/*
* rpc_server.c
* ------------
* Remote procedure call server-side private API implementation.
*
* Copyright (c) 2016, NORDUnet A/S All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions are
* met:
* - Redistributions of source code must retain the above copyright notice,
* this list of conditions and the following disclaimer.
*
* - Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
*
* - Neither the name of the NORDUnet nor the names of its contributors may
* be used to endorse or promote products derived from this software
* without specific prior written permission.
*
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS
* IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
* TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
* PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
* HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED
* TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
* PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
* LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
* NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
* SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*/
#include "hal.h"
#include "hal_internal.h"
#include "xdr_internal.h"
/*
* RPC calls.
*/
#define check(op) do { hal_error_t _err = (op); if (_err != HAL_OK) return _err; } while (0)
#define pad(n) (((n) + 3) & ~3)
static hal_error_t get_version(const uint8_t **iptr, const uint8_t * const ilimit,
uint8_t **optr, const uint8_t * const olimit)
{
hal_client_handle_t client __attribute__((unused));
uint32_t version;
hal_error_t ret;
check(hal_xdr_decode_int(iptr, ilimit, &client.handle));
/* call the local function */
ret = hal_rpc_local_misc_dispatch.get_version(&version);
if (ret == HAL_OK)
check(hal_xdr_encode_int(optr, olimit, version));
return ret;
}
static hal_error_t get_random(const uint8_t **iptr, const uint8_t * const ilimit,
uint8_t **optr, const uint8_t * const olimit)
{
hal_client_handle_t client __attribute__((unused));
uint32_t length;
hal_error_t ret;
check(hal_xdr_decode_int(iptr, ilimit, &client.handle));
check(hal_xdr_decode_int(iptr, ilimit, &length));
/* sanity check length */
if (length == 0 || length > olimit - *optr - 4)
return HAL_ERROR_RPC_PACKET_OVERFLOW;
/* call the local function */
/* get the data directly into the output buffer */
check(hal_xdr_encode_int(optr, olimit, length));
ret = hal_rpc_local_misc_dispatch.get_random(*optr, (size_t)length);
if (ret == HAL_OK)
*optr += pad(length);
else
/* don't return data if error */
*optr -= 4;
return ret;
}
static hal_error_t set_pin(const uint8_t **iptr, const uint8_t * const ilimit,
uint8_t **optr, const uint8_t * const olimit)
{
hal_client_handle_t client;
uint32_t user;
const uint8_t *pin;
uint32_t pin_len;
hal_error_t ret;
check(hal_xdr_decode_int(iptr, ilimit, &client.handle));
check(hal_xdr_decode_int(iptr, ilimit, &user));
check(hal_xdr_decode_buffer_in_place(iptr, ilimit, &pin, &pin_len));
/* call the local function */
ret = hal_rpc_local_misc_dispatch.set_pin(client, user, (const char * const)pin, pin_len);
return ret;
}
static hal_error_t login(const uint8_t **iptr, const uint8_t * const ilimit,
uint8_t **optr, const uint8_t * const olimit)
{
hal_client_handle_t client;
uint32_t user;
const uint8_t *pin;
uint32_t pin_len;
hal_error_t ret;
check(hal_xdr_decode_int(iptr, ilimit, &client.handle));
check(hal_xdr_decode_int(iptr, ilimit, &user));
check(hal_xdr_decode_buffer_in_place(iptr, ilimit, &pin, &pin_len));
