line |
stmt |
bran |
cond |
sub |
pod |
time |
code |
1
|
|
|
|
|
|
|
package Crypt::PKCS11::Easy; |
2
|
|
|
|
|
|
|
$Crypt::PKCS11::Easy::VERSION = '0.172091'; |
3
|
|
|
|
|
|
|
# ABSTRACT: Wrapper around Crypt::PKCS11 to make using a HSM not suck |
4
|
|
|
|
|
|
|
|
5
|
1
|
|
|
1
|
|
170975
|
use v5.16.3; # CentOS7 |
|
1
|
|
|
|
|
4
|
|
6
|
1
|
|
|
1
|
|
636
|
use Crypt::PKCS11 qw/:constant_names :constant/; |
|
1
|
|
|
|
|
73850
|
|
|
1
|
|
|
|
|
3993
|
|
7
|
1
|
|
|
1
|
|
1025
|
use Crypt::PKCS11::Attributes; |
|
1
|
|
|
|
|
285531
|
|
|
1
|
|
|
|
|
38
|
|
8
|
1
|
|
|
1
|
|
493
|
use Log::Any '$log'; |
|
1
|
|
|
|
|
8077
|
|
|
1
|
|
|
|
|
8
|
|
9
|
1
|
|
|
1
|
|
2015
|
use Path::Tiny; |
|
1
|
|
|
|
|
3
|
|
|
1
|
|
|
|
|
70
|
|
10
|
1
|
|
|
1
|
|
430
|
use Safe::Isa; |
|
1
|
|
|
|
|
397
|
|
|
1
|
|
|
|
|
115
|
|
11
|
1
|
|
|
1
|
|
7
|
use Try::Tiny; |
|
1
|
|
|
|
|
2
|
|
|
1
|
|
|
|
|
52
|
|
12
|
1
|
|
|
1
|
|
862
|
use Types::Standard qw/ArrayRef Str/; |
|
1
|
|
|
|
|
109110
|
|
|
1
|
|
|
|
|
14
|
|
13
|
1
|
|
|
1
|
|
2994
|
use Types::Path::Tiny 'AbsFile'; |
|
1
|
|
|
|
|
34825
|
|
|
1
|
|
|
|
|
13
|
|
14
|
1
|
|
|
1
|
|
449
|
use version; |
|
1
|
|
|
|
|
3
|
|
|
1
|
|
|
|
|
10
|
|
15
|
1
|
|
|
1
|
|
66
|
use Moo; |
|
1
|
|
|
|
|
2
|
|
|
1
|
|
|
|
|
9
|
|
16
|
1
|
|
|
1
|
|
1261
|
use namespace::clean; |
|
1
|
|
|
|
|
10991
|
|
|
1
|
|
|
|
|
6
|
|
17
|
|
|
|
|
|
|
|
18
|
1
|
|
|
1
|
|
10433
|
use experimental 'smartmatch'; |
|
1
|
|
|
|
|
1133
|
|
|
1
|
|
|
|
|
5
|
|
19
|
|
|
|
|
|
|
|
20
|
1
|
|
|
1
|
|
69
|
use constant MAX_CHUNK_SIZE => 1024; |
|
1
|
|
|
|
|
2
|
|
|
1
|
|
|
|
|
767
|
|
21
|
|
|
|
|
|
|
|
22
|
|
|
|
|
|
|
|
23
|
|
|
|
|
|
|
has module => ( |
24
|
|
|
|
|
|
|
is => 'ro', |
25
|
|
|
|
|
|
|
required => 1, |
26
|
|
|
|
|
|
|
isa => Str, |
27
|
|
|
|
|
|
|
); |
28
|
|
|
|
|
|
|
|
29
|
|
|
|
|
|
|
has _module => ( |
30
|
|
|
|
|
|
|
is => 'ro', |
31
|
|
|
|
|
|
|
lazy => 1, |
32
|
|
|
|
|
|
|
default => sub { |
33
|
|
|
|
|
|
|
my $self = shift; |
34
|
|
|
|
|
|
|
|
35
|
|
|
|
|
|
|
# is module already a Path::Tiny object? |
36
|
|
|
|
|
|
|
return $self->module if $self->module->$_isa('Path::Tiny'); |
37
|
|
|
|
|
|
|
|
38
|
|
|
|
|
|
|
# does module look like a path? |
39
|
|
|
|
|
|
|
return path($self->module)->absolute if $self->module =~ m|/|; |
40
|
|
|
|
|
|
|
|
41
|
|
|
|
|
|
|
# TODO care about non-linux? |
42
|
|
|
|
|
|
|
# just a string, lets try to find a module |
43
|
|
|
|
|
|
|
my $module_name = sprintf '%s.so', $self->module; |
44
|
|
|
|
|
|
|
my $full_module_path; |
45
|
|
|
|
|
|
|
for (@{$self->_module_dirs}) { |
46
|
|
|
|
|
|
|
next unless $_->child($module_name)->is_file; |
47
|
|
|
|
|
|
|
$full_module_path = $_->child($module_name); |
48
|
|
|
|
|
|
|
} |
49
|
|
|
|
|
|
|
if (!$full_module_path) { |
50
|
|
|
|
|
|
|
die 'Unable to find a module for ' . $self->module; |
51
|
|
|
|
|
|
|
} |
52
|
|
|
|
|
|
|
return $full_module_path; |
53
|
|
|
|
|
|
|
}, |
54
|
|
|
|
|
|
|
|
55
|
|
|
|
|
|
|
isa => AbsFile, |
56
|
|
|
|
|
|
|
); |
57
|
|
|
|
|
|
|
|
58
|
|
|
|
|
|
|
|
59
|
|
|
|
|
|
|
has rw => (is => 'ro', default => 0); |
60
|
|
|
|
|
|
|
|
61
|
|
|
|
|
|
|
|
62
|
|
|
|
|
|
|
has key => (is => 'ro', predicate => 1); |
63
|
|
|
|
|
|
|
|
64
|
|
|
|
|
|
|
|
65
|
|
|
|
|
|
|
has function => (is => 'ro', default => 'sign'); |
66
|
|
|
|
|
|
|
|
67
|
|
|
|
|
|
|
|
68
|
|
|
|
|
|
|
has slot => (is => 'lazy'); |
69
|
|
|
|
|
|
|
|
70
|
|
|
|
|
|
|
|
71
|
|
|
|
|
|
|
has token => (is => 'ro', predicate => 1); |
72
|
|
|
|
|
|
|
|
73
|
|
|
|
|
|
|
|
74
|
|
|
|
|
|
|
has pin => (is => 'ro', required => 0); |
75
|
|
|
|
|
|
|
|
76
|
|
|
|
|
|
|
|
77
|
|
|
|
|
|
|
has module_dirs => ( |
78
|
|
|
|
|
|
|
is => 'ro', |
79
|
|
|
|
|
|
|
lazy => 1, |
80
|
|
|
|
|
|
|
isa => ArrayRef, |
81
|
|
|
|
|
|
|
default => sub { |
82
|
|
|
|
|
|
|
[ |
83
|
|
|
|
|
|
|
'/usr/lib64/pkcs11/', '/usr/lib/pkcs11', |
84
|
|
|
|
|
|
|
'/usr/lib/x86_64-linux-gnu/pkcs11/' |
85
|
|
|
|
|
|
|
]; |
86
|
|
|
|
|
|
|
}, |
87
|
|
|
|
|
|
|
); |
88
|
|
|
|
|
|
|
|
89
|
|
|
|
|
|
|
has _pkcs11 => (is => 'rwp'); |
90
|
|
|
|
|
|
|
|
91
|
|
|
|
|
|
|
has _key => (is => 'lazy'); |
92
|
|
|
|
|
|
|
|
93
|
|
|
|
|
|
|
# to keep usage simple, only allowed one session per object |
94
|
|
|
|
|
|
|
has _session => (is => 'lazy', predicate => 1); |
95
|
|
|
|
|
|
|
|
96
|
|
|
|
|
|
|
# TODO allow overriding defaults, possibly using predefined groups of related mechs |
97
|
|
|
|
|
|
|
has _default_mech => ( |
98
|
|
|
|
|
|
|
is => 'ro', |
99
|
|
|
|
|
|
|
default => sub { |
100
|
|
|
|
|
|
|
{ |
101
|
|
|
|
|
|
|
digest => CKM_SHA_1, |
102
|
|
