xref: /optee_os/ta/pkcs11/src/pkcs11_token.h (revision 1a27b197d8b16ef2d4dab8d205f359627b6f0232)
1c84ccd0aSEtienne Carriere /* SPDX-License-Identifier: BSD-2-Clause */
2c84ccd0aSEtienne Carriere /*
3c84ccd0aSEtienne Carriere  * Copyright (c) 2017-2020, Linaro Limited
4c84ccd0aSEtienne Carriere  */
5c84ccd0aSEtienne Carriere #ifndef PKCS11_TA_PKCS11_TOKEN_H
6c84ccd0aSEtienne Carriere #define PKCS11_TA_PKCS11_TOKEN_H
7c84ccd0aSEtienne Carriere 
8c84ccd0aSEtienne Carriere #include <sys/queue.h>
9c84ccd0aSEtienne Carriere #include <tee_api_types.h>
10c84ccd0aSEtienne Carriere #include <tee_internal_api.h>
1140bbca26SJens Wiklander #include <utee_defines.h>
12c84ccd0aSEtienne Carriere 
13e084583eSEtienne Carriere #include "handle.h"
14b56b3d07SJens Wiklander #include "object.h"
15b56b3d07SJens Wiklander #include "pkcs11_attributes.h"
16e084583eSEtienne Carriere 
17ce94efefSEtienne Carriere /* Hard coded description */
18ce94efefSEtienne Carriere #define PKCS11_SLOT_DESCRIPTION		"OP-TEE PKCS11 TA"
19ce94efefSEtienne Carriere #define PKCS11_SLOT_MANUFACTURER	"Linaro"
20ce94efefSEtienne Carriere #define PKCS11_SLOT_HW_VERSION		{ 0, 0 }
21ce94efefSEtienne Carriere #define PKCS11_SLOT_FW_VERSION		{ PKCS11_TA_VERSION_MAJOR, \
22ce94efefSEtienne Carriere 					  PKCS11_TA_VERSION_MINOR }
23ce94efefSEtienne Carriere 
24030e7392SEtienne Carriere #define PKCS11_TOKEN_LABEL		"OP-TEE PKCS#11 TA token"
25030e7392SEtienne Carriere #define PKCS11_TOKEN_MANUFACTURER	PKCS11_SLOT_MANUFACTURER
26030e7392SEtienne Carriere #define PKCS11_TOKEN_MODEL		"OP-TEE TA"
27030e7392SEtienne Carriere #define PKCS11_TOKEN_HW_VERSION		PKCS11_SLOT_HW_VERSION
28030e7392SEtienne Carriere #define PKCS11_TOKEN_FW_VERSION		PKCS11_SLOT_FW_VERSION
29030e7392SEtienne Carriere 
30c84ccd0aSEtienne Carriere enum pkcs11_token_state {
31c84ccd0aSEtienne Carriere 	PKCS11_TOKEN_RESET = 0,
32c84ccd0aSEtienne Carriere 	PKCS11_TOKEN_READ_WRITE,
33c84ccd0aSEtienne Carriere 	PKCS11_TOKEN_READ_ONLY,
34c84ccd0aSEtienne Carriere };
35c84ccd0aSEtienne Carriere 
36e084583eSEtienne Carriere TAILQ_HEAD(client_list, pkcs11_client);
37e084583eSEtienne Carriere TAILQ_HEAD(session_list, pkcs11_session);
38e084583eSEtienne Carriere 
39e084583eSEtienne Carriere struct pkcs11_client;
40e084583eSEtienne Carriere 
41c84ccd0aSEtienne Carriere #define PKCS11_MAX_USERS		2
42030e7392SEtienne Carriere #define PKCS11_TOKEN_PIN_SIZE_MAX	128
43030e7392SEtienne Carriere #define PKCS11_TOKEN_PIN_SIZE_MIN	10
44f485be04SJens Wiklander #define PKCS11_TOKEN_SO_PIN_COUNT_MAX	7
451dbb91e7SJens Wiklander #define PKCS11_TOKEN_USER_PIN_COUNT_MAX	7
46c84ccd0aSEtienne Carriere 
47c84ccd0aSEtienne Carriere /*
48c84ccd0aSEtienne Carriere  * Persistent state of the token
49c84ccd0aSEtienne Carriere  *
50c84ccd0aSEtienne Carriere  * @version - currently unused...
