summaryrefslogtreecommitdiffstats
path: root/runtime/lib_ksils12.c
diff options
context:
space:
mode:
Diffstat (limited to 'runtime/lib_ksils12.c')
-rw-r--r--runtime/lib_ksils12.c2173
1 files changed, 2173 insertions, 0 deletions
diff --git a/runtime/lib_ksils12.c b/runtime/lib_ksils12.c
new file mode 100644
index 0000000..489f7fd
--- /dev/null
+++ b/runtime/lib_ksils12.c
@@ -0,0 +1,2173 @@
+/* lib_ksils12.c - rsyslog's KSI-LS12 support library
+ *
+ * Regarding the online algorithm for Merkle tree signing. Expected
+ * calling sequence is:
+ *
+ * sigblkConstruct
+ * for each signature block:
+ * sigblkInitKSI
+ * for each record:
+ * sigblkAddRecordKSI
+ * sigblkFinishKSI
+ * sigblkDestruct
+ *
+ * Obviously, the next call after sigblkFinsh must either be to
+ * sigblkInitKSI or sigblkDestruct (if no more signature blocks are
+ * to be emitted, e.g. on file close). sigblkDestruct saves state
+ * information (most importantly last block hash) and sigblkConstruct
+ * reads (or initilizes if not present) it.
+ *
+ * Copyright 2013-2018 Adiscon GmbH and Guardtime, Inc.
+ *
+ * This file is part of rsyslog.
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ * -or-
+ * see COPYING.ASL20 in the source distribution
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+#ifdef HAVE_CONFIG_H
+#include "config.h"
+#endif
+#include <stdlib.h>
+#include <stdio.h>
+#include <errno.h>
+#include <string.h>
+#include <stdint.h>
+#include <assert.h>
+#include <unistd.h>
+#include <sys/types.h>
+#include <sys/stat.h>
+#include <fcntl.h>
+#include <stdarg.h>
+#include <limits.h>
+
+#include <ksi/ksi.h>
+#include <ksi/tlv_element.h>
+#include <ksi/hash.h>
+#include <ksi/net_async.h>
+#include <ksi/net_ha.h>
+#include <ksi/net_uri.h>
+#include <ksi/signature_builder.h>
+#include "rsyslog.h"
+#include "errmsg.h"
+#include "lib_ksils12.h"
+#include "lib_ksi_queue.h"
+
+#ifndef VERSION
+#define VERSION "no-version"
+#endif
+
+#define KSI_BUF_SIZE 4096
+
+static const char *blockFileSuffix = ".logsig.parts/blocks.dat";
+static const char *sigFileSuffix = ".logsig.parts/block-signatures.dat";
+static const char *ls12FileSuffix = ".logsig";
+static const char *blockCloseReason = "com.guardtime.blockCloseReason";
+
+
+#define LS12_FILE_HEADER "LOGSIG12"
+#define LS12_BLOCKFILE_HEADER "LOG12BLK"
+#define LS12_SIGFILE_HEADER "LOG12SIG"
+#define LS12_SIGNATURE_TIMEOUT 60
+
+/* Worker queue item type identifier */
+typedef enum QITEM_type_en {
+ QITEM_SIGNATURE_REQUEST = 0x00,
+ QITEM_CLOSE_FILE,
+ QITEM_NEW_FILE,
+ QITEM_QUIT
+} QITEM_type;
+
+/* Worker queue item status identifier */
+typedef enum QITEM_status_en {
+ /* State assigned to any item added to queue (initial state). */
+ QITEM_WAITING = 0x00,
+
+ /* State assigned to #QITEM_SIGNATURE_REQUEST item when it is sent out. */
+ QITEM_SENT,
+
+ /* State assigned to #QITEM_SIGNATURE_REQUEST item when request failed or succeeded. */
+ QITEM_DONE
+} QITEM_status;
+
+
+/* Worker queue job item */
+typedef struct QueueItem_st {
+ QITEM_type type;
+ QITEM_status status;
+ KSI_DataHash *root;
+ FILE *file; /* To keep track of the target signature file. */
+ uint64_t intarg1; /* Block time limit or record count or not used. */
+ uint64_t intarg2; /* Level of the sign request or not used. */
+ KSI_AsyncHandle *respHandle;
+ int ksi_status;
+ time_t request_time;
+} QueueItem;
+
+static bool queueAddCloseFile(rsksictx ctx, ksifile kf);
+static bool queueAddNewFile(rsksictx ctx, ksifile kf);
+static bool queueAddQuit(rsksictx ctx);
+static bool queueAddSignRequest(rsksictx ctx, ksifile kf, KSI_DataHash *root, unsigned level);
+static int sigblkFinishKSINoSignature(ksifile ksi, const char *reason);
+
+void *signer_thread(void *arg);
+
+static void __attribute__((format(printf, 2, 3)))
+report(rsksictx ctx, const char *errmsg, ...) {
+ char buf[1024];
+ int r;
+ va_list args;
+ va_start(args, errmsg);
+
+ r = vsnprintf(buf, sizeof (buf), errmsg, args);
+ buf[sizeof(buf)-1] = '\0';
+ va_end(args);
+
+ if(ctx->logFunc == NULL)
+ return;
+
+ if(r>0 && r<(int)sizeof(buf))
+ ctx->logFunc(ctx->usrptr, (uchar*)buf);
+ else
+ ctx->logFunc(ctx->usrptr, (uchar*)errmsg);
+}
+
+static void
+reportErr(rsksictx ctx, const char *const errmsg)
+{
+ if(ctx->errFunc == NULL)
+ goto done;
+ ctx->errFunc(ctx->usrptr, (uchar*)errmsg);
+done: return;
+}
+
+static const char *
+level2str(int level) {
+ switch (level) {
+ case KSI_LOG_DEBUG: return "DEBUG";
+ case KSI_LOG_INFO: return "INFO";
+ case KSI_LOG_NOTICE: return "NOTICE";
+ case KSI_LOG_WARN: return "WARN";
+ case KSI_LOG_ERROR: return "ERROR";
+ default: return "UNKNOWN LOG LEVEL";
+ }
+}
+
+void
+reportKSIAPIErr(rsksictx ctx, ksifile ksi, const char *apiname, int ecode)
+{
+ char errbuf[4096];
+ char ksi_errbuf[4096];
+ KSI_ERR_getBaseErrorMessage(ctx->ksi_ctx, ksi_errbuf, sizeof(ksi_errbuf), NULL, NULL);
+ snprintf(errbuf, sizeof(errbuf), "%s[%s:%d]: %s (%s)",
+ (ksi == NULL) ? (uchar*) "" : ksi->blockfilename,
+ apiname, ecode, KSI_getErrorString(ecode), ksi_errbuf);
+
+ errbuf[sizeof(errbuf)-1] = '\0';
+ reportErr(ctx, errbuf);
+}
+
+void
+rsksisetErrFunc(rsksictx ctx, void (*func)(void*, uchar *), void *usrptr)
+{
+ ctx->usrptr = usrptr;
+ ctx->errFunc = func;
+}
+
+void
+rsksisetLogFunc(rsksictx ctx, void (*func)(void*, uchar *), void *usrptr)
+{
+ ctx->usrptr = usrptr;
+ ctx->logFunc = func;
+}
+
+static ksifile
+rsksifileConstruct(rsksictx ctx) {
+ ksifile ksi = NULL;
+ if ((ksi = calloc(1, sizeof (struct ksifile_s))) == NULL)
+ goto done;
+ ksi->ctx = ctx;
+ ksi->hashAlg = ctx->hashAlg;
+ ksi->blockTimeLimit = ctx->blockTimeLimit;
+ ksi->blockSizeLimit = 1 << (ctx->effectiveBlockLevelLimit - 1);
+ ksi->bKeepRecordHashes = ctx->bKeepRecordHashes;
+ ksi->bKeepTreeHashes = ctx->bKeepTreeHashes;
+ ksi->lastLeaf[0] = ctx->hashAlg;
+
+done:
+ return ksi;
+}
+
+/* return the actual length in to-be-written octets of an integer */
+static uint8_t
+tlvGetIntSize(uint64_t val) {
+ uint8_t n = 0;
+ while (val != 0) {
+ val >>= 8;
+ n++;
+ }
+ return n;
+}
+
+static int
+tlvWriteOctetString(FILE *f, const uint8_t *data, uint16_t len) {
+ if (fwrite(data, len, 1, f) != 1)
+ return RSGTE_IO;
+ return 0;
+}
+
+static int
+tlvWriteHeader8(FILE *f, int flags, uint8_t tlvtype, int len) {
+ unsigned char buf[2];
+ assert((flags & RSGT_TYPE_MASK) == 0);
+ assert((tlvtype & RSGT_TYPE_MASK) == tlvtype);
+ buf[0] = (flags & ~RSGT_FLAG_TLV16) | tlvtype;
+ buf[1] = len & 0xff;
+
+ return tlvWriteOctetString(f, buf, 2);
+}
+
+static int
+tlvWriteHeader16(FILE *f, int flags, uint16_t tlvtype, uint16_t len)
+{
+ uint16_t typ;
+ unsigned char buf[4];
+ assert((flags & RSGT_TYPE_MASK) == 0);
+ assert((tlvtype >> 8 & RSGT_TYPE_MASK) == (tlvtype >> 8));
+ typ = ((flags | RSGT_FLAG_TLV16) << 8) | tlvtype;
+
+ buf[0] = typ >> 8;
+ buf[1] = typ & 0xff;
+ buf[2] = (len >> 8) & 0xff;
+ buf[3] = len & 0xff;
+
+ return tlvWriteOctetString(f, buf, 4);
+}
+
+static int
+tlvGetHeaderSize(uint16_t tag, size_t size) {
+ if (tag <= RSGT_TYPE_MASK && size <= 0xff)
+ return 2;
+ if ((tag >> 8) <= RSGT_TYPE_MASK && size <= 0xffff)
+ return 4;
+ return 0;
+}
+
+static int
+tlvWriteHeader(FILE *f, int flags, uint16_t tlvtype, uint16_t len) {
+ int headersize = tlvGetHeaderSize(tlvtype, flags);
+ if (headersize == 2)
+ return tlvWriteHeader8(f, flags, tlvtype, len);
+ else if (headersize == 4)