|
|
|
|
|
encrypt => CKM_RSA_PKCS, |
103
|
|
|
|
|
|
|
sign => CKM_SHA1_RSA_PKCS, |
104
|
|
|
|
|
|
|
verify => CKM_SHA1_RSA_PKCS, |
105
|
|
|
|
|
|
|
|
106
|
|
|
|
|
|
|
}; |
107
|
|
|
|
|
|
|
}, |
108
|
|
|
|
|
|
|
); |
109
|
|
|
|
|
|
|
|
110
|
|
|
|
|
|
|
has _module_dirs => ( |
111
|
|
|
|
|
|
|
is => 'ro', |
112
|
|
|
|
|
|
|
lazy => 1, |
113
|
|
|
|
|
|
|
default => sub { |
114
|
|
|
|
|
|
|
my $self = shift; |
115
|
|
|
|
|
|
|
my @paths; |
116
|
|
|
|
|
|
|
for (@{$self->module_dirs}) { |
117
|
|
|
|
|
|
|
my $path = path($_)->absolute; |
118
|
|
|
|
|
|
|
push @paths, $path if $path->is_dir; |
119
|
|
|
|
|
|
|
} |
120
|
|
|
|
|
|
|
die "No valid module paths found\n" if scalar @paths == 0; |
121
|
|
|
|
|
|
|
return \@paths; |
122
|
|
|
|
|
|
|
}, |
123
|
|
|
|
|
|
|
); |
124
|
|
|
|
|
|
|
|
125
|
|
|
|
|
|
|
has _flags => ( |
126
|
|
|
|
|
|
|
is => 'ro', |
127
|
|
|
|
|
|
|
lazy => 1, |
128
|
|
|
|
|
|
|
default => sub { |
129
|
|
|
|
|
|
|
{ |
130
|
|
|
|
|
|
|
token => [ |
131
|
|
|
|
|
|
|
qw/rng write_protected login_required user_pin_initialized |
132
|
|
|
|
|
|
|
restore_key_not_needed clock_on_token protected_authentication_path |
133
|
|
|
|
|
|
|
dual_crypto_operations token_initialized secondary_authentication |
134
|
|
|
|
|
|
|
user_pin_count_low user_pin_final_try user_pin_locked so_pin_count_low |
135
|
|
|
|
|
|
|
user_pin_to_be_changed so_pin_final_try so_pin_locked so_pin_to_be_changed |
136
|
|
|
|
|
|
|
error_state |
137
|
|
|
|
|
|
|
/ |
138
|
|
|
|
|
|
|
], |
139
|
|
|
|
|
|
|
mechanism => [ |
140
|
|
|
|
|
|
|
qw/hw encrypt decrypt digest sign sign_recover verify verify_recover generate generate_key_pair wrap unwrap derive extension/ |
141
|
|
|
|
|
|
|
], |
142
|
|
|
|
|
|
|
slot => [qw/token_present removable_device hw_slot/], |
143
|
|
|
|
|
|
|
}; |
144
|
|
|
|
|
|
|
}, |
145
|
|
|
|
|
|
|
); |
146
|
|
|
|
|
|
|
|
147
|
|
|
|
|
|
|
has [qw/_token_flags _mechanism_flags _slot_flags/] => (is => 'lazy'); |
148
|
|
|
|
|
|
|
|
149
|
|
|
|
|
|
|
has _sig_length => ( |
150
|
|
|
|
|
|
|
is => 'ro', |
151
|
|
|
|
|
|
|
lazy => 1, |
152
|
|
|
|
|
|
|
default => sub { |
153
|
|
|
|
|
|
|
{ |
154
|
|
|
|
|
|
|
1 => 20, |
155
|
|
|
|
|
|
|
224 => 28, |
156
|
|
|
|
|
|
|
256 => 32, |
157
|
|
|
|
|
|
|
384 => 48, |
158
|
|
|
|
|
|
|
512 => 64, |
159
|
|
|
|
|
|
|
}; |
160
|
|
|
|
|
|
|
}, |
161
|
|
|
|
|
|
|
); |
162
|
|
|
|
|
|
|
|
163
|
|
|
|
|
|
|
sub _build__mechanism_flags { |
164
|
0
|
|
|
0
|
|
0
|
_flags_to_hash($_[0]->_flags->{mechanism}); |
165
|
|
|
|
|
|
|
} |
166
|
|
|
|
|
|
|
|
167
|
|
|
|
|
|
|
sub _build__token_flags { |
168
|
0
|
|
|
0
|
|
0
|
_flags_to_hash($_[0]->_flags->{token}); |
169
|
|
|
|
|
|
|
} |
170
|
|
|
|
|
|
|
|
171
|
|
|
|
|
|
|
sub _build__slot_flags { |
172
|
0
|
|
|
0
|
|
0
|
_flags_to_hash($_[0]->_flags->{slot}); |
173
|
|
|
|
|
|
|
} |
174
|
|
|
|
|
|
|
|
175
|
|
|
|
|
|
|
sub BUILD { |
176
|
4
|
|
|
4
|
0
|
298
|
my $self = shift; |
177
|
4
|
|
|
|
|
17
|
return $self->_set__pkcs11($self->_build__pkcs11); |
178
|
|
|
|
|
|
|
} |
179
|
|
|
|
|
|
|
|
180
|
|
|
|
|
|
|
sub _flags_to_hash { |
181
|
0
|
|
|
0
|
|
0
|
my $flags = shift; |
182
|
1
|
|
|
1
|
|
7
|
no strict 'refs'; ## no critic |
|
1
|
|
|
|
|
4
|
|
|
1
|
|
|
|
|
2695
|
|
183
|
|
|
|
|
|
|
my %flag = map { |
184
|
0
|
|
|
|
|
0
|
my $f = 'Crypt::PKCS11::CKF_' . uc($_); |
|
0
|
|
|
|
|
0
|
|
185
|
0
|
|
|
|
|
0
|
$f->() => $_; |
186
|
|
|
|
|
|
|
} @$flags; |
187
|
|
|
|
|
|
|
|
188
|
0
|
|
|
|
|
0
|
return \%flag; |
189
|
|
|
|
|
|
|
} |
190
|
|
|
|
|
|
|
|
191
|
|
|
|
|
|
|
sub _build__pkcs11 { |
192
|
4
|
|
|
4
|
|
10
|
my $self = shift; |
193
|
|
|
|
|
|
|
|
194
|
4
|
|
|
|
|
27
|
$log->debug('Initialising PKCS#11...'); |
195
|
|
|
|
|
|
|
|
196
|
|
|
|
|
|
|
# Create the main PKCS #11 object, load a PKCS #11 provider .so library and initialize the module |
197
|
4
|
|
|
|
|
37
|
my $pkcs11 = Crypt::PKCS11->new; |
198
|
|
|
|
|
|
|
|
199
|
4
|
50
|
|
|
|
220
|
$pkcs11->load($self->_module) |
200
|
|
|
|
|
|
|
or die sprintf "Failed to load PKCS11 module [%s]: %s\n", |
201
|
|
|
|
|
|
|
$self->_module, $pkcs11->errstr; |
202
|
|
|
|
|
|
|
|
203
|
0
|
0
|
|
|
|
|
$pkcs11->Initialize |
204
|
|
|
|
|
|
|
or die sprintf "Failed to initialize PKCS11 module [%s]: %s\n", |
205
|
|
|
|
|
|
|
$self->_module, $pkcs11->errstr; |
206
|
|
|
|
|
|
|
|
207
|
0
|
|
|
|
|
|
$log->debug("Loaded PKCS#11 module: " . $self->_module); |
208
|
|
|
|
|
|
|
|
209
|
0
|
|
|
|
|
|
return $pkcs11; |
210
|
|
|
|
|
|
|
} |
211
|
|
|
|
|
|
|
|
212
|
|
|
|
|
|
|
sub _build__key { |
213
|
0
|
|
|
0
|
|
|
my $self = shift; |
214
|
0
|
0
|
|
|
|
|
