xref: /optee_os/ta/pkcs11/src/token_capabilities.c (revision d92c3cdd90a00fd55d796d96a37a55b971818ad2)
18849c126SEtienne Carriere // SPDX-License-Identifier: BSD-2-Clause
28849c126SEtienne Carriere /*
38849c126SEtienne Carriere  * Copyright (c) 2017-2020, Linaro Limited
48849c126SEtienne Carriere  */
58849c126SEtienne Carriere 
68849c126SEtienne Carriere #include <assert.h>
78849c126SEtienne Carriere #include <pkcs11_ta.h>
88849c126SEtienne Carriere #include <string.h>
98849c126SEtienne Carriere #include <util.h>
108849c126SEtienne Carriere #include <tee_api.h>
118849c126SEtienne Carriere #include <tee_internal_api_extensions.h>
128849c126SEtienne Carriere 
138849c126SEtienne Carriere #include "pkcs11_helpers.h"
148849c126SEtienne Carriere #include "token_capabilities.h"
158849c126SEtienne Carriere 
168849c126SEtienne Carriere #define ALLOWED_PKCS11_CKFM	\
178849c126SEtienne Carriere 	(PKCS11_CKFM_ENCRYPT | PKCS11_CKFM_DECRYPT |		\
188849c126SEtienne Carriere 	 PKCS11_CKFM_DERIVE | PKCS11_CKFM_DIGEST |		\
198849c126SEtienne Carriere 	 PKCS11_CKFM_SIGN | PKCS11_CKFM_SIGN_RECOVER |		\
208849c126SEtienne Carriere 	 PKCS11_CKFM_VERIFY | PKCS11_CKFM_VERIFY_RECOVER |	\
218849c126SEtienne Carriere 	 PKCS11_CKFM_GENERATE |	PKCS11_CKFM_GENERATE_KEY_PAIR |	\
228849c126SEtienne Carriere 	 PKCS11_CKFM_WRAP | PKCS11_CKFM_UNWRAP)
238849c126SEtienne Carriere 
248849c126SEtienne Carriere /*
258849c126SEtienne Carriere  * Definition of supported processings for a PKCS#11 mechanisms
268849c126SEtienne Carriere  * @id: Mechanism ID
278849c126SEtienne Carriere  * @flags: Valid PKCS11_CKFM_* for a mechanism as per PKCS#11
288849c126SEtienne Carriere  * @one_shot: true of mechanism can be used for a one-short processing
298849c126SEtienne Carriere  * @string: Helper string of the mechanism ID for debug purpose
308849c126SEtienne Carriere  */
318849c126SEtienne Carriere struct pkcs11_mechachism_modes {
328849c126SEtienne Carriere 	uint32_t id;
338849c126SEtienne Carriere 	uint32_t flags;
348849c126SEtienne Carriere 	bool one_shot;
358849c126SEtienne Carriere #if CFG_TEE_TA_LOG_LEVEL > 0
368849c126SEtienne Carriere 	const char *string;
378849c126SEtienne Carriere #endif
388849c126SEtienne Carriere };
398849c126SEtienne Carriere 
408849c126SEtienne Carriere #if CFG_TEE_TA_LOG_LEVEL > 0
418849c126SEtienne Carriere #define MECHANISM(_label, _flags, _single_part)	\
428849c126SEtienne Carriere 	{					\
438849c126SEtienne Carriere 		.id = _label,			\
448849c126SEtienne Carriere 		.one_shot = (_single_part),	\
458849c126SEtienne Carriere 		.flags = (_flags),		\
468849c126SEtienne Carriere 		.string = #_label,		\
478849c126SEtienne Carriere 	}
488849c126SEtienne Carriere #else
498849c126SEtienne Carriere #define MECHANISM(_label, _flags, _single_part)	\
508849c126SEtienne Carriere 	{					\
518849c126SEtienne Carriere 		.id = _label,			\
528849c126SEtienne Carriere 		.one_shot = (_single_part),	\
538849c126SEtienne Carriere 		.flags = (_flags),		\
548849c126SEtienne Carriere 	}
558849c126SEtienne Carriere #endif
568849c126SEtienne Carriere 
578849c126SEtienne Carriere #define SINGLE_PART_ONLY	true
588849c126SEtienne Carriere #define ANY_PART		false
