1/*
2 * CDDL HEADER START
3 *
4 * The contents of this file are subject to the terms of the
5 * Common Development and Distribution License (the "License").
6 * You may not use this file except in compliance with the License.
7 *
8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9 * or http://www.opensolaris.org/os/licensing.
10 * See the License for the specific language governing permissions
11 * and limitations under the License.
12 *
13 * When distributing Covered Code, include this CDDL HEADER in each
14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15 * If applicable, add the following below this CDDL HEADER, with the
16 * fields enclosed by brackets "[]" replaced with your own identifying
17 * information: Portions Copyright [yyyy] [name of copyright owner]
18 *
19 * CDDL HEADER END
20 */
21/*
22 * Copyright (c) 2003, 2010, Oracle and/or its affiliates. All rights reserved.
23 */
24
25#ifndef _SYS_CRYPTO_COMMON_H
26#define	_SYS_CRYPTO_COMMON_H
27
28/*
29 * Header file for the common data structures of the cryptographic framework
30 */
31
32#ifdef __cplusplus
33extern "C" {
34#endif
35
36#include <sys/types.h>
37#include <sys/uio.h>
38#include <sys/stream.h>
39#include <sys/mutex.h>
40#include <sys/condvar.h>
41
42
43/* Cryptographic Mechanisms */
44
45#define	CRYPTO_MAX_MECH_NAME 32
46typedef char crypto_mech_name_t[CRYPTO_MAX_MECH_NAME];
47
48typedef uint64_t crypto_mech_type_t;
49
50typedef struct crypto_mechanism {
51	crypto_mech_type_t	cm_type;	/* mechanism type */
52	caddr_t			cm_param;	/* mech. parameter */
53	size_t			cm_param_len;	/* mech. parameter len */
54} crypto_mechanism_t;
55
56#ifdef  _SYSCALL32
57
58typedef struct crypto_mechanism32 {
59	crypto_mech_type_t	cm_type;	/* mechanism type */
60	caddr32_t		cm_param;	/* mech. parameter */
61	size32_t		cm_param_len;   /* mech. parameter len */
62} crypto_mechanism32_t;
63
64#endif  /* _SYSCALL32 */
65
66#ifdef _KERNEL
67/* CK_AES_CTR_PARAMS provides parameters to the CKM_AES_CTR mechanism */
68typedef struct CK_AES_CTR_PARAMS {
69	ulong_t	ulCounterBits;
70	uint8_t cb[16];
71} CK_AES_CTR_PARAMS;
72#endif
73
74/* CK_AES_CCM_PARAMS provides parameters to the CKM_AES_CCM mechanism */
75typedef struct CK_AES_CCM_PARAMS {
76	ulong_t ulMACSize;
77	ulong_t ulNonceSize;
78	ulong_t ulAuthDataSize;
79	ulong_t ulDataSize; /* used for plaintext or ciphertext */
80	uchar_t *nonce;
81	uchar_t *authData;
82} CK_AES_CCM_PARAMS;
83
84/* CK_AES_GCM_PARAMS provides parameters to the CKM_AES_GCM mechanism */
85typedef struct CK_AES_GCM_PARAMS {
86	uchar_t *pIv;
87	ulong_t ulIvLen;
88	ulong_t ulIvBits;
89	uchar_t *pAAD;
90	ulong_t ulAADLen;
91	ulong_t ulTagBits;
92} CK_AES_GCM_PARAMS;
93
94/* CK_AES_GMAC_PARAMS provides parameters to the CKM_AES_GMAC mechanism */
95typedef struct CK_AES_GMAC_PARAMS {
96	uchar_t *pIv;
97	uchar_t *pAAD;
98	ulong_t ulAADLen;
99} CK_AES_GMAC_PARAMS;
100
101#ifdef _KERNEL
102/*
103 * CK_ECDH1_DERIVE_PARAMS provides the parameters to the
104 * CKM_ECDH1_KEY_DERIVE mechanism
105 */
106typedef struct CK_ECDH1_DERIVE_PARAMS {
107	ulong_t		kdf;
108	ulong_t		ulSharedDataLen;
