xref: /titanic_52/usr/src/uts/common/sys/crypto/common.h (revision 91d7f85e02991954d1e1bd44673df567ad8dcc87)
1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License (the "License").
6  * You may not use this file except in compliance with the License.
7  *
8  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9  * or http://www.opensolaris.org/os/licensing.
10  * See the License for the specific language governing permissions
11  * and limitations under the License.
12  *
13  * When distributing Covered Code, include this CDDL HEADER in each
14  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15  * If applicable, add the following below this CDDL HEADER, with the
16  * fields enclosed by brackets "[]" replaced with your own identifying
17  * information: Portions Copyright [yyyy] [name of copyright owner]
18  *
19  * CDDL HEADER END
20  */
21 /*
22  * Copyright (c) 2003, 2010, Oracle and/or its affiliates. All rights reserved.
23  */
24 
25 #ifndef _SYS_CRYPTO_COMMON_H
26 #define	_SYS_CRYPTO_COMMON_H
27 
28 /*
29  * Header file for the common data structures of the cryptographic framework
30  */
31 
32 #ifdef __cplusplus
33 extern "C" {
34 #endif
35 
36 #include <sys/types.h>
37 #include <sys/uio.h>
38 #include <sys/stream.h>
39 #include <sys/mutex.h>
40 #include <sys/condvar.h>
41 
42 
43 /* Cryptographic Mechanisms */
44 
45 #define	CRYPTO_MAX_MECH_NAME 32
46 typedef char crypto_mech_name_t[CRYPTO_MAX_MECH_NAME];
47 
48 typedef uint64_t crypto_mech_type_t;
49 
50 typedef struct crypto_mechanism {
51 	crypto_mech_type_t	cm_type;	/* mechanism type */
52 	caddr_t			cm_param;	/* mech. parameter */
53 	size_t			cm_param_len;	/* mech. parameter len */
54 } crypto_mechanism_t;
55 
56 #ifdef  _SYSCALL32
57 
58 typedef struct crypto_mechanism32 {
59 	crypto_mech_type_t	cm_type;	/* mechanism type */
60 	caddr32_t		cm_param;	/* mech. parameter */
61 	size32_t		cm_param_len;   /* mech. parameter len */
62 } crypto_mechanism32_t;
63 
64 #endif  /* _SYSCALL32 */
65 
66 #ifdef _KERNEL
67 /* CK_AES_CTR_PARAMS provides parameters to the CKM_AES_CTR mechanism */
68 typedef struct CK_AES_CTR_PARAMS {
69 	ulong_t	ulCounterBits;
70 	uint8_t cb[16];
71 } CK_AES_CTR_PARAMS;
72 #endif
73 
74 /* CK_AES_CCM_PARAMS provides parameters to the CKM_AES_CCM mechanism */
75 typedef struct CK_AES_CCM_PARAMS {
76 	ulong_t ulMACSize;
77 	ulong_t ulNonceSize;
78 	ulong_t ulAuthDataSize;
79 	ulong_t ulDataSize; /* used for plaintext or ciphertext */
80 	uchar_t *nonce;
81 	uchar_t *authData;
82 } CK_AES_CCM_PARAMS;
83 
