1c84ccd0aSEtienne Carriere // SPDX-License-Identifier: BSD-2-Clause 2c84ccd0aSEtienne Carriere /* 3c84ccd0aSEtienne Carriere * Copyright (c) 2017-2020, Linaro Limited 4c84ccd0aSEtienne Carriere */ 5c84ccd0aSEtienne Carriere 6c84ccd0aSEtienne Carriere #include <assert.h> 71a27b197SVesa Jääskeläinen #include <config.h> 8d38f9635SEtienne Carriere #include <confine_array_index.h> 9c84ccd0aSEtienne Carriere #include <pkcs11_ta.h> 10d628ebd9SEtienne Carriere #include <printk.h> 1122587dc4SVesa Jääskeläinen #include <pta_system.h> 12c84ccd0aSEtienne Carriere #include <string.h> 13c84ccd0aSEtienne Carriere #include <string_ext.h> 14c84ccd0aSEtienne Carriere #include <sys/queue.h> 15c84ccd0aSEtienne Carriere #include <tee_api_types.h> 16c84ccd0aSEtienne Carriere #include <tee_internal_api_extensions.h> 17c84ccd0aSEtienne Carriere #include <util.h> 18c84ccd0aSEtienne Carriere 19512cbf1dSJens Wiklander #include "attributes.h" 2049443fc0SEtienne Carriere #include "handle.h" 21c84ccd0aSEtienne Carriere #include "pkcs11_helpers.h" 22ee49d9f2SEtienne Carriere #include "pkcs11_token.h" 2355e6965cSEtienne Carriere #include "processing.h" 2422ac6984SEtienne Carriere #include "serializer.h" 2549443fc0SEtienne Carriere #include "token_capabilities.h" 26c84ccd0aSEtienne Carriere 27c84ccd0aSEtienne Carriere /* Provide 3 slots/tokens, ID is token index */ 28c84ccd0aSEtienne Carriere #ifndef CFG_PKCS11_TA_TOKEN_COUNT 29c84ccd0aSEtienne Carriere #define TOKEN_COUNT 3 30c84ccd0aSEtienne Carriere #else 31c84ccd0aSEtienne Carriere #define TOKEN_COUNT CFG_PKCS11_TA_TOKEN_COUNT 32c84ccd0aSEtienne Carriere #endif 33c84ccd0aSEtienne Carriere 3422587dc4SVesa Jääskeläinen /* RNG chunk size used to split RNG generation to smaller sizes */ 3522587dc4SVesa Jääskeläinen #define RNG_CHUNK_SIZE 512U 3622587dc4SVesa Jääskeläinen 37e084583eSEtienne Carriere /* 38e084583eSEtienne Carriere * Structure tracking client applications 39e084583eSEtienne Carriere * 40e084583eSEtienne Carriere * @link - chained list of registered client applications 41e084583eSEtienne Carriere * @sessions - list of the PKCS11 sessions opened by the client application 42bc555ee0SVesa Jääskeläinen * @object_handle_db - Database for object handles in name space of client 43e084583eSEtienne Carriere */ 44e084583eSEtienne Carriere struct pkcs11_client { 45e084583eSEtienne Carriere TAILQ_ENTRY(pkcs11_client) link; 46e084583eSEtienne Carriere struct session_list session_list; 47e084583eSEtienne Carriere struct handle_db session_handle_db; 48bc555ee0SVesa Jääskeläinen struct handle_db object_handle_db; 49e084583eSEtienne Carriere }; 50e084583eSEtienne Carriere 51c84ccd0aSEtienne Carriere /* Static allocation of tokens runtime instances (reset to 0 at load) */ 52c84ccd0aSEtienne Carriere struct ck_token ck_token[TOKEN_COUNT]; 53c84ccd0aSEtienne Carriere 54e084583eSEtienne Carriere static struct client_list pkcs11_client_list = 55e084583eSEtienne Carriere TAILQ_HEAD_INITIALIZER(pkcs11_client_list); 56e084583eSEtienne Carriere 576e4f8f17SEtienne Carriere static void close_ck_session(struct pkcs11_session *session); 586e4f8f17SEtienne Carriere 59c84ccd0aSEtienne Carriere struct ck_token *get_token(unsigned int token_id) 60c84ccd0aSEtienne Carriere { 61d38f9635SEtienne Carriere if (token_id < TOKEN_COUNT) 62d38f9635SEtienne Carriere return &ck_token[confine_array_index(token_id, TOKEN_COUNT)]; 63c84ccd0aSEtienne Carriere 64d38f9635SEtienne Carriere return NULL; 65c84ccd0aSEtienne Carriere } 66c84ccd0aSEtienne Carriere 67c84ccd0aSEtienne Carriere unsigned int get_token_id(struct ck_token *token) 68c84ccd0aSEtienne Carriere { 69c84ccd0aSEtienne Carriere ptrdiff_t id = token - ck_token; 70c84ccd0aSEtienne Carriere 71c84ccd0aSEtienne Carriere assert(id >= 0 && id < TOKEN_COUNT); 72c84ccd0aSEtienne Carriere return id; 73c84ccd0aSEtienne Carriere } 74c84ccd0aSEtienne Carriere 75bc555ee0SVesa Jääskeläinen struct handle_db *get_object_handle_db(struct pkcs11_session *session) 76bc555ee0SVesa Jääskeläinen { 77bc555ee0SVesa Jääskeläinen return &session->client->object_handle_db; 78bc555ee0SVesa Jääskeläinen } 79bc555ee0SVesa Jääskeläinen 80bc555ee0SVesa Jääskeläinen struct session_list *get_session_list(struct pkcs11_session *session) 81bc555ee0SVesa Jääskeläinen { 82bc555ee0SVesa Jääskeläinen return &session->client->session_list; 83bc555ee0SVesa Jääskeläinen } 84bc555ee0SVesa Jääskeläinen 85e084583eSEtienne Carriere struct pkcs11_client *tee_session2client(void *tee_session) 86e084583eSEtienne Carriere { 87e084583eSEtienne Carriere struct pkcs11_client *client = NULL; 88e084583eSEtienne Carriere 89e084583eSEtienne Carriere TAILQ_FOREACH(client, &pkcs11_client_list, link) 90e084583eSEtienne Carriere if (client == tee_session) 91e084583eSEtienne Carriere break; 92e084583eSEtienne Carriere 93e084583eSEtienne Carriere return client; 94e084583eSEtienne Carriere } 95e084583eSEtienne Carriere 966e4f8f17SEtienne Carriere struct pkcs11_session *pkcs11_handle2session(uint32_t handle, 976e4f8f17SEtienne Carriere struct pkcs11_client *client) 986e4f8f17SEtienne Carriere { 996e4f8f17SEtienne Carriere return handle_lookup(&client->session_handle_db, handle); 1006e4f8f17SEtienne Carriere } 1016e4f8f17SEtienne Carriere 102e084583eSEtienne Carriere struct pkcs11_client *register_client(void) 103e084583eSEtienne Carriere { 104e084583eSEtienne Carriere struct pkcs11_client *client = NULL; 105e084583eSEtienne Carriere 106e084583eSEtienne Carriere client = TEE_Malloc(sizeof(*client), TEE_MALLOC_FILL_ZERO); 107e084583eSEtienne Carriere if (!client) 108e084583eSEtienne Carriere return NULL; 109e084583eSEtienne Carriere 110e084583eSEtienne Carriere TAILQ_INSERT_HEAD(&pkcs11_client_list, client, link); 111e084583eSEtienne Carriere TAILQ_INIT(&client->session_list); 112e084583eSEtienne Carriere handle_db_init(&client->session_handle_db); 113bc555ee0SVesa Jääskeläinen handle_db_init(&client->object_handle_db); 114e084583eSEtienne Carriere 115e084583eSEtienne Carriere return client; 116e084583eSEtienne Carriere } 117e084583eSEtienne Carriere 118e084583eSEtienne Carriere void unregister_client(struct pkcs11_client *client) 119e084583eSEtienne Carriere { 1206e4f8f17SEtienne Carriere struct pkcs11_session *session = NULL; 1216e4f8f17SEtienne Carriere struct pkcs11_session *next = NULL; 1226e4f8f17SEtienne Carriere 123e084583eSEtienne Carriere if (!client) { 124e084583eSEtienne Carriere EMSG("Invalid TEE session handle"); 125e084583eSEtienne Carriere return; 126e084583eSEtienne Carriere } 127e084583eSEtienne Carriere 1286e4f8f17SEtienne Carriere TAILQ_FOREACH_SAFE(session, &client->session_list, link, next) 1296e4f8f17SEtienne Carriere close_ck_session(session); 1306e4f8f17SEtienne Carriere 131e084583eSEtienne Carriere TAILQ_REMOVE(&pkcs11_client_list, client, link); 132bc555ee0SVesa Jääskeläinen handle_db_destroy(&client->object_handle_db); 133e084583eSEtienne Carriere handle_db_destroy(&client->session_handle_db); 134e084583eSEtienne Carriere TEE_Free(client); 135e084583eSEtienne Carriere } 136e084583eSEtienne Carriere 137c84ccd0aSEtienne Carriere static TEE_Result pkcs11_token_init(unsigned int id) 138c84ccd0aSEtienne Carriere { 139c84ccd0aSEtienne Carriere struct ck_token *token = init_persistent_db(id); 140c84ccd0aSEtienne Carriere 141c84ccd0aSEtienne Carriere if (!token) 142c84ccd0aSEtienne Carriere return TEE_ERROR_SECURITY; 143c84ccd0aSEtienne Carriere 144c84ccd0aSEtienne Carriere if (token->state == PKCS11_TOKEN_RESET) { 145c84ccd0aSEtienne Carriere /* As per PKCS#11 spec, token resets to read/write state */ 146c84ccd0aSEtienne Carriere token->state = PKCS11_TOKEN_READ_WRITE; 147c84ccd0aSEtienne Carriere token->session_count = 0; 148c84ccd0aSEtienne Carriere token->rw_session_count = 0; 149c84ccd0aSEtienne Carriere } 150c84ccd0aSEtienne Carriere 151c84ccd0aSEtienne Carriere return TEE_SUCCESS; 152c84ccd0aSEtienne Carriere } 153c84ccd0aSEtienne Carriere 154c84ccd0aSEtienne Carriere TEE_Result pkcs11_init(void) 155c84ccd0aSEtienne Carriere { 156c84ccd0aSEtienne Carriere unsigned int id = 0; 157c84ccd0aSEtienne Carriere TEE_Result ret = TEE_ERROR_GENERIC; 158c84ccd0aSEtienne Carriere 159c84ccd0aSEtienne Carriere for (id = 0; id < TOKEN_COUNT; id++) { 160c84ccd0aSEtienne Carriere ret = pkcs11_token_init(id); 161c84ccd0aSEtienne Carriere if (ret) 162e084583eSEtienne Carriere break; 163c84ccd0aSEtienne Carriere } 164c84ccd0aSEtienne Carriere 165c84ccd0aSEtienne Carriere return ret; 166c84ccd0aSEtienne Carriere } 167c84ccd0aSEtienne Carriere 168c84ccd0aSEtienne Carriere void pkcs11_deinit(void) 169c84ccd0aSEtienne Carriere { 170c84ccd0aSEtienne Carriere unsigned int id = 0; 171c84ccd0aSEtienne Carriere 172c84ccd0aSEtienne Carriere for (id = 0; id < TOKEN_COUNT; id++) 173c84ccd0aSEtienne Carriere close_persistent_db(get_token(id)); 174c84ccd0aSEtienne Carriere } 17522ac6984SEtienne Carriere 176512cbf1dSJens Wiklander /* 177512cbf1dSJens Wiklander * Currently no support for dual operations. 178512cbf1dSJens Wiklander */ 179512cbf1dSJens Wiklander enum pkcs11_rc set_processing_state(struct pkcs11_session *session, 180512cbf1dSJens Wiklander enum processing_func function, 181512cbf1dSJens Wiklander struct pkcs11_object *obj1, 182512cbf1dSJens Wiklander struct pkcs11_object *obj2) 183512cbf1dSJens Wiklander { 184512cbf1dSJens Wiklander enum pkcs11_proc_state state = PKCS11_SESSION_READY; 185512cbf1dSJens Wiklander struct active_processing *proc = NULL; 186512cbf1dSJens Wiklander 187512cbf1dSJens Wiklander if (session->processing) 188512cbf1dSJens Wiklander return PKCS11_CKR_OPERATION_ACTIVE; 189512cbf1dSJens Wiklander 190512cbf1dSJens Wiklander switch (function) { 191512cbf1dSJens Wiklander case PKCS11_FUNCTION_ENCRYPT: 192512cbf1dSJens Wiklander state = PKCS11_SESSION_ENCRYPTING; 193512cbf1dSJens Wiklander break; 194512cbf1dSJens Wiklander case PKCS11_FUNCTION_DECRYPT: 195512cbf1dSJens Wiklander state = PKCS11_SESSION_DECRYPTING; 196512cbf1dSJens Wiklander break; 197512cbf1dSJens Wiklander case PKCS11_FUNCTION_SIGN: 198512cbf1dSJens Wiklander state = PKCS11_SESSION_SIGNING; 199512cbf1dSJens Wiklander break; 200512cbf1dSJens Wiklander case PKCS11_FUNCTION_VERIFY: 201512cbf1dSJens Wiklander state = PKCS11_SESSION_VERIFYING; 202512cbf1dSJens Wiklander break; 203512cbf1dSJens Wiklander case PKCS11_FUNCTION_DIGEST: 204512cbf1dSJens Wiklander state = PKCS11_SESSION_DIGESTING; 205512cbf1dSJens Wiklander break; 206512cbf1dSJens Wiklander case PKCS11_FUNCTION_DERIVE: 207512cbf1dSJens Wiklander state = PKCS11_SESSION_READY; 208512cbf1dSJens Wiklander break; 209512cbf1dSJens Wiklander default: 210512cbf1dSJens Wiklander TEE_Panic(function); 211512cbf1dSJens Wiklander return -1; 212512cbf1dSJens Wiklander } 213512cbf1dSJens Wiklander 214512cbf1dSJens Wiklander proc = TEE_Malloc(sizeof(*proc), TEE_MALLOC_FILL_ZERO); 215512cbf1dSJens Wiklander if (!proc) 216512cbf1dSJens