163f89caaSJens Wiklander // SPDX-License-Identifier: BSD-2-Clause 263f89caaSJens Wiklander /* 363f89caaSJens Wiklander * Copyright (c) 2017-2020, Linaro Limited 463f89caaSJens Wiklander */ 563f89caaSJens Wiklander 663f89caaSJens Wiklander #include <assert.h> 763f89caaSJens Wiklander #include <inttypes.h> 863f89caaSJens Wiklander #include <pkcs11_ta.h> 963f89caaSJens Wiklander #include <stdlib.h> 1063f89caaSJens Wiklander #include <string_ext.h> 1163f89caaSJens Wiklander #include <tee_internal_api_extensions.h> 1263f89caaSJens Wiklander #include <tee_internal_api.h> 136a760c9eSEtienne Carriere #include <trace.h> 1463f89caaSJens Wiklander #include <util.h> 1563f89caaSJens Wiklander 1663f89caaSJens Wiklander #include "attributes.h" 1763f89caaSJens Wiklander #include "handle.h" 1863f89caaSJens Wiklander #include "pkcs11_attributes.h" 1963f89caaSJens Wiklander #include "pkcs11_helpers.h" 2063f89caaSJens Wiklander #include "pkcs11_token.h" 2163f89caaSJens Wiklander #include "sanitize_object.h" 2263f89caaSJens Wiklander #include "serializer.h" 2363f89caaSJens Wiklander #include "token_capabilities.h" 2463f89caaSJens Wiklander 2563f89caaSJens Wiklander /* Byte size of CKA_ID attribute when generated locally */ 2663f89caaSJens Wiklander #define PKCS11_CKA_DEFAULT_SIZE 16 2763f89caaSJens Wiklander 28512cbf1dSJens Wiklander static uint32_t pkcs11_func2ckfm(enum processing_func function) 29512cbf1dSJens Wiklander { 30512cbf1dSJens Wiklander switch (function) { 31512cbf1dSJens Wiklander case PKCS11_FUNCTION_DIGEST: 32512cbf1dSJens Wiklander return PKCS11_CKFM_DIGEST; 33512cbf1dSJens Wiklander case PKCS11_FUNCTION_GENERATE: 34512cbf1dSJens Wiklander return PKCS11_CKFM_GENERATE; 35512cbf1dSJens Wiklander case PKCS11_FUNCTION_GENERATE_PAIR: 36512cbf1dSJens Wiklander return PKCS11_CKFM_GENERATE_KEY_PAIR; 37512cbf1dSJens Wiklander case PKCS11_FUNCTION_DERIVE: 38512cbf1dSJens Wiklander return PKCS11_CKFM_DERIVE; 39512cbf1dSJens Wiklander case PKCS11_FUNCTION_WRAP: 40512cbf1dSJens Wiklander return PKCS11_CKFM_WRAP; 41512cbf1dSJens Wiklander case PKCS11_FUNCTION_UNWRAP: 42512cbf1dSJens Wiklander return PKCS11_CKFM_UNWRAP; 43512cbf1dSJens Wiklander case PKCS11_FUNCTION_ENCRYPT: 44512cbf1dSJens Wiklander return PKCS11_CKFM_ENCRYPT; 45512cbf1dSJens Wiklander case PKCS11_FUNCTION_DECRYPT: 46512cbf1dSJens Wiklander return PKCS11_CKFM_DECRYPT; 47512cbf1dSJens Wiklander case PKCS11_FUNCTION_SIGN: 48512cbf1dSJens Wiklander return PKCS11_CKFM_SIGN; 49512cbf1dSJens Wiklander case PKCS11_FUNCTION_VERIFY: 50512cbf1dSJens Wiklander return PKCS11_CKFM_VERIFY; 51512cbf1dSJens Wiklander case PKCS11_FUNCTION_SIGN_RECOVER: 52512cbf1dSJens Wiklander return PKCS11_CKFM_SIGN_RECOVER; 53512cbf1dSJens Wiklander case PKCS11_FUNCTION_VERIFY_RECOVER: 54512cbf1dSJens Wiklander return PKCS11_CKFM_VERIFY_RECOVER; 55512cbf1dSJens Wiklander default: 56512cbf1dSJens Wiklander return 0; 57512cbf1dSJens Wiklander } 58512cbf1dSJens Wiklander } 59512cbf1dSJens Wiklander 60512cbf1dSJens Wiklander enum pkcs11_rc 61512cbf1dSJens Wiklander check_mechanism_against_processing(struct pkcs11_session *session, 62512cbf1dSJens Wiklander enum pkcs11_mechanism_id mechanism_type, 63512cbf1dSJens Wiklander enum processing_func function, 64512cbf1dSJens Wiklander enum processing_step step) 65512cbf1dSJens Wiklander { 66512cbf1dSJens Wiklander bool allowed = false; 67512cbf1dSJens Wiklander 68512cbf1dSJens Wiklander switch (step) { 69512cbf1dSJens Wiklander case PKCS11_FUNC_STEP_INIT: 70512cbf1dSJens Wiklander switch (function) { 71512cbf1dSJens Wiklander case PKCS11_FUNCTION_IMPORT: 72512cbf1dSJens Wiklander case PKCS11_FUNCTION_COPY: 73512cbf1dSJens Wiklander case PKCS11_FUNCTION_MODIFY: 74512cbf1dSJens Wiklander case PKCS11_FUNCTION_DESTROY: 75512cbf1dSJens Wiklander return PKCS11_CKR_OK; 76512cbf1dSJens Wiklander default: 77512cbf1dSJens Wiklander break; 78512cbf1dSJens Wiklander } 79512cbf1dSJens Wiklander /* 80512cbf1dSJens Wiklander * Check that the returned PKCS11_CKFM_* flag from 81512cbf1dSJens Wiklander * pkcs11_func2ckfm() is among the ones from 82512cbf1dSJens Wiklander * mechanism_supported_flags(). 83512cbf1dSJens Wiklander */ 84512cbf1dSJens Wiklander allowed = mechanism_supported_flags(mechanism_type) & 85512cbf1dSJens Wiklander pkcs11_func2ckfm(function); 86512cbf1dSJens Wiklander break; 87512cbf1dSJens Wiklander 88512cbf1dSJens Wiklander case PKCS11_FUNC_STEP_ONESHOT: 890460a039SRuchika Gupta if (session->processing->always_authen && 900460a039SRuchika Gupta !session->processing->relogged) 910460a039SRuchika Gupta return PKCS11_CKR_USER_NOT_LOGGED_IN; 920460a039SRuchika Gupta 930460a039SRuchika Gupta if (session->processing->updated) { 940460a039SRuchika Gupta EMSG("Cannot perform one-shot on updated processing"); 950460a039SRuchika Gupta return PKCS11_CKR_OPERATION_ACTIVE; 960460a039SRuchika Gupta } 970460a039SRuchika Gupta 980460a039SRuchika Gupta allowed = true; 990460a039SRuchika Gupta break; 1000460a039SRuchika Gupta 101512cbf1dSJens Wiklander case PKCS11_FUNC_STEP_UPDATE: 102512cbf1dSJens Wiklander if (session->processing->always_authen && 103512cbf1dSJens Wiklander !session->processing->relogged) 104512cbf1dSJens Wiklander return PKCS11_CKR_USER_NOT_LOGGED_IN; 105512cbf1dSJens Wiklander 106512cbf1dSJens Wiklander allowed = !mechanism_is_one_shot_only(mechanism_type); 107512cbf1dSJens Wiklander break; 108512cbf1dSJens Wiklander 1099e91a619SVesa Jääskeläinen case PKCS11_FUNC_STEP_UPDATE_KEY: 1109e91a619SVesa Jääskeläinen assert(function == PKCS11_FUNCTION_DIGEST); 1119e91a619SVesa Jääskeläinen 1129e91a619SVesa Jääskeläinen if (session->processing->always_authen && 1139e91a619SVesa Jääskeläinen !session->processing->relogged) 1149e91a619SVesa Jääskeläinen return PKCS11_CKR_USER_NOT_LOGGED_IN; 1159e91a619SVesa Jääskeläinen 1169e91a619SVesa Jääskeläinen allowed = true; 1179e91a619SVesa Jääskeläinen break; 1189e91a619SVesa Jääskeläinen 119512cbf1dSJens Wiklander case PKCS11_FUNC_STEP_FINAL: 120512cbf1dSJens Wiklander if (session->processing->always_authen && 121512cbf1dSJens Wiklander !session->processing->relogged) 122512cbf1dSJens Wiklander return PKCS11_CKR_USER_NOT_LOGGED_IN; 123512cbf1dSJens Wiklander 124512cbf1dSJens Wiklander return PKCS11_CKR_OK; 125512cbf1dSJens Wiklander 126512cbf1dSJens Wiklander default: 127512cbf1dSJens Wiklander TEE_Panic(step); 128512cbf1dSJens Wiklander break; 129512cbf1dSJens Wiklander } 130512cbf1dSJens Wiklander 131512cbf1dSJens Wiklander if (!allowed) { 132512cbf1dSJens Wiklander EMSG("Processing %#x/%s not permitted (%u/%u)", 133512cbf1dSJens Wiklander (unsigned int)mechanism_type, id2str_proc(mechanism_type), 134512cbf1dSJens Wiklander function, step); 135df705578SRuchika Gupta return PKCS11_CKR_MECHANISM_INVALID; 136512cbf1dSJens Wiklander } 137512cbf1dSJens Wiklander 138512cbf1dSJens Wiklander return PKCS11_CKR_OK; 139512cbf1dSJens Wiklander } 140512cbf1dSJens Wiklander 14163f89caaSJens Wiklander /* 14263f89caaSJens Wiklander * Object default boolean attributes as per PKCS#11 14363f89caaSJens Wiklander */ 14463f89caaSJens Wiklander static uint8_t *pkcs11_object_default_boolprop(uint32_t attribute) 14563f89caaSJens Wiklander { 14663f89caaSJens Wiklander static const uint8_t bool_true = 1; 14763f89caaSJens Wiklander static const uint8_t bool_false; 14863f89caaSJens Wiklander 14963f89caaSJens Wiklander switch (attribute) { 15063f89caaSJens Wiklander /* As per PKCS#11 default value */ 15163f89caaSJens Wiklander case PKCS11_CKA_MODIFIABLE: 15263f89caaSJens Wiklander case PKCS11_CKA_COPYABLE: 15363f89caaSJens Wiklander case PKCS11_CKA_DESTROYABLE: 15463f89caaSJens Wiklander return (uint8_t *)&bool_true; 15563f89caaSJens Wiklander case PKCS11_CKA_TOKEN: 15663f89caaSJens Wiklander case PKCS11_CKA_PRIVATE: 15739fc24faSEtienne Carriere case PKCS11_CKA_WRAP_WITH_TRUSTED: 15839fc24faSEtienne Carriere case PKCS11_CKA_ALWAYS_AUTHENTICATE: 15963f89caaSJens Wiklander case PKCS11_CKA_SENSITIVE: 16063f89caaSJens Wiklander return (uint8_t *)&bool_false; 16163f89caaSJens Wiklander /* Token specific default value */ 16263f89caaSJens Wiklander case PKCS11_CKA_SIGN: 16363f89caaSJens Wiklander case PKCS11_CKA_VERIFY: 16463f89caaSJens Wiklander case PKCS11_CKA_DERIVE: 16563f89caaSJens Wiklander case PKCS11_CKA_ENCRYPT: 16663f89caaSJens Wiklander case PKCS11_CKA_DECRYPT: 16763f89caaSJens Wiklander case PKCS11_CKA_SIGN_RECOVER: 16863f89caaSJens Wiklander case PKCS11_CKA_VERIFY_RECOVER: 16963f89caaSJens Wiklander case PKCS11_CKA_WRAP: 17063f89caaSJens Wiklander case PKCS11_CKA_UNWRAP: 17163f89caaSJens Wiklander case PKCS11_CKA_EXTRACTABLE: 17263f89caaSJens Wiklander case PKCS11_CKA_TRUSTED: 17363f89caaSJens Wiklander return (uint8_t *)&bool_false; 17463f89caaSJens Wiklander default: 17563f89caaSJens Wiklander DMSG("No default for boolprop attribute %#"PRIx32, attribute); 17663f89caaSJens Wiklander return NULL; 17763f89caaSJens Wiklander } 17863f89caaSJens Wiklander } 17963f89caaSJens Wiklander 18063f89caaSJens Wiklander /* 18163f89caaSJens Wiklander * Object expects several boolean attributes to be set to a default value 18263f89caaSJens Wiklander * or to a validate client configuration value. This function append the input 18363f89caaSJens Wiklander * attribute (id/size/value) in the serialized object. 18463f89caaSJens Wiklander */ 18563f89caaSJens Wiklander static enum pkcs11_rc pkcs11_import_object_boolprop(struct obj_attrs **out, 18663f89caaSJens Wiklander struct obj_attrs *templ, 18763f89caaSJens Wiklander uint32_t attribute) 18863f89caaSJens Wiklander { 18963f89caaSJens Wiklander enum pkcs11_rc rc = PKCS11_CKR_OK; 19063f89caaSJens Wiklander uint8_t bbool = 0; 19163f89caaSJens Wiklander uint32_t size = sizeof(uint8_t); 19263f89caaSJens Wiklander void *attr = NULL; 19363f89caaSJens Wiklander 19463f89caaSJens Wiklander rc = get_attribute(templ, attribute, &bbool, &size); 19563f89caaSJens Wiklander if (rc) { 19663f89caaSJens Wiklander if (rc != PKCS11_RV_NOT_FOUND) 19763f89caaSJens Wiklander return rc; 19863f89caaSJens Wiklander attr = pkcs11_object_default_boolprop(attribute); 19963f89caaSJens Wiklander if (!attr) 20063f89caaSJens Wiklander return PKCS11_CKR_TEMPLATE_INCOMPLETE; 20163f89caaSJens Wiklander } else { 20263f89caaSJens Wiklander attr = &bbool; 20363f89caaSJens Wiklander } 20463f89caaSJens Wiklander 20563f89caaSJens Wiklander /* Boolean attributes are 1byte in the ABI, no alignment issue */ 20663f89caaSJens Wiklander return add_attribute(out, attribute, attr, sizeof(uint8_t)); 20763f89caaSJens Wiklander } 20863f89caaSJens Wiklander 20963f89caaSJens Wiklander static enum pkcs11_rc set_mandatory_boolprops(struct obj_attrs **out, 21063f89caaSJens Wiklander struct obj_attrs *temp, 21163f89caaSJens Wiklander uint32_t const *bp, 21263f89caaSJens Wiklander size_t bp_count) 21363f89caaSJens Wiklander { 21463f89caaSJens Wiklander enum pkcs11_rc rc = PKCS11_CKR_OK; 21563f89caaSJens Wiklander size_t n = 0; 21663f89caaSJens Wiklander 21763f89caaSJens Wiklander for (n = 0; n < bp_count; n++) { 21863f89caaSJens Wiklander rc = pkcs11_import_object_boolprop(out, temp, bp[n]); 21963f89caaSJens Wiklander if (rc) 22063f89caaSJens Wiklander