/*
* Common Public License Version 0.5
*
* THE ACCOMPANYING PROGRAM IS PROVIDED UNDER THE TERMS OF
* THIS COMMON PUBLIC LICENSE ("AGREEMENT"). ANY USE,
* REPRODUCTION OR DISTRIBUTION OF THE PROGRAM CONSTITUTES
* RECIPIENT'S ACCEPTANCE OF THIS AGREEMENT.
*
* 1. DEFINITIONS
*
* "Contribution" means:
* a) in the case of the initial Contributor, the
* initial code and documentation distributed under
* this Agreement, and
*
* b) in the case of each subsequent Contributor:
* i) changes to the Program, and
* ii) additions to the Program;
*
* where such changes and/or additions to the Program
* originate from and are distributed by that
* particular Contributor. A Contribution 'originates'
* from a Contributor if it was added to the Program
* by such Contributor itself or anyone acting on such
* Contributor's behalf. Contributions do not include
* additions to the Program which: (i) are separate
* modules of software distributed in conjunction with
* the Program under their own license agreement, and
* (ii) are not derivative works of the Program.
*
*
* "Contributor" means any person or entity that distributes
* the Program.
*
* "Licensed Patents " mean patent claims licensable by a
* Contributor which are necessarily infringed by the use or
* sale of its Contribution alone or when combined with the
* Program.
*
* "Program" means the Contributions distributed in
* accordance with this Agreement.
*
* "Recipient" means anyone who receives the Program under
* this Agreement, including all Contributors.
*
* 2. GRANT OF RIGHTS
*
* a) Subject to the terms of this Agreement, each
* Contributor hereby grants Recipient a
* no - exclusive, worldwide, royalt - free copyright
* license to reproduce, prepare derivative works of,
* publicly display, publicly perform, distribute and
* sublicense the Contribution of such Contributor, if
* any, and such derivative works, in source code and
* object code form.
*
* b) Subject to the terms of this Agreement, each
* Contributor hereby grants Recipient a
* no - exclusive, worldwide, royalt - free patent
* license under Licensed Patents to make, use, sell,
* offer to sell, import and otherwise transfer the
* Contribution of such Contributor, if any, in source
* code and object code form. This patent license
* shall apply to the combination of the Contribution
* and the Program if, at the time the Contribution is
* added by the Contributor, such addition of the
* Contribution causes such combination to be covered
* by the Licensed Patents. The patent license shall
* not apply to any other combinations which include
* the Contribution. No hardware per se is licensed
* hereunder.
*
* c) Recipient understands that although each
* Contributor grants the licenses to its
* Contributions set forth herein, no assurances are
* provided by any Contributor that the Program does
* not infringe the patent or other intellectual
* property rights of any other entity. Each
* Contributor disclaims any liability to Recipient
* for claims brought by any other entity based on
* infringement of intellectual property rights or
* otherwise. As a condition to exercising the rights
* and licenses granted hereunder, each Recipient
* hereby assumes sole responsibility to secure any
* other intellectual property rights needed, if any.
*
* For example, if a third party patent license is
* required to allow Recipient to distribute the
* Program, it is Recipient's responsibility to
* acquire that license before distributing the
* Program.
*
* d) Each Contributor represents that to its
* knowledge it has sufficient copyright rights in its
* Contribution, if any, to grant the copyright
* license set forth in this Agreement.
*
* 3. REQUIREMENTS
*
* A Contributor may choose to distribute the Program in
* object code form under its own license agreement, provided
* that:
* a) it complies with the terms and conditions of
* this Agreement; and
*
* b) its license agreement:
* i) effectively disclaims on behalf of all
* Contributors all warranties and conditions, express
* and implied, including warranties or conditions of
* title and no - infringement, and implied warranties
* or conditions of merchantability and fitness for a
* particular purpose;
*
* ii) effectively excludes on behalf of all
* Contributors all liability for damages, including
* direct, indirect, special, incidental and
* consequential damages, such as lost profits;
*
* iii) states that any provisions which differ from
* this Agreement are offered by that Contributor
* alone and not by any other party; and
*
* iv) states that source code for the Program is
* available from such Contributor, and informs
* licensees how to obtain it in a reasonable manner
* on or through a medium customarily used for
* software exchange.
*
* When the Program is made available in source code form:
* a) it must be made available under this Agreement;
* and
* b) a copy of this Agreement must be included with
* each copy of the Program.
*
* Contributors may not remove or alter any copyright notices
* contained within the Program.
*
* Each Contributor must identify itself as the originator of
* its Contribution, if any, in a manner that reasonably
* allows subsequent Recipients to identify the originator of
* the Contribution.
*
*
* 4. COMMERCIAL DISTRIBUTION
*
* Commercial distributors of software may accept certain
* responsibilities with respect to end users, business
* partners and the like. While this license is intended to
* facilitate the commercial use of the Program, the
* Contributor who includes the Program in a commercial
* product offering should do so in a manner which does not
* create potential liability for other Contributors.
* Therefore, if a Contributor includes the Program in a
* commercial product offering, such Contributor ("Commercial
* Contributor") hereby agrees to defend and indemnify every
* other Contributor ("Indemnified Contributor") against any
* losses, damages and costs (collectively "Losses") arising
* from claims, lawsuits and other legal actions brought by a
* third party against the Indemnified Contributor to the
* extent caused by the acts or omissions of such Commercial
* Contributor in connection with its distribution of the
* Program in a commercial product offering. The obligations
* in this section do not apply to any claims or Losses
* relating to any actual or alleged intellectual property
* infringement. In order to qualify, an Indemnified
* Contributor must: a) promptly notify the Commercial
* Contributor in writing of such claim, and b) allow the
* Commercial Contributor to control, and cooperate with the
* Commercial Contributor in, the defense and any related
* settlement negotiations. The Indemnified Contributor may
* participate in any such claim at its own expense.
*
*
* For example, a Contributor might include the Program in a
* commercial product offering, Product X. That Contributor
* is then a Commercial Contributor. If that Commercial
* Contributor then makes performance claims, or offers
* warranties related to Product X, those performance claims
* and warranties are such Commercial Contributor's
* responsibility alone. Under this section, the Commercial
* Contributor would have to defend claims against the other
* Contributors related to those performance claims and
* warranties, and if a court requires any other Contributor
* to pay any damages as a result, the Commercial Contributor
* must pay those damages.
*
*
* 5. NO WARRANTY
*
* EXCEPT AS EXPRESSLY SET FORTH IN THIS AGREEMENT, THE
* PROGRAM IS PROVIDED ON AN "AS IS" BASIS, WITHOUT
* WARRANTIES OR CONDITIONS OF ANY KIND, EITHER EXPRESS OR
* IMPLIED INCLUDING, WITHOUT LIMITATION, ANY WARRANTIES OR
* CONDITIONS OF TITLE, NO - INFRINGEMENT, MERCHANTABILITY OR
* FITNESS FOR A PARTICULAR PURPOSE. Each Recipient is solely
* responsible for determining the appropriateness of using
* and distributing the Program and assumes all risks
* associated with its exercise of rights under this
* Agreement, including but not limited to the risks and
* costs of program errors, compliance with applicable laws,
* damage to or loss of data, programs or equipment, and
* unavailability or interruption of operations.
*
* 6. DISCLAIMER OF LIABILITY
* EXCEPT AS EXPRESSLY SET FORTH IN THIS AGREEMENT, NEITHER
* RECIPIENT NOR ANY CONTRIBUTORS SHALL HAVE ANY LIABILITY
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,
* OR CONSEQUENTIAL DAMAGES (INCLUDING WITHOUT LIMITATION
* LOST PROFITS), HOWEVER CAUSED AND ON ANY THEORY OF
* LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
* OF THE USE OR DISTRIBUTION OF THE PROGRAM OR THE EXERCISE
* OF ANY RIGHTS GRANTED HEREUNDER, EVEN IF ADVISED OF THE
* POSSIBILITY OF SUCH DAMAGES.
