Botan 3.9.0
Crypto and TLS for C&
Botan::PKCS11::MechanismWrapper Class Referencefinal

#include <p11_mechanism.h>

Classes

union  MechanismParameters

Public Member Functions

Mechanismdata () const
MechanismType mechanism_type () const
 MechanismWrapper (MechanismType mechanism_type)
size_t padding_size () const
void set_ecdh_other_key (const uint8_t other_key[], size_t other_key_len)
void set_ecdh_salt (const uint8_t salt[], size_t salt_len)

Static Public Member Functions

static MechanismWrapper create_ecdh_mechanism (std::string_view params)
static MechanismWrapper create_ecdsa_mechanism (std::string_view hash)
static MechanismWrapper create_rsa_crypt_mechanism (std::string_view padding)
static MechanismWrapper create_rsa_sign_mechanism (std::string_view padding)

Detailed Description

Simple class to build and hold the data for a CK_MECHANISM struct for RSA (encryption/decryption, signature/verification) and EC (ECDSA signature/verification, ECDH key derivation).

Definition at line 25 of file p11_mechanism.h.

Constructor & Destructor Documentation

◆ MechanismWrapper()

Botan::PKCS11::MechanismWrapper::MechanismWrapper ( MechanismType mechanism_type)
explicit
Parameters
mechanism_typethe CK_MECHANISM_TYPE for the mechanism field of the CK_MECHANISM struct

Definition at line 115 of file p11_mechanism.cpp.

115 :
116 m_mechanism({static_cast<CK_MECHANISM_TYPE>(mechanism_type), nullptr, 0}), m_parameters(nullptr) {}
MechanismType mechanism_type() const
CK_ULONG CK_MECHANISM_TYPE
Definition pkcs11t.h:583

References mechanism_type().

Referenced by create_ecdh_mechanism(), create_ecdsa_mechanism(), create_rsa_crypt_mechanism(), and create_rsa_sign_mechanism().

Member Function Documentation

◆ create_ecdh_mechanism()

MechanismWrapper Botan::PKCS11::MechanismWrapper::create_ecdh_mechanism ( std::string_view params)
static

Creates the CK_MECHANISM data for ECDH key derivation (CKM_ECDH1_DERIVE or CKM_ECDH1_COFACTOR_DERIVE)

Parameters
paramsspecifies the key derivation function to use. Supported KDFs are Raw and SHA-1 to SHA-512. Params can also include the string "Cofactor" if the cofactor key derivation mechanism should be used, for example "SHA-512,Cofactor"

Definition at line 276 of file p11_mechanism.cpp.

276 {
277 // note: when updating this map, update the documentation for `MechanismWrapper::create_ecdh_mechanism`
278 static const std::map<std::string_view, KeyDerivation> EcdhHash = {{"Raw", KeyDerivation::Null},
279 {"SHA-1", KeyDerivation::Sha1Kdf},
280 {"SHA-224", KeyDerivation::Sha224Kdf},
281 {"SHA-256", KeyDerivation::Sha256Kdf},
282 {"SHA-384", KeyDerivation::Sha384Kdf},
283 {"SHA-512", KeyDerivation::Sha512Kdf}};
284
285 std::vector<std::string> param_parts = split_on(params, ',');
286
287 if(param_parts.empty() || param_parts.size() > 2) {
288 throw Invalid_Argument(fmt("PKCS #11 ECDH key derivation bad params {}", params));
289 }
290
291 const bool use_cofactor =
292 (param_parts[0] == "Cofactor") || (param_parts.size() == 2 && param_parts[1] == "Cofactor");
293
294 std::string kdf_name = (param_parts[0] == "Cofactor" ? param_parts[1] : param_parts[0]);
295 std::string hash = kdf_name;
296
297 if(kdf_name != "Raw") {
298 SCAN_Name kdf_hash(kdf_name);
299
300 if(kdf_hash.arg_count() > 0) {
301 hash = kdf_hash.arg(0);
302 }
303 }
304
305 auto kdf = EcdhHash.find(hash);
306 if(kdf == EcdhHash.end()) {
307 throw Lookup_Error("PKCS#11 ECDH key derivation does not support KDF " + kdf_name);
308 }
310 mech.m_parameters = std::make_shared<MechanismParameters>();
311 mech.m_parameters->ecdh_params.kdf = static_cast<CK_EC_KDF_TYPE>(kdf->second);
312 mech.m_mechanism.pParameter = mech.m_parameters.get();
313 mech.m_mechanism.ulParameterLen = sizeof(Ecdh1DeriveParams);
314 return mech;
315}
MechanismWrapper(MechanismType mechanism_type)
CK_ECDH1_DERIVE_PARAMS Ecdh1DeriveParams
Definition p11.h:839
std::string fmt(std::string_view format, const T &... args)
Definition fmt.h:53
std::vector< std::string > split_on(std::string_view str, char delim)
Definition parsing.cpp:111
CK_ULONG CK_EC_KDF_TYPE
Definition pkcs11t.h:1287

