1c84ccd0aSEtienne Carriere // SPDX-License-Identifier: BSD-2-Clause 2c84ccd0aSEtienne Carriere /* 3c84ccd0aSEtienne Carriere * Copyright (c) 2017-2020, Linaro Limited 4c84ccd0aSEtienne Carriere */ 5c84ccd0aSEtienne Carriere 6c84ccd0aSEtienne Carriere #include <assert.h> 71a27b197SVesa Jääskeläinen #include <config.h> 8d38f9635SEtienne Carriere #include <confine_array_index.h> 9c84ccd0aSEtienne Carriere #include <pkcs11_ta.h> 10d628ebd9SEtienne Carriere #include <printk.h> 1122587dc4SVesa Jääskeläinen #include <pta_system.h> 12c84ccd0aSEtienne Carriere #include <string.h> 13c84ccd0aSEtienne Carriere #include <string_ext.h> 14c84ccd0aSEtienne Carriere #include <sys/queue.h> 15c84ccd0aSEtienne Carriere #include <tee_api_types.h> 16c84ccd0aSEtienne Carriere #include <tee_internal_api_extensions.h> 17c84ccd0aSEtienne Carriere #include <util.h> 18c84ccd0aSEtienne Carriere 19512cbf1dSJens Wiklander #include "attributes.h" 2049443fc0SEtienne Carriere #include "handle.h" 21c84ccd0aSEtienne Carriere #include "pkcs11_helpers.h" 22ee49d9f2SEtienne Carriere #include "pkcs11_token.h" 2355e6965cSEtienne Carriere #include "processing.h" 2422ac6984SEtienne Carriere #include "serializer.h" 2549443fc0SEtienne Carriere #include "token_capabilities.h" 26c84ccd0aSEtienne Carriere 27c84ccd0aSEtienne Carriere /* Provide 3 slots/tokens, ID is token index */ 28c84ccd0aSEtienne Carriere #ifndef CFG_PKCS11_TA_TOKEN_COUNT 29c84ccd0aSEtienne Carriere #define TOKEN_COUNT 3 30c84ccd0aSEtienne Carriere #else 31c84ccd0aSEtienne Carriere #define TOKEN_COUNT CFG_PKCS11_TA_TOKEN_COUNT 32c84ccd0aSEtienne Carriere #endif 33c84ccd0aSEtienne Carriere 3422587dc4SVesa Jääskeläinen /* RNG chunk size used to split RNG generation to smaller sizes */ 3522587dc4SVesa Jääskeläinen #define RNG_CHUNK_SIZE 512U 3622587dc4SVesa Jääskeläinen 37e084583eSEtienne Carriere /* 38e084583eSEtienne Carriere * Structure tracking client applications 39e084583eSEtienne Carriere * 40e084583eSEtienne Carriere * @link - chained list of registered client applications 41e084583eSEtienne Carriere * @sessions - list of the PKCS11 sessions opened by the client application 42bc555ee0SVesa Jääskeläinen * @object_handle_db - Database for object handles in name space of client 43e084583eSEtienne Carriere */ 44e084583eSEtienne Carriere struct pkcs11_client { 45e084583eSEtienne Carriere TAILQ_ENTRY(pkcs11_client) link; 46e084583eSEtienne Carriere struct session_list session_list; 47e084583eSEtienne Carriere struct handle_db session_handle_db; 48bc555ee0SVesa Jääskeläinen struct handle_db object_handle_db; 49e084583eSEtienne Carriere }; 50e084583eSEtienne Carriere 51c84ccd0aSEtienne Carriere /* Static allocation of tokens runtime instances (reset to 0 at load) */ 52c84ccd0aSEtienne Carriere struct ck_token ck_token[TOKEN_COUNT]; 53c84ccd0aSEtienne Carriere 54e084583eSEtienne Carriere static struct client_list pkcs11_client_list = 55e084583eSEtienne Carriere TAILQ_HEAD_INITIALIZER(pkcs11_client_list); 56e084583eSEtienne Carriere 576e4f8f17SEtienne Carriere static void close_ck_session(struct pkcs11_session *session); 586e4f8f17SEtienne Carriere 59c84ccd0aSEtienne Carriere struct ck_token *get_token(unsigned int token_id) 60c84ccd0aSEtienne Carriere { 61d38f9635SEtienne Carriere if (token_id < TOKEN_COUNT) 62d38f9635SEtienne Carriere return &ck_token[confine_array_index(token_id, TOKEN_COUNT)]; 63c84ccd0aSEtienne Carriere 64d38f9635SEtienne Carriere return NULL; 65c84ccd0aSEtienne Carriere } 66c84ccd0aSEtienne Carriere 67c84ccd0aSEtienne Carriere unsigned int get_token_id(struct ck_token *token) 68c84ccd0aSEtienne Carriere { 69c84ccd0aSEtienne Carriere ptrdiff_t id = token - ck_token; 70c84ccd0aSEtienne Carriere 71c84ccd0aSEtienne Carriere assert(id >= 0 && id < TOKEN_COUNT); 72c84ccd0aSEtienne Carriere return id; 73c84ccd0aSEtienne Carriere } 74c84ccd0aSEtienne Carriere 75bc555ee0SVesa Jääskeläinen struct handle_db *get_object_handle_db(struct pkcs11_session *session) 76bc555ee0SVesa Jääskeläinen { 77bc555ee0SVesa Jääskeläinen return &session->client->object_handle_db; 78bc555ee0SVesa Jääskeläinen } 79bc555ee0SVesa Jääskeläinen 80bc555ee0SVesa Jääskeläinen struct session_list *get_session_list(struct pkcs11_session *session) 81bc555ee0SVesa Jääskeläinen { 82bc555ee0SVesa Jääskeläinen return &session->client->session_list; 83bc555ee0SVesa Jääskeläinen } 84bc555ee0SVesa Jääskeläinen 85e084583eSEtienne Carriere struct pkcs11_client *tee_session2client(void *tee_session) 86e084583eSEtienne Carriere { 87e084583eSEtienne Carriere struct pkcs11_client *client = NULL; 88e084583eSEtienne Carriere 89e084583eSEtienne Carriere TAILQ_FOREACH(client, &pkcs11_client_list, link) 90e084583eSEtienne Carriere if (client == tee_session) 91e084583eSEtienne Carriere break; 92e084583eSEtienne Carriere 93e084583eSEtienne Carriere return client; 94e084583eSEtienne Carriere } 95e084583eSEtienne Carriere 966e4f8f17SEtienne Carriere struct pkcs11_session *pkcs11_handle2session(uint32_t handle, 976e4f8f17SEtienne Carriere struct pkcs11_client *client) 986e4f8f17SEtienne Carriere { 996e4f8f17SEtienne Carriere return handle_lookup(&client->session_handle_db, handle); 1006e4f8f17SEtienne Carriere } 1016e4f8f17SEtienne Carriere 102e084583eSEtienne Carriere struct pkcs11_client *register_client(void) 103e084583eSEtienne Carriere { 104e084583eSEtienne Carriere struct pkcs11_client *client = NULL; 105e084583eSEtienne Carriere 106e084583eSEtienne Carriere client = TEE_Malloc(sizeof(*client), TEE_MALLOC_FILL_ZERO); 107e084583eSEtienne Carriere if (!client) 108e084583eSEtienne Carriere return NULL; 109e084583eSEtienne Carriere 110e084583eSEtienne Carriere TAILQ_INSERT_HEAD(&pkcs11_client_list, client, link); 111e084583eSEtienne Carriere TAILQ_INIT(&client->session_list); 112e084583eSEtienne Carriere handle_db_init(&client->session_handle_db); 113bc555ee0SVesa Jääskeläinen handle_db_init(&client->object_handle_db); 114e084583eSEtienne Carriere 115e084583eSEtienne Carriere return client; 116e084583eSEtienne Carriere } 117e084583eSEtienne Carriere 118e084583eSEtienne Carriere void unregister_client(struct pkcs11_client *client) 119e084583eSEtienne Carriere { 1206e4f8f17SEtienne Carriere struct pkcs11_session *session = NULL; 1216e4f8f17SEtienne Carriere struct pkcs11_session *next = NULL; 1226e4f8f17SEtienne Carriere 123e084583eSEtienne Carriere if (!client) { 124e084583eSEtienne Carriere EMSG("Invalid TEE session handle"); 125e084583eSEtienne Carriere return; 126e084583eSEtienne Carriere } 127e084583eSEtienne Carriere 1286e4f8f17SEtienne Carriere TAILQ_FOREACH_SAFE(session, &client->session_list, link, next) 1296e4f8f17SEtienne Carriere close_ck_session(session); 1306e4f8f17SEtienne Carriere 131e084583eSEtienne Carriere TAILQ_REMOVE(&pkcs11_client_list, client, link); 132bc555ee0SVesa Jääskeläinen handle_db_destroy(&client->object_handle_db); 133e084583eSEtienne Carriere handle_db_destroy(&client->session_handle_db); 134e084583eSEtienne Carriere TEE_Free(client); 135e084583eSEtienne Carriere } 136e084583eSEtienne Carriere 137c84ccd0aSEtienne Carriere static TEE_Result pkcs11_token_init(unsigned int id) 138c84ccd0aSEtienne Carriere { 139c84ccd0aSEtienne Carriere struct ck_token *token = init_persistent_db(id); 140c84ccd0aSEtienne Carriere 141c84ccd0aSEtienne Carriere if (!token) 142c84ccd0aSEtienne Carriere return TEE_ERROR_SECURITY; 143c84ccd0aSEtienne Carriere 144c84ccd0aSEtienne Carriere if (token->state == PKCS11_TOKEN_RESET) { 145c84ccd0aSEtienne Carriere /* As per PKCS#11 spec, token resets to read/write state */ 146c84ccd0aSEtienne Carriere token->state = PKCS11_TOKEN_READ_WRITE; 147c84ccd0aSEtienne Carriere token->session_count = 0; 148c84ccd0aSEtienne Carriere token->rw_session_count = 0; 149c84ccd0aSEtienne Carriere } 150c84ccd0aSEtienne Carriere 151c84ccd0aSEtienne Carriere return TEE_SUCCESS; 152c84ccd0aSEtienne Carriere } 153c84ccd0aSEtienne Carriere 154c84ccd0aSEtienne Carriere TEE_Result pkcs11_init(void) 155c84ccd0aSEtienne Carriere { 156c84ccd0aSEtienne Carriere unsigned int id = 0; 157c84ccd0aSEtienne Carriere TEE_Result ret = TEE_ERROR_GENERIC; 158c84ccd0aSEtienne Carriere 159c84ccd0aSEtienne Carriere for (id = 0; id < TOKEN_COUNT; id++) { 160c84ccd0aSEtienne Carriere ret = pkcs11_token_init(id); 161c84ccd0aSEtienne Carriere if (ret) 162e084583eSEtienne Carriere break; 163c84ccd0aSEtienne Carriere } 164c84ccd0aSEtienne Carriere 165c84ccd0aSEtienne Carriere return ret; 166c84ccd0aSEtienne Carriere } 167c84ccd0aSEtienne Carriere 168c84ccd0aSEtienne Carriere void pkcs11_deinit(void) 169c84ccd0aSEtienne Carriere { 170c84ccd0aSEtienne Carriere unsigned int id = 0; 171c84ccd0aSEtienne Carriere 172c84ccd0aSEtienne Carriere for (id = 0; id < TOKEN_COUNT; id++) 173c84ccd0aSEtienne Carriere close_persistent_db(get_token(id)); 174c84ccd0aSEtienne Carriere } 17522ac6984SEtienne Carriere 176512cbf1dSJens Wiklander /* 177512cbf1dSJens Wiklander * Currently no support for dual operations. 178512cbf1dSJens Wiklander */ 179512cbf1dSJens Wiklander enum pkcs11_rc set_processing_state(struct pkcs11_session *session, 180512cbf1dSJens Wiklander enum processing_func function, 181512cbf1dSJens Wiklander struct pkcs11_object *obj1, 182512cbf1dSJens Wiklander struct pkcs11_object *obj2) 183512cbf1dSJens Wiklander { 184512cbf1dSJens Wiklander enum pkcs11_proc_state state = PKCS11_SESSION_READY; 185512cbf1dSJens Wiklander struct active_processing *proc = NULL; 186512cbf1dSJens Wiklander 187512cbf1dSJens Wiklander if (session->processing) 188512cbf1dSJens Wiklander return PKCS11_CKR_OPERATION_ACTIVE; 189512cbf1dSJens Wiklander 190512cbf1dSJens Wiklander switch (function) { 191512cbf1dSJens Wiklander case PKCS11_FUNCTION_ENCRYPT: 192512cbf1dSJens Wiklander state = PKCS11_SESSION_ENCRYPTING; 193512cbf1dSJens Wiklander break; 194512cbf1dSJens Wiklander case PKCS11_FUNCTION_DECRYPT: 195512cbf1dSJens Wiklander state = PKCS11_SESSION_DECRYPTING; 196512cbf1dSJens Wiklander break; 197512cbf1dSJens Wiklander case PKCS11_FUNCTION_SIGN: 198512cbf1dSJens Wiklander state = PKCS11_SESSION_SIGNING; 199512cbf1dSJens Wiklander break; 200512cbf1dSJens Wiklander case PKCS11_FUNCTION_VERIFY: 201512cbf1dSJens Wiklander state = PKCS11_SESSION_VERIFYING; 202512cbf1dSJens Wiklander break; 203512cbf1dSJens Wiklander case PKCS11_FUNCTION_DIGEST: 204512cbf1dSJens Wiklander state = PKCS11_SESSION_DIGESTING; 205512cbf1dSJens Wiklander break; 206512cbf1dSJens Wiklander case PKCS11_FUNCTION_DERIVE: 2075f80f270SRuchika Gupta case PKCS11_FUNCTION_WRAP: 2085f80f270SRuchika Gupta case PKCS11_FUNCTION_UNWRAP: 2095f80f270SRuchika Gupta state = PKCS11_SESSION_BUSY; 210512cbf1dSJens Wiklander break; 211512cbf1dSJens Wiklander default: 212512cbf1dSJens Wiklander TEE_Panic(function); 213512cbf1dSJens Wiklander return -1; 214512cbf1dSJens Wiklander } 215512cbf1dSJens Wiklander 216512cbf1dSJens Wiklander proc = TEE_Malloc(sizeof(*proc), TEE_MALLOC_FILL_ZERO); 217512cbf1dSJens Wiklander if (!proc) 218512cbf1dSJens Wiklander return PKCS11_CKR_DEVICE_MEMORY; 219512cbf1dSJens Wiklander 220512cbf1dSJens Wiklander /* Boolean are default to false and pointers to NULL */ 221512cbf1dSJens Wiklander proc->state = state; 222*2364aa69SRuchika Gupta proc->step = PKCS11_FUNC_STEP_INIT; 223512cbf1dSJens Wiklander proc->tee_op_handle = TEE_HANDLE_NULL; 224fb279d8bSVesa Jääskeläinen proc->tee_hash_algo = 0; 225fb279d8bSVesa Jääskeläinen proc->tee_hash_op_handle = TEE_HANDLE_NULL; 226512cbf1dSJens Wiklander 227512cbf1dSJens Wiklander if (obj1 && get_bool(obj1->attributes, PKCS11_CKA_ALWAYS_AUTHENTICATE)) 228512cbf1dSJens Wiklander proc->always_authen = true; 229512cbf1dSJens Wiklander 230512cbf1dSJens Wiklander if (obj2 && get_bool(obj2->attributes, PKCS11_CKA_ALWAYS_AUTHENTICATE)) 231512cbf1dSJens Wiklander proc->always_authen = true; 232512cbf1dSJens Wiklander 233512cbf1dSJens Wiklander session->processing = proc; 234512cbf1dSJens Wiklander 235512cbf1dSJens Wiklander return PKCS11_CKR_OK; 236512cbf1dSJens Wiklander } 237512cbf1dSJens Wiklander 2384daf39b3SJens Wiklander enum pkcs11_rc entry_ck_slot_list(uint32_t ptypes, TEE_Param *params) 23922ac6984SEtienne Carriere { 24022ac6984SEtienne Carriere const uint32_t exp_pt = TEE_PARAM_TYPES(TEE_PARAM_TYPE_MEMREF_INOUT, 24122ac6984SEtienne Carriere TEE_PARAM_TYPE_NONE, 24222ac6984SEtienne Carriere TEE_PARAM_TYPE_MEMREF_OUTPUT, 24322ac6984SEtienne Carriere TEE_PARAM_TYPE_NONE); 24439b43b78SJens Wiklander TEE_Param *out = params + 2; 24522ac6984SEtienne Carriere uint32_t token_id = 0; 24622ac6984SEtienne Carriere const size_t out_size = sizeof(token_id) * TOKEN_COUNT; 24722ac6984SEtienne Carriere uint8_t *id = NULL; 24822ac6984SEtienne Carriere 24922ac6984SEtienne Carriere if (ptypes != exp_pt || 25022ac6984SEtienne Carriere params[0].memref.size != TEE_PARAM0_SIZE_MIN) 25122ac6984SEtienne Carriere return PKCS11_CKR_ARGUMENTS_BAD; 25222ac6984SEtienne Carriere 25322ac6984SEtienne Carriere if (out->memref.size < out_size) { 25422ac6984SEtienne Carriere out->memref.size = out_size; 25522ac6984SEtienne Carriere 25622ac6984SEtienne Carriere if (out->memref.buffer) 25722ac6984SEtienne Carriere return PKCS11_CKR_BUFFER_TOO_SMALL; 25822ac6984SEtienne Carriere else 25922ac6984SEtienne Carriere return PKCS11_CKR_OK; 26022ac6984SEtienne Carriere } 26122ac6984SEtienne Carriere 26222ac6984SEtienne Carriere for (token_id = 0, id = out->memref.buffer; token_id < TOKEN_COUNT; 26322ac6984SEtienne Carriere token_id++, id += sizeof(token_id)) 26422ac6984SEtienne Carriere TEE_MemMove(id, &token_id, sizeof(token_id)); 26522ac6984SEtienne Carriere 26622ac6984SEtienne Carriere out->memref.size = out_size; 26722ac6984SEtienne Carriere 26822ac6984SEtienne Carriere return PKCS11_CKR_OK; 26922ac6984SEtienne Carriere } 270ce94efefSEtienne Carriere 271b3ac5035SEtienne Carriere static void pad_str(uint8_t *str, size_t size) 272b3ac5035SEtienne Carriere { 273b3ac5035SEtienne Carriere int n = strnlen((char *)str, size); 274b3ac5035SEtienne Carriere 275b3ac5035SEtienne Carriere TEE_MemFill(str + n, ' ', size - n); 276b3ac5035SEtienne Carriere } 277b3ac5035SEtienne Carriere 278d628ebd9SEtienne Carriere static void set_token_description(struct pkcs11_slot_info *info) 279d628ebd9SEtienne Carriere { 280d628ebd9SEtienne Carriere char desc[sizeof(info->slot_description) + 1] = { 0 }; 281d628ebd9SEtienne Carriere TEE_UUID dev_id = { }; 282d628ebd9SEtienne Carriere TEE_Result res = TEE_ERROR_GENERIC; 283d628ebd9SEtienne Carriere int n = 0; 284d628ebd9SEtienne Carriere 285d628ebd9SEtienne Carriere res = TEE_GetPropertyAsUUID(TEE_PROPSET_TEE_IMPLEMENTATION, 286d628ebd9SEtienne Carriere "gpd.tee.deviceID", &dev_id); 287d628ebd9SEtienne Carriere if (res == TEE_SUCCESS) { 288d628ebd9SEtienne Carriere n = snprintk(desc, sizeof(desc), PKCS11_SLOT_DESCRIPTION 289d628ebd9SEtienne Carriere " - TEE UUID %pUl", (void *)&dev_id); 290d628ebd9SEtienne Carriere } else { 291d628ebd9SEtienne Carriere n = snprintf(desc, sizeof(desc), PKCS11_SLOT_DESCRIPTION 292d628ebd9SEtienne Carriere " - No TEE UUID"); 293d628ebd9SEtienne Carriere } 294d628ebd9SEtienne Carriere if (n < 0 || n >= (int)sizeof(desc)) 295d628ebd9SEtienne Carriere TEE_Panic(0); 296d628ebd9SEtienne Carriere 297d628ebd9SEtienne Carriere TEE_MemMove(info->slot_description, desc, n); 298d628ebd9SEtienne Carriere pad_str(info->slot_description, sizeof(info->slot_description)); 299d628ebd9SEtienne Carriere } 300d628ebd9SEtienne Carriere 3014daf39b3SJens Wiklander enum pkcs11_rc entry_ck_slot_info(uint32_t ptypes, TEE_Param *params) 302ce94efefSEtienne Carriere { 303ce94efefSEtienne Carriere const uint32_t exp_pt = TEE_PARAM_TYPES(TEE_PARAM_TYPE_MEMREF_INOUT, 304ce94efefSEtienne Carriere TEE_PARAM_TYPE_NONE, 305ce94efefSEtienne Carriere TEE_PARAM_TYPE_MEMREF_OUTPUT, 306ce94efefSEtienne Carriere TEE_PARAM_TYPE_NONE); 30739b43b78SJens Wiklander TEE_Param *ctrl = params; 30839b43b78SJens Wiklander TEE_Param *out = params + 2; 3094daf39b3SJens Wiklander enum pkcs11_rc rc = PKCS11_CKR_OK; 310ce94efefSEtienne Carriere struct serialargs ctrlargs = { }; 311ce94efefSEtienne Carriere uint32_t token_id = 0; 312ce94efefSEtienne Carriere struct pkcs11_slot_info info = { 313ce94efefSEtienne Carriere .slot_description = PKCS11_SLOT_DESCRIPTION, 314ce94efefSEtienne Carriere .manufacturer_id = PKCS11_SLOT_MANUFACTURER, 315ce94efefSEtienne Carriere .flags = PKCS11_CKFS_TOKEN_PRESENT, 316ce94efefSEtienne Carriere .hardware_version = PKCS11_SLOT_HW_VERSION, 317ce94efefSEtienne Carriere .firmware_version = PKCS11_SLOT_FW_VERSION, 318ce94efefSEtienne Carriere }; 319ce94efefSEtienne Carriere 320ce94efefSEtienne Carriere COMPILE_TIME_ASSERT(sizeof(PKCS11_SLOT_DESCRIPTION) <= 321ce94efefSEtienne Carriere sizeof(info.slot_description)); 322ce94efefSEtienne Carriere COMPILE_TIME_ASSERT(sizeof(PKCS11_SLOT_MANUFACTURER) <= 323ce94efefSEtienne Carriere sizeof(info.manufacturer_id)); 324ce94efefSEtienne Carriere 325ce94efefSEtienne Carriere if (ptypes != exp_pt || out->memref.size != sizeof(info)) 326ce94efefSEtienne Carriere return PKCS11_CKR_ARGUMENTS_BAD; 327ce94efefSEtienne Carriere 328ce94efefSEtienne Carriere serialargs_init(&ctrlargs, ctrl->memref.buffer, ctrl->memref.size); 329ce94efefSEtienne Carriere 3304daf39b3SJens Wiklander rc = serialargs_get(&ctrlargs, &token_id, sizeof(token_id)); 3314daf39b3SJens Wiklander if (rc) 3324daf39b3SJens Wiklander return rc; 333ce94efefSEtienne Carriere 334ce94efefSEtienne Carriere if (serialargs_remaining_bytes(&ctrlargs)) 335ce94efefSEtienne Carriere return PKCS11_CKR_ARGUMENTS_BAD; 336ce94efefSEtienne Carriere 33729b0949aSEtienne Carriere if (!get_token(token_id)) 338ce94efefSEtienne Carriere return PKCS11_CKR_SLOT_ID_INVALID; 339ce94efefSEtienne Carriere 340d628ebd9SEtienne Carriere set_token_description(&info); 341d628ebd9SEtienne Carriere 342b3ac5035SEtienne Carriere pad_str(info.manufacturer_id, sizeof(info.manufacturer_id)); 343ce94efefSEtienne Carriere 344ce94efefSEtienne Carriere out->memref.size = sizeof(info); 345ce94efefSEtienne Carriere TEE_MemMove(out->memref.buffer, &info, out->memref.size); 346ce94efefSEtienne Carriere 347ce94efefSEtienne Carriere return PKCS11_CKR_OK; 348ce94efefSEtienne Carriere } 349030e7392SEtienne Carriere 3504daf39b3SJens Wiklander enum pkcs11_rc entry_ck_token_info(uint32_t ptypes, TEE_Param *params) 351030e7392SEtienne Carriere { 352030e7392SEtienne Carriere const uint32_t exp_pt = TEE_PARAM_TYPES(TEE_PARAM_TYPE_MEMREF_INOUT, 353030e7392SEtienne Carriere TEE_PARAM_TYPE_NONE, 354030e7392SEtienne Carriere TEE_PARAM_TYPE_MEMREF_OUTPUT, 355030e7392SEtienne Carriere TEE_PARAM_TYPE_NONE); 35639b43b78SJens Wiklander TEE_Param *ctrl = params; 35739b43b78SJens Wiklander TEE_Param *out = params + 2; 3584daf39b3SJens Wiklander enum pkcs11_rc rc = PKCS11_CKR_OK; 359030e7392SEtienne Carriere struct serialargs ctrlargs = { }; 360030e7392SEtienne Carriere uint32_t token_id = 0; 361030e7392SEtienne Carriere struct ck_token *token = NULL; 362030e7392SEtienne Carriere struct pkcs11_token_info info = { 363030e7392SEtienne Carriere .manufacturer_id = PKCS11_TOKEN_MANUFACTURER, 364030e7392SEtienne Carriere .model = PKCS11_TOKEN_MODEL, 365030e7392SEtienne Carriere .max_session_count = UINT32_MAX, 366030e7392SEtienne Carriere .max_rw_session_count = UINT32_MAX, 367030e7392SEtienne Carriere .max_pin_len = PKCS11_TOKEN_PIN_SIZE_MAX, 368030e7392SEtienne Carriere .min_pin_len = PKCS11_TOKEN_PIN_SIZE_MIN, 369030e7392SEtienne Carriere .total_public_memory = UINT32_MAX, 370030e7392SEtienne Carriere .free_public_memory = UINT32_MAX, 371030e7392SEtienne Carriere .total_private_memory = UINT32_MAX, 372030e7392SEtienne Carriere .free_private_memory = UINT32_MAX, 373030e7392SEtienne Carriere .hardware_version = PKCS11_TOKEN_HW_VERSION, 374030e7392SEtienne Carriere .firmware_version = PKCS11_TOKEN_FW_VERSION, 375030e7392SEtienne Carriere }; 37602b4d42aSEtienne Carriere char sn[sizeof(info.serial_number) + 1] = { 0 }; 37702b4d42aSEtienne Carriere int n = 0; 378030e7392SEtienne Carriere 379030e7392SEtienne Carriere if (ptypes != exp_pt || out->memref.size != sizeof(info)) 380030e7392SEtienne Carriere return PKCS11_CKR_ARGUMENTS_BAD; 381030e7392SEtienne Carriere 382030e7392SEtienne Carriere serialargs_init(&ctrlargs, ctrl->memref.buffer, ctrl->memref.size); 383030e7392SEtienne Carriere 3844daf39b3SJens Wiklander rc = serialargs_get(&ctrlargs, &token_id, sizeof(token_id)); 3854daf39b3SJens Wiklander if (rc) 3864daf39b3SJens Wiklander return rc; 387030e7392SEtienne Carriere 388030e7392SEtienne Carriere if (serialargs_remaining_bytes(&ctrlargs)) 389030e7392SEtienne Carriere return PKCS11_CKR_ARGUMENTS_BAD; 390030e7392SEtienne Carriere 391030e7392SEtienne Carriere token = get_token(token_id); 392030e7392SEtienne Carriere if (!token) 393030e7392SEtienne Carriere return PKCS11_CKR_SLOT_ID_INVALID; 394030e7392SEtienne Carriere 395030e7392SEtienne Carriere pad_str(info.manufacturer_id, sizeof(info.manufacturer_id)); 396030e7392SEtienne Carriere pad_str(info.model, sizeof(info.model)); 39702b4d42aSEtienne Carriere 39802b4d42aSEtienne Carriere n = snprintf(sn, sizeof(sn), "%0*"PRIu32, 39902b4d42aSEtienne Carriere (int)sizeof(info.serial_number), token_id); 40002b4d42aSEtienne Carriere if (n != (int)sizeof(info.serial_number)) 40102b4d42aSEtienne Carriere TEE_Panic(0); 40202b4d42aSEtienne Carriere 40302b4d42aSEtienne Carriere TEE_MemMove(info.serial_number, sn, sizeof(info.serial_number)); 404030e7392SEtienne Carriere pad_str(info.serial_number, sizeof(info.serial_number)); 405030e7392SEtienne Carriere 406030e7392SEtienne Carriere TEE_MemMove(info.label, token->db_main->label, sizeof(info.label)); 407030e7392SEtienne Carriere 408030e7392SEtienne Carriere info.flags = token->db_main->flags; 409030e7392SEtienne Carriere info.session_count = token->session_count; 410030e7392SEtienne Carriere info.rw_session_count = token->rw_session_count; 411030e7392SEtienne Carriere 412030e7392SEtienne Carriere TEE_MemMove(out->memref.buffer, &info, sizeof(info)); 413030e7392SEtienne Carriere 414030e7392SEtienne Carriere return PKCS11_CKR_OK; 415030e7392SEtienne Carriere } 4166f74919dSEtienne Carriere 4176f74919dSEtienne Carriere static void dmsg_print_supported_mechanism(unsigned int token_id __maybe_unused, 4186f74919dSEtienne Carriere uint32_t *array __maybe_unused, 4196f74919dSEtienne Carriere size_t count __maybe_unused) 4206f74919dSEtienne Carriere { 4216f74919dSEtienne Carriere size_t __maybe_unused n = 0; 4226f74919dSEtienne Carriere 4236f74919dSEtienne Carriere if (TRACE_LEVEL < TRACE_DEBUG) 4246f74919dSEtienne Carriere return; 4256f74919dSEtienne Carriere 4266f74919dSEtienne Carriere for (n = 0; n < count; n++) 4276f74919dSEtienne Carriere DMSG("PKCS11 token %"PRIu32": mechanism 0x%04"PRIx32": %s", 4286f74919dSEtienne Carriere token_id, array[n], id2str_mechanism(array[n])); 4296f74919dSEtienne Carriere } 4306f74919dSEtienne Carriere 4314daf39b3SJens Wiklander enum pkcs11_rc entry_ck_token_mecha_ids(uint32_t ptypes, TEE_Param *params) 4326f74919dSEtienne Carriere { 4336f74919dSEtienne Carriere const uint32_t exp_pt = TEE_PARAM_TYPES(TEE_PARAM_TYPE_MEMREF_INOUT, 4346f74919dSEtienne Carriere TEE_PARAM_TYPE_NONE, 4356f74919dSEtienne Carriere TEE_PARAM_TYPE_MEMREF_OUTPUT, 4366f74919dSEtienne Carriere TEE_PARAM_TYPE_NONE); 43739b43b78SJens Wiklander TEE_Param *ctrl = params; 43839b43b78SJens Wiklander TEE_Param *out = params + 2; 4394daf39b3SJens Wiklander enum pkcs11_rc rc = PKCS11_CKR_OK; 4406f74919dSEtienne Carriere struct serialargs ctrlargs = { }; 4416f74919dSEtienne Carriere uint32_t token_id = 0; 4426f74919dSEtienne Carriere struct ck_token __maybe_unused *token = NULL; 4436f74919dSEtienne Carriere size_t count = 0; 4446f74919dSEtienne Carriere uint32_t *array = NULL; 4456f74919dSEtienne Carriere 4466f74919dSEtienne Carriere if (ptypes != exp_pt) 4476f74919dSEtienne Carriere return PKCS11_CKR_ARGUMENTS_BAD; 4486f74919dSEtienne Carriere 4496f74919dSEtienne Carriere serialargs_init(&ctrlargs, ctrl->memref.buffer, ctrl->memref.size); 4506f74919dSEtienne Carriere 4514daf39b3SJens Wiklander rc = serialargs_get(&ctrlargs, &token_id, sizeof(token_id)); 4524daf39b3SJens Wiklander if (rc) 4534daf39b3SJens Wiklander return rc; 4546f74919dSEtienne Carriere 4556f74919dSEtienne Carriere if (serialargs_remaining_bytes(&ctrlargs)) 4566f74919dSEtienne Carriere return PKCS11_CKR_ARGUMENTS_BAD; 4576f74919dSEtienne Carriere 4586f74919dSEtienne Carriere token = get_token(token_id); 4596f74919dSEtienne Carriere if (!token) 4606f74919dSEtienne Carriere return PKCS11_CKR_SLOT_ID_INVALID; 4616f74919dSEtienne Carriere 4626f74919dSEtienne Carriere count = out->memref.size / sizeof(*array); 4636f74919dSEtienne Carriere array = tee_malloc_mechanism_list(&count); 4646f74919dSEtienne Carriere 4656f74919dSEtienne Carriere if (out->memref.size < count * sizeof(*array)) { 4666f74919dSEtienne Carriere assert(!array); 4676f74919dSEtienne Carriere out->memref.size = count * sizeof(*array); 4686459f267SEtienne Carriere if (out->memref.buffer) 4696f74919dSEtienne Carriere return PKCS11_CKR_BUFFER_TOO_SMALL; 4706459f267SEtienne Carriere else 4716459f267SEtienne Carriere return PKCS11_CKR_OK; 4726f74919dSEtienne Carriere } 4736f74919dSEtienne Carriere 4746f74919dSEtienne Carriere if (!array) 4756f74919dSEtienne Carriere return PKCS11_CKR_DEVICE_MEMORY; 4766f74919dSEtienne Carriere 4776f74919dSEtienne Carriere dmsg_print_supported_mechanism(token_id, array, count); 4786f74919dSEtienne Carriere 4796f74919dSEtienne Carriere out->memref.size = count * sizeof(*array); 4806f74919dSEtienne Carriere TEE_MemMove(out->memref.buffer, array, out->memref.size); 4816f74919dSEtienne Carriere 4826f74919dSEtienne Carriere TEE_Free(array); 4836f74919dSEtienne Carriere 4844daf39b3SJens Wiklander return rc; 4856f74919dSEtienne Carriere } 4861d3ebedbSEtienne Carriere 4874daf39b3SJens Wiklander enum pkcs11_rc entry_ck_token_mecha_info(uint32_t ptypes, TEE_Param *params) 4881d3ebedbSEtienne Carriere { 4891d3ebedbSEtienne Carriere const uint32_t exp_pt = TEE_PARAM_TYPES(TEE_PARAM_TYPE_MEMREF_INOUT, 4901d3ebedbSEtienne Carriere TEE_PARAM_TYPE_NONE, 4911d3ebedbSEtienne Carriere TEE_PARAM_TYPE_MEMREF_OUTPUT, 4921d3ebedbSEtienne Carriere TEE_PARAM_TYPE_NONE); 49339b43b78SJens Wiklander TEE_Param *ctrl = params; 49439b43b78SJens Wiklander TEE_Param *out = params + 2; 4954daf39b3SJens Wiklander enum pkcs11_rc rc = PKCS11_CKR_OK; 4961d3ebedbSEtienne Carriere struct serialargs ctrlargs = { }; 4971d3ebedbSEtienne Carriere uint32_t token_id = 0; 4981d3ebedbSEtienne Carriere uint32_t type = 0; 4991d3ebedbSEtienne Carriere struct ck_token *token = NULL; 5001d3ebedbSEtienne Carriere struct pkcs11_mechanism_info info = { }; 5011d3ebedbSEtienne Carriere 5021d3ebedbSEtienne Carriere if (ptypes != exp_pt || out->memref.size != sizeof(info)) 5031d3ebedbSEtienne Carriere return PKCS11_CKR_ARGUMENTS_BAD; 5041d3ebedbSEtienne Carriere 5051d3ebedbSEtienne Carriere serialargs_init(&ctrlargs, ctrl->memref.buffer, ctrl->memref.size); 5061d3ebedbSEtienne Carriere 5074daf39b3SJens Wiklander rc = serialargs_get(&ctrlargs, &token_id, sizeof(uint32_t)); 5084daf39b3SJens Wiklander if (rc) 5094daf39b3SJens Wiklander return rc; 5101d3ebedbSEtienne Carriere 5114daf39b3SJens Wiklander rc = serialargs_get(&ctrlargs, &type, sizeof(uint32_t)); 5124daf39b3SJens Wiklander if (rc) 5134daf39b3SJens Wiklander return rc; 5141d3ebedbSEtienne Carriere 5151d3ebedbSEtienne Carriere if (serialargs_remaining_bytes(&ctrlargs)) 5161d3ebedbSEtienne Carriere return PKCS11_CKR_ARGUMENTS_BAD; 5171d3ebedbSEtienne Carriere 5181d3ebedbSEtienne Carriere token = get_token(token_id); 5191d3ebedbSEtienne Carriere if (!token) 5201d3ebedbSEtienne Carriere return PKCS11_CKR_SLOT_ID_INVALID; 5211d3ebedbSEtienne Carriere 5221d3ebedbSEtienne Carriere if (!mechanism_is_valid(type)) 5231d3ebedbSEtienne Carriere return PKCS11_CKR_MECHANISM_INVALID; 5241d3ebedbSEtienne Carriere 5251d3ebedbSEtienne Carriere info.flags = mechanism_supported_flags(type); 5261d3ebedbSEtienne Carriere 5272d0cd829SRuchika Gupta pkcs11_mechanism_supported_key_sizes(type, &info.min_key_size, 5281d3ebedbSEtienne Carriere &info.max_key_size); 5291d3ebedbSEtienne Carriere 5301d3ebedbSEtienne Carriere TEE_MemMove(out->memref.buffer, &info, sizeof(info)); 5311d3ebedbSEtienne Carriere 5321d3ebedbSEtienne Carriere DMSG("PKCS11 token %"PRIu32": mechanism 0x%"PRIx32" info", 5331d3ebedbSEtienne Carriere token_id, type); 5341d3ebedbSEtienne Carriere 5351d3ebedbSEtienne Carriere return PKCS11_CKR_OK; 5361d3ebedbSEtienne Carriere } 5376e4f8f17SEtienne Carriere 5386e4f8f17SEtienne Carriere /* Select the ReadOnly or ReadWrite state for session login state */ 5396e4f8f17SEtienne Carriere static void set_session_state(struct pkcs11_client *client, 5406e4f8f17SEtienne Carriere struct pkcs11_session *session, bool readonly) 5416e4f8f17SEtienne Carriere { 5426e4f8f17SEtienne Carriere struct pkcs11_session *sess = NULL; 5436e4f8f17SEtienne Carriere enum pkcs11_session_state state = PKCS11_CKS_RO_PUBLIC_SESSION; 5446e4f8f17SEtienne Carriere 5456e4f8f17SEtienne Carriere /* Default to public session if no session already registered */ 5466e4f8f17SEtienne Carriere if (readonly) 5476e4f8f17SEtienne Carriere state = PKCS11_CKS_RO_PUBLIC_SESSION; 5486e4f8f17SEtienne Carriere else 5496e4f8f17SEtienne Carriere state = PKCS11_CKS_RW_PUBLIC_SESSION; 5506e4f8f17SEtienne Carriere 5516e4f8f17SEtienne Carriere /* 5526e4f8f17SEtienne Carriere * No need to check all client sessions, the first found in 5536e4f8f17SEtienne Carriere * target token gives client login configuration. 5546e4f8f17SEtienne Carriere */ 5556e4f8f17SEtienne Carriere TAILQ_FOREACH(sess, &client->session_list, link) { 5566e4f8f17SEtienne Carriere assert(sess != session); 5576e4f8f17SEtienne Carriere 5586e4f8f17SEtienne Carriere if (sess->token == session->token) { 5596e4f8f17SEtienne Carriere switch (sess->state) { 5606e4f8f17SEtienne Carriere case PKCS11_CKS_RW_PUBLIC_SESSION: 5616e4f8f17SEtienne Carriere case PKCS11_CKS_RO_PUBLIC_SESSION: 5626e4f8f17SEtienne Carriere if (readonly) 5636e4f8f17SEtienne Carriere state = PKCS11_CKS_RO_PUBLIC_SESSION; 5646e4f8f17SEtienne Carriere else 5656e4f8f17SEtienne Carriere state = PKCS11_CKS_RW_PUBLIC_SESSION; 5666e4f8f17SEtienne Carriere break; 5676e4f8f17SEtienne Carriere case PKCS11_CKS_RO_USER_FUNCTIONS: 5686e4f8f17SEtienne Carriere case PKCS11_CKS_RW_USER_FUNCTIONS: 5696e4f8f17SEtienne Carriere if (readonly) 5706e4f8f17SEtienne Carriere state = PKCS11_CKS_RO_USER_FUNCTIONS; 5716e4f8f17SEtienne Carriere else 5726e4f8f17SEtienne Carriere state = PKCS11_CKS_RW_USER_FUNCTIONS; 5736e4f8f17SEtienne Carriere break; 5746e4f8f17SEtienne Carriere case PKCS11_CKS_RW_SO_FUNCTIONS: 5756e4f8f17SEtienne Carriere if (readonly) 5766e4f8f17SEtienne Carriere TEE_Panic(0); 5776e4f8f17SEtienne Carriere else 5786e4f8f17SEtienne Carriere state = PKCS11_CKS_RW_SO_FUNCTIONS; 5796e4f8f17SEtienne Carriere break; 5806e4f8f17SEtienne Carriere default: 5816e4f8f17SEtienne Carriere TEE_Panic(0); 5826e4f8f17SEtienne Carriere } 5836e4f8f17SEtienne Carriere break; 5846e4f8f17SEtienne Carriere } 5856e4f8f17SEtienne Carriere } 5866e4f8f17SEtienne Carriere 5876e4f8f17SEtienne Carriere session->state = state; 5886e4f8f17SEtienne Carriere } 5896e4f8f17SEtienne Carriere 5904daf39b3SJens Wiklander enum pkcs11_rc entry_ck_open_session(struct pkcs11_client *client, 5916e4f8f17SEtienne Carriere uint32_t ptypes, TEE_Param *params) 5926e4f8f17SEtienne Carriere { 5936e4f8f17SEtienne Carriere const uint32_t exp_pt = TEE_PARAM_TYPES(TEE_PARAM_TYPE_MEMREF_INOUT, 5946e4f8f17SEtienne Carriere TEE_PARAM_TYPE_NONE, 5956e4f8f17SEtienne Carriere TEE_PARAM_TYPE_MEMREF_OUTPUT, 5966e4f8f17SEtienne Carriere TEE_PARAM_TYPE_NONE); 59739b43b78SJens Wiklander TEE_Param *ctrl = params; 59839b43b78SJens Wiklander TEE_Param *out = params + 2; 5994daf39b3SJens Wiklander enum pkcs11_rc rc = PKCS11_CKR_OK; 6006e4f8f17SEtienne Carriere struct serialargs ctrlargs = { }; 6016e4f8f17SEtienne Carriere uint32_t token_id = 0; 6026e4f8f17SEtienne Carriere uint32_t flags = 0; 6036e4f8f17SEtienne Carriere struct ck_token *token = NULL; 6046e4f8f17SEtienne Carriere struct pkcs11_session *session = NULL; 6056e4f8f17SEtienne Carriere bool readonly = false; 6066e4f8f17SEtienne Carriere 6076e4f8f17SEtienne Carriere if (!client || ptypes != exp_pt || 6086e4f8f17SEtienne Carriere out->memref.size != sizeof(session->handle)) 6096e4f8f17SEtienne Carriere return PKCS11_CKR_ARGUMENTS_BAD; 6106e4f8f17SEtienne Carriere 6116e4f8f17SEtienne Carriere serialargs_init(&ctrlargs, ctrl->memref.buffer, ctrl->memref.size); 6126e4f8f17SEtienne Carriere 6134daf39b3SJens Wiklander rc = serialargs_get(&ctrlargs, &token_id, sizeof(token_id)); 6144daf39b3SJens Wiklander if (rc) 6154daf39b3SJens Wiklander return rc; 6166e4f8f17SEtienne Carriere 6174daf39b3SJens Wiklander rc = serialargs_get(&ctrlargs, &flags, sizeof(flags)); 6184daf39b3SJens Wiklander if (rc) 6194daf39b3SJens Wiklander return rc; 6206e4f8f17SEtienne Carriere 6216e4f8f17SEtienne Carriere if (serialargs_remaining_bytes(&ctrlargs)) 6226e4f8f17SEtienne Carriere return PKCS11_CKR_ARGUMENTS_BAD; 6236e4f8f17SEtienne Carriere 6246e4f8f17SEtienne Carriere token = get_token(token_id); 6256e4f8f17SEtienne Carriere if (!token) 6266e4f8f17SEtienne Carriere return PKCS11_CKR_SLOT_ID_INVALID; 6276e4f8f17SEtienne Carriere 6286e4f8f17SEtienne Carriere /* Sanitize session flags */ 62908774c86SVesa Jääskeläinen if (!