xref: /optee_os/ta/pkcs11/src/pkcs11_attributes.c (revision 196bcd93180e40b4324774244936d95d9760fd1b)
163f89caaSJens Wiklander // SPDX-License-Identifier: BSD-2-Clause
263f89caaSJens Wiklander /*
363f89caaSJens Wiklander  * Copyright (c) 2017-2020, Linaro Limited
463f89caaSJens Wiklander  */
563f89caaSJens Wiklander 
663f89caaSJens Wiklander #include <assert.h>
763f89caaSJens Wiklander #include <inttypes.h>
863f89caaSJens Wiklander #include <pkcs11_ta.h>
963f89caaSJens Wiklander #include <stdlib.h>
1063f89caaSJens Wiklander #include <string_ext.h>
1163f89caaSJens Wiklander #include <tee_internal_api_extensions.h>
1263f89caaSJens Wiklander #include <tee_internal_api.h>
136a760c9eSEtienne Carriere #include <trace.h>
1463f89caaSJens Wiklander #include <util.h>
1563f89caaSJens Wiklander 
1663f89caaSJens Wiklander #include "attributes.h"
1763f89caaSJens Wiklander #include "handle.h"
1863f89caaSJens Wiklander #include "pkcs11_attributes.h"
1963f89caaSJens Wiklander #include "pkcs11_helpers.h"
2063f89caaSJens Wiklander #include "pkcs11_token.h"
2163f89caaSJens Wiklander #include "sanitize_object.h"
2263f89caaSJens Wiklander #include "serializer.h"
2363f89caaSJens Wiklander #include "token_capabilities.h"
2463f89caaSJens Wiklander 
2563f89caaSJens Wiklander /* Byte size of CKA_ID attribute when generated locally */
2663f89caaSJens Wiklander #define PKCS11_CKA_DEFAULT_SIZE		16
2763f89caaSJens Wiklander 
28512cbf1dSJens Wiklander static uint32_t pkcs11_func2ckfm(enum processing_func function)
29512cbf1dSJens Wiklander {
30512cbf1dSJens Wiklander 	switch (function) {
31512cbf1dSJens Wiklander 	case PKCS11_FUNCTION_DIGEST:
32512cbf1dSJens Wiklander 		return PKCS11_CKFM_DIGEST;
33512cbf1dSJens Wiklander 	case PKCS11_FUNCTION_GENERATE:
34512cbf1dSJens Wiklander 		return PKCS11_CKFM_GENERATE;
35512cbf1dSJens Wiklander 	case PKCS11_FUNCTION_GENERATE_PAIR:
36512cbf1dSJens Wiklander 		return PKCS11_CKFM_GENERATE_KEY_PAIR;
37512cbf1dSJens Wiklander 	case PKCS11_FUNCTION_DERIVE:
38512cbf1dSJens Wiklander 		return PKCS11_CKFM_DERIVE;
39512cbf1dSJens Wiklander 	case PKCS11_FUNCTION_WRAP:
40512cbf1dSJens Wiklander 		return PKCS11_CKFM_WRAP;
41512cbf1dSJens Wiklander 	case PKCS11_FUNCTION_UNWRAP:
42512cbf1dSJens Wiklander 		return PKCS11_CKFM_UNWRAP;
43512cbf1dSJens Wiklander 	case PKCS11_FUNCTION_ENCRYPT:
44512cbf1dSJens Wiklander 		return PKCS11_CKFM_ENCRYPT;
45512cbf1dSJens Wiklander 	case PKCS11_FUNCTION_DECRYPT:
46512cbf1dSJens Wiklander 		return PKCS11_CKFM_DECRYPT;
47512cbf1dSJens Wiklander 	case PKCS11_FUNCTION_SIGN:
48512cbf1dSJens Wiklander 		return PKCS11_CKFM_SIGN;
49512cbf1dSJens Wiklander 	case PKCS11_FUNCTION_VERIFY:
50512cbf1dSJens Wiklander 		return PKCS11_CKFM_VERIFY;
51512cbf1dSJens Wiklander 	case PKCS11_FUNCTION_SIGN_RECOVER:
52512cbf1dSJens Wiklander 		return PKCS11_CKFM_SIGN_RECOVER;
53512cbf1dSJens Wiklander 	case PKCS11_FUNCTION_VERIFY_RECOVER:
54512cbf1dSJens Wiklander 		return PKCS11_CKFM_VERIFY_RECOVER;
55512cbf1dSJens Wiklander 	default:
56512cbf1dSJens Wiklander 		return 0;
57512cbf1dSJens Wiklander 	}
58512cbf1dSJens Wiklander }
59512cbf1dSJens Wiklander 
60512cbf1dSJens Wiklander enum pkcs11_rc
61512cbf1dSJens Wiklander check_mechanism_against_processing(struct pkcs11_session *session,
62512cbf1dSJens Wiklander 				   enum pkcs11_mechanism_id mechanism_type,
63512cbf1dSJens Wiklander 				   enum processing_func function,
64512cbf1dSJens Wiklander 				   enum processing_step step)
65512cbf1dSJens Wiklander {
66512cbf1dSJens Wiklander 	bool allowed = false;
67512cbf1dSJens Wiklander 
68512cbf1dSJens Wiklander 	switch (step) {
69512cbf1dSJens Wiklander 	case PKCS11_FUNC_STEP_INIT:
70512cbf1dSJens Wiklander 		switch (function) {
71512cbf1dSJens Wiklander 		case PKCS11_FUNCTION_IMPORT:
72512cbf1dSJens Wiklander 		case PKCS11_FUNCTION_COPY:
73512cbf1dSJens Wiklander 		case PKCS11_FUNCTION_MODIFY:
74512cbf1dSJens Wiklander 		case PKCS11_FUNCTION_DESTROY:
75512cbf1dSJens Wiklander 			return PKCS11_CKR_OK;
76512cbf1dSJens Wiklander 		default:
77512cbf1dSJens Wiklander 			break;
78512cbf1dSJens Wiklander 		}
79512cbf1dSJens Wiklander 		/*
80512cbf1dSJens Wiklander 		 * Check that the returned PKCS11_CKFM_* flag from
81512cbf1dSJens Wiklander 		 * pkcs11_func2ckfm() is among the ones from
82512cbf1dSJens Wiklander 		 * mechanism_supported_flags().
83512cbf1dSJens Wiklander 		 */
84512cbf1dSJens Wiklander 		allowed = mechanism_supported_flags(mechanism_type) &
85512cbf1dSJens Wiklander 			  pkcs11_func2ckfm(function);
86512cbf1dSJens Wiklander 		break;
87512cbf1dSJens Wiklander 
88512cbf1dSJens Wiklander 	case PKCS11_FUNC_STEP_ONESHOT:
890460a039SRuchika Gupta 		if (session->processing->always_authen &&
900460a039SRuchika Gupta 		    !session->processing->relogged)
910460a039SRuchika Gupta 			return PKCS11_CKR_USER_NOT_LOGGED_IN;
920460a039SRuchika Gupta 
930460a039SRuchika Gupta 		if (session->processing->updated) {
940460a039SRuchika Gupta 			EMSG("Cannot perform one-shot on updated processing");
950460a039SRuchika Gupta 			return PKCS11_CKR_OPERATION_ACTIVE;
960460a039SRuchika Gupta 		}
970460a039SRuchika Gupta 
980460a039SRuchika Gupta 		allowed = true;
990460a039SRuchika Gupta 		break;
1000460a039SRuchika Gupta 
101512cbf1dSJens Wiklander 	case PKCS11_FUNC_STEP_UPDATE:
102512cbf1dSJens Wiklander 		if (session->processing->always_authen &&
103512cbf1dSJens Wiklander 		    !session->processing->relogged)
104512cbf1dSJens Wiklander 			return PKCS11_CKR_USER_NOT_LOGGED_IN;
105512cbf1dSJens Wiklander 
106512cbf1dSJens Wiklander 		allowed = !mechanism_is_one_shot_only(mechanism_type);
107512cbf1dSJens Wiklander 		break;
108512cbf1dSJens Wiklander 
1099e91a619SVesa Jääskeläinen 	case PKCS11_FUNC_STEP_UPDATE_KEY:
1109e91a619SVesa Jääskeläinen 		assert(function == PKCS11_FUNCTION_DIGEST);
1119e91a619SVesa Jääskeläinen 
1129e91a619SVesa Jääskeläinen 		if (session->processing->always_authen &&
1139e91a619SVesa Jääskeläinen 		    !session->processing->relogged)
1149e91a619SVesa Jääskeläinen 			return PKCS11_CKR_USER_NOT_LOGGED_IN;
1159e91a619SVesa Jääskeläinen 
1169e91a619SVesa Jääskeläinen 		allowed = true;
1179e91a619SVesa Jääskeläinen 		break;
1189e91a619SVesa Jääskeläinen 
119512cbf1dSJens Wiklander 	case PKCS11_FUNC_STEP_FINAL:
120512cbf1dSJens Wiklander 		if (session->processing->always_authen &&
121512cbf1dSJens Wiklander 		    !session->processing->relogged)
122512cbf1dSJens Wiklander 			return PKCS11_CKR_USER_NOT_LOGGED_IN;
123512cbf1dSJens Wiklander 
124512cbf1dSJens Wiklander 		return PKCS11_CKR_OK;
125512cbf1dSJens Wiklander 
126512cbf1dSJens Wiklander 	default:
127512cbf1dSJens Wiklander 		TEE_Panic(step);
128512cbf1dSJens Wiklander 		break;
129512cbf1dSJens Wiklander 	}
130512cbf1dSJens Wiklander 
131512cbf1dSJens Wiklander 	if (!allowed) {
132512cbf1dSJens Wiklander 		EMSG("Processing %#x/%s not permitted (%u/%u)",
133512cbf1dSJens Wiklander 		     (unsigned int)mechanism_type, id2str_proc(mechanism_type),
134512cbf1dSJens Wiklander 		     function, step);
135df705578SRuchika Gupta 		return PKCS11_CKR_MECHANISM_INVALID;
136512cbf1dSJens Wiklander 	}
137512cbf1dSJens Wiklander 
138512cbf1dSJens Wiklander 	return PKCS11_CKR_OK;
139512cbf1dSJens Wiklander }
140512cbf1dSJens Wiklander 
14163f89caaSJens Wiklander /*
14263f89caaSJens Wiklander  * Object default boolean attributes as per PKCS#11
14363f89caaSJens Wiklander  */
14463f89caaSJens Wiklander static uint8_t *pkcs11_object_default_boolprop(uint32_t attribute)
14563f89caaSJens Wiklander {
14663f89caaSJens Wiklander 	static const uint8_t bool_true = 1;
14763f89caaSJens Wiklander 	static const uint8_t bool_false;
14863f89caaSJens Wiklander 
14963f89caaSJens Wiklander 	switch (attribute) {
15063f89caaSJens Wiklander 	/* As per PKCS#11 default value */
15163f89caaSJens Wiklander 	case PKCS11_CKA_MODIFIABLE:
15263f89caaSJens Wiklander 	case PKCS11_CKA_COPYABLE:
15363f89caaSJens Wiklander 	case PKCS11_CKA_DESTROYABLE:
15463f89caaSJens Wiklander 		return (uint8_t *)&bool_true;
15563f89caaSJens Wiklander 	case PKCS11_CKA_TOKEN:
15663f89caaSJens Wiklander 	case PKCS11_CKA_PRIVATE:
15739fc24faSEtienne Carriere 	case PKCS11_CKA_WRAP_WITH_TRUSTED:
15839fc24faSEtienne Carriere 	case PKCS11_CKA_ALWAYS_AUTHENTICATE:
15963f89caaSJens Wiklander 	case PKCS11_CKA_SENSITIVE:
16063f89caaSJens Wiklander 		return (uint8_t *)&bool_false;
16163f89caaSJens Wiklander 	/* Token specific default value */
16263f89caaSJens Wiklander 	case PKCS11_CKA_SIGN:
16363f89caaSJens Wiklander 	case PKCS11_CKA_VERIFY:
16463f89caaSJens Wiklander 	case PKCS11_CKA_DERIVE:
16563f89caaSJens Wiklander 	case PKCS11_CKA_ENCRYPT:
16663f89caaSJens Wiklander 	case PKCS11_CKA_DECRYPT:
16763f89caaSJens Wiklander 	case PKCS11_CKA_SIGN_RECOVER:
16863f89caaSJens Wiklander 	case PKCS11_CKA_VERIFY_RECOVER:
16963f89caaSJens Wiklander 	case PKCS11_CKA_WRAP:
17063f89caaSJens Wiklander 	case PKCS11_CKA_UNWRAP:
17163f89caaSJens Wiklander 	case PKCS11_CKA_EXTRACTABLE:
17263f89caaSJens Wiklander 	case PKCS11_CKA_TRUSTED:
17363f89caaSJens Wiklander 		return (uint8_t *)&bool_false;
17463f89caaSJens Wiklander 	default:
17563f89caaSJens Wiklander 		DMSG("No default for boolprop attribute %#"PRIx32, attribute);
17663f89caaSJens Wiklander 		return NULL;
17763f89caaSJens Wiklander 	}
17863f89caaSJens Wiklander }
17963f89caaSJens Wiklander 
18063f89caaSJens Wiklander /*
18163f89caaSJens Wiklander  * Object expects several boolean attributes to be set to a default value
18263f89caaSJens Wiklander  * or to a validate client configuration value. This function append the input
18363f89caaSJens Wiklander  * attribute (id/size/value) in the serialized object.
