Coverage Report

Created: 2026-01-10 06:04

next uncovered line (L), next uncovered region (R), next uncovered branch (B)
/src/opensc/src/libopensc/card-sc-hsm.c
Line
Count
Source
1
/*
2
 * card-sc-hsm.c
3
 *
4
 * Driver for the SmartCard-HSM, a light-weight hardware security module
5
 *
6
 * Copyright (C) 2012 Andreas Schwier, CardContact, Minden, Germany, and others
7
 * Copyright (C) 2018-2019 GSMK - Gesellschaft für Sichere Mobile Kommunikation mbH
8
 *
9
 * This library is free software; you can redistribute it and/or
10
 * modify it under the terms of the GNU Lesser General Public
11
 * License as published by the Free Software Foundation; either
12
 * version 2.1 of the License, or (at your option) any later version.
13
 *
14
 * This library is distributed in the hope that it will be useful,
15
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
16
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
17
 * Lesser General Public License for more details.
18
 *
19
 * You should have received a copy of the GNU Lesser General Public
20
 * License along with this library; if not, write to the Free Software
21
 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
22
 */
23
24
#ifdef HAVE_CONFIG_H
25
#include "config.h"
26
#endif
27
28
#include <string.h>
29
#include <stdlib.h>
30
#include <ctype.h>
31
32
#include "internal.h"
33
#include "asn1.h"
34
#include "cardctl.h"
35
#include "types.h"
36
37
#include "card-sc-hsm.h"
38
39
#if defined(ENABLE_SM) && defined(ENABLE_OPENPACE)
40
#include "sm/sm-eac.h"
41
#include <eac/cv_cert.h>
42
#include <eac/eac.h>
43
#include <eac/ta.h>
44
#include <openssl/evp.h>
45
#endif
46
47
48
/* Static reference to ISO driver */
49
static const struct sc_card_operations *iso_ops = NULL;
50
51
/* Our operations */
52
static struct sc_card_operations sc_hsm_ops;
53
54
/* Our driver description */
55
static struct sc_card_driver sc_hsm_drv = {
56
  "SmartCard-HSM",
57
  "sc-hsm",
58
  &sc_hsm_ops,
59
  NULL,
60
  0,
61
  NULL
62
};
63
64
65
66
/* Our AID */
67
struct sc_aid sc_hsm_aid = { { 0xE8,0x2B,0x06,0x01,0x04,0x01,0x81,0xC3,0x1F,0x02,0x01 }, 11 };
68
69
70
71
/* Known ATRs for SmartCard-HSMs */
72
const struct sc_atr_table sc_hsm_atrs[] = {
73
  /* standard version */
74
  {"3B:FE:18:00:00:81:31:FE:45:80:31:81:54:48:53:4D:31:73:80:21:40:81:07:FA", NULL, NULL, SC_CARD_TYPE_SC_HSM, 0, NULL},
75
  {"3B:8E:80:01:80:31:81:54:48:53:4D:31:73:80:21:40:81:07:18", NULL, NULL, SC_CARD_TYPE_SC_HSM, 0, NULL},
76
  {"3B:DE:18:FF:81:91:FE:1F:C3:80:31:81:54:48:53:4D:31:73:80:21:40:81:07:1C", NULL, NULL, SC_CARD_TYPE_SC_HSM, 0, NULL},
77
  {"3B:DE:96:FF:81:91:FE:1F:C3:80:31:81:54:48:53:4D:31:73:80:21:40:81:07:92", NULL, NULL, SC_CARD_TYPE_SC_HSM, 0, NULL},
78
79
  {"3B:80:80:01:01", NULL, NULL, SC_CARD_TYPE_SC_HSM_SOC, 0, NULL}, // SoC Sample Card
80
  {
81
    "3B:84:80:01:47:6f:49:44:00",
82
    "FF:FF:FF:FF:FF:FF:FF:FF:00",
83
    "GoID", SC_CARD_TYPE_SC_HSM_GOID, 0, NULL
84
  },
85
  {
86
    "3B:85:80:01:47:6f:49:44:00:00",
87
    "FF:FF:FF:FF:FF:FF:FF:FF:00:00",
88
    "GoID", SC_CARD_TYPE_SC_HSM_GOID, 0, NULL
89
  },
90
  {
91
    "3B:86:80:01:47:6f:49:44:00:00:00",
92
    "FF:FF:FF:FF:FF:FF:FF:FF:00:00:00",
93
    "GoID", SC_CARD_TYPE_SC_HSM_GOID, 0, NULL
94
  },
95
  {
96
    "3B:87:80:01:47:6f:49:44:00:00:00:00",
97
    "FF:FF:FF:FF:FF:FF:FF:FF:00:00:00:00",
98
    "GoID", SC_CARD_TYPE_SC_HSM_GOID, 0, NULL
99
  },
100
  {
101
    "3B:88:80:01:47:6f:49:44:00:00:00:00:00",
102
    "FF:FF:FF:FF:FF:FF:FF:FF:00:00:00:00:00",
103
    "GoID", SC_CARD_TYPE_SC_HSM_GOID, 0, NULL
104
  },
105
  {
106
    "3B:89:80:01:47:6f:49:44:00:00:00:00:00:00",
107
    "FF:FF:FF:FF:FF:FF:FF:FF:00:00:00:00:00:00",
108
    "GoID", SC_CARD_TYPE_SC_HSM_GOID, 0, NULL
109
  },
110
  {
111
    "3B:8a:80:01:47:6f:49:44:00:00:00:00:00:00:00",
112
    "FF:FF:FF:FF:FF:FF:FF:FF:00:00:00:00:00:00:00",
113
    "GoID", SC_CARD_TYPE_SC_HSM_GOID, 0, NULL
114
  },
115
  {
116
    "3B:8b:80:01:47:6f:49:44:00:00:00:00:00:00:00:00",
117
    "FF:FF:FF:FF:FF:FF:FF:FF:00:00:00:00:00:00:00:00",
118
    "GoID", SC_CARD_TYPE_SC_HSM_GOID, 0, NULL
119
  },
120
  {
121
    "3B:8c:80:01:47:6f:49:44:00:00:00:00:00:00:00:00:00",
122
    "FF:FF:FF:FF:FF:FF:FF:FF:00:00:00:00:00:00:00:00:00",
123
    "GoID", SC_CARD_TYPE_SC_HSM_GOID, 0, NULL
124
  },
125
  {
126
    "3B:8d:80:01:47:6f:49:44:00:00:00:00:00:00:00:00:00:00",
127
    "FF:FF:FF:FF:FF:FF:FF:FF:00:00:00:00:00:00:00:00:00:00",
128
    "GoID", SC_CARD_TYPE_SC_HSM_GOID, 0, NULL
129
  },
130
  {
131
    "3B:8e:80:01:47:6f:49:44:00:00:00:00:00:00:00:00:00:00:00",
132
    "FF:FF:FF:FF:FF:FF:FF:FF:00:00:00:00:00:00:00:00:00:00:00",
133
    "GoID", SC_CARD_TYPE_SC_HSM_GOID, 0, NULL
134
  },
135
  {
136
    "3B:8f:80:01:47:6f:49:44:00:00:00:00:00:00:00:00:00:00:00:00",
137
    "FF:FF:FF:FF:FF:FF:FF:FF:00:00:00:00:00:00:00:00:00:00:00:00",
138
    "GoID", SC_CARD_TYPE_SC_HSM_GOID, 0, NULL
139
  },
140
  {NULL, NULL, NULL, 0, 0, NULL}
141
};
142
143
144
145
static int sc_hsm_select_file_ex(sc_card_t *card,
146
             const sc_path_t *in_path, int forceselect,
147
             sc_file_t **file_out)
148
10.7k
{
149
10.7k
  int rv;
150
10.7k
  sc_hsm_private_data_t *priv = (sc_hsm_private_data_t *) card->drv_data;
151
10.7k
  sc_file_t *file = NULL;
152
10.7k
  sc_path_t cpath;
153
10.7k
  size_t card_max_recv_size = card->max_recv_size;
154
10.7k
  size_t reader_max_recv_size = card->reader->max_recv_size;
155
156
10.7k
  if (file_out == NULL) {       // Versions before 0.16 of the SmartCard-HSM do not support P2='0C'
157
1.48k
    rv = sc_hsm_select_file_ex(card, in_path, forceselect, &file);
158
1.48k
    sc_file_free(file);
159
1.48k
    return rv;
160
1.48k
  }
161
162
9.25k
  if ((in_path->type == SC_PATH_TYPE_FILE_ID) && in_path->aid.len) {
163
    // Split applet selection and file selection into two separate calls
164
0
    cpath = *in_path;
165
0
    cpath.len = 0;
166
0
    cpath.type = SC_PATH_TYPE_DF_NAME;
167
0
    rv = sc_hsm_select_file_ex(card, &cpath, forceselect, NULL);
168
0
    LOG_TEST_RET(card->ctx, rv, "Could not select SmartCard-HSM application");
169
170
0
    if (in_path->len) {
171
0
      cpath = *in_path;
172
0
      cpath.aid.len = 0;
173
0
      rv = sc_hsm_select_file_ex(card, &cpath, forceselect, file_out);
174
0
    }
175
0
    return rv;
176
0
  }
177
178
  // Prevent selection of applet unless this is the first time, selection is forced or the device is not authenticated
179
9.25k
  if (in_path->type == SC_PATH_TYPE_DF_NAME
180
1.61k
      || (in_path->type == SC_PATH_TYPE_PATH
181
1.49k
        && in_path->len == sc_hsm_aid.len
182
0
        && !memcmp(in_path->value, sc_hsm_aid.value, sc_hsm_aid.len))
183
1.61k
      || (in_path->type == SC_PATH_TYPE_PATH
184
1.49k
        && in_path->len == 0
185
0
        && in_path->aid.len == sc_hsm_aid.len
186
7.63k
        && !memcmp(in_path->aid.value, sc_hsm_aid.value, sc_hsm_aid.len))) {
187
7.63k
    if (!priv || (priv->dffcp == NULL) || forceselect) {
188
      /* Force use of Le = 0x00 in iso7816_select_file as required by SC-HSM */
189
7.29k
      card->max_recv_size = card->reader->max_recv_size = SC_READER_SHORT_APDU_MAX_RECV_SIZE;
190
7.29k
      rv = (*iso_ops->select_file)(card, in_path, file_out);
191
7.29k
      card->max_recv_size = card_max_recv_size;
192
7.29k
      card->reader->max_recv_size = reader_max_recv_size;
193
7.29k
      LOG_TEST_RET(card->ctx, rv, "Could not select SmartCard-HSM application");
194
195
643
      if (priv) {
196
269
        sc_file_free(priv->dffcp);
197
        // Cache the FCP returned when selecting the applet
198
269
        sc_file_dup(&priv->dffcp, *file_out);
199
269
      }
200
643
    } else {
201
339
      sc_file_dup(file_out, priv->dffcp);
202
339
      rv = SC_SUCCESS;
203
339
    }
204
982
    return rv;
205
7.63k
  }
206
207
1.61k
  if ((in_path->len >= 2) && (in_path->value[0] == 0x3F) && (in_path->value[1] == 0x00)) {
208
    // The SmartCard-HSM is an applet that is not default selected. Simulate selection of the MF
209
914
    if (in_path->len == 2) {
210
0
      file = sc_file_new();
211
0
      if (file == NULL)
212
0
        LOG_FUNC_RETURN(card->ctx, SC_ERROR_OUT_OF_MEMORY);
213
0
      file->path = *in_path;
214
0
      file->id = 0x3F00;
215
0
      file->type = SC_FILE_TYPE_DF;
216
0
      file->magic = SC_FILE_MAGIC;
217
218
0
      *file_out = file;
219
0
      return SC_SUCCESS;
220
914
    } else {
221
      /* Force use of Le = 0x00 in iso7816_select_file as required by SC-HSM */
222
914
      card->max_recv_size = card->reader->max_recv_size = SC_READER_SHORT_APDU_MAX_RECV_SIZE;
