/* * Copyright (c) 2004, 2013, Oracle and/or its affiliates. All rights reserved. */ /* crypto/engine/e_pk11.h */ /* * This product includes software developed by the OpenSSL Project for * use in the OpenSSL Toolkit (http://www.openssl.org/). * * This project also referenced hw_pkcs11-0.9.7b.patch written by * Afchine Madjlessi. */ /* * ==================================================================== * Copyright (c) 2000-2001 The OpenSSL Project. All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in * the documentation and/or other materials provided with the * distribution. * * 3. All advertising materials mentioning features or use of this * software must display the following acknowledgment: * "This product includes software developed by the OpenSSL Project * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" * * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to * endorse or promote products derived from this software without * prior written permission. For written permission, please contact * licensing@OpenSSL.org. * * 5. Products derived from this software may not be called "OpenSSL" * nor may "OpenSSL" appear in their names without prior written * permission of the OpenSSL Project. * * 6. Redistributions of any form whatsoever must retain the following * acknowledgment: * "This product includes software developed by the OpenSSL Project * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" * * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED * OF THE POSSIBILITY OF SUCH DAMAGE. * ==================================================================== * * This product includes cryptographic software written by Eric Young * (eay@cryptsoft.com). This product includes software written by Tim * Hudson (tjh@cryptsoft.com). * */ #ifndef E_PK11_H #define E_PK11_H #include "e_pk11_err.h" #ifdef __cplusplus extern "C" { #endif /* max byte length of a symmetric key we support */ #define PK11_KEY_LEN_MAX 32 /* * This structure encapsulates all reusable information for a PKCS#11 * session. A list of these objects is created on behalf of the * calling application using an on-demand method. Each operation * type (see PK11_OPTYPE below) has its own per-process list. * Each of the lists is basically a cache for faster PKCS#11 object * access to avoid expensive C_Find{,Init,Final}Object() calls. * * When a new request comes in, an object will be taken from the list * (if there is one) or a new one is created to handle the request * (if the list is empty). See pk11_get_session() on how it is done. */ typedef struct PK11_st_SESSION { struct PK11_st_SESSION *next; CK_SESSION_HANDLE session; /* PK11 session handle */ pid_t pid; /* Current process ID */ CK_BBOOL persistent; /* is that a keystore object? */ union { #ifndef OPENSSL_NO_RSA struct { CK_OBJECT_HANDLE rsa_pub_key; /* pub handle */ CK_OBJECT_HANDLE rsa_priv_key; /* priv handle */ RSA *rsa_pub; /* pub key addr */ BIGNUM *rsa_n_num; /* pub modulus */ BIGNUM *rsa_e_num; /* pub exponent */ RSA *rsa_priv; /* priv key addr */ BIGNUM *rsa_d_num; /* priv exponent */ } u_RSA; #endif /* OPENSSL_NO_RSA */ #ifndef OPENSSL_NO_DSA struct { CK_OBJECT_HANDLE dsa_pub_key; /* pub handle */ CK_OBJECT_HANDLE dsa_priv_key; /* priv handle */ DSA *dsa_pub; /* pub key addr */ BIGNUM *dsa_pub_num; /* pub key */ DSA *dsa_priv; /* priv key addr */ BIGNUM *dsa_priv_num; /* priv key */ } u_DSA; #endif /* OPENSSL_NO_DSA */ #ifndef OPENSSL_NO_DH struct { CK_OBJECT_HANDLE dh_key; /* key handle */ DH *dh; /* dh key addr */ BIGNUM *dh_priv_num; /* priv dh key */ } u_DH; #endif /* OPENSSL_NO_DH */ struct { CK_OBJECT_HANDLE cipher_key; /* key handle */ unsigned char key[PK11_KEY_LEN_MAX]; int key_len; /* priv key len */ int encrypt; /* 1/0 enc/decr */ } u_cipher; } opdata_u; } PK11_SESSION; #define opdata_rsa_pub_key opdata_u.u_RSA.rsa_pub_key #define opdata_rsa_priv_key opdata_u.u_RSA.rsa_priv_key #define opdata_rsa_pub opdata_u.u_RSA.rsa_pub #define opdata_rsa_priv opdata_u.u_RSA.rsa_priv #define opdata_rsa_n_num opdata_u.u_RSA.rsa_n_num #define opdata_rsa_e_num opdata_u.u_RSA.rsa_e_num #define opdata_rsa_d_num opdata_u.u_RSA.rsa_d_num #define opdata_dsa_pub_key opdata_u.u_DSA.dsa_pub_key #define opdata_dsa_priv_key opdata_u.u_DSA.dsa_priv_key #define opdata_dsa_pub opdata_u.u_DSA.dsa_pub #define opdata_dsa_pub_num opdata_u.u_DSA.dsa_pub_num #define opdata_dsa_priv opdata_u.u_DSA.dsa_priv #define opdata_dsa_priv_num opdata_u.u_DSA.dsa_priv_num #define opdata_dh_key opdata_u.u_DH.dh_key #define opdata_dh opdata_u.u_DH.dh #define opdata_dh_priv_num opdata_u.u_DH.dh_priv_num #define opdata_cipher_key opdata_u.u_cipher.cipher_key #define opdata_key opdata_u.u_cipher.key #define opdata_key_len opdata_u.u_cipher.key_len #define opdata_encrypt opdata_u.u_cipher.encrypt /* * We have 3 different groups of operation types: * 1) asymmetric operations * 2) random operations * 3) symmetric and digest operations * * This division into groups stems from the fact that it's common that hardware * providers may support operations from one group only. For example, hardware * providers on UltraSPARC T2, n2rng(7d), ncp(7d), and n2cp(7d), each support * only a single group of operations. * * For every group a different slot can be chosen. That means that we must have * at least 3 different lists of cached PKCS#11 sessions since sessions from * different groups may be initialized in different slots. * * To provide locking granularity in multithreaded environment, the groups are * further split into types with each type having a separate session cache. */ typedef enum PK11_OPTYPE_ENUM { OP_RAND, OP_RSA, OP_DSA, OP_DH, OP_CIPHER, OP_DIGEST, OP_MAX } PK11_OPTYPE; /* * This structure contains the heads of the lists forming the object caches * and locks associated with the lists. */ typedef struct PK11_st_CACHE { PK11_SESSION *head; pthread_mutex_t *lock; } PK11_CACHE; /* structure for tracking handles of asymmetric key objects */ typedef struct PK11_active_st { CK_OBJECT_HANDLE h; unsigned int refcnt; struct PK11_active_st *prev; struct PK11_active_st *next; } PK11_active; extern pthread_mutex_t *find_lock[]; extern PK11_active *active_list[]; /* * These variables are specific for the RSA keys by reference code. See * e_pk11_pub.c for explanation. */ extern char *passphrasedialog; extern CK_FLAGS pubkey_token_flags; #define LOCK_OBJSTORE(alg_type) \ (void) pthread_mutex_lock(find_lock[alg_type]) #define UNLOCK_OBJSTORE(alg_type) \ (void) pthread_mutex_unlock(find_lock[alg_type]) extern PK11_SESSION *pk11_get_session(PK11_OPTYPE optype); extern void pk11_return_session(PK11_SESSION *sp, PK11_OPTYPE optype); #ifndef OPENSSL_NO_RSA extern int pk11_destroy_rsa_key_objects(PK11_SESSION *session); extern int pk11_destroy_rsa_object_pub(PK11_SESSION *sp, CK_BBOOL uselock); extern int pk11_destroy_rsa_object_priv(PK11_SESSION *sp, CK_BBOOL uselock); extern EVP_PKEY *pk11_load_privkey(ENGINE *e, const char *pubkey_file, UI_METHOD *ui_method, void *callback_data); extern EVP_PKEY *pk11_load_pubkey(ENGINE *e, const char *pubkey_file, UI_METHOD *ui_method, void *callback_data); extern RSA_METHOD *PK11_RSA(void); #endif /* OPENSSL_NO_RSA */ #ifndef OPENSSL_NO_DSA extern int pk11_destroy_dsa_key_objects(PK11_SESSION *session); extern int pk11_destroy_dsa_object_pub(PK11_SESSION *sp, CK_BBOOL uselock); extern int pk11_destroy_dsa_object_priv(PK11_SESSION *sp, CK_BBOOL uselock); extern DSA_METHOD *PK11_DSA(void); #endif /* OPENSSL_NO_DSA */ #ifndef OPENSSL_NO_DH extern int pk11_destroy_dh_key_objects(PK11_SESSION *session); extern int pk11_destroy_dh_object(PK11_SESSION *sp, CK_BBOOL uselock); extern DH_METHOD *PK11_DH(void); #endif /* OPENSSL_NO_DH */ extern int pk11_engine_pkey_methods(ENGINE *e, EVP_PKEY_METHOD **pmeth, const int **nids, int nid); extern CK_FUNCTION_LIST_PTR pFuncList; #ifdef __cplusplus } #endif #endif /* E_PK11_H */