if (!$self->has_key) { |
215
|
0
|
|
|
|
|
|
die 'Tried to automagically find a key without a label'; |
216
|
|
|
|
|
|
|
} |
217
|
|
|
|
|
|
|
|
218
|
0
|
|
|
|
|
|
$self->login; |
219
|
|
|
|
|
|
|
|
220
|
0
|
|
|
|
|
|
my $tmpl = Crypt::PKCS11::Attributes->new; |
221
|
|
|
|
|
|
|
|
222
|
0
|
|
|
|
|
|
given ($self->function) { |
223
|
0
|
|
|
|
|
|
return $self->get_signing_key($self->key) when 'sign'; |
224
|
0
|
|
|
|
|
|
return $self->get_verification_key($self->key) when 'verify'; |
225
|
0
|
|
|
|
|
|
return $self->get_encryption_key($self->key) when 'encrypt'; |
226
|
0
|
|
|
|
|
|
default { |
227
|
0
|
|
|
|
|
|
die "Unknown key type: " . $self->function; |
228
|
|
|
|
|
|
|
} |
229
|
|
|
|
|
|
|
} |
230
|
|
|
|
|
|
|
|
231
|
|
|
|
|
|
|
} |
232
|
|
|
|
|
|
|
|
233
|
|
|
|
|
|
|
sub _build_slot { |
234
|
0
|
|
|
0
|
|
|
my $self = shift; |
235
|
|
|
|
|
|
|
|
236
|
|
|
|
|
|
|
# if token is set we can try to find a slot that contains that token |
237
|
0
|
0
|
|
|
|
|
if ($self->has_token) { |
238
|
0
|
|
|
|
|
|
my $slot = $self->get_slot(token => $self->token); |
239
|
0
|
|
|
|
|
|
return $slot->{id}; |
240
|
|
|
|
|
|
|
} |
241
|
|
|
|
|
|
|
|
242
|
0
|
0
|
|
|
|
|
my $slot_ids = $self->_pkcs11->GetSlotList(1) |
243
|
|
|
|
|
|
|
or die 'Unable to find any available slots: ' . $self->_pkcs11->errstr; |
244
|
|
|
|
|
|
|
|
245
|
0
|
0
|
|
|
|
|
if (scalar @$slot_ids > 1) { |
246
|
0
|
|
|
|
|
|
die 'There is more than one slot available, specify the one to use'; |
247
|
|
|
|
|
|
|
} |
248
|
|
|
|
|
|
|
|
249
|
0
|
|
|
|
|
|
return shift @$slot_ids; |
250
|
|
|
|
|
|
|
} |
251
|
|
|
|
|
|
|
|
252
|
|
|
|
|
|
|
sub _build__session { |
253
|
0
|
|
|
0
|
|
|
my $self = shift; |
254
|
|
|
|
|
|
|
|
255
|
|
|
|
|
|
|
# if this isn't called the Luna always gives UNKNOWN_ERROR when trying |
256
|
|
|
|
|
|
|
# to open a session |
257
|
0
|
|
|
|
|
|
$self->_pkcs11->CloseAllSessions($self->slot); |
258
|
|
|
|
|
|
|
|
259
|
|
|
|
|
|
|
# default to a ro session |
260
|
0
|
|
|
|
|
|
my $flags; |
261
|
0
|
0
|
|
|
|
|
if ($self->rw) { |
262
|
0
|
|
|
|
|
|
$log->debug('Opening a RW session'); |
263
|
0
|
|
|
|
|
|
$flags = CKF_RW_SESSION | CKF_SERIAL_SESSION; |
264
|
|
|
|
|
|
|
} else { |
265
|
0
|
|
|
|
|
|
$log->debug('Opening a RO session'); |
266
|
0
|
|
|
|
|
|
$flags = CKF_SERIAL_SESSION; |
267
|
|
|
|
|
|
|
} |
268
|
|
|
|
|
|
|
|
269
|
0
|
0
|
|
|
|
|
my $session = $self->_pkcs11->OpenSession($self->slot, $flags) |
270
|
|
|
|
|
|
|
or die sprintf 'Error opening session on slot %s: %s', $self->slot, |
271
|
|
|
|
|
|
|
$self->_pkcs11->errstr; |
272
|
|
|
|
|
|
|
|
273
|
0
|
|
|
|
|
|
$log->debug('Session opened on slot ' . $self->slot); |
274
|
0
|
|
|
|
|
|
return $session; |
275
|
|
|
|
|
|
|
} |
276
|
|
|
|
|
|
|
|
277
|
|
|
|
|
|
|
sub _clean_hash_values { |
278
|
0
|
|
|
0
|
|
|
my $h = shift; |
279
|
|
|
|
|
|
|
|
280
|
0
|
|
|
|
|
|
for (keys %$h) { |
281
|
|
|
|
|
|
|
|
282
|
0
|
0
|
|
|
|
|
if ($_ =~ /^(firmware|hardware|library|cryptoki)Version$/) { |
283
|
0
|
|
|
|
|
|
my $v = sprintf '%i.%i', $h->{$_}->{major}, $h->{$_}->{minor}; |
284
|
0
|
|
|
|
|
|
$h->{$_} = version->parse($v); |
285
|
0
|
|
|
|
|
|
next; |
286
|
|
|
|
|
|
|
} |
287
|
|
|
|
|
|
|
|
288
|
0
|
0
|
|
|
|
|
next if ref $h->{$_}; |
289
|
|
|
|
|
|
|
|
290
|
0
|
|
|
|
|
|
$h->{$_} =~ |
291
|
|
|
|
|
|
|
s/\0$//; # safenet cryptoki 2.2 has some null terminated strings |
292
|
0
|
|
|
|
|
|
$h->{$_} =~ s/\s*$//; |
293
|
0
|
0
|
|
|
|
|
delete $h->{$_} if length $h->{$_} == 0; |
294
|
|
|
|
|
|
|
} |
295
|
|
|
|
|
|
|
|
296
|
0
|
|
|
|
|
|
return; |
297
|
|
|
|
|
|
|
} |
298
|
|
|
|
|
|
|
|
299
|
|
|
|
|
|
|
|
300
|
|
|
|
|
|
|
sub get_info { |
301
|
0
|
|
|
0
|
1
|
|
my $self = shift; |
302
|
|
|
|
|
|
|
|
303
|
0
|
0
|
|
|
|
|
my $info = $self->_pkcs11->GetInfo |
304
|
|
|
|
|
|
|
or die 'Could not retrieve HSM info: ' . $self->_pkcs11->errstr; |
305
|
|
|
|
|
|
|
|
306
|
|
|
|
|
|
|
# according to v2.30 there are no flags and this is always 0 |
307
|
0
|
|
|
|
|
|
delete $info->{flags}; |
308
|
0
|
|
|
|
|
|
_clean_hash_values($info); |
309
|
0
|
|
|
|
|
|
return $info; |
310
|
|
|
|
|
|
|
} |
311
|
|
|
|
|
|
|
|
312
|
|
|
|
|
|
|
|
313
|
|
|
|
|
|
|
sub get_token_info { |
314
|
0
|
|
|
0
|
1
|
|
my ($self, $slot_id) = @_; |
315
|
|
|
|
|
|
|
|
316
|
0
|
0
|
|
|
|
|
my $token = $self->_pkcs11->GetTokenInfo($slot_id) |
317
|
|
|
|
|
|
|
or die "Unable to retrive token info for slot $slot_id: " |
318
|
|
|
|
|
|
|
. $self->_pkcs11->errstr; |
319
|
|
|
|
|
|
|
|
320
|
0
|
|
|
|
|
|
_clean_hash_values($token); |
321
|
|
|
|
|
|
|
|
322
|
0
|
|
|
|
|
|
