163f89caaSJens Wiklander // SPDX-License-Identifier: BSD-2-Clause 263f89caaSJens Wiklander /* 363f89caaSJens Wiklander * Copyright (c) 2017-2020, Linaro Limited 463f89caaSJens Wiklander */ 563f89caaSJens Wiklander 663f89caaSJens Wiklander #include <assert.h> 763f89caaSJens Wiklander #include <inttypes.h> 863f89caaSJens Wiklander #include <pkcs11_ta.h> 963f89caaSJens Wiklander #include <stdlib.h> 1063f89caaSJens Wiklander #include <string_ext.h> 1163f89caaSJens Wiklander #include <tee_internal_api_extensions.h> 1263f89caaSJens Wiklander #include <tee_internal_api.h> 1363f89caaSJens Wiklander #include <util.h> 1463f89caaSJens Wiklander 1563f89caaSJens Wiklander #include "attributes.h" 1663f89caaSJens Wiklander #include "handle.h" 1763f89caaSJens Wiklander #include "pkcs11_attributes.h" 1863f89caaSJens Wiklander #include "pkcs11_helpers.h" 1963f89caaSJens Wiklander #include "pkcs11_token.h" 2063f89caaSJens Wiklander #include "sanitize_object.h" 2163f89caaSJens Wiklander #include "serializer.h" 2263f89caaSJens Wiklander #include "token_capabilities.h" 2363f89caaSJens Wiklander 2463f89caaSJens Wiklander /* Byte size of CKA_ID attribute when generated locally */ 2563f89caaSJens Wiklander #define PKCS11_CKA_DEFAULT_SIZE 16 2663f89caaSJens Wiklander 27*512cbf1dSJens Wiklander static uint32_t pkcs11_func2ckfm(enum processing_func function) 28*512cbf1dSJens Wiklander { 29*512cbf1dSJens Wiklander switch (function) { 30*512cbf1dSJens Wiklander case PKCS11_FUNCTION_DIGEST: 31*512cbf1dSJens Wiklander return PKCS11_CKFM_DIGEST; 32*512cbf1dSJens Wiklander case PKCS11_FUNCTION_GENERATE: 33*512cbf1dSJens Wiklander return PKCS11_CKFM_GENERATE; 34*512cbf1dSJens Wiklander case PKCS11_FUNCTION_GENERATE_PAIR: 35*512cbf1dSJens Wiklander return PKCS11_CKFM_GENERATE_KEY_PAIR; 36*512cbf1dSJens Wiklander case PKCS11_FUNCTION_DERIVE: 37*512cbf1dSJens Wiklander return PKCS11_CKFM_DERIVE; 38*512cbf1dSJens Wiklander case PKCS11_FUNCTION_WRAP: 39*512cbf1dSJens Wiklander return PKCS11_CKFM_WRAP; 40*512cbf1dSJens Wiklander case PKCS11_FUNCTION_UNWRAP: 41*512cbf1dSJens Wiklander return PKCS11_CKFM_UNWRAP; 42*512cbf1dSJens Wiklander case PKCS11_FUNCTION_ENCRYPT: 43*512cbf1dSJens Wiklander return PKCS11_CKFM_ENCRYPT; 44*512cbf1dSJens Wiklander case PKCS11_FUNCTION_DECRYPT: 45*512cbf1dSJens Wiklander return PKCS11_CKFM_DECRYPT; 46*512cbf1dSJens Wiklander case PKCS11_FUNCTION_SIGN: 47*512cbf1dSJens Wiklander return PKCS11_CKFM_SIGN; 48*512cbf1dSJens Wiklander case PKCS11_FUNCTION_VERIFY: 49*512cbf1dSJens Wiklander return PKCS11_CKFM_VERIFY; 50*512cbf1dSJens Wiklander case PKCS11_FUNCTION_SIGN_RECOVER: 51*512cbf1dSJens Wiklander return PKCS11_CKFM_SIGN_RECOVER; 52*512cbf1dSJens Wiklander case PKCS11_FUNCTION_VERIFY_RECOVER: 53*512cbf1dSJens Wiklander return PKCS11_CKFM_VERIFY_RECOVER; 54*512cbf1dSJens Wiklander default: 55*512cbf1dSJens Wiklander return 0; 56*512cbf1dSJens Wiklander } 57*512cbf1dSJens Wiklander } 58*512cbf1dSJens Wiklander 59*512cbf1dSJens Wiklander enum pkcs11_rc 60*512cbf1dSJens Wiklander check_mechanism_against_processing(struct pkcs11_session *session, 61*512cbf1dSJens Wiklander enum pkcs11_mechanism_id mechanism_type, 62*512cbf1dSJens Wiklander enum processing_func function, 63*512cbf1dSJens Wiklander enum processing_step step) 64*512cbf1dSJens Wiklander { 65*512cbf1dSJens Wiklander bool allowed = false; 66*512cbf1dSJens Wiklander 67*512cbf1dSJens Wiklander switch (step) { 68*512cbf1dSJens Wiklander case PKCS11_FUNC_STEP_INIT: 69*512cbf1dSJens Wiklander switch (function) { 70*512cbf1dSJens Wiklander case PKCS11_FUNCTION_IMPORT: 71*512cbf1dSJens Wiklander case PKCS11_FUNCTION_COPY: 72*512cbf1dSJens Wiklander case PKCS11_FUNCTION_MODIFY: 73*512cbf1dSJens Wiklander case PKCS11_FUNCTION_DESTROY: 74*512cbf1dSJens Wiklander return PKCS11_CKR_OK; 75*512cbf1dSJens Wiklander default: 76*512cbf1dSJens Wiklander break; 77*512cbf1dSJens Wiklander } 78*512cbf1dSJens Wiklander /* 79*512cbf1dSJens Wiklander * Check that the returned PKCS11_CKFM_* flag from 80*512cbf1dSJens Wiklander * pkcs11_func2ckfm() is among the ones from 81*512cbf1dSJens Wiklander * mechanism_supported_flags(). 82*512cbf1dSJens Wiklander */ 83*512cbf1dSJens Wiklander allowed = mechanism_supported_flags(mechanism_type) & 84*512cbf1dSJens Wiklander pkcs11_func2ckfm(function); 85*512cbf1dSJens Wiklander break; 86*512cbf1dSJens Wiklander 87*512cbf1dSJens Wiklander case PKCS11_FUNC_STEP_ONESHOT: 88*512cbf1dSJens Wiklander case PKCS11_FUNC_STEP_UPDATE: 89*512cbf1dSJens Wiklander if (session->processing->always_authen && 90*512cbf1dSJens Wiklander !session->processing->relogged) 91*512cbf1dSJens Wiklander return PKCS11_CKR_USER_NOT_LOGGED_IN; 92*512cbf1dSJens Wiklander 93*512cbf1dSJens Wiklander if (!session->processing->updated) 94*512cbf1dSJens Wiklander allowed = true; 95*512cbf1dSJens Wiklander else 96*512cbf1dSJens Wiklander allowed = !mechanism_is_one_shot_only(mechanism_type); 97*512cbf1dSJens Wiklander break; 98*512cbf1dSJens Wiklander 99*512cbf1dSJens Wiklander case PKCS11_FUNC_STEP_FINAL: 100*512cbf1dSJens Wiklander if (session->processing->always_authen && 101*512cbf1dSJens Wiklander !session->processing->relogged) 102*512cbf1dSJens Wiklander return PKCS11_CKR_USER_NOT_LOGGED_IN; 103*512cbf1dSJens Wiklander 104*512cbf1dSJens Wiklander return PKCS11_CKR_OK; 105*512cbf1dSJens Wiklander 106*512cbf1dSJens Wiklander default: 107*512cbf1dSJens Wiklander TEE_Panic(step); 108*512cbf1dSJens Wiklander break; 109*512cbf1dSJens Wiklander } 110*512cbf1dSJens Wiklander 111*512cbf1dSJens Wiklander if (!allowed) { 112*512cbf1dSJens Wiklander EMSG("Processing %#x/%s not permitted (%u/%u)", 113*512cbf1dSJens Wiklander (unsigned int)mechanism_type, id2str_proc(mechanism_type), 114*512cbf1dSJens Wiklander function, step); 115*512cbf1dSJens Wiklander return PKCS11_CKR_KEY_FUNCTION_NOT_PERMITTED; 116*512cbf1dSJens Wiklander } 117*512cbf1dSJens Wiklander 118*512cbf1dSJens Wiklander return PKCS11_CKR_OK; 119*512cbf1dSJens Wiklander } 120*512cbf1dSJens Wiklander 12163f89caaSJens Wiklander /* 12263f89caaSJens Wiklander * Object default boolean attributes as per PKCS#11 12363f89caaSJens Wiklander */ 12463f89caaSJens Wiklander static uint8_t *pkcs11_object_default_boolprop(uint32_t attribute) 12563f89caaSJens Wiklander { 12663f89caaSJens Wiklander static const uint8_t bool_true = 1; 12763f89caaSJens Wiklander static const uint8_t bool_false; 12863f89caaSJens Wiklander 12963f89caaSJens Wiklander switch (attribute) { 13063f89caaSJens Wiklander /* As per PKCS#11 default value */ 13163f89caaSJens Wiklander case PKCS11_CKA_MODIFIABLE: 13263f89caaSJens Wiklander case PKCS11_CKA_COPYABLE: 13363f89caaSJens Wiklander case PKCS11_CKA_DESTROYABLE: 13463f89caaSJens Wiklander return (uint8_t *)&bool_true; 13563f89caaSJens Wiklander case PKCS11_CKA_TOKEN: 13663f89caaSJens Wiklander case PKCS11_CKA_PRIVATE: 13763f89caaSJens Wiklander /* symkey false, privkey: token specific */ 