CASA/c_micasadk/sscs_ndk.c

3167 lines
75 KiB
C
Raw Normal View History

/**************************************************************************
* %name: sscs_ndk.c %
* %instance: security_2 %
* %version: 9 %
* %created_by: jnorman %
* %date_modified: Mon May 23 14:52:55 2005 %
***************************************************************************
*
***************************************************************************
*/
#include <stdlib.h>
#include <memory.h>
#include "micasa_types.h"
#include "micasa.h"
#include "sscs_lldefs.h"
#include "sscs_cache.h"
#include "sscs_utf8.h"
// delimited tags
//static SS_UTF8_T SSCS_CRED_SET_DELIMITED[] = {'S','S','_','C','r','e','d','S','e','t',':',0};
static SS_UTF8_T SSCS_CRED_SET_DELIMITED[] = {"SS_CredSet:"};
#define SSCS_CRED_SET_CHARS_DELIMITED 11
//static SS_UTF8_T SSCS_APP_SECRET_DELIMITED[] = {'S','S','_','A','p','p',':',0};
static SS_UTF8_T SSCS_APP_SECRET_DELIMITED[] = {"SS_App:"};
#define SSCS_APP_SECRET_CHARS_DELIMITED 7
//static SS_UTF8_T SSCS_BINARY_SECRET_DELIMITED[] = {'S','S','_','B','i','n','a','r','y',':',0};
static SS_UTF8_T SSCS_BINARY_SECRET_DELIMITED[] = {"SS_Binary:"};
#define SSCS_BINARY_CHARS_DELIMITED 10
//static SS_UTF8_T SSCS_OBITUARY_DELIMITED[] = {'S','S','_','O','b','i','t','u','a','r','y',':', 0};
static SS_UTF8_T SSCS_OBITUARY_DELIMITED[] = {"SS_Obituary:"};
#define SSCS_OBITUARY_CHARS_DELIMITED 12
/*
* NAME - sscsshs_AddSHSBinarySHSEntry
*
* DESCRIPTION
* Internal function that adds a new entry in the parser list for a Shared Secret.
*
*/
static int32_t sscsshs_AddSHSBinaryEntry
(
void *secretHandle,
SS_UTF8_T *key,
uint32_t valLen,
uint8_t *value
)
{ /* beginning of the call */
/* ########################## DECLARATIONS START HERE ######################### */
uint32_t keyLen = sscs_Utf8StrSize((SS_UTF8_T *)key);
/* ############################## CODE STARTS HERE ############################ */
if((keyLen) && (secretHandle))
{
if(ll_InsertSharedSecretLink((LL_LINKLIST_T *)secretHandle,
keyLen, key, valLen, value))
{
return(NSSCS_E_LL_SYS_FAILURE);
}
else
{
return(NSSCS_LL_SUCCESS);
}
}
else
{
return(NSSCS_E_LL_SYS_FAILURE);
}
/* ############################### CODE ENDS HERE ############################# */
} //* sscsshs_AddSHSBinaryEntry
/*
* NAME - sscsshs_AddSHSEntry
*
* DESCRIPTION
* Internal function that adds a new entry in the parser list for a Shared Secret.
*
*/
static int32_t sscsshs_AddSHSEntry
(
void *secretHandle,
SS_UTF8_T *key,
uint8_t *val
)
{ /* beginning of the call */
/* ########################## DECLARATIONS START HERE ######################### */
uint32_t keyLen = sscs_Utf8Strlen(key) + 1;
uint32_t valLen = sscs_Utf8StrSize((SS_UTF8_T *)val);
/* ############################## CODE STARTS HERE ############################ */
if((keyLen) && (secretHandle))
{
if(ll_InsertSharedSecretLink((LL_LINKLIST_T*)secretHandle,
keyLen, key, valLen, val))
{
return(NSSCS_E_LL_SYS_FAILURE);
}
else
{
return(NSSCS_LL_SUCCESS);
}
}
else
{
return(NSSCS_E_LL_SYS_FAILURE);
}
/* ############################### CODE ENDS HERE ############################# */
} //* sscsshs_AddSHSEntry
/*
* NAME - sscsshs_GetNextSHSEntry
*
* DESCRIPTION
* Internal function that gets the next entry in the parser list for a Shared Secret.
*
*/
static int32_t sscsshs_GetNextSHSEntry
(
int32_t restart,
void *secretHandle,
uint32_t *keyLen,
SS_UTF8_T *key,
uint32_t *valLen,
uint8_t *val
)
{ /* beginning of the call */
/* ########################## DECLARATIONS START HERE ######################### */
LL_SHSEC_KEY_VAL_T *keyVal = {0};
/* ############################## CODE STARTS HERE ############################ */
*keyLen = 0;
*valLen = 0;
if(secretHandle)
{
if(restart)
{
ll_Head((LL_LINKLIST_T *)secretHandle);
}
else
{
if(!(ll_Next((LL_LINKLIST_T *)secretHandle)))
{
return(NSSCS_E_LL_SYS_FAILURE);
}
}
if(keyVal = (LL_SHSEC_KEY_VAL_T *)ll_GetEntry((LL_LINKLIST_T *)secretHandle))
{
if(keyVal->kLen)
{
*keyLen = keyVal->kLen;
sscs_Utf8Strcpy(key, keyVal->key);
*valLen = keyVal->vLen;
if(sscs_Utf8Strncmp(keyVal->key, SSCS_BINARY_SECRET, SSCS_BINARY_CHARS))
{ // credset or app data
sscs_Utf8Strcpy((SS_UTF8_T *)val, (SS_UTF8_T *)keyVal->value);
}
else
{ // binary data
memcpy(val, keyVal->value, *valLen);
}
return(NSSCS_SUCCESS);
}
}
return(NSSCS_E_LL_SYS_FAILURE);
}
else
{
return(NSSCS_E_LL_SYS_FAILURE);
}
/* ############################### CODE ENDS HERE ############################# */
} //* sscsshs_GetNextSHSEntry
/*
* NAME - sscsshs_EscapeString
*
* DESCRIPTION
* Internal function that escapes delimited characters in a string.
*
*/
static void sscsshs_ChkEscapeString(SS_UTF8_T *entryBuf)
{ /* beginning of the call */
/* ########################## DECLARATIONS START HERE ######################### */
int len = 0, i, k = 0;
SS_UTF8_T *tempBuf = NULL;
/* ############################## CODE STARTS HERE ############################ */
if(!(tempBuf = (SS_UTF8_T *)malloc(NSSCS_MAX_SECRET_BUF_LEN - SSCS_CRED_SET_LEN)))
{
return;
}
memset(tempBuf, 0, NSSCS_MAX_SECRET_BUF_LEN - SSCS_CRED_SET_LEN);
len = sscs_Utf8Strlen(entryBuf) + 1;
for(i = 0; i < len; i++)
{
SS_UTF8_T c = entryBuf[i];
switch(c)
{
case (SS_UTF8_T)'\\':
tempBuf[k++] = (SS_UTF8_T)'\\';
tempBuf[k++] = (SS_UTF8_T)'\\';
break;
case (SS_UTF8_T)':':
tempBuf[k++] = (SS_UTF8_T)'\\';
tempBuf[k++] = (SS_UTF8_T)':';
break;
case (SS_UTF8_T)'=':
tempBuf[k++] = (SS_UTF8_T)'\\';
tempBuf[k++] = (SS_UTF8_T)'=';
break;
default:
tempBuf[k++] = c;
}
}
sscs_Utf8Strcpy(entryBuf, tempBuf);
/* ############################### CODE EXITS HERE ############################# */
if(tempBuf)
{
free(tempBuf);
}
return;
/* ############################### CODE ENDS HERE ############################# */
} //* sscsshs_ChkEscapeString
/*
* NAME - sscsshs_PopulateeSecretBuf
*
* DESCRIPTION
* Populate the Shared Secret Buffer
*
*/
static int32_t sscsshs_PopulateSecretBuf
(
int32_t type,
SS_UTF8_T *key,
SS_UTF8_T *val,
uint32_t *bufLen,
SS_UTF8_T *retBuffer
)
{ /* beginning of the call */
/* ############################## CODE STARTS HERE ############################ */
if(sscs_Utf8Strlen(key) == 0)
{
return(NSSCS_E_PARSER_FAILURE); // create error stating non-Sh Sec Format key
}
if(*bufLen)
{
retBuffer[sscs_Utf8Strlen(retBuffer)] = (SS_UTF8_T)0x0A; // add a line feed delimiter
}
sscsshs_ChkEscapeString(key);
if(sscs_Utf8Strcmp(key, SSCS_CRED_SET))
{
sscs_Utf8Strcat(retBuffer, key);
sscs_Utf8Strcat(retBuffer, CREDSET_DELIMITER);
}
else
{
if(type & SSCS_CREDENTIAL_TYPE_F)
{
return(NSSCS_E_PARSER_FAILURE); // create error stating non-Sh Sec Format key
}
sscs_Utf8Strcat(retBuffer, key);
sscs_Utf8Strcat(retBuffer, APP_DELIMITER);
}
sscsshs_ChkEscapeString(val);
if((*bufLen + (sscs_Utf8StrSize(val))) < NSSCS_MAX_SECRET_BUF_LEN)
{
sscs_Utf8Strcat(retBuffer, val);
*bufLen = sscs_Utf8StrSize(retBuffer);
return(NSSCS_SUCCESS);
}
else
{
return(NSSCS_E_BUFFER_LEN);
}
/* ############################### CODE ENDS HERE ############################# */
} /* end of sscsshs_PopulateSecretBuf */
/*
* NAME - sscsshs_PopulateBinarySecretBuf
*
* DESCRIPTION
* Populate the Binary Shared Secret Buffer
*
*/
static int32_t sscsshs_PopulateBinarySecretBuf
(
int32_t type,
SS_UTF8_T *key,
uint32_t valLen,
uint8_t *val,
uint32_t *bufLen,
uint8_t *retBuffer
)
{ /* beginning of the call */
/* ########################## DECLARATIONS START HERE ######################### */
uint32_t len = 0;
/* ############################## CODE STARTS HERE ############################ */
if(sscs_Utf8Strlen(key) == 0)
{
return(NSSCS_E_PARSER_FAILURE); // create error stating non-Sh Sec Format key
}
if(*bufLen)
{
return(NSSCS_E_PARSER_FAILURE); // can't mix binary data with other data
}
if(type & SSCS_BINARY_TYPE_F)
{
if(sscs_Utf8Strcmp(key, SSCS_BINARY_SECRET))
{
return(NSSCS_E_PARSER_FAILURE); // create error stating non-binary buffer
}
sscsshs_ChkEscapeString(key);
sscs_Utf8Strcpy((SS_UTF8_T *)retBuffer, key);
sscs_Utf8Strcat((SS_UTF8_T *)retBuffer, BINARY_DELIMITER);
len = sscs_Utf8StrSize((SS_UTF8_T *)retBuffer);
*bufLen = len + valLen + sizeof(uint32_t);
// buffer format ==> [BINARY=][binary data len(uint32_t)][binary data]
*(uint32_t *)&retBuffer[len] = valLen;
memcpy(&retBuffer[len + sizeof(uint32_t)], val, valLen);
}
else
{
return(NSSCS_E_PARSER_FAILURE); // create error stating non-Sh Sec Format key
}
return(NSSCS_SUCCESS);
/* ############################### CODE ENDS HERE ############################# */
} /* end of sscsshs_PopulateBinarySecretBuf */
/*
* NAME - sscsshs_ParseBinarySecretBuf
*
* DESCRIPTION
* Parses a Shared Secret.
*
*/
static int32_t sscsshs_ParseBinarySecretBuf
(
SS_UTF8_T *key,
uint32_t *valLen,
uint8_t *val,
SSCS_SECRET_T *secretBuf
)
{ /* beginning of the call */
/* ########################## DECLARATIONS START HERE ######################### */
int32_t len = (SHS_BINARY_LEN + BINARY_DELIMITER_LEN) - 2; // excluding one Null terminator
/* ############################## CODE STARTS HERE ############################ */
memcpy(key, secretBuf->data, (SHS_BINARY_LEN - 2));
if(memcmp(SHS_BINARY, key, (SHS_BINARY_LEN - 2)))
{
return(NSSCS_E_PARSER_FAILURE); // create error stating non-Sh Sec Format key
}
// get the length of the binary data out;
*valLen = *(uint32_t *)&secretBuf[len];
memcpy(val, &secretBuf->data[len + sizeof(uint32_t)], *valLen);
return(NSSCS_SUCCESS);
/* ############################### CODE ENDS HERE ############################# */
} /* end of sscsshs_sscsshs_ParseBinarySecretBuf */
/*
* NAME - sscsshs_UnescapeSecretIDBuf
*
* DESCRIPTION
* Parses a Shared Secret.
