xref: /titanic_41/usr/src/lib/pkcs11/libpkcs11/common/metaObjectManager.c (revision 26fd77009b17f8c8fb32eb362584cfd635e87ad9)
1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License (the "License").
6  * You may not use this file except in compliance with the License.
7  *
8  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9  * or http://www.opensolaris.org/os/licensing.
10  * See the License for the specific language governing permissions
11  * and limitations under the License.
12  *
13  * When distributing Covered Code, include this CDDL HEADER in each
14  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15  * If applicable, add the following below this CDDL HEADER, with the
16  * fields enclosed by brackets "[]" replaced with your own identifying
17  * information: Portions Copyright [yyyy] [name of copyright owner]
18  *
19  * CDDL HEADER END
20  */
21 /*
22  * Copyright 2009 Sun Microsystems, Inc.  All rights reserved.
23  * Use is subject to license terms.
24  */
25 
26 
27 #include <stdlib.h>
28 #include <string.h>
29 #include <strings.h>
30 #include <errno.h>
31 #include <fcntl.h>
32 #include <sys/types.h>
33 #include <sys/stat.h>
34 #include "metaGlobal.h"
35 
36 /* Size of the template for creating key used for wrap/unwrap */
37 #define	WRAP_KEY_TEMPLATE_SIZE	7
38 
39 /*
40  * Information necessary to create keys for C_WrapKey/C_UnwrapKey
41  */
42 typedef struct _wrap_info {
43 	CK_OBJECT_CLASS		class; /* class of the key for wrap/unwrap */
44 	CK_KEY_TYPE		key_type; /* key type of key for wrap/unwrap */
45 	CK_ULONG		key_length; /* length of key */
46 	CK_MECHANISM_TYPE	mech_type; /* mech used for wrap/unwrap */
47 	CK_ULONG		iv_length; /* length of iv for mech */
48 
49 	boolean_t		src_supports;
50 	boolean_t		dst_supports;
51 } wrap_info_t;
52 
53 extern pthread_rwlock_t meta_sessionlist_lock;
54 extern meta_session_t *meta_sessionlist_head;
55 
56 static wrap_info_t common_wrap_info[] = {
57 	{CKO_SECRET_KEY, CKK_AES, 16, CKM_AES_CBC_PAD, 16, B_FALSE, B_FALSE},
58 	{CKO_SECRET_KEY, CKK_DES3, 24, CKM_DES3_CBC_PAD, 8, B_FALSE, B_FALSE},
59 	{CKO_SECRET_KEY, CKK_DES, 8, CKM_DES_CBC_PAD, 8, B_FALSE, B_FALSE},
60 };
61 
62 static unsigned int num_common_wrap_info =
63     sizeof (common_wrap_info) / sizeof (wrap_info_t);
64 
65 static wrap_info_t special_wrap_info[] = {
66 	{CKO_SECRET_KEY, CKK_SKIPJACK, 12,  CKM_SKIPJACK_WRAP, 0,
67 	    B_FALSE, B_FALSE},
68 	{CKO_SECRET_KEY, CKK_BATON, 40, CKM_BATON_WRAP, 0,
69 	    B_FALSE, B_FALSE},
70 	{CKO_SECRET_KEY, CKK_JUNIPER, 40, CKM_JUNIPER_WRAP, 0,
71 	    B_FALSE, B_FALSE},
72 };
73 static unsigned int num_special_wrap_info =
74     sizeof (special_wrap_info) / sizeof (wrap_info_t);
75 
76 static wrap_info_t rsa_wrap_info[] = {
77 	{CKO_PUBLIC_KEY, CKK_RSA, 0,  CKM_RSA_PKCS, 0,
78 	    B_FALSE, B_FALSE},
79 	{CKO_PUBLIC_KEY, CKK_RSA, 0, CKM_RSA_X_509, 0,
80 	    B_FALSE, B_FALSE},
81 };
82 static unsigned int num_rsa_wrap_info =
83     sizeof (rsa_wrap_info) / sizeof (wrap_info_t);
84 
85 
86 static pthread_rwlock_t meta_objectclose_lock;
87 static pthread_rwlock_t tokenobject_list_lock;
88 static meta_object_t *tokenobject_list_head;
89 
90 CK_BBOOL falsevalue = FALSE;
91 CK_BBOOL truevalue = TRUE;
92 
93 /*
94  * Public and private exponent, and Module value for
95  * creating the RSA public/private key.
96  *
97  */
98 static CK_BYTE PubExpo[3] = {0x01, 0x00, 0x01};
99 CK_BYTE PriExpo[128] = {
100 	0x8e, 0xc9, 0x70, 0x57, 0x6b, 0xcd, 0xfb, 0xa9,
101 	0x19, 0xad, 0xcd, 0x91, 0x69, 0xd5, 0x52, 0xec,
102 	0x72, 0x1e, 0x45, 0x15, 0x06, 0xdc, 0x65, 0x2d,
103 	0x98, 0xc4, 0xce, 0x33, 0x54, 0x15, 0x70, 0x8d,
104 	0xfa, 0x65, 0xea, 0x53, 0x44, 0xf3, 0x3e, 0x3f,
105 	0xb4, 0x4c, 0x60, 0xd5, 0x01, 0x2d, 0xa4, 0x12,
106 	0x99, 0xbf, 0x3f, 0x0b, 0xcd, 0xbb, 0x24, 0x10,
107 	0x60, 0x30, 0x5e, 0x58, 0xf8, 0x59, 0xaa, 0xd1,
108 	0x63, 0x3b, 0xbc, 0xcb, 0x94, 0x58, 0x38, 0x24,
109 	0xfc, 0x65, 0x25, 0xc5, 0xa6, 0x51, 0xa2, 0x2e,
110 	0xf1, 0x5e, 0xf5, 0xc1, 0xf5, 0x46, 0xf7, 0xbd,
111 	0xc7, 0x62, 0xa8, 0xe2, 0x27, 0xd6, 0x94, 0x5b,
112 	0xd3, 0xa2, 0xb5, 0x76, 0x42, 0x67, 0x6b, 0x86,
113 	0x91, 0x97, 0x4d, 0x07, 0x92, 0x00, 0x4a, 0xdf,
114 	0x0b, 0x65, 0x64, 0x05, 0x03, 0x48, 0x27, 0xeb,
115 	0xce, 0x9a, 0x49, 0x7f, 0x3e, 0x10, 0xe0, 0x01};
116 
117 static CK_BYTE Modulus[128] = {
118 	0x94, 0x32, 0xb9, 0x12, 0x1d, 0x68, 0x2c, 0xda,
119 	0x2b, 0xe0, 0xe4, 0x97, 0x1b, 0x4d, 0xdc, 0x43,
120 	0xdf, 0x38, 0x6e, 0x7b, 0x9f, 0x07, 0x58, 0xae,
121 	0x9d, 0x82, 0x1e, 0xc7, 0xbc, 0x92, 0xbf, 0xd3,
122 	0xce, 0x00, 0xbb, 0x91, 0xc9, 0x79, 0x06, 0x03,
123 	0x1f, 0xbc, 0x9f, 0x94, 0x75, 0x29, 0x5f, 0xd7,
124 	0xc5, 0xf3, 0x73, 0x8a, 0xa4, 0x35, 0x43, 0x7a,
125 	0x00, 0x32, 0x97, 0x3e, 0x86, 0xef, 0x70, 0x6f,
126 	0x18, 0x56, 0x15, 0xaa, 0x6a, 0x87, 0xe7, 0x8d,
127 	0x7d, 0xdd, 0x1f, 0xa4, 0xe4, 0x31, 0xd4, 0x7a,
128 	0x8c, 0x0e, 0x20, 0xd2, 0x23, 0xf5, 0x57, 0x3c,
129 	0x1b, 0xa8, 0x44, 0xa4, 0x57, 0x8f, 0x33, 0x52,
130 	0xad, 0x83, 0xae, 0x4a, 0x97, 0xa6, 0x1e, 0xa6,
131 	0x2b, 0xfa, 0xea, 0xeb, 0x6e, 0x71, 0xb8, 0xb6,
132 	0x0a, 0x36, 0xed, 0x83, 0xce, 0xb0, 0xdf, 0xc1,
133 	0xd4, 0x3a, 0xe9, 0x99, 0x6f, 0xf3, 0x96, 0xb7};
134 
135 static CK_RV
136 meta_clone_template_setup(meta_object_t *object,
137     const generic_attr_t *attributes, size_t num_attributes);
138 
139 /*
140  * meta_objectManager_initialize
141  *
142  * Called from meta_Initialize.  Initializes all the variables used
143  * by the object manager.
144  */
145 CK_RV
146 meta_objectManager_initialize()
147 {
148 	if (pthread_rwlock_init(&meta_objectclose_lock, NULL) != 0) {
149 		return (CKR_FUNCTION_FAILED);
150 	}
151 
152 	if (pthread_rwlock_init(&tokenobject_list_lock, NULL) != 0) {
153 		(void) pthread_rwlock_destroy(&meta_objectclose_lock);
154 		return (CKR_FUNCTION_FAILED);
155 	}
156 
157 	tokenobject_list_head = NULL;
158 
159 	return (CKR_OK);
160 }
161 
162 void
163 meta_objectManager_finalize()
164 {
165 	/*
166 	 * If there are still any token object in the list, need to
167 	 * deactivate all of them.
168 	 */
169 	(void) meta_token_object_deactivate(ALL_TOKEN);
170 
171 	(void) pthread_rwlock_destroy(&meta_objectclose_lock);
172 	(void) pthread_rwlock_destroy(&tokenobject_list_lock);
173 }
174 
175 
176 
177 /*
178  * meta_handle2object
179  *
180  * Convert a CK_OBJECT_HANDLE to the corresponding metaobject. If
181  * successful, a reader-lock on the object will be held to indicate
182  * that it's in use. Call OBJRELEASE() when finished.
183  *
184  */
185 CK_RV
186 meta_handle2object(CK_OBJECT_HANDLE hObject, meta_object_t **object)
187 {
188 	meta_object_t *tmp_object = (meta_object_t *)(hObject);
189 
190 	/* Check for bad args (eg CK_INVALID_HANDLE, which is 0/NULL). */
191 	if (tmp_object == NULL) {
192 		*object = NULL;
193 		return (CKR_OBJECT_HANDLE_INVALID);
194 	}
195 
196 
197 	/* Lock to ensure the magic-check + read-lock is atomic. */
198 	(void) pthread_rwlock_rdlock(&meta_objectclose_lock);
199 
200 	if (tmp_object->magic_marker != METASLOT_OBJECT_MAGIC) {
201 		(void) pthread_rwlock_unlock(&meta_objectclose_lock);
202 		*object = NULL;
203 		return (CKR_OBJECT_HANDLE_INVALID);
204 	}
205 	(void) pthread_rwlock_rdlock(&tmp_object->object_lock);
206 	(void) pthread_rwlock_unlock(&meta_objectclose_lock);
207 
208 	*object = tmp_object;
209 	return (CKR_OK);
210 }
211 
212 
213 /*
214  * meta_object_alloc
215  *
216  * Creates a new metaobject, but does not yet add it to the object list.