13863f89caaSJens Wiklander case PKCS11_CKA_SENSITIVE: 13963f89caaSJens Wiklander return (uint8_t *)&bool_false; 14063f89caaSJens Wiklander /* Token specific default value */ 14163f89caaSJens Wiklander case PKCS11_CKA_SIGN: 14263f89caaSJens Wiklander case PKCS11_CKA_VERIFY: 14363f89caaSJens Wiklander return (uint8_t *)&bool_true; 14463f89caaSJens Wiklander case PKCS11_CKA_DERIVE: 14563f89caaSJens Wiklander case PKCS11_CKA_ENCRYPT: 14663f89caaSJens Wiklander case PKCS11_CKA_DECRYPT: 14763f89caaSJens Wiklander case PKCS11_CKA_SIGN_RECOVER: 14863f89caaSJens Wiklander case PKCS11_CKA_VERIFY_RECOVER: 14963f89caaSJens Wiklander case PKCS11_CKA_WRAP: 15063f89caaSJens Wiklander case PKCS11_CKA_UNWRAP: 15163f89caaSJens Wiklander case PKCS11_CKA_EXTRACTABLE: 15263f89caaSJens Wiklander case PKCS11_CKA_WRAP_WITH_TRUSTED: 15363f89caaSJens Wiklander case PKCS11_CKA_ALWAYS_AUTHENTICATE: 15463f89caaSJens Wiklander case PKCS11_CKA_TRUSTED: 15563f89caaSJens Wiklander return (uint8_t *)&bool_false; 15663f89caaSJens Wiklander default: 15763f89caaSJens Wiklander DMSG("No default for boolprop attribute %#"PRIx32, attribute); 15863f89caaSJens Wiklander return NULL; 15963f89caaSJens Wiklander } 16063f89caaSJens Wiklander } 16163f89caaSJens Wiklander 16263f89caaSJens Wiklander /* 16363f89caaSJens Wiklander * Object expects several boolean attributes to be set to a default value 16463f89caaSJens Wiklander * or to a validate client configuration value. This function append the input 16563f89caaSJens Wiklander * attribute (id/size/value) in the serialized object. 16663f89caaSJens Wiklander */ 16763f89caaSJens Wiklander static enum pkcs11_rc pkcs11_import_object_boolprop(struct obj_attrs **out, 16863f89caaSJens Wiklander struct obj_attrs *templ, 16963f89caaSJens Wiklander uint32_t attribute) 17063f89caaSJens Wiklander { 17163f89caaSJens Wiklander enum pkcs11_rc rc = PKCS11_CKR_OK; 17263f89caaSJens Wiklander uint8_t bbool = 0; 17363f89caaSJens Wiklander uint32_t size = sizeof(uint8_t); 17463f89caaSJens Wiklander void *attr = NULL; 17563f89caaSJens Wiklander 17663f89caaSJens Wiklander rc = get_attribute(templ, attribute, &bbool, &size); 17763f89caaSJens Wiklander if (rc) { 17863f89caaSJens Wiklander if (rc != PKCS11_RV_NOT_FOUND) 17963f89caaSJens Wiklander return rc; 18063f89caaSJens Wiklander attr = pkcs11_object_default_boolprop(attribute); 18163f89caaSJens Wiklander if (!attr) 18263f89caaSJens Wiklander return PKCS11_CKR_TEMPLATE_INCOMPLETE; 18363f89caaSJens Wiklander } else { 18463f89caaSJens Wiklander attr = &bbool; 18563f89caaSJens Wiklander } 18663f89caaSJens Wiklander 18763f89caaSJens Wiklander /* Boolean attributes are 1byte in the ABI, no alignment issue */ 18863f89caaSJens Wiklander return add_attribute(out, attribute, attr, sizeof(uint8_t)); 18963f89caaSJens Wiklander } 19063f89caaSJens Wiklander 19163f89caaSJens Wiklander static enum pkcs11_rc set_mandatory_boolprops(struct obj_attrs **out, 19263f89caaSJens Wiklander struct obj_attrs *temp, 19363f89caaSJens Wiklander uint32_t const *bp, 19463f89caaSJens Wiklander size_t bp_count) 19563f89caaSJens Wiklander { 19663f89caaSJens Wiklander enum pkcs11_rc rc = PKCS11_CKR_OK; 19763f89caaSJens Wiklander size_t n = 0; 19863f89caaSJens Wiklander 19963f89caaSJens Wiklander for (n = 0; n < bp_count; n++) { 20063f89caaSJens Wiklander rc = pkcs11_import_object_boolprop(out, temp, bp[n]); 20163f89caaSJens Wiklander if (rc) 20263f89caaSJens Wiklander return rc; 20363f89caaSJens Wiklander } 20463f89caaSJens Wiklander 20563f89caaSJens Wiklander return rc; 20663f89caaSJens Wiklander } 20763f89caaSJens Wiklander 20863f89caaSJens Wiklander static enum pkcs11_rc set_mandatory_attributes(struct obj_attrs **out, 20963f89caaSJens Wiklander struct obj_attrs *temp, 21063f89caaSJens Wiklander uint32_t const *bp, 21163f89caaSJens Wiklander size_t bp_count) 21263f89caaSJens Wiklander { 21363f89caaSJens Wiklander enum pkcs11_rc rc = PKCS11_CKR_OK; 21463f89caaSJens Wiklander size_t n = 0; 21563f89caaSJens Wiklander 21663f89caaSJens Wiklander for (n = 0; n < bp_count; n++) { 21763f89caaSJens Wiklander uint32_t size = 0; 21863f89caaSJens Wiklander void *value = NULL; 21963f89caaSJens Wiklander 22063f89caaSJens Wiklander if (get_attribute_ptr(temp, bp[n], &value, &size)) 22163f89caaSJens Wiklander return PKCS11_CKR_TEMPLATE_INCOMPLETE; 22263f89caaSJens Wiklander 22363f89caaSJens Wiklander rc = add_attribute(out, bp[n], value, size); 22463f89caaSJens Wiklander if (rc) 22563f89caaSJens Wiklander return rc; 22663f89caaSJens Wiklander } 22763f89caaSJens Wiklander 22863f89caaSJens Wiklander return rc; 22963f89caaSJens Wiklander } 23063f89caaSJens Wiklander 23163f89caaSJens Wiklander static enum pkcs11_rc get_default_value(enum pkcs11_attr_id id, void **value, 23263f89caaSJens Wiklander uint32_t *size) 23363f89caaSJens Wiklander { 23463f89caaSJens Wiklander /* should have been taken care of already */ 23563f89caaSJens Wiklander assert(!pkcs11_attr_is_boolean(id)); 23663f89caaSJens Wiklander 23763f89caaSJens Wiklander if (id == PKCS11_CKA_PUBLIC_KEY_INFO) { 23863f89caaSJens Wiklander EMSG("Cannot provide default PUBLIC_KEY_INFO"); 23963f89caaSJens Wiklander return PKCS11_CKR_TEMPLATE_INCONSISTENT; 24063f89caaSJens Wiklander } 24163f89caaSJens Wiklander 24263f89caaSJens Wiklander /* All other attributes have an empty default value */ 24363f89caaSJens Wiklander *value = NULL; 24463f89caaSJens Wiklander *size = 0; 24563f89caaSJens Wiklander return PKCS11_CKR_OK; 24663f89caaSJens Wiklander } 24763f89caaSJens Wiklander 24863f89caaSJens Wiklander static enum pkcs11_rc set_optional_attributes(struct obj_attrs **out, 24963f89caaSJens Wiklander struct obj_attrs *temp, 25063f89caaSJens Wiklander uint32_t const *bp, 25163f89caaSJens Wiklander size_t bp_count) 25263f89caaSJens Wiklander { 25363f89caaSJens Wiklander enum pkcs11_rc rc = PKCS11_CKR_OK; 25463f89caaSJens Wiklander size_t n = 0; 25563f89caaSJens Wiklander 25663f89caaSJens Wiklander for (n = 0; n < bp_count; n++) { 25763f89caaSJens Wiklander uint32_t size = 0; 25863f89caaSJens Wiklander void *value = NULL; 25963f89caaSJens Wiklander 26063f89caaSJens Wiklander rc = get_attribute_ptr(temp, bp[n], &value, &size); 26163f89caaSJens Wiklander if (rc == PKCS11_RV_NOT_FOUND) 26263f89caaSJens Wiklander rc = get_default_value(bp[n], &value, &size); 26363f89caaSJens Wiklander if (rc) 26463f89caaSJens Wiklander return rc; 26563f89caaSJens Wiklander 26663f89caaSJens Wiklander rc = add_attribute(out, bp[n], value, size); 26763f89caaSJens Wiklander if (rc) 26863f89caaSJens Wiklander return rc; 26963f89caaSJens Wiklander } 27063f89caaSJens Wiklander 27163f89caaSJens Wiklander return rc; 27263f89caaSJens Wiklander } 27363f89caaSJens Wiklander 27463f89caaSJens Wiklander /* 27563f89caaSJens Wiklander * Below are listed the mandated or optional expected attributes for 27663f89caaSJens Wiklander * PKCS#11 storage objects. 