#include "tpmtok_int.h"
CK_RV
key_object_check_required_attributes(TEMPLATE *tmpl, CK_ULONG mode)
{
CK_ATTRIBUTE * attr = NULL;
CK_BBOOL found;
found = template_attribute_find(tmpl, CKA_KEY_TYPE, &attr);
if (! found) {
if (mode == MODE_CREATE) {
return (CKR_TEMPLATE_INCOMPLETE);
}
}
return (template_check_required_base_attributes(tmpl, mode));
}
CK_RV
key_object_set_default_attributes(TEMPLATE *tmpl, CK_ULONG mode)
{
CK_ATTRIBUTE * id_attr = NULL;
CK_ATTRIBUTE * sdate_attr = NULL;
CK_ATTRIBUTE * edate_attr = NULL;
CK_ATTRIBUTE * derive_attr = NULL;
CK_ATTRIBUTE * local_attr = NULL;
if (mode)
id_attr = NULL;
id_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE));
sdate_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE));
edate_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE));
derive_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
sizeof (CK_BBOOL));
local_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
sizeof (CK_BBOOL));
if (! id_attr || ! sdate_attr || ! edate_attr ||
! derive_attr || ! local_attr) {
if (id_attr) free(id_attr);
if (sdate_attr) free(sdate_attr);
if (edate_attr) free(edate_attr);
if (derive_attr) free(derive_attr);
if (local_attr) free(local_attr);
return (CKR_HOST_MEMORY);
}
id_attr->type = CKA_ID;
id_attr->ulValueLen = 0;
id_attr->pValue = NULL;
sdate_attr->type = CKA_START_DATE;
sdate_attr->ulValueLen = 0;
sdate_attr->pValue = NULL;
edate_attr->type = CKA_END_DATE;
edate_attr->ulValueLen = 0;
edate_attr->pValue = NULL;
derive_attr->type = CKA_DERIVE;
derive_attr->ulValueLen = sizeof (CK_BBOOL);
derive_attr->pValue = (CK_BYTE *)derive_attr +
sizeof (CK_ATTRIBUTE);
*(CK_BBOOL *)derive_attr->pValue = FALSE;
local_attr->type = CKA_LOCAL;
local_attr->ulValueLen = sizeof (CK_BBOOL);
local_attr->pValue = (CK_BYTE *)local_attr + sizeof (CK_ATTRIBUTE);
*(CK_BBOOL *)local_attr->pValue = FALSE;
(void) template_update_attribute(tmpl, id_attr);
(void) template_update_attribute(tmpl, sdate_attr);
(void) template_update_attribute(tmpl, edate_attr);
(void) template_update_attribute(tmpl, derive_attr);
(void) template_update_attribute(tmpl, local_attr);
return (CKR_OK);
}
CK_RV
key_object_validate_attribute(TEMPLATE *tmpl,
CK_ATTRIBUTE *attr, CK_ULONG mode)
{
switch (attr->type) {
case CKA_KEY_TYPE:
if (mode == MODE_CREATE || mode == MODE_DERIVE ||
mode == MODE_KEYGEN || mode == MODE_UNWRAP)
return (CKR_OK);
else {
return (CKR_ATTRIBUTE_READ_ONLY);
}
case CKA_ID:
case CKA_START_DATE:
case CKA_END_DATE:
case CKA_DERIVE:
return (CKR_OK);
case CKA_LOCAL:
return (CKR_ATTRIBUTE_READ_ONLY);
default:
return (template_validate_base_attribute(tmpl, attr, mode));
}
}
CK_RV
publ_key_check_required_attributes(TEMPLATE *tmpl, CK_ULONG mode) {
return (key_object_check_required_attributes(tmpl, mode));
}
CK_RV
publ_key_set_default_attributes(TEMPLATE *tmpl, CK_ULONG mode)
{
CK_ATTRIBUTE *class_attr = NULL;
CK_ATTRIBUTE *subject_attr = NULL;
CK_ATTRIBUTE *encrypt_attr = NULL;
CK_ATTRIBUTE *verify_attr = NULL;
CK_ATTRIBUTE *verify_recover_attr = NULL;
CK_ATTRIBUTE *wrap_attr = NULL;
CK_OBJECT_CLASS class = CKO_PUBLIC_KEY;
CK_RV rc;
rc = key_object_set_default_attributes(tmpl, mode);
if (rc != CKR_OK) {
return (rc);
}
class_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
sizeof (CK_OBJECT_CLASS));
subject_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE));
encrypt_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
sizeof (CK_BBOOL));
verify_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
sizeof (CK_BBOOL));
verify_recover_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
sizeof (CK_BBOOL));
wrap_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
sizeof (CK_BBOOL));
if (! class || ! subject_attr || ! encrypt_attr ||
! verify_attr || ! verify_recover_attr || ! wrap_attr) {
if (class_attr) free(class_attr);
if (subject_attr) free(subject_attr);
if (encrypt_attr) free(encrypt_attr);
if (verify_attr) free(verify_attr);
if (verify_recover_attr) free(verify_recover_attr);
if (wrap_attr) free(wrap_attr);
return (CKR_HOST_MEMORY);
}
class_attr->type = CKA_CLASS;
class_attr->ulValueLen = sizeof (CK_OBJECT_CLASS);
class_attr->pValue = (CK_BYTE *)class_attr +
sizeof (CK_ATTRIBUTE);
*(CK_OBJECT_CLASS *)class_attr->pValue = CKO_PUBLIC_KEY;
subject_attr->type = CKA_SUBJECT;
subject_attr->ulValueLen = 0;
subject_attr->pValue = NULL;