for my $f (keys %{$self->_token_flags}) { |
|
0
|
|
|
|
|
|
|
323
|
|
|
|
|
|
|
$token->{flag}->{$self->_token_flags->{$f}} = |
324
|
0
|
0
|
|
|
|
|
($token->{flags} & $f) ? 1 : 0; |
325
|
|
|
|
|
|
|
} |
326
|
|
|
|
|
|
|
|
327
|
0
|
|
|
|
|
|
delete $token->{flags}; |
328
|
|
|
|
|
|
|
|
329
|
0
|
|
|
|
|
|
return $token; |
330
|
|
|
|
|
|
|
} |
331
|
|
|
|
|
|
|
|
332
|
|
|
|
|
|
|
|
333
|
|
|
|
|
|
|
sub get_slot { |
334
|
0
|
|
|
0
|
1
|
|
my ($self, %arg) = @_; |
335
|
|
|
|
|
|
|
|
336
|
0
|
0
|
0
|
|
|
|
unless (defined $arg{id} || defined $arg{token}) { |
337
|
0
|
|
|
|
|
|
die 'Missing id or token'; |
338
|
|
|
|
|
|
|
} |
339
|
|
|
|
|
|
|
|
340
|
0
|
|
|
|
|
|
my ($slot, $slot_id); |
341
|
|
|
|
|
|
|
|
342
|
0
|
0
|
|
|
|
|
if (defined $arg{id}) { |
|
|
0
|
|
|
|
|
|
343
|
|
|
|
|
|
|
|
344
|
0
|
|
|
|
|
|
$log->debug("Retrieving info for slot $arg{id}"); |
345
|
|
|
|
|
|
|
$slot = $self->_pkcs11->GetSlotInfo($arg{id}) |
346
|
0
|
0
|
|
|
|
|
or die "Unable to retrieve info for slot $arg{id}: " |
347
|
|
|
|
|
|
|
. $self->_pkcs11->errstr; |
348
|
0
|
|
|
|
|
|
$slot_id = $arg{id}; |
349
|
|
|
|
|
|
|
|
350
|
|
|
|
|
|
|
} elsif ($arg{token}) { |
351
|
|
|
|
|
|
|
|
352
|
0
|
|
|
|
|
|
$log->debug( |
353
|
|
|
|
|
|
|
"Searching for slot containing token labelled '$arg{token}'"); |
354
|
0
|
|
|
|
|
|
my $slots = $self->get_slots(1); |
355
|
0
|
|
|
|
|
|
for (@$slots) { |
356
|
0
|
0
|
0
|
|
|
|
if ($_->{token}->{label} && $arg{token} eq $_->{token}->{label}) { |
357
|
0
|
|
|
|
|
|
return $_; |
358
|
|
|
|
|
|
|
|
359
|
|
|
|
|
|
|
# last; |
360
|
|
|
|
|
|
|
} |
361
|
|
|
|
|
|
|
} |
362
|
0
|
0
|
|
|
|
|
die "Unable to find slot containing token labelled '$arg{token}'" |
363
|
|
|
|
|
|
|
unless $slot; |
364
|
|
|
|
|
|
|
} |
365
|
|
|
|
|
|
|
|
366
|
|
|
|
|
|
|
# strip whitespace padding |
367
|
0
|
|
|
|
|
|
_clean_hash_values($slot); |
368
|
|
|
|
|
|
|
|
369
|
0
|
|
|
|
|
|
$slot->{id} = $slot_id; |
370
|
0
|
|
|
|
|
|
for my $f (keys %{$self->_slot_flags}) { |
|
0
|
|
|
|
|
|
|
371
|
|
|
|
|
|
|
$slot->{flag}->{$self->_slot_flags->{$f}} = |
372
|
0
|
0
|
|
|
|
|
($slot->{flags} & $f) ? 1 : 0; |
373
|
|
|
|
|
|
|
} |
374
|
|
|
|
|
|
|
|
375
|
0
|
|
|
|
|
|
delete $slot->{flags}; |
376
|
|
|
|
|
|
|
|
377
|
0
|
0
|
|
|
|
|
if ($slot->{flag}->{token_present}) { |
378
|
|
|
|
|
|
|
try { |
379
|
0
|
|
|
0
|
|
|
$slot->{token} = $self->get_token_info($slot_id); |
380
|
|
|
|
|
|
|
} |
381
|
|
|
|
|
|
|
catch { |
382
|
|
|
|
|
|
|
# there is a token present in this slot but details could not be retrieved. |
383
|
|
|
|
|
|
|
# SoftHSM doesn't require an open session to work, but the Safenet Luna does |
384
|
|
|
|
|
|
|
# the 2.20 docs don't show that a session is required... |
385
|
0
|
|
|
0
|
|
|
$log->debug("Failed to access slot, trying to open a session"); |
386
|
0
|
|
|
|
|
|
my $session; |
387
|
0
|
0
|
|
|
|
|
if ($self->_has_session) { |
388
|
0
|
|
|
|
|
|
$session = $self->session; |
389
|
|
|
|
|
|
|
} else { |
390
|
0
|
0
|
|
|
|
|
$session = |
391
|
|
|
|
|
|
|
$self->_pkcs11->OpenSession($slot_id, CKF_SERIAL_SESSION) |
392
|
|
|
|
|
|
|
or die "Error opening session on slot $slot_id: " |
393
|
|
|
|
|
|
|
. $self->_pkcs11->errstr; |
394
|
|
|
|
|
|
|
} |
395
|
0
|
|
|
|
|
|
$slot->{token} = $self->get_token_info($slot_id); |
396
|
|
|
|
|
|
|
|
397
|
0
|
|
|
|
|
|
$session->CloseSession; |
398
|
0
|
|
|
|
|
|
}; |
399
|
|
|
|
|
|
|
} |
400
|
|
|
|
|
|
|
|
401
|
0
|
|
|
|
|
|
return $slot; |
402
|
|
|
|
|
|
|
} |
403
|
|
|
|
|
|
|
|
404
|
|
|
|
|
|
|
|
405
|
|
|
|
|
|
|
sub get_slots { |
406
|
0
|
|
|
0
|
1
|
|
my ($self, $with_token) = @_; |
407
|
|
|
|
|
|
|
|
408
|
0
|
0
|
|
|
|
|
my $slot_ids = $self->_pkcs11->GetSlotList($with_token) |
409
|
|
|
|
|
|
|
or die 'Unable to find any available slots: ' . $self->_pkcs11->errstr; |
410
|
|
|
|
|
|
|
|
411
|
0
|
|
|
|
|
|
my @slots; |
412
|
0
|
|
|
|
|
|
for my $slot_id (sort @$slot_ids) { |
413
|
0
|
|
|
|
|
|
my $slot = $self->get_slot(id => $slot_id); |
414
|
0
|
|
|
|
|
|
push @slots, $slot; |
415
|
|
|
|
|
|
|
} |
416
|
|
|
|
|
|
|
|
417
|
0
|
|
|
|
|
|
return \@slots; |
418
|
|
|
|
|
|
|
} |
419
|
|
|
|
|
|
|
|
420
|
|
|
|
|
|
|
|
421
|
|
|
|
|
|
|
sub login { |
422
|
0
|
|
|
0
|
1
|
|
my $self = shift; |
423
|
|
|
|
|
|
|
|
424
|
0
|
|
|
|
|
|
my $pin; |
425
|
|
|
|
|
|
|
|
426
|
0
|
|
|
|
|
|
given (ref $self->pin) { |
427
|
0
|
|
|
|
|
|
when ('CODE') { |
428
|
0
|
|
|
|
|
|
$log->debug('Getting PIN from coderef'); |
429
|
0
|
|
|
|
|
|
$pin = $self->pin->(); |
430
|
|
|
|
|
|
|
} |
431
|
0
|
|
|
|
|
|
when ('Path::Tiny') { |
432
|
0
|
|
|
|
|
|
