17c478bd9Sstevel@tonic-gate /* 27c478bd9Sstevel@tonic-gate * CDDL HEADER START 37c478bd9Sstevel@tonic-gate * 47c478bd9Sstevel@tonic-gate * The contents of this file are subject to the terms of the 5c197cb9dShylee * Common Development and Distribution License (the "License"). 6c197cb9dShylee * You may not use this file except in compliance with the License. 77c478bd9Sstevel@tonic-gate * 87c478bd9Sstevel@tonic-gate * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 97c478bd9Sstevel@tonic-gate * or http://www.opensolaris.org/os/licensing. 107c478bd9Sstevel@tonic-gate * See the License for the specific language governing permissions 117c478bd9Sstevel@tonic-gate * and limitations under the License. 127c478bd9Sstevel@tonic-gate * 137c478bd9Sstevel@tonic-gate * When distributing Covered Code, include this CDDL HEADER in each 147c478bd9Sstevel@tonic-gate * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 157c478bd9Sstevel@tonic-gate * If applicable, add the following below this CDDL HEADER, with the 167c478bd9Sstevel@tonic-gate * fields enclosed by brackets "[]" replaced with your own identifying 177c478bd9Sstevel@tonic-gate * information: Portions Copyright [yyyy] [name of copyright owner] 187c478bd9Sstevel@tonic-gate * 197c478bd9Sstevel@tonic-gate * CDDL HEADER END 207c478bd9Sstevel@tonic-gate */ 2154da5c1fSjk115741 /* Portions Copyright 2005 Richard Lowe */ 227c478bd9Sstevel@tonic-gate /* 23c197cb9dShylee * Copyright 2007 Sun Microsystems, Inc. All rights reserved. 247c478bd9Sstevel@tonic-gate * Use is subject to license terms. 257c478bd9Sstevel@tonic-gate */ 267c478bd9Sstevel@tonic-gate 277c478bd9Sstevel@tonic-gate #pragma ident "%Z%%M% %I% %E% SMI" 287c478bd9Sstevel@tonic-gate 297c478bd9Sstevel@tonic-gate /* 307c478bd9Sstevel@tonic-gate * decrypt.c 317c478bd9Sstevel@tonic-gate * 327c478bd9Sstevel@tonic-gate * Implements encrypt(1) and decrypt(1) commands 337c478bd9Sstevel@tonic-gate * 347c478bd9Sstevel@tonic-gate * One binary performs both encrypt/decrypt operation. 357c478bd9Sstevel@tonic-gate * 367c478bd9Sstevel@tonic-gate * usage: 377c478bd9Sstevel@tonic-gate * 387c478bd9Sstevel@tonic-gate * algorithm - mechanism name without CKM_ prefix. Case 397c478bd9Sstevel@tonic-gate * does not matter 407c478bd9Sstevel@tonic-gate * keyfile - file containing key data. If not specified user is 417c478bd9Sstevel@tonic-gate * prompted to enter key. key length > 0 is required 427c478bd9Sstevel@tonic-gate * infile - input file to encrypt/decrypt. If omitted, stdin used. 437c478bd9Sstevel@tonic-gate * outfile - output file to encrypt/decrypt. If omitted, stdout used. 447c478bd9Sstevel@tonic-gate * if infile & outfile are same, a temp file is used for 457c478bd9Sstevel@tonic-gate * output and infile is replaced with this file after 467c478bd9Sstevel@tonic-gate * operation is complete. 477c478bd9Sstevel@tonic-gate * 487c478bd9Sstevel@tonic-gate * Implementation notes: 497c478bd9Sstevel@tonic-gate * iv data - It is generated by random bytes equal to one block size. 507c478bd9Sstevel@tonic-gate * 517c478bd9Sstevel@tonic-gate * encrypted output format - 527c478bd9Sstevel@tonic-gate * - Output format version number - 4 bytes in network byte order. 537c478bd9Sstevel@tonic-gate * - Iterations used in key gen function, 4 bytes in network byte order. 547c478bd9Sstevel@tonic-gate * - IV ( 'ivlen' bytes) 557c478bd9Sstevel@tonic-gate * - Salt data used in key gen (16 bytes) 567c478bd9Sstevel@tonic-gate * - cipher text data. 577c478bd9Sstevel@tonic-gate * 587c478bd9Sstevel@tonic-gate */ 597c478bd9Sstevel@tonic-gate 607c478bd9Sstevel@tonic-gate #include <stdio.h> 617c478bd9Sstevel@tonic-gate #include <stdlib.h> 627c478bd9Sstevel@tonic-gate #include <unistd.h> 637c478bd9Sstevel@tonic-gate #include <errno.h> 647c478bd9Sstevel@tonic-gate #include <fcntl.h> 657c478bd9Sstevel@tonic-gate #include <ctype.h> 667c478bd9Sstevel@tonic-gate #include <strings.h> 677c478bd9Sstevel@tonic-gate #include <libintl.h> 687c478bd9Sstevel@tonic-gate #include <libgen.h> 697c478bd9Sstevel@tonic-gate #include <locale.h> 707c478bd9Sstevel@tonic-gate #include <limits.h> 717c478bd9Sstevel@tonic-gate #include <sys/types.h> 727c478bd9Sstevel@tonic-gate #include <sys/stat.h> 737c478bd9Sstevel@tonic-gate #include <netinet/in.h> 747c478bd9Sstevel@tonic-gate #include <security/cryptoki.h> 757c478bd9Sstevel@tonic-gate #include <cryptoutil.h> 76c197cb9dShylee #include <kmfapi.h> 777c478bd9Sstevel@tonic-gate 787c478bd9Sstevel@tonic-gate #define BUFFERSIZE (2048) /* Buffer size for reading file */ 797c478bd9Sstevel@tonic-gate #define BLOCKSIZE (128) /* Largest guess for block size */ 807c478bd9Sstevel@tonic-gate #define PROGRESSSIZE (BUFFERSIZE*20) /* stdin progress indicator size */ 817c478bd9Sstevel@tonic-gate 827c478bd9Sstevel@tonic-gate #define PBKD2_ITERATIONS (1000) 837c478bd9Sstevel@tonic-gate #define PBKD2_SALT_SIZE 16 847c478bd9Sstevel@tonic-gate 857c478bd9Sstevel@tonic-gate #define SUNW_ENCRYPT_FILE_VERSION 1 867c478bd9Sstevel@tonic-gate 877c478bd9Sstevel@tonic-gate /* 887c478bd9Sstevel@tonic-gate * Exit Status codes 897c478bd9Sstevel@tonic-gate */ 907c478bd9Sstevel@tonic-gate #ifndef EXIT_SUCCESS 917c478bd9Sstevel@tonic-gate #define EXIT_SUCCESS 0 /* No errors */ 927c478bd9Sstevel@tonic-gate #define EXIT_FAILURE 1 /* All errors except usage */ 937c478bd9Sstevel@tonic-gate #endif /* EXIT_SUCCESS */ 947c478bd9Sstevel@tonic-gate 957c478bd9Sstevel@tonic-gate #define EXIT_USAGE 2 /* usage/syntax error */ 967c478bd9Sstevel@tonic-gate 977c478bd9Sstevel@tonic-gate #define RANDOM_DEVICE "/dev/urandom" /* random device name */ 987c478bd9Sstevel@tonic-gate 997c478bd9Sstevel@tonic-gate #define ENCRYPT_NAME "encrypt" /* name of encrypt command */ 100c197cb9dShylee #define ENCRYPT_OPTIONS "a:T:K:k:i:o:lv" /* options for encrypt */ 1017c478bd9Sstevel@tonic-gate #define DECRYPT_NAME "decrypt" /* name of decrypt command */ 102c197cb9dShylee #define DECRYPT_OPTIONS "a:T:K:k:i:o:lv" /* options for decrypt */ 103c197cb9dShylee #define DEFAULT_TOKEN_PROMPT "Enter PIN for %s: " 104c197cb9dShylee #define PK_DEFAULT_PK11TOKEN SOFT_TOKEN_LABEL 1057c478bd9Sstevel@tonic-gate 1067c478bd9Sstevel@tonic-gate /* 1077c478bd9Sstevel@tonic-gate * Structure containing info for encrypt/decrypt 1087c478bd9Sstevel@tonic-gate * command 1097c478bd9Sstevel@tonic-gate */ 1107c478bd9Sstevel@tonic-gate struct CommandInfo { 1117c478bd9Sstevel@tonic-gate char *name; /* name of the command */ 1127c478bd9Sstevel@tonic-gate char *options; /* command line options */ 1137c478bd9Sstevel@tonic-gate CK_FLAGS flags; 1147c478bd9Sstevel@tonic-gate CK_ATTRIBUTE_TYPE type; /* type of command */ 1157c478bd9Sstevel@tonic-gate 1167c478bd9Sstevel@tonic-gate /* function pointers for various operations */ 1177c478bd9Sstevel@tonic-gate CK_RV (*Init)(CK_SESSION_HANDLE, CK_MECHANISM_PTR, CK_OBJECT_HANDLE); 1187c478bd9Sstevel@tonic-gate CK_RV (*Update)(CK_SESSION_HANDLE, CK_BYTE_PTR, CK_ULONG, CK_BYTE_PTR, 1197c478bd9Sstevel@tonic-gate CK_ULONG_PTR); 1207c478bd9Sstevel@tonic-gate CK_RV (*Crypt)(CK_SESSION_HANDLE, CK_BYTE_PTR, CK_ULONG, CK_BYTE_PTR, 1217c478bd9Sstevel@tonic-gate CK_ULONG_PTR); 1227c478bd9Sstevel@tonic-gate CK_RV (*Final)(CK_SESSION_HANDLE, CK_BYTE_PTR, CK_ULONG_PTR); 1237c478bd9Sstevel@tonic-gate }; 1247c478bd9Sstevel@tonic-gate 1257c478bd9Sstevel@tonic-gate static struct CommandInfo encrypt_cmd = { 1267c478bd9Sstevel@tonic-gate ENCRYPT_NAME, 1277c478bd9Sstevel@tonic-gate ENCRYPT_OPTIONS, 1287c478bd9Sstevel@tonic-gate CKF_ENCRYPT, 1297c478bd9Sstevel@tonic-gate CKA_ENCRYPT, 1307c478bd9Sstevel@tonic-gate C_EncryptInit, 1317c478bd9Sstevel@tonic-gate C_EncryptUpdate, 1327c478bd9Sstevel@tonic-gate C_Encrypt, 1337c478bd9Sstevel@tonic-gate C_EncryptFinal 1347c478bd9Sstevel@tonic-gate }; 1357c478bd9Sstevel@tonic-gate 1367c478bd9Sstevel@tonic-gate static struct CommandInfo decrypt_cmd = { 1377c478bd9Sstevel@tonic-gate DECRYPT_NAME, 1387c478bd9Sstevel@tonic-gate DECRYPT_OPTIONS, 1397c478bd9Sstevel@tonic-gate CKF_DECRYPT, 1407c478bd9Sstevel@tonic-gate CKA_DECRYPT, 1417c478bd9Sstevel@tonic-gate C_DecryptInit, 1427c478bd9Sstevel@tonic-gate C_DecryptUpdate, 1437c478bd9Sstevel@tonic-gate C_Decrypt, 1447c478bd9Sstevel@tonic-gate C_DecryptFinal 1457c478bd9Sstevel@tonic-gate }; 1467c478bd9Sstevel@tonic-gate 1477c478bd9Sstevel@tonic-gate struct mech_alias { 1487c478bd9Sstevel@tonic-gate CK_MECHANISM_TYPE type; 1497c478bd9Sstevel@tonic-gate char *alias; 1507c478bd9Sstevel@tonic-gate CK_ULONG keysize_min; 1517c478bd9Sstevel@tonic-gate CK_ULONG keysize_max; 1527c478bd9Sstevel@tonic-gate int keysize_unit; 1537c478bd9Sstevel@tonic-gate int ivlen; 1547c478bd9Sstevel@tonic-gate boolean_t available; 1557c478bd9Sstevel@tonic-gate }; 1567c478bd9Sstevel@tonic-gate 1577c478bd9Sstevel@tonic-gate #define MECH_ALIASES_COUNT 4 1587c478bd9Sstevel@tonic-gate 1597c478bd9Sstevel@tonic-gate static struct mech_alias mech_aliases[] = { 1607c478bd9Sstevel@tonic-gate { CKM_AES_CBC_PAD, "aes", ULONG_MAX, 0L, 8, 16, B_FALSE }, 1617c478bd9Sstevel@tonic-gate { CKM_RC4, "arcfour", ULONG_MAX, 0L, 1, 0, B_FALSE }, 1627c478bd9Sstevel@tonic-gate { CKM_DES_CBC_PAD, "des", 