217  * Once the caller has finished initializing the object (by setting
218  * object attributes), meta_object_add should be called. This two-step
219  * process prevents others from seeing the object until fully intitialized.
220  *
221  */
222 CK_RV
223 meta_object_alloc(meta_session_t *session, meta_object_t **object)
224 {
225 	meta_object_t *new_object;
226 	CK_ULONG num_slots;
227 
228 	/* Allocate memory for the object. */
229 	new_object = calloc(1, sizeof (meta_object_t));
230 	if (new_object == NULL)
231 		return (CKR_HOST_MEMORY);
232 
233 	num_slots = meta_slotManager_get_slotcount();
234 
235 	new_object->clones = calloc(num_slots, sizeof (slot_object_t *));
236 	if (new_object->clones == NULL) {
237 		free(new_object);
238 		return (CKR_HOST_MEMORY);
239 	}
240 
241 	new_object->tried_create_clone = calloc(num_slots, sizeof (boolean_t));
242 	if (new_object->tried_create_clone == NULL) {
243 		free(new_object->clones);
244 		free(new_object);
245 		return (CKR_HOST_MEMORY);
246 	}
247 
248 	/* Initialize the object fields. */
249 	new_object->magic_marker = METASLOT_OBJECT_MAGIC;
250 	(void) pthread_rwlock_init(&new_object->object_lock, NULL);
251 	(void) pthread_rwlock_init(&new_object->attribute_lock, NULL);
252 	(void) pthread_mutex_init(&new_object->clone_create_lock, NULL);
253 	(void) pthread_mutex_init(&new_object->isClosingObject_lock, NULL);
254 	new_object->creator_session = session;
255 
256 	*object = new_object;
257 
258 	return (CKR_OK);
259 }
260 
261 
262 /*
263  * meta_object_get_attr
264  *
265  * Get attribute values to fill in attribute values
266  * being kept in the metaslot object.  The following 4 attributes
267  * in the meta_object_t structure will be filled in:
268  * isToken, isPrivate, isSensitive, isExtractable
269  *
270  * It's basically an easy way to do a C_GetAttributeValue.
271  * So, the hSession argument is assumed
272  * to be valid, and the pointer to meta_object_t is also assumed
273  * to be valid.
274  */
275 CK_RV
276 meta_object_get_attr(slot_session_t *slot_session, CK_OBJECT_HANDLE hObject,
277     meta_object_t *object)
278 {
279 	CK_BBOOL is_sensitive = object->isSensitive;
280 	CK_BBOOL is_extractable = object->isExtractable;
281 	CK_BBOOL is_token = B_FALSE, is_private = B_FALSE;
282 	CK_KEY_TYPE keytype;
283 	CK_OBJECT_CLASS class;
284 	CK_ATTRIBUTE attrs[3];
285 	CK_RV rv;
286 	CK_SESSION_HANDLE hSession = slot_session->hSession;
287 	CK_SLOT_ID fw_st_id = slot_session->fw_st_id;
288 	int count = 1;
289 
290 	attrs[0].type = CKA_CLASS;
291 	attrs[0].pValue = &class;
292 	attrs[0].ulValueLen = sizeof (class);
293 
294 	if (object->isFreeObject != FREE_ENABLED) {
295 		attrs[1].type = CKA_TOKEN;
296 		attrs[1].pValue = &is_token;
297 		attrs[1].ulValueLen = sizeof (is_token);
298 		count++;
299 	}
300 
301 	/*
302 	 * If this is a freeobject, we already know the Private value
303 	 * and we don't want to overwrite it with the wrong value
304 	 */
305 	if (object->isFreeObject <= FREE_DISABLED) {
306 		attrs[count].type = CKA_PRIVATE;
307 		attrs[count].pValue = &is_private;
308 		attrs[count].ulValueLen = sizeof (is_private);
309 		count++;
310 	} else
311 		is_private = object->isPrivate;
312 
313 	rv = FUNCLIST(fw_st_id)->C_GetAttributeValue(hSession, hObject,
314 	    attrs, count);
315 	if (rv != CKR_OK) {
316 		return (rv);
317 	}
318 
319 	count = 0;
320 	switch (class) {
321 	case CKO_PRIVATE_KEY:
322 	case CKO_SECRET_KEY:
323 		/* Only need to check these for private & secret keys */
324 		attrs[0].type = CKA_EXTRACTABLE;
325 		attrs[0].pValue = &is_extractable;
326 		attrs[0].ulValueLen = sizeof (is_extractable);
327 		count = 1;
328 
329 		/*
330 		 * If this is a freeobject, we already know the Sensitive
331 		 * value and we don't want to overwrite it with the wrong
332 		 * value.
333 		 */
334 
335 		if (object->isFreeObject <= FREE_DISABLED) {
336 			attrs[1].type = CKA_SENSITIVE;
337 			attrs[1].pValue = &is_sensitive;
338 			attrs[1].ulValueLen = sizeof (is_sensitive);
339 			count = 2;
340 
341 			/*
342 			 * We only need the key type if this is the first
343 			 * time we've looked at the object
344 			 */
345 			if (object->isFreeObject == FREE_UNCHECKED) {
346 				attrs[2].type = CKA_KEY_TYPE;
347 				attrs[2].pValue = &keytype;
348 				attrs[2].ulValueLen = sizeof (keytype);
349 				count = 3;
350 			}
351 		}
352 
353 		break;
354 
355 	case CKO_PUBLIC_KEY:
356 		if (object->isFreeObject == FREE_UNCHECKED) {
357 			attrs[count].type = CKA_KEY_TYPE;
358 			attrs[count].pValue = &keytype;
359 			attrs[count].ulValueLen = sizeof (keytype);
360 			count++;
361 		}
362 		is_sensitive = CK_FALSE;
363 		is_extractable = CK_TRUE;
364 		break;
365 
366 	default:
367 		object->isFreeObject = FREE_DISABLED;
368 		is_sensitive = CK_FALSE;
369 		is_extractable = CK_TRUE;
370 	};
371 
372 	if (count > 0) {
373 		rv = FUNCLIST(fw_st_id)->C_GetAttributeValue(hSession, hObject,
374 		    attrs, count);
375 		if (rv != CKR_OK) {
376 			return (rv);
377 		}
378 
379 		if (object->isFreeObject == FREE_UNCHECKED) {
380 			if (keytype == CKK_EC || keytype == CKK_RSA ||
381 			    keytype == CKK_DH) {
382 				if (metaslot_config.auto_key_migrate) {
383 					object->isFreeObject = FREE_DISABLED;
384 					object->isFreeToken = FREE_DISABLED;
385 				}
386 
387 				object->isFreeObject = FREE_ENABLED;
388 				if (is_token)
389 					object->isFreeToken = FREE_ENABLED;
390 			} else
391 				object->isFreeObject = FREE_DISABLED;
392 
393 		}
394 
395 	}
396 
397 	object->isToken = is_token;
398 	object->isPrivate = is_private;
399 	object->isSensitive = is_sensitive;
400 	object->isExtractable = is_extractable;
401 
402 	return (CKR_OK);
403 }
404 
405 
406 /*
407  * meta_object_activate
408  *
409  * Add a new metaobject to the list of objects. See also meta_object_create,
410  * which would be called to create an object before it is added.
411  */
412 void
413 meta_object_activate(meta_object_t *new_object)
414 {
415 	pthread_rwlock_t *list_lock;
416 	meta_object_t **list_head;
417 
418 	/*
419 	 * For session objects, we keep the list in the session that created
420 	 * this object, because this object will be destroyed when that session
421 	 * is closed.
422 	 *
423 	 * For token objects, the list is global (ie, not associated with any
424 	 * particular session).
425 	 */
426 	if (new_object->isToken) {
427 		list_lock = &tokenobject_list_lock;
428 		list_head = &tokenobject_list_head;
429 	} else {
430 		list_lock = &new_object->creator_session->object_list_lock;
431 		list_head = &new_object->creator_session->object_list_head;
432 	}
433 
434 	/* Add object to the list of objects. */
435 	(void) pthread_rwlock_wrlock(list_lock);
436 	INSERT_INTO_LIST(*list_head, new_object);
437 	(void) pthread_rwlock_unlock(list_lock);
438 }
439 
440 
441 /*
442  * meta_object_deactivate
443  *
444  * Removes the object from the list of valid meta objects.  Note
445  * that this function does not clean up any allocated
446  * resources (memory, object clones, etc).   Cleaning up of
447  * allocated resources is done by calling the meta_object_dealloc()
448  *
449  */
450 CK_RV
451 meta_object_deactivate(meta_object_t *object, boolean_t have_list_lock,
452     boolean_t have_object_lock)
453 {
454 	pthread_rwlock_t *list_lock;
455 	meta_object_t **list_head;
456 
457 	if (!have_object_lock) {
458 		(void) pthread_rwlock_rdlock(&object->object_lock);
459 	}
460 
461 	(void) pthread_mutex_lock(&object->isClosingObject_lock);
462 	if (object->isClosingObject) {
463 		/* Lost a delete race. */
464 		(void) pthread_mutex_unlock(&object->isClosingObject_lock);
465 		OBJRELEASE(object);
466 		return (CKR_OBJECT_HANDLE_INVALID);
467 	}
468 	object->isClosingObject = B_TRUE;
469 	(void) pthread_mutex_unlock(&object->isClosingObject_lock);
470 
471 	if (object->isToken || (object->isFreeToken == FREE_ENABLED)) {
472 		list_lock = &tokenobject_list_lock;
473 		list_head = &tokenobject_list_head;
474 	} else {
475 		list_lock = &object->creator_session->object_list_lock;
476 		list_head = &object->creator_session->object_list_head;
477 	}
478 
479 	/*
480 	 * Remove object from the object list. Once removed, it will not
481 	 * be possible for another thread to begin using the object.