encrypt_attr->type = CKA_ENCRYPT;
encrypt_attr->ulValueLen = sizeof (CK_BBOOL);
encrypt_attr->pValue = (CK_BYTE *)encrypt_attr +
sizeof (CK_ATTRIBUTE);
*(CK_BBOOL *)encrypt_attr->pValue = TRUE;
verify_attr->type = CKA_VERIFY;
verify_attr->ulValueLen = sizeof (CK_BBOOL);
verify_attr->pValue = (CK_BYTE *)verify_attr +
sizeof (CK_ATTRIBUTE);
*(CK_BBOOL *)verify_attr->pValue = TRUE;
verify_recover_attr->type = CKA_VERIFY_RECOVER;
verify_recover_attr->ulValueLen = sizeof (CK_BBOOL);
verify_recover_attr->pValue = (CK_BYTE *)verify_recover_attr +
sizeof (CK_ATTRIBUTE);
*(CK_BBOOL *)verify_recover_attr->pValue = TRUE;
wrap_attr->type = CKA_WRAP;
wrap_attr->ulValueLen = sizeof (CK_BBOOL);
wrap_attr->pValue = (CK_BYTE *)wrap_attr +
sizeof (CK_ATTRIBUTE);
*(CK_BBOOL *)wrap_attr->pValue = TRUE;
(void) template_update_attribute(tmpl, class_attr);
(void) template_update_attribute(tmpl, subject_attr);
(void) template_update_attribute(tmpl, encrypt_attr);
(void) template_update_attribute(tmpl, verify_attr);
(void) template_update_attribute(tmpl, verify_recover_attr);
(void) template_update_attribute(tmpl, wrap_attr);
return (CKR_OK);
}
CK_RV
publ_key_validate_attribute(TEMPLATE *tmpl,
CK_ATTRIBUTE *attr, CK_ULONG mode) {
switch (attr->type) {
case CKA_SUBJECT:
return (CKR_OK);
case CKA_ENCRYPT:
case CKA_VERIFY:
case CKA_VERIFY_RECOVER:
case CKA_WRAP:
if (mode == MODE_MODIFY) {
if (nv_token_data->tweak_vector.allow_key_mods == TRUE)
return (CKR_OK);
return (CKR_ATTRIBUTE_READ_ONLY);
}
return (CKR_OK);
default:
return (key_object_validate_attribute(tmpl, attr, mode));
}
}
CK_RV
priv_key_check_required_attributes(TEMPLATE *tmpl, CK_ULONG mode) {
return (key_object_check_required_attributes(tmpl, mode));
}
CK_RV
priv_key_set_default_attributes(TEMPLATE *tmpl, CK_ULONG mode)
{
CK_ATTRIBUTE *class_attr = NULL;
CK_ATTRIBUTE *subject_attr = NULL;
CK_ATTRIBUTE *sensitive_attr = NULL;
CK_ATTRIBUTE *decrypt_attr = NULL;
CK_ATTRIBUTE *sign_attr = NULL;
CK_ATTRIBUTE *sign_recover_attr = NULL;
CK_ATTRIBUTE *unwrap_attr = NULL;
CK_ATTRIBUTE *extractable_attr = NULL;
CK_ATTRIBUTE *never_extr_attr = NULL;
CK_ATTRIBUTE *always_sens_attr = NULL;
CK_RV rc;
rc = key_object_set_default_attributes(tmpl, mode);
if (rc != CKR_OK) {
return (rc);
}
class_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
sizeof (CK_OBJECT_CLASS));
subject_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE));
sensitive_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
sizeof (CK_BBOOL));
decrypt_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
sizeof (CK_BBOOL));
sign_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
sizeof (CK_BBOOL));
sign_recover_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
sizeof (CK_BBOOL));
unwrap_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
sizeof (CK_BBOOL));
extractable_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
sizeof (CK_BBOOL));
never_extr_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
sizeof (CK_BBOOL));
always_sens_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
sizeof (CK_BBOOL));
if (! class_attr || ! subject_attr || ! sensitive_attr ||
! decrypt_attr || ! sign_attr || ! sign_recover_attr ||
! unwrap_attr || ! extractable_attr ||
! never_extr_attr || ! always_sens_attr) {
if (class_attr) free(class_attr);
if (subject_attr) free(subject_attr);
if (sensitive_attr) free(sensitive_attr);
if (decrypt_attr) free(decrypt_attr);
if (sign_attr) free(sign_attr);
if (sign_recover_attr) free(sign_recover_attr);
if (unwrap_attr) free(unwrap_attr);
if (extractable_attr) free(extractable_attr);
if (always_sens_attr) free(always_sens_attr);
if (never_extr_attr) free(never_extr_attr);
return (CKR_HOST_MEMORY);
}
class_attr->type = CKA_CLASS;
class_attr->ulValueLen = sizeof (CK_OBJECT_CLASS);
class_attr->pValue = (CK_BYTE *)class_attr + sizeof (CK_ATTRIBUTE);
*(CK_OBJECT_CLASS *)class_attr->pValue = CKO_PRIVATE_KEY;
subject_attr->type = CKA_SUBJECT;
subject_attr->ulValueLen = 0;
subject_attr->pValue = NULL;
sensitive_attr->type = CKA_SENSITIVE;
sensitive_attr->ulValueLen = sizeof (CK_BBOOL);
sensitive_attr->pValue = (CK_BYTE *)sensitive_attr +
sizeof (CK_ATTRIBUTE);
*(CK_BBOOL *)sensitive_attr->pValue = FALSE;
decrypt_attr->type = CKA_DECRYPT;
decrypt_attr->ulValueLen = sizeof (CK_BBOOL);
decrypt_attr->pValue = (CK_BYTE *)decrypt_attr +