Wiklander return PKCS11_CKR_DEVICE_MEMORY; 217512cbf1dSJens Wiklander 218512cbf1dSJens Wiklander /* Boolean are default to false and pointers to NULL */ 219512cbf1dSJens Wiklander proc->state = state; 220512cbf1dSJens Wiklander proc->tee_op_handle = TEE_HANDLE_NULL; 221*fb279d8bSVesa Jääskeläinen proc->tee_hash_algo = 0; 222*fb279d8bSVesa Jääskeläinen proc->tee_hash_op_handle = TEE_HANDLE_NULL; 223512cbf1dSJens Wiklander 224512cbf1dSJens Wiklander if (obj1 && get_bool(obj1->attributes, PKCS11_CKA_ALWAYS_AUTHENTICATE)) 225512cbf1dSJens Wiklander proc->always_authen = true; 226512cbf1dSJens Wiklander 227512cbf1dSJens Wiklander if (obj2 && get_bool(obj2->attributes, PKCS11_CKA_ALWAYS_AUTHENTICATE)) 228512cbf1dSJens Wiklander proc->always_authen = true; 229512cbf1dSJens Wiklander 230512cbf1dSJens Wiklander session->processing = proc; 231512cbf1dSJens Wiklander 232512cbf1dSJens Wiklander return PKCS11_CKR_OK; 233512cbf1dSJens Wiklander } 234512cbf1dSJens Wiklander 2354daf39b3SJens Wiklander enum pkcs11_rc entry_ck_slot_list(uint32_t ptypes, TEE_Param *params) 23622ac6984SEtienne Carriere { 23722ac6984SEtienne Carriere const uint32_t exp_pt = TEE_PARAM_TYPES(TEE_PARAM_TYPE_MEMREF_INOUT, 23822ac6984SEtienne Carriere TEE_PARAM_TYPE_NONE, 23922ac6984SEtienne Carriere TEE_PARAM_TYPE_MEMREF_OUTPUT, 24022ac6984SEtienne Carriere TEE_PARAM_TYPE_NONE); 24139b43b78SJens Wiklander TEE_Param *out = params + 2; 24222ac6984SEtienne Carriere uint32_t token_id = 0; 24322ac6984SEtienne Carriere const size_t out_size = sizeof(token_id) * TOKEN_COUNT; 24422ac6984SEtienne Carriere uint8_t *id = NULL; 24522ac6984SEtienne Carriere 24622ac6984SEtienne Carriere if (ptypes != exp_pt || 24722ac6984SEtienne Carriere params[0].memref.size != TEE_PARAM0_SIZE_MIN) 24822ac6984SEtienne Carriere return PKCS11_CKR_ARGUMENTS_BAD; 24922ac6984SEtienne Carriere 25022ac6984SEtienne Carriere if (out->memref.size < out_size) { 25122ac6984SEtienne Carriere out->memref.size = out_size; 25222ac6984SEtienne Carriere 25322ac6984SEtienne Carriere if (out->memref.buffer) 25422ac6984SEtienne Carriere return PKCS11_CKR_BUFFER_TOO_SMALL; 25522ac6984SEtienne Carriere else 25622ac6984SEtienne Carriere return PKCS11_CKR_OK; 25722ac6984SEtienne Carriere } 25822ac6984SEtienne Carriere 25922ac6984SEtienne Carriere for (token_id = 0, id = out->memref.buffer; token_id < TOKEN_COUNT; 26022ac6984SEtienne Carriere token_id++, id += sizeof(token_id)) 26122ac6984SEtienne Carriere TEE_MemMove(id, &token_id, sizeof(token_id)); 26222ac6984SEtienne Carriere 26322ac6984SEtienne Carriere out->memref.size = out_size; 26422ac6984SEtienne Carriere 26522ac6984SEtienne Carriere return PKCS11_CKR_OK; 26622ac6984SEtienne Carriere } 267ce94efefSEtienne Carriere 268b3ac5035SEtienne Carriere static void pad_str(uint8_t *str, size_t size) 269b3ac5035SEtienne Carriere { 270b3ac5035SEtienne Carriere int n = strnlen((char *)str, size); 271b3ac5035SEtienne Carriere 272b3ac5035SEtienne Carriere TEE_MemFill(str + n, ' ', size - n); 273b3ac5035SEtienne Carriere } 274b3ac5035SEtienne Carriere 275d628ebd9SEtienne Carriere static void set_token_description(struct pkcs11_slot_info *info) 276d628ebd9SEtienne Carriere { 277d628ebd9SEtienne Carriere char desc[sizeof(info->slot_description) + 1] = { 0 }; 278d628ebd9SEtienne Carriere TEE_UUID dev_id = { }; 279d628ebd9SEtienne Carriere TEE_Result res = TEE_ERROR_GENERIC; 280d628ebd9SEtienne Carriere int n = 0; 281d628ebd9SEtienne Carriere 282d628ebd9SEtienne Carriere res = TEE_GetPropertyAsUUID(TEE_PROPSET_TEE_IMPLEMENTATION, 283d628ebd9SEtienne Carriere "gpd.tee.deviceID", &dev_id); 284d628ebd9SEtienne Carriere if (res == TEE_SUCCESS) { 285d628ebd9SEtienne Carriere n = snprintk(desc, sizeof(desc), PKCS11_SLOT_DESCRIPTION 286d628ebd9SEtienne Carriere " - TEE UUID %pUl", (void *)&dev_id); 287d628ebd9SEtienne Carriere } else { 288d628ebd9SEtienne Carriere n = snprintf(desc, sizeof(desc), PKCS11_SLOT_DESCRIPTION 289d628ebd9SEtienne Carriere " - No TEE UUID"); 290d628ebd9SEtienne Carriere } 291d628ebd9SEtienne Carriere if (n < 0 || n >= (int)sizeof(desc)) 292d628ebd9SEtienne Carriere TEE_Panic(0); 293d628ebd9SEtienne Carriere 294d628ebd9SEtienne Carriere TEE_MemMove(info->slot_description, desc, n); 295d628ebd9SEtienne Carriere pad_str(info->slot_description, sizeof(info->slot_description)); 296d628ebd9SEtienne Carriere } 297d628ebd9SEtienne Carriere 2984daf39b3SJens Wiklander enum pkcs11_rc entry_ck_slot_info(uint32_t ptypes, TEE_Param *params) 299ce94efefSEtienne Carriere { 300ce94efefSEtienne Carriere const uint32_t exp_pt = TEE_PARAM_TYPES(TEE_PARAM_TYPE_MEMREF_INOUT, 301ce94efefSEtienne Carriere TEE_PARAM_TYPE_NONE, 302ce94efefSEtienne Carriere TEE_PARAM_TYPE_MEMREF_OUTPUT, 303ce94efefSEtienne Carriere TEE_PARAM_TYPE_NONE); 30439b43b78SJens Wiklander TEE_Param *ctrl = params; 30539b43b78SJens Wiklander TEE_Param *out = params + 2; 3064daf39b3SJens Wiklander enum pkcs11_rc rc = PKCS11_CKR_OK; 307ce94efefSEtienne Carriere struct serialargs ctrlargs = { }; 308ce94efefSEtienne Carriere uint32_t token_id = 0; 309ce94efefSEtienne Carriere struct pkcs11_slot_info info = { 310ce94efefSEtienne Carriere .slot_description = PKCS11_SLOT_DESCRIPTION, 311ce94efefSEtienne Carriere .manufacturer_id = PKCS11_SLOT_MANUFACTURER, 312ce94efefSEtienne Carriere .flags = PKCS11_CKFS_TOKEN_PRESENT, 313ce94efefSEtienne Carriere .hardware_version = PKCS11_SLOT_HW_VERSION, 314ce94efefSEtienne Carriere .firmware_version = PKCS11_SLOT_FW_VERSION, 315ce94efefSEtienne Carriere }; 316ce94efefSEtienne Carriere 317ce94efefSEtienne Carriere COMPILE_TIME_ASSERT(sizeof(PKCS11_SLOT_DESCRIPTION) <= 318ce94efefSEtienne Carriere sizeof(info.slot_description)); 319ce94efefSEtienne Carriere COMPILE_TIME_ASSERT(sizeof(PKCS11_SLOT_MANUFACTURER) <= 320ce94efefSEtienne Carriere sizeof(info.manufacturer_id)); 321ce94efefSEtienne Carriere 322ce94efefSEtienne Carriere if (ptypes != exp_pt || out->memref.size != sizeof(info)) 323ce94efefSEtienne Carriere return PKCS11_CKR_ARGUMENTS_BAD; 324ce94efefSEtienne Carriere 325ce94efefSEtienne Carriere serialargs_init(&ctrlargs, ctrl->memref.buffer, ctrl->memref.size); 326ce94efefSEtienne Carriere 3274daf39b3SJens Wiklander rc = serialargs_get(&ctrlargs, &token_id, sizeof(token_id)); 3284daf39b3SJens Wiklander if (rc) 3294daf39b3SJens Wiklander return rc; 330ce94efefSEtienne Carriere 331ce94efefSEtienne Carriere if (serialargs_remaining_bytes(&ctrlargs)) 332ce94efefSEtienne Carriere return PKCS11_CKR_ARGUMENTS_BAD; 333ce94efefSEtienne Carriere 33429b0949aSEtienne Carriere if (!get_token(token_id)) 335ce94efefSEtienne Carriere return PKCS11_CKR_SLOT_ID_INVALID; 336ce94efefSEtienne Carriere 337d628ebd9SEtienne Carriere set_token_description(&info); 338d628ebd9SEtienne Carriere 339b3ac5035SEtienne Carriere pad_str(info.manufacturer_id, sizeof(info.manufacturer_id)); 340ce94efefSEtienne Carriere 341ce94efefSEtienne Carriere out->memref.size = sizeof(info); 342ce94efefSEtienne Carriere TEE_MemMove(out->memref.buffer, &info, out->memref.size); 343ce94efefSEtienne Carriere 344ce94efefSEtienne Carriere return PKCS11_CKR_OK; 345ce94efefSEtienne Carriere } 346030e7392SEtienne Carriere 3474daf39b3SJens Wiklander enum pkcs11_rc entry_ck_token_info(uint32_t ptypes, TEE_Param *params) 348030e7392SEtienne Carriere { 349030e7392SEtienne Carriere const uint32_t exp_pt = TEE_PARAM_TYPES(TEE_PARAM_TYPE_MEMREF_INOUT, 350030e7392SEtienne Carriere TEE_PARAM_TYPE_NONE, 351030e7392SEtienne Carriere TEE_PARAM_TYPE_MEMREF_OUTPUT, 352030e7392SEtienne Carriere TEE_PARAM_TYPE_NONE); 35339b43b78SJens Wiklander TEE_Param *ctrl = params; 35439b43b78SJens Wiklander TEE_Param *out = params + 2; 3554daf39b3SJens Wiklander enum pkcs11_rc rc = PKCS11_CKR_OK; 356030e7392SEtienne Carriere struct serialargs ctrlargs = { }; 357030e7392SEtienne Carriere uint32_t token_id = 0; 358030e7392SEtienne Carriere struct ck_token *token = NULL; 359030e7392SEtienne Carriere struct pkcs11_token_info info = { 360030e7392SEtienne Carriere .manufacturer_id = PKCS11_TOKEN_MANUFACTURER, 361030e7392SEtienne Carriere .model = PKCS11_TOKEN_MODEL, 362030e7392SEtienne Carriere .max_session_count = UINT32_MAX, 363030e7392SEtienne Carriere .max_rw_session_count = UINT32_MAX, 364030e7392SEtienne Carriere .max_pin_len = PKCS11_TOKEN_PIN_SIZE_MAX, 365030e7392SEtienne Carriere .min_pin_len = PKCS11_TOKEN_PIN_SIZE_MIN, 366030e7392SEtienne Carriere .total_public_memory = UINT32_MAX, 367030e7392SEtienne Carriere .free_public_memory = UINT32_MAX, 368030e7392SEtienne Carriere .total_private_memory = UINT32_MAX, 369030e7392SEtienne Carriere .free_private_memory = UINT32_MAX, 370030e7392SEtienne Carriere .hardware_version = PKCS11_TOKEN_HW_VERSION, 371030e7392SEtienne Carriere .firmware_version = PKCS11_TOKEN_FW_VERSION, 372030e7392SEtienne Carriere }; 37302b4d42aSEtienne Carriere char sn[sizeof(info.serial_number) + 1] = { 0 }; 37402b4d42aSEtienne Carriere int n = 0; 375030e7392SEtienne Carriere 376030e7392SEtienne Carriere if (ptypes != exp_pt || out->memref.size != sizeof(info)) 377030e7392SEtienne Carriere return PKCS11_CKR_ARGUMENTS_BAD; 378030e7392SEtienne Carriere 379030e7392SEtienne Carriere serialargs_init(&ctrlargs, ctrl->memref.buffer, ctrl->memref.size); 380030e7392SEtienne Carriere 3814daf39b3SJens Wiklander rc = serialargs_get(&ctrlargs, &token_id, sizeof(token_id)); 3824daf39b3SJens Wiklander if (rc) 3834daf39b3SJens Wiklander return rc; 384030e7392SEtienne Carriere 385030e7392SEtienne Carriere if (serialargs_remaining_bytes(&ctrlargs)) 386030e7392SEtienne Carriere return PKCS11_CKR_ARGUMENTS_BAD; 387030e7392SEtienne Carriere 388030e7392SEtienne Carriere token = get_token(token_id); 389030e7392SEtienne Carriere if (!token) 390030e7392SEtienne Carriere return PKCS11_CKR_SLOT_ID_INVALID; 391030e7392SEtienne Carriere 392030e7392SEtienne Carriere pad_str(info.manufacturer_id, sizeof(info.manufacturer_id)); 393030e7392SEtienne Carriere pad_str(info.model, sizeof(info.model)); 39402b4d42aSEtienne Carriere 39502b4d42aSEtienne Carriere n = snprintf(sn, sizeof(sn), "%0*"PRIu32, 39602b4d42aSEtienne Carriere (int)sizeof(info.serial_number), token_id); 39702b4d42aSEtienne Carriere if (n != (int)sizeof(info.serial_number)) 39802b4d42aSEtienne Carriere TEE_Panic(0); 39902b4d42aSEtienne Carriere 40002b4d42aSEtienne Carriere TEE_MemMove(info.serial_number, sn, sizeof(info.serial_number)); 401030e7392SEtienne Carriere pad_str(info.serial_number, sizeof(info.serial_number)); 402030e7392SEtienne Carriere 403030e7392SEtienne Carriere TEE_MemMove(info.label, token->db_main->label, sizeof(info.label)); 404030e7392SEtienne Carriere 405030e7392SEtienne Carriere info.flags = token->db_main->flags; 406030e7392SEtienne Carriere info.session_count = token->session_count; 407030e7392SEtienne Carriere info.rw_session_count = token->rw_session_count; 408030e7392SEtienne