xref: /titanic_50/usr/src/lib/libcryptoutil/common/cryptoutil.h (revision 0a47c91c895e274dd0990009919e30e984364a8b)
1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License (the "License").
6  * You may not use this file except in compliance with the License.
7  *
8  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9  * or http://www.opensolaris.org/os/licensing.
10  * See the License for the specific language governing permissions
11  * and limitations under the License.
12  *
13  * When distributing Covered Code, include this CDDL HEADER in each
14  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15  * If applicable, add the following below this CDDL HEADER, with the
16  * fields enclosed by brackets "[]" replaced with your own identifying
17  * information: Portions Copyright [yyyy] [name of copyright owner]
18  *
19  * CDDL HEADER END
20  *
21  * Copyright (c) 2010, Oracle and/or its affiliates. All rights reserved.
22  */
23 /*
24  * Copyright 2010 Nexenta Systems, Inc.  All rights reserved.
25  */
26 
27 #ifndef _CRYPTOUTIL_H
28 #define	_CRYPTOUTIL_H
29 
30 #ifdef __cplusplus
31 extern "C" {
32 #endif
33 
34 #include <sys/types.h>
35 #include <syslog.h>
36 #include <security/cryptoki.h>
37 #include <sys/param.h>
38 
39 #define	LOG_STDERR	-1
40 #define	SUCCESS		0
41 #define	FAILURE		1
42 #define	MECH_ID_HEX_LEN	11	/* length of mechanism id in hex form */
43 
44 #define	_PATH_PKCS11_CONF	"/etc/crypto/pkcs11.conf"
45 #define	_PATH_KCF_CONF		"/etc/crypto/kcf.conf"
46 #define	_PATH_KCFD_LOCK		"/var/run/kcfd.lock"
47 
48 /* $ISA substitution for parsing pkcs11.conf data */
49 #define	PKCS11_ISA	"/$ISA/"
50 #if defined(_LP64)
51 #define	PKCS11_ISA_DIR	"/64/"
52 #else	/* !_LP64 */
53 #define	PKCS11_ISA_DIR	"/"
54 #endif
55 
56 /* keywords and delimiters for parsing configuration files */
57 #define	SEP_COLON	":"
58 #define	SEP_SEMICOLON	";"
59 #define	SEP_EQUAL	"="
60 #define	SEP_COMMA	","
61 #define	METASLOT_KEYWORD	"metaslot"
62 #define	FIPS_KEYWORD	"fips-140"
63 #define	EF_DISABLED	"disabledlist="
64 #define	EF_ENABLED	"enabledlist="
65 #define	EF_NORANDOM	"NO_RANDOM"
66 #define	METASLOT_TOKEN	"metaslot_token="
67 #define	METASLOT_SLOT	"metaslot_slot="
68 #define	METASLOT_STATUS	"metaslot_status="
69 #define	EF_FIPS_STATUS	"fips_status="
70 #define	METASLOT_AUTO_KEY_MIGRATE	"metaslot_auto_key_migrate="
71 #define	ENABLED_KEYWORD		"enabled"
72 #define	DISABLED_KEYWORD	"disabled"
73 #define	SLOT_DESCRIPTION_SIZE	64
74 #define	TOKEN_LABEL_SIZE	32
75 #define	TOKEN_MANUFACTURER_SIZE	32
76 #define	TOKEN_SERIAL_SIZE	16
77 #define	CRYPTO_FIPS_MODE_DISABLED	0
78 #define	CRYPTO_FIPS_MODE_ENABLED	1
79 
80 /*
81  * Define the following softtoken values that are used by softtoken
82  * library, cryptoadm and pktool command.
83  */
84 #define	SOFT_SLOT_DESCRIPTION	\
85 			"Sun Crypto Softtoken            " \
86 			"                                "
87 #define	SOFT_TOKEN_LABEL	"Sun Software PKCS#11 softtoken  "
88 #define	SOFT_TOKEN_SERIAL	"                "
89 #define	SOFT_MANUFACTURER_ID	"Sun Microsystems, Inc.          "
90 #define	SOFT_DEFAULT_PIN	"changeme"
91 
92 typedef char libname_t[MAXPATHLEN];
93 typedef char midstr_t[MECH_ID_HEX_LEN];
94 
95 typedef struct umechlist {
96 	midstr_t		name;	/* mechanism name in hex form */
97 	struct umechlist	*next;
98 } umechlist_t;
99 
100 typedef struct uentry {
101 	libname_t	name;
102 	boolean_t	flag_norandom; /* TRUE if random is disabled */
103 	boolean_t	flag_enabledlist; /* TRUE if an enabledlist */
104 	umechlist_t	*policylist; /* disabledlist or enabledlist */
105 	boolean_t	flag_metaslot_enabled; /* TRUE if metaslot's enabled */
106 	boolean_t	flag_metaslot_auto_key_migrate;
107 	CK_UTF8CHAR	metaslot_ks_slot[SLOT_DESCRIPTION_SIZE + 1];
108 	CK_UTF8CHAR	metaslot_ks_token[TOKEN_LABEL_SIZE + 1];
109 	int 		count;
110 	boolean_t	flag_fips_enabled;
111 } uentry_t;
112 
113 typedef struct uentrylist {
114 	uentry_t	*puent;
115 	struct uentrylist	*next;
116 } uentrylist_t;
117 
118 /* Return codes for pkcs11_parse_uri() */
119 #define	PK11_URI_OK		0
120 #define	PK11_URI_INVALID	1
121 #define	PK11_MALLOC_ERROR	2
122 #define	PK11_URI_VALUE_OVERFLOW	3
123 #define	PK11_NOT_PKCS11_URI	4
124 
125 /*
126  * There is no limit for the attribute length in the spec. 256 bytes should be
127  * enough for the object name.
