pkcs11t.h 60 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646164716481649165016511652165316541655165616571658165916601661166216631664166516661667166816691670167116721673167416751676167716781679168016811682168316841685
  1. /* pkcs11t.h include file for PKCS #11. */
  2. /* $Revision: 1.6 $ */
  3. /* License to copy and use this software is granted provided that it is
  4. * identified as "RSA Security Inc. PKCS #11 Cryptographic Token Interface
  5. * (Cryptoki)" in all material mentioning or referencing this software.
  6. * License is also granted to make and use derivative works provided that
  7. * such works are identified as "derived from the RSA Security Inc. PKCS #11
  8. * Cryptographic Token Interface (Cryptoki)" in all material mentioning or
  9. * referencing the derived work.
  10. * RSA Security Inc. makes no representations concerning either the
  11. * merchantability of this software or the suitability of this software for
  12. * any particular purpose. It is provided "as is" without express or implied
  13. * warranty of any kind.
  14. */
  15. /* See top of pkcs11.h for information about the macros that
  16. * must be defined and the structure-packing conventions that
  17. * must be set before including this file. */
  18. #ifndef _PKCS11T_H_
  19. #define _PKCS11T_H_ 1
  20. #define CK_TRUE 1
  21. #define CK_FALSE 0
  22. #ifndef CK_DISABLE_TRUE_FALSE
  23. #ifndef FALSE
  24. #define FALSE CK_FALSE
  25. #endif
  26. #ifndef TRUE
  27. #define TRUE CK_TRUE
  28. #endif
  29. #endif
  30. /* an unsigned 8-bit value */
  31. typedef unsigned char CK_BYTE;
  32. /* an unsigned 8-bit character */
  33. typedef CK_BYTE CK_CHAR;
  34. /* an 8-bit UTF-8 character */
  35. typedef CK_BYTE CK_UTF8CHAR;
  36. /* a BYTE-sized Boolean flag */
  37. typedef CK_BYTE CK_BBOOL;
  38. /* an unsigned value, at least 32 bits long */
  39. typedef unsigned long int CK_ULONG;
  40. /* a signed value, the same size as a CK_ULONG */
  41. /* CK_LONG is new for v2.0 */
  42. typedef long int CK_LONG;
  43. /* at least 32 bits; each bit is a Boolean flag */
  44. typedef CK_ULONG CK_FLAGS;
  45. /* some special values for certain CK_ULONG variables */
  46. #define CK_UNAVAILABLE_INFORMATION (~0UL)
  47. #define CK_EFFECTIVELY_INFINITE 0
  48. typedef CK_BYTE CK_PTR CK_BYTE_PTR;
  49. typedef CK_CHAR CK_PTR CK_CHAR_PTR;
  50. typedef CK_UTF8CHAR CK_PTR CK_UTF8CHAR_PTR;
  51. typedef CK_ULONG CK_PTR CK_ULONG_PTR;
  52. typedef void CK_PTR CK_VOID_PTR;
  53. /* Pointer to a CK_VOID_PTR-- i.e., pointer to pointer to void */
  54. typedef CK_VOID_PTR CK_PTR CK_VOID_PTR_PTR;
  55. /* The following value is always invalid if used as a session */
  56. /* handle or object handle */
  57. #define CK_INVALID_HANDLE 0
  58. typedef struct CK_VERSION {
  59. CK_BYTE major; /* integer portion of version number */
  60. CK_BYTE minor; /* 1/100ths portion of version number */
  61. } CK_VERSION;
  62. typedef CK_VERSION CK_PTR CK_VERSION_PTR;
  63. typedef struct CK_INFO {
  64. /* manufacturerID and libraryDecription have been changed from
  65. * CK_CHAR to CK_UTF8CHAR for v2.10 */
  66. CK_VERSION cryptokiVersion; /* Cryptoki interface ver */
  67. CK_UTF8CHAR manufacturerID[32]; /* blank padded */
  68. CK_FLAGS flags; /* must be zero */
  69. /* libraryDescription and libraryVersion are new for v2.0 */
  70. CK_UTF8CHAR libraryDescription[32]; /* blank padded */
  71. CK_VERSION libraryVersion; /* version of library */
  72. } CK_INFO;
  73. typedef CK_INFO CK_PTR CK_INFO_PTR;
  74. /* CK_NOTIFICATION enumerates the types of notifications that
  75. * Cryptoki provides to an application */
  76. /* CK_NOTIFICATION has been changed from an enum to a CK_ULONG
  77. * for v2.0 */
  78. typedef CK_ULONG CK_NOTIFICATION;
  79. #define CKN_SURRENDER 0
  80. typedef CK_ULONG CK_SLOT_ID;
  81. typedef CK_SLOT_ID CK_PTR CK_SLOT_ID_PTR;
  82. /* CK_SLOT_INFO provides information about a slot */
  83. typedef struct CK_SLOT_INFO {
  84. /* slotDescription and manufacturerID have been changed from
  85. * CK_CHAR to CK_UTF8CHAR for v2.10 */
  86. CK_UTF8CHAR slotDescription[64]; /* blank padded */
  87. CK_UTF8CHAR manufacturerID[32]; /* blank padded */
  88. CK_FLAGS flags;
  89. /* hardwareVersion and firmwareVersion are new for v2.0 */
  90. CK_VERSION hardwareVersion; /* version of hardware */
  91. CK_VERSION firmwareVersion; /* version of firmware */
  92. } CK_SLOT_INFO;
  93. /* flags: bit flags that provide capabilities of the slot
  94. * Bit Flag Mask Meaning
  95. */
  96. #define CKF_TOKEN_PRESENT 0x00000001 /* a token is there */
  97. #define CKF_REMOVABLE_DEVICE 0x00000002 /* removable devices*/
  98. #define CKF_HW_SLOT 0x00000004 /* hardware slot */
  99. typedef CK_SLOT_INFO CK_PTR CK_SLOT_INFO_PTR;
  100. /* CK_TOKEN_INFO provides information about a token */
  101. typedef struct CK_TOKEN_INFO {
  102. /* label, manufacturerID, and model have been changed from
  103. * CK_CHAR to CK_UTF8CHAR for v2.10 */
  104. CK_UTF8CHAR label[32]; /* blank padded */
  105. CK_UTF8CHAR manufacturerID[32]; /* blank padded */
  106. CK_UTF8CHAR model[16]; /* blank padded */
  107. CK_CHAR serialNumber[16]; /* blank padded */
  108. CK_FLAGS flags; /* see below */
  109. /* ulMaxSessionCount, ulSessionCount, ulMaxRwSessionCount,
  110. * ulRwSessionCount, ulMaxPinLen, and ulMinPinLen have all been
  111. * changed from CK_USHORT to CK_ULONG for v2.0 */
  112. CK_ULONG ulMaxSessionCount; /* max open sessions */
  113. CK_ULONG ulSessionCount; /* sess. now open */
  114. CK_ULONG ulMaxRwSessionCount; /* max R/W sessions */
  115. CK_ULONG ulRwSessionCount; /* R/W sess. now open */
  116. CK_ULONG ulMaxPinLen; /* in bytes */
  117. CK_ULONG ulMinPinLen; /* in bytes */
  118. CK_ULONG ulTotalPublicMemory; /* in bytes */
  119. CK_ULONG ulFreePublicMemory; /* in bytes */
  120. CK_ULONG ulTotalPrivateMemory; /* in bytes */
  121. CK_ULONG ulFreePrivateMemory; /* in bytes */
  122. /* hardwareVersion, firmwareVersion, and time are new for
  123. * v2.0 */
  124. CK_VERSION hardwareVersion; /* version of hardware */
  125. CK_VERSION firmwareVersion; /* version of firmware */
  126. CK_CHAR utcTime[16]; /* time */
  127. } CK_TOKEN_INFO;
  128. /* The flags parameter is defined as follows:
  129. * Bit Flag Mask Meaning
  130. */
  131. #define CKF_RNG 0x00000001 /* has random #
  132. * generator */
  133. #define CKF_WRITE_PROTECTED 0x00000002 /* token is
  134. * write-
  135. * protected */
  136. #define CKF_LOGIN_REQUIRED 0x00000004 /* user must
  137. * login */
  138. #define CKF_USER_PIN_INITIALIZED 0x00000008 /* normal user's
  139. * PIN is set */
  140. /* CKF_RESTORE_KEY_NOT_NEEDED is new for v2.0. If it is set,
  141. * that means that *every* time the state of cryptographic
  142. * operations of a session is successfully saved, all keys
  143. * needed to continue those operations are stored in the state */
  144. #define CKF_RESTORE_KEY_NOT_NEEDED 0x00000020
  145. /* CKF_CLOCK_ON_TOKEN is new for v2.0. If it is set, that means
  146. * that the token has some sort of clock. The time on that
  147. * clock is returned in the token info structure */
  148. #define CKF_CLOCK_ON_TOKEN 0x00000040
  149. /* CKF_PROTECTED_AUTHENTICATION_PATH is new for v2.0. If it is
  150. * set, that means that there is some way for the user to login
  151. * without sending a PIN through the Cryptoki library itself */
  152. #define CKF_PROTECTED_AUTHENTICATION_PATH 0x00000100
  153. /* CKF_DUAL_CRYPTO_OPERATIONS is new for v2.0. If it is true,
  154. * that means that a single session with the token can perform
  155. * dual simultaneous cryptographic operations (digest and
  156. * encrypt; decrypt and digest; sign and encrypt; and decrypt
  157. * and sign) */
  158. #define CKF_DUAL_CRYPTO_OPERATIONS 0x00000200
  159. /* CKF_TOKEN_INITIALIZED if new for v2.10. If it is true, the
  160. * token has been initialized using C_InitializeToken or an
  161. * equivalent mechanism outside the scope of PKCS #11.
  162. * Calling C_InitializeToken when this flag is set will cause
  163. * the token to be reinitialized. */
  164. #define CKF_TOKEN_INITIALIZED 0x00000400
  165. /* CKF_SECONDARY_AUTHENTICATION if new for v2.10. If it is
  166. * true, the token supports secondary authentication for
  167. * private key objects. This flag is deprecated in v2.11 and
  168. onwards. */
  169. #define CKF_SECONDARY_AUTHENTICATION 0x00000800
  170. /* CKF_USER_PIN_COUNT_LOW if new for v2.10. If it is true, an
  171. * incorrect user login PIN has been entered at least once
  172. * since the last successful authentication. */
  173. #define CKF_USER_PIN_COUNT_LOW 0x00010000
  174. /* CKF_USER_PIN_FINAL_TRY if new for v2.10. If it is true,
  175. * supplying an incorrect user PIN will it to become locked. */
  176. #define CKF_USER_PIN_FINAL_TRY 0x00020000
  177. /* CKF_USER_PIN_LOCKED if new for v2.10. If it is true, the
  178. * user PIN has been locked. User login to the token is not
  179. * possible. */
  180. #define CKF_USER_PIN_LOCKED 0x00040000
  181. /* CKF_USER_PIN_TO_BE_CHANGED if new for v2.10. If it is true,
  182. * the user PIN value is the default value set by token
  183. * initialization or manufacturing, or the PIN has been
  184. * expired by the card. */
  185. #define CKF_USER_PIN_TO_BE_CHANGED 0x00080000
  186. /* CKF_SO_PIN_COUNT_LOW if new for v2.10. If it is true, an
  187. * incorrect SO login PIN has been entered at least once since
  188. * the last successful authentication. */
  189. #define CKF_SO_PIN_COUNT_LOW 0x00100000
  190. /* CKF_SO_PIN_FINAL_TRY if new for v2.10. If it is true,
  191. * supplying an incorrect SO PIN will it to become locked. */
  192. #define CKF_SO_PIN_FINAL_TRY 0x00200000
  193. /* CKF_SO_PIN_LOCKED if new for v2.10. If it is true, the SO
  194. * PIN has been locked. SO login to the token is not possible.
