summaryrefslogtreecommitdiff
path: root/usr/src/lib/libcryptoutil/common/mechstr.c
diff options
context:
space:
mode:
authorstevel@tonic-gate <none@none>2005-06-14 00:00:00 -0700
committerstevel@tonic-gate <none@none>2005-06-14 00:00:00 -0700
commit7c478bd95313f5f23a4c958a745db2134aa03244 (patch)
treec871e58545497667cbb4b0a4f2daf204743e1fe7 /usr/src/lib/libcryptoutil/common/mechstr.c
downloadillumos-gate-7c478bd95313f5f23a4c958a745db2134aa03244.tar.gz
OpenSolaris Launch
Diffstat (limited to 'usr/src/lib/libcryptoutil/common/mechstr.c')
-rw-r--r--usr/src/lib/libcryptoutil/common/mechstr.c307
1 files changed, 307 insertions, 0 deletions
diff --git a/usr/src/lib/libcryptoutil/common/mechstr.c b/usr/src/lib/libcryptoutil/common/mechstr.c
new file mode 100644
index 0000000000..fc3ab9c16f
--- /dev/null
+++ b/usr/src/lib/libcryptoutil/common/mechstr.c
@@ -0,0 +1,307 @@
+/*
+ * CDDL HEADER START
+ *
+ * The contents of this file are subject to the terms of the
+ * Common Development and Distribution License, Version 1.0 only
+ * (the "License"). You may not use this file except in compliance
+ * with the License.
+ *
+ * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
+ * or http://www.opensolaris.org/os/licensing.
+ * See the License for the specific language governing permissions
+ * and limitations under the License.
+ *
+ * When distributing Covered Code, include this CDDL HEADER in each
+ * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
+ * If applicable, add the following below this CDDL HEADER, with the
+ * fields enclosed by brackets "[]" replaced with your own identifying
+ * information: Portions Copyright [yyyy] [name of copyright owner]
+ *
+ * CDDL HEADER END
+ */
+/*
+ * Copyright 2004 Sun Microsystems, Inc. All rights reserved.
+ * Use is subject to license terms.
+ */
+
+#pragma ident "%Z%%M% %I% %E% SMI"
+
+/*
+ * Convert Algorithm names as strings to PKCS#11 Mech numbers and vice versa.
+ */
+
+#include <string.h>
+#include <stdlib.h>
+#include <stdio.h>
+#include <security/cryptoki.h>
+#include <security/pkcs11t.h>
+
+#include <cryptoutil.h>
+
+/*
+ * The table below is dynamically generated by parsing pkcs11t.h
