1 /*
2 * Common Public License Version 0.5
3 *
4 * THE ACCOMPANYING PROGRAM IS PROVIDED UNDER THE TERMS OF
5 * THIS COMMON PUBLIC LICENSE ("AGREEMENT"). ANY USE,
6 * REPRODUCTION OR DISTRIBUTION OF THE PROGRAM CONSTITUTES
7 * RECIPIENT'S ACCEPTANCE OF THIS AGREEMENT.
8 *
9 * 1. DEFINITIONS
10 *
11 * "Contribution" means:
12 * a) in the case of the initial Contributor, the
13 * initial code and documentation distributed under
14 * this Agreement, and
15 *
16 * b) in the case of each subsequent Contributor:
17 * i) changes to the Program, and
18 * ii) additions to the Program;
19 *
20 * where such changes and/or additions to the Program
21 * originate from and are distributed by that
22 * particular Contributor. A Contribution 'originates'
23 * from a Contributor if it was added to the Program
24 * by such Contributor itself or anyone acting on such
25 * Contributor's behalf. Contributions do not include
26 * additions to the Program which: (i) are separate
27 * modules of software distributed in conjunction with
28 * the Program under their own license agreement, and
29 * (ii) are not derivative works of the Program.
30 *
31 *
32 * "Contributor" means any person or entity that distributes
33 * the Program.
34 *
35 * "Licensed Patents " mean patent claims licensable by a
36 * Contributor which are necessarily infringed by the use or
37 * sale of its Contribution alone or when combined with the
38 * Program.
39 *
40 * "Program" means the Contributions distributed in
41 * accordance with this Agreement.
42 *
43 * "Recipient" means anyone who receives the Program under
44 * this Agreement, including all Contributors.
45 *
46 * 2. GRANT OF RIGHTS
47 *
48 * a) Subject to the terms of this Agreement, each
49 * Contributor hereby grants Recipient a
50 * no - exclusive, worldwide, royalt - free copyright
51 * license to reproduce, prepare derivative works of,
52 * publicly display, publicly perform, distribute and
53 * sublicense the Contribution of such Contributor, if
54 * any, and such derivative works, in source code and
55 * object code form.
56 *
57 * b) Subject to the terms of this Agreement, each
58 * Contributor hereby grants Recipient a
59 * no - exclusive, worldwide, royalt - free patent
60 * license under Licensed Patents to make, use, sell,
61 * offer to sell, import and otherwise transfer the
62 * Contribution of such Contributor, if any, in source
63 * code and object code form. This patent license
64 * shall apply to the combination of the Contribution
65 * and the Program if, at the time the Contribution is
66 * added by the Contributor, such addition of the
67 * Contribution causes such combination to be covered
68 * by the Licensed Patents. The patent license shall
69 * not apply to any other combinations which include
70 * the Contribution. No hardware per se is licensed
71 * hereunder.
72 *
73 * c) Recipient understands that although each
74 * Contributor grants the licenses to its
75 * Contributions set forth herein, no assurances are
76 * provided by any Contributor that the Program does
77 * not infringe the patent or other intellectual
78 * property rights of any other entity. Each
79 * Contributor disclaims any liability to Recipient
80 * for claims brought by any other entity based on
81 * infringement of intellectual property rights or
82 * otherwise. As a condition to exercising the rights
83 * and licenses granted hereunder, each Recipient
84 * hereby assumes sole responsibility to secure any
85 * other intellectual property rights needed, if any.
86 *
87 * For example, if a third party patent license is
88 * required to allow Recipient to distribute the
89 * Program, it is Recipient's responsibility to
90 * acquire that license before distributing the
91 * Program.
92 *
93 * d) Each Contributor represents that to its
94 * knowledge it has sufficient copyright rights in its
95 * Contribution, if any, to grant the copyright
96 * license set forth in this Agreement.
97 *
98 * 3. REQUIREMENTS
99 *
100 * A Contributor may choose to distribute the Program in
101 * object code form under its own license agreement, provided
102 * that:
103 * a) it complies with the terms and conditions of
104 * this Agreement; and
105 *
106 * b) its license agreement:
107 * i) effectively disclaims on behalf of all
108 * Contributors all warranties and conditions, express
109 * and implied, including warranties or conditions of
110 * title and no - infringement, and implied warranties
111 * or conditions of merchantability and fitness for a
112 * particular purpose;
113 *
114 * ii) effectively excludes on behalf of all
115 * Contributors all liability for damages, including
116 * direct, indirect, special, incidental and
117 * consequential damages, such as lost profits;
118 *
119 * iii) states that any provisions which differ from
120 * this Agreement are offered by that Contributor
121 * alone and not by any other party; and
122 *
123 * iv) states that source code for the Program is
124 * available from such Contributor, and informs
125 * licensees how to obtain it in a reasonable manner
126 * on or through a medium customarily used for
127 * software exchange.
128 *
129 * When the Program is made available in source code form:
130 * a) it must be made available under this Agreement;
131 * and
132 * b) a copy of this Agreement must be included with
133 * each copy of the Program.
134 *
135 * Contributors may not remove or alter any copyright notices
136 * contained within the Program.
137 *
138 * Each Contributor must identify itself as the originator of
139 * its Contribution, if any, in a manner that reasonably
140 * allows subsequent Recipients to identify the originator of
141 * the Contribution.
142 *
143 *
144 * 4. COMMERCIAL DISTRIBUTION
145 *
146 * Commercial distributors of software may accept certain
147 * responsibilities with respect to end users, business
148 * partners and the like. While this license is intended to
149 * facilitate the commercial use of the Program, the
150 * Contributor who includes the Program in a commercial
151 * product offering should do so in a manner which does not
152 * create potential liability for other Contributors.
153 * Therefore, if a Contributor includes the Program in a
154 * commercial product offering, such Contributor ("Commercial
155 * Contributor") hereby agrees to defend and indemnify every
156 * other Contributor ("Indemnified Contributor") against any
157 * losses, damages and costs (collectively "Losses") arising
158 * from claims, lawsuits and other legal actions brought by a
159 * third party against the Indemnified Contributor to the
160 * extent caused by the acts or omissions of such Commercial
161 * Contributor in connection with its distribution of the
162 * Program in a commercial product offering. The obligations
163 * in this section do not apply to any claims or Losses
164 * relating to any actual or alleged intellectual property
165 * infringement. In order to qualify, an Indemnified
166 * Contributor must: a) promptly notify the Commercial
167 * Contributor in writing of such claim, and b) allow the
168 * Commercial Contributor to control, and cooperate with the
169 * Commercial Contributor in, the defense and any related
170 * settlement negotiations. The Indemnified Contributor may
171 * participate in any such claim at its own expense.
172 *
173 *
174 * For example, a Contributor might include the Program in a
175 * commercial product offering, Product X. That Contributor
176 * is then a Commercial Contributor. If that Commercial
177 * Contributor then makes performance claims, or offers
178 * warranties related to Product X, those performance claims
179 * and warranties are such Commercial Contributor's
180 * responsibility alone. Under this section, the Commercial
181 * Contributor would have to defend claims against the other
182 * Contributors related to those performance claims and
183 * warranties, and if a court requires any other Contributor
184 * to pay any damages as a result, the Commercial Contributor
185 * must pay those damages.
186 *
187 *
188 * 5. NO WARRANTY
189 *
190 * EXCEPT AS EXPRESSLY SET FORTH IN THIS AGREEMENT, THE
191 * PROGRAM IS PROVIDED ON AN "AS IS" BASIS, WITHOUT
192 * WARRANTIES OR CONDITIONS OF ANY KIND, EITHER EXPRESS OR
193 * IMPLIED INCLUDING, WITHOUT LIMITATION, ANY WARRANTIES OR
194 * CONDITIONS OF TITLE, NO - INFRINGEMENT, MERCHANTABILITY OR
195 * FITNESS FOR A PARTICULAR PURPOSE. Each Recipient is solely
196 * responsible for determining the appropriateness of using
197 * and distributing the Program and assumes all risks
198 * associated with its exercise of rights under this
199 * Agreement, including but not limited to the risks and
200 * costs of program errors, compliance with applicable laws,
201 * damage to or loss of data, programs or equipment, and
202 * unavailability or interruption of operations.
203 *
204 * 6. DISCLAIMER OF LIABILITY
205 * EXCEPT AS EXPRESSLY SET FORTH IN THIS AGREEMENT, NEITHER
206 * RECIPIENT NOR ANY CONTRIBUTORS SHALL HAVE ANY LIABILITY
207 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,
208 * OR CONSEQUENTIAL DAMAGES (INCLUDING WITHOUT LIMITATION
209 * LOST PROFITS), HOWEVER CAUSED AND ON ANY THEORY OF
210 * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
211 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
212 * OF THE USE OR DISTRIBUTION OF THE PROGRAM OR THE EXERCISE
213 * OF ANY RIGHTS GRANTED HEREUNDER, EVEN IF ADVISED OF THE
214 * POSSIBILITY OF SUCH DAMAGES.
215 *
216 * 7. GENERAL
217 *
218 * If any provision of this Agreement is invalid or
219 * unenforceable under applicable law, it shall not affect
220 * the validity or enforceability of the remainder of the
221 * terms of this Agreement, and without further action by the
222 * parties hereto, such provision shall be reformed to the
223 * minimum extent necessary to make such provision valid and
224 * enforceable.