84 /* CK_AES_GCM_PARAMS provides parameters to the CKM_AES_GCM mechanism */
85 typedef struct CK_AES_GCM_PARAMS {
86 	uchar_t *pIv;
87 	ulong_t ulIvLen;
88 	ulong_t ulIvBits;
89 	uchar_t *pAAD;
90 	ulong_t ulAADLen;
91 	ulong_t ulTagBits;
92 } CK_AES_GCM_PARAMS;
93 
94 /* CK_AES_GMAC_PARAMS provides parameters to the CKM_AES_GMAC mechanism */
95 typedef struct CK_AES_GMAC_PARAMS {
96 	uchar_t *pIv;
97 	uchar_t *pAAD;
98 	ulong_t ulAADLen;
99 } CK_AES_GMAC_PARAMS;
100 
101 #ifdef _KERNEL
102 /*
103  * CK_ECDH1_DERIVE_PARAMS provides the parameters to the
104  * CKM_ECDH1_KEY_DERIVE mechanism
105  */
106 typedef struct CK_ECDH1_DERIVE_PARAMS {
107 	ulong_t		kdf;
108 	ulong_t		ulSharedDataLen;
109 	uchar_t		*pSharedData;
110 	ulong_t		ulPublicDataLen;
111 	uchar_t		*pPublicData;
112 } CK_ECDH1_DERIVE_PARAMS;
113 #endif
114 
115 #ifdef _KERNEL
116 #ifdef  _SYSCALL32
117 
118 /* needed for 32-bit applications running on 64-bit kernels */
119 typedef struct CK_AES_CTR_PARAMS32 {
120 	uint32_t ulCounterBits;
121 	uint8_t cb[16];
122 } CK_AES_CTR_PARAMS32;
123 
124 /* needed for 32-bit applications running on 64-bit kernels */
125 typedef struct CK_AES_CCM_PARAMS32 {
126 	uint32_t ulMACSize;
127 	uint32_t ulNonceSize;
128 	uint32_t ulAuthDataSize;
129 	uint32_t ulDataSize;
130 	caddr32_t nonce;
131 	caddr32_t authData;
132 } CK_AES_CCM_PARAMS32;
133 
134 /* needed for 32-bit applications running on 64-bit kernels */
135 typedef struct CK_AES_GCM_PARAMS32 {
136 	caddr32_t pIv;
137 	uint32_t ulIvLen;
138 	uint32_t ulIvBits;
139 	caddr32_t pAAD;
140 	uint32_t ulAADLen;
141 	uint32_t ulTagBits;
142 } CK_AES_GCM_PARAMS32;
143 
144 /* needed for 32-bit applications running on 64-bit kernels */
145 typedef struct CK_AES_GMAC_PARAMS32 {
146 	caddr32_t pIv;
147 	caddr32_t pAAD;
148 	uint32_t ulAADLen;
149 } CK_AES_GMAC_PARAMS32;
150 
151 typedef struct CK_ECDH1_DERIVE_PARAMS32 {
152 	uint32_t	kdf;
153 	uint32_t	ulSharedDataLen;
154 	caddr32_t	pSharedData;
155 	uint32_t	ulPublicDataLen;
156 	caddr32_t	pPublicData;
157 } CK_ECDH1_DERIVE_PARAMS32;
158 
159 #endif  /* _SYSCALL32 */
160 #endif /* _KERNEL */
161 
162 /*
163  * The measurement unit bit flag for a mechanism's minimum or maximum key size.
164  * The unit are mechanism dependent.  It can be in bits or in bytes.
165  */
166 typedef uint32_t crypto_keysize_unit_t;
167 
168 /*
169  * The following bit flags are valid in cm_mech_flags field in
170  * the crypto_mech_info_t structure of the SPI.
171  *
172  * Only the first two bit flags are valid in mi_keysize_unit
173  * field in the crypto_mechanism_info_t structure of the API.