27763f89caaSJens Wiklander * 27863f89caaSJens Wiklander * Note: boolprops (mandated boolean attributes) PKCS11_CKA_ALWAYS_SENSITIVE, 27963f89caaSJens Wiklander * and PKCS11_CKA_NEVER_EXTRACTABLE are set by the token, not provided 28063f89caaSJens Wiklander * in the client template. 28163f89caaSJens Wiklander */ 28263f89caaSJens Wiklander 28363f89caaSJens Wiklander /* PKCS#11 specification for any object (session/token) of the storage */ 28463f89caaSJens Wiklander static const uint32_t pkcs11_any_object_boolprops[] = { 28563f89caaSJens Wiklander PKCS11_CKA_TOKEN, PKCS11_CKA_PRIVATE, 28663f89caaSJens Wiklander PKCS11_CKA_MODIFIABLE, PKCS11_CKA_COPYABLE, PKCS11_CKA_DESTROYABLE, 28763f89caaSJens Wiklander }; 28863f89caaSJens Wiklander 28963f89caaSJens Wiklander static const uint32_t pkcs11_any_object_optional[] = { 29063f89caaSJens Wiklander PKCS11_CKA_LABEL, 29163f89caaSJens Wiklander }; 29263f89caaSJens Wiklander 29363f89caaSJens Wiklander /* PKCS#11 specification for raw data object (+pkcs11_any_object_xxx) */ 29463f89caaSJens Wiklander const uint32_t pkcs11_raw_data_optional[] = { 29563f89caaSJens Wiklander PKCS11_CKA_OBJECT_ID, PKCS11_CKA_APPLICATION, PKCS11_CKA_VALUE, 29663f89caaSJens Wiklander }; 29763f89caaSJens Wiklander 29863f89caaSJens Wiklander /* PKCS#11 specification for any key object (+pkcs11_any_object_xxx) */ 29963f89caaSJens Wiklander static const uint32_t pkcs11_any_key_boolprops[] = { 30063f89caaSJens Wiklander PKCS11_CKA_DERIVE, 30163f89caaSJens Wiklander }; 30263f89caaSJens Wiklander 30363f89caaSJens Wiklander static const uint32_t pkcs11_any_key_optional[] = { 30463f89caaSJens Wiklander PKCS11_CKA_ID, 30563f89caaSJens Wiklander PKCS11_CKA_START_DATE, PKCS11_CKA_END_DATE, 30663f89caaSJens Wiklander PKCS11_CKA_ALLOWED_MECHANISMS, 30763f89caaSJens Wiklander }; 30863f89caaSJens Wiklander 30963f89caaSJens Wiklander /* PKCS#11 specification for any symmetric key (+pkcs11_any_key_xxx) */ 31063f89caaSJens Wiklander static const uint32_t pkcs11_symm_key_boolprops[] = { 31163f89caaSJens Wiklander PKCS11_CKA_ENCRYPT, PKCS11_CKA_DECRYPT, 31263f89caaSJens Wiklander PKCS11_CKA_SIGN, PKCS11_CKA_VERIFY, 31363f89caaSJens Wiklander PKCS11_CKA_WRAP, PKCS11_CKA_UNWRAP, 31463f89caaSJens Wiklander PKCS11_CKA_SENSITIVE, PKCS11_CKA_EXTRACTABLE, 31563f89caaSJens Wiklander PKCS11_CKA_WRAP_WITH_TRUSTED, PKCS11_CKA_TRUSTED, 31663f89caaSJens Wiklander }; 31763f89caaSJens Wiklander 31863f89caaSJens Wiklander static const uint32_t pkcs11_symm_key_optional[] = { 31963f89caaSJens Wiklander PKCS11_CKA_WRAP_TEMPLATE, PKCS11_CKA_UNWRAP_TEMPLATE, 32063f89caaSJens Wiklander PKCS11_CKA_DERIVE_TEMPLATE, 32163f89caaSJens Wiklander PKCS11_CKA_VALUE, PKCS11_CKA_VALUE_LEN, 32263f89caaSJens Wiklander }; 32363f89caaSJens Wiklander 32463f89caaSJens Wiklander /* PKCS#11 specification for any asymmetric public key (+pkcs11_any_key_xxx) */ 32563f89caaSJens Wiklander static const uint32_t pkcs11_public_key_boolprops[] = { 32663f89caaSJens Wiklander PKCS11_CKA_ENCRYPT, PKCS11_CKA_VERIFY, PKCS11_CKA_VERIFY_RECOVER, 32763f89caaSJens Wiklander PKCS11_CKA_WRAP, 32863f89caaSJens Wiklander PKCS11_CKA_TRUSTED, 32963f89caaSJens Wiklander }; 33063f89caaSJens Wiklander 33163f89caaSJens Wiklander static const uint32_t pkcs11_public_key_mandated[] = { 33263f89caaSJens Wiklander PKCS11_CKA_SUBJECT 33363f89caaSJens Wiklander }; 33463f89caaSJens Wiklander 33563f89caaSJens Wiklander static const uint32_t pkcs11_public_key_optional[] = { 33663f89caaSJens Wiklander PKCS11_CKA_WRAP_TEMPLATE, PKCS11_CKA_PUBLIC_KEY_INFO, 33763f89caaSJens Wiklander }; 33863f89caaSJens Wiklander 33963f89caaSJens Wiklander /* PKCS#11 specification for any asymmetric private key (+pkcs11_any_key_xxx) */ 34063f89caaSJens Wiklander static const uint32_t pkcs11_private_key_boolprops[] = { 34163f89caaSJens Wiklander PKCS11_CKA_DECRYPT, PKCS11_CKA_SIGN, PKCS11_CKA_SIGN_RECOVER, 34263f89caaSJens Wiklander PKCS11_CKA_UNWRAP, 34363f89caaSJens Wiklander PKCS11_CKA_SENSITIVE, PKCS11_CKA_EXTRACTABLE, 34463f89caaSJens Wiklander PKCS11_CKA_WRAP_WITH_TRUSTED, PKCS11_CKA_ALWAYS_AUTHENTICATE, 34563f89caaSJens Wiklander }; 34663f89caaSJens Wiklander 34763f89caaSJens Wiklander static const uint32_t pkcs11_private_key_mandated[] = { 34863f89caaSJens Wiklander PKCS11_CKA_SUBJECT 34963f89caaSJens Wiklander }; 35063f89caaSJens Wiklander 35163f89caaSJens Wiklander static const uint32_t pkcs11_private_key_optional[] = { 35263f89caaSJens Wiklander PKCS11_CKA_UNWRAP_TEMPLATE, PKCS11_CKA_PUBLIC_KEY_INFO, 35363f89caaSJens Wiklander }; 35463f89caaSJens Wiklander 35563f89caaSJens Wiklander /* PKCS#11 specification for any RSA key (+pkcs11_public/private_key_xxx) */ 35663f89caaSJens Wiklander static const uint32_t pkcs11_rsa_public_key_mandated[] = { 35763f89caaSJens Wiklander PKCS11_CKA_MODULUS_BITS, 35863f89caaSJens Wiklander }; 35963f89caaSJens Wiklander 36063f89caaSJens Wiklander static const uint32_t pkcs11_rsa_public_key_optional[] = { 36163f89caaSJens Wiklander PKCS11_CKA_MODULUS, PKCS11_CKA_PUBLIC_EXPONENT, 36263f89caaSJens Wiklander }; 36363f89caaSJens Wiklander 36463f89caaSJens Wiklander static const uint32_t pkcs11_rsa_private_key_optional[] = { 36563f89caaSJens Wiklander PKCS11_CKA_MODULUS, PKCS11_CKA_PUBLIC_EXPONENT, 36663f89caaSJens Wiklander PKCS11_CKA_PRIVATE_EXPONENT, 36763f89caaSJens Wiklander PKCS11_CKA_PRIME_1, PKCS11_CKA_PRIME_2, 36863f89caaSJens Wiklander PKCS11_CKA_EXPONENT_1, PKCS11_CKA_EXPONENT_2, PKCS11_CKA_COEFFICIENT, 36963f89caaSJens Wiklander }; 37063f89caaSJens Wiklander 37163f89caaSJens Wiklander /* PKCS#11 specification for any EC key (+pkcs11_public/private_key_xxx) */ 37263f89caaSJens Wiklander static const uint32_t pkcs11_ec_public_key_mandated[] = { 37363f89caaSJens Wiklander PKCS11_CKA_EC_PARAMS, 37463f89caaSJens Wiklander }; 37563f89caaSJens Wiklander 37663f89caaSJens Wiklander static const uint32_t pkcs11_ec_public_key_optional[] = { 37763f89caaSJens Wiklander PKCS11_CKA_EC_POINT, 37863f89caaSJens Wiklander }; 37963f89caaSJens Wiklander 38063f89caaSJens Wiklander static const uint32_t pkcs11_ec_private_key_mandated[] = { 38163f89caaSJens Wiklander PKCS11_CKA_EC_PARAMS, 38263f89caaSJens Wiklander }; 38363f89caaSJens Wiklander 38463f89caaSJens Wiklander static const uint32_t pkcs11_ec_private_key_optional[] = { 38563f89caaSJens Wiklander PKCS11_CKA_VALUE, 38663f89caaSJens Wiklander }; 38763f89caaSJens Wiklander 38863f89caaSJens Wiklander static enum pkcs11_rc create_storage_attributes(struct obj_attrs **out, 38963f89caaSJens Wiklander struct obj_attrs *temp) 39063f89caaSJens Wiklander { 39163f89caaSJens Wiklander enum pkcs11_class_id class = PKCS11_CKO_UNDEFINED_ID; 39263f89caaSJens Wiklander enum pkcs11_rc rc = PKCS11_CKR_OK; 39363f89caaSJens Wiklander 39463f89caaSJens Wiklander rc = init_attributes_head(out); 39563f89caaSJens Wiklander if (rc) 39663f89caaSJens Wiklander return rc; 39763f89caaSJens Wiklander 39863f89caaSJens Wiklander /* Object class is mandatory */ 39963f89caaSJens Wiklander