1 /* 2 * CDDL HEADER START 3 * 4 * The contents of this file are subject to the terms of the 5 * Common Development and Distribution License (the "License"). 6 * You may not use this file except in compliance with the License. 7 * 8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 9 * or http://www.opensolaris.org/os/licensing. 10 * See the License for the specific language governing permissions 11 * and limitations under the License. 12 * 13 * When distributing Covered Code, include this CDDL HEADER in each 14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 15 * If applicable, add the following below this CDDL HEADER, with the 16 * fields enclosed by brackets "[]" replaced with your own identifying 17 * information: Portions Copyright [yyyy] [name of copyright owner] 18 * 19 * CDDL HEADER END 20 */ 21 /* 22 * Copyright 2009 Sun Microsystems, Inc. All rights reserved. 23 * Use is subject to license terms. 24 */ 25 26 #include <md5.h> 27 #include <pthread.h> 28 #include <syslog.h> 29 #include <stdlib.h> 30 #include <string.h> 31 #include <strings.h> 32 #include <sys/sha1.h> 33 #include <security/cryptoki.h> 34 #include "softGlobal.h" 35 #include "softSession.h" 36 #include "softObject.h" 37 #include "softOps.h" 38 #include "softKeystore.h" 39 #include "softKeystoreUtil.h" 40 41 42 CK_ULONG soft_session_cnt = 0; /* the number of opened sessions */ 43 CK_ULONG soft_session_rw_cnt = 0; /* the number of opened R/W sessions */ 44 45 #define DIGEST_MECH_OK(_m_) ((_m_) == CKM_MD5 || (_m_) == CKM_SHA_1) 46 47 /* 48 * Delete all the sessions. First, obtain the global session 49 * list lock. Then start to delete one session at a time. 50 * Release the global session list lock before returning to 51 * caller. 52 */ 53 CK_RV 54 soft_delete_all_sessions(boolean_t force) 55 { 56 57 CK_RV rv = CKR_OK; 58 CK_RV rv1; 59 soft_session_t *session_p; 60 soft_session_t *session_p1; 61 62 /* Acquire the global session list lock */ 63 (void) pthread_mutex_lock(&soft_sessionlist_mutex); 64 65 session_p = soft_session_list; 66 67 /* Delete all the sessions in the session list */ 68 while (session_p) { 69 session_p1 = session_p->next; 70 71 /* 72 * Delete a session by calling soft_delete_session() 73 * with a session pointer and a boolean arguments. 74 * Boolean value TRUE is used to indicate that the 75 * caller holds the lock on the global session list. 76 * 77 */ 78 rv1 = soft_delete_session(session_p, force, B_TRUE); 79 80 /* Record the very first error code */ 81 if (rv == CKR_OK) { 82 rv = rv1; 83 } 84 85 session_p = session_p1; 86 } 87 88 /* No session left */ 89 soft_session_list = NULL; 90 91 /* Release the global session list lock */ 92 (void) pthread_mutex_unlock(&soft_sessionlist_mutex); 93 94 return (rv); 95 96 } 97 98 99 /* 100 * Create a new session struct, and add it to the session linked list. 101 * 102 * This function will acquire the global session list lock, and release 103 * it after adding the session to the session linked list. 104 */ 105 CK_RV 106 soft_add_session(CK_FLAGS flags, CK_VOID_PTR pApplication, 107 CK_NOTIFY notify, CK_ULONG *sessionhandle_p) 108 { 109 110 soft_session_t *new_sp = NULL; 111 112 /* Allocate a new session struct */ 113 new_sp = calloc(1, sizeof (soft_session_t)); 114 if (new_sp == NULL) { 115 return (CKR_HOST_MEMORY); 116 } 117 118 new_sp->magic_marker = SOFTTOKEN_SESSION_MAGIC; 119 new_sp->pApplication = pApplication; 120 new_sp->Notify = notify; 121 new_sp->flags = flags; 122 new_sp->state = CKS_RO_PUBLIC_SESSION; 123 new_sp->object_list = NULL; 124 new_sp->ses_refcnt = 0; 125 new_sp->ses_close_sync = 0; 126 127 (void) pthread_mutex_lock(&soft_giant_mutex); 128 if (soft_slot.authenticated) { 