1/* 2 * CDDL HEADER START 3 * 4 * The contents of this file are subject to the terms of the 5 * Common Development and Distribution License (the "License"). 6 * You may not use this file except in compliance with the License. 7 * 8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 9 * or http://www.opensolaris.org/os/licensing. 10 * See the License for the specific language governing permissions 11 * and limitations under the License. 12 * 13 * When distributing Covered Code, include this CDDL HEADER in each 14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 15 * If applicable, add the following below this CDDL HEADER, with the 16 * fields enclosed by brackets "[]" replaced with your own identifying 17 * information: Portions Copyright [yyyy] [name of copyright owner] 18 * 19 * CDDL HEADER END 20 */ 21/* 22 * Copyright (c) 2003, 2010, Oracle and/or its affiliates. All rights reserved. 23 */ 24 25#ifndef _SYS_CRYPTO_COMMON_H 26#define _SYS_CRYPTO_COMMON_H 27 28/* 29 * Header file for the common data structures of the cryptographic framework 30 */ 31 32#ifdef __cplusplus 33extern "C" { 34#endif 35 36#include <sys/types.h> 37#include <sys/uio.h> 38#include <sys/stream.h> 39#include <sys/mutex.h> 40#include <sys/condvar.h> 41 42 43/* Cryptographic Mechanisms */ 44 45#define CRYPTO_MAX_MECH_NAME 32 46typedef char crypto_mech_name_t[CRYPTO_MAX_MECH_NAME]; 47 48typedef uint64_t crypto_mech_type_t; 49 50typedef struct crypto_mechanism { 51 crypto_mech_type_t cm_type; /* mechanism type */ 52 caddr_t cm_param; /* mech. parameter */ 53 size_t cm_param_len; /* mech. parameter len */ 54} crypto_mechanism_t; 55 56#ifdef _SYSCALL32 57 58typedef struct crypto_mechanism32 { 59 crypto_mech_type_t cm_type; /* mechanism type */ 60 caddr32_t cm_param; /* mech. parameter */ 61 size32_t cm_param_len; /* mech. parameter len */ 62} crypto_mechanism32_t; 63 64#endif /* _SYSCALL32 */ 65 66#ifdef _KERNEL 67/* CK_AES_CTR_PARAMS provides parameters to the CKM_AES_CTR mechanism */ 68typedef struct CK_AES_CTR_PARAMS { 69 ulong_t ulCounterBits; 70 uint8_t cb[16]; 71} CK_AES_CTR_PARAMS; 72#endif 73 74/* CK_AES_CCM_PARAMS provides parameters to the CKM_AES_CCM mechanism */ 75typedef struct CK_AES_CCM_PARAMS { 76 ulong_t ulMACSize; 77 ulong_t ulNonceSize; 78 ulong_t ulAuthDataSize; 79 ulong_t ulDataSize; /* used for plaintext or ciphertext */ 80 uchar_t *nonce; 81 uchar_t *authData; 82} CK_AES_CCM_PARAMS; 83 84/* CK_AES_GCM_PARAMS provides parameters to the CKM_AES_GCM mechanism */ 85typedef struct CK_AES_GCM_PARAMS { 86 uchar_t *pIv; 87 ulong_t ulIvLen; 88 ulong_t ulIvBits; 89 uchar_t *pAAD; 90 ulong_t ulAADLen; 91 ulong_t ulTagBits; 92} CK_AES_GCM_PARAMS; 93 94/* CK_AES_GMAC_PARAMS provides parameters to the CKM_AES_GMAC mechanism */ 95typedef struct CK_AES_GMAC_PARAMS { 96 uchar_t *pIv; 97 uchar_t *pAAD; 