109	uchar_t		*pSharedData;
110	ulong_t		ulPublicDataLen;
111	uchar_t		*pPublicData;
112} CK_ECDH1_DERIVE_PARAMS;
113#endif
114
115#ifdef _KERNEL
116#ifdef  _SYSCALL32
117
118/* needed for 32-bit applications running on 64-bit kernels */
119typedef struct CK_AES_CTR_PARAMS32 {
120	uint32_t ulCounterBits;
121	uint8_t cb[16];
122} CK_AES_CTR_PARAMS32;
123
124/* needed for 32-bit applications running on 64-bit kernels */
125typedef struct CK_AES_CCM_PARAMS32 {
126	uint32_t ulMACSize;
127	uint32_t ulNonceSize;
128	uint32_t ulAuthDataSize;
129	uint32_t ulDataSize;
130	caddr32_t nonce;
131	caddr32_t authData;
132} CK_AES_CCM_PARAMS32;
133
134/* needed for 32-bit applications running on 64-bit kernels */
135typedef struct CK_AES_GCM_PARAMS32 {
136	caddr32_t pIv;
137	uint32_t ulIvLen;
138	uint32_t ulIvBits;
139	caddr32_t pAAD;
140	uint32_t ulAADLen;
141	uint32_t ulTagBits;
142} CK_AES_GCM_PARAMS32;
143
144/* needed for 32-bit applications running on 64-bit kernels */
145typedef struct CK_AES_GMAC_PARAMS32 {
146	caddr32_t pIv;
147	caddr32_t pAAD;
148	uint32_t ulAADLen;
149} CK_AES_GMAC_PARAMS32;
150
151typedef struct CK_ECDH1_DERIVE_PARAMS32 {
152	uint32_t	kdf;
153	uint32_t	ulSharedDataLen;
154	caddr32_t	pSharedData;
155	uint32_t	ulPublicDataLen;
156	caddr32_t	pPublicData;
157} CK_ECDH1_DERIVE_PARAMS32;
158
159#endif  /* _SYSCALL32 */
160#endif /* _KERNEL */
161
162/*
163 * The measurement unit bit flag for a mechanism's minimum or maximum key size.
164 * The unit are mechanism dependent.  It can be in bits or in bytes.
165 */
166typedef uint32_t crypto_keysize_unit_t;
167
168/*
169 * The following bit flags are valid in cm_mech_flags field in
170 * the crypto_mech_info_t structure of the SPI.
171 *
172 * Only the first two bit flags are valid in mi_keysize_unit
173 * field in the crypto_mechanism_info_t structure of the API.
174 */
175#define	CRYPTO_KEYSIZE_UNIT_IN_BITS	0x00000001
176#define	CRYPTO_KEYSIZE_UNIT_IN_BYTES	0x00000002
177#define	CRYPTO_CAN_SHARE_OPSTATE	0x00000004 /* supports sharing */
178
179
180/* Mechanisms supported out-of-the-box */
181#define	SUN_CKM_MD4			"CKM_MD4"
182#define	SUN_CKM_MD5			"CKM_MD5"
183#define	SUN_CKM_MD5_HMAC		"CKM_MD5_HMAC"
184#define	SUN_CKM_MD5_HMAC_GENERAL	"CKM_MD5_HMAC_GENERAL"
185#define	SUN_CKM_SHA1			"CKM_SHA_1"
186#define	SUN_CKM_SHA1_HMAC		"CKM_SHA_1_HMAC"
187#define	SUN_CKM_SHA1_HMAC_GENERAL	"CKM_SHA_1_HMAC_GENERAL"
188#define	SUN_CKM_SHA256			"CKM_SHA256"
189#define	SUN_CKM_SHA256_HMAC		"CKM_SHA256_HMAC"
190#define	SUN_CKM_SHA256_HMAC_GENERAL	"CKM_SHA256_HMAC_GENERAL"
191#define	SUN_CKM_SHA384			"CKM_SHA384"
192#define	SUN_CKM_SHA384_HMAC		"CKM_SHA384_HMAC"
193#define	SUN_CKM_SHA384_HMAC_GENERAL	"CKM_SHA384_HMAC_GENERAL"
194#define	SUN_CKM_SHA512			"CKM_SHA512"
195#define	SUN_CKM_SHA512_HMAC		"CKM_SHA512_HMAC"
196#define	SUN_CKM_SHA512_HMAC_GENERAL	"CKM_SHA512_HMAC_GENERAL"
197#define	SUN_CKM_DES_CBC			"CKM_DES_CBC"
198#define	SUN_CKM_DES3_CBC		"CKM_DES3_CBC"
199#define	SUN_CKM_DES_ECB			"CKM_DES_ECB"
200#define	SUN_CKM_DES3_ECB		"CKM_DES3_ECB"
201#define	SUN_CKM_BLOWFISH_CBC		"CKM_BLOWFISH_CBC"
