163f89caaSJens Wiklander // SPDX-License-Identifier: BSD-2-Clause 263f89caaSJens Wiklander /* 363f89caaSJens Wiklander * Copyright (c) 2017-2020, Linaro Limited 463f89caaSJens Wiklander */ 563f89caaSJens Wiklander 663f89caaSJens Wiklander #include <assert.h> 763f89caaSJens Wiklander #include <inttypes.h> 863f89caaSJens Wiklander #include <pkcs11_ta.h> 963f89caaSJens Wiklander #include <stdlib.h> 1063f89caaSJens Wiklander #include <string_ext.h> 1163f89caaSJens Wiklander #include <tee_internal_api_extensions.h> 1263f89caaSJens Wiklander #include <tee_internal_api.h> 136a760c9eSEtienne Carriere #include <trace.h> 1463f89caaSJens Wiklander #include <util.h> 1563f89caaSJens Wiklander 1663f89caaSJens Wiklander #include "attributes.h" 1763f89caaSJens Wiklander #include "handle.h" 1863f89caaSJens Wiklander #include "pkcs11_attributes.h" 1963f89caaSJens Wiklander #include "pkcs11_helpers.h" 2063f89caaSJens Wiklander #include "pkcs11_token.h" 2163f89caaSJens Wiklander #include "sanitize_object.h" 2263f89caaSJens Wiklander #include "serializer.h" 2363f89caaSJens Wiklander #include "token_capabilities.h" 2463f89caaSJens Wiklander 2563f89caaSJens Wiklander /* Byte size of CKA_ID attribute when generated locally */ 2663f89caaSJens Wiklander #define PKCS11_CKA_DEFAULT_SIZE 16 2763f89caaSJens Wiklander 28512cbf1dSJens Wiklander static uint32_t pkcs11_func2ckfm(enum processing_func function) 29512cbf1dSJens Wiklander { 30512cbf1dSJens Wiklander switch (function) { 31512cbf1dSJens Wiklander case PKCS11_FUNCTION_DIGEST: 32512cbf1dSJens Wiklander return PKCS11_CKFM_DIGEST; 33512cbf1dSJens Wiklander case PKCS11_FUNCTION_GENERATE: 34512cbf1dSJens Wiklander return PKCS11_CKFM_GENERATE; 35512cbf1dSJens Wiklander case PKCS11_FUNCTION_GENERATE_PAIR: 36512cbf1dSJens Wiklander return PKCS11_CKFM_GENERATE_KEY_PAIR; 37512cbf1dSJens Wiklander case PKCS11_FUNCTION_DERIVE: 38512cbf1dSJens Wiklander return PKCS11_CKFM_DERIVE; 39512cbf1dSJens Wiklander case PKCS11_FUNCTION_WRAP: 40512cbf1dSJens Wiklander return PKCS11_CKFM_WRAP; 41512cbf1dSJens Wiklander case PKCS11_FUNCTION_UNWRAP: 42512cbf1dSJens Wiklander return PKCS11_CKFM_UNWRAP; 43512cbf1dSJens Wiklander case PKCS11_FUNCTION_ENCRYPT: 44512cbf1dSJens Wiklander return PKCS11_CKFM_ENCRYPT; 45512cbf1dSJens Wiklander case PKCS11_FUNCTION_DECRYPT: 46512cbf1dSJens Wiklander return PKCS11_CKFM_DECRYPT; 47512cbf1dSJens Wiklander case PKCS11_FUNCTION_SIGN: 48512cbf1dSJens Wiklander return PKCS11_CKFM_SIGN; 49512cbf1dSJens Wiklander case PKCS11_FUNCTION_VERIFY: 50512cbf1dSJens Wiklander return PKCS11_CKFM_VERIFY; 51512cbf1dSJens Wiklander case PKCS11_FUNCTION_SIGN_RECOVER: 52512cbf1dSJens Wiklander return PKCS11_CKFM_SIGN_RECOVER; 53512cbf1dSJens Wiklander case PKCS11_FUNCTION_VERIFY_RECOVER: 54512cbf1dSJens Wiklander return PKCS11_CKFM_VERIFY_RECOVER; 55512cbf1dSJens Wiklander default: 56512cbf1dSJens Wiklander return 0; 57512cbf1dSJens Wiklander } 58512cbf1dSJens Wiklander } 59512cbf1dSJens Wiklander 60512cbf1dSJens Wiklander enum pkcs11_rc 61512cbf1dSJens Wiklander check_mechanism_against_processing(struct pkcs11_session *session, 62512cbf1dSJens Wiklander enum pkcs11_mechanism_id mechanism_type, 63512cbf1dSJens Wiklander enum processing_func function, 64512cbf1dSJens Wiklander enum processing_step step) 65512cbf1dSJens Wiklander { 66512cbf1dSJens Wiklander bool allowed = false; 67512cbf1dSJens Wiklander 68512cbf1dSJens Wiklander switch (step) { 69512cbf1dSJens Wiklander case PKCS11_FUNC_STEP_INIT: 70512cbf1dSJens Wiklander switch (function) { 71512cbf1dSJens Wiklander case PKCS11_FUNCTION_IMPORT: 72512cbf1dSJens Wiklander case PKCS11_FUNCTION_COPY: 73512cbf1dSJens Wiklander case PKCS11_FUNCTION_MODIFY: 74512cbf1dSJens Wiklander case PKCS11_FUNCTION_DESTROY: 75512cbf1dSJens Wiklander return PKCS11_CKR_OK; 76512cbf1dSJens Wiklander default: 77512cbf1dSJens Wiklander break; 78512cbf1dSJens Wiklander } 79512cbf1dSJens Wiklander /* 80512cbf1dSJens Wiklander * Check that the returned PKCS11_CKFM_* flag from 81512cbf1dSJens Wiklander * pkcs11_func2ckfm() is among the ones from 82512cbf1dSJens Wiklander * mechanism_supported_flags(). 83512cbf1dSJens Wiklander */ 84512cbf1dSJens Wiklander allowed = mechanism_supported_flags(mechanism_type) & 85512cbf1dSJens Wiklander pkcs11_func2ckfm(function); 86512cbf1dSJens Wiklander break; 87512cbf1dSJens Wiklander 88512cbf1dSJens Wiklander case PKCS11_FUNC_STEP_ONESHOT: 890460a039SRuchika Gupta if (session->processing->always_authen && 900460a039SRuchika Gupta !session->processing->relogged) 910460a039SRuchika Gupta return PKCS11_CKR_USER_NOT_LOGGED_IN; 920460a039SRuchika Gupta 930460a039SRuchika Gupta if (session->processing->updated) { 940460a039SRuchika Gupta EMSG("Cannot perform one-shot on updated processing"); 950460a039SRuchika Gupta return PKCS11_CKR_OPERATION_ACTIVE; 960460a039SRuchika Gupta } 970460a039SRuchika Gupta 980460a039SRuchika Gupta allowed = true; 990460a039SRuchika Gupta break; 1000460a039SRuchika Gupta 101512cbf1dSJens Wiklander case PKCS11_FUNC_STEP_UPDATE: 102512cbf1dSJens Wiklander if (session->processing->always_authen && 103512cbf1dSJens Wiklander !session->processing->relogged) 104512cbf1dSJens Wiklander return PKCS11_CKR_USER_NOT_LOGGED_IN; 105512cbf1dSJens Wiklander 106512cbf1dSJens Wiklander allowed = !mechanism_is_one_shot_only(mechanism_type); 107512cbf1dSJens Wiklander break; 108512cbf1dSJens Wiklander 109512cbf1dSJens Wiklander case PKCS11_FUNC_STEP_FINAL: 110512cbf1dSJens Wiklander if (session->processing->always_authen && 111512cbf1dSJens Wiklander !session->processing->relogged) 112512cbf1dSJens Wiklander return PKCS11_CKR_USER_NOT_LOGGED_IN; 113512cbf1dSJens Wiklander 114512cbf1dSJens Wiklander return PKCS11_CKR_OK; 115512cbf1dSJens Wiklander 116512cbf1dSJens Wiklander default: 117512cbf1dSJens Wiklander TEE_Panic(step); 118512cbf1dSJens Wiklander break; 119512cbf1dSJens Wiklander } 120512cbf1dSJens Wiklander 121512cbf1dSJens Wiklander if (!allowed) { 122512cbf1dSJens Wiklander EMSG("Processing %#x/%s not permitted (%u/%u)", 123512cbf1dSJens Wiklander (unsigned int)mechanism_type, id2str_proc(mechanism_type), 124512cbf1dSJens Wiklander function, step); 125512cbf1dSJens Wiklander return PKCS11_CKR_KEY_FUNCTION_NOT_PERMITTED; 126512cbf1dSJens Wiklander } 127512cbf1dSJens Wiklander 128512cbf1dSJens Wiklander return PKCS11_CKR_OK; 129512cbf1dSJens Wiklander } 130512cbf1dSJens Wiklander 13163f89caaSJens Wiklander /* 13263f89caaSJens Wiklander * Object default boolean attributes as per PKCS#11 13363f89caaSJens Wiklander */ 13463f89caaSJens Wiklander static uint8_t *pkcs11_object_default_boolprop(uint32_t attribute) 13563f89caaSJens Wiklander { 13663f89caaSJens Wiklander static const uint8_t bool_true = 1; 13763f89caaSJens Wiklander static const uint8_t bool_false; 13863f89caaSJens Wiklander 13963f89caaSJens Wiklander switch (attribute) { 14063f89caaSJens Wiklander /* As per PKCS#11 default value */ 14163f89caaSJens Wiklander case PKCS11_CKA_MODIFIABLE: 14263f89caaSJens Wiklander case PKCS11_CKA_COPYABLE: 14363f89caaSJens Wiklander case PKCS11_CKA_DESTROYABLE: 14463f89caaSJens Wiklander return (uint8_t *)&bool_true; 14563f89caaSJens Wiklander case PKCS11_CKA_TOKEN: 14663f89caaSJens Wiklander case PKCS11_CKA_PRIVATE: 14739fc24faSEtienne Carriere case PKCS11_CKA_WRAP_WITH_TRUSTED: 14839fc24faSEtienne Carriere case PKCS11_CKA_ALWAYS_AUTHENTICATE: 14963f89caaSJens Wiklander case PKCS11_CKA_SENSITIVE: 15063f89caaSJens Wiklander return (uint8_t *)&bool_false; 15163f89caaSJens Wiklander /* Token specific default value */ 15263f89caaSJens Wiklander case PKCS11_CKA_SIGN: 15363f89caaSJens Wiklander case PKCS11_CKA_VERIFY: 15463f89caaSJens Wiklander case PKCS11_CKA_DERIVE: 15563f89caaSJens Wiklander case PKCS11_CKA_ENCRYPT: 15663f89caaSJens Wiklander case PKCS11_CKA_DECRYPT: 15763f89caaSJens Wiklander case PKCS11_CKA_SIGN_RECOVER: 15863f89caaSJens Wiklander case PKCS11_CKA_VERIFY_RECOVER: 15963f89caaSJens Wiklander case PKCS11_CKA_WRAP: 16063f89caaSJens Wiklander case PKCS11_CKA_UNWRAP: 16163f89caaSJens Wiklander case PKCS11_CKA_EXTRACTABLE: 16263f89caaSJens Wiklander case PKCS11_CKA_TRUSTED: 16363f89caaSJens Wiklander return (uint8_t *)&bool_false; 16463f89caaSJens Wiklander default: 16563f89caaSJens Wiklander DMSG("No default for boolprop attribute %#"PRIx32, attribute); 16663f89caaSJens Wiklander return NULL; 16763f89caaSJens Wiklander } 16863f89caaSJens Wiklander } 16963f89caaSJens Wiklander 17063f89caaSJens Wiklander /* 17163f89caaSJens Wiklander * Object expects several boolean attributes to be set to a default value 17263f89caaSJens Wiklander * or to a validate client configuration value. This function append the input 17363f89caaSJens Wiklander * attribute (id/size/value) in the serialized object. 