8, 8, 8, 8, B_FALSE }, 1637c478bd9Sstevel@tonic-gate { CKM_DES3_CBC_PAD, "3des", 24, 24, 8, 8, B_FALSE }, 1647c478bd9Sstevel@tonic-gate }; 1657c478bd9Sstevel@tonic-gate 1667c478bd9Sstevel@tonic-gate static CK_BBOOL truevalue = TRUE; 1677c478bd9Sstevel@tonic-gate static CK_BBOOL falsevalue = FALSE; 1687c478bd9Sstevel@tonic-gate 1697c478bd9Sstevel@tonic-gate static boolean_t aflag = B_FALSE; /* -a <algorithm> flag, required */ 1707c478bd9Sstevel@tonic-gate static boolean_t kflag = B_FALSE; /* -k <keyfile> flag */ 1717c478bd9Sstevel@tonic-gate static boolean_t iflag = B_FALSE; /* -i <infile> flag, use stdin if absent */ 1727c478bd9Sstevel@tonic-gate static boolean_t oflag = B_FALSE; /* -o <outfile> flag, use stdout if absent */ 1737c478bd9Sstevel@tonic-gate static boolean_t lflag = B_FALSE; /* -l flag (list) */ 1747c478bd9Sstevel@tonic-gate static boolean_t vflag = B_FALSE; /* -v flag (verbose) */ 175c197cb9dShylee static boolean_t Tflag = B_FALSE; 176c197cb9dShylee static boolean_t Kflag = B_FALSE; 1777c478bd9Sstevel@tonic-gate 1787c478bd9Sstevel@tonic-gate static char *keyfile = NULL; /* name of keyfile */ 1797c478bd9Sstevel@tonic-gate static char *inputfile = NULL; /* name of input file */ 1807c478bd9Sstevel@tonic-gate static char *outputfile = NULL; /* name of output file */ 181c197cb9dShylee static char *token_label = NULL; 182c197cb9dShylee static char *key_label = NULL; 1837c478bd9Sstevel@tonic-gate 1847c478bd9Sstevel@tonic-gate static int status_pos = 0; /* current position of progress bar element */ 1857c478bd9Sstevel@tonic-gate 1867c478bd9Sstevel@tonic-gate /* 1877c478bd9Sstevel@tonic-gate * function prototypes 1887c478bd9Sstevel@tonic-gate */ 1897c478bd9Sstevel@tonic-gate static void usage(struct CommandInfo *cmd); 1907c478bd9Sstevel@tonic-gate static int execute_cmd(struct CommandInfo *cmd, char *algo_str); 191c197cb9dShylee static int cryptogetdata(char *, CK_BYTE_PTR *pkeydata, CK_ULONG_PTR pkeysize); 1927c478bd9Sstevel@tonic-gate static int cryptoreadfile(char *filename, CK_BYTE_PTR *pdata, 1937c478bd9Sstevel@tonic-gate CK_ULONG_PTR pdatalen); 1947c478bd9Sstevel@tonic-gate static int get_random_data(CK_BYTE_PTR pivbuf, int ivlen); 1957c478bd9Sstevel@tonic-gate static int crypt_multipart(struct CommandInfo *cmd, CK_SESSION_HANDLE hSession, 19654da5c1fSjk115741 int infd, int outfd, off_t insize); 1977c478bd9Sstevel@tonic-gate 1987c478bd9Sstevel@tonic-gate int 1997c478bd9Sstevel@tonic-gate main(int argc, char **argv) 2007c478bd9Sstevel@tonic-gate { 2017c478bd9Sstevel@tonic-gate 2027c478bd9Sstevel@tonic-gate extern char *optarg; 2037c478bd9Sstevel@tonic-gate extern int optind; 2047c478bd9Sstevel@tonic-gate char *optstr; 2057c478bd9Sstevel@tonic-gate char c; /* current getopts flag */ 2067c478bd9Sstevel@tonic-gate char *algo_str = NULL; /* algorithm string */ 2077c478bd9Sstevel@tonic-gate struct CommandInfo *cmd; 2087c478bd9Sstevel@tonic-gate char *cmdname; /* name of command */ 2097c478bd9Sstevel@tonic-gate boolean_t errflag = B_FALSE; 2107c478bd9Sstevel@tonic-gate 2117c478bd9Sstevel@tonic-gate (void) setlocale(LC_ALL, ""); 2127c478bd9Sstevel@tonic-gate #if !defined(TEXT_DOMAIN) /* Should be defiend by cc -D */ 2137c478bd9Sstevel@tonic-gate #define TEXT_DOMAIN "SYS_TEST" /* Use this only if it weren't */ 2147c478bd9Sstevel@tonic-gate #endif 2157c478bd9Sstevel@tonic-gate (void) textdomain(TEXT_DOMAIN); 2167c478bd9Sstevel@tonic-gate 2177c478bd9Sstevel@tonic-gate /* 2187c478bd9Sstevel@tonic-gate * Based on command name, determine 2197c478bd9Sstevel@tonic-gate * type of command. 2207c478bd9Sstevel@tonic-gate */ 2217c478bd9Sstevel@tonic-gate cmdname = basename(argv[0]); 2227c478bd9Sstevel@tonic-gate 2237c478bd9Sstevel@tonic-gate cryptodebug_init(cmdname); 2247c478bd9Sstevel@tonic-gate 2257c478bd9Sstevel@tonic-gate if (strcmp(cmdname, encrypt_cmd.name) == 0) { 2267c478bd9Sstevel@tonic-gate cmd = &encrypt_cmd; 2277c478bd9Sstevel@tonic-gate } else if (strcmp(cmdname, decrypt_cmd.name) == 0) { 2287c478bd9Sstevel@tonic-gate cmd = &decrypt_cmd; 2297c478bd9Sstevel@tonic-gate } else { 2307c478bd9Sstevel@tonic-gate cryptoerror(LOG_STDERR, gettext( 2317c478bd9Sstevel@tonic-gate "command name must be either encrypt or decrypt")); 2327c478bd9Sstevel@tonic-gate exit(EXIT_USAGE); 2337c478bd9Sstevel@tonic-gate } 2347c478bd9Sstevel@tonic-gate 2357c478bd9Sstevel@tonic-gate optstr = cmd->options; 2367c478bd9Sstevel@tonic-gate 2377c478bd9Sstevel@tonic-gate /* Parse command line arguments */ 2387c478bd9Sstevel@tonic-gate while (!errflag && (c = getopt(argc, argv, optstr)) != -1) { 2397c478bd9Sstevel@tonic-gate 2407c478bd9Sstevel@tonic-gate switch (c) { 2417c478bd9Sstevel@tonic-gate case 'a': 2427c478bd9Sstevel@tonic-gate aflag = B_TRUE; 2437c478bd9Sstevel@tonic-gate algo_str = optarg; 2447c478bd9Sstevel@tonic-gate break; 2457c478bd9Sstevel@tonic-gate case 'k': 2467c478bd9Sstevel@tonic-gate kflag = B_TRUE; 2477c478bd9Sstevel@tonic-gate keyfile = optarg; 2487c478bd9Sstevel@tonic-gate break; 249c197cb9dShylee case 'T': 250c197cb9dShylee Tflag = B_TRUE; 251c197cb9dShylee token_label = optarg; 252c197cb9dShylee break; 253c197cb9dShylee case 'K': 254c197cb9dShylee Kflag = B_TRUE; 255c197cb9dShylee key_label = optarg; 256c197cb9dShylee break; 2577c478bd9Sstevel@tonic-gate case 'i': 2587c478bd9Sstevel@tonic-gate iflag = B_TRUE; 2597c478bd9Sstevel@tonic-gate inputfile = optarg; 2607c478bd9Sstevel@tonic-gate break; 2617c478bd9Sstevel@tonic-gate case 'o': 2627c478bd9Sstevel@tonic-gate oflag = B_TRUE; 2637c478bd9Sstevel@tonic-gate outputfile = optarg; 2647c478bd9Sstevel@tonic-gate break; 2657c478bd9Sstevel@tonic-gate case 'l': 2667c478bd9Sstevel@tonic-gate lflag = B_TRUE; 2677c478bd9Sstevel@tonic-gate break; 2687c478bd9Sstevel@tonic-gate case 'v': 2697c478bd9Sstevel@tonic-gate vflag = B_TRUE; 2707c478bd9Sstevel@tonic-gate break; 2717c478bd9Sstevel@tonic-gate default: 2727c478bd9Sstevel@tonic-gate errflag = B_TRUE; 2737c478bd9Sstevel@tonic-gate } 2747c478bd9Sstevel@tonic-gate } 2757c478bd9Sstevel@tonic-gate 2767c478bd9Sstevel@tonic-gate if (errflag || (!aflag && !lflag) || (lflag && argc > 2) || 277c197cb9dShylee (kflag && Kflag) || (Tflag && !Kflag) || 2787c478bd9Sstevel@tonic-gate (optind < argc)) { 2797c478bd9Sstevel@tonic-gate usage(cmd); 2807c478bd9Sstevel@tonic-gate exit(EXIT_USAGE); 2817c478bd9Sstevel@tonic-gate } 2827c478bd9Sstevel@tonic-gate 2837c478bd9Sstevel@tonic-gate return (execute_cmd(cmd, algo_str)); 2847c478bd9Sstevel@tonic-gate } 2857c478bd9Sstevel@tonic-gate 2867c478bd9Sstevel@tonic-gate /* 2877c478bd9Sstevel@tonic-gate * usage message 2887c478bd9Sstevel@tonic-gate */ 2897c478bd9Sstevel@tonic-gate static void 2907c478bd9Sstevel@tonic-gate usage(struct CommandInfo *cmd) 2917c478bd9Sstevel@tonic-gate { 292c197cb9dShylee (void) fprintf(stderr, gettext("Usage:\n")); 2937c478bd9Sstevel@tonic-gate if (cmd->type == CKA_ENCRYPT) { 294c197cb9dShylee (void) fprintf(stderr, gettext(" encrypt -l\n")); 295c197cb9dShylee (void) fprintf(stderr, gettext(" encrypt -a <algorithm> " 296c197cb9dShylee "[-v] [-k <keyfile> | -K <keylabel> [-T <tokenspec>]] " 297c197cb9dShylee "[-i <infile>] [-o <outfile>]\n")); 298c197cb9dShylee 2997c478bd9Sstevel@tonic-gate } else { 300c197cb9dShylee (void) fprintf(stderr, gettext(" decrypt -l\n")); 301c197cb9dShylee (void) fprintf(stderr, gettext(" decrypt -a <algorithm> " 302c197cb9dShylee "[-v] [-k <keyfile> | -K <keylabel> [-T <tokenspec>]] " 303c197cb9dShylee "[-i <infile>] [-o <outfile>]\n")); 3047c478bd9Sstevel@tonic-gate } 3057c478bd9Sstevel@tonic-gate } 3067c478bd9Sstevel@tonic-gate 3077c478bd9Sstevel@tonic-gate /* 3087c478bd9Sstevel@tonic-gate * Print out list of algorithms in default and verbose mode 3097c478bd9Sstevel@tonic-gate */ 3107c478bd9Sstevel@tonic-gate static void 3117c478bd9Sstevel@tonic-gate algorithm_list() 3127c478bd9Sstevel@tonic-gate { 3137c478bd9Sstevel@tonic-gate int mech; 3147c478bd9Sstevel@tonic-gate 3157c478bd9Sstevel@tonic-gate (void) printf(gettext("Algorithm Keysize: Min Max (bits)\n" 3167c478bd9Sstevel@tonic-gate "------------------------------------------\n")); 3177c478bd9Sstevel@tonic-gate 3187c478bd9Sstevel@tonic-gate for (mech = 0; mech < MECH_ALIASES_COUNT; mech++) { 3197c478bd9Sstevel@tonic-gate 3207c478bd9Sstevel@tonic-gate if (mech_aliases[mech].available == B_FALSE) 3217c478bd9Sstevel@tonic-gate continue; 3227c478bd9Sstevel@tonic-gate 3237c478bd9Sstevel@tonic-gate (void) printf("%-15s", mech_aliases[mech].alias); 3247c478bd9Sstevel@tonic-gate 3257c478bd9Sstevel@tonic-gate if (mech_aliases[mech].keysize_min != UINT_MAX && 3267c478bd9Sstevel@tonic-gate mech_aliases[mech].keysize_max != 0) 3277c478bd9Sstevel@tonic-gate (void) printf(" %5lu %5lu\n", 3287c478bd9Sstevel@tonic-gate (mech_aliases[mech].keysize_min * 3297c478bd9Sstevel@tonic-gate mech_aliases[mech].keysize_unit), 3307c478bd9Sstevel@tonic-gate (mech_aliases[mech].keysize_max * 3317c478bd9Sstevel@tonic-gate mech_aliases[mech].keysize_unit)); 3327c478bd9Sstevel@tonic-gate else 3337c478bd9Sstevel@tonic-gate (void) printf("\n"); 3347c478bd9Sstevel@tonic-gate 3357c478bd9Sstevel@tonic-gate } 