Carriere 409030e7392SEtienne Carriere TEE_MemMove(out->memref.buffer, &info, sizeof(info)); 410030e7392SEtienne Carriere 411030e7392SEtienne Carriere return PKCS11_CKR_OK; 412030e7392SEtienne Carriere } 4136f74919dSEtienne Carriere 4146f74919dSEtienne Carriere static void dmsg_print_supported_mechanism(unsigned int token_id __maybe_unused, 4156f74919dSEtienne Carriere uint32_t *array __maybe_unused, 4166f74919dSEtienne Carriere size_t count __maybe_unused) 4176f74919dSEtienne Carriere { 4186f74919dSEtienne Carriere size_t __maybe_unused n = 0; 4196f74919dSEtienne Carriere 4206f74919dSEtienne Carriere if (TRACE_LEVEL < TRACE_DEBUG) 4216f74919dSEtienne Carriere return; 4226f74919dSEtienne Carriere 4236f74919dSEtienne Carriere for (n = 0; n < count; n++) 4246f74919dSEtienne Carriere DMSG("PKCS11 token %"PRIu32": mechanism 0x%04"PRIx32": %s", 4256f74919dSEtienne Carriere token_id, array[n], id2str_mechanism(array[n])); 4266f74919dSEtienne Carriere } 4276f74919dSEtienne Carriere 4284daf39b3SJens Wiklander enum pkcs11_rc entry_ck_token_mecha_ids(uint32_t ptypes, TEE_Param *params) 4296f74919dSEtienne Carriere { 4306f74919dSEtienne Carriere const uint32_t exp_pt = TEE_PARAM_TYPES(TEE_PARAM_TYPE_MEMREF_INOUT, 4316f74919dSEtienne Carriere TEE_PARAM_TYPE_NONE, 4326f74919dSEtienne Carriere TEE_PARAM_TYPE_MEMREF_OUTPUT, 4336f74919dSEtienne Carriere TEE_PARAM_TYPE_NONE); 43439b43b78SJens Wiklander TEE_Param *ctrl = params; 43539b43b78SJens Wiklander TEE_Param *out = params + 2; 4364daf39b3SJens Wiklander enum pkcs11_rc rc = PKCS11_CKR_OK; 4376f74919dSEtienne Carriere struct serialargs ctrlargs = { }; 4386f74919dSEtienne Carriere uint32_t token_id = 0; 4396f74919dSEtienne Carriere struct ck_token __maybe_unused *token = NULL; 4406f74919dSEtienne Carriere size_t count = 0; 4416f74919dSEtienne Carriere uint32_t *array = NULL; 4426f74919dSEtienne Carriere 4436f74919dSEtienne Carriere if (ptypes != exp_pt) 4446f74919dSEtienne Carriere return PKCS11_CKR_ARGUMENTS_BAD; 4456f74919dSEtienne Carriere 4466f74919dSEtienne Carriere serialargs_init(&ctrlargs, ctrl->memref.buffer, ctrl->memref.size); 4476f74919dSEtienne Carriere 4484daf39b3SJens Wiklander rc = serialargs_get(&ctrlargs, &token_id, sizeof(token_id)); 4494daf39b3SJens Wiklander if (rc) 4504daf39b3SJens Wiklander return rc; 4516f74919dSEtienne Carriere 4526f74919dSEtienne Carriere if (serialargs_remaining_bytes(&ctrlargs)) 4536f74919dSEtienne Carriere return PKCS11_CKR_ARGUMENTS_BAD; 4546f74919dSEtienne Carriere 4556f74919dSEtienne Carriere token = get_token(token_id); 4566f74919dSEtienne Carriere if (!token) 4576f74919dSEtienne Carriere return PKCS11_CKR_SLOT_ID_INVALID; 4586f74919dSEtienne Carriere 4596f74919dSEtienne Carriere count = out->memref.size / sizeof(*array); 4606f74919dSEtienne Carriere array = tee_malloc_mechanism_list(&count); 4616f74919dSEtienne Carriere 4626f74919dSEtienne Carriere if (out->memref.size < count * sizeof(*array)) { 4636f74919dSEtienne Carriere assert(!array); 4646f74919dSEtienne Carriere out->memref.size = count * sizeof(*array); 4656459f267SEtienne Carriere if (out->memref.buffer) 4666f74919dSEtienne Carriere return PKCS11_CKR_BUFFER_TOO_SMALL; 4676459f267SEtienne Carriere else 4686459f267SEtienne Carriere return PKCS11_CKR_OK; 4696f74919dSEtienne Carriere } 4706f74919dSEtienne Carriere 4716f74919dSEtienne Carriere if (!array) 4726f74919dSEtienne Carriere return PKCS11_CKR_DEVICE_MEMORY; 4736f74919dSEtienne Carriere 4746f74919dSEtienne Carriere dmsg_print_supported_mechanism(token_id, array, count); 4756f74919dSEtienne Carriere 4766f74919dSEtienne Carriere out->memref.size = count * sizeof(*array); 4776f74919dSEtienne Carriere TEE_MemMove(out->memref.buffer, array, out->memref.size); 4786f74919dSEtienne Carriere 4796f74919dSEtienne Carriere TEE_Free(array); 4806f74919dSEtienne Carriere 4814daf39b3SJens Wiklander return rc; 4826f74919dSEtienne Carriere } 4831d3ebedbSEtienne Carriere 4844daf39b3SJens Wiklander enum pkcs11_rc entry_ck_token_mecha_info(uint32_t ptypes, TEE_Param *params) 4851d3ebedbSEtienne Carriere { 4861d3ebedbSEtienne Carriere const uint32_t exp_pt = TEE_PARAM_TYPES(TEE_PARAM_TYPE_MEMREF_INOUT, 4871d3ebedbSEtienne Carriere TEE_PARAM_TYPE_NONE, 4881d3ebedbSEtienne Carriere TEE_PARAM_TYPE_MEMREF_OUTPUT, 4891d3ebedbSEtienne Carriere TEE_PARAM_TYPE_NONE); 49039b43b78SJens Wiklander TEE_Param *ctrl = params; 49139b43b78SJens Wiklander TEE_Param *out = params + 2; 4924daf39b3SJens Wiklander enum pkcs11_rc rc = PKCS11_CKR_OK; 4931d3ebedbSEtienne Carriere struct serialargs ctrlargs = { }; 4941d3ebedbSEtienne Carriere uint32_t token_id = 0; 4951d3ebedbSEtienne Carriere uint32_t type = 0; 4961d3ebedbSEtienne Carriere struct ck_token *token = NULL; 4971d3ebedbSEtienne Carriere struct pkcs11_mechanism_info info = { }; 4981d3ebedbSEtienne Carriere 4991d3ebedbSEtienne Carriere if (ptypes != exp_pt || out->memref.size != sizeof(info)) 5001d3ebedbSEtienne Carriere return PKCS11_CKR_ARGUMENTS_BAD; 5011d3ebedbSEtienne Carriere 5021d3ebedbSEtienne Carriere serialargs_init(&ctrlargs, ctrl->memref.buffer, ctrl->memref.size); 5031d3ebedbSEtienne Carriere 5044daf39b3SJens Wiklander rc = serialargs_get(&ctrlargs, &token_id, sizeof(uint32_t)); 5054daf39b3SJens Wiklander if (rc) 5064daf39b3SJens Wiklander return rc; 5071d3ebedbSEtienne Carriere 5084daf39b3SJens Wiklander rc = serialargs_get(&ctrlargs, &type, sizeof(uint32_t)); 5094daf39b3SJens Wiklander if (rc) 5104daf39b3SJens Wiklander return rc; 5111d3ebedbSEtienne Carriere 5121d3ebedbSEtienne Carriere if (serialargs_remaining_bytes(&ctrlargs)) 5131d3ebedbSEtienne Carriere return PKCS11_CKR_ARGUMENTS_BAD; 5141d3ebedbSEtienne Carriere 5151d3ebedbSEtienne Carriere token = get_token(token_id); 5161d3ebedbSEtienne Carriere if (!token) 5171d3ebedbSEtienne Carriere return PKCS11_CKR_SLOT_ID_INVALID; 5181d3ebedbSEtienne Carriere 5191d3ebedbSEtienne Carriere if (!mechanism_is_valid(type)) 5201d3ebedbSEtienne Carriere return PKCS11_CKR_MECHANISM_INVALID; 5211d3ebedbSEtienne Carriere 5221d3ebedbSEtienne Carriere info.flags = mechanism_supported_flags(type); 5231d3ebedbSEtienne Carriere 5242d0cd829SRuchika Gupta pkcs11_mechanism_supported_key_sizes(type, &info.min_key_size, 5251d3ebedbSEtienne Carriere &info.max_key_size); 5261d3ebedbSEtienne Carriere 5271d3ebedbSEtienne Carriere TEE_MemMove(out->memref.buffer, &info, sizeof(info)); 5281d3ebedbSEtienne Carriere 5291d3ebedbSEtienne Carriere DMSG("PKCS11 token %"PRIu32": mechanism 0x%"PRIx32" info", 5301d3ebedbSEtienne Carriere token_id, type); 5311d3ebedbSEtienne Carriere 5321d3ebedbSEtienne Carriere return PKCS11_CKR_OK; 5331d3ebedbSEtienne Carriere } 5346e4f8f17SEtienne Carriere 5356e4f8f17SEtienne Carriere /* Select the ReadOnly or ReadWrite state for session login state */ 5366e4f8f17SEtienne Carriere static void set_session_state(struct pkcs11_client *client, 5376e4f8f17SEtienne Carriere struct pkcs11_session *session, bool readonly) 5386e4f8f17SEtienne Carriere { 5396e4f8f17SEtienne Carriere struct pkcs11_session *sess = NULL; 5406e4f8f17SEtienne Carriere enum pkcs11_session_state state = PKCS11_CKS_RO_PUBLIC_SESSION; 5416e4f8f17SEtienne Carriere 5426e4f8f17SEtienne Carriere /* Default to public session if no session already registered */ 5436e4f8f17SEtienne Carriere if (readonly) 5446e4f8f17SEtienne Carriere state = PKCS11_CKS_RO_PUBLIC_SESSION; 5456e4f8f17SEtienne Carriere else 5466e4f8f17SEtienne Carriere state = PKCS11_CKS_RW_PUBLIC_SESSION; 5476e4f8f17SEtienne Carriere 5486e4f8f17SEtienne Carriere /* 5496e4f8f17SEtienne Carriere * No need to check all client sessions, the first found in 5506e4f8f17SEtienne Carriere * target token gives client login configuration. 5516e4f8f17SEtienne Carriere */ 5526e4f8f17SEtienne Carriere TAILQ_FOREACH(sess, &client->session_list, link) { 5536e4f8f17SEtienne Carriere assert(sess != session); 5546e4f8f17SEtienne Carriere 5556e4f8f17SEtienne Carriere if (sess->token == session->token) { 5566e4f8f17SEtienne Carriere switch (sess->state) { 5576e4f8f17SEtienne Carriere case PKCS11_CKS_RW_PUBLIC_SESSION: 5586e4f8f17SEtienne Carriere case PKCS11_CKS_RO_PUBLIC_SESSION: 5596e4f8f17SEtienne Carriere if (readonly) 5606e4f8f17SEtienne Carriere state = PKCS11_CKS_RO_PUBLIC_SESSION; 5616e4f8f17SEtienne Carriere else 5626e4f8f17SEtienne Carriere state = PKCS11_CKS_RW_PUBLIC_SESSION; 5636e4f8f17SEtienne Carriere break; 5646e4f8f17SEtienne Carriere case PKCS11_CKS_RO_USER_FUNCTIONS: 5656e4f8f17SEtienne Carriere case PKCS11_CKS_RW_USER_FUNCTIONS: 5666e4f8f17SEtienne Carriere if (readonly) 5676e4f8f17SEtienne Carriere state = PKCS11_CKS_RO_USER_FUNCTIONS; 5686e4f8f17SEtienne Carriere else 5696e4f8f17SEtienne Carriere state = PKCS11_CKS_RW_USER_FUNCTIONS; 5706e4f8f17SEtienne Carriere break; 5716e4f8f17SEtienne Carriere case PKCS11_CKS_RW_SO_FUNCTIONS: 5726e4f8f17SEtienne Carriere if (readonly) 5736e4f8f17SEtienne Carriere TEE_Panic(0); 5746e4f8f17SEtienne Carriere else 5756e4f8f17SEtienne Carriere state = PKCS11_CKS_RW_SO_FUNCTIONS; 5766e4f8f17SEtienne Carriere break; 5776e4f8f17SEtienne Carriere default: 5786e4f8f17SEtienne Carriere TEE_Panic(0); 5796e4f8f17SEtienne Carriere } 5806e4f8f17SEtienne Carriere break; 5816e4f8f17SEtienne Carriere } 5826e4f8f17SEtienne Carriere } 5836e4f8f17SEtienne Carriere 5846e4f8f17SEtienne Carriere session->state = state; 5856e4f8f17SEtienne Carriere } 5866e4f8f17SEtienne Carriere 5874daf39b3SJens Wiklander enum pkcs11_rc entry_ck_open_session(struct pkcs11_client *client, 5886e4f8f17SEtienne Carriere uint32_t ptypes, TEE_Param *params) 5896e4f8f17SEtienne Carriere { 5906e4f8f17SEtienne Carriere const uint32_t exp_pt = TEE_PARAM_TYPES(TEE_PARAM_TYPE_MEMREF_INOUT, 5916e4f8f17SEtienne Carriere TEE_PARAM_TYPE_NONE, 5926e4f8f17SEtienne Carriere TEE_PARAM_TYPE_MEMREF_OUTPUT, 5936e4f8f17SEtienne Carriere TEE_PARAM_TYPE_NONE); 59439b43b78SJens Wiklander TEE_Param *ctrl = params; 59539b43b78SJens Wiklander TEE_Param *out = params + 2; 5964daf39b3SJens Wiklander enum pkcs11_rc rc = PKCS11_CKR_OK; 5976e4f8f17SEtienne Carriere struct serialargs ctrlargs = { }; 5986e4f8f17SEtienne Carriere uint32_t token_id = 0; 5996e4f8f17SEtienne Carriere uint32_t flags = 0; 6006e4f8f17SEtienne Carriere struct ck_token *token = NULL; 6016e4f8f17SEtienne Carriere struct pkcs11_session *session = NULL; 6026e4f8f17SEtienne Carriere bool readonly = false; 6036e4f8f17SEtienne Carriere 6046e4f8f17SEtienne Carriere if (!client || ptypes != exp_pt || 6056e4f8f17SEtienne Carriere out->memref.size != sizeof(session->handle)) 6066e4f8f17SEtienne Carriere return PKCS11_CKR_ARGUMENTS_BAD; 6076e4f8f17SEtienne Carriere 6086e4f8f17SEtienne Carriere serialargs_init(&ctrlargs, ctrl->memref.buffer, ctrl->memref.size); 6096e4f8f17SEtienne Carriere 6104daf39b3SJens Wiklander rc = serialargs_get(&ctrlargs, &token_id, sizeof(token_id)); 6114daf39b3SJens Wiklander if (rc) 6124daf39b3SJens Wiklander return rc; 6136e4f8f17SEtienne Carriere 6144daf39b3SJens Wiklander rc = serialargs_get(&ctrlargs, &flags, sizeof(flags)); 6154daf39b3SJens Wiklander if (rc) 6164daf39b3SJens Wiklander return rc; 6176e4f8f17SEtienne Carriere 6186e4f8f17SEtienne Carriere if (serialargs_remaining_bytes(&ctrlargs)) 6196e4f8f17SEtienne Carriere return PKCS11_CKR_ARGUMENTS_BAD; 6206e4f8f17SEtienne Carriere 6216e4f8f17SEtienne Carriere token = get_token(token_id); 6226e4f8f17SEtienne Carriere if (!token) 6236e4f8f17SEtienne Carriere return PKCS11_CKR_SLOT_ID_INVALID; 6246e4f8f17SEtienne Carriere 6256e4f8f17SEtienne Carriere /* Sanitize session flags */ 62608774c86SVesa Jääskeläinen if (!