xref: /optee_os/ta/pkcs11/src/pkcs11_token.h (revision bb5d1825919719a1f4c3bc3a19f1040f427d8f60)
1c84ccd0aSEtienne Carriere /* SPDX-License-Identifier: BSD-2-Clause */
2c84ccd0aSEtienne Carriere /*
3c84ccd0aSEtienne Carriere  * Copyright (c) 2017-2020, Linaro Limited
4c84ccd0aSEtienne Carriere  */
5c84ccd0aSEtienne Carriere #ifndef PKCS11_TA_PKCS11_TOKEN_H
6c84ccd0aSEtienne Carriere #define PKCS11_TA_PKCS11_TOKEN_H
7c84ccd0aSEtienne Carriere 
8c84ccd0aSEtienne Carriere #include <sys/queue.h>
9c84ccd0aSEtienne Carriere #include <tee_api_types.h>
10c84ccd0aSEtienne Carriere #include <tee_internal_api.h>
1140bbca26SJens Wiklander #include <utee_defines.h>
12c84ccd0aSEtienne Carriere 
13e084583eSEtienne Carriere #include "handle.h"
14b56b3d07SJens Wiklander #include "object.h"
15b56b3d07SJens Wiklander #include "pkcs11_attributes.h"
16e084583eSEtienne Carriere 
17ce94efefSEtienne Carriere /* Hard coded description */
18ce94efefSEtienne Carriere #define PKCS11_SLOT_DESCRIPTION		"OP-TEE PKCS11 TA"
19ce94efefSEtienne Carriere #define PKCS11_SLOT_MANUFACTURER	"Linaro"
20ce94efefSEtienne Carriere #define PKCS11_SLOT_HW_VERSION		{ 0, 0 }
21ce94efefSEtienne Carriere #define PKCS11_SLOT_FW_VERSION		{ PKCS11_TA_VERSION_MAJOR, \
22ce94efefSEtienne Carriere 					  PKCS11_TA_VERSION_MINOR }
23ce94efefSEtienne Carriere 
24030e7392SEtienne Carriere #define PKCS11_TOKEN_LABEL		"OP-TEE PKCS#11 TA token"
25030e7392SEtienne Carriere #define PKCS11_TOKEN_MANUFACTURER	PKCS11_SLOT_MANUFACTURER
26030e7392SEtienne Carriere #define PKCS11_TOKEN_MODEL		"OP-TEE TA"
27030e7392SEtienne Carriere #define PKCS11_TOKEN_HW_VERSION		PKCS11_SLOT_HW_VERSION
28030e7392SEtienne Carriere #define PKCS11_TOKEN_FW_VERSION		PKCS11_SLOT_FW_VERSION
29030e7392SEtienne Carriere 
30c84ccd0aSEtienne Carriere enum pkcs11_token_state {
31c84ccd0aSEtienne Carriere 	PKCS11_TOKEN_RESET = 0,
32c84ccd0aSEtienne Carriere 	PKCS11_TOKEN_READ_WRITE,
33c84ccd0aSEtienne Carriere 	PKCS11_TOKEN_READ_ONLY,
34c84ccd0aSEtienne Carriere };
35c84ccd0aSEtienne Carriere 
36e084583eSEtienne Carriere TAILQ_HEAD(client_list, pkcs11_client);
37e084583eSEtienne Carriere TAILQ_HEAD(session_list, pkcs11_session);
38e084583eSEtienne Carriere 
39e084583eSEtienne Carriere struct pkcs11_client;
40e084583eSEtienne Carriere 
41c84ccd0aSEtienne Carriere #define PKCS11_MAX_USERS		2
42030e7392SEtienne Carriere #define PKCS11_TOKEN_PIN_SIZE_MAX	128
43355d722aSRuchika Gupta #define PKCS11_TOKEN_PIN_SIZE_MIN	4
44f485be04SJens Wiklander #define PKCS11_TOKEN_SO_PIN_COUNT_MAX	7
451dbb91e7SJens Wiklander #define PKCS11_TOKEN_USER_PIN_COUNT_MAX	7
46c84ccd0aSEtienne Carriere 
47c84ccd0aSEtienne Carriere /*
48c84ccd0aSEtienne Carriere  * Persistent state of the token
49c84ccd0aSEtienne Carriere  *
50c84ccd0aSEtienne Carriere  * @version - currently unused...