202#define	SUN_CKM_BLOWFISH_ECB		"CKM_BLOWFISH_ECB"
203#define	SUN_CKM_AES_CBC			"CKM_AES_CBC"
204#define	SUN_CKM_AES_ECB			"CKM_AES_ECB"
205#define	SUN_CKM_AES_CTR			"CKM_AES_CTR"
206#define	SUN_CKM_AES_CCM			"CKM_AES_CCM"
207#define	SUN_CKM_AES_GCM			"CKM_AES_GCM"
208#define	SUN_CKM_AES_GMAC		"CKM_AES_GMAC"
209#define	SUN_CKM_AES_CFB128		"CKM_AES_CFB128"
210#define	SUN_CKM_RC4			"CKM_RC4"
211#define	SUN_CKM_RSA_PKCS		"CKM_RSA_PKCS"
212#define	SUN_CKM_RSA_X_509		"CKM_RSA_X_509"
213#define	SUN_CKM_MD5_RSA_PKCS		"CKM_MD5_RSA_PKCS"
214#define	SUN_CKM_SHA1_RSA_PKCS		"CKM_SHA1_RSA_PKCS"
215#define	SUN_CKM_SHA256_RSA_PKCS		"CKM_SHA256_RSA_PKCS"
216#define	SUN_CKM_SHA384_RSA_PKCS		"CKM_SHA384_RSA_PKCS"
217#define	SUN_CKM_SHA512_RSA_PKCS		"CKM_SHA512_RSA_PKCS"
218#define	SUN_CKM_EC_KEY_PAIR_GEN		"CKM_EC_KEY_PAIR_GEN"
219#define	SUN_CKM_ECDH1_DERIVE		"CKM_ECDH1_DERIVE"
220#define	SUN_CKM_ECDSA_SHA1		"CKM_ECDSA_SHA1"
221#define	SUN_CKM_ECDSA			"CKM_ECDSA"
222
223/* Shared operation context format for CKM_RC4 */
224typedef struct {
225#if defined(__amd64)
226	uint32_t	i, j;
227	uint32_t	arr[256];
228	uint32_t	flag;
229#else
230	uchar_t		arr[256];
231	uchar_t		i, j;
232#endif /* __amd64 */
233	uint64_t	pad;		/* For 64-bit alignment */
234} arcfour_state_t;
235
236/* Data arguments of cryptographic operations */
237
238typedef enum crypto_data_format {
239	CRYPTO_DATA_RAW = 1,
240	CRYPTO_DATA_UIO,
241	CRYPTO_DATA_MBLK
242} crypto_data_format_t;
243
244typedef struct crypto_data {
245	crypto_data_format_t	cd_format;	/* Format identifier	*/
246	off_t			cd_offset;	/* Offset from the beginning */
247	size_t			cd_length;	/* # of bytes in use */
248	caddr_t			cd_miscdata;	/* ancillary data */
249	union {
250		/* Raw format */
251		iovec_t cdu_raw;		/* Pointer and length	    */
252
253		/* uio scatter-gather format */
254		uio_t	*cdu_uio;
255
256		/* mblk scatter-gather format */
257		mblk_t	*cdu_mp;		/* The mblk chain */
258
259	} cdu;	/* Crypto Data Union */
260} crypto_data_t;
261
262#define	cd_raw		cdu.cdu_raw
263#define	cd_uio		cdu.cdu_uio
264#define	cd_mp		cdu.cdu_mp
265
266typedef struct crypto_dual_data {
267	crypto_data_t		dd_data;	/* The data */
268	off_t			dd_offset2;	/* Used by dual operation */
269	size_t			dd_len2;	/* # of bytes to take	*/
270} crypto_dual_data_t;
271
272#define	dd_format	dd_data.cd_format
273#define	dd_offset1	dd_data.cd_offset
274#define	dd_len1		dd_data.cd_length
275#define	dd_miscdata	dd_data.cd_miscdata
276#define	dd_raw		dd_data.cd_raw
277#define	dd_uio		dd_data.cd_uio
278#define	dd_mp		dd_data.cd_mp
279
280/* The keys, and their contents */
281
282typedef enum {
283	CRYPTO_KEY_RAW = 1,	/* ck_data is a cleartext key */
284	CRYPTO_KEY_REFERENCE,	/* ck_obj_id is an opaque reference */
285	CRYPTO_KEY_ATTR_LIST	/* ck_attrs is a list of object attributes */
286} crypto_key_format_t;
287
288typedef uint64_t crypto_attr_type_t;
289
290/* Attribute types to use for passing a RSA public key or a private key. */
291#define	SUN_CKA_MODULUS			0x00000120
292#define	SUN_CKA_MODULUS_BITS		0x00000121
293#define	SUN_CKA_PUBLIC_EXPONENT		0x00000122