225 *
226 *
227 * If Recipient institutes patent litigation against a
228 * Contributor with respect to a patent applicable to
229 * software (including a cros - claim or counterclaim in a
230 * lawsuit), then any patent licenses granted by that
231 * Contributor to such Recipient under this Agreement shall
232 * terminate as of the date such litigation is filed. In
233 * addition, If Recipient institutes patent litigation
234 * against any entity (including a cros - claim or
235 * counterclaim in a lawsuit) alleging that the Program
236 * itself (excluding combinations of the Program with other
237 * software or hardware) infringes such Recipient's
238 * patent(s), then such Recipient's rights granted under
239 * Section 2(b) shall terminate as of the date such
240 * litigation is filed.
241 *
242 * All Recipient's rights under this Agreement shall
243 * terminate if it fails to comply with any of the material
244 * terms or conditions of this Agreement and does not cure
245 * such failure in a reasonable period of time after becoming
246 * aware of such noncompliance. If all Recipient's rights
247 * under this Agreement terminate, Recipient agrees to cease
248 * use and distribution of the Program as soon as reasonably
249 * practicable. However, Recipient's obligations under this
250 * Agreement and any licenses granted by Recipient relating
251 * to the Program shall continue and survive.
252 *
253 * Everyone is permitted to copy and distribute copies of
254 * this Agreement, but in order to avoid inconsistency the
255 * Agreement is copyrighted and may only be modified in the
256 * following manner. The Agreement Steward reserves the right
257 * to publish new versions (including revisions) of this
258 * Agreement from time to time. No one other than the
259 * Agreement Steward has the right to modify this Agreement.
260 *
261 * IBM is the initial Agreement Steward. IBM may assign the
262 * responsibility to serve as the Agreement Steward to a
263 * suitable separate entity. Each new version of the
264 * Agreement will be given a distinguishing version number.
265 * The Program (including Contributions) may always be
266 * distributed subject to the version of the Agreement under
267 * which it was received. In addition, after a new version of
268 * the Agreement is published, Contributor may elect to
269 * distribute the Program (including its Contributions) under
270 * the new version. Except as expressly stated in Sections
271 * 2(a) and 2(b) above, Recipient receives no rights or
272 * licenses to the intellectual property of any Contributor
273 * under this Agreement, whether expressly, by implication,
274 * estoppel or otherwise. All rights in the Program not
275 * expressly granted under this Agreement are reserved.
276 *
277 *
278 * This Agreement is governed by the laws of the State of New
279 * York and the intellectual property laws of the United
280 * States of America. No party to this Agreement will bring a
281 * legal action under this Agreement more than one year after
282 * the cause of action arose. Each party waives its rights to
283 * a jury trial in any resulting litigation.
284 *
285 *
286 *
287 * (C) COPYRIGHT International Business Machines Corp. 2001, 2002
288 */
289 /*
290 * Copyright 2009 Sun Microsystems, Inc. All rights reserved.
291 * Use is subject to license terms.
292 */
293 #include "tpmtok_int.h"
294
295 CK_RV
key_object_check_required_attributes(TEMPLATE * tmpl,CK_ULONG mode)296 key_object_check_required_attributes(TEMPLATE *tmpl, CK_ULONG mode)
297 {
298 CK_ATTRIBUTE * attr = NULL;
299 CK_BBOOL found;
300
301 found = template_attribute_find(tmpl, CKA_KEY_TYPE, &attr);
302 if (! found) {
303 if (mode == MODE_CREATE) {
304 return (CKR_TEMPLATE_INCOMPLETE);
305 }
306 }
307
308 return (template_check_required_base_attributes(tmpl, mode));
309 }
310
311 CK_RV
key_object_set_default_attributes(TEMPLATE * tmpl,CK_ULONG mode)312 key_object_set_default_attributes(TEMPLATE *tmpl, CK_ULONG mode)
313 {
314 CK_ATTRIBUTE * id_attr = NULL;
315 CK_ATTRIBUTE * sdate_attr = NULL;
316 CK_ATTRIBUTE * edate_attr = NULL;
317 CK_ATTRIBUTE * derive_attr = NULL;
318 CK_ATTRIBUTE * local_attr = NULL;
319
320 // satisfy the compiler
321 //
322 if (mode)
323 id_attr = NULL;
324
325 id_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE));
326 sdate_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE));
327 edate_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE));
328 derive_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
329 sizeof (CK_BBOOL));
330 local_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
331 sizeof (CK_BBOOL));
332
333 if (! id_attr || ! sdate_attr || ! edate_attr ||
334 ! derive_attr || ! local_attr) {
335 if (id_attr) free(id_attr);
336 if (sdate_attr) free(sdate_attr);
337 if (edate_attr) free(edate_attr);
338 if (derive_attr) free(derive_attr);
339 if (local_attr) free(local_attr);
340 return (CKR_HOST_MEMORY);
341 }
342
343 id_attr->type = CKA_ID;
344 id_attr->ulValueLen = 0;
345 id_attr->pValue = NULL;
346
347 sdate_attr->type = CKA_START_DATE;
348 sdate_attr->ulValueLen = 0;
349 sdate_attr->pValue = NULL;
350
351 edate_attr->type = CKA_END_DATE;
352 edate_attr->ulValueLen = 0;
353 edate_attr->pValue = NULL;
354
355 derive_attr->type = CKA_DERIVE;
356 derive_attr->ulValueLen = sizeof (CK_BBOOL);
357 derive_attr->pValue = (CK_BYTE *)derive_attr +
358 sizeof (CK_ATTRIBUTE);
359 *(CK_BBOOL *)derive_attr->pValue = FALSE;
360
361 local_attr->type = CKA_LOCAL;
362 local_attr->ulValueLen = sizeof (CK_BBOOL);
363 local_attr->pValue = (CK_BYTE *)local_attr + sizeof (CK_ATTRIBUTE);
364 *(CK_BBOOL *)local_attr->pValue = FALSE;
365
366 (void) template_update_attribute(tmpl, id_attr);
367 (void) template_update_attribute(tmpl, sdate_attr);
368 (void) template_update_attribute(tmpl, edate_attr);
369 (void) template_update_attribute(tmpl, derive_attr);
370 (void) template_update_attribute(tmpl, local_attr);
371
372 return (CKR_OK);
373 }
374
375 CK_RV
key_object_validate_attribute(TEMPLATE * tmpl,CK_ATTRIBUTE * attr,CK_ULONG mode)376 key_object_validate_attribute(TEMPLATE *tmpl,
377 CK_ATTRIBUTE *attr, CK_ULONG mode)
378 {
379 switch (attr->type) {
380 case CKA_KEY_TYPE:
381 if (mode == MODE_CREATE || mode == MODE_DERIVE ||
382 mode == MODE_KEYGEN || mode == MODE_UNWRAP)
383 return (CKR_OK);
384 else {
385 return (CKR_ATTRIBUTE_READ_ONLY);
386 }
387 case CKA_ID:
388 case CKA_START_DATE:
389 case CKA_END_DATE:
390 case CKA_DERIVE:
391 return (CKR_OK);
392
393 case CKA_LOCAL:
394 return (CKR_ATTRIBUTE_READ_ONLY);
395
396 default:
397 return (template_validate_base_attribute(tmpl, attr, mode));
398 }
399 }
400
401 CK_RV
publ_key_check_required_attributes(TEMPLATE * tmpl,CK_ULONG mode)402 publ_key_check_required_attributes(TEMPLATE *tmpl, CK_ULONG mode) {
403 return (key_object_check_required_attributes(tmpl, mode));
404 }
405
406 CK_RV
publ_key_set_default_attributes(TEMPLATE * tmpl,CK_ULONG mode)407 publ_key_set_default_attributes(TEMPLATE *tmpl, CK_ULONG mode)
