->slot); |
162 |
} |
163 |
return;
|
164 |
} |
165 |
|
166 |
/*
|
167 |
* grab the nss key from a VCardKey. If it doesn't exist, try to look it up
|
168 |
*/
|
169 |
static SECKEYPrivateKey *
|
170 |
vcard_emul_get_nss_key(VCardKey *key) |
171 |
{ |
172 |
if (key->key) {
|
173 |
return key->key;
|
174 |
} |
175 |
/* NOTE: if we aren't logged into the token, this could return NULL */
|
176 |
key->key = PK11_FindPrivateKeyFromCert(key->slot, key->cert, NULL);
|
177 |
return key->key;
|
178 |
} |
179 |
|
180 |
/*
|
181 |
* Map NSS errors to 7816 errors
|
182 |
*/
|
183 |
static vcard_7816_status_t
|
184 |
vcard_emul_map_error(int error)
|
185 |
{ |
186 |
switch (error) {
|
187 |
case SEC_ERROR_TOKEN_NOT_LOGGED_IN:
|
188 |
return VCARD7816_STATUS_ERROR_CONDITION_NOT_SATISFIED;
|
189 |
case SEC_ERROR_BAD_DATA:
|
190 |
case SEC_ERROR_OUTPUT_LEN:
|
191 |
case SEC_ERROR_INPUT_LEN:
|
192 |
case SEC_ERROR_INVALID_ARGS:
|
193 |
case SEC_ERROR_INVALID_ALGORITHM:
|
194 |
case SEC_ERROR_NO_KEY:
|
195 |
case SEC_ERROR_INVALID_KEY:
|
196 |
case SEC_ERROR_DECRYPTION_DISALLOWED:
|
197 |
return VCARD7816_STATUS_ERROR_DATA_INVALID;
|
198 |
case SEC_ERROR_NO_MEMORY:
|
199 |
return VCARD7816_STATUS_EXC_ERROR_MEMORY_FAILURE;
|
200 |
} |
201 |
return VCARD7816_STATUS_EXC_ERROR_CHANGE;
|
202 |
} |
203 |
|
204 |
/* RSA sign/decrypt with the key, signature happens 'in place' */
|
205 |
vcard_7816_status_t |
206 |
vcard_emul_rsa_op(VCard *card, VCardKey *key, |
207 |
unsigned char *buffer, int buffer_size) |
208 |
{ |
209 |
SECKEYPrivateKey *priv_key; |
210 |
unsigned signature_len;
|
211 |
SECStatus rv; |
212 |
|
213 |
if ((!nss_emul_init) || (key == NULL)) { |
214 |
/* couldn't get the key, indicate that we aren't logged in */
|
215 |
return VCARD7816_STATUS_ERROR_CONDITION_NOT_SATISFIED;
|
216 |
} |
217 |
priv_key = vcard_emul_get_nss_key(key); |
218 |
|
219 |
/*
|
220 |
* this is only true of the rsa signature
|
221 |
*/
|
222 |
signature_len = PK11_SignatureLen(priv_key); |
223 |
if (buffer_size != signature_len) {
|
224 |
return VCARD7816_STATUS_ERROR_DATA_INVALID;
|
225 |
} |
226 |
rv = PK11_PrivDecryptRaw(priv_key, buffer, &signature_len, signature_len, |
227 |
buffer, buffer_size); |
228 |
if (rv != SECSuccess) {
|
229 |
return vcard_emul_map_error(PORT_GetError());
|
230 |
} |
231 |
assert(buffer_size == signature_len); |
232 |
return VCARD7816_STATUS_SUCCESS;
|
233 |
} |
234 |
|
235 |
/*
|
236 |
* Login functions
|
237 |
*/
|
238 |
/* return the number of login attempts still possible on the card. if unknown,
|
239 |
* return -1 */
|
240 |
int
|
241 |
vcard_emul_get_login_count(VCard *card) |
242 |
{ |
243 |
return -1; |
244 |
} |
245 |
|
246 |
/* login into the card, return the 7816 status word (sw2 || sw1) */
|
247 |
vcard_7816_status_t |
248 |
vcard_emul_login(VCard *card, unsigned char *pin, int pin_len) |
249 |
{ |
250 |
PK11SlotInfo *slot; |
251 |
unsigned char *pin_string = NULL; |
252 |
int i;
|
253 |
SECStatus rv; |
254 |
|
255 |
if (!nss_emul_init) {
|
256 |
return VCARD7816_STATUS_ERROR_CONDITION_NOT_SATISFIED;
|
257 |
} |
258 |
slot = vcard_emul_card_get_slot(card); |
259 |
/* We depend on the PKCS #11 module internal login state here because we
|
260 |
* create a separate process to handle each guest instance. If we needed
|
261 |
* to handle multiple guests from one process, then we would need to keep
|
262 |
* a lot of extra state in our card structure
|
263 |
* */
|
264 |
pin_string = qemu_malloc(pin_len+1);
|
265 |
memcpy(pin_string, pin, pin_len); |
266 |
pin_string[pin_len] = 0;
|
267 |
|
268 |
/* handle CAC expanded pins correctly */
|
269 |
for (i = pin_len-1; i >= 0 && (pin_string[i] == 0xff); i--) { |
270 |
pin_string[i] = 0;
|
271 |
} |
272 |
|
273 |
rv = PK11_Authenticate(slot, PR_FALSE, pin_string); |
274 |