174  */
175 #define	CRYPTO_KEYSIZE_UNIT_IN_BITS	0x00000001
176 #define	CRYPTO_KEYSIZE_UNIT_IN_BYTES	0x00000002
177 #define	CRYPTO_CAN_SHARE_OPSTATE	0x00000004 /* supports sharing */
178 
179 
180 /* Mechanisms supported out-of-the-box */
181 #define	SUN_CKM_MD4			"CKM_MD4"
182 #define	SUN_CKM_MD5			"CKM_MD5"
183 #define	SUN_CKM_MD5_HMAC		"CKM_MD5_HMAC"
184 #define	SUN_CKM_MD5_HMAC_GENERAL	"CKM_MD5_HMAC_GENERAL"
185 #define	SUN_CKM_SHA1			"CKM_SHA_1"
186 #define	SUN_CKM_SHA1_HMAC		"CKM_SHA_1_HMAC"
187 #define	SUN_CKM_SHA1_HMAC_GENERAL	"CKM_SHA_1_HMAC_GENERAL"
188 #define	SUN_CKM_SHA256			"CKM_SHA256"
189 #define	SUN_CKM_SHA256_HMAC		"CKM_SHA256_HMAC"
190 #define	SUN_CKM_SHA256_HMAC_GENERAL	"CKM_SHA256_HMAC_GENERAL"
191 #define	SUN_CKM_SHA384			"CKM_SHA384"
192 #define	SUN_CKM_SHA384_HMAC		"CKM_SHA384_HMAC"
193 #define	SUN_CKM_SHA384_HMAC_GENERAL	"CKM_SHA384_HMAC_GENERAL"
194 #define	SUN_CKM_SHA512			"CKM_SHA512"
195 #define	SUN_CKM_SHA512_HMAC		"CKM_SHA512_HMAC"
196 #define	SUN_CKM_SHA512_HMAC_GENERAL	"CKM_SHA512_HMAC_GENERAL"
197 #define	SUN_CKM_DES_CBC			"CKM_DES_CBC"
198 #define	SUN_CKM_DES3_CBC		"CKM_DES3_CBC"
199 #define	SUN_CKM_DES_ECB			"CKM_DES_ECB"
200 #define	SUN_CKM_DES3_ECB		"CKM_DES3_ECB"
201 #define	SUN_CKM_BLOWFISH_CBC		"CKM_BLOWFISH_CBC"
202 #define	SUN_CKM_BLOWFISH_ECB		"CKM_BLOWFISH_ECB"
203 #define	SUN_CKM_AES_CBC			"CKM_AES_CBC"
204 #define	SUN_CKM_AES_ECB			"CKM_AES_ECB"
205 #define	SUN_CKM_AES_CTR			"CKM_AES_CTR"
206 #define	SUN_CKM_AES_CCM			"CKM_AES_CCM"
207 #define	SUN_CKM_AES_GCM			"CKM_AES_GCM"
208 #define	SUN_CKM_AES_GMAC		"CKM_AES_GMAC"
209 #define	SUN_CKM_AES_CFB128		"CKM_AES_CFB128"
210 #define	SUN_CKM_RC4			"CKM_RC4"
211 #define	SUN_CKM_RSA_PKCS		"CKM_RSA_PKCS"
212 #define	SUN_CKM_RSA_X_509		"CKM_RSA_X_509"
213 #define	SUN_CKM_MD5_RSA_PKCS		"CKM_MD5_RSA_PKCS"
214 #define	SUN_CKM_SHA1_RSA_PKCS		"CKM_SHA1_RSA_PKCS"
215 #define	SUN_CKM_SHA256_RSA_PKCS		"CKM_SHA256_RSA_PKCS"
216 #define	SUN_CKM_SHA384_RSA_PKCS		"CKM_SHA384_RSA_PKCS"
217 #define	SUN_CKM_SHA512_RSA_PKCS		"CKM_SHA512_RSA_PKCS"
218 #define	SUN_CKM_EC_KEY_PAIR_GEN		"CKM_EC_KEY_PAIR_GEN"
219 #define	SUN_CKM_ECDH1_DERIVE		"CKM_ECDH1_DERIVE"
220 #define	SUN_CKM_ECDSA_SHA1		"CKM_ECDSA_SHA1"
221 #define	SUN_CKM_ECDSA			"CKM_ECDSA"
222 
223 /* Shared operation context format for CKM_RC4 */
224 typedef struct {
225 #if defined(__amd64)
226 	uint32_t	i, j;
227 	uint32_t	arr[256];
228 	uint32_t	flag;
229 #else
230 	uchar_t		arr[256];
231 	uchar_t		i, j;
232 #endif /* __amd64 */
233 	uint64_t	pad;		/* For 64-bit alignment */
234 } arcfour_state_t;
235 
236 /* Data arguments of cryptographic operations */