408 {
409 CK_ATTRIBUTE *class_attr = NULL;
410 CK_ATTRIBUTE *subject_attr = NULL;
411 CK_ATTRIBUTE *encrypt_attr = NULL;
412 CK_ATTRIBUTE *verify_attr = NULL;
413 CK_ATTRIBUTE *verify_recover_attr = NULL;
414 CK_ATTRIBUTE *wrap_attr = NULL;
415
416 CK_OBJECT_CLASS class = CKO_PUBLIC_KEY;
417 CK_RV rc;
418
419
420 rc = key_object_set_default_attributes(tmpl, mode);
421 if (rc != CKR_OK) {
422 return (rc);
423 }
424 //
425 // add the default CKO_PUBLIC_KEY attributes
426 //
427 class_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
428 sizeof (CK_OBJECT_CLASS));
429 subject_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE));
430 encrypt_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
431 sizeof (CK_BBOOL));
432 verify_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
433 sizeof (CK_BBOOL));
434 verify_recover_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
435 sizeof (CK_BBOOL));
436 wrap_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
437 sizeof (CK_BBOOL));
438
439 if (! class || ! subject_attr || ! encrypt_attr ||
440 ! verify_attr || ! verify_recover_attr || ! wrap_attr) {
441 if (class_attr) free(class_attr);
442 if (subject_attr) free(subject_attr);
443 if (encrypt_attr) free(encrypt_attr);
444 if (verify_attr) free(verify_attr);
445 if (verify_recover_attr) free(verify_recover_attr);
446 if (wrap_attr) free(wrap_attr);
447
448 return (CKR_HOST_MEMORY);
449 }
450
451 class_attr->type = CKA_CLASS;
452 class_attr->ulValueLen = sizeof (CK_OBJECT_CLASS);
453 class_attr->pValue = (CK_BYTE *)class_attr +
454 sizeof (CK_ATTRIBUTE);
455 *(CK_OBJECT_CLASS *)class_attr->pValue = CKO_PUBLIC_KEY;
456
457 subject_attr->type = CKA_SUBJECT;
458 subject_attr->ulValueLen = 0; // empty string
459 subject_attr->pValue = NULL;
460
461 encrypt_attr->type = CKA_ENCRYPT;
462 encrypt_attr->ulValueLen = sizeof (CK_BBOOL);
463 encrypt_attr->pValue = (CK_BYTE *)encrypt_attr +
464 sizeof (CK_ATTRIBUTE);
465 *(CK_BBOOL *)encrypt_attr->pValue = TRUE;
466
467 verify_attr->type = CKA_VERIFY;
468 verify_attr->ulValueLen = sizeof (CK_BBOOL);
469 verify_attr->pValue = (CK_BYTE *)verify_attr +
470 sizeof (CK_ATTRIBUTE);
471 *(CK_BBOOL *)verify_attr->pValue = TRUE;
472
473 verify_recover_attr->type = CKA_VERIFY_RECOVER;
474 verify_recover_attr->ulValueLen = sizeof (CK_BBOOL);
475 verify_recover_attr->pValue = (CK_BYTE *)verify_recover_attr +
476 sizeof (CK_ATTRIBUTE);
477 *(CK_BBOOL *)verify_recover_attr->pValue = TRUE;
478
479 wrap_attr->type = CKA_WRAP;
480 wrap_attr->ulValueLen = sizeof (CK_BBOOL);
481 wrap_attr->pValue = (CK_BYTE *)wrap_attr +
482 sizeof (CK_ATTRIBUTE);
483 *(CK_BBOOL *)wrap_attr->pValue = TRUE;
484
485 (void) template_update_attribute(tmpl, class_attr);
486 (void) template_update_attribute(tmpl, subject_attr);
487 (void) template_update_attribute(tmpl, encrypt_attr);
488 (void) template_update_attribute(tmpl, verify_attr);
489 (void) template_update_attribute(tmpl, verify_recover_attr);
490 (void) template_update_attribute(tmpl, wrap_attr);
491
492 return (CKR_OK);
493 }
494
495 CK_RV
publ_key_validate_attribute(TEMPLATE * tmpl,CK_ATTRIBUTE * attr,CK_ULONG mode)496 publ_key_validate_attribute(TEMPLATE *tmpl,
497 CK_ATTRIBUTE *attr, CK_ULONG mode) {
498 switch (attr->type) {
499 case CKA_SUBJECT:
500 return (CKR_OK);
501
502 case CKA_ENCRYPT:
503 case CKA_VERIFY:
504 case CKA_VERIFY_RECOVER:
505 case CKA_WRAP:
506 if (mode == MODE_MODIFY) {
507 if (nv_token_data->tweak_vector.allow_key_mods == TRUE)
508 return (CKR_OK);
509 return (CKR_ATTRIBUTE_READ_ONLY);
510 }
511 return (CKR_OK);
512
513 default:
514 return (key_object_validate_attribute(tmpl, attr, mode));
515 }
516 }
517
518 CK_RV
priv_key_check_required_attributes(TEMPLATE * tmpl,CK_ULONG mode)519 priv_key_check_required_attributes(TEMPLATE *tmpl, CK_ULONG mode) {
520 return (key_object_check_required_attributes(tmpl, mode));
521 }
522
523 CK_RV
priv_key_set_default_attributes(TEMPLATE * tmpl,CK_ULONG mode)524 priv_key_set_default_attributes(TEMPLATE *tmpl, CK_ULONG mode)
525 {
526 CK_ATTRIBUTE *class_attr = NULL;
527 CK_ATTRIBUTE *subject_attr = NULL;
528 CK_ATTRIBUTE *sensitive_attr = NULL;
529 CK_ATTRIBUTE *decrypt_attr = NULL;
530 CK_ATTRIBUTE *sign_attr = NULL;
531 CK_ATTRIBUTE *sign_recover_attr = NULL;
532 CK_ATTRIBUTE *unwrap_attr = NULL;
533 CK_ATTRIBUTE *extractable_attr = NULL;
534 CK_ATTRIBUTE *never_extr_attr = NULL;
535 CK_ATTRIBUTE *always_sens_attr = NULL;
536 CK_RV rc;
537
538
539 rc = key_object_set_default_attributes(tmpl, mode);
540 if (rc != CKR_OK) {
541 return (rc);
542 }
543 class_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
544 sizeof (CK_OBJECT_CLASS));
545 subject_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE));
546 sensitive_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
547 sizeof (CK_BBOOL));
548 decrypt_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
549 sizeof (CK_BBOOL));
550 sign_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
551 sizeof (CK_BBOOL));
552 sign_recover_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
553 sizeof (CK_BBOOL));
554 unwrap_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
555 sizeof (CK_BBOOL));
556 extractable_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
557 sizeof (CK_BBOOL));
558 never_extr_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
559 sizeof (CK_BBOOL));
560 always_sens_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
561 sizeof (CK_BBOOL));
562
563 if (! class_attr || ! subject_attr || ! sensitive_attr ||
564 ! decrypt_attr || ! sign_attr || ! sign_recover_attr ||
565 ! unwrap_attr || ! extractable_attr ||
566 ! never_extr_attr || ! always_sens_attr) {
567 if (class_attr) free(class_attr);
568 if (subject_attr) free(subject_attr);
569 if (sensitive_attr) free(sensitive_attr);
570 if (decrypt_attr) free(decrypt_attr);
571 if (sign_attr) free(sign_attr);
572 if (sign_recover_attr) free(sign_recover_attr);
573 if (unwrap_attr) free(unwrap_attr);
574 if (extractable_attr) free(extractable_attr);
575 if (always_sens_attr) free(always_sens_attr);
576 if (never_extr_attr) free(never_extr_attr);
577
578 return (CKR_HOST_MEMORY);
579 }
580
581 class_attr->type = CKA_CLASS;
582 class_attr->ulValueLen = sizeof (CK_OBJECT_CLASS);
583 class_attr->pValue = (CK_BYTE *)class_attr + sizeof (CK_ATTRIBUTE);
584 *(CK_OBJECT_CLASS *)class_attr->pValue = CKO_PRIVATE_KEY;
585
586 subject_attr->type = CKA_SUBJECT;
587 subject_attr->ulValueLen = 0; // empty string
588 subject_attr->pValue = NULL;
589
590 sensitive_attr->type = CKA_SENSITIVE;
591 sensitive_attr->ulValueLen = sizeof (CK_BBOOL);
592 sensitive_attr->pValue = (CK_BYTE *)sensitive_attr +
593 sizeof (CK_ATTRIBUTE);
594 *(CK_BBOOL *)sensitive_attr->pValue = FALSE;
595
596 decrypt_attr->type = CKA_DECRYPT;
597 decrypt_attr->ulValueLen = sizeof (CK_BBOOL);
598 decrypt_attr->pValue = (CK_BYTE *)decrypt_attr +
599 sizeof (CK_ATTRIBUTE);
600 *(CK_BBOOL *)decrypt_attr->pValue = TRUE;
601
602 sign_attr->type = CKA_SIGN;
