mirror of
git://git.gnupg.org/gnupg.git
synced 2024-12-22 10:19:57 +01:00
32476f870d
* scd/app.c (initialize_module_command): Use O_NONBLOCK for pipe. -- GnuPG-bug-id: 7151 Signed-off-by: NIIBE Yutaka <gniibe@fsij.org>
2868 lines
81 KiB
C
2868 lines
81 KiB
C
/* app.c - Application selection.
|
||
* Copyright (C) 2003, 2004, 2005 Free Software Foundation, Inc.
|
||
*
|
||
* This file is part of GnuPG.
|
||
*
|
||
* GnuPG is free software; you can redistribute it and/or modify
|
||
* it under the terms of the GNU General Public License as published by
|
||
* the Free Software Foundation; either version 3 of the License, or
|
||
* (at your option) any later version.
|
||
*
|
||
* GnuPG is distributed in the hope that it will be useful,
|
||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||
* GNU General Public License for more details.
|
||
*
|
||
* You should have received a copy of the GNU General Public License
|
||
* along with this program; if not, see <https://www.gnu.org/licenses/>.
|
||
*/
|
||
|
||
#include <config.h>
|
||
#include <errno.h>
|
||
#include <stdio.h>
|
||
#include <stdlib.h>
|
||
#include <string.h>
|
||
#include <npth.h>
|
||
|
||
#ifndef HAVE_W32_SYSTEM
|
||
#include <fcntl.h> /* F_SETFD F_GETFL F_SETFL O_NONBLOCK fcntl(2) */
|
||
#endif
|
||
|
||
#include "scdaemon.h"
|
||
#include "../common/exechelp.h"
|
||
#include "iso7816.h"
|
||
#include "apdu.h"
|
||
#include "../common/tlv.h"
|
||
#include "../common/membuf.h"
|
||
|
||
|
||
/* Forward declaration of internal function. */
|
||
static gpg_error_t
|
||
select_additional_application_internal (card_t card, apptype_t req_apptype);
|
||
static gpg_error_t
|
||
send_serialno_and_app_status (card_t card, int with_apps, ctrl_t ctrl);
|
||
static gpg_error_t run_reselect (ctrl_t ctrl, card_t c, app_t a, app_t a_prev);
|
||
|
||
/*
|
||
* Multiple readers, single writer (MRSW) lock.
|
||
*/
|
||
struct mrsw_lock
|
||
{
|
||
npth_mutex_t lock;
|
||
npth_cond_t cond;
|
||
int num_readers_active;
|
||
int num_writers_waiting;
|
||
int writer_active;
|
||
#ifdef HAVE_W32_SYSTEM
|
||
HANDLE events[2];
|
||
HANDLE the_event;
|
||
#else
|
||
int notify_pipe[2];
|
||
#endif
|
||
};
|
||
|
||
/* MRSW lock to protect the list of cards.
|
||
*
|
||
* This structure is used for serializing access to the list of cards
|
||
* (by CARD_TOP). While allowing multiple accesses by different
|
||
* connections as "r" access (for a CARD in the list), "w" access to
|
||
* update the list is only possible with a single thread.
|
||
*
|
||
* Each use of a CARD (in the list) does "r" access.
|
||
*
|
||
* For "w" access, the app_send_devinfo function may wait on any
|
||
* change of the list. For other cases of "w" access are opening new
|
||
* card or removal of card, updating the list of card.
|
||
*
|
||
* Note that for serializing access to each CARD (and its associated
|
||
* applications) itself, it is done separately by another mutex with
|
||
* lock_card/unlock_card.
|
||
*/
|
||
static struct mrsw_lock card_list_lock;
|
||
|
||
/* A list of card contexts. A card is a collection of applications
|
||
* (described by app_t) on the same physical token. */
|
||
static card_t card_top;
|
||
|
||
|
||
/* The list of application names and their select function. If no
|
||
* specific application is selected the first available application on
|
||
* a card is selected. */
|
||
struct app_priority_list_s
|
||
{
|
||
apptype_t apptype;
|
||
char const *name;
|
||
gpg_error_t (*select_func)(app_t);
|
||
};
|
||
|
||
static struct app_priority_list_s app_priority_list[] =
|
||
{{ APPTYPE_OPENPGP , "openpgp", app_select_openpgp },
|
||
{ APPTYPE_PIV , "piv", app_select_piv },
|
||
{ APPTYPE_NKS , "nks", app_select_nks },
|
||
{ APPTYPE_P15 , "p15", app_select_p15 },
|
||
{ APPTYPE_GELDKARTE, "geldkarte", app_select_geldkarte },
|
||
{ APPTYPE_DINSIG , "dinsig", app_select_dinsig },
|
||
{ APPTYPE_SC_HSM , "sc-hsm", app_select_sc_hsm },
|
||
{ APPTYPE_NONE , NULL, NULL }
|
||
/* APPTYPE_UNDEFINED is special and not listed here. */
|
||
};
|
||
|
||
|
||
|
||
|
||
|
||
/* Map a cardtype to a string. Never returns NULL. */
|
||
const char *
|
||
strcardtype (cardtype_t t)
|
||
{
|
||
switch (t)
|
||
{
|
||
case CARDTYPE_GENERIC: return "generic";
|
||
case CARDTYPE_GNUK: return "gnuk";
|
||
case CARDTYPE_YUBIKEY: return "yubikey";
|
||
case CARDTYPE_ZEITCONTROL: return "zeitcontrol";
|
||
case CARDTYPE_SCE7: return "smartcafe";
|
||
}
|
||
return "?";
|
||
}
|
||
|
||
|
||
/* Map an application type to a string. Never returns NULL. */
|
||
const char *
|
||
strapptype (apptype_t t)
|
||
{
|
||
int i;
|
||
|
||
for (i=0; app_priority_list[i].apptype; i++)
|
||
if (app_priority_list[i].apptype == t)
|
||
return app_priority_list[i].name;
|
||
return t == APPTYPE_UNDEFINED? "undefined" : t? "?" : "none";
|
||
}
|
||
|
||
|
||
const char *
|
||
xstrapptype (app_t app)
|
||
{
|
||
return app? strapptype (app->apptype) : "[no_app]";
|
||
}
|
||
|
||
|
||
/* Return the apptype for NAME. */
|
||
static apptype_t
|
||
apptype_from_name (const char *name)
|
||
{
|
||
int i;
|
||
|
||
if (!name)
|
||
return APPTYPE_NONE;
|
||
|
||
for (i=0; app_priority_list[i].apptype; i++)
|
||
if (!ascii_strcasecmp (app_priority_list[i].name, name))
|
||
return app_priority_list[i].apptype;
|
||
if (!ascii_strcasecmp ("undefined", name))
|
||
return APPTYPE_UNDEFINED;
|
||
return APPTYPE_NONE;
|
||
}
|
||
|
||
|
||
/* Return the apptype for KEYREF. This is the first part of the
|
||
* KEYREF up to the dot. */
|
||
static apptype_t
|
||
apptype_from_keyref (const char *keyref)
|
||
{
|
||
int i;
|
||
unsigned int n;
|
||
const char *s;
|
||
|
||
if (!keyref)
|
||
return APPTYPE_NONE;
|
||
s = strchr (keyref, '.');
|
||
if (!s || s == keyref || !s[1])
|
||
return APPTYPE_NONE; /* Not a valid keyref. */
|
||
n = s - keyref;
|
||
|
||
for (i=0; app_priority_list[i].apptype; i++)
|
||
if (strlen (app_priority_list[i].name) == n
|
||
&& !ascii_strncasecmp (app_priority_list[i].name, keyref, n))
|
||
return app_priority_list[i].apptype;
|
||
|
||
return APPTYPE_NONE;
|
||
}
|
||
|
||
|
||
/* Return true if both serilanumbers are the same. This function
|
||
* takes care of some peculiarities. */
|
||
static int
|
||
is_same_serialno (const unsigned char *sna, size_t snalen,
|
||
const unsigned char *snb, size_t snblen)
|
||
{
|
||
if ((!sna && !snb) || (!snalen && !snblen))
|
||
return 1;
|
||
if (!sna || !snb)
|
||
return 0; /* One of them is NULL. (Both NULL tested above). */
|
||
|
||
if (snalen != snblen)
|
||
return 0; /* (No special cases for this below). */
|
||
|
||
/* The special case for OpenPGP cards where we ignore the version
|
||
* bytes (vvvv). Example: D276000124010304000500009D8A0000
|
||
* ^^^^^^^^^^^^vvvvmmmmssssssssrrrr */
|
||
if (snalen == 16 && !memcmp (sna, "\xD2\x76\x00\x01\x24\x01", 6))
|
||
{
|
||
if (memcmp (snb, "\xD2\x76\x00\x01\x24\x01", 6))
|
||
return 0; /* No */
|
||
return !memcmp (sna + 8, snb + 8, 8);
|
||
}
|
||
|
||
return !memcmp (sna, snb, snalen);
|
||
}
|
||
|
||
|
||
|
||
/* Initialization function to change the default app_priority_list.
|
||
* LIST is a list of comma or space separated strings with application
|
||
* names. Unknown names will only result in warning message.
|
||
* Application not mentioned in LIST are used in their original order
|
||
* after the given once. */
|
||
void
|
||
app_update_priority_list (const char *arg)
|
||
{
|
||
struct app_priority_list_s save;
|
||
char **names;
|
||
int i, j, idx;
|
||
|
||
names = strtokenize (arg, ", ");
|
||
if (!names)
|
||
log_fatal ("strtokenize failed: %s\n",
|
||
gpg_strerror (gpg_error_from_syserror ()));
|
||
|
||
idx = 0;
|
||
for (i=0; names[i]; i++)
|
||
{
|
||
ascii_strlwr (names[i]);
|
||
for (j=0; j < i; j++)
|
||
if (!strcmp (names[j], names[i]))
|
||
break;
|
||
if (j < i)
|
||
{
|
||
log_info ("warning: duplicate application '%s' in priority list\n",
|
||
names[i]);
|
||
continue;
|
||
}
|
||
|
||
for (j=idx; app_priority_list[j].name; j++)
|
||
if (!strcmp (names[i], app_priority_list[j].name))
|
||
break;
|
||
if (!app_priority_list[j].name)
|
||
{
|
||
log_info ("warning: unknown application '%s' in priority list\n",
|
||
names[i]);
|
||
continue;
|
||
}
|
||
save = app_priority_list[idx];
|
||
app_priority_list[idx] = app_priority_list[j];
|
||
app_priority_list[j] = save;
|
||
idx++;
|
||
}
|
||
log_assert (idx < DIM (app_priority_list));
|
||
|
||
xfree (names);
|
||
for (i=0; app_priority_list[i].name; i++)
|
||
log_info ("app priority %d: %s\n", i, app_priority_list[i].name);
|
||
}
|
||
|
||
|
||
static void
|
||
print_progress_line (void *opaque, const char *what, int pc, int cur, int tot)
|
||
{
|
||
ctrl_t ctrl = opaque;
|
||
char line[100];
|
||
|
||
if (ctrl)
|
||
{
|
||
snprintf (line, sizeof line, "%s %c %d %d", what, pc, cur, tot);
|
||
send_status_direct (ctrl, "PROGRESS", line);
|
||
}
|
||
}
|
||
|
||
|
||
/* Lock the CARD. This function shall be used right before calling
|
||
* any of the actual application functions to serialize access to the
|
||
* reader. We do this always even if the card is not actually used.
|
||
* This allows an actual connection to assume that it never shares a
|
||
* card (while performing one command). Returns 0 on success; only
|
||
* then the unlock_reader function must be called after returning from
|
||
* the handler. Right now we assume a that a reader has just one
|
||
* card; this may eventually need refinement. */
|
||
static gpg_error_t
|
||
lock_card (card_t card, ctrl_t ctrl)
|
||
{
|
||
if (npth_mutex_lock (&card->lock))
|
||
{
|
||
gpg_error_t err = gpg_error_from_syserror ();
|
||
log_error ("failed to acquire CARD lock for %p: %s\n",
|
||
card, gpg_strerror (err));
|
||
return err;
|
||
}
|
||
|
||
apdu_set_progress_cb (card->slot, print_progress_line, ctrl);
|
||
apdu_set_prompt_cb (card->slot, popup_prompt, ctrl);
|
||
|
||
return 0;
|
||
}
|
||
|
||
|
||
/* Release a lock on a card. See lock_reader(). */
|
||
static void
|
||
unlock_card (card_t card)
|
||
{
|
||
apdu_set_progress_cb (card->slot, NULL, NULL);
|
||
apdu_set_prompt_cb (card->slot, NULL, NULL);
|
||
|
||
if (npth_mutex_unlock (&card->lock))
|
||
{
|
||
gpg_error_t err = gpg_error_from_syserror ();
|
||
log_error ("failed to release CARD lock for %p: %s\n",
|
||
card, gpg_strerror (err));
|
||
}
|
||
}
|
||
|
||
|
||
static void
|
||
card_list_r_lock (void)
|
||
{
|
||
npth_mutex_lock (&card_list_lock.lock);
|
||
while (card_list_lock.num_writers_waiting
|
||
|| card_list_lock.writer_active)
|
||
npth_cond_wait (&card_list_lock.cond, &card_list_lock.lock);
|
||
card_list_lock.num_readers_active++;
|
||
npth_mutex_unlock (&card_list_lock.lock);
|
||
}
|
||
|
||
static void
|
||
card_list_r_unlock (void)
|
||
{
|
||
npth_mutex_lock (&card_list_lock.lock);
|
||
if (--card_list_lock.num_readers_active == 0)
|
||
npth_cond_broadcast (&card_list_lock.cond);
|
||
npth_mutex_unlock (&card_list_lock.lock);
|
||
}
|
||
|
||
|
||
static void
|
||
card_list_w_lock (void)
|
||
{
|
||
npth_mutex_lock (&card_list_lock.lock);
|
||
card_list_lock.num_writers_waiting++;
|
||
while (card_list_lock.num_readers_active
|
||
|| card_list_lock.writer_active)
|
||
npth_cond_wait (&card_list_lock.cond, &card_list_lock.lock);
|
||
card_list_lock.num_writers_waiting--;
|
||
card_list_lock.writer_active++;
|
||
npth_mutex_unlock (&card_list_lock.lock);
|
||
}
|
||
|
||
static void
|
||
card_list_w_unlock (void)
|
||
{
|
||
npth_mutex_lock (&card_list_lock.lock);
|
||
card_list_lock.writer_active--;
|
||
npth_cond_broadcast (&card_list_lock.cond);
|
||
npth_mutex_unlock (&card_list_lock.lock);
|
||
}
|
||
|
||
|
||
static void
|
||
card_list_signal (void)
|
||
{
|
||
#ifdef HAVE_W32_SYSTEM
|
||
if (SetEvent (card_list_lock.the_event) == 0)
|
||
log_error ("SetEvent for card_list_signal failed: %s\n",
|
||
w32_strerror (-1));
|
||
#else
|
||
write (card_list_lock.notify_pipe[1], "", 1);
|
||
#endif
|
||
}
|
||
|
||
/* Wait for some card list event or input shutdown.