598849c126SEtienne Carriere 
60512cbf1dSJens Wiklander #define CKFM_CIPHER		(PKCS11_CKFM_ENCRYPT | PKCS11_CKFM_DECRYPT)
61512cbf1dSJens Wiklander #define CKFM_WRAP_UNWRAP	(PKCS11_CKFM_WRAP | PKCS11_CKFM_UNWRAP)
62512cbf1dSJens Wiklander #define CKFM_CIPHER_WRAP	(CKFM_CIPHER | CKFM_WRAP_UNWRAP)
63512cbf1dSJens Wiklander #define CKFM_CIPHER_WRAP_DERIVE	(CKFM_CIPHER_WRAP | PKCS11_CKFM_DERIVE)
64512cbf1dSJens Wiklander #define CKFM_AUTH_NO_RECOVER	(PKCS11_CKFM_SIGN | PKCS11_CKFM_VERIFY)
65512cbf1dSJens Wiklander #define CKFM_AUTH_WITH_RECOVER	(PKCS11_CKFM_SIGN_RECOVER | \
66512cbf1dSJens Wiklander 				 PKCS11_CKFM_VERIFY_RECOVER)
67512cbf1dSJens Wiklander 
688849c126SEtienne Carriere /* PKCS#11 specificies permitted operation for each mechanism  */
698849c126SEtienne Carriere static const struct pkcs11_mechachism_modes pkcs11_modes[] = {
70512cbf1dSJens Wiklander 	/* AES */
71512cbf1dSJens Wiklander 	MECHANISM(PKCS11_CKM_AES_ECB, CKFM_CIPHER_WRAP, ANY_PART),
72512cbf1dSJens Wiklander 	MECHANISM(PKCS11_CKM_AES_CBC, CKFM_CIPHER_WRAP, ANY_PART),
73512cbf1dSJens Wiklander 	MECHANISM(PKCS11_CKM_AES_CBC_PAD, CKFM_CIPHER_WRAP, ANY_PART),
74512cbf1dSJens Wiklander 	MECHANISM(PKCS11_CKM_AES_CTS, CKFM_CIPHER_WRAP, ANY_PART),
75512cbf1dSJens Wiklander 	MECHANISM(PKCS11_CKM_AES_CTR, CKFM_CIPHER_WRAP, ANY_PART),
76512cbf1dSJens Wiklander 	MECHANISM(PKCS11_CKM_AES_ECB_ENCRYPT_DATA, PKCS11_CKFM_DERIVE,
778849c126SEtienne Carriere 		  ANY_PART),
78512cbf1dSJens Wiklander 	MECHANISM(PKCS11_CKM_AES_CBC_ENCRYPT_DATA, PKCS11_CKFM_DERIVE,
79512cbf1dSJens Wiklander 		  ANY_PART),
80512cbf1dSJens Wiklander 	MECHANISM(PKCS11_CKM_AES_KEY_GEN, PKCS11_CKFM_GENERATE, ANY_PART),
81689f4e5bSRuchika Gupta 	/* HMAC */
82689f4e5bSRuchika Gupta 	MECHANISM(PKCS11_CKM_MD5_HMAC, CKFM_AUTH_NO_RECOVER, ANY_PART),
83689f4e5bSRuchika Gupta 	MECHANISM(PKCS11_CKM_SHA_1_HMAC, CKFM_AUTH_NO_RECOVER, ANY_PART),
84689f4e5bSRuchika Gupta 	MECHANISM(PKCS11_CKM_SHA224_HMAC, CKFM_AUTH_NO_RECOVER, ANY_PART),
85689f4e5bSRuchika Gupta 	MECHANISM(PKCS11_CKM_SHA256_HMAC, CKFM_AUTH_NO_RECOVER, ANY_PART),
86689f4e5bSRuchika Gupta 	MECHANISM(PKCS11_CKM_SHA384_HMAC, CKFM_AUTH_NO_RECOVER, ANY_PART),
87689f4e5bSRuchika Gupta 	MECHANISM(PKCS11_CKM_SHA512_HMAC, CKFM_AUTH_NO_RECOVER, ANY_PART),
888849c126SEtienne Carriere };
898849c126SEtienne Carriere 
908849c126SEtienne Carriere #if CFG_TEE_TA_LOG_LEVEL > 0
918849c126SEtienne Carriere const char *mechanism_string_id(enum pkcs11_mechanism_id id)
928849c126SEtienne Carriere {
938849c126SEtienne Carriere 	const size_t offset = sizeof("PKCS11_CKM_") - 1;
948849c126SEtienne Carriere 	size_t n = 0;
958849c126SEtienne Carriere 
968849c126SEtienne Carriere 	for (n = 0; n < ARRAY_SIZE(pkcs11_modes); n++)
978849c126SEtienne Carriere 		if (pkcs11_modes[n].id == id)
988849c126SEtienne Carriere 			return pkcs11_modes[n].string + offset;
998849c126SEtienne Carriere 
1008849c126SEtienne Carriere 	return "Unknown ID";
1018849c126SEtienne Carriere }
1028849c126SEtienne Carriere #endif /*CFG_TEE_TA_LOG_LEVEL*/
1038849c126SEtienne Carriere 
1048849c126SEtienne Carriere /*
1058849c126SEtienne Carriere  * Return true if @id is a valid mechanism ID
1068849c126SEtienne Carriere  */