3367c478bd9Sstevel@tonic-gate } 3377c478bd9Sstevel@tonic-gate 3387c478bd9Sstevel@tonic-gate static CK_RV 3397c478bd9Sstevel@tonic-gate generate_pkcs5_key(CK_SESSION_HANDLE hSession, 3407c478bd9Sstevel@tonic-gate CK_BYTE *pSaltData, 3417c478bd9Sstevel@tonic-gate CK_ULONG saltLen, 3427c478bd9Sstevel@tonic-gate CK_ULONG iterations, 3437c478bd9Sstevel@tonic-gate CK_BYTE *pkeydata, /* user entered passphrase */ 3447c478bd9Sstevel@tonic-gate CK_KEY_TYPE keytype, 3457c478bd9Sstevel@tonic-gate CK_ULONG passwd_size, 3467c478bd9Sstevel@tonic-gate CK_ULONG keylen, /* desired length of generated key */ 3477c478bd9Sstevel@tonic-gate CK_ATTRIBUTE_TYPE operation, 3487c478bd9Sstevel@tonic-gate CK_OBJECT_HANDLE *hKey) 3497c478bd9Sstevel@tonic-gate { 3507c478bd9Sstevel@tonic-gate CK_RV rv; 3517c478bd9Sstevel@tonic-gate CK_PKCS5_PBKD2_PARAMS params; 3527c478bd9Sstevel@tonic-gate CK_MECHANISM mechanism; 3537c478bd9Sstevel@tonic-gate CK_OBJECT_CLASS class = CKO_SECRET_KEY; 3547c478bd9Sstevel@tonic-gate CK_ATTRIBUTE tmpl[4]; 3557c478bd9Sstevel@tonic-gate int attrs = 0; 3567c478bd9Sstevel@tonic-gate 3577c478bd9Sstevel@tonic-gate mechanism.mechanism = CKM_PKCS5_PBKD2; 3587c478bd9Sstevel@tonic-gate mechanism.pParameter = ¶ms; 3597c478bd9Sstevel@tonic-gate mechanism.ulParameterLen = sizeof (params); 3607c478bd9Sstevel@tonic-gate 3617c478bd9Sstevel@tonic-gate tmpl[attrs].type = CKA_CLASS; 3627c478bd9Sstevel@tonic-gate tmpl[attrs].pValue = &class; 3637c478bd9Sstevel@tonic-gate tmpl[attrs].ulValueLen = sizeof (class); 3647c478bd9Sstevel@tonic-gate attrs++; 3657c478bd9Sstevel@tonic-gate 3667c478bd9Sstevel@tonic-gate tmpl[attrs].type = CKA_KEY_TYPE; 3677c478bd9Sstevel@tonic-gate tmpl[attrs].pValue = &keytype; 3687c478bd9Sstevel@tonic-gate tmpl[attrs].ulValueLen = sizeof (keytype); 3697c478bd9Sstevel@tonic-gate attrs++; 3707c478bd9Sstevel@tonic-gate 3717c478bd9Sstevel@tonic-gate tmpl[attrs].type = operation; 3727c478bd9Sstevel@tonic-gate tmpl[attrs].pValue = &truevalue; 3737c478bd9Sstevel@tonic-gate tmpl[attrs].ulValueLen = sizeof (CK_BBOOL); 3747c478bd9Sstevel@tonic-gate attrs++; 3757c478bd9Sstevel@tonic-gate 3767c478bd9Sstevel@tonic-gate if (keylen > 0) { 3777c478bd9Sstevel@tonic-gate tmpl[attrs].type = CKA_VALUE_LEN; 3787c478bd9Sstevel@tonic-gate tmpl[attrs].pValue = &keylen; 3797c478bd9Sstevel@tonic-gate tmpl[attrs].ulValueLen = sizeof (keylen); 3807c478bd9Sstevel@tonic-gate attrs++; 3817c478bd9Sstevel@tonic-gate } 3827c478bd9Sstevel@tonic-gate 3837c478bd9Sstevel@tonic-gate params.saltSource = CKZ_SALT_SPECIFIED; 3847c478bd9Sstevel@tonic-gate params.pSaltSourceData = (void *)pSaltData; 3857c478bd9Sstevel@tonic-gate params.ulSaltSourceDataLen = saltLen; 3867c478bd9Sstevel@tonic-gate params.iterations = iterations; 3877c478bd9Sstevel@tonic-gate params.prf = CKP_PKCS5_PBKD2_HMAC_SHA1; 3887c478bd9Sstevel@tonic-gate params.pPrfData = NULL; 3897c478bd9Sstevel@tonic-gate params.ulPrfDataLen = 0; 3907c478bd9Sstevel@tonic-gate params.pPassword = (CK_UTF8CHAR_PTR)pkeydata; 3917c478bd9Sstevel@tonic-gate params.ulPasswordLen = &passwd_size; 3927c478bd9Sstevel@tonic-gate 3937c478bd9Sstevel@tonic-gate mechanism.mechanism = CKM_PKCS5_PBKD2; 3947c478bd9Sstevel@tonic-gate mechanism.pParameter = ¶ms; 3957c478bd9Sstevel@tonic-gate mechanism.ulParameterLen = sizeof (params); 3967c478bd9Sstevel@tonic-gate 3977c478bd9Sstevel@tonic-gate rv = C_GenerateKey(hSession, &mechanism, tmpl, 3987c478bd9Sstevel@tonic-gate attrs, hKey); 3997c478bd9Sstevel@tonic-gate 4007c478bd9Sstevel@tonic-gate return (rv); 4017c478bd9Sstevel@tonic-gate } 4027c478bd9Sstevel@tonic-gate 403c197cb9dShylee /* 404c197cb9dShylee * This function will login into the token with the provided password and 405c197cb9dShylee * find the token key object with the specified keytype and keylabel. 406c197cb9dShylee */ 407c197cb9dShylee static int 408c197cb9dShylee get_token_key(CK_SESSION_HANDLE hSession, CK_KEY_TYPE keytype, 409c197cb9dShylee char *keylabel, CK_BYTE *password, int password_len, 410c197cb9dShylee CK_OBJECT_HANDLE *keyobj) 411c197cb9dShylee { 412c197cb9dShylee CK_RV rv; 413c197cb9dShylee CK_ATTRIBUTE pTmpl[10]; 414c197cb9dShylee CK_OBJECT_CLASS class = CKO_SECRET_KEY; 415c197cb9dShylee CK_BBOOL true = 1; 416c197cb9dShylee CK_BBOOL is_token = 1; 417c197cb9dShylee CK_ULONG key_obj_count = 1; 418c197cb9dShylee int i; 419c197cb9dShylee CK_KEY_TYPE ckKeyType = keytype; 420c197cb9dShylee 421c197cb9dShylee 422c197cb9dShylee rv = C_Login(hSession, CKU_USER, (CK_UTF8CHAR_PTR)password, 423c197cb9dShylee (CK_ULONG)password_len); 424c197cb9dShylee if (rv != CKR_OK) { 425c197cb9dShylee (void) fprintf(stderr, "Cannot login to the token." 426c197cb9dShylee " error = %s\n", pkcs11_strerror(rv)); 427c197cb9dShylee return (-1); 428c197cb9dShylee } 429c197cb9dShylee 430c197cb9dShylee i = 0; 431c197cb9dShylee pTmpl[i].type = CKA_TOKEN; 432c197cb9dShylee pTmpl[i].pValue = &is_token; 433c197cb9dShylee pTmpl[i].ulValueLen = sizeof (CK_BBOOL); 434c197cb9dShylee i++; 435c197cb9dShylee 436c197cb9dShylee pTmpl[i].type = CKA_CLASS; 437c197cb9dShylee pTmpl[i].pValue = &class; 438c197cb9dShylee pTmpl[i].ulValueLen = sizeof (class); 439c197cb9dShylee i++; 440c197cb9dShylee 441c197cb9dShylee pTmpl[i].type = CKA_LABEL; 442c197cb9dShylee pTmpl[i].pValue = keylabel; 443c197cb9dShylee pTmpl[i].ulValueLen = strlen(keylabel); 444c197cb9dShylee i++; 445c197cb9dShylee 446c197cb9dShylee pTmpl[i].type = CKA_KEY_TYPE; 447c197cb9dShylee pTmpl[i].pValue = &ckKeyType; 448c197cb9dShylee pTmpl[i].ulValueLen = sizeof (ckKeyType); 449c197cb9dShylee i++; 450c197cb9dShylee 451c197cb9dShylee pTmpl[i].type = CKA_PRIVATE; 452c197cb9dShylee pTmpl[i].pValue = &true; 453c197cb9dShylee pTmpl[i].ulValueLen = sizeof (true); 454c197cb9dShylee i++; 455c197cb9dShylee 456c197cb9dShylee rv = C_FindObjectsInit(hSession, pTmpl, i); 457c197cb9dShylee if (rv != CKR_OK) { 458c197cb9dShylee goto out; 459c197cb9dShylee } 460c197cb9dShylee 461c197cb9dShylee rv = C_FindObjects(hSession, keyobj, 1, &key_obj_count); 462c197cb9dShylee 463c197cb9dShylee (void) C_FindObjectsFinal(hSession); 464c197cb9dShylee 465c197cb9dShylee out: 466c197cb9dShylee if (rv != CKR_OK) { 467c197cb9dShylee (void) fprintf(stderr, 468c197cb9dShylee "Cannot retrieve key object. error = %s\n", 469c197cb9dShylee pkcs11_strerror(rv)); 470c197cb9dShylee return (-1); 471c197cb9dShylee } 472c197cb9dShylee 473c197cb9dShylee if (key_obj_count == 0) { 474c197cb9dShylee (void) fprintf(stderr, "Cannot find the key object.\n"); 475c197cb9dShylee return (-1); 476c197cb9dShylee } 477c197cb9dShylee 478c197cb9dShylee return (0); 479c197cb9dShylee } 480c197cb9dShylee 4817c478bd9Sstevel@tonic-gate 4827c478bd9Sstevel@tonic-gate /* 4837c478bd9Sstevel@tonic-gate * Execute the command. 4847c478bd9Sstevel@tonic-gate * cmd - command pointing to type of operation. 4857c478bd9Sstevel@tonic-gate * algo_str - alias of the algorithm passed. 4867c478bd9Sstevel@tonic-gate */ 4877c478bd9Sstevel@tonic-gate static int 4887c478bd9Sstevel@tonic-gate execute_cmd(struct CommandInfo *cmd, char *algo_str) 4897c478bd9Sstevel@tonic-gate { 4907c478bd9Sstevel@tonic-gate CK_RV rv; 4917c478bd9Sstevel@tonic-gate CK_ULONG slotcount; 4927c478bd9Sstevel@tonic-gate CK_SLOT_ID slotID; 4937c478bd9Sstevel@tonic-gate CK_SLOT_ID_PTR pSlotList = NULL; 4947c478bd9Sstevel@tonic-gate CK_MECHANISM_TYPE mech_type = 0; 4957c478bd9Sstevel@tonic-gate CK_MECHANISM_INFO info, kg_info; 4967c478bd9Sstevel@tonic-gate CK_MECHANISM mech; 4977c478bd9Sstevel@tonic-gate CK_SESSION_HANDLE hSession = CK_INVALID_HANDLE; 4987c478bd9Sstevel@tonic-gate CK_BYTE_PTR pkeydata = NULL; 4997c478bd9Sstevel@tonic-gate CK_BYTE salt[PBKD2_SALT_SIZE]; 5007c478bd9Sstevel@tonic-gate CK_ULONG keysize = 0; 5017c478bd9Sstevel@tonic-gate int i, slot, mek; /* index variables */ 5027c478bd9Sstevel@tonic-gate int status; 5037c478bd9Sstevel@tonic-gate struct stat insbuf; /* stat buf for infile */ 5047c478bd9Sstevel@tonic-gate struct stat outsbuf; /* stat buf for outfile */ 5057c478bd9Sstevel@tonic-gate char tmpnam[PATH_MAX]; /* tmp file name */ 5067c478bd9Sstevel@tonic-gate CK_OBJECT_HANDLE key = (CK_OBJECT_HANDLE) 0; 5077c478bd9Sstevel@tonic-gate int infd = 0; /* input file, stdin default */ 5087c478bd9Sstevel@tonic-gate int outfd = 1; /* output file, stdout default */ 5097c478bd9Sstevel@tonic-gate char *outfilename = NULL; 5107c478bd9Sstevel@tonic-gate boolean_t errflag = B_TRUE; 5117c478bd9Sstevel@tonic-gate boolean_t inoutsame = B_FALSE; /* if both input & output are same */ 5127c478bd9Sstevel@tonic-gate CK_BYTE_PTR pivbuf = NULL_PTR; 5137c478bd9Sstevel@tonic-gate CK_ULONG ivlen = 0L; 5147c478bd9Sstevel@tonic-gate int mech_match = 0; 5157c478bd9Sstevel@tonic-gate CK_ULONG iterations = PBKD2_ITERATIONS; 5167c478bd9Sstevel@tonic-gate CK_ULONG keylen; 5177c478bd9Sstevel@tonic-gate int version = SUNW_ENCRYPT_FILE_VERSION; 5187c478bd9Sstevel@tonic-gate CK_KEY_TYPE keytype; 519c197cb9dShylee KMF_RETURN kmfrv; 520c197cb9dShylee CK_SLOT_ID token_slot_id; 5217c478bd9Sstevel@tonic-gate 5227c478bd9Sstevel@tonic-gate if (aflag) { 5237c478bd9Sstevel@tonic-gate /* Determine if algorithm is valid */ 5247c478bd9Sstevel@tonic-gate for (mech_match = 0; mech_match < MECH_ALIASES_COUNT; 5257c478bd9Sstevel@tonic-gate mech_match++) { 5267c478bd9Sstevel@tonic-gate if (strcmp(algo_str, 5277c478bd9Sstevel@tonic-gate mech_aliases[mech_match].alias) == 0) { 5287c478bd9Sstevel@tonic-gate mech_type = mech_aliases[mech_match].type; 5297c478bd9Sstevel@tonic-gate break; 5307c478bd9Sstevel@tonic-gate } 5317c478bd9Sstevel@tonic-gate } 5327c478bd9Sstevel@tonic-gate 5337c478bd9Sstevel@tonic-gate if (mech_match == MECH_ALIASES_COUNT) { 5347c478bd9Sstevel@tonic-gate cryptoerror(LOG_STDERR, 5357c478bd9Sstevel@tonic-gate gettext("unknown algorithm -- %s"), algo_str); 5367c478bd9Sstevel@tonic-gate return (EXIT_FAILURE); 5377c478bd9Sstevel@tonic-gate } 5387c478bd9Sstevel@tonic-gate 5397c478bd9Sstevel@tonic-gate /* 540c197cb9dShylee * Process keyfile or get the token pin if -K is specified. 