xref: /optee_os/ta/pkcs11/src/pkcs11_attributes.c (revision dc8c77fcab32549c070544dd4944d4c3f874def3)
163f89caaSJens Wiklander // SPDX-License-Identifier: BSD-2-Clause
263f89caaSJens Wiklander /*
363f89caaSJens Wiklander  * Copyright (c) 2017-2020, Linaro Limited
463f89caaSJens Wiklander  */
563f89caaSJens Wiklander 
663f89caaSJens Wiklander #include <assert.h>
763f89caaSJens Wiklander #include <inttypes.h>
863f89caaSJens Wiklander #include <pkcs11_ta.h>
963f89caaSJens Wiklander #include <stdlib.h>
1063f89caaSJens Wiklander #include <string_ext.h>
1163f89caaSJens Wiklander #include <tee_internal_api_extensions.h>
1263f89caaSJens Wiklander #include <tee_internal_api.h>
136a760c9eSEtienne Carriere #include <trace.h>
1463f89caaSJens Wiklander #include <util.h>
1563f89caaSJens Wiklander 
1663f89caaSJens Wiklander #include "attributes.h"
1763f89caaSJens Wiklander #include "handle.h"
1863f89caaSJens Wiklander #include "pkcs11_attributes.h"
1963f89caaSJens Wiklander #include "pkcs11_helpers.h"
2063f89caaSJens Wiklander #include "pkcs11_token.h"
2163f89caaSJens Wiklander #include "sanitize_object.h"
2263f89caaSJens Wiklander #include "serializer.h"
2363f89caaSJens Wiklander #include "token_capabilities.h"
2463f89caaSJens Wiklander 
25512cbf1dSJens Wiklander static uint32_t pkcs11_func2ckfm(enum processing_func function)
26512cbf1dSJens Wiklander {
27512cbf1dSJens Wiklander 	switch (function) {
28512cbf1dSJens Wiklander 	case PKCS11_FUNCTION_DIGEST:
29512cbf1dSJens Wiklander 		return PKCS11_CKFM_DIGEST;
30512cbf1dSJens Wiklander 	case PKCS11_FUNCTION_GENERATE:
31512cbf1dSJens Wiklander 		return PKCS11_CKFM_GENERATE;
32512cbf1dSJens Wiklander 	case PKCS11_FUNCTION_GENERATE_PAIR:
33512cbf1dSJens Wiklander 		return PKCS11_CKFM_GENERATE_KEY_PAIR;
34512cbf1dSJens Wiklander 	case PKCS11_FUNCTION_DERIVE:
35512cbf1dSJens Wiklander 		return PKCS11_CKFM_DERIVE;
36512cbf1dSJens Wiklander 	case PKCS11_FUNCTION_WRAP:
37512cbf1dSJens Wiklander 		return PKCS11_CKFM_WRAP;
38512cbf1dSJens Wiklander 	case PKCS11_FUNCTION_UNWRAP:
39512cbf1dSJens Wiklander 		return PKCS11_CKFM_UNWRAP;
40512cbf1dSJens Wiklander 	case PKCS11_FUNCTION_ENCRYPT:
41512cbf1dSJens Wiklander 		return PKCS11_CKFM_ENCRYPT;
42512cbf1dSJens Wiklander 	case PKCS11_FUNCTION_DECRYPT:
43512cbf1dSJens Wiklander 		return PKCS11_CKFM_DECRYPT;
44512cbf1dSJens Wiklander 	case PKCS11_FUNCTION_SIGN:
45512cbf1dSJens Wiklander 		return PKCS11_CKFM_SIGN;
46512cbf1dSJens Wiklander 	case PKCS11_FUNCTION_VERIFY:
47512cbf1dSJens Wiklander 		return PKCS11_CKFM_VERIFY;
48512cbf1dSJens Wiklander 	case PKCS11_FUNCTION_SIGN_RECOVER:
49512cbf1dSJens Wiklander 		return PKCS11_CKFM_SIGN_RECOVER;
50512cbf1dSJens Wiklander 	case PKCS11_FUNCTION_VERIFY_RECOVER:
51512cbf1dSJens Wiklander 		return PKCS11_CKFM_VERIFY_RECOVER;
52512cbf1dSJens Wiklander 	default:
53512cbf1dSJens Wiklander 		return 0;
54512cbf1dSJens Wiklander 	}
55512cbf1dSJens Wiklander }
56512cbf1dSJens Wiklander 
57512cbf1dSJens Wiklander enum pkcs11_rc
58512cbf1dSJens Wiklander check_mechanism_against_processing(struct pkcs11_session *session,
59512cbf1dSJens Wiklander 				   enum pkcs11_mechanism_id mechanism_type,
60512cbf1dSJens Wiklander 				   enum processing_func function,
61512cbf1dSJens Wiklander 				   enum processing_step step)
62512cbf1dSJens Wiklander {
63512cbf1dSJens Wiklander 	bool allowed = false;
64512cbf1dSJens Wiklander 
65512cbf1dSJens Wiklander 	switch (step) {
66512cbf1dSJens Wiklander 	case PKCS11_FUNC_STEP_INIT:
67512cbf1dSJens Wiklander 		switch (function) {
68512cbf1dSJens Wiklander 		case PKCS11_FUNCTION_IMPORT:
69512cbf1dSJens Wiklander 		case PKCS11_FUNCTION_COPY:
70512cbf1dSJens Wiklander 		case PKCS11_FUNCTION_MODIFY:
71512cbf1dSJens Wiklander 		case PKCS11_FUNCTION_DESTROY:
72512cbf1dSJens Wiklander 			return PKCS11_CKR_OK;
73512cbf1dSJens Wiklander 		default:
74512cbf1dSJens Wiklander 			break;
75512cbf1dSJens Wiklander 		}
76512cbf1dSJens Wiklander 		/*
77512cbf1dSJens Wiklander 		 * Check that the returned PKCS11_CKFM_* flag from
78512cbf1dSJens Wiklander 		 * pkcs11_func2ckfm() is among the ones from
79512cbf1dSJens Wiklander 		 * mechanism_supported_flags().
80512cbf1dSJens Wiklander 		 */
81512cbf1dSJens Wiklander 		allowed = mechanism_supported_flags(mechanism_type) &
82512cbf1dSJens Wiklander 			  pkcs11_func2ckfm(function);
83512cbf1dSJens Wiklander 		break;
84512cbf1dSJens Wiklander 
85512cbf1dSJens Wiklander 	case PKCS11_FUNC_STEP_ONESHOT:
860460a039SRuchika Gupta 		if (session->processing->always_authen &&
870460a039SRuchika Gupta 		    !session->processing->relogged)
880460a039SRuchika Gupta 			return PKCS11_CKR_USER_NOT_LOGGED_IN;
890460a039SRuchika Gupta 
900460a039SRuchika Gupta 		if (session->processing->updated) {
910460a039SRuchika Gupta 			EMSG("Cannot perform one-shot on updated processing");
920460a039SRuchika Gupta 			return PKCS11_CKR_OPERATION_ACTIVE;
930460a039SRuchika Gupta 		}
940460a039SRuchika Gupta 
950460a039SRuchika Gupta 		allowed = true;
960460a039SRuchika Gupta 		break;
970460a039SRuchika Gupta 
98512cbf1dSJens Wiklander 	case PKCS11_FUNC_STEP_UPDATE:
99512cbf1dSJens Wiklander 		if (session->processing->always_authen &&
100512cbf1dSJens Wiklander 		    !session->processing->relogged)
101512cbf1dSJens Wiklander 			return PKCS11_CKR_USER_NOT_LOGGED_IN;
102512cbf1dSJens Wiklander 
103512cbf1dSJens Wiklander 		allowed = !mechanism_is_one_shot_only(mechanism_type);
104512cbf1dSJens Wiklander 		break;
105512cbf1dSJens Wiklander 
1069e91a619SVesa Jääskeläinen 	case PKCS11_FUNC_STEP_UPDATE_KEY:
1079e91a619SVesa Jääskeläinen 		assert(function == PKCS11_FUNCTION_DIGEST);
1089e91a619SVesa Jääskeläinen 
1099e91a619SVesa Jääskeläinen 		if (session->processing->always_authen &&
1109e91a619SVesa Jääskeläinen 		    !session->processing->relogged)
1119e91a619SVesa Jääskeläinen 			return PKCS11_CKR_USER_NOT_LOGGED_IN;
1129e91a619SVesa Jääskeläinen 
1139e91a619SVesa Jääskeläinen 		allowed = true;
1149e91a619SVesa Jääskeläinen 		break;
1159e91a619SVesa Jääskeläinen 
116512cbf1dSJens Wiklander 	case PKCS11_FUNC_STEP_FINAL:
117512cbf1dSJens Wiklander 		if (session->processing->always_authen &&
118512cbf1dSJens Wiklander 		    !session->processing->relogged)
119512cbf1dSJens Wiklander 			return PKCS11_CKR_USER_NOT_LOGGED_IN;
120512cbf1dSJens Wiklander 
121512cbf1dSJens Wiklander 		return PKCS11_CKR_OK;
122512cbf1dSJens Wiklander 
123512cbf1dSJens Wiklander 	default:
124512cbf1dSJens Wiklander 		TEE_Panic(step);
125512cbf1dSJens Wiklander 		break;
126512cbf1dSJens Wiklander 	}
127512cbf1dSJens Wiklander 
128512cbf1dSJens Wiklander 	if (!allowed) {
129512cbf1dSJens Wiklander 		EMSG("Processing %#x/%s not permitted (%u/%u)",
130512cbf1dSJens Wiklander 		     (unsigned int)mechanism_type, id2str_proc(mechanism_type),
131512cbf1dSJens Wiklander 		     function, step);
132df705578SRuchika Gupta 		return PKCS11_CKR_MECHANISM_INVALID;
133512cbf1dSJens Wiklander 	}
134512cbf1dSJens Wiklander 
135512cbf1dSJens Wiklander 	return PKCS11_CKR_OK;
136512cbf1dSJens Wiklander }
137512cbf1dSJens Wiklander 
13863f89caaSJens Wiklander /*
13963f89caaSJens Wiklander  * Object default boolean attributes as per PKCS#11
14063f89caaSJens Wiklander  */
14163f89caaSJens Wiklander static uint8_t *pkcs11_object_default_boolprop(uint32_t attribute)
14263f89caaSJens Wiklander {
14363f89caaSJens Wiklander 	static const uint8_t bool_true = 1;
14463f89caaSJens Wiklander 	static const uint8_t bool_false;
14563f89caaSJens Wiklander 
14663f89caaSJens Wiklander 	switch (attribute) {
14763f89caaSJens Wiklander 	/* As per PKCS#11 default value */
14863f89caaSJens Wiklander 	case PKCS11_CKA_MODIFIABLE:
14963f89caaSJens Wiklander 	case PKCS11_CKA_COPYABLE:
15063f89caaSJens Wiklander 	case PKCS11_CKA_DESTROYABLE:
15163f89caaSJens Wiklander 		return (uint8_t *)&bool_true;
15263f89caaSJens Wiklander 	case PKCS11_CKA_TOKEN:
15363f89caaSJens Wiklander 	case PKCS11_CKA_PRIVATE:
15439fc24faSEtienne Carriere 	case PKCS11_CKA_WRAP_WITH_TRUSTED:
15539fc24faSEtienne Carriere 	case PKCS11_CKA_ALWAYS_AUTHENTICATE:
15663f89caaSJens Wiklander 	case PKCS11_CKA_SENSITIVE:
15763f89caaSJens Wiklander 		return (uint8_t *)&bool_false;
15863f89caaSJens Wiklander 	/* Token specific default value */
15963f89caaSJens Wiklander 	case PKCS11_CKA_SIGN:
16063f89caaSJens Wiklander 	case PKCS11_CKA_VERIFY:
16163f89caaSJens Wiklander 	case PKCS11_CKA_DERIVE:
16263f89caaSJens Wiklander 	case PKCS11_CKA_ENCRYPT:
16363f89caaSJens Wiklander 	case PKCS11_CKA_DECRYPT:
16463f89caaSJens Wiklander 	case PKCS11_CKA_SIGN_RECOVER:
16563f89caaSJens Wiklander 	case PKCS11_CKA_VERIFY_RECOVER:
16663f89caaSJens Wiklander 	case PKCS11_CKA_WRAP:
16763f89caaSJens Wiklander 	case PKCS11_CKA_UNWRAP:
16863f89caaSJens Wiklander 	case PKCS11_CKA_EXTRACTABLE:
16963f89caaSJens Wiklander 	case PKCS11_CKA_TRUSTED:
17063f89caaSJens Wiklander 		return (uint8_t *)&bool_false;
17163f89caaSJens Wiklander 	default:
17263f89caaSJens Wiklander 		DMSG("No default for boolprop attribute %#"PRIx32, attribute);
17363f89caaSJens Wiklander 		return NULL;
17463f89caaSJens Wiklander 	}
17563f89caaSJens Wiklander }
17663f89caaSJens Wiklander 
17763f89caaSJens Wiklander /*
17863f89caaSJens Wiklander  * Object expects several boolean attributes to be set to a default value
17963f89caaSJens Wiklander  * or to a validate client configuration value. This function append the input
18063f89caaSJens Wiklander  * attribute (id/size/value) in the serialized object.
18163f89caaSJens Wiklander  */
18263f89caaSJens Wiklander static enum pkcs11_rc pkcs11_import_object_boolprop(struct obj_attrs **out,
18363f89caaSJens Wiklander 						    struct obj_attrs *templ,
18463f89caaSJens Wiklander 						    uint32_t attribute)
18563f89caaSJens Wiklander {
18663f89caaSJens Wiklander 	enum pkcs11_rc rc = PKCS11_CKR_OK;
18763f89caaSJens Wiklander 	uint8_t bbool = 0;
18863f89caaSJens Wiklander 	uint32_t size = sizeof(uint8_t);
18963f89caaSJens Wiklander 	void *attr = NULL;
19063f89caaSJens Wiklander 
19163f89caaSJens Wiklander 	rc = get_attribute(templ, attribute, &bbool, &size);
19263f89caaSJens Wiklander 	if (rc) {
19363f89caaSJens Wiklander 		if (rc != PKCS11_RV_NOT_FOUND)
19463f89caaSJens Wiklander 			return rc;
19563f89caaSJens Wiklander 		attr = pkcs11_object_default_boolprop(attribute);
19663f89caaSJens Wiklander 		if (!attr)
19763f89caaSJens Wiklander 			return PKCS11_CKR_TEMPLATE_INCOMPLETE;
19863f89caaSJens Wiklander 	} else {
19963f89caaSJens Wiklander 		attr = &bbool;
20063f89caaSJens Wiklander 	}
20163f89caaSJens Wiklander 
20263f89caaSJens Wiklander 	/* Boolean attributes are 1byte in the ABI, no alignment issue */
20363f89caaSJens Wiklander 	return add_attribute(out, attribute, attr, sizeof(uint8_t));
20463f89caaSJens Wiklander }
20563f89caaSJens Wiklander 
20663f89caaSJens Wiklander static enum pkcs11_rc set_mandatory_boolprops(struct obj_attrs **out,
20763f89caaSJens Wiklander 					      struct obj_attrs *temp,
20863f89caaSJens Wiklander 					      uint32_t const *bp,
20963f89caaSJens Wiklander 					      size_t bp_count)
21063f89caaSJens Wiklander {
21163f89caaSJens Wiklander 	enum pkcs11_rc rc = PKCS11_CKR_OK;
21263f89caaSJens Wiklander 	size_t n = 0;
21363f89caaSJens Wiklander 
21463f89caaSJens Wiklander 	for (n = 0; n < bp_count; n++) {
21563f89caaSJens Wiklander 		rc = pkcs11_import_object_boolprop(out, temp, bp[n]);
21663f89caaSJens Wiklander 		if (rc)
21763f89caaSJens Wiklander 			return rc;
21863f89caaSJens Wiklander 	}
21963f89caaSJens Wiklander 
22063f89caaSJens Wiklander 	return rc;
22163f89caaSJens Wiklander }
22263f89caaSJens Wiklander 
22363f89caaSJens Wiklander static enum pkcs11_rc set_mandatory_attributes(struct obj_attrs **out,
22463f89caaSJens Wiklander 					       struct obj_attrs *temp,
22516df60c7SEtienne Carriere 					       uint32_t const *attrs,
22616df60c7SEtienne Carriere 					       size_t attrs_count)
22763f89caaSJens Wiklander {
22863f89caaSJens Wiklander 	enum pkcs11_rc rc = PKCS11_CKR_OK;
22963f89caaSJens Wiklander 	size_t n = 0;
23063f89caaSJens Wiklander 
23116df60c7SEtienne Carriere 	for (n = 0; n < attrs_count; n++) {
23263f89caaSJens Wiklander 		uint32_t size = 0;
23363f89caaSJens Wiklander 		void *value = NULL;
23463f89caaSJens Wiklander 
23516df60c7SEtienne Carriere 		if (get_attribute_ptr(temp, attrs[n], &value, &size))
23663f89caaSJens Wiklander 			return PKCS11_CKR_TEMPLATE_INCOMPLETE;
23763f89caaSJens Wiklander 
23816df60c7SEtienne Carriere 		rc = add_attribute(out, attrs[n], value, size);
23963f89caaSJens Wiklander 		if (rc)
24063f89caaSJens Wiklander 			return rc;
24163f89caaSJens Wiklander 	}
24263f89caaSJens Wiklander 
24363f89caaSJens Wiklander 	return rc;
24463f89caaSJens Wiklander }
24563f89caaSJens Wiklander 
24663f89caaSJens Wiklander static enum pkcs11_rc get_default_value(enum pkcs11_attr_id id, void **value,
24763f89caaSJens Wiklander 					uint32_t *size)
24863f89caaSJens Wiklander {
24963f89caaSJens Wiklander 	/* should have been taken care of already */
25063f89caaSJens Wiklander 	assert(!pkcs11_attr_is_boolean(id));
25163f89caaSJens Wiklander 
25263f89caaSJens Wiklander 	/* All other attributes have an empty default value */
25363f89caaSJens Wiklander 	*value = NULL;
25463f89caaSJens Wiklander 	*size = 0;
25563f89caaSJens Wiklander 	return PKCS11_CKR_OK;
25663f89caaSJens Wiklander }
25763f89caaSJens Wiklander 
2584eb88651SRuchika Gupta static enum pkcs11_rc set_optional_attributes_with_def(struct obj_attrs **out,
25963f89caaSJens Wiklander 						       struct obj_attrs *temp,
26016df60c7SEtienne Carriere 						       uint32_t const *attrs,
26116df60c7SEtienne Carriere 						       size_t attrs_count,
2624eb88651SRuchika Gupta 						       bool default_to_null)
26363f89caaSJens Wiklander {
26463f89caaSJens Wiklander 	enum pkcs11_rc rc = PKCS11_CKR_OK;
26563f89caaSJens Wiklander 	size_t n = 0;
26663f89caaSJens Wiklander 
26716df60c7SEtienne Carriere 	for (n = 0; n < attrs_count; n++) {
26863f89caaSJens Wiklander 		uint32_t size = 0;
26963f89caaSJens Wiklander 		void *value = NULL;
27063f89caaSJens Wiklander 
27116df60c7SEtienne Carriere 		rc = get_attribute_ptr(temp, attrs[n], &value, &size);
2724eb88651SRuchika Gupta 		if (rc == PKCS11_RV_NOT_FOUND) {
2734eb88651SRuchika Gupta 			if (default_to_null) {
27416df60c7SEtienne Carriere 				rc = get_default_value(attrs[n], &value, &size);
2754eb88651SRuchika Gupta 			} else {
2764eb88651SRuchika Gupta 				rc = PKCS11_CKR_OK;
2774eb88651SRuchika Gupta 				continue;
2784eb88651SRuchika Gupta 			}
2794eb88651SRuchika Gupta 		}
28063f89caaSJens Wiklander 		if (rc)
28163f89caaSJens Wiklander 			return rc;
28263f89caaSJens Wiklander 
28316df60c7SEtienne Carriere 		rc = add_attribute(out, attrs[n], value, size);
28463f89caaSJens Wiklander 		if (rc)
28563f89caaSJens Wiklander 			return rc;
28663f89caaSJens Wiklander 	}
28763f89caaSJens Wiklander 
28863f89caaSJens Wiklander 	return rc;
28963f89caaSJens Wiklander }
29063f89caaSJens Wiklander 
2914eb88651SRuchika Gupta static enum pkcs11_rc set_attributes_opt_or_null(struct obj_attrs **out,
2924eb88651SRuchika Gupta 						 struct obj_attrs *temp,
29316df60c7SEtienne Carriere 						 uint32_t const *attrs,
29416df60c7SEtienne Carriere 						 size_t attrs_count)
2954eb88651SRuchika Gupta {
29616df60c7SEtienne Carriere 	return set_optional_attributes_with_def(out, temp, attrs, attrs_count,
29716df60c7SEtienne Carriere 						true /* defaults to empty */);
2984eb88651SRuchika Gupta }
2994eb88651SRuchika Gupta 
3004eb88651SRuchika Gupta static enum pkcs11_rc set_optional_attributes(struct obj_attrs **out,
3014eb88651SRuchika Gupta 					      struct obj_attrs *temp,
30216df60c7SEtienne Carriere 					      uint32_t const *attrs,
30316df60c7SEtienne Carriere 					      size_t attrs_count)
3044eb88651SRuchika Gupta {
30516df60c7SEtienne Carriere 	return set_optional_attributes_with_def(out, temp, attrs, attrs_count,
30616df60c7SEtienne Carriere 						false /* no default value */);
3074eb88651SRuchika Gupta }
3084eb88651SRuchika Gupta 
30963f89caaSJens Wiklander /*
31063f89caaSJens Wiklander  * Below are listed the mandated or optional expected attributes for
31163f89caaSJens Wiklander  * PKCS#11 storage objects.
