xref: /optee_os/ta/pkcs11/src/pkcs11_attributes.c (revision 2d25a9bc9545233508f0a37bfde6fb151746397a)
163f89caaSJens Wiklander // SPDX-License-Identifier: BSD-2-Clause
263f89caaSJens Wiklander /*
363f89caaSJens Wiklander  * Copyright (c) 2017-2020, Linaro Limited
463f89caaSJens Wiklander  */
563f89caaSJens Wiklander 
663f89caaSJens Wiklander #include <assert.h>
763f89caaSJens Wiklander #include <inttypes.h>
863f89caaSJens Wiklander #include <pkcs11_ta.h>
963f89caaSJens Wiklander #include <stdlib.h>
1063f89caaSJens Wiklander #include <string_ext.h>
1163f89caaSJens Wiklander #include <tee_internal_api_extensions.h>
1263f89caaSJens Wiklander #include <tee_internal_api.h>
136a760c9eSEtienne Carriere #include <trace.h>
1463f89caaSJens Wiklander #include <util.h>
1563f89caaSJens Wiklander 
1663f89caaSJens Wiklander #include "attributes.h"
1763f89caaSJens Wiklander #include "handle.h"
1863f89caaSJens Wiklander #include "pkcs11_attributes.h"
1963f89caaSJens Wiklander #include "pkcs11_helpers.h"
2063f89caaSJens Wiklander #include "pkcs11_token.h"
2163f89caaSJens Wiklander #include "sanitize_object.h"
2263f89caaSJens Wiklander #include "serializer.h"
2363f89caaSJens Wiklander #include "token_capabilities.h"
2463f89caaSJens Wiklander 
2563f89caaSJens Wiklander /* Byte size of CKA_ID attribute when generated locally */
2663f89caaSJens Wiklander #define PKCS11_CKA_DEFAULT_SIZE		16
2763f89caaSJens Wiklander 
28512cbf1dSJens Wiklander static uint32_t pkcs11_func2ckfm(enum processing_func function)
29512cbf1dSJens Wiklander {
30512cbf1dSJens Wiklander 	switch (function) {
31512cbf1dSJens Wiklander 	case PKCS11_FUNCTION_DIGEST:
32512cbf1dSJens Wiklander 		return PKCS11_CKFM_DIGEST;
33512cbf1dSJens Wiklander 	case PKCS11_FUNCTION_GENERATE:
34512cbf1dSJens Wiklander 		return PKCS11_CKFM_GENERATE;
35512cbf1dSJens Wiklander 	case PKCS11_FUNCTION_GENERATE_PAIR:
36512cbf1dSJens Wiklander 		return PKCS11_CKFM_GENERATE_KEY_PAIR;
37512cbf1dSJens Wiklander 	case PKCS11_FUNCTION_DERIVE:
38512cbf1dSJens Wiklander 		return PKCS11_CKFM_DERIVE;
39512cbf1dSJens Wiklander 	case PKCS11_FUNCTION_WRAP:
40512cbf1dSJens Wiklander 		return PKCS11_CKFM_WRAP;
41512cbf1dSJens Wiklander 	case PKCS11_FUNCTION_UNWRAP:
42512cbf1dSJens Wiklander 		return PKCS11_CKFM_UNWRAP;
43512cbf1dSJens Wiklander 	case PKCS11_FUNCTION_ENCRYPT:
44512cbf1dSJens Wiklander 		return PKCS11_CKFM_ENCRYPT;
45512cbf1dSJens Wiklander 	case PKCS11_FUNCTION_DECRYPT:
46512cbf1dSJens Wiklander 		return PKCS11_CKFM_DECRYPT;
47512cbf1dSJens Wiklander 	case PKCS11_FUNCTION_SIGN:
48512cbf1dSJens Wiklander 		return PKCS11_CKFM_SIGN;
49512cbf1dSJens Wiklander 	case PKCS11_FUNCTION_VERIFY:
50512cbf1dSJens Wiklander 		return PKCS11_CKFM_VERIFY;
51512cbf1dSJens Wiklander 	case PKCS11_FUNCTION_SIGN_RECOVER:
52512cbf1dSJens Wiklander 		return PKCS11_CKFM_SIGN_RECOVER;
53512cbf1dSJens Wiklander 	case PKCS11_FUNCTION_VERIFY_RECOVER:
54512cbf1dSJens Wiklander 		return PKCS11_CKFM_VERIFY_RECOVER;
55512cbf1dSJens Wiklander 	default:
56512cbf1dSJens Wiklander 		return 0;
57512cbf1dSJens Wiklander 	}
58512cbf1dSJens Wiklander }
59512cbf1dSJens Wiklander 
60512cbf1dSJens Wiklander enum pkcs11_rc
61512cbf1dSJens Wiklander check_mechanism_against_processing(struct pkcs11_session *session,
62512cbf1dSJens Wiklander 				   enum pkcs11_mechanism_id mechanism_type,
63512cbf1dSJens Wiklander 				   enum processing_func function,
64512cbf1dSJens Wiklander 				   enum processing_step step)
65512cbf1dSJens Wiklander {
66512cbf1dSJens Wiklander 	bool allowed = false;
67512cbf1dSJens Wiklander 
68512cbf1dSJens Wiklander 	switch (step) {
69512cbf1dSJens Wiklander 	case PKCS11_FUNC_STEP_INIT:
70512cbf1dSJens Wiklander 		switch (function) {
71512cbf1dSJens Wiklander 		case PKCS11_FUNCTION_IMPORT:
72512cbf1dSJens Wiklander 		case PKCS11_FUNCTION_COPY:
73512cbf1dSJens Wiklander 		case PKCS11_FUNCTION_MODIFY:
74512cbf1dSJens Wiklander 		case PKCS11_FUNCTION_DESTROY:
75512cbf1dSJens Wiklander 			return PKCS11_CKR_OK;
76512cbf1dSJens Wiklander 		default:
77512cbf1dSJens Wiklander 			break;
78512cbf1dSJens Wiklander 		}
79512cbf1dSJens Wiklander 		/*
80512cbf1dSJens Wiklander 		 * Check that the returned PKCS11_CKFM_* flag from
81512cbf1dSJens Wiklander 		 * pkcs11_func2ckfm() is among the ones from
82512cbf1dSJens Wiklander 		 * mechanism_supported_flags().
83512cbf1dSJens Wiklander 		 */
84512cbf1dSJens Wiklander 		allowed = mechanism_supported_flags(mechanism_type) &
85512cbf1dSJens Wiklander 			  pkcs11_func2ckfm(function);
86512cbf1dSJens Wiklander 		break;
87512cbf1dSJens Wiklander 
88512cbf1dSJens Wiklander 	case PKCS11_FUNC_STEP_ONESHOT:
890460a039SRuchika Gupta 		if (session->processing->always_authen &&
900460a039SRuchika Gupta 		    !session->processing->relogged)
910460a039SRuchika Gupta 			return PKCS11_CKR_USER_NOT_LOGGED_IN;
920460a039SRuchika Gupta 
930460a039SRuchika Gupta 		if (session->processing->updated) {
940460a039SRuchika Gupta 			EMSG("Cannot perform one-shot on updated processing");
950460a039SRuchika Gupta 			return PKCS11_CKR_OPERATION_ACTIVE;
960460a039SRuchika Gupta 		}
970460a039SRuchika Gupta 
980460a039SRuchika Gupta 		allowed = true;
990460a039SRuchika Gupta 		break;
1000460a039SRuchika Gupta 
101512cbf1dSJens Wiklander 	case PKCS11_FUNC_STEP_UPDATE:
102512cbf1dSJens Wiklander 		if (session->processing->always_authen &&
103512cbf1dSJens Wiklander 		    !session->processing->relogged)
104512cbf1dSJens Wiklander 			return PKCS11_CKR_USER_NOT_LOGGED_IN;
105512cbf1dSJens Wiklander 
106512cbf1dSJens Wiklander 		allowed = !mechanism_is_one_shot_only(mechanism_type);
107512cbf1dSJens Wiklander 		break;
108512cbf1dSJens Wiklander 
109512cbf1dSJens Wiklander 	case PKCS11_FUNC_STEP_FINAL:
110512cbf1dSJens Wiklander 		if (session->processing->always_authen &&
111512cbf1dSJens Wiklander 		    !session->processing->relogged)
112512cbf1dSJens Wiklander 			return PKCS11_CKR_USER_NOT_LOGGED_IN;
113512cbf1dSJens Wiklander 
114512cbf1dSJens Wiklander 		return PKCS11_CKR_OK;
115512cbf1dSJens Wiklander 
116512cbf1dSJens Wiklander 	default:
117512cbf1dSJens Wiklander 		TEE_Panic(step);
118512cbf1dSJens Wiklander 		break;
119512cbf1dSJens Wiklander 	}
120512cbf1dSJens Wiklander 
121512cbf1dSJens Wiklander 	if (!allowed) {
122512cbf1dSJens Wiklander 		EMSG("Processing %#x/%s not permitted (%u/%u)",
123512cbf1dSJens Wiklander 		     (unsigned int)mechanism_type, id2str_proc(mechanism_type),
124512cbf1dSJens Wiklander 		     function, step);
125512cbf1dSJens Wiklander 		return PKCS11_CKR_KEY_FUNCTION_NOT_PERMITTED;
126512cbf1dSJens Wiklander 	}
127512cbf1dSJens Wiklander 
128512cbf1dSJens Wiklander 	return PKCS11_CKR_OK;
129512cbf1dSJens Wiklander }
130512cbf1dSJens Wiklander 
13163f89caaSJens Wiklander /*
13263f89caaSJens Wiklander  * Object default boolean attributes as per PKCS#11
13363f89caaSJens Wiklander  */
13463f89caaSJens Wiklander static uint8_t *pkcs11_object_default_boolprop(uint32_t attribute)
13563f89caaSJens Wiklander {
13663f89caaSJens Wiklander 	static const uint8_t bool_true = 1;
13763f89caaSJens Wiklander 	static const uint8_t bool_false;
13863f89caaSJens Wiklander 
13963f89caaSJens Wiklander 	switch (attribute) {
14063f89caaSJens Wiklander 	/* As per PKCS#11 default value */
14163f89caaSJens Wiklander 	case PKCS11_CKA_MODIFIABLE:
14263f89caaSJens Wiklander 	case PKCS11_CKA_COPYABLE:
14363f89caaSJens Wiklander 	case PKCS11_CKA_DESTROYABLE:
14463f89caaSJens Wiklander 		return (uint8_t *)&bool_true;
14563f89caaSJens Wiklander 	case PKCS11_CKA_TOKEN:
14663f89caaSJens Wiklander 	case PKCS11_CKA_PRIVATE:
14739fc24faSEtienne Carriere 	case PKCS11_CKA_WRAP_WITH_TRUSTED:
14839fc24faSEtienne Carriere 	case PKCS11_CKA_ALWAYS_AUTHENTICATE:
14963f89caaSJens Wiklander 	case PKCS11_CKA_SENSITIVE:
15063f89caaSJens Wiklander 		return (uint8_t *)&bool_false;
15163f89caaSJens Wiklander 	/* Token specific default value */
15263f89caaSJens Wiklander 	case PKCS11_CKA_SIGN:
15363f89caaSJens Wiklander 	case PKCS11_CKA_VERIFY:
15463f89caaSJens Wiklander 	case PKCS11_CKA_DERIVE:
15563f89caaSJens Wiklander 	case PKCS11_CKA_ENCRYPT:
15663f89caaSJens Wiklander 	case PKCS11_CKA_DECRYPT:
15763f89caaSJens Wiklander 	case PKCS11_CKA_SIGN_RECOVER:
15863f89caaSJens Wiklander 	case PKCS11_CKA_VERIFY_RECOVER:
15963f89caaSJens Wiklander 	case PKCS11_CKA_WRAP:
16063f89caaSJens Wiklander 	case PKCS11_CKA_UNWRAP:
16163f89caaSJens Wiklander 	case PKCS11_CKA_EXTRACTABLE:
16263f89caaSJens Wiklander 	case PKCS11_CKA_TRUSTED:
16363f89caaSJens Wiklander 		return (uint8_t *)&bool_false;
16463f89caaSJens Wiklander 	default:
16563f89caaSJens Wiklander 		DMSG("No default for boolprop attribute %#"PRIx32, attribute);
16663f89caaSJens Wiklander 		return NULL;
16763f89caaSJens Wiklander 	}
16863f89caaSJens Wiklander }
16963f89caaSJens Wiklander 
17063f89caaSJens Wiklander /*
17163f89caaSJens Wiklander  * Object expects several boolean attributes to be set to a default value
17263f89caaSJens Wiklander  * or to a validate client configuration value. This function append the input
17363f89caaSJens Wiklander  * attribute (id/size/value) in the serialized object.