sizeof (CK_ATTRIBUTE);
*(CK_BBOOL *)decrypt_attr->pValue = TRUE;
sign_attr->type = CKA_SIGN;
sign_attr->ulValueLen = sizeof (CK_BBOOL);
sign_attr->pValue = (CK_BYTE *)sign_attr +
sizeof (CK_ATTRIBUTE);
*(CK_BBOOL *)sign_attr->pValue = TRUE;
sign_recover_attr->type = CKA_SIGN_RECOVER;
sign_recover_attr->ulValueLen = sizeof (CK_BBOOL);
sign_recover_attr->pValue = (CK_BYTE *)sign_recover_attr +
sizeof (CK_ATTRIBUTE);
*(CK_BBOOL *)sign_recover_attr->pValue = TRUE;
unwrap_attr->type = CKA_UNWRAP;
unwrap_attr->ulValueLen = sizeof (CK_BBOOL);
unwrap_attr->pValue = (CK_BYTE *)unwrap_attr +
sizeof (CK_ATTRIBUTE);
*(CK_BBOOL *)unwrap_attr->pValue = TRUE;
extractable_attr->type = CKA_EXTRACTABLE;
extractable_attr->ulValueLen = sizeof (CK_BBOOL);
extractable_attr->pValue = (CK_BYTE *)extractable_attr +
sizeof (CK_ATTRIBUTE);
*(CK_BBOOL *)extractable_attr->pValue = TRUE;
never_extr_attr->type = CKA_NEVER_EXTRACTABLE;
never_extr_attr->ulValueLen = sizeof (CK_BBOOL);
never_extr_attr->pValue = (CK_BYTE *)never_extr_attr +
sizeof (CK_ATTRIBUTE);
*(CK_BBOOL *)never_extr_attr->pValue = FALSE;
always_sens_attr->type = CKA_ALWAYS_SENSITIVE;
always_sens_attr->ulValueLen = sizeof (CK_BBOOL);
always_sens_attr->pValue = (CK_BYTE *)always_sens_attr +
sizeof (CK_ATTRIBUTE);
*(CK_BBOOL *)always_sens_attr->pValue = FALSE;
(void) template_update_attribute(tmpl, class_attr);
(void) template_update_attribute(tmpl, subject_attr);
(void) template_update_attribute(tmpl, sensitive_attr);
(void) template_update_attribute(tmpl, decrypt_attr);
(void) template_update_attribute(tmpl, sign_attr);
(void) template_update_attribute(tmpl, sign_recover_attr);
(void) template_update_attribute(tmpl, unwrap_attr);
(void) template_update_attribute(tmpl, extractable_attr);
(void) template_update_attribute(tmpl, never_extr_attr);
(void) template_update_attribute(tmpl, always_sens_attr);
return (CKR_OK);
}
CK_RV
priv_key_unwrap(TEMPLATE *tmpl,
CK_ULONG keytype,
CK_BYTE *data,
CK_ULONG data_len)
{
CK_ATTRIBUTE *extractable = NULL;
CK_ATTRIBUTE *always_sens = NULL;
CK_ATTRIBUTE *never_extract = NULL;
CK_ATTRIBUTE *sensitive = NULL;
CK_ATTRIBUTE *local = NULL;
CK_BBOOL true = TRUE;
CK_BBOOL false = FALSE;
CK_RV rc;
switch (keytype) {
case CKK_RSA:
rc = rsa_priv_unwrap(tmpl, data, data_len);
break;
default:
return (CKR_WRAPPED_KEY_INVALID);
}
if (rc != CKR_OK) {
return (rc);
}
rc = build_attribute(CKA_LOCAL, &false, 1, &local);
if (rc != CKR_OK) {
goto cleanup;
}
rc = build_attribute(CKA_ALWAYS_SENSITIVE, &false, 1, &always_sens);
if (rc != CKR_OK) {
goto cleanup;
}
rc = build_attribute(CKA_SENSITIVE, &false, 1, &sensitive);
if (rc != CKR_OK) {
goto cleanup;
}
rc = build_attribute(CKA_EXTRACTABLE, &true, 1, &extractable);
if (rc != CKR_OK) {
goto cleanup;
}
rc = build_attribute(CKA_NEVER_EXTRACTABLE, &false, 1, &never_extract);
if (rc != CKR_OK) {
goto cleanup;
}
(void) template_update_attribute(tmpl, local);
(void) template_update_attribute(tmpl, always_sens);
(void) template_update_attribute(tmpl, sensitive);
(void) template_update_attribute(tmpl, extractable);
(void) template_update_attribute(tmpl, never_extract);
return (CKR_OK);
cleanup:
if (local) free(local);
if (always_sens) free(always_sens);
if (extractable) free(extractable);
if (never_extract) free(never_extract);
return (rc);
}
CK_RV
priv_key_validate_attribute(TEMPLATE *tmpl, CK_ATTRIBUTE *attr, CK_ULONG mode) {
switch (attr->type) {
case CKA_SUBJECT:
return (CKR_OK);
case CKA_DECRYPT:
case CKA_SIGN:
case CKA_SIGN_RECOVER:
case CKA_UNWRAP:
if (mode == MODE_MODIFY) {
if (nv_token_data->tweak_vector.allow_key_mods == TRUE)
return (CKR_OK);
return (CKR_ATTRIBUTE_READ_ONLY);
}
return (CKR_OK);
case CKA_SENSITIVE:
{
CK_BBOOL value;
if (mode == MODE_CREATE || mode == MODE_KEYGEN)
return (CKR_OK);
value = *(CK_BBOOL *)attr->pValue;
if (value != TRUE) {
return (CKR_ATTRIBUTE_READ_ONLY);
}
}
return (CKR_OK);
case CKA_EXTRACTABLE:
{
CK_BBOOL value;
value = *(CK_BBOOL *)attr->pValue;
if ((mode != MODE_CREATE && mode != MODE_KEYGEN) &&
value != FALSE) {
return (CKR_ATTRIBUTE_READ_ONLY);
}
if (value == FALSE) {
CK_ATTRIBUTE *attr;
attr = (CK_ATTRIBUTE *)malloc(
sizeof (CK_ATTRIBUTE) + sizeof (CK_BBOOL));
if (! attr) {
return (CKR_HOST_MEMORY);
}
attr->type = CKA_NEVER_EXTRACTABLE;
attr->ulValueLen = sizeof (CK_BBOOL);
attr->pValue = (CK_BYTE *)attr +
sizeof (CK_ATTRIBUTE);