|
||
Return 1 on input shutdown, return 0 otherwise. */
|
||
static int
|
||
card_list_wait (ctrl_t ctrl)
|
||
{
|
||
gnupg_fd_t fd = ctrl->thread_startup.fd;
|
||
int nfd;
|
||
fd_set fdset;
|
||
#ifdef HAVE_W32_SYSTEM
|
||
unsigned int events_set;
|
||
#endif
|
||
int ret;
|
||
|
||
npth_mutex_lock (&card_list_lock.lock);
|
||
card_list_lock.writer_active--;
|
||
npth_cond_broadcast (&card_list_lock.cond);
|
||
|
||
npth_mutex_unlock (&card_list_lock.lock);
|
||
|
||
while (1)
|
||
{
|
||
FD_ZERO (&fdset);
|
||
FD_SET (FD2INT (fd), &fdset);
|
||
nfd = FD2INT (fd);
|
||
|
||
#ifdef HAVE_W32_SYSTEM
|
||
ret = npth_eselect (nfd+1, &fdset, NULL, NULL, NULL,
|
||
card_list_lock.events, &events_set);
|
||
#else
|
||
FD_SET (card_list_lock.notify_pipe[0], &fdset);
|
||
if (nfd < card_list_lock.notify_pipe[0])
|
||
nfd = card_list_lock.notify_pipe[0];
|
||
|
||
ret = npth_pselect (nfd+1, &fdset, NULL, NULL, NULL,
|
||
npth_sigev_sigmask ());
|
||
#endif
|
||
if (ret <= 0)
|
||
continue;
|
||
|
||
if (FD_ISSET (fd, &fdset))
|
||
{
|
||
ret = 1;
|
||
break;
|
||
}
|
||
|
||
#ifdef HAVE_W32_SYSTEM
|
||
if (events_set & 1)
|
||
{
|
||
ret = 0;
|
||
break;
|
||
}
|
||
#else
|
||
if (FD_ISSET (card_list_lock.notify_pipe[0], &fdset))
|
||
{
|
||
char buf[256];
|
||
|
||
read (card_list_lock.notify_pipe[0], buf, sizeof buf);
|
||
ret = 0;
|
||
break;
|
||
}
|
||
#endif
|
||
}
|
||
|
||
npth_mutex_lock (&card_list_lock.lock);
|
||
|
||
card_list_lock.num_writers_waiting++;
|
||
while (card_list_lock.num_readers_active
|
||
|| card_list_lock.writer_active)
|
||
npth_cond_wait (&card_list_lock.cond, &card_list_lock.lock);
|
||
card_list_lock.num_writers_waiting--;
|
||
|
||
card_list_lock.writer_active++;
|
||
npth_mutex_unlock (&card_list_lock.lock);
|
||
return ret;
|
||
}
|
||
|
||
|
||
/* This function may be called to print information pertaining to the
|
||
* current state of this module to the log. */
|
||
void
|
||
app_dump_state (void)
|
||
{
|
||
card_t c;
|
||
app_t a;
|
||
|
||
card_list_r_lock ();
|
||
for (c = card_top; c; c = c->next)
|
||
{
|
||
log_info ("app_dump_state: card=%p slot=%d type=%s refcount=%u\n",
|
||
c, c->slot, strcardtype (c->cardtype), c->ref_count);
|
||
/* FIXME The use of log_info risks a race! */
|
||
for (a=c->app; a; a = a->next)
|
||
log_info ("app_dump_state: app=%p type='%s'\n",
|
||
a, strapptype (a->apptype));
|
||
}
|
||
card_list_r_unlock ();
|
||
}
|
||
|
||
|
||
/*
|
||
* Send information for all available cards.
|
||
*
|
||
* With KEEP_LOOPING=0, it only outputs once.
|
||
* With KEEP_LOOPING<0, it keeps looping, until it detects no device.
|
||
* With KEEP_LOOPING>0, it keeps looping forever (until connection close).
|
||
*/
|
||
gpg_error_t
|
||
app_send_devinfo (ctrl_t ctrl, int keep_looping)
|
||
{
|
||
card_t c;
|
||
app_t a;
|
||
int no_device;
|
||
|
||
/* The connection from client should be by a socket. This is needed
|
||
for Windows using the select function. And it's not good to use
|
||
the primary pipe connection of gpg-agent for watching
|
||
devinfo. */
|
||
if (keep_looping && ctrl->thread_startup.fd == GNUPG_INVALID_FD)
|
||
return gpg_error (GPG_ERR_INV_HANDLE);
|
||
|
||
card_list_w_lock ();
|
||
while (1)
|
||
{
|
||
no_device = (card_top == NULL);
|
||
if (no_device && keep_looping < 0)
|
||
break;
|
||
|
||
send_status_direct (ctrl, "DEVINFO_START", "");
|
||
for (c = card_top; c; c = c->next)
|
||
{
|
||
char *serialno;
|
||
char card_info[80];
|
||
|
||
serialno = card_get_serialno (c);
|
||
snprintf (card_info, sizeof card_info, "DEVICE %s %s",
|
||
strcardtype (c->cardtype), serialno);
|
||
xfree (serialno);
|
||
|
||
for (a = c->app; a; a = a->next)
|
||
send_status_direct (ctrl, card_info, strapptype (a->apptype));
|
||
}
|
||
send_status_direct (ctrl, "DEVINFO_END", "");
|
||
|
||
if (keep_looping == 0)
|
||
break;
|
||
|
||
if (card_list_wait (ctrl))
|
||
break;
|
||
}
|
||
card_list_w_unlock ();
|
||
|
||
return no_device ? gpg_error (GPG_ERR_NOT_FOUND): 0;
|
||
}
|
||
|
||
/* Check whether the application NAME is allowed. This does not mean
|
||
we have support for it though. */
|
||
static int
|
||
is_app_allowed (const char *name)
|
||
{
|
||
strlist_t l;
|
||
|
||
for (l=opt.disabled_applications; l; l = l->next)
|
||
if (!strcmp (l->d, name))
|
||
return 0; /* no */
|
||
return 1; /* yes */
|
||
}
|
||
|
||
|
||
/* This function is mainly used by the serialno command to check for
|
||
* an application conflict which may appear if the serialno command is
|
||
* used to request a specific application and the connection has
|
||
* already done a select_application. Return values are:
|
||
* 0 - No conflict
|
||
* GPG_ERR_FALSE - Another application is in use but it is possible
|
||
* to switch to the requested application.
|
||
* Other code - Switching is not possible.
|
||
*
|
||
* If SERIALNO_BIN is not NULL a conflict is only asserted if the
|
||
* serialno of the card matches.
|
||
*/
|
||
gpg_error_t
|
||
check_application_conflict (card_t card, const char *name,
|
||
const unsigned char *serialno_bin,
|
||
size_t serialno_bin_len)
|
||
{
|
||
apptype_t apptype;
|
||
|
||
if (!card || !name)
|
||
return 0;
|
||
if (!card->app)
|
||
return gpg_error (GPG_ERR_CARD_NOT_INITIALIZED); /* Should not happen. */
|
||
|
||
if (serialno_bin && card->serialno)
|
||
{
|
||
if (!is_same_serialno (card->serialno, card->serialnolen,
|
||
serialno_bin, serialno_bin_len))
|
||
return 0; /* The card does not match the requested S/N. */
|
||
}
|
||
|
||
apptype = apptype_from_name (name);
|
||
if (card->app->apptype == apptype)
|
||
return 0;
|
||
|
||
if (card->app->apptype == APPTYPE_UNDEFINED)
|
||
return 0;
|
||
|
||
if (card->cardtype == CARDTYPE_YUBIKEY)
|
||
{
|
||
if (card->app->apptype == APPTYPE_OPENPGP)
|
||
{
|
||
/* Current app is OpenPGP. */
|
||
if (!ascii_strcasecmp (name, "piv"))
|
||
return gpg_error (GPG_ERR_FALSE); /* Switching allowed. */
|
||
}
|
||
else if (card->app->apptype == APPTYPE_PIV)
|
||
{
|
||
/* Current app is PIV. */
|
||
if (!ascii_strcasecmp (name, "openpgp"))
|
||
return gpg_error (GPG_ERR_FALSE); /* Switching allowed. */
|
||
}
|
||
}
|
||
|
||
log_info ("application '%s' in use - can't switch\n",
|
||
strapptype (card->app->apptype));
|
||
|
||
return gpg_error (GPG_ERR_CONFLICT);
|
||
}
|
||
|
||
|
||
gpg_error_t
|
||
card_reset (card_t card)
|
||
{
|
||
gpg_error_t err = 0;
|
||
int sw;
|
||
|
||
sw = apdu_reset (card->slot);
|
||
if (sw)
|
||
err = gpg_error (GPG_ERR_CARD_RESET);
|
||
|
||
card->reset_requested = 1;
|
||
scd_kick_the_loop ();
|
||
gnupg_sleep (1);
|
||
|
||
return err;
|
||
}
|
||
|
||
|
||
/* Return the card type from (ATR,ATRLEN) or CARDTYPE_GENERIC in case
|
||
* of error or if the ATR was not found. If ATR is NULL, SLOT is used
|
||
* to retrieve the ATR from the reader. */
|
||
static cardtype_t
|
||
atr_to_cardtype (int slot, const unsigned char *atr, size_t atrlen)
|
||
{
|
||
#define X(a) ((unsigned char const *)(a))
|
||
static struct
|
||
{
|
||
size_t atrlen;
|
||
unsigned char const *atr;
|
||
cardtype_t type;
|
||
} atrlist[] = {
|
||
{ 19, X("\x3b\xf9\x96\x00\x00\x80\x31\xfe"
|
||
"\x45\x53\x43\x45\x37\x20\x0f\x00\x20\x46\x4e"),
|
||
CARDTYPE_SCE7 },
|
||
{ 0 }
|
||
};
|
||
#undef X
|
||
unsigned char *atrbuf = NULL;
|
||
cardtype_t cardtype = 0;
|
||
int i;
|
||
|
||
if (atr)
|
||
{
|
||
atrbuf = apdu_get_atr (slot, &atrlen);
|
||
if (!atrbuf)
|
||
return 0;
|
||
atr = atrbuf;
|
||
}
|
||
|
||
for (i=0; atrlist[i].atrlen; i++)
|
||
if (atrlist[i].atrlen == atrlen
|
||
&& !memcmp (atrlist[i].atr, atr, atrlen))
|
||
{
|
||
cardtype = atrlist[i].type;
|
||
break;
|
||
}
|
||
xfree (atrbuf);
|
||
return cardtype;
|
||
}
|
||
|
||
|
||
|
||
static gpg_error_t
|
||
app_new_register (int slot, ctrl_t ctrl, const char *name,
|
||
int periodical_check_needed)
|
||
{
|
||
gpg_error_t err = 0;
|
||
card_t card = NULL;
|
||
app_t app = NULL;
|
||
unsigned char *result = NULL;
|
||
size_t resultlen;
|
||
int want_undefined;
|
||
int i;
|
||
|
||
/* Need to allocate a new card object */
|
||
card = xtrycalloc (1, sizeof *card);
|
||
if (!card)
|
||
{
|
||
err = gpg_error_from_syserror ();
|
||
log_info ("error allocating context: %s\n", gpg_strerror (err));
|
||
return err;
|
||
}
|
||
|
||
card->slot = slot;
|
||
card->card_status = (unsigned int)-1;
|
||
|
||
if (npth_mutex_init (&card->lock, NULL))
|
||
{
|
||
err = gpg_error_from_syserror ();
|
||
log_error ("error initializing mutex: %s\n", gpg_strerror (err));
|
||
xfree (card);
|
||
return err;
|
||
}
|
||
|
||
err = lock_card (card, ctrl);
|
||
if (err)
|
||
{
|
||
xfree (card);
|
||
return err;
|
||
}
|
||
|
||
want_undefined = (name && !strcmp (name, "undefined"));
|
||
|
||
/* Try to read the GDO file first to get a default serial number.