References Botan::SCAN_Name::arg(), Botan::SCAN_Name::arg_count(), Botan::PKCS11::Ecdh1CofactorDerive, Botan::PKCS11::Ecdh1Derive, Botan::fmt(), MechanismWrapper(), Botan::PKCS11::Null, CK_MECHANISM::pParameter, Botan::PKCS11::Sha1Kdf, Botan::PKCS11::Sha224Kdf, Botan::PKCS11::Sha256Kdf, Botan::PKCS11::Sha384Kdf, Botan::PKCS11::Sha512Kdf, Botan::split_on(), and CK_MECHANISM::ulParameterLen.

◆ create_ecdsa_mechanism()

MechanismWrapper Botan::PKCS11::MechanismWrapper::create_ecdsa_mechanism ( std::string_view hash)
static

Creates the CK_MECHANISM data for ECDSA signature/verification

Parameters
hashthe hash algorithm used to hash the data to sign. supported hash functions are Raw and SHA-1 to SHA-512

Definition at line 249 of file p11_mechanism.cpp.

249 {
250 // note: when updating this map, update the documentation for `MechanismWrapper::create_ecdsa_mechanism`
251 static const std::map<std::string_view, MechanismType> EcdsaHash = {{"Raw", MechanismType::Ecdsa},
252 {"SHA-1", MechanismType::EcdsaSha1},
253 {"SHA-224", MechanismType::EcdsaSha224},
254 {"SHA-256", MechanismType::EcdsaSha256},
255 {"SHA-384", MechanismType::EcdsaSha384},
256 {"SHA-512", MechanismType::EcdsaSha512}};
257
258 const std::string hash_spec(hash_spec_view);
259 auto mechanism = EcdsaHash.find(hash_spec);
260 if(mechanism != EcdsaHash.end()) {
261 return MechanismWrapper(mechanism->second);
262 }
263
264 SCAN_Name req(hash_spec);
265
266 if(req.algo_name() == "EMSA1" && req.arg_count() == 1) {
267 mechanism = EcdsaHash.find(req.arg(0));
268 if(mechanism != EcdsaHash.end()) {
269 return MechanismWrapper(mechanism->second);
270 }
271 }
272
273 throw Lookup_Error(fmt("PKCS #11 ECDSA sign/verify does not support {}", hash_spec));
274}

References Botan::SCAN_Name::algo_name(), Botan::SCAN_Name::arg(), Botan::SCAN_Name::arg_count(), Botan::PKCS11::Ecdsa, Botan::PKCS11::EcdsaSha1, Botan::PKCS11::EcdsaSha224, Botan::PKCS11::EcdsaSha256, Botan::PKCS11::EcdsaSha384, Botan::PKCS11::EcdsaSha512, Botan::fmt(), and MechanismWrapper().