18463f89caaSJens Wiklander  */
18563f89caaSJens Wiklander static enum pkcs11_rc pkcs11_import_object_boolprop(struct obj_attrs **out,
18663f89caaSJens Wiklander 						    struct obj_attrs *templ,
18763f89caaSJens Wiklander 						    uint32_t attribute)
18863f89caaSJens Wiklander {
18963f89caaSJens Wiklander 	enum pkcs11_rc rc = PKCS11_CKR_OK;
19063f89caaSJens Wiklander 	uint8_t bbool = 0;
19163f89caaSJens Wiklander 	uint32_t size = sizeof(uint8_t);
19263f89caaSJens Wiklander 	void *attr = NULL;
19363f89caaSJens Wiklander 
19463f89caaSJens Wiklander 	rc = get_attribute(templ, attribute, &bbool, &size);
19563f89caaSJens Wiklander 	if (rc) {
19663f89caaSJens Wiklander 		if (rc != PKCS11_RV_NOT_FOUND)
19763f89caaSJens Wiklander 			return rc;
19863f89caaSJens Wiklander 		attr = pkcs11_object_default_boolprop(attribute);
19963f89caaSJens Wiklander 		if (!attr)
20063f89caaSJens Wiklander 			return PKCS11_CKR_TEMPLATE_INCOMPLETE;
20163f89caaSJens Wiklander 	} else {
20263f89caaSJens Wiklander 		attr = &bbool;
20363f89caaSJens Wiklander 	}
20463f89caaSJens Wiklander 
20563f89caaSJens Wiklander 	/* Boolean attributes are 1byte in the ABI, no alignment issue */
20663f89caaSJens Wiklander 	return add_attribute(out, attribute, attr, sizeof(uint8_t));
20763f89caaSJens Wiklander }
20863f89caaSJens Wiklander 
20963f89caaSJens Wiklander static enum pkcs11_rc set_mandatory_boolprops(struct obj_attrs **out,
21063f89caaSJens Wiklander 					      struct obj_attrs *temp,
21163f89caaSJens Wiklander 					      uint32_t const *bp,
21263f89caaSJens Wiklander 					      size_t bp_count)
21363f89caaSJens Wiklander {
21463f89caaSJens Wiklander 	enum pkcs11_rc rc = PKCS11_CKR_OK;
21563f89caaSJens Wiklander 	size_t n = 0;
21663f89caaSJens Wiklander 
21763f89caaSJens Wiklander 	for (n = 0; n < bp_count; n++) {
21863f89caaSJens Wiklander 		rc = pkcs11_import_object_boolprop(out, temp, bp[n]);
21963f89caaSJens Wiklander 		if (rc)
22063f89caaSJens Wiklander 			return rc;
22163f89caaSJens Wiklander 	}
22263f89caaSJens Wiklander 
22363f89caaSJens Wiklander 	return rc;
22463f89caaSJens Wiklander }
22563f89caaSJens Wiklander 
22663f89caaSJens Wiklander static enum pkcs11_rc set_mandatory_attributes(struct obj_attrs **out,
22763f89caaSJens Wiklander 					       struct obj_attrs *temp,
22816df60c7SEtienne Carriere 					       uint32_t const *attrs,
22916df60c7SEtienne Carriere 					       size_t attrs_count)
23063f89caaSJens Wiklander {
23163f89caaSJens Wiklander 	enum pkcs11_rc rc = PKCS11_CKR_OK;
23263f89caaSJens Wiklander 	size_t n = 0;
23363f89caaSJens Wiklander 
23416df60c7SEtienne Carriere 	for (n = 0; n < attrs_count; n++) {
23563f89caaSJens Wiklander 		uint32_t size = 0;
23663f89caaSJens Wiklander 		void *value = NULL;
23763f89caaSJens Wiklander 
23816df60c7SEtienne Carriere 		if (get_attribute_ptr(temp, attrs[n], &value, &size))
23963f89caaSJens Wiklander 			return PKCS11_CKR_TEMPLATE_INCOMPLETE;
24063f89caaSJens Wiklander 
24116df60c7SEtienne Carriere 		rc = add_attribute(out, attrs[n], value, size);
24263f89caaSJens Wiklander 		if (rc)
24363f89caaSJens Wiklander 			return rc;
24463f89caaSJens Wiklander 	}
24563f89caaSJens Wiklander 
24663f89caaSJens Wiklander 	return rc;
24763f89caaSJens Wiklander }
24863f89caaSJens Wiklander 
24963f89caaSJens Wiklander static enum pkcs11_rc get_default_value(enum pkcs11_attr_id id, void **value,
25063f89caaSJens Wiklander 					uint32_t *size)
25163f89caaSJens Wiklander {
25263f89caaSJens Wiklander 	/* should have been taken care of already */
25363f89caaSJens Wiklander 	assert(!pkcs11_attr_is_boolean(id));
25463f89caaSJens Wiklander 
25563f89caaSJens Wiklander 	if (id == PKCS11_CKA_PUBLIC_KEY_INFO) {
25663f89caaSJens Wiklander 		EMSG("Cannot provide default PUBLIC_KEY_INFO");
25763f89caaSJens Wiklander 		return PKCS11_CKR_TEMPLATE_INCONSISTENT;
25863f89caaSJens Wiklander 	}
25963f89caaSJens Wiklander 
26063f89caaSJens Wiklander 	/* All other attributes have an empty default value */
26163f89caaSJens Wiklander 	*value = NULL;
26263f89caaSJens Wiklander 	*size = 0;
26363f89caaSJens Wiklander 	return PKCS11_CKR_OK;
26463f89caaSJens Wiklander }
26563f89caaSJens Wiklander 
2664eb88651SRuchika Gupta static enum pkcs11_rc set_optional_attributes_with_def(struct obj_attrs **out,
26763f89caaSJens Wiklander 						       struct obj_attrs *temp,
26816df60c7SEtienne Carriere 						       uint32_t const *attrs,
26916df60c7SEtienne Carriere 						       size_t attrs_count,
2704eb88651SRuchika Gupta 						       bool default_to_null)
27163f89caaSJens Wiklander {
27263f89caaSJens Wiklander 	enum pkcs11_rc rc = PKCS11_CKR_OK;
27363f89caaSJens Wiklander 	size_t n = 0;
27463f89caaSJens Wiklander 
27516df60c7SEtienne Carriere 	for (n = 0; n < attrs_count; n++) {
27663f89caaSJens Wiklander 		uint32_t size = 0;
27763f89caaSJens Wiklander 		void *value = NULL;
27863f89caaSJens Wiklander 
27916df60c7SEtienne Carriere 		rc = get_attribute_ptr(temp, attrs[n], &value, &size);
2804eb88651SRuchika Gupta 		if (rc == PKCS11_RV_NOT_FOUND) {
2814eb88651SRuchika Gupta 			if (default_to_null) {
28216df60c7SEtienne Carriere 				rc = get_default_value(attrs[n], &value, &size);
2834eb88651SRuchika Gupta 			} else {
2844eb88651SRuchika Gupta 				rc = PKCS11_CKR_OK;
2854eb88651SRuchika Gupta 				continue;
2864eb88651SRuchika Gupta 			}
2874eb88651SRuchika Gupta 		}
28863f89caaSJens Wiklander 		if (rc)
28963f89caaSJens Wiklander 			return rc;
29063f89caaSJens Wiklander 
29116df60c7SEtienne Carriere 		rc = add_attribute(out, attrs[n], value, size);
29263f89caaSJens Wiklander 		if (rc)
29363f89caaSJens Wiklander 			return rc;
29463f89caaSJens Wiklander 	}
29563f89caaSJens Wiklander 
29663f89caaSJens Wiklander 	return rc;
29763f89caaSJens Wiklander }
29863f89caaSJens Wiklander 
2994eb88651SRuchika Gupta static enum pkcs11_rc set_attributes_opt_or_null(struct obj_attrs **out,
3004eb88651SRuchika Gupta 						 struct obj_attrs *temp,
30116df60c7SEtienne Carriere 						 uint32_t const *attrs,
30216df60c7SEtienne Carriere 						 size_t attrs_count)
3034eb88651SRuchika Gupta {
30416df60c7SEtienne Carriere 	return set_optional_attributes_with_def(out, temp, attrs, attrs_count,
30516df60c7SEtienne Carriere 						true /* defaults to empty */);
3064eb88651SRuchika Gupta }
3074eb88651SRuchika Gupta 
3084eb88651SRuchika Gupta static enum pkcs11_rc set_optional_attributes(struct obj_attrs **out,
3094eb88651SRuchika Gupta 					      struct obj_attrs *temp,
31016df60c7SEtienne Carriere 					      uint32_t const *attrs,
31116df60c7SEtienne Carriere 					      size_t attrs_count)
3124eb88651SRuchika Gupta {
31316df60c7SEtienne Carriere 	return set_optional_attributes_with_def(out, temp, attrs, attrs_count,
31416df60c7SEtienne Carriere 						false /* no default value */);
3154eb88651SRuchika Gupta }
3164eb88651SRuchika Gupta 
31763f89caaSJens Wiklander /*
31863f89caaSJens Wiklander  * Below are listed the mandated or optional expected attributes for
31963f89caaSJens Wiklander  * PKCS#11 storage objects.
32063f89caaSJens Wiklander  *
32163f89caaSJens Wiklander  * Note: boolprops (mandated boolean attributes) PKCS11_CKA_ALWAYS_SENSITIVE,
32263f89caaSJens Wiklander  * and PKCS11_CKA_NEVER_EXTRACTABLE are set by the token, not provided
32363f89caaSJens Wiklander  * in the client template.
32463f89caaSJens Wiklander  */
32563f89caaSJens Wiklander 
32663f89caaSJens Wiklander /* PKCS#11 specification for any object (session/token) of the storage */
3274eb88651SRuchika Gupta static const uint32_t any_object_boolprops[] = {
32863f89caaSJens Wiklander 	PKCS11_CKA_TOKEN, PKCS11_CKA_PRIVATE,
32963f89caaSJens Wiklander 	PKCS11_CKA_MODIFIABLE, PKCS11_CKA_COPYABLE, PKCS11_CKA_DESTROYABLE,
33063f89caaSJens Wiklander };
33163f89caaSJens Wiklander 
3324eb88651SRuchika Gupta static const uint32_t any_object_opt_or_null[] = {
33363f89caaSJens Wiklander 	PKCS11_CKA_LABEL,
33463f89caaSJens Wiklander };
33563f89caaSJens Wiklander 
3364eb88651SRuchika Gupta /* PKCS#11 specification for raw data object (+any_object_xxx) */
3374eb88651SRuchika Gupta const uint32_t raw_data_opt_or_null[] = {
33863f89caaSJens Wiklander 	PKCS11_CKA_OBJECT_ID, PKCS11_CKA_APPLICATION, PKCS11_CKA_VALUE,
33963f89caaSJens Wiklander };
34063f89caaSJens Wiklander 
3414eb88651SRuchika Gupta /* PKCS#11 specification for any key object (+any_object_xxx) */
3424eb88651SRuchika Gupta static const uint32_t any_key_boolprops[] = {
34363f89caaSJens Wiklander 	PKCS11_CKA_DERIVE,
34463f89caaSJens Wiklander };
34563f89caaSJens Wiklander 
3464eb88651SRuchika Gupta static const uint32_t any_key_opt_or_null[] = {
34763f89caaSJens Wiklander 	PKCS11_CKA_ID,
34863f89caaSJens Wiklander 	PKCS11_CKA_START_DATE, PKCS11_CKA_END_DATE,
3494eb88651SRuchika Gupta };
3504eb88651SRuchika Gupta 
3514eb88651SRuchika Gupta static const uint32_t any_key_optional[] = {
35263f89caaSJens Wiklander 	PKCS11_CKA_ALLOWED_MECHANISMS,
35363f89caaSJens Wiklander };
35463f89caaSJens Wiklander 
3554eb88651SRuchika Gupta /* PKCS#11 specification for any symmetric key (+any_key_xxx) */
3564eb88651SRuchika Gupta static const uint32_t symm_key_boolprops[] = {
35763f89caaSJens Wiklander 	PKCS11_CKA_ENCRYPT, PKCS11_CKA_DECRYPT,
35863f89caaSJens Wiklander 	PKCS11_CKA_SIGN, PKCS11_CKA_VERIFY,
35963f89caaSJens Wiklander 	PKCS11_CKA_WRAP, PKCS11_CKA_UNWRAP,
36063f89caaSJens Wiklander 	PKCS11_CKA_SENSITIVE, PKCS11_CKA_EXTRACTABLE,
36163f89caaSJens Wiklander 	PKCS11_CKA_WRAP_WITH_TRUSTED, PKCS11_CKA_TRUSTED,
36263f89caaSJens Wiklander };
36363f89caaSJens Wiklander 
3644eb88651SRuchika Gupta static const uint32_t symm_key_opt_or_null[] = {
36563f89caaSJens Wiklander 	PKCS11_CKA_WRAP_TEMPLATE, PKCS11_CKA_UNWRAP_TEMPLATE,
3660ac5c695SRuchika Gupta 	PKCS11_CKA_DERIVE_TEMPLATE, PKCS11_CKA_VALUE,
3670ac5c695SRuchika Gupta };
3680ac5c695SRuchika Gupta 
3690ac5c695SRuchika Gupta static const uint32_t symm_key_optional[] = {
3700ac5c695SRuchika Gupta 	PKCS11_CKA_VALUE_LEN,
37163f89caaSJens Wiklander };
37263f89caaSJens Wiklander 
3734eb88651SRuchika Gupta /* PKCS#11 specification for any asymmetric public key (+any_key_xxx) */
3744eb88651SRuchika Gupta static const uint32_t public_key_boolprops[] = {
37563f89caaSJens Wiklander 	PKCS11_CKA_ENCRYPT, PKCS11_CKA_VERIFY, PKCS11_CKA_VERIFY_RECOVER,
37663f89caaSJens Wiklander 	PKCS11_CKA_WRAP,
37763f89caaSJens Wiklander 	PKCS11_CKA_TRUSTED,
37863f89caaSJens Wiklander };
37963f89caaSJens Wiklander 
3804eb88651SRuchika Gupta static const uint32_t public_key_mandated[] = {
38163f89caaSJens Wiklander 	PKCS11_CKA_SUBJECT
38263f89caaSJens Wiklander };
38363f89caaSJens Wiklander 
3844eb88651SRuchika Gupta static const uint32_t public_key_opt_or_null[] = {
38563f89caaSJens Wiklander 	PKCS11_CKA_WRAP_TEMPLATE, PKCS11_CKA_PUBLIC_KEY_INFO,
38663f89caaSJens Wiklander };
38763f89caaSJens Wiklander 
3884eb88651SRuchika Gupta /* PKCS#11 specification for any asymmetric private key (+any_key_xxx) */
3894eb88651SRuchika Gupta static const uint32_t private_key_boolprops[] = {
39063f89caaSJens Wiklander 	PKCS11_CKA_DECRYPT, PKCS11_CKA_SIGN, PKCS11_CKA_SIGN_RECOVER,
39163f89caaSJens Wiklander 	PKCS11_CKA_UNWRAP,
39263f89caaSJens Wiklander 	PKCS11_CKA_SENSITIVE, PKCS11_CKA_EXTRACTABLE,
39363f89caaSJens Wiklander 	PKCS11_CKA_WRAP_WITH_TRUSTED, PKCS11_CKA_ALWAYS_AUTHENTICATE,
39463f89caaSJens Wiklander };
39563f89caaSJens Wiklander 
3964eb88651SRuchika Gupta static const uint32_t private_key_mandated[] = {
