Merge "Adding a new script to generate mkek and hmac"

This commit is contained in:
Jenkins 2015-06-05 00:07:58 +00:00 committed by Gerrit Code Review
commit 0b56a17d1a
3 changed files with 129 additions and 11 deletions

View File

@ -61,13 +61,12 @@ class P11CryptoPlugin(plugin.CryptoPluginBase):
raise ValueError(u._("library_path is required"))
self.pkcs11 = pkcs11.PKCS11(
library_path=conf.p11_crypto_plugin.library_path,
mkek_label=conf.p11_crypto_plugin.mkek_label,
mkek_length=conf.p11_crypto_plugin.mkek_length,
hmac_label=conf.p11_crypto_plugin.hmac_label,
login_passphrase=conf.p11_crypto_plugin.login,
slot_id=conf.p11_crypto_plugin.slot_id,
ffi=ffi
)
self.pkcs11.cache_mkek_and_hmac(conf.p11_crypto_plugin.mkek_label,
conf.p11_crypto_plugin.hmac_label)
def encrypt(self, encrypt_dto, kek_meta_dto, project_id):
session = self.pkcs11.create_working_session()

View File

@ -311,8 +311,7 @@ class P11CryptoKeyHandleException(exception.BarbicanException):
class PKCS11(object):
def __init__(self, library_path, mkek_label, mkek_length, hmac_label,
login_passphrase, slot_id, ffi=None):
def __init__(self, library_path, login_passphrase, slot_id, ffi=None):
self.ffi = build_ffi() if not ffi else ffi
self.lib = self.ffi.dlopen(library_path)
@ -330,19 +329,19 @@ class PKCS11(object):
session = self.create_working_session()
self.perform_rng_self_test(session)
# Clean up the active session
self.close_session(session)
def cache_mkek_and_hmac(self, mkek_label, hmac_label):
session = self.create_working_session()
self.current_mkek_label = mkek_label
self.current_hmac_label = hmac_label
LOG.debug("Current mkek label: %s", self.current_mkek_label)
LOG.debug("Current hmac label: %s", self.current_hmac_label)
# cache current MKEK handle in the dictionary
self.get_mkek(
self.current_mkek_label,
session
)
self.get_mkek(self.current_mkek_label, session)
self.get_hmac_key(self.current_hmac_label, session)
# Clean up the active session
self.close_session(session)
def perform_rng_self_test(self, session):

120
bin/pkcs11-key-generation Executable file
View File

@ -0,0 +1,120 @@
#!/usr/bin/env python
# Licensed under the Apache License, Version 2.0 (the "License"); you may
# not use this file except in compliance with the License. You may obtain
# a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
# License for the specific language governing permissions and limitations
# under the License.
import argparse
import six
from barbican.plugin.crypto import pkcs11
class KeyGenerator:
def __init__(self, ffi=None):
self.parser = self.get_main_parser()
self.subparsers = self.parser.add_subparsers(
title='subcommands',
description='Action to perform'
)
self.add_mkek_args()
self.add_hmac_args()
self.args = self.parser.parse_args()
if not self.args.passphrase:
password = six.moves.input("Please enter your password: ")
self.pkcs11 = pkcs11.PKCS11(
library_path=self.args.library_path,
login_passphrase=self.args.passphrase or password,
slot_id=int(self.args.slot_id),
ffi=ffi
)
self.session = self.pkcs11.create_working_session()
def get_main_parser(self):
"""Create a top-level parser and arguments."""
parser = argparse.ArgumentParser(
description='Barbican MKEK & HMAC Generator'
)
parser.add_argument(
'--library-path',
default='/usr/lib/libCryptoki2_64.so',
help='Path to vendor PKCS11 library'
)
parser.add_argument(
'--passphrase',
default=None,
help='Password to login to PKCS11 session'
)
parser.add_argument(
'--slot-id',
default=1,
help='HSM Slot id (Should correspond to a configured PKCS11 slot)'
)
return parser
def add_mkek_args(self):
"""Create MKEK generation parser and arguments."""
create_parser = self.subparsers.add_parser('mkek', help='Generates a '
'new MKEK.')
create_parser.add_argument('--length', '-l', default=32,
help='the length of the MKEK')
create_parser.add_argument('--label', '-L', default='primarymkek',
help='the label for the MKEK')
create_parser.set_defaults(func=self.generate_mkek)
def add_hmac_args(self):
"""Create HMAC generation parser and arguments."""
create_parser = self.subparsers.add_parser('hmac', help='Generates a '
'new HMAC.')
create_parser.add_argument('--label', '-L', default='primaryhmac',
help='the label for the HMAC')
create_parser.set_defaults(func=self.generate_hmac)
def verify_label_does_not_exist(self, label, session):
key_handle = self.pkcs11.get_key_handle(label, session)
if key_handle:
print (
"The label {label} already exists! "
"Please try again.".format(label=label)
)
exit(1)
def generate_mkek(self, args):
"""Process the generate MKEK with given arguments"""
self.verify_label_does_not_exist(args.label, self.session)
self.pkcs11.generate_mkek(args.label, args.length, self.session)
print ("MKEK successfully generated!")
def generate_hmac(self, args):
"""Process the generate HMAC with given arguments"""
self.verify_label_does_not_exist(args.label, self.session)
self.pkcs11.generate_hmac_key(args.label, self.session)
print ("HMAC successfully generated!")
def execute(self):
"""Parse the command line arguments."""
try:
self.args.func(self.args)
except Exception as e:
print e
finally:
self.pkcs11.close_session(self.session)
def main():
kg = KeyGenerator()
kg.execute()
if __name__ == '__main__':
main()