1078849c126SEtienne Carriere bool mechanism_is_valid(enum pkcs11_mechanism_id id)
1088849c126SEtienne Carriere {
1098849c126SEtienne Carriere 	size_t n = 0;
1108849c126SEtienne Carriere 
1118849c126SEtienne Carriere 	for (n = 0; n < ARRAY_SIZE(pkcs11_modes); n++)
1128849c126SEtienne Carriere 		if (id == pkcs11_modes[n].id)
1138849c126SEtienne Carriere 			return true;
1148849c126SEtienne Carriere 
1158849c126SEtienne Carriere 	return false;
1168849c126SEtienne Carriere }
1178849c126SEtienne Carriere 
1188849c126SEtienne Carriere /*
1198849c126SEtienne Carriere  * Return true if mechanism ID is valid and flags matches PKCS#11 compliancy
1208849c126SEtienne Carriere  */
1218849c126SEtienne Carriere bool __maybe_unused mechanism_flags_complies_pkcs11(uint32_t mechanism_type,
1228849c126SEtienne Carriere 						    uint32_t flags)
1238849c126SEtienne Carriere {
1248849c126SEtienne Carriere 	size_t n = 0;
1258849c126SEtienne Carriere 
1268849c126SEtienne Carriere 	assert((flags & ~ALLOWED_PKCS11_CKFM) == 0);
1278849c126SEtienne Carriere 
1288849c126SEtienne Carriere 	for (n = 0; n < ARRAY_SIZE(pkcs11_modes); n++) {
1298849c126SEtienne Carriere 		if (pkcs11_modes[n].id == mechanism_type) {
1308849c126SEtienne Carriere 			if (flags & ~pkcs11_modes[n].flags)
1318849c126SEtienne Carriere 				EMSG("%s flags: 0x%"PRIx32" vs 0x%"PRIx32,
1328849c126SEtienne Carriere 				     id2str_mechanism(mechanism_type),
1338849c126SEtienne Carriere 				     flags, pkcs11_modes[n].flags);
1348849c126SEtienne Carriere 
1358849c126SEtienne Carriere 			return (flags & ~pkcs11_modes[n].flags) == 0;
1368849c126SEtienne Carriere 		}
1378849c126SEtienne Carriere 	}
1388849c126SEtienne Carriere 
1398849c126SEtienne Carriere 	/* Mechanism ID unexpectedly not found */
1408849c126SEtienne Carriere 	return false;
1418849c126SEtienne Carriere }
1428849c126SEtienne Carriere 
143512cbf1dSJens Wiklander bool mechanism_is_one_shot_only(uint32_t mechanism_type)
144512cbf1dSJens Wiklander {
145512cbf1dSJens Wiklander 	size_t n = 0;
146512cbf1dSJens Wiklander 
147512cbf1dSJens Wiklander 	for (n = 0; n < ARRAY_SIZE(pkcs11_modes); n++)
148512cbf1dSJens Wiklander 		if (pkcs11_modes[n].id == mechanism_type)
149512cbf1dSJens Wiklander 			return pkcs11_modes[n].one_shot;
150512cbf1dSJens Wiklander 
151512cbf1dSJens Wiklander 	/* Mechanism ID unexpectedly not found */
152512cbf1dSJens Wiklander 	TEE_Panic(PKCS11_RV_NOT_FOUND);
153512cbf1dSJens Wiklander 	/* Dummy return to keep compiler happy */
154512cbf1dSJens Wiklander 	return false;
155512cbf1dSJens Wiklander }
156512cbf1dSJens Wiklander 
157512cbf1dSJens Wiklander /*
158512cbf1dSJens Wiklander  * Field single_part_only is unused from array token_mechanism[], hence
159512cbf1dSJens Wiklander  * simply use ANY_PART for all mechanism there.
160512cbf1dSJens Wiklander  */
161512cbf1dSJens Wiklander #define TA_MECHANISM(_label, _flags)	MECHANISM((_label), (_flags), ANY_PART)
162512cbf1dSJens Wiklander 
1638849c126SEtienne Carriere /*
1648849c126SEtienne Carriere  * Arrays that centralizes the IDs and processing flags for mechanisms
1658849c126SEtienne Carriere  * supported by each embedded token. Currently none.