39763f89caaSJens Wiklander 	PKCS11_CKA_SUBJECT
39863f89caaSJens Wiklander };
39963f89caaSJens Wiklander 
4004eb88651SRuchika Gupta static const uint32_t private_key_opt_or_null[] = {
40163f89caaSJens Wiklander 	PKCS11_CKA_UNWRAP_TEMPLATE, PKCS11_CKA_PUBLIC_KEY_INFO,
40263f89caaSJens Wiklander };
40363f89caaSJens Wiklander 
4044eb88651SRuchika Gupta /* PKCS#11 specification for any RSA key (+public/private_key_xxx) */
4054eb88651SRuchika Gupta static const uint32_t rsa_public_key_mandated[] = {
40663f89caaSJens Wiklander 	PKCS11_CKA_MODULUS_BITS,
40763f89caaSJens Wiklander };
40863f89caaSJens Wiklander 
4094eb88651SRuchika Gupta static const uint32_t rsa_public_key_opt_or_null[] = {
41063f89caaSJens Wiklander 	PKCS11_CKA_MODULUS, PKCS11_CKA_PUBLIC_EXPONENT,
41163f89caaSJens Wiklander };
41263f89caaSJens Wiklander 
4134eb88651SRuchika Gupta static const uint32_t rsa_private_key_opt_or_null[] = {
41463f89caaSJens Wiklander 	PKCS11_CKA_MODULUS, PKCS11_CKA_PUBLIC_EXPONENT,
41563f89caaSJens Wiklander 	PKCS11_CKA_PRIVATE_EXPONENT,
41663f89caaSJens Wiklander 	PKCS11_CKA_PRIME_1, PKCS11_CKA_PRIME_2,
41763f89caaSJens Wiklander 	PKCS11_CKA_EXPONENT_1, PKCS11_CKA_EXPONENT_2, PKCS11_CKA_COEFFICIENT,
41863f89caaSJens Wiklander };
41963f89caaSJens Wiklander 
4204eb88651SRuchika Gupta /* PKCS#11 specification for any EC key (+public/private_key_xxx) */
4214eb88651SRuchika Gupta static const uint32_t ec_public_key_mandated[] = {
42263f89caaSJens Wiklander 	PKCS11_CKA_EC_PARAMS,
42363f89caaSJens Wiklander };
42463f89caaSJens Wiklander 
4254eb88651SRuchika Gupta static const uint32_t ec_public_key_opt_or_null[] = {
42663f89caaSJens Wiklander 	PKCS11_CKA_EC_POINT,
42763f89caaSJens Wiklander };
42863f89caaSJens Wiklander 
4294eb88651SRuchika Gupta static const uint32_t ec_private_key_mandated[] = {
43063f89caaSJens Wiklander 	PKCS11_CKA_EC_PARAMS,
43163f89caaSJens Wiklander };
43263f89caaSJens Wiklander 
4334eb88651SRuchika Gupta static const uint32_t ec_private_key_opt_or_null[] = {
43463f89caaSJens Wiklander 	PKCS11_CKA_VALUE,
43563f89caaSJens Wiklander };
43663f89caaSJens Wiklander 
43763f89caaSJens Wiklander static enum pkcs11_rc create_storage_attributes(struct obj_attrs **out,
43863f89caaSJens Wiklander 						struct obj_attrs *temp)
43963f89caaSJens Wiklander {
44063f89caaSJens Wiklander 	enum pkcs11_class_id class = PKCS11_CKO_UNDEFINED_ID;
44163f89caaSJens Wiklander 	enum pkcs11_rc rc = PKCS11_CKR_OK;
44263f89caaSJens Wiklander 
44363f89caaSJens Wiklander 	rc = init_attributes_head(out);
44463f89caaSJens Wiklander 	if (rc)
44563f89caaSJens Wiklander 		return rc;
44663f89caaSJens Wiklander 
44763f89caaSJens Wiklander 	/* Object class is mandatory */
44863f89caaSJens Wiklander 	class = get_class(temp);
44963f89caaSJens Wiklander 	if (class == PKCS11_CKO_UNDEFINED_ID) {
45063f89caaSJens Wiklander 		EMSG("Class attribute not found");
45163f89caaSJens Wiklander 
45263f89caaSJens Wiklander 		return PKCS11_CKR_TEMPLATE_INCONSISTENT;
45363f89caaSJens Wiklander 	}
45463f89caaSJens Wiklander 	rc = add_attribute(out, PKCS11_CKA_CLASS, &class, sizeof(uint32_t));
45563f89caaSJens Wiklander 	if (rc)
45663f89caaSJens Wiklander 		return rc;
45763f89caaSJens Wiklander 
4584eb88651SRuchika Gupta 	rc = set_mandatory_boolprops(out, temp, any_object_boolprops,
4594eb88651SRuchika Gupta 				     ARRAY_SIZE(any_object_boolprops));
46063f89caaSJens Wiklander 	if (rc)
46163f89caaSJens Wiklander 		return rc;
46263f89caaSJens Wiklander 
4634eb88651SRuchika Gupta 	return set_attributes_opt_or_null(out, temp, any_object_opt_or_null,
4644eb88651SRuchika Gupta 					  ARRAY_SIZE(any_object_opt_or_null));
46563f89caaSJens Wiklander }
46663f89caaSJens Wiklander 
46763f89caaSJens Wiklander static enum pkcs11_rc create_genkey_attributes(struct obj_attrs **out,
46863f89caaSJens Wiklander 					       struct obj_attrs *temp)
46963f89caaSJens Wiklander {
47063f89caaSJens Wiklander 	uint32_t type = PKCS11_CKO_UNDEFINED_ID;
47163f89caaSJens Wiklander 	enum pkcs11_rc rc = PKCS11_CKR_OK;
47263f89caaSJens Wiklander 
47363f89caaSJens Wiklander 	rc = create_storage_attributes(out, temp);
47463f89caaSJens Wiklander 	if (rc)
47563f89caaSJens Wiklander 		return rc;
47663f89caaSJens Wiklander 
47763f89caaSJens Wiklander 	type = get_key_type(temp);
47863f89caaSJens Wiklander 	if (type == PKCS11_CKK_UNDEFINED_ID) {
47963f89caaSJens Wiklander 		EMSG("Key type attribute not found");
48063f89caaSJens Wiklander 
48163f89caaSJens Wiklander 		return PKCS11_CKR_TEMPLATE_INCONSISTENT;
48263f89caaSJens Wiklander 	}
48363f89caaSJens Wiklander 	rc = add_attribute(out, PKCS11_CKA_KEY_TYPE, &type, sizeof(uint32_t));
48463f89caaSJens Wiklander 	if (rc)
48563f89caaSJens Wiklander 		return rc;
48663f89caaSJens Wiklander 
4874eb88651SRuchika Gupta 	rc = set_mandatory_boolprops(out, temp, any_key_boolprops,
4884eb88651SRuchika Gupta 				     ARRAY_SIZE(any_key_boolprops));
48963f89caaSJens Wiklander 	if (rc)
49063f89caaSJens Wiklander 		return rc;
49163f89caaSJens Wiklander 
4924eb88651SRuchika Gupta 	rc = set_attributes_opt_or_null(out, temp, any_key_opt_or_null,
4934eb88651SRuchika Gupta 					ARRAY_SIZE(any_key_opt_or_null));
4944eb88651SRuchika Gupta 	if (rc)
4954eb88651SRuchika Gupta 		return rc;
4964eb88651SRuchika Gupta 
4974eb88651SRuchika Gupta 	return set_optional_attributes(out, temp, any_key_optional,
4984eb88651SRuchika Gupta 				       ARRAY_SIZE(any_key_optional));
4994eb88651SRuchika Gupta 
50063f89caaSJens Wiklander }
50163f89caaSJens Wiklander 
50263f89caaSJens Wiklander static enum pkcs11_rc create_symm_key_attributes(struct obj_attrs **out,
50363f89caaSJens Wiklander 						 struct obj_attrs *temp)
50463f89caaSJens Wiklander {
50563f89caaSJens Wiklander 	enum pkcs11_rc rc = PKCS11_CKR_OK;
50663f89caaSJens Wiklander 
50763f89caaSJens Wiklander 	assert(get_class(temp) == PKCS11_CKO_SECRET_KEY);
50863f89caaSJens Wiklander 
50963f89caaSJens Wiklander 	rc = create_genkey_attributes(out, temp);
51063f89caaSJens Wiklander 	if (rc)
51163f89caaSJens Wiklander 		return rc;
51263f89caaSJens Wiklander 
51363f89caaSJens Wiklander 	assert(get_class(*out) == PKCS11_CKO_SECRET_KEY);
51463f89caaSJens Wiklander 
51563f89caaSJens Wiklander 	switch (get_key_type(*out)) {
51663f89caaSJens Wiklander 	case PKCS11_CKK_GENERIC_SECRET:
51763f89caaSJens Wiklander 	case PKCS11_CKK_AES:
51863f89caaSJens Wiklander 	case PKCS11_CKK_MD5_HMAC:
51963f89caaSJens Wiklander 	case PKCS11_CKK_SHA_1_HMAC:
52063f89caaSJens Wiklander 	case PKCS11_CKK_SHA256_HMAC:
52163f89caaSJens Wiklander 	case PKCS11_CKK_SHA384_HMAC:
52263f89caaSJens Wiklander 	case PKCS11_CKK_SHA512_HMAC:
52363f89caaSJens Wiklander 	case PKCS11_CKK_SHA224_HMAC:
52463f89caaSJens Wiklander 		break;
52563f89caaSJens Wiklander 	default:
52663f89caaSJens Wiklander 		EMSG("Invalid key type %#"PRIx32"/%s",
52763f89caaSJens Wiklander 		     get_key_type(*out), id2str_key_type(get_key_type(*out)));
52863f89caaSJens Wiklander 
52963f89caaSJens Wiklander 		return PKCS11_CKR_TEMPLATE_INCONSISTENT;
53063f89caaSJens Wiklander 	}
53163f89caaSJens Wiklander 
5324eb88651SRuchika Gupta 	rc = set_mandatory_boolprops(out, temp, symm_key_boolprops,
5334eb88651SRuchika Gupta 				     ARRAY_SIZE(symm_key_boolprops));
53463f89caaSJens Wiklander 	if (rc)
53563f89caaSJens Wiklander 		return rc;
53663f89caaSJens Wiklander 
5370ac5c695SRuchika Gupta 	rc = set_attributes_opt_or_null(out, temp, symm_key_opt_or_null,
5384eb88651SRuchika Gupta 					ARRAY_SIZE(symm_key_opt_or_null));
5390ac5c695SRuchika Gupta 	if (rc)
5400ac5c695SRuchika Gupta 		return rc;
5410ac5c695SRuchika Gupta 
5420ac5c695SRuchika Gupta 	return set_optional_attributes(out, temp, symm_key_optional,
5430ac5c695SRuchika Gupta 				       ARRAY_SIZE(symm_key_optional));
54463f89caaSJens Wiklander }
54563f89caaSJens Wiklander 
54663f89caaSJens Wiklander static enum pkcs11_rc create_data_attributes(struct obj_attrs **out,
54763f89caaSJens Wiklander 					     struct obj_attrs *temp)
54863f89caaSJens Wiklander {
54963f89caaSJens Wiklander 	enum pkcs11_rc rc = PKCS11_CKR_OK;
55063f89caaSJens Wiklander 
55163f89caaSJens Wiklander 	assert(get_class(temp) == PKCS11_CKO_DATA);
55263f89caaSJens Wiklander 
55363f89caaSJens Wiklander 	rc = create_storage_attributes(out, temp);
55463f89caaSJens Wiklander 	if (rc)
55563f89caaSJens Wiklander 		return rc;
55663f89caaSJens Wiklander 
55763f89caaSJens Wiklander 	assert(get_class(*out) == PKCS11_CKO_DATA);
55863f89caaSJens Wiklander 
5594eb88651SRuchika Gupta 	return set_attributes_opt_or_null(out, temp, raw_data_opt_or_null,
5604eb88651SRuchika Gupta 					  ARRAY_SIZE(raw_data_opt_or_null));
56163f89caaSJens Wiklander }
56263f89caaSJens Wiklander 
56363f89caaSJens Wiklander static enum pkcs11_rc create_pub_key_attributes(struct obj_attrs **out,
56463f89caaSJens Wiklander 						struct obj_attrs *temp)
56563f89caaSJens Wiklander {
56663f89caaSJens Wiklander 	uint32_t const *mandated = NULL;
5674eb88651SRuchika Gupta 	uint32_t const *opt_or_null = NULL;
56863f89caaSJens Wiklander 	size_t mandated_count = 0;
5694eb88651SRuchika Gupta 	size_t opt_or_null_count = 0;
57063f89caaSJens Wiklander 	enum pkcs11_rc rc = PKCS11_CKR_OK;
57163f89caaSJens Wiklander 
57263f89caaSJens Wiklander 	assert(get_class(temp) == PKCS11_CKO_PUBLIC_KEY);
57363f89caaSJens Wiklander 
57463f89caaSJens Wiklander 	rc = create_genkey_attributes(out, temp);
57563f89caaSJens Wiklander 	if (rc)
57663f89caaSJens Wiklander 		return rc;
57763f89caaSJens Wiklander 
57863f89caaSJens Wiklander 	assert(get_class(*out) == PKCS11_CKO_PUBLIC_KEY);
57963f89caaSJens Wiklander 
5804eb88651SRuchika Gupta 	rc = set_mandatory_boolprops(out, temp, public_key_boolprops,
5814eb88651SRuchika Gupta 				     ARRAY_SIZE(public_key_boolprops));
58263f89caaSJens Wiklander 	if (rc)
58363f89caaSJens Wiklander 		return rc;
58463f89caaSJens Wiklander 
5854eb88651SRuchika Gupta 	rc = set_mandatory_attributes(out, temp, public_key_mandated,
5864eb88651SRuchika Gupta 				      ARRAY_SIZE(public_key_mandated));
58763f89caaSJens Wiklander 	if (rc)
58863f89caaSJens Wiklander 		return rc;
58963f89caaSJens Wiklander 
5904eb88651SRuchika Gupta 	rc = set_attributes_opt_or_null(out, temp,
5914eb88651SRuchika Gupta 					public_key_opt_or_null,
5924eb88651SRuchika Gupta 					ARRAY_SIZE(public_key_opt_or_null));
59363f89caaSJens Wiklander 	if (rc)
59463f89caaSJens Wiklander 		return rc;
59563f89caaSJens Wiklander 
59663f89caaSJens Wiklander 	switch (get_key_type(*out)) {
59763f89caaSJens Wiklander 	case PKCS11_CKK_RSA:
5984eb88651SRuchika Gupta 		mandated = rsa_public_key_mandated;
5994eb88651SRuchika Gupta 		opt_or_null = rsa_public_key_opt_or_null;
6004eb88651SRuchika Gupta 		mandated_count = ARRAY_SIZE(rsa_public_key_mandated);
6014eb88651SRuchika Gupta 		opt_or_null_count = ARRAY_SIZE(rsa_public_key_opt_or_null);
60263f89caaSJens Wiklander 		break;
60363f89caaSJens Wiklander 	case PKCS11_CKK_EC:
6044eb88651SRuchika Gupta 		mandated = ec_public_key_mandated;
6054eb88651SRuchika Gupta 		opt_or_null = ec_public_key_opt_or_null;
6064eb88651SRuchika Gupta 		mandated_count = ARRAY_SIZE(ec_public_key_mandated);
6074eb88651SRuchika Gupta 		opt_or_null_count = ARRAY_SIZE(ec_public_key_opt_or_null);
60863f89caaSJens Wiklander 		break;
60963f89caaSJens Wiklander 	default:
61063f89caaSJens Wiklander 		EMSG("Invalid key type %#"PRIx32"/%s",