◆ create_rsa_crypt_mechanism()

MechanismWrapper Botan::PKCS11::MechanismWrapper::create_rsa_crypt_mechanism ( std::string_view padding)
static

Creates the CK_MECHANISM data for RSA encryption/decryption

Parameters
paddingsupported paddings are Raw (X.509), EME-PKCS1-v1_5 (PKCS#1 v1.5) and OAEP (PKCS#1 OAEP)

Definition at line 118 of file p11_mechanism.cpp.

118 {
119 // note: when updating this map, update the documentation for `MechanismWrapper::create_rsa_crypt_mechanism`
120 static const std::map<std::string_view, RSA_CryptMechanism> CryptMechanisms = {
121 {"Raw", RSA_CryptMechanism(MechanismType::RsaX509, 0)},
122 // TODO(Botan4) Remove this
123 {"EME-PKCS1-v1_5", RSA_CryptMechanism(MechanismType::RsaPkcs, 11)},
124 {"PKCS1v15", RSA_CryptMechanism(MechanismType::RsaPkcs, 11)},
125 {"OAEP(SHA-1)", RSA_CryptMechanism(MechanismType::RsaPkcsOaep, 2 + 2 * 20, MechanismType::Sha1, MGF::Mgf1Sha1)},
126 {"OAEP(SHA-224)",
127 RSA_CryptMechanism(MechanismType::RsaPkcsOaep, 2 + 2 * 28, MechanismType::Sha224, MGF::Mgf1Sha224)},
128 {"OAEP(SHA-256)",
129 RSA_CryptMechanism(MechanismType::RsaPkcsOaep, 2 + 2 * 32, MechanismType::Sha256, MGF::Mgf1Sha256)},
130 {"OAEP(SHA-384)",
131 RSA_CryptMechanism(MechanismType::RsaPkcsOaep, 2 + 2 * 48, MechanismType::Sha384, MGF::Mgf1Sha384)},
132 {"OAEP(SHA-512)",
133 RSA_CryptMechanism(MechanismType::RsaPkcsOaep, 2 + 2 * 64, MechanismType::Sha512, MGF::Mgf1Sha512)}};
134
135 auto mechanism_info_it = CryptMechanisms.find(padding);
136 if(mechanism_info_it == CryptMechanisms.end()) {
137 // at this point it would be possible to support additional configurations that are not predefined above by parsing `padding`
138 throw Lookup_Error(fmt("PKCS#11 RSA encrypt/decrypt does not support padding with '{}'", padding));
139 }
140 RSA_CryptMechanism mechanism_info = mechanism_info_it->second;
141
142 MechanismWrapper mech(mechanism_info.type());
143 if(mechanism_info.type() == MechanismType::RsaPkcsOaep) {
144 mech.m_parameters = std::make_shared<MechanismParameters>();
145 mech.m_parameters->oaep_params.hashAlg = static_cast<CK_MECHANISM_TYPE>(mechanism_info.hash());
146 mech.m_parameters->oaep_params.mgf = static_cast<CK_RSA_PKCS_MGF_TYPE>(mechanism_info.mgf());
147 mech.m_parameters->oaep_params.source = CKZ_DATA_SPECIFIED;
148 mech.m_parameters->oaep_params.pSourceData = nullptr;
149 mech.m_parameters->oaep_params.ulSourceDataLen = 0;
150 mech.m_mechanism.pParameter = mech.m_parameters.get();
151 mech.m_mechanism.ulParameterLen = sizeof(RsaPkcsOaepParams);
152 }
153 mech.m_padding_size = mechanism_info.padding_size();
154 return mech;
155}
CK_RSA_PKCS_OAEP_PARAMS RsaPkcsOaepParams
Definition p11.h:837
#define CKZ_DATA_SPECIFIED
Definition pkcs11t.h:1261
CK_ULONG CK_RSA_PKCS_MGF_TYPE
Definition pkcs11t.h:1241

References CKZ_DATA_SPECIFIED, Botan::fmt(), MechanismWrapper(), Botan::PKCS11::Mgf1Sha1, Botan::PKCS11::Mgf1Sha224, Botan::PKCS11::Mgf1Sha256, Botan::PKCS11::Mgf1Sha384, Botan::PKCS11::Mgf1Sha512, CK_MECHANISM::pParameter, Botan::PKCS11::RsaPkcs, Botan::PKCS11::RsaPkcsOaep, Botan::PKCS11::RsaX509, Botan::PKCS11::Sha1, Botan::PKCS11::Sha224, Botan::PKCS11::Sha256, Botan::PKCS11::Sha384, Botan::PKCS11::Sha512, and CK_MECHANISM::ulParameterLen.