237 
238 typedef enum crypto_data_format {
239 	CRYPTO_DATA_RAW = 1,
240 	CRYPTO_DATA_UIO,
241 	CRYPTO_DATA_MBLK
242 } crypto_data_format_t;
243 
244 typedef struct crypto_data {
245 	crypto_data_format_t	cd_format;	/* Format identifier	*/
246 	off_t			cd_offset;	/* Offset from the beginning */
247 	size_t			cd_length;	/* # of bytes in use */
248 	caddr_t			cd_miscdata;	/* ancillary data */
249 	union {
250 		/* Raw format */
251 		iovec_t cdu_raw;		/* Pointer and length	    */
252 
253 		/* uio scatter-gather format */
254 		uio_t	*cdu_uio;
255 
256 		/* mblk scatter-gather format */
257 		mblk_t	*cdu_mp;		/* The mblk chain */
258 
259 	} cdu;	/* Crypto Data Union */
260 } crypto_data_t;
261 
262 #define	cd_raw		cdu.cdu_raw
263 #define	cd_uio		cdu.cdu_uio
264 #define	cd_mp		cdu.cdu_mp
265 
266 typedef struct crypto_dual_data {
267 	crypto_data_t		dd_data;	/* The data */
268 	off_t			dd_offset2;	/* Used by dual operation */
269 	size_t			dd_len2;	/* # of bytes to take	*/
270 } crypto_dual_data_t;
271 
272 #define	dd_format	dd_data.cd_format
273 #define	dd_offset1	dd_data.cd_offset
274 #define	dd_len1		dd_data.cd_length
275 #define	dd_miscdata	dd_data.cd_miscdata
276 #define	dd_raw		dd_data.cd_raw
277 #define	dd_uio		dd_data.cd_uio
278 #define	dd_mp		dd_data.cd_mp
279 
280 /* The keys, and their contents */
281 
282 typedef enum {
283 	CRYPTO_KEY_RAW = 1,	/* ck_data is a cleartext key */
284 	CRYPTO_KEY_REFERENCE,	/* ck_obj_id is an opaque reference */
285 	CRYPTO_KEY_ATTR_LIST	/* ck_attrs is a list of object attributes */
286 } crypto_key_format_t;
287 
288 typedef uint64_t crypto_attr_type_t;
289 
290 /* Attribute types to use for passing a RSA public key or a private key. */
291 #define	SUN_CKA_MODULUS			0x00000120
292 #define	SUN_CKA_MODULUS_BITS		0x00000121
293 #define	SUN_CKA_PUBLIC_EXPONENT		0x00000122
294 #define	SUN_CKA_PRIVATE_EXPONENT	0x00000123
295 #define	SUN_CKA_PRIME_1			0x00000124
296 #define	SUN_CKA_PRIME_2			0x00000125
297 #define	SUN_CKA_EXPONENT_1		0x00000126
298 #define	SUN_CKA_EXPONENT_2		0x00000127
299 #define	SUN_CKA_COEFFICIENT		0x00000128
300 #define	SUN_CKA_PRIME			0x00000130
301 #define	SUN_CKA_SUBPRIME		0x00000131
302 #define	SUN_CKA_BASE			0x00000132
303 
304 #define	CKK_EC			0x00000003
305 #define	CKK_GENERIC_SECRET	0x00000010
306 #define	CKK_RC4			0x00000012
307 #define	CKK_AES			0x0000001F
308 #define	CKK_DES			0x00000013
309 #define	CKK_DES2		0x00000014
310 #define	CKK_DES3		0x00000015
311 
312 #define	CKO_PUBLIC_KEY		0x00000002
313 #define	CKO_PRIVATE_KEY		0x00000003
314 #define	CKA_CLASS		0x00000000
