diff options
author | Rob Austein <sra@hactrn.net> | 2015-12-20 17:59:29 -0500 |
---|---|---|
committer | Rob Austein <sra@hactrn.net> | 2015-12-20 17:59:29 -0500 |
commit | 86b35d757048aaa122237e1cb8fb33de9d53292d (patch) | |
tree | ab4c657cc2a15fc0a2f55bbaab74a4f1f1106069 /hal_rpc.c | |
parent | d7b3463029109f515a063e771c134e7e724cc0aa (diff) |
RPC server stuff mostly written. Compiles, not yet tested. RPC
public key extraction functions on hold pending ASN.1 cleanup.
Diffstat (limited to 'hal_rpc.c')
-rw-r--r-- | hal_rpc.c | 324 |
1 files changed, 0 insertions, 324 deletions
diff --git a/hal_rpc.c b/hal_rpc.c deleted file mode 100644 index 6ad198e..0000000 --- a/hal_rpc.c +++ /dev/null @@ -1,324 +0,0 @@ -/* - * hal_rpc.c - * --------- - * Remote procedure call public API implementation. - * - * Authors: Rob Austein - * Copyright (c) 2015, NORDUnet A/S All rights reserved. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions are - * met: - * - Redistributions of source code must retain the above copyright notice, - * this list of conditions and the following disclaimer. - * - * - Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in the - * documentation and/or other materials provided with the distribution. - * - * - Neither the name of the NORDUnet nor the names of its contributors may - * be used to endorse or promote products derived from this software - * without specific prior written permission. - * - * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS - * IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED - * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A - * PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT - * HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED - * TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR - * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF - * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING - * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS - * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. - */ - -#include "rpc_internal.h" - -#ifndef HAL_RPC_IS_CLIENT -#warning HAL_RPC_IS_CLIENT not set, assuming we're building for the HSM -#define HAL_RPC_IS_CLIENT 0 -#endif - -/* - * Maybe we'll let the client configure this at runtime, later. For - * now, wire in the obvious defaults: hashing is done locally, - * everything else is done via RPC. For the server everything is - * always done locally. - */ - -#if HAL_RPC_IS_CLIENT - -static const hal_rpc_misc_dispatch_t * const misc_dispatch = &hal_rpc_remote_misc_dispatch; -static const hal_rpc_hash_dispatch_t * const hash_dispatch = &hal_rpc_remote_hash_dispatch; -static const hal_rpc_pkey_dispatch_t * const pkey_dispatch = &hal_rpc_mixed_pkey_dispatch; - -#else - -static const hal_rpc_misc_dispatch_t * const misc_dispatch = &hal_rpc_local_misc_dispatch; -static const hal_rpc_hash_dispatch_t * const hash_dispatch = &hal_rpc_local_hash_dispatch; -static const hal_rpc_pkey_dispatch_t * const pkey_dispatch = &hal_rpc_local_pkey_dispatch; - -#endif - -const hal_rpc_hash_handle_t hal_rpc_hash_handle_none = {0}; - -static inline int check_pkey_type(const hal_rpc_pkey_key_type_t type) -{ - switch (type) { - case HAL_RPC_PKEY_RSA_PRIVATE: - case HAL_RPC_PKEY_RSA_PUBLIC: - case HAL_RPC_PKEY_ECDSA_PRIVATE: - case HAL_RPC_PKEY_ECDSA_PUBLIC: - return 1; - default: - return 0; - } -} - -static inline int check_pkey_flags(const hal_rpc_pkey_flags_t flags) -{ - return (flags &~ (HAL_RPC_PKEY_FLAG_USAGE_DIGITALSIGNATURE | - HAL_RPC_PKEY_FLAG_USAGE_KEYENCIPHERMENT | - HAL_RPC_PKEY_FLAG_USAGE_DATAENCIPHERMENT)) == 0; -} - -static inline int check_pkey_type_curve_flags(const hal_rpc_pkey_key_type_t type, - const hal_rpc_pkey_curve_t curve, - const hal_rpc_pkey_flags_t flags) -{ - if (!check_pkey_flags(flags)) - return 0; - - switch (type) { - - case