2003-08-05 19:11:04 +02:00
|
|
|
|
/* app.c - Application selection.
|
2005-02-24 18:36:11 +01:00
|
|
|
|
* Copyright (C) 2003, 2004, 2005 Free Software Foundation, Inc.
|
2003-08-05 19:11:04 +02:00
|
|
|
|
*
|
|
|
|
|
* This file is part of GnuPG.
|
|
|
|
|
*
|
|
|
|
|
* GnuPG is free software; you can redistribute it and/or modify
|
|
|
|
|
* it under the terms of the GNU General Public License as published by
|
2007-07-04 21:49:40 +02:00
|
|
|
|
* the Free Software Foundation; either version 3 of the License, or
|
2003-08-05 19:11:04 +02:00
|
|
|
|
* (at your option) any later version.
|
|
|
|
|
*
|
|
|
|
|
* GnuPG is distributed in the hope that it will be useful,
|
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
|
* GNU General Public License for more details.
|
|
|
|
|
*
|
|
|
|
|
* You should have received a copy of the GNU General Public License
|
2007-07-04 21:49:40 +02:00
|
|
|
|
* along with this program; if not, see <http://www.gnu.org/licenses/>.
|
2003-08-05 19:11:04 +02:00
|
|
|
|
*/
|
|
|
|
|
|
|
|
|
|
#include <config.h>
|
|
|
|
|
#include <errno.h>
|
|
|
|
|
#include <stdio.h>
|
|
|
|
|
#include <stdlib.h>
|
|
|
|
|
#include <string.h>
|
2009-02-27 15:36:59 +01:00
|
|
|
|
#include <pth.h>
|
2003-08-05 19:11:04 +02:00
|
|
|
|
|
|
|
|
|
#include "scdaemon.h"
|
|
|
|
|
#include "app-common.h"
|
|
|
|
|
#include "iso7816.h"
|
SCD: API cleanup for keypad handling.
* scd/iso7816.h (struct pininfo_s): Rename from iso7816_pininfo_s.
Change meaning of MODE.
(pininfo_t): Rename from iso7816_pininfo_t.
* scd/sc-copykeys.c: Include "iso7816.h".
* scd/scdaemon.c, scd/command.c: Likewise.
* scd/ccid-driver.c: Include "scdaemon.h" and "iso7816.h".
(ccid_transceive_secure): Follow the change of PININFO_T.
* scd/app.c: Include "apdu.h" after "iso7816.h".
* scd/iso7816.c (iso7816_check_keypad, iso7816_verify_kp)
(iso7816_change_reference_data_kp): Follow the change of API.
* scd/apdu.c (struct reader_table_s): Change API of CHECK_KEYPAD,
KEYPAD_VERIFY, KEYPAD_MODIFY to have arg of PININFO_T.
(check_pcsc_keypad, check_ccid_keypad): Likewise.
(apdu_check_keypad, apdu_keypad_verify, apdu_keypad_modify): Likewise.
(pcsc_keypad_verify, pcsc_keypad_modify, ct_send_apdu)
(pcsc_send_apdu_direct, pcsc_send_apdu_wrapped, pcsc_send_apdu)
(send_apdu_ccid, ccid_keypad_operation, my_rapdu_send_apdu, send_apdu)
(send_le): Follow the change of API.
* scd/apdu.h (apdu_check_keypad, apdu_keypad_verify)
(apdu_keypad_modify): Change the API.
* scd/app-dinsig.c, scd/app-nks.c, scd/app-openpgp.c: Follow the
change.
2013-01-09 06:10:08 +01:00
|
|
|
|
#include "apdu.h"
|
2004-01-27 17:40:42 +01:00
|
|
|
|
#include "tlv.h"
|
2003-08-05 19:11:04 +02:00
|
|
|
|
|
2005-05-18 12:48:06 +02:00
|
|
|
|
/* This table is used to keep track of locks on a per reader base.
|
|
|
|
|
The index into the table is the slot number of the reader. The
|
|
|
|
|
mutex will be initialized on demand (one of the advantages of a
|
|
|
|
|
userland threading system). */
|
|
|
|
|
static struct
|
|
|
|
|
{
|
|
|
|
|
int initialized;
|
|
|
|
|
pth_mutex_t lock;
|
2005-06-03 15:57:24 +02:00
|
|
|
|
app_t app; /* Application context in use or NULL. */
|
2006-02-09 19:29:31 +01:00
|
|
|
|
app_t last_app; /* Last application object used as this slot or NULL. */
|
2005-05-18 12:48:06 +02:00
|
|
|
|
} lock_table[10];
|
|
|
|
|
|
|
|
|
|
|
2006-02-09 19:29:31 +01:00
|
|
|
|
|
|
|
|
|
static void deallocate_app (app_t app);
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2009-07-13 11:59:22 +02:00
|
|
|
|
static void
|
|
|
|
|
print_progress_line (void *opaque, const char *what, int pc, int cur, int tot)
|
|
|
|
|
{
|
|
|
|
|
ctrl_t ctrl = opaque;
|
|
|
|
|
char line[100];
|
|
|
|
|
|
|
|
|
|
if (ctrl)
|
|
|
|
|
{
|
|
|
|
|
snprintf (line, sizeof line, "%s %c %d %d", what, pc, cur, tot);
|
|
|
|
|
send_status_direct (ctrl, "PROGRESS", line);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2005-06-03 15:57:24 +02:00
|
|
|
|
/* Lock the reader SLOT. This function shall be used right before
|
|
|
|
|
calling any of the actual application functions to serialize access
|
|
|
|
|
to the reader. We do this always even if the reader is not
|
|
|
|
|
actually used. This allows an actual connection to assume that it
|
|
|
|
|
never shares a reader (while performing one command). Returns 0 on
|
|
|
|
|
success; only then the unlock_reader function must be called after
|
|
|
|
|
returning from the handler. */
|
2005-05-18 12:48:06 +02:00
|
|
|
|
static gpg_error_t
|
2009-07-13 11:59:22 +02:00
|
|
|
|
lock_reader (int slot, ctrl_t ctrl)
|
2005-05-18 12:48:06 +02:00
|
|
|
|
{
|
|
|
|
|
gpg_error_t err;
|
|
|
|
|
|
|
|
|
|
if (slot < 0 || slot >= DIM (lock_table))
|
2005-06-03 15:57:24 +02:00
|
|
|
|
return gpg_error (slot<0? GPG_ERR_INV_VALUE : GPG_ERR_RESOURCE_LIMIT);
|
2005-05-18 12:48:06 +02:00
|
|
|
|
|
|
|
|
|
if (!lock_table[slot].initialized)
|
|
|
|
|
{
|
|
|
|
|
if (!pth_mutex_init (&lock_table[slot].lock))
|
|
|
|
|
{
|
2006-09-14 18:50:33 +02:00
|
|
|
|
err = gpg_error_from_syserror ();
|
2005-05-18 12:48:06 +02:00
|
|
|
|
log_error ("error initializing mutex: %s\n", strerror (errno));
|
|
|
|
|
return err;
|
|
|
|
|
}
|
|
|
|
|
lock_table[slot].initialized = 1;
|
2005-06-03 15:57:24 +02:00
|
|
|
|
lock_table[slot].app = NULL;
|
2006-02-09 19:29:31 +01:00
|
|
|
|
lock_table[slot].last_app = NULL;
|
2005-05-18 12:48:06 +02:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (!pth_mutex_acquire (&lock_table[slot].lock, 0, NULL))
|
|
|
|
|
{
|
2006-09-14 18:50:33 +02:00
|
|
|
|
err = gpg_error_from_syserror ();
|
2005-05-18 12:48:06 +02:00
|
|
|
|
log_error ("failed to acquire APP lock for slot %d: %s\n",
|
|
|
|
|
slot, strerror (errno));
|
|
|
|
|
return err;
|
|
|
|
|
}
|
|
|
|
|
|
2009-07-13 11:59:22 +02:00
|
|
|
|
apdu_set_progress_cb (slot, print_progress_line, ctrl);
|
|
|
|
|
|
2005-05-18 12:48:06 +02:00
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Release a lock on the reader. See lock_reader(). */