+ * from the Makefile.
+ */
+static const struct {
+ const char *str;
+ CK_MECHANISM_TYPE mech;
+} mapping[] = {
+ { "CKM_RSA_PKCS_KEY_PAIR_GEN", CKM_RSA_PKCS_KEY_PAIR_GEN },
+ { "CKM_RSA_PKCS", CKM_RSA_PKCS },
+ { "CKM_RSA_9796", CKM_RSA_9796 },
+ { "CKM_RSA_X_509", CKM_RSA_X_509 },
+ { "CKM_MD2_RSA_PKCS", CKM_MD2_RSA_PKCS },
+ { "CKM_MD5_RSA_PKCS", CKM_MD5_RSA_PKCS },
+ { "CKM_SHA1_RSA_PKCS", CKM_SHA1_RSA_PKCS },
+ { "CKM_RIPEMD128_RSA_PKCS", CKM_RIPEMD128_RSA_PKCS },
+ { "CKM_RIPEMD160_RSA_PKCS", CKM_RIPEMD160_RSA_PKCS },
+ { "CKM_RSA_PKCS_OAEP", CKM_RSA_PKCS_OAEP },
+ { "CKM_RSA_X9_31_KEY_PAIR_GEN", CKM_RSA_X9_31_KEY_PAIR_GEN },
+ { "CKM_RSA_X9_31", CKM_RSA_X9_31 },
+ { "CKM_SHA1_RSA_X9_31", CKM_SHA1_RSA_X9_31 },
+ { "CKM_RSA_PKCS_PSS", CKM_RSA_PKCS_PSS },
+ { "CKM_SHA1_RSA_PKCS_PSS", CKM_SHA1_RSA_PKCS_PSS },
+ { "CKM_DSA_KEY_PAIR_GEN", CKM_DSA_KEY_PAIR_GEN },
+ { "CKM_DSA", CKM_DSA },
+ { "CKM_DSA_SHA1", CKM_DSA_SHA1 },
+ { "CKM_DH_PKCS_KEY_PAIR_GEN", CKM_DH_PKCS_KEY_PAIR_GEN },
+ { "CKM_DH_PKCS_DERIVE", CKM_DH_PKCS_DERIVE },
+ { "CKM_X9_42_DH_KEY_PAIR_GEN", CKM_X9_42_DH_KEY_PAIR_GEN },
+ { "CKM_X9_42_DH_DERIVE", CKM_X9_42_DH_DERIVE },
+ { "CKM_X9_42_DH_HYBRID_DERIVE", CKM_X9_42_DH_HYBRID_DERIVE },
+ { "CKM_X9_42_MQV_DERIVE", CKM_X9_42_MQV_DERIVE },
+ { "CKM_RC2_KEY_GEN", CKM_RC2_KEY_GEN },
+ { "CKM_RC2_ECB", CKM_RC2_ECB },
+ { "CKM_RC2_CBC", CKM_RC2_CBC },
+ { "CKM_RC2_MAC", CKM_RC2_MAC },
+ { "CKM_RC2_MAC_GENERAL", CKM_RC2_MAC_GENERAL },
+ { "CKM_RC2_CBC_PAD", CKM_RC2_CBC_PAD },
+ { "CKM_RC4_KEY_GEN", CKM_RC4_KEY_GEN },
+ { "CKM_RC4", CKM_RC4 },
+ { "CKM_DES_KEY_GEN", CKM_DES_KEY_GEN },
+ { "CKM_DES_ECB", CKM_DES_ECB },
+ { "CKM_DES_CBC", CKM_DES_CBC },
+ { "CKM_DES_MAC", CKM_DES_MAC },
+ { "CKM_DES_MAC_GENERAL", CKM_DES_MAC_GENERAL },
+ { "CKM_DES_CBC_PAD", CKM_DES_CBC_PAD },
+ { "CKM_DES2_KEY_GEN", CKM_DES2_KEY_GEN },
+ { "CKM_DES3_KEY_GEN", CKM_DES3_KEY_GEN },
+ { "CKM_DES3_ECB", CKM_DES3_ECB },
+ { "CKM_DES3_CBC", CKM_DES3_CBC },
+ { "CKM_DES3_MAC", CKM_DES3_MAC },
+ { "CKM_DES3_MAC_GENERAL", CKM_DES3_MAC_GENERAL },
+ { "CKM_DES3_CBC_PAD", CKM_DES3_CBC_PAD },
+ { "CKM_CDMF_KEY_GEN", CKM_CDMF_KEY_GEN },