HAL_RPC_PKEY_RSA_PRIVATE: - case HAL_RPC_PKEY_RSA_PUBLIC: - return curve == HAL_RPC_PKEY_CURVE_NONE; - - case HAL_RPC_PKEY_ECDSA_PRIVATE: - case HAL_RPC_PKEY_ECDSA_PUBLIC: - switch (curve) { - case HAL_RPC_PKEY_CURVE_ECDSA_P256: - case HAL_RPC_PKEY_CURVE_ECDSA_P384: - case HAL_RPC_PKEY_CURVE_ECDSA_P521: - return 1; - default: - return 0; - } - - default: - return 0; - } -} - - -hal_error_t hal_rpc_get_random(void *buffer, const size_t length) -{ - if (buffer == NULL) - return HAL_ERROR_BAD_ARGUMENTS; - if (length == 0) - return HAL_OK; - return misc_dispatch->get_random(buffer, length); -} - -#warning Perhaps we should be enforcing a minimum PIN length here - -hal_error_t hal_rpc_set_pin(const hal_rpc_user_t which, - const char * const newpin, const size_t newpin_len) -{ - if (newpin == NULL || newpin_len == 0 || (which != HAL_RPC_USER_NORMAL && which != HAL_RPC_USER_SO)) - return HAL_ERROR_BAD_ARGUMENTS; - return misc_dispatch->set_pin(which, newpin, newpin_len); -} - -hal_error_t hal_rpc_login(const hal_rpc_client_handle_t client, - const hal_rpc_user_t user, - const char * const pin, const size_t pin_len) -{ - if (pin == NULL || pin_len == 0 || (user != HAL_RPC_USER_NORMAL && user != HAL_RPC_USER_SO)) - return HAL_ERROR_BAD_ARGUMENTS; - return misc_dispatch->login(client, user, pin, pin_len); -} - -hal_error_t hal_rpc_logout(const hal_rpc_client_handle_t client) -{ - return misc_dispatch->logout(client); -} - -hal_error_t hal_rpc_hash_get_digest_length(const hal_digest_algorithm_t alg, size_t *length) -{ - if (length == NULL) - return HAL_ERROR_BAD_ARGUMENTS; - return hash_dispatch->get_digest_length(alg, length); -} - -hal_error_t hal_rpc_hash_get_digest_algorithm_id(const hal_digest_algorithm_t alg, - uint8_t *id, size_t *len, const size_t len_max) -{ - return hash_dispatch->get_digest_algorithm_id(alg, id, len, len_max); -} - -hal_error_t hal_rpc_hash_get_algorithm(const hal_rpc_hash_handle_t hash, hal_digest_algorithm_t *alg) -{ - if (hash.handle == hal_rpc_hash_handle_none.handle || alg == NULL) - return HAL_ERROR_BAD_ARGUMENTS; - return hash_dispatch->get_algorithm(hash, alg); -} - -hal_error_t hal_rpc_hash_initialize(const hal_rpc_client_handle_t client, - const hal_rpc_session_handle_t session, - hal_rpc_hash_handle_t *hash, - const hal_digest_algorithm_t alg, - const uint8_t * const key, const size_t key_len) -{ - if (hash == NULL) - return HAL_ERROR_BAD_ARGUMENTS; - return hash_dispatch->initialize(client, session, hash, alg, key, key_len); -} - -hal_error_t hal_rpc_hash_update(const hal_rpc_hash_handle_t hash, - const uint8_t * data, const size_t length) -{ - if (hash.handle == hal_rpc_hash_handle_none.handle || data == NULL) - return HAL_ERROR_BAD_ARGUMENTS; - if (length == 0) - return HAL_OK; - return hash_dispatch->update(hash, data, length); -} - -hal_error_t hal_rpc_hash_finalize(const hal_rpc_hash_handle_t hash, - uint8_t *digest, const size_t length) -{ - if (hash.handle == hal_rpc_hash_handle_none.handle || digest == NULL || length == 0) - return HAL_ERROR_BAD_ARGUMENTS; - return hash_dispatch->finalize(hash, digest, length); -} - -hal_error_t hal_rpc_pkey_load(const hal_rpc_client_handle_t client, - const hal_rpc_session_handle_t session, - hal_rpc_pkey_handle_t *pkey, - const hal_rpc_pkey_key_type_t type, - const hal_rpc_pkey_curve_t curve, - const uint8_t * const name, const size_t name_len, - const uint8_t * const der, const size_t der_len, - const hal_rpc_pkey_flags_t flags) -{ - if (pkey == NULL || - name == NULL || name_len == 0 || - der == NULL || der_len == 0 || - !check_pkey_type_curve_flags(type, curve, flags)) - return HAL_ERROR_BAD_ARGUMENTS; - return pkey_dispatch->load(client, session, pkey, type, curve, name, name_len, der, der_len, flags); -} - -hal_error_t hal_rpc_pkey_find(const hal_rpc_client_handle_t client, - const