|
|
|
|
|
static void
|
2005-06-03 15:57:24 +02:00
|
|
|
|
unlock_reader (int slot)
|
2005-05-18 12:48:06 +02:00
|
|
|
|
{
|
|
|
|
|
if (slot < 0 || slot >= DIM (lock_table)
|
|
|
|
|
|| !lock_table[slot].initialized)
|
|
|
|
|
log_bug ("unlock_reader called for invalid slot %d\n", slot);
|
2003-08-05 19:11:04 +02:00
|
|
|
|
|
2009-07-13 11:59:22 +02:00
|
|
|
|
apdu_set_progress_cb (slot, NULL, NULL);
|
|
|
|
|
|
2005-05-18 12:48:06 +02:00
|
|
|
|
if (!pth_mutex_release (&lock_table[slot].lock))
|
|
|
|
|
log_error ("failed to release APP lock for slot %d: %s\n",
|
|
|
|
|
slot, strerror (errno));
|
|
|
|
|
}
|
2005-06-03 15:57:24 +02:00
|
|
|
|
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
dump_mutex_state (pth_mutex_t *m)
|
|
|
|
|
{
|
2007-06-06 20:12:30 +02:00
|
|
|
|
#ifdef _W32_PTH_H
|
2008-11-03 11:54:18 +01:00
|
|
|
|
(void)m;
|
2007-06-06 20:12:30 +02:00
|
|
|
|
log_printf ("unknown under W32");
|
|
|
|
|
#else
|
2005-06-03 15:57:24 +02:00
|
|
|
|
if (!(m->mx_state & PTH_MUTEX_INITIALIZED))
|
|
|
|
|
log_printf ("not_initialized");
|
|
|
|
|
else if (!(m->mx_state & PTH_MUTEX_LOCKED))
|
|
|
|
|
log_printf ("not_locked");
|
|
|
|
|
else
|
|
|
|
|
log_printf ("locked tid=0x%lx count=%lu", (long)m->mx_owner, m->mx_count);
|
2007-06-06 20:12:30 +02:00
|
|
|
|
#endif
|
2005-06-03 15:57:24 +02:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
/* This function may be called to print information pertaining to the
|
|
|
|
|
current state of this module to the log. */
|
|
|
|
|
void
|
|
|
|
|
app_dump_state (void)
|
|
|
|
|
{
|
|
|
|
|
int slot;
|
|
|
|
|
|
|
|
|
|
for (slot=0; slot < DIM (lock_table); slot++)
|
|
|
|
|
if (lock_table[slot].initialized)
|
|
|
|
|
{
|
|
|
|
|
log_info ("app_dump_state: slot=%d lock=", slot);
|
|
|
|
|
dump_mutex_state (&lock_table[slot].lock);
|
|
|
|
|
if (lock_table[slot].app)
|
2006-02-09 19:29:31 +01:00
|
|
|
|
{
|
|
|
|
|
log_printf (" app=%p", lock_table[slot].app);
|
|
|
|
|
if (lock_table[slot].app->apptype)
|
|
|
|
|
log_printf (" type=`%s'", lock_table[slot].app->apptype);
|
|
|
|
|
}
|
|
|
|
|
if (lock_table[slot].last_app)
|
|
|
|
|
{
|
|
|
|
|
log_printf (" lastapp=%p", lock_table[slot].last_app);
|
|
|
|
|
if (lock_table[slot].last_app->apptype)
|
|
|
|
|
log_printf (" type=`%s'", lock_table[slot].last_app->apptype);
|
|
|
|
|
}
|
2005-06-03 15:57:24 +02:00
|
|
|
|
log_printf ("\n");
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2004-08-05 11:24:36 +02:00
|
|
|
|
/* Check wether the application NAME is allowed. This does not mean
|
|
|
|
|
we have support for it though. */
|
|
|
|
|
static int
|
|
|
|
|
is_app_allowed (const char *name)
|
|
|
|
|
{
|
|
|
|
|
strlist_t l;
|
|
|
|
|
|
|
|
|
|
for (l=opt.disabled_applications; l; l = l->next)
|
|
|
|
|
if (!strcmp (l->d, name))
|
|
|
|
|
return 0; /* no */
|
|
|
|
|
return 1; /* yes */
|
|
|
|
|
}
|
|
|
|
|
|
2004-09-09 09:28:47 +02:00
|
|
|
|
|
2008-11-03 20:09:34 +01:00
|
|
|
|
/* This may be called to tell this module about a removed or resetted card. */
|
2006-02-09 19:29:31 +01:00
|
|
|
|
void
|
2008-11-03 20:09:34 +01:00
|
|
|
|
application_notify_card_reset (int slot)
|
2006-02-09 19:29:31 +01:00
|
|
|
|
{
|
2006-04-14 22:40:00 +02:00
|
|
|
|
app_t app;
|
|
|
|
|
|
2006-02-09 19:29:31 +01:00
|
|
|
|
if (slot < 0 || slot >= DIM (lock_table))
|
|
|
|
|
return;
|
|
|
|
|
|
2006-04-14 22:40:00 +02:00
|
|
|
|
/* FIXME: We are ignoring any error value here. */
|
2009-07-13 11:59:22 +02:00
|
|
|
|
lock_reader (slot, NULL);
|
2006-04-14 22:40:00 +02:00
|
|
|
|
|
2009-03-24 12:40:57 +01:00
|
|
|
|
/* Mark application as non-reusable. */
|
|
|
|
|
if (lock_table[slot].app)
|
|
|
|
|
lock_table[slot].app->no_reuse = 1;
|
|
|
|
|
|
2006-02-09 19:29:31 +01:00
|
|
|
|
/* Deallocate a saved application for that slot, so that we won't
|
2006-03-01 12:05:47 +01:00
|
|
|
|
try to reuse it. If there is no saved application, set a flag so
|
|
|
|
|
that we won't save the current state. */
|
2006-04-14 22:40:00 +02:00
|
|
|
|
app = lock_table[slot].last_app;
|
2006-02-09 19:29:31 +01:00
|
|
|
|
|
2006-04-14 22:40:00 +02:00
|
|
|
|
if (app)
|
|
|
|
|
{
|
|
|
|
|
lock_table[slot].last_app = NULL;
|
|
|
|
|
deallocate_app (app);
|
2006-02-09 19:29:31 +01:00
|
|
|
|
}
|
2006-04-14 22:40:00 +02:00
|
|
|
|
unlock_reader (slot);
|
2006-02-09 19:29:31 +01:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2008-11-03 11:54:18 +01:00
|
|
|
|
/* This function is used by the serialno command to check for an
|
2006-02-09 19:29:31 +01:00
|
|
|
|
application conflict which may appear if the serialno command is
|
|
|
|
|
used to request a specific application and the connection has
|
|
|
|
|
already done a select_application. */
|
|
|
|
|
gpg_error_t
|
|
|
|
|
check_application_conflict (ctrl_t ctrl, const char *name)
|
|
|
|
|
{
|
|
|
|
|
int slot = ctrl->reader_slot;
|
|
|
|
|
app_t app;
|
|
|
|
|
|
|
|
|
|
if (slot < 0 || slot >= DIM (lock_table))
|
|
|
|
|
return gpg_error (GPG_ERR_INV_VALUE);
|
|
|
|
|
|
|
|
|
|
app = lock_table[slot].initialized ? lock_table[slot].app : NULL;
|
|
|
|
|
if (app && app->apptype && name)
|
|
|
|
|
if ( ascii_strcasecmp (app->apptype, name))
|
|
|
|
|
return gpg_error (GPG_ERR_CONFLICT);
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2004-01-27 17:40:42 +01:00
|
|
|
|
/* If called with NAME as NULL, select the best fitting application
|
|
|
|
|
and return a context; otherwise select the application with NAME
|
|
|
|
|
and return a context. SLOT identifies the reader device. Returns
|
2005-02-24 18:36:11 +01:00
|
|
|
|
an error code and stores NULL at R_APP if no application was found
|
|
|
|
|
or no card is present. */
|
|
|
|
|
gpg_error_t
|
|
|
|
|
select_application (ctrl_t ctrl, int slot, const char *name, app_t *r_app)
|
2003-08-05 19:11:04 +02:00
|
|
|
|
{
|
2005-05-18 12:48:06 +02:00
|
|
|
|
gpg_error_t err;
|
2005-06-03 15:57:24 +02:00
|
|
|
|
app_t app = NULL;
|
2004-01-27 17:40:42 +01:00
|
|
|
|