315 #define	CKA_VALUE		0x00000011
316 #define	CKA_KEY_TYPE		0x00000100
317 #define	CKA_VALUE_LEN		0x00000161
318 #define	CKA_EC_PARAMS		0x00000180
319 #define	CKA_EC_POINT		0x00000181
320 
321 typedef uint32_t	crypto_object_id_t;
322 
323 typedef struct crypto_object_attribute {
324 	crypto_attr_type_t	oa_type;	/* attribute type */
325 	caddr_t			oa_value;	/* attribute value */
326 	ssize_t			oa_value_len;	/* length of attribute value */
327 } crypto_object_attribute_t;
328 
329 typedef struct crypto_key {
330 	crypto_key_format_t	ck_format;	/* format identifier */
331 	union {
332 		/* for CRYPTO_KEY_RAW ck_format */
333 		struct {
334 			uint_t	cku_v_length;	/* # of bits in ck_data   */
335 			void	*cku_v_data;	/* ptr to key value */
336 		} cku_key_value;
337 
338 		/* for CRYPTO_KEY_REFERENCE ck_format */
339 		crypto_object_id_t cku_key_id;	/* reference to object key */
340 
341 		/* for CRYPTO_KEY_ATTR_LIST ck_format */
342 		struct {
343 			uint_t cku_a_count;	/* number of attributes */
344 			crypto_object_attribute_t *cku_a_oattr;
345 		} cku_key_attrs;
346 	} cku_data;				/* Crypto Key union */
347 } crypto_key_t;
348 
349 #ifdef  _SYSCALL32
350 
351 typedef struct crypto_object_attribute32 {
352 	uint64_t	oa_type;	/* attribute type */
353 	caddr32_t	oa_value;	/* attribute value */
354 	ssize32_t	oa_value_len;	/* length of attribute value */
355 } crypto_object_attribute32_t;
356 
357 typedef struct crypto_key32 {
358 	crypto_key_format_t	ck_format;	/* format identifier */
359 	union {
360 		/* for CRYPTO_KEY_RAW ck_format */
361 		struct {
362 			uint32_t cku_v_length;	/* # of bytes in ck_data */
363 			caddr32_t cku_v_data;	/* ptr to key value */
364 		} cku_key_value;
365 
366 		/* for CRYPTO_KEY_REFERENCE ck_format */
367 		crypto_object_id_t cku_key_id; /* reference to object key */
368 
369 		/* for CRYPTO_KEY_ATTR_LIST ck_format */
370 		struct {
371 			uint32_t cku_a_count;	/* number of attributes */
372 			caddr32_t cku_a_oattr;
373 		} cku_key_attrs;
374 	} cku_data;				/* Crypto Key union */
375 } crypto_key32_t;
376 
377 #endif  /* _SYSCALL32 */
378 
379 #define	ck_data		cku_data.cku_key_value.cku_v_data
380 #define	ck_length	cku_data.cku_key_value.cku_v_length
381 #define	ck_obj_id	cku_data.cku_key_id
382 #define	ck_count	cku_data.cku_key_attrs.cku_a_count
383 #define	ck_attrs	cku_data.cku_key_attrs.cku_a_oattr
384 
385 /*
386  * Raw key lengths are expressed in number of bits.
387  * The following macro returns the minimum number of
388  * bytes that can contain the specified number of bits.
389  * Round up without overflowing the integer type.
