1c84ccd0aSEtienne Carriere /* SPDX-License-Identifier: BSD-2-Clause */ 2c84ccd0aSEtienne Carriere /* 3c84ccd0aSEtienne Carriere * Copyright (c) 2017-2020, Linaro Limited 4c84ccd0aSEtienne Carriere */ 5c84ccd0aSEtienne Carriere #ifndef PKCS11_TA_PKCS11_TOKEN_H 6c84ccd0aSEtienne Carriere #define PKCS11_TA_PKCS11_TOKEN_H 7c84ccd0aSEtienne Carriere 8c84ccd0aSEtienne Carriere #include <sys/queue.h> 9c84ccd0aSEtienne Carriere #include <tee_api_types.h> 10c84ccd0aSEtienne Carriere #include <tee_internal_api.h> 1140bbca26SJens Wiklander #include <utee_defines.h> 12c84ccd0aSEtienne Carriere 13e084583eSEtienne Carriere #include "handle.h" 14b56b3d07SJens Wiklander #include "object.h" 15b56b3d07SJens Wiklander #include "pkcs11_attributes.h" 16e084583eSEtienne Carriere 17ce94efefSEtienne Carriere /* Hard coded description */ 18ce94efefSEtienne Carriere #define PKCS11_SLOT_DESCRIPTION "OP-TEE PKCS11 TA" 19ce94efefSEtienne Carriere #define PKCS11_SLOT_MANUFACTURER "Linaro" 20ce94efefSEtienne Carriere #define PKCS11_SLOT_HW_VERSION { 0, 0 } 21ce94efefSEtienne Carriere #define PKCS11_SLOT_FW_VERSION { PKCS11_TA_VERSION_MAJOR, \ 22ce94efefSEtienne Carriere PKCS11_TA_VERSION_MINOR } 23ce94efefSEtienne Carriere 24030e7392SEtienne Carriere #define PKCS11_TOKEN_LABEL "OP-TEE PKCS#11 TA token" 25030e7392SEtienne Carriere #define PKCS11_TOKEN_MANUFACTURER PKCS11_SLOT_MANUFACTURER 26030e7392SEtienne Carriere #define PKCS11_TOKEN_MODEL "OP-TEE TA" 27030e7392SEtienne Carriere #define PKCS11_TOKEN_HW_VERSION PKCS11_SLOT_HW_VERSION 28030e7392SEtienne Carriere #define PKCS11_TOKEN_FW_VERSION PKCS11_SLOT_FW_VERSION 29030e7392SEtienne Carriere 30c84ccd0aSEtienne Carriere enum pkcs11_token_state { 31c84ccd0aSEtienne Carriere PKCS11_TOKEN_RESET = 0, 32c84ccd0aSEtienne Carriere PKCS11_TOKEN_READ_WRITE, 33c84ccd0aSEtienne Carriere PKCS11_TOKEN_READ_ONLY, 34c84ccd0aSEtienne Carriere }; 35c84ccd0aSEtienne Carriere 36e084583eSEtienne Carriere TAILQ_HEAD(client_list, pkcs11_client); 37e084583eSEtienne Carriere TAILQ_HEAD(session_list, pkcs11_session); 38e084583eSEtienne Carriere 39e084583eSEtienne Carriere struct pkcs11_client; 40e084583eSEtienne Carriere 41c84ccd0aSEtienne Carriere #define PKCS11_MAX_USERS 2 42030e7392SEtienne Carriere #define PKCS11_TOKEN_PIN_SIZE_MAX 128 43030e7392SEtienne Carriere #define PKCS11_TOKEN_PIN_SIZE_MIN 10 44f485be04SJens Wiklander #define PKCS11_TOKEN_SO_PIN_COUNT_MAX 7 451dbb91e7SJens Wiklander #define PKCS11_TOKEN_USER_PIN_COUNT_MAX 7 46c84ccd0aSEtienne Carriere 47c84ccd0aSEtienne Carriere /* 48c84ccd0aSEtienne Carriere * Persistent state of the token 49c84ccd0aSEtienne Carriere * 50c84ccd0aSEtienne Carriere * @version - currently unused... 51c84ccd0aSEtienne Carriere * @label - pkcs11 formatted token label, set by client 52c84ccd0aSEtienne Carriere * @flags - pkcs11 token flags 53c84ccd0aSEtienne Carriere * @so_pin_count - counter on security officer login failure 5440bbca26SJens Wiklander * @so_pin_salt - stores salt in hash of SO PIN, 0 if not set 5540bbca26SJens Wiklander * @so_pin_hash - stores hash of SO PIN 56c84ccd0aSEtienne Carriere * @user_pin_count - counter on user login failure 5740bbca26SJens Wiklander * @user_pin_salt - stores salt in