(flags & PKCS11_CKFSS_SERIAL_SESSION)) 63008774c86SVesa Jääskeläinen return PKCS11_CKR_SESSION_PARALLEL_NOT_SUPPORTED; 63108774c86SVesa Jääskeläinen 63208774c86SVesa Jääskeläinen if (flags & ~(PKCS11_CKFSS_RW_SESSION | PKCS11_CKFSS_SERIAL_SESSION)) 6336e4f8f17SEtienne Carriere return PKCS11_CKR_ARGUMENTS_BAD; 6346e4f8f17SEtienne Carriere 6356e4f8f17SEtienne Carriere readonly = !(flags & PKCS11_CKFSS_RW_SESSION); 6366e4f8f17SEtienne Carriere 6376e4f8f17SEtienne Carriere if (!readonly && token->state == PKCS11_TOKEN_READ_ONLY) 6386e4f8f17SEtienne Carriere return PKCS11_CKR_TOKEN_WRITE_PROTECTED; 6396e4f8f17SEtienne Carriere 6406e4f8f17SEtienne Carriere if (readonly) { 6416e4f8f17SEtienne Carriere /* Specifically reject read-only session under SO login */ 6426e4f8f17SEtienne Carriere TAILQ_FOREACH(session, &client->session_list, link) 6436e4f8f17SEtienne Carriere if (pkcs11_session_is_so(session)) 6446e4f8f17SEtienne Carriere return PKCS11_CKR_SESSION_READ_WRITE_SO_EXISTS; 6456e4f8f17SEtienne Carriere } 6466e4f8f17SEtienne Carriere 6476e4f8f17SEtienne Carriere session = TEE_Malloc(sizeof(*session), TEE_MALLOC_FILL_ZERO); 6486e4f8f17SEtienne Carriere if (!session) 6496e4f8f17SEtienne Carriere return PKCS11_CKR_DEVICE_MEMORY; 6506e4f8f17SEtienne Carriere 6516e4f8f17SEtienne Carriere session->handle = handle_get(&client->session_handle_db, session); 6526e4f8f17SEtienne Carriere if (!session->handle) { 6536e4f8f17SEtienne Carriere TEE_Free(session); 6546e4f8f17SEtienne Carriere return PKCS11_CKR_DEVICE_MEMORY; 6556e4f8f17SEtienne Carriere } 6566e4f8f17SEtienne Carriere 6576e4f8f17SEtienne Carriere session->token = token; 6586e4f8f17SEtienne Carriere session->client = client; 6596e4f8f17SEtienne Carriere 660b56b3d07SJens Wiklander LIST_INIT(&session->object_list); 661b56b3d07SJens Wiklander 6626e4f8f17SEtienne Carriere set_session_state(client, session, readonly); 6636e4f8f17SEtienne Carriere 6646e4f8f17SEtienne Carriere TAILQ_INSERT_HEAD(&client->session_list, session, link); 6656e4f8f17SEtienne Carriere 6666e4f8f17SEtienne Carriere session->token->session_count++; 6676e4f8f17SEtienne Carriere if (!readonly) 6686e4f8f17SEtienne Carriere session->token->rw_session_count++; 6696e4f8f17SEtienne Carriere 6706e4f8f17SEtienne Carriere TEE_MemMove(out->memref.buffer, &session->handle, 6716e4f8f17SEtienne Carriere sizeof(session->handle)); 6726e4f8f17SEtienne Carriere 6736e4f8f17SEtienne Carriere DMSG("Open PKCS11 session %"PRIu32, session->handle); 6746e4f8f17SEtienne Carriere 6756e4f8f17SEtienne Carriere return PKCS11_CKR_OK; 6766e4f8f17SEtienne Carriere } 6776e4f8f17SEtienne Carriere 6786e4f8f17SEtienne Carriere static void close_ck_session(struct pkcs11_session *session) 6796e4f8f17SEtienne Carriere { 68055e6965cSEtienne Carriere release_active_processing(session); 681bc555ee0SVesa Jääskeläinen release_session_find_obj_context(session); 68255e6965cSEtienne Carriere 683bc555ee0SVesa Jääskeläinen /* Release all session objects */ 684b56b3d07SJens Wiklander while (!LIST_EMPTY(&session->object_list)) 685b56b3d07SJens Wiklander destroy_object(session, 686b56b3d07SJens Wiklander LIST_FIRST(&session->object_list), true); 687b56b3d07SJens Wiklander 6886e4f8f17SEtienne Carriere TAILQ_REMOVE(&session->client->session_list, session, link); 6896e4f8f17SEtienne Carriere handle_put(&session->client->session_handle_db, session->handle); 6906e4f8f17SEtienne Carriere 6916e4f8f17SEtienne Carriere session->token->session_count--; 6926e4f8f17SEtienne Carriere if (pkcs11_session_is_read_write(session)) 6936e4f8f17SEtienne Carriere session->token->rw_session_count--; 6946e4f8f17SEtienne Carriere 6956e4f8f17SEtienne Carriere TEE_Free(session); 6966e4f8f17SEtienne Carriere 6976e4f8f17SEtienne Carriere DMSG("Close PKCS11 session %"PRIu32, session->handle); 6986e4f8f17SEtienne Carriere } 6996e4f8f17SEtienne Carriere 7004daf39b3SJens Wiklander enum pkcs11_rc entry_ck_close_session(struct pkcs11_client *client, 7016e4f8f17SEtienne Carriere uint32_t ptypes, TEE_Param *params) 7026e4f8f17SEtienne Carriere { 7036e4f8f17SEtienne Carriere const uint32_t exp_pt = TEE_PARAM_TYPES(TEE_PARAM_TYPE_MEMREF_INOUT, 7046e4f8f17SEtienne Carriere TEE_PARAM_TYPE_NONE, 7056e4f8f17SEtienne Carriere TEE_PARAM_TYPE_NONE, 7066e4f8f17SEtienne Carriere TEE_PARAM_TYPE_NONE); 70739b43b78SJens Wiklander TEE_Param *ctrl = params; 7084daf39b3SJens Wiklander enum pkcs11_rc rc = PKCS11_CKR_OK; 7096e4f8f17SEtienne Carriere struct serialargs ctrlargs = { }; 7106e4f8f17SEtienne Carriere struct pkcs11_session *session = NULL; 7116e4f8f17SEtienne Carriere 7126e4f8f17SEtienne Carriere if (!client || ptypes != exp_pt) 7136e4f8f17SEtienne Carriere return PKCS11_CKR_ARGUMENTS_BAD; 7146e4f8f17SEtienne Carriere 7156e4f8f17SEtienne Carriere serialargs_init(&ctrlargs, ctrl->memref.buffer, ctrl->memref.size); 7166e4f8f17SEtienne Carriere 7174daf39b3SJens Wiklander rc = serialargs_get_session_from_handle(&ctrlargs, client, &session); 7184daf39b3SJens Wiklander if (rc) 7194daf39b3SJens Wiklander return rc; 7206e4f8f17SEtienne Carriere 7216e4f8f17SEtienne Carriere if (serialargs_remaining_bytes(&ctrlargs)) 7226e4f8f17SEtienne Carriere return PKCS11_CKR_ARGUMENTS_BAD; 7236e4f8f17SEtienne Carriere 7246e4f8f17SEtienne Carriere close_ck_session(session); 7256e4f8f17SEtienne Carriere 7266e4f8f17SEtienne Carriere return PKCS11_CKR_OK; 7276e4f8f17SEtienne Carriere } 7286e4f8f17SEtienne Carriere 7294daf39b3SJens Wiklander enum pkcs11_rc entry_ck_close_all_sessions(struct pkcs11_client *client, 7306e4f8f17SEtienne Carriere uint32_t ptypes, TEE_Param *params) 7316e4f8f17SEtienne Carriere { 7326e4f8f17SEtienne Carriere const uint32_t exp_pt = TEE_PARAM_TYPES(TEE_PARAM_TYPE_MEMREF_INOUT, 7336e4f8f17SEtienne Carriere TEE_PARAM_TYPE_NONE, 7346e4f8f17SEtienne Carriere TEE_PARAM_TYPE_NONE, 7356e4f8f17SEtienne Carriere TEE_PARAM_TYPE_NONE); 73639b43b78SJens Wiklander TEE_Param *ctrl = params; 7374daf39b3SJens Wiklander enum pkcs11_rc rc = PKCS11_CKR_OK; 7386e4f8f17SEtienne Carriere struct serialargs ctrlargs = { }; 7396e4f8f17SEtienne Carriere uint32_t token_id = 0; 7406e4f8f17SEtienne Carriere struct ck_token *token = NULL; 7416e4f8f17SEtienne Carriere struct pkcs11_session *session = NULL; 7426e4f8f17SEtienne Carriere struct pkcs11_session *next = NULL; 7436e4f8f17SEtienne Carriere 7446e4f8f17SEtienne Carriere if (!client || ptypes != exp_pt) 7456e4f8f17SEtienne Carriere return PKCS11_CKR_ARGUMENTS_BAD; 7466e4f8f17SEtienne Carriere 7476e4f8f17SEtienne Carriere serialargs_init(&ctrlargs, ctrl->memref.buffer, ctrl->memref.size); 7486e4f8f17SEtienne Carriere 7494daf39b3SJens Wiklander rc = serialargs_get(&ctrlargs, &token_id, sizeof(uint32_t)); 7504daf39b3SJens Wiklander if (rc) 7514daf39b3SJens Wiklander return rc; 7526e4f8f17SEtienne Carriere 7536e4f8f17SEtienne Carriere if (serialargs_remaining_bytes(&ctrlargs)) 7546e4f8f17SEtienne Carriere return PKCS11_CKR_ARGUMENTS_BAD; 7556e4f8f17SEtienne Carriere 7566e4f8f17SEtienne Carriere token = get_token(token_id); 7576e4f8f17SEtienne Carriere if (!token) 7586e4f8f17SEtienne Carriere return PKCS11_CKR_SLOT_ID_INVALID; 7596e4f8f17SEtienne Carriere 7606e4f8f17SEtienne Carriere DMSG("Close all sessions for PKCS11 token %"PRIu32, token_id); 7616e4f8f17SEtienne Carriere 7626e4f8f17SEtienne Carriere TAILQ_FOREACH_SAFE(session, &client->session_list, link, next) 7636e4f8f17SEtienne Carriere if (session->token == token) 7646e4f8f17SEtienne Carriere close_ck_session(session); 7656e4f8f17SEtienne Carriere 7666e4f8f17SEtienne Carriere return PKCS11_CKR_OK; 7676e4f8f17SEtienne Carriere } 7686e4f8f17SEtienne Carriere 7694daf39b3SJens Wiklander enum pkcs11_rc entry_ck_session_info(struct pkcs11_client *client, 7706e4f8f17SEtienne Carriere uint32_t ptypes, TEE_Param *params) 7716e4f8f17SEtienne Carriere { 7726e4f8f17SEtienne Carriere const uint32_t exp_pt = TEE_PARAM_TYPES(TEE_PARAM_TYPE_MEMREF_INOUT, 7736e4f8f17SEtienne Carriere TEE_PARAM_TYPE_NONE, 7746e4f8f17SEtienne Carriere TEE_PARAM_TYPE_MEMREF_OUTPUT, 7756e4f8f17SEtienne Carriere TEE_PARAM_TYPE_NONE); 77639b43b78SJens Wiklander TEE_Param *ctrl = params; 77739b43b78SJens Wiklander TEE_Param *out = params + 2; 7784daf39b3SJens Wiklander enum pkcs11_rc rc = PKCS11_CKR_OK; 7796e4f8f17SEtienne Carriere struct serialargs ctrlargs = { }; 7806e4f8f17SEtienne Carriere struct pkcs11_session *session = NULL; 7816e4f8f17SEtienne Carriere struct pkcs11_session_info info = { 7826e4f8f17SEtienne Carriere .flags = PKCS11_CKFSS_SERIAL_SESSION, 7836e4f8f17SEtienne Carriere }; 7846e4f8f17SEtienne Carriere 7856e4f8f17SEtienne Carriere if (!client || ptypes != exp_pt || out->memref.size != sizeof(info)) 7866e4f8f17SEtienne Carriere return PKCS11_CKR_ARGUMENTS_BAD; 7876e4f8f17SEtienne Carriere 7886e4f8f17SEtienne Carriere serialargs_init(&ctrlargs, ctrl->memref.buffer, ctrl->memref.size); 7896e4f8f17SEtienne Carriere 7904daf39b3SJens Wiklander rc = serialargs_get_session_from_handle(&ctrlargs, client, &session); 7914daf39b3SJens Wiklander if (rc) 7924daf39b3SJens Wiklander return rc; 7936e4f8f17SEtienne Carriere 7946e4f8f17SEtienne Carriere if (serialargs_remaining_bytes(&ctrlargs)) 7956e4f8f17SEtienne Carriere return PKCS11_CKR_ARGUMENTS_BAD; 7966e4f8f17SEtienne Carriere 7976e4f8f17SEtienne Carriere info.slot_id = get_token_id(session->token); 7986e4f8f17SEtienne Carriere info.state = session->state; 7996e4f8f17SEtienne Carriere if (pkcs11_session_is_read_write(session)) 8006e4f8f17SEtienne Carriere info.flags |= PKCS11_CKFSS_RW_SESSION; 8016e4f8f17SEtienne Carriere 8026e4f8f17SEtienne Carriere TEE_MemMove(out->memref.buffer, &info, sizeof(info)); 8036e4f8f17SEtienne Carriere 8046e4f8f17SEtienne Carriere DMSG("Get find on PKCS11 session %"PRIu32, session->handle); 8056e4f8f17SEtienne Carriere 8066e4f8f17SEtienne Carriere return PKCS11_CKR_OK; 8076e4f8f17SEtienne Carriere } 808f485be04SJens Wiklander 8094daf39b3SJens Wiklander enum pkcs11_rc entry_ck_token_initialize(uint32_t ptypes, TEE_Param *params) 810f485be04SJens Wiklander { 811f485be04SJens Wiklander const uint32_t exp_pt = TEE_PARAM_TYPES(TEE_PARAM_TYPE_MEMREF_INOUT, 