1668849c126SEtienne Carriere  */
1678849c126SEtienne Carriere const struct pkcs11_mechachism_modes token_mechanism[] = {
168512cbf1dSJens Wiklander 	TA_MECHANISM(PKCS11_CKM_AES_ECB, CKFM_CIPHER),
169512cbf1dSJens Wiklander 	TA_MECHANISM(PKCS11_CKM_AES_CBC, CKFM_CIPHER),
170512cbf1dSJens Wiklander 	TA_MECHANISM(PKCS11_CKM_AES_CBC_PAD, CKFM_CIPHER),
171512cbf1dSJens Wiklander 	TA_MECHANISM(PKCS11_CKM_AES_CTR, CKFM_CIPHER),
172512cbf1dSJens Wiklander 	TA_MECHANISM(PKCS11_CKM_AES_CTS, CKFM_CIPHER),
173512cbf1dSJens Wiklander 	TA_MECHANISM(PKCS11_CKM_AES_ECB_ENCRYPT_DATA, PKCS11_CKFM_DERIVE),
174512cbf1dSJens Wiklander 	TA_MECHANISM(PKCS11_CKM_AES_CBC_ENCRYPT_DATA, PKCS11_CKFM_DERIVE),
175689f4e5bSRuchika Gupta 	TA_MECHANISM(PKCS11_CKM_MD5_HMAC, CKFM_AUTH_NO_RECOVER),
176689f4e5bSRuchika Gupta 	TA_MECHANISM(PKCS11_CKM_SHA_1_HMAC, CKFM_AUTH_NO_RECOVER),
177689f4e5bSRuchika Gupta 	TA_MECHANISM(PKCS11_CKM_SHA224_HMAC, CKFM_AUTH_NO_RECOVER),
178689f4e5bSRuchika Gupta 	TA_MECHANISM(PKCS11_CKM_SHA256_HMAC, CKFM_AUTH_NO_RECOVER),
179689f4e5bSRuchika Gupta 	TA_MECHANISM(PKCS11_CKM_SHA384_HMAC, CKFM_AUTH_NO_RECOVER),
180689f4e5bSRuchika Gupta 	TA_MECHANISM(PKCS11_CKM_SHA512_HMAC, CKFM_AUTH_NO_RECOVER),
1818849c126SEtienne Carriere };
1828849c126SEtienne Carriere 
1838849c126SEtienne Carriere /*
1848849c126SEtienne Carriere  * tee_malloc_mechanism_array - Allocate and fill array of supported mechanisms
1858849c126SEtienne Carriere  * @count: [in] [out] Pointer to number of mechanism IDs in client resource
1868849c126SEtienne Carriere  * Return allocated array of the supported mechanism IDs
1878849c126SEtienne Carriere  *
1888849c126SEtienne Carriere  * Allocates array with 32bit cells mechanism IDs for the supported ones only
1898849c126SEtienne Carriere  * if *@count covers number mechanism IDs exposed.
1908849c126SEtienne Carriere  */
1918849c126SEtienne Carriere uint32_t *tee_malloc_mechanism_list(size_t *out_count)
1928849c126SEtienne Carriere {
1938849c126SEtienne Carriere 	size_t n = 0;
1948849c126SEtienne Carriere 	size_t count = 0;
1958849c126SEtienne Carriere 	uint32_t *array = NULL;
1968849c126SEtienne Carriere 
1978849c126SEtienne Carriere 	for (n = 0; n < ARRAY_SIZE(token_mechanism); n++)
1988849c126SEtienne Carriere 		if (token_mechanism[n].flags)
1998849c126SEtienne Carriere 			count++;
2008849c126SEtienne Carriere 
2018849c126SEtienne Carriere 	if (*out_count >= count)
2028849c126SEtienne Carriere 		array = TEE_Malloc(count * sizeof(*array),
2038849c126SEtienne Carriere 				   TEE_USER_MEM_HINT_NO_FILL_ZERO);
2048849c126SEtienne Carriere 
2058849c126SEtienne Carriere 	*out_count = count;
2068849c126SEtienne Carriere 
2078849c126SEtienne Carriere 	if (!array)
2088849c126SEtienne Carriere 		return NULL;
2098849c126SEtienne Carriere 
2108849c126SEtienne Carriere 	for (n = 0; n < ARRAY_SIZE(token_mechanism); n++) {
2118849c126SEtienne Carriere 		if (token_mechanism[n].flags) {
2128849c126SEtienne Carriere 			count--;
2138849c126SEtienne Carriere 			array[count] = token_mechanism[n].id;
2148849c126SEtienne Carriere 		}