17463f89caaSJens Wiklander */ 17563f89caaSJens Wiklander static enum pkcs11_rc pkcs11_import_object_boolprop(struct obj_attrs **out, 17663f89caaSJens Wiklander struct obj_attrs *templ, 17763f89caaSJens Wiklander uint32_t attribute) 17863f89caaSJens Wiklander { 17963f89caaSJens Wiklander enum pkcs11_rc rc = PKCS11_CKR_OK; 18063f89caaSJens Wiklander uint8_t bbool = 0; 18163f89caaSJens Wiklander uint32_t size = sizeof(uint8_t); 18263f89caaSJens Wiklander void *attr = NULL; 18363f89caaSJens Wiklander 18463f89caaSJens Wiklander rc = get_attribute(templ, attribute, &bbool, &size); 18563f89caaSJens Wiklander if (rc) { 18663f89caaSJens Wiklander if (rc != PKCS11_RV_NOT_FOUND) 18763f89caaSJens Wiklander return rc; 18863f89caaSJens Wiklander attr = pkcs11_object_default_boolprop(attribute); 18963f89caaSJens Wiklander if (!attr) 19063f89caaSJens Wiklander return PKCS11_CKR_TEMPLATE_INCOMPLETE; 19163f89caaSJens Wiklander } else { 19263f89caaSJens Wiklander attr = &bbool; 19363f89caaSJens Wiklander } 19463f89caaSJens Wiklander 19563f89caaSJens Wiklander /* Boolean attributes are 1byte in the ABI, no alignment issue */ 19663f89caaSJens Wiklander return add_attribute(out, attribute, attr, sizeof(uint8_t)); 19763f89caaSJens Wiklander } 19863f89caaSJens Wiklander 19963f89caaSJens Wiklander static enum pkcs11_rc set_mandatory_boolprops(struct obj_attrs **out, 20063f89caaSJens Wiklander struct obj_attrs *temp, 20163f89caaSJens Wiklander uint32_t const *bp, 20263f89caaSJens Wiklander size_t bp_count) 20363f89caaSJens Wiklander { 20463f89caaSJens Wiklander enum pkcs11_rc rc = PKCS11_CKR_OK; 20563f89caaSJens Wiklander size_t n = 0; 20663f89caaSJens Wiklander 20763f89caaSJens Wiklander for (n = 0; n < bp_count; n++) { 20863f89caaSJens Wiklander rc = pkcs11_import_object_boolprop(out, temp, bp[n]); 20963f89caaSJens Wiklander if (rc) 21063f89caaSJens Wiklander return rc; 21163f89caaSJens Wiklander } 21263f89caaSJens Wiklander 21363f89caaSJens Wiklander return rc; 21463f89caaSJens Wiklander } 21563f89caaSJens Wiklander 21663f89caaSJens Wiklander static enum pkcs11_rc set_mandatory_attributes(struct obj_attrs **out, 21763f89caaSJens Wiklander struct obj_attrs *temp, 21816df60c7SEtienne Carriere uint32_t const *attrs, 21916df60c7SEtienne Carriere size_t attrs_count) 22063f89caaSJens Wiklander { 22163f89caaSJens Wiklander enum pkcs11_rc rc = PKCS11_CKR_OK; 22263f89caaSJens Wiklander size_t n = 0; 22363f89caaSJens Wiklander 22416df60c7SEtienne Carriere for (n = 0; n < attrs_count; n++) { 22563f89caaSJens Wiklander uint32_t size = 0; 22663f89caaSJens Wiklander void *value = NULL; 22763f89caaSJens Wiklander 22816df60c7SEtienne Carriere if (get_attribute_ptr(temp, attrs[n], &value, &size)) 22963f89caaSJens Wiklander return PKCS11_CKR_TEMPLATE_INCOMPLETE; 23063f89caaSJens Wiklander 23116df60c7SEtienne Carriere rc = add_attribute(out, attrs[n], value, size); 23263f89caaSJens Wiklander if (rc) 23363f89caaSJens Wiklander return rc; 23463f89caaSJens Wiklander } 23563f89caaSJens Wiklander 23663f89caaSJens Wiklander return rc; 23763f89caaSJens Wiklander } 23863f89caaSJens Wiklander 23963f89caaSJens Wiklander static enum pkcs11_rc get_default_value(enum pkcs11_attr_id id, void **value, 24063f89caaSJens Wiklander uint32_t *size) 24163f89caaSJens Wiklander { 24263f89caaSJens Wiklander /* should have been taken care of already */ 24363f89caaSJens Wiklander assert(!pkcs11_attr_is_boolean(id)); 24463f89caaSJens Wiklander 24563f89caaSJens Wiklander if (id == PKCS11_CKA_PUBLIC_KEY_INFO) { 24663f89caaSJens Wiklander EMSG("Cannot provide default PUBLIC_KEY_INFO"); 24763f89caaSJens Wiklander return PKCS11_CKR_TEMPLATE_INCONSISTENT; 24863f89caaSJens Wiklander } 24963f89caaSJens Wiklander 25063f89caaSJens Wiklander /* All other attributes have an empty default value */ 25163f89caaSJens Wiklander *value = NULL; 25263f89caaSJens Wiklander *size = 0; 25363f89caaSJens Wiklander return PKCS11_CKR_OK; 25463f89caaSJens Wiklander } 25563f89caaSJens Wiklander 2564eb88651SRuchika Gupta static enum pkcs11_rc set_optional_attributes_with_def(struct obj_attrs **out, 25763f89caaSJens Wiklander struct obj_attrs *temp, 25816df60c7SEtienne Carriere uint32_t const *attrs, 25916df60c7SEtienne Carriere size_t attrs_count, 2604eb88651SRuchika Gupta bool default_to_null) 26163f89caaSJens Wiklander { 26263f89caaSJens Wiklander enum pkcs11_rc rc = PKCS11_CKR_OK; 26363f89caaSJens Wiklander size_t n = 0; 26463f89caaSJens Wiklander 26516df60c7SEtienne Carriere for (n = 0; n < attrs_count; n++) { 26663f89caaSJens Wiklander uint32_t size = 0; 26763f89caaSJens Wiklander void *value = NULL; 26863f89caaSJens Wiklander 26916df60c7SEtienne Carriere rc = get_attribute_ptr(temp, attrs[n], &value, &size); 2704eb88651SRuchika Gupta if (rc == PKCS11_RV_NOT_FOUND) { 2714eb88651SRuchika Gupta if (default_to_null) { 27216df60c7SEtienne Carriere rc = get_default_value(attrs[n], &value, &size); 2734eb88651SRuchika Gupta } else { 2744eb88651SRuchika Gupta rc = PKCS11_CKR_OK; 2754eb88651SRuchika Gupta continue; 2764eb88651SRuchika Gupta } 2774eb88651SRuchika Gupta } 27863f89caaSJens Wiklander if (rc) 27963f89caaSJens Wiklander return rc; 28063f89caaSJens Wiklander 28116df60c7SEtienne Carriere rc = add_attribute(out, attrs[n], value, size); 28263f89caaSJens Wiklander if (rc) 28363f89caaSJens Wiklander return rc; 28463f89caaSJens Wiklander } 28563f89caaSJens Wiklander 28663f89caaSJens Wiklander return rc; 28763f89caaSJens Wiklander } 28863f89caaSJens Wiklander 2894eb88651SRuchika Gupta static enum pkcs11_rc set_attributes_opt_or_null(struct obj_attrs **out, 2904eb88651SRuchika Gupta struct obj_attrs *temp, 29116df60c7SEtienne Carriere uint32_t const *attrs, 29216df60c7SEtienne Carriere size_t attrs_count) 2934eb88651SRuchika Gupta { 29416df60c7SEtienne Carriere return set_optional_attributes_with_def(out, temp, attrs, attrs_count, 29516df60c7SEtienne Carriere true /* defaults to empty */); 2964eb88651SRuchika Gupta } 2974eb88651SRuchika Gupta 2984eb88651SRuchika Gupta static enum pkcs11_rc set_optional_attributes(struct obj_attrs **out, 2994eb88651SRuchika Gupta struct obj_attrs *temp, 30016df60c7SEtienne Carriere uint32_t const *attrs, 30116df60c7SEtienne Carriere size_t attrs_count) 3024eb88651SRuchika Gupta { 30316df60c7SEtienne Carriere return set_optional_attributes_with_def(out, temp, attrs, attrs_count, 30416df60c7SEtienne Carriere false /* no default value */); 3054eb88651SRuchika Gupta } 3064eb88651SRuchika Gupta 30763f89caaSJens Wiklander /* 30863f89caaSJens Wiklander * Below are listed the mandated or optional expected attributes for 30963f89caaSJens Wiklander * PKCS#11 storage objects. 31063f89caaSJens Wiklander * 31163f89caaSJens Wiklander * Note: boolprops (mandated boolean attributes) PKCS11_CKA_ALWAYS_SENSITIVE, 31263f89caaSJens Wiklander * and PKCS11_CKA_NEVER_EXTRACTABLE are set by the token, not provided 31363f89caaSJens Wiklander * in the client template. 31463f89caaSJens Wiklander */ 31563f89caaSJens Wiklander 31663f89caaSJens Wiklander /* PKCS#11 specification for any object (session/token) of the storage */ 3174eb88651SRuchika Gupta static const uint32_t any_object_boolprops[] = { 31863f89caaSJens Wiklander PKCS11_CKA_TOKEN, PKCS11_CKA_PRIVATE, 31963f89caaSJens Wiklander PKCS11_CKA_MODIFIABLE, PKCS11_CKA_COPYABLE, PKCS11_CKA_DESTROYABLE, 32063f89caaSJens Wiklander }; 32163f89caaSJens Wiklander 3224eb88651SRuchika Gupta static const uint32_t any_object_opt_or_null[] = { 32363f89caaSJens Wiklander PKCS11_CKA_LABEL, 32463f89caaSJens Wiklander }; 32563f89caaSJens Wiklander 3264eb88651SRuchika Gupta /* PKCS#11 specification for raw data object (+any_object_xxx) */ 3274eb88651SRuchika Gupta const uint32_t raw_data_opt_or_null[] = { 32863f89caaSJens Wiklander PKCS11_CKA_OBJECT_ID, PKCS11_CKA_APPLICATION, PKCS11_CKA_VALUE, 32963f89caaSJens Wiklander }; 33063f89caaSJens Wiklander 3314eb88651SRuchika Gupta /* PKCS#11 specification for any key object (+any_object_xxx) */ 3324eb88651SRuchika Gupta static const uint32_t any_key_boolprops[] = { 33363f89caaSJens Wiklander PKCS11_CKA_DERIVE, 33463f89caaSJens Wiklander }; 33563f89caaSJens Wiklander 3364eb88651SRuchika Gupta static const uint32_t any_key_opt_or_null[] = { 33763f89caaSJens Wiklander PKCS11_CKA_ID, 33863f89caaSJens Wiklander PKCS11_CKA_START_DATE, PKCS11_CKA_END_DATE, 3394eb88651SRuchika Gupta }; 3404eb88651SRuchika Gupta 3414eb88651SRuchika Gupta static const uint32_t any_key_optional[] = { 34263f89caaSJens Wiklander PKCS11_CKA_ALLOWED_MECHANISMS, 34363f89caaSJens Wiklander }; 34463f89caaSJens Wiklander 3454eb88651SRuchika Gupta /* PKCS#11 specification for any symmetric key (+any_key_xxx) */ 3464eb88651SRuchika Gupta static const uint32_t symm_key_boolprops[] = { 34763f89caaSJens Wiklander PKCS11_CKA_ENCRYPT, PKCS11_CKA_DECRYPT, 34863f89caaSJens Wiklander PKCS11_CKA_SIGN, PKCS11_CKA_VERIFY, 34963f89caaSJens Wiklander PKCS11_CKA_WRAP, PKCS11_CKA_UNWRAP, 35063f89caaSJens Wiklander PKCS11_CKA_SENSITIVE, PKCS11_CKA_EXTRACTABLE, 35163f89caaSJens Wiklander PKCS11_CKA_WRAP_WITH_TRUSTED, PKCS11_CKA_TRUSTED, 35263f89caaSJens Wiklander }; 35363f89caaSJens Wiklander 3544eb88651SRuchika Gupta static const uint32_t symm_key_opt_or_null[] = { 35563f89caaSJens Wiklander PKCS11_CKA_WRAP_TEMPLATE, PKCS11_CKA_UNWRAP_TEMPLATE, 35663f89caaSJens Wiklander PKCS11_CKA_DERIVE_TEMPLATE, 35763f89caaSJens Wiklander PKCS11_CKA_VALUE, PKCS11_CKA_VALUE_LEN, 35863f89caaSJens Wiklander }; 35963f89caaSJens Wiklander 3604eb88651SRuchika Gupta /* PKCS#11 specification for any asymmetric public key (+any_key_xxx) */ 3614eb88651SRuchika Gupta static const uint32_t public_key_boolprops[] = { 36263f89caaSJens Wiklander PKCS11_CKA_ENCRYPT, PKCS11_CKA_VERIFY, PKCS11_CKA_VERIFY_RECOVER, 36363f89caaSJens Wiklander PKCS11_CKA_WRAP, 36463f89caaSJens Wiklander PKCS11_CKA_TRUSTED, 36563f89caaSJens Wiklander }; 36663f89caaSJens Wiklander 3674eb88651SRuchika Gupta static const uint32_t public_key_mandated[] = { 36863f89caaSJens Wiklander PKCS11_CKA_SUBJECT 36963f89caaSJens Wiklander }; 37063f89caaSJens Wiklander 3714eb88651SRuchika Gupta static const uint32_t public_key_opt_or_null[] = { 37263f89caaSJens Wiklander PKCS11_CKA_WRAP_TEMPLATE, PKCS11_CKA_PUBLIC_KEY_INFO, 37363f89caaSJens Wiklander }; 37463f89caaSJens Wiklander 3754eb88651SRuchika Gupta /* PKCS#11 specification for any asymmetric private key (+any_key_xxx) */ 3764eb88651SRuchika Gupta static const uint32_t private_key_boolprops[] = { 37763f89caaSJens Wiklander PKCS11_CKA_DECRYPT, PKCS11_CKA_SIGN, PKCS11_CKA_SIGN_RECOVER, 37863f89caaSJens Wiklander PKCS11_CKA_UNWRAP, 37963f89caaSJens Wiklander PKCS11_CKA_SENSITIVE, PKCS11_CKA_EXTRACTABLE, 38063f89caaSJens Wiklander PKCS11_CKA_WRAP_WITH_TRUSTED, PKCS11_CKA_ALWAYS_AUTHENTICATE, 38163f89caaSJens Wiklander }; 38263f89caaSJens Wiklander 3834eb88651SRuchika Gupta static const uint32_t private_key_mandated[] = { 38463f89caaSJens Wiklander PKCS11_CKA_SUBJECT 38563f89caaSJens Wiklander }; 38663f89caaSJens Wiklander 3874eb88651SRuchika Gupta static const uint32_t private_key_opt_or_null[] = { 38863f89caaSJens Wiklander PKCS11_CKA_UNWRAP_TEMPLATE, PKCS11_CKA_PUBLIC_KEY_INFO, 38963f89caaSJens Wiklander }; 39063f89caaSJens Wiklander 3914eb88651SRuchika Gupta /* PKCS#11 specification for any RSA key (+public/private_key_xxx) */ 3924eb88651SRuchika Gupta static const uint32_t rsa_public_key_mandated[] = { 39363f89caaSJens Wiklander PKCS11_CKA_MODULUS_BITS, 39463f89caaSJens Wiklander }; 39563f89caaSJens Wiklander 3964eb88651SRuchika Gupta static const uint32_t rsa_public_key_opt_or_null[] = { 