482 	 */
483 	(void) pthread_rwlock_wrlock(&meta_objectclose_lock);
484 	if (!have_list_lock) {
485 		(void) pthread_rwlock_wrlock(list_lock);
486 	}
487 
488 
489 	object->magic_marker = METASLOT_OBJECT_BADMAGIC;
490 	/*
491 	 * Can't use the regular REMOVE_FROM_LIST() function because
492 	 * that will miss the "error cleanup" situation where object is not yet
493 	 * in the list (object->next == NULL && object->prev == NULL)
494 	 */
495 	if (*list_head == object) {
496 		/* Object is the first one in the list */
497 		if (object->next) {
498 			*list_head = object->next;
499 			object->next->prev = NULL;
500 		} else {
501 			/* Object is the only one in the list */
502 			*list_head = NULL;
503 		}
504 	} else if (object->next != NULL || object->prev != NULL) {
505 		if (object->next) {
506 			object->prev->next = object->next;
507 			object->next->prev = object->prev;
508 		} else {
509 			/* Object is the last one in the list */
510 			object->prev->next = NULL;
511 		}
512 	}
513 
514 	if (!have_list_lock) {
515 		(void) pthread_rwlock_unlock(list_lock);
516 	}
517 	(void) pthread_rwlock_unlock(&meta_objectclose_lock);
518 
519 	/*
520 	 * Wait for anyone already using object to finish, by obtaining
521 	 * a writer-lock (need to release our reader-lock first). Once we
522 	 * get the write lock, we can just release it and finish cleaning
523 	 * up the object.
524 	 */
525 	(void) pthread_rwlock_unlock(&object->object_lock); /* rdlock */
526 	(void) pthread_rwlock_wrlock(&object->object_lock);
527 	(void) pthread_rwlock_unlock(&object->object_lock); /* wrlock */
528 
529 
530 	return (CKR_OK);
531 }
532 
533 
534 /*
535  * meta_object_dealloc
536  *
537  * Performs final object cleanup, releasing any allocated memory and
538  * destroying any clones on other slots. Caller is assumed to have
539  * called meta_object_deactivate() before this function.
540  *
541  * Caller is assumed to have only reference to object, but should have
542  * released any lock.
543  *
544  * If "nukeSourceObj" argument is true, we will actually delete the
545  * object from the underlying slot.
546  */
547 CK_RV
548 meta_object_dealloc(meta_session_t *session, meta_object_t *object,
549     boolean_t nukeSourceObj)
550 {
551 	CK_RV rv, save_rv = CKR_OK;
552 	CK_ULONG slotnum, num_slots;
553 	CK_ULONG i;
554 
555 	/* First, delete all the clones of this object on other slots. */
556 	num_slots = meta_slotManager_get_slotcount();
557 	for (slotnum = 0; slotnum < num_slots; slotnum++) {
558 		slot_session_t *obj_session;
559 		slot_object_t *clone;
560 
561 		clone = object->clones[slotnum];
562 		if (clone == NULL)
563 			continue;
564 		if (nukeSourceObj || (!object->isToken &&
565 		    !(object->isFreeToken == FREE_ENABLED &&
566 		    get_keystore_slotnum() == slotnum))) {
567 
568 			rv = meta_get_slot_session(slotnum, &obj_session,
569 			    (session == NULL) ?
570 			    object->creator_session->session_flags :
571 			    session->session_flags);
572 
573 			if (rv == CKR_OK) {
574 				rv = FUNCLIST(obj_session->fw_st_id)->\
575 				    C_DestroyObject(obj_session->hSession,
576 				    clone->hObject);
577 
578 				meta_release_slot_session(obj_session);
579 				if ((rv != CKR_OK) && (save_rv == CKR_OK)) {
580 					save_rv = rv;
581 				}
582 			}
583 
584 		}
585 
586 		meta_slot_object_deactivate(clone);
587 		meta_slot_object_dealloc(clone);
588 
589 		object->clones[slotnum] = NULL;
590 	}
591 
592 	/* Now erase and delete any attributes in the metaobject. */
593 	dealloc_attributes(object->attributes, object->num_attributes);
594 
595 	free(object->clones);
596 	free(object->tried_create_clone);
597 
598 	if (object->clone_template) {
599 		for (i = 0; i < object->clone_template_size; i++) {
600 			free(((object->clone_template)[i]).pValue);
601 		}
602 		free(object->clone_template);
603 	}
604 
605 	/* Cleanup remaining object fields. */
606 	(void) pthread_rwlock_destroy(&object->object_lock);
607 	(void) pthread_rwlock_destroy(&object->attribute_lock);
608 	(void) pthread_mutex_destroy(&object->isClosingObject_lock);
609 	(void) pthread_mutex_destroy(&object->clone_create_lock);
610 
611 	meta_object_delay_free(object);
612 
613 	return (save_rv);
614 }
615 
616 
617 /*
618  * meta_slot_object_alloc
619  */
620 CK_RV
621 meta_slot_object_alloc(slot_object_t **object) {
622 	slot_object_t *new_object;
623 
624 	new_object = calloc(1, sizeof (slot_object_t));
625 	if (new_object == NULL)
626 		return (CKR_HOST_MEMORY);
627 
628 	*object = new_object;
629 	return (CKR_OK);
630 }
631 
632 
633 /*
634  * meta_slot_object_activate
635  */
636 void
637 meta_slot_object_activate(slot_object_t *object,
638 	slot_session_t *creator_session, boolean_t isToken)
639 {
640 	object->creator_session = creator_session;
641 
642 	if (isToken) {
643 		extern slot_data_t *slots;
644 		slot_data_t *slot;
645 
646 		slot = &(slots[object->creator_session->slotnum]);
647 
648 		(void) pthread_rwlock_wrlock(&slot->tokenobject_list_lock);
649 		INSERT_INTO_LIST(slot->tokenobject_list_head, object);
650 		(void) pthread_rwlock_unlock(&slot->tokenobject_list_lock);
651 	} else {
652 		slot_session_t *session = object->creator_session;
653 
654 		/* Add to session's list of session objects. */
655 		(void) pthread_rwlock_wrlock(&session->object_list_lock);
656 		INSERT_INTO_LIST(session->object_list_head, object);
657 		(void) pthread_rwlock_unlock(&session->object_list_lock);
658 	}
659 
660 	/*
661 	 * This set tells the slot object that we are in the token list,
662 	 * but does not cause harm with the metaobject knowing the object
663 	 * isn't a token, but a freetoken
664 	 */
665 
666 	object->isToken = isToken;
667 }
668 
669 
670 /*
671  * meta_slot_object_deactivate
672  *
673  * Remove the specified slot object from the appropriate object list.
674  */
675 void
676 meta_slot_object_deactivate(slot_object_t *object)
677 {
678 	slot_object_t **list_head;
679 	pthread_rwlock_t *list_lock;
680 
681 	if (object->isToken) {
682 		extern slot_data_t *slots;
683 		slot_data_t *slot;
684 
685 		slot = &(slots[object->creator_session->slotnum]);
686 
687 		list_head = &slot->tokenobject_list_head;
688 		list_lock = &slot->tokenobject_list_lock;
689 	} else {
690 		list_head = &object->creator_session->object_list_head;
691 		list_lock = &object->creator_session->object_list_lock;
692 	}
693 
694 	(void) pthread_rwlock_wrlock(list_lock);
695 	REMOVE_FROM_LIST(*list_head, object);
696 	(void) pthread_rwlock_unlock(list_lock);
697 }
698 
699 
700 /*
701  * meta_slot_object_dealloc
702  */
703 void
704 meta_slot_object_dealloc(slot_object_t *object)
705 {
706 	/* Not much cleanup for slot objects, unlike meta objects... */
707 	free(object);
708 }
709 
710 
711 /*
712  * meta_object_copyin
713  *
714  * When a key is generated/derived/unwrapped, the attribute values
715  * created by the token are not immediately read into our copy of the
716  * attributes. We defer this work until we actually need to know.
717  */
718 CK_RV
719 meta_object_copyin(meta_object_t *object)
720 {
721 	CK_RV rv = CKR_OK;
722 	slot_session_t *session = NULL;
723 	CK_ATTRIBUTE *attrs = NULL, *attrs_with_val = NULL;
724 	slot_object_t *slot_object = NULL;
725 	CK_ULONG num_attrs = 0, i, num_attrs_with_val;
726 	CK_SESSION_HANDLE hSession;
727 	CK_SLOT_ID fw_st_id;
728 
729 	/* Make sure no one else is looking at attributes. */
730 	(void) pthread_rwlock_wrlock(&object->attribute_lock);
731 
732 	/* Did we just lose a copyin race with another thread */
733 	if (object->attributes != NULL) {
734 		goto finish;
735 	}
736 
737 	slot_object = object->clones[object->master_clone_slotnum];
738 
739 	rv = meta_get_slot_session(object->master_clone_slotnum, &session,
740 	    object->creator_session->session_flags);
741 	if (rv != CKR_OK) {
742 		goto finish;
743 	}
744 
745 	/*
746 	 * first, get the master template of all the attributes
747 	 * for this object
748 	 */
749 	rv = get_master_attributes_by_object(session, slot_object,
750 	    &(object->attributes), &(object->num_attributes));
751 	if (rv != CKR_OK) {
752 		goto finish;
753 	}
754 
755 	/*
756 	 * Get value for each attribute items.
757 	 *
758 	 * Some attributes are required by the given object type.
759 	 * Some are optional.  Get all the values first, and then
760 	 * make sure we have value for all required values,
761 	 */
762 	attrs = calloc(object->num_attributes, sizeof (CK_ATTRIBUTE));
763 	if (attrs == NULL) {
764 		rv = CKR_HOST_MEMORY;
765 		goto finish;
766 	}
767 
768 
769 	for (i = 0; i < object->num_attributes; i++) {
770 		attrs[i].type =
771 		    ((object->attributes[i]).attribute).type;
772 	}
773 	num_attrs = object->num_attributes;
774 
775 	hSession = session->hSession;
776 	fw_st_id = session->fw_st_id;
777 
778 	/* first, call C_GetAttributeValue() to get size for each attribute */
779 	rv = FUNCLIST(fw_st_id)->C_GetAttributeValue(hSession,
780 	    slot_object->hObject, attrs, num_attrs);
781 	/*
782 	 * If the return value is not CKR_OK, allow it to be
783 	 * CKR_ATTRIBUTE_TYPE_INVALID for now.
784 	 * Some attributes defined in PKCS#11 version 2.11
785 	 * might not be defined in earlier versions.  We will
786 	 * TRY to work with those providers if the attribute
787 	 * is optional.
788 	 */
789 	if ((rv != CKR_OK) && (rv != CKR_ATTRIBUTE_TYPE_INVALID)) {
790 		rv = CKR_FUNCTION_FAILED; /* make sure rv is appropriate */
791 		goto finish;
792 	}
793 
794 	/*
795 	 * allocate space.
796 	 * Since we don't know how many attributes have
797 	 * values at this time, just assume all of them
798 	 * have values so we save one loop to count the number
799 	 * of attributes that have value.