unsigned char *result = NULL;
|
|
|
|
|
size_t resultlen;
|
2003-08-05 19:11:04 +02:00
|
|
|
|
|
2008-10-20 15:53:23 +02:00
|
|
|
|
(void)ctrl;
|
|
|
|
|
|
2005-02-24 18:36:11 +01:00
|
|
|
|
*r_app = NULL;
|
2005-06-03 15:57:24 +02:00
|
|
|
|
|
2009-07-13 11:59:22 +02:00
|
|
|
|
err = lock_reader (slot, ctrl);
|
2005-06-03 15:57:24 +02:00
|
|
|
|
if (err)
|
|
|
|
|
return err;
|
|
|
|
|
|
|
|
|
|
/* First check whether we already have an application to share. */
|
|
|
|
|
app = lock_table[slot].initialized ? lock_table[slot].app : NULL;
|
|
|
|
|
if (app && name)
|
|
|
|
|
if (!app->apptype || ascii_strcasecmp (app->apptype, name))
|
|
|
|
|
{
|
|
|
|
|
unlock_reader (slot);
|
|
|
|
|
if (app->apptype)
|
|
|
|
|
log_info ("application `%s' in use by reader %d - can't switch\n",
|
|
|
|
|
app->apptype, slot);
|
|
|
|
|
return gpg_error (GPG_ERR_CONFLICT);
|
|
|
|
|
}
|
|
|
|
|
|
2009-03-24 12:40:57 +01:00
|
|
|
|
/* Don't use a non-reusable marked application. */
|
|
|
|
|
if (app && app->no_reuse)
|
|
|
|
|
{
|
|
|
|
|
unlock_reader (slot);
|
|
|
|
|
log_info ("lingering application `%s' in use by reader %d"
|
|
|
|
|
" - can't switch\n",
|
|
|
|
|
app->apptype? app->apptype:"?", slot);
|
|
|
|
|
return gpg_error (GPG_ERR_CONFLICT);
|
|
|
|
|
}
|
|
|
|
|
|
2006-02-09 19:29:31 +01:00
|
|
|
|
/* If we don't have an app, check whether we have a saved
|
|
|
|
|
application for that slot. This is useful so that a card does
|
2008-09-23 11:57:45 +02:00
|
|
|
|
not get reset even if only one session is using the card - this
|
|
|
|
|
way the PIN cache and other cached data are preserved. */
|
2006-02-09 19:29:31 +01:00
|
|
|
|
if (!app && lock_table[slot].initialized && lock_table[slot].last_app)
|
|
|
|
|
{
|
|
|
|
|
app = lock_table[slot].last_app;
|
|
|
|
|
if (!name || (app->apptype && !ascii_strcasecmp (app->apptype, name)) )
|
|
|
|
|
{
|
|
|
|
|
/* Yes, we can reuse this application - either the caller
|
|
|
|
|
requested an unspecific one or the requested one matches
|
|
|
|
|
the saved one. */
|
|
|
|
|
lock_table[slot].app = app;
|
|
|
|
|
lock_table[slot].last_app = NULL;
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
/* No, this saved application can't be used - deallocate it. */
|
|
|
|
|
lock_table[slot].last_app = NULL;
|
|
|
|
|
deallocate_app (app);
|
|
|
|
|
app = NULL;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* If we can reuse an application, bump the reference count and
|
|
|
|
|
return it. */
|
2005-06-03 15:57:24 +02:00
|
|
|
|
if (app)
|
|
|
|
|
{
|
|
|
|
|
if (app->slot != slot)
|
|
|
|
|
log_bug ("slot mismatch %d/%d\n", app->slot, slot);
|
2006-04-14 22:40:00 +02:00
|
|
|
|
app->slot = slot;
|
|
|
|
|
|
2005-06-03 15:57:24 +02:00
|
|
|
|
app->ref_count++;
|
|
|
|
|
*r_app = app;
|
|
|
|
|
unlock_reader (slot);
|
|
|
|
|
return 0; /* Okay: We share that one. */
|
|
|
|
|
}
|
2009-03-24 12:40:57 +01:00
|
|
|
|
|
2006-02-09 19:29:31 +01:00
|
|
|
|
/* Need to allocate a new one. */
|
2003-08-05 19:11:04 +02:00
|
|
|
|
app = xtrycalloc (1, sizeof *app);
|
|
|
|
|
if (!app)
|
|
|
|
|
{
|
2006-09-14 18:50:33 +02:00
|
|
|
|
err = gpg_error_from_syserror ();
|
2005-05-18 12:48:06 +02:00
|
|
|
|
log_info ("error allocating context: %s\n", gpg_strerror (err));
|
2005-06-03 15:57:24 +02:00
|
|
|
|
unlock_reader (slot);
|
2005-05-18 12:48:06 +02:00
|
|
|
|
return err;
|
2003-08-05 19:11:04 +02:00
|
|
|
|
}
|
|
|
|
|
app->slot = slot;
|
2004-01-27 17:40:42 +01:00
|
|
|
|
|
2005-05-18 12:48:06 +02:00
|
|
|
|
|
2004-01-27 17:40:42 +01:00
|
|
|
|
/* Fixme: We should now first check whether a card is at all
|
|
|
|
|
present. */
|
|
|
|
|
|
|
|
|
|
/* Try to read the GDO file first to get a default serial number. */
|
2005-05-18 12:48:06 +02:00
|
|
|
|
err = iso7816_select_file (slot, 0x3F00, 1, NULL, NULL);
|
|
|
|
|
if (!err)
|
|
|
|
|
err = iso7816_select_file (slot, 0x2F02, 0, NULL, NULL);
|
|
|
|
|
if (!err)
|
|
|
|
|
err = iso7816_read_binary (slot, 0, 0, &result, &resultlen);
|
|
|
|
|
if (!err)
|
2004-01-27 17:40:42 +01:00
|
|
|
|
{
|
|
|
|
|
size_t n;
|
|
|
|
|
const unsigned char *p;
|
|
|
|
|
|
2005-04-27 21:47:53 +02:00
|
|
|
|
p = find_tlv_unchecked (result, resultlen, 0x5A, &n);
|
2004-09-09 09:28:47 +02:00
|
|
|
|
if (p)
|
|
|
|
|
resultlen -= (p-result);
|
|
|
|
|
if (p && n > resultlen && n == 0x0d && resultlen+1 == n)
|
|
|
|
|
{
|
|
|
|
|
/* The object it does not fit into the buffer. This is an
|
|
|
|
|
invalid encoding (or the buffer is too short. However, I
|
|
|
|
|
have some test cards with such an invalid encoding and
|
|
|
|
|
therefore I use this ugly workaround to return something
|
|
|
|
|
I can further experiment with. */
|
2005-06-03 15:57:24 +02:00
|
|
|
|
log_info ("enabling BMI testcard workaround\n");
|
2004-09-09 09:28:47 +02:00
|
|
|
|
n--;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (p && n <= resultlen)
|
2004-01-27 17:40:42 +01:00
|
|
|
|
{
|
|
|
|
|
/* The GDO file is pretty short, thus we simply reuse it for
|
|
|
|
|
storing the serial number. */
|
|
|
|
|
memmove (result, p, n);
|
|
|
|
|
app->serialno = result;
|
|
|
|
|
app->serialnolen = n;
|
2005-05-18 12:48:06 +02:00
|
|
|
|
err = app_munge_serialno (app);
|
|
|
|
|
if (err)
|
2004-09-09 09:28:47 +02:00
|
|
|
|
goto leave;
|
2004-01-27 17:40:42 +01:00
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
xfree (result);
|
|
|
|
|
result = NULL;
|
|
|
|
|
}
|
|
|
|
|
|
2005-02-24 18:36:11 +01:00
|
|
|
|
/* For certain error codes, there is no need to try more. */
|
2009-07-16 17:54:59 +02:00
|
|
|
|
if (gpg_err_code (err) == GPG_ERR_CARD_NOT_PRESENT
|
|
|
|
|
|| gpg_err_code (err) == GPG_ERR_ENODEV)
|
2005-02-24 18:36:11 +01:00
|
|
|
|
goto leave;
|
2004-09-09 09:28:47 +02:00
|
|
|
|
|
2005-02-24 18:36:11 +01:00
|
|
|
|
/* Figure out the application to use. */
|
2005-05-18 12:48:06 +02:00
|
|
|
|
err = gpg_error (GPG_ERR_NOT_FOUND);
|
|
|
|
|
|
|
|
|
|
if (err && is_app_allowed ("openpgp")
|
|
|
|
|
&& (!name || !strcmp (name, "openpgp")))