◆ create_rsa_sign_mechanism()

MechanismWrapper Botan::PKCS11::MechanismWrapper::create_rsa_sign_mechanism ( std::string_view padding)
static

Creates the CK_MECHANISM data for RSA signature/verification

Parameters
paddingsupported paddings are Raw (X.509), EMSA3 (PKCS#1 v1.5), EMSA4 (PKCS#1 PSS), EMSA2 (ANSI X9.31) and ISO9796 (ISO/IEC 9796)

Definition at line 157 of file p11_mechanism.cpp.

157 {
158 // note: when updating this map, update the documentation for `MechanismWrapper::create_rsa_sign_mechanism`
159 static const std::map<std::string_view, RSA_SignMechanism> SignMechanisms = {
160 {"Raw", RSA_SignMechanism(MechanismType::RsaX509)},
161
162 // X9.31
163 {"X9.31(Raw)", RSA_SignMechanism(MechanismType::RsaX931)},
164 {"X9.31(SHA-1)", RSA_SignMechanism(MechanismType::Sha1RsaX931)},
165
166 // RSASSA PKCS#1 v1.5
167 {"PKCS1v15(SHA-1)", RSA_SignMechanism(MechanismType::Sha1RsaPkcs)},
168 {"PKCS1v15(SHA-224)", RSA_SignMechanism(MechanismType::Sha224RsaPkcs)},
169 {"PKCS1v15(SHA-256)", RSA_SignMechanism(MechanismType::Sha256RsaPkcs)},
170 {"PKCS1v15(SHA-384)", RSA_SignMechanism(MechanismType::Sha384RsaPkcs)},
171 {"PKCS1v15(SHA-512)", RSA_SignMechanism(MechanismType::Sha512RsaPkcs)},
172
173 // PSS PKCS#1 v2.0
174 {"PSS(Raw)", RSA_SignMechanism(MechanismType::RsaPkcsPss)},
175
176 {"PSS(SHA-1)", RSA_SignMechanism(MechanismType::Sha1RsaPkcsPss)},
177 {"PSS(SHA-1,MGF1,20)", RSA_SignMechanism(MechanismType::Sha1RsaPkcsPss)},
178
179 {"PSS(SHA-224)", RSA_SignMechanism(MechanismType::Sha224RsaPkcsPss)},
180 {"PSS(SHA-224,MGF1,24)", RSA_SignMechanism(MechanismType::Sha224RsaPkcsPss)},
181
182 {"PSS(SHA-256)", RSA_SignMechanism(MechanismType::Sha256RsaPkcsPss)},
183 {"PSS(SHA-256,MGF1,32)", RSA_SignMechanism(MechanismType::Sha256RsaPkcsPss)},
184
185 {"PSS(SHA-384)", RSA_SignMechanism(MechanismType::Sha384RsaPkcsPss)},
186 {"PSS(SHA-384,MGF1,48)", RSA_SignMechanism(MechanismType::Sha384RsaPkcsPss)},
187
188 {"PSS(SHA-512)", RSA_SignMechanism(MechanismType::Sha512RsaPkcsPss)},
189 {"PSS(SHA-512,MGF1,64)", RSA_SignMechanism(MechanismType::Sha512RsaPkcsPss)},
190
191 // ISO 9796 - this is the obsolete and insecure DS1 scheme, not the PSS-based DS2/DS3
192 // TODO(Botan4) remove this
193 {"ISO9796", RSA_SignMechanism(MechanismType::Rsa9796)},
194
195 // Deprecated aliases
196 // TODO(Botan4) remove these
197 {"EMSA2(Raw)", RSA_SignMechanism(MechanismType::RsaX931)},
198 {"EMSA2(SHA-1)", RSA_SignMechanism(MechanismType::Sha1RsaX931)},
199
200 {"EMSA3(Raw)", RSA_SignMechanism(MechanismType::RsaPkcs)},
201 {"EMSA3(SHA-1)", RSA_SignMechanism(MechanismType::Sha1RsaPkcs)},
202 {"EMSA3(SHA-224)", RSA_SignMechanism(MechanismType::Sha224RsaPkcs)},