5417c478bd9Sstevel@tonic-gate * 5427c478bd9Sstevel@tonic-gate * If a keyfile is provided, get the key data from 5437c478bd9Sstevel@tonic-gate * the file. Otherwise, prompt for a passphrase. The 5447c478bd9Sstevel@tonic-gate * passphrase is used as the key data. 5457c478bd9Sstevel@tonic-gate */ 546c197cb9dShylee if (Kflag) { 547c197cb9dShylee /* get the pin of the token */ 548c197cb9dShylee if (token_label == NULL || !strlen(token_label)) { 549c197cb9dShylee token_label = PK_DEFAULT_PK11TOKEN; 550c197cb9dShylee } 551c197cb9dShylee 552c197cb9dShylee status = cryptogetdata(token_label, &pkeydata, 553c197cb9dShylee &keysize); 554c197cb9dShylee } else if (kflag) { 555c197cb9dShylee /* get the key file */ 5567c478bd9Sstevel@tonic-gate status = cryptoreadfile(keyfile, &pkeydata, &keysize); 5577c478bd9Sstevel@tonic-gate } else { 558c197cb9dShylee /* get the key from input */ 559c197cb9dShylee status = cryptogetdata(NULL, &pkeydata, &keysize); 5607c478bd9Sstevel@tonic-gate } 5617c478bd9Sstevel@tonic-gate 5627c478bd9Sstevel@tonic-gate if (status == -1 || keysize == 0L) { 563c197cb9dShylee cryptoerror(LOG_STDERR, 564c197cb9dShylee Kflag ? gettext("invalid password.") : 565c197cb9dShylee gettext("invalid key.")); 5667c478bd9Sstevel@tonic-gate return (EXIT_FAILURE); 5677c478bd9Sstevel@tonic-gate } 5687c478bd9Sstevel@tonic-gate } 5697c478bd9Sstevel@tonic-gate 5707c478bd9Sstevel@tonic-gate bzero(salt, sizeof (salt)); 5717c478bd9Sstevel@tonic-gate /* Initialize pkcs */ 572c197cb9dShylee rv = C_Initialize(NULL); 573c197cb9dShylee if (rv != CKR_OK && rv != CKR_CRYPTOKI_ALREADY_INITIALIZED) { 5747c478bd9Sstevel@tonic-gate cryptoerror(LOG_STDERR, gettext("failed to initialize " 5757c478bd9Sstevel@tonic-gate "PKCS #11 framework: %s"), pkcs11_strerror(rv)); 5767c478bd9Sstevel@tonic-gate goto cleanup; 5777c478bd9Sstevel@tonic-gate } 5787c478bd9Sstevel@tonic-gate 5797c478bd9Sstevel@tonic-gate /* Get slot count */ 5807c478bd9Sstevel@tonic-gate rv = C_GetSlotList(0, NULL_PTR, &slotcount); 5817c478bd9Sstevel@tonic-gate if (rv != CKR_OK || slotcount == 0) { 5827c478bd9Sstevel@tonic-gate cryptoerror(LOG_STDERR, gettext( 5837c478bd9Sstevel@tonic-gate "failed to find any cryptographic provider," 5847c478bd9Sstevel@tonic-gate "please check with your system administrator: %s"), 5857c478bd9Sstevel@tonic-gate pkcs11_strerror(rv)); 5867c478bd9Sstevel@tonic-gate goto cleanup; 5877c478bd9Sstevel@tonic-gate } 5887c478bd9Sstevel@tonic-gate 5897c478bd9Sstevel@tonic-gate /* Found at least one slot, allocate memory for slot list */ 5907c478bd9Sstevel@tonic-gate pSlotList = malloc(slotcount * sizeof (CK_SLOT_ID)); 5917c478bd9Sstevel@tonic-gate if (pSlotList == NULL_PTR) { 5927c478bd9Sstevel@tonic-gate int err = errno; 5937c478bd9Sstevel@tonic-gate cryptoerror(LOG_STDERR, gettext("malloc: %s"), strerror(err)); 5947c478bd9Sstevel@tonic-gate goto cleanup; 5957c478bd9Sstevel@tonic-gate } 5967c478bd9Sstevel@tonic-gate 5977c478bd9Sstevel@tonic-gate /* Get the list of slots */ 5987c478bd9Sstevel@tonic-gate if ((rv = C_GetSlotList(0, pSlotList, &slotcount)) != CKR_OK) { 5997c478bd9Sstevel@tonic-gate cryptoerror(LOG_STDERR, gettext( 6007c478bd9Sstevel@tonic-gate "failed to find any cryptographic provider," 6017c478bd9Sstevel@tonic-gate "please check with your system administrator: %s"), 6027c478bd9Sstevel@tonic-gate pkcs11_strerror(rv)); 6037c478bd9Sstevel@tonic-gate goto cleanup; 6047c478bd9Sstevel@tonic-gate } 6057c478bd9Sstevel@tonic-gate 6067c478bd9Sstevel@tonic-gate if (lflag) { 6077c478bd9Sstevel@tonic-gate 6087c478bd9Sstevel@tonic-gate /* Iterate through slots */ 6097c478bd9Sstevel@tonic-gate for (slot = 0; slot < slotcount; slot++) { 6107c478bd9Sstevel@tonic-gate 6117c478bd9Sstevel@tonic-gate /* Iterate through each mechanism */ 6127c478bd9Sstevel@tonic-gate for (mek = 0; mek < MECH_ALIASES_COUNT; mek++) { 6137c478bd9Sstevel@tonic-gate rv = C_GetMechanismInfo(pSlotList[slot], 6147c478bd9Sstevel@tonic-gate mech_aliases[mek].type, &info); 6157c478bd9Sstevel@tonic-gate 6167c478bd9Sstevel@tonic-gate if (rv != CKR_OK) 6177c478bd9Sstevel@tonic-gate continue; 6187c478bd9Sstevel@tonic-gate 6197c478bd9Sstevel@tonic-gate /* 6207c478bd9Sstevel@tonic-gate * Set to minimum/maximum key sizes assuming 6217c478bd9Sstevel@tonic-gate * the values available are not 0. 6227c478bd9Sstevel@tonic-gate */ 6237c478bd9Sstevel@tonic-gate if (info.ulMinKeySize && (info.ulMinKeySize < 6247c478bd9Sstevel@tonic-gate mech_aliases[mek].keysize_min)) 6257c478bd9Sstevel@tonic-gate mech_aliases[mek].keysize_min = 6267c478bd9Sstevel@tonic-gate info.ulMinKeySize; 6277c478bd9Sstevel@tonic-gate 6287c478bd9Sstevel@tonic-gate if (info.ulMaxKeySize && (info.ulMaxKeySize > 6297c478bd9Sstevel@tonic-gate mech_aliases[mek].keysize_max)) 6307c478bd9Sstevel@tonic-gate mech_aliases[mek].keysize_max = 6317c478bd9Sstevel@tonic-gate info.ulMaxKeySize; 6327c478bd9Sstevel@tonic-gate 6337c478bd9Sstevel@tonic-gate mech_aliases[mek].available = B_TRUE; 6347c478bd9Sstevel@tonic-gate } 6357c478bd9Sstevel@tonic-gate 6367c478bd9Sstevel@tonic-gate } 6377c478bd9Sstevel@tonic-gate 6387c478bd9Sstevel@tonic-gate algorithm_list(); 6397c478bd9Sstevel@tonic-gate 6407c478bd9Sstevel@tonic-gate errflag = B_FALSE; 6417c478bd9Sstevel@tonic-gate goto cleanup; 6427c478bd9Sstevel@tonic-gate } 6437c478bd9Sstevel@tonic-gate 644c197cb9dShylee 645c197cb9dShylee /* 646c197cb9dShylee * Find a slot with matching mechanism 647c197cb9dShylee * 648c197cb9dShylee * If -K is specified, we find the slot id for the token first, then 649c197cb9dShylee * check if the slot supports the algorithm. 650c197cb9dShylee */ 651c197cb9dShylee i = 0; 652c197cb9dShylee if (Kflag) { 653*30a5e8faSwyllys kmfrv = kmf_pk11_token_lookup(NULL, token_label, 654*30a5e8faSwyllys &token_slot_id); 655c197cb9dShylee if (kmfrv != KMF_OK) { 656c197cb9dShylee cryptoerror(LOG_STDERR, 657c197cb9dShylee gettext("no matching PKCS#11 token")); 658c197cb9dShylee errflag = B_TRUE; 659c197cb9dShylee goto cleanup; 660c197cb9dShylee } 661c197cb9dShylee rv = C_GetMechanismInfo(token_slot_id, mech_type, &info); 662c197cb9dShylee if (rv == CKR_OK && (info.flags & cmd->flags)) 663c197cb9dShylee slotID = token_slot_id; 664c197cb9dShylee else 665c197cb9dShylee i = slotcount; 666c197cb9dShylee } else { 6677c478bd9Sstevel@tonic-gate for (i = 0; i < slotcount; i++) { 6687c478bd9Sstevel@tonic-gate slotID = pSlotList[i]; 6697c478bd9Sstevel@tonic-gate rv = C_GetMechanismInfo(slotID, mech_type, &info); 6707c478bd9Sstevel@tonic-gate if (rv != CKR_OK) { 6717c478bd9Sstevel@tonic-gate continue; /* to the next slot */ 6727c478bd9Sstevel@tonic-gate } else { 6737c478bd9Sstevel@tonic-gate /* 6747c478bd9Sstevel@tonic-gate * If the slot support the crypto, also 6757c478bd9Sstevel@tonic-gate * make sure it supports the correct 6767c478bd9Sstevel@tonic-gate * key generation mech if needed. 6777c478bd9Sstevel@tonic-gate * 6787c478bd9Sstevel@tonic-gate * We need PKCS5 when RC4 is used or 6797c478bd9Sstevel@tonic-gate * when the key is entered on cmd line. 6807c478bd9Sstevel@tonic-gate */ 6817c478bd9Sstevel@tonic-gate if ((info.flags & cmd->flags) && 682c197cb9dShylee (mech_type == CKM_RC4) || 683c197cb9dShylee (keyfile == NULL)) { 6847c478bd9Sstevel@tonic-gate rv = C_GetMechanismInfo(slotID, 6857c478bd9Sstevel@tonic-gate CKM_PKCS5_PBKD2, &kg_info); 6867c478bd9Sstevel@tonic-gate if (rv == CKR_OK) 6877c478bd9Sstevel@tonic-gate break; 6887c478bd9Sstevel@tonic-gate } else if (info.flags & cmd->flags) { 6897c478bd9Sstevel@tonic-gate break; 6907c478bd9Sstevel@tonic-gate } 6917c478bd9Sstevel@tonic-gate } 6927c478bd9Sstevel@tonic-gate } 693c197cb9dShylee } 6947c478bd9Sstevel@tonic-gate 6957c478bd9Sstevel@tonic-gate /* Show error if no matching mechanism found */ 6967c478bd9Sstevel@tonic-gate if (i == slotcount) { 6977c478bd9Sstevel@tonic-gate cryptoerror(LOG_STDERR, 6987c478bd9Sstevel@tonic-gate gettext("no cryptographic provider was " 6997c478bd9Sstevel@tonic-gate "found for this algorithm -- %s"), algo_str); 7007c478bd9Sstevel@tonic-gate goto cleanup; 7017c478bd9Sstevel@tonic-gate } 7027c478bd9Sstevel@tonic-gate 7037c478bd9Sstevel@tonic-gate /* Open a session */ 7047c478bd9Sstevel@tonic-gate rv = C_OpenSession(slotID, CKF_SERIAL_SESSION, 7057c478bd9Sstevel@tonic-gate NULL_PTR, NULL, &hSession); 7067c478bd9Sstevel@tonic-gate 7077c478bd9Sstevel@tonic-gate if (rv != CKR_OK) { 7087c478bd9Sstevel@tonic-gate cryptoerror(LOG_STDERR, 7097c478bd9Sstevel@tonic-gate gettext("can not open PKCS #11 session: %s"), 7107c478bd9Sstevel@tonic-gate pkcs11_strerror(rv)); 7117c478bd9Sstevel@tonic-gate goto cleanup; 7127c478bd9Sstevel@tonic-gate } 7137c478bd9Sstevel@tonic-gate 7147c478bd9Sstevel@tonic-gate /* 7157c478bd9Sstevel@tonic-gate * Generate IV data for encrypt. 