|
|
|
|
|
err = app_select_openpgp (app);
|
|
|
|
|
if (err && is_app_allowed ("nks") && (!name || !strcmp (name, "nks")))
|
|
|
|
|
err = app_select_nks (app);
|
|
|
|
|
if (err && is_app_allowed ("p15") && (!name || !strcmp (name, "p15")))
|
|
|
|
|
err = app_select_p15 (app);
|
2009-01-27 12:30:02 +01:00
|
|
|
|
if (err && is_app_allowed ("geldkarte")
|
|
|
|
|
&& (!name || !strcmp (name, "geldkarte")))
|
|
|
|
|
err = app_select_geldkarte (app);
|
2011-12-15 21:45:35 +01:00
|
|
|
|
if (err && is_app_allowed ("dinsig") && (!name || !strcmp (name, "dinsig")))
|
|
|
|
|
err = app_select_dinsig (app);
|
2005-05-18 12:48:06 +02:00
|
|
|
|
if (err && name)
|
|
|
|
|
err = gpg_error (GPG_ERR_NOT_SUPPORTED);
|
2004-01-27 17:40:42 +01:00
|
|
|
|
|
2004-09-09 09:28:47 +02:00
|
|
|
|
leave:
|
2005-05-18 12:48:06 +02:00
|
|
|
|
if (err)
|
2003-08-05 19:11:04 +02:00
|
|
|
|
{
|
2004-01-27 17:40:42 +01:00
|
|
|
|
if (name)
|
|
|
|
|
log_info ("can't select application `%s': %s\n",
|
2005-05-18 12:48:06 +02:00
|
|
|
|
name, gpg_strerror (err));
|
2004-01-27 17:40:42 +01:00
|
|
|
|
else
|
|
|
|
|
log_info ("no supported card application found: %s\n",
|
2005-05-18 12:48:06 +02:00
|
|
|
|
gpg_strerror (err));
|
2003-08-05 19:11:04 +02:00
|
|
|
|
xfree (app);
|
2005-06-03 15:57:24 +02:00
|
|
|
|
unlock_reader (slot);
|
2005-05-18 12:48:06 +02:00
|
|
|
|
return err;
|
2003-08-05 19:11:04 +02:00
|
|
|
|
}
|
|
|
|
|
|
2005-06-03 15:57:24 +02:00
|
|
|
|
app->ref_count = 1;
|
2009-02-27 15:36:59 +01:00
|
|
|
|
|
2005-06-03 15:57:24 +02:00
|
|
|
|
lock_table[slot].app = app;
|
2005-02-24 18:36:11 +01:00
|
|
|
|
*r_app = app;
|
2005-06-03 15:57:24 +02:00
|
|
|
|
unlock_reader (slot);
|
2005-02-24 18:36:11 +01:00
|
|
|
|
return 0;
|
2003-08-05 19:11:04 +02:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2009-02-27 15:36:59 +01:00
|
|
|
|
char *
|
|
|
|
|
get_supported_applications (void)
|
|
|
|
|
{
|
|
|
|
|
const char *list[] = {
|
|
|
|
|
"openpgp",
|
|
|
|
|
"nks",
|
|
|
|
|
"p15",
|
|
|
|
|
"geldkarte",
|
2011-12-15 21:45:35 +01:00
|
|
|
|
"dinsig",
|
|
|
|
|
/* Note: "undefined" is not listed here because it needs special
|
|
|
|
|
treatment by the client. */
|
2009-02-27 15:36:59 +01:00
|
|
|
|
NULL
|
|
|
|
|
};
|
|
|
|
|
int idx;
|
|
|
|
|
size_t nbytes;
|
|
|
|
|
char *buffer, *p;
|
|
|
|
|
|
|
|
|
|
for (nbytes=1, idx=0; list[idx]; idx++)
|
|
|
|
|
nbytes += strlen (list[idx]) + 1 + 1;
|
|
|
|
|
|
|
|
|
|
buffer = xtrymalloc (nbytes);
|
|
|
|
|
if (!buffer)
|
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
|
|
for (p=buffer, idx=0; list[idx]; idx++)
|
|
|
|
|
if (is_app_allowed (list[idx]))
|
|
|
|
|
p = stpcpy (stpcpy (p, list[idx]), ":\n");
|
|
|
|
|
*p = 0;
|
|
|
|
|
|
|
|
|
|
return buffer;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2006-02-09 19:29:31 +01:00
|
|
|
|
/* Deallocate the application. */
|
|
|
|
|
static void
|
|
|
|
|
deallocate_app (app_t app)
|
|
|
|
|
{
|
|
|
|
|
if (app->fnc.deinit)
|
|
|
|
|
{
|
|
|
|
|
app->fnc.deinit (app);
|
|
|
|
|
app->fnc.deinit = NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
xfree (app->serialno);
|
|
|
|
|
xfree (app);
|
|
|
|
|
}
|
|
|
|
|
|
2005-06-03 15:57:24 +02:00
|
|
|
|
/* Free the resources associated with the application APP. APP is
|
|
|
|
|
allowed to be NULL in which case this is a no-op. Note that we are
|
2006-02-09 19:29:31 +01:00
|
|
|
|
using reference counting to track the users of the application and
|
2006-03-01 12:05:47 +01:00
|
|
|
|
actually deferring the deallocation to allow for a later reuse by
|
2006-02-09 19:29:31 +01:00
|
|
|
|
a new connection. */
|
2004-01-27 17:40:42 +01:00
|
|
|
|
void
|
|
|
|
|
release_application (app_t app)
|
|
|
|
|
{
|
2005-06-03 15:57:24 +02:00
|
|
|
|
int slot;
|
|
|
|
|
|
2004-01-27 17:40:42 +01:00
|
|
|
|
if (!app)
|
|
|
|
|
return;
|
|
|
|
|
|
2008-11-03 20:09:34 +01:00
|
|
|
|
if (!app->ref_count)
|
2005-06-03 15:57:24 +02:00
|
|
|
|
log_bug ("trying to release an already released context\n");
|
|
|
|
|
if (--app->ref_count)
|
|
|
|
|
return;
|
|
|
|
|
|
2006-02-09 19:29:31 +01:00
|
|
|
|
/* Move the reference to the application in the lock table. */
|
2006-04-14 22:40:00 +02:00
|
|
|
|
slot = app->slot;
|
|
|
|
|
/* FIXME: We are ignoring any error value. */
|
2009-07-13 11:59:22 +02:00
|
|
|
|
lock_reader (slot, NULL);
|
2006-04-14 22:40:00 +02:00
|
|
|
|
if (lock_table[slot].app != app)
|
|
|
|
|
{
|
|
|
|
|
unlock_reader (slot);
|
|
|
|
|
log_bug ("app mismatch %p/%p\n", app, lock_table[slot].app);
|
|
|
|
|
deallocate_app (app);
|
|
|
|
|
return;
|
|
|
|
|
}
|
2004-04-26 20:28:06 +02:00
|
|
|
|
|
2006-04-14 22:40:00 +02:00
|
|
|
|
if (lock_table[slot].last_app)
|
|
|
|
|
deallocate_app (lock_table[slot].last_app);
|
2009-03-24 12:40:57 +01:00
|
|
|
|
if (app->no_reuse)
|
|
|
|
|
{
|
|
|
|
|
/* If we shall not re-use the application we can't save it for
|
|
|
|
|
later use. */
|
|
|
|
|
deallocate_app (app);
|
|
|
|
|
lock_table[slot].last_app = NULL;
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
lock_table[slot].last_app = lock_table[slot].app;
|
2006-04-14 22:40:00 +02:00
|
|
|
|
lock_table[slot].app = NULL;
|
|
|
|
|
unlock_reader (slot);
|
2004-01-27 17:40:42 +01:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2003-08-05 19:11:04 +02:00
|
|
|
|
|
2004-09-09 09:28:47 +02:00
|
|
|
|
/* The serial number may need some cosmetics. Do it here. This
|
|
|
|
|
function shall only be called once after a new serial number has
|
|
|
|
|
been put into APP->serialno.
|
|
|
|
|
|
|
|
|
|
Prefixes we use:
|
|
|
|
|
|
|
|
|
|
FF 00 00 = For serial numbers starting with an FF
|
|
|
|
|
FF 01 00 = Some german p15 cards return an empty serial number so the
|
2005-04-27 14:09:21 +02:00
|
|
|
|
serial number from the EF(TokenInfo) is used instead.
|
2009-01-27 12:30:02 +01:00
|
|
|
|
FF 7F 00 = No serialno.
|
2004-09-09 09:28:47 +02:00
|
|
|
|
|
|
|
|
|
All other serial number not starting with FF are used as they are.