/* call the local function */
ret = hal_rpc_local_misc_dispatch.login(client, user, (const char * const)pin, pin_len);
return ret;
}
static hal_error_t logout(const uint8_t **iptr, const uint8_t * const ilimit,
uint8_t **optr, const uint8_t * const olimit)
{
hal_client_handle_t client;
hal_error_t ret;
check(hal_xdr_decode_int(iptr, ilimit, &client.handle));
/* call the local function */
ret = hal_rpc_local_misc_dispatch.logout(client);
return ret;
}
static hal_error_t logout_all(const uint8_t **iptr, const uint8_t * const ilimit,
uint8_t **optr, const uint8_t * const olimit)
{
hal_client_handle_t client __attribute__((unused));
hal_error_t ret;
check(hal_xdr_decode_int(iptr, ilimit, &client.handle));
/* call the local function */
ret = hal_rpc_local_misc_dispatch.logout_all();
return ret;
}
static hal_error_t is_logged_in(const uint8_t **iptr, const uint8_t * const ilimit,
uint8_t **optr, const uint8_t * const olimit)
{
hal_client_handle_t client;
uint32_t user;
hal_error_t ret;
check(hal_xdr_decode_int(iptr, ilimit, &client.handle));
check(hal_xdr_decode_int(iptr, ilimit, &user));
/* call the local function */
ret = hal_rpc_local_misc_dispatch.is_logged_in(client, user);
return ret;
}
static hal_error_t hash_get_digest_len(const uint8_t **iptr, const uint8_t * const ilimit,
uint8_t **optr, const uint8_t * const olimit)
{
hal_client_handle_t client __attribute__((unused));
uint32_t alg;
size_t length;
hal_error_t ret;
check(hal_xdr_decode_int(iptr, ilimit, &client.handle));
check(hal_xdr_decode_int(iptr, ilimit, &alg));
/* call the local function */
ret = hal_rpc_local_hash_dispatch.get_digest_length(alg, &length);
if (ret == HAL_OK)
check(hal_xdr_encode_int(optr, olimit, length));
return ret;
}
static hal_error_t hash_get_digest_algorithm_id(const uint8_t **iptr, const uint8_t * const ilimit,
uint8_t **optr, const uint8_t * const olimit)
{
hal_client_handle_t client __attribute__((unused));
uint32_t alg;
size_t len;
uint32_t len_max;
uint8_t *optr_orig = *optr;
hal_error_t ret;
check(hal_xdr_decode_int(iptr, ilimit, &client.handle));
check(hal_xdr_decode_int(iptr, ilimit, &alg));
check(hal_xdr_decode_int(iptr, ilimit, &len_max));
/* sanity check len_max */
if (len_max > olimit - *optr - 4)
return HAL_ERROR_RPC_PACKET_OVERFLOW;
/* call the local function */
/* get the data directly into the output buffer */
*optr += 4; /* reserve 4 bytes for length */
ret = hal_rpc_local_hash_dispatch.get_digest_algorithm_id(alg, *optr, &len, (size_t)len_max);
if (ret == HAL_OK) {
*optr = optr_orig;
check(hal_xdr_encode_int(optr, olimit, len));
*optr += pad(len);
}
else {
/* don't return data if error */
*optr = optr_orig;
}
return ret;
}
static hal_error_t hash_get_algorithm(const uint8_t **iptr, const uint8_t * const ilimit,
uint8_t **optr, const uint8_t * const olimit)
{
hal_client_handle_t client __attribute__((unused));
hal_hash_handle_t hash;
hal_digest_algorithm_t alg;
hal_error_t ret;
check(hal_xdr_decode_int(iptr, ilimit, &client.handle));
check(hal_xdr_decode_int(iptr, ilimit, &hash.handle));
/* call the local function */
ret = hal_rpc_local_hash_dispatch.get_algorithm(hash, &alg);
if (ret == HAL_OK)
check(hal_xdr_encode_int(optr, olimit, alg));
return ret;
}
static hal_error_t hash_initialize(const uint8_t **iptr, const uint8_t * const ilimit,
uint8_t **optr, const uint8_t * const olimit)
{
hal_client_handle_t client;
hal_session_handle_t session;
hal_hash_handle_t hash;
uint32_t alg;