*
* 7. GENERAL
*
* If any provision of this Agreement is invalid or
* unenforceable under applicable law, it shall not affect
* the validity or enforceability of the remainder of the
* terms of this Agreement, and without further action by the
* parties hereto, such provision shall be reformed to the
* minimum extent necessary to make such provision valid and
* enforceable.
*
*
* If Recipient institutes patent litigation against a
* Contributor with respect to a patent applicable to
* software (including a cros - claim or counterclaim in a
* lawsuit), then any patent licenses granted by that
* Contributor to such Recipient under this Agreement shall
* terminate as of the date such litigation is filed. In
* addition, If Recipient institutes patent litigation
* against any entity (including a cros - claim or
* counterclaim in a lawsuit) alleging that the Program
* itself (excluding combinations of the Program with other
* software or hardware) infringes such Recipient's
* patent(s), then such Recipient's rights granted under
* Section 2(b) shall terminate as of the date such
* litigation is filed.
*
* All Recipient's rights under this Agreement shall
* terminate if it fails to comply with any of the material
* terms or conditions of this Agreement and does not cure
* such failure in a reasonable period of time after becoming
* aware of such noncompliance. If all Recipient's rights
* under this Agreement terminate, Recipient agrees to cease
* use and distribution of the Program as soon as reasonably
* practicable. However, Recipient's obligations under this
* Agreement and any licenses granted by Recipient relating
* to the Program shall continue and survive.
*
* Everyone is permitted to copy and distribute copies of
* this Agreement, but in order to avoid inconsistency the
* Agreement is copyrighted and may only be modified in the
* following manner. The Agreement Steward reserves the right
* to publish new versions (including revisions) of this
* Agreement from time to time. No one other than the
* Agreement Steward has the right to modify this Agreement.
*
* IBM is the initial Agreement Steward. IBM may assign the
* responsibility to serve as the Agreement Steward to a
* suitable separate entity. Each new version of the
* Agreement will be given a distinguishing version number.
* The Program (including Contributions) may always be
* distributed subject to the version of the Agreement under
* which it was received. In addition, after a new version of
* the Agreement is published, Contributor may elect to
* distribute the Program (including its Contributions) under
* the new version. Except as expressly stated in Sections
* 2(a) and 2(b) above, Recipient receives no rights or
* licenses to the intellectual property of any Contributor
* under this Agreement, whether expressly, by implication,
* estoppel or otherwise. All rights in the Program not
* expressly granted under this Agreement are reserved.
*
*
* This Agreement is governed by the laws of the State of New
* York and the intellectual property laws of the United
* States of America. No party to this Agreement will bring a
* legal action under this Agreement more than one year after
* the cause of action arose. Each party waives its rights to
* a jury trial in any resulting litigation.
*
*
*
* (C) COPYRIGHT International Business Machines Corp. 2001, 2002
*/
/*
* Copyright 2009 Sun Microsystems, Inc. All rights reserved.
* Use is subject to license terms.
*/
#include "tpmtok_int.h"
CK_RV
key_object_check_required_attributes(TEMPLATE *tmpl, CK_ULONG mode)
{
CK_ATTRIBUTE * attr = NULL;
CK_BBOOL found;
found = template_attribute_find(tmpl, CKA_KEY_TYPE, &attr);
if (! found) {
if (mode == MODE_CREATE) {
return (CKR_TEMPLATE_INCOMPLETE);
}
}
return (template_check_required_base_attributes(tmpl, mode));
}
CK_RV
key_object_set_default_attributes(TEMPLATE *tmpl, CK_ULONG mode)
{
CK_ATTRIBUTE * id_attr = NULL;
CK_ATTRIBUTE * sdate_attr = NULL;
CK_ATTRIBUTE * edate_attr = NULL;
CK_ATTRIBUTE * derive_attr = NULL;
CK_ATTRIBUTE * local_attr = NULL;
// satisfy the compiler
//
if (mode)
id_attr = NULL;
id_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE));
sdate_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE));
edate_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE));
derive_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
sizeof (CK_BBOOL));
local_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
sizeof (CK_BBOOL));
if (! id_attr || ! sdate_attr || ! edate_attr ||
! derive_attr || ! local_attr) {
if (id_attr) free(id_attr);
if (sdate_attr) free(sdate_attr);
if (edate_attr) free(edate_attr);
if (derive_attr) free(derive_attr);
if (local_attr) free(local_attr);
return (CKR_HOST_MEMORY);
}
id_attr->type = CKA_ID;
id_attr->ulValueLen = 0;
id_attr->pValue = NULL;
sdate_attr->type = CKA_START_DATE;
sdate_attr->ulValueLen = 0;
sdate_attr->pValue = NULL;
edate_attr->type = CKA_END_DATE;
edate_attr->ulValueLen = 0;
edate_attr->pValue = NULL;
derive_attr->type = CKA_DERIVE;
derive_attr->ulValueLen = sizeof (CK_BBOOL);
derive_attr->pValue = (CK_BYTE *)derive_attr +
sizeof (CK_ATTRIBUTE);
*(CK_BBOOL *)derive_attr->pValue = FALSE;
local_attr->type = CKA_LOCAL;
local_attr->ulValueLen = sizeof (CK_BBOOL);
local_attr->pValue = (CK_BYTE *)local_attr + sizeof (CK_ATTRIBUTE);
*(CK_BBOOL *)local_attr->pValue = FALSE;
(void) template_update_attribute(tmpl, id_attr);
(void) template_update_attribute(tmpl, sdate_attr);
(void) template_update_attribute(tmpl, edate_attr);
(void) template_update_attribute(tmpl, derive_attr);
(void) template_update_attribute(tmpl, local_attr);
return (CKR_OK);
}
CK_RV
key_object_validate_attribute(TEMPLATE *tmpl,
CK_ATTRIBUTE *attr, CK_ULONG mode)
{
switch (attr->type) {
case CKA_KEY_TYPE:
if (mode == MODE_CREATE || mode == MODE_DERIVE ||
