1 /* SPDX-License-Identifier: GPL-2.0+ */
3 * Copyright IBM Corp. 2019
4 * Author(s): Harald Freudenberger <freude@linux.ibm.com>
6 * Collection of EP11 misc functions used by zcrypt and pkey
9 #ifndef _ZCRYPT_EP11MISC_H_
10 #define _ZCRYPT_EP11MISC_H_
12 #include <asm/zcrypt.h>
15 #define EP11_API_V 4 /* highest known and supported EP11 API version */
16 #define EP11_STRUCT_MAGIC 0x1234
17 #define EP11_BLOB_PKEY_EXTRACTABLE 0x00200000
20 * Internal used values for the version field of the key header.
21 * Should match to the enum pkey_key_type in pkey.h.
23 #define TOKVER_EP11_AES 0x03 /* EP11 AES key blob (old style) */
24 #define TOKVER_EP11_AES_WITH_HEADER 0x06 /* EP11 AES key blob with header */
25 #define TOKVER_EP11_ECC_WITH_HEADER 0x07 /* EP11 ECC key blob with header */
27 /* inside view of an EP11 secure key blob */
31 /* only used for PKEY_TYPE_EP11: */
33 u8 type
; /* 0x00 (TOKTYPE_NON_CCA) */
35 u16 len
; /* total length in bytes of this blob */
36 u8 version
; /* 0x03 (TOKVER_EP11_AES) */
38 u16 keybitlen
; /* clear key bit len, 0 for unknown */
41 u8 wkvp
[16]; /* wrapping key verification pattern */
42 u64 attr
; /* boolean key attributes */
43 u64 mode
; /* mode bits */
44 u16 version
; /* 0x1234, EP11_STRUCT_MAGIC */
46 u8 encrypted_key_data
[144];
50 /* check ep11 key magic to find out if this is an ep11 key blob */
51 static inline bool is_ep11_keyblob(const u8
*key
)
53 struct ep11keyblob
*kb
= (struct ep11keyblob
*) key
;
55 return (kb
->version
== EP11_STRUCT_MAGIC
);
59 * Simple check if the key blob is a valid EP11 AES key blob with header.
60 * If checkcpacfexport is enabled, the key is also checked for the
61 * attributes needed to export this key for CPACF use.
62 * Returns 0 on success or errno value on failure.
64 int ep11_check_aes_key_with_hdr(debug_info_t
*dbg
, int dbflvl
,
65 const u8
*key
, size_t keylen
, int checkcpacfexp
);
68 * Simple check if the key blob is a valid EP11 ECC key blob with header.
69 * If checkcpacfexport is enabled, the key is also checked for the
70 * attributes needed to export this key for CPACF use.
71 * Returns 0 on success or errno value on failure.
73 int ep11_check_ecc_key_with_hdr(debug_info_t
*dbg
, int dbflvl
,
74 const u8
*key
, size_t keylen
, int checkcpacfexp
);
77 * Simple check if the key blob is a valid EP11 AES key blob with
78 * the header in the session field (old style EP11 AES key).
79 * If checkcpacfexport is enabled, the key is also checked for the
80 * attributes needed to export this key for CPACF use.
81 * Returns 0 on success or errno value on failure.
83 int ep11_check_aes_key(debug_info_t
*dbg
, int dbflvl
,
84 const u8
*key
, size_t keylen
, int checkcpacfexp
);
86 /* EP11 card info struct */
87 struct ep11_card_info
{
88 u32 API_ord_nr
; /* API ordinal number */
89 u16 FW_version
; /* Firmware major and minor version */
90 char serial
[16]; /* serial number string (16 ascii, no 0x00 !) */
91 u64 op_mode
; /* card operational mode(s) */
94 /* EP11 domain info struct */
95 struct ep11_domain_info
{
96 char cur_wk_state
; /* '0' invalid, '1' valid */
97 char new_wk_state
; /* '0' empty, '1' uncommitted, '2' committed */
98 u8 cur_wkvp
[32]; /* current wrapping key verification pattern */
99 u8 new_wkvp
[32]; /* new wrapping key verification pattern */
100 u64 op_mode
; /* domain operational mode(s) */
104 * Provide information about an EP11 card.
106 int ep11_get_card_info(u16 card
, struct ep11_card_info
*info
, int verify
);
109 * Provide information about a domain within an EP11 card.
111 int ep11_get_domain_info(u16 card
, u16 domain
, struct ep11_domain_info
*info
);
114 * Generate (random) EP11 AES secure key.
116 int ep11_genaeskey(u16 card
, u16 domain
, u32 keybitsize
, u32 keygenflags
,
117 u8
*keybuf
, size_t *keybufsize
);
120 * Generate EP11 AES secure key with given clear key value.
122 int ep11_clr2keyblob(u16 cardnr
, u16 domain
, u32 keybitsize
, u32 keygenflags
,
123 const u8
*clrkey
, u8
*keybuf
, size_t *keybufsize
);
126 * Build a list of ep11 apqns meeting the following constrains:
127 * - apqn is online and is in fact an EP11 apqn
128 * - if cardnr is not FFFF only apqns with this cardnr
129 * - if domain is not FFFF only apqns with this domainnr
130 * - if minhwtype > 0 only apqns with hwtype >= minhwtype
131 * - if minapi > 0 only apqns with API_ord_nr >= minapi
132 * - if wkvp != NULL only apqns where the wkvp (EP11_WKVPLEN bytes) matches
133 * to the first EP11_WKVPLEN bytes of the wkvp of the current wrapping
134 * key for this domain. When a wkvp is given there will aways be a re-fetch
135 * of the domain info for the potential apqn - so this triggers an request
136 * reply to each apqn eligible.
137 * The array of apqn entries is allocated with kmalloc and returned in *apqns;
138 * the number of apqns stored into the list is returned in *nr_apqns. One apqn
139 * entry is simple a 32 bit value with 16 bit cardnr and 16 bit domain nr and
140 * may be casted to struct pkey_apqn. The return value is either 0 for success
141 * or a negative errno value. If no apqn meeting the criterias is found,
142 * -ENODEV is returned.
144 int ep11_findcard2(u32
**apqns
, u32
*nr_apqns
, u16 cardnr
, u16 domain
,
145 int minhwtype
, int minapi
, const u8
*wkvp
);
148 * Derive proteced key from EP11 key blob (AES and ECC keys).
150 int ep11_kblob2protkey(u16 card
, u16 dom
, const u8
*key
, size_t keylen
,
151 u8
*protkey
, u32
*protkeylen
, u32
*protkeytype
);
153 void zcrypt_ep11misc_exit(void);
155 #endif /* _ZCRYPT_EP11MISC_H_ */