*(CK_BBOOL *)attr->pValue = FALSE;
(void) template_update_attribute(tmpl, attr);
}
}
return (CKR_OK);
case CKA_ALWAYS_SENSITIVE:
case CKA_NEVER_EXTRACTABLE:
return (CKR_ATTRIBUTE_READ_ONLY);
default:
return (key_object_validate_attribute(tmpl, attr, mode));
}
}
CK_RV
secret_key_check_required_attributes(TEMPLATE *tmpl, CK_ULONG mode)
{
return (key_object_check_required_attributes(tmpl, mode));
}
CK_RV
secret_key_set_default_attributes(TEMPLATE *tmpl, CK_ULONG mode)
{
CK_ATTRIBUTE *class_attr = NULL;
CK_ATTRIBUTE *sensitive_attr = NULL;
CK_ATTRIBUTE *encrypt_attr = NULL;
CK_ATTRIBUTE *decrypt_attr = NULL;
CK_ATTRIBUTE *sign_attr = NULL;
CK_ATTRIBUTE *verify_attr = NULL;
CK_ATTRIBUTE *wrap_attr = NULL;
CK_ATTRIBUTE *unwrap_attr = NULL;
CK_ATTRIBUTE *extractable_attr = NULL;
CK_ATTRIBUTE *never_extr_attr = NULL;
CK_ATTRIBUTE *always_sens_attr = NULL;
CK_RV rc;
rc = key_object_set_default_attributes(tmpl, mode);
if (rc != CKR_OK)
return (rc);
class_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
sizeof (CK_OBJECT_CLASS));
sensitive_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
sizeof (CK_BBOOL));
encrypt_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
sizeof (CK_BBOOL));
decrypt_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
sizeof (CK_BBOOL));
sign_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
sizeof (CK_BBOOL));
verify_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
sizeof (CK_BBOOL));
wrap_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
sizeof (CK_BBOOL));
unwrap_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
sizeof (CK_BBOOL));
extractable_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
sizeof (CK_BBOOL));
never_extr_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
sizeof (CK_BBOOL));
always_sens_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
sizeof (CK_BBOOL));
if (! class_attr || ! sensitive_attr || ! encrypt_attr ||
! decrypt_attr || ! sign_attr || ! verify_attr ||
! wrap_attr || ! unwrap_attr || ! extractable_attr ||
! never_extr_attr || ! always_sens_attr) {
if (class_attr) free(class_attr);
if (sensitive_attr) free(sensitive_attr);
if (encrypt_attr) free(encrypt_attr);
if (decrypt_attr) free(decrypt_attr);
if (sign_attr) free(sign_attr);
if (verify_attr) free(verify_attr);
if (wrap_attr) free(wrap_attr);
if (unwrap_attr) free(unwrap_attr);
if (extractable_attr) free(extractable_attr);
if (never_extr_attr) free(never_extr_attr);
if (always_sens_attr) free(always_sens_attr);
return (CKR_HOST_MEMORY);
}
class_attr->type = CKA_CLASS;
class_attr->ulValueLen = sizeof (CK_OBJECT_CLASS);
class_attr->pValue = (CK_BYTE *)class_attr +
sizeof (CK_ATTRIBUTE);
*(CK_OBJECT_CLASS *)class_attr->pValue = CKO_SECRET_KEY;
sensitive_attr->type = CKA_SENSITIVE;
sensitive_attr->ulValueLen = sizeof (CK_BBOOL);
sensitive_attr->pValue = (CK_BYTE *)sensitive_attr +
sizeof (CK_ATTRIBUTE);
*(CK_BBOOL *)sensitive_attr->pValue = FALSE;
encrypt_attr->type = CKA_ENCRYPT;
encrypt_attr->ulValueLen = sizeof (CK_BBOOL);
encrypt_attr->pValue = (CK_BYTE *)encrypt_attr +
sizeof (CK_ATTRIBUTE);
*(CK_BBOOL *)encrypt_attr->pValue = TRUE;
decrypt_attr->type = CKA_DECRYPT;
decrypt_attr->ulValueLen = sizeof (CK_BBOOL);
decrypt_attr->pValue = (CK_BYTE *)decrypt_attr +
sizeof (CK_ATTRIBUTE);
*(CK_BBOOL *)decrypt_attr->pValue = TRUE;
sign_attr->type = CKA_SIGN;
sign_attr->ulValueLen = sizeof (CK_BBOOL);
sign_attr->pValue = (CK_BYTE *)sign_attr +
sizeof (CK_ATTRIBUTE);
*(CK_BBOOL *)sign_attr->pValue = TRUE;
verify_attr->type = CKA_VERIFY;
verify_attr->ulValueLen = sizeof (CK_BBOOL);
verify_attr->pValue = (CK_BYTE *)verify_attr +
sizeof (CK_ATTRIBUTE);
*(CK_BBOOL *)verify_attr->pValue = TRUE;
wrap_attr->type = CKA_WRAP;
wrap_attr->ulValueLen = sizeof (CK_BBOOL);
wrap_attr->pValue = (CK_BYTE *)wrap_attr +
sizeof (CK_ATTRIBUTE);
*(CK_BBOOL *)wrap_attr->pValue = TRUE;
unwrap_attr->type = CKA_UNWRAP;
unwrap_attr->ulValueLen = sizeof (CK_BBOOL);
unwrap_attr->pValue = (CK_BYTE *)unwrap_attr +
sizeof (CK_ATTRIBUTE);
*(CK_BBOOL *)unwrap_attr->pValue = TRUE;
extractable_attr->type = CKA_EXTRACTABLE;
extractable_attr->ulValueLen = sizeof (CK_BBOOL);
extractable_attr->pValue = (CK_BYTE *)extractable_attr +
sizeof (CK_ATTRIBUTE);
*(CK_BBOOL *)extractable_attr->pValue = TRUE;
always_sens_attr->type = CKA_ALWAYS_SENSITIVE;
always_sens_attr->ulValueLen = sizeof (CK_BBOOL);