const uint8_t *key;
uint32_t key_len;
hal_error_t ret;
check(hal_xdr_decode_int(iptr, ilimit, &client.handle));
check(hal_xdr_decode_int(iptr, ilimit, &session.handle));
check(hal_xdr_decode_int(iptr, ilimit, &alg));
check(hal_xdr_decode_buffer_in_place(iptr, ilimit, &key, &key_len));
/* call the local function */
ret = hal_rpc_local_hash_dispatch.initialize(client, session, &hash, (hal_digest_algorithm_t)alg, key, (size_t)key_len);
if (ret == HAL_OK)
check(hal_xdr_encode_int(optr, olimit, hash.handle));
return ret;
}
static hal_error_t hash_update(const uint8_t **iptr, const uint8_t * const ilimit,
uint8_t **optr, const uint8_t * const olimit)
{
hal_client_handle_t client __attribute__((unused));
hal_hash_handle_t hash;
const uint8_t *data;
uint32_t length;
hal_error_t ret;
check(hal_xdr_decode_int(iptr, ilimit, &client.handle));
check(hal_xdr_decode_int(iptr, ilimit, &hash.handle));
check(hal_xdr_decode_buffer_in_place(iptr, ilimit, &data, &length));
/* call the local function */
ret = hal_rpc_local_hash_dispatch.update(hash, data, (size_t)length);
return ret;
}
static hal_error_t hash_finalize(const uint8_t **iptr, const uint8_t * const ilimit,
uint8_t **optr, const uint8_t * const olimit)
{
hal_client_handle_t client __attribute__((unused));
hal_hash_handle_t hash;
uint32_t length;
hal_error_t ret;
check(hal_xdr_decode_int(iptr, ilimit, &client.handle));
check(hal_xdr_decode_int(iptr, ilimit, &hash.handle));
check(hal_xdr_decode_int(iptr, ilimit, &length));
/* sanity check length */
if (length == 0 || length > olimit - *optr - 4)
return HAL_ERROR_RPC_PACKET_OVERFLOW;
/* call the local function */
/* get the data directly into the output buffer */
check(hal_xdr_encode_int(optr, olimit, length));
ret = hal_rpc_local_hash_dispatch.finalize(hash, *optr, (size_t)length);
if (ret == HAL_OK)
*optr += pad(length);
else
/* don't return data if error */
*optr -= 4;
return ret;
}
static hal_error_t pkey_load(const uint8_t **iptr, const uint8_t * const ilimit,
uint8_t **optr, const uint8_t * const olimit)
{
hal_client_handle_t client;
hal_session_handle_t session;
hal_pkey_handle_t pkey;
uint32_t type;
uint32_t curve;
hal_uuid_t name;
const uint8_t *der;
uint32_t der_len;
hal_key_flags_t flags;
hal_error_t ret;
check(hal_xdr_decode_int(iptr, ilimit, &client.handle));
check(hal_xdr_decode_int(iptr, ilimit, &session.handle));
check(hal_xdr_decode_int(iptr, ilimit, &type));
check(hal_xdr_decode_int(iptr, ilimit, &curve));
check(hal_xdr_decode_buffer_in_place(iptr, ilimit, &der, &der_len));
check(hal_xdr_decode_int(iptr, ilimit, &flags));
/* call the local function */
ret = hal_rpc_local_pkey_dispatch.load(client, session, &pkey, type, curve, &name, der, der_len, flags);
if (ret == HAL_OK) {
uint8_t *optr_orig = *optr;
if ((ret = hal_xdr_encode_int(optr, olimit, pkey.handle)) != HAL_OK ||
(ret = hal_xdr_encode_buffer(optr, olimit, name.uuid, sizeof(name.uuid))) != HAL_OK)
*optr = optr_orig;
}
return ret;
}
static hal_error_t pkey_find(const uint8_t **iptr, const uint8_t * const ilimit,
uint8_t **optr, const uint8_t * const olimit)
{
hal_client_handle_t client;
hal_session_handle_t session;
hal_pkey_handle_t pkey;
const uint8_t *name_ptr;
uint32_t name_len;
hal_key_flags_t flags;
hal_error_t ret;
check(hal_xdr_decode_int(iptr, ilimit, &client.handle));
check(hal_xdr_decode_int(iptr, ilimit, &session.handle));
check(hal_xdr_decode_buffer_in_place(iptr, ilimit, &name_ptr, &name_len));
check(hal_xdr_decode_int(iptr, ilimit, &flags));