+ { "CKM_CDMF_ECB", CKM_CDMF_ECB },
+ { "CKM_CDMF_CBC", CKM_CDMF_CBC },
+ { "CKM_CDMF_MAC", CKM_CDMF_MAC },
+ { "CKM_CDMF_MAC_GENERAL", CKM_CDMF_MAC_GENERAL },
+ { "CKM_CDMF_CBC_PAD", CKM_CDMF_CBC_PAD },
+ { "CKM_MD2", CKM_MD2 },
+ { "CKM_MD2_HMAC", CKM_MD2_HMAC },
+ { "CKM_MD2_HMAC_GENERAL", CKM_MD2_HMAC_GENERAL },
+ { "CKM_MD5", CKM_MD5 },
+ { "CKM_MD5_HMAC", CKM_MD5_HMAC },
+ { "CKM_MD5_HMAC_GENERAL", CKM_MD5_HMAC_GENERAL },
+ { "CKM_SHA_1", CKM_SHA_1 },
+ { "CKM_SHA_1_HMAC", CKM_SHA_1_HMAC },
+ { "CKM_SHA_1_HMAC_GENERAL", CKM_SHA_1_HMAC_GENERAL },
+ { "CKM_RIPEMD128", CKM_RIPEMD128 },
+ { "CKM_RIPEMD128_HMAC", CKM_RIPEMD128_HMAC },
+ { "CKM_RIPEMD128_HMAC_GENERAL", CKM_RIPEMD128_HMAC_GENERAL },
+ { "CKM_RIPEMD160", CKM_RIPEMD160 },
+ { "CKM_RIPEMD160_HMAC", CKM_RIPEMD160_HMAC },
+ { "CKM_RIPEMD160_HMAC_GENERAL", CKM_RIPEMD160_HMAC_GENERAL },
+ { "CKM_CAST_KEY_GEN", CKM_CAST_KEY_GEN },
+ { "CKM_CAST_ECB", CKM_CAST_ECB },
+ { "CKM_CAST_CBC", CKM_CAST_CBC },
+ { "CKM_CAST_MAC", CKM_CAST_MAC },
+ { "CKM_CAST_MAC_GENERAL", CKM_CAST_MAC_GENERAL },
+ { "CKM_CAST_CBC_PAD", CKM_CAST_CBC_PAD },
+ { "CKM_CAST3_KEY_GEN", CKM_CAST3_KEY_GEN },
+ { "CKM_CAST3_ECB", CKM_CAST3_ECB },
+ { "CKM_CAST3_CBC", CKM_CAST3_CBC },
+ { "CKM_CAST3_MAC", CKM_CAST3_MAC },
+ { "CKM_CAST3_MAC_GENERAL", CKM_CAST3_MAC_GENERAL },
+ { "CKM_CAST3_CBC_PAD", CKM_CAST3_CBC_PAD },
+ { "CKM_CAST5_KEY_GEN", CKM_CAST5_KEY_GEN },
+ { "CKM_CAST128_KEY_GEN", CKM_CAST128_KEY_GEN },
+ { "CKM_CAST5_ECB", CKM_CAST5_ECB },
+ { "CKM_CAST128_ECB", CKM_CAST128_ECB },
+ { "CKM_CAST5_CBC", CKM_CAST5_CBC },
+ { "CKM_CAST128_CBC", CKM_CAST128_CBC },
+ { "CKM_CAST5_MAC", CKM_CAST5_MAC },
+ { "CKM_CAST128_MAC", CKM_CAST128_MAC },
+ { "CKM_CAST5_MAC_GENERAL", CKM_CAST5_MAC_GENERAL },
+ { "CKM_CAST128_MAC_GENERAL", CKM_CAST128_MAC_GENERAL },
+ { "CKM_CAST5_CBC_PAD", CKM_CAST5_CBC_PAD },
+ { "CKM_CAST128_CBC_PAD", CKM_CAST128_CBC_PAD },
+ { "CKM_RC5_KEY_GEN", CKM_RC5_KEY_GEN },
+ { "CKM_RC5_ECB", CKM_RC5_ECB },
+ { "CKM_RC5_CBC", CKM_RC5_CBC },
+ { "CKM_RC5_MAC", CKM_RC5_MAC },
+ { "CKM_RC5_MAC_GENERAL", CKM_RC5_MAC_GENERAL },
+ { "CKM_RC5_CBC_PAD", CKM_RC5_CBC_PAD },