31263f89caaSJens Wiklander  *
31363f89caaSJens Wiklander  * Note: boolprops (mandated boolean attributes) PKCS11_CKA_ALWAYS_SENSITIVE,
31463f89caaSJens Wiklander  * and PKCS11_CKA_NEVER_EXTRACTABLE are set by the token, not provided
31563f89caaSJens Wiklander  * in the client template.
31663f89caaSJens Wiklander  */
31763f89caaSJens Wiklander 
31863f89caaSJens Wiklander /* PKCS#11 specification for any object (session/token) of the storage */
3194eb88651SRuchika Gupta static const uint32_t any_object_boolprops[] = {
32063f89caaSJens Wiklander 	PKCS11_CKA_TOKEN, PKCS11_CKA_PRIVATE,
32163f89caaSJens Wiklander 	PKCS11_CKA_MODIFIABLE, PKCS11_CKA_COPYABLE, PKCS11_CKA_DESTROYABLE,
32263f89caaSJens Wiklander };
32363f89caaSJens Wiklander 
3244eb88651SRuchika Gupta static const uint32_t any_object_opt_or_null[] = {
32563f89caaSJens Wiklander 	PKCS11_CKA_LABEL,
32663f89caaSJens Wiklander };
32763f89caaSJens Wiklander 
3284eb88651SRuchika Gupta /* PKCS#11 specification for raw data object (+any_object_xxx) */
3294eb88651SRuchika Gupta const uint32_t raw_data_opt_or_null[] = {
33063f89caaSJens Wiklander 	PKCS11_CKA_OBJECT_ID, PKCS11_CKA_APPLICATION, PKCS11_CKA_VALUE,
33163f89caaSJens Wiklander };
33263f89caaSJens Wiklander 
3334eb88651SRuchika Gupta /* PKCS#11 specification for any key object (+any_object_xxx) */
3344eb88651SRuchika Gupta static const uint32_t any_key_boolprops[] = {
33563f89caaSJens Wiklander 	PKCS11_CKA_DERIVE,
33663f89caaSJens Wiklander };
33763f89caaSJens Wiklander 
3384eb88651SRuchika Gupta static const uint32_t any_key_opt_or_null[] = {
33963f89caaSJens Wiklander 	PKCS11_CKA_ID,
34063f89caaSJens Wiklander 	PKCS11_CKA_START_DATE, PKCS11_CKA_END_DATE,
3414eb88651SRuchika Gupta };
3424eb88651SRuchika Gupta 
3434eb88651SRuchika Gupta static const uint32_t any_key_optional[] = {
34463f89caaSJens Wiklander 	PKCS11_CKA_ALLOWED_MECHANISMS,
34563f89caaSJens Wiklander };
34663f89caaSJens Wiklander 
3474eb88651SRuchika Gupta /* PKCS#11 specification for any symmetric key (+any_key_xxx) */
3484eb88651SRuchika Gupta static const uint32_t symm_key_boolprops[] = {
34963f89caaSJens Wiklander 	PKCS11_CKA_ENCRYPT, PKCS11_CKA_DECRYPT,
35063f89caaSJens Wiklander 	PKCS11_CKA_SIGN, PKCS11_CKA_VERIFY,
35163f89caaSJens Wiklander 	PKCS11_CKA_WRAP, PKCS11_CKA_UNWRAP,
35263f89caaSJens Wiklander 	PKCS11_CKA_SENSITIVE, PKCS11_CKA_EXTRACTABLE,
35363f89caaSJens Wiklander 	PKCS11_CKA_WRAP_WITH_TRUSTED, PKCS11_CKA_TRUSTED,
35463f89caaSJens Wiklander };
35563f89caaSJens Wiklander 
3564eb88651SRuchika Gupta static const uint32_t symm_key_opt_or_null[] = {
35763f89caaSJens Wiklander 	PKCS11_CKA_WRAP_TEMPLATE, PKCS11_CKA_UNWRAP_TEMPLATE,
3580ac5c695SRuchika Gupta 	PKCS11_CKA_DERIVE_TEMPLATE, PKCS11_CKA_VALUE,
3590ac5c695SRuchika Gupta };
3600ac5c695SRuchika Gupta 
3610ac5c695SRuchika Gupta static const uint32_t symm_key_optional[] = {
3620ac5c695SRuchika Gupta 	PKCS11_CKA_VALUE_LEN,
36363f89caaSJens Wiklander };
36463f89caaSJens Wiklander 
3654eb88651SRuchika Gupta /* PKCS#11 specification for any asymmetric public key (+any_key_xxx) */
3664eb88651SRuchika Gupta static const uint32_t public_key_boolprops[] = {
36763f89caaSJens Wiklander 	PKCS11_CKA_ENCRYPT, PKCS11_CKA_VERIFY, PKCS11_CKA_VERIFY_RECOVER,
36863f89caaSJens Wiklander 	PKCS11_CKA_WRAP,
36963f89caaSJens Wiklander 	PKCS11_CKA_TRUSTED,
37063f89caaSJens Wiklander };
37163f89caaSJens Wiklander 
3724eb88651SRuchika Gupta static const uint32_t public_key_mandated[] = {
37363f89caaSJens Wiklander };
37463f89caaSJens Wiklander 
3754eb88651SRuchika Gupta static const uint32_t public_key_opt_or_null[] = {
376edd95148SVesa Jääskeläinen 	PKCS11_CKA_SUBJECT, PKCS11_CKA_WRAP_TEMPLATE,
377edd95148SVesa Jääskeläinen 	PKCS11_CKA_PUBLIC_KEY_INFO,
37863f89caaSJens Wiklander };
37963f89caaSJens Wiklander 
3804eb88651SRuchika Gupta /* PKCS#11 specification for any asymmetric private key (+any_key_xxx) */
3814eb88651SRuchika Gupta static const uint32_t private_key_boolprops[] = {
38263f89caaSJens Wiklander 	PKCS11_CKA_DECRYPT, PKCS11_CKA_SIGN, PKCS11_CKA_SIGN_RECOVER,
38363f89caaSJens Wiklander 	PKCS11_CKA_UNWRAP,
38463f89caaSJens Wiklander 	PKCS11_CKA_SENSITIVE, PKCS11_CKA_EXTRACTABLE,
38563f89caaSJens Wiklander 	PKCS11_CKA_WRAP_WITH_TRUSTED, PKCS11_CKA_ALWAYS_AUTHENTICATE,
38663f89caaSJens Wiklander };
38763f89caaSJens Wiklander 
3884eb88651SRuchika Gupta static const uint32_t private_key_mandated[] = {
38963f89caaSJens Wiklander };
39063f89caaSJens Wiklander 
3914eb88651SRuchika Gupta static const uint32_t private_key_opt_or_null[] = {
392edd95148SVesa Jääskeläinen 	PKCS11_CKA_SUBJECT, PKCS11_CKA_UNWRAP_TEMPLATE,
393edd95148SVesa Jääskeläinen 	PKCS11_CKA_PUBLIC_KEY_INFO,
39463f89caaSJens Wiklander };
39563f89caaSJens Wiklander 
3964eb88651SRuchika Gupta /* PKCS#11 specification for any RSA key (+public/private_key_xxx) */
3974eb88651SRuchika Gupta static const uint32_t rsa_public_key_mandated[] = {
39863f89caaSJens Wiklander 	PKCS11_CKA_MODULUS_BITS,
39963f89caaSJens Wiklander };
40063f89caaSJens Wiklander 
4014eb88651SRuchika Gupta static const uint32_t rsa_public_key_opt_or_null[] = {
40263f89caaSJens Wiklander 	PKCS11_CKA_MODULUS, PKCS11_CKA_PUBLIC_EXPONENT,
40363f89caaSJens Wiklander };
40463f89caaSJens Wiklander 
4054eb88651SRuchika Gupta static const uint32_t rsa_private_key_opt_or_null[] = {
40663f89caaSJens Wiklander 	PKCS11_CKA_MODULUS, PKCS11_CKA_PUBLIC_EXPONENT,
40763f89caaSJens Wiklander 	PKCS11_CKA_PRIVATE_EXPONENT,
40863f89caaSJens Wiklander 	PKCS11_CKA_PRIME_1, PKCS11_CKA_PRIME_2,
40963f89caaSJens Wiklander 	PKCS11_CKA_EXPONENT_1, PKCS11_CKA_EXPONENT_2, PKCS11_CKA_COEFFICIENT,
41063f89caaSJens Wiklander };
41163f89caaSJens Wiklander 
4124eb88651SRuchika Gupta /* PKCS#11 specification for any EC key (+public/private_key_xxx) */
4134eb88651SRuchika Gupta static const uint32_t ec_public_key_mandated[] = {
41463f89caaSJens Wiklander 	PKCS11_CKA_EC_PARAMS,
41563f89caaSJens Wiklander };
41663f89caaSJens Wiklander 
4174eb88651SRuchika Gupta static const uint32_t ec_public_key_opt_or_null[] = {
41863f89caaSJens Wiklander 	PKCS11_CKA_EC_POINT,
41963f89caaSJens Wiklander };
42063f89caaSJens Wiklander 
4214eb88651SRuchika Gupta static const uint32_t ec_private_key_mandated[] = {
42263f89caaSJens Wiklander };
42363f89caaSJens Wiklander 
4244eb88651SRuchika Gupta static const uint32_t ec_private_key_opt_or_null[] = {
42502b16804SVesa Jääskeläinen 	PKCS11_CKA_EC_PARAMS,
42663f89caaSJens Wiklander 	PKCS11_CKA_VALUE,
42763f89caaSJens Wiklander };
42863f89caaSJens Wiklander 
42963f89caaSJens Wiklander static enum pkcs11_rc create_storage_attributes(struct obj_attrs **out,
43063f89caaSJens Wiklander 						struct obj_attrs *temp)
43163f89caaSJens Wiklander {
43263f89caaSJens Wiklander 	enum pkcs11_class_id class = PKCS11_CKO_UNDEFINED_ID;
43363f89caaSJens Wiklander 	enum pkcs11_rc rc = PKCS11_CKR_OK;
43463f89caaSJens Wiklander 
43563f89caaSJens Wiklander 	rc = init_attributes_head(out);
43663f89caaSJens Wiklander 	if (rc)
43763f89caaSJens Wiklander 		return rc;
43863f89caaSJens Wiklander 
43963f89caaSJens Wiklander 	/* Object class is mandatory */
44063f89caaSJens Wiklander 	class = get_class(temp);
44163f89caaSJens Wiklander 	if (class == PKCS11_CKO_UNDEFINED_ID) {
44263f89caaSJens Wiklander 		EMSG("Class attribute not found");
44363f89caaSJens Wiklander 
44463f89caaSJens Wiklander 		return PKCS11_CKR_TEMPLATE_INCONSISTENT;
44563f89caaSJens Wiklander 	}
44663f89caaSJens Wiklander 	rc = add_attribute(out, PKCS11_CKA_CLASS, &class, sizeof(uint32_t));
44763f89caaSJens Wiklander 	if (rc)
44863f89caaSJens Wiklander 		return rc;
44963f89caaSJens Wiklander 
4504eb88651SRuchika Gupta 	rc = set_mandatory_boolprops(out, temp, any_object_boolprops,
4514eb88651SRuchika Gupta 				     ARRAY_SIZE(any_object_boolprops));
45263f89caaSJens Wiklander 	if (rc)
45363f89caaSJens Wiklander 		return rc;
45463f89caaSJens Wiklander 
4554eb88651SRuchika Gupta 	return set_attributes_opt_or_null(out, temp, any_object_opt_or_null,
4564eb88651SRuchika Gupta 					  ARRAY_SIZE(any_object_opt_or_null));
45763f89caaSJens Wiklander }
45863f89caaSJens Wiklander 
45963f89caaSJens Wiklander static enum pkcs11_rc create_genkey_attributes(struct obj_attrs **out,
46063f89caaSJens Wiklander 					       struct obj_attrs *temp)
46163f89caaSJens Wiklander {
46263f89caaSJens Wiklander 	uint32_t type = PKCS11_CKO_UNDEFINED_ID;
46363f89caaSJens Wiklander 	enum pkcs11_rc rc = PKCS11_CKR_OK;
46463f89caaSJens Wiklander 
46563f89caaSJens Wiklander 	rc = create_storage_attributes(out, temp);
46663f89caaSJens Wiklander 	if (rc)
46763f89caaSJens Wiklander 		return rc;
46863f89caaSJens Wiklander 
46963f89caaSJens Wiklander 	type = get_key_type(temp);
47063f89caaSJens Wiklander 	if (type == PKCS11_CKK_UNDEFINED_ID) {
47163f89caaSJens Wiklander 		EMSG("Key type attribute not found");
47263f89caaSJens Wiklander 
47363f89caaSJens Wiklander 		return PKCS11_CKR_TEMPLATE_INCONSISTENT;
47463f89caaSJens Wiklander 	}
47563f89caaSJens Wiklander 	rc = add_attribute(out, PKCS11_CKA_KEY_TYPE, &type, sizeof(uint32_t));
47663f89caaSJens Wiklander 	if (rc)
47763f89caaSJens Wiklander 		return rc;
47863f89caaSJens Wiklander 
4794eb88651SRuchika Gupta 	rc = set_mandatory_boolprops(out, temp, any_key_boolprops,
4804eb88651SRuchika Gupta 				     ARRAY_SIZE(any_key_boolprops));
48163f89caaSJens Wiklander 	if (rc)
48263f89caaSJens Wiklander 		return rc;
48363f89caaSJens Wiklander 
4844eb88651SRuchika Gupta 	rc = set_attributes_opt_or_null(out, temp, any_key_opt_or_null,
4854eb88651SRuchika Gupta 					ARRAY_SIZE(any_key_opt_or_null));
4864eb88651SRuchika Gupta 	if (rc)
4874eb88651SRuchika Gupta 		return rc;
4884eb88651SRuchika Gupta 
4894eb88651SRuchika Gupta 	return set_optional_attributes(out, temp, any_key_optional,
4904eb88651SRuchika Gupta 				       ARRAY_SIZE(any_key_optional));
4914eb88651SRuchika Gupta 
49263f89caaSJens Wiklander }
49363f89caaSJens Wiklander 
49463f89caaSJens Wiklander static enum pkcs11_rc create_symm_key_attributes(struct obj_attrs **out,
49563f89caaSJens Wiklander 						 struct obj_attrs *temp)
49663f89caaSJens Wiklander {
49763f89caaSJens Wiklander 	enum pkcs11_rc rc = PKCS11_CKR_OK;
49863f89caaSJens Wiklander 
49963f89caaSJens Wiklander 	assert(get_class(temp) == PKCS11_CKO_SECRET_KEY);
50063f89caaSJens Wiklander 
50163f89caaSJens Wiklander 	rc = create_genkey_attributes(out, temp);
50263f89caaSJens Wiklander 	if (rc)
50363f89caaSJens Wiklander 		return rc;
50463f89caaSJens Wiklander 
50563f89caaSJens Wiklander 	assert(get_class(*out) == PKCS11_CKO_SECRET_KEY);
50663f89caaSJens Wiklander 
50763f89caaSJens Wiklander 	switch (get_key_type(*out)) {
50863f89caaSJens Wiklander 	case PKCS11_CKK_GENERIC_SECRET:
50963f89caaSJens Wiklander 	case PKCS11_CKK_AES:
51063f89caaSJens Wiklander 	case PKCS11_CKK_MD5_HMAC:
51163f89caaSJens Wiklander 	case PKCS11_CKK_SHA_1_HMAC:
51263f89caaSJens Wiklander 	case PKCS11_CKK_SHA256_HMAC:
51363f89caaSJens Wiklander 	case PKCS11_CKK_SHA384_HMAC:
51463f89caaSJens Wiklander 	case PKCS11_CKK_SHA512_HMAC:
51563f89caaSJens Wiklander 	case PKCS11_CKK_SHA224_HMAC:
51663f89caaSJens Wiklander 		break;
51763f89caaSJens Wiklander 	default:
51863f89caaSJens Wiklander 		EMSG("Invalid key type %#"PRIx32"/%s",
51963f89caaSJens Wiklander 		     get_key_type(*out), id2str_key_type(get_key_type(*out)));
52063f89caaSJens Wiklander 
52163f89caaSJens Wiklander 		return PKCS11_CKR_TEMPLATE_INCONSISTENT;
52263f89caaSJens Wiklander 	}
52363f89caaSJens Wiklander 
5244eb88651SRuchika Gupta 	rc = set_mandatory_boolprops(out, temp, symm_key_boolprops,
5254eb88651SRuchika Gupta 				     ARRAY_SIZE(symm_key_boolprops));
52663f89caaSJens Wiklander 	if (rc)
52763f89caaSJens Wiklander 		return rc;