  195. */
  196. #define CKF_SO_PIN_LOCKED 0x00400000
  197. /* CKF_SO_PIN_TO_BE_CHANGED if new for v2.10. If it is true,
  198. * the SO PIN value is the default value set by token
  199. * initialization or manufacturing, or the PIN has been
  200. * expired by the card. */
  201. #define CKF_SO_PIN_TO_BE_CHANGED 0x00800000
  202. typedef CK_TOKEN_INFO CK_PTR CK_TOKEN_INFO_PTR;
  203. /* CK_SESSION_HANDLE is a Cryptoki-assigned value that
  204. * identifies a session */
  205. typedef CK_ULONG CK_SESSION_HANDLE;
  206. typedef CK_SESSION_HANDLE CK_PTR CK_SESSION_HANDLE_PTR;
  207. /* CK_USER_TYPE enumerates the types of Cryptoki users */
  208. /* CK_USER_TYPE has been changed from an enum to a CK_ULONG for
  209. * v2.0 */
  210. typedef CK_ULONG CK_USER_TYPE;
  211. /* Security Officer */
  212. #define CKU_SO 0
  213. /* Normal user */
  214. #define CKU_USER 1
  215. /* Context specific (added in v2.20) */
  216. #define CKU_CONTEXT_SPECIFIC 2
  217. /* CK_STATE enumerates the session states */
  218. /* CK_STATE has been changed from an enum to a CK_ULONG for
  219. * v2.0 */
  220. typedef CK_ULONG CK_STATE;
  221. #define CKS_RO_PUBLIC_SESSION 0
  222. #define CKS_RO_USER_FUNCTIONS 1
  223. #define CKS_RW_PUBLIC_SESSION 2
  224. #define CKS_RW_USER_FUNCTIONS 3
  225. #define CKS_RW_SO_FUNCTIONS 4
  226. /* CK_SESSION_INFO provides information about a session */
  227. typedef struct CK_SESSION_INFO {
  228. CK_SLOT_ID slotID;
  229. CK_STATE state;
  230. CK_FLAGS flags; /* see below */
  231. /* ulDeviceError was changed from CK_USHORT to CK_ULONG for
  232. * v2.0 */
  233. CK_ULONG ulDeviceError; /* device-dependent error code */
  234. } CK_SESSION_INFO;
  235. /* The flags are defined in the following table:
  236. * Bit Flag Mask Meaning
  237. */
  238. #define CKF_RW_SESSION 0x00000002 /* session is r/w */
  239. #define CKF_SERIAL_SESSION 0x00000004 /* no parallel */
  240. typedef CK_SESSION_INFO CK_PTR CK_SESSION_INFO_PTR;
  241. /* CK_OBJECT_HANDLE is a token-specific identifier for an
  242. * object */
  243. typedef CK_ULONG CK_OBJECT_HANDLE;
  244. typedef CK_OBJECT_HANDLE CK_PTR CK_OBJECT_HANDLE_PTR;
  245. /* CK_OBJECT_CLASS is a value that identifies the classes (or
  246. * types) of objects that Cryptoki recognizes. It is defined
  247. * as follows: */
  248. /* CK_OBJECT_CLASS was changed from CK_USHORT to CK_ULONG for
  249. * v2.0 */
  250. typedef CK_ULONG CK_OBJECT_CLASS;
  251. /* The following classes of objects are defined: */
  252. /* CKO_HW_FEATURE is new for v2.10 */
  253. /* CKO_DOMAIN_PARAMETERS is new for v2.11 */
  254. /* CKO_MECHANISM is new for v2.20 */
  255. #define CKO_DATA 0x00000000
  256. #define CKO_CERTIFICATE 0x00000001
  257. #define CKO_PUBLIC_KEY 0x00000002
  258. #define CKO_PRIVATE_KEY 0x00000003
  259. #define CKO_SECRET_KEY 0x00000004
  260. #define CKO_HW_FEATURE 0x00000005
  261. #define CKO_DOMAIN_PARAMETERS 0x00000006
  262. #define CKO_MECHANISM 0x00000007
  263. #define CKO_VENDOR_DEFINED 0x80000000
  264. typedef CK_OBJECT_CLASS CK_PTR CK_OBJECT_CLASS_PTR;
  265. /* CK_HW_FEATURE_TYPE is new for v2.10. CK_HW_FEATURE_TYPE is a
  266. * value that identifies the hardware feature type of an object
  267. * with CK_OBJECT_CLASS equal to CKO_HW_FEATURE. */
  268. typedef CK_ULONG CK_HW_FEATURE_TYPE;
  269. /* The following hardware feature types are defined */
  270. /* CKH_USER_INTERFACE is new for v2.20 */
  271. #define CKH_MONOTONIC_COUNTER 0x00000001
  272. #define CKH_CLOCK 0x00000002
  273. #define CKH_USER_INTERFACE 0x00000003
  274. #define CKH_VENDOR_DEFINED 0x80000000
  275. /* CK_KEY_TYPE is a value that identifies a key type */
  276. /* CK_KEY_TYPE was changed from CK_USHORT to CK_ULONG for v2.0 */
  277. typedef CK_ULONG CK_KEY_TYPE;
  278. /* the following key types are defined: */
  279. #define CKK_RSA 0x00000000
  280. #define CKK_DSA 0x00000001
  281. #define CKK_DH 0x00000002
  282. /* CKK_ECDSA and CKK_KEA are new for v2.0 */
  283. /* CKK_ECDSA is deprecated in v2.11, CKK_EC is preferred. */
  284. #define CKK_ECDSA 0x00000003
  285. #define CKK_EC 0x00000003
  286. #define CKK_X9_42_DH 0x00000004
  287. #define CKK_KEA 0x00000005
  288. #define CKK_GENERIC_SECRET 0x00000010
  289. #define CKK_RC2 0x00000011
  290. #define CKK_RC4 0x00000012
  291. #define CKK_DES 0x00000013
  292. #define CKK_DES2 0x00000014
  293. #define CKK_DES3 0x00000015
  294. /* all these key types are new for v2.0 */
  295. #define CKK_CAST 0x00000016
  296. #define CKK_CAST3 0x00000017
  297. /* CKK_CAST5 is deprecated in v2.11, CKK_CAST128 is preferred. */
  298. #define CKK_CAST5 0x00000018
  299. #define CKK_CAST128 0x00000018
  300. #define CKK_RC5 0x00000019
  301. #define CKK_IDEA 0x0000001A
  302. #define CKK_SKIPJACK 0x0000001B
  303. #define CKK_BATON 0x0000001C
  304. #define CKK_JUNIPER 0x0000001D
  305. #define CKK_CDMF 0x0000001E
  306. #define CKK_AES 0x0000001F
  307. /* BlowFish and TwoFish are new for v2.20 */
  308. #define CKK_BLOWFISH 0x00000020
  309. #define CKK_TWOFISH 0x00000021
  310. #define CKK_VENDOR_DEFINED 0x80000000
  311. /* CK_CERTIFICATE_TYPE is a value that identifies a certificate
  312. * type */
  313. /* CK_CERTIFICATE_TYPE was changed from CK_USHORT to CK_ULONG
  314. * for v2.0 */
  315. typedef CK_ULONG CK_CERTIFICATE_TYPE;
  316. /* The following certificate types are defined: */
  317. /* CKC_X_509_ATTR_CERT is new for v2.10 */
  318. /* CKC_WTLS is new for v2.20 */
  319. #define CKC_X_509 0x00000000
  320. #define CKC_X_509_ATTR_CERT 0x00000001
  321. #define CKC_WTLS 0x00000002
  322. #define CKC_VENDOR_DEFINED 0x80000000
  323. /* CK_ATTRIBUTE_TYPE is a value that identifies an attribute
  324. * type */
  325. /* CK_ATTRIBUTE_TYPE was changed from CK_USHORT to CK_ULONG for
  326. * v2.0 */
  327. typedef CK_ULONG CK_ATTRIBUTE_TYPE;
  328. /* The CKF_ARRAY_ATTRIBUTE flag identifies an attribute which
  329. consists of an array of values. */
  330. #define CKF_ARRAY_ATTRIBUTE 0x40000000
  331. /* The following attribute types are defined: */
  332. #define CKA_CLASS 0x00000000
  333. #define CKA_TOKEN 0x00000001
  334. #define CKA_PRIVATE 0x00000002
  335. #define CKA_LABEL 0x00000003
  336. #define CKA_APPLICATION 0x00000010
  337. #define CKA_VALUE 0x00000011
  338. /* CKA_OBJECT_ID is new for v2.10 */
  339. #define CKA_OBJECT_ID 0x00000012
  340. #define CKA_CERTIFICATE_TYPE 0x00000080
  341. #define CKA_ISSUER 0x00000081
  342. #define CKA_SERIAL_NUMBER 0x00000082
  343. /* CKA_AC_ISSUER, CKA_OWNER, and CKA_ATTR_TYPES are new
  344. * for v2.10 */
  345. #define CKA_AC_ISSUER 0x00000083
  346. #define CKA_OWNER 0x00000084
  347. #define CKA_ATTR_TYPES 0x00000085
  348. /* CKA_TRUSTED is new for v2.11 */
  349. #define CKA_TRUSTED 0x00000086
  350. /* CKA_CERTIFICATE_CATEGORY ...
  351. * CKA_CHECK_VALUE are new for v2.20 */
  352. #define CKA_CERTIFICATE_CATEGORY 0x00000087
  353. #define CKA_JAVA_MIDP_SECURITY_DOMAIN 0x00000088
  354. #define CKA_URL 0x00000089
  355. #define CKA_HASH_OF_SUBJECT_PUBLIC_KEY 0x0000008A
  356. #define CKA_HASH_OF_ISSUER_PUBLIC_KEY 0x0000008B
  357. #define CKA_CHECK_VALUE 0x00000090
  358. #define CKA_KEY_TYPE 0x00000100
  359. #define CKA_SUBJECT 0x00000101
  360. #define CKA_ID 0x00000102
  361. #define CKA_SENSITIVE 0x00000103
  362. #define CKA_ENCRYPT 0x00000104
  363. #define CKA_DECRYPT 0x00000105
  364. #define CKA_WRAP 0x00000106
  365. #define CKA_UNWRAP 0x00000107
  366. #define CKA_SIGN 0x00000108
  367. #define CKA_SIGN_RECOVER 0x00000109
  368. #define CKA_VERIFY 0x0000010A
  369. #define CKA_VERIFY_RECOVER 0x0000010B
  370. #define CKA_DERIVE 0x0000010C
  371. #define CKA_START_DATE 0x00000110
  372. #define CKA_END_DATE 0x00000111
  373. #define CKA_MODULUS 0x00000120
  374. #define CKA_MODULUS_BITS 0x00000121
  375. #define CKA_PUBLIC_EXPONENT 0x00000122
  376. #define CKA_PRIVATE_EXPONENT 0x00000123
  377. #define CKA_PRIME_1 0x00000124
  378. #define CKA_PRIME_2 0x00000125
  379. #define CKA_EXPONENT_1 0x00000126
  380. #define CKA_EXPONENT_2 0x00000127
  381. #define CKA_COEFFICIENT 0x00000128
  382. #define CKA_PRIME 0x00000130
  383. #define CKA_SUBPRIME 0x00000131
  384. #define CKA_BASE 0x00000132
  385. /* CKA_PRIME_BITS and CKA_SUB_PRIME_BITS are new for v2.11 */
  386. #define CKA_PRIME_BITS 0x00000133
  387. #define CKA_SUBPRIME_BITS 0x00000134
  388. #define CKA_SUB_PRIME_BITS CKA_SUBPRIME_BITS
  389. /* (To retain backwards-compatibility) */
  390. #define CKA_VALUE_BITS 0x00000160
  391. #define CKA_VALUE_LEN 0x00000161
  392. /* CKA_EXTRACTABLE, CKA_LOCAL, CKA_NEVER_EXTRACTABLE,
  393. * CKA_ALWAYS_SENSITIVE, CKA_MODIFIABLE, CKA_ECDSA_PARAMS,
  394. * and CKA_EC_POINT are new for v2.0 */
  395. #define CKA_EXTRACTABLE 0x00000162
  396. #define CKA_LOCAL 0x00000163
  397. #define CKA_NEVER_EXTRACTABLE 0x00000164
  398. #define CKA_ALWAYS_SENSITIVE 0x00000165
  399. /* CKA_KEY_GEN_MECHANISM is new for v2.11 */
  400. #define CKA_KEY_GEN_MECHANISM 0x00000166
  401. #define CKA_MODIFIABLE 0x00000170
  402. /* CKA_ECDSA_PARAMS is deprecated in v2.11,
  403. * CKA_EC_PARAMS is preferred. */
  404. #define CKA_ECDSA_PARAMS 0x00000180
  405. #define CKA_EC_PARAMS 0x00000180
  406. #define CKA_EC_POINT 0x00000181
  407. /* CKA_SECONDARY_AUTH, CKA_AUTH_PIN_FLAGS,
  408. * are new for v2.10. Deprecated in v2.11 and onwards. */
  409. #define CKA_SECONDARY_AUTH 0x00000200
  410. #define CKA_AUTH_PIN_FLAGS 0x00000201
  411. /* CKA_ALWAYS_AUTHENTICATE ...