98 ulong_t ulAADLen; 99} CK_AES_GMAC_PARAMS; 100 101#ifdef _KERNEL 102/* 103 * CK_ECDH1_DERIVE_PARAMS provides the parameters to the 104 * CKM_ECDH1_KEY_DERIVE mechanism 105 */ 106typedef struct CK_ECDH1_DERIVE_PARAMS { 107 ulong_t kdf; 108 ulong_t ulSharedDataLen; 109 uchar_t *pSharedData; 110 ulong_t ulPublicDataLen; 111 uchar_t *pPublicData; 112} CK_ECDH1_DERIVE_PARAMS; 113#endif 114 115#ifdef _KERNEL 116#ifdef _SYSCALL32 117 118/* needed for 32-bit applications running on 64-bit kernels */ 119typedef struct CK_AES_CTR_PARAMS32 { 120 uint32_t ulCounterBits; 121 uint8_t cb[16]; 122} CK_AES_CTR_PARAMS32; 123 124/* needed for 32-bit applications running on 64-bit kernels */ 125typedef struct CK_AES_CCM_PARAMS32 { 126 uint32_t ulMACSize; 127 uint32_t ulNonceSize; 128 uint32_t ulAuthDataSize; 129 uint32_t ulDataSize; 130 caddr32_t nonce; 131 caddr32_t authData; 132} CK_AES_CCM_PARAMS32; 133 134/* needed for 32-bit applications running on 64-bit kernels */ 135typedef struct CK_AES_GCM_PARAMS32 { 136 caddr32_t pIv; 137 uint32_t ulIvLen; 138 uint32_t ulIvBits; 139 caddr32_t pAAD; 140 uint32_t ulAADLen; 141 uint32_t ulTagBits; 142} CK_AES_GCM_PARAMS32; 143 144/* needed for 32-bit applications running on 64-bit kernels */ 145typedef struct CK_AES_GMAC_PARAMS32 { 146 caddr32_t pIv; 147 caddr32_t pAAD; 148 uint32_t ulAADLen; 149} CK_AES_GMAC_PARAMS32; 150 151typedef struct CK_ECDH1_DERIVE_PARAMS32 { 152 uint32_t kdf; 153 uint32_t ulSharedDataLen; 154 caddr32_t pSharedData; 155 uint32_t ulPublicDataLen; 156 caddr32_t pPublicData; 157} CK_ECDH1_DERIVE_PARAMS32; 158 159#endif /* _SYSCALL32 */ 160#endif /* _KERNEL */ 161 162/* 163 * The measurement unit bit flag for a mechanism's minimum or maximum key size. 164 * The unit are mechanism dependent. It can be in bits or in bytes. 165 */ 166typedef uint32_t crypto_keysize_unit_t; 167 168/* 169 * The following bit flags are valid in cm_mech_flags field in 170 * the crypto_mech_info_t structure of the SPI. 171 * 172 * Only the first two bit flags are valid in mi_keysize_unit 173 * field in the crypto_mechanism_info_t structure of the API. 174 */ 175#define CRYPTO_KEYSIZE_UNIT_IN_BITS 0x00000001 176#define CRYPTO_KEYSIZE_UNIT_IN_BYTES 0x00000002 177#define CRYPTO_CAN_SHARE_OPSTATE 0x00000004 /* supports sharing */ 178 179 180/* Mechanisms supported out-of-the-box */ 181#define SUN_CKM_MD4 "CKM_MD4" 182#define SUN_CKM_MD5 "CKM_MD5" 183#define SUN_CKM_MD5_HMAC "CKM_MD5_HMAC" 184#define SUN_CKM_MD5_HMAC_GENERAL "CKM_MD5_HMAC_GENERAL" 185#define SUN_CKM_SHA1 "CKM_SHA_1" 186#define SUN_CKM_SHA1_HMAC "CKM_SHA_1_HMAC" 187#define SUN_CKM_SHA1_HMAC_GENERAL "CKM_SHA_1_HMAC_GENERAL" 188#define SUN_CKM_SHA256 "CKM_SHA256" 189#define SUN_CKM_SHA256_HMAC "CKM_SHA256_HMAC" 190#define SUN_CKM_SHA256_HMAC_GENERAL "CKM_SHA256_HMAC_GENERAL" 191#define SUN_CKM_SHA384 "CKM_SHA384" 192#define SUN_CKM_SHA384_HMAC "CKM_SHA384_HMAC" 193#define SUN_CKM_SHA384_HMAC_GENERAL "CKM_SHA384_HMAC_GENERAL" 194#define SUN_CKM_SHA512 "CKM_SHA512" 195#define SUN_CKM_SHA512_HMAC "CKM_SHA512_HMAC" 196#define SUN_CKM_SHA512_HMAC_GENERAL "CKM_SHA512_HMAC_GENERAL" 197#define SUN_CKM_DES_CBC "CKM_DES_CBC" 198#define SUN_CKM_DES3_CBC "CKM_DES3_CBC" 199#define SUN_CKM_DES_ECB "CKM_DES_ECB" 200#define SUN_CKM_DES3_ECB "CKM_DES3_ECB" 201#define SUN_CKM_BLOWFISH_CBC "CKM_BLOWFISH_CBC" 202#define SUN_CKM_BLOWFISH_ECB "CKM_BLOWFISH_ECB" 203#define SUN_CKM_AES_CBC "CKM_AES_CBC" 204#define SUN_CKM_AES_ECB "CKM_AES_ECB" 205#define SUN_CKM_AES_CTR "CKM_AES_CTR" 206#define SUN_CKM_AES_CCM "CKM_AES_CCM" 207#define SUN_CKM_AES_GCM "CKM_AES_GCM" 208#define SUN_CKM_AES_GMAC "CKM_AES_GMAC" 209#define SUN_CKM_AES_CFB128 "CKM_AES_CFB128" 210#define SUN_CKM_RC4 "CKM_RC4" 211#define SUN_CKM_RSA_PKCS "CKM_RSA_PKCS" 212#define SUN_CKM_RSA_X_509 "CKM_RSA_X_509" 213#define SUN_CKM_MD5_RSA_PKCS "CKM_MD5_RSA_PKCS" 214#define SUN_CKM_SHA1_RSA_PKCS "CKM_SHA1_RSA_PKCS" 215#define SUN_CKM_SHA256_RSA_PKCS "CKM_SHA256_RSA_PKCS" 216#define SUN_CKM_SHA384_RSA_PKCS "CKM_SHA384_RSA_PKCS" 217#define SUN_CKM_SHA512_RSA_PKCS "CKM_SHA512_RSA_PKCS" 218#define SUN_CKM_EC_KEY_PAIR_GEN "CKM_EC_KEY_PAIR_GEN" 219#define SUN_CKM_ECDH1_DERIVE "CKM_ECDH1_DERIVE" 220#define SUN_CKM_ECDSA_SHA1 "CKM_ECDSA_SHA1" 221#define SUN_CKM_ECDSA "CKM_ECDSA" 222 223/* Shared operation context format for CKM_RC4 */ 224typedef struct { 225#if defined(__amd64) 226 uint32_t i, j; 227 uint32_t arr[256]; 228 uint32_t flag; 229#else 230 uchar_t arr[256]; 231 uchar_t i, j; 232#endif /* __amd64 */ 233 uint64_t pad; /* For 64-bit alignment */ 234} arcfour_state_t; 235 236/* Data arguments of cryptographic operations */ 237 238typedef enum crypto_data_format { 239 CRYPTO_DATA_RAW = 1, 240 CRYPTO_DATA_UIO, 241 CRYPTO_DATA_MBLK 242} crypto_data_format_t; 243 244typedef struct crypto_data { 245 crypto_data_format_t cd_format; /* Format identifier */ 246 off_t cd_offset; /* Offset from the beginning */ 247 size_t cd_length; /* # of bytes in use */ 248 caddr_t cd_miscdata; /* ancillary data */ 249 union { 250 /* Raw format */ 251 iovec_t cdu_raw; /* Pointer and length */ 252 253 /* uio scatter-gather format */ 254 uio_t *cdu_uio; 255 256 /* mblk scatter-gather format */ 257 mblk_t *cdu_mp; /* The mblk chain */ 258 259 } cdu; /* Crypto Data Union */ 260} crypto_data_t; 261 262#define cd_raw cdu.cdu_raw 263#define cd_uio cdu.cdu_uio 264#define cd_mp cdu.cdu_mp 265 266typedef struct crypto_dual_data { 267 crypto_data_t dd_data; /* The data */ 268 off_t dd_offset2; /* Used by dual operation */ 269 size_t dd_len2; /* # of bytes to take */ 270} crypto_dual_data_t; 271 272#define dd_format dd_data.cd_format 273#define dd_offset1 dd_data.cd_offset 274#define