xref: /illumos-gate/usr/src/lib/pkcs11/pkcs11_kernel/common/kernelDigest.c (revision fb23c574f17ddde310cea59fe008d16f650ced5a)
1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License (the "License").
6  * You may not use this file except in compliance with the License.
7  *
8  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9  * or http://www.opensolaris.org/os/licensing.
10  * See the License for the specific language governing permissions
11  * and limitations under the License.
12  *
13  * When distributing Covered Code, include this CDDL HEADER in each
14  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15  * If applicable, add the following below this CDDL HEADER, with the
16  * fields enclosed by brackets "[]" replaced with your own identifying
17  * information: Portions Copyright [yyyy] [name of copyright owner]
18  *
19  * CDDL HEADER END
20  */
21 
22 /*
23  * Copyright 2009 Sun Microsystems, Inc.  All rights reserved.
24  * Use is subject to license terms.
25  * Copyright 2018, Joyent, Inc.
26  */
27 
28 #include <pthread.h>
29 #include <errno.h>
30 #include <sys/crypto/ioctl.h>
31 #include <security/cryptoki.h>
32 #include "kernelGlobal.h"
33 #include "kernelSession.h"
34 #include "kernelEmulate.h"
35 
36 static CK_RV
37 common_digest_init(CK_SESSION_HANDLE hSession,
38     CK_MECHANISM_PTR pMechanism, boolean_t is_external_caller)
39 {
40 	CK_RV rv;
41 	kernel_session_t *session_p;
42 	boolean_t ses_lock_held = B_FALSE;
43 	crypto_digest_init_t digest_init;
44 	crypto_mech_type_t k_mech_type;
45 	int r;
46 
47 	if (!kernel_initialized)
48 		return (CKR_CRYPTOKI_NOT_INITIALIZED);
49 
50 	if (pMechanism == NULL)
51 		return (CKR_ARGUMENTS_BAD);
52 
53 	/*
54 	 * Get the kernel's internal mechanism number.
55 	 */
56 	rv = kernel_mech(pMechanism->mechanism, &k_mech_type);
57 	if (rv != CKR_OK)
58 		return (rv);
59 
60 	/*
61 	 * Obtain the session pointer. Also, increment the session
62 	 * reference count.
63 	 */
64 	rv = handle2session(hSession, &session_p);
65 	if (rv != CKR_OK)
66 		return (rv);
67 
68 	/* Acquire the session lock */
69 	(void) pthread_mutex_lock(&session_p->session_mutex);
70 	ses_lock_held = B_TRUE;
71 
72 	/*
73 	 * This active flag will remain ON until application calls either
74 	 * C_Digest or C_DigestFinal to actually obtain the value of
75 	 * the message digest.
76 	 */
77 	session_p->digest.flags |= CRYPTO_OPERATION_ACTIVE;
78 
79 	if (SLOT_HAS_LIMITED_HASH(session_p) && is_external_caller) {
80 		session_p->digest.mech.mechanism = pMechanism->mechanism;
81 		session_p->digest.mech.pParameter = NULL;
82 		session_p->digest.mech.ulParameterLen = 0;
83 		session_p->digest.flags |= CRYPTO_EMULATE;
84 		rv = emulate_buf_init(session_p, EDIGEST_LENGTH, OP_DIGEST);
85 		REFRELE(session_p, ses_lock_held);
86 		return (rv);
87 	}
88 
89 	digest_init.di_session = session_p->k_session;
90 	(void) pthread_mutex_unlock(&session_p->session_mutex);
91 	ses_lock_held = B_FALSE;
92 	digest_init.di_mech.cm_type = k_mech_type;
93 	digest_init.di_mech.cm_param = pMechanism->pParameter;
94 
95 	/*
96 	 * If pParameter is NULL, set cm_param_len to be 0, so that ioctl call
97 	 * will have a clean input data.
