support of PKCS#11 init arguments required by NSS softoken, patch contributed by Robert Varga

This commit is contained in:
Andreas Steffen 2007-07-03 09:26:44 +00:00
parent 4979e85871
commit e0e6137dd3
8 changed files with 31 additions and 7 deletions

View File

@ -104,7 +104,8 @@ usage(const char *mess)
" \\\n\t"
"[--adns <pathname>]"
"[--pkcs11module <path>]"
"[--pkcs11keepstate"
"[--pkcs11keepstate]"
"[--pkcs11initargs <string>]"
#ifdef DEBUG
" \\\n\t"
"[--debug-none]"
@ -217,6 +218,11 @@ bool pkcs11_keep_state = FALSE;
/* by default pluto does not allow pkcs11 proxy access via whack */
bool pkcs11_proxy = FALSE;
/* argument string to pass to PKCS#11 module.
* Not used for compliant modules, just for NSS softoken
*/
static const char *pkcs11_init_args = NULL;
int
main(int argc, char **argv)
{
@ -263,6 +269,7 @@ main(int argc, char **argv)
#endif /* !USE_LWRES */
{ "pkcs11module", required_argument, NULL, 'm' },
{ "pkcs11keepstate", no_argument, NULL, 'k' },
{ "pkcs11initargs", required_argument, NULL, 'z' },
{ "pkcs11proxy", no_argument, NULL, 'y' },
{ "nat_traversal", no_argument, NULL, '1' },
{ "keep_alive", required_argument, NULL, '2' },
@ -432,6 +439,10 @@ main(int argc, char **argv)
pkcs11_proxy = TRUE;
continue;
case 'z': /* --pkcs11initargs */
pkcs11_init_args = optarg;
continue;
#ifdef DEBUG
case 'N': /* --debug-none */
base_debugging = DBG_NONE;
@ -593,7 +604,7 @@ main(int argc, char **argv)
init_nat_traversal(nat_traversal, keep_alive, force_keepalive, nat_t_spf);
init_virtual_ip(virtual_private);
scx_init(pkcs11_module_path); /* load and initialize PKCS #11 module */
scx_init(pkcs11_module_path, pkcs11_init_args); /* load and initialize PKCS #11 module */
xauth_init(); /* load and initialize XAUTH module */
init_rnd_pool();
init_secret();

View File

@ -690,12 +690,16 @@ scx_find_all_cert_objects(void)
#endif
/*
* load and initialize PKCS#11 cryptoki module
* load and initialize PKCS#11 cryptoki module
*
* init_args should be unused when we have a PKCS#11 compliant module,
* but NSS softoken breaks that API.
*/
void
scx_init(const char* module)
scx_init(const char* module, const char *init_args)
{
#ifdef SMARTCARD
CK_C_INITIALIZE_ARGS args = { .pReserved = init_args, };
CK_RV rv;
if (scx_initialized)
@ -726,8 +730,8 @@ scx_init(const char* module)
DBG(DBG_CONTROL | DBG_CRYPT,
DBG_log("pkcs11 module initializing...")
)
rv = pkcs11_functions->C_Initialize(NULL);
)
rv = pkcs11_functions->C_Initialize(init_args ? &args : NULL);
if (rv != CKR_OK)
{
plog("failed to initialize pkcs11 module: %s"

View File

@ -69,7 +69,7 @@ extern bool pkcs11_keep_state;
extern bool pkcs11_proxy;
extern smartcard_t* scx_parse_number_slot_id(const char *number_slot_id);
extern void scx_init(const char *module);
extern void scx_init(const char *module, const char *init_args);
extern void scx_finalize(void);
extern bool scx_establish_context(smartcard_t *sc);
extern bool scx_login(smartcard_t *sc);

View File

@ -173,6 +173,7 @@ static const token_info_t token_info[] =
{ ARG_STR, offsetof(starter_config_t, setup.virtual_private), NULL },
{ ARG_STR, offsetof(starter_config_t, setup.eapdir), NULL },
{ ARG_STR, offsetof(starter_config_t, setup.pkcs11module), NULL },
{ ARG_STR, offsetof(starter_config_t, setup.pkcs11initargs), NULL },
{ ARG_ENUM, offsetof(starter_config_t, setup.pkcs11keepstate), LST_bool },
{ ARG_ENUM, offsetof(starter_config_t, setup.pkcs11proxy), LST_bool },

View File

@ -178,6 +178,7 @@ struct starter_config {
char *virtual_private;
char *eapdir;
char *pkcs11module;
char *pkcs11initargs;
bool pkcs11keepstate;
bool pkcs11proxy;

View File

@ -187,6 +187,11 @@ starter_start_pluto (starter_config_t *cfg, bool debug)
arg[argc++] = "--pkcs11module";
arg[argc++] = cfg->setup.pkcs11module;
}
if (cfg->setup.pkcs11initargs)
{
arg[argc++] = "--pkcs11initargs";
arg[argc++] = cfg->setup.pkcs11initargs;
}
if (cfg->setup.pkcs11keepstate)
{
arg[argc++] = "--pkcs11keepstate";

View File

@ -41,6 +41,7 @@ typedef enum {
KW_VIRTUAL_PRIVATE,
KW_EAPDIR,
KW_PKCS11MODULE,
KW_PKCS11INITARGS,
KW_PKCS11KEEPSTATE,
KW_PKCS11PROXY,

View File

@ -50,6 +50,7 @@ virtual_private, KW_VIRTUAL_PRIVATE
eap, KW_EAP
eapdir, KW_EAPDIR
pkcs11module, KW_PKCS11MODULE
pkcs11initargs, KW_PKCS11INITARGS
pkcs11keepstate, KW_PKCS11KEEPSTATE
pkcs11proxy, KW_PKCS11PROXY
keyexchange, KW_KEYEXCHANGE