$log->debug("Reading PIN from file: " . $self->pin); |
433
|
0
|
|
|
|
|
|
$pin = $self->pin->slurp; |
434
|
|
|
|
|
|
|
} |
435
|
0
|
|
|
|
|
|
default { $pin = $self->pin } |
|
0
|
|
|
|
|
|
|
436
|
|
|
|
|
|
|
} |
437
|
|
|
|
|
|
|
|
438
|
0
|
0
|
|
|
|
|
die 'No PIN/password specified and no way to get one is set' unless $pin; |
439
|
|
|
|
|
|
|
|
440
|
0
|
|
|
|
|
|
chomp $pin; |
441
|
|
|
|
|
|
|
|
442
|
0
|
|
|
|
|
|
$log->debug('Logging in to session'); |
443
|
0
|
0
|
|
|
|
|
$self->_session->Login(CKU_USER, $pin) |
444
|
|
|
|
|
|
|
or die "Failed to login: " . $self->_session->errstr; |
445
|
|
|
|
|
|
|
|
446
|
0
|
|
|
|
|
|
return; |
447
|
|
|
|
|
|
|
} |
448
|
|
|
|
|
|
|
|
449
|
|
|
|
|
|
|
sub _get_key { |
450
|
0
|
|
|
0
|
|
|
my ($self, $label, $tmpl) = @_; |
451
|
|
|
|
|
|
|
|
452
|
0
|
|
|
|
|
|
$log->debug("Searching for key with label: $label"); |
453
|
0
|
|
|
|
|
|
$tmpl->push(Crypt::PKCS11::Attribute::Label->new->set($label)); |
454
|
0
|
|
|
|
|
|
$self->_session->FindObjectsInit($tmpl); |
455
|
|
|
|
|
|
|
|
456
|
|
|
|
|
|
|
# labels are supposed to be unique |
457
|
0
|
0
|
|
|
|
|
my $objects = $self->_session->FindObjects(1) |
458
|
|
|
|
|
|
|
or die "Couldn't find any key matching label $label: " |
459
|
|
|
|
|
|
|
. $self->_session->errstr; |
460
|
|
|
|
|
|
|
|
461
|
0
|
|
|
|
|
|
$self->_session->FindObjectsFinal; |
462
|
|
|
|
|
|
|
|
463
|
|
|
|
|
|
|
# pulObjectCount down in the XS would tell us how many results were returned |
464
|
0
|
0
|
|
|
|
|
if (scalar @$objects == 0) { |
465
|
0
|
|
|
|
|
|
die "Failed to find a key matching label $label"; |
466
|
|
|
|
|
|
|
} |
467
|
|
|
|
|
|
|
|
468
|
0
|
|
|
|
|
|
$log->debug("Found key $label"); |
469
|
0
|
|
|
|
|
|
return shift @$objects; |
470
|
|
|
|
|
|
|
} |
471
|
|
|
|
|
|
|
|
472
|
|
|
|
|
|
|
|
473
|
|
|
|
|
|
|
sub get_signing_key { |
474
|
0
|
|
|
0
|
1
|
|
my ($self, $label) = @_; |
475
|
|
|
|
|
|
|
|
476
|
0
|
|
|
|
|
|
my $tmpl = |
477
|
|
|
|
|
|
|
Crypt::PKCS11::Attributes->new->push( |
478
|
|
|
|
|
|
|
Crypt::PKCS11::Attribute::Sign->new->set(1), |
479
|
|
|
|
|
|
|
); |
480
|
|
|
|
|
|
|
|
481
|
0
|
|
|
|
|
|
return $self->_get_key($label, $tmpl); |
482
|
|
|
|
|
|
|
} |
483
|
|
|
|
|
|
|
|
484
|
|
|
|
|
|
|
|
485
|
|
|
|
|
|
|
sub get_verification_key { |
486
|
0
|
|
|
0
|
1
|
|
my ($self, $label) = @_; |
487
|
|
|
|
|
|
|
|
488
|
0
|
|
|
|
|
|
my $tmpl = |
489
|
|
|
|
|
|
|
Crypt::PKCS11::Attributes->new->push( |
490
|
|
|
|
|
|
|
Crypt::PKCS11::Attribute::Verify->new->set(1), |
491
|
|
|
|
|
|
|
); |
492
|
|
|
|
|
|
|
|
493
|
0
|
|
|
|
|
|
return $self->_get_key($label, $tmpl); |
494
|
|
|
|
|
|
|
} |
495
|
|
|
|
|
|
|
|
496
|
|
|
|
|
|
|
|
497
|
|
|
|
|
|
|
sub get_encryption_key { |
498
|
0
|
|
|
0
|
1
|
|
my ($self, $label) = @_; |
499
|
|
|
|
|
|
|
|
500
|
0
|
|
|
|
|
|
$log->debug('Looking for an encryption key'); |
501
|
|
|
|
|
|
|
|
502
|
0
|
|
|
|
|
|
my $tmpl = |
503
|
|
|
|
|
|
|
Crypt::PKCS11::Attributes->new->push( |
504
|
|
|
|
|
|
|
Crypt::PKCS11::Attribute::Encrypt->new->set(1), |
505
|
|
|
|
|
|
|
); |
506
|
|
|
|
|
|
|
|
507
|
0
|
|
|
|
|
|
return $self->_get_key($label, $tmpl); |
508
|
|
|
|
|
|
|
} |
509
|
|
|
|
|
|
|
|
510
|
|
|
|
|
|
|
sub _get_pss_params { |
511
|
0
|
|
|
0
|
|
|
my ($self, $hash, $hash_number) = @_; |
512
|
|
|
|
|
|
|
|
513
|
0
|
|
|
|
|
|
$log->debug("Finding params for a $hash RSA PSS signature"); |
514
|
|
|
|
|
|
|
|
515
|
|
|
|
|
|
|
# comes in bits, need bytes. Instead of simply dividing by 8 we use a mapping |
516
|
|
|
|
|
|
|
# hash to verify that the length is correct |
517
|
0
|
|
|
|
|
|
my $sig_length = $self->_sig_length->{$hash_number}; |
518
|
0
|
0
|
|
|
|
|
unless ($sig_length) { |
519
|
0
|
|
|
|
|
|
die |
520
|
|
|
|
|
|
|
'Unsupported hash type: not SHA1/SHA2-224/SHA2-256/SHA2-384/SHA2-512'; |
521
|
|
|
|
|
|
|
} |
522
|
|
|
|
|
|
|
|
523
|
0
|
|
|
|
|
|
$log->debug("slen $sig_length"); |
524
|
|
|
|
|
|
|
|
525
|
0
|
|
|
|
|
|
my $pss_param = Crypt::PKCS11::CK_RSA_PKCS_PSS_PARAMS->new; |
526
|
|
|
|
|
|
|
|
527
|
1
|
|
|
1
|
|
16
|
no strict 'refs'; ## no critic |
|
1
|
|
|
|
|
5
|
|
|
1
|
|
|
|
|
343
|
|
528
|
0
|
|
|
|
|
|
my $hash_const = 'Crypt::PKCS11::CKM_'; |
529
|
|
|
|
|
|
|
|
530
|
|
|
|
|
|
|
# SHA1 is a special case |
531
|
0
|
0
|
|
|
|
|
$hash_const .= $hash eq 'SHA1' ? 'SHA_1' : $hash; |
532
|
0
|
|
|
|
|
|
$log->debug("Hash constant: $hash_const"); |
533
|
|
|
|
|
|
|
|
534
|
0
|
|
|
|
|
|
my $r = $pss_param->set_hashAlg($hash_const->()); |
535
|
0
|
0
|
|
|
|
|
if ($r != CKR_OK) { |
536
|
0
|
|
|
|
|
|
die 'Failed to set hash algorithm for PSS params: ' |