always_sens_attr->pValue = (CK_BYTE *)always_sens_attr +
sizeof (CK_ATTRIBUTE);
*(CK_BBOOL *)always_sens_attr->pValue = FALSE;
never_extr_attr->type = CKA_NEVER_EXTRACTABLE;
never_extr_attr->ulValueLen = sizeof (CK_BBOOL);
never_extr_attr->pValue = (CK_BYTE *)never_extr_attr +
sizeof (CK_ATTRIBUTE);
*(CK_BBOOL *)never_extr_attr->pValue = FALSE;
(void) template_update_attribute(tmpl, class_attr);
(void) template_update_attribute(tmpl, sensitive_attr);
(void) template_update_attribute(tmpl, encrypt_attr);
(void) template_update_attribute(tmpl, decrypt_attr);
(void) template_update_attribute(tmpl, sign_attr);
(void) template_update_attribute(tmpl, verify_attr);
(void) template_update_attribute(tmpl, wrap_attr);
(void) template_update_attribute(tmpl, unwrap_attr);
(void) template_update_attribute(tmpl, extractable_attr);
(void) template_update_attribute(tmpl, never_extr_attr);
(void) template_update_attribute(tmpl, always_sens_attr);
return (CKR_OK);
}
CK_RV
secret_key_unwrap(TEMPLATE *tmpl,
CK_ULONG keytype,
CK_BYTE *data,
CK_ULONG data_len,
CK_BBOOL fromend)
{
CK_ATTRIBUTE *local = NULL;
CK_ATTRIBUTE *always_sens = NULL;
CK_ATTRIBUTE *sensitive = NULL;
CK_ATTRIBUTE *extractable = NULL;
CK_ATTRIBUTE *never_extract = NULL;
CK_BBOOL true = TRUE;
CK_BBOOL false = FALSE;
CK_RV rc;
switch (keytype) {
case CKK_GENERIC_SECRET:
rc = generic_secret_unwrap(tmpl, data, data_len, fromend);
break;
default:
return (CKR_WRAPPED_KEY_INVALID);
}
if (rc != CKR_OK)
return (rc);
rc = build_attribute(CKA_LOCAL, &false, 1, &local);
if (rc != CKR_OK) {
goto cleanup;
}
rc = build_attribute(CKA_ALWAYS_SENSITIVE, &false, 1, &always_sens);
if (rc != CKR_OK) {
goto cleanup;
}
rc = build_attribute(CKA_SENSITIVE, &false, 1, &sensitive);
if (rc != CKR_OK) {
goto cleanup;
}
rc = build_attribute(CKA_EXTRACTABLE, &true, 1, &extractable);
if (rc != CKR_OK) {
goto cleanup;
}
rc = build_attribute(CKA_NEVER_EXTRACTABLE, &false, 1, &never_extract);
if (rc != CKR_OK) {
goto cleanup;
}
(void) template_update_attribute(tmpl, local);
(void) template_update_attribute(tmpl, always_sens);
(void) template_update_attribute(tmpl, sensitive);
(void) template_update_attribute(tmpl, extractable);
(void) template_update_attribute(tmpl, never_extract);
return (CKR_OK);
cleanup:
if (local) free(local);
if (extractable) free(extractable);
if (always_sens) free(always_sens);
if (never_extract) free(never_extract);
return (rc);
}
CK_RV
secret_key_validate_attribute(TEMPLATE *tmpl, CK_ATTRIBUTE *attr,
CK_ULONG mode)
{
switch (attr->type) {
case CKA_ENCRYPT:
case CKA_DECRYPT:
case CKA_SIGN:
case CKA_VERIFY:
case CKA_WRAP:
case CKA_UNWRAP:
if (mode == MODE_MODIFY) {
if (nv_token_data->tweak_vector.allow_key_mods == TRUE)
return (CKR_OK);
return (CKR_ATTRIBUTE_READ_ONLY);
}
return (CKR_OK);
case CKA_SENSITIVE:
{
CK_BBOOL value;
value = *(CK_BBOOL *)attr->pValue;
if ((mode != MODE_CREATE && mode != MODE_DERIVE &&
mode != MODE_KEYGEN) && (value != TRUE)) {
return (CKR_ATTRIBUTE_READ_ONLY);
}
}
return (CKR_OK);
case CKA_EXTRACTABLE:
{
CK_BBOOL value;
value = *(CK_BBOOL *)attr->pValue;
if ((mode != MODE_CREATE && mode != MODE_DERIVE &&
mode != MODE_KEYGEN) && (value != FALSE)) {
return (CKR_ATTRIBUTE_READ_ONLY);
}
if (value == FALSE) {
CK_ATTRIBUTE *attr;
attr = (CK_ATTRIBUTE *)malloc(
sizeof (CK_ATTRIBUTE) + sizeof (CK_BBOOL));
if (! attr) {
return (CKR_HOST_MEMORY);
}
attr->type = CKA_NEVER_EXTRACTABLE;
attr->ulValueLen = sizeof (CK_BBOOL);
attr->pValue = (CK_BYTE *)attr +
sizeof (CK_ATTRIBUTE);
*(CK_BBOOL *)attr->pValue = FALSE;
(void) template_update_attribute(tmpl, attr);
}
}
return (CKR_OK);
case CKA_ALWAYS_SENSITIVE:
case CKA_NEVER_EXTRACTABLE:
return (CKR_ATTRIBUTE_READ_ONLY);
default:
return (key_object_validate_attribute(tmpl,
attr, mode));
}
}
CK_BBOOL
secret_key_check_exportability(CK_ATTRIBUTE_TYPE type)
{
switch (type) {
case CKA_VALUE:
return (FALSE);
}
return (TRUE);
}
CK_RV
rsa_publ_check_required_attributes(TEMPLATE *tmpl, CK_ULONG mode)
{
CK_ATTRIBUTE *attr = NULL;
CK_BBOOL found;
found = template_attribute_find(tmpl, CKA_MODULUS, &attr);
if (! found) {
if (mode == MODE_CREATE) {
return (CKR_TEMPLATE_INCOMPLETE);
}
}
found = template_attribute_find(tmpl, CKA_MODULUS_BITS, &attr);
if (! found) {
if (mode == MODE_KEYGEN) {
return (CKR_TEMPLATE_INCOMPLETE);
}
}
found = template_attribute_find(tmpl, CKA_PUBLIC_EXPONENT, &attr);