98 	 */
99 	if (pMechanism->pParameter != NULL)
100 		digest_init.di_mech.cm_param_len = pMechanism->ulParameterLen;
101 	else
102 		digest_init.di_mech.cm_param_len = 0;
103 
104 	while ((r = ioctl(kernel_fd, CRYPTO_DIGEST_INIT, &digest_init)) < 0) {
105 		if (errno != EINTR)
106 			break;
107 	}
108 	if (r < 0) {
109 		rv = CKR_FUNCTION_FAILED;
110 	} else {
111 		rv = crypto2pkcs11_error_number(digest_init.di_return_value);
112 	}
113 
114 	if (rv != CKR_OK) {
115 		(void) pthread_mutex_lock(&session_p->session_mutex);
116 		ses_lock_held = B_TRUE;
117 		session_p->digest.flags &= ~CRYPTO_OPERATION_ACTIVE;
118 		/*
119 		 * Decrement the session reference count.
120 		 * We hold the session lock, and REFRELE()
121 		 * will release the session lock for us.
122 		 */
123 		REFRELE(session_p, ses_lock_held);
124 		return (rv);
125 	}
126 
127 	/*
128 	 * Decrement the session reference count.
129 	 * We do not hold the session lock.
130 	 */
131 	REFRELE(session_p, ses_lock_held);
132 	return (rv);
133 }
134 
135 CK_RV
136 C_DigestInit(CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism)
137 {
138 	return (common_digest_init(hSession, pMechanism, B_TRUE));
139 }
140 
141 CK_RV
142 C_Digest(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen,
143     CK_BYTE_PTR pDigest, CK_ULONG_PTR pulDigestLen)
144 {
145 	CK_RV rv;
146 	kernel_session_t *session_p;
147 	boolean_t ses_lock_held = B_FALSE;
148 	crypto_digest_t digest;
149 	int r;
150 
151 	if (!kernel_initialized)
152 		return (CKR_CRYPTOKI_NOT_INITIALIZED);
153 
154 	/*
155 	 * Obtain the session pointer. Also, increment the session
156 	 * reference count.
157 	 */
158 	rv = handle2session(hSession, &session_p);
159 	if (rv != CKR_OK)
160 		return (rv);
161 
162 	if ((pData == NULL && ulDataLen != 0) || pulDigestLen == NULL) {
163 		rv = CKR_ARGUMENTS_BAD;
164 		goto clean_exit;
165 	}
166 
167 	/* Acquire the session lock */
168 	(void) pthread_mutex_lock(&session_p->session_mutex);
169 	ses_lock_held = B_TRUE;
170 
171 	/* Application must call C_DigestInit before calling C_Digest */
172 	if (!(session_p->digest.flags & CRYPTO_OPERATION_ACTIVE)) {
173 		/*
174 		 * Decrement the session reference count.
175 		 * We hold the session lock, and REFRELE()
176 		 * will release the session lock for us.
177 		 */
178 		REFRELE(session_p, ses_lock_held);
179 		return (CKR_OPERATION_NOT_INITIALIZED);
180 	}
181 
182 	/*
183 	 * C_Digest must be called without intervening C_DigestUpdate
184 	 * calls.
185 	 */
186 	if (session_p->digest.flags & CRYPTO_OPERATION_UPDATE) {
187 		/*
188 		 * C_Digest can not be used to terminate a multi-part
189 		 * operation, so we'll leave the active digest operation
190 		 * flag on and let the application continue with the
191 		 * digest update operation.
192 		 *
193 		 * Decrement the session reference count.
194 		 * We hold the session lock, and REFRELE()
195 		 * will release the session lock for us.
