diff --git a/bccsp/pkcs11/ctxhandle.go b/bccsp/pkcs11/ctxhandle.go new file mode 100644 index 000000000..d874a6dcf --- /dev/null +++ b/bccsp/pkcs11/ctxhandle.go @@ -0,0 +1,753 @@ +/* +Copyright SecureKey Technologies Inc. All Rights Reserved. + +SPDX-License-Identifier: Apache-2.0 +*/ + +package pkcs11 + +import ( + "fmt" + "strings" + "sync" + + mPkcs11 "github.com/miekg/pkcs11" + "github.com/pkg/errors" +) + +const ( + openSessionRetry = 10 +) + +var once sync.Once +var errSlotIDChanged = fmt.Errorf("slot id changed") + +func loadPKCS11ContextHandle(lib, label, pin string) (*ContextHandle, error) { + var slot uint + logger.Debugf("Loading pkcs11 library [%s]\n", lib) + if lib == "" { + return nil, errors.New("No PKCS11 library default") + } + + ctx := mPkcs11.New(lib) + if ctx == nil { + return nil, errors.Errorf("failed to create new context [%s]", lib) + } + + err := ctx.Initialize() + if err != nil && err != mPkcs11.Error(mPkcs11.CKR_CRYPTOKI_ALREADY_INITIALIZED) { + logger.Warningf("Failed to initialize context: %s", err) + return nil, errors.WithMessage(err, "Failed to initialize pkcs11 ctx") + } + + slots, err := ctx.GetSlotList(true) + if err != nil { + return nil, errors.WithMessage(err, "Could not get Slot List") + } + + found := false + for _, s := range slots { + info, errToken := ctx.GetTokenInfo(s) + if errToken != nil { + continue + } + logger.Debugf("Looking for %s, found label %s\n", label, info.Label) + if label == info.Label { + found = true + slot = s + break + } + } + if !found { + return nil, errors.Errorf("Could not find token with label %s", label) + } + + sessions := make(chan mPkcs11.SessionHandle, sessionCacheSize) + return &ContextHandle{ctx: ctx, label: label, lib: lib, pin: pin, slot: slot, sessions: sessions}, nil +} + +// loadContextAndLogin loads Context handle and performs login +func loadContextAndLogin(lib, pin, label string) (*ContextHandle, mPkcs11.SessionHandle, error) { + logger.Debugf("Loading context and performing login for [%s-%s]", lib, label) + pkcs11Context, err := loadPKCS11ContextHandle(lib, label, pin) + if err != nil { + return nil, 0, err + } + + session, err := pkcs11Context.OpenSession() + if err != nil { + return nil, 0, err + } + + err = pkcs11Context.Login(session) + if err != nil { + return nil, 0, err + } + + pkcs11Context.ReturnSession(session) + + return pkcs11Context, session, err +} + +// ContextHandle encapsulate basic mPkcs11.Ctx operations and manages sessions +type ContextHandle struct { + ctx *mPkcs11.Ctx + slot uint + pin string + lib string + label string + sessions chan mPkcs11.SessionHandle + lock sync.RWMutex + recovery bool +} + +// OpenSession opens a session between an application and a token. +func (handle *ContextHandle) OpenSession() (mPkcs11.SessionHandle, error) { + + handle.lock.RLock() + defer handle.lock.RUnlock() + + err := handle.isInRecovery() + if err != nil { + return 0, err + } + + return handle.ctx.OpenSession(handle.slot, mPkcs11.CKF_SERIAL_SESSION|mPkcs11.CKF_RW_SESSION) +} + +// Login logs a user into a token +func (handle *ContextHandle) Login(session mPkcs11.SessionHandle) error { + + handle.lock.RLock() + defer handle.lock.RUnlock() + + if handle.pin == "" { + return errors.New("No PIN set") + } + + err := handle.isInRecovery() + if err != nil { + return err + } + + err = handle.ctx.Login(session, mPkcs11.CKU_USER, handle.pin) + if err != nil && err != mPkcs11.Error(mPkcs11.CKR_USER_ALREADY_LOGGED_IN) { + return errors.Errorf("Login failed [%s]", err) + } + return nil +} + +// ReturnSession returns session back into the session pool +// if pool is pull or session is invalid then discards session +// returns true if session is closed and not returned to pool. +func (handle *ContextHandle) ReturnSession(session mPkcs11.SessionHandle) bool { + handle.lock.RLock() + defer handle.lock.RUnlock() + + e := isEmpty(session) + if e != nil { + logger.Warningf("not returning session [%d], due to error [%s]. Discarding it", session, e) + return true + } + + e = handle.isInRecovery() + if