603 sign_attr->ulValueLen = sizeof (CK_BBOOL);
604 sign_attr->pValue = (CK_BYTE *)sign_attr +
605 sizeof (CK_ATTRIBUTE);
606 *(CK_BBOOL *)sign_attr->pValue = TRUE;
607
608 sign_recover_attr->type = CKA_SIGN_RECOVER;
609 sign_recover_attr->ulValueLen = sizeof (CK_BBOOL);
610 sign_recover_attr->pValue = (CK_BYTE *)sign_recover_attr +
611 sizeof (CK_ATTRIBUTE);
612 *(CK_BBOOL *)sign_recover_attr->pValue = TRUE;
613
614 unwrap_attr->type = CKA_UNWRAP;
615 unwrap_attr->ulValueLen = sizeof (CK_BBOOL);
616 unwrap_attr->pValue = (CK_BYTE *)unwrap_attr +
617 sizeof (CK_ATTRIBUTE);
618 *(CK_BBOOL *)unwrap_attr->pValue = TRUE;
619
620 extractable_attr->type = CKA_EXTRACTABLE;
621 extractable_attr->ulValueLen = sizeof (CK_BBOOL);
622 extractable_attr->pValue = (CK_BYTE *)extractable_attr +
623 sizeof (CK_ATTRIBUTE);
624 *(CK_BBOOL *)extractable_attr->pValue = TRUE;
625
626 never_extr_attr->type = CKA_NEVER_EXTRACTABLE;
627 never_extr_attr->ulValueLen = sizeof (CK_BBOOL);
628 never_extr_attr->pValue = (CK_BYTE *)never_extr_attr +
629 sizeof (CK_ATTRIBUTE);
630 *(CK_BBOOL *)never_extr_attr->pValue = FALSE;
631
632 always_sens_attr->type = CKA_ALWAYS_SENSITIVE;
633 always_sens_attr->ulValueLen = sizeof (CK_BBOOL);
634 always_sens_attr->pValue = (CK_BYTE *)always_sens_attr +
635 sizeof (CK_ATTRIBUTE);
636 *(CK_BBOOL *)always_sens_attr->pValue = FALSE;
637
638 (void) template_update_attribute(tmpl, class_attr);
639 (void) template_update_attribute(tmpl, subject_attr);
640 (void) template_update_attribute(tmpl, sensitive_attr);
641 (void) template_update_attribute(tmpl, decrypt_attr);
642 (void) template_update_attribute(tmpl, sign_attr);
643 (void) template_update_attribute(tmpl, sign_recover_attr);
644 (void) template_update_attribute(tmpl, unwrap_attr);
645 (void) template_update_attribute(tmpl, extractable_attr);
646 (void) template_update_attribute(tmpl, never_extr_attr);
647 (void) template_update_attribute(tmpl, always_sens_attr);
648
649 return (CKR_OK);
650 }
651
652 CK_RV
priv_key_unwrap(TEMPLATE * tmpl,CK_ULONG keytype,CK_BYTE * data,CK_ULONG data_len)653 priv_key_unwrap(TEMPLATE *tmpl,
654 CK_ULONG keytype,
655 CK_BYTE *data,
656 CK_ULONG data_len)
657 {
658 CK_ATTRIBUTE *extractable = NULL;
659 CK_ATTRIBUTE *always_sens = NULL;
660 CK_ATTRIBUTE *never_extract = NULL;
661 CK_ATTRIBUTE *sensitive = NULL;
662 CK_ATTRIBUTE *local = NULL;
663 CK_BBOOL true = TRUE;
664 CK_BBOOL false = FALSE;
665 CK_RV rc;
666
667 switch (keytype) {
668 case CKK_RSA:
669 rc = rsa_priv_unwrap(tmpl, data, data_len);
670 break;
671
672 default:
673 return (CKR_WRAPPED_KEY_INVALID);
674 }
675
676 if (rc != CKR_OK) {
677 return (rc);
678 }
679
680 /*
681 * make sure
682 * CKA_LOCAL == FALSE
683 * CKA_ALWAYS_SENSITIVE == FALSE
684 * CKA_EXTRACTABLE == TRUE
685 * CKA_NEVER_EXTRACTABLE == FALSE
686 */
687 rc = build_attribute(CKA_LOCAL, &false, 1, &local);
688 if (rc != CKR_OK) {
689 goto cleanup;
690 }
691 rc = build_attribute(CKA_ALWAYS_SENSITIVE, &false, 1, &always_sens);
692 if (rc != CKR_OK) {
693 goto cleanup;
694 }
695 rc = build_attribute(CKA_SENSITIVE, &false, 1, &sensitive);
696 if (rc != CKR_OK) {
697 goto cleanup;
698 }
699 rc = build_attribute(CKA_EXTRACTABLE, &true, 1, &extractable);
700 if (rc != CKR_OK) {
701 goto cleanup;
702 }
703 rc = build_attribute(CKA_NEVER_EXTRACTABLE, &false, 1, &never_extract);
704 if (rc != CKR_OK) {
705 goto cleanup;
706 }
707 (void) template_update_attribute(tmpl, local);
708 (void) template_update_attribute(tmpl, always_sens);
709 (void) template_update_attribute(tmpl, sensitive);
710 (void) template_update_attribute(tmpl, extractable);
711 (void) template_update_attribute(tmpl, never_extract);
712
713 return (CKR_OK);
714
715 cleanup:
716
717 if (local) free(local);
718 if (always_sens) free(always_sens);
719 if (extractable) free(extractable);
720 if (never_extract) free(never_extract);
721
722 return (rc);
723 }
724
725 CK_RV
priv_key_validate_attribute(TEMPLATE * tmpl,CK_ATTRIBUTE * attr,CK_ULONG mode)726 priv_key_validate_attribute(TEMPLATE *tmpl, CK_ATTRIBUTE *attr, CK_ULONG mode) {
727 switch (attr->type) {
728 case CKA_SUBJECT:
729 return (CKR_OK);
730
731 case CKA_DECRYPT:
732 case CKA_SIGN:
733 case CKA_SIGN_RECOVER:
734 case CKA_UNWRAP:
735 // we might want to do this for MODE_COPY too
736 //
737 if (mode == MODE_MODIFY) {
738 if (nv_token_data->tweak_vector.allow_key_mods == TRUE)
739 return (CKR_OK);
740 return (CKR_ATTRIBUTE_READ_ONLY);
741 }
742 return (CKR_OK);
743
744 // after key creation, CKA_SENSITIVE may only be set to TRUE
745 //
746 case CKA_SENSITIVE:
747 {
748 CK_BBOOL value;
749
750 if (mode == MODE_CREATE || mode == MODE_KEYGEN)
751 return (CKR_OK);
752
753 value = *(CK_BBOOL *)attr->pValue;
754 if (value != TRUE) {
755 return (CKR_ATTRIBUTE_READ_ONLY);
756 }
757 }
758 return (CKR_OK);
759
760 case CKA_EXTRACTABLE:
761 {
762 CK_BBOOL value;
763
764 value = *(CK_BBOOL *)attr->pValue;
765 if ((mode != MODE_CREATE && mode != MODE_KEYGEN) &&
766 value != FALSE) {
767 return (CKR_ATTRIBUTE_READ_ONLY);
768 }
769 if (value == FALSE) {
770 CK_ATTRIBUTE *attr;
771
772 attr = (CK_ATTRIBUTE *)malloc(
773 sizeof (CK_ATTRIBUTE) + sizeof (CK_BBOOL));
774 if (! attr) {
775 return (CKR_HOST_MEMORY);
776 }
777 attr->type = CKA_NEVER_EXTRACTABLE;
778 attr->ulValueLen = sizeof (CK_BBOOL);
779 attr->pValue = (CK_BYTE *)attr +
780 sizeof (CK_ATTRIBUTE);
781 *(CK_BBOOL *)attr->pValue = FALSE;
782
783 (void) template_update_attribute(tmpl, attr);
784 }
785 }
786 return (CKR_OK);
787
788 case CKA_ALWAYS_SENSITIVE:
789 case CKA_NEVER_EXTRACTABLE:
790 return (CKR_ATTRIBUTE_READ_ONLY);
791
792 default:
793 return (key_object_validate_attribute(tmpl, attr, mode));
794 }
795 }
796
797 CK_RV
secret_key_check_required_attributes(TEMPLATE * tmpl,CK_ULONG mode)798 secret_key_check_required_attributes(TEMPLATE *tmpl, CK_ULONG mode)
799 {
800 return (key_object_check_required_attributes(tmpl, mode));
801 }
802
803 CK_RV
secret_key_set_default_attributes(TEMPLATE * tmpl,CK_ULONG mode)804 secret_key_set_default_attributes(TEMPLATE *tmpl, CK_ULONG mode)
805 {
806 CK_ATTRIBUTE *class_attr = NULL;
807 CK_ATTRIBUTE *sensitive_attr = NULL;
808 CK_ATTRIBUTE *encrypt_attr = NULL;
809 CK_ATTRIBUTE *decrypt_attr = NULL;
810 CK_ATTRIBUTE *sign_attr = NULL;
811 CK_ATTRIBUTE *verify_attr = NULL;
812 CK_ATTRIBUTE *wrap_attr = NULL;
813 CK_ATTRIBUTE *unwrap_attr = NULL;
814 CK_ATTRIBUTE *extractable_attr = NULL;
815 CK_ATTRIBUTE *never_extr_attr = NULL;
816 CK_ATTRIBUTE *always_sens_attr = NULL;
817 CK_RV rc;
818
819
820 rc = key_object_set_default_attributes(tmpl, mode);
821 if (rc != CKR_OK)
822 return (rc);
823
824 class_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
825 sizeof (CK_OBJECT_CLASS));
826 sensitive_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
827 sizeof (CK_BBOOL));
828 encrypt_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
829 sizeof (CK_BBOOL));
830 decrypt_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
831 sizeof (CK_BBOOL));
832 sign_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
