Blob Blame History Raw
/*
 * Copyright Copyright 2003 Sun Microsystems, Inc. All rights reserved.
 * Use is subject to license terms specified in the COPYING file
 * distributed with the Net-SNMP package.
 */

/*
 * pkcs.c
 */

#include <net-snmp/net-snmp-config.h>
#ifdef NETSNMP_USE_PKCS11
#include <net-snmp/types.h>
#include <net-snmp/output_api.h>
#include <net-snmp/config_api.h>
#include <net-snmp/library/snmp_api.h>
#include <net-snmp/library/tools.h>
#include <net-snmp/library/keytools.h>
#include <net-snmp/library/scapi.h>
#include <net-snmp/library/callback.h>
#include <security/cryptoki.h>

typedef struct netsnmp_pkcs_slot_session_s {
    CK_SLOT_ID        sid;
    CK_SESSION_HANDLE hdl;
} netsnmp_pkcs_slot_session; 

typedef struct netsnmp_pkcs_slot_info_s {
    int count;
    netsnmp_pkcs_slot_session *pSession; 
} netsnmp_pkcs_slot_info;

static CK_RV get_session_handle(CK_MECHANISM_TYPE, CK_FLAGS,\
                                CK_SESSION_HANDLE_PTR);
static CK_RV get_slot_session_handle(netsnmp_pkcs_slot_session *,\
                                     CK_SESSION_HANDLE_PTR);
static char *pkcserr_string(CK_RV);
static int free_slots(int, int, void *, void *);

static netsnmp_pkcs_slot_info *pSlot = NULL;

/*
 * initialize the Cryptoki library.
 */
int
pkcs_init(void)
{
    CK_RV          rv;
    CK_ULONG       slotcount;
    CK_SLOT_ID_PTR pSlotList = NULL;
    netsnmp_pkcs_slot_session    *tmp;
    int            i, rval = SNMPERR_SUCCESS;
    /* Initialize pkcs */
    if ((rv = C_Initialize(NULL)) != CKR_OK) {
        DEBUGMSGTL(("pkcs_init", "C_Initialize failed: %s",
                pkcserr_string(rv)));
        return SNMPERR_SC_NOT_CONFIGURED;
    }

    /* Get slot count */
    rv = C_GetSlotList(1, NULL_PTR, &slotcount);
    if (rv != CKR_OK || slotcount == 0) {
        DEBUGMSGTL(("pkcs_init", "C_GetSlotList failed: %s", 
                pkcserr_string(rv)));
        QUITFUN(SNMPERR_GENERR, pkcs_init_quit);
    }

    /* Found at least one slot, allocate memory for slot list */
    pSlotList = malloc(slotcount * sizeof (CK_SLOT_ID));
    pSlot = malloc(sizeof (netsnmp_pkcs_slot_info));
    pSlot->pSession = malloc(slotcount * sizeof (netsnmp_pkcs_slot_session));

    if (pSlotList == NULL_PTR ||
        pSlot == NULL_PTR ||
        pSlot->pSession == NULL_PTR) {
        DEBUGMSGTL(("pkcs_init","malloc failed.")); 
        QUITFUN(SNMPERR_GENERR, pkcs_init_quit);
    }

    /* Get the list of slots */
    if ((rv = C_GetSlotList(1, pSlotList, &slotcount)) != CKR_OK) {
        DEBUGMSGTL(("pkcs_init", "C_GetSlotList failed: %s", 
                pkcserr_string(rv)));
        QUITFUN(SNMPERR_GENERR, pkcs_init_quit);
    }

    /* initialize Slots structure */
    pSlot->count = slotcount;
    for (i = 0, tmp = pSlot->pSession; i < slotcount; i++, tmp++) {
        tmp->sid = pSlotList[i]; 
        tmp->hdl = NULL;
    }

    snmp_register_callback(SNMP_CALLBACK_LIBRARY, SNMP_CALLBACK_SHUTDOWN,
                        free_slots, NULL);

  pkcs_init_quit:
    SNMP_FREE(pSlotList);
    return rval;
}

/*
 * close all the opened sessions when finished with Cryptoki library.
 */
static int
free_slots(int majorID, int minorID, void *serverarg, void *clientarg)
{
    int            slotcount, i;

    if (pSlot != NULL) {
        slotcount = pSlot->count;
        for (i = 0; i < slotcount; i++) {
            if (pSlot->pSession->hdl != NULL) {
                free(pSlot->pSession->hdl);
            }
        }
        free(pSlot);
    }

    (void) C_Finalize(NULL);
    return 0;
}

/*
 * generate random data
 */
int
pkcs_random(u_char * buf, size_t buflen)
{
    CK_SESSION_HANDLE hSession;

    if (pSlot != NULL &&
        get_slot_session_handle(pSlot->pSession, &hSession) == CKR_OK &&
        C_GenerateRandom(hSession, buf, buflen) == CKR_OK) {
        return SNMPERR_SUCCESS;
    }

    return SNMPERR_GENERR;
}

/*
 * retrieve the session handle from the first slot that supports the specified
 * mechanism.
 */
static CK_RV
get_session_handle(CK_MECHANISM_TYPE mech_type, CK_FLAGS flag,
                CK_SESSION_HANDLE_PTR sess)
{
    CK_RV             rv = CKR_OK;
    CK_MECHANISM_INFO info;
    netsnmp_pkcs_slot_session       *p = NULL;
    int               i, slotcount = 0;
            
    if (pSlot) {
        slotcount = pSlot->count;
        p = pSlot->pSession;
    }

    /* Find a slot with matching mechanism */
    for (i = 0; i < slotcount; i++, p++) {
        rv = C_GetMechanismInfo(p->sid, mech_type, &info);

        if (rv != CKR_OK) {
            continue; /* to the next slot */
        } else {
            if (info.flags & flag) {
                rv = get_slot_session_handle(p, sess);
                break; /* found */
            }
        }
    }

    /* Show error if no matching mechanism found */
    if (i == slotcount) {
        DEBUGMSGTL(("pkcs_init","No cryptographic provider for %s",
                mech_type)); 
        return CKR_SESSION_HANDLE_INVALID;
    }

    return rv;
}

/*
 * retrieve the session handle from the specified slot.
 */
static CK_RV
get_slot_session_handle(netsnmp_pkcs_slot_session *p,
                        CK_SESSION_HANDLE_PTR sess)
{
    CK_RV rv = CKR_OK;
    if (p == NULL) {
        *sess = NULL;
        return CKR_SESSION_HANDLE_INVALID;
    }

    if (p->hdl == NULL) {
        /* Open a session */
        rv = C_OpenSession(p->sid, CKF_SERIAL_SESSION,
                NULL_PTR, NULL, &p->hdl);

        if (rv != CKR_OK) {
            DEBUGMSGTL(("get_slot_session_handle","can not open PKCS #11 session: %s",
                        pkcserr_string(rv)));
        }
    }
    *sess = p->hdl;

    return rv;
}

/*
 * perform a signature operation to generate MAC.
 */
int
pkcs_sign(CK_MECHANISM_TYPE mech_type, u_char * key, u_int keylen,
          u_char * msg, u_int msglen, u_char * mac, size_t * maclen)
{
    /*
     * Key template 
     */
    CK_OBJECT_CLASS class = CKO_SECRET_KEY;
    CK_KEY_TYPE keytype = CKK_GENERIC_SECRET;
    CK_BBOOL truevalue = TRUE;
    CK_BBOOL falsevalue= FALSE;
    CK_ATTRIBUTE template[] = {
        {CKA_CLASS, &class, sizeof (class)},
        {CKA_KEY_TYPE, &keytype, sizeof (keytype)},
        {CKA_SIGN, &truevalue, sizeof (truevalue)},
        {CKA_TOKEN, &falsevalue, sizeof (falsevalue)},
        {CKA_VALUE, key, keylen}
    };
    CK_SESSION_HANDLE hSession;
    CK_MECHANISM mech;
    CK_OBJECT_HANDLE hkey = (CK_OBJECT_HANDLE) 0;
    int                rval = SNMPERR_SUCCESS;
    if (get_session_handle(mech_type, CKF_SIGN, &hSession) != CKR_OK ||
        hSession == NULL) {
        QUITFUN(SNMPERR_GENERR, pkcs_sign_quit);
    }

    /* create a key object */
    if (C_CreateObject(hSession, template,
        (sizeof (template) / sizeof (CK_ATTRIBUTE)), &hkey) != CKR_OK) {
        QUITFUN(SNMPERR_GENERR, pkcs_sign_quit);
    }

    mech.mechanism = mech_type;
    mech.pParameter = NULL_PTR;
    mech.ulParameterLen = 0;

    /* initialize a signature operation */
    if (C_SignInit(hSession, &mech, hkey) != CKR_OK ) {
        QUITFUN(SNMPERR_GENERR, pkcs_sign_quit);
    }
    /* continue a multiple-part signature operation */
    if (C_SignUpdate(hSession, msg, msglen) != CKR_OK) {
        QUITFUN(SNMPERR_GENERR, pkcs_sign_quit);
    }
    /* finish a multiple-part signature operation */
    if (C_SignFinal(hSession, mac, maclen) != CKR_OK) {
        QUITFUN(SNMPERR_GENERR, pkcs_sign_quit);
    }

  pkcs_sign_quit:

    if (key != (CK_OBJECT_HANDLE) 0) {
        (void) C_DestroyObject(hSession, hkey);
    }
    return rval;
}

/*
 * perform a message-digesting operation.
 */
int
pkcs_digest(CK_MECHANISM_TYPE mech_type, u_char * msg, u_int msglen,
            u_char * digest, size_t * digestlen)
{
    int               rval = SNMPERR_SUCCESS;
    CK_SESSION_HANDLE hSession;
    CK_MECHANISM      mech;
    if (get_session_handle(mech_type, CKF_DIGEST, &hSession) != CKR_OK ||
        hSession == NULL) {
        QUITFUN(SNMPERR_GENERR, pkcs_digest_quit);
    }

    mech.mechanism = mech_type;
    mech.pParameter = NULL_PTR;
    mech.ulParameterLen = 0;

    /* initialize a message-digesting operation */
    if (C_DigestInit(hSession, &mech)!= CKR_OK ) {
        QUITFUN(SNMPERR_GENERR, pkcs_digest_quit);
    }
    /* continue a multiple-part message-digesting operation */
    if (C_DigestUpdate(hSession, msg, msglen) != CKR_OK ) {
        QUITFUN(SNMPERR_GENERR, pkcs_digest_quit);
    }
    /* finish a multiple-part message-digesting operation */
    if (C_DigestFinal(hSession, digest, digestlen) != CKR_OK) {
        QUITFUN(SNMPERR_GENERR, pkcs_digest_quit);
    }

  pkcs_digest_quit:
    return rval;
}

/*
 * encrypt plaintext into ciphertext using key and iv.   
 */
int
pkcs_encrpyt(CK_MECHANISM_TYPE mech_type, u_char * key, u_int keylen,
             u_char * iv, u_int ivlen,
             u_char * plaintext, u_int ptlen,
             u_char * ciphertext, size_t * ctlen)
{
    int                rval = SNMPERR_SUCCESS;
    int                pad_size, offset;
    /*
     * Key template 
     */
    CK_OBJECT_CLASS class = CKO_SECRET_KEY;
    CK_KEY_TYPE keytype = CKK_DES;
    /* CK_KEY_TYPE AESkeytype = CKK_AES; */
    CK_BBOOL truevalue = TRUE;
    CK_BBOOL falsevalue = FALSE;

    CK_ATTRIBUTE template[] = {
        {CKA_CLASS, &class, sizeof (class)},
        {CKA_KEY_TYPE, &keytype, sizeof (keytype)},
        {CKA_ENCRYPT, &truevalue, sizeof (truevalue)},
        {CKA_TOKEN, &falsevalue, sizeof (falsevalue)},
        {CKA_VALUE, key, keylen} 
    };

    CK_SESSION_HANDLE hSession;
    CK_MECHANISM mech;
    CK_OBJECT_HANDLE hkey = (CK_OBJECT_HANDLE) 0;

    if (get_session_handle(mech_type, CKF_ENCRYPT,
                           &hSession) != CKR_OK ||
        hSession == NULL) {
        QUITFUN(SNMPERR_GENERR, pkcs_encrypt_quit);
    }

    if (C_CreateObject(hSession, template,
        (sizeof (template) / sizeof (CK_ATTRIBUTE)),
                                &hkey) != CKR_OK) {
        QUITFUN(SNMPERR_GENERR, pkcs_encrypt_quit);
    }

    mech.mechanism = mech_type;
    mech.pParameter = iv;
    mech.ulParameterLen = ivlen;

    /* initialize an encryption operation */
    if (C_EncryptInit(hSession, &mech, hkey) != CKR_OK ) {
        QUITFUN(SNMPERR_GENERR, pkcs_encrypt_quit);
    }

    /* for DES */
    pad_size = BYTESIZE(SNMP_TRANS_PRIVLEN_1DES);

    if (ptlen + pad_size - ptlen % pad_size > *ctlen) {
        QUITFUN(SNMPERR_GENERR, pkcs_encrypt_quit);    
    }

    for (offset = 0; offset < ptlen; offset += pad_size) {
        /* continue a multiple-part encryption operation */
        if (C_EncryptUpdate(hSession, plaintext + offset, pad_size,
                            ciphertext + offset, ctlen) != CKR_OK) {
            QUITFUN(SNMPERR_GENERR, pkcs_encrypt_quit);
        }
    }

    /* finish a multiple-part encryption operation */
    if (C_EncryptFinal(hSession, ciphertext + offset, ctlen) != CKR_OK) {
        QUITFUN(SNMPERR_GENERR, pkcs_encrypt_quit);
    }
    *ctlen = offset;

  pkcs_encrypt_quit:
    if (key != (CK_OBJECT_HANDLE) 0) {
        (void) C_DestroyObject(hSession, hkey);
    }
    return rval;
}

/* 
 * decrypt ciphertext into plaintext using key and iv.
 */
int
pkcs_decrpyt(CK_MECHANISM_TYPE mech_type, u_char * key, u_int keylen,
             u_char * iv, u_int ivlen,
             u_char * ciphertext, u_int ctlen,
             u_char * plaintext, size_t * ptlen)
{
    int            rval = SNMPERR_SUCCESS;
    /*
     * Key template 
     */
    CK_OBJECT_CLASS class = CKO_SECRET_KEY;
    CK_KEY_TYPE keytype = CKK_DES;
    /* CK_KEY_TYPE AESkeytype = CKK_AES; */
    CK_BBOOL truevalue = TRUE;
    CK_BBOOL falsevalue= FALSE;
    CK_ATTRIBUTE template[] = {
        {CKA_CLASS, &class, sizeof (class)},
        {CKA_KEY_TYPE, &keytype, sizeof (keytype)},
        {CKA_DECRYPT, &truevalue, sizeof (truevalue)},
        {CKA_TOKEN, &falsevalue, sizeof (falsevalue)},
        {CKA_VALUE, key, keylen}
    };
    CK_SESSION_HANDLE hSession;
    CK_MECHANISM mech;
    CK_OBJECT_HANDLE hkey = (CK_OBJECT_HANDLE) 0;

    if (get_session_handle(mech_type, CKF_DECRYPT, &hSession) != CKR_OK ||
        hSession == NULL) {
        QUITFUN(SNMPERR_GENERR, pkcs_decrypt_quit);
    }

    if (C_CreateObject(hSession, template,
        (sizeof (template) / sizeof (CK_ATTRIBUTE)), &hkey) != CKR_OK) {
        QUITFUN(SNMPERR_GENERR, pkcs_decrypt_quit);
    }

    mech.mechanism = mech_type;
    mech.pParameter = iv;
    mech.ulParameterLen = ivlen;

    /* initialize a decryption operation */
    if (C_DecryptInit(hSession, &mech, hkey) != CKR_OK ) {
        QUITFUN(SNMPERR_GENERR, pkcs_decrypt_quit);
    }
    /* continue a multiple-part decryption operation */
    if (C_DecryptUpdate(hSession, ciphertext, ctlen, plaintext,
                                        ptlen) != CKR_OK) {
        QUITFUN(SNMPERR_GENERR, pkcs_decrypt_quit);
    }
    /* finish a multiple-part decryption operation */
    if (C_DecryptFinal(hSession, plaintext, ptlen) != CKR_OK) {
        QUITFUN(SNMPERR_GENERR, pkcs_decrypt_quit);
    }

  pkcs_decrypt_quit:
    if (key != (CK_OBJECT_HANDLE) 0) {
        (void) C_DestroyObject(hSession, hkey);
    }
    return rval;
}

/*
 * Convert a passphrase into a master user key, Ku, according to the
 * algorithm given in RFC 2274 concerning the SNMPv3 User Security Model (USM)
 */
int
pkcs_generate_Ku(CK_MECHANISM_TYPE mech_type, u_char * passphrase, u_int pplen,
                 u_char * Ku, size_t * kulen)
{
    int                rval = SNMPERR_SUCCESS, nbytes = USM_LENGTH_EXPANDED_PASSPHRASE;
    CK_SESSION_HANDLE hSession;
    CK_MECHANISM mech;
    u_int        i, pindex = 0;
    u_char        buf[USM_LENGTH_KU_HASHBLOCK], *bufp;

    if (get_session_handle(mech_type, CKF_DIGEST, &hSession) != CKR_OK ||
        hSession == NULL) {
        QUITFUN(SNMPERR_GENERR, pkcs_generate_Ku_quit);
    }

    mech.mechanism = mech_type;
    mech.pParameter = NULL_PTR;
    mech.ulParameterLen = 0;

    /* initialize a message-digesting operation */
    if (C_DigestInit(hSession, &mech)!= CKR_OK ) {
        QUITFUN(SNMPERR_GENERR, pkcs_generate_Ku_quit);
    }

    while (nbytes > 0) {
        bufp = buf;
        for (i = 0; i < USM_LENGTH_KU_HASHBLOCK; i++) {
           /*
	    * fill a buffer with the supplied passphrase.  When the end
            * of the passphrase is reachedcycle back to the beginning.
            */
            *bufp++ = passphrase[pindex++ % pplen];
        }
        /* continue a multiple-part message-digesting operation */
        if (C_DigestUpdate(hSession, buf, USM_LENGTH_KU_HASHBLOCK) != CKR_OK ) {
            QUITFUN(SNMPERR_GENERR, pkcs_generate_Ku_quit);
        }
        nbytes -= USM_LENGTH_KU_HASHBLOCK;
    }
    /* finish a multiple-part message-digesting operation */
    if (C_DigestFinal(hSession, Ku, kulen) != CKR_OK) {
        QUITFUN(SNMPERR_GENERR, pkcs_generate_Ku_quit);
    }

  pkcs_generate_Ku_quit:
    return rval;
}
   
/*
 * pkcserr_stringor: returns a string representation of the given 
 * return code.
 */
static char *
pkcserr_string(CK_RV rv)
{
    static char errstr[128];
    switch (rv) {
    case CKR_OK:
        return ("CKR_OK");
        break;
    case CKR_CANCEL:
        return ("CKR_CANCEL");
        break;
    case CKR_HOST_MEMORY:
        return ("CKR_HOST_MEMORY");
        break;
    case CKR_SLOT_ID_INVALID:
        return ("CKR_SLOT_ID_INVALID");
        break;
    case CKR_GENERAL_ERROR:
        return ("CKR_GENERAL_ERROR");
        break;
    case CKR_FUNCTION_FAILED:
        return ("CKR_FUNCTION_FAILED");
        break;
    case CKR_ARGUMENTS_BAD:
        return ("CKR_ARGUMENTS_BAD");
        break;
    case CKR_NO_EVENT:
        return ("CKR_NO_EVENT");
        break;
    case CKR_NEED_TO_CREATE_THREADS:
        return ("CKR_NEED_TO_CREATE_THREADS");
        break;
    case CKR_CANT_LOCK:
        return ("CKR_CANT_LOCK");
        break;
    case CKR_ATTRIBUTE_READ_ONLY:
        return ("CKR_ATTRIBUTE_READ_ONLY");
        break;
    case CKR_ATTRIBUTE_SENSITIVE:
        return ("CKR_ATTRIBUTE_SENSITIVE");
        break;
    case CKR_ATTRIBUTE_TYPE_INVALID:
        return ("CKR_ATTRIBUTE_TYPE_INVALID");
        break;
    case CKR_ATTRIBUTE_VALUE_INVALID:
        return ("CKR_ATTRIBUTE_VALUE_INVALID");
        break;
    case CKR_DATA_INVALID:
        return ("CKR_DATA_INVALID");
        break;
    case CKR_DATA_LEN_RANGE:
        return ("CKR_DATA_LEN_RANGE");
        break;
    case CKR_DEVICE_ERROR:
        return ("CKR_DEVICE_ERROR");
        break;
    case CKR_DEVICE_MEMORY:
        return ("CKR_DEVICE_MEMORY");
        break;
    case CKR_DEVICE_REMOVED:
        return ("CKR_DEVICE_REMOVED");
        break;
    case CKR_ENCRYPTED_DATA_INVALID:
        return ("CKR_ENCRYPTED_DATA_INVALID");
        break;
    case CKR_ENCRYPTED_DATA_LEN_RANGE:
        return ("CKR_ENCRYPTED_DATA_LEN_RANGE");
        break;
    case CKR_FUNCTION_CANCELED:
        return ("CKR_FUNCTION_CANCELED");
        break;
    case CKR_FUNCTION_NOT_PARALLEL:
        return ("CKR_FUNCTION_NOT_PARALLEL");
        break;
    case CKR_FUNCTION_NOT_SUPPORTED:
        return ("CKR_FUNCTION_NOT_SUPPORTED");
        break;
    case CKR_KEY_HANDLE_INVALID:
        return ("CKR_KEY_HANDLE_INVALID");
        break;
    case CKR_KEY_SIZE_RANGE:
        return ("CKR_KEY_SIZE_RANGE");
        break;
    case CKR_KEY_TYPE_INCONSISTENT:
        return ("CKR_KEY_TYPE_INCONSISTENT");
        break;
    case CKR_KEY_NOT_NEEDED:
        return ("CKR_KEY_NOT_NEEDED");
        break;
    case CKR_KEY_CHANGED:
        return ("CKR_KEY_CHANGED");
        break;
    case CKR_KEY_NEEDED:
        return ("CKR_KEY_NEEDED");
        break;
    case CKR_KEY_INDIGESTIBLE:
        return ("CKR_KEY_INDIGESTIBLE");
        break;
    case CKR_KEY_FUNCTION_NOT_PERMITTED:
        return ("CKR_KEY_FUNCTION_NOT_PERMITTED");
        break;
    case CKR_KEY_NOT_WRAPPABLE:
        return ("CKR_KEY_NOT_WRAPPABLE");
        break;
    case CKR_KEY_UNEXTRACTABLE:
        return ("CKR_KEY_UNEXTRACTABLE");
        break;
    case CKR_MECHANISM_INVALID:
        return ("CKR_MECHANISM_INVALID");
        break;
    case CKR_MECHANISM_PARAM_INVALID:
        return ("CKR_MECHANISM_PARAM_INVALID");
        break;
    case CKR_OBJECT_HANDLE_INVALID:
        return ("CKR_OBJECT_HANDLE_INVALID");
        break;
    case CKR_OPERATION_ACTIVE:
        return ("CKR_OPERATION_ACTIVE");
        break;
    case CKR_OPERATION_NOT_INITIALIZED:
        return ("CKR_OPERATION_NOT_INITIALIZED");
        break;
    case CKR_PIN_INCORRECT:
        return ("CKR_PIN_INCORRECT");
        break;
    case CKR_PIN_INVALID:
        return ("CKR_PIN_INVALID");
        break;
    case CKR_PIN_LEN_RANGE:
        return ("CKR_PIN_LEN_RANGE");
        break;
    case CKR_PIN_EXPIRED:
        return ("CKR_PIN_EXPIRED");
        break;
    case CKR_PIN_LOCKED:
        return ("CKR_PIN_LOCKED");
        break;
    case CKR_SESSION_CLOSED:
        return ("CKR_SESSION_CLOSED");
        break;