hash of user PIN, 0 if not set 5840bbca26SJens Wiklander * @user_pin_hash - stores hash of user PIN 59c84ccd0aSEtienne Carriere */ 60c84ccd0aSEtienne Carriere struct token_persistent_main { 61c84ccd0aSEtienne Carriere uint32_t version; 62c84ccd0aSEtienne Carriere uint8_t label[PKCS11_TOKEN_LABEL_SIZE]; 63c84ccd0aSEtienne Carriere uint32_t flags; 64c84ccd0aSEtienne Carriere uint32_t so_pin_count; 6540bbca26SJens Wiklander uint32_t so_pin_salt; 66*1a27b197SVesa Jääskeläinen union { 6740bbca26SJens Wiklander uint8_t so_pin_hash[TEE_MAX_HASH_SIZE]; 68*1a27b197SVesa Jääskeläinen TEE_Identity so_identity; 69*1a27b197SVesa Jääskeläinen }; 70c84ccd0aSEtienne Carriere uint32_t user_pin_count; 7140bbca26SJens Wiklander uint32_t user_pin_salt; 72*1a27b197SVesa Jääskeläinen union { 7340bbca26SJens Wiklander uint8_t user_pin_hash[TEE_MAX_HASH_SIZE]; 74*1a27b197SVesa Jääskeläinen TEE_Identity user_identity; 75*1a27b197SVesa Jääskeläinen }; 76c84ccd0aSEtienne Carriere }; 77c84ccd0aSEtienne Carriere 78c84ccd0aSEtienne Carriere /* 79334316feSJens Wiklander * Persistent objects in the token 80334316feSJens Wiklander * 81334316feSJens Wiklander * @count - number of objects stored in the token 82334316feSJens Wiklander * @uuids - array of object references/UUIDs (@count items) 83334316feSJens Wiklander */ 84334316feSJens Wiklander struct token_persistent_objs { 85334316feSJens Wiklander uint32_t count; 86334316feSJens Wiklander TEE_UUID uuids[]; 87334316feSJens Wiklander }; 88334316feSJens Wiklander 89334316feSJens Wiklander /* 90c84ccd0aSEtienne Carriere * Runtime state of the token, complies with pkcs11 91c84ccd0aSEtienne Carriere * 92c84ccd0aSEtienne Carriere * @state - Pkcs11 login is public, user, SO or custom 93c84ccd0aSEtienne Carriere * @session_count - Counter for opened Pkcs11 sessions 94c84ccd0aSEtienne Carriere * @rw_session_count - Count for opened Pkcs11 read/write sessions 95334316feSJens Wiklander * @object_list - List of the objects owned by the token 96c84ccd0aSEtienne Carriere * @db_main - Volatile copy of the persistent main database 97334316feSJens Wiklander * @db_objs - Volatile copy of the persistent object database 98c84ccd0aSEtienne Carriere */ 99c84ccd0aSEtienne Carriere struct ck_token { 100c84ccd0aSEtienne Carriere enum pkcs11_token_state state; 101c84ccd0aSEtienne Carriere uint32_t session_count; 102c84ccd0aSEtienne Carriere uint32_t rw_session_count; 103b56b3d07SJens Wiklander struct object_list object_list; 104c84ccd0aSEtienne Carriere /* Copy in RAM of the persistent database */ 105c84ccd0aSEtienne Carriere struct token_persistent_main *db_main; 106334316feSJens Wiklander struct token_persistent_objs *db_objs; 107c84ccd0aSEtienne Carriere }; 108c84ccd0aSEtienne Carriere 109e084583eSEtienne Carriere /* 110512cbf1dSJens Wiklander * A session can enter a processing state (encrypt, decrypt, digest, ...) 111512cbf1dSJens Wiklander * only from the initialized state. A session must return the initialized 112512cbf1dSJens Wiklander * state (from a processing finalization request) before entering another 113512cbf1dSJens Wiklander * processing state. 