root/usr/src/lib/pkcs11/pkcs11_tpm/common/key.c
/*
 *              Common Public License Version 0.5
 *
 *              THE ACCOMPANYING PROGRAM IS PROVIDED UNDER THE TERMS OF
 *              THIS COMMON PUBLIC LICENSE ("AGREEMENT"). ANY USE,
 *              REPRODUCTION OR DISTRIBUTION OF THE PROGRAM CONSTITUTES
 *              RECIPIENT'S ACCEPTANCE OF THIS AGREEMENT.
 *
 *              1. DEFINITIONS
 *
 *              "Contribution" means:
 *                      a) in the case of the initial Contributor, the
 *                      initial code and documentation distributed under
 *                      this Agreement, and
 *
 *                      b) in the case of each subsequent Contributor:
 *                      i) changes to the Program, and
 *                      ii) additions to the Program;
 *
 *                      where such changes and/or additions to the Program
 *                      originate from and are distributed by that
 *                      particular Contributor. A Contribution 'originates'
 *                      from a Contributor if it was added to the Program
 *                      by such Contributor itself or anyone acting on such
 *                      Contributor's behalf. Contributions do not include
 *                      additions to the Program which: (i) are separate
 *                      modules of software distributed in conjunction with
 *                      the Program under their own license agreement, and
 *                      (ii) are not derivative works of the Program.
 *
 *
 *              "Contributor" means any person or entity that distributes
 *              the Program.
 *
 *              "Licensed Patents " mean patent claims licensable by a
 *              Contributor which are necessarily infringed by the use or
 *              sale of its Contribution alone or when combined with the
 *              Program.
 *
 *              "Program" means the Contributions distributed in
 *              accordance with this Agreement.
 *
 *              "Recipient" means anyone who receives the Program under
 *              this Agreement, including all Contributors.
 *
 *              2. GRANT OF RIGHTS
 *
 *                      a) Subject to the terms of this Agreement, each
 *                      Contributor hereby grants Recipient a
 *                      no - exclusive, worldwide, royalt - free copyright
 *                      license to reproduce, prepare derivative works of,
 *                      publicly display, publicly perform, distribute and
 *                      sublicense the Contribution of such Contributor, if
 *                      any, and such derivative works, in source code and
 *                      object code form.
 *
 *                      b) Subject to the terms of this Agreement, each
 *                      Contributor hereby grants Recipient a
 *                      no - exclusive, worldwide, royalt - free patent
 *                      license under Licensed Patents to make, use, sell,
 *                      offer to sell, import and otherwise transfer the
 *                      Contribution of such Contributor, if any, in source
 *                      code and object code form. This patent license
 *                      shall apply to the combination of the Contribution
 *                      and the Program if, at the time the Contribution is
 *                      added by the Contributor, such addition of the
 *                      Contribution causes such combination to be covered
 *                      by the Licensed Patents. The patent license shall
 *                      not apply to any other combinations which include
 *                      the Contribution. No hardware per se is licensed
 *                      hereunder.
 *
 *                      c) Recipient understands that although each
 *                      Contributor grants the licenses to its
 *                      Contributions set forth herein, no assurances are
 *                      provided by any Contributor that the Program does
 *                      not infringe the patent or other intellectual
 *                      property rights of any other entity. Each
 *                      Contributor disclaims any liability to Recipient
 *                      for claims brought by any other entity based on
 *                      infringement of intellectual property rights or
 *                      otherwise. As a condition to exercising the rights
 *                      and licenses granted hereunder, each Recipient
 *                      hereby assumes sole responsibility to secure any
 *                      other intellectual property rights needed, if any.
 *
 *                      For example, if a third party patent license is
 *                      required to allow Recipient to distribute the
 *                      Program, it is Recipient's responsibility to
 *                      acquire that license before distributing the
 *                      Program.
 *
 *                      d) Each Contributor represents that to its
 *                      knowledge it has sufficient copyright rights in its
 *                      Contribution, if any, to grant the copyright
 *                      license set forth in this Agreement.
 *
 *              3. REQUIREMENTS
 *
 *              A Contributor may choose to distribute the Program in
 *              object code form under its own license agreement, provided
 *              that:
 *                      a) it complies with the terms and conditions of
 *                      this Agreement; and
 *
 *                      b) its license agreement:
 *                      i) effectively disclaims on behalf of all
 *                      Contributors all warranties and conditions, express
 *                      and implied, including warranties or conditions of
 *                      title and no - infringement, and implied warranties
 *                      or conditions of merchantability and fitness for a
 *                      particular purpose;
 *
 *                      ii) effectively excludes on behalf of all
 *                      Contributors all liability for damages, including
 *                      direct, indirect, special, incidental and
 *                      consequential damages, such as lost profits;
 *
 *                      iii) states that any provisions which differ from
 *                      this Agreement are offered by that Contributor
 *                      alone and not by any other party; and
 *
 *                      iv) states that source code for the Program is
 *                      available from such Contributor, and informs
 *                      licensees how to obtain it in a reasonable manner
 *                      on or through a medium customarily used for
 *                      software exchange.
 *
 *              When the Program is made available in source code form:
 *                      a) it must be made available under this Agreement;
 *                      and
 *                      b) a copy of this Agreement must be included with
 *                      each copy of the Program.
 *
 *              Contributors may not remove or alter any copyright notices
 *              contained within the Program.
 *
 *              Each Contributor must identify itself as the originator of
 *              its Contribution, if any, in a manner that reasonably
 *              allows subsequent Recipients to identify the originator of
 *              the Contribution.
 *
 *
 *              4. COMMERCIAL DISTRIBUTION
 *
 *              Commercial distributors of software may accept certain
 *              responsibilities with respect to end users, business
 *              partners and the like. While this license is intended to
 *              facilitate the commercial use of the Program, the
 *              Contributor who includes the Program in a commercial
 *              product offering should do so in a manner which does not
 *              create potential liability for other Contributors.
 *              Therefore, if a Contributor includes the Program in a
 *              commercial product offering, such Contributor ("Commercial
 *              Contributor") hereby agrees to defend and indemnify every
 *              other Contributor ("Indemnified Contributor") against any
 *              losses, damages and costs (collectively "Losses") arising
 *              from claims, lawsuits and other legal actions brought by a
 *              third party against the Indemnified Contributor to the
 *              extent caused by the acts or omissions of such Commercial
 *              Contributor in connection with its distribution of the
 *              Program in a commercial product offering. The obligations
 *              in this section do not apply to any claims or Losses
 *              relating to any actual or alleged intellectual property
 *              infringement. In order to qualify, an Indemnified
 *              Contributor must: a) promptly notify the Commercial
 *              Contributor in writing of such claim, and b) allow the
 *              Commercial Contributor to control, and cooperate with the
 *              Commercial Contributor in, the defense and any related
 *              settlement negotiations. The Indemnified Contributor may
 *              participate in any such claim at its own expense.
 *
 *
 *              For example, a Contributor might include the Program in a
 *              commercial product offering, Product X. That Contributor
 *              is then a Commercial Contributor. If that Commercial
 *              Contributor then makes performance claims, or offers
 *              warranties related to Product X, those performance claims
 *              and warranties are such Commercial Contributor's
 *              responsibility alone. Under this section, the Commercial
 *              Contributor would have to defend claims against the other
 *              Contributors related to those performance claims and
 *              warranties, and if a court requires any other Contributor
 *              to pay any damages as a result, the Commercial Contributor
 *              must pay those damages.
 *
 *
 *              5. NO WARRANTY
 *
 *              EXCEPT AS EXPRESSLY SET FORTH IN THIS AGREEMENT, THE
 *              PROGRAM IS PROVIDED ON AN "AS IS" BASIS, WITHOUT
 *              WARRANTIES OR CONDITIONS OF ANY KIND, EITHER EXPRESS OR
 *              IMPLIED INCLUDING, WITHOUT LIMITATION, ANY WARRANTIES OR
 *              CONDITIONS OF TITLE, NO - INFRINGEMENT, MERCHANTABILITY OR
 *              FITNESS FOR A PARTICULAR PURPOSE. Each Recipient is solely
 *              responsible for determining the appropriateness of using
 *              and distributing the Program and assumes all risks
 *              associated with its exercise of rights under this
 *              Agreement, including but not limited to the risks and
 *              costs of program errors, compliance with applicable laws,
 *              damage to or loss of data, programs or equipment, and
 *              unavailability or interruption of operations.
 *
 *              6. DISCLAIMER OF LIABILITY
 *              EXCEPT AS EXPRESSLY SET FORTH IN THIS AGREEMENT, NEITHER
 *              RECIPIENT NOR ANY CONTRIBUTORS SHALL HAVE ANY LIABILITY
 *              FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,
 *              OR CONSEQUENTIAL DAMAGES (INCLUDING WITHOUT LIMITATION
 *              LOST PROFITS), HOWEVER CAUSED AND ON ANY THEORY OF
 *              LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
 *              (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
 *              OF THE USE OR DISTRIBUTION OF THE PROGRAM OR THE EXERCISE
 *              OF ANY RIGHTS GRANTED HEREUNDER, EVEN IF ADVISED OF THE
 *              POSSIBILITY OF SUCH DAMAGES.
 *
 *              7. GENERAL
 *
 *              If any provision of this Agreement is invalid or
 *              unenforceable under applicable law, it shall not affect
 *              the validity or enforceability of the remainder of the
 *              terms of this Agreement, and without further action by the
 *              parties hereto, such provision shall be reformed to the
 *              minimum extent necessary to make such provision valid and
 *              enforceable.
 *
 *
 *              If Recipient institutes patent litigation against a
 *              Contributor with respect to a patent applicable to
 *              software (including a cros - claim or counterclaim in a
 *              lawsuit), then any patent licenses granted by that
 *              Contributor to such Recipient under this Agreement shall
 *              terminate as of the date such litigation is filed. In
 *              addition, If Recipient institutes patent litigation
 *              against any entity (including a cros - claim or
 *              counterclaim in a lawsuit) alleging that the Program
 *              itself (excluding combinations of the Program with other
 *              software or hardware) infringes such Recipient's
 *              patent(s), then such Recipient's rights granted under
 *              Section 2(b) shall terminate as of the date such
 *              litigation is filed.
 *
 *              All Recipient's rights under this Agreement shall
 *              terminate if it fails to comply with any of the material
 *              terms or conditions of this Agreement and does not cure
 *              such failure in a reasonable period of time after becoming
 *              aware of such noncompliance. If all Recipient's rights
 *              under this Agreement terminate, Recipient agrees to cease
 *              use and distribution of the Program as soon as reasonably
 *              practicable. However, Recipient's obligations under this
 *              Agreement and any licenses granted by Recipient relating
 *              to the Program shall continue and survive.
 *
 *              Everyone is permitted to copy and distribute copies of
 *              this Agreement, but in order to avoid inconsistency the
 *              Agreement is copyrighted and may only be modified in the
 *              following manner. The Agreement Steward reserves the right
 *              to publish new versions (including revisions) of this
 *              Agreement from time to time. No one other than the
 *              Agreement Steward has the right to modify this Agreement.
 *
 *              IBM is the initial Agreement Steward. IBM may assign the
 *              responsibility to serve as the Agreement Steward to a
 *              suitable separate entity. Each new version of the
 *              Agreement will be given a distinguishing version number.
 *              The Program (including Contributions) may always be
 *              distributed subject to the version of the Agreement under
 *              which it was received. In addition, after a new version of
 *              the Agreement is published, Contributor may elect to
 *              distribute the Program (including its Contributions) under
 *              the new version. Except as expressly stated in Sections
 *              2(a) and 2(b) above, Recipient receives no rights or
 *              licenses to the intellectual property of any Contributor
 *              under this Agreement, whether expressly, by implication,
 *              estoppel or otherwise. All rights in the Program not
 *              expressly granted under this Agreement are reserved.
 *
 *
 *              This Agreement is governed by the laws of the State of New
 *              York and the intellectual property laws of the United
 *              States of America. No party to this Agreement will bring a
 *              legal action under this Agreement more than one year after
 *              the cause of action arose. Each party waives its rights to
 *              a jury trial in any resulting litigation.
 *
 *
 *
 * (C) COPYRIGHT International Business Machines Corp. 2001, 2002
 */
/*
 * Copyright 2009 Sun Microsystems, Inc.  All rights reserved.
 * Use is subject to license terms.
 */
#include "tpmtok_int.h"