61163f89caaSJens Wiklander 		     get_key_type(*out), id2str_key_type(get_key_type(*out)));
61263f89caaSJens Wiklander 
61363f89caaSJens Wiklander 		return PKCS11_CKR_TEMPLATE_INCONSISTENT;
61463f89caaSJens Wiklander 	}
61563f89caaSJens Wiklander 
61663f89caaSJens Wiklander 	rc = set_mandatory_attributes(out, temp, mandated, mandated_count);
61763f89caaSJens Wiklander 	if (rc)
61863f89caaSJens Wiklander 		return rc;
61963f89caaSJens Wiklander 
6204eb88651SRuchika Gupta 	return set_attributes_opt_or_null(out, temp, opt_or_null,
6214eb88651SRuchika Gupta 					  opt_or_null_count);
62263f89caaSJens Wiklander }
62363f89caaSJens Wiklander 
62463f89caaSJens Wiklander static enum pkcs11_rc create_priv_key_attributes(struct obj_attrs **out,
62563f89caaSJens Wiklander 						 struct obj_attrs *temp)
62663f89caaSJens Wiklander {
62763f89caaSJens Wiklander 	uint32_t const *mandated = NULL;
6284eb88651SRuchika Gupta 	uint32_t const *opt_or_null = NULL;
62963f89caaSJens Wiklander 	size_t mandated_count = 0;
6304eb88651SRuchika Gupta 	size_t opt_or_null_count = 0;
63163f89caaSJens Wiklander 	enum pkcs11_rc rc = PKCS11_CKR_OK;
63263f89caaSJens Wiklander 
63363f89caaSJens Wiklander 	assert(get_class(temp) == PKCS11_CKO_PRIVATE_KEY);
63463f89caaSJens Wiklander 
63563f89caaSJens Wiklander 	rc = create_genkey_attributes(out, temp);
63663f89caaSJens Wiklander 	if (rc)
63763f89caaSJens Wiklander 		return rc;
63863f89caaSJens Wiklander 
63963f89caaSJens Wiklander 	assert(get_class(*out) == PKCS11_CKO_PRIVATE_KEY);
64063f89caaSJens Wiklander 
6414eb88651SRuchika Gupta 	rc = set_mandatory_boolprops(out, temp, private_key_boolprops,
6424eb88651SRuchika Gupta 				     ARRAY_SIZE(private_key_boolprops));
64363f89caaSJens Wiklander 	if (rc)
64463f89caaSJens Wiklander 		return rc;
64563f89caaSJens Wiklander 
6464eb88651SRuchika Gupta 	rc = set_mandatory_attributes(out, temp, private_key_mandated,
6474eb88651SRuchika Gupta 				      ARRAY_SIZE(private_key_mandated));
64863f89caaSJens Wiklander 	if (rc)
64963f89caaSJens Wiklander 		return rc;
65063f89caaSJens Wiklander 
6514eb88651SRuchika Gupta 	rc = set_attributes_opt_or_null(out, temp, private_key_opt_or_null,
6524eb88651SRuchika Gupta 					ARRAY_SIZE(private_key_opt_or_null));
65363f89caaSJens Wiklander 	if (rc)
65463f89caaSJens Wiklander 		return rc;
65563f89caaSJens Wiklander 
65663f89caaSJens Wiklander 	switch (get_key_type(*out)) {
65763f89caaSJens Wiklander 	case PKCS11_CKK_RSA:
6584eb88651SRuchika Gupta 		opt_or_null = rsa_private_key_opt_or_null;
6594eb88651SRuchika Gupta 		opt_or_null_count = ARRAY_SIZE(rsa_private_key_opt_or_null);
66063f89caaSJens Wiklander 		break;
66163f89caaSJens Wiklander 	case PKCS11_CKK_EC:
6624eb88651SRuchika Gupta 		mandated = ec_private_key_mandated;
6634eb88651SRuchika Gupta 		opt_or_null = ec_private_key_opt_or_null;
6644eb88651SRuchika Gupta 		mandated_count = ARRAY_SIZE(ec_private_key_mandated);
6654eb88651SRuchika Gupta 		opt_or_null_count = ARRAY_SIZE(ec_private_key_opt_or_null);
66663f89caaSJens Wiklander 		break;
66763f89caaSJens Wiklander 	default:
66863f89caaSJens Wiklander 		EMSG("Invalid key type %#"PRIx32"/%s",
66963f89caaSJens Wiklander 		     get_key_type(*out), id2str_key_type(get_key_type(*out)));
67063f89caaSJens Wiklander 
67163f89caaSJens Wiklander 		return PKCS11_CKR_TEMPLATE_INCONSISTENT;
67263f89caaSJens Wiklander 	}
67363f89caaSJens Wiklander 
67463f89caaSJens Wiklander 	rc = set_mandatory_attributes(out, temp, mandated, mandated_count);
67563f89caaSJens Wiklander 	if (rc)
67663f89caaSJens Wiklander 		return rc;
67763f89caaSJens Wiklander 
6784eb88651SRuchika Gupta 	return set_attributes_opt_or_null(out, temp, opt_or_null,
6794eb88651SRuchika Gupta 					  opt_or_null_count);
68063f89caaSJens Wiklander }
68163f89caaSJens Wiklander 
682*196bcd93SRuchika Gupta static enum pkcs11_rc
683*196bcd93SRuchika Gupta sanitize_symm_key_attributes(struct obj_attrs **temp,
684*196bcd93SRuchika Gupta 			     enum processing_func function)
685*196bcd93SRuchika Gupta {
686*196bcd93SRuchika Gupta 	enum pkcs11_rc rc = PKCS11_CKR_OK;
687*196bcd93SRuchika Gupta 	uint32_t a_size = 0;
688*196bcd93SRuchika Gupta 
689*196bcd93SRuchika Gupta 	assert(get_class(*temp) == PKCS11_CKO_SECRET_KEY);
690*196bcd93SRuchika Gupta 
691*196bcd93SRuchika Gupta 	rc = get_attribute_ptr(*temp, PKCS11_CKA_VALUE, NULL, &a_size);
692*196bcd93SRuchika Gupta 
693*196bcd93SRuchika Gupta 	switch (get_key_type(*temp)) {
694*196bcd93SRuchika Gupta 	case PKCS11_CKK_GENERIC_SECRET:
695*196bcd93SRuchika Gupta 	case PKCS11_CKK_AES:
696*196bcd93SRuchika Gupta 	case PKCS11_CKK_MD5_HMAC:
697*196bcd93SRuchika Gupta 	case PKCS11_CKK_SHA_1_HMAC:
698*196bcd93SRuchika Gupta 	case PKCS11_CKK_SHA256_HMAC:
699*196bcd93SRuchika Gupta 	case PKCS11_CKK_SHA384_HMAC:
700*196bcd93SRuchika Gupta 	case PKCS11_CKK_SHA512_HMAC:
701*196bcd93SRuchika Gupta 	case PKCS11_CKK_SHA224_HMAC:
702*196bcd93SRuchika Gupta 		switch (function) {
703*196bcd93SRuchika Gupta 		case PKCS11_FUNCTION_IMPORT:
704*196bcd93SRuchika Gupta 			/* CKA_VALUE is a mandatory with C_CreateObject */
705*196bcd93SRuchika Gupta 			if (rc || a_size == 0)
706*196bcd93SRuchika Gupta 				return PKCS11_CKR_TEMPLATE_INCONSISTENT;
707*196bcd93SRuchika Gupta 
708*196bcd93SRuchika Gupta 			if (get_attribute_ptr(*temp, PKCS11_CKA_VALUE_LEN, NULL,
709*196bcd93SRuchika Gupta 					      NULL) != PKCS11_RV_NOT_FOUND)
710*196bcd93SRuchika Gupta 				return PKCS11_CKR_TEMPLATE_INCONSISTENT;
711*196bcd93SRuchika Gupta 
712*196bcd93SRuchika Gupta 			return add_attribute(temp, PKCS11_CKA_VALUE_LEN,
713*196bcd93SRuchika Gupta 					     &a_size, sizeof(uint32_t));
714*196bcd93SRuchika Gupta 		case PKCS11_FUNCTION_GENERATE:
715*196bcd93SRuchika Gupta 			if (rc != PKCS11_RV_NOT_FOUND)
716*196bcd93SRuchika Gupta 				return PKCS11_CKR_TEMPLATE_INCONSISTENT;
717*196bcd93SRuchika Gupta 			break;
718*196bcd93SRuchika Gupta 		default:
719*196bcd93SRuchika Gupta 			break;
720*196bcd93SRuchika Gupta 		}
721*196bcd93SRuchika Gupta 		break;
722*196bcd93SRuchika Gupta 	default:
723*196bcd93SRuchika Gupta 		EMSG("Invalid key type %#"PRIx32"/%s",
724*196bcd93SRuchika Gupta 		     get_key_type(*temp), id2str_key_type(get_key_type(*temp)));
725*196bcd93SRuchika Gupta 
726*196bcd93SRuchika Gupta 		return PKCS11_CKR_TEMPLATE_INCONSISTENT;
727*196bcd93SRuchika Gupta 	}
728*196bcd93SRuchika Gupta 
729*196bcd93SRuchika Gupta 	return PKCS11_CKR_OK;
730*196bcd93SRuchika Gupta }
731*196bcd93SRuchika Gupta 
73263f89caaSJens Wiklander /*
73363f89caaSJens Wiklander  * Create an attribute list for a new object from a template and a parent
73463f89caaSJens Wiklander  * object (optional) for an object generation function (generate, copy,
73563f89caaSJens Wiklander  * derive...).
73663f89caaSJens Wiklander  *
73763f89caaSJens Wiklander  * PKCS#11 directives on the supplied template and expected return value:
73863f89caaSJens Wiklander  * - template has an invalid attribute ID: ATTRIBUTE_TYPE_INVALID
73963f89caaSJens Wiklander  * - template has an invalid value for an attribute: ATTRIBUTE_VALID_INVALID
74063f89caaSJens Wiklander  * - template has value for a read-only attribute: ATTRIBUTE_READ_ONLY
74163f89caaSJens Wiklander  * - template+default+parent => still miss an attribute: TEMPLATE_INCONSISTENT
74263f89caaSJens Wiklander  *
74363f89caaSJens Wiklander  * INFO on PKCS11_CMD_COPY_OBJECT:
74463f89caaSJens Wiklander  * - parent PKCS11_CKA_COPYIABLE=false => return ACTION_PROHIBITED.
74563f89caaSJens Wiklander  * - template can specify PKCS11_CKA_TOKEN, PKCS11_CKA_PRIVATE,
74663f89caaSJens Wiklander  *   PKCS11_CKA_MODIFIABLE, PKCS11_CKA_DESTROYABLE.
74763f89caaSJens Wiklander  * - SENSITIVE can change from false to true, not from true to false.
74863f89caaSJens Wiklander  * - LOCAL is the parent LOCAL
74963f89caaSJens Wiklander  */
75063f89caaSJens Wiklander enum pkcs11_rc
75163f89caaSJens Wiklander create_attributes_from_template(struct obj_attrs **out, void *template,
75263f89caaSJens Wiklander 				size_t template_size,
75348799892SRuchika Gupta 				struct obj_attrs *parent,
75463f89caaSJens Wiklander 				enum processing_func function,
7554cfce748SRuchika Gupta 				enum pkcs11_mechanism_id mecha,
7564cfce748SRuchika Gupta 				enum pkcs11_class_id template_class __unused)
75763f89caaSJens Wiklander {
75863f89caaSJens Wiklander 	struct obj_attrs *temp = NULL;
75963f89caaSJens Wiklander 	struct obj_attrs *attrs = NULL;
76063f89caaSJens Wiklander 	enum pkcs11_rc rc = PKCS11_CKR_OK;
76163f89caaSJens Wiklander 	uint8_t local = 0;
76263f89caaSJens Wiklander 	uint8_t always_sensitive = 0;
76363f89caaSJens Wiklander 	uint8_t never_extract = 0;
764fa247a2aSRuchika Gupta 	uint32_t class = PKCS11_UNDEFINED_ID;
765fa247a2aSRuchika Gupta 	uint32_t type = PKCS11_UNDEFINED_ID;
76663f89caaSJens Wiklander 	uint32_t mechanism_id = PKCS11_CKM_UNDEFINED_ID;
76763f89caaSJens Wiklander 
76863f89caaSJens Wiklander #ifdef DEBUG	/* Sanity: check function argument */
76963f89caaSJens Wiklander 	trace_attributes_from_api_head("template", template, template_size);
77063f89caaSJens Wiklander 	switch (function) {
771fa247a2aSRuchika Gupta 	case PKCS11_FUNCTION_GENERATE:
77263f89caaSJens Wiklander 	case PKCS11_FUNCTION_IMPORT:
7732d25a9bcSRuchika Gupta 	case PKCS11_FUNCTION_MODIFY:
77448799892SRuchika Gupta 	case PKCS11_FUNCTION_DERIVE:
7752d25a9bcSRuchika Gupta 	case PKCS11_FUNCTION_COPY:
77663f89caaSJens Wiklander 		break;
77763f89caaSJens Wiklander 	default:
77863f89caaSJens Wiklander 		TEE_Panic(TEE_ERROR_NOT_SUPPORTED);
77963f89caaSJens Wiklander 	}
78063f89caaSJens Wiklander #endif
78163f89caaSJens Wiklander 
782dcad3409SRuchika Gupta 	/*
783dcad3409SRuchika Gupta 	 * For PKCS11_FUNCTION_GENERATE, find the class and type
784dcad3409SRuchika Gupta 	 * based on the mechanism. These will be passed as hint
785dcad3409SRuchika Gupta 	 * sanitize_client_object() and added in temp if not
786dcad3409SRuchika Gupta 	 * already present
787dcad3409SRuchika Gupta 	 */
788dcad3409SRuchika Gupta 	if (function == PKCS11_FUNCTION_GENERATE) {
789fa247a2aSRuchika Gupta 		switch (mecha) {
790fa247a2aSRuchika Gupta 		case PKCS11_CKM_GENERIC_SECRET_KEY_GEN:
791fa247a2aSRuchika Gupta 			class = PKCS11_CKO_SECRET_KEY;
792fa247a2aSRuchika Gupta 			type = PKCS11_CKK_GENERIC_SECRET;
793fa247a2aSRuchika Gupta 			break;
794fa247a2aSRuchika Gupta 		case PKCS11_CKM_AES_KEY_GEN:
795fa247a2aSRuchika Gupta 			class = PKCS11_CKO_SECRET_KEY;
796fa247a2aSRuchika Gupta 			type = PKCS11_CKK_AES;
797fa247a2aSRuchika Gupta 			break;
798fa247a2aSRuchika Gupta 		default:
799dcad3409SRuchika Gupta 			TEE_Panic(TEE_ERROR_NOT_SUPPORTED);
800fa247a2aSRuchika Gupta 		}
801fa247a2aSRuchika Gupta 	}
802fa247a2aSRuchika Gupta 
8032d25a9bcSRuchika Gupta 	/*
8042d25a9bcSRuchika Gupta 	 * Check and remove duplicates if any and create a new temporary
8052d25a9bcSRuchika Gupta 	 * template
8062d25a9bcSRuchika Gupta 	 */
807dcad3409SRuchika Gupta 	rc = sanitize_client_object(&temp, template, template_size, class,
808dcad3409SRuchika Gupta 				    type);
809dcad3409SRuchika Gupta 	if (rc)
810dcad3409SRuchika Gupta 		goto out;
811dcad3409SRuchika Gupta 
812dcad3409SRuchika Gupta 	/*
8132d25a9bcSRuchika Gupta 	 * For function type modify and copy return the created template
8142d25a9bcSRuchika Gupta 	 * from here. Rest of the code below is for creating objects
8152d25a9bcSRuchika Gupta 	 * or generating keys.