if (name_len != sizeof(hal_uuid_t))
return HAL_ERROR_KEY_NAME_TOO_LONG;
/* call the local function */
ret = hal_rpc_local_pkey_dispatch.find(client, session, &pkey, (const hal_uuid_t *) name_ptr, flags);
if (ret == HAL_OK)
check(hal_xdr_encode_int(optr, olimit, pkey.handle));
return ret;
}
static hal_error_t pkey_generate_rsa(const uint8_t **iptr, const uint8_t * const ilimit,
uint8_t **optr, const uint8_t * const olimit)
{
hal_client_handle_t client;
hal_session_handle_t session;
hal_pkey_handle_t pkey;
hal_uuid_t name;
uint32_t key_len;
const uint8_t *exp;
uint32_t exp_len;
hal_key_flags_t flags;
hal_error_t ret;
check(hal_xdr_decode_int(iptr, ilimit, &client.handle));
check(hal_xdr_decode_int(iptr, ilimit, &session.handle));
check(hal_xdr_decode_int(iptr, ilimit, &key_len));
check(hal_xdr_decode_buffer_in_place(iptr, ilimit, &exp, &exp_len));
check(hal_xdr_decode_int(iptr, ilimit, &flags));
/* call the local function */
ret = hal_rpc_local_pkey_dispatch.generate_rsa(client, session, &pkey, &name, key_len, exp, exp_len, flags);
if (ret == HAL_OK) {
uint8_t *optr_orig = *optr;
if ((ret = hal_xdr_encode_int(optr, olimit, pkey.handle)) != HAL_OK ||
(ret = hal_xdr_encode_buffer(optr, olimit, name.uuid, sizeof(name.uuid))) != HAL_OK)
*optr = optr_orig;
}
return ret;
}
static hal_error_t pkey_generate_ec(const uint8_t **iptr, const uint8_t * const ilimit,
uint8_t **optr, const uint8_t * const olimit)
{
hal_client_handle_t client;
hal_session_handle_t session;
hal_pkey_handle_t pkey;
hal_uuid_t name;
uint32_t curve;
hal_key_flags_t flags;
hal_error_t ret;
check(hal_xdr_decode_int(iptr, ilimit, &client.handle));
check(hal_xdr_decode_int(iptr, ilimit, &session.handle));
check(hal_xdr_decode_int(iptr, ilimit, &curve));
check(hal_xdr_decode_int(iptr, ilimit, &flags));
/* call the local function */
ret = hal_rpc_local_pkey_dispatch.generate_ec(client, session, &pkey, &name, curve, flags);
if (ret == HAL_OK) {
uint8_t *optr_orig = *optr;
if ((ret = hal_xdr_encode_int(optr, olimit, pkey.handle)) != HAL_OK ||
(ret = hal_xdr_encode_buffer(optr, olimit, name.uuid, sizeof(name.uuid))) != HAL_OK)
*optr = optr_orig;
}
return ret;
}
static hal_error_t pkey_close(const uint8_t **iptr, const uint8_t * const ilimit,
uint8_t **optr, const uint8_t * const olimit)
{
hal_client_handle_t client __attribute__((unused));
hal_pkey_handle_t pkey;
hal_error_t ret;
check(hal_xdr_decode_int(iptr, ilimit, &client.handle));
check(hal_xdr_decode_int(iptr, ilimit, &pkey.handle));
/* call the local function */
ret = hal_rpc_local_pkey_dispatch.close(pkey);
return ret;
}
static hal_error_t pkey_delete(const uint8_t **iptr, const uint8_t * const ilimit,
uint8_t **optr, const uint8_t * const olimit)
{
hal_client_handle_t client __attribute__((unused));
hal_pkey_handle_t pkey;
hal_error_t ret;
check(hal_xdr_decode_int(iptr, ilimit, &client.handle));
check(hal_xdr_decode_int(iptr, ilimit, &pkey.handle));
/* call the local function */
ret = hal_rpc_local_pkey_dispatch.delete(pkey);
return ret;
}
static hal_error_t pkey_get_key_type(const uint8_t **iptr, const uint8_t * const ilimit,
uint8_t **optr, const uint8_t * const olimit)
{
hal_client_handle_t client __attribute__((unused));
hal_pkey_handle_t pkey;
hal_key_type_t type;
hal_error_t ret;
check(hal_xdr_decode_int(iptr, ilimit, &client.handle));
check(hal_xdr_decode_int(iptr, ilimit, &pkey.handle));
/* call the local function */
ret = hal_rpc_local_pkey_dispatch.get_key_type(pkey, &type);
