| // File: tok_obj.c |
| // |
| // Test driver for testing the proper storage of token objects |
| // |
| |
| #include <stdio.h> |
| #include <stdlib.h> |
| #include <string.h> |
| #include <memory.h> |
| |
| #include "pkcs11types.h" |
| |
| |
| void process_ret_code( CK_RV rc ); |
| int do_GetInfo(void); |
| |
| void init_coprocessor(void); |
| |
| CK_RV C_GetFunctionList( CK_FUNCTION_LIST ** ) ; |
| |
| CK_FUNCTION_LIST *funcs; |
| |
| CK_SLOT_ID SLOT_ID; |
| |
| |
| // |
| // |
| void process_ret_code( CK_RV rc ) |
| { |
| switch (rc) { |
| case CKR_OK: printf(" CKR_OK"); break; |
| case CKR_CANCEL: printf(" CKR_CANCEL"); break; |
| case CKR_HOST_MEMORY: printf(" CKR_HOST_MEMORY"); break; |
| case CKR_SLOT_ID_INVALID: printf(" CKR_SLOT_ID_INVALID"); break; |
| case CKR_GENERAL_ERROR: printf(" CKR_GENERAL_ERROR"); break; |
| case CKR_FUNCTION_FAILED: printf(" CKR_FUNCTION_FAILED"); break; |
| case CKR_ARGUMENTS_BAD: printf(" CKR_ARGUMENTS_BAD"); break; |
| case CKR_NO_EVENT: printf(" CKR_NO_EVENT"); break; |
| case CKR_NEED_TO_CREATE_THREADS: printf(" CKR_NEED_TO_CREATE_THREADS"); break; |
| case CKR_CANT_LOCK: printf(" CKR_CANT_LOCK"); break; |
| case CKR_ATTRIBUTE_READ_ONLY: printf(" CKR_ATTRIBUTE_READ_ONLY"); break; |
| case CKR_ATTRIBUTE_SENSITIVE: printf(" CKR_ATTRIBUTE_SENSITIVE"); break; |
| case CKR_ATTRIBUTE_TYPE_INVALID: printf(" CKR_ATTRIBUTE_TYPE_INVALID"); break; |
| case CKR_ATTRIBUTE_VALUE_INVALID: printf(" CKR_ATTRIBUTE_VALUE_INVALID"); break; |
| case CKR_DATA_INVALID: printf(" CKR_DATA_INVALID"); break; |
| case CKR_DATA_LEN_RANGE: printf(" CKR_DATA_LEN_RANGE"); break; |
| case CKR_DEVICE_ERROR: printf(" CKR_DEVICE_ERROR"); break; |
| case CKR_DEVICE_MEMORY: printf(" CKR_DEVICE_MEMORY"); break; |
| case CKR_DEVICE_REMOVED: printf(" CKR_DEVICE_REMOVED"); break; |
| case CKR_ENCRYPTED_DATA_INVALID: printf(" CKR_ENCRYPTED_DATA_INVALID"); break; |
| case CKR_ENCRYPTED_DATA_LEN_RANGE: printf(" CKR_ENCRYPTED_DATA_LEN_RANGE"); break; |
| case CKR_FUNCTION_CANCELED: printf(" CKR_FUNCTION_CANCELED"); break; |
| case CKR_FUNCTION_NOT_PARALLEL: printf(" CKR_FUNCTION_NOT_PARALLEL"); break; |
| case CKR_FUNCTION_NOT_SUPPORTED: printf(" CKR_FUNCTION_NOT_SUPPORTED"); break; |
| case CKR_KEY_HANDLE_INVALID: printf(" CKR_KEY_HANDLE_INVALID"); break; |
| case CKR_KEY_SIZE_RANGE: printf(" CKR_KEY_SIZE_RANGE"); break; |
| case CKR_KEY_TYPE_INCONSISTENT: printf(" CKR_KEY_TYPE_INCONSISTENT"); break; |
| case CKR_KEY_NOT_NEEDED: printf(" CKR_KEY_NOT_NEEDED"); break; |
| case CKR_KEY_CHANGED: printf(" CKR_KEY_CHANGED"); break; |
| case CKR_KEY_NEEDED: printf(" CKR_KEY_NEEDED"); break; |
| case CKR_KEY_INDIGESTIBLE: printf(" CKR_KEY_INDIGESTIBLE"); break; |