  412. * CKA_UNWRAP_TEMPLATE are new for v2.20 */
  413. #define CKA_ALWAYS_AUTHENTICATE 0x00000202
  414. #define CKA_WRAP_WITH_TRUSTED 0x00000210
  415. #define CKA_WRAP_TEMPLATE (CKF_ARRAY_ATTRIBUTE|0x00000211)
  416. #define CKA_UNWRAP_TEMPLATE (CKF_ARRAY_ATTRIBUTE|0x00000212)
  417. /* CKA_HW_FEATURE_TYPE, CKA_RESET_ON_INIT, and CKA_HAS_RESET
  418. * are new for v2.10 */
  419. #define CKA_HW_FEATURE_TYPE 0x00000300
  420. #define CKA_RESET_ON_INIT 0x00000301
  421. #define CKA_HAS_RESET 0x00000302
  422. /* The following attributes are new for v2.20 */
  423. #define CKA_PIXEL_X 0x00000400
  424. #define CKA_PIXEL_Y 0x00000401
  425. #define CKA_RESOLUTION 0x00000402
  426. #define CKA_CHAR_ROWS 0x00000403
  427. #define CKA_CHAR_COLUMNS 0x00000404
  428. #define CKA_COLOR 0x00000405
  429. #define CKA_BITS_PER_PIXEL 0x00000406
  430. #define CKA_CHAR_SETS 0x00000480
  431. #define CKA_ENCODING_METHODS 0x00000481
  432. #define CKA_MIME_TYPES 0x00000482
  433. #define CKA_MECHANISM_TYPE 0x00000500
  434. #define CKA_REQUIRED_CMS_ATTRIBUTES 0x00000501
  435. #define CKA_DEFAULT_CMS_ATTRIBUTES 0x00000502
  436. #define CKA_SUPPORTED_CMS_ATTRIBUTES 0x00000503
  437. #define CKA_ALLOWED_MECHANISMS (CKF_ARRAY_ATTRIBUTE|0x00000600)
  438. #define CKA_VENDOR_DEFINED 0x80000000
  439. /* CK_ATTRIBUTE is a structure that includes the type, length
  440. * and value of an attribute */
  441. typedef struct CK_ATTRIBUTE {
  442. CK_ATTRIBUTE_TYPE type;
  443. CK_VOID_PTR pValue;
  444. /* ulValueLen went from CK_USHORT to CK_ULONG for v2.0 */
  445. CK_ULONG ulValueLen; /* in bytes */
  446. } CK_ATTRIBUTE;
  447. typedef CK_ATTRIBUTE CK_PTR CK_ATTRIBUTE_PTR;
  448. /* CK_DATE is a structure that defines a date */
  449. typedef struct CK_DATE{
  450. CK_CHAR year[4]; /* the year ("1900" - "9999") */
  451. CK_CHAR month[2]; /* the month ("01" - "12") */
  452. CK_CHAR day[2]; /* the day ("01" - "31") */
  453. } CK_DATE;
  454. /* CK_MECHANISM_TYPE is a value that identifies a mechanism
  455. * type */
  456. /* CK_MECHANISM_TYPE was changed from CK_USHORT to CK_ULONG for
  457. * v2.0 */
  458. typedef CK_ULONG CK_MECHANISM_TYPE;
  459. /* the following mechanism types are defined: */
  460. #define CKM_RSA_PKCS_KEY_PAIR_GEN 0x00000000
  461. #define CKM_RSA_PKCS 0x00000001
  462. #define CKM_RSA_9796 0x00000002
  463. #define CKM_RSA_X_509 0x00000003
  464. /* CKM_MD2_RSA_PKCS, CKM_MD5_RSA_PKCS, and CKM_SHA1_RSA_PKCS
  465. * are new for v2.0. They are mechanisms which hash and sign */
  466. #define CKM_MD2_RSA_PKCS 0x00000004
  467. #define CKM_MD5_RSA_PKCS 0x00000005
  468. #define CKM_SHA1_RSA_PKCS 0x00000006
  469. /* CKM_RIPEMD128_RSA_PKCS, CKM_RIPEMD160_RSA_PKCS, and
  470. * CKM_RSA_PKCS_OAEP are new for v2.10 */
  471. #define CKM_RIPEMD128_RSA_PKCS 0x00000007
  472. #define CKM_RIPEMD160_RSA_PKCS 0x00000008
  473. #define CKM_RSA_PKCS_OAEP 0x00000009
  474. /* CKM_RSA_X9_31_KEY_PAIR_GEN, CKM_RSA_X9_31, CKM_SHA1_RSA_X9_31,
  475. * CKM_RSA_PKCS_PSS, and CKM_SHA1_RSA_PKCS_PSS are new for v2.11 */
  476. #define CKM_RSA_X9_31_KEY_PAIR_GEN 0x0000000A
  477. #define CKM_RSA_X9_31 0x0000000B
  478. #define CKM_SHA1_RSA_X9_31 0x0000000C
  479. #define CKM_RSA_PKCS_PSS 0x0000000D
  480. #define CKM_SHA1_RSA_PKCS_PSS 0x0000000E
  481. #define CKM_DSA_KEY_PAIR_GEN 0x00000010
  482. #define CKM_DSA 0x00000011
  483. #define CKM_DSA_SHA1 0x00000012
  484. #define CKM_DH_PKCS_KEY_PAIR_GEN 0x00000020
  485. #define CKM_DH_PKCS_DERIVE 0x00000021
  486. /* CKM_X9_42_DH_KEY_PAIR_GEN, CKM_X9_42_DH_DERIVE,
  487. * CKM_X9_42_DH_HYBRID_DERIVE, and CKM_X9_42_MQV_DERIVE are new for
  488. * v2.11 */
  489. #define CKM_X9_42_DH_KEY_PAIR_GEN 0x00000030
  490. #define CKM_X9_42_DH_DERIVE 0x00000031
  491. #define CKM_X9_42_DH_HYBRID_DERIVE 0x00000032
  492. #define CKM_X9_42_MQV_DERIVE 0x00000033
  493. /* CKM_SHA256/384/512 are new for v2.20 */
  494. #define CKM_SHA256_RSA_PKCS 0x00000040
  495. #define CKM_SHA384_RSA_PKCS 0x00000041
  496. #define CKM_SHA512_RSA_PKCS 0x00000042
  497. #define CKM_SHA256_RSA_PKCS_PSS 0x00000043
  498. #define CKM_SHA384_RSA_PKCS_PSS 0x00000044
  499. #define CKM_SHA512_RSA_PKCS_PSS 0x00000045
  500. #define CKM_RC2_KEY_GEN 0x00000100
  501. #define CKM_RC2_ECB 0x00000101
  502. #define CKM_RC2_CBC 0x00000102
  503. #define CKM_RC2_MAC 0x00000103
  504. /* CKM_RC2_MAC_GENERAL and CKM_RC2_CBC_PAD are new for v2.0 */
  505. #define CKM_RC2_MAC_GENERAL 0x00000104
  506. #define CKM_RC2_CBC_PAD 0x00000105
  507. #define CKM_RC4_KEY_GEN 0x00000110
  508. #define CKM_RC4 0x00000111
  509. #define CKM_DES_KEY_GEN 0x00000120
  510. #define CKM_DES_ECB 0x00000121
  511. #define CKM_DES_CBC 0x00000122
  512. #define CKM_DES_MAC 0x00000123
  513. /* CKM_DES_MAC_GENERAL and CKM_DES_CBC_PAD are new for v2.0 */
  514. #define CKM_DES_MAC_GENERAL 0x00000124
  515. #define CKM_DES_CBC_PAD 0x00000125
  516. #define CKM_DES2_KEY_GEN 0x00000130
  517. #define CKM_DES3_KEY_GEN 0x00000131
  518. #define CKM_DES3_ECB 0x00000132
  519. #define CKM_DES3_CBC 0x00000133
  520. #define CKM_DES3_MAC 0x00000134
  521. /* CKM_DES3_MAC_GENERAL, CKM_DES3_CBC_PAD, CKM_CDMF_KEY_GEN,
  522. * CKM_CDMF_ECB, CKM_CDMF_CBC, CKM_CDMF_MAC,
  523. * CKM_CDMF_MAC_GENERAL, and CKM_CDMF_CBC_PAD are new for v2.0 */
  524. #define CKM_DES3_MAC_GENERAL 0x00000135
  525. #define CKM_DES3_CBC_PAD 0x00000136
  526. #define CKM_CDMF_KEY_GEN 0x00000140
  527. #define CKM_CDMF_ECB 0x00000141
  528. #define CKM_CDMF_CBC 0x00000142
  529. #define CKM_CDMF_MAC 0x00000143
  530. #define CKM_CDMF_MAC_GENERAL 0x00000144
  531. #define CKM_CDMF_CBC_PAD 0x00000145
  532. /* the following four DES mechanisms are new for v2.20 */
  533. #define CKM_DES_OFB64 0x00000150
  534. #define CKM_DES_OFB8 0x00000151
  535. #define CKM_DES_CFB64 0x00000152
  536. #define CKM_DES_CFB8 0x00000153
  537. #define CKM_MD2 0x00000200
  538. /* CKM_MD2_HMAC and CKM_MD2_HMAC_GENERAL are new for v2.0 */
  539. #define CKM_MD2_HMAC 0x00000201
  540. #define CKM_MD2_HMAC_GENERAL 0x00000202
  541. #define CKM_MD5 0x00000210
  542. /* CKM_MD5_HMAC and CKM_MD5_HMAC_GENERAL are new for v2.0 */
  543. #define CKM_MD5_HMAC 0x00000211
  544. #define CKM_MD5_HMAC_GENERAL 0x00000212
  545. #define CKM_SHA_1 0x00000220
  546. /* CKM_SHA_1_HMAC and CKM_SHA_1_HMAC_GENERAL are new for v2.0 */
  547. #define CKM_SHA_1_HMAC 0x00000221
  548. #define CKM_SHA_1_HMAC_GENERAL 0x00000222
  549. /* CKM_RIPEMD128, CKM_RIPEMD128_HMAC,
  550. * CKM_RIPEMD128_HMAC_GENERAL, CKM_RIPEMD160, CKM_RIPEMD160_HMAC,
  551. * and CKM_RIPEMD160_HMAC_GENERAL are new for v2.10 */
  552. #define CKM_RIPEMD128 0x00000230
  553. #define CKM_RIPEMD128_HMAC 0x00000231
  554. #define CKM_RIPEMD128_HMAC_GENERAL 0x00000232
  555. #define CKM_RIPEMD160 0x00000240
  556. #define CKM_RIPEMD160_HMAC 0x00000241
  557. #define CKM_RIPEMD160_HMAC_GENERAL 0x00000242
  558. /* CKM_SHA256/384/512 are new for v2.20 */
  559. #define CKM_SHA256 0x00000250
  560. #define CKM_SHA256_HMAC 0x00000251
  561. #define CKM_SHA256_HMAC_GENERAL 0x00000252
  562. #define CKM_SHA384 0x00000260
  563. #define CKM_SHA384_HMAC 0x00000261
  564. #define CKM_SHA384_HMAC_GENERAL 0x00000262
  565. #define CKM_SHA512 0x00000270
  566. #define CKM_SHA512_HMAC 0x00000271
  567. #define CKM_SHA512_HMAC_GENERAL 0x00000272
  568. /* All of the following mechanisms are new for v2.0 */
