Coverage Report

Created: 2025-08-29 06:26

/src/opensc/src/libopensc/card-sc-hsm.c
Line
Count
Source (jump to first uncovered line)
1
/*
2
 * card-sc-hsm.c
3
 *
4
 * Driver for the SmartCard-HSM, a light-weight hardware security module
5
 *
6
 * Copyright (C) 2012 Andreas Schwier, CardContact, Minden, Germany, and others
7
 * Copyright (C) 2018-2019 GSMK - Gesellschaft für Sichere Mobile Kommunikation mbH
8
 *
9
 * This library is free software; you can redistribute it and/or
10
 * modify it under the terms of the GNU Lesser General Public
11
 * License as published by the Free Software Foundation; either
12
 * version 2.1 of the License, or (at your option) any later version.
13
 *
14
 * This library is distributed in the hope that it will be useful,
15
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
16
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
17
 * Lesser General Public License for more details.
18
 *
19
 * You should have received a copy of the GNU Lesser General Public
20
 * License along with this library; if not, write to the Free Software
21
 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
22
 */
23
24
#ifdef HAVE_CONFIG_H
25
#include "config.h"
26
#endif
27
28
#include <string.h>
29
#include <stdlib.h>
30
#include <ctype.h>
31
32
#include "internal.h"
33
#include "asn1.h"
34
#include "cardctl.h"
35
#include "types.h"
36
37
#include "card-sc-hsm.h"
38
39
#if defined(ENABLE_SM) && defined(ENABLE_OPENPACE)
40
#include "sm/sm-eac.h"
41
#include <eac/cv_cert.h>
42
#include <eac/eac.h>
43
#include <eac/ta.h>
44
#include <openssl/evp.h>
45
#endif
46
47
48
/* Static reference to ISO driver */
49
static const struct sc_card_operations *iso_ops = NULL;
50
51
/* Our operations */
52
static struct sc_card_operations sc_hsm_ops;
53
54
/* Our driver description */
55
static struct sc_card_driver sc_hsm_drv = {
56
  "SmartCard-HSM",
57
  "sc-hsm",
58
  &sc_hsm_ops,
59
  NULL,
60
  0,
61
  NULL
62
};
63
64
65
66
/* Our AID */
67
struct sc_aid sc_hsm_aid = { { 0xE8,0x2B,0x06,0x01,0x04,0x01,0x81,0xC3,0x1F,0x02,0x01 }, 11 };
68
69
70
71
/* Known ATRs for SmartCard-HSMs */
72
const struct sc_atr_table sc_hsm_atrs[] = {
73
  /* standard version */
74
  {"3B:FE:18:00:00:81:31:FE:45:80:31:81:54:48:53:4D:31:73:80:21:40:81:07:FA", NULL, NULL, SC_CARD_TYPE_SC_HSM, 0, NULL},
75
  {"3B:8E:80:01:80:31:81:54:48:53:4D:31:73:80:21:40:81:07:18", NULL, NULL, SC_CARD_TYPE_SC_HSM, 0, NULL},
76
  {"3B:DE:18:FF:81:91:FE:1F:C3:80:31:81:54:48:53:4D:31:73:80:21:40:81:07:1C", NULL, NULL, SC_CARD_TYPE_SC_HSM, 0, NULL},
77
  {"3B:DE:96:FF:81:91:FE:1F:C3:80:31:81:54:48:53:4D:31:73:80:21:40:81:07:92", NULL, NULL, SC_CARD_TYPE_SC_HSM, 0, NULL},
78
79
  {"3B:80:80:01:01", NULL, NULL, SC_CARD_TYPE_SC_HSM_SOC, 0, NULL}, // SoC Sample Card
80
  {
81
    "3B:84:80:01:47:6f:49:44:00",
82
    "FF:FF:FF:FF:FF:FF:FF:FF:00",
83
    "GoID", SC_CARD_TYPE_SC_HSM_GOID, 0, NULL
84
  },
85
  {
86
    "3B:85:80:01:47:6f:49:44:00:00",
87
    "FF:FF:FF:FF:FF:FF:FF:FF:00:00",
88
    "GoID", SC_CARD_TYPE_SC_HSM_GOID, 0, NULL
89
  },
90
  {
91
    "3B:86:80:01:47:6f:49:44:00:00:00",
92
    "FF:FF:FF:FF:FF:FF:FF:FF:00:00:00",
93
    "GoID", SC_CARD_TYPE_SC_HSM_GOID, 0, NULL
94
  },
95
  {
96
    "3B:87:80:01:47:6f:49:44:00:00:00:00",
97
    "FF:FF:FF:FF:FF:FF:FF:FF:00:00:00:00",
98
    "GoID", SC_CARD_TYPE_SC_HSM_GOID, 0, NULL
99
  },
100
  {
101
    "3B:88:80:01:47:6f:49:44:00:00:00:00:00",
102
    "FF:FF:FF:FF:FF:FF:FF:FF:00:00:00:00:00",
103
    "GoID", SC_CARD_TYPE_SC_HSM_GOID, 0, NULL
104
  },
105
  {
106
    "3B:89:80:01:47:6f:49:44:00:00:00:00:00:00",
107
    "FF:FF:FF:FF:FF:FF:FF:FF:00:00:00:00:00:00",
108
    "GoID", SC_CARD_TYPE_SC_HSM_GOID, 0, NULL
109
  },
110
  {
111
    "3B:8a:80:01:47:6f:49:44:00:00:00:00:00:00:00",
112
    "FF:FF:FF:FF:FF:FF:FF:FF:00:00:00:00:00:00:00",
113
    "GoID", SC_CARD_TYPE_SC_HSM_GOID, 0, NULL
114
  },
115
  {
116
    "3B:8b:80:01:47:6f:49:44:00:00:00:00:00:00:00:00",
117
    "FF:FF:FF:FF:FF:FF:FF:FF:00:00:00:00:00:00:00:00",
118
    "GoID", SC_CARD_TYPE_SC_HSM_GOID, 0, NULL
119
  },
120
  {
121
    "3B:8c:80:01:47:6f:49:44:00:00:00:00:00:00:00:00:00",
122
    "FF:FF:FF:FF:FF:FF:FF:FF:00:00:00:00:00:00:00:00:00",
123
    "GoID", SC_CARD_TYPE_SC_HSM_GOID, 0, NULL
124
  },
125
  {
126
    "3B:8d:80:01:47:6f:49:44:00:00:00:00:00:00:00:00:00:00",
127
    "FF:FF:FF:FF:FF:FF:FF:FF:00:00:00:00:00:00:00:00:00:00",
128
    "GoID", SC_CARD_TYPE_SC_HSM_GOID, 0, NULL
129
  },
130
  {
131
    "3B:8e:80:01:47:6f:49:44:00:00:00:00:00:00:00:00:00:00:00",
132
    "FF:FF:FF:FF:FF:FF:FF:FF:00:00:00:00:00:00:00:00:00:00:00",
133
    "GoID", SC_CARD_TYPE_SC_HSM_GOID, 0, NULL
134
  },
135
  {
136
    "3B:8f:80:01:47:6f:49:44:00:00:00:00:00:00:00:00:00:00:00:00",
137
    "FF:FF:FF:FF:FF:FF:FF:FF:00:00:00:00:00:00:00:00:00:00:00:00",
138
    "GoID", SC_CARD_TYPE_SC_HSM_GOID, 0, NULL
139
  },
140
  {NULL, NULL, NULL, 0, 0, NULL}
141
};
142
143
144
145
static int sc_hsm_select_file_ex(sc_card_t *card,
146
             const sc_path_t *in_path, int forceselect,
147
             sc_file_t **file_out)
148
137k
{
149
137k
  int rv;
150
137k
  sc_hsm_private_data_t *priv = (sc_hsm_private_data_t *) card->drv_data;
151
137k
  sc_file_t *file = NULL;
152
137k
  sc_path_t cpath;
153
137k
  size_t card_max_recv_size = card->max_recv_size;
154
137k
  size_t reader_max_recv_size = card->reader->max_recv_size;
155
156
137k
  if (file_out == NULL) {       // Versions before 0.16 of the SmartCard-HSM do not support P2='0C'
157
6.58k
    rv = sc_hsm_select_file_ex(card, in_path, forceselect, &file);
158
6.58k
    sc_file_free(file);
159
6.58k
    return rv;
160
6.58k
  }
161
162
131k
  if ((in_path->type == SC_PATH_TYPE_FILE_ID) && in_path->aid.len) {
163
    // Split applet selection and file selection into two separate calls
164
0
    cpath = *in_path;
165
0
    cpath.len = 0;
166
0
    cpath.type = SC_PATH_TYPE_DF_NAME;
167
0
    rv = sc_hsm_select_file_ex(card, &cpath, forceselect, NULL);
168
0
    LOG_TEST_RET(card->ctx, rv, "Could not select SmartCard-HSM application");
169
170
0
    if (in_path->len) {
171
0
      cpath = *in_path;
172
0
      cpath.aid.len = 0;
173
0
      rv = sc_hsm_select_file_ex(card, &cpath, forceselect, file_out);
174
0
    }
175
0
    return rv;
176
0
  }
177
178
  // Prevent selection of applet unless this is the first time, selection is forced or the device is not authenticated
179
131k
  if (in_path->type == SC_PATH_TYPE_DF_NAME
180
131k
      || (in_path->type == SC_PATH_TYPE_PATH
181
86.1k
        && in_path->len == sc_hsm_aid.len
182
86.1k
        && !memcmp(in_path->value, sc_hsm_aid.value, sc_hsm_aid.len))
183
131k
      || (in_path->type == SC_PATH_TYPE_PATH
184
86.1k
        && in_path->len == 0
185
86.1k
        && in_path->aid.len == sc_hsm_aid.len
186
86.1k
        && !memcmp(in_path->aid.value, sc_hsm_aid.value, sc_hsm_aid.len))) {
187
44.9k
    if (!priv || (priv->dffcp == NULL) || forceselect) {
188
      /* Force use of Le = 0x00 in iso7816_select_file as required by SC-HSM */
189
43.2k
      card->max_recv_size = card->reader->max_recv_size = SC_READER_SHORT_APDU_MAX_RECV_SIZE;
190
43.2k
      rv = (*iso_ops->select_file)(card, in_path, file_out);
191
43.2k
      card->max_recv_size = card_max_recv_size;
192
43.2k
      card->reader->max_recv_size = reader_max_recv_size;
193
43.2k
      LOG_TEST_RET(card->ctx, rv, "Could not select SmartCard-HSM application");
194
195
3.71k
      if (priv) {
196
1.04k
        sc_file_free(priv->dffcp);
197
        // Cache the FCP returned when selecting the applet
198
1.04k
        sc_file_dup(&priv->dffcp, *file_out);
199
1.04k
      }
200
3.71k
    } else {
201
1.65k
      sc_file_dup(file_out, priv->dffcp);
202
1.65k
      rv = SC_SUCCESS;
203
1.65k
    }
204
5.36k
    return rv;
205
44.9k
  }
206
207
86.1k
  if ((in_path->len >= 2) && (in_path->value[0] == 0x3F) && (in_path->value[1] == 0x00)) {
208
    // The SmartCard-HSM is an applet that is not default selected. Simulate selection of the MF
209
61.5k
    if (in_path->len == 2) {
210
1.08k
      file = sc_file_new();
211
1.08k
      if (file == NULL)
212
1.08k
        LOG_FUNC_RETURN(card->ctx, SC_ERROR_OUT_OF_MEMORY);
213
1.08k
      file->path = *in_path;
214
1.08k
      file->id = 0x3F00;
215
1.08k
      file->type = SC_FILE_TYPE_DF;
216
1.08k
      file->magic = SC_FILE_MAGIC;
217
218
1.08k
      *file_out = file;
219
1.08k
      return SC_SUCCESS;
220
60.5k
    } else {
221
      /* Force use of Le = 0x00 in iso7816_select_file as required by SC-HSM */
222
60.5k
      card->max_recv_size = card->reader->max_recv_size = SC_READER_SHORT_APDU_MAX_RECV_SIZE;
223
60.5k