223
914
      sc_path_t truncated;
224
914
      memcpy(&truncated, in_path, sizeof truncated);
225
914
      truncated.len = in_path->len - 2;
226
914
      memcpy(truncated.value, in_path->value+2, truncated.len);
227
914
      rv = (*iso_ops->select_file)(card, &truncated, file_out);
228
914
      card->max_recv_size = card_max_recv_size;
229
914
      card->reader->max_recv_size = reader_max_recv_size;
230
914
      return rv;
231
914
    }
232
914
  }
233
  /* Force use of Le = 0x00 in iso7816_select_file as required by SC-HSM */
234
701
  card->max_recv_size = card->reader->max_recv_size = SC_READER_SHORT_APDU_MAX_RECV_SIZE;
235
701
  rv = (*iso_ops->select_file)(card, in_path, file_out);
236
701
  card->max_recv_size = card_max_recv_size;
237
701
  card->reader->max_recv_size = reader_max_recv_size;
238
701
  return rv;
239
1.61k
}
240
241
242
243
static int sc_hsm_select_file(sc_card_t *card,
244
             const sc_path_t *in_path,
245
             sc_file_t **file_out)
246
8.94k
{
247
8.94k
  return sc_hsm_select_file_ex(card, in_path, 0, file_out);
248
8.94k
}
249
250
251
252
static int sc_hsm_get_challenge(struct sc_card *card, unsigned char *rnd, size_t len)
253
0
{
254
0
  LOG_FUNC_CALLED(card->ctx);
255
256
0
  if (len > 1024) {
257
0
    len = 1024;
258
0
  }
259
260
0
  LOG_FUNC_RETURN(card->ctx, iso_ops->get_challenge(card, rnd, len));
261
0
}
262
263
264
265
static int sc_hsm_match_card(struct sc_card *card)
266
6.62k
{
267
6.62k
  sc_path_t path;
268
6.62k
  int i, r, type = 0;
269
6.62k
  sc_file_t *file = NULL;
270
271
6.62k
  i = _sc_match_atr(card, sc_hsm_atrs, &type);
272
6.62k
  if (i >= 0 && type != SC_CARD_TYPE_SC_HSM_SOC) {
273
306
    card->type = type;
274
306
    return 1;
275
306
  }
276
277
6.31k
  sc_path_set(&path, SC_PATH_TYPE_DF_NAME, sc_hsm_aid.value, sc_hsm_aid.len, 0, 0);
278
6.31k
  r = sc_hsm_select_file(card, &path, &file);
279
6.31k
  LOG_TEST_RET(card->ctx, r, "Could not select SmartCard-HSM application");
280
281
  // Validate that card returns a FCP with a proprietary tag 85 with value longer than 2 byte (Fixes #1377)
282
374
  if (file != NULL) {
283
374
    size_t sz = file->prop_attr_len;
284
374
    sc_file_free(file);
285
374
    if (sz < 2) {
286
370
      return 0;
287
370
    }
288
374
  }
289
290
4
  if (type == SC_CARD_TYPE_SC_HSM_SOC) {
291
0
    card->type = SC_CARD_TYPE_SC_HSM_SOC;
292
4
  } else {
293
4
    card->type = SC_CARD_TYPE_SC_HSM;
294
4
  }
295
296
4
  return 1;
297
374
}
298
299
300
301
/*
302
 * Encode 16 hexadecimals of SO-PIN into binary form
303
 * Caller must check length of sopin and provide an 8 byte buffer
304
 */
305
static int sc_hsm_encode_sopin(const u8 *sopin, u8 *sopinbin)
306
0
{
307
0
  int i;
308
0
  unsigned char digit;
309
310
0
  memset(sopinbin, 0, 8);
311
0
  for (i = 0; i < 16; i++) {
312
0
    *sopinbin <<= 4;
313
0
    digit = *sopin++;
314
315
0
    if (!isxdigit(digit))
316
0
      return SC_ERROR_PIN_CODE_INCORRECT;
317
0
    digit = toupper(digit);
318
319
0
    if (digit >= 'A')
320
0
      digit = digit - 'A' + 10;
321
0
    else
322
0
      digit = digit & 0xF;
323
324
0
    *sopinbin |= digit & 0xf;
325
0
    if (i & 1)
326
0
      sopinbin++;
327
0
  }
328
0
  return SC_SUCCESS;
329
0
}
330
331
332
static int sc_hsm_soc_select_minbioclient(sc_card_t *card)
333
0
{
334
0
  static const struct sc_aid minBioClient_aid = {
335
0
      {0xFF, 'm', 'i', 'n', 'B', 'i', 'o', 'C', 'l', 'i', 'e', 'n', 't', 0x01},
336
0
      14
337
0
    };
338
339
  /* Select MinBioClient */
340
0
#ifdef ENABLE_SM
341
0
  sc_sm_stop(card);
342
0
#endif
343
0
  return iso7816_select_aid(card, minBioClient_aid.value, minBioClient_aid.len, NULL, NULL);
344
0
}
345
346
static int sc_hsm_soc_change(sc_card_t *card, struct sc_pin_cmd_data *data,
347
         int *tries_left)
348
0
{
349
0
  sc_apdu_t apdu;
350
0
  sc_path_t path;
351
0
  int r;
352
353
0
  if (card->type == SC_CARD_TYPE_SC_HSM_SOC) {
354
    /* Select MinBioClient */
355
0
    r = sc_hsm_soc_select_minbioclient(card);
356
0
    LOG_TEST_RET(card->ctx, r, "Could not select MinBioClient application");
357
358
    /* verify PIN */
359
0
    sc_format_apdu(card, &apdu, SC_APDU_CASE_1, 0x20, 0x00, 0x80);
360
0
    r = sc_transmit_apdu(card, &apdu);
361
0
    LOG_TEST_GOTO_ERR(card->ctx, r, "APDU transmit failed");
362
0
    r = sc_check_sw(card, apdu.sw1, apdu.sw2);
363
0
    LOG_TEST_GOTO_ERR(card->ctx, r, "Could not verify PIN");
364
365
    /* change PIN */
366
0
    sc_format_apdu(card, &apdu, SC_APDU_CASE_1, 0x24, 0x01, 0x80);
367
0
    r = sc_transmit_apdu(card, &apdu);
368
0
    LOG_TEST_GOTO_ERR(card->ctx, r, "APDU transmit failed");
369
0
    r = sc_check_sw(card, apdu.sw1, apdu.sw2);
370
0
    LOG_TEST_GOTO_ERR(card->ctx, r, "Could not change PIN");
371
0
  } else {
372
0
#ifdef ENABLE_SM
373
0
    unsigned sm_mode = card->sm_ctx.sm_mode;
374
0
#endif
375
376
    /* verify PIN */
377
0
    sc_format_apdu(card, &apdu, SC_APDU_CASE_1, 0x20, 0x00, 0x85);
378
0
    apdu.cla = 0x80;
379
0
    r = sc_transmit_apdu(card, &apdu);
380
0
    LOG_TEST_GOTO_ERR(card->ctx, r, "APDU transmit failed");
381
382
0
#ifdef ENABLE_SM
383
    /* temporary disable SM, change reference data does not reach the applet */
384
0
    card->sm_ctx.sm_mode = SM_MODE_NONE;
385
0
#endif
386
387
    /* change PIN */
388
0
    sc_format_apdu(card, &apdu, SC_APDU_CASE_1, 0x24, 0x01, 0x85);
389
0
    apdu.cla = 0x80;
390
0
    r = sc_transmit_apdu(card, &apdu);
391
0
#ifdef ENABLE_SM
392
    /* restore SM if possible */
393
0
    card->sm_ctx.sm_mode = sm_mode;
394
0
#endif
395
0
    LOG_TEST_GOTO_ERR(card->ctx, r, "APDU transmit failed");
396
0
    r = sc_check_sw(card, apdu.sw1, apdu.sw2);
397
0
    LOG_TEST_GOTO_ERR(card->ctx, r, "Could not change PIN");
398
0
  }
399
400
0
err:
401
0
  if (card->type == SC_CARD_TYPE_SC_HSM_SOC) {
402
    /* Select SC-HSM */
403
0
    sc_path_set(&path, SC_PATH_TYPE_DF_NAME,
404
0
          sc_hsm_aid.value, sc_hsm_aid.len, 0, 0);
405
0
    LOG_TEST_RET(card->ctx,
406
0
        sc_hsm_select_file_ex(card, &path, 1, NULL),
407
0
        "Could not select SmartCard-HSM application");
408
0
  }
409
410
0
  return r;
411
0
}
412
413
static int sc_hsm_soc_unblock(sc_card_t *card, struct sc_pin_cmd_data *data,
414
         int *tries_left)
415
0
{
416
0
  sc_apdu_t apdu;
417
0
  sc_path_t path;
418
0
  int r;
419
420
0
  if (card->type == SC_CARD_TYPE_SC_HSM_GOID) {
421
0
    return SC_ERROR_NOT_SUPPORTED;
422
0
  }
423
424
  /* Select MinBioClient */
425
0
  r = sc_hsm_soc_select_minbioclient(card);
426
0
  LOG_TEST_RET(card->ctx, r, "Could not select MinBioClient application");
427
428
  /* verify PUK */
429
0
  sc_format_apdu(card, &apdu, SC_APDU_CASE_1, 0x20, 0x00, 0x81);
430
0
  r = sc_transmit_apdu(card, &apdu);
431
0
  LOG_TEST_GOTO_ERR(card->ctx, r, "APDU transmit failed");
432
0
  r = sc_check_sw(card, apdu.sw1, apdu.sw2);
433
0
  LOG_TEST_GOTO_ERR(card->ctx, r, "Could not verify PUK");
434
435
  /* reset retry counter */
436
0
  sc_format_apdu(card, &apdu, SC_APDU_CASE_1, 0x2c, 0x03, 0x00);
437
0
  r = sc_transmit_apdu(card, &apdu);
438
0
  LOG_TEST_GOTO_ERR(card->ctx, r, "APDU transmit failed");
439
0
  r = sc_check_sw(card, apdu.sw1, apdu.sw2);
440
0
  LOG_TEST_GOTO_ERR(card->ctx, r, "Could not unblock PIN");
441
442
0
err:
443
  /* Select SC-HSM */
444
0
  sc_path_set(&path, SC_PATH_TYPE_DF_NAME, sc_hsm_aid.value, sc_hsm_aid.len, 0, 0);
445
0
  LOG_TEST_RET(card->ctx,
446
0
      sc_hsm_select_file_ex(card, &path, 1, NULL),
447
0
      "Could not select SmartCard-HSM application");
448
449
0
  return r;
450
0
}
451
452
static int sc_hsm_soc_biomatch(sc_card_t *card, struct sc_pin_cmd_data *data,
453
         int *tries_left)
454
0
{
455
0
  sc_apdu_t apdu;
456
0
  u8 rbuf[SC_MAX_APDU_BUFFER_SIZE];
457
0
  int r;
458
459
0
  if (card->type == SC_CARD_TYPE_SC_HSM_SOC) {
460
0
    sc_format_apdu(card, &apdu, SC_APDU_CASE_3_SHORT, 0x20, 0x00, 0x85);
461
0
    apdu.cla = 0x80;
462
0
    apdu.data = (unsigned char*)"\x7F\x24\x00";
463
0
    apdu.datalen = 3;
464
0
    apdu.lc = 3;
465
0
    apdu.resplen = 0;
466
467
0
    r = sc_transmit_apdu(card, &apdu);
468
0
    LOG_TEST_RET(card->ctx, r, "APDU transmit failed");
469
    /* ignore the actual status bytes */
470
0
  }
471
472
  /* JCOP's SM accelerator is incapable of using case 1 APDU in SM */
473
0
  sc_format_apdu(card, &apdu, SC_APDU_CASE_2, 0x20, 0x00, 0x81);
474
0
  if (card->type == SC_CARD_TYPE_SC_HSM_GOID) {
475
0
    apdu.cla = 0x80;
476
0
  }
477
0
  apdu.resp = rbuf;
478
0