return rc; 22163f89caaSJens Wiklander } 22263f89caaSJens Wiklander 22363f89caaSJens Wiklander return rc; 22463f89caaSJens Wiklander } 22563f89caaSJens Wiklander 22663f89caaSJens Wiklander static enum pkcs11_rc set_mandatory_attributes(struct obj_attrs **out, 22763f89caaSJens Wiklander struct obj_attrs *temp, 22816df60c7SEtienne Carriere uint32_t const *attrs, 22916df60c7SEtienne Carriere size_t attrs_count) 23063f89caaSJens Wiklander { 23163f89caaSJens Wiklander enum pkcs11_rc rc = PKCS11_CKR_OK; 23263f89caaSJens Wiklander size_t n = 0; 23363f89caaSJens Wiklander 23416df60c7SEtienne Carriere for (n = 0; n < attrs_count; n++) { 23563f89caaSJens Wiklander uint32_t size = 0; 23663f89caaSJens Wiklander void *value = NULL; 23763f89caaSJens Wiklander 23816df60c7SEtienne Carriere if (get_attribute_ptr(temp, attrs[n], &value, &size)) 23963f89caaSJens Wiklander return PKCS11_CKR_TEMPLATE_INCOMPLETE; 24063f89caaSJens Wiklander 24116df60c7SEtienne Carriere rc = add_attribute(out, attrs[n], value, size); 24263f89caaSJens Wiklander if (rc) 24363f89caaSJens Wiklander return rc; 24463f89caaSJens Wiklander } 24563f89caaSJens Wiklander 24663f89caaSJens Wiklander return rc; 24763f89caaSJens Wiklander } 24863f89caaSJens Wiklander 24963f89caaSJens Wiklander static enum pkcs11_rc get_default_value(enum pkcs11_attr_id id, void **value, 25063f89caaSJens Wiklander uint32_t *size) 25163f89caaSJens Wiklander { 25263f89caaSJens Wiklander /* should have been taken care of already */ 25363f89caaSJens Wiklander assert(!pkcs11_attr_is_boolean(id)); 25463f89caaSJens Wiklander 25563f89caaSJens Wiklander if (id == PKCS11_CKA_PUBLIC_KEY_INFO) { 25663f89caaSJens Wiklander EMSG("Cannot provide default PUBLIC_KEY_INFO"); 25763f89caaSJens Wiklander return PKCS11_CKR_TEMPLATE_INCONSISTENT; 25863f89caaSJens Wiklander } 25963f89caaSJens Wiklander 26063f89caaSJens Wiklander /* All other attributes have an empty default value */ 26163f89caaSJens Wiklander *value = NULL; 26263f89caaSJens Wiklander *size = 0; 26363f89caaSJens Wiklander return PKCS11_CKR_OK; 26463f89caaSJens Wiklander } 26563f89caaSJens Wiklander 2664eb88651SRuchika Gupta static enum pkcs11_rc set_optional_attributes_with_def(struct obj_attrs **out, 26763f89caaSJens Wiklander struct obj_attrs *temp, 26816df60c7SEtienne Carriere uint32_t const *attrs, 26916df60c7SEtienne Carriere size_t attrs_count, 2704eb88651SRuchika Gupta bool default_to_null) 27163f89caaSJens Wiklander { 27263f89caaSJens Wiklander enum pkcs11_rc rc = PKCS11_CKR_OK; 27363f89caaSJens Wiklander size_t n = 0; 27463f89caaSJens Wiklander 27516df60c7SEtienne Carriere for (n = 0; n < attrs_count; n++) { 27663f89caaSJens Wiklander uint32_t size = 0; 27763f89caaSJens Wiklander void *value = NULL; 27863f89caaSJens Wiklander 27916df60c7SEtienne Carriere rc = get_attribute_ptr(temp, attrs[n], &value, &size); 2804eb88651SRuchika Gupta if (rc == PKCS11_RV_NOT_FOUND) { 2814eb88651SRuchika Gupta if (default_to_null) { 28216df60c7SEtienne Carriere rc = get_default_value(attrs[n], &value, &size); 2834eb88651SRuchika Gupta } else { 2844eb88651SRuchika Gupta rc = PKCS11_CKR_OK; 2854eb88651SRuchika Gupta continue; 2864eb88651SRuchika Gupta } 2874eb88651SRuchika Gupta } 28863f89caaSJens Wiklander if (rc) 28963f89caaSJens Wiklander return rc; 29063f89caaSJens Wiklander 29116df60c7SEtienne Carriere rc = add_attribute(out, attrs[n], value, size); 29263f89caaSJens Wiklander if (rc) 29363f89caaSJens Wiklander return rc; 29463f89caaSJens Wiklander } 29563f89caaSJens Wiklander 29663f89caaSJens Wiklander return rc; 29763f89caaSJens Wiklander } 29863f89caaSJens Wiklander 2994eb88651SRuchika Gupta static enum pkcs11_rc set_attributes_opt_or_null(struct obj_attrs **out, 3004eb88651SRuchika Gupta struct obj_attrs *temp, 30116df60c7SEtienne Carriere uint32_t const *attrs, 30216df60c7SEtienne Carriere size_t attrs_count) 3034eb88651SRuchika Gupta { 30416df60c7SEtienne Carriere return set_optional_attributes_with_def(out, temp, attrs, attrs_count, 30516df60c7SEtienne Carriere true /* defaults to empty */); 3064eb88651SRuchika Gupta } 3074eb88651SRuchika Gupta 3084eb88651SRuchika Gupta static enum pkcs11_rc set_optional_attributes(struct obj_attrs **out, 3094eb88651SRuchika Gupta struct obj_attrs *temp, 31016df60c7SEtienne Carriere uint32_t const *attrs, 31116df60c7SEtienne Carriere size_t attrs_count) 3124eb88651SRuchika Gupta { 31316df60c7SEtienne Carriere return set_optional_attributes_with_def(out, temp, attrs, attrs_count, 31416df60c7SEtienne Carriere false /* no default value */); 3154eb88651SRuchika Gupta } 3164eb88651SRuchika Gupta 31763f89caaSJens Wiklander /* 31863f89caaSJens Wiklander * Below are listed the mandated or optional expected attributes for 31963f89caaSJens Wiklander * PKCS#11 storage objects. 32063f89caaSJens Wiklander * 32163f89caaSJens Wiklander * Note: boolprops (mandated boolean attributes) PKCS11_CKA_ALWAYS_SENSITIVE, 32263f89caaSJens Wiklander * and PKCS11_CKA_NEVER_EXTRACTABLE are set by the token, not provided 32363f89caaSJens Wiklander * in the client template. 32463f89caaSJens Wiklander */ 32563f89caaSJens Wiklander 32663f89caaSJens Wiklander /* PKCS#11 specification for any object (session/token) of the storage */ 3274eb88651SRuchika Gupta static const uint32_t any_object_boolprops[] = { 32863f89caaSJens Wiklander PKCS11_CKA_TOKEN, PKCS11_CKA_PRIVATE, 32963f89caaSJens Wiklander PKCS11_CKA_MODIFIABLE, PKCS11_CKA_COPYABLE, PKCS11_CKA_DESTROYABLE, 33063f89caaSJens Wiklander }; 33163f89caaSJens Wiklander 3324eb88651SRuchika Gupta static const uint32_t any_object_opt_or_null[] = { 33363f89caaSJens Wiklander PKCS11_CKA_LABEL, 33463f89caaSJens Wiklander }; 33563f89caaSJens Wiklander 3364eb88651SRuchika Gupta /* PKCS#11 specification for raw data object (+any_object_xxx) */ 3374eb88651SRuchika Gupta const uint32_t raw_data_opt_or_null[] = { 33863f89caaSJens Wiklander PKCS11_CKA_OBJECT_ID, PKCS11_CKA_APPLICATION, PKCS11_CKA_VALUE, 33963f89caaSJens Wiklander }; 34063f89caaSJens Wiklander 3414eb88651SRuchika Gupta /* PKCS#11 specification for any key object (+any_object_xxx) */ 3424eb88651SRuchika Gupta static const uint32_t any_key_boolprops[] = { 34363f89caaSJens Wiklander PKCS11_CKA_DERIVE, 34463f89caaSJens Wiklander }; 34563f89caaSJens Wiklander 3464eb88651SRuchika Gupta static const uint32_t any_key_opt_or_null[] = { 34763f89caaSJens Wiklander PKCS11_CKA_ID, 34863f89caaSJens Wiklander PKCS11_CKA_START_DATE, PKCS11_CKA_END_DATE, 3494eb88651SRuchika Gupta }; 3504eb88651SRuchika Gupta 3514eb88651SRuchika Gupta static const uint32_t any_key_optional[] = { 35263f89caaSJens Wiklander PKCS11_CKA_ALLOWED_MECHANISMS, 35363f89caaSJens Wiklander }; 35463f89caaSJens Wiklander 3554eb88651SRuchika Gupta /* PKCS#11 specification for any symmetric key (+any_key_xxx) */ 3564eb88651SRuchika Gupta static const uint32_t symm_key_boolprops[] = { 35763f89caaSJens Wiklander PKCS11_CKA_ENCRYPT, PKCS11_CKA_DECRYPT, 35863f89caaSJens Wiklander PKCS11_CKA_SIGN, PKCS11_CKA_VERIFY, 35963f89caaSJens Wiklander PKCS11_CKA_WRAP, PKCS11_CKA_UNWRAP, 36063f89caaSJens Wiklander PKCS11_CKA_SENSITIVE, PKCS11_CKA_EXTRACTABLE, 36163f89caaSJens Wiklander PKCS11_CKA_WRAP_WITH_TRUSTED, PKCS11_CKA_TRUSTED, 36263f89caaSJens Wiklander }; 36363f89caaSJens Wiklander 3644eb88651SRuchika Gupta static const uint32_t symm_key_opt_or_null[] = { 36563f89caaSJens Wiklander PKCS11_CKA_WRAP_TEMPLATE, PKCS11_CKA_UNWRAP_TEMPLATE, 3660ac5c695SRuchika Gupta PKCS11_CKA_DERIVE_TEMPLATE, PKCS11_CKA_VALUE, 3670ac5c695SRuchika Gupta }; 3680ac5c695SRuchika Gupta 3690ac5c695SRuchika Gupta static const uint32_t symm_key_optional[] = { 3700ac5c695SRuchika Gupta PKCS11_CKA_VALUE_LEN, 37163f89caaSJens Wiklander }; 37263f89caaSJens Wiklander 3734eb88651SRuchika Gupta /* PKCS#11 specification for any asymmetric public key (+any_key_xxx) */ 3744eb88651SRuchika Gupta static const uint32_t public_key_boolprops[] = { 37563f89caaSJens Wiklander PKCS11_CKA_ENCRYPT, PKCS11_CKA_VERIFY, PKCS11_CKA_VERIFY_RECOVER, 37663f89caaSJens Wiklander PKCS11_CKA_WRAP, 37763f89caaSJens Wiklander PKCS11_CKA_TRUSTED, 37863f89caaSJens Wiklander }; 37963f89caaSJens Wiklander 3804eb88651SRuchika Gupta static const uint32_t public_key_mandated[] = { 38163f89caaSJens Wiklander PKCS11_CKA_SUBJECT 38263f89caaSJens Wiklander }; 38363f89caaSJens Wiklander 3844eb88651SRuchika Gupta static const uint32_t public_key_opt_or_null[] = { 38563f89caaSJens Wiklander PKCS11_CKA_WRAP_TEMPLATE, PKCS11_CKA_PUBLIC_KEY_INFO, 38663f89caaSJens Wiklander }; 38763f89caaSJens Wiklander 3884eb88651SRuchika Gupta /* PKCS#11 specification for any asymmetric private key (+any_key_xxx) */ 3894eb88651SRuchika Gupta static const uint32_t private_key_boolprops[] = { 39063f89caaSJens Wiklander PKCS11_CKA_DECRYPT, PKCS11_CKA_SIGN, PKCS11_CKA_SIGN_RECOVER, 39163f89caaSJens Wiklander PKCS11_CKA_UNWRAP, 39263f89caaSJens Wiklander PKCS11_CKA_SENSITIVE, PKCS11_CKA_EXTRACTABLE, 39363f89caaSJens Wiklander PKCS11_CKA_WRAP_WITH_TRUSTED, PKCS11_CKA_ALWAYS_AUTHENTICATE, 39463f89caaSJens Wiklander }; 39563f89caaSJens Wiklander 3964eb88651SRuchika Gupta static const uint32_t private_key_mandated[] = { 39763f89caaSJens Wiklander PKCS11_CKA_SUBJECT 39863f89caaSJens Wiklander }; 39963f89caaSJens Wiklander 4004eb88651SRuchika Gupta static const uint32_t private_key_opt_or_null[] = { 40163f89caaSJens Wiklander PKCS11_CKA_UNWRAP_TEMPLATE, PKCS11_CKA_PUBLIC_KEY_INFO, 40263f89caaSJens Wiklander }; 40363f89caaSJens Wiklander 4044eb88651SRuchika Gupta /* PKCS#11 specification for any RSA key (+public/private_key_xxx) */ 4054eb88651SRuchika Gupta static const uint32_t rsa_public_key_mandated[] = { 40663f89caaSJens Wiklander PKCS11_CKA_MODULUS_BITS, 40763f89caaSJens Wiklander }; 40863f89caaSJens Wiklander 4094eb88651SRuchika Gupta static const uint32_t rsa_public_key_opt_or_null[] = { 41063f89caaSJens Wiklander PKCS11_CKA_MODULUS, PKCS11_CKA_PUBLIC_EXPONENT, 41163f89caaSJens Wiklander }; 41263f89caaSJens Wiklander 4134eb88651SRuchika Gupta static const uint32_t rsa_private_key_opt_or_null[] = { 41463f89caaSJens Wiklander PKCS11_CKA_MODULUS, PKCS11_CKA_PUBLIC_EXPONENT, 41563f89caaSJens Wiklander PKCS11_CKA_PRIVATE_EXPONENT, 41663f89caaSJens Wiklander PKCS11_CKA_PRIME_1, PKCS11_CKA_PRIME_2, 41763f89caaSJens Wiklander PKCS11_CKA_EXPONENT_1, PKCS11_CKA_EXPONENT_2, PKCS11_CKA_COEFFICIENT, 41863f89caaSJens Wiklander }; 41963f89caaSJens Wiklander 4204eb88651SRuchika Gupta /* PKCS#11 specification for any EC key (+public/private_key_xxx) */ 4214eb88651SRuchika Gupta static const uint32_t ec_public_key_mandated[] = { 42263f89caaSJens Wiklander PKCS11_CKA_EC_PARAMS, 42363f89caaSJens Wiklander }; 42463f89caaSJens Wiklander 4254eb88651SRuchika Gupta static const uint32_t ec_public_key_opt_or_null[] = { 42663f89caaSJens Wiklander PKCS11_CKA_EC_POINT, 42763f89caaSJens Wiklander }; 42863f89caaSJens Wiklander 4294eb88651SRuchika Gupta static const uint32_t ec_private_key_mandated[] = { 43063f89caaSJens Wiklander PKCS11_CKA_EC_PARAMS, 43163f89caaSJens Wiklander }; 43263f89caaSJens Wiklander 4334eb88651SRuchika Gupta static const uint32_t ec_private_key_opt_or_null[] = { 43463f89caaSJens