51c84ccd0aSEtienne Carriere  * @label - pkcs11 formatted token label, set by client
52c84ccd0aSEtienne Carriere  * @flags - pkcs11 token flags
53c84ccd0aSEtienne Carriere  * @so_pin_count - counter on security officer login failure
5440bbca26SJens Wiklander  * @so_pin_salt - stores salt in hash of SO PIN, 0 if not set
5540bbca26SJens Wiklander  * @so_pin_hash - stores hash of SO PIN
56c84ccd0aSEtienne Carriere  * @user_pin_count - counter on user login failure
5740bbca26SJens Wiklander  * @user_pin_salt - stores salt in hash of user PIN, 0 if not set
5840bbca26SJens Wiklander  * @user_pin_hash - stores hash of user PIN
59c84ccd0aSEtienne Carriere  */
60c84ccd0aSEtienne Carriere struct token_persistent_main {
61c84ccd0aSEtienne Carriere 	uint32_t version;
62c84ccd0aSEtienne Carriere 	uint8_t label[PKCS11_TOKEN_LABEL_SIZE];
63c84ccd0aSEtienne Carriere 	uint32_t flags;
64c84ccd0aSEtienne Carriere 	uint32_t so_pin_count;
6540bbca26SJens Wiklander 	uint32_t so_pin_salt;
661a27b197SVesa Jääskeläinen 	union {
6740bbca26SJens Wiklander 		uint8_t so_pin_hash[TEE_MAX_HASH_SIZE];
681a27b197SVesa Jääskeläinen 		TEE_Identity so_identity;
691a27b197SVesa Jääskeläinen 	};
70c84ccd0aSEtienne Carriere 	uint32_t user_pin_count;
7140bbca26SJens Wiklander 	uint32_t user_pin_salt;
721a27b197SVesa Jääskeläinen 	union {
7340bbca26SJens Wiklander 		uint8_t user_pin_hash[TEE_MAX_HASH_SIZE];
741a27b197SVesa Jääskeläinen 		TEE_Identity user_identity;
751a27b197SVesa Jääskeläinen 	};
76c84ccd0aSEtienne Carriere };
77c84ccd0aSEtienne Carriere 
78c84ccd0aSEtienne Carriere /*
79334316feSJens Wiklander  * Persistent objects in the token
80334316feSJens Wiklander  *
81334316feSJens Wiklander  * @count - number of objects stored in the token
82334316feSJens Wiklander  * @uuids - array of object references/UUIDs (@count items)
83334316feSJens Wiklander  */
84334316feSJens Wiklander struct token_persistent_objs {
85334316feSJens Wiklander 	uint32_t count;
86334316feSJens Wiklander 	TEE_UUID uuids[];
87334316feSJens Wiklander };
88334316feSJens Wiklander 
89334316feSJens Wiklander /*
90c84ccd0aSEtienne Carriere  * Runtime state of the token, complies with pkcs11
91c84ccd0aSEtienne Carriere  *
92c84ccd0aSEtienne Carriere  * @state - Pkcs11 login is public, user, SO or custom
93c84ccd0aSEtienne Carriere  * @session_count - Counter for opened Pkcs11 sessions
94c84ccd0aSEtienne Carriere  * @rw_session_count - Count for opened Pkcs11 read/write sessions
95334316feSJens Wiklander  * @object_list - List of the objects owned by the token
96c84ccd0aSEtienne Carriere  * @db_main - Volatile copy of the persistent main database
97334316feSJens Wiklander  * @db_objs - Volatile copy of the persistent object database
98c84ccd0aSEtienne Carriere  */
99c84ccd0aSEtienne Carriere struct ck_token {
100c84ccd0aSEtienne Carriere 	enum pkcs11_token_state state;
101c84ccd0aSEtienne Carriere 	uint32_t session_count;
102c84ccd0aSEtienne Carriere 	uint32_t rw_session_count;
103b56b3d07SJens Wiklander 	struct object_list object_list;
104c84ccd0aSEtienne Carriere 	/* Copy in RAM of the persistent database */
105c84ccd0aSEtienne Carriere 	struct token_persistent_main *db_main;
106334316feSJens Wiklander 	struct token_persistent_objs *db_objs;
107c84ccd0aSEtienne Carriere };
108c84ccd0aSEtienne Carriere 
109e084583eSEtienne Carriere /*
110512cbf1dSJens Wiklander  * A session can enter a processing state (encrypt, decrypt, digest, ...)