39763f89caaSJens Wiklander PKCS11_CKA_MODULUS, PKCS11_CKA_PUBLIC_EXPONENT, 39863f89caaSJens Wiklander }; 39963f89caaSJens Wiklander 4004eb88651SRuchika Gupta static const uint32_t rsa_private_key_opt_or_null[] = { 40163f89caaSJens Wiklander PKCS11_CKA_MODULUS, PKCS11_CKA_PUBLIC_EXPONENT, 40263f89caaSJens Wiklander PKCS11_CKA_PRIVATE_EXPONENT, 40363f89caaSJens Wiklander PKCS11_CKA_PRIME_1, PKCS11_CKA_PRIME_2, 40463f89caaSJens Wiklander PKCS11_CKA_EXPONENT_1, PKCS11_CKA_EXPONENT_2, PKCS11_CKA_COEFFICIENT, 40563f89caaSJens Wiklander }; 40663f89caaSJens Wiklander 4074eb88651SRuchika Gupta /* PKCS#11 specification for any EC key (+public/private_key_xxx) */ 4084eb88651SRuchika Gupta static const uint32_t ec_public_key_mandated[] = { 40963f89caaSJens Wiklander PKCS11_CKA_EC_PARAMS, 41063f89caaSJens Wiklander }; 41163f89caaSJens Wiklander 4124eb88651SRuchika Gupta static const uint32_t ec_public_key_opt_or_null[] = { 41363f89caaSJens Wiklander PKCS11_CKA_EC_POINT, 41463f89caaSJens Wiklander }; 41563f89caaSJens Wiklander 4164eb88651SRuchika Gupta static const uint32_t ec_private_key_mandated[] = { 41763f89caaSJens Wiklander PKCS11_CKA_EC_PARAMS, 41863f89caaSJens Wiklander }; 41963f89caaSJens Wiklander 4204eb88651SRuchika Gupta static const uint32_t ec_private_key_opt_or_null[] = { 42163f89caaSJens Wiklander PKCS11_CKA_VALUE, 42263f89caaSJens Wiklander }; 42363f89caaSJens Wiklander 42463f89caaSJens Wiklander static enum pkcs11_rc create_storage_attributes(struct obj_attrs **out, 42563f89caaSJens Wiklander struct obj_attrs *temp) 42663f89caaSJens Wiklander { 42763f89caaSJens Wiklander enum pkcs11_class_id class = PKCS11_CKO_UNDEFINED_ID; 42863f89caaSJens Wiklander enum pkcs11_rc rc = PKCS11_CKR_OK; 42963f89caaSJens Wiklander 43063f89caaSJens Wiklander rc = init_attributes_head(out); 43163f89caaSJens Wiklander if (rc) 43263f89caaSJens Wiklander return rc; 43363f89caaSJens Wiklander 43463f89caaSJens Wiklander /* Object class is mandatory */ 43563f89caaSJens Wiklander class = get_class(temp); 43663f89caaSJens Wiklander if (class == PKCS11_CKO_UNDEFINED_ID) { 43763f89caaSJens Wiklander EMSG("Class attribute not found"); 43863f89caaSJens Wiklander 43963f89caaSJens Wiklander return PKCS11_CKR_TEMPLATE_INCONSISTENT; 44063f89caaSJens Wiklander } 44163f89caaSJens Wiklander rc = add_attribute(out, PKCS11_CKA_CLASS, &class, sizeof(uint32_t)); 44263f89caaSJens Wiklander if (rc) 44363f89caaSJens Wiklander return rc; 44463f89caaSJens Wiklander 4454eb88651SRuchika Gupta rc = set_mandatory_boolprops(out, temp, any_object_boolprops, 4464eb88651SRuchika Gupta ARRAY_SIZE(any_object_boolprops)); 44763f89caaSJens Wiklander if (rc) 44863f89caaSJens Wiklander return rc; 44963f89caaSJens Wiklander 4504eb88651SRuchika Gupta return set_attributes_opt_or_null(out, temp, any_object_opt_or_null, 4514eb88651SRuchika Gupta ARRAY_SIZE(any_object_opt_or_null)); 45263f89caaSJens Wiklander } 45363f89caaSJens Wiklander 45463f89caaSJens Wiklander static enum pkcs11_rc create_genkey_attributes(struct obj_attrs **out, 45563f89caaSJens Wiklander struct obj_attrs *temp) 45663f89caaSJens Wiklander { 45763f89caaSJens Wiklander uint32_t type = PKCS11_CKO_UNDEFINED_ID; 45863f89caaSJens Wiklander enum pkcs11_rc rc = PKCS11_CKR_OK; 45963f89caaSJens Wiklander 46063f89caaSJens Wiklander rc = create_storage_attributes(out, temp); 46163f89caaSJens Wiklander if (rc) 46263f89caaSJens Wiklander return rc; 46363f89caaSJens Wiklander 46463f89caaSJens Wiklander type = get_key_type(temp); 46563f89caaSJens Wiklander if (type == PKCS11_CKK_UNDEFINED_ID) { 46663f89caaSJens Wiklander EMSG("Key type attribute not found"); 46763f89caaSJens Wiklander 46863f89caaSJens Wiklander return PKCS11_CKR_TEMPLATE_INCONSISTENT; 46963f89caaSJens Wiklander } 47063f89caaSJens Wiklander rc = add_attribute(out, PKCS11_CKA_KEY_TYPE, &type, sizeof(uint32_t)); 47163f89caaSJens Wiklander if (rc) 47263f89caaSJens Wiklander return rc; 47363f89caaSJens Wiklander 4744eb88651SRuchika Gupta rc = set_mandatory_boolprops(out, temp, any_key_boolprops, 4754eb88651SRuchika Gupta ARRAY_SIZE(any_key_boolprops)); 47663f89caaSJens Wiklander if (rc) 47763f89caaSJens Wiklander return rc; 47863f89caaSJens Wiklander 4794eb88651SRuchika Gupta rc = set_attributes_opt_or_null(out, temp, any_key_opt_or_null, 4804eb88651SRuchika Gupta ARRAY_SIZE(any_key_opt_or_null)); 4814eb88651SRuchika Gupta if (rc) 4824eb88651SRuchika Gupta return rc; 4834eb88651SRuchika Gupta 4844eb88651SRuchika Gupta return set_optional_attributes(out, temp, any_key_optional, 4854eb88651SRuchika Gupta ARRAY_SIZE(any_key_optional)); 4864eb88651SRuchika Gupta 48763f89caaSJens Wiklander } 48863f89caaSJens Wiklander 48963f89caaSJens Wiklander static enum pkcs11_rc create_symm_key_attributes(struct obj_attrs **out, 49063f89caaSJens Wiklander struct obj_attrs *temp) 49163f89caaSJens Wiklander { 49263f89caaSJens Wiklander enum pkcs11_rc rc = PKCS11_CKR_OK; 49363f89caaSJens Wiklander 49463f89caaSJens Wiklander assert(get_class(temp) == PKCS11_CKO_SECRET_KEY); 49563f89caaSJens Wiklander 49663f89caaSJens Wiklander rc = create_genkey_attributes(out, temp); 49763f89caaSJens Wiklander if (rc) 49863f89caaSJens Wiklander return rc; 49963f89caaSJens Wiklander 50063f89caaSJens Wiklander assert(get_class(*out) == PKCS11_CKO_SECRET_KEY); 50163f89caaSJens Wiklander 50263f89caaSJens Wiklander switch (get_key_type(*out)) { 50363f89caaSJens Wiklander case PKCS11_CKK_GENERIC_SECRET: 50463f89caaSJens Wiklander case PKCS11_CKK_AES: 50563f89caaSJens Wiklander case PKCS11_CKK_MD5_HMAC: 50663f89caaSJens Wiklander case PKCS11_CKK_SHA_1_HMAC: 50763f89caaSJens Wiklander case PKCS11_CKK_SHA256_HMAC: 50863f89caaSJens Wiklander case PKCS11_CKK_SHA384_HMAC: 50963f89caaSJens Wiklander case PKCS11_CKK_SHA512_HMAC: 51063f89caaSJens Wiklander case PKCS11_CKK_SHA224_HMAC: 51163f89caaSJens Wiklander break; 51263f89caaSJens Wiklander default: 51363f89caaSJens Wiklander EMSG("Invalid key type %#"PRIx32"/%s", 51463f89caaSJens Wiklander get_key_type(*out), id2str_key_type(get_key_type(*out))); 51563f89caaSJens Wiklander 51663f89caaSJens Wiklander return PKCS11_CKR_TEMPLATE_INCONSISTENT; 51763f89caaSJens Wiklander } 51863f89caaSJens Wiklander 5194eb88651SRuchika Gupta rc = set_mandatory_boolprops(out, temp, symm_key_boolprops, 5204eb88651SRuchika Gupta ARRAY_SIZE(symm_key_boolprops)); 52163f89caaSJens Wiklander if (rc) 52263f89caaSJens Wiklander return rc; 52363f89caaSJens Wiklander 5244eb88651SRuchika Gupta return set_attributes_opt_or_null(out, temp, symm_key_opt_or_null, 5254eb88651SRuchika Gupta ARRAY_SIZE(symm_key_opt_or_null)); 52663f89caaSJens Wiklander } 52763f89caaSJens Wiklander 52863f89caaSJens Wiklander static enum pkcs11_rc create_data_attributes(struct obj_attrs **out, 52963f89caaSJens Wiklander struct obj_attrs *temp) 53063f89caaSJens Wiklander { 53163f89caaSJens Wiklander enum pkcs11_rc rc = PKCS11_CKR_OK; 53263f89caaSJens Wiklander 53363f89caaSJens Wiklander assert(get_class(temp) == PKCS11_CKO_DATA); 53463f89caaSJens Wiklander 53563f89caaSJens Wiklander rc = create_storage_attributes(out, temp); 53663f89caaSJens Wiklander if (rc) 53763f89caaSJens Wiklander return rc; 53863f89caaSJens Wiklander 53963f89caaSJens Wiklander assert(get_class(*out) == PKCS11_CKO_DATA); 54063f89caaSJens Wiklander 5414eb88651SRuchika Gupta return set_attributes_opt_or_null(out, temp, raw_data_opt_or_null, 5424eb88651SRuchika Gupta ARRAY_SIZE(raw_data_opt_or_null)); 54363f89caaSJens Wiklander } 54463f89caaSJens Wiklander 54563f89caaSJens Wiklander static enum pkcs11_rc create_pub_key_attributes(struct obj_attrs **out, 54663f89caaSJens Wiklander struct obj_attrs *temp) 54763f89caaSJens Wiklander { 54863f89caaSJens Wiklander uint32_t const *mandated = NULL; 5494eb88651SRuchika Gupta uint32_t const *opt_or_null = NULL; 55063f89caaSJens Wiklander size_t mandated_count = 0; 5514eb88651SRuchika Gupta size_t opt_or_null_count = 0; 55263f89caaSJens Wiklander enum pkcs11_rc rc = PKCS11_CKR_OK; 55363f89caaSJens Wiklander 55463f89caaSJens Wiklander assert(get_class(temp) == PKCS11_CKO_PUBLIC_KEY); 55563f89caaSJens Wiklander 55663f89caaSJens Wiklander rc = create_genkey_attributes(out, temp); 55763f89caaSJens Wiklander if (rc) 55863f89caaSJens Wiklander return rc; 55963f89caaSJens Wiklander 56063f89caaSJens Wiklander assert(get_class(*out) == PKCS11_CKO_PUBLIC_KEY); 56163f89caaSJens Wiklander 5624eb88651SRuchika Gupta rc = set_mandatory_boolprops(out, temp, public_key_boolprops, 5634eb88651SRuchika Gupta ARRAY_SIZE(public_key_boolprops)); 56463f89caaSJens Wiklander if (rc) 56563f89caaSJens Wiklander return rc; 56663f89caaSJens Wiklander 5674eb88651SRuchika Gupta rc = set_mandatory_attributes(out, temp, public_key_mandated, 5684eb88651SRuchika Gupta ARRAY_SIZE(public_key_mandated)); 56963f89caaSJens Wiklander if (rc) 57063f89caaSJens Wiklander return rc; 57163f89caaSJens Wiklander 5724eb88651SRuchika Gupta rc = set_attributes_opt_or_null(out, temp, 5734eb88651SRuchika Gupta public_key_opt_or_null, 5744eb88651SRuchika Gupta ARRAY_SIZE(public_key_opt_or_null)); 57563f89caaSJens Wiklander if (rc) 57663f89caaSJens Wiklander return rc; 57763f89caaSJens Wiklander 57863f89caaSJens Wiklander switch (get_key_type(*out)) { 57963f89caaSJens Wiklander case PKCS11_CKK_RSA: 5804eb88651SRuchika Gupta mandated = rsa_public_key_mandated; 5814eb88651SRuchika Gupta opt_or_null = rsa_public_key_opt_or_null; 5824eb88651SRuchika Gupta mandated_count = ARRAY_SIZE(rsa_public_key_mandated); 5834eb88651SRuchika Gupta opt_or_null_count = ARRAY_SIZE(rsa_public_key_opt_or_null); 58463f89caaSJens Wiklander break; 58563f89caaSJens Wiklander case PKCS11_CKK_EC: 5864eb88651SRuchika Gupta mandated = ec_public_key_mandated; 5874eb88651SRuchika Gupta opt_or_null = ec_public_key_opt_or_null; 5884eb88651SRuchika Gupta mandated_count = ARRAY_SIZE(ec_public_key_mandated); 5894eb88651SRuchika Gupta opt_or_null_count = ARRAY_SIZE(ec_public_key_opt_or_null); 59063f89caaSJens Wiklander break; 59163f89caaSJens Wiklander default: 59263f89caaSJens Wiklander EMSG("Invalid key type %#"PRIx32"/%s", 59363f89caaSJens Wiklander get_key_type(*out), id2str_key_type(get_key_type(*out))); 