17463f89caaSJens Wiklander  */
17563f89caaSJens Wiklander static enum pkcs11_rc pkcs11_import_object_boolprop(struct obj_attrs **out,
17663f89caaSJens Wiklander 						    struct obj_attrs *templ,
17763f89caaSJens Wiklander 						    uint32_t attribute)
17863f89caaSJens Wiklander {
17963f89caaSJens Wiklander 	enum pkcs11_rc rc = PKCS11_CKR_OK;
18063f89caaSJens Wiklander 	uint8_t bbool = 0;
18163f89caaSJens Wiklander 	uint32_t size = sizeof(uint8_t);
18263f89caaSJens Wiklander 	void *attr = NULL;
18363f89caaSJens Wiklander 
18463f89caaSJens Wiklander 	rc = get_attribute(templ, attribute, &bbool, &size);
18563f89caaSJens Wiklander 	if (rc) {
18663f89caaSJens Wiklander 		if (rc != PKCS11_RV_NOT_FOUND)
18763f89caaSJens Wiklander 			return rc;
18863f89caaSJens Wiklander 		attr = pkcs11_object_default_boolprop(attribute);
18963f89caaSJens Wiklander 		if (!attr)
19063f89caaSJens Wiklander 			return PKCS11_CKR_TEMPLATE_INCOMPLETE;
19163f89caaSJens Wiklander 	} else {
19263f89caaSJens Wiklander 		attr = &bbool;
19363f89caaSJens Wiklander 	}
19463f89caaSJens Wiklander 
19563f89caaSJens Wiklander 	/* Boolean attributes are 1byte in the ABI, no alignment issue */
19663f89caaSJens Wiklander 	return add_attribute(out, attribute, attr, sizeof(uint8_t));
19763f89caaSJens Wiklander }
19863f89caaSJens Wiklander 
19963f89caaSJens Wiklander static enum pkcs11_rc set_mandatory_boolprops(struct obj_attrs **out,
20063f89caaSJens Wiklander 					      struct obj_attrs *temp,
20163f89caaSJens Wiklander 					      uint32_t const *bp,
20263f89caaSJens Wiklander 					      size_t bp_count)
20363f89caaSJens Wiklander {
20463f89caaSJens Wiklander 	enum pkcs11_rc rc = PKCS11_CKR_OK;
20563f89caaSJens Wiklander 	size_t n = 0;
20663f89caaSJens Wiklander 
20763f89caaSJens Wiklander 	for (n = 0; n < bp_count; n++) {
20863f89caaSJens Wiklander 		rc = pkcs11_import_object_boolprop(out, temp, bp[n]);
20963f89caaSJens Wiklander 		if (rc)
21063f89caaSJens Wiklander 			return rc;
21163f89caaSJens Wiklander 	}
21263f89caaSJens Wiklander 
21363f89caaSJens Wiklander 	return rc;
21463f89caaSJens Wiklander }
21563f89caaSJens Wiklander 
21663f89caaSJens Wiklander static enum pkcs11_rc set_mandatory_attributes(struct obj_attrs **out,
21763f89caaSJens Wiklander 					       struct obj_attrs *temp,
21816df60c7SEtienne Carriere 					       uint32_t const *attrs,
21916df60c7SEtienne Carriere 					       size_t attrs_count)
22063f89caaSJens Wiklander {
22163f89caaSJens Wiklander 	enum pkcs11_rc rc = PKCS11_CKR_OK;
22263f89caaSJens Wiklander 	size_t n = 0;
22363f89caaSJens Wiklander 
22416df60c7SEtienne Carriere 	for (n = 0; n < attrs_count; n++) {
22563f89caaSJens Wiklander 		uint32_t size = 0;
22663f89caaSJens Wiklander 		void *value = NULL;
22763f89caaSJens Wiklander 
22816df60c7SEtienne Carriere 		if (get_attribute_ptr(temp, attrs[n], &value, &size))
22963f89caaSJens Wiklander 			return PKCS11_CKR_TEMPLATE_INCOMPLETE;
23063f89caaSJens Wiklander 
23116df60c7SEtienne Carriere 		rc = add_attribute(out, attrs[n], value, size);
23263f89caaSJens Wiklander 		if (rc)
23363f89caaSJens Wiklander 			return rc;
23463f89caaSJens Wiklander 	}
23563f89caaSJens Wiklander 
23663f89caaSJens Wiklander 	return rc;
23763f89caaSJens Wiklander }
23863f89caaSJens Wiklander 
23963f89caaSJens Wiklander static enum pkcs11_rc get_default_value(enum pkcs11_attr_id id, void **value,
24063f89caaSJens Wiklander 					uint32_t *size)
24163f89caaSJens Wiklander {
24263f89caaSJens Wiklander 	/* should have been taken care of already */
24363f89caaSJens Wiklander 	assert(!pkcs11_attr_is_boolean(id));
24463f89caaSJens Wiklander 
24563f89caaSJens Wiklander 	if (id == PKCS11_CKA_PUBLIC_KEY_INFO) {
24663f89caaSJens Wiklander 		EMSG("Cannot provide default PUBLIC_KEY_INFO");
24763f89caaSJens Wiklander 		return PKCS11_CKR_TEMPLATE_INCONSISTENT;
24863f89caaSJens Wiklander 	}
24963f89caaSJens Wiklander 
25063f89caaSJens Wiklander 	/* All other attributes have an empty default value */
25163f89caaSJens Wiklander 	*value = NULL;
25263f89caaSJens Wiklander 	*size = 0;
25363f89caaSJens Wiklander 	return PKCS11_CKR_OK;
25463f89caaSJens Wiklander }
25563f89caaSJens Wiklander 
2564eb88651SRuchika Gupta static enum pkcs11_rc set_optional_attributes_with_def(struct obj_attrs **out,
25763f89caaSJens Wiklander 						       struct obj_attrs *temp,
25816df60c7SEtienne Carriere 						       uint32_t const *attrs,
25916df60c7SEtienne Carriere 						       size_t attrs_count,
2604eb88651SRuchika Gupta 						       bool default_to_null)
26163f89caaSJens Wiklander {
26263f89caaSJens Wiklander 	enum pkcs11_rc rc = PKCS11_CKR_OK;
26363f89caaSJens Wiklander 	size_t n = 0;
26463f89caaSJens Wiklander 
26516df60c7SEtienne Carriere 	for (n = 0; n < attrs_count; n++) {
26663f89caaSJens Wiklander 		uint32_t size = 0;
26763f89caaSJens Wiklander 		void *value = NULL;
26863f89caaSJens Wiklander 
26916df60c7SEtienne Carriere 		rc = get_attribute_ptr(temp, attrs[n], &value, &size);
2704eb88651SRuchika Gupta 		if (rc == PKCS11_RV_NOT_FOUND) {
2714eb88651SRuchika Gupta 			if (default_to_null) {
27216df60c7SEtienne Carriere 				rc = get_default_value(attrs[n], &value, &size);
2734eb88651SRuchika Gupta 			} else {
2744eb88651SRuchika Gupta 				rc = PKCS11_CKR_OK;
2754eb88651SRuchika Gupta 				continue;
2764eb88651SRuchika Gupta 			}
2774eb88651SRuchika Gupta 		}
27863f89caaSJens Wiklander 		if (rc)
27963f89caaSJens Wiklander 			return rc;
28063f89caaSJens Wiklander 
28116df60c7SEtienne Carriere 		rc = add_attribute(out, attrs[n], value, size);
28263f89caaSJens Wiklander 		if (rc)
28363f89caaSJens Wiklander 			return rc;
28463f89caaSJens Wiklander 	}
28563f89caaSJens Wiklander 
28663f89caaSJens Wiklander 	return rc;
28763f89caaSJens Wiklander }
28863f89caaSJens Wiklander 
2894eb88651SRuchika Gupta static enum pkcs11_rc set_attributes_opt_or_null(struct obj_attrs **out,
2904eb88651SRuchika Gupta 						 struct obj_attrs *temp,
29116df60c7SEtienne Carriere 						 uint32_t const *attrs,
29216df60c7SEtienne Carriere 						 size_t attrs_count)
2934eb88651SRuchika Gupta {
29416df60c7SEtienne Carriere 	return set_optional_attributes_with_def(out, temp, attrs, attrs_count,
29516df60c7SEtienne Carriere 						true /* defaults to empty */);
2964eb88651SRuchika Gupta }
2974eb88651SRuchika Gupta 
2984eb88651SRuchika Gupta static enum pkcs11_rc set_optional_attributes(struct obj_attrs **out,
2994eb88651SRuchika Gupta 					      struct obj_attrs *temp,
30016df60c7SEtienne Carriere 					      uint32_t const *attrs,
30116df60c7SEtienne Carriere 					      size_t attrs_count)
3024eb88651SRuchika Gupta {
30316df60c7SEtienne Carriere 	return set_optional_attributes_with_def(out, temp, attrs, attrs_count,
30416df60c7SEtienne Carriere 						false /* no default value */);
3054eb88651SRuchika Gupta }
3064eb88651SRuchika Gupta 
30763f89caaSJens Wiklander /*
30863f89caaSJens Wiklander  * Below are listed the mandated or optional expected attributes for
30963f89caaSJens Wiklander  * PKCS#11 storage objects.
31063f89caaSJens Wiklander  *
31163f89caaSJens Wiklander  * Note: boolprops (mandated boolean attributes) PKCS11_CKA_ALWAYS_SENSITIVE,
31263f89caaSJens Wiklander  * and PKCS11_CKA_NEVER_EXTRACTABLE are set by the token, not provided
31363f89caaSJens Wiklander  * in the client template.
31463f89caaSJens Wiklander  */
31563f89caaSJens Wiklander 
31663f89caaSJens Wiklander /* PKCS#11 specification for any object (session/token) of the storage */
3174eb88651SRuchika Gupta static const uint32_t any_object_boolprops[] = {
31863f89caaSJens Wiklander 	PKCS11_CKA_TOKEN, PKCS11_CKA_PRIVATE,
31963f89caaSJens Wiklander 	PKCS11_CKA_MODIFIABLE, PKCS11_CKA_COPYABLE, PKCS11_CKA_DESTROYABLE,
32063f89caaSJens Wiklander };
32163f89caaSJens Wiklander 
3224eb88651SRuchika Gupta static const uint32_t any_object_opt_or_null[] = {
32363f89caaSJens Wiklander 	PKCS11_CKA_LABEL,
32463f89caaSJens Wiklander };
32563f89caaSJens Wiklander 
3264eb88651SRuchika Gupta /* PKCS#11 specification for raw data object (+any_object_xxx) */
3274eb88651SRuchika Gupta const uint32_t raw_data_opt_or_null[] = {
32863f89caaSJens Wiklander 	PKCS11_CKA_OBJECT_ID, PKCS11_CKA_APPLICATION, PKCS11_CKA_VALUE,
32963f89caaSJens Wiklander };
33063f89caaSJens Wiklander 
3314eb88651SRuchika Gupta /* PKCS#11 specification for any key object (+any_object_xxx) */
3324eb88651SRuchika Gupta static const uint32_t any_key_boolprops[] = {
33363f89caaSJens Wiklander 	PKCS11_CKA_DERIVE,
33463f89caaSJens Wiklander };
33563f89caaSJens Wiklander 
3364eb88651SRuchika Gupta static const uint32_t any_key_opt_or_null[] = {
33763f89caaSJens Wiklander 	PKCS11_CKA_ID,
33863f89caaSJens Wiklander 	PKCS11_CKA_START_DATE, PKCS11_CKA_END_DATE,
3394eb88651SRuchika Gupta };
3404eb88651SRuchika Gupta 
3414eb88651SRuchika Gupta static const uint32_t any_key_optional[] = {
34263f89caaSJens Wiklander 	PKCS11_CKA_ALLOWED_MECHANISMS,
34363f89caaSJens Wiklander };
34463f89caaSJens Wiklander 
3454eb88651SRuchika Gupta /* PKCS#11 specification for any symmetric key (+any_key_xxx) */
3464eb88651SRuchika Gupta static const uint32_t symm_key_boolprops[] = {
34763f89caaSJens Wiklander 	PKCS11_CKA_ENCRYPT, PKCS11_CKA_DECRYPT,
34863f89caaSJens Wiklander 	PKCS11_CKA_SIGN, PKCS11_CKA_VERIFY,
34963f89caaSJens Wiklander 	PKCS11_CKA_WRAP, PKCS11_CKA_UNWRAP,
35063f89caaSJens Wiklander 	PKCS11_CKA_SENSITIVE, PKCS11_CKA_EXTRACTABLE,
35163f89caaSJens Wiklander 	PKCS11_CKA_WRAP_WITH_TRUSTED, PKCS11_CKA_TRUSTED,
35263f89caaSJens Wiklander };
35363f89caaSJens Wiklander 
3544eb88651SRuchika Gupta static const uint32_t symm_key_opt_or_null[] = {
35563f89caaSJens Wiklander 	PKCS11_CKA_WRAP_TEMPLATE, PKCS11_CKA_UNWRAP_TEMPLATE,
35663f89caaSJens Wiklander 	PKCS11_CKA_DERIVE_TEMPLATE,
35763f89caaSJens Wiklander 	PKCS11_CKA_VALUE, PKCS11_CKA_VALUE_LEN,
35863f89caaSJens Wiklander };
35963f89caaSJens Wiklander 
3604eb88651SRuchika Gupta /* PKCS#11 specification for any asymmetric public key (+any_key_xxx) */
3614eb88651SRuchika Gupta static const uint32_t public_key_boolprops[] = {
36263f89caaSJens Wiklander 	PKCS11_CKA_ENCRYPT, PKCS11_CKA_VERIFY, PKCS11_CKA_VERIFY_RECOVER,
36363f89caaSJens Wiklander 	PKCS11_CKA_WRAP,
36463f89caaSJens Wiklander 	PKCS11_CKA_TRUSTED,
36563f89caaSJens Wiklander };
36663f89caaSJens Wiklander 
3674eb88651SRuchika Gupta static const uint32_t public_key_mandated[] = {
36863f89caaSJens Wiklander 	PKCS11_CKA_SUBJECT
36963f89caaSJens Wiklander };
37063f89caaSJens Wiklander 
3714eb88651SRuchika Gupta static const uint32_t public_key_opt_or_null[] = {
37263f89caaSJens Wiklander 	PKCS11_CKA_WRAP_TEMPLATE, PKCS11_CKA_PUBLIC_KEY_INFO,
37363f89caaSJens Wiklander };
37463f89caaSJens Wiklander 
3754eb88651SRuchika Gupta /* PKCS#11 specification for any asymmetric private key (+any_key_xxx) */
3764eb88651SRuchika Gupta static const uint32_t private_key_boolprops[] = {
37763f89caaSJens Wiklander 	PKCS11_CKA_DECRYPT, PKCS11_CKA_SIGN, PKCS11_CKA_SIGN_RECOVER,
37863f89caaSJens Wiklander 	PKCS11_CKA_UNWRAP,
37963f89caaSJens Wiklander 	PKCS11_CKA_SENSITIVE, PKCS11_CKA_EXTRACTABLE,
38063f89caaSJens Wiklander 	PKCS11_CKA_WRAP_WITH_TRUSTED, PKCS11_CKA_ALWAYS_AUTHENTICATE,
38163f89caaSJens Wiklander };
38263f89caaSJens Wiklander 
3834eb88651SRuchika Gupta static const uint32_t private_key_mandated[] = {
38463f89caaSJens Wiklander 	PKCS11_CKA_SUBJECT
38563f89caaSJens Wiklander };
38663f89caaSJens Wiklander 
3874eb88651SRuchika Gupta static const uint32_t private_key_opt_or_null[] = {
38863f89caaSJens Wiklander 	PKCS11_CKA_UNWRAP_TEMPLATE, PKCS11_CKA_PUBLIC_KEY_INFO,
38963f89caaSJens Wiklander };
39063f89caaSJens Wiklander 
3914eb88651SRuchika Gupta /* PKCS#11 specification for any RSA key (+public/private_key_xxx) */
3924eb88651SRuchika Gupta static const uint32_t rsa_public_key_mandated[] = {
39363f89caaSJens Wiklander 	PKCS11_CKA_MODULUS_BITS,
39463f89caaSJens Wiklander };
39563f89caaSJens Wiklander 
3964eb88651SRuchika Gupta static const uint32_t rsa_public_key_opt_or_null[] = {
39763f89caaSJens Wiklander 	PKCS11_CKA_MODULUS, PKCS11_CKA_PUBLIC_EXPONENT,
39863f89caaSJens Wiklander };
39963f89caaSJens Wiklander 
4004eb88651SRuchika Gupta static const uint32_t rsa_private_key_opt_or_null[] = {
40163f89caaSJens Wiklander 	PKCS11_CKA_MODULUS, PKCS11_CKA_PUBLIC_EXPONENT,
40263f89caaSJens Wiklander 	PKCS11_CKA_PRIVATE_EXPONENT,
40363f89caaSJens Wiklander 	PKCS11_CKA_PRIME_1, PKCS11_CKA_PRIME_2,
40463f89caaSJens Wiklander 	PKCS11_CKA_EXPONENT_1, PKCS11_CKA_EXPONENT_2, PKCS11_CKA_COEFFICIENT,
40563f89caaSJens Wiklander };
40663f89caaSJens Wiklander 
4074eb88651SRuchika Gupta /* PKCS#11 specification for any EC key (+public/private_key_xxx) */
4084eb88651SRuchika Gupta static const uint32_t ec_public_key_mandated[] = {
40963f89caaSJens Wiklander 	PKCS11_CKA_EC_PARAMS,
41063f89caaSJens Wiklander };
41163f89caaSJens Wiklander 
4124eb88651SRuchika Gupta static const uint32_t ec_public_key_opt_or_null[] = {
41363f89caaSJens Wiklander 	PKCS11_CKA_EC_POINT,
41463f89caaSJens Wiklander };
41563f89caaSJens Wiklander 
4164eb88651SRuchika Gupta static const uint32_t ec_private_key_mandated[] = {
41763f89caaSJens Wiklander 	PKCS11_CKA_EC_PARAMS,
41863f89caaSJens Wiklander };
41963f89caaSJens Wiklander 