196 		 */
197 		REFRELE(session_p, ses_lock_held);
198 		return (CKR_FUNCTION_FAILED);
199 	}
200 
201 	if (session_p->digest.flags & CRYPTO_EMULATE) {
202 		crypto_active_op_t *opp;
203 		CK_MECHANISM_PTR pMechanism;
204 
205 		opp = &(session_p->digest);
206 		if (opp->context == NULL) {
207 			REFRELE(session_p, ses_lock_held);
208 			return (CKR_ARGUMENTS_BAD);
209 		}
210 		pMechanism = &(opp->mech);
211 
212 		if ((ulDataLen < SLOT_THRESHOLD(session_p)) ||
213 		    (ulDataLen > SLOT_HASH_MAX_INDATA_LEN(session_p))) {
214 			session_p->digest.flags |= CRYPTO_EMULATE_USING_SW;
215 			(void) pthread_mutex_unlock(&session_p->session_mutex);
216 			ses_lock_held = B_FALSE;
217 
218 			rv = do_soft_digest(get_spp(opp), pMechanism,
219 			    pData, ulDataLen, pDigest, pulDigestLen,
220 			    OP_INIT | OP_SINGLE);
221 			goto done;
222 		} else if (!(session_p->digest.flags &
223 		    CRYPTO_EMULATE_INIT_DONE)) {
224 			session_p->digest.flags |= CRYPTO_EMULATE_INIT_DONE;
225 			(void) pthread_mutex_unlock(&session_p->session_mutex);
226 			ses_lock_held = B_FALSE;
227 
228 			rv = common_digest_init(hSession, pMechanism, B_FALSE);
229 			if (rv != CKR_OK)
230 				goto clean_exit;
231 			(void) pthread_mutex_lock(&session_p->session_mutex);
232 			ses_lock_held = B_TRUE;
233 		}
234 	}
235 
236 	digest.cd_session = session_p->k_session;
237 	(void) pthread_mutex_unlock(&session_p->session_mutex);
238 	ses_lock_held = B_FALSE;
239 	digest.cd_datalen =  ulDataLen;
240 	digest.cd_databuf = (char *)pData;
241 	digest.cd_digestbuf = (char *)pDigest;
242 	digest.cd_digestlen = *pulDigestLen;
243 
244 	while ((r = ioctl(kernel_fd, CRYPTO_DIGEST, &digest)) < 0) {
245 		if (errno != EINTR)
246 			break;
247 	}
248 	if (r < 0) {
249 		rv = CKR_FUNCTION_FAILED;
250 	} else {
251 		rv = crypto2pkcs11_error_number(digest.cd_return_value);
252 	}
253 
254 	if ((rv == CKR_OK) || (rv == CKR_BUFFER_TOO_SMALL))
255 		*pulDigestLen = digest.cd_digestlen;
256 
257 done:
258 	if ((rv == CKR_BUFFER_TOO_SMALL) ||
259 	    (rv == CKR_OK && pDigest == NULL)) {
260 		/*
261 		 * We will not terminate the active digest operation flag,
262 		 * when the application-supplied buffer is too small, or
263 		 * the application asks for the length of buffer to hold
264 		 * the message digest.
265 		 *
266 		 * Decrement the session reference count.
267 		 * We do not hold the session lock.
268 		 */
269 		REFRELE(session_p, ses_lock_held);
270 		return (rv);
271 	}
272 
273 clean_exit:
274 	/*
275 	 * Terminates the active digest operation.
276 	 * Application needs to call C_DigestInit again for next
277 	 * digest operation.
278 	 */
279 	(void) pthread_mutex_lock(&session_p->session_mutex);
280 	ses_lock_held = B_TRUE;
281 
282 	REINIT_OPBUF(&session_p->digest);
283 	session_p->digest.flags = 0;
284 
285 	/*
286 	 * Decrement the session reference count.
287 	 * We hold the session lock, and REFRELE()
288 	 * will release the session lock for us.