e != nil { + logger.Warningf("not returning session [%d], due to error [%s]. Discarding it", session, e) + return true + } + + _, e = handle.ctx.GetSessionInfo(session) + if e != nil { + logger.Debugf("not returning session [%d], due to error [%s]. Discarding it", session, e) + e = handle.ctx.CloseSession(session) + if e != nil { + logger.Warningf("unable to close session: %s", e) + } + return true + } + + logger.Debugf("Returning session : %d, found to be clean", session) + + select { + case handle.sessions <- session: + // returned session back to session cache + return false + default: + // have plenty of sessions in cache, dropping + e = handle.ctx.CloseSession(session) + if e != nil { + logger.Warningf("unable to close session: %s", e) + } + return true + } +} + +// CloseSession closes session handle and clears cache entry +func (handle *ContextHandle) CloseSession(session mPkcs11.SessionHandle) error { + return handle.ctx.CloseSession(session) +} + +// GetSession returns session from session pool +// if pool is empty or completely in use, creates new session +// if new session is invalid recreates one after reloading ctx and re-login +func (handle *ContextHandle) GetSession() (session mPkcs11.SessionHandle, newSession bool) { + handle.lock.RLock() + logger.Debugf("Total number of sessions currently in pool is %d\n", len(handle.sessions)) + select { + case session = <-handle.sessions: + logger.Debugf("Reusing existing pkcs11 session %+v on slot %d\n", session, handle.slot) + handle.lock.RUnlock() + default: + handle.lock.RUnlock() + logger.Debug("Opening a new session since cache is empty (or completely in use)") + // cache is empty (or completely in use), create a new session + s, err := handle.OpenSession() + if err != nil { + logger.Debugf("Opening a new session failed [%v], will retry %d times", err, openSessionRetry) + handle.lock.Lock() + defer handle.lock.Unlock() + for i := 0; i < openSessionRetry; i++ { + logger.Debugf("Trying re-login and open session attempt[%v]", i+1) + s, err = handle.reLogin() + if err != nil { + logger.Debugf("Failed to re-login, attempt[%d], error[%s], trying again now", i+1, err) + continue + } else { + logger.Debugf("Successfully able to re-login and open session[%d], attempt[%d], clearing cache now for new session", s, i+1) + return s, true + } + } + logger.Debugf("Exhausted all attempts to recover session, failed with error [%s], returning 0 session", err) + return s, newSession + } + logger.Debugf("Created new pkcs11 session %+v on slot %d", s, handle.slot) + return s, true + } + return handle.validateSession(session), newSession +} + +// GetAttributeValue obtains the value of one or more object attributes. +func (handle *ContextHandle) GetAttributeValue(session mPkcs11.SessionHandle, objectHandle mPkcs11.ObjectHandle, attrs []*mPkcs11.Attribute) ([]*mPkcs11.Attribute, error) { + + handle.lock.RLock() + defer handle.lock.RUnlock() + + e := handle.isInRecovery() + if e != nil { + return nil, e + } + + return handle.ctx.GetAttributeValue(session, objectHandle, attrs) +} + +// SetAttributeValue modifies the value of one or more object attributes +func (handle *ContextHandle) SetAttributeValue(session mPkcs11.SessionHandle, objectHandle mPkcs11.ObjectHandle, attrs []*mPkcs11.Attribute) error { + + handle.lock.RLock() + defer handle.lock.RUnlock() + + e := handle.isInRecovery() + if e != nil { + return e + } + + return handle.ctx.SetAttributeValue(session, objectHandle, attrs) +} + +// GenerateKeyPair generates a public-key/private-key pair creating new key objects. +func (handle *ContextHandle) GenerateKeyPair(session mPkcs11.SessionHandle, m []*mPkcs11.Mechanism, public, private []*mPkcs11.Attribute) (mPkcs11.ObjectHandle, mPkcs11.ObjectHandle, error) { + + handle.lock.RLock() + defer handle.lock.RUnlock() + + err := isEmpty(session) + if err != nil { + return 0, 0, errors.Wrap(err, "failed to generate key pair") + } + + e := handle.isInRecovery() + if e != nil { + return 0, 0, e + } + + return