dd_len1 dd_data.cd_length 275#define dd_miscdata dd_data.cd_miscdata 276#define dd_raw dd_data.cd_raw 277#define dd_uio dd_data.cd_uio 278#define dd_mp dd_data.cd_mp 279 280/* The keys, and their contents */ 281 282typedef enum { 283 CRYPTO_KEY_RAW = 1, /* ck_data is a cleartext key */ 284 CRYPTO_KEY_REFERENCE, /* ck_obj_id is an opaque reference */ 285 CRYPTO_KEY_ATTR_LIST /* ck_attrs is a list of object attributes */ 286} crypto_key_format_t; 287 288typedef uint64_t crypto_attr_type_t; 289 290/* Attribute types to use for passing a RSA public key or a private key. */ 291#define SUN_CKA_MODULUS 0x00000120 292#define SUN_CKA_MODULUS_BITS 0x00000121 293#define SUN_CKA_PUBLIC_EXPONENT 0x00000122 294#define SUN_CKA_PRIVATE_EXPONENT 0x00000123 295#define SUN_CKA_PRIME_1 0x00000124 296#define SUN_CKA_PRIME_2 0x00000125 297#define SUN_CKA_EXPONENT_1 0x00000126 298#define SUN_CKA_EXPONENT_2 0x00000127 299#define SUN_CKA_COEFFICIENT 0x00000128 300#define SUN_CKA_PRIME 0x00000130 301#define SUN_CKA_SUBPRIME 0x00000131 302#define SUN_CKA_BASE 0x00000132 303 304#define CKK_EC 0x00000003 305#define CKK_GENERIC_SECRET 0x00000010 306#define CKK_RC4 0x00000012 307#define CKK_AES 0x0000001F 308#define CKK_DES 0x00000013 309#define CKK_DES2 0x00000014 310#define CKK_DES3 0x00000015 311 312#define CKO_PUBLIC_KEY 0x00000002 313#define CKO_PRIVATE_KEY 0x00000003 314#define CKA_CLASS 0x00000000 315#define CKA_VALUE 0x00000011 316#define CKA_KEY_TYPE 0x00000100 317#define CKA_VALUE_LEN 0x00000161 318#define CKA_EC_PARAMS 0x00000180 319#define CKA_EC_POINT 0x00000181 320 321typedef uint32_t crypto_object_id_t; 322 323typedef struct crypto_object_attribute { 324 crypto_attr_type_t oa_type; /* attribute type */ 325 caddr_t oa_value; /* attribute value */ 326 ssize_t oa_value_len; /* length of attribute value */ 327} crypto_object_attribute_t; 328 329typedef struct crypto_key { 330 crypto_key_format_t ck_format; /* format identifier */ 331 union { 332 /* for CRYPTO_KEY_RAW ck_format */ 333 struct { 334 uint_t cku_v_length; /* # of bits in ck_data */ 335 void *cku_v_data; /* ptr to key value */ 336 } cku_key_value; 337 338 /* for CRYPTO_KEY_REFERENCE ck_format */ 339 crypto_object_id_t cku_key_id; /* reference to object key */ 340 341 /* for CRYPTO_KEY_ATTR_LIST ck_format */ 342 struct { 343 uint_t cku_a_count; /* number of attributes */ 344 crypto_object_attribute_t *cku_a_oattr; 345 } cku_key_attrs; 346 } cku_data; /* Crypto Key union */ 347} crypto_key_t; 348 349#ifdef _SYSCALL32 350 351typedef struct crypto_object_attribute32 { 352 uint64_t oa_type; /* attribute type */ 353 caddr32_t oa_value; /* attribute value */ 354 ssize32_t oa_value_len; /* length of attribute value */ 355} crypto_object_attribute32_t; 356 357typedef struct crypto_key32 { 358 crypto_key_format_t ck_format; /* format identifier */ 