CK_RV
key_object_check_required_attributes(TEMPLATE *tmpl, CK_ULONG mode)
{
        CK_ATTRIBUTE * attr = NULL;
        CK_BBOOL    found;

        found = template_attribute_find(tmpl, CKA_KEY_TYPE, &attr);
        if (! found) {
                if (mode == MODE_CREATE) {
                        return (CKR_TEMPLATE_INCOMPLETE);
                }
        }

        return (template_check_required_base_attributes(tmpl, mode));
}

CK_RV
key_object_set_default_attributes(TEMPLATE *tmpl, CK_ULONG mode)
{
        CK_ATTRIBUTE * id_attr  = NULL;
        CK_ATTRIBUTE * sdate_attr  = NULL;
        CK_ATTRIBUTE * edate_attr  = NULL;
        CK_ATTRIBUTE * derive_attr = NULL;
        CK_ATTRIBUTE * local_attr  = NULL;

        // satisfy the compiler
        //
        if (mode)
                id_attr = NULL;

        id_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE));
        sdate_attr      = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE));
        edate_attr      = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE));
        derive_attr    = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
            sizeof (CK_BBOOL));
        local_attr      = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
            sizeof (CK_BBOOL));

        if (! id_attr || ! sdate_attr || ! edate_attr ||
            ! derive_attr || ! local_attr) {
                if (id_attr)    free(id_attr);
                if (sdate_attr)   free(sdate_attr);
                if (edate_attr)   free(edate_attr);
                if (derive_attr)  free(derive_attr);
                if (local_attr)   free(local_attr);
                return (CKR_HOST_MEMORY);
        }

        id_attr->type      = CKA_ID;
        id_attr->ulValueLen     = 0;
        id_attr->pValue  = NULL;

        sdate_attr->type        = CKA_START_DATE;
        sdate_attr->ulValueLen  = 0;
        sdate_attr->pValue      = NULL;

        edate_attr->type        = CKA_END_DATE;
        edate_attr->ulValueLen  = 0;
        edate_attr->pValue      = NULL;

        derive_attr->type       = CKA_DERIVE;
        derive_attr->ulValueLen = sizeof (CK_BBOOL);
        derive_attr->pValue     = (CK_BYTE *)derive_attr +
            sizeof (CK_ATTRIBUTE);
        *(CK_BBOOL *)derive_attr->pValue = FALSE;

        local_attr->type        = CKA_LOCAL;
        local_attr->ulValueLen  = sizeof (CK_BBOOL);
        local_attr->pValue      = (CK_BYTE *)local_attr + sizeof (CK_ATTRIBUTE);
        *(CK_BBOOL *)local_attr->pValue = FALSE;

        (void) template_update_attribute(tmpl, id_attr);
        (void) template_update_attribute(tmpl, sdate_attr);
        (void) template_update_attribute(tmpl, edate_attr);
        (void) template_update_attribute(tmpl, derive_attr);
        (void) template_update_attribute(tmpl, local_attr);

        return (CKR_OK);
}

CK_RV
key_object_validate_attribute(TEMPLATE *tmpl,
        CK_ATTRIBUTE *attr, CK_ULONG mode)
{
        switch (attr->type) {
                case CKA_KEY_TYPE:
                if (mode == MODE_CREATE || mode == MODE_DERIVE ||
                    mode == MODE_KEYGEN || mode == MODE_UNWRAP)
                        return (CKR_OK);
                else {
                        return (CKR_ATTRIBUTE_READ_ONLY);
                }
                case CKA_ID:
                case CKA_START_DATE:
                case CKA_END_DATE:
                case CKA_DERIVE:
                        return (CKR_OK);

                case CKA_LOCAL:
                        return (CKR_ATTRIBUTE_READ_ONLY);

                default:
                return (template_validate_base_attribute(tmpl, attr, mode));
        }
}

CK_RV
publ_key_check_required_attributes(TEMPLATE *tmpl, CK_ULONG mode) {
        return (key_object_check_required_attributes(tmpl, mode));
}

CK_RV
publ_key_set_default_attributes(TEMPLATE *tmpl, CK_ULONG mode)
{
        CK_ATTRIBUTE    *class_attr       = NULL;
        CK_ATTRIBUTE    *subject_attr   = NULL;
        CK_ATTRIBUTE    *encrypt_attr   = NULL;
        CK_ATTRIBUTE    *verify_attr     = NULL;
        CK_ATTRIBUTE    *verify_recover_attr = NULL;
        CK_ATTRIBUTE    *wrap_attr         = NULL;