    case CKR_SESSION_COUNT:
        return ("CKR_SESSION_COUNT");
        break;
    case CKR_SESSION_HANDLE_INVALID:
        return ("CKR_SESSION_HANDLE_INVALID");
        break;
    case CKR_SESSION_PARALLEL_NOT_SUPPORTED:
        return ("CKR_SESSION_PARALLEL_NOT_SUPPORTED");
        break;
    case CKR_SESSION_READ_ONLY:
        return ("CKR_SESSION_READ_ONLY");
        break;
    case CKR_SESSION_EXISTS:
        return ("CKR_SESSION_EXISTS");
        break;
    case CKR_SESSION_READ_ONLY_EXISTS:
        return ("CKR_SESSION_READ_ONLY_EXISTS");
        break;
    case CKR_SESSION_READ_WRITE_SO_EXISTS:
        return ("CKR_SESSION_READ_WRITE_SO_EXISTS");
        break;
    case CKR_SIGNATURE_INVALID:
        return ("CKR_SIGNATURE_INVALID");
        break;
    case CKR_SIGNATURE_LEN_RANGE:
        return ("CKR_SIGNATURE_LEN_RANGE");
        break;
    case CKR_TEMPLATE_INCOMPLETE:
        return ("CKR_TEMPLATE_INCOMPLETE");
        break;
    case CKR_TEMPLATE_INCONSISTENT:
        return ("CKR_TEMPLATE_INCONSISTENT");
        break;
    case CKR_TOKEN_NOT_PRESENT:
        return ("CKR_TOKEN_NOT_PRESENT");
        break;
    case CKR_TOKEN_NOT_RECOGNIZED:
        return ("CKR_TOKEN_NOT_RECOGNIZED");
        break;
    case CKR_TOKEN_WRITE_PROTECTED:
        return ("CKR_TOKEN_WRITE_PROTECTED");
        break;
    case CKR_UNWRAPPING_KEY_HANDLE_INVALID:
        return ("CKR_UNWRAPPING_KEY_HANDLE_INVALID");
        break;
    case CKR_UNWRAPPING_KEY_SIZE_RANGE:
        return ("CKR_UNWRAPPING_KEY_SIZE_RANGE");
        break;
    case CKR_UNWRAPPING_KEY_TYPE_INCONSISTENT:
        return ("CKR_UNWRAPPING_KEY_TYPE_INCONSISTENT");
        break;
    case CKR_USER_ALREADY_LOGGED_IN:
        return ("CKR_USER_ALREADY_LOGGED_IN");
        break;
    case CKR_USER_NOT_LOGGED_IN:
        return ("CKR_USER_NOT_LOGGED_IN");
        break;
    case CKR_USER_PIN_NOT_INITIALIZED:
        return ("CKR_USER_PIN_NOT_INITIALIZED");
        break;
    case CKR_USER_TYPE_INVALID:
        return ("CKR_USER_TYPE_INVALID");
        break;
    case CKR_USER_ANOTHER_ALREADY_LOGGED_IN:
        return ("CKR_USER_ANOTHER_ALREADY_LOGGED_IN");
        break;
    case CKR_USER_TOO_MANY_TYPES:
        return ("CKR_USER_TOO_MANY_TYPES");
        break;
    case CKR_WRAPPED_KEY_INVALID:
        return ("CKR_WRAPPED_KEY_INVALID");
        break;
    case CKR_WRAPPED_KEY_LEN_RANGE:
        return ("CKR_WRAPPED_KEY_LEN_RANGE");
        break;
    case CKR_WRAPPING_KEY_HANDLE_INVALID:
        return ("CKR_WRAPPING_KEY_HANDLE_INVALID");
        break;
    case CKR_WRAPPING_KEY_SIZE_RANGE:
        return ("CKR_WRAPPING_KEY_SIZE_RANGE");
        break;
    case CKR_WRAPPING_KEY_TYPE_INCONSISTENT:
        return ("CKR_WRAPPING_KEY_TYPE_INCONSISTENT");
        break;
    case CKR_RANDOM_SEED_NOT_SUPPORTED:
        return ("CKR_RANDOM_SEED_NOT_SUPPORTED");
        break;
    case CKR_RANDOM_NO_RNG:
        return ("CKR_RANDOM_NO_RNG");
        break;
    case CKR_DOMAIN_PARAMS_INVALID:
        return ("CKR_DOMAIN_PARAMS_INVALID");
        break;
    case CKR_BUFFER_TOO_SMALL:
        return ("CKR_BUFFER_TOO_SMALL");
        break;
    case CKR_SAVED_STATE_INVALID:
        return ("CKR_SAVED_STATE_INVALID");
        break;
    case CKR_INFORMATION_SENSITIVE:
        return ("CKR_INFORMATION_SENSITIVE");
        break;
    case CKR_STATE_UNSAVEABLE:
        return ("CKR_STATE_UNSAVEABLE");
        break;
    case CKR_CRYPTOKI_NOT_INITIALIZED:
        return ("CKR_CRYPTOKI_NOT_INITIALIZED");
        break;
    case CKR_CRYPTOKI_ALREADY_INITIALIZED:
        return ("CKR_CRYPTOKI_ALREADY_INITIALIZED");
        break;
    case CKR_MUTEX_BAD:
        return ("CKR_MUTEX_BAD");
        break;
    case CKR_MUTEX_NOT_LOCKED:
        return ("CKR_MUTEX_NOT_LOCKED");
        break;
    case CKR_VENDOR_DEFINED:
        return ("CKR_VENDOR_DEFINED");
        break;
    default:
        /* rv not found */
        snprintf(errstr, sizeof (errstr),
            "Unknown return code: 0x%x", rv);
        return (errstr);
        break;
    }
}
#else
int pkcs_unused;	/* Suppress "empty translation unit" warning */
#endif