class = get_class(temp); 40063f89caaSJens Wiklander if (class == PKCS11_CKO_UNDEFINED_ID) { 40163f89caaSJens Wiklander EMSG("Class attribute not found"); 40263f89caaSJens Wiklander 40363f89caaSJens Wiklander return PKCS11_CKR_TEMPLATE_INCONSISTENT; 40463f89caaSJens Wiklander } 40563f89caaSJens Wiklander rc = add_attribute(out, PKCS11_CKA_CLASS, &class, sizeof(uint32_t)); 40663f89caaSJens Wiklander if (rc) 40763f89caaSJens Wiklander return rc; 40863f89caaSJens Wiklander 40963f89caaSJens Wiklander rc = set_mandatory_boolprops(out, temp, pkcs11_any_object_boolprops, 41063f89caaSJens Wiklander ARRAY_SIZE(pkcs11_any_object_boolprops)); 41163f89caaSJens Wiklander if (rc) 41263f89caaSJens Wiklander return rc; 41363f89caaSJens Wiklander 41463f89caaSJens Wiklander return set_optional_attributes(out, temp, pkcs11_any_object_optional, 41563f89caaSJens Wiklander ARRAY_SIZE(pkcs11_any_object_optional)); 41663f89caaSJens Wiklander } 41763f89caaSJens Wiklander 41863f89caaSJens Wiklander static enum pkcs11_rc create_genkey_attributes(struct obj_attrs **out, 41963f89caaSJens Wiklander struct obj_attrs *temp) 42063f89caaSJens Wiklander { 42163f89caaSJens Wiklander uint32_t type = PKCS11_CKO_UNDEFINED_ID; 42263f89caaSJens Wiklander enum pkcs11_rc rc = PKCS11_CKR_OK; 42363f89caaSJens Wiklander 42463f89caaSJens Wiklander rc = create_storage_attributes(out, temp); 42563f89caaSJens Wiklander if (rc) 42663f89caaSJens Wiklander return rc; 42763f89caaSJens Wiklander 42863f89caaSJens Wiklander type = get_key_type(temp); 42963f89caaSJens Wiklander if (type == PKCS11_CKK_UNDEFINED_ID) { 43063f89caaSJens Wiklander EMSG("Key type attribute not found"); 43163f89caaSJens Wiklander 43263f89caaSJens Wiklander return PKCS11_CKR_TEMPLATE_INCONSISTENT; 43363f89caaSJens Wiklander } 43463f89caaSJens Wiklander rc = add_attribute(out, PKCS11_CKA_KEY_TYPE, &type, sizeof(uint32_t)); 43563f89caaSJens Wiklander if (rc) 43663f89caaSJens Wiklander return rc; 43763f89caaSJens Wiklander 43863f89caaSJens Wiklander rc = set_mandatory_boolprops(out, temp, pkcs11_any_key_boolprops, 43963f89caaSJens Wiklander ARRAY_SIZE(pkcs11_any_key_boolprops)); 44063f89caaSJens Wiklander if (rc) 44163f89caaSJens Wiklander return rc; 44263f89caaSJens Wiklander 44363f89caaSJens Wiklander return set_optional_attributes(out, temp, pkcs11_any_key_optional, 44463f89caaSJens Wiklander ARRAY_SIZE(pkcs11_any_key_optional)); 44563f89caaSJens Wiklander } 44663f89caaSJens Wiklander 44763f89caaSJens Wiklander static enum pkcs11_rc create_symm_key_attributes(struct obj_attrs **out, 44863f89caaSJens Wiklander struct obj_attrs *temp) 44963f89caaSJens Wiklander { 45063f89caaSJens Wiklander enum pkcs11_rc rc = PKCS11_CKR_OK; 45163f89caaSJens Wiklander 45263f89caaSJens Wiklander assert(get_class(temp) == PKCS11_CKO_SECRET_KEY); 45363f89caaSJens Wiklander 45463f89caaSJens Wiklander rc = create_genkey_attributes(out, temp); 45563f89caaSJens Wiklander if (rc) 45663f89caaSJens Wiklander return rc; 45763f89caaSJens Wiklander 45863f89caaSJens Wiklander assert(get_class(*out) == PKCS11_CKO_SECRET_KEY); 45963f89caaSJens Wiklander 46063f89caaSJens Wiklander switch (get_key_type(*out)) { 46163f89caaSJens Wiklander case PKCS11_CKK_GENERIC_SECRET: 46263f89caaSJens Wiklander case PKCS11_CKK_AES: 46363f89caaSJens Wiklander case PKCS11_CKK_MD5_HMAC: 46463f89caaSJens Wiklander case PKCS11_CKK_SHA_1_HMAC: 46563f89caaSJens Wiklander case PKCS11_CKK_SHA256_HMAC: 46663f89caaSJens Wiklander case PKCS11_CKK_SHA384_HMAC: 46763f89caaSJens Wiklander case PKCS11_CKK_SHA512_HMAC: 46863f89caaSJens Wiklander case PKCS11_CKK_SHA224_HMAC: 46963f89caaSJens Wiklander break; 47063f89caaSJens Wiklander default: 47163f89caaSJens Wiklander EMSG("Invalid key type %#"PRIx32"/%s", 47263f89caaSJens Wiklander get_key_type(*out), id2str_key_type(get_key_type(*out))); 47363f89caaSJens Wiklander 47463f89caaSJens Wiklander return PKCS11_CKR_TEMPLATE_INCONSISTENT; 47563f89caaSJens Wiklander } 47663f89caaSJens Wiklander 47763f89caaSJens Wiklander rc = set_mandatory_boolprops(out, temp, pkcs11_symm_key_boolprops, 47863f89caaSJens Wiklander ARRAY_SIZE(pkcs11_symm_key_boolprops)); 47963f89caaSJens Wiklander if (rc) 48063f89caaSJens Wiklander return rc; 48163f89caaSJens Wiklander 48263f89caaSJens Wiklander return set_optional_attributes(out, temp, pkcs11_symm_key_optional, 48363f89caaSJens Wiklander ARRAY_SIZE(pkcs11_symm_key_optional)); 48463f89caaSJens Wiklander } 48563f89caaSJens Wiklander 48663f89caaSJens Wiklander static enum pkcs11_rc create_data_attributes(struct obj_attrs **out, 48763f89caaSJens Wiklander struct obj_attrs *temp) 48863f89caaSJens Wiklander { 48963f89caaSJens Wiklander enum pkcs11_rc rc = PKCS11_CKR_OK; 49063f89caaSJens Wiklander 49163f89caaSJens Wiklander assert(get_class(temp) == PKCS11_CKO_DATA); 49263f89caaSJens Wiklander 49363f89caaSJens Wiklander rc = create_storage_attributes(out, temp); 49463f89caaSJens Wiklander if (rc) 49563f89caaSJens Wiklander return rc; 49663f89caaSJens Wiklander 49763f89caaSJens Wiklander assert(get_class(*out) == PKCS11_CKO_DATA); 49863f89caaSJens Wiklander 49963f89caaSJens Wiklander return set_optional_attributes(out, temp, pkcs11_raw_data_optional, 50063f89caaSJens Wiklander ARRAY_SIZE(pkcs11_raw_data_optional)); 50163f89caaSJens Wiklander } 50263f89caaSJens Wiklander 50363f89caaSJens Wiklander static enum pkcs11_rc create_pub_key_attributes(struct obj_attrs **out, 50463f89caaSJens Wiklander struct obj_attrs *temp) 50563f89caaSJens Wiklander { 50663f89caaSJens Wiklander uint32_t const *mandated = NULL; 50763f89caaSJens Wiklander uint32_t const *optional = NULL; 50863f89caaSJens Wiklander size_t mandated_count = 0; 50963f89caaSJens Wiklander size_t optional_count = 0; 51063f89caaSJens Wiklander enum pkcs11_rc rc = PKCS11_CKR_OK; 51163f89caaSJens Wiklander 51263f89caaSJens Wiklander assert(get_class(temp) == PKCS11_CKO_PUBLIC_KEY); 51363f89caaSJens Wiklander 51463f89caaSJens Wiklander rc = create_genkey_attributes(out, temp); 51563f89caaSJens Wiklander if (rc) 51663f89caaSJens Wiklander return rc; 51763f89caaSJens Wiklander 51863f89caaSJens Wiklander assert(get_class(*out) == PKCS11_CKO_PUBLIC_KEY); 51963f89caaSJens Wiklander 52063f89caaSJens Wiklander rc = set_mandatory_boolprops(out, temp, pkcs11_public_key_boolprops, 52163f89caaSJens Wiklander ARRAY_SIZE(pkcs11_public_key_boolprops)); 52263f89caaSJens Wiklander if (rc) 52363f89caaSJens Wiklander return rc; 52463f89caaSJens Wiklander 52563f89caaSJens Wiklander rc = set_mandatory_attributes(out, temp, pkcs11_public_key_mandated, 52663f89caaSJens Wiklander ARRAY_SIZE(pkcs11_public_key_mandated)); 52763f89caaSJens Wiklander if (rc) 52863f89caaSJens Wiklander return rc; 52963f89caaSJens Wiklander 53063f89caaSJens Wiklander rc = set_optional_attributes(out, temp, pkcs11_public_key_optional, 53163f89caaSJens Wiklander ARRAY_SIZE(pkcs11_public_key_optional)); 53263f89caaSJens Wiklander if (rc) 53363f89caaSJens Wiklander