|
|
|
|
|
*/
|
2005-05-18 12:48:06 +02:00
|
|
|
|
gpg_error_t
|
2004-09-09 09:28:47 +02:00
|
|
|
|
app_munge_serialno (app_t app)
|
|
|
|
|
{
|
|
|
|
|
if (app->serialnolen && app->serialno[0] == 0xff)
|
|
|
|
|
{
|
|
|
|
|
/* The serial number starts with our special prefix. This
|
|
|
|
|
requires that we put our default prefix "FF0000" in front. */
|
|
|
|
|
unsigned char *p = xtrymalloc (app->serialnolen + 3);
|
|
|
|
|
if (!p)
|
2009-01-27 12:30:02 +01:00
|
|
|
|
return gpg_error_from_syserror ();
|
2004-09-09 09:28:47 +02:00
|
|
|
|
memcpy (p, "\xff\0", 3);
|
|
|
|
|
memcpy (p+3, app->serialno, app->serialnolen);
|
|
|
|
|
app->serialnolen += 3;
|
|
|
|
|
xfree (app->serialno);
|
|
|
|
|
app->serialno = p;
|
|
|
|
|
}
|
2009-01-27 12:30:02 +01:00
|
|
|
|
else if (!app->serialnolen)
|
|
|
|
|
{
|
|
|
|
|
unsigned char *p = xtrymalloc (3);
|
|
|
|
|
if (!p)
|
|
|
|
|
return gpg_error_from_syserror ();
|
|
|
|
|
memcpy (p, "\xff\x7f", 3);
|
|
|
|
|
app->serialnolen = 3;
|
|
|
|
|
xfree (app->serialno);
|
|
|
|
|
app->serialno = p;
|
|
|
|
|
}
|
2004-09-09 09:28:47 +02:00
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2003-08-05 19:11:04 +02:00
|
|
|
|
/* Retrieve the serial number and the time of the last update of the
|
|
|
|
|
card. The serial number is returned as a malloced string (hex
|
|
|
|
|
encoded) in SERIAL and the time of update is returned in STAMP. If
|
|
|
|
|
no update time is available the returned value is 0. Caller must
|
2004-01-27 17:40:42 +01:00
|
|
|
|
free SERIAL unless the function returns an error. If STAMP is not
|
|
|
|
|
of interest, NULL may be passed. */
|
2005-05-18 12:48:06 +02:00
|
|
|
|
gpg_error_t
|
2004-01-27 17:40:42 +01:00
|
|
|
|
app_get_serial_and_stamp (app_t app, char **serial, time_t *stamp)
|
2003-08-05 19:11:04 +02:00
|
|
|
|
{
|
2008-11-03 11:54:18 +01:00
|
|
|
|
char *buf;
|
2003-08-05 19:11:04 +02:00
|
|
|
|
|
2004-01-27 17:40:42 +01:00
|
|
|
|
if (!app || !serial)
|
2003-08-05 19:11:04 +02:00
|
|
|
|
return gpg_error (GPG_ERR_INV_VALUE);
|
|
|
|
|
|
|
|
|
|
*serial = NULL;
|
2004-01-27 17:40:42 +01:00
|
|
|
|
if (stamp)
|
|
|
|
|
*stamp = 0; /* not available */
|
2003-08-05 19:11:04 +02:00
|
|
|
|
|
2009-01-27 12:30:02 +01:00
|
|
|
|
if (!app->serialnolen)
|
|
|
|
|
buf = xtrystrdup ("FF7F00");
|
|
|
|
|
else
|
|
|
|
|
buf = bin2hex (app->serialno, app->serialnolen, NULL);
|
2003-08-05 19:11:04 +02:00
|
|
|
|
if (!buf)
|
2006-09-14 18:50:33 +02:00
|
|
|
|
return gpg_error_from_syserror ();
|
2008-11-03 11:54:18 +01:00
|
|
|
|
|
2003-08-05 19:11:04 +02:00
|
|
|
|
*serial = buf;
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
/* Write out the application specifig status lines for the LEARN
|
|
|
|
|
command. */
|
2005-05-18 12:48:06 +02:00
|
|
|
|
gpg_error_t
|
2009-03-18 12:18:56 +01:00
|
|
|
|
app_write_learn_status (app_t app, ctrl_t ctrl, unsigned int flags)
|
2003-08-05 19:11:04 +02:00
|
|
|
|
{
|
2005-05-18 12:48:06 +02:00
|
|
|
|
gpg_error_t err;
|
|
|
|
|
|
2003-08-05 19:11:04 +02:00
|
|
|
|
if (!app)
|
|
|
|
|
return gpg_error (GPG_ERR_INV_VALUE);
|
2008-11-03 20:09:34 +01:00
|
|
|
|
if (!app->ref_count)
|
2003-08-05 19:11:04 +02:00
|
|
|
|
return gpg_error (GPG_ERR_CARD_NOT_INITIALIZED);
|
|
|
|
|
if (!app->fnc.learn_status)
|
|
|
|
|
return gpg_error (GPG_ERR_UNSUPPORTED_OPERATION);
|
2004-01-27 17:40:42 +01:00
|
|
|
|
|
2009-03-18 12:18:56 +01:00
|
|
|
|
/* We do not send APPTYPE if only keypairinfo is requested. */
|
|
|
|
|
if (app->apptype && !(flags & 1))
|
2004-01-27 17:40:42 +01:00
|
|
|
|
send_status_info (ctrl, "APPTYPE",
|
|
|
|
|
app->apptype, strlen (app->apptype), NULL, 0);
|
2009-07-13 11:59:22 +02:00
|
|
|
|
err = lock_reader (app->slot, ctrl);
|
2005-05-18 12:48:06 +02:00
|
|
|
|
if (err)
|
|
|
|
|
return err;
|
2009-03-18 12:18:56 +01:00
|
|
|
|
err = app->fnc.learn_status (app, ctrl, flags);
|
2005-06-03 15:57:24 +02:00
|
|
|
|
unlock_reader (app->slot);
|
2005-05-18 12:48:06 +02:00
|
|
|
|
return err;
|
2003-08-05 19:11:04 +02:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2004-01-27 17:40:42 +01:00
|
|
|
|
/* Read the certificate with id CERTID (as returned by learn_status in
|
|
|
|
|
the CERTINFO status lines) and return it in the freshly allocated
|
|
|
|
|
buffer put into CERT and the length of the certificate put into
|
|
|
|
|
CERTLEN. */
|
2005-05-18 12:48:06 +02:00
|
|
|
|
gpg_error_t
|
2004-01-27 17:40:42 +01:00
|
|
|
|
app_readcert (app_t app, const char *certid,
|
|
|
|
|
unsigned char **cert, size_t *certlen)
|
|
|
|
|
{
|
2005-05-18 12:48:06 +02:00
|
|
|
|
gpg_error_t err;
|
|
|
|
|
|
2004-01-27 17:40:42 +01:00
|
|
|
|
if (!app)
|
|
|
|
|
return gpg_error (GPG_ERR_INV_VALUE);
|
2008-11-03 20:09:34 +01:00
|
|
|
|
if (!app->ref_count)
|
2004-01-27 17:40:42 +01:00
|
|
|
|
return gpg_error (GPG_ERR_CARD_NOT_INITIALIZED);
|
|
|
|
|
if (!app->fnc.readcert)
|
|
|
|
|
return gpg_error (GPG_ERR_UNSUPPORTED_OPERATION);
|
2009-07-13 11:59:22 +02:00
|
|
|
|
err = lock_reader (app->slot, NULL/* FIXME*/);
|
2005-05-18 12:48:06 +02:00
|
|
|
|
if (err)
|
|
|
|
|
return err;
|
|
|
|
|
err = app->fnc.readcert (app, certid, cert, certlen);
|
2005-06-03 15:57:24 +02:00
|
|
|
|
unlock_reader (app->slot);
|
2005-05-18 12:48:06 +02:00
|
|
|
|
return err;
|
2004-01-27 17:40:42 +01:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2005-02-22 18:29:07 +01:00
|
|
|
|
/* Read the key with ID KEYID. On success a canonical encoded
|
|
|
|
|
S-expression with the public key will get stored at PK and its
|
|
|
|
|
length (for assertions) at PKLEN; the caller must release that
|
|
|
|
|
buffer. On error NULL will be stored at PK and PKLEN and an error
|
|
|
|
|
code returned.
