xref: /illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/softKeystore.c (revision 1a220b56b93ff1dc80855691548503117af4cc10)
1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License (the "License").
6  * You may not use this file except in compliance with the License.
7  *
8  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9  * or http://www.opensolaris.org/os/licensing.
10  * See the License for the specific language governing permissions
11  * and limitations under the License.
12  *
13  * When distributing Covered Code, include this CDDL HEADER in each
14  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15  * If applicable, add the following below this CDDL HEADER, with the
16  * fields enclosed by brackets "[]" replaced with your own identifying
17  * information: Portions Copyright [yyyy] [name of copyright owner]
18  *
19  * CDDL HEADER END
20  */
21 /*
22  * Copyright 2006 Sun Microsystems, Inc.  All rights reserved.
23  * Use is subject to license terms.
24  */
25 
26 #pragma ident	"%Z%%M%	%I%	%E% SMI"
27 
28 #include <crypt.h>
29 #include <cryptoutil.h>
30 #include <pwd.h>
31 #include <pthread.h>
32 #include <stdlib.h>
33 #include <string.h>
34 #include <strings.h>
35 #include <sys/types.h>
36 #include <sys/sysmacros.h>
37 #include <security/cryptoki.h>
38 #include "softGlobal.h"
39 #include "softCrypt.h"
40 #include "softSession.h"
41 #include "softObject.h"
42 #include "softKeys.h"
43 #include "softKeystore.h"
44 #include "softKeystoreUtil.h"
45 #include "softRandom.h"
46 #include "softMAC.h"
47 #include "softOps.h"
48 
49 soft_session_t token_session;
50 
51 /*
52  * Generate a 16-byte Initialization Vector (IV).
53  */
54 CK_RV
55 soft_gen_iv(CK_BYTE *iv)
56 {
57 
58 	return (soft_nzero_random_generator(iv, 16));
59 
60 }
61 
62 
63 /*
64  * soft_gen_hashed_pin()
65  *
66  * Arguments:
67  *
68  *	pPin:	pointer to caller provided Pin
69  *	result:	output argument which contains the address of the
70  *		pointer to the hashed pin
71  *	salt:	input argument (if non-NULL), or
72  *		output argument (if NULL):
73  *		address of pointer to the "salt" of the hashed pin
74  *
75  * Description:
76  *
77  *	Generate a hashed pin using system provided crypt(3C) function.
78  *
79  * Returns:
80  *
81  *	0: no error
82  *	-1: some error occurred while generating the hashed pin
83  *
84  */
85 int
86 soft_gen_hashed_pin(CK_UTF8CHAR_PTR pPin, char **result, char **salt)
87 {
88 
89 	uid_t uid;
90 	struct passwd pwd, *pw;
91 	char pwdbuf[PWD_BUFFER_SIZE];
92 	boolean_t new_salt = B_FALSE;
93 
94 	/*
95 	 * We need to get the passwd entry of the application, which is required
96 	 * by the crypt_gensalt() below.
97 	 */
98 	uid = geteuid();
99 	if (getpwuid_r(uid, &pwd, pwdbuf, PWD_BUFFER_SIZE, &pw) != 0) {
100 		return (-1);
101 	}
102 
103 	if (*salt == NULL) {
104 		new_salt = B_TRUE;
105 		/*
106 		 * crypt_gensalt() will allocate memory to store the new salt.
107 		 * on return.
108 		 */
109 		if ((*salt = crypt_gensalt(NULL, pw)) == NULL) {
110 			return (-1);
111 		}
112 	}
113 
114 	if ((*result = crypt((char *)pPin, *salt)) == NULL) {
115 		if (new_salt)
116 			free(*salt);
117 		return (-1);
118 	}
119 
120 	return (0);
121 }
122 
123 /*
124  * Authenticate user's PIN for C_Login.
125  */
126 CK_RV
127 soft_verify_pin(CK_UTF8CHAR_PTR pPin, CK_ULONG ulPinLen)
128 {
129 
130 	char	*user_cryptpin = NULL;
131 	char	*ks_cryptpin = NULL;
132 	char	*salt = NULL;
133 	uchar_t	*tmp_pin = NULL;
134 	boolean_t pin_initialized = B_FALSE;
135 	CK_RV	rv = CKR_OK;
136 
137 	/*
138 	 * Check to see if keystore is initialized.
139 	 */
140 	rv = soft_keystore_pin_initialized(&pin_initialized, &ks_cryptpin,
141 	    B_FALSE);
142 	if (rv != CKR_OK)
143 		return (rv);
144 
145 	/*
146 	 * Authenticate user's PIN for C_Login.
147 	 */
148 	if (pin_initialized) {
149 
150 		if (soft_keystore_get_pin_salt(&salt) < 0) {
151 			rv = CKR_FUNCTION_FAILED;
152 			goto cleanup;
153 		}
154 
155 		/*
156 		 * Generate the hashed value based on the user's supplied pin.
157 		 */
158 		tmp_pin = malloc(ulPinLen + 1);
159 		if (tmp_pin == NULL) {
160 			rv = CKR_HOST_MEMORY;
161 			goto cleanup;
162 		}
163 
164 		(void) memcpy(tmp_pin, pPin, ulPinLen);
165 		tmp_pin[ulPinLen] = '\0';
166 
167 		if (soft_gen_hashed_pin(tmp_pin, &user_cryptpin, &salt) < 0) {
168 			rv = CKR_FUNCTION_FAILED;
169 			goto cleanup;
170 		}
171 
172 		/*
173 		 * Compare hash value of the user supplied PIN with
174 		 * hash value of the keystore PIN.
175 		 */
176 		if (strcmp(user_cryptpin, ks_cryptpin) != 0) {
177 			rv = CKR_PIN_INCORRECT;
178 			goto cleanup;
179 		}
180 
181 		/*
182 		 * Provide the user's PIN to low-level keystore so that
183 		 * it can use it to generate encryption key as needed for
184 		 * encryption/decryption of the private objects in
185 		 * keystore.
186 		 */
187 		if (soft_keystore_authpin(tmp_pin) != 0) {
188 			rv = CKR_FUNCTION_FAILED;
189 		} else {
190 			rv = CKR_OK;
191 		}
192 		goto cleanup;
193 	} else {
194 		/*
195 		 * The PIN is not initialized in the keystore
196 		 * We will let it pass the authentication anyway but set the
197 		 * "userpin_change_needed" flag so that the application
198 		 * will get CKR_PIN_EXPIRED by other C_functions such as
199 		 * C_CreateObject, C_FindObjectInit, C_GenerateKey etc.
200 		 */
201 		soft_slot.userpin_change_needed = 1;
202 		rv = CKR_OK;
203 	}
204 
205 cleanup:
206 	if (salt)
207 		free(salt);
208 	if (tmp_pin)
209 		free(tmp_pin);
210 	if (ks_cryptpin)
211 		free(ks_cryptpin);
212 
213 	return (rv);
214 }
215 
216 /*
217  * The second level C_SetPIN function.
218  */
219 CK_RV
220 soft_setpin(CK_UTF8CHAR_PTR pOldPin, CK_ULONG ulOldPinLen,
221     CK_UTF8CHAR_PTR pNewPin, CK_ULONG ulNewPinLen)
222 {
223 
224 	char	*user_cryptpin = NULL;
225 	char	*ks_cryptpin = NULL;
226 	char	*salt = NULL;
227 	boolean_t pin_initialized = B_FALSE;
228 	uchar_t	*tmp_old_pin = NULL, *tmp_new_pin = NULL;
229 	CK_RV	rv = CKR_OK;
230 
231 	/*
232 	 * Check to see if keystore is initialized.
233 	 */
234 	rv = soft_keystore_pin_initialized(&pin_initialized, &ks_cryptpin,
235 	    B_FALSE);
236 	if (rv != CKR_OK)
237 		return (rv);
238 
239 	/*
240 	 * Authenticate user's PIN for C_SetPIN.
241 	 */
242 	if (pin_initialized) {
243 		/*
244 		 * Generate the hashed value based on the user supplied PIN.
245 		 */
246 		if (soft_keystore_get_pin_salt(&salt) < 0) {
247 			rv = CKR_FUNCTION_FAILED;
248 			goto cleanup;
249 		}
250 
251 		tmp_old_pin = malloc(ulOldPinLen + 1);
252 		if (tmp_old_pin == NULL) {
253 			rv = CKR_HOST_MEMORY;
254 			goto cleanup;
255 		}
256 		(void) memcpy(tmp_old_pin, pOldPin, ulOldPinLen);
257 		tmp_old_pin[ulOldPinLen] = '\0';
258 
259 		if (soft_gen_hashed_pin(tmp_old_pin, &user_cryptpin,
260 		    &salt) < 0) {
261 			rv = CKR_FUNCTION_FAILED;
262 			goto cleanup;
263 		}
264 
265 		/*
266 		 * Compare hashed value of the user supplied PIN with the
267 		 * hashed value of the keystore PIN.
268 		 */
269 		if (strcmp(user_cryptpin, ks_cryptpin) != 0) {
270 			rv = CKR_PIN_INCORRECT;
271 			goto cleanup;
272 		}
273 	} else {
274 		/*
275 		 * This is the first time to setpin, the oldpin must be
276 		 * "changeme".
277 		 */
278 		if (strncmp("changeme", (const char *)pOldPin,
279 		    ulOldPinLen) != 0) {
280 			rv = CKR_PIN_INCORRECT;
281 			goto cleanup;
282 		}
283 	}
284 
285 	tmp_new_pin = malloc(ulNewPinLen + 1);
286 	if (tmp_new_pin == NULL) {
287 		rv = CKR_HOST_MEMORY;
288 		goto cleanup;
289 	}
290 	(void) memcpy(tmp_new_pin, pNewPin, ulNewPinLen);
291 	tmp_new_pin[ulNewPinLen] = '\0';
292 
293 	/*
294 	 * Set the new pin after the old pin is authenticated.
295 	 */
296 	if (soft_keystore_setpin(tmp_old_pin, tmp_new_pin, B_FALSE)) {
297 		rv = CKR_FUNCTION_FAILED;
298 		goto cleanup;
299 	} else {
300 		(void) pthread_mutex_lock(&soft_giant_mutex);
301 		soft_slot.userpin_change_needed = 0;
302 		(void) pthread_mutex_unlock(&soft_giant_mutex);
303 		rv = CKR_OK;
304 	}
305 
306 cleanup:
307 	if (salt)
308 		free(salt);
309 	if (ks_cryptpin)
310 		free(ks_cryptpin);
311 	if (tmp_old_pin)
312 		free(tmp_old_pin);
313 	if (tmp_new_pin)
314 		free(tmp_new_pin);
315 
316 	return (rv);
317 }
318 
319 /*
320  * soft_keystore_pack_obj()
321  *
322  * Arguments:
323  *
324  *	obj:	pointer to the soft_object_t of the token object to
325  *		be packed
326  *	ks_buf:	output argument which contains the address of the
327  *		pointer to the buf of the packed token object
328  *		soft_keystore_pack_obj() will allocate memory for the buf,
329  *		it is caller's responsibility to free it.
330  *	len:	output argument which contains the address of the
331  *		buffer length of the packed token object
332  *
333  * Description:
334  *
335  *	Pack the in-core token object into the keystore format.
336  *
337  * Returns:
338  *
339  *	CKR_OK: no error
340  *	Other: some error occurred while packing the object
341  *
342  */
343 CK_RV
344 soft_keystore_pack_obj(soft_object_t *obj, uchar_t **ks_buf, size_t *len)
345 {
346 	ks_obj_hdr_t hdr;
347 	ks_attr_hdr_t attr_hdr;
348 	CK_ATTRIBUTE_INFO_PTR extra_attr;
349 	int num_attrs = 0;
350 	ulong_t len_attrs = 0;
351 	size_t ks_len;
352 	uchar_t *buf, *buf1;
353 	CK_RV rv;
354 	int i;
355 
356 	(void) memset(&hdr, 0, sizeof (ks_obj_hdr_t));
357 
358 	/*
359 	 * The first part of the packed format contains
360 	 * the ks_obj_hdr_t struct.
361 	 */
362 	hdr.class = SWAP64((uint64_t)obj->class);
363 	hdr.key_type = SWAP64((uint64_t)obj->key_type);
364 	hdr.cert_type = SWAP64((uint64_t)obj->cert_type);
365 	hdr.bool_attr_mask = SWAP64(obj->bool_attr_mask);
366 	hdr.mechanism = SWAP64((uint64_t)obj->mechanism);
367 	hdr.object_type = obj->object_type;
368 
369 	/*
370 	 * The second part of the packed format contains
371 	 * the attributes from the extra atrribute list.