289 	 */
290 	REFRELE(session_p, ses_lock_held);
291 
292 	return (rv);
293 }
294 
295 CK_RV
296 C_DigestUpdate(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pPart,
297     CK_ULONG ulPartLen)
298 {
299 
300 	CK_RV rv;
301 	kernel_session_t *session_p;
302 	boolean_t ses_lock_held = B_FALSE;
303 	crypto_digest_update_t digest_update;
304 	int r;
305 
306 	if (!kernel_initialized)
307 		return (CKR_CRYPTOKI_NOT_INITIALIZED);
308 
309 	/*
310 	 * Obtain the session pointer. Also, increment the session
311 	 * reference count.
312 	 */
313 	rv = handle2session(hSession, &session_p);
314 	if (rv != CKR_OK)
315 		return (rv);
316 
317 	if (pPart == NULL) {
318 		rv = CKR_ARGUMENTS_BAD;
319 		goto clean_exit;
320 	}
321 
322 	/* Acquire the session lock */
323 	(void) pthread_mutex_lock(&session_p->session_mutex);
324 	ses_lock_held = B_TRUE;
325 
326 	/*
327 	 * Application must call C_DigestInit before calling
328 	 * C_DigestUpdate.
329 	 */
330 	if (!(session_p->digest.flags & CRYPTO_OPERATION_ACTIVE)) {
331 		/*
332 		 * Decrement the session reference count.
333 		 * We hold the session lock, and REFRELE()
334 		 * will release the session lock for us.
335 		 */
336 		REFRELE(session_p, ses_lock_held);
337 		return (CKR_OPERATION_NOT_INITIALIZED);
338 	}
339 
340 	/* Set update flag to protect C_Digest */
341 	session_p->digest.flags |= CRYPTO_OPERATION_UPDATE;
342 
343 	if (session_p->digest.flags & CRYPTO_EMULATE) {
344 		(void) pthread_mutex_unlock(&session_p->session_mutex);
345 		ses_lock_held = B_FALSE;
346 		rv = emulate_update(session_p, pPart, ulPartLen, OP_DIGEST);
347 		goto done;
348 	}
349 
350 	digest_update.du_session = session_p->k_session;
351 	(void) pthread_mutex_unlock(&session_p->session_mutex);
352 	ses_lock_held = B_FALSE;
353 	digest_update.du_datalen =  ulPartLen;
354 	digest_update.du_databuf = (char *)pPart;
355 
356 	while ((r = ioctl(kernel_fd, CRYPTO_DIGEST_UPDATE,
357 	    &digest_update)) < 0) {
358 		if (errno != EINTR)
359 			break;
360 	}
361 	if (r < 0) {
362 		rv = CKR_FUNCTION_FAILED;
363 	} else {
364 		rv = crypto2pkcs11_error_number(digest_update.du_return_value);
365 	}
366 
367 done:
368 	if (rv == CKR_OK) {
369 		/*
370 		 * Decrement the session reference count.
371 		 * We do not hold the session lock.
372 		 */
373 		REFRELE(session_p, ses_lock_held);
374 		return (CKR_OK);
375 	}
376 
377 clean_exit:
378 	/*
379 	 * After an error occurred, terminate the current digest
380 	 * operation by resetting the active and update flags.
381 	 */
382 	(void) pthread_mutex_lock(&session_p->session_mutex);
383 	ses_lock_held = B_TRUE;
384 	REINIT_OPBUF(&session_p->digest);
385 	session_p->digest.flags = 0;
386 
387 	/*
388 	 * Decrement the session reference count.
389 	 * We hold the session lock, and REFRELE()
390 	 * will release the session lock for us.
391 	 */
392 	REFRELE(session_p, ses_lock_held);
393 
394 	return (rv);
395 }
396 
397 
398 CK_RV
399 C_DigestKey(CK_SESSION_HANDLE hSession, CK_OBJECT_HANDLE hKey)
400 {
401 
402 	CK_RV		rv;
403 	kernel_session_t	*session_p;
404 	kernel_object_t	*key_p;
405 	boolean_t ses_lock_held = B_FALSE;
406 	CK_BYTE_PTR	pPart;
407 	CK_ULONG	ulPartLen;
408 	crypto_digest_key_t digest_key;
409 	crypto_digest_update_t digest_update;
410 	int r;
411 
412 	if (!kernel_initialized)
413 		return (CKR_CRYPTOKI_NOT_INITIALIZED);
414 
415 	/*
416 	 * Obtain the session pointer. Also, increment the session
417 	 * reference count.