4204eb88651SRuchika Gupta static const uint32_t ec_private_key_opt_or_null[] = {
42163f89caaSJens Wiklander 	PKCS11_CKA_VALUE,
42263f89caaSJens Wiklander };
42363f89caaSJens Wiklander 
42463f89caaSJens Wiklander static enum pkcs11_rc create_storage_attributes(struct obj_attrs **out,
42563f89caaSJens Wiklander 						struct obj_attrs *temp)
42663f89caaSJens Wiklander {
42763f89caaSJens Wiklander 	enum pkcs11_class_id class = PKCS11_CKO_UNDEFINED_ID;
42863f89caaSJens Wiklander 	enum pkcs11_rc rc = PKCS11_CKR_OK;
42963f89caaSJens Wiklander 
43063f89caaSJens Wiklander 	rc = init_attributes_head(out);
43163f89caaSJens Wiklander 	if (rc)
43263f89caaSJens Wiklander 		return rc;
43363f89caaSJens Wiklander 
43463f89caaSJens Wiklander 	/* Object class is mandatory */
43563f89caaSJens Wiklander 	class = get_class(temp);
43663f89caaSJens Wiklander 	if (class == PKCS11_CKO_UNDEFINED_ID) {
43763f89caaSJens Wiklander 		EMSG("Class attribute not found");
43863f89caaSJens Wiklander 
43963f89caaSJens Wiklander 		return PKCS11_CKR_TEMPLATE_INCONSISTENT;
44063f89caaSJens Wiklander 	}
44163f89caaSJens Wiklander 	rc = add_attribute(out, PKCS11_CKA_CLASS, &class, sizeof(uint32_t));
44263f89caaSJens Wiklander 	if (rc)
44363f89caaSJens Wiklander 		return rc;
44463f89caaSJens Wiklander 
4454eb88651SRuchika Gupta 	rc = set_mandatory_boolprops(out, temp, any_object_boolprops,
4464eb88651SRuchika Gupta 				     ARRAY_SIZE(any_object_boolprops));
44763f89caaSJens Wiklander 	if (rc)
44863f89caaSJens Wiklander 		return rc;
44963f89caaSJens Wiklander 
4504eb88651SRuchika Gupta 	return set_attributes_opt_or_null(out, temp, any_object_opt_or_null,
4514eb88651SRuchika Gupta 					  ARRAY_SIZE(any_object_opt_or_null));
45263f89caaSJens Wiklander }
45363f89caaSJens Wiklander 
45463f89caaSJens Wiklander static enum pkcs11_rc create_genkey_attributes(struct obj_attrs **out,
45563f89caaSJens Wiklander 					       struct obj_attrs *temp)
45663f89caaSJens Wiklander {
45763f89caaSJens Wiklander 	uint32_t type = PKCS11_CKO_UNDEFINED_ID;
45863f89caaSJens Wiklander 	enum pkcs11_rc rc = PKCS11_CKR_OK;
45963f89caaSJens Wiklander 
46063f89caaSJens Wiklander 	rc = create_storage_attributes(out, temp);
46163f89caaSJens Wiklander 	if (rc)
46263f89caaSJens Wiklander 		return rc;
46363f89caaSJens Wiklander 
46463f89caaSJens Wiklander 	type = get_key_type(temp);
46563f89caaSJens Wiklander 	if (type == PKCS11_CKK_UNDEFINED_ID) {
46663f89caaSJens Wiklander 		EMSG("Key type attribute not found");
46763f89caaSJens Wiklander 
46863f89caaSJens Wiklander 		return PKCS11_CKR_TEMPLATE_INCONSISTENT;
46963f89caaSJens Wiklander 	}
47063f89caaSJens Wiklander 	rc = add_attribute(out, PKCS11_CKA_KEY_TYPE, &type, sizeof(uint32_t));
47163f89caaSJens Wiklander 	if (rc)
47263f89caaSJens Wiklander 		return rc;
47363f89caaSJens Wiklander 
4744eb88651SRuchika Gupta 	rc = set_mandatory_boolprops(out, temp, any_key_boolprops,
4754eb88651SRuchika Gupta 				     ARRAY_SIZE(any_key_boolprops));
47663f89caaSJens Wiklander 	if (rc)
47763f89caaSJens Wiklander 		return rc;
47863f89caaSJens Wiklander 
4794eb88651SRuchika Gupta 	rc = set_attributes_opt_or_null(out, temp, any_key_opt_or_null,
4804eb88651SRuchika Gupta 					ARRAY_SIZE(any_key_opt_or_null));
4814eb88651SRuchika Gupta 	if (rc)
4824eb88651SRuchika Gupta 		return rc;
4834eb88651SRuchika Gupta 
4844eb88651SRuchika Gupta 	return set_optional_attributes(out, temp, any_key_optional,
4854eb88651SRuchika Gupta 				       ARRAY_SIZE(any_key_optional));
4864eb88651SRuchika Gupta 
48763f89caaSJens Wiklander }
48863f89caaSJens Wiklander 
48963f89caaSJens Wiklander static enum pkcs11_rc create_symm_key_attributes(struct obj_attrs **out,
49063f89caaSJens Wiklander 						 struct obj_attrs *temp)
49163f89caaSJens Wiklander {
49263f89caaSJens Wiklander 	enum pkcs11_rc rc = PKCS11_CKR_OK;
49363f89caaSJens Wiklander 
49463f89caaSJens Wiklander 	assert(get_class(temp) == PKCS11_CKO_SECRET_KEY);
49563f89caaSJens Wiklander 
49663f89caaSJens Wiklander 	rc = create_genkey_attributes(out, temp);
49763f89caaSJens Wiklander 	if (rc)
49863f89caaSJens Wiklander 		return rc;
49963f89caaSJens Wiklander 
50063f89caaSJens Wiklander 	assert(get_class(*out) == PKCS11_CKO_SECRET_KEY);
50163f89caaSJens Wiklander 
50263f89caaSJens Wiklander 	switch (get_key_type(*out)) {
50363f89caaSJens Wiklander 	case PKCS11_CKK_GENERIC_SECRET:
50463f89caaSJens Wiklander 	case PKCS11_CKK_AES:
50563f89caaSJens Wiklander 	case PKCS11_CKK_MD5_HMAC:
50663f89caaSJens Wiklander 	case PKCS11_CKK_SHA_1_HMAC:
50763f89caaSJens Wiklander 	case PKCS11_CKK_SHA256_HMAC:
50863f89caaSJens Wiklander 	case PKCS11_CKK_SHA384_HMAC:
50963f89caaSJens Wiklander 	case PKCS11_CKK_SHA512_HMAC:
51063f89caaSJens Wiklander 	case PKCS11_CKK_SHA224_HMAC:
51163f89caaSJens Wiklander 		break;
51263f89caaSJens Wiklander 	default:
51363f89caaSJens Wiklander 		EMSG("Invalid key type %#"PRIx32"/%s",
51463f89caaSJens Wiklander 		     get_key_type(*out), id2str_key_type(get_key_type(*out)));
51563f89caaSJens Wiklander 
51663f89caaSJens Wiklander 		return PKCS11_CKR_TEMPLATE_INCONSISTENT;
51763f89caaSJens Wiklander 	}
51863f89caaSJens Wiklander 
5194eb88651SRuchika Gupta 	rc = set_mandatory_boolprops(out, temp, symm_key_boolprops,
5204eb88651SRuchika Gupta 				     ARRAY_SIZE(symm_key_boolprops));
52163f89caaSJens Wiklander 	if (rc)
52263f89caaSJens Wiklander 		return rc;
52363f89caaSJens Wiklander 
5244eb88651SRuchika Gupta 	return set_attributes_opt_or_null(out, temp, symm_key_opt_or_null,
5254eb88651SRuchika Gupta 					  ARRAY_SIZE(symm_key_opt_or_null));
52663f89caaSJens Wiklander }
52763f89caaSJens Wiklander 
52863f89caaSJens Wiklander static enum pkcs11_rc create_data_attributes(struct obj_attrs **out,
52963f89caaSJens Wiklander 					     struct obj_attrs *temp)
53063f89caaSJens Wiklander {
53163f89caaSJens Wiklander 	enum pkcs11_rc rc = PKCS11_CKR_OK;
53263f89caaSJens Wiklander 
53363f89caaSJens Wiklander 	assert(get_class(temp) == PKCS11_CKO_DATA);
53463f89caaSJens Wiklander 
53563f89caaSJens Wiklander 	rc = create_storage_attributes(out, temp);
53663f89caaSJens Wiklander 	if (rc)
53763f89caaSJens Wiklander 		return rc;
53863f89caaSJens Wiklander 
53963f89caaSJens Wiklander 	assert(get_class(*out) == PKCS11_CKO_DATA);
54063f89caaSJens Wiklander 
5414eb88651SRuchika Gupta 	return set_attributes_opt_or_null(out, temp, raw_data_opt_or_null,
5424eb88651SRuchika Gupta 					  ARRAY_SIZE(raw_data_opt_or_null));
54363f89caaSJens Wiklander }
54463f89caaSJens Wiklander 
54563f89caaSJens Wiklander static enum pkcs11_rc create_pub_key_attributes(struct obj_attrs **out,
54663f89caaSJens Wiklander 						struct obj_attrs *temp)
54763f89caaSJens Wiklander {
54863f89caaSJens Wiklander 	uint32_t const *mandated = NULL;
5494eb88651SRuchika Gupta 	uint32_t const *opt_or_null = NULL;
55063f89caaSJens Wiklander 	size_t mandated_count = 0;
5514eb88651SRuchika Gupta 	size_t opt_or_null_count = 0;
55263f89caaSJens Wiklander 	enum pkcs11_rc rc = PKCS11_CKR_OK;
55363f89caaSJens Wiklander 
55463f89caaSJens Wiklander 	assert(get_class(temp) == PKCS11_CKO_PUBLIC_KEY);
55563f89caaSJens Wiklander 
55663f89caaSJens Wiklander 	rc = create_genkey_attributes(out, temp);
55763f89caaSJens Wiklander 	if (rc)
55863f89caaSJens Wiklander 		return rc;
55963f89caaSJens Wiklander 
56063f89caaSJens Wiklander 	assert(get_class(*out) == PKCS11_CKO_PUBLIC_KEY);
56163f89caaSJens Wiklander 
5624eb88651SRuchika Gupta 	rc = set_mandatory_boolprops(out, temp, public_key_boolprops,
5634eb88651SRuchika Gupta 				     ARRAY_SIZE(public_key_boolprops));
56463f89caaSJens Wiklander 	if (rc)
56563f89caaSJens Wiklander 		return rc;
56663f89caaSJens Wiklander 
5674eb88651SRuchika Gupta 	rc = set_mandatory_attributes(out, temp, public_key_mandated,
5684eb88651SRuchika Gupta 				      ARRAY_SIZE(public_key_mandated));
56963f89caaSJens Wiklander 	if (rc)
57063f89caaSJens Wiklander 		return rc;
57163f89caaSJens Wiklander 
5724eb88651SRuchika Gupta 	rc = set_attributes_opt_or_null(out, temp,
5734eb88651SRuchika Gupta 					public_key_opt_or_null,
5744eb88651SRuchika Gupta 					ARRAY_SIZE(public_key_opt_or_null));
57563f89caaSJens Wiklander 	if (rc)
57663f89caaSJens Wiklander 		return rc;
57763f89caaSJens Wiklander 
57863f89caaSJens Wiklander 	switch (get_key_type(*out)) {
57963f89caaSJens Wiklander 	case PKCS11_CKK_RSA:
5804eb88651SRuchika Gupta 		mandated = rsa_public_key_mandated;
5814eb88651SRuchika Gupta 		opt_or_null = rsa_public_key_opt_or_null;
5824eb88651SRuchika Gupta 		mandated_count = ARRAY_SIZE(rsa_public_key_mandated);
5834eb88651SRuchika Gupta 		opt_or_null_count = ARRAY_SIZE(rsa_public_key_opt_or_null);
58463f89caaSJens Wiklander 		break;
58563f89caaSJens Wiklander 	case PKCS11_CKK_EC:
5864eb88651SRuchika Gupta 		mandated = ec_public_key_mandated;
5874eb88651SRuchika Gupta 		opt_or_null = ec_public_key_opt_or_null;
5884eb88651SRuchika Gupta 		mandated_count = ARRAY_SIZE(ec_public_key_mandated);
5894eb88651SRuchika Gupta 		opt_or_null_count = ARRAY_SIZE(ec_public_key_opt_or_null);
59063f89caaSJens Wiklander 		break;
59163f89caaSJens Wiklander 	default:
59263f89caaSJens Wiklander 		EMSG("Invalid key type %#"PRIx32"/%s",
59363f89caaSJens Wiklander 		     get_key_type(*out), id2str_key_type(get_key_type(*out)));
59463f89caaSJens Wiklander 
59563f89caaSJens Wiklander 		return PKCS11_CKR_TEMPLATE_INCONSISTENT;
59663f89caaSJens Wiklander 	}
59763f89caaSJens Wiklander 
59863f89caaSJens Wiklander 	rc = set_mandatory_attributes(out, temp, mandated, mandated_count);
59963f89caaSJens Wiklander 	if (rc)
60063f89caaSJens Wiklander 		return rc;
60163f89caaSJens Wiklander 
6024eb88651SRuchika Gupta 	return set_attributes_opt_or_null(out, temp, opt_or_null,
6034eb88651SRuchika Gupta 					  opt_or_null_count);
60463f89caaSJens Wiklander }
60563f89caaSJens Wiklander 
60663f89caaSJens Wiklander static enum pkcs11_rc create_priv_key_attributes(struct obj_attrs **out,
60763f89caaSJens Wiklander 						 struct obj_attrs *temp)
60863f89caaSJens Wiklander {
60963f89caaSJens Wiklander 	uint32_t const *mandated = NULL;
6104eb88651SRuchika Gupta 	uint32_t const *opt_or_null = NULL;
61163f89caaSJens Wiklander 	size_t mandated_count = 0;
6124eb88651SRuchika Gupta 	size_t opt_or_null_count = 0;
61363f89caaSJens Wiklander 	enum pkcs11_rc rc = PKCS11_CKR_OK;
61463f89caaSJens Wiklander 
61563f89caaSJens Wiklander 	assert(get_class(temp) == PKCS11_CKO_PRIVATE_KEY);
61663f89caaSJens Wiklander 
61763f89caaSJens Wiklander 	rc = create_genkey_attributes(out, temp);
61863f89caaSJens Wiklander 	if (rc)
61963f89caaSJens Wiklander 		return rc;
62063f89caaSJens Wiklander 
62163f89caaSJens Wiklander 	assert(get_class(*out) == PKCS11_CKO_PRIVATE_KEY);
62263f89caaSJens Wiklander 
6234eb88651SRuchika Gupta 	rc = set_mandatory_boolprops(out, temp, private_key_boolprops,
6244eb88651SRuchika Gupta 				     ARRAY_SIZE(private_key_boolprops));
62563f89caaSJens Wiklander 	if (rc)
62663f89caaSJens Wiklander 		return rc;
62763f89caaSJens Wiklander 
6284eb88651SRuchika Gupta 	rc = set_mandatory_attributes(out, temp, private_key_mandated,
6294eb88651SRuchika Gupta 				      ARRAY_SIZE(private_key_mandated));
63063f89caaSJens Wiklander 	if (rc)
63163f89caaSJens Wiklander 		return rc;
63263f89caaSJens Wiklander 
6334eb88651SRuchika Gupta 	rc = set_attributes_opt_or_null(out, temp, private_key_opt_or_null,
6344eb88651SRuchika Gupta 					ARRAY_SIZE(private_key_opt_or_null));
63563f89caaSJens Wiklander 	if (rc)
63663f89caaSJens Wiklander 		return rc;
63763f89caaSJens Wiklander 
63863f89caaSJens Wiklander 	switch (get_key_type(*out)) {
63963f89caaSJens Wiklander 	case PKCS11_CKK_RSA:
6404eb88651SRuchika Gupta 		opt_or_null = rsa_private_key_opt_or_null;
6414eb88651SRuchika Gupta 		opt_or_null_count = ARRAY_SIZE(rsa_private_key_opt_or_null);
64263f89caaSJens Wiklander 		break;
64363f89caaSJens Wiklander 	case PKCS11_CKK_EC:
6444eb88651SRuchika Gupta 		mandated = ec_private_key_mandated;
6454eb88651SRuchika Gupta 		opt_or_null = ec_private_key_opt_or_null;
6464eb88651SRuchika Gupta 		mandated_count = ARRAY_SIZE(ec_private_key_mandated);
6474eb88651SRuchika Gupta 		opt_or_null_count = ARRAY_SIZE(ec_private_key_opt_or_null);
64863f89caaSJens Wiklander 		break;
64963f89caaSJens Wiklander 	default:
65063f89caaSJens Wiklander 		EMSG("Invalid key type %#"PRIx32"/%s",
65163f89caaSJens Wiklander 		     get_key_type(*out), id2str_key_type(get_key_type(*out)));
65263f89caaSJens Wiklander 
65363f89caaSJens Wiklander 		return PKCS11_CKR_TEMPLATE_INCONSISTENT;
65463f89caaSJens Wiklander 	}
65563f89caaSJens Wiklander 
65663f89caaSJens Wiklander 	rc = set_mandatory_attributes(out, temp, mandated, mandated_count);
65763f89caaSJens Wiklander 	if (rc)
65863f89caaSJens Wiklander 		return rc;
65963f89caaSJens Wiklander 
6604eb88651SRuchika Gupta 	return set_attributes_opt_or_null(out, temp, opt_or_null,
6614eb88651SRuchika Gupta 					  opt_or_null_count);
66263f89caaSJens Wiklander }
66363f89caaSJens Wiklander 
66463f89caaSJens Wiklander /*
66563f89caaSJens Wiklander  * Create an attribute list for a new object from a template and a parent
66663f89caaSJens Wiklander  * object (optional) for an object generation function (generate, copy,
66763f89caaSJens Wiklander  * derive...).