      sc_path_t truncated;
224
60.5k
      memcpy(&truncated, in_path, sizeof truncated);
225
60.5k
      truncated.len = in_path->len - 2;
226
60.5k
      memcpy(truncated.value, in_path->value+2, truncated.len);
227
60.5k
      rv = (*iso_ops->select_file)(card, &truncated, file_out);
228
60.5k
      card->max_recv_size = card_max_recv_size;
229
60.5k
      card->reader->max_recv_size = reader_max_recv_size;
230
60.5k
      return rv;
231
60.5k
    }
232
61.5k
  }
233
  /* Force use of Le = 0x00 in iso7816_select_file as required by SC-HSM */
234
24.5k
  card->max_recv_size = card->reader->max_recv_size = SC_READER_SHORT_APDU_MAX_RECV_SIZE;
235
24.5k
  rv = (*iso_ops->select_file)(card, in_path, file_out);
236
24.5k
  card->max_recv_size = card_max_recv_size;
237
24.5k
  card->reader->max_recv_size = reader_max_recv_size;
238
24.5k
  return rv;
239
86.1k
}
240
241
242
243
static int sc_hsm_select_file(sc_card_t *card,
244
             const sc_path_t *in_path,
245
             sc_file_t **file_out)
246
129k
{
247
129k
  return sc_hsm_select_file_ex(card, in_path, 0, file_out);
248
129k
}
249
250
251
252
static int sc_hsm_get_challenge(struct sc_card *card, unsigned char *rnd, size_t len)
253
535
{
254
535
  LOG_FUNC_CALLED(card->ctx);
255
256
535
  if (len > 1024) {
257
0
    len = 1024;
258
0
  }
259
260
535
  LOG_FUNC_RETURN(card->ctx, iso_ops->get_challenge(card, rnd, len));
261
535
}
262
263
264
265
static int sc_hsm_match_card(struct sc_card *card)
266
40.3k
{
267
40.3k
  sc_path_t path;
268
40.3k
  int i, r, type = 0;
269
40.3k
  sc_file_t *file = NULL;
270
271
40.3k
  i = _sc_match_atr(card, sc_hsm_atrs, &type);
272
40.3k
  if (i >= 0 && type != SC_CARD_TYPE_SC_HSM_SOC) {
273
1.87k
    card->type = type;
274
1.87k
    return 1;
275
1.87k
  }
276
277
38.4k
  sc_path_set(&path, SC_PATH_TYPE_DF_NAME, sc_hsm_aid.value, sc_hsm_aid.len, 0, 0);
278
38.4k
  r = sc_hsm_select_file(card, &path, &file);
279
38.4k
  LOG_TEST_RET(card->ctx, r, "Could not select SmartCard-HSM application");
280
281
  // Validate that card returns a FCP with a proprietary tag 85 with value longer than 2 byte (Fixes #1377)
282
2.66k
  if (file != NULL) {
283
2.66k
    size_t sz = file->prop_attr_len;
284
2.66k
    sc_file_free(file);
285
2.66k
    if (sz < 2) {
286
2.63k
      return 0;
287
2.63k
    }
288
2.66k
  }
289
290
29
  if (type == SC_CARD_TYPE_SC_HSM_SOC) {
291
6
    card->type = SC_CARD_TYPE_SC_HSM_SOC;
292
23
  } else {
293
23
    card->type = SC_CARD_TYPE_SC_HSM;
294
23
  }
295
296
29
  return 1;
297
2.66k
}
298
299
300
301
/*
302
 * Encode 16 hexadecimals of SO-PIN into binary form
303
 * Caller must check length of sopin and provide an 8 byte buffer
304
 */
305
static int sc_hsm_encode_sopin(const u8 *sopin, u8 *sopinbin)
306
0
{
307
0
  int i;
308
0
  unsigned char digit;
309
310
0
  memset(sopinbin, 0, 8);
311
0
  for (i = 0; i < 16; i++) {
312
0
    *sopinbin <<= 4;
313
0
    digit = *sopin++;
314
315
0
    if (!isxdigit(digit))
316
0
      return SC_ERROR_PIN_CODE_INCORRECT;
317
0
    digit = toupper(digit);
318
319
0
    if (digit >= 'A')
320
0
      digit = digit - 'A' + 10;
321
0
    else
322
0
      digit = digit & 0xF;
323
324
0
    *sopinbin |= digit & 0xf;
325
0
    if (i & 1)
326
0
      sopinbin++;
327
0
  }
328
0
  return SC_SUCCESS;
329
0
}
330
331
332
static int sc_hsm_soc_select_minbioclient(sc_card_t *card)
333
0
{
334
0
  static const struct sc_aid minBioClient_aid = {
335
0
      {0xFF, 'm', 'i', 'n', 'B', 'i', 'o', 'C', 'l', 'i', 'e', 'n', 't', 0x01},
336
0
      14
337
0
    };
338
339
  /* Select MinBioClient */
340
0
#ifdef ENABLE_SM
341
0
  sc_sm_stop(card);
342
0
#endif
343
0
  return iso7816_select_aid(card, minBioClient_aid.value, minBioClient_aid.len, NULL, NULL);
344
0
}
345
346
static int sc_hsm_soc_change(sc_card_t *card, struct sc_pin_cmd_data *data,
347
         int *tries_left)
348
0
{
349
0
  sc_apdu_t apdu;
350
0
  sc_path_t path;
351
0
  int r;
352
353
0
  if (card->type == SC_CARD_TYPE_SC_HSM_SOC) {
354
    /* Select MinBioClient */
355
0
    r = sc_hsm_soc_select_minbioclient(card);
356
0
    LOG_TEST_RET(card->ctx, r, "Could not select MinBioClient application");
357
358
    /* verify PIN */
359
0
    sc_format_apdu(card, &apdu, SC_APDU_CASE_1, 0x20, 0x00, 0x80);
360
0
    r = sc_transmit_apdu(card, &apdu);
361
0
    LOG_TEST_GOTO_ERR(card->ctx, r, "APDU transmit failed");
362
0
    r = sc_check_sw(card, apdu.sw1, apdu.sw2);
363
0
    LOG_TEST_GOTO_ERR(card->ctx, r, "Could not verify PIN");
364
365
    /* change PIN */
366
0
    sc_format_apdu(card, &apdu, SC_APDU_CASE_1, 0x24, 0x01, 0x80);
367
0
    r = sc_transmit_apdu(card, &apdu);
368
0
    LOG_TEST_GOTO_ERR(card->ctx, r, "APDU transmit failed");
369
0
    r = sc_check_sw(card, apdu.sw1, apdu.sw2);
370
0
    LOG_TEST_GOTO_ERR(card->ctx, r, "Could not change PIN");
371
0
  } else {
372
0
#ifdef ENABLE_SM
373
0
    unsigned sm_mode = card->sm_ctx.sm_mode;
374
0
#endif
375
376
    /* verify PIN */
377
0
    sc_format_apdu(card, &apdu, SC_APDU_CASE_1, 0x20, 0x00, 0x85);
378
0
    apdu.cla = 0x80;
379
0
    r = sc_transmit_apdu(card, &apdu);
380
0
    LOG_TEST_GOTO_ERR(card->ctx, r, "APDU transmit failed");
381
382
0
#ifdef ENABLE_SM
383
    /* temporary disable SM, change reference data does not reach the applet */
384
0
    card->sm_ctx.sm_mode = SM_MODE_NONE;
385
0
#endif
386
387
    /* change PIN */
388
0
    sc_format_apdu(card, &apdu, SC_APDU_CASE_1, 0x24, 0x01, 0x85);
389
0
    apdu.cla = 0x80;
390
0
    r = sc_transmit_apdu(card, &apdu);
391
0
#ifdef ENABLE_SM
392
    /* restore SM if possible */
393
0
    card->sm_ctx.sm_mode = sm_mode;
394
0
#endif
395
0
    LOG_TEST_GOTO_ERR(card->ctx, r, "APDU transmit failed");
396
0
    r = sc_check_sw(card, apdu.sw1, apdu.sw2);
397
0
    LOG_TEST_GOTO_ERR(card->ctx, r, "Could not change PIN");
398
0
  }
399
400
0
err:
401
0
  if (card->type == SC_CARD_TYPE_SC_HSM_SOC) {
402
    /* Select SC-HSM */
403
0
    sc_path_set(&path, SC_PATH_TYPE_DF_NAME,
404
0
          sc_hsm_aid.value, sc_hsm_aid.len, 0, 0);
405
0
    LOG_TEST_RET(card->ctx,
406
0
        sc_hsm_select_file_ex(card, &path, 1, NULL),
407
0
        "Could not select SmartCard-HSM application");
408
0
  }
409
410
0
  return r;
411
0
}
412
413
static int sc_hsm_soc_unblock(sc_card_t *card, struct sc_pin_cmd_data *data,
414
         int *tries_left)
415
0
{
416
0
  sc_apdu_t apdu;
417
0
  sc_path_t path;
418
0
  int r;
419
420
0
  if (card->type == SC_CARD_TYPE_SC_HSM_GOID) {
421
0
    return SC_ERROR_NOT_SUPPORTED;
422
0
  }
423
424
  /* Select MinBioClient */
425
0
  r = sc_hsm_soc_select_minbioclient(card);
426
0
  LOG_TEST_RET(card->ctx, r, "Could not select MinBioClient application");
427
428
  /* verify PUK */
429
0
  sc_format_apdu(card, &apdu, SC_APDU_CASE_1, 0x20, 0x00, 0x81);
430
0
  r = sc_transmit_apdu(card, &apdu);
431
0
  LOG_TEST_GOTO_ERR(card->ctx, r, "APDU transmit failed");
432
0
  r = sc_check_sw(card, apdu.sw1, apdu.sw2);
433
0
  LOG_TEST_GOTO_ERR(card->ctx, r, "Could not verify PUK");
434
435
  /* reset retry counter */
436
0
  sc_format_apdu(card, &apdu, SC_APDU_CASE_1, 0x2c, 0x03, 0x00);
437
0
  r = sc_transmit_apdu(card, &apdu);
438
0
  LOG_TEST_GOTO_ERR(card->ctx, r, "APDU transmit failed");
439
0
  r = sc_check_sw(card, apdu.sw1, apdu.sw2);
440
0
  LOG_TEST_GOTO_ERR(card->ctx, r, "Could not unblock PIN");
441
442
0
err:
443
  /* Select SC-HSM */
444
0
  sc_path_set(&path, SC_PATH_TYPE_DF_NAME, sc_hsm_aid.value, sc_hsm_aid.len, 0, 0);
445
0
  LOG_TEST_RET(card->ctx,
446
0
      sc_hsm_select_file_ex(card, &path, 1, NULL),
447
0
      "Could not select SmartCard-HSM application");
448
449
0
  return r;
450
0
}
451
452
static int sc_hsm_soc_biomatch(sc_card_t *card, struct sc_pin_cmd_data *data,
453
         int *tries_left)
454
0
{
455
0
  sc_apdu_t apdu;
456
0
  u8 rbuf[SC_MAX_APDU_BUFFER_SIZE];
457
0
  int r;
458
459
0
  if (card->type == SC_CARD_TYPE_SC_HSM_SOC) {
460
0
    sc_format_apdu(card, &apdu, SC_APDU_CASE_3_SHORT, 0x20, 0x00, 0x85);
461
0
    apdu.cla = 0x80;
462
0
    apdu.data = (unsigned char*)"\x7F\x24\x00";
463
0
    apdu.datalen = 3;
464
0
    apdu.lc = 3;
465
0
    apdu.resplen = 0;
466
467
0
    r = sc_transmit_apdu(card, &apdu);
468
0
    LOG_TEST_RET(card->ctx, r, "APDU transmit failed");
469
    /* ignore the actual status bytes */
470
0
  }
471
472
  /* JCOP's SM accelerator is incapable of using case 1 APDU in SM */
473
0
  sc_format_apdu(card, &apdu, SC_APDU_CASE_2, 0x20, 0x00, 0x81);
474
0
  if (card->type == SC_CARD_TYPE_SC_HSM_GOID) {
475
0
    apdu.cla = 0x80;
476
0
  }
477
0
  apdu.resp = rbuf;
478
0
  apdu.resplen = sizeof rbuf;
479
0