+ { "CKM_IDEA_KEY_GEN", CKM_IDEA_KEY_GEN },
+ { "CKM_IDEA_ECB", CKM_IDEA_ECB },
+ { "CKM_IDEA_CBC", CKM_IDEA_CBC },
+ { "CKM_IDEA_MAC", CKM_IDEA_MAC },
+ { "CKM_IDEA_MAC_GENERAL", CKM_IDEA_MAC_GENERAL },
+ { "CKM_IDEA_CBC_PAD", CKM_IDEA_CBC_PAD },
+ { "CKM_GENERIC_SECRET_KEY_GEN", CKM_GENERIC_SECRET_KEY_GEN },
+ { "CKM_CONCATENATE_BASE_AND_KEY", CKM_CONCATENATE_BASE_AND_KEY },
+ { "CKM_CONCATENATE_BASE_AND_DATA", CKM_CONCATENATE_BASE_AND_DATA },
+ { "CKM_CONCATENATE_DATA_AND_BASE", CKM_CONCATENATE_DATA_AND_BASE },
+ { "CKM_XOR_BASE_AND_DATA", CKM_XOR_BASE_AND_DATA },
+ { "CKM_EXTRACT_KEY_FROM_KEY", CKM_EXTRACT_KEY_FROM_KEY },
+ { "CKM_SSL3_PRE_MASTER_KEY_GEN", CKM_SSL3_PRE_MASTER_KEY_GEN },
+ { "CKM_SSL3_MASTER_KEY_DERIVE", CKM_SSL3_MASTER_KEY_DERIVE },
+ { "CKM_SSL3_KEY_AND_MAC_DERIVE", CKM_SSL3_KEY_AND_MAC_DERIVE },
+ { "CKM_SSL3_MASTER_KEY_DERIVE_DH", CKM_SSL3_MASTER_KEY_DERIVE_DH },
+ { "CKM_TLS_PRE_MASTER_KEY_GEN", CKM_TLS_PRE_MASTER_KEY_GEN },
+ { "CKM_TLS_MASTER_KEY_DERIVE", CKM_TLS_MASTER_KEY_DERIVE },
+ { "CKM_TLS_KEY_AND_MAC_DERIVE", CKM_TLS_KEY_AND_MAC_DERIVE },
+ { "CKM_TLS_MASTER_KEY_DERIVE_DH", CKM_TLS_MASTER_KEY_DERIVE_DH },
+ { "CKM_SSL3_MD5_MAC", CKM_SSL3_MD5_MAC },
+ { "CKM_SSL3_SHA1_MAC", CKM_SSL3_SHA1_MAC },
+ { "CKM_MD5_KEY_DERIVATION", CKM_MD5_KEY_DERIVATION },
+ { "CKM_MD2_KEY_DERIVATION", CKM_MD2_KEY_DERIVATION },
+ { "CKM_SHA1_KEY_DERIVATION", CKM_SHA1_KEY_DERIVATION },
+ { "CKM_PBE_MD2_DES_CBC", CKM_PBE_MD2_DES_CBC },
+ { "CKM_PBE_MD5_DES_CBC", CKM_PBE_MD5_DES_CBC },
+ { "CKM_PBE_MD5_CAST_CBC", CKM_PBE_MD5_CAST_CBC },
+ { "CKM_PBE_MD5_CAST3_CBC", CKM_PBE_MD5_CAST3_CBC },
+ { "CKM_PBE_MD5_CAST5_CBC", CKM_PBE_MD5_CAST5_CBC },
+ { "CKM_PBE_MD5_CAST128_CBC", CKM_PBE_MD5_CAST128_CBC },
+ { "CKM_PBE_SHA1_CAST5_CBC", CKM_PBE_SHA1_CAST5_CBC },
+ { "CKM_PBE_SHA1_CAST128_CBC", CKM_PBE_SHA1_CAST128_CBC },
+ { "CKM_PBE_SHA1_RC4_128", CKM_PBE_SHA1_RC4_128 },
+ { "CKM_PBE_SHA1_RC4_40", CKM_PBE_SHA1_RC4_40 },
+ { "CKM_PBE_SHA1_DES3_EDE_CBC", CKM_PBE_SHA1_DES3_EDE_CBC },
+ { "CKM_PBE_SHA1_DES2_EDE_CBC", CKM_PBE_SHA1_DES2_EDE_CBC },
+ { "CKM_PBE_SHA1_RC2_128_CBC", CKM_PBE_SHA1_RC2_128_CBC },