833 sizeof (CK_BBOOL));
834 verify_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
835 sizeof (CK_BBOOL));
836 wrap_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
837 sizeof (CK_BBOOL));
838 unwrap_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
839 sizeof (CK_BBOOL));
840 extractable_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
841 sizeof (CK_BBOOL));
842 never_extr_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
843 sizeof (CK_BBOOL));
844 always_sens_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
845 sizeof (CK_BBOOL));
846
847 if (! class_attr || ! sensitive_attr || ! encrypt_attr ||
848 ! decrypt_attr || ! sign_attr || ! verify_attr ||
849 ! wrap_attr || ! unwrap_attr || ! extractable_attr ||
850 ! never_extr_attr || ! always_sens_attr) {
851 if (class_attr) free(class_attr);
852 if (sensitive_attr) free(sensitive_attr);
853 if (encrypt_attr) free(encrypt_attr);
854 if (decrypt_attr) free(decrypt_attr);
855 if (sign_attr) free(sign_attr);
856 if (verify_attr) free(verify_attr);
857 if (wrap_attr) free(wrap_attr);
858 if (unwrap_attr) free(unwrap_attr);
859 if (extractable_attr) free(extractable_attr);
860 if (never_extr_attr) free(never_extr_attr);
861 if (always_sens_attr) free(always_sens_attr);
862
863 return (CKR_HOST_MEMORY);
864 }
865
866 class_attr->type = CKA_CLASS;
867 class_attr->ulValueLen = sizeof (CK_OBJECT_CLASS);
868 class_attr->pValue = (CK_BYTE *)class_attr +
869 sizeof (CK_ATTRIBUTE);
870 *(CK_OBJECT_CLASS *)class_attr->pValue = CKO_SECRET_KEY;
871
872 sensitive_attr->type = CKA_SENSITIVE;
873 sensitive_attr->ulValueLen = sizeof (CK_BBOOL);
874 sensitive_attr->pValue = (CK_BYTE *)sensitive_attr +
875 sizeof (CK_ATTRIBUTE);
876 *(CK_BBOOL *)sensitive_attr->pValue = FALSE;
877
878 encrypt_attr->type = CKA_ENCRYPT;
879 encrypt_attr->ulValueLen = sizeof (CK_BBOOL);
880 encrypt_attr->pValue = (CK_BYTE *)encrypt_attr +
881 sizeof (CK_ATTRIBUTE);
882 *(CK_BBOOL *)encrypt_attr->pValue = TRUE;
883
884 decrypt_attr->type = CKA_DECRYPT;
885 decrypt_attr->ulValueLen = sizeof (CK_BBOOL);
886 decrypt_attr->pValue = (CK_BYTE *)decrypt_attr +
887 sizeof (CK_ATTRIBUTE);
888 *(CK_BBOOL *)decrypt_attr->pValue = TRUE;
889
890 sign_attr->type = CKA_SIGN;
891 sign_attr->ulValueLen = sizeof (CK_BBOOL);
892 sign_attr->pValue = (CK_BYTE *)sign_attr +
893 sizeof (CK_ATTRIBUTE);
894 *(CK_BBOOL *)sign_attr->pValue = TRUE;
895
896 verify_attr->type = CKA_VERIFY;
897 verify_attr->ulValueLen = sizeof (CK_BBOOL);
898 verify_attr->pValue = (CK_BYTE *)verify_attr +
899 sizeof (CK_ATTRIBUTE);
900 *(CK_BBOOL *)verify_attr->pValue = TRUE;
901
902 wrap_attr->type = CKA_WRAP;
903 wrap_attr->ulValueLen = sizeof (CK_BBOOL);
904 wrap_attr->pValue = (CK_BYTE *)wrap_attr +
905 sizeof (CK_ATTRIBUTE);
906 *(CK_BBOOL *)wrap_attr->pValue = TRUE;
907
908 unwrap_attr->type = CKA_UNWRAP;
909 unwrap_attr->ulValueLen = sizeof (CK_BBOOL);
910 unwrap_attr->pValue = (CK_BYTE *)unwrap_attr +
911 sizeof (CK_ATTRIBUTE);
912 *(CK_BBOOL *)unwrap_attr->pValue = TRUE;
913
914 extractable_attr->type = CKA_EXTRACTABLE;
915 extractable_attr->ulValueLen = sizeof (CK_BBOOL);
916 extractable_attr->pValue = (CK_BYTE *)extractable_attr +
917 sizeof (CK_ATTRIBUTE);
918 *(CK_BBOOL *)extractable_attr->pValue = TRUE;
919
920 always_sens_attr->type = CKA_ALWAYS_SENSITIVE;
921 always_sens_attr->ulValueLen = sizeof (CK_BBOOL);
922 always_sens_attr->pValue = (CK_BYTE *)always_sens_attr +
923 sizeof (CK_ATTRIBUTE);
924 *(CK_BBOOL *)always_sens_attr->pValue = FALSE;
925
926 never_extr_attr->type = CKA_NEVER_EXTRACTABLE;
927 never_extr_attr->ulValueLen = sizeof (CK_BBOOL);
928 never_extr_attr->pValue = (CK_BYTE *)never_extr_attr +
929 sizeof (CK_ATTRIBUTE);
930 *(CK_BBOOL *)never_extr_attr->pValue = FALSE;
931
932 (void) template_update_attribute(tmpl, class_attr);
933 (void) template_update_attribute(tmpl, sensitive_attr);
934 (void) template_update_attribute(tmpl, encrypt_attr);
935 (void) template_update_attribute(tmpl, decrypt_attr);
936 (void) template_update_attribute(tmpl, sign_attr);
937 (void) template_update_attribute(tmpl, verify_attr);
938 (void) template_update_attribute(tmpl, wrap_attr);
939 (void) template_update_attribute(tmpl, unwrap_attr);
940 (void) template_update_attribute(tmpl, extractable_attr);
941 (void) template_update_attribute(tmpl, never_extr_attr);
942 (void) template_update_attribute(tmpl, always_sens_attr);
943
944 return (CKR_OK);
945 }
946
947 CK_RV
secret_key_unwrap(TEMPLATE * tmpl,CK_ULONG keytype,CK_BYTE * data,CK_ULONG data_len,CK_BBOOL fromend)948 secret_key_unwrap(TEMPLATE *tmpl,
949 CK_ULONG keytype,
950 CK_BYTE *data,
951 CK_ULONG data_len,
952 CK_BBOOL fromend)
953 {
954 CK_ATTRIBUTE *local = NULL;
955 CK_ATTRIBUTE *always_sens = NULL;
956 CK_ATTRIBUTE *sensitive = NULL;
957 CK_ATTRIBUTE *extractable = NULL;
958 CK_ATTRIBUTE *never_extract = NULL;
959 CK_BBOOL true = TRUE;
960 CK_BBOOL false = FALSE;
961 CK_RV rc;
962
963 switch (keytype) {
964 case CKK_GENERIC_SECRET:
965 rc = generic_secret_unwrap(tmpl, data, data_len, fromend);
966 break;
967
968 default:
969 return (CKR_WRAPPED_KEY_INVALID);
970 }
971
972 if (rc != CKR_OK)
973 return (rc);
974
975 // make sure
976 // CKA_LOCAL == FALSE
977 // CKA_ALWAYS_SENSITIVE == FALSE
978 // CKA_EXTRACTABLE == TRUE
979 // CKA_NEVER_EXTRACTABLE == FALSE
980 //
981 rc = build_attribute(CKA_LOCAL, &false, 1, &local);
982 if (rc != CKR_OK) {
983 goto cleanup;
984 }
985 rc = build_attribute(CKA_ALWAYS_SENSITIVE, &false, 1, &always_sens);
986 if (rc != CKR_OK) {
987 goto cleanup;
988 }
989 rc = build_attribute(CKA_SENSITIVE, &false, 1, &sensitive);
990 if (rc != CKR_OK) {
991 goto cleanup;
992 }
993 rc = build_attribute(CKA_EXTRACTABLE, &true, 1, &extractable);
994 if (rc != CKR_OK) {
995 goto cleanup;
996 }
997 rc = build_attribute(CKA_NEVER_EXTRACTABLE, &false, 1, &never_extract);
998 if (rc != CKR_OK) {
999 goto cleanup;
1000 }
1001 (void) template_update_attribute(tmpl, local);
1002 (void) template_update_attribute(tmpl, always_sens);
1003 (void) template_update_attribute(tmpl, sensitive);
1004 (void) template_update_attribute(tmpl, extractable);
1005 (void) template_update_attribute(tmpl, never_extract);
1006
1007 return (CKR_OK);
1008
1009 cleanup:
1010
1011 if (local) free(local);
1012 if (extractable) free(extractable);
1013 if (always_sens) free(always_sens);
1014 if (never_extract) free(never_extract);
1015
1016 return (rc);
1017 }
1018
1019 CK_RV
secret_key_validate_attribute(TEMPLATE * tmpl,CK_ATTRIBUTE * attr,CK_ULONG mode)1020 secret_key_validate_attribute(TEMPLATE *tmpl, CK_ATTRIBUTE *attr,
1021 CK_ULONG mode)
1022 {
1023 switch (attr->type) {
1024 case CKA_ENCRYPT:
1025 case CKA_DECRYPT:
1026 case CKA_SIGN:
1027 case CKA_VERIFY:
1028 case CKA_WRAP:
1029 case CKA_UNWRAP:
1030 if (mode == MODE_MODIFY) {
1031 if (nv_token_data->tweak_vector.allow_key_mods == TRUE)
1032 return (CKR_OK);
1033 return (CKR_ATTRIBUTE_READ_ONLY);
1034 }
1035 return (CKR_OK);
1036
1037 // after key creation, CKA_SENSITIVE may only be set to TRUE