59463f89caaSJens Wiklander 59563f89caaSJens Wiklander return PKCS11_CKR_TEMPLATE_INCONSISTENT; 59663f89caaSJens Wiklander } 59763f89caaSJens Wiklander 59863f89caaSJens Wiklander rc = set_mandatory_attributes(out, temp, mandated, mandated_count); 59963f89caaSJens Wiklander if (rc) 60063f89caaSJens Wiklander return rc; 60163f89caaSJens Wiklander 6024eb88651SRuchika Gupta return set_attributes_opt_or_null(out, temp, opt_or_null, 6034eb88651SRuchika Gupta opt_or_null_count); 60463f89caaSJens Wiklander } 60563f89caaSJens Wiklander 60663f89caaSJens Wiklander static enum pkcs11_rc create_priv_key_attributes(struct obj_attrs **out, 60763f89caaSJens Wiklander struct obj_attrs *temp) 60863f89caaSJens Wiklander { 60963f89caaSJens Wiklander uint32_t const *mandated = NULL; 6104eb88651SRuchika Gupta uint32_t const *opt_or_null = NULL; 61163f89caaSJens Wiklander size_t mandated_count = 0; 6124eb88651SRuchika Gupta size_t opt_or_null_count = 0; 61363f89caaSJens Wiklander enum pkcs11_rc rc = PKCS11_CKR_OK; 61463f89caaSJens Wiklander 61563f89caaSJens Wiklander assert(get_class(temp) == PKCS11_CKO_PRIVATE_KEY); 61663f89caaSJens Wiklander 61763f89caaSJens Wiklander rc = create_genkey_attributes(out, temp); 61863f89caaSJens Wiklander if (rc) 61963f89caaSJens Wiklander return rc; 62063f89caaSJens Wiklander 62163f89caaSJens Wiklander assert(get_class(*out) == PKCS11_CKO_PRIVATE_KEY); 62263f89caaSJens Wiklander 6234eb88651SRuchika Gupta rc = set_mandatory_boolprops(out, temp, private_key_boolprops, 6244eb88651SRuchika Gupta ARRAY_SIZE(private_key_boolprops)); 62563f89caaSJens Wiklander if (rc) 62663f89caaSJens Wiklander return rc; 62763f89caaSJens Wiklander 6284eb88651SRuchika Gupta rc = set_mandatory_attributes(out, temp, private_key_mandated, 6294eb88651SRuchika Gupta ARRAY_SIZE(private_key_mandated)); 63063f89caaSJens Wiklander if (rc) 63163f89caaSJens Wiklander return rc; 63263f89caaSJens Wiklander 6334eb88651SRuchika Gupta rc = set_attributes_opt_or_null(out, temp, private_key_opt_or_null, 6344eb88651SRuchika Gupta ARRAY_SIZE(private_key_opt_or_null)); 63563f89caaSJens Wiklander if (rc) 63663f89caaSJens Wiklander return rc; 63763f89caaSJens Wiklander 63863f89caaSJens Wiklander switch (get_key_type(*out)) { 63963f89caaSJens Wiklander case PKCS11_CKK_RSA: 6404eb88651SRuchika Gupta opt_or_null = rsa_private_key_opt_or_null; 6414eb88651SRuchika Gupta opt_or_null_count = ARRAY_SIZE(rsa_private_key_opt_or_null); 64263f89caaSJens Wiklander break; 64363f89caaSJens Wiklander case PKCS11_CKK_EC: 6444eb88651SRuchika Gupta mandated = ec_private_key_mandated; 6454eb88651SRuchika Gupta opt_or_null = ec_private_key_opt_or_null; 6464eb88651SRuchika Gupta mandated_count = ARRAY_SIZE(ec_private_key_mandated); 6474eb88651SRuchika Gupta opt_or_null_count = ARRAY_SIZE(ec_private_key_opt_or_null); 64863f89caaSJens Wiklander break; 64963f89caaSJens Wiklander default: 65063f89caaSJens Wiklander EMSG("Invalid key type %#"PRIx32"/%s", 65163f89caaSJens Wiklander get_key_type(*out), id2str_key_type(get_key_type(*out))); 65263f89caaSJens Wiklander 65363f89caaSJens Wiklander return PKCS11_CKR_TEMPLATE_INCONSISTENT; 65463f89caaSJens Wiklander } 65563f89caaSJens Wiklander 65663f89caaSJens Wiklander rc = set_mandatory_attributes(out, temp, mandated, mandated_count); 65763f89caaSJens Wiklander if (rc) 65863f89caaSJens Wiklander return rc; 65963f89caaSJens Wiklander 6604eb88651SRuchika Gupta return set_attributes_opt_or_null(out, temp, opt_or_null, 6614eb88651SRuchika Gupta opt_or_null_count); 66263f89caaSJens Wiklander } 66363f89caaSJens Wiklander 66463f89caaSJens Wiklander /* 66563f89caaSJens Wiklander * Create an attribute list for a new object from a template and a parent 66663f89caaSJens Wiklander * object (optional) for an object generation function (generate, copy, 66763f89caaSJens Wiklander * derive...). 66863f89caaSJens Wiklander * 66963f89caaSJens Wiklander * PKCS#11 directives on the supplied template and expected return value: 67063f89caaSJens Wiklander * - template has an invalid attribute ID: ATTRIBUTE_TYPE_INVALID 67163f89caaSJens Wiklander * - template has an invalid value for an attribute: ATTRIBUTE_VALID_INVALID 67263f89caaSJens Wiklander * - template has value for a read-only attribute: ATTRIBUTE_READ_ONLY 67363f89caaSJens Wiklander * - template+default+parent => still miss an attribute: TEMPLATE_INCONSISTENT 67463f89caaSJens Wiklander * 67563f89caaSJens Wiklander * INFO on PKCS11_CMD_COPY_OBJECT: 67663f89caaSJens Wiklander * - parent PKCS11_CKA_COPYIABLE=false => return ACTION_PROHIBITED. 67763f89caaSJens Wiklander * - template can specify PKCS11_CKA_TOKEN, PKCS11_CKA_PRIVATE, 67863f89caaSJens Wiklander * PKCS11_CKA_MODIFIABLE, PKCS11_CKA_DESTROYABLE. 67963f89caaSJens Wiklander * - SENSITIVE can change from false to true, not from true to false. 68063f89caaSJens Wiklander * - LOCAL is the parent LOCAL 68163f89caaSJens Wiklander */ 68263f89caaSJens Wiklander enum pkcs11_rc 68363f89caaSJens Wiklander create_attributes_from_template(struct obj_attrs **out, void *template, 68463f89caaSJens Wiklander size_t template_size, 68563f89caaSJens Wiklander struct obj_attrs *parent __unused, 68663f89caaSJens Wiklander enum processing_func function, 6874cfce748SRuchika Gupta enum pkcs11_mechanism_id mecha, 6884cfce748SRuchika Gupta enum pkcs11_class_id template_class __unused) 68963f89caaSJens Wiklander { 69063f89caaSJens Wiklander struct obj_attrs *temp = NULL; 69163f89caaSJens Wiklander struct obj_attrs *attrs = NULL; 69263f89caaSJens Wiklander enum pkcs11_rc rc = PKCS11_CKR_OK; 69363f89caaSJens Wiklander uint8_t local = 0; 69463f89caaSJens Wiklander uint8_t always_sensitive = 0; 69563f89caaSJens Wiklander uint8_t never_extract = 0; 696fa247a2aSRuchika Gupta uint32_t class = PKCS11_UNDEFINED_ID; 697fa247a2aSRuchika Gupta uint32_t type = PKCS11_UNDEFINED_ID; 69863f89caaSJens Wiklander uint32_t mechanism_id = PKCS11_CKM_UNDEFINED_ID; 69963f89caaSJens Wiklander 70063f89caaSJens Wiklander #ifdef DEBUG /* Sanity: check function argument */ 70163f89caaSJens Wiklander trace_attributes_from_api_head("template", template, template_size); 70263f89caaSJens Wiklander switch (function) { 703fa247a2aSRuchika Gupta case PKCS11_FUNCTION_GENERATE: 70463f89caaSJens Wiklander case PKCS11_FUNCTION_IMPORT: 7052d25a9bcSRuchika Gupta case PKCS11_FUNCTION_MODIFY: 7062d25a9bcSRuchika Gupta case PKCS11_FUNCTION_COPY: 70763f89caaSJens Wiklander break; 70863f89caaSJens Wiklander default: 70963f89caaSJens Wiklander TEE_Panic(TEE_ERROR_NOT_SUPPORTED); 71063f89caaSJens Wiklander } 71163f89caaSJens Wiklander #endif 71263f89caaSJens Wiklander 713dcad3409SRuchika Gupta /* 714dcad3409SRuchika Gupta * For PKCS11_FUNCTION_GENERATE, find the class and type 715dcad3409SRuchika Gupta * based on the mechanism. These will be passed as hint 716dcad3409SRuchika Gupta * sanitize_client_object() and added in temp if not 717dcad3409SRuchika Gupta * already present 718dcad3409SRuchika Gupta */ 719dcad3409SRuchika Gupta if (function == PKCS11_FUNCTION_GENERATE) { 720fa247a2aSRuchika Gupta switch (mecha) { 721fa247a2aSRuchika Gupta case PKCS11_CKM_GENERIC_SECRET_KEY_GEN: 722fa247a2aSRuchika Gupta class = PKCS11_CKO_SECRET_KEY; 723fa247a2aSRuchika Gupta type = PKCS11_CKK_GENERIC_SECRET; 724fa247a2aSRuchika Gupta break; 725fa247a2aSRuchika Gupta case PKCS11_CKM_AES_KEY_GEN: 726fa247a2aSRuchika Gupta class = PKCS11_CKO_SECRET_KEY; 727fa247a2aSRuchika Gupta type = PKCS11_CKK_AES; 728fa247a2aSRuchika Gupta break; 729fa247a2aSRuchika Gupta default: 730dcad3409SRuchika Gupta TEE_Panic(TEE_ERROR_NOT_SUPPORTED); 731fa247a2aSRuchika Gupta } 732fa247a2aSRuchika Gupta } 733fa247a2aSRuchika Gupta 7342d25a9bcSRuchika Gupta /* 7352d25a9bcSRuchika Gupta * Check and remove duplicates if any and create a new temporary 7362d25a9bcSRuchika Gupta * template 7372d25a9bcSRuchika Gupta */ 738dcad3409SRuchika Gupta rc = sanitize_client_object(&temp, template, template_size, class, 739dcad3409SRuchika Gupta type); 740dcad3409SRuchika Gupta if (rc) 741dcad3409SRuchika Gupta goto out; 742dcad3409SRuchika Gupta 743dcad3409SRuchika Gupta /* 7442d25a9bcSRuchika Gupta * For function type modify and copy return the created template 7452d25a9bcSRuchika Gupta * from here. Rest of the code below is for creating objects 7462d25a9bcSRuchika Gupta * or generating keys. 7472d25a9bcSRuchika Gupta */ 7482d25a9bcSRuchika Gupta switch (function) { 7492d25a9bcSRuchika Gupta case PKCS11_FUNCTION_MODIFY: 7502d25a9bcSRuchika Gupta case PKCS11_FUNCTION_COPY: 7512d25a9bcSRuchika Gupta *out = temp; 7522d25a9bcSRuchika Gupta return rc; 7532d25a9bcSRuchika Gupta default: 7542d25a9bcSRuchika Gupta break; 7552d25a9bcSRuchika Gupta } 7562d25a9bcSRuchika Gupta 7572d25a9bcSRuchika Gupta /* 758dcad3409SRuchika Gupta * Check if class and type in temp are consistent with the mechanism 759dcad3409SRuchika Gupta */ 760fa247a2aSRuchika Gupta switch (mecha) { 761fa247a2aSRuchika Gupta case PKCS11_CKM_GENERIC_SECRET_KEY_GEN: 762fa247a2aSRuchika Gupta if (get_class(temp) != PKCS11_CKO_SECRET_KEY || 763fa247a2aSRuchika Gupta get_key_type(temp) != PKCS11_CKK_GENERIC_SECRET) { 764fa247a2aSRuchika Gupta rc = PKCS11_CKR_TEMPLATE_INCONSISTENT; 765fa247a2aSRuchika Gupta goto out; 766fa247a2aSRuchika Gupta } 767fa247a2aSRuchika Gupta break; 768fa247a2aSRuchika Gupta case PKCS11_CKM_AES_KEY_GEN: 769fa247a2aSRuchika Gupta if (get_class(temp) != PKCS11_CKO_SECRET_KEY || 770fa247a2aSRuchika Gupta get_key_type(temp) != PKCS11_CKK_AES) { 771fa247a2aSRuchika Gupta rc = PKCS11_CKR_TEMPLATE_INCONSISTENT; 772fa247a2aSRuchika Gupta goto out; 773fa247a2aSRuchika Gupta } 774fa247a2aSRuchika Gupta break; 775fa247a2aSRuchika Gupta default: 776fa247a2aSRuchika Gupta break; 777fa247a2aSRuchika Gupta } 77863f89caaSJens Wiklander 77963f89caaSJens Wiklander if (!sanitize_consistent_class_and_type(temp)) { 78063f89caaSJens Wiklander EMSG("Inconsistent class/type"); 78163f89caaSJens Wiklander rc = PKCS11_CKR_TEMPLATE_INCONSISTENT; 78263f89caaSJens Wiklander goto out; 78363f89caaSJens Wiklander } 78463f89caaSJens Wiklander 78563f89caaSJens Wiklander switch (get_class(temp)) { 78663f89caaSJens Wiklander case PKCS11_CKO_DATA: 