mode == MODE_KEYGEN || mode == MODE_UNWRAP)
return (CKR_OK);
else {
return (CKR_ATTRIBUTE_READ_ONLY);
}
case CKA_ID:
case CKA_START_DATE:
case CKA_END_DATE:
case CKA_DERIVE:
return (CKR_OK);
case CKA_LOCAL:
return (CKR_ATTRIBUTE_READ_ONLY);
default:
return (template_validate_base_attribute(tmpl, attr, mode));
}
}
CK_RV
publ_key_check_required_attributes(TEMPLATE *tmpl, CK_ULONG mode) {
return (key_object_check_required_attributes(tmpl, mode));
}
CK_RV
publ_key_set_default_attributes(TEMPLATE *tmpl, CK_ULONG mode)
{
CK_ATTRIBUTE *class_attr = NULL;
CK_ATTRIBUTE *subject_attr = NULL;
CK_ATTRIBUTE *encrypt_attr = NULL;
CK_ATTRIBUTE *verify_attr = NULL;
CK_ATTRIBUTE *verify_recover_attr = NULL;
CK_ATTRIBUTE *wrap_attr = NULL;
CK_OBJECT_CLASS class = CKO_PUBLIC_KEY;
CK_RV rc;
rc = key_object_set_default_attributes(tmpl, mode);
if (rc != CKR_OK) {
return (rc);
}
//
// add the default CKO_PUBLIC_KEY attributes
//
class_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
sizeof (CK_OBJECT_CLASS));
subject_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE));
encrypt_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
sizeof (CK_BBOOL));
verify_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
sizeof (CK_BBOOL));
verify_recover_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
sizeof (CK_BBOOL));
wrap_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
sizeof (CK_BBOOL));
if (! class || ! subject_attr || ! encrypt_attr ||
! verify_attr || ! verify_recover_attr || ! wrap_attr) {
if (class_attr) free(class_attr);
if (subject_attr) free(subject_attr);
if (encrypt_attr) free(encrypt_attr);
if (verify_attr) free(verify_attr);
if (verify_recover_attr) free(verify_recover_attr);
if (wrap_attr) free(wrap_attr);
return (CKR_HOST_MEMORY);
}
class_attr->type = CKA_CLASS;
class_attr->ulValueLen = sizeof (CK_OBJECT_CLASS);
class_attr->pValue = (CK_BYTE *)class_attr +
sizeof (CK_ATTRIBUTE);
*(CK_OBJECT_CLASS *)class_attr->pValue = CKO_PUBLIC_KEY;
subject_attr->type = CKA_SUBJECT;
subject_attr->ulValueLen = 0; // empty string
subject_attr->pValue = NULL;
encrypt_attr->type = CKA_ENCRYPT;
encrypt_attr->ulValueLen = sizeof (CK_BBOOL);
encrypt_attr->pValue = (CK_BYTE *)encrypt_attr +
sizeof (CK_ATTRIBUTE);
*(CK_BBOOL *)encrypt_attr->pValue = TRUE;
verify_attr->type = CKA_VERIFY;
verify_attr->ulValueLen = sizeof (CK_BBOOL);
verify_attr->pValue = (CK_BYTE *)verify_attr +
sizeof (CK_ATTRIBUTE);
*(CK_BBOOL *)verify_attr->pValue = TRUE;
verify_recover_attr->type = CKA_VERIFY_RECOVER;
verify_recover_attr->ulValueLen = sizeof (CK_BBOOL);
verify_recover_attr->pValue = (CK_BYTE *)verify_recover_attr +
sizeof (CK_ATTRIBUTE);
*(CK_BBOOL *)verify_recover_attr->pValue = TRUE;
wrap_attr->type = CKA_WRAP;
wrap_attr->ulValueLen = sizeof (CK_BBOOL);
wrap_attr->pValue = (CK_BYTE *)wrap_attr +
sizeof (CK_ATTRIBUTE);
*(CK_BBOOL *)wrap_attr->pValue = TRUE;
(void) template_update_attribute(tmpl, class_attr);
(void) template_update_attribute(tmpl, subject_attr);
(void) template_update_attribute(tmpl, encrypt_attr);
(void) template_update_attribute(tmpl, verify_attr);
(void) template_update_attribute(tmpl, verify_recover_attr);
(void) template_update_attribute(tmpl, wrap_attr);
return (CKR_OK);
}
CK_RV
publ_key_validate_attribute(TEMPLATE *tmpl,
CK_ATTRIBUTE *attr, CK_ULONG mode) {
switch (attr->type) {
case CKA_SUBJECT:
return (CKR_OK);
case CKA_ENCRYPT:
case CKA_VERIFY:
case CKA_VERIFY_RECOVER:
case CKA_WRAP:
if (mode == MODE_MODIFY) {
if (nv_token_data->tweak_vector.allow_key_mods == TRUE)
return (CKR_OK);
return (CKR_ATTRIBUTE_READ_ONLY);
}
return (CKR_OK);
default:
return (key_object_validate_attribute(tmpl, attr, mode));
}
}
CK_RV
priv_key_check_required_attributes(TEMPLATE *tmpl, CK_ULONG mode) {
return (key_object_check_required_attributes(tmpl, mode));
}
CK_RV
priv_key_set_default_attributes(TEMPLATE *tmpl, CK_ULONG mode)
{
CK_ATTRIBUTE *class_attr = NULL;
CK_ATTRIBUTE *subject_attr = NULL;
CK_ATTRIBUTE *sensitive_attr = NULL;
CK_ATTRIBUTE *decrypt_attr = NULL;
CK_ATTRIBUTE *sign_attr = NULL;
CK_ATTRIBUTE *sign_recover_attr = NULL;
CK_ATTRIBUTE *unwrap_attr = NULL;
CK_ATTRIBUTE *extractable_attr = NULL;
CK_ATTRIBUTE *never_extr_attr = NULL;
CK_ATTRIBUTE *always_sens_attr = NULL;
CK_RV rc;
rc = key_object_set_default_attributes(tmpl, mode);
if (rc != CKR_OK) {
return (rc);
}
class_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
sizeof (CK_OBJECT_CLASS));
subject_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE));
sensitive_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
sizeof (CK_BBOOL));
decrypt_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
sizeof (CK_BBOOL));
sign_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
sizeof (CK_BBOOL));
sign_recover_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
sizeof (CK_BBOOL));
unwrap_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
sizeof (CK_BBOOL));
extractable_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
sizeof (CK_BBOOL));
never_extr_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
sizeof (CK_BBOOL));
always_sens_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
sizeof (CK_BBOOL));
if (! class_attr || ! subject_attr || ! sensitive_attr ||
! decrypt_attr || ! sign_attr || ! sign_recover_attr ||
! unwrap_attr || ! extractable_attr ||
! never_extr_attr || ! always_sens_attr) {
if (class_attr) free(class_attr);
if (subject_attr) free(subject_attr);
if (sensitive_attr) free(sensitive_attr);
if (decrypt_attr) free(decrypt_attr);
if (sign_attr) free(sign_attr);
if (sign_recover_attr) free(sign_recover_attr);
if (unwrap_attr) free(unwrap_attr);
if (extractable_attr) free(extractable_attr);
if (always_sens_attr) free(always_sens_attr);
if (never_extr_attr) free(never_extr_attr);
return (CKR_HOST_MEMORY);
}
class_attr->type = CKA_CLASS;