  r = sc_transmit_apdu(card, &apdu);
480
0
  LOG_TEST_RET(card->ctx, r, "APDU transmit failed");
481
482
  /* now check the status bytes */
483
0
  r =  sc_check_sw(card, apdu.sw1, apdu.sw2);
484
0
  if (r == SC_SUCCESS) {
485
0
    LOG_FUNC_RETURN(card->ctx, r);
486
0
  }
487
488
0
  LOG_FUNC_RETURN(card->ctx, SC_ERROR_PIN_CODE_INCORRECT);
489
0
}
490
491
#if defined(ENABLE_SM) && defined(ENABLE_OPENPACE)
492
493
static int sc_hsm_perform_chip_authentication(sc_card_t *card)
494
{
495
  int r, protocol;
496
  sc_path_t path;
497
  u8 all_certs[1024];
498
  EAC_CTX *ctx = NULL;
499
  size_t all_certs_len = sizeof all_certs, left, device_cert_len, issuer_cert_len;
500
  const unsigned char *cert = all_certs, *device_cert, *issuer_cert;
501
  BUF_MEM *comp_pub_key = NULL;
502
  sc_cvc_t cvc_device, cvc_issuer;
503
  /* this is only needed to call sc_pkcs15emu_sc_hsm_decode_cvc */
504
  sc_pkcs15_card_t p15card;
505
  sc_hsm_private_data_t *priv = (sc_hsm_private_data_t *) card->drv_data;
506
  /* we know that sc_pkcs15emu_sc_hsm_decode_cvc does not require anything
507
   * else to be initialized than p15card->card */
508
  p15card.card = card;
509
510
  memset(&cvc_device, 0, sizeof(cvc_device));
511
  memset(&cvc_issuer, 0, sizeof(cvc_issuer));
512
513
514
  if (priv->EF_C_DevAut && priv->EF_C_DevAut_len) {
515
    all_certs_len = priv->EF_C_DevAut_len;
516
    cert = priv->EF_C_DevAut;
517
  } else {
518
    /* get issuer and device certificate from the card */
519
    r = sc_path_set(&path, SC_PATH_TYPE_FILE_ID, (u8 *) "\x2F\x02", 2, 0, 0);
520
    if (r < 0)
521
      goto err;
522
    r = sc_select_file(card, &path, NULL);
523
    if (r < 0)
524
      goto err;
525
    r = sc_read_binary(card, 0, all_certs, all_certs_len, 0);
526
    if (r < 0)
527
      goto err;
528
    if (r == 0) {
529
      r = SC_ERROR_FILE_NOT_FOUND;
530
      goto err;
531
    }
532
533
    all_certs_len = r;
534
535
    /* save EF_C_DevAut for further use */
536
    cert = realloc(priv->EF_C_DevAut, all_certs_len);
537
    if (cert) {
538
      memcpy((unsigned char *) cert, all_certs, all_certs_len);
539
      priv->EF_C_DevAut = (unsigned char *) cert;
540
      priv->EF_C_DevAut_len = all_certs_len;
541
    }
542
543
    cert = all_certs;
544
  }
545
  left = all_certs_len;
546
547
  device_cert = cert;
548
  r = sc_pkcs15emu_sc_hsm_decode_cvc(&p15card, &cert, &left, &cvc_device);
549
  if (r < 0)
550
    goto err;
551
  device_cert_len = all_certs_len - left;
552
553
  issuer_cert = cert;
554
  r = sc_pkcs15emu_sc_hsm_decode_cvc(&p15card, &cert, &left, &cvc_issuer);
555
  if (r < 0)
556
    goto err;
557
  issuer_cert_len = all_certs_len - device_cert_len - left;
558
559
  ctx = EAC_CTX_new();
560
  if (!ctx) {
561
    r = SC_ERROR_INTERNAL;
562
    goto err;
563
  }
564
565
566
  /* check all CVCs given of the document's pki */
567
  if (!TA_STEP2_import_certificate(ctx, issuer_cert, issuer_cert_len)
568
      || !TA_STEP2_import_certificate(ctx, device_cert, device_cert_len)) {
569
    r = SC_ERROR_INTERNAL;
570
    goto err;
571
  }
572
573
  /* XXX on older JCOPs only NID_id_CA_ECDH_3DES_CBC_CBC may be
574
   * supported. The card does not export its capabilities. We hardcode
575
   * NID_id_CA_ECDH_AES_CBC_CMAC_128 here, because we don't have the older
576
   * cards in production. */
577
  protocol = NID_id_CA_ECDH_AES_CBC_CMAC_128;
578
579
  /* initialize CA domain parameter with the document's public key */
580
  if (!EAC_CTX_init_ca(ctx, protocol, 8)) {
581
    r = SC_ERROR_INTERNAL;
582
    goto err;
583
  }
584
  EVP_PKEY_free(ctx->ca_ctx->ka_ctx->key);
585
  if (!EVP_PKEY_up_ref(ctx->ta_ctx->pub_key)) {
586
    sc_log_openssl(card->ctx);
587
    r = SC_ERROR_INTERNAL;
588
    goto err;
589
  }
590
  ctx->ca_ctx->ka_ctx->key = ctx->ta_ctx->pub_key;
591
592
  /* generate keys for CA */
593
  comp_pub_key = TA_STEP3_generate_ephemeral_key(ctx);
594
  r = perform_chip_authentication_ex(card, ctx,
595
      cvc_device.publicPoint, cvc_device.publicPointlen);
596
597
err:
598
  if (r < 0)
599
    EAC_CTX_clear_free(ctx);
600
  if (comp_pub_key)
601
    BUF_MEM_free(comp_pub_key);
602
  sc_pkcs15emu_sc_hsm_free_cvc(&cvc_device);
603
  sc_pkcs15emu_sc_hsm_free_cvc(&cvc_issuer);
604
605
  return r;
606
}
607
608
#else
609
610
static int sc_hsm_perform_chip_authentication(sc_card_t *card)
611
8
{
612
8
  return SC_ERROR_NOT_SUPPORTED;
613
8
}
614
#endif
615
616
617
618
static int sc_hsm_pin_cmd(sc_card_t *card, struct sc_pin_cmd_data *data,
619
         int *tries_left)
620
733
{
621
733
  sc_hsm_private_data_t *priv = (sc_hsm_private_data_t *) card->drv_data;
622
733
  sc_apdu_t apdu;
623
733
  u8 cmdbuff[16];
624
733
#ifdef ENABLE_SM
625
733
  u8 rbuf[SC_MAX_APDU_BUFFER_SIZE];
626
733
#endif
627
733
  int r;
628
733
  int cmd = data->cmd;
629
733
  size_t pin2_len = data->pin2.len;
630
631
733
  if (cmd == SC_PIN_CMD_GET_SESSION_PIN) {
632
    /* First, perform a standard VERIFY */
633
0
    data->cmd = SC_PIN_CMD_VERIFY;
634
    /* we assign pin2.len to 0 early on so that in case of an error we are
635
     * not exiting with an undefined session PIN */
636
0
    data->pin2.len = 0;
637
0
  }
638
639
733
  if ((card->caps & SC_CARD_CAP_PROTECTED_AUTHENTICATION_PATH)
640
733
        && (data->cmd == SC_PIN_CMD_CHANGE)
641
733
        && (data->pin_reference == 0x81)
642
733
      && (!data->pin1.data || data->pin1.len <= 0)) {
643
0
    return sc_hsm_soc_change(card, data, tries_left);
644
733
  } else if ((card->caps & SC_CARD_CAP_PROTECTED_AUTHENTICATION_PATH)
645
733
        && (data->cmd == SC_PIN_CMD_UNBLOCK)
646
733
        && (data->pin_reference == 0x81)
647
733
      && (!data->pin1.data || data->pin1.len <= 0)) {
648
0
    return sc_hsm_soc_unblock(card, data, tries_left);
649
0
  }
650
651
733
#ifdef ENABLE_SM
652
  /* For contactless cards always establish a secure channel before PIN
653
   * verification. Also, Session PIN generation requires SM. */
654
733
  if ((card->type == SC_CARD_TYPE_SC_HSM_SOC
655
733
        || card->type == SC_CARD_TYPE_SC_HSM_GOID
656
733
        || card->reader->uid.len || cmd == SC_PIN_CMD_GET_SESSION_PIN)
657
733
      && (data->cmd != SC_PIN_CMD_GET_INFO)) {
658
8
    struct sc_pin_cmd_data check_sm_pin_data;
659
8
    memset(&check_sm_pin_data, 0, sizeof(check_sm_pin_data));
660
8
    check_sm_pin_data.cmd = SC_PIN_CMD_GET_INFO;
661
8
    check_sm_pin_data.pin_type = data->pin_type;
662
8
    check_sm_pin_data.pin_reference = data->pin_reference;
663
664
8
    r = SC_ERROR_NOT_ALLOWED;
665
8
    if (card->sm_ctx.sm_mode == SM_MODE_TRANSMIT) {
666
      /* check if the existing SM channel is still valid */
667
0
      r = sc_pin_cmd(card, &check_sm_pin_data, NULL);
668
0
    }
669
8
    if (r == SC_ERROR_ASN1_OBJECT_NOT_FOUND || r == SC_ERROR_NOT_ALLOWED) {
670
      /* need to establish a new SM channel */
671
8
      LOG_TEST_RET(card->ctx,
672
8
          sc_hsm_perform_chip_authentication(card),
673
8
          "Could not perform chip authentication");
674
8
    }
675
8
  }
676
725
#endif
677
678
725
  if ((card->caps & SC_CARD_CAP_PROTECTED_AUTHENTICATION_PATH)
679
725
      && (data->cmd == SC_PIN_CMD_VERIFY)
680
725
      && (data->pin_reference == 0x81)
681
725
      && (!data->pin1.data || data->pin1.len <= 0)) {
682
0
    r = sc_hsm_soc_biomatch(card, data, tries_left);
683
725
  } else {
684
725
    if ((data->cmd == SC_PIN_CMD_VERIFY) && (data->pin_reference == 0x88)) {
685
0
      if (data->pin1.len != 16)
686
0
        return SC_ERROR_INVALID_PIN_LENGTH;
687
688
      // Save SO PIN for later use in sc_hsm_init_pin()
689
0
      r = sc_hsm_encode_sopin(data->pin1.data, priv->sopin);
690
0
      LOG_TEST_RET(card->ctx, r, "APDU transmit failed");
691
692
0
      LOG_FUNC_RETURN(card->ctx, SC_SUCCESS);
693
0
    }
694
695
725
    if ((data->cmd == SC_PIN_CMD_CHANGE) && (data->pin_reference == 0x88)) {
696
0
      if ((data->pin1.len != 16) || (data->pin2.len != 16))
697
0
        return SC_ERROR_INVALID_PIN_LENGTH;
698
699
0
      r = sc_hsm_encode_sopin(data->pin1.data, cmdbuff);
700
0
      LOG_TEST_RET(card->ctx, r, "APDU transmit failed");
701
702
0
      r = sc_hsm_encode_sopin(data->pin2.data, cmdbuff + 8);
703
0
      LOG_TEST_RET(card->ctx, r, "APDU transmit failed");
704
705
0
      sc_format_apdu(card, &apdu, SC_APDU_CASE_3_SHORT, 0x24, 0x00, data->pin_reference);
706
0
      apdu.data = cmdbuff;
707
0
      apdu.datalen = sizeof(cmdbuff);
708
0
      apdu.lc = 16;
709
0
      apdu.resplen = 0;
710
0
      data->apdu = &apdu;
711
0
    }
712
713
725
#ifdef ENABLE_SM
714
725
    if ((data->cmd == SC_PIN_CMD_GET_INFO)
715
725