if (! found) {
if (mode == MODE_CREATE || mode == MODE_KEYGEN) {
return (CKR_TEMPLATE_INCOMPLETE);
}
}
return (publ_key_check_required_attributes(tmpl, mode));
}
CK_RV
rsa_publ_set_default_attributes(TEMPLATE *tmpl, CK_ULONG mode)
{
CK_ATTRIBUTE *type_attr = NULL;
CK_ATTRIBUTE *modulus_attr = NULL;
CK_ATTRIBUTE *modulus_bits_attr = NULL;
CK_ATTRIBUTE *public_exp_attr = NULL;
CK_ULONG bits = 0L;
(void) publ_key_set_default_attributes(tmpl, mode);
type_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
sizeof (CK_KEY_TYPE));
modulus_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE));
modulus_bits_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
sizeof (CK_ULONG));
public_exp_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE));
if (! type_attr || ! modulus_attr ||
! modulus_bits_attr || ! public_exp_attr) {
if (type_attr) free(type_attr);
if (modulus_attr) free(modulus_attr);
if (modulus_bits_attr) free(modulus_bits_attr);
if (public_exp_attr) free(public_exp_attr);
return (CKR_HOST_MEMORY);
}
type_attr->type = CKA_KEY_TYPE;
type_attr->ulValueLen = sizeof (CK_KEY_TYPE);
type_attr->pValue = (CK_BYTE *)type_attr +
sizeof (CK_ATTRIBUTE);
*(CK_KEY_TYPE *)type_attr->pValue = CKK_RSA;
modulus_attr->type = CKA_MODULUS;
modulus_attr->ulValueLen = 0;
modulus_attr->pValue = NULL;
modulus_bits_attr->type = CKA_MODULUS_BITS;
modulus_bits_attr->ulValueLen = sizeof (CK_ULONG);
modulus_bits_attr->pValue = (CK_BYTE *)modulus_bits_attr +
sizeof (CK_ATTRIBUTE);
*(CK_ULONG *)modulus_bits_attr->pValue = bits;
public_exp_attr->type = CKA_PUBLIC_EXPONENT;
public_exp_attr->ulValueLen = 0;
public_exp_attr->pValue = NULL;
(void) template_update_attribute(tmpl, type_attr);
(void) template_update_attribute(tmpl, modulus_attr);
(void) template_update_attribute(tmpl, modulus_bits_attr);
(void) template_update_attribute(tmpl, public_exp_attr);
return (CKR_OK);
}
CK_RV
rsa_publ_validate_attribute(TEMPLATE *tmpl, CK_ATTRIBUTE *attr, CK_ULONG mode) {
switch (attr->type) {
case CKA_MODULUS_BITS:
if (mode == MODE_KEYGEN) {
if (attr->ulValueLen != sizeof (CK_ULONG)) {
return (CKR_ATTRIBUTE_VALUE_INVALID);
} else {
CK_ULONG mod_bits = *(CK_ULONG *)attr->pValue;
if (mod_bits < 512 || mod_bits > 2048) {
return (CKR_ATTRIBUTE_VALUE_INVALID);
}
if (mod_bits % 8 != 0) {
return (CKR_ATTRIBUTE_VALUE_INVALID);
}
return (CKR_OK);
}
} else {
return (CKR_ATTRIBUTE_READ_ONLY);
}
case CKA_MODULUS:
if (mode == MODE_CREATE)
return (remove_leading_zeros(attr));
else {
return (CKR_ATTRIBUTE_READ_ONLY);
}
case CKA_PUBLIC_EXPONENT:
if (mode == MODE_CREATE || mode == MODE_KEYGEN)
return (remove_leading_zeros(attr));
else {
return (CKR_ATTRIBUTE_READ_ONLY);
}
default:
return (publ_key_validate_attribute(tmpl, attr, mode));
}
}
CK_RV
rsa_priv_check_required_attributes(TEMPLATE *tmpl, CK_ULONG mode) {
CK_ATTRIBUTE *attr = NULL;
CK_BBOOL found;
found = template_attribute_find(tmpl, CKA_MODULUS, &attr);
if (! found) {
if (mode == MODE_CREATE) {
return (CKR_TEMPLATE_INCOMPLETE);
}
}
found = template_attribute_find(tmpl, CKA_PUBLIC_EXPONENT, &attr);
if (! found) {
if (mode == MODE_CREATE) {
return (CKR_TEMPLATE_INCOMPLETE);
}
}
found = template_attribute_find(tmpl, CKA_PRIVATE_EXPONENT, &attr);
if (! found) {
if (mode == MODE_CREATE) {
return (CKR_TEMPLATE_INCOMPLETE);
}
}
found = template_attribute_find(tmpl, CKA_PRIME_1, &attr);
if (! found) {
if (mode == MODE_CREATE) {
return (CKR_TEMPLATE_INCOMPLETE);
}
}
found = template_attribute_find(tmpl, CKA_PRIME_2, &attr);
if (! found) {
if (mode == MODE_CREATE) {
return (CKR_TEMPLATE_INCOMPLETE);
}
}
found = template_attribute_find(tmpl, CKA_EXPONENT_1, &attr);
if (! found) {
if (mode == MODE_CREATE) {
return (CKR_TEMPLATE_INCOMPLETE);
}
}
found = template_attribute_find(tmpl, CKA_EXPONENT_2, &attr);
if (! found) {
if (mode == MODE_CREATE) {
return (CKR_TEMPLATE_INCOMPLETE);
}
}
found = template_attribute_find(tmpl, CKA_COEFFICIENT, &attr);
if (! found) {
if (mode == MODE_CREATE) {
return (CKR_TEMPLATE_INCOMPLETE);
}
}
return (priv_key_check_required_attributes(tmpl, mode));
}
CK_RV
rsa_priv_set_default_attributes(TEMPLATE *tmpl, CK_ULONG mode)
{
CK_ATTRIBUTE *modulus_attr = NULL;
CK_ATTRIBUTE *public_exp_attr = NULL;
CK_ATTRIBUTE *private_exp_attr = NULL;
CK_ATTRIBUTE *type_attr = NULL;
(void) priv_key_set_default_attributes(tmpl, mode);