114512cbf1dSJens Wiklander */ 115512cbf1dSJens Wiklander enum pkcs11_proc_state { 116512cbf1dSJens Wiklander PKCS11_SESSION_READY = 0, /* No active processing */ 117512cbf1dSJens Wiklander PKCS11_SESSION_ENCRYPTING, 118512cbf1dSJens Wiklander PKCS11_SESSION_DECRYPTING, 119512cbf1dSJens Wiklander PKCS11_SESSION_DIGESTING, 120512cbf1dSJens Wiklander PKCS11_SESSION_DIGESTING_ENCRYPTING, /* case C_DigestEncryptUpdate */ 121512cbf1dSJens Wiklander PKCS11_SESSION_DECRYPTING_DIGESTING, /* case C_DecryptDigestUpdate */ 122512cbf1dSJens Wiklander PKCS11_SESSION_SIGNING, 123512cbf1dSJens Wiklander PKCS11_SESSION_SIGNING_ENCRYPTING, /* case C_SignEncryptUpdate */ 124512cbf1dSJens Wiklander PKCS11_SESSION_VERIFYING, 125512cbf1dSJens Wiklander PKCS11_SESSION_DECRYPTING_VERIFYING, /* case C_DecryptVerifyUpdate */ 126512cbf1dSJens Wiklander PKCS11_SESSION_SIGNING_RECOVER, 127512cbf1dSJens Wiklander PKCS11_SESSION_VERIFYING_RECOVER, 128512cbf1dSJens Wiklander }; 129512cbf1dSJens Wiklander 130512cbf1dSJens Wiklander /* 131512cbf1dSJens Wiklander * Context of the active processing in the session 132512cbf1dSJens Wiklander * 133512cbf1dSJens Wiklander * @state - ongoing active processing function or ready state 134512cbf1dSJens Wiklander * @mecha_type - mechanism type of the active processing 135512cbf1dSJens Wiklander * @always_authen - true if user need to login before each use 136512cbf1dSJens Wiklander * @relogged - true once client logged since last operation update 137512cbf1dSJens Wiklander * @updated - true once an active operation is updated 138512cbf1dSJens Wiklander * @tee_op_handle - handle on active crypto operation or TEE_HANDLE_NULL 139512cbf1dSJens Wiklander * @extra_ctx - context for the active processing 140512cbf1dSJens Wiklander */ 141512cbf1dSJens Wiklander struct active_processing { 142512cbf1dSJens Wiklander enum pkcs11_proc_state state; 143512cbf1dSJens Wiklander uint32_t mecha_type; 144512cbf1dSJens Wiklander bool always_authen; 145512cbf1dSJens Wiklander bool relogged; 146512cbf1dSJens Wiklander bool updated; 147512cbf1dSJens Wiklander TEE_OperationHandle tee_op_handle; 148512cbf1dSJens Wiklander void *extra_ctx; 149512cbf1dSJens Wiklander }; 150512cbf1dSJens Wiklander 151512cbf1dSJens Wiklander /* 152e084583eSEtienne Carriere * Structure tracking the PKCS#11 sessions 153e084583eSEtienne Carriere * 154e084583eSEtienne Carriere * @link - List of the session belonging to a client 155e084583eSEtienne Carriere * @client - Client the session belongs to 156e084583eSEtienne Carriere * @token - Token this session belongs to 157e084583eSEtienne Carriere * @handle - Identifier of the session published to the client 158b56b3d07SJens Wiklander * @object_list - Entry of the session objects list 159b56b3d07SJens Wiklander * @object_handle_db - Database for object handles published by the session 160e084583eSEtienne Carriere * @state - R/W SO, R/W user, RO user, R/W public, RO public. 