8162d25a9bcSRuchika Gupta 	 */
8172d25a9bcSRuchika Gupta 	switch (function) {
8182d25a9bcSRuchika Gupta 	case PKCS11_FUNCTION_MODIFY:
8192d25a9bcSRuchika Gupta 	case PKCS11_FUNCTION_COPY:
8202d25a9bcSRuchika Gupta 		*out = temp;
8212d25a9bcSRuchika Gupta 		return rc;
8222d25a9bcSRuchika Gupta 	default:
8232d25a9bcSRuchika Gupta 		break;
8242d25a9bcSRuchika Gupta 	}
8252d25a9bcSRuchika Gupta 
8262d25a9bcSRuchika Gupta 	/*
827dcad3409SRuchika Gupta 	 * Check if class and type in temp are consistent with the mechanism
828dcad3409SRuchika Gupta 	 */
829fa247a2aSRuchika Gupta 	switch (mecha) {
830fa247a2aSRuchika Gupta 	case PKCS11_CKM_GENERIC_SECRET_KEY_GEN:
831fa247a2aSRuchika Gupta 		if (get_class(temp) != PKCS11_CKO_SECRET_KEY ||
832fa247a2aSRuchika Gupta 		    get_key_type(temp) != PKCS11_CKK_GENERIC_SECRET) {
833fa247a2aSRuchika Gupta 			rc = PKCS11_CKR_TEMPLATE_INCONSISTENT;
834fa247a2aSRuchika Gupta 			goto out;
835fa247a2aSRuchika Gupta 		}
836fa247a2aSRuchika Gupta 		break;
837fa247a2aSRuchika Gupta 	case PKCS11_CKM_AES_KEY_GEN:
838fa247a2aSRuchika Gupta 		if (get_class(temp) != PKCS11_CKO_SECRET_KEY ||
839fa247a2aSRuchika Gupta 		    get_key_type(temp) != PKCS11_CKK_AES) {
840fa247a2aSRuchika Gupta 			rc = PKCS11_CKR_TEMPLATE_INCONSISTENT;
841fa247a2aSRuchika Gupta 			goto out;
842fa247a2aSRuchika Gupta 		}
843fa247a2aSRuchika Gupta 		break;
844fa247a2aSRuchika Gupta 	default:
845fa247a2aSRuchika Gupta 		break;
846fa247a2aSRuchika Gupta 	}
84763f89caaSJens Wiklander 
84863f89caaSJens Wiklander 	if (!sanitize_consistent_class_and_type(temp)) {
84963f89caaSJens Wiklander 		EMSG("Inconsistent class/type");
85063f89caaSJens Wiklander 		rc = PKCS11_CKR_TEMPLATE_INCONSISTENT;
85163f89caaSJens Wiklander 		goto out;
85263f89caaSJens Wiklander 	}
85363f89caaSJens Wiklander 
85463f89caaSJens Wiklander 	switch (get_class(temp)) {
85563f89caaSJens Wiklander 	case PKCS11_CKO_DATA:
85663f89caaSJens Wiklander 		rc = create_data_attributes(&attrs, temp);
85763f89caaSJens Wiklander 		break;
85863f89caaSJens Wiklander 	case PKCS11_CKO_SECRET_KEY:
859*196bcd93SRuchika Gupta 		rc = sanitize_symm_key_attributes(&temp, function);
860*196bcd93SRuchika Gupta 		if (rc)
861*196bcd93SRuchika Gupta 			goto out;
86263f89caaSJens Wiklander 		rc = create_symm_key_attributes(&attrs, temp);
86363f89caaSJens Wiklander 		break;
86463f89caaSJens Wiklander 	case PKCS11_CKO_PUBLIC_KEY:
86563f89caaSJens Wiklander 		rc = create_pub_key_attributes(&attrs, temp);
86663f89caaSJens Wiklander 		break;
86763f89caaSJens Wiklander 	case PKCS11_CKO_PRIVATE_KEY:
86863f89caaSJens Wiklander 		rc = create_priv_key_attributes(&attrs, temp);
86963f89caaSJens Wiklander 		break;
87063f89caaSJens Wiklander 	default:
87163f89caaSJens Wiklander 		DMSG("Invalid object class %#"PRIx32"/%s",
87263f89caaSJens Wiklander 		     get_class(temp), id2str_class(get_class(temp)));
87363f89caaSJens Wiklander 
87463f89caaSJens Wiklander 		rc = PKCS11_CKR_TEMPLATE_INCONSISTENT;
87563f89caaSJens Wiklander 		break;
87663f89caaSJens Wiklander 	}
87763f89caaSJens Wiklander 	if (rc)
87863f89caaSJens Wiklander 		goto out;
87963f89caaSJens Wiklander 
88090c47fe2SRuchika Gupta 	if (get_attribute_ptr(temp, PKCS11_CKA_LOCAL, NULL, NULL) !=
881002f6b93SEtienne Carriere 	    PKCS11_RV_NOT_FOUND) {
882002f6b93SEtienne Carriere 		rc = PKCS11_CKR_TEMPLATE_INCONSISTENT;
88363f89caaSJens Wiklander 		goto out;
884002f6b93SEtienne Carriere 	}
88563f89caaSJens Wiklander 
88690c47fe2SRuchika Gupta 	if (get_attribute_ptr(temp, PKCS11_CKA_KEY_GEN_MECHANISM, NULL, NULL) !=
887002f6b93SEtienne Carriere 	    PKCS11_RV_NOT_FOUND) {
888002f6b93SEtienne Carriere 		rc = PKCS11_CKR_TEMPLATE_INCONSISTENT;
88963f89caaSJens Wiklander 		goto out;
890002f6b93SEtienne Carriere 	}
89163f89caaSJens Wiklander 
89263f89caaSJens Wiklander 	switch (function) {
893fa247a2aSRuchika Gupta 	case PKCS11_FUNCTION_GENERATE:
894fa247a2aSRuchika Gupta 		local = PKCS11_TRUE;
895fa247a2aSRuchika Gupta 		break;
89663f89caaSJens Wiklander 	case PKCS11_FUNCTION_IMPORT:
89748799892SRuchika Gupta 	case PKCS11_FUNCTION_DERIVE:
89863f89caaSJens Wiklander 	default:
89963f89caaSJens Wiklander 		local = PKCS11_FALSE;
90063f89caaSJens Wiklander 		break;
90163f89caaSJens Wiklander 	}
90263f89caaSJens Wiklander 	rc = add_attribute(&attrs, PKCS11_CKA_LOCAL, &local, sizeof(local));
90363f89caaSJens Wiklander 	if (rc)
90463f89caaSJens Wiklander 		goto out;
90563f89caaSJens Wiklander 
90663f89caaSJens Wiklander 	switch (get_class(attrs)) {
90763f89caaSJens Wiklander 	case PKCS11_CKO_SECRET_KEY:
90863f89caaSJens Wiklander 	case PKCS11_CKO_PRIVATE_KEY:
90963f89caaSJens Wiklander 	case PKCS11_CKO_PUBLIC_KEY:
91063f89caaSJens Wiklander 		always_sensitive = PKCS11_FALSE;
91163f89caaSJens Wiklander 		never_extract = PKCS11_FALSE;
91263f89caaSJens Wiklander 
913fa247a2aSRuchika Gupta 		switch (function) {
91448799892SRuchika Gupta 		case PKCS11_FUNCTION_DERIVE:
91548799892SRuchika Gupta 			always_sensitive =
91648799892SRuchika Gupta 				get_bool(parent, PKCS11_CKA_ALWAYS_SENSITIVE) &&
91748799892SRuchika Gupta 				get_bool(attrs, PKCS11_CKA_SENSITIVE);
91848799892SRuchika Gupta 			never_extract =
91948799892SRuchika Gupta 			       get_bool(parent, PKCS11_CKA_NEVER_EXTRACTABLE) &&
92048799892SRuchika Gupta 			       !get_bool(attrs, PKCS11_CKA_EXTRACTABLE);
92148799892SRuchika Gupta 			break;
922fa247a2aSRuchika Gupta 		case PKCS11_FUNCTION_GENERATE:
923fa247a2aSRuchika Gupta 			always_sensitive = get_bool(attrs,
924fa247a2aSRuchika Gupta 						    PKCS11_CKA_SENSITIVE);
925fa247a2aSRuchika Gupta 			never_extract = !get_bool(attrs,
926fa247a2aSRuchika Gupta 						  PKCS11_CKA_EXTRACTABLE);
927fa247a2aSRuchika Gupta 			break;
928fa247a2aSRuchika Gupta 		default:
929fa247a2aSRuchika Gupta 			break;
930fa247a2aSRuchika Gupta 		}
931fa247a2aSRuchika Gupta 
93263f89caaSJens Wiklander 		rc = add_attribute(&attrs, PKCS11_CKA_ALWAYS_SENSITIVE,
93363f89caaSJens Wiklander 				   &always_sensitive, sizeof(always_sensitive));
93463f89caaSJens Wiklander 		if (rc)
93563f89caaSJens Wiklander 			goto out;
93663f89caaSJens Wiklander 
93763f89caaSJens Wiklander 		rc = add_attribute(&attrs, PKCS11_CKA_NEVER_EXTRACTABLE,
93863f89caaSJens Wiklander 				   &never_extract, sizeof(never_extract));
93963f89caaSJens Wiklander 		if (rc)
94063f89caaSJens Wiklander 			goto out;
94163f89caaSJens Wiklander 
94263f89caaSJens Wiklander 		/* Keys mandate attribute PKCS11_CKA_KEY_GEN_MECHANISM */
943fa247a2aSRuchika Gupta 		if (local)
944fa247a2aSRuchika Gupta 			mechanism_id = mecha;
945fa247a2aSRuchika Gupta 		else
94663f89caaSJens Wiklander 			mechanism_id = PKCS11_CK_UNAVAILABLE_INFORMATION;
947fa247a2aSRuchika Gupta 
94863f89caaSJens Wiklander 		rc = add_attribute(&attrs, PKCS11_CKA_KEY_GEN_MECHANISM,
94963f89caaSJens Wiklander 				   &mechanism_id, sizeof(mechanism_id));
95063f89caaSJens Wiklander 		if (rc)
95163f89caaSJens Wiklander 			goto out;
95263f89caaSJens Wiklander 		break;
95363f89caaSJens Wiklander 
95463f89caaSJens Wiklander 	default:
95563f89caaSJens Wiklander 		break;
95663f89caaSJens Wiklander 	}
95763f89caaSJens Wiklander 
95863f89caaSJens Wiklander 	*out = attrs;
95963f89caaSJens Wiklander 
96063f89caaSJens Wiklander #ifdef DEBUG
96163f89caaSJens Wiklander 	trace_attributes("object", attrs);
96263f89caaSJens Wiklander #endif
96363f89caaSJens Wiklander 
96463f89caaSJens Wiklander out:
96563f89caaSJens Wiklander 	TEE_Free(temp);
96663f89caaSJens Wiklander 	if (rc)
96763f89caaSJens Wiklander 		TEE_Free(attrs);
96863f89caaSJens Wiklander 
96963f89caaSJens Wiklander 	return rc;
97063f89caaSJens Wiklander }
97163f89caaSJens Wiklander 
97263f89caaSJens Wiklander static enum pkcs11_rc check_attrs_misc_integrity(struct obj_attrs *head)
97363f89caaSJens Wiklander {
97463f89caaSJens Wiklander 	if (get_bool(head, PKCS11_CKA_NEVER_EXTRACTABLE) &&
97563f89caaSJens Wiklander 	    get_bool(head, PKCS11_CKA_EXTRACTABLE)) {
97663f89caaSJens Wiklander 		DMSG("Never/Extractable attributes mismatch %d/%d",
97763f89caaSJens Wiklander 		     get_bool(head, PKCS11_CKA_NEVER_EXTRACTABLE),
97863f89caaSJens Wiklander 		     get_bool(head, PKCS11_CKA_EXTRACTABLE));
97963f89caaSJens Wiklander 
98063f89caaSJens Wiklander 		return PKCS11_CKR_TEMPLATE_INCONSISTENT;
98163f89caaSJens Wiklander 	}
98263f89caaSJens Wiklander 
98363f89caaSJens Wiklander 	if (get_bool(head, PKCS11_CKA_ALWAYS_SENSITIVE) &&
98463f89caaSJens Wiklander 	    !get_bool(head, PKCS11_CKA_SENSITIVE)) {
98563f89caaSJens Wiklander 		DMSG("Sensitive/always attributes mismatch %d/%d",
98663f89caaSJens Wiklander 		     get_bool(head, PKCS11_CKA_SENSITIVE),
98763f89caaSJens Wiklander 		     get_bool(head, PKCS11_CKA_ALWAYS_SENSITIVE));
98863f89caaSJens Wiklander 
98963f89caaSJens Wiklander 		return PKCS11_CKR_TEMPLATE_INCONSISTENT;
99063f89caaSJens Wiklander 	}
99163f89caaSJens Wiklander 
99263f89caaSJens Wiklander 	return PKCS11_CKR_OK;
99363f89caaSJens Wiklander }
99463f89caaSJens Wiklander 
99589735787SRuchika Gupta bool object_is_private(struct obj_attrs *head)
99689735787SRuchika Gupta {
99765fb9092SVesa Jääskeläinen 	return get_bool(head, PKCS11_CKA_PRIVATE);
99889735787SRuchika Gupta }
99989735787SRuchika Gupta 
10002d25a9bcSRuchika Gupta bool object_is_token(struct obj_attrs *head)
10012d25a9bcSRuchika Gupta {
10022d25a9bcSRuchika Gupta 	return get_bool(head, PKCS11_CKA_TOKEN);
10032d25a9bcSRuchika Gupta }
10042d25a9bcSRuchika Gupta 
10052d25a9bcSRuchika Gupta bool object_is_modifiable(struct obj_attrs *head)
10062d25a9bcSRuchika Gupta {
10072d25a9bcSRuchika Gupta 	return get_bool(head, PKCS11_CKA_MODIFIABLE);
10082d25a9bcSRuchika Gupta }
10092d25a9bcSRuchika Gupta 
10102d25a9bcSRuchika Gupta bool object_is_copyable(struct obj_attrs *head)
10112d25a9bcSRuchika Gupta {
10122d25a9bcSRuchika Gupta 	return get_bool(head, PKCS11_CKA_COPYABLE);
10132d25a9bcSRuchika Gupta }
10142d25a9bcSRuchika Gupta 
101563f89caaSJens Wiklander /*
1016512cbf1dSJens Wiklander  * Check access to object against authentication to token
1017512cbf1dSJens Wiklander  */
1018512cbf1dSJens Wiklander enum pkcs11_rc check_access_attrs_against_token(struct pkcs11_session *session,
1019512cbf1dSJens Wiklander 						struct obj_attrs *head)
1020512cbf1dSJens Wiklander {
1021512cbf1dSJens Wiklander 	bool private = true;
1022512cbf1dSJens Wiklander 
1023512cbf1dSJens Wiklander 	switch (get_class(head)) {
1024512cbf1dSJens Wiklander 	case PKCS11_CKO_SECRET_KEY:
102565fb9092SVesa Jääskeläinen 	case PKCS11_CKO_PRIVATE_KEY:
1026512cbf1dSJens Wiklander 	case PKCS11_CKO_PUBLIC_KEY:
1027512cbf1dSJens Wiklander 	case PKCS11_CKO_DATA:
102865fb9092SVesa Jääskeläinen 		private = object_is_private(head);
1029512cbf1dSJens Wiklander 		break;
1030512cbf1dSJens Wiklander 	default:
1031512cbf1dSJens Wiklander 		return PKCS11_CKR_KEY_FUNCTION_NOT_PERMITTED;
1032512cbf1dSJens Wiklander 	}
1033512cbf1dSJens Wiklander 
10345db0fef4SRuchika Gupta 	if (private && (pkcs11_session_is_public(session) ||
10355db0fef4SRuchika Gupta 			pkcs11_session_is_so(session))) {
10365db0fef4SRuchika Gupta 		DMSG("Private object access from a public or SO session");
1037512cbf1dSJens Wiklander 
103812f1ba86SRuchika Gupta 		return PKCS11_CKR_USER_NOT_LOGGED_IN;
1039512cbf1dSJens Wiklander 	}
1040512cbf1dSJens Wiklander 
1041512cbf1dSJens Wiklander 	return PKCS11_CKR_OK;
1042512cbf1dSJens Wiklander }
1043512cbf1dSJens Wiklander 
1044512cbf1dSJens Wiklander /*
104563f89caaSJens Wiklander  * Check the attributes of a to-be-created object matches the token state
104663f89caaSJens Wiklander  */
104763f89caaSJens Wiklander enum pkcs11_rc check_created_attrs_against_token(struct pkcs11_session *session,
104863f89caaSJens Wiklander 						 struct obj_attrs *head)
104963f89caaSJens Wiklander {
105063f89caaSJens Wiklander 	enum pkcs11_rc rc = PKCS11_CKR_OK;
105163f89caaSJens Wiklander 
105263f89caaSJens Wiklander 	rc = check_attrs_misc_integrity(head);
105363f89caaSJens Wiklander 	if (rc)
105463f89caaSJens Wiklander 		return rc;
105563f89caaSJens Wiklander 
105663f89caaSJens Wiklander 	if (get_bool(head, PKCS11_CKA_TRUSTED) &&
105763f89caaSJens Wiklander 	    !pkcs11_session_is_so(session)) {
105863f89caaSJens Wiklander 		DMSG("Can't create trusted object");
105963f89caaSJens Wiklander 
106063f89caaSJens Wiklander 		return PKCS11_CKR_KEY_FUNCTION_NOT_PERMITTED;
106163f89caaSJens Wiklander 	}
106263f89caaSJens Wiklander 
106363f89caaSJens Wiklander 	if (get_bool(head, PKCS11_CKA_TOKEN) &&
106463f89caaSJens Wiklander 	    !pkcs11_session_is_read_write(session)) {
106563f89caaSJens Wiklander 		DMSG("Can't create persistent object");
106663f89caaSJens Wiklander 
106763f89caaSJens Wiklander 		return PKCS11_CKR_SESSION_READ_ONLY;
106863f89caaSJens Wiklander 	}
106963f89caaSJens Wiklander 
107063f89caaSJens Wiklander 	/*
107163f89caaSJens Wiklander 	 * TODO: START_DATE and END_DATE: complies with current time?
107263f89caaSJens Wiklander 	 */
107363f89caaSJens Wiklander 	return PKCS11_CKR_OK;
107463f89caaSJens Wiklander }
107563f89caaSJens Wiklander 
107663f89caaSJens Wiklander #define DMSG_BAD_BBOOL(attr, proc, head)				\
107763f89caaSJens Wiklander 	do {								\
107863f89caaSJens Wiklander 		uint32_t __maybe_unused _attr = (attr);			\
107963f89caaSJens Wiklander 		uint8_t __maybe_unused _bvalue = 0;			\
108063f89caaSJens Wiklander 		enum pkcs11_rc __maybe_unused _rc = PKCS11_CKR_OK;	\
108163f89caaSJens Wiklander 									\
108263f89caaSJens Wiklander 		_rc = get_attribute((head), _attr, &_bvalue, NULL);	\
108363f89caaSJens Wiklander 		DMSG("%s issue for %s: %sfound, value %"PRIu8,		\
108463f89caaSJens Wiklander 		     id2str_attr(_attr), id2str_proc((proc)),		\
108563f89caaSJens Wiklander 		     _rc ? "not " : "", _bvalue);			\
108663f89caaSJens Wiklander 	} while (0)
108763f89caaSJens Wiklander 
108863f89caaSJens Wiklander static bool __maybe_unused check_attr_bval(uint32_t proc_id __maybe_unused,
108963f89caaSJens Wiklander 					   struct obj_attrs *head,
109063f89caaSJens Wiklander 					   uint32_t attribute, bool val)
109163f89caaSJens Wiklander {
109263f89caaSJens Wiklander 	uint8_t bbool = 0;
109363f89caaSJens Wiklander 	uint32_t sz = sizeof(bbool);
109463f89caaSJens Wiklander 
109563f89caaSJens Wiklander 	if (!get_attribute(head, attribute, &bbool, &sz) && !!bbool == val)
109663f89caaSJens Wiklander 		return true;
109763f89caaSJens Wiklander 
109863f89caaSJens Wiklander 	DMSG_BAD_BBOOL(attribute, proc_id, head);
109963f89caaSJens Wiklander 	return false;
110063f89caaSJens Wiklander }
110163f89caaSJens Wiklander 
110263f89caaSJens Wiklander /*
110363f89caaSJens Wiklander  * Check the attributes of a new secret match the processing/mechanism
110463f89caaSJens Wiklander  * used to create it.
110563f89caaSJens Wiklander  *
110663f89caaSJens Wiklander  * @proc_id - PKCS11_CKM_xxx
110763f89caaSJens Wiklander  * @head - head of the attributes of the to-be-created object.