return rc; 53463f89caaSJens Wiklander 53563f89caaSJens Wiklander switch (get_key_type(*out)) { 53663f89caaSJens Wiklander case PKCS11_CKK_RSA: 53763f89caaSJens Wiklander mandated = pkcs11_rsa_public_key_mandated; 53863f89caaSJens Wiklander optional = pkcs11_rsa_public_key_optional; 53963f89caaSJens Wiklander mandated_count = ARRAY_SIZE(pkcs11_rsa_public_key_mandated); 54063f89caaSJens Wiklander optional_count = ARRAY_SIZE(pkcs11_rsa_public_key_optional); 54163f89caaSJens Wiklander break; 54263f89caaSJens Wiklander case PKCS11_CKK_EC: 54363f89caaSJens Wiklander mandated = pkcs11_ec_public_key_mandated; 54463f89caaSJens Wiklander optional = pkcs11_ec_public_key_optional; 54563f89caaSJens Wiklander mandated_count = ARRAY_SIZE(pkcs11_ec_public_key_mandated); 54663f89caaSJens Wiklander optional_count = ARRAY_SIZE(pkcs11_ec_public_key_optional); 54763f89caaSJens Wiklander break; 54863f89caaSJens Wiklander default: 54963f89caaSJens Wiklander EMSG("Invalid key type %#"PRIx32"/%s", 55063f89caaSJens Wiklander get_key_type(*out), id2str_key_type(get_key_type(*out))); 55163f89caaSJens Wiklander 55263f89caaSJens Wiklander return PKCS11_CKR_TEMPLATE_INCONSISTENT; 55363f89caaSJens Wiklander } 55463f89caaSJens Wiklander 55563f89caaSJens Wiklander rc = set_mandatory_attributes(out, temp, mandated, mandated_count); 55663f89caaSJens Wiklander if (rc) 55763f89caaSJens Wiklander return rc; 55863f89caaSJens Wiklander 55963f89caaSJens Wiklander return set_optional_attributes(out, temp, optional, optional_count); 56063f89caaSJens Wiklander } 56163f89caaSJens Wiklander 56263f89caaSJens Wiklander static enum pkcs11_rc create_priv_key_attributes(struct obj_attrs **out, 56363f89caaSJens Wiklander struct obj_attrs *temp) 56463f89caaSJens Wiklander { 56563f89caaSJens Wiklander uint32_t const *mandated = NULL; 56663f89caaSJens Wiklander uint32_t const *optional = NULL; 56763f89caaSJens Wiklander size_t mandated_count = 0; 56863f89caaSJens Wiklander size_t optional_count = 0; 56963f89caaSJens Wiklander enum pkcs11_rc rc = PKCS11_CKR_OK; 57063f89caaSJens Wiklander 57163f89caaSJens Wiklander assert(get_class(temp) == PKCS11_CKO_PRIVATE_KEY); 57263f89caaSJens Wiklander 57363f89caaSJens Wiklander rc = create_genkey_attributes(out, temp); 57463f89caaSJens Wiklander if (rc) 57563f89caaSJens Wiklander return rc; 57663f89caaSJens Wiklander 57763f89caaSJens Wiklander assert(get_class(*out) == PKCS11_CKO_PRIVATE_KEY); 57863f89caaSJens Wiklander 57963f89caaSJens Wiklander rc = set_mandatory_boolprops(out, temp, pkcs11_private_key_boolprops, 58063f89caaSJens Wiklander ARRAY_SIZE(pkcs11_private_key_boolprops)); 58163f89caaSJens Wiklander if (rc) 58263f89caaSJens Wiklander return rc; 58363f89caaSJens Wiklander 58463f89caaSJens Wiklander rc = set_mandatory_attributes(out, temp, pkcs11_private_key_mandated, 58563f89caaSJens Wiklander ARRAY_SIZE(pkcs11_private_key_mandated)); 58663f89caaSJens Wiklander if (rc) 58763f89caaSJens Wiklander return rc; 58863f89caaSJens Wiklander 58963f89caaSJens Wiklander rc = set_optional_attributes(out, temp, pkcs11_private_key_optional, 59063f89caaSJens Wiklander ARRAY_SIZE(pkcs11_private_key_optional)); 59163f89caaSJens Wiklander if (rc) 59263f89caaSJens Wiklander return rc; 59363f89caaSJens Wiklander 59463f89caaSJens Wiklander switch (get_key_type(*out)) { 59563f89caaSJens Wiklander case PKCS11_CKK_RSA: 59663f89caaSJens Wiklander optional = pkcs11_rsa_private_key_optional; 59763f89caaSJens Wiklander optional_count = ARRAY_SIZE(pkcs11_rsa_private_key_optional); 59863f89caaSJens Wiklander break; 59963f89caaSJens Wiklander case PKCS11_CKK_EC: 60063f89caaSJens Wiklander mandated = pkcs11_ec_private_key_mandated; 60163f89caaSJens Wiklander optional = pkcs11_ec_private_key_optional; 60263f89caaSJens Wiklander mandated_count = ARRAY_SIZE(pkcs11_ec_private_key_mandated); 60363f89caaSJens Wiklander optional_count = ARRAY_SIZE(pkcs11_ec_private_key_optional); 60463f89caaSJens Wiklander break; 60563f89caaSJens Wiklander default: 60663f89caaSJens Wiklander EMSG("Invalid key type %#"PRIx32"/%s", 60763f89caaSJens Wiklander get_key_type(*out), id2str_key_type(get_key_type(*out))); 60863f89caaSJens Wiklander 60963f89caaSJens Wiklander return PKCS11_CKR_TEMPLATE_INCONSISTENT; 61063f89caaSJens Wiklander } 61163f89caaSJens Wiklander 61263f89caaSJens Wiklander rc = set_mandatory_attributes(out, temp, mandated, mandated_count); 61363f89caaSJens Wiklander if (rc) 61463f89caaSJens Wiklander return rc; 61563f89caaSJens Wiklander 61663f89caaSJens Wiklander return set_optional_attributes(out, temp, optional, optional_count); 61763f89caaSJens Wiklander } 61863f89caaSJens Wiklander 61963f89caaSJens Wiklander /* 62063f89caaSJens Wiklander * Create an attribute list for a new object from a template and a parent 62163f89caaSJens Wiklander * object (optional) for an object generation function (generate, copy, 62263f89caaSJens Wiklander * derive...). 62363f89caaSJens Wiklander * 62463f89caaSJens Wiklander * PKCS#11 directives on the supplied template and expected return value: 62563f89caaSJens Wiklander * - template has an invalid attribute ID: ATTRIBUTE_TYPE_INVALID 62663f89caaSJens Wiklander * - template has an invalid value for an attribute: ATTRIBUTE_VALID_INVALID 62763f89caaSJens Wiklander * - template has value for a read-only attribute: ATTRIBUTE_READ_ONLY 62863f89caaSJens Wiklander * - template+default+parent => still miss an attribute: TEMPLATE_INCONSISTENT 62963f89caaSJens Wiklander * 63063f89caaSJens Wiklander * INFO on PKCS11_CMD_COPY_OBJECT: 63163f89caaSJens Wiklander * - parent PKCS11_CKA_COPYIABLE=false => return ACTION_PROHIBITED. 63263f89caaSJens Wiklander * - template can specify PKCS11_CKA_TOKEN, PKCS11_CKA_PRIVATE, 63363f89caaSJens Wiklander * PKCS11_CKA_MODIFIABLE, PKCS11_CKA_DESTROYABLE. 63463f89caaSJens Wiklander * - SENSITIVE can change from false to true, not from true to false. 63563f89caaSJens Wiklander * - LOCAL is the parent LOCAL 63663f89caaSJens Wiklander */ 63763f89caaSJens Wiklander enum pkcs11_rc 63863f89caaSJens Wiklander create_attributes_from_template(struct obj_attrs **out, void *template, 63963f89caaSJens Wiklander size_t template_size, 64063f89caaSJens Wiklander struct obj_attrs *parent __unused, 64163f89caaSJens Wiklander enum processing_func function, 64263f89caaSJens Wiklander enum pkcs11_mechanism_id mecha __unused) 64363f89caaSJens Wiklander { 64463f89caaSJens Wiklander struct obj_attrs *temp = NULL; 64563f89caaSJens Wiklander struct obj_attrs *attrs = NULL; 64663f89caaSJens Wiklander enum pkcs11_rc rc = PKCS11_CKR_OK; 64763f89caaSJens Wiklander uint8_t local = 0; 64863f89caaSJens Wiklander uint8_t always_sensitive = 0; 64963f89caaSJens Wiklander uint8_t never_extract = 0; 65063f89caaSJens Wiklander uint32_t mechanism_id = PKCS11_CKM_UNDEFINED_ID; 65163f89caaSJens Wiklander 65263f89caaSJens Wiklander #ifdef DEBUG /* Sanity: check function argument */ 65363f89caaSJens Wiklander