+ { "CKM_PBE_SHA1_RC2_40_CBC", CKM_PBE_SHA1_RC2_40_CBC },
+ { "CKM_PKCS5_PBKD2", CKM_PKCS5_PBKD2 },
+ { "CKM_PBA_SHA1_WITH_SHA1_HMAC", CKM_PBA_SHA1_WITH_SHA1_HMAC },
+ { "CKM_KEY_WRAP_LYNKS", CKM_KEY_WRAP_LYNKS },
+ { "CKM_KEY_WRAP_SET_OAEP", CKM_KEY_WRAP_SET_OAEP },
+ { "CKM_SKIPJACK_KEY_GEN", CKM_SKIPJACK_KEY_GEN },
+ { "CKM_SKIPJACK_ECB64", CKM_SKIPJACK_ECB64 },
+ { "CKM_SKIPJACK_CBC64", CKM_SKIPJACK_CBC64 },
+ { "CKM_SKIPJACK_OFB64", CKM_SKIPJACK_OFB64 },
+ { "CKM_SKIPJACK_CFB64", CKM_SKIPJACK_CFB64 },
+ { "CKM_SKIPJACK_CFB32", CKM_SKIPJACK_CFB32 },
+ { "CKM_SKIPJACK_CFB16", CKM_SKIPJACK_CFB16 },
+ { "CKM_SKIPJACK_CFB8", CKM_SKIPJACK_CFB8 },
+ { "CKM_SKIPJACK_WRAP", CKM_SKIPJACK_WRAP },
+ { "CKM_SKIPJACK_PRIVATE_WRAP", CKM_SKIPJACK_PRIVATE_WRAP },
+ { "CKM_SKIPJACK_RELAYX", CKM_SKIPJACK_RELAYX },
+ { "CKM_KEA_KEY_PAIR_GEN", CKM_KEA_KEY_PAIR_GEN },
+ { "CKM_KEA_KEY_DERIVE", CKM_KEA_KEY_DERIVE },
+ { "CKM_FORTEZZA_TIMESTAMP", CKM_FORTEZZA_TIMESTAMP },
+ { "CKM_BATON_KEY_GEN", CKM_BATON_KEY_GEN },
+ { "CKM_BATON_ECB128", CKM_BATON_ECB128 },
+ { "CKM_BATON_ECB96", CKM_BATON_ECB96 },
+ { "CKM_BATON_CBC128", CKM_BATON_CBC128 },
+ { "CKM_BATON_COUNTER", CKM_BATON_COUNTER },
+ { "CKM_BATON_SHUFFLE", CKM_BATON_SHUFFLE },
+ { "CKM_BATON_WRAP", CKM_BATON_WRAP },
+ { "CKM_ECDSA_KEY_PAIR_GEN", CKM_ECDSA_KEY_PAIR_GEN },
+ { "CKM_EC_KEY_PAIR_GEN", CKM_EC_KEY_PAIR_GEN },
+ { "CKM_ECDSA", CKM_ECDSA },
+ { "CKM_ECDSA_SHA1", CKM_ECDSA_SHA1 },
+ { "CKM_ECDH1_DERIVE", CKM_ECDH1_DERIVE },
+ { "CKM_ECDH1_COFACTOR_DERIVE", CKM_ECDH1_COFACTOR_DERIVE },
+ { "CKM_ECMQV_DERIVE", CKM_ECMQV_DERIVE },
+ { "CKM_JUNIPER_KEY_GEN", CKM_JUNIPER_KEY_GEN },
+ { "CKM_JUNIPER_ECB128", CKM_JUNIPER_ECB128 },
+ { "CKM_JUNIPER_CBC128", CKM_JUNIPER_CBC128 },
+ { "CKM_JUNIPER_COUNTER", CKM_JUNIPER_COUNTER },
+ { "CKM_JUNIPER_SHUFFLE", CKM_JUNIPER_SHUFFLE },
+ { "CKM_JUNIPER_WRAP", CKM_JUNIPER_WRAP },
+ { "CKM_FASTHASH", CKM_FASTHASH },
+ { "CKM_AES_KEY_GEN", CKM_AES_KEY_GEN },
+ { "CKM_AES_ECB", CKM_AES_ECB },
+ { "CKM_AES_CBC", CKM_AES_CBC },
+ { "CKM_AES_MAC", CKM_AES_MAC },
+ { "CKM_AES_MAC_GENERAL", CKM_AES_MAC_GENERAL },
+ { "CKM_AES_CBC_PAD", CKM_AES_CBC_PAD },