800 	 */
801 	attrs_with_val = calloc(num_attrs, sizeof (CK_ATTRIBUTE));
802 	if (attrs_with_val == NULL) {
803 		rv = CKR_HOST_MEMORY;
804 		goto finish;
805 	}
806 
807 
808 	num_attrs_with_val = 0;
809 	for (i = 0; i < num_attrs; i++) {
810 		if (!(((CK_LONG)(attrs[i].ulValueLen)) > 0)) {
811 			/* if it isn't an optional attr, len should be > 0 */
812 			if (!object->attributes[i].canBeEmptyValue) {
813 				rv = CKR_FUNCTION_FAILED;
814 				goto finish;
815 			}
816 		} else {
817 			attrs_with_val[num_attrs_with_val].type = attrs[i].type;
818 			attrs_with_val[num_attrs_with_val].ulValueLen =
819 			    attrs[i].ulValueLen;
820 			attrs_with_val[num_attrs_with_val].pValue =
821 			    malloc(attrs[i].ulValueLen);
822 			if (attrs_with_val[num_attrs_with_val].pValue == NULL) {
823 				rv = CKR_HOST_MEMORY;
824 				goto finish;
825 			}
826 			num_attrs_with_val++;
827 		}
828 	}
829 
830 	rv = FUNCLIST(fw_st_id)->C_GetAttributeValue(hSession,
831 	    slot_object->hObject, attrs_with_val, num_attrs_with_val);
832 	if (rv != CKR_OK) {
833 		goto finish;
834 	}
835 
836 	/* store these values into the meta object */
837 	for (i = 0; i < num_attrs_with_val; i++) {
838 		rv = attribute_set_value(&(attrs_with_val[i]),
839 		    object->attributes, object->num_attributes);
840 		if (rv != CKR_OK) {
841 			goto finish;
842 		}
843 	}
844 
845 finish:
846 	(void) pthread_rwlock_unlock(&object->attribute_lock);
847 
848 	if (session)
849 		meta_release_slot_session(session);
850 
851 	if (attrs) {
852 		for (i = 0; i < num_attrs; i++) {
853 			if (attrs[i].pValue != NULL) {
854 				free(attrs[i].pValue);
855 			}
856 		}
857 		free(attrs);
858 	}
859 
860 	if (attrs_with_val) {
861 		for (i = 0; i < num_attrs; i++) {
862 			if (attrs_with_val[i].pValue != NULL) {
863 				free(attrs_with_val[i].pValue);
864 			}
865 		}
866 		free(attrs_with_val);
867 	}
868 	return (rv);
869 }
870 
871 /*
872  * Create an object to be used for wrapping and unwrapping.
873  * The same template will be used for all wrapping/unwrapping keys all
874  * the time
875  */
876 
877 static CK_RV
878 create_wrap_unwrap_key(slot_session_t *slot_session, CK_OBJECT_HANDLE *hObject,
879     wrap_info_t *wrap_info, char *key_data, CK_ULONG key_len)
880 {
881 
882 	CK_OBJECT_CLASS objclass;
883 	CK_KEY_TYPE keytype;
884 	CK_RV rv = CKR_OK;
885 	int i;
886 	CK_ATTRIBUTE template[WRAP_KEY_TEMPLATE_SIZE];
887 
888 	i = 0;
889 	objclass = wrap_info->class;
890 	template[i].type = CKA_CLASS;
891 	template[i].pValue = &objclass;
892 	template[i].ulValueLen = sizeof (objclass);
893 
894 	i++;
895 	keytype = wrap_info->key_type;
896 	template[i].type = CKA_KEY_TYPE;
897 	template[i].pValue = &keytype;
898 	template[i].ulValueLen = sizeof (keytype);
899 
900 	i++;
901 	template[i].type = CKA_TOKEN;
902 	template[i].pValue = &falsevalue;
903 	template[i].ulValueLen = sizeof (falsevalue);
904 
905 
906 	if (objclass == CKO_SECRET_KEY) {
907 		i++;
908 		template[i].type = CKA_VALUE;
909 		template[i].pValue = key_data;
910 		template[i].ulValueLen = key_len;
911 
912 		i++;
913 		template[i].type = CKA_WRAP;
914 		template[i].pValue = &truevalue;
915 		template[i].ulValueLen = sizeof (truevalue);
916 
917 		i++;
918 		template[i].type = CKA_UNWRAP;
919 		template[i].pValue = &truevalue;
920 		template[i].ulValueLen = sizeof (truevalue);
921 	} else {
922 		/* Modulus is the same for rsa public and private key */
923 		i++;
924 		template[i].type = CKA_MODULUS;
925 		template[i].pValue = Modulus;
926 		template[i].ulValueLen = sizeof (Modulus);
927 
928 		if (objclass == CKO_PUBLIC_KEY) {
929 			/* RSA public key */
930 			i++;
931 			template[i].type = CKA_PUBLIC_EXPONENT;
932 			template[i].pValue = PubExpo;
933 			template[i].ulValueLen = sizeof (PubExpo);
934 
935 			i++;
936 			template[i].type = CKA_WRAP;
937 			template[i].pValue = &truevalue;
938 			template[i].ulValueLen = sizeof (truevalue);
939 		} else {
940 			/* RSA private key */
941 			i++;
942 			template[i].type = CKA_PRIVATE_EXPONENT;
943 			template[i].pValue = PriExpo;
944 			template[i].ulValueLen = sizeof (PriExpo);
945 
946 			i++;
947 			template[i].type = CKA_UNWRAP;
948 			template[i].pValue = &truevalue;
949 			template[i].ulValueLen = sizeof (truevalue);
950 		}
951 	}
952 
953 	rv = FUNCLIST(slot_session->fw_st_id)->C_CreateObject(
954 	    slot_session->hSession, template, i + 1, hObject);
955 
956 	return (rv);
957 }
958 
959 
960 /*
961  * Create a clone of a non-sensitive and extractable object.
962  * If the template required for creating the clone doesn't exist,
963  * it will be retrieved from the master clone.
964  */
965 static CK_RV
966 clone_by_create(meta_object_t *object, slot_object_t *new_clone,
967     slot_session_t *dst_slot_session)
968 {
969 	CK_RV rv;
970 	int free_token_index = -1;
971 
972 	if (object->attributes == NULL) {
973 		rv = meta_object_copyin(object);
974 		if (rv != CKR_OK) {
975 			return (rv);
976 		}
977 	}
978 
979 	if (object->clone_template == NULL) {
980 		rv = meta_clone_template_setup(object, object->attributes,
981 		    object->num_attributes);
982 		if (rv != CKR_OK) {
983 			return (rv);
984 		}
985 	}
986 
987 	if (object->isFreeToken == FREE_ENABLED) {
988 		if (dst_slot_session->slotnum == get_keystore_slotnum())
989 			free_token_index = set_template_boolean(CKA_TOKEN,
990 			    object->clone_template,
991 			    object->clone_template_size, B_FALSE, &truevalue);
992 		else
993 			free_token_index = set_template_boolean(CKA_TOKEN,
994 			    object->clone_template,
995 			    object->clone_template_size, B_FALSE, &falsevalue);
996 	}
997 
998 	/* Create the clone... */
999 	rv = FUNCLIST(dst_slot_session->fw_st_id)->C_CreateObject(
1000 	    dst_slot_session->hSession, object->clone_template,
1001 	    object->clone_template_size, &(new_clone->hObject));
1002 
1003 	if (free_token_index != -1) {
1004 			free_token_index = set_template_boolean(CKA_TOKEN,
1005 			    object->clone_template, object->clone_template_size,
1006 			    B_FALSE, &falsevalue);
1007 	}
1008 
1009 	if (rv != CKR_OK) {
1010 		return (rv);
1011 	}
1012 
1013 	return (CKR_OK);
1014 }
1015 
1016 /*
1017  * Goes through the list of wraping mechanisms, and returns the first
1018  * one that is supported by both the source and the destination slot.
1019  * If none of the mechanisms are supported by both slot, return the
1020  * first mechanism that's supported by the source slot
1021  */
1022 static CK_RV
1023 find_best_match_wrap_mech(wrap_info_t *wrap_info, int num_info,
1024 	CK_ULONG src_slotnum, CK_ULONG dst_slotnum, int *first_both_mech,
1025 	int *first_src_mech)
1026 {
1027 
1028 	int i;
1029 	boolean_t src_supports, dst_supports;
1030 	CK_RV rv;
1031 	CK_MECHANISM_INFO mech_info;
1032 
1033 	mech_info.flags = CKF_WRAP;
1034 
1035 	for (i = 0; i < num_info; i++) {
1036 		src_supports = B_FALSE;
1037 		dst_supports = B_FALSE;
1038 
1039 		rv = meta_mechManager_slot_supports_mech(
1040 		    (wrap_info[i]).mech_type, src_slotnum,
1041 		    &src_supports, NULL, B_FALSE, &mech_info);
1042 		if (rv != CKR_OK) {
1043 			return (rv);
1044 		}
1045 
1046 		rv = meta_mechManager_slot_supports_mech(
1047 		    (wrap_info[i]).mech_type, dst_slotnum,
1048 		    &dst_supports, NULL, B_FALSE, &mech_info);
1049 		if (rv != CKR_OK) {
1050 			return (rv);
1051 		}
1052 
1053 		/* both source and destination supports the mech */
1054 		if ((src_supports) && (dst_supports)) {
1055 			*first_both_mech = i;
1056 			return (CKR_OK);
1057 		}
1058 
1059 		if ((src_supports) && (*first_src_mech == -1)) {
1060 			*first_src_mech = i;
1061 		}
1062 	}
1063 	return (CKR_OK);
1064 }
1065 
1066 /*
1067  * Determine the wrapping/unwrapping mechanism to be used
1068  *
1069  * If possible, select a mechanism that's supported by both source
1070  * and destination slot.  If none of the mechanisms are supported
1071  * by both slot, then, select the first one supported by
1072  * the source slot.