78763f89caaSJens Wiklander rc = create_data_attributes(&attrs, temp); 78863f89caaSJens Wiklander break; 78963f89caaSJens Wiklander case PKCS11_CKO_SECRET_KEY: 79063f89caaSJens Wiklander rc = create_symm_key_attributes(&attrs, temp); 79163f89caaSJens Wiklander break; 79263f89caaSJens Wiklander case PKCS11_CKO_PUBLIC_KEY: 79363f89caaSJens Wiklander rc = create_pub_key_attributes(&attrs, temp); 79463f89caaSJens Wiklander break; 79563f89caaSJens Wiklander case PKCS11_CKO_PRIVATE_KEY: 79663f89caaSJens Wiklander rc = create_priv_key_attributes(&attrs, temp); 79763f89caaSJens Wiklander break; 79863f89caaSJens Wiklander default: 79963f89caaSJens Wiklander DMSG("Invalid object class %#"PRIx32"/%s", 80063f89caaSJens Wiklander get_class(temp), id2str_class(get_class(temp))); 80163f89caaSJens Wiklander 80263f89caaSJens Wiklander rc = PKCS11_CKR_TEMPLATE_INCONSISTENT; 80363f89caaSJens Wiklander break; 80463f89caaSJens Wiklander } 80563f89caaSJens Wiklander if (rc) 80663f89caaSJens Wiklander goto out; 80763f89caaSJens Wiklander 80890c47fe2SRuchika Gupta if (get_attribute_ptr(temp, PKCS11_CKA_LOCAL, NULL, NULL) != 809002f6b93SEtienne Carriere PKCS11_RV_NOT_FOUND) { 810002f6b93SEtienne Carriere rc = PKCS11_CKR_TEMPLATE_INCONSISTENT; 81163f89caaSJens Wiklander goto out; 812002f6b93SEtienne Carriere } 81363f89caaSJens Wiklander 81490c47fe2SRuchika Gupta if (get_attribute_ptr(temp, PKCS11_CKA_KEY_GEN_MECHANISM, NULL, NULL) != 815002f6b93SEtienne Carriere PKCS11_RV_NOT_FOUND) { 816002f6b93SEtienne Carriere rc = PKCS11_CKR_TEMPLATE_INCONSISTENT; 81763f89caaSJens Wiklander goto out; 818002f6b93SEtienne Carriere } 81963f89caaSJens Wiklander 82063f89caaSJens Wiklander switch (function) { 821fa247a2aSRuchika Gupta case PKCS11_FUNCTION_GENERATE: 822fa247a2aSRuchika Gupta local = PKCS11_TRUE; 823fa247a2aSRuchika Gupta break; 82463f89caaSJens Wiklander case PKCS11_FUNCTION_IMPORT: 82563f89caaSJens Wiklander default: 82663f89caaSJens Wiklander local = PKCS11_FALSE; 82763f89caaSJens Wiklander break; 82863f89caaSJens Wiklander } 82963f89caaSJens Wiklander rc = add_attribute(&attrs, PKCS11_CKA_LOCAL, &local, sizeof(local)); 83063f89caaSJens Wiklander if (rc) 83163f89caaSJens Wiklander goto out; 83263f89caaSJens Wiklander 83363f89caaSJens Wiklander switch (get_class(attrs)) { 83463f89caaSJens Wiklander case PKCS11_CKO_SECRET_KEY: 83563f89caaSJens Wiklander case PKCS11_CKO_PRIVATE_KEY: 83663f89caaSJens Wiklander case PKCS11_CKO_PUBLIC_KEY: 83763f89caaSJens Wiklander always_sensitive = PKCS11_FALSE; 83863f89caaSJens Wiklander never_extract = PKCS11_FALSE; 83963f89caaSJens Wiklander 840fa247a2aSRuchika Gupta switch (function) { 841fa247a2aSRuchika Gupta case PKCS11_FUNCTION_GENERATE: 842fa247a2aSRuchika Gupta always_sensitive = get_bool(attrs, 843fa247a2aSRuchika Gupta PKCS11_CKA_SENSITIVE); 844fa247a2aSRuchika Gupta never_extract = !get_bool(attrs, 845fa247a2aSRuchika Gupta PKCS11_CKA_EXTRACTABLE); 846fa247a2aSRuchika Gupta break; 847fa247a2aSRuchika Gupta default: 848fa247a2aSRuchika Gupta break; 849fa247a2aSRuchika Gupta } 850fa247a2aSRuchika Gupta 85163f89caaSJens Wiklander rc = add_attribute(&attrs, PKCS11_CKA_ALWAYS_SENSITIVE, 85263f89caaSJens Wiklander &always_sensitive, sizeof(always_sensitive)); 85363f89caaSJens Wiklander if (rc) 85463f89caaSJens Wiklander goto out; 85563f89caaSJens Wiklander 85663f89caaSJens Wiklander rc = add_attribute(&attrs, PKCS11_CKA_NEVER_EXTRACTABLE, 85763f89caaSJens Wiklander &never_extract, sizeof(never_extract)); 85863f89caaSJens Wiklander if (rc) 85963f89caaSJens Wiklander goto out; 86063f89caaSJens Wiklander 86163f89caaSJens Wiklander /* Keys mandate attribute PKCS11_CKA_KEY_GEN_MECHANISM */ 862fa247a2aSRuchika Gupta if (local) 863fa247a2aSRuchika Gupta mechanism_id = mecha; 864fa247a2aSRuchika Gupta else 86563f89caaSJens Wiklander mechanism_id = PKCS11_CK_UNAVAILABLE_INFORMATION; 866fa247a2aSRuchika Gupta 86763f89caaSJens Wiklander rc = add_attribute(&attrs, PKCS11_CKA_KEY_GEN_MECHANISM, 86863f89caaSJens Wiklander &mechanism_id, sizeof(mechanism_id)); 86963f89caaSJens Wiklander if (rc) 87063f89caaSJens Wiklander goto out; 87163f89caaSJens Wiklander break; 87263f89caaSJens Wiklander 87363f89caaSJens Wiklander default: 87463f89caaSJens Wiklander break; 87563f89caaSJens Wiklander } 87663f89caaSJens Wiklander 87763f89caaSJens Wiklander *out = attrs; 87863f89caaSJens Wiklander 87963f89caaSJens Wiklander #ifdef DEBUG 88063f89caaSJens Wiklander trace_attributes("object", attrs); 88163f89caaSJens Wiklander #endif 88263f89caaSJens Wiklander 88363f89caaSJens Wiklander out: 88463f89caaSJens Wiklander TEE_Free(temp); 88563f89caaSJens Wiklander if (rc) 88663f89caaSJens Wiklander TEE_Free(attrs); 88763f89caaSJens Wiklander 88863f89caaSJens Wiklander return rc; 88963f89caaSJens Wiklander } 89063f89caaSJens Wiklander 89163f89caaSJens Wiklander static enum pkcs11_rc check_attrs_misc_integrity(struct obj_attrs *head) 89263f89caaSJens Wiklander { 89363f89caaSJens Wiklander if (get_bool(head, PKCS11_CKA_NEVER_EXTRACTABLE) && 89463f89caaSJens Wiklander get_bool(head, PKCS11_CKA_EXTRACTABLE)) { 89563f89caaSJens Wiklander DMSG("Never/Extractable attributes mismatch %d/%d", 89663f89caaSJens Wiklander get_bool(head, PKCS11_CKA_NEVER_EXTRACTABLE), 89763f89caaSJens Wiklander get_bool(head, PKCS11_CKA_EXTRACTABLE)); 89863f89caaSJens Wiklander 89963f89caaSJens Wiklander return PKCS11_CKR_TEMPLATE_INCONSISTENT; 90063f89caaSJens Wiklander } 90163f89caaSJens Wiklander 90263f89caaSJens Wiklander if (get_bool(head, PKCS11_CKA_ALWAYS_SENSITIVE) && 90363f89caaSJens Wiklander !get_bool(head, PKCS11_CKA_SENSITIVE)) { 90463f89caaSJens Wiklander DMSG("Sensitive/always attributes mismatch %d/%d", 90563f89caaSJens Wiklander get_bool(head, PKCS11_CKA_SENSITIVE), 90663f89caaSJens Wiklander get_bool(head, PKCS11_CKA_ALWAYS_SENSITIVE)); 90763f89caaSJens Wiklander 90863f89caaSJens Wiklander return PKCS11_CKR_TEMPLATE_INCONSISTENT; 90963f89caaSJens Wiklander } 91063f89caaSJens Wiklander 91163f89caaSJens Wiklander return PKCS11_CKR_OK; 91263f89caaSJens Wiklander } 91363f89caaSJens Wiklander 91489735787SRuchika Gupta bool object_is_private(struct obj_attrs *head) 91589735787SRuchika Gupta { 91689735787SRuchika Gupta if (get_class(head) == PKCS11_CKO_PRIVATE_KEY) 91789735787SRuchika Gupta return true; 91889735787SRuchika Gupta 91989735787SRuchika Gupta if (get_bool(head, PKCS11_CKA_PRIVATE)) 92089735787SRuchika Gupta return true; 92189735787SRuchika Gupta 92289735787SRuchika Gupta return false; 92389735787SRuchika Gupta } 92489735787SRuchika Gupta 9252d25a9bcSRuchika Gupta bool object_is_token(struct obj_attrs *head) 9262d25a9bcSRuchika Gupta { 9272d25a9bcSRuchika Gupta return get_bool(head, PKCS11_CKA_TOKEN); 9282d25a9bcSRuchika Gupta } 9292d25a9bcSRuchika Gupta 9302d25a9bcSRuchika Gupta bool object_is_modifiable(struct obj_attrs *head) 9312d25a9bcSRuchika Gupta { 9322d25a9bcSRuchika Gupta return get_bool(head, PKCS11_CKA_MODIFIABLE); 9332d25a9bcSRuchika Gupta } 9342d25a9bcSRuchika Gupta 9352d25a9bcSRuchika Gupta bool object_is_copyable(struct obj_attrs *head) 9362d25a9bcSRuchika Gupta { 9372d25a9bcSRuchika Gupta return get_bool(head, PKCS11_CKA_COPYABLE); 9382d25a9bcSRuchika Gupta } 9392d25a9bcSRuchika Gupta 94063f89caaSJens Wiklander /* 941512cbf1dSJens Wiklander * Check access to object against authentication to token 942512cbf1dSJens Wiklander */ 943512cbf1dSJens Wiklander enum pkcs11_rc check_access_attrs_against_token(struct pkcs11_session *session, 944512cbf1dSJens Wiklander struct obj_attrs *head) 945512cbf1dSJens Wiklander { 946512cbf1dSJens Wiklander bool private = true; 947512cbf1dSJens Wiklander 948512cbf1dSJens Wiklander switch (get_class(head)) { 949512cbf1dSJens Wiklander case PKCS11_CKO_SECRET_KEY: 950512cbf1dSJens Wiklander case PKCS11_CKO_PUBLIC_KEY: 951512cbf1dSJens Wiklander case PKCS11_CKO_DATA: 952512cbf1dSJens Wiklander private = get_bool(head, PKCS11_CKA_PRIVATE); 953512cbf1dSJens Wiklander break; 954512cbf1dSJens Wiklander case PKCS11_CKO_PRIVATE_KEY: 955512cbf1dSJens Wiklander break; 956512cbf1dSJens Wiklander default: 957512cbf1dSJens Wiklander return PKCS11_CKR_KEY_FUNCTION_NOT_PERMITTED; 958512cbf1dSJens Wiklander } 959512cbf1dSJens Wiklander 9605db0fef4SRuchika Gupta if (private && (pkcs11_session_is_public(session) || 9615db0fef4SRuchika Gupta pkcs11_session_is_so(session))) { 9625db0fef4SRuchika Gupta DMSG("Private object access from a public or SO session"); 963512cbf1dSJens Wiklander 96412f1ba86SRuchika Gupta return PKCS11_CKR_USER_NOT_LOGGED_IN; 965512cbf1dSJens Wiklander } 966512cbf1dSJens Wiklander 967512cbf1dSJens Wiklander return PKCS11_CKR_OK; 968512cbf1dSJens Wiklander } 969512cbf1dSJens Wiklander 970512cbf1dSJens Wiklander /* 97163f89caaSJens Wiklander * Check the attributes of a to-be-created object matches the token state 97263f89caaSJens Wiklander */ 97363f89caaSJens Wiklander enum pkcs11_rc check_created_attrs_against_token(struct pkcs11_session *session, 97463f89caaSJens Wiklander struct obj_attrs *head) 97563f89caaSJens Wiklander { 97663f89caaSJens Wiklander enum pkcs11_rc rc = PKCS11_CKR_OK; 97763f89caaSJens Wiklander 97863f89caaSJens Wiklander rc = check_attrs_misc_integrity(head); 97963f89caaSJens Wiklander if (rc) 98063f89caaSJens Wiklander return rc; 98163f89caaSJens Wiklander 98263f89caaSJens Wiklander if (get_bool(head, PKCS11_CKA_TRUSTED) && 98363f89caaSJens Wiklander !pkcs11_session_is_so(session)) { 98463f89caaSJens Wiklander DMSG("Can't create trusted object"); 98563f89caaSJens Wiklander 98663f89caaSJens Wiklander return PKCS11_CKR_KEY_FUNCTION_NOT_PERMITTED; 98763f89caaSJens Wiklander } 98863f89caaSJens Wiklander 98963f89caaSJens Wiklander if (get_bool(head, PKCS11_CKA_TOKEN) && 99063f89caaSJens Wiklander !pkcs11_session_is_read_write(session)) { 99163f89caaSJens Wiklander DMSG("Can't create persistent object"); 99263f89caaSJens Wiklander 99363f89caaSJens Wiklander return PKCS11_CKR_SESSION_READ_ONLY; 99463f89caaSJens Wiklander } 99563f89caaSJens Wiklander 99663f89caaSJens Wiklander /* 99763f89caaSJens Wiklander * TODO: START_DATE and END_DATE: complies with current time? 99863f89caaSJens Wiklander */ 99963f89caaSJens Wiklander