]> git.ipfire.org Git - thirdparty/systemd.git/blame - src/shared/pkcs11-util.h
tree-wide: switch dlopen hooks over to DLSYM_PROTOTYPE()/DLSYM_FUNCTION()
[thirdparty/systemd.git] / src / shared / pkcs11-util.h
CommitLineData
db9ecf05 1/* SPDX-License-Identifier: LGPL-2.1-or-later */
839fddbe
LP
2#pragma once
3
06b77382 4#if HAVE_OPENSSL
85686b37 5# include <openssl/evp.h>
06b77382
VS
6# include <openssl/x509.h>
7#endif
839fddbe
LP
8#include <stdbool.h>
9
10#if HAVE_P11KIT
b012a1f4
ZJS
11# include <p11-kit/p11-kit.h>
12# include <p11-kit/uri.h>
839fddbe
LP
13#endif
14
a758a128 15#include "ask-password-api.h"
9dbabd0a 16#include "dlfcn-util.h"
839fddbe
LP
17#include "macro.h"
18#include "time-util.h"
19
20bool pkcs11_uri_valid(const char *uri);
21
22#if HAVE_P11KIT
9dbabd0a
LP
23DLSYM_PROTOTYPE(p11_kit_module_get_name);
24DLSYM_PROTOTYPE(p11_kit_modules_finalize_and_release);
25DLSYM_PROTOTYPE(p11_kit_modules_load_and_initialize);
26DLSYM_PROTOTYPE(p11_kit_strerror);
27DLSYM_PROTOTYPE(p11_kit_uri_format);
28DLSYM_PROTOTYPE(p11_kit_uri_free);
29DLSYM_PROTOTYPE(p11_kit_uri_get_attributes);
30DLSYM_PROTOTYPE(p11_kit_uri_get_attribute);
31DLSYM_PROTOTYPE(p11_kit_uri_set_attribute);
32DLSYM_PROTOTYPE(p11_kit_uri_get_module_info);
33DLSYM_PROTOTYPE(p11_kit_uri_get_slot_info);
34DLSYM_PROTOTYPE(p11_kit_uri_get_token_info);
35DLSYM_PROTOTYPE(p11_kit_uri_match_token_info);
36DLSYM_PROTOTYPE(p11_kit_uri_message);
37DLSYM_PROTOTYPE(p11_kit_uri_new);
38DLSYM_PROTOTYPE(p11_kit_uri_parse);
da035a3a 39
839fddbe
LP
40int uri_from_string(const char *p, P11KitUri **ret);
41
42P11KitUri *uri_from_module_info(const CK_INFO *info);
43P11KitUri *uri_from_slot_info(const CK_SLOT_INFO *slot_info);
44P11KitUri *uri_from_token_info(const CK_TOKEN_INFO *token_info);
45
da035a3a
LB
46DEFINE_TRIVIAL_CLEANUP_FUNC_FULL(P11KitUri*, sym_p11_kit_uri_free, NULL);
47DEFINE_TRIVIAL_CLEANUP_FUNC_FULL(CK_FUNCTION_LIST**, sym_p11_kit_modules_finalize_and_release, NULL);
839fddbe
LP
48
49CK_RV pkcs11_get_slot_list_malloc(CK_FUNCTION_LIST *m, CK_SLOT_ID **ret_slotids, CK_ULONG *ret_n_slotids);
50
51char *pkcs11_token_label(const CK_TOKEN_INFO *token_info);
0eb3be46
LP
52char *pkcs11_token_manufacturer_id(const CK_TOKEN_INFO *token_info);
53char *pkcs11_token_model(const CK_TOKEN_INFO *token_info);
839fddbe 54
0ff60566 55int pkcs11_token_login_by_pin(CK_FUNCTION_LIST *m, CK_SESSION_HANDLE session, const CK_TOKEN_INFO *token_info, const char *token_label, const void *pin, size_t pin_size);
b2ac9280 56int pkcs11_token_login(CK_FUNCTION_LIST *m, CK_SESSION_HANDLE session, CK_SLOT_ID slotid, const CK_TOKEN_INFO *token_info, const char *friendly_name, const char *icon_name, const char *key_name, const char *credential_name, usec_t until, AskPasswordFlags ask_password_flags, char **ret_used_pin);
839fddbe 57