418 	 */
419 	rv = handle2session(hSession, &session_p);
420 	if (rv != CKR_OK)
421 		return (rv);
422 
423 	/* Obtain the object pointer. */
424 	HANDLE2OBJECT(hKey, key_p, rv);
425 	if (rv != CKR_OK) {
426 		(void) pthread_mutex_lock(&session_p->session_mutex);
427 		ses_lock_held = B_TRUE;
428 		REINIT_OPBUF(&session_p->digest);
429 		session_p->digest.flags = 0;
430 		REFRELE(session_p, ses_lock_held);
431 		return (rv);
432 	}
433 
434 	/* Check the key type */
435 	if (key_p->is_lib_obj && (key_p->class != CKO_SECRET_KEY)) {
436 		rv = CKR_KEY_INDIGESTIBLE;
437 		goto clean_exit;
438 	}
439 
440 	/*
441 	 * Application must call C_DigestInit before calling
442 	 * C_DigestKey.
443 	 */
444 	(void) pthread_mutex_lock(&session_p->session_mutex);
445 	ses_lock_held = B_TRUE;
446 
447 	if (!(session_p->digest.flags & CRYPTO_OPERATION_ACTIVE)) {
448 		/*
449 		 * Decrement the session reference count.
450 		 * We hold the session lock, and REFRELE()
451 		 * will release the session lock for us.
452 		 */
453 		OBJ_REFRELE(key_p);
454 		REFRELE(session_p, ses_lock_held);
455 		return (CKR_OPERATION_NOT_INITIALIZED);
456 	}
457 	session_p->digest.flags |= CRYPTO_OPERATION_UPDATE;
458 
459 	/*
460 	 * If the key object is from the HW provider, call CRYPTO_DIGEST_KEY
461 	 * ioctl. Otherwise, call CRYPTO_DIGEST_UPDATE ioctl and pass the key
462 	 * by value.
463 	 */
464 	if (key_p->is_lib_obj) {
465 		digest_update.du_session = session_p->k_session;
466 	} else {
467 		digest_key.dk_session = session_p->k_session;
468 	}
469 	(void) pthread_mutex_unlock(&session_p->session_mutex);
470 	ses_lock_held = B_FALSE;
471 
472 	if (!key_p->is_lib_obj) {
473 		if (session_p->digest.flags & CRYPTO_EMULATE) {
474 			rv = CKR_FUNCTION_NOT_SUPPORTED;
475 			goto clean_exit;
476 		}
477 		digest_key.dk_key.ck_format = CRYPTO_KEY_REFERENCE;
478 		digest_key.dk_key.ck_obj_id = key_p->k_handle;
479 		while ((r = ioctl(kernel_fd, CRYPTO_DIGEST_KEY,
480 		    &digest_key)) < 0) {
481 			if (errno != EINTR)
482 				break;
483 		}
484 		if (r < 0) {
485 			rv = CKR_FUNCTION_FAILED;
486 		} else {
487 			rv = crypto2pkcs11_error_number(
488 			    digest_key.dk_return_value);
489 		}
490 	} else {
491 		ulPartLen = OBJ_SEC_VALUE_LEN(key_p);
492 		if (ulPartLen == 0) {
493 			rv = CKR_KEY_SIZE_RANGE;
494 			goto clean_exit;
495 		}
496 
497 		pPart = (CK_BYTE_PTR) OBJ_SEC_VALUE(key_p);
498 		if (pPart == NULL) {
499 			rv = CKR_KEY_HANDLE_INVALID;
500 			goto clean_exit;
501 		}
502 
503 		(void) pthread_mutex_lock(&session_p->session_mutex);
504 		ses_lock_held = B_TRUE;
505 		if (session_p->digest.flags & CRYPTO_EMULATE) {
