9647ab2
#!/bin/sh
9647ab2
#
9647ab2
# This script will initialise token storage of softhsm PKCS11 provider
9647ab2
# in custom location. Is useful to store tokens in non-standard location.
fa1631e
#
fa1631e
# Output can be evaluated from bash, it will prepare it for usage of temporary tokens.
bd6e8b8
# Quotes around eval are mandatory!
fa1631e
# Recommended use:
bd6e8b8
# eval "$(bash setup-named-softhsm.sh -A)"
fa1631e
#
9647ab2
9647ab2
SOFTHSM2_CONF="$1"
9647ab2
TOKENPATH="$2"
9647ab2
GROUPNAME="$3"
9647ab2
# Do not use this script for real keys worth protection
9647ab2
# This is intended for crypto accelerators using PKCS11 interface.
9647ab2
# Uninitialized token would fail any crypto operation.
9647ab2
PIN=1234
fa1631e
SO_PIN=1234
fa1631e
LABEL=rpm
9647ab2
9647ab2
set -e
9647ab2
fa1631e
echo_i()
fa1631e
{
fa1631e
	echo "#" $@
fa1631e
}
fa1631e
fa1631e
random()
fa1631e
{
fa1631e
	if [ -x "$(which openssl 2>/dev/null)" ]; then
fa1631e
		openssl rand -base64 $1
fa1631e
	else
fa1631e
		dd if=/dev/urandom bs=1c count=$1 | base64
fa1631e
	fi
fa1631e
}
fa1631e
fa1631e
usage()
fa1631e
{
fa1631e
	echo "Usage: $0 -A [token directory] [group]"
fa1631e
	echo "   or: $0 <config file> <token directory> [group]"
fa1631e
}
fa1631e
fa1631e
if [ "$SOFTHSM2_CONF" = "-A" -a -z "$TOKENPATH" ]; then
fa1631e
	TOKENPATH=$(mktemp -d /var/tmp/softhsm-XXXXXX)
fa1631e
fi
fa1631e
9647ab2
if [ -z "$SOFTHSM2_CONF" -o -z "$TOKENPATH" ]; then
fa1631e
	usage >&2
9647ab2
	exit 1
9647ab2
fi
9647ab2
fa1631e
if [ "$SOFTHSM2_CONF" = "-A" ]; then
fa1631e
	# Automagic mode instead
fa1631e
	MODE=secure
fa1631e
	SOFTHSM2_CONF="$TOKENPATH/softhsm2.conf"
fa1631e
	PIN_SOURCE="$TOKENPATH/pin"
fa1631e
	SOPIN_SOURCE="$TOKENPATH/so-pin"
fa1631e
	TOKENPATH="$TOKENPATH/tokens"
fa1631e
else
fa1631e
	MODE=legacy
fa1631e
fi
fa1631e
fa1631e
[ -d "$TOKENPATH" ] || mkdir -p "$TOKENPATH"
fa1631e
fa1631e
umask 0022
fa1631e
9647ab2
if ! [ -f "$SOFTHSM2_CONF" ]; then
9647ab2
cat  << SED > "$SOFTHSM2_CONF"
9647ab2
# SoftHSM v2 configuration file
9647ab2
9647ab2
directories.tokendir = ${TOKENPATH}
9647ab2
objectstore.backend = file
9647ab2
9647ab2
# ERROR, WARNING, INFO, DEBUG
9647ab2
log.level = ERROR
9647ab2
9647ab2
# If CKF_REMOVABLE_DEVICE flag should be set
9647ab2
slots.removable = false
9647ab2
SED
9647ab2
else
fa1631e
	echo_i "Config file $SOFTHSM2_CONF already exists" >&2
9647ab2
fi
9647ab2
fa1631e
if [ -n "$PIN_SOURCE" ]; then
fa1631e
	touch "$PIN_SOURCE" "$SOPIN_SOURCE"
fa1631e
	chmod 0600 "$PIN_SOURCE" "$SOPIN_SOURCE"
fa1631e
	if [ -n "$GROUPNAME" ]; then
fa1631e
		chgrp "$GROUPNAME" "$PIN_SOURCE" "$SOPIN_SOURCE"
fa1631e
		chmod g+r "$PIN_SOURCE" "$SOPIN_SOURCE"
fa1631e
	fi
fa1631e
fi
9647ab2
9647ab2
export SOFTHSM2_CONF
9647ab2
9647ab2
if softhsm2-util --show-slots | grep 'Initialized:[[:space:]]*yes' > /dev/null
9647ab2
then
fa1631e
	echo_i "Token in ${TOKENPATH} is already initialized" >&2
fa1631e
fa1631e
	[ -f "$PIN_SOURCE" ] && PIN=$(cat "$PIN_SOURCE")
fa1631e
	[ -f "$SOPIN_SOURCE" ] && SO_PIN=$(cat "$SOPIN_SOURCE")
9647ab2
else
fa1631e
	PIN=$(random 6)
fa1631e
	SO_PIN=$(random 18)
fa1631e
	if [ -n "$PIN_SOURCE" ]; then
fa1631e
		echo -n "$PIN" > "$PIN_SOURCE"
fa1631e
		echo -n "$SO_PIN" > "$SOPIN_SOURCE"
fa1631e
	fi
fa1631e
fa1631e
	echo_i "Initializing tokens to ${TOKENPATH}..."
fa1631e
	softhsm2-util --init-token --free --label "$LABEL" --pin "$PIN" --so-pin "$SO_PIN" | sed -e 's/^/# /'
9647ab2
9647ab2
	if [ -n "$GROUPNAME" ]; then
9647ab2
		chgrp -R -- "$GROUPNAME" "$TOKENPATH"
9647ab2
		chmod -R -- g=rX,o= "$TOKENPATH"
9647ab2
	fi
9647ab2
fi
9647ab2
9647ab2
echo "export SOFTHSM2_CONF=\"$SOFTHSM2_CONF\""
fa1631e
echo "export PIN_SOURCE=\"$PIN_SOURCE\""
fa1631e
echo "export SOPIN_SOURCE=\"$SOPIN_SOURCE\""
fa1631e
# These are intentionaly not exported
fa1631e
echo "PIN=\"$PIN\""
fa1631e
echo "SO_PIN=\"$SO_PIN\""