*
*/
static int32_t sscsshs_UnescapeSecretIDBuf
(
SSCS_SH_SECRET_ID_T * shSecID,
SSCS_SECRET_ID_T * secID
)
{ /* beginning of the call */
/* ########################## DECLARATIONS START HERE ######################### */
int32_t i, rc = NSSCS_SUCCESS;
SSCS_SECRET_ID_T tmpSecID = {0};
int32_t len = sscs_Utf8Strlen((SS_UTF8_T *)secID->id) + 1;
int32_t k = 0;
/* ############################## CODE STARTS HERE ############################ */
// clear the buffers
memset(shSecID, 0, sizeof(SSCS_SH_SECRET_ID_T));
do
{ // determine the type of secret
if((sscs_Utf8Strncmp(secID->id, SSCS_CRED_SET_DELIMITED, SSCS_CRED_SET_CHARS_DELIMITED)) == 0)
{
shSecID->type |= SSCS_CREDENTIAL_TYPE_F;
tmpSecID.len = SSCS_CRED_SET_CHARS_DELIMITED;
sscs_Utf8Strncpy(tmpSecID.id, secID->id, SSCS_CRED_SET_CHARS_DELIMITED);
break;
}
if((sscs_Utf8Strncmp(secID->id, SSCS_APP_SECRET_DELIMITED, SSCS_APP_SECRET_CHARS_DELIMITED)) == 0)
{
shSecID->type |= SSCS_APPLICATION_TYPE_F;
tmpSecID.len = SSCS_APP_SECRET_CHARS_DELIMITED;
sscs_Utf8Strncpy(tmpSecID.id, secID->id, SSCS_APP_SECRET_CHARS_DELIMITED);
break;
}
if((sscs_Utf8Strncmp(secID->id, SSCS_BINARY_SECRET_DELIMITED, SSCS_BINARY_CHARS_DELIMITED)) == 0)
{
shSecID->type |= SSCS_BINARY_TYPE_F;
tmpSecID.len = SSCS_BINARY_CHARS_DELIMITED;
sscs_Utf8Strncpy(tmpSecID.id, secID->id, SSCS_BINARY_CHARS_DELIMITED);
break;
}
return(NSSCS_E_WRONG_SH_SEC_TYPE);
}
while(1);
// start passed the tag
for(k = i = tmpSecID.len; i < len; i++)
{
rc = NSSCS_SUCCESS;
if(secID->id[i] == (SS_UTF8_T)'\\')
{
if(i + 1 < len)
{
if(secID->id[i + 1] == (SS_UTF8_T)'\\'
|| secID->id[i + 1] == (SS_UTF8_T)'='
|| secID->id[i + 1] == (SS_UTF8_T)':')
{
tmpSecID.id[k++] = secID->id[i + 1];
i++;
}
}
else
{
tmpSecID.id[k] = secID->id[i];
}
}
else
{
tmpSecID.id[k++] = secID->id[i];
}
} // end for ...
sscs_Utf8Strcpy(shSecID->name, tmpSecID.id);
shSecID->len = sscs_Utf8Strlen(shSecID->name) + 1;
// shSecID->len = k;
return(rc);
/* ############################### CODE ENDS HERE ############################# */
} /* end of sscsshs_UnescapeSecretIDBuf */
/*
* NAME - sscsshs_ParseSecretBuf
*
* DESCRIPTION
* Parses a Shared Secret.
*
*/
static int32_t sscsshs_ParseSecretBuf
(
int32_t *index,
int32_t type,
SS_UTF8_T *key,
SS_UTF8_T *val,
SSCS_SECRET_T *secretBuf
)
{ /* beginning of the call */
/* ########################## DECLARATIONS START HERE ######################### */
int32_t i, rc;
int32_t len = sscs_Utf8Strlen((SS_UTF8_T *)secretBuf->data);// + 1;
SS_UTF8_T *secBuf = (SS_UTF8_T *)(secretBuf->data);
int32_t delimiterIsFound = FALSE;
int32_t k = 0;
/* ############################## CODE STARTS HERE ############################ */
// if we've exhausted the buffer, get out.
if (*index >= len)
{
2005-10-26 16:40:57 +02:00
return(NSSCS_E_OBJECT_NOT_FOUND);
}
//* extract the key
for(i = *index; i < len; i++)
{
rc = NSSCS_SUCCESS;
if(secBuf[i] == (SS_UTF8_T)'\\')
{
if(i + 1 < len)
{
if(secBuf[i + 1] == (SS_UTF8_T)'\\'
|| secBuf[i + 1] == (SS_UTF8_T)'='
|| secBuf[i + 1] == (SS_UTF8_T)':')
{
key[k] = secBuf[i + 1];
k++;
i++;
}
}
}
else if(secBuf[i] == (SS_UTF8_T)'='
|| secBuf[i] == (SS_UTF8_T)':')
{
if(type & SSCS_APPLICATION_TYPE_F)
{
if(secBuf[i] == (SS_UTF8_T)':')
{
delimiterIsFound = TRUE;
i++;
break;
}
else if(secBuf[i] == (SS_UTF8_T)'=')
{
rc = NSSCS_E_PARSER_FAILURE;
return(rc);
}
}
else if(type & SSCS_CREDENTIAL_TYPE_F)
{
if(secBuf[i] == (SS_UTF8_T)'=')
{
delimiterIsFound = TRUE;
i++;
break;
}
else if(secBuf[i] == (SS_UTF8_T)':')
{
rc = NSSCS_E_PARSER_FAILURE;
return(rc);
}
}
}
else if(secBuf[i] == (SS_UTF8_T)0x0A) // if the line feed delimiter is found
{
i++;
rc = NSSCS_SUCCESS;
break;
}
else
{
key[k] = secBuf[i];
k++;
}
}
*index = i;
// extract the value
if(delimiterIsFound)
{
int32_t k = 0;
for(i = *index; i < len; i++)
{
rc = NSSCS_SUCCESS;
if(secBuf[i] == (SS_UTF8_T)'\\')
{
if((i + 1) < len)
{
if(secBuf[i+1] == (SS_UTF8_T)'\\' ||
secBuf[i+1] == (SS_UTF8_T)'=' ||
secBuf[i+1] == (SS_UTF8_T)':')
{
val[k] = secBuf[i + 1];
k++;
i++;
}
}
}
else if(secBuf[i] == (SS_UTF8_T)'=' ||
secBuf[i] == (SS_UTF8_T)':')
{
if(type & SSCS_APPLICATION_TYPE_F)
{
if(secBuf[i] == (SS_UTF8_T)':')
{
val[k] = secBuf[i];
k++;
i++;
val[k] = secBuf[i];
k++;
}
else if(secBuf[i] == (SS_UTF8_T)'=')
{
if(secBuf[i-1] == (SS_UTF8_T)'\\')
{
val[k] = secBuf[i];
k++;
}
else
{
rc = NSSCS_E_PARSER_FAILURE;
return(NSSCS_E_PARSER_FAILURE);
}
}
}
else if(type & SSCS_CREDENTIAL_TYPE_F)
{
if(secBuf[i] == (SS_UTF8_T)'=')
{
val[k] = secBuf[i];
k++;
i++;
val[k] = secBuf[i];
k++;
}
else if(secBuf[i] == (SS_UTF8_T)':')
{
if(secBuf[i-1] == (SS_UTF8_T)'\\')
{
val[k] = secBuf[i];
k++;
}
else
{
rc = NSSCS_E_PARSER_FAILURE;
return(NSSCS_E_PARSER_FAILURE);
}
}
}
}
else if(secBuf[i] == (SS_UTF8_T)0x0A) // if the line feed delimiter is found
{
i++;
rc = NSSCS_SUCCESS;
break;
}
else
{
val[k] = secBuf[i];
k++;
}
}
}
*index = i;
return(rc);
/* ############################### CODE ENDS HERE ############################# */
} /* end of sscsshs_ParseSecretBuf */
/* ########################################################################## */
/* ################ SECRETSTORE CLIENT SERVICE SDK CALLS #################### */
/* ########################################################################## */
/*
* NAME - miCASAOpenSecretStoreCache
*
* DESCRIPTION
*
*
*/
SSCS_GLOBAL_LIBCALL_PTR(void)
miCASAOpenSecretStoreCache
(
SSCS_SECRETSTORE_T * ssid,
uint32_t ssFlags,
SSCS_EXT_T * ext
)
{ /* beginning of the call */
/* ########################## DECLARATIONS START HERE ######################### */
SSCS_CONTEXT_T *storeContext = NULL;
SSCS_SECRETSTORE_INFO_T ssInfo = {0};
SSCS_KEYCHAIN_ID_T kc = {0};
SSCS_KEYCHAIN_ID_LIST_T *kcIDList = NULL;
uint32_t bytesRequired = 0;
SSCS_SRCH_KEY_T searchKey = {0};
/* ############################## CODE STARTS HERE ############################ */
searchKey.srchKey[0] = NSSCS_ENUM_DELIM;
searchKey.srchKeyLen = sscs_Utf8Strlen(searchKey.srchKey) + 1;
if((ssid == NULL))
{
return(NULL);
}
else
{
2005-11-30 18:36:44 +01:00
if (sscs_Utf8StrSize(ssid->ssName) == 0)
{
// set to default
2005-11-30 18:36:44 +01:00
sscs_Utf8Strcpy(ssid->ssName, SSCS_DEFAULT_SECRETSTORE_ID);
}
ssid->version = NSSCS_VERSION_NUMBER;
}
//* allocate the context
if((storeContext = (SSCS_CONTEXT_T *)malloc(sizeof(SSCS_CONTEXT_T))) == NULL)
{
return(NULL);
}
else
{
memset(storeContext, 0, sizeof(SSCS_CONTEXT_T));
}
//* open the SecretStore to initialize the handle to it
if((storeContext->ssHandle = sscs_CacheOpenSecretStore(ssid, ssFlags, NULL)) == NULL)
{
goto errorLevel1;
}
if(sscs_CacheGetSecretStoreInfo(storeContext->ssHandle, ssFlags, &ssInfo, NULL))
{
goto errorLevel1;
}
if((kcIDList = (SSCS_KEYCHAIN_ID_LIST_T *)malloc(sizeof(SSCS_KEYCHAIN_ID_LIST_T))) == NULL)
{
goto errorLevel1;
}
memset(kcIDList, 0, sizeof(SSCS_KEYCHAIN_ID_LIST_T));
if(ssInfo.numKeyChains)
{
if((kcIDList->keyChainIDList = (SSCS_KEYCHAIN_ID_T *)
malloc(sizeof(SSCS_KEYCHAIN_ID_T) * ssInfo.numKeyChains)) == NULL)
{
goto errorLevel2;
}
memset(kcIDList->keyChainIDList, 0, (sizeof(SSCS_KEYCHAIN_ID_T) * ssInfo.numKeyChains));
kcIDList->returnedIDs = ssInfo.numKeyChains;
kcIDList->enumHandle = 1;
if(sscs_CacheEnumerateKeychainIDs(storeContext->ssHandle, ssFlags, &searchKey,
kcIDList, NULL))
{
goto errorLevel3;
}
storeContext->kcids = kcIDList;
}
else
{
// for now
ssInfo.numKeyChains = NSSCS_MAX_NUM_OF_DEFAULT_KEYCHAINS;
if((kcIDList->keyChainIDList = (SSCS_KEYCHAIN_ID_T *)
malloc(sizeof(SSCS_KEYCHAIN_ID_T) * ssInfo.numKeyChains)) == NULL)
{
goto errorLevel2;
}
memset(kcIDList->keyChainIDList, 0, (sizeof(SSCS_KEYCHAIN_ID_T) * ssInfo.numKeyChains));
kcIDList->returnedIDs = ssInfo.numKeyChains;
kcIDList->enumHandle = 0;
// create the default Keychains
// For Phase one only add
ssFlags |= SSCS_SESSION_KEY_CHAIN_F;
sscs_Utf8Strcpy(kc.keychainID, SSCS_SESSION_KEY_CHAIN_ID);
kc.len = SSCS_S_KC_ID_CHARS;
if(sscs_CacheAddKeychain(storeContext->ssHandle, ssFlags, &kc, NULL))
{
goto errorLevel2;
}
}
/* ############################### CODE EXITS HERE ############################# */
return(storeContext);
errorLevel3:
if(kcIDList->keyChainIDList)
{
free(kcIDList->keyChainIDList);
}
errorLevel2:
if(kcIDList)
{
free(kcIDList);
}
errorLevel1:
free(storeContext);
return(NULL);
/* ########################## CODE ENDS HERE ##################### */
} //* end of miCASAOpenSecretStoreCache
/*
* NAME - miCASACloseSecretStoreCache
*
* DESCRIPTION
*
*
*/
SSCS_GLOBAL_LIBCALL(int32_t)
miCASACloseSecretStoreCache
(
void * context,
uint32_t ssFlags,
SSCS_EXT_T * ext
)
{ /* beginning of the call */