|
|
|
|
|
|
|
|
|
|
This function might not be supported by all applications. */
|
2009-06-09 21:11:28 +02:00
|
|
|
|
gpg_error_t
|
2005-02-22 18:29:07 +01:00
|
|
|
|
app_readkey (app_t app, const char *keyid, unsigned char **pk, size_t *pklen)
|
|
|
|
|
{
|
2005-05-18 12:48:06 +02:00
|
|
|
|
gpg_error_t err;
|
|
|
|
|
|
2005-02-22 18:29:07 +01:00
|
|
|
|
if (pk)
|
|
|
|
|
*pk = NULL;
|
|
|
|
|
if (pklen)
|
|
|
|
|
*pklen = 0;
|
|
|
|
|
|
|
|
|
|
if (!app || !keyid || !pk || !pklen)
|
|
|
|
|
return gpg_error (GPG_ERR_INV_VALUE);
|
2008-11-03 20:09:34 +01:00
|
|
|
|
if (!app->ref_count)
|
2005-02-22 18:29:07 +01:00
|
|
|
|
return gpg_error (GPG_ERR_CARD_NOT_INITIALIZED);
|
|
|
|
|
if (!app->fnc.readkey)
|
|
|
|
|
return gpg_error (GPG_ERR_UNSUPPORTED_OPERATION);
|
2009-07-13 11:59:22 +02:00
|
|
|
|
err = lock_reader (app->slot, NULL /*FIXME*/);
|
2005-05-18 12:48:06 +02:00
|
|
|
|
if (err)
|
|
|
|
|
return err;
|
|
|
|
|
err= app->fnc.readkey (app, keyid, pk, pklen);
|
2005-06-03 15:57:24 +02:00
|
|
|
|
unlock_reader (app->slot);
|
2005-05-18 12:48:06 +02:00
|
|
|
|
return err;
|
2005-02-22 18:29:07 +01:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2003-09-30 19:35:05 +02:00
|
|
|
|
/* Perform a GETATTR operation. */
|
2005-05-18 12:48:06 +02:00
|
|
|
|
gpg_error_t
|
2006-09-06 18:35:52 +02:00
|
|
|
|
app_getattr (app_t app, ctrl_t ctrl, const char *name)
|
2003-09-30 19:35:05 +02:00
|
|
|
|
{
|
2005-05-18 12:48:06 +02:00
|
|
|
|
gpg_error_t err;
|
|
|
|
|
|
2003-09-30 19:35:05 +02:00
|
|
|
|
if (!app || !name || !*name)
|
|
|
|
|
return gpg_error (GPG_ERR_INV_VALUE);
|
2008-11-03 20:09:34 +01:00
|
|
|
|
if (!app->ref_count)
|
2003-09-30 19:35:05 +02:00
|
|
|
|
return gpg_error (GPG_ERR_CARD_NOT_INITIALIZED);
|
2005-02-24 22:40:48 +01:00
|
|
|
|
|
|
|
|
|
if (app->apptype && name && !strcmp (name, "APPTYPE"))
|
|
|
|
|
{
|
|
|
|
|
send_status_info (ctrl, "APPTYPE",
|
|
|
|
|
app->apptype, strlen (app->apptype), NULL, 0);
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
if (name && !strcmp (name, "SERIALNO"))
|
|
|
|
|
{
|
|
|
|
|
char *serial;
|
|
|
|
|
time_t stamp;
|
|
|
|
|
int rc;
|
|
|
|
|
|
|
|
|
|
rc = app_get_serial_and_stamp (app, &serial, &stamp);
|
|
|
|
|
if (rc)
|
|
|
|
|
return rc;
|
2005-02-25 17:14:55 +01:00
|
|
|
|
send_status_info (ctrl, "SERIALNO", serial, strlen (serial), NULL, 0);
|
2005-02-24 22:40:48 +01:00
|
|
|
|
xfree (serial);
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
2003-09-30 19:35:05 +02:00
|
|
|
|
if (!app->fnc.getattr)
|
|
|
|
|
return gpg_error (GPG_ERR_UNSUPPORTED_OPERATION);
|
2009-07-13 11:59:22 +02:00
|
|
|
|
err = lock_reader (app->slot, ctrl);
|
2005-05-18 12:48:06 +02:00
|
|
|
|
if (err)
|
|
|
|
|
return err;
|
|
|
|
|
err = app->fnc.getattr (app, ctrl, name);
|
2005-06-03 15:57:24 +02:00
|
|
|
|
unlock_reader (app->slot);
|
2005-05-18 12:48:06 +02:00
|
|
|
|
return err;
|
2003-09-30 19:35:05 +02:00
|
|
|
|
}
|
|
|
|
|
|
2003-08-05 19:11:04 +02:00
|
|
|
|
/* Perform a SETATTR operation. */
|
2005-05-18 12:48:06 +02:00
|
|
|
|
gpg_error_t
|
|
|
|
|
app_setattr (app_t app, const char *name,
|
|
|
|
|
gpg_error_t (*pincb)(void*, const char *, char **),
|
2003-08-05 19:11:04 +02:00
|
|
|
|
void *pincb_arg,
|
|
|
|
|
const unsigned char *value, size_t valuelen)
|
|
|
|
|
{
|
2005-05-18 12:48:06 +02:00
|
|
|
|
gpg_error_t err;
|
|
|
|
|
|
2003-08-05 19:11:04 +02:00
|
|
|
|
if (!app || !name || !*name || !value)
|
|
|
|
|
return gpg_error (GPG_ERR_INV_VALUE);
|
2008-11-03 20:09:34 +01:00
|
|
|
|
if (!app->ref_count)
|
2003-08-05 19:11:04 +02:00
|
|
|
|
return gpg_error (GPG_ERR_CARD_NOT_INITIALIZED);
|
|
|
|
|
if (!app->fnc.setattr)
|
|
|
|
|
return gpg_error (GPG_ERR_UNSUPPORTED_OPERATION);
|
2009-07-13 11:59:22 +02:00
|
|
|
|
err = lock_reader (app->slot, NULL /*FIXME*/);
|
2005-05-18 12:48:06 +02:00
|
|
|
|
if (err)
|
|
|
|
|
return err;
|
|
|
|
|
err = app->fnc.setattr (app, name, pincb, pincb_arg, value, valuelen);
|
2005-06-03 15:57:24 +02:00
|
|
|
|
unlock_reader (app->slot);
|
2005-05-18 12:48:06 +02:00
|
|
|
|
return err;
|
2003-08-05 19:11:04 +02:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Create the signature and return the allocated result in OUTDATA.