|
||
We skip this if the undefined application has been requested. */
|
||
if (!want_undefined)
|
||
{
|
||
err = iso7816_select_file (slot, 0x3F00, 1);
|
||
if (gpg_err_code (err) == GPG_ERR_CARD)
|
||
{
|
||
/* Might be SW==0x7D00. Let's test whether it is a Yubikey
|
||
* by selecting its manager application and then reading the
|
||
* config. */
|
||
static char const yk_aid[] =
|
||
{ 0xA0, 0x00, 0x00, 0x05, 0x27, 0x47, 0x11, 0x17 }; /*MGR*/
|
||
static char const otp_aid[] =
|
||
{ 0xA0, 0x00, 0x00, 0x05, 0x27, 0x20, 0x01 }; /*OTP*/
|
||
unsigned char *buf;
|
||
size_t buflen;
|
||
const unsigned char *s0;
|
||
unsigned char formfactor;
|
||
size_t n;
|
||
|
||
if (!iso7816_select_application (slot, yk_aid, sizeof yk_aid,
|
||
0x0001)
|
||
&& !iso7816_apdu_direct (slot, "\x00\x1d\x00\x00\x00", 5, 0,
|
||
NULL, &buf, &buflen))
|
||
{
|
||
card->cardtype = CARDTYPE_YUBIKEY;
|
||
if (opt.verbose)
|
||
{
|
||
log_info ("Yubico: config=");
|
||
log_printhex (buf, buflen, "");
|
||
}
|
||
|
||
/* We skip the first byte which seems to be the total
|
||
* length of the config data. */
|
||
if (buflen > 1)
|
||
{
|
||
s0 = find_tlv (buf+1, buflen-1, 0x04, &n); /* Form factor */
|
||
formfactor = (s0 && n == 1)? *s0 : 0;
|
||
|
||
s0 = find_tlv (buf+1, buflen-1, 0x02, &n); /* Serial */
|
||
if (s0 && n <= 4)
|
||
{
|
||
card->serialno = xtrymalloc (3 + 1 + 4);
|
||
if (card->serialno)
|
||
{
|
||
card->serialnolen = 3 + 1 + 4;
|
||
card->serialno[0] = 0xff;
|
||
card->serialno[1] = 0x02;
|
||
card->serialno[2] = 0x0;
|
||
card->serialno[3] = formfactor;
|
||
memset (card->serialno + 4, 0, 4 - n);
|
||
memcpy (card->serialno + 4 + 4 - n, s0, n);
|
||
err = app_munge_serialno (card);
|
||
}
|
||
}
|
||
|
||
s0 = find_tlv (buf+1, buflen-1, 0x05, &n); /* version */
|
||
if (s0 && n == 3)
|
||
card->cardversion = ((s0[0]<<16)|(s0[1]<<8)|s0[2]);
|
||
else if (!s0)
|
||
{
|
||
/* No version - this is not a Yubikey 5. We now
|
||
* switch to the OTP app and take the first
|
||
* three bytes of the response as version
|
||
* number. */
|
||
xfree (buf);
|
||
buf = NULL;
|
||
if (!iso7816_select_application_ext (slot,
|
||
otp_aid, sizeof otp_aid,
|
||
1, &buf, &buflen)
|
||
&& buflen > 3)
|
||
card->cardversion = ((buf[0]<<16)|(buf[1]<<8)|buf[2]);
|
||
}
|
||
}
|
||
xfree (buf);
|
||
}
|
||
else
|
||
card->cardtype = atr_to_cardtype (slot, NULL, 0);
|
||
}
|
||
else /* Got 3F00 */
|
||
{
|
||
unsigned char *atr;
|
||
size_t atrlen;
|
||
|
||
/* This is heuristics to identify different implementations. */
|
||
/* FIXME: The first two checks are pretty OpenPGP card specific. */
|
||
atr = apdu_get_atr (slot, &atrlen);
|
||
if (atr)
|
||
{
|
||
if (atrlen == 21 && atr[2] == 0x11)
|
||
card->cardtype = CARDTYPE_GNUK;
|
||
else if (atrlen == 21 && atr[7] == 0x75)
|
||
card->cardtype = CARDTYPE_ZEITCONTROL;
|
||
else
|
||
card->cardtype = atr_to_cardtype (slot, atr, atrlen);
|
||
xfree (atr);
|
||
}
|
||
}
|
||
|
||
if (!err && card->cardtype != CARDTYPE_YUBIKEY)
|
||
err = iso7816_select_file (slot, 0x2F02, 0);
|
||
if (!err && card->cardtype != CARDTYPE_YUBIKEY)
|
||
err = iso7816_read_binary (slot, 0, 0, &result, &resultlen);
|
||
if (!err && card->cardtype != CARDTYPE_YUBIKEY)
|
||
{
|
||
size_t n;
|
||
const unsigned char *p;
|
||
|
||
p = find_tlv_unchecked (result, resultlen, 0x5A, &n);
|
||
if (p)
|
||
resultlen -= (p-result);
|
||
if (p && n > resultlen && n == 0x0d && resultlen+1 == n)
|
||
{
|
||
/* The object does not fit into the buffer. This is an
|
||
invalid encoding (or the buffer is too short. However, I
|
||
have some test cards with such an invalid encoding and
|
||
therefore I use this ugly workaround to return something
|
||
I can further experiment with. */
|
||
log_info ("enabling BMI testcard workaround\n");
|
||
n--;
|
||
}
|
||
|
||
if (p && n <= resultlen)
|
||
{
|
||
/* The GDO file is pretty short, thus we simply reuse it for
|
||
storing the serial number. */
|
||
memmove (result, p, n);
|
||
card->serialno = result;
|
||
card->serialnolen = n;
|
||
err = app_munge_serialno (card);
|
||
if (err)
|
||
goto leave;
|
||
}
|
||
else
|
||
xfree (result);
|
||
result = NULL;
|
||
}
|
||
}
|
||
|
||
/* Allocate a new app object. */
|
||
app = xtrycalloc (1, sizeof *app);
|
||
if (!app)
|
||
{
|
||
err = gpg_error_from_syserror ();
|
||
log_info ("error allocating app context: %s\n", gpg_strerror (err));
|
||
goto leave;
|
||
}
|
||
card->app = app;
|
||
app->card = card;
|
||
|
||
/* Figure out the application to use. */
|
||
if (want_undefined)
|
||
{
|
||
/* We switch to the "undefined" application only if explicitly
|
||
requested. */
|
||
app->apptype = APPTYPE_UNDEFINED;
|
||
/* Clear the error so that we don't run through the application
|
||
* selection chain. */
|
||
err = 0;
|
||
}
|
||
else
|
||
{
|
||
/* For certain error codes, there is no need to try more. */
|
||
if (gpg_err_code (err) == GPG_ERR_CARD_NOT_PRESENT
|
||
|| gpg_err_code (err) == GPG_ERR_ENODEV)
|
||
goto leave;
|
||
|
||
/* Set a default error so that we run through the application
|
||
* selection chain. */
|
||
err = gpg_error (GPG_ERR_NOT_FOUND);
|
||
}
|
||
|
||
/* Find the first available app if NAME is NULL or the matching
|
||
* NAME but only if that application is also enabled. */
|
||
for (i=0; err && app_priority_list[i].name; i++)
|
||
{
|
||
if (is_app_allowed (app_priority_list[i].name)
|
||
&& (!name || !strcmp (name, app_priority_list[i].name)))
|
||
err = app_priority_list[i].select_func (app);
|
||
}
|
||
if (err && name && gpg_err_code (err) != GPG_ERR_OBJ_TERM_STATE)
|
||
err = gpg_error (GPG_ERR_NOT_SUPPORTED);
|
||
|
||
leave:
|
||
if (err)
|
||
{
|
||
if (name)
|
||
log_info ("can't select application '%s': %s\n",
|
||
name, gpg_strerror (err));
|
||
else
|
||
log_info ("no supported card application found: %s\n",
|
||
gpg_strerror (err));
|
||
unlock_card (card);
|
||
xfree (app);
|
||
xfree (card);
|
||
return err;
|
||
}
|
||
|
||
card->periodical_check_needed = periodical_check_needed;
|
||
card->next = card_top;
|
||
card_top = card;
|
||
|
||
unlock_card (card);
|
||
return 0;
|
||
}
|
||
|
||
|
||
/* If called with NAME as NULL, select the best fitting application
|
||
* and return its card context; otherwise select the application with
|
||
* NAME and return its card context. Returns an error code and stores
|
||
* NULL at R_CARD if no application was found or no card is present. */
|
||
gpg_error_t
|
||
select_application (ctrl_t ctrl, const char *name,
|
||
int scan, const unsigned char *serialno_bin,
|
||
size_t serialno_bin_len)
|
||
{
|
||
gpg_error_t err = 0;
|
||
card_t card, card_prev = NULL;
|
||
|
||
card_list_w_lock ();
|
||
|
||
ctrl->card_ctx = NULL;
|
||
|
||
if (scan || !card_top)
|
||
{
|
||
struct dev_list *l;
|
||
int new_card = 0;
|
||
|
||
/* Scan the devices to find new device(s). */
|
||
err = apdu_dev_list_start (opt.reader_port, &l);
|
||
if (err)
|
||
{
|
||
card_list_w_unlock ();
|
||
return err;
|
||
}
|
||
|
||
while (1)
|
||
{
|
||
int slot;
|
||
int periodical_check_needed_this;
|
||
|
||
slot = apdu_open_reader (l);
|
||
if (slot < 0)
|
||
break;
|
||
|
||
periodical_check_needed_this = apdu_connect (slot);
|
||
if (periodical_check_needed_this < 0)
|
||
{
|
||
/* We close a reader with no card. */
|
||
err = gpg_error (GPG_ERR_ENODEV);
|
||
}
|
||
else
|
||
{
|
||
err = app_new_register (slot, ctrl, name,
|
||
periodical_check_needed_this);
|
||
new_card++;
|
||
}
|
||
|
||
if (err)
|
||
{
|
||
pincache_put (ctrl, slot, NULL, NULL, NULL, 0);
|
||
apdu_close_reader (slot);
|
||
}
|
||
}
|
||
|
||
apdu_dev_list_finish (l);
|
||
|
||
/* If new device(s), kick the scdaemon loop. */
|
||
if (new_card)
|
||
scd_kick_the_loop ();
|
||
}
|
||
|
||
for (card = card_top; card; card = card->next)
|
||
{
|
||
lock_card (card, ctrl);
|
||
if (serialno_bin == NULL)
|
||
break;
|
||
if (is_same_serialno (card->serialno, card->serialnolen,
|
||
serialno_bin, serialno_bin_len))
|
||
break;
|
||
unlock_card (card);
|
||
card_prev = card;
|
||
}
|
||
|
||
if (card)
|
||
{
|
||
err = check_application_conflict (card, name, NULL, 0);
|
||
if (!err)
|
||
ctrl->current_apptype = card->app ? card->app->apptype : APPTYPE_NONE;
|
||
else if (gpg_err_code (err) == GPG_ERR_FALSE)
|
||
{
|
||
apptype_t req_apptype = apptype_from_name (name);
|
||
|
||
if (!req_apptype)
|
||
err = gpg_error (GPG_ERR_NOT_FOUND);
|
||
else
|
||
{
|
||
err = select_additional_application_internal (card, req_apptype);
|
||
if (!err)
|
||
ctrl->current_apptype = req_apptype;
|
||
}
|
||
}
|
||
|
||
if (!err)
|
||
{
|
||
card->ref_count++;
|
||
ctrl->card_ctx = card;
|
||
if (card_prev)
|
||
{
|
||
card_prev->next = card->next;
|
||
card->next = card_top;
|
||
card_top = card;
|
||
}
|
||
}
|
||
unlock_card (card);
|
||
}
|
||
else
|
||
err = gpg_error (GPG_ERR_ENODEV);
|
||
|
||
card_list_w_unlock ();
|
||
|
||
return err;
|
||
}
|
||
|
||
|
||
/* Switch the current card for the session CTRL and print a SERIALNO
|
||
* status line on success. (SERIALNO, SERIALNOLEN) is the binary s/n
|
||
* of the card to switch to. */
|
||
gpg_error_t
|
||
app_switch_current_card (ctrl_t ctrl,
|
||
const unsigned char *serialno, size_t serialnolen)
|
||
{
|
||
gpg_error_t err;
|
||
card_t card, cardtmp;
|
||
|
||
card_list_r_lock ();
|
||
|
||
cardtmp = ctrl->card_ctx;
|
||
if (!cardtmp)
|
||
{
|
||
err = gpg_error (GPG_ERR_CARD_NOT_INITIALIZED);
|
||
goto leave;
|
||
}
|
||
|
||
if (serialno && serialnolen)
|
||
{
|
||
for (card = card_top; card; card = card->next)
|
||
{
|
||
if (is_same_serialno (card->serialno, card->serialnolen,
|
||
serialno, serialnolen))
|
||
break;
|
||
}
|
||
if (!card)
|
||
{
|
||
err = gpg_error (GPG_ERR_NOT_FOUND);
|
||
goto leave;
|
||
}
|
||
|
||
/* Note: We do not lock CARD and CARDTMP here because we only
|
||
* swap the context of the current session and there is no
|
||
* chance of a context switch. This also works if the card
|
||
* stays the same. */
|
||
ctrl->card_ctx = card;
|
||
card->ref_count++;
|
||
card_unref_locked (cardtmp);
|
||
}
|
||
|
||
/* Print the status line. */
|
||
err = send_serialno_and_app_status (ctrl->card_ctx, 0, ctrl);
|
||
|
||
leave:
|
||
card_list_r_unlock ();
|
||
return err;
|
||
}
|
||
|
||
|
||
static gpg_error_t
|
||
select_additional_application_internal (card_t card, apptype_t req_apptype)
|
||
{
|
||