if (ret == HAL_OK)
check(hal_xdr_encode_int(optr, olimit, type));
return ret;
}
static hal_error_t pkey_get_key_flags(const uint8_t **iptr, const uint8_t * const ilimit,
uint8_t **optr, const uint8_t * const olimit)
{
hal_client_handle_t client __attribute__((unused));
hal_pkey_handle_t pkey;
hal_key_flags_t flags;
hal_error_t ret;
check(hal_xdr_decode_int(iptr, ilimit, &client.handle));
check(hal_xdr_decode_int(iptr, ilimit, &pkey.handle));
/* call the local function */
ret = hal_rpc_local_pkey_dispatch.get_key_flags(pkey, &flags);
if (ret == HAL_OK)
check(hal_xdr_encode_int(optr, olimit, flags));
return ret;
}
static hal_error_t pkey_get_public_key_len(const uint8_t **iptr, const uint8_t * const ilimit,
uint8_t **optr, const uint8_t * const olimit)
{
hal_client_handle_t client __attribute__((unused));
hal_pkey_handle_t pkey;
size_t len;
check(hal_xdr_decode_int(iptr, ilimit, &client.handle));
check(hal_xdr_decode_int(iptr, ilimit, &pkey.handle));
/* call the local function */
len = hal_rpc_local_pkey_dispatch.get_public_key_len(pkey);
check(hal_xdr_encode_int(optr, olimit, len));
return HAL_OK;
}
static hal_error_t pkey_get_public_key(const uint8_t **iptr, const uint8_t * const ilimit,
uint8_t **optr, const uint8_t * const olimit)
{
hal_client_handle_t client __attribute__((unused));
hal_pkey_handle_t pkey;
size_t len;
uint32_t len_max;
uint8_t *optr_orig = *optr;
hal_error_t ret;
check(hal_xdr_decode_int(iptr, ilimit, &client.handle));
check(hal_xdr_decode_int(iptr, ilimit, &pkey.handle));
check(hal_xdr_decode_int(iptr, ilimit, &len_max));
/* sanity check len_max */
if (len_max > olimit - *optr - 4)
return HAL_ERROR_RPC_PACKET_OVERFLOW;
/* call the local function */
/* get the data directly into the output buffer */
*optr += 4; /* reserve 4 bytes for length */
ret = hal_rpc_local_pkey_dispatch.get_public_key(pkey, *optr, &len, len_max);
if (ret == HAL_OK) {
*optr = optr_orig;
check(hal_xdr_encode_int(optr, olimit, len));
*optr += pad(len);
}
else {
/* don't return data if error */
*optr = optr_orig;
}
return ret;
}
static hal_error_t pkey_sign(const uint8_t **iptr, const uint8_t * const ilimit,
uint8_t **optr, const uint8_t * const olimit)
{
hal_client_handle_t client;
hal_pkey_handle_t pkey;
hal_hash_handle_t hash;
const uint8_t *input;
uint32_t input_len;
uint32_t sig_max;
size_t sig_len;
uint8_t *optr_orig = *optr;
hal_error_t ret;
check(hal_xdr_decode_int(iptr, ilimit, &client.handle));
check(hal_xdr_decode_int(iptr, ilimit, &pkey.handle));
check(hal_xdr_decode_int(iptr, ilimit, &hash.handle));
check(hal_xdr_decode_buffer_in_place(iptr, ilimit, &input, &input_len));
check(hal_xdr_decode_int(iptr, ilimit, &sig_max));
/* sanity check sig_max */
if (sig_max > olimit - *optr - 4)
return HAL_ERROR_RPC_PACKET_OVERFLOW;
/* call the local function */
/* get the data directly into the output buffer */
*optr += 4; /* reserve 4 bytes for length */
ret = hal_rpc_local_pkey_dispatch.sign(pkey, hash, input, input_len, *optr, &sig_len, sig_max);
*optr = optr_orig;
if (ret == HAL_OK) {
check(hal_xdr_encode_int(optr, olimit, sig_len));
*optr += pad(sig_len);
}
return ret;
}
static hal_error_t pkey_verify(const uint8_t **iptr, const uint8_t * const ilimit,
uint8_t **optr, const uint8_t * const olimit)
{
hal_client_handle_t client;
hal_pkey_handle_t pkey;
hal_hash_handle_t hash;
const uint8_t *input;
uint32_t input_len;
const uint8_t *sig;
uint32_t sig_len;
hal_error_t ret;