390  */
391 #define	CRYPTO_BITS2BYTES(n) ((n) == 0 ? 0 : (((n) - 1) >> 3) + 1)
392 #define	CRYPTO_BYTES2BITS(n) ((n) << 3)
393 
394 /* Providers */
395 
396 typedef enum {
397 	CRYPTO_HW_PROVIDER = 0,
398 	CRYPTO_SW_PROVIDER,
399 	CRYPTO_LOGICAL_PROVIDER
400 } crypto_provider_type_t;
401 
402 typedef uint32_t 	crypto_provider_id_t;
403 #define	KCF_PROVID_INVALID	((uint32_t)-1)
404 
405 typedef struct crypto_provider_entry {
406 	crypto_provider_id_t	pe_provider_id;
407 	uint_t			pe_mechanism_count;
408 } crypto_provider_entry_t;
409 
410 typedef struct crypto_dev_list_entry {
411 	char			le_dev_name[MAXNAMELEN];
412 	uint_t			le_dev_instance;
413 	uint_t			le_mechanism_count;
414 } crypto_dev_list_entry_t;
415 
416 /* User type for authentication ioctls and SPI entry points */
417 
418 typedef enum crypto_user_type {
419 	CRYPTO_SO = 0,
420 	CRYPTO_USER
421 } crypto_user_type_t;
422 
423 /* Version for provider management ioctls and SPI entry points */
424 
425 typedef struct crypto_version {
426 	uchar_t	cv_major;
427 	uchar_t	cv_minor;
428 } crypto_version_t;
429 
430 /* session data structure opaque to the consumer */
431 typedef void *crypto_session_t;
432 
433 /* provider data structure opaque to the consumer */
434 typedef void *crypto_provider_t;
435 
436 /* Limits used by both consumers and providers */
437 #define	CRYPTO_EXT_SIZE_LABEL		32
438 #define	CRYPTO_EXT_SIZE_MANUF		32
439 #define	CRYPTO_EXT_SIZE_MODEL		16
440 #define	CRYPTO_EXT_SIZE_SERIAL		16
441 #define	CRYPTO_EXT_SIZE_TIME		16
442 
443 typedef struct crypto_provider_ext_info {
444 	uchar_t			ei_label[CRYPTO_EXT_SIZE_LABEL];
445 	uchar_t			ei_manufacturerID[CRYPTO_EXT_SIZE_MANUF];
446 	uchar_t			ei_model[CRYPTO_EXT_SIZE_MODEL];
447 	uchar_t			ei_serial_number[CRYPTO_EXT_SIZE_SERIAL];
448 	ulong_t			ei_flags;
449 	ulong_t			ei_max_session_count;
450 	ulong_t			ei_max_pin_len;
451 	ulong_t			ei_min_pin_len;
452 	ulong_t			ei_total_public_memory;
453 	ulong_t			ei_free_public_memory;
454 	ulong_t			ei_total_private_memory;
455 	ulong_t			ei_free_private_memory;
456 	crypto_version_t	ei_hardware_version;
457 	crypto_version_t	ei_firmware_version;
458 	uchar_t			ei_time[CRYPTO_EXT_SIZE_TIME];
459 	int			ei_hash_max_input_len;
460 	int			ei_hmac_max_input_len;
461 } crypto_provider_ext_info_t;
462 
463 typedef uint_t		crypto_session_id_t;
464 
465 typedef enum cmd_type {
466 	COPY_FROM_DATA,
467 	COPY_TO_DATA,
468 	COMPARE_TO_DATA,
469 	MD5_DIGEST_DATA,
470 	SHA1_DIGEST_DATA,
471 	SHA2_DIGEST_DATA,
472 	GHASH_DATA
473 } cmd_type_t;
474 
475 #define	CRYPTO_DO_UPDATE	0x01
476 #define	CRYPTO_DO_FINAL		0x02
477 #define	CRYPTO_DO_MD5		0x04
478 #define	CRYPTO_DO_SHA1		0x08
479 #define	CRYPTO_DO_SIGN		0x10
480 #define	CRYPTO_DO_VERIFY	0x20
481 #define	CRYPTO_DO_SHA2		0x40
482 
483 #define	PROVIDER_OWNS_KEY_SCHEDULE	0x00000001
484 
485 /*
486  * Common cryptographic status and error codes.