Wiklander PKCS11_CKA_VALUE, 43563f89caaSJens Wiklander }; 43663f89caaSJens Wiklander 43763f89caaSJens Wiklander static enum pkcs11_rc create_storage_attributes(struct obj_attrs **out, 43863f89caaSJens Wiklander struct obj_attrs *temp) 43963f89caaSJens Wiklander { 44063f89caaSJens Wiklander enum pkcs11_class_id class = PKCS11_CKO_UNDEFINED_ID; 44163f89caaSJens Wiklander enum pkcs11_rc rc = PKCS11_CKR_OK; 44263f89caaSJens Wiklander 44363f89caaSJens Wiklander rc = init_attributes_head(out); 44463f89caaSJens Wiklander if (rc) 44563f89caaSJens Wiklander return rc; 44663f89caaSJens Wiklander 44763f89caaSJens Wiklander /* Object class is mandatory */ 44863f89caaSJens Wiklander class = get_class(temp); 44963f89caaSJens Wiklander if (class == PKCS11_CKO_UNDEFINED_ID) { 45063f89caaSJens Wiklander EMSG("Class attribute not found"); 45163f89caaSJens Wiklander 45263f89caaSJens Wiklander return PKCS11_CKR_TEMPLATE_INCONSISTENT; 45363f89caaSJens Wiklander } 45463f89caaSJens Wiklander rc = add_attribute(out, PKCS11_CKA_CLASS, &class, sizeof(uint32_t)); 45563f89caaSJens Wiklander if (rc) 45663f89caaSJens Wiklander return rc; 45763f89caaSJens Wiklander 4584eb88651SRuchika Gupta rc = set_mandatory_boolprops(out, temp, any_object_boolprops, 4594eb88651SRuchika Gupta ARRAY_SIZE(any_object_boolprops)); 46063f89caaSJens Wiklander if (rc) 46163f89caaSJens Wiklander return rc; 46263f89caaSJens Wiklander 4634eb88651SRuchika Gupta return set_attributes_opt_or_null(out, temp, any_object_opt_or_null, 4644eb88651SRuchika Gupta ARRAY_SIZE(any_object_opt_or_null)); 46563f89caaSJens Wiklander } 46663f89caaSJens Wiklander 46763f89caaSJens Wiklander static enum pkcs11_rc create_genkey_attributes(struct obj_attrs **out, 46863f89caaSJens Wiklander struct obj_attrs *temp) 46963f89caaSJens Wiklander { 47063f89caaSJens Wiklander uint32_t type = PKCS11_CKO_UNDEFINED_ID; 47163f89caaSJens Wiklander enum pkcs11_rc rc = PKCS11_CKR_OK; 47263f89caaSJens Wiklander 47363f89caaSJens Wiklander rc = create_storage_attributes(out, temp); 47463f89caaSJens Wiklander if (rc) 47563f89caaSJens Wiklander return rc; 47663f89caaSJens Wiklander 47763f89caaSJens Wiklander type = get_key_type(temp); 47863f89caaSJens Wiklander if (type == PKCS11_CKK_UNDEFINED_ID) { 47963f89caaSJens Wiklander EMSG("Key type attribute not found"); 48063f89caaSJens Wiklander 48163f89caaSJens Wiklander return PKCS11_CKR_TEMPLATE_INCONSISTENT; 48263f89caaSJens Wiklander } 48363f89caaSJens Wiklander rc = add_attribute(out, PKCS11_CKA_KEY_TYPE, &type, sizeof(uint32_t)); 48463f89caaSJens Wiklander if (rc) 48563f89caaSJens Wiklander return rc; 48663f89caaSJens Wiklander 4874eb88651SRuchika Gupta rc = set_mandatory_boolprops(out, temp, any_key_boolprops, 4884eb88651SRuchika Gupta ARRAY_SIZE(any_key_boolprops)); 48963f89caaSJens Wiklander if (rc) 49063f89caaSJens Wiklander return rc; 49163f89caaSJens Wiklander 4924eb88651SRuchika Gupta rc = set_attributes_opt_or_null(out, temp, any_key_opt_or_null, 4934eb88651SRuchika Gupta ARRAY_SIZE(any_key_opt_or_null)); 4944eb88651SRuchika Gupta if (rc) 4954eb88651SRuchika Gupta return rc; 4964eb88651SRuchika Gupta 4974eb88651SRuchika Gupta return set_optional_attributes(out, temp, any_key_optional, 4984eb88651SRuchika Gupta ARRAY_SIZE(any_key_optional)); 4994eb88651SRuchika Gupta 50063f89caaSJens Wiklander } 50163f89caaSJens Wiklander 50263f89caaSJens Wiklander static enum pkcs11_rc create_symm_key_attributes(struct obj_attrs **out, 50363f89caaSJens Wiklander struct obj_attrs *temp) 50463f89caaSJens Wiklander { 50563f89caaSJens Wiklander enum pkcs11_rc rc = PKCS11_CKR_OK; 50663f89caaSJens Wiklander 50763f89caaSJens Wiklander assert(get_class(temp) == PKCS11_CKO_SECRET_KEY); 50863f89caaSJens Wiklander 50963f89caaSJens Wiklander rc = create_genkey_attributes(out, temp); 51063f89caaSJens Wiklander if (rc) 51163f89caaSJens Wiklander return rc; 51263f89caaSJens Wiklander 51363f89caaSJens Wiklander assert(get_class(*out) == PKCS11_CKO_SECRET_KEY); 51463f89caaSJens Wiklander 51563f89caaSJens Wiklander switch (get_key_type(*out)) { 51663f89caaSJens Wiklander case PKCS11_CKK_GENERIC_SECRET: 51763f89caaSJens Wiklander case PKCS11_CKK_AES: 51863f89caaSJens Wiklander case PKCS11_CKK_MD5_HMAC: 51963f89caaSJens Wiklander case PKCS11_CKK_SHA_1_HMAC: 52063f89caaSJens Wiklander case PKCS11_CKK_SHA256_HMAC: 52163f89caaSJens Wiklander case PKCS11_CKK_SHA384_HMAC: 52263f89caaSJens Wiklander case PKCS11_CKK_SHA512_HMAC: 52363f89caaSJens Wiklander case PKCS11_CKK_SHA224_HMAC: 52463f89caaSJens Wiklander break; 52563f89caaSJens Wiklander default: 52663f89caaSJens Wiklander EMSG("Invalid key type %#"PRIx32"/%s", 52763f89caaSJens Wiklander get_key_type(*out), id2str_key_type(get_key_type(*out))); 52863f89caaSJens Wiklander 52963f89caaSJens Wiklander return PKCS11_CKR_TEMPLATE_INCONSISTENT; 53063f89caaSJens Wiklander } 53163f89caaSJens Wiklander 5324eb88651SRuchika Gupta rc = set_mandatory_boolprops(out, temp, symm_key_boolprops, 5334eb88651SRuchika Gupta ARRAY_SIZE(symm_key_boolprops)); 53463f89caaSJens Wiklander if (rc) 53563f89caaSJens Wiklander return rc; 53663f89caaSJens Wiklander 5370ac5c695SRuchika Gupta rc = set_attributes_opt_or_null(out, temp, symm_key_opt_or_null, 5384eb88651SRuchika Gupta ARRAY_SIZE(symm_key_opt_or_null)); 5390ac5c695SRuchika Gupta if (rc) 5400ac5c695SRuchika Gupta return rc; 5410ac5c695SRuchika Gupta 5420ac5c695SRuchika Gupta return set_optional_attributes(out, temp, symm_key_optional, 5430ac5c695SRuchika Gupta ARRAY_SIZE(symm_key_optional)); 54463f89caaSJens Wiklander } 54563f89caaSJens Wiklander 54663f89caaSJens Wiklander static enum pkcs11_rc create_data_attributes(struct obj_attrs **out, 54763f89caaSJens Wiklander struct obj_attrs *temp) 54863f89caaSJens Wiklander { 54963f89caaSJens Wiklander enum pkcs11_rc rc = PKCS11_CKR_OK; 55063f89caaSJens Wiklander 55163f89caaSJens Wiklander assert(get_class(temp) == PKCS11_CKO_DATA); 55263f89caaSJens Wiklander 55363f89caaSJens Wiklander rc = create_storage_attributes(out, temp); 55463f89caaSJens Wiklander if (rc) 55563f89caaSJens Wiklander return rc; 55663f89caaSJens Wiklander 55763f89caaSJens Wiklander assert(get_class(*out) == PKCS11_CKO_DATA); 55863f89caaSJens Wiklander 5594eb88651SRuchika Gupta return set_attributes_opt_or_null(out, temp, raw_data_opt_or_null, 5604eb88651SRuchika Gupta ARRAY_SIZE(raw_data_opt_or_null)); 56163f89caaSJens Wiklander } 56263f89caaSJens Wiklander 56363f89caaSJens Wiklander static enum pkcs11_rc create_pub_key_attributes(struct obj_attrs **out, 56463f89caaSJens Wiklander struct obj_attrs *temp) 56563f89caaSJens Wiklander { 56663f89caaSJens Wiklander uint32_t const *mandated = NULL; 5674eb88651SRuchika Gupta uint32_t const *opt_or_null = NULL; 56863f89caaSJens Wiklander size_t mandated_count = 0; 5694eb88651SRuchika Gupta size_t opt_or_null_count = 0; 57063f89caaSJens Wiklander enum pkcs11_rc rc = PKCS11_CKR_OK; 57163f89caaSJens Wiklander 57263f89caaSJens Wiklander assert(get_class(temp) == PKCS11_CKO_PUBLIC_KEY); 57363f89caaSJens Wiklander 57463f89caaSJens Wiklander rc = create_genkey_attributes(out, temp); 57563f89caaSJens Wiklander if (rc) 57663f89caaSJens Wiklander return rc; 57763f89caaSJens Wiklander 57863f89caaSJens Wiklander assert(get_class(*out) == PKCS11_CKO_PUBLIC_KEY); 57963f89caaSJens Wiklander 5804eb88651SRuchika Gupta rc = set_mandatory_boolprops(out, temp, public_key_boolprops, 5814eb88651SRuchika Gupta ARRAY_SIZE(public_key_boolprops)); 58263f89caaSJens Wiklander if (rc) 58363f89caaSJens Wiklander return rc; 58463f89caaSJens Wiklander 5854eb88651SRuchika Gupta rc = set_mandatory_attributes(out, temp, public_key_mandated, 5864eb88651SRuchika Gupta ARRAY_SIZE(public_key_mandated)); 58763f89caaSJens Wiklander if (rc) 58863f89caaSJens Wiklander return rc; 58963f89caaSJens Wiklander 5904eb88651SRuchika Gupta rc = set_attributes_opt_or_null(out, temp, 5914eb88651SRuchika Gupta public_key_opt_or_null, 5924eb88651SRuchika Gupta ARRAY_SIZE(public_key_opt_or_null)); 59363f89caaSJens Wiklander if (rc) 59463f89caaSJens Wiklander return rc; 59563f89caaSJens Wiklander 59663f89caaSJens Wiklander switch (get_key_type(*out)) { 59763f89caaSJens Wiklander case PKCS11_CKK_RSA: 5984eb88651SRuchika Gupta mandated = rsa_public_key_mandated; 5994eb88651SRuchika Gupta opt_or_null = rsa_public_key_opt_or_null; 6004eb88651SRuchika Gupta mandated_count = ARRAY_SIZE(rsa_public_key_mandated); 6014eb88651SRuchika Gupta opt_or_null_count = ARRAY_SIZE(rsa_public_key_opt_or_null); 60263f89caaSJens Wiklander break; 60363f89caaSJens Wiklander case PKCS11_CKK_EC: 6044eb88651SRuchika Gupta mandated = ec_public_key_mandated; 6054eb88651SRuchika Gupta opt_or_null = ec_public_key_opt_or_null; 6064eb88651SRuchika Gupta mandated_count = ARRAY_SIZE(ec_public_key_mandated); 6074eb88651SRuchika Gupta opt_or_null_count = ARRAY_SIZE(ec_public_key_opt_or_null); 60863f89caaSJens Wiklander break; 60963f89caaSJens Wiklander default: 61063f89caaSJens Wiklander EMSG("Invalid key type %#"PRIx32"/%s", 61163f89caaSJens Wiklander get_key_type(*out), id2str_key_type(get_key_type(*out))); 61263f89caaSJens Wiklander 61363f89caaSJens Wiklander return PKCS11_CKR_TEMPLATE_INCONSISTENT; 61463f89caaSJens Wiklander } 61563f89caaSJens Wiklander 61663f89caaSJens Wiklander rc = set_mandatory_attributes(out, temp, mandated, mandated_count); 61763f89caaSJens Wiklander if (rc) 61863f89caaSJens Wiklander return rc; 61963f89caaSJens Wiklander 6204eb88651SRuchika Gupta return set_attributes_opt_or_null(out, temp, opt_or_null, 6214eb88651SRuchika Gupta opt_or_null_count); 62263f89caaSJens Wiklander } 62363f89caaSJens Wiklander 62463f89caaSJens Wiklander static enum pkcs11_rc create_priv_key_attributes(struct obj_attrs **out, 62563f89caaSJens Wiklander struct obj_attrs *temp) 62663f89caaSJens Wiklander { 62763f89caaSJens Wiklander uint32_t const *mandated = NULL; 6284eb88651SRuchika Gupta uint32_t const *opt_or_null = NULL; 62963f89caaSJens Wiklander size_t mandated_count = 0; 6304eb88651SRuchika Gupta size_t opt_or_null_count = 0; 63163f89caaSJens Wiklander enum pkcs11_rc rc = PKCS11_CKR_OK; 63263f89caaSJens Wiklander 63363f89caaSJens Wiklander assert(get_class(temp) == PKCS11_CKO_PRIVATE_KEY); 63463f89caaSJens Wiklander 63563f89caaSJens Wiklander rc = create_genkey_attributes(out, temp); 63663f89caaSJens Wiklander if (rc) 63763f89caaSJens Wiklander return rc; 63863f89caaSJens Wiklander 63963f89caaSJens Wiklander assert(get_class(*out) == PKCS11_CKO_PRIVATE_KEY); 64063f89caaSJens Wiklander 6414eb88651SRuchika Gupta rc = set_mandatory_boolprops(out, temp, private_key_boolprops, 6424eb88651SRuchika Gupta ARRAY_SIZE(private_key_boolprops)); 64363f89caaSJens Wiklander if (rc) 64463f89caaSJens Wiklander return rc; 64563f89caaSJens Wiklander 6464eb88651SRuchika Gupta rc = set_mandatory_attributes(out, temp, private_key_mandated, 6474eb88651SRuchika Gupta ARRAY_SIZE(private_key_mandated)); 64863f89caaSJens Wiklander if (rc) 64963f89caaSJens Wiklander return rc; 65063f89caaSJens Wiklander 6514eb88651SRuchika Gupta rc = set_attributes_opt_or_null(out, temp, private_key_opt_or_null, 6524eb88651SRuchika Gupta ARRAY_SIZE(private_key_opt_or_null)); 