+ return tlvWriteHeader16(f, flags, tlvtype, len);
+ else
+ return 0;
+}
+
+static int
+tlvWriteOctetStringTLV(FILE *f, int flags, uint16_t tlvtype, const uint8_t *data, uint16_t len) {
+ if (tlvWriteHeader(f, flags, tlvtype, len) != 0)
+ return RSGTE_IO;
+
+ if (fwrite(data, len, 1, f) != 1)
+ return RSGTE_IO;
+
+ return 0;
+}
+
+static int
+tlvWriteInt64TLV(FILE *f, int flags, uint16_t tlvtype, uint64_t val) {
+ unsigned char buf[8];
+ uint8_t count = tlvGetIntSize(val);
+ uint64_t nTmp;
+
+ if (tlvWriteHeader(f, flags, tlvtype, count) != 0)
+ return RSGTE_IO;
+
+ nTmp = val;
+ for (int i = count - 1; i >= 0; i--) {
+ buf[i] = 0xFF & nTmp;
+ nTmp = nTmp >> 8;
+ }
+
+ if (fwrite(buf, count, 1, f) != 1)
+ return RSGTE_IO;
+
+ return 0;
+}
+
+static int
+tlvWriteHashKSI(ksifile ksi, uint16_t tlvtype, KSI_DataHash *rec) {
+ int r;
+ const unsigned char *imprint;
+ size_t imprint_len;
+ r = KSI_DataHash_getImprint(rec, &imprint, &imprint_len);
+ if (r != KSI_OK) {
+ reportKSIAPIErr(ksi->ctx, ksi, "KSI_DataHash_getImprint", r);
+ return r;
+ }
+
+ return tlvWriteOctetStringTLV(ksi->blockFile, 0, tlvtype, imprint, imprint_len);
+}
+
+static int
+tlvWriteBlockHdrKSI(ksifile ksi) {
+ unsigned tlvlen;
+ uint8_t hash_algo = ksi->hashAlg;
+ int r;
+
+ tlvlen = 2 + 1 /* hash algo TLV */ +
+ 2 + KSI_getHashLength(ksi->hashAlg) /* iv */ +
+ 2 + KSI_getHashLength(ksi->lastLeaf[0]) + 1;
+ /* last hash */;
+
+ /* write top-level TLV object block-hdr */
+ CHKr(tlvWriteHeader(ksi->blockFile, 0x00, 0x0901, tlvlen));
+
+ /* hash-algo */
+ CHKr(tlvWriteOctetStringTLV(ksi->blockFile, 0x00, 0x01, &hash_algo, 1));
+
+ /* block-iv */
+ CHKr(tlvWriteOctetStringTLV(ksi->blockFile, 0x00, 0x02,
+ ksi->IV, KSI_getHashLength(ksi->hashAlg)));
+
+ /* last-hash */
+ CHKr(tlvWriteOctetStringTLV(ksi->blockFile, 0x00, 0x03,
+ ksi->lastLeaf, KSI_getHashLength(ksi->lastLeaf[0]) + 1));
+done:
+ return r;
+}
+
+static int
+tlvWriteKSISigLS12(FILE *outfile, size_t record_count, uchar *der, uint16_t lenDer) {
+ int r = 0;
+ int totalSize = 2 + tlvGetIntSize(record_count) + 4 + lenDer;
+
+ CHKr(tlvWriteHeader(outfile, 0x00, 0x0904, totalSize));
+ CHKr(tlvWriteInt64TLV(outfile, 0x00, 0x01, record_count));
+ CHKr(tlvWriteOctetStringTLV(outfile, 0x00, 0x0905, der, lenDer));
+done:
+ return r;
+}
+
+static int
+tlvWriteNoSigLS12(FILE *outfile, size_t record_count, const KSI_DataHash *hash, const char *errorText) {
+ int r = 0;
+ int totalSize = 0;
+ int noSigSize = 0;
+ const unsigned char *imprint = NULL;
+ size_t imprintLen = 0;
+
+ KSI_DataHash_getImprint(hash, &imprint, &imprintLen);
+
+ noSigSize = 2 + imprintLen + (errorText ? (2 + strlen(errorText) + 1) : 0);
+ totalSize = 2 + tlvGetIntSize(record_count) + 2 + noSigSize;
+
+ CHKr(tlvWriteHeader(outfile, 0x00, 0x0904, totalSize));
+ CHKr(tlvWriteInt64TLV(outfile, 0x00, 0x01, record_count));
+ CHKr(tlvWriteHeader(outfile, 0x00, 0x02, noSigSize));
+ CHKr(tlvWriteOctetStringTLV(outfile, 0x00, 0x01, imprint, imprintLen));
+ if (errorText)
+ CHKr(tlvWriteOctetStringTLV(outfile, 0x00, 0x02, (uint8_t*) errorText, strlen(errorText) + 1));
+done:
+ return r;
+}
+
+static int
+tlvCreateMetadata(ksifile ksi, uint64_t record_index, const char *key,
+ const char *value, unsigned char *buffer, size_t *len) {
+ int r = 0;
+ KSI_TlvElement *metadata = NULL, *attrib_tlv = NULL;
+ KSI_Utf8String *key_tlv = NULL, *value_tlv = NULL;
+ KSI_Integer *index_tlv = NULL;
+
+ CHKr(KSI_TlvElement_new(&metadata));
+ metadata->ftlv.tag = 0x0911;
+
+ CHKr(KSI_Integer_new(ksi->ctx->ksi_ctx, record_index, &index_tlv));
+ CHKr(KSI_TlvElement_setInteger(metadata, 0x01, index_tlv));
+
+ CHKr(KSI_TlvElement_new(&attrib_tlv));
+ attrib_tlv->ftlv.tag = 0x02;
+
+ CHKr(KSI_Utf8String_new(ksi->ctx->ksi_ctx, key, strlen(key) + 1, &key_tlv));
+ CHKr(KSI_TlvElement_setUtf8String(attrib_tlv, 0x01, key_tlv));
+
+ CHKr(KSI_Utf8String_new(ksi->ctx->ksi_ctx, value, strlen(value) + 1, &value_tlv));
+ CHKr(KSI_TlvElement_setUtf8String(attrib_tlv, 0x02, value_tlv));
+
+ CHKr(KSI_TlvElement_setElement(metadata, attrib_tlv));
+
+ CHKr(KSI_TlvElement_serialize(metadata, buffer, 0xFFFF, len, 0));
+
+done:
+ if (metadata) KSI_TlvElement_free(metadata);
+ if (attrib_tlv) KSI_TlvElement_free(attrib_tlv);
+ if (key_tlv) KSI_Utf8String_free(key_tlv);
+ if (value_tlv) KSI_Utf8String_free(value_tlv);
+ if (index_tlv) KSI_Integer_free(index_tlv);
+
+ return r;
+}
+
+#define KSI_FILE_AMOUNT_INC 32
+
+static int
+rsksiExpandRegisterIfNeeded(rsksictx ctx, size_t inc) {
+ int ret = RSGTE_INTERNAL;
+ ksifile *tmp = NULL;
+
+ if (ctx == NULL || inc == 0) {
+ return RSGTE_INTERNAL;
+ }
+
+ if (ctx->ksiCount < ctx->ksiCapacity) {
+ return RSGTE_SUCCESS;
+ }
+
+ /* If needed allocate memory for the buffer. */
+ tmp = (ksifile*)realloc(ctx->ksi, sizeof(ksifile) * (ctx->ksiCapacity + inc));
+ if (tmp == NULL) {
+ ret = RSGTE_OOM;
+ goto done;
+ }
+
+ /* Make sure that allocated pointers are all set to NULL. */
+ memset(tmp + ctx->ksiCapacity, 0, sizeof(ksifile) * inc);
+
+ /* Update buffer capacity. */
+ ctx->ksiCapacity += inc;
+ ctx->ksi = tmp;
+ tmp = NULL;
+ ret = RSGTE_SUCCESS;
+
+done:
+ free(tmp);
+ return ret;
+}
+
+static int
+rsksiRegisterKsiFile(rsksictx ctx, ksifile ksi) {
+ int ret = RSGTE_INTERNAL;
+
+ if (ctx == NULL || ksi == NULL) {
+ return RSGTE_INTERNAL;
+ }
+
+ /* To be extra sure that ksifile buffer is initialized correctly, clear variables. */
+ if (ctx->ksi == NULL) {
+ ctx->ksiCount = 0;
+ ctx->ksiCapacity = 0;
+ }
+
+ ret = rsksiExpandRegisterIfNeeded(ctx, KSI_FILE_AMOUNT_INC);
+ if (ret != RSGTE_SUCCESS) goto done;
+
+ ctx->ksi[ctx->ksiCount] = ksi;
+ ctx->ksiCount++;
+ ret = RSGTE_SUCCESS;
+
+done:
+ return ret;
+}
+
+static int
+rsksiDeregisterKsiFile(rsksictx ctx, ksifile ksi) {
+ int ret = RSGTE_INTERNAL;
+ size_t i = 0;
+
+ if (ctx == NULL || ksi == NULL) {
+ return RSGTE_INTERNAL;
+ }
+
+
+ for (i = 0; i < ctx->ksiCount; i++) {
+ if (ctx->ksi[i] != NULL && ctx->ksi[i] == ksi) {
+ size_t lastElement = ctx->ksiCount - 1;
+
+ if (i != lastElement) {
+ ctx->ksi[i] = ctx->ksi[lastElement];
+ }
+
+ ctx->ksi[lastElement] = NULL;
+
+ ctx->ksiCount--;
+ ret = RSGTE_SUCCESS;
+ goto done;
+ }
+ }
+
+done:
+ return ret;
+}
+
+/* support for old platforms - graceful degrade */
+#ifndef O_CLOEXEC
+#define O_CLOEXEC 0
+#endif
+/* read rsyslog log state file; if we cannot access it or the
+ * contents looks invalid, we flag it as non-present (and thus
+ * begin a new hash chain).
+ * The context is initialized accordingly.
+ */
+static bool
+ksiReadStateFile(ksifile ksi) {
+ int fd = -1;
+ struct rsksistatefile sf;
+ bool ret = false;
+
+ fd = open((char*)ksi->statefilename, O_RDONLY|O_NOCTTY|O_CLOEXEC, 0600);
+ if (fd == -1)
+ goto done;
+
+ if (read(fd, &sf, sizeof (sf)) != sizeof (sf)) goto done;
+ if (strncmp(sf.hdr, "KSISTAT10", 9)) goto done;
+
+ if (KSI_getHashLength(sf.hashID) != sf.lenHash ||
+ KSI_getHashLength(sf.hashID) > KSI_MAX_IMPRINT_LEN - 1)
+ goto done;
+
+ if (read(fd, ksi->lastLeaf + 1, sf.lenHash) != sf.lenHash)
+ goto done;
+
+ ksi->lastLeaf[0] = sf.hashID;
+ ret = true;
+
+done:
+ if (!ret) {
+ memset(ksi->lastLeaf, 0, sizeof (ksi->lastLeaf));
+ ksi->lastLeaf[0] = ksi->hashAlg;
+ }
+
+ if (fd != -1)
+ close(fd);
+ return ret;
+}
+
+/* persist all information that we need to re-open and append
+ * to a log signature file.