66863f89caaSJens Wiklander  *
66963f89caaSJens Wiklander  * PKCS#11 directives on the supplied template and expected return value:
67063f89caaSJens Wiklander  * - template has an invalid attribute ID: ATTRIBUTE_TYPE_INVALID
67163f89caaSJens Wiklander  * - template has an invalid value for an attribute: ATTRIBUTE_VALID_INVALID
67263f89caaSJens Wiklander  * - template has value for a read-only attribute: ATTRIBUTE_READ_ONLY
67363f89caaSJens Wiklander  * - template+default+parent => still miss an attribute: TEMPLATE_INCONSISTENT
67463f89caaSJens Wiklander  *
67563f89caaSJens Wiklander  * INFO on PKCS11_CMD_COPY_OBJECT:
67663f89caaSJens Wiklander  * - parent PKCS11_CKA_COPYIABLE=false => return ACTION_PROHIBITED.
67763f89caaSJens Wiklander  * - template can specify PKCS11_CKA_TOKEN, PKCS11_CKA_PRIVATE,
67863f89caaSJens Wiklander  *   PKCS11_CKA_MODIFIABLE, PKCS11_CKA_DESTROYABLE.
67963f89caaSJens Wiklander  * - SENSITIVE can change from false to true, not from true to false.
68063f89caaSJens Wiklander  * - LOCAL is the parent LOCAL
68163f89caaSJens Wiklander  */
68263f89caaSJens Wiklander enum pkcs11_rc
68363f89caaSJens Wiklander create_attributes_from_template(struct obj_attrs **out, void *template,
68463f89caaSJens Wiklander 				size_t template_size,
68563f89caaSJens Wiklander 				struct obj_attrs *parent __unused,
68663f89caaSJens Wiklander 				enum processing_func function,
6874cfce748SRuchika Gupta 				enum pkcs11_mechanism_id mecha,
6884cfce748SRuchika Gupta 				enum pkcs11_class_id template_class __unused)
68963f89caaSJens Wiklander {
69063f89caaSJens Wiklander 	struct obj_attrs *temp = NULL;
69163f89caaSJens Wiklander 	struct obj_attrs *attrs = NULL;
69263f89caaSJens Wiklander 	enum pkcs11_rc rc = PKCS11_CKR_OK;
69363f89caaSJens Wiklander 	uint8_t local = 0;
69463f89caaSJens Wiklander 	uint8_t always_sensitive = 0;
69563f89caaSJens Wiklander 	uint8_t never_extract = 0;
696fa247a2aSRuchika Gupta 	uint32_t class = PKCS11_UNDEFINED_ID;
697fa247a2aSRuchika Gupta 	uint32_t type = PKCS11_UNDEFINED_ID;
69863f89caaSJens Wiklander 	uint32_t mechanism_id = PKCS11_CKM_UNDEFINED_ID;
69963f89caaSJens Wiklander 
70063f89caaSJens Wiklander #ifdef DEBUG	/* Sanity: check function argument */
70163f89caaSJens Wiklander 	trace_attributes_from_api_head("template", template, template_size);
70263f89caaSJens Wiklander 	switch (function) {
703fa247a2aSRuchika Gupta 	case PKCS11_FUNCTION_GENERATE:
70463f89caaSJens Wiklander 	case PKCS11_FUNCTION_IMPORT:
705*2d25a9bcSRuchika Gupta 	case PKCS11_FUNCTION_MODIFY:
706*2d25a9bcSRuchika Gupta 	case PKCS11_FUNCTION_COPY:
70763f89caaSJens Wiklander 		break;
70863f89caaSJens Wiklander 	default:
70963f89caaSJens Wiklander 		TEE_Panic(TEE_ERROR_NOT_SUPPORTED);
71063f89caaSJens Wiklander 	}
71163f89caaSJens Wiklander #endif
71263f89caaSJens Wiklander 
713dcad3409SRuchika Gupta 	/*
714dcad3409SRuchika Gupta 	 * For PKCS11_FUNCTION_GENERATE, find the class and type
715dcad3409SRuchika Gupta 	 * based on the mechanism. These will be passed as hint
716dcad3409SRuchika Gupta 	 * sanitize_client_object() and added in temp if not
717dcad3409SRuchika Gupta 	 * already present
718dcad3409SRuchika Gupta 	 */
719dcad3409SRuchika Gupta 	if (function == PKCS11_FUNCTION_GENERATE) {
720fa247a2aSRuchika Gupta 		switch (mecha) {
721fa247a2aSRuchika Gupta 		case PKCS11_CKM_GENERIC_SECRET_KEY_GEN:
722fa247a2aSRuchika Gupta 			class = PKCS11_CKO_SECRET_KEY;
723fa247a2aSRuchika Gupta 			type = PKCS11_CKK_GENERIC_SECRET;
724fa247a2aSRuchika Gupta 			break;
725fa247a2aSRuchika Gupta 		case PKCS11_CKM_AES_KEY_GEN:
726fa247a2aSRuchika Gupta 			class = PKCS11_CKO_SECRET_KEY;
727fa247a2aSRuchika Gupta 			type = PKCS11_CKK_AES;
728fa247a2aSRuchika Gupta 			break;
729fa247a2aSRuchika Gupta 		default:
730dcad3409SRuchika Gupta 			TEE_Panic(TEE_ERROR_NOT_SUPPORTED);
731fa247a2aSRuchika Gupta 		}
732fa247a2aSRuchika Gupta 	}
733fa247a2aSRuchika Gupta 
734*2d25a9bcSRuchika Gupta 	/*
735*2d25a9bcSRuchika Gupta 	 * Check and remove duplicates if any and create a new temporary
736*2d25a9bcSRuchika Gupta 	 * template
737*2d25a9bcSRuchika Gupta 	 */
738dcad3409SRuchika Gupta 	rc = sanitize_client_object(&temp, template, template_size, class,
739dcad3409SRuchika Gupta 				    type);
740dcad3409SRuchika Gupta 	if (rc)
741dcad3409SRuchika Gupta 		goto out;
742dcad3409SRuchika Gupta 
743dcad3409SRuchika Gupta 	/*
744*2d25a9bcSRuchika Gupta 	 * For function type modify and copy return the created template
745*2d25a9bcSRuchika Gupta 	 * from here. Rest of the code below is for creating objects
746*2d25a9bcSRuchika Gupta 	 * or generating keys.
747*2d25a9bcSRuchika Gupta 	 */
748*2d25a9bcSRuchika Gupta 	switch (function) {
749*2d25a9bcSRuchika Gupta 	case PKCS11_FUNCTION_MODIFY:
750*2d25a9bcSRuchika Gupta 	case PKCS11_FUNCTION_COPY:
751*2d25a9bcSRuchika Gupta 		*out = temp;
752*2d25a9bcSRuchika Gupta 		return rc;
753*2d25a9bcSRuchika Gupta 	default:
754*2d25a9bcSRuchika Gupta 		break;
755*2d25a9bcSRuchika Gupta 	}
756*2d25a9bcSRuchika Gupta 
757*2d25a9bcSRuchika Gupta 	/*
758dcad3409SRuchika Gupta 	 * Check if class and type in temp are consistent with the mechanism
759dcad3409SRuchika Gupta 	 */
760fa247a2aSRuchika Gupta 	switch (mecha) {
761fa247a2aSRuchika Gupta 	case PKCS11_CKM_GENERIC_SECRET_KEY_GEN:
762fa247a2aSRuchika Gupta 		if (get_class(temp) != PKCS11_CKO_SECRET_KEY ||
763fa247a2aSRuchika Gupta 		    get_key_type(temp) != PKCS11_CKK_GENERIC_SECRET) {
764fa247a2aSRuchika Gupta 			rc = PKCS11_CKR_TEMPLATE_INCONSISTENT;
765fa247a2aSRuchika Gupta 			goto out;
766fa247a2aSRuchika Gupta 		}
767fa247a2aSRuchika Gupta 		break;
768fa247a2aSRuchika Gupta 	case PKCS11_CKM_AES_KEY_GEN:
769fa247a2aSRuchika Gupta 		if (get_class(temp) != PKCS11_CKO_SECRET_KEY ||
770fa247a2aSRuchika Gupta 		    get_key_type(temp) != PKCS11_CKK_AES) {
771fa247a2aSRuchika Gupta 			rc = PKCS11_CKR_TEMPLATE_INCONSISTENT;
772fa247a2aSRuchika Gupta 			goto out;
773fa247a2aSRuchika Gupta 		}
774fa247a2aSRuchika Gupta 		break;
775fa247a2aSRuchika Gupta 	default:
776fa247a2aSRuchika Gupta 		break;
777fa247a2aSRuchika Gupta 	}
77863f89caaSJens Wiklander 
77963f89caaSJens Wiklander 	if (!sanitize_consistent_class_and_type(temp)) {
78063f89caaSJens Wiklander 		EMSG("Inconsistent class/type");
78163f89caaSJens Wiklander 		rc = PKCS11_CKR_TEMPLATE_INCONSISTENT;
78263f89caaSJens Wiklander 		goto out;
78363f89caaSJens Wiklander 	}
78463f89caaSJens Wiklander 
78563f89caaSJens Wiklander 	switch (get_class(temp)) {
78663f89caaSJens Wiklander 	case PKCS11_CKO_DATA:
78763f89caaSJens Wiklander 		rc = create_data_attributes(&attrs, temp);
78863f89caaSJens Wiklander 		break;
78963f89caaSJens Wiklander 	case PKCS11_CKO_SECRET_KEY:
79063f89caaSJens Wiklander 		rc = create_symm_key_attributes(&attrs, temp);
79163f89caaSJens Wiklander 		break;
79263f89caaSJens Wiklander 	case PKCS11_CKO_PUBLIC_KEY:
79363f89caaSJens Wiklander 		rc = create_pub_key_attributes(&attrs, temp);
79463f89caaSJens Wiklander 		break;
79563f89caaSJens Wiklander 	case PKCS11_CKO_PRIVATE_KEY:
79663f89caaSJens Wiklander 		rc = create_priv_key_attributes(&attrs, temp);
79763f89caaSJens Wiklander 		break;
79863f89caaSJens Wiklander 	default:
79963f89caaSJens Wiklander 		DMSG("Invalid object class %#"PRIx32"/%s",
80063f89caaSJens Wiklander 		     get_class(temp), id2str_class(get_class(temp)));
80163f89caaSJens Wiklander 
80263f89caaSJens Wiklander 		rc = PKCS11_CKR_TEMPLATE_INCONSISTENT;
80363f89caaSJens Wiklander 		break;
80463f89caaSJens Wiklander 	}
80563f89caaSJens Wiklander 	if (rc)
80663f89caaSJens Wiklander 		goto out;
80763f89caaSJens Wiklander 
80890c47fe2SRuchika Gupta 	if (get_attribute_ptr(temp, PKCS11_CKA_LOCAL, NULL, NULL) !=
809002f6b93SEtienne Carriere 	    PKCS11_RV_NOT_FOUND) {
810002f6b93SEtienne Carriere 		rc = PKCS11_CKR_TEMPLATE_INCONSISTENT;
81163f89caaSJens Wiklander 		goto out;
812002f6b93SEtienne Carriere 	}
81363f89caaSJens Wiklander 
81490c47fe2SRuchika Gupta 	if (get_attribute_ptr(temp, PKCS11_CKA_KEY_GEN_MECHANISM, NULL, NULL) !=
815002f6b93SEtienne Carriere 	    PKCS11_RV_NOT_FOUND) {
816002f6b93SEtienne Carriere 		rc = PKCS11_CKR_TEMPLATE_INCONSISTENT;
81763f89caaSJens Wiklander 		goto out;
818002f6b93SEtienne Carriere 	}
81963f89caaSJens Wiklander 
82063f89caaSJens Wiklander 	switch (function) {
821fa247a2aSRuchika Gupta 	case PKCS11_FUNCTION_GENERATE:
822fa247a2aSRuchika Gupta 		local = PKCS11_TRUE;
823fa247a2aSRuchika Gupta 		break;
82463f89caaSJens Wiklander 	case PKCS11_FUNCTION_IMPORT:
82563f89caaSJens Wiklander 	default:
82663f89caaSJens Wiklander 		local = PKCS11_FALSE;
82763f89caaSJens Wiklander 		break;
82863f89caaSJens Wiklander 	}
82963f89caaSJens Wiklander 	rc = add_attribute(&attrs, PKCS11_CKA_LOCAL, &local, sizeof(local));
83063f89caaSJens Wiklander 	if (rc)
83163f89caaSJens Wiklander 		goto out;
83263f89caaSJens Wiklander 
83363f89caaSJens Wiklander 	switch (get_class(attrs)) {
83463f89caaSJens Wiklander 	case PKCS11_CKO_SECRET_KEY:
83563f89caaSJens Wiklander 	case PKCS11_CKO_PRIVATE_KEY:
83663f89caaSJens Wiklander 	case PKCS11_CKO_PUBLIC_KEY:
83763f89caaSJens Wiklander 		always_sensitive = PKCS11_FALSE;
83863f89caaSJens Wiklander 		never_extract = PKCS11_FALSE;
83963f89caaSJens Wiklander 
840fa247a2aSRuchika Gupta 		switch (function) {
841fa247a2aSRuchika Gupta 		case PKCS11_FUNCTION_GENERATE:
842fa247a2aSRuchika Gupta 			always_sensitive = get_bool(attrs,