  apdu.resplen = sizeof rbuf;
479
0
  r = sc_transmit_apdu(card, &apdu);
480
0
  LOG_TEST_RET(card->ctx, r, "APDU transmit failed");
481
482
  /* now check the status bytes */
483
0
  r =  sc_check_sw(card, apdu.sw1, apdu.sw2);
484
0
  if (r == SC_SUCCESS) {
485
0
    LOG_FUNC_RETURN(card->ctx, r);
486
0
  }
487
488
0
  LOG_FUNC_RETURN(card->ctx, SC_ERROR_PIN_CODE_INCORRECT);
489
0
}
490
491
#if defined(ENABLE_SM) && defined(ENABLE_OPENPACE)
492
493
static int sc_hsm_perform_chip_authentication(sc_card_t *card)
494
40
{
495
40
  int r, protocol;
496
40
  sc_path_t path;
497
40
  u8 all_certs[1024];
498
40
  EAC_CTX *ctx = NULL;
499
40
  size_t all_certs_len = sizeof all_certs, left, device_cert_len, issuer_cert_len;
500
40
  const unsigned char *cert = all_certs, *device_cert, *issuer_cert;
501
40
  BUF_MEM *comp_pub_key = NULL;
502
40
  sc_cvc_t cvc_device, cvc_issuer;
503
  /* this is only needed to call sc_pkcs15emu_sc_hsm_decode_cvc */
504
40
  sc_pkcs15_card_t p15card;
505
40
  sc_hsm_private_data_t *priv = (sc_hsm_private_data_t *) card->drv_data;
506
  /* we know that sc_pkcs15emu_sc_hsm_decode_cvc does not require anything
507
   * else to be initialized than p15card->card */
508
40
  p15card.card = card;
509
510
40
  memset(&cvc_device, 0, sizeof(cvc_device));
511
40
  memset(&cvc_issuer, 0, sizeof(cvc_issuer));
512
513
514
40
  if (priv->EF_C_DevAut && priv->EF_C_DevAut_len) {
515
6
    all_certs_len = priv->EF_C_DevAut_len;
516
6
    cert = priv->EF_C_DevAut;
517
34
  } else {
518
    /* get issuer and device certificate from the card */
519
34
    r = sc_path_set(&path, SC_PATH_TYPE_FILE_ID, (u8 *) "\x2F\x02", 2, 0, 0);
520
34
    if (r < 0)
521
0
      goto err;
522
34
    r = sc_select_file(card, &path, NULL);
523
34
    if (r < 0)
524
12
      goto err;
525
22
    r = sc_read_binary(card, 0, all_certs, all_certs_len, 0);
526
22
    if (r < 0)
527
12
      goto err;
528
10
    if (r == 0) {
529
3
      r = SC_ERROR_FILE_NOT_FOUND;
530
3
      goto err;
531
3
    }
532
533
7
    all_certs_len = r;
534
535
    /* save EF_C_DevAut for further use */
536
7
    cert = realloc(priv->EF_C_DevAut, all_certs_len);
537
7
    if (cert) {
538
7
      memcpy((unsigned char *) cert, all_certs, all_certs_len);
539
7
      priv->EF_C_DevAut = (unsigned char *) cert;
540
7
      priv->EF_C_DevAut_len = all_certs_len;
541
7
    }
542
543
7
    cert = all_certs;
544
7
  }
545
13
  left = all_certs_len;
546
547
13
  device_cert = cert;
548
13
  r = sc_pkcs15emu_sc_hsm_decode_cvc(&p15card, &cert, &left, &cvc_device);
549
13
  if (r < 0)
550
13
    goto err;
551
0
  device_cert_len = all_certs_len - left;
552
553
0
  issuer_cert = cert;
554
0
  r = sc_pkcs15emu_sc_hsm_decode_cvc(&p15card, &cert, &left, &cvc_issuer);
555
0
  if (r < 0)
556
0
    goto err;
557
0
  issuer_cert_len = all_certs_len - device_cert_len - left;
558
559
0
  ctx = EAC_CTX_new();
560
0
  if (!ctx) {
561
0
    r = SC_ERROR_INTERNAL;
562
0
    goto err;
563
0
  }
564
565
566
  /* check all CVCs given of the document's pki */
567
0
  if (!TA_STEP2_import_certificate(ctx, issuer_cert, issuer_cert_len)
568
0
      || !TA_STEP2_import_certificate(ctx, device_cert, device_cert_len)) {
569
0
    r = SC_ERROR_INTERNAL;
570
0
    goto err;
571
0
  }
572
573
  /* XXX on older JCOPs only NID_id_CA_ECDH_3DES_CBC_CBC may be
574
   * supported. The card does not export its capabilities. We hardcode
575
   * NID_id_CA_ECDH_AES_CBC_CMAC_128 here, because we don't have the older
576
   * cards in production. */
577
0
  protocol = NID_id_CA_ECDH_AES_CBC_CMAC_128;
578
579
  /* initialize CA domain parameter with the document's public key */
580
0
  if (!EAC_CTX_init_ca(ctx, protocol, 8)) {
581
0
    r = SC_ERROR_INTERNAL;
582
0
    goto err;
583
0
  }
584
0
  EVP_PKEY_free(ctx->ca_ctx->ka_ctx->key);
585
0
  if (!EVP_PKEY_up_ref(ctx->ta_ctx->pub_key)) {
586
0
    sc_log_openssl(card->ctx);
587
0
    r = SC_ERROR_INTERNAL;
588
0
    goto err;
589
0
  }
590
0
  ctx->ca_ctx->ka_ctx->key = ctx->ta_ctx->pub_key;
591
592
  /* generate keys for CA */
593
0
  comp_pub_key = TA_STEP3_generate_ephemeral_key(ctx);
594
0
  r = perform_chip_authentication_ex(card, ctx,
595
0
      cvc_device.publicPoint, cvc_device.publicPointlen);
596
597
40
err:
598
40
  if (r < 0)
599
40
    EAC_CTX_clear_free(ctx);
600
40
  if (comp_pub_key)
601
0
    BUF_MEM_free(comp_pub_key);
602
40
  sc_pkcs15emu_sc_hsm_free_cvc(&cvc_device);
603
40
  sc_pkcs15emu_sc_hsm_free_cvc(&cvc_issuer);
604
605
40
  return r;
606
0
}
607
608
#else
609
610
static int sc_hsm_perform_chip_authentication(sc_card_t *card)
611
{
612
  return SC_ERROR_NOT_SUPPORTED;
613
}
614
#endif
615
616
617
618
static int sc_hsm_pin_cmd(sc_card_t *card, struct sc_pin_cmd_data *data,
619
         int *tries_left)
620
577
{
621
577
  sc_hsm_private_data_t *priv = (sc_hsm_private_data_t *) card->drv_data;
622
577
  sc_apdu_t apdu;
623
577
  u8 cmdbuff[16];
624
577
#ifdef ENABLE_SM
625
577
  u8 rbuf[SC_MAX_APDU_BUFFER_SIZE];
626
577
#endif
627
577
  int r;
628
577
  int cmd = data->cmd;
629
577
  size_t pin2_len = data->pin2.len;
630
631
577
  if (cmd == SC_PIN_CMD_GET_SESSION_PIN) {
632
    /* First, perform a standard VERIFY */
633
0
    data->cmd = SC_PIN_CMD_VERIFY;
634
    /* we assign pin2.len to 0 early on so that in case of an error we are
635
     * not exiting with an undefined session PIN */
636
0
    data->pin2.len = 0;
637
0
  }
638
639
577
  if ((card->caps & SC_CARD_CAP_PROTECTED_AUTHENTICATION_PATH)
640
0
        && (data->cmd == SC_PIN_CMD_CHANGE)
641
0
        && (data->pin_reference == 0x81)
642
0
      && (!data->pin1.data || data->pin1.len <= 0)) {
643
0
    return sc_hsm_soc_change(card, data, tries_left);
644
577
  } else if ((card->caps & SC_CARD_CAP_PROTECTED_AUTHENTICATION_PATH)
645
0
        && (data->cmd == SC_PIN_CMD_UNBLOCK)
646
0
        && (data->pin_reference == 0x81)
647
0
      && (!data->pin1.data || data->pin1.len <= 0)) {
648
0
    return sc_hsm_soc_unblock(card, data, tries_left);
649
0
  }
650
651
577
#ifdef ENABLE_SM
652
  /* For contactless cards always establish a secure channel before PIN
653
   * verification. Also, Session PIN generation requires SM. */
654
577
  if ((card->type == SC_CARD_TYPE_SC_HSM_SOC
655
577
        || card->type == SC_CARD_TYPE_SC_HSM_GOID
656
0
        || card->reader->uid.len || cmd == SC_PIN_CMD_GET_SESSION_PIN)
657
577
      && (data->cmd != SC_PIN_CMD_GET_INFO)) {
658
40
    struct sc_pin_cmd_data check_sm_pin_data;
659
40
    memset(&check_sm_pin_data, 0, sizeof(check_sm_pin_data));
660
40
    check_sm_pin_data.cmd = SC_PIN_CMD_GET_INFO;
661
40
    check_sm_pin_data.pin_type = data->pin_type;
662
40
    check_sm_pin_data.pin_reference = data->pin_reference;
663
664
40
    r = SC_ERROR_NOT_ALLOWED;
665
40
    if (card->sm_ctx.sm_mode == SM_MODE_TRANSMIT) {
666
      /* check if the existing SM channel is still valid */
667
0
      r = sc_pin_cmd(card, &check_sm_pin_data, NULL);
668
0
    }
669
40
    if (r == SC_ERROR_ASN1_OBJECT_NOT_FOUND || r == SC_ERROR_NOT_ALLOWED) {
670
      /* need to establish a new SM channel */
671
40
      LOG_TEST_RET(card->ctx,
672
40
          sc_hsm_perform_chip_authentication(card),
673
40
          "Could not perform chip authentication");
674
40
    }
675
40
  }
676
537
#endif
677
678
537
  if ((card->caps & SC_CARD_CAP_PROTECTED_AUTHENTICATION_PATH)
679
0
      && (data->cmd == SC_PIN_CMD_VERIFY)
680
0
      && (data->pin_reference == 0x81)
681
0
      && (!data->pin1.data || data->pin1.len <= 0)) {
682
0
    r = sc_hsm_soc_biomatch(card, data, tries_left);
683
537
  } else {
684
537
    if ((data->cmd == SC_PIN_CMD_VERIFY) && (data->pin_reference == 0x88)) {
685
0
      if (data->pin1.len != 16)
686
0
        return SC_ERROR_INVALID_PIN_LENGTH;
687
688
      // Save SO PIN for later use in sc_hsm_init_pin()
689
0
      r = sc_hsm_encode_sopin(data->pin1.data, priv->sopin);
690
0
      LOG_TEST_RET(card->ctx, r, "APDU transmit failed");
691
692
0
      LOG_FUNC_RETURN(card->ctx, SC_SUCCESS);
693
0
    }
694
695
537
    if ((data->cmd == SC_PIN_CMD_CHANGE) && (data->pin_reference == 0x88)) {
696
0
      if ((data->pin1.len != 16) || (data->pin2.len != 16))
697
0
        return SC_ERROR_INVALID_PIN_LENGTH;
698
699
0
      r = sc_hsm_encode_sopin(data->pin1.data, cmdbuff);
700
0
      LOG_TEST_RET(card->ctx, r, "APDU transmit failed");
701
702
0
      r = sc_hsm_encode_sopin(data->pin2.data, cmdbuff + 8);
703
0
      LOG_TEST_RET(card->ctx, r, "APDU transmit failed");
704
705
0
      sc_format_apdu(card, &apdu, SC_APDU_CASE_3_SHORT, 0x24, 0x00, data->pin_reference);