(flags & PKCS11_CKFSS_SERIAL_SESSION)) 62708774c86SVesa Jääskeläinen return PKCS11_CKR_SESSION_PARALLEL_NOT_SUPPORTED; 62808774c86SVesa Jääskeläinen 62908774c86SVesa Jääskeläinen if (flags & ~(PKCS11_CKFSS_RW_SESSION | PKCS11_CKFSS_SERIAL_SESSION)) 6306e4f8f17SEtienne Carriere return PKCS11_CKR_ARGUMENTS_BAD; 6316e4f8f17SEtienne Carriere 6326e4f8f17SEtienne Carriere readonly = !(flags & PKCS11_CKFSS_RW_SESSION); 6336e4f8f17SEtienne Carriere 6346e4f8f17SEtienne Carriere if (!readonly && token->state == PKCS11_TOKEN_READ_ONLY) 6356e4f8f17SEtienne Carriere return PKCS11_CKR_TOKEN_WRITE_PROTECTED; 6366e4f8f17SEtienne Carriere 6376e4f8f17SEtienne Carriere if (readonly) { 6386e4f8f17SEtienne Carriere /* Specifically reject read-only session under SO login */ 6396e4f8f17SEtienne Carriere TAILQ_FOREACH(session, &client->session_list, link) 6406e4f8f17SEtienne Carriere if (pkcs11_session_is_so(session)) 6416e4f8f17SEtienne Carriere return PKCS11_CKR_SESSION_READ_WRITE_SO_EXISTS; 6426e4f8f17SEtienne Carriere } 6436e4f8f17SEtienne Carriere 6446e4f8f17SEtienne Carriere session = TEE_Malloc(sizeof(*session), TEE_MALLOC_FILL_ZERO); 6456e4f8f17SEtienne Carriere if (!session) 6466e4f8f17SEtienne Carriere return PKCS11_CKR_DEVICE_MEMORY; 6476e4f8f17SEtienne Carriere 6486e4f8f17SEtienne Carriere session->handle = handle_get(&client->session_handle_db, session); 6496e4f8f17SEtienne Carriere if (!session->handle) { 6506e4f8f17SEtienne Carriere TEE_Free(session); 6516e4f8f17SEtienne Carriere return PKCS11_CKR_DEVICE_MEMORY; 6526e4f8f17SEtienne Carriere } 6536e4f8f17SEtienne Carriere 6546e4f8f17SEtienne Carriere session->token = token; 6556e4f8f17SEtienne Carriere session->client = client; 6566e4f8f17SEtienne Carriere 657b56b3d07SJens Wiklander LIST_INIT(&session->object_list); 658b56b3d07SJens Wiklander 6596e4f8f17SEtienne Carriere set_session_state(client, session, readonly); 6606e4f8f17SEtienne Carriere 6616e4f8f17SEtienne Carriere TAILQ_INSERT_HEAD(&client->session_list, session, link); 6626e4f8f17SEtienne Carriere 6636e4f8f17SEtienne Carriere session->token->session_count++; 6646e4f8f17SEtienne Carriere if (!readonly) 6656e4f8f17SEtienne Carriere session->token->rw_session_count++; 6666e4f8f17SEtienne Carriere 6676e4f8f17SEtienne Carriere TEE_MemMove(out->memref.buffer, &session->handle, 6686e4f8f17SEtienne Carriere sizeof(session->handle)); 6696e4f8f17SEtienne Carriere 6706e4f8f17SEtienne Carriere DMSG("Open PKCS11 session %"PRIu32, session->handle); 6716e4f8f17SEtienne Carriere 6726e4f8f17SEtienne Carriere return PKCS11_CKR_OK; 6736e4f8f17SEtienne Carriere } 6746e4f8f17SEtienne Carriere 6756e4f8f17SEtienne Carriere static void close_ck_session(struct pkcs11_session *session) 6766e4f8f17SEtienne Carriere { 67755e6965cSEtienne Carriere release_active_processing(session); 678bc555ee0SVesa Jääskeläinen release_session_find_obj_context(session); 67955e6965cSEtienne Carriere 680bc555ee0SVesa Jääskeläinen /* Release all session objects */ 681b56b3d07SJens Wiklander while (!LIST_EMPTY(&session->object_list)) 682b56b3d07SJens Wiklander destroy_object(session, 683b56b3d07SJens Wiklander LIST_FIRST(&session->object_list), true); 684b56b3d07SJens Wiklander 6856e4f8f17SEtienne Carriere TAILQ_REMOVE(&session->client->session_list, session, link); 6866e4f8f17SEtienne Carriere handle_put(&session->client->session_handle_db, session->handle); 6876e4f8f17SEtienne Carriere 6886e4f8f17SEtienne Carriere session->token->session_count--; 6896e4f8f17SEtienne Carriere if (pkcs11_session_is_read_write(session)) 6906e4f8f17SEtienne Carriere session->token->rw_session_count--; 6916e4f8f17SEtienne Carriere 6926e4f8f17SEtienne Carriere TEE_Free(session); 6936e4f8f17SEtienne Carriere 6946e4f8f17SEtienne Carriere DMSG("Close PKCS11 session %"PRIu32, session->handle); 6956e4f8f17SEtienne Carriere } 6966e4f8f17SEtienne Carriere 6974daf39b3SJens Wiklander enum pkcs11_rc entry_ck_close_session(struct pkcs11_client *client, 6986e4f8f17SEtienne Carriere uint32_t ptypes, TEE_Param *params) 6996e4f8f17SEtienne Carriere { 7006e4f8f17SEtienne Carriere const uint32_t exp_pt = TEE_PARAM_TYPES(TEE_PARAM_TYPE_MEMREF_INOUT, 7016e4f8f17SEtienne Carriere TEE_PARAM_TYPE_NONE, 7026e4f8f17SEtienne Carriere TEE_PARAM_TYPE_NONE, 7036e4f8f17SEtienne Carriere TEE_PARAM_TYPE_NONE); 70439b43b78SJens Wiklander TEE_Param *ctrl = params; 7054daf39b3SJens Wiklander enum pkcs11_rc rc = PKCS11_CKR_OK; 7066e4f8f17SEtienne Carriere struct serialargs ctrlargs = { }; 7076e4f8f17SEtienne Carriere struct pkcs11_session *session = NULL; 7086e4f8f17SEtienne Carriere 7096e4f8f17SEtienne Carriere if (!client || ptypes != exp_pt) 7106e4f8f17SEtienne Carriere return PKCS11_CKR_ARGUMENTS_BAD; 7116e4f8f17SEtienne Carriere 7126e4f8f17SEtienne Carriere serialargs_init(&ctrlargs, ctrl->memref.buffer, ctrl->memref.size); 7136e4f8f17SEtienne Carriere 7144daf39b3SJens Wiklander rc = serialargs_get_session_from_handle(&ctrlargs, client, &session); 7154daf39b3SJens Wiklander if (rc) 7164daf39b3SJens Wiklander return rc; 7176e4f8f17SEtienne Carriere 7186e4f8f17SEtienne Carriere if (serialargs_remaining_bytes(&ctrlargs)) 7196e4f8f17SEtienne Carriere return PKCS11_CKR_ARGUMENTS_BAD; 7206e4f8f17SEtienne Carriere 7216e4f8f17SEtienne Carriere close_ck_session(session); 7226e4f8f17SEtienne Carriere 7236e4f8f17SEtienne Carriere return PKCS11_CKR_OK; 7246e4f8f17SEtienne Carriere } 7256e4f8f17SEtienne Carriere 7264daf39b3SJens Wiklander enum pkcs11_rc entry_ck_close_all_sessions(struct pkcs11_client *client, 7276e4f8f17SEtienne Carriere uint32_t ptypes, TEE_Param *params) 7286e4f8f17SEtienne Carriere { 7296e4f8f17SEtienne Carriere const uint32_t exp_pt = TEE_PARAM_TYPES(TEE_PARAM_TYPE_MEMREF_INOUT, 7306e4f8f17SEtienne Carriere TEE_PARAM_TYPE_NONE, 7316e4f8f17SEtienne Carriere TEE_PARAM_TYPE_NONE, 7326e4f8f17SEtienne Carriere TEE_PARAM_TYPE_NONE); 73339b43b78SJens Wiklander TEE_Param *ctrl = params; 7344daf39b3SJens Wiklander enum pkcs11_rc rc = PKCS11_CKR_OK; 7356e4f8f17SEtienne Carriere struct serialargs ctrlargs = { }; 7366e4f8f17SEtienne Carriere uint32_t token_id = 0; 7376e4f8f17SEtienne Carriere struct ck_token *token = NULL; 7386e4f8f17SEtienne Carriere struct pkcs11_session *session = NULL; 7396e4f8f17SEtienne Carriere struct pkcs11_session *next = NULL; 7406e4f8f17SEtienne Carriere 7416e4f8f17SEtienne Carriere if (!client || ptypes != exp_pt) 7426e4f8f17SEtienne Carriere return PKCS11_CKR_ARGUMENTS_BAD; 7436e4f8f17SEtienne Carriere 7446e4f8f17SEtienne Carriere serialargs_init(&ctrlargs, ctrl->memref.buffer, ctrl->memref.size); 7456e4f8f17SEtienne Carriere 7464daf39b3SJens Wiklander rc = serialargs_get(&ctrlargs, &token_id, sizeof(uint32_t)); 7474daf39b3SJens Wiklander if (rc) 7484daf39b3SJens Wiklander return rc; 7496e4f8f17SEtienne Carriere 7506e4f8f17SEtienne Carriere if (serialargs_remaining_bytes(&ctrlargs)) 7516e4f8f17SEtienne Carriere return PKCS11_CKR_ARGUMENTS_BAD; 7526e4f8f17SEtienne Carriere 7536e4f8f17SEtienne Carriere token = get_token(token_id); 7546e4f8f17SEtienne Carriere if (!token) 7556e4f8f17SEtienne Carriere return PKCS11_CKR_SLOT_ID_INVALID; 7566e4f8f17SEtienne Carriere 7576e4f8f17SEtienne Carriere DMSG("Close all sessions for PKCS11 token %"PRIu32, token_id); 7586e4f8f17SEtienne Carriere 7596e4f8f17SEtienne Carriere TAILQ_FOREACH_SAFE(session, &client->session_list, link, next) 7606e4f8f17SEtienne Carriere if (session->token == token) 7616e4f8f17SEtienne Carriere close_ck_session(session); 7626e4f8f17SEtienne Carriere 7636e4f8f17SEtienne Carriere return PKCS11_CKR_OK; 7646e4f8f17SEtienne Carriere } 7656e4f8f17SEtienne Carriere 7664daf39b3SJens Wiklander enum pkcs11_rc entry_ck_session_info(struct pkcs11_client *client, 7676e4f8f17SEtienne Carriere uint32_t ptypes, TEE_Param *params) 7686e4f8f17SEtienne Carriere { 7696e4f8f17SEtienne Carriere const uint32_t exp_pt = TEE_PARAM_TYPES(TEE_PARAM_TYPE_MEMREF_INOUT, 7706e4f8f17SEtienne Carriere TEE_PARAM_TYPE_NONE, 7716e4f8f17SEtienne Carriere TEE_PARAM_TYPE_MEMREF_OUTPUT, 7726e4f8f17SEtienne Carriere TEE_PARAM_TYPE_NONE); 77339b43b78SJens Wiklander TEE_Param *ctrl = params; 77439b43b78SJens Wiklander TEE_Param *out = params + 2; 7754daf39b3SJens Wiklander enum pkcs11_rc rc = PKCS11_CKR_OK; 7766e4f8f17SEtienne Carriere struct serialargs ctrlargs = { }; 7776e4f8f17SEtienne Carriere struct pkcs11_session *session = NULL; 7786e4f8f17SEtienne Carriere struct pkcs11_session_info info = { 7796e4f8f17SEtienne Carriere .flags = PKCS11_CKFSS_SERIAL_SESSION, 7806e4f8f17SEtienne Carriere }; 7816e4f8f17SEtienne Carriere 7826e4f8f17SEtienne Carriere if (!client || ptypes != exp_pt || out->memref.size != sizeof(info)) 7836e4f8f17SEtienne Carriere return PKCS11_CKR_ARGUMENTS_BAD; 7846e4f8f17SEtienne Carriere 7856e4f8f17SEtienne Carriere serialargs_init(&ctrlargs, ctrl->memref.buffer, ctrl->memref.size); 7866e4f8f17SEtienne Carriere 7874daf39b3SJens Wiklander rc = serialargs_get_session_from_handle(&ctrlargs, client, &session); 7884daf39b3SJens Wiklander if (rc) 7894daf39b3SJens Wiklander return rc; 7906e4f8f17SEtienne Carriere 7916e4f8f17SEtienne Carriere if (serialargs_remaining_bytes(&ctrlargs)) 7926e4f8f17SEtienne Carriere return PKCS11_CKR_ARGUMENTS_BAD; 7936e4f8f17SEtienne Carriere 7946e4f8f17SEtienne Carriere info.slot_id = get_token_id(session->token); 7956e4f8f17SEtienne Carriere info.state = session->state; 7966e4f8f17SEtienne Carriere if (pkcs11_session_is_read_write(session)) 7976e4f8f17SEtienne Carriere info.flags |= PKCS11_CKFSS_RW_SESSION; 7986e4f8f17SEtienne Carriere 7996e4f8f17SEtienne Carriere TEE_MemMove(out->memref.buffer, &info, sizeof(info)); 8006e4f8f17SEtienne Carriere 8016e4f8f17SEtienne Carriere DMSG("Get find on PKCS11 session %"PRIu32, session->handle); 8026e4f8f17SEtienne Carriere 8036e4f8f17SEtienne Carriere return PKCS11_CKR_OK; 8046e4f8f17SEtienne Carriere } 805f485be04SJens Wiklander 8064daf39b3SJens Wiklander enum pkcs11_rc entry_ck_token_initialize(uint32_t ptypes, TEE_Param *params) 807f485be04SJens Wiklander { 808f485be04SJens Wiklander const uint32_t exp_pt = TEE_PARAM_TYPES(TEE_PARAM_TYPE_MEMREF_INOUT, 809f485be04SJens Wiklander TEE_PARAM_TYPE_NONE, 810f485be04SJens