843fa247a2aSRuchika Gupta 						    PKCS11_CKA_SENSITIVE);
844fa247a2aSRuchika Gupta 			never_extract = !get_bool(attrs,
845fa247a2aSRuchika Gupta 						  PKCS11_CKA_EXTRACTABLE);
846fa247a2aSRuchika Gupta 			break;
847fa247a2aSRuchika Gupta 		default:
848fa247a2aSRuchika Gupta 			break;
849fa247a2aSRuchika Gupta 		}
850fa247a2aSRuchika Gupta 
85163f89caaSJens Wiklander 		rc = add_attribute(&attrs, PKCS11_CKA_ALWAYS_SENSITIVE,
85263f89caaSJens Wiklander 				   &always_sensitive, sizeof(always_sensitive));
85363f89caaSJens Wiklander 		if (rc)
85463f89caaSJens Wiklander 			goto out;
85563f89caaSJens Wiklander 
85663f89caaSJens Wiklander 		rc = add_attribute(&attrs, PKCS11_CKA_NEVER_EXTRACTABLE,
85763f89caaSJens Wiklander 				   &never_extract, sizeof(never_extract));
85863f89caaSJens Wiklander 		if (rc)
85963f89caaSJens Wiklander 			goto out;
86063f89caaSJens Wiklander 
86163f89caaSJens Wiklander 		/* Keys mandate attribute PKCS11_CKA_KEY_GEN_MECHANISM */
862fa247a2aSRuchika Gupta 		if (local)
863fa247a2aSRuchika Gupta 			mechanism_id = mecha;
864fa247a2aSRuchika Gupta 		else
86563f89caaSJens Wiklander 			mechanism_id = PKCS11_CK_UNAVAILABLE_INFORMATION;
866fa247a2aSRuchika Gupta 
86763f89caaSJens Wiklander 		rc = add_attribute(&attrs, PKCS11_CKA_KEY_GEN_MECHANISM,
86863f89caaSJens Wiklander 				   &mechanism_id, sizeof(mechanism_id));
86963f89caaSJens Wiklander 		if (rc)
87063f89caaSJens Wiklander 			goto out;
87163f89caaSJens Wiklander 		break;
87263f89caaSJens Wiklander 
87363f89caaSJens Wiklander 	default:
87463f89caaSJens Wiklander 		break;
87563f89caaSJens Wiklander 	}
87663f89caaSJens Wiklander 
87763f89caaSJens Wiklander 	*out = attrs;
87863f89caaSJens Wiklander 
87963f89caaSJens Wiklander #ifdef DEBUG
88063f89caaSJens Wiklander 	trace_attributes("object", attrs);
88163f89caaSJens Wiklander #endif
88263f89caaSJens Wiklander 
88363f89caaSJens Wiklander out:
88463f89caaSJens Wiklander 	TEE_Free(temp);
88563f89caaSJens Wiklander 	if (rc)
88663f89caaSJens Wiklander 		TEE_Free(attrs);
88763f89caaSJens Wiklander 
88863f89caaSJens Wiklander 	return rc;
88963f89caaSJens Wiklander }
89063f89caaSJens Wiklander 
89163f89caaSJens Wiklander static enum pkcs11_rc check_attrs_misc_integrity(struct obj_attrs *head)
89263f89caaSJens Wiklander {
89363f89caaSJens Wiklander 	if (get_bool(head, PKCS11_CKA_NEVER_EXTRACTABLE) &&
89463f89caaSJens Wiklander 	    get_bool(head, PKCS11_CKA_EXTRACTABLE)) {
89563f89caaSJens Wiklander 		DMSG("Never/Extractable attributes mismatch %d/%d",
89663f89caaSJens Wiklander 		     get_bool(head, PKCS11_CKA_NEVER_EXTRACTABLE),
89763f89caaSJens Wiklander 		     get_bool(head, PKCS11_CKA_EXTRACTABLE));
89863f89caaSJens Wiklander 
89963f89caaSJens Wiklander 		return PKCS11_CKR_TEMPLATE_INCONSISTENT;
90063f89caaSJens Wiklander 	}
90163f89caaSJens Wiklander 
90263f89caaSJens Wiklander 	if (get_bool(head, PKCS11_CKA_ALWAYS_SENSITIVE) &&
90363f89caaSJens Wiklander 	    !get_bool(head, PKCS11_CKA_SENSITIVE)) {
90463f89caaSJens Wiklander 		DMSG("Sensitive/always attributes mismatch %d/%d",
90563f89caaSJens Wiklander 		     get_bool(head, PKCS11_CKA_SENSITIVE),
90663f89caaSJens Wiklander 		     get_bool(head, PKCS11_CKA_ALWAYS_SENSITIVE));
90763f89caaSJens Wiklander 
90863f89caaSJens Wiklander 		return PKCS11_CKR_TEMPLATE_INCONSISTENT;
90963f89caaSJens Wiklander 	}
91063f89caaSJens Wiklander 
91163f89caaSJens Wiklander 	return PKCS11_CKR_OK;
91263f89caaSJens Wiklander }
91363f89caaSJens Wiklander 
91489735787SRuchika Gupta bool object_is_private(struct obj_attrs *head)
91589735787SRuchika Gupta {
91689735787SRuchika Gupta 	if (get_class(head) == PKCS11_CKO_PRIVATE_KEY)
91789735787SRuchika Gupta 		return true;
91889735787SRuchika Gupta 
91989735787SRuchika Gupta 	if (get_bool(head, PKCS11_CKA_PRIVATE))
92089735787SRuchika Gupta 		return true;
92189735787SRuchika Gupta 
92289735787SRuchika Gupta 	return false;
92389735787SRuchika Gupta }
92489735787SRuchika Gupta 
925*2d25a9bcSRuchika Gupta bool object_is_token(struct obj_attrs *head)
926*2d25a9bcSRuchika Gupta {
927*2d25a9bcSRuchika Gupta 	return get_bool(head, PKCS11_CKA_TOKEN);
928*2d25a9bcSRuchika Gupta }
929*2d25a9bcSRuchika Gupta 
930*2d25a9bcSRuchika Gupta bool object_is_modifiable(struct obj_attrs *head)
931*2d25a9bcSRuchika Gupta {
932*2d25a9bcSRuchika Gupta 	return get_bool(head, PKCS11_CKA_MODIFIABLE);
933*2d25a9bcSRuchika Gupta }
934*2d25a9bcSRuchika Gupta 
935*2d25a9bcSRuchika Gupta bool object_is_copyable(struct obj_attrs *head)
936*2d25a9bcSRuchika Gupta {
937*2d25a9bcSRuchika Gupta 	return get_bool(head, PKCS11_CKA_COPYABLE);
938*2d25a9bcSRuchika Gupta }
939*2d25a9bcSRuchika Gupta 
94063f89caaSJens Wiklander /*
941512cbf1dSJens Wiklander  * Check access to object against authentication to token
942512cbf1dSJens Wiklander  */
943512cbf1dSJens Wiklander enum pkcs11_rc check_access_attrs_against_token(struct pkcs11_session *session,
944512cbf1dSJens Wiklander 						struct obj_attrs *head)
945512cbf1dSJens Wiklander {
946512cbf1dSJens Wiklander 	bool private = true;
947512cbf1dSJens Wiklander 
948512cbf1dSJens Wiklander 	switch (get_class(head)) {
949512cbf1dSJens Wiklander 	case PKCS11_CKO_SECRET_KEY:
950512cbf1dSJens Wiklander 	case PKCS11_CKO_PUBLIC_KEY:
951512cbf1dSJens Wiklander 	case PKCS11_CKO_DATA:
952512cbf1dSJens Wiklander 		private = get_bool(head, PKCS11_CKA_PRIVATE);
953512cbf1dSJens Wiklander 		break;
954512cbf1dSJens Wiklander 	case PKCS11_CKO_PRIVATE_KEY:
955512cbf1dSJens Wiklander 		break;
956512cbf1dSJens Wiklander 	default:
957512cbf1dSJens Wiklander 		return PKCS11_CKR_KEY_FUNCTION_NOT_PERMITTED;
958512cbf1dSJens Wiklander 	}
959512cbf1dSJens Wiklander 
9605db0fef4SRuchika Gupta 	if (private && (pkcs11_session_is_public(session) ||
9615db0fef4SRuchika Gupta 			pkcs11_session_is_so(session))) {
9625db0fef4SRuchika Gupta 		DMSG("Private object access from a public or SO session");
963512cbf1dSJens Wiklander 
96412f1ba86SRuchika Gupta 		return PKCS11_CKR_USER_NOT_LOGGED_IN;
965512cbf1dSJens Wiklander 	}
966512cbf1dSJens Wiklander 
967512cbf1dSJens Wiklander 	return PKCS11_CKR_OK;
968512cbf1dSJens Wiklander }
969512cbf1dSJens Wiklander 
970512cbf1dSJens Wiklander /*
97163f89caaSJens Wiklander  * Check the attributes of a to-be-created object matches the token state
97263f89caaSJens Wiklander  */
97363f89caaSJens Wiklander enum pkcs11_rc check_created_attrs_against_token(struct pkcs11_session *session,
97463f89caaSJens Wiklander 						 struct obj_attrs *head)
97563f89caaSJens Wiklander {
97663f89caaSJens Wiklander 	enum pkcs11_rc rc = PKCS11_CKR_OK;
97763f89caaSJens Wiklander 
97863f89caaSJens Wiklander 	rc = check_attrs_misc_integrity(head);
97963f89caaSJens Wiklander 	if (rc)
98063f89caaSJens Wiklander 		return rc;
98163f89caaSJens Wiklander 
98263f89caaSJens Wiklander 	if (get_bool(head, PKCS11_CKA_TRUSTED) &&
98363f89caaSJens Wiklander 	    !pkcs11_session_is_so(session)) {
98463f89caaSJens Wiklander 		DMSG("Can't create trusted object");
98563f89caaSJens Wiklander 
98663f89caaSJens Wiklander 		return PKCS11_CKR_KEY_FUNCTION_NOT_PERMITTED;
98763f89caaSJens Wiklander 	}
98863f89caaSJens Wiklander 
98963f89caaSJens Wiklander 	if (get_bool(head, PKCS11_CKA_TOKEN) &&
99063f89caaSJens Wiklander 	    !pkcs11_session_is_read_write(session)) {
99163f89caaSJens Wiklander 		DMSG("Can't create persistent object");
99263f89caaSJens Wiklander 
99363f89caaSJens Wiklander 		return PKCS11_CKR_SESSION_READ_ONLY;
99463f89caaSJens Wiklander 	}
99563f89caaSJens Wiklander 
99663f89caaSJens Wiklander 	/*
99763f89caaSJens Wiklander 	 * TODO: START_DATE and END_DATE: complies with current time?
99863f89caaSJens Wiklander 	 */
99963f89caaSJens Wiklander 	return PKCS11_CKR_OK;
100063f89caaSJens Wiklander }
100163f89caaSJens Wiklander 
100263f89caaSJens Wiklander #define DMSG_BAD_BBOOL(attr, proc, head)				\
100363f89caaSJens Wiklander 	do {								\
100463f89caaSJens Wiklander 		uint32_t __maybe_unused _attr = (attr);			\
100563f89caaSJens Wiklander 		uint8_t __maybe_unused _bvalue = 0;			\
100663f89caaSJens Wiklander 		enum pkcs11_rc __maybe_unused _rc = PKCS11_CKR_OK;	\
100763f89caaSJens Wiklander 									\
100863f89caaSJens Wiklander 		_rc = get_attribute((head), _attr, &_bvalue, NULL);	\
100963f89caaSJens Wiklander 		DMSG("%s issue for %s: %sfound, value %"PRIu8,		\
101063f89caaSJens Wiklander 		     id2str_attr(_attr), id2str_proc((proc)),		\
101163f89caaSJens Wiklander 		     _rc ? "not " : "", _bvalue);			\
101263f89caaSJens Wiklander 	} while (0)
101363f89caaSJens Wiklander 
101463f89caaSJens Wiklander static bool __maybe_unused check_attr_bval(uint32_t proc_id __maybe_unused,
101563f89caaSJens Wiklander 					   struct obj_attrs *head,
101663f89caaSJens Wiklander 					   uint32_t attribute, bool val)
101763f89caaSJens Wiklander {
101863f89caaSJens Wiklander 	uint8_t bbool = 0;
101963f89caaSJens Wiklander 	uint32_t sz = sizeof(bbool);
102063f89caaSJens Wiklander 
102163f89caaSJens Wiklander 	if (!get_attribute(head, attribute, &bbool, &sz) && !!bbool == val)
102263f89caaSJens Wiklander 		return true;
102363f89caaSJens Wiklander 
102463f89caaSJens Wiklander 	DMSG_BAD_BBOOL(attribute, proc_id, head);
102563f89caaSJens Wiklander 	return false;
102663f89caaSJens Wiklander }
102763f89caaSJens Wiklander 
102863f89caaSJens Wiklander /*
102963f89caaSJens Wiklander  * Check the attributes of a new secret match the processing/mechanism
103063f89caaSJens Wiklander  * used to create it.