class_attr->ulValueLen = sizeof (CK_OBJECT_CLASS);
class_attr->pValue = (CK_BYTE *)class_attr + sizeof (CK_ATTRIBUTE);
*(CK_OBJECT_CLASS *)class_attr->pValue = CKO_PRIVATE_KEY;
subject_attr->type = CKA_SUBJECT;
subject_attr->ulValueLen = 0; // empty string
subject_attr->pValue = NULL;
sensitive_attr->type = CKA_SENSITIVE;
sensitive_attr->ulValueLen = sizeof (CK_BBOOL);
sensitive_attr->pValue = (CK_BYTE *)sensitive_attr +
sizeof (CK_ATTRIBUTE);
*(CK_BBOOL *)sensitive_attr->pValue = FALSE;
decrypt_attr->type = CKA_DECRYPT;
decrypt_attr->ulValueLen = sizeof (CK_BBOOL);
decrypt_attr->pValue = (CK_BYTE *)decrypt_attr +
sizeof (CK_ATTRIBUTE);
*(CK_BBOOL *)decrypt_attr->pValue = TRUE;
sign_attr->type = CKA_SIGN;
sign_attr->ulValueLen = sizeof (CK_BBOOL);
sign_attr->pValue = (CK_BYTE *)sign_attr +
sizeof (CK_ATTRIBUTE);
*(CK_BBOOL *)sign_attr->pValue = TRUE;
sign_recover_attr->type = CKA_SIGN_RECOVER;
sign_recover_attr->ulValueLen = sizeof (CK_BBOOL);
sign_recover_attr->pValue = (CK_BYTE *)sign_recover_attr +
sizeof (CK_ATTRIBUTE);
*(CK_BBOOL *)sign_recover_attr->pValue = TRUE;
unwrap_attr->type = CKA_UNWRAP;
unwrap_attr->ulValueLen = sizeof (CK_BBOOL);
unwrap_attr->pValue = (CK_BYTE *)unwrap_attr +
sizeof (CK_ATTRIBUTE);
*(CK_BBOOL *)unwrap_attr->pValue = TRUE;
extractable_attr->type = CKA_EXTRACTABLE;
extractable_attr->ulValueLen = sizeof (CK_BBOOL);
extractable_attr->pValue = (CK_BYTE *)extractable_attr +
sizeof (CK_ATTRIBUTE);
*(CK_BBOOL *)extractable_attr->pValue = TRUE;
never_extr_attr->type = CKA_NEVER_EXTRACTABLE;
never_extr_attr->ulValueLen = sizeof (CK_BBOOL);
never_extr_attr->pValue = (CK_BYTE *)never_extr_attr +
sizeof (CK_ATTRIBUTE);
*(CK_BBOOL *)never_extr_attr->pValue = FALSE;
always_sens_attr->type = CKA_ALWAYS_SENSITIVE;
always_sens_attr->ulValueLen = sizeof (CK_BBOOL);
always_sens_attr->pValue = (CK_BYTE *)always_sens_attr +
sizeof (CK_ATTRIBUTE);
*(CK_BBOOL *)always_sens_attr->pValue = FALSE;
(void) template_update_attribute(tmpl, class_attr);
(void) template_update_attribute(tmpl, subject_attr);
(void) template_update_attribute(tmpl, sensitive_attr);
(void) template_update_attribute(tmpl, decrypt_attr);
(void) template_update_attribute(tmpl, sign_attr);
(void) template_update_attribute(tmpl, sign_recover_attr);
(void) template_update_attribute(tmpl, unwrap_attr);
(void) template_update_attribute(tmpl, extractable_attr);
(void) template_update_attribute(tmpl, never_extr_attr);
(void) template_update_attribute(tmpl, always_sens_attr);
return (CKR_OK);
}
CK_RV
priv_key_unwrap(TEMPLATE *tmpl,
CK_ULONG keytype,
CK_BYTE *data,
CK_ULONG data_len)
{
CK_ATTRIBUTE *extractable = NULL;
CK_ATTRIBUTE *always_sens = NULL;
CK_ATTRIBUTE *never_extract = NULL;
CK_ATTRIBUTE *sensitive = NULL;
CK_ATTRIBUTE *local = NULL;
CK_BBOOL true = TRUE;
CK_BBOOL false = FALSE;
CK_RV rc;
switch (keytype) {
case CKK_RSA:
rc = rsa_priv_unwrap(tmpl, data, data_len);
break;
default:
return (CKR_WRAPPED_KEY_INVALID);
}
if (rc != CKR_OK) {
return (rc);
}
/*
* make sure
* CKA_LOCAL == FALSE
* CKA_ALWAYS_SENSITIVE == FALSE
* CKA_EXTRACTABLE == TRUE
* CKA_NEVER_EXTRACTABLE == FALSE
*/
rc = build_attribute(CKA_LOCAL, &false, 1, &local);
if (rc != CKR_OK) {
goto cleanup;
}
rc = build_attribute(CKA_ALWAYS_SENSITIVE, &false, 1, &always_sens);
if (rc != CKR_OK) {
goto cleanup;
}
rc = build_attribute(CKA_SENSITIVE, &false, 1, &sensitive);
if (rc != CKR_OK) {
goto cleanup;
}
rc = build_attribute(CKA_EXTRACTABLE, &true, 1, &extractable);
if (rc != CKR_OK) {
goto cleanup;
}
rc = build_attribute(CKA_NEVER_EXTRACTABLE, &false, 1, &never_extract);
if (rc != CKR_OK) {
goto cleanup;
}
(void) template_update_attribute(tmpl, local);
(void) template_update_attribute(tmpl, always_sens);
(void) template_update_attribute(tmpl, sensitive);
(void) template_update_attribute(tmpl, extractable);
(void) template_update_attribute(tmpl, never_extract);
return (CKR_OK);
cleanup:
if (local) free(local);
if (always_sens) free(always_sens);
if (extractable) free(extractable);
if (never_extract) free(never_extract);
return (rc);
}
CK_RV
priv_key_validate_attribute(TEMPLATE *tmpl, CK_ATTRIBUTE *attr, CK_ULONG mode) {
switch (attr->type) {
case CKA_SUBJECT:
return (CKR_OK);
case CKA_DECRYPT:
case CKA_SIGN:
case CKA_SIGN_RECOVER:
case CKA_UNWRAP:
// we might want to do this for MODE_COPY too
//
if (mode == MODE_MODIFY) {
if (nv_token_data->tweak_vector.allow_key_mods == TRUE)
return (CKR_OK);
return (CKR_ATTRIBUTE_READ_ONLY);
}
return (CKR_OK);
// after key creation, CKA_SENSITIVE may only be set to TRUE
//
case CKA_SENSITIVE:
{
CK_BBOOL value;
if (mode == MODE_CREATE || mode == MODE_KEYGEN)
return (CKR_OK);
value = *(CK_BBOOL *)attr->pValue;
if (value != TRUE) {
return (CKR_ATTRIBUTE_READ_ONLY);
}
}
return (CKR_OK);
case CKA_EXTRACTABLE:
{
CK_BBOOL value;
value = *(CK_BBOOL *)attr->pValue;
if ((mode != MODE_CREATE && mode != MODE_KEYGEN) &&
value != FALSE) {
return (CKR_ATTRIBUTE_READ_ONLY);
}
if (value == FALSE) {
CK_ATTRIBUTE *attr;
attr = (CK_ATTRIBUTE *)malloc(
sizeof (CK_ATTRIBUTE) + sizeof (CK_BBOOL));
if (! attr) {
return (CKR_HOST_MEMORY);
}
attr->type = CKA_NEVER_EXTRACTABLE;
attr->ulValueLen = sizeof (CK_BBOOL);
attr->pValue = (CK_BYTE *)attr +
sizeof (CK_ATTRIBUTE);
*(CK_BBOOL *)attr->pValue = FALSE;
(void) template_update_attribute(tmpl, attr);
}
}
return (CKR_OK);
case CKA_ALWAYS_SENSITIVE:
case CKA_NEVER_EXTRACTABLE:
return (CKR_ATTRIBUTE_READ_ONLY);
default:
return (key_object_validate_attribute(tmpl, attr, mode));
}
}
CK_RV
secret_key_check_required_attributes(TEMPLATE *tmpl, CK_ULONG mode)
{
return (key_object_check_required_attributes(tmpl, mode));
}
CK_RV
secret_key_set_default_attributes(TEMPLATE *tmpl, CK_ULONG mode)
{
CK_ATTRIBUTE *class_attr = NULL;
CK_ATTRIBUTE *sensitive_attr = NULL;
CK_ATTRIBUTE *encrypt_attr = NULL;
CK_ATTRIBUTE *decrypt_attr = NULL;
CK_ATTRIBUTE *sign_attr = NULL;