Wiklander TEE_PARAM_TYPE_NONE, 811f485be04SJens Wiklander TEE_PARAM_TYPE_NONE); 812f485be04SJens Wiklander char label[PKCS11_TOKEN_LABEL_SIZE] = { 0 }; 813f485be04SJens Wiklander struct pkcs11_client *client = NULL; 814f485be04SJens Wiklander struct pkcs11_session *sess = NULL; 815f485be04SJens Wiklander enum pkcs11_rc rc = PKCS11_CKR_OK; 816f485be04SJens Wiklander struct serialargs ctrlargs = { }; 817f485be04SJens Wiklander struct ck_token *token = NULL; 818f485be04SJens Wiklander TEE_Param *ctrl = params; 819f485be04SJens Wiklander uint32_t token_id = 0; 820f485be04SJens Wiklander uint32_t pin_size = 0; 821f485be04SJens Wiklander void *pin = NULL; 8227f12c782SRobin van der Gracht struct pkcs11_object *obj = NULL; 823f485be04SJens Wiklander 824f485be04SJens Wiklander if (ptypes != exp_pt) 825f485be04SJens Wiklander return PKCS11_CKR_ARGUMENTS_BAD; 826f485be04SJens Wiklander 827f485be04SJens Wiklander serialargs_init(&ctrlargs, ctrl->memref.buffer, ctrl->memref.size); 828f485be04SJens Wiklander 829f485be04SJens Wiklander rc = serialargs_get(&ctrlargs, &token_id, sizeof(uint32_t)); 830f485be04SJens Wiklander if (rc) 831f485be04SJens Wiklander return rc; 832f485be04SJens Wiklander 833f485be04SJens Wiklander rc = serialargs_get(&ctrlargs, &pin_size, sizeof(uint32_t)); 834f485be04SJens Wiklander if (rc) 835f485be04SJens Wiklander return rc; 836f485be04SJens Wiklander 837f485be04SJens Wiklander rc = serialargs_get(&ctrlargs, &label, PKCS11_TOKEN_LABEL_SIZE); 838f485be04SJens Wiklander if (rc) 839f485be04SJens Wiklander return rc; 840f485be04SJens Wiklander 841f485be04SJens Wiklander rc = serialargs_get_ptr(&ctrlargs, &pin, pin_size); 842f485be04SJens Wiklander if (rc) 843f485be04SJens Wiklander return rc; 844f485be04SJens Wiklander 845f485be04SJens Wiklander if (serialargs_remaining_bytes(&ctrlargs)) 846f485be04SJens Wiklander return PKCS11_CKR_ARGUMENTS_BAD; 847f485be04SJens Wiklander 848f485be04SJens Wiklander token = get_token(token_id); 849f485be04SJens Wiklander if (!token) 850f485be04SJens Wiklander return PKCS11_CKR_SLOT_ID_INVALID; 851f485be04SJens Wiklander 852f485be04SJens Wiklander if (token->db_main->flags & PKCS11_CKFT_SO_PIN_LOCKED) { 853f485be04SJens Wiklander IMSG("Token %"PRIu32": SO PIN locked", token_id); 854f485be04SJens Wiklander return PKCS11_CKR_PIN_LOCKED; 855f485be04SJens Wiklander } 856f485be04SJens Wiklander 857f485be04SJens Wiklander /* Check there's no open session on this token */ 858f485be04SJens Wiklander TAILQ_FOREACH(client, &pkcs11_client_list, link) 859f485be04SJens Wiklander TAILQ_FOREACH(sess, &client->session_list, link) 860f485be04SJens Wiklander if (sess->token == token) 861f485be04SJens Wiklander return PKCS11_CKR_SESSION_EXISTS; 862f485be04SJens Wiklander 8631a27b197SVesa Jääskeläinen #if defined(CFG_PKCS11_TA_AUTH_TEE_IDENTITY) 8641a27b197SVesa Jääskeläinen /* Check TEE Identity based authentication if enabled */ 8651a27b197SVesa Jääskeläinen if (token->db_main->flags & PKCS11_CKFT_PROTECTED_AUTHENTICATION_PATH) { 866f44a7a58SEtienne Carriere rc = verify_identity_auth(token, PKCS11_CKU_SO); 8671a27b197SVesa Jääskeläinen if (rc) 8681a27b197SVesa Jääskeläinen return rc; 8691a27b197SVesa Jääskeläinen } 8701a27b197SVesa Jääskeläinen 8711a27b197SVesa Jääskeläinen /* Detect TEE Identity based ACL usage activation with NULL PIN */ 8721a27b197SVesa Jääskeläinen if (!pin) { 8731a27b197SVesa Jääskeläinen rc = setup_so_identity_auth_from_client(token); 8741a27b197SVesa Jääskeläinen if (rc) 8751a27b197SVesa Jääskeläinen return rc; 8761a27b197SVesa Jääskeläinen 8771a27b197SVesa Jääskeläinen goto inited; 8781a27b197SVesa Jääskeläinen } else { 8791a27b197SVesa Jääskeläinen /* De-activate TEE Identity based authentication */ 8801a27b197SVesa Jääskeläinen token->db_main->flags &= 8811a27b197SVesa Jääskeläinen ~PKCS11_CKFT_PROTECTED_AUTHENTICATION_PATH; 8821a27b197SVesa Jääskeläinen } 8831a27b197SVesa Jääskeläinen #endif /* CFG_PKCS11_TA_AUTH_TEE_IDENTITY */ 8841a27b197SVesa Jääskeläinen 885f485be04SJens Wiklander if (!token->db_main->so_pin_salt) { 886f485be04SJens Wiklander /* 887f485be04SJens Wiklander * The spec doesn't permit returning 888f485be04SJens Wiklander * PKCS11_CKR_PIN_LEN_RANGE for this function, take another 889f485be04SJens Wiklander * error code. 890f485be04SJens Wiklander */ 891f485be04SJens Wiklander if (pin_size < PKCS11_TOKEN_PIN_SIZE_MIN || 892f485be04SJens Wiklander pin_size > PKCS11_TOKEN_PIN_SIZE_MAX) 893f485be04SJens Wiklander return PKCS11_CKR_ARGUMENTS_BAD; 894f485be04SJens Wiklander 895f485be04SJens Wiklander rc = hash_pin(PKCS11_CKU_SO, pin, pin_size, 896f485be04SJens Wiklander &token->db_main->so_pin_salt, 897f485be04SJens Wiklander token->db_main->so_pin_hash); 898f485be04SJens Wiklander if (rc) 899f485be04SJens Wiklander return rc; 900f485be04SJens Wiklander 901f485be04SJens Wiklander goto inited; 902f485be04SJens Wiklander } 903f485be04SJens Wiklander 904f485be04SJens Wiklander rc = verify_pin(PKCS11_CKU_SO, pin, pin_size, 905f485be04SJens Wiklander token->db_main->so_pin_salt, 906f485be04SJens Wiklander token->db_main->so_pin_hash); 907f485be04SJens Wiklander if (rc) { 908f485be04SJens Wiklander unsigned int pin_count = 0; 909f485be04SJens Wiklander 910f485be04SJens Wiklander if (rc != PKCS11_CKR_PIN_INCORRECT) 911f485be04SJens Wiklander return rc; 912f485be04SJens Wiklander 913f485be04SJens Wiklander token->db_main->flags |= PKCS11_CKFT_SO_PIN_COUNT_LOW; 914f485be04SJens Wiklander token->db_main->so_pin_count++; 915f485be04SJens Wiklander 916f485be04SJens Wiklander pin_count = token->db_main->so_pin_count; 917f485be04SJens Wiklander if (pin_count == PKCS11_TOKEN_SO_PIN_COUNT_MAX - 1) 918f485be04SJens Wiklander token->db_main->flags |= PKCS11_CKFT_SO_PIN_FINAL_TRY; 919f485be04SJens Wiklander if (pin_count == PKCS11_TOKEN_SO_PIN_COUNT_MAX) 920f485be04SJens Wiklander token->db_main->flags |= PKCS11_CKFT_SO_PIN_LOCKED; 921f485be04SJens Wiklander 922f485be04SJens Wiklander update_persistent_db(token); 923f485be04SJens Wiklander 924f485be04SJens Wiklander return PKCS11_CKR_PIN_INCORRECT; 925f485be04SJens Wiklander } 926f485be04SJens Wiklander 92712253e9eSVesa Jääskeläinen inited: 92812253e9eSVesa Jääskeläinen /* Make sure SO PIN counters are zeroed */ 929f485be04SJens Wiklander token->db_main->flags &= ~(PKCS11_CKFT_SO_PIN_COUNT_LOW | 93012253e9eSVesa Jääskeläinen PKCS11_CKFT_SO_PIN_FINAL_TRY | 93112253e9eSVesa Jääskeläinen PKCS11_CKFT_SO_PIN_LOCKED | 93212253e9eSVesa Jääskeläinen PKCS11_CKFT_SO_PIN_TO_BE_CHANGED); 933f485be04SJens Wiklander token->db_main->so_pin_count = 0; 934f485be04SJens Wiklander 935f485be04SJens Wiklander TEE_MemMove(token->db_main->label, label, PKCS11_TOKEN_LABEL_SIZE); 936f485be04SJens Wiklander token->db_main->flags |= PKCS11_CKFT_TOKEN_INITIALIZED; 937f485be04SJens Wiklander /* Reset user PIN */ 938f485be04SJens Wiklander token->db_main->user_pin_salt = 0; 939f485be04SJens Wiklander token->db_main->flags &= ~(PKCS11_CKFT_USER_PIN_INITIALIZED | 940f485be04SJens Wiklander PKCS11_CKFT_USER_PIN_COUNT_LOW | 941f485be04SJens Wiklander PKCS11_CKFT_USER_PIN_FINAL_TRY | 942f485be04SJens Wiklander PKCS11_CKFT_USER_PIN_LOCKED | 943f485be04SJens Wiklander PKCS11_CKFT_USER_PIN_TO_BE_CHANGED); 944f485be04SJens Wiklander 945f485be04SJens Wiklander update_persistent_db(token); 946f485be04SJens Wiklander 9477f12c782SRobin van der Gracht /* Remove all persistent objects */ 9487f12c782SRobin van der Gracht while (!LIST_EMPTY(&token->object_list)) { 9497f12c782SRobin van der Gracht obj = LIST_FIRST(&token->object_list); 9507f12c782SRobin van der Gracht 9517f12c782SRobin van der Gracht /* Try twice otherwise panic! */ 9527f12c782SRobin van der Gracht if (unregister_persistent_object(token, obj->uuid) && 9537f12c782SRobin van der Gracht unregister_persistent_object(token, obj->uuid)) 9547f12c782SRobin van der Gracht TEE_Panic(0); 9557f12c782SRobin van der Gracht 9567f12c782SRobin van der Gracht cleanup_persistent_object(obj, token); 9577f12c782SRobin van der Gracht } 9587f12c782SRobin van der Gracht 959f485be04SJens Wiklander IMSG("PKCS11 token %"PRIu32": initialized", token_id); 960f485be04SJens Wiklander 961f485be04SJens Wiklander return PKCS11_CKR_OK; 962f485be04SJens Wiklander } 963e8dbd92cSJens Wiklander 964e8dbd92cSJens Wiklander static enum pkcs11_rc set_pin(struct pkcs11_session *session, 965e8dbd92cSJens Wiklander uint8_t *new_pin, size_t new_pin_size, 966e8dbd92cSJens Wiklander enum pkcs11_user_type user_type) 967e8dbd92cSJens Wiklander { 9681e497011SVesa Jääskeläinen struct ck_token *token = session->token; 969e8dbd92cSJens Wiklander enum pkcs11_rc rc = PKCS11_CKR_OK; 970e8dbd92cSJens Wiklander uint32_t flags_clear = 0; 971e8dbd92cSJens Wiklander uint32_t flags_set = 0; 972e8dbd92cSJens Wiklander 9731e497011SVesa Jääskeläinen if (token->db_main->flags & PKCS11_CKFT_WRITE_PROTECTED) 974e8dbd92cSJens Wiklander return PKCS11_CKR_TOKEN_WRITE_PROTECTED; 975e8dbd92cSJens Wiklander 976e8dbd92cSJens Wiklander if (!pkcs11_session_is_read_write(session)) 977e8dbd92cSJens Wiklander return PKCS11_CKR_SESSION_READ_ONLY; 978e8dbd92cSJens Wiklander 9791a27b197SVesa Jääskeläinen if (IS_ENABLED(CFG_PKCS11_TA_AUTH_TEE_IDENTITY) && 9801a27b197SVesa Jääskeläinen token->db_main->flags & PKCS11_CKFT_PROTECTED_AUTHENTICATION_PATH) { 9811a27b197SVesa Jääskeläinen rc = setup_identity_auth_from_pin(token, user_type, new_pin, 9821a27b197SVesa Jääskeläinen new_pin_size); 9831a27b197SVesa Jääskeläinen if (rc) 9841a27b197SVesa Jääskeläinen return rc; 9851a27b197SVesa Jääskeläinen 9861a27b197SVesa Jääskeläinen goto update_db; 9871a27b197SVesa Jääskeläinen } 9881a27b197SVesa Jääskeläinen 989e8dbd92cSJens Wiklander if (new_pin_size < PKCS11_TOKEN_PIN_SIZE_MIN || 990e8dbd92cSJens Wiklander new_pin_size > PKCS11_TOKEN_PIN_SIZE_MAX) 991e8dbd92cSJens Wiklander return PKCS11_CKR_PIN_LEN_RANGE; 992e8dbd92cSJens Wiklander 993e8dbd92cSJens Wiklander switch (user_type) { 994e8dbd92cSJens Wiklander case PKCS11_CKU_SO: 995e8dbd92cSJens Wiklander rc = hash_pin(user_type, new_pin, new_pin_size, 9961e497011SVesa Jääskeläinen &token->db_main->so_pin_salt, 9971e497011SVesa Jääskeläinen token->db_main->so_pin_hash); 998e8dbd92cSJens Wiklander if (rc) 999e8dbd92cSJens Wiklander return rc; 10001e497011SVesa Jääskeläinen token->db_main->so_pin_count = 0; 1001e8dbd92cSJens Wiklander flags_clear = PKCS11_CKFT_SO_PIN_COUNT_LOW | 1002e8dbd92cSJens Wiklander PKCS11_CKFT_SO_PIN_FINAL_TRY | 1003e8dbd92cSJens Wiklander PKCS11_CKFT_SO_PIN_LOCKED | 1004e8dbd92cSJens Wiklander PKCS11_CKFT_SO_PIN_TO_BE_CHANGED; 1005e8dbd92cSJens Wiklander break; 1006e8dbd92cSJens Wiklander case PKCS11_CKU_USER: 1007e8dbd92cSJens Wiklander rc = hash_pin(user_type, new_pin, new_pin_size, 10081e497011SVesa Jääskeläinen &token->db_main->user_pin_salt, 10091e497011SVesa Jääskeläinen token->db_main->user_pin_hash); 1010e8dbd92cSJens Wiklander