359 union { 360 /* for CRYPTO_KEY_RAW ck_format */ 361 struct { 362 uint32_t cku_v_length; /* # of bytes in ck_data */ 363 caddr32_t cku_v_data; /* ptr to key value */ 364 } cku_key_value; 365 366 /* for CRYPTO_KEY_REFERENCE ck_format */ 367 crypto_object_id_t cku_key_id; /* reference to object key */ 368 369 /* for CRYPTO_KEY_ATTR_LIST ck_format */ 370 struct { 371 uint32_t cku_a_count; /* number of attributes */ 372 caddr32_t cku_a_oattr; 373 } cku_key_attrs; 374 } cku_data; /* Crypto Key union */ 375} crypto_key32_t; 376 377#endif /* _SYSCALL32 */ 378 379#define ck_data cku_data.cku_key_value.cku_v_data 380#define ck_length cku_data.cku_key_value.cku_v_length 381#define ck_obj_id cku_data.cku_key_id 382#define ck_count cku_data.cku_key_attrs.cku_a_count 383#define ck_attrs cku_data.cku_key_attrs.cku_a_oattr 384 385/* 386 * Raw key lengths are expressed in number of bits. 387 * The following macro returns the minimum number of 388 * bytes that can contain the specified number of bits. 389 * Round up without overflowing the integer type. 390 */ 391#define CRYPTO_BITS2BYTES(n) ((n) == 0 ? 0 : (((n) - 1) >> 3) + 1) 392#define CRYPTO_BYTES2BITS(n) ((n) << 3) 393 394/* Providers */ 395 396typedef enum { 397 CRYPTO_HW_PROVIDER = 0, 398 CRYPTO_SW_PROVIDER, 399 CRYPTO_LOGICAL_PROVIDER 400} crypto_provider_type_t; 401 402typedef uint32_t crypto_provider_id_t; 403#define KCF_PROVID_INVALID ((uint32_t)-1) 404 405typedef struct crypto_provider_entry { 406 crypto_provider_id_t pe_provider_id; 407 uint_t pe_mechanism_count; 408} crypto_provider_entry_t; 409 410typedef struct crypto_dev_list_entry { 411 char le_dev_name[MAXNAMELEN]; 412 uint_t le_dev_instance; 413 uint_t le_mechanism_count; 414} crypto_dev_list_entry_t; 415 416/* User type for authentication ioctls and SPI entry points */ 417 418typedef enum crypto_user_type { 419 CRYPTO_SO = 0, 420 CRYPTO_USER 421} crypto_user_type_t; 422 423/* Version for provider management ioctls and SPI entry points */ 424 425typedef struct crypto_version { 426 uchar_t cv_major; 427 uchar_t cv_minor; 428} crypto_version_t; 429 430/* session data structure opaque to the consumer */ 431typedef void *crypto_session_t; 432 433/* provider data structure opaque to the consumer */ 434typedef void *crypto_provider_t; 435 436/* Limits used by both consumers and providers */ 437#define CRYPTO_EXT_SIZE_LABEL 32 438#define CRYPTO_EXT_SIZE_MANUF 32 439#define CRYPTO_EXT_SIZE_MODEL 16 440#define CRYPTO_EXT_SIZE_SERIAL 16 441#define CRYPTO_EXT_SIZE_TIME 16 442 443typedef struct crypto_provider_ext_info { 444 uchar_t ei_label[CRYPTO_EXT_SIZE_LABEL]; 445 uchar_t ei_manufacturerID[CRYPTO_EXT_SIZE_MANUF]; 446 uchar_t ei_model[CRYPTO_EXT_SIZE_MODEL]; 447 uchar_t ei_serial_number[CRYPTO_EXT_SIZE_SERIAL]; 448 ulong_t ei_flags; 449 ulong_t ei_max_session_count; 450 ulong_t