  569. /* Note that CAST128 and CAST5 are the same algorithm */
  570. #define CKM_CAST_KEY_GEN 0x00000300
  571. #define CKM_CAST_ECB 0x00000301
  572. #define CKM_CAST_CBC 0x00000302
  573. #define CKM_CAST_MAC 0x00000303
  574. #define CKM_CAST_MAC_GENERAL 0x00000304
  575. #define CKM_CAST_CBC_PAD 0x00000305
  576. #define CKM_CAST3_KEY_GEN 0x00000310
  577. #define CKM_CAST3_ECB 0x00000311
  578. #define CKM_CAST3_CBC 0x00000312
  579. #define CKM_CAST3_MAC 0x00000313
  580. #define CKM_CAST3_MAC_GENERAL 0x00000314
  581. #define CKM_CAST3_CBC_PAD 0x00000315
  582. #define CKM_CAST5_KEY_GEN 0x00000320
  583. #define CKM_CAST128_KEY_GEN 0x00000320
  584. #define CKM_CAST5_ECB 0x00000321
  585. #define CKM_CAST128_ECB 0x00000321
  586. #define CKM_CAST5_CBC 0x00000322
  587. #define CKM_CAST128_CBC 0x00000322
  588. #define CKM_CAST5_MAC 0x00000323
  589. #define CKM_CAST128_MAC 0x00000323
  590. #define CKM_CAST5_MAC_GENERAL 0x00000324
  591. #define CKM_CAST128_MAC_GENERAL 0x00000324
  592. #define CKM_CAST5_CBC_PAD 0x00000325
  593. #define CKM_CAST128_CBC_PAD 0x00000325
  594. #define CKM_RC5_KEY_GEN 0x00000330
  595. #define CKM_RC5_ECB 0x00000331
  596. #define CKM_RC5_CBC 0x00000332
  597. #define CKM_RC5_MAC 0x00000333
  598. #define CKM_RC5_MAC_GENERAL 0x00000334
  599. #define CKM_RC5_CBC_PAD 0x00000335
  600. #define CKM_IDEA_KEY_GEN 0x00000340
  601. #define CKM_IDEA_ECB 0x00000341
  602. #define CKM_IDEA_CBC 0x00000342
  603. #define CKM_IDEA_MAC 0x00000343
  604. #define CKM_IDEA_MAC_GENERAL 0x00000344
  605. #define CKM_IDEA_CBC_PAD 0x00000345
  606. #define CKM_GENERIC_SECRET_KEY_GEN 0x00000350
  607. #define CKM_CONCATENATE_BASE_AND_KEY 0x00000360
  608. #define CKM_CONCATENATE_BASE_AND_DATA 0x00000362
  609. #define CKM_CONCATENATE_DATA_AND_BASE 0x00000363
  610. #define CKM_XOR_BASE_AND_DATA 0x00000364
  611. #define CKM_EXTRACT_KEY_FROM_KEY 0x00000365
  612. #define CKM_SSL3_PRE_MASTER_KEY_GEN 0x00000370
  613. #define CKM_SSL3_MASTER_KEY_DERIVE 0x00000371
  614. #define CKM_SSL3_KEY_AND_MAC_DERIVE 0x00000372
  615. /* CKM_SSL3_MASTER_KEY_DERIVE_DH, CKM_TLS_PRE_MASTER_KEY_GEN,
  616. * CKM_TLS_MASTER_KEY_DERIVE, CKM_TLS_KEY_AND_MAC_DERIVE, and
  617. * CKM_TLS_MASTER_KEY_DERIVE_DH are new for v2.11 */
  618. #define CKM_SSL3_MASTER_KEY_DERIVE_DH 0x00000373
  619. #define CKM_TLS_PRE_MASTER_KEY_GEN 0x00000374
  620. #define CKM_TLS_MASTER_KEY_DERIVE 0x00000375
  621. #define CKM_TLS_KEY_AND_MAC_DERIVE 0x00000376
  622. #define CKM_TLS_MASTER_KEY_DERIVE_DH 0x00000377
  623. /* CKM_TLS_PRF is new for v2.20 */
  624. #define CKM_TLS_PRF 0x00000378
  625. #define CKM_SSL3_MD5_MAC 0x00000380
  626. #define CKM_SSL3_SHA1_MAC 0x00000381
  627. #define CKM_MD5_KEY_DERIVATION 0x00000390
  628. #define CKM_MD2_KEY_DERIVATION 0x00000391
  629. #define CKM_SHA1_KEY_DERIVATION 0x00000392
  630. /* CKM_SHA256/384/512 are new for v2.20 */
  631. #define CKM_SHA256_KEY_DERIVATION 0x00000393
  632. #define CKM_SHA384_KEY_DERIVATION 0x00000394
  633. #define CKM_SHA512_KEY_DERIVATION 0x00000395
  634. #define CKM_PBE_MD2_DES_CBC 0x000003A0
  635. #define CKM_PBE_MD5_DES_CBC 0x000003A1
  636. #define CKM_PBE_MD5_CAST_CBC 0x000003A2
  637. #define CKM_PBE_MD5_CAST3_CBC 0x000003A3
  638. #define CKM_PBE_MD5_CAST5_CBC 0x000003A4
  639. #define CKM_PBE_MD5_CAST128_CBC 0x000003A4
  640. #define CKM_PBE_SHA1_CAST5_CBC 0x000003A5
  641. #define CKM_PBE_SHA1_CAST128_CBC 0x000003A5
  642. #define CKM_PBE_SHA1_RC4_128 0x000003A6
  643. #define CKM_PBE_SHA1_RC4_40 0x000003A7
  644. #define CKM_PBE_SHA1_DES3_EDE_CBC 0x000003A8
  645. #define CKM_PBE_SHA1_DES2_EDE_CBC 0x000003A9
  646. #define CKM_PBE_SHA1_RC2_128_CBC 0x000003AA
  647. #define CKM_PBE_SHA1_RC2_40_CBC 0x000003AB
  648. /* CKM_PKCS5_PBKD2 is new for v2.10 */
  649. #define CKM_PKCS5_PBKD2 0x000003B0
  650. #define CKM_PBA_SHA1_WITH_SHA1_HMAC 0x000003C0
  651. /* WTLS mechanisms are new for v2.20 */
  652. #define CKM_WTLS_PRE_MASTER_KEY_GEN 0x000003D0
  653. #define CKM_WTLS_MASTER_KEY_DERIVE 0x000003D1
  654. #define CKM_WTLS_MASTER_KEY_DERIVE_DH_ECC 0x000003D2
  655. #define CKM_WTLS_PRF 0x000003D3
  656. #define CKM_WTLS_SERVER_KEY_AND_MAC_DERIVE 0x000003D4
  657. #define CKM_WTLS_CLIENT_KEY_AND_MAC_DERIVE 0x000003D5
  658. #define CKM_KEY_WRAP_LYNKS 0x00000400
  659. #define CKM_KEY_WRAP_SET_OAEP 0x00000401
  660. /* CKM_CMS_SIG is new for v2.20 */
  661. #define CKM_CMS_SIG 0x00000500
  662. /* Fortezza mechanisms */
  663. #define CKM_SKIPJACK_KEY_GEN 0x00001000
  664. #define CKM_SKIPJACK_ECB64 0x00001001
  665. #define CKM_SKIPJACK_CBC64 0x00001002
  666. #define CKM_SKIPJACK_OFB64 0x00001003
  667. #define CKM_SKIPJACK_CFB64 0x00001004
  668. #define CKM_SKIPJACK_CFB32 0x00001005
  669. #define CKM_SKIPJACK_CFB16 0x00001006
  670. #define CKM_SKIPJACK_CFB8 0x00001007
  671. #define CKM_SKIPJACK_WRAP 0x00001008
  672. #define CKM_SKIPJACK_PRIVATE_WRAP 0x00001009
  673. #define CKM_SKIPJACK_RELAYX 0x0000100a
  674. #define CKM_KEA_KEY_PAIR_GEN 0x00001010
  675. #define CKM_KEA_KEY_DERIVE 0x00001011
  676. #define CKM_FORTEZZA_TIMESTAMP 0x00001020
  677. #define CKM_BATON_KEY_GEN 0x00001030
  678. #define CKM_BATON_ECB128 0x00001031
  679. #define CKM_BATON_ECB96 0x00001032
  680. #define CKM_BATON_CBC128 0x00001033
  681. #define CKM_BATON_COUNTER 0x00001034
  682. #define CKM_BATON_SHUFFLE 0x00001035
  683. #define CKM_BATON_WRAP 0x00001036
  684. /* CKM_ECDSA_KEY_PAIR_GEN is deprecated in v2.11,
  685. * CKM_EC_KEY_PAIR_GEN is preferred */
  686. #define CKM_ECDSA_KEY_PAIR_GEN 0x00001040
  687. #define CKM_EC_KEY_PAIR_GEN 0x00001040
  688. #define CKM_ECDSA 0x00001041
  689. #define CKM_ECDSA_SHA1 0x00001042
  690. /* CKM_ECDH1_DERIVE, CKM_ECDH1_COFACTOR_DERIVE, and CKM_ECMQV_DERIVE
  691. * are new for v2.11 */
  692. #define CKM_ECDH1_DERIVE 0x00001050
  693. #define CKM_ECDH1_COFACTOR_DERIVE 0x00001051
  694. #define CKM_ECMQV_DERIVE 0x00001052
  695. #define CKM_JUNIPER_KEY_GEN 0x00001060
  696. #define CKM_JUNIPER_ECB128 0x00001061
  697. #define CKM_JUNIPER_CBC128 0x00001062
  698. #define CKM_JUNIPER_COUNTER 0x00001063
  699. #define CKM_JUNIPER_SHUFFLE 0x00001064
  700. #define CKM_JUNIPER_WRAP 0x00001065
  701. #define CKM_FASTHASH 0x00001070
  702. /* CKM_AES_KEY_GEN, CKM_AES_ECB, CKM_AES_CBC, CKM_AES_MAC,
  703. * CKM_AES_MAC_GENERAL, CKM_AES_CBC_PAD, CKM_DSA_PARAMETER_GEN,
  704. * CKM_DH_PKCS_PARAMETER_GEN, and CKM_X9_42_DH_PARAMETER_GEN are
  705. * new for v2.11 */
  706. #define CKM_AES_KEY_GEN 0x00001080
  707. #define CKM_AES_ECB 0x00001081
  708. #define CKM_AES_CBC 0x00001082
  709. #define CKM_AES_MAC 0x00001083
  710. #define CKM_AES_MAC_GENERAL 0x00001084
  711. #define CKM_AES_CBC_PAD 0x00001085
  712. /* BlowFish and TwoFish are new for v2.20 */
  713. #define CKM_BLOWFISH_KEY_GEN 0x00001090
  714. #define CKM_BLOWFISH_CBC 0x00001091
  715. #define CKM_TWOFISH_KEY_GEN 0x00001092
  716. #define CKM_TWOFISH_CBC 0x00001093
  717. /* CKM_xxx_ENCRYPT_DATA mechanisms are new for v2.20 */
  718. #define CKM_DES_ECB_ENCRYPT_DATA 0x00001100
  719. #define CKM_DES_CBC_ENCRYPT_DATA 0x00001101
  720. #define CKM_DES3_ECB_ENCRYPT_DATA 0x00001102
  721. #define CKM_DES3_CBC_ENCRYPT_DATA 0x00001103
  722. #define CKM_AES_ECB_ENCRYPT_DATA 0x00001104
  723. #define CKM_AES_CBC_ENCRYPT_DATA 0x00001105
  724. #define CKM_DSA_PARAMETER_GEN 0x00002000
  725. #define CKM_DH_PKCS_PARAMETER_GEN 0x00002001