129 (void) pthread_mutex_unlock(&soft_giant_mutex); 130 if (flags & CKF_RW_SESSION) { 131 new_sp->state = CKS_RW_USER_FUNCTIONS; 132 } else { 133 new_sp->state = CKS_RO_USER_FUNCTIONS; 134 } 135 } else { 136 (void) pthread_mutex_unlock(&soft_giant_mutex); 137 if (flags & CKF_RW_SESSION) { 138 new_sp->state = CKS_RW_PUBLIC_SESSION; 139 } else { 140 new_sp->state = CKS_RO_PUBLIC_SESSION; 141 } 142 } 143 144 /* Initialize the lock for the newly created session */ 145 if (pthread_mutex_init(&new_sp->session_mutex, NULL) != 0) { 146 free(new_sp); 147 return (CKR_CANT_LOCK); 148 } 149 150 (void) pthread_cond_init(&new_sp->ses_free_cond, NULL); 151 152 /* Acquire the global session list lock */ 153 (void) pthread_mutex_lock(&soft_sessionlist_mutex); 154 155 /* Insert the new session in front of session list */ 156 if (soft_session_list == NULL) { 157 soft_session_list = new_sp; 158 new_sp->next = NULL; 159 new_sp->prev = NULL; 160 } else { 161 soft_session_list->prev = new_sp; 162 new_sp->next = soft_session_list; 163 new_sp->prev = NULL; 164 soft_session_list = new_sp; 165 } 166 167 /* Type casting the address of a session struct to a session handle */ 168 *sessionhandle_p = (CK_ULONG)new_sp; 169 ++soft_session_cnt; 170 if (flags & CKF_RW_SESSION) 171 ++soft_session_rw_cnt; 172 173 if (soft_session_cnt == 1) 174 /* 175 * This is the first session to be opened, so we can set 176 * validate the public token objects in token list now. 177 */ 178 soft_validate_token_objects(B_TRUE); 179 180 /* Release the global session list lock */ 181 (void) pthread_mutex_unlock(&soft_sessionlist_mutex); 182 183 return (CKR_OK); 184 185 } 186 187 /* 188 * This function adds the to-be-freed session to a linked list. 189 * When the number of sessions queued in the linked list reaches the 190 * maximum threshold MAX_SES_TO_BE_FREED, it will free the first 191 * session (FIFO) in the list. 192 */ 193 void 194 session_delay_free(soft_session_t *sp) 195 { 196 soft_session_t *tmp; 197 198 (void) pthread_mutex_lock(&ses_delay_freed.ses_to_be_free_mutex); 199 200 /* Add the newly deleted session at the end of the list */ 201 sp->next = NULL; 202 if (ses_delay_freed.first == NULL) { 203 ses_delay_freed.last = sp; 204 ses_delay_freed.first = sp; 205 } else { 206 ses_delay_freed.last->next = sp; 207 ses_delay_freed.last = sp; 208 } 209 210 if (++ses_delay_freed.count >= MAX_SES_TO_BE_FREED) { 211 /* 212 * Free the first session in the list only if 213 * the total count reaches maximum threshold. 214 */ 215 ses_delay_freed.count--; 216 tmp = ses_delay_freed.first->next; 217 free(ses_delay_freed.first); 218 ses_delay_freed.first = tmp; 219 } 220 (void) pthread_mutex_unlock(&ses_delay_freed.ses_to_be_free_mutex); 221 } 222 223 /* 224 * Delete a session: 225 * - Remove the session from the session linked list. 226 * Holding the lock on the global session list is needed to do this. 227 * - Release all the objects created by the session. 228 * 229 * The boolean argument lock_held is used to indicate that whether 230 * the caller of this function holds the lock on the global session 231 * list or not. 232 * - When called by soft_delete_all_sessions(), which is called by 233 * C_Finalize() or C_CloseAllSessions() -- the lock_held = TRUE. 234 * - When called by C_CloseSession() -- the lock_held = FALSE. 235 * 236 * When the caller does not hold the lock on the global session 237 * list, this function will acquire that lock in order to proceed, 238 * and also release that lock before returning to caller. 239 */ 240 CK_RV 241 soft_delete_session(soft_session_t *session_p, 242 boolean_t force, boolean_t lock_held) 243 { 244 245 /* 246 * Check to see if the caller holds the lock on the global 247 * session list. If not, we need to acquire that lock in 248 * order to proceed. 