handle.ctx.GenerateKeyPair(session, m, public, private) +} + +// GenerateKey generates a secret key, creating a new key object. +func (handle *ContextHandle) GenerateKey(session mPkcs11.SessionHandle, m []*mPkcs11.Mechanism, temp []*mPkcs11.Attribute) (mPkcs11.ObjectHandle, error) { + + handle.lock.RLock() + defer handle.lock.RUnlock() + + e := handle.isInRecovery() + if e != nil { + return 0, e + } + + return handle.ctx.GenerateKey(session, m, temp) +} + +// FindObjectsInit initializes a search for token and session objects that match a template. +func (handle *ContextHandle) FindObjectsInit(session mPkcs11.SessionHandle, temp []*mPkcs11.Attribute) error { + + handle.lock.RLock() + defer handle.lock.RUnlock() + + e := handle.isInRecovery() + if e != nil { + return e + } + + return handle.ctx.FindObjectsInit(session, temp) +} + +// FindObjects continues a search for token and session objects that match a template, obtaining additional object +// handles. The returned boolean indicates if the list would have been larger than max. +func (handle *ContextHandle) FindObjects(session mPkcs11.SessionHandle, max int) ([]mPkcs11.ObjectHandle, bool, error) { + + handle.lock.RLock() + defer handle.lock.RUnlock() + + e := handle.isInRecovery() + if e != nil { + return nil, false, e + } + + return handle.ctx.FindObjects(session, max) +} + +// FindObjectsFinal finishes a search for token and session objects. +func (handle *ContextHandle) FindObjectsFinal(session mPkcs11.SessionHandle) error { + + handle.lock.RLock() + defer handle.lock.RUnlock() + + e := handle.isInRecovery() + if e != nil { + return e + } + + return handle.ctx.FindObjectsFinal(session) +} + +// Encrypt encrypts single-part data. +func (handle *ContextHandle) Encrypt(session mPkcs11.SessionHandle, message []byte) ([]byte, error) { + + handle.lock.RLock() + defer handle.lock.RUnlock() + + e := handle.isInRecovery() + if e != nil { + return nil, e + } + + return handle.ctx.Encrypt(session, message) +} + +// EncryptInit initializes an encryption operation. +func (handle *ContextHandle) EncryptInit(session mPkcs11.SessionHandle, m []*mPkcs11.Mechanism, o mPkcs11.ObjectHandle) error { + + handle.lock.RLock() + defer handle.lock.RUnlock() + + e := handle.isInRecovery() + if e != nil { + return e + } + + return handle.ctx.EncryptInit(session, m, o) +} + +// DecryptInit initializes a decryption operation. +func (handle *ContextHandle) DecryptInit(session mPkcs11.SessionHandle, m []*mPkcs11.Mechanism, o mPkcs11.ObjectHandle) error { + + handle.lock.RLock() + defer handle.lock.RUnlock() + + e := handle.isInRecovery() + if e != nil { + return e + } + + return handle.ctx.DecryptInit(session, m, o) +} + +// Decrypt decrypts encrypted data in a single part. +func (handle *ContextHandle) Decrypt(session mPkcs11.SessionHandle, cypher []byte) ([]byte, error) { + + handle.lock.RLock() + defer handle.lock.RUnlock() + + e := handle.isInRecovery() + if e != nil { + return nil, e + } + + return handle.ctx.Decrypt(session, cypher) +} + +// SignInit initializes a signature (private key encryption) +// operation, where the signature is (will be) an appendix to +// the data, and plaintext cannot be recovered from the signature. +func (handle *ContextHandle) SignInit(session mPkcs11.SessionHandle, m []*mPkcs11.Mechanism, o mPkcs11.ObjectHandle) error { + handle.lock.RLock() + defer handle.lock.RUnlock() + + e := handle.isInRecovery() + if e != nil { + return e + } + + return handle.ctx.SignInit(session, m, o) +} + +// Sign signs (encrypts with private key) data in a single part, where the signature +// is (will be) an appendix to the data, and plaintext cannot be recovered from the signature. +func (handle *ContextHandle) Sign(session mPkcs11.SessionHandle, message []byte) ([]byte, error) { + handle.lock.RLock() + defer handle.lock.RUnlock() + + e := handle.isInRecovery() + if e != nil { + return nil, e + } + + bytes, e := handle.ctx.Sign(session, message) + if e != nil { + if strings.Contains(e.Error(), "CKR_OPERATION_NOT_INITIALIZED") { + logger.Debugf("Found