506 			(void) pthread_mutex_unlock(&session_p->session_mutex);
507 			ses_lock_held = B_FALSE;
508 			rv = emulate_update(session_p, pPart,
509 			    ulPartLen, OP_DIGEST);
510 			goto done;
511 		}
512 		(void) pthread_mutex_unlock(&session_p->session_mutex);
513 		ses_lock_held = B_FALSE;
514 
515 		digest_update.du_datalen = ulPartLen;
516 		digest_update.du_databuf = (char *)pPart;
517 
518 		while ((r = ioctl(kernel_fd, CRYPTO_DIGEST_UPDATE,
519 		    &digest_update)) < 0) {
520 			if (errno != EINTR)
521 				break;
522 		}
523 		if (r < 0) {
524 			rv = CKR_FUNCTION_FAILED;
525 		} else {
526 			rv = crypto2pkcs11_error_number(
527 			    digest_update.du_return_value);
528 		}
529 	}
530 
531 done:
532 	if (rv == CKR_OK) {
533 		/*
534 		 * Decrement the session reference count.
535 		 * We do not hold the session lock.
536 		 */
537 		OBJ_REFRELE(key_p);
538 		REFRELE(session_p, ses_lock_held);
539 		return (CKR_OK);
540 	}
541 
542 clean_exit:
543 	OBJ_REFRELE(key_p);
544 	/*
545 	 * After an error occurred, terminate the current digest
546 	 * operation by resetting the active and update flags.
547 	 */
548 	(void) pthread_mutex_lock(&session_p->session_mutex);
549 	ses_lock_held = B_TRUE;
550 	REINIT_OPBUF(&session_p->digest);
551 	session_p->digest.flags = 0;
552 
553 	/*
554 	 * Decrement the session reference count.
555 	 * We hold the session lock, and REFRELE()
556 	 * will release the session lock for us.
557 	 */
558 	REFRELE(session_p, ses_lock_held);
559 	return (rv);
560 }
561 
562 
563 CK_RV
564 C_DigestFinal(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pDigest,
565     CK_ULONG_PTR pulDigestLen)
566 {
567 
568 	CK_RV rv;
569 	kernel_session_t *session_p;
570 	boolean_t ses_lock_held = B_FALSE;
571 	crypto_digest_final_t digest_final;
572 	int r;
573 
574 	if (!kernel_initialized)
575 		return (CKR_CRYPTOKI_NOT_INITIALIZED);
576 
577 	/*
578 	 * Obtain the session pointer. Also, increment the session
579 	 * reference count.
580 	 */
581 	rv = handle2session(hSession, &session_p);
582 	if (rv != CKR_OK)
583 		return (rv);
584 
585 	if (pulDigestLen == NULL) {
586 		rv = CKR_ARGUMENTS_BAD;
587 		goto clean_exit;
588 	}
589 
590 	/* Acquire the session lock */
591 	(void) pthread_mutex_lock(&session_p->session_mutex);
592 	ses_lock_held = B_TRUE;
593 
594 	/*
595 	 * Application must call C_DigestInit before calling
596 	 * C_DigestFinal.
597 	 */
598 	if (!(session_p->digest.flags & CRYPTO_OPERATION_ACTIVE)) {
599 		/*
600 		 * Decrement the session reference count.
601 		 * We hold the session lock, and REFRELE()
602 		 * will release the session lock for us.