1073  */
1074 
1075 static CK_RV
1076 get_wrap_mechanism(CK_OBJECT_CLASS obj_class, CK_KEY_TYPE key_type,
1077     CK_ULONG src_slotnum, CK_ULONG dst_slotnum, wrap_info_t *wrap_info)
1078 {
1079 	wrap_info_t *wrap_info_to_search = NULL;
1080 	unsigned int num_wrap_info;
1081 	CK_RV rv;
1082 	int i;
1083 	boolean_t src_supports = B_FALSE, dst_supports = B_FALSE;
1084 	int first_src_mech, rsa_first_src_mech, first_both_mech;
1085 	CK_MECHANISM_INFO mech_info;
1086 
1087 	mech_info.flags = CKF_WRAP;
1088 
1089 	if ((obj_class == CKO_PRIVATE_KEY) && (key_type == CKK_KEA)) {
1090 		/*
1091 		 * only SKIPJACK keys can be used for wrapping
1092 		 * KEA private keys
1093 		 */
1094 
1095 		for (i = 0; i < num_special_wrap_info; i++) {
1096 			if ((special_wrap_info[i]).mech_type
1097 			    != CKM_SKIPJACK_WRAP) {
1098 				continue;
1099 			}
1100 
1101 			src_supports = B_FALSE;
1102 			dst_supports = B_FALSE;
1103 
1104 			rv = meta_mechManager_slot_supports_mech(
1105 			    (special_wrap_info[i]).mech_type, src_slotnum,
1106 			    &src_supports, NULL, B_FALSE, &mech_info);
1107 			if (rv != CKR_OK) {
1108 				goto finish;
1109 			}
1110 
1111 			rv = meta_mechManager_slot_supports_mech(
1112 			    (special_wrap_info[i]).mech_type, dst_slotnum,
1113 			    &dst_supports, NULL, B_FALSE, &mech_info);
1114 			if (rv != CKR_OK) {
1115 				goto finish;
1116 			}
1117 
1118 			if (src_supports) {
1119 				/*
1120 				 * both src and dst supports the mech or
1121 				 * only the src supports the mech
1122 				 */
1123 				(void) memcpy(wrap_info,
1124 				    &(special_wrap_info[i]),
1125 				    sizeof (wrap_info_t));
1126 
1127 				wrap_info->src_supports = src_supports;
1128 				wrap_info->dst_supports = dst_supports;
1129 				rv = CKR_OK;
1130 				goto finish;
1131 			}
1132 
1133 		}
1134 
1135 		/*
1136 		 * if we are here, that means neither the source slot
1137 		 * nor the destination slots suppports CKM_SKIPJACK_WRAP
1138 		 */
1139 		rv = CKR_FUNCTION_FAILED;
1140 		goto finish;
1141 	}
1142 
1143 	if ((key_type == CKK_SKIPJACK) || (key_type == CKK_BATON) ||
1144 	    (key_type == CKK_JUNIPER)) {
1145 		/* special key types */
1146 		wrap_info_to_search = special_wrap_info;
1147 		num_wrap_info = num_special_wrap_info;
1148 	} else {
1149 		/* use the regular wrapping mechanisms */
1150 		wrap_info_to_search = common_wrap_info;
1151 		num_wrap_info = num_common_wrap_info;
1152 	}
1153 
1154 	first_both_mech = -1;
1155 	first_src_mech = -1;
1156 
1157 	rv = find_best_match_wrap_mech(wrap_info_to_search, num_wrap_info,
1158 	    src_slotnum, dst_slotnum, &first_both_mech, &first_src_mech);
1159 	if (rv != CKR_OK) {
1160 		goto finish;
1161 	}
1162 
1163 	if (first_both_mech != -1) {
1164 		(void) memcpy(wrap_info,
1165 		    &(wrap_info_to_search[first_both_mech]),
1166 		    sizeof (wrap_info_t));
1167 
1168 		wrap_info->src_supports = B_TRUE;
1169 		wrap_info->dst_supports = B_TRUE;
1170 		rv = CKR_OK;
1171 		goto finish;
1172 	}
1173 
1174 	/*
1175 	 * If we are here, we did not find a mechanism that's supported
1176 	 * by both source and destination slot.
1177 	 *
1178 	 * If it is a secret key, can also try to wrap it with
1179 	 * a RSA public key
1180 	 */
1181 	if (obj_class == CKO_SECRET_KEY) {
1182 		first_both_mech = -1;
1183 		rsa_first_src_mech = -1;
1184 
1185 		rv = find_best_match_wrap_mech(rsa_wrap_info,
1186 		    num_rsa_wrap_info, src_slotnum, dst_slotnum,
1187 		    &first_both_mech, &rsa_first_src_mech);
1188 
1189 		if (rv != CKR_OK) {
1190 			goto finish;
1191 		}
1192 
1193 		if (first_both_mech > -1) {
1194 			(void) memcpy(wrap_info,
1195 			    &(rsa_wrap_info[first_both_mech]),
1196 			    sizeof (wrap_info_t));
1197 
1198 			wrap_info->src_supports = B_TRUE;
1199 			wrap_info->dst_supports = B_TRUE;
1200 			rv = CKR_OK;
1201 			goto finish;
1202 		}
1203 	}
1204 
1205 	/*
1206 	 * if we are here, that means none of the mechanisms are supported
1207 	 * by both the source and the destination
1208 	 */
1209 	if (first_src_mech > -1) {
1210 		/* source slot support one of the secret key mechs */
1211 		(void) memcpy(wrap_info,
1212 		    &(wrap_info_to_search[first_src_mech]),
1213 		    sizeof (wrap_info_t));
1214 		wrap_info->src_supports = B_TRUE;
1215 		wrap_info->dst_supports = B_FALSE;
1216 		rv = CKR_OK;
1217 	} else if (rsa_first_src_mech > -1) {
1218 		/* source slot support one of the RSA mechs */
1219 		(void) memcpy(wrap_info, &(rsa_wrap_info[rsa_first_src_mech]),
1220 		    sizeof (wrap_info_t));
1221 
1222 		wrap_info->src_supports = B_TRUE;
1223 		wrap_info->dst_supports = B_FALSE;
1224 		rv = CKR_OK;
1225 	} else {
1226 		/* neither source nor destination support any wrap mechs */
1227 		rv = CKR_FUNCTION_FAILED;
1228 	}
1229 
1230 finish:
1231 	return (rv);
1232 }
1233 
1234 
1235 /*
1236  * This is called if the object to be cloned is a sensitive object
1237  */
1238 static CK_RV
1239 clone_by_wrap(meta_object_t *object, slot_object_t *new_clone,
1240     slot_session_t *dst_slot_session)
1241 {
1242 	slot_session_t *src_slot_session = NULL;
1243 	CK_OBJECT_HANDLE wrappingKey = NULL, unwrappingKey = NULL;
1244 	CK_MECHANISM wrappingMech;
1245 	CK_BYTE *wrappedKey = NULL;
1246 	CK_ULONG wrappedKeyLen = 0;
1247 	slot_object_t *slot_object = NULL;
1248 	CK_RV rv = CKR_OK;
1249 	CK_OBJECT_HANDLE unwrapped_obj;
1250 	meta_object_t *tmp_meta_obj = NULL;
1251 	slot_object_t *tmp_slot_obj = NULL;
1252 	CK_OBJECT_CLASS obj_class;
1253 	CK_KEY_TYPE key_type;
1254 	meta_session_t *tmp_meta_session = NULL;
1255 	CK_ATTRIBUTE unwrap_template[4];
1256 	char key_data[1024]; /* should be big enough for any key size */
1257 	char ivbuf[1024]; /* should be big enough for any mech */
1258 	wrap_info_t wrap_info;
1259 	CK_ULONG key_len, unwrap_template_size;
1260 
1261 	slot_object = object->clones[object->master_clone_slotnum];
1262 
1263 	rv = meta_get_slot_session(object->master_clone_slotnum,
1264 	    &src_slot_session, object->creator_session->session_flags);
1265 	if (rv != CKR_OK) {
1266 		return (rv);
1267 	}
1268 
1269 	/*
1270 	 * get the object class and key type for unwrap template
1271 	 * This information will also be used for determining
1272 	 * which wrap mechanism and which key to use for
1273 	 * doing the wrapping
1274 	 */
1275 	unwrap_template[0].type = CKA_CLASS;
1276 	unwrap_template[0].pValue = &obj_class;
1277 	unwrap_template[0].ulValueLen = sizeof (obj_class);
1278 
1279 	unwrap_template[1].type = CKA_KEY_TYPE;
1280 	unwrap_template[1].pValue = &key_type;
1281 	unwrap_template[1].ulValueLen = sizeof (key_type);
1282 
1283 	rv = FUNCLIST(src_slot_session->fw_st_id)->C_GetAttributeValue(
1284 	    src_slot_session->hSession, slot_object->hObject,
1285 	    unwrap_template, 2);
1286 	if (rv != CKR_OK) {
1287 		goto finish;
1288 	}
1289 
1290 	rv = get_wrap_mechanism(obj_class, key_type, src_slot_session->slotnum,
1291 	    dst_slot_session->slotnum, &wrap_info);
1292 	if (rv != CKR_OK) {
1293 		goto finish;
1294 	}
1295 
1296 	/*
1297 	 * read number of bytes required from random device for
1298 	 * creating a secret key for wrapping and unwrapping
1299 	 */
1300 	if (wrap_info.class == CKO_SECRET_KEY) {
1301 
1302 		/*
1303 		 * /dev/urandom will be used for generating the key used
1304 		 * for doing the wrap/unwrap.  It's should be ok to
1305 		 * use /dev/urandom because this key is used for this
1306 		 * one time operation only.  It doesn't need to be stored.
1307 		 */
1308 		key_len = wrap_info.key_length;
1309 		if (pkcs11_get_urandom(key_data, key_len) < 0) {
1310 			rv = CKR_FUNCTION_FAILED;
1311 			goto finish;
1312 		}
1313 
1314 		if (wrap_info.iv_length > 0) {
1315 			if (pkcs11_get_urandom(
1316 			    ivbuf, wrap_info.iv_length) < 0) {
1317 				rv = CKR_FUNCTION_FAILED;
1318 				goto finish;
1319 			}
1320 		}
1321 	}
1322 
1323 	/* create the wrapping key */
1324 	rv = create_wrap_unwrap_key(src_slot_session, &wrappingKey,
1325 	    &wrap_info, key_data, key_len);
1326 	if (rv != CKR_OK) {
1327 		goto finish;
1328 	}
1329 
1330 	wrappingMech.mechanism = wrap_info.mech_type;
1331 	wrappingMech.pParameter = ((wrap_info.iv_length > 0) ? ivbuf : NULL);
1332 	wrappingMech.ulParameterLen = wrap_info.iv_length;
1333 
1334 	/* get the size of the wrapped key */
1335 	rv = FUNCLIST(src_slot_session->fw_st_id)->C_WrapKey(
1336 	    src_slot_session->hSession, &wrappingMech,
1337 	    wrappingKey, slot_object->hObject, NULL, &wrappedKeyLen);
1338 
1339 	if (rv != CKR_OK) {
1340 		goto finish;
1341 	}
1342 
1343 	wrappedKey = malloc(wrappedKeyLen * sizeof (CK_BYTE));
1344 	if (wrappedKey == NULL) {
1345 		rv = CKR_HOST_MEMORY;
1346 		goto finish;
1347 	}
1348 
1349 	/* do the actual key wrapping */
1350 	rv = FUNCLIST(src_slot_session->fw_st_id)->C_WrapKey(
1351 	    src_slot_session->hSession, &wrappingMech,
1352 	    wrappingKey, slot_object->hObject, wrappedKey, &wrappedKeyLen);
1353 
1354 	if (rv != CKR_OK) {
1355 		goto finish;
1356 	}
1357 
1358 	/* explicitly force the unwrapped object to be not sensitive */
1359 	unwrap_template[2].type = CKA_SENSITIVE;
1360 	unwrap_template[2].pValue = &falsevalue;
1361 	unwrap_template[2].ulValueLen = sizeof (falsevalue);
1362 
1363 	unwrap_template[3].type = CKA_TOKEN;
1364 	unwrap_template[3].pValue = &falsevalue;
1365 	unwrap_template[3].ulValueLen = sizeof (falsevalue);
1366 
1367 	unwrap_template_size =
1368 	    sizeof (unwrap_template) / sizeof (CK_ATTRIBUTE);
1369 
1370 	if (!wrap_info.dst_supports) {
1371 		/*
1372 		 * if we know for sure that the destination slot doesn't
1373 		 * support the wrapping mechanism, no point in trying.