1038 //
1039 case CKA_SENSITIVE:
1040 {
1041 CK_BBOOL value;
1042
1043 value = *(CK_BBOOL *)attr->pValue;
1044 if ((mode != MODE_CREATE && mode != MODE_DERIVE &&
1045 mode != MODE_KEYGEN) && (value != TRUE)) {
1046 return (CKR_ATTRIBUTE_READ_ONLY);
1047 }
1048 }
1049 return (CKR_OK);
1050
1051 case CKA_EXTRACTABLE:
1052 {
1053 CK_BBOOL value;
1054
1055 value = *(CK_BBOOL *)attr->pValue;
1056 if ((mode != MODE_CREATE && mode != MODE_DERIVE &&
1057 mode != MODE_KEYGEN) && (value != FALSE)) {
1058 return (CKR_ATTRIBUTE_READ_ONLY);
1059 }
1060 if (value == FALSE) {
1061 CK_ATTRIBUTE *attr;
1062
1063 attr = (CK_ATTRIBUTE *)malloc(
1064 sizeof (CK_ATTRIBUTE) + sizeof (CK_BBOOL));
1065 if (! attr) {
1066 return (CKR_HOST_MEMORY);
1067 }
1068 attr->type = CKA_NEVER_EXTRACTABLE;
1069 attr->ulValueLen = sizeof (CK_BBOOL);
1070 attr->pValue = (CK_BYTE *)attr +
1071 sizeof (CK_ATTRIBUTE);
1072 *(CK_BBOOL *)attr->pValue = FALSE;
1073
1074 (void) template_update_attribute(tmpl, attr);
1075 }
1076 }
1077 return (CKR_OK);
1078
1079 case CKA_ALWAYS_SENSITIVE:
1080 case CKA_NEVER_EXTRACTABLE:
1081 return (CKR_ATTRIBUTE_READ_ONLY);
1082
1083 default:
1084 return (key_object_validate_attribute(tmpl,
1085 attr, mode));
1086 }
1087 }
1088
1089 CK_BBOOL
secret_key_check_exportability(CK_ATTRIBUTE_TYPE type)1090 secret_key_check_exportability(CK_ATTRIBUTE_TYPE type)
1091 {
1092 switch (type) {
1093 case CKA_VALUE:
1094 return (FALSE);
1095 }
1096
1097 return (TRUE);
1098 }
1099
1100 CK_RV
rsa_publ_check_required_attributes(TEMPLATE * tmpl,CK_ULONG mode)1101 rsa_publ_check_required_attributes(TEMPLATE *tmpl, CK_ULONG mode)
1102 {
1103 CK_ATTRIBUTE *attr = NULL;
1104 CK_BBOOL found;
1105
1106 found = template_attribute_find(tmpl, CKA_MODULUS, &attr);
1107 if (! found) {
1108 if (mode == MODE_CREATE) {
1109 return (CKR_TEMPLATE_INCOMPLETE);
1110 }
1111 }
1112
1113 found = template_attribute_find(tmpl, CKA_MODULUS_BITS, &attr);
1114 if (! found) {
1115 if (mode == MODE_KEYGEN) {
1116 return (CKR_TEMPLATE_INCOMPLETE);
1117 }
1118 }
1119
1120 found = template_attribute_find(tmpl, CKA_PUBLIC_EXPONENT, &attr);
1121 if (! found) {
1122 if (mode == MODE_CREATE || mode == MODE_KEYGEN) {
1123 return (CKR_TEMPLATE_INCOMPLETE);
1124 }
1125 }
1126
1127 return (publ_key_check_required_attributes(tmpl, mode));
1128 }
1129
1130 CK_RV
rsa_publ_set_default_attributes(TEMPLATE * tmpl,CK_ULONG mode)1131 rsa_publ_set_default_attributes(TEMPLATE *tmpl, CK_ULONG mode)
1132 {
1133 CK_ATTRIBUTE *type_attr = NULL;
1134 CK_ATTRIBUTE *modulus_attr = NULL;
1135 CK_ATTRIBUTE *modulus_bits_attr = NULL;
1136 CK_ATTRIBUTE *public_exp_attr = NULL;
1137 CK_ULONG bits = 0L;
1138
1139 (void) publ_key_set_default_attributes(tmpl, mode);
1140
1141 type_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
1142 sizeof (CK_KEY_TYPE));
1143 modulus_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE));
1144 modulus_bits_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
1145 sizeof (CK_ULONG));
1146 public_exp_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE));
1147
1148 if (! type_attr || ! modulus_attr ||
1149 ! modulus_bits_attr || ! public_exp_attr) {
1150 if (type_attr) free(type_attr);
1151 if (modulus_attr) free(modulus_attr);
1152 if (modulus_bits_attr) free(modulus_bits_attr);
1153 if (public_exp_attr) free(public_exp_attr);
1154
1155 return (CKR_HOST_MEMORY);
1156 }
1157
1158 type_attr->type = CKA_KEY_TYPE;
1159 type_attr->ulValueLen = sizeof (CK_KEY_TYPE);
1160 type_attr->pValue = (CK_BYTE *)type_attr +
1161 sizeof (CK_ATTRIBUTE);
1162 *(CK_KEY_TYPE *)type_attr->pValue = CKK_RSA;
1163
1164 modulus_attr->type = CKA_MODULUS;
1165 modulus_attr->ulValueLen = 0;
1166 modulus_attr->pValue = NULL;
1167
1168 modulus_bits_attr->type = CKA_MODULUS_BITS;
1169 modulus_bits_attr->ulValueLen = sizeof (CK_ULONG);
1170 modulus_bits_attr->pValue = (CK_BYTE *)modulus_bits_attr +
1171 sizeof (CK_ATTRIBUTE);
1172 *(CK_ULONG *)modulus_bits_attr->pValue = bits;
1173
1174 public_exp_attr->type = CKA_PUBLIC_EXPONENT;
1175 public_exp_attr->ulValueLen = 0;
1176 public_exp_attr->pValue = NULL;
1177
1178 (void) template_update_attribute(tmpl, type_attr);
1179 (void) template_update_attribute(tmpl, modulus_attr);
1180 (void) template_update_attribute(tmpl, modulus_bits_attr);
1181 (void) template_update_attribute(tmpl, public_exp_attr);
1182
1183 return (CKR_OK);
1184 }
1185
1186 CK_RV
rsa_publ_validate_attribute(TEMPLATE * tmpl,CK_ATTRIBUTE * attr,CK_ULONG mode)1187 rsa_publ_validate_attribute(TEMPLATE *tmpl, CK_ATTRIBUTE *attr, CK_ULONG mode) {
1188 switch (attr->type) {
1189 case CKA_MODULUS_BITS:
1190 if (mode == MODE_KEYGEN) {
1191 if (attr->ulValueLen != sizeof (CK_ULONG)) {
1192 return (CKR_ATTRIBUTE_VALUE_INVALID);
1193 } else {
1194 CK_ULONG mod_bits = *(CK_ULONG *)attr->pValue;
1195
1196 if (mod_bits < 512 || mod_bits > 2048) {
1197 return (CKR_ATTRIBUTE_VALUE_INVALID);
1198 }
1199
1200 if (mod_bits % 8 != 0) {
1201 return (CKR_ATTRIBUTE_VALUE_INVALID);
1202 }
1203 return (CKR_OK);
1204 }
1205 } else {
1206 return (CKR_ATTRIBUTE_READ_ONLY);
1207 }
1208 case CKA_MODULUS:
1209 if (mode == MODE_CREATE)
1210 return (remove_leading_zeros(attr));
1211 else {
1212 return (CKR_ATTRIBUTE_READ_ONLY);
1213 }
1214 case CKA_PUBLIC_EXPONENT:
1215 if (mode == MODE_CREATE || mode == MODE_KEYGEN)
1216 return (remove_leading_zeros(attr));
1217 else {
1218 return (CKR_ATTRIBUTE_READ_ONLY);
1219 }
1220 default:
1221 return (publ_key_validate_attribute(tmpl, attr, mode));
1222 }
1223 }
1224
1225 CK_RV
rsa_priv_check_required_attributes(TEMPLATE * tmpl,CK_ULONG mode)1226 rsa_priv_check_required_attributes(TEMPLATE *tmpl, CK_ULONG mode) {
1227 CK_ATTRIBUTE *attr = NULL;
1228 CK_BBOOL found;
1229
1230 found = template_attribute_find(tmpl, CKA_MODULUS, &attr);
1231 if (! found) {
1232 if (mode == MODE_CREATE) {
1233 return (CKR_TEMPLATE_INCOMPLETE);
1234 }
1235 }
1236
1237 //
1238 // PKCS #11 is flexible with respect to which attributes must be present
1239 // in an RSA key. Keys can be specified in Chinese Remainder format or
1240 // they can be specified in modula exponent format. Right now, I only
1241 // support keys created in Chinese Remainder format. That is, we return
1242 // CKR_TEMPLATE_INCOMPLETE if a modula exponent key is specified. This
1243 // is allowed by PKCS #11.
1244 //
1245 // In the future, we should allow for creation of keys in modula exp
1246 // format too. This raises some issues. It's easy enough to recognize
1247 // when a key has been specified in modula exponent format. And it's
1248 // easy enough to recognize when all attributes have been specified
1249 // (which is what we require right now). What's trickier to handle is
1250 // the "middle" cases in which more than the minimum yet less than the
1251 // full number of attributes have been specified. Do we revert back to
1252 // modula - exponent representation? Do we compute the missing
1253 // attributes ourselves? Do we simply return CKR_TEMPLATE_INCOMPLETE?