372 	 */
373 	extra_attr = obj->extra_attrlistp;
374 
375 	while (extra_attr) {
376 		num_attrs++;
377 		len_attrs += ROUNDUP(extra_attr->attr.ulValueLen, 8);
378 		extra_attr = extra_attr->next;
379 	}
380 	hdr.num_attrs = SWAP32(num_attrs);
381 	ks_len = soft_pack_object_size(obj);
382 	ks_len += sizeof (ks_obj_hdr_t) + len_attrs +
383 	    2 * num_attrs * sizeof (uint64_t);
384 	buf = calloc(1, ks_len);
385 	if (buf == NULL) {
386 		return (CKR_HOST_MEMORY);
387 	}
388 	(void) memcpy(buf, &hdr, sizeof (ks_obj_hdr_t));
389 	buf1 = buf + sizeof (ks_obj_hdr_t);
390 	extra_attr = obj->extra_attrlistp;
391 	for (i = 0; i < num_attrs; i++) {
392 		attr_hdr.type = SWAP64((uint64_t)extra_attr->attr.type);
393 		attr_hdr.ulValueLen =
394 		    SWAP64((uint64_t)extra_attr->attr.ulValueLen);
395 		(void) memcpy(buf1, &attr_hdr, sizeof (ks_attr_hdr_t));
396 		buf1 = buf1 + sizeof (ks_attr_hdr_t);
397 		(void) memcpy(buf1, extra_attr->attr.pValue,
398 		    extra_attr->attr.ulValueLen);
399 		buf1 = buf1 + ROUNDUP(extra_attr->attr.ulValueLen, 8);
400 		extra_attr = extra_attr->next;
401 	}
402 
403 	/*
404 	 * The third part of the packed format contains
405 	 * the key itself.
406 	 */
407 	rv = soft_pack_object(obj, buf1);
408 	*len = ks_len;
409 	*ks_buf = buf;
410 
411 	return (rv);
412 
413 }
414 
415 /*
416  * soft_keystore_unpack_obj()
417  *
418  * Arguments:
419  *
420  *	obj:	pointer to the soft_object_t to store the unpacked
421  *		token object
422  *	ks_obj:	input argument which contains the pointer to the
423  *		ks_obj_t struct of packed token object to be unpacked
424  *
425  * Description:
426  *
427  *	Unpack the token object in keystore format to in-core soft_object_t.
428  *
429  * Returns:
430  *
431  *	CKR_OK: no error
432  *	Other: some error occurred while unpacking the object
433  *
434  */
435 CK_RV
436 soft_keystore_unpack_obj(soft_object_t *obj, ks_obj_t *ks_obj)
437 {
438 
439 	CK_RV rv;
440 	ks_obj_hdr_t *hdr;
441 	ks_attr_hdr_t *attr_hdr;
442 	CK_ATTRIBUTE template;
443 	int i;
444 	uchar_t *buf;
445 
446 	/*
447 	 * Unpack the common area.
448 	 */
449 	(void) strcpy((char *)obj->ks_handle.name,
450 	    (char *)ks_obj->ks_handle.name);
451 	obj->ks_handle.public = ks_obj->ks_handle.public;
452 	/* LINTED: pointer alignment */
453 	hdr = (ks_obj_hdr_t *)ks_obj->buf;
454 	obj->version = ks_obj->obj_version;
455 	obj->class = (CK_OBJECT_CLASS)(SWAP64(hdr->class));
456 	obj->key_type = (CK_KEY_TYPE)(SWAP64(hdr->key_type));
457 	obj->cert_type = (CK_CERTIFICATE_TYPE)(SWAP64(hdr->cert_type));
458 	obj->bool_attr_mask = SWAP64(hdr->bool_attr_mask);
459 	obj->mechanism = (CK_MECHANISM_TYPE)(SWAP64(hdr->mechanism));
460 	obj->object_type = hdr->object_type;
461 
462 	/*
463 	 * Initialize other stuffs which were not from keystore.
464 	 */
465 	(void) pthread_mutex_init(&obj->object_mutex, NULL);
466 	obj->magic_marker = SOFTTOKEN_OBJECT_MAGIC;
467 	obj->session_handle = (CK_SESSION_HANDLE)NULL;
468 
469 	buf = ks_obj->buf + sizeof (ks_obj_hdr_t);
470 
471 	/*
472 	 * Unpack extra attribute list.
473 	 */
474 	for (i = 0; i < SWAP32(hdr->num_attrs); i++) {
475 		/* LINTED: pointer alignment */
476 		attr_hdr = (ks_attr_hdr_t *)buf;
477 		(void) memset(&template, 0, sizeof (CK_ATTRIBUTE));
478 		template.type = (CK_ATTRIBUTE_TYPE)(SWAP64(attr_hdr->type));
479 		template.ulValueLen = (CK_ULONG)(SWAP64(attr_hdr->ulValueLen));
480 		buf = buf + sizeof (ks_attr_hdr_t);
481 		/* Allocate storage for the value of the attribute. */
482 		if (template.ulValueLen > 0) {
483 			template.pValue = malloc(template.ulValueLen);
484 			if (template.pValue == NULL) {
485 				return (CKR_HOST_MEMORY);
486 			}
487 			(void) memcpy(template.pValue, buf,
488 			    template.ulValueLen);
489 		}
490 
491 		rv = soft_add_extra_attr(&template, obj);
492 		if (template.pValue) {
493 			free(template.pValue);
494 		}
495 
496 		if (rv != CKR_OK) {
497 			return (rv);
498 		}
499 
500 		buf = buf + ROUNDUP(template.ulValueLen, 8);
501 	}
502 
503 	/*
504 	 * Unpack the key itself.
505 	 */
506 	rv = soft_unpack_object(obj, buf);
507 	return (rv);
508 
509 }
510 
511 
512 /*
513  * soft_unpack_obj_attribute()
514  *
515  * Arguments:
516  *
517  *	buf:	contains the packed data (attributes) from keystore
518  *	key_dest: the key attribute will be unpacked and save in key_dest
519  *	cert_dest: the certificate attribute will be unpacked an
520  *		   in cert_dest
521  *	offset: length of the current attribute occupies.
522  *		The caller should use this returned "offset" to
523  *		advance the buffer pointer to next attribute.
524  *	cert:	TRUE for certificate (use cert_dest)
525  *		FALSE for key (use key_dest)
526  *
527  * Description:
528  *
529  *	Unpack the attribute from keystore format to the big integer format.
530  *
531  * Returns:
532  *
533  *	CKR_OK: no error
534  *	Other: some error occurred while unpacking the object attribute
535  *
536  */
537 CK_RV
538 soft_unpack_obj_attribute(uchar_t *buf, biginteger_t *key_dest,
539     cert_attr_t **cert_dest, ulong_t *offset, boolean_t cert)
540 {
541 
542 	CK_RV rv;
543 	CK_ATTRIBUTE template;
544 
545 	/* LINTED: pointer alignment */
546 	template.ulValueLen = SWAP64(*(uint64_t *)buf);
547 	buf = buf + sizeof (uint64_t);
548 	template.pValue = malloc(template.ulValueLen);
549 	if (template.pValue == NULL) {
550 		return (CKR_HOST_MEMORY);
551 	}
552 
553 	(void) memcpy(template.pValue, buf, template.ulValueLen);
554 	if (cert) {
555 		rv = get_cert_attr_from_template(cert_dest, &template);
556 	} else {
557 		rv = get_bigint_attr_from_template(key_dest, &template);
558 	}
559 
560 	free(template.pValue);
561 	if (rv != CKR_OK) {
562 		return (rv);
563 	}
564 
565 	*offset = sizeof (uint64_t) + template.ulValueLen;
566 	return (CKR_OK);
567 }
568 
569 
570 /*
571  * Calculate the total buffer length required to store the
572  * object key (the third part) in a keystore format.
573  */
574 ulong_t
575 soft_pack_object_size(soft_object_t *objp)
576 {
577 
578 	CK_OBJECT_CLASS class = objp->class;
579 	CK_KEY_TYPE	keytype = objp->key_type;
580 	CK_CERTIFICATE_TYPE certtype = objp->cert_type;
581 
582 	switch (class) {
583 	case CKO_PUBLIC_KEY:
584 		switch (keytype) {
585 		case CKK_RSA:
586 			/*
587 			 * modulus_bits + modulus_len + modulus +
588 			 * pubexpo_len + pubexpo
589 			 */
590 			return (ROUNDUP(((biginteger_t *)
591 			    OBJ_PUB_RSA_MOD(objp))->big_value_len, 8) +
592 			    ROUNDUP(((biginteger_t *)
593 			    OBJ_PUB_RSA_PUBEXPO(objp))->big_value_len, 8) +
594 			    3 * sizeof (uint64_t));
595 
596 		case CKK_DSA:
597 			/*
598 			 * prime_len + prime + subprime_len + subprime +
599 			 * base_len + base + value_len + value
600 			 */
601 			return (ROUNDUP(((biginteger_t *)
602 			    OBJ_PUB_DSA_PRIME(objp))->big_value_len, 8) +
603 			    ROUNDUP(((biginteger_t *)
604 			    OBJ_PUB_DSA_SUBPRIME(objp))->big_value_len, 8) +
605 			    ROUNDUP(((biginteger_t *)
606 			    OBJ_PUB_DSA_BASE(objp))->big_value_len, 8) +
607 			    ROUNDUP(((biginteger_t *)
608 			    OBJ_PUB_DSA_VALUE(objp))->big_value_len, 8) +
609 			    4 * sizeof (uint64_t));
610 
611 		case CKK_DH:
612 			/*
613 			 * prime_len + prime + base_len + base +
614 			 * value_len + value
615 			 */
616 			return (ROUNDUP(((biginteger_t *)
617 			    OBJ_PUB_DH_PRIME(objp))->big_value_len, 8) +
618 			    ROUNDUP(((biginteger_t *)
619 			    OBJ_PUB_DH_BASE(objp))->big_value_len, 8) +
620 			    ROUNDUP(((biginteger_t *)
621 			    OBJ_PUB_DH_VALUE(objp))->big_value_len, 8) +
622 			    3 * sizeof (uint64_t));
623 
624 		case CKK_X9_42_DH:
625 			/*
626 			 * prime_len + prime + base_len + base +
627 			 * subprime_len + subprime + value_len + value
628 			 */
629 			return (ROUNDUP(((biginteger_t *)
630 			    OBJ_PUB_DH942_PRIME(objp))->big_value_len, 8) +
631 			    ROUNDUP(((biginteger_t *)
632 			    OBJ_PUB_DH942_BASE(objp))->big_value_len, 8) +
633 			    ROUNDUP(((biginteger_t *)
634 			    OBJ_PUB_DH942_SUBPRIME(objp))->big_value_len, 8) +
635 			    ROUNDUP(((biginteger_t *)
636 			    OBJ_PUB_DH942_VALUE(objp))->big_value_len, 8) +
637 			    4 * sizeof (uint64_t));
638 		} /* keytype */
639 
640 		break;
641 
642 	case CKO_PRIVATE_KEY:
643 		switch (keytype) {
644 		case CKK_RSA:
645 			/*
646 			 * modulus_len + modulus + pubexpo_len + pubexpo +
647 			 * priexpo_len + priexpo + prime1_len + prime1 +
648 			 * prime2_len + prime2 + expo1_len + expo1 +
649 			 * expo2_len + expo2 + coef_len + coef
650 			 */
651 			return (ROUNDUP(((biginteger_t *)
652 			    OBJ_PRI_RSA_MOD(objp))->big_value_len, 8) +
653 			    ROUNDUP(((biginteger_t *)
654 			    OBJ_PRI_RSA_PUBEXPO(objp))->big_value_len, 8) +
655 			    ROUNDUP(((biginteger_t *)
656 			    OBJ_PRI_RSA_PRIEXPO(objp))->big_value_len, 8) +
657 			    ROUNDUP(((biginteger_t *)
658 			    OBJ_PRI_RSA_PRIME1(objp))->big_value_len, 8) +
659 			    ROUNDUP(((biginteger_t *)
660 			    OBJ_PRI_RSA_PRIME2(objp))->big_value_len, 8) +
661 			    ROUNDUP(((biginteger_t *)
662 			    OBJ_PRI_RSA_EXPO1(objp))->big_value_len, 8) +
663 			    ROUNDUP(((biginteger_t *)
664 			    OBJ_PRI_RSA_EXPO2(objp))->big_value_len, 8) +
665 			    ROUNDUP(((biginteger_t *)
666 			    OBJ_PRI_RSA_COEF(objp))->big_value_len, 8) +
667 			    8 * sizeof (uint64_t));
668 
669 		case CKK_DSA:
670 			/*
671 			 * prime_len + prime + subprime_len + subprime +
672 			 * base_len + base + value_len + value
673 			 */
674 			return (ROUNDUP(((biginteger_t *)
675 			    OBJ_PRI_DSA_PRIME(objp))->big_value_len, 8) +
676 			    ROUNDUP(((biginteger_t *)
677 			    OBJ_PRI_DSA_SUBPRIME(objp))->big_value_len, 8) +
678 			    ROUNDUP(((biginteger_t *)
679 			    OBJ_PRI_DSA_BASE(objp))->big_value_len, 8) +
680 			    ROUNDUP(((biginteger_t *)
681 			    OBJ_PRI_DSA_VALUE(objp))->big_value_len, 8) +
682 			    4 * sizeof (uint64_t));
683 
684 		case CKK_DH:
685 			/*
686 			 * value_bits + prime_len + prime + base_len + base +
687 			 * value_len + value
688 			 */
689 			return (ROUNDUP(((biginteger_t *)
690 			    OBJ_PRI_DH_PRIME(objp))->big_value_len, 8) +
691 			    ROUNDUP(((biginteger_t *)
692 			    OBJ_PRI_DH_BASE(objp))->big_value_len, 8) +
693 			    ROUNDUP(((biginteger_t *)
694 			    OBJ_PRI_DH_VALUE(objp))->big_value_len, 8) +
695 			    4 * sizeof (uint64_t));
696 
697 		case CKK_X9_42_DH:
698 			/*
699 			 * prime_len + prime + base_len + base +
700 			 * subprime_len + subprime + value_len + value
701 			 */
702 			return (ROUNDUP(((biginteger_t *)
703 			    OBJ_PRI_DH942_PRIME(objp))->big_value_len, 8) +
704 			    ROUNDUP(((biginteger_t *)
705 			    OBJ_PRI_DH942_BASE(objp))->big_value_len, 8) +
706 			    ROUNDUP(((biginteger_t *)
707 			    OBJ_PRI_DH942_SUBPRIME(objp))->big_value_len, 8) +
708 			    ROUNDUP(((biginteger_t *)
709 			    OBJ_PRI_DH942_VALUE(objp))->big_value_len, 8) +
710 			    4 * sizeof (uint64_t));
711 
712 		} /* keytype */
713 
714 		break;
715 
716 	case CKO_SECRET_KEY:
717 		/*
718 		 * value_len + value
719 		 */
720 		return (ROUNDUP(OBJ_SEC_VALUE_LEN(objp), 8) +
721 			sizeof (uint64_t));
722 
723 	case CKO_CERTIFICATE:
724 		switch (certtype) {
725 		case CKC_X_509:
726 			/*
727 			 * subject_len + subject + value_len + value
728 			 */
729 			return (ROUNDUP(((cert_attr_t *)
730 				X509_CERT_SUBJECT(objp))->length, 8) +
731 				ROUNDUP(((cert_attr_t *)
732 				X509_CERT_VALUE(objp))->length, 8) +
733 				2 * sizeof (uint64_t));
734 
735 		case CKC_X_509_ATTR_CERT:
736 			/*
737 			 * owner_len + owner + value_len + value
738 			 */
739 			return (ROUNDUP(((cert_attr_t *)
740 				X509_ATTR_CERT_OWNER(objp))->length, 8) +
741 				ROUNDUP(((cert_attr_t *)
742 				X509_ATTR_CERT_VALUE(objp))->length, 8) +
743 				2 * sizeof (uint64_t));
744 		}
745 		return (0);
746 
747 	case CKO_DOMAIN_PARAMETERS:
748 
749 		return (0);
750 	}
751 	return (0);
752 }
753 
754 /*
755  * Pack the object key (the third part) from the soft_object_t
756  * into the keystore format.