203 {"EMSA3(SHA-256)", RSA_SignMechanism(MechanismType::Sha256RsaPkcs)},
204 {"EMSA3(SHA-384)", RSA_SignMechanism(MechanismType::Sha384RsaPkcs)},
205 {"EMSA3(SHA-512)", RSA_SignMechanism(MechanismType::Sha512RsaPkcs)},
206
207 {"EMSA_PKCS1(SHA-1)", RSA_SignMechanism(MechanismType::Sha1RsaPkcs)},
208 {"EMSA_PKCS1(SHA-224)", RSA_SignMechanism(MechanismType::Sha224RsaPkcs)},
209 {"EMSA_PKCS1(SHA-256)", RSA_SignMechanism(MechanismType::Sha256RsaPkcs)},
210 {"EMSA_PKCS1(SHA-384)", RSA_SignMechanism(MechanismType::Sha384RsaPkcs)},
211 {"EMSA_PKCS1(SHA-512)", RSA_SignMechanism(MechanismType::Sha512RsaPkcs)},
212
213 {"EMSA4(Raw)", RSA_SignMechanism(MechanismType::RsaPkcsPss)},
214 {"EMSA4(SHA-1)", RSA_SignMechanism(MechanismType::Sha1RsaPkcsPss)},
215 {"EMSA4(SHA-224)", RSA_SignMechanism(MechanismType::Sha224RsaPkcsPss)},
216
217 {"EMSA4(SHA-256)", RSA_SignMechanism(MechanismType::Sha256RsaPkcsPss)},
218 {"EMSA4(SHA-256,MGF1,32)", RSA_SignMechanism(MechanismType::Sha256RsaPkcsPss)},
219 {"PSSR(SHA-256,MGF1,32)", RSA_SignMechanism(MechanismType::Sha256RsaPkcsPss)},
220
221 {"EMSA4(SHA-384)", RSA_SignMechanism(MechanismType::Sha384RsaPkcsPss)},
222 {"EMSA4(SHA-384,MGF1,48)", RSA_SignMechanism(MechanismType::Sha384RsaPkcsPss)},
223 {"PSSR(SHA-384,MGF1,48)", RSA_SignMechanism(MechanismType::Sha384RsaPkcsPss)},
224
225 {"EMSA4(SHA-512)", RSA_SignMechanism(MechanismType::Sha512RsaPkcsPss)},
226 {"EMSA4(SHA-512,MGF1,64)", RSA_SignMechanism(MechanismType::Sha512RsaPkcsPss)},
227 {"PSSR(SHA-512,MGF1,64)", RSA_SignMechanism(MechanismType::Sha512RsaPkcsPss)},
228 };
229
230 auto mechanism_info_it = SignMechanisms.find(padding);
231 if(mechanism_info_it == SignMechanisms.end()) {
232 // at this point it would be possible to support additional configurations that are not predefined above by parsing `padding`
233 throw Lookup_Error(fmt("PKCS#11 RSA sign/verify does not support padding with '{}'", padding));
234 }
235 RSA_SignMechanism mechanism_info = mechanism_info_it->second;
236
237 MechanismWrapper mech(mechanism_info.type());
238 if(PssOptions().contains(mechanism_info.type())) {
239 mech.m_parameters = std::make_shared<MechanismParameters>();
240 mech.m_parameters->pss_params.hashAlg = static_cast<CK_MECHANISM_TYPE>(mechanism_info.hash());
241 mech.m_parameters->pss_params.mgf = static_cast<CK_RSA_PKCS_MGF_TYPE>(mechanism_info.mgf());
242 mech.m_parameters->pss_params.sLen = static_cast<Ulong>(mechanism_info.salt_size());
243 mech.m_mechanism.pParameter = mech.m_parameters.get();
244 mech.m_mechanism.ulParameterLen = sizeof(RsaPkcsPssParams);
245 }
246 return mech;
247}
CK_ULONG Ulong
Definition p11.h:825
CK_RSA_PKCS_PSS_PARAMS RsaPkcsPssParams
Definition p11.h:838