gpg_error_t err = 0;
|
||
app_t app;
|
||
int i;
|
||
|
||
/* Check that the requested app has not yet been put onto the list. */
|
||
for (app = card->app; app; app = app->next)
|
||
if (app->apptype == req_apptype)
|
||
{
|
||
/* We already got this one. Note that in this case we don't
|
||
* make it the current one but it doesn't matter because
|
||
* maybe_switch_app will do that anyway. */
|
||
err = 0;
|
||
app = NULL;
|
||
goto leave;
|
||
}
|
||
|
||
/* Allocate a new app object. */
|
||
app = xtrycalloc (1, sizeof *app);
|
||
if (!app)
|
||
{
|
||
err = gpg_error_from_syserror ();
|
||
log_info ("error allocating app context: %s\n", gpg_strerror (err));
|
||
goto leave;
|
||
}
|
||
app->card = card;
|
||
|
||
/* Find the app and run the select. */
|
||
for (i=0; app_priority_list[i].apptype; i++)
|
||
{
|
||
if (app_priority_list[i].apptype == req_apptype
|
||
&& is_app_allowed (app_priority_list[i].name))
|
||
{
|
||
err = app_priority_list[i].select_func (app);
|
||
break;
|
||
}
|
||
}
|
||
if (!app_priority_list[i].apptype
|
||
|| (err && gpg_err_code (err) != GPG_ERR_OBJ_TERM_STATE))
|
||
err = gpg_error (GPG_ERR_NOT_SUPPORTED);
|
||
|
||
if (err)
|
||
goto leave;
|
||
|
||
/* Add this app. We make it the current one to avoid an extra
|
||
* reselect by maybe_switch_app after the select we just did. */
|
||
app->next = card->app;
|
||
card->app = app;
|
||
log_info ("added app '%s' to the card context and switched\n",
|
||
strapptype (app->apptype));
|
||
|
||
leave:
|
||
if (err)
|
||
xfree (app);
|
||
return err;
|
||
}
|
||
|
||
|
||
/* Add all possible additional applications to the card context but do
|
||
* not change the current one. This currently works only for Yubikeys. */
|
||
static gpg_error_t
|
||
select_all_additional_applications_internal (ctrl_t ctrl, card_t card)
|
||
{
|
||
gpg_error_t err = 0;
|
||
apptype_t candidates[3];
|
||
int i, j;
|
||
int any_new = 0;
|
||
|
||
if (card->cardtype == CARDTYPE_YUBIKEY)
|
||
{
|
||
candidates[0] = APPTYPE_OPENPGP;
|
||
candidates[1] = APPTYPE_PIV;
|
||
candidates[2] = APPTYPE_NONE;
|
||
}
|
||
else
|
||
{
|
||
candidates[0] = APPTYPE_NONE;
|
||
}
|
||
|
||
/* Find the app and run the select. */
|
||
for (i=0; app_priority_list[i].apptype; i++)
|
||
{
|
||
app_t app, app_r, app_prev;
|
||
|
||
for (j=0; candidates[j]; j++)
|
||
if (candidates[j] == app_priority_list[i].apptype
|
||
&& is_app_allowed (app_priority_list[i].name))
|
||
break;
|
||
if (!candidates[j])
|
||
continue;
|
||
|
||
for (app = card->app; app; app = app->next)
|
||
if (app->apptype == candidates[j])
|
||
break;
|
||
if (app)
|
||
continue; /* Already on the list of apps. */
|
||
|
||
app = xtrycalloc (1, sizeof *app);
|
||
if (!app)
|
||
{
|
||
err = gpg_error_from_syserror ();
|
||
log_info ("error allocating app context: %s\n", gpg_strerror (err));
|
||
goto leave;
|
||
}
|
||
app->card = card;
|
||
err = app_priority_list[i].select_func (app);
|
||
if (err)
|
||
{
|
||
log_error ("error selecting additional app '%s': %s - skipped\n",
|
||
strapptype (candidates[j]), gpg_strerror (err));
|
||
err = 0;
|
||
xfree (app);
|
||
}
|
||
else
|
||
{
|
||
/* Append to the list of apps. */
|
||
app_prev = card->app;
|
||
for (app_r=app_prev->next; app_r; app_prev=app_r, app_r=app_r->next)
|
||
;
|
||
app_prev->next = app;
|
||
log_info ("added app '%s' to the card context\n",
|
||
strapptype (app->apptype));
|
||
any_new = 1;
|
||
}
|
||
}
|
||
|
||
/* If we found a new application we need to reselect the original
|
||
* application so that we are in a well defined state. */
|
||
if (!err && any_new && card->app && card->app->fnc.reselect)
|
||
err = run_reselect (ctrl, card, card->app, NULL);
|
||
|
||
leave:
|
||
return err;
|
||
}
|
||
|
||
|
||
/* This function needs to be called with the NAME of the new
|
||
* application to be selected on CARD. On success the application is
|
||
* added to the list of the card's active applications as currently
|
||
* active application. On error no new application is allocated.
|
||
* Selecting an already selected application has no effect. */
|
||
gpg_error_t
|
||
select_additional_application (card_t card, ctrl_t ctrl, const char *name)
|
||
{
|
||
gpg_error_t err = 0;
|
||
apptype_t req_apptype;
|
||
|
||
if (!name)
|
||
req_apptype = 0;
|
||
else
|
||
{
|
||
req_apptype = apptype_from_name (name);
|
||
if (!req_apptype)
|
||
return gpg_error (GPG_ERR_NOT_FOUND);
|
||
}
|
||
|
||
if (req_apptype)
|
||
{
|
||
err = select_additional_application_internal (card, req_apptype);
|
||
if (!err)
|
||
{
|
||
ctrl->current_apptype = req_apptype;
|
||
if (DBG_APP)
|
||
log_debug ("current_apptype is set to %s\n", name);
|
||
}
|
||
}
|
||
else
|
||
{
|
||
err = select_all_additional_applications_internal (ctrl, card);
|
||
}
|
||
|
||
return err;
|
||
}
|
||
|
||
|
||
char *
|
||
get_supported_applications (void)
|
||
{
|
||
int idx;
|
||
size_t nbytes;
|
||
char *buffer, *p;
|
||
const char *s;
|
||
|
||
for (nbytes=1, idx=0; (s=app_priority_list[idx].name); idx++)
|
||
nbytes += strlen (s) + 1 + 1;
|
||
|
||
buffer = xtrymalloc (nbytes);
|
||
if (!buffer)
|
||
return NULL;
|
||
|
||
for (p=buffer, idx=0; (s=app_priority_list[idx].name); idx++)
|
||
if (is_app_allowed (s))
|
||
p = stpcpy (stpcpy (p, s), ":\n");
|
||
*p = 0;
|
||
|
||
return buffer;
|
||
}
|
||
|
||
|
||
/* Deallocate the application. */
|
||
static void
|
||
deallocate_card (card_t card)
|
||
{
|
||
card_t c, c_prev = NULL;
|
||
app_t a, anext;
|
||
|
||
for (c = card_top; c; c = c->next)
|
||
if (c == card)
|
||
{
|
||
if (c_prev == NULL)
|
||
card_top = c->next;
|
||
else
|
||
c_prev->next = c->next;
|
||
break;
|
||
}
|
||
else
|
||
c_prev = c;
|
||
|
||
if (card->ref_count)
|
||
log_error ("releasing still used card context (%d)\n", card->ref_count);
|
||
|
||
for (a = card->app; a; a = anext)
|
||
{
|
||
if (a->fnc.deinit)
|
||
{
|
||
a->fnc.deinit (a);
|
||
a->fnc.deinit = NULL;
|
||
}
|
||
anext = a->next;
|
||
xfree (a);
|
||
}
|
||
|
||
xfree (card->serialno);
|
||
unlock_card (card);
|
||
xfree (card);
|
||
}
|
||
|
||
|
||
static card_t
|
||
do_with_keygrip (ctrl_t ctrl, int action, const char *keygrip_str,
|
||
int capability)
|
||
{
|
||
int locked = 0;
|
||
card_t c;
|
||
app_t a, a_prev;
|
||
|
||
for (c = card_top; c; c = c->next)
|
||
{
|
||
if (lock_card (c, ctrl))
|
||
{
|
||
c = NULL;
|
||
goto leave_the_loop;
|
||
}
|
||
locked = 1;
|
||
a_prev = NULL;
|
||
for (a = c->app; a; a = a->next)
|
||
{
|
||
if (!a->fnc.with_keygrip || a->need_reset)
|
||
continue;
|
||
|
||
/* Note that we need to do a re-select even for the current
|
||
* app because the last selected application (e.g. after
|
||
* init) might be a different one and we do not run
|
||
* maybe_switch_app here. Of course we we do this only iff
|
||
* we have an additional app. */
|
||
if (c->app->next)
|
||
{
|
||
if (run_reselect (ctrl, c, a, a_prev))
|
||
continue;
|
||
}
|
||
a_prev = a;
|
||
|
||
if (DBG_APP)
|
||
log_debug ("slot %d, app %s: calling with_keygrip(%s)\n",
|
||
c->slot, xstrapptype (a),
|
||
action == KEYGRIP_ACTION_SEND_DATA? "send_data":
|
||
action == KEYGRIP_ACTION_WRITE_STATUS? "status":
|
||
action == KEYGRIP_ACTION_LOOKUP? "lookup":"?");
|
||
if (!a->fnc.with_keygrip (a, ctrl, action, keygrip_str, capability))
|
||
goto leave_the_loop; /* ACTION_LOOKUP succeeded. */
|
||
}
|
||
|
||
/* Select the first app again. */
|
||
if (c->app->next)
|
||
run_reselect (ctrl, c, c->app, a_prev);
|
||
|
||
unlock_card (c);
|
||
locked = 0;
|
||
}
|
||
|
||
leave_the_loop:
|
||
/* Force switching of the app if the selected one is not the current
|
||
* one. Changing the current apptype is sufficient to do this. */
|
||
if (c && c->app && c->app->apptype != a->apptype)
|
||
ctrl->current_apptype = a->apptype;
|
||
|
||
if (locked && c)
|
||
{
|
||
unlock_card (c);
|
||
locked = 0;
|
||
}
|
||
return c;
|
||
}
|
||
|
||
|
||
/* Locking access to the card-list and CARD, returns CARD. */
|
||
card_t
|
||
card_get (ctrl_t ctrl, const char *keygrip)
|
||
{
|
||
card_t card;
|
||
|
||
card_list_r_lock ();
|
||
if (keygrip)
|
||
card = do_with_keygrip (ctrl, KEYGRIP_ACTION_LOOKUP, keygrip, 0);
|
||
else
|
||
card = ctrl->card_ctx;
|
||
if (!card)
|
||
{
|
||
card_list_r_unlock ();
|
||
return NULL;
|
||
}
|
||
|
||
lock_card (card, NULL);
|
||
return card;
|
||
}
|
||
|
||
/* Release the lock of CARD and the card-list. */
|
||
void
|
||
card_put (card_t card)
|
||
{
|
||
/* We don't deallocate CARD here. Instead, we keep it. This is
|
||
useful so that a card does not get reset even if only one session
|
||
is using the card - this way the PIN cache and other cached data
|
||
are preserved. */
|
||
unlock_card (card);
|
||
card_list_r_unlock ();
|
||
}
|
||
|
||
|
||
/* This is the same as card_unref but assumes that CARD is already
|
||
* locked. */
|
||
void
|
||
card_unref_locked (card_t card)
|
||
{
|
||
if (!card)
|
||
return;
|
||
|
||
if (!card->ref_count)
|
||
log_bug ("tried to release an already released card context\n");
|
||
|
||
--card->ref_count;
|
||
}
|
||
|
||
|
||
|
||
/* The serial number may need some cosmetics. Do it here. This
|
||
function shall only be called once after a new serial number has
|
||
been put into APP->serialno.
|
||
|
||
Prefixes we use:
|
||
|
||
FF 00 00 = For serial numbers starting with an FF
|
||
FF 01 00 = Some german p15 cards return an empty serial number so the
|
||
serial number from the EF(TokenInfo) is used instead.
|
||
FF 02 00 = Serial number from Yubikey config.
|
||
This is normally not seen because we modify this here
|
||
to an OpenPGP Card s/n.
|
||
FF 7F 00 = No serialno.
|
||
|
||
All other serial numbers not starting with FF are used as they are.
|
||
*/
|
||
gpg_error_t
|
||
app_munge_serialno (card_t card)
|
||
{
|
||
if (card->cardtype == CARDTYPE_YUBIKEY
|
||
&& card->serialnolen == 3 + 1 + 4
|
||
&& !memcmp (card->serialno, "\xff\x02\x00", 3))
|
||
{
|
||
/* An example for a serial number is
|
||
* FF020001008A77C1
|
||
* ~~~~~~--~~~~~~~~
|
||
* ! ! !--------- 4 byte s/n
|
||
* ! !----------- Form factor
|
||
* !----------------- Our prefix
|
||
* Yubico seems to use the decimalized version of their S/N
|
||
* as the OpenPGP card S/N. Thus in theory we can contruct the
|
||
* number from this information so that we do not rely on having
|
||
* the OpenPGP app enabled.
