1 // SPDX-License-Identifier: BSD-2-Clause 2 /* 3 * Copyright (c) 2018-2020, Linaro Limited 4 */ 5 6 #include <pkcs11_ta.h> 7 #include <string.h> 8 #include <tee_internal_api.h> 9 #include <util.h> 10 11 #include "pkcs11_helpers.h" 12 13 static const char __maybe_unused unknown[] = "<unknown-identifier>"; 14 15 struct any_id { 16 uint32_t id; 17 #if CFG_TEE_TA_LOG_LEVEL > 0 18 const char *string; 19 #endif 20 }; 21 22 /* 23 * Macro PKCS11_ID() can be used to define cells in ID list arrays 24 * or ID/string conversion arrays. 25 */ 26 #if CFG_TEE_TA_LOG_LEVEL > 0 27 #define PKCS11_ID(_id) { .id = _id, .string = #_id } 28 #else 29 #define PKCS11_ID(_id) { .id = _id } 30 #endif 31 32 #define ID2STR(id, table, prefix) \ 33 id2str(id, table, ARRAY_SIZE(table), prefix) 34 35 #if CFG_TEE_TA_LOG_LEVEL > 0 36 /* Convert a PKCS11 ID into its label string */ 37 static const char *id2str(uint32_t id, const struct any_id *table, 38 size_t count, const char *prefix) 39 { 40 size_t n = 0; 41 const char *str = NULL; 42 43 for (n = 0; n < count; n++) { 44 if (id != table[n].id) 45 continue; 46 47 str = table[n].string; 48 49 /* Skip prefix provided matches found */ 50 if (prefix && !TEE_MemCompare(str, prefix, strlen(prefix))) 51 str += strlen(prefix); 52 53 return str; 54 } 55 56 return unknown; 57 } 58 #endif /* CFG_TEE_TA_LOG_LEVEL > 0 */ 59 60 /* 61 * TA command IDs: used only as ID/string conversion for debug trace support 62 */ 63 static const struct any_id __maybe_unused string_ta_cmd[] = { 64 PKCS11_ID(PKCS11_CMD_PING), 65 PKCS11_ID(PKCS11_CMD_SLOT_LIST), 66 PKCS11_ID(PKCS11_CMD_SLOT_INFO), 67 PKCS11_ID(PKCS11_CMD_TOKEN_INFO), 68 }; 69 70 static const struct any_id __maybe_unused string_slot_flags[] = { 71 PKCS11_ID(PKCS11_CKFS_TOKEN_PRESENT), 72 PKCS11_ID(PKCS11_CKFS_REMOVABLE_DEVICE), 73 PKCS11_ID(PKCS11_CKFS_HW_SLOT), 74 }; 75 76 static const struct any_id __maybe_unused string_token_flags[] = { 77 PKCS11_ID(PKCS11_CKFT_RNG), 78 PKCS11_ID(PKCS11_CKFT_WRITE_PROTECTED), 79 PKCS11_ID(PKCS11_CKFT_LOGIN_REQUIRED), 80 PKCS11_ID(PKCS11_CKFT_USER_PIN_INITIALIZED), 81 PKCS11_ID(PKCS11_CKFT_RESTORE_KEY_NOT_NEEDED), 82 PKCS11_ID(PKCS11_CKFT_CLOCK_ON_TOKEN), 83 PKCS11_ID(PKCS11_CKFT_PROTECTED_AUTHENTICATION_PATH), 84 PKCS11_ID(PKCS11_CKFT_DUAL_CRYPTO_OPERATIONS), 85 PKCS11_ID(PKCS11_CKFT_TOKEN_INITIALIZED), 86 PKCS11_ID(PKCS11_CKFT_USER_PIN_COUNT_LOW), 87 PKCS11_ID(PKCS11_CKFT_USER_PIN_FINAL_TRY), 88 PKCS11_ID(PKCS11_CKFT_USER_PIN_LOCKED), 89 PKCS11_ID(PKCS11_CKFT_USER_PIN_TO_BE_CHANGED), 90 PKCS11_ID(PKCS11_CKFT_SO_PIN_COUNT_LOW), 91 PKCS11_ID(PKCS11_CKFT_SO_PIN_FINAL_TRY), 92 PKCS11_ID(PKCS11_CKFT_SO_PIN_LOCKED), 93 PKCS11_ID(PKCS11_CKFT_SO_PIN_TO_BE_CHANGED), 