        CK_OBJECT_CLASS  class = CKO_PUBLIC_KEY;
        CK_RV       rc;


        rc = key_object_set_default_attributes(tmpl, mode);
        if (rc != CKR_OK) {
                return (rc);
        }
        //
        // add the default CKO_PUBLIC_KEY attributes
        //
        class_attr        = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
            sizeof (CK_OBJECT_CLASS));
        subject_attr    = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE));
        encrypt_attr    = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
            sizeof (CK_BBOOL));
        verify_attr      = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
            sizeof (CK_BBOOL));
        verify_recover_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
            sizeof (CK_BBOOL));
        wrap_attr          = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
            sizeof (CK_BBOOL));

        if (! class || ! subject_attr || ! encrypt_attr ||
            ! verify_attr || ! verify_recover_attr || ! wrap_attr) {
                if (class_attr)   free(class_attr);
                if (subject_attr)       free(subject_attr);
                if (encrypt_attr)       free(encrypt_attr);
                if (verify_attr)         free(verify_attr);
                if (verify_recover_attr) free(verify_recover_attr);
                if (wrap_attr)     free(wrap_attr);

                return (CKR_HOST_MEMORY);
        }

        class_attr->type           = CKA_CLASS;
        class_attr->ulValueLen  = sizeof (CK_OBJECT_CLASS);
        class_attr->pValue       = (CK_BYTE *)class_attr +
            sizeof (CK_ATTRIBUTE);
        *(CK_OBJECT_CLASS *)class_attr->pValue = CKO_PUBLIC_KEY;

        subject_attr->type       = CKA_SUBJECT;
        subject_attr->ulValueLen   = 0;  // empty string
        subject_attr->pValue    = NULL;

        encrypt_attr->type        = CKA_ENCRYPT;
        encrypt_attr->ulValueLen    = sizeof (CK_BBOOL);
        encrypt_attr->pValue    = (CK_BYTE *)encrypt_attr +
            sizeof (CK_ATTRIBUTE);
        *(CK_BBOOL *)encrypt_attr->pValue = TRUE;

        verify_attr->type         = CKA_VERIFY;
        verify_attr->ulValueLen    = sizeof (CK_BBOOL);
        verify_attr->pValue     = (CK_BYTE *)verify_attr +
            sizeof (CK_ATTRIBUTE);
        *(CK_BBOOL *)verify_attr->pValue = TRUE;

        verify_recover_attr->type         = CKA_VERIFY_RECOVER;
        verify_recover_attr->ulValueLen    = sizeof (CK_BBOOL);
        verify_recover_attr->pValue     = (CK_BYTE *)verify_recover_attr +
            sizeof (CK_ATTRIBUTE);
        *(CK_BBOOL *)verify_recover_attr->pValue = TRUE;

        wrap_attr->type   = CKA_WRAP;
        wrap_attr->ulValueLen    = sizeof (CK_BBOOL);
        wrap_attr->pValue       = (CK_BYTE *)wrap_attr +
            sizeof (CK_ATTRIBUTE);
        *(CK_BBOOL *)wrap_attr->pValue = TRUE;

        (void) template_update_attribute(tmpl, class_attr);
        (void) template_update_attribute(tmpl, subject_attr);
        (void) template_update_attribute(tmpl, encrypt_attr);
        (void) template_update_attribute(tmpl, verify_attr);
        (void) template_update_attribute(tmpl, verify_recover_attr);
        (void) template_update_attribute(tmpl, wrap_attr);

        return (CKR_OK);
}

CK_RV
publ_key_validate_attribute(TEMPLATE *tmpl,
        CK_ATTRIBUTE *attr, CK_ULONG mode) {
        switch (attr->type) {
                case CKA_SUBJECT:
                        return (CKR_OK);

                case CKA_ENCRYPT:
                case CKA_VERIFY:
                case CKA_VERIFY_RECOVER:
                case CKA_WRAP:
                if (mode == MODE_MODIFY) {
                        if (nv_token_data->tweak_vector.allow_key_mods == TRUE)
                                return (CKR_OK);
                        return (CKR_ATTRIBUTE_READ_ONLY);
                }
                return (CKR_OK);

                default:
                return (key_object_validate_attribute(tmpl, attr, mode));
        }
}

CK_RV
priv_key_check_required_attributes(TEMPLATE *tmpl, CK_ULONG mode) {
        return (key_object_check_required_attributes(tmpl, mode));
}

CK_RV
priv_key_set_default_attributes(TEMPLATE *tmpl, CK_ULONG mode)
{
        CK_ATTRIBUTE    *class_attr     = NULL;
        CK_ATTRIBUTE    *subject_attr   = NULL;
        CK_ATTRIBUTE    *sensitive_attr    = NULL;
        CK_ATTRIBUTE    *decrypt_attr   = NULL;
        CK_ATTRIBUTE    *sign_attr       = NULL;
        CK_ATTRIBUTE    *sign_recover_attr = NULL;
        CK_ATTRIBUTE    *unwrap_attr    = NULL;
        CK_ATTRIBUTE    *extractable_attr  = NULL;
        CK_ATTRIBUTE    *never_extr_attr   = NULL;
        CK_ATTRIBUTE    *always_sens_attr  = NULL;
        CK_RV       rc;


        rc = key_object_set_default_attributes(tmpl, mode);
        if (rc != CKR_OK) {
                return (rc);
        }
        class_attr      = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
            sizeof (CK_OBJECT_CLASS));
        subject_attr    = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE));
        sensitive_attr    = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
            sizeof (CK_BBOOL));
        decrypt_attr    = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
            sizeof (CK_BBOOL));
        sign_attr        = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
            sizeof (CK_BBOOL));
        sign_recover_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
            sizeof (CK_BBOOL));
        unwrap_attr     = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
            sizeof (CK_BBOOL));
        extractable_attr  = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
            sizeof (CK_BBOOL));
        never_extr_attr   = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
            sizeof (CK_BBOOL));
        always_sens_attr  = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
            sizeof (CK_BBOOL));

        if (! class_attr || ! subject_attr || ! sensitive_attr ||
            ! decrypt_attr || ! sign_attr || ! sign_recover_attr ||
            ! unwrap_attr || ! extractable_attr ||
            ! never_extr_attr || ! always_sens_attr) {
                if (class_attr) free(class_attr);
                if (subject_attr)       free(subject_attr);
                if (sensitive_attr)    free(sensitive_attr);
                if (decrypt_attr)       free(decrypt_attr);
                if (sign_attr)   free(sign_attr);
                if (sign_recover_attr) free(sign_recover_attr);
                if (unwrap_attr)        free(unwrap_attr);
                if (extractable_attr)  free(extractable_attr);
                if (always_sens_attr)  free(always_sens_attr);
                if (never_extr_attr)   free(never_extr_attr);

                return (CKR_HOST_MEMORY);
        }

        class_attr->type        = CKA_CLASS;
        class_attr->ulValueLen = sizeof (CK_OBJECT_CLASS);
        class_attr->pValue      = (CK_BYTE *)class_attr + sizeof (CK_ATTRIBUTE);
        *(CK_OBJECT_CLASS *)class_attr->pValue = CKO_PRIVATE_KEY;

        subject_attr->type      = CKA_SUBJECT;
        subject_attr->ulValueLen = 0;  // empty string
        subject_attr->pValue    = NULL;

        sensitive_attr->type    = CKA_SENSITIVE;
        sensitive_attr->ulValueLen = sizeof (CK_BBOOL);
        sensitive_attr->pValue  = (CK_BYTE *)sensitive_attr +
            sizeof (CK_ATTRIBUTE);
        *(CK_BBOOL *)sensitive_attr->pValue = FALSE;

        decrypt_attr->type      = CKA_DECRYPT;
        decrypt_attr->ulValueLen = sizeof (CK_BBOOL);
        decrypt_attr->pValue    = (CK_BYTE *)decrypt_attr +
            sizeof (CK_ATTRIBUTE);
        *(CK_BBOOL *)decrypt_attr->pValue = TRUE;

        sign_attr->type = CKA_SIGN;
        sign_attr->ulValueLen = sizeof (CK_BBOOL);
        sign_attr->pValue       = (CK_BYTE *)sign_attr +
            sizeof (CK_ATTRIBUTE);
        *(CK_BBOOL *)sign_attr->pValue = TRUE;