110863f89caaSJens Wiklander  */
110963f89caaSJens Wiklander enum pkcs11_rc check_created_attrs_against_processing(uint32_t proc_id,
111063f89caaSJens Wiklander 						      struct obj_attrs *head)
111163f89caaSJens Wiklander {
111263f89caaSJens Wiklander 	/*
111363f89caaSJens Wiklander 	 * Processings that do not create secrets are not expected to call
111463f89caaSJens Wiklander 	 * this function which would panic.
111563f89caaSJens Wiklander 	 */
111663f89caaSJens Wiklander 	switch (proc_id) {
111763f89caaSJens Wiklander 	case PKCS11_PROCESSING_IMPORT:
111848799892SRuchika Gupta 	case PKCS11_CKM_AES_ECB_ENCRYPT_DATA:
111948799892SRuchika Gupta 	case PKCS11_CKM_AES_CBC_ENCRYPT_DATA:
112063f89caaSJens Wiklander 		assert(check_attr_bval(proc_id, head, PKCS11_CKA_LOCAL, false));
112163f89caaSJens Wiklander 		break;
1122fa247a2aSRuchika Gupta 	case PKCS11_CKM_GENERIC_SECRET_KEY_GEN:
1123fa247a2aSRuchika Gupta 	case PKCS11_CKM_AES_KEY_GEN:
1124fa247a2aSRuchika Gupta 		assert(check_attr_bval(proc_id, head, PKCS11_CKA_LOCAL, true));
1125fa247a2aSRuchika Gupta 		break;
112663f89caaSJens Wiklander 	default:
112763f89caaSJens Wiklander 		TEE_Panic(proc_id);
112863f89caaSJens Wiklander 		break;
112963f89caaSJens Wiklander 	}
113063f89caaSJens Wiklander 
1131fa247a2aSRuchika Gupta 	switch (proc_id) {
1132fa247a2aSRuchika Gupta 	case PKCS11_CKM_GENERIC_SECRET_KEY_GEN:
1133fa247a2aSRuchika Gupta 		assert(get_key_type(head) == PKCS11_CKK_GENERIC_SECRET);
1134fa247a2aSRuchika Gupta 		break;
1135fa247a2aSRuchika Gupta 	case PKCS11_CKM_AES_KEY_GEN:
1136fa247a2aSRuchika Gupta 		assert(get_key_type(head) == PKCS11_CKK_AES);
1137fa247a2aSRuchika Gupta 		break;
1138fa247a2aSRuchika Gupta 	case PKCS11_PROCESSING_IMPORT:
1139fa247a2aSRuchika Gupta 	default:
1140fa247a2aSRuchika Gupta 		break;
1141fa247a2aSRuchika Gupta 	}
1142fa247a2aSRuchika Gupta 
114363f89caaSJens Wiklander 	return PKCS11_CKR_OK;
114463f89caaSJens Wiklander }
1145512cbf1dSJens Wiklander 
11462d0cd829SRuchika Gupta /* Return min and max key size supported for a key_type in bytes */
1147512cbf1dSJens Wiklander static void get_key_min_max_sizes(enum pkcs11_key_type key_type,
1148512cbf1dSJens Wiklander 				  uint32_t *min_key_size,
1149512cbf1dSJens Wiklander 				  uint32_t *max_key_size)
1150512cbf1dSJens Wiklander {
1151512cbf1dSJens Wiklander 	enum pkcs11_mechanism_id mechanism = PKCS11_CKM_UNDEFINED_ID;
1152512cbf1dSJens Wiklander 
1153512cbf1dSJens Wiklander 	switch (key_type) {
1154fa247a2aSRuchika Gupta 	case PKCS11_CKK_GENERIC_SECRET:
1155fa247a2aSRuchika Gupta 		mechanism = PKCS11_CKM_GENERIC_SECRET_KEY_GEN;
1156fa247a2aSRuchika Gupta 		break;
1157512cbf1dSJens Wiklander 	case PKCS11_CKK_AES:
1158512cbf1dSJens Wiklander 		mechanism = PKCS11_CKM_AES_KEY_GEN;
1159512cbf1dSJens Wiklander 		break;
11601f45c9cfSRuchika Gupta 	case PKCS11_CKK_MD5_HMAC:
11611f45c9cfSRuchika Gupta 		mechanism = PKCS11_CKM_MD5_HMAC;
11621f45c9cfSRuchika Gupta 		break;
11631f45c9cfSRuchika Gupta 	case PKCS11_CKK_SHA_1_HMAC:
11641f45c9cfSRuchika Gupta 		mechanism = PKCS11_CKM_SHA_1_HMAC;
11651f45c9cfSRuchika Gupta 		break;
11661f45c9cfSRuchika Gupta 	case PKCS11_CKK_SHA224_HMAC:
11671f45c9cfSRuchika Gupta 		mechanism = PKCS11_CKM_SHA224_HMAC;
11681f45c9cfSRuchika Gupta 		break;
1169a339a354SEtienne Carriere 	case PKCS11_CKK_SHA256_HMAC:
1170a339a354SEtienne Carriere 		mechanism = PKCS11_CKM_SHA256_HMAC;
1171a339a354SEtienne Carriere 		break;
11721f45c9cfSRuchika Gupta 	case PKCS11_CKK_SHA384_HMAC:
11731f45c9cfSRuchika Gupta 		mechanism = PKCS11_CKM_SHA384_HMAC;
11741f45c9cfSRuchika Gupta 		break;
11751f45c9cfSRuchika Gupta 	case PKCS11_CKK_SHA512_HMAC:
11761f45c9cfSRuchika Gupta 		mechanism = PKCS11_CKM_SHA512_HMAC;
11771f45c9cfSRuchika Gupta 		break;
1178512cbf1dSJens Wiklander 	default:
1179512cbf1dSJens Wiklander 		TEE_Panic(key_type);
1180512cbf1dSJens Wiklander 		break;
1181512cbf1dSJens Wiklander 	}
1182512cbf1dSJens Wiklander 
11832d0cd829SRuchika Gupta 	mechanism_supported_key_sizes_bytes(mechanism, min_key_size,
1184512cbf1dSJens Wiklander 					    max_key_size);
1185512cbf1dSJens Wiklander }
1186512cbf1dSJens Wiklander 
1187512cbf1dSJens Wiklander enum pkcs11_rc check_created_attrs(struct obj_attrs *key1,
1188512cbf1dSJens Wiklander 				   struct obj_attrs *key2)
1189512cbf1dSJens Wiklander {
1190512cbf1dSJens Wiklander 	enum pkcs11_rc rc = PKCS11_CKR_OK;
1191512cbf1dSJens Wiklander 	struct obj_attrs *secret = NULL;
1192512cbf1dSJens Wiklander 	uint32_t max_key_size = 0;
1193512cbf1dSJens Wiklander 	uint32_t min_key_size = 0;
1194512cbf1dSJens Wiklander 	uint32_t key_length = 0;
1195512cbf1dSJens Wiklander 
1196512cbf1dSJens Wiklander 	switch (get_class(key1)) {
1197512cbf1dSJens Wiklander 	case PKCS11_CKO_SECRET_KEY:
1198512cbf1dSJens Wiklander 		secret = key1;
1199512cbf1dSJens Wiklander 		break;
1200512cbf1dSJens Wiklander 	default:
1201512cbf1dSJens Wiklander 		return PKCS11_CKR_ATTRIBUTE_VALUE_INVALID;
1202512cbf1dSJens Wiklander 	}
1203512cbf1dSJens Wiklander 
1204512cbf1dSJens Wiklander 	if (key2)
1205512cbf1dSJens Wiklander 		return PKCS11_CKR_ATTRIBUTE_VALUE_INVALID;
1206512cbf1dSJens Wiklander 
1207512cbf1dSJens Wiklander 	if (secret) {
1208512cbf1dSJens Wiklander 		switch (get_key_type(secret)) {
1209512cbf1dSJens Wiklander 		case PKCS11_CKK_AES:
1210512cbf1dSJens Wiklander 		case PKCS11_CKK_GENERIC_SECRET:
1211512cbf1dSJens Wiklander 		case PKCS11_CKK_MD5_HMAC:
1212512cbf1dSJens Wiklander 		case PKCS11_CKK_SHA_1_HMAC:
1213512cbf1dSJens Wiklander 		case PKCS11_CKK_SHA224_HMAC:
1214512cbf1dSJens Wiklander 		case PKCS11_CKK_SHA256_HMAC:
1215512cbf1dSJens Wiklander 		case PKCS11_CKK_SHA384_HMAC:
1216512cbf1dSJens Wiklander 		case PKCS11_CKK_SHA512_HMAC:
1217512cbf1dSJens Wiklander 			break;
1218512cbf1dSJens Wiklander 		default:
1219512cbf1dSJens Wiklander 			return PKCS11_CKR_TEMPLATE_INCONSISTENT;
1220512cbf1dSJens Wiklander 		}
1221512cbf1dSJens Wiklander 
1222512cbf1dSJens Wiklander 		/* Get key size */
1223512cbf1dSJens Wiklander 		rc = get_u32_attribute(secret, PKCS11_CKA_VALUE_LEN,
1224512cbf1dSJens Wiklander 				       &key_length);
1225512cbf1dSJens Wiklander 		if (rc)
1226d1d44372SRuchika Gupta 			return PKCS11_CKR_TEMPLATE_INCOMPLETE;
1227512cbf1dSJens Wiklander 	}
1228512cbf1dSJens Wiklander 
1229512cbf1dSJens Wiklander 	get_key_min_max_sizes(get_key_type(key1), &min_key_size, &max_key_size);
1230512cbf1dSJens Wiklander 	if (key_length < min_key_size || key_length > max_key_size) {
1231512cbf1dSJens Wiklander 		EMSG("Length %"PRIu32" vs range [%"PRIu32" %"PRIu32"]",
1232512cbf1dSJens Wiklander 		     key_length, min_key_size, max_key_size);
1233512cbf1dSJens Wiklander 
1234512cbf1dSJens Wiklander 		return PKCS11_CKR_KEY_SIZE_RANGE;
1235512cbf1dSJens Wiklander 	}
1236512cbf1dSJens Wiklander 
123749ed60abSRuchika Gupta 	if (secret && get_key_type(secret) == PKCS11_CKK_AES) {
123849ed60abSRuchika Gupta 		if (key_length != 16 && key_length != 24 && key_length != 32)
123949ed60abSRuchika Gupta 			return PKCS11_CKR_KEY_SIZE_RANGE;
124049ed60abSRuchika Gupta 	}
124149ed60abSRuchika Gupta 
1242512cbf1dSJens Wiklander 	return PKCS11_CKR_OK;
1243512cbf1dSJens Wiklander }
1244512cbf1dSJens Wiklander 
1245512cbf1dSJens Wiklander /* Check processing ID against attribute ALLOWED_MECHANISMS if any */
1246512cbf1dSJens Wiklander static bool parent_key_complies_allowed_processings(uint32_t proc_id,
1247512cbf1dSJens Wiklander 						    struct obj_attrs *head)
1248512cbf1dSJens Wiklander {
1249512cbf1dSJens Wiklander 	char *attr = NULL;
1250512cbf1dSJens Wiklander 	uint32_t size = 0;
1251512cbf1dSJens Wiklander 	uint32_t proc = 0;
1252512cbf1dSJens Wiklander 	size_t count = 0;
12536a760c9eSEtienne Carriere 	enum pkcs11_rc rc = PKCS11_CKR_GENERAL_ERROR;
1254512cbf1dSJens Wiklander 
12556a760c9eSEtienne Carriere 	rc = get_attribute_ptr(head, PKCS11_CKA_ALLOWED_MECHANISMS,
12566a760c9eSEtienne Carriere 			       (void *)&attr, &size);
12576a760c9eSEtienne Carriere 	if (rc == PKCS11_RV_NOT_FOUND)
1258512cbf1dSJens Wiklander 		return true;
12596a760c9eSEtienne Carriere 	if (rc) {
12606a760c9eSEtienne Carriere 		EMSG("unexpected attributes state");
12616a760c9eSEtienne Carriere 		TEE_Panic(TEE_ERROR_BAD_STATE);
1262512cbf1dSJens Wiklander 	}
1263512cbf1dSJens Wiklander 
1264512cbf1dSJens Wiklander 	for (count = size / sizeof(uint32_t); count; count--) {
1265512cbf1dSJens Wiklander 		TEE_MemMove(&proc, attr, sizeof(uint32_t));
1266512cbf1dSJens Wiklander 		attr += sizeof(uint32_t);
1267512cbf1dSJens Wiklander 
1268512cbf1dSJens Wiklander 		if (proc == proc_id)
1269512cbf1dSJens Wiklander 			return true;
1270512cbf1dSJens Wiklander 	}
1271512cbf1dSJens Wiklander 
1272512cbf1dSJens Wiklander 	DMSG("can't find %s in allowed list", id2str_proc(proc_id));
1273512cbf1dSJens Wiklander 	return false;
1274512cbf1dSJens Wiklander }
1275512cbf1dSJens Wiklander 
1276512cbf1dSJens Wiklander static enum pkcs11_attr_id func_to_attr(enum processing_func func)
1277512cbf1dSJens Wiklander {
1278512cbf1dSJens Wiklander 	switch (func) {
1279512cbf1dSJens Wiklander 	case PKCS11_FUNCTION_ENCRYPT:
1280512cbf1dSJens Wiklander 		return PKCS11_CKA_ENCRYPT;
1281512cbf1dSJens Wiklander 	case PKCS11_FUNCTION_DECRYPT:
1282512cbf1dSJens Wiklander 		return PKCS11_CKA_DECRYPT;
1283512cbf1dSJens Wiklander 	case PKCS11_FUNCTION_SIGN:
1284512cbf1dSJens Wiklander 		return PKCS11_CKA_SIGN;
1285512cbf1dSJens Wiklander 	case PKCS11_FUNCTION_VERIFY:
1286512cbf1dSJens Wiklander 		return PKCS11_CKA_VERIFY;
1287512cbf1dSJens Wiklander 	case PKCS11_FUNCTION_WRAP:
1288512cbf1dSJens Wiklander 		return PKCS11_CKA_WRAP;
1289512cbf1dSJens Wiklander 	case PKCS11_FUNCTION_UNWRAP:
1290512cbf1dSJens Wiklander 		return PKCS11_CKA_UNWRAP;
1291512cbf1dSJens Wiklander 	case PKCS11_FUNCTION_DERIVE:
1292512cbf1dSJens Wiklander 		return PKCS11_CKA_DERIVE;
1293512cbf1dSJens Wiklander 	default:
1294512cbf1dSJens Wiklander 		return PKCS11_CKA_UNDEFINED_ID;
1295512cbf1dSJens Wiklander 	}
1296512cbf1dSJens Wiklander }
1297512cbf1dSJens Wiklander 
1298512cbf1dSJens Wiklander enum pkcs11_rc
1299512cbf1dSJens Wiklander check_parent_attrs_against_processing(enum pkcs11_mechanism_id proc_id,
1300512cbf1dSJens Wiklander 				      enum processing_func function,
1301512cbf1dSJens Wiklander 				      struct obj_attrs *head)
1302512cbf1dSJens Wiklander {
1303512cbf1dSJens Wiklander 	enum pkcs11_class_id key_class = get_class(head);
1304512cbf1dSJens Wiklander 	enum pkcs11_key_type key_type = get_key_type(head);
1305512cbf1dSJens Wiklander 	enum pkcs11_attr_id attr = func_to_attr(function);
1306512cbf1dSJens Wiklander 
1307512cbf1dSJens Wiklander 	if (!get_bool(head, attr)) {
1308512cbf1dSJens Wiklander 		DMSG("%s not permitted", id2str_attr(attr));
1309512cbf1dSJens Wiklander 		return PKCS11_CKR_KEY_FUNCTION_NOT_PERMITTED;
1310512cbf1dSJens Wiklander 	}
1311512cbf1dSJens Wiklander 
1312512cbf1dSJens Wiklander 	/* Check processing complies with parent key family */
1313512cbf1dSJens Wiklander 	switch (proc_id) {
1314512cbf1dSJens Wiklander 	case PKCS11_CKM_AES_ECB:
1315512cbf1dSJens Wiklander 	case PKCS11_CKM_AES_CBC:
1316512cbf1dSJens Wiklander 	case PKCS11_CKM_AES_CBC_PAD:
1317512cbf1dSJens Wiklander 	case PKCS11_CKM_AES_CTS:
1318512cbf1dSJens Wiklander 	case PKCS11_CKM_AES_CTR:
1319512cbf1dSJens Wiklander 		if (key_class == PKCS11_CKO_SECRET_KEY &&
1320512cbf1dSJens Wiklander 		    key_type == PKCS11_CKK_AES)
1321512cbf1dSJens Wiklander 			break;
1322512cbf1dSJens Wiklander 
1323512cbf1dSJens Wiklander 		DMSG("%s invalid key %s/%s", id2str_proc(proc_id),
1324512cbf1dSJens Wiklander 		     id2str_class(key_class), id2str_key_type(key_type));
1325512cbf1dSJens Wiklander 
1326512cbf1dSJens Wiklander 		return PKCS11_CKR_KEY_FUNCTION_NOT_PERMITTED;
1327512cbf1dSJens Wiklander 
1328c3033708SRuchika Gupta 	case PKCS11_CKM_AES_ECB_ENCRYPT_DATA:
1329c3033708SRuchika Gupta 	case PKCS11_CKM_AES_CBC_ENCRYPT_DATA:
1330c3033708SRuchika Gupta 		if (key_class != PKCS11_CKO_SECRET_KEY &&
1331c3033708SRuchika Gupta 		    key_type != PKCS11_CKK_AES)
1332c3033708SRuchika Gupta 			return PKCS11_CKR_KEY_FUNCTION_NOT_PERMITTED;
1333c3033708SRuchika Gupta 
1334c3033708SRuchika Gupta 		if (get_bool(head, PKCS11_CKA_ENCRYPT)) {
1335c3033708SRuchika Gupta 			/*
1336c3033708SRuchika Gupta 			 * Intentionally refuse to proceed despite
1337c3033708SRuchika Gupta 			 * PKCS#11 specifications v2.40 and v3.0 not expecting
1338c3033708SRuchika Gupta 			 * this behavior to avoid potential security issue
1339c3033708SRuchika Gupta 			 * where keys derived by these mechanisms can be
1340c3033708SRuchika Gupta 			 * revealed by doing data encryption using parent key.