+ */
+static void
+ksiWwriteStateFile(ksifile ksi)
+{
+ int fd;
+ struct rsksistatefile sf;
+
+ fd = open((char*)ksi->statefilename,
+ O_WRONLY|O_CREAT|O_TRUNC|O_NOCTTY|O_CLOEXEC, ksi->ctx->fCreateMode);
+ if(fd == -1)
+ goto done;
+ if (ksi->ctx->fileUID != (uid_t) - 1 || ksi->ctx->fileGID != (gid_t) - 1) {
+ /* we need to set owner/group */
+ if (fchown(fd, ksi->ctx->fileUID, ksi->ctx->fileGID) != 0) {
+ report(ksi->ctx, "lmsig_ksi: chown for file '%s' failed: %s",
+ ksi->statefilename, strerror(errno));
+ }
+ }
+
+ memcpy(sf.hdr, "KSISTAT10", 9);
+ sf.hashID = ksi->hashAlg;
+ sf.lenHash = KSI_getHashLength(ksi->lastLeaf[0]);
+ /* if the write fails, we cannot do anything against that. We check
+ * the condition just to keep the compiler happy.
+ */
+ if(write(fd, &sf, sizeof(sf))){};
+ if (write(fd, ksi->lastLeaf + 1, sf.lenHash)) {
+ };
+ close(fd);
+done:
+ return;
+}
+
+
+static int
+ksiCloseSigFile(ksifile ksi) {
+ fclose(ksi->blockFile);
+ ksi->blockFile = NULL;
+ if (ksi->ctx->syncMode == LOGSIG_ASYNCHRONOUS)
+ queueAddCloseFile(ksi->ctx, ksi);
+
+ ksiWwriteStateFile(ksi);
+ return 0;
+}
+
+static int mkpath(char* path, mode_t mode, uid_t uid, gid_t gid) {
+
+ if(path == NULL)
+ return 1;
+
+ for (char *p = strchr(path + 1, '/'); p; p = strchr(p + 1, '/')) {
+ *p = '\0';
+ if (mkdir(path, mode) == 0) {
+ if (uid != (uid_t) -1 || gid != (uid_t) -1) {
+ if (chown(path, uid, gid)) {
+ LogError(errno, RS_RET_IO_ERROR,
+ "ksils12 signatures: could not change to "
+ "configured owner - files may be unaccessible");
+ }
+ }
+ }
+ else if (errno != EEXIST) {
+ *p = '/';
+ return -1;
+ }
+
+ *p = '/';
+ }
+ return 0;
+}
+
+static FILE*
+ksiCreateFile(rsksictx ctx, const char *path, uid_t uid, gid_t gid, int mode, bool lockit, const char* header) {
+ int fd = -1;
+ struct stat stat_st;
+ FILE *f = NULL;
+ struct flock lock = {F_WRLCK, SEEK_SET, 0, 0, 0};
+
+ if(path ==NULL)
+ return NULL;
+
+ if (mkpath((char*) path, ctx->fDirCreateMode, ctx->dirUID, ctx->dirGID) != 0) {
+ report(ctx, "ksiCreateFile: mkpath failed for %s", path);
+ goto done;
+ }
+
+ fd = open(path, O_RDWR | O_APPEND | O_NOCTTY | O_CLOEXEC, 0600);
+ if (fd == -1) {
+ fd = open(path, O_RDWR | O_CREAT | O_NOCTTY | O_CLOEXEC, mode);
+ if (fd == -1) {
+ report(ctx, "creating file '%s' failed: %s", path, strerror(errno));
+ goto done;
+ }
+
+ if (uid != (uid_t) - 1 || gid != (gid_t) - 1) {
+ if (fchown(fd, uid, gid) != 0) {
+ report(ctx, "lmsig_ksi: chown for file '%s' failed: %s",
+ path, strerror(errno));
+ }
+ }
+ }
+
+ if (lockit && fcntl(fd, F_SETLK, &lock) != 0)
+ report(ctx, "fcntl error: %s", strerror(errno));
+
+ f = fdopen(fd, "a");
+ if (f == NULL) {
+ report(ctx, "fdopen for '%s' failed: %s", path, strerror(errno));
+ goto done;
+ }
+
+ setvbuf(f, NULL, _IOFBF, KSI_BUF_SIZE);
+
+ if (fstat(fd, &stat_st) == -1) {
+ reportErr(ctx, "ksiOpenSigFile: can not stat file");
+ goto done;
+ }
+
+ if (stat_st.st_size == 0 && header != NULL) {
+ if(fwrite(header, strlen(header), 1, f) != 1) {
+ report(ctx, "ksiOpenSigFile: fwrite for file %s failed: %s",
+ path, strerror(errno));
+ goto done;
+ }
+ }
+ /* Write header immediately as when using dynafile it is possible that the same
+ * file is opened 2x in sequence (caused by small dynafile cache where files are
+ * frequently closed and reopened). If the header already exists double header is
+ * not written. The content of the file is ordered by signer thread.
+ */
+ fflush(f);
+done:
+ return f;
+}
+
+static void handle_ksi_config(rsksictx ctx, KSI_AsyncService *as, KSI_Config *config) {
+ int res = KSI_UNKNOWN_ERROR;
+ KSI_Integer *intValue = NULL;
+
+ if (KSI_Config_getMaxRequests(config, &intValue) == KSI_OK && intValue != NULL) {
+ ctx->max_requests = KSI_Integer_getUInt64(intValue);
+ report(ctx, "KSI gateway has reported a max requests value of %llu",
+ (long long unsigned) ctx->max_requests);
+
+ if(as) {
+ /* libksi expects size_t. */
+ size_t optValue = 0;
+
+ optValue = ctx->max_requests;
+ res = KSI_AsyncService_setOption(as, KSI_ASYNC_OPT_MAX_REQUEST_COUNT,
+ (void*)optValue);
+ if(res != KSI_OK)
+ reportKSIAPIErr(ctx, NULL, "KSI_AsyncService_setOption(max_request)", res);
+
+ optValue = 3 * ctx->max_requests * ctx->blockSigTimeout;
+ KSI_AsyncService_setOption(as, KSI_ASYNC_OPT_REQUEST_CACHE_SIZE,
+ (void*)optValue);
+ }
+ }
+
+ intValue = NULL;
+ if(KSI_Config_getMaxLevel(config, &intValue) == KSI_OK && intValue != NULL) {
+ uint64_t newLevel = 0;
+ newLevel = KSI_Integer_getUInt64(intValue);
+ report(ctx, "KSI gateway has reported a max level value of %llu",
+ (long long unsigned) newLevel);
+ newLevel=MIN(newLevel, ctx->blockLevelLimit);
+ if(ctx->effectiveBlockLevelLimit != newLevel) {
+ report(ctx, "Changing the configured block level limit from %llu to %llu",
+ (long long unsigned) ctx->effectiveBlockLevelLimit,
+ (long long unsigned) newLevel);
+ ctx->effectiveBlockLevelLimit = newLevel;
+ }
+ else if(newLevel < 2) {
+ report(ctx, "KSI gateway has reported an invalid level limit value (%llu), "
+ "plugin disabled", (long long unsigned) newLevel);
+ ctx->disabled = true;
+ }
+ }
+
+ intValue = NULL;
+ if (KSI_Config_getAggrPeriod(config, &intValue) == KSI_OK && intValue != NULL) {
+ uint64_t newThreadSleep = 0;
+ newThreadSleep = KSI_Integer_getUInt64(intValue);
+ report(ctx, "KSI gateway has reported an aggregation period value of %llu",
+ (long long unsigned) newThreadSleep);
+
+ newThreadSleep = MIN(newThreadSleep, ctx->threadSleepms);
+ if(ctx->threadSleepms != newThreadSleep) {
+ report(ctx, "Changing async signer thread sleep from %llu to %llu",
+ (long long unsigned) ctx->threadSleepms,
+ (long long unsigned) newThreadSleep);
+ ctx->threadSleepms = newThreadSleep;
+ }
+ }
+}
+
+static int
+isAggrConfNeeded(rsksictx ctx) {
+ time_t now = 0;
+
+ now = time(NULL);
+
+ if ((uint64_t)ctx->tConfRequested + ctx->confInterval <= (uint64_t)now || ctx->tConfRequested == 0) {
+ ctx->tConfRequested = now;
+ return 1;
+ }
+
+ return 0;
+}
+
+/* note: if file exists, the last hash for chaining must
+ * be read from file.
+ */
+static int
+ksiOpenSigFile(ksifile ksi) {
+ int r = 0, tmpRes = 0;
+ const char *header;
+ FILE* signatureFile = NULL;
+
+ if (ksi->ctx->syncMode == LOGSIG_ASYNCHRONOUS)
+ header = LS12_BLOCKFILE_HEADER;
+ else
+ header = LS12_FILE_HEADER;
+
+ ksi->blockFile = ksiCreateFile(ksi->ctx, (char*) ksi->blockfilename, ksi->ctx->fileUID,
+ ksi->ctx->fileGID, ksi->ctx->fCreateMode, true, header);
+
+ if (ksi->blockFile == NULL) {
+ r = RSGTE_IO;
+ goto done;
+ }
+
+ /* create the file for ksi signatures if needed */
+ if (ksi->ctx->syncMode == LOGSIG_ASYNCHRONOUS) {
+ signatureFile = ksiCreateFile(ksi->ctx, (char*) ksi->ksifilename, ksi->ctx->fileUID,
+ ksi->ctx->fileGID, ksi->ctx->fCreateMode, true, LS12_SIGFILE_HEADER);
+
+ if (signatureFile == NULL) {
+ r = RSGTE_IO;
+ goto done;
+ }
+
+ ksi->sigFile = signatureFile;
+ queueAddNewFile(ksi->ctx, ksi);
+ }
+
+ /* we now need to obtain the last previous hash, so that
+ * we can continue the hash chain. We do not check for error
+ * as a state file error can be recovered by graceful degredation.