  726. #define CKM_X9_42_DH_PARAMETER_GEN 0x00002002
  727. #define CKM_VENDOR_DEFINED 0x80000000
  728. typedef CK_MECHANISM_TYPE CK_PTR CK_MECHANISM_TYPE_PTR;
  729. /* CK_MECHANISM is a structure that specifies a particular
  730. * mechanism */
  731. typedef struct CK_MECHANISM {
  732. CK_MECHANISM_TYPE mechanism;
  733. CK_VOID_PTR pParameter;
  734. /* ulParameterLen was changed from CK_USHORT to CK_ULONG for
  735. * v2.0 */
  736. CK_ULONG ulParameterLen; /* in bytes */
  737. } CK_MECHANISM;
  738. typedef CK_MECHANISM CK_PTR CK_MECHANISM_PTR;
  739. /* CK_MECHANISM_INFO provides information about a particular
  740. * mechanism */
  741. typedef struct CK_MECHANISM_INFO {
  742. CK_ULONG ulMinKeySize;
  743. CK_ULONG ulMaxKeySize;
  744. CK_FLAGS flags;
  745. } CK_MECHANISM_INFO;
  746. /* The flags are defined as follows:
  747. * Bit Flag Mask Meaning */
  748. #define CKF_HW 0x00000001 /* performed by HW */
  749. /* The flags CKF_ENCRYPT, CKF_DECRYPT, CKF_DIGEST, CKF_SIGN,
  750. * CKG_SIGN_RECOVER, CKF_VERIFY, CKF_VERIFY_RECOVER,
  751. * CKF_GENERATE, CKF_GENERATE_KEY_PAIR, CKF_WRAP, CKF_UNWRAP,
  752. * and CKF_DERIVE are new for v2.0. They specify whether or not
  753. * a mechanism can be used for a particular task */
  754. #define CKF_ENCRYPT 0x00000100
  755. #define CKF_DECRYPT 0x00000200
  756. #define CKF_DIGEST 0x00000400
  757. #define CKF_SIGN 0x00000800
  758. #define CKF_SIGN_RECOVER 0x00001000
  759. #define CKF_VERIFY 0x00002000
  760. #define CKF_VERIFY_RECOVER 0x00004000
  761. #define CKF_GENERATE 0x00008000
  762. #define CKF_GENERATE_KEY_PAIR 0x00010000
  763. #define CKF_WRAP 0x00020000
  764. #define CKF_UNWRAP 0x00040000
  765. #define CKF_DERIVE 0x00080000
  766. /* CKF_EC_F_P, CKF_EC_F_2M, CKF_EC_ECPARAMETERS, CKF_EC_NAMEDCURVE,
  767. * CKF_EC_UNCOMPRESS, and CKF_EC_COMPRESS are new for v2.11. They
  768. * describe a token's EC capabilities not available in mechanism
  769. * information. */
  770. #define CKF_EC_F_P 0x00100000
  771. #define CKF_EC_F_2M 0x00200000
  772. #define CKF_EC_ECPARAMETERS 0x00400000
  773. #define CKF_EC_NAMEDCURVE 0x00800000
  774. #define CKF_EC_UNCOMPRESS 0x01000000
  775. #define CKF_EC_COMPRESS 0x02000000
  776. #define CKF_EXTENSION 0x80000000 /* FALSE for this version */
  777. typedef CK_MECHANISM_INFO CK_PTR CK_MECHANISM_INFO_PTR;
  778. /* CK_RV is a value that identifies the return value of a
  779. * Cryptoki function */
  780. /* CK_RV was changed from CK_USHORT to CK_ULONG for v2.0 */
  781. typedef CK_ULONG CK_RV;
  782. #define CKR_OK 0x00000000
  783. #define CKR_CANCEL 0x00000001
  784. #define CKR_HOST_MEMORY 0x00000002
  785. #define CKR_SLOT_ID_INVALID 0x00000003
  786. /* CKR_FLAGS_INVALID was removed for v2.0 */
  787. /* CKR_GENERAL_ERROR and CKR_FUNCTION_FAILED are new for v2.0 */
  788. #define CKR_GENERAL_ERROR 0x00000005
  789. #define CKR_FUNCTION_FAILED 0x00000006
  790. /* CKR_ARGUMENTS_BAD, CKR_NO_EVENT, CKR_NEED_TO_CREATE_THREADS,
  791. * and CKR_CANT_LOCK are new for v2.01 */
  792. #define CKR_ARGUMENTS_BAD 0x00000007
  793. #define CKR_NO_EVENT 0x00000008
  794. #define CKR_NEED_TO_CREATE_THREADS 0x00000009
  795. #define CKR_CANT_LOCK 0x0000000A
  796. #define CKR_ATTRIBUTE_READ_ONLY 0x00000010
  797. #define CKR_ATTRIBUTE_SENSITIVE 0x00000011
  798. #define CKR_ATTRIBUTE_TYPE_INVALID 0x00000012
  799. #define CKR_ATTRIBUTE_VALUE_INVALID 0x00000013
  800. #define CKR_DATA_INVALID 0x00000020
  801. #define CKR_DATA_LEN_RANGE 0x00000021
  802. #define CKR_DEVICE_ERROR 0x00000030
  803. #define CKR_DEVICE_MEMORY 0x00000031
  804. #define CKR_DEVICE_REMOVED 0x00000032
  805. #define CKR_ENCRYPTED_DATA_INVALID 0x00000040
  806. #define CKR_ENCRYPTED_DATA_LEN_RANGE 0x00000041
  807. #define CKR_FUNCTION_CANCELED 0x00000050
  808. #define CKR_FUNCTION_NOT_PARALLEL 0x00000051
  809. /* CKR_FUNCTION_NOT_SUPPORTED is new for v2.0 */
  810. #define CKR_FUNCTION_NOT_SUPPORTED 0x00000054
  811. #define CKR_KEY_HANDLE_INVALID 0x00000060
  812. /* CKR_KEY_SENSITIVE was removed for v2.0 */
  813. #define CKR_KEY_SIZE_RANGE 0x00000062
  814. #define CKR_KEY_TYPE_INCONSISTENT 0x00000063
  815. /* CKR_KEY_NOT_NEEDED, CKR_KEY_CHANGED, CKR_KEY_NEEDED,
  816. * CKR_KEY_INDIGESTIBLE, CKR_KEY_FUNCTION_NOT_PERMITTED,
  817. * CKR_KEY_NOT_WRAPPABLE, and CKR_KEY_UNEXTRACTABLE are new for
  818. * v2.0 */
  819. #define CKR_KEY_NOT_NEEDED 0x00000064
  820. #define CKR_KEY_CHANGED 0x00000065
  821. #define CKR_KEY_NEEDED 0x00000066
  822. #define CKR_KEY_INDIGESTIBLE 0x00000067
  823. #define CKR_KEY_FUNCTION_NOT_PERMITTED 0x00000068
  824. #define CKR_KEY_NOT_WRAPPABLE 0x00000069
  825. #define CKR_KEY_UNEXTRACTABLE 0x0000006A
  826. #define CKR_MECHANISM_INVALID 0x00000070
  827. #define CKR_MECHANISM_PARAM_INVALID 0x00000071
  828. /* CKR_OBJECT_CLASS_INCONSISTENT and CKR_OBJECT_CLASS_INVALID
  829. * were removed for v2.0 */
  830. #define CKR_OBJECT_HANDLE_INVALID 0x00000082
  831. #define CKR_OPERATION_ACTIVE 0x00000090
  832. #define CKR_OPERATION_NOT_INITIALIZED 0x00000091
  833. #define CKR_PIN_INCORRECT 0x000000A0
  834. #define CKR_PIN_INVALID 0x000000A1
  835. #define CKR_PIN_LEN_RANGE 0x000000A2
  836. /* CKR_PIN_EXPIRED and CKR_PIN_LOCKED are new for v2.0 */
  837. #define CKR_PIN_EXPIRED 0x000000A3
  838. #define CKR_PIN_LOCKED 0x000000A4
  839. #define CKR_SESSION_CLOSED 0x000000B0
  840. #define CKR_SESSION_COUNT 0x000000B1
  841. #define CKR_SESSION_HANDLE_INVALID 0x000000B3
  842. #define CKR_SESSION_PARALLEL_NOT_SUPPORTED 0x000000B4
  843. #define CKR_SESSION_READ_ONLY 0x000000B5
  844. #define CKR_SESSION_EXISTS 0x000000B6
  845. /* CKR_SESSION_READ_ONLY_EXISTS and
  846. * CKR_SESSION_READ_WRITE_SO_EXISTS are new for v2.0 */
  847. #define CKR_SESSION_READ_ONLY_EXISTS 0x000000B7
  848. #define CKR_SESSION_READ_WRITE_SO_EXISTS 0x000000B8
  849. #define CKR_SIGNATURE_INVALID 0x000000C0
  850. #define CKR_SIGNATURE_LEN_RANGE 0x000000C1
  851. #define CKR_TEMPLATE_INCOMPLETE 0x000000D0
  852. #define CKR_TEMPLATE_INCONSISTENT 0x000000D1
  853. #define CKR_TOKEN_NOT_PRESENT 0x000000E0
  854. #define CKR_TOKEN_NOT_RECOGNIZED 0x000000E1
  855. #define CKR_TOKEN_WRITE_PROTECTED 0x000000E2
  856. #define CKR_UNWRAPPING_KEY_HANDLE_INVALID 0x000000F0
  857. #define CKR_UNWRAPPING_KEY_SIZE_RANGE 0x000000F1
  858. #define CKR_UNWRAPPING_KEY_TYPE_INCONSISTENT 0x000000F2
  859. #define CKR_USER_ALREADY_LOGGED_IN 0x00000100
  860. #define CKR_USER_NOT_LOGGED_IN 0x00000101
  861. #define CKR_USER_PIN_NOT_INITIALIZED 0x00000102
  862. #define CKR_USER_TYPE_INVALID 0x00000103
  863. /* CKR_USER_ANOTHER_ALREADY_LOGGED_IN and CKR_USER_TOO_MANY_TYPES
  864. * are new to v2.01 */
  865. #define CKR_USER_ANOTHER_ALREADY_LOGGED_IN 0x00000104
  866. #define CKR_USER_TOO_MANY_TYPES 0x00000105
  867. #define CKR_WRAPPED_KEY_INVALID 0x00000110
  868. #define CKR_WRAPPED_KEY_LEN_RANGE 0x00000112
  869. #define CKR_WRAPPING_KEY_HANDLE_INVALID 0x00000113
  870. #define CKR_WRAPPING_KEY_SIZE_RANGE 0x00000114
  871. #define CKR_WRAPPING_KEY_TYPE_INCONSISTENT 0x00000115
  872. #define CKR_RANDOM_SEED_NOT_SUPPORTED 0x00000120
  873. /* These are new to v2.0 */
  874. #define CKR_RANDOM_NO_RNG 0x00000121
  875. /* These are new to v2.11 */
  876. #define CKR_DOMAIN_PARAMS_INVALID 0x00000130
  877. /* These are new to v2.0 */
  878. #define CKR_BUFFER_TOO_SMALL 0x00000150
