]> git.ipfire.org Git - thirdparty/systemd.git/blame - src/shared/pkcs11-util.h
cryptenroll: change class in provided PKCS#11 URI if necessary
[thirdparty/systemd.git] / src / shared / pkcs11-util.h
CommitLineData
db9ecf05 1/* SPDX-License-Identifier: LGPL-2.1-or-later */
839fddbe
LP
2#pragma once
3
06b77382
VS
4#if HAVE_OPENSSL
5# include <openssl/x509.h>
6#endif
839fddbe
LP
7#include <stdbool.h>
8
9#if HAVE_P11KIT
b012a1f4
ZJS
10# include <p11-kit/p11-kit.h>
11# include <p11-kit/uri.h>
839fddbe
LP
12#endif
13
a758a128 14#include "ask-password-api.h"
839fddbe
LP
15#include "macro.h"
16#include "time-util.h"
17
18bool pkcs11_uri_valid(const char *uri);
19
20#if HAVE_P11KIT
da035a3a
LB
21
22extern char *(*sym_p11_kit_module_get_name)(CK_FUNCTION_LIST *module);
23extern void (*sym_p11_kit_modules_finalize_and_release)(CK_FUNCTION_LIST **modules);
24extern CK_FUNCTION_LIST **(*sym_p11_kit_modules_load_and_initialize)(int flags);
25extern const char *(*sym_p11_kit_strerror)(CK_RV rv);
26extern int (*sym_p11_kit_uri_format)(P11KitUri *uri, P11KitUriType uri_type, char **string);
27extern void (*sym_p11_kit_uri_free)(P11KitUri *uri);
28extern CK_ATTRIBUTE_PTR (*sym_p11_kit_uri_get_attributes)(P11KitUri *uri, CK_ULONG *n_attrs);
85828ef9
VS
29extern CK_ATTRIBUTE_PTR (*sym_p11_kit_uri_get_attribute)(P11KitUri *uri, CK_ATTRIBUTE_TYPE attr_type);
30extern int (*sym_p11_kit_uri_set_attribute)(P11KitUri *uri, CK_ATTRIBUTE_PTR attr);
da035a3a
LB
31extern CK_INFO_PTR (*sym_p11_kit_uri_get_module_info)(P11KitUri *uri);
32extern CK_SLOT_INFO_PTR (*sym_p11_kit_uri_get_slot_info)(P11KitUri *uri);
33extern CK_TOKEN_INFO_PTR (*sym_p11_kit_uri_get_token_info)(P11KitUri *uri);
34extern int (*sym_p11_kit_uri_match_token_info)(const P11KitUri *uri, const CK_TOKEN_INFO *token_info);
35extern const char *(*sym_p11_kit_uri_message)(int code);
36extern P11KitUri *(*sym_p11_kit_uri_new)(void);
37extern int (*sym_p11_kit_uri_parse)(const char *string, P11KitUriType uri_type, P11KitUri *uri);
38
839fddbe
LP
39int uri_from_string(const char *p, P11KitUri **ret);
40
41P11KitUri *uri_from_module_info(const CK_INFO *info);
42P11KitUri *uri_from_slot_info(const CK_SLOT_INFO *slot_info);
43P11KitUri *uri_from_token_info(const CK_TOKEN_INFO *token_info);
44
da035a3a
LB
45DEFINE_TRIVIAL_CLEANUP_FUNC_FULL(P11KitUri*, sym_p11_kit_uri_free, NULL);
46DEFINE_TRIVIAL_CLEANUP_FUNC_FULL(CK_FUNCTION_LIST**, sym_p11_kit_modules_finalize_and_release, NULL);
839fddbe
LP
47
48CK_RV pkcs11_get_slot_list_malloc(CK_FUNCTION_LIST *m, CK_SLOT_ID **ret_slotids, CK_ULONG *ret_n_slotids);
49
50char *pkcs11_token_label(const CK_TOKEN_INFO *token_info);
0eb3be46
LP
51char *pkcs11_token_manufacturer_id(const CK_TOKEN_INFO *token_info);
52char *pkcs11_token_model(const CK_TOKEN_INFO *token_info);
839fddbe 53
0ff60566 54int pkcs11_token_login_by_pin(CK_FUNCTION_LIST *m, CK_SESSION_HANDLE session, const CK_TOKEN_INFO *token_info, const char *token_label, const void *pin, size_t pin_size);