/* ########################## DECLARATIONS START HERE ######################### */
int32_t rc = NSSCS_SUCCESS;
SSCS_CONTEXT_T *storeContext = (SSCS_CONTEXT_T *)context;
/* ############################## CODE STARTS HERE ############################ */
if(context == NULL)
{
return(NSSCS_E_INVALID_PARAM);
}
if(storeContext->ssHandle)
{
rc = sscs_CacheCloseSecretStore(storeContext->ssHandle, ssFlags, NULL);
}
if(storeContext->kcids)
{
if(storeContext->kcids->keyChainIDList)
{
free(storeContext->kcids->keyChainIDList);
}
free(storeContext->kcids);
}
free(context);
return(rc);
/* ########################## CODE ENDS HERE ##################### */
} //* end of miCASACloseSecretStoreCache
/*
* NAME - miCASAReadSecret
*
* DESCRIPTION
*
*
*/
SSCS_GLOBAL_LIBCALL(int32_t)
miCASAReadSecret
(
void * context,
SSCS_KEYCHAIN_ID_T * keyChainID,
uint32_t ssFlags,
void * secretHandle,
SSCS_SH_SECRET_ID_T * sharedSecretID,
SSCS_PASSWORD_T * epPassword,
SSCS_READEXT_T * readData,
SSCS_EXT_T * ext
)
{ /* beginning of the call */
/* ########################## DECLARATIONS START HERE ######################### */
int32_t rc = 0, index = 0, escNameLen = 0;
SSCS_SECRET_ID_T secretID = {0};
SS_UTF8_T *escapedSHSName = NULL, *key = NULL;
SSCS_SECRET_T secBuf = {0};
uint8_t *val = NULL;
uint32_t vLen = 0;
uint32_t bytesRequired = 0;
SSCS_CONTEXT_T *storeContext = (SSCS_CONTEXT_T *)context;
/* ############################## CODE STARTS HERE ############################ */
// readData and epPassword are optional parameters
if((context == NULL) || (secretHandle == NULL) || (keyChainID == NULL) ||
(sharedSecretID == NULL))
{
return(NSSCS_E_INVALID_PARAM);
}
if((key = (SS_UTF8_T *) malloc(NSSCS_MAX_SECRET_ID_LEN)) == NULL)
{
return(NSSCS_E_SYSTEM_FAILURE);
}
if((secBuf.data = (uint8_t *) malloc(NSSCS_MAX_SECRET_BUF_LEN)) == NULL)
{
rc = NSSCS_E_SYSTEM_FAILURE;
goto errorLevel5;
}
secBuf.len = NSSCS_MAX_SECRET_BUF_LEN;
if((val = (uint8_t *) malloc(NSSCS_MAX_SECRET_BUF_LEN)) == NULL)
{
rc = NSSCS_E_SYSTEM_FAILURE;
goto errorLevel4;
}
secretID.len = NSSCS_MAX_SECRET_ID_LEN;
if((escapedSHSName = (SS_UTF8_T *) malloc(NSSCS_MAX_SECRET_ID_LEN)) == NULL)
{
rc = NSSCS_E_SYSTEM_FAILURE;
goto errorLevel2;
}
memset(key, 0, NSSCS_MAX_SECRET_ID_LEN);
memset(val, 0, NSSCS_MAX_SECRET_BUF_LEN);
memset(secBuf.data, 0, NSSCS_MAX_SECRET_BUF_LEN);
memset(secretID.id, 0, NSSCS_MAX_SECRET_ID_LEN);
memset(escapedSHSName, 0, NSSCS_MAX_SECRET_ID_LEN);
// escape delimited characters
memcpy(escapedSHSName, sharedSecretID->name, sscs_Utf8StrSize((SS_UTF8_T *)sharedSecretID->name));
sscsshs_ChkEscapeString(escapedSHSName);
if((escNameLen = sscs_Utf8Strlen((SS_UTF8_T *)escapedSHSName)) < 1)
{
rc = NSSCS_E_SECRET_ID_TOO_SHORT;
goto errorLevel1;
}
if(SSCS_APPLICATION_TYPE_F & sharedSecretID->type)
{
sscs_Utf8Strcpy((SS_UTF8_T *)secretID.id, SSCS_APP_SECRET_DELIMITED);
sscs_Utf8Strcat((SS_UTF8_T *)secretID.id, (SS_UTF8_T *)escapedSHSName);
secretID.len = sscs_Utf8Strlen((SS_UTF8_T *)secretID.id) + 1;
}
else if(SSCS_CREDENTIAL_TYPE_F & sharedSecretID->type)
{
sscs_Utf8Strcpy((SS_UTF8_T *)secretID.id, SSCS_CRED_SET_DELIMITED);
sscs_Utf8Strcat((SS_UTF8_T *)secretID.id, (SS_UTF8_T *)escapedSHSName);
secretID.len = sscs_Utf8Strlen((SS_UTF8_T *)secretID.id) + 1;
}
else if(SSCS_BINARY_TYPE_F & sharedSecretID->type)
{
sscs_Utf8Strcpy((SS_UTF8_T *)secretID.id, SSCS_BINARY_SECRET_DELIMITED);
sscs_Utf8Strcat((SS_UTF8_T *)secretID.id, (SS_UTF8_T *)escapedSHSName);
secretID.len = sscs_Utf8Strlen((SS_UTF8_T *)secretID.id) + 1;
}
else
{
rc = NSSCS_E_NOT_SUPPORTED;
goto errorLevel1;
}
if(rc = sscs_CacheReadSecret(storeContext->ssHandle, ssFlags, keyChainID, &secretID, &secBuf,
epPassword, &bytesRequired, readData))
{
goto errorLevel1;
}
if(SSCS_BINARY_TYPE_F & sharedSecretID->type)
{
2005-10-26 16:40:57 +02:00
if((rc = sscsshs_ParseBinarySecretBuf(key, &vLen, val, &secBuf)) == NSSCS_SUCCESS)
{
rc = sscsshs_AddSHSBinaryEntry((LL_LINKLIST_T *)secretHandle, key, vLen, val);
}
}
else
{
2005-10-26 16:40:57 +02:00
while ((rc = sscsshs_ParseSecretBuf(&index, sharedSecretID->type, key, (SS_UTF8_T *)val, &secBuf)) == NSSCS_SUCCESS)
{
if(rc = sscsshs_AddSHSEntry((LL_LINKLIST_T *)secretHandle, key, val))
{
goto errorLevel1;
}
memset(key, 0, NSSCS_MAX_SECRET_ID_LEN);
memset(val, 0, NSSCS_MAX_SECRET_BUF_LEN);
}
2005-10-26 16:40:57 +02:00
// did we exhaust the buffer?
if (rc == NSSCS_E_OBJECT_NOT_FOUND)
rc = NSSCS_SUCCESS;
}
/* ############################### CODE EXITS HERE ############################# */
errorLevel1:
if(escapedSHSName)
{
memset(escapedSHSName, 0, NSSCS_MAX_SECRET_ID_LEN);
free(escapedSHSName);
}
errorLevel2:
if(secretID.id)
{
memset(secretID.id, 0, NSSCS_MAX_SECRET_ID_LEN);
}
if(secBuf.data)
{
memset(secBuf.data, 0, NSSCS_MAX_SECRET_BUF_LEN);
free(secBuf.data);
}
errorLevel4:
if(val)
{
memset(val, 0, NSSCS_MAX_SECRET_BUF_LEN);
free(val);
}
errorLevel5:
if(key)
{
memset(key, 0, NSSCS_MAX_SECRET_ID_LEN);
free(key);
}
return(rc);
/* ############################### CODE ENDS HERE ############################# */
} //* end of miCASAReadSecret
/*
* NAME - miCASARemoveSecret
*
* DESCRIPTION
*
*
*/
SSCS_GLOBAL_LIBCALL(int32_t)
miCASARemoveSecret
(
void * context,
SSCS_KEYCHAIN_ID_T * keyChainID,
uint32_t ssFlags,
SSCS_SH_SECRET_ID_T * sharedSecretID,
SSCS_PASSWORD_T * epPassword,
SSCS_EXT_T * ext
)
{ /* beginning of the call */
/* ########################## DECLARATIONS START HERE ######################### */
int32_t rc = 0, index = 0;
uint32_t escNameLen = 0;
SSCS_SECRET_ID_T secretID = {0};
SS_UTF8_T *escapedSHSName = NULL, *key = NULL;
uint8_t *val = NULL;
SSCS_CONTEXT_T *storeContext = (SSCS_CONTEXT_T *)context;
/* ############################## CODE STARTS HERE ############################ */
if((context == NULL) || (keyChainID == NULL) || (sharedSecretID == NULL))
{
return(NSSCS_E_INVALID_PARAM);
}
if((key = (SS_UTF8_T *) malloc(NSSCS_MAX_SECRET_ID_LEN)) == NULL)
{
return(NSSCS_E_SYSTEM_FAILURE);
}
if((val = (uint8_t *) malloc(NSSCS_MAX_SECRET_BUF_LEN)) == NULL)
{
rc = NSSCS_E_SYSTEM_FAILURE;
goto errorLevel4;
}
secretID.len = NSSCS_MAX_SECRET_ID_LEN;
if((escapedSHSName = (SS_UTF8_T *) malloc(NSSCS_MAX_SECRET_ID_LEN)) == NULL)
{
rc = NSSCS_E_SYSTEM_FAILURE;
goto errorLevel2;
}
memset(key, 0, NSSCS_MAX_SECRET_ID_LEN);
memset(val, 0, NSSCS_MAX_SECRET_BUF_LEN);
memset(secretID.id, 0, NSSCS_MAX_SECRET_ID_LEN);
memset(escapedSHSName, 0, NSSCS_MAX_SECRET_ID_LEN);
// escape delimited characters
memcpy(escapedSHSName, sharedSecretID->name, sscs_Utf8StrSize((SS_UTF8_T *)sharedSecretID->name));
sscsshs_ChkEscapeString(escapedSHSName);
if((escNameLen = sscs_Utf8Strlen((SS_UTF8_T *)escapedSHSName)) < 1)
{
rc = NSSCS_E_SECRET_ID_TOO_SHORT;
goto errorLevel1;
}
if(SSCS_APPLICATION_TYPE_F & sharedSecretID->type)
{
sscs_Utf8Strcpy((SS_UTF8_T *)secretID.id, SSCS_APP_SECRET_DELIMITED);
sscs_Utf8Strcat((SS_UTF8_T *)secretID.id, (SS_UTF8_T *)escapedSHSName);
secretID.len = sscs_Utf8Strlen((SS_UTF8_T *)secretID.id) + 1;
}
else if(SSCS_CREDENTIAL_TYPE_F & sharedSecretID->type)
{
sscs_Utf8Strcpy((SS_UTF8_T *)secretID.id, SSCS_CRED_SET_DELIMITED);
sscs_Utf8Strcat((SS_UTF8_T *)secretID.id, (SS_UTF8_T *)escapedSHSName);
secretID.len = sscs_Utf8Strlen((SS_UTF8_T *)secretID.id) + 1;
}
else if(SSCS_BINARY_TYPE_F & sharedSecretID->type)
{
sscs_Utf8Strcpy((SS_UTF8_T *)secretID.id, SSCS_BINARY_SECRET_DELIMITED);
sscs_Utf8Strcat((SS_UTF8_T *)secretID.id, (SS_UTF8_T *)escapedSHSName);
secretID.len = sscs_Utf8Strlen((SS_UTF8_T *)secretID.id) + 1;
}
else
{
rc = NSSCS_E_NOT_SUPPORTED;
goto errorLevel1;
}
rc = sscs_CacheRemoveSecret(storeContext->ssHandle, ssFlags, keyChainID,
&secretID, epPassword, NULL);
/* ############################### CODE EXITS HERE ############################# */
errorLevel1:
if(escapedSHSName)
{
memset(escapedSHSName, 0, NSSCS_MAX_SECRET_ID_LEN);
free(escapedSHSName);
}
errorLevel2:
memset(secretID.id, 0, NSSCS_MAX_SECRET_ID_LEN);
if(val)
{
memset(val, 0, NSSCS_MAX_SECRET_BUF_LEN);
free(val);
}
errorLevel4:
if(key)
{
memset(key, 0, NSSCS_MAX_SECRET_ID_LEN);
free(key);
}
return(rc);
/* ########################## CODE ENDS HERE ##################### */
} //* end of miCASARemoveSecret
/*
* NAME - miCASAWriteSecret
*
* DESCRIPTION
*
*
*/
SSCS_GLOBAL_LIBCALL(int32_t)
miCASAWriteSecret
(
void * context,
SSCS_KEYCHAIN_ID_T * keyChainID,
uint32_t ssFlags,
void * secretHandle,
SSCS_SH_SECRET_ID_T * sharedSecretID,
SSCS_PASSWORD_T * epPassword,
SSCS_EXT_T * ext
)
{ /* beginning of the call */