check(hal_xdr_decode_int(iptr, ilimit, &client.handle));
check(hal_xdr_decode_int(iptr, ilimit, &pkey.handle));
check(hal_xdr_decode_int(iptr, ilimit, &hash.handle));
check(hal_xdr_decode_buffer_in_place(iptr, ilimit, &input, &input_len));
check(hal_xdr_decode_buffer_in_place(iptr, ilimit, &sig, &sig_len));
/* call the local function */
ret = hal_rpc_local_pkey_dispatch.verify(pkey, hash, input, input_len, sig, sig_len);
return ret;
}
static hal_error_t hal_xdr_encode_pkey_info(uint8_t **optr, const uint8_t * const olimit, const hal_pkey_info_t *info)
{
uint8_t *optr_orig = *optr;
hal_error_t ret;
if ((ret = hal_xdr_encode_int(optr, olimit, info->type)) != HAL_OK ||
(ret = hal_xdr_encode_int(optr, olimit, info->curve)) != HAL_OK ||
(ret = hal_xdr_encode_int(optr, olimit, info->flags)) != HAL_OK ||
(ret = hal_xdr_encode_buffer(optr, olimit, info->name.uuid, sizeof(info->name.uuid))) != HAL_OK)
*optr = optr_orig;
return ret;
}
static hal_error_t pkey_list(const uint8_t **iptr, const uint8_t * const ilimit,
uint8_t **optr, const uint8_t * const olimit)
{
hal_client_handle_t client;
hal_session_handle_t session;
uint8_t *optr_orig = *optr;
uint32_t result_max;
hal_key_flags_t flags;
hal_error_t ret;
check(hal_xdr_decode_int(iptr, ilimit, &client.handle));
check(hal_xdr_decode_int(iptr, ilimit, &session.handle));
check(hal_xdr_decode_int(iptr, ilimit, &result_max));
check(hal_xdr_decode_int(iptr, ilimit, &flags));
hal_pkey_info_t result[result_max];
unsigned result_len;
/* call the local function */
ret = hal_rpc_local_pkey_dispatch.list(client, session, result, &result_len, result_max, flags);
if (ret == HAL_OK) {
check(hal_xdr_encode_int(optr, olimit, result_len));
for (int i = 0; i < result_len; ++i) {
if ((ret = hal_xdr_encode_pkey_info(optr, olimit, &result[i])) != HAL_OK) {
*optr = optr_orig;
break;
}
}
}
return ret;
}
static hal_error_t pkey_match(const uint8_t **iptr, const uint8_t * const ilimit,
uint8_t **optr, const uint8_t * const olimit)
{
hal_client_handle_t client;
hal_session_handle_t session;
uint32_t type, curve, attributes_len, result_max, previous_uuid_len;
const uint8_t *previous_uuid_ptr;
hal_key_flags_t flags;
hal_error_t ret;
check(hal_xdr_decode_int(iptr, ilimit, &client.handle));
check(hal_xdr_decode_int(iptr, ilimit, &session.handle));
check(hal_xdr_decode_int(iptr, ilimit, &type));
check(hal_xdr_decode_int(iptr, ilimit, &curve));
check(hal_xdr_decode_int(iptr, ilimit, &flags));
check(hal_xdr_decode_int(iptr, ilimit, &attributes_len));
hal_rpc_pkey_attribute_t attributes[attributes_len > 0 ? attributes_len : 1];
for (int i = 0; i < attributes_len; i++) {
hal_rpc_pkey_attribute_t *a = &attributes[i];
uint32_t value_len;
check(hal_xdr_decode_int(iptr, ilimit, &a->type));
check(hal_xdr_decode_buffer_in_place(iptr, ilimit, &a->value, &value_len));
a->length = value_len;
}
check(hal_xdr_decode_int(iptr, ilimit, &result_max));
check(hal_xdr_decode_buffer_in_place(iptr, ilimit, &previous_uuid_ptr, &previous_uuid_len));
if (previous_uuid_len != sizeof(hal_uuid_t))
return HAL_ERROR_KEY_NAME_TOO_LONG;
const hal_uuid_t * const previous_uuid = (const void *) previous_uuid_ptr;
hal_uuid_t result[result_max];
unsigned result_len;
ret = hal_rpc_local_pkey_dispatch.match(client, session, type, curve, flags,
attributes, attributes_len,
result, &result_len, result_max,
previous_uuid);
if (ret == HAL_OK) {
uint8_t *optr_orig = *optr;
ret = hal_xdr_encode_int(optr, olimit, result_len);
for (int i = 0; ret == HAL_OK && i < result_len; ++i)