        && (card->sm_ctx.sm_mode == SM_MODE_TRANSMIT)) {
716
      /* JCOP's SM accelerator is incapable of using case 1 APDU in SM */
717
0
      sc_format_apdu(card, &apdu, SC_APDU_CASE_2, 0x20, 0x00, data->pin_reference);
718
0
      apdu.resp = rbuf;
719
0
      apdu.resplen = sizeof rbuf;
720
0
      data->apdu = &apdu;
721
0
    }
722
725
#endif
723
724
725
    data->pin1.offset = 5;
725
725
    data->pin2.offset = 5;
726
727
725
    r = (*iso_ops->pin_cmd)(card, data, tries_left);
728
725
    data->apdu = NULL;
729
725
  }
730
725
  LOG_TEST_RET(card->ctx, r, "Verification failed");
731
732
314
  if (cmd == SC_PIN_CMD_GET_SESSION_PIN) {
733
    /* reset data->cmd to its original value */
734
0
    data->cmd = SC_PIN_CMD_GET_SESSION_PIN;
735
0
    if (data->pin_reference == 0x81) {
736
0
      u8 recvbuf[SC_MAX_APDU_BUFFER_SIZE];
737
0
#ifdef ENABLE_SM
738
0
      if (card->sm_ctx.sm_mode != SM_MODE_TRANSMIT) {
739
0
        sc_log(card->ctx,
740
0
            "Session PIN generation only supported in SM");
741
0
        LOG_FUNC_RETURN(card->ctx, SC_SUCCESS);
742
0
      }
743
#else
744
      sc_log(card->ctx,
745
          "Session PIN generation only supported in SM");
746
      LOG_FUNC_RETURN(card->ctx, SC_SUCCESS);
747
#endif
748
0
      sc_format_apdu(card, &apdu, SC_APDU_CASE_2_SHORT, 0x5A, 0x01, data->pin_reference);
749
0
      apdu.cla = 0x80;
750
0
      apdu.resp = recvbuf;
751
0
      apdu.resplen = sizeof recvbuf;
752
0
      apdu.le = 0;
753
0
      if (sc_transmit_apdu(card, &apdu) != SC_SUCCESS
754
0
          || sc_check_sw(card, apdu.sw1, apdu.sw2) != SC_SUCCESS) {
755
0
        sc_log(card->ctx,
756
0
            "Generating session PIN failed");
757
0
        LOG_FUNC_RETURN(card->ctx, SC_SUCCESS);
758
0
      }
759
0
      if (data->pin2.data && pin2_len > 0) {
760
0
        if (pin2_len >= apdu.resplen) {
761
0
          memcpy((unsigned char *) data->pin2.data, apdu.resp,
762
0
              apdu.resplen);
763
0
          data->pin2.len = apdu.resplen;
764
0
        } else {
765
0
          sc_log(card->ctx,
766
0
              "Buffer too small for session PIN");
767
0
        }
768
0
      }
769
0
    } else {
770
0
      sc_log(card->ctx,
771
0
          "Session PIN not supported for this PIN (0x%02X)",
772
0
          data->pin_reference);
773
0
    }
774
0
  }
775
314
  LOG_FUNC_RETURN(card->ctx, SC_SUCCESS);
776
314
}
777
778
779
780
static int sc_hsm_logout(sc_card_t * card)
781
0
{
782
0
  sc_path_t path;
783
0
  sc_hsm_private_data_t *priv = (sc_hsm_private_data_t *) card->drv_data;
784
0
  memset(priv->sopin, 0, sizeof(priv->sopin));
785
0
#ifdef ENABLE_SM
786
0
  sc_sm_stop(card);
787
0
#endif
788
789
0
  sc_path_set(&path, SC_PATH_TYPE_DF_NAME, sc_hsm_aid.value, sc_hsm_aid.len, 0, 0);
790
791
0
  return sc_hsm_select_file_ex(card, &path, 1, NULL);
792
0
}
793
794
795
/* NOTE: idx is an offset into the card's file, not into buf */
796
static int sc_hsm_read_binary(sc_card_t *card,
797
             unsigned int idx, u8 *buf, size_t count,
798
             unsigned long *flags)
799
11.6k
{
800
11.6k
  sc_context_t *ctx = card->ctx;
801
11.6k
  sc_apdu_t apdu;
802
11.6k
  u8 cmdbuff[4];
803
11.6k
  int r;
804
805
11.6k
  if (idx > 0xffff) {
806
0
    sc_log(ctx,  "invalid EF offset: 0x%X > 0xFFFF", idx);
807
0
    return SC_ERROR_OFFSET_TOO_LARGE;
808
0
  }
809
810
11.6k
  cmdbuff[0] = 0x54;
811
11.6k
  cmdbuff[1] = 0x02;
812
11.6k
  cmdbuff[2] = (idx >> 8) & 0xFF;
813
11.6k
  cmdbuff[3] = idx & 0xFF;
814
815
11.6k
  assert(count <= sc_get_max_recv_size(card));
816
11.6k
  sc_format_apdu(card, &apdu, SC_APDU_CASE_4, 0xB1, 0x00, 0x00);
817
11.6k
  apdu.data = cmdbuff;
818
11.6k
  apdu.datalen = 4;
819
11.6k
  apdu.lc = 4;
820
11.6k
  apdu.le = count;
821
11.6k
  apdu.resplen = count;
822
11.6k
  apdu.resp = buf;
823
824
11.6k
  r = sc_transmit_apdu(card, &apdu);
825
11.6k
  LOG_TEST_RET(ctx, r, "APDU transmit failed");
826
827
11.4k
  r =  sc_check_sw(card, apdu.sw1, apdu.sw2);
828
11.4k
  if (r != SC_ERROR_FILE_END_REACHED) {
829
10.9k
    LOG_TEST_RET(ctx, r, "Check SW error");
830
10.9k
  }
831
832
9.57k
  LOG_FUNC_RETURN(ctx, (int)apdu.resplen);
833
9.57k
}
834
835
836
/* NOTE: idx is an offset into the card's file, not into buf */
837
static int sc_hsm_write_ef(sc_card_t *card,
838
             int fid,
839
             unsigned int idx, const u8 *buf, size_t count)
840
1.11k
{
841
1.11k
  sc_context_t *ctx = card->ctx;
842
1.11k
  sc_apdu_t apdu;
843
1.11k
  u8 *cmdbuff, *p;
844
1.11k
  size_t len;
845
1.11k
  int r;
846
847
1.11k
  if (idx > 0xffff) {
848
0
    sc_log(ctx,  "invalid EF offset: 0x%X > 0xFFFF", idx);
849
0
    return SC_ERROR_OFFSET_TOO_LARGE;
850
0
  }
851
852
1.11k
  cmdbuff = malloc(8 + count);
853
1.11k
  if (!cmdbuff) {
854
0
    LOG_FUNC_RETURN(card->ctx, SC_ERROR_OUT_OF_MEMORY);
855
0
  }
856
857
1.11k
  size_t bytes_left = count;
858
  // 8 bytes are required for T54(4) and T53(4)
859
1.11k
  size_t blk_size = card->max_send_size - 8;
860
1.11k
  size_t to_send = 0;
861
1.11k
  size_t file_offset = (size_t) idx;
862
1.11k
  size_t offset = 0;
863
1.27k
  do {
864
1.27k
    to_send = bytes_left >= blk_size ? blk_size : bytes_left;
865
1.27k
    p = cmdbuff;
866
    // ASN1 0x54 offset
867
1.27k
    *p++ = 0x54;
868
1.27k
    *p++ = 0x02;
869
1.27k
    *p++ = (file_offset >> 8) & 0xFF;
870
1.27k
    *p++ = file_offset & 0xFF;
871
    // ASN1 0x53 to_send
872
1.27k
    *p++ = 0x53;
873
1.27k
    if (to_send < 128) {
874
301
      *p++ = (u8)to_send;
875
301
      len = 6;
876
978
    } else if (to_send < 256) {
877
43
      *p++ = 0x81;
878
43
      *p++ = (u8)to_send;
879
43
      len = 7;
880
935
    } else {
881
935
      *p++ = 0x82;
882
935
      *p++ = (to_send >> 8) & 0xFF;
883
935
      *p++ = to_send & 0xFF;
884
935
      len = 8;
885
935
    }
886
887
1.27k
    if (buf != NULL)
888
1.27k
      memcpy(p, buf+offset, to_send);
889
1.27k
    len += to_send;
890
891
1.27k
    sc_format_apdu(card, &apdu, SC_APDU_CASE_3, 0xD7, fid >> 8, fid & 0xFF);
892
1.27k
    apdu.data = cmdbuff;
893
1.27k
    apdu.datalen = len;
894
1.27k
    apdu.lc = len;
895
896
1.27k
    r = sc_transmit_apdu(card, &apdu);
897
1.27k
    LOG_TEST_GOTO_ERR(ctx, r, "APDU transmit failed");
898
1.20k
    r = sc_check_sw(card, apdu.sw1, apdu.sw2);
899
1.20k
    LOG_TEST_GOTO_ERR(ctx, r, "Check SW error");
900
901
301
    bytes_left -= to_send;
902
301
    offset += to_send;
903
301
    file_offset += to_send;
904
301
  } while (0 < bytes_left);
905
906
1.11k
err:
907
1.11k
  free(cmdbuff);
908
909
1.11k
  LOG_FUNC_RETURN(ctx, (int)count);
910
1.11k
}
911
912
913
static int sc_hsm_update_binary(sc_card_t *card,
914
             unsigned int idx, const u8 *buf, size_t count,
915
             unsigned long flags)
916
1.10k
{
917
1.10k
  return sc_hsm_write_ef(card, 0, idx, buf, count);
918
1.10k
}
919
920
921
922
static int sc_hsm_list_files(sc_card_t *card, u8 * buf, size_t buflen)
923
1.11k
{
924
1.11k
  sc_apdu_t apdu;
925
1.11k
  u8 recvbuf[MAX_EXT_APDU_LENGTH];
926
1.11k
  sc_hsm_private_data_t *priv = (sc_hsm_private_data_t *) card->drv_data;
927
1.11k
  int r;
928
929
1.11k
  if (priv->noExtLength) {
930
0
    sc_format_apdu(card, &apdu, SC_APDU_CASE_2, 0x58, 0, 0);
931
1.11k
  } else {
932
1.11k
    sc_format_apdu(card, &apdu, SC_APDU_CASE_2_EXT, 0x58, 0, 0);
933
1.11k
  }
934
1.11k
  apdu.cla = 0x80;
935
1.11k
  apdu.resp = recvbuf;
936
1.11k
  apdu.resplen = sizeof(recvbuf);
937
1.11k
  apdu.le = 0;
938
1.11k
  r = sc_transmit_apdu(card, &apdu);
939
940
1.11k
  if ((r == SC_ERROR_TRANSMIT_FAILED) && (!priv->noExtLength)) {
941
0
    sc_log(card->ctx, "No extended length support ? Trying fall-back to short APDUs, probably breaking support for RSA 2048 operations");
942
0
    priv->noExtLength = 1;
943
0
    card->max_send_size = 248;    // 255 - 7 because of TLV in odd ins UPDATE BINARY
944
0
    return sc_hsm_list_files(card, buf, buflen);
945
0
  }
946
1.11k
  LOG_TEST_RET(card->ctx, r, "ENUMERATE OBJECTS APDU transmit failed");
947
948
1.10k
  if (buflen < apdu.resplen)
949
0
    memcpy(buf, recvbuf, buflen);
950
1.10k
  else
951
1.10k
    memcpy(buf, recvbuf, apdu.resplen);
952
953
1.10k
  LOG_FUNC_RETURN(card->ctx, (int)apdu.resplen);
954
1.10k
}
955
956
957
958
static int sc_hsm_create_file(sc_card_t *card, sc_file_t *file)
959
9
{
960
9
  int r;
961
962
9
  r = sc_hsm_write_ef(card, file->id, 0, NULL, 0);
963
9
  LOG_TEST_RET(card->ctx, r, "Create file failed");
964
965
9
  LOG_FUNC_RETURN(card->ctx, SC_SUCCESS);
966
9
}
967
968
969
970
static int sc_hsm_delete_file(sc_card_t *card, const sc_path_t *path)
971
7
{
972
7
