summaryrefslogtreecommitdiffstats
path: root/tdecore/tdehw/tdecryptographiccarddevice.cpp
diff options
context:
space:
mode:
authorTimothy Pearson <kb9vqf@pearsoncomputing.net>2015-09-14 03:54:16 -0500
committerTimothy Pearson <kb9vqf@pearsoncomputing.net>2015-09-14 03:54:16 -0500
commitffa54887cef6a8e36b2d63e7e9139ac11863a525 (patch)
treea36d7ade29b74464af1f87e61e8cbc05441dd64b /tdecore/tdehw/tdecryptographiccarddevice.cpp
parent4238dc9cea6c543abf993d3a28af564f1c8dea0c (diff)
downloadtdelibs-ffa54887cef6a8e36b2d63e7e9139ac11863a525.tar.gz
tdelibs-ffa54887cef6a8e36b2d63e7e9139ac11863a525.zip
Add additional cryptographic card functions to tdehwlib
Fix FTBFS on old distributions
Diffstat (limited to 'tdecore/tdehw/tdecryptographiccarddevice.cpp')
-rw-r--r--tdecore/tdehw/tdecryptographiccarddevice.cpp76
1 files changed, 64 insertions, 12 deletions
diff --git a/tdecore/tdehw/tdecryptographiccarddevice.cpp b/tdecore/tdehw/tdecryptographiccarddevice.cpp
index 43805ef55..1fb1849ca 100644
--- a/tdecore/tdehw/tdecryptographiccarddevice.cpp
+++ b/tdecore/tdehw/tdecryptographiccarddevice.cpp
@@ -31,6 +31,7 @@
#include "tdeglobal.h"
#include "tdelocale.h"
+#include "tdeapplication.h"
#include "tdehardwaredevices.h"
@@ -130,6 +131,7 @@ void CryptoCardDeviceWatcher::run() {
if (m_terminationRequested) {
for (i=0; i<readers.count(); i++) {
free((char*)m_readerStates[i].szReader);
+ m_readerStates[i].szReader = NULL;
}
eventLoop->exit(0);
return;
@@ -209,7 +211,7 @@ TQString CryptoCardDeviceWatcher::getCardATR(TQString readerName) {
atr_formatted.append(formatted.upper());
}
atr_formatted = atr_formatted.stripWhiteSpace();
- free(data);
+ delete [] data;
SCardDisconnect(hCard, SCARD_LEAVE_CARD);
}
}
@@ -243,7 +245,6 @@ int CryptoCardDeviceWatcher::retrieveCardCertificates(TQString readerName) {
CK_RV rv;
pkcs11h_certificate_id_list_t issuers;
pkcs11h_certificate_id_list_t certs;
- pkcs11h_certificate_id_t find = NULL;
printf("Initializing pkcs11-helper\n");
if ((rv = pkcs11h_initialize()) != CKR_OK) {
@@ -269,7 +270,7 @@ int CryptoCardDeviceWatcher::retrieveCardCertificates(TQString readerName) {
}
#endif
printf("Adding provider '%s'\n", OPENSC_PKCS11_PROVIDER_LIBRARY);
- if ((rv = pkcs11h_addProvider (OPENSC_PKCS11_PROVIDER_LIBRARY, OPENSC_PKCS11_PROVIDER_LIBRARY, FALSE, PKCS11H_PRIVATEMODE_MASK_AUTO, PKCS11H_SLOTEVENT_METHOD_AUTO, 0, FALSE)) != CKR_OK) {
+ if ((rv = pkcs11h_addProvider(OPENSC_PKCS11_PROVIDER_LIBRARY, OPENSC_PKCS11_PROVIDER_LIBRARY, FALSE, PKCS11H_PRIVATEMODE_MASK_AUTO, PKCS11H_SLOTEVENT_METHOD_AUTO, 0, FALSE)) != CKR_OK) {
printf("pkcs11h_addProvider failed: %s\n", pkcs11h_getMessage(rv));
return -1;
}
@@ -284,17 +285,17 @@ int CryptoCardDeviceWatcher::retrieveCardCertificates(TQString readerName) {
int i = 0;
for (pkcs11h_certificate_id_list_t cert = certs; cert != NULL; cert = cert->next) {
TQString label = cert->certificate_id->displayName;
- printf("The name of the %d certficate is %s\n", i, label.ascii());
+ printf("Certificate %d name: '%s'\n", i, label.ascii());
pkcs11h_certificate_t certificate;
- rv = pkcs11h_certificate_create(find, NULL, PKCS11H_PROMPT_MASK_ALLOW_NONE, PKCS11H_PIN_CACHE_INFINITE, &certificate);