51c84ccd0aSEtienne Carriere  * @label - pkcs11 formatted token label, set by client
52c84ccd0aSEtienne Carriere  * @flags - pkcs11 token flags
53c84ccd0aSEtienne Carriere  * @so_pin_count - counter on security officer login failure
5440bbca26SJens Wiklander  * @so_pin_salt - stores salt in hash of SO PIN, 0 if not set
5540bbca26SJens Wiklander  * @so_pin_hash - stores hash of SO PIN
56c84ccd0aSEtienne Carriere  * @user_pin_count - counter on user login failure
5740bbca26SJens Wiklander  * @user_pin_salt - stores salt in hash of user PIN, 0 if not set
5840bbca26SJens Wiklander  * @user_pin_hash - stores hash of user PIN
59c84ccd0aSEtienne Carriere  */
60c84ccd0aSEtienne Carriere struct token_persistent_main {
61c84ccd0aSEtienne Carriere 	uint32_t version;
62c84ccd0aSEtienne Carriere 	uint8_t label[PKCS11_TOKEN_LABEL_SIZE];
63c84ccd0aSEtienne Carriere 	uint32_t flags;
64c84ccd0aSEtienne Carriere 	uint32_t so_pin_count;
6540bbca26SJens Wiklander 	uint32_t so_pin_salt;
66*1a27b197SVesa Jääskeläinen 	union {
6740bbca26SJens Wiklander 		uint8_t so_pin_hash[TEE_MAX_HASH_SIZE];
68*1a27b197SVesa Jääskeläinen 		TEE_Identity so_identity;
69*1a27b197SVesa Jääskeläinen 	};
70c84ccd0aSEtienne Carriere 	uint32_t user_pin_count;
7140bbca26SJens Wiklander 	uint32_t user_pin_salt;
72*1a27b197SVesa Jääskeläinen 	union {
7340bbca26SJens Wiklander 		uint8_t user_pin_hash[TEE_MAX_HASH_SIZE];
74*1a27b197SVesa Jääskeläinen 		TEE_Identity user_identity;
75*1a27b197SVesa Jääskeläinen 	};
76c84ccd0aSEtienne Carriere };
77c84ccd0aSEtienne Carriere 
78c84ccd0aSEtienne Carriere /*
79334316feSJens Wiklander  * Persistent objects in the token
80334316feSJens Wiklander  *
81334316feSJens Wiklander  * @count - number of objects stored in the token
82334316feSJens Wiklander  * @uuids - array of object references/UUIDs (@count items)
83334316feSJens Wiklander  */
84334316feSJens Wiklander struct token_persistent_objs {
85334316feSJens Wiklander 	uint32_t count;
86334316feSJens Wiklander 	TEE_UUID uuids[];
87334316feSJens Wiklander };
88334316feSJens Wiklander 
89334316feSJens Wiklander /*
90c84ccd0aSEtienne Carriere  * Runtime state of the token, complies with pkcs11
91c84ccd0aSEtienne Carriere  *
92c84ccd0aSEtienne Carriere  * @state - Pkcs11 login is public, user, SO or custom
93c84ccd0aSEtienne Carriere  * @session_count - Counter for opened Pkcs11 sessions
94c84ccd0aSEtienne Carriere  * @rw_session_count - Count for opened Pkcs11 read/write sessions
95334316feSJens Wiklander  * @object_list - List of the objects owned by the token
96c84ccd0aSEtienne Carriere  * @db_main - Volatile copy of the persistent main database
97334316feSJens Wiklander  * @db_objs - Volatile copy of the persistent object database
98c84ccd0aSEtienne Carriere  */
99c84ccd0aSEtienne Carriere struct ck_token {
100c84ccd0aSEtienne Carriere 	enum pkcs11_token_state state;
101c84ccd0aSEtienne Carriere 	uint32_t session_count;
102c84ccd0aSEtienne Carriere 	uint32_t rw_session_count;
103b56b3d07SJens Wiklander 	struct object_list object_list;
104c84ccd0aSEtienne Carriere 	/* Copy in RAM of the persistent database */
105c84ccd0aSEtienne Carriere 	struct token_persistent_main *db_main;
106334316feSJens Wiklander 	struct token_persistent_objs *db_objs;
107c84ccd0aSEtienne Carriere };
108c84ccd0aSEtienne Carriere 
109e084583eSEtienne Carriere /*
110512cbf1dSJens Wiklander  * A session can enter a processing state (encrypt, decrypt, digest, ...)