128  */
129 #define	PK11_MAX_OBJECT_LEN		256
130 /*
131  * CKA_ID is of type "byte array" which can be of arbitrary length. 256 bytes
132  * should be sufficient though.
133  */
134 #define	PK11_MAX_ID_LEN			256
135 
136 /* Structure for the PKCS#11 URI. */
137 typedef struct pkcs11_uri_t {
138 	/* CKA_LABEL attribute to the C_FindObjectsInit function. */
139 	CK_UTF8CHAR_PTR	object;
140 	/*
141 	 * CKA_CLASS attribute to the C_FindObjectsInit function. The
142 	 * "objecttype" URI attribute can have a value one of "private",
143 	 * "public", "cert", "secretkey", and "data". The "objecttype" field can
144 	 * have a value of CKO_PUBLIC_KEY, CKO_PRIVATE_KEY, CKO_CERTIFICATE,
145 	 * CKO_SECRET_KEY, and CKO_DATA. This attribute cannot be empty in the
146 	 * URI.
147 	 */
148 	CK_ULONG	objecttype;
149 	/* CKO_DATA is 0 so we need this flag. Not part of the URI itself. */
150 	boolean_t	objecttype_present;
151 	/*
152 	 * Token, manufufacturer, serial and model are of fixed size length in
153 	 * the specification. We allocate memory on the fly to distinguish
154 	 * between an attribute not present and an empty value. We check for
155 	 * overflows. We always terminate the string with '\0' even when that is
156 	 * not used in the PKCS#11's CK_TOKEN_INFO structure (fields are padded
157 	 * with spaces).
158 	 */
159 	/* Token label from CK_TOKEN_INFO. */
160 	CK_UTF8CHAR_PTR	token;
161 	/* ManufacturerID from CK_TOKEN_INFO. */
162 	CK_UTF8CHAR_PTR	manuf;
163 	/* SerialNumber from CK_TOKEN_INFO. */
164 	CK_CHAR_PTR	serial;
165 	/* Model from CK_TOKEN_INFO. */
166 	CK_UTF8CHAR_PTR	model;
167 	/* This is a byte array, we need a length parameter as well. */
168 	CK_BYTE_PTR	id;
169 	int		id_len;
170 	/*
171 	 * Location of the file with a token PIN. Application can overload this,
172 	 * eg. "/bin/askpass|" may mean to read the PIN from a command. However,
173 	 * the pkcs11_parse_uri() function does not interpret this field in any
174 	 * way.
175 	 */
176 	char		*pinfile;
177 } pkcs11_uri_t;
178 
179 extern void cryptodebug(const char *fmt, ...);
180 extern void cryptoerror(int priority, const char *fmt, ...);
181 extern void cryptodebug_init(const char *prefix);
182 extern void cryptoerror_off();
183 extern void cryptoerror_on();
184 
185 extern const char *pkcs11_mech2str(CK_MECHANISM_TYPE mech);
186 extern CK_RV pkcs11_str2mech(char *mech_str, CK_MECHANISM_TYPE_PTR mech);
187 
188 extern int get_pkcs11conf_info(uentrylist_t **);
189 extern umechlist_t *create_umech(char *);
190 extern void free_umechlist(umechlist_t *);
191 extern void free_uentrylist(uentrylist_t *);
192 extern void free_uentry(uentry_t *);
193 extern uentry_t *getent_uef(char *);
194 
195 extern void tohexstr(uchar_t *bytes, size_t blen, char *hexstr, size_t hexlen);
196 extern int hexstr_to_bytes(char *hexstr, size_t hexlen, uchar_t **bytes,
197     size_t *blen);
198 extern CK_RV pkcs11_mech2keytype(CK_MECHANISM_TYPE mech_type,
199     CK_KEY_TYPE *ktype);
200 extern CK_RV pkcs11_mech2keygen(CK_MECHANISM_TYPE mech_type,
201     CK_MECHANISM_TYPE *gen_mech);
202 extern char *pkcs11_strerror(CK_RV rv);
203 
204 extern int
205 get_metaslot_info(boolean_t  *status_enabled, boolean_t *migrate_enabled,
206     char **objectstore_slot_info, char **objectstore_token_info);
207 
208 extern char *get_fullpath(char *dir, char *filepath);
209 extern int str2lifetime(char *ltimestr, uint32_t *ltime);
210 
211 extern char *pkcs11_default_token(void);
212 extern int pkcs11_get_pass(char *token_name, char **pdata, size_t *psize,
213     size_t min_psize, boolean_t with_confirmation);
214 
215 extern int pkcs11_seed_urandom(void *sbuf, size_t slen);
216 extern int pkcs11_get_random(void *dbuf, size_t dlen);
217 extern int pkcs11_get_urandom(void *dbuf, size_t dlen);
218 extern int pkcs11_get_nzero_urandom(void *dbuf, size_t dlen);
219 extern void pkcs11_close_random(void);
220 extern void pkcs11_close_urandom(void);
221 extern void pkcs11_close_urandom_seed(void);
222 extern int pkcs11_read_data(char *filename, void **dbuf, size_t *dlen);
223 
224 extern int open_nointr(const char *path, int oflag, ...);
225 extern ssize_t readn_nointr(int fd, void *dbuf, size_t dlen);
226 extern ssize_t writen_nointr(int fd, void *dbuf, size_t dlen);
227 extern int update_conf(char *conf_file, char *entry);
228 
229 extern int pkcs11_parse_uri(const char *str, pkcs11_uri_t *uri);
230 extern void pkcs11_free_uri(pkcs11_uri_t *uri);
231 
232 #ifdef __cplusplus
233 }
234 #endif
235 
236 #endif /* _CRYPTOUTIL_H */
237