111512cbf1dSJens Wiklander  * only from the initialized state. A session must return the initialized
112512cbf1dSJens Wiklander  * state (from a processing finalization request) before entering another
113512cbf1dSJens Wiklander  * processing state.
114512cbf1dSJens Wiklander  */
115512cbf1dSJens Wiklander enum pkcs11_proc_state {
116512cbf1dSJens Wiklander 	PKCS11_SESSION_READY = 0,		/* No active processing */
117512cbf1dSJens Wiklander 	PKCS11_SESSION_ENCRYPTING,
118512cbf1dSJens Wiklander 	PKCS11_SESSION_DECRYPTING,
119512cbf1dSJens Wiklander 	PKCS11_SESSION_DIGESTING,
120512cbf1dSJens Wiklander 	PKCS11_SESSION_DIGESTING_ENCRYPTING,	/* case C_DigestEncryptUpdate */
121512cbf1dSJens Wiklander 	PKCS11_SESSION_DECRYPTING_DIGESTING,	/* case C_DecryptDigestUpdate */
122512cbf1dSJens Wiklander 	PKCS11_SESSION_SIGNING,
123512cbf1dSJens Wiklander 	PKCS11_SESSION_SIGNING_ENCRYPTING,	/* case C_SignEncryptUpdate */
124512cbf1dSJens Wiklander 	PKCS11_SESSION_VERIFYING,
125512cbf1dSJens Wiklander 	PKCS11_SESSION_DECRYPTING_VERIFYING,	/* case C_DecryptVerifyUpdate */
126512cbf1dSJens Wiklander 	PKCS11_SESSION_SIGNING_RECOVER,
127512cbf1dSJens Wiklander 	PKCS11_SESSION_VERIFYING_RECOVER,
1285f80f270SRuchika Gupta 	PKCS11_SESSION_BUSY,
129512cbf1dSJens Wiklander };
130512cbf1dSJens Wiklander 
131512cbf1dSJens Wiklander /*
132512cbf1dSJens Wiklander  * Context of the active processing in the session
133512cbf1dSJens Wiklander  *
134512cbf1dSJens Wiklander  * @state - ongoing active processing function or ready state
135512cbf1dSJens Wiklander  * @mecha_type - mechanism type of the active processing
136512cbf1dSJens Wiklander  * @always_authen - true if user need to login before each use
137512cbf1dSJens Wiklander  * @relogged - true once client logged since last operation update
1382364aa69SRuchika Gupta  * @op_step - last active operation step - update, final or one-shot
139512cbf1dSJens Wiklander  * @tee_op_handle - handle on active crypto operation or TEE_HANDLE_NULL
140fb279d8bSVesa Jääskeläinen  * @tee_hash_algo - hash algorithm identifier.