65363f89caaSJens Wiklander if (rc) 65463f89caaSJens Wiklander return rc; 65563f89caaSJens Wiklander 65663f89caaSJens Wiklander switch (get_key_type(*out)) { 65763f89caaSJens Wiklander case PKCS11_CKK_RSA: 6584eb88651SRuchika Gupta opt_or_null = rsa_private_key_opt_or_null; 6594eb88651SRuchika Gupta opt_or_null_count = ARRAY_SIZE(rsa_private_key_opt_or_null); 66063f89caaSJens Wiklander break; 66163f89caaSJens Wiklander case PKCS11_CKK_EC: 6624eb88651SRuchika Gupta mandated = ec_private_key_mandated; 6634eb88651SRuchika Gupta opt_or_null = ec_private_key_opt_or_null; 6644eb88651SRuchika Gupta mandated_count = ARRAY_SIZE(ec_private_key_mandated); 6654eb88651SRuchika Gupta opt_or_null_count = ARRAY_SIZE(ec_private_key_opt_or_null); 66663f89caaSJens Wiklander break; 66763f89caaSJens Wiklander default: 66863f89caaSJens Wiklander EMSG("Invalid key type %#"PRIx32"/%s", 66963f89caaSJens Wiklander get_key_type(*out), id2str_key_type(get_key_type(*out))); 67063f89caaSJens Wiklander 67163f89caaSJens Wiklander return PKCS11_CKR_TEMPLATE_INCONSISTENT; 67263f89caaSJens Wiklander } 67363f89caaSJens Wiklander 67463f89caaSJens Wiklander rc = set_mandatory_attributes(out, temp, mandated, mandated_count); 67563f89caaSJens Wiklander if (rc) 67663f89caaSJens Wiklander return rc; 67763f89caaSJens Wiklander 6784eb88651SRuchika Gupta return set_attributes_opt_or_null(out, temp, opt_or_null, 6794eb88651SRuchika Gupta opt_or_null_count); 68063f89caaSJens Wiklander } 68163f89caaSJens Wiklander 682*196bcd93SRuchika Gupta static enum pkcs11_rc 683*196bcd93SRuchika Gupta sanitize_symm_key_attributes(struct obj_attrs **temp, 684*196bcd93SRuchika Gupta enum processing_func function) 685*196bcd93SRuchika Gupta { 686*196bcd93SRuchika Gupta enum pkcs11_rc rc = PKCS11_CKR_OK; 687*196bcd93SRuchika Gupta uint32_t a_size = 0; 688*196bcd93SRuchika Gupta 689*196bcd93SRuchika Gupta assert(get_class(*temp) == PKCS11_CKO_SECRET_KEY); 690*196bcd93SRuchika Gupta 691*196bcd93SRuchika Gupta rc = get_attribute_ptr(*temp, PKCS11_CKA_VALUE, NULL, &a_size); 692*196bcd93SRuchika Gupta 693*196bcd93SRuchika Gupta switch (get_key_type(*temp)) { 694*196bcd93SRuchika Gupta case PKCS11_CKK_GENERIC_SECRET: 695*196bcd93SRuchika Gupta case PKCS11_CKK_AES: 696*196bcd93SRuchika Gupta case PKCS11_CKK_MD5_HMAC: 697*196bcd93SRuchika Gupta case PKCS11_CKK_SHA_1_HMAC: 698*196bcd93SRuchika Gupta case PKCS11_CKK_SHA256_HMAC: 699*196bcd93SRuchika Gupta case PKCS11_CKK_SHA384_HMAC: 700*196bcd93SRuchika Gupta case PKCS11_CKK_SHA512_HMAC: 701*196bcd93SRuchika Gupta case PKCS11_CKK_SHA224_HMAC: 702*196bcd93SRuchika Gupta switch (function) { 703*196bcd93SRuchika Gupta case PKCS11_FUNCTION_IMPORT: 704*196bcd93SRuchika Gupta /* CKA_VALUE is a mandatory with C_CreateObject */ 705*196bcd93SRuchika Gupta if (rc || a_size == 0) 706*196bcd93SRuchika Gupta return PKCS11_CKR_TEMPLATE_INCONSISTENT; 707*196bcd93SRuchika Gupta 708*196bcd93SRuchika Gupta if (get_attribute_ptr(*temp, PKCS11_CKA_VALUE_LEN, NULL, 709*196bcd93SRuchika Gupta NULL) != PKCS11_RV_NOT_FOUND) 710*196bcd93SRuchika Gupta return PKCS11_CKR_TEMPLATE_INCONSISTENT; 711*196bcd93SRuchika Gupta 712*196bcd93SRuchika Gupta return add_attribute(temp, PKCS11_CKA_VALUE_LEN, 713*196bcd93SRuchika Gupta &a_size, sizeof(uint32_t)); 714*196bcd93SRuchika Gupta case PKCS11_FUNCTION_GENERATE: 715*196bcd93SRuchika Gupta if (rc != PKCS11_RV_NOT_FOUND) 716*196bcd93SRuchika Gupta return PKCS11_CKR_TEMPLATE_INCONSISTENT; 717*196bcd93SRuchika Gupta break; 718*196bcd93SRuchika Gupta default: 719*196bcd93SRuchika Gupta break; 720*196bcd93SRuchika Gupta } 721*196bcd93SRuchika Gupta break; 722*196bcd93SRuchika Gupta default: 723*196bcd93SRuchika Gupta EMSG("Invalid key type %#"PRIx32"/%s", 724*196bcd93SRuchika Gupta get_key_type(*temp), id2str_key_type(get_key_type(*temp))); 725*196bcd93SRuchika Gupta 726*196bcd93SRuchika Gupta return PKCS11_CKR_TEMPLATE_INCONSISTENT; 727*196bcd93SRuchika Gupta } 728*196bcd93SRuchika Gupta 729*196bcd93SRuchika Gupta return PKCS11_CKR_OK; 730*196bcd93SRuchika Gupta } 731*196bcd93SRuchika Gupta 73263f89caaSJens Wiklander /* 73363f89caaSJens Wiklander * Create an attribute list for a new object from a template and a parent 73463f89caaSJens Wiklander * object (optional) for an object generation function (generate, copy, 73563f89caaSJens Wiklander * derive...). 73663f89caaSJens Wiklander * 73763f89caaSJens Wiklander * PKCS#11 directives on the supplied template and expected return value: 73863f89caaSJens Wiklander * - template has an invalid attribute ID: ATTRIBUTE_TYPE_INVALID 73963f89caaSJens Wiklander * - template has an invalid value for an attribute: ATTRIBUTE_VALID_INVALID 74063f89caaSJens Wiklander * - template has value for a read-only attribute: ATTRIBUTE_READ_ONLY 74163f89caaSJens Wiklander * - template+default+parent => still miss an attribute: TEMPLATE_INCONSISTENT 74263f89caaSJens Wiklander * 74363f89caaSJens Wiklander * INFO on PKCS11_CMD_COPY_OBJECT: 74463f89caaSJens Wiklander * - parent PKCS11_CKA_COPYIABLE=false => return ACTION_PROHIBITED. 74563f89caaSJens Wiklander * - template can specify PKCS11_CKA_TOKEN, PKCS11_CKA_PRIVATE, 74663f89caaSJens Wiklander * PKCS11_CKA_MODIFIABLE, PKCS11_CKA_DESTROYABLE. 74763f89caaSJens Wiklander * - SENSITIVE can change from false to true, not from true to false. 74863f89caaSJens Wiklander * - LOCAL is the parent LOCAL 74963f89caaSJens Wiklander */ 75063f89caaSJens Wiklander enum pkcs11_rc 75163f89caaSJens Wiklander create_attributes_from_template(struct obj_attrs **out, void *template, 75263f89caaSJens Wiklander size_t template_size, 75348799892SRuchika Gupta struct obj_attrs *parent, 75463f89caaSJens Wiklander enum processing_func function, 7554cfce748SRuchika Gupta enum pkcs11_mechanism_id mecha, 7564cfce748SRuchika Gupta enum pkcs11_class_id template_class __unused) 75763f89caaSJens Wiklander { 75863f89caaSJens Wiklander struct obj_attrs *temp = NULL; 75963f89caaSJens Wiklander struct obj_attrs *attrs = NULL; 76063f89caaSJens Wiklander enum pkcs11_rc rc = PKCS11_CKR_OK; 76163f89caaSJens Wiklander uint8_t local = 0; 76263f89caaSJens Wiklander uint8_t always_sensitive = 0; 76363f89caaSJens Wiklander uint8_t never_extract = 0; 764fa247a2aSRuchika Gupta uint32_t class = PKCS11_UNDEFINED_ID; 765fa247a2aSRuchika Gupta uint32_t type = PKCS11_UNDEFINED_ID; 76663f89caaSJens Wiklander uint32_t mechanism_id = PKCS11_CKM_UNDEFINED_ID; 76763f89caaSJens Wiklander 76863f89caaSJens Wiklander #ifdef DEBUG /* Sanity: check function argument */ 76963f89caaSJens Wiklander trace_attributes_from_api_head("template", template, template_size); 77063f89caaSJens Wiklander switch (function) { 771fa247a2aSRuchika Gupta case PKCS11_FUNCTION_GENERATE: 77263f89caaSJens Wiklander case PKCS11_FUNCTION_IMPORT: 7732d25a9bcSRuchika Gupta case PKCS11_FUNCTION_MODIFY: 77448799892SRuchika Gupta case PKCS11_FUNCTION_DERIVE: 7752d25a9bcSRuchika Gupta case PKCS11_FUNCTION_COPY: 77663f89caaSJens Wiklander break; 77763f89caaSJens Wiklander default: 77863f89caaSJens Wiklander TEE_Panic(TEE_ERROR_NOT_SUPPORTED); 77963f89caaSJens Wiklander } 78063f89caaSJens Wiklander #endif 78163f89caaSJens Wiklander 782dcad3409SRuchika Gupta /* 783dcad3409SRuchika Gupta * For PKCS11_FUNCTION_GENERATE, find the class and type 784dcad3409SRuchika Gupta * based on the mechanism. These will be passed as hint 785dcad3409SRuchika Gupta * sanitize_client_object() and added in temp if not 786dcad3409SRuchika Gupta * already present 787dcad3409SRuchika Gupta */ 788dcad3409SRuchika Gupta if (function == PKCS11_FUNCTION_GENERATE) { 789fa247a2aSRuchika Gupta switch (mecha) { 790fa247a2aSRuchika Gupta case PKCS11_CKM_GENERIC_SECRET_KEY_GEN: 791fa247a2aSRuchika Gupta class = PKCS11_CKO_SECRET_KEY; 792fa247a2aSRuchika Gupta type = PKCS11_CKK_GENERIC_SECRET; 793fa247a2aSRuchika Gupta break; 794fa247a2aSRuchika Gupta case PKCS11_CKM_AES_KEY_GEN: 795fa247a2aSRuchika Gupta class = PKCS11_CKO_SECRET_KEY; 796fa247a2aSRuchika Gupta type = PKCS11_CKK_AES; 797fa247a2aSRuchika Gupta break; 798fa247a2aSRuchika Gupta default: 799dcad3409SRuchika Gupta TEE_Panic(TEE_ERROR_NOT_SUPPORTED); 800fa247a2aSRuchika Gupta } 801fa247a2aSRuchika Gupta } 802fa247a2aSRuchika Gupta 8032d25a9bcSRuchika Gupta /* 8042d25a9bcSRuchika Gupta * Check and remove duplicates if any and create a new temporary 8052d25a9bcSRuchika Gupta * template 8062d25a9bcSRuchika Gupta */ 807dcad3409SRuchika Gupta rc = sanitize_client_object(&temp, template, template_size, class, 808dcad3409SRuchika Gupta type); 809dcad3409SRuchika Gupta if (rc) 810dcad3409SRuchika Gupta goto out; 811dcad3409SRuchika Gupta 812dcad3409SRuchika Gupta /* 8132d25a9bcSRuchika Gupta * For function type modify and copy return the created template 8142d25a9bcSRuchika Gupta * from here. Rest of the code below is for creating objects 8152d25a9bcSRuchika Gupta * or generating keys. 8162d25a9bcSRuchika Gupta */ 8172d25a9bcSRuchika Gupta switch (function) { 8182d25a9bcSRuchika Gupta case PKCS11_FUNCTION_MODIFY: 8192d25a9bcSRuchika Gupta case PKCS11_FUNCTION_COPY: 8202d25a9bcSRuchika Gupta *out = temp; 8212d25a9bcSRuchika Gupta return rc; 8222d25a9bcSRuchika Gupta default: 8232d25a9bcSRuchika Gupta break; 8242d25a9bcSRuchika Gupta } 8252d25a9bcSRuchika Gupta 8262d25a9bcSRuchika Gupta /* 827dcad3409SRuchika Gupta * Check if class and type in temp are consistent with the mechanism 828dcad3409SRuchika Gupta */ 829fa247a2aSRuchika Gupta switch (mecha) { 830fa247a2aSRuchika Gupta case PKCS11_CKM_GENERIC_SECRET_KEY_GEN: 831fa247a2aSRuchika Gupta if (get_class(temp) != PKCS11_CKO_SECRET_KEY || 832fa247a2aSRuchika Gupta get_key_type(temp) != PKCS11_CKK_GENERIC_SECRET) { 833fa247a2aSRuchika Gupta rc = PKCS11_CKR_TEMPLATE_INCONSISTENT; 834fa247a2aSRuchika Gupta goto out; 835fa247a2aSRuchika Gupta } 836fa247a2aSRuchika Gupta break; 837fa247a2aSRuchika Gupta case PKCS11_CKM_AES_KEY_GEN: 838fa247a2aSRuchika Gupta if (get_class(temp) != PKCS11_CKO_SECRET_KEY || 839fa247a2aSRuchika Gupta get_key_type(temp) != PKCS11_CKK_AES) { 840fa247a2aSRuchika Gupta rc = PKCS11_CKR_TEMPLATE_INCONSISTENT; 841fa247a2aSRuchika Gupta goto out; 842fa247a2aSRuchika Gupta } 843fa247a2aSRuchika Gupta break; 844fa247a2aSRuchika Gupta default: 845fa247a2aSRuchika Gupta break; 846fa247a2aSRuchika Gupta } 84763f89caaSJens Wiklander 84863f89caaSJens Wiklander if (!sanitize_consistent_class_and_type(temp)) { 84963f89caaSJens Wiklander EMSG("Inconsistent class/type"); 85063f89caaSJens Wiklander rc = PKCS11_CKR_TEMPLATE_INCONSISTENT; 85163f89caaSJens Wiklander goto out; 85263f89caaSJens Wiklander } 85363f89caaSJens Wiklander 85463f89caaSJens Wiklander switch (get_class(temp)) { 85563f89caaSJens Wiklander case PKCS11_CKO_DATA: 85663f89caaSJens Wiklander rc = create_data_attributes(&attrs, temp); 85763f89caaSJens Wiklander break; 85863f89caaSJens Wiklander case PKCS11_CKO_SECRET_KEY: 859*196bcd93SRuchika Gupta rc = sanitize_symm_key_attributes(&temp, function); 860*196bcd93SRuchika Gupta if (rc) 861*196bcd93SRuchika Gupta goto out; 86263f89caaSJens Wiklander rc = create_symm_key_attributes(&attrs, temp); 86363f89caaSJens Wiklander break; 86463f89caaSJens