memset(pin_string, 0, pin_len); /* don't let the pin hang around in memory |
275 |
to be snooped */
|
276 |
qemu_free(pin_string); |
277 |
if (rv == SECSuccess) {
|
278 |
return VCARD7816_STATUS_SUCCESS;
|
279 |
} |
280 |
/* map the error from port get error */
|
281 |
return VCARD7816_STATUS_ERROR_CONDITION_NOT_SATISFIED;
|
282 |
} |
283 |
|
284 |
void
|
285 |
vcard_emul_reset(VCard *card, VCardPower power) |
286 |
{ |
287 |
PK11SlotInfo *slot; |
288 |
|
289 |
if (!nss_emul_init) {
|
290 |
return;
|
291 |
} |
292 |
|
293 |
/*
|
294 |
* if we reset the card (either power on or power off), we lose our login
|
295 |
* state
|
296 |
*/
|
297 |
/* TODO: we may also need to send insertion/removal events? */
|
298 |
slot = vcard_emul_card_get_slot(card); |
299 |
PK11_Logout(slot); /* NOTE: ignoring SECStatus return value */
|
300 |
return;
|
301 |
} |
302 |
|
303 |
|
304 |
static VReader *
|
305 |
vcard_emul_find_vreader_from_slot(PK11SlotInfo *slot) |
306 |
{ |
307 |
VReaderList *reader_list = vreader_get_reader_list(); |
308 |
VReaderListEntry *current_entry = NULL;
|
309 |
|
310 |
if (reader_list == NULL) { |
311 |
return NULL; |
312 |
} |
313 |
for (current_entry = vreader_list_get_first(reader_list); current_entry;
|
314 |
current_entry = vreader_list_get_next(current_entry)) { |
315 |
VReader *reader = vreader_list_get_reader(current_entry); |
316 |
VReaderEmul *reader_emul = vreader_get_private(reader); |
317 |
if (reader_emul->slot == slot) {
|
318 |
return reader;
|
319 |
} |
320 |
vreader_free(reader); |
321 |
} |
322 |
|
323 |
return NULL; |
324 |
} |
325 |
|
326 |
/*
|
327 |
* create a new reader emul
|
328 |
*/
|
329 |
static VReaderEmul *
|
330 |
vreader_emul_new(PK11SlotInfo *slot, VCardEmulType type, const char *params) |
331 |
{ |
332 |
VReaderEmul *new_reader_emul; |
333 |
|
334 |
new_reader_emul = (VReaderEmul *)qemu_malloc(sizeof(VReaderEmul));
|
335 |
|
336 |
new_reader_emul->slot = PK11_ReferenceSlot(slot); |
337 |
new_reader_emul->default_type = type; |
338 |
new_reader_emul->type_params = strdup(params); |
339 |
new_reader_emul->present = PR_FALSE; |
340 |
new_reader_emul->series = 0;
|
341 |
new_reader_emul->saved_vcard = NULL;
|
342 |
return new_reader_emul;
|
343 |
} |
344 |
|
345 |
static void |
346 |
vreader_emul_delete(VReaderEmul *vreader_emul) |
347 |
{ |
348 |
if (vreader_emul == NULL) { |
349 |
return;
|
350 |
} |
351 |
if (vreader_emul->slot) {
|
352 |
PK11_FreeSlot(vreader_emul->slot); |
353 |
} |
354 |
if (vreader_emul->type_params) {
|
355 |
qemu_free(vreader_emul->type_params); |
356 |
} |
357 |
qemu_free(vreader_emul); |
358 |
} |
359 |
|
360 |
/*
|
361 |
* TODO: move this to emulater non-specific file
|
362 |
*/
|
363 |
static VCardEmulType
|
364 |
vcard_emul_get_type(VReader *vreader) |
365 |
{ |
366 |
VReaderEmul *vreader_emul; |
367 |
|
368 |
vreader_emul = vreader_get_private(vreader); |
369 |
if (vreader_emul && vreader_emul->default_type != VCARD_EMUL_NONE) {
|
370 |
return vreader_emul->default_type;
|
371 |
} |
372 |
|
373 |
return vcard_emul_type_select(vreader);
|
374 |
} |
375 |
/*
|
376 |
* TODO: move this to emulater non-specific file
|
377 |
*/
|
378 |
static const char * |
379 |
vcard_emul_get_type_params(VReader *vreader) |
380 |
{ |
381 |
VReaderEmul *vreader_emul; |
382 |
|
383 |
vreader_emul = vreader_get_private(vreader); |
384 |
if (vreader_emul && vreader_emul->type_params) {
|
385 |
return vreader_emul->type_params;
|
386 |
} |
387 |
|
388 |
return ""; |
389 |
} |
390 |
|
391 |
/* pull the slot out of the reader private data */
|
392 |
static PK11SlotInfo *
|
393 |
vcard_emul_reader_get_slot(VReader *vreader) |
394 |
{ |
395 |
VReaderEmul *vreader_emul = vreader_get_private(vreader); |
396 |
if (vreader_emul == NULL) { |
397 |
return NULL; |
398 |
} |
399 |
return vreader_emul->slot;