103163f89caaSJens Wiklander  *
103263f89caaSJens Wiklander  * @proc_id - PKCS11_CKM_xxx
103363f89caaSJens Wiklander  * @head - head of the attributes of the to-be-created object.
103463f89caaSJens Wiklander  */
103563f89caaSJens Wiklander enum pkcs11_rc check_created_attrs_against_processing(uint32_t proc_id,
103663f89caaSJens Wiklander 						      struct obj_attrs *head)
103763f89caaSJens Wiklander {
103863f89caaSJens Wiklander 	/*
103963f89caaSJens Wiklander 	 * Processings that do not create secrets are not expected to call
104063f89caaSJens Wiklander 	 * this function which would panic.
104163f89caaSJens Wiklander 	 */
104263f89caaSJens Wiklander 	switch (proc_id) {
104363f89caaSJens Wiklander 	case PKCS11_PROCESSING_IMPORT:
104463f89caaSJens Wiklander 		assert(check_attr_bval(proc_id, head, PKCS11_CKA_LOCAL, false));
104563f89caaSJens Wiklander 		break;
1046fa247a2aSRuchika Gupta 	case PKCS11_CKM_GENERIC_SECRET_KEY_GEN:
1047fa247a2aSRuchika Gupta 	case PKCS11_CKM_AES_KEY_GEN:
1048fa247a2aSRuchika Gupta 		assert(check_attr_bval(proc_id, head, PKCS11_CKA_LOCAL, true));
1049fa247a2aSRuchika Gupta 		break;
105063f89caaSJens Wiklander 	default:
105163f89caaSJens Wiklander 		TEE_Panic(proc_id);
105263f89caaSJens Wiklander 		break;
105363f89caaSJens Wiklander 	}
105463f89caaSJens Wiklander 
1055fa247a2aSRuchika Gupta 	switch (proc_id) {
1056fa247a2aSRuchika Gupta 	case PKCS11_CKM_GENERIC_SECRET_KEY_GEN:
1057fa247a2aSRuchika Gupta 		assert(get_key_type(head) == PKCS11_CKK_GENERIC_SECRET);
1058fa247a2aSRuchika Gupta 		break;
1059fa247a2aSRuchika Gupta 	case PKCS11_CKM_AES_KEY_GEN:
1060fa247a2aSRuchika Gupta 		assert(get_key_type(head) == PKCS11_CKK_AES);
1061fa247a2aSRuchika Gupta 		break;
1062fa247a2aSRuchika Gupta 	case PKCS11_PROCESSING_IMPORT:
1063fa247a2aSRuchika Gupta 	default:
1064fa247a2aSRuchika Gupta 		break;
1065fa247a2aSRuchika Gupta 	}
1066fa247a2aSRuchika Gupta 
106763f89caaSJens Wiklander 	return PKCS11_CKR_OK;
106863f89caaSJens Wiklander }
1069512cbf1dSJens Wiklander 
1070512cbf1dSJens Wiklander static void get_key_min_max_sizes(enum pkcs11_key_type key_type,
1071512cbf1dSJens Wiklander 				  uint32_t *min_key_size,
1072512cbf1dSJens Wiklander 				  uint32_t *max_key_size)
1073512cbf1dSJens Wiklander {
1074512cbf1dSJens Wiklander 	enum pkcs11_mechanism_id mechanism = PKCS11_CKM_UNDEFINED_ID;
1075512cbf1dSJens Wiklander 
1076512cbf1dSJens Wiklander 	switch (key_type) {
1077fa247a2aSRuchika Gupta 	case PKCS11_CKK_GENERIC_SECRET:
1078fa247a2aSRuchika Gupta 		mechanism = PKCS11_CKM_GENERIC_SECRET_KEY_GEN;
1079fa247a2aSRuchika Gupta 		break;
1080512cbf1dSJens Wiklander 	case PKCS11_CKK_AES:
1081512cbf1dSJens Wiklander 		mechanism = PKCS11_CKM_AES_KEY_GEN;
1082512cbf1dSJens Wiklander 		break;
10831f45c9cfSRuchika Gupta 	case PKCS11_CKK_MD5_HMAC:
10841f45c9cfSRuchika Gupta 		mechanism = PKCS11_CKM_MD5_HMAC;
10851f45c9cfSRuchika Gupta 		break;
10861f45c9cfSRuchika Gupta 	case PKCS11_CKK_SHA_1_HMAC:
10871f45c9cfSRuchika Gupta 		mechanism = PKCS11_CKM_SHA_1_HMAC;
10881f45c9cfSRuchika Gupta 		break;
10891f45c9cfSRuchika Gupta 	case PKCS11_CKK_SHA224_HMAC:
10901f45c9cfSRuchika Gupta 		mechanism = PKCS11_CKM_SHA224_HMAC;
10911f45c9cfSRuchika Gupta 		break;
1092a339a354SEtienne Carriere 	case PKCS11_CKK_SHA256_HMAC:
1093a339a354SEtienne Carriere 		mechanism = PKCS11_CKM_SHA256_HMAC;
1094a339a354SEtienne Carriere 		break;
10951f45c9cfSRuchika Gupta 	case PKCS11_CKK_SHA384_HMAC:
10961f45c9cfSRuchika Gupta 		mechanism = PKCS11_CKM_SHA384_HMAC;
10971f45c9cfSRuchika Gupta 		break;
10981f45c9cfSRuchika Gupta 	case PKCS11_CKK_SHA512_HMAC:
10991f45c9cfSRuchika Gupta 		mechanism = PKCS11_CKM_SHA512_HMAC;
11001f45c9cfSRuchika Gupta 		break;
1101512cbf1dSJens Wiklander 	default:
1102512cbf1dSJens Wiklander 		TEE_Panic(key_type);
1103512cbf1dSJens Wiklander 		break;
1104512cbf1dSJens Wiklander 	}
1105512cbf1dSJens Wiklander 
1106512cbf1dSJens Wiklander 	mechanism_supported_key_sizes(mechanism, min_key_size,
1107512cbf1dSJens Wiklander 				      max_key_size);
1108512cbf1dSJens Wiklander }
1109512cbf1dSJens Wiklander 
1110512cbf1dSJens Wiklander enum pkcs11_rc check_created_attrs(struct obj_attrs *key1,
1111512cbf1dSJens Wiklander 				   struct obj_attrs *key2)
1112512cbf1dSJens Wiklander {
1113512cbf1dSJens Wiklander 	enum pkcs11_rc rc = PKCS11_CKR_OK;
1114512cbf1dSJens Wiklander 	struct obj_attrs *secret = NULL;
1115512cbf1dSJens Wiklander 	uint32_t max_key_size = 0;
1116512cbf1dSJens Wiklander 	uint32_t min_key_size = 0;
1117512cbf1dSJens Wiklander 	uint32_t key_length = 0;
1118512cbf1dSJens Wiklander 
1119512cbf1dSJens Wiklander 	switch (get_class(key1)) {
1120512cbf1dSJens Wiklander 	case PKCS11_CKO_SECRET_KEY:
1121512cbf1dSJens Wiklander 		secret = key1;
1122512cbf1dSJens Wiklander 		break;
1123512cbf1dSJens Wiklander 	default:
1124512cbf1dSJens Wiklander 		return PKCS11_CKR_ATTRIBUTE_VALUE_INVALID;
1125512cbf1dSJens Wiklander 	}
1126512cbf1dSJens Wiklander 
1127512cbf1dSJens Wiklander 	if (key2)
1128512cbf1dSJens Wiklander 		return PKCS11_CKR_ATTRIBUTE_VALUE_INVALID;
1129512cbf1dSJens Wiklander 
1130512cbf1dSJens Wiklander 	if (secret) {
1131512cbf1dSJens Wiklander 		switch (get_key_type(secret)) {
1132512cbf1dSJens Wiklander 		case PKCS11_CKK_AES:
1133512cbf1dSJens Wiklander 		case PKCS11_CKK_GENERIC_SECRET:
1134512cbf1dSJens Wiklander 		case PKCS11_CKK_MD5_HMAC:
1135512cbf1dSJens Wiklander 		case PKCS11_CKK_SHA_1_HMAC:
1136512cbf1dSJens Wiklander 		case PKCS11_CKK_SHA224_HMAC:
1137512cbf1dSJens Wiklander 		case PKCS11_CKK_SHA256_HMAC:
1138512cbf1dSJens Wiklander 		case PKCS11_CKK_SHA384_HMAC:
1139512cbf1dSJens Wiklander 		case PKCS11_CKK_SHA512_HMAC:
1140512cbf1dSJens Wiklander 			break;
1141512cbf1dSJens Wiklander 		default:
1142512cbf1dSJens Wiklander 			return PKCS11_CKR_TEMPLATE_INCONSISTENT;
1143512cbf1dSJens Wiklander 		}
1144512cbf1dSJens Wiklander 
1145512cbf1dSJens Wiklander 		/* Get key size */
1146512cbf1dSJens Wiklander 		rc = get_u32_attribute(secret, PKCS11_CKA_VALUE_LEN,
1147512cbf1dSJens Wiklander 				       &key_length);
1148512cbf1dSJens Wiklander 		if (rc)
1149d1d44372SRuchika Gupta 			return PKCS11_CKR_TEMPLATE_INCOMPLETE;
1150512cbf1dSJens Wiklander 	}
1151512cbf1dSJens Wiklander 
1152512cbf1dSJens Wiklander 	get_key_min_max_sizes(get_key_type(key1), &min_key_size, &max_key_size);
1153512cbf1dSJens Wiklander 	if (key_length < min_key_size || key_length > max_key_size) {
1154512cbf1dSJens Wiklander 		EMSG("Length %"PRIu32" vs range [%"PRIu32" %"PRIu32"]",
1155512cbf1dSJens Wiklander 		     key_length, min_key_size, max_key_size);
1156512cbf1dSJens Wiklander 
1157512cbf1dSJens Wiklander 		return PKCS11_CKR_KEY_SIZE_RANGE;
1158512cbf1dSJens Wiklander 	}
1159512cbf1dSJens Wiklander 
1160512cbf1dSJens Wiklander 	return PKCS11_CKR_OK;
1161512cbf1dSJens Wiklander }
1162512cbf1dSJens Wiklander 
1163512cbf1dSJens Wiklander /* Check processing ID against attribute ALLOWED_MECHANISMS if any */
1164512cbf1dSJens Wiklander static bool parent_key_complies_allowed_processings(uint32_t proc_id,
1165512cbf1dSJens Wiklander 						    struct obj_attrs *head)
1166512cbf1dSJens Wiklander {
1167512cbf1dSJens Wiklander 	char *attr = NULL;
1168512cbf1dSJens Wiklander 	uint32_t size = 0;
1169512cbf1dSJens Wiklander 	uint32_t proc = 0;
1170512cbf1dSJens Wiklander 	size_t count = 0;
11716a760c9eSEtienne Carriere 	enum pkcs11_rc rc = PKCS11_CKR_GENERAL_ERROR;
1172512cbf1dSJens Wiklander 
11736a760c9eSEtienne Carriere 	rc = get_attribute_ptr(head, PKCS11_CKA_ALLOWED_MECHANISMS,
11746a760c9eSEtienne Carriere 			       (void *)&attr, &size);
11756a760c9eSEtienne Carriere 	if (rc == PKCS11_RV_NOT_FOUND)
1176512cbf1dSJens Wiklander 		return true;
11776a760c9eSEtienne Carriere 	if (rc) {
11786a760c9eSEtienne Carriere 		EMSG("unexpected attributes state");
11796a760c9eSEtienne Carriere 		TEE_Panic(TEE_ERROR_BAD_STATE);
1180512cbf1dSJens Wiklander 	}
1181512cbf1dSJens Wiklander 
1182512cbf1dSJens Wiklander 	for (count = size / sizeof(uint32_t); count; count--) {
1183512cbf1dSJens Wiklander 		TEE_MemMove(&proc, attr, sizeof(uint32_t));
1184512cbf1dSJens Wiklander 		attr += sizeof(uint32_t);
1185512cbf1dSJens Wiklander 
1186512cbf1dSJens Wiklander 		if (proc == proc_id)
1187512cbf1dSJens Wiklander 			return true;
1188512cbf1dSJens Wiklander 	}
1189512cbf1dSJens Wiklander 
1190512cbf1dSJens Wiklander 	DMSG("can't find %s in allowed list", id2str_proc(proc_id));
1191512cbf1dSJens Wiklander 	return false;
1192512cbf1dSJens Wiklander }
1193512cbf1dSJens Wiklander 
1194512cbf1dSJens Wiklander static enum pkcs11_attr_id func_to_attr(enum processing_func func)
1195512cbf1dSJens Wiklander {
1196512cbf1dSJens Wiklander 	switch (func) {
1197512cbf1dSJens Wiklander 	case PKCS11_FUNCTION_ENCRYPT:
1198512cbf1dSJens Wiklander 		return PKCS11_CKA_ENCRYPT;
1199512cbf1dSJens Wiklander 	case PKCS11_FUNCTION_DECRYPT:
1200512cbf1dSJens Wiklander 		return PKCS11_CKA_DECRYPT;
1201512cbf1dSJens Wiklander 	case PKCS11_FUNCTION_SIGN:
1202512cbf1dSJens Wiklander 		return PKCS11_CKA_SIGN;
1203512cbf1dSJens Wiklander 	case PKCS11_FUNCTION_VERIFY:
1204512cbf1dSJens Wiklander 		return PKCS11_CKA_VERIFY;
1205512cbf1dSJens Wiklander 	case PKCS11_FUNCTION_WRAP:
1206512cbf1dSJens Wiklander 		return PKCS11_CKA_WRAP;
1207512cbf1dSJens Wiklander 	case PKCS11_FUNCTION_UNWRAP:
1208512cbf1dSJens Wiklander 		return PKCS11_CKA_UNWRAP;
1209512cbf1dSJens Wiklander 	case PKCS11_FUNCTION_DERIVE:
1210512cbf1dSJens Wiklander 		return PKCS11_CKA_DERIVE;
1211512cbf1dSJens Wiklander 	default:
1212512cbf1dSJens Wiklander 		return PKCS11_CKA_UNDEFINED_ID;
1213512cbf1dSJens Wiklander 	}
1214512cbf1dSJens Wiklander }
1215512cbf1dSJens Wiklander 
1216512cbf1dSJens Wiklander enum pkcs11_rc
1217512cbf1dSJens Wiklander check_parent_attrs_against_processing(enum pkcs11_mechanism_id proc_id,
1218512cbf1dSJens Wiklander 				      enum processing_func function,