487  */
488 #define	CRYPTO_SUCCESS				0x00000000
489 #define	CRYPTO_CANCEL				0x00000001
490 #define	CRYPTO_HOST_MEMORY			0x00000002
491 #define	CRYPTO_GENERAL_ERROR			0x00000003
492 #define	CRYPTO_FAILED				0x00000004
493 #define	CRYPTO_ARGUMENTS_BAD			0x00000005
494 #define	CRYPTO_ATTRIBUTE_READ_ONLY		0x00000006
495 #define	CRYPTO_ATTRIBUTE_SENSITIVE		0x00000007
496 #define	CRYPTO_ATTRIBUTE_TYPE_INVALID		0x00000008
497 #define	CRYPTO_ATTRIBUTE_VALUE_INVALID		0x00000009
498 #define	CRYPTO_CANCELED				0x0000000A
499 #define	CRYPTO_DATA_INVALID			0x0000000B
500 #define	CRYPTO_DATA_LEN_RANGE			0x0000000C
501 #define	CRYPTO_DEVICE_ERROR			0x0000000D
502 #define	CRYPTO_DEVICE_MEMORY			0x0000000E
503 #define	CRYPTO_DEVICE_REMOVED			0x0000000F
504 #define	CRYPTO_ENCRYPTED_DATA_INVALID		0x00000010
505 #define	CRYPTO_ENCRYPTED_DATA_LEN_RANGE		0x00000011
506 #define	CRYPTO_KEY_HANDLE_INVALID		0x00000012
507 #define	CRYPTO_KEY_SIZE_RANGE			0x00000013
508 #define	CRYPTO_KEY_TYPE_INCONSISTENT		0x00000014
509 #define	CRYPTO_KEY_NOT_NEEDED			0x00000015
510 #define	CRYPTO_KEY_CHANGED			0x00000016
511 #define	CRYPTO_KEY_NEEDED			0x00000017
512 #define	CRYPTO_KEY_INDIGESTIBLE			0x00000018
513 #define	CRYPTO_KEY_FUNCTION_NOT_PERMITTED	0x00000019
514 #define	CRYPTO_KEY_NOT_WRAPPABLE		0x0000001A
515 #define	CRYPTO_KEY_UNEXTRACTABLE		0x0000001B
516 #define	CRYPTO_MECHANISM_INVALID		0x0000001C
517 #define	CRYPTO_MECHANISM_PARAM_INVALID		0x0000001D
518 #define	CRYPTO_OBJECT_HANDLE_INVALID		0x0000001E
519 #define	CRYPTO_OPERATION_IS_ACTIVE		0x0000001F
520 #define	CRYPTO_OPERATION_NOT_INITIALIZED	0x00000020
521 #define	CRYPTO_PIN_INCORRECT			0x00000021
522 #define	CRYPTO_PIN_INVALID			0x00000022
523 #define	CRYPTO_PIN_LEN_RANGE			0x00000023
524 #define	CRYPTO_PIN_EXPIRED			0x00000024
525 #define	CRYPTO_PIN_LOCKED			0x00000025
526 #define	CRYPTO_SESSION_CLOSED			0x00000026
527 #define	CRYPTO_SESSION_COUNT			0x00000027
528 #define	CRYPTO_SESSION_HANDLE_INVALID		0x00000028
529 #define	CRYPTO_SESSION_READ_ONLY		0x00000029
530 #define	CRYPTO_SESSION_EXISTS			0x0000002A
531 #define	CRYPTO_SESSION_READ_ONLY_EXISTS		0x0000002B
532 #define	CRYPTO_SESSION_READ_WRITE_SO_EXISTS	0x0000002C
533 #define	CRYPTO_SIGNATURE_INVALID		0x0000002D
534 #define	CRYPTO_SIGNATURE_LEN_RANGE		0x0000002E
535 #define	CRYPTO_TEMPLATE_INCOMPLETE		0x0000002F
536 #define	CRYPTO_TEMPLATE_INCONSISTENT		0x00000030
537 #define	CRYPTO_UNWRAPPING_KEY_HANDLE_INVALID	0x00000031