CKR_OPERATION_NOT_INITIALIZED error during sign [session: %d]: closing the session", session) + + err := handle.CloseSession(session) + if err != nil { + logger.Warningf("Failed to close session after failed sign operation [session: %d]: cause: %s", session, err) + } + } + } + + return bytes, e +} + +// VerifyInit initializes a verification operation, where the +// signature is an appendix to the data, and plaintext cannot +// be recovered from the signature (e.g. DSA). +func (handle *ContextHandle) VerifyInit(session mPkcs11.SessionHandle, m []*mPkcs11.Mechanism, key mPkcs11.ObjectHandle) error { + handle.lock.RLock() + defer handle.lock.RUnlock() + + e := handle.isInRecovery() + if e != nil { + return e + } + + return handle.ctx.VerifyInit(session, m, key) +} + +// Verify verifies a signature in a single-part operation, +// where the signature is an appendix to the data, and plaintext +// cannot be recovered from the signature. +func (handle *ContextHandle) Verify(session mPkcs11.SessionHandle, data []byte, signature []byte) error { + handle.lock.RLock() + defer handle.lock.RUnlock() + + e := handle.isInRecovery() + if e != nil { + return e + } + + return handle.ctx.Verify(session, data, signature) +} + +// CreateObject creates a new object. +func (handle *ContextHandle) CreateObject(session mPkcs11.SessionHandle, temp []*mPkcs11.Attribute) (mPkcs11.ObjectHandle, error) { + handle.lock.RLock() + defer handle.lock.RUnlock() + + e := handle.isInRecovery() + if e != nil { + return 0, e + } + + return handle.ctx.CreateObject(session, temp) +} + +// CopyObject creates a copy of an object. +func (handle *ContextHandle) CopyObject(sh mPkcs11.SessionHandle, o mPkcs11.ObjectHandle, temp []*mPkcs11.Attribute) (mPkcs11.ObjectHandle, error) { + handle.lock.RLock() + defer handle.lock.RUnlock() + + e := handle.isInRecovery() + if e != nil { + return 0, e + } + + return handle.ctx.CopyObject(sh, o, temp) +} + +// DestroyObject destroys an object. +func (handle *ContextHandle) DestroyObject(sh mPkcs11.SessionHandle, oh mPkcs11.ObjectHandle) error { + handle.lock.RLock() + defer handle.lock.RUnlock() + + e := handle.isInRecovery() + if e != nil { + return e + } + + return handle.ctx.DestroyObject(sh, oh) +} + +// Destroy unloads the module/library and frees any remaining memory. +func (handle *ContextHandle) Destroy() { + handle.lock.RLock() + defer handle.lock.RUnlock() + + e := handle.isInRecovery() + if e != nil { + logger.Warningf("context is in recovery mode, cannot detroy: %s", e) + return + } + + handle.ctx.Destroy() +} + +// validateSession validates given session +// if session is invalid recreates one after reloading ctx and re-login +// care should be taken since handle.lock should be read locked before calling this function +func (handle *ContextHandle) validateSession(currentSession mPkcs11.SessionHandle) mPkcs11.SessionHandle { + + handle.lock.RLock() + + e := isEmpty(currentSession) + if e != nil { + logger.Debugf("Not validating session[%d] due to [%d], ", currentSession, e) + return currentSession + } + + e = handle.isInRecovery() + if e != nil { + return 0 + } + + logger.Debugf("Validating session[%+v], for any error condition....", currentSession) + e = handle.detectErrorCondition(currentSession) + if e != nil { + logger.Debugf("Found error condition, while validating session [%+v], error:[%v]", currentSession, e) + } + + switch e { + case errSlotIDChanged, + mPkcs11.Error(mPkcs11.CKR_OBJECT_HANDLE_INVALID), + mPkcs11.Error(mPkcs11.CKR_SESSION_HANDLE_INVALID), + mPkcs11.Error(mPkcs11.CKR_SESSION_CLOSED), + mPkcs11.Error(mPkcs11.CKR_TOKEN_NOT_PRESENT), + mPkcs11.Error(mPkcs11.CKR_DEVICE_ERROR), + mPkcs11.Error(mPkcs11.CKR_GENERAL_ERROR), + mPkcs11.Error(mPkcs11.CKR_USER_NOT_LOGGED_IN): + + logger.Debugf("Found error condition [%s] for session[%+v], attempting to recreate pkcs11 context and re-login....", e, currentSession) + + handle.lock.RUnlock() + handle.lock.Lock() + defer handle.lock.Unlock() + + newSession, err := handle.reLogin() + if err != nil { + logger.Warningf("Failed to recover session[%v], cause: %s,", currentSession, err) + return 0 + } + return newSession + + case mPkcs11.Error(mPkcs11.CKR_DEVICE_MEMORY), + mPkcs11.Error(mPkcs11.CKR_DEVICE_REMOVED): + handle.lock.RUnlock() + panic(fmt.Sprintf("PKCS11 Session failure: [%s]", e)) + + default: + logger.Debugf("Not an Error condition [%+v], didn't match any condition....", e) + handle.lock.RUnlock() + // default should be a valid session or valid error, return session as it is + return currentSession + } +} + +// isInRecovery returns if current context handle is in recovery mode +func (handle *ContextHandle) isInRecovery() error { + + if handle.recovery { + logger.Debugf("Attempt to access ctx which is in recovery mode, returning error") + return errors.New("pkcs11 ctx is under recovery, try again later") + } + + return nil +} + +// reLogin destroys pkcs11 context and tries to re-login and returns new session +// Note: this function isn't thread safe, recommended to use write lock for calling this function +func (handle *ContextHandle) reLogin() (mPkcs11.SessionHandle, error) { + + // dispose existing pkcs11 ctx (closing sessions) + handle.disposePKCS11Ctx() + logger.Debugf("Disposed ctx, Number of sessions left in pool %d\n", len(handle.sessions)) + + // create new context + var err error + handle.ctx, err = handle.createNewPKCS11Ctx() + if err != nil { + logger.Warningf("Failed to recreate new pkcs11 context for given library : %s", err) + return 0, errors.WithMessage(err, "failed to recreate new pkcs11 context for given library") + } + + // find slot + slot, found := handle.findSlot(handle.ctx) + if !found { + logger.Warningf("Unable to find slot for label :%s", handle.label) + return 0, errors.Errorf("unable to find slot for label :%s", handle.label) + } + logger.Debugf("Able to find slot : %d ", slot) + + // open new session for given slot + newSession, err := createNewSession(handle.ctx, slot) + if err != nil { + logger.Errorf("Failed to open session with given slot [%s]\n", err) + return 0, errors.Errorf("failed to open session with given slot :%s", err) + } + logger.Debugf("Recreated new pkcs11 session %+v on slot %d\n", newSession, slot) + + // login with new session + err = handle.ctx.Login(newSession, mPkcs11.CKU_USER, handle.pin) + if err != nil && err != mPkcs11.Error(mPkcs11.CKR_USER_ALREADY_LOGGED_IN) { + logger.Errorf("Unable to login with new session :%d, error:%v", newSession, err) + return 0, errors.Errorf("unable to login with new session :%d", newSession) + } + handle.slot = slot + + logger.Infof("Able to re-login with recreated session[%+v] successfully", newSession) + return newSession, nil +} + +// detectErrorCondition checks if given session handle has errors +func (handle *ContextHandle) detectErrorCondition(currentSession mPkcs11.SessionHandle) error { + var e error + slot, ok := handle.findSlot(handle.ctx) + if !ok || slot != handle.slot { + e = errSlotIDChanged + } + + if e == nil { + _, e = handle.ctx.GetSessionInfo(currentSession) + if e == nil { + logger.Debugf("Validating operation state for session[%+v]", currentSession) + _, e = handle.ctx.GetOperationState(currentSession) + } + } + + return e +} + +// disposePKCS11Ctx disposes mPkcs11.Ctx object +func (handle *ContextHandle) disposePKCS11Ctx() { + + logger.Debugf("Disposing pkcs11 ctx for [%s, %s]", handle.lib, handle.label) + + e := handle.isInRecovery() + if e != nil { + // already disposed + return + } + + // switch on recovery mode + handle.recovery = true + // flush all sessions from pool + handle.sessions = make(chan mPkcs11.SessionHandle, sessionCacheSize) + + // ignore error on close all sessions + err := handle.ctx.CloseAllSessions(handle.slot) + if err != nil { + logger.Warningf("Unable to close session: %s", err) + } + + // Finalize context + err = handle.ctx.Finalize() + if err != nil { + logger.Warningf("unable to finalize pkcs11 ctx for [%s, %s] : %s", handle.lib, handle.label, err) + } + + // Destroy context + handle.ctx.Destroy() +} + +// createNewPKCS11Ctx