7167c478bd9Sstevel@tonic-gate */ 7177c478bd9Sstevel@tonic-gate ivlen = mech_aliases[mech_match].ivlen; 7187c478bd9Sstevel@tonic-gate if ((pivbuf = malloc((size_t)ivlen)) == NULL) { 7197c478bd9Sstevel@tonic-gate int err = errno; 7207c478bd9Sstevel@tonic-gate cryptoerror(LOG_STDERR, gettext("malloc: %s"), 7217c478bd9Sstevel@tonic-gate strerror(err)); 7227c478bd9Sstevel@tonic-gate goto cleanup; 7237c478bd9Sstevel@tonic-gate } 7247c478bd9Sstevel@tonic-gate 7257c478bd9Sstevel@tonic-gate if (cmd->type == CKA_ENCRYPT) { 7267c478bd9Sstevel@tonic-gate if ((get_random_data(pivbuf, 7277c478bd9Sstevel@tonic-gate mech_aliases[mech_match].ivlen)) != 0) { 7287c478bd9Sstevel@tonic-gate cryptoerror(LOG_STDERR, gettext( 7297c478bd9Sstevel@tonic-gate "Unable to generate random " 7307c478bd9Sstevel@tonic-gate "data for initialization vector.")); 7317c478bd9Sstevel@tonic-gate goto cleanup; 7327c478bd9Sstevel@tonic-gate } 7337c478bd9Sstevel@tonic-gate } 7347c478bd9Sstevel@tonic-gate 7357c478bd9Sstevel@tonic-gate /* 7367c478bd9Sstevel@tonic-gate * Create the key object 7377c478bd9Sstevel@tonic-gate */ 7387c478bd9Sstevel@tonic-gate rv = pkcs11_mech2keytype(mech_type, &keytype); 7397c478bd9Sstevel@tonic-gate if (rv != CKR_OK) { 7407c478bd9Sstevel@tonic-gate cryptoerror(LOG_STDERR, 7417c478bd9Sstevel@tonic-gate gettext("unable to find key type for algorithm.")); 7427c478bd9Sstevel@tonic-gate goto cleanup; 7437c478bd9Sstevel@tonic-gate } 7447c478bd9Sstevel@tonic-gate 7457c478bd9Sstevel@tonic-gate /* Open input file */ 7467c478bd9Sstevel@tonic-gate if (iflag) { 7477c478bd9Sstevel@tonic-gate if ((infd = open(inputfile, O_RDONLY | O_NONBLOCK)) == -1) { 7487c478bd9Sstevel@tonic-gate cryptoerror(LOG_STDERR, gettext( 7497c478bd9Sstevel@tonic-gate "can not open input file %s"), inputfile); 7507c478bd9Sstevel@tonic-gate goto cleanup; 7517c478bd9Sstevel@tonic-gate } 7527c478bd9Sstevel@tonic-gate 7537c478bd9Sstevel@tonic-gate /* Get info on input file */ 7547c478bd9Sstevel@tonic-gate if (fstat(infd, &insbuf) == -1) { 7557c478bd9Sstevel@tonic-gate cryptoerror(LOG_STDERR, gettext( 7567c478bd9Sstevel@tonic-gate "can not stat input file %s"), inputfile); 7577c478bd9Sstevel@tonic-gate goto cleanup; 7587c478bd9Sstevel@tonic-gate } 7597c478bd9Sstevel@tonic-gate } 7607c478bd9Sstevel@tonic-gate 7617c478bd9Sstevel@tonic-gate /* 7627c478bd9Sstevel@tonic-gate * Prepare output file 7637c478bd9Sstevel@tonic-gate * If the input & output file are same, 7647c478bd9Sstevel@tonic-gate * the output is written to a temp 7657c478bd9Sstevel@tonic-gate * file first, then renamed to the original file 7667c478bd9Sstevel@tonic-gate * after the crypt operation 7677c478bd9Sstevel@tonic-gate */ 7687c478bd9Sstevel@tonic-gate inoutsame = B_FALSE; 7697c478bd9Sstevel@tonic-gate if (oflag) { 7707c478bd9Sstevel@tonic-gate outfilename = outputfile; 7717c478bd9Sstevel@tonic-gate if ((stat(outputfile, &outsbuf) != -1) && 7727c478bd9Sstevel@tonic-gate (insbuf.st_ino == outsbuf.st_ino)) { 7737c478bd9Sstevel@tonic-gate char *dir; 7747c478bd9Sstevel@tonic-gate 7757c478bd9Sstevel@tonic-gate /* create temp file on same dir */ 7767c478bd9Sstevel@tonic-gate dir = dirname(outputfile); 7777c478bd9Sstevel@tonic-gate (void) snprintf(tmpnam, sizeof (tmpnam), 7787c478bd9Sstevel@tonic-gate "%s/encrXXXXXX", dir); 7797c478bd9Sstevel@tonic-gate outfilename = tmpnam; 7807c478bd9Sstevel@tonic-gate if ((outfd = mkstemp(tmpnam)) == -1) { 7817c478bd9Sstevel@tonic-gate cryptoerror(LOG_STDERR, gettext( 7827c478bd9Sstevel@tonic-gate "cannot create temp file")); 7837c478bd9Sstevel@tonic-gate goto cleanup; 7847c478bd9Sstevel@tonic-gate } 7857c478bd9Sstevel@tonic-gate inoutsame = B_TRUE; 7867c478bd9Sstevel@tonic-gate } else { 7877c478bd9Sstevel@tonic-gate /* Create file for output */ 7887c478bd9Sstevel@tonic-gate if ((outfd = open(outfilename, 789*30a5e8faSwyllys O_CREAT|O_WRONLY|O_TRUNC, 0644)) == -1) { 7907c478bd9Sstevel@tonic-gate cryptoerror(LOG_STDERR, gettext( 7917c478bd9Sstevel@tonic-gate "cannot open output file %s"), 7927c478bd9Sstevel@tonic-gate outfilename); 7937c478bd9Sstevel@tonic-gate goto cleanup; 7947c478bd9Sstevel@tonic-gate } 7957c478bd9Sstevel@tonic-gate } 7967c478bd9Sstevel@tonic-gate } 7977c478bd9Sstevel@tonic-gate 7987c478bd9Sstevel@tonic-gate /* 7997c478bd9Sstevel@tonic-gate * Read the version number from the head of the file 8007c478bd9Sstevel@tonic-gate * to know how to interpret the data that follows. 8017c478bd9Sstevel@tonic-gate */ 8027c478bd9Sstevel@tonic-gate if (cmd->type == CKA_DECRYPT) { 8037c478bd9Sstevel@tonic-gate if (read(infd, &version, sizeof (version)) != 8047c478bd9Sstevel@tonic-gate sizeof (version)) { 8057c478bd9Sstevel@tonic-gate cryptoerror(LOG_STDERR, gettext( 8067c478bd9Sstevel@tonic-gate "failed to get format version from " 8077c478bd9Sstevel@tonic-gate "input file.")); 8087c478bd9Sstevel@tonic-gate goto cleanup; 8097c478bd9Sstevel@tonic-gate } 8107c478bd9Sstevel@tonic-gate /* convert to host byte order */ 8117c478bd9Sstevel@tonic-gate version = ntohl(version); 8127c478bd9Sstevel@tonic-gate 8137c478bd9Sstevel@tonic-gate switch (version) { 8147c478bd9Sstevel@tonic-gate case 1: 8157c478bd9Sstevel@tonic-gate /* 8167c478bd9Sstevel@tonic-gate * Version 1 output format: 8177c478bd9Sstevel@tonic-gate * - Iterations used in key gen function (4 bytes) 8187c478bd9Sstevel@tonic-gate * - IV ( 'ivlen' bytes) 8197c478bd9Sstevel@tonic-gate * - Salt data used in key gen (16 bytes) 8207c478bd9Sstevel@tonic-gate * 8217c478bd9Sstevel@tonic-gate * An encrypted file has IV as first block (0 or 8227c478bd9Sstevel@tonic-gate * more bytes depending on mechanism) followed 8237c478bd9Sstevel@tonic-gate * by cipher text. Get the IV from the encrypted 8247c478bd9Sstevel@tonic-gate * file. 8257c478bd9Sstevel@tonic-gate */ 8267c478bd9Sstevel@tonic-gate /* 8277c478bd9Sstevel@tonic-gate * Read iteration count and salt data. 8287c478bd9Sstevel@tonic-gate */ 8297c478bd9Sstevel@tonic-gate if (read(infd, &iterations, 830*30a5e8faSwyllys sizeof (iterations)) != sizeof (iterations)) { 8317c478bd9Sstevel@tonic-gate cryptoerror(LOG_STDERR, gettext( 8327c478bd9Sstevel@tonic-gate "failed to get iterations from " 8337c478bd9Sstevel@tonic-gate "input file.")); 8347c478bd9Sstevel@tonic-gate goto cleanup; 8357c478bd9Sstevel@tonic-gate } 8367c478bd9Sstevel@tonic-gate /* convert to host byte order */ 8377c478bd9Sstevel@tonic-gate iterations = ntohl(iterations); 8387c478bd9Sstevel@tonic-gate if (ivlen > 0 && 8397c478bd9Sstevel@tonic-gate read(infd, pivbuf, ivlen) != ivlen) { 8407c478bd9Sstevel@tonic-gate cryptoerror(LOG_STDERR, gettext( 8417c478bd9Sstevel@tonic-gate "failed to get initialization " 8427c478bd9Sstevel@tonic-gate "vector from input file.")); 8437c478bd9Sstevel@tonic-gate goto cleanup; 8447c478bd9Sstevel@tonic-gate } 8457c478bd9Sstevel@tonic-gate if (read(infd, salt, sizeof (salt)) 8467c478bd9Sstevel@tonic-gate != sizeof (salt)) { 8477c478bd9Sstevel@tonic-gate cryptoerror(LOG_STDERR, gettext( 8487c478bd9Sstevel@tonic-gate "failed to get salt data from " 8497c478bd9Sstevel@tonic-gate "input file.")); 8507c478bd9Sstevel@tonic-gate goto cleanup; 8517c478bd9Sstevel@tonic-gate } 8527c478bd9Sstevel@tonic-gate break; 8537c478bd9Sstevel@tonic-gate default: 8547c478bd9Sstevel@tonic-gate cryptoerror(LOG_STDERR, gettext( 8557c478bd9Sstevel@tonic-gate "Unrecognized format version read from " 8567c478bd9Sstevel@tonic-gate "input file - expected %d, got %d."), 8577c478bd9Sstevel@tonic-gate SUNW_ENCRYPT_FILE_VERSION, version); 8587c478bd9Sstevel@tonic-gate goto cleanup; 8597c478bd9Sstevel@tonic-gate break; 8607c478bd9Sstevel@tonic-gate } 8617c478bd9Sstevel@tonic-gate } 862c197cb9dShylee 8637c478bd9Sstevel@tonic-gate /* 864c197cb9dShylee * If Kflag is set, let's find the token key now. 865c197cb9dShylee * 866c197cb9dShylee * If Kflag is not set and if encrypting, we need some random 8677c478bd9Sstevel@tonic-gate * salt data to create the key. If decrypting, 8687c478bd9Sstevel@tonic-gate * the salt should come from head of the file 8697c478bd9Sstevel@tonic-gate * to be decrypted. 