xref: /titanic_50/usr/src/lib/libcryptoutil/common/cryptoutil.h (revision 05d57413471eaaa425913a06edc2ab33ad9b05bc)
1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License (the "License").
6  * You may not use this file except in compliance with the License.
7  *
8  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9  * or http://www.opensolaris.org/os/licensing.
10  * See the License for the specific language governing permissions
11  * and limitations under the License.
12  *
13  * When distributing Covered Code, include this CDDL HEADER in each
14  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15  * If applicable, add the following below this CDDL HEADER, with the
16  * fields enclosed by brackets "[]" replaced with your own identifying
17  * information: Portions Copyright [yyyy] [name of copyright owner]
18  *
19  * CDDL HEADER END
20  *
21  * Copyright (c) 2010, Oracle and/or its affiliates. All rights reserved.
22  */
23 /*
24  * Copyright 2010 Nexenta Systems, Inc.  All rights reserved.
25  * Copyright 2014, OmniTI Computer Consulting, Inc. All rights reserved.
26  */
27 
28 #ifndef _CRYPTOUTIL_H
29 #define	_CRYPTOUTIL_H
30 
31 #ifdef __cplusplus
32 extern "C" {
33 #endif
34 
35 #include <sys/types.h>
36 #include <syslog.h>
37 #include <security/cryptoki.h>
38 #include <sys/param.h>
39 
40 #define	LOG_STDERR	-1
41 #define	SUCCESS		0
42 #define	FAILURE		1
43 #define	MECH_ID_HEX_LEN	11	/* length of mechanism id in hex form */
44 
45 #define	_PATH_PKCS11_CONF	"/etc/crypto/pkcs11.conf"
46 #define	_PATH_KCF_CONF		"/etc/crypto/kcf.conf"
47 #define	_PATH_KCFD_LOCK		"/var/run/kcfd.lock"
48 
49 /* $ISA substitution for parsing pkcs11.conf data */
50 #define	PKCS11_ISA	"/$ISA/"
51 #if defined(_LP64)
52 #define	PKCS11_ISA_DIR	"/64/"
53 #else	/* !_LP64 */
54 #define	PKCS11_ISA_DIR	"/"
55 #endif
56 
57 /* keywords and delimiters for parsing configuration files */
58 #define	SEP_COLON	":"
59 #define	SEP_SEMICOLON	";"
60 #define	SEP_EQUAL	"="
61 #define	SEP_COMMA	","
62 #define	METASLOT_KEYWORD	"metaslot"
63 #define	FIPS_KEYWORD	"fips-140"
64 #define	EF_DISABLED	"disabledlist="
65 #define	EF_ENABLED	"enabledlist="
66 #define	EF_NORANDOM	"NO_RANDOM"
67 #define	METASLOT_TOKEN	"metaslot_token="
68 #define	METASLOT_SLOT	"metaslot_slot="
69 #define	METASLOT_STATUS	"metaslot_status="
70 #define	EF_FIPS_STATUS	"fips_status="
71 #define	METASLOT_AUTO_KEY_MIGRATE	"metaslot_auto_key_migrate="
72 #define	ENABLED_KEYWORD		"enabled"
73 #define	DISABLED_KEYWORD	"disabled"
74 #define	SLOT_DESCRIPTION_SIZE	64
75 #define	TOKEN_LABEL_SIZE	32
76 #define	TOKEN_MANUFACTURER_SIZE	32
77 #define	TOKEN_SERIAL_SIZE	16
78 #define	CRYPTO_FIPS_MODE_DISABLED	0
79 #define	CRYPTO_FIPS_MODE_ENABLED	1
80 
81 /*
82  * Define the following softtoken values that are used by softtoken
83  * library, cryptoadm and pktool command.
84  */
85 #define	SOFT_SLOT_DESCRIPTION	\
86 			"Sun Crypto Softtoken            " \
87 			"                                "
88 #define	SOFT_TOKEN_LABEL	"Sun Software PKCS#11 softtoken  "
89 #define	SOFT_TOKEN_SERIAL	"                "
90 #define	SOFT_MANUFACTURER_ID	"Sun Microsystems, Inc.          "
91 #define	SOFT_DEFAULT_PIN	"changeme"
92 
93 typedef char libname_t[MAXPATHLEN];
94 typedef char midstr_t[MECH_ID_HEX_LEN];
95 
96 typedef struct umechlist {
97 	midstr_t		name;	/* mechanism name in hex form */
98 	struct umechlist	*next;
99 } umechlist_t;
100 
101 typedef struct uentry {
102 	libname_t	name;
103 	boolean_t	flag_norandom; /* TRUE if random is disabled */
104 	boolean_t	flag_enabledlist; /* TRUE if an enabledlist */
105 	umechlist_t	*policylist; /* disabledlist or enabledlist */
106 	boolean_t	flag_metaslot_enabled; /* TRUE if metaslot's enabled */
107 	boolean_t	flag_metaslot_auto_key_migrate;
108 	CK_UTF8CHAR	metaslot_ks_slot[SLOT_DESCRIPTION_SIZE + 1];
109 	CK_UTF8CHAR	metaslot_ks_token[TOKEN_LABEL_SIZE + 1];
110 	int 		count;
111 	boolean_t	flag_fips_enabled;
112 } uentry_t;
113 
114 typedef struct uentrylist {
115 	uentry_t	*puent;
116 	struct uentrylist	*next;
117 } uentrylist_t;
118 
119 /* Return codes for pkcs11_parse_uri() */
120 #define	PK11_URI_OK		0
121 #define	PK11_URI_INVALID	1
122 #define	PK11_MALLOC_ERROR	2
123 #define	PK11_URI_VALUE_OVERFLOW	3
124 #define	PK11_NOT_PKCS11_URI	4
125 
126 /*
127  * There is no limit for the attribute length in the spec. 256 bytes should be
128  * enough for the object name.