  879. #define CKR_SAVED_STATE_INVALID 0x00000160
  880. #define CKR_INFORMATION_SENSITIVE 0x00000170
  881. #define CKR_STATE_UNSAVEABLE 0x00000180
  882. /* These are new to v2.01 */
  883. #define CKR_CRYPTOKI_NOT_INITIALIZED 0x00000190
  884. #define CKR_CRYPTOKI_ALREADY_INITIALIZED 0x00000191
  885. #define CKR_MUTEX_BAD 0x000001A0
  886. #define CKR_MUTEX_NOT_LOCKED 0x000001A1
  887. /* This is new to v2.20 */
  888. #define CKR_FUNCTION_REJECTED 0x00000200
  889. #define CKR_VENDOR_DEFINED 0x80000000
  890. /* CK_NOTIFY is an application callback that processes events */
  891. typedef CK_CALLBACK_FUNCTION(CK_RV, CK_NOTIFY)(
  892. CK_SESSION_HANDLE hSession, /* the session's handle */
  893. CK_NOTIFICATION event,
  894. CK_VOID_PTR pApplication /* passed to C_OpenSession */
  895. );
  896. /* CK_FUNCTION_LIST is a structure holding a Cryptoki spec
  897. * version and pointers of appropriate types to all the
  898. * Cryptoki functions */
  899. /* CK_FUNCTION_LIST is new for v2.0 */
  900. typedef struct CK_FUNCTION_LIST CK_FUNCTION_LIST;
  901. typedef CK_FUNCTION_LIST CK_PTR CK_FUNCTION_LIST_PTR;
  902. typedef CK_FUNCTION_LIST_PTR CK_PTR CK_FUNCTION_LIST_PTR_PTR;
  903. /* CK_CREATEMUTEX is an application callback for creating a
  904. * mutex object */
  905. typedef CK_CALLBACK_FUNCTION(CK_RV, CK_CREATEMUTEX)(
  906. CK_VOID_PTR_PTR ppMutex /* location to receive ptr to mutex */
  907. );
  908. /* CK_DESTROYMUTEX is an application callback for destroying a
  909. * mutex object */
  910. typedef CK_CALLBACK_FUNCTION(CK_RV, CK_DESTROYMUTEX)(
  911. CK_VOID_PTR pMutex /* pointer to mutex */
  912. );
  913. /* CK_LOCKMUTEX is an application callback for locking a mutex */
  914. typedef CK_CALLBACK_FUNCTION(CK_RV, CK_LOCKMUTEX)(
  915. CK_VOID_PTR pMutex /* pointer to mutex */
  916. );
  917. /* CK_UNLOCKMUTEX is an application callback for unlocking a
  918. * mutex */
  919. typedef CK_CALLBACK_FUNCTION(CK_RV, CK_UNLOCKMUTEX)(
  920. CK_VOID_PTR pMutex /* pointer to mutex */
  921. );
  922. /* CK_C_INITIALIZE_ARGS provides the optional arguments to
  923. * C_Initialize */
  924. typedef struct CK_C_INITIALIZE_ARGS {
  925. CK_CREATEMUTEX CreateMutex;
  926. CK_DESTROYMUTEX DestroyMutex;
  927. CK_LOCKMUTEX LockMutex;
  928. CK_UNLOCKMUTEX UnlockMutex;
  929. CK_FLAGS flags;
  930. CK_VOID_PTR pReserved;
  931. } CK_C_INITIALIZE_ARGS;
  932. /* flags: bit flags that provide capabilities of the slot
  933. * Bit Flag Mask Meaning
  934. */
  935. #define CKF_LIBRARY_CANT_CREATE_OS_THREADS 0x00000001
  936. #define CKF_OS_LOCKING_OK 0x00000002
  937. typedef CK_C_INITIALIZE_ARGS CK_PTR CK_C_INITIALIZE_ARGS_PTR;
  938. /* additional flags for parameters to functions */
  939. /* CKF_DONT_BLOCK is for the function C_WaitForSlotEvent */
  940. #define CKF_DONT_BLOCK 1
  941. /* CK_RSA_PKCS_OAEP_MGF_TYPE is new for v2.10.
  942. * CK_RSA_PKCS_OAEP_MGF_TYPE is used to indicate the Message
  943. * Generation Function (MGF) applied to a message block when
  944. * formatting a message block for the PKCS #1 OAEP encryption
  945. * scheme. */
  946. typedef CK_ULONG CK_RSA_PKCS_MGF_TYPE;
  947. typedef CK_RSA_PKCS_MGF_TYPE CK_PTR CK_RSA_PKCS_MGF_TYPE_PTR;
  948. /* The following MGFs are defined */
  949. /* CKG_MGF1_SHA256, CKG_MGF1_SHA384, and CKG_MGF1_SHA512
  950. * are new for v2.20 */
  951. #define CKG_MGF1_SHA1 0x00000001
  952. #define CKG_MGF1_SHA256 0x00000002
  953. #define CKG_MGF1_SHA384 0x00000003
  954. #define CKG_MGF1_SHA512 0x00000004
  955. /* CK_RSA_PKCS_OAEP_SOURCE_TYPE is new for v2.10.
  956. * CK_RSA_PKCS_OAEP_SOURCE_TYPE is used to indicate the source
  957. * of the encoding parameter when formatting a message block
  958. * for the PKCS #1 OAEP encryption scheme. */
  959. typedef CK_ULONG CK_RSA_PKCS_OAEP_SOURCE_TYPE;
  960. typedef CK_RSA_PKCS_OAEP_SOURCE_TYPE CK_PTR CK_RSA_PKCS_OAEP_SOURCE_TYPE_PTR;
  961. /* The following encoding parameter sources are defined */
  962. #define CKZ_DATA_SPECIFIED 0x00000001
  963. /* CK_RSA_PKCS_OAEP_PARAMS is new for v2.10.
  964. * CK_RSA_PKCS_OAEP_PARAMS provides the parameters to the
  965. * CKM_RSA_PKCS_OAEP mechanism. */
  966. typedef struct CK_RSA_PKCS_OAEP_PARAMS {
  967. CK_MECHANISM_TYPE hashAlg;
  968. CK_RSA_PKCS_MGF_TYPE mgf;
  969. CK_RSA_PKCS_OAEP_SOURCE_TYPE source;
  970. CK_VOID_PTR pSourceData;
  971. CK_ULONG ulSourceDataLen;
  972. } CK_RSA_PKCS_OAEP_PARAMS;
  973. typedef CK_RSA_PKCS_OAEP_PARAMS CK_PTR CK_RSA_PKCS_OAEP_PARAMS_PTR;
  974. /* CK_RSA_PKCS_PSS_PARAMS is new for v2.11.
  975. * CK_RSA_PKCS_PSS_PARAMS provides the parameters to the
  976. * CKM_RSA_PKCS_PSS mechanism(s). */
  977. typedef struct CK_RSA_PKCS_PSS_PARAMS {
  978. CK_MECHANISM_TYPE hashAlg;
  979. CK_RSA_PKCS_MGF_TYPE mgf;
  980. CK_ULONG sLen;
  981. } CK_RSA_PKCS_PSS_PARAMS;
  982. typedef CK_RSA_PKCS_PSS_PARAMS CK_PTR CK_RSA_PKCS_PSS_PARAMS_PTR;
  983. /* CK_EC_KDF_TYPE is new for v2.11. */
  984. typedef CK_ULONG CK_EC_KDF_TYPE;
  985. /* The following EC Key Derivation Functions are defined */
  986. #define CKD_NULL 0x00000001
  987. #define CKD_SHA1_KDF 0x00000002
  988. /* CK_ECDH1_DERIVE_PARAMS is new for v2.11.
  989. * CK_ECDH1_DERIVE_PARAMS provides the parameters to the
  990. * CKM_ECDH1_DERIVE and CKM_ECDH1_COFACTOR_DERIVE mechanisms,
  991. * where each party contributes one key pair.
  992. */
  993. typedef struct CK_ECDH1_DERIVE_PARAMS {
  994. CK_EC_KDF_TYPE kdf;
  995. CK_ULONG ulSharedDataLen;
  996. CK_BYTE_PTR pSharedData;
  997. CK_ULONG ulPublicDataLen;
  998. CK_BYTE_PTR pPublicData;
  999. } CK_ECDH1_DERIVE_PARAMS;
  1000. typedef CK_ECDH1_DERIVE_PARAMS CK_PTR CK_ECDH1_DERIVE_PARAMS_PTR;
  1001. /* CK_ECDH2_DERIVE_PARAMS is new for v2.11.
  1002. * CK_ECDH2_DERIVE_PARAMS provides the parameters to the
  1003. * CKM_ECMQV_DERIVE mechanism, where each party contributes two key pairs. */
  1004. typedef struct CK_ECDH2_DERIVE_PARAMS {
  1005. CK_EC_KDF_TYPE kdf;
  1006. CK_ULONG ulSharedDataLen;
  1007. CK_BYTE_PTR pSharedData;
  1008. CK_ULONG ulPublicDataLen;
  1009. CK_BYTE_PTR pPublicData;
  1010. CK_ULONG ulPrivateDataLen;
  1011. CK_OBJECT_HANDLE hPrivateData;
  1012. CK_ULONG ulPublicDataLen2;
  1013. CK_BYTE_PTR pPublicData2;
  1014. } CK_ECDH2_DERIVE_PARAMS;
  1015. typedef CK_ECDH2_DERIVE_PARAMS CK_PTR CK_ECDH2_DERIVE_PARAMS_PTR;
  1016. typedef struct CK_ECMQV_DERIVE_PARAMS {
  1017. CK_EC_KDF_TYPE kdf;
  1018. CK_ULONG ulSharedDataLen;
  1019. CK_BYTE_PTR pSharedData;
  1020. CK_ULONG ulPublicDataLen;
  1021. CK_BYTE_PTR pPublicData;
  1022. CK_ULONG ulPrivateDataLen;
  1023. CK_OBJECT_HANDLE hPrivateData;
  1024. CK_ULONG ulPublicDataLen2;
  1025. CK_BYTE_PTR pPublicData2;
  1026. CK_OBJECT_HANDLE publicKey;
  1027. } CK_ECMQV_DERIVE_PARAMS;
  1028. typedef CK_ECMQV_DERIVE_PARAMS CK_PTR CK_ECMQV_DERIVE_PARAMS_PTR;
  1029. /* Typedefs and defines for the CKM_X9_42_DH_KEY_PAIR_GEN and the
  1030. * CKM_X9_42_DH_PARAMETER_GEN mechanisms (new for PKCS #11 v2.11) */
  1031. typedef CK_ULONG CK_X9_42_DH_KDF_TYPE;
  1032. typedef CK_X9_42_DH_KDF_TYPE CK_PTR CK_X9_42_DH_KDF_TYPE_PTR;
  1033. /* The following X9.42 DH key derivation functions are defined
  1034. (besides CKD_NULL already defined : */
  1035. #define CKD_SHA1_KDF_ASN1 0x00000003
  1036. #define CKD_SHA1_KDF_CONCATENATE 0x00000004
  1037. /* CK_X9_42_DH1_DERIVE_PARAMS is new for v2.11.