        sign_recover_attr->type = CKA_SIGN_RECOVER;
        sign_recover_attr->ulValueLen = sizeof (CK_BBOOL);
        sign_recover_attr->pValue       = (CK_BYTE *)sign_recover_attr +
            sizeof (CK_ATTRIBUTE);
        *(CK_BBOOL *)sign_recover_attr->pValue = TRUE;

        unwrap_attr->type       = CKA_UNWRAP;
        unwrap_attr->ulValueLen = sizeof (CK_BBOOL);
        unwrap_attr->pValue     = (CK_BYTE *)unwrap_attr +
            sizeof (CK_ATTRIBUTE);
        *(CK_BBOOL *)unwrap_attr->pValue = TRUE;

        extractable_attr->type  = CKA_EXTRACTABLE;
        extractable_attr->ulValueLen = sizeof (CK_BBOOL);
        extractable_attr->pValue        = (CK_BYTE *)extractable_attr +
            sizeof (CK_ATTRIBUTE);
        *(CK_BBOOL *)extractable_attr->pValue = TRUE;

        never_extr_attr->type   = CKA_NEVER_EXTRACTABLE;
        never_extr_attr->ulValueLen = sizeof (CK_BBOOL);
        never_extr_attr->pValue = (CK_BYTE *)never_extr_attr +
            sizeof (CK_ATTRIBUTE);
        *(CK_BBOOL *)never_extr_attr->pValue = FALSE;

        always_sens_attr->type  = CKA_ALWAYS_SENSITIVE;
        always_sens_attr->ulValueLen = sizeof (CK_BBOOL);
        always_sens_attr->pValue        = (CK_BYTE *)always_sens_attr +
            sizeof (CK_ATTRIBUTE);
        *(CK_BBOOL *)always_sens_attr->pValue = FALSE;

        (void) template_update_attribute(tmpl, class_attr);
        (void) template_update_attribute(tmpl, subject_attr);
        (void) template_update_attribute(tmpl, sensitive_attr);
        (void) template_update_attribute(tmpl, decrypt_attr);
        (void) template_update_attribute(tmpl, sign_attr);
        (void) template_update_attribute(tmpl, sign_recover_attr);
        (void) template_update_attribute(tmpl, unwrap_attr);
        (void) template_update_attribute(tmpl, extractable_attr);
        (void) template_update_attribute(tmpl, never_extr_attr);
        (void) template_update_attribute(tmpl, always_sens_attr);

        return (CKR_OK);
}

CK_RV
priv_key_unwrap(TEMPLATE *tmpl,
        CK_ULONG  keytype,
        CK_BYTE  *data,
        CK_ULONG  data_len)
{
        CK_ATTRIBUTE *extractable   = NULL;
        CK_ATTRIBUTE *always_sens   = NULL;
        CK_ATTRIBUTE *never_extract = NULL;
        CK_ATTRIBUTE *sensitive = NULL;
        CK_ATTRIBUTE *local      = NULL;
        CK_BBOOL   true  = TRUE;
        CK_BBOOL   false = FALSE;
        CK_RV   rc;

        switch (keytype) {
                case CKK_RSA:
                rc = rsa_priv_unwrap(tmpl, data, data_len);
                break;

                default:
                return (CKR_WRAPPED_KEY_INVALID);
        }

        if (rc != CKR_OK) {
                return (rc);
        }

        /*
         * make sure
         *    CKA_LOCAL         == FALSE
         *    CKA_ALWAYS_SENSITIVE  == FALSE
         *    CKA_EXTRACTABLE   == TRUE
         *    CKA_NEVER_EXTRACTABLE == FALSE
         */
        rc = build_attribute(CKA_LOCAL,  &false, 1, &local);
        if (rc != CKR_OK) {
                goto cleanup;
        }
        rc = build_attribute(CKA_ALWAYS_SENSITIVE,  &false, 1, &always_sens);
        if (rc != CKR_OK) {
                goto cleanup;
        }
        rc = build_attribute(CKA_SENSITIVE,      &false, 1, &sensitive);
        if (rc != CKR_OK) {
                goto cleanup;
        }
        rc = build_attribute(CKA_EXTRACTABLE,   &true,  1, &extractable);
        if (rc != CKR_OK) {
                goto cleanup;
        }
        rc = build_attribute(CKA_NEVER_EXTRACTABLE, &false, 1, &never_extract);
        if (rc != CKR_OK) {
                goto cleanup;
        }
        (void) template_update_attribute(tmpl, local);
        (void) template_update_attribute(tmpl, always_sens);
        (void) template_update_attribute(tmpl, sensitive);
        (void) template_update_attribute(tmpl, extractable);
        (void) template_update_attribute(tmpl, never_extract);

        return (CKR_OK);

        cleanup:

        if (local)       free(local);
        if (always_sens)   free(always_sens);
        if (extractable)   free(extractable);
        if (never_extract) free(never_extract);

        return (rc);
}

CK_RV
priv_key_validate_attribute(TEMPLATE *tmpl, CK_ATTRIBUTE *attr, CK_ULONG mode) {
        switch (attr->type) {
                case CKA_SUBJECT:
                return (CKR_OK);

                case CKA_DECRYPT:
                case CKA_SIGN:
                case CKA_SIGN_RECOVER:
                case CKA_UNWRAP:
                // we might want to do this for MODE_COPY too
                //
                if (mode == MODE_MODIFY) {
                        if (nv_token_data->tweak_vector.allow_key_mods == TRUE)
                                return (CKR_OK);
                        return (CKR_ATTRIBUTE_READ_ONLY);
                }
                return (CKR_OK);

                // after key creation, CKA_SENSITIVE may only be set to TRUE
                //
                case CKA_SENSITIVE:
                {
                        CK_BBOOL value;

                        if (mode == MODE_CREATE || mode == MODE_KEYGEN)
                                return (CKR_OK);

                        value = *(CK_BBOOL *)attr->pValue;
                        if (value != TRUE) {
                                return (CKR_ATTRIBUTE_READ_ONLY);
                        }
                }
                return (CKR_OK);

                case CKA_EXTRACTABLE:
                {
                        CK_BBOOL value;

                        value = *(CK_BBOOL *)attr->pValue;
                        if ((mode != MODE_CREATE && mode != MODE_KEYGEN) &&
                            value != FALSE) {
                                return (CKR_ATTRIBUTE_READ_ONLY);
                        }
                        if (value == FALSE) {
                                CK_ATTRIBUTE *attr;

                                attr = (CK_ATTRIBUTE *)malloc(
                                    sizeof (CK_ATTRIBUTE) + sizeof (CK_BBOOL));
                                if (! attr) {
                                        return (CKR_HOST_MEMORY);
                                }
                                attr->type      = CKA_NEVER_EXTRACTABLE;
                                attr->ulValueLen = sizeof (CK_BBOOL);
                                attr->pValue    = (CK_BYTE *)attr +
                                    sizeof (CK_ATTRIBUTE);
                                *(CK_BBOOL *)attr->pValue = FALSE;

                                (void) template_update_attribute(tmpl, attr);
                        }
                }
                return (CKR_OK);

                case CKA_ALWAYS_SENSITIVE:
                case CKA_NEVER_EXTRACTABLE:
                return (CKR_ATTRIBUTE_READ_ONLY);

                default:
                return (key_object_validate_attribute(tmpl, attr, mode));
        }
}

CK_RV
secret_key_check_required_attributes(TEMPLATE *tmpl, CK_ULONG mode)
{
        return (key_object_check_required_attributes(tmpl, mode));
}