| case CKR_KEY_FUNCTION_NOT_PERMITTED: printf(" CKR_KEY_FUNCTION_NOT_PERMITTED"); break; |
| case CKR_KEY_NOT_WRAPPABLE: printf(" CKR_KEY_NOT_WRAPPABLE"); break; |
| case CKR_KEY_UNEXTRACTABLE: printf(" CKR_KEY_UNEXTRACTABLE"); break; |
| case CKR_MECHANISM_INVALID: printf(" CKR_MECHANISM_INVALID"); break; |
| case CKR_MECHANISM_PARAM_INVALID: printf(" CKR_MECHANISM_PARAM_INVALID"); break; |
| case CKR_OBJECT_HANDLE_INVALID: printf(" CKR_OBJECT_HANDLE_INVALID"); break; |
| case CKR_OPERATION_ACTIVE: printf(" CKR_OPERATION_ACTIVE"); break; |
| case CKR_OPERATION_NOT_INITIALIZED: printf(" CKR_OPERATION_NOT_INITIALIZED"); break; |
| case CKR_PIN_INCORRECT: printf(" CKR_PIN_INCORRECT"); break; |
| case CKR_PIN_INVALID: printf(" CKR_PIN_INVALID"); break; |
| case CKR_PIN_LEN_RANGE: printf(" CKR_PIN_LEN_RANGE"); break; |
| case CKR_PIN_EXPIRED: printf(" CKR_PIN_EXPIRED"); break; |
| case CKR_PIN_LOCKED: printf(" CKR_PIN_LOCKED"); break; |
| case CKR_SESSION_CLOSED: printf(" CKR_SESSION_CLOSED"); break; |
| case CKR_SESSION_COUNT: printf(" CKR_SESSION_COUNT"); break; |
| case CKR_SESSION_HANDLE_INVALID: printf(" CKR_SESSION_HANDLE_INVALID"); break; |
| case CKR_SESSION_PARALLEL_NOT_SUPPORTED: printf(" CKR_SESSION_PARALLEL_NOT_SUPPORTED"); break; |
| case CKR_SESSION_READ_ONLY: printf(" CKR_SESSION_READ_ONLY"); break; |
| case CKR_SESSION_EXISTS: printf(" CKR_SESSION_EXISTS"); break; |
| case CKR_SESSION_READ_ONLY_EXISTS: printf(" CKR_SESSION_READ_ONLY_EXISTS"); break; |
| case CKR_SESSION_READ_WRITE_SO_EXISTS: printf(" CKR_SESSION_READ_WRITE_SO_EXISTS"); break; |
| case CKR_SIGNATURE_INVALID: printf(" CKR_SIGNATURE_INVALID"); break; |
| case CKR_SIGNATURE_LEN_RANGE: printf(" CKR_SIGNATURE_LEN_RANGE"); break; |
| case CKR_TEMPLATE_INCOMPLETE: printf(" CKR_TEMPLATE_INCOMPLETE"); break; |
| case CKR_TEMPLATE_INCONSISTENT: printf(" CKR_TEMPLATE_INCONSISTENT"); break; |
| case CKR_TOKEN_NOT_PRESENT: printf(" CKR_TOKEN_NOT_PRESENT"); break; |
| case CKR_TOKEN_NOT_RECOGNIZED: printf(" CKR_TOKEN_NOT_RECOGNIZED"); break; |
| case CKR_TOKEN_WRITE_PROTECTED: printf(" CKR_TOKEN_WRITE_PROTECTED"); break; |
| case CKR_UNWRAPPING_KEY_HANDLE_INVALID: printf(" CKR_UNWRAPPING_KEY_HANDLE_INVALID"); break; |
| case CKR_UNWRAPPING_KEY_SIZE_RANGE: printf(" CKR_UNWRAPPING_KEY_SIZE_RANGE"); break; |
| case CKR_UNWRAPPING_KEY_TYPE_INCONSISTENT: printf(" CKR_UNWRAPPING_KEY_TYPE_INCONSISTENT"); break; |
| case CKR_USER_ALREADY_LOGGED_IN: printf(" CKR_USER_ALREADY_LOGGED_IN"); break; |
| case CKR_USER_NOT_LOGGED_IN: printf(" CKR_USER_NOT_LOGGED_IN"); break; |
| case CKR_USER_PIN_NOT_INITIALIZED: printf(" CKR_USER_PIN_NOT_INITIALIZED"); break; |
| case CKR_USER_TYPE_INVALID: printf(" CKR_USER_TYPE_INVALID"); break; |