+ */
+ ksiReadStateFile(ksi);
+
+ if (ksi->ctx->syncMode == LOGSIG_SYNCHRONOUS) {
+ if (isAggrConfNeeded(ksi->ctx)) {
+ KSI_Config *config = NULL;
+
+ tmpRes = KSI_receiveAggregatorConfig(ksi->ctx->ksi_ctx, &config);
+ if (tmpRes == KSI_OK) {
+ handle_ksi_config(ksi->ctx, NULL, config);
+ } else {
+ reportKSIAPIErr(ksi->ctx, NULL, "KSI_receiveAggregatorConfig", tmpRes);
+ }
+ KSI_Config_free(config);
+ }
+ }
+
+done: return r;
+}
+
+/*
+ * As of some Linux and security expert I spoke to, /dev/urandom
+ * provides very strong random numbers, even if it runs out of
+ * entropy. As far as he knew, this is save for all applications
+ * (and he had good proof that I currently am not permitted to
+ * reproduce). -- rgerhards, 2013-03-04
+ */
+static void
+seedIVKSI(ksifile ksi)
+{
+ int hashlen;
+ int fd;
+ const char *rnd_device = ksi->ctx->random_source ? ksi->ctx->random_source : "/dev/urandom";
+
+ hashlen = KSI_getHashLength(ksi->hashAlg);
+ ksi->IV = malloc(hashlen); /* do NOT zero-out! */
+ /* if we cannot obtain data from /dev/urandom, we use whatever
+ * is present at the current memory location as random data. Of
+ * course, this is very weak and we should consider a different
+ * option, especially when not running under Linux (for Linux,
+ * unavailability of /dev/urandom is just a theoretic thing, it
+ * will always work...). -- TODO -- rgerhards, 2013-03-06
+ */
+ if ((fd = open(rnd_device, O_RDONLY)) >= 0) {
+ if(read(fd, ksi->IV, hashlen) == hashlen) {}; /* keep compiler happy */
+ close(fd);
+ }
+}
+
+static int
+create_signer_thread(rsksictx ctx) {
+ int r;
+ if (ctx->signer_state != SIGNER_STARTED) {
+ if ((r = pthread_mutex_init(&ctx->module_lock, 0)))
+ report(ctx, "pthread_mutex_init: %s", strerror(r));
+ ctx->signer_queue = ProtectedQueue_new(10);
+
+ ctx->signer_state = SIGNER_INIT;
+ if ((r = pthread_create(&ctx->signer_thread, NULL, signer_thread, ctx))) {
+ report(ctx, "pthread_create: %s", strerror(r));
+ ctx->signer_state = SIGNER_IDLE;
+ return RSGTE_INTERNAL;
+ }
+
+ /* Lock until init. */
+ while(*((volatile int*)&ctx->signer_state) & SIGNER_INIT);
+
+ if (ctx->signer_state != SIGNER_STARTED) {
+ return RSGTE_INTERNAL;
+ }
+ }
+
+ return RSGTE_SUCCESS;
+}
+
+rsksictx
+rsksiCtxNew(void) {
+ rsksictx ctx;
+ ctx = calloc(1, sizeof (struct rsksictx_s));
+ KSI_CTX_new(&ctx->ksi_ctx); // TODO: error check (probably via a generic macro?)
+ ctx->hasher = NULL;
+ ctx->hashAlg = KSI_getHashAlgorithmByName("default");
+ ctx->blockTimeLimit = 0;
+ ctx->bKeepTreeHashes = false;
+ ctx->bKeepRecordHashes = true;
+ ctx->max_requests = (1 << 8);
+ ctx->blockSigTimeout = 10;
+ ctx->confInterval = 3600;
+ ctx->tConfRequested = 0;
+ ctx->threadSleepms = 1000;
+ ctx->errFunc = NULL;
+ ctx->usrptr = NULL;
+ ctx->fileUID = -1;
+ ctx->fileGID = -1;
+ ctx->dirUID = -1;
+ ctx->dirGID = -1;
+ ctx->fCreateMode = 0644;
+ ctx->fDirCreateMode = 0700;
+#if KSI_SDK_VER_MAJOR == 3 && KSI_SDK_VER_MINOR < 22
+ ctx->roundCount = 0;
+ ctx->bRoundLock = 0;
+#endif
+ ctx->syncMode = LOGSIG_SYNCHRONOUS;
+ ctx->signer_state = SIGNER_IDLE;
+ ctx->disabled = false;
+ ctx->ksi = NULL;
+
+ /*if (pthread_mutex_init(&ctx->module_lock, 0))
+ report(ctx, "pthread_mutex_init: %s", strerror(errno));
+ ctx->signer_queue = ProtectedQueue_new(10);*/
+
+ /* Creating a thread this way works only in daemon mode but not when being run
+ interactively when not forked */
+ /*ret = pthread_atfork(NULL, NULL, create_signer_thread);
+ if (ret != 0)
+ report(ctx, "pthread_atfork error: %s", strerror(ret));*/
+
+ return ctx;
+}
+
+static
+int rsksiStreamLogger(void *logCtx, int logLevel, const char *message)
+{
+ char time_buf[32];
+ struct tm *tm_info;
+ time_t timer;
+ FILE *f = (FILE *)logCtx;
+
+ timer = time(NULL);
+
+ tm_info = localtime(&timer);
+ if (tm_info == NULL) {
+ return KSI_UNKNOWN_ERROR;
+ }
+
+ if (f != NULL) {
+ flockfile(f); /* for thread safety */
+ if (strftime(time_buf, sizeof(time_buf), "%d.%m.%Y %H:%M:%S", tm_info)) {
+ if (fprintf(f, "%s [%s] %lu - %s\n", level2str(logLevel),
+ time_buf, pthread_self(), message) > 0) { }
+ }
+ funlockfile(f);
+ }
+
+ return KSI_OK;
+}
+
+int
+rsksiInitModule(rsksictx ctx) {
+ int res = 0;
+
+ if(ctx->debugFileName != NULL) {
+ ctx->debugFile = fopen(ctx->debugFileName, "w");
+ if(ctx->debugFile) {
+ res = KSI_CTX_setLoggerCallback(ctx->ksi_ctx, rsksiStreamLogger, ctx->debugFile);
+ if (res != KSI_OK)
+ reportKSIAPIErr(ctx, NULL, "Unable to set logger callback", res);
+ res = KSI_CTX_setLogLevel(ctx->ksi_ctx, ctx->debugLevel);
+ if (res != KSI_OK)
+ reportKSIAPIErr(ctx, NULL, "Unable to set log level", res);
+ }
+ else {
+ report(ctx, "Could not open logfile %s: %s", ctx->debugFileName, strerror(errno));
+ }
+ }
+
+ KSI_CTX_setOption(ctx->ksi_ctx, KSI_OPT_AGGR_HMAC_ALGORITHM, (void*)((size_t)ctx->hmacAlg));
+
+ return create_signer_thread(ctx);
+}
+
+/* either returns ksifile object or NULL if something went wrong */
+ksifile
+rsksiCtxOpenFile(rsksictx ctx, unsigned char *logfn)
+{
+ int ret = RSGTE_INTERNAL;
+ ksifile ksi;
+ char fn[MAXFNAME+1];
+
+ if (ctx->disabled)
+ return NULL;
+
+ pthread_mutex_lock(&ctx->module_lock);
+
+ /* The thread cannot be be created in rsksiCtxNew because in daemon mode the
+ process forks after rsksiCtxNew and the thread disappears */
+ if (ctx->signer_state != SIGNER_STARTED) {
+ ret = rsksiInitModule(ctx);
+ if (ret != RSGTE_SUCCESS) {
+ report(ctx, "Unable to init. KSI module, signing service disabled");
+ ctx->disabled = true;
+ pthread_mutex_unlock(&ctx->module_lock);
+ return NULL;
+ }
+ }
+
+ if ((ksi = rsksifileConstruct(ctx)) == NULL)
+ goto done;
+
+ snprintf(fn, sizeof (fn), "%s.ksistate", logfn);
+ fn[MAXFNAME] = '\0'; /* be on safe side */
+ ksi->statefilename = (uchar*) strdup(fn);
+
+ if (ctx->syncMode == LOGSIG_ASYNCHRONOUS) {
+ /* filename for blocks of hashes*/
+ snprintf(fn, sizeof (fn), "%s%s", logfn, blockFileSuffix);
+ fn[MAXFNAME] = '\0'; /* be on safe side */
+ ksi->blockfilename = (uchar*) strdup(fn);
+
+ /* filename for KSI signatures*/
+ snprintf(fn, sizeof (fn), "%s%s", logfn, sigFileSuffix);
+ fn[MAXFNAME] = '\0'; /* be on safe side */
+ ksi->ksifilename = (uchar*) strdup(fn);
+ } else if (ctx->syncMode == LOGSIG_SYNCHRONOUS) {
+ snprintf(fn, sizeof (fn), "%s%s", logfn, ls12FileSuffix);
+ fn[MAXFNAME] = '\0'; /* be on safe side */
+ ksi->blockfilename = (uchar*) strdup(fn);
+ }
+
+ if (ksiOpenSigFile(ksi) != 0) {
+ reportErr(ctx, "signature file open failed");
+ /* Free memory */
+ free(ksi);
+ ksi = NULL;
+ }
+
+done:
+ /* Register ksi file in rsksictx for keeping track of block timeouts. */
+ rsksiRegisterKsiFile(ctx, ksi);
+ pthread_mutex_unlock(&ctx->module_lock);
+ return ksi;
+}
+
+
+/* Returns RSGTE_SUCCESS on success, error code otherwise. If algo is unknown or
+ * is not trusted, default hash function is used.
+ */
+int
+rsksiSetHashFunction(rsksictx ctx, char *algName) {
+ if (ctx == NULL || algName == NULL) {
+ return RSGTE_INTERNAL;
+ }
+
+ int r, id = KSI_getHashAlgorithmByName(algName);
+ if (!KSI_isHashAlgorithmSupported(id)) {
+ report(ctx, "Hash function '%s' is not supported - using default", algName);
+ ctx->hashAlg = KSI_getHashAlgorithmByName("default");
+ } else {
+ if(!KSI_isHashAlgorithmTrusted(id)) {
+ report(ctx, "Hash function '%s' is not trusted - using default", algName);
+ ctx->hashAlg = KSI_getHashAlgorithmByName("default");
+ }
+ else
+ ctx->hashAlg = id;
+ }
+
+ if ((r = KSI_DataHasher_open(ctx->ksi_ctx, ctx->hashAlg, &ctx->hasher)) != KSI_OK) {
+ reportKSIAPIErr(ctx, NULL, "KSI_DataHasher_open", r);
+ ctx->disabled = true;
+ return r;
+ }
+
+ return RSGTE_SUCCESS;
+}
+
+int
+rsksiSetHmacFunction(rsksictx ctx, char *algName) {
+ int id = KSI_getHashAlgorithmByName(algName);
+ if (!KSI_isHashAlgorithmSupported(id)) {
+ report(ctx, "HMAC function '%s' is not supported - using default", algName);
+ ctx->hmacAlg = KSI_getHashAlgorithmByName("default");
+ } else {
+ if(!KSI_isHashAlgorithmTrusted(id)) {
+ report(ctx, "HMAC function '%s' is not trusted - using default", algName);
+ ctx->hmacAlg = KSI_getHashAlgorithmByName("default");
+ }
+ else
+ ctx->hmacAlg = id;
+ }
+ return 0;
+}
+
+int
+rsksifileDestruct(ksifile ksi) {
+ int r = 0;
+ rsksictx ctx = NULL;
+ if (ksi == NULL)
+ return RSGTE_INTERNAL;
+
+ pthread_mutex_lock(&ksi->ctx->module_lock);
+
+ ctx = ksi->ctx;
+
+ /* Deregister ksifile so it is not used by signer thread anymore. Note that files are not closed yet! */
+ rsksiDeregisterKsiFile(ctx, ksi);
+
+ if (!ksi->disabled && ksi->bInBlk) {
+ sigblkAddMetadata(ksi, blockCloseReason, "Block closed due to file closure.");
+ r = sigblkFinishKSI(ksi);
+ }
+ /* Note that block file is closed immediately but signature file will be closed
+ * by the signer thread scheduled by signer thread work queue.