  sc_context_t *ctx = card->ctx;
973
7
  sc_apdu_t apdu;
974
7
  u8 sbuf[2];
975
7
  int r;
976
977
7
  if ((path->type != SC_PATH_TYPE_FILE_ID) || (path->len != 2)) {
978
0
    sc_log(card->ctx,  "File type has to be SC_PATH_TYPE_FILE_ID");
979
0
    LOG_FUNC_RETURN(card->ctx, SC_ERROR_INVALID_ARGUMENTS);
980
0
  }
981
982
7
  sbuf[0] = path->value[0];
983
7
  sbuf[1] = path->value[1];
984
985
7
  sc_format_apdu(card, &apdu, SC_APDU_CASE_3_SHORT, 0xE4, 0x02, 0x00);
986
7
  apdu.data = sbuf;
987
7
  apdu.datalen = sizeof(sbuf);
988
7
  apdu.lc = sizeof(sbuf);
989
990
7
  r = sc_transmit_apdu(card, &apdu);
991
7
  LOG_TEST_RET(ctx, r, "APDU transmit failed");
992
993
6
  r =  sc_check_sw(card, apdu.sw1, apdu.sw2);
994
6
  LOG_TEST_RET(ctx, r, "Check SW error");
995
996
3
  LOG_FUNC_RETURN(ctx, SC_SUCCESS);
997
3
}
998
999
1000
static int sc_hsm_set_security_env(sc_card_t *card,
1001
           const sc_security_env_t *env,
1002
           int se_num)
1003
1.91k
{
1004
1.91k
  sc_hsm_private_data_t *priv = (sc_hsm_private_data_t *) card->drv_data;
1005
1006
1.91k
  priv->env = env;
1007
1008
1.91k
  switch(env->algorithm) {
1009
1.86k
  case SC_ALGORITHM_RSA:
1010
1.86k
    if (env->algorithm_flags & SC_ALGORITHM_RSA_PAD_PKCS1) {
1011
0
      if (env->algorithm_flags & SC_ALGORITHM_RSA_HASH_SHA1) {
1012
0
        priv->algorithm = ALGO_RSA_PKCS1_SHA1;
1013
0
      } else if (env->algorithm_flags & SC_ALGORITHM_RSA_HASH_SHA256) {
1014
0
        priv->algorithm = ALGO_RSA_PKCS1_SHA256;
1015
0
      } else if (env->algorithm_flags & SC_ALGORITHM_RSA_HASH_SHA384) {
1016
0
        priv->algorithm = ALGO_RSA_PKCS1_SHA384;
1017
0
      } else if (env->algorithm_flags & SC_ALGORITHM_RSA_HASH_SHA512) {
1018
0
        priv->algorithm = ALGO_RSA_PKCS1_SHA512;
1019
0
      } else {
1020
0
        priv->algorithm = ALGO_RSA_PKCS1;
1021
0
      }
1022
1.86k
    } else if (env->algorithm_flags & SC_ALGORITHM_RSA_PAD_PSS) {
1023
755
      if ((env->algorithm_flags & SC_ALGORITHM_RSA_HASHES) &&
1024
755
          (((env->algorithm_flags & SC_ALGORITHM_MGF1_HASHES) >> 8) != (env->algorithm_flags & SC_ALGORITHM_RSA_HASHES))) {
1025
0
        LOG_FUNC_RETURN(card->ctx, SC_ERROR_INVALID_ARGUMENTS);
1026
0
      }
1027
755
      priv->algorithm = ALGO_RSA_PSS;
1028
1.11k
    } else {
1029
1.11k
      if (env->operation == SC_SEC_OPERATION_DECIPHER) {
1030
332
        priv->algorithm = ALGO_RSA_DECRYPT;
1031
779
      } else {
1032
779
        priv->algorithm = ALGO_RSA_RAW;
1033
779
      }
1034
1.11k
    }
1035
1.86k
    break;
1036
1.86k
  case SC_ALGORITHM_EC:
1037
49
    if (env->operation == SC_SEC_OPERATION_DERIVE) {
1038
0
      priv->algorithm = ALGO_EC_DH;
1039
49
    } else if (env->algorithm_flags & SC_ALGORITHM_ECDSA_HASH_NONE) {
1040
4
      priv->algorithm = ALGO_EC_RAW;
1041
45
    } else if (env->algorithm_flags & SC_ALGORITHM_ECDSA_HASH_SHA1) {
1042
2
      priv->algorithm = ALGO_EC_SHA1;
1043
43
    } else if (env->algorithm_flags & SC_ALGORITHM_ECDSA_HASH_SHA224) {
1044
16
      priv->algorithm = ALGO_EC_SHA224;
1045
27
    } else if (env->algorithm_flags & SC_ALGORITHM_ECDSA_HASH_SHA256) {
1046
1
      priv->algorithm = ALGO_EC_SHA256;
1047
26
    } else if (env->algorithm_flags & SC_ALGORITHM_ECDSA_HASH_SHA384) {
1048
3
      priv->algorithm = ALGO_EC_SHA384;
1049
23
    } else if (env->algorithm_flags & SC_ALGORITHM_ECDSA_HASH_SHA512) {
1050
23
      priv->algorithm = ALGO_EC_SHA512;
1051
23
    } else if (env->algorithm_flags & SC_ALGORITHM_ECDSA_RAW) {
1052
0
      priv->algorithm = ALGO_EC_RAW;
1053
0
    } else {
1054
0
      LOG_FUNC_RETURN(card->ctx, SC_ERROR_INVALID_ARGUMENTS);
1055
0
    }
1056
49
    break;
1057
49
  default:
1058
0
    LOG_FUNC_RETURN(card->ctx, SC_ERROR_INVALID_ARGUMENTS);
1059
0
    break;
1060
1.91k
  }
1061
1.91k
  LOG_FUNC_RETURN(card->ctx, SC_SUCCESS);
1062
1.91k
}
1063
1064
1065
1066
static int sc_hsm_decode_ecdsa_signature(sc_card_t *card,
1067
          const u8 * data, size_t datalen,
1068
          u8 * out, size_t outlen,
1069
26
          size_t key_size) {
1070
1071
26
  int r;
1072
26
  size_t fieldsizebytes = (key_size + 7) >> 3;
1073
1074
26
  sc_log(card->ctx,
1075
26
         "Field size %"SC_FORMAT_LEN_SIZE_T"u, signature buffer size %"SC_FORMAT_LEN_SIZE_T"u",
1076
26
         fieldsizebytes, outlen);
1077
1078
26
  r = sc_asn1_decode_ecdsa_signature(card->ctx, data, datalen, fieldsizebytes, &out, outlen);
1079
26
  LOG_FUNC_RETURN(card->ctx, r);
1080
26
}
1081
1082
1083
1084
static int sc_hsm_compute_signature(sc_card_t *card,
1085
             const u8 * data, size_t datalen,
1086
             u8 * out, size_t outlen)
1087
1.56k
{
1088
1.56k
  int r;
1089
1.56k
  sc_apdu_t apdu;
1090
1.56k
  u8 rbuf[514];
1091
1.56k
  sc_hsm_private_data_t *priv;
1092
1093
1.56k
  if (card == NULL || data == NULL || out == NULL) {
1094
0
    return SC_ERROR_INVALID_ARGUMENTS;
1095
0
  }
1096
1.56k
  priv = (sc_hsm_private_data_t *) card->drv_data;
1097
1098
1.56k
  if (priv->env == NULL) {
1099
0
    LOG_FUNC_RETURN(card->ctx, SC_ERROR_OBJECT_NOT_FOUND);
1100
0
  }
1101
1102
1.56k
  sc_format_apdu(card, &apdu, SC_APDU_CASE_4_EXT, 0x68, priv->env->key_ref[0], priv->algorithm);
1103
1.56k
  apdu.cla = 0x80;
1104
1.56k
  apdu.resp = rbuf;
1105
1.56k
  apdu.resplen = sizeof(rbuf);
1106
1.56k
  apdu.le = 512;
1107
1108
1.56k
  apdu.data = data;
1109
1.56k
  apdu.lc = datalen;
1110
1.56k
  apdu.datalen = datalen;
1111
1.56k
  r = sc_transmit_apdu(card, &apdu);
1112
1113
1.56k
  LOG_TEST_RET(card->ctx, r, "APDU transmit failed");
1114
1.26k
  if (apdu.sw1 == 0x90 && apdu.sw2 == 0x00) {
1115
148
    int len;
1116
1117
148
    if ((priv->algorithm & 0xF0) == ALGO_EC_RAW) {
1118
26
      len = sc_hsm_decode_ecdsa_signature(card, apdu.resp, apdu.resplen, out, outlen, priv->env->key_size_bits);
1119
26
      if (len < 0) {
1120
16
        LOG_FUNC_RETURN(card->ctx, len);
1121
16
      }
1122
122
    } else {
1123
122
      len = (int)(apdu.resplen > outlen ? outlen : apdu.resplen);
1124
122
      memcpy(out, apdu.resp, len);
1125
122
    }
1126
132
    LOG_FUNC_RETURN(card->ctx, len);
1127
132
  }
1128
1.11k
  LOG_FUNC_RETURN(card->ctx, sc_check_sw(card, apdu.sw1, apdu.sw2));
1129
1.11k
}
1130
1131
1132
1133
static int sc_hsm_decipher(sc_card_t *card, const u8 * crgram, size_t crgram_len, u8 * out, size_t outlen)
1134
316
{
1135
316
  int r;
1136
316
  size_t len;
1137
316
  sc_apdu_t apdu;
1138
316
  u8 rbuf[514];
1139
316
  sc_hsm_private_data_t *priv;
1140
1141
316
  if (card == NULL || crgram == NULL || out == NULL) {
1142
0
    return SC_ERROR_INVALID_ARGUMENTS;
1143
0
  }
1144
316
  LOG_FUNC_CALLED(card->ctx);
1145
316
  priv = (sc_hsm_private_data_t *) card->drv_data;
1146
1147
316
  sc_format_apdu(card, &apdu, SC_APDU_CASE_4_EXT, 0x62, priv->env->key_ref[0], priv->algorithm);
1148
316
  apdu.cla = 0x80;
1149
316
  apdu.resp = rbuf;
1150
316
  apdu.resplen = sizeof(rbuf);
1151
316
  apdu.le = 512;
1152
1153
316
  apdu.data = (u8 *)crgram;
1154
316
  apdu.lc = crgram_len;
1155
316
  apdu.datalen = crgram_len;
1156
1157
316
  r = sc_transmit_apdu(card, &apdu);
1158
1159
316
  LOG_TEST_RET(card->ctx, r, "APDU transmit failed");
1160
283
  if (apdu.sw1 == 0x90 && apdu.sw2 == 0x00) {
1161
106
    if (priv->algorithm == ALGO_EC_DH) {
1162
      //
1163
      // The SmartCard-HSM returns the point result of the DH operation
1164
      // with a leading '04'
1165
0
      assert(apdu.resplen > 0);
1166
0
      len = apdu.resplen - 1 > outlen ? outlen : apdu.resplen - 1;
1167
0
      memcpy(out, apdu.resp + 1, len);
1168
0
      LOG_FUNC_RETURN(card->ctx, (int)len);
1169
106
    } else {
1170
106
      len = apdu.resplen > outlen ? outlen : apdu.resplen;
1171
106
      memcpy(out, apdu.resp, len);
1172
106
      LOG_FUNC_RETURN(card->ctx, (int)len);
1173
106
    }
1174
106
  }
1175
177
  else
1176
283
    LOG_FUNC_RETURN(card->ctx, sc_check_sw(card, apdu.sw1, apdu.sw2));
1177
283
}
1178
1179
1180
1181
void sc_hsm_set_serialnr(sc_card_t *card, char *serial)
1182
0
{
1183
0
  sc_hsm_private_data_t *priv = (sc_hsm_private_data_t *) card->drv_data;
1184
1185
0
  if (priv->serialno) {
1186
0
    free(priv->serialno);
1187
0
  }
1188
1189
0
  priv->serialno = strdup(serial);
1190
0
}
1191
1192
1193
1194
static int sc_hsm_get_serialnr(sc_card_t *card, sc_serial_number_t *serial)
1195
400
{
1196
400
  sc_hsm_private_data_t *priv = (sc_hsm_private_data_t *) card->drv_data;
1197
1198
400
  LOG_FUNC_CALLED(card->ctx);
1199
1200
400
  if (!priv->serialno && 0 == strcmp(card->ctx->app_name, "opensc-tool")) {
1201
    /* sc-hsm initializes the serial number via its PKCS#15 layer.