603 		 */
604 		REFRELE(session_p, ses_lock_held);
605 		return (CKR_OPERATION_NOT_INITIALIZED);
606 	}
607 
608 	/* The order of checks is important here */
609 	if (session_p->digest.flags & CRYPTO_EMULATE_USING_SW) {
610 		if (session_p->digest.flags & CRYPTO_EMULATE_UPDATE_DONE) {
611 			(void) pthread_mutex_unlock(&session_p->session_mutex);
612 			ses_lock_held = B_FALSE;
613 			rv = do_soft_digest(get_spp(&session_p->digest),
614 			    NULL, NULL, NULL, pDigest, pulDigestLen, OP_FINAL);
615 		} else {
616 			/*
617 			 * We end up here if an earlier C_DigestFinal() call
618 			 * took the C_Digest() path and it had returned
619 			 * CKR_BUFFER_TOO_SMALL.
620 			 */
621 			digest_buf_t *bufp = session_p->digest.context;
622 			(void) pthread_mutex_unlock(&session_p->session_mutex);
623 			ses_lock_held = B_FALSE;
624 			if (bufp == NULL || bufp->buf == NULL) {
625 				rv = CKR_ARGUMENTS_BAD;
626 				goto clean_exit;
627 			}
628 			rv = do_soft_digest(get_spp(&session_p->digest),
629 			    NULL, bufp->buf, bufp->indata_len,
630 			    pDigest, pulDigestLen, OP_SINGLE);
631 		}
632 		goto done;
633 	} else if (session_p->digest.flags & CRYPTO_EMULATE) {
634 		digest_buf_t *bufp = session_p->digest.context;
635 
636 		/*
637 		 * We are emulating a single-part operation now.
638 		 * So, clear the flag.
639 		 */
640 		session_p->digest.flags &= ~CRYPTO_OPERATION_UPDATE;
641 		if (bufp == NULL || bufp->buf == NULL) {
642 			rv = CKR_ARGUMENTS_BAD;
643 			goto clean_exit;
644 		}
645 		REFRELE(session_p, ses_lock_held);
646 		rv = C_Digest(hSession, bufp->buf, bufp->indata_len,
647 		    pDigest, pulDigestLen);
648 		return (rv);
649 	}
650 
651 	digest_final.df_session = session_p->k_session;
652 	(void) pthread_mutex_unlock(&session_p->session_mutex);
653 	ses_lock_held = B_FALSE;
654 	digest_final.df_digestlen = *pulDigestLen;
655 	digest_final.df_digestbuf = (char *)pDigest;
656 
657 	while ((r = ioctl(kernel_fd, CRYPTO_DIGEST_FINAL, &digest_final)) < 0) {
658 		if (errno != EINTR)
659 			break;
660 	}
661 	if (r < 0) {
662 		rv = CKR_FUNCTION_FAILED;
663 	} else {
664 		rv = crypto2pkcs11_error_number(digest_final.df_return_value);
665 	}
666 
667 	if ((rv == CKR_OK) || (rv == CKR_BUFFER_TOO_SMALL))
668 		*pulDigestLen = digest_final.df_digestlen;
669 
670 done:
671 	if ((rv == CKR_BUFFER_TOO_SMALL) ||
672 	    (rv == CKR_OK && pDigest == NULL)) {
673 		/*
674 		 * We will not terminate the active digest operation flag,
675 		 * when the application-supplied buffer is too small, or
676 		 * the application asks for the length of buffer to hold
677 		 * the message digest.
678 		 *
679 		 * Decrement the session reference count.
680 		 * We do not hold the session lock.
681 		 */
682 		REFRELE(session_p, ses_lock_held);
683 		return (rv);
684 	}
685 
686 clean_exit:
687 	/* Terminates the active digest operation */
688 	(void) pthread_mutex_lock(&session_p->session_mutex);
689 	ses_lock_held = B_TRUE;
690 	REINIT_OPBUF(&session_p->digest);
691 	session_p->digest.flags = 0;
692 
693 	/*
694 	 * Decrement the session reference count.
695 	 * We hold the session lock, and REFRELE()
696 	 * will release the session lock for us.
697 	 */
698 	REFRELE(session_p, ses_lock_held);
699 
700 	return (rv);
701 }
702