111512cbf1dSJens Wiklander  * only from the initialized state. A session must return the initialized
112512cbf1dSJens Wiklander  * state (from a processing finalization request) before entering another
113512cbf1dSJens Wiklander  * processing state.
114512cbf1dSJens Wiklander  */
115512cbf1dSJens Wiklander enum pkcs11_proc_state {
116512cbf1dSJens Wiklander 	PKCS11_SESSION_READY = 0,		/* No active processing */
117512cbf1dSJens Wiklander 	PKCS11_SESSION_ENCRYPTING,
118512cbf1dSJens Wiklander 	PKCS11_SESSION_DECRYPTING,
119512cbf1dSJens Wiklander 	PKCS11_SESSION_DIGESTING,
120512cbf1dSJens Wiklander 	PKCS11_SESSION_DIGESTING_ENCRYPTING,	/* case C_DigestEncryptUpdate */
121512cbf1dSJens Wiklander 	PKCS11_SESSION_DECRYPTING_DIGESTING,	/* case C_DecryptDigestUpdate */
122512cbf1dSJens Wiklander 	PKCS11_SESSION_SIGNING,
123512cbf1dSJens Wiklander 	PKCS11_SESSION_SIGNING_ENCRYPTING,	/* case C_SignEncryptUpdate */
124512cbf1dSJens Wiklander 	PKCS11_SESSION_VERIFYING,
125512cbf1dSJens Wiklander 	PKCS11_SESSION_DECRYPTING_VERIFYING,	/* case C_DecryptVerifyUpdate */
126512cbf1dSJens Wiklander 	PKCS11_SESSION_SIGNING_RECOVER,
127512cbf1dSJens Wiklander 	PKCS11_SESSION_VERIFYING_RECOVER,
128512cbf1dSJens Wiklander };
129512cbf1dSJens Wiklander 
130512cbf1dSJens Wiklander /*
131512cbf1dSJens Wiklander  * Context of the active processing in the session
132512cbf1dSJens Wiklander  *
133512cbf1dSJens Wiklander  * @state - ongoing active processing function or ready state
134512cbf1dSJens Wiklander  * @mecha_type - mechanism type of the active processing
135512cbf1dSJens Wiklander  * @always_authen - true if user need to login before each use
136512cbf1dSJens Wiklander  * @relogged - true once client logged since last operation update
137512cbf1dSJens Wiklander  * @updated - true once an active operation is updated
138512cbf1dSJens Wiklander  * @tee_op_handle - handle on active crypto operation or TEE_HANDLE_NULL
139512cbf1dSJens Wiklander  * @extra_ctx - context for the active processing
140512cbf1dSJens Wiklander  */
141512cbf1dSJens Wiklander struct active_processing {
142512cbf1dSJens Wiklander 	enum pkcs11_proc_state state;
143512cbf1dSJens Wiklander 	uint32_t mecha_type;
144512cbf1dSJens Wiklander 	bool always_authen;
145512cbf1dSJens Wiklander 	bool relogged;
146512cbf1dSJens Wiklander 	bool updated;
147512cbf1dSJens Wiklander 	TEE_OperationHandle tee_op_handle;
148512cbf1dSJens Wiklander 	void *extra_ctx;
149512cbf1dSJens Wiklander };
150512cbf1dSJens Wiklander 
151512cbf1dSJens Wiklander /*
152e084583eSEtienne Carriere  * Structure tracking the PKCS#11 sessions
153e084583eSEtienne Carriere  *
154e084583eSEtienne Carriere  * @link - List of the session belonging to a client
155e084583eSEtienne Carriere  * @client - Client the session belongs to
156e084583eSEtienne Carriere  * @token - Token this session belongs to
157e084583eSEtienne Carriere  * @handle - Identifier of the session published to the client
158b56b3d07SJens Wiklander  * @object_list - Entry of the session objects list
159b56b3d07SJens Wiklander  * @object_handle_db - Database for object handles published by the session
160e084583eSEtienne Carriere  * @state - R/W SO, R/W user, RO user, R/W public, RO public.