1202
     * Create and destroy a dummy card to get this initialized.  Only do
1203
     * this for `opensc-tool --serial` to avoid unnecessary card commands
1204
     * in all other cases. */
1205
0
    sc_pkcs15_card_t *p15card = NULL;
1206
0
    (void)sc_pkcs15_bind(card, NULL, &p15card);
1207
0
    sc_pkcs15_unbind(p15card);
1208
0
  }
1209
1210
400
  if (!priv->serialno) {
1211
400
    return SC_ERROR_OBJECT_NOT_FOUND;
1212
400
  }
1213
1214
0
  serial->len = strlen(priv->serialno);
1215
0
  if (serial->len > sizeof(serial->value))
1216
0
    serial->len = sizeof(serial->value);
1217
1218
0
  memcpy(serial->value, priv->serialno, serial->len);
1219
1220
0
  LOG_FUNC_RETURN(card->ctx, SC_SUCCESS);
1221
0
}
1222
1223
1224
1225
static int sc_hsm_initialize(sc_card_t *card, sc_cardctl_sc_hsm_init_param_t *params)
1226
0
{
1227
0
  sc_context_t *ctx = card->ctx;
1228
0
  sc_pkcs15_tokeninfo_t ti;
1229
0
  struct sc_pin_cmd_data pincmd;
1230
0
  int r;
1231
0
  size_t tilen;
1232
0
  sc_apdu_t apdu;
1233
0
  u8 ibuff[68+0xFF], *p;
1234
1235
0
  LOG_FUNC_CALLED(card->ctx);
1236
1237
0
  p = ibuff;
1238
0
  *p++ = 0x80;  // Options
1239
0
  *p++ = 0x02;
1240
0
  memcpy(p, params->options, 2);
1241
0
  p += 2;
1242
1243
0
  if (params->user_pin_len > 0xFF) {
1244
0
    return SC_ERROR_INVALID_ARGUMENTS;
1245
0
  }
1246
0
  *p++ = 0x81;  // User PIN
1247
0
  *p++ = (u8)params->user_pin_len;
1248
0
  memcpy(p, params->user_pin, params->user_pin_len);
1249
0
  p += params->user_pin_len;
1250
1251
0
  *p++ = 0x82;  // Initialization code
1252
0
  *p++ = 0x08;
1253
0
  memcpy(p, params->init_code, 8);
1254
0
  p += 8;
1255
1256
0
  *p++ = 0x91;  // User PIN retry counter
1257
0
  *p++ = 0x01;
1258
0
  *p++ = params->user_pin_retry_counter;
1259
1260
0
  if (params->dkek_shares >= 0) {
1261
0
    *p++ = 0x92;  // Number of DKEK shares
1262
0
    *p++ = 0x01;
1263
0
    *p++ = (u8)params->dkek_shares;
1264
0
  }
1265
1266
0
  if (params->num_of_pub_keys > 0) {
1267
0
    *p++ = 0x93;  // Use public key authentication
1268
0
    *p++ = 0x02;
1269
0
    *p++ = params->num_of_pub_keys; // Total number of public keys used for public authentication
1270
0
    *p++ = params->required_pub_keys; // Number of public keys required for authentication
1271
0
  }
1272
1273
0
  if (params->bio1.len) {
1274
0
    *p++ = 0x95;
1275
0
    *p++ = params->bio1.len;
1276
0
    memcpy(p, params->bio1.value, params->bio1.len);
1277
0
    p += params->bio1.len;
1278
0
  }
1279
0
  if (params->bio2.len) {
1280
0
    *p++ = 0x96;
1281
0
    *p++ = params->bio2.len;
1282
0
    memcpy(p, params->bio2.value, params->bio2.len);
1283
0
    p += params->bio2.len;
1284
0
  }
1285
1286
0
  sc_format_apdu(card, &apdu, SC_APDU_CASE_3_SHORT, 0x50, 0x00, 0x00);
1287
0
  apdu.cla = 0x80;
1288
0
  apdu.data = ibuff;
1289
0
  apdu.datalen = p - ibuff;
1290
0
  apdu.lc = apdu.datalen;
1291
1292
0
  r = sc_transmit_apdu(card, &apdu);
1293
0
  LOG_TEST_RET(ctx, r, "APDU transmit failed");
1294
1295
0
  r =  sc_check_sw(card, apdu.sw1, apdu.sw2);
1296
1297
0
  if (r == SC_ERROR_NOT_ALLOWED) {
1298
0
    r = SC_ERROR_PIN_CODE_INCORRECT;
1299
0
  }
1300
1301
0
  LOG_TEST_RET(ctx, r, "Check SW error");
1302
1303
0
  if (params->label) {
1304
0
    memset(&ti, 0, sizeof(ti));
1305
1306
0
    ti.label = params->label;
1307
0
    ti.flags = SC_PKCS15_TOKEN_PRN_GENERATION;
1308
1309
0
    r = sc_pkcs15_encode_tokeninfo(ctx, &ti, &p, &tilen);
1310
0
    LOG_TEST_RET(ctx, r, "Error encoding tokeninfo");
1311
1312
0
    memset(&pincmd, 0, sizeof(pincmd));
1313
0
    pincmd.cmd = SC_PIN_CMD_VERIFY;
1314
0
    pincmd.pin_type = SC_AC_CHV;
1315
0
    pincmd.pin_reference = 0x81;
1316
0
    pincmd.pin1.data = params->user_pin;
1317
0
    pincmd.pin1.len = params->user_pin_len;
1318
1319
0
    r = (*iso_ops->pin_cmd)(card, &pincmd, NULL);
1320
0
    LOG_TEST_RET(ctx, r, "Could not verify PIN");
1321
1322
0
    r = sc_hsm_write_ef(card, 0x2F03, 0, p, tilen);
1323
0
    LOG_TEST_RET(ctx, r, "Could not write EF.TokenInfo");
1324
0
  }
1325
1326
0
  LOG_FUNC_RETURN(card->ctx, SC_SUCCESS);
1327
0
}
1328
1329
1330
1331
static int sc_hsm_import_dkek_share(sc_card_t *card, sc_cardctl_sc_hsm_dkek_t *params)
1332
0
{
1333
0
  sc_context_t *ctx = card->ctx;
1334
0
  sc_apdu_t apdu;
1335
0
  u8 status[SC_MAX_APDU_BUFFER_SIZE];
1336
0
  int r;
1337
1338
0
  LOG_FUNC_CALLED(card->ctx);
1339
1340
0
  if (params->importShare) {
1341
0
    sc_format_apdu(card, &apdu, SC_APDU_CASE_4_SHORT, 0x52, 0x00, 0x00);
1342
0
    apdu.cla = 0x80;
1343
0
    apdu.data = params->dkek_share;
1344
0
    apdu.datalen = sizeof(params->dkek_share);
1345
0
    apdu.lc = apdu.datalen;
1346
0
  } else {
1347
0
    sc_format_apdu(card, &apdu, SC_APDU_CASE_2_SHORT, 0x52, 0x00, 0x00);
1348
0
  }
1349
0
  apdu.cla = 0x80;
1350
0
  apdu.le = 0;
1351
0
  apdu.resp = status;
1352
0
  apdu.resplen = sizeof(status);
1353
1354
0
  r = sc_transmit_apdu(card, &apdu);
1355
0
  LOG_TEST_RET(ctx, r, "APDU transmit failed");
1356
1357
0
  r =  sc_check_sw(card, apdu.sw1, apdu.sw2);
1358
1359
0
  LOG_TEST_RET(ctx, r, "Check SW error");
1360
1361
0
  assert(apdu.resplen >= (sizeof(params->key_check_value) + 2));
1362
1363
0
  params->dkek_shares = status[0];
1364
0
  params->outstanding_shares = status[1];
1365
0
  memcpy(params->key_check_value, status + 2, sizeof(params->key_check_value));
1366
1367
0
  LOG_FUNC_RETURN(card->ctx, SC_SUCCESS);
1368
0
}
1369
1370
1371
1372
static int sc_hsm_wrap_key(sc_card_t *card, sc_cardctl_sc_hsm_wrapped_key_t *params)
1373
0
{
1374
0
  sc_context_t *ctx = card->ctx;
1375
0
  sc_apdu_t apdu;
1376
0
  u8 data[1500];
1377
0
  int r;
1378
1379
0
  LOG_FUNC_CALLED(card->ctx);
1380
1381
0
  sc_format_apdu(card, &apdu, SC_APDU_CASE_2_EXT, 0x72, params->key_id, 0x92);
1382
0
  apdu.cla = 0x80;
1383
0
  apdu.le = 0;
1384
0
  apdu.resp = data;
1385
0
  apdu.resplen = sizeof(data);
1386
1387
0
  r = sc_transmit_apdu(card, &apdu);
1388
0
  LOG_TEST_RET(ctx, r, "APDU transmit failed");
1389
1390
0
  r =  sc_check_sw(card, apdu.sw1, apdu.sw2);
1391
1392
0
  LOG_TEST_RET(ctx, r, "Check SW error");
1393
1394
0
  if (params->wrapped_key == NULL) {
1395
0
    params->wrapped_key_length = apdu.resplen;
1396
0
    params->wrapped_key = malloc(apdu.resplen);
1397
0
    if (params->wrapped_key == NULL) {
1398
0
      LOG_FUNC_RETURN(card->ctx, SC_ERROR_OUT_OF_MEMORY);
1399
0
    }
1400
0
  } else {
1401
0
    if (apdu.resplen > params->wrapped_key_length) {
1402
0
      LOG_FUNC_RETURN(card->ctx, SC_ERROR_BUFFER_TOO_SMALL);
1403
0
    }
1404
0
    params->wrapped_key_length = apdu.resplen;
1405
0
  }
1406
0
  memcpy(params->wrapped_key, data, apdu.resplen);
1407
0
  LOG_FUNC_RETURN(card->ctx, SC_SUCCESS);
1408
0
}
1409
1410
1411
1412
static int sc_hsm_unwrap_key(sc_card_t *card, sc_cardctl_sc_hsm_wrapped_key_t *params)
1413
0
{
1414
0
  sc_context_t *ctx = card->ctx;
1415
0
  sc_apdu_t apdu;
1416
0
  int r;
1417
1418
0
  LOG_FUNC_CALLED(card->ctx);
1419
1420
0
  r = sc_hsm_write_ef(card, 0x2F10, 0, params->wrapped_key, params->wrapped_key_length);
1421
0
  LOG_TEST_RET(card->ctx, r, "Create EF failed");
1422
1423
0
  sc_format_apdu(card, &apdu, SC_APDU_CASE_1, 0x74, params->key_id, 0x93);
1424
0
  apdu.cla = 0x80;
1425
0
  r = sc_transmit_apdu(card, &apdu);
1426
0
  LOG_TEST_RET(ctx, r, "APDU transmit failed");
1427
1428
0
  r = sc_check_sw(card, apdu.sw1, apdu.sw2);
1429
0
  LOG_TEST_RET(ctx, r, "Check SW error");
1430
1431
0
  LOG_FUNC_RETURN(card->ctx, SC_SUCCESS);
1432
0
}
1433
1434
static int verify_certificate(sc_card_t *card, sc_cvc_t *cvc,
1435
    const u8 *cvc_buf, size_t cvc_buf_len)
1436
0
{
1437
0
  u8 tag = SC_ASN1_TAG_CONTEXT | SC_ASN1_TAG_BIT_STRING; /* 0x83 */
1438
0
  size_t pukref_len;
1439
0
  u8 pukref[BUFSIZ];
1440
0
  sc_apdu_t apdu;
1441
0
  u8 *ptr;
1442
0
  int r;
1443
1444
0
  LOG_FUNC_CALLED(card->ctx);
1445
1446
  /* check if public key is already known */
1447
0
  if ((r = sc_asn1_put_tag(tag, (u8 *)cvc->chr, cvc->chrLen,
1448
0
          pukref, sizeof(pukref), &ptr)) < 0) {
1449
0
    sc_log(card->ctx, "Error formatting ASN.1 sequence: %s\n", sc_strerror(r));
1450
0
    LOG_FUNC_RETURN(card->ctx, SC_ERROR_UNKNOWN);
1451
0
  }
1452
0
  pukref_len = ptr - pukref;
1453
1454
  /* MANAGE SECURITY ENVIRONMENT to query public key by chr */
1455
0
  sc_format_apdu_ex(&apdu, 0x00, 0x22, 0x81, 0xB6, pukref, pukref_len, NULL, 0);
1456
1457
0
  r = sc_transmit_apdu(card, &apdu);
1458
0
  LOG_TEST_RET(card->ctx, r, "APDU transmit failed");
1459
1460
0
  r = sc_check_sw(card, apdu.sw1, apdu.sw2);
1461
0
  if (!r) {
1462
    /* already known */
1463
0
    LOG_FUNC_RETURN(card->ctx, SC_SUCCESS);
1464
0
  }
1465
0
  if (apdu.sw1 != 0x6A && apdu.sw2 != 0x88) {
1466
0
    LOG_TEST_RET(card->ctx, SC_ERROR_UNKNOWN, "Check SW error");
1467
0
  }
1468
1469
0
  if ((r = sc_asn1_put_tag(tag, (u8 *)cvc->car, cvc->carLen,
1470
0
          pukref, sizeof(pukref), &ptr)) < 0) {
1471
0
    sc_log(card->ctx, "Error formatting ASN.1 sequence: %s\n", sc_strerror(r));
1472
0
    LOG_FUNC_RETURN(card->ctx, SC_ERROR_UNKNOWN);
1473
0
  }
1474
0
  pukref_len = ptr - pukref;
1475
1476
  /* MANAGE SECURITY ENVIRONMENT to set the CAR public key */
1477
0