|
||
*/
|
||
unsigned long sn;
|
||
sn = card->serialno[4] * 16777216;
|
||
sn += card->serialno[5] * 65536;
|
||
sn += card->serialno[6] * 256;
|
||
sn += card->serialno[7];
|
||
if (sn <= 99999999ul)
|
||
{
|
||
char *buf = xtrymalloc (16);
|
||
if (!buf)
|
||
return gpg_error_from_syserror ();
|
||
memcpy (buf, "\xD2\x76\x00\x01\x24\x01", 6);
|
||
buf[6] = 0; /* Application version which we don't know */
|
||
buf[7] = 0; /* thus we use 0.0 and don't use this directly. */
|
||
buf[8] = 0; /* Manufacturer: Yubico (0x0006). */
|
||
buf[9] = 6;
|
||
buf[13] = (sn % 10);
|
||
sn /= 10;
|
||
buf[13] |= (sn % 10) << 4;
|
||
sn /= 10;
|
||
buf[12] = (sn % 10);
|
||
sn /= 10;
|
||
buf[12] |= (sn % 10) << 4;
|
||
sn /= 10;
|
||
buf[11] = (sn % 10);
|
||
sn /= 10;
|
||
buf[11] |= (sn % 10) << 4;
|
||
sn /= 10;
|
||
buf[10] = (sn % 10);
|
||
sn /= 10;
|
||
buf[10] |= (sn % 10) << 4;
|
||
sn /= 10;
|
||
buf[14] = 0; /* Last two bytes are RFU. */
|
||
buf[15] = 0;
|
||
xfree (card->serialno);
|
||
card->serialno = buf;
|
||
card->serialnolen = 16;
|
||
}
|
||
}
|
||
else if (card->serialnolen && card->serialno[0] == 0xff)
|
||
{
|
||
/* The serial number starts with our special prefix. This
|
||
requires that we put our default prefix "FF0000" in front. */
|
||
unsigned char *p = xtrymalloc (card->serialnolen + 3);
|
||
if (!p)
|
||
return gpg_error_from_syserror ();
|
||
memcpy (p, "\xff\0", 3);
|
||
memcpy (p+3, card->serialno, card->serialnolen);
|
||
card->serialnolen += 3;
|
||
xfree (card->serialno);
|
||
card->serialno = p;
|
||
}
|
||
else if (!card->serialnolen)
|
||
{
|
||
unsigned char *p = xtrymalloc (3);
|
||
if (!p)
|
||
return gpg_error_from_syserror ();
|
||
memcpy (p, "\xff\x7f", 3);
|
||
card->serialnolen = 3;
|
||
xfree (card->serialno);
|
||
card->serialno = p;
|
||
}
|
||
return 0;
|
||
}
|
||
|
||
|
||
|
||
/* Retrieve the serial number of the card. The serial number is
|
||
returned as a malloced string (hex encoded) in SERIAL. Caller must
|
||
free SERIAL unless the function returns an error. */
|
||
char *
|
||
card_get_serialno (card_t card)
|
||
{
|
||
char *serial;
|
||
|
||
if (!card)
|
||
return NULL;
|
||
|
||
if (!card->serialnolen)
|
||
serial = xtrystrdup ("FF7F00");
|
||
else
|
||
serial = bin2hex (card->serialno, card->serialnolen, NULL);
|
||
|
||
return serial;
|
||
}
|
||
|
||
/* Same as card_get_serialno but takes an APP object. */
|
||
char *
|
||
app_get_serialno (app_t app)
|
||
{
|
||
if (!app || !app->card)
|
||
{
|
||
gpg_err_set_errno (0);
|
||
return NULL;
|
||
}
|
||
return card_get_serialno (app->card);
|
||
}
|
||
|
||
|
||
/* Return an allocated string with the serial number in a format to be
|
||
* show to the user. With NOFALLBACK set to true return NULL if such an
|
||
* abbreviated S/N is not available, else return the full serial
|
||
* number as a hex string. May return NULL on malloc problem. */
|
||
char *
|
||
card_get_dispserialno (card_t card, int nofallback)
|
||
{
|
||
char *result, *p;
|
||
unsigned long sn;
|
||
|
||
if (card && card->serialno && card->serialnolen == 3+1+4
|
||
&& !memcmp (card->serialno, "\xff\x02\x00", 3))
|
||
{
|
||
/* This is a 4 byte S/N of a Yubikey which seems to be printed
|
||
* on the token in decimal. Maybe they will print larger S/N
|
||
* also in decimal but we can't be sure, thus do it only for
|
||
* these 32 bit numbers. */
|
||
sn = card->serialno[4] * 16777216;
|
||
sn += card->serialno[5] * 65536;
|
||
sn += card->serialno[6] * 256;
|
||
sn += card->serialno[7];
|
||
if ((card->cardversion >> 16) >= 5)
|
||
result = xtryasprintf ("%lu %03lu %03lu",
|
||
(sn/1000000ul),
|
||
(sn/1000ul % 1000ul),
|
||
(sn % 1000ul));
|
||
else
|
||
result = xtryasprintf ("%lu", sn);
|
||
}
|
||
else if (card && card->cardtype == CARDTYPE_YUBIKEY)
|
||
{
|
||
/* Get back the printed Yubikey number from the OpenPGP AID
|
||
* Example: D2760001240100000006120808620000
|
||
*/
|
||
result = card_get_serialno (card);
|
||
if (result && strlen (result) >= 28 && !strncmp (result+16, "0006", 4))
|
||
{
|
||
sn = atoi_4 (result+20) * 10000;
|
||
sn += atoi_4 (result+24);
|
||
if ((card->cardversion >> 16) >= 5)
|
||
p = xtryasprintf ("%lu %03lu %03lu",
|
||
(sn/1000000ul),
|
||
(sn/1000ul % 1000ul),
|
||
(sn % 1000ul));
|
||
else
|
||
p = xtryasprintf ("%lu", sn);
|
||
if (p)
|
||
{
|
||
xfree (result);
|
||
result = p;
|
||
}
|
||
}
|
||
else if (nofallback)
|
||
{
|
||
xfree (result);
|
||
result = NULL;
|
||
}
|
||
}
|
||
else if (card && card->app && card->app->apptype == APPTYPE_OPENPGP)
|
||
{
|
||
/* Extract number from standard OpenPGP AID. */
|
||
result = card_get_serialno (card);
|
||
if (result && strlen (result) > 16+12)
|
||
{
|
||
memcpy (result, result+16, 4);
|
||
result[4] = ' ';
|
||
memcpy (result+5, result+20, 8);
|
||
result[13] = 0;
|
||
}
|
||
else if (nofallback)
|
||
{
|
||
xfree (result);
|
||
result = NULL;
|
||
}
|
||
}
|
||
else if (nofallback)
|
||
result = NULL; /* No Abbreviated S/N. */
|
||
else
|
||
result = card_get_serialno (card);
|
||
|
||
return result;
|
||
}
|
||
|
||
/* Same as card_get_dispserialno but takes an APP object. */
|
||
char *
|
||
app_get_dispserialno (app_t app, int nofallback)
|
||
{
|
||
if (!app || !app->card)
|
||
{
|
||
gpg_err_set_errno (0);
|
||
return NULL;
|
||
}
|
||
return card_get_dispserialno (app->card, nofallback);
|
||
}
|
||
|
||
|
||
/* Helper to run the reselect function. */
|
||
static gpg_error_t
|
||
run_reselect (ctrl_t ctrl, card_t c, app_t a, app_t a_prev)
|
||
{
|
||
gpg_error_t err;
|
||
|
||
if (!a->fnc.reselect)
|
||
{
|
||
log_info ("slot %d, app %s: re-select not implemented\n",
|
||
c->slot, xstrapptype (a));
|
||
return gpg_error (GPG_ERR_CARD_NOT_INITIALIZED);
|
||
}
|
||
|
||
/* Give the current app a chance to save some state before another
|
||
* app is selected. We ignore errors here because that state saving
|
||
* (e.g. putting PINs into a cache) is a convenience feature and not
|
||
* required to always work. */
|
||
if (a_prev && a_prev->fnc.prep_reselect)
|
||
{
|
||
if (a_prev->need_reset)
|
||
err = gpg_error (GPG_ERR_CARD_RESET);
|
||
else
|
||
err = a_prev->fnc.prep_reselect (a_prev, ctrl);
|
||
if (err)
|
||
log_error ("slot %d, app %s: preparing re-select from %s failed: %s\n",
|
||
c->slot, xstrapptype (a),
|
||
xstrapptype (a_prev), gpg_strerror (err));
|
||
}
|
||
|
||
if (a->need_reset)
|
||
err = gpg_error (GPG_ERR_CARD_RESET);
|
||
else
|
||
err = a->fnc.reselect (a, ctrl);
|
||
if (err)
|
||
{
|
||
log_error ("slot %d, app %s: error re-selecting: %s\n",
|
||
c->slot, xstrapptype (a), gpg_strerror (err));
|
||
return err;
|
||
}
|
||
if (DBG_APP)
|
||
log_debug ("slot %d, app %s: re-selected\n", c->slot, xstrapptype (a));
|
||
|
||
return 0;
|
||
}
|
||
|
||
|
||
/*
|
||
* Check external interference before each use of the application on
|
||
* card. Returns -1 when detecting some external interference.
|
||
* Returns 0 if not.
|
||
*
|
||
* Note: This kind of detection can't be perfect. At most, it may be
|
||
* possibly useful kludge, in some limited situations.
|
||
*/
|
||
static int
|
||
check_external_interference (app_t app, ctrl_t ctrl)
|
||
{
|
||
/*
|
||
* Only when a user is using Yubikey with pcsc-shared configuration,
|
||
* we need this detection. Otherwise, the card/token is under full
|
||
* control of scdaemon, there's no problem at all. However, if the
|
||
* APDU command has been used we better also check whether the AID
|
||
* is still valid.