CK_ATTRIBUTE *verify_attr = NULL;
CK_ATTRIBUTE *wrap_attr = NULL;
CK_ATTRIBUTE *unwrap_attr = NULL;
CK_ATTRIBUTE *extractable_attr = NULL;
CK_ATTRIBUTE *never_extr_attr = NULL;
CK_ATTRIBUTE *always_sens_attr = NULL;
CK_RV rc;
rc = key_object_set_default_attributes(tmpl, mode);
if (rc != CKR_OK)
return (rc);
class_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
sizeof (CK_OBJECT_CLASS));
sensitive_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
sizeof (CK_BBOOL));
encrypt_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
sizeof (CK_BBOOL));
decrypt_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
sizeof (CK_BBOOL));
sign_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
sizeof (CK_BBOOL));
verify_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
sizeof (CK_BBOOL));
wrap_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
sizeof (CK_BBOOL));
unwrap_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
sizeof (CK_BBOOL));
extractable_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
sizeof (CK_BBOOL));
never_extr_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
sizeof (CK_BBOOL));
always_sens_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
sizeof (CK_BBOOL));
if (! class_attr || ! sensitive_attr || ! encrypt_attr ||
! decrypt_attr || ! sign_attr || ! verify_attr ||
! wrap_attr || ! unwrap_attr || ! extractable_attr ||
! never_extr_attr || ! always_sens_attr) {
if (class_attr) free(class_attr);
if (sensitive_attr) free(sensitive_attr);
if (encrypt_attr) free(encrypt_attr);
if (decrypt_attr) free(decrypt_attr);
if (sign_attr) free(sign_attr);
if (verify_attr) free(verify_attr);
if (wrap_attr) free(wrap_attr);
if (unwrap_attr) free(unwrap_attr);
if (extractable_attr) free(extractable_attr);
if (never_extr_attr) free(never_extr_attr);
if (always_sens_attr) free(always_sens_attr);
return (CKR_HOST_MEMORY);
}
class_attr->type = CKA_CLASS;
class_attr->ulValueLen = sizeof (CK_OBJECT_CLASS);
class_attr->pValue = (CK_BYTE *)class_attr +
sizeof (CK_ATTRIBUTE);
*(CK_OBJECT_CLASS *)class_attr->pValue = CKO_SECRET_KEY;
sensitive_attr->type = CKA_SENSITIVE;
sensitive_attr->ulValueLen = sizeof (CK_BBOOL);
sensitive_attr->pValue = (CK_BYTE *)sensitive_attr +
sizeof (CK_ATTRIBUTE);
*(CK_BBOOL *)sensitive_attr->pValue = FALSE;
encrypt_attr->type = CKA_ENCRYPT;
encrypt_attr->ulValueLen = sizeof (CK_BBOOL);
encrypt_attr->pValue = (CK_BYTE *)encrypt_attr +
sizeof (CK_ATTRIBUTE);
*(CK_BBOOL *)encrypt_attr->pValue = TRUE;
decrypt_attr->type = CKA_DECRYPT;
decrypt_attr->ulValueLen = sizeof (CK_BBOOL);
decrypt_attr->pValue = (CK_BYTE *)decrypt_attr +
sizeof (CK_ATTRIBUTE);
*(CK_BBOOL *)decrypt_attr->pValue = TRUE;
sign_attr->type = CKA_SIGN;
sign_attr->ulValueLen = sizeof (CK_BBOOL);
sign_attr->pValue = (CK_BYTE *)sign_attr +
sizeof (CK_ATTRIBUTE);
*(CK_BBOOL *)sign_attr->pValue = TRUE;
verify_attr->type = CKA_VERIFY;
verify_attr->ulValueLen = sizeof (CK_BBOOL);
verify_attr->pValue = (CK_BYTE *)verify_attr +
sizeof (CK_ATTRIBUTE);
*(CK_BBOOL *)verify_attr->pValue = TRUE;
wrap_attr->type = CKA_WRAP;
wrap_attr->ulValueLen = sizeof (CK_BBOOL);
wrap_attr->pValue = (CK_BYTE *)wrap_attr +
sizeof (CK_ATTRIBUTE);
*(CK_BBOOL *)wrap_attr->pValue = TRUE;
unwrap_attr->type = CKA_UNWRAP;
unwrap_attr->ulValueLen = sizeof (CK_BBOOL);
unwrap_attr->pValue = (CK_BYTE *)unwrap_attr +
sizeof (CK_ATTRIBUTE);
*(CK_BBOOL *)unwrap_attr->pValue = TRUE;
extractable_attr->type = CKA_EXTRACTABLE;
extractable_attr->ulValueLen = sizeof (CK_BBOOL);
extractable_attr->pValue = (CK_BYTE *)extractable_attr +
sizeof (CK_ATTRIBUTE);
*(CK_BBOOL *)extractable_attr->pValue = TRUE;
always_sens_attr->type = CKA_ALWAYS_SENSITIVE;
always_sens_attr->ulValueLen = sizeof (CK_BBOOL);
always_sens_attr->pValue = (CK_BYTE *)always_sens_attr +
sizeof (CK_ATTRIBUTE);
*(CK_BBOOL *)always_sens_attr->pValue = FALSE;
never_extr_attr->type = CKA_NEVER_EXTRACTABLE;
never_extr_attr->ulValueLen = sizeof (CK_BBOOL);
never_extr_attr->pValue = (CK_BYTE *)never_extr_attr +
sizeof (CK_ATTRIBUTE);
*(CK_BBOOL *)never_extr_attr->pValue = FALSE;
(void) template_update_attribute(tmpl, class_attr);
(void) template_update_attribute(tmpl, sensitive_attr);
(void) template_update_attribute(tmpl, encrypt_attr);
(void) template_update_attribute(tmpl, decrypt_attr);
(void) template_update_attribute(tmpl, sign_attr);
(void) template_update_attribute(tmpl, verify_attr);
(void) template_update_attribute(tmpl, wrap_attr);
(void) template_update_attribute(tmpl, unwrap_attr);
(void) template_update_attribute(tmpl, extractable_attr);
(void) template_update_attribute(tmpl, never_extr_attr);
(void) template_update_attribute(tmpl, always_sens_attr);
return (CKR_OK);
}
CK_RV
secret_key_unwrap(TEMPLATE *tmpl,
CK_ULONG keytype,
CK_BYTE *data,
CK_ULONG data_len,
CK_BBOOL fromend)
{
CK_ATTRIBUTE *local = NULL;
CK_ATTRIBUTE *always_sens = NULL;
CK_ATTRIBUTE *sensitive = NULL;
CK_ATTRIBUTE *extractable = NULL;
CK_ATTRIBUTE *never_extract = NULL;
CK_BBOOL true = TRUE;
CK_BBOOL false = FALSE;
CK_RV rc;
switch (keytype) {
case CKK_GENERIC_SECRET:
rc = generic_secret_unwrap(tmpl, data, data_len, fromend);
break;
default:
return (CKR_WRAPPED_KEY_INVALID);
}
if (rc != CKR_OK)
return (rc);
// make sure
// CKA_LOCAL == FALSE
// CKA_ALWAYS_SENSITIVE == FALSE
// CKA_EXTRACTABLE == TRUE
// CKA_NEVER_EXTRACTABLE == FALSE
//
rc = build_attribute(CKA_LOCAL, &false, 1, &local);
if (rc != CKR_OK) {
goto cleanup;
}
rc = build_attribute(CKA_ALWAYS_SENSITIVE, &false, 1, &always_sens);
if (rc != CKR_OK) {
goto cleanup;
}
rc = build_attribute(CKA_SENSITIVE, &false, 1, &sensitive);
if (rc != CKR_OK) {
goto cleanup;
}
rc = build_attribute(CKA_EXTRACTABLE, &true, 1, &extractable);
if (rc != CKR_OK) {
goto cleanup;
}
rc = build_attribute(CKA_NEVER_EXTRACTABLE, &false, 1, &never_extract);
if (rc != CKR_OK) {
goto cleanup;