ei_max_pin_len; 451 ulong_t ei_min_pin_len; 452 ulong_t ei_total_public_memory; 453 ulong_t ei_free_public_memory; 454 ulong_t ei_total_private_memory; 455 ulong_t ei_free_private_memory; 456 crypto_version_t ei_hardware_version; 457 crypto_version_t ei_firmware_version; 458 uchar_t ei_time[CRYPTO_EXT_SIZE_TIME]; 459 int ei_hash_max_input_len; 460 int ei_hmac_max_input_len; 461} crypto_provider_ext_info_t; 462 463typedef uint_t crypto_session_id_t; 464 465typedef enum cmd_type { 466 COPY_FROM_DATA, 467 COPY_TO_DATA, 468 COMPARE_TO_DATA, 469 MD5_DIGEST_DATA, 470 SHA1_DIGEST_DATA, 471 SHA2_DIGEST_DATA, 472 GHASH_DATA 473} cmd_type_t; 474 475#define CRYPTO_DO_UPDATE 0x01 476#define CRYPTO_DO_FINAL 0x02 477#define CRYPTO_DO_MD5 0x04 478#define CRYPTO_DO_SHA1 0x08 479#define CRYPTO_DO_SIGN 0x10 480#define CRYPTO_DO_VERIFY 0x20 481#define CRYPTO_DO_SHA2 0x40 482 483#define PROVIDER_OWNS_KEY_SCHEDULE 0x00000001 484 485/* 486 * Common cryptographic status and error codes. 487 */ 488#define CRYPTO_SUCCESS 0x00000000 489#define CRYPTO_CANCEL 0x00000001 490#define CRYPTO_HOST_MEMORY 0x00000002 491#define CRYPTO_GENERAL_ERROR 0x00000003 492#define CRYPTO_FAILED 0x00000004 493#define CRYPTO_ARGUMENTS_BAD 0x00000005 494#define CRYPTO_ATTRIBUTE_READ_ONLY 0x00000006 495#define CRYPTO_ATTRIBUTE_SENSITIVE 0x00000007 496#define CRYPTO_ATTRIBUTE_TYPE_INVALID 0x00000008 497#define CRYPTO_ATTRIBUTE_VALUE_INVALID 0x00000009 498#define CRYPTO_CANCELED 0x0000000A 499#define CRYPTO_DATA_INVALID 0x0000000B 500#define CRYPTO_DATA_LEN_RANGE 0x0000000C 501#define CRYPTO_DEVICE_ERROR 0x0000000D 502#define CRYPTO_DEVICE_MEMORY 0x0000000E 503#define CRYPTO_DEVICE_REMOVED 0x0000000F 504#define CRYPTO_ENCRYPTED_DATA_INVALID 0x00000010 505#define CRYPTO_ENCRYPTED_DATA_LEN_RANGE 0x00000011 506#define CRYPTO_KEY_HANDLE_INVALID 0x00000012 507#define CRYPTO_KEY_SIZE_RANGE 0x00000013 508#define CRYPTO_KEY_TYPE_INCONSISTENT 0x00000014 509#define CRYPTO_KEY_NOT_NEEDED 0x00000015 510#define CRYPTO_KEY_CHANGED 0x00000016 511#define CRYPTO_KEY_NEEDED 0x00000017 512#define CRYPTO_KEY_INDIGESTIBLE 0x00000018 513#define CRYPTO_KEY_FUNCTION_NOT_PERMITTED 0x00000019 514#define CRYPTO_KEY_NOT_WRAPPABLE 0x0000001A 515#define CRYPTO_KEY_UNEXTRACTABLE 0x0000001B 516#define CRYPTO_MECHANISM_INVALID 0x0000001C 517#define CRYPTO_MECHANISM_PARAM_INVALID 0x0000001D 518#define CRYPTO_OBJECT_HANDLE_INVALID 0x0000001E 519#define CRYPTO_OPERATION_IS_ACTIVE 0x0000001F 520#define CRYPTO_OPERATION_NOT_INITIALIZED 0x00000020 521#define CRYPTO_PIN_INCORRECT 0x00000021 522#define CRYPTO_PIN_INVALID 0x00000022 523#define CRYPTO_PIN_LEN_RANGE 0x00000023 524#define CRYPTO_PIN_EXPIRED 0x00000024 525#define CRYPTO_PIN_LOCKED 0x00000025 526#define CRYPTO_SESSION_CLOSED 0x00000026 527#define CRYPTO_SESSION_COUNT 0x00000027 528#define CRYPTO_SESSION_HANDLE_INVALID 