/* * CDDL HEADER START * * The contents of this file are subject to the terms of the * Common Development and Distribution License, Version 1.0 only * (the "License"). You may not use this file except in compliance * with the License. * * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE * or http://www.opensolaris.org/os/licensing. * See the License for the specific language governing permissions * and limitations under the License. * * When distributing Covered Code, include this CDDL HEADER in each * file and include the License file at usr/src/OPENSOLARIS.LICENSE. * If applicable, add the following below this CDDL HEADER, with the * fields enclosed by brackets "[]" replaced with your own identifying * information: Portions Copyright [yyyy] [name of copyright owner] * * CDDL HEADER END */ /* * Copyright 2004 Sun Microsystems, Inc. All rights reserved. * Use is subject to license terms. */ #pragma ident "%Z%%M% %I% %E% SMI" /* * Convert Algorithm names as strings to PKCS#11 Mech numbers and vice versa. */ #include #include #include #include #include #include /* * The table below is dynamically generated by parsing pkcs11t.h * from the Makefile. */ static const struct { const char *str; CK_MECHANISM_TYPE mech; } mapping[] = { { "CKM_RSA_PKCS_KEY_PAIR_GEN", CKM_RSA_PKCS_KEY_PAIR_GEN }, { "CKM_RSA_PKCS", CKM_RSA_PKCS }, { "CKM_RSA_9796", CKM_RSA_9796 }, { "CKM_RSA_X_509", CKM_RSA_X_509 }, { "CKM_MD2_RSA_PKCS", CKM_MD2_RSA_PKCS }, { "CKM_MD5_RSA_PKCS", CKM_MD5_RSA_PKCS }, { "CKM_SHA1_RSA_PKCS", CKM_SHA1_RSA_PKCS }, { "CKM_RIPEMD128_RSA_PKCS", CKM_RIPEMD128_RSA_PKCS }, { "CKM_RIPEMD160_RSA_PKCS", CKM_RIPEMD160_RSA_PKCS }, { "CKM_RSA_PKCS_OAEP", CKM_RSA_PKCS_OAEP }, { "CKM_RSA_X9_31_KEY_PAIR_GEN", CKM_RSA_X9_31_KEY_PAIR_GEN }, { "CKM_RSA_X9_31", CKM_RSA_X9_31 }, { "CKM_SHA1_RSA_X9_31", CKM_SHA1_RSA_X9_31 }, { "CKM_RSA_PKCS_PSS", CKM_RSA_PKCS_PSS }, { "CKM_SHA1_RSA_PKCS_PSS", CKM_SHA1_RSA_PKCS_PSS }, { "CKM_DSA_KEY_PAIR_GEN", CKM_DSA_KEY_PAIR_GEN }, { "CKM_DSA", CKM_DSA }, { "CKM_DSA_SHA1", CKM_DSA_SHA1 }, { "CKM_DH_PKCS_KEY_PAIR_GEN", CKM_DH_PKCS_KEY_PAIR_GEN }, { "CKM_DH_PKCS_DERIVE", CKM_DH_PKCS_DERIVE }, { "CKM_X9_42_DH_KEY_PAIR_GEN", CKM_X9_42_DH_KEY_PAIR_GEN }, { "CKM_X9_42_DH_DERIVE", CKM_X9_42_DH_DERIVE }, { "CKM_X9_42_DH_HYBRID_DERIVE", CKM_X9_42_DH_HYBRID_DERIVE }, { "CKM_X9_42_MQV_DERIVE", CKM_X9_42_MQV_DERIVE }, { "CKM_RC2_KEY_GEN", CKM_RC2_KEY_GEN }, { "CKM_RC2_ECB", CKM_RC2_ECB }, { "CKM_RC2_CBC", CKM_RC2_CBC }, { "CKM_RC2_MAC", CKM_RC2_MAC }, { "CKM_RC2_MAC_GENERAL", CKM_RC2_MAC_GENERAL }, { "CKM_RC2_CBC_PAD", CKM_RC2_CBC_PAD }, { "CKM_RC4_KEY_GEN", CKM_RC4_KEY_GEN }, { "CKM_RC4", CKM_RC4 }, { "CKM_DES_KEY_GEN", CKM_DES_KEY_GEN }, { "CKM_DES_ECB", CKM_DES_ECB }, { "CKM_DES_CBC", CKM_DES_CBC }, { "CKM_DES_MAC", CKM_DES_MAC }, { "CKM_DES_MAC_GENERAL", CKM_DES_MAC_GENERAL }, { "CKM_DES_CBC_PAD", CKM_DES_CBC_PAD }, { "CKM_DES2_KEY_GEN", CKM_DES2_KEY_GEN }, { "CKM_DES3_KEY_GEN", CKM_DES3_KEY_GEN }, { "CKM_DES3_ECB", CKM_DES3_ECB }, { "CKM_DES3_CBC", CKM_DES3_CBC }, { "CKM_DES3_MAC", CKM_DES3_MAC }, { "CKM_DES3_MAC_GENERAL", CKM_DES3_MAC_GENERAL }, { "CKM_DES3_CBC_PAD", CKM_DES3_CBC_PAD }, { "CKM_CDMF_KEY_GEN", CKM_CDMF_KEY_GEN }, { "CKM_CDMF_ECB", CKM_CDMF_ECB }, { "CKM_CDMF_CBC", CKM_CDMF_CBC }, { "CKM_CDMF_MAC", CKM_CDMF_MAC }, { "CKM_CDMF_MAC_GENERAL", CKM_CDMF_MAC_GENERAL }, { "CKM_CDMF_CBC_PAD", CKM_CDMF_CBC_PAD }, { "CKM_MD2", CKM_MD2 }, { "CKM_MD2_HMAC", CKM_MD2_HMAC }, { "CKM_MD2_HMAC_GENERAL", CKM_MD2_HMAC_GENERAL }, { "CKM_MD5", CKM_MD5 }, { "CKM_MD5_HMAC", CKM_MD5_HMAC }, { "CKM_MD5_HMAC_GENERAL", CKM_MD5_HMAC_GENERAL }, { "CKM_SHA_1", CKM_SHA_1 }, { "CKM_SHA_1_HMAC", CKM_SHA_1_HMAC }, { "CKM_SHA_1_HMAC_GENERAL", CKM_SHA_1_HMAC_GENERAL }, { "CKM_RIPEMD128", CKM_RIPEMD128 }, { "CKM_RIPEMD128_HMAC", CKM_RIPEMD128_HMAC }, { "CKM_RIPEMD128_HMAC_GENERAL", CKM_RIPEMD128_HMAC_GENERAL }, { "CKM_RIPEMD160", CKM_RIPEMD160 }, { "CKM_RIPEMD160_HMAC", CKM_RIPEMD160_HMAC }, { "CKM_RIPEMD160_HMAC_GENERAL", CKM_RIPEMD160_HMAC_GENERAL }, { "CKM_CAST_KEY_GEN", CKM_CAST_KEY_GEN }, { "CKM_CAST_ECB", CKM_CAST_ECB }, { "CKM_CAST_CBC", CKM_CAST_CBC }, { "CKM_CAST_MAC", CKM_CAST_MAC }, { "CKM_CAST_MAC_GENERAL", CKM_CAST_MAC_GENERAL }, { "CKM_CAST_CBC_PAD", CKM_CAST_CBC_PAD }, { "CKM_CAST3_KEY_GEN", CKM_CAST3_KEY_GEN }, { "CKM_CAST3_ECB", CKM_CAST3_ECB }, { "CKM_CAST3_CBC", CKM_CAST3_CBC }, { "CKM_CAST3_MAC", CKM_CAST3_MAC }, { "CKM_CAST3_MAC_GENERAL", CKM_CAST3_MAC_GENERAL }, { "CKM_CAST3_CBC_PAD", CKM_CAST3_CBC_PAD }, { "CKM_CAST5_KEY_GEN", CKM_CAST5_KEY_GEN }, { "CKM_CAST128_KEY_GEN", CKM_CAST128_KEY_GEN }, { "CKM_CAST5_ECB", CKM_CAST5_ECB }, { "CKM_CAST128_ECB", CKM_CAST128_ECB }, { "CKM_CAST5_CBC", CKM_CAST5_CBC }, { "CKM_CAST128_CBC", CKM_CAST128_CBC }, { "CKM_CAST5_MAC", CKM_CAST5_MAC }, { "CKM_CAST128_MAC", CKM_CAST128_MAC }, { "CKM_CAST5_MAC_GENERAL", CKM_CAST5_MAC_GENERAL }, { "CKM_CAST128_MAC_GENERAL", CKM_CAST128_MAC_GENERAL }, { "CKM_CAST5_CBC_PAD", CKM_CAST5_CBC_PAD }, { "CKM_CAST128_CBC_PAD", CKM_CAST128_CBC_PAD }, { "CKM_RC5_KEY_GEN", CKM_RC5_KEY_GEN }, { "CKM_RC5_ECB", CKM_RC5_ECB }, { "CKM_RC5_CBC", CKM_RC5_CBC }, { "CKM_RC5_MAC", CKM_RC5_MAC }, { "CKM_RC5_MAC_GENERAL", CKM_RC5_MAC_GENERAL }, { "CKM_RC5_CBC_PAD", CKM_RC5_CBC_PAD }, { "CKM_IDEA_KEY_GEN", CKM_IDEA_KEY_GEN }, { "CKM_IDEA_ECB", CKM_IDEA_ECB }, { "CKM_IDEA_CBC", CKM_IDEA_CBC }, { "CKM_IDEA_MAC", CKM_IDEA_MAC }, { "CKM_IDEA_MAC_GENERAL", CKM_IDEA_MAC_GENERAL }, { "CKM_IDEA_CBC_PAD", CKM_IDEA_CBC_PAD }, { "CKM_GENERIC_SECRET_KEY_GEN", CKM_GENERIC_SECRET_KEY_GEN }, { "CKM_CONCATENATE_BASE_AND_KEY", CKM_CONCATENATE_BASE_AND_KEY }, { "CKM_CONCATENATE_BASE_AND_DATA", CKM_CONCATENATE_BASE_AND_DATA }, { "CKM_CONCATENATE_DATA_AND_BASE", CKM_CONCATENATE_DATA_AND_BASE }, { "CKM_XOR_BASE_AND_DATA", CKM_XOR_BASE_AND_DATA }, { "CKM_EXTRACT_KEY_FROM_KEY", CKM_EXTRACT_KEY_FROM_KEY }, { "CKM_SSL3_PRE_MASTER_KEY_GEN", CKM_SSL3_PRE_MASTER_KEY_GEN }, { "CKM_SSL3_MASTER_KEY_DERIVE", CKM_SSL3_MASTER_KEY_DERIVE }, { "CKM_SSL3_KEY_AND_MAC_DERIVE", CKM_SSL3_KEY_AND_MAC_DERIVE }, { "CKM_SSL3_MASTER_KEY_DERIVE_DH", CKM_SSL3_MASTER_KEY_DERIVE_DH }, { "CKM_TLS_PRE_MASTER_KEY_GEN", CKM_TLS_PRE_MASTER_KEY_GEN }, { "CKM_TLS_MASTER_KEY_DERIVE", CKM_TLS_MASTER_KEY_DERIVE }, { "CKM_TLS_KEY_AND_MAC_DERIVE", CKM_TLS_KEY_AND_MAC_DERIVE }, { "CKM_TLS_MASTER_KEY_DERIVE_DH", CKM_TLS_MASTER_KEY_DERIVE_DH }, { "CKM_SSL3_MD5_MAC", CKM_SSL3_MD5_MAC }, { "CKM_SSL3_SHA1_MAC", CKM_SSL3_SHA1_MAC }, { "CKM_MD5_KEY_DERIVATION", CKM_MD5_KEY_DERIVATION }, { "CKM_MD2_KEY_DERIVATION", CKM_MD2_KEY_DERIVATION }, { "CKM_SHA1_KEY_DERIVATION", CKM_SHA1_KEY_DERIVATION }, { "CKM_PBE_MD2_DES_CBC", CKM_PBE_MD2_DES_CBC }, { "CKM_PBE_MD5_DES_CBC", CKM_PBE_MD5_DES_CBC }, { "CKM_PBE_MD5_CAST_CBC", CKM_PBE_MD5_CAST_CBC }, { "CKM_PBE_MD5_CAST3_CBC", CKM_PBE_MD5_CAST3_CBC }, { "CKM_PBE_MD5_CAST5_CBC", CKM_PBE_MD5_CAST5_CBC }, { "CKM_PBE_MD5_CAST128_CBC", CKM_PBE_MD5_CAST128_CBC }, { "CKM_PBE_SHA1_CAST5_CBC", CKM_PBE_SHA1_CAST5_CBC }, { "CKM_PBE_SHA1_CAST128_CBC", CKM_PBE_SHA1_CAST128_CBC }, { "CKM_PBE_SHA1_RC4_128", CKM_PBE_SHA1_RC4_128 }, { "CKM_PBE_SHA1_RC4_40", CKM_PBE_SHA1_RC4_40 }, { "CKM_PBE_SHA1_DES3_EDE_CBC", CKM_PBE_SHA1_DES3_EDE_CBC }, { "CKM_PBE_SHA1_DES2_EDE_CBC", CKM_PBE_SHA1_DES2_EDE_CBC }, { "CKM_PBE_SHA1_RC2_128_CBC", CKM_PBE_SHA1_RC2_128_CBC }, { "CKM_PBE_SHA1_RC2_40_CBC", CKM_PBE_SHA1_RC2_40_CBC }, { "CKM_PKCS5_PBKD2", CKM_PKCS5_PBKD2 }, { "CKM_PBA_SHA1_WITH_SHA1_HMAC", CKM_PBA_SHA1_WITH_SHA1_HMAC }, { "CKM_KEY_WRAP_LYNKS", CKM_KEY_WRAP_LYNKS }, { "CKM_KEY_WRAP_SET_OAEP", CKM_KEY_WRAP_SET_OAEP }, { "CKM_SKIPJACK_KEY_GEN", CKM_SKIPJACK_KEY_GEN }, { "CKM_SKIPJACK_ECB64", CKM_SKIPJACK_ECB64 }, { "CKM_SKIPJACK_CBC64", CKM_SKIPJACK_CBC64 }, { "CKM_SKIPJACK_OFB64", CKM_SKIPJACK_OFB64 }, { "CKM_SKIPJACK_CFB64", CKM_SKIPJACK_CFB64 }, { "CKM_SKIPJACK_CFB32", CKM_SKIPJACK_CFB32 }, { "CKM_SKIPJACK_CFB16", CKM_SKIPJACK_CFB16 }, { "CKM_SKIPJACK_CFB8", CKM_SKIPJACK_CFB8 }, { "CKM_SKIPJACK_WRAP", CKM_SKIPJACK_WRAP }, { "CKM_SKIPJACK_PRIVATE_WRAP", CKM_SKIPJACK_PRIVATE_WRAP }, { "CKM_SKIPJACK_RELAYX", CKM_SKIPJACK_RELAYX }, { "CKM_KEA_KEY_PAIR_GEN", CKM_KEA_KEY_PAIR_GEN }, { "CKM_KEA_KEY_DERIVE", CKM_KEA_KEY_DERIVE }, { "CKM_FORTEZZA_TIMESTAMP", CKM_FORTEZZA_TIMESTAMP }, { "CKM_BATON_KEY_GEN", CKM_BATON_KEY_GEN }, { "CKM_BATON_ECB128", CKM_BATON_ECB128 }, { "CKM_BATON_ECB96", CKM_BATON_ECB96 }, { "CKM_BATON_CBC128", CKM_BATON_CBC128 }, { "CKM_BATON_COUNTER", CKM_BATON_COUNTER }, { "CKM_BATON_SHUFFLE", CKM_BATON_SHUFFLE }, { "CKM_BATON_WRAP", CKM_BATON_WRAP }, { "CKM_ECDSA_KEY_PAIR_GEN", CKM_ECDSA_KEY_PAIR_GEN }, { "CKM_EC_KEY_PAIR_GEN", CKM_EC_KEY_PAIR_GEN }, { "CKM_ECDSA", CKM_ECDSA }, { "CKM_ECDSA_SHA1", CKM_ECDSA_SHA1 }, { "CKM_ECDH1_DERIVE", CKM_ECDH1_DERIVE }, { "CKM_ECDH1_COFACTOR_DERIVE", CKM_ECDH1_COFACTOR_DERIVE }, { "CKM_ECMQV_DERIVE", CKM_ECMQV_DERIVE }, { "CKM_JUNIPER_KEY_GEN", CKM_JUNIPER_KEY_GEN }, { "CKM_JUNIPER_ECB128", CKM_JUNIPER_ECB128 }, { "CKM_JUNIPER_CBC128", CKM_JUNIPER_CBC128 }, { "CKM_JUNIPER_COUNTER", CKM_JUNIPER_COUNTER }, { "CKM_JUNIPER_SHUFFLE", CKM_JUNIPER_SHUFFLE }, { "CKM_JUNIPER_WRAP", CKM_JUNIPER_WRAP }, { "CKM_FASTHASH", CKM_FASTHASH }, { "CKM_AES_KEY_GEN", CKM_AES_KEY_GEN }, { "CKM_AES_ECB", CKM_AES_ECB }, { "CKM_AES_CBC", CKM_AES_CBC }, { "CKM_AES_MAC", CKM_AES_MAC }, { "CKM_AES_MAC_GENERAL", CKM_AES_MAC_GENERAL }, { "CKM_AES_CBC_PAD", CKM_AES_CBC_PAD }, { "CKM_DSA_PARAMETER_GEN", CKM_DSA_PARAMETER_GEN }, { "CKM_DH_PKCS_PARAMETER_GEN", CKM_DH_PKCS_PARAMETER_GEN }, { "CKM_X9_42_DH_PARAMETER_GEN", CKM_X9_42_DH_PARAMETER_GEN }, { "CKM_VENDOR_DEFINED", CKM_VENDOR_DEFINED }, { NULL, 0 } }; /* * pkcs11_mech2str - convert PKCS#11 mech to a string * * Anything below CKM_VENDOR_DEFINED that wasn't in the mapping table * at build time causes NULL to be returned. Anything above it also * returns NULL since we have no way to know what its real name is. */ char *pkcs11_mech2str(CK_MECHANISM_TYPE mech) { int i; char buf[11]; /* Num chars for representing ulong in ASCII */ if (mech > CKM_VENDOR_DEFINED) { (void) snprintf(buf, sizeof (buf), "%#lx", mech); return (strdup(buf)); } for (i = 0; mapping[i].str; i++) { if (mapping[i].mech == mech) return (strdup(mapping[i].str)); } return (NULL); } /* * pkcs11_str2mech - convert a string into a PKCS#11 mech number. * * Since there isn't reserved value for an invalid mech we return * CKR_MECHANISM_INVALID for anything we don't recognise. * The value in mech isn't meaningful in these cases. */ CK_RV pkcs11_str2mech(char *mech_str, CK_MECHANISM_TYPE_PTR mech) { int i; char *tmech_str; if (mech_str == NULL) return (CKR_MECHANISM_INVALID); if (strncasecmp(mech_str, "0x8", 3) == 0) { cryptodebug("pkcs11_str2mech: hex string passed in: %s", mech_str); *mech = strtoll(mech_str, NULL, 16); return (CKR_OK); } if (strncasecmp(mech_str, "CKM_", 4) != 0) { size_t tmech_strlen = strlen(mech_str) + 4 + 1; cryptodebug("pkcs11_str2mech: no CKM_ prefix: %s", mech_str); tmech_str = malloc(tmech_strlen * sizeof (char)); (void) snprintf(tmech_str, tmech_strlen, "CKM_%s", mech_str); cryptodebug("pkcs11_str2mech: with prefix: %s", tmech_str); } else { tmech_str = mech_str; } for (i = 0; mapping[i].str; i++) { if (strcasecmp(mapping[i].str, tmech_str) == 0) { *mech = mapping[i].mech; if (tmech_str != mech_str) free(tmech_str); return (CKR_OK); } } if (tmech_str != mech_str) free(tmech_str); return (CKR_MECHANISM_INVALID); }