|
||
*/
|
||
if (app && app->card && app->card->maybe_check_aid)
|
||
app->card->maybe_check_aid = 0;
|
||
else if (!opt.pcsc_shared || app->card->cardtype != CARDTYPE_YUBIKEY)
|
||
return 0;
|
||
|
||
if (app->fnc.check_aid)
|
||
{
|
||
unsigned char *aid;
|
||
size_t aidlen;
|
||
gpg_error_t err;
|
||
int slot = app_get_slot (app);
|
||
|
||
err = iso7816_get_data (slot, 0, 0x004F, &aid, &aidlen);
|
||
if (err)
|
||
return -1;
|
||
|
||
err = app->fnc.check_aid (app, ctrl, aid, aidlen);
|
||
xfree (aid);
|
||
if (err)
|
||
return -1;
|
||
}
|
||
|
||
return 0;
|
||
}
|
||
|
||
|
||
/* Check that the card has been initialized and whether we need to
|
||
* switch to another application on the same card. Switching means
|
||
* that the new active app will be moved to the head of the list at
|
||
* CARD->app. This function must be called with the card lock held. */
|
||
static gpg_error_t
|
||
maybe_switch_app (ctrl_t ctrl, card_t card, const char *keyref)
|
||
{
|
||
gpg_error_t err;
|
||
app_t app;
|
||
app_t app_prev = NULL;
|
||
apptype_t apptype;
|
||
|
||
if (!card->app)
|
||
return gpg_error (GPG_ERR_CARD_NOT_INITIALIZED);
|
||
|
||
if (card->maybe_check_aid && card->app->fnc.reselect
|
||
&& check_external_interference (card->app, ctrl))
|
||
{
|
||
if (DBG_APP)
|
||
log_debug ("slot %d, app %s: forced re-select due to direct APDU use\n",
|
||
card->slot, xstrapptype (card->app));
|
||
err = card->app->fnc.reselect (card->app, ctrl);
|
||
if (err)
|
||
log_error ("slot %d, app %s: forced re-select failed: %s - ignored\n",
|
||
card->slot, xstrapptype (card->app), gpg_strerror (err));
|
||
err = 0;
|
||
}
|
||
|
||
if (!ctrl->current_apptype)
|
||
{
|
||
/* For whatever reasons the current apptype has not been set -
|
||
* fix that and use the current app. */
|
||
if (DBG_APP)
|
||
log_debug ("slot %d: no current app switching to %s\n",
|
||
card->slot, strapptype (card->app->apptype));
|
||
ctrl->current_apptype = card->app->apptype;
|
||
return 0;
|
||
}
|
||
for (app = card->app; app; app = app->next)
|
||
if (app->apptype == ctrl->current_apptype)
|
||
break;
|
||
if (!app)
|
||
{
|
||
/* The current app is not supported by this card. Set the first
|
||
* app of the card as current. */
|
||
if (DBG_APP)
|
||
log_debug ("slot %d: current app %s not available switching to %s\n",
|
||
card->slot, strapptype (ctrl->current_apptype),
|
||
strapptype (card->app->apptype));
|
||
ctrl->current_apptype = card->app->apptype;
|
||
return 0;
|
||
}
|
||
if (DBG_APP)
|
||
log_debug ("slot %d: have=%s want=%s keyref=%s\n",
|
||
card->slot, strapptype (card->app->apptype),
|
||
strapptype (ctrl->current_apptype),
|
||
keyref? keyref:"[none]");
|
||
|
||
app = NULL;
|
||
if (keyref)
|
||
{
|
||
/* Switch based on the requested KEYREF. */
|
||
apptype = apptype_from_keyref (keyref);
|
||
if (apptype)
|
||
{
|
||
for (app = card->app; app; app_prev = app, app = app->next)
|
||
if (app->apptype == apptype)
|
||
break;
|
||
if (!app_prev && ctrl->current_apptype == card->app->apptype)
|
||
if (check_external_interference (app, ctrl) == 0)
|
||
return 0; /* Already the first app - no need to switch. */
|
||
}
|
||
else if (strlen (keyref) == 40)
|
||
{
|
||
/* This looks like a keygrip. Iterate over all apps to find
|
||
* the corresponding app. */
|
||
for (app = card->app; app; app_prev = app, app = app->next)
|
||
if (app->fnc.with_keygrip
|
||
&& !app->need_reset
|
||
&& !app->fnc.with_keygrip (app, ctrl,
|
||
KEYGRIP_ACTION_LOOKUP, keyref, 0))
|
||
break;
|
||
if (!app_prev && ctrl->current_apptype == card->app->apptype)
|
||
if (check_external_interference (app, ctrl) == 0)
|
||
return 0; /* Already the first app - no need to switch. */
|
||
}
|
||
}
|
||
|
||
if (!app)
|
||
{
|
||
/* Switch based on the current application of this connection or
|
||
* if a keyref based switch didn't worked. */
|
||
if (ctrl->current_apptype == card->app->apptype)
|
||
return 0; /* No need to switch. */
|
||
app_prev = card->app;
|
||
for (app = app_prev->next; app; app_prev = app, app = app->next)
|
||
if (app->apptype == ctrl->current_apptype)
|
||
break;
|
||
}
|
||
if (!app)
|
||
return gpg_error (GPG_ERR_WRONG_CARD);
|
||
|
||
err = run_reselect (ctrl, card, app, app_prev);
|
||
if (err)
|
||
return err;
|
||
|
||
/* Swap APP with the head of the app list if needed. Note that APP
|
||
* is not the head of the list. */
|
||
if (app_prev)
|
||
{
|
||
app_prev->next = app->next;
|
||
app->next = card->app;
|
||
card->app = app;
|
||
}
|
||
|
||
if (opt.verbose)
|
||
log_info ("slot %d, app %s: %s\n",
|
||
card->slot, xstrapptype (app),
|
||
app_prev? "switched":"re-selected");
|
||
|
||
ctrl->current_apptype = app->apptype;
|
||
|
||
return 0;
|
||
}
|
||
|
||
|
||
/* Helper for app_write_learn_status. */
|
||
static gpg_error_t
|
||
write_learn_status_core (card_t card, app_t app, ctrl_t ctrl,
|
||
unsigned int flags)
|
||
{
|
||
gpg_error_t err;
|
||
|
||
/* We do not send CARD and APPTYPE if only keypairinfo is requested. */
|
||
if (!(flags & APP_LEARN_FLAG_KEYPAIRINFO))
|
||
{
|
||
if (card && card->cardtype)
|
||
send_status_direct (ctrl, "CARDTYPE", strcardtype (card->cardtype));
|
||
if (card && card->cardversion)
|
||
send_status_printf (ctrl, "CARDVERSION", "%X", card->cardversion);
|
||
if (app->apptype)
|
||
send_status_direct (ctrl, "APPTYPE", strapptype (app->apptype));
|
||
if (app->appversion)
|
||
send_status_printf (ctrl, "APPVERSION", "%X", app->appversion);
|
||
}
|
||
|
||
if (app->need_reset)
|
||
err = gpg_error (GPG_ERR_CARD_RESET);
|
||
else
|
||
{
|
||
err = app->fnc.learn_status (app, ctrl, flags);
|
||
if (err && (flags & APP_LEARN_FLAG_REREAD))
|
||
app->need_reset = 1;
|
||
}
|
||
return err;
|
||
}
|
||
|
||
|
||
/* Write out the application specific status lines for the LEARN
|
||
command. */
|
||
gpg_error_t
|
||
app_write_learn_status (card_t card, ctrl_t ctrl, unsigned int flags)
|
||
{
|
||
gpg_error_t err, err2, tmperr;
|
||
app_t app, last_app;
|
||
int any_reselect = 0;
|
||
|
||
/* Always make sure that the current app for this connection has
|
||
* been selected and is at the top of the list. */
|
||
if ((err = maybe_switch_app (ctrl, card, NULL)))
|
||
;
|
||
else if (!card->app->fnc.learn_status)
|
||
err = gpg_error (GPG_ERR_UNSUPPORTED_OPERATION);
|
||
else
|
||
{
|
||
err = write_learn_status_core (card, card->app, ctrl, flags);
|
||
if (!err && card->app->fnc.reselect && (flags & APP_LEARN_FLAG_MULTI))
|
||
{
|
||
/* The current app has the reselect feature so that we can
|
||
* loop over all other apps which are capable of a reselect
|
||
* and finally reselect the first app again. Note that we
|
||
* did the learn for the currently selected card above. */
|
||
app = last_app = card->app;
|
||
for (app = app->next; app && !err; app = app->next)
|
||
if (app->fnc.reselect)
|
||
{
|
||
if (last_app && last_app->fnc.prep_reselect)
|
||
{
|
||
tmperr = last_app->fnc.prep_reselect (last_app, ctrl);
|
||
if (tmperr)
|
||
log_info ("slot %d, app %s:"
|
||
" preparing re-select from %s failed: %s\n",
|
||
card->slot, xstrapptype (app),
|
||
xstrapptype (last_app),
|
||
gpg_strerror (tmperr));
|
||
}
|
||
any_reselect = 1;
|
||
err = app->fnc.reselect (app, ctrl);
|
||
if (!err)
|
||
{
|
||
last_app = app;
|
||
err = write_learn_status_core (NULL, app, ctrl, flags);
|
||
}
|
||
}
|
||
app = card->app;
|
||
if (any_reselect)
|
||
{
|
||
if (last_app && last_app->fnc.prep_reselect)
|
||
{
|
||
tmperr = last_app->fnc.prep_reselect (last_app, ctrl);
|
||
if (tmperr)
|
||
log_info ("slot %d, app %s:"
|
||
" preparing re-select from %s failed: %s\n",
|
||
card->slot, xstrapptype (app),
|
||
xstrapptype (last_app), gpg_strerror (tmperr));
|
||
}
|
||
err2 = app->fnc.reselect (app, ctrl);
|
||
if (err2)
|
||
{
|
||
log_error ("error re-selecting '%s': %s\n",
|
||
strapptype(app->apptype), gpg_strerror (err2));
|
||
if (!err)
|
||
err = err2;
|
||
}
|
||
}
|
||
}
|
||
}
|
||
|
||
return err;
|
||
}
|
||
|
||
|
||
/* Read the certificate with id CERTID (as returned by learn_status in
|
||
the CERTINFO status lines) and return it in the freshly allocated
|
||
buffer put into CERT and the length of the certificate put into
|
||
CERTLEN. */
|
||
gpg_error_t
|
||
app_readcert (card_t card, ctrl_t ctrl, const char *certid,
|
||
unsigned char **cert, size_t *certlen)
|
||
{
|
||
gpg_error_t err;
|
||
|
||
if ((err = maybe_switch_app (ctrl, card, certid)))
|
||
;
|
||
else if (!card->app->fnc.readcert)
|
||
err = gpg_error (GPG_ERR_UNSUPPORTED_OPERATION);
|
||
else
|
||
{
|
||
if (DBG_APP)
|
||
log_debug ("slot %d app %s: calling readcert(%s)\n",
|
||
card->slot, xstrapptype (card->app), certid);
|
||
if (card->app->need_reset)
|
||
err = gpg_error (GPG_ERR_CARD_RESET);
|
||
else
|
||
err = card->app->fnc.readcert (card->app, certid, cert, certlen);
|
||
}
|
||
|
||
return err;
|
||
}
|
||
|
||
|
||
/* Read the key with ID KEYID. On success a canonical encoded
|
||
* S-expression with the public key will get stored at PK and its
|
||
* length (for assertions) at PKLEN; the caller must release that
|
||
* buffer. On error NULL will be stored at PK and PKLEN and an error
|
||
* code returned. If the key is not required NULL may be passed for
|
||
* PK; this makes sense if the APP_READKEY_FLAG_INFO has also been set.
|
||
*
|
||
* This function might not be supported by all applications. */
|
||
gpg_error_t
|
||
app_readkey (card_t card, ctrl_t ctrl, const char *keyid, unsigned int flags,
|
||
unsigned char **pk, size_t *pklen)
|
||
{
|
||
gpg_error_t err;
|
||
|
||
if (pk)
|
||
*pk = NULL;
|
||
if (pklen)
|
||
*pklen = 0;
|
||
|
||
if (!keyid)
|
||
return gpg_error (GPG_ERR_INV_VALUE);
|
||
|
||
if ((err = maybe_switch_app (ctrl, card, keyid)))
|
||
;
|
||
else if (!card->app->fnc.readkey)
|
||
err = gpg_error (GPG_ERR_UNSUPPORTED_OPERATION);
|
||
else
|
||
{
|
||
if (DBG_APP)
|
||
log_debug ("slot %d app %s: calling readkey(%s)\n",
|
||
card->slot, xstrapptype (card->app), keyid);
|
||
if (card->app->need_reset)
|
||
err = gpg_error (GPG_ERR_CARD_RESET);
|
||
else
|
||
err = card->app->fnc.readkey (card->app, ctrl, keyid, flags, pk, pklen);
|
||
}
|
||
|
||
return err;
|
||
}
|
||
|
||
|
||
/* Perform a GETATTR operation. */
|
||
gpg_error_t
|
||
app_getattr (card_t card, ctrl_t ctrl, const char *name)
|
||
{
|
||
gpg_error_t err;
|
||
|
||
if (!name || !*name)
|
||
return gpg_error (GPG_ERR_INV_VALUE);
|
||
|
||
if ((err = maybe_switch_app (ctrl, card, NULL)))
|
||
;
|
||
else if (name && !strcmp (name, "CARDTYPE"))
|
||
{
|
||
send_status_direct (ctrl, "CARDTYPE", strcardtype (card->cardtype));
|
||
}
|
||
else if (name && !strcmp (name, "APPTYPE"))
|
||
{
|
||
send_status_direct (ctrl, "APPTYPE", strapptype (card->app->apptype));
|
||
}
|
||
else if (name && !strcmp (name, "SERIALNO"))
|
||
{
|
||
char *serial;
|
||
|
||
serial = app_get_serialno (card->app);
|
||
if (!serial)
|
||
err = gpg_error (GPG_ERR_INV_VALUE);
|
||
else
|
||
{
|
||
send_status_direct (ctrl, "SERIALNO", serial);
|
||
xfree (serial);
|
||
}
|
||
}
|
||
else if (!card->app->fnc.getattr)
|
||
err = gpg_error (GPG_ERR_UNSUPPORTED_OPERATION);
|
||
else
|
||
{
|
||
if (DBG_APP)
|
||
log_debug ("slot %d app %s: calling getattr(%s)\n",
|
||
card->slot, xstrapptype (card->app), name);
|
||
if (card->app->need_reset)
|
||
err = gpg_error (GPG_ERR_CARD_RESET);
|
||
else
|
||
err = card->app->fnc.getattr (card->app, ctrl, name);
|
||
}
|
||
|
||
return err;
|
||
}
|
||
|
||
|
||
/* Perform a SETATTR operation. */
|
||
gpg_error_t
|
||
app_setattr (card_t card, ctrl_t ctrl, const char *name,
|
||
gpg_error_t (*pincb)(void*, const char *, char **),
|
||
void *pincb_arg,
|
||
const unsigned char *value, size_t valuelen)
|
||
{
|
||
gpg_error_t err;
|
||
|
||
if (!name || !*name || !value)
|
||
return gpg_error (GPG_ERR_INV_VALUE);
|
||
|
||
if ((err = maybe_switch_app (ctrl, card, NULL)))
|
||
;
|
||
else if (!card->app->fnc.setattr)
|
||
err = gpg_error (GPG_ERR_UNSUPPORTED_OPERATION);
|
||
else
|
||
{
|
||
if (DBG_APP)
|
||
log_debug ("slot %d app %s: calling setattr(%s)\n",
|
||
card->slot, xstrapptype (card->app), name);
|
||
if (card->app->need_reset)
|
||
err = gpg_error (GPG_ERR_CARD_RESET);
|
||
else
|
||
err = card->app->fnc.setattr (card->app, ctrl, name, pincb, pincb_arg,
|
||
value, valuelen);
|
||
}
|
||
|
||
return err;
|
||
}
|
||
|
||
|
||
/* Create the signature and return the allocated result in OUTDATA.
