1 /* 2 * CDDL HEADER START 3 * 4 * The contents of this file are subject to the terms of the 5 * Common Development and Distribution License (the "License"). 6 * You may not use this file except in compliance with the License. 7 * 8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 9 * or http://www.opensolaris.org/os/licensing. 10 * See the License for the specific language governing permissions 11 * and limitations under the License. 12 * 13 * When distributing Covered Code, include this CDDL HEADER in each 14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 15 * If applicable, add the following below this CDDL HEADER, with the 16 * fields enclosed by brackets "[]" replaced with your own identifying 17 * information: Portions Copyright [yyyy] [name of copyright owner] 18 * 19 * CDDL HEADER END 20 * 21 * Copyright (c) 2010, Oracle and/or its affiliates. All rights reserved. 22 */ 23 /* 24 * Copyright 2010 Nexenta Systems, Inc. All rights reserved. 25 * Copyright 2014, OmniTI Computer Consulting, Inc. All rights reserved. 26 */ 27 28 #ifndef _CRYPTOUTIL_H 29 #define _CRYPTOUTIL_H 30 31 #ifdef __cplusplus 32 extern "C" { 33 #endif 34 35 #include <sys/types.h> 36 #include <syslog.h> 37 #include <security/cryptoki.h> 38 #include <sys/param.h> 39 40 #define LOG_STDERR -1 41 #define SUCCESS 0 42 #define FAILURE 1 43 #define MECH_ID_HEX_LEN 11 /* length of mechanism id in hex form */ 44 45 #define _PATH_PKCS11_CONF "/etc/crypto/pkcs11.conf" 46 #define _PATH_KCF_CONF "/etc/crypto/kcf.conf" 47 #define _PATH_KCFD_LOCK "/var/run/kcfd.lock" 48 49 /* $ISA substitution for parsing pkcs11.conf data */ 50 #define PKCS11_ISA "/$ISA/" 51 #if defined(_LP64) 52 #define PKCS11_ISA_DIR "/64/" 53 #else /* !_LP64 */ 54 #define PKCS11_ISA_DIR "/" 55 #endif 56 57 /* keywords and delimiters for parsing configuration files */ 58 #define SEP_COLON ":" 59 #define SEP_SEMICOLON ";" 60 #define SEP_EQUAL "=" 61 #define SEP_COMMA "," 62 #define METASLOT_KEYWORD "metaslot" 63 #define FIPS_KEYWORD "fips-140" 64 #define EF_DISABLED "disabledlist=" 65 #define EF_ENABLED "enabledlist=" 66 #define EF_NORANDOM "NO_RANDOM" 67 #define METASLOT_TOKEN "metaslot_token=" 68 #define METASLOT_SLOT "metaslot_slot=" 69 #define METASLOT_STATUS "metaslot_status=" 70 #define EF_FIPS_STATUS "fips_status=" 71 #define METASLOT_AUTO_KEY_MIGRATE "metaslot_auto_key_migrate=" 72 #define ENABLED_KEYWORD "enabled" 73 #define DISABLED_KEYWORD "disabled" 74 #define SLOT_DESCRIPTION_SIZE 64 75 #define TOKEN_LABEL_SIZE 32 76 #define TOKEN_MANUFACTURER_SIZE 32 77 #define TOKEN_SERIAL_SIZE 16 78 #define CRYPTO_FIPS_MODE_DISABLED 0 79 #define CRYPTO_FIPS_MODE_ENABLED 1 80 81 /* 82 * Define the following softtoken values that are used by softtoken 83 * library, cryptoadm and pktool command. 84 */ 85 #define SOFT_SLOT_DESCRIPTION \ 86 "Sun Crypto Softtoken " \ 87 " " 88 #define SOFT_TOKEN_LABEL "Sun Software PKCS#11 softtoken " 89 #define SOFT_TOKEN_SERIAL " " 90 #define SOFT_MANUFACTURER_ID "Sun Microsystems, Inc. " 91 #define SOFT_DEFAULT_PIN "changeme" 92 93 typedef char libname_t[MAXPATHLEN]; 94 typedef char midstr_t[MECH_ID_HEX_LEN]; 95 96 typedef struct umechlist { 97 midstr_t name; /* mechanism name in hex form */ 98 struct umechlist *next; 99 } umechlist_t; 100 101 typedef struct uentry { 102 libname_t name; 103 boolean_t flag_norandom; /* TRUE if random is disabled */ 104 boolean_t flag_enabledlist; /* TRUE if an enabledlist */ 105 umechlist_t *policylist; /* disabledlist or enabledlist */ 106 boolean_t flag_metaslot_enabled; /* TRUE if metaslot's enabled */ 107 boolean_t flag_metaslot_auto_key_migrate; 108 CK_UTF8CHAR metaslot_ks_slot[SLOT_DESCRIPTION_SIZE + 1]; 109 CK_UTF8CHAR metaslot_ks_token[TOKEN_LABEL_SIZE + 1]; 110 int count; 111 boolean_t flag_fips_enabled; 112 } uentry_t; 113 114 typedef struct uentrylist { 115 uentry_t *puent; 116 struct uentrylist *next; 117 } uentrylist_t; 118 119 /* Return codes for pkcs11_parse_uri() */ 120 #define PK11_URI_OK 0 121 #define PK11_URI_INVALID 1 122 #define PK11_MALLOC_ERROR 2 123 #define PK11_URI_VALUE_OVERFLOW 3 124 #define PK11_NOT_PKCS11_URI 4 125 126 /* 127 * There is no limit for the attribute length in the spec. 256 bytes should be 128 * enough for the object name. 129 */ 130 #define PK11_MAX_OBJECT_LEN 256 131 /* 132 * CKA_ID is of type "byte array" which can be of arbitrary length. 