8707c478bd9Sstevel@tonic-gate */ 871c197cb9dShylee if (Kflag) { 872c197cb9dShylee rv = get_token_key(hSession, keytype, key_label, pkeydata, 873c197cb9dShylee keysize, &key); 874c197cb9dShylee if (rv != CKR_OK) { 875c197cb9dShylee cryptoerror(LOG_STDERR, gettext( 876c197cb9dShylee "Can not find the token key")); 877c197cb9dShylee goto cleanup; 878c197cb9dShylee } else { 879c197cb9dShylee goto do_crypto; 880c197cb9dShylee } 881c197cb9dShylee } else if (cmd->type == CKA_ENCRYPT) { 8827c478bd9Sstevel@tonic-gate rv = get_random_data(salt, sizeof (salt)); 8837c478bd9Sstevel@tonic-gate if (rv != 0) { 8847c478bd9Sstevel@tonic-gate cryptoerror(LOG_STDERR, 8857c478bd9Sstevel@tonic-gate gettext("unable to generate random " 8867c478bd9Sstevel@tonic-gate "data for key salt.")); 8877c478bd9Sstevel@tonic-gate goto cleanup; 8887c478bd9Sstevel@tonic-gate } 8897c478bd9Sstevel@tonic-gate } 8907c478bd9Sstevel@tonic-gate 891c197cb9dShylee 8927c478bd9Sstevel@tonic-gate /* 8937c478bd9Sstevel@tonic-gate * If key input is read from a file, treat it as 8947c478bd9Sstevel@tonic-gate * raw key data, unless it is to be used with RC4, 8957c478bd9Sstevel@tonic-gate * in which case it must be used to generate a pkcs5 8967c478bd9Sstevel@tonic-gate * key to address security concerns with RC4 keys. 8977c478bd9Sstevel@tonic-gate */ 8987c478bd9Sstevel@tonic-gate if (kflag && keyfile != NULL && keytype != CKK_RC4) { 8997c478bd9Sstevel@tonic-gate CK_OBJECT_CLASS objclass = CKO_SECRET_KEY; 9007c478bd9Sstevel@tonic-gate CK_ATTRIBUTE template[5]; 9017c478bd9Sstevel@tonic-gate int nattr = 0; 9027c478bd9Sstevel@tonic-gate 9037c478bd9Sstevel@tonic-gate template[nattr].type = CKA_CLASS; 9047c478bd9Sstevel@tonic-gate template[nattr].pValue = &objclass; 9057c478bd9Sstevel@tonic-gate template[nattr].ulValueLen = sizeof (objclass); 9067c478bd9Sstevel@tonic-gate nattr++; 9077c478bd9Sstevel@tonic-gate 9087c478bd9Sstevel@tonic-gate template[nattr].type = CKA_KEY_TYPE; 9097c478bd9Sstevel@tonic-gate template[nattr].pValue = &keytype; 9107c478bd9Sstevel@tonic-gate template[nattr].ulValueLen = sizeof (keytype); 9117c478bd9Sstevel@tonic-gate nattr++; 9127c478bd9Sstevel@tonic-gate 9137c478bd9Sstevel@tonic-gate template[nattr].type = cmd->type; 9147c478bd9Sstevel@tonic-gate template[nattr].pValue = &truevalue; 9157c478bd9Sstevel@tonic-gate template[nattr].ulValueLen = sizeof (truevalue); 9167c478bd9Sstevel@tonic-gate nattr++; 9177c478bd9Sstevel@tonic-gate 9187c478bd9Sstevel@tonic-gate template[nattr].type = CKA_TOKEN; 9197c478bd9Sstevel@tonic-gate template[nattr].pValue = &falsevalue; 9207c478bd9Sstevel@tonic-gate template[nattr].ulValueLen = sizeof (falsevalue); 9217c478bd9Sstevel@tonic-gate nattr++; 9227c478bd9Sstevel@tonic-gate 9237c478bd9Sstevel@tonic-gate template[nattr].type = CKA_VALUE; 9247c478bd9Sstevel@tonic-gate template[nattr].pValue = pkeydata; 9257c478bd9Sstevel@tonic-gate template[nattr].ulValueLen = keysize; 9267c478bd9Sstevel@tonic-gate nattr++; 9277c478bd9Sstevel@tonic-gate 928*30a5e8faSwyllys rv = C_CreateObject(hSession, template, nattr, &key); 9297c478bd9Sstevel@tonic-gate } else { 9307c478bd9Sstevel@tonic-gate /* 9317c478bd9Sstevel@tonic-gate * If the encryption type has a fixed key length, 9327c478bd9Sstevel@tonic-gate * then its not necessary to set the key length 9337c478bd9Sstevel@tonic-gate * parameter when generating the key. 9347c478bd9Sstevel@tonic-gate */ 9357c478bd9Sstevel@tonic-gate if (keytype == CKK_DES || keytype == CKK_DES3) 9367c478bd9Sstevel@tonic-gate keylen = 0; 9377c478bd9Sstevel@tonic-gate else 9387c478bd9Sstevel@tonic-gate keylen = 16; 9397c478bd9Sstevel@tonic-gate 9407c478bd9Sstevel@tonic-gate /* 9417c478bd9Sstevel@tonic-gate * Generate a cryptographically secure key using 9427c478bd9Sstevel@tonic-gate * the key read from the file given (-k keyfile) or 9437c478bd9Sstevel@tonic-gate * the passphrase entered by the user. 9447c478bd9Sstevel@tonic-gate */ 9457c478bd9Sstevel@tonic-gate rv = generate_pkcs5_key(hSession, 946*30a5e8faSwyllys salt, sizeof (salt), iterations, 9477c478bd9Sstevel@tonic-gate pkeydata, keytype, keysize, 9487c478bd9Sstevel@tonic-gate keylen, cmd->type, &key); 9497c478bd9Sstevel@tonic-gate } 9507c478bd9Sstevel@tonic-gate 9517c478bd9Sstevel@tonic-gate if (rv != CKR_OK) { 9527c478bd9Sstevel@tonic-gate cryptoerror(LOG_STDERR, gettext( 9537c478bd9Sstevel@tonic-gate "failed to generate a key: %s"), 9547c478bd9Sstevel@tonic-gate pkcs11_strerror(rv)); 9557c478bd9Sstevel@tonic-gate goto cleanup; 9567c478bd9Sstevel@tonic-gate } 9577c478bd9Sstevel@tonic-gate 958c197cb9dShylee 959c197cb9dShylee do_crypto: 9607c478bd9Sstevel@tonic-gate /* Setup up mechanism */ 9617c478bd9Sstevel@tonic-gate mech.mechanism = mech_type; 9627c478bd9Sstevel@tonic-gate mech.pParameter = (CK_VOID_PTR)pivbuf; 9637c478bd9Sstevel@tonic-gate mech.ulParameterLen = ivlen; 9647c478bd9Sstevel@tonic-gate 9657c478bd9Sstevel@tonic-gate if ((rv = cmd->Init(hSession, &mech, key)) != CKR_OK) { 9667c478bd9Sstevel@tonic-gate cryptoerror(LOG_STDERR, gettext( 9677c478bd9Sstevel@tonic-gate "failed to initialize crypto operation: %s"), 9687c478bd9Sstevel@tonic-gate pkcs11_strerror(rv)); 9697c478bd9Sstevel@tonic-gate goto cleanup; 9707c478bd9Sstevel@tonic-gate } 9717c478bd9Sstevel@tonic-gate 9727c478bd9Sstevel@tonic-gate /* Write the version header encrypt command */ 9737c478bd9Sstevel@tonic-gate if (cmd->type == CKA_ENCRYPT) { 9747c478bd9Sstevel@tonic-gate /* convert to network order for storage */ 9757c478bd9Sstevel@tonic-gate int netversion = htonl(version); 9767c478bd9Sstevel@tonic-gate CK_ULONG netiter; 9777c478bd9Sstevel@tonic-gate 9787c478bd9Sstevel@tonic-gate if (write(outfd, &netversion, sizeof (netversion)) 9797c478bd9Sstevel@tonic-gate != sizeof (netversion)) { 9807c478bd9Sstevel@tonic-gate cryptoerror(LOG_STDERR, gettext( 9817c478bd9Sstevel@tonic-gate "failed to write version number " 9827c478bd9Sstevel@tonic-gate "to output file.")); 9837c478bd9Sstevel@tonic-gate goto cleanup; 9847c478bd9Sstevel@tonic-gate } 9857c478bd9Sstevel@tonic-gate /* 9867c478bd9Sstevel@tonic-gate * Write the iteration and salt data, even if they 9877c478bd9Sstevel@tonic-gate * were not used to generate a key. 9887c478bd9Sstevel@tonic-gate */ 9897c478bd9Sstevel@tonic-gate netiter = htonl(iterations); 9907c478bd9Sstevel@tonic-gate if (write(outfd, &netiter, 9917c478bd9Sstevel@tonic-gate sizeof (netiter)) != sizeof (netiter)) { 9927c478bd9Sstevel@tonic-gate cryptoerror(LOG_STDERR, gettext( 9937c478bd9Sstevel@tonic-gate "failed to write iterations to output")); 9947c478bd9Sstevel@tonic-gate goto cleanup; 9957c478bd9Sstevel@tonic-gate } 996*30a5e8faSwyllys if (ivlen > 0 && write(outfd, pivbuf, ivlen) != ivlen) { 9977c478bd9Sstevel@tonic-gate cryptoerror(LOG_STDERR, gettext( 9987c478bd9Sstevel@tonic-gate "failed to write initialization vector " 9997c478bd9Sstevel@tonic-gate "to output")); 10007c478bd9Sstevel@tonic-gate goto cleanup; 10017c478bd9Sstevel@tonic-gate } 10027c478bd9Sstevel@tonic-gate if (write(outfd, salt, sizeof (salt)) != sizeof (salt)) { 10037c478bd9Sstevel@tonic-gate cryptoerror(LOG_STDERR, gettext( 10047c478bd9Sstevel@tonic-gate "failed to write salt data to output")); 10057c478bd9Sstevel@tonic-gate goto cleanup; 10067c478bd9Sstevel@tonic-gate } 10077c478bd9Sstevel@tonic-gate } 10087c478bd9Sstevel@tonic-gate 100954da5c1fSjk115741 if (crypt_multipart(cmd, hSession, infd, outfd, insbuf.st_size) == -1) { 10107c478bd9Sstevel@tonic-gate goto cleanup; 10117c478bd9Sstevel@tonic-gate } 10127c478bd9Sstevel@tonic-gate 10137c478bd9Sstevel@tonic-gate errflag = B_FALSE; 10147c478bd9Sstevel@tonic-gate 10157c478bd9Sstevel@tonic-gate /* 10167c478bd9Sstevel@tonic-gate * Clean up 10177c478bd9Sstevel@tonic-gate */ 10187c478bd9Sstevel@tonic-gate cleanup: 10197c478bd9Sstevel@tonic-gate /* Clear the key data, so others cannot snoop */ 10207c478bd9Sstevel@tonic-gate if (pkeydata != NULL) { 10217c478bd9Sstevel@tonic-gate bzero(pkeydata, keysize); 10227c478bd9Sstevel@tonic-gate free(pkeydata); 10237c478bd9Sstevel@tonic-gate pkeydata = NULL; 10247c478bd9Sstevel@tonic-gate } 10257c478bd9Sstevel@tonic-gate 10267c478bd9Sstevel@tonic-gate /* Destroy key object */ 1027c197cb9dShylee if (Kflag != B_FALSE && key != (CK_OBJECT_HANDLE) 0) { 10287c478bd9Sstevel@tonic-gate (void) C_DestroyObject(hSession, key); 10297c478bd9Sstevel@tonic-gate } 10307c478bd9Sstevel@tonic-gate 10317c478bd9Sstevel@tonic-gate /* free allocated memory */ 10327c478bd9Sstevel@tonic-gate if (pSlotList != NULL) 10337c478bd9Sstevel@tonic-gate free(pSlotList); 10347c478bd9Sstevel@tonic-gate if (pivbuf != NULL) 10357c478bd9Sstevel@tonic-gate free(pivbuf); 10367c478bd9Sstevel@tonic-gate 10377c478bd9Sstevel@tonic-gate /* close all the files */ 103854da5c1fSjk115741 if (iflag && (infd != -1)) 10397c478bd9Sstevel@tonic-gate (void) close(infd); 104054da5c1fSjk115741 if (oflag && (outfd != -1)) 10417c478bd9Sstevel@tonic-gate (void) close(outfd); 10427c478bd9Sstevel@tonic-gate 10437c478bd9Sstevel@tonic-gate /* rename tmp output to input file */ 10447c478bd9Sstevel@tonic-gate if (inoutsame) { 10457c478bd9Sstevel@tonic-gate if (rename(outfilename, inputfile) == -1) { 10467c478bd9Sstevel@tonic-gate (void) unlink(outfilename); 10477c478bd9Sstevel@tonic-gate cryptoerror(LOG_STDERR, gettext("rename failed.")); 10487c478bd9Sstevel@tonic-gate } 10497c478bd9Sstevel@tonic-gate } 10507c478bd9Sstevel@tonic-gate 10517c478bd9Sstevel@tonic-gate /* If error occurred, remove the output file */ 10527c478bd9Sstevel@tonic-gate if (errflag && outfilename != NULL) { 10537c478bd9Sstevel@tonic-gate (void) unlink(outfilename); 10547c478bd9Sstevel@tonic-gate } 10557c478bd9Sstevel@tonic-gate 10567c478bd9Sstevel@tonic-gate /* close pkcs11 session */ 10577c478bd9Sstevel@tonic-gate if (hSession != CK_INVALID_HANDLE) 10587c478bd9Sstevel@tonic-gate (void) C_CloseSession(hSession); 10597c478bd9Sstevel@tonic-gate 10607c478bd9Sstevel@tonic-gate (void) C_Finalize(NULL); 10617c478bd9Sstevel@tonic-gate 10627c478bd9Sstevel@tonic-gate return (errflag); 10637c478bd9Sstevel@tonic-gate } 10647c478bd9Sstevel@tonic-gate 10657c478bd9Sstevel@tonic-gate /* 10667c478bd9Sstevel@tonic-gate * Function for printing progress bar when the verbose flag 10677c478bd9Sstevel@tonic-gate * is set. 10687c478bd9Sstevel@tonic-gate * 10697c478bd9Sstevel@tonic-gate * The vertical bar is printed at 25, 50, and 75% complete. 