/* ########################## DECLARATIONS START HERE ######################### */
int32_t rc = 0, sidLen = 0, index = 0;
uint32_t vLen = 0, escNameLen = 0, kLen = 0;
SSCS_SECRET_ID_T secretID = {0};
SS_UTF8_T *escapedSHSName = NULL, *key = NULL;
SSCS_SECRET_T secBuf = {0};
uint8_t *val = NULL;
SSCS_CONTEXT_T * storeContext = (SSCS_CONTEXT_T *)context;
/* ############################## CODE STARTS HERE ############################ */
// readData and epPassword are optional parameters
if((context == NULL) || (secretHandle == NULL) || (keyChainID == NULL) ||
(sharedSecretID == NULL))
{
return(NSSCS_E_INVALID_PARAM);
}
if((key = (SS_UTF8_T *) malloc(NSSCS_MAX_SECRET_ID_LEN)) == NULL)
{
return(NSSCS_E_SYSTEM_FAILURE);
}
if((secBuf.data = (uint8_t *) malloc(NSSCS_MAX_SECRET_BUF_LEN +
sizeof((LL_LINKLIST_T*)secretHandle + sizeof(SSCS_SH_SECRET_ID_T)))) == NULL)
{
rc = NSSCS_E_SYSTEM_FAILURE;
goto errorLevel5;
}
if((val = (uint8_t *) malloc(NSSCS_MAX_SECRET_BUF_LEN)) == NULL)
{
rc = NSSCS_E_SYSTEM_FAILURE;
goto errorLevel4;
}
secretID.len = NSSCS_MAX_SECRET_ID_LEN;
if((escapedSHSName = (SS_UTF8_T *) malloc(NSSCS_MAX_SECRET_ID_LEN)) == NULL)
{
rc = NSSCS_E_SYSTEM_FAILURE;
goto errorLevel2;
}
memset(key, 0, NSSCS_MAX_SECRET_ID_LEN);
memset(val, 0, NSSCS_MAX_SECRET_BUF_LEN);
memset(secBuf.data, 0, NSSCS_MAX_SECRET_BUF_LEN +
sizeof((LL_LINKLIST_T*)secretHandle + sizeof(SSCS_SH_SECRET_ID_T))) ;
memset(secretID.id, 0, NSSCS_MAX_SECRET_ID_LEN);
memset(escapedSHSName, 0, NSSCS_MAX_SECRET_ID_LEN);
// escape delimited characters
memcpy(escapedSHSName, sharedSecretID->name, sscs_Utf8StrSize((SS_UTF8_T *)sharedSecretID->name));
sscsshs_ChkEscapeString(escapedSHSName);
if((escNameLen = sscs_Utf8Strlen((SS_UTF8_T *)escapedSHSName)) < 1)
{
rc = NSSCS_E_SECRET_ID_TOO_SHORT;
goto errorLevel1;
}
if(SSCS_APPLICATION_TYPE_F & sharedSecretID->type)
{
sscs_Utf8Strcpy((SS_UTF8_T *)secretID.id, SSCS_APP_SECRET_DELIMITED);
sscs_Utf8Strcat((SS_UTF8_T *)secretID.id, (SS_UTF8_T *)escapedSHSName);
secretID.len = sscs_Utf8Strlen((SS_UTF8_T *)secretID.id) + 1;
}
else if(SSCS_CREDENTIAL_TYPE_F & sharedSecretID->type)
{
sscs_Utf8Strcpy((SS_UTF8_T *)secretID.id, SSCS_CRED_SET_DELIMITED);
sscs_Utf8Strcat((SS_UTF8_T *)secretID.id, (SS_UTF8_T *)escapedSHSName);
secretID.len = sscs_Utf8Strlen((SS_UTF8_T *)secretID.id) + 1;
}
else if(SSCS_BINARY_TYPE_F & sharedSecretID->type)
{
sscs_Utf8Strcpy((SS_UTF8_T *)secretID.id, SSCS_BINARY_SECRET_DELIMITED);
sscs_Utf8Strcat((SS_UTF8_T *)secretID.id, (SS_UTF8_T *)escapedSHSName);
secretID.len = sscs_Utf8Strlen((SS_UTF8_T *)secretID.id) + 1;
}
else
{
rc = NSSCS_E_NOT_SUPPORTED;
goto errorLevel1;
}
secBuf.len = 0;
if(sharedSecretID->type & SSCS_BINARY_TYPE_F)
{
if(!(sscsshs_GetNextSHSEntry(1, (LL_LINKLIST_T *)secretHandle, &kLen, key, &vLen, (char *)val)))
{
if(rc = sscsshs_PopulateBinarySecretBuf(sharedSecretID->type, key, vLen, val, &secBuf.len, secBuf.data))
{
goto errorLevel1;
}
}
else
{
rc = NSSCS_E_SH_SECRET_FAILURE;
goto errorLevel1;
}
}
else
{
// get each entry and do a write to SecretStore
if((rc = sscsshs_GetNextSHSEntry(1, (LL_LINKLIST_T *)secretHandle, &kLen,
key, &vLen, (char *)val)) == NSSCS_SUCCESS)
{
if(kLen > 2)
{
if(rc = sscsshs_PopulateSecretBuf(sharedSecretID->type, key, (SS_UTF8_T *)val, &secBuf.len, (SS_UTF8_T *)secBuf.data))
{
goto errorLevel1;
}
}
memset(key, 0, NSSCS_MAX_SECRET_ID_LEN);
memset(val, 0, NSSCS_MAX_SECRET_BUF_LEN);
while((rc = sscsshs_GetNextSHSEntry(0, (LL_LINKLIST_T *)secretHandle, &kLen,
key, &vLen, (char *)val)) == NSSCS_SUCCESS)
{
if(kLen > 2)
{
if(rc = sscsshs_PopulateSecretBuf(sharedSecretID->type, key, (SS_UTF8_T *)val, &secBuf.len, (SS_UTF8_T *)secBuf.data))
{
goto errorLevel1;
}
}
memset(key, 0, NSSCS_MAX_SECRET_ID_LEN);
memset(val, 0, NSSCS_MAX_SECRET_BUF_LEN);
}
if((secBuf.data == NULL) || (secBuf.len == 0))
{
rc = NSSCS_E_SH_SECRET_FAILURE;
goto errorLevel1;
}
}
}
rc = sscs_CacheWriteSecret(storeContext->ssHandle, ssFlags, keyChainID, &secretID, &secBuf, epPassword, ext);
/* ############################### CODE EXITS HERE ############################# */
errorLevel1:
if(escapedSHSName)
{
memset(escapedSHSName, 0, NSSCS_MAX_SECRET_ID_LEN);
free(escapedSHSName);
}
errorLevel2:
memset(secretID.id, 0, NSSCS_MAX_SECRET_ID_LEN);
if(secBuf.data)
{
memset(secBuf.data, 0, NSSCS_MAX_SECRET_BUF_LEN +
sizeof((LL_LINKLIST_T*)secretHandle + sizeof(SSCS_SH_SECRET_ID_T))) ;
free(secBuf.data);
}
errorLevel4:
if(val)
{
memset(val, 0, NSSCS_MAX_SECRET_BUF_LEN);
free(val);
}
errorLevel5:
if(key)
{
memset(key, 0, NSSCS_MAX_SECRET_ID_LEN);
free(key);
}
return(rc);
/* ############################### CODE ENDS HERE ############################# */
} //* end of miCASAWriteSecret
/*
* NAME - miCASAWriteKey
*
* DESCRIPTION
* NOTE: This assume a SS_CREDSET SecretType
*
*
*/
SSCS_GLOBAL_LIBCALL(int32_t)
miCASAWriteKey
(
void * context,
uint32_t ssFlags,
SSCS_KEYCHAIN_ID_T * keyChainID,
SSCS_SECRET_ID_T * sharedSecretID,
SS_UTF8_T * key,
uint32_t keyLen,
uint8_t * val,
uint32_t valLen,
SSCS_PASSWORD_T * epPassword,
SSCS_EXT_T * ext
)
{ /* beginning of the call */
/* ########################## DECLARATIONS START HERE ######################### */
int32_t rc = 0, sidLen = 0, index = 0;
uint32_t escNameLen = 0;
SSCS_SECRET_ID_T secretID = {0};
SS_UTF8_T *escapedSHSName = NULL;
2005-10-26 16:40:57 +02:00
SS_UTF8_T *escapedSHSKey = NULL;
SS_UTF8_T *escapedSHSValue = NULL;
SSCS_CONTEXT_T * storeContext = (SSCS_CONTEXT_T *)context;
/* ############################## CODE STARTS HERE ############################ */
// readData and epPassword are optional parameters
if((context == NULL) || (keyChainID == NULL) || (sharedSecretID == NULL) || (key == NULL))
{
return(NSSCS_E_INVALID_PARAM);
}
secretID.len = NSSCS_MAX_SECRET_ID_LEN;
if((escapedSHSName = (SS_UTF8_T *) malloc(NSSCS_MAX_SECRET_ID_LEN)) == NULL)
{
rc = NSSCS_E_SYSTEM_FAILURE;
goto errorLevel2;
}
2005-10-26 16:40:57 +02:00
if((escapedSHSKey = (SS_UTF8_T *) malloc(NSSCS_MAX_PASSCODE_LEN)) == NULL)
{
rc = NSSCS_E_SYSTEM_FAILURE;
goto errorLevel1;
}
if((escapedSHSValue = (SS_UTF8_T *) malloc(NSSCS_MAX_PASSCODE_LEN)) == NULL)
{
rc = NSSCS_E_SYSTEM_FAILURE;
goto errorLevel1;
}
memset(secretID.id, 0, NSSCS_MAX_SECRET_ID_LEN);
memset(escapedSHSName, 0, NSSCS_MAX_SECRET_ID_LEN);
2005-10-26 16:40:57 +02:00
memset(escapedSHSKey, 0, NSSCS_MAX_PASSCODE_LEN);
memset(escapedSHSValue, 0, NSSCS_MAX_PASSCODE_LEN);
// escape delimited characters
memcpy(escapedSHSName, sharedSecretID->id, sscs_Utf8StrSize((SS_UTF8_T *)sharedSecretID->id));
sscsshs_ChkEscapeString(escapedSHSName);
2005-10-26 16:40:57 +02:00
memcpy(escapedSHSKey, key, keyLen);
sscsshs_ChkEscapeString(escapedSHSKey);
memcpy(escapedSHSValue, val, valLen);
sscsshs_ChkEscapeString(escapedSHSValue);
if((escNameLen = sscs_Utf8Strlen((SS_UTF8_T *)escapedSHSName)) < 1)
{
rc = NSSCS_E_SECRET_ID_TOO_SHORT;
goto errorLevel1;
}
// convert to a SSCS_CRED_SET
sscs_Utf8Strcpy((SS_UTF8_T *)secretID.id, SSCS_CRED_SET_DELIMITED);
sscs_Utf8Strcat((SS_UTF8_T *)secretID.id, (SS_UTF8_T *)escapedSHSName);
secretID.len = sscs_Utf8Strlen((SS_UTF8_T *)secretID.id) + 1;
//rc = sscs_CacheWriteSecret(storeContext->ssHandle, ssFlags, keyChainID, &secretID, &secBuf, epPassword, ext);
// -1 to prevent the null from being cached in micasad
2005-10-26 16:40:57 +02:00
rc = sscs_CacheWriteKey(storeContext->ssHandle,
ssFlags,
keyChainID,
&secretID,
escapedSHSKey,
sscs_Utf8Strlen(escapedSHSKey),
escapedSHSValue,
sscs_Utf8Strlen(escapedSHSValue),
epPassword,
ext);
/* ############################### CODE EXITS HERE ############################# */
errorLevel1:
if(escapedSHSName)
{
memset(escapedSHSName, 0, NSSCS_MAX_SECRET_ID_LEN);
free(escapedSHSName);
}
2005-10-26 16:40:57 +02:00
if (escapedSHSKey)
{
memset(escapedSHSKey, 0, NSSCS_MAX_PASSCODE_LEN);
free(escapedSHSKey);
}
if (escapedSHSValue)
{
memset(escapedSHSValue, 0, NSSCS_MAX_PASSCODE_LEN);
free(escapedSHSValue);
}
errorLevel2:
memset(secretID.id, 0, NSSCS_MAX_SECRET_ID_LEN);
return(rc);
/* ############################### CODE ENDS HERE ############################# */
} //* end of miCASAWriteSecret
2005-12-09 18:42:13 +01:00
/*
* NAME - miCASAWriteBinaryKey
*
* DESCRIPTION
* NOTE: This assume a SS_CREDSET SecretType
*
*
*/
SSCS_GLOBAL_LIBCALL(int32_t)
miCASAWriteBinaryKey
(
void * context,
uint32_t ssFlags,
SSCS_KEYCHAIN_ID_T * keyChainID,
SSCS_SECRET_ID_T * sharedSecretID,
SS_UTF8_T * key,
uint32_t keyLen,
uint8_t * val,
2005-12-10 05:47:37 +01:00
uint32_t * valLen,
2005-12-09 18:42:13 +01:00
SSCS_PASSWORD_T * epPassword,
SSCS_EXT_T * ext
)