294#define	SUN_CKA_PRIVATE_EXPONENT	0x00000123
295#define	SUN_CKA_PRIME_1			0x00000124
296#define	SUN_CKA_PRIME_2			0x00000125
297#define	SUN_CKA_EXPONENT_1		0x00000126
298#define	SUN_CKA_EXPONENT_2		0x00000127
299#define	SUN_CKA_COEFFICIENT		0x00000128
300#define	SUN_CKA_PRIME			0x00000130
301#define	SUN_CKA_SUBPRIME		0x00000131
302#define	SUN_CKA_BASE			0x00000132
303
304#define	CKK_EC			0x00000003
305#define	CKK_GENERIC_SECRET	0x00000010
306#define	CKK_RC4			0x00000012
307#define	CKK_AES			0x0000001F
308#define	CKK_DES			0x00000013
309#define	CKK_DES2		0x00000014
310#define	CKK_DES3		0x00000015
311
312#define	CKO_PUBLIC_KEY		0x00000002
313#define	CKO_PRIVATE_KEY		0x00000003
314#define	CKA_CLASS		0x00000000
315#define	CKA_VALUE		0x00000011
316#define	CKA_KEY_TYPE		0x00000100
317#define	CKA_VALUE_LEN		0x00000161
318#define	CKA_EC_PARAMS		0x00000180
319#define	CKA_EC_POINT		0x00000181
320
321typedef uint32_t	crypto_object_id_t;
322
323typedef struct crypto_object_attribute {
324	crypto_attr_type_t	oa_type;	/* attribute type */
325	caddr_t			oa_value;	/* attribute value */
326	ssize_t			oa_value_len;	/* length of attribute value */
327} crypto_object_attribute_t;
328
329typedef struct crypto_key {
330	crypto_key_format_t	ck_format;	/* format identifier */
331	union {
332		/* for CRYPTO_KEY_RAW ck_format */
333		struct {
334			uint_t	cku_v_length;	/* # of bits in ck_data   */
335			void	*cku_v_data;	/* ptr to key value */
336		} cku_key_value;
337
338		/* for CRYPTO_KEY_REFERENCE ck_format */
339		crypto_object_id_t cku_key_id;	/* reference to object key */
340
341		/* for CRYPTO_KEY_ATTR_LIST ck_format */
342		struct {
343			uint_t cku_a_count;	/* number of attributes */
344			crypto_object_attribute_t *cku_a_oattr;
345		} cku_key_attrs;
346	} cku_data;				/* Crypto Key union */
347} crypto_key_t;
348
349#ifdef  _SYSCALL32
350
351typedef struct crypto_object_attribute32 {
352	uint64_t	oa_type;	/* attribute type */
353	caddr32_t	oa_value;	/* attribute value */
354	ssize32_t	oa_value_len;	/* length of attribute value */
355} crypto_object_attribute32_t;
356
357typedef struct crypto_key32 {
358	crypto_key_format_t	ck_format;	/* format identifier */
359	union {
360		/* for CRYPTO_KEY_RAW ck_format */
361		struct {
362			uint32_t cku_v_length;	/* # of bytes in ck_data */
363			caddr32_t cku_v_data;	/* ptr to key value */
364		} cku_key_value;
365
366		/* for CRYPTO_KEY_REFERENCE ck_format */
367		crypto_object_id_t cku_key_id; /* reference to object key */
368
369		/* for CRYPTO_KEY_ATTR_LIST ck_format */
370		struct {
371			uint32_t cku_a_count;	/* number of attributes */
372			caddr32_t cku_a_oattr;
373		} cku_key_attrs;
374	} cku_data;				/* Crypto Key union */
375} crypto_key32_t;
376
377#endif  /* _SYSCALL32 */
378
379#define	ck_data		cku_data.cku_key_value.cku_v_data
380#define	ck_length	cku_data.cku_key_value.cku_v_length
381#define	ck_obj_id	cku_data.cku_key_id
382#define	ck_count	cku_data.cku_key_attrs.cku_a_count
383#define	ck_attrs	cku_data.cku_key_attrs.cku_a_oattr
384
385/*
386 * Raw key lengths are expressed in number of bits.