812f485be04SJens Wiklander TEE_PARAM_TYPE_NONE, 813f485be04SJens Wiklander TEE_PARAM_TYPE_NONE, 814f485be04SJens Wiklander TEE_PARAM_TYPE_NONE); 815f485be04SJens Wiklander char label[PKCS11_TOKEN_LABEL_SIZE] = { 0 }; 816f485be04SJens Wiklander struct pkcs11_client *client = NULL; 817f485be04SJens Wiklander struct pkcs11_session *sess = NULL; 818f485be04SJens Wiklander enum pkcs11_rc rc = PKCS11_CKR_OK; 819f485be04SJens Wiklander struct serialargs ctrlargs = { }; 820f485be04SJens Wiklander struct ck_token *token = NULL; 821f485be04SJens Wiklander TEE_Param *ctrl = params; 822f485be04SJens Wiklander uint32_t token_id = 0; 823f485be04SJens Wiklander uint32_t pin_size = 0; 824f485be04SJens Wiklander void *pin = NULL; 8257f12c782SRobin van der Gracht struct pkcs11_object *obj = NULL; 826f485be04SJens Wiklander 827f485be04SJens Wiklander if (ptypes != exp_pt) 828f485be04SJens Wiklander return PKCS11_CKR_ARGUMENTS_BAD; 829f485be04SJens Wiklander 830f485be04SJens Wiklander serialargs_init(&ctrlargs, ctrl->memref.buffer, ctrl->memref.size); 831f485be04SJens Wiklander 832f485be04SJens Wiklander rc = serialargs_get(&ctrlargs, &token_id, sizeof(uint32_t)); 833f485be04SJens Wiklander if (rc) 834f485be04SJens Wiklander return rc; 835f485be04SJens Wiklander 836f485be04SJens Wiklander rc = serialargs_get(&ctrlargs, &pin_size, sizeof(uint32_t)); 837f485be04SJens Wiklander if (rc) 838f485be04SJens Wiklander return rc; 839f485be04SJens Wiklander 840f485be04SJens Wiklander rc = serialargs_get(&ctrlargs, &label, PKCS11_TOKEN_LABEL_SIZE); 841f485be04SJens Wiklander if (rc) 842f485be04SJens Wiklander return rc; 843f485be04SJens Wiklander 844f485be04SJens Wiklander rc = serialargs_get_ptr(&ctrlargs, &pin, pin_size); 845f485be04SJens Wiklander if (rc) 846f485be04SJens Wiklander return rc; 847f485be04SJens Wiklander 848f485be04SJens Wiklander if (serialargs_remaining_bytes(&ctrlargs)) 849f485be04SJens Wiklander return PKCS11_CKR_ARGUMENTS_BAD; 850f485be04SJens Wiklander 851f485be04SJens Wiklander token = get_token(token_id); 852f485be04SJens Wiklander if (!token) 853f485be04SJens Wiklander return PKCS11_CKR_SLOT_ID_INVALID; 854f485be04SJens Wiklander 855f485be04SJens Wiklander if (token->db_main->flags & PKCS11_CKFT_SO_PIN_LOCKED) { 856f485be04SJens Wiklander IMSG("Token %"PRIu32": SO PIN locked", token_id); 857f485be04SJens Wiklander return PKCS11_CKR_PIN_LOCKED; 858f485be04SJens Wiklander } 859f485be04SJens Wiklander 860f485be04SJens Wiklander /* Check there's no open session on this token */ 861f485be04SJens Wiklander TAILQ_FOREACH(client, &pkcs11_client_list, link) 862f485be04SJens Wiklander TAILQ_FOREACH(sess, &client->session_list, link) 863f485be04SJens Wiklander if (sess->token == token) 864f485be04SJens Wiklander return PKCS11_CKR_SESSION_EXISTS; 865f485be04SJens Wiklander 8661a27b197SVesa Jääskeläinen #if defined(CFG_PKCS11_TA_AUTH_TEE_IDENTITY) 8671a27b197SVesa Jääskeläinen /* Check TEE Identity based authentication if enabled */ 8681a27b197SVesa Jääskeläinen if (token->db_main->flags & PKCS11_CKFT_PROTECTED_AUTHENTICATION_PATH) { 869f44a7a58SEtienne Carriere rc = verify_identity_auth(token, PKCS11_CKU_SO); 8701a27b197SVesa Jääskeläinen if (rc) 8711a27b197SVesa Jääskeläinen return rc; 8721a27b197SVesa Jääskeläinen } 8731a27b197SVesa Jääskeläinen 8741a27b197SVesa Jääskeläinen /* Detect TEE Identity based ACL usage activation with NULL PIN */ 8751a27b197SVesa Jääskeläinen if (!pin) { 8761a27b197SVesa Jääskeläinen rc = setup_so_identity_auth_from_client(token); 8771a27b197SVesa Jääskeläinen if (rc) 8781a27b197SVesa Jääskeläinen return rc; 8791a27b197SVesa Jääskeläinen 8801a27b197SVesa Jääskeläinen goto inited; 8811a27b197SVesa Jääskeläinen } else { 8821a27b197SVesa Jääskeläinen /* De-activate TEE Identity based authentication */ 8831a27b197SVesa Jääskeläinen token->db_main->flags &= 8841a27b197SVesa Jääskeläinen ~PKCS11_CKFT_PROTECTED_AUTHENTICATION_PATH; 8851a27b197SVesa Jääskeläinen } 8861a27b197SVesa Jääskeläinen #endif /* CFG_PKCS11_TA_AUTH_TEE_IDENTITY */ 8871a27b197SVesa Jääskeläinen 888f485be04SJens Wiklander if (!token->db_main->so_pin_salt) { 889f485be04SJens Wiklander /* 890f485be04SJens Wiklander * The spec doesn't permit returning 891f485be04SJens Wiklander * PKCS11_CKR_PIN_LEN_RANGE for this function, take another 892f485be04SJens Wiklander * error code. 893f485be04SJens Wiklander */ 894f485be04SJens Wiklander if (pin_size < PKCS11_TOKEN_PIN_SIZE_MIN || 895f485be04SJens Wiklander pin_size > PKCS11_TOKEN_PIN_SIZE_MAX) 896f485be04SJens Wiklander return PKCS11_CKR_ARGUMENTS_BAD; 897f485be04SJens Wiklander 898f485be04SJens Wiklander rc = hash_pin(PKCS11_CKU_SO, pin, pin_size, 899f485be04SJens Wiklander &token->db_main->so_pin_salt, 900f485be04SJens Wiklander token->db_main->so_pin_hash); 901f485be04SJens Wiklander if (rc) 902f485be04SJens Wiklander return rc; 903f485be04SJens Wiklander 904f485be04SJens Wiklander goto inited; 905f485be04SJens Wiklander } 906f485be04SJens Wiklander 907f485be04SJens Wiklander rc = verify_pin(PKCS11_CKU_SO, pin, pin_size, 908f485be04SJens Wiklander token->db_main->so_pin_salt, 909f485be04SJens Wiklander token->db_main->so_pin_hash); 910f485be04SJens Wiklander if (rc) { 911f485be04SJens Wiklander unsigned int pin_count = 0; 912f485be04SJens Wiklander 913f485be04SJens Wiklander if (rc != PKCS11_CKR_PIN_INCORRECT) 914f485be04SJens Wiklander return rc; 915f485be04SJens Wiklander 916f485be04SJens Wiklander token->db_main->flags |= PKCS11_CKFT_SO_PIN_COUNT_LOW; 917f485be04SJens Wiklander token->db_main->so_pin_count++; 918f485be04SJens Wiklander 919f485be04SJens Wiklander pin_count = token->db_main->so_pin_count; 920f485be04SJens Wiklander if (pin_count == PKCS11_TOKEN_SO_PIN_COUNT_MAX - 1) 921f485be04SJens Wiklander token->db_main->flags |= PKCS11_CKFT_SO_PIN_FINAL_TRY; 922f485be04SJens Wiklander if (pin_count == PKCS11_TOKEN_SO_PIN_COUNT_MAX) 923f485be04SJens Wiklander token->db_main->flags |= PKCS11_CKFT_SO_PIN_LOCKED; 924f485be04SJens Wiklander 925f485be04SJens Wiklander update_persistent_db(token); 926f485be04SJens Wiklander 927f485be04SJens Wiklander return PKCS11_CKR_PIN_INCORRECT; 928f485be04SJens Wiklander } 929f485be04SJens Wiklander 93012253e9eSVesa Jääskeläinen inited: 93112253e9eSVesa Jääskeläinen /* Make sure SO PIN counters are zeroed */ 932f485be04SJens Wiklander token->db_main->flags &= ~(PKCS11_CKFT_SO_PIN_COUNT_LOW | 93312253e9eSVesa Jääskeläinen PKCS11_CKFT_SO_PIN_FINAL_TRY | 93412253e9eSVesa Jääskeläinen PKCS11_CKFT_SO_PIN_LOCKED | 93512253e9eSVesa Jääskeläinen PKCS11_CKFT_SO_PIN_TO_BE_CHANGED); 936f485be04SJens Wiklander token->db_main->so_pin_count = 0; 937f485be04SJens Wiklander 938f485be04SJens Wiklander TEE_MemMove(token->db_main->label, label, PKCS11_TOKEN_LABEL_SIZE); 939f485be04SJens Wiklander token->db_main->flags |= PKCS11_CKFT_TOKEN_INITIALIZED; 940f485be04SJens Wiklander /* Reset user PIN */ 941f485be04SJens Wiklander token->db_main->user_pin_salt = 0; 942f485be04SJens Wiklander token->db_main->flags &= ~(PKCS11_CKFT_USER_PIN_INITIALIZED | 943f485be04SJens Wiklander PKCS11_CKFT_USER_PIN_COUNT_LOW | 944f485be04SJens Wiklander PKCS11_CKFT_USER_PIN_FINAL_TRY | 945f485be04SJens Wiklander PKCS11_CKFT_USER_PIN_LOCKED | 946f485be04SJens Wiklander PKCS11_CKFT_USER_PIN_TO_BE_CHANGED); 947f485be04SJens Wiklander 948f485be04SJens Wiklander update_persistent_db(token); 949f485be04SJens Wiklander 9507f12c782SRobin van der Gracht /* Remove all persistent objects */ 9517f12c782SRobin van der Gracht while (!LIST_EMPTY(&token->object_list)) { 9527f12c782SRobin van der Gracht obj = LIST_FIRST(&token->object_list); 9537f12c782SRobin van der Gracht 9547f12c782SRobin van der Gracht /* Try twice otherwise panic! */ 9557f12c782SRobin van der Gracht if (unregister_persistent_object(token, obj->uuid) && 9567f12c782SRobin van der Gracht unregister_persistent_object(token, obj->uuid)) 9577f12c782SRobin van der Gracht TEE_Panic(0); 9587f12c782SRobin van der Gracht 9597f12c782SRobin van der Gracht cleanup_persistent_object(obj, token); 9607f12c782SRobin van der Gracht } 9617f12c782SRobin van der Gracht 962f485be04SJens Wiklander IMSG("PKCS11 token %"PRIu32": initialized", token_id); 963f485be04SJens Wiklander 964f485be04SJens Wiklander return PKCS11_CKR_OK; 965f485be04SJens Wiklander } 966e8dbd92cSJens Wiklander 967e8dbd92cSJens Wiklander static enum pkcs11_rc set_pin(struct pkcs11_session *session, 968e8dbd92cSJens Wiklander uint8_t *new_pin, size_t new_pin_size, 969e8dbd92cSJens Wiklander enum pkcs11_user_type user_type) 970e8dbd92cSJens Wiklander { 9711e497011SVesa Jääskeläinen struct ck_token *token = session->token; 972e8dbd92cSJens Wiklander enum pkcs11_rc rc = PKCS11_CKR_OK; 973e8dbd92cSJens Wiklander uint32_t flags_clear = 0; 974e8dbd92cSJens Wiklander uint32_t flags_set = 0; 975e8dbd92cSJens Wiklander 9761e497011SVesa Jääskeläinen if (token->db_main->flags & PKCS11_CKFT_WRITE_PROTECTED) 977e8dbd92cSJens Wiklander return PKCS11_CKR_TOKEN_WRITE_PROTECTED; 978e8dbd92cSJens Wiklander 979e8dbd92cSJens Wiklander if (!pkcs11_session_is_read_write(session)) 980e8dbd92cSJens Wiklander return PKCS11_CKR_SESSION_READ_ONLY; 981e8dbd92cSJens Wiklander 9821a27b197SVesa Jääskeläinen if (IS_ENABLED(CFG_PKCS11_TA_AUTH_TEE_IDENTITY) && 9831a27b197SVesa Jääskeläinen token->db_main->flags & PKCS11_CKFT_PROTECTED_AUTHENTICATION_PATH) { 9841a27b197SVesa Jääskeläinen rc = setup_identity_auth_from_pin(token, user_type, new_pin, 9851a27b197SVesa Jääskeläinen new_pin_size); 9861a27b197SVesa Jääskeläinen if (rc) 9871a27b197SVesa Jääskeläinen return rc; 9881a27b197SVesa Jääskeläinen 9891a27b197SVesa Jääskeläinen goto update_db; 9901a27b197SVesa Jääskeläinen } 9911a27b197SVesa Jääskeläinen 992e8dbd92cSJens Wiklander if (new_pin_size < PKCS11_TOKEN_PIN_SIZE_MIN || 993e8dbd92cSJens Wiklander new_pin_size > PKCS11_TOKEN_PIN_SIZE_MAX) 994e8dbd92cSJens Wiklander return PKCS11_CKR_PIN_LEN_RANGE; 995e8dbd92cSJens Wiklander 996e8dbd92cSJens Wiklander switch (user_type) { 997e8dbd92cSJens Wiklander case PKCS11_CKU_SO: 998e8dbd92cSJens Wiklander rc = hash_pin(user_type, new_pin, new_pin_size, 9991e497011SVesa Jääskeläinen &token->db_main->so_pin_salt, 10001e497011SVesa Jääskeläinen token->db_main->so_pin_hash); 1001e8dbd92cSJens Wiklander if (rc) 1002e8dbd92cSJens Wiklander return rc; 10031e497011SVesa Jääskeläinen token->db_main->so_pin_count = 0; 1004e8dbd92cSJens Wiklander flags_clear = PKCS11_CKFT_SO_PIN_COUNT_LOW | 1005e8dbd92cSJens Wiklander PKCS11_CKFT_SO_PIN_FINAL_TRY | 1006e8dbd92cSJens Wiklander PKCS11_CKFT_SO_PIN_LOCKED | 1007e8dbd92cSJens Wiklander PKCS11_CKFT_SO_PIN_TO_BE_CHANGED; 1008e8dbd92cSJens Wiklander break; 1009e8dbd92cSJens Wiklander case PKCS11_CKU_USER: 1010e8dbd92cSJens Wiklander rc = hash_pin(user_type, new_pin, new_pin_size, 10111e497011SVesa Jääskeläinen &token->db_main->user_pin_salt, 10121e497011SVesa Jääskeläinen