+ */
+ if(!ksi->disabled)
+ r = ksiCloseSigFile(ksi);
+ free(ksi->blockfilename);
+ free(ksi->statefilename);
+ free(ksi->ksifilename);
+
+ free(ksi);
+
+ pthread_mutex_unlock(&ctx->module_lock);
+ return r;
+}
+
+/* This can only be used when signer thread has terminated or within the thread. */
+static void
+rsksifileForceFree(ksifile ksi) {
+ if (ksi == NULL) return;
+
+ if (ksi->sigFile != NULL) fclose(ksi->sigFile);
+ if (ksi->blockFile != NULL) fclose(ksi->blockFile);
+ free(ksi->blockfilename);
+ free(ksi->statefilename);
+ free(ksi->ksifilename);
+ free(ksi);
+ return;
+}
+
+/* This can only be used when signer thread has terminated or within the thread. */
+static void
+rsksictxForceFreeSignatures(rsksictx ctx) {
+ size_t i = 0;
+
+ if (ctx == NULL || ctx->ksi == NULL) return;
+
+ for (i = 0; i < ctx->ksiCount; i++) {
+ if (ctx->ksi[i] != NULL) {
+ rsksifileForceFree(ctx->ksi[i]);
+ ctx->ksi[i] = NULL;
+ }
+ }
+
+ ctx->ksiCount = 0;
+ return;
+}
+
+/* This can only be used when signer thread has terminated or within the thread. */
+static int
+rsksictxForceCloseWithoutSig(rsksictx ctx, const char *reason) {
+ size_t i = 0;
+ if (ctx == NULL || ctx->ksi == NULL) return RSGTE_INTERNAL;
+ for (i = 0; i < ctx->ksiCount; i++) {
+ if (ctx->ksi[i] != NULL) {
+ int ret = RSGTE_INTERNAL;
+
+ /* Only if block contains records, create metadata, close the block and add
+ * no signature marker. Closing block without record will produce redundant
+ * blocks that needs to be signed afterward.
+ */
+ if (ctx->ksi[i]->nRecords > 0) {
+ ret = sigblkFinishKSINoSignature(ctx->ksi[i], reason);
+ if (ret != RSGTE_SUCCESS) return ret;
+ }
+
+ /* Free files and remove object from the list. */
+ rsksifileForceFree(ctx->ksi[i]);
+ ctx->ksi[i] = NULL;
+ }
+ }
+
+ ctx->ksiCount = 0;
+ return RSGTE_SUCCESS;
+}
+
+void
+rsksiCtxDel(rsksictx ctx) {
+ if (ctx == NULL)
+ return;
+
+ /* Note that even in sync. mode signer thread is created and needs to be closed
+ * correctly.
+ */
+ if (ctx->signer_state == SIGNER_STARTED) {
+ queueAddQuit(ctx);
+ /* Wait until thread closes to be able to safely free the resources. */
+ pthread_join(ctx->signer_thread, NULL);
+ ProtectedQueue_free(ctx->signer_queue);
+ pthread_mutex_destroy(&ctx->module_lock);
+ }
+
+ free(ctx->aggregatorUri);
+ free(ctx->aggregatorId);
+ free(ctx->aggregatorKey);
+ free(ctx->debugFileName);
+
+ if (ctx->random_source)
+ free(ctx->random_source);
+
+ KSI_DataHasher_free(ctx->hasher);
+ KSI_CTX_free(ctx->ksi_ctx);
+
+ if(ctx->debugFile!=NULL)
+ fclose(ctx->debugFile);
+
+ /* After signer thread is terminated there should be no open signature files,
+ * but to be extra sure that all files are closed, recheck the list of opened
+ * signature files.
+ */
+ rsksictxForceFreeSignatures(ctx);
+ free(ctx->ksi);
+
+ free(ctx);
+}
+
+/* new sigblk is initialized, but maybe in existing ctx */
+void
+sigblkInitKSI(ksifile ksi)
+{
+ if(ksi == NULL) goto done;
+ seedIVKSI(ksi);
+ memset(ksi->roots, 0, sizeof (ksi->roots));
+ ksi->nRoots = 0;
+ ksi->nRecords = 0;
+ ksi->bInBlk = 1;
+ ksi->blockStarted = time(NULL); //TODO: maybe milli/nanoseconds should be used
+ ksi->blockSizeLimit = 1 << (ksi->ctx->effectiveBlockLevelLimit - 1);
+
+ /* flush the optional debug file when starting a new block */
+ if(ksi->ctx->debugFile != NULL)
+ fflush(ksi->ctx->debugFile);
+
+done:
+ return;
+}
+
+int
+sigblkCreateMask(ksifile ksi, KSI_DataHash **m) {
+ int r = 0;
+
+ CHKr(KSI_DataHasher_reset(ksi->ctx->hasher));
+ CHKr(KSI_DataHasher_add(ksi->ctx->hasher, ksi->lastLeaf, KSI_getHashLength(ksi->lastLeaf[0]) + 1));
+ CHKr(KSI_DataHasher_add(ksi->ctx->hasher, ksi->IV, KSI_getHashLength(ksi->hashAlg)));
+ CHKr(KSI_DataHasher_close(ksi->ctx->hasher, m));
+
+done:
+ if (r != KSI_OK) {
+ reportKSIAPIErr(ksi->ctx, ksi, "KSI_DataHasher", r);
+ r = RSGTE_HASH_CREATE;
+ }
+ return r;
+}
+int
+sigblkCreateHash(ksifile ksi, KSI_DataHash **out, const uchar *rec, const size_t len) {
+ int r = 0;
+
+ CHKr(KSI_DataHasher_reset(ksi->ctx->hasher));
+ CHKr(KSI_DataHasher_add(ksi->ctx->hasher, rec, len));
+ CHKr(KSI_DataHasher_close(ksi->ctx->hasher, out));
+
+done:
+ if (r != KSI_OK) {
+ reportKSIAPIErr(ksi->ctx, ksi, "KSI_DataHasher", r);
+ r = RSGTE_HASH_CREATE;
+ }
+
+ return r;
+}
+
+
+int
+sigblkHashTwoNodes(ksifile ksi, KSI_DataHash **out, KSI_DataHash *left, KSI_DataHash *right,
+ uint8_t level) {
+ int r = 0;
+
+ CHKr(KSI_DataHasher_reset(ksi->ctx->hasher));
+ CHKr(KSI_DataHasher_addImprint(ksi->ctx->hasher, left));
+ CHKr(KSI_DataHasher_addImprint(ksi->ctx->hasher, right));
+ CHKr(KSI_DataHasher_add(ksi->ctx->hasher, &level, 1));
+ CHKr(KSI_DataHasher_close(ksi->ctx->hasher, out));
+
+done:
+ if (r != KSI_OK) {
+ reportKSIAPIErr(ksi->ctx, ksi, "KSI_DataHash_create", r);
+ r = RSGTE_HASH_CREATE;
+ }
+
+ return r;
+}
+int
+sigblkAddMetadata(ksifile ksi, const char *key, const char *value) {
+ unsigned char buffer[0xFFFF];
+ size_t encoded_size = 0;
+ int ret = 0;
+
+ tlvCreateMetadata(ksi, ksi->nRecords, key, value, buffer, &encoded_size);
+ sigblkAddLeaf(ksi, buffer, encoded_size, true);
+
+ return ret;
+}
+
+int
+sigblkAddRecordKSI(ksifile ksi, const uchar *rec, const size_t len) {
+ int ret = 0;
+ if (ksi == NULL || ksi->disabled)
+ return 0;
+
+ pthread_mutex_lock(&ksi->ctx->module_lock);
+
+ if ((ret = sigblkAddLeaf(ksi, rec, len, false)) != 0)
+ goto done;
+
+ if (ksi->nRecords == ksi->blockSizeLimit) {
+ sigblkFinishKSI(ksi);
+ sigblkInitKSI(ksi);
+ }
+
+done:
+ pthread_mutex_unlock(&ksi->ctx->module_lock);
+ return ret;
+}
+
+
+int
+sigblkAddLeaf(ksifile ksi, const uchar *leafData, const size_t leafLength, bool metadata) {
+
+ KSI_DataHash *mask, *leafHash, *treeNode, *tmpTreeNode;
+ uint8_t j;
+ const unsigned char *pTmp;
+ size_t len;
+
+ int r = 0;
+
+ if (ksi == NULL || ksi->disabled) goto done;
+ CHKr(sigblkCreateMask(ksi, &mask));
+ CHKr(sigblkCreateHash(ksi, &leafHash, leafData, leafLength));
+
+ if(ksi->nRecords == 0)
+ tlvWriteBlockHdrKSI(ksi);
+
+ /* metadata record has to be written into the block file too*/
+ if (metadata)
+ tlvWriteOctetString(ksi->blockFile, leafData, leafLength);
+
+ if (ksi->bKeepRecordHashes)
+ tlvWriteHashKSI(ksi, 0x0902, leafHash);
+
+ /* normal leaf and metadata record are hashed in different order */
+ if (!metadata) { /* hash leaf */
+ if ((r = sigblkHashTwoNodes(ksi, &treeNode, mask, leafHash, 1)) != 0) goto done;
+ } else {
+ if ((r = sigblkHashTwoNodes(ksi, &treeNode, leafHash, mask, 1)) != 0) goto done;
+ }
+
+ /* persists x here if Merkle tree needs to be persisted! */
+ if(ksi->bKeepTreeHashes)
+ tlvWriteHashKSI(ksi, 0x0903, treeNode);
+
+ KSI_DataHash_getImprint(treeNode, &pTmp, &len);
+ memcpy(ksi->lastLeaf, pTmp, len);
+