1254 //
1255
1256 found = template_attribute_find(tmpl, CKA_PUBLIC_EXPONENT, &attr);
1257 if (! found) {
1258 if (mode == MODE_CREATE) {
1259 return (CKR_TEMPLATE_INCOMPLETE);
1260 }
1261 }
1262
1263 found = template_attribute_find(tmpl, CKA_PRIVATE_EXPONENT, &attr);
1264 if (! found) {
1265 if (mode == MODE_CREATE) {
1266 return (CKR_TEMPLATE_INCOMPLETE);
1267 }
1268 }
1269
1270 found = template_attribute_find(tmpl, CKA_PRIME_1, &attr);
1271 if (! found) {
1272 if (mode == MODE_CREATE) {
1273 return (CKR_TEMPLATE_INCOMPLETE);
1274 }
1275 }
1276
1277 found = template_attribute_find(tmpl, CKA_PRIME_2, &attr);
1278 if (! found) {
1279 if (mode == MODE_CREATE) {
1280 return (CKR_TEMPLATE_INCOMPLETE);
1281 }
1282 }
1283
1284 found = template_attribute_find(tmpl, CKA_EXPONENT_1, &attr);
1285 if (! found) {
1286 if (mode == MODE_CREATE) {
1287 return (CKR_TEMPLATE_INCOMPLETE);
1288 }
1289 }
1290
1291 found = template_attribute_find(tmpl, CKA_EXPONENT_2, &attr);
1292 if (! found) {
1293 if (mode == MODE_CREATE) {
1294 return (CKR_TEMPLATE_INCOMPLETE);
1295 }
1296 }
1297
1298 found = template_attribute_find(tmpl, CKA_COEFFICIENT, &attr);
1299 if (! found) {
1300 if (mode == MODE_CREATE) {
1301 return (CKR_TEMPLATE_INCOMPLETE);
1302 }
1303 }
1304
1305 return (priv_key_check_required_attributes(tmpl, mode));
1306 }
1307
1308 CK_RV
rsa_priv_set_default_attributes(TEMPLATE * tmpl,CK_ULONG mode)1309 rsa_priv_set_default_attributes(TEMPLATE *tmpl, CK_ULONG mode)
1310 {
1311 CK_ATTRIBUTE *modulus_attr = NULL;
1312 CK_ATTRIBUTE *public_exp_attr = NULL;
1313 CK_ATTRIBUTE *private_exp_attr = NULL;
1314 CK_ATTRIBUTE *type_attr = NULL;
1315
1316 (void) priv_key_set_default_attributes(tmpl, mode);
1317
1318 type_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
1319 sizeof (CK_KEY_TYPE));
1320 modulus_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE));
1321 public_exp_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE));
1322 private_exp_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE));
1323
1324 if (! type_attr || ! modulus_attr || ! public_exp_attr ||
1325 ! private_exp_attr) {
1326 if (type_attr) free(type_attr);
1327 if (modulus_attr) free(modulus_attr);
1328 if (public_exp_attr) free(public_exp_attr);
1329 if (private_exp_attr) free(private_exp_attr);
1330
1331 return (CKR_HOST_MEMORY);
1332 }
1333
1334 modulus_attr->type = CKA_MODULUS;
1335 modulus_attr->ulValueLen = 0;
1336 modulus_attr->pValue = NULL;
1337
1338 public_exp_attr->type = CKA_PUBLIC_EXPONENT;
1339 public_exp_attr->ulValueLen = 0;
1340 public_exp_attr->pValue = NULL;
1341
1342 private_exp_attr->type = CKA_PRIVATE_EXPONENT;
1343 private_exp_attr->ulValueLen = 0;
1344 private_exp_attr->pValue = NULL;
1345
1346 type_attr->type = CKA_KEY_TYPE;
1347 type_attr->ulValueLen = sizeof (CK_KEY_TYPE);
1348 type_attr->pValue = (CK_BYTE *)type_attr + sizeof (CK_ATTRIBUTE);
1349 *(CK_KEY_TYPE *)type_attr->pValue = CKK_RSA;
1350
1351 (void) template_update_attribute(tmpl, type_attr);
1352 (void) template_update_attribute(tmpl, modulus_attr);
1353 (void) template_update_attribute(tmpl, public_exp_attr);
1354 (void) template_update_attribute(tmpl, private_exp_attr);
1355
1356 return (CKR_OK);
1357 }
1358
1359 CK_RV
rsa_priv_validate_attribute(TEMPLATE * tmpl,CK_ATTRIBUTE * attr,CK_ULONG mode)1360 rsa_priv_validate_attribute(TEMPLATE *tmpl, CK_ATTRIBUTE *attr, CK_ULONG mode) {
1361 switch (attr->type) {
1362 case CKA_MODULUS:
1363 case CKA_PRIVATE_EXPONENT:
1364 if (mode == MODE_CREATE)
1365 return (remove_leading_zeros(attr));
1366 else {
1367 return (CKR_ATTRIBUTE_READ_ONLY);
1368 }
1369 case CKA_PUBLIC_EXPONENT:
1370 case CKA_PRIME_1:
1371 case CKA_PRIME_2:
1372 case CKA_EXPONENT_1:
1373 case CKA_EXPONENT_2:
1374 case CKA_COEFFICIENT:
1375 if (mode == MODE_CREATE)
1376 return (remove_leading_zeros(attr));
1377 else {
1378 return (CKR_ATTRIBUTE_READ_ONLY);
1379 }
1380 default:
1381 return (priv_key_validate_attribute(tmpl, attr, mode));
1382 }
1383 }
1384
1385 CK_BBOOL
rsa_priv_check_exportability(CK_ATTRIBUTE_TYPE type)1386 rsa_priv_check_exportability(CK_ATTRIBUTE_TYPE type) {
1387 switch (type) {
1388 case CKA_PRIVATE_EXPONENT:
1389 case CKA_PRIME_1:
1390 case CKA_PRIME_2:
1391 case CKA_EXPONENT_1:
1392 case CKA_EXPONENT_2:
1393 case CKA_COEFFICIENT:
1394 return (FALSE);
1395 }
1396
1397 return (TRUE);
1398 }
1399
1400
1401 /*
1402 * create the ASN.1 encoding for the private key for wrapping as defined
1403 * in PKCS #8
1404 *
1405 * ASN.1 type PrivateKeyInfo ::= SEQUENCE {
1406 * version Version
1407 * privateKeyAlgorithm PrivateKeyAlgorithmIdentifier
1408 * privateKey PrivateKey
1409 * attributes OPTIONAL
1410 *
1411 * }
1412 *
1413 * Where PrivateKey is defined as follows for RSA:
1414 *
1415 * ASN.1 type RSAPrivateKey
1416 *
1417 * RSAPrivateKey ::= SEQUENCE {
1418 * version Version
1419 * modulus INTEGER
1420 * publicExponent INTEGER
1421 * privateExponent INTEGER
1422 * prime1 INTEGER
1423 * prime2 INTEGER
1424 * exponent1 INTEGER
1425 * exponent2 INTEGER
1426 * coefficient INTEGER
1427 * }
1428 */
1429 CK_RV
rsa_priv_wrap_get_data(TEMPLATE * tmpl,CK_BBOOL length_only,CK_BYTE ** data,CK_ULONG * data_len)1430 rsa_priv_wrap_get_data(TEMPLATE *tmpl,
1431 CK_BBOOL length_only,
1432 CK_BYTE **data,
1433 CK_ULONG *data_len)
1434 {
1435 CK_ATTRIBUTE *modulus = NULL;
1436 CK_ATTRIBUTE *publ_exp = NULL, *priv_exp = NULL;
1437 CK_ATTRIBUTE *prime1 = NULL, *prime2 = NULL;
1438 CK_ATTRIBUTE *exponent1 = NULL, *exponent2 = NULL;
1439 CK_ATTRIBUTE *coeff = NULL;
1440 CK_RV rc;
1441
1442 if (template_attribute_find(tmpl, CKA_MODULUS, &modulus) == FALSE) {
1443 return (CKR_FUNCTION_FAILED);
1444 }
1445 if (template_attribute_find(tmpl, CKA_PUBLIC_EXPONENT,
1446 &publ_exp) == FALSE) {
1447 return (CKR_FUNCTION_FAILED);
1448 }
1449 if (template_attribute_find(tmpl, CKA_PRIVATE_EXPONENT,
1450 &priv_exp) == FALSE) {
1451 return (CKR_FUNCTION_FAILED);
1452 }
1453 if (template_attribute_find(tmpl, CKA_PRIME_1,
1454 &prime1) == FALSE) {
1455 return (CKR_FUNCTION_FAILED);
1456 }
1457 if (template_attribute_find(tmpl, CKA_PRIME_2,
1458 &prime2) == FALSE) {
1459 return (CKR_FUNCTION_FAILED);
1460 }
1461 if (template_attribute_find(tmpl, CKA_EXPONENT_1,
1462 &exponent1) == FALSE) {
1463 return (CKR_FUNCTION_FAILED);
1464 }
1465 if (template_attribute_find(tmpl, CKA_EXPONENT_2,
1466 &exponent2) == FALSE) {
1467 return (CKR_FUNCTION_FAILED);
1468 }
1469 if (template_attribute_find(tmpl, CKA_COEFFICIENT,
1470 &coeff) == FALSE) {
1471 return (CKR_FUNCTION_FAILED);
1472 }
1473 rc = ber_encode_RSAPrivateKey(length_only, data, data_len,
1474 modulus, publ_exp, priv_exp, prime1, prime2,
1475 exponent1, exponent2, coeff);
1476
1477 return (rc);
1478 }
1479
1480 CK_RV
rsa_priv_unwrap(TEMPLATE * tmpl,CK_BYTE * data,CK_ULONG total_length)1481 rsa_priv_unwrap(TEMPLATE *tmpl,
1482 CK_BYTE *data,
1483 CK_ULONG total_length)