Wiklander case PKCS11_CKO_PUBLIC_KEY: 86563f89caaSJens Wiklander rc = create_pub_key_attributes(&attrs, temp); 86663f89caaSJens Wiklander break; 86763f89caaSJens Wiklander case PKCS11_CKO_PRIVATE_KEY: 86863f89caaSJens Wiklander rc = create_priv_key_attributes(&attrs, temp); 86963f89caaSJens Wiklander break; 87063f89caaSJens Wiklander default: 87163f89caaSJens Wiklander DMSG("Invalid object class %#"PRIx32"/%s", 87263f89caaSJens Wiklander get_class(temp), id2str_class(get_class(temp))); 87363f89caaSJens Wiklander 87463f89caaSJens Wiklander rc = PKCS11_CKR_TEMPLATE_INCONSISTENT; 87563f89caaSJens Wiklander break; 87663f89caaSJens Wiklander } 87763f89caaSJens Wiklander if (rc) 87863f89caaSJens Wiklander goto out; 87963f89caaSJens Wiklander 88090c47fe2SRuchika Gupta if (get_attribute_ptr(temp, PKCS11_CKA_LOCAL, NULL, NULL) != 881002f6b93SEtienne Carriere PKCS11_RV_NOT_FOUND) { 882002f6b93SEtienne Carriere rc = PKCS11_CKR_TEMPLATE_INCONSISTENT; 88363f89caaSJens Wiklander goto out; 884002f6b93SEtienne Carriere } 88563f89caaSJens Wiklander 88690c47fe2SRuchika Gupta if (get_attribute_ptr(temp, PKCS11_CKA_KEY_GEN_MECHANISM, NULL, NULL) != 887002f6b93SEtienne Carriere PKCS11_RV_NOT_FOUND) { 888002f6b93SEtienne Carriere rc = PKCS11_CKR_TEMPLATE_INCONSISTENT; 88963f89caaSJens Wiklander goto out; 890002f6b93SEtienne Carriere } 89163f89caaSJens Wiklander 89263f89caaSJens Wiklander switch (function) { 893fa247a2aSRuchika Gupta case PKCS11_FUNCTION_GENERATE: 894fa247a2aSRuchika Gupta local = PKCS11_TRUE; 895fa247a2aSRuchika Gupta break; 89663f89caaSJens Wiklander case PKCS11_FUNCTION_IMPORT: 89748799892SRuchika Gupta case PKCS11_FUNCTION_DERIVE: 89863f89caaSJens Wiklander default: 89963f89caaSJens Wiklander local = PKCS11_FALSE; 90063f89caaSJens Wiklander break; 90163f89caaSJens Wiklander } 90263f89caaSJens Wiklander rc = add_attribute(&attrs, PKCS11_CKA_LOCAL, &local, sizeof(local)); 90363f89caaSJens Wiklander if (rc) 90463f89caaSJens Wiklander goto out; 90563f89caaSJens Wiklander 90663f89caaSJens Wiklander switch (get_class(attrs)) { 90763f89caaSJens Wiklander case PKCS11_CKO_SECRET_KEY: 90863f89caaSJens Wiklander case PKCS11_CKO_PRIVATE_KEY: 90963f89caaSJens Wiklander case PKCS11_CKO_PUBLIC_KEY: 91063f89caaSJens Wiklander always_sensitive = PKCS11_FALSE; 91163f89caaSJens Wiklander never_extract = PKCS11_FALSE; 91263f89caaSJens Wiklander 913fa247a2aSRuchika Gupta switch (function) { 91448799892SRuchika Gupta case PKCS11_FUNCTION_DERIVE: 91548799892SRuchika Gupta always_sensitive = 91648799892SRuchika Gupta get_bool(parent, PKCS11_CKA_ALWAYS_SENSITIVE) && 91748799892SRuchika Gupta get_bool(attrs, PKCS11_CKA_SENSITIVE); 91848799892SRuchika Gupta never_extract = 91948799892SRuchika Gupta get_bool(parent, PKCS11_CKA_NEVER_EXTRACTABLE) && 92048799892SRuchika Gupta !get_bool(attrs, PKCS11_CKA_EXTRACTABLE); 92148799892SRuchika Gupta break; 922fa247a2aSRuchika Gupta case PKCS11_FUNCTION_GENERATE: 923fa247a2aSRuchika Gupta always_sensitive = get_bool(attrs, 924fa247a2aSRuchika Gupta PKCS11_CKA_SENSITIVE); 925fa247a2aSRuchika Gupta never_extract = !get_bool(attrs, 926fa247a2aSRuchika Gupta PKCS11_CKA_EXTRACTABLE); 927fa247a2aSRuchika Gupta break; 928fa247a2aSRuchika Gupta default: 929fa247a2aSRuchika Gupta break; 930fa247a2aSRuchika Gupta } 931fa247a2aSRuchika Gupta 93263f89caaSJens Wiklander rc = add_attribute(&attrs, PKCS11_CKA_ALWAYS_SENSITIVE, 93363f89caaSJens Wiklander &always_sensitive, sizeof(always_sensitive)); 93463f89caaSJens Wiklander if (rc) 93563f89caaSJens Wiklander goto out; 93663f89caaSJens Wiklander 93763f89caaSJens Wiklander rc = add_attribute(&attrs, PKCS11_CKA_NEVER_EXTRACTABLE, 93863f89caaSJens Wiklander &never_extract, sizeof(never_extract)); 93963f89caaSJens Wiklander if (rc) 94063f89caaSJens Wiklander goto out; 94163f89caaSJens Wiklander 94263f89caaSJens Wiklander /* Keys mandate attribute PKCS11_CKA_KEY_GEN_MECHANISM */ 943fa247a2aSRuchika Gupta if (local) 944fa247a2aSRuchika Gupta mechanism_id = mecha; 945fa247a2aSRuchika Gupta else 94663f89caaSJens Wiklander mechanism_id = PKCS11_CK_UNAVAILABLE_INFORMATION; 947fa247a2aSRuchika Gupta 94863f89caaSJens Wiklander rc = add_attribute(&attrs, PKCS11_CKA_KEY_GEN_MECHANISM, 94963f89caaSJens Wiklander &mechanism_id, sizeof(mechanism_id)); 95063f89caaSJens Wiklander if (rc) 95163f89caaSJens Wiklander goto out; 95263f89caaSJens Wiklander break; 95363f89caaSJens Wiklander 95463f89caaSJens Wiklander default: 95563f89caaSJens Wiklander break; 95663f89caaSJens Wiklander } 95763f89caaSJens Wiklander 95863f89caaSJens Wiklander *out = attrs; 95963f89caaSJens Wiklander 96063f89caaSJens Wiklander #ifdef DEBUG 96163f89caaSJens Wiklander trace_attributes("object", attrs); 96263f89caaSJens Wiklander #endif 96363f89caaSJens Wiklander 96463f89caaSJens Wiklander out: 96563f89caaSJens Wiklander TEE_Free(temp); 96663f89caaSJens Wiklander if (rc) 96763f89caaSJens Wiklander TEE_Free(attrs); 96863f89caaSJens Wiklander 96963f89caaSJens Wiklander return rc; 97063f89caaSJens Wiklander } 97163f89caaSJens Wiklander 97263f89caaSJens Wiklander static enum pkcs11_rc check_attrs_misc_integrity(struct obj_attrs *head) 97363f89caaSJens Wiklander { 97463f89caaSJens Wiklander if (get_bool(head, PKCS11_CKA_NEVER_EXTRACTABLE) && 97563f89caaSJens Wiklander get_bool(head, PKCS11_CKA_EXTRACTABLE)) { 97663f89caaSJens Wiklander DMSG("Never/Extractable attributes mismatch %d/%d", 97763f89caaSJens Wiklander get_bool(head, PKCS11_CKA_NEVER_EXTRACTABLE), 97863f89caaSJens Wiklander get_bool(head, PKCS11_CKA_EXTRACTABLE)); 97963f89caaSJens Wiklander 98063f89caaSJens Wiklander return PKCS11_CKR_TEMPLATE_INCONSISTENT; 98163f89caaSJens Wiklander } 98263f89caaSJens Wiklander 98363f89caaSJens Wiklander if (get_bool(head, PKCS11_CKA_ALWAYS_SENSITIVE) && 98463f89caaSJens Wiklander !get_bool(head, PKCS11_CKA_SENSITIVE)) { 98563f89caaSJens Wiklander DMSG("Sensitive/always attributes mismatch %d/%d", 98663f89caaSJens Wiklander get_bool(head, PKCS11_CKA_SENSITIVE), 98763f89caaSJens Wiklander get_bool(head, PKCS11_CKA_ALWAYS_SENSITIVE)); 98863f89caaSJens Wiklander 98963f89caaSJens Wiklander return PKCS11_CKR_TEMPLATE_INCONSISTENT; 99063f89caaSJens Wiklander } 99163f89caaSJens Wiklander 99263f89caaSJens Wiklander return PKCS11_CKR_OK; 99363f89caaSJens Wiklander } 99463f89caaSJens Wiklander 99589735787SRuchika Gupta bool object_is_private(struct obj_attrs *head) 99689735787SRuchika Gupta { 99765fb9092SVesa Jääskeläinen return get_bool(head, PKCS11_CKA_PRIVATE); 99889735787SRuchika Gupta } 99989735787SRuchika Gupta 10002d25a9bcSRuchika Gupta bool object_is_token(struct obj_attrs *head) 10012d25a9bcSRuchika Gupta { 10022d25a9bcSRuchika Gupta return get_bool(head, PKCS11_CKA_TOKEN); 10032d25a9bcSRuchika Gupta } 10042d25a9bcSRuchika Gupta 10052d25a9bcSRuchika Gupta bool object_is_modifiable(struct obj_attrs *head) 10062d25a9bcSRuchika Gupta { 10072d25a9bcSRuchika Gupta return get_bool(head, PKCS11_CKA_MODIFIABLE); 10082d25a9bcSRuchika Gupta } 10092d25a9bcSRuchika Gupta 10102d25a9bcSRuchika Gupta bool object_is_copyable(struct obj_attrs *head) 10112d25a9bcSRuchika Gupta { 10122d25a9bcSRuchika Gupta return get_bool(head, PKCS11_CKA_COPYABLE); 10132d25a9bcSRuchika Gupta } 10142d25a9bcSRuchika Gupta 101563f89caaSJens Wiklander /* 1016512cbf1dSJens Wiklander * Check access to object against authentication to token 1017512cbf1dSJens Wiklander */ 1018512cbf1dSJens Wiklander enum pkcs11_rc check_access_attrs_against_token(struct pkcs11_session *session, 1019512cbf1dSJens Wiklander struct obj_attrs *head) 1020512cbf1dSJens Wiklander { 1021512cbf1dSJens Wiklander bool private = true; 1022512cbf1dSJens Wiklander 1023512cbf1dSJens Wiklander switch (get_class(head)) { 1024512cbf1dSJens Wiklander case PKCS11_CKO_SECRET_KEY: 102565fb9092SVesa Jääskeläinen case PKCS11_CKO_PRIVATE_KEY: 1026512cbf1dSJens Wiklander case PKCS11_CKO_PUBLIC_KEY: 1027512cbf1dSJens Wiklander case PKCS11_CKO_DATA: 102865fb9092SVesa Jääskeläinen private = object_is_private(head); 1029512cbf1dSJens Wiklander break; 1030512cbf1dSJens Wiklander default: 1031512cbf1dSJens Wiklander return PKCS11_CKR_KEY_FUNCTION_NOT_PERMITTED; 1032512cbf1dSJens Wiklander } 1033512cbf1dSJens Wiklander 10345db0fef4SRuchika Gupta if (private && (pkcs11_session_is_public(session) || 10355db0fef4SRuchika Gupta pkcs11_session_is_so(session))) { 10365db0fef4SRuchika Gupta DMSG("Private object access from a public or SO session"); 1037512cbf1dSJens Wiklander 103812f1ba86SRuchika Gupta return PKCS11_CKR_USER_NOT_LOGGED_IN; 1039512cbf1dSJens Wiklander } 1040512cbf1dSJens Wiklander 1041512cbf1dSJens Wiklander return PKCS11_CKR_OK; 1042512cbf1dSJens Wiklander } 1043512cbf1dSJens Wiklander 1044512cbf1dSJens Wiklander /* 104563f89caaSJens Wiklander * Check the attributes of a to-be-created object matches the token state 104663f89caaSJens Wiklander */ 104763f89caaSJens Wiklander enum pkcs11_rc check_created_attrs_against_token(struct pkcs11_session *session, 104863f89caaSJens Wiklander struct obj_attrs *head) 104963f89caaSJens Wiklander { 105063f89caaSJens Wiklander enum pkcs11_rc rc = PKCS11_CKR_OK; 105163f89caaSJens Wiklander 105263f89caaSJens Wiklander rc = check_attrs_misc_integrity(head); 105363f89caaSJens Wiklander if (rc) 105463f89caaSJens Wiklander return rc; 105563f89caaSJens Wiklander 105663f89caaSJens Wiklander if (get_bool(head, PKCS11_CKA_TRUSTED) && 105763f89caaSJens Wiklander !pkcs11_session_is_so(session)) { 105863f89caaSJens Wiklander DMSG("Can't create trusted object"); 105963f89caaSJens Wiklander 106063f89caaSJens Wiklander return PKCS11_CKR_KEY_FUNCTION_NOT_PERMITTED; 106163f89caaSJens Wiklander } 106263f89caaSJens Wiklander 106363f89caaSJens Wiklander if (get_bool(head, PKCS11_CKA_TOKEN) && 106463f89caaSJens Wiklander !pkcs11_session_is_read_write(session)) { 106563f89caaSJens Wiklander DMSG("Can't create persistent object"); 106663f89caaSJens Wiklander 106763f89caaSJens Wiklander return PKCS11_CKR_SESSION_READ_ONLY; 106863f89caaSJens Wiklander } 106963f89caaSJens Wiklander 107063f89caaSJens Wiklander /* 107163f89caaSJens Wiklander * TODO: START_DATE and END_DATE: complies with current time? 107263f89caaSJens Wiklander */ 107363f89caaSJens Wiklander return PKCS11_CKR_OK; 107463f89caaSJens Wiklander } 107563f89caaSJens Wiklander 107663f89caaSJens Wiklander #define DMSG_BAD_BBOOL(attr, proc, head) \ 107763f89caaSJens Wiklander do { \ 107863f89caaSJens Wiklander uint32_t __maybe_unused _attr = (attr); \ 107963f89caaSJens Wiklander uint8_t __maybe_unused _bvalue = 0; \ 108063f89caaSJens Wiklander enum pkcs11_rc __maybe_unused _rc = PKCS11_CKR_OK; \ 108163f89caaSJens Wiklander \ 108263f89caaSJens Wiklander _rc = get_attribute((head), _attr, &_bvalue, NULL); \ 108363f89caaSJens Wiklander DMSG("%s issue for %s: %sfound, value %"PRIu8, \ 108463f89caaSJens Wiklander id2str_attr(_attr), id2str_proc((proc)), \ 108563f89caaSJens Wiklander _rc ? "not " : "", _bvalue); \ 108663f89caaSJens Wiklander } while (0) 108763f89caaSJens Wiklander 108863f89caaSJens Wiklander static bool __maybe_unused check_attr_bval(uint32_t proc_id __maybe_unused, 108963f89caaSJens Wiklander struct obj_attrs *head, 109063f89caaSJens Wiklander uint32_t attribute, bool val) 109163f89caaSJens Wiklander { 109263f89caaSJens Wiklander uint8_t bbool = 0; 109363f89caaSJens Wiklander uint32_t sz = sizeof(bbool); 109463f89caaSJens Wiklander 109563f89caaSJens Wiklander if (!get_attribute(head, attribute, &bbool, &sz) && !!bbool == val) 109663f89caaSJens Wiklander return true; 109763f89caaSJens Wiklander 109863f89caaSJens Wiklander DMSG_BAD_BBOOL(attribute, proc_id, head); 109963f89caaSJens Wiklander return false; 110063f89caaSJens Wiklander } 110163f89caaSJens Wiklander 110263f89caaSJens Wiklander /* 110363f89caaSJens Wiklander * Check the attributes of a new secret match the processing/mechanism 110463f89caaSJens Wiklander * used to create it. 110563f89caaSJens Wiklander * 110663f89caaSJens Wiklander * @proc_id - PKCS11_CKM_xxx 110763f89caaSJens Wiklander * @head - head of the attributes of the to-be-created object. 