|
Lines 50-56
Link Here
|
| 50 |
|
50 |
|
| 51 |
struct pkcs11_keyinfo { |
51 |
struct pkcs11_keyinfo { |
| 52 |
struct sshkey *key; |
52 |
struct sshkey *key; |
| 53 |
char *providername, *label; |
53 |
char *providername, *label, *pin; |
| 54 |
TAILQ_ENTRY(pkcs11_keyinfo) next; |
54 |
TAILQ_ENTRY(pkcs11_keyinfo) next; |
| 55 |
}; |
55 |
}; |
| 56 |
|
56 |
|
|
Lines 63-69
struct sshbuf *iqueue;
Link Here
|
| 63 |
struct sshbuf *oqueue; |
63 |
struct sshbuf *oqueue; |
| 64 |
|
64 |
|
| 65 |
static void |
65 |
static void |
| 66 |
add_key(struct sshkey *k, char *name, char *label) |
66 |
add_key(struct sshkey *k, char *name, char *label, char *pin) |
| 67 |
{ |
67 |
{ |
| 68 |
struct pkcs11_keyinfo *ki; |
68 |
struct pkcs11_keyinfo *ki; |
| 69 |
|
69 |
|
|
Lines 71-76
add_key(struct sshkey *k, char *name, char *label)
Link Here
|
| 71 |
ki->providername = xstrdup(name); |
71 |
ki->providername = xstrdup(name); |
| 72 |
ki->key = k; |
72 |
ki->key = k; |
| 73 |
ki->label = xstrdup(label); |
73 |
ki->label = xstrdup(label); |
|
|
74 |
ki->pin = xstrdup(pin); |
| 74 |
TAILQ_INSERT_TAIL(&pkcs11_keylist, ki, next); |
75 |
TAILQ_INSERT_TAIL(&pkcs11_keylist, ki, next); |
| 75 |
} |
76 |
} |
| 76 |
|
77 |
|
|
Lines 85-90
del_keys_by_name(char *name)
Link Here
|
| 85 |
TAILQ_REMOVE(&pkcs11_keylist, ki, next); |
86 |
TAILQ_REMOVE(&pkcs11_keylist, ki, next); |
| 86 |
free(ki->providername); |
87 |
free(ki->providername); |
| 87 |
free(ki->label); |
88 |
free(ki->label); |
|
|
89 |
explicit_bzero(ki->pin, strlen(ki->pin)); |
| 90 |
free(ki->pin); |
| 88 |
sshkey_free(ki->key); |
91 |
sshkey_free(ki->key); |
| 89 |
free(ki); |
92 |
free(ki); |
| 90 |
} |
93 |
} |
|
Lines 93-106
del_keys_by_name(char *name)
Link Here
|
| 93 |
|
96 |
|
| 94 |
/* lookup matching 'private' key */ |
97 |
/* lookup matching 'private' key */ |
| 95 |
static struct sshkey * |
98 |
static struct sshkey * |
| 96 |
lookup_key(struct sshkey *k) |
99 |
lookup_key(struct sshkey *k, char **pin) |
| 97 |
{ |
100 |
{ |
| 98 |
struct pkcs11_keyinfo *ki; |
101 |
struct pkcs11_keyinfo *ki; |
| 99 |
|
102 |
|
| 100 |
TAILQ_FOREACH(ki, &pkcs11_keylist, next) { |
103 |
TAILQ_FOREACH(ki, &pkcs11_keylist, next) { |
| 101 |
debug("check %p %s %s", ki, ki->providername, ki->label); |
104 |
debug("check %p %s %s", ki, ki->providername, ki->label); |
| 102 |
if (sshkey_equal(k, ki->key)) |
105 |
if (sshkey_equal(k, ki->key)) { |
|
|
106 |
if (pin != NULL) { |
| 107 |
*pin = ki->pin; |
| 108 |
} |
| 103 |
return (ki->key); |
109 |
return (ki->key); |
|
|
110 |
} |
| 104 |
} |
111 |
} |
| 105 |
return (NULL); |
112 |
return (NULL); |
| 106 |
} |
113 |
} |
|
Lines 146-152
process_add(void)
Link Here
|
| 146 |
fatal("%s: buffer error: %s", |
153 |
fatal("%s: buffer error: %s", |
| 147 |
__func__, ssh_err(r)); |
154 |
__func__, ssh_err(r)); |
| 148 |
free(blob); |
155 |
free(blob); |
| 149 |
add_key(keys[i], name, labels[i]); |
156 |
add_key(keys[i], name, labels[i], pin); |
| 150 |
free(labels[i]); |
157 |
free(labels[i]); |
| 151 |
} |
158 |
} |
| 152 |
} else { |
159 |
} else { |
|
Lines 157-162
process_add(void)
Link Here
|
| 157 |
} |
164 |
} |
| 158 |
free(labels); |
165 |
free(labels); |
| 159 |
free(keys); /* keys themselves are transferred to pkcs11_keylist */ |
166 |
free(keys); /* keys themselves are transferred to pkcs11_keylist */ |
|
|
167 |
explicit_bzero(pin, strlen(pin)); |
| 160 |
free(pin); |
168 |
free(pin); |
| 161 |
free(name); |
169 |
free(name); |
| 162 |
send_msg(msg); |
170 |
send_msg(msg); |
|
Lines 193-198
process_sign(void)
Link Here
|
| 193 |
int r, ok = -1; |
201 |
int r, ok = -1; |
| 194 |
struct sshkey *key, *found; |
202 |
struct sshkey *key, *found; |
| 195 |
struct sshbuf *msg; |
203 |
struct sshbuf *msg; |
|
|
204 |
char *pin = NULL; |
| 196 |
|
205 |
|
| 197 |
/* XXX support SHA2 signature flags */ |
206 |
/* XXX support SHA2 signature flags */ |
| 198 |
if ((r = sshbuf_get_string(iqueue, &blob, &blen)) != 0 || |
207 |
if ((r = sshbuf_get_string(iqueue, &blob, &blen)) != 0 || |
|
Lines 203-212
process_sign(void)
Link Here
|
| 203 |
if ((r = sshkey_from_blob(blob, blen, &key)) != 0) |
212 |
if ((r = sshkey_from_blob(blob, blen, &key)) != 0) |
| 204 |
error("%s: sshkey_from_blob: %s", __func__, ssh_err(r)); |
213 |
error("%s: sshkey_from_blob: %s", __func__, ssh_err(r)); |
| 205 |
else { |
214 |
else { |
| 206 |
if ((found = lookup_key(key)) != NULL) { |
215 |
if ((found = lookup_key(key, &pin)) != NULL) { |
| 207 |
#ifdef WITH_OPENSSL |
216 |
#ifdef WITH_OPENSSL |
| 208 |
int ret; |
217 |
int ret; |
| 209 |
|
218 |
|
|
|
219 |
if (pkcs11_refresh_key(found, pin) != 0) { |
| 220 |
error("%s: Failed to get key. Is smart card present?", __func__); |
| 221 |
} |
| 210 |
if (key->type == KEY_RSA) { |
222 |
if (key->type == KEY_RSA) { |
| 211 |
slen = RSA_size(key->rsa); |
223 |
slen = RSA_size(key->rsa); |
| 212 |
signature = xmalloc(slen); |
224 |
signature = xmalloc(slen); |