10707c478bd9Sstevel@tonic-gate * 10717c478bd9Sstevel@tonic-gate * The function is passed the number of positions on the screen it needs to 10727c478bd9Sstevel@tonic-gate * advance and loops. 10737c478bd9Sstevel@tonic-gate */ 10747c478bd9Sstevel@tonic-gate 10757c478bd9Sstevel@tonic-gate static void 10767c478bd9Sstevel@tonic-gate print_status(int pos_to_advance) 10777c478bd9Sstevel@tonic-gate { 10787c478bd9Sstevel@tonic-gate 10797c478bd9Sstevel@tonic-gate while (pos_to_advance > 0) { 10807c478bd9Sstevel@tonic-gate switch (status_pos) { 10817c478bd9Sstevel@tonic-gate case 0: 10827c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext("[")); 10837c478bd9Sstevel@tonic-gate break; 10847c478bd9Sstevel@tonic-gate case 19: 10857c478bd9Sstevel@tonic-gate case 39: 10867c478bd9Sstevel@tonic-gate case 59: 10877c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext("|")); 10887c478bd9Sstevel@tonic-gate break; 10897c478bd9Sstevel@tonic-gate default: 10907c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(".")); 10917c478bd9Sstevel@tonic-gate } 10927c478bd9Sstevel@tonic-gate pos_to_advance--; 10937c478bd9Sstevel@tonic-gate status_pos++; 10947c478bd9Sstevel@tonic-gate } 10957c478bd9Sstevel@tonic-gate } 10967c478bd9Sstevel@tonic-gate 10977c478bd9Sstevel@tonic-gate /* 10987c478bd9Sstevel@tonic-gate * Encrypt/Decrypt in multi part. 10997c478bd9Sstevel@tonic-gate * 11007c478bd9Sstevel@tonic-gate * This function reads the input file (infd) and writes the 11017c478bd9Sstevel@tonic-gate * encrypted/decrypted output to file (outfd). 11027c478bd9Sstevel@tonic-gate * 11037c478bd9Sstevel@tonic-gate * cmd - pointing to commandinfo 11047c478bd9Sstevel@tonic-gate * hSession - pkcs session 11057c478bd9Sstevel@tonic-gate * infd - input file descriptor 11067c478bd9Sstevel@tonic-gate * outfd - output file descriptor 11077c478bd9Sstevel@tonic-gate * 11087c478bd9Sstevel@tonic-gate */ 11097c478bd9Sstevel@tonic-gate 11107c478bd9Sstevel@tonic-gate static int 11117c478bd9Sstevel@tonic-gate crypt_multipart(struct CommandInfo *cmd, CK_SESSION_HANDLE hSession, 111254da5c1fSjk115741 int infd, int outfd, off_t insize) 11137c478bd9Sstevel@tonic-gate { 11147c478bd9Sstevel@tonic-gate CK_RV rv; 11157c478bd9Sstevel@tonic-gate CK_ULONG resultlen; 11167c478bd9Sstevel@tonic-gate CK_ULONG resultbuflen; 11177c478bd9Sstevel@tonic-gate CK_BYTE_PTR resultbuf; 11187c478bd9Sstevel@tonic-gate CK_ULONG datalen; 11197c478bd9Sstevel@tonic-gate CK_BYTE databuf[BUFFERSIZE]; 11207c478bd9Sstevel@tonic-gate CK_BYTE outbuf[BUFFERSIZE+BLOCKSIZE]; 11217c478bd9Sstevel@tonic-gate CK_ULONG status_index = 0; /* current total file size read */ 11227c478bd9Sstevel@tonic-gate float status_last = 0.0; /* file size of last element used */ 11237c478bd9Sstevel@tonic-gate float status_incr = 0.0; /* file size element increments */ 11247c478bd9Sstevel@tonic-gate int pos; /* # of progress bar elements to be print */ 11257c478bd9Sstevel@tonic-gate ssize_t nread; 11267c478bd9Sstevel@tonic-gate boolean_t errflag = B_FALSE; 11277c478bd9Sstevel@tonic-gate 11287c478bd9Sstevel@tonic-gate datalen = sizeof (databuf); 11297c478bd9Sstevel@tonic-gate resultbuflen = sizeof (outbuf); 11307c478bd9Sstevel@tonic-gate resultbuf = outbuf; 11317c478bd9Sstevel@tonic-gate 11327c478bd9Sstevel@tonic-gate /* Divide into 79 increments for progress bar element spacing */ 11337c478bd9Sstevel@tonic-gate if (vflag && iflag) 113454da5c1fSjk115741 status_incr = (insize / 79.0); 11357c478bd9Sstevel@tonic-gate 11367c478bd9Sstevel@tonic-gate while ((nread = read(infd, databuf, datalen)) > 0) { 11377c478bd9Sstevel@tonic-gate 11387c478bd9Sstevel@tonic-gate /* Start with the initial buffer */ 11397c478bd9Sstevel@tonic-gate resultlen = resultbuflen; 11407c478bd9Sstevel@tonic-gate rv = cmd->Update(hSession, databuf, (CK_ULONG)nread, 11417c478bd9Sstevel@tonic-gate resultbuf, &resultlen); 11427c478bd9Sstevel@tonic-gate 11437c478bd9Sstevel@tonic-gate /* Need a bigger buffer? */ 11447c478bd9Sstevel@tonic-gate if (rv == CKR_BUFFER_TOO_SMALL) { 11457c478bd9Sstevel@tonic-gate 11467c478bd9Sstevel@tonic-gate /* free the old buffer */ 11477c478bd9Sstevel@tonic-gate if (resultbuf != NULL && resultbuf != outbuf) { 11487c478bd9Sstevel@tonic-gate bzero(resultbuf, resultbuflen); 11497c478bd9Sstevel@tonic-gate free(resultbuf); 11507c478bd9Sstevel@tonic-gate } 11517c478bd9Sstevel@tonic-gate 11527c478bd9Sstevel@tonic-gate /* allocate a new big buffer */ 11537c478bd9Sstevel@tonic-gate if ((resultbuf = malloc((size_t)resultlen)) == NULL) { 11547c478bd9Sstevel@tonic-gate int err = errno; 11557c478bd9Sstevel@tonic-gate cryptoerror(LOG_STDERR, gettext("malloc: %s"), 11567c478bd9Sstevel@tonic-gate strerror(err)); 11577c478bd9Sstevel@tonic-gate return (-1); 11587c478bd9Sstevel@tonic-gate } 11597c478bd9Sstevel@tonic-gate resultbuflen = resultlen; 11607c478bd9Sstevel@tonic-gate 11617c478bd9Sstevel@tonic-gate /* Try again with bigger buffer */ 11627c478bd9Sstevel@tonic-gate rv = cmd->Update(hSession, databuf, (CK_ULONG)nread, 11637c478bd9Sstevel@tonic-gate resultbuf, &resultlen); 11647c478bd9Sstevel@tonic-gate } 11657c478bd9Sstevel@tonic-gate 11667c478bd9Sstevel@tonic-gate if (rv != CKR_OK) { 11677c478bd9Sstevel@tonic-gate errflag = B_TRUE; 11687c478bd9Sstevel@tonic-gate cryptoerror(LOG_STDERR, gettext( 11697c478bd9Sstevel@tonic-gate "crypto operation failed: %s"), 11707c478bd9Sstevel@tonic-gate pkcs11_strerror(rv)); 11717c478bd9Sstevel@tonic-gate break; 11727c478bd9Sstevel@tonic-gate } 11737c478bd9Sstevel@tonic-gate 11747c478bd9Sstevel@tonic-gate /* write the output */ 11757c478bd9Sstevel@tonic-gate if (write(outfd, resultbuf, resultlen) != resultlen) { 11767c478bd9Sstevel@tonic-gate cryptoerror(LOG_STDERR, gettext( 11777c478bd9Sstevel@tonic-gate "failed to write result to output file.")); 11787c478bd9Sstevel@tonic-gate errflag = B_TRUE; 11797c478bd9Sstevel@tonic-gate break; 11807c478bd9Sstevel@tonic-gate } 11817c478bd9Sstevel@tonic-gate 11827c478bd9Sstevel@tonic-gate if (vflag) { 11837c478bd9Sstevel@tonic-gate status_index += resultlen; 11847c478bd9Sstevel@tonic-gate 11857c478bd9Sstevel@tonic-gate /* 11867c478bd9Sstevel@tonic-gate * If input is from stdin, do a our own progress bar 11877c478bd9Sstevel@tonic-gate * by printing periods at a pre-defined increment 11887c478bd9Sstevel@tonic-gate * until the file is done. 11897c478bd9Sstevel@tonic-gate */ 11907c478bd9Sstevel@tonic-gate if (!iflag) { 11917c478bd9Sstevel@tonic-gate 11927c478bd9Sstevel@tonic-gate /* 11937c478bd9Sstevel@tonic-gate * Print at least 1 element in case the file 11947c478bd9Sstevel@tonic-gate * is small, it looks better than nothing. 11957c478bd9Sstevel@tonic-gate */ 11967c478bd9Sstevel@tonic-gate if (status_pos == 0) { 11977c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(".")); 11987c478bd9Sstevel@tonic-gate status_pos = 1; 11997c478bd9Sstevel@tonic-gate } 12007c478bd9Sstevel@tonic-gate 12017c478bd9Sstevel@tonic-gate if ((status_index - status_last) > 12027c478bd9Sstevel@tonic-gate (PROGRESSSIZE)) { 12037c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(".")); 12047c478bd9Sstevel@tonic-gate status_last = status_index; 12057c478bd9Sstevel@tonic-gate } 12067c478bd9Sstevel@tonic-gate continue; 12077c478bd9Sstevel@tonic-gate } 12087c478bd9Sstevel@tonic-gate 12097c478bd9Sstevel@tonic-gate /* Calculate the number of elements need to be print */ 121054da5c1fSjk115741 if (insize <= BUFFERSIZE) 12117c478bd9Sstevel@tonic-gate pos = 78; 12127c478bd9Sstevel@tonic-gate else 12137c478bd9Sstevel@tonic-gate pos = (int)((status_index - status_last) / 12147c478bd9Sstevel@tonic-gate status_incr); 12157c478bd9Sstevel@tonic-gate 12167c478bd9Sstevel@tonic-gate /* Add progress bar elements, if needed */ 12177c478bd9Sstevel@tonic-gate if (pos > 0) { 12187c478bd9Sstevel@tonic-gate print_status(pos); 12197c478bd9Sstevel@tonic-gate status_last += (status_incr * pos); 12207c478bd9Sstevel@tonic-gate } 12217c478bd9Sstevel@tonic-gate } 12227c478bd9Sstevel@tonic-gate } 12237c478bd9Sstevel@tonic-gate 12247c478bd9Sstevel@tonic-gate /* Print verbose completion */ 12257c478bd9Sstevel@tonic-gate if (vflag) { 12267c478bd9Sstevel@tonic-gate if (iflag) 12277c478bd9Sstevel@tonic-gate (void) fprintf(stderr, "]"); 12287c478bd9Sstevel@tonic-gate 12297c478bd9Sstevel@tonic-gate (void) fprintf(stderr, "\n%s\n", gettext("Done.")); 12307c478bd9Sstevel@tonic-gate } 12317c478bd9Sstevel@tonic-gate 