706
0
      apdu.data = cmdbuff;
707
0
      apdu.datalen = sizeof(cmdbuff);
708
0
      apdu.lc = 16;
709
0
      apdu.resplen = 0;
710
0
      data->apdu = &apdu;
711
0
    }
712
713
537
#ifdef ENABLE_SM
714
537
    if ((data->cmd == SC_PIN_CMD_GET_INFO)
715
537
        && (card->sm_ctx.sm_mode == SM_MODE_TRANSMIT)) {
716
      /* JCOP's SM accelerator is incapable of using case 1 APDU in SM */
717
0
      sc_format_apdu(card, &apdu, SC_APDU_CASE_2, 0x20, 0x00, data->pin_reference);
718
0
      apdu.resp = rbuf;
719
0
      apdu.resplen = sizeof rbuf;
720
0
      data->apdu = &apdu;
721
0
    }
722
537
#endif
723
724
537
    data->pin1.offset = 5;
725
537
    data->pin2.offset = 5;
726
727
537
    r = (*iso_ops->pin_cmd)(card, data, tries_left);
728
537
    data->apdu = NULL;
729
537
  }
730
537
  LOG_TEST_RET(card->ctx, r, "Verification failed");
731
732
184
  if (cmd == SC_PIN_CMD_GET_SESSION_PIN) {
733
    /* reset data->cmd to its original value */
734
0
    data->cmd = SC_PIN_CMD_GET_SESSION_PIN;
735
0
    if (data->pin_reference == 0x81) {
736
0
      u8 recvbuf[SC_MAX_APDU_BUFFER_SIZE];
737
0
#ifdef ENABLE_SM
738
0
      if (card->sm_ctx.sm_mode != SM_MODE_TRANSMIT) {
739
0
        sc_log(card->ctx,
740
0
            "Session PIN generation only supported in SM");
741
0
        LOG_FUNC_RETURN(card->ctx, SC_SUCCESS);
742
0
      }
743
#else
744
      sc_log(card->ctx,
745
          "Session PIN generation only supported in SM");
746
      LOG_FUNC_RETURN(card->ctx, SC_SUCCESS);
747
#endif
748
0
      sc_format_apdu(card, &apdu, SC_APDU_CASE_2_SHORT, 0x5A, 0x01, data->pin_reference);
749
0
      apdu.cla = 0x80;
750
0
      apdu.resp = recvbuf;
751
0
      apdu.resplen = sizeof recvbuf;
752
0
      apdu.le = 0;
753
0
      if (sc_transmit_apdu(card, &apdu) != SC_SUCCESS
754
0
          || sc_check_sw(card, apdu.sw1, apdu.sw2) != SC_SUCCESS) {
755
0
        sc_log(card->ctx,
756
0
            "Generating session PIN failed");
757
0
        LOG_FUNC_RETURN(card->ctx, SC_SUCCESS);
758
0
      }
759
0
      if (data->pin2.data && pin2_len > 0) {
760
0
        if (pin2_len >= apdu.resplen) {
761
0
          memcpy((unsigned char *) data->pin2.data, apdu.resp,
762
0
              apdu.resplen);
763
0
          data->pin2.len = apdu.resplen;
764
0
        } else {
765
0
          sc_log(card->ctx,
766
0
              "Buffer too small for session PIN");
767
0
        }
768
0
      }
769
0
    } else {
770
0
      sc_log(card->ctx,
771
0
          "Session PIN not supported for this PIN (0x%02X)",
772
0
          data->pin_reference);
773
0
    }
774
0
  }
775
184
  LOG_FUNC_RETURN(card->ctx, SC_SUCCESS);
776
184
}
777
778
779
780
static int sc_hsm_logout(sc_card_t * card)
781
0
{
782
0
  sc_path_t path;
783
0
  sc_hsm_private_data_t *priv = (sc_hsm_private_data_t *) card->drv_data;
784
0
  memset(priv->sopin, 0, sizeof(priv->sopin));
785
0
#ifdef ENABLE_SM
786
0
  sc_sm_stop(card);
787
0
#endif
788
789
0
  sc_path_set(&path, SC_PATH_TYPE_DF_NAME, sc_hsm_aid.value, sc_hsm_aid.len, 0, 0);
790
791
0
  return sc_hsm_select_file_ex(card, &path, 1, NULL);
792
0
}
793
794
795
/* NOTE: idx is an offset into the card's file, not into buf */
796
static int sc_hsm_read_binary(sc_card_t *card,
797
             unsigned int idx, u8 *buf, size_t count,
798
             unsigned long *flags)
799
476
{
800
476
  sc_context_t *ctx = card->ctx;
801
476
  sc_apdu_t apdu;
802
476
  u8 cmdbuff[4];
803
476
  int r;
804
805
476
  if (idx > 0xffff) {
806
0
    sc_log(ctx,  "invalid EF offset: 0x%X > 0xFFFF", idx);
807
0
    return SC_ERROR_OFFSET_TOO_LARGE;
808
0
  }
809
810
476
  cmdbuff[0] = 0x54;
811
476
  cmdbuff[1] = 0x02;
812
476
  cmdbuff[2] = (idx >> 8) & 0xFF;
813
476
  cmdbuff[3] = idx & 0xFF;
814
815
476
  assert(count <= sc_get_max_recv_size(card));
816
476
  sc_format_apdu(card, &apdu, SC_APDU_CASE_4, 0xB1, 0x00, 0x00);
817
476
  apdu.data = cmdbuff;
818
476
  apdu.datalen = 4;
819
476
  apdu.lc = 4;
820
476
  apdu.le = count;
821
476
  apdu.resplen = count;
822
476
  apdu.resp = buf;
823
824
476
  r = sc_transmit_apdu(card, &apdu);
825
476
  LOG_TEST_RET(ctx, r, "APDU transmit failed");
826
827
469
  r =  sc_check_sw(card, apdu.sw1, apdu.sw2);
828
469
  if (r != SC_ERROR_FILE_END_REACHED) {
829
394
    LOG_TEST_RET(ctx, r, "Check SW error");
830
394
  }
831
832
385
  LOG_FUNC_RETURN(ctx, (int)apdu.resplen);
833
385
}
834
835
836
/* NOTE: idx is an offset into the card's file, not into buf */
837
static int sc_hsm_write_ef(sc_card_t *card,
838
             int fid,
839
             unsigned int idx, const u8 *buf, size_t count)
840
0
{
841
0
  sc_context_t *ctx = card->ctx;
842
0
  sc_apdu_t apdu;
843
0
  u8 *cmdbuff, *p;
844
0
  size_t len;
845
0
  int r;
846
847
0
  if (idx > 0xffff) {
848
0
    sc_log(ctx,  "invalid EF offset: 0x%X > 0xFFFF", idx);
849
0
    return SC_ERROR_OFFSET_TOO_LARGE;
850
0
  }
851
852
0
  cmdbuff = malloc(8 + count);
853
0
  if (!cmdbuff) {
854
0
    LOG_FUNC_RETURN(card->ctx, SC_ERROR_OUT_OF_MEMORY);
855
0
  }
856
857
0
  size_t bytes_left = count;
858
  // 8 bytes are required for T54(4) and T53(4)
859
0
  size_t blk_size = card->max_send_size - 8;
860
0
  size_t to_send = 0;
861
0
  size_t file_offset = (size_t) idx;
862
0
  size_t offset = 0;
863
0
  do {
864
0
    to_send = bytes_left >= blk_size ? blk_size : bytes_left;
865
0
    p = cmdbuff;
866
    // ASN1 0x54 offset
867
0
    *p++ = 0x54;
868
0
    *p++ = 0x02;
869
0
    *p++ = (file_offset >> 8) & 0xFF;
870
0
    *p++ = file_offset & 0xFF;
871
    // ASN1 0x53 to_send
872
0
    *p++ = 0x53;
873
0
    if (to_send < 128) {
874
0
      *p++ = (u8)to_send;
875
0
      len = 6;
876
0
    } else if (to_send < 256) {
877
0
      *p++ = 0x81;
878
0
      *p++ = (u8)to_send;
879
0
      len = 7;
880
0
    } else {
881
0
      *p++ = 0x82;
882
0
      *p++ = (to_send >> 8) & 0xFF;
883
0
      *p++ = to_send & 0xFF;
884
0
      len = 8;
885
0
    }
886
887
0
    if (buf != NULL)
888
0
      memcpy(p, buf+offset, to_send);
889
0
    len += to_send;
890
891
0
    sc_format_apdu(card, &apdu, SC_APDU_CASE_3, 0xD7, fid >> 8, fid & 0xFF);
892
0
    apdu.data = cmdbuff;
893
0
    apdu.datalen = len;
894
0
    apdu.lc = len;
895
896
0
    r = sc_transmit_apdu(card, &apdu);
897
0
    LOG_TEST_GOTO_ERR(ctx, r, "APDU transmit failed");
898
0
    r = sc_check_sw(card, apdu.sw1, apdu.sw2);
899
0
    LOG_TEST_GOTO_ERR(ctx, r, "Check SW error");
900
901
0
    bytes_left -= to_send;
902
0
    offset += to_send;
903
0
    file_offset += to_send;
904
0
  } while (0 < bytes_left);
905
906
0
err:
907
0
  free(cmdbuff);
908
909
0
  LOG_FUNC_RETURN(ctx, (int)count);
910
0
}
911
912
913
static int sc_hsm_update_binary(sc_card_t *card,
914
             unsigned int idx, const u8 *buf, size_t count,
915
             unsigned long flags)
916
0
{
917
0
  return sc_hsm_write_ef(card, 0, idx, buf, count);
918
0
}
919
920
921
922
static int sc_hsm_list_files(sc_card_t *card, u8 * buf, size_t buflen)
923
0
{
924
0
  sc_apdu_t apdu;
925
0
  u8 recvbuf[MAX_EXT_APDU_LENGTH];
926
0
  sc_hsm_private_data_t *priv = (sc_hsm_private_data_t *) card->drv_data;
927
0
  int r;
928
929
0
  if (priv->noExtLength) {
930
0
    sc_format_apdu(card, &apdu, SC_APDU_CASE_2, 0x58, 0, 0);
931
0
  } else {
932
0
    sc_format_apdu(card, &apdu, SC_APDU_CASE_2_EXT, 0x58, 0, 0);
933
0
  }
934
0
  apdu.cla = 0x80;
935
0
  apdu.resp = recvbuf;
936
0
  apdu.resplen = sizeof(recvbuf);
937
0
  apdu.le = 0;
938
0
  r = sc_transmit_apdu(card, &apdu);
939
940
0
  if ((r == SC_ERROR_TRANSMIT_FAILED) && (!priv->noExtLength)) {
941
0
    sc_log(card->ctx, "No extended length support ? Trying fall-back to short APDUs, probably breaking support for RSA 2048 operations");
942
0
    priv->noExtLength = 1;
943
0
    card->max_send_size = 248;    // 255 - 7 because of TLV in odd ins UPDATE BINARY
944
0
    return sc_hsm_list_files(card, buf, buflen);
945
0
  }
946
0
  LOG_TEST_RET(card->ctx, r, "ENUMERATE OBJECTS APDU transmit failed");
947
948
0
  if (buflen < apdu.resplen)
949
0
    memcpy(buf, recvbuf, buflen);
950
0
  else
951
0
    memcpy(buf, recvbuf, apdu.resplen);
952
953
0
  LOG_FUNC_RETURN(card->ctx, (int)apdu.resplen);
954
0
}
955
956
957
958
static int sc_hsm_create_file(sc_card_t *card, sc_file_t *file)
959
0
{
960
0
  int r;
961
962
0
  r = sc_hsm_write_ef(card, file->id, 0, NULL, 0);
963
0
  LOG_TEST_RET(card->ctx, r, "Create file failed");
964
965
0
  LOG_FUNC_RETURN(card->ctx, SC_SUCCESS);
966
0
}
967
968
969
970
static int sc_hsm_delete_file(sc_card_t *card, const sc_path_t *path)
971
0
{
972
0