538 #define	CRYPTO_UNWRAPPING_KEY_SIZE_RANGE	0x00000032
539 #define	CRYPTO_UNWRAPPING_KEY_TYPE_INCONSISTENT	0x00000033
540 #define	CRYPTO_USER_ALREADY_LOGGED_IN		0x00000034
541 #define	CRYPTO_USER_NOT_LOGGED_IN		0x00000035
542 #define	CRYPTO_USER_PIN_NOT_INITIALIZED		0x00000036
543 #define	CRYPTO_USER_TYPE_INVALID		0x00000037
544 #define	CRYPTO_USER_ANOTHER_ALREADY_LOGGED_IN	0x00000038
545 #define	CRYPTO_USER_TOO_MANY_TYPES		0x00000039
546 #define	CRYPTO_WRAPPED_KEY_INVALID		0x0000003A
547 #define	CRYPTO_WRAPPED_KEY_LEN_RANGE		0x0000003B
548 #define	CRYPTO_WRAPPING_KEY_HANDLE_INVALID	0x0000003C
549 #define	CRYPTO_WRAPPING_KEY_SIZE_RANGE		0x0000003D
550 #define	CRYPTO_WRAPPING_KEY_TYPE_INCONSISTENT	0x0000003E
551 #define	CRYPTO_RANDOM_SEED_NOT_SUPPORTED	0x0000003F
552 #define	CRYPTO_RANDOM_NO_RNG			0x00000040
553 #define	CRYPTO_DOMAIN_PARAMS_INVALID		0x00000041
554 #define	CRYPTO_BUFFER_TOO_SMALL			0x00000042
555 #define	CRYPTO_INFORMATION_SENSITIVE		0x00000043
556 #define	CRYPTO_NOT_SUPPORTED			0x00000044
557 
558 #define	CRYPTO_QUEUED				0x00000045
559 #define	CRYPTO_BUFFER_TOO_BIG			0x00000046
560 #define	CRYPTO_INVALID_CONTEXT			0x00000047
561 #define	CRYPTO_INVALID_MAC			0x00000048
562 #define	CRYPTO_MECH_NOT_SUPPORTED		0x00000049
563 #define	CRYPTO_INCONSISTENT_ATTRIBUTE		0x0000004A
564 #define	CRYPTO_NO_PERMISSION			0x0000004B
565 #define	CRYPTO_INVALID_PROVIDER_ID		0x0000004C
566 #define	CRYPTO_VERSION_MISMATCH			0x0000004D
567 #define	CRYPTO_BUSY				0x0000004E
568 #define	CRYPTO_UNKNOWN_PROVIDER			0x0000004F
569 #define	CRYPTO_MODVERIFICATION_FAILED		0x00000050
570 #define	CRYPTO_OLD_CTX_TEMPLATE			0x00000051
571 #define	CRYPTO_WEAK_KEY				0x00000052
572 #define	CRYPTO_FIPS140_ERROR			0x00000053
573 /*
574  * Don't forget to update CRYPTO_LAST_ERROR and the error_number_table[]
575  * in kernelUtil.c when new error code is added.
576  */
577 #define	CRYPTO_LAST_ERROR			0x00000053
578 
579 /*
580  * Special values that can be used to indicate that information is unavailable
581  * or that there is not practical limit. These values can be used
582  * by fields of the SPI crypto_provider_ext_info(9S) structure.
583  * The value of CRYPTO_UNAVAILABLE_INFO should be the same as
584  * CK_UNAVAILABLE_INFO in the PKCS#11 spec.
585  */
586 #define	CRYPTO_UNAVAILABLE_INFO		((ulong_t)(-1))
587 #define	CRYPTO_EFFECTIVELY_INFINITE	0x0
588 
589 #ifdef __cplusplus
590 }
591 #endif
592 
593 #endif /* _SYS_CRYPTO_COMMON_H */
594