}
(void) template_update_attribute(tmpl, local);
(void) template_update_attribute(tmpl, always_sens);
(void) template_update_attribute(tmpl, sensitive);
(void) template_update_attribute(tmpl, extractable);
(void) template_update_attribute(tmpl, never_extract);
return (CKR_OK);
cleanup:
if (local) free(local);
if (extractable) free(extractable);
if (always_sens) free(always_sens);
if (never_extract) free(never_extract);
return (rc);
}
CK_RV
secret_key_validate_attribute(TEMPLATE *tmpl, CK_ATTRIBUTE *attr,
CK_ULONG mode)
{
switch (attr->type) {
case CKA_ENCRYPT:
case CKA_DECRYPT:
case CKA_SIGN:
case CKA_VERIFY:
case CKA_WRAP:
case CKA_UNWRAP:
if (mode == MODE_MODIFY) {
if (nv_token_data->tweak_vector.allow_key_mods == TRUE)
return (CKR_OK);
return (CKR_ATTRIBUTE_READ_ONLY);
}
return (CKR_OK);
// after key creation, CKA_SENSITIVE may only be set to TRUE
//
case CKA_SENSITIVE:
{
CK_BBOOL value;
value = *(CK_BBOOL *)attr->pValue;
if ((mode != MODE_CREATE && mode != MODE_DERIVE &&
mode != MODE_KEYGEN) && (value != TRUE)) {
return (CKR_ATTRIBUTE_READ_ONLY);
}
}
return (CKR_OK);
case CKA_EXTRACTABLE:
{
CK_BBOOL value;
value = *(CK_BBOOL *)attr->pValue;
if ((mode != MODE_CREATE && mode != MODE_DERIVE &&
mode != MODE_KEYGEN) && (value != FALSE)) {
return (CKR_ATTRIBUTE_READ_ONLY);
}
if (value == FALSE) {
CK_ATTRIBUTE *attr;
attr = (CK_ATTRIBUTE *)malloc(
sizeof (CK_ATTRIBUTE) + sizeof (CK_BBOOL));
if (! attr) {
return (CKR_HOST_MEMORY);
}
attr->type = CKA_NEVER_EXTRACTABLE;
attr->ulValueLen = sizeof (CK_BBOOL);
attr->pValue = (CK_BYTE *)attr +
sizeof (CK_ATTRIBUTE);
*(CK_BBOOL *)attr->pValue = FALSE;
(void) template_update_attribute(tmpl, attr);
}
}
return (CKR_OK);
case CKA_ALWAYS_SENSITIVE:
case CKA_NEVER_EXTRACTABLE:
return (CKR_ATTRIBUTE_READ_ONLY);
default:
return (key_object_validate_attribute(tmpl,
attr, mode));
}
}
CK_BBOOL
secret_key_check_exportability(CK_ATTRIBUTE_TYPE type)
{
switch (type) {
case CKA_VALUE:
return (FALSE);
}
return (TRUE);
}
CK_RV
rsa_publ_check_required_attributes(TEMPLATE *tmpl, CK_ULONG mode)
{
CK_ATTRIBUTE *attr = NULL;
CK_BBOOL found;
found = template_attribute_find(tmpl, CKA_MODULUS, &attr);
if (! found) {
if (mode == MODE_CREATE) {
return (CKR_TEMPLATE_INCOMPLETE);
}
}
found = template_attribute_find(tmpl, CKA_MODULUS_BITS, &attr);
if (! found) {
if (mode == MODE_KEYGEN) {
return (CKR_TEMPLATE_INCOMPLETE);
}
}
found = template_attribute_find(tmpl, CKA_PUBLIC_EXPONENT, &attr);
if (! found) {
if (mode == MODE_CREATE || mode == MODE_KEYGEN) {
return (CKR_TEMPLATE_INCOMPLETE);
}
}
return (publ_key_check_required_attributes(tmpl, mode));
}
CK_RV
rsa_publ_set_default_attributes(TEMPLATE *tmpl, CK_ULONG mode)
{
CK_ATTRIBUTE *type_attr = NULL;
CK_ATTRIBUTE *modulus_attr = NULL;
CK_ATTRIBUTE *modulus_bits_attr = NULL;
CK_ATTRIBUTE *public_exp_attr = NULL;
CK_ULONG bits = 0L;
(void) publ_key_set_default_attributes(tmpl, mode);
type_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
sizeof (CK_KEY_TYPE));
modulus_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE));
modulus_bits_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
sizeof (CK_ULONG));
public_exp_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE));
if (! type_attr || ! modulus_attr ||
! modulus_bits_attr || ! public_exp_attr) {
if (type_attr) free(type_attr);
if (modulus_attr) free(modulus_attr);
if (modulus_bits_attr) free(modulus_bits_attr);
if (public_exp_attr) free(public_exp_attr);
return (CKR_HOST_MEMORY);
}
type_attr->type = CKA_KEY_TYPE;
type_attr->ulValueLen = sizeof (CK_KEY_TYPE);
type_attr->pValue = (CK_BYTE *)type_attr +
sizeof (CK_ATTRIBUTE);
*(CK_KEY_TYPE *)type_attr->pValue = CKK_RSA;
modulus_attr->type = CKA_MODULUS;
modulus_attr->ulValueLen = 0;
modulus_attr->pValue = NULL;
modulus_bits_attr->type = CKA_MODULUS_BITS;
modulus_bits_attr->ulValueLen = sizeof (CK_ULONG);
modulus_bits_attr->pValue = (CK_BYTE *)modulus_bits_attr +
sizeof (CK_ATTRIBUTE);
*(CK_ULONG *)modulus_bits_attr->pValue = bits;
public_exp_attr->type = CKA_PUBLIC_EXPONENT;
public_exp_attr->ulValueLen = 0;
public_exp_attr->pValue = NULL;
(void) template_update_attribute(tmpl, type_attr);
(void) template_update_attribute(tmpl, modulus_attr);
(void) template_update_attribute(tmpl, modulus_bits_attr);
(void) template_update_attribute(tmpl, public_exp_attr);
return (CKR_OK);
}
CK_RV
rsa_publ_validate_attribute(TEMPLATE *tmpl, CK_ATTRIBUTE *attr, CK_ULONG mode) {
switch (attr->type) {
case CKA_MODULUS_BITS:
if (mode == MODE_KEYGEN) {
if (attr->ulValueLen != sizeof (CK_ULONG)) {
return (CKR_ATTRIBUTE_VALUE_INVALID);
} else {
CK_ULONG mod_bits = *(CK_ULONG *)attr->pValue;
if (mod_bits < 512 || mod_bits > 2048) {
return (CKR_ATTRIBUTE_VALUE_INVALID);
}
if (mod_bits % 8 != 0) {
return (CKR_ATTRIBUTE_VALUE_INVALID);
}
return (CKR_OK);
}
} else {
return (CKR_ATTRIBUTE_READ_ONLY);
}
case CKA_MODULUS:
if (mode == MODE_CREATE)
return (remove_leading_zeros(attr));
else {
return (CKR_ATTRIBUTE_READ_ONLY);
}
case CKA_PUBLIC_EXPONENT:
if (mode == MODE_CREATE || mode == MODE_KEYGEN)
return (remove_leading_zeros(attr));
else {
return (CKR_ATTRIBUTE_READ_ONLY);
}
default:
return (publ_key_validate_attribute(tmpl, attr, mode));
}
}
CK_RV
rsa_priv_check_required_attributes(TEMPLATE *tmpl, CK_ULONG mode) {
CK_ATTRIBUTE *attr = NULL;
CK_BBOOL found;
found = template_attribute_find(tmpl, CKA_MODULUS, &attr);
if (! found) {
if (mode == MODE_CREATE) {
return (CKR_TEMPLATE_INCOMPLETE);
}
}
//
// PKCS #11 is flexible with respect to which attributes must be present
// in an RSA key. Keys can be specified in Chinese Remainder format or
// they can be specified in modula exponent format. Right now, I only
// support keys created in Chinese Remainder format. That is, we return
// CKR_TEMPLATE_INCOMPLETE if a modula exponent key is specified. This
// is allowed by PKCS #11.