757  */
758 CK_RV
759 soft_pack_object(soft_object_t *objp, uchar_t *buf)
760 {
761 
762 	CK_OBJECT_CLASS class = objp->class;
763 	CK_KEY_TYPE	keytype = objp->key_type;
764 	CK_CERTIFICATE_TYPE certtype = objp->cert_type;
765 	uint64_t tmp_val;
766 
767 	switch (class) {
768 	case CKO_PUBLIC_KEY:
769 		switch (keytype) {
770 		case CKK_RSA:
771 			/* modulus_bits */
772 			tmp_val = SWAP64((uint64_t)OBJ_PUB_RSA_MOD_BITS(objp));
773 			(void) memcpy(buf, (char *)&tmp_val, sizeof (uint64_t));
774 			buf = buf + sizeof (uint64_t);
775 
776 			/* modulus_len + modulus */
777 			tmp_val = SWAP64((uint64_t)(((biginteger_t *)
778 			    OBJ_PUB_RSA_MOD(objp))->big_value_len));
779 			(void) memcpy(buf, (char *)&tmp_val, sizeof (uint64_t));
780 			buf = buf + sizeof (uint64_t);
781 
782 			(void) memcpy(buf, (char *)(((biginteger_t *)
783 			    OBJ_PUB_RSA_MOD(objp))->big_value),
784 			    ((biginteger_t *)
785 			    OBJ_PUB_RSA_MOD(objp))->big_value_len);
786 			buf = buf + ROUNDUP(((biginteger_t *)
787 			    OBJ_PUB_RSA_MOD(objp))->big_value_len, 8);
788 
789 			/* pubexpo_len + pubexpo */
790 			tmp_val = SWAP64((uint64_t)((biginteger_t *)
791 			    OBJ_PUB_RSA_PUBEXPO(objp))->big_value_len);
792 			(void) memcpy(buf, (char *)&tmp_val, sizeof (uint64_t));
793 			buf = buf + sizeof (uint64_t);
794 
795 			(void) memcpy(buf, (char *)(((biginteger_t *)
796 			    OBJ_PUB_RSA_PUBEXPO(objp))->big_value),
797 			    ((biginteger_t *)
798 			    OBJ_PUB_RSA_PUBEXPO(objp))->big_value_len);
799 			break;
800 
801 		case CKK_DSA:
802 			/* prime_len + prime */
803 			tmp_val = SWAP64((uint64_t)((biginteger_t *)
804 			    OBJ_PUB_DSA_PRIME(objp))->big_value_len);
805 			(void) memcpy(buf, (char *)&tmp_val, sizeof (uint64_t));
806 			buf = buf + sizeof (uint64_t);
807 
808 			(void) memcpy(buf, (char *)((biginteger_t *)
809 			    OBJ_PUB_DSA_PRIME(objp))->big_value,
810 			    ((biginteger_t *)
811 			    OBJ_PUB_DSA_PRIME(objp))->big_value_len);
812 			buf = buf + ROUNDUP(((biginteger_t *)
813 			    OBJ_PUB_DSA_PRIME(objp))->big_value_len, 8);
814 
815 			/* subprime_len + subprime */
816 			tmp_val = SWAP64((uint64_t)((biginteger_t *)
817 			    OBJ_PUB_DSA_SUBPRIME(objp))->big_value_len);
818 			(void) memcpy(buf, (char *)&tmp_val, sizeof (uint64_t));
819 			buf = buf + sizeof (uint64_t);
820 
821 			(void) memcpy(buf, (char *)((biginteger_t *)
822 			    OBJ_PUB_DSA_SUBPRIME(objp))->big_value,
823 			    ((biginteger_t *)
824 			    OBJ_PUB_DSA_SUBPRIME(objp))->big_value_len);
825 			buf = buf + ROUNDUP(((biginteger_t *)
826 			    OBJ_PUB_DSA_SUBPRIME(objp))->big_value_len, 8);
827 
828 			/* base_len + base */
829 			tmp_val = SWAP64((uint64_t)((biginteger_t *)
830 			    OBJ_PUB_DSA_BASE(objp))->big_value_len);
831 			(void) memcpy(buf, (char *)&tmp_val, sizeof (uint64_t));
832 			buf = buf + sizeof (uint64_t);
833 
834 			(void) memcpy(buf, (char *)((biginteger_t *)
835 			    OBJ_PUB_DSA_BASE(objp))->big_value,
836 			    ((biginteger_t *)
837 			    OBJ_PUB_DSA_BASE(objp))->big_value_len);
838 			buf = buf + ROUNDUP(((biginteger_t *)
839 			    OBJ_PUB_DSA_BASE(objp))->big_value_len, 8);
840 
841 			/* value_len + value */
842 			tmp_val = SWAP64((uint64_t)((biginteger_t *)
843 			    OBJ_PUB_DSA_VALUE(objp))->big_value_len);
844 			(void) memcpy(buf, (char *)&tmp_val, sizeof (uint64_t));
845 			buf = buf + sizeof (uint64_t);
846 
847 			(void) memcpy(buf, (char *)((biginteger_t *)
848 			    OBJ_PUB_DSA_VALUE(objp))->big_value,
849 			    ((biginteger_t *)
850 			    OBJ_PUB_DSA_VALUE(objp))->big_value_len);
851 
852 			break;
853 
854 		case CKK_DH:
855 			/* prime_len + prime */
856 			tmp_val = SWAP64((uint64_t)((biginteger_t *)
857 			    OBJ_PUB_DH_PRIME(objp))->big_value_len);
858 			(void) memcpy(buf, (char *)&tmp_val, sizeof (uint64_t));
859 			buf = buf + sizeof (uint64_t);
860 
861 			(void) memcpy(buf, (char *)((biginteger_t *)
862 			    OBJ_PUB_DH_PRIME(objp))->big_value,
863 			    ((biginteger_t *)
864 			    OBJ_PUB_DH_PRIME(objp))->big_value_len);
865 			buf = buf + ROUNDUP(((biginteger_t *)
866 			    OBJ_PUB_DH_PRIME(objp))->big_value_len, 8);
867 
868 			/* base_len + base */
869 			tmp_val = SWAP64((uint64_t)((biginteger_t *)
870 			    OBJ_PUB_DH_BASE(objp))->big_value_len);
871 			(void) memcpy(buf, (char *)&tmp_val, sizeof (uint64_t));
872 			buf = buf + sizeof (uint64_t);
873 
874 			(void) memcpy(buf, (char *)((biginteger_t *)
875 			    OBJ_PUB_DH_BASE(objp))->big_value,
876 			    ((biginteger_t *)
877 			    OBJ_PUB_DH_BASE(objp))->big_value_len);
878 			buf = buf + ROUNDUP(((biginteger_t *)
879 			    OBJ_PUB_DH_BASE(objp))->big_value_len, 8);
880 
881 			/* value_len + value */
882 			tmp_val = SWAP64((uint64_t)((biginteger_t *)
883 			    OBJ_PUB_DH_VALUE(objp))->big_value_len);
884 			(void) memcpy(buf, (char *)&tmp_val, sizeof (uint64_t));
885 			buf = buf + sizeof (uint64_t);
886 
887 			(void) memcpy(buf, (char *)((biginteger_t *)
888 			    OBJ_PUB_DH_VALUE(objp))->big_value,
889 			    ((biginteger_t *)
890 			    OBJ_PUB_DH_VALUE(objp))->big_value_len);
891 
892 			break;
893 
894 		case CKK_X9_42_DH:
895 			/* prime_len +  prime */
896 			tmp_val = SWAP64((uint64_t)((biginteger_t *)
897 			    OBJ_PUB_DH942_PRIME(objp))->big_value_len);
898 			(void) memcpy(buf, (char *)&tmp_val, sizeof (uint64_t));
899 			buf = buf + sizeof (uint64_t);
900 
901 			(void) memcpy(buf, (char *)((biginteger_t *)
902 			    OBJ_PUB_DH942_PRIME(objp))->big_value,
903 			    ((biginteger_t *)
904 			    OBJ_PUB_DH942_PRIME(objp))->big_value_len);
905 			buf = buf + ROUNDUP(((biginteger_t *)
906 			    OBJ_PUB_DH942_PRIME(objp))->big_value_len, 8);
907 
908 			/* base_len + base */
909 			tmp_val = SWAP64((uint64_t)((biginteger_t *)
910 			    OBJ_PUB_DH942_BASE(objp))->big_value_len);
911 			(void) memcpy(buf, (char *)&tmp_val, sizeof (uint64_t));
912 			buf = buf + sizeof (uint64_t);
913 
914 			(void) memcpy(buf, (char *)((biginteger_t *)
915 			    OBJ_PUB_DH942_BASE(objp))->big_value,
916 			    ((biginteger_t *)
917 			    OBJ_PUB_DH942_BASE(objp))->big_value_len);
918 			buf = buf + ROUNDUP(((biginteger_t *)
919 			    OBJ_PUB_DH942_BASE(objp))->big_value_len, 8);
920 
921 			/* subprime_len + subprime */
922 			tmp_val = SWAP64((uint64_t)((biginteger_t *)
923 			    OBJ_PUB_DH942_SUBPRIME(objp))->big_value_len);
924 			(void) memcpy(buf, (char *)&tmp_val, sizeof (uint64_t));
925 			buf = buf + sizeof (uint64_t);
926 
927 			(void) memcpy(buf, (char *)((biginteger_t *)
928 			    OBJ_PUB_DH942_SUBPRIME(objp))->big_value,
929 			    ((biginteger_t *)
930 			    OBJ_PUB_DH942_SUBPRIME(objp))->big_value_len);
931 			buf = buf + ROUNDUP(((biginteger_t *)
932 			    OBJ_PUB_DH942_SUBPRIME(objp))->big_value_len, 8);
933 
934 			/* value_len + value */
935 			tmp_val = SWAP64((uint64_t)((biginteger_t *)
936 			    OBJ_PUB_DH942_VALUE(objp))->big_value_len);
937 			(void) memcpy(buf, (char *)&tmp_val, sizeof (uint64_t));
938 			buf = buf + sizeof (uint64_t);
939 
940 			(void) memcpy(buf, (char *)((biginteger_t *)
941 			    OBJ_PUB_DH942_VALUE(objp))->big_value,
942 			    ((biginteger_t *)
943 			    OBJ_PUB_DH942_VALUE(objp))->big_value_len);
944 
945 			break;
946 		} /* keytype */
947 
948 		break;
949 
950 	case CKO_PRIVATE_KEY:
951 		switch (keytype) {
952 		case CKK_RSA:
953 			/* modulus_len + modulus */
954 			tmp_val = SWAP64((uint64_t)((biginteger_t *)
955 			    OBJ_PRI_RSA_MOD(objp))->big_value_len);
956 			(void) memcpy(buf, (char *)&tmp_val, sizeof (uint64_t));
957 			buf = buf + sizeof (uint64_t);
958 
959 			(void) memcpy(buf, (char *)((biginteger_t *)
960 			    OBJ_PRI_RSA_MOD(objp))->big_value,
961 			    ((biginteger_t *)
962 			    OBJ_PRI_RSA_MOD(objp))->big_value_len);
963 			buf = buf + ROUNDUP(((biginteger_t *)
964 			    OBJ_PRI_RSA_MOD(objp))->big_value_len, 8);
965 
966 			/* pubexpo_len + pubexpo */
967 			tmp_val = SWAP64((uint64_t)((biginteger_t *)
968 			    OBJ_PRI_RSA_PUBEXPO(objp))->big_value_len);
969 			(void) memcpy(buf, (char *)&tmp_val, sizeof (uint64_t));
970 			buf = buf + sizeof (uint64_t);
971 
972 			(void) memcpy(buf, (char *)((biginteger_t *)
973 			    OBJ_PRI_RSA_PUBEXPO(objp))->big_value,
974 			    ((biginteger_t *)
975 			    OBJ_PRI_RSA_PUBEXPO(objp))->big_value_len);
976 			buf = buf + ROUNDUP(((biginteger_t *)
977 			    OBJ_PRI_RSA_PUBEXPO(objp))->big_value_len, 8);
978 
979 			/* priexpo_len + priexpo */
980 			tmp_val = SWAP64((uint64_t)((biginteger_t *)
981 			    OBJ_PRI_RSA_PRIEXPO(objp))->big_value_len);