161512cbf1dSJens Wiklander  * @processing - Reference to initialized processing context if any
162e084583eSEtienne Carriere  */
163e084583eSEtienne Carriere struct pkcs11_session {
164e084583eSEtienne Carriere 	TAILQ_ENTRY(pkcs11_session) link;
165e084583eSEtienne Carriere 	struct pkcs11_client *client;
166e084583eSEtienne Carriere 	struct ck_token *token;
167512cbf1dSJens Wiklander 	enum pkcs11_mechanism_id handle;
168b56b3d07SJens Wiklander 	struct object_list object_list;
169b56b3d07SJens Wiklander 	struct handle_db object_handle_db;
170e084583eSEtienne Carriere 	enum pkcs11_session_state state;
171512cbf1dSJens Wiklander 	struct active_processing *processing;
172e084583eSEtienne Carriere };
173e084583eSEtienne Carriere 
174c84ccd0aSEtienne Carriere /* Initialize static token instance(s) from default/persistent database */
175c84ccd0aSEtienne Carriere TEE_Result pkcs11_init(void);
176c84ccd0aSEtienne Carriere void pkcs11_deinit(void);
177c84ccd0aSEtienne Carriere 
178d38f9635SEtienne Carriere /* Speculation safe lookup of token instance from token identifier */
179c84ccd0aSEtienne Carriere struct ck_token *get_token(unsigned int token_id);
180c84ccd0aSEtienne Carriere 
181c84ccd0aSEtienne Carriere /* Return token identified from token instance address */
182c84ccd0aSEtienne Carriere unsigned int get_token_id(struct ck_token *token);
183c84ccd0aSEtienne Carriere 
184c84ccd0aSEtienne Carriere /* Access to persistent database */
185c84ccd0aSEtienne Carriere struct ck_token *init_persistent_db(unsigned int token_id);
186e86828f4SJens Wiklander void update_persistent_db(struct ck_token *token);
187c84ccd0aSEtienne Carriere void close_persistent_db(struct ck_token *token);
188c84ccd0aSEtienne Carriere 
189bef8bc68SJens Wiklander enum pkcs11_rc hash_pin(enum pkcs11_user_type user, const uint8_t *pin,
190bef8bc68SJens Wiklander 			size_t pin_size, uint32_t *salt,
191bef8bc68SJens Wiklander 			uint8_t hash[TEE_MAX_HASH_SIZE]);
192bef8bc68SJens Wiklander enum pkcs11_rc verify_pin(enum pkcs11_user_type user, const uint8_t *pin,
193bef8bc68SJens Wiklander 			  size_t pin_size, uint32_t salt,
194bef8bc68SJens Wiklander 			  const uint8_t hash[TEE_MAX_HASH_SIZE]);
195bef8bc68SJens Wiklander 
196*1a27b197SVesa Jääskeläinen #if defined(CFG_PKCS11_TA_AUTH_TEE_IDENTITY)
197*1a27b197SVesa Jääskeläinen enum pkcs11_rc setup_so_identity_auth_from_client(struct ck_token *token);
198*1a27b197SVesa Jääskeläinen enum pkcs11_rc setup_identity_auth_from_pin(struct ck_token *token,
199*1a27b197SVesa Jääskeläinen 					    enum pkcs11_user_type user_type,
200*1a27b197SVesa Jääskeläinen 					    const uint8_t *pin,
201*1a27b197SVesa Jääskeläinen 					    size_t pin_size);
202*1a27b197SVesa Jääskeläinen enum pkcs11_rc verify_identity_auth(struct ck_token *token,
203*1a27b197SVesa Jääskeläinen 				    enum pkcs11_user_type user_type);
204*1a27b197SVesa Jääskeläinen #else
205*1a27b197SVesa Jääskeläinen static inline enum pkcs11_rc
206*1a27b197SVesa Jääskeläinen setup_so_identity_auth_from_client(struct ck_token *token __unused)
207*1a27b197SVesa Jääskeläinen {
208*1a27b197SVesa Jääskeläinen 	return PKCS11_CKR_PIN_INVALID;
209*1a27b197SVesa Jääskeläinen }
210*1a27b197SVesa Jääskeläinen 
211*1a27b197SVesa Jääskeläinen static inline enum pkcs11_rc
212*1a27b197SVesa Jääskeläinen setup_identity_auth_from_pin(struct ck_token *token __unused,
213*1a27b197SVesa Jääskeläinen 			     enum pkcs11_user_type user_type __unused,