1219512cbf1dSJens Wiklander 				      struct obj_attrs *head)
1220512cbf1dSJens Wiklander {
1221512cbf1dSJens Wiklander 	enum pkcs11_class_id key_class = get_class(head);
1222512cbf1dSJens Wiklander 	enum pkcs11_key_type key_type = get_key_type(head);
1223512cbf1dSJens Wiklander 	enum pkcs11_attr_id attr = func_to_attr(function);
1224512cbf1dSJens Wiklander 
1225512cbf1dSJens Wiklander 	if (!get_bool(head, attr)) {
1226512cbf1dSJens Wiklander 		DMSG("%s not permitted", id2str_attr(attr));
1227512cbf1dSJens Wiklander 		return PKCS11_CKR_KEY_FUNCTION_NOT_PERMITTED;
1228512cbf1dSJens Wiklander 	}
1229512cbf1dSJens Wiklander 
1230512cbf1dSJens Wiklander 	/* Check processing complies with parent key family */
1231512cbf1dSJens Wiklander 	switch (proc_id) {
1232512cbf1dSJens Wiklander 	case PKCS11_CKM_AES_ECB:
1233512cbf1dSJens Wiklander 	case PKCS11_CKM_AES_CBC:
1234512cbf1dSJens Wiklander 	case PKCS11_CKM_AES_CBC_PAD:
1235512cbf1dSJens Wiklander 	case PKCS11_CKM_AES_CTS:
1236512cbf1dSJens Wiklander 	case PKCS11_CKM_AES_CTR:
1237512cbf1dSJens Wiklander 		if (key_class == PKCS11_CKO_SECRET_KEY &&
1238512cbf1dSJens Wiklander 		    key_type == PKCS11_CKK_AES)
1239512cbf1dSJens Wiklander 			break;
1240512cbf1dSJens Wiklander 
1241512cbf1dSJens Wiklander 		DMSG("%s invalid key %s/%s", id2str_proc(proc_id),
1242512cbf1dSJens Wiklander 		     id2str_class(key_class), id2str_key_type(key_type));
1243512cbf1dSJens Wiklander 
1244512cbf1dSJens Wiklander 		return PKCS11_CKR_KEY_FUNCTION_NOT_PERMITTED;
1245512cbf1dSJens Wiklander 
1246689f4e5bSRuchika Gupta 	case PKCS11_CKM_MD5_HMAC:
1247689f4e5bSRuchika Gupta 	case PKCS11_CKM_SHA_1_HMAC:
1248689f4e5bSRuchika Gupta 	case PKCS11_CKM_SHA224_HMAC:
1249689f4e5bSRuchika Gupta 	case PKCS11_CKM_SHA256_HMAC:
1250689f4e5bSRuchika Gupta 	case PKCS11_CKM_SHA384_HMAC:
1251689f4e5bSRuchika Gupta 	case PKCS11_CKM_SHA512_HMAC:
1252689f4e5bSRuchika Gupta 		if (key_class != PKCS11_CKO_SECRET_KEY)
1253689f4e5bSRuchika Gupta 			return PKCS11_CKR_KEY_FUNCTION_NOT_PERMITTED;
1254689f4e5bSRuchika Gupta 
1255689f4e5bSRuchika Gupta 		if (key_type == PKCS11_CKK_GENERIC_SECRET)
1256689f4e5bSRuchika Gupta 			break;
1257689f4e5bSRuchika Gupta 
1258689f4e5bSRuchika Gupta 		switch (proc_id) {
1259689f4e5bSRuchika Gupta 		case PKCS11_CKM_MD5_HMAC:
1260689f4e5bSRuchika Gupta 			if (key_type == PKCS11_CKK_MD5_HMAC)
1261689f4e5bSRuchika Gupta 				break;
1262689f4e5bSRuchika Gupta 			return PKCS11_CKR_KEY_FUNCTION_NOT_PERMITTED;
1263689f4e5bSRuchika Gupta 		case PKCS11_CKM_SHA_1_HMAC:
1264689f4e5bSRuchika Gupta 			if (key_type == PKCS11_CKK_SHA_1_HMAC)
1265689f4e5bSRuchika Gupta 				break;
1266689f4e5bSRuchika Gupta 			return PKCS11_CKR_KEY_FUNCTION_NOT_PERMITTED;
1267689f4e5bSRuchika Gupta 		case PKCS11_CKM_SHA224_HMAC:
1268689f4e5bSRuchika Gupta 			if (key_type == PKCS11_CKK_SHA224_HMAC)
1269689f4e5bSRuchika Gupta 				break;
1270689f4e5bSRuchika Gupta 			return PKCS11_CKR_KEY_FUNCTION_NOT_PERMITTED;
1271689f4e5bSRuchika Gupta 		case PKCS11_CKM_SHA256_HMAC:
1272689f4e5bSRuchika Gupta 			if (key_type == PKCS11_CKK_SHA256_HMAC)
1273689f4e5bSRuchika Gupta 				break;
1274689f4e5bSRuchika Gupta 			return PKCS11_CKR_KEY_FUNCTION_NOT_PERMITTED;
1275689f4e5bSRuchika Gupta 		case PKCS11_CKM_SHA384_HMAC:
1276689f4e5bSRuchika Gupta 			if (key_type == PKCS11_CKK_SHA384_HMAC)
1277689f4e5bSRuchika Gupta 				break;
1278689f4e5bSRuchika Gupta 			return PKCS11_CKR_KEY_FUNCTION_NOT_PERMITTED;
1279689f4e5bSRuchika Gupta 		case PKCS11_CKM_SHA512_HMAC:
1280689f4e5bSRuchika Gupta 			if (key_type == PKCS11_CKK_SHA512_HMAC)
1281689f4e5bSRuchika Gupta 				break;
1282689f4e5bSRuchika Gupta 			return PKCS11_CKR_KEY_FUNCTION_NOT_PERMITTED;
1283689f4e5bSRuchika Gupta 		default:
1284689f4e5bSRuchika Gupta 			return PKCS11_CKR_KEY_FUNCTION_NOT_PERMITTED;
1285689f4e5bSRuchika Gupta 		}
1286689f4e5bSRuchika Gupta 		break;
1287689f4e5bSRuchika Gupta 
1288512cbf1dSJens Wiklander 	default:
1289512cbf1dSJens Wiklander 		DMSG("Invalid processing %#"PRIx32"/%s", proc_id,
1290512cbf1dSJens Wiklander 		     id2str_proc(proc_id));
1291512cbf1dSJens Wiklander 
1292512cbf1dSJens Wiklander 		return PKCS11_CKR_MECHANISM_INVALID;
1293512cbf1dSJens Wiklander 	}
1294512cbf1dSJens Wiklander 
1295512cbf1dSJens Wiklander 	if (!parent_key_complies_allowed_processings(proc_id, head)) {
1296512cbf1dSJens Wiklander 		DMSG("Allowed mechanism failed");
1297512cbf1dSJens Wiklander 		return PKCS11_CKR_KEY_FUNCTION_NOT_PERMITTED;
1298512cbf1dSJens Wiklander 	}
1299512cbf1dSJens Wiklander 
1300512cbf1dSJens Wiklander 	return PKCS11_CKR_OK;
1301512cbf1dSJens Wiklander }
1302783c1515SRuchika Gupta 
1303783c1515SRuchika Gupta bool attribute_is_exportable(struct pkcs11_attribute_head *req_attr,
1304783c1515SRuchika Gupta 			     struct pkcs11_object *obj)
1305783c1515SRuchika Gupta {
1306783c1515SRuchika Gupta 	uint8_t boolval = 0;
1307783c1515SRuchika Gupta 	uint32_t boolsize = 0;
1308783c1515SRuchika Gupta 	enum pkcs11_rc rc = PKCS11_CKR_GENERAL_ERROR;
1309783c1515SRuchika Gupta 	enum pkcs11_class_id key_class = get_class(obj->attributes);
1310783c1515SRuchika Gupta 
1311783c1515SRuchika Gupta 	if (key_class != PKCS11_CKO_SECRET_KEY &&
1312783c1515SRuchika Gupta 	    key_class != PKCS11_CKO_PRIVATE_KEY)
1313783c1515SRuchika Gupta 		return true;
1314783c1515SRuchika Gupta 
1315783c1515SRuchika Gupta 	switch (req_attr->id) {
1316783c1515SRuchika Gupta 	case PKCS11_CKA_PRIVATE_EXPONENT:
1317783c1515SRuchika Gupta 	case PKCS11_CKA_PRIME_1:
1318783c1515SRuchika Gupta 	case PKCS11_CKA_PRIME_2:
1319783c1515SRuchika Gupta 	case PKCS11_CKA_EXPONENT_1:
1320783c1515SRuchika Gupta 	case PKCS11_CKA_EXPONENT_2:
1321783c1515SRuchika Gupta 	case PKCS11_CKA_COEFFICIENT:
1322783c1515SRuchika Gupta 	case PKCS11_CKA_VALUE:
1323783c1515SRuchika Gupta 		boolsize = sizeof(boolval);
1324783c1515SRuchika Gupta 		rc = get_attribute(obj->attributes, PKCS11_CKA_EXTRACTABLE,
1325783c1515SRuchika Gupta 				   &boolval, &boolsize);
1326783c1515SRuchika Gupta 		if (rc || boolval == PKCS11_FALSE)
1327783c1515SRuchika Gupta 			return false;
1328783c1515SRuchika Gupta 
1329783c1515SRuchika Gupta 		boolsize = sizeof(boolval);
1330783c1515SRuchika Gupta 		rc = get_attribute(obj->attributes, PKCS11_CKA_SENSITIVE,
1331783c1515SRuchika Gupta 				   &boolval, &boolsize);
1332783c1515SRuchika Gupta 		if (rc || boolval == PKCS11_TRUE)
1333783c1515SRuchika Gupta 			return false;
1334783c1515SRuchika Gupta 		break;
1335783c1515SRuchika Gupta 	default:
1336783c1515SRuchika Gupta 		break;
1337783c1515SRuchika Gupta 	}
1338783c1515SRuchika Gupta 
1339783c1515SRuchika Gupta 	return true;
1340783c1515SRuchika Gupta }
1341*2d25a9bcSRuchika Gupta 
1342*2d25a9bcSRuchika Gupta static bool attr_is_modifiable_any_key(struct pkcs11_attribute_head *attr)
1343*2d25a9bcSRuchika Gupta {
1344*2d25a9bcSRuchika Gupta 	switch (attr->id) {
1345*2d25a9bcSRuchika Gupta 	case PKCS11_CKA_ID:
1346*2d25a9bcSRuchika Gupta 	case PKCS11_CKA_START_DATE:
1347*2d25a9bcSRuchika Gupta 	case PKCS11_CKA_END_DATE:
1348*2d25a9bcSRuchika Gupta 	case PKCS11_CKA_DERIVE:
1349*2d25a9bcSRuchika Gupta 		return true;
1350*2d25a9bcSRuchika Gupta 	default:
1351*2d25a9bcSRuchika Gupta 		return false;
1352*2d25a9bcSRuchika Gupta 	}
1353*2d25a9bcSRuchika Gupta }
1354*2d25a9bcSRuchika Gupta 
1355*2d25a9bcSRuchika Gupta static bool attr_is_modifiable_secret_key(struct pkcs11_attribute_head *attr,
1356*2d25a9bcSRuchika Gupta 					  struct pkcs11_session *session,
1357*2d25a9bcSRuchika Gupta 					  struct pkcs11_object *obj)
1358*2d25a9bcSRuchika Gupta {
1359*2d25a9bcSRuchika Gupta 	switch (attr->id) {
1360*2d25a9bcSRuchika Gupta 	case PKCS11_CKA_ENCRYPT:
1361*2d25a9bcSRuchika Gupta 	case PKCS11_CKA_DECRYPT:
1362*2d25a9bcSRuchika Gupta 	case PKCS11_CKA_SIGN:
1363*2d25a9bcSRuchika Gupta 	case PKCS11_CKA_VERIFY:
1364*2d25a9bcSRuchika Gupta 	case PKCS11_CKA_WRAP:
1365*2d25a9bcSRuchika Gupta 	case PKCS11_CKA_UNWRAP:
1366*2d25a9bcSRuchika Gupta 		return true;
1367*2d25a9bcSRuchika Gupta 	/* Can't be modified once set to CK_FALSE - 12 in Table 10 */
1368*2d25a9bcSRuchika Gupta 	case PKCS11_CKA_EXTRACTABLE:
1369*2d25a9bcSRuchika Gupta 		return get_bool(obj->attributes, attr->id);
1370*2d25a9bcSRuchika Gupta 	/* Can't be modified once set to CK_TRUE - 11 in Table 10 */
1371*2d25a9bcSRuchika Gupta 	case PKCS11_CKA_SENSITIVE:
1372*2d25a9bcSRuchika Gupta 	case PKCS11_CKA_WRAP_WITH_TRUSTED:
1373*2d25a9bcSRuchika Gupta 		return !get_bool(obj->attributes, attr->id);
1374*2d25a9bcSRuchika Gupta 	/* Change in CKA_TRUSTED can only be done by SO */
1375*2d25a9bcSRuchika Gupta 	case PKCS11_CKA_TRUSTED:
1376*2d25a9bcSRuchika Gupta 		return pkcs11_session_is_so(session);
1377*2d25a9bcSRuchika Gupta 	case PKCS11_CKA_NEVER_EXTRACTABLE:
1378*2d25a9bcSRuchika Gupta 	case PKCS11_CKA_ALWAYS_SENSITIVE:
1379*2d25a9bcSRuchika Gupta 		return false;
1380*2d25a9bcSRuchika Gupta 	default:
1381*2d25a9bcSRuchika Gupta 		return false;
1382*2d25a9bcSRuchika Gupta 	}
1383*2d25a9bcSRuchika Gupta }
1384*2d25a9bcSRuchika Gupta 
1385*2d25a9bcSRuchika Gupta static bool attr_is_modifiable_public_key(struct pkcs11_attribute_head *attr,
1386*2d25a9bcSRuchika Gupta 					  struct pkcs11_session *session,
1387*2d25a9bcSRuchika Gupta 					  struct pkcs11_object *obj __unused)
1388*2d25a9bcSRuchika Gupta {
1389*2d25a9bcSRuchika Gupta 	switch (attr->id) {
1390*2d25a9bcSRuchika Gupta 	case PKCS11_CKA_SUBJECT:
1391*2d25a9bcSRuchika Gupta 	case PKCS11_CKA_ENCRYPT:
1392*2d25a9bcSRuchika Gupta 	case PKCS11_CKA_VERIFY:
1393*2d25a9bcSRuchika Gupta 	case PKCS11_CKA_VERIFY_RECOVER:
1394*2d25a9bcSRuchika Gupta 	case PKCS11_CKA_WRAP:
1395*2d25a9bcSRuchika Gupta 		return true;
1396*2d25a9bcSRuchika Gupta 	case PKCS11_CKA_TRUSTED:
1397*2d25a9bcSRuchika Gupta 		/* Change in CKA_TRUSTED can only be done by SO */
1398*2d25a9bcSRuchika Gupta 		return pkcs11_session_is_so(session);