141fb279d8bSVesa Jääskeläinen  * @tee_hash_op_handle - handle on active hashing crypto operation or
142fb279d8bSVesa Jääskeläinen  * TEE_HANDLE_NULL
143512cbf1dSJens Wiklander  * @extra_ctx - context for the active processing
144512cbf1dSJens Wiklander  */
145512cbf1dSJens Wiklander struct active_processing {
146512cbf1dSJens Wiklander 	enum pkcs11_proc_state state;
147512cbf1dSJens Wiklander 	uint32_t mecha_type;
1482364aa69SRuchika Gupta 	enum processing_step step;
149512cbf1dSJens Wiklander 	bool always_authen;
150512cbf1dSJens Wiklander 	bool relogged;
151512cbf1dSJens Wiklander 	TEE_OperationHandle tee_op_handle;
152fb279d8bSVesa Jääskeläinen 	uint32_t tee_hash_algo;
153fb279d8bSVesa Jääskeläinen 	TEE_OperationHandle tee_hash_op_handle;
154512cbf1dSJens Wiklander 	void *extra_ctx;
155512cbf1dSJens Wiklander };
156512cbf1dSJens Wiklander 
157512cbf1dSJens Wiklander /*
158dc99b202SRuchika Gupta  * Pkcs11 objects search context
159dc99b202SRuchika Gupta  *
160dc99b202SRuchika Gupta  * @attributes - matching attributes list searched (null if no search)
161dc99b202SRuchika Gupta  * @count - number of matching handle found
162dc99b202SRuchika Gupta  * @handles - array of handle of matching objects
163dc99b202SRuchika Gupta  * @next - index of the next object handle to return to C_FindObject
164dc99b202SRuchika Gupta  */
165dc99b202SRuchika Gupta struct pkcs11_find_objects {
166dc99b202SRuchika Gupta 	void *attributes;
167dc99b202SRuchika Gupta 	size_t count;
168dc99b202SRuchika Gupta 	uint32_t *handles;
169dc99b202SRuchika Gupta 	size_t next;
170dc99b202SRuchika Gupta };
171dc99b202SRuchika Gupta 
172dc99b202SRuchika Gupta /*
173e084583eSEtienne Carriere  * Structure tracking the PKCS#11 sessions
174e084583eSEtienne Carriere  *
175e084583eSEtienne Carriere  * @link - List of the session belonging to a client
176e084583eSEtienne Carriere  * @client - Client the session belongs to
177e084583eSEtienne Carriere  * @token - Token this session belongs to
178e084583eSEtienne Carriere  * @handle - Identifier of the session published to the client
179b56b3d07SJens Wiklander  * @object_list - Entry of the session objects list
180e084583eSEtienne Carriere  * @state - R/W SO, R/W user, RO user, R/W public, RO public.
181512cbf1dSJens Wiklander  * @processing - Reference to initialized processing context if any
182dc99b202SRuchika Gupta  * @find_ctx - Reference to active search context (null if no active search)
183e084583eSEtienne Carriere  */
184e084583eSEtienne Carriere struct pkcs11_session {
185e084583eSEtienne Carriere 	TAILQ_ENTRY(pkcs11_session) link;
186e084583eSEtienne Carriere 	struct pkcs11_client *client;
187e084583eSEtienne Carriere 	struct ck_token *token;
188512cbf1dSJens Wiklander 	enum pkcs11_mechanism_id handle;
189b56b3d07SJens Wiklander 	struct object_list object_list;
190e084583eSEtienne Carriere 	enum pkcs11_session_state state;
191512cbf1dSJens Wiklander 	struct active_processing *processing;
192dc99b202SRuchika Gupta 	struct pkcs11_find_objects *find_ctx;
193e084583eSEtienne Carriere };
194e084583eSEtienne Carriere 
195c84ccd0aSEtienne Carriere /* Initialize static token instance(s) from default/persistent database */
196c84ccd0aSEtienne Carriere TEE_Result pkcs11_init(void);
197c84ccd0aSEtienne Carriere void pkcs11_deinit(void);
198c84ccd0aSEtienne Carriere 
199d38f9635SEtienne Carriere /* Speculation safe lookup of token instance from token identifier */
200c84ccd0aSEtienne Carriere struct ck_token *get_token(unsigned int token_id);