|
400 |
} |
401 |
|
402 |
/*
|
403 |
* Card ATR's map to physical cards. VCARD_ATR_PREFIX will set appropriate
|
404 |
* historical bytes for any software emulated card. The remaining bytes can be
|
405 |
* used to indicate the actual emulator
|
406 |
*/
|
407 |
static const unsigned char nss_atr[] = { VCARD_ATR_PREFIX(3), 'N', 'S', 'S' }; |
408 |
|
409 |
void
|
410 |
vcard_emul_get_atr(VCard *card, unsigned char *atr, int *atr_len) |
411 |
{ |
412 |
int len = MIN(sizeof(nss_atr), *atr_len); |
413 |
assert(atr != NULL);
|
414 |
|
415 |
memcpy(atr, nss_atr, len); |
416 |
*atr_len = len; |
417 |
return;
|
418 |
} |
419 |
|
420 |
/*
|
421 |
* create a new card from certs and keys
|
422 |
*/
|
423 |
static VCard *
|
424 |
vcard_emul_make_card(VReader *reader, |
425 |
unsigned char * const *certs, int *cert_len, |
426 |
VCardKey *keys[], int cert_count)
|
427 |
{ |
428 |
VCardEmul *vcard_emul; |
429 |
VCard *vcard; |
430 |
PK11SlotInfo *slot; |
431 |
VCardEmulType type; |
432 |
const char *params; |
433 |
|
434 |
type = vcard_emul_get_type(reader); |
435 |
|
436 |
/* ignore the inserted card */
|
437 |
if (type == VCARD_EMUL_NONE) {
|
438 |
return NULL; |
439 |
} |
440 |
slot = vcard_emul_reader_get_slot(reader); |
441 |
if (slot == NULL) { |
442 |
return NULL; |
443 |
} |
444 |
|
445 |
params = vcard_emul_get_type_params(reader); |
446 |
/* params these can be NULL */
|
447 |
|
448 |
vcard_emul = vcard_emul_new_card(slot); |
449 |
if (vcard_emul == NULL) { |
450 |
return NULL; |
451 |
} |
452 |
vcard = vcard_new(vcard_emul, vcard_emul_delete_card); |
453 |
if (vcard == NULL) { |
454 |
vcard_emul_delete_card(vcard_emul); |
455 |
return NULL; |
456 |
} |
457 |
vcard_init(reader, vcard, type, params, certs, cert_len, keys, cert_count); |
458 |
return vcard;
|
459 |
} |
460 |
|
461 |
|
462 |
/*
|
463 |
* 'clone' a physical card as a virtual card
|
464 |
*/
|
465 |
static VCard *
|
466 |
vcard_emul_mirror_card(VReader *vreader) |
467 |
{ |
468 |
/*
|
469 |
* lookup certs using the C_FindObjects. The Stan Cert handle won't give
|
470 |
* us the real certs until we log in.
|
471 |
*/
|
472 |
PK11GenericObject *firstObj, *thisObj; |
473 |
int cert_count;
|
474 |
unsigned char **certs; |
475 |
int *cert_len;
|
476 |
VCardKey **keys; |
477 |
PK11SlotInfo *slot; |
478 |
PRBool ret; |
479 |
|
480 |
slot = vcard_emul_reader_get_slot(vreader); |
481 |
if (slot == NULL) { |
482 |
return NULL; |
483 |
} |
484 |
|
485 |
firstObj = PK11_FindGenericObjects(slot, CKO_CERTIFICATE); |
486 |
if (firstObj == NULL) { |
487 |
return NULL; |
488 |
} |
489 |
|
490 |
/* count the certs */
|
491 |
cert_count = 0;
|
492 |
for (thisObj = firstObj; thisObj;
|
493 |
thisObj = PK11_GetNextGenericObject(thisObj)) { |
494 |
cert_count++; |
495 |
} |
496 |
|
497 |
if (cert_count == 0) { |
498 |
PK11_DestroyGenericObjects(firstObj); |
499 |
return NULL; |
500 |
} |
501 |
|
502 |
/* allocate the arrays */
|
503 |
ret = vcard_emul_alloc_arrays(&certs, &cert_len, &keys, cert_count); |
504 |
if (ret == PR_FALSE) {
|
505 |
return NULL; |
506 |
} |
507 |
|
508 |
/* fill in the arrays */
|
509 |
cert_count = 0;
|
510 |
for (thisObj = firstObj; thisObj;
|
511 |
thisObj = PK11_GetNextGenericObject(thisObj)) { |
512 |
SECItem derCert; |
513 |
CERTCertificate *cert; |
514 |
SECStatus rv; |
515 |
|
516 |
rv = PK11_ReadRawAttribute(PK11_TypeGeneric, thisObj, |
517 |
CKA_VALUE, &derCert); |
518 |
if (rv != SECSuccess) {
|
519 |
continue;
|
520 |
} |
521 |
/* create floating temp cert. This gives us a cert structure even if
|
522 |
* the token isn't logged in */
|
523 |
cert = CERT_NewTempCertificate(CERT_GetDefaultCertDB(), &derCert, |
524 |
NULL, PR_FALSE, PR_TRUE);
|
525 |
SECITEM_FreeItem(&derCert, PR_FALSE); |
526 |
if (cert == NULL) { |
527 |
continue;
|
528 |
} |
529 |
|
