blob: 49a50154fd708c18d6726e1c26a38d17ac6f3967 [file] [log] [blame]
// SPDX-License-Identifier: BSD-2-Clause
/*
* Copyright (c) 2017-2020, Linaro Limited
*/
#include <ck_debug.h>
#include <pkcs11.h>
#include <stdio.h>
#include <string.h>
#include <stdlib.h>
#include "local_utils.h"
#define CK2STR_ENTRY(id) case id: return #id
const char *ckr2str(CK_RV id)
{
switch (id) {
CK2STR_ENTRY(CKR_OK);
CK2STR_ENTRY(CKR_CANCEL);
CK2STR_ENTRY(CKR_HOST_MEMORY);
CK2STR_ENTRY(CKR_SLOT_ID_INVALID);
CK2STR_ENTRY(CKR_GENERAL_ERROR);
CK2STR_ENTRY(CKR_FUNCTION_FAILED);
CK2STR_ENTRY(CKR_ARGUMENTS_BAD);
CK2STR_ENTRY(CKR_NO_EVENT);
CK2STR_ENTRY(CKR_NEED_TO_CREATE_THREADS);
CK2STR_ENTRY(CKR_CANT_LOCK);
CK2STR_ENTRY(CKR_ATTRIBUTE_READ_ONLY);
CK2STR_ENTRY(CKR_ATTRIBUTE_SENSITIVE);
CK2STR_ENTRY(CKR_ATTRIBUTE_TYPE_INVALID);
CK2STR_ENTRY(CKR_ATTRIBUTE_VALUE_INVALID);
CK2STR_ENTRY(CKR_ACTION_PROHIBITED);
CK2STR_ENTRY(CKR_DATA_INVALID);
CK2STR_ENTRY(CKR_DATA_LEN_RANGE);
CK2STR_ENTRY(CKR_DEVICE_ERROR);
CK2STR_ENTRY(CKR_DEVICE_MEMORY);
CK2STR_ENTRY(CKR_DEVICE_REMOVED);
CK2STR_ENTRY(CKR_ENCRYPTED_DATA_INVALID);
CK2STR_ENTRY(CKR_ENCRYPTED_DATA_LEN_RANGE);
CK2STR_ENTRY(CKR_FUNCTION_CANCELED);
CK2STR_ENTRY(CKR_FUNCTION_NOT_PARALLEL);
CK2STR_ENTRY(CKR_FUNCTION_NOT_SUPPORTED);
CK2STR_ENTRY(CKR_KEY_HANDLE_INVALID);
CK2STR_ENTRY(CKR_KEY_SIZE_RANGE);
CK2STR_ENTRY(CKR_KEY_TYPE_INCONSISTENT);
CK2STR_ENTRY(CKR_KEY_NOT_NEEDED);
CK2STR_ENTRY(CKR_KEY_CHANGED);
CK2STR_ENTRY(CKR_KEY_NEEDED);
CK2STR_ENTRY(CKR_KEY_INDIGESTIBLE);
CK2STR_ENTRY(CKR_KEY_FUNCTION_NOT_PERMITTED);
CK2STR_ENTRY(CKR_KEY_NOT_WRAPPABLE);
CK2STR_ENTRY(CKR_KEY_UNEXTRACTABLE);
CK2STR_ENTRY(CKR_MECHANISM_INVALID);
CK2STR_ENTRY(CKR_MECHANISM_PARAM_INVALID);
CK2STR_ENTRY(CKR_OBJECT_HANDLE_INVALID);
CK2STR_ENTRY(CKR_OPERATION_ACTIVE);
CK2STR_ENTRY(CKR_OPERATION_NOT_INITIALIZED);
CK2STR_ENTRY(CKR_PIN_INCORRECT);
CK2STR_ENTRY(CKR_PIN_INVALID);
CK2STR_ENTRY(CKR_PIN_LEN_RANGE);
CK2STR_ENTRY(CKR_PIN_EXPIRED);
CK2STR_ENTRY(CKR_PIN_LOCKED);
CK2STR_ENTRY(CKR_SESSION_CLOSED);
CK2STR_ENTRY(CKR_SESSION_COUNT);
CK2STR_ENTRY(CKR_SESSION_HANDLE_INVALID);
CK2STR_ENTRY(CKR_SESSION_PARALLEL_NOT_SUPPORTED);
CK2STR_ENTRY(CKR_SESSION_READ_ONLY);
CK2STR_ENTRY(CKR_SESSION_EXISTS);
CK2STR_ENTRY(CKR_SESSION_READ_ONLY_EXISTS);
CK2STR_ENTRY(CKR_SESSION_READ_WRITE_SO_EXISTS);
CK2STR_ENTRY(CKR_SIGNATURE_INVALID);
CK2STR_ENTRY(CKR_SIGNATURE_LEN_RANGE);
CK2STR_ENTRY(CKR_TEMPLATE_INCOMPLETE);
CK2STR_ENTRY(CKR_TEMPLATE_INCONSISTENT);
CK2STR_ENTRY(CKR_TOKEN_NOT_PRESENT);
CK2STR_ENTRY(CKR_TOKEN_NOT_RECOGNIZED);
CK2STR_ENTRY(CKR_TOKEN_WRITE_PROTECTED);
CK2STR_ENTRY(CKR_UNWRAPPING_KEY_HANDLE_INVALID);
CK2STR_ENTRY(CKR_UNWRAPPING_KEY_SIZE_RANGE);
CK2STR_ENTRY(CKR_UNWRAPPING_KEY_TYPE_INCONSISTENT);
CK2STR_ENTRY(CKR_USER_ALREADY_LOGGED_IN);
CK2STR_ENTRY(CKR_USER_NOT_LOGGED_IN);
CK2STR_ENTRY(CKR_USER_PIN_NOT_INITIALIZED);
CK2STR_ENTRY(CKR_USER_TYPE_INVALID);
CK2STR_ENTRY(CKR_USER_ANOTHER_ALREADY_LOGGED_IN);
CK2STR_ENTRY(CKR_USER_TOO_MANY_TYPES);
CK2STR_ENTRY(CKR_WRAPPED_KEY_INVALID);
CK2STR_ENTRY(CKR_WRAPPED_KEY_LEN_RANGE);
CK2STR_ENTRY(CKR_WRAPPING_KEY_HANDLE_INVALID);
CK2STR_ENTRY(CKR_WRAPPING_KEY_SIZE_RANGE);
CK2STR_ENTRY(CKR_WRAPPING_KEY_TYPE_INCONSISTENT);
CK2STR_ENTRY(CKR_RANDOM_SEED_NOT_SUPPORTED);
CK2STR_ENTRY(CKR_RANDOM_NO_RNG);
CK2STR_ENTRY(CKR_DOMAIN_PARAMS_INVALID);
CK2STR_ENTRY(CKR_CURVE_NOT_SUPPORTED);
CK2STR_ENTRY(CKR_BUFFER_TOO_SMALL);
CK2STR_ENTRY(CKR_SAVED_STATE_INVALID);
CK2STR_ENTRY(CKR_INFORMATION_SENSITIVE);
CK2STR_ENTRY(CKR_STATE_UNSAVEABLE);
CK2STR_ENTRY(CKR_CRYPTOKI_NOT_INITIALIZED);
CK2STR_ENTRY(CKR_CRYPTOKI_ALREADY_INITIALIZED);
CK2STR_ENTRY(CKR_MUTEX_BAD);
CK2STR_ENTRY(CKR_MUTEX_NOT_LOCKED);
CK2STR_ENTRY(CKR_NEW_PIN_MODE);
CK2STR_ENTRY(CKR_NEXT_OTP);
CK2STR_ENTRY(CKR_EXCEEDED_MAX_ITERATIONS);
CK2STR_ENTRY(CKR_FIPS_SELF_TEST_FAILED);
CK2STR_ENTRY(CKR_LIBRARY_LOAD_FAILED);
CK2STR_ENTRY(CKR_PIN_TOO_WEAK);
CK2STR_ENTRY(CKR_PUBLIC_KEY_INVALID);
CK2STR_ENTRY(CKR_FUNCTION_REJECTED);
default:
if (id & CKR_VENDOR_DEFINED)
return "Vendor defined";
else
return "Unknown ID";
}
}
const char *ckm2str(CK_MECHANISM_TYPE id)
{
switch (id) {
CK2STR_ENTRY(CKM_RSA_PKCS_KEY_PAIR_GEN);
CK2STR_ENTRY(CKM_RSA_PKCS);
CK2STR_ENTRY(CKM_RSA_9796);
CK2STR_ENTRY(CKM_RSA_X_509);
CK2STR_ENTRY(CKM_MD5_RSA_PKCS);
CK2STR_ENTRY(CKM_SHA1_RSA_PKCS);
CK2STR_ENTRY(CKM_RSA_PKCS_OAEP);
CK2STR_ENTRY(CKM_RSA_PKCS_PSS);
CK2STR_ENTRY(CKM_SHA1_RSA_PKCS_PSS);
CK2STR_ENTRY(CKM_SHA256_RSA_PKCS);
CK2STR_ENTRY(CKM_SHA384_RSA_PKCS);
CK2STR_ENTRY(CKM_SHA512_RSA_PKCS);
CK2STR_ENTRY(CKM_SHA256_RSA_PKCS_PSS);
CK2STR_ENTRY(CKM_SHA384_RSA_PKCS_PSS);
CK2STR_ENTRY(CKM_SHA512_RSA_PKCS_PSS);
CK2STR_ENTRY(CKM_SHA224_RSA_PKCS);
CK2STR_ENTRY(CKM_SHA224_RSA_PKCS_PSS);
CK2STR_ENTRY(CKM_SHA512_224);
CK2STR_ENTRY(CKM_SHA512_224_HMAC);
CK2STR_ENTRY(CKM_SHA512_224_HMAC_GENERAL);
CK2STR_ENTRY(CKM_SHA512_224_KEY_DERIVATION);
CK2STR_ENTRY(CKM_SHA512_256);
CK2STR_ENTRY(CKM_SHA512_256_HMAC);
CK2STR_ENTRY(CKM_SHA512_256_HMAC_GENERAL);
CK2STR_ENTRY(CKM_SHA512_256_KEY_DERIVATION);
CK2STR_ENTRY(CKM_MD5);
CK2STR_ENTRY(CKM_MD5_HMAC);
CK2STR_ENTRY(CKM_MD5_HMAC_GENERAL);
CK2STR_ENTRY(CKM_SHA_1);
CK2STR_ENTRY(CKM_SHA_1_HMAC);
CK2STR_ENTRY(CKM_SHA_1_HMAC_GENERAL);
CK2STR_ENTRY(CKM_SHA256);
CK2STR_ENTRY(CKM_SHA256_HMAC);
CK2STR_ENTRY(CKM_SHA256_HMAC_GENERAL);
CK2STR_ENTRY(CKM_SHA224);
CK2STR_ENTRY(CKM_SHA224_HMAC);
CK2STR_ENTRY(CKM_SHA224_HMAC_GENERAL);
CK2STR_ENTRY(CKM_SHA384);
CK2STR_ENTRY(CKM_SHA384_HMAC);
CK2STR_ENTRY(CKM_SHA384_HMAC_GENERAL);
CK2STR_ENTRY(CKM_SHA512);
CK2STR_ENTRY(CKM_SHA512_HMAC);
CK2STR_ENTRY(CKM_SHA512_HMAC_GENERAL);
CK2STR_ENTRY(CKM_HOTP_KEY_GEN);
CK2STR_ENTRY(CKM_HOTP);
CK2STR_ENTRY(CKM_GENERIC_SECRET_KEY_GEN);
CK2STR_ENTRY(CKM_SHA1_KEY_DERIVATION);
CK2STR_ENTRY(CKM_SHA256_KEY_DERIVATION);
CK2STR_ENTRY(CKM_SHA384_KEY_DERIVATION);
CK2STR_ENTRY(CKM_SHA512_KEY_DERIVATION);
CK2STR_ENTRY(CKM_SHA224_KEY_DERIVATION);
CK2STR_ENTRY(CKM_EC_KEY_PAIR_GEN);
CK2STR_ENTRY(CKM_ECDSA);
CK2STR_ENTRY(CKM_ECDSA_SHA1);
CK2STR_ENTRY(CKM_ECDSA_SHA224);
CK2STR_ENTRY(CKM_ECDSA_SHA256);
CK2STR_ENTRY(CKM_ECDSA_SHA384);
CK2STR_ENTRY(CKM_ECDSA_SHA512);
CK2STR_ENTRY(CKM_ECDH1_DERIVE);
CK2STR_ENTRY(CKM_ECDH1_COFACTOR_DERIVE);
CK2STR_ENTRY(CKM_ECMQV_DERIVE);
CK2STR_ENTRY(CKM_ECDH_AES_KEY_WRAP);
CK2STR_ENTRY(CKM_RSA_AES_KEY_WRAP);
CK2STR_ENTRY(CKM_AES_KEY_GEN);
CK2STR_ENTRY(CKM_AES_ECB);
CK2STR_ENTRY(CKM_AES_CBC);
CK2STR_ENTRY(CKM_AES_MAC);
CK2STR_ENTRY(CKM_AES_MAC_GENERAL);
CK2STR_ENTRY(CKM_AES_CBC_PAD);
CK2STR_ENTRY(CKM_AES_CTR);
CK2STR_ENTRY(CKM_AES_GCM);
CK2STR_ENTRY(CKM_AES_CCM);
CK2STR_ENTRY(CKM_AES_CTS);
CK2STR_ENTRY(CKM_AES_CMAC);
CK2STR_ENTRY(CKM_AES_CMAC_GENERAL);
CK2STR_ENTRY(CKM_AES_XCBC_MAC);
CK2STR_ENTRY(CKM_AES_XCBC_MAC_96);
CK2STR_ENTRY(CKM_AES_GMAC);
CK2STR_ENTRY(CKM_DES3_ECB_ENCRYPT_DATA);
CK2STR_ENTRY(CKM_DES3_CBC_ENCRYPT_DATA);
CK2STR_ENTRY(CKM_AES_ECB_ENCRYPT_DATA);
CK2STR_ENTRY(CKM_AES_CBC_ENCRYPT_DATA);
CK2STR_ENTRY(CKM_AES_KEY_WRAP);
CK2STR_ENTRY(CKM_AES_KEY_WRAP_PAD);
default:
if (id & CKM_VENDOR_DEFINED)
return "Vendor defined";
else
return "Unknown ID";
}
}
const char *slot_ckf2str(CK_ULONG flag)
{
switch (flag) {
CK2STR_ENTRY(CKF_TOKEN_PRESENT);
CK2STR_ENTRY(CKF_REMOVABLE_DEVICE);
CK2STR_ENTRY(CKF_HW_SLOT);
default:
return "Unknown flag";
}
}
const char *token_ckf2str(CK_ULONG flag)
{
switch (flag) {
CK2STR_ENTRY(CKF_RNG);
CK2STR_ENTRY(CKF_WRITE_PROTECTED);
CK2STR_ENTRY(CKF_LOGIN_REQUIRED);
CK2STR_ENTRY(CKF_USER_PIN_INITIALIZED);
CK2STR_ENTRY(CKF_RESTORE_KEY_NOT_NEEDED);
CK2STR_ENTRY(CKF_CLOCK_ON_TOKEN);
CK2STR_ENTRY(CKF_PROTECTED_AUTHENTICATION_PATH);
CK2STR_ENTRY(CKF_DUAL_CRYPTO_OPERATIONS);
CK2STR_ENTRY(CKF_TOKEN_INITIALIZED);
CK2STR_ENTRY(CKF_SECONDARY_AUTHENTICATION);
CK2STR_ENTRY(CKF_USER_PIN_COUNT_LOW);
CK2STR_ENTRY(CKF_USER_PIN_FINAL_TRY);
CK2STR_ENTRY(CKF_USER_PIN_LOCKED);
CK2STR_ENTRY(CKF_USER_PIN_TO_BE_CHANGED);
CK2STR_ENTRY(CKF_SO_PIN_COUNT_LOW);
CK2STR_ENTRY(CKF_SO_PIN_FINAL_TRY);
CK2STR_ENTRY(CKF_SO_PIN_LOCKED);
CK2STR_ENTRY(CKF_SO_PIN_TO_BE_CHANGED);
CK2STR_ENTRY(CKF_ERROR_STATE);
default:
return "Unknown flag";
}
}
const char *mecha_ckf2str(CK_ULONG flag)
{
switch (flag) {
CK2STR_ENTRY(CKF_HW);
CK2STR_ENTRY(CKF_ENCRYPT);
CK2STR_ENTRY(CKF_DECRYPT);
CK2STR_ENTRY(CKF_DIGEST);
CK2STR_ENTRY(CKF_SIGN);
CK2STR_ENTRY(CKF_SIGN_RECOVER);
CK2STR_ENTRY(CKF_VERIFY);
CK2STR_ENTRY(CKF_VERIFY_RECOVER);
CK2STR_ENTRY(CKF_GENERATE);
CK2STR_ENTRY(CKF_GENERATE_KEY_PAIR);
CK2STR_ENTRY(CKF_WRAP);
CK2STR_ENTRY(CKF_UNWRAP);
CK2STR_ENTRY(CKF_DERIVE);
CK2STR_ENTRY(CKF_EC_F_P);
CK2STR_ENTRY(CKF_EC_F_2M);
CK2STR_ENTRY(CKF_EC_ECPARAMETERS);
CK2STR_ENTRY(CKF_EC_NAMEDCURVE);
CK2STR_ENTRY(CKF_EC_UNCOMPRESS);
CK2STR_ENTRY(CKF_EC_COMPRESS);
CK2STR_ENTRY(CKF_EXTENSION);
default:
return "Unknown flag";
}
}
const char *session_ckf2str(CK_ULONG flag)
{
switch (flag) {
CK2STR_ENTRY(CKF_RW_SESSION);
CK2STR_ENTRY(CKF_SERIAL_SESSION);
default:
return "Unknown flag";
}
}
const char *session_cks2str(CK_ULONG flag)
{
switch (flag) {
CK2STR_ENTRY(CKS_RO_PUBLIC_SESSION);
CK2STR_ENTRY(CKS_RO_USER_FUNCTIONS);
CK2STR_ENTRY(CKS_RW_PUBLIC_SESSION);
CK2STR_ENTRY(CKS_RW_USER_FUNCTIONS);
CK2STR_ENTRY(CKS_RW_SO_FUNCTIONS);
default:
return "Unknown flag";
}
}
const char *cka2str(CK_ATTRIBUTE_TYPE id)
{
switch (id) {
/* Standard CK attributes */
CK2STR_ENTRY(CKA_CLASS);
CK2STR_ENTRY(CKA_TOKEN);
CK2STR_ENTRY(CKA_PRIVATE);
CK2STR_ENTRY(CKA_LABEL);
CK2STR_ENTRY(CKA_APPLICATION);
CK2STR_ENTRY(CKA_VALUE);
CK2STR_ENTRY(CKA_OBJECT_ID);
CK2STR_ENTRY(CKA_CERTIFICATE_TYPE);
CK2STR_ENTRY(CKA_ISSUER);
CK2STR_ENTRY(CKA_SERIAL_NUMBER);
CK2STR_ENTRY(CKA_AC_ISSUER);
CK2STR_ENTRY(CKA_OWNER);
CK2STR_ENTRY(CKA_ATTR_TYPES);
CK2STR_ENTRY(CKA_TRUSTED);
CK2STR_ENTRY(CKA_CERTIFICATE_CATEGORY);
CK2STR_ENTRY(CKA_JAVA_MIDP_SECURITY_DOMAIN);
CK2STR_ENTRY(CKA_URL);
CK2STR_ENTRY(CKA_HASH_OF_SUBJECT_PUBLIC_KEY);
CK2STR_ENTRY(CKA_HASH_OF_ISSUER_PUBLIC_KEY);
CK2STR_ENTRY(CKA_NAME_HASH_ALGORITHM);
CK2STR_ENTRY(CKA_CHECK_VALUE);
CK2STR_ENTRY(CKA_KEY_TYPE);
CK2STR_ENTRY(CKA_SUBJECT);
CK2STR_ENTRY(CKA_ID);
CK2STR_ENTRY(CKA_SENSITIVE);
CK2STR_ENTRY(CKA_ENCRYPT);
CK2STR_ENTRY(CKA_DECRYPT);
CK2STR_ENTRY(CKA_WRAP);
CK2STR_ENTRY(CKA_UNWRAP);
CK2STR_ENTRY(CKA_SIGN);
CK2STR_ENTRY(CKA_SIGN_RECOVER);
CK2STR_ENTRY(CKA_VERIFY);
CK2STR_ENTRY(CKA_VERIFY_RECOVER);
CK2STR_ENTRY(CKA_DERIVE);
CK2STR_ENTRY(CKA_START_DATE);
CK2STR_ENTRY(CKA_END_DATE);
CK2STR_ENTRY(CKA_MODULUS);
CK2STR_ENTRY(CKA_MODULUS_BITS);
CK2STR_ENTRY(CKA_PUBLIC_EXPONENT);
CK2STR_ENTRY(CKA_PRIVATE_EXPONENT);
CK2STR_ENTRY(CKA_PRIME_1);
CK2STR_ENTRY(CKA_PRIME_2);
CK2STR_ENTRY(CKA_EXPONENT_1);
CK2STR_ENTRY(CKA_EXPONENT_2);
CK2STR_ENTRY(CKA_COEFFICIENT);
CK2STR_ENTRY(CKA_PUBLIC_KEY_INFO);
CK2STR_ENTRY(CKA_PRIME);
CK2STR_ENTRY(CKA_SUBPRIME);
CK2STR_ENTRY(CKA_BASE);
CK2STR_ENTRY(CKA_PRIME_BITS);
CK2STR_ENTRY(CKA_SUBPRIME_BITS);
CK2STR_ENTRY(CKA_VALUE_BITS);
CK2STR_ENTRY(CKA_VALUE_LEN);
CK2STR_ENTRY(CKA_EXTRACTABLE);
CK2STR_ENTRY(CKA_LOCAL);
CK2STR_ENTRY(CKA_NEVER_EXTRACTABLE);
CK2STR_ENTRY(CKA_ALWAYS_SENSITIVE);
CK2STR_ENTRY(CKA_KEY_GEN_MECHANISM);
CK2STR_ENTRY(CKA_MODIFIABLE);
CK2STR_ENTRY(CKA_COPYABLE);
CK2STR_ENTRY(CKA_DESTROYABLE);
CK2STR_ENTRY(CKA_EC_PARAMS);
CK2STR_ENTRY(CKA_EC_POINT);
CK2STR_ENTRY(CKA_ALWAYS_AUTHENTICATE);
CK2STR_ENTRY(CKA_WRAP_WITH_TRUSTED);
CK2STR_ENTRY(CKA_WRAP_TEMPLATE);
CK2STR_ENTRY(CKA_UNWRAP_TEMPLATE);
CK2STR_ENTRY(CKA_DERIVE_TEMPLATE);
CK2STR_ENTRY(CKA_OTP_FORMAT);
CK2STR_ENTRY(CKA_OTP_LENGTH);
CK2STR_ENTRY(CKA_OTP_TIME_INTERVAL);
CK2STR_ENTRY(CKA_OTP_USER_FRIENDLY_MODE);
CK2STR_ENTRY(CKA_OTP_CHALLENGE_REQUIREMENT);
CK2STR_ENTRY(CKA_OTP_TIME_REQUIREMENT);
CK2STR_ENTRY(CKA_OTP_COUNTER_REQUIREMENT);
CK2STR_ENTRY(CKA_OTP_PIN_REQUIREMENT);