161512cbf1dSJens Wiklander * @processing - Reference to initialized processing context if any 162e084583eSEtienne Carriere */ 163e084583eSEtienne Carriere struct pkcs11_session { 164e084583eSEtienne Carriere TAILQ_ENTRY(pkcs11_session) link; 165e084583eSEtienne Carriere struct pkcs11_client *client; 166e084583eSEtienne Carriere struct ck_token *token; 167512cbf1dSJens Wiklander enum pkcs11_mechanism_id handle; 168b56b3d07SJens Wiklander struct object_list object_list; 169b56b3d07SJens Wiklander struct handle_db object_handle_db; 170e084583eSEtienne Carriere enum pkcs11_session_state state; 171512cbf1dSJens Wiklander struct active_processing *processing; 172e084583eSEtienne Carriere }; 173e084583eSEtienne Carriere 174c84ccd0aSEtienne Carriere /* Initialize static token instance(s) from default/persistent database */ 175c84ccd0aSEtienne Carriere TEE_Result pkcs11_init(void); 176c84ccd0aSEtienne Carriere void pkcs11_deinit(void); 177c84ccd0aSEtienne Carriere 178d38f9635SEtienne Carriere /* Speculation safe lookup of token instance from token identifier */ 179c84ccd0aSEtienne Carriere struct ck_token *get_token(unsigned int token_id); 180c84ccd0aSEtienne Carriere 181c84ccd0aSEtienne Carriere /* Return token identified from token instance address */ 182c84ccd0aSEtienne Carriere unsigned int get_token_id(struct ck_token *token); 183c84ccd0aSEtienne Carriere 184c84ccd0aSEtienne Carriere /* Access to persistent database */ 185c84ccd0aSEtienne Carriere struct ck_token *init_persistent_db(unsigned int token_id); 186e86828f4SJens Wiklander void update_persistent_db(struct ck_token *token); 187c84ccd0aSEtienne Carriere void close_persistent_db(struct ck_token *token); 188c84ccd0aSEtienne Carriere 189bef8bc68SJens Wiklander enum pkcs11_rc hash_pin(enum pkcs11_user_type user, const uint8_t *pin, 190bef8bc68SJens Wiklander size_t pin_size, uint32_t *salt, 191bef8bc68SJens Wiklander uint8_t hash[TEE_MAX_HASH_SIZE]); 192bef8bc68SJens Wiklander enum pkcs11_rc verify_pin(enum pkcs11_user_type user, const uint8_t *pin, 193bef8bc68SJens Wiklander size_t pin_size, uint32_t salt, 194bef8bc68SJens Wiklander const uint8_t hash[TEE_MAX_HASH_SIZE]); 195bef8bc68SJens Wiklander 196*1a27b197SVesa Jääskeläinen #if defined(CFG_PKCS11_TA_AUTH_TEE_IDENTITY) 197*1a27b197SVesa Jääskeläinen enum pkcs11_rc setup_so_identity_auth_from_client(struct ck_token *token); 198*1a27b197SVesa Jääskeläinen enum pkcs11_rc setup_identity_auth_from_pin(struct ck_token *token, 199*1a27b197SVesa Jääskeläinen enum pkcs11_user_type user_type, 200*1a27b197SVesa Jääskeläinen const uint8_t *pin, 201*1a27b197SVesa Jääskeläinen size_t pin_size); 202*1a27b197SVesa Jääskeläinen enum pkcs11_rc verify_identity_auth(struct ck_token *token, 203*1a27b197SVesa Jääskeläinen enum pkcs11_user_type user_type); 204*1a27b197SVesa Jääskeläinen #else 205*1a27b197SVesa Jääskeläinen static inline enum pkcs11_rc 206*1a27b197SVesa Jääskeläinen setup_so_identity_auth_from_client(struct ck_token *token __unused) 207*1a27b197SVesa Jääskeläinen { 208*1a27b197SVesa Jääskeläinen return PKCS11_CKR_PIN_INVALID; 209*1a27b197SVesa Jääskeläinen } 210*1a27b197SVesa Jääskeläinen 211*1a27b197SVesa Jääskeläinen static inline enum pkcs11_rc 212*1a27b197SVesa Jääskeläinen setup_identity_auth_from_pin(struct ck_token *token __unused, 213*1a27b197SVesa Jääskeläinen enum pkcs11_user_type user_type __unused, 214*1a27b197SVesa Jääskeläinen const uint8_t *pin __unused, 215*1a27b197SVesa Jääskeläinen size_t pin_size __unused) 216*1a27b197SVesa Jääskeläinen { 217*1a27b197SVesa Jääskeläinen return PKCS11_CKR_PIN_INVALID; 218*1a27b197SVesa Jääskeläinen } 219*1a27b197SVesa Jääskeläinen 220*1a27b197SVesa Jääskeläinen static inline enum pkcs11_rc 221*1a27b197SVesa Jääskeläinen verify_identity_auth(struct ck_token *token __unused, 222*1a27b197SVesa Jääskeläinen enum pkcs11_user_type user_type __unused) 223*1a27b197SVesa Jääskeläinen { 224*1a27b197SVesa Jääskeläinen return PKCS11_CKR_PIN_INCORRECT; 225*1a27b197SVesa Jääskeläinen } 226*1a27b197SVesa Jääskeläinen #endif /* CFG_PKCS11_TA_AUTH_TEE_IDENTITY */ 227*1a27b197SVesa Jääskeläinen 228334316feSJens Wiklander /* Token persistent objects */ 229334316feSJens Wiklander enum pkcs11_rc create_object_uuid(struct ck_token *token, 230334316feSJens Wiklander struct pkcs11_object *obj); 231334316feSJens Wiklander void destroy_object_uuid(struct ck_token *token, struct pkcs11_object *obj); 232334316feSJens Wiklander enum pkcs11_rc unregister_persistent_object(struct ck_token *token, 233334316feSJens Wiklander TEE_UUID *uuid); 234334316feSJens Wiklander enum pkcs11_rc register_persistent_object(struct ck_token *token, 235334316feSJens Wiklander TEE_UUID *uuid); 236334316feSJens Wiklander enum pkcs11_rc get_persistent_objects_list(struct ck_token *token, 237334316feSJens Wiklander TEE_UUID *array, size_t *size); 238334316feSJens Wiklander 239e084583eSEtienne Carriere /* 240e084583eSEtienne Carriere * Pkcs11 session support 241e084583eSEtienne Carriere */ 242e084583eSEtienne Carriere struct pkcs11_client *tee_session2client(void *tee_session); 243e084583eSEtienne Carriere struct pkcs11_client *register_client(void); 244e084583eSEtienne Carriere void unregister_client(struct pkcs11_client *client); 245e084583eSEtienne Carriere 2466e4f8f17SEtienne Carriere struct pkcs11_session *pkcs11_handle2session(uint32_t handle, 2476e4f8f17SEtienne Carriere struct pkcs11_client *client); 2486e4f8f17SEtienne Carriere 249512cbf1dSJens Wiklander static inline bool session_is_active(struct pkcs11_session *session) 250512cbf1dSJens Wiklander { 251512cbf1dSJens Wiklander return session->processing; 252512cbf1dSJens Wiklander } 253512cbf1dSJens Wiklander 254512cbf1dSJens Wiklander enum pkcs11_rc set_processing_state(struct pkcs11_session *session, 255512cbf1dSJens Wiklander enum processing_func function, 256512cbf1dSJens Wiklander struct pkcs11_object *obj1, 257512cbf1dSJens Wiklander struct pkcs11_object *obj2); 258512cbf1dSJens Wiklander 2596e4f8f17SEtienne Carriere static inline bool pkcs11_session_is_read_write(struct pkcs11_session *session) 2606e4f8f17SEtienne Carriere { 2616e4f8f17SEtienne Carriere return session->state == PKCS11_CKS_RW_PUBLIC_SESSION || 2626e4f8f17SEtienne Carriere session->state == PKCS11_CKS_RW_USER_FUNCTIONS || 2636e4f8f17SEtienne Carriere session->state == PKCS11_CKS_RW_SO_FUNCTIONS; 2646e4f8f17SEtienne Carriere } 2656e4f8f17SEtienne Carriere 2666e4f8f17SEtienne Carriere static inline bool pkcs11_session_is_public(struct pkcs11_session *session) 2676e4f8f17SEtienne Carriere { 2686e4f8f17SEtienne Carriere return session->state == PKCS11_CKS_RO_PUBLIC_SESSION || 2696e4f8f17SEtienne Carriere session->state == PKCS11_CKS_RW_PUBLIC_SESSION; 2706e4f8f17SEtienne Carriere } 2716e4f8f17SEtienne Carriere 2726e4f8f17SEtienne Carriere