{ /* beginning of the call */
/* ########################## DECLARATIONS START HERE ######################### */
int32_t rc = 0, sidLen = 0, index = 0;
uint32_t escNameLen = 0;
SSCS_SECRET_ID_T secretID = {0};
SS_UTF8_T *escapedSHSName = NULL;
SS_UTF8_T *escapedSHSKey = NULL;
//SS_UTF8_T *escapedSHSValue = NULL;
SSCS_CONTEXT_T * storeContext = (SSCS_CONTEXT_T *)context;
/* ############################## CODE STARTS HERE ############################ */
// readData and epPassword are optional parameters
if((context == NULL) || (keyChainID == NULL) || (sharedSecretID == NULL) || (key == NULL))
{
return(NSSCS_E_INVALID_PARAM);
}
secretID.len = NSSCS_MAX_SECRET_ID_LEN;
if((escapedSHSName = (SS_UTF8_T *) malloc(NSSCS_MAX_SECRET_ID_LEN)) == NULL)
{
rc = NSSCS_E_SYSTEM_FAILURE;
goto errorLevel2;
}
if((escapedSHSKey = (SS_UTF8_T *) malloc(NSSCS_MAX_PASSCODE_LEN)) == NULL)
{
rc = NSSCS_E_SYSTEM_FAILURE;
goto errorLevel1;
}
memset(secretID.id, 0, NSSCS_MAX_SECRET_ID_LEN);
memset(escapedSHSName, 0, NSSCS_MAX_SECRET_ID_LEN);
memset(escapedSHSKey, 0, NSSCS_MAX_PASSCODE_LEN);
// escape delimited characters
memcpy(escapedSHSName, sharedSecretID->id, sscs_Utf8StrSize((SS_UTF8_T *)sharedSecretID->id));
sscsshs_ChkEscapeString(escapedSHSName);
memcpy(escapedSHSKey, key, keyLen);
sscsshs_ChkEscapeString(escapedSHSKey);
if((escNameLen = sscs_Utf8Strlen((SS_UTF8_T *)escapedSHSName)) < 1)
{
rc = NSSCS_E_SECRET_ID_TOO_SHORT;
goto errorLevel1;
}
// convert to a SSCS_CRED_SET
sscs_Utf8Strcpy((SS_UTF8_T *)secretID.id, SSCS_CRED_SET_DELIMITED);
sscs_Utf8Strcat((SS_UTF8_T *)secretID.id, (SS_UTF8_T *)escapedSHSName);
secretID.len = sscs_Utf8Strlen((SS_UTF8_T *)secretID.id) + 1;
//rc = sscs_CacheWriteSecret(storeContext->ssHandle, ssFlags, keyChainID, &secretID, &secBuf, epPassword, ext);
// -1 to prevent the null from being cached in micasad
rc = sscs_CacheWriteBinaryKey(storeContext->ssHandle,
ssFlags,
keyChainID,
&secretID,
escapedSHSKey,
sscs_Utf8Strlen(escapedSHSKey),
val,
2005-12-10 05:47:37 +01:00
*valLen,
2005-12-09 18:42:13 +01:00
epPassword,
ext);
/* ############################### CODE EXITS HERE ############################# */
errorLevel1:
if(escapedSHSName)
{
memset(escapedSHSName, 0, NSSCS_MAX_SECRET_ID_LEN);
free(escapedSHSName);
}
if (escapedSHSKey)
{
memset(escapedSHSKey, 0, NSSCS_MAX_PASSCODE_LEN);
free(escapedSHSKey);
}
errorLevel2:
memset(secretID.id, 0, NSSCS_MAX_SECRET_ID_LEN);
return(rc);
/* ############################### CODE ENDS HERE ############################# */
} //* end of miCASAWriteBinaryKey
/*
* NAME - miCASAWriteKey
*
* DESCRIPTION
* NOTE: This assume a SS_CREDSET SecretType
*
*
*/
SSCS_GLOBAL_LIBCALL(int32_t)
miCASAReadBinaryKey
(
void * context,
uint32_t ssFlags,
SSCS_KEYCHAIN_ID_T * keyChainID,
SSCS_SECRET_ID_T * sharedSecretID,
SS_UTF8_T * key,
uint32_t keyLen,
uint8_t * val,
uint32_t * valLen,
SSCS_PASSWORD_T * epPassword,
uint32_t * bytesRequired,
SSCS_EXT_T * ext
)
{ /* beginning of the call */
/* ########################## DECLARATIONS START HERE ######################### */
int32_t rc = 0, sidLen = 0, index = 0;
uint32_t escNameLen = 0;
SSCS_SECRET_ID_T secretID = {0};
SS_UTF8_T *escapedSHSName = NULL;
SS_UTF8_T *escapedSHSKey = NULL;
SSCS_CONTEXT_T * storeContext = (SSCS_CONTEXT_T *)context;
/* ############################## CODE STARTS HERE ############################ */
// readData and epPassword are optional parameters
if((context == NULL) || (keyChainID == NULL) || (sharedSecretID == NULL) || (key == NULL))
{
return(NSSCS_E_INVALID_PARAM);
}
secretID.len = NSSCS_MAX_SECRET_ID_LEN;
if((escapedSHSName = (SS_UTF8_T *) malloc(NSSCS_MAX_SECRET_ID_LEN)) == NULL)
{
rc = NSSCS_E_SYSTEM_FAILURE;
goto errorLevel2;
}
if((escapedSHSKey = (SS_UTF8_T *) malloc(NSSCS_MAX_PASSCODE_LEN)) == NULL)
{
rc = NSSCS_E_SYSTEM_FAILURE;
goto errorLevel1;
}
memset(secretID.id, 0, NSSCS_MAX_SECRET_ID_LEN);
memset(escapedSHSName, 0, NSSCS_MAX_SECRET_ID_LEN);
memset(escapedSHSKey, 0, NSSCS_MAX_PASSCODE_LEN);
// escape delimited characters
memcpy(escapedSHSName, sharedSecretID->id, sscs_Utf8StrSize((SS_UTF8_T *)sharedSecretID->id));
sscsshs_ChkEscapeString(escapedSHSName);
memcpy(escapedSHSKey, key, keyLen);
sscsshs_ChkEscapeString(escapedSHSKey);
if((escNameLen = sscs_Utf8Strlen((SS_UTF8_T *)escapedSHSName)) < 1)
{
rc = NSSCS_E_SECRET_ID_TOO_SHORT;
goto errorLevel1;
}
// convert to a SSCS_CRED_SET
sscs_Utf8Strcpy((SS_UTF8_T *)secretID.id, SSCS_CRED_SET_DELIMITED);
sscs_Utf8Strcat((SS_UTF8_T *)secretID.id, (SS_UTF8_T *)escapedSHSName);
secretID.len = sscs_Utf8Strlen((SS_UTF8_T *)secretID.id) + 1;
rc = sscs_CacheReadBinaryKey(storeContext->ssHandle,
ssFlags,
keyChainID,
&secretID,
escapedSHSKey,
sscs_Utf8Strlen(escapedSHSKey),
val,
valLen,
epPassword,
bytesRequired,
ext);
/* ############################### CODE EXITS HERE ############################# */
errorLevel1:
if(escapedSHSName)
{
memset(escapedSHSName, 0, NSSCS_MAX_SECRET_ID_LEN);
free(escapedSHSName);
}
if (escapedSHSKey)
{
memset(escapedSHSKey, 0, NSSCS_MAX_PASSCODE_LEN);
free(escapedSHSKey);
}
errorLevel2:
memset(secretID.id, 0, NSSCS_MAX_SECRET_ID_LEN);
return(rc);
/* ############################### CODE ENDS HERE ############################# */
} //* end of miCASAWriteSecret
/*
* NAME - miCASAGetStoreInfomaion
*
* DESCRIPTION
*
*
*/
SSCS_GLOBAL_LIBCALL(int32_t)
miCASAGetStoreInformation
(
void * context,
uint32_t ssFlags,
SSCS_SECRETSTORE_INFO_T * ssInfo,
SSCS_EXT_T * ext
)
{ /* beginning of the call */
/* ########################## DECLARATIONS START HERE ######################### */
int32_t rc = 0;
SSCS_CONTEXT_T *storeContext = (SSCS_CONTEXT_T *)context;
/* ############################## CODE STARTS HERE ############################ */
if((context == NULL) || (ssInfo == NULL))
{
return(NSSCS_E_INVALID_PARAM);
}
return(sscs_CacheGetSecretStoreInfo(storeContext, ssFlags, ssInfo, NULL));
/* ########################## CODE ENDS HERE ##################### */
} //* end of miCASAGetStoreInfomaion
/*
* NAME - miCASAEnumerateSecretIDs
*
* DESCRIPTION
*
*
*/
SSCS_GLOBAL_LIBCALL(int32_t)
miCASAEnumerateSecretIDs
(
void * context,
SSCS_KEYCHAIN_ID_T * keyChainID,
uint32_t ssFlags,
SSCS_SRCH_KEY_T * searchKey,
SSCS_SH_SECRET_ID_LIST_T * secretIDList,
SSCS_EXT_T * ext
)
{ /* beginning of the call */
/* ########################## DECLARATIONS START HERE ######################### */
int32_t rc = NSSCS_SUCCESS;
uint32_t i;
SSCS_CONTEXT_T *storeContext = (SSCS_CONTEXT_T *)context;
SSCS_SECRET_ID_LIST_T intSecIDList = {0};
/* ############################## CODE STARTS HERE ############################ */
if((context == NULL) || (keyChainID == NULL) || (secretIDList == NULL))
{
secretIDList->enumHandle = 0;
return(NSSCS_E_INVALID_PARAM);
}
if((secretIDList->returnedIDs == 0))
{
secretIDList->enumHandle = 0;
return(NSSCS_E_INVALID_PARAM);
}
// enumeration handle should be set to false by the cache after we are done
//secretIDList->enumHandle = 1;
if((intSecIDList.secIDList =
(SSCS_SECRET_ID_T *)malloc(sizeof(SSCS_SECRET_ID_T) * secretIDList->returnedIDs)) == NULL)
{
secretIDList->enumHandle = 0;
return(NSSCS_E_SYSTEM_FAILURE);
}
else
{
// initialzie the arrary
memset(intSecIDList.secIDList, 0, (sizeof(SSCS_SECRET_ID_T) * secretIDList->returnedIDs));
intSecIDList.enumHandle = secretIDList->enumHandle;
intSecIDList.returnedIDs = secretIDList->returnedIDs;
}
// check the search key and escape it here
if(rc = sscs_CacheEnumerateSecretIDs(storeContext->ssHandle, ssFlags, keyChainID, searchKey,
&intSecIDList, NULL))
{
if(rc == NSSCS_E_ENUM_BUFF_TOO_SHORT)
{
secretIDList->returnedIDs = intSecIDList.returnedIDs;
}
secretIDList->enumHandle = 0;
goto errorLevel1;
}
for(secretIDList->returnedIDs = i = 0; i < intSecIDList.returnedIDs; i++)
{
if(sscsshs_UnescapeSecretIDBuf(&secretIDList->secIDList[i], &intSecIDList.secIDList[i]) )
{
// go to the next one
continue;
}
else
{
secretIDList->returnedIDs++;
}
}
secretIDList->enumHandle = intSecIDList.enumHandle;
/* ############################### CODE EXITS HERE ############################# */
errorLevel1:
free(intSecIDList.secIDList);
return(rc);
/* ########################## CODE ENDS HERE ##################### */
} //* end of miCASAEnumerateSecretIDs
/*
* NAME - miCASARemoveSecretStore
*
* DESCRIPTION
*
*
*/
SSCS_GLOBAL_LIBCALL(int32_t)
miCASARemoveSecretStore
(
void * context,
uint32_t ssFlags,
SSCS_EXT_T * ext
)
{ /* beginning of the call */
/* ########################## DECLARATIONS START HERE ######################### */
int32_t rc = 0; // need this for debugging.