129  */
130 #define	PK11_MAX_OBJECT_LEN		256
131 /*
132  * CKA_ID is of type "byte array" which can be of arbitrary length. 256 bytes
133  * should be sufficient though.
134  */
135 #define	PK11_MAX_ID_LEN			256
136 
137 /* Structure for the PKCS#11 URI. */
138 typedef struct pkcs11_uri_t {
139 	/* CKA_LABEL attribute to the C_FindObjectsInit function. */
140 	CK_UTF8CHAR_PTR	object;
141 	/*
142 	 * CKA_CLASS attribute to the C_FindObjectsInit function. The
143 	 * "objecttype" URI attribute can have a value one of "private",
144 	 * "public", "cert", "secretkey", and "data". The "objecttype" field can
145 	 * have a value of CKO_PUBLIC_KEY, CKO_PRIVATE_KEY, CKO_CERTIFICATE,
146 	 * CKO_SECRET_KEY, and CKO_DATA. This attribute cannot be empty in the
147 	 * URI.
148 	 */
149 	CK_ULONG	objecttype;
150 	/* CKO_DATA is 0 so we need this flag. Not part of the URI itself. */
151 	boolean_t	objecttype_present;
152 	/*
153 	 * Token, manufufacturer, serial and model are of fixed size length in
154 	 * the specification. We allocate memory on the fly to distinguish
155 	 * between an attribute not present and an empty value. We check for
156 	 * overflows. We always terminate the string with '\0' even when that is
157 	 * not used in the PKCS#11's CK_TOKEN_INFO structure (fields are padded
158 	 * with spaces).
159 	 */
160 	/* Token label from CK_TOKEN_INFO. */
161 	CK_UTF8CHAR_PTR	token;
162 	/* ManufacturerID from CK_TOKEN_INFO. */
163 	CK_UTF8CHAR_PTR	manuf;
164 	/* SerialNumber from CK_TOKEN_INFO. */
165 	CK_CHAR_PTR	serial;
166 	/* Model from CK_TOKEN_INFO. */
167 	CK_UTF8CHAR_PTR	model;
168 	/* This is a byte array, we need a length parameter as well. */
169 	CK_BYTE_PTR	id;
170 	int		id_len;
171 	/*
172 	 * Location of the file with a token PIN. Application can overload this,
173 	 * eg. "/bin/askpass|" may mean to read the PIN from a command. However,
174 	 * the pkcs11_parse_uri() function does not interpret this field in any
175 	 * way.
176 	 */
177 	char		*pinfile;
178 } pkcs11_uri_t;
179 
180 extern void cryptodebug(const char *fmt, ...);
181 extern void cryptoerror(int priority, const char *fmt, ...);
182 extern void cryptodebug_init(const char *prefix);
183 extern void cryptoerror_off();
184 extern void cryptoerror_on();
185 
186 extern const char *pkcs11_mech2str(CK_MECHANISM_TYPE mech);
187 extern CK_RV pkcs11_str2mech(char *mech_str, CK_MECHANISM_TYPE_PTR mech);
188 
189 extern int get_pkcs11conf_info(uentrylist_t **);
190 extern umechlist_t *create_umech(char *);
191 extern void free_umechlist(umechlist_t *);
192 extern void free_uentrylist(uentrylist_t *);
193 extern void free_uentry(uentry_t *);
194 extern uentry_t *getent_uef(char *);
195 
196 extern void tohexstr(uchar_t *bytes, size_t blen, char *hexstr, size_t hexlen);
197 extern int hexstr_to_bytes(char *hexstr, size_t hexlen, uchar_t **bytes,
198     size_t *blen);
199 extern CK_RV pkcs11_mech2keytype(CK_MECHANISM_TYPE mech_type,
200     CK_KEY_TYPE *ktype);
201 extern CK_RV pkcs11_mech2keygen(CK_MECHANISM_TYPE mech_type,
202     CK_MECHANISM_TYPE *gen_mech);
203 extern char *pkcs11_strerror(CK_RV rv);
204 
205 extern int
206 get_metaslot_info(boolean_t  *status_enabled, boolean_t *migrate_enabled,
207     char **objectstore_slot_info, char **objectstore_token_info);
208 
209 extern char *get_fullpath(char *dir, char *filepath);
210 extern int str2lifetime(char *ltimestr, uint32_t *ltime);
211 
212 extern char *pkcs11_default_token(void);
213 extern int pkcs11_get_pass(char *token_name, char **pdata, size_t *psize,
214     size_t min_psize, boolean_t with_confirmation);
215 
216 extern int pkcs11_seed_urandom(void *sbuf, size_t slen);
217 extern int pkcs11_get_random(void *dbuf, size_t dlen);
218 extern int pkcs11_get_urandom(void *dbuf, size_t dlen);
219 extern int pkcs11_get_nzero_urandom(void *dbuf, size_t dlen);
220 extern int pkcs11_read_data(char *filename, void **dbuf, size_t *dlen);
221 
222 extern int open_nointr(const char *path, int oflag, ...);
223 extern ssize_t readn_nointr(int fd, void *dbuf, size_t dlen);
224 extern ssize_t writen_nointr(int fd, void *dbuf, size_t dlen);
225 extern int update_conf(char *conf_file, char *entry);
226 
227 extern int pkcs11_parse_uri(const char *str, pkcs11_uri_t *uri);
228 extern void pkcs11_free_uri(pkcs11_uri_t *uri);
229 
230 #ifdef __cplusplus
231 }
232 #endif
233 
234 #endif /* _CRYPTOUTIL_H */
235