214*1a27b197SVesa Jääskeläinen 			     const uint8_t *pin __unused,
215*1a27b197SVesa Jääskeläinen 			     size_t pin_size __unused)
216*1a27b197SVesa Jääskeläinen {
217*1a27b197SVesa Jääskeläinen 	return PKCS11_CKR_PIN_INVALID;
218*1a27b197SVesa Jääskeläinen }
219*1a27b197SVesa Jääskeläinen 
220*1a27b197SVesa Jääskeläinen static inline enum pkcs11_rc
221*1a27b197SVesa Jääskeläinen verify_identity_auth(struct ck_token *token __unused,
222*1a27b197SVesa Jääskeläinen 		     enum pkcs11_user_type user_type __unused)
223*1a27b197SVesa Jääskeläinen {
224*1a27b197SVesa Jääskeläinen 	return PKCS11_CKR_PIN_INCORRECT;
225*1a27b197SVesa Jääskeläinen }
226*1a27b197SVesa Jääskeläinen #endif /* CFG_PKCS11_TA_AUTH_TEE_IDENTITY */
227*1a27b197SVesa Jääskeläinen 
228334316feSJens Wiklander /* Token persistent objects */
229334316feSJens Wiklander enum pkcs11_rc create_object_uuid(struct ck_token *token,
230334316feSJens Wiklander 				  struct pkcs11_object *obj);
231334316feSJens Wiklander void destroy_object_uuid(struct ck_token *token, struct pkcs11_object *obj);
232334316feSJens Wiklander enum pkcs11_rc unregister_persistent_object(struct ck_token *token,
233334316feSJens Wiklander 					    TEE_UUID *uuid);
234334316feSJens Wiklander enum pkcs11_rc register_persistent_object(struct ck_token *token,
235334316feSJens Wiklander 					  TEE_UUID *uuid);
236334316feSJens Wiklander enum pkcs11_rc get_persistent_objects_list(struct ck_token *token,
237334316feSJens Wiklander 					   TEE_UUID *array, size_t *size);
238334316feSJens Wiklander 
239e084583eSEtienne Carriere /*
240e084583eSEtienne Carriere  * Pkcs11 session support
241e084583eSEtienne Carriere  */
242e084583eSEtienne Carriere struct pkcs11_client *tee_session2client(void *tee_session);
243e084583eSEtienne Carriere struct pkcs11_client *register_client(void);
244e084583eSEtienne Carriere void unregister_client(struct pkcs11_client *client);
245e084583eSEtienne Carriere 
2466e4f8f17SEtienne Carriere struct pkcs11_session *pkcs11_handle2session(uint32_t handle,
2476e4f8f17SEtienne Carriere 					     struct pkcs11_client *client);
2486e4f8f17SEtienne Carriere 
249512cbf1dSJens Wiklander static inline bool session_is_active(struct pkcs11_session *session)
250512cbf1dSJens Wiklander {
251512cbf1dSJens Wiklander 	return session->processing;
252512cbf1dSJens Wiklander }
253512cbf1dSJens Wiklander 
254512cbf1dSJens Wiklander enum pkcs11_rc set_processing_state(struct pkcs11_session *session,
255512cbf1dSJens Wiklander 				    enum processing_func function,
256512cbf1dSJens Wiklander 				    struct pkcs11_object *obj1,
257512cbf1dSJens Wiklander 				    struct pkcs11_object *obj2);
258512cbf1dSJens Wiklander 
2596e4f8f17SEtienne Carriere static inline bool pkcs11_session_is_read_write(struct pkcs11_session *session)
2606e4f8f17SEtienne Carriere {
2616e4f8f17SEtienne Carriere 	return session->state == PKCS11_CKS_RW_PUBLIC_SESSION ||
2626e4f8f17SEtienne Carriere 	       session->state == PKCS11_CKS_RW_USER_FUNCTIONS ||
2636e4f8f17SEtienne Carriere 	       session->state == PKCS11_CKS_RW_SO_FUNCTIONS;
2646e4f8f17SEtienne Carriere }
2656e4f8f17SEtienne Carriere 
2666e4f8f17SEtienne Carriere static inline bool pkcs11_session_is_public(struct pkcs11_session *session)
2676e4f8f17SEtienne Carriere {
2686e4f8f17SEtienne Carriere 	return session->state == PKCS11_CKS_RO_PUBLIC_SESSION ||