return PKCS11_CKR_OK; 100063f89caaSJens Wiklander } 100163f89caaSJens Wiklander 100263f89caaSJens Wiklander #define DMSG_BAD_BBOOL(attr, proc, head) \ 100363f89caaSJens Wiklander do { \ 100463f89caaSJens Wiklander uint32_t __maybe_unused _attr = (attr); \ 100563f89caaSJens Wiklander uint8_t __maybe_unused _bvalue = 0; \ 100663f89caaSJens Wiklander enum pkcs11_rc __maybe_unused _rc = PKCS11_CKR_OK; \ 100763f89caaSJens Wiklander \ 100863f89caaSJens Wiklander _rc = get_attribute((head), _attr, &_bvalue, NULL); \ 100963f89caaSJens Wiklander DMSG("%s issue for %s: %sfound, value %"PRIu8, \ 101063f89caaSJens Wiklander id2str_attr(_attr), id2str_proc((proc)), \ 101163f89caaSJens Wiklander _rc ? "not " : "", _bvalue); \ 101263f89caaSJens Wiklander } while (0) 101363f89caaSJens Wiklander 101463f89caaSJens Wiklander static bool __maybe_unused check_attr_bval(uint32_t proc_id __maybe_unused, 101563f89caaSJens Wiklander struct obj_attrs *head, 101663f89caaSJens Wiklander uint32_t attribute, bool val) 101763f89caaSJens Wiklander { 101863f89caaSJens Wiklander uint8_t bbool = 0; 101963f89caaSJens Wiklander uint32_t sz = sizeof(bbool); 102063f89caaSJens Wiklander 102163f89caaSJens Wiklander if (!get_attribute(head, attribute, &bbool, &sz) && !!bbool == val) 102263f89caaSJens Wiklander return true; 102363f89caaSJens Wiklander 102463f89caaSJens Wiklander DMSG_BAD_BBOOL(attribute, proc_id, head); 102563f89caaSJens Wiklander return false; 102663f89caaSJens Wiklander } 102763f89caaSJens Wiklander 102863f89caaSJens Wiklander /* 102963f89caaSJens Wiklander * Check the attributes of a new secret match the processing/mechanism 103063f89caaSJens Wiklander * used to create it. 103163f89caaSJens Wiklander * 103263f89caaSJens Wiklander * @proc_id - PKCS11_CKM_xxx 103363f89caaSJens Wiklander * @head - head of the attributes of the to-be-created object. 103463f89caaSJens Wiklander */ 103563f89caaSJens Wiklander enum pkcs11_rc check_created_attrs_against_processing(uint32_t proc_id, 103663f89caaSJens Wiklander struct obj_attrs *head) 103763f89caaSJens Wiklander { 103863f89caaSJens Wiklander /* 103963f89caaSJens Wiklander * Processings that do not create secrets are not expected to call 104063f89caaSJens Wiklander * this function which would panic. 104163f89caaSJens Wiklander */ 104263f89caaSJens Wiklander switch (proc_id) { 104363f89caaSJens Wiklander case PKCS11_PROCESSING_IMPORT: 104463f89caaSJens Wiklander assert(check_attr_bval(proc_id, head, PKCS11_CKA_LOCAL, false)); 104563f89caaSJens Wiklander break; 1046fa247a2aSRuchika Gupta case PKCS11_CKM_GENERIC_SECRET_KEY_GEN: 1047fa247a2aSRuchika Gupta case PKCS11_CKM_AES_KEY_GEN: 1048fa247a2aSRuchika Gupta assert(check_attr_bval(proc_id, head, PKCS11_CKA_LOCAL, true)); 1049fa247a2aSRuchika Gupta break; 105063f89caaSJens Wiklander default: 105163f89caaSJens Wiklander TEE_Panic(proc_id); 105263f89caaSJens Wiklander break; 105363f89caaSJens Wiklander } 105463f89caaSJens Wiklander 1055fa247a2aSRuchika Gupta switch (proc_id) { 1056fa247a2aSRuchika Gupta case PKCS11_CKM_GENERIC_SECRET_KEY_GEN: 1057fa247a2aSRuchika Gupta assert(get_key_type(head) == PKCS11_CKK_GENERIC_SECRET); 1058fa247a2aSRuchika Gupta break; 1059fa247a2aSRuchika Gupta case PKCS11_CKM_AES_KEY_GEN: 1060fa247a2aSRuchika Gupta assert(get_key_type(head) == PKCS11_CKK_AES); 1061fa247a2aSRuchika Gupta break; 1062fa247a2aSRuchika Gupta case PKCS11_PROCESSING_IMPORT: 1063fa247a2aSRuchika Gupta default: 1064fa247a2aSRuchika Gupta break; 1065fa247a2aSRuchika Gupta } 1066fa247a2aSRuchika Gupta 106763f89caaSJens Wiklander return PKCS11_CKR_OK; 106863f89caaSJens Wiklander } 1069512cbf1dSJens Wiklander 1070*2d0cd829SRuchika Gupta /* Return min and max key size supported for a key_type in bytes */ 1071512cbf1dSJens Wiklander static void get_key_min_max_sizes(enum pkcs11_key_type key_type, 1072512cbf1dSJens Wiklander uint32_t *min_key_size, 1073512cbf1dSJens Wiklander uint32_t *max_key_size) 1074512cbf1dSJens Wiklander { 1075512cbf1dSJens Wiklander enum pkcs11_mechanism_id mechanism = PKCS11_CKM_UNDEFINED_ID; 1076512cbf1dSJens Wiklander 1077512cbf1dSJens Wiklander switch (key_type) { 1078fa247a2aSRuchika Gupta case PKCS11_CKK_GENERIC_SECRET: 1079fa247a2aSRuchika Gupta mechanism = PKCS11_CKM_GENERIC_SECRET_KEY_GEN; 1080fa247a2aSRuchika Gupta break; 1081512cbf1dSJens Wiklander case PKCS11_CKK_AES: 1082512cbf1dSJens Wiklander mechanism = PKCS11_CKM_AES_KEY_GEN; 1083512cbf1dSJens Wiklander break; 10841f45c9cfSRuchika Gupta case PKCS11_CKK_MD5_HMAC: 10851f45c9cfSRuchika Gupta mechanism = PKCS11_CKM_MD5_HMAC; 10861f45c9cfSRuchika Gupta break; 10871f45c9cfSRuchika Gupta case PKCS11_CKK_SHA_1_HMAC: 10881f45c9cfSRuchika Gupta mechanism = PKCS11_CKM_SHA_1_HMAC; 10891f45c9cfSRuchika Gupta break; 10901f45c9cfSRuchika Gupta case PKCS11_CKK_SHA224_HMAC: 10911f45c9cfSRuchika Gupta mechanism = PKCS11_CKM_SHA224_HMAC; 10921f45c9cfSRuchika Gupta break; 1093a339a354SEtienne Carriere case PKCS11_CKK_SHA256_HMAC: 1094a339a354SEtienne Carriere mechanism = PKCS11_CKM_SHA256_HMAC; 1095a339a354SEtienne Carriere break; 10961f45c9cfSRuchika Gupta case PKCS11_CKK_SHA384_HMAC: 10971f45c9cfSRuchika Gupta mechanism = PKCS11_CKM_SHA384_HMAC; 10981f45c9cfSRuchika Gupta break; 10991f45c9cfSRuchika Gupta case PKCS11_CKK_SHA512_HMAC: 11001f45c9cfSRuchika Gupta mechanism = PKCS11_CKM_SHA512_HMAC; 11011f45c9cfSRuchika Gupta break; 1102512cbf1dSJens Wiklander default: 1103512cbf1dSJens Wiklander TEE_Panic(key_type); 1104512cbf1dSJens Wiklander break; 1105512cbf1dSJens Wiklander } 1106512cbf1dSJens Wiklander 1107*2d0cd829SRuchika Gupta mechanism_supported_key_sizes_bytes(mechanism, min_key_size, 1108512cbf1dSJens Wiklander max_key_size); 1109512cbf1dSJens Wiklander } 1110512cbf1dSJens Wiklander 1111512cbf1dSJens Wiklander enum pkcs11_rc check_created_attrs(struct obj_attrs *key1, 1112512cbf1dSJens Wiklander struct obj_attrs *key2) 1113512cbf1dSJens Wiklander { 1114512cbf1dSJens Wiklander enum pkcs11_rc rc = PKCS11_CKR_OK; 1115512cbf1dSJens Wiklander struct obj_attrs *secret = NULL; 1116512cbf1dSJens Wiklander uint32_t max_key_size = 0; 1117512cbf1dSJens Wiklander uint32_t min_key_size = 0; 1118512cbf1dSJens Wiklander uint32_t key_length = 0; 1119512cbf1dSJens Wiklander 1120512cbf1dSJens Wiklander switch (get_class(key1)) { 1121512cbf1dSJens Wiklander case PKCS11_CKO_SECRET_KEY: 1122512cbf1dSJens Wiklander secret = key1; 1123512cbf1dSJens Wiklander break; 1124512cbf1dSJens Wiklander default: 1125512cbf1dSJens Wiklander return PKCS11_CKR_ATTRIBUTE_VALUE_INVALID; 1126512cbf1dSJens Wiklander } 1127512cbf1dSJens Wiklander 1128512cbf1dSJens Wiklander if (key2) 1129512cbf1dSJens Wiklander return PKCS11_CKR_ATTRIBUTE_VALUE_INVALID; 1130512cbf1dSJens Wiklander 1131512cbf1dSJens Wiklander if (secret) { 1132512cbf1dSJens Wiklander switch (get_key_type(secret)) { 1133512cbf1dSJens Wiklander case PKCS11_CKK_AES: 1134512cbf1dSJens Wiklander case PKCS11_CKK_GENERIC_SECRET: 1135512cbf1dSJens Wiklander case PKCS11_CKK_MD5_HMAC: 1136512cbf1dSJens Wiklander case PKCS11_CKK_SHA_1_HMAC: 1137512cbf1dSJens Wiklander case PKCS11_CKK_SHA224_HMAC: 1138512cbf1dSJens Wiklander case PKCS11_CKK_SHA256_HMAC: 1139512cbf1dSJens Wiklander case PKCS11_CKK_SHA384_HMAC: 1140512cbf1dSJens Wiklander case PKCS11_CKK_SHA512_HMAC: 1141512cbf1dSJens Wiklander break; 1142512cbf1dSJens Wiklander default: 1143512cbf1dSJens Wiklander return PKCS11_CKR_TEMPLATE_INCONSISTENT; 1144512cbf1dSJens Wiklander } 1145512cbf1dSJens Wiklander 1146512cbf1dSJens Wiklander /* Get key size */ 1147512cbf1dSJens Wiklander rc = get_u32_attribute(secret, PKCS11_CKA_VALUE_LEN, 1148512cbf1dSJens Wiklander &key_length); 1149512cbf1dSJens Wiklander if (rc) 1150d1d44372SRuchika Gupta return PKCS11_CKR_TEMPLATE_INCOMPLETE; 1151512cbf1dSJens Wiklander } 1152512cbf1dSJens Wiklander 1153512cbf1dSJens Wiklander get_key_min_max_sizes(get_key_type(key1), &min_key_size, &max_key_size); 1154512cbf1dSJens Wiklander if (key_length < min_key_size || key_length > max_key_size) { 1155512cbf1dSJens Wiklander EMSG("Length %"PRIu32" vs range [%"PRIu32" %"PRIu32"]", 1156512cbf1dSJens Wiklander key_length, min_key_size, max_key_size); 1157512cbf1dSJens Wiklander 1158512cbf1dSJens Wiklander return PKCS11_CKR_KEY_SIZE_RANGE; 1159512cbf1dSJens Wiklander } 1160512cbf1dSJens Wiklander 1161512cbf1dSJens Wiklander return PKCS11_CKR_OK; 1162512cbf1dSJens Wiklander } 1163512cbf1dSJens Wiklander 1164512cbf1dSJens Wiklander /* Check processing ID against attribute ALLOWED_MECHANISMS if any */ 1165512cbf1dSJens Wiklander static bool parent_key_complies_allowed_processings(uint32_t proc_id, 1166512cbf1dSJens Wiklander struct obj_attrs *head) 1167512cbf1dSJens Wiklander { 1168512cbf1dSJens Wiklander char *attr = NULL; 1169512cbf1dSJens Wiklander uint32_t size = 0; 1170512cbf1dSJens Wiklander uint32_t proc = 0; 1171512cbf1dSJens Wiklander size_t count = 0; 11726a760c9eSEtienne Carriere enum pkcs11_rc rc = PKCS11_CKR_GENERAL_ERROR; 1173512cbf1dSJens Wiklander 11746a760c9eSEtienne Carriere rc = get_attribute_ptr(head, PKCS11_CKA_ALLOWED_MECHANISMS, 11756a760c9eSEtienne Carriere (void *)&attr, &size); 11766a760c9eSEtienne Carriere if (rc == PKCS11_RV_NOT_FOUND) 1177512cbf1dSJens Wiklander return true; 11786a760c9eSEtienne Carriere if (rc) { 11796a760c9eSEtienne Carriere EMSG("unexpected attributes state"); 11806a760c9eSEtienne Carriere TEE_Panic(TEE_ERROR_BAD_STATE); 1181512cbf1dSJens Wiklander } 1182512cbf1dSJens Wiklander 1183512cbf1dSJens Wiklander for (count = size / sizeof(uint32_t); count; count--) { 1184512cbf1dSJens Wiklander TEE_MemMove(&proc, attr, sizeof(uint32_t)); 1185512cbf1dSJens Wiklander attr += sizeof(uint32_t); 1186512cbf1dSJens Wiklander 1187512cbf1dSJens Wiklander if (proc == proc_id) 1188512cbf1dSJens Wiklander return true; 1189512cbf1dSJens Wiklander } 1190512cbf1dSJens Wiklander 1191512cbf1dSJens Wiklander DMSG("can't find %s in allowed list", id2str_proc(proc_id)); 1192512cbf1dSJens Wiklander return false; 1193512cbf1dSJens Wiklander } 1194512cbf1dSJens Wiklander 1195512cbf1dSJens Wiklander static enum pkcs11_attr_id func_to_attr(enum processing_func func) 1196512cbf1dSJens Wiklander { 