static inline bool pkcs11_session_is_user(struct pkcs11_session *session) 2736e4f8f17SEtienne Carriere { 2746e4f8f17SEtienne Carriere return session->state == PKCS11_CKS_RO_USER_FUNCTIONS || 2756e4f8f17SEtienne Carriere session->state == PKCS11_CKS_RW_USER_FUNCTIONS; 2766e4f8f17SEtienne Carriere } 2776e4f8f17SEtienne Carriere 2786e4f8f17SEtienne Carriere static inline bool pkcs11_session_is_so(struct pkcs11_session *session) 2796e4f8f17SEtienne Carriere { 2806e4f8f17SEtienne Carriere return session->state == PKCS11_CKS_RW_SO_FUNCTIONS; 2816e4f8f17SEtienne Carriere } 2826e4f8f17SEtienne Carriere 2836e4f8f17SEtienne Carriere static inline 284b56b3d07SJens Wiklander struct object_list *pkcs11_get_session_objects(struct pkcs11_session *session) 285b56b3d07SJens Wiklander { 286b56b3d07SJens Wiklander return &session->object_list; 287b56b3d07SJens Wiklander } 288b56b3d07SJens Wiklander 289b56b3d07SJens Wiklander static inline 2906e4f8f17SEtienne Carriere struct ck_token *pkcs11_session2token(struct pkcs11_session *session) 2916e4f8f17SEtienne Carriere { 2926e4f8f17SEtienne Carriere return session->token; 2936e4f8f17SEtienne Carriere } 2946e4f8f17SEtienne Carriere 29522ac6984SEtienne Carriere /* Entry point for the TA commands */ 2964daf39b3SJens Wiklander enum pkcs11_rc entry_ck_slot_list(uint32_t ptypes, TEE_Param *params); 2974daf39b3SJens Wiklander enum pkcs11_rc entry_ck_slot_info(uint32_t ptypes, TEE_Param *params); 2984daf39b3SJens Wiklander enum pkcs11_rc entry_ck_token_info(uint32_t ptypes, TEE_Param *params); 2994daf39b3SJens Wiklander enum pkcs11_rc entry_ck_token_mecha_ids(uint32_t ptypes, TEE_Param *params); 3004daf39b3SJens Wiklander enum pkcs11_rc entry_ck_token_mecha_info(uint32_t ptypes, TEE_Param *params); 3014daf39b3SJens Wiklander enum pkcs11_rc entry_ck_open_session(struct pkcs11_client *client, 3026e4f8f17SEtienne Carriere uint32_t ptypes, TEE_Param *params); 3034daf39b3SJens Wiklander enum pkcs11_rc entry_ck_close_session(struct pkcs11_client *client, 3046e4f8f17SEtienne Carriere uint32_t ptypes, TEE_Param *params); 3054daf39b3SJens Wiklander enum pkcs11_rc entry_ck_close_all_sessions(struct pkcs11_client *client, 3066e4f8f17SEtienne Carriere uint32_t ptypes, TEE_Param *params); 3074daf39b3SJens Wiklander enum pkcs11_rc entry_ck_session_info(struct pkcs11_client *client, 3086e4f8f17SEtienne Carriere uint32_t ptypes, TEE_Param *params); 3094daf39b3SJens Wiklander enum pkcs11_rc entry_ck_token_initialize(uint32_t ptypes, TEE_Param *params); 3104daf39b3SJens Wiklander enum pkcs11_rc entry_ck_init_pin(struct pkcs11_client *client, 311e8dbd92cSJens Wiklander uint32_t ptypes, TEE_Param *params); 3124daf39b3SJens Wiklander enum pkcs11_rc entry_ck_set_pin(struct pkcs11_client *client, 3131dbb91e7SJens Wiklander uint32_t ptypes, TEE_Param *params); 3144daf39b3SJens Wiklander enum pkcs11_rc entry_ck_login(struct pkcs11_client *client, 315f7cc36c0SJens Wiklander uint32_t ptypes, TEE_Param *params); 3164daf39b3SJens Wiklander enum pkcs11_rc entry_ck_logout(struct pkcs11_client *client, 317f7cc36c0SJens Wiklander uint32_t ptypes, TEE_Param *params); 31822ac6984SEtienne Carriere 319c84ccd0aSEtienne Carriere #endif /*PKCS11_TA_PKCS11_TOKEN_H*/ 320