//
// In the future, we should allow for creation of keys in modula exp
// format too. This raises some issues. It's easy enough to recognize
// when a key has been specified in modula exponent format. And it's
// easy enough to recognize when all attributes have been specified
// (which is what we require right now). What's trickier to handle is
// the "middle" cases in which more than the minimum yet less than the
// full number of attributes have been specified. Do we revert back to
// modula - exponent representation? Do we compute the missing
// attributes ourselves? Do we simply return CKR_TEMPLATE_INCOMPLETE?
//
found = template_attribute_find(tmpl, CKA_PUBLIC_EXPONENT, &attr);
if (! found) {
if (mode == MODE_CREATE) {
return (CKR_TEMPLATE_INCOMPLETE);
}
}
found = template_attribute_find(tmpl, CKA_PRIVATE_EXPONENT, &attr);
if (! found) {
if (mode == MODE_CREATE) {
return (CKR_TEMPLATE_INCOMPLETE);
}
}
found = template_attribute_find(tmpl, CKA_PRIME_1, &attr);
if (! found) {
if (mode == MODE_CREATE) {
return (CKR_TEMPLATE_INCOMPLETE);
}
}
found = template_attribute_find(tmpl, CKA_PRIME_2, &attr);
if (! found) {
if (mode == MODE_CREATE) {
return (CKR_TEMPLATE_INCOMPLETE);
}
}
found = template_attribute_find(tmpl, CKA_EXPONENT_1, &attr);
if (! found) {
if (mode == MODE_CREATE) {
return (CKR_TEMPLATE_INCOMPLETE);
}
}
found = template_attribute_find(tmpl, CKA_EXPONENT_2, &attr);
if (! found) {
if (mode == MODE_CREATE) {
return (CKR_TEMPLATE_INCOMPLETE);
}
}
found = template_attribute_find(tmpl, CKA_COEFFICIENT, &attr);
if (! found) {
if (mode == MODE_CREATE) {
return (CKR_TEMPLATE_INCOMPLETE);
}
}
return (priv_key_check_required_attributes(tmpl, mode));
}
CK_RV
rsa_priv_set_default_attributes(TEMPLATE *tmpl, CK_ULONG mode)
{
CK_ATTRIBUTE *modulus_attr = NULL;
CK_ATTRIBUTE *public_exp_attr = NULL;
CK_ATTRIBUTE *private_exp_attr = NULL;
CK_ATTRIBUTE *type_attr = NULL;
(void) priv_key_set_default_attributes(tmpl, mode);
type_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
sizeof (CK_KEY_TYPE));
modulus_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE));
public_exp_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE));
private_exp_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE));
if (! type_attr || ! modulus_attr || ! public_exp_attr ||
! private_exp_attr) {
if (type_attr) free(type_attr);
if (modulus_attr) free(modulus_attr);
if (public_exp_attr) free(public_exp_attr);
if (private_exp_attr) free(private_exp_attr);
return (CKR_HOST_MEMORY);
}
modulus_attr->type = CKA_MODULUS;
modulus_attr->ulValueLen = 0;
modulus_attr->pValue = NULL;
public_exp_attr->type = CKA_PUBLIC_EXPONENT;
public_exp_attr->ulValueLen = 0;
public_exp_attr->pValue = NULL;
private_exp_attr->type = CKA_PRIVATE_EXPONENT;
private_exp_attr->ulValueLen = 0;
private_exp_attr->pValue = NULL;
type_attr->type = CKA_KEY_TYPE;
type_attr->ulValueLen = sizeof (CK_KEY_TYPE);
type_attr->pValue = (CK_BYTE *)type_attr + sizeof (CK_ATTRIBUTE);
*(CK_KEY_TYPE *)type_attr->pValue = CKK_RSA;
(void) template_update_attribute(tmpl, type_attr);
(void) template_update_attribute(tmpl, modulus_attr);
(void) template_update_attribute(tmpl, public_exp_attr);
(void) template_update_attribute(tmpl, private_exp_attr);
return (CKR_OK);
}
CK_RV
rsa_priv_validate_attribute(TEMPLATE *tmpl, CK_ATTRIBUTE *attr, CK_ULONG mode) {
switch (attr->type) {
case CKA_MODULUS:
case CKA_PRIVATE_EXPONENT:
if (mode == MODE_CREATE)
return (remove_leading_zeros(attr));
else {
return (CKR_ATTRIBUTE_READ_ONLY);
}
case CKA_PUBLIC_EXPONENT:
case CKA_PRIME_1:
case CKA_PRIME_2:
case CKA_EXPONENT_1:
case CKA_EXPONENT_2:
case CKA_COEFFICIENT:
if (mode == MODE_CREATE)
return (remove_leading_zeros(attr));
else {
return (CKR_ATTRIBUTE_READ_ONLY);
}
default:
return (priv_key_validate_attribute(tmpl, attr, mode));
}
}
CK_BBOOL
rsa_priv_check_exportability(CK_ATTRIBUTE_TYPE type) {
switch (type) {
case CKA_PRIVATE_EXPONENT:
case CKA_PRIME_1:
case CKA_PRIME_2:
case CKA_EXPONENT_1:
case CKA_EXPONENT_2:
case CKA_COEFFICIENT:
return (FALSE);
}
return (TRUE);
}
/*
* create the ASN.1 encoding for the private key for wrapping as defined
* in PKCS #8
*
* ASN.1 type PrivateKeyInfo ::= SEQUENCE {
* version Version
* privateKeyAlgorithm PrivateKeyAlgorithmIdentifier
* privateKey PrivateKey
* attributes OPTIONAL
*
* }
*
* Where PrivateKey is defined as follows for RSA:
*
* ASN.1 type RSAPrivateKey
*
* RSAPrivateKey ::= SEQUENCE {
* version Version
* modulus INTEGER
* publicExponent INTEGER
* privateExponent INTEGER
* prime1 INTEGER
* prime2 INTEGER
* exponent1 INTEGER
* exponent2 INTEGER
* coefficient INTEGER
* }
*/
CK_RV
rsa_priv_wrap_get_data(TEMPLATE *tmpl,
CK_BBOOL length_only,
CK_BYTE **data,
CK_ULONG *data_len)
{
CK_ATTRIBUTE *modulus = NULL;
CK_ATTRIBUTE *publ_exp = NULL, *priv_exp = NULL;
CK_ATTRIBUTE *prime1 = NULL, *prime2 = NULL;
CK_ATTRIBUTE *exponent1 = NULL, *exponent2 = NULL;
CK_ATTRIBUTE *coeff = NULL;
CK_RV rc;
if (template_attribute_find(tmpl, CKA_MODULUS, &modulus) == FALSE) {
return (CKR_FUNCTION_FAILED);
}
if (template_attribute_find(tmpl, CKA_PUBLIC_EXPONENT,
&publ_exp) == FALSE) {
return (CKR_FUNCTION_FAILED);
}
if (template_attribute_find(tmpl, CKA_PRIVATE_EXPONENT,
&priv_exp) == FALSE) {
return (CKR_FUNCTION_FAILED);
}
if (template_attribute_find(tmpl, CKA_PRIME_1,
&prime1) == FALSE) {
return (CKR_FUNCTION_FAILED);
}
if (template_attribute_find(tmpl, CKA_PRIME_2,
&prime2) == FALSE) {
return (CKR_FUNCTION_FAILED);
}
if (template_attribute_find(tmpl, CKA_EXPONENT_1,
&exponent1) == FALSE) {
return (CKR_FUNCTION_FAILED);
}
if (template_attribute_find(tmpl, CKA_EXPONENT_2,