1374 		 * go directly to unwrap in source slot, and create key
1375 		 * in destination
1376 		 */
1377 		goto unwrap_in_source;
1378 	}
1379 
1380 	/* create the unwrapping key in destination slot */
1381 	if (wrap_info.key_type == CKK_RSA) {
1382 		/* for RSA key, the unwrapping key need to be private key */
1383 		wrap_info.class = CKO_PRIVATE_KEY;
1384 	}
1385 	rv = create_wrap_unwrap_key(dst_slot_session,
1386 	    &unwrappingKey, &wrap_info, key_data, key_len);
1387 	if (rv != CKR_OK) {
1388 		goto finish;
1389 	}
1390 
1391 	rv = FUNCLIST(dst_slot_session->fw_st_id)->C_UnwrapKey(
1392 	    dst_slot_session->hSession, &wrappingMech,
1393 	    unwrappingKey, wrappedKey, wrappedKeyLen, unwrap_template,
1394 	    unwrap_template_size, &(new_clone->hObject));
1395 
1396 	if (rv != CKR_OK) {
1397 unwrap_in_source:
1398 
1399 		/*
1400 		 * There seemed to be a problem with unwrapping in the
1401 		 * destination slot.
1402 		 * Try to do the unwrap in the src slot so it becomes
1403 		 * a non-sensitive object, then, get all the attributes
1404 		 * and create the object in the destination slot
1405 		 */
1406 
1407 
1408 		if (wrap_info.class == CKO_SECRET_KEY) {
1409 			/* unwrap with same key used for wrapping */
1410 			rv = FUNCLIST(src_slot_session->fw_st_id)->C_UnwrapKey(
1411 			    src_slot_session->hSession,
1412 			    &wrappingMech, wrappingKey, wrappedKey,
1413 			    wrappedKeyLen, unwrap_template,
1414 			    unwrap_template_size, &(unwrapped_obj));
1415 		} else {
1416 			/*
1417 			 * If the object is wrapping with RSA public key, need
1418 			 * need to create RSA private key for unwrapping
1419 			 */
1420 			wrap_info.class = CKO_PRIVATE_KEY;
1421 			rv = create_wrap_unwrap_key(src_slot_session,
1422 			    &unwrappingKey, &wrap_info, key_data, key_len);
1423 			if (rv != CKR_OK) {
1424 				goto finish;
1425 			}
1426 			rv = FUNCLIST(src_slot_session->fw_st_id)->C_UnwrapKey(
1427 			    src_slot_session->hSession,
1428 			    &wrappingMech, unwrappingKey, wrappedKey,
1429 			    wrappedKeyLen, unwrap_template,
1430 			    unwrap_template_size, &(unwrapped_obj));
1431 		}
1432 
1433 
1434 		if (rv != CKR_OK) {
1435 			goto finish;
1436 		}
1437 
1438 		rv = meta_session_alloc(&tmp_meta_session);
1439 		if (rv != CKR_OK) {
1440 			goto finish;
1441 		}
1442 
1443 		tmp_meta_session->session_flags = CKF_SERIAL_SESSION;
1444 
1445 		rv = meta_object_alloc(tmp_meta_session, &tmp_meta_obj);
1446 		if (rv != CKR_OK) {
1447 			goto finish;
1448 		}
1449 
1450 		rv = meta_slot_object_alloc(&tmp_slot_obj);
1451 		if (rv != CKR_OK) {
1452 			goto finish;
1453 		}
1454 
1455 		tmp_meta_obj->master_clone_slotnum = src_slot_session->slotnum;
1456 		tmp_slot_obj->hObject = unwrapped_obj;
1457 		tmp_meta_obj->clones[tmp_meta_obj->master_clone_slotnum]
1458 		    = tmp_slot_obj;
1459 		meta_slot_object_activate(tmp_slot_obj, src_slot_session,
1460 		    B_FALSE);
1461 		tmp_slot_obj = NULL;
1462 
1463 		rv = clone_by_create(tmp_meta_obj, new_clone,
1464 		    dst_slot_session);
1465 		if (rv != CKR_OK) {
1466 			goto finish;
1467 		}
1468 	}
1469 
1470 finish:
1471 	if (unwrappingKey) {
1472 		(void) FUNCLIST(dst_slot_session->fw_st_id)->C_DestroyObject(
1473 		    dst_slot_session->hSession, unwrappingKey);
1474 	}
1475 
1476 	if (wrappingKey) {
1477 		(void) FUNCLIST(src_slot_session->fw_st_id)->C_DestroyObject(
1478 		    src_slot_session->hSession, wrappingKey);
1479 	}
1480 
1481 	if (tmp_slot_obj) {
1482 		(void) meta_slot_object_dealloc(tmp_slot_obj);
1483 	}
1484 
1485 	if (tmp_meta_obj) {
1486 		(void) meta_object_dealloc(tmp_meta_session, tmp_meta_obj,
1487 		    B_TRUE);
1488 	}
1489 
1490 	if (tmp_meta_session) {
1491 		(void) meta_session_dealloc(tmp_meta_session);
1492 	}
1493 
1494 	if (wrappedKey) {
1495 		free(wrappedKey);
1496 	}
1497 
1498 	if (src_slot_session) {
1499 		meta_release_slot_session(src_slot_session);
1500 	}
1501 
1502 	return (rv);
1503 
1504 }
1505 
1506 
1507 /*
1508  * meta_object_get_clone
1509  *
1510  * Creates a "clone" of a metaobject on the specified slot. A clone is a
1511  * copy of the object.
1512  *
1513  * Clones are cached, so that they can be reused with subsquent operations.
1514  */
1515 CK_RV
1516 meta_object_get_clone(meta_object_t *object,
1517 	CK_ULONG slot_num, slot_session_t *slot_session,
1518 	slot_object_t **clone)
1519 {
1520 	CK_RV rv = CKR_OK;
1521 	slot_object_t *newclone = NULL;
1522 
1523 	/* Does a clone already exist? */
1524 	if (object->clones[slot_num] != NULL) {
1525 		*clone = object->clones[slot_num];
1526 		return (CKR_OK);
1527 	}
1528 
1529 	if ((object->isSensitive) && (object->isToken) &&
1530 	    (!metaslot_auto_key_migrate)) {
1531 		/*
1532 		 * if the object is a sensitive token object, and auto
1533 		 * key migrate is not allowed, will not create the clone
1534 		 * in another slot
1535 		 */
1536 		return (CKR_FUNCTION_FAILED);
1537 	}
1538 
1539 	/* object attributes can't be extracted and attributes are not known */
1540 	if ((!object->isExtractable) && (object->attributes == NULL)) {
1541 		return (CKR_FUNCTION_FAILED);
1542 	}
1543 
1544 	(void) pthread_mutex_lock(&object->clone_create_lock);
1545 
1546 	/* Maybe someone just created one? */
1547 	if (object->clones[slot_num] != NULL) {
1548 		*clone = object->clones[slot_num];
1549 		goto finish;
1550 	}
1551 
1552 	/*
1553 	 * has an attempt already been made to create this object in
1554 	 * slot?  If yes, and there's no clone, as indicated above,
1555 	 * that means this object can't be created in this slot.
1556 	 */
1557 	if (object->tried_create_clone[slot_num]) {
1558 		(void) pthread_mutex_unlock(&object->clone_create_lock);
1559 		return (CKR_FUNCTION_FAILED);
1560 	}
1561 
1562 	rv = meta_slot_object_alloc(&newclone);
1563 	if (rv != CKR_OK)
1564 		goto finish;
1565 
1566 	object->tried_create_clone[slot_num] = B_TRUE;
1567 
1568 	/*
1569 	 * If this object is sensitive and we do not have not copied in the
1570 	 * attributes via FreeObject functionality, then we need to wrap it off
1571 	 * the provider.  If we do have attributes, we can just create the
1572 	 * clone
1573 	 */
1574 
1575 	if (object->isSensitive && object->attributes == NULL) {
1576 		rv = clone_by_wrap(object, newclone, slot_session);
1577 	} else {
1578 		rv = clone_by_create(object, newclone, slot_session);
1579 	}
1580 
1581 	if (rv != CKR_OK) {
1582 		goto finish;
1583 	}
1584 
1585 	object->clones[slot_num] = newclone;
1586 	meta_slot_object_activate(newclone, slot_session, object->isToken);
1587 
1588 	*clone = newclone;
1589 	newclone = NULL;
1590 finish:
1591 	(void) pthread_mutex_unlock(&object->clone_create_lock);
1592 
1593 	if (newclone)
1594 		meta_slot_object_dealloc(newclone);
1595 
1596 	return (rv);
1597 }
1598 
1599 
1600 /*
1601  * meta_setup_clone_template
1602  *
1603  * Create a clone template for the specified object.