52863f89caaSJens Wiklander 
5290ac5c695SRuchika Gupta 	rc = set_attributes_opt_or_null(out, temp, symm_key_opt_or_null,
5304eb88651SRuchika Gupta 					ARRAY_SIZE(symm_key_opt_or_null));
5310ac5c695SRuchika Gupta 	if (rc)
5320ac5c695SRuchika Gupta 		return rc;
5330ac5c695SRuchika Gupta 
5340ac5c695SRuchika Gupta 	return set_optional_attributes(out, temp, symm_key_optional,
5350ac5c695SRuchika Gupta 				       ARRAY_SIZE(symm_key_optional));
53663f89caaSJens Wiklander }
53763f89caaSJens Wiklander 
53863f89caaSJens Wiklander static enum pkcs11_rc create_data_attributes(struct obj_attrs **out,
53963f89caaSJens Wiklander 					     struct obj_attrs *temp)
54063f89caaSJens Wiklander {
54163f89caaSJens Wiklander 	enum pkcs11_rc rc = PKCS11_CKR_OK;
54263f89caaSJens Wiklander 
54363f89caaSJens Wiklander 	assert(get_class(temp) == PKCS11_CKO_DATA);
54463f89caaSJens Wiklander 
54563f89caaSJens Wiklander 	rc = create_storage_attributes(out, temp);
54663f89caaSJens Wiklander 	if (rc)
54763f89caaSJens Wiklander 		return rc;
54863f89caaSJens Wiklander 
54963f89caaSJens Wiklander 	assert(get_class(*out) == PKCS11_CKO_DATA);
55063f89caaSJens Wiklander 
5514eb88651SRuchika Gupta 	return set_attributes_opt_or_null(out, temp, raw_data_opt_or_null,
5524eb88651SRuchika Gupta 					  ARRAY_SIZE(raw_data_opt_or_null));
55363f89caaSJens Wiklander }
55463f89caaSJens Wiklander 
55563f89caaSJens Wiklander static enum pkcs11_rc create_pub_key_attributes(struct obj_attrs **out,
55663f89caaSJens Wiklander 						struct obj_attrs *temp)
55763f89caaSJens Wiklander {
55863f89caaSJens Wiklander 	uint32_t const *mandated = NULL;
5594eb88651SRuchika Gupta 	uint32_t const *opt_or_null = NULL;
56063f89caaSJens Wiklander 	size_t mandated_count = 0;
5614eb88651SRuchika Gupta 	size_t opt_or_null_count = 0;
56263f89caaSJens Wiklander 	enum pkcs11_rc rc = PKCS11_CKR_OK;
56363f89caaSJens Wiklander 
56463f89caaSJens Wiklander 	assert(get_class(temp) == PKCS11_CKO_PUBLIC_KEY);
56563f89caaSJens Wiklander 
56663f89caaSJens Wiklander 	rc = create_genkey_attributes(out, temp);
56763f89caaSJens Wiklander 	if (rc)
56863f89caaSJens Wiklander 		return rc;
56963f89caaSJens Wiklander 
57063f89caaSJens Wiklander 	assert(get_class(*out) == PKCS11_CKO_PUBLIC_KEY);
57163f89caaSJens Wiklander 
5724eb88651SRuchika Gupta 	rc = set_mandatory_boolprops(out, temp, public_key_boolprops,
5734eb88651SRuchika Gupta 				     ARRAY_SIZE(public_key_boolprops));
57463f89caaSJens Wiklander 	if (rc)
57563f89caaSJens Wiklander 		return rc;
57663f89caaSJens Wiklander 
5774eb88651SRuchika Gupta 	rc = set_mandatory_attributes(out, temp, public_key_mandated,
5784eb88651SRuchika Gupta 				      ARRAY_SIZE(public_key_mandated));
57963f89caaSJens Wiklander 	if (rc)
58063f89caaSJens Wiklander 		return rc;
58163f89caaSJens Wiklander 
5824eb88651SRuchika Gupta 	rc = set_attributes_opt_or_null(out, temp,
5834eb88651SRuchika Gupta 					public_key_opt_or_null,
5844eb88651SRuchika Gupta 					ARRAY_SIZE(public_key_opt_or_null));
58563f89caaSJens Wiklander 	if (rc)
58663f89caaSJens Wiklander 		return rc;
58763f89caaSJens Wiklander 
58863f89caaSJens Wiklander 	switch (get_key_type(*out)) {
58963f89caaSJens Wiklander 	case PKCS11_CKK_RSA:
5904eb88651SRuchika Gupta 		mandated = rsa_public_key_mandated;
5914eb88651SRuchika Gupta 		opt_or_null = rsa_public_key_opt_or_null;
5924eb88651SRuchika Gupta 		mandated_count = ARRAY_SIZE(rsa_public_key_mandated);
5934eb88651SRuchika Gupta 		opt_or_null_count = ARRAY_SIZE(rsa_public_key_opt_or_null);
59463f89caaSJens Wiklander 		break;
59563f89caaSJens Wiklander 	case PKCS11_CKK_EC:
5964eb88651SRuchika Gupta 		mandated = ec_public_key_mandated;
5974eb88651SRuchika Gupta 		opt_or_null = ec_public_key_opt_or_null;
5984eb88651SRuchika Gupta 		mandated_count = ARRAY_SIZE(ec_public_key_mandated);
5994eb88651SRuchika Gupta 		opt_or_null_count = ARRAY_SIZE(ec_public_key_opt_or_null);
60063f89caaSJens Wiklander 		break;
60163f89caaSJens Wiklander 	default:
60263f89caaSJens Wiklander 		EMSG("Invalid key type %#"PRIx32"/%s",
60363f89caaSJens Wiklander 		     get_key_type(*out), id2str_key_type(get_key_type(*out)));
60463f89caaSJens Wiklander 
60563f89caaSJens Wiklander 		return PKCS11_CKR_TEMPLATE_INCONSISTENT;
60663f89caaSJens Wiklander 	}
60763f89caaSJens Wiklander 
60863f89caaSJens Wiklander 	rc = set_mandatory_attributes(out, temp, mandated, mandated_count);
60963f89caaSJens Wiklander 	if (rc)
61063f89caaSJens Wiklander 		return rc;
61163f89caaSJens Wiklander 
6124eb88651SRuchika Gupta 	return set_attributes_opt_or_null(out, temp, opt_or_null,
6134eb88651SRuchika Gupta 					  opt_or_null_count);
61463f89caaSJens Wiklander }
61563f89caaSJens Wiklander 
61663f89caaSJens Wiklander static enum pkcs11_rc create_priv_key_attributes(struct obj_attrs **out,
61763f89caaSJens Wiklander 						 struct obj_attrs *temp)
61863f89caaSJens Wiklander {
61963f89caaSJens Wiklander 	uint32_t const *mandated = NULL;
6204eb88651SRuchika Gupta 	uint32_t const *opt_or_null = NULL;
62163f89caaSJens Wiklander 	size_t mandated_count = 0;
6224eb88651SRuchika Gupta 	size_t opt_or_null_count = 0;
62363f89caaSJens Wiklander 	enum pkcs11_rc rc = PKCS11_CKR_OK;
62463f89caaSJens Wiklander 
62563f89caaSJens Wiklander 	assert(get_class(temp) == PKCS11_CKO_PRIVATE_KEY);
62663f89caaSJens Wiklander 
62763f89caaSJens Wiklander 	rc = create_genkey_attributes(out, temp);
62863f89caaSJens Wiklander 	if (rc)
62963f89caaSJens Wiklander 		return rc;
63063f89caaSJens Wiklander 
63163f89caaSJens Wiklander 	assert(get_class(*out) == PKCS11_CKO_PRIVATE_KEY);
63263f89caaSJens Wiklander 
6334eb88651SRuchika Gupta 	rc = set_mandatory_boolprops(out, temp, private_key_boolprops,
6344eb88651SRuchika Gupta 				     ARRAY_SIZE(private_key_boolprops));
63563f89caaSJens Wiklander 	if (rc)
63663f89caaSJens Wiklander 		return rc;
63763f89caaSJens Wiklander 
6384eb88651SRuchika Gupta 	rc = set_mandatory_attributes(out, temp, private_key_mandated,
6394eb88651SRuchika Gupta 				      ARRAY_SIZE(private_key_mandated));
64063f89caaSJens Wiklander 	if (rc)
64163f89caaSJens Wiklander 		return rc;
64263f89caaSJens Wiklander 
6434eb88651SRuchika Gupta 	rc = set_attributes_opt_or_null(out, temp, private_key_opt_or_null,
6444eb88651SRuchika Gupta 					ARRAY_SIZE(private_key_opt_or_null));
64563f89caaSJens Wiklander 	if (rc)
64663f89caaSJens Wiklander 		return rc;
64763f89caaSJens Wiklander 
64863f89caaSJens Wiklander 	switch (get_key_type(*out)) {
64963f89caaSJens Wiklander 	case PKCS11_CKK_RSA:
6504eb88651SRuchika Gupta 		opt_or_null = rsa_private_key_opt_or_null;
6514eb88651SRuchika Gupta 		opt_or_null_count = ARRAY_SIZE(rsa_private_key_opt_or_null);
65263f89caaSJens Wiklander 		break;
65363f89caaSJens Wiklander 	case PKCS11_CKK_EC:
6544eb88651SRuchika Gupta 		mandated = ec_private_key_mandated;
6554eb88651SRuchika Gupta 		opt_or_null = ec_private_key_opt_or_null;
6564eb88651SRuchika Gupta 		mandated_count = ARRAY_SIZE(ec_private_key_mandated);
6574eb88651SRuchika Gupta 		opt_or_null_count = ARRAY_SIZE(ec_private_key_opt_or_null);
65863f89caaSJens Wiklander 		break;
65963f89caaSJens Wiklander 	default:
66063f89caaSJens Wiklander 		EMSG("Invalid key type %#"PRIx32"/%s",
66163f89caaSJens Wiklander 		     get_key_type(*out), id2str_key_type(get_key_type(*out)));
66263f89caaSJens Wiklander 
66363f89caaSJens Wiklander 		return PKCS11_CKR_TEMPLATE_INCONSISTENT;
66463f89caaSJens Wiklander 	}
66563f89caaSJens Wiklander 
66663f89caaSJens Wiklander 	rc = set_mandatory_attributes(out, temp, mandated, mandated_count);
66763f89caaSJens Wiklander 	if (rc)
66863f89caaSJens Wiklander 		return rc;
66963f89caaSJens Wiklander 
6704eb88651SRuchika Gupta 	return set_attributes_opt_or_null(out, temp, opt_or_null,
6714eb88651SRuchika Gupta 					  opt_or_null_count);
67263f89caaSJens Wiklander }
67363f89caaSJens Wiklander 
674196bcd93SRuchika Gupta static enum pkcs11_rc
675196bcd93SRuchika Gupta sanitize_symm_key_attributes(struct obj_attrs **temp,
676196bcd93SRuchika Gupta 			     enum processing_func function)
677196bcd93SRuchika Gupta {
678196bcd93SRuchika Gupta 	enum pkcs11_rc rc = PKCS11_CKR_OK;
679196bcd93SRuchika Gupta 	uint32_t a_size = 0;
680196bcd93SRuchika Gupta 
681196bcd93SRuchika Gupta 	assert(get_class(*temp) == PKCS11_CKO_SECRET_KEY);
682196bcd93SRuchika Gupta 
683196bcd93SRuchika Gupta 	rc = get_attribute_ptr(*temp, PKCS11_CKA_VALUE, NULL, &a_size);
684196bcd93SRuchika Gupta 
685196bcd93SRuchika Gupta 	switch (get_key_type(*temp)) {
686196bcd93SRuchika Gupta 	case PKCS11_CKK_GENERIC_SECRET:
687196bcd93SRuchika Gupta 	case PKCS11_CKK_AES:
688196bcd93SRuchika Gupta 	case PKCS11_CKK_MD5_HMAC:
689196bcd93SRuchika Gupta 	case PKCS11_CKK_SHA_1_HMAC:
690196bcd93SRuchika Gupta 	case PKCS11_CKK_SHA256_HMAC:
691196bcd93SRuchika Gupta 	case PKCS11_CKK_SHA384_HMAC:
692196bcd93SRuchika Gupta 	case PKCS11_CKK_SHA512_HMAC:
693196bcd93SRuchika Gupta 	case PKCS11_CKK_SHA224_HMAC:
694196bcd93SRuchika Gupta 		switch (function) {
695196bcd93SRuchika Gupta 		case PKCS11_FUNCTION_IMPORT:
696196bcd93SRuchika Gupta 			/* CKA_VALUE is a mandatory with C_CreateObject */
697196bcd93SRuchika Gupta 			if (rc || a_size == 0)
698196bcd93SRuchika Gupta 				return PKCS11_CKR_TEMPLATE_INCONSISTENT;
699196bcd93SRuchika Gupta 
700196bcd93SRuchika Gupta 			if (get_attribute_ptr(*temp, PKCS11_CKA_VALUE_LEN, NULL,
701196bcd93SRuchika Gupta 					      NULL) != PKCS11_RV_NOT_FOUND)
702196bcd93SRuchika Gupta 				return PKCS11_CKR_TEMPLATE_INCONSISTENT;
703196bcd93SRuchika Gupta 
704196bcd93SRuchika Gupta 			return add_attribute(temp, PKCS11_CKA_VALUE_LEN,
705196bcd93SRuchika Gupta 					     &a_size, sizeof(uint32_t));
706196bcd93SRuchika Gupta 		case PKCS11_FUNCTION_GENERATE:
707196bcd93SRuchika Gupta 			if (rc != PKCS11_RV_NOT_FOUND)
708196bcd93SRuchika Gupta 				return PKCS11_CKR_TEMPLATE_INCONSISTENT;
709196bcd93SRuchika Gupta 			break;
710196bcd93SRuchika Gupta 		default:
711196bcd93SRuchika Gupta 			break;
712196bcd93SRuchika Gupta 		}
713196bcd93SRuchika Gupta 		break;
714196bcd93SRuchika Gupta 	default:
715196bcd93SRuchika Gupta 		EMSG("Invalid key type %#"PRIx32"/%s",
716196bcd93SRuchika Gupta 		     get_key_type(*temp), id2str_key_type(get_key_type(*temp)));
717196bcd93SRuchika Gupta 
718196bcd93SRuchika Gupta 		return PKCS11_CKR_TEMPLATE_INCONSISTENT;
719196bcd93SRuchika Gupta 	}
720196bcd93SRuchika Gupta 
721196bcd93SRuchika Gupta 	return PKCS11_CKR_OK;
722196bcd93SRuchika Gupta }
723196bcd93SRuchika Gupta 
72463f89caaSJens Wiklander /*
72563f89caaSJens Wiklander  * Create an attribute list for a new object from a template and a parent
72663f89caaSJens Wiklander  * object (optional) for an object generation function (generate, copy,
72763f89caaSJens Wiklander  * derive...).
72863f89caaSJens Wiklander  *
72963f89caaSJens Wiklander  * PKCS#11 directives on the supplied template and expected return value:
73063f89caaSJens Wiklander  * - template has an invalid attribute ID: ATTRIBUTE_TYPE_INVALID
73163f89caaSJens Wiklander  * - template has an invalid value for an attribute: ATTRIBUTE_VALID_INVALID
73263f89caaSJens Wiklander  * - template has value for a read-only attribute: ATTRIBUTE_READ_ONLY
73363f89caaSJens Wiklander  * - template+default+parent => still miss an attribute: TEMPLATE_INCONSISTENT
73463f89caaSJens Wiklander  *
73563f89caaSJens Wiklander  * INFO on PKCS11_CMD_COPY_OBJECT:
73663f89caaSJens Wiklander  * - parent PKCS11_CKA_COPYIABLE=false => return ACTION_PROHIBITED.
73763f89caaSJens Wiklander  * - template can specify PKCS11_CKA_TOKEN, PKCS11_CKA_PRIVATE,
73863f89caaSJens Wiklander  *   PKCS11_CKA_MODIFIABLE, PKCS11_CKA_DESTROYABLE.
73963f89caaSJens Wiklander  * - SENSITIVE can change from false to true, not from true to false.
