[opensc-devel] PIV: reduce APDUs number

2011-04-13 Thread Viktor TARASOV

Hi,

the number of APDUs used by PIV's driver to get the object data can be reduced.

Actually before getting object data, PIV driver tries to get it's size.
For that it reads the first 8 bytes of the object data. Usually card responds 
with '61xx' return code,
that's why one (useless) 'GET RESPONSE' APDU is sended by APDU transmit level 
(in apdu.c).

So, there are two not-necessary APDUs for each getting of the object data .

In proposed patch all object data are read at once into the statically 
allocated buffer.

Have you any objections?

Kind wishes,
Viktor.


--
Viktor Tarasov  viktor.tara...@opentrust.com

Index: src/libopensc/card-piv.c
===
--- src/libopensc/card-piv.c(révision 5338)
+++ src/libopensc/card-piv.c(copie de travail)
@@ -531,7 +531,7 @@
/* if using internal buffer, alloc new one */
if (rbuf == rbufinitbuf) {
*recvbuf = malloc(rbuflen); 
-   sc_debug(card-ctx, SC_LOG_DEBUG_NORMAL, DEE 
got buffer %p len %d,*recvbuf,  rbuflen);
+   sc_debug(card-ctx, SC_LOG_DEBUG_NORMAL, DEE got 
buffer %p len %d,*recvbuf,  rbuflen);
if (*recvbuf == NULL) {
r = SC_ERROR_OUT_OF_MEMORY;
goto err;
@@ -870,10 +870,14 @@
int r = 0;
u8 tagbuf[8];
size_t tag_len;
+   u8 *tmp_buf, rbuf[8192];
+   size_t rbuf_len;

SC_FUNC_CALLED(card-ctx, SC_LOG_DEBUG_VERBOSE);
-   sc_debug(card-ctx, SC_LOG_DEBUG_NORMAL, #%d \n, enumtag);
+   if (!buf || !buf_len)
+   SC_FUNC_RETURN(card-ctx, SC_LOG_DEBUG_NORMAL, 
SC_ERROR_INVALID_ARGUMENTS);
 
+   sc_debug(card-ctx, SC_LOG_DEBUG_NORMAL, get object #%d data, 
enumtag);
/* assert(enumtag = 0  enumtag  PIV_OBJ_LAST_ENUM); */

tag_len = piv_objects[enumtag].tag_len;
@@ -883,49 +887,29 @@
memcpy(p, piv_objects[enumtag].tag_value, tag_len);
p += tag_len;
 
-   if (*buf_len == 1  *buf == NULL) { /* we need to get the length */
-   u8 rbufinitbuf[8]; /* tag of 53 with 82 xx xx  will fit in 4 */
-   u8 *rbuf;
-   size_t rbuflen;
-   size_t bodylen;
-   unsigned int cla_out, tag_out;
-   const u8 *body;
+   rbuf_len = sizeof(rbuf);
+   tmp_buf = rbuf;
+   r = piv_general_io(card, 0xCB, 0x3F, 0xFF, tagbuf,  p - tagbuf, 
tmp_buf, rbuf_len);
+   SC_TEST_RET(card-ctx, SC_LOG_DEBUG_NORMAL, r, general IO failed);
 
-   sc_debug(card-ctx, SC_LOG_DEBUG_NORMAL,get len of #%d, 
enumtag);
-   rbuf = rbufinitbuf;
-   rbuflen = sizeof(rbufinitbuf);
-   r = piv_general_io(card, 0xCB, 0x3F, 0xFF, tagbuf,  p - tagbuf,
-   rbuf, rbuflen);
-   if (r  0) {
-   body = rbuf;
-   if (sc_asn1_read_tag(body, 0x, cla_out, tag_out, 
bodylen) !=  SC_SUCCESS) {
-   sc_debug(card-ctx, SC_LOG_DEBUG_NORMAL, * 
received buffer tag MISSING );
-   r = SC_ERROR_FILE_NOT_FOUND;
-   goto err;
-   }
-   *buf_len = r;
-   } else if ( r == 0) { 
-   r = SC_ERROR_FILE_NOT_FOUND;
-   goto err;
-   } else { 
-   goto err;
-   }
+   if (rbuf_len == sizeof(rbuf))
+   SC_TEST_RET(card-ctx, SC_LOG_DEBUG_NORMAL, 
SC_ERROR_BUFFER_TOO_SMALL, 
+   Need to increase the size of internal receive 
buffer);
+
+   if (*buf == NULL)   {
+   *buf = malloc(rbuf_len);
+   if (*buf == NULL )
+   SC_FUNC_RETURN(card-ctx, SC_LOG_DEBUG_NORMAL, 
SC_ERROR_OUT_OF_MEMORY);
+
+   *buf_len = rbuf_len;
}
-sc_debug(card-ctx, SC_LOG_DEBUG_NORMAL,get buffer for #%d len %d, enumtag, 
*buf_len);
-   if (*buf == NULL  *buf_len  0) {
-   *buf = malloc(*buf_len);
-   if (*buf == NULL ) {
-   r = SC_ERROR_OUT_OF_MEMORY;
-   goto err;
-   }
-   }
 