+ for(j = 0 ; j < ksi->nRoots ; ++j) {
+ if (ksi->roots[j] == NULL) {
+ ksi->roots[j] = treeNode;
+ treeNode = NULL;
+ break;
+ } else if (treeNode != NULL) {
+ /* hash interim node */
+ tmpTreeNode = treeNode;
+ r = sigblkHashTwoNodes(ksi, &treeNode, ksi->roots[j], tmpTreeNode, j + 2);
+ KSI_DataHash_free(ksi->roots[j]);
+ ksi->roots[j] = NULL;
+ KSI_DataHash_free(tmpTreeNode);
+ if (r != 0) goto done;
+ if(ksi->bKeepTreeHashes)
+ tlvWriteHashKSI(ksi, 0x0903, treeNode);
+ }
+ }
+ if (treeNode != NULL) {
+ /* new level, append "at the top" */
+ ksi->roots[ksi->nRoots] = treeNode;
+ ++ksi->nRoots;
+ assert(ksi->nRoots < MAX_ROOTS);
+ treeNode = NULL;
+ }
+ ++ksi->nRecords;
+
+ /* cleanup (x is cleared as part of the roots array) */
+ KSI_DataHash_free(mask);
+ KSI_DataHash_free(leafHash);
+
+done:
+ return r;
+}
+
+static int
+sigblkCheckTimeOut(rsksictx ctx) {
+ int ret = RSGTE_INTERNAL;
+ time_t now;
+ char buf[KSI_BUF_SIZE];
+ size_t i = 0;
+
+ if (ctx == NULL) {
+ return RSGTE_INTERNAL;
+ }
+
+ pthread_mutex_lock(&ctx->module_lock);
+
+ if (ctx->ksi == NULL || ctx->disabled || !ctx->blockTimeLimit) {
+ ret = RSGTE_SUCCESS;
+ goto done;
+ }
+
+ now = time(NULL);
+
+ for (i = 0; i < ctx->ksiCount; i++) {
+ ksifile ksi = ctx->ksi[i];
+
+ if (ksi == NULL) continue; /* To avoide unexpected crash. */
+ if (!ksi->bInBlk) continue; /* Not inside a block, nothing to close nor sign. */
+ if ((time_t) (ksi->blockStarted + ctx->blockTimeLimit) > now) continue;
+
+ snprintf(buf, KSI_BUF_SIZE, "Block closed due to reaching time limit %d", ctx->blockTimeLimit);
+ sigblkAddMetadata(ksi, blockCloseReason, buf);
+ sigblkFinishKSI(ksi);
+ sigblkInitKSI(ksi);
+ }
+
+done:
+ pthread_mutex_unlock(&ctx->module_lock);
+ return ret;
+}
+
+
+static int
+sigblkSign(ksifile ksi, KSI_DataHash *hash, int level)
+{
+ unsigned char *der = NULL;
+ size_t lenDer = 0;
+ int r = KSI_OK;
+ int ret = 0;
+ KSI_Signature *sig = NULL;
+
+ /* Sign the root hash. */
+ r = KSI_Signature_signAggregated(ksi->ctx->ksi_ctx, hash, level, &sig);
+ if (r != KSI_OK) {
+ reportKSIAPIErr(ksi->ctx, ksi, "KSI_Signature_createAggregated", r);
+ ret = 1;
+ goto signing_done;
+ }
+
+ /* Serialize Signature. */
+ r = KSI_Signature_serialize(sig, &der, &lenDer);
+ if (r != KSI_OK) {
+ reportKSIAPIErr(ksi->ctx, ksi, "KSI_Signature_serialize", r);
+ ret = 1;
+ lenDer = 0;
+ goto signing_done;
+ }
+
+signing_done:
+ /* if signing failed the signature will be written as zero size */
+ if (r == KSI_OK) {
+ r = tlvWriteKSISigLS12(ksi->blockFile, ksi->nRecords, der, lenDer);
+ if (r != KSI_OK) {
+ reportKSIAPIErr(ksi->ctx, ksi, "tlvWriteKSISigLS12", r);
+ ret = 1;
+ }
+ } else
+ r = tlvWriteNoSigLS12(ksi->blockFile, ksi->nRecords, hash, KSI_getErrorString(r));
+
+ if (r != KSI_OK) {
+ reportKSIAPIErr(ksi->ctx, ksi, "tlvWriteBlockSigKSI", r);
+ ret = 1;
+ }
+
+ if (sig != NULL)
+ KSI_Signature_free(sig);
+ if (der != NULL)
+ KSI_free(der);
+ return ret;
+}
+
+unsigned
+sigblkCalcLevel(unsigned leaves) {
+ unsigned level = 0;
+ unsigned c = leaves;
+ while (c > 1) {
+ level++;
+ c >>= 1;
+ }
+
+ if (1 << level < (int)leaves)
+ level++;
+
+ return level;
+}
+
+static int
+sigblkFinishTree(ksifile ksi, KSI_DataHash **hsh) {
+ int ret = RSGTE_INTERNAL;
+ KSI_DataHash *root = NULL;
+ KSI_DataHash *rootDel = NULL;
+ int8_t j = 0;
+
+ if (ksi == NULL || hsh == NULL) {
+ goto done;
+ }
+
+ if (ksi->nRecords == 0) {
+ ret = RSGTE_SUCCESS;
+ goto done;
+ }
+
+ root = NULL;
+ for(j = 0 ; j < ksi->nRoots ; ++j) {
+ if(root == NULL) {
+ root = ksi->roots[j];
+ ksi->roots[j] = NULL;
+ } else if (ksi->roots[j] != NULL) {
+ rootDel = root;
+ root = NULL;
+ ret = sigblkHashTwoNodes(ksi, &root, ksi->roots[j], rootDel, j + 2);
+ KSI_DataHash_free(ksi->roots[j]);
+ ksi->roots[j] = NULL;
+ KSI_DataHash_free(rootDel);
+ rootDel = NULL;
+ if(ksi->bKeepTreeHashes) {
+ tlvWriteHashKSI(ksi, 0x0903, root);
+ }
+ if(ret != KSI_OK) goto done; /* checks sigblkHashTwoNodes() result! */
+ }
+ }
+
+ *hsh = root;
+ root = NULL;
+ ret = RSGTE_SUCCESS;
+
+done:
+ KSI_DataHash_free(root);
+ KSI_DataHash_free(rootDel);
+ return ret;
+}
+
+
+int
+sigblkFinishKSI(ksifile ksi)
+{
+ KSI_DataHash *root = NULL;
+ int ret = RSGTE_INTERNAL;
+ unsigned level = 0;
+
+ if (ksi == NULL) {
+ goto done;
+ }
+
+ if (ksi->nRecords == 0) {
+ ret = RSGTE_SUCCESS;
+ goto done;
+ }
+
+ ret = sigblkFinishTree(ksi, &root);
+ if (ret != RSGTE_SUCCESS) goto done;
+
+ //Multiplying leaves count by 2 to account for blinding masks
+ level=sigblkCalcLevel(2 * ksi->nRecords);
+
+ //in case of async mode we append the root hash to signer queue
+ if (ksi->ctx->syncMode == LOGSIG_ASYNCHRONOUS) {
+ ret = tlvWriteNoSigLS12(ksi->blockFile, ksi->nRecords, root, NULL);
+ if (ret != KSI_OK) {
+ reportKSIAPIErr(ksi->ctx, ksi, "tlvWriteNoSigLS12", ret);
+ goto done;
+ }
+
+ queueAddSignRequest(ksi->ctx, ksi, root, level);
+ root = NULL;
+ } else {
+ sigblkSign(ksi, root, level);
+ }
+
+ ret = RSGTE_SUCCESS;
+
+done:
+ KSI_DataHash_free(root);
+ free(ksi->IV);
+ ksi->IV = NULL;
+ ksi->bInBlk = 0;
+ return ret;
+}
+
+static int
+sigblkFinishKSINoSignature(ksifile ksi, const char *reason)
+{
+ KSI_DataHash *root = NULL;
+ int ret = RSGTE_INTERNAL;
+
+ if (ksi == NULL || ksi->ctx == NULL ||
+ (ksi->ctx->syncMode == LOGSIG_ASYNCHRONOUS && ksi->sigFile == NULL) ||
+ ksi->blockFile == NULL || reason == NULL) {
+ goto done;
+ }
+
+ ret = sigblkAddMetadata(ksi, blockCloseReason, reason);
+ if (ret != RSGTE_SUCCESS) goto done;
+
+ ret = sigblkFinishTree(ksi, &root);
+ if (ret != RSGTE_SUCCESS) goto done;
+
+ ret = tlvWriteNoSigLS12(ksi->blockFile, ksi->nRecords, root, reason);
+ if (ret != KSI_OK) {
+ reportKSIAPIErr(ksi->ctx, ksi, "tlvWriteNoSigLS12", ret);
+ goto done;
+ }
+
+ if (ksi->ctx->syncMode == LOGSIG_ASYNCHRONOUS) {
+ ret = tlvWriteNoSigLS12(ksi->sigFile, ksi->nRecords, root, reason);
+ if (ret != KSI_OK) {
+ reportKSIAPIErr(ksi->ctx, ksi, "tlvWriteNoSigLS12", ret);
+ goto done;
+ }
+ }
+
+ ret = RSGTE_SUCCESS;
+
+done:
+ KSI_DataHash_free(root);
+ free(ksi->IV);
+ ksi->IV=NULL;
+ ksi->bInBlk = 0;
+ return ret;
+}
+
+int
+rsksiSetAggregator(rsksictx ctx, char *uri, char *loginid, char *key) {
+ int r;
+ char *strTmp, *strTmpUri;
+
+ /* only use the strings if they are not empty */
+ ctx->aggregatorUri = (uri != NULL && strlen(uri) != 0) ? strdup(uri) : NULL;
+ ctx->aggregatorId = (loginid != NULL && strlen(loginid) != 0) ? strdup(loginid) : NULL;
+ ctx->aggregatorKey = (key != NULL && strlen(key) != 0) ? strdup(key) : NULL;
+
+ /* split the URI string up for possible HA endpoints */
+ strTmp = ctx->aggregatorUri;
+ while((strTmpUri = strsep(&strTmp, "|") ) != NULL) {
+ if(ctx->aggregatorEndpointCount >= KSI_CTX_HA_MAX_SUBSERVICES) {
+ report(ctx, "Maximum number (%d) of service endoints reached, ignoring endpoint: %s",
+ KSI_CTX_HA_MAX_SUBSERVICES, strTmpUri);
+ }
+ else {
+ ctx->aggregatorEndpoints[ctx->aggregatorEndpointCount] = strTmpUri;
+ ctx->aggregatorEndpointCount++;
+ }
+ }
+
+ r = KSI_CTX_setAggregator(ctx->ksi_ctx, ctx->aggregatorUri, ctx->aggregatorId, ctx->aggregatorKey);
+ if(r != KSI_OK) {
+ ctx->disabled = true;
+ reportKSIAPIErr(ctx, NULL, "KSI_CTX_setAggregator", r);
+ return KSI_INVALID_ARGUMENT;
+ }
+
+ return r;
+}
+
+
+int
+rsksiSetDebugFile(rsksictx ctx, char *val) {
+ if(!val)
+ return KSI_INVALID_ARGUMENT;
+
+ ctx->debugFileName=strdup(val);
+ return KSI_OK;
+}
+
+static bool
+add_queue_item(rsksictx ctx, QITEM_type type, KSI_DataHash *root, FILE *sigFile, uint64_t intarg1, uint64_t intarg2) {
+ QueueItem *qi = (QueueItem*) malloc(sizeof (QueueItem));
+ if (!qi) {
+ ctx->disabled = true;
+ return false;
+ }
+
+ qi->root = root;
+ qi->file = sigFile;
+
+ qi->type = type;
+ qi->status = QITEM_WAITING;
+ qi->intarg1 = intarg1;
+ qi->intarg2 = intarg2;
+ qi->respHandle = NULL;
+ qi->ksi_status = KSI_UNKNOWN_ERROR;
+ qi->request_time = time(NULL);
+ if (ProtectedQueue_addItem(ctx->signer_queue, qi) == false) {
+ ctx->disabled = true;
+ free(qi);
+ return false;
+ }
+ return true;
+}
+
+static bool
+queueAddCloseFile(rsksictx ctx, ksifile ksi) {
+ return add_queue_item(ctx, QITEM_CLOSE_FILE, NULL, ksi->sigFile, 0, 0);
+}
+
+static bool
+queueAddNewFile(rsksictx ctx, ksifile ksi) {
+ return add_queue_item(ctx, QITEM_NEW_FILE, NULL, ksi->sigFile, time(NULL) + ctx->blockTimeLimit, 0);
+}
+
+static bool
+queueAddQuit(rsksictx ctx) {
+ return add_queue_item(ctx, QITEM_QUIT, NULL, NULL, 0, 0);
+}
+
+static bool
+queueAddSignRequest(rsksictx ctx, ksifile ksi, KSI_DataHash *root, unsigned level) {
+ return add_queue_item(ctx, QITEM_SIGNATURE_REQUEST, root, ksi->sigFile, ksi->nRecords, level);
+}
+
+static bool
+save_response(rsksictx ctx, FILE* outfile, QueueItem *item) {
+ bool ret = false;
+ KSI_Signature *sig = NULL;
+ unsigned char *raw = NULL;
+ size_t raw_len;
+ int res = KSI_OK;
+
+ if(item->respHandle != NULL && item->ksi_status == KSI_OK) {
+ CHECK_KSI_API(KSI_AsyncHandle_getSignature(item->respHandle, &sig), ctx,
+ "KSI_AsyncHandle_getSignature");
+ CHECK_KSI_API(KSI_Signature_serialize(sig, &raw, &raw_len), ctx,
+ "KSI_Signature_serialize");
+ tlvWriteKSISigLS12(outfile, item->intarg1, raw, raw_len);
+ KSI_free(raw);
+ }
+ else {
+ tlvWriteNoSigLS12(outfile, item->intarg1, item->root, KSI_getErrorString(item->ksi_status));
+ }
+ ret = true;
+
+cleanup:
+ if(res != KSI_OK)
+ tlvWriteNoSigLS12(outfile, item->intarg1, item->root, KSI_getErrorString(res));
+
+ KSI_Signature_free(sig);
+
+ return ret;
+}
+
+static KSI_DataHash* clone_hash(KSI_CTX *ksi_ctx, const KSI_DataHash* hash) {
+ int res = KSI_UNKNOWN_ERROR;
+ const unsigned char *imprint = NULL;
+ size_t imprint_len = 0;
+ KSI_DataHash* tmp = NULL;
+
+ if (hash == NULL) return NULL;
+ res = KSI_DataHash_getImprint(hash, &imprint, &imprint_len);
+ if (res != KSI_OK) return NULL;
+ res = KSI_DataHash_fromImprint(ksi_ctx, imprint, imprint_len, &tmp);
+ if (res != KSI_OK) return NULL;
+
+ return tmp;
+}
+
+static bool
+process_requests_async(rsksictx ctx, KSI_CTX *ksi_ctx, KSI_AsyncService *as) {
+ bool ret = false;
+ QueueItem *item = NULL;
+ int res = KSI_OK, tmpRes;
+ KSI_AsyncHandle *reqHandle = NULL;
+ KSI_AsyncHandle *respHandle = NULL;
+ KSI_DataHash *clonedHash = NULL;
+ KSI_AggregationReq *req = NULL;
+ KSI_Config *config = NULL;
+ KSI_Integer *level;
+ long extError;
+ KSI_Utf8String *errorMsg;
+ int state, ksi_status;
+ unsigned i;
+ size_t p;
+
+ KSI_AsyncService_getPendingCount(as, &p);
+
+ /* Check if there are pending/available responses and associate them with the request items */
+ while(true) {
+ respHandle = NULL;
+ item = NULL;
+ tmpRes=KSI_AsyncService_run(as, &respHandle, &p);
+ if(tmpRes!=KSI_OK)
+ reportKSIAPIErr(ctx, NULL, "KSI_AsyncService_run", tmpRes);
+
+ if (respHandle == NULL) { /* nothing received */
+ break;
+ }
+
+#if KSI_SDK_VER_MAJOR == 3 && KSI_SDK_VER_MINOR < 22
+ if (p != 0 && ctx->roundCount > 0) {
+ ctx->roundCount--;
+ } else {
+ ctx->bRoundLock = 0;
+ ctx->roundCount = 0;
+ }
+#endif
+ state = KSI_ASYNC_STATE_UNDEFINED;
+
+ CHECK_KSI_API(KSI_AsyncHandle_getState(respHandle, &state), ctx, "KSI_AsyncHandle_getState");
+
+ if(state == KSI_ASYNC_STATE_PUSH_CONFIG_RECEIVED) {
+ res = KSI_AsyncHandle_getConfig(respHandle, &config);
+ if(res == KSI_OK) {
+ handle_ksi_config(ctx, as, config);
+ KSI_AsyncHandle_free(respHandle);
+ } else
+ reportKSIAPIErr(ctx, NULL, "KSI_AsyncHandle_getConfig", res);
+ }
+ else if(state == KSI_ASYNC_STATE_RESPONSE_RECEIVED) {
+ CHECK_KSI_API(KSI_AsyncHandle_getRequestCtx(respHandle, (const void**)&item), ctx,
+ "KSI_AsyncHandle_getRequestCtx");
+ item->respHandle = respHandle;
+ item->ksi_status = KSI_OK;
+ }
+ else if(state == KSI_ASYNC_STATE_ERROR) {
+ CHECK_KSI_API(KSI_AsyncHandle_getRequestCtx(respHandle, (const void**)&item), ctx,
+ "KSI_AsyncHandle_getRequestCtx");
+ errorMsg = NULL;
+ KSI_AsyncHandle_getError(respHandle, &ksi_status);
+ KSI_AsyncHandle_getExtError(respHandle, &extError);
+ KSI_AsyncHandle_getErrorMessage(respHandle, &errorMsg);
+ report(ctx, "Asynchronous request returned error %s (%d), %lu %s",
+ KSI_getErrorString(ksi_status), ksi_status, extError,
+ errorMsg ? KSI_Utf8String_cstr(errorMsg) : "");
+ KSI_AsyncHandle_free(respHandle);
+
+ if(item)
+ item->ksi_status = ksi_status;
+ }
+
+ if(item)
+ item->status = QITEM_DONE;
+ }
+
+ KSI_AsyncService_getPendingCount(as, &p);
+
+ /* Send all the new requests in the back of the queue to the server */
+ for(i = 0; i < ProtectedQueue_count(ctx->signer_queue); i++) {
+ item = NULL;
+ if(!ProtectedQueue_getItem(ctx->signer_queue, i, (void**)&item) || !item)
+ continue;
+ /* ingore non request queue items */
+ if(item->type != QITEM_SIGNATURE_REQUEST)
+ continue;
+
+ /* stop at first processed item */
+ if(item->status != QITEM_WAITING)
+ continue;
+
+ /* Due to a bug in libksi it is possible that async signer may send out
+ * more signing requests than permitted by the gateway. Workaround is to
+ * keep track of signing requests here.
+ */
+#if KSI_SDK_VER_MAJOR == 3 && KSI_SDK_VER_MINOR < 22
+ if (ctx->roundCount >= ctx->max_requests) ctx->bRoundLock = 1;
+ if (ctx->bRoundLock) break;
+#endif
+
+
+ /* The data hash is produced in another thread by another KSI_CTX and
+ * libksi internal uses KSI_DataHash cache to reduce the amount of
+ * memory allocations by recycling old objects. Lets clone the hash
+ * value with current KSI_CTX as we can not be sure that this thread is
+ * not affecting the data hash cache operated by another thread.