06b77382 58int pkcs11_token_find_related_object(CK_FUNCTION_LIST *m, CK_SESSION_HANDLE session, CK_OBJECT_HANDLE prototype, CK_OBJECT_CLASS class, CK_OBJECT_HANDLE *ret_object);
839fddbe
LP
59int pkcs11_token_find_x509_certificate(CK_FUNCTION_LIST *m, CK_SESSION_HANDLE session, P11KitUri *search_uri, CK_OBJECT_HANDLE *ret_object);
60#if HAVE_OPENSSL
85686b37 61int pkcs11_token_read_public_key(CK_FUNCTION_LIST *m, CK_SESSION_HANDLE session, CK_OBJECT_HANDLE object, EVP_PKEY **ret_pkey);
839fddbe
LP
62int pkcs11_token_read_x509_certificate(CK_FUNCTION_LIST *m, CK_SESSION_HANDLE session, CK_OBJECT_HANDLE object, X509 **ret_cert);
63#endif
64
65int pkcs11_token_find_private_key(CK_FUNCTION_LIST *m, CK_SESSION_HANDLE session, P11KitUri *search_uri, CK_OBJECT_HANDLE *ret_object);
66int pkcs11_token_decrypt_data(CK_FUNCTION_LIST *m, CK_SESSION_HANDLE session, CK_OBJECT_HANDLE object, const void *encrypted_data, size_t encrypted_data_size, void **ret_decrypted_data, size_t *ret_decrypted_data_size);
67
68int pkcs11_token_acquire_rng(CK_FUNCTION_LIST *m, CK_SESSION_HANDLE session);
69
70typedef int (*pkcs11_find_token_callback_t)(CK_FUNCTION_LIST *m, CK_SESSION_HANDLE session, CK_SLOT_ID slotid, const CK_SLOT_INFO *slot_info, const CK_TOKEN_INFO *token_info, P11KitUri *uri, void *userdata);
71int pkcs11_find_token(const char *pkcs11_uri, pkcs11_find_token_callback_t callback, void *userdata);
2289a784
LP
72
73#if HAVE_OPENSSL
b2ac9280 74int pkcs11_acquire_public_key(const char *uri, const char *askpw_friendly_name, const char *askpw_icon, const char *askpw_credential, AskPasswordFlags askpw_flags, EVP_PKEY **ret_pkey, char **ret_pin_used);
2289a784
LP
75#endif
76
ed3d3af1
OK
77typedef struct {
78 const char *friendly_name;
79 usec_t until;
80 void *encrypted_key;
81 size_t encrypted_key_size;
82 void *decrypted_key;
83 size_t decrypted_key_size;
84 bool free_encrypted_key;
a96c284f 85 const char *askpw_credential;
a758a128 86 AskPasswordFlags askpw_flags;
ed3d3af1
OK
87} pkcs11_crypt_device_callback_data;
88
89void pkcs11_crypt_device_callback_data_release(pkcs11_crypt_device_callback_data *data);
90
91int pkcs11_crypt_device_callback(
92 CK_FUNCTION_LIST *m,
93 CK_SESSION_HANDLE session,
94 CK_SLOT_ID slot_id,
95 const CK_SLOT_INFO *slot_info,
96 const CK_TOKEN_INFO *token_info,
97 P11KitUri *uri,
98 void *userdata);
99
da035a3a
LB
100int dlopen_p11kit(void);
101
102#else
103
104static inline int dlopen_p11kit(void) {
105 return log_error_errno(SYNTHETIC_ERRNO(EOPNOTSUPP), "p11kit support is not compiled in.");
106}
107
839fddbe 108#endif
f240cbb6 109
8186022c
OK
110typedef struct {
111 const char *friendly_name;
112 usec_t until;
1c12daa4 113 const char *askpw_credential;
a758a128 114 AskPasswordFlags askpw_flags;
8186022c
OK
115} systemd_pkcs11_plugin_params;
116
f240cbb6
LP
117int pkcs11_list_tokens(void);
118int pkcs11_find_token_auto(char **ret);