537
|
|
|
|
|
|
|
. Crypt::PKCS11::XS::rv2str($r); |
538
|
|
|
|
|
|
|
} |
539
|
|
|
|
|
|
|
|
540
|
0
|
|
|
|
|
|
$r = $pss_param->set_sLen($sig_length); |
541
|
0
|
0
|
|
|
|
|
if ($r != CKR_OK) { |
542
|
0
|
|
|
|
|
|
die 'Failed to set sLen on PSS params: ' |
543
|
|
|
|
|
|
|
. Crypt::PKCS11::XS::rv2str($r); |
544
|
|
|
|
|
|
|
} |
545
|
|
|
|
|
|
|
|
546
|
0
|
|
|
|
|
|
my $mgf_const = "Crypt::PKCS11::CKG_MGF1_$hash"; |
547
|
0
|
|
|
|
|
|
$log->debug("MGF constant: $mgf_const"); |
548
|
|
|
|
|
|
|
|
549
|
0
|
|
|
|
|
|
$r = $pss_param->set_mgf($mgf_const->()); |
550
|
0
|
0
|
|
|
|
|
if ($r != CKR_OK) { |
551
|
0
|
|
|
|
|
|
die 'Failed to set MGF on PSS params: ' |
552
|
|
|
|
|
|
|
. Crypt::PKCS11::XS::rv2str($r); |
553
|
|
|
|
|
|
|
} |
554
|
|
|
|
|
|
|
|
555
|
0
|
|
|
|
|
|
return $pss_param; |
556
|
|
|
|
|
|
|
} |
557
|
|
|
|
|
|
|
|
558
|
|
|
|
|
|
|
sub _get_oaep_params { |
559
|
0
|
|
|
0
|
|
|
my ($self) = @_; |
560
|
|
|
|
|
|
|
|
561
|
|
|
|
|
|
|
# SHA1 is the only one supported for now as it is the only one supported by |
562
|
|
|
|
|
|
|
# openssl and softhsm2 |
563
|
|
|
|
|
|
|
# https://github.com/openssl/openssl/blob/master/crypto/rsa/rsa_oaep.c |
564
|
|
|
|
|
|
|
# https://github.com/pspacek/SoftHSMv2/blob/master/src/lib/SoftHSM.cpp#L10173 |
565
|
0
|
|
|
|
|
|
my $hash = 'SHA1'; |
566
|
|
|
|
|
|
|
|
567
|
0
|
|
|
|
|
|
$log->debug('Finding params for an RSA OAEP encryption'); |
568
|
|
|
|
|
|
|
|
569
|
0
|
|
|
|
|
|
my $oaep_param = Crypt::PKCS11::CK_RSA_PKCS_OAEP_PARAMS->new; |
570
|
|
|
|
|
|
|
|
571
|
1
|
|
|
1
|
|
10
|
no strict 'refs'; ## no critic |
|
1
|
|
|
|
|
4
|
|
|
1
|
|
|
|
|
479
|
|
572
|
0
|
|
|
|
|
|
my $hash_const = 'Crypt::PKCS11::CKM_'; |
573
|
|
|
|
|
|
|
|
574
|
|
|
|
|
|
|
# SHA1 is a special case |
575
|
0
|
0
|
|
|
|
|
$hash_const .= $hash eq 'SHA1' ? 'SHA_1' : $hash; |
576
|
0
|
|
|
|
|
|
$log->debug("Hash constant: $hash_const"); |
577
|
|
|
|
|
|
|
|
578
|
0
|
|
|
|
|
|
my $r = $oaep_param->set_hashAlg($hash_const->()); |
579
|
0
|
0
|
|
|
|
|
if ($r != CKR_OK) { |
580
|
0
|
|
|
|
|
|
die 'Failed to set hash algorithm for OAEP params: ' |
581
|
|
|
|
|
|
|
. Crypt::PKCS11::XS::rv2str($r); |
582
|
|
|
|
|
|
|
} |
583
|
|
|
|
|
|
|
|
584
|
0
|
|
|
|
|
|
my $mgf_const = "Crypt::PKCS11::CKG_MGF1_$hash"; |
585
|
0
|
|
|
|
|
|
$log->debug("MGF constant: $mgf_const"); |
586
|
|
|
|
|
|
|
|
587
|
0
|
|
|
|
|
|
$r = $oaep_param->set_mgf($mgf_const->()); |
588
|
0
|
0
|
|
|
|
|
if ($r != CKR_OK) { |
589
|
0
|
|
|
|
|
|
die 'Failed to set MGF on OAEP params: ' |
590
|
|
|
|
|
|
|
. Crypt::PKCS11::XS::rv2str($r); |
591
|
|
|
|
|
|
|
} |
592
|
|
|
|
|
|
|
|
593
|
0
|
|
|
|
|
|
$oaep_param->set_source(CKZ_DATA_SPECIFIED); |
594
|
|
|
|
|
|
|
|
595
|
0
|
|
|
|
|
|
return $oaep_param; |
596
|
|
|
|
|
|
|
} |
597
|
|
|
|
|
|
|
|
598
|
|
|
|
|
|
|
sub _handle_common_args { |
599
|
0
|
|
|
0
|
|
|
my ($self, $args) = @_; |
600
|
|
|
|
|
|
|
|
601
|
0
|
0
|
0
|
|
|
|
unless (exists $args->{file} || exists $args->{data}) { |
602
|
0
|
|
|
|
|
|
die 'Missing filename or data'; |
603
|
|
|
|
|
|
|
} |
604
|
|
|
|
|
|
|
|
605
|
|
|
|
|
|
|
# first, we check if data is coming via a file and read it in |
606
|
0
|
0
|
|
|
|
|
if ($args->{file}) { |
607
|
0
|
|
|
|
|
|
my $file = delete $args->{file}; |
608
|
|
|
|
|
|
|
|
609
|
|
|
|
|
|
|
# a filename or a Path::Tiny object |
610
|
0
|
0
|
|
|
|
|
if (!ref $file) { |
|
|
0
|
|
|
|
|
|
611
|
0
|
|
|
|
|
|
$file = path $file; |
612
|
|
|
|
|
|
|
} elsif (ref $file ne 'Path::Tiny') { |
613
|
0
|
|
|
|
|
|
die "Don't know how to handle a " . ref $file; |
614
|
|
|
|
|
|
|
} |
615
|
0
|
|
|
|
|
|
$args->{data} = $file->slurp_raw; |
616
|
|
|
|
|
|
|
} |
617
|
|
|
|
|
|
|
|
618
|
0
|
0
|
|
|
|
|
return unless exists $args->{mech}; |
619
|
|
|
|
|
|
|
|
620
|
|
|
|
|
|
|
# Check if a non-default mechanism is requested |
621
|
|
|
|
|
|
|
|
622
|
0
|
|
|
|
|
|
$args->{mech} =~ s/-/_/g; |
623
|
0
|
|
|
|
|
|
my $const = 'Crypt::PKCS11::CKM_' . $args->{mech}; |
624
|
0
|
|
|
|
|
|
$log->debug("Attempting to use mechanism: $const"); |
625
|
1
|
|
|
1
|
|
12
|
no strict 'refs'; ## no critic |
|
1
|
|
|
|
|
4
|
|
|
1
|
|
|
|
|
2102
|
|
626
|
0
|
|
|
|
|
|
my $mech = Crypt::PKCS11::CK_MECHANISM->new; |
627
|
0
|
|
|
|
|
|
$mech->set_mechanism($const->()); |
628
|
|
|
|
|
|
|
|
629
|
|
|
|
|
|
|
# does this mechanism need parameters? |
630
|
0
|
|
|
|
|
|
my $params; |
631
|
0
|
|
|
|
|
|
given ($args->{mech}) { |
632
|
0
|
|
|
|
|
|
when (/^(SHA(\d+))_RSA_PKCS_PSS$/) { |
633
|
0
|
|
|
|
|
|
$params = $self->_get_pss_params($1, $2); |
634
|
|
|
|
|
|
|
} |
635
|
0
|