  sc_format_apdu_ex(&apdu, 0x00, 0x22, 0x81, 0xB6, pukref, pukref_len, NULL, 0);
1478
1479
0
  r = sc_transmit_apdu(card, &apdu);
1480
0
  LOG_TEST_RET(card->ctx, r, "APDU transmit failed");
1481
0
  r = sc_check_sw(card, apdu.sw1, apdu.sw2);
1482
0
  LOG_TEST_RET(card->ctx, r, "Check SW error");
1483
1484
  /* PERFORM SECURITY OPERATION -> VERIFY CERTIFICATE */
1485
0
  sc_format_apdu_ex(&apdu, 0x00, 0x2A, 0x00, 0xBE, cvc_buf, cvc_buf_len, NULL, 0);
1486
1487
0
  r = sc_transmit_apdu(card, &apdu);
1488
0
  LOG_TEST_RET(card->ctx, r, "APDU transmit failed");
1489
0
  r = sc_check_sw(card, apdu.sw1, apdu.sw2);
1490
0
  LOG_TEST_RET(card->ctx, r, "Check SW error");
1491
1492
0
  LOG_FUNC_RETURN(card->ctx, SC_SUCCESS);
1493
0
}
1494
1495
1496
1497
static int sc_hsm_register_public_key(sc_card_t *card,
1498
    sc_cardctl_sc_hsm_pka_register_t *pka_register)
1499
0
{
1500
0
  u8 tag = SC_ASN1_TAG_CONTEXT | SC_ASN1_TAG_BIT_STRING; /* 0x83 */
1501
0
  u8 recvbuf[4];
1502
0
  sc_context_t *ctx = card->ctx;
1503
0
  sc_apdu_t apdu;
1504
0
  u8 *ptr;
1505
0
  int r;
1506
0
  sc_pkcs15_card_t p15card;
1507
0
  const u8 *pka_buf;
1508
0
  size_t pka_buf_len;
1509
0
  sc_cvc_pka_t pka;
1510
  /* outer CAR in ASN.1 needs a byte for tag and a byte for length */
1511
0
  u8 asn1_outer_car[sizeof(pka.public_key_req.cvc.outer_car) + 2];
1512
1513
0
  LOG_FUNC_CALLED(ctx);
1514
1515
0
  memset(&pka, 0, sizeof(pka));
1516
0
  memset(&p15card, 0, sizeof(p15card));
1517
0
  p15card.card = card;
1518
1519
0
  pka_buf = pka_register->buf;
1520
0
  pka_buf_len = pka_register->buflen;
1521
0
  r = sc_pkcs15emu_sc_hsm_decode_pka(&p15card, &pka_buf, &pka_buf_len, &pka);
1522
0
  LOG_TEST_GOTO_ERR(ctx, r, "sc_pkcs15emu_sc_hsm_decode_pka failed");
1523
1524
  /* the DICA CVC must be verified first */
1525
0
  r = verify_certificate(card, &pka.dica.cvc, pka.dica.ptr, pka.dica.len);
1526
0
  LOG_TEST_GOTO_ERR(ctx, r, "Verify device issuer CA CVC failed");
1527
1528
  /* the device CVC must be verified before registering the public key */
1529
0
  r = verify_certificate(card, &pka.device.cvc, pka.device.ptr, pka.device.len);
1530
0
  LOG_TEST_GOTO_ERR(ctx, r, "Verify device CVC failed");
1531
1532
0
  r = sc_asn1_put_tag(tag,
1533
0
      (u8 *)pka.public_key_req.cvc.outer_car,
1534
0
      pka.public_key_req.cvc.outerCARLen,
1535
0
      asn1_outer_car, sizeof(asn1_outer_car), &ptr);
1536
0
  LOG_TEST_GOTO_ERR(ctx, r, "ASN.1 encode outer CAR failed");
1537
1538
  /* MANAGE SECURITY ENVIRONMENT with the outer CAR of the public key */
1539
0
  sc_format_apdu_ex(&apdu, 0x00, 0x22, 0x81, 0xB6,
1540
0
      asn1_outer_car, ptr - asn1_outer_car, NULL, 0);
1541
1542
0
  r = sc_transmit_apdu(card, &apdu);
1543
0
  LOG_TEST_GOTO_ERR(ctx, r, "APDU transmit failed");
1544
0
  r = sc_check_sw(card, apdu.sw1, apdu.sw2);
1545
0
  LOG_TEST_GOTO_ERR(ctx, r, "Check SW error");
1546
1547
0
  sc_format_apdu_ex(&apdu, 0x80, 0x54, 0x00, 0x00,
1548
0
      pka.public_key_req.ptr, pka.public_key_req.len,
1549
0
      recvbuf, sizeof(recvbuf));
1550
1551
0
  r = sc_transmit_apdu(card, &apdu);
1552
0
  LOG_TEST_GOTO_ERR(ctx, r, "APDU transmit failed");
1553
0
  r = sc_check_sw(card, apdu.sw1, apdu.sw2);
1554
0
  LOG_TEST_GOTO_ERR(ctx, r, "Check SW error");
1555
1556
0
  pka_register->new_status.num_total = recvbuf[0];
1557
0
  pka_register->new_status.num_missing = recvbuf[1];
1558
0
  pka_register->new_status.num_required = recvbuf[2];
1559
0
  pka_register->new_status.num_authenticated = recvbuf[3];
1560
1561
0
  r = 0;
1562
  /* fall-through */
1563
1564
0
err:
1565
0
  sc_pkcs15emu_sc_hsm_free_cvc_pka(&pka);
1566
0
  return r;
1567
0
}
1568
1569
1570
1571
static int sc_hsm_public_key_auth_status(sc_card_t *card,
1572
  sc_cardctl_sc_hsm_pka_status_t *status)
1573
0
{
1574
0
  u8 recvbuf[4];
1575
0
  sc_context_t *ctx = card->ctx;
1576
0
  sc_apdu_t apdu;
1577
0
  int r;
1578
1579
0
  LOG_FUNC_CALLED(card->ctx);
1580
1581
  /* get status */
1582
0
  sc_format_apdu_ex(&apdu, 0x00, 0x54, 0x00, 0x00, NULL, 0, recvbuf, sizeof recvbuf);
1583
0
  apdu.cla = 0x80;
1584
1585
0
  r = sc_transmit_apdu(card, &apdu);
1586
0
  LOG_TEST_RET(ctx, r, "APDU transmit failed");
1587
1588
0
  r = sc_check_sw(card, apdu.sw1, apdu.sw2);
1589
0
  LOG_TEST_RET(ctx, r, "Check SW error");
1590
1591
0
  status->num_total = recvbuf[0];
1592
0
  status->num_missing = recvbuf[1];
1593
0
  status->num_required = recvbuf[2];
1594
0
  status->num_authenticated = recvbuf[3];
1595
1596
0
  LOG_FUNC_RETURN(card->ctx, SC_SUCCESS);
1597
0
}
1598
1599
1600
1601
static int sc_hsm_init_token(sc_card_t *card, sc_cardctl_pkcs11_init_token_t *params)
1602
0
{
1603
0
  sc_context_t *ctx = card->ctx;
1604
0
  sc_cardctl_sc_hsm_init_param_t ip;
1605
0
  int r;
1606
0
  char label[33],*cpo;
1607
1608
0
  LOG_FUNC_CALLED(ctx);
1609
1610
0
  if (params->so_pin_len != 16) {
1611
0
    LOG_TEST_RET(ctx, SC_ERROR_INVALID_DATA, "SO PIN wrong length (!=16)");
1612
0
  }
1613
1614
0
  memset(&ip, 0, sizeof(ip));
1615
0
  ip.dkek_shares = -1;
1616
0
  ip.options[0] = 0x00;
1617
0
  ip.options[1] = 0x01;
1618
1619
0
  r = sc_hsm_encode_sopin(params->so_pin, ip.init_code);
1620
0
  LOG_TEST_RET(ctx, r, "SO PIN wrong format");
1621
1622
0
  ip.user_pin = ip.init_code;   // Use the first 6 bytes of the SO-PIN as initial User-PIN value
1623
0
  ip.user_pin_len = 6;
1624
0
  ip.user_pin_retry_counter = 3;
1625
1626
0
  if (params->label) {
1627
    // Strip trailing spaces
1628
0
    memcpy(label, params->label, 32);
1629
0
    label[32] = 0;
1630
0
    cpo = label + 31;
1631
0
    while ((cpo >= label) && (*cpo == ' ')) {
1632
0
      *cpo = 0;
1633
0
      cpo--;
1634
0
    }
1635
0
    ip.label = label;
1636
0
  }
1637
1638
0
  r = sc_hsm_initialize(card, &ip);
1639
0
  LOG_TEST_RET(ctx, r, "Check SW error");
1640
1641
0
  LOG_FUNC_RETURN(ctx, SC_SUCCESS);
1642
0
}
1643
1644
1645
1646
static int sc_hsm_init_pin(sc_card_t *card, sc_cardctl_pkcs11_init_pin_t *params)
1647
10
{
1648
10
  sc_hsm_private_data_t *priv = (sc_hsm_private_data_t *) card->drv_data;
1649
10
  sc_context_t *ctx = card->ctx;
1650
10
  int r;
1651
10
  sc_apdu_t apdu;
1652
10
  u8 ibuff[50], *p;
1653
1654
10
  LOG_FUNC_CALLED(card->ctx);
1655
1656
10
  if (params->pin_len > 16) {
1657
1
    LOG_TEST_RET(card->ctx, SC_ERROR_INVALID_DATA, "User PIN too long");
1658
1
  }
1659
1660
9
  p = ibuff;
1661
1662
9
  memcpy(p, priv->sopin, sizeof(priv->sopin));
1663
9
  p += sizeof(priv->sopin);
1664
1665
9
  memcpy(p, params->pin, params->pin_len);
1666
9
  p += params->pin_len;
1667
1668
9
  sc_format_apdu(card, &apdu, SC_APDU_CASE_3_SHORT, 0x2C, 0x00, 0x81);
1669
9
  apdu.data = ibuff;
1670
9
  apdu.datalen = p - ibuff;
1671
9
  apdu.lc = apdu.datalen;
1672
1673
9
  r = sc_transmit_apdu(card, &apdu);
1674
9
  LOG_TEST_RET(ctx, r, "APDU transmit failed");
1675
1676
8
  r =  sc_check_sw(card, apdu.sw1, apdu.sw2);
1677
1678
  // Cards before version 1.0 do not implement RESET_RETRY_COUNTER
1679
  // For those cards the CHANGE REFERENCE DATA command is used instead
1680
8
  if (r == SC_ERROR_INS_NOT_SUPPORTED) {
1681
3
    p = ibuff;
1682
3
    memcpy(p, priv->sopin, 6);
1683
3
    p += 6;
1684
1685
3
    memcpy(p, params->pin, params->pin_len);
1686
3
    p += params->pin_len;
1687
1688
3
    sc_format_apdu(card, &apdu, SC_APDU_CASE_3_SHORT, 0x24, 0x00, 0x81);
1689
3
    apdu.data = ibuff;
1690
3
    apdu.datalen = p - ibuff;
1691
3
    apdu.lc = apdu.datalen;
1692
1693
3
    r = sc_transmit_apdu(card, &apdu);
1694
3
    LOG_TEST_RET(ctx, r, "APDU transmit failed");
1695
1696
2
    r =  sc_check_sw(card, apdu.sw1, apdu.sw2);
1697
2
  }
1698
1699
7
  LOG_TEST_RET(ctx, r, "Check SW error");
1700
1701
1
  memset(priv->sopin, 0, sizeof(priv->sopin));
1702
1703
1
  LOG_FUNC_RETURN(card->ctx, SC_SUCCESS);
1704
1
}
1705
1706
1707
1708
static int sc_hsm_generate_keypair(sc_card_t *card, sc_cardctl_sc_hsm_keygen_info_t *keyinfo)
1709
676
{
1710
676
  u8 rbuf[1200];
1711
676
  int r;
1712
676
  sc_apdu_t apdu;
1713
1714
676
  LOG_FUNC_CALLED(card->ctx);
1715
1716
676
  sc_format_apdu(card, &apdu, SC_APDU_CASE_4_EXT, 0x46, keyinfo->key_id, keyinfo->auth_key_id);
1717
676
  apdu.cla = 0x00;
1718
676
  apdu.resp = rbuf;
1719
676
  apdu.resplen = sizeof(rbuf);
1720
676
  apdu.le = 0;
1721
1722
676
  apdu.data = keyinfo->gakprequest;
1723
676
  apdu.lc = keyinfo->gakprequest_len;
1724
676
  apdu.datalen = keyinfo->gakprequest_len;
1725
1726
676
  r = sc_transmit_apdu(card, &apdu);
1727
676
  LOG_TEST_RET(card->ctx, r, "APDU transmit failed");
1728
1729
673
  r =  sc_check_sw(card, apdu.sw1, apdu.sw2);
1730
673
  LOG_TEST_RET(card->ctx, r, "Check SW error");
1731
1732
33
  keyinfo->gakpresponse_len = apdu.resplen;
1733
33
  keyinfo->gakpresponse = malloc(apdu.resplen);
1734
1735
33
  if (keyinfo->gakpresponse == NULL) {
1736
0
    LOG_FUNC_RETURN(card->ctx, SC_ERROR_OUT_OF_MEMORY);
1737
0
  }
1738
1739
33
  memcpy(keyinfo->gakpresponse, apdu.resp, apdu.resplen);
1740
1741
33
  LOG_FUNC_RETURN(card->ctx, SC_SUCCESS);
1742
33
}
1743
1744
1745
1746
static int sc_hsm_card_ctl(sc_card_t *card, unsigned long cmd, void *ptr)
1747
1.87k
{
1748
1.87k
  switch (cmd) {
1749
400
  case SC_CARDCTL_GET_SERIALNR:
1750
400