1399*2d25a9bcSRuchika Gupta 	default:
1400*2d25a9bcSRuchika Gupta 		return false;
1401*2d25a9bcSRuchika Gupta 	}
1402*2d25a9bcSRuchika Gupta }
1403*2d25a9bcSRuchika Gupta 
1404*2d25a9bcSRuchika Gupta static bool attr_is_modifiable_private_key(struct pkcs11_attribute_head *attr,
1405*2d25a9bcSRuchika Gupta 					   struct pkcs11_session *sess __unused,
1406*2d25a9bcSRuchika Gupta 					   struct pkcs11_object *obj)
1407*2d25a9bcSRuchika Gupta {
1408*2d25a9bcSRuchika Gupta 	switch (attr->id) {
1409*2d25a9bcSRuchika Gupta 	case PKCS11_CKA_SUBJECT:
1410*2d25a9bcSRuchika Gupta 	case PKCS11_CKA_DECRYPT:
1411*2d25a9bcSRuchika Gupta 	case PKCS11_CKA_SIGN:
1412*2d25a9bcSRuchika Gupta 	case PKCS11_CKA_SIGN_RECOVER:
1413*2d25a9bcSRuchika Gupta 	case PKCS11_CKA_UNWRAP:
1414*2d25a9bcSRuchika Gupta 	/*
1415*2d25a9bcSRuchika Gupta 	 * TBD: Revisit if we don't support PKCS11_CKA_PUBLIC_KEY_INFO
1416*2d25a9bcSRuchika Gupta 	 * Specification mentions that if this attribute is
1417*2d25a9bcSRuchika Gupta 	 * supplied as part of a template for C_CreateObject, C_CopyObject or
1418*2d25a9bcSRuchika Gupta 	 * C_SetAttributeValue for a private key, the token MUST verify
1419*2d25a9bcSRuchika Gupta 	 * correspondence between the private key data and the public key data
1420*2d25a9bcSRuchika Gupta 	 * as supplied in CKA_PUBLIC_KEY_INFO. This needs to be
1421*2d25a9bcSRuchika Gupta 	 * taken care of when this object type will be implemented
1422*2d25a9bcSRuchika Gupta 	 */
1423*2d25a9bcSRuchika Gupta 	case PKCS11_CKA_PUBLIC_KEY_INFO:
1424*2d25a9bcSRuchika Gupta 		return true;
1425*2d25a9bcSRuchika Gupta 	/* Can't be modified once set to CK_FALSE - 12 in Table 10 */
1426*2d25a9bcSRuchika Gupta 	case PKCS11_CKA_EXTRACTABLE:
1427*2d25a9bcSRuchika Gupta 		return get_bool(obj->attributes, attr->id);
1428*2d25a9bcSRuchika Gupta 	/* Can't be modified once set to CK_TRUE - 11 in Table 10 */
1429*2d25a9bcSRuchika Gupta 	case PKCS11_CKA_SENSITIVE:
1430*2d25a9bcSRuchika Gupta 	case PKCS11_CKA_WRAP_WITH_TRUSTED:
1431*2d25a9bcSRuchika Gupta 		return !get_bool(obj->attributes, attr->id);
1432*2d25a9bcSRuchika Gupta 	case PKCS11_CKA_NEVER_EXTRACTABLE:
1433*2d25a9bcSRuchika Gupta 	case PKCS11_CKA_ALWAYS_SENSITIVE:
1434*2d25a9bcSRuchika Gupta 		return false;
1435*2d25a9bcSRuchika Gupta 	default:
1436*2d25a9bcSRuchika Gupta 		return false;
1437*2d25a9bcSRuchika Gupta 	}
1438*2d25a9bcSRuchika Gupta }
1439*2d25a9bcSRuchika Gupta 
1440*2d25a9bcSRuchika Gupta static bool attribute_is_modifiable(struct pkcs11_session *session,
1441*2d25a9bcSRuchika Gupta 				    struct pkcs11_attribute_head *req_attr,
1442*2d25a9bcSRuchika Gupta 				    struct pkcs11_object *obj,
1443*2d25a9bcSRuchika Gupta 				    enum pkcs11_class_id class,
1444*2d25a9bcSRuchika Gupta 				    enum processing_func function)
1445*2d25a9bcSRuchika Gupta {
1446*2d25a9bcSRuchika Gupta 	/* Check modifiable attributes common to any object */
1447*2d25a9bcSRuchika Gupta 	switch (req_attr->id) {
1448*2d25a9bcSRuchika Gupta 	case PKCS11_CKA_LABEL:
1449*2d25a9bcSRuchika Gupta 		return true;
1450*2d25a9bcSRuchika Gupta 	case PKCS11_CKA_TOKEN:
1451*2d25a9bcSRuchika Gupta 	case PKCS11_CKA_MODIFIABLE:
1452*2d25a9bcSRuchika Gupta 	case PKCS11_CKA_DESTROYABLE:
1453*2d25a9bcSRuchika Gupta 	case PKCS11_CKA_PRIVATE:
1454*2d25a9bcSRuchika Gupta 		return function == PKCS11_FUNCTION_COPY;
1455*2d25a9bcSRuchika Gupta 	case PKCS11_CKA_COPYABLE:
1456*2d25a9bcSRuchika Gupta 		/*
1457*2d25a9bcSRuchika Gupta 		 * Specification mentions that if the attribute value is false
1458*2d25a9bcSRuchika Gupta 		 * it can't be set to true. Reading this we assume that it
1459*2d25a9bcSRuchika Gupta 		 * should be possible to modify this attribute even though this
1460*2d25a9bcSRuchika Gupta 		 * is not marked as modifiable in Table 10 if done in right
1461*2d25a9bcSRuchika Gupta 		 * direction i.e from TRUE -> FALSE.
1462*2d25a9bcSRuchika Gupta 		 */
1463*2d25a9bcSRuchika Gupta 		return get_bool(obj->attributes, req_attr->id);
1464*2d25a9bcSRuchika Gupta 	default:
1465*2d25a9bcSRuchika Gupta 		break;
1466*2d25a9bcSRuchika Gupta 	}
1467*2d25a9bcSRuchika Gupta 
1468*2d25a9bcSRuchika Gupta 	/* Attribute checking based on class type */
1469*2d25a9bcSRuchika Gupta 	switch (class) {
1470*2d25a9bcSRuchika Gupta 	case PKCS11_CKO_SECRET_KEY:
1471*2d25a9bcSRuchika Gupta 	case PKCS11_CKO_PUBLIC_KEY:
1472*2d25a9bcSRuchika Gupta 	case PKCS11_CKO_PRIVATE_KEY:
1473*2d25a9bcSRuchika Gupta 		if (attr_is_modifiable_any_key(req_attr))
1474*2d25a9bcSRuchika Gupta 			return true;
1475*2d25a9bcSRuchika Gupta 		if (class == PKCS11_CKO_SECRET_KEY &&
1476*2d25a9bcSRuchika Gupta 		    attr_is_modifiable_secret_key(req_attr, session, obj))
1477*2d25a9bcSRuchika Gupta 			return true;
1478*2d25a9bcSRuchika Gupta 		if (class == PKCS11_CKO_PUBLIC_KEY &&
1479*2d25a9bcSRuchika Gupta 		    attr_is_modifiable_public_key(req_attr, session, obj))
1480*2d25a9bcSRuchika Gupta 			return true;
1481*2d25a9bcSRuchika Gupta 		if (class == PKCS11_CKO_PRIVATE_KEY &&
1482*2d25a9bcSRuchika Gupta 		    attr_is_modifiable_private_key(req_attr, session, obj))
1483*2d25a9bcSRuchika Gupta 			return true;
1484*2d25a9bcSRuchika Gupta 		break;
1485*2d25a9bcSRuchika Gupta 	case PKCS11_CKO_DATA:
1486*2d25a9bcSRuchika Gupta 		/* None of the data object attributes are modifiable */
1487*2d25a9bcSRuchika Gupta 		return false;
1488*2d25a9bcSRuchika Gupta 	default:
1489*2d25a9bcSRuchika Gupta 		break;
1490*2d25a9bcSRuchika Gupta 	}
1491*2d25a9bcSRuchika Gupta 
1492*2d25a9bcSRuchika Gupta 	return false;
1493*2d25a9bcSRuchika Gupta }
1494*2d25a9bcSRuchika Gupta 
1495*2d25a9bcSRuchika Gupta enum pkcs11_rc check_attrs_against_modification(struct pkcs11_session *session,
1496*2d25a9bcSRuchika Gupta 						struct obj_attrs *head,
1497*2d25a9bcSRuchika Gupta 						struct pkcs11_object *obj,
1498*2d25a9bcSRuchika Gupta 						enum processing_func function)
1499*2d25a9bcSRuchika Gupta {
1500*2d25a9bcSRuchika Gupta 	enum pkcs11_class_id class = PKCS11_CKO_UNDEFINED_ID;
1501*2d25a9bcSRuchika Gupta 	char *cur = NULL;
1502*2d25a9bcSRuchika Gupta 	char *end = NULL;
1503*2d25a9bcSRuchika Gupta 	size_t len = 0;
1504*2d25a9bcSRuchika Gupta 
1505*2d25a9bcSRuchika Gupta 	class = get_class(obj->attributes);
1506*2d25a9bcSRuchika Gupta 
1507*2d25a9bcSRuchika Gupta 	cur = (char *)head + sizeof(struct obj_attrs);
1508*2d25a9bcSRuchika Gupta 	end = cur + head->attrs_size;
1509*2d25a9bcSRuchika Gupta 
1510*2d25a9bcSRuchika Gupta 	for (; cur < end; cur += len) {
1511*2d25a9bcSRuchika Gupta 		/* Structure aligned copy of the pkcs11_ref in the object */
1512*2d25a9bcSRuchika Gupta 		struct pkcs11_attribute_head cli_ref = { };
1513*2d25a9bcSRuchika Gupta 
1514*2d25a9bcSRuchika Gupta 		TEE_MemMove(&cli_ref, cur, sizeof(cli_ref));
1515*2d25a9bcSRuchika Gupta 		len = sizeof(cli_ref) + cli_ref.size;
1516*2d25a9bcSRuchika Gupta 
1517*2d25a9bcSRuchika Gupta 		/*
1518*2d25a9bcSRuchika Gupta 		 * Check 1 - Check if attribute belongs to the object
1519*2d25a9bcSRuchika Gupta 		 * The obj->attributes has all the attributes in
1520*2d25a9bcSRuchika Gupta 		 * it which are allowed for an object.
1521*2d25a9bcSRuchika Gupta 		 */
1522*2d25a9bcSRuchika Gupta 		if (get_attribute_ptr(obj->attributes, cli_ref.id, NULL,
1523*2d25a9bcSRuchika Gupta 				      NULL) == PKCS11_RV_NOT_FOUND)
1524*2d25a9bcSRuchika Gupta 			return PKCS11_CKR_ATTRIBUTE_TYPE_INVALID;
1525*2d25a9bcSRuchika Gupta 
1526*2d25a9bcSRuchika Gupta 		/* Check 2 - Is attribute modifiable */
1527*2d25a9bcSRuchika Gupta 		if (!attribute_is_modifiable(session, &cli_ref, obj, class,
1528*2d25a9bcSRuchika Gupta 					     function))
1529*2d25a9bcSRuchika Gupta 			return PKCS11_CKR_ATTRIBUTE_READ_ONLY;
1530*2d25a9bcSRuchika Gupta 
1531*2d25a9bcSRuchika Gupta 		/*
1532*2d25a9bcSRuchika Gupta 		 * Checks for modification in PKCS11_CKA_TOKEN and
1533*2d25a9bcSRuchika Gupta 		 * PKCS11_CKA_PRIVATE are required for PKCS11_FUNCTION_COPY
1534*2d25a9bcSRuchika Gupta 		 * only, so skip them for PKCS11_FUNCTION_MODIFY.
1535*2d25a9bcSRuchika Gupta 		 */
1536*2d25a9bcSRuchika Gupta 		if (function == PKCS11_FUNCTION_MODIFY)
1537*2d25a9bcSRuchika Gupta 			continue;
1538*2d25a9bcSRuchika Gupta 
1539*2d25a9bcSRuchika Gupta 		/*
1540*2d25a9bcSRuchika Gupta 		 * An attempt to copy an object to a token will fail for
1541*2d25a9bcSRuchika Gupta 		 * RO session
1542*2d25a9bcSRuchika Gupta 		 */
1543*2d25a9bcSRuchika Gupta 		if (cli_ref.id == PKCS11_CKA_TOKEN &&
1544*2d25a9bcSRuchika Gupta 		    get_bool(head, PKCS11_CKA_TOKEN)) {
1545*2d25a9bcSRuchika Gupta 			if (!pkcs11_session_is_read_write(session)) {
1546*2d25a9bcSRuchika Gupta 				DMSG("Can't copy to token in a RO session");
1547*2d25a9bcSRuchika Gupta 				return PKCS11_CKR_SESSION_READ_ONLY;
1548*2d25a9bcSRuchika Gupta 			}
1549*2d25a9bcSRuchika Gupta 		}
1550*2d25a9bcSRuchika Gupta 
1551*2d25a9bcSRuchika Gupta 		if (cli_ref.id == PKCS11_CKA_PRIVATE) {
1552*2d25a9bcSRuchika Gupta 			bool parent_priv =
1553*2d25a9bcSRuchika Gupta 				get_bool(obj->attributes, cli_ref.id);
1554*2d25a9bcSRuchika Gupta 			bool obj_priv = get_bool(head, cli_ref.id);
1555*2d25a9bcSRuchika Gupta 
1556*2d25a9bcSRuchika Gupta 			/*
1557*2d25a9bcSRuchika Gupta 			 * If PKCS11_CKA_PRIVATE is being set to TRUE from
1558*2d25a9bcSRuchika Gupta 			 * FALSE, user has to be logged in
1559*2d25a9bcSRuchika Gupta 			 */
1560*2d25a9bcSRuchika Gupta 			if (!parent_priv && obj_priv) {
1561*2d25a9bcSRuchika Gupta 				if ((pkcs11_session_is_public(session) ||
1562*2d25a9bcSRuchika Gupta 				     pkcs11_session_is_so(session)))
1563*2d25a9bcSRuchika Gupta 					return PKCS11_CKR_USER_NOT_LOGGED_IN;
1564*2d25a9bcSRuchika Gupta 			}
1565*2d25a9bcSRuchika Gupta 		}
1566*2d25a9bcSRuchika Gupta 	}
1567*2d25a9bcSRuchika Gupta 
1568*2d25a9bcSRuchika Gupta 	return PKCS11_CKR_OK;
1569*2d25a9bcSRuchika Gupta }
1570