|
|
|
|
|
when (/^RSA_PKCS_OAEP$/) { |
636
|
0
|
|
|
|
|
|
$params = $self->_get_oaep_params; |
637
|
|
|
|
|
|
|
} |
638
|
0
|
|
|
|
|
|
default { $log->debug('No extra params required for this mech') } |
|
0
|
|
|
|
|
|
|
639
|
|
|
|
|
|
|
} |
640
|
|
|
|
|
|
|
|
641
|
0
|
0
|
|
|
|
|
if ($params) { |
642
|
0
|
|
|
|
|
|
my $r = $mech->set_pParameter($params->toBytes); |
643
|
|
|
|
|
|
|
|
644
|
0
|
0
|
|
|
|
|
if ($r != CKR_OK) { |
645
|
0
|
|
|
|
|
|
die 'Failed to set params for mechanism: ' |
646
|
|
|
|
|
|
|
. Crypt::PKCS11::XS::rv2str($r); |
647
|
|
|
|
|
|
|
} |
648
|
|
|
|
|
|
|
} |
649
|
|
|
|
|
|
|
|
650
|
0
|
|
|
|
|
|
$args->{mech} = $mech; |
651
|
|
|
|
|
|
|
|
652
|
0
|
|
|
|
|
|
return; |
653
|
|
|
|
|
|
|
} |
654
|
|
|
|
|
|
|
|
655
|
|
|
|
|
|
|
|
656
|
|
|
|
|
|
|
sub sign { |
657
|
0
|
|
|
0
|
1
|
|
my ($self, %args) = @_; |
658
|
|
|
|
|
|
|
|
659
|
0
|
|
|
|
|
|
$self->_handle_common_args(\%args); |
660
|
|
|
|
|
|
|
|
661
|
0
|
0
|
|
|
|
|
if (!$args{mech}) { |
662
|
0
|
|
|
|
|
|
$args{mech} = Crypt::PKCS11::CK_MECHANISM->new; |
663
|
0
|
|
|
|
|
|
$args{mech}->set_mechanism($self->_default_mech->{sign}); |
664
|
|
|
|
|
|
|
} |
665
|
|
|
|
|
|
|
|
666
|
0
|
|
|
|
|
|
my $data_len = length $args{data}; |
667
|
0
|
|
|
|
|
|
$log->debug("Attempting to sign $data_len bytes of data"); |
668
|
|
|
|
|
|
|
|
669
|
0
|
0
|
|
|
|
|
$self->_session->SignInit($args{mech}, $self->_key) |
670
|
|
|
|
|
|
|
or die "Failed to init signing: " . $self->_session->errstr; |
671
|
|
|
|
|
|
|
|
672
|
0
|
0
|
|
|
|
|
if ($data_len < MAX_CHUNK_SIZE) { |
673
|
|
|
|
|
|
|
my $sig = $self->_session->Sign($args{data}) |
674
|
0
|
0
|
|
|
|
|
or die "Failed to sign: " . $self->_session->errstr; |
675
|
0
|
|
|
|
|
|
return $sig; |
676
|
|
|
|
|
|
|
} |
677
|
|
|
|
|
|
|
|
678
|
|
|
|
|
|
|
# sign data in chunks |
679
|
0
|
|
|
|
|
|
while (length $args{data}) { |
680
|
0
|
|
|
|
|
|
my $chunk = substr $args{data}, 0, MAX_CHUNK_SIZE, q{}; |
681
|
0
|
0
|
|
|
|
|
$self->_session->SignUpdate($chunk) |
682
|
|
|
|
|
|
|
or die "Failed to sign: " . $self->_session->errstr; |
683
|
|
|
|
|
|
|
} |
684
|
|
|
|
|
|
|
|
685
|
0
|
0
|
|
|
|
|
my $sig = $self->_session->SignFinal |
686
|
|
|
|
|
|
|
or die "Failed to sign: " . $self->_session->errstr; |
687
|
0
|
|
|
|
|
|
return $sig; |
688
|
|
|
|
|
|
|
} |
689
|
|
|
|
|
|
|
|
690
|
|
|
|
|
|
|
|
691
|
|
|
|
|
|
|
sub sign_and_encode { |
692
|
0
|
|
|
0
|
1
|
|
my $self = shift; |
693
|
|
|
|
|
|
|
|
694
|
0
|
|
|
|
|
|
require MIME::Base64; |
695
|
0
|
|
|
|
|
|
my $sig_encoded = MIME::Base64::encode_base64($self->sign(@_), ''); |
696
|
|
|
|
|
|
|
|
697
|
0
|
|
|
|
|
|
my @lines = unpack '(a64)*', $sig_encoded; |
698
|
|
|
|
|
|
|
|
699
|
0
|
|
|
|
|
|
return sprintf "-----BEGIN SIGNATURE-----\n%s\n-----END SIGNATURE-----\n", |
700
|
|
|
|
|
|
|
(join "\n", @lines); |
701
|
|
|
|
|
|
|
|
702
|
|
|
|
|
|
|
} |
703
|
|
|
|
|
|
|
|
704
|
|
|
|
|
|
|
|
705
|
|
|
|
|
|
|
sub verify { |
706
|
0
|
|
|
0
|
1
|
|
my ($self, %args) = @_; |
707
|
|
|
|
|
|
|
|
708
|
0
|
0
|
|
|
|
|
die 'Missing signature' unless $args{sig}; |
709
|
0
|
|
|
|
|
|
$self->_handle_common_args(\%args); |
710
|
|
|
|
|
|
|
|
711
|
0
|
0
|
|
|
|
|
if (!$args{mech}) { |
712
|
0
|
|
|
|
|
|
$args{mech} = Crypt::PKCS11::CK_MECHANISM->new; |
713
|
0
|
|
|
|
|
|
$args{mech}->set_mechanism($self->_default_mech->{verify}); |
714
|
|
|
|
|
|
|
} |
715
|
|
|
|
|
|
|
|
716
|
0
|
|
|
|
|
|
my $data_len = length $args{data}; |
717
|
0
|
|
|
|
|
|
$log->debug("Attempting to verify $data_len bytes of data"); |
718
|
|
|
|
|
|
|
|
719
|
0
|
0
|
|
|
|
|
$self->_session->VerifyInit($args{mech}, $self->_key) |
720
|
|
|
|
|
|
|
or die 'Failed to init verify ' . $self->_session->errstr; |
721
|
|
|
|
|
|
|
|
722
|
0
|
0
|
|
|
|
|
if ($data_len < MAX_CHUNK_SIZE) { |
723
|
0
|
|
|
|
|
|
my $v = $self->_session->Verify($args{data}, $args{sig}); |
724
|
0
|
0
|
|
|
|
|
$log->info($self->_session->errstr) unless $v; |
725
|
0
|
|
|
|
|
|
return $v; |
726
|
|
|
|
|
|
|
} |
727
|
|
|
|
|
|
|
|
728
|
|
|
|
|
|
|
# verify data in chunks |
729
|
0
|
|
|
|
|
|
while (length $args{data}) { |
730
|
0
|
|
|
|
|
|
my $chunk = substr $args{data}, 0, MAX_CHUNK_SIZE, q{}; |
731
|
0
|
0
|
|
|
|
|
$self->_session->VerifyUpdate($chunk) |
732
|
|
|
|
|
|
|
or die "Failed to verify: " . $self->_session->errstr; |
733
|
|
|
|
|
|
|
} |
734
|
|
|
|
|
|
|
|
735
|
|
|
|
|
|
|
my $v = $self->_session->VerifyFinal($args{sig}) |
736
|
0
|
0
|
|
|
|
|
or die "Failed to verify: " . $self->_session->errstr; |
737
|
|
|
|
|
|
|
|
738
|
0
|
|
|
|
|
|
return $v; |
739
|
|
|
|
|
|
|