ret = hal_xdr_encode_buffer(optr, olimit, result[i].uuid,
sizeof(result[i].uuid));
if (ret != HAL_OK)
*optr = optr_orig;
}
return ret;
}
static hal_error_t pkey_set_attribute(const uint8_t **iptr, const uint8_t * const ilimit,
uint8_t **optr, const uint8_t * const olimit)
{
hal_client_handle_t client;
hal_pkey_handle_t pkey;
uint32_t type;
const uint8_t *value;
uint32_t value_len;
hal_error_t ret;
check(hal_xdr_decode_int(iptr, ilimit, &client.handle));
check(hal_xdr_decode_int(iptr, ilimit, &pkey.handle));
check(hal_xdr_decode_int(iptr, ilimit, &type));
check(hal_xdr_decode_buffer_in_place(iptr, ilimit, &value, &value_len));
ret = hal_rpc_local_pkey_dispatch.set_attribute(pkey, type, value, value_len);
return ret;
}
static hal_error_t pkey_get_attribute(const uint8_t **iptr, const uint8_t * const ilimit,
uint8_t **optr, const uint8_t * const olimit)
{
hal_client_handle_t client;
hal_pkey_handle_t pkey;
uint32_t type;
size_t value_len;
uint32_t value_max;
uint8_t *optr_orig = *optr;
hal_error_t ret;
check(hal_xdr_decode_int(iptr, ilimit, &client.handle));
check(hal_xdr_decode_int(iptr, ilimit, &pkey.handle));
check(hal_xdr_decode_int(iptr, ilimit, &type));
check(hal_xdr_decode_int(iptr, ilimit, &value_max));
if (value_max > olimit - *optr - 4)
return HAL_ERROR_RPC_PACKET_OVERFLOW;
*optr += 4;
ret = hal_rpc_local_pkey_dispatch.get_attribute(pkey, type, *optr, &value_len, value_max);
if (ret == HAL_OK) {
*optr = optr_orig;
check(hal_xdr_encode_int(optr, olimit, value_len));
*optr += pad(value_len);
}
else {
*optr = optr_orig;
}
return ret;
}
static hal_error_t pkey_delete_attribute(const uint8_t **iptr, const uint8_t * const ilimit,
uint8_t **optr, const uint8_t * const olimit)
{
hal_client_handle_t client;
hal_pkey_handle_t pkey;
uint32_t type;
hal_error_t ret;
check(hal_xdr_decode_int(iptr, ilimit, &client.handle));
check(hal_xdr_decode_int(iptr, ilimit, &pkey.handle));
check(hal_xdr_decode_int(iptr, ilimit, &type));
ret = hal_rpc_local_pkey_dispatch.delete_attribute(pkey, type);
return ret;
}
hal_error_t hal_rpc_server_dispatch(const uint8_t * const ibuf, const size_t ilen,
uint8_t * const obuf, size_t * const olen)
{
const uint8_t * iptr = ibuf;
const uint8_t * const ilimit = ibuf + ilen;
uint8_t * optr = obuf + 12; /* reserve space for opcode, client, and response code */
const uint8_t * const olimit = obuf + *olen;
uint32_t rpc_func_num;
uint32_t client_handle;
hal_error_t ret;
check(hal_xdr_decode_int(&iptr, ilimit, &rpc_func_num));
check(hal_xdr_decode_int(&iptr, ilimit, &client_handle));
check(hal_xdr_undecode_int(&iptr));
switch (rpc_func_num) {
case RPC_FUNC_GET_VERSION:
ret = get_version(&iptr, ilimit, &optr, olimit);
break;
case RPC_FUNC_GET_RANDOM:
ret = get_random(&iptr, ilimit, &optr, olimit);
break;
case RPC_FUNC_SET_PIN:
ret = set_pin(&iptr, ilimit, &optr, olimit);
break;
case RPC_FUNC_LOGIN:
ret = login(&iptr, ilimit, &optr, olimit);
break;
case RPC_FUNC_LOGOUT:
ret = logout(&iptr, ilimit, &optr, olimit);
break;
case RPC_FUNC_LOGOUT_ALL:
ret = logout_all(&iptr, ilimit, &optr, olimit);
break;
case RPC_FUNC_IS_LOGGED_IN:
ret = is_logged_in(&iptr, ilimit, &optr, olimit);
break;
case RPC_FUNC_HASH_GET_DIGEST_LEN:
ret = hash_get_digest_len(&iptr, ilimit, &optr, olimit);
break;
case RPC_FUNC_HASH_GET_DIGEST_ALGORITHM_ID:
ret = hash_get_digest_algorithm_id(&iptr, ilimit, &optr, olimit);
break;
case RPC_FUNC_HASH_GET_ALGORITHM:
ret = hash_get_algorithm(&iptr, ilimit, &optr, olimit);