type_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
sizeof (CK_KEY_TYPE));
modulus_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE));
public_exp_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE));
private_exp_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE));
if (! type_attr || ! modulus_attr || ! public_exp_attr ||
! private_exp_attr) {
if (type_attr) free(type_attr);
if (modulus_attr) free(modulus_attr);
if (public_exp_attr) free(public_exp_attr);
if (private_exp_attr) free(private_exp_attr);
return (CKR_HOST_MEMORY);
}
modulus_attr->type = CKA_MODULUS;
modulus_attr->ulValueLen = 0;
modulus_attr->pValue = NULL;
public_exp_attr->type = CKA_PUBLIC_EXPONENT;
public_exp_attr->ulValueLen = 0;
public_exp_attr->pValue = NULL;
private_exp_attr->type = CKA_PRIVATE_EXPONENT;
private_exp_attr->ulValueLen = 0;
private_exp_attr->pValue = NULL;
type_attr->type = CKA_KEY_TYPE;
type_attr->ulValueLen = sizeof (CK_KEY_TYPE);
type_attr->pValue = (CK_BYTE *)type_attr + sizeof (CK_ATTRIBUTE);
*(CK_KEY_TYPE *)type_attr->pValue = CKK_RSA;
(void) template_update_attribute(tmpl, type_attr);
(void) template_update_attribute(tmpl, modulus_attr);
(void) template_update_attribute(tmpl, public_exp_attr);
(void) template_update_attribute(tmpl, private_exp_attr);
return (CKR_OK);
}
CK_RV
rsa_priv_validate_attribute(TEMPLATE *tmpl, CK_ATTRIBUTE *attr, CK_ULONG mode) {
switch (attr->type) {
case CKA_MODULUS:
case CKA_PRIVATE_EXPONENT:
if (mode == MODE_CREATE)
return (remove_leading_zeros(attr));
else {
return (CKR_ATTRIBUTE_READ_ONLY);
}
case CKA_PUBLIC_EXPONENT:
case CKA_PRIME_1:
case CKA_PRIME_2:
case CKA_EXPONENT_1:
case CKA_EXPONENT_2:
case CKA_COEFFICIENT:
if (mode == MODE_CREATE)
return (remove_leading_zeros(attr));
else {
return (CKR_ATTRIBUTE_READ_ONLY);
}
default:
return (priv_key_validate_attribute(tmpl, attr, mode));
}
}
CK_BBOOL
rsa_priv_check_exportability(CK_ATTRIBUTE_TYPE type) {
switch (type) {
case CKA_PRIVATE_EXPONENT:
case CKA_PRIME_1:
case CKA_PRIME_2:
case CKA_EXPONENT_1:
case CKA_EXPONENT_2:
case CKA_COEFFICIENT:
return (FALSE);
}
return (TRUE);
}
CK_RV
rsa_priv_wrap_get_data(TEMPLATE *tmpl,
CK_BBOOL length_only,
CK_BYTE **data,
CK_ULONG *data_len)
{
CK_ATTRIBUTE *modulus = NULL;
CK_ATTRIBUTE *publ_exp = NULL, *priv_exp = NULL;
CK_ATTRIBUTE *prime1 = NULL, *prime2 = NULL;
CK_ATTRIBUTE *exponent1 = NULL, *exponent2 = NULL;
CK_ATTRIBUTE *coeff = NULL;
CK_RV rc;
if (template_attribute_find(tmpl, CKA_MODULUS, &modulus) == FALSE) {
return (CKR_FUNCTION_FAILED);
}
if (template_attribute_find(tmpl, CKA_PUBLIC_EXPONENT,
&publ_exp) == FALSE) {
return (CKR_FUNCTION_FAILED);
}
if (template_attribute_find(tmpl, CKA_PRIVATE_EXPONENT,
&priv_exp) == FALSE) {
return (CKR_FUNCTION_FAILED);
}
if (template_attribute_find(tmpl, CKA_PRIME_1,
&prime1) == FALSE) {
return (CKR_FUNCTION_FAILED);
}
if (template_attribute_find(tmpl, CKA_PRIME_2,
&prime2) == FALSE) {
return (CKR_FUNCTION_FAILED);
}
if (template_attribute_find(tmpl, CKA_EXPONENT_1,
&exponent1) == FALSE) {
return (CKR_FUNCTION_FAILED);
}
if (template_attribute_find(tmpl, CKA_EXPONENT_2,
&exponent2) == FALSE) {
return (CKR_FUNCTION_FAILED);
}
if (template_attribute_find(tmpl, CKA_COEFFICIENT,
&coeff) == FALSE) {
return (CKR_FUNCTION_FAILED);
}
rc = ber_encode_RSAPrivateKey(length_only, data, data_len,
modulus, publ_exp, priv_exp, prime1, prime2,
exponent1, exponent2, coeff);
return (rc);
}
CK_RV
rsa_priv_unwrap(TEMPLATE *tmpl,
CK_BYTE *data,
CK_ULONG total_length)
{
CK_ATTRIBUTE *modulus = NULL;
CK_ATTRIBUTE *publ_exp = NULL;
CK_ATTRIBUTE *priv_exp = NULL;
CK_ATTRIBUTE *prime1 = NULL;
CK_ATTRIBUTE *prime2 = NULL;
CK_ATTRIBUTE *exponent1 = NULL;
CK_ATTRIBUTE *exponent2 = NULL;
CK_ATTRIBUTE *coeff = NULL;
CK_RV rc;
rc = ber_decode_RSAPrivateKey(data, total_length,
&modulus, &publ_exp, &priv_exp, &prime1, &prime2,
&exponent1, &exponent2, &coeff);
if (rc != CKR_OK) {
return (rc);
}
(void) remove_leading_zeros(modulus);
(void) remove_leading_zeros(publ_exp);
(void) remove_leading_zeros(priv_exp);
(void) remove_leading_zeros(prime1);
(void) remove_leading_zeros(prime2);
(void) remove_leading_zeros(exponent1);
(void) remove_leading_zeros(exponent2);
(void) remove_leading_zeros(coeff);
(void) template_update_attribute(tmpl, modulus);
(void) template_update_attribute(tmpl, publ_exp);
(void) template_update_attribute(tmpl, priv_exp);