token->db_main->user_pin_hash); 1013e8dbd92cSJens Wiklander if (rc) 1014e8dbd92cSJens Wiklander return rc; 10151e497011SVesa Jääskeläinen token->db_main->user_pin_count = 0; 1016e8dbd92cSJens Wiklander flags_clear = PKCS11_CKFT_USER_PIN_COUNT_LOW | 1017e8dbd92cSJens Wiklander PKCS11_CKFT_USER_PIN_FINAL_TRY | 1018e8dbd92cSJens Wiklander PKCS11_CKFT_USER_PIN_LOCKED | 1019e8dbd92cSJens Wiklander PKCS11_CKFT_USER_PIN_TO_BE_CHANGED; 1020e8dbd92cSJens Wiklander flags_set = PKCS11_CKFT_USER_PIN_INITIALIZED; 1021e8dbd92cSJens Wiklander break; 1022e8dbd92cSJens Wiklander default: 1023e8dbd92cSJens Wiklander return PKCS11_CKR_FUNCTION_FAILED; 1024e8dbd92cSJens Wiklander } 1025e8dbd92cSJens Wiklander 10261a27b197SVesa Jääskeläinen update_db: 10271e497011SVesa Jääskeläinen token->db_main->flags &= ~flags_clear; 10281e497011SVesa Jääskeläinen token->db_main->flags |= flags_set; 1029e8dbd92cSJens Wiklander 10301e497011SVesa Jääskeläinen update_persistent_db(token); 1031e8dbd92cSJens Wiklander 1032e8dbd92cSJens Wiklander return PKCS11_CKR_OK; 1033e8dbd92cSJens Wiklander } 1034e8dbd92cSJens Wiklander 10354daf39b3SJens Wiklander enum pkcs11_rc entry_ck_init_pin(struct pkcs11_client *client, 1036e8dbd92cSJens Wiklander uint32_t ptypes, TEE_Param *params) 1037e8dbd92cSJens Wiklander { 1038e8dbd92cSJens Wiklander const uint32_t exp_pt = TEE_PARAM_TYPES(TEE_PARAM_TYPE_MEMREF_INOUT, 1039e8dbd92cSJens Wiklander TEE_PARAM_TYPE_NONE, 1040e8dbd92cSJens Wiklander TEE_PARAM_TYPE_NONE, 1041e8dbd92cSJens Wiklander TEE_PARAM_TYPE_NONE); 1042e8dbd92cSJens Wiklander struct pkcs11_session *session = NULL; 1043e8dbd92cSJens Wiklander enum pkcs11_rc rc = PKCS11_CKR_OK; 1044e8dbd92cSJens Wiklander struct serialargs ctrlargs = { }; 1045e8dbd92cSJens Wiklander TEE_Param *ctrl = params; 1046e8dbd92cSJens Wiklander uint32_t pin_size = 0; 1047e8dbd92cSJens Wiklander void *pin = NULL; 1048e8dbd92cSJens Wiklander 1049e8dbd92cSJens Wiklander if (!client || ptypes != exp_pt) 1050e8dbd92cSJens Wiklander return PKCS11_CKR_ARGUMENTS_BAD; 1051e8dbd92cSJens Wiklander 1052e8dbd92cSJens Wiklander serialargs_init(&ctrlargs, ctrl->memref.buffer, ctrl->memref.size); 1053e8dbd92cSJens Wiklander 1054f40f331fSEtienne Carriere rc = serialargs_get_session_from_handle(&ctrlargs, client, &session); 1055e8dbd92cSJens Wiklander if (rc) 1056e8dbd92cSJens Wiklander return rc; 1057e8dbd92cSJens Wiklander 1058e8dbd92cSJens Wiklander rc = serialargs_get(&ctrlargs, &pin_size, sizeof(uint32_t)); 1059e8dbd92cSJens Wiklander if (rc) 1060e8dbd92cSJens Wiklander return rc; 1061e8dbd92cSJens Wiklander 1062e8dbd92cSJens Wiklander rc = serialargs_get_ptr(&ctrlargs, &pin, pin_size); 1063e8dbd92cSJens Wiklander if (rc) 1064e8dbd92cSJens Wiklander return rc; 1065e8dbd92cSJens Wiklander 1066e8dbd92cSJens Wiklander if (serialargs_remaining_bytes(&ctrlargs)) 1067e8dbd92cSJens Wiklander return PKCS11_CKR_ARGUMENTS_BAD; 1068e8dbd92cSJens Wiklander 1069e8dbd92cSJens Wiklander if (!pkcs11_session_is_so(session)) 1070e8dbd92cSJens Wiklander return PKCS11_CKR_USER_NOT_LOGGED_IN; 1071e8dbd92cSJens Wiklander 1072e8dbd92cSJens Wiklander assert(session->token->db_main->flags & PKCS11_CKFT_TOKEN_INITIALIZED); 1073e8dbd92cSJens Wiklander 1074f40f331fSEtienne Carriere IMSG("PKCS11 session %"PRIu32": init PIN", session->handle); 1075e8dbd92cSJens Wiklander 1076e8dbd92cSJens Wiklander return set_pin(session, pin, pin_size, PKCS11_CKU_USER); 1077e8dbd92cSJens Wiklander } 10781dbb91e7SJens Wiklander 10794daf39b3SJens Wiklander static enum pkcs11_rc check_so_pin(struct pkcs11_session *session, 10801dbb91e7SJens Wiklander uint8_t *pin, size_t pin_size) 10811dbb91e7SJens Wiklander { 10821dbb91e7SJens Wiklander struct ck_token *token = session->token; 10831dbb91e7SJens Wiklander enum pkcs11_rc rc = PKCS11_CKR_OK; 10841dbb91e7SJens Wiklander 10851dbb91e7SJens Wiklander assert(token->db_main->flags & PKCS11_CKFT_TOKEN_INITIALIZED); 10861dbb91e7SJens Wiklander 10871a27b197SVesa Jääskeläinen if (IS_ENABLED(CFG_PKCS11_TA_AUTH_TEE_IDENTITY) && 10881a27b197SVesa Jääskeläinen token->db_main->flags & PKCS11_CKFT_PROTECTED_AUTHENTICATION_PATH) 10891a27b197SVesa Jääskeläinen return verify_identity_auth(token, PKCS11_CKU_SO); 10901a27b197SVesa Jääskeläinen 10911dbb91e7SJens Wiklander if (token->db_main->flags & PKCS11_CKFT_SO_PIN_LOCKED) 10921dbb91e7SJens Wiklander return PKCS11_CKR_PIN_LOCKED; 10931dbb91e7SJens Wiklander 10941dbb91e7SJens Wiklander rc = verify_pin(PKCS11_CKU_SO, pin, pin_size, 10951dbb91e7SJens Wiklander token->db_main->so_pin_salt, 10961dbb91e7SJens Wiklander token->db_main->so_pin_hash); 10971dbb91e7SJens Wiklander if (rc) { 10981dbb91e7SJens Wiklander unsigned int pin_count = 0; 10991dbb91e7SJens Wiklander 11001dbb91e7SJens Wiklander if (rc != PKCS11_CKR_PIN_INCORRECT) 11011dbb91e7SJens Wiklander return rc; 11021dbb91e7SJens Wiklander 11031dbb91e7SJens Wiklander token->db_main->flags |= PKCS11_CKFT_SO_PIN_COUNT_LOW; 11041dbb91e7SJens Wiklander token->db_main->so_pin_count++; 11051dbb91e7SJens Wiklander 11061dbb91e7SJens Wiklander pin_count = token->db_main->so_pin_count; 11071dbb91e7SJens Wiklander if (pin_count == PKCS11_TOKEN_SO_PIN_COUNT_MAX - 1) 11081dbb91e7SJens Wiklander token->db_main->flags |= PKCS11_CKFT_SO_PIN_FINAL_TRY; 11091dbb91e7SJens Wiklander if (pin_count == PKCS11_TOKEN_SO_PIN_COUNT_MAX) 11101dbb91e7SJens Wiklander token->db_main->flags |= PKCS11_CKFT_SO_PIN_LOCKED; 11111dbb91e7SJens Wiklander 11121dbb91e7SJens Wiklander update_persistent_db(token); 11131dbb91e7SJens Wiklander 11141dbb91e7SJens Wiklander if (token->db_main->flags & PKCS11_CKFT_SO_PIN_LOCKED) 11151dbb91e7SJens Wiklander return PKCS11_CKR_PIN_LOCKED; 11161dbb91e7SJens Wiklander 11171dbb91e7SJens Wiklander return PKCS11_CKR_PIN_INCORRECT; 11181dbb91e7SJens Wiklander } 11191dbb91e7SJens Wiklander 11201dbb91e7SJens Wiklander if (token->db_main->so_pin_count) { 11211dbb91e7SJens Wiklander token->db_main->so_pin_count = 0; 11221dbb91e7SJens Wiklander 11231dbb91e7SJens Wiklander update_persistent_db(token); 11241dbb91e7SJens Wiklander } 11251dbb91e7SJens Wiklander 11261dbb91e7SJens Wiklander if (token->db_main->flags & (PKCS11_CKFT_SO_PIN_COUNT_LOW | 11271dbb91e7SJens Wiklander PKCS11_CKFT_SO_PIN_FINAL_TRY)) { 11281dbb91e7SJens Wiklander token->db_main->flags &= ~(PKCS11_CKFT_SO_PIN_COUNT_LOW | 11291dbb91e7SJens Wiklander PKCS11_CKFT_SO_PIN_FINAL_TRY); 11301dbb91e7SJens Wiklander 11311dbb91e7SJens Wiklander update_persistent_db(token); 11321dbb91e7SJens Wiklander } 11331dbb91e7SJens Wiklander 11341dbb91e7SJens Wiklander return PKCS11_CKR_OK; 11351dbb91e7SJens Wiklander } 11361dbb91e7SJens Wiklander 11374daf39b3SJens Wiklander static enum pkcs11_rc check_user_pin(struct pkcs11_session *session, 11381dbb91e7SJens Wiklander uint8_t *pin, size_t pin_size) 11391dbb91e7SJens Wiklander { 11401dbb91e7SJens Wiklander struct ck_token *token = session->token; 11411dbb91e7SJens Wiklander enum pkcs11_rc rc = PKCS11_CKR_OK; 11421dbb91e7SJens Wiklander 11431a27b197SVesa Jääskeläinen if (IS_ENABLED(CFG_PKCS11_TA_AUTH_TEE_IDENTITY) && 11441a27b197SVesa Jääskeläinen token->db_main->flags & PKCS11_CKFT_PROTECTED_AUTHENTICATION_PATH) 11451a27b197SVesa Jääskeläinen return verify_identity_auth(token, PKCS11_CKU_USER); 11461a27b197SVesa Jääskeläinen 11471dbb91e7SJens Wiklander if (!token->db_main->user_pin_salt) 11481dbb91e7SJens Wiklander return PKCS11_CKR_USER_PIN_NOT_INITIALIZED; 11491dbb91e7SJens Wiklander 11501dbb91e7SJens Wiklander if (token->db_main->flags & PKCS11_CKFT_USER_PIN_LOCKED) 11511dbb91e7SJens Wiklander return PKCS11_CKR_PIN_LOCKED; 11521dbb91e7SJens Wiklander 11531dbb91e7SJens Wiklander rc = verify_pin(PKCS11_CKU_USER, pin, pin_size, 11541dbb91e7SJens Wiklander token->db_main->user_pin_salt, 11551dbb91e7SJens Wiklander token->db_main->user_pin_hash); 11561dbb91e7SJens Wiklander if (rc) { 11571dbb91e7SJens Wiklander unsigned int pin_count = 0; 11581dbb91e7SJens Wiklander 11591dbb91e7SJens Wiklander if (rc != PKCS11_CKR_PIN_INCORRECT) 11601dbb91e7SJens Wiklander return rc; 11611dbb91e7SJens Wiklander 11621dbb91e7SJens Wiklander token->db_main->flags |= PKCS11_CKFT_USER_PIN_COUNT_LOW; 11631dbb91e7SJens Wiklander token->db_main->user_pin_count++; 11641dbb91e7SJens Wiklander 11651dbb91e7SJens Wiklander pin_count = token->db_main->user_pin_count; 11661dbb91e7SJens Wiklander if (pin_count == PKCS11_TOKEN_USER_PIN_COUNT_MAX - 1) 11671dbb91e7SJens Wiklander token->db_main->flags |= PKCS11_CKFT_USER_PIN_FINAL_TRY; 11681dbb91e7SJens Wiklander if (pin_count == PKCS11_TOKEN_USER_PIN_COUNT_MAX) 11691dbb91e7SJens Wiklander token->db_main->flags |= PKCS11_CKFT_USER_PIN_LOCKED; 11701dbb91e7SJens Wiklander 11711dbb91e7SJens Wiklander update_persistent_db(token); 11721dbb91e7SJens Wiklander 11731dbb91e7SJens Wiklander if (token->db_main->flags & PKCS11_CKFT_USER_PIN_LOCKED) 11741dbb91e7SJens Wiklander return PKCS11_CKR_PIN_LOCKED; 11751dbb91e7SJens Wiklander 11761dbb91e7SJens Wiklander return PKCS11_CKR_PIN_INCORRECT; 11771dbb91e7SJens Wiklander } 11781dbb91e7SJens Wiklander 11791dbb91e7SJens Wiklander if (token->db_main->user_pin_count) { 11801dbb91e7SJens Wiklander token->db_main->user_pin_count = 0; 11811dbb91e7SJens Wiklander 11821dbb91e7SJens Wiklander update_persistent_db(token); 11831dbb91e7SJens Wiklander } 11841dbb91e7SJens Wiklander 11851dbb91e7SJens Wiklander if (token->db_main->flags & (PKCS11_CKFT_USER_PIN_COUNT_LOW | 11861dbb91e7SJens Wiklander PKCS11_CKFT_USER_PIN_FINAL_TRY)) { 11871dbb91e7SJens Wiklander token->db_main->flags &= ~(PKCS11_CKFT_USER_PIN_COUNT_LOW | 11881dbb91e7SJens Wiklander PKCS11_CKFT_USER_PIN_FINAL_TRY); 11891dbb91e7SJens Wiklander 11901dbb91e7SJens Wiklander update_persistent_db(token); 11911dbb91e7SJens Wiklander } 11921dbb91e7SJens Wiklander 11931dbb91e7SJens Wiklander return PKCS11_CKR_OK; 11941dbb91e7SJens Wiklander } 11951dbb91e7SJens Wiklander 11964daf39b3SJens Wiklander enum pkcs11_rc entry_ck_set_pin(struct pkcs11_client *client, 11971dbb91e7SJens Wiklander uint32_t ptypes, TEE_Param *params) 11981dbb91e7SJens Wiklander { 11991dbb91e7SJens Wiklander const uint32_t exp_pt = TEE_PARAM_TYPES(TEE_PARAM_TYPE_MEMREF_INOUT, 12001dbb91e7SJens Wiklander TEE_PARAM_TYPE_NONE, 12011dbb91e7SJens Wiklander TEE_PARAM_TYPE_NONE, 12021dbb91e7SJens Wiklander TEE_PARAM_TYPE_NONE); 12031dbb91e7SJens Wiklander struct pkcs11_session *session = NULL; 12041dbb91e7SJens Wiklander enum pkcs11_rc rc = PKCS11_CKR_OK; 12051dbb91e7SJens Wiklander struct serialargs ctrlargs = { }; 12061dbb91e7SJens Wiklander uint32_t old_pin_size = 0; 12071dbb91e7SJens Wiklander TEE_Param *ctrl = params; 12081dbb91e7SJens Wiklander uint32_t pin_size = 0; 12091dbb91e7SJens Wiklander void *old_pin = NULL; 12101dbb91e7SJens Wiklander void *pin = NULL; 12111dbb91e7SJens Wiklander 12121dbb91e7SJens Wiklander if (!client || ptypes != exp_pt) 12131dbb91e7SJens Wiklander return PKCS11_CKR_ARGUMENTS_BAD; 12141dbb91e7SJens Wiklander 12151dbb91e7SJens Wiklander serialargs_init(&ctrlargs, ctrl->memref.buffer, ctrl->memref.size); 12161dbb91e7SJens Wiklander 1217f40f331fSEtienne Carriere rc = serialargs_get_session_from_handle(&ctrlargs, client, &session); 12181dbb91e7SJens Wiklander if (rc) 12191dbb91e7SJens Wiklander return rc; 12201dbb91e7SJens Wiklander 12211dbb91e7SJens Wiklander rc = serialargs_get(&ctrlargs, &old_pin_size, sizeof(uint32_t)); 12221dbb91e7SJens Wiklander if (rc) 12231dbb91e7SJens Wiklander return rc; 12241dbb91e7SJens Wiklander 12251dbb91e7SJens Wiklander rc = serialargs_get(&ctrlargs, &pin_size, sizeof(uint32_t)); 12261dbb91e7SJens Wiklander if (rc) 12271dbb91e7SJens Wiklander return rc; 12281dbb91e7SJens Wiklander 12291dbb91e7SJens Wiklander rc = serialargs_get_ptr(&ctrlargs, &old_pin, old_pin_size); 12301dbb91e7SJens Wiklander if (rc) 12311dbb91e7SJens Wiklander return rc; 12321dbb91e7SJens Wiklander 12331dbb91e7SJens Wiklander rc = serialargs_get_ptr(&ctrlargs, &pin, pin_size); 12341dbb91e7SJens Wiklander if (rc) 12351dbb91e7SJens Wiklander return rc; 12361dbb91e7SJens Wiklander 12371dbb91e7SJens Wiklander if (serialargs_remaining_bytes(&ctrlargs)) 12381dbb91e7SJens Wiklander return PKCS11_CKR_ARGUMENTS_BAD; 12391dbb91e7SJens Wiklander 12401dbb91e7SJens Wiklander if (!pkcs11_session_is_read_write(session)) 12411dbb91e7SJens Wiklander return PKCS11_CKR_SESSION_READ_ONLY; 12421dbb91e7SJens Wiklander 12431dbb91e7SJens Wiklander if (pkcs11_session_is_so(session)) { 12441dbb91e7SJens Wiklander if (!