break;
case RPC_FUNC_HASH_INITIALIZE:
ret = hash_initialize(&iptr, ilimit, &optr, olimit);
break;
case RPC_FUNC_HASH_UPDATE:
ret = hash_update(&iptr, ilimit, &optr, olimit);
break;
case RPC_FUNC_HASH_FINALIZE:
ret = hash_finalize(&iptr, ilimit, &optr, olimit);
break;
case RPC_FUNC_PKEY_LOAD:
ret = pkey_load(&iptr, ilimit, &optr, olimit);
break;
case RPC_FUNC_PKEY_FIND:
ret = pkey_find(&iptr, ilimit, &optr, olimit);
break;
case RPC_FUNC_PKEY_GENERATE_RSA:
ret = pkey_generate_rsa(&iptr, ilimit, &optr, olimit);
break;
case RPC_FUNC_PKEY_GENERATE_EC:
ret = pkey_generate_ec(&iptr, ilimit, &optr, olimit);
break;
case RPC_FUNC_PKEY_CLOSE:
ret = pkey_close(&iptr, ilimit, &optr, olimit);
break;
case RPC_FUNC_PKEY_DELETE:
ret = pkey_delete(&iptr, ilimit, &optr, olimit);
break;
case RPC_FUNC_PKEY_GET_KEY_TYPE:
ret = pkey_get_key_type(&iptr, ilimit, &optr, olimit);
break;
case RPC_FUNC_PKEY_GET_KEY_FLAGS:
ret = pkey_get_key_flags(&iptr, ilimit, &optr, olimit);
break;
case RPC_FUNC_PKEY_GET_PUBLIC_KEY_LEN:
ret = pkey_get_public_key_len(&iptr, ilimit, &optr, olimit);
break;
case RPC_FUNC_PKEY_GET_PUBLIC_KEY:
ret = pkey_get_public_key(&iptr, ilimit, &optr, olimit);
break;
case RPC_FUNC_PKEY_SIGN:
ret = pkey_sign(&iptr, ilimit, &optr, olimit);
break;
case RPC_FUNC_PKEY_VERIFY:
ret = pkey_verify(&iptr, ilimit, &optr, olimit);
break;
case RPC_FUNC_PKEY_LIST:
ret = pkey_list(&iptr, ilimit, &optr, olimit);
break;
case RPC_FUNC_PKEY_MATCH:
ret = pkey_match(&iptr, ilimit, &optr, olimit);
break;
case RPC_FUNC_PKEY_SET_ATTRIBUTE:
ret = pkey_set_attribute(&iptr, ilimit, &optr, olimit);
break;
case RPC_FUNC_PKEY_GET_ATTRIBUTE:
ret = pkey_get_attribute(&iptr, ilimit, &optr, olimit);
break;
case RPC_FUNC_PKEY_DELETE_ATTRIBUTE:
ret = pkey_delete_attribute(&iptr, ilimit, &optr, olimit);
break;
default:
ret = HAL_ERROR_RPC_BAD_FUNCTION;
break;
}
/* Encode opcode, client ID, and response code at the beginning of the payload */
*olen = optr - obuf;
optr = obuf;
check(hal_xdr_encode_int(&optr, olimit, rpc_func_num));
check(hal_xdr_encode_int(&optr, olimit, client_handle));
check(hal_xdr_encode_int(&optr, olimit, ret));
return HAL_OK;
}
#define interrupt 0
static uint8_t inbuf[HAL_RPC_MAX_PKT_SIZE], outbuf[HAL_RPC_MAX_PKT_SIZE];
void hal_rpc_server_main(void)
{
size_t ilen, olen;
void *opaque;
hal_error_t ret;
while (!interrupt) {
ilen = sizeof(inbuf);
ret = hal_rpc_recvfrom(inbuf, &ilen, &opaque);
if (ret == HAL_OK) {
olen = sizeof(outbuf);
if (hal_rpc_server_dispatch(inbuf, ilen, outbuf, &olen) == HAL_OK)
hal_rpc_sendto(outbuf, olen, opaque);
}
}
}
/*
* Dispatch vectors.
*/
#if RPC_CLIENT == RPC_CLIENT_LOCAL
const hal_rpc_misc_dispatch_t *hal_rpc_misc_dispatch = &hal_rpc_local_misc_dispatch;
const hal_rpc_hash_dispatch_t *hal_rpc_hash_dispatch = &hal_rpc_local_hash_dispatch;
const hal_rpc_pkey_dispatch_t *hal_rpc_pkey_dispatch = &hal_rpc_local_pkey_dispatch;
#endif
hal_error_t hal_rpc_server_init(void)
{
hal_error_t err;
if ((err = hal_ks_init(hal_ks_volatile_driver)) != HAL_OK ||
(err = hal_ks_init(hal_ks_token_driver)) != HAL_OK ||
(err = hal_rpc_server_transport_init()) != HAL_OK)
return err;
return HAL_OK;
}
hal_error_t hal_rpc_server_close(void)
{
hal_error_t err;
if ((err = hal_rpc_server_transport_close()) != HAL_OK ||
(err = hal_ks_shutdown(hal_ks_token_driver)) != HAL_OK ||
(err = hal_ks_shutdown(hal_ks_volatile_driver)) != HAL_OK)
return err;
return HAL_OK;
}
/*
* Local variables:
* indent-tabs-mode: nil
* End:
*/