  1038. * CK_X9_42_DH1_DERIVE_PARAMS provides the parameters to the
  1039. * CKM_X9_42_DH_DERIVE key derivation mechanism, where each party
  1040. * contributes one key pair */
  1041. typedef struct CK_X9_42_DH1_DERIVE_PARAMS {
  1042. CK_X9_42_DH_KDF_TYPE kdf;
  1043. CK_ULONG ulOtherInfoLen;
  1044. CK_BYTE_PTR pOtherInfo;
  1045. CK_ULONG ulPublicDataLen;
  1046. CK_BYTE_PTR pPublicData;
  1047. } CK_X9_42_DH1_DERIVE_PARAMS;
  1048. typedef struct CK_X9_42_DH1_DERIVE_PARAMS CK_PTR CK_X9_42_DH1_DERIVE_PARAMS_PTR;
  1049. /* CK_X9_42_DH2_DERIVE_PARAMS is new for v2.11.
  1050. * CK_X9_42_DH2_DERIVE_PARAMS provides the parameters to the
  1051. * CKM_X9_42_DH_HYBRID_DERIVE and CKM_X9_42_MQV_DERIVE key derivation
  1052. * mechanisms, where each party contributes two key pairs */
  1053. typedef struct CK_X9_42_DH2_DERIVE_PARAMS {
  1054. CK_X9_42_DH_KDF_TYPE kdf;
  1055. CK_ULONG ulOtherInfoLen;
  1056. CK_BYTE_PTR pOtherInfo;
  1057. CK_ULONG ulPublicDataLen;
  1058. CK_BYTE_PTR pPublicData;
  1059. CK_ULONG ulPrivateDataLen;
  1060. CK_OBJECT_HANDLE hPrivateData;
  1061. CK_ULONG ulPublicDataLen2;
  1062. CK_BYTE_PTR pPublicData2;
  1063. } CK_X9_42_DH2_DERIVE_PARAMS;
  1064. typedef CK_X9_42_DH2_DERIVE_PARAMS CK_PTR CK_X9_42_DH2_DERIVE_PARAMS_PTR;
  1065. typedef struct CK_X9_42_MQV_DERIVE_PARAMS {
  1066. CK_X9_42_DH_KDF_TYPE kdf;
  1067. CK_ULONG ulOtherInfoLen;
  1068. CK_BYTE_PTR pOtherInfo;
  1069. CK_ULONG ulPublicDataLen;
  1070. CK_BYTE_PTR pPublicData;
  1071. CK_ULONG ulPrivateDataLen;
  1072. CK_OBJECT_HANDLE hPrivateData;
  1073. CK_ULONG ulPublicDataLen2;
  1074. CK_BYTE_PTR pPublicData2;
  1075. CK_OBJECT_HANDLE publicKey;
  1076. } CK_X9_42_MQV_DERIVE_PARAMS;
  1077. typedef CK_X9_42_MQV_DERIVE_PARAMS CK_PTR CK_X9_42_MQV_DERIVE_PARAMS_PTR;
  1078. /* CK_KEA_DERIVE_PARAMS provides the parameters to the
  1079. * CKM_KEA_DERIVE mechanism */
  1080. /* CK_KEA_DERIVE_PARAMS is new for v2.0 */
  1081. typedef struct CK_KEA_DERIVE_PARAMS {
  1082. CK_BBOOL isSender;
  1083. CK_ULONG ulRandomLen;
  1084. CK_BYTE_PTR pRandomA;
  1085. CK_BYTE_PTR pRandomB;
  1086. CK_ULONG ulPublicDataLen;
  1087. CK_BYTE_PTR pPublicData;
  1088. } CK_KEA_DERIVE_PARAMS;
  1089. typedef CK_KEA_DERIVE_PARAMS CK_PTR CK_KEA_DERIVE_PARAMS_PTR;
  1090. /* CK_RC2_PARAMS provides the parameters to the CKM_RC2_ECB and
  1091. * CKM_RC2_MAC mechanisms. An instance of CK_RC2_PARAMS just
  1092. * holds the effective keysize */
  1093. typedef CK_ULONG CK_RC2_PARAMS;
  1094. typedef CK_RC2_PARAMS CK_PTR CK_RC2_PARAMS_PTR;
  1095. /* CK_RC2_CBC_PARAMS provides the parameters to the CKM_RC2_CBC
  1096. * mechanism */
  1097. typedef struct CK_RC2_CBC_PARAMS {
  1098. /* ulEffectiveBits was changed from CK_USHORT to CK_ULONG for
  1099. * v2.0 */
  1100. CK_ULONG ulEffectiveBits; /* effective bits (1-1024) */
  1101. CK_BYTE iv[8]; /* IV for CBC mode */
  1102. } CK_RC2_CBC_PARAMS;
  1103. typedef CK_RC2_CBC_PARAMS CK_PTR CK_RC2_CBC_PARAMS_PTR;
  1104. /* CK_RC2_MAC_GENERAL_PARAMS provides the parameters for the
  1105. * CKM_RC2_MAC_GENERAL mechanism */
  1106. /* CK_RC2_MAC_GENERAL_PARAMS is new for v2.0 */
  1107. typedef struct CK_RC2_MAC_GENERAL_PARAMS {
  1108. CK_ULONG ulEffectiveBits; /* effective bits (1-1024) */
  1109. CK_ULONG ulMacLength; /* Length of MAC in bytes */
  1110. } CK_RC2_MAC_GENERAL_PARAMS;
  1111. typedef CK_RC2_MAC_GENERAL_PARAMS CK_PTR \
  1112. CK_RC2_MAC_GENERAL_PARAMS_PTR;
  1113. /* CK_RC5_PARAMS provides the parameters to the CKM_RC5_ECB and
  1114. * CKM_RC5_MAC mechanisms */
  1115. /* CK_RC5_PARAMS is new for v2.0 */
  1116. typedef struct CK_RC5_PARAMS {
  1117. CK_ULONG ulWordsize; /* wordsize in bits */
  1118. CK_ULONG ulRounds; /* number of rounds */
  1119. } CK_RC5_PARAMS;
  1120. typedef CK_RC5_PARAMS CK_PTR CK_RC5_PARAMS_PTR;
  1121. /* CK_RC5_CBC_PARAMS provides the parameters to the CKM_RC5_CBC
  1122. * mechanism */
  1123. /* CK_RC5_CBC_PARAMS is new for v2.0 */
  1124. typedef struct CK_RC5_CBC_PARAMS {
  1125. CK_ULONG ulWordsize; /* wordsize in bits */
  1126. CK_ULONG ulRounds; /* number of rounds */
  1127. CK_BYTE_PTR pIv; /* pointer to IV */
  1128. CK_ULONG ulIvLen; /* length of IV in bytes */
  1129. } CK_RC5_CBC_PARAMS;
  1130. typedef CK_RC5_CBC_PARAMS CK_PTR CK_RC5_CBC_PARAMS_PTR;
  1131. /* CK_RC5_MAC_GENERAL_PARAMS provides the parameters for the
  1132. * CKM_RC5_MAC_GENERAL mechanism */
  1133. /* CK_RC5_MAC_GENERAL_PARAMS is new for v2.0 */
  1134. typedef struct CK_RC5_MAC_GENERAL_PARAMS {
  1135. CK_ULONG ulWordsize; /* wordsize in bits */
  1136. CK_ULONG ulRounds; /* number of rounds */
  1137. CK_ULONG ulMacLength; /* Length of MAC in bytes */
  1138. } CK_RC5_MAC_GENERAL_PARAMS;
  1139. typedef CK_RC5_MAC_GENERAL_PARAMS CK_PTR \
  1140. CK_RC5_MAC_GENERAL_PARAMS_PTR;
  1141. /* CK_MAC_GENERAL_PARAMS provides the parameters to most block
  1142. * ciphers' MAC_GENERAL mechanisms. Its value is the length of
  1143. * the MAC */
  1144. /* CK_MAC_GENERAL_PARAMS is new for v2.0 */
  1145. typedef CK_ULONG CK_MAC_GENERAL_PARAMS;
  1146. typedef CK_MAC_GENERAL_PARAMS CK_PTR CK_MAC_GENERAL_PARAMS_PTR;
  1147. /* CK_DES/AES_ECB/CBC_ENCRYPT_DATA_PARAMS are new for v2.20 */
  1148. typedef struct CK_DES_CBC_ENCRYPT_DATA_PARAMS {
  1149. CK_BYTE iv[8];
  1150. CK_BYTE_PTR pData;
  1151. CK_ULONG length;
  1152. } CK_DES_CBC_ENCRYPT_DATA_PARAMS;
  1153. typedef CK_DES_CBC_ENCRYPT_DATA_PARAMS CK_PTR CK_DES_CBC_ENCRYPT_DATA_PARAMS_PTR;
  1154. typedef struct CK_AES_CBC_ENCRYPT_DATA_PARAMS {
  1155. CK_BYTE iv[16];
  1156. CK_BYTE_PTR pData;
  1157. CK_ULONG length;
  1158. } CK_AES_CBC_ENCRYPT_DATA_PARAMS;
  1159. typedef CK_AES_CBC_ENCRYPT_DATA_PARAMS CK_PTR CK_AES_CBC_ENCRYPT_DATA_PARAMS_PTR;
  1160. /* CK_SKIPJACK_PRIVATE_WRAP_PARAMS provides the parameters to the
  1161. * CKM_SKIPJACK_PRIVATE_WRAP mechanism */
  1162. /* CK_SKIPJACK_PRIVATE_WRAP_PARAMS is new for v2.0 */
  1163. typedef struct CK_SKIPJACK_PRIVATE_WRAP_PARAMS {
  1164. CK_ULONG ulPasswordLen;
  1165. CK_BYTE_PTR pPassword;
  1166. CK_ULONG ulPublicDataLen;
  1167. CK_BYTE_PTR pPublicData;
  1168. CK_ULONG ulPAndGLen;
  1169. CK_ULONG ulQLen;
  1170. CK_ULONG ulRandomLen;
  1171. CK_BYTE_PTR pRandomA;
  1172. CK_BYTE_PTR pPrimeP;
  1173. CK_BYTE_PTR pBaseG;
  1174. CK_BYTE_PTR pSubprimeQ;
  1175. } CK_SKIPJACK_PRIVATE_WRAP_PARAMS;
  1176. typedef CK_SKIPJACK_PRIVATE_WRAP_PARAMS CK_PTR \
  1177. CK_SKIPJACK_PRIVATE_WRAP_PTR;
  1178. /* CK_SKIPJACK_RELAYX_PARAMS provides the parameters to the
  1179. * CKM_SKIPJACK_RELAYX mechanism */
  1180. /* CK_SKIPJACK_RELAYX_PARAMS is new for v2.0 */
  1181. typedef struct CK_SKIPJACK_RELAYX_PARAMS {
  1182. CK_ULONG ulOldWrappedXLen;
  1183. CK_BYTE_PTR pOldWrappedX;
  1184. CK_ULONG ulOldPasswordLen;
  1185. CK_BYTE_PTR pOldPassword;
  1186. CK_ULONG ulOldPublicDataLen;
  1187. CK_BYTE_PTR pOldPublicData;
  1188. CK_ULONG ulOldRandomLen;
  1189. CK_BYTE_PTR pOldRandomA;
  1190. CK_ULONG ulNewPasswordLen;
  1191. CK_BYTE_PTR pNewPassword;
  1192. CK_ULONG ulNewPublicDataLen;
  1193. CK_BYTE_PTR pNewPublicData;
  1194. CK_ULONG ulNewRandomLen;