12327c478bd9Sstevel@tonic-gate /* Error in reading */ 12337c478bd9Sstevel@tonic-gate if (nread == -1) { 12347c478bd9Sstevel@tonic-gate cryptoerror(LOG_STDERR, gettext( 12357c478bd9Sstevel@tonic-gate "error reading from input file")); 12367c478bd9Sstevel@tonic-gate errflag = B_TRUE; 12377c478bd9Sstevel@tonic-gate } 12387c478bd9Sstevel@tonic-gate 12397c478bd9Sstevel@tonic-gate if (!errflag) { 12407c478bd9Sstevel@tonic-gate 12417c478bd9Sstevel@tonic-gate /* Do the final part */ 12427c478bd9Sstevel@tonic-gate 12437c478bd9Sstevel@tonic-gate rv = cmd->Final(hSession, resultbuf, &resultlen); 12447c478bd9Sstevel@tonic-gate 12457c478bd9Sstevel@tonic-gate if (rv == CKR_OK) { 12467c478bd9Sstevel@tonic-gate /* write the output */ 12477c478bd9Sstevel@tonic-gate if (write(outfd, resultbuf, resultlen) != resultlen) { 12487c478bd9Sstevel@tonic-gate cryptoerror(LOG_STDERR, gettext( 12497c478bd9Sstevel@tonic-gate "failed to write result to output file.")); 12507c478bd9Sstevel@tonic-gate errflag = B_TRUE; 12517c478bd9Sstevel@tonic-gate } 12527c478bd9Sstevel@tonic-gate } else { 12537c478bd9Sstevel@tonic-gate cryptoerror(LOG_STDERR, gettext( 12547c478bd9Sstevel@tonic-gate "crypto operation failed: %s"), 12557c478bd9Sstevel@tonic-gate pkcs11_strerror(rv)); 12567c478bd9Sstevel@tonic-gate errflag = B_TRUE; 12577c478bd9Sstevel@tonic-gate } 12587c478bd9Sstevel@tonic-gate 12597c478bd9Sstevel@tonic-gate } 12607c478bd9Sstevel@tonic-gate 12617c478bd9Sstevel@tonic-gate if (resultbuf != NULL && resultbuf != outbuf) { 12627c478bd9Sstevel@tonic-gate bzero(resultbuf, resultbuflen); 12637c478bd9Sstevel@tonic-gate free(resultbuf); 12647c478bd9Sstevel@tonic-gate } 12657c478bd9Sstevel@tonic-gate 12667c478bd9Sstevel@tonic-gate if (errflag) { 12677c478bd9Sstevel@tonic-gate return (-1); 12687c478bd9Sstevel@tonic-gate } else { 12697c478bd9Sstevel@tonic-gate return (0); 12707c478bd9Sstevel@tonic-gate } 12717c478bd9Sstevel@tonic-gate } 12727c478bd9Sstevel@tonic-gate 12737c478bd9Sstevel@tonic-gate /* 12747c478bd9Sstevel@tonic-gate * cryptoreadfile - reads file into a buffer 12757c478bd9Sstevel@tonic-gate * This function can be used for reading files 12767c478bd9Sstevel@tonic-gate * containing key or initialization vector data. 12777c478bd9Sstevel@tonic-gate * 12787c478bd9Sstevel@tonic-gate * filename - name of file 12797c478bd9Sstevel@tonic-gate * pdata - entire file returned in this buffer 12807c478bd9Sstevel@tonic-gate * must be freed by caller using free() 12817c478bd9Sstevel@tonic-gate * pdatalen - length of data returned 12827c478bd9Sstevel@tonic-gate * 12837c478bd9Sstevel@tonic-gate * returns 0 if success, -1 if error 12847c478bd9Sstevel@tonic-gate */ 12857c478bd9Sstevel@tonic-gate static int 12867c478bd9Sstevel@tonic-gate cryptoreadfile(char *filename, CK_BYTE_PTR *pdata, CK_ULONG_PTR pdatalen) 12877c478bd9Sstevel@tonic-gate { 12887c478bd9Sstevel@tonic-gate struct stat statbuf; 12897c478bd9Sstevel@tonic-gate char *filebuf; 12907c478bd9Sstevel@tonic-gate int filesize; 12917c478bd9Sstevel@tonic-gate int fd; 12927c478bd9Sstevel@tonic-gate 12937c478bd9Sstevel@tonic-gate if (filename == NULL) 12947c478bd9Sstevel@tonic-gate return (-1); 12957c478bd9Sstevel@tonic-gate 12967c478bd9Sstevel@tonic-gate /* read the file into a buffer */ 12977c478bd9Sstevel@tonic-gate if ((fd = open(filename, O_RDONLY | O_NONBLOCK)) == -1) { 12987c478bd9Sstevel@tonic-gate cryptoerror(LOG_STDERR, gettext( 12997c478bd9Sstevel@tonic-gate "cannot open %s"), filename); 13007c478bd9Sstevel@tonic-gate return (-1); 13017c478bd9Sstevel@tonic-gate 13027c478bd9Sstevel@tonic-gate } 13037c478bd9Sstevel@tonic-gate 13047c478bd9Sstevel@tonic-gate if (fstat(fd, &statbuf) == -1) { 13057c478bd9Sstevel@tonic-gate cryptoerror(LOG_STDERR, gettext( 13067c478bd9Sstevel@tonic-gate "cannot stat %s"), filename); 13077c478bd9Sstevel@tonic-gate (void) close(fd); 13087c478bd9Sstevel@tonic-gate return (-1); 13097c478bd9Sstevel@tonic-gate } 13107c478bd9Sstevel@tonic-gate 13114bc0a2efScasper if (!S_ISREG(statbuf.st_mode)) { 13127c478bd9Sstevel@tonic-gate cryptoerror(LOG_STDERR, gettext( 13137c478bd9Sstevel@tonic-gate "%s not a regular file"), filename); 13147c478bd9Sstevel@tonic-gate (void) close(fd); 13157c478bd9Sstevel@tonic-gate return (-1); 13167c478bd9Sstevel@tonic-gate } 13177c478bd9Sstevel@tonic-gate 13187c478bd9Sstevel@tonic-gate filesize = (size_t)statbuf.st_size; 13197c478bd9Sstevel@tonic-gate 13207c478bd9Sstevel@tonic-gate if (filesize == 0) { 13217c478bd9Sstevel@tonic-gate (void) close(fd); 13227c478bd9Sstevel@tonic-gate return (-1); 13237c478bd9Sstevel@tonic-gate } 13247c478bd9Sstevel@tonic-gate 13257c478bd9Sstevel@tonic-gate /* allocate a buffer to hold the entire key */ 13267c478bd9Sstevel@tonic-gate if ((filebuf = malloc(filesize)) == NULL) { 13277c478bd9Sstevel@tonic-gate int err = errno; 13287c478bd9Sstevel@tonic-gate cryptoerror(LOG_STDERR, gettext("malloc: %s"), strerror(err)); 13297c478bd9Sstevel@tonic-gate (void) close(fd); 13307c478bd9Sstevel@tonic-gate return (-1); 13317c478bd9Sstevel@tonic-gate } 13327c478bd9Sstevel@tonic-gate 13337c478bd9Sstevel@tonic-gate if (read(fd, filebuf, filesize) != filesize) { 13347c478bd9Sstevel@tonic-gate int err = errno; 13357c478bd9Sstevel@tonic-gate cryptoerror(LOG_STDERR, gettext("error reading file: %s"), 13367c478bd9Sstevel@tonic-gate strerror(err)); 13377c478bd9Sstevel@tonic-gate (void) close(fd); 13387c478bd9Sstevel@tonic-gate free(filebuf); 13397c478bd9Sstevel@tonic-gate return (-1); 13407c478bd9Sstevel@tonic-gate } 13417c478bd9Sstevel@tonic-gate 13427c478bd9Sstevel@tonic-gate (void) close(fd); 13437c478bd9Sstevel@tonic-gate 13447c478bd9Sstevel@tonic-gate *pdata = (CK_BYTE_PTR)filebuf; 13457c478bd9Sstevel@tonic-gate *pdatalen = (CK_ULONG)filesize; 13467c478bd9Sstevel@tonic-gate 13477c478bd9Sstevel@tonic-gate return (0); 13487c478bd9Sstevel@tonic-gate } 1349c197cb9dShylee 13507c478bd9Sstevel@tonic-gate /* 1351c197cb9dShylee * cryptogetdata - prompt user for a key or the PIN for a token 13527c478bd9Sstevel@tonic-gate * 1353c197cb9dShylee * pdata - buffer for returning key or pin data 13547c478bd9Sstevel@tonic-gate * must be freed by caller using free() 1355c197cb9dShylee * psize - size of buffer returned 13567c478bd9Sstevel@tonic-gate * 13577c478bd9Sstevel@tonic-gate * returns 13587c478bd9Sstevel@tonic-gate * 0 for success, -1 for failure 13597c478bd9Sstevel@tonic-gate */ 13607c478bd9Sstevel@tonic-gate 13617c478bd9Sstevel@tonic-gate static int 1362c197cb9dShylee cryptogetdata(char *token_spec, CK_BYTE_PTR *pdata, CK_ULONG_PTR psize) 13637c478bd9Sstevel@tonic-gate { 1364c197cb9dShylee char *databuf = NULL; 1365c197cb9dShylee char *tmpbuf = NULL; 1366c197cb9dShylee char prompt[1024]; 13677c478bd9Sstevel@tonic-gate 1368c197cb9dShylee if (token_spec != NULL) { 1369c197cb9dShylee (void) snprintf(prompt, sizeof (prompt), 1370c197cb9dShylee DEFAULT_TOKEN_PROMPT, token_spec); 1371c197cb9dShylee tmpbuf = getpassphrase(gettext(prompt)); 1372c197cb9dShylee } else { 13737c478bd9Sstevel@tonic-gate tmpbuf = getpassphrase(gettext("Enter key:")); 1374c197cb9dShylee } 13757c478bd9Sstevel@tonic-gate 13767c478bd9Sstevel@tonic-gate if (tmpbuf == NULL) { 13777c478bd9Sstevel@tonic-gate return (-1); /* error */ 13787c478bd9Sstevel@tonic-gate } else { 1379c197cb9dShylee databuf = strdup(tmpbuf); 1380c197cb9dShylee (void) memset(tmpbuf, 0, strlen(tmpbuf)); /* clean up */ 1381c197cb9dShylee if (databuf == NULL) 1382c197cb9dShylee return (-1); 13837c478bd9Sstevel@tonic-gate } 13847c478bd9Sstevel@tonic-gate 1385c197cb9dShylee *pdata = (CK_BYTE_PTR)databuf; 1386c197cb9dShylee *psize = (CK_ULONG)strlen(databuf); 13877c478bd9Sstevel@tonic-gate 13887c478bd9Sstevel@tonic-gate return (0); 13897c478bd9Sstevel@tonic-gate } 13907c478bd9Sstevel@tonic-gate 13917c478bd9Sstevel@tonic-gate /* 13927c478bd9Sstevel@tonic-gate * get_random_data - generate initialization vector data 13937c478bd9Sstevel@tonic-gate * iv data is random bytes 13947c478bd9Sstevel@tonic-gate * hSession - a pkcs session 13957c478bd9Sstevel@tonic-gate * pivbuf - buffer where data is returned 13967c478bd9Sstevel@tonic-gate * ivlen - size of iv data 13977c478bd9Sstevel@tonic-gate */ 13987c478bd9Sstevel@tonic-gate static int 13997c478bd9Sstevel@tonic-gate get_random_data(CK_BYTE_PTR pivbuf, int ivlen) 14007c478bd9Sstevel@tonic-gate { 14017c478bd9Sstevel@tonic-gate int fd; 14027c478bd9Sstevel@tonic-gate 14037c478bd9Sstevel@tonic-gate if (ivlen == 0) { 14047c478bd9Sstevel@tonic-gate /* nothing to generate */ 14057c478bd9Sstevel@tonic-gate return (0); 14067c478bd9Sstevel@tonic-gate } 14077c478bd9Sstevel@tonic-gate 14087c478bd9Sstevel@tonic-gate /* Read random data directly from /dev/random */ 14097c478bd9Sstevel@tonic-gate if ((fd = open(RANDOM_DEVICE, O_RDONLY)) != -1) { 14107c478bd9Sstevel@tonic-gate if (read(fd, pivbuf, (size_t)ivlen) == ivlen) { 14117c478bd9Sstevel@tonic-gate (void) close(fd); 14127c478bd9Sstevel@tonic-gate return (0); 14137c478bd9Sstevel@tonic-gate } 14147c478bd9Sstevel@tonic-gate } 14157c478bd9Sstevel@tonic-gate (void) close(fd); 14167c478bd9Sstevel@tonic-gate return (-1); 14177c478bd9Sstevel@tonic-gate } 1418