    return sc_hsm_get_serialnr(card, (sc_serial_number_t *)ptr);
1751
0
  case SC_CARDCTL_PKCS11_INIT_TOKEN:
1752
0
    return sc_hsm_init_token(card, (sc_cardctl_pkcs11_init_token_t *)ptr);
1753
10
  case SC_CARDCTL_PKCS11_INIT_PIN:
1754
10
    return sc_hsm_init_pin(card, (sc_cardctl_pkcs11_init_pin_t *)ptr);
1755
676
  case SC_CARDCTL_SC_HSM_GENERATE_KEY:
1756
676
    return sc_hsm_generate_keypair(card, (sc_cardctl_sc_hsm_keygen_info_t *)ptr);
1757
0
  case SC_CARDCTL_SC_HSM_INITIALIZE:
1758
0
    return sc_hsm_initialize(card, (sc_cardctl_sc_hsm_init_param_t *)ptr);
1759
0
  case SC_CARDCTL_SC_HSM_IMPORT_DKEK_SHARE:
1760
0
    return sc_hsm_import_dkek_share(card, (sc_cardctl_sc_hsm_dkek_t *)ptr);
1761
0
  case SC_CARDCTL_SC_HSM_WRAP_KEY:
1762
0
    return sc_hsm_wrap_key(card, (sc_cardctl_sc_hsm_wrapped_key_t *)ptr);
1763
0
  case SC_CARDCTL_SC_HSM_UNWRAP_KEY:
1764
0
    return sc_hsm_unwrap_key(card, (sc_cardctl_sc_hsm_wrapped_key_t *)ptr);
1765
0
  case SC_CARDCTL_SC_HSM_REGISTER_PUBLIC_KEY:
1766
0
    return sc_hsm_register_public_key(card, ptr);
1767
0
  case SC_CARDCTL_SC_HSM_PUBLIC_KEY_AUTH_STATUS:
1768
0
    return sc_hsm_public_key_auth_status(card, ptr);
1769
1.87k
  }
1770
787
  return SC_ERROR_NOT_SUPPORTED;
1771
1.87k
}
1772
1773
1774
1775
static int sc_hsm_init(struct sc_card *card)
1776
1.90k
{
1777
#if defined(ENABLE_SM) && defined(ENABLE_OPENPACE) && defined(_WIN32)
1778
  char expanded_val[PATH_MAX];
1779
  size_t expanded_len = PATH_MAX;
1780
#endif
1781
1.90k
  int flags,ext_flags;
1782
1.90k
  sc_file_t *file = NULL;
1783
1.90k
  sc_path_t path;
1784
1.90k
  sc_hsm_private_data_t *priv = NULL;
1785
1786
1.90k
  LOG_FUNC_CALLED(card->ctx);
1787
1788
1.90k
  flags = SC_ALGORITHM_RSA_RAW|SC_ALGORITHM_RSA_PAD_PSS|SC_ALGORITHM_ONBOARD_KEY_GEN
1789
1.90k
      |SC_ALGORITHM_RSA_HASH_SHA1|SC_ALGORITHM_RSA_HASH_SHA256|SC_ALGORITHM_RSA_HASH_SHA384|SC_ALGORITHM_RSA_HASH_SHA512
1790
1.90k
      |SC_ALGORITHM_MGF1_SHA256|SC_ALGORITHM_MGF1_SHA384|SC_ALGORITHM_MGF1_SHA512;
1791
1792
1.90k
  _sc_card_add_rsa_alg(card, 1024, flags, 0);
1793
1.90k
  _sc_card_add_rsa_alg(card, 1536, flags, 0);
1794
1.90k
  _sc_card_add_rsa_alg(card, 2048, flags, 0);
1795
1.90k
  _sc_card_add_rsa_alg(card, 3072, flags, 0);
1796
1.90k
  _sc_card_add_rsa_alg(card, 4096, flags, 0);
1797
1798
1.90k
  flags = SC_ALGORITHM_ECDSA_RAW|
1799
1.90k
    SC_ALGORITHM_ECDH_CDH_RAW|
1800
1.90k
    SC_ALGORITHM_ECDSA_HASH_NONE|
1801
1.90k
    SC_ALGORITHM_ECDSA_HASH_SHA1|
1802
1.90k
    SC_ALGORITHM_ECDSA_HASH_SHA224|
1803
1.90k
    SC_ALGORITHM_ECDSA_HASH_SHA256|
1804
1.90k
    SC_ALGORITHM_ECDSA_HASH_SHA384|
1805
1.90k
    SC_ALGORITHM_ECDSA_HASH_SHA512|
1806
1.90k
    SC_ALGORITHM_ONBOARD_KEY_GEN;
1807
1808
1.90k
  ext_flags = SC_ALGORITHM_EXT_EC_F_P|
1809
1.90k
      SC_ALGORITHM_EXT_EC_ECPARAMETERS|
1810
1.90k
      SC_ALGORITHM_EXT_EC_NAMEDCURVE|
1811
1.90k
      SC_ALGORITHM_EXT_EC_UNCOMPRESES|
1812
1.90k
      SC_ALGORITHM_ONBOARD_KEY_GEN;
1813
1.90k
  _sc_card_add_ec_alg(card, 192, flags, ext_flags, NULL);
1814
1.90k
  _sc_card_add_ec_alg(card, 224, flags, ext_flags, NULL);
1815
1.90k
  _sc_card_add_ec_alg(card, 256, flags, ext_flags, NULL);
1816
1.90k
  _sc_card_add_ec_alg(card, 320, flags, ext_flags, NULL);
1817
1.90k
  _sc_card_add_ec_alg(card, 384, flags, ext_flags, NULL);
1818
1.90k
  _sc_card_add_ec_alg(card, 512, flags, ext_flags, NULL);
1819
1.90k
  _sc_card_add_ec_alg(card, 521, flags, ext_flags, NULL);
1820
1821
1.90k
  card->caps |= SC_CARD_CAP_RNG|SC_CARD_CAP_APDU_EXT|SC_CARD_CAP_ISO7816_PIN_INFO;
1822
1823
  // APDU Buffer limits
1824
  //   JCOP 2.4.1r3           1462
1825
  //   JCOP 2.4.2r3           1454
1826
  //   JCOP 3                 1232
1827
  //   MicroSD with JCOP 3    478 / 506 - handled in reader-pcsc.c
1828
  //   Reiner SCT             1014 - handled in reader-pcsc.c
1829
1830
  // Use JCOP 3 card limits for sending
1831
1.90k
  card->max_send_size = 1232;
1832
  // Assume that card supports sending with extended length APDU and without limit
1833
1.90k
  card->max_recv_size = 0;
1834
1835
1.90k
  if (card->type == SC_CARD_TYPE_SC_HSM_SOC
1836
1.90k
      || card->type == SC_CARD_TYPE_SC_HSM_GOID) {
1837
1.87k
    card->max_recv_size = 0x0630; // SoC Proxy forces this limit
1838
1.87k
  } else {
1839
    // Adjust to the limits set by the reader
1840
23
    if (card->reader->max_send_size < card->max_send_size) {
1841
23
      if (18 >= card->reader->max_send_size)
1842
23
        LOG_FUNC_RETURN(card->ctx, SC_ERROR_INCONSISTENT_CONFIGURATION);
1843
1844
      // 17 byte header and TLV because of odd ins in UPDATE BINARY
1845
0
      card->max_send_size = card->reader->max_send_size - 17;
1846
0
    }
1847
1848
0
    if (0 < card->reader->max_recv_size) {
1849
0
      if (3 >= card->reader->max_recv_size)
1850
0
        LOG_FUNC_RETURN(card->ctx, SC_ERROR_INCONSISTENT_CONFIGURATION);
1851
0
      card->max_recv_size = card->reader->max_recv_size - 2;
1852
0
    }
1853
0
  }
1854
1855
1.87k
  priv = card->drv_data;
1856
1.87k
  if (!priv) {
1857
1.87k
    priv = calloc(1, sizeof(sc_hsm_private_data_t));
1858
1.87k
    if (!priv)
1859
1.87k
      LOG_FUNC_RETURN(card->ctx, SC_ERROR_OUT_OF_MEMORY);
1860
1.87k
    card->drv_data = priv;
1861
1.87k
  }
1862
1863
1.87k
  sc_path_set(&path, SC_PATH_TYPE_DF_NAME, sc_hsm_aid.value, sc_hsm_aid.len, 0, 0);
1864
1.87k
  if (sc_hsm_select_file_ex(card, &path, 0, &file) == SC_SUCCESS
1865
1.87k
      && file && file->prop_attr && file->prop_attr_len >= 2) {
1866
30
    static char card_name[SC_MAX_APDU_BUFFER_SIZE];
1867
30
    u8 type = 0xFF;
1868
30
    u8 major = file->prop_attr[file->prop_attr_len - 2];
1869
30
    u8 minor = file->prop_attr[file->prop_attr_len - 1];
1870
30
    char p00[] = "SmartCard-HSM Applet for JCOP";
1871
30
    char p01[] = "SmartCard-HSM Demo Applet for JCOP";
1872
30
    char *p = "SmartCard-HSM";
1873
30
    if (file->prop_attr_len >= 3) {
1874
19
      type = file->prop_attr[file->prop_attr_len - 3];
1875
19
    }
1876
30
    switch (type) {
1877
8
      case 0x00:
1878
8
        p = p00;
1879
8
        break;
1880
7
      case 0x01:
1881
7
        p = p01;
1882
7
        break;
1883
15
      default:
1884
15
        break;
1885
30
    }
1886
30
    snprintf(card_name, sizeof card_name, "%s version %u.%u", p, major, minor);
1887
30
    card->name = card_name;
1888
1889
30
    if (file->prop_attr[1] & 0x04) {
1890
14
      card->caps |= SC_CARD_CAP_SESSION_PIN;
1891
14
    }
1892
30
  }
1893
1.87k
  sc_file_free(file);
1894
1895
1.87k
  priv->EF_C_DevAut = NULL;
1896
1.87k
  priv->EF_C_DevAut_len = 0;
1897
1898
#if defined(ENABLE_SM) && defined(ENABLE_OPENPACE)
1899
  EAC_init();
1900
#ifdef _WIN32
1901
  expanded_len = ExpandEnvironmentStringsA(CVCDIR, expanded_val, sizeof expanded_val);
1902
  if (0 < expanded_len && expanded_len < sizeof expanded_val)
1903
    EAC_set_cvc_default_dir(expanded_val);
1904
#else
1905
  EAC_set_cvc_default_dir(CVCDIR);
1906
#endif
1907
#endif
1908
1909
1.87k
  return 0;
1910
1.87k
}
1911
1912
1913
1914
static int sc_hsm_finish(sc_card_t * card)
1915
1.87k
{
1916
1.87k
  sc_hsm_private_data_t *priv = (sc_hsm_private_data_t *) card->drv_data;
1917
1.87k
#ifdef ENABLE_SM
1918
1.87k
  sc_sm_stop(card);
1919
1.87k
#endif
1920
1.87k
  if (priv) {
1921
1.87k
    free(priv->serialno);
1922
1.87k
    sc_file_free(priv->dffcp);
1923
1.87k
    free(priv->EF_C_DevAut);
1924
1.87k
  }
1925
1.87k
  free(priv);
1926
1927
1.87k
  return SC_SUCCESS;
1928
1.87k
}
1929
1930
1931
1932
static struct sc_card_driver * sc_get_driver(void)
1933
99.7k
{
1934
99.7k
  struct sc_card_driver *iso_drv = sc_get_iso7816_driver();
1935
1936
99.7k
  if (iso_ops == NULL)
1937
10
    iso_ops = iso_drv->ops;
1938
1939
99.7k
  sc_hsm_ops                   = *iso_drv->ops;
1940
99.7k
  sc_hsm_ops.match_card        = sc_hsm_match_card;
1941
99.7k
  sc_hsm_ops.select_file       = sc_hsm_select_file;
1942
99.7k
  sc_hsm_ops.get_challenge     = sc_hsm_get_challenge;
1943
99.7k
  sc_hsm_ops.read_binary       = sc_hsm_read_binary;
1944
99.7k
  sc_hsm_ops.update_binary     = sc_hsm_update_binary;
1945
99.7k
  sc_hsm_ops.list_files        = sc_hsm_list_files;
1946
99.7k
  sc_hsm_ops.create_file       = sc_hsm_create_file;
1947
99.7k
  sc_hsm_ops.delete_file       = sc_hsm_delete_file;
1948
99.7k
  sc_hsm_ops.set_security_env  = sc_hsm_set_security_env;
1949
99.7k
  sc_hsm_ops.compute_signature = sc_hsm_compute_signature;
1950
99.7k
  sc_hsm_ops.decipher          = sc_hsm_decipher;
1951
99.7k
  sc_hsm_ops.init              = sc_hsm_init;
1952
99.7k
  sc_hsm_ops.finish            = sc_hsm_finish;
1953
99.7k
  sc_hsm_ops.card_ctl          = sc_hsm_card_ctl;
1954
99.7k
  sc_hsm_ops.pin_cmd           = sc_hsm_pin_cmd;
1955
99.7k
  sc_hsm_ops.logout            = sc_hsm_logout;
1956
1957
  /* no record oriented file services */
1958
99.7k
  sc_hsm_ops.read_record       = NULL;
1959
99.7k
  sc_hsm_ops.write_record      = NULL;
1960
99.7k
  sc_hsm_ops.append_record     = NULL;
1961
99.7k
  sc_hsm_ops.update_record     = NULL;
1962
1963
99.7k
  return &sc_hsm_drv;
1964
99.7k
}
1965
1966
1967
1968
struct sc_card_driver * sc_get_sc_hsm_driver(void)
1969
99.7k
{
1970
99.7k
  return sc_get_driver();
1971
99.7k
}
1972