530 |
certs[cert_count] = cert->derCert.data; |
531 |
cert_len[cert_count] = cert->derCert.len; |
532 |
keys[cert_count] = vcard_emul_make_key(slot, cert); |
533 |
cert_count++; |
534 |
CERT_DestroyCertificate(cert); /* key obj still has a reference */
|
535 |
} |
536 |
|
537 |
/* now create the card */
|
538 |
return vcard_emul_make_card(vreader, certs, cert_len, keys, cert_count);
|
539 |
} |
540 |
|
541 |
static VCardEmulType default_card_type = VCARD_EMUL_NONE;
|
542 |
static const char *default_type_params = ""; |
543 |
|
544 |
/*
|
545 |
* This thread looks for card and reader insertions and puts events on the
|
546 |
* event queue
|
547 |
*/
|
548 |
static void |
549 |
vcard_emul_event_thread(void *arg)
|
550 |
{ |
551 |
PK11SlotInfo *slot; |
552 |
VReader *vreader; |
553 |
VReaderEmul *vreader_emul; |
554 |
VCard *vcard; |
555 |
SECMODModule *module = (SECMODModule *)arg; |
556 |
|
557 |
do {
|
558 |
slot = SECMOD_WaitForAnyTokenEvent(module, 0, 500); |
559 |
if (slot == NULL) { |
560 |
break;
|
561 |
} |
562 |
vreader = vcard_emul_find_vreader_from_slot(slot); |
563 |
if (vreader == NULL) { |
564 |
/* new vreader */
|
565 |
vreader_emul = vreader_emul_new(slot, default_card_type, |
566 |
default_type_params); |
567 |
vreader = vreader_new(PK11_GetSlotName(slot), vreader_emul, |
568 |
vreader_emul_delete); |
569 |
PK11_FreeSlot(slot); |
570 |
slot = NULL;
|
571 |
vreader_add_reader(vreader); |
572 |
vreader_free(vreader); |
573 |
continue;
|
574 |
} |
575 |
/* card remove/insert */
|
576 |
vreader_emul = vreader_get_private(vreader); |
577 |
if (PK11_IsPresent(slot)) {
|
578 |
int series = PK11_GetSlotSeries(slot);
|
579 |
if (series != vreader_emul->series) {
|
580 |
if (vreader_emul->present) {
|
581 |
vreader_insert_card(vreader, NULL);
|
582 |
} |
583 |
vcard = vcard_emul_mirror_card(vreader); |
584 |
vreader_insert_card(vreader, vcard); |
585 |
vcard_free(vcard); |
586 |
} |
587 |
vreader_emul->series = series; |
588 |
vreader_emul->present = 1;
|
589 |
vreader_free(vreader); |
590 |
PK11_FreeSlot(slot); |
591 |
continue;
|
592 |
} |
593 |
if (vreader_emul->present) {
|
594 |
vreader_insert_card(vreader, NULL);
|
595 |
} |
596 |
vreader_emul->series = 0;
|
597 |
vreader_emul->present = 0;
|
598 |
PK11_FreeSlot(slot); |
599 |
vreader_free(vreader); |
600 |
} while (1); |
601 |
} |
602 |
|
603 |
/* if the card is inserted when we start up, make sure our state is correct */
|
604 |
static void |
605 |
vcard_emul_init_series(VReader *vreader, VCard *vcard) |
606 |
{ |
607 |
VReaderEmul *vreader_emul = vreader_get_private(vreader); |
608 |
PK11SlotInfo *slot = vreader_emul->slot; |
609 |
|
610 |
vreader_emul->present = PK11_IsPresent(slot); |
611 |
vreader_emul->series = PK11_GetSlotSeries(slot); |
612 |
if (vreader_emul->present == 0) { |
613 |
vreader_insert_card(vreader, NULL);
|
614 |
} |
615 |
} |
616 |
|
617 |
/*
|
618 |
* each module has a separate wait call, create a thread for each module that
|
619 |
* we are using.
|
620 |
*/
|
621 |
static void |
622 |
vcard_emul_new_event_thread(SECMODModule *module) |
623 |
{ |
624 |
PR_CreateThread(PR_SYSTEM_THREAD, vcard_emul_event_thread, |
625 |
module, PR_PRIORITY_HIGH, PR_GLOBAL_THREAD, |
626 |
PR_UNJOINABLE_THREAD, 0);
|
627 |
} |
628 |
|
629 |
static const VCardEmulOptions default_options = { |
630 |
.nss_db = NULL,
|
631 |
.vreader = NULL,
|
632 |
.vreader_count = 0,
|
633 |
.hw_card_type = VCARD_EMUL_CAC, |
634 |
.hw_type_params = "",
|
635 |
.use_hw = PR_TRUE |
636 |
}; |
637 |
|
638 |
|
639 |
/*
|
640 |
* NSS needs the app to supply a password prompt. In our case the only time
|
641 |
* the password is supplied is as part of the Login APDU. The actual password
|
642 |
* is passed in the pw_arg in that case. In all other cases pw_arg should be
|
643 |
* NULL.