trace_attributes_from_api_head("template", template, template_size); 65463f89caaSJens Wiklander switch (function) { 65563f89caaSJens Wiklander case PKCS11_FUNCTION_IMPORT: 65663f89caaSJens Wiklander break; 65763f89caaSJens Wiklander default: 65863f89caaSJens Wiklander TEE_Panic(TEE_ERROR_NOT_SUPPORTED); 65963f89caaSJens Wiklander } 66063f89caaSJens Wiklander #endif 66163f89caaSJens Wiklander 66263f89caaSJens Wiklander rc = sanitize_client_object(&temp, template, template_size); 66363f89caaSJens Wiklander if (rc) 66463f89caaSJens Wiklander goto out; 66563f89caaSJens Wiklander 66663f89caaSJens Wiklander /* If class/type not defined, match from mechanism */ 66763f89caaSJens Wiklander if (get_class(temp) == PKCS11_UNDEFINED_ID && 66863f89caaSJens Wiklander get_key_type(temp) == PKCS11_UNDEFINED_ID) { 66963f89caaSJens Wiklander EMSG("Unable to define class/type from mechanism"); 67063f89caaSJens Wiklander rc = PKCS11_CKR_TEMPLATE_INCOMPLETE; 67163f89caaSJens Wiklander goto out; 67263f89caaSJens Wiklander } 67363f89caaSJens Wiklander 67463f89caaSJens Wiklander if (!sanitize_consistent_class_and_type(temp)) { 67563f89caaSJens Wiklander EMSG("Inconsistent class/type"); 67663f89caaSJens Wiklander rc = PKCS11_CKR_TEMPLATE_INCONSISTENT; 67763f89caaSJens Wiklander goto out; 67863f89caaSJens Wiklander } 67963f89caaSJens Wiklander 68063f89caaSJens Wiklander switch (get_class(temp)) { 68163f89caaSJens Wiklander case PKCS11_CKO_DATA: 68263f89caaSJens Wiklander rc = create_data_attributes(&attrs, temp); 68363f89caaSJens Wiklander break; 68463f89caaSJens Wiklander case PKCS11_CKO_SECRET_KEY: 68563f89caaSJens Wiklander rc = create_symm_key_attributes(&attrs, temp); 68663f89caaSJens Wiklander break; 68763f89caaSJens Wiklander case PKCS11_CKO_PUBLIC_KEY: 68863f89caaSJens Wiklander rc = create_pub_key_attributes(&attrs, temp); 68963f89caaSJens Wiklander break; 69063f89caaSJens Wiklander case PKCS11_CKO_PRIVATE_KEY: 69163f89caaSJens Wiklander rc = create_priv_key_attributes(&attrs, temp); 69263f89caaSJens Wiklander break; 69363f89caaSJens Wiklander default: 69463f89caaSJens Wiklander DMSG("Invalid object class %#"PRIx32"/%s", 69563f89caaSJens Wiklander get_class(temp), id2str_class(get_class(temp))); 69663f89caaSJens Wiklander 69763f89caaSJens Wiklander rc = PKCS11_CKR_TEMPLATE_INCONSISTENT; 69863f89caaSJens Wiklander break; 69963f89caaSJens Wiklander } 70063f89caaSJens Wiklander if (rc) 70163f89caaSJens Wiklander goto out; 70263f89caaSJens Wiklander 70363f89caaSJens Wiklander if (get_attribute(attrs, PKCS11_CKA_LOCAL, NULL, NULL) != 70463f89caaSJens Wiklander PKCS11_RV_NOT_FOUND) 70563f89caaSJens Wiklander goto out; 70663f89caaSJens Wiklander 70763f89caaSJens Wiklander if (get_attribute(attrs, PKCS11_CKA_KEY_GEN_MECHANISM, NULL, NULL) != 70863f89caaSJens Wiklander PKCS11_RV_NOT_FOUND) 70963f89caaSJens Wiklander goto out; 71063f89caaSJens Wiklander 71163f89caaSJens Wiklander switch (function) { 71263f89caaSJens Wiklander case PKCS11_FUNCTION_IMPORT: 71363f89caaSJens Wiklander default: 71463f89caaSJens Wiklander local = PKCS11_FALSE; 71563f89caaSJens Wiklander break; 71663f89caaSJens Wiklander } 71763f89caaSJens Wiklander rc = add_attribute(&attrs, PKCS11_CKA_LOCAL, &local, sizeof(local)); 71863f89caaSJens Wiklander if (rc) 71963f89caaSJens Wiklander goto out; 72063f89caaSJens Wiklander 72163f89caaSJens Wiklander switch (get_class(attrs)) { 72263f89caaSJens Wiklander case PKCS11_CKO_SECRET_KEY: 72363f89caaSJens Wiklander case PKCS11_CKO_PRIVATE_KEY: 72463f89caaSJens Wiklander case PKCS11_CKO_PUBLIC_KEY: 72563f89caaSJens Wiklander always_sensitive = PKCS11_FALSE; 72663f89caaSJens Wiklander never_extract = PKCS11_FALSE; 72763f89caaSJens Wiklander 72863f89caaSJens Wiklander rc = add_attribute(&attrs, PKCS11_CKA_ALWAYS_SENSITIVE, 72963f89caaSJens Wiklander &always_sensitive, sizeof(always_sensitive)); 73063f89caaSJens Wiklander if (rc) 73163f89caaSJens Wiklander goto out; 73263f89caaSJens Wiklander 73363f89caaSJens Wiklander rc = add_attribute(&attrs, PKCS11_CKA_NEVER_EXTRACTABLE, 73463f89caaSJens Wiklander &never_extract, sizeof(never_extract)); 73563f89caaSJens Wiklander if (rc) 73663f89caaSJens Wiklander goto out; 73763f89caaSJens Wiklander 73863f89caaSJens Wiklander /* Keys mandate attribute PKCS11_CKA_KEY_GEN_MECHANISM */ 73963f89caaSJens Wiklander mechanism_id = PKCS11_CK_UNAVAILABLE_INFORMATION; 74063f89caaSJens Wiklander rc = add_attribute(&attrs, PKCS11_CKA_KEY_GEN_MECHANISM, 74163f89caaSJens Wiklander &mechanism_id, sizeof(mechanism_id)); 74263f89caaSJens Wiklander if (rc) 74363f89caaSJens Wiklander goto out; 74463f89caaSJens Wiklander break; 74563f89caaSJens Wiklander 74663f89caaSJens Wiklander default: 74763f89caaSJens Wiklander break; 74863f89caaSJens Wiklander } 74963f89caaSJens Wiklander 75063f89caaSJens Wiklander *out = attrs; 75163f89caaSJens Wiklander 75263f89caaSJens Wiklander #ifdef DEBUG 75363f89caaSJens Wiklander trace_attributes("object", attrs); 75463f89caaSJens Wiklander #endif 75563f89caaSJens Wiklander 75663f89caaSJens Wiklander out: 75763f89caaSJens Wiklander TEE_Free(temp); 75863f89caaSJens Wiklander if (rc) 75963f89caaSJens Wiklander TEE_Free(attrs); 76063f89caaSJens Wiklander 76163f89caaSJens Wiklander return rc; 76263f89caaSJens Wiklander } 76363f89caaSJens Wiklander 76463f89caaSJens Wiklander static enum pkcs11_rc check_attrs_misc_integrity(struct obj_attrs *head) 76563f89caaSJens Wiklander { 76663f89caaSJens Wiklander if (get_bool(head, PKCS11_CKA_NEVER_EXTRACTABLE) && 76763f89caaSJens Wiklander get_bool(head, PKCS11_CKA_EXTRACTABLE)) { 76863f89caaSJens Wiklander DMSG("Never/Extractable attributes mismatch %d/%d", 76963f89caaSJens Wiklander get_bool(head, PKCS11_CKA_NEVER_EXTRACTABLE), 77063f89caaSJens Wiklander get_bool(head, PKCS11_CKA_EXTRACTABLE)); 77163f89caaSJens Wiklander 77263f89caaSJens Wiklander return PKCS11_CKR_TEMPLATE_INCONSISTENT; 77363f89caaSJens Wiklander } 77463f89caaSJens Wiklander 77563f89caaSJens Wiklander if (get_bool(head, PKCS11_CKA_ALWAYS_SENSITIVE) && 77663f89caaSJens Wiklander !get_bool(head, PKCS11_CKA_SENSITIVE)) { 77763f89caaSJens Wiklander DMSG("Sensitive/always attributes mismatch %d/%d", 77863f89caaSJens Wiklander get_bool(head, PKCS11_CKA_SENSITIVE), 77963f89caaSJens Wiklander get_bool(head, PKCS11_CKA_ALWAYS_SENSITIVE)); 78063f89caaSJens Wiklander 78163f89caaSJens Wiklander return PKCS11_CKR_TEMPLATE_INCONSISTENT; 78263f89caaSJens Wiklander } 78363f89caaSJens Wiklander 78463f89caaSJens Wiklander return PKCS11_CKR_OK; 78563f89caaSJens Wiklander } 78663f89caaSJens Wiklander 78763f89caaSJens Wiklander /* 788*512cbf1dSJens Wiklander * Check access to object against authentication to token 789*512cbf1dSJens Wiklander */ 790*512cbf1dSJens Wiklander enum pkcs11_rc check_access_attrs_against_token(struct pkcs11_session *session, 791*512cbf1dSJens Wiklander struct obj_attrs *head) 792*512cbf1dSJens Wiklander { 793*512cbf1dSJens Wiklander bool private = true; 