diff options
author | stevel@tonic-gate <none@none> | 2005-06-14 00:00:00 -0700 |
---|---|---|
committer | stevel@tonic-gate <none@none> | 2005-06-14 00:00:00 -0700 |
commit | 7c478bd95313f5f23a4c958a745db2134aa03244 (patch) | |
tree | c871e58545497667cbb4b0a4f2daf204743e1fe7 /usr/src/lib/libcryptoutil/common/mechstr.c | |
download | illumos-gate-7c478bd95313f5f23a4c958a745db2134aa03244.tar.gz |
OpenSolaris Launch
Diffstat (limited to 'usr/src/lib/libcryptoutil/common/mechstr.c')
-rw-r--r-- | usr/src/lib/libcryptoutil/common/mechstr.c | 307 |
1 files changed, 307 insertions, 0 deletions
diff --git a/usr/src/lib/libcryptoutil/common/mechstr.c b/usr/src/lib/libcryptoutil/common/mechstr.c new file mode 100644 index 0000000000..fc3ab9c16f --- /dev/null +++ b/usr/src/lib/libcryptoutil/common/mechstr.c @@ -0,0 +1,307 @@ +/* + * CDDL HEADER START + * + * The contents of this file are subject to the terms of the + * Common Development and Distribution License, Version 1.0 only + * (the "License"). You may not use this file except in compliance + * with the License. + * + * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE + * or http://www.opensolaris.org/os/licensing. + * See the License for the specific language governing permissions + * and limitations under the License. + * + * When distributing Covered Code, include this CDDL HEADER in each + * file and include the License file at usr/src/OPENSOLARIS.LICENSE. + * If applicable, add the following below this CDDL HEADER, with the + * fields enclosed by brackets "[]" replaced with your own identifying + * information: Portions Copyright [yyyy] [name of copyright owner] + * + * CDDL HEADER END + */ +/* + * Copyright 2004 Sun Microsystems, Inc. All rights reserved. + * Use is subject to license terms. + */ + +#pragma ident "%Z%%M% %I% %E% SMI" + +/* + * Convert Algorithm names as strings to PKCS#11 Mech numbers and vice versa. + */ + +#include <string.h> +#include <stdlib.h> +#include <stdio.h> +#include <security/cryptoki.h> +#include <security/pkcs11t.h> + +#include <cryptoutil.h> + +/* + * The table below is dynamically generated by parsing pkcs11t.h + * from the Makefile. + */ +static const struct { + const char *str; + CK_MECHANISM_TYPE mech; +} mapping[] = { + { "CKM_RSA_PKCS_KEY_PAIR_GEN", CKM_RSA_PKCS_KEY_PAIR_GEN }, + { "CKM_RSA_PKCS", CKM_RSA_PKCS }, + { "CKM_RSA_9796", CKM_RSA_9796 }, + { "CKM_RSA_X_509", CKM_RSA_X_509 }, + { "CKM_MD2_RSA_PKCS", CKM_MD2_RSA_PKCS }, + { "CKM_MD5_RSA_PKCS", CKM_MD5_RSA_PKCS }, + { "CKM_SHA1_RSA_PKCS", CKM_SHA1_RSA_PKCS }, + { "CKM_RIPEMD128_RSA_PKCS", CKM_RIPEMD128_RSA_PKCS }, + { "CKM_RIPEMD160_RSA_PKCS", CKM_RIPEMD160_RSA_PKCS }, + { "CKM_RSA_PKCS_OAEP", CKM_RSA_PKCS_OAEP }, + { "CKM_RSA_X9_31_KEY_PAIR_GEN", CKM_RSA_X9_31_KEY_PAIR_GEN }, + { "CKM_RSA_X9_31", CKM_RSA_X9_31 }, + { "CKM_SHA1_RSA_X9_31", CKM_SHA1_RSA_X9_31 }, + { "CKM_RSA_PKCS_PSS", CKM_RSA_PKCS_PSS }, + { "CKM_SHA1_RSA_PKCS_PSS", CKM_SHA1_RSA_PKCS_PSS }, + { "CKM_DSA_KEY_PAIR_GEN", CKM_DSA_KEY_PAIR_GEN }, + { "CKM_DSA", CKM_DSA }, + { "CKM_DSA_SHA1", CKM_DSA_SHA1 }, + { "CKM_DH_PKCS_KEY_PAIR_GEN", CKM_DH_PKCS_KEY_PAIR_GEN }, + { "CKM_DH_PKCS_DERIVE", CKM_DH_PKCS_DERIVE }, + { "CKM_X9_42_DH_KEY_PAIR_GEN", CKM_X9_42_DH_KEY_PAIR_GEN }, + { "CKM_X9_42_DH_DERIVE", CKM_X9_42_DH_DERIVE }, + { "CKM_X9_42_DH_HYBRID_DERIVE", CKM_X9_42_DH_HYBRID_DERIVE }, + { "CKM_X9_42_MQV_DERIVE", CKM_X9_42_MQV_DERIVE }, + { "CKM_RC2_KEY_GEN", CKM_RC2_KEY_GEN }, + { "CKM_RC2_ECB", CKM_RC2_ECB }, + { "CKM_RC2_CBC", CKM_RC2_CBC }, + { "CKM_RC2_MAC", CKM_RC2_MAC }, + { "CKM_RC2_MAC_GENERAL", CKM_RC2_MAC_GENERAL }, + { "CKM_RC2_CBC_PAD", CKM_RC2_CBC_PAD }, + { "CKM_RC4_KEY_GEN", CKM_RC4_KEY_GEN }, + { "CKM_RC4", CKM_RC4 }, + { "CKM_DES_KEY_GEN", CKM_DES_KEY_GEN }, + { "CKM_DES_ECB", CKM_DES_ECB }, + { "CKM_DES_CBC", CKM_DES_CBC }, + { "CKM_DES_MAC", CKM_DES_MAC }, + { "CKM_DES_MAC_GENERAL", CKM_DES_MAC_GENERAL }, + { "CKM_DES_CBC_PAD", CKM_DES_CBC_PAD }, + { "CKM_DES2_KEY_GEN", CKM_DES2_KEY_GEN }, + { "CKM_DES3_KEY_GEN", CKM_DES3_KEY_GEN }, + { "CKM_DES3_ECB", CKM_DES3_ECB }, + { "CKM_DES3_CBC", CKM_DES3_CBC }, + { "CKM_DES3_MAC", CKM_DES3_MAC }, + { "CKM_DES3_MAC_GENERAL", CKM_DES3_MAC_GENERAL }, + { "CKM_DES3_CBC_PAD", CKM_DES3_CBC_PAD }, + { "CKM_CDMF_KEY_GEN", CKM_CDMF_KEY_GEN }, + { "CKM_CDMF_ECB", CKM_CDMF_ECB }, + { "CKM_CDMF_CBC", CKM_CDMF_CBC }, + { "CKM_CDMF_MAC", CKM_CDMF_MAC }, + { "CKM_CDMF_MAC_GENERAL", CKM_CDMF_MAC_GENERAL }, + { "CKM_CDMF_CBC_PAD", CKM_CDMF_CBC_PAD }, + { "CKM_MD2", CKM_MD2 }, + { "CKM_MD2_HMAC", CKM_MD2_HMAC }, + { "CKM_MD2_HMAC_GENERAL", CKM_MD2_HMAC_GENERAL }, + { "CKM_MD5", CKM_MD5 }, + { "CKM_MD5_HMAC", CKM_MD5_HMAC }, + { "CKM_MD5_HMAC_GENERAL", CKM_MD5_HMAC_GENERAL }, + { "CKM_SHA_1", CKM_SHA_1 }, + { "CKM_SHA_1_HMAC", CKM_SHA_1_HMAC }, + { "CKM_SHA_1_HMAC_GENERAL", CKM_SHA_1_HMAC_GENERAL }, + { "CKM_RIPEMD128", CKM_RIPEMD128 }, + { "CKM_RIPEMD128_HMAC", CKM_RIPEMD128_HMAC }, + { "CKM_RIPEMD128_HMAC_GENERAL", CKM_RIPEMD128_HMAC_GENERAL }, + { "CKM_RIPEMD160", CKM_RIPEMD160 }, + { "CKM_RIPEMD160_HMAC", CKM_RIPEMD160_HMAC }, + { "CKM_RIPEMD160_HMAC_GENERAL", CKM_RIPEMD160_HMAC_GENERAL }, + { "CKM_CAST_KEY_GEN", CKM_CAST_KEY_GEN }, + { "CKM_CAST_ECB", CKM_CAST_ECB }, + { "CKM_CAST_CBC", CKM_CAST_CBC }, + { "CKM_CAST_MAC", CKM_CAST_MAC }, + { "CKM_CAST_MAC_GENERAL", CKM_CAST_MAC_GENERAL }, + { "CKM_CAST_CBC_PAD", CKM_CAST_CBC_PAD }, + { "CKM_CAST3_KEY_GEN", CKM_CAST3_KEY_GEN }, + { "CKM_CAST3_ECB", CKM_CAST3_ECB }, + { "CKM_CAST3_CBC", CKM_CAST3_CBC }, + { "CKM_CAST3_MAC", CKM_CAST3_MAC }, + { "CKM_CAST3_MAC_GENERAL", CKM_CAST3_MAC_GENERAL }, + { "CKM_CAST3_CBC_PAD", CKM_CAST3_CBC_PAD }, + { "CKM_CAST5_KEY_GEN", CKM_CAST5_KEY_GEN }, + { "CKM_CAST128_KEY_GEN", CKM_CAST128_KEY_GEN }, + { "CKM_CAST5_ECB", CKM_CAST5_ECB }, + { "CKM_CAST128_ECB", CKM_CAST128_ECB }, + { "CKM_CAST5_CBC", CKM_CAST5_CBC }, + { "CKM_CAST128_CBC", CKM_CAST128_CBC }, + { "CKM_CAST5_MAC", CKM_CAST5_MAC }, + { "CKM_CAST128_MAC", CKM_CAST128_MAC }, + { "CKM_CAST5_MAC_GENERAL", CKM_CAST5_MAC_GENERAL }, + { "CKM_CAST128_MAC_GENERAL", CKM_CAST128_MAC_GENERAL }, + { "CKM_CAST5_CBC_PAD", CKM_CAST5_CBC_PAD }, + { "CKM_CAST128_CBC_PAD", CKM_CAST128_CBC_PAD }, + { "CKM_RC5_KEY_GEN", CKM_RC5_KEY_GEN }, + { "CKM_RC5_ECB", CKM_RC5_ECB }, + { "CKM_RC5_CBC", CKM_RC5_CBC }, + { "CKM_RC5_MAC", CKM_RC5_MAC }, + { "CKM_RC5_MAC_GENERAL", CKM_RC5_MAC_GENERAL }, + { "CKM_RC5_CBC_PAD", CKM_RC5_CBC_PAD }, + { "CKM_IDEA_KEY_GEN", CKM_IDEA_KEY_GEN }, + { "CKM_IDEA_ECB", CKM_IDEA_ECB }, + { "CKM_IDEA_CBC", CKM_IDEA_CBC }, + { "CKM_IDEA_MAC", CKM_IDEA_MAC }, + { "CKM_IDEA_MAC_GENERAL", CKM_IDEA_MAC_GENERAL }, + { "CKM_IDEA_CBC_PAD", CKM_IDEA_CBC_PAD }, + { "CKM_GENERIC_SECRET_KEY_GEN", CKM_GENERIC_SECRET_KEY_GEN }, + { "CKM_CONCATENATE_BASE_AND_KEY", CKM_CONCATENATE_BASE_AND_KEY }, + { "CKM_CONCATENATE_BASE_AND_DATA", CKM_CONCATENATE_BASE_AND_DATA }, + { "CKM_CONCATENATE_DATA_AND_BASE", CKM_CONCATENATE_DATA_AND_BASE }, + { "CKM_XOR_BASE_AND_DATA", CKM_XOR_BASE_AND_DATA }, + { "CKM_EXTRACT_KEY_FROM_KEY", CKM_EXTRACT_KEY_FROM_KEY }, + { "CKM_SSL3_PRE_MASTER_KEY_GEN", CKM_SSL3_PRE_MASTER_KEY_GEN }, + { "CKM_SSL3_MASTER_KEY_DERIVE", CKM_SSL3_MASTER_KEY_DERIVE }, + { "CKM_SSL3_KEY_AND_MAC_DERIVE", CKM_SSL3_KEY_AND_MAC_DERIVE }, + { "CKM_SSL3_MASTER_KEY_DERIVE_DH", CKM_SSL3_MASTER_KEY_DERIVE_DH }, + { "CKM_TLS_PRE_MASTER_KEY_GEN", CKM_TLS_PRE_MASTER_KEY_GEN }, + { "CKM_TLS_MASTER_KEY_DERIVE", CKM_TLS_MASTER_KEY_DERIVE }, + { "CKM_TLS_KEY_AND_MAC_DERIVE", CKM_TLS_KEY_AND_MAC_DERIVE }, + { "CKM_TLS_MASTER_KEY_DERIVE_DH", CKM_TLS_MASTER_KEY_DERIVE_DH }, + { "CKM_SSL3_MD5_MAC", CKM_SSL3_MD5_MAC }, + { "CKM_SSL3_SHA1_MAC", CKM_SSL3_SHA1_MAC }, + { "CKM_MD5_KEY_DERIVATION", CKM_MD5_KEY_DERIVATION }, + { "CKM_MD2_KEY_DERIVATION", CKM_MD2_KEY_DERIVATION }, + { "CKM_SHA1_KEY_DERIVATION", CKM_SHA1_KEY_DERIVATION }, + { "CKM_PBE_MD2_DES_CBC", CKM_PBE_MD2_DES_CBC }, + { "CKM_PBE_MD5_DES_CBC", CKM_PBE_MD5_DES_CBC }, + { "CKM_PBE_MD5_CAST_CBC", CKM_PBE_MD5_CAST_CBC }, + { "CKM_PBE_MD5_CAST3_CBC", CKM_PBE_MD5_CAST3_CBC }, + { "CKM_PBE_MD5_CAST5_CBC", CKM_PBE_MD5_CAST5_CBC }, + { "CKM_PBE_MD5_CAST128_CBC", CKM_PBE_MD5_CAST128_CBC }, + { "CKM_PBE_SHA1_CAST5_CBC", CKM_PBE_SHA1_CAST5_CBC }, + { "CKM_PBE_SHA1_CAST128_CBC", CKM_PBE_SHA1_CAST128_CBC }, + { "CKM_PBE_SHA1_RC4_128", CKM_PBE_SHA1_RC4_128 }, + { "CKM_PBE_SHA1_RC4_40", CKM_PBE_SHA1_RC4_40 }, + { "CKM_PBE_SHA1_DES3_EDE_CBC", CKM_PBE_SHA1_DES3_EDE_CBC }, + { "CKM_PBE_SHA1_DES2_EDE_CBC", CKM_PBE_SHA1_DES2_EDE_CBC }, + { "CKM_PBE_SHA1_RC2_128_CBC", CKM_PBE_SHA1_RC2_128_CBC }, + { "CKM_PBE_SHA1_RC2_40_CBC", CKM_PBE_SHA1_RC2_40_CBC }, + { "CKM_PKCS5_PBKD2", CKM_PKCS5_PBKD2 }, + { "CKM_PBA_SHA1_WITH_SHA1_HMAC", CKM_PBA_SHA1_WITH_SHA1_HMAC }, + { "CKM_KEY_WRAP_LYNKS", CKM_KEY_WRAP_LYNKS }, + { "CKM_KEY_WRAP_SET_OAEP", CKM_KEY_WRAP_SET_OAEP }, + { "CKM_SKIPJACK_KEY_GEN", CKM_SKIPJACK_KEY_GEN }, + { "CKM_SKIPJACK_ECB64", CKM_SKIPJACK_ECB64 }, + { "CKM_SKIPJACK_CBC64", CKM_SKIPJACK_CBC64 }, + { "CKM_SKIPJACK_OFB64", CKM_SKIPJACK_OFB64 }, + { "CKM_SKIPJACK_CFB64", CKM_SKIPJACK_CFB64 }, + { "CKM_SKIPJACK_CFB32", CKM_SKIPJACK_CFB32 }, + { "CKM_SKIPJACK_CFB16", CKM_SKIPJACK_CFB16 }, + { "CKM_SKIPJACK_CFB8", CKM_SKIPJACK_CFB8 }, + { "CKM_SKIPJACK_WRAP", CKM_SKIPJACK_WRAP }, + { "CKM_SKIPJACK_PRIVATE_WRAP", CKM_SKIPJACK_PRIVATE_WRAP }, + { "CKM_SKIPJACK_RELAYX", CKM_SKIPJACK_RELAYX }, + { "CKM_KEA_KEY_PAIR_GEN", CKM_KEA_KEY_PAIR_GEN }, + { "CKM_KEA_KEY_DERIVE", CKM_KEA_KEY_DERIVE }, + { "CKM_FORTEZZA_TIMESTAMP", CKM_FORTEZZA_TIMESTAMP }, + { "CKM_BATON_KEY_GEN", CKM_BATON_KEY_GEN }, + { "CKM_BATON_ECB128", CKM_BATON_ECB128 }, + { "CKM_BATON_ECB96", CKM_BATON_ECB96 }, + { "CKM_BATON_CBC128", CKM_BATON_CBC128 }, + { "CKM_BATON_COUNTER", CKM_BATON_COUNTER }, + { "CKM_BATON_SHUFFLE", CKM_BATON_SHUFFLE }, + { "CKM_BATON_WRAP", CKM_BATON_WRAP }, + { "CKM_ECDSA_KEY_PAIR_GEN", CKM_ECDSA_KEY_PAIR_GEN }, + { "CKM_EC_KEY_PAIR_GEN", CKM_EC_KEY_PAIR_GEN }, + { "CKM_ECDSA", CKM_ECDSA }, + { "CKM_ECDSA_SHA1", CKM_ECDSA_SHA1 }, + { "CKM_ECDH1_DERIVE", CKM_ECDH1_DERIVE }, + { "CKM_ECDH1_COFACTOR_DERIVE", CKM_ECDH1_COFACTOR_DERIVE }, + { "CKM_ECMQV_DERIVE", CKM_ECMQV_DERIVE }, + { "CKM_JUNIPER_KEY_GEN", CKM_JUNIPER_KEY_GEN }, + { "CKM_JUNIPER_ECB128", CKM_JUNIPER_ECB128 }, + { "CKM_JUNIPER_CBC128", CKM_JUNIPER_CBC128 }, + { "CKM_JUNIPER_COUNTER", CKM_JUNIPER_COUNTER }, + { "CKM_JUNIPER_SHUFFLE", CKM_JUNIPER_SHUFFLE }, + { "CKM_JUNIPER_WRAP", CKM_JUNIPER_WRAP }, + { "CKM_FASTHASH", CKM_FASTHASH }, + { "CKM_AES_KEY_GEN", CKM_AES_KEY_GEN }, + { "CKM_AES_ECB", CKM_AES_ECB }, + { "CKM_AES_CBC", CKM_AES_CBC }, + { "CKM_AES_MAC", CKM_AES_MAC }, + { "CKM_AES_MAC_GENERAL", CKM_AES_MAC_GENERAL }, + { "CKM_AES_CBC_PAD", CKM_AES_CBC_PAD }, + { "CKM_DSA_PARAMETER_GEN", CKM_DSA_PARAMETER_GEN }, + { "CKM_DH_PKCS_PARAMETER_GEN", CKM_DH_PKCS_PARAMETER_GEN }, + { "CKM_X9_42_DH_PARAMETER_GEN", CKM_X9_42_DH_PARAMETER_GEN }, + { "CKM_VENDOR_DEFINED", CKM_VENDOR_DEFINED }, + { NULL, 0 } +}; + +/* + * pkcs11_mech2str - convert PKCS#11 mech to a string + * + * Anything below CKM_VENDOR_DEFINED that wasn't in the mapping table + * at build time causes NULL to be returned. Anything above it also + * returns NULL since we have no way to know what its real name is. + */ +char +*pkcs11_mech2str(CK_MECHANISM_TYPE mech) +{ + int i; + char buf[11]; /* Num chars for representing ulong in ASCII */ + + if (mech > CKM_VENDOR_DEFINED) { + (void) snprintf(buf, sizeof (buf), "%#lx", mech); + return (strdup(buf)); + } + + for (i = 0; mapping[i].str; i++) { + if (mapping[i].mech == mech) + return (strdup(mapping[i].str)); + } + + return (NULL); +} + +/* + * pkcs11_str2mech - convert a string into a PKCS#11 mech number. + * + * Since there isn't reserved value for an invalid mech we return + * CKR_MECHANISM_INVALID for anything we don't recognise. + * The value in mech isn't meaningful in these cases. + */ +CK_RV +pkcs11_str2mech(char *mech_str, CK_MECHANISM_TYPE_PTR mech) +{ + int i; + char *tmech_str; + + if (mech_str == NULL) + return (CKR_MECHANISM_INVALID); + + if (strncasecmp(mech_str, "0x8", 3) == 0) { + cryptodebug("pkcs11_str2mech: hex string passed in: %s", + mech_str); + *mech = strtoll(mech_str, NULL, 16); + return (CKR_OK); + } + + if (strncasecmp(mech_str, "CKM_", 4) != 0) { + size_t tmech_strlen = strlen(mech_str) + 4 + 1; + cryptodebug("pkcs11_str2mech: no CKM_ prefix: %s", mech_str); + tmech_str = malloc(tmech_strlen * sizeof (char)); + (void) snprintf(tmech_str, tmech_strlen, "CKM_%s", mech_str); + cryptodebug("pkcs11_str2mech: with prefix: %s", tmech_str); + } else { + tmech_str = mech_str; + } + + for (i = 0; mapping[i].str; i++) { + if (strcasecmp(mapping[i].str, tmech_str) == 0) { + *mech = mapping[i].mech; + if (tmech_str != mech_str) + free(tmech_str); + return (CKR_OK); + } + } + if (tmech_str != mech_str) + free(tmech_str); + + return (CKR_MECHANISM_INVALID); +} |