249 */ 250 if (!lock_held) { 251 /* Acquire the global session list lock */ 252 (void) pthread_mutex_lock(&soft_sessionlist_mutex); 253 } 254 255 /* 256 * Remove the session from the session linked list first. 257 */ 258 if (soft_session_list == session_p) { 259 /* Session is the first one in the list */ 260 if (session_p->next) { 261 soft_session_list = session_p->next; 262 session_p->next->prev = NULL; 263 } else { 264 /* Session is the only one in the list */ 265 soft_session_list = NULL; 266 } 267 } else { 268 /* Session is not the first one in the list */ 269 if (session_p->next) { 270 /* Session is in the middle of the list */ 271 session_p->prev->next = session_p->next; 272 session_p->next->prev = session_p->prev; 273 } else { 274 /* Session is the last one in the list */ 275 session_p->prev->next = NULL; 276 } 277 } 278 279 --soft_session_cnt; 280 if (session_p->flags & CKF_RW_SESSION) 281 --soft_session_rw_cnt; 282 283 if (!lock_held) { 284 /* 285 * If the global session list lock is obtained by 286 * this function, then release that lock after 287 * removing the session from session linked list. 288 * We want the releasing of the objects of the 289 * session, and freeing of the session itself to 290 * be done without holding the global session list 291 * lock. 292 */ 293 (void) pthread_mutex_unlock(&soft_sessionlist_mutex); 294 } 295 296 297 /* Acquire the individual session lock */ 298 (void) pthread_mutex_lock(&session_p->session_mutex); 299 /* 300 * Make sure another thread hasn't freed the session. 301 */ 302 if (session_p->magic_marker != SOFTTOKEN_SESSION_MAGIC) { 303 (void) pthread_mutex_unlock(&session_p->session_mutex); 304 return (CKR_OK); 305 } 306 307 /* 308 * The deletion of a session must be blocked when the session 309 * reference count is not zero. This means if any session related 310 * operation starts prior to the session close operation gets in, 311 * the session closing thread must wait for the non-closing 312 * operation to be completed before it can proceed the close 313 * operation. 314 * 315 * Unless we are being forced to shut everything down, this only 316 * happens if the libraries _fini() is running not of someone 317 * explicitly called C_Finalize(). 318 */ 319 if (force) 320 session_p->ses_refcnt = 0; 321 322 while (session_p->ses_refcnt != 0) { 323 /* 324 * We set the SESSION_REFCNT_WAITING flag before we put 325 * this closing thread in a wait state, so other non-closing 326 * operation thread will signal to wake it up only when 327 * the session reference count becomes zero and this flag 328 * is set. 329 */ 330 session_p->ses_close_sync |= SESSION_REFCNT_WAITING; 331 (void) pthread_cond_wait(&session_p->ses_free_cond, 332 &session_p->session_mutex); 333 } 334 335 session_p->ses_close_sync &= ~SESSION_REFCNT_WAITING; 336 337 /* 338 * Remove all the objects created in this session. 339 */ 340 soft_delete_all_objects_in_session(session_p, force); 341 342 /* 343 * Mark session as no longer valid. This can only be done after all 344 * objects created by this session are free'd since the marker is 345 * still needed in the process of removing objects from the session. 346 */ 347 session_p->magic_marker = 0; 348 349 (void) pthread_cond_destroy(&session_p->ses_free_cond); 350 351 /* In case application did not call Final */ 352 if (session_p->digest.context != NULL) 353 free(session_p->digest.context); 354 355 if (session_p->encrypt.context != NULL) 356 /* 357 * 1st B_TRUE: encrypt 358 * 2nd B_TRUE: caller is holding session_mutex. 