if (rc) 1011e8dbd92cSJens Wiklander return rc; 10121e497011SVesa Jääskeläinen token->db_main->user_pin_count = 0; 1013e8dbd92cSJens Wiklander flags_clear = PKCS11_CKFT_USER_PIN_COUNT_LOW | 1014e8dbd92cSJens Wiklander PKCS11_CKFT_USER_PIN_FINAL_TRY | 1015e8dbd92cSJens Wiklander PKCS11_CKFT_USER_PIN_LOCKED | 1016e8dbd92cSJens Wiklander PKCS11_CKFT_USER_PIN_TO_BE_CHANGED; 1017e8dbd92cSJens Wiklander flags_set = PKCS11_CKFT_USER_PIN_INITIALIZED; 1018e8dbd92cSJens Wiklander break; 1019e8dbd92cSJens Wiklander default: 1020e8dbd92cSJens Wiklander return PKCS11_CKR_FUNCTION_FAILED; 1021e8dbd92cSJens Wiklander } 1022e8dbd92cSJens Wiklander 10231a27b197SVesa Jääskeläinen update_db: 10241e497011SVesa Jääskeläinen token->db_main->flags &= ~flags_clear; 10251e497011SVesa Jääskeläinen token->db_main->flags |= flags_set; 1026e8dbd92cSJens Wiklander 10271e497011SVesa Jääskeläinen update_persistent_db(token); 1028e8dbd92cSJens Wiklander 1029e8dbd92cSJens Wiklander return PKCS11_CKR_OK; 1030e8dbd92cSJens Wiklander } 1031e8dbd92cSJens Wiklander 10324daf39b3SJens Wiklander enum pkcs11_rc entry_ck_init_pin(struct pkcs11_client *client, 1033e8dbd92cSJens Wiklander uint32_t ptypes, TEE_Param *params) 1034e8dbd92cSJens Wiklander { 1035e8dbd92cSJens Wiklander const uint32_t exp_pt = TEE_PARAM_TYPES(TEE_PARAM_TYPE_MEMREF_INOUT, 1036e8dbd92cSJens Wiklander TEE_PARAM_TYPE_NONE, 1037e8dbd92cSJens Wiklander TEE_PARAM_TYPE_NONE, 1038e8dbd92cSJens Wiklander TEE_PARAM_TYPE_NONE); 1039e8dbd92cSJens Wiklander struct pkcs11_session *session = NULL; 1040e8dbd92cSJens Wiklander enum pkcs11_rc rc = PKCS11_CKR_OK; 1041e8dbd92cSJens Wiklander struct serialargs ctrlargs = { }; 1042e8dbd92cSJens Wiklander TEE_Param *ctrl = params; 1043e8dbd92cSJens Wiklander uint32_t pin_size = 0; 1044e8dbd92cSJens Wiklander void *pin = NULL; 1045e8dbd92cSJens Wiklander 1046e8dbd92cSJens Wiklander if (!client || ptypes != exp_pt) 1047e8dbd92cSJens Wiklander return PKCS11_CKR_ARGUMENTS_BAD; 1048e8dbd92cSJens Wiklander 1049e8dbd92cSJens Wiklander serialargs_init(&ctrlargs, ctrl->memref.buffer, ctrl->memref.size); 1050e8dbd92cSJens Wiklander 1051f40f331fSEtienne Carriere rc = serialargs_get_session_from_handle(&ctrlargs, client, &session); 1052e8dbd92cSJens Wiklander if (rc) 1053e8dbd92cSJens Wiklander return rc; 1054e8dbd92cSJens Wiklander 1055e8dbd92cSJens Wiklander rc = serialargs_get(&ctrlargs, &pin_size, sizeof(uint32_t)); 1056e8dbd92cSJens Wiklander if (rc) 1057e8dbd92cSJens Wiklander return rc; 1058e8dbd92cSJens Wiklander 1059e8dbd92cSJens Wiklander rc = serialargs_get_ptr(&ctrlargs, &pin, pin_size); 1060e8dbd92cSJens Wiklander if (rc) 1061e8dbd92cSJens Wiklander return rc; 1062e8dbd92cSJens Wiklander 1063e8dbd92cSJens Wiklander if (serialargs_remaining_bytes(&ctrlargs)) 1064e8dbd92cSJens Wiklander return PKCS11_CKR_ARGUMENTS_BAD; 1065e8dbd92cSJens Wiklander 1066e8dbd92cSJens Wiklander if (!pkcs11_session_is_so(session)) 1067e8dbd92cSJens Wiklander return PKCS11_CKR_USER_NOT_LOGGED_IN; 1068e8dbd92cSJens Wiklander 1069e8dbd92cSJens Wiklander assert(session->token->db_main->flags & PKCS11_CKFT_TOKEN_INITIALIZED); 1070e8dbd92cSJens Wiklander 1071f40f331fSEtienne Carriere IMSG("PKCS11 session %"PRIu32": init PIN", session->handle); 1072e8dbd92cSJens Wiklander 1073e8dbd92cSJens Wiklander return set_pin(session, pin, pin_size, PKCS11_CKU_USER); 1074e8dbd92cSJens Wiklander } 10751dbb91e7SJens Wiklander 10764daf39b3SJens Wiklander static enum pkcs11_rc check_so_pin(struct pkcs11_session *session, 10771dbb91e7SJens Wiklander uint8_t *pin, size_t pin_size) 10781dbb91e7SJens Wiklander { 10791dbb91e7SJens Wiklander struct ck_token *token = session->token; 10801dbb91e7SJens Wiklander enum pkcs11_rc rc = PKCS11_CKR_OK; 10811dbb91e7SJens Wiklander 10821dbb91e7SJens Wiklander assert(token->db_main->flags & PKCS11_CKFT_TOKEN_INITIALIZED); 10831dbb91e7SJens Wiklander 10841a27b197SVesa Jääskeläinen if (IS_ENABLED(CFG_PKCS11_TA_AUTH_TEE_IDENTITY) && 10851a27b197SVesa Jääskeläinen token->db_main->flags & PKCS11_CKFT_PROTECTED_AUTHENTICATION_PATH) 10861a27b197SVesa Jääskeläinen return verify_identity_auth(token, PKCS11_CKU_SO); 10871a27b197SVesa Jääskeläinen 10881dbb91e7SJens Wiklander if (token->db_main->flags & PKCS11_CKFT_SO_PIN_LOCKED) 10891dbb91e7SJens Wiklander return PKCS11_CKR_PIN_LOCKED; 10901dbb91e7SJens Wiklander 10911dbb91e7SJens Wiklander rc = verify_pin(PKCS11_CKU_SO, pin, pin_size, 10921dbb91e7SJens Wiklander token->db_main->so_pin_salt, 10931dbb91e7SJens Wiklander token->db_main->so_pin_hash); 10941dbb91e7SJens Wiklander if (rc) { 10951dbb91e7SJens Wiklander unsigned int pin_count = 0; 10961dbb91e7SJens Wiklander 10971dbb91e7SJens Wiklander if (rc != PKCS11_CKR_PIN_INCORRECT) 10981dbb91e7SJens Wiklander return rc; 10991dbb91e7SJens Wiklander 11001dbb91e7SJens Wiklander token->db_main->flags |= PKCS11_CKFT_SO_PIN_COUNT_LOW; 11011dbb91e7SJens Wiklander token->db_main->so_pin_count++; 11021dbb91e7SJens Wiklander 11031dbb91e7SJens Wiklander pin_count = token->db_main->so_pin_count; 11041dbb91e7SJens Wiklander if (pin_count == PKCS11_TOKEN_SO_PIN_COUNT_MAX - 1) 11051dbb91e7SJens Wiklander token->db_main->flags |= PKCS11_CKFT_SO_PIN_FINAL_TRY; 11061dbb91e7SJens Wiklander if (pin_count == PKCS11_TOKEN_SO_PIN_COUNT_MAX) 11071dbb91e7SJens Wiklander token->db_main->flags |= PKCS11_CKFT_SO_PIN_LOCKED; 11081dbb91e7SJens Wiklander 11091dbb91e7SJens Wiklander update_persistent_db(token); 11101dbb91e7SJens Wiklander 11111dbb91e7SJens Wiklander if (token->db_main->flags & PKCS11_CKFT_SO_PIN_LOCKED) 11121dbb91e7SJens Wiklander return PKCS11_CKR_PIN_LOCKED; 11131dbb91e7SJens Wiklander 11141dbb91e7SJens Wiklander return PKCS11_CKR_PIN_INCORRECT; 11151dbb91e7SJens Wiklander } 11161dbb91e7SJens Wiklander 11171dbb91e7SJens Wiklander if (token->db_main->so_pin_count) { 11181dbb91e7SJens Wiklander token->db_main->so_pin_count = 0; 11191dbb91e7SJens Wiklander 11201dbb91e7SJens Wiklander update_persistent_db(token); 11211dbb91e7SJens Wiklander } 11221dbb91e7SJens Wiklander 11231dbb91e7SJens Wiklander if (token->db_main->flags & (PKCS11_CKFT_SO_PIN_COUNT_LOW | 11241dbb91e7SJens Wiklander PKCS11_CKFT_SO_PIN_FINAL_TRY)) { 11251dbb91e7SJens Wiklander token->db_main->flags &= ~(PKCS11_CKFT_SO_PIN_COUNT_LOW | 11261dbb91e7SJens Wiklander PKCS11_CKFT_SO_PIN_FINAL_TRY); 11271dbb91e7SJens Wiklander 11281dbb91e7SJens Wiklander update_persistent_db(token); 11291dbb91e7SJens Wiklander } 11301dbb91e7SJens Wiklander 11311dbb91e7SJens Wiklander return PKCS11_CKR_OK; 11321dbb91e7SJens Wiklander } 11331dbb91e7SJens Wiklander 11344daf39b3SJens Wiklander static enum pkcs11_rc check_user_pin(struct pkcs11_session *session, 11351dbb91e7SJens Wiklander uint8_t *pin, size_t pin_size) 11361dbb91e7SJens Wiklander { 11371dbb91e7SJens Wiklander struct ck_token *token = session->token; 11381dbb91e7SJens Wiklander enum pkcs11_rc rc = PKCS11_CKR_OK; 11391dbb91e7SJens Wiklander 11401a27b197SVesa Jääskeläinen if (IS_ENABLED(CFG_PKCS11_TA_AUTH_TEE_IDENTITY) && 11411a27b197SVesa Jääskeläinen token->db_main->flags & PKCS11_CKFT_PROTECTED_AUTHENTICATION_PATH) 11421a27b197SVesa Jääskeläinen return verify_identity_auth(token, PKCS11_CKU_USER); 11431a27b197SVesa Jääskeläinen 11441dbb91e7SJens Wiklander if (!token->db_main->user_pin_salt) 11451dbb91e7SJens Wiklander return PKCS11_CKR_USER_PIN_NOT_INITIALIZED; 11461dbb91e7SJens Wiklander 11471dbb91e7SJens Wiklander if (token->db_main->flags & PKCS11_CKFT_USER_PIN_LOCKED) 11481dbb91e7SJens Wiklander return PKCS11_CKR_PIN_LOCKED; 11491dbb91e7SJens Wiklander 11501dbb91e7SJens Wiklander rc = verify_pin(PKCS11_CKU_USER, pin, pin_size, 11511dbb91e7SJens Wiklander token->db_main->user_pin_salt, 11521dbb91e7SJens Wiklander token->db_main->user_pin_hash); 11531dbb91e7SJens Wiklander if (rc) { 11541dbb91e7SJens Wiklander unsigned int pin_count = 0; 11551dbb91e7SJens Wiklander 11561dbb91e7SJens Wiklander if (rc != PKCS11_CKR_PIN_INCORRECT) 11571dbb91e7SJens Wiklander return rc; 11581dbb91e7SJens Wiklander 11591dbb91e7SJens Wiklander token->db_main->flags |= PKCS11_CKFT_USER_PIN_COUNT_LOW; 11601dbb91e7SJens Wiklander token->db_main->user_pin_count++; 11611dbb91e7SJens Wiklander 11621dbb91e7SJens Wiklander pin_count = token->db_main->user_pin_count; 11631dbb91e7SJens Wiklander if (pin_count == PKCS11_TOKEN_USER_PIN_COUNT_MAX - 1) 11641dbb91e7SJens Wiklander token->db_main->flags |= PKCS11_CKFT_USER_PIN_FINAL_TRY; 11651dbb91e7SJens Wiklander if (pin_count == PKCS11_TOKEN_USER_PIN_COUNT_MAX) 11661dbb91e7SJens Wiklander token->db_main->flags |= PKCS11_CKFT_USER_PIN_LOCKED; 11671dbb91e7SJens Wiklander 11681dbb91e7SJens Wiklander update_persistent_db(token); 11691dbb91e7SJens Wiklander 11701dbb91e7SJens Wiklander if (token->db_main->flags & PKCS11_CKFT_USER_PIN_LOCKED) 11711dbb91e7SJens Wiklander return PKCS11_CKR_PIN_LOCKED; 11721dbb91e7SJens Wiklander 11731dbb91e7SJens Wiklander return PKCS11_CKR_PIN_INCORRECT; 11741dbb91e7SJens Wiklander } 11751dbb91e7SJens Wiklander 11761dbb91e7SJens Wiklander if (token->db_main->user_pin_count) { 11771dbb91e7SJens Wiklander token->db_main->user_pin_count = 0; 11781dbb91e7SJens Wiklander 11791dbb91e7SJens Wiklander update_persistent_db(token); 11801dbb91e7SJens Wiklander } 11811dbb91e7SJens Wiklander 11821dbb91e7SJens Wiklander if (token->db_main->flags & (PKCS11_CKFT_USER_PIN_COUNT_LOW | 11831dbb91e7SJens Wiklander PKCS11_CKFT_USER_PIN_FINAL_TRY)) { 11841dbb91e7SJens Wiklander token->db_main->flags &= ~(PKCS11_CKFT_USER_PIN_COUNT_LOW | 11851dbb91e7SJens Wiklander PKCS11_CKFT_USER_PIN_FINAL_TRY); 11861dbb91e7SJens Wiklander 11871dbb91e7SJens Wiklander update_persistent_db(token); 11881dbb91e7SJens Wiklander } 11891dbb91e7SJens Wiklander 11901dbb91e7SJens Wiklander return PKCS11_CKR_OK; 11911dbb91e7SJens Wiklander } 11921dbb91e7SJens Wiklander 11934daf39b3SJens Wiklander enum pkcs11_rc entry_ck_set_pin(struct pkcs11_client *client, 11941dbb91e7SJens Wiklander uint32_t ptypes, TEE_Param *params) 11951dbb91e7SJens Wiklander { 11961dbb91e7SJens Wiklander const uint32_t exp_pt = TEE_PARAM_TYPES(TEE_PARAM_TYPE_MEMREF_INOUT, 11971dbb91e7SJens Wiklander TEE_PARAM_TYPE_NONE, 11981dbb91e7SJens Wiklander TEE_PARAM_TYPE_NONE, 11991dbb91e7SJens Wiklander TEE_PARAM_TYPE_NONE); 12001dbb91e7SJens Wiklander struct pkcs11_session *session = NULL; 12011dbb91e7SJens Wiklander enum pkcs11_rc rc = PKCS11_CKR_OK; 12021dbb91e7SJens Wiklander struct serialargs ctrlargs = { }; 12031dbb91e7SJens Wiklander uint32_t old_pin_size = 0; 12041dbb91e7SJens Wiklander TEE_Param *ctrl = params; 12051dbb91e7SJens Wiklander uint32_t pin_size = 0; 12061dbb91e7SJens Wiklander void *old_pin = NULL; 12071dbb91e7SJens Wiklander void *pin = NULL; 12081dbb91e7SJens Wiklander 12091dbb91e7SJens Wiklander if (!client || ptypes != exp_pt) 12101dbb91e7SJens Wiklander return PKCS11_CKR_ARGUMENTS_BAD; 12111dbb91e7SJens Wiklander 12121dbb91e7SJens Wiklander serialargs_init(&ctrlargs, ctrl->memref.buffer, ctrl->memref.size); 12131dbb91e7SJens Wiklander 1214f40f331fSEtienne Carriere rc = serialargs_get_session_from_handle(&ctrlargs, client, &session); 12151dbb91e7SJens Wiklander if (rc) 12161dbb91e7SJens Wiklander return rc; 12171dbb91e7SJens Wiklander 12181dbb91e7SJens Wiklander rc = serialargs_get(&ctrlargs, &old_pin_size, sizeof(uint32_t)); 12191dbb91e7SJens Wiklander if (rc) 12201dbb91e7SJens Wiklander return rc; 12211dbb91e7SJens Wiklander 12221dbb91e7SJens Wiklander rc = serialargs_get(&ctrlargs, &pin_size, sizeof(uint32_t)); 12231dbb91e7SJens Wiklander if (rc) 12241dbb91e7SJens Wiklander return rc; 12251dbb91e7SJens Wiklander 12261dbb91e7SJens Wiklander rc = serialargs_get_ptr(&ctrlargs, &old_pin, old_pin_size); 12271dbb91e7SJens Wiklander if (rc) 12281dbb91e7SJens Wiklander return rc; 12291dbb91e7SJens Wiklander 12301dbb91e7SJens Wiklander rc = serialargs_get_ptr(&ctrlargs, &pin, pin_size); 12311dbb91e7SJens Wiklander if (rc) 12321dbb91e7SJens Wiklander return rc; 12331dbb91e7SJens Wiklander 12341dbb91e7SJens Wiklander if (serialargs_remaining_bytes(&ctrlargs)) 12351dbb91e7SJens Wiklander return PKCS11_CKR_ARGUMENTS_BAD; 12361dbb91e7SJens Wiklander 12371dbb91e7SJens Wiklander if (!pkcs11_session_is_read_write(session)) 12381dbb91e7SJens Wiklander return PKCS11_CKR_SESSION_READ_ONLY; 12391dbb91e7SJens Wiklander 12401dbb91e7SJens Wiklander if (pkcs11_session_is_so(session)) { 12411dbb91e7SJens Wiklander if (!