|
|
|
|
|
If a PIN is required the PINCB will be used to ask for the PIN; it
|
|
|
|
|
should return the PIN in an allocated buffer and put it into PIN. */
|
2005-05-18 12:48:06 +02:00
|
|
|
|
gpg_error_t
|
|
|
|
|
app_sign (app_t app, const char *keyidstr, int hashalgo,
|
|
|
|
|
gpg_error_t (*pincb)(void*, const char *, char **),
|
2003-08-05 19:11:04 +02:00
|
|
|
|
void *pincb_arg,
|
|
|
|
|
const void *indata, size_t indatalen,
|
|
|
|
|
unsigned char **outdata, size_t *outdatalen )
|
|
|
|
|
{
|
2005-05-18 12:48:06 +02:00
|
|
|
|
gpg_error_t err;
|
2003-08-05 19:11:04 +02:00
|
|
|
|
|
|
|
|
|
if (!app || !indata || !indatalen || !outdata || !outdatalen || !pincb)
|
|
|
|
|
return gpg_error (GPG_ERR_INV_VALUE);
|
2008-11-03 20:09:34 +01:00
|
|
|
|
if (!app->ref_count)
|
2003-08-05 19:11:04 +02:00
|
|
|
|
return gpg_error (GPG_ERR_CARD_NOT_INITIALIZED);
|
|
|
|
|
if (!app->fnc.sign)
|
|
|
|
|
return gpg_error (GPG_ERR_UNSUPPORTED_OPERATION);
|
2009-07-13 11:59:22 +02:00
|
|
|
|
err = lock_reader (app->slot, NULL /*FIXME*/);
|
2005-05-18 12:48:06 +02:00
|
|
|
|
if (err)
|
|
|
|
|
return err;
|
|
|
|
|
err = app->fnc.sign (app, keyidstr, hashalgo,
|
|
|
|
|
pincb, pincb_arg,
|
|
|
|
|
indata, indatalen,
|
|
|
|
|
outdata, outdatalen);
|
2005-06-03 15:57:24 +02:00
|
|
|
|
unlock_reader (app->slot);
|
2003-08-05 19:11:04 +02:00
|
|
|
|
if (opt.verbose)
|
2005-05-18 12:48:06 +02:00
|
|
|
|
log_info ("operation sign result: %s\n", gpg_strerror (err));
|
|
|
|
|
return err;
|
2003-08-05 19:11:04 +02:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Create the signature using the INTERNAL AUTHENTICATE command and
|
|
|
|
|
return the allocated result in OUTDATA. If a PIN is required the
|
|
|
|
|
PINCB will be used to ask for the PIN; it should return the PIN in
|
|
|
|
|
an allocated buffer and put it into PIN. */
|
2005-05-18 12:48:06 +02:00
|
|
|
|
gpg_error_t
|
|
|
|
|
app_auth (app_t app, const char *keyidstr,
|
|
|
|
|
gpg_error_t (*pincb)(void*, const char *, char **),
|
2003-08-05 19:11:04 +02:00
|
|
|
|
void *pincb_arg,
|
|
|
|
|
const void *indata, size_t indatalen,
|
|
|
|
|
unsigned char **outdata, size_t *outdatalen )
|
|
|
|
|
{
|
2005-05-18 12:48:06 +02:00
|
|
|
|
gpg_error_t err;
|
2003-08-05 19:11:04 +02:00
|
|
|
|
|
|
|
|
|
if (!app || !indata || !indatalen || !outdata || !outdatalen || !pincb)
|
|
|
|
|
return gpg_error (GPG_ERR_INV_VALUE);
|
2008-11-03 20:09:34 +01:00
|
|
|
|
if (!app->ref_count)
|
2003-08-05 19:11:04 +02:00
|
|
|
|
return gpg_error (GPG_ERR_CARD_NOT_INITIALIZED);
|
|
|
|
|
if (!app->fnc.auth)
|
|
|
|
|
return gpg_error (GPG_ERR_UNSUPPORTED_OPERATION);
|
2009-07-13 11:59:22 +02:00
|
|
|
|
err = lock_reader (app->slot, NULL /*FIXME*/);
|
2005-05-18 12:48:06 +02:00
|
|
|
|
if (err)
|
|
|
|
|
return err;
|
|
|
|
|
err = app->fnc.auth (app, keyidstr,
|
|
|
|
|
pincb, pincb_arg,
|
|
|
|
|
indata, indatalen,
|
|
|
|
|
outdata, outdatalen);
|
2005-06-03 15:57:24 +02:00
|
|
|
|
unlock_reader (app->slot);
|
2003-08-05 19:11:04 +02:00
|
|
|
|
if (opt.verbose)
|
2005-05-18 12:48:06 +02:00
|
|
|
|
log_info ("operation auth result: %s\n", gpg_strerror (err));
|
|
|
|
|
return err;
|
2003-08-05 19:11:04 +02:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
/* Decrypt the data in INDATA and return the allocated result in OUTDATA.
|
|
|
|
|
If a PIN is required the PINCB will be used to ask for the PIN; it
|
|
|
|
|
should return the PIN in an allocated buffer and put it into PIN. */
|
2005-05-18 12:48:06 +02:00
|
|
|
|
gpg_error_t
|
|
|
|
|
app_decipher (app_t app, const char *keyidstr,
|
|
|
|
|
gpg_error_t (*pincb)(void*, const char *, char **),
|
2003-08-05 19:11:04 +02:00
|
|
|
|
void *pincb_arg,
|
|
|
|
|
const void *indata, size_t indatalen,
|
|
|
|
|
unsigned char **outdata, size_t *outdatalen )
|
|
|
|
|
{
|
2005-05-18 12:48:06 +02:00
|
|
|
|
gpg_error_t err;
|
2003-08-05 19:11:04 +02:00
|
|
|
|
|
|
|
|
|
if (!app || !indata || !indatalen || !outdata || !outdatalen || !pincb)
|
|
|
|
|
return gpg_error (GPG_ERR_INV_VALUE);
|
2008-11-03 20:09:34 +01:00
|
|
|
|
if (!app->ref_count)
|
2003-08-05 19:11:04 +02:00
|
|
|
|
return gpg_error (GPG_ERR_CARD_NOT_INITIALIZED);
|
|
|
|
|
if (!app->fnc.decipher)
|
|
|
|
|
return gpg_error (GPG_ERR_UNSUPPORTED_OPERATION);
|
2009-07-13 11:59:22 +02:00
|
|
|
|
err = lock_reader (app->slot, NULL /*FIXME*/);
|
2005-05-18 12:48:06 +02:00
|
|
|
|
if (err)
|
|
|
|
|
return err;
|
|
|
|
|
err = app->fnc.decipher (app, keyidstr,
|
|
|
|
|
pincb, pincb_arg,
|
|
|
|
|
indata, indatalen,
|
|
|
|
|
outdata, outdatalen);
|
2005-06-03 15:57:24 +02:00
|
|
|
|
unlock_reader (app->slot);
|
2003-08-05 19:11:04 +02:00
|
|
|
|
if (opt.verbose)
|
2005-05-18 12:48:06 +02:00
|
|
|
|
log_info ("operation decipher result: %s\n", gpg_strerror (err));
|
|
|
|
|
return err;
|
2003-08-05 19:11:04 +02:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2008-09-23 11:57:45 +02:00
|
|
|
|
/* Perform the WRITECERT operation. */
|
|
|
|
|
gpg_error_t
|
|
|
|
|
app_writecert (app_t app, ctrl_t ctrl,
|
|
|
|
|
const char *certidstr,
|
|
|
|
|
gpg_error_t (*pincb)(void*, const char *, char **),
|
|
|
|
|
void *pincb_arg,
|
|
|
|
|
const unsigned char *data, size_t datalen)
|
|
|
|
|
{
|
|
|
|
|
gpg_error_t err;
|
|
|
|
|
|
|
|
|
|
if (!app || !certidstr || !*certidstr || !pincb)
|
|
|
|
|
return gpg_error (GPG_ERR_INV_VALUE);
|
2008-11-03 20:09:34 +01:00
|
|
|
|
if (!app->ref_count)
|
2008-09-23 11:57:45 +02:00
|
|
|
|
return gpg_error (GPG_ERR_CARD_NOT_INITIALIZED);
|
|
|
|
|
if (!app->fnc.writecert)
|
|
|
|
|
return gpg_error (GPG_ERR_UNSUPPORTED_OPERATION);
|
2009-07-13 11:59:22 +02:00
|
|
|
|
err = lock_reader (app->slot, ctrl);
|
2008-09-23 11:57:45 +02:00
|
|
|
|
if (err)
|
|
|
|
|
return err;
|
|
|
|
|
err = app->fnc.writecert (app, ctrl, certidstr,
|
|
|
|
|
pincb, pincb_arg, data, datalen);
|
|
|
|
|
unlock_reader (app->slot);
|
|
|
|
|
if (opt.verbose)
|
|
|
|
|
log_info ("operation writecert result: %s\n", gpg_strerror (err));
|
|
|
|
|
return err;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2005-05-20 22:39:36 +02:00
|
|
|
|
/* Perform the WRITEKEY operation. */
|
|
|
|
|
gpg_error_t
|
|
|
|
|
app_writekey (app_t app, ctrl_t ctrl,
|
|
|
|
|
const char *keyidstr, unsigned int flags,
|
|
|
|
|
gpg_error_t (*pincb)(void*, const char *, char **),
|
|
|
|
|
void *pincb_arg,
|
|
|
|
|