CK_RV
secret_key_set_default_attributes(TEMPLATE *tmpl, CK_ULONG mode)
{
        CK_ATTRIBUTE    *class_attr     = NULL;
        CK_ATTRIBUTE    *sensitive_attr   = NULL;
        CK_ATTRIBUTE    *encrypt_attr   = NULL;
        CK_ATTRIBUTE    *decrypt_attr   = NULL;
        CK_ATTRIBUTE    *sign_attr      = NULL;
        CK_ATTRIBUTE    *verify_attr    = NULL;
        CK_ATTRIBUTE    *wrap_attr      = NULL;
        CK_ATTRIBUTE    *unwrap_attr    = NULL;
        CK_ATTRIBUTE    *extractable_attr = NULL;
        CK_ATTRIBUTE    *never_extr_attr  = NULL;
        CK_ATTRIBUTE    *always_sens_attr = NULL;
        CK_RV       rc;


        rc = key_object_set_default_attributes(tmpl, mode);
        if (rc != CKR_OK)
                return (rc);

        class_attr      = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
            sizeof (CK_OBJECT_CLASS));
        sensitive_attr   = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
            sizeof (CK_BBOOL));
        encrypt_attr    = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
            sizeof (CK_BBOOL));
        decrypt_attr    = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
            sizeof (CK_BBOOL));
        sign_attr       = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
            sizeof (CK_BBOOL));
        verify_attr     = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
            sizeof (CK_BBOOL));
        wrap_attr       = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
            sizeof (CK_BBOOL));
        unwrap_attr     = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
            sizeof (CK_BBOOL));
        extractable_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
            sizeof (CK_BBOOL));
        never_extr_attr  = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
            sizeof (CK_BBOOL));
        always_sens_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
            sizeof (CK_BBOOL));

        if (! class_attr || ! sensitive_attr || ! encrypt_attr ||
            ! decrypt_attr || ! sign_attr || ! verify_attr ||
            ! wrap_attr || ! unwrap_attr || ! extractable_attr ||
            ! never_extr_attr || ! always_sens_attr) {
                if (class_attr) free(class_attr);
                if (sensitive_attr)   free(sensitive_attr);
                if (encrypt_attr)       free(encrypt_attr);
                if (decrypt_attr)       free(decrypt_attr);
                if (sign_attr)  free(sign_attr);
                if (verify_attr)        free(verify_attr);
                if (wrap_attr)  free(wrap_attr);
                if (unwrap_attr)        free(unwrap_attr);
                if (extractable_attr) free(extractable_attr);
                if (never_extr_attr)  free(never_extr_attr);
                if (always_sens_attr) free(always_sens_attr);

                return (CKR_HOST_MEMORY);
        }

        class_attr->type        = CKA_CLASS;
        class_attr->ulValueLen = sizeof (CK_OBJECT_CLASS);
        class_attr->pValue      = (CK_BYTE *)class_attr +
            sizeof (CK_ATTRIBUTE);
        *(CK_OBJECT_CLASS *)class_attr->pValue = CKO_SECRET_KEY;

        sensitive_attr->type    = CKA_SENSITIVE;
        sensitive_attr->ulValueLen = sizeof (CK_BBOOL);
        sensitive_attr->pValue  = (CK_BYTE *)sensitive_attr +
            sizeof (CK_ATTRIBUTE);
        *(CK_BBOOL *)sensitive_attr->pValue = FALSE;

        encrypt_attr->type      = CKA_ENCRYPT;
        encrypt_attr->ulValueLen = sizeof (CK_BBOOL);
        encrypt_attr->pValue    = (CK_BYTE *)encrypt_attr +
            sizeof (CK_ATTRIBUTE);
        *(CK_BBOOL *)encrypt_attr->pValue = TRUE;

        decrypt_attr->type      = CKA_DECRYPT;
        decrypt_attr->ulValueLen = sizeof (CK_BBOOL);
        decrypt_attr->pValue    = (CK_BYTE *)decrypt_attr +
            sizeof (CK_ATTRIBUTE);
        *(CK_BBOOL *)decrypt_attr->pValue = TRUE;

        sign_attr->type = CKA_SIGN;
        sign_attr->ulValueLen = sizeof (CK_BBOOL);
        sign_attr->pValue       = (CK_BYTE *)sign_attr +
            sizeof (CK_ATTRIBUTE);
        *(CK_BBOOL *)sign_attr->pValue = TRUE;

        verify_attr->type       = CKA_VERIFY;
        verify_attr->ulValueLen = sizeof (CK_BBOOL);
        verify_attr->pValue     = (CK_BYTE *)verify_attr +
            sizeof (CK_ATTRIBUTE);
        *(CK_BBOOL *)verify_attr->pValue = TRUE;

        wrap_attr->type = CKA_WRAP;
        wrap_attr->ulValueLen = sizeof (CK_BBOOL);
        wrap_attr->pValue       = (CK_BYTE *)wrap_attr +
            sizeof (CK_ATTRIBUTE);
        *(CK_BBOOL *)wrap_attr->pValue = TRUE;

        unwrap_attr->type       = CKA_UNWRAP;
        unwrap_attr->ulValueLen = sizeof (CK_BBOOL);
        unwrap_attr->pValue     = (CK_BYTE *)unwrap_attr +
            sizeof (CK_ATTRIBUTE);
        *(CK_BBOOL *)unwrap_attr->pValue = TRUE;

        extractable_attr->type  = CKA_EXTRACTABLE;
        extractable_attr->ulValueLen = sizeof (CK_BBOOL);
        extractable_attr->pValue        = (CK_BYTE *)extractable_attr +
            sizeof (CK_ATTRIBUTE);
        *(CK_BBOOL *)extractable_attr->pValue = TRUE;

        always_sens_attr->type  = CKA_ALWAYS_SENSITIVE;
        always_sens_attr->ulValueLen = sizeof (CK_BBOOL);
        always_sens_attr->pValue        = (CK_BYTE *)always_sens_attr +
            sizeof (CK_ATTRIBUTE);
        *(CK_BBOOL *)always_sens_attr->pValue = FALSE;

        never_extr_attr->type   = CKA_NEVER_EXTRACTABLE;
        never_extr_attr->ulValueLen = sizeof (CK_BBOOL);
        never_extr_attr->pValue = (CK_BYTE *)never_extr_attr +
            sizeof (CK_ATTRIBUTE);
        *(CK_BBOOL *)never_extr_attr->pValue = FALSE;

        (void) template_update_attribute(tmpl, class_attr);
        (void) template_update_attribute(tmpl, sensitive_attr);
        (void) template_update_attribute(tmpl, encrypt_attr);
        (void) template_update_attribute(tmpl, decrypt_attr);
        (void) template_update_attribute(tmpl, sign_attr);
        (void) template_update_attribute(tmpl, verify_attr);
        (void) template_update_attribute(tmpl, wrap_attr);
        (void) template_update_attribute(tmpl, unwrap_attr);
        (void) template_update_attribute(tmpl, extractable_attr);
        (void) template_update_attribute(tmpl, never_extr_attr);
        (void) template_update_attribute(tmpl, always_sens_attr);

        return (CKR_OK);
}

CK_RV
secret_key_unwrap(TEMPLATE *tmpl,
        CK_ULONG  keytype,
        CK_BYTE  *data,
        CK_ULONG  data_len,
        CK_BBOOL  fromend)
{
        CK_ATTRIBUTE *local      = NULL;
        CK_ATTRIBUTE *always_sens   = NULL;
        CK_ATTRIBUTE *sensitive = NULL;
        CK_ATTRIBUTE *extractable   = NULL;
        CK_ATTRIBUTE *never_extract = NULL;
        CK_BBOOL   true  = TRUE;
        CK_BBOOL   false = FALSE;
        CK_RV   rc;

        switch (keytype) {
                case CKK_GENERIC_SECRET:
                rc = generic_secret_unwrap(tmpl, data, data_len, fromend);
                break;

                default:
                return (CKR_WRAPPED_KEY_INVALID);
        }

        if (rc != CKR_OK)
                return (rc);

        // make sure
        //    CKA_LOCAL         == FALSE
        //    CKA_ALWAYS_SENSITIVE  == FALSE
        //    CKA_EXTRACTABLE   == TRUE
        //    CKA_NEVER_EXTRACTABLE == FALSE
        //
        rc = build_attribute(CKA_LOCAL,         &false, 1, &local);
        if (rc != CKR_OK) {
                goto cleanup;
        }
        rc = build_attribute(CKA_ALWAYS_SENSITIVE,  &false, 1, &always_sens);
        if (rc != CKR_OK) {
                goto cleanup;
        }
        rc = build_attribute(CKA_SENSITIVE,      &false, 1, &sensitive);
        if (rc != CKR_OK) {
                goto cleanup;
        }
        rc = build_attribute(CKA_EXTRACTABLE,   &true,  1, &extractable);
        if (rc != CKR_OK) {
                goto cleanup;
        }
        rc = build_attribute(CKA_NEVER_EXTRACTABLE, &false, 1, &never_extract);
        if (rc != CKR_OK) {
                goto cleanup;
        }
        (void) template_update_attribute(tmpl, local);
        (void) template_update_attribute(tmpl, always_sens);
        (void) template_update_attribute(tmpl, sensitive);
        (void) template_update_attribute(tmpl, extractable);
        (void) template_update_attribute(tmpl, never_extract);

        return (CKR_OK);

        cleanup:

        if (local)       free(local);
        if (extractable)   free(extractable);
        if (always_sens)   free(always_sens);
        if (never_extract) free(never_extract);

        return (rc);
}

CK_RV
secret_key_validate_attribute(TEMPLATE *tmpl, CK_ATTRIBUTE *attr,
        CK_ULONG mode)
{
        switch (attr->type) {
                case CKA_ENCRYPT:
                case CKA_DECRYPT:
                case CKA_SIGN:
                case CKA_VERIFY:
                case CKA_WRAP:
                case CKA_UNWRAP:
                if (mode == MODE_MODIFY) {
                        if (nv_token_data->tweak_vector.allow_key_mods == TRUE)
                                return (CKR_OK);
                        return (CKR_ATTRIBUTE_READ_ONLY);
                }
                return (CKR_OK);