110863f89caaSJens Wiklander */ 110963f89caaSJens Wiklander enum pkcs11_rc check_created_attrs_against_processing(uint32_t proc_id, 111063f89caaSJens Wiklander struct obj_attrs *head) 111163f89caaSJens Wiklander { 111263f89caaSJens Wiklander /* 111363f89caaSJens Wiklander * Processings that do not create secrets are not expected to call 111463f89caaSJens Wiklander * this function which would panic. 111563f89caaSJens Wiklander */ 111663f89caaSJens Wiklander switch (proc_id) { 111763f89caaSJens Wiklander case PKCS11_PROCESSING_IMPORT: 111848799892SRuchika Gupta case PKCS11_CKM_AES_ECB_ENCRYPT_DATA: 111948799892SRuchika Gupta case PKCS11_CKM_AES_CBC_ENCRYPT_DATA: 112063f89caaSJens Wiklander assert(check_attr_bval(proc_id, head, PKCS11_CKA_LOCAL, false)); 112163f89caaSJens Wiklander break; 1122fa247a2aSRuchika Gupta case PKCS11_CKM_GENERIC_SECRET_KEY_GEN: 1123fa247a2aSRuchika Gupta case PKCS11_CKM_AES_KEY_GEN: 1124fa247a2aSRuchika Gupta assert(check_attr_bval(proc_id, head, PKCS11_CKA_LOCAL, true)); 1125fa247a2aSRuchika Gupta break; 112663f89caaSJens Wiklander default: 112763f89caaSJens Wiklander TEE_Panic(proc_id); 112863f89caaSJens Wiklander break; 112963f89caaSJens Wiklander } 113063f89caaSJens Wiklander 1131fa247a2aSRuchika Gupta switch (proc_id) { 1132fa247a2aSRuchika Gupta case PKCS11_CKM_GENERIC_SECRET_KEY_GEN: 1133fa247a2aSRuchika Gupta assert(get_key_type(head) == PKCS11_CKK_GENERIC_SECRET); 1134fa247a2aSRuchika Gupta break; 1135fa247a2aSRuchika Gupta case PKCS11_CKM_AES_KEY_GEN: 1136fa247a2aSRuchika Gupta assert(get_key_type(head) == PKCS11_CKK_AES); 1137fa247a2aSRuchika Gupta break; 1138fa247a2aSRuchika Gupta case PKCS11_PROCESSING_IMPORT: 1139fa247a2aSRuchika Gupta default: 1140fa247a2aSRuchika Gupta break; 1141fa247a2aSRuchika Gupta } 1142fa247a2aSRuchika Gupta 114363f89caaSJens Wiklander return PKCS11_CKR_OK; 114463f89caaSJens Wiklander } 1145512cbf1dSJens Wiklander 11462d0cd829SRuchika Gupta /* Return min and max key size supported for a key_type in bytes */ 1147512cbf1dSJens Wiklander static void get_key_min_max_sizes(enum pkcs11_key_type key_type, 1148512cbf1dSJens Wiklander uint32_t *min_key_size, 1149512cbf1dSJens Wiklander uint32_t *max_key_size) 1150512cbf1dSJens Wiklander { 1151512cbf1dSJens Wiklander enum pkcs11_mechanism_id mechanism = PKCS11_CKM_UNDEFINED_ID; 1152512cbf1dSJens Wiklander 1153512cbf1dSJens Wiklander switch (key_type) { 1154fa247a2aSRuchika Gupta case PKCS11_CKK_GENERIC_SECRET: 1155fa247a2aSRuchika Gupta mechanism = PKCS11_CKM_GENERIC_SECRET_KEY_GEN; 1156fa247a2aSRuchika Gupta break; 1157512cbf1dSJens Wiklander case PKCS11_CKK_AES: 1158512cbf1dSJens Wiklander mechanism = PKCS11_CKM_AES_KEY_GEN; 1159512cbf1dSJens Wiklander break; 11601f45c9cfSRuchika Gupta case PKCS11_CKK_MD5_HMAC: 11611f45c9cfSRuchika Gupta mechanism = PKCS11_CKM_MD5_HMAC; 11621f45c9cfSRuchika Gupta break; 11631f45c9cfSRuchika Gupta case PKCS11_CKK_SHA_1_HMAC: 11641f45c9cfSRuchika Gupta mechanism = PKCS11_CKM_SHA_1_HMAC; 11651f45c9cfSRuchika Gupta break; 11661f45c9cfSRuchika Gupta case PKCS11_CKK_SHA224_HMAC: 11671f45c9cfSRuchika Gupta mechanism = PKCS11_CKM_SHA224_HMAC; 11681f45c9cfSRuchika Gupta break; 1169a339a354SEtienne Carriere case PKCS11_CKK_SHA256_HMAC: 1170a339a354SEtienne Carriere mechanism = PKCS11_CKM_SHA256_HMAC; 1171a339a354SEtienne Carriere break; 11721f45c9cfSRuchika Gupta case PKCS11_CKK_SHA384_HMAC: 11731f45c9cfSRuchika Gupta mechanism = PKCS11_CKM_SHA384_HMAC; 11741f45c9cfSRuchika Gupta break; 11751f45c9cfSRuchika Gupta case PKCS11_CKK_SHA512_HMAC: 11761f45c9cfSRuchika Gupta mechanism = PKCS11_CKM_SHA512_HMAC; 11771f45c9cfSRuchika Gupta break; 1178512cbf1dSJens Wiklander default: 1179512cbf1dSJens Wiklander TEE_Panic(key_type); 1180512cbf1dSJens Wiklander break; 1181512cbf1dSJens Wiklander } 1182512cbf1dSJens Wiklander 11832d0cd829SRuchika Gupta mechanism_supported_key_sizes_bytes(mechanism, min_key_size, 1184512cbf1dSJens Wiklander max_key_size); 1185512cbf1dSJens Wiklander } 1186512cbf1dSJens Wiklander 1187512cbf1dSJens Wiklander enum pkcs11_rc check_created_attrs(struct obj_attrs *key1, 1188512cbf1dSJens Wiklander struct obj_attrs *key2) 1189512cbf1dSJens Wiklander { 1190512cbf1dSJens Wiklander enum pkcs11_rc rc = PKCS11_CKR_OK; 1191512cbf1dSJens Wiklander struct obj_attrs *secret = NULL; 1192512cbf1dSJens Wiklander uint32_t max_key_size = 0; 1193512cbf1dSJens Wiklander uint32_t min_key_size = 0; 1194512cbf1dSJens Wiklander uint32_t key_length = 0; 1195512cbf1dSJens Wiklander 1196512cbf1dSJens Wiklander switch (get_class(key1)) { 1197512cbf1dSJens Wiklander case PKCS11_CKO_SECRET_KEY: 1198512cbf1dSJens Wiklander secret = key1; 1199512cbf1dSJens Wiklander break; 1200512cbf1dSJens Wiklander default: 1201512cbf1dSJens Wiklander return PKCS11_CKR_ATTRIBUTE_VALUE_INVALID; 1202512cbf1dSJens Wiklander } 1203512cbf1dSJens Wiklander 1204512cbf1dSJens Wiklander if (key2) 1205512cbf1dSJens Wiklander return PKCS11_CKR_ATTRIBUTE_VALUE_INVALID; 1206512cbf1dSJens Wiklander 1207512cbf1dSJens Wiklander if (secret) { 1208512cbf1dSJens Wiklander switch (get_key_type(secret)) { 1209512cbf1dSJens Wiklander case PKCS11_CKK_AES: 1210512cbf1dSJens Wiklander case PKCS11_CKK_GENERIC_SECRET: 1211512cbf1dSJens Wiklander case PKCS11_CKK_MD5_HMAC: 1212512cbf1dSJens Wiklander case PKCS11_CKK_SHA_1_HMAC: 1213512cbf1dSJens Wiklander case PKCS11_CKK_SHA224_HMAC: 1214512cbf1dSJens Wiklander case PKCS11_CKK_SHA256_HMAC: 1215512cbf1dSJens Wiklander case PKCS11_CKK_SHA384_HMAC: 1216512cbf1dSJens Wiklander case PKCS11_CKK_SHA512_HMAC: 1217512cbf1dSJens Wiklander break; 1218512cbf1dSJens Wiklander default: 1219512cbf1dSJens Wiklander return PKCS11_CKR_TEMPLATE_INCONSISTENT; 1220512cbf1dSJens Wiklander } 1221512cbf1dSJens Wiklander 1222512cbf1dSJens Wiklander /* Get key size */ 1223512cbf1dSJens Wiklander rc = get_u32_attribute(secret, PKCS11_CKA_VALUE_LEN, 1224512cbf1dSJens Wiklander &key_length); 1225512cbf1dSJens Wiklander if (rc) 1226d1d44372SRuchika Gupta return PKCS11_CKR_TEMPLATE_INCOMPLETE; 1227512cbf1dSJens Wiklander } 1228512cbf1dSJens Wiklander 1229512cbf1dSJens Wiklander get_key_min_max_sizes(get_key_type(key1), &min_key_size, &max_key_size); 1230512cbf1dSJens Wiklander if (key_length < min_key_size || key_length > max_key_size) { 1231512cbf1dSJens Wiklander EMSG("Length %"PRIu32" vs range [%"PRIu32" %"PRIu32"]", 1232512cbf1dSJens Wiklander key_length, min_key_size, max_key_size); 1233512cbf1dSJens Wiklander 1234512cbf1dSJens Wiklander return PKCS11_CKR_KEY_SIZE_RANGE; 1235512cbf1dSJens Wiklander } 1236512cbf1dSJens Wiklander 123749ed60abSRuchika Gupta if (secret && get_key_type(secret) == PKCS11_CKK_AES) { 123849ed60abSRuchika Gupta if (key_length != 16 && key_length != 24 && key_length != 32) 123949ed60abSRuchika Gupta return PKCS11_CKR_KEY_SIZE_RANGE; 124049ed60abSRuchika Gupta } 124149ed60abSRuchika Gupta 1242512cbf1dSJens Wiklander return PKCS11_CKR_OK; 1243512cbf1dSJens Wiklander } 1244512cbf1dSJens Wiklander 1245512cbf1dSJens Wiklander /* Check processing ID against attribute ALLOWED_MECHANISMS if any */ 1246512cbf1dSJens Wiklander static bool parent_key_complies_allowed_processings(uint32_t proc_id, 1247512cbf1dSJens Wiklander struct obj_attrs *head) 1248512cbf1dSJens Wiklander { 1249512cbf1dSJens Wiklander char *attr = NULL; 1250512cbf1dSJens Wiklander uint32_t size = 0; 1251512cbf1dSJens Wiklander uint32_t proc = 0; 1252512cbf1dSJens Wiklander size_t count = 0; 12536a760c9eSEtienne Carriere enum pkcs11_rc rc = PKCS11_CKR_GENERAL_ERROR; 1254512cbf1dSJens Wiklander 12556a760c9eSEtienne Carriere rc = get_attribute_ptr(head, PKCS11_CKA_ALLOWED_MECHANISMS, 12566a760c9eSEtienne Carriere (void *)&attr, &size); 12576a760c9eSEtienne Carriere if (rc == PKCS11_RV_NOT_FOUND) 1258512cbf1dSJens Wiklander return true; 12596a760c9eSEtienne Carriere if (rc) { 12606a760c9eSEtienne Carriere EMSG("unexpected attributes state"); 12616a760c9eSEtienne Carriere TEE_Panic(TEE_ERROR_BAD_STATE); 1262512cbf1dSJens Wiklander } 1263512cbf1dSJens Wiklander 1264512cbf1dSJens Wiklander for (count = size / sizeof(uint32_t); count; count--) { 1265512cbf1dSJens Wiklander TEE_MemMove(&proc, attr, sizeof(uint32_t)); 1266512cbf1dSJens Wiklander attr += sizeof(uint32_t); 1267512cbf1dSJens Wiklander 1268512cbf1dSJens Wiklander if (proc == proc_id) 1269512cbf1dSJens Wiklander return true; 1270512cbf1dSJens Wiklander } 1271512cbf1dSJens Wiklander 1272512cbf1dSJens Wiklander DMSG("can't find %s in allowed list", id2str_proc(proc_id)); 1273512cbf1dSJens Wiklander return false; 1274512cbf1dSJens Wiklander } 1275512cbf1dSJens Wiklander 1276512cbf1dSJens Wiklander static enum pkcs11_attr_id func_to_attr(enum processing_func func) 1277512cbf1dSJens Wiklander { 1278512cbf1dSJens Wiklander switch (func) { 1279512cbf1dSJens Wiklander case PKCS11_FUNCTION_ENCRYPT: 1280512cbf1dSJens Wiklander return PKCS11_CKA_ENCRYPT; 1281512cbf1dSJens Wiklander case PKCS11_FUNCTION_DECRYPT: 1282512cbf1dSJens Wiklander return PKCS11_CKA_DECRYPT; 1283512cbf1dSJens Wiklander case PKCS11_FUNCTION_SIGN: 1284512cbf1dSJens Wiklander return PKCS11_CKA_SIGN; 1285512cbf1dSJens Wiklander case PKCS11_FUNCTION_VERIFY: 1286512cbf1dSJens Wiklander return PKCS11_CKA_VERIFY; 1287512cbf1dSJens Wiklander case PKCS11_FUNCTION_WRAP: 1288512cbf1dSJens Wiklander return PKCS11_CKA_WRAP; 1289512cbf1dSJens Wiklander case PKCS11_FUNCTION_UNWRAP: 1290512cbf1dSJens Wiklander return PKCS11_CKA_UNWRAP; 1291512cbf1dSJens Wiklander case PKCS11_FUNCTION_DERIVE: 1292512cbf1dSJens Wiklander return PKCS11_CKA_DERIVE; 1293512cbf1dSJens Wiklander default: 1294512cbf1dSJens Wiklander return PKCS11_CKA_UNDEFINED_ID; 1295512cbf1dSJens Wiklander } 1296512cbf1dSJens Wiklander } 1297512cbf1dSJens Wiklander 1298512cbf1dSJens Wiklander enum pkcs11_rc 1299512cbf1dSJens Wiklander check_parent_attrs_against_processing(enum pkcs11_mechanism_id proc_id, 1300512cbf1dSJens Wiklander enum processing_func function, 1301512cbf1dSJens Wiklander struct obj_attrs *head) 1302512cbf1dSJens Wiklander { 1303512cbf1dSJens Wiklander enum pkcs11_class_id key_class = get_class(head); 1304512cbf1dSJens Wiklander enum pkcs11_key_type key_type = get_key_type(head); 1305512cbf1dSJens Wiklander enum pkcs11_attr_id attr = func_to_attr(function); 