794*512cbf1dSJens Wiklander 795*512cbf1dSJens Wiklander switch (get_class(head)) { 796*512cbf1dSJens Wiklander case PKCS11_CKO_SECRET_KEY: 797*512cbf1dSJens Wiklander case PKCS11_CKO_PUBLIC_KEY: 798*512cbf1dSJens Wiklander case PKCS11_CKO_DATA: 799*512cbf1dSJens Wiklander private = get_bool(head, PKCS11_CKA_PRIVATE); 800*512cbf1dSJens Wiklander break; 801*512cbf1dSJens Wiklander case PKCS11_CKO_PRIVATE_KEY: 802*512cbf1dSJens Wiklander break; 803*512cbf1dSJens Wiklander default: 804*512cbf1dSJens Wiklander return PKCS11_CKR_KEY_FUNCTION_NOT_PERMITTED; 805*512cbf1dSJens Wiklander } 806*512cbf1dSJens Wiklander 807*512cbf1dSJens Wiklander if (private && pkcs11_session_is_public(session)) { 808*512cbf1dSJens Wiklander DMSG("Private object access from a public session"); 809*512cbf1dSJens Wiklander 810*512cbf1dSJens Wiklander return PKCS11_CKR_KEY_FUNCTION_NOT_PERMITTED; 811*512cbf1dSJens Wiklander } 812*512cbf1dSJens Wiklander 813*512cbf1dSJens Wiklander return PKCS11_CKR_OK; 814*512cbf1dSJens Wiklander } 815*512cbf1dSJens Wiklander 816*512cbf1dSJens Wiklander /* 81763f89caaSJens Wiklander * Check the attributes of a to-be-created object matches the token state 81863f89caaSJens Wiklander */ 81963f89caaSJens Wiklander enum pkcs11_rc check_created_attrs_against_token(struct pkcs11_session *session, 82063f89caaSJens Wiklander struct obj_attrs *head) 82163f89caaSJens Wiklander { 82263f89caaSJens Wiklander enum pkcs11_rc rc = PKCS11_CKR_OK; 82363f89caaSJens Wiklander 82463f89caaSJens Wiklander rc = check_attrs_misc_integrity(head); 82563f89caaSJens Wiklander if (rc) 82663f89caaSJens Wiklander return rc; 82763f89caaSJens Wiklander 82863f89caaSJens Wiklander if (get_bool(head, PKCS11_CKA_TRUSTED) && 82963f89caaSJens Wiklander !pkcs11_session_is_so(session)) { 83063f89caaSJens Wiklander DMSG("Can't create trusted object"); 83163f89caaSJens Wiklander 83263f89caaSJens Wiklander return PKCS11_CKR_KEY_FUNCTION_NOT_PERMITTED; 83363f89caaSJens Wiklander } 83463f89caaSJens Wiklander 83563f89caaSJens Wiklander if (get_bool(head, PKCS11_CKA_TOKEN) && 83663f89caaSJens Wiklander !pkcs11_session_is_read_write(session)) { 83763f89caaSJens Wiklander DMSG("Can't create persistent object"); 83863f89caaSJens Wiklander 83963f89caaSJens Wiklander return PKCS11_CKR_SESSION_READ_ONLY; 84063f89caaSJens Wiklander } 84163f89caaSJens Wiklander 84263f89caaSJens Wiklander /* 84363f89caaSJens Wiklander * TODO: START_DATE and END_DATE: complies with current time? 84463f89caaSJens Wiklander */ 84563f89caaSJens Wiklander return PKCS11_CKR_OK; 84663f89caaSJens Wiklander } 84763f89caaSJens Wiklander 84863f89caaSJens Wiklander #define DMSG_BAD_BBOOL(attr, proc, head) \ 84963f89caaSJens Wiklander do { \ 85063f89caaSJens Wiklander uint32_t __maybe_unused _attr = (attr); \ 85163f89caaSJens Wiklander uint8_t __maybe_unused _bvalue = 0; \ 85263f89caaSJens Wiklander enum pkcs11_rc __maybe_unused _rc = PKCS11_CKR_OK; \ 85363f89caaSJens Wiklander \ 85463f89caaSJens Wiklander _rc = get_attribute((head), _attr, &_bvalue, NULL); \ 85563f89caaSJens Wiklander DMSG("%s issue for %s: %sfound, value %"PRIu8, \ 85663f89caaSJens Wiklander id2str_attr(_attr), id2str_proc((proc)), \ 85763f89caaSJens Wiklander _rc ? "not " : "", _bvalue); \ 85863f89caaSJens Wiklander } while (0) 85963f89caaSJens Wiklander 86063f89caaSJens Wiklander static bool __maybe_unused check_attr_bval(uint32_t proc_id __maybe_unused, 86163f89caaSJens Wiklander struct obj_attrs *head, 86263f89caaSJens Wiklander uint32_t attribute, bool val) 86363f89caaSJens Wiklander { 86463f89caaSJens Wiklander uint8_t bbool = 0; 86563f89caaSJens Wiklander uint32_t sz = sizeof(bbool); 86663f89caaSJens Wiklander 86763f89caaSJens Wiklander if (!get_attribute(head, attribute, &bbool, &sz) && !!bbool == val) 86863f89caaSJens Wiklander return true; 86963f89caaSJens Wiklander 87063f89caaSJens Wiklander DMSG_BAD_BBOOL(attribute, proc_id, head); 87163f89caaSJens Wiklander return false; 87263f89caaSJens Wiklander } 87363f89caaSJens Wiklander 87463f89caaSJens Wiklander /* 87563f89caaSJens Wiklander * Check the attributes of a new secret match the processing/mechanism 87663f89caaSJens Wiklander * used to create it. 87763f89caaSJens Wiklander * 87863f89caaSJens Wiklander * @proc_id - PKCS11_CKM_xxx 87963f89caaSJens Wiklander * @head - head of the attributes of the to-be-created object. 88063f89caaSJens Wiklander */ 88163f89caaSJens Wiklander enum pkcs11_rc check_created_attrs_against_processing(uint32_t proc_id, 88263f89caaSJens Wiklander struct obj_attrs *head) 88363f89caaSJens Wiklander { 88463f89caaSJens Wiklander /* 88563f89caaSJens Wiklander * Processings that do not create secrets are not expected to call 88663f89caaSJens Wiklander * this function which would panic. 88763f89caaSJens Wiklander */ 88863f89caaSJens Wiklander switch (proc_id) { 88963f89caaSJens Wiklander case PKCS11_PROCESSING_IMPORT: 89063f89caaSJens Wiklander assert(check_attr_bval(proc_id, head, PKCS11_CKA_LOCAL, false)); 89163f89caaSJens Wiklander break; 89263f89caaSJens Wiklander default: 89363f89caaSJens Wiklander TEE_Panic(proc_id); 89463f89caaSJens Wiklander break; 89563f89caaSJens Wiklander } 89663f89caaSJens Wiklander 89763f89caaSJens Wiklander return PKCS11_CKR_OK; 89863f89caaSJens Wiklander } 899*512cbf1dSJens Wiklander 900*512cbf1dSJens Wiklander static void get_key_min_max_sizes(enum pkcs11_key_type key_type, 901*512cbf1dSJens Wiklander uint32_t *min_key_size, 902*512cbf1dSJens Wiklander uint32_t *max_key_size) 903*512cbf1dSJens Wiklander { 904*512cbf1dSJens Wiklander enum pkcs11_mechanism_id mechanism = PKCS11_CKM_UNDEFINED_ID; 905*512cbf1dSJens Wiklander 906*512cbf1dSJens Wiklander switch (key_type) { 907*512cbf1dSJens Wiklander case PKCS11_CKK_AES: 908*512cbf1dSJens Wiklander mechanism = PKCS11_CKM_AES_KEY_GEN; 909*512cbf1dSJens Wiklander break; 910*512cbf1dSJens Wiklander default: 911*512cbf1dSJens Wiklander TEE_Panic(key_type); 912*512cbf1dSJens Wiklander break; 913*512cbf1dSJens Wiklander } 914*512cbf1dSJens Wiklander 915*512cbf1dSJens Wiklander mechanism_supported_key_sizes(mechanism, min_key_size, 916*512cbf1dSJens Wiklander max_key_size); 917*512cbf1dSJens Wiklander } 918*512cbf1dSJens Wiklander 919*512cbf1dSJens Wiklander enum pkcs11_rc check_created_attrs(struct obj_attrs *key1, 920*512cbf1dSJens Wiklander struct obj_attrs *key2) 921*512cbf1dSJens Wiklander { 922*512cbf1dSJens Wiklander enum pkcs11_rc rc = PKCS11_CKR_OK; 923*512cbf1dSJens Wiklander struct obj_attrs *secret = NULL; 924*512cbf1dSJens Wiklander uint32_t max_key_size = 0; 925*512cbf1dSJens Wiklander uint32_t min_key_size = 0; 926*512cbf1dSJens Wiklander uint32_t key_length = 0; 927*512cbf1dSJens Wiklander 928*512cbf1dSJens Wiklander switch (get_class(key1)) { 929*512cbf1dSJens Wiklander case PKCS11_CKO_SECRET_KEY: 930*512cbf1dSJens Wiklander secret = key1; 931*512cbf1dSJens Wiklander break; 932*512cbf1dSJens Wiklander default: 933*512cbf1dSJens