&exponent2) == FALSE) {
return (CKR_FUNCTION_FAILED);
}
if (template_attribute_find(tmpl, CKA_COEFFICIENT,
&coeff) == FALSE) {
return (CKR_FUNCTION_FAILED);
}
rc = ber_encode_RSAPrivateKey(length_only, data, data_len,
modulus, publ_exp, priv_exp, prime1, prime2,
exponent1, exponent2, coeff);
return (rc);
}
CK_RV
rsa_priv_unwrap(TEMPLATE *tmpl,
CK_BYTE *data,
CK_ULONG total_length)
{
CK_ATTRIBUTE *modulus = NULL;
CK_ATTRIBUTE *publ_exp = NULL;
CK_ATTRIBUTE *priv_exp = NULL;
CK_ATTRIBUTE *prime1 = NULL;
CK_ATTRIBUTE *prime2 = NULL;
CK_ATTRIBUTE *exponent1 = NULL;
CK_ATTRIBUTE *exponent2 = NULL;
CK_ATTRIBUTE *coeff = NULL;
CK_RV rc;
rc = ber_decode_RSAPrivateKey(data, total_length,
&modulus, &publ_exp, &priv_exp, &prime1, &prime2,
&exponent1, &exponent2, &coeff);
if (rc != CKR_OK) {
return (rc);
}
(void) remove_leading_zeros(modulus);
(void) remove_leading_zeros(publ_exp);
(void) remove_leading_zeros(priv_exp);
(void) remove_leading_zeros(prime1);
(void) remove_leading_zeros(prime2);
(void) remove_leading_zeros(exponent1);
(void) remove_leading_zeros(exponent2);
(void) remove_leading_zeros(coeff);
(void) template_update_attribute(tmpl, modulus);
(void) template_update_attribute(tmpl, publ_exp);
(void) template_update_attribute(tmpl, priv_exp);
(void) template_update_attribute(tmpl, prime1);
(void) template_update_attribute(tmpl, prime2);
(void) template_update_attribute(tmpl, exponent1);
(void) template_update_attribute(tmpl, exponent2);
(void) template_update_attribute(tmpl, coeff);
return (CKR_OK);
}
CK_RV
generic_secret_check_required_attributes(TEMPLATE *tmpl, CK_ULONG mode)
{
CK_ATTRIBUTE *attr = NULL;
CK_BBOOL found;
found = template_attribute_find(tmpl, CKA_VALUE, &attr);
if (! found) {
if (mode == MODE_CREATE) {
return (CKR_TEMPLATE_INCOMPLETE);
}
}
found = template_attribute_find(tmpl, CKA_VALUE_LEN, &attr);
if (! found) {
return (CKR_OK);
} else {
if (mode == MODE_CREATE) {
return (CKR_ATTRIBUTE_READ_ONLY);
}
}
return (secret_key_check_required_attributes(tmpl, mode));
}
CK_RV
generic_secret_set_default_attributes(TEMPLATE *tmpl, CK_ULONG mode)
{
CK_ATTRIBUTE *value_attr = NULL;
CK_ATTRIBUTE *value_len_attr = NULL;
CK_ATTRIBUTE *type_attr = NULL;
CK_ULONG len = 0L;
if (mode)
value_attr = NULL;
(void) secret_key_set_default_attributes(tmpl, mode);
type_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
sizeof (CK_KEY_TYPE));
value_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE));
value_len_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
sizeof (CK_ULONG));
if (! type_attr || ! value_attr || ! value_len_attr) {
if (type_attr) free(type_attr);
if (value_attr) free(value_attr);
if (value_len_attr) free(value_len_attr);
return (CKR_HOST_MEMORY);
}
value_attr->type = CKA_VALUE;
value_attr->ulValueLen = 0;
value_attr->pValue = NULL;
value_len_attr->type = CKA_VALUE_LEN;
value_len_attr->ulValueLen = sizeof (CK_ULONG);
value_len_attr->pValue = (CK_BYTE *)value_len_attr +
sizeof (CK_ATTRIBUTE);
*(CK_ULONG *)value_len_attr->pValue = len;
type_attr->type = CKA_KEY_TYPE;
type_attr->ulValueLen = sizeof (CK_KEY_TYPE);
type_attr->pValue = (CK_BYTE *)type_attr +
sizeof (CK_ATTRIBUTE);
*(CK_KEY_TYPE *)type_attr->pValue = CKK_GENERIC_SECRET;
(void) template_update_attribute(tmpl, type_attr);
(void) template_update_attribute(tmpl, value_attr);
(void) template_update_attribute(tmpl, value_len_attr);
return (CKR_OK);
}
CK_RV
generic_secret_validate_attribute(TEMPLATE *tmpl,
CK_ATTRIBUTE *attr, CK_ULONG mode)
{
switch (attr->type) {
case CKA_VALUE:
if (mode == MODE_CREATE)
return (CKR_OK);
else
return (CKR_ATTRIBUTE_READ_ONLY);
case CKA_VALUE_LEN:
if (mode == MODE_KEYGEN || mode == MODE_DERIVE)
return (CKR_OK);
else {
if (mode == MODE_UNWRAP) {
return (CKR_OK);
}
return (CKR_ATTRIBUTE_READ_ONLY);
}
default:
return (secret_key_validate_attribute(tmpl, attr, mode));
}
}
CK_BBOOL
generic_secret_check_exportability(CK_ATTRIBUTE_TYPE type) {
switch (type) {
case CKA_VALUE:
return (FALSE);
}
return (TRUE);
}
CK_RV
generic_secret_wrap_get_data(TEMPLATE * tmpl,
CK_BBOOL length_only,
CK_BYTE ** data,
CK_ULONG * data_len)
{
CK_ATTRIBUTE * attr = NULL;
CK_BYTE * ptr = NULL;
CK_RV rc;
if (! tmpl || ! data_len) {
return (CKR_FUNCTION_FAILED);
}
rc = template_attribute_find(tmpl, CKA_VALUE, &attr);
if (rc == FALSE) {
return (CKR_KEY_NOT_WRAPPABLE);
}
*data_len = attr->ulValueLen;
if (length_only == FALSE) {
ptr = (CK_BYTE *)malloc(attr->ulValueLen);
if (! ptr) {
return (CKR_HOST_MEMORY);
}
(void) memcpy(ptr, attr->pValue, attr->ulValueLen);
*data = ptr;
}
return (CKR_OK);
}
CK_RV
generic_secret_unwrap(TEMPLATE *tmpl,
CK_BYTE *data,
CK_ULONG data_len,
CK_BBOOL fromend)
{
CK_ATTRIBUTE * attr = NULL;
CK_ATTRIBUTE * value_attr = NULL;
CK_ATTRIBUTE * value_len_attr = NULL;
CK_BYTE * ptr = NULL;
CK_ULONG rc, len = 0;
if (fromend == TRUE)
ptr = data + data_len;
else
ptr = data;
rc = template_attribute_find(tmpl, CKA_VALUE_LEN, &attr);
if (rc) {
len = *(CK_ULONG *)attr->pValue;
if (len > data_len) {
rc = CKR_ATTRIBUTE_VALUE_INVALID;
goto error;
}
if (len != 0)
data_len = len;
}
if (fromend == TRUE)
ptr -= data_len;
rc = build_attribute(CKA_VALUE, ptr, data_len, &value_attr);
if (rc != CKR_OK) {
goto error;
}
if (data_len != len) {
rc = build_attribute(CKA_VALUE_LEN, (CK_BYTE *)&data_len,
sizeof (CK_ULONG), &value_len_attr);
if (rc != CKR_OK)
goto error;
}
(void) template_update_attribute(tmpl, value_attr);
if (data_len != len)
(void) template_update_attribute(tmpl, value_len_attr);
return (CKR_OK);
error:
if (value_attr) free(value_attr);
if (value_len_attr) free(value_len_attr);
return (rc);
}