1197512cbf1dSJens Wiklander switch (func) { 1198512cbf1dSJens Wiklander case PKCS11_FUNCTION_ENCRYPT: 1199512cbf1dSJens Wiklander return PKCS11_CKA_ENCRYPT; 1200512cbf1dSJens Wiklander case PKCS11_FUNCTION_DECRYPT: 1201512cbf1dSJens Wiklander return PKCS11_CKA_DECRYPT; 1202512cbf1dSJens Wiklander case PKCS11_FUNCTION_SIGN: 1203512cbf1dSJens Wiklander return PKCS11_CKA_SIGN; 1204512cbf1dSJens Wiklander case PKCS11_FUNCTION_VERIFY: 1205512cbf1dSJens Wiklander return PKCS11_CKA_VERIFY; 1206512cbf1dSJens Wiklander case PKCS11_FUNCTION_WRAP: 1207512cbf1dSJens Wiklander return PKCS11_CKA_WRAP; 1208512cbf1dSJens Wiklander case PKCS11_FUNCTION_UNWRAP: 1209512cbf1dSJens Wiklander return PKCS11_CKA_UNWRAP; 1210512cbf1dSJens Wiklander case PKCS11_FUNCTION_DERIVE: 1211512cbf1dSJens Wiklander return PKCS11_CKA_DERIVE; 1212512cbf1dSJens Wiklander default: 1213512cbf1dSJens Wiklander return PKCS11_CKA_UNDEFINED_ID; 1214512cbf1dSJens Wiklander } 1215512cbf1dSJens Wiklander } 1216512cbf1dSJens Wiklander 1217512cbf1dSJens Wiklander enum pkcs11_rc 1218512cbf1dSJens Wiklander check_parent_attrs_against_processing(enum pkcs11_mechanism_id proc_id, 1219512cbf1dSJens Wiklander enum processing_func function, 1220512cbf1dSJens Wiklander struct obj_attrs *head) 1221512cbf1dSJens Wiklander { 1222512cbf1dSJens Wiklander enum pkcs11_class_id key_class = get_class(head); 1223512cbf1dSJens Wiklander enum pkcs11_key_type key_type = get_key_type(head); 1224512cbf1dSJens Wiklander enum pkcs11_attr_id attr = func_to_attr(function); 1225512cbf1dSJens Wiklander 1226512cbf1dSJens Wiklander if (!get_bool(head, attr)) { 1227512cbf1dSJens Wiklander DMSG("%s not permitted", id2str_attr(attr)); 1228512cbf1dSJens Wiklander return PKCS11_CKR_KEY_FUNCTION_NOT_PERMITTED; 1229512cbf1dSJens Wiklander } 1230512cbf1dSJens Wiklander 1231512cbf1dSJens Wiklander /* Check processing complies with parent key family */ 1232512cbf1dSJens Wiklander switch (proc_id) { 1233512cbf1dSJens Wiklander case PKCS11_CKM_AES_ECB: 1234512cbf1dSJens Wiklander case PKCS11_CKM_AES_CBC: 1235512cbf1dSJens Wiklander case PKCS11_CKM_AES_CBC_PAD: 1236512cbf1dSJens Wiklander case PKCS11_CKM_AES_CTS: 1237512cbf1dSJens Wiklander case PKCS11_CKM_AES_CTR: 1238512cbf1dSJens Wiklander if (key_class == PKCS11_CKO_SECRET_KEY && 1239512cbf1dSJens Wiklander key_type == PKCS11_CKK_AES) 1240512cbf1dSJens Wiklander break; 1241512cbf1dSJens Wiklander 1242512cbf1dSJens Wiklander DMSG("%s invalid key %s/%s", id2str_proc(proc_id), 1243512cbf1dSJens Wiklander id2str_class(key_class), id2str_key_type(key_type)); 1244512cbf1dSJens Wiklander 1245512cbf1dSJens Wiklander return PKCS11_CKR_KEY_FUNCTION_NOT_PERMITTED; 1246512cbf1dSJens Wiklander 1247689f4e5bSRuchika Gupta case PKCS11_CKM_MD5_HMAC: 1248689f4e5bSRuchika Gupta case PKCS11_CKM_SHA_1_HMAC: 1249689f4e5bSRuchika Gupta case PKCS11_CKM_SHA224_HMAC: 1250689f4e5bSRuchika Gupta case PKCS11_CKM_SHA256_HMAC: 1251689f4e5bSRuchika Gupta case PKCS11_CKM_SHA384_HMAC: 1252689f4e5bSRuchika Gupta case PKCS11_CKM_SHA512_HMAC: 1253689f4e5bSRuchika Gupta if (key_class != PKCS11_CKO_SECRET_KEY) 1254689f4e5bSRuchika Gupta return PKCS11_CKR_KEY_FUNCTION_NOT_PERMITTED; 1255689f4e5bSRuchika Gupta 1256689f4e5bSRuchika Gupta if (key_type == PKCS11_CKK_GENERIC_SECRET) 1257689f4e5bSRuchika Gupta break; 1258689f4e5bSRuchika Gupta 1259689f4e5bSRuchika Gupta switch (proc_id) { 1260689f4e5bSRuchika Gupta case PKCS11_CKM_MD5_HMAC: 1261689f4e5bSRuchika Gupta if (key_type == PKCS11_CKK_MD5_HMAC) 1262689f4e5bSRuchika Gupta break; 1263689f4e5bSRuchika Gupta return PKCS11_CKR_KEY_FUNCTION_NOT_PERMITTED; 1264689f4e5bSRuchika Gupta case PKCS11_CKM_SHA_1_HMAC: 1265689f4e5bSRuchika Gupta if (key_type == PKCS11_CKK_SHA_1_HMAC) 1266689f4e5bSRuchika Gupta break; 1267689f4e5bSRuchika Gupta return PKCS11_CKR_KEY_FUNCTION_NOT_PERMITTED; 1268689f4e5bSRuchika Gupta case PKCS11_CKM_SHA224_HMAC: 1269689f4e5bSRuchika Gupta if (key_type == PKCS11_CKK_SHA224_HMAC) 1270689f4e5bSRuchika Gupta break; 1271689f4e5bSRuchika Gupta return PKCS11_CKR_KEY_FUNCTION_NOT_PERMITTED; 1272689f4e5bSRuchika Gupta case PKCS11_CKM_SHA256_HMAC: 1273689f4e5bSRuchika Gupta if (key_type == PKCS11_CKK_SHA256_HMAC) 1274689f4e5bSRuchika Gupta break; 1275689f4e5bSRuchika Gupta return PKCS11_CKR_KEY_FUNCTION_NOT_PERMITTED; 1276689f4e5bSRuchika Gupta case PKCS11_CKM_SHA384_HMAC: 1277689f4e5bSRuchika Gupta if (key_type == PKCS11_CKK_SHA384_HMAC) 1278689f4e5bSRuchika Gupta break; 1279689f4e5bSRuchika Gupta return PKCS11_CKR_KEY_FUNCTION_NOT_PERMITTED; 1280689f4e5bSRuchika Gupta case PKCS11_CKM_SHA512_HMAC: 1281689f4e5bSRuchika Gupta if (key_type == PKCS11_CKK_SHA512_HMAC) 1282689f4e5bSRuchika Gupta break; 1283689f4e5bSRuchika Gupta return PKCS11_CKR_KEY_FUNCTION_NOT_PERMITTED; 1284689f4e5bSRuchika Gupta default: 1285689f4e5bSRuchika Gupta return PKCS11_CKR_KEY_FUNCTION_NOT_PERMITTED; 1286689f4e5bSRuchika Gupta } 1287689f4e5bSRuchika Gupta break; 1288689f4e5bSRuchika Gupta 1289512cbf1dSJens Wiklander default: 1290512cbf1dSJens Wiklander DMSG("Invalid processing %#"PRIx32"/%s", proc_id, 1291512cbf1dSJens Wiklander id2str_proc(proc_id)); 1292512cbf1dSJens Wiklander 1293512cbf1dSJens Wiklander return PKCS11_CKR_MECHANISM_INVALID; 1294512cbf1dSJens Wiklander } 1295512cbf1dSJens Wiklander 1296512cbf1dSJens Wiklander if (!parent_key_complies_allowed_processings(proc_id, head)) { 1297512cbf1dSJens Wiklander DMSG("Allowed mechanism failed"); 1298512cbf1dSJens Wiklander return PKCS11_CKR_KEY_FUNCTION_NOT_PERMITTED; 1299512cbf1dSJens Wiklander } 1300512cbf1dSJens Wiklander 1301512cbf1dSJens Wiklander return PKCS11_CKR_OK; 1302512cbf1dSJens Wiklander } 1303783c1515SRuchika Gupta 1304783c1515SRuchika Gupta bool attribute_is_exportable(struct pkcs11_attribute_head *req_attr, 1305783c1515SRuchika Gupta struct pkcs11_object *obj) 1306783c1515SRuchika Gupta { 1307783c1515SRuchika Gupta uint8_t boolval = 0; 1308783c1515SRuchika Gupta uint32_t boolsize = 0; 1309783c1515SRuchika Gupta enum pkcs11_rc rc = PKCS11_CKR_GENERAL_ERROR; 1310783c1515SRuchika Gupta enum pkcs11_class_id key_class = get_class(obj->attributes); 1311783c1515SRuchika Gupta 1312783c1515SRuchika Gupta if (key_class != PKCS11_CKO_SECRET_KEY && 1313783c1515SRuchika Gupta key_class != PKCS11_CKO_PRIVATE_KEY) 1314783c1515SRuchika Gupta return true; 1315783c1515SRuchika Gupta 1316783c1515SRuchika Gupta switch (req_attr->id) { 1317783c1515SRuchika Gupta case PKCS11_CKA_PRIVATE_EXPONENT: 1318783c1515SRuchika Gupta case PKCS11_CKA_PRIME_1: 1319783c1515SRuchika Gupta case PKCS11_CKA_PRIME_2: 1320783c1515SRuchika Gupta case PKCS11_CKA_EXPONENT_1: 1321783c1515SRuchika Gupta case PKCS11_CKA_EXPONENT_2: 1322783c1515SRuchika Gupta case PKCS11_CKA_COEFFICIENT: 1323783c1515SRuchika Gupta case PKCS11_CKA_VALUE: 1324783c1515SRuchika Gupta boolsize = sizeof(boolval); 1325783c1515SRuchika Gupta rc = get_attribute(obj->attributes, PKCS11_CKA_EXTRACTABLE, 1326783c1515SRuchika Gupta &boolval, &boolsize); 1327783c1515SRuchika Gupta if (rc || boolval == PKCS11_FALSE) 1328783c1515SRuchika Gupta return false; 1329783c1515SRuchika Gupta 1330783c1515SRuchika Gupta boolsize = sizeof(boolval); 1331783c1515SRuchika Gupta rc = get_attribute(obj->attributes, PKCS11_CKA_SENSITIVE, 1332783c1515SRuchika Gupta &boolval, &boolsize); 1333783c1515SRuchika Gupta if (rc || boolval == PKCS11_TRUE) 1334783c1515SRuchika Gupta return false; 1335783c1515SRuchika Gupta break; 1336783c1515SRuchika Gupta default: 1337783c1515SRuchika Gupta break; 1338783c1515SRuchika Gupta } 1339783c1515SRuchika Gupta 1340783c1515SRuchika Gupta return true; 1341783c1515SRuchika Gupta } 13422d25a9bcSRuchika Gupta 13432d25a9bcSRuchika Gupta static bool attr_is_modifiable_any_key(struct pkcs11_attribute_head *attr) 13442d25a9bcSRuchika Gupta { 13452d25a9bcSRuchika Gupta switch (attr->id) { 13462d25a9bcSRuchika Gupta case PKCS11_CKA_ID: 13472d25a9bcSRuchika Gupta case PKCS11_CKA_START_DATE: 13482d25a9bcSRuchika Gupta case PKCS11_CKA_END_DATE: 13492d25a9bcSRuchika Gupta case PKCS11_CKA_DERIVE: 13502d25a9bcSRuchika Gupta return true; 13512d25a9bcSRuchika Gupta default: 13522d25a9bcSRuchika Gupta return false; 13532d25a9bcSRuchika Gupta } 13542d25a9bcSRuchika Gupta } 13552d25a9bcSRuchika Gupta 13562d25a9bcSRuchika Gupta static bool attr_is_modifiable_secret_key(struct pkcs11_attribute_head *attr, 13572d25a9bcSRuchika Gupta struct pkcs11_session *session, 13582d25a9bcSRuchika Gupta struct pkcs11_object *obj) 13592d25a9bcSRuchika Gupta { 13602d25a9bcSRuchika Gupta switch (attr->id) { 13612d25a9bcSRuchika Gupta case PKCS11_CKA_ENCRYPT: 13622d25a9bcSRuchika Gupta case PKCS11_CKA_DECRYPT: 13632d25a9bcSRuchika Gupta case PKCS11_CKA_SIGN: 13642d25a9bcSRuchika Gupta case PKCS11_CKA_VERIFY: 13652d25a9bcSRuchika Gupta case PKCS11_CKA_WRAP: 13662d25a9bcSRuchika Gupta case PKCS11_CKA_UNWRAP: 13672d25a9bcSRuchika Gupta return true; 13682d25a9bcSRuchika Gupta /* Can't be modified once set to CK_FALSE - 12 in Table 10 */ 13692d25a9bcSRuchika Gupta case PKCS11_CKA_EXTRACTABLE: 13702d25a9bcSRuchika Gupta return get_bool(obj->attributes, attr->id); 13712d25a9bcSRuchika Gupta /* Can't be modified once set to CK_TRUE - 11 in Table 10 */ 13722d25a9bcSRuchika Gupta case PKCS11_CKA_SENSITIVE: 13732d25a9bcSRuchika Gupta case PKCS11_CKA_WRAP_WITH_TRUSTED: 13742d25a9bcSRuchika Gupta return !get_bool(obj->attributes, attr->id); 13752d25a9bcSRuchika Gupta /* Change in CKA_TRUSTED can only be done by SO */ 13762d25a9bcSRuchika Gupta case PKCS11_CKA_TRUSTED: 13772d25a9bcSRuchika Gupta return pkcs11_session_is_so(session); 13782d25a9bcSRuchika Gupta case PKCS11_CKA_NEVER_EXTRACTABLE: 13792d25a9bcSRuchika Gupta case PKCS11_CKA_ALWAYS_SENSITIVE: 13802d25a9bcSRuchika Gupta return false; 13812d25a9bcSRuchika Gupta default: 13822d25a9bcSRuchika Gupta return false; 13832d25a9bcSRuchika Gupta } 13842d25a9bcSRuchika Gupta } 13852d25a9bcSRuchika Gupta 13862d25a9bcSRuchika Gupta static bool attr_is_modifiable_public_key(struct pkcs11_attribute_head *attr, 13872d25a9bcSRuchika Gupta struct pkcs11_session *session, 13882d25a9bcSRuchika Gupta struct pkcs11_object *obj __unused) 13892d25a9bcSRuchika Gupta { 13902d25a9bcSRuchika Gupta