256 bytes 133 * should be sufficient though. 134 */ 135 #define PK11_MAX_ID_LEN 256 136 137 /* Structure for the PKCS#11 URI. */ 138 typedef struct pkcs11_uri_t { 139 /* CKA_LABEL attribute to the C_FindObjectsInit function. */ 140 CK_UTF8CHAR_PTR object; 141 /* 142 * CKA_CLASS attribute to the C_FindObjectsInit function. The 143 * "objecttype" URI attribute can have a value one of "private", 144 * "public", "cert", "secretkey", and "data". The "objecttype" field can 145 * have a value of CKO_PUBLIC_KEY, CKO_PRIVATE_KEY, CKO_CERTIFICATE, 146 * CKO_SECRET_KEY, and CKO_DATA. This attribute cannot be empty in the 147 * URI. 148 */ 149 CK_ULONG objecttype; 150 /* CKO_DATA is 0 so we need this flag. Not part of the URI itself. */ 151 boolean_t objecttype_present; 152 /* 153 * Token, manufufacturer, serial and model are of fixed size length in 154 * the specification. We allocate memory on the fly to distinguish 155 * between an attribute not present and an empty value. We check for 156 * overflows. We always terminate the string with '\0' even when that is 157 * not used in the PKCS#11's CK_TOKEN_INFO structure (fields are padded 158 * with spaces). 159 */ 160 /* Token label from CK_TOKEN_INFO. */ 161 CK_UTF8CHAR_PTR token; 162 /* ManufacturerID from CK_TOKEN_INFO. */ 163 CK_UTF8CHAR_PTR manuf; 164 /* SerialNumber from CK_TOKEN_INFO. */ 165 CK_CHAR_PTR serial; 166 /* Model from CK_TOKEN_INFO. */ 167 CK_UTF8CHAR_PTR model; 168 /* This is a byte array, we need a length parameter as well. */ 169 CK_BYTE_PTR id; 170 int id_len; 171 /* 172 * Location of the file with a token PIN. Application can overload this, 173 * eg. "/bin/askpass|" may mean to read the PIN from a command. However, 174 * the pkcs11_parse_uri() function does not interpret this field in any 175 * way. 176 */ 177 char *pinfile; 178 } pkcs11_uri_t; 179 180 extern void cryptodebug(const char *fmt, ...); 181 extern void cryptoerror(int priority, const char *fmt, ...); 182 extern void cryptodebug_init(const char *prefix); 183 extern void cryptoerror_off(); 184 extern void cryptoerror_on(); 185 186 extern const char *pkcs11_mech2str(CK_MECHANISM_TYPE mech); 187 extern CK_RV pkcs11_str2mech(char *mech_str, CK_MECHANISM_TYPE_PTR mech); 188 189 extern int get_pkcs11conf_info(uentrylist_t **); 190 extern umechlist_t *create_umech(char *); 191 extern void free_umechlist(umechlist_t *); 192 extern void free_uentrylist(uentrylist_t *); 193 extern void free_uentry(uentry_t *); 194 extern uentry_t *getent_uef(char *); 195 196 extern void tohexstr(uchar_t *bytes, size_t blen, char *hexstr, size_t hexlen); 197 extern int hexstr_to_bytes(char *hexstr, size_t hexlen, uchar_t **bytes, 198 size_t *blen); 199 extern CK_RV pkcs11_mech2keytype(CK_MECHANISM_TYPE mech_type, 200 CK_KEY_TYPE *ktype); 201 extern CK_RV pkcs11_mech2keygen(CK_MECHANISM_TYPE mech_type, 202 CK_MECHANISM_TYPE *gen_mech); 203 extern char *pkcs11_strerror(CK_RV rv); 204 205 extern int 206 get_metaslot_info(boolean_t *status_enabled, boolean_t *migrate_enabled, 207 char **objectstore_slot_info, char **objectstore_token_info); 208 209 extern char *get_fullpath(char *dir, char *filepath); 210 extern int str2lifetime(char *ltimestr, uint32_t *ltime); 211 212 extern char *pkcs11_default_token(void); 213 extern int pkcs11_get_pass(char *token_name, char **pdata, size_t *psize, 214 size_t min_psize, boolean_t with_confirmation); 215 216 extern int pkcs11_seed_urandom(void *sbuf, size_t slen); 217 extern int pkcs11_get_random(void *dbuf, size_t dlen); 218 extern int pkcs11_get_urandom(void *dbuf, size_t dlen); 219 extern int pkcs11_get_nzero_urandom(void *dbuf, size_t dlen); 220 extern int pkcs11_read_data(char *filename, void **dbuf, size_t *dlen); 221 222 extern int open_nointr(const char *path, int oflag, ...); 223 extern ssize_t readn_nointr(int fd, void *dbuf, size_t dlen); 224 extern ssize_t writen_nointr(int fd, void *dbuf, size_t dlen); 225 extern int update_conf(char *conf_file, char *entry); 226 227 extern int pkcs11_parse_uri(const char *str, pkcs11_uri_t *uri); 228 extern void pkcs11_free_uri(pkcs11_uri_t *uri); 229 230 #ifdef __cplusplus 231 } 232 #endif 233 234 #endif /* _CRYPTOUTIL_H */ 235