| case CKR_USER_ANOTHER_ALREADY_LOGGED_IN: printf(" CKR_USER_ANOTHER_ALREADY_LOGGED_IN"); break; |
| case CKR_USER_TOO_MANY_TYPES: printf(" CKR_USER_TOO_MANY_TYPES"); break; |
| case CKR_WRAPPED_KEY_INVALID: printf(" CKR_WRAPPED_KEY_INVALID"); break; |
| case CKR_WRAPPED_KEY_LEN_RANGE: printf(" CKR_WRAPPED_KEY_LEN_RANGE"); break; |
| case CKR_WRAPPING_KEY_HANDLE_INVALID: printf(" CKR_WRAPPING_KEY_HANDLE_INVALID"); break; |
| case CKR_WRAPPING_KEY_SIZE_RANGE: printf(" CKR_WRAPPING_KEY_SIZE_RANGE"); break; |
| case CKR_WRAPPING_KEY_TYPE_INCONSISTENT: printf(" CKR_WRAPPING_KEY_TYPE_INCONSISTENT"); break; |
| case CKR_RANDOM_SEED_NOT_SUPPORTED: printf(" CKR_RANDOM_SEED_NOT_SUPPORTED"); break; |
| case CKR_RANDOM_NO_RNG: printf(" CKR_RANDOM_NO_RNG"); break; |
| case CKR_BUFFER_TOO_SMALL: printf(" CKR_BUFFER_TOO_SMALL"); break; |
| case CKR_SAVED_STATE_INVALID: printf(" CKR_SAVED_STATE_INVALID"); break; |
| case CKR_INFORMATION_SENSITIVE: printf(" CKR_INFORMATION_SENSITIVE"); break; |
| case CKR_STATE_UNSAVEABLE: printf(" CKR_STATE_UNSAVEABLE"); break; |
| case CKR_CRYPTOKI_NOT_INITIALIZED: printf(" CKR_CRYPTOKI_NOT_INITIALIZED"); break; |
| case CKR_CRYPTOKI_ALREADY_INITIALIZED: printf(" CKR_CRYPTOKI_ALREADY_INITIALIZED"); break; |
| case CKR_MUTEX_BAD: printf(" CKR_MUTEX_BAD"); break; |
| case CKR_MUTEX_NOT_LOCKED: printf(" CKR_MUTEX_NOT_LOCKED"); break; |
| case CKR_VENDOR_DEFINED: printf(" CKR_VENDOR_DEFINED"); break; |
| } |
| } |
| |
| |
| // |
| // |
| void show_error( CK_BYTE *str, CK_RV rc ) |
| { |
| printf("%s returned: %d", str, rc ); |
| process_ret_code( rc ); |
| printf("\n"); |
| } |
| |
| |
| // |
| // |
| int do_GetFunctionList( void ) |
| { |
| CK_RV rc; |
| |
| printf("do_GetFunctionList...\n"); |
| |
| rc = C_GetFunctionList( &funcs ) ; |
| |
| if (rc != CKR_OK) { |
| show_error(" C_GetFunctionList", rc ); |
| return FALSE; |
| } |
| |
| printf("Looks okay...\n"); |
| return TRUE; |
| |
| } |
| |
| |
| |
| // do_create_token_object() |
| // |
| int do_create_token_object( void ) |
| { |
| CK_FLAGS flags; |
| CK_SESSION_HANDLE h_session; |
| CK_RV rc; |
| CK_BYTE user_pin[DEFAULT_USER_PIN_LEN]; |
| CK_ULONG user_pin_len; |
| |
| CK_BYTE true = TRUE; |
| CK_BYTE false = FALSE; |
| |
| CK_OBJECT_HANDLE h_cert1; |
| CK_OBJECT_CLASS cert1_class = CKO_CERTIFICATE; |
| CK_CERTIFICATE_TYPE cert1_type = CKC_X_509; |
| CK_BYTE cert1_subject[] = "Certificate subject #1"; |
| CK_BYTE cert1_id[] = "Certificate ID #1"; |
| CK_BYTE cert1_value[] = "AaBbCcDdEeFfGgHhIiJjKkLlMmNnOoPpQqRrSsTtUuVvWwXxYyZz"; |
| |
| CK_ATTRIBUTE cert1_attribs[] = |
| { |
| {CKA_CLASS, &cert1_class, sizeof(cert1_class) }, |
| {CKA_TOKEN, &true, sizeof(true) }, |
| {CKA_CERTIFICATE_TYPE, &cert1_type, sizeof(cert1_type) }, |