359 */ 360 soft_crypt_cleanup(session_p, B_TRUE, B_TRUE); 361 362 if (session_p->decrypt.context != NULL) 363 /* 364 * 1st B_FALSE: decrypt 365 * 2nd B_TRUE: caller is holding session_mutex. 366 */ 367 soft_crypt_cleanup(session_p, B_FALSE, B_TRUE); 368 369 if (session_p->sign.context != NULL) 370 free(session_p->sign.context); 371 372 if (session_p->verify.context != NULL) 373 free(session_p->verify.context); 374 375 if (session_p->find_objects.context != NULL) { 376 find_context_t *fcontext; 377 fcontext = (find_context_t *)session_p->find_objects.context; 378 free(fcontext->objs_found); 379 free(fcontext); 380 } 381 382 /* Reset SESSION_IS_CLOSIN flag. */ 383 session_p->ses_close_sync &= ~SESSION_IS_CLOSING; 384 385 (void) pthread_mutex_unlock(&session_p->session_mutex); 386 /* Destroy the individual session lock */ 387 (void) pthread_mutex_destroy(&session_p->session_mutex); 388 389 /* Delay freeing the session */ 390 session_delay_free(session_p); 391 392 return (CKR_OK); 393 } 394 395 396 /* 397 * This function is used to type cast a session handle to a pointer to 398 * the session struct. Also, it does the following things: 399 * 1) Check to see if the session struct is tagged with a session 400 * magic number. This is to detect when an application passes 401 * a bogus session pointer. 402 * 2) Acquire the lock on the designated session. 403 * 3) Check to see if the session is in the closing state that another 404 * thread is performing. 405 * 4) Increment the session reference count by one. This is to prevent 406 * this session from being closed by other thread. 407 * 5) Release the lock held on the designated session. 408 */ 409 CK_RV 410 handle2session(CK_SESSION_HANDLE hSession, soft_session_t **session_p) 411 { 412 413 soft_session_t *sp = (soft_session_t *)(hSession); 414 415 /* 416 * No need to hold soft_sessionlist_mutex as we are 417 * just reading the value and 32-bit reads are atomic. 418 */ 419 if (all_sessions_closing) { 420 return (CKR_SESSION_CLOSED); 421 } 422 423 if ((sp == NULL) || 424 (sp->magic_marker != SOFTTOKEN_SESSION_MAGIC)) { 425 return (CKR_SESSION_HANDLE_INVALID); 426 } 427 (void) pthread_mutex_lock(&sp->session_mutex); 428 429 if (sp->ses_close_sync & SESSION_IS_CLOSING) { 430 (void) pthread_mutex_unlock(&sp->session_mutex); 431 return (CKR_SESSION_CLOSED); 432 } 433 434 /* Increment session ref count. */ 435 sp->ses_refcnt++; 436 437 (void) pthread_mutex_unlock(&sp->session_mutex); 438 439 *session_p = sp; 440 441 return (CKR_OK); 442 } 443 444 /* 445 * The format to be saved in the pOperationState will be: 446 * 1. internal_op_state_t 447 * 2. crypto_active_op_t 448 * 3. actual context of the active operation 449 */ 450 CK_RV 451 soft_get_operationstate(soft_session_t *session_p, CK_BYTE_PTR pOperationState, 452 CK_ULONG_PTR pulOperationStateLen) 453 { 454 455 internal_op_state_t *p_op_state; 456 CK_ULONG op_data_len = 0; 457 CK_RV rv = CKR_OK; 458 459 if (pulOperationStateLen == NULL) 460 return (CKR_ARGUMENTS_BAD); 461 462 (void) pthread_mutex_lock(&session_p->session_mutex); 463 464 /* Check to see if encrypt operation is active. */ 465 if (session_p->encrypt.flags & CRYPTO_OPERATION_ACTIVE) { 466 rv = CKR_STATE_UNSAVEABLE; 467 goto unlock_session; 468 } 469 470 /* Check to see if decrypt operation is active. */ 471 if (session_p->decrypt.flags & CRYPTO_OPERATION_ACTIVE) { 472 rv = CKR_STATE_UNSAVEABLE; 473 goto unlock_session; 474 } 475 476 /* Check to see if sign operation is active. */ 477 if (session_p->sign.flags & CRYPTO_OPERATION_ACTIVE) { 478 rv = CKR_STATE_UNSAVEABLE; 479 goto unlock_session; 480 } 481 482 /* Check to see if verify operation is active. */ 483 if (session_p->verify.flags & CRYPTO_OPERATION_ACTIVE) { 484 rv = CKR_STATE_UNSAVEABLE; 485 goto unlock_session; 486 } 487 488 /* Check to see if digest operation is active. */ 489 if (session_p->digest.flags & CRYPTO_OPERATION_ACTIVE) { 490 op_data_len = sizeof (internal_op_state_t) + 491 sizeof (crypto_active_op_t); 492 493 switch (session_p->digest.mech.mechanism) { 494 case CKM_MD5: 495 op_data_len += sizeof (MD5_CTX); 496 break; 497 case CKM_SHA_1: 498 op_data_len += sizeof (SHA1_CTX); 499 break; 500 default: 501 rv = CKR_STATE_UNSAVEABLE; 502 goto unlock_session; 503 } 504 505 if (pOperationState == NULL_PTR) { 506 *pulOperationStateLen = op_data_len; 507 goto unlock_session; 508 } else { 509 if (*pulOperationStateLen < op_data_len) { 510 *pulOperationStateLen = op_data_len; 511 rv = CKR_BUFFER_TOO_SMALL; 512 goto unlock_session; 513 } 514 } 515 516 /* Save internal_op_state_t */ 517 /* LINTED E_BAD_PTR_CAST_ALIGN */ 518 p_op_state = (internal_op_state_t *)pOperationState; 519 p_op_state->op_len = op_data_len; 520 p_op_state->op_active = DIGEST_OP; 521 p_op_state->op_session_state = session_p->state; 522 523 /* Save crypto_active_op_t */ 524 (void) memcpy((CK_BYTE *)pOperationState + 525 sizeof (internal_op_state_t), 526 &session_p->digest, 527 sizeof (crypto_active_op_t)); 528 529 switch (session_p->digest.mech.mechanism) { 530 case CKM_MD5: 531 /* Save MD5_CTX for the active digest operation */ 532 (void) memcpy((CK_BYTE *)pOperationState + 533 sizeof (internal_op_state_t) + 534 sizeof (crypto_active_op_t), 535 session_p->digest.context, 536 sizeof (MD5_CTX)); 537 break; 538 539 case CKM_SHA_1: 540 /* Save SHA1_CTX for the active digest operation */ 541 (void) memcpy((CK_BYTE *)pOperationState + 542 sizeof (internal_op_state_t) + 543 sizeof (crypto_active_op_t), 544 session_p->digest.context, 545 sizeof (SHA1_CTX)); 546 break; 547 548 default: 549 rv = CKR_STATE_UNSAVEABLE; 550 } 551 } else { 552 rv = CKR_OPERATION_NOT_INITIALIZED; 553 goto unlock_session; 554 } 555 556 *pulOperationStateLen = op_data_len; 557 558 unlock_session: 559 (void) pthread_mutex_unlock(&session_p->session_mutex); 560 561 return (rv); 562 563 } 564 565 static CK_BYTE_PTR alloc_digest(CK_ULONG mech) 566 { 567 CK_BYTE_PTR ret_val; 568 569 switch (mech) { 570 case CKM_MD5: 571 ret_val = (CK_BYTE_PTR) malloc(sizeof (MD5_CTX)); 572 break; 573 case CKM_SHA_1: 574 ret_val = (CK_BYTE_PTR) malloc(sizeof (SHA1_CTX)); 575 break; 576 default: ret_val = NULL; 577 } 578 579 return (ret_val); 580 } 581 582 /* 583 * The format to be restored from the pOperationState will be: 584 * 1. internal_op_state_t 585 * 2. crypto_active_op_t 586 * 3. actual context of the saved operation 587 */ 588 CK_RV 589 soft_set_operationstate(soft_session_t *session_p, CK_BYTE_PTR pOperationState, 590 CK_ULONG ulOperationStateLen, CK_OBJECT_HANDLE hEncryptionKey, 591 CK_OBJECT_HANDLE hAuthenticationKey) 592 { 593 594 CK_RV rv = CKR_OK; 595 internal_op_state_t *p_op_state; 596 crypto_active_op_t *p_active_op; 597 CK_ULONG offset = 0; 598 CK_ULONG mech; 599 void *free_it = NULL; 600 601 /* LINTED E_BAD_PTR_CAST_ALIGN */ 602 p_op_state = (internal_op_state_t *)pOperationState; 603 604 if (p_op_state->op_len != ulOperationStateLen) { 605 /* 606 * The supplied data length does not match with 607 * the saved data length. 