982 			(void) memcpy(buf, (char *)&tmp_val, sizeof (uint64_t));
983 			buf = buf + sizeof (uint64_t);
984 
985 			(void) memcpy(buf, (char *)((biginteger_t *)
986 			    OBJ_PRI_RSA_PRIEXPO(objp))->big_value,
987 			    ((biginteger_t *)
988 			    OBJ_PRI_RSA_PRIEXPO(objp))->big_value_len);
989 			buf = buf + ROUNDUP(((biginteger_t *)
990 			    OBJ_PRI_RSA_PRIEXPO(objp))->big_value_len, 8);
991 
992 			/* prime1_len + prime1 */
993 			tmp_val = SWAP64((uint64_t)((biginteger_t *)
994 			    OBJ_PRI_RSA_PRIME1(objp))->big_value_len);
995 			(void) memcpy(buf, (char *)&tmp_val, sizeof (uint64_t));
996 			buf = buf + sizeof (uint64_t);
997 
998 			(void) memcpy(buf, (char *)((biginteger_t *)
999 			    OBJ_PRI_RSA_PRIME1(objp))->big_value,
1000 			    ((biginteger_t *)
1001 			    OBJ_PRI_RSA_PRIME1(objp))->big_value_len);
1002 			buf = buf + ROUNDUP(((biginteger_t *)
1003 			    OBJ_PRI_RSA_PRIME1(objp))->big_value_len, 8);
1004 
1005 			/* prime2_len + prime2 */
1006 			tmp_val = SWAP64((uint64_t)((biginteger_t *)
1007 			    OBJ_PRI_RSA_PRIME2(objp))->big_value_len);
1008 			(void) memcpy(buf, (char *)&tmp_val, sizeof (uint64_t));
1009 			buf = buf + sizeof (uint64_t);
1010 
1011 			(void) memcpy(buf, (char *)((biginteger_t *)
1012 			    OBJ_PRI_RSA_PRIME2(objp))->big_value,
1013 			    ((biginteger_t *)
1014 			    OBJ_PRI_RSA_PRIME2(objp))->big_value_len);
1015 			buf = buf + ROUNDUP(((biginteger_t *)
1016 			    OBJ_PRI_RSA_PRIME2(objp))->big_value_len, 8);
1017 
1018 			/* expo1_len + expo1 */
1019 			tmp_val = SWAP64((uint64_t)((biginteger_t *)
1020 			    OBJ_PRI_RSA_EXPO1(objp))->big_value_len);
1021 			(void) memcpy(buf, (char *)&tmp_val, sizeof (uint64_t));
1022 			buf = buf + sizeof (uint64_t);
1023 
1024 			(void) memcpy(buf, (char *)((biginteger_t *)
1025 			    OBJ_PRI_RSA_EXPO1(objp))->big_value,
1026 			    ((biginteger_t *)
1027 			    OBJ_PRI_RSA_EXPO1(objp))->big_value_len);
1028 			buf = buf + ROUNDUP(((biginteger_t *)
1029 			    OBJ_PRI_RSA_EXPO1(objp))->big_value_len, 8);
1030 
1031 			/* expo2_len + expo2 */
1032 			tmp_val = SWAP64((uint64_t)((biginteger_t *)
1033 			    OBJ_PRI_RSA_EXPO2(objp))->big_value_len);
1034 			(void) memcpy(buf, (char *)&tmp_val, sizeof (uint64_t));
1035 			buf = buf + sizeof (uint64_t);
1036 
1037 			(void) memcpy(buf, (char *)((biginteger_t *)
1038 			    OBJ_PRI_RSA_EXPO2(objp))->big_value,
1039 			    ((biginteger_t *)
1040 			    OBJ_PRI_RSA_EXPO2(objp))->big_value_len);
1041 			buf = buf + ROUNDUP(((biginteger_t *)
1042 			    OBJ_PRI_RSA_EXPO2(objp))->big_value_len, 8);
1043 
1044 			/* coef_len + coef */
1045 			tmp_val = SWAP64((uint64_t)((biginteger_t *)
1046 			    OBJ_PRI_RSA_COEF(objp))->big_value_len);
1047 			(void) memcpy(buf, (char *)&tmp_val, sizeof (uint64_t));
1048 			buf = buf + sizeof (uint64_t);
1049 
1050 			(void) memcpy(buf, (char *)((biginteger_t *)
1051 			    OBJ_PRI_RSA_COEF(objp))->big_value,
1052 			    ((biginteger_t *)
1053 			    OBJ_PRI_RSA_COEF(objp))->big_value_len);
1054 			buf = buf + ROUNDUP(((biginteger_t *)
1055 			    OBJ_PRI_RSA_COEF(objp))->big_value_len, 8);
1056 
1057 			break;
1058 
1059 		case CKK_DSA:
1060 			/* prime_len + prime */
1061 			tmp_val = SWAP64((uint64_t)((biginteger_t *)
1062 			    OBJ_PRI_DSA_PRIME(objp))->big_value_len);
1063 			(void) memcpy(buf, (char *)&tmp_val, sizeof (uint64_t));
1064 			buf = buf + sizeof (uint64_t);
1065 
1066 			(void) memcpy(buf, (char *)((biginteger_t *)
1067 			    OBJ_PRI_DSA_PRIME(objp))->big_value,
1068 			    ((biginteger_t *)
1069 			    OBJ_PRI_DSA_PRIME(objp))->big_value_len);
1070 			buf = buf + ROUNDUP(((biginteger_t *)
1071 			    OBJ_PRI_DSA_PRIME(objp))->big_value_len, 8);
1072 
1073 			/* subprime_len + subprime */
1074 			tmp_val = SWAP64((uint64_t)((biginteger_t *)
1075 			    OBJ_PRI_DSA_SUBPRIME(objp))->big_value_len);
1076 			(void) memcpy(buf, (char *)&tmp_val, sizeof (uint64_t));
1077 			buf = buf + sizeof (uint64_t);
1078 
1079 			(void) memcpy(buf, (char *)((biginteger_t *)
1080 			    OBJ_PRI_DSA_SUBPRIME(objp))->big_value,
1081 			    ((biginteger_t *)
1082 			    OBJ_PRI_DSA_SUBPRIME(objp))->big_value_len);
1083 			buf = buf + ROUNDUP(((biginteger_t *)
1084 			    OBJ_PRI_DSA_SUBPRIME(objp))->big_value_len, 8);
1085 
1086 			/* base_len + base */
1087 			tmp_val = SWAP64((uint64_t)((biginteger_t *)
1088 			    OBJ_PRI_DSA_BASE(objp))->big_value_len);
1089 			(void) memcpy(buf, (char *)&tmp_val, sizeof (uint64_t));
1090 			buf = buf + sizeof (uint64_t);
1091 
1092 			(void) memcpy(buf, (char *)((biginteger_t *)
1093 			    OBJ_PRI_DSA_BASE(objp))->big_value,
1094 			    ((biginteger_t *)
1095 			    OBJ_PRI_DSA_BASE(objp))->big_value_len);
1096 			buf = buf + ROUNDUP(((biginteger_t *)
1097 			    OBJ_PRI_DSA_BASE(objp))->big_value_len, 8);
1098 
1099 			/* value_len + value */
1100 			tmp_val = SWAP64((uint64_t)((biginteger_t *)
1101 			    OBJ_PRI_DSA_VALUE(objp))->big_value_len);
1102 			(void) memcpy(buf, (char *)&tmp_val, sizeof (uint64_t));
1103 			buf = buf + sizeof (uint64_t);
1104 
1105 			(void) memcpy(buf, (char *)((biginteger_t *)
1106 			    OBJ_PRI_DSA_VALUE(objp))->big_value,
1107 			    ((biginteger_t *)
1108 			    OBJ_PRI_DSA_VALUE(objp))->big_value_len);
1109 
1110 			break;
1111 
1112 		case CKK_DH:
1113 			/* value_bits */
1114 			tmp_val = SWAP64((uint64_t)OBJ_PRI_DH_VAL_BITS(objp));
1115 			(void) memcpy(buf, (char *)&tmp_val, sizeof (uint64_t));
1116 			buf = buf + sizeof (uint64_t);
1117 
1118 			/* prime_len + prime */
1119 			tmp_val = SWAP64((uint64_t)((biginteger_t *)
1120 			    OBJ_PRI_DH_PRIME(objp))->big_value_len);
1121 			(void) memcpy(buf, (char *)&tmp_val, sizeof (uint64_t));
1122 			buf = buf + sizeof (uint64_t);
1123 
1124 			(void) memcpy(buf, (char *)((biginteger_t *)
1125 			    OBJ_PRI_DH_PRIME(objp))->big_value,
1126 			    ((biginteger_t *)
1127 			    OBJ_PRI_DH_PRIME(objp))->big_value_len);
1128 			buf = buf + ROUNDUP(((biginteger_t *)
1129 			    OBJ_PRI_DH_PRIME(objp))->big_value_len, 8);
1130 
1131 			/* base_len + base */
1132 			tmp_val = SWAP64((uint64_t)((biginteger_t *)
1133 			    OBJ_PRI_DH_BASE(objp))->big_value_len);
1134 			(void) memcpy(buf, (char *)&tmp_val, sizeof (uint64_t));
1135 			buf = buf + sizeof (uint64_t);
1136 
1137 			(void) memcpy(buf, (char *)((biginteger_t *)
1138 			    OBJ_PRI_DH_BASE(objp))->big_value,
1139 			    ((biginteger_t *)
1140 			    OBJ_PRI_DH_BASE(objp))->big_value_len);
1141 			buf = buf + ROUNDUP(((biginteger_t *)
1142 			    OBJ_PRI_DH_BASE(objp))->big_value_len, 8);
1143 
1144 			/* value_len + value */
1145 			tmp_val = SWAP64((uint64_t)((biginteger_t *)
1146 			    OBJ_PRI_DH_VALUE(objp))->big_value_len);
1147 			(void) memcpy(buf, (char *)&tmp_val, sizeof (uint64_t));
1148 			buf = buf + sizeof (uint64_t);
1149 
1150 			(void) memcpy(buf, (char *)((biginteger_t *)
1151 			    OBJ_PRI_DH_VALUE(objp))->big_value,
1152 			    ((biginteger_t *)
1153 			    OBJ_PRI_DH_VALUE(objp))->big_value_len);
1154 
1155 			break;
1156 
1157 		case CKK_X9_42_DH:
1158 			/* prime_len + prime */
1159 			tmp_val = SWAP64((uint64_t)((biginteger_t *)
1160 			    OBJ_PRI_DH942_PRIME(objp))->big_value_len);
1161 			(void) memcpy(buf, (char *)&tmp_val, sizeof (uint64_t));
1162 			buf = buf + sizeof (uint64_t);
1163 
1164 			(void) memcpy(buf, (char *)((biginteger_t *)
1165 			    OBJ_PRI_DH942_PRIME(objp))->big_value,
1166 			    ((biginteger_t *)
1167 			    OBJ_PRI_DH942_PRIME(objp))->big_value_len);
1168 			buf = buf + ROUNDUP(((biginteger_t *)
1169 			    OBJ_PRI_DH942_PRIME(objp))->big_value_len, 8);
1170 
1171 			/* base_len + base */
1172 			tmp_val = SWAP64((uint64_t)((biginteger_t *)
1173 			    OBJ_PRI_DH942_BASE(objp))->big_value_len);
1174 			(void) memcpy(buf, (char *)&tmp_val, sizeof (uint64_t));
1175 			buf = buf + sizeof (uint64_t);
1176 
1177 			(void) memcpy(buf, (char *)((biginteger_t *)
1178 			    OBJ_PRI_DH942_BASE(objp))->big_value,
1179 			    ((biginteger_t *)
1180 			    OBJ_PRI_DH942_BASE(objp))->big_value_len);
1181 			buf = buf + ROUNDUP(((biginteger_t *)
1182 			    OBJ_PRI_DH942_BASE(objp))->big_value_len, 8);
1183 
1184 			/* subprime_len + subprime */
1185 			tmp_val = SWAP64((uint64_t)((biginteger_t *)
1186 			    OBJ_PRI_DH942_SUBPRIME(objp))->big_value_len);
1187 			(void) memcpy(buf, (char *)&tmp_val, sizeof (uint64_t));
1188 			buf = buf + sizeof (uint64_t);
1189 
1190 			(void) memcpy(buf, (char *)((biginteger_t *)
1191 			    OBJ_PRI_DH942_SUBPRIME(objp))->big_value,
1192 			    ((biginteger_t *)