(session->token->db_main->flags & 12451dbb91e7SJens Wiklander PKCS11_CKFT_TOKEN_INITIALIZED)) 12461dbb91e7SJens Wiklander return PKCS11_CKR_GENERAL_ERROR; 12471dbb91e7SJens Wiklander 12481dbb91e7SJens Wiklander rc = check_so_pin(session, old_pin, old_pin_size); 12491dbb91e7SJens Wiklander if (rc) 12501dbb91e7SJens Wiklander return rc; 12511dbb91e7SJens Wiklander 1252f40f331fSEtienne Carriere IMSG("PKCS11 session %"PRIu32": set PIN", session->handle); 12531dbb91e7SJens Wiklander 12541dbb91e7SJens Wiklander return set_pin(session, pin, pin_size, PKCS11_CKU_SO); 12551dbb91e7SJens Wiklander } 12561dbb91e7SJens Wiklander 12571dbb91e7SJens Wiklander if (!(session->token->db_main->flags & 12581dbb91e7SJens Wiklander PKCS11_CKFT_USER_PIN_INITIALIZED)) 12591dbb91e7SJens Wiklander return PKCS11_CKR_GENERAL_ERROR; 12601dbb91e7SJens Wiklander 12611dbb91e7SJens Wiklander rc = check_user_pin(session, old_pin, old_pin_size); 12621dbb91e7SJens Wiklander if (rc) 12631dbb91e7SJens Wiklander return rc; 12641dbb91e7SJens Wiklander 1265f40f331fSEtienne Carriere IMSG("PKCS11 session %"PRIu32": set PIN", session->handle); 12661dbb91e7SJens Wiklander 12671dbb91e7SJens Wiklander return set_pin(session, pin, pin_size, PKCS11_CKU_USER); 12681dbb91e7SJens Wiklander } 1269f7cc36c0SJens Wiklander 1270f7cc36c0SJens Wiklander static void session_login_user(struct pkcs11_session *session) 1271f7cc36c0SJens Wiklander { 1272f7cc36c0SJens Wiklander struct pkcs11_client *client = session->client; 1273f7cc36c0SJens Wiklander struct pkcs11_session *sess = NULL; 1274f7cc36c0SJens Wiklander 1275f7cc36c0SJens Wiklander TAILQ_FOREACH(sess, &client->session_list, link) { 1276f7cc36c0SJens Wiklander if (sess->token != session->token) 1277f7cc36c0SJens Wiklander continue; 1278f7cc36c0SJens Wiklander 1279f7cc36c0SJens Wiklander if (pkcs11_session_is_read_write(sess)) 1280f7cc36c0SJens Wiklander sess->state = PKCS11_CKS_RW_USER_FUNCTIONS; 1281f7cc36c0SJens Wiklander else 1282f7cc36c0SJens Wiklander sess->state = PKCS11_CKS_RO_USER_FUNCTIONS; 1283f7cc36c0SJens Wiklander } 1284f7cc36c0SJens Wiklander } 1285f7cc36c0SJens Wiklander 1286f7cc36c0SJens Wiklander static void session_login_so(struct pkcs11_session *session) 1287f7cc36c0SJens Wiklander { 1288f7cc36c0SJens Wiklander struct pkcs11_client *client = session->client; 1289f7cc36c0SJens Wiklander struct pkcs11_session *sess = NULL; 1290f7cc36c0SJens Wiklander 1291f7cc36c0SJens Wiklander TAILQ_FOREACH(sess, &client->session_list, link) { 1292f7cc36c0SJens Wiklander if (sess->token != session->token) 1293f7cc36c0SJens Wiklander continue; 1294f7cc36c0SJens Wiklander 1295f7cc36c0SJens Wiklander if (pkcs11_session_is_read_write(sess)) 1296f7cc36c0SJens Wiklander sess->state = PKCS11_CKS_RW_SO_FUNCTIONS; 1297f7cc36c0SJens Wiklander else 1298f7cc36c0SJens Wiklander TEE_Panic(0); 1299f7cc36c0SJens Wiklander } 1300f7cc36c0SJens Wiklander } 1301f7cc36c0SJens Wiklander 1302f7cc36c0SJens Wiklander static void session_logout(struct pkcs11_session *session) 1303f7cc36c0SJens Wiklander { 1304f7cc36c0SJens Wiklander struct pkcs11_client *client = session->client; 1305f7cc36c0SJens Wiklander struct pkcs11_session *sess = NULL; 1306f7cc36c0SJens Wiklander 1307f7cc36c0SJens Wiklander TAILQ_FOREACH(sess, &client->session_list, link) { 130889735787SRuchika Gupta struct pkcs11_object *obj = NULL; 13093bf0e097SRuchika Gupta struct pkcs11_object *tobj = NULL; 131089735787SRuchika Gupta uint32_t handle = 0; 131189735787SRuchika Gupta 1312f7cc36c0SJens Wiklander if (sess->token != session->token) 1313f7cc36c0SJens Wiklander continue; 1314f7cc36c0SJens Wiklander 131589735787SRuchika Gupta release_active_processing(session); 131689735787SRuchika Gupta 131789735787SRuchika Gupta /* Destroy private session objects */ 13183bf0e097SRuchika Gupta LIST_FOREACH_SAFE(obj, &sess->object_list, link, tobj) { 131989735787SRuchika Gupta if (object_is_private(obj->attributes)) 132089735787SRuchika Gupta destroy_object(sess, obj, true); 132189735787SRuchika Gupta } 132289735787SRuchika Gupta 132389735787SRuchika Gupta /* 132489735787SRuchika Gupta * Remove handle of token private objects from 132589735787SRuchika Gupta * sessions object_handle_db 132689735787SRuchika Gupta */ 132789735787SRuchika Gupta LIST_FOREACH(obj, &session->token->object_list, link) { 132889735787SRuchika Gupta handle = pkcs11_object2handle(obj, session); 132989735787SRuchika Gupta 133089735787SRuchika Gupta if (handle && object_is_private(obj->attributes)) 1331bc555ee0SVesa Jääskeläinen handle_put(get_object_handle_db(sess), handle); 133289735787SRuchika Gupta } 133389735787SRuchika Gupta 133489735787SRuchika Gupta release_session_find_obj_context(session); 133589735787SRuchika Gupta 1336f7cc36c0SJens Wiklander if (pkcs11_session_is_read_write(sess)) 1337f7cc36c0SJens Wiklander sess->state = PKCS11_CKS_RW_PUBLIC_SESSION; 1338f7cc36c0SJens Wiklander else 1339f7cc36c0SJens Wiklander sess->state = PKCS11_CKS_RO_PUBLIC_SESSION; 1340f7cc36c0SJens Wiklander } 1341f7cc36c0SJens Wiklander } 1342f7cc36c0SJens Wiklander 13434daf39b3SJens Wiklander enum pkcs11_rc entry_ck_login(struct pkcs11_client *client, 1344f7cc36c0SJens Wiklander uint32_t ptypes, TEE_Param *params) 1345f7cc36c0SJens Wiklander { 1346f7cc36c0SJens Wiklander const uint32_t exp_pt = TEE_PARAM_TYPES(TEE_PARAM_TYPE_MEMREF_INOUT, 1347f7cc36c0SJens Wiklander TEE_PARAM_TYPE_NONE, 1348f7cc36c0SJens Wiklander TEE_PARAM_TYPE_NONE, 1349f7cc36c0SJens Wiklander TEE_PARAM_TYPE_NONE); 1350f7cc36c0SJens Wiklander struct pkcs11_session *session = NULL; 1351f7cc36c0SJens Wiklander struct pkcs11_session *sess = NULL; 1352f7cc36c0SJens Wiklander enum pkcs11_rc rc = PKCS11_CKR_OK; 1353f7cc36c0SJens Wiklander struct serialargs ctrlargs = { }; 1354f7cc36c0SJens Wiklander TEE_Param *ctrl = params; 1355f7cc36c0SJens Wiklander uint32_t user_type = 0; 1356f7cc36c0SJens Wiklander uint32_t pin_size = 0; 1357f7cc36c0SJens Wiklander void *pin = NULL; 1358f7cc36c0SJens Wiklander 1359f7cc36c0SJens Wiklander if (!client || ptypes != exp_pt) 1360f7cc36c0SJens Wiklander return PKCS11_CKR_ARGUMENTS_BAD; 1361f7cc36c0SJens Wiklander 1362f7cc36c0SJens Wiklander serialargs_init(&ctrlargs, ctrl->memref.buffer, ctrl->memref.size); 1363f7cc36c0SJens Wiklander 1364f40f331fSEtienne Carriere rc = serialargs_get_session_from_handle(&ctrlargs, client, &session); 1365f7cc36c0SJens Wiklander if (rc) 1366f7cc36c0SJens Wiklander return rc; 1367f7cc36c0SJens Wiklander 1368f7cc36c0SJens Wiklander rc = serialargs_get(&ctrlargs, &user_type, sizeof(uint32_t)); 1369f7cc36c0SJens Wiklander if (rc) 1370f7cc36c0SJens Wiklander return rc; 1371f7cc36c0SJens Wiklander 1372f7cc36c0SJens Wiklander rc = serialargs_get(&ctrlargs, &pin_size, sizeof(uint32_t)); 1373f7cc36c0SJens Wiklander if (rc) 1374f7cc36c0SJens Wiklander return rc; 1375f7cc36c0SJens Wiklander 1376f7cc36c0SJens Wiklander rc = serialargs_get_ptr(&ctrlargs, &pin, pin_size); 1377f7cc36c0SJens Wiklander if (rc) 1378f7cc36c0SJens Wiklander return rc; 1379f7cc36c0SJens Wiklander 1380f7cc36c0SJens Wiklander if (serialargs_remaining_bytes(&ctrlargs)) 1381f7cc36c0SJens Wiklander return PKCS11_CKR_ARGUMENTS_BAD; 1382f7cc36c0SJens Wiklander 1383f7cc36c0SJens Wiklander switch (user_type) { 1384f7cc36c0SJens Wiklander case PKCS11_CKU_SO: 1385f7cc36c0SJens Wiklander if (pkcs11_session_is_so(session)) 1386f7cc36c0SJens Wiklander return PKCS11_CKR_USER_ALREADY_LOGGED_IN; 1387f7cc36c0SJens Wiklander 1388f7cc36c0SJens Wiklander if (pkcs11_session_is_user(session)) 1389f7cc36c0SJens Wiklander return PKCS11_CKR_USER_ANOTHER_ALREADY_LOGGED_IN; 1390f7cc36c0SJens Wiklander 1391f7cc36c0SJens Wiklander TAILQ_FOREACH(sess, &client->session_list, link) 1392f7cc36c0SJens Wiklander if (sess->token == session->token && 1393f7cc36c0SJens Wiklander !pkcs11_session_is_read_write(sess)) 1394f7cc36c0SJens Wiklander return PKCS11_CKR_SESSION_READ_ONLY_EXISTS; 1395f7cc36c0SJens Wiklander 1396f7cc36c0SJens Wiklander /* 1397f7cc36c0SJens Wiklander * This is the point where we could check if another client 1398f7cc36c0SJens Wiklander * has another user or SO logged in. 1399f7cc36c0SJens Wiklander * 1400f7cc36c0SJens Wiklander * The spec says: 1401f7cc36c0SJens Wiklander * CKR_USER_TOO_MANY_TYPES: An attempt was made to have 1402f7cc36c0SJens Wiklander * more distinct users simultaneously logged into the token 1403f7cc36c0SJens Wiklander * than the token and/or library permits. For example, if 1404f7cc36c0SJens Wiklander * some application has an open SO session, and another 1405f7cc36c0SJens Wiklander * application attempts to log the normal user into a 1406f7cc36c0SJens Wiklander * session, the attempt may return this error. It is not 1407f7cc36c0SJens Wiklander * required to, however. Only if the simultaneous distinct 1408f7cc36c0SJens Wiklander * users cannot be supported does C_Login have to return 1409f7cc36c0SJens Wiklander * this value. Note that this error code generalizes to 1410f7cc36c0SJens Wiklander * true multi-user tokens. 1411f7cc36c0SJens Wiklander * 1412f7cc36c0SJens Wiklander * So it's permitted to have another user or SO logged in 1413f7cc36c0SJens Wiklander * from another client. 