2158849c126SEtienne Carriere 	}
2168849c126SEtienne Carriere 	assert(!count);
2178849c126SEtienne Carriere 
2188849c126SEtienne Carriere 	return array;
2198849c126SEtienne Carriere }
2208849c126SEtienne Carriere 
2218849c126SEtienne Carriere uint32_t mechanism_supported_flags(enum pkcs11_mechanism_id id)
2228849c126SEtienne Carriere {
2238849c126SEtienne Carriere 	size_t n = 0;
2248849c126SEtienne Carriere 
2258849c126SEtienne Carriere 	for (n = 0; n < ARRAY_SIZE(token_mechanism); n++) {
2268849c126SEtienne Carriere 		if (id == token_mechanism[n].id) {
2278849c126SEtienne Carriere 			uint32_t flags = token_mechanism[n].flags;
2288849c126SEtienne Carriere 
2298849c126SEtienne Carriere 			assert(mechanism_flags_complies_pkcs11(id, flags));
2308849c126SEtienne Carriere 			return flags;
2318849c126SEtienne Carriere 		}
2328849c126SEtienne Carriere 	}
2338849c126SEtienne Carriere 
2348849c126SEtienne Carriere 	return 0;
2358849c126SEtienne Carriere }
236512cbf1dSJens Wiklander 
237512cbf1dSJens Wiklander void mechanism_supported_key_sizes(uint32_t proc_id, uint32_t *min_key_size,
238512cbf1dSJens Wiklander 				   uint32_t *max_key_size)
239512cbf1dSJens Wiklander {
240512cbf1dSJens Wiklander 	switch (proc_id) {
241689f4e5bSRuchika Gupta 	case PKCS11_CKM_MD5_HMAC:
242*d92c3cddSRuchika Gupta 		*min_key_size = 8;
243*d92c3cddSRuchika Gupta 		*max_key_size = 64;
244689f4e5bSRuchika Gupta 		break;
245689f4e5bSRuchika Gupta 	case PKCS11_CKM_SHA_1_HMAC:
246*d92c3cddSRuchika Gupta 		*min_key_size = 10;
247*d92c3cddSRuchika Gupta 		*max_key_size = 64;
248689f4e5bSRuchika Gupta 		break;
249689f4e5bSRuchika Gupta 	case PKCS11_CKM_SHA224_HMAC:
250*d92c3cddSRuchika Gupta 		*min_key_size = 14;
251*d92c3cddSRuchika Gupta 		*max_key_size = 64;
252689f4e5bSRuchika Gupta 		break;
253689f4e5bSRuchika Gupta 	case PKCS11_CKM_SHA256_HMAC:
254*d92c3cddSRuchika Gupta 		*min_key_size = 24;
255*d92c3cddSRuchika Gupta 		*max_key_size = 128;
256689f4e5bSRuchika Gupta 		break;
257689f4e5bSRuchika Gupta 	case PKCS11_CKM_SHA384_HMAC:
258*d92c3cddSRuchika Gupta 		*min_key_size = 32;
259*d92c3cddSRuchika Gupta 		*max_key_size = 128;
260689f4e5bSRuchika Gupta 		break;
261689f4e5bSRuchika Gupta 	case PKCS11_CKM_SHA512_HMAC:
262*d92c3cddSRuchika Gupta 		*min_key_size = 32;
263*d92c3cddSRuchika Gupta 		*max_key_size = 128;
264689f4e5bSRuchika Gupta 		break;
265512cbf1dSJens Wiklander 	case PKCS11_CKM_AES_KEY_GEN:
266512cbf1dSJens Wiklander 	case PKCS11_CKM_AES_ECB:
267512cbf1dSJens Wiklander 	case PKCS11_CKM_AES_CBC:
268512cbf1dSJens Wiklander 	case PKCS11_CKM_AES_CBC_PAD:
269512cbf1dSJens Wiklander 	case PKCS11_CKM_AES_CTR:
270512cbf1dSJens Wiklander 	case PKCS11_CKM_AES_CTS:
271512cbf1dSJens Wiklander 		*min_key_size = 16;
272512cbf1dSJens Wiklander 		*max_key_size = 32;
273512cbf1dSJens Wiklander 		break;
274512cbf1dSJens Wiklander 	default:
275512cbf1dSJens Wiklander 		*min_key_size = 0;
276512cbf1dSJens Wiklander 		*max_key_size = 0;
277512cbf1dSJens Wiklander 		break;
278512cbf1dSJens Wiklander 	}
279512cbf1dSJens Wiklander }
280