1193 			    OBJ_PRI_DH942_SUBPRIME(objp))->big_value_len);
1194 			buf = buf + ROUNDUP(((biginteger_t *)
1195 			    OBJ_PRI_DH942_SUBPRIME(objp))->big_value_len, 8);
1196 
1197 			/* value_len + value */
1198 			tmp_val = SWAP64((uint64_t)((biginteger_t *)
1199 			    OBJ_PRI_DH942_VALUE(objp))->big_value_len);
1200 			(void) memcpy(buf, (char *)&tmp_val, sizeof (uint64_t));
1201 			buf = buf + sizeof (uint64_t);
1202 
1203 			(void) memcpy(buf, (char *)((biginteger_t *)
1204 			    OBJ_PRI_DH942_VALUE(objp))->big_value,
1205 			    ((biginteger_t *)
1206 			    OBJ_PRI_DH942_VALUE(objp))->big_value_len);
1207 
1208 			break;
1209 
1210 		} /* keytype */
1211 
1212 		break;
1213 
1214 	case CKO_SECRET_KEY:
1215 		/* value_len  + value */
1216 		tmp_val = SWAP64((uint64_t)OBJ_SEC_VALUE_LEN(objp));
1217 		(void) memcpy(buf, (char *)&tmp_val, sizeof (uint64_t));
1218 		buf = buf + sizeof (uint64_t);
1219 
1220 		if (OBJ_SEC_VALUE_LEN(objp) > 0) {
1221 			(void) memcpy(buf, (char *)OBJ_SEC_VALUE(objp),
1222 			    OBJ_SEC_VALUE_LEN(objp));
1223 			buf = buf + ROUNDUP(OBJ_SEC_VALUE_LEN(objp), 8);
1224 		}
1225 
1226 		break;
1227 
1228 	case CKO_CERTIFICATE:
1229 
1230 		switch (certtype) {
1231 		case CKC_X_509:
1232 			/* subject_len + subject */
1233 			tmp_val = SWAP64((uint64_t)(((cert_attr_t *)
1234 			    X509_CERT_SUBJECT(objp))->length));
1235 			(void) memcpy(buf, (char *)&tmp_val, sizeof (uint64_t));
1236 			buf = buf + sizeof (uint64_t);
1237 
1238 			(void) memcpy(buf, (char *)((cert_attr_t *)
1239 			    X509_CERT_SUBJECT(objp))->value,
1240 			    ((cert_attr_t *)
1241 			    X509_CERT_SUBJECT(objp))->length);
1242 			buf = buf + ROUNDUP(((cert_attr_t *)
1243 			    X509_CERT_SUBJECT(objp))->length, 8);
1244 
1245 			/* value_len + value */
1246 			tmp_val = SWAP64((uint64_t)(((cert_attr_t *)
1247 			    X509_CERT_VALUE(objp))->length));
1248 			(void) memcpy(buf, (char *)&tmp_val, sizeof (uint64_t));
1249 			buf = buf + sizeof (uint64_t);
1250 
1251 			(void) memcpy(buf, (char *)((cert_attr_t *)
1252 			    X509_CERT_VALUE(objp))->value,
1253 			    ((cert_attr_t *)
1254 			    X509_CERT_VALUE(objp))->length);
1255 			break;
1256 
1257 		case CKC_X_509_ATTR_CERT:
1258 			/* owner_len + owner */
1259 			tmp_val = SWAP64((uint64_t)(((cert_attr_t *)
1260 			    X509_ATTR_CERT_OWNER(objp))->length));
1261 			(void) memcpy(buf, (char *)&tmp_val, sizeof (uint64_t));
1262 			buf = buf + sizeof (uint64_t);
1263 
1264 			(void) memcpy(buf, (char *)((cert_attr_t *)
1265 			    X509_ATTR_CERT_OWNER(objp))->value,
1266 			    ((cert_attr_t *)
1267 			    X509_ATTR_CERT_OWNER(objp))->length);
1268 			buf = buf + ROUNDUP(((cert_attr_t *)
1269 			    X509_ATTR_CERT_OWNER(objp))->length, 8);
1270 
1271 			/* value_len + value */
1272 			tmp_val = SWAP64((uint64_t)(((cert_attr_t *)
1273 			    X509_ATTR_CERT_VALUE(objp))->length));
1274 			(void) memcpy(buf, (char *)&tmp_val, sizeof (uint64_t));
1275 			buf = buf + sizeof (uint64_t);
1276 
1277 			(void) memcpy(buf, (char *)((cert_attr_t *)
1278 			    X509_ATTR_CERT_VALUE(objp))->value,
1279 			    ((cert_attr_t *)
1280 			    X509_ATTR_CERT_VALUE(objp))->length);
1281 			break;
1282 		}
1283 		break;
1284 
1285 	case CKO_DOMAIN_PARAMETERS:
1286 
1287 		return (0);
1288 	}
1289 	return (CKR_OK);
1290 }
1291 
1292 /*
1293  * Unpack the object key in keystore format (the third part)
1294  * into soft_object_t.
1295  */
1296 CK_RV
1297 soft_unpack_object(soft_object_t *objp, uchar_t *buf)
1298 {
1299 
1300 	public_key_obj_t  *pbk;
1301 	private_key_obj_t *pvk;
1302 	secret_key_obj_t  *sck;
1303 	certificate_obj_t *cert;
1304 	CK_OBJECT_CLASS class = objp->class;
1305 	CK_KEY_TYPE	keytype = objp->key_type;
1306 	CK_CERTIFICATE_TYPE certtype = objp->cert_type;
1307 
1308 	biginteger_t	modulus;
1309 	biginteger_t	pubexpo;
1310 	biginteger_t	prime;
1311 	biginteger_t	subprime;
1312 	biginteger_t	base;
1313 	biginteger_t	value;
1314 
1315 	biginteger_t	priexpo;
1316 	biginteger_t	prime1;
1317 	biginteger_t	prime2;
1318 	biginteger_t	expo1;
1319 	biginteger_t	expo2;
1320 	biginteger_t	coef;
1321 	CK_RV 		rv = CKR_OK;
1322 	ulong_t offset = 0;
1323 	uint64_t tmp_val;
1324 
1325 	/* prevent bigint_attr_cleanup from freeing invalid attr value */
1326 	(void) memset(&modulus, 0x0, sizeof (biginteger_t));
1327 	(void) memset(&pubexpo, 0x0, sizeof (biginteger_t));
1328 	(void) memset(&prime, 0x0, sizeof (biginteger_t));
1329 	(void) memset(&subprime, 0x0, sizeof (biginteger_t));
1330 	(void) memset(&base, 0x0, sizeof (biginteger_t));
1331 	(void) memset(&value, 0x0, sizeof (biginteger_t));
1332 
1333 	(void) memset(&priexpo, 0x0, sizeof (biginteger_t));
1334 	(void) memset(&prime1, 0x0, sizeof (biginteger_t));
1335 	(void) memset(&prime2, 0x0, sizeof (biginteger_t));
1336 	(void) memset(&expo1, 0x0, sizeof (biginteger_t));
1337 	(void) memset(&expo2, 0x0, sizeof (biginteger_t));
1338 	(void) memset(&coef, 0x0, sizeof (biginteger_t));
1339 
1340 	switch (class) {
1341 
1342 	case CKO_PUBLIC_KEY:
1343 		/* Allocate storage for Public Key Object. */
1344 		pbk = calloc(1, sizeof (public_key_obj_t));
1345 		if (pbk == NULL) {
1346 			rv =  CKR_HOST_MEMORY;
1347 			return (rv);
1348 		}
1349 
1350 		objp->object_class_u.public_key = pbk;
1351 
1352 		switch (keytype) {
1353 		case CKK_RSA:			/* modulus_bits */
1354 			(void) memcpy(&tmp_val, buf, sizeof (uint64_t));
1355 			KEY_PUB_RSA_MOD_BITS(pbk) = (CK_ULONG)(SWAP64(tmp_val));
1356 			buf = buf + sizeof (uint64_t);
1357 
1358 			/* modulus */
1359 			if ((rv = soft_unpack_obj_attribute(buf, &modulus,
1360 			    NULL, &offset, B_FALSE)) != CKR_OK)
1361 				goto pub_cleanup;
1362 
1363 			copy_bigint_attr(&modulus, KEY_PUB_RSA_MOD(pbk));
1364 
1365 			buf += ROUNDUP(offset, 8);
1366 
1367 			/* pubexpo */
1368 			if ((rv = soft_unpack_obj_attribute(buf, &pubexpo,
1369 			    NULL, &offset, B_FALSE)) != CKR_OK)
1370 				goto pub_cleanup;
1371 
1372 			copy_bigint_attr(&pubexpo, KEY_PUB_RSA_PUBEXPO(pbk));
1373 
1374 			break;
1375 
1376 		case CKK_DSA:
1377 			/* prime */
1378 			if ((rv = soft_unpack_obj_attribute(buf, &prime,
1379 			    NULL, &offset, B_FALSE)) != CKR_OK)
1380 				goto pub_cleanup;
1381 
1382 			copy_bigint_attr(&prime, KEY_PUB_DSA_PRIME(pbk));
1383 
1384 			buf += ROUNDUP(offset, 8);
1385 
1386 			/* subprime */
1387 			if ((rv = soft_unpack_obj_attribute(buf, &subprime,
1388 			    NULL, &offset, B_FALSE)) != CKR_OK)
1389 				goto pub_cleanup;
1390 
1391 			copy_bigint_attr(&subprime, KEY_PUB_DSA_SUBPRIME(pbk));
1392 
1393 			buf += ROUNDUP(offset, 8);
1394 
1395 			/* base */
1396 			if ((rv = soft_unpack_obj_attribute(buf, &base,
1397 			    NULL, &offset, B_FALSE)) != CKR_OK)
1398 				goto pub_cleanup;
1399 
1400 			copy_bigint_attr(&base, KEY_PUB_DSA_BASE(pbk));
1401 
1402 			buf += ROUNDUP(offset, 8);
1403 
1404 			/* value */
1405 			if ((rv = soft_unpack_obj_attribute(buf, &value,
1406 			    NULL, &offset, B_FALSE)) != CKR_OK)
1407 				goto pub_cleanup;
1408 
1409 			copy_bigint_attr(&value, KEY_PUB_DSA_VALUE(pbk));
1410 
1411 			break;
1412 
1413 		case CKK_DH:
1414 			/* prime */
1415 			if ((rv = soft_unpack_obj_attribute(buf, &prime,
1416 			    NULL, &offset, B_FALSE)) != CKR_OK)
1417 				goto pub_cleanup;
1418 
1419 			copy_bigint_attr(&prime, KEY_PUB_DH_PRIME(pbk));
1420 
1421 			buf += ROUNDUP(offset, 8);
1422 
1423 			/* base */
1424 			if ((rv = soft_unpack_obj_attribute(buf, &base,
1425 			    NULL, &offset, B_FALSE)) != CKR_OK)
1426 				goto pub_cleanup;
1427 
1428 			copy_bigint_attr(&base, KEY_PUB_DH_BASE(pbk));
1429 
1430 			buf += ROUNDUP(offset, 8);
1431 
1432 			/* value */
1433 			if ((rv = soft_unpack_obj_attribute(buf, &value,
1434 			    NULL, &offset, B_FALSE)) != CKR_OK)
1435 				goto pub_cleanup;
1436 
1437 			copy_bigint_attr(&value, KEY_PUB_DH_VALUE(pbk));
1438 
1439 			break;
1440 
1441 		case CKK_X9_42_DH:
1442 			/* prime */
1443 			if ((rv = soft_unpack_obj_attribute(buf, &prime,
1444 			    NULL, &offset, B_FALSE)) != CKR_OK)
1445 				goto pub_cleanup;
1446 
1447 			copy_bigint_attr(&prime, KEY_PUB_DH942_PRIME(pbk));
1448 
1449 			buf += ROUNDUP(offset, 8);
1450 
1451 			/* base */
1452 			if ((rv = soft_unpack_obj_attribute(buf, &base,
1453 			    NULL, &offset, B_FALSE)) != CKR_OK)
1454 				goto pub_cleanup;
1455 
1456 			copy_bigint_attr(&base, KEY_PUB_DH942_BASE(pbk));
1457 
1458 			buf += ROUNDUP(offset, 8);
1459 
1460 			/* subprime */
1461 			if ((rv = soft_unpack_obj_attribute(buf, &subprime,
1462 			    NULL, &offset, B_FALSE)) != CKR_OK)