74063f89caaSJens Wiklander  * - LOCAL is the parent LOCAL
74163f89caaSJens Wiklander  */
74263f89caaSJens Wiklander enum pkcs11_rc
74363f89caaSJens Wiklander create_attributes_from_template(struct obj_attrs **out, void *template,
74463f89caaSJens Wiklander 				size_t template_size,
74548799892SRuchika Gupta 				struct obj_attrs *parent,
74663f89caaSJens Wiklander 				enum processing_func function,
7474cfce748SRuchika Gupta 				enum pkcs11_mechanism_id mecha,
74802b16804SVesa Jääskeläinen 				enum pkcs11_class_id template_class)
74963f89caaSJens Wiklander {
75063f89caaSJens Wiklander 	struct obj_attrs *temp = NULL;
75163f89caaSJens Wiklander 	struct obj_attrs *attrs = NULL;
75263f89caaSJens Wiklander 	enum pkcs11_rc rc = PKCS11_CKR_OK;
75363f89caaSJens Wiklander 	uint8_t local = 0;
75463f89caaSJens Wiklander 	uint8_t always_sensitive = 0;
75563f89caaSJens Wiklander 	uint8_t never_extract = 0;
756e3f0cb56SRuchika Gupta 	uint8_t extractable = 0;
757fa247a2aSRuchika Gupta 	uint32_t class = PKCS11_UNDEFINED_ID;
758fa247a2aSRuchika Gupta 	uint32_t type = PKCS11_UNDEFINED_ID;
75963f89caaSJens Wiklander 	uint32_t mechanism_id = PKCS11_CKM_UNDEFINED_ID;
760e3f0cb56SRuchika Gupta 	struct obj_attrs *req_attrs = NULL;
761e3f0cb56SRuchika Gupta 	uint32_t size = 0;
762e3f0cb56SRuchika Gupta 	uint32_t indirect_template = PKCS11_CKA_UNDEFINED_ID;
76363f89caaSJens Wiklander 
76463f89caaSJens Wiklander #ifdef DEBUG	/* Sanity: check function argument */
76563f89caaSJens Wiklander 	trace_attributes_from_api_head("template", template, template_size);
76663f89caaSJens Wiklander 	switch (function) {
767fa247a2aSRuchika Gupta 	case PKCS11_FUNCTION_GENERATE:
768013934d8SVesa Jääskeläinen 	case PKCS11_FUNCTION_GENERATE_PAIR:
76963f89caaSJens Wiklander 	case PKCS11_FUNCTION_IMPORT:
7702d25a9bcSRuchika Gupta 	case PKCS11_FUNCTION_MODIFY:
77148799892SRuchika Gupta 	case PKCS11_FUNCTION_DERIVE:
772e3f0cb56SRuchika Gupta 	case PKCS11_FUNCTION_UNWRAP:
7732d25a9bcSRuchika Gupta 	case PKCS11_FUNCTION_COPY:
77463f89caaSJens Wiklander 		break;
77563f89caaSJens Wiklander 	default:
77663f89caaSJens Wiklander 		TEE_Panic(TEE_ERROR_NOT_SUPPORTED);
77763f89caaSJens Wiklander 	}
77863f89caaSJens Wiklander #endif
77963f89caaSJens Wiklander 
780dcad3409SRuchika Gupta 	/*
781dcad3409SRuchika Gupta 	 * For PKCS11_FUNCTION_GENERATE, find the class and type
782dcad3409SRuchika Gupta 	 * based on the mechanism. These will be passed as hint
783dcad3409SRuchika Gupta 	 * sanitize_client_object() and added in temp if not
784dcad3409SRuchika Gupta 	 * already present
785dcad3409SRuchika Gupta 	 */
786dcad3409SRuchika Gupta 	if (function == PKCS11_FUNCTION_GENERATE) {
787fa247a2aSRuchika Gupta 		switch (mecha) {
788fa247a2aSRuchika Gupta 		case PKCS11_CKM_GENERIC_SECRET_KEY_GEN:
789fa247a2aSRuchika Gupta 			class = PKCS11_CKO_SECRET_KEY;
790fa247a2aSRuchika Gupta 			type = PKCS11_CKK_GENERIC_SECRET;
791fa247a2aSRuchika Gupta 			break;
792fa247a2aSRuchika Gupta 		case PKCS11_CKM_AES_KEY_GEN:
793fa247a2aSRuchika Gupta 			class = PKCS11_CKO_SECRET_KEY;
794fa247a2aSRuchika Gupta 			type = PKCS11_CKK_AES;
795fa247a2aSRuchika Gupta 			break;
796fa247a2aSRuchika Gupta 		default:
797dcad3409SRuchika Gupta 			TEE_Panic(TEE_ERROR_NOT_SUPPORTED);
798fa247a2aSRuchika Gupta 		}
799fa247a2aSRuchika Gupta 	}
800fa247a2aSRuchika Gupta 
8012d25a9bcSRuchika Gupta 	/*
802013934d8SVesa Jääskeläinen 	 * For PKCS11_FUNCTION_GENERATE_PAIR, find the class and type
803013934d8SVesa Jääskeläinen 	 * based on the mechanism. These will be passed as hint
804013934d8SVesa Jääskeläinen 	 * sanitize_client_object() and added in temp if not
805013934d8SVesa Jääskeläinen 	 * already present
806013934d8SVesa Jääskeläinen 	 */
807013934d8SVesa Jääskeläinen 	if (function == PKCS11_FUNCTION_GENERATE_PAIR) {
808013934d8SVesa Jääskeläinen 		switch (mecha) {
80902b16804SVesa Jääskeläinen 		case PKCS11_CKM_EC_KEY_PAIR_GEN:
81002b16804SVesa Jääskeläinen 			class = template_class;
81102b16804SVesa Jääskeläinen 			type = PKCS11_CKK_EC;
81202b16804SVesa Jääskeläinen 			break;
81386922832SVesa Jääskeläinen 		case PKCS11_CKM_RSA_PKCS_KEY_PAIR_GEN:
81486922832SVesa Jääskeläinen 			class = template_class;
81586922832SVesa Jääskeläinen 			type = PKCS11_CKK_RSA;
81686922832SVesa Jääskeläinen 			break;
817013934d8SVesa Jääskeläinen 		default:
818013934d8SVesa Jääskeläinen 			TEE_Panic(TEE_ERROR_NOT_SUPPORTED);
819013934d8SVesa Jääskeläinen 		}
820013934d8SVesa Jääskeläinen 	}
821013934d8SVesa Jääskeläinen 
822013934d8SVesa Jääskeläinen 	/*
8232d25a9bcSRuchika Gupta 	 * Check and remove duplicates if any and create a new temporary
8242d25a9bcSRuchika Gupta 	 * template
8252d25a9bcSRuchika Gupta 	 */
826dcad3409SRuchika Gupta 	rc = sanitize_client_object(&temp, template, template_size, class,
827dcad3409SRuchika Gupta 				    type);
828dcad3409SRuchika Gupta 	if (rc)
829dcad3409SRuchika Gupta 		goto out;
830dcad3409SRuchika Gupta 
831dcad3409SRuchika Gupta 	/*
8322d25a9bcSRuchika Gupta 	 * For function type modify and copy return the created template
8332d25a9bcSRuchika Gupta 	 * from here. Rest of the code below is for creating objects
8342d25a9bcSRuchika Gupta 	 * or generating keys.
8352d25a9bcSRuchika Gupta 	 */
8362d25a9bcSRuchika Gupta 	switch (function) {
8372d25a9bcSRuchika Gupta 	case PKCS11_FUNCTION_MODIFY:
8382d25a9bcSRuchika Gupta 	case PKCS11_FUNCTION_COPY:
8392d25a9bcSRuchika Gupta 		*out = temp;
8402d25a9bcSRuchika Gupta 		return rc;
841e3f0cb56SRuchika Gupta 	case PKCS11_FUNCTION_DERIVE:
842e3f0cb56SRuchika Gupta 	case PKCS11_FUNCTION_UNWRAP:
843e3f0cb56SRuchika Gupta 		if (function == PKCS11_FUNCTION_UNWRAP)
844e3f0cb56SRuchika Gupta 			indirect_template = PKCS11_CKA_UNWRAP_TEMPLATE;
845e3f0cb56SRuchika Gupta 		else
846e3f0cb56SRuchika Gupta 			indirect_template = PKCS11_CKA_DERIVE_TEMPLATE;
847e3f0cb56SRuchika Gupta 
848e3f0cb56SRuchika Gupta 		rc = get_attribute_ptr(parent, indirect_template,
849e3f0cb56SRuchika Gupta 				       (void *)&req_attrs, &size);
850e3f0cb56SRuchika Gupta 		if (rc == PKCS11_CKR_OK && size != 0) {
851e3f0cb56SRuchika Gupta 			rc = attributes_match_add_reference(&temp, req_attrs);
852e3f0cb56SRuchika Gupta 			if (rc)
853e3f0cb56SRuchika Gupta 				goto out;
854e3f0cb56SRuchika Gupta 		}
855e3f0cb56SRuchika Gupta 		break;
8562d25a9bcSRuchika Gupta 	default:
8572d25a9bcSRuchika Gupta 		break;
8582d25a9bcSRuchika Gupta 	}
8592d25a9bcSRuchika Gupta 
8602d25a9bcSRuchika Gupta 	/*
861dcad3409SRuchika Gupta 	 * Check if class and type in temp are consistent with the mechanism
862dcad3409SRuchika Gupta 	 */
863fa247a2aSRuchika Gupta 	switch (mecha) {
864fa247a2aSRuchika Gupta 	case PKCS11_CKM_GENERIC_SECRET_KEY_GEN:
865fa247a2aSRuchika Gupta 		if (get_class(temp) != PKCS11_CKO_SECRET_KEY ||
866fa247a2aSRuchika Gupta 		    get_key_type(temp) != PKCS11_CKK_GENERIC_SECRET) {
867fa247a2aSRuchika Gupta 			rc = PKCS11_CKR_TEMPLATE_INCONSISTENT;
868fa247a2aSRuchika Gupta 			goto out;
869fa247a2aSRuchika Gupta 		}
870fa247a2aSRuchika Gupta 		break;
871fa247a2aSRuchika Gupta 	case PKCS11_CKM_AES_KEY_GEN:
872fa247a2aSRuchika Gupta 		if (get_class(temp) != PKCS11_CKO_SECRET_KEY ||
873fa247a2aSRuchika Gupta 		    get_key_type(temp) != PKCS11_CKK_AES) {
874fa247a2aSRuchika Gupta 			rc = PKCS11_CKR_TEMPLATE_INCONSISTENT;
875fa247a2aSRuchika Gupta 			goto out;
876fa247a2aSRuchika Gupta 		}
877fa247a2aSRuchika Gupta 		break;
87802b16804SVesa Jääskeläinen 	case PKCS11_CKM_EC_KEY_PAIR_GEN:
87902b16804SVesa Jääskeläinen 		if ((get_class(temp) != PKCS11_CKO_PUBLIC_KEY &&
88002b16804SVesa Jääskeläinen 		     get_class(temp) != PKCS11_CKO_PRIVATE_KEY) ||
88102b16804SVesa Jääskeläinen 		    get_key_type(temp) != PKCS11_CKK_EC) {
88202b16804SVesa Jääskeläinen 			rc = PKCS11_CKR_TEMPLATE_INCONSISTENT;
88302b16804SVesa Jääskeläinen 			goto out;
88402b16804SVesa Jääskeläinen 		}
88502b16804SVesa Jääskeläinen 		break;
88686922832SVesa Jääskeläinen 	case PKCS11_CKM_RSA_PKCS_KEY_PAIR_GEN:
88786922832SVesa Jääskeläinen 		if ((get_class(temp) != PKCS11_CKO_PUBLIC_KEY &&
88886922832SVesa Jääskeläinen 		     get_class(temp) != PKCS11_CKO_PRIVATE_KEY) ||
88986922832SVesa Jääskeläinen 		    get_key_type(temp) != PKCS11_CKK_RSA) {
89086922832SVesa Jääskeläinen 			rc = PKCS11_CKR_TEMPLATE_INCONSISTENT;
89186922832SVesa Jääskeläinen 			goto out;
89286922832SVesa Jääskeläinen 		}
89386922832SVesa Jääskeläinen 		break;
894fa247a2aSRuchika Gupta 	default:
895fa247a2aSRuchika Gupta 		break;
896fa247a2aSRuchika Gupta 	}
89763f89caaSJens Wiklander 
89863f89caaSJens Wiklander 	if (!sanitize_consistent_class_and_type(temp)) {
89963f89caaSJens Wiklander 		EMSG("Inconsistent class/type");
90063f89caaSJens Wiklander 		rc = PKCS11_CKR_TEMPLATE_INCONSISTENT;
90163f89caaSJens Wiklander 		goto out;
90263f89caaSJens Wiklander 	}
90363f89caaSJens Wiklander 
904e3f0cb56SRuchika Gupta 	/*
905e3f0cb56SRuchika Gupta 	 * TBD - Add a check to see if temp contains any attribute which
906e3f0cb56SRuchika Gupta 	 * is not consistent with the object class or type and return error.
907e3f0cb56SRuchika Gupta 	 * In current implementation such attributes are ignored and not
908e3f0cb56SRuchika Gupta 	 * added to final object while PKCS#11 specification expects a
909e3f0cb56SRuchika Gupta 	 * failure and an error code be returned.
910e3f0cb56SRuchika Gupta 	 */
911e3f0cb56SRuchika Gupta 
91263f89caaSJens Wiklander 	switch (get_class(temp)) {
91363f89caaSJens Wiklander 	case PKCS11_CKO_DATA:
91463f89caaSJens Wiklander 		rc = create_data_attributes(&attrs, temp);
91563f89caaSJens Wiklander 		break;
91663f89caaSJens Wiklander 	case PKCS11_CKO_SECRET_KEY:
917196bcd93SRuchika Gupta 		rc = sanitize_symm_key_attributes(&temp, function);
918196bcd93SRuchika Gupta 		if (rc)
919196bcd93SRuchika Gupta 			goto out;
92063f89caaSJens Wiklander 		rc = create_symm_key_attributes(&attrs, temp);
92163f89caaSJens Wiklander 		break;
92263f89caaSJens Wiklander 	case PKCS11_CKO_PUBLIC_KEY:
92363f89caaSJens Wiklander 		rc = create_pub_key_attributes(&attrs, temp);
92463f89caaSJens Wiklander 		break;
92563f89caaSJens Wiklander 	case PKCS11_CKO_PRIVATE_KEY:
92663f89caaSJens Wiklander 		rc = create_priv_key_attributes(&attrs, temp);
92763f89caaSJens Wiklander 		break;
92863f89caaSJens Wiklander 	default:
92963f89caaSJens Wiklander 		DMSG("Invalid object class %#"PRIx32"/%s",
93063f89caaSJens Wiklander 		     get_class(temp), id2str_class(get_class(temp)));
93163f89caaSJens Wiklander 
93263f89caaSJens Wiklander 		rc = PKCS11_CKR_TEMPLATE_INCONSISTENT;
93363f89caaSJens Wiklander 		break;
93463f89caaSJens Wiklander 	}
93563f89caaSJens Wiklander 	if (rc)
93663f89caaSJens Wiklander 		goto out;
93763f89caaSJens Wiklander 
93890c47fe2SRuchika Gupta 	if (get_attribute_ptr(temp, PKCS11_CKA_LOCAL, NULL, NULL) !=
939002f6b93SEtienne Carriere 	    PKCS11_RV_NOT_FOUND) {
940002f6b93SEtienne Carriere 		rc = PKCS11_CKR_TEMPLATE_INCONSISTENT;
94163f89caaSJens Wiklander 		goto out;
942002f6b93SEtienne Carriere 	}
94363f89caaSJens Wiklander 
94490c47fe2SRuchika Gupta 	if (get_attribute_ptr(temp, PKCS11_CKA_KEY_GEN_MECHANISM, NULL, NULL) !=
945002f6b93SEtienne Carriere 	    PKCS11_RV_NOT_FOUND) {
946002f6b93SEtienne Carriere 		rc = PKCS11_CKR_TEMPLATE_INCONSISTENT;
94763f89caaSJens Wiklander 		goto out;
948002f6b93SEtienne Carriere 	}
94963f89caaSJens Wiklander 
95063f89caaSJens Wiklander 	switch (function) {
951fa247a2aSRuchika Gupta 	case PKCS11_FUNCTION_GENERATE:
952013934d8SVesa Jääskeläinen 	case PKCS11_FUNCTION_GENERATE_PAIR:
953fa247a2aSRuchika Gupta 		local = PKCS11_TRUE;
954fa247a2aSRuchika Gupta 		break;
95563f89caaSJens Wiklander 	case PKCS11_FUNCTION_IMPORT:
95648799892SRuchika Gupta 	case PKCS11_FUNCTION_DERIVE:
957e3f0cb56SRuchika Gupta 	case PKCS11_FUNCTION_UNWRAP:
95863f89caaSJens Wiklander 	default:
95963f89caaSJens Wiklander 		local = PKCS11_FALSE;
96063f89caaSJens Wiklander 		break;
96163f89caaSJens Wiklander 	}
96263f89caaSJens Wiklander 	rc = add_attribute(&attrs, PKCS11_CKA_LOCAL, &local, sizeof(local));
96363f89caaSJens Wiklander 	if (rc)
96463f89caaSJens Wiklander 		goto out;
96563f89caaSJens Wiklander 
96663f89caaSJens Wiklander 	switch (get_class(attrs)) {
96763f89caaSJens Wiklander 	case PKCS11_CKO_SECRET_KEY:
96863f89caaSJens Wiklander 	case PKCS11_CKO_PRIVATE_KEY:
96963f89caaSJens Wiklander 	case PKCS11_CKO_PUBLIC_KEY:
97063f89caaSJens Wiklander 		always_sensitive = PKCS11_FALSE;
97163f89caaSJens Wiklander 		never_extract = PKCS11_FALSE;
97263f89caaSJens Wiklander 
973fa247a2aSRuchika Gupta 		switch (function) {
97448799892SRuchika Gupta 		case PKCS11_FUNCTION_DERIVE:
97548799892SRuchika Gupta 			always_sensitive =
97648799892SRuchika Gupta 				get_bool(parent, PKCS11_CKA_ALWAYS_SENSITIVE) &&
97748799892SRuchika Gupta 				get_bool(attrs, PKCS11_CKA_SENSITIVE);
97848799892SRuchika Gupta 			never_extract =
97948799892SRuchika Gupta 			       get_bool(parent, PKCS11_CKA_NEVER_EXTRACTABLE) &&
98048799892SRuchika Gupta 			       !get_bool(attrs, PKCS11_CKA_EXTRACTABLE);
98148799892SRuchika Gupta 			break;
982e3f0cb56SRuchika Gupta 		case PKCS11_FUNCTION_UNWRAP:
983e3f0cb56SRuchika Gupta 			always_sensitive = PKCS11_FALSE;
984e3f0cb56SRuchika Gupta 			never_extract = PKCS11_FALSE;
985e3f0cb56SRuchika Gupta 			extractable = PKCS11_TRUE;
986e3f0cb56SRuchika Gupta 
987e3f0cb56SRuchika Gupta 			/*
988e3f0cb56SRuchika Gupta 			 * Check if template passed by user has CKA_EXTRACTABLE.
989e3f0cb56SRuchika Gupta 			 * If not, by default value of CKA_EXTRACTABLE is set as
990e3f0cb56SRuchika Gupta 			 * TRUE.