  sc_context_t *ctx = card->ctx;
973
0
  sc_apdu_t apdu;
974
0
  u8 sbuf[2];
975
0
  int r;
976
977
0
  if ((path->type != SC_PATH_TYPE_FILE_ID) || (path->len != 2)) {
978
0
    sc_log(card->ctx,  "File type has to be SC_PATH_TYPE_FILE_ID");
979
0
    LOG_FUNC_RETURN(card->ctx, SC_ERROR_INVALID_ARGUMENTS);
980
0
  }
981
982
0
  sbuf[0] = path->value[0];
983
0
  sbuf[1] = path->value[1];
984
985
0
  sc_format_apdu(card, &apdu, SC_APDU_CASE_3_SHORT, 0xE4, 0x02, 0x00);
986
0
  apdu.data = sbuf;
987
0
  apdu.datalen = sizeof(sbuf);
988
0
  apdu.lc = sizeof(sbuf);
989
990
0
  r = sc_transmit_apdu(card, &apdu);
991
0
  LOG_TEST_RET(ctx, r, "APDU transmit failed");
992
993
0
  r =  sc_check_sw(card, apdu.sw1, apdu.sw2);
994
0
  LOG_TEST_RET(ctx, r, "Check SW error");
995
996
0
  LOG_FUNC_RETURN(ctx, SC_SUCCESS);
997
0
}
998
999
1000
static int sc_hsm_set_security_env(sc_card_t *card,
1001
           const sc_security_env_t *env,
1002
           int se_num)
1003
1.87k
{
1004
1.87k
  sc_hsm_private_data_t *priv = (sc_hsm_private_data_t *) card->drv_data;
1005
1006
1.87k
  priv->env = env;
1007
1008
1.87k
  switch(env->algorithm) {
1009
1.87k
  case SC_ALGORITHM_RSA:
1010
1.87k
    if (env->algorithm_flags & SC_ALGORITHM_RSA_PAD_PKCS1) {
1011
0
      if (env->algorithm_flags & SC_ALGORITHM_RSA_HASH_SHA1) {
1012
0
        priv->algorithm = ALGO_RSA_PKCS1_SHA1;
1013
0
      } else if (env->algorithm_flags & SC_ALGORITHM_RSA_HASH_SHA256) {
1014
0
        priv->algorithm = ALGO_RSA_PKCS1_SHA256;
1015
0
      } else if (env->algorithm_flags & SC_ALGORITHM_RSA_HASH_SHA384) {
1016
0
        priv->algorithm = ALGO_RSA_PKCS1_SHA384;
1017
0
      } else if (env->algorithm_flags & SC_ALGORITHM_RSA_HASH_SHA512) {
1018
0
        priv->algorithm = ALGO_RSA_PKCS1_SHA512;
1019
0
      } else {
1020
0
        priv->algorithm = ALGO_RSA_PKCS1;
1021
0
      }
1022
1.87k
    } else if (env->algorithm_flags & SC_ALGORITHM_RSA_PAD_PSS) {
1023
795
      if ((env->algorithm_flags & SC_ALGORITHM_RSA_HASHES) &&
1024
0
          (((env->algorithm_flags & SC_ALGORITHM_MGF1_HASHES) >> 8) != (env->algorithm_flags & SC_ALGORITHM_RSA_HASHES))) {
1025
0
        LOG_FUNC_RETURN(card->ctx, SC_ERROR_INVALID_ARGUMENTS);
1026
0
      }
1027
795
      priv->algorithm = ALGO_RSA_PSS;
1028
1.07k
    } else {
1029
1.07k
      if (env->operation == SC_SEC_OPERATION_DECIPHER) {
1030
284
        priv->algorithm = ALGO_RSA_DECRYPT;
1031
795
      } else {
1032
795
        priv->algorithm = ALGO_RSA_RAW;
1033
795
      }
1034
1.07k
    }
1035
1.87k
    break;
1036
1.87k
  case SC_ALGORITHM_EC:
1037
0
    if (env->operation == SC_SEC_OPERATION_DERIVE) {
1038
0
      priv->algorithm = ALGO_EC_DH;
1039
0
    } else if (env->algorithm_flags & SC_ALGORITHM_ECDSA_HASH_NONE) {
1040
0
      priv->algorithm = ALGO_EC_RAW;
1041
0
    } else if (env->algorithm_flags & SC_ALGORITHM_ECDSA_HASH_SHA1) {
1042
0
      priv->algorithm = ALGO_EC_SHA1;
1043
0
    } else if (env->algorithm_flags & SC_ALGORITHM_ECDSA_HASH_SHA224) {
1044
0
      priv->algorithm = ALGO_EC_SHA224;
1045
0
    } else if (env->algorithm_flags & SC_ALGORITHM_ECDSA_HASH_SHA256) {
1046
0
      priv->algorithm = ALGO_EC_SHA256;
1047
0
    } else if (env->algorithm_flags & SC_ALGORITHM_ECDSA_HASH_SHA384) {
1048
0
      priv->algorithm = ALGO_EC_SHA384;
1049
0
    } else if (env->algorithm_flags & SC_ALGORITHM_ECDSA_HASH_SHA512) {
1050
0
      priv->algorithm = ALGO_EC_SHA512;
1051
0
    } else if (env->algorithm_flags & SC_ALGORITHM_ECDSA_RAW) {
1052
0
      priv->algorithm = ALGO_EC_RAW;
1053
0
    } else {
1054
0
      LOG_FUNC_RETURN(card->ctx, SC_ERROR_INVALID_ARGUMENTS);
1055
0
    }
1056
0
    break;
1057
0
  default:
1058
0
    LOG_FUNC_RETURN(card->ctx, SC_ERROR_INVALID_ARGUMENTS);
1059
0
    break;
1060
1.87k
  }
1061
1.87k
  LOG_FUNC_RETURN(card->ctx, SC_SUCCESS);
1062
1.87k
}
1063
1064
1065
1066
static int sc_hsm_decode_ecdsa_signature(sc_card_t *card,
1067
          const u8 * data, size_t datalen,
1068
          u8 * out, size_t outlen,
1069
0
          size_t key_size) {
1070
1071
0
  int r;
1072
0
  size_t fieldsizebytes = (key_size + 7) >> 3;
1073
1074
0
  sc_log(card->ctx,
1075
0
         "Field size %"SC_FORMAT_LEN_SIZE_T"u, signature buffer size %"SC_FORMAT_LEN_SIZE_T"u",
1076
0
         fieldsizebytes, outlen);
1077
1078
0
  r = sc_asn1_decode_ecdsa_signature(card->ctx, data, datalen, fieldsizebytes, &out, outlen);
1079
0
  LOG_FUNC_RETURN(card->ctx, r);
1080
0
}
1081
1082
1083
1084
static int sc_hsm_compute_signature(sc_card_t *card,
1085
             const u8 * data, size_t datalen,
1086
             u8 * out, size_t outlen)
1087
1.59k
{
1088
1.59k
  int r;
1089
1.59k
  sc_apdu_t apdu;
1090
1.59k
  u8 rbuf[514];
1091
1.59k
  sc_hsm_private_data_t *priv;
1092
1093
1.59k
  if (card == NULL || data == NULL || out == NULL) {
1094
0
    return SC_ERROR_INVALID_ARGUMENTS;
1095
0
  }
1096
1.59k
  priv = (sc_hsm_private_data_t *) card->drv_data;
1097
1098
1.59k
  if (priv->env == NULL) {
1099
0
    LOG_FUNC_RETURN(card->ctx, SC_ERROR_OBJECT_NOT_FOUND);
1100
0
  }
1101
1102
1.59k
  sc_format_apdu(card, &apdu, SC_APDU_CASE_4_EXT, 0x68, priv->env->key_ref[0], priv->algorithm);
1103
1.59k
  apdu.cla = 0x80;
1104
1.59k
  apdu.resp = rbuf;
1105
1.59k
  apdu.resplen = sizeof(rbuf);
1106
1.59k
  apdu.le = 512;
1107
1108
1.59k
  apdu.data = data;
1109
1.59k
  apdu.lc = datalen;
1110
1.59k
  apdu.datalen = datalen;
1111
1.59k
  r = sc_transmit_apdu(card, &apdu);
1112
1113
1.59k
  LOG_TEST_RET(card->ctx, r, "APDU transmit failed");
1114
1.28k
  if (apdu.sw1 == 0x90 && apdu.sw2 == 0x00) {
1115
99
    int len;
1116
1117
99
    if ((priv->algorithm & 0xF0) == ALGO_EC_RAW) {
1118
0
      len = sc_hsm_decode_ecdsa_signature(card, apdu.resp, apdu.resplen, out, outlen, priv->env->key_size_bits);
1119
0
      if (len < 0) {
1120
0
        LOG_FUNC_RETURN(card->ctx, len);
1121
0
      }
1122
99
    } else {
1123
99
      len = (int)(apdu.resplen > outlen ? outlen : apdu.resplen);
1124
99
      memcpy(out, apdu.resp, len);
1125
99
    }
1126
99
    LOG_FUNC_RETURN(card->ctx, len);
1127
99
  }
1128
1.18k
  LOG_FUNC_RETURN(card->ctx, sc_check_sw(card, apdu.sw1, apdu.sw2));
1129
1.18k
}
1130
1131
1132
1133
static int sc_hsm_decipher(sc_card_t *card, const u8 * crgram, size_t crgram_len, u8 * out, size_t outlen)
1134
262
{
1135
262
  int r;
1136
262
  size_t len;
1137
262
  sc_apdu_t apdu;
1138
262
  u8 rbuf[514];
1139
262
  sc_hsm_private_data_t *priv;
1140
1141
262
  if (card == NULL || crgram == NULL || out == NULL) {
1142
0
    return SC_ERROR_INVALID_ARGUMENTS;
1143
0
  }
1144
262
  LOG_FUNC_CALLED(card->ctx);
1145
262
  priv = (sc_hsm_private_data_t *) card->drv_data;
1146
1147
262
  sc_format_apdu(card, &apdu, SC_APDU_CASE_4_EXT, 0x62, priv->env->key_ref[0], priv->algorithm);
1148
262
  apdu.cla = 0x80;
1149
262
  apdu.resp = rbuf;
1150
262
  apdu.resplen = sizeof(rbuf);
1151
262
  apdu.le = 512;
1152
1153
262
  apdu.data = (u8 *)crgram;
1154
262
  apdu.lc = crgram_len;
1155
262
  apdu.datalen = crgram_len;
1156
1157
262
  r = sc_transmit_apdu(card, &apdu);
1158
1159
262
  LOG_TEST_RET(card->ctx, r, "APDU transmit failed");
1160
225
  if (apdu.sw1 == 0x90 && apdu.sw2 == 0x00) {
1161
49
    if (priv->algorithm == ALGO_EC_DH) {
1162
      //
1163
      // The SmartCard-HSM returns the point result of the DH operation
1164
      // with a leading '04'
1165
0
      assert(apdu.resplen > 0);
1166
0
      len = apdu.resplen - 1 > outlen ? outlen : apdu.resplen - 1;
1167
0
      memcpy(out, apdu.resp + 1, len);
1168
0
      LOG_FUNC_RETURN(card->ctx, (int)len);
1169
49
    } else {
1170
49
      len = apdu.resplen > outlen ? outlen : apdu.resplen;
1171
49
      memcpy(out, apdu.resp, len);
1172
49
      LOG_FUNC_RETURN(card->ctx, (int)len);
1173
49
    }
1174
49
  }
1175
176
  else
1176
225
    LOG_FUNC_RETURN(card->ctx, sc_check_sw(card, apdu.sw1, apdu.sw2));
1177
225
}
1178
1179
1180
1181
void sc_hsm_set_serialnr(sc_card_t *card, char *serial)
1182
0
{
1183
0
  sc_hsm_private_data_t *priv = (sc_hsm_private_data_t *) card->drv_data;
1184
1185
0
  if (priv->serialno) {
1186
0
    free(priv->serialno);
1187
0
  }
1188
1189
0
  priv->serialno = strdup(serial);
1190
0
}
1191
1192
1193
1194
static int sc_hsm_get_serialnr(sc_card_t *card, sc_serial_number_t *serial)
1195
183
{
1196
183
  sc_hsm_private_data_t *priv = (sc_hsm_private_data_t *) card->drv_data;
1197
1198
183
  LOG_FUNC_CALLED(card->ctx);
1199
1200
183
  if (!priv->serialno && 0 == strcmp(card->ctx->app_name, "opensc-tool")) {
1201
    /* sc-hsm initializes the serial number via its PKCS#15 layer.