|
||
If a PIN is required the PINCB will be used to ask for the PIN; it
|
||
should return the PIN in an allocated buffer and put it into PIN. */
|
||
gpg_error_t
|
||
app_sign (card_t card, ctrl_t ctrl, const char *keyidstr, int hashalgo,
|
||
gpg_error_t (*pincb)(void*, const char *, char **),
|
||
void *pincb_arg,
|
||
const void *indata, size_t indatalen,
|
||
unsigned char **outdata, size_t *outdatalen )
|
||
{
|
||
gpg_error_t err;
|
||
|
||
if (!indata || !indatalen || !outdata || !outdatalen || !pincb)
|
||
return gpg_error (GPG_ERR_INV_VALUE);
|
||
|
||
if ((err = maybe_switch_app (ctrl, card, keyidstr)))
|
||
;
|
||
else if (!card->app->fnc.sign)
|
||
err = gpg_error (GPG_ERR_UNSUPPORTED_OPERATION);
|
||
else
|
||
{
|
||
if (DBG_APP)
|
||
log_debug ("slot %d app %s: calling sign(%s)\n",
|
||
card->slot, xstrapptype (card->app), keyidstr);
|
||
if (card->app->need_reset)
|
||
err = gpg_error (GPG_ERR_CARD_RESET);
|
||
else
|
||
err = card->app->fnc.sign (card->app, ctrl, keyidstr, hashalgo,
|
||
pincb, pincb_arg,
|
||
indata, indatalen,
|
||
outdata, outdatalen);
|
||
}
|
||
|
||
if (opt.verbose)
|
||
log_info ("operation sign result: %s\n", gpg_strerror (err));
|
||
return err;
|
||
}
|
||
|
||
|
||
/* Create the signature using the INTERNAL AUTHENTICATE command and
|
||
return the allocated result in OUTDATA. If a PIN is required the
|
||
PINCB will be used to ask for the PIN; it should return the PIN in
|
||
an allocated buffer and put it into PIN. */
|
||
gpg_error_t
|
||
app_auth (card_t card, ctrl_t ctrl, const char *keyidstr,
|
||
gpg_error_t (*pincb)(void*, const char *, char **),
|
||
void *pincb_arg,
|
||
const void *indata, size_t indatalen,
|
||
unsigned char **outdata, size_t *outdatalen )
|
||
{
|
||
gpg_error_t err;
|
||
|
||
if (!outdata || !outdatalen || !pincb)
|
||
return gpg_error (GPG_ERR_INV_VALUE);
|
||
|
||
if ((err = maybe_switch_app (ctrl, card, keyidstr)))
|
||
;
|
||
else if (!card->app->fnc.auth)
|
||
err = gpg_error (GPG_ERR_UNSUPPORTED_OPERATION);
|
||
else
|
||
{
|
||
if (card->app->apptype != APPTYPE_OPENPGP
|
||
&& (!indata || !indatalen))
|
||
return gpg_error (GPG_ERR_INV_VALUE);
|
||
|
||
if (DBG_APP)
|
||
log_debug ("slot %d app %s: calling auth(%s)\n",
|
||
card->slot, xstrapptype (card->app), keyidstr);
|
||
if (card->app->need_reset)
|
||
err = gpg_error (GPG_ERR_CARD_RESET);
|
||
else
|
||
err = card->app->fnc.auth (card->app, ctrl, keyidstr,
|
||
pincb, pincb_arg,
|
||
indata, indatalen,
|
||
outdata, outdatalen);
|
||
}
|
||
|
||
if (opt.verbose)
|
||
log_info ("operation auth result: %s\n", gpg_strerror (err));
|
||
return err;
|
||
}
|
||
|
||
|
||
/* Decrypt the data in INDATA and return the allocated result in OUTDATA.
|
||
If a PIN is required the PINCB will be used to ask for the PIN; it
|
||
should return the PIN in an allocated buffer and put it into PIN. */
|
||
gpg_error_t
|
||
app_decipher (card_t card, ctrl_t ctrl, const char *keyidstr,
|
||
gpg_error_t (*pincb)(void*, const char *, char **),
|
||
void *pincb_arg,
|
||
const void *indata, size_t indatalen,
|
||
unsigned char **outdata, size_t *outdatalen,
|
||
unsigned int *r_info)
|
||
{
|
||
gpg_error_t err;
|
||
|
||
*r_info = 0;
|
||
|
||
if (!indata || !indatalen || !outdata || !outdatalen || !pincb)
|
||
return gpg_error (GPG_ERR_INV_VALUE);
|
||
|
||
if ((err = maybe_switch_app (ctrl, card, keyidstr)))
|
||
;
|
||
else if (!card->app->fnc.decipher)
|
||
err = gpg_error (GPG_ERR_UNSUPPORTED_OPERATION);
|
||
else
|
||
{
|
||
if (DBG_APP)
|
||
log_debug ("slot %d app %s: calling decipher(%s)\n",
|
||
card->slot, xstrapptype (card->app), keyidstr);
|
||
if (card->app->need_reset)
|
||
err = gpg_error (GPG_ERR_CARD_RESET);
|
||
else
|
||
err = card->app->fnc.decipher (card->app, ctrl, keyidstr,
|
||
pincb, pincb_arg,
|
||
indata, indatalen,
|
||
outdata, outdatalen,
|
||
r_info);
|
||
}
|
||
|
||
if (opt.verbose)
|
||
log_info ("operation decipher result: %s\n", gpg_strerror (err));
|
||
return err;
|
||
}
|
||
|
||
|
||
/* Perform the WRITECERT operation. */
|
||
gpg_error_t
|
||
app_writecert (card_t card, ctrl_t ctrl,
|
||
const char *certidstr,
|
||
gpg_error_t (*pincb)(void*, const char *, char **),
|
||
void *pincb_arg,
|
||
const unsigned char *data, size_t datalen)
|
||
{
|
||
gpg_error_t err;
|
||
|
||
if (!certidstr || !*certidstr || !pincb)
|
||
return gpg_error (GPG_ERR_INV_VALUE);
|
||
|
||
if ((err = maybe_switch_app (ctrl, card, certidstr)))
|
||
;
|
||
else if (!card->app->fnc.writecert)
|
||
err = gpg_error (GPG_ERR_UNSUPPORTED_OPERATION);
|
||
else
|
||
{
|
||
if (DBG_APP)
|
||
log_debug ("slot %d app %s: calling writecert(%s)\n",
|
||
card->slot, xstrapptype (card->app), certidstr);
|
||
if (card->app->need_reset)
|
||
err = gpg_error (GPG_ERR_CARD_RESET);
|
||
else
|
||
err = card->app->fnc.writecert (card->app, ctrl, certidstr,
|
||
pincb, pincb_arg, data, datalen);
|
||
}
|
||
|
||
if (opt.verbose)
|
||
log_info ("operation writecert result: %s\n", gpg_strerror (err));
|
||
return err;
|
||
}
|
||
|
||
|
||
/* Perform the WRITEKEY operation. */
|
||
gpg_error_t
|
||
app_writekey (card_t card, ctrl_t ctrl,
|
||
const char *keyidstr, unsigned int flags,
|
||
gpg_error_t (*pincb)(void*, const char *, char **),
|
||
void *pincb_arg,
|
||
const unsigned char *keydata, size_t keydatalen)
|
||
{
|
||
gpg_error_t err;
|
||
|
||
if (!keyidstr || !*keyidstr || !pincb)
|
||
return gpg_error (GPG_ERR_INV_VALUE);
|
||
|
||
if ((err = maybe_switch_app (ctrl, card, keyidstr)))
|
||
;
|
||
else if (!card->app->fnc.writekey)
|
||
err = gpg_error (GPG_ERR_UNSUPPORTED_OPERATION);
|
||
else
|
||
{
|
||
if (DBG_APP)
|
||
log_debug ("slot %d app %s: calling writekey(%s)\n",
|
||
card->slot, xstrapptype (card->app), keyidstr);
|
||
if (card->app->need_reset)
|
||
err = gpg_error (GPG_ERR_CARD_RESET);
|
||
else
|
||
err = card->app->fnc.writekey (card->app, ctrl, keyidstr, flags,
|
||
pincb, pincb_arg, keydata, keydatalen);
|
||
}
|
||
|
||
if (opt.verbose)
|
||
log_info ("operation writekey result: %s\n", gpg_strerror (err));
|
||
return err;
|
||
}
|
||
|
||
|
||
/* Perform a GENKEY operation. */
|
||
gpg_error_t
|
||
app_genkey (card_t card, ctrl_t ctrl, const char *keynostr,
|
||
const char *keytype, unsigned int flags, time_t createtime,
|
||
gpg_error_t (*pincb)(void*, const char *, char **),
|
||
void *pincb_arg)
|
||
{
|
||
gpg_error_t err;
|
||
|
||
if (!keynostr || !*keynostr || !pincb)
|
||
return gpg_error (GPG_ERR_INV_VALUE);
|
||
|
||
if ((err = maybe_switch_app (ctrl, card, keynostr)))
|
||
;
|
||
else if (!card->app->fnc.genkey)
|
||
err = gpg_error (GPG_ERR_UNSUPPORTED_OPERATION);
|
||
else
|
||
{
|
||
if (DBG_APP)
|
||
log_debug ("slot %d app %s: calling genkey(%s)\n",
|
||
card->slot, xstrapptype (card->app), keynostr);
|
||
if (card->app->need_reset)
|
||
err = gpg_error (GPG_ERR_CARD_RESET);
|
||
else
|
||
err = card->app->fnc.genkey (card->app, ctrl, keynostr, keytype, flags,
|
||
createtime, pincb, pincb_arg);
|
||
}
|
||
|
||
if (opt.verbose)
|
||
log_info ("operation genkey result: %s\n", gpg_strerror (err));
|
||
return err;
|
||
}
|
||
|
||
|
||
/* Perform a GET CHALLENGE operation. This function is special as it
|
||
directly accesses the card without any application specific
|
||
wrapper. */
|
||
gpg_error_t
|
||
app_get_challenge (card_t card, ctrl_t ctrl,
|
||
size_t nbytes, unsigned char *buffer)
|
||
{
|
||
(void)ctrl;
|
||
if (!nbytes || !buffer)
|
||
return gpg_error (GPG_ERR_INV_VALUE);
|
||
|
||
return iso7816_get_challenge (card->slot, nbytes, buffer);
|
||
}
|
||
|
||
|
||
/* Perform a CHANGE REFERENCE DATA or RESET RETRY COUNTER operation. */
|
||
gpg_error_t
|
||
app_change_pin (card_t card, ctrl_t ctrl, const char *chvnostr,
|
||
unsigned int flags,
|
||
gpg_error_t (*pincb)(void*, const char *, char **),
|
||
void *pincb_arg)
|
||
{
|
||
gpg_error_t err;
|
||
|
||
if (!chvnostr || !*chvnostr || !pincb)
|
||
return gpg_error (GPG_ERR_INV_VALUE);
|
||
|
||
if ((err = maybe_switch_app (ctrl, card, NULL)))
|
||
;
|
||
else if (!card->app->fnc.change_pin)
|
||
err = gpg_error (GPG_ERR_UNSUPPORTED_OPERATION);
|
||
else
|
||
{
|
||
if (DBG_APP)
|
||
log_debug ("slot %d app %s: calling change_pin(%s)\n",
|
||
card->slot, xstrapptype (card->app), chvnostr);
|
||
if (card->app->need_reset)
|
||
err = gpg_error (GPG_ERR_CARD_RESET);
|
||
else
|
||
err = card->app->fnc.change_pin (card->app, ctrl,
|
||
chvnostr, flags, pincb, pincb_arg);
|
||
}
|
||
|
||
if (opt.verbose)
|
||
log_info ("operation change_pin result: %s\n", gpg_strerror (err));
|
||
return err;
|
||
}
|
||
|
||
|
||
/* Perform a VERIFY operation without doing anything else. This may
|
||
be used to initialize a the PIN cache for long lasting other
|
||
operations. Its use is highly application dependent. */
|
||
gpg_error_t
|
||
app_check_pin (card_t card, ctrl_t ctrl, const char *keyidstr,
|
||
gpg_error_t (*pincb)(void*, const char *, char **),
|
||
void *pincb_arg)
|
||
{
|
||
gpg_error_t err;
|
||
|
||
if (!keyidstr || !*keyidstr || !pincb)
|
||
return gpg_error (GPG_ERR_INV_VALUE);
|
||
|
||
if ((err = maybe_switch_app (ctrl, card, NULL)))
|
||
;
|
||
else if (!card->app->fnc.check_pin)
|
||
err = gpg_error (GPG_ERR_UNSUPPORTED_OPERATION);
|
||
else
|
||
{
|
||
if (DBG_APP)
|
||
log_debug ("slot %d app %s: calling check_pin(%s)\n",
|
||
card->slot, xstrapptype (card->app), keyidstr);
|
||
if (card->app->need_reset)
|
||
err = gpg_error (GPG_ERR_CARD_RESET);
|
||
else
|
||
err = card->app->fnc.check_pin (card->app, ctrl, keyidstr,
|
||
pincb, pincb_arg);
|
||
}
|
||
|
||
if (opt.verbose)
|
||
log_info ("operation check_pin result: %s\n", gpg_strerror (err));
|
||
return err;
|
||
}
|
||
|
||
|
||
static void
|
||
report_change (int slot, int old_status, int cur_status)
|
||
{
|
||
char *homestr, *envstr;
|
||
char *fname;
|
||
char templ[50];
|
||
estream_t fp;
|
||
|
||
snprintf (templ, sizeof templ, "reader_%d.status", slot);
|
||
fname = make_filename (gnupg_homedir (), templ, NULL );
|
||
fp = es_fopen (fname, "w");
|
||
if (fp)
|
||
{
|
||
es_fprintf (fp, "%s\n",
|
||
(cur_status & 1)? "USABLE":
|
||
(cur_status & 4)? "ACTIVE":
|
||
(cur_status & 2)? "PRESENT": "NOCARD");
|
||
es_fclose (fp);
|
||
}
|
||
xfree (fname);
|
||
|
||
homestr = make_filename (gnupg_homedir (), NULL);
|
||
if (gpgrt_asprintf (&envstr, "GNUPGHOME=%s", homestr) < 0)
|
||
log_error ("out of core while building environment\n");
|
||
else
|
||
{
|
||
gpg_error_t err;
|
||
const char *args[9], *envs[2];
|
||
char numbuf1[30], numbuf2[30], numbuf3[30];
|
||
|
||
envs[0] = envstr;
|
||
envs[1] = NULL;
|
||
|
||
sprintf (numbuf1, "%d", slot);
|
||
sprintf (numbuf2, "0x%04X", old_status);
|
||
sprintf (numbuf3, "0x%04X", cur_status);
|
||
args[0] = "--reader-port";
|
||
args[1] = numbuf1;
|
||
args[2] = "--old-code";
|
||
args[3] = numbuf2;
|
||
args[4] = "--new-code";
|
||
args[5] = numbuf3;
|
||
args[6] = "--status";
|
||
args[7] = ((cur_status & 1)? "USABLE":
|
||
(cur_status & 4)? "ACTIVE":
|
||
(cur_status & 2)? "PRESENT": "NOCARD");
|
||
args[8] = NULL;
|
||
|
||
fname = make_filename (gnupg_homedir (), "scd-event", NULL);
|
||
err = gnupg_spawn_process_detached (fname, args, envs);
|
||
if (err && gpg_err_code (err) != GPG_ERR_ENOENT)
|
||
log_error ("failed to run event handler '%s': %s\n",
|
||
fname, gpg_strerror (err));
|
||
xfree (fname);
|
||
xfree (envstr);
|
||
}
|
||
xfree (homestr);
|
||
}
|
||
|
||
|
||
int
|
||
scd_update_reader_status_file (void)
|
||
{
|
||
card_t card, card_next;
|
||
int periodical_check_needed = 0;
|
||
int reported = 0;
|
||
|
||
card_list_w_lock ();
|
||
for (card = card_top; card; card = card_next)
|
||
{
|
||
int sw;
|
||
unsigned int status;
|
||
|
||
lock_card (card, NULL);
|
||
card_next = card->next;
|
||
|
||
if (card->reset_requested)
|
||
{
|
||
/* Here is the post-processing of RESET request. */
|
||
status = 0;
|
||
card->reset_requested = 0;
|
||
}
|
||
else
|
||
{
|
||
sw = apdu_get_status (card->slot, 0, &status);
|
||
if (sw == SW_HOST_NO_READER)
|
||
{
|
||
/* Most likely the _reader_ has been unplugged. */
|
||
status = 0;
|
||
}
|
||
else if (sw)
|
||
{
|
||
/* Get status failed. Ignore that. */
|
||
if (card->periodical_check_needed)
|
||
periodical_check_needed = 1;
|
||
unlock_card (card);
|
||
continue;
|
||
}
|
||
}
|
||
|
||
if (card->card_status != status)
|
||
{
|
||
report_change (card->slot, card->card_status, status);
|
||
send_client_notifications (card, status == 0);
|
||
reported++;
|
||
|
||
if (status == 0)
|
||
{
|
||
if (DBG_APP)
|
||
log_debug ("Removal of a card: %d\n", card->slot);
|
||
pincache_put (NULL, card->slot, NULL, NULL, NULL, 0);
|
||
apdu_close_reader (card->slot);
|
||
deallocate_card (card);
|
||
}
|
||
else
|
||
{
|
||
card->card_status = status;
|
||
if (card->periodical_check_needed)
|
||
periodical_check_needed = 1;
|
||
unlock_card (card);
|
||
}
|
||
}
|
||
else
|
||
{
|
||
if (card->periodical_check_needed)
|
||
periodical_check_needed = 1;
|
||
unlock_card (card);
|
||
}
|
||
}
|
||
|
||
if (reported)
|
||
card_list_signal ();
|
||
|
||
card_list_w_unlock ();
|
||
|
||
return periodical_check_needed;
|
||
}
|
||
|
||
/* This function must be called once to initialize this module. This
|
||
has to be done before a second thread is spawned. We can't do the
|
||
static initialization because Pth emulation code might not be able
|
||
to do a static init; in particular, it is not possible for W32. */
|
||
gpg_error_t
|
||
initialize_module_command (void)
|
||
{
|
||
gpg_error_t err;
|
||
#ifndef HAVE_W32_SYSTEM
|
||
int ret;
|
||
#endif
|
||
|
||
card_list_lock.num_readers_active = 0;
|
||
card_list_lock.num_writers_waiting = 0;
|
||
card_list_lock.writer_active = 0;
|
||
|
||
if (npth_mutex_init (&card_list_lock.lock, NULL))
|
||
{
|
||
err = gpg_error_from_syserror ();
|
||
log_error ("app: error initializing mutex: %s\n", gpg_strerror (err));
|
||
return err;
|
||
}
|
||
|
||
err = npth_cond_init (&card_list_lock.cond, NULL);
|
||
if (err)
|
||
{
|
||
err = gpg_error_from_syserror ();
|
||
log_error ("npth_cond_init failed: %s\n", gpg_strerror (err));
|
||
return err;
|
||
}
|
||
|
||
#ifdef HAVE_W32_SYSTEM
|
||
scd_init_event (&card_list_lock.the_event, card_list_lock.events);
|
||
#else
|
||
ret = gnupg_create_pipe (card_list_lock.notify_pipe);
|
||
if (ret)
|
||
{
|
||
err = gpg_error_from_syserror ();
|
||
log_error ("pipe creation failed: %s\n", gpg_strerror (ret));
|
||
return err;
|
||
}
|
||
/* There may be multiple clients for DEVINFO --watch.
|
||
* O_NONBLOCK allows multiple accesses, not blocking at read(2). */
|
||
if (fcntl (card_list_lock.notify_pipe[0], F_SETFL, O_NONBLOCK) < 0)
|
||
log_error ("fcntl failed: %s\n",
|
||
gpg_strerror (gpg_error_from_syserror ()));
|
||
#endif
|
||
|
||
return apdu_init ();
|
||
}
|
||
|
||
|
||
/* Sort helper for app_send_card_list. */
|
||
static int
|
||
compare_card_list_items (const void *arg_a, const void *arg_b)
|
||
{
|
||
const card_t a = *(const card_t *)arg_a;
|
||
const card_t b = *(const card_t *)arg_b;
|
||
|
||
return a->slot - b->slot;
|
||
}
|
||
|
||
|
||
/* Helper for send_card_and_app_list and app_switch_active_app. */
|
||
static gpg_error_t
|
||
send_serialno_and_app_status (card_t card, int with_apps, ctrl_t ctrl)
|
||
{
|
||
gpg_error_t err;
|
||
app_t a;
|
||
char *serial;
|
||
char *p;
|
||
membuf_t mb;
|
||
int any = 0;
|
||
|
||
serial = card_get_serialno (card);
|
||
if (!serial)
|
||
return 0; /* Oops. */
|
||
|
||
if (with_apps)
|
||
{
|
||
/* Note that in case the additional applications have not yet been
|
||
* added to the card context (which is commonly done by means of
|
||
* "SERIALNO --all", we do that here. */
|
||
err = select_all_additional_applications_internal (ctrl, card);
|
||
if (err)
|
||
{
|
||
xfree (serial);
|
||
return err;
|
||
}
|
||
|
||
init_membuf (&mb, 256);
|
||
put_membuf_str (&mb, serial);
|
||
for (a = card->app; a; a = a->next)
|
||
{
|
||
if (!a->fnc.with_keygrip || a->need_reset)
|
||
continue;
|
||
any = 1;
|
||
put_membuf (&mb, " ", 1);
|
||
put_membuf_str (&mb, xstrapptype (a));
|
||
}
|
||
if (!any && card->app)
|
||
{
|
||
/* No card app supports the with_keygrip function. Use the
|
||
* main app as fallback. */
|
||
put_membuf (&mb, " ", 1);
|
||
put_membuf_str (&mb, xstrapptype (card->app));
|
||
}
|
||
put_membuf (&mb, "", 1);
|
||
p = get_membuf (&mb, NULL);
|
||
if (!p)
|
||
{
|
||
err = gpg_error_from_syserror ();
|
||
xfree (serial);
|
||
return err;
|
||
}
|
||
send_status_direct (ctrl, "SERIALNO", p);
|
||
xfree (p);
|
||
}
|
||
else
|
||
send_status_direct (ctrl, "SERIALNO", serial);
|
||
|
||
xfree (serial);
|
||
return 0;
|
||
}
|
||
|
||
|
||
/* Common code for app_send_card_list and app_send_active_apps. */
|
||
static gpg_error_t
|
||
send_card_and_app_list (ctrl_t ctrl, card_t wantcard, int with_apps)
|
||
{
|
||
gpg_error_t err;
|
||
card_t c;
|
||
card_t *cardlist = NULL;
|
||
int n, ncardlist;
|
||
|
||
card_list_r_lock ();
|
||
for (n=0, c = card_top; c; c = c->next)
|
||
n++;
|
||
if (!n)
|
||
{
|
||
err = gpg_error (GPG_ERR_CARD_NOT_PRESENT);
|
||
goto leave;
|
||
}
|
||
cardlist = xtrycalloc (n, sizeof *cardlist);
|
||
if (!cardlist)
|
||
{
|
||
err = gpg_error_from_syserror ();
|
||
goto leave;
|
||
}
|
||
for (ncardlist=0, c = card_top; c; c = c->next)
|
||
cardlist[ncardlist++] = c;
|
||
qsort (cardlist, ncardlist, sizeof *cardlist, compare_card_list_items);
|
||
|
||
for (n=0; n < ncardlist; n++)
|
||
{
|
||
if (wantcard && wantcard != cardlist[n])
|
||
continue;
|
||
err = send_serialno_and_app_status (cardlist[n], with_apps, ctrl);
|
||
if (err)
|
||
goto leave;
|
||
}
|
||
|
||
err = 0;
|
||
|
||
leave:
|
||
card_list_r_unlock ();
|
||
xfree (cardlist);
|
||
return err;
|
||
}
|
||
|
||
|
||
/* Send status lines with the serialno of all inserted cards. */
|
||
gpg_error_t
|
||
app_send_card_list (ctrl_t ctrl)
|
||
{
|
||
return send_card_and_app_list (ctrl, NULL, 0);
|
||
}
|
||
|
||
|
||
/* Send status lines with the serialno and appname of the current card
|
||
* or of all cards if CARD is NULL. */
|
||
gpg_error_t
|
||
app_send_active_apps (card_t card, ctrl_t ctrl)
|
||
{
|
||
return send_card_and_app_list (ctrl, card, 1);
|
||
}
|
||
|
||
|
||
/* Switch to APPNAME and print a respective status line with that app
|
||
* listed first. If APPNAME is NULL or the empty string no switching
|
||
* is done but the status line is printed anyway. */
|
||
gpg_error_t
|
||
app_switch_active_app (card_t card, ctrl_t ctrl, const char *appname)
|
||
{
|
||
gpg_error_t err;
|
||
apptype_t apptype;
|
||
|
||
/* Note that in case the additional applications have not yet been
|
||
* added to the card context (which is commonly done by means of
|
||
* "SERIALNO --all", we do that here. */
|
||
err = select_all_additional_applications_internal (ctrl, card);
|
||
if (err)
|
||
goto leave;
|
||
|
||
if (appname && *appname)
|
||
{
|
||
apptype = apptype_from_name (appname);
|
||
if (!apptype)
|
||
{
|
||
err = gpg_error (GPG_ERR_NOT_FOUND);
|
||
goto leave;
|
||
}
|
||
|
||
ctrl->current_apptype = apptype;
|
||
err = maybe_switch_app (ctrl, card, NULL);
|
||
if (err)
|
||
goto leave;
|
||
}
|
||
|
||
/* Print the status line. */
|
||
err = send_serialno_and_app_status (card, 1, ctrl);
|
||
|
||
leave:
|
||
return err;
|
||
}
|
||
|
||
|
||
/* Execute an action for each app. ACTION can be one of:
|
||
*
|
||
* - KEYGRIP_ACTION_SEND_DATA
|
||
*
|
||
* If KEYGRIP_STR matches a public key of any active application
|
||
* send information as LF terminated data lines about the public
|
||
* key. The format of these lines is
|
||
* <keygrip> T <serialno> <idstr>
|
||
* If a match was found a pointer to the matching application is
|
||
* returned. With the KEYGRIP_STR given as NULL, lines for all
|
||
* keys (with CAPABILITY) will be send and the return value is
|
||
* GPG_ERR_TRUE.
|
||
*
|
||
* - KEYGRIP_ACTION_WRITE_STATUS
|
||
*
|
||
* Same as KEYGRIP_ACTION_SEND_DATA but uses status lines instead
|
||
* of data lines.
|
||
*
|
||
* - KEYGRIP_ACTION_LOOKUP
|
||
*
|
||
* Returns a pointer to the application matching KEYGRIP_STR but
|
||
* does not emit any status or data lines. If no key with that
|
||
* keygrip is available or KEYGRIP_STR is NULL, GPG_ERR_NOT_FOUND
|
||
* is returned.
|
||
*/
|
||
card_t
|
||
app_do_with_keygrip (ctrl_t ctrl, int action, const char *keygrip_str,
|
||
int capability)
|
||
{
|
||
card_t card;
|
||
|
||
card_list_r_lock ();
|
||
card = do_with_keygrip (ctrl, action, keygrip_str, capability);
|
||
card_list_r_unlock ();
|
||
return card;
|
||
}
|