Wiklander return PKCS11_CKR_ATTRIBUTE_VALUE_INVALID; 934*512cbf1dSJens Wiklander } 935*512cbf1dSJens Wiklander 936*512cbf1dSJens Wiklander if (key2) 937*512cbf1dSJens Wiklander return PKCS11_CKR_ATTRIBUTE_VALUE_INVALID; 938*512cbf1dSJens Wiklander 939*512cbf1dSJens Wiklander if (secret) { 940*512cbf1dSJens Wiklander switch (get_key_type(secret)) { 941*512cbf1dSJens Wiklander case PKCS11_CKK_AES: 942*512cbf1dSJens Wiklander case PKCS11_CKK_GENERIC_SECRET: 943*512cbf1dSJens Wiklander case PKCS11_CKK_MD5_HMAC: 944*512cbf1dSJens Wiklander case PKCS11_CKK_SHA_1_HMAC: 945*512cbf1dSJens Wiklander case PKCS11_CKK_SHA224_HMAC: 946*512cbf1dSJens Wiklander case PKCS11_CKK_SHA256_HMAC: 947*512cbf1dSJens Wiklander case PKCS11_CKK_SHA384_HMAC: 948*512cbf1dSJens Wiklander case PKCS11_CKK_SHA512_HMAC: 949*512cbf1dSJens Wiklander break; 950*512cbf1dSJens Wiklander default: 951*512cbf1dSJens Wiklander return PKCS11_CKR_TEMPLATE_INCONSISTENT; 952*512cbf1dSJens Wiklander } 953*512cbf1dSJens Wiklander 954*512cbf1dSJens Wiklander /* Get key size */ 955*512cbf1dSJens Wiklander rc = get_u32_attribute(secret, PKCS11_CKA_VALUE_LEN, 956*512cbf1dSJens Wiklander &key_length); 957*512cbf1dSJens Wiklander if (rc) 958*512cbf1dSJens Wiklander return PKCS11_CKR_TEMPLATE_INCONSISTENT; 959*512cbf1dSJens Wiklander } 960*512cbf1dSJens Wiklander 961*512cbf1dSJens Wiklander get_key_min_max_sizes(get_key_type(key1), &min_key_size, &max_key_size); 962*512cbf1dSJens Wiklander if (key_length < min_key_size || key_length > max_key_size) { 963*512cbf1dSJens Wiklander EMSG("Length %"PRIu32" vs range [%"PRIu32" %"PRIu32"]", 964*512cbf1dSJens Wiklander key_length, min_key_size, max_key_size); 965*512cbf1dSJens Wiklander 966*512cbf1dSJens Wiklander return PKCS11_CKR_KEY_SIZE_RANGE; 967*512cbf1dSJens Wiklander } 968*512cbf1dSJens Wiklander 969*512cbf1dSJens Wiklander return PKCS11_CKR_OK; 970*512cbf1dSJens Wiklander } 971*512cbf1dSJens Wiklander 972*512cbf1dSJens Wiklander /* Check processing ID against attribute ALLOWED_MECHANISMS if any */ 973*512cbf1dSJens Wiklander static bool parent_key_complies_allowed_processings(uint32_t proc_id, 974*512cbf1dSJens Wiklander struct obj_attrs *head) 975*512cbf1dSJens Wiklander { 976*512cbf1dSJens Wiklander char *attr = NULL; 977*512cbf1dSJens Wiklander uint32_t size = 0; 978*512cbf1dSJens Wiklander uint32_t proc = 0; 979*512cbf1dSJens Wiklander size_t count = 0; 980*512cbf1dSJens Wiklander 981*512cbf1dSJens Wiklander /* Check only if restricted allowed mechanisms list is defined */ 982*512cbf1dSJens Wiklander if (get_attribute_ptr(head, PKCS11_CKA_ALLOWED_MECHANISMS, 983*512cbf1dSJens Wiklander (void *)&attr, &size) != PKCS11_CKR_OK) { 984*512cbf1dSJens Wiklander return true; 985*512cbf1dSJens Wiklander } 986*512cbf1dSJens Wiklander 987*512cbf1dSJens Wiklander for (count = size / sizeof(uint32_t); count; count--) { 988*512cbf1dSJens Wiklander TEE_MemMove(&proc, attr, sizeof(uint32_t)); 989*512cbf1dSJens Wiklander attr += sizeof(uint32_t); 990*512cbf1dSJens Wiklander 991*512cbf1dSJens Wiklander if (proc == proc_id) 992*512cbf1dSJens Wiklander return true; 993*512cbf1dSJens Wiklander } 994*512cbf1dSJens Wiklander 995*512cbf1dSJens Wiklander DMSG("can't find %s in allowed list", id2str_proc(proc_id)); 996*512cbf1dSJens Wiklander return false; 997*512cbf1dSJens Wiklander } 998*512cbf1dSJens Wiklander 999*512cbf1dSJens Wiklander static enum pkcs11_attr_id func_to_attr(enum processing_func func) 1000*512cbf1dSJens Wiklander { 1001*512cbf1dSJens Wiklander switch (func) { 1002*512cbf1dSJens Wiklander case PKCS11_FUNCTION_ENCRYPT: 1003*512cbf1dSJens Wiklander return PKCS11_CKA_ENCRYPT; 1004*512cbf1dSJens Wiklander case PKCS11_FUNCTION_DECRYPT: 1005*512cbf1dSJens Wiklander return PKCS11_CKA_DECRYPT; 1006*512cbf1dSJens Wiklander case PKCS11_FUNCTION_SIGN: 1007*512cbf1dSJens Wiklander return PKCS11_CKA_SIGN; 1008*512cbf1dSJens Wiklander case PKCS11_FUNCTION_VERIFY: 1009*512cbf1dSJens Wiklander return PKCS11_CKA_VERIFY; 1010*512cbf1dSJens Wiklander case PKCS11_FUNCTION_WRAP: 1011*512cbf1dSJens Wiklander return PKCS11_CKA_WRAP; 1012*512cbf1dSJens Wiklander case PKCS11_FUNCTION_UNWRAP: 1013*512cbf1dSJens Wiklander return PKCS11_CKA_UNWRAP; 1014*512cbf1dSJens Wiklander case PKCS11_FUNCTION_DERIVE: 1015*512cbf1dSJens Wiklander return PKCS11_CKA_DERIVE; 1016*512cbf1dSJens Wiklander default: 1017*512cbf1dSJens Wiklander return PKCS11_CKA_UNDEFINED_ID; 1018*512cbf1dSJens Wiklander } 1019*512cbf1dSJens Wiklander } 1020*512cbf1dSJens Wiklander 1021*512cbf1dSJens Wiklander enum pkcs11_rc 1022*512cbf1dSJens Wiklander check_parent_attrs_against_processing(enum pkcs11_mechanism_id proc_id, 1023*512cbf1dSJens Wiklander enum processing_func function, 1024*512cbf1dSJens Wiklander struct obj_attrs *head) 1025*512cbf1dSJens Wiklander { 1026*512cbf1dSJens Wiklander enum pkcs11_class_id key_class = get_class(head); 1027*512cbf1dSJens Wiklander enum pkcs11_key_type key_type = get_key_type(head); 1028*512cbf1dSJens Wiklander enum pkcs11_attr_id attr = func_to_attr(function); 1029*512cbf1dSJens Wiklander 1030*512cbf1dSJens Wiklander if (!get_bool(head, attr)) { 1031*512cbf1dSJens Wiklander DMSG("%s not permitted", id2str_attr(attr)); 1032*512cbf1dSJens Wiklander return PKCS11_CKR_KEY_FUNCTION_NOT_PERMITTED; 1033*512cbf1dSJens Wiklander } 1034*512cbf1dSJens Wiklander 1035*512cbf1dSJens Wiklander /* Check processing complies with parent key family */ 1036*512cbf1dSJens Wiklander switch (proc_id) { 1037*512cbf1dSJens Wiklander case PKCS11_CKM_AES_ECB: 1038*512cbf1dSJens Wiklander case PKCS11_CKM_AES_CBC: 1039*512cbf1dSJens Wiklander case PKCS11_CKM_AES_CBC_PAD: 1040*512cbf1dSJens Wiklander case PKCS11_CKM_AES_CTS: 1041*512cbf1dSJens Wiklander case PKCS11_CKM_AES_CTR: 1042*512cbf1dSJens Wiklander if (key_class == PKCS11_CKO_SECRET_KEY && 1043*512cbf1dSJens Wiklander key_type == PKCS11_CKK_AES) 1044*512cbf1dSJens Wiklander break; 1045*512cbf1dSJens Wiklander 1046*512cbf1dSJens Wiklander DMSG("%s invalid key %s/%s", id2str_proc(proc_id), 1047*512cbf1dSJens Wiklander id2str_class(key_class), id2str_key_type(key_type)); 1048*512cbf1dSJens Wiklander 1049*512cbf1dSJens Wiklander return PKCS11_CKR_KEY_FUNCTION_NOT_PERMITTED; 1050*512cbf1dSJens Wiklander 1051*512cbf1dSJens Wiklander default: 1052*512cbf1dSJens Wiklander DMSG("Invalid processing %#"PRIx32"/%s", proc_id, 1053*512cbf1dSJens Wiklander id2str_proc(proc_id)); 1054*512cbf1dSJens Wiklander 1055*512cbf1dSJens Wiklander return PKCS11_CKR_MECHANISM_INVALID; 1056*512cbf1dSJens Wiklander } 1057*512cbf1dSJens Wiklander 1058*512cbf1dSJens Wiklander if (!parent_key_complies_allowed_processings(proc_id, head)) { 1059*512cbf1dSJens Wiklander DMSG("Allowed mechanism failed"); 1060*512cbf1dSJens Wiklander return PKCS11_CKR_KEY_FUNCTION_NOT_PERMITTED; 1061*512cbf1dSJens Wiklander } 1062*512cbf1dSJens Wiklander 1063*512cbf1dSJens Wiklander return PKCS11_CKR_OK; 1064*512cbf1dSJens Wiklander } 1065