991e3f0cb56SRuchika Gupta 			 */
992e3f0cb56SRuchika Gupta 			if (get_attribute_ptr(temp, PKCS11_CKA_EXTRACTABLE,
993e3f0cb56SRuchika Gupta 					      NULL,
994e3f0cb56SRuchika Gupta 					      NULL) == PKCS11_RV_NOT_FOUND) {
995e3f0cb56SRuchika Gupta 				rc = set_attribute(&attrs,
996e3f0cb56SRuchika Gupta 						   PKCS11_CKA_EXTRACTABLE,
997e3f0cb56SRuchika Gupta 						   &extractable,
998e3f0cb56SRuchika Gupta 						   sizeof(extractable));
999e3f0cb56SRuchika Gupta 				if (rc)
1000e3f0cb56SRuchika Gupta 					goto out;
1001e3f0cb56SRuchika Gupta 			}
1002e3f0cb56SRuchika Gupta 			break;
1003fa247a2aSRuchika Gupta 		case PKCS11_FUNCTION_GENERATE:
1004013934d8SVesa Jääskeläinen 		case PKCS11_FUNCTION_GENERATE_PAIR:
1005fa247a2aSRuchika Gupta 			always_sensitive = get_bool(attrs,
1006fa247a2aSRuchika Gupta 						    PKCS11_CKA_SENSITIVE);
1007fa247a2aSRuchika Gupta 			never_extract = !get_bool(attrs,
1008fa247a2aSRuchika Gupta 						  PKCS11_CKA_EXTRACTABLE);
1009fa247a2aSRuchika Gupta 			break;
1010fa247a2aSRuchika Gupta 		default:
1011fa247a2aSRuchika Gupta 			break;
1012fa247a2aSRuchika Gupta 		}
1013fa247a2aSRuchika Gupta 
101463f89caaSJens Wiklander 		rc = add_attribute(&attrs, PKCS11_CKA_ALWAYS_SENSITIVE,
101563f89caaSJens Wiklander 				   &always_sensitive, sizeof(always_sensitive));
101663f89caaSJens Wiklander 		if (rc)
101763f89caaSJens Wiklander 			goto out;
101863f89caaSJens Wiklander 
101963f89caaSJens Wiklander 		rc = add_attribute(&attrs, PKCS11_CKA_NEVER_EXTRACTABLE,
102063f89caaSJens Wiklander 				   &never_extract, sizeof(never_extract));
102163f89caaSJens Wiklander 		if (rc)
102263f89caaSJens Wiklander 			goto out;
102363f89caaSJens Wiklander 
102463f89caaSJens Wiklander 		/* Keys mandate attribute PKCS11_CKA_KEY_GEN_MECHANISM */
1025fa247a2aSRuchika Gupta 		if (local)
1026fa247a2aSRuchika Gupta 			mechanism_id = mecha;
1027fa247a2aSRuchika Gupta 		else
102863f89caaSJens Wiklander 			mechanism_id = PKCS11_CK_UNAVAILABLE_INFORMATION;
1029fa247a2aSRuchika Gupta 
103063f89caaSJens Wiklander 		rc = add_attribute(&attrs, PKCS11_CKA_KEY_GEN_MECHANISM,
103163f89caaSJens Wiklander 				   &mechanism_id, sizeof(mechanism_id));
103263f89caaSJens Wiklander 		if (rc)
103363f89caaSJens Wiklander 			goto out;
103463f89caaSJens Wiklander 		break;
103563f89caaSJens Wiklander 
103663f89caaSJens Wiklander 	default:
103763f89caaSJens Wiklander 		break;
103863f89caaSJens Wiklander 	}
103963f89caaSJens Wiklander 
104063f89caaSJens Wiklander 	*out = attrs;
104163f89caaSJens Wiklander 
104263f89caaSJens Wiklander #ifdef DEBUG
104363f89caaSJens Wiklander 	trace_attributes("object", attrs);
104463f89caaSJens Wiklander #endif
104563f89caaSJens Wiklander 
104663f89caaSJens Wiklander out:
104763f89caaSJens Wiklander 	TEE_Free(temp);
104863f89caaSJens Wiklander 	if (rc)
104963f89caaSJens Wiklander 		TEE_Free(attrs);
105063f89caaSJens Wiklander 
105163f89caaSJens Wiklander 	return rc;
105263f89caaSJens Wiklander }
105363f89caaSJens Wiklander 
105463f89caaSJens Wiklander static enum pkcs11_rc check_attrs_misc_integrity(struct obj_attrs *head)
105563f89caaSJens Wiklander {
105663f89caaSJens Wiklander 	if (get_bool(head, PKCS11_CKA_NEVER_EXTRACTABLE) &&
105763f89caaSJens Wiklander 	    get_bool(head, PKCS11_CKA_EXTRACTABLE)) {
105863f89caaSJens Wiklander 		DMSG("Never/Extractable attributes mismatch %d/%d",
105963f89caaSJens Wiklander 		     get_bool(head, PKCS11_CKA_NEVER_EXTRACTABLE),
106063f89caaSJens Wiklander 		     get_bool(head, PKCS11_CKA_EXTRACTABLE));
106163f89caaSJens Wiklander 
106263f89caaSJens Wiklander 		return PKCS11_CKR_TEMPLATE_INCONSISTENT;
106363f89caaSJens Wiklander 	}
106463f89caaSJens Wiklander 
106563f89caaSJens Wiklander 	if (get_bool(head, PKCS11_CKA_ALWAYS_SENSITIVE) &&
106663f89caaSJens Wiklander 	    !get_bool(head, PKCS11_CKA_SENSITIVE)) {
106763f89caaSJens Wiklander 		DMSG("Sensitive/always attributes mismatch %d/%d",
106863f89caaSJens Wiklander 		     get_bool(head, PKCS11_CKA_SENSITIVE),
106963f89caaSJens Wiklander 		     get_bool(head, PKCS11_CKA_ALWAYS_SENSITIVE));
107063f89caaSJens Wiklander 
107163f89caaSJens Wiklander 		return PKCS11_CKR_TEMPLATE_INCONSISTENT;
107263f89caaSJens Wiklander 	}
107363f89caaSJens Wiklander 
107463f89caaSJens Wiklander 	return PKCS11_CKR_OK;
107563f89caaSJens Wiklander }
107663f89caaSJens Wiklander 
107789735787SRuchika Gupta bool object_is_private(struct obj_attrs *head)
107889735787SRuchika Gupta {
107965fb9092SVesa Jääskeläinen 	return get_bool(head, PKCS11_CKA_PRIVATE);
108089735787SRuchika Gupta }
108189735787SRuchika Gupta 
10822d25a9bcSRuchika Gupta bool object_is_token(struct obj_attrs *head)
10832d25a9bcSRuchika Gupta {
10842d25a9bcSRuchika Gupta 	return get_bool(head, PKCS11_CKA_TOKEN);
10852d25a9bcSRuchika Gupta }
10862d25a9bcSRuchika Gupta 
10872d25a9bcSRuchika Gupta bool object_is_modifiable(struct obj_attrs *head)
10882d25a9bcSRuchika Gupta {
10892d25a9bcSRuchika Gupta 	return get_bool(head, PKCS11_CKA_MODIFIABLE);
10902d25a9bcSRuchika Gupta }
10912d25a9bcSRuchika Gupta 
10922d25a9bcSRuchika Gupta bool object_is_copyable(struct obj_attrs *head)
10932d25a9bcSRuchika Gupta {
10942d25a9bcSRuchika Gupta 	return get_bool(head, PKCS11_CKA_COPYABLE);
10952d25a9bcSRuchika Gupta }
10962d25a9bcSRuchika Gupta 
109763f89caaSJens Wiklander /*
1098512cbf1dSJens Wiklander  * Check access to object against authentication to token
1099512cbf1dSJens Wiklander  */
1100512cbf1dSJens Wiklander enum pkcs11_rc check_access_attrs_against_token(struct pkcs11_session *session,
1101512cbf1dSJens Wiklander 						struct obj_attrs *head)
1102512cbf1dSJens Wiklander {
1103512cbf1dSJens Wiklander 	bool private = true;
1104512cbf1dSJens Wiklander 
1105512cbf1dSJens Wiklander 	switch (get_class(head)) {
1106512cbf1dSJens Wiklander 	case PKCS11_CKO_SECRET_KEY:
110765fb9092SVesa Jääskeläinen 	case PKCS11_CKO_PRIVATE_KEY:
1108512cbf1dSJens Wiklander 	case PKCS11_CKO_PUBLIC_KEY:
1109512cbf1dSJens Wiklander 	case PKCS11_CKO_DATA:
111065fb9092SVesa Jääskeläinen 		private = object_is_private(head);
1111512cbf1dSJens Wiklander 		break;
1112512cbf1dSJens Wiklander 	default:
1113512cbf1dSJens Wiklander 		return PKCS11_CKR_KEY_FUNCTION_NOT_PERMITTED;
1114512cbf1dSJens Wiklander 	}
1115512cbf1dSJens Wiklander 
11165db0fef4SRuchika Gupta 	if (private && (pkcs11_session_is_public(session) ||
11175db0fef4SRuchika Gupta 			pkcs11_session_is_so(session))) {
11185db0fef4SRuchika Gupta 		DMSG("Private object access from a public or SO session");
1119512cbf1dSJens Wiklander 
112012f1ba86SRuchika Gupta 		return PKCS11_CKR_USER_NOT_LOGGED_IN;
1121512cbf1dSJens Wiklander 	}
1122512cbf1dSJens Wiklander 
1123512cbf1dSJens Wiklander 	return PKCS11_CKR_OK;
1124512cbf1dSJens Wiklander }
1125512cbf1dSJens Wiklander 
1126512cbf1dSJens Wiklander /*
112763f89caaSJens Wiklander  * Check the attributes of a to-be-created object matches the token state
112863f89caaSJens Wiklander  */
112963f89caaSJens Wiklander enum pkcs11_rc check_created_attrs_against_token(struct pkcs11_session *session,
113063f89caaSJens Wiklander 						 struct obj_attrs *head)
113163f89caaSJens Wiklander {
113263f89caaSJens Wiklander 	enum pkcs11_rc rc = PKCS11_CKR_OK;
113363f89caaSJens Wiklander 
113463f89caaSJens Wiklander 	rc = check_attrs_misc_integrity(head);
113563f89caaSJens Wiklander 	if (rc)
113663f89caaSJens Wiklander 		return rc;
113763f89caaSJens Wiklander 
113863f89caaSJens Wiklander 	if (get_bool(head, PKCS11_CKA_TRUSTED) &&
113963f89caaSJens Wiklander 	    !pkcs11_session_is_so(session)) {
114063f89caaSJens Wiklander 		DMSG("Can't create trusted object");
114163f89caaSJens Wiklander 
114263f89caaSJens Wiklander 		return PKCS11_CKR_KEY_FUNCTION_NOT_PERMITTED;
114363f89caaSJens Wiklander 	}
114463f89caaSJens Wiklander 
114563f89caaSJens Wiklander 	if (get_bool(head, PKCS11_CKA_TOKEN) &&
114663f89caaSJens Wiklander 	    !pkcs11_session_is_read_write(session)) {
114763f89caaSJens Wiklander 		DMSG("Can't create persistent object");
114863f89caaSJens Wiklander 
114963f89caaSJens Wiklander 		return PKCS11_CKR_SESSION_READ_ONLY;
115063f89caaSJens Wiklander 	}
115163f89caaSJens Wiklander 
115263f89caaSJens Wiklander 	/*
115363f89caaSJens Wiklander 	 * TODO: START_DATE and END_DATE: complies with current time?
115463f89caaSJens Wiklander 	 */
115563f89caaSJens Wiklander 	return PKCS11_CKR_OK;
115663f89caaSJens Wiklander }
115763f89caaSJens Wiklander 
115863f89caaSJens Wiklander #define DMSG_BAD_BBOOL(attr, proc, head)				\
115963f89caaSJens Wiklander 	do {								\
116063f89caaSJens Wiklander 		uint32_t __maybe_unused _attr = (attr);			\
116163f89caaSJens Wiklander 		uint8_t __maybe_unused _bvalue = 0;			\
116263f89caaSJens Wiklander 		enum pkcs11_rc __maybe_unused _rc = PKCS11_CKR_OK;	\
116363f89caaSJens Wiklander 									\
116463f89caaSJens Wiklander 		_rc = get_attribute((head), _attr, &_bvalue, NULL);	\
116563f89caaSJens Wiklander 		DMSG("%s issue for %s: %sfound, value %"PRIu8,		\
116663f89caaSJens Wiklander 		     id2str_attr(_attr), id2str_proc((proc)),		\
116763f89caaSJens Wiklander 		     _rc ? "not " : "", _bvalue);			\
116863f89caaSJens Wiklander 	} while (0)
116963f89caaSJens Wiklander 
117063f89caaSJens Wiklander static bool __maybe_unused check_attr_bval(uint32_t proc_id __maybe_unused,
117163f89caaSJens Wiklander 					   struct obj_attrs *head,
117263f89caaSJens Wiklander 					   uint32_t attribute, bool val)
117363f89caaSJens Wiklander {
117463f89caaSJens Wiklander 	uint8_t bbool = 0;
117563f89caaSJens Wiklander 	uint32_t sz = sizeof(bbool);
117663f89caaSJens Wiklander 
117763f89caaSJens Wiklander 	if (!get_attribute(head, attribute, &bbool, &sz) && !!bbool == val)
117863f89caaSJens Wiklander 		return true;
117963f89caaSJens Wiklander 
118063f89caaSJens Wiklander 	DMSG_BAD_BBOOL(attribute, proc_id, head);
118163f89caaSJens Wiklander 	return false;
118263f89caaSJens Wiklander }
118363f89caaSJens Wiklander 
118463f89caaSJens Wiklander /*
118563f89caaSJens Wiklander  * Check the attributes of a new secret match the processing/mechanism
118663f89caaSJens Wiklander  * used to create it.
118763f89caaSJens Wiklander  *
118863f89caaSJens Wiklander  * @proc_id - PKCS11_CKM_xxx
118963f89caaSJens Wiklander  * @head - head of the attributes of the to-be-created object.
119063f89caaSJens Wiklander  */
119163f89caaSJens Wiklander enum pkcs11_rc check_created_attrs_against_processing(uint32_t proc_id,
119263f89caaSJens Wiklander 						      struct obj_attrs *head)
119363f89caaSJens Wiklander {
119463f89caaSJens Wiklander 	/*
119563f89caaSJens Wiklander 	 * Processings that do not create secrets are not expected to call
119663f89caaSJens Wiklander 	 * this function which would panic.
119763f89caaSJens Wiklander 	 */
119863f89caaSJens Wiklander 	switch (proc_id) {
119963f89caaSJens Wiklander 	case PKCS11_PROCESSING_IMPORT:
1200e3f0cb56SRuchika Gupta 	case PKCS11_CKM_AES_ECB:
1201e3f0cb56SRuchika Gupta 	case PKCS11_CKM_AES_CBC:
120248799892SRuchika Gupta 	case PKCS11_CKM_AES_ECB_ENCRYPT_DATA:
120348799892SRuchika Gupta 	case PKCS11_CKM_AES_CBC_ENCRYPT_DATA:
120463f89caaSJens Wiklander 		assert(check_attr_bval(proc_id, head, PKCS11_CKA_LOCAL, false));
120563f89caaSJens Wiklander 		break;
1206fa247a2aSRuchika Gupta 	case PKCS11_CKM_GENERIC_SECRET_KEY_GEN:
1207fa247a2aSRuchika Gupta 	case PKCS11_CKM_AES_KEY_GEN:
120802b16804SVesa Jääskeläinen 	case PKCS11_CKM_EC_KEY_PAIR_GEN:
120986922832SVesa Jääskeläinen 	case PKCS11_CKM_RSA_PKCS_KEY_PAIR_GEN:
1210fa247a2aSRuchika Gupta 		assert(check_attr_bval(proc_id, head, PKCS11_CKA_LOCAL, true));
1211fa247a2aSRuchika Gupta 		break;
121263f89caaSJens Wiklander 	default:
121363f89caaSJens Wiklander 		TEE_Panic(proc_id);
121463f89caaSJens Wiklander 		break;
121563f89caaSJens Wiklander 	}
121663f89caaSJens Wiklander 
1217fa247a2aSRuchika Gupta 	switch (proc_id) {
1218fa247a2aSRuchika Gupta 	case PKCS11_CKM_GENERIC_SECRET_KEY_GEN:
1219fa247a2aSRuchika Gupta 		assert(get_key_type(head) == PKCS11_CKK_GENERIC_SECRET);
1220fa247a2aSRuchika Gupta 		break;
1221fa247a2aSRuchika Gupta 	case PKCS11_CKM_AES_KEY_GEN:
1222fa247a2aSRuchika Gupta 		assert(get_key_type(head) == PKCS11_CKK_AES);
1223fa247a2aSRuchika Gupta 		break;
122402b16804SVesa Jääskeläinen 	case PKCS11_CKM_EC_KEY_PAIR_GEN:
122502b16804SVesa Jääskeläinen 		assert(get_key_type(head) == PKCS11_CKK_EC);
122602b16804SVesa Jääskeläinen 		break;
122786922832SVesa Jääskeläinen 	case PKCS11_CKM_RSA_PKCS_KEY_PAIR_GEN:
122886922832SVesa Jääskeläinen 		assert(get_key_type(head) == PKCS11_CKK_RSA);
122986922832SVesa Jääskeläinen 		break;
1230fa247a2aSRuchika Gupta 	case PKCS11_PROCESSING_IMPORT:
1231fa247a2aSRuchika Gupta 	default:
1232fa247a2aSRuchika Gupta 		break;
1233fa247a2aSRuchika Gupta 	}
1234fa247a2aSRuchika Gupta 
123563f89caaSJens Wiklander 	return PKCS11_CKR_OK;
123663f89caaSJens Wiklander }
1237512cbf1dSJens Wiklander 
12382d0cd829SRuchika Gupta /* Return min and max key size supported for a key_type in bytes */
1239512cbf1dSJens Wiklander static void get_key_min_max_sizes(enum pkcs11_key_type key_type,
1240512cbf1dSJens Wiklander 				  uint32_t *min_key_size,
1241512cbf1dSJens Wiklander 				  uint32_t *max_key_size)
1242512cbf1dSJens Wiklander {
1243512cbf1dSJens Wiklander 	enum pkcs11_mechanism_id mechanism = PKCS11_CKM_UNDEFINED_ID;
1244512cbf1dSJens Wiklander 
1245512cbf1dSJens Wiklander 	switch (key_type) {
1246fa247a2aSRuchika Gupta 	case PKCS11_CKK_GENERIC_SECRET:
1247fa247a2aSRuchika Gupta 		mechanism = PKCS11_CKM_GENERIC_SECRET_KEY_GEN;
1248fa247a2aSRuchika Gupta 		break;
1249512cbf1dSJens Wiklander 	case PKCS11_CKK_AES:
1250512cbf1dSJens Wiklander 		mechanism = PKCS11_CKM_AES_KEY_GEN;
1251512cbf1dSJens Wiklander 		break;
12521f45c9cfSRuchika Gupta 	case PKCS11_CKK_MD5_HMAC:
12531f45c9cfSRuchika Gupta 		mechanism = PKCS11_CKM_MD5_HMAC;
12541f45c9cfSRuchika Gupta 		break;
12551f45c9cfSRuchika Gupta 	case PKCS11_CKK_SHA_1_HMAC:
12561f45c9cfSRuchika Gupta 		mechanism = PKCS11_CKM_SHA_1_HMAC;
12571f45c9cfSRuchika Gupta 		break;
12581f45c9cfSRuchika Gupta 	case PKCS11_CKK_SHA224_HMAC:
12591f45c9cfSRuchika Gupta 		mechanism = PKCS11_CKM_SHA224_HMAC;
12601f45c9cfSRuchika Gupta 		break;
1261a339a354SEtienne Carriere 	case PKCS11_CKK_SHA256_HMAC:
1262a339a354SEtienne Carriere 		mechanism = PKCS11_CKM_SHA256_HMAC;
1263a339a354SEtienne Carriere 		break;
12641f45c9cfSRuchika Gupta 	case PKCS11_CKK_SHA384_HMAC:
12651f45c9cfSRuchika Gupta 		mechanism = PKCS11_CKM_SHA384_HMAC;
12661f45c9cfSRuchika Gupta 		break;
12671f45c9cfSRuchika Gupta 	case PKCS11_CKK_SHA512_HMAC:
12681f45c9cfSRuchika Gupta 		mechanism = PKCS11_CKM_SHA512_HMAC;
12691f45c9cfSRuchika Gupta 		break;
1270db28c542SVesa Jääskeläinen 	case PKCS11_CKK_EC:
1271db28c542SVesa Jääskeläinen 		mechanism = PKCS11_CKM_EC_KEY_PAIR_GEN;
1272db28c542SVesa Jääskeläinen 		break;
127386922832SVesa Jääskeläinen 	case PKCS11_CKK_RSA:
127486922832SVesa Jääskeläinen 		mechanism = PKCS11_CKM_RSA_PKCS_KEY_PAIR_GEN;
127586922832SVesa Jääskeläinen 		break;
1276512cbf1dSJens Wiklander 	default:
1277512cbf1dSJens Wiklander 		TEE_Panic(key_type);
1278512cbf1dSJens Wiklander 		break;
1279512cbf1dSJens Wiklander 	}
1280512cbf1dSJens Wiklander 
12812d0cd829SRuchika Gupta 	mechanism_supported_key_sizes_bytes(mechanism, min_key_size,
1282512cbf1dSJens Wiklander 					    max_key_size);
1283512cbf1dSJens Wiklander }
1284512cbf1dSJens Wiklander 
1285512cbf1dSJens Wiklander enum pkcs11_rc check_created_attrs(struct obj_attrs *key1,
1286512cbf1dSJens Wiklander 				   struct obj_attrs *key2)
1287512cbf1dSJens Wiklander {
1288512cbf1dSJens Wiklander 	enum pkcs11_rc rc = PKCS11_CKR_OK;
1289512cbf1dSJens Wiklander 	struct obj_attrs *secret = NULL;
1290013934d8SVesa Jääskeläinen 	struct obj_attrs *private = NULL;
1291013934d8SVesa Jääskeläinen 	struct obj_attrs *public = NULL;
1292512cbf1dSJens Wiklander 	uint32_t max_key_size = 0;
1293512cbf1dSJens Wiklander 	uint32_t min_key_size = 0;
1294512cbf1dSJens Wiklander 	uint32_t key_length = 0;
1295512cbf1dSJens Wiklander 
1296512cbf1dSJens Wiklander 	switch (get_class(key1)) {
1297512cbf1dSJens Wiklander 	case PKCS11_CKO_SECRET_KEY:
1298512cbf1dSJens Wiklander 		secret = key1;
1299512cbf1dSJens Wiklander 		break;
1300013934d8SVesa Jääskeläinen 	case PKCS11_CKO_PUBLIC_KEY:
1301013934d8SVesa Jääskeläinen 		public = key1;
1302013934d8SVesa Jääskeläinen 		break;
1303013934d8SVesa Jääskeläinen 	case PKCS11_CKO_PRIVATE_KEY:
1304013934d8SVesa Jääskeläinen 		private = key1;
1305013934d8SVesa Jääskeläinen 		break;
1306512cbf1dSJens Wiklander 	default:
1307512cbf1dSJens Wiklander 		return PKCS11_CKR_ATTRIBUTE_VALUE_INVALID;
1308512cbf1dSJens Wiklander 	}
1309512cbf1dSJens Wiklander 
1310013934d8SVesa Jääskeläinen 	if (key2) {
1311013934d8SVesa Jääskeläinen 		switch (get_class(key2)) {
1312013934d8SVesa Jääskeläinen 		case PKCS11_CKO_PUBLIC_KEY:
1313013934d8SVesa Jääskeläinen 			public = key2;
1314013934d8SVesa Jääskeläinen 			if (private == key1)
1315013934d8SVesa Jääskeläinen 				break;
1316013934d8SVesa Jääskeläinen 
1317013934d8SVesa Jääskeläinen 			return PKCS11_CKR_TEMPLATE_INCONSISTENT;
1318013934d8SVesa Jääskeläinen 		case PKCS11_CKO_PRIVATE_KEY:
1319013934d8SVesa Jääskeläinen 			private = key2;
1320013934d8SVesa Jääskeläinen 			if (public == key1)
1321013934d8SVesa Jääskeläinen 				break;
1322013934d8SVesa Jääskeläinen 
1323013934d8SVesa Jääskeläinen 			return PKCS11_CKR_TEMPLATE_INCONSISTENT;
1324013934d8SVesa Jääskeläinen 		default:
1325512cbf1dSJens Wiklander 			return PKCS11_CKR_ATTRIBUTE_VALUE_INVALID;
1326013934d8SVesa Jääskeläinen 		}
1327013934d8SVesa Jääskeläinen 
1328013934d8SVesa Jääskeläinen 		if (get_key_type(private) != get_key_type(public))
1329013934d8SVesa Jääskeläinen 			return PKCS11_CKR_TEMPLATE_INCONSISTENT;
1330013934d8SVesa Jääskeläinen 	}
1331512cbf1dSJens Wiklander 
1332512cbf1dSJens Wiklander 	if (secret) {
1333512cbf1dSJens Wiklander 		switch (get_key_type(secret)) {
1334512cbf1dSJens Wiklander 		case PKCS11_CKK_AES:
1335512cbf1dSJens Wiklander 		case PKCS11_CKK_GENERIC_SECRET:
1336512cbf1dSJens Wiklander 		case PKCS11_CKK_MD5_HMAC:
1337512cbf1dSJens Wiklander 		case PKCS11_CKK_SHA_1_HMAC:
1338512cbf1dSJens Wiklander 		case PKCS11_CKK_SHA224_HMAC:
1339512cbf1dSJens Wiklander 		case PKCS11_CKK_SHA256_HMAC:
1340512cbf1dSJens Wiklander 		case PKCS11_CKK_SHA384_HMAC:
1341512cbf1dSJens Wiklander 		case PKCS11_CKK_SHA512_HMAC:
1342512cbf1dSJens Wiklander 			break;
1343512cbf1dSJens Wiklander 		default:
1344512cbf1dSJens Wiklander 			return PKCS11_CKR_TEMPLATE_INCONSISTENT;
1345512cbf1dSJens Wiklander 		}
1346512cbf1dSJens Wiklander 
1347512cbf1dSJens Wiklander 		/* Get key size */
1348512cbf1dSJens Wiklander 		rc = get_u32_attribute(secret, PKCS11_CKA_VALUE_LEN,
1349512cbf1dSJens Wiklander 				       &key_length);
1350512cbf1dSJens Wiklander 		if (rc)
1351d1d44372SRuchika Gupta 			return PKCS11_CKR_TEMPLATE_INCOMPLETE;
1352512cbf1dSJens Wiklander 	}
1353013934d8SVesa Jääskeläinen 	if (public) {
1354013934d8SVesa Jääskeläinen 		switch (get_key_type(public)) {
135586922832SVesa Jääskeläinen 		case PKCS11_CKK_RSA:
135686922832SVesa Jääskeläinen 			/* Get key size */
135786922832SVesa Jääskeläinen 			rc = get_u32_attribute(public, PKCS11_CKA_MODULUS_BITS,
135886922832SVesa Jääskeläinen 					       &key_length);
135986922832SVesa Jääskeläinen 			if (rc)
136086922832SVesa Jääskeläinen 				return PKCS11_CKR_TEMPLATE_INCONSISTENT;
136186922832SVesa Jääskeläinen 			key_length = ROUNDUP(key_length, 8) / 8;
136286922832SVesa Jääskeläinen 			break;
136302b16804SVesa Jääskeläinen 		case PKCS11_CKK_EC:
136402b16804SVesa Jääskeläinen 			break;
1365013934d8SVesa Jääskeläinen 		default:
1366013934d8SVesa Jääskeläinen 			return PKCS11_CKR_TEMPLATE_INCONSISTENT;
1367013934d8SVesa Jääskeläinen 		}
1368013934d8SVesa Jääskeläinen 	}
1369013934d8SVesa Jääskeläinen 	if (private) {
1370013934d8SVesa Jääskeläinen 		switch (get_key_type(private)) {
137186922832SVesa Jääskeläinen 		case PKCS11_CKK_RSA:
137202b16804SVesa Jääskeläinen 		case PKCS11_CKK_EC:
137302b16804SVesa Jääskeläinen 			break;
1374013934d8SVesa Jääskeläinen 		default:
1375013934d8SVesa Jääskeläinen 			return PKCS11_CKR_TEMPLATE_INCONSISTENT;
1376013934d8SVesa Jääskeläinen 		}
1377013934d8SVesa Jääskeläinen 	}
1378512cbf1dSJens Wiklander 
137902b16804SVesa Jääskeläinen 	/*
138002b16804SVesa Jääskeläinen 	 * Check key size for symmetric keys and RSA keys
138102b16804SVesa Jääskeläinen 	 * EC is bound to domains, no need to check here.
138202b16804SVesa Jääskeläinen 	 */
138302b16804SVesa Jääskeläinen 	switch (get_key_type(key1)) {
138402b16804SVesa Jääskeläinen 	case PKCS11_CKK_EC:
138502b16804SVesa Jääskeläinen 		return PKCS11_CKR_OK;
138602b16804SVesa Jääskeläinen 	default:
138702b16804SVesa Jääskeläinen 		break;
138802b16804SVesa Jääskeläinen 	}
138902b16804SVesa Jääskeläinen 
1390512cbf1dSJens Wiklander 	get_key_min_max_sizes(get_key_type(key1), &min_key_size, &max_key_size);
1391512cbf1dSJens Wiklander 	if (key_length < min_key_size || key_length > max_key_size) {
1392512cbf1dSJens Wiklander 		EMSG("Length %"PRIu32" vs range [%"PRIu32" %"PRIu32"]",
1393512cbf1dSJens Wiklander 		     key_length, min_key_size, max_key_size);
1394512cbf1dSJens Wiklander 
1395512cbf1dSJens Wiklander 		return PKCS11_CKR_KEY_SIZE_RANGE;
1396512cbf1dSJens Wiklander 	}
1397512cbf1dSJens Wiklander 
139849ed60abSRuchika Gupta 	if (secret && get_key_type(secret) == PKCS11_CKK_AES) {
139949ed60abSRuchika Gupta 		if (key_length != 16 && key_length != 24 && key_length != 32)
140049ed60abSRuchika Gupta 			return PKCS11_CKR_KEY_SIZE_RANGE;
140149ed60abSRuchika Gupta 	}
140249ed60abSRuchika Gupta 
1403512cbf1dSJens Wiklander 	return PKCS11_CKR_OK;
1404512cbf1dSJens Wiklander }
1405512cbf1dSJens Wiklander 
1406512cbf1dSJens Wiklander /* Check processing ID against attribute ALLOWED_MECHANISMS if any */
1407512cbf1dSJens Wiklander static bool parent_key_complies_allowed_processings(uint32_t proc_id,
1408512cbf1dSJens Wiklander 						    struct obj_attrs *head)
1409512cbf1dSJens Wiklander {
1410512cbf1dSJens Wiklander 	char *attr = NULL;
1411512cbf1dSJens Wiklander 	uint32_t size = 0;
1412512cbf1dSJens Wiklander 	uint32_t proc = 0;
1413512cbf1dSJens Wiklander 	size_t count = 0;
14146a760c9eSEtienne Carriere 	enum pkcs11_rc rc = PKCS11_CKR_GENERAL_ERROR;
1415512cbf1dSJens Wiklander 
14166a760c9eSEtienne Carriere 	rc = get_attribute_ptr(head, PKCS11_CKA_ALLOWED_MECHANISMS,
14176a760c9eSEtienne Carriere 			       (void *)&attr, &size);
14186a760c9eSEtienne Carriere 	if (rc == PKCS11_RV_NOT_FOUND)
1419512cbf1dSJens Wiklander 		return true;
14206a760c9eSEtienne Carriere 	if (rc) {
14216a760c9eSEtienne Carriere 		EMSG("unexpected attributes state");
14226a760c9eSEtienne Carriere 		TEE_Panic(TEE_ERROR_BAD_STATE);
1423512cbf1dSJens Wiklander 	}
1424512cbf1dSJens Wiklander 
1425512cbf1dSJens Wiklander 	for (count = size / sizeof(uint32_t); count; count--) {
1426512cbf1dSJens Wiklander 		TEE_MemMove(&proc, attr, sizeof(uint32_t));
1427512cbf1dSJens Wiklander 		attr += sizeof(uint32_t);
1428512cbf1dSJens Wiklander 
1429512cbf1dSJens Wiklander 		if (proc == proc_id)
1430512cbf1dSJens Wiklander 			return true;
1431512cbf1dSJens Wiklander 	}
1432512cbf1dSJens Wiklander 
1433512cbf1dSJens Wiklander 	DMSG("can't find %s in allowed list", id2str_proc(proc_id));
1434512cbf1dSJens Wiklander 	return false;
1435512cbf1dSJens Wiklander }
1436512cbf1dSJens Wiklander 
1437512cbf1dSJens Wiklander static enum pkcs11_attr_id func_to_attr(enum processing_func func)
1438512cbf1dSJens Wiklander {
1439512cbf1dSJens Wiklander 	switch (func) {
1440512cbf1dSJens Wiklander 	case PKCS11_FUNCTION_ENCRYPT:
1441512cbf1dSJens Wiklander 		return PKCS11_CKA_ENCRYPT;
1442512cbf1dSJens Wiklander 	case PKCS11_FUNCTION_DECRYPT:
1443512cbf1dSJens Wiklander 		return PKCS11_CKA_DECRYPT;
1444512cbf1dSJens Wiklander 	case PKCS11_FUNCTION_SIGN:
1445512cbf1dSJens Wiklander 		return PKCS11_CKA_SIGN;
1446512cbf1dSJens Wiklander 	case PKCS11_FUNCTION_VERIFY:
1447512cbf1dSJens Wiklander 		return PKCS11_CKA_VERIFY;
1448512cbf1dSJens Wiklander 	case PKCS11_FUNCTION_WRAP:
1449512cbf1dSJens Wiklander 		return PKCS11_CKA_WRAP;
1450512cbf1dSJens Wiklander 	case PKCS11_FUNCTION_UNWRAP:
1451512cbf1dSJens Wiklander 		return PKCS11_CKA_UNWRAP;
1452512cbf1dSJens Wiklander 	case PKCS11_FUNCTION_DERIVE:
1453512cbf1dSJens Wiklander 		return PKCS11_CKA_DERIVE;
1454512cbf1dSJens Wiklander 	default:
1455512cbf1dSJens Wiklander 		return PKCS11_CKA_UNDEFINED_ID;
1456512cbf1dSJens Wiklander 	}
1457512cbf1dSJens Wiklander }
1458512cbf1dSJens Wiklander 
1459512cbf1dSJens Wiklander enum pkcs11_rc
1460512cbf1dSJens Wiklander check_parent_attrs_against_processing(enum pkcs11_mechanism_id proc_id,
1461512cbf1dSJens Wiklander 				      enum processing_func function,
1462512cbf1dSJens Wiklander 				      struct obj_attrs *head)
1463512cbf1dSJens Wiklander {
1464512cbf1dSJens Wiklander 	enum pkcs11_class_id key_class = get_class(head);
1465512cbf1dSJens Wiklander 	enum pkcs11_key_type key_type = get_key_type(head);
1466512cbf1dSJens Wiklander 	enum pkcs11_attr_id attr = func_to_attr(function);
1467512cbf1dSJens Wiklander 
1468512cbf1dSJens Wiklander 	if (!get_bool(head, attr)) {
1469512cbf1dSJens Wiklander 		DMSG("%s not permitted", id2str_attr(attr));
1470512cbf1dSJens Wiklander 		return PKCS11_CKR_KEY_FUNCTION_NOT_PERMITTED;
1471512cbf1dSJens Wiklander 	}
1472512cbf1dSJens Wiklander 
1473512cbf1dSJens Wiklander 	/* Check processing complies with parent key family */
1474512cbf1dSJens Wiklander 	switch (proc_id) {
1475512cbf1dSJens Wiklander 	case PKCS11_CKM_AES_ECB:
1476512cbf1dSJens Wiklander 	case PKCS11_CKM_AES_CBC:
1477512cbf1dSJens Wiklander 	case PKCS11_CKM_AES_CBC_PAD:
1478512cbf1dSJens Wiklander 	case PKCS11_CKM_AES_CTS:
1479512cbf1dSJens Wiklander 	case PKCS11_CKM_AES_CTR:
1480512cbf1dSJens Wiklander 		if (key_class == PKCS11_CKO_SECRET_KEY &&
1481512cbf1dSJens Wiklander 		    key_type == PKCS11_CKK_AES)
1482512cbf1dSJens Wiklander 			break;
1483512cbf1dSJens Wiklander 
1484512cbf1dSJens Wiklander 		DMSG("%s invalid key %s/%s", id2str_proc(proc_id),
1485512cbf1dSJens Wiklander 		     id2str_class(key_class), id2str_key_type(key_type));
1486512cbf1dSJens Wiklander 
14875f80f270SRuchika Gupta 		if (function == PKCS11_FUNCTION_WRAP)
14885f80f270SRuchika Gupta 			return PKCS11_CKR_WRAPPING_KEY_TYPE_INCONSISTENT;
1489e3f0cb56SRuchika Gupta 		else if (function == PKCS11_FUNCTION_UNWRAP)
1490e3f0cb56SRuchika Gupta 			return PKCS11_CKR_UNWRAPPING_KEY_TYPE_INCONSISTENT;
14915f80f270SRuchika Gupta 		else
1492512cbf1dSJens Wiklander 			return PKCS11_CKR_KEY_FUNCTION_NOT_PERMITTED;
1493512cbf1dSJens Wiklander 
1494c3033708SRuchika Gupta 	case PKCS11_CKM_AES_ECB_ENCRYPT_DATA:
1495c3033708SRuchika Gupta 	case PKCS11_CKM_AES_CBC_ENCRYPT_DATA:
1496c3033708SRuchika Gupta 		if (key_class != PKCS11_CKO_SECRET_KEY &&
1497c3033708SRuchika Gupta 		    key_type != PKCS11_CKK_AES)
1498c3033708SRuchika Gupta 			return PKCS11_CKR_KEY_FUNCTION_NOT_PERMITTED;
1499c3033708SRuchika Gupta 
1500c3033708SRuchika Gupta 		if (get_bool(head, PKCS11_CKA_ENCRYPT)) {
1501c3033708SRuchika Gupta 			/*
1502c3033708SRuchika Gupta 			 * Intentionally refuse to proceed despite
1503c3033708SRuchika Gupta 			 * PKCS#11 specifications v2.40 and v3.0 not expecting
1504c3033708SRuchika Gupta 			 * this behavior to avoid potential security issue
1505c3033708SRuchika Gupta 			 * where keys derived by these mechanisms can be
1506c3033708SRuchika Gupta 			 * revealed by doing data encryption using parent key.