+ { "CKM_DSA_PARAMETER_GEN", CKM_DSA_PARAMETER_GEN },
+ { "CKM_DH_PKCS_PARAMETER_GEN", CKM_DH_PKCS_PARAMETER_GEN },
+ { "CKM_X9_42_DH_PARAMETER_GEN", CKM_X9_42_DH_PARAMETER_GEN },
+ { "CKM_VENDOR_DEFINED", CKM_VENDOR_DEFINED },
+ { NULL, 0 }
+};
+
+/*
+ * pkcs11_mech2str - convert PKCS#11 mech to a string
+ *
+ * Anything below CKM_VENDOR_DEFINED that wasn't in the mapping table
+ * at build time causes NULL to be returned. Anything above it also
+ * returns NULL since we have no way to know what its real name is.
+ */
+char
+*pkcs11_mech2str(CK_MECHANISM_TYPE mech)
+{
+ int i;
+ char buf[11]; /* Num chars for representing ulong in ASCII */
+
+ if (mech > CKM_VENDOR_DEFINED) {
+ (void) snprintf(buf, sizeof (buf), "%#lx", mech);
+ return (strdup(buf));
+ }
+
+ for (i = 0; mapping[i].str; i++) {
+ if (mapping[i].mech == mech)
+ return (strdup(mapping[i].str));
+ }
+
+ return (NULL);
+}
+
+/*
+ * pkcs11_str2mech - convert a string into a PKCS#11 mech number.
+ *
+ * Since there isn't reserved value for an invalid mech we return
+ * CKR_MECHANISM_INVALID for anything we don't recognise.
+ * The value in mech isn't meaningful in these cases.
+ */
+CK_RV
+pkcs11_str2mech(char *mech_str, CK_MECHANISM_TYPE_PTR mech)
+{
+ int i;
+ char *tmech_str;
+
+ if (mech_str == NULL)
+ return (CKR_MECHANISM_INVALID);
+
+ if (strncasecmp(mech_str, "0x8", 3) == 0) {
+ cryptodebug("pkcs11_str2mech: hex string passed in: %s",
+ mech_str);
+ *mech = strtoll(mech_str, NULL, 16);
+ return (CKR_OK);
+ }
+
+ if (strncasecmp(mech_str, "CKM_", 4) != 0) {
+ size_t tmech_strlen = strlen(mech_str) + 4 + 1;
+ cryptodebug("pkcs11_str2mech: no CKM_ prefix: %s", mech_str);
+ tmech_str = malloc(tmech_strlen * sizeof (char));
+ (void) snprintf(tmech_str, tmech_strlen, "CKM_%s", mech_str);
+ cryptodebug("pkcs11_str2mech: with prefix: %s", tmech_str);
+ } else {
+ tmech_str = mech_str;
+ }
+
+ for (i = 0; mapping[i].str; i++) {
+ if (strcasecmp(mapping[i].str, tmech_str) == 0) {
+ *mech = mapping[i].mech;
+ if (tmech_str != mech_str)
+ free(tmech_str);
+ return (CKR_OK);
+ }
+ }
+ if (tmech_str != mech_str)
+ free(tmech_str);
+
+ return (CKR_MECHANISM_INVALID);
+}