1484 {
1485 CK_ATTRIBUTE *modulus = NULL;
1486 CK_ATTRIBUTE *publ_exp = NULL;
1487 CK_ATTRIBUTE *priv_exp = NULL;
1488 CK_ATTRIBUTE *prime1 = NULL;
1489 CK_ATTRIBUTE *prime2 = NULL;
1490 CK_ATTRIBUTE *exponent1 = NULL;
1491 CK_ATTRIBUTE *exponent2 = NULL;
1492 CK_ATTRIBUTE *coeff = NULL;
1493 CK_RV rc;
1494
1495 rc = ber_decode_RSAPrivateKey(data, total_length,
1496 &modulus, &publ_exp, &priv_exp, &prime1, &prime2,
1497 &exponent1, &exponent2, &coeff);
1498
1499 if (rc != CKR_OK) {
1500 return (rc);
1501 }
1502 (void) remove_leading_zeros(modulus);
1503 (void) remove_leading_zeros(publ_exp);
1504 (void) remove_leading_zeros(priv_exp);
1505 (void) remove_leading_zeros(prime1);
1506 (void) remove_leading_zeros(prime2);
1507 (void) remove_leading_zeros(exponent1);
1508 (void) remove_leading_zeros(exponent2);
1509 (void) remove_leading_zeros(coeff);
1510
1511 (void) template_update_attribute(tmpl, modulus);
1512 (void) template_update_attribute(tmpl, publ_exp);
1513 (void) template_update_attribute(tmpl, priv_exp);
1514 (void) template_update_attribute(tmpl, prime1);
1515 (void) template_update_attribute(tmpl, prime2);
1516 (void) template_update_attribute(tmpl, exponent1);
1517 (void) template_update_attribute(tmpl, exponent2);
1518 (void) template_update_attribute(tmpl, coeff);
1519
1520 return (CKR_OK);
1521 }
1522
1523 CK_RV
generic_secret_check_required_attributes(TEMPLATE * tmpl,CK_ULONG mode)1524 generic_secret_check_required_attributes(TEMPLATE *tmpl, CK_ULONG mode)
1525 {
1526 CK_ATTRIBUTE *attr = NULL;
1527 CK_BBOOL found;
1528
1529 found = template_attribute_find(tmpl, CKA_VALUE, &attr);
1530 if (! found) {
1531 if (mode == MODE_CREATE) {
1532 return (CKR_TEMPLATE_INCOMPLETE);
1533 }
1534 }
1535
1536
1537 found = template_attribute_find(tmpl, CKA_VALUE_LEN, &attr);
1538 if (! found) {
1539 return (CKR_OK);
1540 } else {
1541 if (mode == MODE_CREATE) {
1542 return (CKR_ATTRIBUTE_READ_ONLY);
1543 }
1544 }
1545
1546 return (secret_key_check_required_attributes(tmpl, mode));
1547 }
1548
1549 CK_RV
generic_secret_set_default_attributes(TEMPLATE * tmpl,CK_ULONG mode)1550 generic_secret_set_default_attributes(TEMPLATE *tmpl, CK_ULONG mode)
1551 {
1552 CK_ATTRIBUTE *value_attr = NULL;
1553 CK_ATTRIBUTE *value_len_attr = NULL;
1554 CK_ATTRIBUTE *type_attr = NULL;
1555 CK_ULONG len = 0L;
1556
1557 if (mode)
1558 value_attr = NULL;
1559
1560 (void) secret_key_set_default_attributes(tmpl, mode);
1561
1562 type_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
1563 sizeof (CK_KEY_TYPE));
1564 value_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE));
1565 value_len_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
1566 sizeof (CK_ULONG));
1567
1568 if (! type_attr || ! value_attr || ! value_len_attr) {
1569 if (type_attr) free(type_attr);
1570 if (value_attr) free(value_attr);
1571 if (value_len_attr) free(value_len_attr);
1572
1573 return (CKR_HOST_MEMORY);
1574 }
1575
1576 value_attr->type = CKA_VALUE;
1577 value_attr->ulValueLen = 0;
1578 value_attr->pValue = NULL;
1579
1580 value_len_attr->type = CKA_VALUE_LEN;
1581 value_len_attr->ulValueLen = sizeof (CK_ULONG);
1582 value_len_attr->pValue = (CK_BYTE *)value_len_attr +
1583 sizeof (CK_ATTRIBUTE);
1584 *(CK_ULONG *)value_len_attr->pValue = len;
1585
1586 type_attr->type = CKA_KEY_TYPE;
1587 type_attr->ulValueLen = sizeof (CK_KEY_TYPE);
1588 type_attr->pValue = (CK_BYTE *)type_attr +
1589 sizeof (CK_ATTRIBUTE);
1590 *(CK_KEY_TYPE *)type_attr->pValue = CKK_GENERIC_SECRET;
1591
1592 (void) template_update_attribute(tmpl, type_attr);
1593 (void) template_update_attribute(tmpl, value_attr);
1594 (void) template_update_attribute(tmpl, value_len_attr);
1595
1596 return (CKR_OK);
1597 }
1598
1599 CK_RV
generic_secret_validate_attribute(TEMPLATE * tmpl,CK_ATTRIBUTE * attr,CK_ULONG mode)1600 generic_secret_validate_attribute(TEMPLATE *tmpl,
1601 CK_ATTRIBUTE *attr, CK_ULONG mode)
1602 {
1603 switch (attr->type) {
1604 case CKA_VALUE:
1605 if (mode == MODE_CREATE)
1606 return (CKR_OK);
1607 else
1608 return (CKR_ATTRIBUTE_READ_ONLY);
1609
1610 case CKA_VALUE_LEN:
1611 if (mode == MODE_KEYGEN || mode == MODE_DERIVE)
1612 return (CKR_OK);
1613 else {
1614 if (mode == MODE_UNWRAP) {
1615 return (CKR_OK);
1616 }
1617 return (CKR_ATTRIBUTE_READ_ONLY);
1618 }
1619
1620 default:
1621 return (secret_key_validate_attribute(tmpl, attr, mode));
1622 }
1623 }
1624
1625 CK_BBOOL
generic_secret_check_exportability(CK_ATTRIBUTE_TYPE type)1626 generic_secret_check_exportability(CK_ATTRIBUTE_TYPE type) {
1627 switch (type) {
1628 case CKA_VALUE:
1629 return (FALSE);
1630 }
1631
1632 return (TRUE);
1633 }
1634
1635 CK_RV
generic_secret_wrap_get_data(TEMPLATE * tmpl,CK_BBOOL length_only,CK_BYTE ** data,CK_ULONG * data_len)1636 generic_secret_wrap_get_data(TEMPLATE * tmpl,
1637 CK_BBOOL length_only,
1638 CK_BYTE ** data,
1639 CK_ULONG * data_len)
1640 {
1641 CK_ATTRIBUTE * attr = NULL;
1642 CK_BYTE * ptr = NULL;
1643 CK_RV rc;
1644
1645 if (! tmpl || ! data_len) {
1646 return (CKR_FUNCTION_FAILED);
1647 }
1648
1649 rc = template_attribute_find(tmpl, CKA_VALUE, &attr);
1650 if (rc == FALSE) {
1651 return (CKR_KEY_NOT_WRAPPABLE);
1652 }
1653 *data_len = attr->ulValueLen;
1654
1655 if (length_only == FALSE) {
1656 ptr = (CK_BYTE *)malloc(attr->ulValueLen);
1657 if (! ptr) {
1658 return (CKR_HOST_MEMORY);
1659 }
1660 (void) memcpy(ptr, attr->pValue, attr->ulValueLen);
1661
1662 *data = ptr;
1663 }
1664
1665 return (CKR_OK);
1666 }
1667
1668 CK_RV
generic_secret_unwrap(TEMPLATE * tmpl,CK_BYTE * data,CK_ULONG data_len,CK_BBOOL fromend)1669 generic_secret_unwrap(TEMPLATE *tmpl,
1670 CK_BYTE *data,
1671 CK_ULONG data_len,
1672 CK_BBOOL fromend)
1673 {
1674 CK_ATTRIBUTE * attr = NULL;
1675 CK_ATTRIBUTE * value_attr = NULL;
1676 CK_ATTRIBUTE * value_len_attr = NULL;
1677 CK_BYTE * ptr = NULL;
1678 CK_ULONG rc, len = 0;
1679
1680
1681 if (fromend == TRUE)
1682 ptr = data + data_len;
1683 else
1684 ptr = data;
1685
1686 rc = template_attribute_find(tmpl, CKA_VALUE_LEN, &attr);
1687 if (rc) {
1688 len = *(CK_ULONG *)attr->pValue;
1689 if (len > data_len) {
1690 rc = CKR_ATTRIBUTE_VALUE_INVALID;
1691 goto error;
1692 }
1693
1694 if (len != 0)
1695 data_len = len;
1696 }
1697
1698 if (fromend == TRUE)
1699 ptr -= data_len;
1700
1701 rc = build_attribute(CKA_VALUE, ptr, data_len, &value_attr);
1702 if (rc != CKR_OK) {
1703 goto error;
1704 }
1705 if (data_len != len) {
1706 rc = build_attribute(CKA_VALUE_LEN, (CK_BYTE *)&data_len,
1707 sizeof (CK_ULONG), &value_len_attr);
1708 if (rc != CKR_OK)
1709 goto error;
1710 }
1711
1712 (void) template_update_attribute(tmpl, value_attr);
1713
1714 if (data_len != len)
1715 (void) template_update_attribute(tmpl, value_len_attr);
1716
1717 return (CKR_OK);
1718
1719 error:
1720 if (value_attr) free(value_attr);
1721 if (value_len_attr) free(value_len_attr);
1722
1723 return (rc);
1724 }
1725