1463 				goto pub_cleanup;
1464 
1465 			copy_bigint_attr(&subprime,
1466 			    KEY_PUB_DH942_SUBPRIME(pbk));
1467 
1468 			buf += ROUNDUP(offset, 8);
1469 
1470 			/* value */
1471 			if ((rv = soft_unpack_obj_attribute(buf, &value,
1472 			    NULL, &offset, B_FALSE)) != CKR_OK)
1473 				goto pub_cleanup;
1474 
1475 			copy_bigint_attr(&value, KEY_PUB_DH942_VALUE(pbk));
1476 
1477 			break;
1478 		} /* keytype */
1479 
1480 		break;
1481 
1482 	case CKO_PRIVATE_KEY:
1483 		/* Allocate storage for Private Key Object. */
1484 		pvk = calloc(1, sizeof (private_key_obj_t));
1485 		if (pvk == NULL) {
1486 			rv = CKR_HOST_MEMORY;
1487 			return (rv);
1488 		}
1489 
1490 		objp->object_class_u.private_key = pvk;
1491 
1492 		switch (keytype) {
1493 		case CKK_RSA:
1494 			/* modulus */
1495 			if ((rv = soft_unpack_obj_attribute(buf, &modulus,
1496 			    NULL, &offset, B_FALSE)) != CKR_OK)
1497 				goto pri_cleanup;
1498 
1499 			copy_bigint_attr(&modulus, KEY_PRI_RSA_MOD(pvk));
1500 
1501 			buf += ROUNDUP(offset, 8);
1502 
1503 			/* pubexpo */
1504 			if ((rv = soft_unpack_obj_attribute(buf, &pubexpo,
1505 			    NULL, &offset, B_FALSE)) != CKR_OK)
1506 				goto pri_cleanup;
1507 
1508 			copy_bigint_attr(&pubexpo, KEY_PRI_RSA_PUBEXPO(pvk));
1509 
1510 			buf += ROUNDUP(offset, 8);
1511 
1512 			/* priexpo */
1513 			if ((rv = soft_unpack_obj_attribute(buf, &priexpo,
1514 			    NULL, &offset, B_FALSE)) != CKR_OK)
1515 				goto pri_cleanup;
1516 
1517 			copy_bigint_attr(&priexpo, KEY_PRI_RSA_PRIEXPO(pvk));
1518 
1519 			buf += ROUNDUP(offset, 8);
1520 
1521 			/* prime1 */
1522 			if ((rv = soft_unpack_obj_attribute(buf, &prime1,
1523 			    NULL, &offset, B_FALSE)) != CKR_OK)
1524 				goto pri_cleanup;
1525 
1526 			copy_bigint_attr(&prime1, KEY_PRI_RSA_PRIME1(pvk));
1527 
1528 			buf += ROUNDUP(offset, 8);
1529 
1530 			/* prime2 */
1531 			if ((rv = soft_unpack_obj_attribute(buf, &prime2,
1532 			    NULL, &offset, B_FALSE)) != CKR_OK)
1533 				goto pri_cleanup;
1534 
1535 			copy_bigint_attr(&prime2, KEY_PRI_RSA_PRIME2(pvk));
1536 
1537 			buf += ROUNDUP(offset, 8);
1538 
1539 			/* expo1 */
1540 			if ((rv = soft_unpack_obj_attribute(buf, &expo1,
1541 			    NULL, &offset, B_FALSE)) != CKR_OK)
1542 				goto pri_cleanup;
1543 
1544 			copy_bigint_attr(&expo1, KEY_PRI_RSA_EXPO1(pvk));
1545 
1546 			buf += ROUNDUP(offset, 8);
1547 
1548 			/* expo2 */
1549 			if ((rv = soft_unpack_obj_attribute(buf, &expo2,
1550 			    NULL, &offset, B_FALSE)) != CKR_OK)
1551 				goto pri_cleanup;
1552 
1553 			copy_bigint_attr(&expo2, KEY_PRI_RSA_EXPO2(pvk));
1554 
1555 			buf += ROUNDUP(offset, 8);
1556 
1557 			/* coef */
1558 			if ((rv = soft_unpack_obj_attribute(buf, &coef,
1559 			    NULL, &offset, B_FALSE)) != CKR_OK)
1560 				goto pri_cleanup;
1561 
1562 			copy_bigint_attr(&coef, KEY_PRI_RSA_COEF(pvk));
1563 
1564 			break;
1565 
1566 		case CKK_DSA:
1567 			/* prime */
1568 			if ((rv = soft_unpack_obj_attribute(buf, &prime,
1569 			    NULL, &offset, B_FALSE)) != CKR_OK)
1570 				goto pri_cleanup;
1571 
1572 			copy_bigint_attr(&prime, KEY_PRI_DSA_PRIME(pvk));
1573 
1574 			buf += ROUNDUP(offset, 8);
1575 
1576 			/* subprime */
1577 			if ((rv = soft_unpack_obj_attribute(buf, &subprime,
1578 			    NULL, &offset, B_FALSE)) != CKR_OK)
1579 				goto pri_cleanup;
1580 
1581 			copy_bigint_attr(&subprime, KEY_PRI_DSA_SUBPRIME(pvk));
1582 
1583 			buf += ROUNDUP(offset, 8);
1584 
1585 			/* base */
1586 			if ((rv = soft_unpack_obj_attribute(buf, &base,
1587 			    NULL, &offset, B_FALSE)) != CKR_OK)
1588 				goto pri_cleanup;
1589 
1590 			copy_bigint_attr(&base, KEY_PRI_DSA_BASE(pvk));
1591 
1592 			buf += ROUNDUP(offset, 8);
1593 
1594 			/* value */
1595 			if ((rv = soft_unpack_obj_attribute(buf, &value,
1596 			    NULL, &offset, B_FALSE)) != CKR_OK)
1597 				goto pri_cleanup;
1598 
1599 			copy_bigint_attr(&value, KEY_PRI_DSA_VALUE(pvk));
1600 
1601 			break;
1602 
1603 		case CKK_DH:
1604 			/* value_bits */
1605 			(void) memcpy(&tmp_val, buf, sizeof (uint64_t));
1606 			KEY_PRI_DH_VAL_BITS(pvk) = (CK_ULONG)(SWAP64(tmp_val));
1607 			buf = buf + sizeof (uint64_t);
1608 
1609 			/* prime */
1610 			if ((rv = soft_unpack_obj_attribute(buf, &prime,
1611 			    NULL, &offset, B_FALSE)) != CKR_OK)
1612 				goto pri_cleanup;
1613 
1614 			copy_bigint_attr(&prime, KEY_PRI_DH_PRIME(pvk));
1615 
1616 			buf += ROUNDUP(offset, 8);
1617 
1618 			/* base */
1619 			if ((rv = soft_unpack_obj_attribute(buf, &base,
1620 			    NULL, &offset, B_FALSE)) != CKR_OK)
1621 				goto pri_cleanup;
1622 
1623 			copy_bigint_attr(&base, KEY_PRI_DH_BASE(pvk));
1624 
1625 			buf += ROUNDUP(offset, 8);
1626 
1627 			/* value */
1628 			if ((rv = soft_unpack_obj_attribute(buf, &value,
1629 			    NULL, &offset, B_FALSE)) != CKR_OK)
1630 				goto pri_cleanup;
1631 
1632 			copy_bigint_attr(&value, KEY_PRI_DH_VALUE(pvk));
1633 
1634 			break;
1635 
1636 		case CKK_X9_42_DH:
1637 			/* prime */
1638 			if ((rv = soft_unpack_obj_attribute(buf, &prime,
1639 			    NULL, &offset, B_FALSE)) != CKR_OK)
1640 				goto pri_cleanup;
1641 
1642 			copy_bigint_attr(&prime, KEY_PRI_DH942_PRIME(pvk));
1643 
1644 			buf += ROUNDUP(offset, 8);
1645 
1646 			/* base */
1647 			if ((rv = soft_unpack_obj_attribute(buf, &base,
1648 			    NULL, &offset, B_FALSE)) != CKR_OK)
1649 				goto pri_cleanup;
1650 
1651 			copy_bigint_attr(&base, KEY_PRI_DH942_BASE(pvk));
1652 
1653 			buf += ROUNDUP(offset, 8);
1654 
1655 			/* subprime */
1656 			if ((rv = soft_unpack_obj_attribute(buf, &subprime,
1657 			    NULL, &offset, B_FALSE)) != CKR_OK)
1658 				goto pri_cleanup;
1659 
1660 			copy_bigint_attr(&subprime, KEY_PRI_DH942_BASE(pvk));
1661 
1662 			buf += ROUNDUP(offset, 8);
1663 
1664 			/* value */
1665 			if ((rv = soft_unpack_obj_attribute(buf, &value,
1666 			    NULL, &offset, B_FALSE)) != CKR_OK)
1667 				goto pri_cleanup;
1668 
1669 			copy_bigint_attr(&value, KEY_PRI_DH942_VALUE(pvk));
1670 
1671 			break;
1672 		} /* keytype */
1673 
1674 		break;
1675 
1676 	case CKO_SECRET_KEY:
1677 		/* Allocate storage for Secret Key Object. */
1678 		sck = calloc(1, sizeof (secret_key_obj_t));
1679 		if (sck == NULL) {
1680 			return (CKR_HOST_MEMORY);
1681 		}
1682 
1683 		objp->object_class_u.secret_key = sck;
1684 
1685 		/* value */
1686 		(void) memcpy((void *)&tmp_val, buf, sizeof (uint64_t));
1687 		OBJ_SEC_VALUE_LEN(objp) = (CK_ULONG)(SWAP64(tmp_val));
1688 		buf = buf + sizeof (uint64_t);
1689 
1690 		if (OBJ_SEC_VALUE_LEN(objp) > 0) {
1691 			OBJ_SEC_VALUE(objp) = malloc(OBJ_SEC_VALUE_LEN(objp));
1692 			if (OBJ_SEC_VALUE(objp) == NULL) {
1693 				free(sck);
1694 				return (CKR_HOST_MEMORY);
1695 			}
1696 			(void) memcpy(OBJ_SEC_VALUE(objp), buf,
1697 			    OBJ_SEC_VALUE_LEN(objp));
1698 
1699 			buf = buf + ROUNDUP(OBJ_SEC_VALUE_LEN(objp), 8);
1700 		}
1701 
1702 		return (rv);
1703 
1704 	case CKO_CERTIFICATE:
1705 		/* Allocate storage for Certificate Object. */
1706 		cert = calloc(1, sizeof (certificate_obj_t));
1707 		if (cert == NULL) {
1708 			return (CKR_HOST_MEMORY);
1709 		}
1710 		(void) memset((void *)cert, 0, sizeof (certificate_obj_t));
1711 
1712 		cert->certificate_type = certtype;
1713 		objp->object_class_u.certificate = cert;
1714 
1715 		switch (certtype) {
1716 		case CKC_X_509:
1717 			/* subject */
1718 			if ((rv = soft_unpack_obj_attribute(buf, NULL,
1719 			    &cert->cert_type_u.x509.subject,
1720 				&offset, B_TRUE)) != CKR_OK) {
1721 				free(cert);
1722 				return (rv);
1723 			}
1724 
1725 			buf += ROUNDUP(offset, 8);
1726 
1727 			/* value */
1728 			if ((rv = soft_unpack_obj_attribute(buf, NULL,
1729 			    &cert->cert_type_u.x509.value,
1730 				&offset, B_TRUE)) != CKR_OK) {
1731 				free(cert);
1732 				return (rv);
1733 			}
1734 
1735 			break;
1736 
1737 		case CKC_X_509_ATTR_CERT:
1738 			/* owner */
1739 			if ((rv = soft_unpack_obj_attribute(buf, NULL,
1740 			    &cert->cert_type_u.x509_attr.owner,
1741 				&offset, B_TRUE)) != CKR_OK) {
1742 				free(cert);
1743 				return (rv);
1744 			}
1745 
1746 			buf += ROUNDUP(offset, 8);
1747 
1748 			/* value */
1749 			if ((rv = soft_unpack_obj_attribute(buf, NULL,
1750 			    &cert->cert_type_u.x509_attr.value,
1751 				&offset, B_TRUE)) != CKR_OK) {
1752 				free(cert);
1753 				return (rv);
1754 			}
1755 
1756 			break;
1757 		}
1758 
1759 		return (rv);
1760 
1761 	case CKO_DOMAIN_PARAMETERS:
1762 
1763 		break;
1764 	}
1765 
1766 pub_cleanup:
1767 	/*
1768 	 * cleanup the storage allocated to the local variables.