+ */
+ clonedHash = clone_hash(ksi_ctx, item->root);
+ CHECK_KSI_API(KSI_AggregationReq_new(ksi_ctx, &req), ctx, "KSI_AggregationReq_new");
+ CHECK_KSI_API(KSI_AggregationReq_setRequestHash((KSI_AggregationReq*)req,
+ clonedHash), ctx,
+ "KSI_AggregationReq_setRequestHash");
+ clonedHash = NULL;
+ CHECK_KSI_API(KSI_Integer_new(ksi_ctx, item->intarg2, &level), ctx,
+ "KSI_Integer_new");
+ CHECK_KSI_API(KSI_AggregationReq_setRequestLevel(req, level), ctx,
+ "KSI_AggregationReq_setRequestLevel");
+ CHECK_KSI_API(KSI_AsyncAggregationHandle_new(ksi_ctx, req, &reqHandle), ctx,
+ "KSI_AsyncAggregationHandle_new");
+ CHECK_KSI_API(KSI_AsyncHandle_setRequestCtx(reqHandle, (void*)item, NULL), ctx,
+ "KSI_AsyncRequest_setRequestContext");
+ res = KSI_AsyncService_addRequest(as, reqHandle); /* this can fail because of throttling */
+
+ if (res == KSI_OK) {
+ item->status = QITEM_SENT;
+#if KSI_SDK_VER_MAJOR == 3 && KSI_SDK_VER_MINOR < 22
+ ctx->roundCount++;
+#endif
+ } else {
+ reportKSIAPIErr(ctx, NULL, "KSI_AsyncService_addRequest", res);
+ KSI_AsyncHandle_free(reqHandle);
+ item->status = QITEM_DONE;
+ item->ksi_status = res;
+ break;
+ }
+
+ if (i != 0 && i % ctx->max_requests == 0) {
+ CHECK_KSI_API(KSI_AsyncService_run(as, NULL, NULL), ctx,
+ "KSI_AsyncService_run");
+ }
+ }
+ CHECK_KSI_API(KSI_AsyncService_run(as, NULL, NULL), ctx,
+ "KSI_AsyncService_run");
+
+ /* Save all consequent fulfilled responses in the front of the queue to the signature file */
+ while(ProtectedQueue_count(ctx->signer_queue)) {
+ item = NULL;
+ if(!ProtectedQueue_getItem(ctx->signer_queue, 0, (void**)&item))
+ break;
+
+ if(!item) {
+ ProtectedQueue_popFront(ctx->signer_queue, (void**) &item);
+ continue;
+ }
+
+ /* stop at first non request queue item (maybe file close/open, quit) */
+ if(item->type!=QITEM_SIGNATURE_REQUEST)
+ break;
+
+ /* stop at first unfinished queue item because the signatures need to be ordered */
+ if(item->status != QITEM_DONE)
+ break;
+
+ ProtectedQueue_popFront(ctx->signer_queue, (void**) &item);
+ save_response(ctx, item->file, item);
+ fflush(item->file);
+ /* the main thread has to be locked when the hash is freed to avoid a race condition */
+ /* TODO: this need more elegant solution, hash should be detached from creation context*/
+ pthread_mutex_lock(&ctx->module_lock);
+ KSI_DataHash_free(item->root);
+ KSI_AsyncHandle_free(item->respHandle);
+ free(item);
+ pthread_mutex_unlock(&ctx->module_lock);
+ }
+
+ ret = true;
+
+cleanup:
+ KSI_DataHash_free(clonedHash);
+ KSI_AsyncService_getPendingCount(as, &p);
+ return ret;
+}
+
+/* This can only be used when signer thread has terminated or within the thread. */
+static bool
+rsksictxCloseAllPendingBlocksWithoutSignature(rsksictx ctx, const char *reason) {
+ bool ret = false;
+ QueueItem *item = NULL;
+ int res = KSI_OK;
+
+ /* Save all consequent fulfilled responses in the front of the queue to the signature file */
+ while(ProtectedQueue_count(ctx->signer_queue)) {
+ item = NULL;
+ ProtectedQueue_popFront(ctx->signer_queue, (void**) &item);
+
+ if(item == NULL) {
+ continue;
+ }
+
+ /* Skip non request queue item. */
+ if(item->type == QITEM_SIGNATURE_REQUEST) {
+ res = tlvWriteNoSigLS12(item->file, item->intarg1, item->root, reason);
+ if (res != KSI_OK) {
+ reportKSIAPIErr(ctx, NULL, "tlvWriteNoSigLS12", res);
+ ret = false;
+ goto cleanup;
+ }
+ fflush(item->file);
+ }
+
+ KSI_DataHash_free(item->root);
+ KSI_AsyncHandle_free(item->respHandle);
+ free(item);
+ }
+
+ ret = true;
+
+cleanup:
+ return ret;
+}
+
+
+static void
+request_async_config(rsksictx ctx, KSI_CTX *ksi_ctx, KSI_AsyncService *as) {
+ KSI_Config *cfg = NULL;
+ KSI_AsyncHandle *cfgHandle = NULL;
+ KSI_AggregationReq *cfgReq = NULL;
+ int res;
+ bool bSuccess = false;
+
+ CHECK_KSI_API(KSI_AggregationReq_new(ksi_ctx, &cfgReq), ctx, "KSI_AggregationReq_new");
+ CHECK_KSI_API(KSI_Config_new(ksi_ctx, &cfg), ctx, "KSI_Config_new");
+ CHECK_KSI_API(KSI_AggregationReq_setConfig(cfgReq, cfg), ctx, "KSI_AggregationReq_setConfig");
+ CHECK_KSI_API(KSI_AsyncAggregationHandle_new(ksi_ctx, cfgReq, &cfgHandle), ctx,
+ "KSI_AsyncAggregationHandle_new");
+ CHECK_KSI_API(KSI_AsyncService_addRequest(as, cfgHandle), ctx, "KSI_AsyncService_addRequest");
+
+ bSuccess = true;
+
+cleanup:
+ if(!bSuccess) {
+ if(cfgHandle)
+ KSI_AsyncHandle_free(cfgHandle);
+ else if(cfgReq)
+ KSI_AggregationReq_free(cfgReq);
+ else if(cfg)
+ KSI_Config_free(cfg);
+ }
+}
+
+#pragma GCC diagnostic push
+#pragma GCC diagnostic ignored "-Wint-to-pointer-cast"
+void *signer_thread(void *arg) {
+ int res = KSI_UNKNOWN_ERROR;
+ rsksictx ctx = (rsksictx) arg;
+ KSI_CTX *ksi_ctx = NULL;
+ KSI_AsyncService *as = NULL;
+ size_t size_t_value = 0;
+ size_t ksiFileCount = 0;
+ int endpoints = 0;
+ bool bSleep = true;
+
+
+ CHECK_KSI_API(KSI_CTX_new(&ksi_ctx), ctx, "KSI_CTX_new");
+ CHECK_KSI_API(KSI_CTX_setAggregator(ksi_ctx,
+ ctx->aggregatorUri, ctx->aggregatorId, ctx->aggregatorKey),
+ ctx, "KSI_CTX_setAggregator");
+
+ if(ctx->debugFile) {
+ res = KSI_CTX_setLoggerCallback(ksi_ctx, rsksiStreamLogger, ctx->debugFile);
+ if (res != KSI_OK)
+ reportKSIAPIErr(ctx, NULL, "Unable to set logger callback", res);
+ res = KSI_CTX_setLogLevel(ksi_ctx, ctx->debugLevel);
+ if (res != KSI_OK)
+ reportKSIAPIErr(ctx, NULL, "Unable to set log level", res);
+ }
+
+ CHECK_KSI_API(KSI_CTX_setOption(ksi_ctx, KSI_OPT_AGGR_HMAC_ALGORITHM, (void*)((size_t)ctx->hmacAlg)),
+ ctx, "KSI_CTX_setOption");
+
+ res = KSI_SigningHighAvailabilityService_new(ksi_ctx, &as);
+ if (res != KSI_OK) {
+ reportKSIAPIErr(ctx, NULL, "KSI_SigningAsyncService_new", res);
+ }
+ else {
+ int i = 0;
+ for (i = 0; i < ctx->aggregatorEndpointCount; i++) {
+ res = KSI_AsyncService_addEndpoint(as,
+ ctx->aggregatorEndpoints[i], ctx->aggregatorId, ctx->aggregatorKey);
+ if (res != KSI_OK) {
+ //This can fail if the protocol is not supported by async api.
+ reportKSIAPIErr(ctx, NULL, "KSI_AsyncService_addEndpoint", res);
+ continue;
+ }
+
+ endpoints++;
+ }
+ }
+
+ if(endpoints == 0) { /* no endpoint accepted, deleting the service */
+ report(ctx, "No endpoints added, signing service disabled");
+ ctx->disabled = true;
+ KSI_AsyncService_free(as);
+ as=NULL;
+ goto cleanup;
+ }
+
+ /* Lets use buffer value, as libksi requires size_t. */
+ size_t_value = ctx->max_requests;
+ KSI_AsyncService_setOption(as, KSI_ASYNC_OPT_REQUEST_CACHE_SIZE,
+ (void*)size_t_value);
+ size_t_value = ctx->blockSigTimeout;
+ KSI_AsyncService_setOption(as, KSI_ASYNC_OPT_SND_TIMEOUT,
+ (void*)size_t_value);
+
+
+ ctx->signer_state = SIGNER_STARTED;
+ while (true) {
+ QueueItem *item = NULL;
+
+ if (isAggrConfNeeded(ctx)) {
+ request_async_config(ctx, ksi_ctx, as);
+ }
+
+ /* Wait for a work item or timeout*/
+ if (bSleep) {
+ ProtectedQueue_waitForItem(ctx->signer_queue, NULL, ctx->threadSleepms);
+ }
+ bSleep = true;
+
+ /* Check for block time limit. */
+ sigblkCheckTimeOut(ctx);
+
+ /* in case there are no items go around*/
+ if (ProtectedQueue_count(ctx->signer_queue) == 0) {
+ process_requests_async(ctx, ksi_ctx, as);
+ continue;
+ }
+
+ /* process signing requests only if there is an open signature file */
+ if(ksiFileCount > 0) {
+ /* check for pending/unsent requests in asynchronous service */
+ if(!process_requests_async(ctx, ksi_ctx, as)) {
+ // probably fatal error, disable signing, error should be already reported
+ ctx->disabled = true;
+ goto cleanup;
+ }
+ }
+ /* if there are sig. requests still in the front, then we have to start over*/
+ if (ProtectedQueue_peekFront(ctx->signer_queue, (void**) &item)
+ && item->type == QITEM_SIGNATURE_REQUEST)
+ continue;
+
+ /* Handle other types of work items */
+ if (ProtectedQueue_popFront(ctx->signer_queue, (void**) &item) != 0) {
+ /* There is no point to sleep after processing non request type item
+ * as there is great possibility that next item can already be
+ * processed. */
+ bSleep = false;
+
+ if (item->type == QITEM_CLOSE_FILE) {
+ if (item->file) {
+ fclose(item->file);
+ item->file = NULL;
+ }
+
+ if (ksiFileCount > 0) ksiFileCount--;
+ } else if (item->type == QITEM_NEW_FILE) {
+ ksiFileCount++;
+ } else if (item->type == QITEM_QUIT) {
+ free(item);
+
+ /* Will look into work queue for pending KSI signatures and will output
+ * unsigned block marker instead of actual KSI signature to finalize this
+ * thread quickly.
+ */
+ rsksictxCloseAllPendingBlocksWithoutSignature(ctx,
+ "Signing not finished due to sudden closure of lmsig_ksi-ls12 module.");
+ rsksictxForceCloseWithoutSig(ctx,
+ "Block closed due to sudden closure of lmsig_ksi-ls12 module.");
+
+ goto cleanup;
+ }
+
+ free(item);
+ }
+ }
+
+cleanup:
+
+ KSI_AsyncService_free(as);
+ KSI_CTX_free(ksi_ctx);
+ ctx->signer_state = SIGNER_STOPPED;
+
+ return NULL;
+}
+#pragma GCC diagnostic push