const unsigned char *keydata, size_t keydatalen)
|
|
|
|
|
{
|
|
|
|
|
gpg_error_t err;
|
|
|
|
|
|
|
|
|
|
if (!app || !keyidstr || !*keyidstr || !pincb)
|
|
|
|
|
return gpg_error (GPG_ERR_INV_VALUE);
|
2008-11-03 20:09:34 +01:00
|
|
|
|
if (!app->ref_count)
|
2005-05-20 22:39:36 +02:00
|
|
|
|
return gpg_error (GPG_ERR_CARD_NOT_INITIALIZED);
|
|
|
|
|
if (!app->fnc.writekey)
|
|
|
|
|
return gpg_error (GPG_ERR_UNSUPPORTED_OPERATION);
|
2009-07-13 11:59:22 +02:00
|
|
|
|
err = lock_reader (app->slot, ctrl);
|
2005-05-20 22:39:36 +02:00
|
|
|
|
if (err)
|
|
|
|
|
return err;
|
|
|
|
|
err = app->fnc.writekey (app, ctrl, keyidstr, flags,
|
|
|
|
|
pincb, pincb_arg, keydata, keydatalen);
|
2005-06-03 15:57:24 +02:00
|
|
|
|
unlock_reader (app->slot);
|
2005-05-20 22:39:36 +02:00
|
|
|
|
if (opt.verbose)
|
|
|
|
|
log_info ("operation writekey result: %s\n", gpg_strerror (err));
|
|
|
|
|
return err;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2003-08-05 19:11:04 +02:00
|
|
|
|
/* Perform a SETATTR operation. */
|
2005-05-18 12:48:06 +02:00
|
|
|
|
gpg_error_t
|
2006-09-06 18:35:52 +02:00
|
|
|
|
app_genkey (app_t app, ctrl_t ctrl, const char *keynostr, unsigned int flags,
|
2007-07-05 18:58:19 +02:00
|
|
|
|
time_t createtime,
|
2005-05-18 12:48:06 +02:00
|
|
|
|
gpg_error_t (*pincb)(void*, const char *, char **),
|
2003-08-05 19:11:04 +02:00
|
|
|
|
void *pincb_arg)
|
|
|
|
|
{
|
2005-05-18 12:48:06 +02:00
|
|
|
|
gpg_error_t err;
|
2003-08-05 19:11:04 +02:00
|
|
|
|
|
|
|
|
|
if (!app || !keynostr || !*keynostr || !pincb)
|
|
|
|
|
return gpg_error (GPG_ERR_INV_VALUE);
|
2008-11-03 20:09:34 +01:00
|
|
|
|
if (!app->ref_count)
|
2003-08-05 19:11:04 +02:00
|
|
|
|
return gpg_error (GPG_ERR_CARD_NOT_INITIALIZED);
|
|
|
|
|
if (!app->fnc.genkey)
|
|
|
|
|
return gpg_error (GPG_ERR_UNSUPPORTED_OPERATION);
|
2009-07-13 11:59:22 +02:00
|
|
|
|
err = lock_reader (app->slot, ctrl);
|
2005-05-18 12:48:06 +02:00
|
|
|
|
if (err)
|
|
|
|
|
return err;
|
2007-07-05 18:58:19 +02:00
|
|
|
|
err = app->fnc.genkey (app, ctrl, keynostr, flags,
|
|
|
|
|
createtime, pincb, pincb_arg);
|
2005-06-03 15:57:24 +02:00
|
|
|
|
unlock_reader (app->slot);
|
2003-08-05 19:11:04 +02:00
|
|
|
|
if (opt.verbose)
|
2005-05-18 12:48:06 +02:00
|
|
|
|
log_info ("operation genkey result: %s\n", gpg_strerror (err));
|
|
|
|
|
return err;
|
2003-08-05 19:11:04 +02:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
/* Perform a GET CHALLENGE operation. This fucntion is special as it
|
|
|
|
|
directly accesses the card without any application specific
|
|
|
|
|
wrapper. */
|
2005-05-18 12:48:06 +02:00
|
|
|
|
gpg_error_t
|
|
|
|
|
app_get_challenge (app_t app, size_t nbytes, unsigned char *buffer)
|
2003-08-05 19:11:04 +02:00
|
|
|
|
{
|
2005-05-18 12:48:06 +02:00
|
|
|
|
gpg_error_t err;
|
|
|
|
|
|
2003-08-05 19:11:04 +02:00
|
|
|
|
if (!app || !nbytes || !buffer)
|
|
|
|
|
return gpg_error (GPG_ERR_INV_VALUE);
|
2008-11-03 20:09:34 +01:00
|
|
|
|
if (!app->ref_count)
|
2003-08-05 19:11:04 +02:00
|
|
|
|
return gpg_error (GPG_ERR_CARD_NOT_INITIALIZED);
|
2009-07-13 11:59:22 +02:00
|
|
|
|
err = lock_reader (app->slot, NULL /*FIXME*/);
|
2005-05-18 12:48:06 +02:00
|
|
|
|
if (err)
|
|
|
|
|
return err;
|
|
|
|
|
err = iso7816_get_challenge (app->slot, nbytes, buffer);
|
2005-06-03 15:57:24 +02:00
|
|
|
|
unlock_reader (app->slot);
|
2005-05-18 12:48:06 +02:00
|
|
|
|
return err;
|
2003-08-05 19:11:04 +02:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
/* Perform a CHANGE REFERENCE DATA or RESET RETRY COUNTER operation. */
|
2005-05-18 12:48:06 +02:00
|
|
|
|
gpg_error_t
|
2006-09-06 18:35:52 +02:00
|
|
|
|
app_change_pin (app_t app, ctrl_t ctrl, const char *chvnostr, int reset_mode,
|
2005-05-18 12:48:06 +02:00
|
|
|
|
gpg_error_t (*pincb)(void*, const char *, char **),
|
2003-08-05 19:11:04 +02:00
|
|
|
|
void *pincb_arg)
|
|
|
|
|
{
|
2005-05-18 12:48:06 +02:00
|
|
|
|
gpg_error_t err;
|
2003-08-05 19:11:04 +02:00
|
|
|
|
|
|
|
|
|
if (!app || !chvnostr || !*chvnostr || !pincb)
|
|
|
|
|
return gpg_error (GPG_ERR_INV_VALUE);
|
2008-11-03 20:09:34 +01:00
|
|
|
|
if (!app->ref_count)
|
2003-08-05 19:11:04 +02:00
|
|
|
|
return gpg_error (GPG_ERR_CARD_NOT_INITIALIZED);
|
|
|
|
|
if (!app->fnc.change_pin)
|
|
|
|
|
return gpg_error (GPG_ERR_UNSUPPORTED_OPERATION);
|
2009-07-13 11:59:22 +02:00
|
|
|
|
err = lock_reader (app->slot, ctrl);
|
2005-05-18 12:48:06 +02:00
|
|
|
|
if (err)
|
|
|
|
|
return err;
|
|
|
|
|
err = app->fnc.change_pin (app, ctrl, chvnostr, reset_mode,
|
|
|
|
|
pincb, pincb_arg);
|
2005-06-03 15:57:24 +02:00
|
|
|
|
unlock_reader (app->slot);
|
2003-08-05 19:11:04 +02:00
|
|
|
|
if (opt.verbose)
|
2005-05-18 12:48:06 +02:00
|
|
|
|
log_info ("operation change_pin result: %s\n", gpg_strerror (err));
|
|
|
|
|
return err;
|
2003-08-05 19:11:04 +02:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2003-10-21 19:12:50 +02:00
|
|
|
|
/* Perform a VERIFY operation without doing anything lese. This may
|
2005-04-11 18:20:10 +02:00
|
|
|
|
be used to initialze a the PIN cache for long lasting other
|
2003-10-21 19:12:50 +02:00
|
|
|
|
operations. Its use is highly application dependent. */
|
2005-05-18 12:48:06 +02:00
|
|
|
|
gpg_error_t
|
|
|
|
|
app_check_pin (app_t app, const char *keyidstr,
|
|
|
|
|
gpg_error_t (*pincb)(void*, const char *, char **),
|
2003-10-21 19:12:50 +02:00
|
|
|
|
void *pincb_arg)
|
|
|
|
|
{
|
2005-05-18 12:48:06 +02:00
|
|
|
|
gpg_error_t err;
|
2003-10-21 19:12:50 +02:00
|
|
|
|
|
|
|
|
|
if (!app || !keyidstr || !*keyidstr || !pincb)
|
|
|
|
|
return gpg_error (GPG_ERR_INV_VALUE);
|
2008-11-03 20:09:34 +01:00
|
|
|
|
if (!app->ref_count)
|
2003-10-21 19:12:50 +02:00
|
|
|
|
return gpg_error (GPG_ERR_CARD_NOT_INITIALIZED);
|
|
|
|
|
if (!app->fnc.check_pin)
|
|
|
|
|
return gpg_error (GPG_ERR_UNSUPPORTED_OPERATION);
|
2009-07-13 11:59:22 +02:00
|
|
|
|
err = lock_reader (app->slot, NULL /*FIXME*/);
|
2005-05-18 12:48:06 +02:00
|
|
|
|
if (err)
|
|
|
|
|
return err;
|
|
|
|
|
err = app->fnc.check_pin (app, keyidstr, pincb, pincb_arg);
|
2005-06-03 15:57:24 +02:00
|
|
|
|
unlock_reader (app->slot);
|
2003-10-21 19:12:50 +02:00
|
|
|
|
if (opt.verbose)
|
2005-05-18 12:48:06 +02:00
|
|
|
|
log_info ("operation check_pin result: %s\n", gpg_strerror (err));
|
|
|
|
|
return err;
|
2003-10-21 19:12:50 +02:00
|
|
|
|
}
|
|
|
|
|
|