| {CKA_SUBJECT, &cert1_subject, sizeof(cert1_subject) }, |
| {CKA_VALUE, &cert1_value, sizeof(cert1_value) }, |
| {CKA_PRIVATE, &true, sizeof(false) } |
| //{CKA_PRIVATE, &false, sizeof(false) } |
| }; |
| CK_ATTRIBUTE cert_id_attr[] = |
| { |
| {CKA_ID, &cert1_id, sizeof(cert1_id) } |
| }; |
| CK_OBJECT_HANDLE obj_list[20]; |
| CK_ULONG objcount; |
| |
| |
| |
| memcpy( user_pin, DEFAULT_USER_PIN, DEFAULT_USER_PIN_LEN ); |
| user_pin_len = DEFAULT_USER_PIN_LEN; |
| |
| // create a USER R/W session |
| // |
| flags = CKF_SERIAL_SESSION | CKF_RW_SESSION; |
| printf("open ing session \n"); |
| rc = funcs->C_OpenSession( SLOT_ID, flags, NULL, NULL, &h_session ); |
| if (rc != CKR_OK) { |
| show_error(" C_OpenSession #1", rc ); |
| rc = FALSE; |
| goto done; |
| } |
| |
| printf("login ing session \n"); |
| rc = funcs->C_Login( h_session, CKU_USER, user_pin, user_pin_len ); |
| if (rc != CKR_OK) { |
| show_error(" C_Login #1", rc ); |
| rc = FALSE; |
| goto done; |
| } |
| |
| // create the token objects |
| // |
| printf("create ing session \n"); |
| rc = funcs->C_CreateObject( h_session, cert1_attribs, 7, &h_cert1 ); |
| if (rc != CKR_OK) { |
| show_error(" C_CreateObject #1", rc ); |
| rc = FALSE; |
| goto done; |
| } |
| |
| printf("set ing session \n"); |
| rc = funcs->C_SetAttributeValue(h_session,h_cert1,cert_id_attr,1); |
| if (rc != CKR_OK) { |
| show_error(" C_SetAttribute #1", rc ); |
| rc = FALSE; |
| goto done; |
| } |
| // now, retrieve a list of all object handles |
| // |
| printf("find init ing session \n"); |
| rc = funcs->C_FindObjectsInit( h_session, cert_id_attr, 1 ); |
| if (rc != CKR_OK) { |
| show_error(" C_FindObjectsInit #1", rc ); |
| rc = FALSE; |
| goto done; |
| } |
| |
| printf("find session \n"); |
| rc = funcs->C_FindObjects( h_session, obj_list, 20, &objcount ); |
| if (rc != CKR_OK) { |
| show_error(" C_FindObjects #1", rc ); |
| rc = FALSE; |
| goto done; |
| } |
| |
| printf("find final session \n"); |
| rc = funcs->C_FindObjectsFinal( h_session ); |
| if (rc != CKR_OK) { |
| show_error(" C_FindObjectsFinal #1", rc ); |
| rc = FALSE; |
| goto done; |
| } |
| |
| rc = TRUE; |
| |
| done: |
| printf("close all session \n"); |
| funcs->C_CloseAllSessions( SLOT_ID ); |
| return rc; |
| } |
| |
| |
| // do_count_token_objects() |
| // |
| int do_count_token_objects( void ) |
| { |
| CK_FLAGS flags; |
| CK_SESSION_HANDLE h_session; |
| CK_RV rc; |
| CK_BYTE user_pin[DEFAULT_USER_PIN_LEN]; |
| CK_ULONG user_pin_len; |
| CK_OBJECT_HANDLE obj_list[20]; |
| CK_ULONG find_count; |
| |
| |
| |
| memcpy( user_pin, DEFAULT_USER_PIN, DEFAULT_USER_PIN_LEN ); |
| user_pin_len = DEFAULT_USER_PIN_LEN; |
| |
| |
| // create a USER R/W session |
| // |
| flags = CKF_SERIAL_SESSION | CKF_RW_SESSION; |
| rc = funcs->C_OpenSession( SLOT_ID, flags, NULL, NULL, &h_session ); |
| if (rc != CKR_OK) { |
| show_error(" C_OpenSession #1", rc ); |
| rc = FALSE; |
| goto done; |
| } |
| |
| rc = funcs->C_Login( h_session, CKU_USER, user_pin, user_pin_len ); |
| if (rc != CKR_OK) { |
| show_error(" C_Login #1", rc ); |
| rc = FALSE; |
| goto done; |
| } |
| |
| // |
| //--------------------------------------------------------------------- |
| // |
| |
| // now, retrieve a list of all object handles |
| // |
| rc = funcs->C_FindObjectsInit( h_session, NULL, 0 ); |
| if (rc != CKR_OK) { |
| show_error(" C_FindObjectsInit #1", rc ); |
| rc = FALSE; |
| goto done; |
| } |
| |
| do { |
| rc = funcs->C_FindObjects( h_session, obj_list, 1, &find_count ); |
| if (rc != CKR_OK) { |
| show_error(" C_FindObjects #1", rc ); |
| rc = FALSE; |
| goto done; |
| } |
| printf("Found: %d objects\n", find_count); |
| } while (find_count != 0); |
| |
| rc = funcs->C_FindObjectsFinal( h_session ); |
| if (rc != CKR_OK) { |
| show_error(" C_FindObjectsFinal #1", rc ); |
| rc = FALSE; |
| goto done; |
| } |
| |
| rc = TRUE; |
| |
| done: |
| funcs->C_CloseAllSessions( SLOT_ID ); |
| return rc; |
| } |
| |
| |
| // do_verify_token_object() |
| // |
| int do_verify_token_object( void ) |
| { |
| CK_FLAGS flags; |
| CK_SESSION_HANDLE h_session; |
| CK_RV rc; |
| CK_BYTE user_pin[DEFAULT_USER_PIN_LEN]; |
| CK_ULONG user_pin_len; |
| CK_OBJECT_HANDLE obj_list[20]; |
| CK_ULONG find_count; |
| |
| CK_BYTE cert1_id[] = "Certificate ID #1"; |
| |
| CK_BYTE buf1[100]; |
| CK_ATTRIBUTE verify_attribs[] = |
| { |
| {CKA_ID, &buf1, sizeof(buf1) } |
| }; |
| |
| |
| |
| memcpy( user_pin, DEFAULT_USER_PIN, DEFAULT_USER_PIN_LEN ); |
| user_pin_len = DEFAULT_USER_PIN_LEN; |
| |
| |
| // create a USER R/W session |
| // |
| flags = CKF_SERIAL_SESSION | CKF_RW_SESSION; |
| rc = funcs->C_OpenSession( SLOT_ID, flags, NULL, NULL, &h_session ); |
| if (rc != CKR_OK) { |
| show_error(" C_OpenSession #1", rc ); |
| rc = FALSE; |
| goto done; |
| } |
| |
| rc = funcs->C_Login( h_session, CKU_USER, user_pin, user_pin_len ); |
| if (rc != CKR_OK) { |
| show_error(" C_Login #1", rc ); |
| rc = FALSE; |
| goto done; |
| } |
| |
| // |
| //--------------------------------------------------------------------- |
| // |
| |
| // now, retrieve a list of all object handles |
| // |
| rc = funcs->C_FindObjectsInit( h_session, NULL, 0 ); |
| if (rc != CKR_OK) { |
| show_error(" C_FindObjectsInit #1", rc ); |
| rc = FALSE; |
| goto done; |
| } |
| |
| rc = funcs->C_FindObjects( h_session, obj_list, 20, &find_count ); |
| if (rc != CKR_OK) { |
| show_error(" C_FindObjects #1", rc ); |
| rc = FALSE; |
| goto done; |
| } |
| |
| if (find_count == 0) { |
| printf("ERROR: no objects to examine\n"); |
| rc = FALSE; |
| goto done; |
| } |
| |
| // now, try to extract the CKA_APPLICATION attribute from the original |
| // this will pull in the token's default value for CKA_APPLICATION which |
| // |
| verify_attribs[0].ulValueLen = sizeof(buf1); |
| rc = funcs->C_GetAttributeValue( h_session, obj_list[0], verify_attribs, 1 ); |
| if (rc != CKR_OK) { |
| show_error(" C_GetAttributeValue #1", rc ); |
| rc = FALSE; |
| goto done; |
| } |
| |
| if (memcmp( &cert1_id, verify_attribs[0].pValue, sizeof(cert1_id) ) != 0) { |
| printf(" ERROR: extracted attribute doesn't match\n"); |
| rc = FALSE; |
| goto done; |
| } |
| |
| printf("Attribute matches! Good.\n"); |
| rc = TRUE; |
| |
| done: |
| funcs->C_CloseAllSessions( SLOT_ID ); |
| return rc; |
| } |
| |
| |
| |
| int do_destroy_all_token_objects( void ) |
| { |
| CK_FLAGS flags; |
| CK_SESSION_HANDLE h_session; |
| CK_RV rc; |
| CK_BYTE user_pin[DEFAULT_USER_PIN_LEN]; |
| CK_ULONG user_pin_len; |
| |
| CK_OBJECT_HANDLE obj_list[20]; |
| CK_ULONG find_count; |
| CK_ULONG i; |
| |
| |
| memcpy( user_pin, DEFAULT_USER_PIN, DEFAULT_USER_PIN_LEN ); |
| user_pin_len = DEFAULT_USER_PIN_LEN; |
| |
| |
| // create a USER R/W session |
| // |
| flags = CKF_SERIAL_SESSION | CKF_RW_SESSION; |
| rc = funcs->C_OpenSession( SLOT_ID, flags, NULL, NULL, &h_session ); |
| if (rc != CKR_OK) { |
| show_error(" C_OpenSession #1", rc ); |
| rc = FALSE; |
| goto done; |
| } |
| |
| rc = funcs->C_Login( h_session, CKU_USER, user_pin, user_pin_len ); |
| if (rc != CKR_OK) { |
| show_error(" C_Login #1", rc ); |
| rc = FALSE; |
| goto done; |
| } |
| |
| // |
| //--------------------------------------------------------------------- |
| // |
| |
| // now, retrieve a list of all object handles |
| // |
| rc = funcs->C_FindObjectsInit( h_session, NULL, 0 ); |
| if (rc != CKR_OK) { |
| show_error(" C_FindObjectsInit #1", rc ); |
| rc = FALSE; |
| goto done; |
| } |
| |
| do { |
| rc = funcs->C_FindObjects( h_session, obj_list, 20, &find_count ); |
| if (rc != CKR_OK) { |
| show_error(" C_FindObjects #1", rc ); |
| rc = FALSE; |
| goto done; |
| } |
| |
| for (i=0; i < find_count; i++) { |
| rc = funcs->C_DestroyObject( h_session, obj_list[i] ); |
| if (rc != CKR_OK) { |
| printf(" C_DestroyObject #%d returned", i); |
| show_error(" ", rc ); |
| rc = FALSE; |
| goto done; |
| } |
| } |
| } while (find_count != 0); |
| |
| rc = funcs->C_FindObjectsFinal( h_session ); |
| if (rc != CKR_OK) { |
| show_error(" C_FindObjectsFinal #1", rc ); |
| rc = FALSE; |
| goto done; |
| } |
| |
| rc = TRUE; |
| |
| done: |
| funcs->C_CloseAllSessions( SLOT_ID ); |
| return rc; |
| } |
| |
| |
| int do_inittoken( void ) |
| { |
| CK_BYTE label[32]; |
| CK_BYTE so_pin[DEFAULT_SO_PIN_LEN]; |
| CK_ULONG so_pin_len; |
| int len; |
| CK_RV rc; |
| |
| |
| memcpy( so_pin, DEFAULT_SO_PIN, DEFAULT_SO_PIN_LEN ); |
| so_pin_len = DEFAULT_SO_PIN_LEN; |
| |
| // memcpy( label, "A new label ", 32 ); |
| memcpy( label, " ", 32 ); |
| |
| printf("Enter Token Label:"); |
| scanf("%32s",label); |
| printf("\nLabel is %s:",label); |
| |
| for (len = 0; len <31;len++){ |
| if (label[len] == '\0'){ |
| label[len] = ' '; |
| break; |
| } |
| } |
| printf("\n"); |
| |
| // memcpy( label, "RemoteLeeds ", 32 ); |
| |
| rc = funcs->C_InitToken( SLOT_ID, NULL, so_pin_len, label ); |
| if (rc != CKR_ARGUMENTS_BAD) { |
| show_error(" C_InitToken Fail #1",rc); |
| rc = FALSE; |
| goto done; |
| } |
| |
| rc = funcs->C_InitToken( SLOT_ID, so_pin, so_pin_len, NULL ); |
| if (rc != CKR_ARGUMENTS_BAD) { |
| show_error(" C_InitToken Fail #2",rc); |
| rc = FALSE; |
| goto done; |
| } |
| |
| rc = funcs->C_InitToken( SLOT_ID, so_pin, so_pin_len, label ); |
| if (rc != CKR_OK) { |
| show_error(" C_InitToken #1", rc ); |
| rc = FALSE; |
| goto done; |
| } |
| |
| rc = TRUE; |
| |
| done: |
| return rc; |
| } |
| |
| |
| int do_setUserPIN( void ) |
| { |
| CK_BYTE so_pin[DEFAULT_SO_PIN_LEN]; |
| CK_BYTE user_pin[DEFAULT_USER_PIN_LEN]; |
| CK_ULONG user_pin_len, so_pin_len; |
| CK_FLAGS flags; |
| CK_SESSION_HANDLE h_session; |
| CK_ULONG rc; |
| |
| memcpy( so_pin, DEFAULT_SO_PIN, DEFAULT_SO_PIN_LEN ); |
| memcpy( user_pin, DEFAULT_USER_PIN, DEFAULT_USER_PIN_LEN ); |
| |
| so_pin_len = DEFAULT_SO_PIN_LEN; |
| user_pin_len = DEFAULT_USER_PIN_LEN; |
| |
| |
| flags = CKF_SERIAL_SESSION | CKF_RW_SESSION; |
| rc = funcs->C_OpenSession( SLOT_ID, flags, NULL, NULL, &h_session ); |
| if (rc != CKR_OK) { |
| show_error(" C_OpenSession #1", rc ); |
| rc = FALSE; |
| goto done; |
| } |
| |
| rc = funcs->C_Login( h_session, CKU_SO, so_pin, so_pin_len ); |
| if (rc != CKR_OK) { |
| show_error(" C_Login #1", rc ); |
| rc = FALSE; |
| goto done; |
| } |
| |
| rc = funcs->C_InitPIN( h_session, user_pin, user_pin_len ); |
| if (rc != CKR_OK) { |
| show_error(" C_InitPIN #1", rc ); |
| rc = FALSE; |
| goto done; |
| } |
| |
| rc = TRUE; |
| |
| done: |
| funcs->C_CloseAllSessions( SLOT_ID ); |
| return rc; |
| } |
| |
| |
| int do_GetTokenInfo( void ) |
| { |
| CK_SLOT_ID slot_id; |
| CK_TOKEN_INFO info; |
| CK_RV rc; |
| |
| printf("do_GetTokenInfo...\n"); |
| |
| slot_id = SLOT_ID; |
| |
| rc = funcs->C_GetTokenInfo( slot_id, &info ); |
| if (rc != CKR_OK) { |
| show_error(" C_GetTokenInfo", rc ); |
| return FALSE; |
| } |
| |
| |
| printf(" CK_TOKEN_INFO for slot #1: \n"); |
| printf(" label: %32.32s\n", info.label ); |
| printf(" manufacturerID: %32.32s\n", info.manufacturerID ); |
| printf(" model: %16.16s\n", info.model ); |
| printf(" serialNumber: %16.16s\n", info.serialNumber ); |
| printf(" flags: %0x\n", info.flags ); |
| printf(" ulMaxSessionCount: %d\n", info.ulMaxSessionCount ); |
| printf(" ulSessionCount: %d\n", info.ulSessionCount ); |
| printf(" ulMaxRwSessionCount: %d\n", info.ulMaxRwSessionCount ); |
| printf(" ulRwSessionCount: %d\n", info.ulRwSessionCount ); |
| printf(" ulMaxPinLen: %d\n", info.ulMaxPinLen ); |
| printf(" ulMinPinLen: %d\n", info.ulMinPinLen ); |
| printf(" ulTotalPublicMemory: %d\n", info.ulTotalPublicMemory ); |
| printf(" ulFreePublicMemory: %d\n", info.ulFreePublicMemory ); |
| printf(" ulTotalPrivateMemory: %d\n", info.ulTotalPrivateMemory ); |
| printf(" ulFreePrivateMemory: %d\n", info.ulFreePrivateMemory ); |
| printf(" hardwareVersion: %d.%d\n", info.hardwareVersion.major, info.hardwareVersion.minor ); |
| printf(" firmwareVersion: %d.%d\n", info.firmwareVersion.major, info.firmwareVersion.minor ); |
| printf(" time: %16.16s\n", info.utcTime ); |
| |
| printf("Looks okay...\n"); |
| |
| return TRUE; |
| } |
| |
| |
| // |
| // |
| int main( int argc, char **argv ) |
| { |
| CK_BYTE line[20]; |
| CK_ULONG val, i; |
| int rc; |
| |
| SLOT_ID = 0; |
| |
| for (i=1; i < argc; i++) { |
| if (strcmp(argv[i], "-slot") == 0) { |
| SLOT_ID = atoi(argv[i+1]); |
| i++; |
| } |
| |
| if (strcmp(argv[i], "-h") == 0) { |
| printf("usage: %s [-slot <num>] [-h]\n\n", argv[0] ); |
| printf("By default, Slot #1 is used\n\n"); |
| return -1; |
| } |
| } |
| |
| printf("Using slot #%lu...\n\n", SLOT_ID ); |
| |
| rc = do_GetFunctionList(); |
| if (!rc) |
| return rc; |
| |
| funcs->C_Initialize( NULL ); |
| |
| |
| while (1) { |
| printf("\n1. Create a token object\n"); |
| printf("2. Count token objects\n"); |
| printf("3. Verify contents of the first token object\n"); |
| printf("4. Destroy all token objects\n"); |
| printf("5. Initialize Token\n"); |
| printf("6. Set USER PIN\n"); |
| printf("7. Get Token Info\n"); |
| printf("9. Exit\n"); |
| printf("Selection: "); fflush(stdout); |
| |
| fgets(line, 10, stdin); |
| |
| val = atoi(line); |
| |
| switch (val) { |
| case 1: do_create_token_object(); |
| break; |
| |
| case 2: do_count_token_objects(); |
| break; |
| |
| case 3: do_verify_token_object(); |
| break; |
| |
| case 4: do_destroy_all_token_objects(); |
| break; |
| |
| case 5: do_inittoken(); |
| break; |
| |
| case 6: do_setUserPIN(); |
| break; |
| |
| case 7: do_GetTokenInfo(); |
| break; |
| |
| case 9: goto done; |
| break; |
| } |
| } |
| |
| done: |
| |
| rc = funcs->C_Finalize( NULL ); |
| |
| return rc; |
| } |