94 PKCS11_ID(PKCS11_CKFT_ERROR_STATE), 95 }; 96 97 static const struct any_id __maybe_unused string_rc[] = { 98 PKCS11_ID(PKCS11_CKR_OK), 99 PKCS11_ID(PKCS11_CKR_GENERAL_ERROR), 100 PKCS11_ID(PKCS11_CKR_DEVICE_MEMORY), 101 PKCS11_ID(PKCS11_CKR_ARGUMENTS_BAD), 102 PKCS11_ID(PKCS11_CKR_BUFFER_TOO_SMALL), 103 PKCS11_ID(PKCS11_CKR_FUNCTION_FAILED), 104 PKCS11_ID(PKCS11_CKR_SIGNATURE_INVALID), 105 PKCS11_ID(PKCS11_CKR_ATTRIBUTE_TYPE_INVALID), 106 PKCS11_ID(PKCS11_CKR_ATTRIBUTE_VALUE_INVALID), 107 PKCS11_ID(PKCS11_CKR_OBJECT_HANDLE_INVALID), 108 PKCS11_ID(PKCS11_CKR_KEY_HANDLE_INVALID), 109 PKCS11_ID(PKCS11_CKR_MECHANISM_INVALID), 110 PKCS11_ID(PKCS11_CKR_SESSION_HANDLE_INVALID), 111 PKCS11_ID(PKCS11_CKR_SLOT_ID_INVALID), 112 PKCS11_ID(PKCS11_CKR_MECHANISM_PARAM_INVALID), 113 PKCS11_ID(PKCS11_CKR_TEMPLATE_INCONSISTENT), 114 PKCS11_ID(PKCS11_CKR_TEMPLATE_INCOMPLETE), 115 PKCS11_ID(PKCS11_CKR_PIN_INCORRECT), 116 PKCS11_ID(PKCS11_CKR_PIN_LOCKED), 117 PKCS11_ID(PKCS11_CKR_PIN_EXPIRED), 118 PKCS11_ID(PKCS11_CKR_PIN_INVALID), 119 PKCS11_ID(PKCS11_CKR_PIN_LEN_RANGE), 120 PKCS11_ID(PKCS11_CKR_SESSION_EXISTS), 121 PKCS11_ID(PKCS11_CKR_SESSION_READ_ONLY), 122 PKCS11_ID(PKCS11_CKR_SESSION_READ_WRITE_SO_EXISTS), 123 PKCS11_ID(PKCS11_CKR_OPERATION_ACTIVE), 124 PKCS11_ID(PKCS11_CKR_KEY_FUNCTION_NOT_PERMITTED), 125 PKCS11_ID(PKCS11_CKR_OPERATION_NOT_INITIALIZED), 126 PKCS11_ID(PKCS11_CKR_TOKEN_WRITE_PROTECTED), 127 PKCS11_ID(PKCS11_CKR_TOKEN_NOT_PRESENT), 128 PKCS11_ID(PKCS11_CKR_TOKEN_NOT_RECOGNIZED), 129 PKCS11_ID(PKCS11_CKR_ACTION_PROHIBITED), 130 PKCS11_ID(PKCS11_CKR_ATTRIBUTE_READ_ONLY), 131 PKCS11_ID(PKCS11_CKR_PIN_TOO_WEAK), 132 PKCS11_ID(PKCS11_CKR_CURVE_NOT_SUPPORTED), 133 PKCS11_ID(PKCS11_CKR_DOMAIN_PARAMS_INVALID), 134 PKCS11_ID(PKCS11_CKR_USER_ALREADY_LOGGED_IN), 135 PKCS11_ID(PKCS11_CKR_USER_ANOTHER_ALREADY_LOGGED_IN), 136 PKCS11_ID(PKCS11_CKR_USER_NOT_LOGGED_IN), 137 PKCS11_ID(PKCS11_CKR_USER_PIN_NOT_INITIALIZED), 138 PKCS11_ID(PKCS11_CKR_USER_TOO_MANY_TYPES), 139 PKCS11_ID(PKCS11_CKR_USER_TYPE_INVALID), 140 PKCS11_ID(PKCS11_CKR_SESSION_READ_ONLY_EXISTS), 141 PKCS11_ID(PKCS11_RV_NOT_FOUND), 142 PKCS11_ID(PKCS11_RV_NOT_IMPLEMENTED), 143 }; 144 145 #if CFG_TEE_TA_LOG_LEVEL > 0 146 const char *id2str_rc(uint32_t id) 147 { 148 return ID2STR(id, string_rc, "PKCS11_CKR_"); 149 } 150 151 const char *id2str_ta_cmd(uint32_t id) 152 { 153 return ID2STR(id, string_ta_cmd, NULL); 154 } 155 156 const char *id2str_slot_flag(uint32_t id) 157 { 158 return ID2STR(id, string_slot_flags, "PKCS11_CKFS_"); 159 } 160 161 const char *id2str_token_flag(uint32_t id) 162 { 163 return ID2STR(id, string_token_flags, "PKCS11_CKFT_"); 164 } 165 #endif /*CFG_TEE_TA_LOG_LEVEL*/ 166