201c84ccd0aSEtienne Carriere 
202c84ccd0aSEtienne Carriere /* Return token identified from token instance address */
203c84ccd0aSEtienne Carriere unsigned int get_token_id(struct ck_token *token);
204c84ccd0aSEtienne Carriere 
205bc555ee0SVesa Jääskeläinen /* Return client's (shared) object handle database associated with session */
206bc555ee0SVesa Jääskeläinen struct handle_db *get_object_handle_db(struct pkcs11_session *session);
207bc555ee0SVesa Jääskeläinen 
208c84ccd0aSEtienne Carriere /* Access to persistent database */
209c84ccd0aSEtienne Carriere struct ck_token *init_persistent_db(unsigned int token_id);
210e86828f4SJens Wiklander void update_persistent_db(struct ck_token *token);
211c84ccd0aSEtienne Carriere void close_persistent_db(struct ck_token *token);
212c84ccd0aSEtienne Carriere 
213fa1ac767SRobin van der Gracht /* Load and release persistent object attributes in memory */
214fa1ac767SRobin van der Gracht enum pkcs11_rc load_persistent_object_attributes(struct pkcs11_object *obj);
215fa1ac767SRobin van der Gracht void release_persistent_object_attributes(struct pkcs11_object *obj);
216402d884aSRuchika Gupta enum pkcs11_rc update_persistent_object_attributes(struct pkcs11_object *obj);
217fa1ac767SRobin van der Gracht 
218bef8bc68SJens Wiklander enum pkcs11_rc hash_pin(enum pkcs11_user_type user, const uint8_t *pin,
219bef8bc68SJens Wiklander 			size_t pin_size, uint32_t *salt,
220bef8bc68SJens Wiklander 			uint8_t hash[TEE_MAX_HASH_SIZE]);
221bef8bc68SJens Wiklander enum pkcs11_rc verify_pin(enum pkcs11_user_type user, const uint8_t *pin,
222bef8bc68SJens Wiklander 			  size_t pin_size, uint32_t salt,
223bef8bc68SJens Wiklander 			  const uint8_t hash[TEE_MAX_HASH_SIZE]);
224bef8bc68SJens Wiklander 
2251a27b197SVesa Jääskeläinen #if defined(CFG_PKCS11_TA_AUTH_TEE_IDENTITY)
2261a27b197SVesa Jääskeläinen enum pkcs11_rc setup_so_identity_auth_from_client(struct ck_token *token);
2271a27b197SVesa Jääskeläinen enum pkcs11_rc setup_identity_auth_from_pin(struct ck_token *token,
2281a27b197SVesa Jääskeläinen 					    enum pkcs11_user_type user_type,
2291a27b197SVesa Jääskeläinen 					    const uint8_t *pin,
2301a27b197SVesa Jääskeläinen 					    size_t pin_size);
2311a27b197SVesa Jääskeläinen enum pkcs11_rc verify_identity_auth(struct ck_token *token,
2321a27b197SVesa Jääskeläinen 				    enum pkcs11_user_type user_type);
2331a27b197SVesa Jääskeläinen #else
2341a27b197SVesa Jääskeläinen static inline enum pkcs11_rc
2351a27b197SVesa Jääskeläinen setup_so_identity_auth_from_client(struct ck_token *token __unused)
2361a27b197SVesa Jääskeläinen {
2371a27b197SVesa Jääskeläinen 	return PKCS11_CKR_PIN_INVALID;
2381a27b197SVesa Jääskeläinen }
2391a27b197SVesa Jääskeläinen 
2401a27b197SVesa Jääskeläinen static inline enum pkcs11_rc
2411a27b197SVesa Jääskeläinen setup_identity_auth_from_pin(struct ck_token *token __unused,
2421a27b197SVesa Jääskeläinen 			     enum pkcs11_user_type user_type __unused,
2431a27b197SVesa Jääskeläinen 			     const uint8_t *pin __unused,
2441a27b197SVesa Jääskeläinen 			     size_t pin_size __unused)
2451a27b197SVesa Jääskeläinen {
2461a27b197SVesa Jääskeläinen 	return PKCS11_CKR_PIN_INVALID;
2471a27b197SVesa Jääskeläinen }
2481a27b197SVesa Jääskeläinen 
2491a27b197SVesa Jääskeläinen static inline enum pkcs11_rc
2501a27b197SVesa Jääskeläinen verify_identity_auth(struct ck_token *token __unused,
2511a27b197SVesa Jääskeläinen 		     enum pkcs11_user_type user_type __unused)