1507c3033708SRuchika Gupta 			 */
1508c3033708SRuchika Gupta 			return PKCS11_CKR_FUNCTION_FAILED;
1509c3033708SRuchika Gupta 		}
1510c3033708SRuchika Gupta 
1511c3033708SRuchika Gupta 		break;
1512689f4e5bSRuchika Gupta 	case PKCS11_CKM_MD5_HMAC:
1513689f4e5bSRuchika Gupta 	case PKCS11_CKM_SHA_1_HMAC:
1514689f4e5bSRuchika Gupta 	case PKCS11_CKM_SHA224_HMAC:
1515689f4e5bSRuchika Gupta 	case PKCS11_CKM_SHA256_HMAC:
1516689f4e5bSRuchika Gupta 	case PKCS11_CKM_SHA384_HMAC:
1517689f4e5bSRuchika Gupta 	case PKCS11_CKM_SHA512_HMAC:
1518689f4e5bSRuchika Gupta 		if (key_class != PKCS11_CKO_SECRET_KEY)
1519689f4e5bSRuchika Gupta 			return PKCS11_CKR_KEY_FUNCTION_NOT_PERMITTED;
1520689f4e5bSRuchika Gupta 
1521689f4e5bSRuchika Gupta 		if (key_type == PKCS11_CKK_GENERIC_SECRET)
1522689f4e5bSRuchika Gupta 			break;
1523689f4e5bSRuchika Gupta 
1524689f4e5bSRuchika Gupta 		switch (proc_id) {
1525689f4e5bSRuchika Gupta 		case PKCS11_CKM_MD5_HMAC:
1526689f4e5bSRuchika Gupta 			if (key_type == PKCS11_CKK_MD5_HMAC)
1527689f4e5bSRuchika Gupta 				break;
1528689f4e5bSRuchika Gupta 			return PKCS11_CKR_KEY_FUNCTION_NOT_PERMITTED;
1529689f4e5bSRuchika Gupta 		case PKCS11_CKM_SHA_1_HMAC:
1530689f4e5bSRuchika Gupta 			if (key_type == PKCS11_CKK_SHA_1_HMAC)
1531689f4e5bSRuchika Gupta 				break;
1532689f4e5bSRuchika Gupta 			return PKCS11_CKR_KEY_FUNCTION_NOT_PERMITTED;
1533689f4e5bSRuchika Gupta 		case PKCS11_CKM_SHA224_HMAC:
1534689f4e5bSRuchika Gupta 			if (key_type == PKCS11_CKK_SHA224_HMAC)
1535689f4e5bSRuchika Gupta 				break;
1536689f4e5bSRuchika Gupta 			return PKCS11_CKR_KEY_FUNCTION_NOT_PERMITTED;
1537689f4e5bSRuchika Gupta 		case PKCS11_CKM_SHA256_HMAC:
1538689f4e5bSRuchika Gupta 			if (key_type == PKCS11_CKK_SHA256_HMAC)
1539689f4e5bSRuchika Gupta 				break;
1540689f4e5bSRuchika Gupta 			return PKCS11_CKR_KEY_FUNCTION_NOT_PERMITTED;
1541689f4e5bSRuchika Gupta 		case PKCS11_CKM_SHA384_HMAC:
1542689f4e5bSRuchika Gupta 			if (key_type == PKCS11_CKK_SHA384_HMAC)
1543689f4e5bSRuchika Gupta 				break;
1544689f4e5bSRuchika Gupta 			return PKCS11_CKR_KEY_FUNCTION_NOT_PERMITTED;
1545689f4e5bSRuchika Gupta 		case PKCS11_CKM_SHA512_HMAC:
1546689f4e5bSRuchika Gupta 			if (key_type == PKCS11_CKK_SHA512_HMAC)
1547689f4e5bSRuchika Gupta 				break;
1548689f4e5bSRuchika Gupta 			return PKCS11_CKR_KEY_FUNCTION_NOT_PERMITTED;
1549689f4e5bSRuchika Gupta 		default:
1550689f4e5bSRuchika Gupta 			return PKCS11_CKR_KEY_FUNCTION_NOT_PERMITTED;
1551689f4e5bSRuchika Gupta 		}
1552689f4e5bSRuchika Gupta 		break;
1553689f4e5bSRuchika Gupta 
1554fb279d8bSVesa Jääskeläinen 	case PKCS11_CKM_ECDSA:
1555fb279d8bSVesa Jääskeläinen 	case PKCS11_CKM_ECDSA_SHA1:
1556fb279d8bSVesa Jääskeläinen 	case PKCS11_CKM_ECDSA_SHA224:
1557fb279d8bSVesa Jääskeläinen 	case PKCS11_CKM_ECDSA_SHA256:
1558fb279d8bSVesa Jääskeläinen 	case PKCS11_CKM_ECDSA_SHA384:
1559fb279d8bSVesa Jääskeläinen 	case PKCS11_CKM_ECDSA_SHA512:
1560fb279d8bSVesa Jääskeläinen 		if (key_type != PKCS11_CKK_EC) {
1561fb279d8bSVesa Jääskeläinen 			EMSG("Invalid key %s for mechanism %s",
1562fb279d8bSVesa Jääskeläinen 			     id2str_type(key_type, key_class),
1563fb279d8bSVesa Jääskeläinen 			     id2str_proc(proc_id));
1564fb279d8bSVesa Jääskeläinen 
1565fb279d8bSVesa Jääskeläinen 			return PKCS11_CKR_KEY_TYPE_INCONSISTENT;
1566fb279d8bSVesa Jääskeläinen 		}
1567fb279d8bSVesa Jääskeläinen 		if (key_class != PKCS11_CKO_PUBLIC_KEY &&
1568fb279d8bSVesa Jääskeläinen 		    key_class != PKCS11_CKO_PRIVATE_KEY) {
1569fb279d8bSVesa Jääskeläinen 			EMSG("Invalid key class for mechanism %s",
1570fb279d8bSVesa Jääskeläinen 			     id2str_proc(proc_id));
1571fb279d8bSVesa Jääskeläinen 
1572fb279d8bSVesa Jääskeläinen 			return PKCS11_CKR_KEY_FUNCTION_NOT_PERMITTED;
1573fb279d8bSVesa Jääskeläinen 		}
1574fb279d8bSVesa Jääskeläinen 		break;
15750442c956SVesa Jääskeläinen 	case PKCS11_CKM_RSA_PKCS:
15760442c956SVesa Jääskeläinen 	case PKCS11_CKM_MD5_RSA_PKCS:
15770442c956SVesa Jääskeläinen 	case PKCS11_CKM_SHA1_RSA_PKCS:
15780442c956SVesa Jääskeläinen 	case PKCS11_CKM_SHA224_RSA_PKCS:
15790442c956SVesa Jääskeläinen 	case PKCS11_CKM_SHA256_RSA_PKCS:
15800442c956SVesa Jääskeläinen 	case PKCS11_CKM_SHA384_RSA_PKCS:
15810442c956SVesa Jääskeläinen 	case PKCS11_CKM_SHA512_RSA_PKCS:
1582*dc8c77fcSVesa Jääskeläinen 	case PKCS11_CKM_RSA_PKCS_OAEP:
1583d9af50bcSVesa Jääskeläinen 	case PKCS11_CKM_RSA_PKCS_PSS:
1584d9af50bcSVesa Jääskeläinen 	case PKCS11_CKM_SHA1_RSA_PKCS_PSS:
1585d9af50bcSVesa Jääskeläinen 	case PKCS11_CKM_SHA224_RSA_PKCS_PSS:
1586d9af50bcSVesa Jääskeläinen 	case PKCS11_CKM_SHA256_RSA_PKCS_PSS:
1587d9af50bcSVesa Jääskeläinen 	case PKCS11_CKM_SHA384_RSA_PKCS_PSS:
1588d9af50bcSVesa Jääskeläinen 	case PKCS11_CKM_SHA512_RSA_PKCS_PSS:
15890442c956SVesa Jääskeläinen 		if (key_type != PKCS11_CKK_RSA) {
15900442c956SVesa Jääskeläinen 			EMSG("Invalid key %s for mechanism %s",
15910442c956SVesa Jääskeläinen 			     id2str_type(key_type, key_class),
15920442c956SVesa Jääskeläinen 			     id2str_proc(proc_id));
15930442c956SVesa Jääskeläinen 
15940442c956SVesa Jääskeläinen 			return PKCS11_CKR_KEY_TYPE_INCONSISTENT;
15950442c956SVesa Jääskeläinen 		}
15960442c956SVesa Jääskeläinen 		if (key_class != PKCS11_CKO_PUBLIC_KEY &&
15970442c956SVesa Jääskeläinen 		    key_class != PKCS11_CKO_PRIVATE_KEY) {
15980442c956SVesa Jääskeläinen 			EMSG("Invalid key class for mechanism %s",
15990442c956SVesa Jääskeläinen 			     id2str_proc(proc_id));
16000442c956SVesa Jääskeläinen 
16010442c956SVesa Jääskeläinen 			return PKCS11_CKR_KEY_FUNCTION_NOT_PERMITTED;
16020442c956SVesa Jääskeläinen 		}
16030442c956SVesa Jääskeläinen 		break;
1604512cbf1dSJens Wiklander 	default:
1605512cbf1dSJens Wiklander 		DMSG("Invalid processing %#"PRIx32"/%s", proc_id,
1606512cbf1dSJens Wiklander 		     id2str_proc(proc_id));
1607512cbf1dSJens Wiklander 
1608512cbf1dSJens Wiklander 		return PKCS11_CKR_MECHANISM_INVALID;
1609512cbf1dSJens Wiklander 	}
1610512cbf1dSJens Wiklander 
1611512cbf1dSJens Wiklander 	if (!parent_key_complies_allowed_processings(proc_id, head)) {
1612512cbf1dSJens Wiklander 		DMSG("Allowed mechanism failed");
1613512cbf1dSJens Wiklander 		return PKCS11_CKR_KEY_FUNCTION_NOT_PERMITTED;
1614512cbf1dSJens Wiklander 	}
1615512cbf1dSJens Wiklander 
1616512cbf1dSJens Wiklander 	return PKCS11_CKR_OK;
1617512cbf1dSJens Wiklander }
1618783c1515SRuchika Gupta 
1619783c1515SRuchika Gupta bool attribute_is_exportable(struct pkcs11_attribute_head *req_attr,
1620783c1515SRuchika Gupta 			     struct pkcs11_object *obj)
1621783c1515SRuchika Gupta {
1622783c1515SRuchika Gupta 	uint8_t boolval = 0;
1623783c1515SRuchika Gupta 	uint32_t boolsize = 0;
1624783c1515SRuchika Gupta 	enum pkcs11_rc rc = PKCS11_CKR_GENERAL_ERROR;
1625783c1515SRuchika Gupta 	enum pkcs11_class_id key_class = get_class(obj->attributes);
1626783c1515SRuchika Gupta 
1627783c1515SRuchika Gupta 	if (key_class != PKCS11_CKO_SECRET_KEY &&
1628783c1515SRuchika Gupta 	    key_class != PKCS11_CKO_PRIVATE_KEY)
1629783c1515SRuchika Gupta 		return true;
1630783c1515SRuchika Gupta 
1631783c1515SRuchika Gupta 	switch (req_attr->id) {
1632783c1515SRuchika Gupta 	case PKCS11_CKA_PRIVATE_EXPONENT:
1633783c1515SRuchika Gupta 	case PKCS11_CKA_PRIME_1:
1634783c1515SRuchika Gupta 	case PKCS11_CKA_PRIME_2:
1635783c1515SRuchika Gupta 	case PKCS11_CKA_EXPONENT_1:
1636783c1515SRuchika Gupta 	case PKCS11_CKA_EXPONENT_2:
1637783c1515SRuchika Gupta 	case PKCS11_CKA_COEFFICIENT:
1638783c1515SRuchika Gupta 	case PKCS11_CKA_VALUE:
1639783c1515SRuchika Gupta 		boolsize = sizeof(boolval);
1640783c1515SRuchika Gupta 		rc = get_attribute(obj->attributes, PKCS11_CKA_EXTRACTABLE,
1641783c1515SRuchika Gupta 				   &boolval, &boolsize);
1642783c1515SRuchika Gupta 		if (rc || boolval == PKCS11_FALSE)
1643783c1515SRuchika Gupta 			return false;
1644783c1515SRuchika Gupta 
1645783c1515SRuchika Gupta 		boolsize = sizeof(boolval);
1646783c1515SRuchika Gupta 		rc = get_attribute(obj->attributes, PKCS11_CKA_SENSITIVE,
1647783c1515SRuchika Gupta 				   &boolval, &boolsize);
1648783c1515SRuchika Gupta 		if (rc || boolval == PKCS11_TRUE)
1649783c1515SRuchika Gupta 			return false;
1650783c1515SRuchika Gupta 		break;
1651783c1515SRuchika Gupta 	default:
1652783c1515SRuchika Gupta 		break;
1653783c1515SRuchika Gupta 	}
1654783c1515SRuchika Gupta 
1655783c1515SRuchika Gupta 	return true;
1656783c1515SRuchika Gupta }
16572d25a9bcSRuchika Gupta 
16582d25a9bcSRuchika Gupta static bool attr_is_modifiable_any_key(struct pkcs11_attribute_head *attr)
16592d25a9bcSRuchika Gupta {
16602d25a9bcSRuchika Gupta 	switch (attr->id) {
16612d25a9bcSRuchika Gupta 	case PKCS11_CKA_ID:
16622d25a9bcSRuchika Gupta 	case PKCS11_CKA_START_DATE:
16632d25a9bcSRuchika Gupta 	case PKCS11_CKA_END_DATE:
16642d25a9bcSRuchika Gupta 	case PKCS11_CKA_DERIVE:
16652d25a9bcSRuchika Gupta 		return true;
16662d25a9bcSRuchika Gupta 	default:
16672d25a9bcSRuchika Gupta 		return false;
16682d25a9bcSRuchika Gupta 	}
16692d25a9bcSRuchika Gupta }
16702d25a9bcSRuchika Gupta 
16712d25a9bcSRuchika Gupta static bool attr_is_modifiable_secret_key(struct pkcs11_attribute_head *attr,
16722d25a9bcSRuchika Gupta 					  struct pkcs11_session *session,
16732d25a9bcSRuchika Gupta 					  struct pkcs11_object *obj)
16742d25a9bcSRuchika Gupta {
16752d25a9bcSRuchika Gupta 	switch (attr->id) {
16762d25a9bcSRuchika Gupta 	case PKCS11_CKA_ENCRYPT:
16772d25a9bcSRuchika Gupta 	case PKCS11_CKA_DECRYPT:
16782d25a9bcSRuchika Gupta 	case PKCS11_CKA_SIGN:
16792d25a9bcSRuchika Gupta 	case PKCS11_CKA_VERIFY:
16802d25a9bcSRuchika Gupta 	case PKCS11_CKA_WRAP:
16812d25a9bcSRuchika Gupta 	case PKCS11_CKA_UNWRAP:
16822d25a9bcSRuchika Gupta 		return true;
16832d25a9bcSRuchika Gupta 	/* Can't be modified once set to CK_FALSE - 12 in Table 10 */
16842d25a9bcSRuchika Gupta 	case PKCS11_CKA_EXTRACTABLE:
16852d25a9bcSRuchika Gupta 		return get_bool(obj->attributes, attr->id);
16862d25a9bcSRuchika Gupta 	/* Can't be modified once set to CK_TRUE - 11 in Table 10 */
16872d25a9bcSRuchika Gupta 	case PKCS11_CKA_SENSITIVE:
16882d25a9bcSRuchika Gupta 	case PKCS11_CKA_WRAP_WITH_TRUSTED:
16892d25a9bcSRuchika Gupta 		return !get_bool(obj->attributes, attr->id);
16902d25a9bcSRuchika Gupta 	/* Change in CKA_TRUSTED can only be done by SO */
16912d25a9bcSRuchika Gupta 	case PKCS11_CKA_TRUSTED:
16922d25a9bcSRuchika Gupta 		return pkcs11_session_is_so(session);
16932d25a9bcSRuchika Gupta 	case PKCS11_CKA_NEVER_EXTRACTABLE:
16942d25a9bcSRuchika Gupta 	case PKCS11_CKA_ALWAYS_SENSITIVE:
16952d25a9bcSRuchika Gupta 		return false;
16962d25a9bcSRuchika Gupta 	default:
16972d25a9bcSRuchika Gupta 		return false;
16982d25a9bcSRuchika Gupta 	}
16992d25a9bcSRuchika Gupta }
17002d25a9bcSRuchika Gupta 
17012d25a9bcSRuchika Gupta static bool attr_is_modifiable_public_key(struct pkcs11_attribute_head *attr,
17022d25a9bcSRuchika Gupta 					  struct pkcs11_session *session,
17032d25a9bcSRuchika Gupta 					  struct pkcs11_object *obj __unused)
17042d25a9bcSRuchika Gupta {
17052d25a9bcSRuchika Gupta 	switch (attr->id) {
17062d25a9bcSRuchika Gupta 	case PKCS11_CKA_SUBJECT:
17072d25a9bcSRuchika Gupta 	case PKCS11_CKA_ENCRYPT:
17082d25a9bcSRuchika Gupta 	case PKCS11_CKA_VERIFY:
17092d25a9bcSRuchika Gupta 	case PKCS11_CKA_VERIFY_RECOVER:
17102d25a9bcSRuchika Gupta 	case PKCS11_CKA_WRAP:
17112d25a9bcSRuchika Gupta 		return true;
17122d25a9bcSRuchika Gupta 	case PKCS11_CKA_TRUSTED:
17132d25a9bcSRuchika Gupta 		/* Change in CKA_TRUSTED can only be done by SO */
17142d25a9bcSRuchika Gupta 		return pkcs11_session_is_so(session);
17152d25a9bcSRuchika Gupta 	default:
17162d25a9bcSRuchika Gupta 		return false;
17172d25a9bcSRuchika Gupta 	}
17182d25a9bcSRuchika Gupta }
17192d25a9bcSRuchika Gupta 
17202d25a9bcSRuchika Gupta static bool attr_is_modifiable_private_key(struct pkcs11_attribute_head *attr,
17212d25a9bcSRuchika Gupta 					   struct pkcs11_session *sess __unused,
17222d25a9bcSRuchika Gupta 					   struct pkcs11_object *obj)
17232d25a9bcSRuchika Gupta {
17242d25a9bcSRuchika Gupta 	switch (attr->id) {
17252d25a9bcSRuchika Gupta 	case PKCS11_CKA_SUBJECT:
17262d25a9bcSRuchika Gupta 	case PKCS11_CKA_DECRYPT:
17272d25a9bcSRuchika Gupta 	case PKCS11_CKA_SIGN:
17282d25a9bcSRuchika Gupta 	case PKCS11_CKA_SIGN_RECOVER:
17292d25a9bcSRuchika Gupta 	case PKCS11_CKA_UNWRAP:
17302d25a9bcSRuchika Gupta 	/*
17312d25a9bcSRuchika Gupta 	 * TBD: Revisit if we don't support PKCS11_CKA_PUBLIC_KEY_INFO
17322d25a9bcSRuchika Gupta 	 * Specification mentions that if this attribute is
17332d25a9bcSRuchika Gupta 	 * supplied as part of a template for C_CreateObject, C_CopyObject or
17342d25a9bcSRuchika Gupta 	 * C_SetAttributeValue for a private key, the token MUST verify
17352d25a9bcSRuchika Gupta 	 * correspondence between the private key data and the public key data
17362d25a9bcSRuchika Gupta 	 * as supplied in CKA_PUBLIC_KEY_INFO. This needs to be
17372d25a9bcSRuchika Gupta 	 * taken care of when this object type will be implemented
17382d25a9bcSRuchika Gupta 	 */
17392d25a9bcSRuchika Gupta 	case PKCS11_CKA_PUBLIC_KEY_INFO:
17402d25a9bcSRuchika Gupta 		return true;
17412d25a9bcSRuchika Gupta 	/* Can't be modified once set to CK_FALSE - 12 in Table 10 */
17422d25a9bcSRuchika Gupta 	case PKCS11_CKA_EXTRACTABLE:
17432d25a9bcSRuchika Gupta 		return get_bool(obj->attributes, attr->id);
17442d25a9bcSRuchika Gupta 	/* Can't be modified once set to CK_TRUE - 11 in Table 10 */
17452d25a9bcSRuchika Gupta 	case PKCS11_CKA_SENSITIVE:
17462d25a9bcSRuchika Gupta 	case PKCS11_CKA_WRAP_WITH_TRUSTED:
17472d25a9bcSRuchika Gupta 		return !get_bool(obj->attributes, attr->id);
17482d25a9bcSRuchika Gupta 	case PKCS11_CKA_NEVER_EXTRACTABLE:
17492d25a9bcSRuchika Gupta 	case PKCS11_CKA_ALWAYS_SENSITIVE:
17502d25a9bcSRuchika Gupta 		return false;
17512d25a9bcSRuchika Gupta 	default:
17522d25a9bcSRuchika Gupta 		return false;
17532d25a9bcSRuchika Gupta 	}
17542d25a9bcSRuchika Gupta }
17552d25a9bcSRuchika Gupta 
17562d25a9bcSRuchika Gupta static bool attribute_is_modifiable(struct pkcs11_session *session,
17572d25a9bcSRuchika Gupta 				    struct pkcs11_attribute_head *req_attr,
17582d25a9bcSRuchika Gupta 				    struct pkcs11_object *obj,
17592d25a9bcSRuchika Gupta 				    enum pkcs11_class_id class,
17602d25a9bcSRuchika Gupta 				    enum processing_func function)
17612d25a9bcSRuchika Gupta {
17622d25a9bcSRuchika Gupta 	/* Check modifiable attributes common to any object */
17632d25a9bcSRuchika Gupta 	switch (req_attr->id) {
17642d25a9bcSRuchika Gupta 	case PKCS11_CKA_LABEL:
17652d25a9bcSRuchika Gupta 		return true;
17662d25a9bcSRuchika Gupta 	case PKCS11_CKA_TOKEN:
17672d25a9bcSRuchika Gupta 	case PKCS11_CKA_MODIFIABLE:
17682d25a9bcSRuchika Gupta 	case PKCS11_CKA_DESTROYABLE:
17692d25a9bcSRuchika Gupta 	case PKCS11_CKA_PRIVATE:
17702d25a9bcSRuchika Gupta 		return function == PKCS11_FUNCTION_COPY;
17712d25a9bcSRuchika Gupta 	case PKCS11_CKA_COPYABLE:
17722d25a9bcSRuchika Gupta 		/*
17732d25a9bcSRuchika Gupta 		 * Specification mentions that if the attribute value is false
17742d25a9bcSRuchika Gupta 		 * it can't be set to true. Reading this we assume that it
17752d25a9bcSRuchika Gupta 		 * should be possible to modify this attribute even though this
17762d25a9bcSRuchika Gupta 		 * is not marked as modifiable in Table 10 if done in right
17772d25a9bcSRuchika Gupta 		 * direction i.e from TRUE -> FALSE.