387 * The following macro returns the minimum number of
388 * bytes that can contain the specified number of bits.
389 * Round up without overflowing the integer type.
390 */
391#define	CRYPTO_BITS2BYTES(n) ((n) == 0 ? 0 : (((n) - 1) >> 3) + 1)
392#define	CRYPTO_BYTES2BITS(n) ((n) << 3)
393
394/* Providers */
395
396typedef enum {
397	CRYPTO_HW_PROVIDER = 0,
398	CRYPTO_SW_PROVIDER,
399	CRYPTO_LOGICAL_PROVIDER
400} crypto_provider_type_t;
401
402typedef uint32_t 	crypto_provider_id_t;
403#define	KCF_PROVID_INVALID	((uint32_t)-1)
404
405typedef struct crypto_provider_entry {
406	crypto_provider_id_t	pe_provider_id;
407	uint_t			pe_mechanism_count;
408} crypto_provider_entry_t;
409
410typedef struct crypto_dev_list_entry {
411	char			le_dev_name[MAXNAMELEN];
412	uint_t			le_dev_instance;
413	uint_t			le_mechanism_count;
414} crypto_dev_list_entry_t;
415
416/* User type for authentication ioctls and SPI entry points */
417
418typedef enum crypto_user_type {
419	CRYPTO_SO = 0,
420	CRYPTO_USER
421} crypto_user_type_t;
422
423/* Version for provider management ioctls and SPI entry points */
424
425typedef struct crypto_version {
426	uchar_t	cv_major;
427	uchar_t	cv_minor;
428} crypto_version_t;
429
430/* session data structure opaque to the consumer */
431typedef void *crypto_session_t;
432
433/* provider data structure opaque to the consumer */
434typedef void *crypto_provider_t;
435
436/* Limits used by both consumers and providers */
437#define	CRYPTO_EXT_SIZE_LABEL		32
438#define	CRYPTO_EXT_SIZE_MANUF		32
439#define	CRYPTO_EXT_SIZE_MODEL		16
440#define	CRYPTO_EXT_SIZE_SERIAL		16
441#define	CRYPTO_EXT_SIZE_TIME		16
442
443typedef struct crypto_provider_ext_info {
444	uchar_t			ei_label[CRYPTO_EXT_SIZE_LABEL];
445	uchar_t			ei_manufacturerID[CRYPTO_EXT_SIZE_MANUF];
446	uchar_t			ei_model[CRYPTO_EXT_SIZE_MODEL];
447	uchar_t			ei_serial_number[CRYPTO_EXT_SIZE_SERIAL];
448	ulong_t			ei_flags;
449	ulong_t			ei_max_session_count;
450	ulong_t			ei_max_pin_len;
451	ulong_t			ei_min_pin_len;
452	ulong_t			ei_total_public_memory;
453	ulong_t			ei_free_public_memory;
454	ulong_t			ei_total_private_memory;
455	ulong_t			ei_free_private_memory;
456	crypto_version_t	ei_hardware_version;
457	crypto_version_t	ei_firmware_version;
458	uchar_t			ei_time[CRYPTO_EXT_SIZE_TIME];
459	int			ei_hash_max_input_len;
460	int			ei_hmac_max_input_len;
461} crypto_provider_ext_info_t;
462
463typedef uint_t		crypto_session_id_t;
464
465typedef enum cmd_type {
466	COPY_FROM_DATA,
467	COPY_TO_DATA,
468	COMPARE_TO_DATA,
469	MD5_DIGEST_DATA,
470	SHA1_DIGEST_DATA,
471	SHA2_DIGEST_DATA,
472	GHASH_DATA
473} cmd_type_t;
474
475#define	CRYPTO_DO_UPDATE	0x01
476#define	CRYPTO_DO_FINAL		0x02
477#define	CRYPTO_DO_MD5		0x04
478#define	CRYPTO_DO_SHA1		0x08
479#define	CRYPTO_DO_SIGN		0x10
480#define	CRYPTO_DO_VERIFY	0x20
481#define	CRYPTO_DO_SHA2		0x40
482
483#define	PROVIDER_OWNS_KEY_SCHEDULE	0x00000001
484
485/*
486 * Common cryptographic status and error codes.