2521a27b197SVesa Jääskeläinen {
2531a27b197SVesa Jääskeläinen 	return PKCS11_CKR_PIN_INCORRECT;
2541a27b197SVesa Jääskeläinen }
2551a27b197SVesa Jääskeläinen #endif /* CFG_PKCS11_TA_AUTH_TEE_IDENTITY */
2561a27b197SVesa Jääskeläinen 
257334316feSJens Wiklander /* Token persistent objects */
258334316feSJens Wiklander enum pkcs11_rc create_object_uuid(struct ck_token *token,
259334316feSJens Wiklander 				  struct pkcs11_object *obj);
260334316feSJens Wiklander void destroy_object_uuid(struct ck_token *token, struct pkcs11_object *obj);
261334316feSJens Wiklander enum pkcs11_rc unregister_persistent_object(struct ck_token *token,
262334316feSJens Wiklander 					    TEE_UUID *uuid);
263334316feSJens Wiklander enum pkcs11_rc register_persistent_object(struct ck_token *token,
264334316feSJens Wiklander 					  TEE_UUID *uuid);
265334316feSJens Wiklander enum pkcs11_rc get_persistent_objects_list(struct ck_token *token,
266334316feSJens Wiklander 					   TEE_UUID *array, size_t *size);
267334316feSJens Wiklander 
268e084583eSEtienne Carriere /*
269e084583eSEtienne Carriere  * Pkcs11 session support
270e084583eSEtienne Carriere  */
271bc555ee0SVesa Jääskeläinen struct session_list *get_session_list(struct pkcs11_session *session);
272e084583eSEtienne Carriere struct pkcs11_client *tee_session2client(void *tee_session);
273e084583eSEtienne Carriere struct pkcs11_client *register_client(void);
274e084583eSEtienne Carriere void unregister_client(struct pkcs11_client *client);
275e084583eSEtienne Carriere 
2766e4f8f17SEtienne Carriere struct pkcs11_session *pkcs11_handle2session(uint32_t handle,
2776e4f8f17SEtienne Carriere 					     struct pkcs11_client *client);
2786e4f8f17SEtienne Carriere 
279512cbf1dSJens Wiklander static inline bool session_is_active(struct pkcs11_session *session)
280512cbf1dSJens Wiklander {
281512cbf1dSJens Wiklander 	return session->processing;
282512cbf1dSJens Wiklander }
283512cbf1dSJens Wiklander 
284512cbf1dSJens Wiklander enum pkcs11_rc set_processing_state(struct pkcs11_session *session,
285512cbf1dSJens Wiklander 				    enum processing_func function,
286512cbf1dSJens Wiklander 				    struct pkcs11_object *obj1,
287512cbf1dSJens Wiklander 				    struct pkcs11_object *obj2);
288512cbf1dSJens Wiklander 
2896e4f8f17SEtienne Carriere static inline bool pkcs11_session_is_read_write(struct pkcs11_session *session)
2906e4f8f17SEtienne Carriere {
2916e4f8f17SEtienne Carriere 	return session->state == PKCS11_CKS_RW_PUBLIC_SESSION ||
2926e4f8f17SEtienne Carriere 	       session->state == PKCS11_CKS_RW_USER_FUNCTIONS ||
2936e4f8f17SEtienne Carriere 	       session->state == PKCS11_CKS_RW_SO_FUNCTIONS;
2946e4f8f17SEtienne Carriere }
2956e4f8f17SEtienne Carriere 
2966e4f8f17SEtienne Carriere static inline bool pkcs11_session_is_public(struct pkcs11_session *session)
2976e4f8f17SEtienne Carriere {
2986e4f8f17SEtienne Carriere 	return session->state == PKCS11_CKS_RO_PUBLIC_SESSION ||
2996e4f8f17SEtienne Carriere 	       session->state == PKCS11_CKS_RW_PUBLIC_SESSION;
3006e4f8f17SEtienne Carriere }
3016e4f8f17SEtienne Carriere 
3026e4f8f17SEtienne Carriere static inline bool pkcs11_session_is_user(struct pkcs11_session *session)
3036e4f8f17SEtienne Carriere {
3046e4f8f17SEtienne Carriere 	return session->state == PKCS11_CKS_RO_USER_FUNCTIONS ||
3056e4f8f17SEtienne Carriere 	       session->state == PKCS11_CKS_RW_USER_FUNCTIONS;
3066e4f8f17SEtienne Carriere }
3076e4f8f17SEtienne Carriere 