1341c3033708SRuchika Gupta 			 */
1342c3033708SRuchika Gupta 			return PKCS11_CKR_FUNCTION_FAILED;
1343c3033708SRuchika Gupta 		}
1344c3033708SRuchika Gupta 
1345c3033708SRuchika Gupta 		break;
1346689f4e5bSRuchika Gupta 	case PKCS11_CKM_MD5_HMAC:
1347689f4e5bSRuchika Gupta 	case PKCS11_CKM_SHA_1_HMAC:
1348689f4e5bSRuchika Gupta 	case PKCS11_CKM_SHA224_HMAC:
1349689f4e5bSRuchika Gupta 	case PKCS11_CKM_SHA256_HMAC:
1350689f4e5bSRuchika Gupta 	case PKCS11_CKM_SHA384_HMAC:
1351689f4e5bSRuchika Gupta 	case PKCS11_CKM_SHA512_HMAC:
1352689f4e5bSRuchika Gupta 		if (key_class != PKCS11_CKO_SECRET_KEY)
1353689f4e5bSRuchika Gupta 			return PKCS11_CKR_KEY_FUNCTION_NOT_PERMITTED;
1354689f4e5bSRuchika Gupta 
1355689f4e5bSRuchika Gupta 		if (key_type == PKCS11_CKK_GENERIC_SECRET)
1356689f4e5bSRuchika Gupta 			break;
1357689f4e5bSRuchika Gupta 
1358689f4e5bSRuchika Gupta 		switch (proc_id) {
1359689f4e5bSRuchika Gupta 		case PKCS11_CKM_MD5_HMAC:
1360689f4e5bSRuchika Gupta 			if (key_type == PKCS11_CKK_MD5_HMAC)
1361689f4e5bSRuchika Gupta 				break;
1362689f4e5bSRuchika Gupta 			return PKCS11_CKR_KEY_FUNCTION_NOT_PERMITTED;
1363689f4e5bSRuchika Gupta 		case PKCS11_CKM_SHA_1_HMAC:
1364689f4e5bSRuchika Gupta 			if (key_type == PKCS11_CKK_SHA_1_HMAC)
1365689f4e5bSRuchika Gupta 				break;
1366689f4e5bSRuchika Gupta 			return PKCS11_CKR_KEY_FUNCTION_NOT_PERMITTED;
1367689f4e5bSRuchika Gupta 		case PKCS11_CKM_SHA224_HMAC:
1368689f4e5bSRuchika Gupta 			if (key_type == PKCS11_CKK_SHA224_HMAC)
1369689f4e5bSRuchika Gupta 				break;
1370689f4e5bSRuchika Gupta 			return PKCS11_CKR_KEY_FUNCTION_NOT_PERMITTED;
1371689f4e5bSRuchika Gupta 		case PKCS11_CKM_SHA256_HMAC:
1372689f4e5bSRuchika Gupta 			if (key_type == PKCS11_CKK_SHA256_HMAC)
1373689f4e5bSRuchika Gupta 				break;
1374689f4e5bSRuchika Gupta 			return PKCS11_CKR_KEY_FUNCTION_NOT_PERMITTED;
1375689f4e5bSRuchika Gupta 		case PKCS11_CKM_SHA384_HMAC:
1376689f4e5bSRuchika Gupta 			if (key_type == PKCS11_CKK_SHA384_HMAC)
1377689f4e5bSRuchika Gupta 				break;
1378689f4e5bSRuchika Gupta 			return PKCS11_CKR_KEY_FUNCTION_NOT_PERMITTED;
1379689f4e5bSRuchika Gupta 		case PKCS11_CKM_SHA512_HMAC:
1380689f4e5bSRuchika Gupta 			if (key_type == PKCS11_CKK_SHA512_HMAC)
1381689f4e5bSRuchika Gupta 				break;
1382689f4e5bSRuchika Gupta 			return PKCS11_CKR_KEY_FUNCTION_NOT_PERMITTED;
1383689f4e5bSRuchika Gupta 		default:
1384689f4e5bSRuchika Gupta 			return PKCS11_CKR_KEY_FUNCTION_NOT_PERMITTED;
1385689f4e5bSRuchika Gupta 		}
1386689f4e5bSRuchika Gupta 		break;
1387689f4e5bSRuchika Gupta 
1388512cbf1dSJens Wiklander 	default:
1389512cbf1dSJens Wiklander 		DMSG("Invalid processing %#"PRIx32"/%s", proc_id,
1390512cbf1dSJens Wiklander 		     id2str_proc(proc_id));
1391512cbf1dSJens Wiklander 
1392512cbf1dSJens Wiklander 		return PKCS11_CKR_MECHANISM_INVALID;
1393512cbf1dSJens Wiklander 	}
1394512cbf1dSJens Wiklander 
1395512cbf1dSJens Wiklander 	if (!parent_key_complies_allowed_processings(proc_id, head)) {
1396512cbf1dSJens Wiklander 		DMSG("Allowed mechanism failed");
1397512cbf1dSJens Wiklander 		return PKCS11_CKR_KEY_FUNCTION_NOT_PERMITTED;
1398512cbf1dSJens Wiklander 	}
1399512cbf1dSJens Wiklander 
1400512cbf1dSJens Wiklander 	return PKCS11_CKR_OK;
1401512cbf1dSJens Wiklander }
1402783c1515SRuchika Gupta 
1403783c1515SRuchika Gupta bool attribute_is_exportable(struct pkcs11_attribute_head *req_attr,
1404783c1515SRuchika Gupta 			     struct pkcs11_object *obj)
1405783c1515SRuchika Gupta {
1406783c1515SRuchika Gupta 	uint8_t boolval = 0;
1407783c1515SRuchika Gupta 	uint32_t boolsize = 0;
1408783c1515SRuchika Gupta 	enum pkcs11_rc rc = PKCS11_CKR_GENERAL_ERROR;
1409783c1515SRuchika Gupta 	enum pkcs11_class_id key_class = get_class(obj->attributes);
1410783c1515SRuchika Gupta 
1411783c1515SRuchika Gupta 	if (key_class != PKCS11_CKO_SECRET_KEY &&
1412783c1515SRuchika Gupta 	    key_class != PKCS11_CKO_PRIVATE_KEY)
1413783c1515SRuchika Gupta 		return true;
1414783c1515SRuchika Gupta 
1415783c1515SRuchika Gupta 	switch (req_attr->id) {
1416783c1515SRuchika Gupta 	case PKCS11_CKA_PRIVATE_EXPONENT:
1417783c1515SRuchika Gupta 	case PKCS11_CKA_PRIME_1:
1418783c1515SRuchika Gupta 	case PKCS11_CKA_PRIME_2:
1419783c1515SRuchika Gupta 	case PKCS11_CKA_EXPONENT_1:
1420783c1515SRuchika Gupta 	case PKCS11_CKA_EXPONENT_2:
1421783c1515SRuchika Gupta 	case PKCS11_CKA_COEFFICIENT:
1422783c1515SRuchika Gupta 	case PKCS11_CKA_VALUE:
1423783c1515SRuchika Gupta 		boolsize = sizeof(boolval);
1424783c1515SRuchika Gupta 		rc = get_attribute(obj->attributes, PKCS11_CKA_EXTRACTABLE,
1425783c1515SRuchika Gupta 				   &boolval, &boolsize);
1426783c1515SRuchika Gupta 		if (rc || boolval == PKCS11_FALSE)
1427783c1515SRuchika Gupta 			return false;
1428783c1515SRuchika Gupta 
1429783c1515SRuchika Gupta 		boolsize = sizeof(boolval);
1430783c1515SRuchika Gupta 		rc = get_attribute(obj->attributes, PKCS11_CKA_SENSITIVE,
1431783c1515SRuchika Gupta 				   &boolval, &boolsize);
1432783c1515SRuchika Gupta 		if (rc || boolval == PKCS11_TRUE)
1433783c1515SRuchika Gupta 			return false;
1434783c1515SRuchika Gupta 		break;
1435783c1515SRuchika Gupta 	default:
1436783c1515SRuchika Gupta 		break;
1437783c1515SRuchika Gupta 	}
1438783c1515SRuchika Gupta 
1439783c1515SRuchika Gupta 	return true;
1440783c1515SRuchika Gupta }
14412d25a9bcSRuchika Gupta 
14422d25a9bcSRuchika Gupta static bool attr_is_modifiable_any_key(struct pkcs11_attribute_head *attr)
14432d25a9bcSRuchika Gupta {
14442d25a9bcSRuchika Gupta 	switch (attr->id) {
14452d25a9bcSRuchika Gupta 	case PKCS11_CKA_ID:
14462d25a9bcSRuchika Gupta 	case PKCS11_CKA_START_DATE:
14472d25a9bcSRuchika Gupta 	case PKCS11_CKA_END_DATE:
14482d25a9bcSRuchika Gupta 	case PKCS11_CKA_DERIVE:
14492d25a9bcSRuchika Gupta 		return true;
14502d25a9bcSRuchika Gupta 	default:
14512d25a9bcSRuchika Gupta 		return false;
14522d25a9bcSRuchika Gupta 	}
14532d25a9bcSRuchika Gupta }
14542d25a9bcSRuchika Gupta 
14552d25a9bcSRuchika Gupta static bool attr_is_modifiable_secret_key(struct pkcs11_attribute_head *attr,
14562d25a9bcSRuchika Gupta 					  struct pkcs11_session *session,
14572d25a9bcSRuchika Gupta 					  struct pkcs11_object *obj)
14582d25a9bcSRuchika Gupta {
14592d25a9bcSRuchika Gupta 	switch (attr->id) {
14602d25a9bcSRuchika Gupta 	case PKCS11_CKA_ENCRYPT:
14612d25a9bcSRuchika Gupta 	case PKCS11_CKA_DECRYPT:
14622d25a9bcSRuchika Gupta 	case PKCS11_CKA_SIGN:
14632d25a9bcSRuchika Gupta 	case PKCS11_CKA_VERIFY:
14642d25a9bcSRuchika Gupta 	case PKCS11_CKA_WRAP:
14652d25a9bcSRuchika Gupta 	case PKCS11_CKA_UNWRAP:
14662d25a9bcSRuchika Gupta 		return true;
14672d25a9bcSRuchika Gupta 	/* Can't be modified once set to CK_FALSE - 12 in Table 10 */
14682d25a9bcSRuchika Gupta 	case PKCS11_CKA_EXTRACTABLE:
14692d25a9bcSRuchika Gupta 		return get_bool(obj->attributes, attr->id);
14702d25a9bcSRuchika Gupta 	/* Can't be modified once set to CK_TRUE - 11 in Table 10 */
14712d25a9bcSRuchika Gupta 	case PKCS11_CKA_SENSITIVE:
14722d25a9bcSRuchika Gupta 	case PKCS11_CKA_WRAP_WITH_TRUSTED:
14732d25a9bcSRuchika Gupta 		return !get_bool(obj->attributes, attr->id);
14742d25a9bcSRuchika Gupta 	/* Change in CKA_TRUSTED can only be done by SO */
14752d25a9bcSRuchika Gupta 	case PKCS11_CKA_TRUSTED:
14762d25a9bcSRuchika Gupta 		return pkcs11_session_is_so(session);
14772d25a9bcSRuchika Gupta 	case PKCS11_CKA_NEVER_EXTRACTABLE:
14782d25a9bcSRuchika Gupta 	case PKCS11_CKA_ALWAYS_SENSITIVE:
14792d25a9bcSRuchika Gupta 		return false;
14802d25a9bcSRuchika Gupta 	default:
14812d25a9bcSRuchika Gupta 		return false;
14822d25a9bcSRuchika Gupta 	}
14832d25a9bcSRuchika Gupta }
14842d25a9bcSRuchika Gupta 
14852d25a9bcSRuchika Gupta static bool attr_is_modifiable_public_key(struct pkcs11_attribute_head *attr,
14862d25a9bcSRuchika Gupta 					  struct pkcs11_session *session,
14872d25a9bcSRuchika Gupta 					  struct pkcs11_object *obj __unused)
14882d25a9bcSRuchika Gupta {
14892d25a9bcSRuchika Gupta 	switch (attr->id) {
14902d25a9bcSRuchika Gupta 	case PKCS11_CKA_SUBJECT:
14912d25a9bcSRuchika Gupta 	case PKCS11_CKA_ENCRYPT:
14922d25a9bcSRuchika Gupta 	case PKCS11_CKA_VERIFY:
14932d25a9bcSRuchika Gupta 	case PKCS11_CKA_VERIFY_RECOVER:
14942d25a9bcSRuchika Gupta 	case PKCS11_CKA_WRAP:
14952d25a9bcSRuchika Gupta 		return true;
14962d25a9bcSRuchika Gupta 	case PKCS11_CKA_TRUSTED:
14972d25a9bcSRuchika Gupta 		/* Change in CKA_TRUSTED can only be done by SO */
14982d25a9bcSRuchika Gupta 		return pkcs11_session_is_so(session);
14992d25a9bcSRuchika Gupta 	default:
15002d25a9bcSRuchika Gupta 		return false;
15012d25a9bcSRuchika Gupta 	}
15022d25a9bcSRuchika Gupta }
15032d25a9bcSRuchika Gupta 
15042d25a9bcSRuchika Gupta static bool attr_is_modifiable_private_key(struct pkcs11_attribute_head *attr,
15052d25a9bcSRuchika Gupta 					   struct pkcs11_session *sess __unused,
15062d25a9bcSRuchika Gupta 					   struct pkcs11_object *obj)
15072d25a9bcSRuchika Gupta {
15082d25a9bcSRuchika Gupta 	switch (attr->id) {
15092d25a9bcSRuchika Gupta 	case PKCS11_CKA_SUBJECT:
15102d25a9bcSRuchika Gupta 	case PKCS11_CKA_DECRYPT:
15112d25a9bcSRuchika Gupta 	case PKCS11_CKA_SIGN:
15122d25a9bcSRuchika Gupta 	case PKCS11_CKA_SIGN_RECOVER:
15132d25a9bcSRuchika Gupta 	case PKCS11_CKA_UNWRAP:
15142d25a9bcSRuchika Gupta 	/*
15152d25a9bcSRuchika Gupta 	 * TBD: Revisit if we don't support PKCS11_CKA_PUBLIC_KEY_INFO
15162d25a9bcSRuchika Gupta 	 * Specification mentions that if this attribute is
15172d25a9bcSRuchika Gupta 	 * supplied as part of a template for C_CreateObject, C_CopyObject or
15182d25a9bcSRuchika Gupta 	 * C_SetAttributeValue for a private key, the token MUST verify
15192d25a9bcSRuchika Gupta 	 * correspondence between the private key data and the public key data
15202d25a9bcSRuchika Gupta 	 * as supplied in CKA_PUBLIC_KEY_INFO. This needs to be
15212d25a9bcSRuchika Gupta 	 * taken care of when this object type will be implemented
15222d25a9bcSRuchika Gupta 	 */
15232d25a9bcSRuchika Gupta 	case PKCS11_CKA_PUBLIC_KEY_INFO:
15242d25a9bcSRuchika Gupta 		return true;
15252d25a9bcSRuchika Gupta 	/* Can't be modified once set to CK_FALSE - 12 in Table 10 */
15262d25a9bcSRuchika Gupta 	case PKCS11_CKA_EXTRACTABLE:
15272d25a9bcSRuchika Gupta 		return get_bool(obj->attributes, attr->id);
15282d25a9bcSRuchika Gupta 	/* Can't be modified once set to CK_TRUE - 11 in Table 10 */
15292d25a9bcSRuchika Gupta 	case PKCS11_CKA_SENSITIVE:
15302d25a9bcSRuchika Gupta 	case PKCS11_CKA_WRAP_WITH_TRUSTED:
15312d25a9bcSRuchika Gupta 		return !get_bool(obj->attributes, attr->id);
15322d25a9bcSRuchika Gupta 	case PKCS11_CKA_NEVER_EXTRACTABLE:
15332d25a9bcSRuchika Gupta 	case PKCS11_CKA_ALWAYS_SENSITIVE:
15342d25a9bcSRuchika Gupta 		return false;
15352d25a9bcSRuchika Gupta 	default:
15362d25a9bcSRuchika Gupta 		return false;
15372d25a9bcSRuchika Gupta 	}
15382d25a9bcSRuchika Gupta }
15392d25a9bcSRuchika Gupta 
15402d25a9bcSRuchika Gupta static bool attribute_is_modifiable(struct pkcs11_session *session,
15412d25a9bcSRuchika Gupta 				    struct pkcs11_attribute_head *req_attr,
15422d25a9bcSRuchika Gupta 				    struct pkcs11_object *obj,
15432d25a9bcSRuchika Gupta 				    enum pkcs11_class_id class,
15442d25a9bcSRuchika Gupta 				    enum processing_func function)
15452d25a9bcSRuchika Gupta {
15462d25a9bcSRuchika Gupta 	/* Check modifiable attributes common to any object */
15472d25a9bcSRuchika Gupta 	switch (req_attr->id) {
15482d25a9bcSRuchika Gupta 	case PKCS11_CKA_LABEL:
15492d25a9bcSRuchika Gupta 		return true;
15502d25a9bcSRuchika Gupta 	case PKCS11_CKA_TOKEN:
15512d25a9bcSRuchika Gupta 	case PKCS11_CKA_MODIFIABLE:
15522d25a9bcSRuchika Gupta 	case PKCS11_CKA_DESTROYABLE:
15532d25a9bcSRuchika Gupta 	case PKCS11_CKA_PRIVATE:
15542d25a9bcSRuchika Gupta 		return function == PKCS11_FUNCTION_COPY;
15552d25a9bcSRuchika Gupta 	case PKCS11_CKA_COPYABLE:
15562d25a9bcSRuchika Gupta 		/*
15572d25a9bcSRuchika Gupta 		 * Specification mentions that if the attribute value is false
15582d25a9bcSRuchika Gupta 		 * it can't be set to true. Reading this we assume that it
15592d25a9bcSRuchika Gupta 		 * should be possible to modify this attribute even though this
15602d25a9bcSRuchika Gupta 		 * is not marked as modifiable in Table 10 if done in right
15612d25a9bcSRuchika Gupta 		 * direction i.e from TRUE -> FALSE.