(session->token->db_main->flags & 12421dbb91e7SJens Wiklander PKCS11_CKFT_TOKEN_INITIALIZED)) 12431dbb91e7SJens Wiklander return PKCS11_CKR_GENERAL_ERROR; 12441dbb91e7SJens Wiklander 12451dbb91e7SJens Wiklander rc = check_so_pin(session, old_pin, old_pin_size); 12461dbb91e7SJens Wiklander if (rc) 12471dbb91e7SJens Wiklander return rc; 12481dbb91e7SJens Wiklander 1249f40f331fSEtienne Carriere IMSG("PKCS11 session %"PRIu32": set PIN", session->handle); 12501dbb91e7SJens Wiklander 12511dbb91e7SJens Wiklander return set_pin(session, pin, pin_size, PKCS11_CKU_SO); 12521dbb91e7SJens Wiklander } 12531dbb91e7SJens Wiklander 12541dbb91e7SJens Wiklander if (!(session->token->db_main->flags & 12551dbb91e7SJens Wiklander PKCS11_CKFT_USER_PIN_INITIALIZED)) 12561dbb91e7SJens Wiklander return PKCS11_CKR_GENERAL_ERROR; 12571dbb91e7SJens Wiklander 12581dbb91e7SJens Wiklander rc = check_user_pin(session, old_pin, old_pin_size); 12591dbb91e7SJens Wiklander if (rc) 12601dbb91e7SJens Wiklander return rc; 12611dbb91e7SJens Wiklander 1262f40f331fSEtienne Carriere IMSG("PKCS11 session %"PRIu32": set PIN", session->handle); 12631dbb91e7SJens Wiklander 12641dbb91e7SJens Wiklander return set_pin(session, pin, pin_size, PKCS11_CKU_USER); 12651dbb91e7SJens Wiklander } 1266f7cc36c0SJens Wiklander 1267f7cc36c0SJens Wiklander static void session_login_user(struct pkcs11_session *session) 1268f7cc36c0SJens Wiklander { 1269f7cc36c0SJens Wiklander struct pkcs11_client *client = session->client; 1270f7cc36c0SJens Wiklander struct pkcs11_session *sess = NULL; 1271f7cc36c0SJens Wiklander 1272f7cc36c0SJens Wiklander TAILQ_FOREACH(sess, &client->session_list, link) { 1273f7cc36c0SJens Wiklander if (sess->token != session->token) 1274f7cc36c0SJens Wiklander continue; 1275f7cc36c0SJens Wiklander 1276f7cc36c0SJens Wiklander if (pkcs11_session_is_read_write(sess)) 1277f7cc36c0SJens Wiklander sess->state = PKCS11_CKS_RW_USER_FUNCTIONS; 1278f7cc36c0SJens Wiklander else 1279f7cc36c0SJens Wiklander sess->state = PKCS11_CKS_RO_USER_FUNCTIONS; 1280f7cc36c0SJens Wiklander } 1281f7cc36c0SJens Wiklander } 1282f7cc36c0SJens Wiklander 1283f7cc36c0SJens Wiklander static void session_login_so(struct pkcs11_session *session) 1284f7cc36c0SJens Wiklander { 1285f7cc36c0SJens Wiklander struct pkcs11_client *client = session->client; 1286f7cc36c0SJens Wiklander struct pkcs11_session *sess = NULL; 1287f7cc36c0SJens Wiklander 1288f7cc36c0SJens Wiklander TAILQ_FOREACH(sess, &client->session_list, link) { 1289f7cc36c0SJens Wiklander if (sess->token != session->token) 1290f7cc36c0SJens Wiklander continue; 1291f7cc36c0SJens Wiklander 1292f7cc36c0SJens Wiklander if (pkcs11_session_is_read_write(sess)) 1293f7cc36c0SJens Wiklander sess->state = PKCS11_CKS_RW_SO_FUNCTIONS; 1294f7cc36c0SJens Wiklander else 1295f7cc36c0SJens Wiklander TEE_Panic(0); 1296f7cc36c0SJens Wiklander } 1297f7cc36c0SJens Wiklander } 1298f7cc36c0SJens Wiklander 1299f7cc36c0SJens Wiklander static void session_logout(struct pkcs11_session *session) 1300f7cc36c0SJens Wiklander { 1301f7cc36c0SJens Wiklander struct pkcs11_client *client = session->client; 1302f7cc36c0SJens Wiklander struct pkcs11_session *sess = NULL; 1303f7cc36c0SJens Wiklander 1304f7cc36c0SJens Wiklander TAILQ_FOREACH(sess, &client->session_list, link) { 130589735787SRuchika Gupta struct pkcs11_object *obj = NULL; 13063bf0e097SRuchika Gupta struct pkcs11_object *tobj = NULL; 130789735787SRuchika Gupta uint32_t handle = 0; 130889735787SRuchika Gupta 1309f7cc36c0SJens Wiklander if (sess->token != session->token) 1310f7cc36c0SJens Wiklander continue; 1311f7cc36c0SJens Wiklander 131289735787SRuchika Gupta release_active_processing(session); 131389735787SRuchika Gupta 131489735787SRuchika Gupta /* Destroy private session objects */ 13153bf0e097SRuchika Gupta LIST_FOREACH_SAFE(obj, &sess->object_list, link, tobj) { 131689735787SRuchika Gupta if (object_is_private(obj->attributes)) 131789735787SRuchika Gupta destroy_object(sess, obj, true); 131889735787SRuchika Gupta } 131989735787SRuchika Gupta 132089735787SRuchika Gupta /* 132189735787SRuchika Gupta * Remove handle of token private objects from 132289735787SRuchika Gupta * sessions object_handle_db 132389735787SRuchika Gupta */ 132489735787SRuchika Gupta LIST_FOREACH(obj, &session->token->object_list, link) { 132589735787SRuchika Gupta handle = pkcs11_object2handle(obj, session); 132689735787SRuchika Gupta 132789735787SRuchika Gupta if (handle && object_is_private(obj->attributes)) 1328bc555ee0SVesa Jääskeläinen handle_put(get_object_handle_db(sess), handle); 132989735787SRuchika Gupta } 133089735787SRuchika Gupta 133189735787SRuchika Gupta release_session_find_obj_context(session); 133289735787SRuchika Gupta 1333f7cc36c0SJens Wiklander if (pkcs11_session_is_read_write(sess)) 1334f7cc36c0SJens Wiklander sess->state = PKCS11_CKS_RW_PUBLIC_SESSION; 1335f7cc36c0SJens Wiklander else 1336f7cc36c0SJens Wiklander sess->state = PKCS11_CKS_RO_PUBLIC_SESSION; 1337f7cc36c0SJens Wiklander } 1338f7cc36c0SJens Wiklander } 1339f7cc36c0SJens Wiklander 13404daf39b3SJens Wiklander enum pkcs11_rc entry_ck_login(struct pkcs11_client *client, 1341f7cc36c0SJens Wiklander uint32_t ptypes, TEE_Param *params) 1342f7cc36c0SJens Wiklander { 1343f7cc36c0SJens Wiklander const uint32_t exp_pt = TEE_PARAM_TYPES(TEE_PARAM_TYPE_MEMREF_INOUT, 1344f7cc36c0SJens Wiklander TEE_PARAM_TYPE_NONE, 1345f7cc36c0SJens Wiklander TEE_PARAM_TYPE_NONE, 1346f7cc36c0SJens Wiklander TEE_PARAM_TYPE_NONE); 1347f7cc36c0SJens Wiklander struct pkcs11_session *session = NULL; 1348f7cc36c0SJens Wiklander struct pkcs11_session *sess = NULL; 1349f7cc36c0SJens Wiklander enum pkcs11_rc rc = PKCS11_CKR_OK; 1350f7cc36c0SJens Wiklander struct serialargs ctrlargs = { }; 1351f7cc36c0SJens Wiklander TEE_Param *ctrl = params; 1352f7cc36c0SJens Wiklander uint32_t user_type = 0; 1353f7cc36c0SJens Wiklander uint32_t pin_size = 0; 1354f7cc36c0SJens Wiklander void *pin = NULL; 1355f7cc36c0SJens Wiklander 1356f7cc36c0SJens Wiklander if (!client || ptypes != exp_pt) 1357f7cc36c0SJens Wiklander return PKCS11_CKR_ARGUMENTS_BAD; 1358f7cc36c0SJens Wiklander 1359f7cc36c0SJens Wiklander serialargs_init(&ctrlargs, ctrl->memref.buffer, ctrl->memref.size); 1360f7cc36c0SJens Wiklander 1361f40f331fSEtienne Carriere rc = serialargs_get_session_from_handle(&ctrlargs, client, &session); 1362f7cc36c0SJens Wiklander if (rc) 1363f7cc36c0SJens Wiklander return rc; 1364f7cc36c0SJens Wiklander 1365f7cc36c0SJens Wiklander rc = serialargs_get(&ctrlargs, &user_type, sizeof(uint32_t)); 1366f7cc36c0SJens Wiklander if (rc) 1367f7cc36c0SJens Wiklander return rc; 1368f7cc36c0SJens Wiklander 1369f7cc36c0SJens Wiklander rc = serialargs_get(&ctrlargs, &pin_size, sizeof(uint32_t)); 1370f7cc36c0SJens Wiklander if (rc) 1371f7cc36c0SJens Wiklander return rc; 1372f7cc36c0SJens Wiklander 1373f7cc36c0SJens Wiklander rc = serialargs_get_ptr(&ctrlargs, &pin, pin_size); 1374f7cc36c0SJens Wiklander if (rc) 1375f7cc36c0SJens Wiklander return rc; 1376f7cc36c0SJens Wiklander 1377f7cc36c0SJens Wiklander if (serialargs_remaining_bytes(&ctrlargs)) 1378f7cc36c0SJens Wiklander return PKCS11_CKR_ARGUMENTS_BAD; 1379f7cc36c0SJens Wiklander 1380f7cc36c0SJens Wiklander switch (user_type) { 1381f7cc36c0SJens Wiklander case PKCS11_CKU_SO: 1382f7cc36c0SJens Wiklander if (pkcs11_session_is_so(session)) 1383f7cc36c0SJens Wiklander return PKCS11_CKR_USER_ALREADY_LOGGED_IN; 1384f7cc36c0SJens Wiklander 1385f7cc36c0SJens Wiklander if (pkcs11_session_is_user(session)) 1386f7cc36c0SJens Wiklander return PKCS11_CKR_USER_ANOTHER_ALREADY_LOGGED_IN; 1387f7cc36c0SJens Wiklander 1388f7cc36c0SJens Wiklander TAILQ_FOREACH(sess, &client->session_list, link) 1389f7cc36c0SJens Wiklander if (sess->token == session->token && 1390f7cc36c0SJens Wiklander !pkcs11_session_is_read_write(sess)) 1391f7cc36c0SJens Wiklander return PKCS11_CKR_SESSION_READ_ONLY_EXISTS; 1392f7cc36c0SJens Wiklander 1393f7cc36c0SJens Wiklander /* 1394f7cc36c0SJens Wiklander * This is the point where we could check if another client 1395f7cc36c0SJens Wiklander * has another user or SO logged in. 1396f7cc36c0SJens Wiklander * 1397f7cc36c0SJens Wiklander * The spec says: 1398f7cc36c0SJens Wiklander * CKR_USER_TOO_MANY_TYPES: An attempt was made to have 1399f7cc36c0SJens Wiklander * more distinct users simultaneously logged into the token 1400f7cc36c0SJens Wiklander * than the token and/or library permits. For example, if 1401f7cc36c0SJens Wiklander * some application has an open SO session, and another 1402f7cc36c0SJens Wiklander * application attempts to log the normal user into a 1403f7cc36c0SJens Wiklander * session, the attempt may return this error. It is not 1404f7cc36c0SJens Wiklander * required to, however. Only if the simultaneous distinct 1405f7cc36c0SJens Wiklander * users cannot be supported does C_Login have to return 1406f7cc36c0SJens Wiklander * this value. Note that this error code generalizes to 1407f7cc36c0SJens Wiklander * true multi-user tokens. 1408f7cc36c0SJens Wiklander * 1409f7cc36c0SJens Wiklander * So it's permitted to have another user or SO logged in 1410f7cc36c0SJens Wiklander * from another client. 