3086e4f8f17SEtienne Carriere static inline bool pkcs11_session_is_so(struct pkcs11_session *session)
3096e4f8f17SEtienne Carriere {
3106e4f8f17SEtienne Carriere 	return session->state == PKCS11_CKS_RW_SO_FUNCTIONS;
3116e4f8f17SEtienne Carriere }
3126e4f8f17SEtienne Carriere 
3136e4f8f17SEtienne Carriere static inline
314b56b3d07SJens Wiklander struct object_list *pkcs11_get_session_objects(struct pkcs11_session *session)
315b56b3d07SJens Wiklander {
316b56b3d07SJens Wiklander 	return &session->object_list;
317b56b3d07SJens Wiklander }
318b56b3d07SJens Wiklander 
319b56b3d07SJens Wiklander static inline
3206e4f8f17SEtienne Carriere struct ck_token *pkcs11_session2token(struct pkcs11_session *session)
3216e4f8f17SEtienne Carriere {
3226e4f8f17SEtienne Carriere 	return session->token;
3236e4f8f17SEtienne Carriere }
3246e4f8f17SEtienne Carriere 
325*bb5d1825SEtienne Carriere /* Invalidate any handle referring the object since the object no more exists */
326*bb5d1825SEtienne Carriere void token_invalidate_object_handles(struct pkcs11_object *obj);
327*bb5d1825SEtienne Carriere 
32822ac6984SEtienne Carriere /* Entry point for the TA commands */
3294daf39b3SJens Wiklander enum pkcs11_rc entry_ck_slot_list(uint32_t ptypes, TEE_Param *params);
3304daf39b3SJens Wiklander enum pkcs11_rc entry_ck_slot_info(uint32_t ptypes, TEE_Param *params);
3314daf39b3SJens Wiklander enum pkcs11_rc entry_ck_token_info(uint32_t ptypes, TEE_Param *params);
3324daf39b3SJens Wiklander enum pkcs11_rc entry_ck_token_mecha_ids(uint32_t ptypes, TEE_Param *params);
3334daf39b3SJens Wiklander enum pkcs11_rc entry_ck_token_mecha_info(uint32_t ptypes, TEE_Param *params);
3344daf39b3SJens Wiklander enum pkcs11_rc entry_ck_open_session(struct pkcs11_client *client,
3356e4f8f17SEtienne Carriere 				     uint32_t ptypes, TEE_Param *params);
3364daf39b3SJens Wiklander enum pkcs11_rc entry_ck_close_session(struct pkcs11_client *client,
3376e4f8f17SEtienne Carriere 				      uint32_t ptypes, TEE_Param *params);
3384daf39b3SJens Wiklander enum pkcs11_rc entry_ck_close_all_sessions(struct pkcs11_client *client,
3396e4f8f17SEtienne Carriere 					   uint32_t ptypes, TEE_Param *params);
3404daf39b3SJens Wiklander enum pkcs11_rc entry_ck_session_info(struct pkcs11_client *client,
3416e4f8f17SEtienne Carriere 				     uint32_t ptypes, TEE_Param *params);
3424daf39b3SJens Wiklander enum pkcs11_rc entry_ck_token_initialize(uint32_t ptypes, TEE_Param *params);
3434daf39b3SJens Wiklander enum pkcs11_rc entry_ck_init_pin(struct pkcs11_client *client,
344e8dbd92cSJens Wiklander 				 uint32_t ptypes, TEE_Param *params);
3454daf39b3SJens Wiklander enum pkcs11_rc entry_ck_set_pin(struct pkcs11_client *client,
3461dbb91e7SJens Wiklander 				uint32_t ptypes, TEE_Param *params);
3474daf39b3SJens Wiklander enum pkcs11_rc entry_ck_login(struct pkcs11_client *client,
348f7cc36c0SJens Wiklander 			      uint32_t ptypes, TEE_Param *params);
3494daf39b3SJens Wiklander enum pkcs11_rc entry_ck_logout(struct pkcs11_client *client,
350f7cc36c0SJens Wiklander 			       uint32_t ptypes, TEE_Param *params);
35122587dc4SVesa Jääskeläinen enum pkcs11_rc entry_ck_seed_random(struct pkcs11_client *client,
35222587dc4SVesa Jääskeläinen 				    uint32_t ptypes, TEE_Param *params);
35322587dc4SVesa Jääskeläinen enum pkcs11_rc entry_ck_generate_random(struct pkcs11_client *client,
35422587dc4SVesa Jääskeläinen 					uint32_t ptypes, TEE_Param *params);
35522ac6984SEtienne Carriere 
356c84ccd0aSEtienne Carriere #endif /*PKCS11_TA_PKCS11_TOKEN_H*/
357