487 */
488#define	CRYPTO_SUCCESS				0x00000000
489#define	CRYPTO_CANCEL				0x00000001
490#define	CRYPTO_HOST_MEMORY			0x00000002
491#define	CRYPTO_GENERAL_ERROR			0x00000003
492#define	CRYPTO_FAILED				0x00000004
493#define	CRYPTO_ARGUMENTS_BAD			0x00000005
494#define	CRYPTO_ATTRIBUTE_READ_ONLY		0x00000006
495#define	CRYPTO_ATTRIBUTE_SENSITIVE		0x00000007
496#define	CRYPTO_ATTRIBUTE_TYPE_INVALID		0x00000008
497#define	CRYPTO_ATTRIBUTE_VALUE_INVALID		0x00000009
498#define	CRYPTO_CANCELED				0x0000000A
499#define	CRYPTO_DATA_INVALID			0x0000000B
500#define	CRYPTO_DATA_LEN_RANGE			0x0000000C
501#define	CRYPTO_DEVICE_ERROR			0x0000000D
502#define	CRYPTO_DEVICE_MEMORY			0x0000000E
503#define	CRYPTO_DEVICE_REMOVED			0x0000000F
504#define	CRYPTO_ENCRYPTED_DATA_INVALID		0x00000010
505#define	CRYPTO_ENCRYPTED_DATA_LEN_RANGE		0x00000011
506#define	CRYPTO_KEY_HANDLE_INVALID		0x00000012
507#define	CRYPTO_KEY_SIZE_RANGE			0x00000013
508#define	CRYPTO_KEY_TYPE_INCONSISTENT		0x00000014
509#define	CRYPTO_KEY_NOT_NEEDED			0x00000015
510#define	CRYPTO_KEY_CHANGED			0x00000016
511#define	CRYPTO_KEY_NEEDED			0x00000017
512#define	CRYPTO_KEY_INDIGESTIBLE			0x00000018
513#define	CRYPTO_KEY_FUNCTION_NOT_PERMITTED	0x00000019
514#define	CRYPTO_KEY_NOT_WRAPPABLE		0x0000001A
515#define	CRYPTO_KEY_UNEXTRACTABLE		0x0000001B
516#define	CRYPTO_MECHANISM_INVALID		0x0000001C
517#define	CRYPTO_MECHANISM_PARAM_INVALID		0x0000001D
518#define	CRYPTO_OBJECT_HANDLE_INVALID		0x0000001E
519#define	CRYPTO_OPERATION_IS_ACTIVE		0x0000001F
520#define	CRYPTO_OPERATION_NOT_INITIALIZED	0x00000020
521#define	CRYPTO_PIN_INCORRECT			0x00000021
522#define	CRYPTO_PIN_INVALID			0x00000022
523#define	CRYPTO_PIN_LEN_RANGE			0x00000023
524#define	CRYPTO_PIN_EXPIRED			0x00000024
525#define	CRYPTO_PIN_LOCKED			0x00000025
526#define	CRYPTO_SESSION_CLOSED			0x00000026
527#define	CRYPTO_SESSION_COUNT			0x00000027
528#define	CRYPTO_SESSION_HANDLE_INVALID		0x00000028
529#define	CRYPTO_SESSION_READ_ONLY		0x00000029
530#define	CRYPTO_SESSION_EXISTS			0x0000002A
531#define	CRYPTO_SESSION_READ_ONLY_EXISTS		0x0000002B
532#define	CRYPTO_SESSION_READ_WRITE_SO_EXISTS	0x0000002C
533#define	CRYPTO_SIGNATURE_INVALID		0x0000002D
534#define	CRYPTO_SIGNATURE_LEN_RANGE		0x0000002E
535#define	CRYPTO_TEMPLATE_INCOMPLETE		0x0000002F
536#define	CRYPTO_TEMPLATE_INCONSISTENT		0x00000030
537#define	CRYPTO_UNWRAPPING_KEY_HANDLE_INVALID	0x00000031