|
644 |
*/
|
645 |
static char * |
646 |
vcard_emul_get_password(PK11SlotInfo *slot, PRBool retries, void *pw_arg)
|
647 |
{ |
648 |
/* if it didn't work the first time, don't keep trying */
|
649 |
if (retries) {
|
650 |
return NULL; |
651 |
} |
652 |
/* we are looking up a password when we don't have one in hand */
|
653 |
if (pw_arg == NULL) { |
654 |
return NULL; |
655 |
} |
656 |
/* TODO: we really should verify that were are using the right slot */
|
657 |
return PORT_Strdup(pw_arg);
|
658 |
} |
659 |
|
660 |
/* Force a card removal even if the card is not physically removed */
|
661 |
VCardEmulError |
662 |
vcard_emul_force_card_remove(VReader *vreader) |
663 |
{ |
664 |
if (!nss_emul_init || (vreader_card_is_present(vreader) != VREADER_OK)) {
|
665 |
return VCARD_EMUL_FAIL; /* card is already removed */ |
666 |
} |
667 |
|
668 |
/* OK, remove it */
|
669 |
vreader_insert_card(vreader, NULL);
|
670 |
return VCARD_EMUL_OK;
|
671 |
} |
672 |
|
673 |
/* Re-insert of a card that has been removed by force removal */
|
674 |
VCardEmulError |
675 |
vcard_emul_force_card_insert(VReader *vreader) |
676 |
{ |
677 |
VReaderEmul *vreader_emul; |
678 |
VCard *vcard; |
679 |
|
680 |
if (!nss_emul_init || (vreader_card_is_present(vreader) == VREADER_OK)) {
|
681 |
return VCARD_EMUL_FAIL; /* card is already removed */ |
682 |
} |
683 |
vreader_emul = vreader_get_private(vreader); |
684 |
|
685 |
/* if it's a softcard, get the saved vcard from the reader emul structure */
|
686 |
if (vreader_emul->saved_vcard) {
|
687 |
vcard = vcard_reference(vreader_emul->saved_vcard); |
688 |
} else {
|
689 |
/* it must be a physical card, rebuild it */
|
690 |
if (!PK11_IsPresent(vreader_emul->slot)) {
|
691 |
/* physical card has been removed, not way to reinsert it */
|
692 |
return VCARD_EMUL_FAIL;
|
693 |
} |
694 |
vcard = vcard_emul_mirror_card(vreader); |
695 |
} |
696 |
vreader_insert_card(vreader, vcard); |
697 |
vcard_free(vcard); |
698 |
|
699 |
return VCARD_EMUL_OK;
|
700 |
} |
701 |
|
702 |
|
703 |
static PRBool
|
704 |
module_has_removable_hw_slots(SECMODModule *mod) |
705 |
{ |
706 |
int i;
|
707 |
PRBool ret = PR_FALSE; |
708 |
SECMODListLock *moduleLock = SECMOD_GetDefaultModuleListLock(); |
709 |
|
710 |
if (!moduleLock) {
|
711 |
PORT_SetError(SEC_ERROR_NOT_INITIALIZED); |
712 |
return ret;
|
713 |
} |
714 |
SECMOD_GetReadLock(moduleLock); |
715 |
for (i = 0; i < mod->slotCount; i++) { |
716 |
PK11SlotInfo *slot = mod->slots[i]; |
717 |
if (PK11_IsRemovable(slot) && PK11_IsHW(slot)) {
|
718 |
ret = PR_TRUE; |
719 |
break;
|
720 |
} |
721 |
} |
722 |
SECMOD_ReleaseReadLock(moduleLock); |
723 |
return ret;
|
724 |
} |
725 |
|
726 |
/* Previously we returned FAIL if no readers found. This makes
|
727 |
* no sense when using hardware, since there may be no readers connected
|
728 |
* at the time vcard_emul_init is called, but they will be properly
|
729 |
* recognized later. So Instead return FAIL only if no_hw==1 and no
|
730 |
* vcards can be created (indicates error with certificates provided
|
731 |
* or db), or if any other higher level error (NSS error, missing coolkey). */
|
732 |
static int vcard_emul_init_called; |
733 |
|
734 |
VCardEmulError |
735 |
vcard_emul_init(const VCardEmulOptions *options)
|
736 |
{ |
737 |
SECStatus rv; |
738 |
PRBool ret, has_readers = PR_FALSE, need_coolkey_module; |
739 |
VReader *vreader; |
740 |
VReaderEmul *vreader_emul; |
741 |
SECMODListLock *module_lock; |
742 |
SECMODModuleList *module_list; |
743 |
SECMODModuleList *mlp; |
744 |
int i;
|
745 |
|
746 |
if (vcard_emul_init_called) {
|
747 |
return VCARD_EMUL_INIT_ALREADY_INITED;
|
748 |
} |
749 |
vcard_emul_init_called = 1;
|
750 |
vreader_init(); |
751 |
vevent_queue_init(); |
752 |
|
753 |
if (options == NULL) { |
754 |
options = &default_options; |
755 |
} |
756 |
|
757 |
/* first initialize NSS */
|
758 |
if (options->nss_db) {
|
759 |
rv = NSS_Init(options->nss_db); |
760 |
} else {
|
761 |
rv = NSS_Init("sql:/etc/pki/nssdb");
|
762 |
} |
763 |
if (rv != SECSuccess) {
|
764 |
return VCARD_EMUL_FAIL;
|
765 |
} |
766 |
/* Set password callback function */
|
767 |
PK11_SetPasswordFunc(vcard_emul_get_password); |
768 |
|
769 |
/* set up soft cards emulated by software certs rather than physical cards
|
770 |
* */
|
771 |
for (i = 0; i < options->vreader_count; i++) { |
772 |
int j;
|
773 |
int cert_count;
|
774 |
unsigned char **certs; |
775 |
int *cert_len;
|
776 |
VCardKey **keys; |
777 |
PK11SlotInfo *slot; |
778 |
|
779 |
slot = PK11_FindSlotByName(options->vreader[i].name); |
780 |