+ rv = pkcs11h_certificate_create(certs->certificate_id, NULL, PKCS11H_PROMPT_MASK_ALLOW_NONE, PKCS11H_PIN_CACHE_INFINITE, &certificate);
if (rv != CKR_OK) {
printf("Can not read certificate: %s\n", pkcs11h_getMessage(rv));
- pkcs11h_certificate_freeCertificateId(find);
+ pkcs11h_certificate_freeCertificateId(certs->certificate_id);
ret = -1;
break;
}
- pkcs11h_certificate_freeCertificateId(find);
+ pkcs11h_certificate_freeCertificateId(certs->certificate_id);
pkcs11h_openssl_session_t openssl_session = NULL;
if ((openssl_session = pkcs11h_openssl_createSession(certificate)) == NULL) {
@@ -335,7 +336,6 @@ int CryptoCardDeviceWatcher::retrieveCardCertificates(TQString readerName) {
}
pkcs11h_certificate_freeCertificateIdList(issuers);
- pkcs11h_certificate_freeCertificateIdList(certs);
pkcs11h_openssl_freeSession(openssl_session);
@@ -393,14 +393,16 @@ void TDECryptographicCardDevice::enableCardMonitoring(bool enable) {
else {
if (m_watcherObject) {
m_watcherObject->requestTermination();
- delete m_watcherObject;
- m_watcherObject = NULL;
}
if (m_watcherThread) {
m_watcherThread->wait();
delete m_watcherThread;
m_watcherThread = NULL;
}
+ if (m_watcherObject) {
+ delete m_watcherObject;
+ m_watcherObject = NULL;
+ }
}
#endif
}
@@ -431,10 +433,12 @@ TQString TDECryptographicCardDevice::cardATR() {
X509CertificatePtrList TDECryptographicCardDevice::cardX509Certificates() {
if (m_watcherObject && m_watcherThread) {
- if (m_cardPresent)
+ if (m_cardPresent) {
return m_cardCertificates;
- else
+ }
+ else {
return X509CertificatePtrList();
+ }
}
else {
return X509CertificatePtrList();
@@ -458,5 +462,53 @@ void TDECryptographicCardDevice::cardStatusChanged(TQString status, TQString atr
}
}
+int TDECryptographicCardDevice::createNewSecretRSAKeyFromCertificate(TQByteArray &plaintext, TQByteArray &ciphertext, X509* certificate) {
+ unsigned int i;
+ int retcode = -1;
+
+ // Extract public key from X509 certificate
+ EVP_PKEY* x509_pubkey = NULL;
+ RSA* rsa_pubkey = NULL;
+ x509_pubkey = X509_get_pubkey(certificate);
+ if (x509_pubkey) {
+ rsa_pubkey = EVP_PKEY_get1_RSA(x509_pubkey);
+ }
+
+ if (rsa_pubkey) {
+ // Determine encryption parameters
+ // NOTE
+ // RSA_PKCS1_OAEP_PADDING is preferred but cannot be decoded from
+ // the command line via openssl at this time of this writing.
+ int rsa_padding_style = RSA_PKCS1_PADDING;
+ unsigned int rsa_length = RSA_size(rsa_pubkey);
+ unsigned int max_key_length = rsa_length - 41;
+
+ // Create a new random key as the plaintext
+ plaintext.resize(max_key_length);
+ for (i=0; i < max_key_length; i++) {
+ plaintext[i] = TDEApplication::random();
+ }
+
+ // Encrypt data
+ ciphertext.resize(rsa_length);
+ if (RSA_public_encrypt(plaintext.size(), (unsigned char *)plaintext.data(), (unsigned char *)ciphertext.data(), rsa_pubkey, rsa_padding_style) < 0) {
+ retcode = -2;
+ }
+
+ // Success!
+ retcode = 0;
+ }
+
+ // Clean up
+ if (rsa_pubkey) {
+ RSA_free(rsa_pubkey);
+ }
+ if (x509_pubkey) {
+ EVP_PKEY_free(x509_pubkey);
+ }
+
+ return retcode;
+}
+
#include "tdecryptographiccarddevice.moc"
#include "tdecryptographiccarddevice_private.moc"