-   r = piv_general_io(card, 0xCB, 0x3F, 0xFF, tagbuf,  p - tagbuf, 
-   buf, buf_len);
+   if (*buf_len  rbuf_len)
+   *buf_len = rbuf_len;
 
-err:
+   memcpy(*buf, rbuf, *buf_len);
 
-   SC_FUNC_RETURN(card-ctx, SC_LOG_DEBUG_NORMAL, r);
+   SC_FUNC_RETURN(card-ctx, SC_LOG_DEBUG_NORMAL, *buf_len);
 }
 
 static int piv_get_cached_data(sc_card_t * card, int enumtag,
@@ -935,7 +919,7 @@
piv_private_data_t * priv = PIV_DATA(card);
int r;
u8 *rbuf = NULL;
-   size_t rbuflen;
+   size_t rbuflen = 0;

SC_FUNC_CALLED(card-ctx, 

Re: [opensc-devel] PIV: reduce APDUs number

2011-04-13 Thread Viktor TARASOV

Le 13/04/2011 16:14, Douglas E. Engert a écrit :

On 4/13/2011 8:20 AM, Viktor TARASOV wrote:

Hi,

the number of APDUs used by PIV's driver to get the object data can be reduced.

Actually before getting object data, PIV driver tries to get it's size.
For that it reads the first 8 bytes of the object data. Usually card responds 
with '61xx' return code,
that's why one (useless) 'GET RESPONSE' APDU is sended by APDU transmit level 
(in apdu.c).

So, there are two not-necessary APDUs for each getting of the object data .

The intent was to get the length, then allocate a buffer and don't read the
objects unless needed. Unfortunately, the way PKCS#11 applications work,
one ends up reading all the certificates anyway.
I argued with NIST over the years that they needed a directory. The answer
was always, that you could get the length of the object from the object.

So as you point out the method of reading to get the length, does not
work very well. NIST 800-73 lists some Max Bytes for the sizes of the
objects, but I have seen objects which are are larger and 800-73-3 now
says these are recommended.

It looks like your buffer is only 8K, and this could cause a problem,
the Cardholder Facial Image object, Max Bytes is 12704.

So any buffer should be 64K to be on the safe side to avoid ever getting
the Need to increase the size of internal receive buffer message.

  

In proposed patch all object data are read at once into the statically 
allocated buffer.

Its not static, it looks like it is on the stack. Maybe it should be allocated,
as part of the piv_private_data.

Have you any objections?

As long as the buffer is 64K and not on the stack...


There is another patch version where
dynamic 64k buffer used to receive the totality of the object data.



Kind wishes,
Viktor.




___
opensc-devel mailing list
opensc-devel@lists.opensc-project.org
http://www.opensc-project.org/mailman/listinfo/opensc-devel



--
Viktor Tarasov  viktor.tara...@opentrust.com

Index: src/libopensc/card-piv.c
===
--- src/libopensc/card-piv.c(révision 5338)
+++ src/libopensc/card-piv.c(copie de travail)
@@ -531,7 +531,7 @@
/* if using internal buffer, alloc new one */
if (rbuf == rbufinitbuf) {
*recvbuf = malloc(rbuflen); 
-   sc_debug(card-ctx, SC_LOG_DEBUG_NORMAL, DEE 
got buffer %p len %d,*recvbuf,  rbuflen);
+   sc_debug(card-ctx, SC_LOG_DEBUG_NORMAL, DEE got 
buffer %p len %d,*recvbuf,  rbuflen);
if (*recvbuf == NULL) {
r = SC_ERROR_OUT_OF_MEMORY;
goto err;
@@ -870,10 +870,14 @@
int r = 0;
u8 tagbuf[8];
size_t tag_len;
+   u8 *rbuf = NULL;
+   size_t rbuf_len = 0;

SC_FUNC_CALLED(card-ctx, SC_LOG_DEBUG_VERBOSE);
-   sc_debug(card-ctx, SC_LOG_DEBUG_NORMAL, #%d \n, enumtag);
+   if (!buf || !buf_len)
+   SC_FUNC_RETURN(card-ctx, SC_LOG_DEBUG_NORMAL, 
SC_ERROR_INVALID_ARGUMENTS);
 
+   sc_debug(card-ctx, SC_LOG_DEBUG_NORMAL, get object #%d data, 
enumtag);
/* assert(enumtag = 0  enumtag  PIV_OBJ_LAST_ENUM); */

tag_len = piv_objects[enumtag].tag_len;
@@ -883,49 +887,34 @@
memcpy(p, piv_objects[enumtag].tag_value, tag_len);
p += tag_len;
 