(void) template_update_attribute(tmpl, prime1);
(void) template_update_attribute(tmpl, prime2);
(void) template_update_attribute(tmpl, exponent1);
(void) template_update_attribute(tmpl, exponent2);
(void) template_update_attribute(tmpl, coeff);
return (CKR_OK);
}
CK_RV
generic_secret_check_required_attributes(TEMPLATE *tmpl, CK_ULONG mode)
{
CK_ATTRIBUTE *attr = NULL;
CK_BBOOL found;
found = template_attribute_find(tmpl, CKA_VALUE, &attr);
if (! found) {
if (mode == MODE_CREATE) {
return (CKR_TEMPLATE_INCOMPLETE);
}
}
found = template_attribute_find(tmpl, CKA_VALUE_LEN, &attr);
if (! found) {
return (CKR_OK);
} else {
if (mode == MODE_CREATE) {
return (CKR_ATTRIBUTE_READ_ONLY);
}
}
return (secret_key_check_required_attributes(tmpl, mode));
}
CK_RV
generic_secret_set_default_attributes(TEMPLATE *tmpl, CK_ULONG mode)
{
CK_ATTRIBUTE *value_attr = NULL;
CK_ATTRIBUTE *value_len_attr = NULL;
CK_ATTRIBUTE *type_attr = NULL;
CK_ULONG len = 0L;
if (mode)
value_attr = NULL;
(void) secret_key_set_default_attributes(tmpl, mode);
type_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
sizeof (CK_KEY_TYPE));
value_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE));
value_len_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
sizeof (CK_ULONG));
if (! type_attr || ! value_attr || ! value_len_attr) {
if (type_attr) free(type_attr);
if (value_attr) free(value_attr);
if (value_len_attr) free(value_len_attr);
return (CKR_HOST_MEMORY);
}
value_attr->type = CKA_VALUE;
value_attr->ulValueLen = 0;
value_attr->pValue = NULL;
value_len_attr->type = CKA_VALUE_LEN;
value_len_attr->ulValueLen = sizeof (CK_ULONG);
value_len_attr->pValue = (CK_BYTE *)value_len_attr +
sizeof (CK_ATTRIBUTE);
*(CK_ULONG *)value_len_attr->pValue = len;
type_attr->type = CKA_KEY_TYPE;
type_attr->ulValueLen = sizeof (CK_KEY_TYPE);
type_attr->pValue = (CK_BYTE *)type_attr +
sizeof (CK_ATTRIBUTE);
*(CK_KEY_TYPE *)type_attr->pValue = CKK_GENERIC_SECRET;
(void) template_update_attribute(tmpl, type_attr);
(void) template_update_attribute(tmpl, value_attr);
(void) template_update_attribute(tmpl, value_len_attr);
return (CKR_OK);
}
CK_RV
generic_secret_validate_attribute(TEMPLATE *tmpl,
CK_ATTRIBUTE *attr, CK_ULONG mode)
{
switch (attr->type) {
case CKA_VALUE:
if (mode == MODE_CREATE)
return (CKR_OK);
else
return (CKR_ATTRIBUTE_READ_ONLY);
case CKA_VALUE_LEN:
if (mode == MODE_KEYGEN || mode == MODE_DERIVE)
return (CKR_OK);
else {
if (mode == MODE_UNWRAP) {
return (CKR_OK);
}
return (CKR_ATTRIBUTE_READ_ONLY);
}
default:
return (secret_key_validate_attribute(tmpl, attr, mode));
}
}
CK_BBOOL
generic_secret_check_exportability(CK_ATTRIBUTE_TYPE type) {
switch (type) {
case CKA_VALUE:
return (FALSE);
}
return (TRUE);
}
CK_RV
generic_secret_wrap_get_data(TEMPLATE * tmpl,
CK_BBOOL length_only,
CK_BYTE ** data,
CK_ULONG * data_len)
{
CK_ATTRIBUTE * attr = NULL;
CK_BYTE * ptr = NULL;
CK_RV rc;
if (! tmpl || ! data_len) {
return (CKR_FUNCTION_FAILED);
}
rc = template_attribute_find(tmpl, CKA_VALUE, &attr);
if (rc == FALSE) {
return (CKR_KEY_NOT_WRAPPABLE);
}
*data_len = attr->ulValueLen;
if (length_only == FALSE) {
ptr = (CK_BYTE *)malloc(attr->ulValueLen);
if (! ptr) {
return (CKR_HOST_MEMORY);
}
(void) memcpy(ptr, attr->pValue, attr->ulValueLen);
*data = ptr;
}
return (CKR_OK);
}
CK_RV
generic_secret_unwrap(TEMPLATE *tmpl,
CK_BYTE *data,
CK_ULONG data_len,
CK_BBOOL fromend)
{
CK_ATTRIBUTE * attr = NULL;
CK_ATTRIBUTE * value_attr = NULL;
CK_ATTRIBUTE * value_len_attr = NULL;
CK_BYTE * ptr = NULL;
CK_ULONG rc, len = 0;
if (fromend == TRUE)
ptr = data + data_len;
else
ptr = data;
rc = template_attribute_find(tmpl, CKA_VALUE_LEN, &attr);
if (rc) {
len = *(CK_ULONG *)attr->pValue;
if (len > data_len) {
rc = CKR_ATTRIBUTE_VALUE_INVALID;
goto error;
}
if (len != 0)
data_len = len;
}
if (fromend == TRUE)
ptr -= data_len;
rc = build_attribute(CKA_VALUE, ptr, data_len, &value_attr);
if (rc != CKR_OK) {
goto error;
}
if (data_len != len) {
rc = build_attribute(CKA_VALUE_LEN, (CK_BYTE *)&data_len,
sizeof (CK_ULONG), &value_len_attr);
if (rc != CKR_OK)
goto error;
}
(void) template_update_attribute(tmpl, value_attr);
if (data_len != len)
(void) template_update_attribute(tmpl, value_len_attr);
return (CKR_OK);
error:
if (value_attr) free(value_attr);
if (value_len_attr) free(value_len_attr);
return (rc);
}