1769 	 */
1770 	if (rv != CKR_OK)
1771 		free(pbk);
1772 	bigint_attr_cleanup(&modulus);
1773 	bigint_attr_cleanup(&pubexpo);
1774 	bigint_attr_cleanup(&prime);
1775 	bigint_attr_cleanup(&subprime);
1776 	bigint_attr_cleanup(&base);
1777 	bigint_attr_cleanup(&value);
1778 	return (rv);
1779 
1780 pri_cleanup:
1781 	/*
1782 	 * cleanup the storage allocated to the local variables.
1783 	 */
1784 	if (rv != CKR_OK)
1785 		free(pvk);
1786 	bigint_attr_cleanup(&modulus);
1787 	bigint_attr_cleanup(&priexpo);
1788 	bigint_attr_cleanup(&prime);
1789 	bigint_attr_cleanup(&subprime);
1790 	bigint_attr_cleanup(&base);
1791 	bigint_attr_cleanup(&value);
1792 	bigint_attr_cleanup(&pubexpo);
1793 	bigint_attr_cleanup(&prime1);
1794 	bigint_attr_cleanup(&prime2);
1795 	bigint_attr_cleanup(&expo1);
1796 	bigint_attr_cleanup(&expo2);
1797 	bigint_attr_cleanup(&coef);
1798 	return (rv);
1799 }
1800 
1801 
1802 /*
1803  * Store the token object to a keystore file.
1804  */
1805 CK_RV
1806 soft_put_object_to_keystore(soft_object_t *objp)
1807 {
1808 
1809 	uchar_t *buf;
1810 	size_t len;
1811 	CK_RV rv;
1812 
1813 	rv = soft_keystore_pack_obj(objp, &buf, &len);
1814 	if (rv != CKR_OK)
1815 		return (rv);
1816 
1817 	if (objp->object_type == TOKEN_PUBLIC) {
1818 		if ((soft_keystore_put_new_obj(buf, len, B_TRUE,
1819 		    B_FALSE, &objp->ks_handle)) == -1) {
1820 			free(buf);
1821 			return (CKR_FUNCTION_FAILED);
1822 		}
1823 	} else {
1824 		if ((soft_keystore_put_new_obj(buf, len, B_FALSE,
1825 		    B_FALSE, &objp->ks_handle)) == -1) {
1826 			free(buf);
1827 			return (CKR_FUNCTION_FAILED);
1828 		}
1829 	}
1830 	free(buf);
1831 	return (CKR_OK);
1832 
1833 }
1834 
1835 /*
1836  * Modify the in-core token object and then write it to
1837  * a keystore file.
1838  */
1839 CK_RV
1840 soft_modify_object_to_keystore(soft_object_t *objp)
1841 {
1842 
1843 	uchar_t *buf;
1844 	size_t len;
1845 	CK_RV rv;
1846 
1847 	rv = soft_keystore_pack_obj(objp, &buf, &len);
1848 	if (rv != CKR_OK)
1849 		return (rv);
1850 
1851 	/* B_TRUE: caller has held a writelock on the keystore */
1852 	if (soft_keystore_modify_obj(&objp->ks_handle, buf, len,
1853 	    B_TRUE) < 0) {
1854 		return (CKR_FUNCTION_FAILED);
1855 	}
1856 
1857 	free(buf);
1858 	return (CKR_OK);
1859 
1860 }
1861 
1862 /*
1863  * Read the token object from the keystore file.
1864  */
1865 CK_RV
1866 soft_get_token_objects_from_keystore(ks_search_type_t type)
1867 {
1868 	CK_RV rv;
1869 	ks_obj_t	*ks_obj = NULL, *ks_obj_next;
1870 	soft_object_t *new_objp = NULL;
1871 
1872 	/* Load the token object from keystore based on the object type */
1873 	rv = soft_keystore_get_objs(type, &ks_obj, B_FALSE);
1874 	if (rv != CKR_OK) {
1875 		return (rv);
1876 	}
1877 
1878 	while (ks_obj) {
1879 
1880 		new_objp = calloc(1, sizeof (soft_object_t));
1881 		if (new_objp == NULL) {
1882 			rv = CKR_HOST_MEMORY;
1883 			goto cleanup;
1884 		}
1885 		/* Convert the keystore format to memory format */
1886 		rv = soft_keystore_unpack_obj(new_objp, ks_obj);
1887 		if (rv != CKR_OK) {
1888 			if (new_objp->class == CKO_CERTIFICATE)
1889 				soft_cleanup_cert_object(new_objp);
1890 			else
1891 				soft_cleanup_object(new_objp);
1892 			goto cleanup;
1893 		}
1894 
1895 		soft_add_token_object_to_slot(new_objp);
1896 
1897 		/* Free the ks_obj list */
1898 		ks_obj_next = ks_obj->next;
1899 		if (ks_obj->buf)
1900 			free(ks_obj->buf);
1901 		free(ks_obj);
1902 		ks_obj = ks_obj_next;
1903 	}
1904 
1905 	return (CKR_OK);
1906 
1907 cleanup:
1908 	while (ks_obj) {
1909 		ks_obj_next = ks_obj->next;
1910 		free(ks_obj->buf);
1911 		free(ks_obj);
1912 		ks_obj = ks_obj_next;
1913 	}
1914 	return (rv);
1915 }
1916 
1917 /*
1918  * soft_gen_crypt_key()
1919  *
1920  * Arguments:
1921  *
1922  *	pPIN:	pointer to caller provided Pin
1923  *	key:	output argument which contains the address of the
1924  *		pointer to encryption key in the soft_object_t.
1925  *		It is caller's responsibility to call soft_delete_object()
1926  *		if this key is no longer in use.
1927  *	saltdata: input argument (if non-NULL), or
1928  *		  output argument (if NULL):
1929  *		  address of pointer to the "salt" of the encryption key
1930  *
1931  * Description:
1932  *
1933  *	Generate an encryption key of the input PIN.
1934  *
1935  * Returns:
1936  *
1937  *	CKR_OK: no error
1938  *	Other: some error occurred while generating the encryption key
1939  *
1940  */
1941 CK_RV
1942 soft_gen_crypt_key(uchar_t *pPIN, soft_object_t **key, CK_BYTE **saltdata)
1943 {
1944 	CK_OBJECT_CLASS class = CKO_SECRET_KEY;
1945 	CK_ATTRIBUTE tmpl[5];
1946 	int attrs = 0;
1947 	CK_RV rv;
1948 	CK_MECHANISM Mechanism;
1949 	CK_PKCS5_PBKD2_PARAMS params;
1950 	CK_BYTE		salt[PBKD2_SALT_SIZE];
1951 	CK_ULONG	keylen = AES_MIN_KEY_BYTES;
1952 	CK_KEY_TYPE keytype = CKK_AES;
1953 	static CK_BBOOL truevalue = TRUE;
1954 	soft_object_t *secret_key;
1955 	CK_OBJECT_HANDLE hKey;
1956 	CK_ULONG	passwd_size;
1957 
1958 	if (pPIN == NULL)
1959 		return (CKR_FUNCTION_FAILED);
1960 
1961 	tmpl[attrs].type = CKA_CLASS;
1962 	tmpl[attrs].pValue = &class;
1963 	tmpl[attrs].ulValueLen = sizeof (class);
1964 	attrs++;
1965 
1966 	tmpl[attrs].type = CKA_KEY_TYPE;
1967 	tmpl[attrs].pValue = &keytype;
1968 	tmpl[attrs].ulValueLen = sizeof (keytype);
1969 	attrs++;
1970 
1971 	tmpl[attrs].type = CKA_ENCRYPT;
1972 	tmpl[attrs].pValue = &truevalue;
1973 	tmpl[attrs].ulValueLen = sizeof (CK_BBOOL);
1974 	attrs++;
1975 
1976 	tmpl[attrs].type = CKA_DECRYPT;
1977 	tmpl[attrs].pValue = &truevalue;
1978 	tmpl[attrs].ulValueLen = sizeof (CK_BBOOL);
1979 	attrs++;
1980 
1981 	tmpl[attrs].type = CKA_VALUE_LEN;
1982 	tmpl[attrs].pValue = &keylen;
1983 	tmpl[attrs].ulValueLen = sizeof (keylen);
1984 	attrs++;
1985 
1986 	if (*saltdata == NULL) {
1987 		bzero(salt, sizeof (salt));
1988 		(void) soft_nzero_random_generator(salt, sizeof (salt));
1989 		*saltdata = malloc(PBKD2_SALT_SIZE);
1990 		if (*saltdata == NULL)
1991 			return (CKR_HOST_MEMORY);
1992 		(void) memcpy(*saltdata, salt, PBKD2_SALT_SIZE);
1993 	} else {
1994 		bzero(salt, sizeof (salt));
1995 		(void) memcpy(salt, *saltdata, PBKD2_SALT_SIZE);
1996 	}
1997 
1998 	Mechanism.mechanism = CKM_PKCS5_PBKD2;
1999 	Mechanism.pParameter = &params;
2000 	Mechanism.ulParameterLen = sizeof (params);
2001 	passwd_size = (CK_ULONG)strlen((const char *)pPIN);
2002 
2003 	params.saltSource = CKZ_SALT_SPECIFIED;
2004 	params.pSaltSourceData = (void *)salt;
2005 	params.ulSaltSourceDataLen = sizeof (salt);
2006 	params.iterations = PBKD2_ITERATIONS;
2007 	params.prf = CKP_PKCS5_PBKD2_HMAC_SHA1;
2008 	params.pPrfData = NULL;
2009 	params.ulPrfDataLen = 0;
2010 	params.pPassword = (CK_UTF8CHAR_PTR)pPIN;
2011 	params.ulPasswordLen = &passwd_size;
2012 
2013 	rv = soft_gen_keyobject(tmpl, attrs, &hKey, &token_session,
2014 	    CKO_SECRET_KEY, CKK_AES, 0, SOFT_GEN_KEY, B_TRUE);
2015 
2016 	if (rv != CKR_OK) {
2017 		return (rv);
2018 	}
2019 
2020 	/* Obtain the secret object pointer. */
2021 	secret_key = (soft_object_t *)hKey;
2022 	keylen = OBJ_SEC_VALUE_LEN(secret_key);
2023 	if ((OBJ_SEC_VALUE(secret_key) = malloc(keylen)) == NULL) {
2024 		soft_delete_object(&token_session, secret_key, B_FALSE);
2025 		return (CKR_HOST_MEMORY);
2026 	}
2027 
2028 	rv = soft_generate_pkcs5_pbkdf2_key(&token_session, &Mechanism,
2029 	    secret_key);
2030 
2031 	if (rv != CKR_OK)
2032 		soft_delete_object(&token_session, secret_key, B_FALSE);
2033 	else
2034 		*key = secret_key;
2035 
2036 	return (rv);
2037 
2038 }
2039 
2040 /*
2041  * soft_gen_hmac_key()
2042  *
2043  * Arguments:
2044  *
2045  *	pPIN:	pointer to caller provided Pin
2046  *	key:	output argument which contains the address of the
2047  *		pointer to hmac key in the soft_object_t.