                // after key creation, CKA_SENSITIVE may only be set to TRUE
                //
                case CKA_SENSITIVE:
                {
                        CK_BBOOL value;

                        value = *(CK_BBOOL *)attr->pValue;
                        if ((mode != MODE_CREATE && mode != MODE_DERIVE &&
                            mode != MODE_KEYGEN) && (value != TRUE)) {
                                return (CKR_ATTRIBUTE_READ_ONLY);
                        }
                }
                return (CKR_OK);

                case CKA_EXTRACTABLE:
                {
                        CK_BBOOL value;

                        value = *(CK_BBOOL *)attr->pValue;
                        if ((mode != MODE_CREATE && mode != MODE_DERIVE &&
                            mode != MODE_KEYGEN) && (value != FALSE)) {
                                return (CKR_ATTRIBUTE_READ_ONLY);
                        }
                        if (value == FALSE) {
                                CK_ATTRIBUTE *attr;

                                attr = (CK_ATTRIBUTE *)malloc(
                                    sizeof (CK_ATTRIBUTE) + sizeof (CK_BBOOL));
                                if (! attr) {
                                        return (CKR_HOST_MEMORY);
                                }
                                attr->type = CKA_NEVER_EXTRACTABLE;
                                attr->ulValueLen = sizeof (CK_BBOOL);
                                attr->pValue = (CK_BYTE *)attr +
                                    sizeof (CK_ATTRIBUTE);
                                *(CK_BBOOL *)attr->pValue = FALSE;

                                (void) template_update_attribute(tmpl, attr);
                        }
                }
                return (CKR_OK);

                case CKA_ALWAYS_SENSITIVE:
                case CKA_NEVER_EXTRACTABLE:
                        return (CKR_ATTRIBUTE_READ_ONLY);

                default:
                        return (key_object_validate_attribute(tmpl,
                            attr, mode));
        }
}

CK_BBOOL
secret_key_check_exportability(CK_ATTRIBUTE_TYPE type)
{
        switch (type) {
                case CKA_VALUE:
                return (FALSE);
        }

        return (TRUE);
}

CK_RV
rsa_publ_check_required_attributes(TEMPLATE *tmpl, CK_ULONG mode)
{
        CK_ATTRIBUTE *attr = NULL;
        CK_BBOOL   found;

        found = template_attribute_find(tmpl, CKA_MODULUS, &attr);
        if (! found) {
                if (mode == MODE_CREATE) {
                        return (CKR_TEMPLATE_INCOMPLETE);
                }
        }

        found = template_attribute_find(tmpl, CKA_MODULUS_BITS, &attr);
        if (! found) {
                if (mode == MODE_KEYGEN) {
                        return (CKR_TEMPLATE_INCOMPLETE);
                }
        }

        found = template_attribute_find(tmpl, CKA_PUBLIC_EXPONENT, &attr);
        if (! found) {
                if (mode == MODE_CREATE || mode == MODE_KEYGEN) {
                        return (CKR_TEMPLATE_INCOMPLETE);
                }
        }

        return (publ_key_check_required_attributes(tmpl, mode));
}

CK_RV
rsa_publ_set_default_attributes(TEMPLATE *tmpl, CK_ULONG mode)
{
        CK_ATTRIBUTE   *type_attr        = NULL;
        CK_ATTRIBUTE   *modulus_attr    = NULL;
        CK_ATTRIBUTE   *modulus_bits_attr = NULL;
        CK_ATTRIBUTE   *public_exp_attr   = NULL;
        CK_ULONG        bits = 0L;

        (void) publ_key_set_default_attributes(tmpl, mode);

        type_attr        = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
            sizeof (CK_KEY_TYPE));
        modulus_attr    = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE));
        modulus_bits_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
            sizeof (CK_ULONG));
        public_exp_attr   = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE));

        if (! type_attr || ! modulus_attr ||
            ! modulus_bits_attr || ! public_exp_attr) {
                if (type_attr)   free(type_attr);
                if (modulus_attr)       free(modulus_attr);
                if (modulus_bits_attr) free(modulus_bits_attr);
                if (public_exp_attr)   free(public_exp_attr);

                return (CKR_HOST_MEMORY);
        }

        type_attr->type = CKA_KEY_TYPE;
        type_attr->ulValueLen = sizeof (CK_KEY_TYPE);
        type_attr->pValue       = (CK_BYTE *)type_attr +
            sizeof (CK_ATTRIBUTE);
        *(CK_KEY_TYPE *)type_attr->pValue = CKK_RSA;

        modulus_attr->type      = CKA_MODULUS;
        modulus_attr->ulValueLen = 0;
        modulus_attr->pValue    = NULL;

        modulus_bits_attr->type = CKA_MODULUS_BITS;
        modulus_bits_attr->ulValueLen = sizeof (CK_ULONG);
        modulus_bits_attr->pValue = (CK_BYTE *)modulus_bits_attr +
            sizeof (CK_ATTRIBUTE);
        *(CK_ULONG *)modulus_bits_attr->pValue = bits;

        public_exp_attr->type   = CKA_PUBLIC_EXPONENT;
        public_exp_attr->ulValueLen = 0;
        public_exp_attr->pValue = NULL;

        (void) template_update_attribute(tmpl, type_attr);
        (void) template_update_attribute(tmpl, modulus_attr);
        (void) template_update_attribute(tmpl, modulus_bits_attr);
        (void) template_update_attribute(tmpl, public_exp_attr);

        return (CKR_OK);
}

CK_RV
rsa_publ_validate_attribute(TEMPLATE *tmpl, CK_ATTRIBUTE *attr, CK_ULONG mode) {
        switch (attr->type) {
                case CKA_MODULUS_BITS:
                if (mode == MODE_KEYGEN) {
                        if (attr->ulValueLen != sizeof (CK_ULONG)) {
                                return (CKR_ATTRIBUTE_VALUE_INVALID);
                        } else {
                                CK_ULONG mod_bits = *(CK_ULONG *)attr->pValue;

                                if (mod_bits < 512 || mod_bits > 2048) {
                                        return (CKR_ATTRIBUTE_VALUE_INVALID);
                                }

                                if (mod_bits % 8 != 0) {
                                        return (CKR_ATTRIBUTE_VALUE_INVALID);
                                }
                                return (CKR_OK);
                        }
                } else {
                        return (CKR_ATTRIBUTE_READ_ONLY);
                }
                case CKA_MODULUS:
                if (mode == MODE_CREATE)
                        return (remove_leading_zeros(attr));
                else {
                        return (CKR_ATTRIBUTE_READ_ONLY);
                }
                case CKA_PUBLIC_EXPONENT:
                if (mode == MODE_CREATE || mode == MODE_KEYGEN)
                        return (remove_leading_zeros(attr));
                else {
                        return (CKR_ATTRIBUTE_READ_ONLY);
                }
                default:
                return (publ_key_validate_attribute(tmpl, attr, mode));
        }
}

CK_RV
rsa_priv_check_required_attributes(TEMPLATE *tmpl, CK_ULONG mode) {
        CK_ATTRIBUTE *attr = NULL;
        CK_BBOOL   found;

        found = template_attribute_find(tmpl, CKA_MODULUS, &attr);
        if (! found) {
                if (mode == MODE_CREATE) {
                        return (CKR_TEMPLATE_INCOMPLETE);
                }
        }