1306512cbf1dSJens Wiklander 1307512cbf1dSJens Wiklander if (!get_bool(head, attr)) { 1308512cbf1dSJens Wiklander DMSG("%s not permitted", id2str_attr(attr)); 1309512cbf1dSJens Wiklander return PKCS11_CKR_KEY_FUNCTION_NOT_PERMITTED; 1310512cbf1dSJens Wiklander } 1311512cbf1dSJens Wiklander 1312512cbf1dSJens Wiklander /* Check processing complies with parent key family */ 1313512cbf1dSJens Wiklander switch (proc_id) { 1314512cbf1dSJens Wiklander case PKCS11_CKM_AES_ECB: 1315512cbf1dSJens Wiklander case PKCS11_CKM_AES_CBC: 1316512cbf1dSJens Wiklander case PKCS11_CKM_AES_CBC_PAD: 1317512cbf1dSJens Wiklander case PKCS11_CKM_AES_CTS: 1318512cbf1dSJens Wiklander case PKCS11_CKM_AES_CTR: 1319512cbf1dSJens Wiklander if (key_class == PKCS11_CKO_SECRET_KEY && 1320512cbf1dSJens Wiklander key_type == PKCS11_CKK_AES) 1321512cbf1dSJens Wiklander break; 1322512cbf1dSJens Wiklander 1323512cbf1dSJens Wiklander DMSG("%s invalid key %s/%s", id2str_proc(proc_id), 1324512cbf1dSJens Wiklander id2str_class(key_class), id2str_key_type(key_type)); 1325512cbf1dSJens Wiklander 1326512cbf1dSJens Wiklander return PKCS11_CKR_KEY_FUNCTION_NOT_PERMITTED; 1327512cbf1dSJens Wiklander 1328c3033708SRuchika Gupta case PKCS11_CKM_AES_ECB_ENCRYPT_DATA: 1329c3033708SRuchika Gupta case PKCS11_CKM_AES_CBC_ENCRYPT_DATA: 1330c3033708SRuchika Gupta if (key_class != PKCS11_CKO_SECRET_KEY && 1331c3033708SRuchika Gupta key_type != PKCS11_CKK_AES) 1332c3033708SRuchika Gupta return PKCS11_CKR_KEY_FUNCTION_NOT_PERMITTED; 1333c3033708SRuchika Gupta 1334c3033708SRuchika Gupta if (get_bool(head, PKCS11_CKA_ENCRYPT)) { 1335c3033708SRuchika Gupta /* 1336c3033708SRuchika Gupta * Intentionally refuse to proceed despite 1337c3033708SRuchika Gupta * PKCS#11 specifications v2.40 and v3.0 not expecting 1338c3033708SRuchika Gupta * this behavior to avoid potential security issue 1339c3033708SRuchika Gupta * where keys derived by these mechanisms can be 1340c3033708SRuchika Gupta * revealed by doing data encryption using parent key. 1341c3033708SRuchika Gupta */ 1342c3033708SRuchika Gupta return PKCS11_CKR_FUNCTION_FAILED; 1343c3033708SRuchika Gupta } 1344c3033708SRuchika Gupta 1345c3033708SRuchika Gupta break; 1346689f4e5bSRuchika Gupta case PKCS11_CKM_MD5_HMAC: 1347689f4e5bSRuchika Gupta case PKCS11_CKM_SHA_1_HMAC: 1348689f4e5bSRuchika Gupta case PKCS11_CKM_SHA224_HMAC: 1349689f4e5bSRuchika Gupta case PKCS11_CKM_SHA256_HMAC: 1350689f4e5bSRuchika Gupta case PKCS11_CKM_SHA384_HMAC: 1351689f4e5bSRuchika Gupta case PKCS11_CKM_SHA512_HMAC: 1352689f4e5bSRuchika Gupta if (key_class != PKCS11_CKO_SECRET_KEY) 1353689f4e5bSRuchika Gupta return PKCS11_CKR_KEY_FUNCTION_NOT_PERMITTED; 1354689f4e5bSRuchika Gupta 1355689f4e5bSRuchika Gupta if (key_type == PKCS11_CKK_GENERIC_SECRET) 1356689f4e5bSRuchika Gupta break; 1357689f4e5bSRuchika Gupta 1358689f4e5bSRuchika Gupta switch (proc_id) { 1359689f4e5bSRuchika Gupta case PKCS11_CKM_MD5_HMAC: 1360689f4e5bSRuchika Gupta if (key_type == PKCS11_CKK_MD5_HMAC) 1361689f4e5bSRuchika Gupta break; 1362689f4e5bSRuchika Gupta return PKCS11_CKR_KEY_FUNCTION_NOT_PERMITTED; 1363689f4e5bSRuchika Gupta case PKCS11_CKM_SHA_1_HMAC: 1364689f4e5bSRuchika Gupta if (key_type == PKCS11_CKK_SHA_1_HMAC) 1365689f4e5bSRuchika Gupta break; 1366689f4e5bSRuchika Gupta return PKCS11_CKR_KEY_FUNCTION_NOT_PERMITTED; 1367689f4e5bSRuchika Gupta case PKCS11_CKM_SHA224_HMAC: 1368689f4e5bSRuchika Gupta if (key_type == PKCS11_CKK_SHA224_HMAC) 1369689f4e5bSRuchika Gupta break; 1370689f4e5bSRuchika Gupta return PKCS11_CKR_KEY_FUNCTION_NOT_PERMITTED; 1371689f4e5bSRuchika Gupta case PKCS11_CKM_SHA256_HMAC: 1372689f4e5bSRuchika Gupta if (key_type == PKCS11_CKK_SHA256_HMAC) 1373689f4e5bSRuchika Gupta break; 1374689f4e5bSRuchika Gupta return PKCS11_CKR_KEY_FUNCTION_NOT_PERMITTED; 1375689f4e5bSRuchika Gupta case PKCS11_CKM_SHA384_HMAC: 1376689f4e5bSRuchika Gupta if (key_type == PKCS11_CKK_SHA384_HMAC) 1377689f4e5bSRuchika Gupta break; 1378689f4e5bSRuchika Gupta return PKCS11_CKR_KEY_FUNCTION_NOT_PERMITTED; 1379689f4e5bSRuchika Gupta case PKCS11_CKM_SHA512_HMAC: 1380689f4e5bSRuchika Gupta if (key_type == PKCS11_CKK_SHA512_HMAC) 1381689f4e5bSRuchika Gupta break; 1382689f4e5bSRuchika Gupta return PKCS11_CKR_KEY_FUNCTION_NOT_PERMITTED; 1383689f4e5bSRuchika Gupta default: 1384689f4e5bSRuchika Gupta return PKCS11_CKR_KEY_FUNCTION_NOT_PERMITTED; 1385689f4e5bSRuchika Gupta } 1386689f4e5bSRuchika Gupta break; 1387689f4e5bSRuchika Gupta 1388512cbf1dSJens Wiklander default: 1389512cbf1dSJens Wiklander DMSG("Invalid processing %#"PRIx32"/%s", proc_id, 1390512cbf1dSJens Wiklander id2str_proc(proc_id)); 1391512cbf1dSJens Wiklander 1392512cbf1dSJens Wiklander return PKCS11_CKR_MECHANISM_INVALID; 1393512cbf1dSJens Wiklander } 1394512cbf1dSJens Wiklander 1395512cbf1dSJens Wiklander if (!parent_key_complies_allowed_processings(proc_id, head)) { 1396512cbf1dSJens Wiklander DMSG("Allowed mechanism failed"); 1397512cbf1dSJens Wiklander return PKCS11_CKR_KEY_FUNCTION_NOT_PERMITTED; 1398512cbf1dSJens Wiklander } 1399512cbf1dSJens Wiklander 1400512cbf1dSJens Wiklander return PKCS11_CKR_OK; 1401512cbf1dSJens Wiklander } 1402783c1515SRuchika Gupta 1403783c1515SRuchika Gupta bool attribute_is_exportable(struct pkcs11_attribute_head *req_attr, 1404783c1515SRuchika Gupta struct pkcs11_object *obj) 1405783c1515SRuchika Gupta { 1406783c1515SRuchika Gupta uint8_t boolval = 0; 1407783c1515SRuchika Gupta uint32_t boolsize = 0; 1408783c1515SRuchika Gupta enum pkcs11_rc rc = PKCS11_CKR_GENERAL_ERROR; 1409783c1515SRuchika Gupta enum pkcs11_class_id key_class = get_class(obj->attributes); 1410783c1515SRuchika Gupta 1411783c1515SRuchika Gupta if (key_class != PKCS11_CKO_SECRET_KEY && 1412783c1515SRuchika Gupta key_class != PKCS11_CKO_PRIVATE_KEY) 1413783c1515SRuchika Gupta return true; 1414783c1515SRuchika Gupta 1415783c1515SRuchika Gupta switch (req_attr->id) { 1416783c1515SRuchika Gupta case PKCS11_CKA_PRIVATE_EXPONENT: 1417783c1515SRuchika Gupta case PKCS11_CKA_PRIME_1: 1418783c1515SRuchika Gupta case PKCS11_CKA_PRIME_2: 1419783c1515SRuchika Gupta case PKCS11_CKA_EXPONENT_1: 1420783c1515SRuchika Gupta case PKCS11_CKA_EXPONENT_2: 1421783c1515SRuchika Gupta case PKCS11_CKA_COEFFICIENT: 1422783c1515SRuchika Gupta case PKCS11_CKA_VALUE: 1423783c1515SRuchika Gupta boolsize = sizeof(boolval); 1424783c1515SRuchika Gupta rc = get_attribute(obj->attributes, PKCS11_CKA_EXTRACTABLE, 1425783c1515SRuchika Gupta &boolval, &boolsize); 1426783c1515SRuchika Gupta if (rc || boolval == PKCS11_FALSE) 1427783c1515SRuchika Gupta return false; 1428783c1515SRuchika Gupta 1429783c1515SRuchika Gupta boolsize = sizeof(boolval); 1430783c1515SRuchika Gupta rc = get_attribute(obj->attributes, PKCS11_CKA_SENSITIVE, 1431783c1515SRuchika Gupta &boolval, &boolsize); 1432783c1515SRuchika Gupta if (rc || boolval == PKCS11_TRUE) 1433783c1515SRuchika Gupta return false; 1434783c1515SRuchika Gupta break; 1435783c1515SRuchika Gupta default: 1436783c1515SRuchika Gupta break; 1437783c1515SRuchika Gupta } 1438783c1515SRuchika Gupta 1439783c1515SRuchika Gupta return true; 1440783c1515SRuchika Gupta } 14412d25a9bcSRuchika Gupta 14422d25a9bcSRuchika Gupta static bool attr_is_modifiable_any_key(struct pkcs11_attribute_head *attr) 14432d25a9bcSRuchika Gupta { 14442d25a9bcSRuchika Gupta switch (attr->id) { 14452d25a9bcSRuchika Gupta case PKCS11_CKA_ID: 14462d25a9bcSRuchika Gupta case PKCS11_CKA_START_DATE: 14472d25a9bcSRuchika Gupta case PKCS11_CKA_END_DATE: 14482d25a9bcSRuchika Gupta case PKCS11_CKA_DERIVE: 14492d25a9bcSRuchika Gupta return true; 14502d25a9bcSRuchika Gupta default: 14512d25a9bcSRuchika Gupta return false; 14522d25a9bcSRuchika Gupta } 14532d25a9bcSRuchika Gupta } 14542d25a9bcSRuchika Gupta 14552d25a9bcSRuchika Gupta static bool attr_is_modifiable_secret_key(struct pkcs11_attribute_head *attr, 14562d25a9bcSRuchika Gupta struct pkcs11_session *session, 14572d25a9bcSRuchika Gupta struct pkcs11_object *obj) 14582d25a9bcSRuchika Gupta { 14592d25a9bcSRuchika Gupta switch (attr->id) { 14602d25a9bcSRuchika Gupta case PKCS11_CKA_ENCRYPT: 14612d25a9bcSRuchika Gupta case PKCS11_CKA_DECRYPT: 14622d25a9bcSRuchika Gupta case PKCS11_CKA_SIGN: 14632d25a9bcSRuchika Gupta case PKCS11_CKA_VERIFY: 14642d25a9bcSRuchika Gupta case PKCS11_CKA_WRAP: 14652d25a9bcSRuchika Gupta case PKCS11_CKA_UNWRAP: 14662d25a9bcSRuchika Gupta return true; 14672d25a9bcSRuchika Gupta /* Can't be modified once set to CK_FALSE - 12 in Table 10 */ 14682d25a9bcSRuchika Gupta case PKCS11_CKA_EXTRACTABLE: 14692d25a9bcSRuchika Gupta return get_bool(obj->attributes, attr->id); 14702d25a9bcSRuchika Gupta /* Can't be modified once set to CK_TRUE - 11 in Table 10 */ 14712d25a9bcSRuchika Gupta case PKCS11_CKA_SENSITIVE: 14722d25a9bcSRuchika Gupta case PKCS11_CKA_WRAP_WITH_TRUSTED: 14732d25a9bcSRuchika Gupta return !get_bool(obj->attributes, attr->id); 14742d25a9bcSRuchika Gupta /* Change in CKA_TRUSTED can only be done by SO */ 14752d25a9bcSRuchika Gupta case PKCS11_CKA_TRUSTED: 14762d25a9bcSRuchika Gupta return pkcs11_session_is_so(session); 14772d25a9bcSRuchika Gupta case PKCS11_CKA_NEVER_EXTRACTABLE: 14782d25a9bcSRuchika Gupta case PKCS11_CKA_ALWAYS_SENSITIVE: 14792d25a9bcSRuchika Gupta return false; 14802d25a9bcSRuchika Gupta default: 14812d25a9bcSRuchika Gupta return false; 14822d25a9bcSRuchika Gupta } 14832d25a9bcSRuchika Gupta } 14842d25a9bcSRuchika Gupta 14852d25a9bcSRuchika Gupta static bool attr_is_modifiable_public_key(struct pkcs11_attribute_head *attr, 14862d25a9bcSRuchika Gupta struct pkcs11_session *session, 14872d25a9bcSRuchika Gupta struct pkcs11_object *obj __unused) 14882d25a9bcSRuchika Gupta { 14892d25a9bcSRuchika Gupta switch (attr->id) { 14902d25a9bcSRuchika Gupta case PKCS11_CKA_SUBJECT: 14912d25a9bcSRuchika Gupta case PKCS11_CKA_ENCRYPT: 14922d25a9bcSRuchika Gupta case PKCS11_CKA_VERIFY: 14932d25a9bcSRuchika Gupta case PKCS11_CKA_VERIFY_RECOVER: 14942d25a9bcSRuchika Gupta case PKCS11_CKA_WRAP: 14952d25a9bcSRuchika Gupta return true; 14962d25a9bcSRuchika Gupta case PKCS11_CKA_TRUSTED: 14972d25a9bcSRuchika Gupta /* Change in CKA_TRUSTED can only be done by SO */ 14982d25a9bcSRuchika Gupta return pkcs11_session_is_so(session); 14992d25a9bcSRuchika Gupta default: 15002d25a9bcSRuchika Gupta return false; 15012d25a9bcSRuchika Gupta } 15022d25a9bcSRuchika Gupta } 15032d25a9bcSRuchika Gupta 15042d25a9bcSRuchika Gupta static bool attr_is_modifiable_private_key(struct pkcs11_attribute_head *attr, 15052d25a9bcSRuchika Gupta struct pkcs11_session *sess __unused, 15062d25a9bcSRuchika Gupta struct pkcs11_object *obj) 15072d25a9bcSRuchika Gupta { 15082d25a9bcSRuchika Gupta switch (attr->id) { 15092d25a9bcSRuchika Gupta case PKCS11_CKA_SUBJECT: 15102d25a9bcSRuchika Gupta case PKCS11_CKA_DECRYPT: 15112d25a9bcSRuchika Gupta case PKCS11_CKA_SIGN: 15122d25a9bcSRuchika Gupta case PKCS11_CKA_SIGN_RECOVER: 15132d25a9bcSRuchika Gupta case PKCS11_CKA_UNWRAP: 15142d25a9bcSRuchika Gupta /* 15152d25a9bcSRuchika Gupta * TBD: Revisit if we don't support PKCS11_CKA_PUBLIC_KEY_INFO 15162d25a9bcSRuchika Gupta * Specification mentions that if this attribute is 15172d25a9bcSRuchika Gupta * supplied as part of a template for C_CreateObject, C_CopyObject or 15182d25a9bcSRuchika Gupta * C_SetAttributeValue for a private key, the token MUST verify 15192d25a9bcSRuchika Gupta * correspondence between the private key data and the public key data 15202d25a9bcSRuchika Gupta * as supplied in CKA_PUBLIC_KEY_INFO. This needs to be 15212d25a9bcSRuchika Gupta * taken care of when this object type will be implemented 15222d25a9bcSRuchika Gupta */ 15232d25a9bcSRuchika Gupta case PKCS11_CKA_PUBLIC_KEY_INFO: 15242d25a9bcSRuchika Gupta return true; 15252d25a9bcSRuchika Gupta /* Can't be modified once set to CK_FALSE - 12 in Table 10 */ 15262d25a9bcSRuchika Gupta case PKCS11_CKA_EXTRACTABLE: 15272d25a9bcSRuchika Gupta return get_bool(obj->attributes, attr->id); 15282d25a9bcSRuchika Gupta /* Can't be modified once set to CK_TRUE - 11 in Table 10 */ 15292d25a9bcSRuchika Gupta case PKCS11_CKA_SENSITIVE: 15302d25a9bcSRuchika Gupta case PKCS11_CKA_WRAP_WITH_TRUSTED: 15312d25a9bcSRuchika Gupta return !get_bool(obj->attributes, attr->id); 15322d25a9bcSRuchika Gupta case PKCS11_CKA_NEVER_EXTRACTABLE: 15332d25a9bcSRuchika Gupta case PKCS11_CKA_ALWAYS_SENSITIVE: 15342d25a9bcSRuchika Gupta return false; 15352d25a9bcSRuchika Gupta default: 15362d25a9bcSRuchika Gupta return false; 15372d25a9bcSRuchika Gupta } 15382d25a9bcSRuchika Gupta } 15392d25a9bcSRuchika Gupta 15402d25a9bcSRuchika Gupta static bool attribute_is_modifiable(struct pkcs11_session *session, 15412d25a9bcSRuchika Gupta struct pkcs11_attribute_head *req_attr, 15422d25a9bcSRuchika Gupta struct pkcs11_object *obj, 15432d25a9bcSRuchika Gupta enum pkcs11_class_id class, 15442d25a9bcSRuchika Gupta enum processing_func function) 15452d25a9bcSRuchika Gupta { 15462d25a9bcSRuchika Gupta /* Check modifiable attributes common to any object */ 15472d25a9bcSRuchika Gupta switch (req_attr->id) { 15482d25a9bcSRuchika Gupta case PKCS11_CKA_LABEL: 15492d25a9bcSRuchika Gupta return true; 15502d25a9bcSRuchika Gupta case PKCS11_CKA_TOKEN: 15512d25a9bcSRuchika Gupta case PKCS11_CKA_MODIFIABLE: 15522d25a9bcSRuchika Gupta case PKCS11_CKA_DESTROYABLE: 15532d25a9bcSRuchika Gupta case PKCS11_CKA_PRIVATE: 15542d25a9bcSRuchika Gupta return function == PKCS11_FUNCTION_COPY; 15552d25a9bcSRuchika Gupta case PKCS11_CKA_COPYABLE: 15562d25a9bcSRuchika Gupta /* 15572d25a9bcSRuchika Gupta * Specification mentions that if the attribute value is false 15582d25a9bcSRuchika Gupta * it can't be set to true. Reading this we assume that it 15592d25a9bcSRuchika Gupta * should be possible to modify this attribute even though this 15602d25a9bcSRuchika Gupta * is not marked as modifiable in Table 10 if done in right 15612d25a9bcSRuchika Gupta * direction i.e from TRUE -> FALSE. 15622d25a9bcSRuchika Gupta */ 15632d25a9bcSRuchika Gupta return get_bool(obj->attributes, req_attr->id); 15642d25a9bcSRuchika Gupta default: 15652d25a9bcSRuchika Gupta break; 15662d25a9bcSRuchika Gupta } 15672d25a9bcSRuchika Gupta 15682d25a9bcSRuchika Gupta /* Attribute checking based on class type */ 15692d25a9bcSRuchika Gupta switch (class) { 15702d25a9bcSRuchika Gupta case PKCS11_CKO_SECRET_KEY: 15712d25a9bcSRuchika Gupta case PKCS11_CKO_PUBLIC_KEY: 15722d25a9bcSRuchika Gupta case PKCS11_CKO_PRIVATE_KEY: 15732d25a9bcSRuchika Gupta if (attr_is_modifiable_any_key(req_attr)) 15742d25a9bcSRuchika Gupta return true; 15752d25a9bcSRuchika Gupta if (class == PKCS11_CKO_SECRET_KEY && 15762d25a9bcSRuchika Gupta attr_is_modifiable_secret_key(req_attr, session, obj)) 15772d25a9bcSRuchika Gupta return true; 15782d25a9bcSRuchika Gupta if (class == PKCS11_CKO_PUBLIC_KEY && 15792d25a9bcSRuchika Gupta attr_is_modifiable_public_key(req_attr, session, obj)) 15802d25a9bcSRuchika Gupta return true; 15812d25a9bcSRuchika Gupta if (class == PKCS11_CKO_PRIVATE_KEY && 15822d25a9bcSRuchika Gupta attr_is_modifiable_private_key(req_attr, session, obj)) 15832d25a9bcSRuchika Gupta return true; 15842d25a9bcSRuchika Gupta break; 15852d25a9bcSRuchika Gupta case PKCS11_CKO_DATA: 15862d25a9bcSRuchika Gupta /* None of the data object attributes are modifiable */ 15872d25a9bcSRuchika Gupta return false; 15882d25a9bcSRuchika Gupta default: 15892d25a9bcSRuchika Gupta break; 15902d25a9bcSRuchika Gupta } 15912d25a9bcSRuchika Gupta 15922d25a9bcSRuchika Gupta return false; 15932d25a9bcSRuchika Gupta } 15942d25a9bcSRuchika Gupta 15952d25a9bcSRuchika Gupta enum pkcs11_rc check_attrs_against_modification(struct pkcs11_session *session, 15962d25a9bcSRuchika Gupta struct obj_attrs *head, 15972d25a9bcSRuchika Gupta struct pkcs11_object *obj, 15982d25a9bcSRuchika Gupta enum processing_func function) 15992d25a9bcSRuchika Gupta { 16002d25a9bcSRuchika Gupta enum pkcs11_class_id class = PKCS11_CKO_UNDEFINED_ID; 16012d25a9bcSRuchika Gupta char *cur = NULL; 16022d25a9bcSRuchika Gupta char *end = NULL; 16032d25a9bcSRuchika Gupta size_t len = 0; 16042d25a9bcSRuchika Gupta 16052d25a9bcSRuchika Gupta class = get_class(obj->attributes); 16062d25a9bcSRuchika Gupta 16072d25a9bcSRuchika Gupta cur = (char *)head + sizeof(struct obj_attrs); 16082d25a9bcSRuchika Gupta end = cur + head->attrs_size; 16092d25a9bcSRuchika Gupta 16102d25a9bcSRuchika Gupta for (; cur < end; cur += len) { 16112d25a9bcSRuchika Gupta /* Structure aligned copy of the pkcs11_ref in the object */ 16122d25a9bcSRuchika Gupta struct pkcs11_attribute_head cli_ref = { }; 16132d25a9bcSRuchika Gupta 16142d25a9bcSRuchika Gupta TEE_MemMove(&cli_ref, cur, sizeof(cli_ref)); 16152d25a9bcSRuchika Gupta len = sizeof(cli_ref) + cli_ref.size; 16162d25a9bcSRuchika Gupta 16172d25a9bcSRuchika Gupta /* 16182d25a9bcSRuchika Gupta * Check 1 - Check if attribute belongs to the object 16192d25a9bcSRuchika Gupta * The obj->attributes has all the attributes in 16202d25a9bcSRuchika Gupta * it which are allowed for an object. 16212d25a9bcSRuchika Gupta */ 16222d25a9bcSRuchika Gupta if (get_attribute_ptr(obj->attributes, cli_ref.id, NULL, 16232d25a9bcSRuchika Gupta NULL) == PKCS11_RV_NOT_FOUND) 16242d25a9bcSRuchika Gupta return PKCS11_CKR_ATTRIBUTE_TYPE_INVALID; 16252d25a9bcSRuchika Gupta 16262d25a9bcSRuchika Gupta /* Check 2 - Is attribute modifiable */ 16272d25a9bcSRuchika Gupta if (!attribute_is_modifiable(session, &cli_ref, obj, class, 16282d25a9bcSRuchika Gupta function)) 16292d25a9bcSRuchika Gupta return PKCS11_CKR_ATTRIBUTE_READ_ONLY; 16302d25a9bcSRuchika Gupta 16312d25a9bcSRuchika Gupta /* 16322d25a9bcSRuchika Gupta * Checks for modification in PKCS11_CKA_TOKEN and 16332d25a9bcSRuchika Gupta * PKCS11_CKA_PRIVATE are required for PKCS11_FUNCTION_COPY 16342d25a9bcSRuchika Gupta * only, so skip them for PKCS11_FUNCTION_MODIFY. 16352d25a9bcSRuchika Gupta */ 16362d25a9bcSRuchika Gupta if (function == PKCS11_FUNCTION_MODIFY) 16372d25a9bcSRuchika Gupta continue; 16382d25a9bcSRuchika Gupta 16392d25a9bcSRuchika Gupta /* 16402d25a9bcSRuchika Gupta * An attempt to copy an object to a token will fail for 16412d25a9bcSRuchika Gupta * RO session 16422d25a9bcSRuchika Gupta */ 16432d25a9bcSRuchika Gupta if (cli_ref.id == PKCS11_CKA_TOKEN && 16442d25a9bcSRuchika Gupta get_bool(head, PKCS11_CKA_TOKEN)) { 16452d25a9bcSRuchika Gupta if (!pkcs11_session_is_read_write(session)) { 16462d25a9bcSRuchika Gupta DMSG("Can't copy to token in a RO session"); 16472d25a9bcSRuchika Gupta return PKCS11_CKR_SESSION_READ_ONLY; 16482d25a9bcSRuchika Gupta } 16492d25a9bcSRuchika Gupta } 16502d25a9bcSRuchika Gupta 16512d25a9bcSRuchika Gupta if (cli_ref.id == PKCS11_CKA_PRIVATE) { 16522d25a9bcSRuchika Gupta bool parent_priv = 16532d25a9bcSRuchika Gupta get_bool(obj->attributes, cli_ref.id); 16542d25a9bcSRuchika Gupta bool obj_priv = get_bool(head, cli_ref.id); 16552d25a9bcSRuchika Gupta 16562d25a9bcSRuchika Gupta /* 16572d25a9bcSRuchika Gupta * If PKCS11_CKA_PRIVATE is being set to TRUE from 16582d25a9bcSRuchika Gupta * FALSE, user has to be logged in 16592d25a9bcSRuchika Gupta */ 16602d25a9bcSRuchika Gupta if (!parent_priv && obj_priv) { 16612d25a9bcSRuchika Gupta if ((pkcs11_session_is_public(session) || 16622d25a9bcSRuchika Gupta pkcs11_session_is_so(session))) 16632d25a9bcSRuchika Gupta return PKCS11_CKR_USER_NOT_LOGGED_IN; 16642d25a9bcSRuchika Gupta } 1665df017b2bSRuchika Gupta 1666df017b2bSRuchika Gupta /* 1667df017b2bSRuchika Gupta * Restriction added - Even for Copy, do not allow 1668df017b2bSRuchika Gupta * modification of CKA_PRIVATE from TRUE to FALSE 1669df017b2bSRuchika Gupta */ 1670df017b2bSRuchika Gupta if (parent_priv && !obj_priv) 1671df017b2bSRuchika Gupta return PKCS11_CKR_TEMPLATE_INCONSISTENT; 16722d25a9bcSRuchika Gupta } 16732d25a9bcSRuchika Gupta } 16742d25a9bcSRuchika Gupta 16752d25a9bcSRuchika Gupta return PKCS11_CKR_OK; 16762d25a9bcSRuchika Gupta } 16778c499324SRuchika Gupta 16788c499324SRuchika Gupta static enum pkcs11_rc set_secret_key_data(struct obj_attrs **head, void *data, 16798c499324SRuchika Gupta size_t key_size) 16808c499324SRuchika Gupta { 16818c499324SRuchika Gupta uint32_t size = sizeof(uint32_t); 16828c499324SRuchika Gupta uint32_t key_length = 0; 16838c499324SRuchika Gupta enum pkcs11_rc rc = PKCS11_CKR_GENERAL_ERROR; 16848c499324SRuchika Gupta 16858c499324SRuchika Gupta /* Get key size if present in template */ 16868c499324SRuchika Gupta rc = get_attribute(*head, PKCS11_CKA_VALUE_LEN, &key_length, &size); 16878c499324SRuchika Gupta if (rc && rc != PKCS11_RV_NOT_FOUND) 16888c499324SRuchika Gupta return rc; 16898c499324SRuchika Gupta 16908c499324SRuchika Gupta if (key_length) { 16918c499324SRuchika Gupta if (key_size < key_length) 16928c499324SRuchika Gupta return PKCS11_CKR_DATA_LEN_RANGE; 16938c499324SRuchika Gupta } else { 16948c499324SRuchika Gupta key_length = key_size; 16958c499324SRuchika Gupta rc = set_attribute(head, PKCS11_CKA_VALUE_LEN, &key_length, 16968c499324SRuchika Gupta sizeof(uint32_t)); 16978c499324SRuchika Gupta if (rc) 16988c499324SRuchika Gupta return rc; 16998c499324SRuchika Gupta } 17008c499324SRuchika Gupta 17018c499324SRuchika Gupta /* Now we can check the VALUE_LEN field */ 17028c499324SRuchika Gupta rc = check_created_attrs(*head, NULL); 17038c499324SRuchika Gupta if (rc) 17048c499324SRuchika Gupta return rc; 17058c499324SRuchika Gupta 17068c499324SRuchika Gupta /* Remove the default empty value attribute if found */ 17078c499324SRuchika Gupta rc = remove_empty_attribute(head, PKCS11_CKA_VALUE); 17088c499324SRuchika Gupta if (rc != PKCS11_CKR_OK && rc != PKCS11_RV_NOT_FOUND) 17098c499324SRuchika Gupta return PKCS11_CKR_GENERAL_ERROR; 17108c499324SRuchika Gupta 17118c499324SRuchika Gupta return add_attribute(head, PKCS11_CKA_VALUE, data, key_length); 17128c499324SRuchika Gupta } 17138c499324SRuchika Gupta 17148c499324SRuchika Gupta enum pkcs11_rc set_key_data(struct obj_attrs **head, void *data, 17158c499324SRuchika Gupta size_t key_size) 17168c499324SRuchika Gupta { 17178c499324SRuchika Gupta switch (get_class(*head)) { 17188c499324SRuchika Gupta case PKCS11_CKO_SECRET_KEY: 17198c499324SRuchika Gupta return set_secret_key_data(head, data, key_size); 17208c499324SRuchika Gupta default: 17218c499324SRuchika Gupta return PKCS11_CKR_GENERAL_ERROR; 17228c499324SRuchika Gupta } 17238c499324SRuchika Gupta } 1724