2696e4f8f17SEtienne Carriere 	       session->state == PKCS11_CKS_RW_PUBLIC_SESSION;
2706e4f8f17SEtienne Carriere }
2716e4f8f17SEtienne Carriere 
2726e4f8f17SEtienne Carriere static inline bool pkcs11_session_is_user(struct pkcs11_session *session)
2736e4f8f17SEtienne Carriere {
2746e4f8f17SEtienne Carriere 	return session->state == PKCS11_CKS_RO_USER_FUNCTIONS ||
2756e4f8f17SEtienne Carriere 	       session->state == PKCS11_CKS_RW_USER_FUNCTIONS;
2766e4f8f17SEtienne Carriere }
2776e4f8f17SEtienne Carriere 
2786e4f8f17SEtienne Carriere static inline bool pkcs11_session_is_so(struct pkcs11_session *session)
2796e4f8f17SEtienne Carriere {
2806e4f8f17SEtienne Carriere 	return session->state == PKCS11_CKS_RW_SO_FUNCTIONS;
2816e4f8f17SEtienne Carriere }
2826e4f8f17SEtienne Carriere 
2836e4f8f17SEtienne Carriere static inline
284b56b3d07SJens Wiklander struct object_list *pkcs11_get_session_objects(struct pkcs11_session *session)
285b56b3d07SJens Wiklander {
286b56b3d07SJens Wiklander 	return &session->object_list;
287b56b3d07SJens Wiklander }
288b56b3d07SJens Wiklander 
289b56b3d07SJens Wiklander static inline
2906e4f8f17SEtienne Carriere struct ck_token *pkcs11_session2token(struct pkcs11_session *session)
2916e4f8f17SEtienne Carriere {
2926e4f8f17SEtienne Carriere 	return session->token;
2936e4f8f17SEtienne Carriere }
2946e4f8f17SEtienne Carriere 
29522ac6984SEtienne Carriere /* Entry point for the TA commands */
2964daf39b3SJens Wiklander enum pkcs11_rc entry_ck_slot_list(uint32_t ptypes, TEE_Param *params);
2974daf39b3SJens Wiklander enum pkcs11_rc entry_ck_slot_info(uint32_t ptypes, TEE_Param *params);
2984daf39b3SJens Wiklander enum pkcs11_rc entry_ck_token_info(uint32_t ptypes, TEE_Param *params);
2994daf39b3SJens Wiklander enum pkcs11_rc entry_ck_token_mecha_ids(uint32_t ptypes, TEE_Param *params);
3004daf39b3SJens Wiklander enum pkcs11_rc entry_ck_token_mecha_info(uint32_t ptypes, TEE_Param *params);
3014daf39b3SJens Wiklander enum pkcs11_rc entry_ck_open_session(struct pkcs11_client *client,
3026e4f8f17SEtienne Carriere 				     uint32_t ptypes, TEE_Param *params);
3034daf39b3SJens Wiklander enum pkcs11_rc entry_ck_close_session(struct pkcs11_client *client,
3046e4f8f17SEtienne Carriere 				      uint32_t ptypes, TEE_Param *params);
3054daf39b3SJens Wiklander enum pkcs11_rc entry_ck_close_all_sessions(struct pkcs11_client *client,
3066e4f8f17SEtienne Carriere 					   uint32_t ptypes, TEE_Param *params);
3074daf39b3SJens Wiklander enum pkcs11_rc entry_ck_session_info(struct pkcs11_client *client,
3086e4f8f17SEtienne Carriere 				     uint32_t ptypes, TEE_Param *params);
3094daf39b3SJens Wiklander enum pkcs11_rc entry_ck_token_initialize(uint32_t ptypes, TEE_Param *params);
3104daf39b3SJens Wiklander enum pkcs11_rc entry_ck_init_pin(struct pkcs11_client *client,
311e8dbd92cSJens Wiklander 				 uint32_t ptypes, TEE_Param *params);
3124daf39b3SJens Wiklander enum pkcs11_rc entry_ck_set_pin(struct pkcs11_client *client,
3131dbb91e7SJens Wiklander 				uint32_t ptypes, TEE_Param *params);
3144daf39b3SJens Wiklander enum pkcs11_rc entry_ck_login(struct pkcs11_client *client,
315f7cc36c0SJens Wiklander 			      uint32_t ptypes, TEE_Param *params);
3164daf39b3SJens Wiklander enum pkcs11_rc entry_ck_logout(struct pkcs11_client *client,
317f7cc36c0SJens Wiklander 			       uint32_t ptypes, TEE_Param *params);
31822ac6984SEtienne Carriere 
319c84ccd0aSEtienne Carriere #endif /*PKCS11_TA_PKCS11_TOKEN_H*/
320