608 */ 609 return (CKR_SAVED_STATE_INVALID); 610 } 611 612 if (p_op_state->op_active != DIGEST_OP) 613 return (CKR_SAVED_STATE_INVALID); 614 615 if ((hAuthenticationKey != 0) || (hEncryptionKey != 0)) { 616 return (CKR_KEY_NOT_NEEDED); 617 } 618 619 offset = sizeof (internal_op_state_t); 620 /* LINTED E_BAD_PTR_CAST_ALIGN */ 621 p_active_op = (crypto_active_op_t *)(pOperationState + offset); 622 offset += sizeof (crypto_active_op_t); 623 mech = p_active_op->mech.mechanism; 624 625 if (!DIGEST_MECH_OK(mech)) { 626 return (CKR_SAVED_STATE_INVALID); 627 } 628 629 /* 630 * We may reuse digest.context in case the digest mechanisms (the one, 631 * which belongs to session and the operation, which we are restoring) 632 * are the same. If digest mechanisms are different, we have to release 633 * the digest context, which belongs to session and allocate a new one. 634 */ 635 (void) pthread_mutex_lock(&session_p->session_mutex); 636 637 if (session_p->state != p_op_state->op_session_state) { 638 /* 639 * The supplied session state does not match with 640 * the saved session state. 641 */ 642 rv = CKR_SAVED_STATE_INVALID; 643 goto unlock_session; 644 } 645 646 if (session_p->digest.context && 647 (session_p->digest.mech.mechanism != mech)) { 648 free_it = session_p->digest.context; 649 session_p->digest.context = NULL; 650 } 651 652 if (session_p->digest.context == NULL) { 653 session_p->digest.context = alloc_digest(mech); 654 655 if (session_p->digest.context == NULL) { 656 /* 657 * put back original context into session in case 658 * allocation of new context has failed. 659 */ 660 session_p->digest.context = free_it; 661 free_it = NULL; 662 rv = CKR_HOST_MEMORY; 663 goto unlock_session; 664 } 665 } 666 667 /* Restore crypto_active_op_t */ 668 session_p->digest.mech.mechanism = mech; 669 session_p->digest.flags = p_active_op->flags; 670 671 switch (mech) { 672 case CKM_MD5: 673 /* Restore MD5_CTX from the saved digest operation */ 674 (void) memcpy((CK_BYTE *)session_p->digest.context, 675 (CK_BYTE *)pOperationState + offset, 676 sizeof (MD5_CTX)); 677 break; 678 case CKM_SHA_1: 679 /* Restore SHA1_CTX from the saved digest operation */ 680 (void) memcpy((CK_BYTE *)session_p->digest.context, 681 (CK_BYTE *)pOperationState + offset, 682 sizeof (SHA1_CTX)); 683 break; 684 default: 685 /* never reached */ 686 rv = CKR_SAVED_STATE_INVALID; 687 } 688 689 unlock_session: 690 (void) pthread_mutex_unlock(&session_p->session_mutex); 691 692 if (free_it != NULL) 693 free(free_it); 694 695 return (rv); 696 } 697 698 699 CK_RV 700 soft_login(CK_UTF8CHAR_PTR pPin, CK_ULONG ulPinLen) 701 { 702 703 /* 704 * Authenticate the input PIN. 705 */ 706 return (soft_verify_pin(pPin, ulPinLen)); 707 708 } 709 710 void 711 soft_logout(void) 712 { 713 714 /* 715 * Delete all the private token objects from the "token_object_list". 716 */ 717 soft_delete_all_in_core_token_objects(PRIVATE_TOKEN); 718 return; 719 720 } 721 722 void 723 soft_acquire_all_session_mutexes() 724 { 725 soft_session_t *session_p = soft_session_list; 726 727 /* Iterate through sessions acquiring all mutexes */ 728 while (session_p) { 729 soft_object_t *object_p; 730 731 (void) pthread_mutex_lock(&session_p->session_mutex); 732 object_p = session_p->object_list; 733 734 /* Lock also all objects related to session */ 735 while (object_p) { 736 (void) pthread_mutex_lock(&object_p->object_mutex); 737 object_p = object_p->next; 738 } 739 session_p = session_p->next; 740 } 741 } 742 743 void 744 soft_release_all_session_mutexes() 745 { 746 soft_session_t *session_p = soft_session_list; 747 748 /* Iterate through sessions releasing all mutexes */ 749 while (session_p) { 750 /* 751 * N.B. Ideally, should go in opposite order to guarantee 752 * lock-order requirements but there is no tail pointer. 753 */ 754 soft_object_t *object_p = session_p->object_list; 755 756 /* Unlock also all objects related to session */ 757 while (object_p) { 758 (void) pthread_mutex_unlock(&object_p->object_mutex); 759 object_p = object_p->next; 760 } 761 (void) pthread_mutex_unlock(&session_p->session_mutex); 762 session_p = session_p->next; 763 } 764 } 765