CK2STR_ENTRY(CKA_OTP_COUNTER);
CK2STR_ENTRY(CKA_OTP_TIME);
CK2STR_ENTRY(CKA_OTP_USER_IDENTIFIER);
CK2STR_ENTRY(CKA_OTP_SERVICE_IDENTIFIER);
CK2STR_ENTRY(CKA_OTP_SERVICE_LOGO);
CK2STR_ENTRY(CKA_OTP_SERVICE_LOGO_TYPE);
CK2STR_ENTRY(CKA_GOSTR3410_PARAMS);
CK2STR_ENTRY(CKA_GOSTR3411_PARAMS);
CK2STR_ENTRY(CKA_GOST28147_PARAMS);
CK2STR_ENTRY(CKA_HW_FEATURE_TYPE);
CK2STR_ENTRY(CKA_RESET_ON_INIT);
CK2STR_ENTRY(CKA_HAS_RESET);
CK2STR_ENTRY(CKA_PIXEL_X);
CK2STR_ENTRY(CKA_PIXEL_Y);
CK2STR_ENTRY(CKA_RESOLUTION);
CK2STR_ENTRY(CKA_CHAR_ROWS);
CK2STR_ENTRY(CKA_CHAR_COLUMNS);
CK2STR_ENTRY(CKA_COLOR);
CK2STR_ENTRY(CKA_BITS_PER_PIXEL);
CK2STR_ENTRY(CKA_CHAR_SETS);
CK2STR_ENTRY(CKA_ENCODING_METHODS);
CK2STR_ENTRY(CKA_MIME_TYPES);
CK2STR_ENTRY(CKA_MECHANISM_TYPE);
CK2STR_ENTRY(CKA_REQUIRED_CMS_ATTRIBUTES);
CK2STR_ENTRY(CKA_DEFAULT_CMS_ATTRIBUTES);
CK2STR_ENTRY(CKA_SUPPORTED_CMS_ATTRIBUTES);
CK2STR_ENTRY(CKA_ALLOWED_MECHANISMS);
CK2STR_ENTRY(CKA_VENDOR_DEFINED);
default:
if (id & CKA_VENDOR_DEFINED)
return "Vendor defined";
else
return "Unknown ID";
}
}
const char *cko2str(CK_OBJECT_CLASS id)
{
switch (id) {
CK2STR_ENTRY(CKO_DATA);
CK2STR_ENTRY(CKO_CERTIFICATE);
CK2STR_ENTRY(CKO_PUBLIC_KEY);
CK2STR_ENTRY(CKO_PRIVATE_KEY);
CK2STR_ENTRY(CKO_SECRET_KEY);
CK2STR_ENTRY(CKO_HW_FEATURE);
CK2STR_ENTRY(CKO_DOMAIN_PARAMETERS);
CK2STR_ENTRY(CKO_MECHANISM);
CK2STR_ENTRY(CKO_OTP_KEY);
CK2STR_ENTRY(CKO_VENDOR_DEFINED);
default:
return "Unknown";
}
}
const char *ckk2str(CK_KEY_TYPE id)
{
switch (id) {
CK2STR_ENTRY(CKK_RSA);
CK2STR_ENTRY(CKK_DSA);
CK2STR_ENTRY(CKK_DH);
CK2STR_ENTRY(CKK_ECDSA);
CK2STR_ENTRY(CKK_GENERIC_SECRET);
CK2STR_ENTRY(CKK_DES3);
CK2STR_ENTRY(CKK_AES);
CK2STR_ENTRY(CKK_HOTP);
CK2STR_ENTRY(CKK_MD5_HMAC);
CK2STR_ENTRY(CKK_SHA_1_HMAC);
CK2STR_ENTRY(CKK_SHA256_HMAC);
CK2STR_ENTRY(CKK_SHA384_HMAC);
CK2STR_ENTRY(CKK_SHA512_HMAC);
CK2STR_ENTRY(CKK_SHA224_HMAC);
CK2STR_ENTRY(CKK_VENDOR_DEFINED);
default:
return "Unknown";
}
}