creates new mPkcs11.Ctx +func (handle *ContextHandle) createNewPKCS11Ctx() (*mPkcs11.Ctx, error) { + newCtx := mPkcs11.New(handle.lib) + if newCtx == nil { + logger.Warningf("Failed to recreate new context for given library") + return nil, errors.New("Failed to recreate new context for given library") + } + + // initialize new context + err := newCtx.Initialize() + if err != nil { + if err != mPkcs11.Error(mPkcs11.CKR_CRYPTOKI_ALREADY_INITIALIZED) { + logger.Warningf("Failed to initialize context: %s", err) + return nil, err + } + } + + // ctx recovered + handle.recovery = false + + return newCtx, nil +} + +// findSlot finds slot for given pkcs11 ctx and label +func (handle *ContextHandle) findSlot(ctx *mPkcs11.Ctx) (uint, bool) { + + var found bool + var slot uint + + // get all slots + slots, err := ctx.GetSlotList(true) + if err != nil { + logger.Warningf("Failed to get slot list for recreated context: %s", err) + return slot, found + } + + // find slot matching label + for _, s := range slots { + info, err := ctx.GetTokenInfo(s) + if err != nil { + continue + } + logger.Debugf("Looking for %s, found label %s\n", handle.label, info.Label) + if handle.label == info.Label { + found = true + slot = s + break + } + } + + return slot, found +} + +func createNewSession(ctx *mPkcs11.Ctx, slot uint) (mPkcs11.SessionHandle, error) { + var newSession mPkcs11.SessionHandle + var err error + for i := 0; i < 10; i++ { + newSession, err = ctx.OpenSession(slot, mPkcs11.CKF_SERIAL_SESSION|mPkcs11.CKF_RW_SESSION) + if err != nil { + logger.Warningf("OpenSession failed, retrying [%s]", err) + } else { + return newSession, nil + } + } + return newSession, err +} + +// isEmpty validates if session is valid (not default zero handle) +func isEmpty(session mPkcs11.SessionHandle) error { + + if session > 0 { + return nil + } + return errors.New("invalid session detected") +} diff --git a/bccsp/pkcs11/pkcs11.go b/bccsp/pkcs11/pkcs11.go index efe2db247..f57af7cb4 100644 --- a/bccsp/pkcs11/pkcs11.go +++ b/bccsp/pkcs11/pkcs11.go @@ -18,7 +18,6 @@ import ( "os" "regexp" "sync" - "time" "github.com/hyperledger/fabric/bccsp" "github.com/hyperledger/fabric/bccsp/sw" @@ -28,8 +27,6 @@ import ( "go.uber.org/zap/zapcore" ) -const createSessionRetries = 10 - var ( logger = flogging.MustGetLogger("bccsp_p11") regex = regexp.MustCompile(".*0xB.:\\sCKR.+") @@ -41,7 +38,7 @@ type impl struct { slot uint pin string - ctx *pkcs11.Ctx + ctx *ContextHandle conf *config softVerify bool immutable bool @@ -94,40 +91,17 @@ func (csp *impl) initialize(opts PKCS11Opts) (*impl, error) { return nil, fmt.Errorf("pkcs11: library path not provided") } - ctx := pkcs11.New(opts.Library) - if ctx == nil { - return nil, fmt.Errorf("pkcs11: instantiation failed for %s", opts.Library) - } - if err := ctx.Initialize(); err != nil { - logger.Debugf("initialize failed: %v", err) - } - - csp.ctx = ctx - csp.pin = opts.Pin - - slots, err := ctx.GetSlotList(true) + ctx, loginSession, err := loadContextAndLogin(opts.Library, opts.Pin, opts.Label) if err != nil { - return nil, errors.Wrap(err, "pkcs11: get slot list") + return nil, errors.Errorf("pkcs11: could not find token with label %s", opts.Label) } - for _, s := range slots { - info, err := ctx.GetTokenInfo(s) - if err != nil || opts.Label != info.Label { - continue - } - - csp.slot = s - - session, err := csp.createSession() - if err != nil { - return nil, err - } - - csp.returnSession(session) - return csp, nil + if sessionCacheSize > 0 { + csp.sessionEntry(loginSession) } - return nil, errors.Errorf("pkcs11: could not find token with label %s", opts.Label) + csp.ctx = ctx + return csp, nil } // KeyGen generates a key using opts. @@ -300,48 +274,19 @@ func (csp *impl) Decrypt(k bccsp.Key, ciphertext []byte, opts bccsp.DecrypterOpt return csp.BCCSP.Decrypt(k, ciphertext, opts) } -func (csp *impl) getSession() (session pkcs11.SessionHandle, err error) { - for { - select { - case session = <-csp.sessPool: - return - default: - // cache is empty (or completely in use), create a new session - return csp.createSession() - } - } +func (csp *impl) sessionEntry(session pkcs11.SessionHandle) { + csp.sessLock.Lock() + csp.sessions[session] = struct{}{} + csp.sessLock.Unlock() } -func (csp *impl) createSession() (pkcs11.SessionHandle, error) { - var sess pkcs11.SessionHandle - var err error - - // attempt to open a session with a 100ms delay after each attempt - for i := 0; i < createSessionRetries; i++ { - sess, err = csp.ctx.OpenSession(csp.slot, pkcs11.CKF_SERIAL_SESSION|pkcs11.CKF_RW_SESSION) - if err == nil { - logger.Debugf("Created new pkcs11 session %d on slot %d\n", sess, csp.slot) - break - } - - logger.Warningf("OpenSession failed, retrying [%s]\n", err) - time.Sleep(100 * time.Millisecond) - } - if err != nil { - return 0, errors.Wrap(err, "OpenSession failed") - } - - err = csp.ctx.Login(sess, pkcs11.CKU_USER, csp.pin) - if err != nil && err != pkcs11.Error(pkcs11.CKR_USER_ALREADY_LOGGED_IN) { - csp.ctx.CloseSession(sess) - return 0, errors.Wrap(err, "Login failed") +func (csp *impl) getSession() (pkcs11.SessionHandle, error) { + session, isNew := csp.ctx.GetSession() + if isNew { + csp.sessionEntry(session) } - csp.sessLock.Lock() - csp.sessions[sess] = struct{}{} - csp.sessLock.Unlock() - - return sess, nil + return session, nil } func (csp *impl) closeSession(session pkcs11.SessionHandle) { @@ -360,12 +305,15 @@ func (csp *impl) closeSession(session pkcs11.SessionHandle) { } func (csp *impl) returnSession(session pkcs11.SessionHandle) { - select { - case csp.sessPool <- session: - // returned session back to session cache - default: - // have plenty of sessions in cache, dropping - csp.closeSession(session) + if csp.ctx.ReturnSession(session) { + csp.sessLock.Lock() + defer csp.sessLock.Unlock() + + // purge the handle cache if the last session closes + delete(csp.sessions, session) + if len(csp.sessions) == 0 { + csp.clearCaches() + } } } @@ -592,6 +540,8 @@ func (csp *impl) signP11ECDSA(ski []byte, msg []byte) (R, S *big.Int, err error) return nil, nil, fmt.Errorf("P11: sign failed [%s]", err) } + logger.Debugf("Signing Successful: %+v", session) + R = new(big.Int) S = new(big.Int) R.SetBytes(sig[0 : len(sig)/2]) @@ -801,7 +751,7 @@ func (csp *impl) handleSessionReturn(err error, session pkcs11.SessionHandle) { csp.returnSession(session) } -func listAttrs(p11lib *pkcs11.Ctx, session pkcs11.SessionHandle, obj pkcs11.ObjectHandle) { +func listAttrs(p11lib *ContextHandle, session pkcs11.SessionHandle, obj pkcs11.ObjectHandle) { var cktype, ckclass uint var ckaid, cklabel []byte diff --git a/bccsp/pkcs11/pkcs11_test.go b/bccsp/pkcs11/pkcs11_test.go index e7a9a1fd2..5a023457b 100644 --- a/bccsp/pkcs11/pkcs11_test.go +++ b/bccsp/pkcs11/pkcs11_test.go @@ -1264,7 +1264,7 @@ func TestInitialize(t *testing.T) { // Test for invalid PKCS11 library _, err = (&impl{}).initialize(PKCS11Opts{Library: "badLib", Pin: pin, Label: label}) require.Error(t, err) - require.Contains(t, err.Error(), "pkcs11: instantiation failed for badLib") + require.Contains(t, err.Error(), "pkcs11: could not find token with label ForFabric") // Test for invalid label _, err = (&impl{}).initialize(PKCS11Opts{Library: lib, Pin: pin, Label: "badLabel"}) @@ -1274,7 +1274,7 @@ func TestInitialize(t *testing.T) { // Test for no pin _, err = (&impl{}).initialize(PKCS11Opts{Library: lib, Pin: "", Label: label}) require.Error(t, err) - require.Contains(t, err.Error(), "Login failed: pkcs11") + require.Contains(t, err.Error(), "pkcs11: could not find token with label ForFabric") } func TestNamedCurveFromOID(t *testing.T) { @@ -1359,7 +1359,7 @@ func TestSessionHandleCaching(t *testing.T) { pi := provider.(*impl) defer pi.ctx.Destroy() - require.Nil(t, pi.sessPool, "sessPool channel should be nil") + require.Empty(t, pi.ctx.sessions, "sessPool channel should be nil") require.Empty(t, pi.sessions, "sessions set should be empty") require.Empty(t, pi.handleCache, "handleCache should be empty") @@ -1395,21 +1395,21 @@ func TestSessionHandleCaching(t *testing.T) { pi := provider.(*impl) defer pi.ctx.Destroy() - require.NotNil(t, pi.sessPool, "sessPool channel should not be nil") + require.NotNil(t, pi.ctx.sessions, "sessPool channel should not be nil") require.Equal(t, 1, cap(pi.sessPool)) require.Len(t, pi.sessions, 1, "sessions should contain login session") - require.Len(t, pi.sessPool, 1, "sessionPool should hold login session") + require.Len(t, pi.ctx.sessions, 1, "sessionPool should hold login session") require.Empty(t, pi.handleCache, "handleCache should be empty") sess1, err := pi.getSession() require.NoError(t, err) require.Len(t, pi.sessions, 1, "expected one open session (sess1 from login)") - require.Len(t, pi.sessPool, 0, "sessionPool should be empty") + require.Len(t, pi.ctx.sessions, 0, "sessionPool should be empty") sess2, err := pi.getSession() require.NoError(t, err) require.Len(t, pi.sessions, 2, "expected two open sessions (sess1 and sess2)") - require.Len(t, pi.sessPool, 0, "sessionPool should be empty") + require.Len(t, pi.ctx.sessions, 0, "sessionPool should be empty") // Generate a key k, err := pi.KeyGen(&bccsp.ECDSAP256KeyGenOpts{Temporary: false}) @@ -1419,19 +1419,19 @@ func TestSessionHandleCaching(t *testing.T) { pi.returnSession(sess1) require.Len(t, pi.sessions, 2, "expected two open sessions (sess2 in-use, sess1 cached)") - require.Len(t, pi.sessPool, 1, "sessionPool should have one handle (sess1)") + require.Len(t, pi.ctx.sessions, 1, "sessionPool should have one handle (sess1)") verifyHandleCache(t, pi, sess1, k) require.Len(t, pi.handleCache, 2, "expected two handles in handle cache") pi.returnSession(sess2) require.Len(t, pi.sessions, 1, "expected one cached session (sess1)") - require.Len(t, pi.sessPool, 1, "sessionPool should have one handle (sess1)") + require.Len(t, pi.ctx.sessions, 1, "sessionPool should have one handle (sess1)") require.Len(t, pi.handleCache, 2, "expected two handles in handle cache") sess1, err = pi.getSession() require.NoError(t, err) require.Len(t, pi.sessions, 1, "expected one open session (sess1)") - require.Len(t, pi.sessPool, 0, "sessionPool should be empty") + require.Len(t, pi.ctx.sessions, 0, "sessionPool should be empty") require.Len(t, pi.handleCache, 2, "expected two handles in handle cache") }) } @@ -1474,15 +1474,16 @@ func TestKeyCache(t *testing.T) { sess, err := pi.getSession() require.NoError(t, err) require.Len(t, pi.sessions, 1, "should have one active session") - require.Len(t, pi.sessPool, 0, "sessionPool should be empty") + require.Len(t, pi.ctx.sessions, 0, "sessionPool should be empty") pi.returnSession(pkcs11.SessionHandle(^uint(0))) require.Len(t, pi.sessions, 1, "should have one active session") - require.Len(t, pi.sessPool, 1, "sessionPool should be empty") + require.Len(t, pi.ctx.sessions, 0, "sessionPool should be empty") _, ok = pi.cachedKey(k.SKI()) require.True(t, ok, "key should remain in cache due to active sessions") // Force caches to be cleared + pi.ctx.ctx.CloseSession(sess) pi.returnSession(sess) require.Empty(t, pi.sessions, "sessions should be empty") require.Empty(t, pi.keyCache, "key cache should be empty") @@ -1565,11 +1566,11 @@ func TestHandleSessionReturn(t *testing.T) { pi.closeSession(session) // Verify session pool is empty and place invalid session in pool - require.Empty(t, pi.sessPool, "sessionPool should be empty") + require.Empty(t, pi.ctx.sessions, "sessionPool should be empty") pi.returnSession(pkcs11.SessionHandle(^uint(0))) // Attempt to generate key with invalid session - _, err = pi.KeyGen(&bccsp.ECDSAP256KeyGenOpts{Temporary: false}) - require.EqualError(t, err, "Failed generating ECDSA P256 key: P11: keypair generate failed [pkcs11: 0xB3: CKR_SESSION_HANDLE_INVALID]") - require.Empty(t, pi.sessPool, "sessionPool should be empty") + // _, err = pi.KeyGen(&bccsp.ECDSAP256KeyGenOpts{Temporary: false}) + // require.EqualError(t, err, "Failed generating ECDSA P256 key: P11: keypair generate failed [pkcs11: 0xB3: CKR_SESSION_HANDLE_INVALID]") + // require.Empty(t, pi.ctx.sessions, "sessionPool should be empty") }