if (slot == NULL) { |
781 |
continue;
|
782 |
} |
783 |
vreader_emul = vreader_emul_new(slot, options->vreader[i].card_type, |
784 |
options->vreader[i].type_params); |
785 |
vreader = vreader_new(options->vreader[i].vname, vreader_emul, |
786 |
vreader_emul_delete); |
787 |
vreader_add_reader(vreader); |
788 |
cert_count = options->vreader[i].cert_count; |
789 |
|
790 |
ret = vcard_emul_alloc_arrays(&certs, &cert_len, &keys, |
791 |
options->vreader[i].cert_count); |
792 |
if (ret == PR_FALSE) {
|
793 |
continue;
|
794 |
} |
795 |
cert_count = 0;
|
796 |
for (j = 0; j < options->vreader[i].cert_count; j++) { |
797 |
/* we should have a better way of identifying certs than by
|
798 |
* nickname here */
|
799 |
CERTCertificate *cert = PK11_FindCertFromNickname( |
800 |
options->vreader[i].cert_name[j], |
801 |
NULL);
|
802 |
if (cert == NULL) { |
803 |
continue;
|
804 |
} |
805 |
certs[cert_count] = cert->derCert.data; |
806 |
cert_len[cert_count] = cert->derCert.len; |
807 |
keys[cert_count] = vcard_emul_make_key(slot, cert); |
808 |
/* this is safe because the key is still holding a cert reference */
|
809 |
CERT_DestroyCertificate(cert); |
810 |
cert_count++; |
811 |
} |
812 |
if (cert_count) {
|
813 |
VCard *vcard = vcard_emul_make_card(vreader, certs, cert_len, |
814 |
keys, cert_count); |
815 |
vreader_insert_card(vreader, vcard); |
816 |
vcard_emul_init_series(vreader, vcard); |
817 |
/* allow insertion and removal of soft cards */
|
818 |
vreader_emul->saved_vcard = vcard_reference(vcard); |
819 |
vcard_free(vcard); |
820 |
vreader_free(vreader); |
821 |
has_readers = PR_TRUE; |
822 |
} |
823 |
} |
824 |
|
825 |
/* if we aren't suppose to use hw, skip looking up hardware tokens */
|
826 |
if (!options->use_hw) {
|
827 |
nss_emul_init = has_readers; |
828 |
return has_readers ? VCARD_EMUL_OK : VCARD_EMUL_FAIL;
|
829 |
} |
830 |
|
831 |
/* make sure we have some PKCS #11 module loaded */
|
832 |
module_lock = SECMOD_GetDefaultModuleListLock(); |
833 |
module_list = SECMOD_GetDefaultModuleList(); |
834 |
need_coolkey_module = !has_readers; |
835 |
SECMOD_GetReadLock(module_lock); |
836 |
for (mlp = module_list; mlp; mlp = mlp->next) {
|
837 |
SECMODModule *module = mlp->module; |
838 |
if (module_has_removable_hw_slots(module)) {
|
839 |
need_coolkey_module = PR_FALSE; |
840 |
break;
|
841 |
} |
842 |
} |
843 |
SECMOD_ReleaseReadLock(module_lock); |
844 |
|
845 |
if (need_coolkey_module) {
|
846 |
SECMODModule *module; |
847 |
module = SECMOD_LoadUserModule( |
848 |
(char *)"library=libcoolkeypk11.so name=Coolkey", |
849 |
NULL, PR_FALSE);
|
850 |
if (module == NULL) { |
851 |
return VCARD_EMUL_FAIL;
|
852 |
} |
853 |
SECMOD_DestroyModule(module); /* free our reference, Module will still
|
854 |
* be on the list.
|
855 |
* until we destroy it */
|
856 |
} |
857 |
|
858 |
/* now examine all the slots, finding which should be readers */
|
859 |
/* We should control this with options. For now we mirror out any
|
860 |
* removable hardware slot */
|
861 |
default_card_type = options->hw_card_type; |
862 |
default_type_params = strdup(options->hw_type_params); |
863 |
|
864 |
SECMOD_GetReadLock(module_lock); |
865 |
for (mlp = module_list; mlp; mlp = mlp->next) {
|
866 |
SECMODModule *module = mlp->module; |
867 |
PRBool has_emul_slots = PR_FALSE; |
868 |
|
869 |
if (module == NULL) { |
870 |
continue;
|
871 |
} |
872 |
|
873 |
for (i = 0; i < module->slotCount; i++) { |
874 |
PK11SlotInfo *slot = module->slots[i]; |
875 |
|
876 |
/* only map removable HW slots */
|
877 |
if (slot == NULL || !PK11_IsRemovable(slot) || !PK11_IsHW(slot)) { |
878 |
continue;
|
879 |
} |
880 |
vreader_emul = vreader_emul_new(slot, options->hw_card_type, |
881 |
options->hw_type_params); |
882 |
vreader = vreader_new(PK11_GetSlotName(slot), vreader_emul, |
883 |
vreader_emul_delete); |
884 |
vreader_add_reader(vreader); |
885 |
|
886 |
has_readers = PR_TRUE; |
887 |
has_emul_slots = PR_TRUE; |
888 |
|
889 |
if (PK11_IsPresent(slot)) {
|
890 |
VCard *vcard; |
891 |
vcard = vcard_emul_mirror_card(vreader); |
892 |
vreader_insert_card(vreader, vcard); |
893 |
vcard_emul_init_series(vreader, vcard); |
894 |
vcard_free(vcard); |
895 |
} |
896 |
} |
897 |
if (has_emul_slots) {
|
898 |
vcard_emul_new_event_thread(module); |
899 |
} |
900 |
} |
901 |
SECMOD_ReleaseReadLock(module_lock); |
902 |
nss_emul_init = has_readers; |
903 |
|
904 |
return VCARD_EMUL_OK;
|
905 |
} |
906 |
|
907 |
/* Recreate card insert events for all readers (user should
|
908 |
* deduce implied reader insert. perhaps do a reader insert as well?)