1604  */
1605 static CK_RV
1606 meta_clone_template_setup(meta_object_t *object,
1607     const generic_attr_t *attributes, size_t num_attributes)
1608 {
1609 	CK_RV rv = CKR_OK;
1610 	CK_ATTRIBUTE *clone_template;
1611 	size_t i, c = 0;
1612 
1613 	clone_template = malloc(num_attributes * sizeof (CK_ATTRIBUTE));
1614 	if (clone_template == NULL) {
1615 		rv = CKR_HOST_MEMORY;
1616 		goto finish;
1617 	}
1618 
1619 	/* Don't allow attributes to change while we look at them. */
1620 	(void) pthread_rwlock_rdlock(&object->attribute_lock);
1621 
1622 	for (i = 0; i < num_attributes; i++) {
1623 		if (!attributes[i].isCloneAttr ||
1624 		    (attributes[i].attribute.type == CKA_TOKEN &&
1625 		    object->isFreeToken == FREE_DISABLED)) {
1626 			continue;
1627 		}
1628 		if ((!(attributes[i].hasValueForClone)) &&
1629 		    (attributes[i].canBeEmptyValue)) {
1630 			continue;
1631 		}
1632 
1633 		clone_template[c].type = attributes[i].attribute.type;
1634 		clone_template[c].ulValueLen =
1635 		    attributes[i].attribute.ulValueLen;
1636 		/* Allocate space to store the attribute value. */
1637 		clone_template[c].pValue = malloc(clone_template[c].ulValueLen);
1638 		if (clone_template[c].pValue == NULL) {
1639 			rv = CKR_HOST_MEMORY;
1640 			(void) pthread_rwlock_unlock(&object->attribute_lock);
1641 			goto finish;
1642 		}
1643 
1644 		(void) memcpy(clone_template[c].pValue,
1645 		    object->attributes[i].attribute.pValue,
1646 		    clone_template[c].ulValueLen);
1647 		c++;
1648 	}
1649 
1650 	(void) pthread_rwlock_unlock(&object->attribute_lock);
1651 
1652 	object->clone_template = clone_template;
1653 	object->clone_template_size = c;
1654 
1655 finish:
1656 	return (rv);
1657 }
1658 
1659 
1660 /*
1661  * meta_object_find_by_handle
1662  *
1663  * Search for an existing metaobject, using the object handle of a clone
1664  * on a particular slot.
1665  *
1666  * Returns a matching metaobject, or NULL if no match was found.
1667  */
1668 meta_object_t *
1669 meta_object_find_by_handle(CK_OBJECT_HANDLE hObject, CK_ULONG slotnum,
1670     boolean_t token_only)
1671 {
1672 	meta_object_t *object = NULL, *tmp_obj;
1673 	meta_session_t *session;
1674 
1675 	if (!token_only) {
1676 		(void) pthread_rwlock_rdlock(&meta_sessionlist_lock);
1677 		session = meta_sessionlist_head;
1678 		while (session != NULL) {
1679 			/* lock the objects list while we look at it */
1680 			(void) pthread_rwlock_rdlock(
1681 			    &(session->object_list_lock));
1682 			tmp_obj = session->object_list_head;
1683 			while (tmp_obj != NULL) {
1684 				slot_object_t *slot_object;
1685 
1686 				(void) pthread_rwlock_rdlock(
1687 				    &(tmp_obj->object_lock));
1688 				slot_object = tmp_obj->clones[slotnum];
1689 				if (slot_object != NULL) {
1690 					if (slot_object->hObject == hObject) {
1691 						object = tmp_obj;
1692 					}
1693 				}
1694 				(void) pthread_rwlock_unlock(
1695 				    &(tmp_obj->object_lock));
1696 				if (object != NULL) {
1697 					break;
1698 				}
1699 				tmp_obj = tmp_obj->next;
1700 			}
1701 			(void) pthread_rwlock_unlock(
1702 			    &(session->object_list_lock));
1703 			if (object != NULL) {
1704 				break;
1705 			}
1706 			session = session->next;
1707 		}
1708 		(void) pthread_rwlock_unlock(&meta_sessionlist_lock);
1709 	}
1710 
1711 	if (object != NULL) {
1712 		/* found the object, no need to look further */
1713 		return (object);
1714 	}
1715 
1716 	/*
1717 	 * Look at list of token objects
1718 	 */
1719 	(void) pthread_rwlock_rdlock(&tokenobject_list_lock);
1720 	tmp_obj = tokenobject_list_head;
1721 
1722 	while (tmp_obj != NULL) {
1723 		slot_object_t *slot_object;
1724 
1725 		(void) pthread_rwlock_rdlock(&(tmp_obj->object_lock));
1726 		slot_object = tmp_obj->clones[slotnum];
1727 		if (slot_object != NULL) {
1728 			if (slot_object->hObject == hObject)
1729 				object = tmp_obj;
1730 		}
1731 		(void) pthread_rwlock_unlock(&(tmp_obj->object_lock));
1732 		if (object != NULL) {
1733 			break;
1734 		}
1735 		tmp_obj = tmp_obj->next;
1736 	}
1737 	(void) pthread_rwlock_unlock(&tokenobject_list_lock);
1738 
1739 	return (object);
1740 }
1741 
1742 CK_RV
1743 meta_token_object_deactivate(token_obj_type_t token_type)
1744 {
1745 	meta_object_t *object, *tmp_object;
1746 	CK_RV save_rv = CKR_OK, rv;
1747 
1748 	/* get a write lock on the token object list */
1749 	(void) pthread_rwlock_wrlock(&tokenobject_list_lock);
1750 
1751 	object = tokenobject_list_head;
1752 
1753 	/* go through each object and delete the one with matching type */
1754 	while (object != NULL) {
1755 		tmp_object = object->next;
1756 
1757 		if ((token_type == ALL_TOKEN) ||
1758 		    ((object->isPrivate) && (token_type == PRIVATE_TOKEN)) ||
1759 		    ((!object->isPrivate) && (token_type == PUBLIC_TOKEN))) {
1760 			rv = meta_object_deactivate(object, B_TRUE, B_FALSE);
1761 			if ((rv != CKR_OK) && (save_rv == CKR_OK)) {
1762 				save_rv = rv;
1763 				goto finish;
1764 			}
1765 			rv = meta_object_dealloc(NULL, object, B_FALSE);
1766 			if ((rv != CKR_OK) && (save_rv == CKR_OK)) {
1767 				save_rv = rv;
1768 				goto finish;
1769 			}
1770 		}
1771 		object = tmp_object;
1772 	}
1773 finish:
1774 	(void) pthread_rwlock_unlock(&tokenobject_list_lock);
1775 	return (save_rv);
1776 }
1777 
1778 /*
1779  * This function adds the to-be-freed meta object to a linked list.
1780  * When the number of objects queued in the linked list reaches the
1781  * maximum threshold MAX_OBJ_TO_BE_FREED, it will free the first
1782  * object (FIFO) in the list.
1783  */
1784 void
1785 meta_object_delay_free(meta_object_t *objp)
1786 {
1787 	meta_object_t *tmp;
1788 
1789 	(void) pthread_mutex_lock(&obj_delay_freed.obj_to_be_free_mutex);
1790 
1791 	/* Add the newly deleted object at the end of the list */
1792 	objp->next = NULL;
1793 	if (obj_delay_freed.first == NULL) {
1794 		obj_delay_freed.last = objp;
1795 		obj_delay_freed.first = objp;
1796 	} else {
1797 		obj_delay_freed.last->next = objp;
1798 		obj_delay_freed.last = objp;
1799 	}
1800 
1801 	if (++obj_delay_freed.count >= MAX_OBJ_TO_BE_FREED) {
1802 		/*
1803 		 * Free the first object in the list only if
1804 		 * the total count reaches maximum threshold.
1805 		 */
1806 		obj_delay_freed.count--;
1807 		tmp = obj_delay_freed.first->next;
1808 		free(obj_delay_freed.first);
1809 		obj_delay_freed.first = tmp;
1810 	}
1811 	(void) pthread_mutex_unlock(&obj_delay_freed.obj_to_be_free_mutex);
1812 }
1813 
1814 
1815 /*
1816  * This function checks if the object passed can be a freeobject.
1817  *
1818  * If there is more than one provider that supports the supported freeobject
1819  * mechanisms then allow freeobjects to be an option.
1820  */
1821 
1822 boolean_t
1823 meta_freeobject_check(meta_session_t *session, meta_object_t *object,
1824     CK_MECHANISM *pMech, CK_ATTRIBUTE *tmpl, CK_ULONG tmpl_len,
1825     CK_KEY_TYPE keytype)
1826 {
1827 	mech_support_info_t *info = &(session->mech_support_info);
1828 
1829 	/*
1830 	 * If key migration is turned off, or the object does not has any of
1831 	 * the required flags and there is only one slot, then we don't need
1832 	 * FreeObjects.
1833 	 */
1834 	if (!metaslot_auto_key_migrate ||
1835 	    (!object->isToken && !object->isSensitive &&
1836 	    meta_slotManager_get_slotcount() < 2))
1837 		goto failure;
1838 
1839 	/*
1840 	 * If this call is for key generation, check pMech for supported
1841 	 * FreeObject mechs
1842 	 */
1843 	if (pMech != NULL) {
1844 		if (pMech->mechanism == CKM_RSA_PKCS_KEY_PAIR_GEN ||
1845 		    pMech->mechanism == CKM_EC_KEY_PAIR_GEN ||
1846 		    pMech->mechanism == CKM_DH_PKCS_KEY_PAIR_GEN ||
1847 		    pMech->mechanism == CKM_DH_PKCS_DERIVE)
1848 			info->mech = pMech->mechanism;
1849 		else
1850 			goto failure;
1851 
1852 	/*
1853 	 * If this call is for an object creation, look inside the template
1854 	 * for supported FreeObject mechs
1855 	 */
1856 	} else if (tmpl_len > 0) {
1857 		if (!get_template_ulong(CKA_KEY_TYPE, tmpl, tmpl_len, &keytype))
1858 			goto failure;
1859 
1860 		switch (keytype) {
1861 		case CKK_RSA:
1862 			info->mech = CKM_RSA_PKCS_KEY_PAIR_GEN;
1863 			break;
1864 		case CKK_EC:
1865 			info->mech = CKM_EC_KEY_PAIR_GEN;
1866 			break;
1867 		case CKK_DH:
1868 			info->mech = CKM_DH_PKCS_KEY_PAIR_GEN;
1869 			break;
1870 		default:
1871 			goto failure;
1872 		}
1873 	} else
1874 		goto failure;
1875 
1876 	/* Get the slot that support this mech... */
1877 	if (meta_mechManager_get_slots(info, B_FALSE, NULL) != CKR_OK)
1878 		goto failure;
1879 
1880 	/*
1881 	 * If there is only one slot with the mech or the first slot in
1882 	 * the list is the keystore slot, we should bail.
1883 	 */
1884 	if (info->num_supporting_slots < 2 &&
1885 	    info->supporting_slots[0]->slotnum == get_keystore_slotnum())
1886 		goto failure;
1887 
1888 	if (object->isToken)
1889 		object->isFreeToken = FREE_ALLOWED_KEY;
1890 	else
1891 		object->isFreeToken = FREE_DISABLED;
1892 
1893 	object->isFreeObject = FREE_ALLOWED_KEY;
1894 
1895 	return (B_TRUE);
1896 
1897 failure:
1898 	object->isFreeToken = FREE_DISABLED;
1899 	object->isFreeObject = FREE_DISABLED;
1900 	return (B_FALSE);
1901 }
1902 
1903 /*
1904  * This function assumes meta_freeobject_check() has just been called and set
1905  * the isFreeObject and/or isFreeToken vars to FREE_ALLOWED_KEY.