17782d25a9bcSRuchika Gupta 		 */
17792d25a9bcSRuchika Gupta 		return get_bool(obj->attributes, req_attr->id);
17802d25a9bcSRuchika Gupta 	default:
17812d25a9bcSRuchika Gupta 		break;
17822d25a9bcSRuchika Gupta 	}
17832d25a9bcSRuchika Gupta 
17842d25a9bcSRuchika Gupta 	/* Attribute checking based on class type */
17852d25a9bcSRuchika Gupta 	switch (class) {
17862d25a9bcSRuchika Gupta 	case PKCS11_CKO_SECRET_KEY:
17872d25a9bcSRuchika Gupta 	case PKCS11_CKO_PUBLIC_KEY:
17882d25a9bcSRuchika Gupta 	case PKCS11_CKO_PRIVATE_KEY:
17892d25a9bcSRuchika Gupta 		if (attr_is_modifiable_any_key(req_attr))
17902d25a9bcSRuchika Gupta 			return true;
17912d25a9bcSRuchika Gupta 		if (class == PKCS11_CKO_SECRET_KEY &&
17922d25a9bcSRuchika Gupta 		    attr_is_modifiable_secret_key(req_attr, session, obj))
17932d25a9bcSRuchika Gupta 			return true;
17942d25a9bcSRuchika Gupta 		if (class == PKCS11_CKO_PUBLIC_KEY &&
17952d25a9bcSRuchika Gupta 		    attr_is_modifiable_public_key(req_attr, session, obj))
17962d25a9bcSRuchika Gupta 			return true;
17972d25a9bcSRuchika Gupta 		if (class == PKCS11_CKO_PRIVATE_KEY &&
17982d25a9bcSRuchika Gupta 		    attr_is_modifiable_private_key(req_attr, session, obj))
17992d25a9bcSRuchika Gupta 			return true;
18002d25a9bcSRuchika Gupta 		break;
18012d25a9bcSRuchika Gupta 	case PKCS11_CKO_DATA:
18022d25a9bcSRuchika Gupta 		/* None of the data object attributes are modifiable */
18032d25a9bcSRuchika Gupta 		return false;
18042d25a9bcSRuchika Gupta 	default:
18052d25a9bcSRuchika Gupta 		break;
18062d25a9bcSRuchika Gupta 	}
18072d25a9bcSRuchika Gupta 
18082d25a9bcSRuchika Gupta 	return false;
18092d25a9bcSRuchika Gupta }
18102d25a9bcSRuchika Gupta 
18112d25a9bcSRuchika Gupta enum pkcs11_rc check_attrs_against_modification(struct pkcs11_session *session,
18122d25a9bcSRuchika Gupta 						struct obj_attrs *head,
18132d25a9bcSRuchika Gupta 						struct pkcs11_object *obj,
18142d25a9bcSRuchika Gupta 						enum processing_func function)
18152d25a9bcSRuchika Gupta {
18162d25a9bcSRuchika Gupta 	enum pkcs11_class_id class = PKCS11_CKO_UNDEFINED_ID;
18172d25a9bcSRuchika Gupta 	char *cur = NULL;
18182d25a9bcSRuchika Gupta 	char *end = NULL;
18192d25a9bcSRuchika Gupta 	size_t len = 0;
18202d25a9bcSRuchika Gupta 
18212d25a9bcSRuchika Gupta 	class = get_class(obj->attributes);
18222d25a9bcSRuchika Gupta 
18232d25a9bcSRuchika Gupta 	cur = (char *)head + sizeof(struct obj_attrs);
18242d25a9bcSRuchika Gupta 	end = cur + head->attrs_size;
18252d25a9bcSRuchika Gupta 
18262d25a9bcSRuchika Gupta 	for (; cur < end; cur += len) {
18272d25a9bcSRuchika Gupta 		/* Structure aligned copy of the pkcs11_ref in the object */
18282d25a9bcSRuchika Gupta 		struct pkcs11_attribute_head cli_ref = { };
18292d25a9bcSRuchika Gupta 
18302d25a9bcSRuchika Gupta 		TEE_MemMove(&cli_ref, cur, sizeof(cli_ref));
18312d25a9bcSRuchika Gupta 		len = sizeof(cli_ref) + cli_ref.size;
18322d25a9bcSRuchika Gupta 
18332d25a9bcSRuchika Gupta 		/*
18342d25a9bcSRuchika Gupta 		 * Check 1 - Check if attribute belongs to the object
18352d25a9bcSRuchika Gupta 		 * The obj->attributes has all the attributes in
18362d25a9bcSRuchika Gupta 		 * it which are allowed for an object.
18372d25a9bcSRuchika Gupta 		 */
18382d25a9bcSRuchika Gupta 		if (get_attribute_ptr(obj->attributes, cli_ref.id, NULL,
18392d25a9bcSRuchika Gupta 				      NULL) == PKCS11_RV_NOT_FOUND)
18402d25a9bcSRuchika Gupta 			return PKCS11_CKR_ATTRIBUTE_TYPE_INVALID;
18412d25a9bcSRuchika Gupta 
18422d25a9bcSRuchika Gupta 		/* Check 2 - Is attribute modifiable */
18432d25a9bcSRuchika Gupta 		if (!attribute_is_modifiable(session, &cli_ref, obj, class,
18442d25a9bcSRuchika Gupta 					     function))
18452d25a9bcSRuchika Gupta 			return PKCS11_CKR_ATTRIBUTE_READ_ONLY;
18462d25a9bcSRuchika Gupta 
18472d25a9bcSRuchika Gupta 		/*
18482d25a9bcSRuchika Gupta 		 * Checks for modification in PKCS11_CKA_TOKEN and
18492d25a9bcSRuchika Gupta 		 * PKCS11_CKA_PRIVATE are required for PKCS11_FUNCTION_COPY
18502d25a9bcSRuchika Gupta 		 * only, so skip them for PKCS11_FUNCTION_MODIFY.
18512d25a9bcSRuchika Gupta 		 */
18522d25a9bcSRuchika Gupta 		if (function == PKCS11_FUNCTION_MODIFY)
18532d25a9bcSRuchika Gupta 			continue;
18542d25a9bcSRuchika Gupta 
18552d25a9bcSRuchika Gupta 		/*
18562d25a9bcSRuchika Gupta 		 * An attempt to copy an object to a token will fail for
18572d25a9bcSRuchika Gupta 		 * RO session
18582d25a9bcSRuchika Gupta 		 */
18592d25a9bcSRuchika Gupta 		if (cli_ref.id == PKCS11_CKA_TOKEN &&
18602d25a9bcSRuchika Gupta 		    get_bool(head, PKCS11_CKA_TOKEN)) {
18612d25a9bcSRuchika Gupta 			if (!pkcs11_session_is_read_write(session)) {
18622d25a9bcSRuchika Gupta 				DMSG("Can't copy to token in a RO session");
18632d25a9bcSRuchika Gupta 				return PKCS11_CKR_SESSION_READ_ONLY;
18642d25a9bcSRuchika Gupta 			}
18652d25a9bcSRuchika Gupta 		}
18662d25a9bcSRuchika Gupta 
18672d25a9bcSRuchika Gupta 		if (cli_ref.id == PKCS11_CKA_PRIVATE) {
18682d25a9bcSRuchika Gupta 			bool parent_priv =
18692d25a9bcSRuchika Gupta 				get_bool(obj->attributes, cli_ref.id);
18702d25a9bcSRuchika Gupta 			bool obj_priv = get_bool(head, cli_ref.id);
18712d25a9bcSRuchika Gupta 
18722d25a9bcSRuchika Gupta 			/*
18732d25a9bcSRuchika Gupta 			 * If PKCS11_CKA_PRIVATE is being set to TRUE from
18742d25a9bcSRuchika Gupta 			 * FALSE, user has to be logged in
18752d25a9bcSRuchika Gupta 			 */
18762d25a9bcSRuchika Gupta 			if (!parent_priv && obj_priv) {
18772d25a9bcSRuchika Gupta 				if ((pkcs11_session_is_public(session) ||
18782d25a9bcSRuchika Gupta 				     pkcs11_session_is_so(session)))
18792d25a9bcSRuchika Gupta 					return PKCS11_CKR_USER_NOT_LOGGED_IN;
18802d25a9bcSRuchika Gupta 			}
1881df017b2bSRuchika Gupta 
1882df017b2bSRuchika Gupta 			/*
1883df017b2bSRuchika Gupta 			 * Restriction added - Even for Copy, do not allow
1884df017b2bSRuchika Gupta 			 * modification of CKA_PRIVATE from TRUE to FALSE
1885df017b2bSRuchika Gupta 			 */
1886df017b2bSRuchika Gupta 			if (parent_priv && !obj_priv)
1887df017b2bSRuchika Gupta 				return PKCS11_CKR_TEMPLATE_INCONSISTENT;
18882d25a9bcSRuchika Gupta 		}
18892d25a9bcSRuchika Gupta 	}
18902d25a9bcSRuchika Gupta 
18912d25a9bcSRuchika Gupta 	return PKCS11_CKR_OK;
18922d25a9bcSRuchika Gupta }
18938c499324SRuchika Gupta 
18948c499324SRuchika Gupta static enum pkcs11_rc set_secret_key_data(struct obj_attrs **head, void *data,
18958c499324SRuchika Gupta 					  size_t key_size)
18968c499324SRuchika Gupta {
18978c499324SRuchika Gupta 	uint32_t size = sizeof(uint32_t);
18988c499324SRuchika Gupta 	uint32_t key_length = 0;
18998c499324SRuchika Gupta 	enum pkcs11_rc rc = PKCS11_CKR_GENERAL_ERROR;
19008c499324SRuchika Gupta 
19018c499324SRuchika Gupta 	/* Get key size if present in template */
19028c499324SRuchika Gupta 	rc = get_attribute(*head, PKCS11_CKA_VALUE_LEN, &key_length, &size);
19038c499324SRuchika Gupta 	if (rc && rc != PKCS11_RV_NOT_FOUND)
19048c499324SRuchika Gupta 		return rc;
19058c499324SRuchika Gupta 
19068c499324SRuchika Gupta 	if (key_length) {
19078c499324SRuchika Gupta 		if (key_size < key_length)
19088c499324SRuchika Gupta 			return PKCS11_CKR_DATA_LEN_RANGE;
19098c499324SRuchika Gupta 	} else {
19108c499324SRuchika Gupta 		key_length = key_size;
19118c499324SRuchika Gupta 		rc = set_attribute(head, PKCS11_CKA_VALUE_LEN, &key_length,
19128c499324SRuchika Gupta 				   sizeof(uint32_t));
19138c499324SRuchika Gupta 		if (rc)
19148c499324SRuchika Gupta 			return rc;
19158c499324SRuchika Gupta 	}
19168c499324SRuchika Gupta 
19178c499324SRuchika Gupta 	/* Now we can check the VALUE_LEN field */
19188c499324SRuchika Gupta 	rc = check_created_attrs(*head, NULL);
19198c499324SRuchika Gupta 	if (rc)
19208c499324SRuchika Gupta 		return rc;
19218c499324SRuchika Gupta 
19228c499324SRuchika Gupta 	/* Remove the default empty value attribute if found */
19238c499324SRuchika Gupta 	rc = remove_empty_attribute(head, PKCS11_CKA_VALUE);
19248c499324SRuchika Gupta 	if (rc != PKCS11_CKR_OK && rc != PKCS11_RV_NOT_FOUND)
19258c499324SRuchika Gupta 		return PKCS11_CKR_GENERAL_ERROR;
19268c499324SRuchika Gupta 
19278c499324SRuchika Gupta 	return add_attribute(head, PKCS11_CKA_VALUE, data, key_length);
19288c499324SRuchika Gupta }
19298c499324SRuchika Gupta 
19308c499324SRuchika Gupta enum pkcs11_rc set_key_data(struct obj_attrs **head, void *data,
19318c499324SRuchika Gupta 			    size_t key_size)
19328c499324SRuchika Gupta {
19338c499324SRuchika Gupta 	switch (get_class(*head)) {
19348c499324SRuchika Gupta 	case PKCS11_CKO_SECRET_KEY:
19358c499324SRuchika Gupta 		return set_secret_key_data(head, data, key_size);
19368c499324SRuchika Gupta 	default:
19378c499324SRuchika Gupta 		return PKCS11_CKR_GENERAL_ERROR;
19388c499324SRuchika Gupta 	}
19398c499324SRuchika Gupta }
19405e1d94ebSVesa Jääskeläinen 
19415f80f270SRuchika Gupta enum pkcs11_rc get_key_data_to_wrap(struct obj_attrs *head, void **data,
19425f80f270SRuchika Gupta 				    uint32_t *sz)
19435f80f270SRuchika Gupta {
19445f80f270SRuchika Gupta 	switch (get_class(head)) {
19455f80f270SRuchika Gupta 	case PKCS11_CKO_SECRET_KEY:
19465f80f270SRuchika Gupta 		if (get_attribute_ptr(head, PKCS11_CKA_VALUE, data, sz))
19475f80f270SRuchika Gupta 			return PKCS11_CKR_ARGUMENTS_BAD;
19485f80f270SRuchika Gupta 		break;
19495f80f270SRuchika Gupta 	default:
19505f80f270SRuchika Gupta 		return PKCS11_CKR_GENERAL_ERROR;
19515f80f270SRuchika Gupta 	}
19525f80f270SRuchika Gupta 
19535f80f270SRuchika Gupta 	return PKCS11_CKR_OK;
19545f80f270SRuchika Gupta }
19555f80f270SRuchika Gupta 
19565e1d94ebSVesa Jääskeläinen enum pkcs11_rc add_missing_attribute_id(struct obj_attrs **pub_head,
19575e1d94ebSVesa Jääskeläinen 					struct obj_attrs **priv_head)
19585e1d94ebSVesa Jääskeläinen {
19595e1d94ebSVesa Jääskeläinen 	enum pkcs11_rc rc = PKCS11_CKR_GENERAL_ERROR;
19605e1d94ebSVesa Jääskeläinen 	void *id1 = NULL;
19615e1d94ebSVesa Jääskeläinen 	uint32_t id1_size = 0;
19625e1d94ebSVesa Jääskeläinen 	void *id2 = NULL;
19635e1d94ebSVesa Jääskeläinen 	uint32_t id2_size = 0;
19645e1d94ebSVesa Jääskeläinen 
19655e1d94ebSVesa Jääskeläinen 	assert(pub_head);
19665e1d94ebSVesa Jääskeläinen 	assert(priv_head);
19675e1d94ebSVesa Jääskeläinen 
19685e1d94ebSVesa Jääskeläinen 	rc = get_attribute_ptr(*pub_head, PKCS11_CKA_ID, &id1, &id1_size);
19695e1d94ebSVesa Jääskeläinen 	if (rc) {
19705e1d94ebSVesa Jääskeläinen 		if (rc != PKCS11_RV_NOT_FOUND)
19715e1d94ebSVesa Jääskeläinen 			return rc;
19725e1d94ebSVesa Jääskeläinen 		id1 = NULL;
19735e1d94ebSVesa Jääskeläinen 	} else if (!id1_size) {
19745e1d94ebSVesa Jääskeläinen 		id1 = NULL;
19755e1d94ebSVesa Jääskeläinen 	}
19765e1d94ebSVesa Jääskeläinen 
19775e1d94ebSVesa Jääskeläinen 	rc = get_attribute_ptr(*priv_head, PKCS11_CKA_ID, &id2, &id2_size);
19785e1d94ebSVesa Jääskeläinen 	if (rc) {
19795e1d94ebSVesa Jääskeläinen 		if (rc != PKCS11_RV_NOT_FOUND)
19805e1d94ebSVesa Jääskeläinen 			return rc;
19815e1d94ebSVesa Jääskeläinen 		id2 = NULL;
19825e1d94ebSVesa Jääskeläinen 	} else if (!id2_size) {
19835e1d94ebSVesa Jääskeläinen 		id2 = NULL;
19845e1d94ebSVesa Jääskeläinen 	}
19855e1d94ebSVesa Jääskeläinen 
19865e1d94ebSVesa Jääskeläinen 	/* Both have value -- let them be what caller has specified them */
19875e1d94ebSVesa Jääskeläinen 	if (id1 && id2)
19885e1d94ebSVesa Jääskeläinen 		return PKCS11_CKR_OK;
19895e1d94ebSVesa Jääskeläinen 
19905e1d94ebSVesa Jääskeläinen 	/* Both are empty -- leave empty values */
19915e1d94ebSVesa Jääskeläinen 	if (!id1 && !id2)
19925e1d94ebSVesa Jääskeläinen 		return PKCS11_CKR_OK;
19935e1d94ebSVesa Jääskeläinen 
19945e1d94ebSVesa Jääskeläinen 	/* Cross copy CKA_ID value */
19955e1d94ebSVesa Jääskeläinen 	if (id1)
19965e1d94ebSVesa Jääskeläinen 		return set_attribute(priv_head, PKCS11_CKA_ID, id1, id1_size);
19975e1d94ebSVesa Jääskeläinen 	else
19985e1d94ebSVesa Jääskeläinen 		return set_attribute(pub_head, PKCS11_CKA_ID, id2, id2_size);
19995e1d94ebSVesa Jääskeläinen }
2000