a758a128 55int pkcs11_token_login(CK_FUNCTION_LIST *m, CK_SESSION_HANDLE session, CK_SLOT_ID slotid, const CK_TOKEN_INFO *token_info, const char *friendly_name, const char *icon_name, const char *key_name, const char *credential_name, usec_t until, AskPasswordFlags ask_password_flags, bool headless, char **ret_used_pin);
839fddbe 56
06b77382 57int pkcs11_token_find_related_object(CK_FUNCTION_LIST *m, CK_SESSION_HANDLE session, CK_OBJECT_HANDLE prototype, CK_OBJECT_CLASS class, CK_OBJECT_HANDLE *ret_object);
839fddbe
LP
58int pkcs11_token_find_x509_certificate(CK_FUNCTION_LIST *m, CK_SESSION_HANDLE session, P11KitUri *search_uri, CK_OBJECT_HANDLE *ret_object);
59#if HAVE_OPENSSL
60int pkcs11_token_read_x509_certificate(CK_FUNCTION_LIST *m, CK_SESSION_HANDLE session, CK_OBJECT_HANDLE object, X509 **ret_cert);
61#endif
62
63int pkcs11_token_find_private_key(CK_FUNCTION_LIST *m, CK_SESSION_HANDLE session, P11KitUri *search_uri, CK_OBJECT_HANDLE *ret_object);
64int pkcs11_token_decrypt_data(CK_FUNCTION_LIST *m, CK_SESSION_HANDLE session, CK_OBJECT_HANDLE object, const void *encrypted_data, size_t encrypted_data_size, void **ret_decrypted_data, size_t *ret_decrypted_data_size);
65
66int pkcs11_token_acquire_rng(CK_FUNCTION_LIST *m, CK_SESSION_HANDLE session);
67
68typedef int (*pkcs11_find_token_callback_t)(CK_FUNCTION_LIST *m, CK_SESSION_HANDLE session, CK_SLOT_ID slotid, const CK_SLOT_INFO *slot_info, const CK_TOKEN_INFO *token_info, P11KitUri *uri, void *userdata);
69int pkcs11_find_token(const char *pkcs11_uri, pkcs11_find_token_callback_t callback, void *userdata);
2289a784
LP
70
71#if HAVE_OPENSSL
72int pkcs11_acquire_certificate(const char *uri, const char *askpw_friendly_name, const char *askpw_icon_name, X509 **ret_cert, char **ret_pin_used);
73#endif
74
ed3d3af1
OK
75typedef struct {
76 const char *friendly_name;
77 usec_t until;
78 void *encrypted_key;
79 size_t encrypted_key_size;
80 void *decrypted_key;
81 size_t decrypted_key_size;
82 bool free_encrypted_key;
83 bool headless;
a758a128 84 AskPasswordFlags askpw_flags;
ed3d3af1
OK
85} pkcs11_crypt_device_callback_data;
86
87void pkcs11_crypt_device_callback_data_release(pkcs11_crypt_device_callback_data *data);
88
89int pkcs11_crypt_device_callback(
90 CK_FUNCTION_LIST *m,
91 CK_SESSION_HANDLE session,
92 CK_SLOT_ID slot_id,
93 const CK_SLOT_INFO *slot_info,
94 const CK_TOKEN_INFO *token_info,
95 P11KitUri *uri,
96 void *userdata);
97
da035a3a
LB
98int dlopen_p11kit(void);
99
100#else
101
102static inline int dlopen_p11kit(void) {
103 return log_error_errno(SYNTHETIC_ERRNO(EOPNOTSUPP), "p11kit support is not compiled in.");
104}
105
839fddbe 106#endif
f240cbb6 107
8186022c
OK
108typedef struct {
109 const char *friendly_name;
110 usec_t until;
111 bool headless;
a758a128 112 AskPasswordFlags askpw_flags;
8186022c
OK
113} systemd_pkcs11_plugin_params;
114
f240cbb6
LP
115int pkcs11_list_tokens(void);
116int pkcs11_find_token_auto(char **ret);