        //
        // PKCS #11 is flexible with respect to which attributes must be present
        // in an RSA key.  Keys can be specified in Chinese Remainder format or
        // they can be specified in modula exponent format. Right now, I only
        // support keys created in Chinese Remainder format. That is, we return
        // CKR_TEMPLATE_INCOMPLETE if a modula exponent key is specified.  This
        // is allowed by PKCS #11.
        //
        // In the future, we should allow for creation of keys in modula exp
        // format too.  This raises some issues.  It's easy enough to recognize
        // when a key has been specified in modula exponent format.  And it's
        // easy enough to recognize when all attributes have been specified
        // (which is what we require right now).  What's trickier to handle is
        // the "middle" cases in which more than the minimum yet less than the
        // full number of attributes have been specified.  Do we revert back to
        // modula - exponent representation?  Do we compute the missing
        // attributes ourselves?  Do we simply return CKR_TEMPLATE_INCOMPLETE?
        //

        found = template_attribute_find(tmpl, CKA_PUBLIC_EXPONENT, &attr);
        if (! found) {
                if (mode == MODE_CREATE) {
                        return (CKR_TEMPLATE_INCOMPLETE);
                }
        }

        found = template_attribute_find(tmpl, CKA_PRIVATE_EXPONENT, &attr);
        if (! found) {
                if (mode == MODE_CREATE) {
                        return (CKR_TEMPLATE_INCOMPLETE);
                }
        }

        found = template_attribute_find(tmpl, CKA_PRIME_1, &attr);
        if (! found) {
                if (mode == MODE_CREATE) {
                        return (CKR_TEMPLATE_INCOMPLETE);
                }
        }

        found = template_attribute_find(tmpl, CKA_PRIME_2, &attr);
        if (! found) {
                if (mode == MODE_CREATE) {
                        return (CKR_TEMPLATE_INCOMPLETE);
                }
        }

        found = template_attribute_find(tmpl, CKA_EXPONENT_1, &attr);
        if (! found) {
                if (mode == MODE_CREATE) {
                        return (CKR_TEMPLATE_INCOMPLETE);
                }
        }

        found = template_attribute_find(tmpl, CKA_EXPONENT_2, &attr);
        if (! found) {
                if (mode == MODE_CREATE) {
                        return (CKR_TEMPLATE_INCOMPLETE);
                }
        }

        found = template_attribute_find(tmpl, CKA_COEFFICIENT, &attr);
        if (! found) {
                if (mode == MODE_CREATE) {
                        return (CKR_TEMPLATE_INCOMPLETE);
                }
        }

        return (priv_key_check_required_attributes(tmpl, mode));
}

CK_RV
rsa_priv_set_default_attributes(TEMPLATE *tmpl, CK_ULONG mode)
{
        CK_ATTRIBUTE   *modulus_attr    = NULL;
        CK_ATTRIBUTE   *public_exp_attr   = NULL;
        CK_ATTRIBUTE   *private_exp_attr  = NULL;
        CK_ATTRIBUTE   *type_attr        = NULL;

        (void) priv_key_set_default_attributes(tmpl, mode);

        type_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
            sizeof (CK_KEY_TYPE));
        modulus_attr    = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE));
        public_exp_attr   = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE));
        private_exp_attr  = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE));

        if (! type_attr || ! modulus_attr || ! public_exp_attr ||
            ! private_exp_attr) {
                if (type_attr)  free(type_attr);
                if (modulus_attr)       free(modulus_attr);
                if (public_exp_attr)  free(public_exp_attr);
                if (private_exp_attr) free(private_exp_attr);

                return (CKR_HOST_MEMORY);
        }

        modulus_attr->type      = CKA_MODULUS;
        modulus_attr->ulValueLen = 0;
        modulus_attr->pValue    = NULL;

        public_exp_attr->type   = CKA_PUBLIC_EXPONENT;
        public_exp_attr->ulValueLen = 0;
        public_exp_attr->pValue = NULL;

        private_exp_attr->type  = CKA_PRIVATE_EXPONENT;
        private_exp_attr->ulValueLen = 0;
        private_exp_attr->pValue        = NULL;

        type_attr->type = CKA_KEY_TYPE;
        type_attr->ulValueLen = sizeof (CK_KEY_TYPE);
        type_attr->pValue = (CK_BYTE *)type_attr + sizeof (CK_ATTRIBUTE);
        *(CK_KEY_TYPE *)type_attr->pValue = CKK_RSA;

        (void) template_update_attribute(tmpl, type_attr);
        (void) template_update_attribute(tmpl, modulus_attr);
        (void) template_update_attribute(tmpl, public_exp_attr);
        (void) template_update_attribute(tmpl, private_exp_attr);

        return (CKR_OK);
}

CK_RV
rsa_priv_validate_attribute(TEMPLATE *tmpl, CK_ATTRIBUTE *attr, CK_ULONG mode) {
        switch (attr->type) {
                case CKA_MODULUS:
                case CKA_PRIVATE_EXPONENT:
                if (mode == MODE_CREATE)
                        return (remove_leading_zeros(attr));
                else {
                        return (CKR_ATTRIBUTE_READ_ONLY);
                }
                case CKA_PUBLIC_EXPONENT:
                case CKA_PRIME_1:
                case CKA_PRIME_2:
                case CKA_EXPONENT_1:
                case CKA_EXPONENT_2:
                case CKA_COEFFICIENT:
                if (mode == MODE_CREATE)
                        return (remove_leading_zeros(attr));
                else {
                        return (CKR_ATTRIBUTE_READ_ONLY);
                }
                default:
                return (priv_key_validate_attribute(tmpl, attr, mode));
        }
}

CK_BBOOL
rsa_priv_check_exportability(CK_ATTRIBUTE_TYPE type) {
        switch (type) {
                case CKA_PRIVATE_EXPONENT:
                case CKA_PRIME_1:
                case CKA_PRIME_2:
                case CKA_EXPONENT_1:
                case CKA_EXPONENT_2:
                case CKA_COEFFICIENT:
                return (FALSE);
        }

        return (TRUE);
}


/*
 * create the ASN.1 encoding for the private key for wrapping as defined
 * in PKCS #8
 *
 * ASN.1 type PrivateKeyInfo ::= SEQUENCE {
 *    version Version
 *    privateKeyAlgorithm  PrivateKeyAlgorithmIdentifier
 *    privateKey PrivateKey
 *    attributes OPTIONAL
 *
 * }
 *
 * Where PrivateKey is defined as follows for RSA:
 *
 * ASN.1 type RSAPrivateKey
 *
 * RSAPrivateKey ::= SEQUENCE {
 *   version Version
 *   modulus INTEGER
 *   publicExponent INTEGER
 *   privateExponent INTEGER
 *   prime1 INTEGER
 *   prime2 INTEGER
 *   exponent1 INTEGER
 *   exponent2 INTEGER
 *   coefficient INTEGER
 * }
 */
CK_RV
rsa_priv_wrap_get_data(TEMPLATE  *tmpl,
        CK_BBOOL   length_only,
        CK_BYTE  **data,
        CK_ULONG  *data_len)
{
        CK_ATTRIBUTE *modulus   = NULL;
        CK_ATTRIBUTE *publ_exp  = NULL, *priv_exp  = NULL;
        CK_ATTRIBUTE *prime1    = NULL, *prime2    = NULL;
        CK_ATTRIBUTE *exponent1 = NULL, *exponent2 = NULL;
        CK_ATTRIBUTE *coeff     = NULL;
        CK_RV   rc;

        if (template_attribute_find(tmpl, CKA_MODULUS, &modulus) == FALSE) {
                return (CKR_FUNCTION_FAILED);
        }
        if (template_attribute_find(tmpl, CKA_PUBLIC_EXPONENT,
            &publ_exp) == FALSE) {
                return (CKR_FUNCTION_FAILED);
        }
        if (template_attribute_find(tmpl, CKA_PRIVATE_EXPONENT,
            &priv_exp) == FALSE) {
                return (CKR_FUNCTION_FAILED);
        }
        if (template_attribute_find(tmpl, CKA_PRIME_1,
            &prime1) == FALSE) {
                return (CKR_FUNCTION_FAILED);
        }
        if (template_attribute_find(tmpl, CKA_PRIME_2,
            &prime2) == FALSE) {
                return (CKR_FUNCTION_FAILED);
        }
        if (template_attribute_find(tmpl, CKA_EXPONENT_1,
            &exponent1) == FALSE) {
                return (CKR_FUNCTION_FAILED);
        }
        if (template_attribute_find(tmpl, CKA_EXPONENT_2,
            &exponent2) == FALSE) {
                return (CKR_FUNCTION_FAILED);
        }
        if (template_attribute_find(tmpl, CKA_COEFFICIENT,
            &coeff) == FALSE) {
                return (CKR_FUNCTION_FAILED);
        }
        rc = ber_encode_RSAPrivateKey(length_only, data, data_len,
            modulus, publ_exp,  priv_exp, prime1,    prime2,
            exponent1, exponent2, coeff);