} |
740
|
|
|
|
|
|
|
|
741
|
|
|
|
|
|
|
|
742
|
|
|
|
|
|
|
sub digest { |
743
|
0
|
|
|
0
|
1
|
|
my ($self, %args) = @_; |
744
|
|
|
|
|
|
|
|
745
|
0
|
|
|
|
|
|
$self->_handle_common_args(\%args); |
746
|
|
|
|
|
|
|
|
747
|
0
|
0
|
|
|
|
|
if (!$args{mech}) { |
748
|
0
|
|
|
|
|
|
$args{mech} = Crypt::PKCS11::CK_MECHANISM->new; |
749
|
0
|
|
|
|
|
|
$args{mech}->set_mechanism($self->_default_mech->{digest}); |
750
|
|
|
|
|
|
|
} |
751
|
|
|
|
|
|
|
|
752
|
|
|
|
|
|
|
$self->_session->DigestInit($args{mech}) |
753
|
0
|
0
|
|
|
|
|
or die 'Failed to init digest ' . $self->_session->errstr; |
754
|
|
|
|
|
|
|
|
755
|
0
|
|
|
|
|
|
my $d = $self->_session->Digest($args{data}); |
756
|
0
|
0
|
|
|
|
|
$log->info($self->_session->errstr) unless $d; |
757
|
0
|
|
|
|
|
|
return $d; |
758
|
|
|
|
|
|
|
} |
759
|
|
|
|
|
|
|
|
760
|
|
|
|
|
|
|
# This shouldn't be here, it's not HSM specific. |
761
|
|
|
|
|
|
|
# Also, CPAN must surely have a cert/key loading module |
762
|
|
|
|
|
|
|
|
763
|
|
|
|
|
|
|
|
764
|
|
|
|
|
|
|
sub decode_signature { |
765
|
0
|
|
|
0
|
1
|
|
my ($self, %args) = @_; |
766
|
|
|
|
|
|
|
|
767
|
0
|
|
|
|
|
|
$self->_handle_common_args(\%args); |
768
|
|
|
|
|
|
|
|
769
|
0
|
|
|
|
|
|
require MIME::Base64; |
770
|
|
|
|
|
|
|
|
771
|
0
|
|
|
|
|
|
say $args{data}; |
772
|
|
|
|
|
|
|
|
773
|
0
|
|
|
|
|
|
$args{data} =~ /^-----BEGIN SIGNATURE-----(.+)-----END SIGNATURE-----/s; |
774
|
0
|
0
|
|
|
|
|
die 'Unable to find signature in data' unless $1; |
775
|
|
|
|
|
|
|
|
776
|
0
|
|
|
|
|
|
return MIME::Base64::decode_base64($1); |
777
|
|
|
|
|
|
|
} |
778
|
|
|
|
|
|
|
|
779
|
|
|
|
|
|
|
|
780
|
|
|
|
|
|
|
sub get_mechanism_info { |
781
|
0
|
|
|
0
|
1
|
|
my ($self, $mech, $slot_id) = @_; |
782
|
|
|
|
|
|
|
|
783
|
0
|
|
0
|
|
|
|
$slot_id //= $self->slot; |
784
|
|
|
|
|
|
|
|
785
|
0
|
0
|
|
|
|
|
my $mech_info = $self->_pkcs11->GetMechanismInfo($slot_id, $_) |
786
|
|
|
|
|
|
|
or die 'Failed to get mechanism info ' . $self->_pkcs11->errstr; |
787
|
|
|
|
|
|
|
|
788
|
0
|
|
|
|
|
|
for my $f (keys %{$self->_mechanism_flags}) { |
|
0
|
|
|
|
|
|
|
789
|
|
|
|
|
|
|
$mech_info->{flag}->{$self->_mechanism_flags->{$f}} = |
790
|
0
|
0
|
|
|
|
|
($mech_info->{flags} & $f) ? 1 : 0; |
791
|
|
|
|
|
|
|
} |
792
|
|
|
|
|
|
|
|
793
|
0
|
|
|
|
|
|
delete $mech_info->{flags}; |
794
|
|
|
|
|
|
|
|
795
|
0
|
|
|
|
|
|
return $mech_info; |
796
|
|
|
|
|
|
|
} |
797
|
|
|
|
|
|
|
|
798
|
|
|
|
|
|
|
|
799
|
|
|
|
|
|
|
# TODO might be nice to filter mechanisms by flags, e.g. give me all the mechs |
800
|
|
|
|
|
|
|
# that can be used for singing |
801
|
|
|
|
|
|
|
sub get_mechanisms { |
802
|
0
|
|
|
0
|
1
|
|
my $self = shift; |
803
|
0
|
|
|
|
|
|
my $slot_id = shift; |
804
|
|
|
|
|
|
|
|
805
|
0
|
|
0
|
|
|
|
$slot_id //= $self->slot; |
806
|
|
|
|
|
|
|
|
807
|
0
|
|
|
|
|
|
$log->debug("Fetching mechanisms for slot $slot_id"); |
808
|
0
|
0
|
|
|
|
|
my $mech_list = $self->_pkcs11->GetMechanismList($slot_id) |
809
|
|
|
|
|
|
|
or die 'Failed to get mechanisms ' . $self->_pkcs11->errstr; |
810
|
|
|
|
|
|
|
|
811
|
|
|
|
|
|
|
my %mech = map { |
812
|
0
|
0
|
|
|
|
|
my $name = $CKM_NAME{$_} ? $CKM_NAME{$_} : $_; |
|
0
|
|
|
|
|
|
|
813
|
0
|
|
|
|
|
|
$name => $self->get_mechanism_info($_, $slot_id); |
814
|
|
|
|
|
|
|
} @$mech_list; |
815
|
0
|
|
|
|
|
|
return \%mech; |
816
|
|
|
|
|
|
|
} |
817
|
|
|
|
|
|
|
|
818
|
|
|
|
|
|
|
|
819
|
|
|
|
|
|
|
sub encrypt { |
820
|
0
|
|
|
0
|
1
|
|
my ($self, %args) = @_; |
821
|
|
|
|
|
|
|
|
822
|
0
|
|
|
|
|
|
$self->_handle_common_args(\%args); |
823
|
|
|
|
|
|
|
|
824
|
0
|
0
|
|
|
|
|
if (!$args{mech}) { |
825
|
0
|
|
|
|
|
|
$args{mech} = Crypt::PKCS11::CK_MECHANISM->new; |
826
|
0
|
|
|
|
|
|
$args{mech}->set_mechanism($self->_default_mech->{encrypt}); |
827
|
|
|
|
|
|
|
} |
828
|
|
|
|
|
|
|
|
829
|
|
|
|
|
|
|
# TODO check key size and size of data to be encrypted and look up max sizes for mechanism |
830
|
|
|
|
|
|
|
# XXX trying to encrypt data that is too big returns a CKR_GENERAL_ERROR, which is super-unhelpful |
831
|
|
|
|
|
|
|
|
832
|
0
|
0
|
|
|
|
|
$self->_session->EncryptInit($args{mech}, $self->_key) |
833
|
|
|
|
|
|
|
or die "Failed to init encryption: " . $self->_session->errstr; |
834
|
|
|
|
|
|
|
|
835
|
|
|
|
|
|
|
my $encrypted_data = $self->_session->Encrypt($args{data}) |
836
|
0
|
0
|
|
|
|
|
or die "Failed to encrypt: " . $self->_session->errstr; |
837
|
|
|
|
|
|
|
|
838
|
0
|
|
|
|
|
|
return $encrypted_data; |
839
|
|
|
|
|
|
|
} |
840
|
|
|
|
|
|
|
|
841
|
|
|
|
|
|
|
1; |
842
|
|
|
|
|
|
|
|
843
|
|
|
|
|
|
|
__END__ |