15622d25a9bcSRuchika Gupta 		 */
15632d25a9bcSRuchika Gupta 		return get_bool(obj->attributes, req_attr->id);
15642d25a9bcSRuchika Gupta 	default:
15652d25a9bcSRuchika Gupta 		break;
15662d25a9bcSRuchika Gupta 	}
15672d25a9bcSRuchika Gupta 
15682d25a9bcSRuchika Gupta 	/* Attribute checking based on class type */
15692d25a9bcSRuchika Gupta 	switch (class) {
15702d25a9bcSRuchika Gupta 	case PKCS11_CKO_SECRET_KEY:
15712d25a9bcSRuchika Gupta 	case PKCS11_CKO_PUBLIC_KEY:
15722d25a9bcSRuchika Gupta 	case PKCS11_CKO_PRIVATE_KEY:
15732d25a9bcSRuchika Gupta 		if (attr_is_modifiable_any_key(req_attr))
15742d25a9bcSRuchika Gupta 			return true;
15752d25a9bcSRuchika Gupta 		if (class == PKCS11_CKO_SECRET_KEY &&
15762d25a9bcSRuchika Gupta 		    attr_is_modifiable_secret_key(req_attr, session, obj))
15772d25a9bcSRuchika Gupta 			return true;
15782d25a9bcSRuchika Gupta 		if (class == PKCS11_CKO_PUBLIC_KEY &&
15792d25a9bcSRuchika Gupta 		    attr_is_modifiable_public_key(req_attr, session, obj))
15802d25a9bcSRuchika Gupta 			return true;
15812d25a9bcSRuchika Gupta 		if (class == PKCS11_CKO_PRIVATE_KEY &&
15822d25a9bcSRuchika Gupta 		    attr_is_modifiable_private_key(req_attr, session, obj))
15832d25a9bcSRuchika Gupta 			return true;
15842d25a9bcSRuchika Gupta 		break;
15852d25a9bcSRuchika Gupta 	case PKCS11_CKO_DATA:
15862d25a9bcSRuchika Gupta 		/* None of the data object attributes are modifiable */
15872d25a9bcSRuchika Gupta 		return false;
15882d25a9bcSRuchika Gupta 	default:
15892d25a9bcSRuchika Gupta 		break;
15902d25a9bcSRuchika Gupta 	}
15912d25a9bcSRuchika Gupta 
15922d25a9bcSRuchika Gupta 	return false;
15932d25a9bcSRuchika Gupta }
15942d25a9bcSRuchika Gupta 
15952d25a9bcSRuchika Gupta enum pkcs11_rc check_attrs_against_modification(struct pkcs11_session *session,
15962d25a9bcSRuchika Gupta 						struct obj_attrs *head,
15972d25a9bcSRuchika Gupta 						struct pkcs11_object *obj,
15982d25a9bcSRuchika Gupta 						enum processing_func function)
15992d25a9bcSRuchika Gupta {
16002d25a9bcSRuchika Gupta 	enum pkcs11_class_id class = PKCS11_CKO_UNDEFINED_ID;
16012d25a9bcSRuchika Gupta 	char *cur = NULL;
16022d25a9bcSRuchika Gupta 	char *end = NULL;
16032d25a9bcSRuchika Gupta 	size_t len = 0;
16042d25a9bcSRuchika Gupta 
16052d25a9bcSRuchika Gupta 	class = get_class(obj->attributes);
16062d25a9bcSRuchika Gupta 
16072d25a9bcSRuchika Gupta 	cur = (char *)head + sizeof(struct obj_attrs);
16082d25a9bcSRuchika Gupta 	end = cur + head->attrs_size;
16092d25a9bcSRuchika Gupta 
16102d25a9bcSRuchika Gupta 	for (; cur < end; cur += len) {
16112d25a9bcSRuchika Gupta 		/* Structure aligned copy of the pkcs11_ref in the object */
16122d25a9bcSRuchika Gupta 		struct pkcs11_attribute_head cli_ref = { };
16132d25a9bcSRuchika Gupta 
16142d25a9bcSRuchika Gupta 		TEE_MemMove(&cli_ref, cur, sizeof(cli_ref));
16152d25a9bcSRuchika Gupta 		len = sizeof(cli_ref) + cli_ref.size;
16162d25a9bcSRuchika Gupta 
16172d25a9bcSRuchika Gupta 		/*
16182d25a9bcSRuchika Gupta 		 * Check 1 - Check if attribute belongs to the object
16192d25a9bcSRuchika Gupta 		 * The obj->attributes has all the attributes in
16202d25a9bcSRuchika Gupta 		 * it which are allowed for an object.
16212d25a9bcSRuchika Gupta 		 */
16222d25a9bcSRuchika Gupta 		if (get_attribute_ptr(obj->attributes, cli_ref.id, NULL,
16232d25a9bcSRuchika Gupta 				      NULL) == PKCS11_RV_NOT_FOUND)
16242d25a9bcSRuchika Gupta 			return PKCS11_CKR_ATTRIBUTE_TYPE_INVALID;
16252d25a9bcSRuchika Gupta 
16262d25a9bcSRuchika Gupta 		/* Check 2 - Is attribute modifiable */
16272d25a9bcSRuchika Gupta 		if (!attribute_is_modifiable(session, &cli_ref, obj, class,
16282d25a9bcSRuchika Gupta 					     function))
16292d25a9bcSRuchika Gupta 			return PKCS11_CKR_ATTRIBUTE_READ_ONLY;
16302d25a9bcSRuchika Gupta 
16312d25a9bcSRuchika Gupta 		/*
16322d25a9bcSRuchika Gupta 		 * Checks for modification in PKCS11_CKA_TOKEN and
16332d25a9bcSRuchika Gupta 		 * PKCS11_CKA_PRIVATE are required for PKCS11_FUNCTION_COPY
16342d25a9bcSRuchika Gupta 		 * only, so skip them for PKCS11_FUNCTION_MODIFY.
16352d25a9bcSRuchika Gupta 		 */
16362d25a9bcSRuchika Gupta 		if (function == PKCS11_FUNCTION_MODIFY)
16372d25a9bcSRuchika Gupta 			continue;
16382d25a9bcSRuchika Gupta 
16392d25a9bcSRuchika Gupta 		/*
16402d25a9bcSRuchika Gupta 		 * An attempt to copy an object to a token will fail for
16412d25a9bcSRuchika Gupta 		 * RO session
16422d25a9bcSRuchika Gupta 		 */
16432d25a9bcSRuchika Gupta 		if (cli_ref.id == PKCS11_CKA_TOKEN &&
16442d25a9bcSRuchika Gupta 		    get_bool(head, PKCS11_CKA_TOKEN)) {
16452d25a9bcSRuchika Gupta 			if (!pkcs11_session_is_read_write(session)) {
16462d25a9bcSRuchika Gupta 				DMSG("Can't copy to token in a RO session");
16472d25a9bcSRuchika Gupta 				return PKCS11_CKR_SESSION_READ_ONLY;
16482d25a9bcSRuchika Gupta 			}
16492d25a9bcSRuchika Gupta 		}
16502d25a9bcSRuchika Gupta 
16512d25a9bcSRuchika Gupta 		if (cli_ref.id == PKCS11_CKA_PRIVATE) {
16522d25a9bcSRuchika Gupta 			bool parent_priv =
16532d25a9bcSRuchika Gupta 				get_bool(obj->attributes, cli_ref.id);
16542d25a9bcSRuchika Gupta 			bool obj_priv = get_bool(head, cli_ref.id);
16552d25a9bcSRuchika Gupta 
16562d25a9bcSRuchika Gupta 			/*
16572d25a9bcSRuchika Gupta 			 * If PKCS11_CKA_PRIVATE is being set to TRUE from
16582d25a9bcSRuchika Gupta 			 * FALSE, user has to be logged in
16592d25a9bcSRuchika Gupta 			 */
16602d25a9bcSRuchika Gupta 			if (!parent_priv && obj_priv) {
16612d25a9bcSRuchika Gupta 				if ((pkcs11_session_is_public(session) ||
16622d25a9bcSRuchika Gupta 				     pkcs11_session_is_so(session)))
16632d25a9bcSRuchika Gupta 					return PKCS11_CKR_USER_NOT_LOGGED_IN;
16642d25a9bcSRuchika Gupta 			}
1665df017b2bSRuchika Gupta 
1666df017b2bSRuchika Gupta 			/*
1667df017b2bSRuchika Gupta 			 * Restriction added - Even for Copy, do not allow
1668df017b2bSRuchika Gupta 			 * modification of CKA_PRIVATE from TRUE to FALSE
1669df017b2bSRuchika Gupta 			 */
1670df017b2bSRuchika Gupta 			if (parent_priv && !obj_priv)
1671df017b2bSRuchika Gupta 				return PKCS11_CKR_TEMPLATE_INCONSISTENT;
16722d25a9bcSRuchika Gupta 		}
16732d25a9bcSRuchika Gupta 	}
16742d25a9bcSRuchika Gupta 
16752d25a9bcSRuchika Gupta 	return PKCS11_CKR_OK;
16762d25a9bcSRuchika Gupta }
16778c499324SRuchika Gupta 
16788c499324SRuchika Gupta static enum pkcs11_rc set_secret_key_data(struct obj_attrs **head, void *data,
16798c499324SRuchika Gupta 					  size_t key_size)
16808c499324SRuchika Gupta {
16818c499324SRuchika Gupta 	uint32_t size = sizeof(uint32_t);
16828c499324SRuchika Gupta 	uint32_t key_length = 0;
16838c499324SRuchika Gupta 	enum pkcs11_rc rc = PKCS11_CKR_GENERAL_ERROR;
16848c499324SRuchika Gupta 
16858c499324SRuchika Gupta 	/* Get key size if present in template */
16868c499324SRuchika Gupta 	rc = get_attribute(*head, PKCS11_CKA_VALUE_LEN, &key_length, &size);
16878c499324SRuchika Gupta 	if (rc && rc != PKCS11_RV_NOT_FOUND)
16888c499324SRuchika Gupta 		return rc;
16898c499324SRuchika Gupta 
16908c499324SRuchika Gupta 	if (key_length) {
16918c499324SRuchika Gupta 		if (key_size < key_length)
16928c499324SRuchika Gupta 			return PKCS11_CKR_DATA_LEN_RANGE;
16938c499324SRuchika Gupta 	} else {
16948c499324SRuchika Gupta 		key_length = key_size;
16958c499324SRuchika Gupta 		rc = set_attribute(head, PKCS11_CKA_VALUE_LEN, &key_length,
16968c499324SRuchika Gupta 				   sizeof(uint32_t));
16978c499324SRuchika Gupta 		if (rc)
16988c499324SRuchika Gupta 			return rc;
16998c499324SRuchika Gupta 	}
17008c499324SRuchika Gupta 
17018c499324SRuchika Gupta 	/* Now we can check the VALUE_LEN field */
17028c499324SRuchika Gupta 	rc = check_created_attrs(*head, NULL);
17038c499324SRuchika Gupta 	if (rc)
17048c499324SRuchika Gupta 		return rc;
17058c499324SRuchika Gupta 
17068c499324SRuchika Gupta 	/* Remove the default empty value attribute if found */
17078c499324SRuchika Gupta 	rc = remove_empty_attribute(head, PKCS11_CKA_VALUE);
17088c499324SRuchika Gupta 	if (rc != PKCS11_CKR_OK && rc != PKCS11_RV_NOT_FOUND)
17098c499324SRuchika Gupta 		return PKCS11_CKR_GENERAL_ERROR;
17108c499324SRuchika Gupta 
17118c499324SRuchika Gupta 	return add_attribute(head, PKCS11_CKA_VALUE, data, key_length);
17128c499324SRuchika Gupta }
17138c499324SRuchika Gupta 
17148c499324SRuchika Gupta enum pkcs11_rc set_key_data(struct obj_attrs **head, void *data,
17158c499324SRuchika Gupta 			    size_t key_size)
17168c499324SRuchika Gupta {
17178c499324SRuchika Gupta 	switch (get_class(*head)) {
17188c499324SRuchika Gupta 	case PKCS11_CKO_SECRET_KEY:
17198c499324SRuchika Gupta 		return set_secret_key_data(head, data, key_size);
17208c499324SRuchika Gupta 	default:
17218c499324SRuchika Gupta 		return PKCS11_CKR_GENERAL_ERROR;
17228c499324SRuchika Gupta 	}
17238c499324SRuchika Gupta }
1724