        return (rc);
}

CK_RV
rsa_priv_unwrap(TEMPLATE *tmpl,
        CK_BYTE  *data,
        CK_ULONG  total_length)
{
        CK_ATTRIBUTE *modulus   = NULL;
        CK_ATTRIBUTE *publ_exp  = NULL;
        CK_ATTRIBUTE *priv_exp  = NULL;
        CK_ATTRIBUTE *prime1    = NULL;
        CK_ATTRIBUTE *prime2    = NULL;
        CK_ATTRIBUTE *exponent1 = NULL;
        CK_ATTRIBUTE *exponent2 = NULL;
        CK_ATTRIBUTE *coeff     = NULL;
        CK_RV   rc;

        rc = ber_decode_RSAPrivateKey(data, total_length,
            &modulus, &publ_exp, &priv_exp, &prime1, &prime2,
            &exponent1, &exponent2, &coeff);

        if (rc != CKR_OK) {
                return (rc);
        }
        (void) remove_leading_zeros(modulus);
        (void) remove_leading_zeros(publ_exp);
        (void) remove_leading_zeros(priv_exp);
        (void) remove_leading_zeros(prime1);
        (void) remove_leading_zeros(prime2);
        (void) remove_leading_zeros(exponent1);
        (void) remove_leading_zeros(exponent2);
        (void) remove_leading_zeros(coeff);

        (void) template_update_attribute(tmpl, modulus);
        (void) template_update_attribute(tmpl, publ_exp);
        (void) template_update_attribute(tmpl, priv_exp);
        (void) template_update_attribute(tmpl, prime1);
        (void) template_update_attribute(tmpl, prime2);
        (void) template_update_attribute(tmpl, exponent1);
        (void) template_update_attribute(tmpl, exponent2);
        (void) template_update_attribute(tmpl, coeff);

        return (CKR_OK);
}

CK_RV
generic_secret_check_required_attributes(TEMPLATE *tmpl, CK_ULONG mode)
{
        CK_ATTRIBUTE *attr = NULL;
        CK_BBOOL   found;

        found = template_attribute_find(tmpl, CKA_VALUE, &attr);
        if (! found) {
                if (mode == MODE_CREATE) {
                        return (CKR_TEMPLATE_INCOMPLETE);
                }
        }


        found = template_attribute_find(tmpl, CKA_VALUE_LEN, &attr);
        if (! found) {
                return (CKR_OK);
        } else {
                if (mode == MODE_CREATE) {
                        return (CKR_ATTRIBUTE_READ_ONLY);
                }
        }

        return (secret_key_check_required_attributes(tmpl, mode));
}

CK_RV
generic_secret_set_default_attributes(TEMPLATE *tmpl, CK_ULONG mode)
{
        CK_ATTRIBUTE   *value_attr      = NULL;
        CK_ATTRIBUTE   *value_len_attr   = NULL;
        CK_ATTRIBUTE   *type_attr       = NULL;
        CK_ULONG    len = 0L;

        if (mode)
                value_attr = NULL;

        (void) secret_key_set_default_attributes(tmpl, mode);

        type_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
            sizeof (CK_KEY_TYPE));
        value_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE));
        value_len_attr  = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
            sizeof (CK_ULONG));

        if (! type_attr || ! value_attr || ! value_len_attr) {
                if (type_attr)  free(type_attr);
                if (value_attr) free(value_attr);
                if (value_len_attr) free(value_len_attr);

                return (CKR_HOST_MEMORY);
        }

        value_attr->type        = CKA_VALUE;
        value_attr->ulValueLen = 0;
        value_attr->pValue      = NULL;

        value_len_attr->type    = CKA_VALUE_LEN;
        value_len_attr->ulValueLen = sizeof (CK_ULONG);
        value_len_attr->pValue  = (CK_BYTE *)value_len_attr +
            sizeof (CK_ATTRIBUTE);
        *(CK_ULONG *)value_len_attr->pValue = len;

        type_attr->type = CKA_KEY_TYPE;
        type_attr->ulValueLen = sizeof (CK_KEY_TYPE);
        type_attr->pValue       = (CK_BYTE *)type_attr +
            sizeof (CK_ATTRIBUTE);
        *(CK_KEY_TYPE *)type_attr->pValue = CKK_GENERIC_SECRET;

        (void) template_update_attribute(tmpl, type_attr);
        (void) template_update_attribute(tmpl, value_attr);
        (void) template_update_attribute(tmpl, value_len_attr);

        return (CKR_OK);
}

CK_RV
generic_secret_validate_attribute(TEMPLATE *tmpl,
        CK_ATTRIBUTE *attr, CK_ULONG mode)
{
        switch (attr->type) {
                case CKA_VALUE:
                if (mode == MODE_CREATE)
                        return (CKR_OK);
                else
                        return (CKR_ATTRIBUTE_READ_ONLY);

                case CKA_VALUE_LEN:
                if (mode == MODE_KEYGEN || mode == MODE_DERIVE)
                        return (CKR_OK);
                else {
                        if (mode == MODE_UNWRAP) {
                                return (CKR_OK);
                        }
                        return (CKR_ATTRIBUTE_READ_ONLY);
                }

                default:
                return (secret_key_validate_attribute(tmpl, attr, mode));
        }
}

CK_BBOOL
generic_secret_check_exportability(CK_ATTRIBUTE_TYPE type) {
        switch (type) {
                case CKA_VALUE:
                return (FALSE);
        }

        return (TRUE);
}

CK_RV
generic_secret_wrap_get_data(TEMPLATE   * tmpl,
        CK_BBOOL        length_only,
        CK_BYTE   ** data,
        CK_ULONG   * data_len)
{
        CK_ATTRIBUTE    * attr = NULL;
        CK_BYTE * ptr  = NULL;
        CK_RV     rc;

        if (! tmpl || ! data_len) {
                return (CKR_FUNCTION_FAILED);
        }

        rc = template_attribute_find(tmpl, CKA_VALUE, &attr);
        if (rc == FALSE) {
                return (CKR_KEY_NOT_WRAPPABLE);
        }
        *data_len = attr->ulValueLen;

        if (length_only == FALSE) {
                ptr = (CK_BYTE *)malloc(attr->ulValueLen);
                if (! ptr) {
                        return (CKR_HOST_MEMORY);
                }
                (void) memcpy(ptr, attr->pValue, attr->ulValueLen);

                *data = ptr;
        }

        return (CKR_OK);
}

CK_RV
generic_secret_unwrap(TEMPLATE *tmpl,
        CK_BYTE  *data,
        CK_ULONG  data_len,
        CK_BBOOL  fromend)
{
        CK_ATTRIBUTE  * attr       = NULL;
        CK_ATTRIBUTE  * value_attr      = NULL;
        CK_ATTRIBUTE  * value_len_attr = NULL;
        CK_BYTE    * ptr            = NULL;
        CK_ULONG        rc, len = 0;


        if (fromend == TRUE)
                ptr = data + data_len;
        else
                ptr = data;

        rc = template_attribute_find(tmpl, CKA_VALUE_LEN, &attr);
        if (rc) {
                len = *(CK_ULONG *)attr->pValue;
                if (len > data_len) {
                        rc = CKR_ATTRIBUTE_VALUE_INVALID;
                        goto error;
                }

                if (len != 0)
                        data_len = len;
        }

        if (fromend == TRUE)
                ptr -= data_len;

        rc = build_attribute(CKA_VALUE, ptr, data_len, &value_attr);
        if (rc != CKR_OK) {
                goto error;
        }
        if (data_len != len) {
                rc = build_attribute(CKA_VALUE_LEN, (CK_BYTE *)&data_len,
                    sizeof (CK_ULONG), &value_len_attr);
                if (rc != CKR_OK)
                        goto error;
        }

        (void) template_update_attribute(tmpl, value_attr);

        if (data_len != len)
                (void) template_update_attribute(tmpl, value_len_attr);

        return (CKR_OK);

error:
        if (value_attr) free(value_attr);
        if (value_len_attr) free(value_len_attr);

        return (rc);
}