1411f7cc36c0SJens Wiklander */ 1412f7cc36c0SJens Wiklander 1413f7cc36c0SJens Wiklander rc = check_so_pin(session, pin, pin_size); 1414f7cc36c0SJens Wiklander if (!rc) 1415f7cc36c0SJens Wiklander session_login_so(session); 1416f7cc36c0SJens Wiklander 1417f7cc36c0SJens Wiklander break; 1418f7cc36c0SJens Wiklander 1419f7cc36c0SJens Wiklander case PKCS11_CKU_USER: 1420f7cc36c0SJens Wiklander if (pkcs11_session_is_so(session)) 1421f7cc36c0SJens Wiklander return PKCS11_CKR_USER_ANOTHER_ALREADY_LOGGED_IN; 1422f7cc36c0SJens Wiklander 1423f7cc36c0SJens Wiklander if (pkcs11_session_is_user(session)) 1424f7cc36c0SJens Wiklander return PKCS11_CKR_USER_ALREADY_LOGGED_IN; 1425f7cc36c0SJens Wiklander 1426f7cc36c0SJens Wiklander /* 1427f7cc36c0SJens Wiklander * This is the point where we could check if another client 1428f7cc36c0SJens Wiklander * has another user or SO logged in. 1429f7cc36c0SJens Wiklander * See comment on CKR_USER_TOO_MANY_TYPES above. 1430f7cc36c0SJens Wiklander */ 1431f7cc36c0SJens Wiklander 1432f7cc36c0SJens Wiklander rc = check_user_pin(session, pin, pin_size); 1433f7cc36c0SJens Wiklander if (!rc) 1434f7cc36c0SJens Wiklander session_login_user(session); 1435f7cc36c0SJens Wiklander 1436f7cc36c0SJens Wiklander break; 1437f7cc36c0SJens Wiklander 1438f7cc36c0SJens Wiklander case PKCS11_CKU_CONTEXT_SPECIFIC: 1439f7cc36c0SJens Wiklander return PKCS11_CKR_OPERATION_NOT_INITIALIZED; 1440f7cc36c0SJens Wiklander 1441f7cc36c0SJens Wiklander default: 1442f7cc36c0SJens Wiklander return PKCS11_CKR_USER_TYPE_INVALID; 1443f7cc36c0SJens Wiklander } 1444f7cc36c0SJens Wiklander 1445f7cc36c0SJens Wiklander if (!rc) 1446f40f331fSEtienne Carriere IMSG("PKCS11 session %"PRIu32": login", session->handle); 1447f7cc36c0SJens Wiklander 1448f7cc36c0SJens Wiklander return rc; 1449f7cc36c0SJens Wiklander } 1450f7cc36c0SJens Wiklander 14514daf39b3SJens Wiklander enum pkcs11_rc entry_ck_logout(struct pkcs11_client *client, 1452f7cc36c0SJens Wiklander uint32_t ptypes, TEE_Param *params) 1453f7cc36c0SJens Wiklander { 1454f7cc36c0SJens Wiklander const uint32_t exp_pt = TEE_PARAM_TYPES(TEE_PARAM_TYPE_MEMREF_INOUT, 1455f7cc36c0SJens Wiklander TEE_PARAM_TYPE_NONE, 1456f7cc36c0SJens Wiklander TEE_PARAM_TYPE_NONE, 1457f7cc36c0SJens Wiklander TEE_PARAM_TYPE_NONE); 1458f7cc36c0SJens Wiklander struct pkcs11_session *session = NULL; 1459f7cc36c0SJens Wiklander enum pkcs11_rc rc = PKCS11_CKR_OK; 1460f7cc36c0SJens Wiklander struct serialargs ctrlargs = { }; 1461f7cc36c0SJens Wiklander TEE_Param *ctrl = params; 1462f7cc36c0SJens Wiklander 1463f7cc36c0SJens Wiklander if (!client || ptypes != exp_pt) 1464f7cc36c0SJens Wiklander return PKCS11_CKR_ARGUMENTS_BAD; 1465f7cc36c0SJens Wiklander 1466f7cc36c0SJens Wiklander serialargs_init(&ctrlargs, ctrl->memref.buffer, ctrl->memref.size); 1467f7cc36c0SJens Wiklander 1468f40f331fSEtienne Carriere rc = serialargs_get_session_from_handle(&ctrlargs, client, &session); 1469f7cc36c0SJens Wiklander if (rc) 1470f7cc36c0SJens Wiklander return rc; 1471f7cc36c0SJens Wiklander 1472f7cc36c0SJens Wiklander if (serialargs_remaining_bytes(&ctrlargs)) 1473f7cc36c0SJens Wiklander return PKCS11_CKR_ARGUMENTS_BAD; 1474f7cc36c0SJens Wiklander 1475f7cc36c0SJens Wiklander if (pkcs11_session_is_public(session)) 1476f7cc36c0SJens Wiklander return PKCS11_CKR_USER_NOT_LOGGED_IN; 1477f7cc36c0SJens Wiklander 1478f7cc36c0SJens Wiklander session_logout(session); 1479f7cc36c0SJens Wiklander 1480f40f331fSEtienne Carriere IMSG("PKCS11 session %"PRIu32": logout", session->handle); 1481f7cc36c0SJens Wiklander 1482f7cc36c0SJens Wiklander return PKCS11_CKR_OK; 1483f7cc36c0SJens Wiklander } 148422587dc4SVesa Jääskeläinen 148522587dc4SVesa Jääskeläinen static TEE_Result seed_rng_pool(void *seed, size_t length) 148622587dc4SVesa Jääskeläinen { 148722587dc4SVesa Jääskeläinen static const TEE_UUID system_uuid = PTA_SYSTEM_UUID; 148822587dc4SVesa Jääskeläinen uint32_t param_types = TEE_PARAM_TYPES(TEE_PARAM_TYPE_MEMREF_INPUT, 148922587dc4SVesa Jääskeläinen TEE_PARAM_TYPE_NONE, 149022587dc4SVesa Jääskeläinen TEE_PARAM_TYPE_NONE, 149122587dc4SVesa Jääskeläinen TEE_PARAM_TYPE_NONE); 149222587dc4SVesa Jääskeläinen TEE_Param params[TEE_NUM_PARAMS] = { }; 149322587dc4SVesa Jääskeläinen TEE_TASessionHandle sess = TEE_HANDLE_NULL; 149422587dc4SVesa Jääskeläinen TEE_Result res = TEE_ERROR_GENERIC; 149522587dc4SVesa Jääskeläinen uint32_t ret_orig = 0; 149622587dc4SVesa Jääskeläinen 149722587dc4SVesa Jääskeläinen params[0].memref.buffer = seed; 149822587dc4SVesa Jääskeläinen params[0].memref.size = (uint32_t)length; 149922587dc4SVesa Jääskeläinen 150022587dc4SVesa Jääskeläinen res = TEE_OpenTASession(&system_uuid, TEE_TIMEOUT_INFINITE, 0, NULL, 150122587dc4SVesa Jääskeläinen &sess, &ret_orig); 150222587dc4SVesa Jääskeläinen if (res != TEE_SUCCESS) { 150322587dc4SVesa Jääskeläinen EMSG("Can't open session to system PTA"); 150422587dc4SVesa Jääskeläinen return res; 150522587dc4SVesa Jääskeläinen } 150622587dc4SVesa Jääskeläinen 150722587dc4SVesa Jääskeläinen res = TEE_InvokeTACommand(sess, TEE_TIMEOUT_INFINITE, 150822587dc4SVesa Jääskeläinen PTA_SYSTEM_ADD_RNG_ENTROPY, 150922587dc4SVesa Jääskeläinen param_types, params, &ret_orig); 151022587dc4SVesa Jääskeläinen if (res != TEE_SUCCESS) 151122587dc4SVesa Jääskeläinen EMSG("Can't invoke system PTA"); 151222587dc4SVesa Jääskeläinen 151322587dc4SVesa Jääskeläinen TEE_CloseTASession(sess); 151422587dc4SVesa Jääskeläinen return res; 151522587dc4SVesa Jääskeläinen } 151622587dc4SVesa Jääskeläinen 151722587dc4SVesa Jääskeläinen enum pkcs11_rc entry_ck_seed_random(struct pkcs11_client *client, 151822587dc4SVesa Jääskeläinen uint32_t ptypes, TEE_Param *params) 151922587dc4SVesa Jääskeläinen { 152022587dc4SVesa Jääskeläinen const uint32_t exp_pt = TEE_PARAM_TYPES(TEE_PARAM_TYPE_MEMREF_INOUT, 152122587dc4SVesa Jääskeläinen TEE_PARAM_TYPE_MEMREF_INPUT, 152222587dc4SVesa Jääskeläinen TEE_PARAM_TYPE_NONE, 152322587dc4SVesa Jääskeläinen TEE_PARAM_TYPE_NONE); 152422587dc4SVesa Jääskeläinen TEE_Param *ctrl = params; 152522587dc4SVesa Jääskeläinen TEE_Param *in = params + 1; 152622587dc4SVesa Jääskeläinen enum pkcs11_rc rc = PKCS11_CKR_OK; 152722587dc4SVesa Jääskeläinen struct serialargs ctrlargs = { }; 152822587dc4SVesa Jääskeläinen struct pkcs11_session *session = NULL; 152922587dc4SVesa Jääskeläinen TEE_Result res = TEE_SUCCESS; 153022587dc4SVesa Jääskeläinen 153122587dc4SVesa Jääskeläinen if (!client || ptypes != exp_pt) 153222587dc4SVesa Jääskeläinen return PKCS11_CKR_ARGUMENTS_BAD; 153322587dc4SVesa Jääskeläinen 153422587dc4SVesa Jääskeläinen serialargs_init(&ctrlargs, ctrl->memref.buffer, ctrl->memref.size); 153522587dc4SVesa Jääskeläinen 153622587dc4SVesa Jääskeläinen rc = serialargs_get_session_from_handle(&ctrlargs, client, &session); 153722587dc4SVesa Jääskeläinen if (rc) 153822587dc4SVesa Jääskeläinen return rc; 153922587dc4SVesa Jääskeläinen 154022587dc4SVesa Jääskeläinen if (serialargs_remaining_bytes(&ctrlargs)) 154122587dc4SVesa Jääskeläinen return PKCS11_CKR_ARGUMENTS_BAD; 154222587dc4SVesa Jääskeläinen 154322587dc4SVesa Jääskeläinen if (in->memref.size && !in->memref.buffer) 154422587dc4SVesa Jääskeläinen return PKCS11_CKR_ARGUMENTS_BAD; 154522587dc4SVesa Jääskeläinen 154622587dc4SVesa Jääskeläinen if (!in->memref.size) 154722587dc4SVesa Jääskeläinen return PKCS11_CKR_OK; 154822587dc4SVesa Jääskeläinen 154922587dc4SVesa Jääskeläinen res = seed_rng_pool(in->memref.buffer, in->memref.size); 155022587dc4SVesa Jääskeläinen if (res != TEE_SUCCESS) 155122587dc4SVesa Jääskeläinen return PKCS11_CKR_FUNCTION_FAILED; 155222587dc4SVesa Jääskeläinen 155322587dc4SVesa Jääskeläinen DMSG("PKCS11 session %"PRIu32": seed random", session->handle); 155422587dc4SVesa Jääskeläinen 155522587dc4SVesa Jääskeläinen return PKCS11_CKR_OK; 155622587dc4SVesa Jääskeläinen } 155722587dc4SVesa Jääskeläinen 155822587dc4SVesa Jääskeläinen enum pkcs11_rc entry_ck_generate_random(struct pkcs11_client *client, 155922587dc4SVesa Jääskeläinen uint32_t ptypes, TEE_Param *params) 156022587dc4SVesa Jääskeläinen { 156122587dc4SVesa Jääskeläinen const uint32_t exp_pt = TEE_PARAM_TYPES(TEE_PARAM_TYPE_MEMREF_INOUT, 156222587dc4SVesa Jääskeläinen TEE_PARAM_TYPE_NONE, 156322587dc4SVesa Jääskeläinen TEE_PARAM_TYPE_MEMREF_OUTPUT, 156422587dc4SVesa Jääskeläinen TEE_PARAM_TYPE_NONE); 156522587dc4SVesa Jääskeläinen TEE_Param *ctrl = params; 156622587dc4SVesa Jääskeläinen TEE_Param *out = params + 2; 156722587dc4SVesa Jääskeläinen enum pkcs11_rc rc = PKCS11_CKR_OK; 156822587dc4SVesa Jääskeläinen struct serialargs ctrlargs = { }; 156922587dc4SVesa Jääskeläinen struct pkcs11_session *session = NULL; 157022587dc4SVesa Jääskeläinen void *buffer = NULL; 157122587dc4SVesa Jääskeläinen size_t buffer_size = 0; 157222587dc4SVesa Jääskeläinen uint8_t *data = NULL; 157322587dc4SVesa Jääskeläinen size_t left = 0; 157422587dc4SVesa Jääskeläinen 157522587dc4SVesa Jääskeläinen if (!client || ptypes != exp_pt) 157622587dc4SVesa Jääskeläinen return PKCS11_CKR_ARGUMENTS_BAD; 157722587dc4SVesa Jääskeläinen 157822587dc4SVesa Jääskeläinen serialargs_init(&ctrlargs, ctrl->memref.buffer, ctrl->memref.size); 157922587dc4SVesa Jääskeläinen 158022587dc4SVesa Jääskeläinen rc = serialargs_get_session_from_handle(&ctrlargs, client, &session); 158122587dc4SVesa Jääskeläinen if (rc) 158222587dc4SVesa Jääskeläinen return rc; 158322587dc4SVesa Jääskeläinen 158422587dc4SVesa Jääskeläinen if (serialargs_remaining_bytes(&ctrlargs)) 158522587dc4SVesa Jääskeläinen return PKCS11_CKR_ARGUMENTS_BAD; 158622587dc4SVesa Jääskeläinen 158722587dc4SVesa Jääskeläinen if (out->memref.size && !out->memref.buffer) 158822587dc4SVesa Jääskeläinen return PKCS11_CKR_ARGUMENTS_BAD; 158922587dc4SVesa Jääskeläinen 159022587dc4SVesa Jääskeläinen if (!out->memref.size) 159122587dc4SVesa Jääskeläinen return PKCS11_CKR_OK; 159222587dc4SVesa Jääskeläinen 159322587dc4SVesa Jääskeläinen buffer_size = MIN(out->memref.size, RNG_CHUNK_SIZE); 159422587dc4SVesa Jääskeläinen buffer = TEE_Malloc(buffer_size, TEE_MALLOC_FILL_ZERO); 159522587dc4SVesa Jääskeläinen if (!buffer) 159622587dc4SVesa Jääskeläinen return PKCS11_CKR_DEVICE_MEMORY; 159722587dc4SVesa Jääskeläinen 159822587dc4SVesa Jääskeläinen data = out->memref.buffer; 159922587dc4SVesa Jääskeläinen left = out->memref.size; 160022587dc4SVesa Jääskeläinen 160122587dc4SVesa Jääskeläinen while (left) { 160222587dc4SVesa Jääskeläinen size_t count = MIN(left, buffer_size); 160322587dc4SVesa Jääskeläinen 160422587dc4SVesa Jääskeläinen TEE_GenerateRandom(buffer, count); 160522587dc4SVesa Jääskeläinen TEE_MemMove(data, buffer, count); 160622587dc4SVesa Jääskeläinen 160722587dc4SVesa Jääskeläinen data += count; 160822587dc4SVesa Jääskeläinen left -= count; 160922587dc4SVesa Jääskeläinen } 161022587dc4SVesa Jääskeläinen 161122587dc4SVesa Jääskeläinen DMSG("PKCS11 session %"PRIu32": generate random", session->handle); 161222587dc4SVesa Jääskeläinen 161322587dc4SVesa Jääskeläinen TEE_Free(buffer); 161422587dc4SVesa Jääskeläinen 161522587dc4SVesa Jääskeläinen return PKCS11_CKR_OK; 161622587dc4SVesa Jääskeläinen } 1617