hal_rpc_session_handle_t session, - hal_rpc_pkey_handle_t *pkey, - const hal_rpc_pkey_key_type_t type, - const uint8_t * const name, const size_t name_len) -{ - if (pkey == NULL || name == NULL || name_len == 0 || !check_pkey_type(type)) - return HAL_ERROR_BAD_ARGUMENTS; - return pkey_dispatch->find(client, session, pkey, type, name, name_len); -} - -hal_error_t hal_rpc_pkey_generate_rsa(const hal_rpc_client_handle_t client, - const hal_rpc_session_handle_t session, - hal_rpc_pkey_handle_t *pkey, - const uint8_t * const name, const size_t name_len, - const unsigned key_len, - const uint8_t * const exp, const size_t exp_len, - const hal_rpc_pkey_flags_t flags) -{ - if (pkey == NULL || name == NULL || name_len == 0 || key_len == 0 || - exp == NULL || exp_len == 0 || !check_pkey_flags(flags)) - return HAL_ERROR_BAD_ARGUMENTS; - return pkey_dispatch->generate_rsa(client, session, pkey, name, name_len, key_len, exp, exp_len, flags); -} - -hal_error_t hal_rpc_pkey_generate_ec(const hal_rpc_client_handle_t client, - const hal_rpc_session_handle_t session, - hal_rpc_pkey_handle_t *pkey, - const uint8_t * const name, const size_t name_len, - const hal_rpc_pkey_curve_t curve, - const hal_rpc_pkey_flags_t flags) -{ - if (pkey == NULL || name == NULL || name_len == 0 || - !check_pkey_type_curve_flags(HAL_RPC_PKEY_ECDSA_PRIVATE, curve, flags)) - return HAL_ERROR_BAD_ARGUMENTS; - return pkey_dispatch->generate_ec(client, session, pkey, name, name_len, curve, flags); -} - -hal_error_t hal_rpc_pkey_delete(const hal_rpc_pkey_handle_t pkey) -{ - return pkey_dispatch->delete(pkey); -} - -hal_error_t hal_rpc_pkey_get_key_type(const hal_rpc_pkey_handle_t pkey, - hal_rpc_pkey_key_type_t *type) -{ - if (type == NULL) - return HAL_ERROR_BAD_ARGUMENTS; - return pkey_dispatch->get_key_type(pkey, type); -} - -hal_error_t hal_rpc_pkey_get_key_flags(const hal_rpc_pkey_handle_t pkey, - hal_rpc_pkey_flags_t *flags) -{ - if (flags == NULL) - return HAL_ERROR_BAD_ARGUMENTS; - return pkey_dispatch->get_key_flags(pkey, flags); -} - -size_t hal_rpc_pkey_get_public_key_len(const hal_rpc_pkey_handle_t pkey) -{ - return pkey_dispatch->get_public_key_len(pkey); -} - -hal_error_t hal_rpc_pkey_get_public_key(const hal_rpc_pkey_handle_t pkey, - uint8_t *der, size_t *der_len, const size_t der_len_max) -{ - if (der == NULL || der_len == NULL || der_len_max == 0) - return HAL_ERROR_BAD_ARGUMENTS; - return pkey_dispatch->get_public_key(pkey, der, der_len, der_len_max); -} - -hal_error_t hal_rpc_pkey_sign(const hal_rpc_session_handle_t session, - const hal_rpc_pkey_handle_t pkey, - const hal_rpc_hash_handle_t hash, - const uint8_t * const input, const size_t input_len, - uint8_t * output, const size_t output_len) -{ - if (output == NULL || output_len == 0 || - (hash.handle == hal_rpc_hash_handle_none.handle) == (input == NULL || input_len == 0)) - return HAL_ERROR_BAD_ARGUMENTS; - return pkey_dispatch->sign(session, pkey, hash, input, input_len, output, output_len); -} - -hal_error_t hal_rpc_pkey_verify(const hal_rpc_session_handle_t session, - const hal_rpc_pkey_handle_t pkey, - const hal_rpc_hash_handle_t hash, - const uint8_t * const input, const size_t input_len, - uint8_t * output, const size_t output_len) -{ - if (output == NULL || output_len == 0 || - (hash.handle == hal_rpc_hash_handle_none.handle) == (input == NULL || input_len == 0)) - return HAL_ERROR_BAD_ARGUMENTS; - return pkey_dispatch->verify(session, pkey, hash, input, input_len, output, output_len); -} - -hal_error_t hal_rpc_pkey_list(hal_rpc_pkey_key_info_t *result, - unsigned *result_len, - const unsigned result_max) -{ - if (result == NULL || result_len == NULL || result_max == 0) - return HAL_ERROR_BAD_ARGUMENTS; - return pkey_dispatch->list(result, result_len, result_max); -} - -/* - * Local variables: - * indent-tabs-mode: nil - * End: - */ |