538#define	CRYPTO_UNWRAPPING_KEY_SIZE_RANGE	0x00000032
539#define	CRYPTO_UNWRAPPING_KEY_TYPE_INCONSISTENT	0x00000033
540#define	CRYPTO_USER_ALREADY_LOGGED_IN		0x00000034
541#define	CRYPTO_USER_NOT_LOGGED_IN		0x00000035
542#define	CRYPTO_USER_PIN_NOT_INITIALIZED		0x00000036
543#define	CRYPTO_USER_TYPE_INVALID		0x00000037
544#define	CRYPTO_USER_ANOTHER_ALREADY_LOGGED_IN	0x00000038
545#define	CRYPTO_USER_TOO_MANY_TYPES		0x00000039
546#define	CRYPTO_WRAPPED_KEY_INVALID		0x0000003A
547#define	CRYPTO_WRAPPED_KEY_LEN_RANGE		0x0000003B
548#define	CRYPTO_WRAPPING_KEY_HANDLE_INVALID	0x0000003C
549#define	CRYPTO_WRAPPING_KEY_SIZE_RANGE		0x0000003D
550#define	CRYPTO_WRAPPING_KEY_TYPE_INCONSISTENT	0x0000003E
551#define	CRYPTO_RANDOM_SEED_NOT_SUPPORTED	0x0000003F
552#define	CRYPTO_RANDOM_NO_RNG			0x00000040
553#define	CRYPTO_DOMAIN_PARAMS_INVALID		0x00000041
554#define	CRYPTO_BUFFER_TOO_SMALL			0x00000042
555#define	CRYPTO_INFORMATION_SENSITIVE		0x00000043
556#define	CRYPTO_NOT_SUPPORTED			0x00000044
557
558#define	CRYPTO_QUEUED				0x00000045
559#define	CRYPTO_BUFFER_TOO_BIG			0x00000046
560#define	CRYPTO_INVALID_CONTEXT			0x00000047
561#define	CRYPTO_INVALID_MAC			0x00000048
562#define	CRYPTO_MECH_NOT_SUPPORTED		0x00000049
563#define	CRYPTO_INCONSISTENT_ATTRIBUTE		0x0000004A
564#define	CRYPTO_NO_PERMISSION			0x0000004B
565#define	CRYPTO_INVALID_PROVIDER_ID		0x0000004C
566#define	CRYPTO_VERSION_MISMATCH			0x0000004D
567#define	CRYPTO_BUSY				0x0000004E
568#define	CRYPTO_UNKNOWN_PROVIDER			0x0000004F
569#define	CRYPTO_MODVERIFICATION_FAILED		0x00000050
570#define	CRYPTO_OLD_CTX_TEMPLATE			0x00000051
571#define	CRYPTO_WEAK_KEY				0x00000052
572#define	CRYPTO_FIPS140_ERROR			0x00000053
573/*
574 * Don't forget to update CRYPTO_LAST_ERROR and the error_number_table[]
575 * in kernelUtil.c when new error code is added.
576 */
577#define	CRYPTO_LAST_ERROR			0x00000053
578
579/*
580 * Special values that can be used to indicate that information is unavailable
581 * or that there is not practical limit. These values can be used
582 * by fields of the SPI crypto_provider_ext_info(9S) structure.
583 * The value of CRYPTO_UNAVAILABLE_INFO should be the same as
584 * CK_UNAVAILABLE_INFO in the PKCS#11 spec.
585 */
586#define	CRYPTO_UNAVAILABLE_INFO		((ulong_t)(-1))
587#define	CRYPTO_EFFECTIVELY_INFINITE	0x0
588
589#ifdef __cplusplus
590}
591#endif
592
593#endif /* _SYS_CRYPTO_COMMON_H */
594