SSCS_CONTEXT_T *storeContext = (SSCS_CONTEXT_T *)context;
/* ############################## CODE STARTS HERE ############################ */
if(storeContext == NULL)
{
return(NSSCS_E_INVALID_PARAM);
}
rc = sscs_CacheRemoveSecretStore(storeContext->ssHandle, ssFlags, NULL);
return(rc);
/* ########################## CODE ENDS HERE ##################### */
} //* end of miCASARemoveSecretStore
/*
* NAME - miCASAMasterPassword
*
* DESCRIPTION
*
*
*/
SSCS_GLOBAL_LIBCALL(int32_t)
miCASASetMasterPassword
(
uint32_t ssFlags,
SSCS_PASSWORD_T *passwd,
SSCS_HINT_T *hint,
SSCS_EXT_T *ext
)
{ /* beginning of the call */
/* ########################## DECLARATIONS START HERE ######################### */
int32_t rc = 0;
void *context = NULL;
SSCS_SECRETSTORE_T store = {0};
// open secretStore
sscs_Utf8Strcpy(store.ssName, SSCS_DEFAULT_SECRETSTORE_ID);
store.version = 1;
context = miCASAOpenSecretStoreCache(&store, ssFlags, NULL);
if((context == NULL) || (passwd == NULL))
{
return(NSSCS_E_INVALID_PARAM);
}
rc = sscs_SetMasterPassword(((SSCS_CONTEXT_T*)context)->ssHandle,passwd,hint, NULL);
// close the secretstore
miCASACloseSecretStoreCache(context, ssFlags, NULL);
return(rc);
/* ############################## CODE STARTS HERE ############################ */
return(NSSCS_E_NOT_IMPLEMENTED);
/* ############################### CODE EXITS HERE ############################# */
/* ########################## CODE ENDS HERE ##################### */
} //* end of miCASASetMasterPassword
/*
* NAME - miCASAUnlockSecrets
*
* DESCRIPTION
*
*
*/
SSCS_GLOBAL_LIBCALL(int32_t)
miCASAUnlockSecrets
(
void * context,
uint32_t ssFlags,
SSCS_PASSWORD_T * password,
SSCS_EXT_T * ext
)
{ /* beginning of the call */
/* ########################## DECLARATIONS START HERE ######################### */
/* ############################## CODE STARTS HERE ############################ */
return(NSSCS_E_NOT_IMPLEMENTED);
/* ############################### CODE EXITS HERE ############################# */
/* ########################## CODE ENDS HERE ##################### */
} //* end of miCASAUnlockSecrets
/*
* NAME - miCASALockStore
*
* DESCRIPTION
*
*
*/
SSCS_GLOBAL_LIBCALL(int32_t)
miCASALockStore
(
void * context,
uint32_t ssFlags,
SSCS_EXT_T * ext
)
{ /* beginning of the call */
/* ########################## DECLARATIONS START HERE ######################### */
int32_t rc;
SSCS_CONTEXT_T *storeContext = (SSCS_CONTEXT_T *)context;
/* ############################## CODE STARTS HERE ############################ */
if(context == NULL)
{
return(NSSCS_E_INVALID_PARAM);
}
rc = sscs_LockCache(storeContext->ssHandle, ssFlags, NULL);
return(rc);
/* ########################## CODE ENDS HERE ##################### */
} //* end of miCASALockStore
/*
* NAME - miCASAUnlockStore
*
* DESCRIPTION
*
*
*/
SSCS_GLOBAL_LIBCALL(int32_t)
miCASAUnlockStore
(
void * context,
uint32_t ssFlags,
SSCS_PASSCODE_T * passcode,
SSCS_EXT_T * ext
)
{ /* beginning of the call */
/* ########################## DECLARATIONS START HERE ######################### */
int32_t rc;
SSCS_CONTEXT_T *storeContext = (SSCS_CONTEXT_T *)context;
/* ############################## CODE STARTS HERE ############################ */
if(context == NULL)
{
return(NSSCS_E_INVALID_PARAM);
}
rc = sscs_UnlockCache(storeContext->ssHandle, ssFlags, passcode, NULL);
return(rc);
/* ########################## CODE ENDS HERE ##################### */
} //* end of miCASAUnlockStore
/*
* NAME - miCASARemoveKeyChain
*
* DESCRIPTION
*
*
*/
SSCS_GLOBAL_LIBCALL(int32_t)
miCASARemoveKeyChain
(
void * context,
uint32_t ssFlags,
SSCS_KEYCHAIN_ID_T * keyChainID,
SSCS_EXT_T * ext
)
{ /* beginning of the call */
/* ########################## DECLARATIONS START HERE ######################### */
int32_t rc = 0;
SSCS_CONTEXT_T *storeContext = (SSCS_CONTEXT_T *)context;
/* ############################## CODE STARTS HERE ############################ */
if((context == NULL) || (keyChainID == NULL))
{
return(NSSCS_E_INVALID_PARAM);
}
rc = sscs_CacheRemoveKeychain(storeContext, ssFlags, keyChainID, NULL);
return(rc);
/* ########################## CODE ENDS HERE ##################### */
} //* end of miCASARemoveKeyChain
/*
* NAME - miCASAEnumerteKeyChainIDs
*
* DESCRIPTION
*
*
*/
SSCS_GLOBAL_LIBCALL(int32_t)
miCASAEnumerateKeyChainIDs
(
void * context,
uint32_t ssFlags,
SSCS_SRCH_KEY_T * searchKey,
SSCS_KEYCHAIN_ID_LIST_T * kcIDList,
SSCS_EXT_T * ext
)
{ /* beginning of the call */
/* ########################## DECLARATIONS START HERE ######################### */
int32_t rc = 0;
SSCS_CONTEXT_T *storeContext = (SSCS_CONTEXT_T *)context;
/* ############################## CODE STARTS HERE ############################ */
if((context == NULL) || (kcIDList == NULL))
{
return(NSSCS_E_INVALID_PARAM);
}
rc = sscs_CacheEnumerateKeychainIDs(storeContext, ssFlags, searchKey, kcIDList, NULL);
return(rc);
/* ########################## CODE ENDS HERE ##################### */
} //* end of miCASAEnumerateKeyChainIDs
/*
* NAME - miCASAAddKeyChain
*
* DESCRIPTION
*
*
*/
SSCS_GLOBAL_LIBCALL(int32_t)
miCASAAddKeyChain
(
void * context,
uint32_t ssFlags,
SSCS_KEYCHAIN_ID_T * keyChainID,
SSCS_EXT_T * ext
)
{ /* beginning of the call */
/* ########################## DECLARATIONS START HERE ######################### */
int32_t rc = 0;
SSCS_CONTEXT_T *storeContext = (SSCS_CONTEXT_T *)context;
/* ############################## CODE STARTS HERE ############################ */
if((context == NULL) || (keyChainID == NULL))
{
return(NSSCS_E_INVALID_PARAM);
}
rc = sscs_CacheAddKeychain(storeContext, ssFlags, keyChainID, NULL);
return(rc);
/* ########################## CODE ENDS HERE ##################### */
} //* end of miCASAAddKeyChain
/* ########################################################################## */
/* ############ SECRETSTORE CLIENT SHARED SECRET SUPPORT CALLS ############## */
/* ########################################################################## */
/*
* NAME - miCASA_CreateSHSHandle
*
* DESCRIPTION
* Create a parser list handle for a Shared Secret.
*
*/
SSCS_GLOBAL_LIBCALL_PTR(void)
miCASA_CreateSHSHandle()
{ /* beginning of the call */
/* ########################## DECLARATIONS START HERE ######################### */
LL_LINKLIST_T *newList;
/* ############################## CODE STARTS HERE ############################ */
if((newList = (LL_LINKLIST_T *)(malloc(NSSCS_MAX_SECRET_BUF_LEN))))
{
memset(newList, 0, NSSCS_MAX_SECRET_BUF_LEN);
newList->elemCount = 0;
newList->head = NULL;
newList->clp = NULL;
return(newList);
}
else
{
return(NULL);
}
/* ############################### CODE ENDS HERE ############################# */
} //* end of miCASA_CreateSHSHandle
/*
* NAME - miCASA_DestorySHSHandle
*
* DESCRIPTION
* Destroys a parser list handle for a Shared Secrets.
*
*/
SSCS_GLOBAL_LIBCALL(int32_t)
miCASA_DestroySHSHandle(void *secretHandle)
{ /* beginning of the call */
/* ############################## CODE STARTS HERE ############################ */
if(secretHandle)
{
ll_DestroyList((LL_LINKLIST_T *)secretHandle);
free(secretHandle);
return(NSSCS_SUCCESS);
}
else
{
return(NSSCS_E_SYSTEM_FAILURE);
}
/* ############################### CODE ENDS HERE ############################# */
} //* end of miCASA_DestroySHSHandle
/*
* NAME - miCASA_GetNextSHSEntry
*
* DESCRIPTION
* Gets the next entry in the parser list for a Shared Secret.
*
*/
SSCS_GLOBAL_LIBCALL(int32_t)
miCASA_GetNextSHSEntry
(
int32_t restart,
void *secretHandle,
uint32_t *keyLen,
SS_UTF8_T *key,
uint32_t *valLen,
uint8_t *val
)
{ /* beginning of the call */
/* ########################## DECLARATIONS START HERE ######################### */
LL_SHSEC_KEY_VAL_T *keyVal = {0};
int32_t n = 0;
/* ############################## CODE STARTS HERE ############################ */
if(secretHandle)
{
if(restart)
{
ll_Head((LL_LINKLIST_T *)secretHandle);
}
else
{
if(!(ll_Next((LL_LINKLIST_T *)secretHandle)))
{
return(NSSCS_E_LL_SYS_FAILURE);
}
}
if(keyVal = (LL_SHSEC_KEY_VAL_T *)ll_GetEntry((LL_LINKLIST_T *)secretHandle))
{
2005-10-31 21:22:55 +01:00
if(keyVal->kLen > 1)
{
*keyLen = keyVal->kLen;
sscs_Utf8Strcpy(key, keyVal->key);
*valLen = keyVal->vLen;
if(sscs_Utf8Strncmp(keyVal->key, SSCS_BINARY_SECRET, SSCS_BINARY_CHARS))
{
// if binary value just copy
memcpy(val, keyVal->value, keyVal->vLen);
}
else
{
sscs_Utf8Strcpy((SS_UTF8_T *)val, (SS_UTF8_T *)keyVal->value);
}
for(n = 0; n < (int32_t)*keyLen - 2; n++)
{
if(key[n] != 63)
{
break;
}
else
{
if(n == (int32_t)*keyLen - 3)
{
return(NSSCS_E_SH_SECRET_FAILURE);
}
}
}
return(NSSCS_SUCCESS);
}
}
return(NSSCS_SUCCESS);
}
else
{
return(NSSCS_E_LL_SYS_FAILURE);
}
/* ############################### CODE ENDS HERE ############################# */
} //* end of miCASA_GetNextSHSEntry
/*
* NAME - miCASA_AddSHSEntry
*
* DESCRIPTION
* Adds a new entry in the parser list for a Shared Secret.