1202
     * Create and destroy a dummy card to get this initialized.  Only do
1203
     * this for `opensc-tool --serial` to avoid unnecessary card commands
1204
     * in all other cases. */
1205
0
    sc_pkcs15_card_t *p15card = NULL;
1206
0
    (void)sc_pkcs15_bind(card, NULL, &p15card);
1207
0
    sc_pkcs15_unbind(p15card);
1208
0
  }
1209
1210
183
  if (!priv->serialno) {
1211
183
    return SC_ERROR_OBJECT_NOT_FOUND;
1212
183
  }
1213
1214
0
  serial->len = strlen(priv->serialno);
1215
0
  if (serial->len > sizeof(serial->value))
1216
0
    serial->len = sizeof(serial->value);
1217
1218
0
  memcpy(serial->value, priv->serialno, serial->len);
1219
1220
0
  LOG_FUNC_RETURN(card->ctx, SC_SUCCESS);
1221
0
}
1222
1223
1224
1225
static int sc_hsm_initialize(sc_card_t *card, sc_cardctl_sc_hsm_init_param_t *params)
1226
0
{
1227
0
  sc_context_t *ctx = card->ctx;
1228
0
  sc_pkcs15_tokeninfo_t ti;
1229
0
  struct sc_pin_cmd_data pincmd;
1230
0
  int r;
1231
0
  size_t tilen;
1232
0
  sc_apdu_t apdu;
1233
0
  u8 ibuff[68+0xFF], *p;
1234
1235
0
  LOG_FUNC_CALLED(card->ctx);
1236
1237
0
  p = ibuff;
1238
0
  *p++ = 0x80;  // Options
1239
0
  *p++ = 0x02;
1240
0
  memcpy(p, params->options, 2);
1241
0
  p += 2;
1242
1243
0
  if (params->user_pin_len > 0xFF) {
1244
0
    return SC_ERROR_INVALID_ARGUMENTS;
1245
0
  }
1246
0
  *p++ = 0x81;  // User PIN
1247
0
  *p++ = (u8)params->user_pin_len;
1248
0
  memcpy(p, params->user_pin, params->user_pin_len);
1249
0
  p += params->user_pin_len;
1250
1251
0
  *p++ = 0x82;  // Initialization code
1252
0
  *p++ = 0x08;
1253
0
  memcpy(p, params->init_code, 8);
1254
0
  p += 8;
1255
1256
0
  *p++ = 0x91;  // User PIN retry counter
1257
0
  *p++ = 0x01;
1258
0
  *p++ = params->user_pin_retry_counter;
1259
1260
0
  if (params->dkek_shares >= 0) {
1261
0
    *p++ = 0x92;  // Number of DKEK shares
1262
0
    *p++ = 0x01;
1263
0
    *p++ = (u8)params->dkek_shares;
1264
0
  }
1265
1266
0
  if (params->num_of_pub_keys > 0) {
1267
0
    *p++ = 0x93;  // Use public key authentication
1268
0
    *p++ = 0x02;
1269
0
    *p++ = params->num_of_pub_keys; // Total number of public keys used for public authentication
1270
0
    *p++ = params->required_pub_keys; // Number of public keys required for authentication
1271
0
  }
1272
1273
0
  if (params->bio1.len) {
1274
0
    *p++ = 0x95;
1275
0
    *p++ = params->bio1.len;
1276
0
    memcpy(p, params->bio1.value, params->bio1.len);
1277
0
    p += params->bio1.len;
1278
0
  }
1279
0
  if (params->bio2.len) {
1280
0
    *p++ = 0x96;
1281
0
    *p++ = params->bio2.len;
1282
0
    memcpy(p, params->bio2.value, params->bio2.len);
1283
0
    p += params->bio2.len;
1284
0
  }
1285
1286
0
  sc_format_apdu(card, &apdu, SC_APDU_CASE_3_SHORT, 0x50, 0x00, 0x00);
1287
0
  apdu.cla = 0x80;
1288
0
  apdu.data = ibuff;
1289
0
  apdu.datalen = p - ibuff;
1290
0
  apdu.lc = apdu.datalen;
1291
1292
0
  r = sc_transmit_apdu(card, &apdu);
1293
0
  LOG_TEST_RET(ctx, r, "APDU transmit failed");
1294
1295
0
  r =  sc_check_sw(card, apdu.sw1, apdu.sw2);
1296
1297
0
  if (r == SC_ERROR_NOT_ALLOWED) {
1298
0
    r = SC_ERROR_PIN_CODE_INCORRECT;
1299
0
  }
1300
1301
0
  LOG_TEST_RET(ctx, r, "Check SW error");
1302
1303
0
  if (params->label) {
1304
0
    memset(&ti, 0, sizeof(ti));
1305
1306
0
    ti.label = params->label;
1307
0
    ti.flags = SC_PKCS15_TOKEN_PRN_GENERATION;
1308
1309
0
    r = sc_pkcs15_encode_tokeninfo(ctx, &ti, &p, &tilen);
1310
0
    LOG_TEST_RET(ctx, r, "Error encoding tokeninfo");
1311
1312
0
    memset(&pincmd, 0, sizeof(pincmd));
1313
0
    pincmd.cmd = SC_PIN_CMD_VERIFY;
1314
0
    pincmd.pin_type = SC_AC_CHV;
1315
0
    pincmd.pin_reference = 0x81;
1316
0
    pincmd.pin1.data = params->user_pin;
1317
0
    pincmd.pin1.len = params->user_pin_len;
1318
1319
0
    r = (*iso_ops->pin_cmd)(card, &pincmd, NULL);
1320
0
    LOG_TEST_RET(ctx, r, "Could not verify PIN");
1321
1322
0
    r = sc_hsm_write_ef(card, 0x2F03, 0, p, tilen);
1323
0
    LOG_TEST_RET(ctx, r, "Could not write EF.TokenInfo");
1324
0
  }
1325
1326
0
  LOG_FUNC_RETURN(card->ctx, SC_SUCCESS);
1327
0
}
1328
1329
1330
1331
static int sc_hsm_import_dkek_share(sc_card_t *card, sc_cardctl_sc_hsm_dkek_t *params)
1332
0
{
1333
0
  sc_context_t *ctx = card->ctx;
1334
0
  sc_apdu_t apdu;
1335
0
  u8 status[SC_MAX_APDU_BUFFER_SIZE];
1336
0
  int r;
1337
1338
0
  LOG_FUNC_CALLED(card->ctx);
1339
1340
0
  if (params->importShare) {
1341
0
    sc_format_apdu(card, &apdu, SC_APDU_CASE_4_SHORT, 0x52, 0x00, 0x00);
1342
0
    apdu.cla = 0x80;
1343
0
    apdu.data = params->dkek_share;
1344
0
    apdu.datalen = sizeof(params->dkek_share);
1345
0
    apdu.lc = apdu.datalen;
1346
0
  } else {
1347
0
    sc_format_apdu(card, &apdu, SC_APDU_CASE_2_SHORT, 0x52, 0x00, 0x00);
1348
0
  }
1349
0
  apdu.cla = 0x80;
1350
0
  apdu.le = 0;
1351
0
  apdu.resp = status;
1352
0
  apdu.resplen = sizeof(status);
1353
1354
0
  r = sc_transmit_apdu(card, &apdu);
1355
0
  LOG_TEST_RET(ctx, r, "APDU transmit failed");
1356
1357
0
  r =  sc_check_sw(card, apdu.sw1, apdu.sw2);
1358
1359
0
  LOG_TEST_RET(ctx, r, "Check SW error");
1360
1361
0
  assert(apdu.resplen >= (sizeof(params->key_check_value) + 2));
1362
1363
0
  params->dkek_shares = status[0];
1364
0
  params->outstanding_shares = status[1];
1365
0
  memcpy(params->key_check_value, status + 2, sizeof(params->key_check_value));
1366
1367
0
  LOG_FUNC_RETURN(card->ctx, SC_SUCCESS);
1368
0
}
1369
1370
1371
1372
static int sc_hsm_wrap_key(sc_card_t *card, sc_cardctl_sc_hsm_wrapped_key_t *params)
1373
0
{
1374
0
  sc_context_t *ctx = card->ctx;
1375
0
  sc_apdu_t apdu;
1376
0
  u8 data[1500];
1377
0
  int r;
1378
1379
0
  LOG_FUNC_CALLED(card->ctx);
1380
1381
0
  sc_format_apdu(card, &apdu, SC_APDU_CASE_2_EXT, 0x72, params->key_id, 0x92);
1382
0
  apdu.cla = 0x80;
1383
0
  apdu.le = 0;
1384
0
  apdu.resp = data;
1385
0
  apdu.resplen = sizeof(data);
1386
1387
0
  r = sc_transmit_apdu(card, &apdu);
1388
0
  LOG_TEST_RET(ctx, r, "APDU transmit failed");
1389
1390
0
  r =  sc_check_sw(card, apdu.sw1, apdu.sw2);
1391
1392
0
  LOG_TEST_RET(ctx, r, "Check SW error");
1393
1394
0
  if (params->wrapped_key == NULL) {
1395
0
    params->wrapped_key_length = apdu.resplen;
1396
0
    params->wrapped_key = malloc(apdu.resplen);
1397
0
    if (params->wrapped_key == NULL) {
1398
0
      LOG_FUNC_RETURN(card->ctx, SC_ERROR_OUT_OF_MEMORY);
1399
0
    }
1400
0
  } else {
1401
0
    if (apdu.resplen > params->wrapped_key_length) {
1402
0
      LOG_FUNC_RETURN(card->ctx, SC_ERROR_BUFFER_TOO_SMALL);
1403
0
    }
1404
0
    params->wrapped_key_length = apdu.resplen;
1405
0
  }
1406
0
  memcpy(params->wrapped_key, data, apdu.resplen);
1407
0
  LOG_FUNC_RETURN(card->ctx, SC_SUCCESS);
1408
0
}
1409
1410
1411
1412
static int sc_hsm_unwrap_key(sc_card_t *card, sc_cardctl_sc_hsm_wrapped_key_t *params)
1413
0
{
1414
0
  sc_context_t *ctx = card->ctx;
1415
0
  sc_apdu_t apdu;
1416
0
  int r;
1417
1418
0
  LOG_FUNC_CALLED(card->ctx);
1419
1420
0
  r = sc_hsm_write_ef(card, 0x2F10, 0, params->wrapped_key, params->wrapped_key_length);
1421
0
  LOG_TEST_RET(card->ctx, r, "Create EF failed");
1422
1423
0
  sc_format_apdu(card, &apdu, SC_APDU_CASE_1, 0x74, params->key_id, 0x93);
1424
0
  apdu.cla = 0x80;
1425
0
  r = sc_transmit_apdu(card, &apdu);
1426
0
  LOG_TEST_RET(ctx, r, "APDU transmit failed");
1427
1428
0
  r = sc_check_sw(card, apdu.sw1, apdu.sw2);
1429
0
  LOG_TEST_RET(ctx, r, "Check SW error");
1430
1431
0
  LOG_FUNC_RETURN(card->ctx, SC_SUCCESS);
1432
0
}
1433
1434
static int verify_certificate(sc_card_t *card, sc_cvc_t *cvc,
1435
    const u8 *cvc_buf, size_t cvc_buf_len)
1436
0
{
1437
0
  u8 tag = SC_ASN1_TAG_CONTEXT | SC_ASN1_TAG_BIT_STRING; /* 0x83 */
1438
0
  size_t pukref_len;
1439
0
  u8 pukref[BUFSIZ];
1440
0
  sc_apdu_t apdu;
1441
0
  u8 *ptr;
1442
0
  int r;
1443
1444
0
  LOG_FUNC_CALLED(card->ctx);
1445
1446
  /* check if public key is already known */
1447
0
  if ((r = sc_asn1_put_tag(tag, (u8 *)cvc->chr, cvc->chrLen,
1448
0
          pukref, sizeof(pukref), &ptr)) < 0) {
1449
0
    sc_log(card->ctx, "Error formatting ASN.1 sequence: %s\n", sc_strerror(r));
1450
0
    LOG_FUNC_RETURN(card->ctx, SC_ERROR_UNKNOWN);
1451
0
  }
1452
0
  pukref_len = ptr - pukref;
1453
1454
  /* MANAGE SECURITY ENVIRONMENT to query public key by chr */
1455
0
  sc_format_apdu_ex(&apdu, 0x00, 0x22, 0x81, 0xB6, pukref, pukref_len, NULL, 0);
1456
1457
0
  r = sc_transmit_apdu(card, &apdu);
1458
0
  LOG_TEST_RET(card->ctx, r, "APDU transmit failed");
1459
1460
0
  r = sc_check_sw(card, apdu.sw1, apdu.sw2);
1461
0
  if (!r) {
1462
    /* already known */
1463
0
    LOG_FUNC_RETURN(card->ctx, SC_SUCCESS);
1464
0
  }
1465
0
  if (apdu.sw1 != 0x6A && apdu.sw2 != 0x88) {
1466
0
    LOG_TEST_RET(card->ctx, SC_ERROR_UNKNOWN, "Check SW error");
1467
0
  }
1468
1469
0
  if ((r = sc_asn1_put_tag(tag, (u8 *)cvc->car, cvc->carLen,
1470
0
          pukref, sizeof(pukref), &ptr)) < 0) {
1471
0
    sc_log(card->ctx, "Error formatting ASN.1 sequence: %s\n", sc_strerror(r));
1472
0
    LOG_FUNC_RETURN(card->ctx, SC_ERROR_UNKNOWN);
1473
0
  }
1474
0
  pukref_len = ptr - pukref;
1475
1476