2048  *		It is caller's responsibility to call soft_delete_object()
2049  *		if this key is no longer in use.
2050  *	saltdata: input argument (if non-NULL), or
2051  *                output argument (if NULL):
2052  *                address of pointer to the "salt" of the hmac key
2053  *
2054  * Description:
2055  *
2056  *	Generate a hmac key of the input PIN.
2057  *
2058  * Returns:
2059  *
2060  *	CKR_OK: no error
2061  *	Other: some error occurred while generating the hmac key
2062  *
2063  */
2064 CK_RV
2065 soft_gen_hmac_key(uchar_t *pPIN, soft_object_t **key, CK_BYTE **saltdata)
2066 {
2067 	CK_OBJECT_CLASS class = CKO_SECRET_KEY;
2068 	CK_ATTRIBUTE tmpl[5];
2069 	int attrs = 0;
2070 	CK_RV rv;
2071 	CK_MECHANISM Mechanism;
2072 	CK_PKCS5_PBKD2_PARAMS params;
2073 	CK_BYTE		salt[PBKD2_SALT_SIZE];
2074 	CK_ULONG	keylen = 16;
2075 	CK_KEY_TYPE keytype = CKK_GENERIC_SECRET;
2076 	static CK_BBOOL truevalue = TRUE;
2077 	soft_object_t *secret_key;
2078 	CK_OBJECT_HANDLE hKey;
2079 	CK_ULONG	passwd_size;
2080 
2081 	if (pPIN == NULL)
2082 		return (CKR_FUNCTION_FAILED);
2083 
2084 	tmpl[attrs].type = CKA_CLASS;
2085 	tmpl[attrs].pValue = &class;
2086 	tmpl[attrs].ulValueLen = sizeof (class);
2087 	attrs++;
2088 
2089 	tmpl[attrs].type = CKA_KEY_TYPE;
2090 	tmpl[attrs].pValue = &keytype;
2091 	tmpl[attrs].ulValueLen = sizeof (keytype);
2092 	attrs++;
2093 
2094 	tmpl[attrs].type = CKA_SIGN;
2095 	tmpl[attrs].pValue = &truevalue;
2096 	tmpl[attrs].ulValueLen = sizeof (CK_BBOOL);
2097 	attrs++;
2098 
2099 	tmpl[attrs].type = CKA_VERIFY;
2100 	tmpl[attrs].pValue = &truevalue;
2101 	tmpl[attrs].ulValueLen = sizeof (CK_BBOOL);
2102 	attrs++;
2103 
2104 	tmpl[attrs].type = CKA_VALUE_LEN;
2105 	tmpl[attrs].pValue = &keylen;
2106 	tmpl[attrs].ulValueLen = sizeof (keylen);
2107 	attrs++;
2108 
2109 	if (*saltdata == NULL) {
2110 		bzero(salt, sizeof (salt));
2111 		(void) soft_nzero_random_generator(salt, sizeof (salt));
2112 		*saltdata = malloc(PBKD2_SALT_SIZE);
2113 		if (*saltdata == NULL)
2114 			return (CKR_HOST_MEMORY);
2115 		(void) memcpy(*saltdata, salt, PBKD2_SALT_SIZE);
2116 	} else {
2117 		bzero(salt, sizeof (salt));
2118 		(void) memcpy(salt, *saltdata, PBKD2_SALT_SIZE);
2119 	}
2120 
2121 	Mechanism.mechanism = CKM_PKCS5_PBKD2;
2122 	Mechanism.pParameter = &params;
2123 	Mechanism.ulParameterLen = sizeof (params);
2124 	passwd_size = (CK_ULONG)strlen((const char *)pPIN);
2125 
2126 	params.saltSource = CKZ_SALT_SPECIFIED;
2127 	params.pSaltSourceData = (void *)salt;
2128 	params.ulSaltSourceDataLen = sizeof (salt);
2129 	params.iterations = PBKD2_ITERATIONS;
2130 	params.prf = CKP_PKCS5_PBKD2_HMAC_SHA1;
2131 	params.pPrfData = NULL;
2132 	params.ulPrfDataLen = 0;
2133 	params.pPassword = (CK_UTF8CHAR_PTR)pPIN;
2134 	params.ulPasswordLen = &passwd_size;
2135 
2136 	rv = soft_gen_keyobject(tmpl, attrs, &hKey, &token_session,
2137 	    CKO_SECRET_KEY, CKK_GENERIC_SECRET, 0, SOFT_GEN_KEY, B_TRUE);
2138 
2139 	if (rv != CKR_OK) {
2140 		return (rv);
2141 	}
2142 
2143 	/* Obtain the secret object pointer. */
2144 	secret_key = (soft_object_t *)hKey;
2145 	keylen = OBJ_SEC_VALUE_LEN(secret_key);
2146 	if ((OBJ_SEC_VALUE(secret_key) = malloc(keylen)) == NULL) {
2147 		soft_delete_object(&token_session, secret_key, B_FALSE);
2148 		return (CKR_HOST_MEMORY);
2149 	}
2150 
2151 	rv = soft_generate_pkcs5_pbkdf2_key(&token_session, &Mechanism,
2152 	    secret_key);
2153 
2154 	if (rv != CKR_OK)
2155 		soft_delete_object(&token_session, secret_key, B_FALSE);
2156 	else
2157 		*key = secret_key;
2158 
2159 	return (rv);
2160 
2161 }
2162 
2163 /*
2164  * The token session is just a psuedo session (a place holder)
2165  * to hold some information during encryption/decryption and
2166  * sign/verify operations when writing/reading the keystore
2167  * token object.
2168  */
2169 CK_RV
2170 soft_init_token_session(void)
2171 {
2172 
2173 
2174 	token_session.magic_marker = SOFTTOKEN_SESSION_MAGIC;
2175 	token_session.pApplication = NULL_PTR;
2176 	token_session.Notify = NULL;
2177 	token_session.flags = CKF_SERIAL_SESSION;
2178 	token_session.state = CKS_RO_PUBLIC_SESSION;
2179 	token_session.object_list = NULL;
2180 	token_session.ses_refcnt = 0;
2181 	token_session.ses_close_sync = 0;
2182 
2183 	/* Initialize the lock for the token session */
2184 	if (pthread_mutex_init(&token_session.session_mutex, NULL) != 0) {
2185 		return (CKR_CANT_LOCK);
2186 	}
2187 
2188 	(void) pthread_cond_init(&token_session.ses_free_cond, NULL);
2189 
2190 	return (CKR_OK);
2191 
2192 }
2193 
2194 void
2195 soft_destroy_token_session(void)
2196 {
2197 
2198 	(void) pthread_cond_destroy(&token_session.ses_free_cond);
2199 	(void) pthread_mutex_destroy(&token_session.session_mutex);
2200 
2201 }
2202 
2203 /*
2204  * Encrypt/Decrypt the private token object when dealing with the keystore.
2205  * This function only applies to the private token object.
2206  */
2207 CK_RV
2208 soft_keystore_crypt(soft_object_t *key_p, uchar_t *ivec, boolean_t encrypt,
2209 	CK_BYTE_PTR in, CK_ULONG in_len, CK_BYTE_PTR out, CK_ULONG_PTR out_len)
2210 {
2211 	CK_MECHANISM	mech;
2212 	soft_aes_ctx_t *soft_aes_ctx;
2213 	CK_RV rv;
2214 	CK_ULONG tmplen, tmplen1;
2215 
2216 	/*
2217 	 * The caller will pass NULL for "out" (output buffer) to find out
2218 	 * the output buffer size that it need to allocate for the encrption
2219 	 * or decryption.
2220 	 */
2221 	if (out == NULL) {
2222 		mech.mechanism = CKM_AES_CBC_PAD;
2223 		mech.pParameter = (void *)ivec;
2224 		mech.ulParameterLen = AES_BLOCK_LEN;
2225 
2226 		if (encrypt)
2227 			rv = soft_aes_crypt_init_common(&token_session, &mech,
2228 			    key_p, B_TRUE);
2229 		else
2230 			rv = soft_aes_crypt_init_common(&token_session, &mech,
2231 			    key_p, B_FALSE);
2232 
2233 		if (rv != CKR_OK)
2234 			return (rv);
2235 
2236 
2237 		(void) pthread_mutex_lock(&token_session.session_mutex);
2238 
2239 		if (encrypt)
2240 			soft_aes_ctx =
2241 			    (soft_aes_ctx_t *)token_session.encrypt.context;
2242 		else
2243 			soft_aes_ctx =
2244 			    (soft_aes_ctx_t *)token_session.decrypt.context;
2245 
2246 		/* Copy Initialization Vector (IV) into the context. */
2247 		(void) memcpy(soft_aes_ctx->ivec, ivec, AES_BLOCK_LEN);
2248 
2249 		/* Allocate a context for AES cipher-block chaining. */
2250 		soft_aes_ctx->aes_cbc = (void *)aes_cbc_ctx_init(
2251 		    soft_aes_ctx->key_sched, soft_aes_ctx->keysched_len,
2252 		    soft_aes_ctx->ivec);
2253 
2254 		if (soft_aes_ctx->aes_cbc == NULL) {
2255 			bzero(soft_aes_ctx->key_sched,
2256 			    soft_aes_ctx->keysched_len);
2257 			free(soft_aes_ctx->key_sched);
2258 			if (encrypt) {
2259 				free(token_session.encrypt.context);
2260 				token_session.encrypt.context = NULL;
2261 			} else {
2262 				free(token_session.encrypt.context);
2263 				token_session.encrypt.context = NULL;
2264 			}
2265 
2266 			(void) pthread_mutex_unlock(&token_session.
2267 			    session_mutex);
2268 			return (CKR_HOST_MEMORY);
2269 		}
2270 
2271 		(void) pthread_mutex_unlock(&token_session.session_mutex);
2272 		/*
2273 		 * Since out == NULL, the soft_aes_xxcrypt_common() will
2274 		 * simply return the output buffer length to the caller.
2275 		 */
2276 		if (encrypt) {
2277 			rv = soft_aes_encrypt_common(&token_session, in,
2278 			    in_len, out, out_len, B_FALSE);
2279 		} else {
2280 			rv = soft_aes_decrypt_common(&token_session, in,
2281 			    in_len, out, out_len, B_FALSE);
2282 		}
2283 
2284 	} else {
2285 		/*
2286 		 * The caller has allocated the output buffer, so that we
2287 		 * are doing the real encryption/decryption this time.
2288 		 */
2289 		tmplen = *out_len;
2290 		if (encrypt) {
2291 			rv = soft_aes_encrypt_common(&token_session, in,
2292 			    in_len, out, &tmplen, B_TRUE);
2293 			if (rv == CKR_OK) {
2294 				tmplen1 = *out_len - tmplen;
2295 				rv = soft_encrypt_final(&token_session,
2296 				    out+tmplen, &tmplen1);
2297 				*out_len = tmplen + tmplen1;
2298 			}
2299 		} else {
2300 			rv = soft_aes_decrypt_common(&token_session, in,
2301 			    in_len, out, &tmplen, B_TRUE);
2302 			if (rv == CKR_OK) {
2303 				tmplen1 = *out_len - tmplen;
2304 				rv = soft_decrypt_final(&token_session,
2305 				    out+tmplen, &tmplen1);
2306 				*out_len = tmplen + tmplen1;
2307 			}
2308 		}
2309 	}
2310 
2311 	return (rv);
2312 
2313 }
2314 
2315 /*
2316  * Sign/Verify the private token object for checking its data integrity
2317  * when dealing with the keystore.
2318  * This function only applies to the private token object.
2319  */
2320 CK_RV
2321 soft_keystore_hmac(soft_object_t *key_p, boolean_t sign,
2322 	CK_BYTE_PTR in, CK_ULONG in_len, CK_BYTE_PTR out, CK_ULONG_PTR out_len)
2323 {
2324 	CK_MECHANISM mech;
2325 	CK_RV rv;
2326 
2327 	mech.mechanism = CKM_MD5_HMAC;
2328 	mech.pParameter = NULL_PTR;
2329 	mech.ulParameterLen = 0;
2330 
2331 	rv = soft_hmac_sign_verify_init_common(&token_session, &mech,
2332 	    key_p, sign);
2333 
2334 	if (rv != CKR_OK)
2335 		return (rv);
2336 
2337 	if (sign) {
2338 		rv = soft_sign(&token_session, in, in_len, out, out_len);
2339 	} else {
2340 		rv = soft_verify(&token_session, in, in_len, out, *out_len);
2341 	}
2342 
2343 	return (rv);
2344 }
2345