*
*/
SSCS_GLOBAL_LIBCALL(int32_t)
miCASA_AddSHSEntry
(
void *secretHandle,
SS_UTF8_T *key,
uint32_t valueLen,
uint8_t *value
)
{ /* beginning of the call */
/* ########################## DECLARATIONS START HERE ######################### */
uint32_t keyLen = sscs_Utf8Strlen(key) + 1;
int32_t rc = NSSCS_LL_SUCCESS;
/* ############################## CODE STARTS HERE ############################ */
if((keyLen) && (secretHandle))
{
if(ll_InsertSharedSecretLink((LL_LINKLIST_T*)secretHandle,
keyLen, key, valueLen, value))
{
return(NSSCS_E_LL_SYS_FAILURE);
}
else
{
return(NSSCS_LL_SUCCESS);
}
}
else
{
return(NSSCS_E_LL_SYS_FAILURE);
}
/* ############################### CODE ENDS HERE ############################# */
} //* end of miCASA_AddSHSEntry
/*
* NAME - miCASA_RemoveSHSEntry
*
* DESCRIPTION
* Removes a Shared Secret.
*
*/
SSCS_GLOBAL_LIBCALL(int32_t)
miCASA_RemoveSHSEntry
(
void *secretHandle,
SS_UTF8_T *key,
uint32_t valueLen,
uint8_t *value
)
{ /* beginning of the call */
/* ########################## DECLARATIONS START HERE ######################### */
int32_t rc;
uint32_t keyLen = sscs_Utf8StrSize(key);
/* ############################## CODE STARTS HERE ############################ */
return(rc = ll_RemoveSharedSecretLink((LL_LINKLIST_T*)secretHandle, keyLen, key));
/* ############################### CODE ENDS HERE ############################# */
} //* end of miCASA_RemoveSHSEntry
/* ##################################################################################### */
/* ######################### INTERNAL MANAGED CODE STARTS HERE ######################### */
/* ##################################################################################### */
static int32_t sscsshs_GetUsernamePassword
(
void *secretHandle,
long unFlags,
SSCS_BASIC_CREDENTIAL *basicCred
)
{ /* beginning of the call */
/* ########################## DECLARATIONS START HERE ######################### */
int32_t rcode = 0;
int32_t userFound = 0, passFound = 0;
SS_UTF8_T *key = NULL;
uint8_t *value = NULL;
uint32_t kLen = 0;
uint32_t vLen = 0;
SS_UTF8_T *usernameKeyname; // = SSCS_USERNAME_OTHER;
/* ############################## CODE STARTS HERE ############################ */
if((value = (uint8_t *)malloc(NSSCS_MAX_SECRET_BUF_LEN)) == NULL)
{
return NSSCS_E_INVALID_SECRET_ID;
}
if((key = (SS_UTF8_T *)malloc(NSSCS_MAX_SECRET_ID_LEN)) == NULL)
{
free(value);
return NSSCS_E_INVALID_SECRET_ID;
}
// determine username key name, ie CN, LDAPDN, etc
if (unFlags & USERNAME_TYPE_NDS_DN_F)
usernameKeyname = SHS_DN_NDAP;
else if (basicCred->unFlags & USERNAME_TYPE_NDS_FDN_F)
usernameKeyname = SHS_FDN_NDAP;
else if (unFlags & USERNAME_TYPE_LDAP_DN_F)
usernameKeyname = SHS_DN_LDAP;
else if (unFlags & USERNAME_TYPE_EMAIL_F)
usernameKeyname = SHS_EMAIL;
else if (unFlags & USERNAME_TYPE_OTHER_F)
usernameKeyname = SHS_OTHER;
else
usernameKeyname = SHS_CN;
// enumerate this list looking for username and password
if(!(rcode = miCASA_GetNextSHSEntry(1, secretHandle, &kLen, key, &vLen, value)))
{
do
{
if(sscs_Utf8Strlen(key) == 0)
{
break;
}
if (!sscs_Utf8Strcmp(key, usernameKeyname))
{
userFound = 1;
sscs_Utf8Strcpy((SS_UTF8_T *)basicCred->username, (SS_UTF8_T *)value);
basicCred->unLen = vLen;
}
if (!sscs_Utf8Strcmp(key, SHS_PASSWORD))
{
passFound = 1;
sscs_Utf8Strcpy((SS_UTF8_T *)basicCred->password, (SS_UTF8_T *)value);
basicCred->pwordLen = vLen;
}
if (userFound && passFound)
break;
// clear the buffers
memset(key, 0, NSSCS_MAX_SECRET_ID_LEN);
memset(value, 0, NSSCS_MAX_SECRET_BUF_LEN);
rcode = miCASA_GetNextSHSEntry(0, secretHandle, &kLen, key, &vLen, value);
}
while(rcode == NSSCS_SUCCESS);
}
free(key);
free(value);
if (userFound && passFound)
return NSSCS_SUCCESS;
else
return NSSCS_E_INVALID_SECRET_ID;
/* ############################### CODE ENDS HERE ############################# */
} // end of sscsshs_GetUsernamePassword
/*
* NAME - sscsshs_GetCredSetName
*
* DESCRIPTION
* Internal function that adds a new entry in the parser list for a Shared Secret.
*
*/
static int32_t sscsshs_GetCredSetName
(
void *secretHandle,
uint8_t *credSetName
)
{ /* beginning of the call */
/* ########################## DECLARATIONS START HERE ######################### */
int32_t rcode = 0;
SS_UTF8_T *key = NULL;
uint8_t *value = NULL;
uint32_t kLen = 0;
uint32_t vLen = 0;
/* ############################## CODE STARTS HERE ############################ */
if((value = (uint8_t *)malloc(NSSCS_MAX_SECRET_BUF_LEN)) == NULL)
{
return NSSCS_E_INVALID_SECRET_ID;
}
if((key = (SS_UTF8_T *)malloc(NSSCS_MAX_SECRET_ID_LEN)) == NULL)
{
free(value);
return NSSCS_E_INVALID_SECRET_ID;
}
// enumerate this list looking for username and password
if(!(rcode = miCASA_GetNextSHSEntry(1, secretHandle, &kLen, key, &vLen, value)))
{
if(sscs_Utf8Strlen(key) != 0)
{
sscs_Utf8Strcpy((SS_UTF8_T *)credSetName, (SS_UTF8_T *)value);
}
}
free(key);
free(value);
return rcode;
/* ############################### CODE ENDS HERE ############################# */
} // end of sscsshs_GetCredSetName
/* ################################################################################# */
/* ############################### Managed Access APIs ############################# */
/* ################################################################################# */
/*
* NAME - miCASAGetCredential
*
* DESCRIPTION
* There is a relationship between the appSecretID and the sharedSecretID
* A SS_APP secrets points to the SS_CredSet secret to be used
* So we'll first deal with the appSecretID as a SS_APP type
*
*
* This API gets the credential asked for
* 1. Check the SS_App for the appSecretID passed in
* 2. If found, use it to locate the correct Shared Secret
* 3. If not found, use the SS_CredSet for the appSecretID if there is one
* 4. If not found, use the SS_CredSet for the sharedSecretID passed in.
* 5. Else return the default credential if there is one.
*
*/
SSCS_GLOBAL_LIBCALL(int32_t)
miCASAGetCredential
(
uint32_t ssFlags, // IN
SSCS_SECRET_ID_T * appSecretID, // IN
SSCS_SECRET_ID_T * sharedSecretID, // Optional IN
int32_t * credentialType, // IN/OUT
void * credential, // OUT
SSCS_EXT_T * ext // Reserved
)
{ /* beginning of the call */
/* ########################## DECLARATIONS START HERE ######################### */
void *context;
int32_t rcode = 0;
SSCS_SECRETSTORE_T store = {0};
SSCS_SH_SECRET_ID_T secID = {0};
void *secretHandle = 0;
SSCS_READEXT_T readData = {0};
SSCS_KEYCHAIN_ID_T kc = {0};
SSCS_BASIC_CREDENTIAL *basicCred = (SSCS_BASIC_CREDENTIAL *)credential;
2005-12-09 18:42:13 +01:00
SSCS_BINARY_CREDENTIAL *binaryCred = (SSCS_BINARY_CREDENTIAL *)credential;
int32_t bytesRequired = 0;
/* ############################## CODE STARTS HERE ############################ */
// check params
if ((appSecretID == NULL) || (credential == NULL))
{
return(NSSCS_E_INVALID_PARAM);
}
2005-12-09 18:42:13 +01:00
// set default keychain
sscs_Utf8Strcpy(kc.keychainID, SSCS_SESSION_KEY_CHAIN_ID);
kc.len = SSCS_S_KC_ID_CHARS;
// open secretStore
sscs_Utf8Strcpy(store.ssName, SSCS_DEFAULT_SECRETSTORE_ID);
store.version = 1;
context = miCASAOpenSecretStoreCache(&store, ssFlags, NULL);
2005-12-09 18:42:13 +01:00
if (*credentialType == SSCS_CRED_TYPE_BINARY_F)
{
2005-12-12 21:50:52 +01:00
// first check appSecretID
rcode = miCASAReadBinaryKey(
2005-12-09 18:42:13 +01:00
context,
ssFlags,
&kc,
appSecretID,
binaryCred->id,
binaryCred->idLen,
binaryCred->data,
binaryCred->dataLen,
NULL,
&bytesRequired,
2005-12-12 21:50:52 +01:00
ext);
if ((rcode != NSSCS_SUCCESS) && (sharedSecretID != NULL))
{
// try shared if set
rcode = miCASAReadBinaryKey(
context,
ssFlags,
&kc,
sharedSecretID,
binaryCred->id,
binaryCred->idLen,
binaryCred->data,
binaryCred->dataLen,
NULL,
&bytesRequired,
ext);
}
miCASACloseSecretStoreCache(context, ssFlags, NULL);
return rcode;
2005-12-09 18:42:13 +01:00
}
// create a SHS Handle
secretHandle = miCASA_CreateSHSHandle();
if (secretHandle == NULL)
return NSSCS_E_SYSTEM_FAILURE;
// 1&2. look up the SS_App for this secretID, if not found use the sharedSecretID
secID.type = SSCS_APPLICATION_TYPE_F;
secID.len = appSecretID->len;
sscs_Utf8Strcpy(secID.name, appSecretID->id);
rcode = miCASAReadSecret(context, &kc, ssFlags, secretHandle, &secID, NULL, &readData, NULL);
if (rcode == NSSCS_SUCCESS)
{
// we found a link for this app which should be a SS_CredSet secretID.
// Get the key called SS_CredSet, it's value is the CredSet ID
rcode = sscsshs_GetCredSetName(secretHandle, secID.name);
if (rcode == NSSCS_SUCCESS)
{
if (secretHandle)
miCASA_DestroySHSHandle(secretHandle);
secretHandle = miCASA_CreateSHSHandle();
// read credset for this app
secID.type = SSCS_CREDENTIAL_TYPE_F;
secID.len = sscs_Utf8Strlen(secID.name);
rcode = miCASAReadSecret(context, &kc, ssFlags, secretHandle, &secID, NULL, &readData, NULL);
if (rcode == NSSCS_SUCCESS)
{
// read the username and password
rcode = sscsshs_GetUsernamePassword(secretHandle, basicCred->unFlags, basicCred);
}
}
}
// 3. if we still don't have a secret, try the SS_CredSet for the appSecretID
if (rcode)
{
if (secretHandle)
miCASA_DestroySHSHandle(secretHandle);
secretHandle = miCASA_CreateSHSHandle();
// read credset for this app
secID.type = SSCS_CREDENTIAL_TYPE_F;
secID.len = sscs_Utf8Strlen(appSecretID->id);
sscs_Utf8Strcpy(secID.name, appSecretID->id);
rcode = miCASAReadSecret(context, &kc, ssFlags, secretHandle, &secID, NULL, &readData, NULL);
if (rcode == NSSCS_SUCCESS)
{
// read the username and password
rcode = sscsshs_GetUsernamePassword(secretHandle, basicCred->unFlags, basicCred);
}
}
// 4. if still no secret, did caller pass in a suggested sharedSecretID?
if (rcode && sharedSecretID)
{
// let's look for it.
secID.type = SSCS_CREDENTIAL_TYPE_F;
secID.len = sharedSecretID->len;
sscs_Utf8Strcpy(secID.name, sharedSecretID->id);
// get a new handle
if (secretHandle)
miCASA_DestroySHSHandle(secretHandle);
secretHandle = miCASA_CreateSHSHandle();
rcode = miCASAReadSecret(context, &kc, ssFlags, secretHandle, &secID, NULL, &readData, NULL);
if (rcode == NSSCS_SUCCESS)
{
//get the username and password
rcode = sscsshs_GetUsernamePassword(secretHandle, basicCred->unFlags, basicCred);
}
}
// if we still haven't found a credential, return the default credential
if (rcode)
{
secID.type = SSCS_CREDENTIAL_TYPE_F;
secID.len = SECRET_ID_DEFAULT_LEN;
sscs_Utf8Strcpy(secID.name, SECRET_ID_DEFAULT);
if (secretHandle)
miCASA_DestroySHSHandle(secretHandle);
secretHandle = miCASA_CreateSHSHandle();
rcode = miCASAReadSecret(context, &kc, ssFlags, secretHandle, &secID, NULL, &readData, NULL);
if (rcode == NSSCS_SUCCESS)
{
rcode = sscsshs_GetUsernamePassword(secretHandle, basicCred->unFlags, basicCred);
}
}
if (secretHandle)
miCASA_DestroySHSHandle(secretHandle);
miCASACloseSecretStoreCache(context, ssFlags, NULL);
return rcode;
/* ############################### CODE ENDS HERE ############################# */
} // end of miCASAGetCredential
/*
* NAME - miCASASetCredential
*
* DESCRIPTION
* This API sets the credential
* 1. Check the SS_App for the appSecretID passed in
* 2. If found, use the SS_CredSet it points to.