  /* MANAGE SECURITY ENVIRONMENT to set the CAR public key */
1477
0
  sc_format_apdu_ex(&apdu, 0x00, 0x22, 0x81, 0xB6, pukref, pukref_len, NULL, 0);
1478
1479
0
  r = sc_transmit_apdu(card, &apdu);
1480
0
  LOG_TEST_RET(card->ctx, r, "APDU transmit failed");
1481
0
  r = sc_check_sw(card, apdu.sw1, apdu.sw2);
1482
0
  LOG_TEST_RET(card->ctx, r, "Check SW error");
1483
1484
  /* PERFORM SECURITY OPERATION -> VERIFY CERTIFICATE */
1485
0
  sc_format_apdu_ex(&apdu, 0x00, 0x2A, 0x00, 0xBE, cvc_buf, cvc_buf_len, NULL, 0);
1486
1487
0
  r = sc_transmit_apdu(card, &apdu);
1488
0
  LOG_TEST_RET(card->ctx, r, "APDU transmit failed");
1489
0
  r = sc_check_sw(card, apdu.sw1, apdu.sw2);
1490
0
  LOG_TEST_RET(card->ctx, r, "Check SW error");
1491
1492
0
  LOG_FUNC_RETURN(card->ctx, SC_SUCCESS);
1493
0
}
1494
1495
1496
1497
static int sc_hsm_register_public_key(sc_card_t *card,
1498
    sc_cardctl_sc_hsm_pka_register_t *pka_register)
1499
0
{
1500
0
  u8 tag = SC_ASN1_TAG_CONTEXT | SC_ASN1_TAG_BIT_STRING; /* 0x83 */
1501
0
  u8 recvbuf[4];
1502
0
  sc_context_t *ctx = card->ctx;
1503
0
  sc_apdu_t apdu;
1504
0
  u8 *ptr;
1505
0
  int r;
1506
0
  sc_pkcs15_card_t p15card;
1507
0
  const u8 *pka_buf;
1508
0
  size_t pka_buf_len;
1509
0
  sc_cvc_pka_t pka;
1510
  /* outer CAR in ASN.1 needs a byte for tag and a byte for length */
1511
0
  u8 asn1_outer_car[sizeof(pka.public_key_req.cvc.outer_car) + 2];
1512
1513
0
  LOG_FUNC_CALLED(ctx);
1514
1515
0
  memset(&pka, 0, sizeof(pka));
1516
0
  memset(&p15card, 0, sizeof(p15card));
1517
0
  p15card.card = card;
1518
1519
0
  pka_buf = pka_register->buf;
1520
0
  pka_buf_len = pka_register->buflen;
1521
0
  r = sc_pkcs15emu_sc_hsm_decode_pka(&p15card, &pka_buf, &pka_buf_len, &pka);
1522
0
  LOG_TEST_GOTO_ERR(ctx, r, "sc_pkcs15emu_sc_hsm_decode_pka failed");
1523
1524
  /* the DICA CVC must be verified first */
1525
0
  r = verify_certificate(card, &pka.dica.cvc, pka.dica.ptr, pka.dica.len);
1526
0
  LOG_TEST_GOTO_ERR(ctx, r, "Verify device issuer CA CVC failed");
1527
1528
  /* the device CVC must be verified before registering the public key */
1529
0
  r = verify_certificate(card, &pka.device.cvc, pka.device.ptr, pka.device.len);
1530
0
  LOG_TEST_GOTO_ERR(ctx, r, "Verify device CVC failed");
1531
1532
0
  r = sc_asn1_put_tag(tag,
1533
0
      (u8 *)pka.public_key_req.cvc.outer_car,
1534
0
      pka.public_key_req.cvc.outerCARLen,
1535
0
      asn1_outer_car, sizeof(asn1_outer_car), &ptr);
1536
0
  LOG_TEST_GOTO_ERR(ctx, r, "ASN.1 encode outer CAR failed");
1537
1538
  /* MANAGE SECURITY ENVIRONMENT with the outer CAR of the public key */
1539
0
  sc_format_apdu_ex(&apdu, 0x00, 0x22, 0x81, 0xB6,
1540
0
      asn1_outer_car, ptr - asn1_outer_car, NULL, 0);
1541
1542
0
  r = sc_transmit_apdu(card, &apdu);
1543
0
  LOG_TEST_GOTO_ERR(ctx, r, "APDU transmit failed");
1544
0
  r = sc_check_sw(card, apdu.sw1, apdu.sw2);
1545
0
  LOG_TEST_GOTO_ERR(ctx, r, "Check SW error");
1546
1547
0
  sc_format_apdu_ex(&apdu, 0x80, 0x54, 0x00, 0x00,
1548
0
      pka.public_key_req.ptr, pka.public_key_req.len,
1549
0
      recvbuf, sizeof(recvbuf));
1550
1551
0
  r = sc_transmit_apdu(card, &apdu);
1552
0
  LOG_TEST_GOTO_ERR(ctx, r, "APDU transmit failed");
1553
0
  r = sc_check_sw(card, apdu.sw1, apdu.sw2);
1554
0
  LOG_TEST_GOTO_ERR(ctx, r, "Check SW error");
1555
1556
0
  pka_register->new_status.num_total = recvbuf[0];
1557
0
  pka_register->new_status.num_missing = recvbuf[1];
1558
0
  pka_register->new_status.num_required = recvbuf[2];
1559
0
  pka_register->new_status.num_authenticated = recvbuf[3];
1560
1561
0
  r = 0;
1562
  /* fall-through */
1563
1564
0
err:
1565
0
  sc_pkcs15emu_sc_hsm_free_cvc_pka(&pka);
1566
0
  return r;
1567
0
}
1568
1569
1570
1571
static int sc_hsm_public_key_auth_status(sc_card_t *card,
1572
  sc_cardctl_sc_hsm_pka_status_t *status)
1573
0
{
1574
0
  u8 recvbuf[4];
1575
0
  sc_context_t *ctx = card->ctx;
1576
0
  sc_apdu_t apdu;
1577
0
  int r;
1578
1579
0
  LOG_FUNC_CALLED(card->ctx);
1580
1581
  /* get status */
1582
0
  sc_format_apdu_ex(&apdu, 0x00, 0x54, 0x00, 0x00, NULL, 0, recvbuf, sizeof recvbuf);
1583
0
  apdu.cla = 0x80;
1584
1585
0
  r = sc_transmit_apdu(card, &apdu);
1586
0
  LOG_TEST_RET(ctx, r, "APDU transmit failed");
1587
1588
0
  r = sc_check_sw(card, apdu.sw1, apdu.sw2);
1589
0
  LOG_TEST_RET(ctx, r, "Check SW error");
1590
1591
0
  status->num_total = recvbuf[0];
1592
0
  status->num_missing = recvbuf[1];
1593
0
  status->num_required = recvbuf[2];
1594
0
  status->num_authenticated = recvbuf[3];
1595
1596
0
  LOG_FUNC_RETURN(card->ctx, SC_SUCCESS);
1597
0
}
1598
1599
1600
1601
static int sc_hsm_init_token(sc_card_t *card, sc_cardctl_pkcs11_init_token_t *params)
1602
0
{
1603
0
  sc_context_t *ctx = card->ctx;
1604
0
  sc_cardctl_sc_hsm_init_param_t ip;
1605
0
  int r;
1606
0
  char label[33],*cpo;
1607
1608
0
  LOG_FUNC_CALLED(ctx);
1609
1610
0
  if (params->so_pin_len != 16) {
1611
0
    LOG_TEST_RET(ctx, SC_ERROR_INVALID_DATA, "SO PIN wrong length (!=16)");
1612
0
  }
1613
1614
0
  memset(&ip, 0, sizeof(ip));
1615
0
  ip.dkek_shares = -1;
1616
0
  ip.options[0] = 0x00;
1617
0
  ip.options[1] = 0x01;
1618
1619
0
  r = sc_hsm_encode_sopin(params->so_pin, ip.init_code);
1620
0
  LOG_TEST_RET(ctx, r, "SO PIN wrong format");
1621
1622
0
  ip.user_pin = ip.init_code;   // Use the first 6 bytes of the SO-PIN as initial User-PIN value
1623
0
  ip.user_pin_len = 6;
1624
0
  ip.user_pin_retry_counter = 3;
1625
1626
0
  if (params->label) {
1627
    // Strip trailing spaces
1628
0
    memcpy(label, params->label, 32);
1629
0
    label[32] = 0;
1630
0
    cpo = label + 31;
1631
0
    while ((cpo >= label) && (*cpo == ' ')) {
1632
0
      *cpo = 0;
1633
0
      cpo--;
1634
0
    }
1635
0
    ip.label = label;
1636
0
  }
1637
1638
0
  r = sc_hsm_initialize(card, &ip);
1639
0
  LOG_TEST_RET(ctx, r, "Check SW error");
1640
1641
0
  LOG_FUNC_RETURN(ctx, SC_SUCCESS);
1642
0
}
1643
1644
1645
1646
static int sc_hsm_init_pin(sc_card_t *card, sc_cardctl_pkcs11_init_pin_t *params)
1647
0
{
1648
0
  sc_hsm_private_data_t *priv = (sc_hsm_private_data_t *) card->drv_data;
1649
0
  sc_context_t *ctx = card->ctx;
1650
0
  int r;
1651
0
  sc_apdu_t apdu;
1652
0
  u8 ibuff[50], *p;
1653
1654
0
  LOG_FUNC_CALLED(card->ctx);
1655
1656
0
  if (params->pin_len > 16) {
1657
0
    LOG_TEST_RET(card->ctx, SC_ERROR_INVALID_DATA, "User PIN too long");
1658
0
  }
1659
1660
0
  p = ibuff;
1661
1662
0
  memcpy(p, priv->sopin, sizeof(priv->sopin));
1663
0
  p += sizeof(priv->sopin);
1664
1665
0
  memcpy(p, params->pin, params->pin_len);
1666
0
  p += params->pin_len;
1667
1668
0
  sc_format_apdu(card, &apdu, SC_APDU_CASE_3_SHORT, 0x2C, 0x00, 0x81);
1669
0
  apdu.data = ibuff;
1670
0
  apdu.datalen = p - ibuff;
1671
0
  apdu.lc = apdu.datalen;
1672
1673
0
  r = sc_transmit_apdu(card, &apdu);
1674
0
  LOG_TEST_RET(ctx, r, "APDU transmit failed");
1675
1676
0
  r =  sc_check_sw(card, apdu.sw1, apdu.sw2);
1677
1678
  // Cards before version 1.0 do not implement RESET_RETRY_COUNTER
1679
  // For those cards the CHANGE REFERENCE DATA command is used instead
1680
0
  if (r == SC_ERROR_INS_NOT_SUPPORTED) {
1681
0
    p = ibuff;
1682
0
    memcpy(p, priv->sopin, 6);
1683
0
    p += 6;
1684
1685
0
    memcpy(p, params->pin, params->pin_len);
1686
0
    p += params->pin_len;
1687
1688
0
    sc_format_apdu(card, &apdu, SC_APDU_CASE_3_SHORT, 0x24, 0x00, 0x81);
1689
0
    apdu.data = ibuff;
1690
0
    apdu.datalen = p - ibuff;
1691
0
    apdu.lc = apdu.datalen;
1692
1693
0
    r = sc_transmit_apdu(card, &apdu);
1694
0
    LOG_TEST_RET(ctx, r, "APDU transmit failed");
1695
1696
0
    r =  sc_check_sw(card, apdu.sw1, apdu.sw2);
1697
0
  }
1698
1699
0
  LOG_TEST_RET(ctx, r, "Check SW error");
1700
1701
0
  memset(priv->sopin, 0, sizeof(priv->sopin));
1702
1703
0
  LOG_FUNC_RETURN(card->ctx, SC_SUCCESS);
1704
0
}
1705
1706
1707
1708
static int sc_hsm_generate_keypair(sc_card_t *card, sc_cardctl_sc_hsm_keygen_info_t *keyinfo)
1709
0
{
1710
0
  u8 rbuf[1200];
1711
0
  int r;
1712
0
  sc_apdu_t apdu;
1713
1714
0
  LOG_FUNC_CALLED(card->ctx);
1715
1716
0
  sc_format_apdu(card, &apdu, SC_APDU_CASE_4_EXT, 0x46, keyinfo->key_id, keyinfo->auth_key_id);
1717
0
  apdu.cla = 0x00;
1718
0
  apdu.resp = rbuf;
1719
0
  apdu.resplen = sizeof(rbuf);
1720
0
  apdu.le = 0;
1721
1722
0
  apdu.data = keyinfo->gakprequest;
1723
0
  apdu.lc = keyinfo->gakprequest_len;
1724
0
  apdu.datalen = keyinfo->gakprequest_len;
1725
1726
0
  r = sc_transmit_apdu(card, &apdu);
1727
0
  LOG_TEST_RET(card->ctx, r, "APDU transmit failed");
1728
1729
0
  r =  sc_check_sw(card, apdu.sw1, apdu.sw2);
1730
0
  LOG_TEST_RET(card->ctx, r, "Check SW error");
1731
1732
0
  keyinfo->gakpresponse_len = apdu.resplen;
1733
0
  keyinfo->gakpresponse = malloc(apdu.resplen);
1734
1735
0
  if (keyinfo->gakpresponse == NULL) {
1736
0
    LOG_FUNC_RETURN(card->ctx, SC_ERROR_OUT_OF_MEMORY);
1737
0
  }
1738
1739
0
  memcpy(keyinfo->gakpresponse, apdu.resp, apdu.resplen);
1740
1741
0
  LOG_FUNC_RETURN(card->ctx, SC_SUCCESS);
1742
0
}
1743
1744
1745
1746
static int sc_hsm_card_ctl(sc_card_t *card, unsigned long cmd, void *ptr)
1747
183
{
1748
183