1414f7cc36c0SJens Wiklander */ 1415f7cc36c0SJens Wiklander 1416f7cc36c0SJens Wiklander rc = check_so_pin(session, pin, pin_size); 1417f7cc36c0SJens Wiklander if (!rc) 1418f7cc36c0SJens Wiklander session_login_so(session); 1419f7cc36c0SJens Wiklander 1420f7cc36c0SJens Wiklander break; 1421f7cc36c0SJens Wiklander 1422f7cc36c0SJens Wiklander case PKCS11_CKU_USER: 1423f7cc36c0SJens Wiklander if (pkcs11_session_is_so(session)) 1424f7cc36c0SJens Wiklander return PKCS11_CKR_USER_ANOTHER_ALREADY_LOGGED_IN; 1425f7cc36c0SJens Wiklander 1426f7cc36c0SJens Wiklander if (pkcs11_session_is_user(session)) 1427f7cc36c0SJens Wiklander return PKCS11_CKR_USER_ALREADY_LOGGED_IN; 1428f7cc36c0SJens Wiklander 1429f7cc36c0SJens Wiklander /* 1430f7cc36c0SJens Wiklander * This is the point where we could check if another client 1431f7cc36c0SJens Wiklander * has another user or SO logged in. 1432f7cc36c0SJens Wiklander * See comment on CKR_USER_TOO_MANY_TYPES above. 1433f7cc36c0SJens Wiklander */ 1434f7cc36c0SJens Wiklander 1435f7cc36c0SJens Wiklander rc = check_user_pin(session, pin, pin_size); 1436f7cc36c0SJens Wiklander if (!rc) 1437f7cc36c0SJens Wiklander session_login_user(session); 1438f7cc36c0SJens Wiklander 1439f7cc36c0SJens Wiklander break; 1440f7cc36c0SJens Wiklander 1441f7cc36c0SJens Wiklander case PKCS11_CKU_CONTEXT_SPECIFIC: 1442f7cc36c0SJens Wiklander return PKCS11_CKR_OPERATION_NOT_INITIALIZED; 1443f7cc36c0SJens Wiklander 1444f7cc36c0SJens Wiklander default: 1445f7cc36c0SJens Wiklander return PKCS11_CKR_USER_TYPE_INVALID; 1446f7cc36c0SJens Wiklander } 1447f7cc36c0SJens Wiklander 1448f7cc36c0SJens Wiklander if (!rc) 1449f40f331fSEtienne Carriere IMSG("PKCS11 session %"PRIu32": login", session->handle); 1450f7cc36c0SJens Wiklander 1451f7cc36c0SJens Wiklander return rc; 1452f7cc36c0SJens Wiklander } 1453f7cc36c0SJens Wiklander 14544daf39b3SJens Wiklander enum pkcs11_rc entry_ck_logout(struct pkcs11_client *client, 1455f7cc36c0SJens Wiklander uint32_t ptypes, TEE_Param *params) 1456f7cc36c0SJens Wiklander { 1457f7cc36c0SJens Wiklander const uint32_t exp_pt = TEE_PARAM_TYPES(TEE_PARAM_TYPE_MEMREF_INOUT, 1458f7cc36c0SJens Wiklander TEE_PARAM_TYPE_NONE, 1459f7cc36c0SJens Wiklander TEE_PARAM_TYPE_NONE, 1460f7cc36c0SJens Wiklander TEE_PARAM_TYPE_NONE); 1461f7cc36c0SJens Wiklander struct pkcs11_session *session = NULL; 1462f7cc36c0SJens Wiklander enum pkcs11_rc rc = PKCS11_CKR_OK; 1463f7cc36c0SJens Wiklander struct serialargs ctrlargs = { }; 1464f7cc36c0SJens Wiklander TEE_Param *ctrl = params; 1465f7cc36c0SJens Wiklander 1466f7cc36c0SJens Wiklander if (!client || ptypes != exp_pt) 1467f7cc36c0SJens Wiklander return PKCS11_CKR_ARGUMENTS_BAD; 1468f7cc36c0SJens Wiklander 1469f7cc36c0SJens Wiklander serialargs_init(&ctrlargs, ctrl->memref.buffer, ctrl->memref.size); 1470f7cc36c0SJens Wiklander 1471f40f331fSEtienne Carriere rc = serialargs_get_session_from_handle(&ctrlargs, client, &session); 1472f7cc36c0SJens Wiklander if (rc) 1473f7cc36c0SJens Wiklander return rc; 1474f7cc36c0SJens Wiklander 1475f7cc36c0SJens Wiklander if (serialargs_remaining_bytes(&ctrlargs)) 1476f7cc36c0SJens Wiklander return PKCS11_CKR_ARGUMENTS_BAD; 1477f7cc36c0SJens Wiklander 1478f7cc36c0SJens Wiklander if (pkcs11_session_is_public(session)) 1479f7cc36c0SJens Wiklander return PKCS11_CKR_USER_NOT_LOGGED_IN; 1480f7cc36c0SJens Wiklander 1481f7cc36c0SJens Wiklander session_logout(session); 1482f7cc36c0SJens Wiklander 1483f40f331fSEtienne Carriere IMSG("PKCS11 session %"PRIu32": logout", session->handle); 1484f7cc36c0SJens Wiklander 1485f7cc36c0SJens Wiklander return PKCS11_CKR_OK; 1486f7cc36c0SJens Wiklander } 148722587dc4SVesa Jääskeläinen 148822587dc4SVesa Jääskeläinen static TEE_Result seed_rng_pool(void *seed, size_t length) 148922587dc4SVesa Jääskeläinen { 149022587dc4SVesa Jääskeläinen static const TEE_UUID system_uuid = PTA_SYSTEM_UUID; 149122587dc4SVesa Jääskeläinen uint32_t param_types = TEE_PARAM_TYPES(TEE_PARAM_TYPE_MEMREF_INPUT, 149222587dc4SVesa Jääskeläinen TEE_PARAM_TYPE_NONE, 149322587dc4SVesa Jääskeläinen TEE_PARAM_TYPE_NONE, 149422587dc4SVesa Jääskeläinen TEE_PARAM_TYPE_NONE); 149522587dc4SVesa Jääskeläinen TEE_Param params[TEE_NUM_PARAMS] = { }; 149622587dc4SVesa Jääskeläinen TEE_TASessionHandle sess = TEE_HANDLE_NULL; 149722587dc4SVesa Jääskeläinen TEE_Result res = TEE_ERROR_GENERIC; 149822587dc4SVesa Jääskeläinen uint32_t ret_orig = 0; 149922587dc4SVesa Jääskeläinen 150022587dc4SVesa Jääskeläinen params[0].memref.buffer = seed; 150122587dc4SVesa Jääskeläinen params[0].memref.size = (uint32_t)length; 150222587dc4SVesa Jääskeläinen 150322587dc4SVesa Jääskeläinen res = TEE_OpenTASession(&system_uuid, TEE_TIMEOUT_INFINITE, 0, NULL, 150422587dc4SVesa Jääskeläinen &sess, &ret_orig); 150522587dc4SVesa Jääskeläinen if (res != TEE_SUCCESS) { 150622587dc4SVesa Jääskeläinen EMSG("Can't open session to system PTA"); 150722587dc4SVesa Jääskeläinen return res; 150822587dc4SVesa Jääskeläinen } 150922587dc4SVesa Jääskeläinen 151022587dc4SVesa Jääskeläinen res = TEE_InvokeTACommand(sess, TEE_TIMEOUT_INFINITE, 151122587dc4SVesa Jääskeläinen PTA_SYSTEM_ADD_RNG_ENTROPY, 151222587dc4SVesa Jääskeläinen param_types, params, &ret_orig); 151322587dc4SVesa Jääskeläinen if (res != TEE_SUCCESS) 151422587dc4SVesa Jääskeläinen EMSG("Can't invoke system PTA"); 151522587dc4SVesa Jääskeläinen 151622587dc4SVesa Jääskeläinen TEE_CloseTASession(sess); 151722587dc4SVesa Jääskeläinen return res; 151822587dc4SVesa Jääskeläinen } 151922587dc4SVesa Jääskeläinen 152022587dc4SVesa Jääskeläinen enum pkcs11_rc entry_ck_seed_random(struct pkcs11_client *client, 152122587dc4SVesa Jääskeläinen uint32_t ptypes, TEE_Param *params) 152222587dc4SVesa Jääskeläinen { 152322587dc4SVesa Jääskeläinen const uint32_t exp_pt = TEE_PARAM_TYPES(TEE_PARAM_TYPE_MEMREF_INOUT, 152422587dc4SVesa Jääskeläinen TEE_PARAM_TYPE_MEMREF_INPUT, 152522587dc4SVesa Jääskeläinen TEE_PARAM_TYPE_NONE, 152622587dc4SVesa Jääskeläinen TEE_PARAM_TYPE_NONE); 152722587dc4SVesa Jääskeläinen TEE_Param *ctrl = params; 152822587dc4SVesa Jääskeläinen TEE_Param *in = params + 1; 152922587dc4SVesa Jääskeläinen enum pkcs11_rc rc = PKCS11_CKR_OK; 153022587dc4SVesa Jääskeläinen struct serialargs ctrlargs = { }; 153122587dc4SVesa Jääskeläinen struct pkcs11_session *session = NULL; 153222587dc4SVesa Jääskeläinen TEE_Result res = TEE_SUCCESS; 153322587dc4SVesa Jääskeläinen 153422587dc4SVesa Jääskeläinen if (!client || ptypes != exp_pt) 153522587dc4SVesa Jääskeläinen return PKCS11_CKR_ARGUMENTS_BAD; 153622587dc4SVesa Jääskeläinen 153722587dc4SVesa Jääskeläinen serialargs_init(&ctrlargs, ctrl->memref.buffer, ctrl->memref.size); 153822587dc4SVesa Jääskeläinen 153922587dc4SVesa Jääskeläinen rc = serialargs_get_session_from_handle(&ctrlargs, client, &session); 154022587dc4SVesa Jääskeläinen if (rc) 154122587dc4SVesa Jääskeläinen return rc; 154222587dc4SVesa Jääskeläinen 154322587dc4SVesa Jääskeläinen if (serialargs_remaining_bytes(&ctrlargs)) 154422587dc4SVesa Jääskeläinen return PKCS11_CKR_ARGUMENTS_BAD; 154522587dc4SVesa Jääskeläinen 154622587dc4SVesa Jääskeläinen if (in->memref.size && !in->memref.buffer) 154722587dc4SVesa Jääskeläinen return PKCS11_CKR_ARGUMENTS_BAD; 154822587dc4SVesa Jääskeläinen 154922587dc4SVesa Jääskeläinen if (!in->memref.size) 155022587dc4SVesa Jääskeläinen return PKCS11_CKR_OK; 155122587dc4SVesa Jääskeläinen 155222587dc4SVesa Jääskeläinen res = seed_rng_pool(in->memref.buffer, in->memref.size); 155322587dc4SVesa Jääskeläinen if (res != TEE_SUCCESS) 155422587dc4SVesa Jääskeläinen return PKCS11_CKR_FUNCTION_FAILED; 155522587dc4SVesa Jääskeläinen 155622587dc4SVesa Jääskeläinen DMSG("PKCS11 session %"PRIu32": seed random", session->handle); 155722587dc4SVesa Jääskeläinen 155822587dc4SVesa Jääskeläinen return PKCS11_CKR_OK; 155922587dc4SVesa Jääskeläinen } 156022587dc4SVesa Jääskeläinen 156122587dc4SVesa Jääskeläinen enum pkcs11_rc entry_ck_generate_random(struct pkcs11_client *client, 156222587dc4SVesa Jääskeläinen uint32_t ptypes, TEE_Param *params) 156322587dc4SVesa Jääskeläinen { 156422587dc4SVesa Jääskeläinen const uint32_t exp_pt = TEE_PARAM_TYPES(TEE_PARAM_TYPE_MEMREF_INOUT, 156522587dc4SVesa Jääskeläinen TEE_PARAM_TYPE_NONE, 156622587dc4SVesa Jääskeläinen TEE_PARAM_TYPE_MEMREF_OUTPUT, 156722587dc4SVesa Jääskeläinen TEE_PARAM_TYPE_NONE); 156822587dc4SVesa Jääskeläinen TEE_Param *ctrl = params; 156922587dc4SVesa Jääskeläinen TEE_Param *out = params + 2; 157022587dc4SVesa Jääskeläinen enum pkcs11_rc rc = PKCS11_CKR_OK; 157122587dc4SVesa Jääskeläinen struct serialargs ctrlargs = { }; 157222587dc4SVesa Jääskeläinen struct pkcs11_session *session = NULL; 157322587dc4SVesa Jääskeläinen void *buffer = NULL; 157422587dc4SVesa Jääskeläinen size_t buffer_size = 0; 157522587dc4SVesa Jääskeläinen uint8_t *data = NULL; 157622587dc4SVesa Jääskeläinen size_t left = 0; 157722587dc4SVesa Jääskeläinen 157822587dc4SVesa Jääskeläinen if (!client || ptypes != exp_pt) 157922587dc4SVesa Jääskeläinen return PKCS11_CKR_ARGUMENTS_BAD; 158022587dc4SVesa Jääskeläinen 158122587dc4SVesa Jääskeläinen serialargs_init(&ctrlargs, ctrl->memref.buffer, ctrl->memref.size); 158222587dc4SVesa Jääskeläinen 158322587dc4SVesa Jääskeläinen rc = serialargs_get_session_from_handle(&ctrlargs, client, &session); 158422587dc4SVesa Jääskeläinen if (rc) 158522587dc4SVesa Jääskeläinen return rc; 158622587dc4SVesa Jääskeläinen 158722587dc4SVesa Jääskeläinen if (serialargs_remaining_bytes(&ctrlargs)) 158822587dc4SVesa Jääskeläinen return PKCS11_CKR_ARGUMENTS_BAD; 158922587dc4SVesa Jääskeläinen 159022587dc4SVesa Jääskeläinen if (out->memref.size && !out->memref.buffer) 159122587dc4SVesa Jääskeläinen return PKCS11_CKR_ARGUMENTS_BAD; 159222587dc4SVesa Jääskeläinen 159322587dc4SVesa Jääskeläinen if (!out->memref.size) 159422587dc4SVesa Jääskeläinen return PKCS11_CKR_OK; 159522587dc4SVesa Jääskeläinen 159622587dc4SVesa Jääskeläinen buffer_size = MIN(out->memref.size, RNG_CHUNK_SIZE); 159722587dc4SVesa Jääskeläinen buffer = TEE_Malloc(buffer_size, TEE_MALLOC_FILL_ZERO); 159822587dc4SVesa Jääskeläinen if (!buffer) 159922587dc4SVesa Jääskeläinen return PKCS11_CKR_DEVICE_MEMORY; 160022587dc4SVesa Jääskeläinen 160122587dc4SVesa Jääskeläinen data = out->memref.buffer; 160222587dc4SVesa Jääskeläinen left = out->memref.size; 160322587dc4SVesa Jääskeläinen 160422587dc4SVesa Jääskeläinen while (left) { 160522587dc4SVesa Jääskeläinen size_t count = MIN(left, buffer_size); 160622587dc4SVesa Jääskeläinen 160722587dc4SVesa Jääskeläinen TEE_GenerateRandom(buffer, count); 160822587dc4SVesa Jääskeläinen TEE_MemMove(data, buffer, count); 160922587dc4SVesa Jääskeläinen 161022587dc4SVesa Jääskeläinen data += count; 161122587dc4SVesa Jääskeläinen left -= count; 161222587dc4SVesa Jääskeläinen } 161322587dc4SVesa Jääskeläinen 161422587dc4SVesa Jääskeläinen DMSG("PKCS11 session %"PRIu32": generate random", session->handle); 161522587dc4SVesa Jääskeläinen 161622587dc4SVesa Jääskeläinen TEE_Free(buffer); 161722587dc4SVesa Jääskeläinen 161822587dc4SVesa Jääskeläinen return PKCS11_CKR_OK; 161922587dc4SVesa Jääskeläinen } 1620