* 3. If not found, use the sharedSecretID (SS_CredSet) if there is one, and it's not set yet
* 4. Else create a credential, SS_Cred for this appSecretID
*
*/
SSCS_GLOBAL_LIBCALL(int32_t)
miCASASetCredential
(
uint32_t ssFlags, // IN
SSCS_SECRET_ID_T * appSecretID, // IN
SSCS_SECRET_ID_T * sharedSecretID, // Optional IN
int32_t credentialType, // IN
void * credential, // IN
SSCS_EXT_T * ext // Reserved
)
{ /* beginning of the call */
/* ########################## DECLARATIONS START HERE ######################### */
void *context;
int32_t rcode = 0;
int32_t vLen = 0;
SSCS_SECRETSTORE_T store = {0};
SSCS_SH_SECRET_ID_T secID = {0};
void *secretHandle = 0;
SSCS_READEXT_T readData = {0};
SSCS_KEYCHAIN_ID_T kc = {0};
SS_UTF8_T *usernameKeyname; // = SSCS_USERNAME_OTHER;
SSCS_CONTEXT_T *storeContext;
/* ############################## CODE STARTS HERE ############################ */
2005-12-09 18:42:13 +01:00
SSCS_BASIC_CREDENTIAL *basicCred;
SSCS_BINARY_CREDENTIAL *binaryCred;
2005-12-12 21:50:52 +01:00
// check params
if ((appSecretID == NULL) || (credential == NULL))
{
return(NSSCS_E_INVALID_PARAM);
}
2005-12-09 18:42:13 +01:00
// open secretStore
sscs_Utf8Strcpy(store.ssName, SSCS_DEFAULT_SECRETSTORE_ID);
store.version = 1;
context = miCASAOpenSecretStoreCache(&store, ssFlags, NULL);
storeContext = (SSCS_CONTEXT_T *)context;
if (context == NULL)
{
return NSSCS_E_SYSTEM_FAILURE;
}
sscs_Utf8Strcpy(kc.keychainID, SSCS_SESSION_KEY_CHAIN_ID);
kc.len = SSCS_S_KC_ID_CHARS;
if (credentialType == SSCS_CRED_TYPE_BINARY_F)
{
binaryCred = (SSCS_BINARY_CREDENTIAL *)credential;
2005-12-12 21:50:52 +01:00
// TODO: set shared if passed in
// set apps binary key
rcode = miCASAWriteBinaryKey(
2005-12-09 18:42:13 +01:00
context,
ssFlags,
&kc,
2005-12-10 05:47:37 +01:00
appSecretID,
2005-12-09 18:42:13 +01:00
binaryCred->id,
binaryCred->idLen,
binaryCred->data,
2005-12-10 05:47:37 +01:00
binaryCred->dataLen,
2005-12-09 18:42:13 +01:00
NULL,
ext);
2005-12-12 21:50:52 +01:00
miCASACloseSecretStoreCache(context, ssFlags, NULL);
return rcode;
2005-12-09 18:42:13 +01:00
}
else
basicCred = (SSCS_BASIC_CREDENTIAL *)credential;
2005-12-12 21:50:52 +01:00
// determine username key name, ie CN, LDAPDN, etc
if (basicCred->unFlags & USERNAME_TYPE_NDS_DN_F)
usernameKeyname = SHS_DN_NDAP;
else if (basicCred->unFlags & USERNAME_TYPE_NDS_FDN_F)
usernameKeyname = SHS_FDN_NDAP;
else if (basicCred->unFlags & USERNAME_TYPE_LDAP_DN_F)
usernameKeyname = SHS_DN_LDAP;
else if (basicCred->unFlags & USERNAME_TYPE_EMAIL_F)
usernameKeyname = SHS_EMAIL;
else if (basicCred->unFlags & USERNAME_TYPE_OTHER_F)
usernameKeyname = SHS_OTHER;
else
usernameKeyname = SHS_CN;
// create a SHS Handle
secretHandle = miCASA_CreateSHSHandle();
if (secretHandle == NULL)
return NSSCS_E_SYSTEM_FAILURE;
// 1&2. Look up the SS_App for this secretID in case we should use an shared override,
// if not found use the sharedSecretID passed in.
secID.type = SSCS_APPLICATION_TYPE_F;
secID.len = appSecretID->len;
sscs_Utf8Strcpy(secID.name, appSecretID->id);
rcode = miCASAReadSecret(context, &kc, ssFlags, secretHandle, &secID, NULL, &readData, NULL);
if (rcode == NSSCS_SUCCESS)
{
// we found a link for this app which should be a SS_CredSet secretID.
// Get the key called SS_CredSet, it's value is the CredSet ID
rcode = sscsshs_GetCredSetName(secretHandle, (uint8_t*)secID.name);
if (rcode == NSSCS_SUCCESS)
{
if (secretHandle)
miCASA_DestroySHSHandle(secretHandle);
secretHandle = miCASA_CreateSHSHandle();
// read credset for this app
secID.type = SSCS_CREDENTIAL_TYPE_F;
secID.len = secID.len;
rcode = miCASAReadSecret(context, &kc, ssFlags, secretHandle, &secID, NULL, &readData, NULL);
// set the username and password
vLen = (sscs_Utf8Strlen((SS_UTF8_T *)basicCred->username) + 1) * sizeof(SS_UTF8_T);
miCASA_AddSHSEntry(secretHandle, usernameKeyname, vLen, basicCred->username);
vLen = (sscs_Utf8Strlen((SS_UTF8_T *)basicCred->password) + 1) * sizeof(SS_UTF8_T);
miCASA_AddSHSEntry(secretHandle, SHS_PASSWORD, vLen, basicCred->password);
rcode = miCASAWriteSecret(context, &kc, ssFlags, secretHandle, &secID, NULL, ext);
}
}
// 3. did caller pass in a suggested sharedSecretID?
if (rcode && sharedSecretID)
{
vLen = (sscs_Utf8Strlen((SS_UTF8_T *)basicCred->username) + 1) * sizeof(SS_UTF8_T);
rcode = miCASAWriteKey(context, ssFlags, &kc, sharedSecretID, usernameKeyname, strlen(usernameKeyname)+1, basicCred->username, vLen, NULL, ext);
vLen = (sscs_Utf8Strlen((SS_UTF8_T *)basicCred->password) + 1) * sizeof(SS_UTF8_T);
rcode = miCASAWriteKey(context, ssFlags, &kc, sharedSecretID, SHS_PASSWORD, 9, basicCred->password, vLen, NULL, ext);
}
// 4. Set the appSecretID at least
if (rcode)
{
// write the keys
vLen = (sscs_Utf8Strlen((SS_UTF8_T *)basicCred->username) + 1) * sizeof(SS_UTF8_T);
rcode = miCASAWriteKey(context, ssFlags, &kc, appSecretID, usernameKeyname, strlen(usernameKeyname)+1, basicCred->username, vLen, NULL, ext);
vLen = (sscs_Utf8Strlen((SS_UTF8_T *)basicCred->password) + 1) * sizeof(SS_UTF8_T);
rcode = miCASAWriteKey(context, ssFlags, &kc, appSecretID, SHS_PASSWORD, 9, basicCred->password, vLen, NULL, ext);
}
if (secretHandle)
miCASA_DestroySHSHandle(secretHandle);
miCASACloseSecretStoreCache(context, ssFlags, NULL);
return rcode;
/* ############################### CODE ENDS HERE ############################# */
} // end of miCASASetCredential
/*
* NAME - miCASARemoveCredential
*
* DESCRIPTION
* This call removes a managed credential with given the appSecretID
* the sharedSecretID is ignored now - TBD
*
*/
SSCS_GLOBAL_LIBCALL(int32_t)
miCASARemoveCredential
(
uint32_t ssFlags, // IN
SSCS_SECRET_ID_T * appSecretID, // IN
SSCS_SECRET_ID_T * sharedSecretID, // Optional IN
SSCS_EXT_T * ext // Reserved
)
{ /* beginning of the call */
/* ########################## DECLARATIONS START HERE ######################### */
void *context;
int32_t rcode = 0;
int32_t vLen = 0;
SSCS_SECRETSTORE_T store = {0};
SSCS_KEYCHAIN_ID_T kc = {0};
SSCS_SH_SECRET_ID_T secID = {0};
/* ############################## CODE STARTS HERE ############################ */
// open secretStore
sscs_Utf8Strcpy(store.ssName, SSCS_DEFAULT_SECRETSTORE_ID);
store.version = 1;
context = miCASAOpenSecretStoreCache(&store, ssFlags, NULL);
// remove the secret for the appSecretID passed in
sscs_Utf8Strcpy(kc.keychainID, SSCS_SESSION_KEY_CHAIN_ID);
kc.len = SSCS_S_KC_ID_CHARS;
secID.type = SSCS_CREDENTIAL_TYPE_F;
secID.len = appSecretID->len;
sscs_Utf8Strcpy(secID.name, appSecretID->id);
rcode = miCASARemoveSecret (context, &kc, ssFlags, &secID, NULL, NULL);
// close the secretstore
miCASACloseSecretStoreCache(context, ssFlags, NULL);
return(rcode);
/* ############################### CODE ENDS HERE ############################# */
} // end of miCASARemoveCredential
SSCS_GLOBAL_LIBCALL(int32_t)
miCASASetMasterPasscode
(
uint32_t ssFlags,
SSCS_PASSCODE_T *passcode,
SSCS_EXT_T *ext
)
{
int32_t rc = 0;
void *context = NULL;
SSCS_SECRETSTORE_T store = {0};
// open secretStore
sscs_Utf8Strcpy(store.ssName, SSCS_DEFAULT_SECRETSTORE_ID);
store.version = 1;
context = miCASAOpenSecretStoreCache(&store, ssFlags, NULL);
if((context == NULL) || (passcode == NULL))
{
return(NSSCS_E_INVALID_PARAM);
}
rc = sscs_SetMasterPasscode(((SSCS_CONTEXT_T*)context)->ssHandle,passcode, NULL);
// close the secretstore
miCASACloseSecretStoreCache(context, ssFlags, NULL);
return(rc);
} //* end of miCASASetMasterPasscode
SSCS_GLOBAL_LIBCALL(int32_t)
miCASAIsSecretPersistent
(
uint32_t ssFlags,
SSCS_SECRET_ID_T *secretID,
SSCS_EXT_T *ext
)
{
void *context;
int32_t rcode = 0;
SSCS_SECRETSTORE_T store = {0};
SSCS_KEYCHAIN_ID_T kc = {0};
SSCS_CONTEXT_T *storeContext;
if( (ssFlags == 0) && (secretID == NULL) )
return NSSCS_E_INVALID_PARAM;
// open secretStore
sscs_Utf8Strcpy(store.ssName, SSCS_DEFAULT_SECRETSTORE_ID);
store.version = 1;
context = miCASAOpenSecretStoreCache(&store, 0, NULL);
storeContext = (SSCS_CONTEXT_T *)context;
if (context == NULL)
{
return NSSCS_E_SYSTEM_FAILURE;
}
sscs_Utf8Strcpy(kc.keychainID, SSCS_SESSION_KEY_CHAIN_ID);
kc.len = SSCS_S_KC_ID_CHARS;
rcode = sscs_IsSecretPersistent(storeContext->ssHandle,ssFlags,&kc,secretID,ext);
miCASACloseSecretStoreCache(context, 0, NULL);
return rcode;
}