  switch (cmd) {
1749
183
  case SC_CARDCTL_GET_SERIALNR:
1750
183
    return sc_hsm_get_serialnr(card, (sc_serial_number_t *)ptr);
1751
0
  case SC_CARDCTL_PKCS11_INIT_TOKEN:
1752
0
    return sc_hsm_init_token(card, (sc_cardctl_pkcs11_init_token_t *)ptr);
1753
0
  case SC_CARDCTL_PKCS11_INIT_PIN:
1754
0
    return sc_hsm_init_pin(card, (sc_cardctl_pkcs11_init_pin_t *)ptr);
1755
0
  case SC_CARDCTL_SC_HSM_GENERATE_KEY:
1756
0
    return sc_hsm_generate_keypair(card, (sc_cardctl_sc_hsm_keygen_info_t *)ptr);
1757
0
  case SC_CARDCTL_SC_HSM_INITIALIZE:
1758
0
    return sc_hsm_initialize(card, (sc_cardctl_sc_hsm_init_param_t *)ptr);
1759
0
  case SC_CARDCTL_SC_HSM_IMPORT_DKEK_SHARE:
1760
0
    return sc_hsm_import_dkek_share(card, (sc_cardctl_sc_hsm_dkek_t *)ptr);
1761
0
  case SC_CARDCTL_SC_HSM_WRAP_KEY:
1762
0
    return sc_hsm_wrap_key(card, (sc_cardctl_sc_hsm_wrapped_key_t *)ptr);
1763
0
  case SC_CARDCTL_SC_HSM_UNWRAP_KEY:
1764
0
    return sc_hsm_unwrap_key(card, (sc_cardctl_sc_hsm_wrapped_key_t *)ptr);
1765
0
  case SC_CARDCTL_SC_HSM_REGISTER_PUBLIC_KEY:
1766
0
    return sc_hsm_register_public_key(card, ptr);
1767
0
  case SC_CARDCTL_SC_HSM_PUBLIC_KEY_AUTH_STATUS:
1768
0
    return sc_hsm_public_key_auth_status(card, ptr);
1769
183
  }
1770
0
  return SC_ERROR_NOT_SUPPORTED;
1771
183
}
1772
1773
1774
1775
static int sc_hsm_init(struct sc_card *card)
1776
310
{
1777
#if defined(ENABLE_SM) && defined(ENABLE_OPENPACE) && defined(_WIN32)
1778
  char expanded_val[PATH_MAX];
1779
  size_t expanded_len = PATH_MAX;
1780
#endif
1781
310
  int flags,ext_flags;
1782
310
  sc_file_t *file = NULL;
1783
310
  sc_path_t path;
1784
310
  sc_hsm_private_data_t *priv = NULL;
1785
1786
310
  LOG_FUNC_CALLED(card->ctx);
1787
1788
310
  flags = SC_ALGORITHM_RSA_RAW|SC_ALGORITHM_RSA_PAD_PSS|SC_ALGORITHM_ONBOARD_KEY_GEN
1789
310
      |SC_ALGORITHM_RSA_HASH_SHA1|SC_ALGORITHM_RSA_HASH_SHA256|SC_ALGORITHM_RSA_HASH_SHA384|SC_ALGORITHM_RSA_HASH_SHA512
1790
310
      |SC_ALGORITHM_MGF1_SHA256|SC_ALGORITHM_MGF1_SHA384|SC_ALGORITHM_MGF1_SHA512;
1791
1792
310
  _sc_card_add_rsa_alg(card, 1024, flags, 0);
1793
310
  _sc_card_add_rsa_alg(card, 1536, flags, 0);
1794
310
  _sc_card_add_rsa_alg(card, 2048, flags, 0);
1795
310
  _sc_card_add_rsa_alg(card, 3072, flags, 0);
1796
310
  _sc_card_add_rsa_alg(card, 4096, flags, 0);
1797
1798
310
  flags = SC_ALGORITHM_ECDSA_RAW|
1799
310
    SC_ALGORITHM_ECDH_CDH_RAW|
1800
310
    SC_ALGORITHM_ECDSA_HASH_NONE|
1801
310
    SC_ALGORITHM_ECDSA_HASH_SHA1|
1802
310
    SC_ALGORITHM_ECDSA_HASH_SHA224|
1803
310
    SC_ALGORITHM_ECDSA_HASH_SHA256|
1804
310
    SC_ALGORITHM_ECDSA_HASH_SHA384|
1805
310
    SC_ALGORITHM_ECDSA_HASH_SHA512|
1806
310
    SC_ALGORITHM_ONBOARD_KEY_GEN;
1807
1808
310
  ext_flags = SC_ALGORITHM_EXT_EC_F_P|
1809
310
      SC_ALGORITHM_EXT_EC_ECPARAMETERS|
1810
310
      SC_ALGORITHM_EXT_EC_NAMEDCURVE|
1811
310
      SC_ALGORITHM_EXT_EC_UNCOMPRESES|
1812
310
      SC_ALGORITHM_ONBOARD_KEY_GEN;
1813
310
  _sc_card_add_ec_alg(card, 192, flags, ext_flags, NULL);
1814
310
  _sc_card_add_ec_alg(card, 224, flags, ext_flags, NULL);
1815
310
  _sc_card_add_ec_alg(card, 256, flags, ext_flags, NULL);
1816
310
  _sc_card_add_ec_alg(card, 320, flags, ext_flags, NULL);
1817
310
  _sc_card_add_ec_alg(card, 384, flags, ext_flags, NULL);
1818
310
  _sc_card_add_ec_alg(card, 512, flags, ext_flags, NULL);
1819
310
  _sc_card_add_ec_alg(card, 521, flags, ext_flags, NULL);
1820
1821
310
  card->caps |= SC_CARD_CAP_RNG|SC_CARD_CAP_APDU_EXT|SC_CARD_CAP_ISO7816_PIN_INFO;
1822
1823
  // APDU Buffer limits
1824
  //   JCOP 2.4.1r3           1462
1825
  //   JCOP 2.4.2r3           1454
1826
  //   JCOP 3                 1232
1827
  //   MicroSD with JCOP 3    478 / 506 - handled in reader-pcsc.c
1828
  //   Reiner SCT             1014 - handled in reader-pcsc.c
1829
1830
  // Use JCOP 3 card limits for sending
1831
310
  card->max_send_size = 1232;
1832
  // Assume that card supports sending with extended length APDU and without limit
1833
310
  card->max_recv_size = 0;
1834
1835
310
  if (card->type == SC_CARD_TYPE_SC_HSM_SOC
1836
310
      || card->type == SC_CARD_TYPE_SC_HSM_GOID) {
1837
306
    card->max_recv_size = 0x0630; // SoC Proxy forces this limit
1838
306
  } else {
1839
    // Adjust to the limits set by the reader
1840
4
    if (card->reader->max_send_size < card->max_send_size) {
1841
4
      if (18 >= card->reader->max_send_size)
1842
4
        LOG_FUNC_RETURN(card->ctx, SC_ERROR_INCONSISTENT_CONFIGURATION);
1843
1844
      // 17 byte header and TLV because of odd ins in UPDATE BINARY
1845
0
      card->max_send_size = card->reader->max_send_size - 17;
1846
0
    }
1847
1848
0
    if (0 < card->reader->max_recv_size) {
1849
0
      if (3 >= card->reader->max_recv_size)
1850
0
        LOG_FUNC_RETURN(card->ctx, SC_ERROR_INCONSISTENT_CONFIGURATION);
1851
0
      card->max_recv_size = card->reader->max_recv_size - 2;
1852
0
    }
1853
0
  }
1854
1855
306
  priv = card->drv_data;
1856
306
  if (!priv) {
1857
306
    priv = calloc(1, sizeof(sc_hsm_private_data_t));
1858
306
    if (!priv)
1859
306
      LOG_FUNC_RETURN(card->ctx, SC_ERROR_OUT_OF_MEMORY);
1860
306
    card->drv_data = priv;
1861
306
  }
1862
1863
306
  sc_path_set(&path, SC_PATH_TYPE_DF_NAME, sc_hsm_aid.value, sc_hsm_aid.len, 0, 0);
1864
306
  if (sc_hsm_select_file_ex(card, &path, 0, &file) == SC_SUCCESS
1865
71
      && file && file->prop_attr && file->prop_attr_len >= 2) {
1866
3
    static char card_name[SC_MAX_APDU_BUFFER_SIZE];
1867
3
    u8 type = 0xFF;
1868
3
    u8 major = file->prop_attr[file->prop_attr_len - 2];
1869
3
    u8 minor = file->prop_attr[file->prop_attr_len - 1];
1870
3
    char p00[] = "SmartCard-HSM Applet for JCOP";
1871
3
    char p01[] = "SmartCard-HSM Demo Applet for JCOP";
1872
3
    char *p = "SmartCard-HSM";
1873
3
    if (file->prop_attr_len >= 3) {
1874
2
      type = file->prop_attr[file->prop_attr_len - 3];
1875
2
    }
1876
3
    switch (type) {
1877
1
      case 0x00:
1878
1
        p = p00;
1879
1
        break;
1880
1
      case 0x01:
1881
1
        p = p01;
1882
1
        break;
1883
1
      default:
1884
1
        break;
1885
3
    }
1886
3
    snprintf(card_name, sizeof card_name, "%s version %u.%u", p, major, minor);
1887
3
    card->name = card_name;
1888
1889
3
    if (file->prop_attr[1] & 0x04) {
1890
1
      card->caps |= SC_CARD_CAP_SESSION_PIN;
1891
1
    }
1892
3
  }
1893
306
  sc_file_free(file);
1894
1895
306
  priv->EF_C_DevAut = NULL;
1896
306
  priv->EF_C_DevAut_len = 0;
1897
1898
306
#if defined(ENABLE_SM) && defined(ENABLE_OPENPACE)
1899
306
  EAC_init();
1900
#ifdef _WIN32
1901
  expanded_len = ExpandEnvironmentStringsA(CVCDIR, expanded_val, sizeof expanded_val);
1902
  if (0 < expanded_len && expanded_len < sizeof expanded_val)
1903
    EAC_set_cvc_default_dir(expanded_val);
1904
#else
1905
306
  EAC_set_cvc_default_dir(CVCDIR);
1906
306
#endif
1907
306
#endif
1908
1909
306
  return 0;
1910
306
}
1911
1912
1913
1914
static int sc_hsm_finish(sc_card_t * card)
1915
306
{
1916
306
  sc_hsm_private_data_t *priv = (sc_hsm_private_data_t *) card->drv_data;
1917
306
#ifdef ENABLE_SM
1918
306
  sc_sm_stop(card);
1919
306
#endif
1920
306
  if (priv) {
1921
306
    free(priv->serialno);
1922
306
    sc_file_free(priv->dffcp);
1923
306
    free(priv->EF_C_DevAut);
1924
306
  }
1925
306
  free(priv);
1926
1927
306
  return SC_SUCCESS;
1928
306
}
1929
1930
1931
1932
static struct sc_card_driver * sc_get_driver(void)
1933
17.2k
{
1934
17.2k
  struct sc_card_driver *iso_drv = sc_get_iso7816_driver();
1935
1936
17.2k
  if (iso_ops == NULL)
1937
1
    iso_ops = iso_drv->ops;
1938
1939
17.2k
  sc_hsm_ops                   = *iso_drv->ops;
1940
17.2k
  sc_hsm_ops.match_card        = sc_hsm_match_card;
1941
17.2k
  sc_hsm_ops.select_file       = sc_hsm_select_file;
1942
17.2k
  sc_hsm_ops.get_challenge     = sc_hsm_get_challenge;
1943
17.2k
  sc_hsm_ops.read_binary       = sc_hsm_read_binary;
1944
17.2k
  sc_hsm_ops.update_binary     = sc_hsm_update_binary;
1945
17.2k
  sc_hsm_ops.list_files        = sc_hsm_list_files;
1946
17.2k
  sc_hsm_ops.create_file       = sc_hsm_create_file;
1947
17.2k
  sc_hsm_ops.delete_file       = sc_hsm_delete_file;
1948
17.2k
  sc_hsm_ops.set_security_env  = sc_hsm_set_security_env;
1949
17.2k
  sc_hsm_ops.compute_signature = sc_hsm_compute_signature;
1950
17.2k
  sc_hsm_ops.decipher          = sc_hsm_decipher;
1951
17.2k
  sc_hsm_ops.init              = sc_hsm_init;
1952
17.2k
  sc_hsm_ops.finish            = sc_hsm_finish;
1953
17.2k
  sc_hsm_ops.card_ctl          = sc_hsm_card_ctl;
1954
17.2k
  sc_hsm_ops.pin_cmd           = sc_hsm_pin_cmd;
1955
17.2k
  sc_hsm_ops.logout            = sc_hsm_logout;
1956
1957
  /* no record oriented file services */
1958
17.2k
  sc_hsm_ops.read_record       = NULL;
1959
17.2k
  sc_hsm_ops.write_record      = NULL;
1960
17.2k
  sc_hsm_ops.append_record     = NULL;
1961
17.2k
  sc_hsm_ops.update_record     = NULL;
1962
1963
17.2k
  return &sc_hsm_drv;
1964
17.2k
}
1965
1966
1967
1968
struct sc_card_driver * sc_get_sc_hsm_driver(void)
1969
17.2k
{
1970
17.2k
  return sc_get_driver();
1971
17.2k
}
1972