1906  *
1907  * If the template value for CKA_PRIVATE, CKA_SENSITIVE and/or CKA_TOKEN are
1908  * true, then isFreeObject is fully enabled.  In addition isFreeToken is
1909  * enabled if is CKA_TOKEN true.
1910  *
1911  * If create is true, we are doing a C_CreateObject operation and don't
1912  * handle CKA_PRIVATE & CKA_SENSITIVE flags, we only care about CKA_TOKEN.
1913  */
1914 
1915 boolean_t
1916 meta_freeobject_set(meta_object_t *object, CK_ATTRIBUTE *tmpl,
1917     CK_ULONG tmpl_len, boolean_t create)
1918 {
1919 
1920 	/* This check should never be true, if it is, it's a bug */
1921 	if (object->isFreeObject < FREE_ALLOWED_KEY)
1922 		return (B_FALSE);
1923 
1924 	if (!create) {
1925 		/* Turn off the Sensitive flag */
1926 		if (object->isSensitive) {
1927 			if (set_template_boolean(CKA_SENSITIVE, tmpl, tmpl_len,
1928 			    B_TRUE, &falsevalue) == -1)
1929 				goto failure;
1930 
1931 			object->isFreeObject = FREE_ENABLED;
1932 		}
1933 
1934 		/* Turn off the Private flag */
1935 		if (object->isPrivate) {
1936 			if (set_template_boolean(CKA_PRIVATE, tmpl, tmpl_len,
1937 			    B_TRUE, &falsevalue) == -1)
1938 				goto failure;
1939 
1940 			object->isFreeObject = FREE_ENABLED;
1941 		}
1942 	}
1943 
1944 	if (object->isToken) {
1945 		object->isToken = B_FALSE;
1946 		object->isFreeToken = FREE_ENABLED;
1947 		object->isFreeObject = FREE_ENABLED;
1948 	} else
1949 		object->isFreeToken = FREE_DISABLED;
1950 
1951 	/*
1952 	 *  If isFreeObject is not in the FREE_ENABLED state yet, it can be
1953 	 *  turned off because the object doesn't not need to be a FreeObject.
1954 	 */
1955 	if (object->isFreeObject == FREE_ALLOWED_KEY)
1956 		object->isFreeObject = FREE_DISABLED;
1957 
1958 	return (B_TRUE);
1959 
1960 failure:
1961 	object->isFreeToken = FREE_DISABLED;
1962 	object->isFreeObject = FREE_DISABLED;
1963 	return (B_FALSE);
1964 }
1965 
1966 /*
1967  * This function sets the CKA_TOKEN flag on a given object template depending
1968  * if the slot being used is a keystore.
1969  *
1970  * If the object is a token, but the slot is not the system keystore or has
1971  * no keystore, then set the template to token = false; otherwise it's true.
1972  * In addition we know ahead of time what the value is, so if the value is
1973  * already correct, bypass the setting function
1974  */
1975 CK_RV
1976 meta_freetoken_set(CK_ULONG slot_num, CK_BBOOL *current_value,
1977     CK_ATTRIBUTE *tmpl, CK_ULONG tmpl_len)
1978 {
1979 
1980 	if (slot_num == get_keystore_slotnum()) {
1981 		if (*current_value == TRUE)
1982 			return (CKR_OK);
1983 
1984 		if (set_template_boolean(CKA_TOKEN, tmpl, tmpl_len, B_TRUE,
1985 		    &truevalue) == -1)
1986 			return (CKR_FUNCTION_FAILED);
1987 
1988 	} else {
1989 
1990 		if (*current_value == FALSE)
1991 			return (CKR_OK);
1992 
1993 		if (set_template_boolean(CKA_TOKEN, tmpl, tmpl_len, B_TRUE,
1994 		    &falsevalue) == -1)
1995 			return (CKR_FUNCTION_FAILED);
1996 
1997 		*current_value = FALSE;
1998 	}
1999 
2000 	return (CKR_OK);
2001 }
2002 
2003 /*
2004  * Cloning function for meta_freeobject_clone() to use.  This function
2005  * is streamlined because we know what the object is and this should
2006  * not be called as a generic cloner.
2007  */
2008 
2009 static CK_RV
2010 meta_freeobject_clone_maker(meta_session_t *session, meta_object_t *object,
2011     CK_ULONG slotnum)
2012 {
2013 
2014 	slot_object_t *slot_object = NULL;
2015 	slot_session_t *slot_session = NULL;
2016 	CK_RV rv;
2017 
2018 	rv = meta_slot_object_alloc(&slot_object);
2019 	if (rv != CKR_OK)
2020 		goto cleanup;
2021 
2022 	rv = meta_get_slot_session(slotnum, &slot_session,
2023 	    session->session_flags);
2024 	if (rv != CKR_OK)
2025 		goto cleanup;
2026 
2027 	rv = clone_by_create(object, slot_object, slot_session);
2028 	if (rv == CKR_OK) {
2029 		object->clones[slotnum] = slot_object;
2030 		meta_slot_object_activate(slot_object, slot_session, B_TRUE);
2031 	}
2032 
2033 cleanup:
2034 	meta_release_slot_session(slot_session);
2035 	return (rv);
2036 
2037 }
2038 
2039 /*
2040  * This function is called when a object is a FreeObject.
2041  *
2042  * What we are given is an object that has been generated on a provider
2043  * that is not its final usage place. That maybe because:
2044  * 1) it's a token and needs to be stored in keystore.
2045  * 2) it was to be a private/sensitive object that we modified so we could know
2046  *    the important attributes for cloning before we make it private/sensitive.
2047  */
2048 
2049 boolean_t
2050 meta_freeobject_clone(meta_session_t *session, meta_object_t *object)
2051 {
2052 	CK_RV rv;
2053 	CK_ULONG keystore_slotnum;
2054 	CK_ATTRIBUTE attr[2];
2055 	boolean_t failover = B_FALSE;
2056 
2057 	if (object->attributes == NULL) {
2058 		rv = meta_object_copyin(object);
2059 		if (rv != CKR_OK)
2060 			return (rv);
2061 	}
2062 
2063 	if (object->isPrivate) {
2064 		CK_OBJECT_HANDLE new_clone;
2065 		CK_ULONG slotnum = object->master_clone_slotnum;
2066 		slot_session_t *slot_session;
2067 
2068 		attr[0].type = CKA_PRIVATE;
2069 		attr[0].pValue = &truevalue;
2070 		attr[0].ulValueLen = sizeof (truevalue);
2071 
2072 		/* Set the master attribute list */
2073 		rv = attribute_set_value(attr, object->attributes,
2074 		    object->num_attributes);
2075 		if (rv > 0)
2076 			return (CKR_FUNCTION_FAILED);
2077 
2078 		/* Get a slot session */
2079 		rv = meta_get_slot_session(slotnum, &slot_session,
2080 		    session->session_flags);
2081 		if (rv > 0)
2082 			return (rv);
2083 
2084 		/* Create the new CKA_PRIVATE one */
2085 		rv = FUNCLIST(slot_session->fw_st_id)->\
2086 		    C_CopyObject(slot_session->hSession,
2087 		    object->clones[slotnum]->hObject, attr, 1, &new_clone);
2088 
2089 		if (rv == CKR_USER_NOT_LOGGED_IN) {
2090 			/*
2091 			 * If the CopyObject fails, we may be using a provider
2092 			 * that has a keystore that is not the default
2093 			 * keystore set in metaslot or has object management
2094 			 * abilities. In which case we should write this
2095 			 * object to metaslot's keystore and let the failover.
2096 			 * rest of the function know we've changed providers.
2097 			 */
2098 			failover = B_TRUE;
2099 			keystore_slotnum = get_keystore_slotnum();
2100 			if (object->clones[keystore_slotnum] == NULL) {
2101 				rv = meta_freeobject_clone_maker(session,
2102 				    object, keystore_slotnum);
2103 				if (rv != CKR_OK) {
2104 					goto failure;
2105 				}
2106 			}
2107 			object->master_clone_slotnum = keystore_slotnum;
2108 
2109 		} else if (rv != CKR_OK) {
2110 			meta_release_slot_session(slot_session);
2111 			goto failure;
2112 		}
2113 		/* Remove the old object */
2114 		rv = FUNCLIST(slot_session->fw_st_id)->	\
2115 		    C_DestroyObject(slot_session->hSession,
2116 		    object->clones[slotnum]->hObject);
2117 		if (rv != CKR_OK) {
2118 			meta_release_slot_session(slot_session);
2119 			goto failure;
2120 		}
2121 
2122 		if (!failover)
2123 			object->clones[slotnum]->hObject = new_clone;
2124 		else
2125 			object->clones[slotnum] = NULL;
2126 
2127 		meta_release_slot_session(slot_session);
2128 
2129 	}
2130 
2131 	if (object->isSensitive) {
2132 		slot_session_t *slot_session;
2133 		CK_ULONG slotnum = object->master_clone_slotnum;
2134 
2135 		attr[0].type = CKA_SENSITIVE;
2136 		attr[0].pValue = &truevalue;
2137 		attr[0].ulValueLen = sizeof (truevalue);
2138 		rv = attribute_set_value(attr, object->attributes,
2139 		    object->num_attributes);
2140 		if (rv != CKR_OK)
2141 			goto failure;
2142 
2143 		rv = meta_get_slot_session(slotnum, &slot_session,
2144 		    session->session_flags);
2145 		if (rv == CKR_OK) {
2146 			rv = FUNCLIST(slot_session->fw_st_id)->		\
2147 			    C_SetAttributeValue(slot_session->hSession,
2148 			    object->clones[slotnum]->hObject, attr, 1);
2149 
2150 			meta_release_slot_session(slot_session);
2151 		}
2152 	}
2153 
2154 	if (object->isFreeToken == FREE_ENABLED || failover) {
2155 		keystore_slotnum = get_keystore_slotnum();
2156 		if (object->clones[keystore_slotnum] == NULL) {
2157 			rv = meta_freeobject_clone_maker(session, object,
2158 			    keystore_slotnum);
2159 			if (rv != CKR_OK)
2160 				goto failure;
2161 
2162 			object->master_clone_slotnum = keystore_slotnum;
2163 		}
2164 		object->isFreeToken = FREE_ENABLED;
2165 	}
2166 
2167 	object->isFreeObject = FREE_ENABLED;
2168 	return (CKR_OK);
2169 
2170 failure:
2171 	object->isFreeToken = FREE_DISABLED;
2172 	object->isFreeObject = FREE_DISABLED;
2173 	return (rv);
2174 
2175 }
2176