0x00000028 529#define CRYPTO_SESSION_READ_ONLY 0x00000029 530#define CRYPTO_SESSION_EXISTS 0x0000002A 531#define CRYPTO_SESSION_READ_ONLY_EXISTS 0x0000002B 532#define CRYPTO_SESSION_READ_WRITE_SO_EXISTS 0x0000002C 533#define CRYPTO_SIGNATURE_INVALID 0x0000002D 534#define CRYPTO_SIGNATURE_LEN_RANGE 0x0000002E 535#define CRYPTO_TEMPLATE_INCOMPLETE 0x0000002F 536#define CRYPTO_TEMPLATE_INCONSISTENT 0x00000030 537#define CRYPTO_UNWRAPPING_KEY_HANDLE_INVALID 0x00000031 538#define CRYPTO_UNWRAPPING_KEY_SIZE_RANGE 0x00000032 539#define CRYPTO_UNWRAPPING_KEY_TYPE_INCONSISTENT 0x00000033 540#define CRYPTO_USER_ALREADY_LOGGED_IN 0x00000034 541#define CRYPTO_USER_NOT_LOGGED_IN 0x00000035 542#define CRYPTO_USER_PIN_NOT_INITIALIZED 0x00000036 543#define CRYPTO_USER_TYPE_INVALID 0x00000037 544#define CRYPTO_USER_ANOTHER_ALREADY_LOGGED_IN 0x00000038 545#define CRYPTO_USER_TOO_MANY_TYPES 0x00000039 546#define CRYPTO_WRAPPED_KEY_INVALID 0x0000003A 547#define CRYPTO_WRAPPED_KEY_LEN_RANGE 0x0000003B 548#define CRYPTO_WRAPPING_KEY_HANDLE_INVALID 0x0000003C 549#define CRYPTO_WRAPPING_KEY_SIZE_RANGE 0x0000003D 550#define CRYPTO_WRAPPING_KEY_TYPE_INCONSISTENT 0x0000003E 551#define CRYPTO_RANDOM_SEED_NOT_SUPPORTED 0x0000003F 552#define CRYPTO_RANDOM_NO_RNG 0x00000040 553#define CRYPTO_DOMAIN_PARAMS_INVALID 0x00000041 554#define CRYPTO_BUFFER_TOO_SMALL 0x00000042 555#define CRYPTO_INFORMATION_SENSITIVE 0x00000043 556#define CRYPTO_NOT_SUPPORTED 0x00000044 557 558#define CRYPTO_QUEUED 0x00000045 559#define CRYPTO_BUFFER_TOO_BIG 0x00000046 560#define CRYPTO_INVALID_CONTEXT 0x00000047 561#define CRYPTO_INVALID_MAC 0x00000048 562#define CRYPTO_MECH_NOT_SUPPORTED 0x00000049 563#define CRYPTO_INCONSISTENT_ATTRIBUTE 0x0000004A 564#define CRYPTO_NO_PERMISSION 0x0000004B 565#define CRYPTO_INVALID_PROVIDER_ID 0x0000004C 566#define CRYPTO_VERSION_MISMATCH 0x0000004D 567#define CRYPTO_BUSY 0x0000004E 568#define CRYPTO_UNKNOWN_PROVIDER 0x0000004F 569#define CRYPTO_MODVERIFICATION_FAILED 0x00000050 570#define CRYPTO_OLD_CTX_TEMPLATE 0x00000051 571#define CRYPTO_WEAK_KEY 0x00000052 572#define CRYPTO_FIPS140_ERROR 0x00000053 573/* 574 * Don't forget to update CRYPTO_LAST_ERROR and the error_number_table[] 575 * in kernelUtil.c when new error code is added. 576 */ 577#define CRYPTO_LAST_ERROR 0x00000053 578 579/* 580 * Special values that can be used to indicate that information is unavailable 581 * or that there is not practical limit. These values can be used 582 * by fields of the SPI crypto_provider_ext_info(9S) structure. 583 * The value of CRYPTO_UNAVAILABLE_INFO should be the same as 584 * CK_UNAVAILABLE_INFO in the PKCS#11 spec. 585 */ 586#define CRYPTO_UNAVAILABLE_INFO ((ulong_t)(-1)) 587#define CRYPTO_EFFECTIVELY_INFINITE 0x0 588 589#ifdef __cplusplus 590} 591#endif 592 593#endif /* _SYS_CRYPTO_COMMON_H */ 594