|
909 |
*/
|
910 |
void
|
911 |
vcard_emul_replay_insertion_events(void)
|
912 |
{ |
913 |
VReaderListEntry *current_entry; |
914 |
VReaderListEntry *next_entry = NULL;
|
915 |
VReaderList *list = vreader_get_reader_list(); |
916 |
|
917 |
for (current_entry = vreader_list_get_first(list); current_entry;
|
918 |
current_entry = next_entry) { |
919 |
VReader *vreader = vreader_list_get_reader(current_entry); |
920 |
next_entry = vreader_list_get_next(current_entry); |
921 |
vreader_queue_card_event(vreader); |
922 |
} |
923 |
} |
924 |
|
925 |
/*
|
926 |
* Silly little functions to help parsing our argument string
|
927 |
*/
|
928 |
static char * |
929 |
copy_string(const char *str, int str_len) |
930 |
{ |
931 |
char *new_str;
|
932 |
|
933 |
new_str = qemu_malloc(str_len+1);
|
934 |
memcpy(new_str, str, str_len); |
935 |
new_str[str_len] = 0;
|
936 |
return new_str;
|
937 |
} |
938 |
|
939 |
static int |
940 |
count_tokens(const char *str, char token, char token_end) |
941 |
{ |
942 |
int count = 0; |
943 |
|
944 |
for (; *str; str++) {
|
945 |
if (*str == token) {
|
946 |
count++; |
947 |
} |
948 |
if (*str == token_end) {
|
949 |
break;
|
950 |
} |
951 |
} |
952 |
return count;
|
953 |
} |
954 |
|
955 |
static const char * |
956 |
strip(const char *str) |
957 |
{ |
958 |
for (; *str && isspace(*str); str++) {
|
959 |
} |
960 |
return str;
|
961 |
} |
962 |
|
963 |
static const char * |
964 |
find_blank(const char *str) |
965 |
{ |
966 |
for (; *str && !isspace(*str); str++) {
|
967 |
} |
968 |
return str;
|
969 |
} |
970 |
|
971 |
|
972 |
/*
|
973 |
* We really want to use some existing argument parsing library here. That
|
974 |
* would give us a consistent look */
|
975 |
static VCardEmulOptions options;
|
976 |
#define READER_STEP 4 |
977 |
|
978 |
VCardEmulOptions * |
979 |
vcard_emul_options(const char *args) |
980 |
{ |
981 |
int reader_count = 0; |
982 |
VCardEmulOptions *opts; |
983 |
char type_str[100]; |
984 |
int type_len;
|
985 |
|
986 |
/* Allow the future use of allocating the options structure on the fly */
|
987 |
memcpy(&options, &default_options, sizeof(options));
|
988 |
opts = &options; |
989 |
|
990 |
do {
|
991 |
args = strip(args); /* strip off the leading spaces */
|
992 |
if (*args == ',') { |
993 |
continue;
|
994 |
} |
995 |
/* soft=(slot_name,virt_name,emul_type,emul_flags,cert_1, (no eol)
|
996 |
* cert_2,cert_3...) */
|
997 |
if (strncmp(args, "soft=", 5) == 0) { |
998 |
const char *name; |
999 |
const char *vname; |
1000 |
const char *type_params; |
1001 |
VCardEmulType type; |
1002 |
int name_length, vname_length, type_params_length, count, i;
|
1003 |
VirtualReaderOptions *vreaderOpt = NULL;
|
1004 |
|
1005 |
args = strip(args + 5);
|
1006 |
if (*args != '(') { |
1007 |
continue;
|
1008 |
} |
1009 |
name = args; |
1010 |
args = strpbrk(args + 1, ",)"); |
1011 |
if (*args == 0) { |
1012 |
break;
|
1013 |
} |
1014 |
if (*args == ')') { |
1015 |
args++; |
1016 |
continue;
|
1017 |
} |
1018 |
args = strip(args+1);
|
1019 |
name_length = args - name - 2;
|
1020 |
vname = args; |
1021 |
args = strpbrk(args + 1, ",)"); |
1022 |
if (*args == 0) { |
1023 |
break;
|
1024 |
} |
1025 |
if (*args == ')') { |
1026 |
args++; |
1027 |
continue;
|
1028 |
} |
1029 |
vname_length = args - name - 2;
|
1030 |
args = strip(args+1);
|
1031 |
type_len = strpbrk(args, ",)") - args;
|
1032 |
assert(sizeof(type_str) > type_len);
|
1033 |
strncpy(type_str, args, type_len); |
1034 |
type_str[type_len] = 0;
|
1035 |
type = vcard_emul_type_from_string(type_str); |
1036 |
args = strpbrk(args, ",)");
|
1037 |
if (*args == 0) { |
1038 |
break;
|
1039 |
} |
1040 |
if (*args == ')') { |
1041 |
args++; |
1042 |
continue;
|
1043 |
} |
1044 |
args = strip(args++); |
1045 |
type_params = args; |
1046 |
args = strpbrk(args + 1, ",)"); |
1047 |
if (*args == 0) { |
1048 |
break;
|
1049 |
} |
1050 |
if (*args == ')') { |
1051 |
args++; |
1052 |
continue;
|
1053 |
} |
1054 |