-   if (*buf_len == 1  *buf == NULL) { /* we need to get the length */
-   u8 rbufinitbuf[8]; /* tag of 53 with 82 xx xx  will fit in 4 */
-   u8 *rbuf;
-   size_t rbuflen;
-   size_t bodylen;
-   unsigned int cla_out, tag_out;
-   const u8 *body;
+   rbuf = malloc(0x1);
+   if (!rbuf)
+   SC_FUNC_RETURN(card-ctx, SC_LOG_DEBUG_NORMAL, 
SC_ERROR_OUT_OF_MEMORY);
+   rbuf_len = 0x1;
 
-   sc_debug(card-ctx, SC_LOG_DEBUG_NORMAL,get len of #%d, 
enumtag);
-   rbuf = rbufinitbuf;
-   rbuflen = sizeof(rbufinitbuf);
-   r = piv_general_io(card, 0xCB, 0x3F, 0xFF, tagbuf,  p - tagbuf,
-   rbuf, rbuflen);
-   if (r  0) {
-   body = rbuf;
-   if (sc_asn1_read_tag(body, 0x, cla_out, tag_out, 
bodylen) !=  SC_SUCCESS) {
-   sc_debug(card-ctx, SC_LOG_DEBUG_NORMAL, * 
received buffer tag MISSING );
-   r = SC_ERROR_FILE_NOT_FOUND;
-   goto err;
-   }
-   *buf_len = r;
-   } else if ( r == 0) { 
-   r = SC_ERROR_FILE_NOT_FOUND;
-   goto err;
-   } else { 
-   goto err;
-   }
+   r = piv_general_io(card, 0xCB, 0x3F, 0xFF, tagbuf,  p - tagbuf, 

[opensc-devel] Unwrap, with openssl, a key wrapped inside Smart Card

2011-04-13 Thread Felipe Blauth
Hello to all,

Simple question:
Is it  possible, using openssl, to unwrap a key wraped inside a Smart Card
with C_Wrap function?

Thank you.

__
Felipe Blauth
___
opensc-devel mailing list
opensc-devel@lists.opensc-project.org
http://www.opensc-project.org/mailman/listinfo/opensc-devel

Re: [opensc-devel] Unwrap, with openssl, a key wrapped inside Smart Card

2011-04-13 Thread Andre Zepezauer
On Wed, 2011-04-13 at 14:44 -0300, Felipe Blauth wrote:
 Hello to all,
 
 Simple question:
 Is it  possible, using openssl, to unwrap a key wraped inside a Smart
 Card with C_Wrap function?

Maybe, but the question here is how the key becomes wrapped in the smart
card. OpenSC doesn't support that kind of key-wrapping.

Regards
Andre

___
opensc-devel mailing list
opensc-devel@lists.opensc-project.org
http://www.opensc-project.org/mailman/listinfo/opensc-devel


Re: [opensc-devel] Unwrap, with openssl, a key wrapped inside Smart Card

2011-04-13 Thread Martin Paljak
Hello,
On Apr 13, 2011, at 20:44 , Felipe Blauth wrote:

 Hello to all,
 
 Simple question:
 Is it  possible, using openssl, to unwrap a key wraped inside a Smart Card 
 with C_Wrap function?
The format of C_Wrap is described in PKCS#11 specification. Yes, you could use 
OpenSSL but note that OpenSC does not support C_Wrap (or unwrap)

Martin
___
opensc-devel mailing list
opensc-devel@lists.opensc-project.org
http://www.opensc-project.org/mailman/listinfo/opensc-devel


Re: [opensc-devel] Unwrap, with openssl, a key wrapped inside Smart Card

2011-04-13 Thread Douglas E. Engert


On 4/13/2011 2:03 PM, Martin Paljak wrote:
 Hello,
 On Apr 13, 2011, at 20:44 , Felipe Blauth wrote:

 Hello to all,

 Simple question:
 Is it  possible, using openssl, to unwrap a key wraped inside a Smart Card 
 with C_Wrap function?

Its not that simple.
Is the key to be unwrapped on the card, or do you have the wrapped key of the 
card
and it has to be unwrapped a private key on the card?

 The format of C_Wrap is described in PKCS#11 specification. Yes, you could 
 use OpenSSL but note that OpenSC does not support C_Wrap (or unwrap)


If the wrapped key was wrapped by an RSA public key, the Mozilla NSS for example
can fall back to using C_Decrypt in place of C_Unwrap. The data returned is
the bits of the key, and not a PKCS#11 session object.

This could be related to:

http://www.opensc-project.org/opensc/ticket/325







 Martin
 ___
 opensc-devel mailing list
 opensc-devel@lists.opensc-project.org
 http://www.opensc-project.org/mailman/listinfo/opensc-devel



-- 

  Douglas E. Engert  deeng...@anl.gov
  Argonne National Laboratory
  9700 South Cass Avenue
  Argonne, Illinois  60439
  (630) 252-5444
___
opensc-devel mailing list
opensc-devel@lists.opensc-project.org
http://www.opensc-project.org/mailman/listinfo/opensc-devel