  1195. CK_BYTE_PTR pNewRandomA;
  1196. } CK_SKIPJACK_RELAYX_PARAMS;
  1197. typedef CK_SKIPJACK_RELAYX_PARAMS CK_PTR \
  1198. CK_SKIPJACK_RELAYX_PARAMS_PTR;
  1199. typedef struct CK_PBE_PARAMS {
  1200. CK_BYTE_PTR pInitVector;
  1201. CK_UTF8CHAR_PTR pPassword;
  1202. CK_ULONG ulPasswordLen;
  1203. CK_BYTE_PTR pSalt;
  1204. CK_ULONG ulSaltLen;
  1205. CK_ULONG ulIteration;
  1206. } CK_PBE_PARAMS;
  1207. typedef CK_PBE_PARAMS CK_PTR CK_PBE_PARAMS_PTR;
  1208. /* CK_KEY_WRAP_SET_OAEP_PARAMS provides the parameters to the
  1209. * CKM_KEY_WRAP_SET_OAEP mechanism */
  1210. /* CK_KEY_WRAP_SET_OAEP_PARAMS is new for v2.0 */
  1211. typedef struct CK_KEY_WRAP_SET_OAEP_PARAMS {
  1212. CK_BYTE bBC; /* block contents byte */
  1213. CK_BYTE_PTR pX; /* extra data */
  1214. CK_ULONG ulXLen; /* length of extra data in bytes */
  1215. } CK_KEY_WRAP_SET_OAEP_PARAMS;
  1216. typedef CK_KEY_WRAP_SET_OAEP_PARAMS CK_PTR \
  1217. CK_KEY_WRAP_SET_OAEP_PARAMS_PTR;
  1218. typedef struct CK_SSL3_RANDOM_DATA {
  1219. CK_BYTE_PTR pClientRandom;
  1220. CK_ULONG ulClientRandomLen;
  1221. CK_BYTE_PTR pServerRandom;
  1222. CK_ULONG ulServerRandomLen;
  1223. } CK_SSL3_RANDOM_DATA;
  1224. typedef struct CK_SSL3_MASTER_KEY_DERIVE_PARAMS {
  1225. CK_SSL3_RANDOM_DATA RandomInfo;
  1226. CK_VERSION_PTR pVersion;
  1227. } CK_SSL3_MASTER_KEY_DERIVE_PARAMS;
  1228. typedef struct CK_SSL3_MASTER_KEY_DERIVE_PARAMS CK_PTR \
  1229. CK_SSL3_MASTER_KEY_DERIVE_PARAMS_PTR;
  1230. typedef struct CK_SSL3_KEY_MAT_OUT {
  1231. CK_OBJECT_HANDLE hClientMacSecret;
  1232. CK_OBJECT_HANDLE hServerMacSecret;
  1233. CK_OBJECT_HANDLE hClientKey;
  1234. CK_OBJECT_HANDLE hServerKey;
  1235. CK_BYTE_PTR pIVClient;
  1236. CK_BYTE_PTR pIVServer;
  1237. } CK_SSL3_KEY_MAT_OUT;
  1238. typedef CK_SSL3_KEY_MAT_OUT CK_PTR CK_SSL3_KEY_MAT_OUT_PTR;
  1239. typedef struct CK_SSL3_KEY_MAT_PARAMS {
  1240. CK_ULONG ulMacSizeInBits;
  1241. CK_ULONG ulKeySizeInBits;
  1242. CK_ULONG ulIVSizeInBits;
  1243. CK_BBOOL bIsExport;
  1244. CK_SSL3_RANDOM_DATA RandomInfo;
  1245. CK_SSL3_KEY_MAT_OUT_PTR pReturnedKeyMaterial;
  1246. } CK_SSL3_KEY_MAT_PARAMS;
  1247. typedef CK_SSL3_KEY_MAT_PARAMS CK_PTR CK_SSL3_KEY_MAT_PARAMS_PTR;
  1248. /* CK_TLS_PRF_PARAMS is new for version 2.20 */
  1249. typedef struct CK_TLS_PRF_PARAMS {
  1250. CK_BYTE_PTR pSeed;
  1251. CK_ULONG ulSeedLen;
  1252. CK_BYTE_PTR pLabel;
  1253. CK_ULONG ulLabelLen;
  1254. CK_BYTE_PTR pOutput;
  1255. CK_ULONG_PTR pulOutputLen;
  1256. } CK_TLS_PRF_PARAMS;
  1257. typedef CK_TLS_PRF_PARAMS CK_PTR CK_TLS_PRF_PARAMS_PTR;
  1258. /* WTLS is new for version 2.20 */
  1259. typedef struct CK_WTLS_RANDOM_DATA {
  1260. CK_BYTE_PTR pClientRandom;
  1261. CK_ULONG ulClientRandomLen;
  1262. CK_BYTE_PTR pServerRandom;
  1263. CK_ULONG ulServerRandomLen;
  1264. } CK_WTLS_RANDOM_DATA;
  1265. typedef CK_WTLS_RANDOM_DATA CK_PTR CK_WTLS_RANDOM_DATA_PTR;
  1266. typedef struct CK_WTLS_MASTER_KEY_DERIVE_PARAMS {
  1267. CK_MECHANISM_TYPE DigestMechanism;
  1268. CK_WTLS_RANDOM_DATA RandomInfo;
  1269. CK_BYTE_PTR pVersion;
  1270. } CK_WTLS_MASTER_KEY_DERIVE_PARAMS;
  1271. typedef CK_WTLS_MASTER_KEY_DERIVE_PARAMS CK_PTR \
  1272. CK_WTLS_MASTER_KEY_DERIVE_PARAMS_PTR;
  1273. typedef struct CK_WTLS_PRF_PARAMS {
  1274. CK_MECHANISM_TYPE DigestMechanism;
  1275. CK_BYTE_PTR pSeed;
  1276. CK_ULONG ulSeedLen;
  1277. CK_BYTE_PTR pLabel;
  1278. CK_ULONG ulLabelLen;
  1279. CK_BYTE_PTR pOutput;
  1280. CK_ULONG_PTR pulOutputLen;
  1281. } CK_WTLS_PRF_PARAMS;
  1282. typedef CK_WTLS_PRF_PARAMS CK_PTR CK_WTLS_PRF_PARAMS_PTR;
  1283. typedef struct CK_WTLS_KEY_MAT_OUT {
  1284. CK_OBJECT_HANDLE hMacSecret;
  1285. CK_OBJECT_HANDLE hKey;
  1286. CK_BYTE_PTR pIV;
  1287. } CK_WTLS_KEY_MAT_OUT;
  1288. typedef CK_WTLS_KEY_MAT_OUT CK_PTR CK_WTLS_KEY_MAT_OUT_PTR;
  1289. typedef struct CK_WTLS_KEY_MAT_PARAMS {
  1290. CK_MECHANISM_TYPE DigestMechanism;
  1291. CK_ULONG ulMacSizeInBits;
  1292. CK_ULONG ulKeySizeInBits;
  1293. CK_ULONG ulIVSizeInBits;
  1294. CK_ULONG ulSequenceNumber;
  1295. CK_BBOOL bIsExport;
  1296. CK_WTLS_RANDOM_DATA RandomInfo;
  1297. CK_WTLS_KEY_MAT_OUT_PTR pReturnedKeyMaterial;
  1298. } CK_WTLS_KEY_MAT_PARAMS;
  1299. typedef CK_WTLS_KEY_MAT_PARAMS CK_PTR CK_WTLS_KEY_MAT_PARAMS_PTR;
  1300. /* CMS is new for version 2.20 */
  1301. typedef struct CK_CMS_SIG_PARAMS {
  1302. CK_OBJECT_HANDLE certificateHandle;
  1303. CK_MECHANISM_PTR pSigningMechanism;
  1304. CK_MECHANISM_PTR pDigestMechanism;
  1305. CK_UTF8CHAR_PTR pContentType;
  1306. CK_BYTE_PTR pRequestedAttributes;
  1307. CK_ULONG ulRequestedAttributesLen;
  1308. CK_BYTE_PTR pRequiredAttributes;
  1309. CK_ULONG ulRequiredAttributesLen;
  1310. } CK_CMS_SIG_PARAMS;
  1311. typedef CK_CMS_SIG_PARAMS CK_PTR CK_CMS_SIG_PARAMS_PTR;
  1312. typedef struct CK_KEY_DERIVATION_STRING_DATA {
  1313. CK_BYTE_PTR pData;
  1314. CK_ULONG ulLen;
  1315. } CK_KEY_DERIVATION_STRING_DATA;
  1316. typedef CK_KEY_DERIVATION_STRING_DATA CK_PTR \
  1317. CK_KEY_DERIVATION_STRING_DATA_PTR;
  1318. /* The CK_EXTRACT_PARAMS is used for the
  1319. * CKM_EXTRACT_KEY_FROM_KEY mechanism. It specifies which bit
  1320. * of the base key should be used as the first bit of the
  1321. * derived key */
  1322. /* CK_EXTRACT_PARAMS is new for v2.0 */
  1323. typedef CK_ULONG CK_EXTRACT_PARAMS;
  1324. typedef CK_EXTRACT_PARAMS CK_PTR CK_EXTRACT_PARAMS_PTR;
  1325. /* CK_PKCS5_PBKD2_PSEUDO_RANDOM_FUNCTION_TYPE is new for v2.10.
  1326. * CK_PKCS5_PBKD2_PSEUDO_RANDOM_FUNCTION_TYPE is used to
  1327. * indicate the Pseudo-Random Function (PRF) used to generate
  1328. * key bits using PKCS #5 PBKDF2. */
  1329. typedef CK_ULONG CK_PKCS5_PBKD2_PSEUDO_RANDOM_FUNCTION_TYPE;
  1330. typedef CK_PKCS5_PBKD2_PSEUDO_RANDOM_FUNCTION_TYPE CK_PTR CK_PKCS5_PBKD2_PSEUDO_RANDOM_FUNCTION_TYPE_PTR;
  1331. /* The following PRFs are defined in PKCS #5 v2.0. */
  1332. #define CKP_PKCS5_PBKD2_HMAC_SHA1 0x00000001
  1333. /* CK_PKCS5_PBKDF2_SALT_SOURCE_TYPE is new for v2.10.
  1334. * CK_PKCS5_PBKDF2_SALT_SOURCE_TYPE is used to indicate the
  1335. * source of the salt value when deriving a key using PKCS #5
  1336. * PBKDF2. */
  1337. typedef CK_ULONG CK_PKCS5_PBKDF2_SALT_SOURCE_TYPE;
  1338. typedef CK_PKCS5_PBKDF2_SALT_SOURCE_TYPE CK_PTR CK_PKCS5_PBKDF2_SALT_SOURCE_TYPE_PTR;
  1339. /* The following salt value sources are defined in PKCS #5 v2.0. */
  1340. #define CKZ_SALT_SPECIFIED 0x00000001
  1341. /* CK_PKCS5_PBKD2_PARAMS is new for v2.10.
  1342. * CK_PKCS5_PBKD2_PARAMS is a structure that provides the
  1343. * parameters to the CKM_PKCS5_PBKD2 mechanism. */
  1344. typedef struct CK_PKCS5_PBKD2_PARAMS {
  1345. CK_PKCS5_PBKDF2_SALT_SOURCE_TYPE saltSource;
  1346. CK_VOID_PTR pSaltSourceData;
  1347. CK_ULONG ulSaltSourceDataLen;
  1348. CK_ULONG iterations;
  1349. CK_PKCS5_PBKD2_PSEUDO_RANDOM_FUNCTION_TYPE prf;
  1350. CK_VOID_PTR pPrfData;
  1351. CK_ULONG ulPrfDataLen;
  1352. CK_UTF8CHAR_PTR pPassword;
  1353. CK_ULONG_PTR ulPasswordLen;
  1354. } CK_PKCS5_PBKD2_PARAMS;
  1355. typedef CK_PKCS5_PBKD2_PARAMS CK_PTR CK_PKCS5_PBKD2_PARAMS_PTR;
  1356. #endif