switch (attr->id) { 13912d25a9bcSRuchika Gupta case PKCS11_CKA_SUBJECT: 13922d25a9bcSRuchika Gupta case PKCS11_CKA_ENCRYPT: 13932d25a9bcSRuchika Gupta case PKCS11_CKA_VERIFY: 13942d25a9bcSRuchika Gupta case PKCS11_CKA_VERIFY_RECOVER: 13952d25a9bcSRuchika Gupta case PKCS11_CKA_WRAP: 13962d25a9bcSRuchika Gupta return true; 13972d25a9bcSRuchika Gupta case PKCS11_CKA_TRUSTED: 13982d25a9bcSRuchika Gupta /* Change in CKA_TRUSTED can only be done by SO */ 13992d25a9bcSRuchika Gupta return pkcs11_session_is_so(session); 14002d25a9bcSRuchika Gupta default: 14012d25a9bcSRuchika Gupta return false; 14022d25a9bcSRuchika Gupta } 14032d25a9bcSRuchika Gupta } 14042d25a9bcSRuchika Gupta 14052d25a9bcSRuchika Gupta static bool attr_is_modifiable_private_key(struct pkcs11_attribute_head *attr, 14062d25a9bcSRuchika Gupta struct pkcs11_session *sess __unused, 14072d25a9bcSRuchika Gupta struct pkcs11_object *obj) 14082d25a9bcSRuchika Gupta { 14092d25a9bcSRuchika Gupta switch (attr->id) { 14102d25a9bcSRuchika Gupta case PKCS11_CKA_SUBJECT: 14112d25a9bcSRuchika Gupta case PKCS11_CKA_DECRYPT: 14122d25a9bcSRuchika Gupta case PKCS11_CKA_SIGN: 14132d25a9bcSRuchika Gupta case PKCS11_CKA_SIGN_RECOVER: 14142d25a9bcSRuchika Gupta case PKCS11_CKA_UNWRAP: 14152d25a9bcSRuchika Gupta /* 14162d25a9bcSRuchika Gupta * TBD: Revisit if we don't support PKCS11_CKA_PUBLIC_KEY_INFO 14172d25a9bcSRuchika Gupta * Specification mentions that if this attribute is 14182d25a9bcSRuchika Gupta * supplied as part of a template for C_CreateObject, C_CopyObject or 14192d25a9bcSRuchika Gupta * C_SetAttributeValue for a private key, the token MUST verify 14202d25a9bcSRuchika Gupta * correspondence between the private key data and the public key data 14212d25a9bcSRuchika Gupta * as supplied in CKA_PUBLIC_KEY_INFO. This needs to be 14222d25a9bcSRuchika Gupta * taken care of when this object type will be implemented 14232d25a9bcSRuchika Gupta */ 14242d25a9bcSRuchika Gupta case PKCS11_CKA_PUBLIC_KEY_INFO: 14252d25a9bcSRuchika Gupta return true; 14262d25a9bcSRuchika Gupta /* Can't be modified once set to CK_FALSE - 12 in Table 10 */ 14272d25a9bcSRuchika Gupta case PKCS11_CKA_EXTRACTABLE: 14282d25a9bcSRuchika Gupta return get_bool(obj->attributes, attr->id); 14292d25a9bcSRuchika Gupta /* Can't be modified once set to CK_TRUE - 11 in Table 10 */ 14302d25a9bcSRuchika Gupta case PKCS11_CKA_SENSITIVE: 14312d25a9bcSRuchika Gupta case PKCS11_CKA_WRAP_WITH_TRUSTED: 14322d25a9bcSRuchika Gupta return !get_bool(obj->attributes, attr->id); 14332d25a9bcSRuchika Gupta case PKCS11_CKA_NEVER_EXTRACTABLE: 14342d25a9bcSRuchika Gupta case PKCS11_CKA_ALWAYS_SENSITIVE: 14352d25a9bcSRuchika Gupta return false; 14362d25a9bcSRuchika Gupta default: 14372d25a9bcSRuchika Gupta return false; 14382d25a9bcSRuchika Gupta } 14392d25a9bcSRuchika Gupta } 14402d25a9bcSRuchika Gupta 14412d25a9bcSRuchika Gupta static bool attribute_is_modifiable(struct pkcs11_session *session, 14422d25a9bcSRuchika Gupta struct pkcs11_attribute_head *req_attr, 14432d25a9bcSRuchika Gupta struct pkcs11_object *obj, 14442d25a9bcSRuchika Gupta enum pkcs11_class_id class, 14452d25a9bcSRuchika Gupta enum processing_func function) 14462d25a9bcSRuchika Gupta { 14472d25a9bcSRuchika Gupta /* Check modifiable attributes common to any object */ 14482d25a9bcSRuchika Gupta switch (req_attr->id) { 14492d25a9bcSRuchika Gupta case PKCS11_CKA_LABEL: 14502d25a9bcSRuchika Gupta return true; 14512d25a9bcSRuchika Gupta case PKCS11_CKA_TOKEN: 14522d25a9bcSRuchika Gupta case PKCS11_CKA_MODIFIABLE: 14532d25a9bcSRuchika Gupta case PKCS11_CKA_DESTROYABLE: 14542d25a9bcSRuchika Gupta case PKCS11_CKA_PRIVATE: 14552d25a9bcSRuchika Gupta return function == PKCS11_FUNCTION_COPY; 14562d25a9bcSRuchika Gupta case PKCS11_CKA_COPYABLE: 14572d25a9bcSRuchika Gupta /* 14582d25a9bcSRuchika Gupta * Specification mentions that if the attribute value is false 14592d25a9bcSRuchika Gupta * it can't be set to true. Reading this we assume that it 14602d25a9bcSRuchika Gupta * should be possible to modify this attribute even though this 14612d25a9bcSRuchika Gupta * is not marked as modifiable in Table 10 if done in right 14622d25a9bcSRuchika Gupta * direction i.e from TRUE -> FALSE. 14632d25a9bcSRuchika Gupta */ 14642d25a9bcSRuchika Gupta return get_bool(obj->attributes, req_attr->id); 14652d25a9bcSRuchika Gupta default: 14662d25a9bcSRuchika Gupta break; 14672d25a9bcSRuchika Gupta } 14682d25a9bcSRuchika Gupta 14692d25a9bcSRuchika Gupta /* Attribute checking based on class type */ 14702d25a9bcSRuchika Gupta switch (class) { 14712d25a9bcSRuchika Gupta case PKCS11_CKO_SECRET_KEY: 14722d25a9bcSRuchika Gupta case PKCS11_CKO_PUBLIC_KEY: 14732d25a9bcSRuchika Gupta case PKCS11_CKO_PRIVATE_KEY: 14742d25a9bcSRuchika Gupta if (attr_is_modifiable_any_key(req_attr)) 14752d25a9bcSRuchika Gupta return true; 14762d25a9bcSRuchika Gupta if (class == PKCS11_CKO_SECRET_KEY && 14772d25a9bcSRuchika Gupta attr_is_modifiable_secret_key(req_attr, session, obj)) 14782d25a9bcSRuchika Gupta return true; 14792d25a9bcSRuchika Gupta if (class == PKCS11_CKO_PUBLIC_KEY && 14802d25a9bcSRuchika Gupta attr_is_modifiable_public_key(req_attr, session, obj)) 14812d25a9bcSRuchika Gupta return true; 14822d25a9bcSRuchika Gupta if (class == PKCS11_CKO_PRIVATE_KEY && 14832d25a9bcSRuchika Gupta attr_is_modifiable_private_key(req_attr, session, obj)) 14842d25a9bcSRuchika Gupta return true; 14852d25a9bcSRuchika Gupta break; 14862d25a9bcSRuchika Gupta case PKCS11_CKO_DATA: 14872d25a9bcSRuchika Gupta /* None of the data object attributes are modifiable */ 14882d25a9bcSRuchika Gupta return false; 14892d25a9bcSRuchika Gupta default: 14902d25a9bcSRuchika Gupta break; 14912d25a9bcSRuchika Gupta } 14922d25a9bcSRuchika Gupta 14932d25a9bcSRuchika Gupta return false; 14942d25a9bcSRuchika Gupta } 14952d25a9bcSRuchika Gupta 14962d25a9bcSRuchika Gupta enum pkcs11_rc check_attrs_against_modification(struct pkcs11_session *session, 14972d25a9bcSRuchika Gupta struct obj_attrs *head, 14982d25a9bcSRuchika Gupta struct pkcs11_object *obj, 14992d25a9bcSRuchika Gupta enum processing_func function) 15002d25a9bcSRuchika Gupta { 15012d25a9bcSRuchika Gupta enum pkcs11_class_id class = PKCS11_CKO_UNDEFINED_ID; 15022d25a9bcSRuchika Gupta char *cur = NULL; 15032d25a9bcSRuchika Gupta char *end = NULL; 15042d25a9bcSRuchika Gupta size_t len = 0; 15052d25a9bcSRuchika Gupta 15062d25a9bcSRuchika Gupta class = get_class(obj->attributes); 15072d25a9bcSRuchika Gupta 15082d25a9bcSRuchika Gupta cur = (char *)head + sizeof(struct obj_attrs); 15092d25a9bcSRuchika Gupta end = cur + head->attrs_size; 15102d25a9bcSRuchika Gupta 15112d25a9bcSRuchika Gupta for (; cur < end; cur += len) { 15122d25a9bcSRuchika Gupta /* Structure aligned copy of the pkcs11_ref in the object */ 15132d25a9bcSRuchika Gupta struct pkcs11_attribute_head cli_ref = { }; 15142d25a9bcSRuchika Gupta 15152d25a9bcSRuchika Gupta TEE_MemMove(&cli_ref, cur, sizeof(cli_ref)); 15162d25a9bcSRuchika Gupta len = sizeof(cli_ref) + cli_ref.size; 15172d25a9bcSRuchika Gupta 15182d25a9bcSRuchika Gupta /* 15192d25a9bcSRuchika Gupta * Check 1 - Check if attribute belongs to the object 15202d25a9bcSRuchika Gupta * The obj->attributes has all the attributes in 15212d25a9bcSRuchika Gupta * it which are allowed for an object. 15222d25a9bcSRuchika Gupta */ 15232d25a9bcSRuchika Gupta if (get_attribute_ptr(obj->attributes, cli_ref.id, NULL, 15242d25a9bcSRuchika Gupta NULL) == PKCS11_RV_NOT_FOUND) 15252d25a9bcSRuchika Gupta return PKCS11_CKR_ATTRIBUTE_TYPE_INVALID; 15262d25a9bcSRuchika Gupta 15272d25a9bcSRuchika Gupta /* Check 2 - Is attribute modifiable */ 15282d25a9bcSRuchika Gupta if (!attribute_is_modifiable(session, &cli_ref, obj, class, 15292d25a9bcSRuchika Gupta function)) 15302d25a9bcSRuchika Gupta return PKCS11_CKR_ATTRIBUTE_READ_ONLY; 15312d25a9bcSRuchika Gupta 15322d25a9bcSRuchika Gupta /* 15332d25a9bcSRuchika Gupta * Checks for modification in PKCS11_CKA_TOKEN and 15342d25a9bcSRuchika Gupta * PKCS11_CKA_PRIVATE are required for PKCS11_FUNCTION_COPY 15352d25a9bcSRuchika Gupta * only, so skip them for PKCS11_FUNCTION_MODIFY. 15362d25a9bcSRuchika Gupta */ 15372d25a9bcSRuchika Gupta if (function == PKCS11_FUNCTION_MODIFY) 15382d25a9bcSRuchika Gupta continue; 15392d25a9bcSRuchika Gupta 15402d25a9bcSRuchika Gupta /* 15412d25a9bcSRuchika Gupta * An attempt to copy an object to a token will fail for 15422d25a9bcSRuchika Gupta * RO session 15432d25a9bcSRuchika Gupta */ 15442d25a9bcSRuchika Gupta if (cli_ref.id == PKCS11_CKA_TOKEN && 15452d25a9bcSRuchika Gupta get_bool(head, PKCS11_CKA_TOKEN)) { 15462d25a9bcSRuchika Gupta if (!pkcs11_session_is_read_write(session)) { 15472d25a9bcSRuchika Gupta DMSG("Can't copy to token in a RO session"); 15482d25a9bcSRuchika Gupta return PKCS11_CKR_SESSION_READ_ONLY; 15492d25a9bcSRuchika Gupta } 15502d25a9bcSRuchika Gupta } 15512d25a9bcSRuchika Gupta 15522d25a9bcSRuchika Gupta if (cli_ref.id == PKCS11_CKA_PRIVATE) { 15532d25a9bcSRuchika Gupta bool parent_priv = 15542d25a9bcSRuchika Gupta get_bool(obj->attributes, cli_ref.id); 15552d25a9bcSRuchika Gupta bool obj_priv = get_bool(head, cli_ref.id); 15562d25a9bcSRuchika Gupta 15572d25a9bcSRuchika Gupta /* 15582d25a9bcSRuchika Gupta * If PKCS11_CKA_PRIVATE is being set to TRUE from 15592d25a9bcSRuchika Gupta * FALSE, user has to be logged in 15602d25a9bcSRuchika Gupta */ 15612d25a9bcSRuchika Gupta if (!parent_priv && obj_priv) { 15622d25a9bcSRuchika Gupta if ((pkcs11_session_is_public(session) || 15632d25a9bcSRuchika Gupta pkcs11_session_is_so(session))) 15642d25a9bcSRuchika Gupta return PKCS11_CKR_USER_NOT_LOGGED_IN; 15652d25a9bcSRuchika Gupta } 1566df017b2bSRuchika Gupta 1567df017b2bSRuchika Gupta /* 1568df017b2bSRuchika Gupta * Restriction added - Even for Copy, do not allow 1569df017b2bSRuchika Gupta * modification of CKA_PRIVATE from TRUE to FALSE 1570df017b2bSRuchika Gupta */ 1571df017b2bSRuchika Gupta if (parent_priv && !obj_priv) 1572df017b2bSRuchika Gupta return PKCS11_CKR_TEMPLATE_INCONSISTENT; 15732d25a9bcSRuchika Gupta } 15742d25a9bcSRuchika Gupta } 15752d25a9bcSRuchika Gupta 15762d25a9bcSRuchika Gupta return PKCS11_CKR_OK; 15772d25a9bcSRuchika Gupta } 1578