type_params_length = args - name; |
1055 |
args = strip(args++); |
1056 |
if (*args == 0) { |
1057 |
break;
|
1058 |
} |
1059 |
|
1060 |
if (opts->vreader_count >= reader_count) {
|
1061 |
reader_count += READER_STEP; |
1062 |
vreaderOpt = realloc(opts->vreader, |
1063 |
reader_count * sizeof(*vreaderOpt));
|
1064 |
if (vreaderOpt == NULL) { |
1065 |
return opts; /* we're done */ |
1066 |
} |
1067 |
} |
1068 |
opts->vreader = vreaderOpt; |
1069 |
vreaderOpt = &vreaderOpt[opts->vreader_count]; |
1070 |
vreaderOpt->name = copy_string(name, name_length); |
1071 |
vreaderOpt->vname = copy_string(vname, vname_length); |
1072 |
vreaderOpt->card_type = type; |
1073 |
vreaderOpt->type_params = |
1074 |
copy_string(type_params, type_params_length); |
1075 |
count = count_tokens(args, ',', ')'); |
1076 |
vreaderOpt->cert_count = count; |
1077 |
vreaderOpt->cert_name = (char **)qemu_malloc(count*sizeof(char *)); |
1078 |
for (i = 0; i < count; i++) { |
1079 |
const char *cert = args + 1; |
1080 |
args = strpbrk(args + 1, ",)"); |
1081 |
vreaderOpt->cert_name[i] = copy_string(cert, args - cert); |
1082 |
} |
1083 |
if (*args == ')') { |
1084 |
args++; |
1085 |
} |
1086 |
opts->vreader_count++; |
1087 |
/* use_hw= */
|
1088 |
} else if (strncmp(args, "use_hw=", 7) == 0) { |
1089 |
args = strip(args+7);
|
1090 |
if (*args == '0' || *args == 'N' || *args == 'n' || *args == 'F') { |
1091 |
opts->use_hw = PR_FALSE; |
1092 |
} else {
|
1093 |
opts->use_hw = PR_TRUE; |
1094 |
} |
1095 |
args = find_blank(args); |
1096 |
/* hw_type= */
|
1097 |
} else if (strncmp(args, "hw_type=", 8) == 0) { |
1098 |
args = strip(args+8);
|
1099 |
opts->hw_card_type = vcard_emul_type_from_string(args); |
1100 |
args = find_blank(args); |
1101 |
/* hw_params= */
|
1102 |
} else if (strncmp(args, "hw_params=", 10) == 0) { |
1103 |
const char *params; |
1104 |
args = strip(args+10);
|
1105 |
params = args; |
1106 |
args = find_blank(args); |
1107 |
opts->hw_type_params = copy_string(params, args-params); |
1108 |
/* db="/data/base/path" */
|
1109 |
} else if (strncmp(args, "db=", 3) == 0) { |
1110 |
const char *db; |
1111 |
args = strip(args+3);
|
1112 |
if (*args != '"') { |
1113 |
continue;
|
1114 |
} |
1115 |
args++; |
1116 |
db = args; |
1117 |
args = strpbrk(args, "\"\n");
|
1118 |
opts->nss_db = copy_string(db, args-db); |
1119 |
if (*args != 0) { |
1120 |
args++; |
1121 |
} |
1122 |
} else {
|
1123 |
args = find_blank(args); |
1124 |
} |
1125 |
} while (*args != 0); |
1126 |
|
1127 |
return opts;
|
1128 |
} |
1129 |
|
1130 |
void
|
1131 |
vcard_emul_usage(void)
|
1132 |
{ |
1133 |
fprintf(stderr, |
1134 |
"emul args: comma separated list of the following arguments\n"
|
1135 |
" db={nss_database} (default sql:/etc/pki/nssdb)\n"
|
1136 |
" use_hw=[yes|no] (default yes)\n"
|
1137 |
" hw_type={card_type_to_emulate} (default CAC)\n"
|
1138 |
" hw_param={param_for_card} (default \"\")\n"
|
1139 |
" soft=({slot_name},{vreader_name},{card_type_to_emulate},{params_for_card},\n"
|
1140 |
" {cert1},{cert2},{cert3} (default none)\n"
|
1141 |
"\n"
|
1142 |
" {nss_database} The location of the NSS cert & key database\n"
|
1143 |
" {card_type_to_emulate} What card interface to present to the guest\n"
|
1144 |
" {param_for_card} Card interface specific parameters\n"
|
1145 |
" {slot_name} NSS slot that contains the certs\n"
|
1146 |
" {vreader_name} Virutal reader name to present to the guest\n"
|
1147 |
" {certN} Nickname of the certificate n on the virtual card\n"
|
1148 |
"\n"
|
1149 |
"These parameters come as a single string separated by blanks or newlines."
|
1150 |
"\n"
|
1151 |
"Unless use_hw is set to no, all tokens that look like removable hardware\n"
|
1152 |
"tokens will be presented to the guest using the emulator specified by\n"
|
1153 |
"hw_type, and parameters of hw_param.\n"
|
1154 |
"\n"
|
1155 |
"If more one or more soft= parameters are specified, these readers will be\n"
|
1156 |
"presented to the guest\n");
|
1157 |
} |