References Botan::fmt(), MechanismWrapper(), CK_MECHANISM::pParameter, Botan::PKCS11::Rsa9796, Botan::PKCS11::RsaPkcs, Botan::PKCS11::RsaPkcsPss, Botan::PKCS11::RsaX509, Botan::PKCS11::RsaX931, Botan::PKCS11::Sha1RsaPkcs, Botan::PKCS11::Sha1RsaPkcsPss, Botan::PKCS11::Sha1RsaX931, Botan::PKCS11::Sha224RsaPkcs, Botan::PKCS11::Sha224RsaPkcsPss, Botan::PKCS11::Sha256RsaPkcs, Botan::PKCS11::Sha256RsaPkcsPss, Botan::PKCS11::Sha384RsaPkcs, Botan::PKCS11::Sha384RsaPkcsPss, Botan::PKCS11::Sha512RsaPkcs, Botan::PKCS11::Sha512RsaPkcsPss, and CK_MECHANISM::ulParameterLen.

◆ data()

Mechanism * Botan::PKCS11::MechanismWrapper::data ( ) const
inline
Returns
a pointer to the CK_MECHANISM struct that can be passed to the cryptoki functions

Definition at line 80 of file p11_mechanism.h.

80{ return const_cast<Mechanism*>(&m_mechanism); }
CK_MECHANISM Mechanism
Definition p11.h:828

◆ mechanism_type()

MechanismType Botan::PKCS11::MechanismWrapper::mechanism_type ( ) const
inline

Definition at line 82 of file p11_mechanism.h.

82{ return static_cast<MechanismType>(m_mechanism.mechanism); }

Referenced by MechanismWrapper().

◆ padding_size()

size_t Botan::PKCS11::MechanismWrapper::padding_size ( ) const
inline
Returns
the size of the padding in bytes (for encryption/decryption)

Definition at line 85 of file p11_mechanism.h.

85{ return m_padding_size; }

◆ set_ecdh_other_key()

void Botan::PKCS11::MechanismWrapper::set_ecdh_other_key ( const uint8_t other_key[],
size_t other_key_len )
inline

Sets the public key of the other party for the ECDH mechanism parameters.

Parameters
other_keykey of the other party
other_key_lensize of the key of the other party in bytes

Definition at line 74 of file p11_mechanism.h.

74 {
75 m_parameters->ecdh_params.pPublicData = const_cast<uint8_t*>(other_key);
76 m_parameters->ecdh_params.ulPublicDataLen = static_cast<Ulong>(other_key_len);
77 }

◆ set_ecdh_salt()

void Botan::PKCS11::MechanismWrapper::set_ecdh_salt ( const uint8_t salt[],
size_t salt_len )
inline

Sets the salt for the ECDH mechanism parameters.

Parameters
saltthe salt
salt_lensize of the salt in bytes

Definition at line 64 of file p11_mechanism.h.

64 {
65 m_parameters->ecdh_params.pSharedData = const_cast<uint8_t*>(salt);
66 m_parameters->ecdh_params.ulSharedDataLen = static_cast<Ulong>(salt_len);
67 }

The documentation for this class was generated from the following files: