1/*
2 *		Common Public License Version 0.5
3 *
4 *		THE ACCOMPANYING PROGRAM IS PROVIDED UNDER THE TERMS OF
5 *		THIS COMMON PUBLIC LICENSE ("AGREEMENT"). ANY USE,
6 *		REPRODUCTION OR DISTRIBUTION OF THE PROGRAM CONSTITUTES
7 *		RECIPIENT'S ACCEPTANCE OF THIS AGREEMENT.
8 *
9 *		1. DEFINITIONS
10 *
11 *		"Contribution" means:
12 *			a) in the case of the initial Contributor, the
13 *			initial code and documentation distributed under
14 *			this Agreement, and
15 *
16 *			b) in the case of each subsequent Contributor:
17 *			i) changes to the Program, and
18 *			ii) additions to the Program;
19 *
20 *			where such changes and/or additions to the Program
21 *			originate from and are distributed by that
22 *			particular Contributor. A Contribution 'originates'
23 *			from a Contributor if it was added to the Program
24 *			by such Contributor itself or anyone acting on such
25 *			Contributor's behalf. Contributions do not include
26 *			additions to the Program which: (i) are separate
27 *			modules of software distributed in conjunction with
28 *			the Program under their own license agreement, and
29 *			(ii) are not derivative works of the Program.
30 *
31 *
32 *		"Contributor" means any person or entity that distributes
33 *		the Program.
34 *
35 *		"Licensed Patents " mean patent claims licensable by a
36 *		Contributor which are necessarily infringed by the use or
37 *		sale of its Contribution alone or when combined with the
38 *		Program.
39 *
40 *		"Program" means the Contributions distributed in
41 *		accordance with this Agreement.
42 *
43 *		"Recipient" means anyone who receives the Program under
44 *		this Agreement, including all Contributors.
45 *
46 *		2. GRANT OF RIGHTS
47 *
48 *			a) Subject to the terms of this Agreement, each
49 *			Contributor hereby grants Recipient a
50 *			no - exclusive, worldwide, royalt - free copyright
51 *			license to reproduce, prepare derivative works of,
52 *			publicly display, publicly perform, distribute and
53 *			sublicense the Contribution of such Contributor, if
54 *			any, and such derivative works, in source code and
55 *			object code form.
56 *
57 *			b) Subject to the terms of this Agreement, each
58 *			Contributor hereby grants Recipient a
59 *			no - exclusive, worldwide, royalt - free patent
60 *			license under Licensed Patents to make, use, sell,
61 *			offer to sell, import and otherwise transfer the
62 *			Contribution of such Contributor, if any, in source
63 *			code and object code form. This patent license
64 *			shall apply to the combination of the Contribution
65 *			and the Program if, at the time the Contribution is
66 *			added by the Contributor, such addition of the
67 *			Contribution causes such combination to be covered
68 *			by the Licensed Patents. The patent license shall
69 *			not apply to any other combinations which include
70 *			the Contribution. No hardware per se is licensed
71 *			hereunder.
72 *
73 *			c) Recipient understands that although each
74 *			Contributor grants the licenses to its
75 *			Contributions set forth herein, no assurances are
76 *			provided by any Contributor that the Program does
77 *			not infringe the patent or other intellectual
78 *			property rights of any other entity. Each
79 *			Contributor disclaims any liability to Recipient
80 *			for claims brought by any other entity based on
81 *			infringement of intellectual property rights or
82 *			otherwise. As a condition to exercising the rights
83 *			and licenses granted hereunder, each Recipient
84 *			hereby assumes sole responsibility to secure any
85 *			other intellectual property rights needed, if any.
86 *
87 *			For example, if a third party patent license is
88 *			required to allow Recipient to distribute the
89 *			Program, it is Recipient's responsibility to
90 *			acquire that license before distributing the
91 *			Program.
92 *
93 *			d) Each Contributor represents that to its
94 *			knowledge it has sufficient copyright rights in its
95 *			Contribution, if any, to grant the copyright
96 *			license set forth in this Agreement.
97 *
98 *		3. REQUIREMENTS
99 *
100 *		A Contributor may choose to distribute the Program in
101 *		object code form under its own license agreement, provided
102 *		that:
103 *			a) it complies with the terms and conditions of
104 *			this Agreement; and
105 *
106 *			b) its license agreement:
107 *			i) effectively disclaims on behalf of all
108 *			Contributors all warranties and conditions, express
109 *			and implied, including warranties or conditions of
110 *			title and no - infringement, and implied warranties
111 *			or conditions of merchantability and fitness for a
112 *			particular purpose;
113 *
114 *			ii) effectively excludes on behalf of all
115 *			Contributors all liability for damages, including
116 *			direct, indirect, special, incidental and
117 *			consequential damages, such as lost profits;
118 *
119 *			iii) states that any provisions which differ from
120 *			this Agreement are offered by that Contributor
121 *			alone and not by any other party; and
122 *
123 *			iv) states that source code for the Program is
124 *			available from such Contributor, and informs
125 *			licensees how to obtain it in a reasonable manner
126 *			on or through a medium customarily used for
127 *			software exchange.
128 *
129 *		When the Program is made available in source code form:
130 *			a) it must be made available under this Agreement;
131 *			and
132 *			b) a copy of this Agreement must be included with
133 *			each copy of the Program.
134 *
135 *		Contributors may not remove or alter any copyright notices
136 *		contained within the Program.
137 *
138 *		Each Contributor must identify itself as the originator of
139 *		its Contribution, if any, in a manner that reasonably
140 *		allows subsequent Recipients to identify the originator of
141 *		the Contribution.
142 *
143 *
144 *		4. COMMERCIAL DISTRIBUTION
145 *
146 *		Commercial distributors of software may accept certain
147 *		responsibilities with respect to end users, business
148 *		partners and the like. While this license is intended to
149 *		facilitate the commercial use of the Program, the
150 *		Contributor who includes the Program in a commercial
151 *		product offering should do so in a manner which does not
152 *		create potential liability for other Contributors.
153 *		Therefore, if a Contributor includes the Program in a
154 *		commercial product offering, such Contributor ("Commercial
155 *		Contributor") hereby agrees to defend and indemnify every
156 *		other Contributor ("Indemnified Contributor") against any
157 *		losses, damages and costs (collectively "Losses") arising
158 *		from claims, lawsuits and other legal actions brought by a
159 *		third party against the Indemnified Contributor to the
160 *		extent caused by the acts or omissions of such Commercial
161 *		Contributor in connection with its distribution of the
162 *		Program in a commercial product offering. The obligations
163 *		in this section do not apply to any claims or Losses
164 *		relating to any actual or alleged intellectual property
165 *		infringement. In order to qualify, an Indemnified
166 *		Contributor must: a) promptly notify the Commercial
167 *		Contributor in writing of such claim, and b) allow the
168 *		Commercial Contributor to control, and cooperate with the
169 *		Commercial Contributor in, the defense and any related
170 *		settlement negotiations. The Indemnified Contributor may
171 *		participate in any such claim at its own expense.
172 *
173 *
174 *		For example, a Contributor might include the Program in a
175 *		commercial product offering, Product X. That Contributor
176 *		is then a Commercial Contributor. If that Commercial
177 *		Contributor then makes performance claims, or offers
178 *		warranties related to Product X, those performance claims
179 *		and warranties are such Commercial Contributor's
180 *		responsibility alone. Under this section, the Commercial
181 *		Contributor would have to defend claims against the other
182 *		Contributors related to those performance claims and
183 *		warranties, and if a court requires any other Contributor
184 *		to pay any damages as a result, the Commercial Contributor
185 *		must pay those damages.
186 *
187 *
188 *		5. NO WARRANTY
189 *
190 *		EXCEPT AS EXPRESSLY SET FORTH IN THIS AGREEMENT, THE
191 *		PROGRAM IS PROVIDED ON AN "AS IS" BASIS, WITHOUT
192 *		WARRANTIES OR CONDITIONS OF ANY KIND, EITHER EXPRESS OR
193 *		IMPLIED INCLUDING, WITHOUT LIMITATION, ANY WARRANTIES OR
194 *		CONDITIONS OF TITLE, NO - INFRINGEMENT, MERCHANTABILITY OR
195 *		FITNESS FOR A PARTICULAR PURPOSE. Each Recipient is solely
196 *		responsible for determining the appropriateness of using
197 *		and distributing the Program and assumes all risks
198 *		associated with its exercise of rights under this
199 *		Agreement, including but not limited to the risks and
200 *		costs of program errors, compliance with applicable laws,
201 *		damage to or loss of data, programs or equipment, and
202 *		unavailability or interruption of operations.
203 *
204 *		6. DISCLAIMER OF LIABILITY
205 *		EXCEPT AS EXPRESSLY SET FORTH IN THIS AGREEMENT, NEITHER
206 *		RECIPIENT NOR ANY CONTRIBUTORS SHALL HAVE ANY LIABILITY
207 *		FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,
208 *		OR CONSEQUENTIAL DAMAGES (INCLUDING WITHOUT LIMITATION
209 *		LOST PROFITS), HOWEVER CAUSED AND ON ANY THEORY OF
210 *		LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
211 *		(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
212 *		OF THE USE OR DISTRIBUTION OF THE PROGRAM OR THE EXERCISE
213 *		OF ANY RIGHTS GRANTED HEREUNDER, EVEN IF ADVISED OF THE
214 *		POSSIBILITY OF SUCH DAMAGES.
215 *
216 *		7. GENERAL
217 *
218 *		If any provision of this Agreement is invalid or
219 *		unenforceable under applicable law, it shall not affect
220 *		the validity or enforceability of the remainder of the
221 *		terms of this Agreement, and without further action by the
222 *		parties hereto, such provision shall be reformed to the
223 *		minimum extent necessary to make such provision valid and
224 *		enforceable.
225 *
226 *
227 *		If Recipient institutes patent litigation against a
228 *		Contributor with respect to a patent applicable to
229 *		software (including a cros - claim or counterclaim in a
230 *		lawsuit), then any patent licenses granted by that
231 *		Contributor to such Recipient under this Agreement shall
232 *		terminate as of the date such litigation is filed. In
233 *		addition, If Recipient institutes patent litigation
234 *		against any entity (including a cros - claim or
235 *		counterclaim in a lawsuit) alleging that the Program
236 *		itself (excluding combinations of the Program with other
237 *		software or hardware) infringes such Recipient's
238 *		patent(s), then such Recipient's rights granted under
239 *		Section 2(b) shall terminate as of the date such
240 *		litigation is filed.
241 *
242 *		All Recipient's rights under this Agreement shall
243 *		terminate if it fails to comply with any of the material
244 *		terms or conditions of this Agreement and does not cure
245 *		such failure in a reasonable period of time after becoming
246 *		aware of such noncompliance. If all Recipient's rights
247 *		under this Agreement terminate, Recipient agrees to cease
248 *		use and distribution of the Program as soon as reasonably
249 *		practicable. However, Recipient's obligations under this
250 *		Agreement and any licenses granted by Recipient relating
251 *		to the Program shall continue and survive.
252 *
253 *		Everyone is permitted to copy and distribute copies of
254 *		this Agreement, but in order to avoid inconsistency the
255 *		Agreement is copyrighted and may only be modified in the
256 *		following manner. The Agreement Steward reserves the right
257 *		to publish new versions (including revisions) of this
258 *		Agreement from time to time. No one other than the
259 *		Agreement Steward has the right to modify this Agreement.
260 *
261 *		IBM is the initial Agreement Steward. IBM may assign the
262 *		responsibility to serve as the Agreement Steward to a
263 *		suitable separate entity. Each new version of the
264 *		Agreement will be given a distinguishing version number.
265 *		The Program (including Contributions) may always be
266 *		distributed subject to the version of the Agreement under
267 *		which it was received. In addition, after a new version of
268 *		the Agreement is published, Contributor may elect to
269 *		distribute the Program (including its Contributions) under
270 *		the new version. Except as expressly stated in Sections
271 *		2(a) and 2(b) above, Recipient receives no rights or
272 *		licenses to the intellectual property of any Contributor
273 *		under this Agreement, whether expressly, by implication,
274 *		estoppel or otherwise. All rights in the Program not
275 *		expressly granted under this Agreement are reserved.
276 *
277 *
278 *		This Agreement is governed by the laws of the State of New
279 *		York and the intellectual property laws of the United
280 *		States of America. No party to this Agreement will bring a
281 *		legal action under this Agreement more than one year after
282 *		the cause of action arose. Each party waives its rights to
283 *		a jury trial in any resulting litigation.
284 *
285 *
286 *
287 * (C) COPYRIGHT International Business Machines Corp. 2001, 2002
288 */
289/*
290 * Copyright 2009 Sun Microsystems, Inc.  All rights reserved.
291 * Use is subject to license terms.
292 */
293#include "tpmtok_int.h"
294
295CK_RV
296key_object_check_required_attributes(TEMPLATE *tmpl, CK_ULONG mode)
297{
298	CK_ATTRIBUTE * attr = NULL;
299	CK_BBOOL    found;
300
301	found = template_attribute_find(tmpl, CKA_KEY_TYPE, &attr);
302	if (! found) {
303		if (mode == MODE_CREATE) {
304			return (CKR_TEMPLATE_INCOMPLETE);
305		}
306	}
307
308	return (template_check_required_base_attributes(tmpl, mode));
309}
310
311CK_RV
312key_object_set_default_attributes(TEMPLATE *tmpl, CK_ULONG mode)
313{
314	CK_ATTRIBUTE * id_attr	= NULL;
315	CK_ATTRIBUTE * sdate_attr  = NULL;
316	CK_ATTRIBUTE * edate_attr  = NULL;
317	CK_ATTRIBUTE * derive_attr = NULL;
318	CK_ATTRIBUTE * local_attr  = NULL;
319
320	// satisfy the compiler
321	//
322	if (mode)
323		id_attr = NULL;
324
325	id_attr	= (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE));
326	sdate_attr	= (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE));
327	edate_attr	= (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE));
328	derive_attr    = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
329	    sizeof (CK_BBOOL));
330	local_attr	= (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
331	    sizeof (CK_BBOOL));
332
333	if (! id_attr || ! sdate_attr || ! edate_attr ||
334	    ! derive_attr || ! local_attr) {
335		if (id_attr)	free(id_attr);
336		if (sdate_attr)   free(sdate_attr);
337		if (edate_attr)   free(edate_attr);
338		if (derive_attr)  free(derive_attr);
339		if (local_attr)   free(local_attr);
340		return (CKR_HOST_MEMORY);
341	}
342
343	id_attr->type	   = CKA_ID;
344	id_attr->ulValueLen	= 0;
345	id_attr->pValue	 = NULL;
346
347	sdate_attr->type	= CKA_START_DATE;
348	sdate_attr->ulValueLen  = 0;
349	sdate_attr->pValue	= NULL;
350
351	edate_attr->type	= CKA_END_DATE;
352	edate_attr->ulValueLen  = 0;
353	edate_attr->pValue	= NULL;
354
355	derive_attr->type	= CKA_DERIVE;
356	derive_attr->ulValueLen = sizeof (CK_BBOOL);
357	derive_attr->pValue	= (CK_BYTE *)derive_attr +
358	    sizeof (CK_ATTRIBUTE);
359	*(CK_BBOOL *)derive_attr->pValue = FALSE;
360
361	local_attr->type	= CKA_LOCAL;
362	local_attr->ulValueLen  = sizeof (CK_BBOOL);
363	local_attr->pValue	= (CK_BYTE *)local_attr + sizeof (CK_ATTRIBUTE);
364	*(CK_BBOOL *)local_attr->pValue = FALSE;
365
366	(void) template_update_attribute(tmpl, id_attr);
367	(void) template_update_attribute(tmpl, sdate_attr);
368	(void) template_update_attribute(tmpl, edate_attr);
369	(void) template_update_attribute(tmpl, derive_attr);
370	(void) template_update_attribute(tmpl, local_attr);
371
372	return (CKR_OK);
373}
374
375CK_RV
376key_object_validate_attribute(TEMPLATE *tmpl,
377	CK_ATTRIBUTE *attr, CK_ULONG mode)
378{
379	switch (attr->type) {
380		case CKA_KEY_TYPE:
381		if (mode == MODE_CREATE || mode == MODE_DERIVE ||
382		    mode == MODE_KEYGEN || mode == MODE_UNWRAP)
383			return (CKR_OK);
384		else {
385			return (CKR_ATTRIBUTE_READ_ONLY);
386		}
387		case CKA_ID:
388		case CKA_START_DATE:
389		case CKA_END_DATE:
390		case CKA_DERIVE:
391			return (CKR_OK);
392
393		case CKA_LOCAL:
394			return (CKR_ATTRIBUTE_READ_ONLY);
395
396		default:
397		return (template_validate_base_attribute(tmpl, attr, mode));
398	}
399}
400
401CK_RV
402publ_key_check_required_attributes(TEMPLATE *tmpl, CK_ULONG mode) {
403	return (key_object_check_required_attributes(tmpl, mode));
404}
405
406CK_RV
407publ_key_set_default_attributes(TEMPLATE *tmpl, CK_ULONG mode)
408{
409	CK_ATTRIBUTE    *class_attr	  = NULL;
410	CK_ATTRIBUTE    *subject_attr	= NULL;
411	CK_ATTRIBUTE    *encrypt_attr	= NULL;
412	CK_ATTRIBUTE    *verify_attr	 = NULL;
413	CK_ATTRIBUTE    *verify_recover_attr = NULL;
414	CK_ATTRIBUTE    *wrap_attr	   = NULL;
415
416	CK_OBJECT_CLASS  class = CKO_PUBLIC_KEY;
417	CK_RV	    rc;
418
419
420	rc = key_object_set_default_attributes(tmpl, mode);
421	if (rc != CKR_OK) {
422		return (rc);
423	}
424	//
425	// add the default CKO_PUBLIC_KEY attributes
426	//
427	class_attr	  = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
428	    sizeof (CK_OBJECT_CLASS));
429	subject_attr	= (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE));
430	encrypt_attr	= (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
431	    sizeof (CK_BBOOL));
432	verify_attr	 = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
433	    sizeof (CK_BBOOL));
434	verify_recover_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
435	    sizeof (CK_BBOOL));
436	wrap_attr	   = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
437	    sizeof (CK_BBOOL));
438
439	if (! class || ! subject_attr || ! encrypt_attr ||
440	    ! verify_attr || ! verify_recover_attr || ! wrap_attr) {
441		if (class_attr)	  free(class_attr);
442		if (subject_attr)	free(subject_attr);
443		if (encrypt_attr)	free(encrypt_attr);
444		if (verify_attr)	 free(verify_attr);
445		if (verify_recover_attr) free(verify_recover_attr);
446		if (wrap_attr)	   free(wrap_attr);
447
448		return (CKR_HOST_MEMORY);
449	}
450
451	class_attr->type	   = CKA_CLASS;
452	class_attr->ulValueLen	= sizeof (CK_OBJECT_CLASS);
453	class_attr->pValue	 = (CK_BYTE *)class_attr +
454	    sizeof (CK_ATTRIBUTE);
455	*(CK_OBJECT_CLASS *)class_attr->pValue = CKO_PUBLIC_KEY;
456
457	subject_attr->type	 = CKA_SUBJECT;
458	subject_attr->ulValueLen   = 0;  // empty string
459	subject_attr->pValue	= NULL;
460
461	encrypt_attr->type	  = CKA_ENCRYPT;
462	encrypt_attr->ulValueLen    = sizeof (CK_BBOOL);
463	encrypt_attr->pValue	= (CK_BYTE *)encrypt_attr +
464	    sizeof (CK_ATTRIBUTE);
465	*(CK_BBOOL *)encrypt_attr->pValue = TRUE;
466
467	verify_attr->type	  = CKA_VERIFY;
468	verify_attr->ulValueLen    = sizeof (CK_BBOOL);
469	verify_attr->pValue	= (CK_BYTE *)verify_attr +
470	    sizeof (CK_ATTRIBUTE);
471	*(CK_BBOOL *)verify_attr->pValue = TRUE;
472
473	verify_recover_attr->type	  = CKA_VERIFY_RECOVER;
474	verify_recover_attr->ulValueLen    = sizeof (CK_BBOOL);
475	verify_recover_attr->pValue	= (CK_BYTE *)verify_recover_attr +
476	    sizeof (CK_ATTRIBUTE);
477	*(CK_BBOOL *)verify_recover_attr->pValue = TRUE;
478
479	wrap_attr->type	  = CKA_WRAP;
480	wrap_attr->ulValueLen    = sizeof (CK_BBOOL);
481	wrap_attr->pValue	= (CK_BYTE *)wrap_attr +
482	    sizeof (CK_ATTRIBUTE);
483	*(CK_BBOOL *)wrap_attr->pValue = TRUE;
484
485	(void) template_update_attribute(tmpl, class_attr);
486	(void) template_update_attribute(tmpl, subject_attr);
487	(void) template_update_attribute(tmpl, encrypt_attr);
488	(void) template_update_attribute(tmpl, verify_attr);
489	(void) template_update_attribute(tmpl, verify_recover_attr);
490	(void) template_update_attribute(tmpl, wrap_attr);
491
492	return (CKR_OK);
493}
494
495CK_RV
496publ_key_validate_attribute(TEMPLATE *tmpl,
497	CK_ATTRIBUTE *attr, CK_ULONG mode) {
498	switch (attr->type) {
499		case CKA_SUBJECT:
500			return (CKR_OK);
501
502		case CKA_ENCRYPT:
503		case CKA_VERIFY:
504		case CKA_VERIFY_RECOVER:
505		case CKA_WRAP:
506		if (mode == MODE_MODIFY) {
507			if (nv_token_data->tweak_vector.allow_key_mods == TRUE)
508				return (CKR_OK);
509			return (CKR_ATTRIBUTE_READ_ONLY);
510		}
511		return (CKR_OK);
512
513		default:
514		return (key_object_validate_attribute(tmpl, attr, mode));
515	}
516}
517
518CK_RV
519priv_key_check_required_attributes(TEMPLATE *tmpl, CK_ULONG mode) {
520	return (key_object_check_required_attributes(tmpl, mode));
521}
522
523CK_RV
524priv_key_set_default_attributes(TEMPLATE *tmpl, CK_ULONG mode)
525{
526	CK_ATTRIBUTE    *class_attr	= NULL;
527	CK_ATTRIBUTE    *subject_attr	= NULL;
528	CK_ATTRIBUTE    *sensitive_attr    = NULL;
529	CK_ATTRIBUTE    *decrypt_attr	= NULL;
530	CK_ATTRIBUTE    *sign_attr	 = NULL;
531	CK_ATTRIBUTE    *sign_recover_attr = NULL;
532	CK_ATTRIBUTE    *unwrap_attr	= NULL;
533	CK_ATTRIBUTE    *extractable_attr  = NULL;
534	CK_ATTRIBUTE    *never_extr_attr   = NULL;
535	CK_ATTRIBUTE    *always_sens_attr  = NULL;
536	CK_RV	    rc;
537
538
539	rc = key_object_set_default_attributes(tmpl, mode);
540	if (rc != CKR_OK) {
541		return (rc);
542	}
543	class_attr	= (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
544	    sizeof (CK_OBJECT_CLASS));
545	subject_attr	= (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE));
546	sensitive_attr    = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
547	    sizeof (CK_BBOOL));
548	decrypt_attr	= (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
549	    sizeof (CK_BBOOL));
550	sign_attr	 = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
551	    sizeof (CK_BBOOL));
552	sign_recover_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
553	    sizeof (CK_BBOOL));
554	unwrap_attr	= (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
555	    sizeof (CK_BBOOL));
556	extractable_attr  = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
557	    sizeof (CK_BBOOL));
558	never_extr_attr   = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
559	    sizeof (CK_BBOOL));
560	always_sens_attr  = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
561	    sizeof (CK_BBOOL));
562
563	if (! class_attr || ! subject_attr || ! sensitive_attr ||
564	    ! decrypt_attr || ! sign_attr || ! sign_recover_attr ||
565	    ! unwrap_attr || ! extractable_attr ||
566	    ! never_extr_attr || ! always_sens_attr) {
567		if (class_attr)	free(class_attr);
568		if (subject_attr)	free(subject_attr);
569		if (sensitive_attr)    free(sensitive_attr);
570		if (decrypt_attr)	free(decrypt_attr);
571		if (sign_attr)	 free(sign_attr);
572		if (sign_recover_attr) free(sign_recover_attr);
573		if (unwrap_attr)	free(unwrap_attr);
574		if (extractable_attr)  free(extractable_attr);
575		if (always_sens_attr)  free(always_sens_attr);
576		if (never_extr_attr)   free(never_extr_attr);
577
578		return (CKR_HOST_MEMORY);
579	}
580
581	class_attr->type	= CKA_CLASS;
582	class_attr->ulValueLen = sizeof (CK_OBJECT_CLASS);
583	class_attr->pValue	= (CK_BYTE *)class_attr + sizeof (CK_ATTRIBUTE);
584	*(CK_OBJECT_CLASS *)class_attr->pValue = CKO_PRIVATE_KEY;
585
586	subject_attr->type	= CKA_SUBJECT;
587	subject_attr->ulValueLen = 0;  // empty string
588	subject_attr->pValue	= NULL;
589
590	sensitive_attr->type	= CKA_SENSITIVE;
591	sensitive_attr->ulValueLen = sizeof (CK_BBOOL);
592	sensitive_attr->pValue	= (CK_BYTE *)sensitive_attr +
593	    sizeof (CK_ATTRIBUTE);
594	*(CK_BBOOL *)sensitive_attr->pValue = FALSE;
595
596	decrypt_attr->type	= CKA_DECRYPT;
597	decrypt_attr->ulValueLen = sizeof (CK_BBOOL);
598	decrypt_attr->pValue	= (CK_BYTE *)decrypt_attr +
599	    sizeof (CK_ATTRIBUTE);
600	*(CK_BBOOL *)decrypt_attr->pValue = TRUE;
601
602	sign_attr->type	= CKA_SIGN;
603	sign_attr->ulValueLen = sizeof (CK_BBOOL);
604	sign_attr->pValue	= (CK_BYTE *)sign_attr +
605	    sizeof (CK_ATTRIBUTE);
606	*(CK_BBOOL *)sign_attr->pValue = TRUE;
607
608	sign_recover_attr->type	= CKA_SIGN_RECOVER;
609	sign_recover_attr->ulValueLen = sizeof (CK_BBOOL);
610	sign_recover_attr->pValue	= (CK_BYTE *)sign_recover_attr +
611	    sizeof (CK_ATTRIBUTE);
612	*(CK_BBOOL *)sign_recover_attr->pValue = TRUE;
613
614	unwrap_attr->type	= CKA_UNWRAP;
615	unwrap_attr->ulValueLen = sizeof (CK_BBOOL);
616	unwrap_attr->pValue	= (CK_BYTE *)unwrap_attr +
617	    sizeof (CK_ATTRIBUTE);
618	*(CK_BBOOL *)unwrap_attr->pValue = TRUE;
619
620	extractable_attr->type	= CKA_EXTRACTABLE;
621	extractable_attr->ulValueLen = sizeof (CK_BBOOL);
622	extractable_attr->pValue	= (CK_BYTE *)extractable_attr +
623	    sizeof (CK_ATTRIBUTE);
624	*(CK_BBOOL *)extractable_attr->pValue = TRUE;
625
626	never_extr_attr->type	= CKA_NEVER_EXTRACTABLE;
627	never_extr_attr->ulValueLen = sizeof (CK_BBOOL);
628	never_extr_attr->pValue	= (CK_BYTE *)never_extr_attr +
629	    sizeof (CK_ATTRIBUTE);
630	*(CK_BBOOL *)never_extr_attr->pValue = FALSE;
631
632	always_sens_attr->type	= CKA_ALWAYS_SENSITIVE;
633	always_sens_attr->ulValueLen = sizeof (CK_BBOOL);
634	always_sens_attr->pValue	= (CK_BYTE *)always_sens_attr +
635	    sizeof (CK_ATTRIBUTE);
636	*(CK_BBOOL *)always_sens_attr->pValue = FALSE;
637
638	(void) template_update_attribute(tmpl, class_attr);
639	(void) template_update_attribute(tmpl, subject_attr);
640	(void) template_update_attribute(tmpl, sensitive_attr);
641	(void) template_update_attribute(tmpl, decrypt_attr);
642	(void) template_update_attribute(tmpl, sign_attr);
643	(void) template_update_attribute(tmpl, sign_recover_attr);
644	(void) template_update_attribute(tmpl, unwrap_attr);
645	(void) template_update_attribute(tmpl, extractable_attr);
646	(void) template_update_attribute(tmpl, never_extr_attr);
647	(void) template_update_attribute(tmpl, always_sens_attr);
648
649	return (CKR_OK);
650}
651
652CK_RV
653priv_key_unwrap(TEMPLATE *tmpl,
654	CK_ULONG  keytype,
655	CK_BYTE  *data,
656	CK_ULONG  data_len)
657{
658	CK_ATTRIBUTE *extractable   = NULL;
659	CK_ATTRIBUTE *always_sens   = NULL;
660	CK_ATTRIBUTE *never_extract = NULL;
661	CK_ATTRIBUTE *sensitive	= NULL;
662	CK_ATTRIBUTE *local	 = NULL;
663	CK_BBOOL   true  = TRUE;
664	CK_BBOOL   false = FALSE;
665	CK_RV	rc;
666
667	switch (keytype) {
668		case CKK_RSA:
669		rc = rsa_priv_unwrap(tmpl, data, data_len);
670		break;
671
672		default:
673		return (CKR_WRAPPED_KEY_INVALID);
674	}
675
676	if (rc != CKR_OK) {
677		return (rc);
678	}
679
680	/*
681	 * make sure
682	 *    CKA_LOCAL		== FALSE
683	 *    CKA_ALWAYS_SENSITIVE  == FALSE
684	 *    CKA_EXTRACTABLE	== TRUE
685	 *    CKA_NEVER_EXTRACTABLE == FALSE
686	 */
687	rc = build_attribute(CKA_LOCAL,  &false, 1, &local);
688	if (rc != CKR_OK) {
689		goto cleanup;
690	}
691	rc = build_attribute(CKA_ALWAYS_SENSITIVE,  &false, 1, &always_sens);
692	if (rc != CKR_OK) {
693		goto cleanup;
694	}
695	rc = build_attribute(CKA_SENSITIVE,	 &false, 1, &sensitive);
696	if (rc != CKR_OK) {
697		goto cleanup;
698	}
699	rc = build_attribute(CKA_EXTRACTABLE,	&true,  1, &extractable);
700	if (rc != CKR_OK) {
701		goto cleanup;
702	}
703	rc = build_attribute(CKA_NEVER_EXTRACTABLE, &false, 1, &never_extract);
704	if (rc != CKR_OK) {
705		goto cleanup;
706	}
707	(void) template_update_attribute(tmpl, local);
708	(void) template_update_attribute(tmpl, always_sens);
709	(void) template_update_attribute(tmpl, sensitive);
710	(void) template_update_attribute(tmpl, extractable);
711	(void) template_update_attribute(tmpl, never_extract);
712
713	return (CKR_OK);
714
715	cleanup:
716
717	if (local)	 free(local);
718	if (always_sens)   free(always_sens);
719	if (extractable)   free(extractable);
720	if (never_extract) free(never_extract);
721
722	return (rc);
723}
724
725CK_RV
726priv_key_validate_attribute(TEMPLATE *tmpl, CK_ATTRIBUTE *attr, CK_ULONG mode) {
727	switch (attr->type) {
728		case CKA_SUBJECT:
729		return (CKR_OK);
730
731		case CKA_DECRYPT:
732		case CKA_SIGN:
733		case CKA_SIGN_RECOVER:
734		case CKA_UNWRAP:
735		// we might want to do this for MODE_COPY too
736		//
737		if (mode == MODE_MODIFY) {
738			if (nv_token_data->tweak_vector.allow_key_mods == TRUE)
739				return (CKR_OK);
740			return (CKR_ATTRIBUTE_READ_ONLY);
741		}
742		return (CKR_OK);
743
744		// after key creation, CKA_SENSITIVE may only be set to TRUE
745		//
746		case CKA_SENSITIVE:
747		{
748			CK_BBOOL value;
749
750			if (mode == MODE_CREATE || mode == MODE_KEYGEN)
751				return (CKR_OK);
752
753			value = *(CK_BBOOL *)attr->pValue;
754			if (value != TRUE) {
755				return (CKR_ATTRIBUTE_READ_ONLY);
756			}
757		}
758		return (CKR_OK);
759
760		case CKA_EXTRACTABLE:
761		{
762			CK_BBOOL value;
763
764			value = *(CK_BBOOL *)attr->pValue;
765			if ((mode != MODE_CREATE && mode != MODE_KEYGEN) &&
766			    value != FALSE) {
767				return (CKR_ATTRIBUTE_READ_ONLY);
768			}
769			if (value == FALSE) {
770				CK_ATTRIBUTE *attr;
771
772				attr = (CK_ATTRIBUTE *)malloc(
773				    sizeof (CK_ATTRIBUTE) + sizeof (CK_BBOOL));
774				if (! attr) {
775					return (CKR_HOST_MEMORY);
776				}
777				attr->type	= CKA_NEVER_EXTRACTABLE;
778				attr->ulValueLen = sizeof (CK_BBOOL);
779				attr->pValue	= (CK_BYTE *)attr +
780				    sizeof (CK_ATTRIBUTE);
781				*(CK_BBOOL *)attr->pValue = FALSE;
782
783				(void) template_update_attribute(tmpl, attr);
784			}
785		}
786		return (CKR_OK);
787
788		case CKA_ALWAYS_SENSITIVE:
789		case CKA_NEVER_EXTRACTABLE:
790		return (CKR_ATTRIBUTE_READ_ONLY);
791
792		default:
793		return (key_object_validate_attribute(tmpl, attr, mode));
794	}
795}
796
797CK_RV
798secret_key_check_required_attributes(TEMPLATE *tmpl, CK_ULONG mode)
799{
800	return (key_object_check_required_attributes(tmpl, mode));
801}
802
803CK_RV
804secret_key_set_default_attributes(TEMPLATE *tmpl, CK_ULONG mode)
805{
806	CK_ATTRIBUTE	*class_attr	= NULL;
807	CK_ATTRIBUTE	*sensitive_attr   = NULL;
808	CK_ATTRIBUTE	*encrypt_attr	= NULL;
809	CK_ATTRIBUTE	*decrypt_attr	= NULL;
810	CK_ATTRIBUTE	*sign_attr	= NULL;
811	CK_ATTRIBUTE	*verify_attr	= NULL;
812	CK_ATTRIBUTE	*wrap_attr	= NULL;
813	CK_ATTRIBUTE	*unwrap_attr	= NULL;
814	CK_ATTRIBUTE	*extractable_attr = NULL;
815	CK_ATTRIBUTE	*never_extr_attr  = NULL;
816	CK_ATTRIBUTE	*always_sens_attr = NULL;
817	CK_RV	    rc;
818
819
820	rc = key_object_set_default_attributes(tmpl, mode);
821	if (rc != CKR_OK)
822		return (rc);
823
824	class_attr	= (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
825	    sizeof (CK_OBJECT_CLASS));
826	sensitive_attr   = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
827	    sizeof (CK_BBOOL));
828	encrypt_attr	= (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
829	    sizeof (CK_BBOOL));
830	decrypt_attr	= (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
831	    sizeof (CK_BBOOL));
832	sign_attr	= (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
833	    sizeof (CK_BBOOL));
834	verify_attr	= (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
835	    sizeof (CK_BBOOL));
836	wrap_attr	= (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
837	    sizeof (CK_BBOOL));
838	unwrap_attr	= (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
839	    sizeof (CK_BBOOL));
840	extractable_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
841	    sizeof (CK_BBOOL));
842	never_extr_attr  = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
843	    sizeof (CK_BBOOL));
844	always_sens_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
845	    sizeof (CK_BBOOL));
846
847	if (! class_attr || ! sensitive_attr || ! encrypt_attr ||
848	    ! decrypt_attr || ! sign_attr || ! verify_attr ||
849	    ! wrap_attr	|| ! unwrap_attr || ! extractable_attr ||
850	    ! never_extr_attr || ! always_sens_attr) {
851		if (class_attr)	free(class_attr);
852		if (sensitive_attr)   free(sensitive_attr);
853		if (encrypt_attr)	free(encrypt_attr);
854		if (decrypt_attr)	free(decrypt_attr);
855		if (sign_attr)	free(sign_attr);
856		if (verify_attr)	free(verify_attr);
857		if (wrap_attr)	free(wrap_attr);
858		if (unwrap_attr)	free(unwrap_attr);
859		if (extractable_attr) free(extractable_attr);
860		if (never_extr_attr)  free(never_extr_attr);
861		if (always_sens_attr) free(always_sens_attr);
862
863		return (CKR_HOST_MEMORY);
864	}
865
866	class_attr->type	= CKA_CLASS;
867	class_attr->ulValueLen = sizeof (CK_OBJECT_CLASS);
868	class_attr->pValue	= (CK_BYTE *)class_attr +
869	    sizeof (CK_ATTRIBUTE);
870	*(CK_OBJECT_CLASS *)class_attr->pValue = CKO_SECRET_KEY;
871
872	sensitive_attr->type	= CKA_SENSITIVE;
873	sensitive_attr->ulValueLen = sizeof (CK_BBOOL);
874	sensitive_attr->pValue	= (CK_BYTE *)sensitive_attr +
875	    sizeof (CK_ATTRIBUTE);
876	*(CK_BBOOL *)sensitive_attr->pValue = FALSE;
877
878	encrypt_attr->type	= CKA_ENCRYPT;
879	encrypt_attr->ulValueLen = sizeof (CK_BBOOL);
880	encrypt_attr->pValue	= (CK_BYTE *)encrypt_attr +
881	    sizeof (CK_ATTRIBUTE);
882	*(CK_BBOOL *)encrypt_attr->pValue = TRUE;
883
884	decrypt_attr->type	= CKA_DECRYPT;
885	decrypt_attr->ulValueLen = sizeof (CK_BBOOL);
886	decrypt_attr->pValue	= (CK_BYTE *)decrypt_attr +
887	    sizeof (CK_ATTRIBUTE);
888	*(CK_BBOOL *)decrypt_attr->pValue = TRUE;
889
890	sign_attr->type	= CKA_SIGN;
891	sign_attr->ulValueLen = sizeof (CK_BBOOL);
892	sign_attr->pValue	= (CK_BYTE *)sign_attr +
893	    sizeof (CK_ATTRIBUTE);
894	*(CK_BBOOL *)sign_attr->pValue = TRUE;
895
896	verify_attr->type	= CKA_VERIFY;
897	verify_attr->ulValueLen = sizeof (CK_BBOOL);
898	verify_attr->pValue	= (CK_BYTE *)verify_attr +
899	    sizeof (CK_ATTRIBUTE);
900	*(CK_BBOOL *)verify_attr->pValue = TRUE;
901
902	wrap_attr->type	= CKA_WRAP;
903	wrap_attr->ulValueLen = sizeof (CK_BBOOL);
904	wrap_attr->pValue	= (CK_BYTE *)wrap_attr +
905	    sizeof (CK_ATTRIBUTE);
906	*(CK_BBOOL *)wrap_attr->pValue = TRUE;
907
908	unwrap_attr->type	= CKA_UNWRAP;
909	unwrap_attr->ulValueLen = sizeof (CK_BBOOL);
910	unwrap_attr->pValue	= (CK_BYTE *)unwrap_attr +
911	    sizeof (CK_ATTRIBUTE);
912	*(CK_BBOOL *)unwrap_attr->pValue = TRUE;
913
914	extractable_attr->type	= CKA_EXTRACTABLE;
915	extractable_attr->ulValueLen = sizeof (CK_BBOOL);
916	extractable_attr->pValue	= (CK_BYTE *)extractable_attr +
917	    sizeof (CK_ATTRIBUTE);
918	*(CK_BBOOL *)extractable_attr->pValue = TRUE;
919
920	always_sens_attr->type	= CKA_ALWAYS_SENSITIVE;
921	always_sens_attr->ulValueLen = sizeof (CK_BBOOL);
922	always_sens_attr->pValue	= (CK_BYTE *)always_sens_attr +
923	    sizeof (CK_ATTRIBUTE);
924	*(CK_BBOOL *)always_sens_attr->pValue = FALSE;
925
926	never_extr_attr->type	= CKA_NEVER_EXTRACTABLE;
927	never_extr_attr->ulValueLen = sizeof (CK_BBOOL);
928	never_extr_attr->pValue	= (CK_BYTE *)never_extr_attr +
929	    sizeof (CK_ATTRIBUTE);
930	*(CK_BBOOL *)never_extr_attr->pValue = FALSE;
931
932	(void) template_update_attribute(tmpl, class_attr);
933	(void) template_update_attribute(tmpl, sensitive_attr);
934	(void) template_update_attribute(tmpl, encrypt_attr);
935	(void) template_update_attribute(tmpl, decrypt_attr);
936	(void) template_update_attribute(tmpl, sign_attr);
937	(void) template_update_attribute(tmpl, verify_attr);
938	(void) template_update_attribute(tmpl, wrap_attr);
939	(void) template_update_attribute(tmpl, unwrap_attr);
940	(void) template_update_attribute(tmpl, extractable_attr);
941	(void) template_update_attribute(tmpl, never_extr_attr);
942	(void) template_update_attribute(tmpl, always_sens_attr);
943
944	return (CKR_OK);
945}
946
947CK_RV
948secret_key_unwrap(TEMPLATE *tmpl,
949	CK_ULONG  keytype,
950	CK_BYTE  *data,
951	CK_ULONG  data_len,
952	CK_BBOOL  fromend)
953{
954	CK_ATTRIBUTE *local	 = NULL;
955	CK_ATTRIBUTE *always_sens   = NULL;
956	CK_ATTRIBUTE *sensitive	= NULL;
957	CK_ATTRIBUTE *extractable   = NULL;
958	CK_ATTRIBUTE *never_extract = NULL;
959	CK_BBOOL   true  = TRUE;
960	CK_BBOOL   false = FALSE;
961	CK_RV	rc;
962
963	switch (keytype) {
964		case CKK_GENERIC_SECRET:
965		rc = generic_secret_unwrap(tmpl, data, data_len, fromend);
966		break;
967
968		default:
969		return (CKR_WRAPPED_KEY_INVALID);
970	}
971
972	if (rc != CKR_OK)
973		return (rc);
974
975	// make sure
976	//    CKA_LOCAL		== FALSE
977	//    CKA_ALWAYS_SENSITIVE  == FALSE
978	//    CKA_EXTRACTABLE	== TRUE
979	//    CKA_NEVER_EXTRACTABLE == FALSE
980	//
981	rc = build_attribute(CKA_LOCAL,		&false, 1, &local);
982	if (rc != CKR_OK) {
983		goto cleanup;
984	}
985	rc = build_attribute(CKA_ALWAYS_SENSITIVE,  &false, 1, &always_sens);
986	if (rc != CKR_OK) {
987		goto cleanup;
988	}
989	rc = build_attribute(CKA_SENSITIVE,	 &false, 1, &sensitive);
990	if (rc != CKR_OK) {
991		goto cleanup;
992	}
993	rc = build_attribute(CKA_EXTRACTABLE,	&true,  1, &extractable);
994	if (rc != CKR_OK) {
995		goto cleanup;
996	}
997	rc = build_attribute(CKA_NEVER_EXTRACTABLE, &false, 1, &never_extract);
998	if (rc != CKR_OK) {
999		goto cleanup;
1000	}
1001	(void) template_update_attribute(tmpl, local);
1002	(void) template_update_attribute(tmpl, always_sens);
1003	(void) template_update_attribute(tmpl, sensitive);
1004	(void) template_update_attribute(tmpl, extractable);
1005	(void) template_update_attribute(tmpl, never_extract);
1006
1007	return (CKR_OK);
1008
1009	cleanup:
1010
1011	if (local)	 free(local);
1012	if (extractable)   free(extractable);
1013	if (always_sens)   free(always_sens);
1014	if (never_extract) free(never_extract);
1015
1016	return (rc);
1017}
1018
1019CK_RV
1020secret_key_validate_attribute(TEMPLATE *tmpl, CK_ATTRIBUTE *attr,
1021	CK_ULONG mode)
1022{
1023	switch (attr->type) {
1024		case CKA_ENCRYPT:
1025		case CKA_DECRYPT:
1026		case CKA_SIGN:
1027		case CKA_VERIFY:
1028		case CKA_WRAP:
1029		case CKA_UNWRAP:
1030		if (mode == MODE_MODIFY) {
1031			if (nv_token_data->tweak_vector.allow_key_mods == TRUE)
1032				return (CKR_OK);
1033			return (CKR_ATTRIBUTE_READ_ONLY);
1034		}
1035		return (CKR_OK);
1036
1037		// after key creation, CKA_SENSITIVE may only be set to TRUE
1038		//
1039		case CKA_SENSITIVE:
1040		{
1041			CK_BBOOL value;
1042
1043			value = *(CK_BBOOL *)attr->pValue;
1044			if ((mode != MODE_CREATE && mode != MODE_DERIVE &&
1045			    mode != MODE_KEYGEN) && (value != TRUE)) {
1046				return (CKR_ATTRIBUTE_READ_ONLY);
1047			}
1048		}
1049		return (CKR_OK);
1050
1051		case CKA_EXTRACTABLE:
1052		{
1053			CK_BBOOL value;
1054
1055			value = *(CK_BBOOL *)attr->pValue;
1056			if ((mode != MODE_CREATE && mode != MODE_DERIVE &&
1057			    mode != MODE_KEYGEN) && (value != FALSE)) {
1058				return (CKR_ATTRIBUTE_READ_ONLY);
1059			}
1060			if (value == FALSE) {
1061				CK_ATTRIBUTE *attr;
1062
1063				attr = (CK_ATTRIBUTE *)malloc(
1064				    sizeof (CK_ATTRIBUTE) + sizeof (CK_BBOOL));
1065				if (! attr) {
1066					return (CKR_HOST_MEMORY);
1067				}
1068				attr->type = CKA_NEVER_EXTRACTABLE;
1069				attr->ulValueLen = sizeof (CK_BBOOL);
1070				attr->pValue = (CK_BYTE *)attr +
1071				    sizeof (CK_ATTRIBUTE);
1072				*(CK_BBOOL *)attr->pValue = FALSE;
1073
1074				(void) template_update_attribute(tmpl, attr);
1075			}
1076		}
1077		return (CKR_OK);
1078
1079		case CKA_ALWAYS_SENSITIVE:
1080		case CKA_NEVER_EXTRACTABLE:
1081			return (CKR_ATTRIBUTE_READ_ONLY);
1082
1083		default:
1084			return (key_object_validate_attribute(tmpl,
1085			    attr, mode));
1086	}
1087}
1088
1089CK_BBOOL
1090secret_key_check_exportability(CK_ATTRIBUTE_TYPE type)
1091{
1092	switch (type) {
1093		case CKA_VALUE:
1094		return (FALSE);
1095	}
1096
1097	return (TRUE);
1098}
1099
1100CK_RV
1101rsa_publ_check_required_attributes(TEMPLATE *tmpl, CK_ULONG mode)
1102{
1103	CK_ATTRIBUTE *attr = NULL;
1104	CK_BBOOL   found;
1105
1106	found = template_attribute_find(tmpl, CKA_MODULUS, &attr);
1107	if (! found) {
1108		if (mode == MODE_CREATE) {
1109			return (CKR_TEMPLATE_INCOMPLETE);
1110		}
1111	}
1112
1113	found = template_attribute_find(tmpl, CKA_MODULUS_BITS, &attr);
1114	if (! found) {
1115		if (mode == MODE_KEYGEN) {
1116			return (CKR_TEMPLATE_INCOMPLETE);
1117		}
1118	}
1119
1120	found = template_attribute_find(tmpl, CKA_PUBLIC_EXPONENT, &attr);
1121	if (! found) {
1122		if (mode == MODE_CREATE || mode == MODE_KEYGEN) {
1123			return (CKR_TEMPLATE_INCOMPLETE);
1124		}
1125	}
1126
1127	return (publ_key_check_required_attributes(tmpl, mode));
1128}
1129
1130CK_RV
1131rsa_publ_set_default_attributes(TEMPLATE *tmpl, CK_ULONG mode)
1132{
1133	CK_ATTRIBUTE   *type_attr	 = NULL;
1134	CK_ATTRIBUTE   *modulus_attr	= NULL;
1135	CK_ATTRIBUTE   *modulus_bits_attr = NULL;
1136	CK_ATTRIBUTE   *public_exp_attr   = NULL;
1137	CK_ULONG	bits = 0L;
1138
1139	(void) publ_key_set_default_attributes(tmpl, mode);
1140
1141	type_attr	 = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
1142	    sizeof (CK_KEY_TYPE));
1143	modulus_attr	= (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE));
1144	modulus_bits_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
1145	    sizeof (CK_ULONG));
1146	public_exp_attr   = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE));
1147
1148	if (! type_attr || ! modulus_attr ||
1149	    ! modulus_bits_attr || ! public_exp_attr) {
1150		if (type_attr)	 free(type_attr);
1151		if (modulus_attr)	free(modulus_attr);
1152		if (modulus_bits_attr) free(modulus_bits_attr);
1153		if (public_exp_attr)   free(public_exp_attr);
1154
1155		return (CKR_HOST_MEMORY);
1156	}
1157
1158	type_attr->type	= CKA_KEY_TYPE;
1159	type_attr->ulValueLen = sizeof (CK_KEY_TYPE);
1160	type_attr->pValue	= (CK_BYTE *)type_attr +
1161	    sizeof (CK_ATTRIBUTE);
1162	*(CK_KEY_TYPE *)type_attr->pValue = CKK_RSA;
1163
1164	modulus_attr->type	= CKA_MODULUS;
1165	modulus_attr->ulValueLen = 0;
1166	modulus_attr->pValue	= NULL;
1167
1168	modulus_bits_attr->type	= CKA_MODULUS_BITS;
1169	modulus_bits_attr->ulValueLen = sizeof (CK_ULONG);
1170	modulus_bits_attr->pValue = (CK_BYTE *)modulus_bits_attr +
1171	    sizeof (CK_ATTRIBUTE);
1172	*(CK_ULONG *)modulus_bits_attr->pValue = bits;
1173
1174	public_exp_attr->type	= CKA_PUBLIC_EXPONENT;
1175	public_exp_attr->ulValueLen = 0;
1176	public_exp_attr->pValue	= NULL;
1177
1178	(void) template_update_attribute(tmpl, type_attr);
1179	(void) template_update_attribute(tmpl, modulus_attr);
1180	(void) template_update_attribute(tmpl, modulus_bits_attr);
1181	(void) template_update_attribute(tmpl, public_exp_attr);
1182
1183	return (CKR_OK);
1184}
1185
1186CK_RV
1187rsa_publ_validate_attribute(TEMPLATE *tmpl, CK_ATTRIBUTE *attr, CK_ULONG mode) {
1188	switch (attr->type) {
1189		case CKA_MODULUS_BITS:
1190		if (mode == MODE_KEYGEN) {
1191			if (attr->ulValueLen != sizeof (CK_ULONG)) {
1192				return (CKR_ATTRIBUTE_VALUE_INVALID);
1193			} else {
1194				CK_ULONG mod_bits = *(CK_ULONG *)attr->pValue;
1195
1196				if (mod_bits < 512 || mod_bits > 2048) {
1197					return (CKR_ATTRIBUTE_VALUE_INVALID);
1198				}
1199
1200				if (mod_bits % 8 != 0) {
1201					return (CKR_ATTRIBUTE_VALUE_INVALID);
1202				}
1203				return (CKR_OK);
1204			}
1205		} else {
1206			return (CKR_ATTRIBUTE_READ_ONLY);
1207		}
1208		case CKA_MODULUS:
1209		if (mode == MODE_CREATE)
1210			return (remove_leading_zeros(attr));
1211		else {
1212			return (CKR_ATTRIBUTE_READ_ONLY);
1213		}
1214		case CKA_PUBLIC_EXPONENT:
1215		if (mode == MODE_CREATE || mode == MODE_KEYGEN)
1216			return (remove_leading_zeros(attr));
1217		else {
1218			return (CKR_ATTRIBUTE_READ_ONLY);
1219		}
1220		default:
1221		return (publ_key_validate_attribute(tmpl, attr, mode));
1222	}
1223}
1224
1225CK_RV
1226rsa_priv_check_required_attributes(TEMPLATE *tmpl, CK_ULONG mode) {
1227	CK_ATTRIBUTE *attr = NULL;
1228	CK_BBOOL   found;
1229
1230	found = template_attribute_find(tmpl, CKA_MODULUS, &attr);
1231	if (! found) {
1232		if (mode == MODE_CREATE) {
1233			return (CKR_TEMPLATE_INCOMPLETE);
1234		}
1235	}
1236
1237	//
1238	// PKCS #11 is flexible with respect to which attributes must be present
1239	// in an RSA key.  Keys can be specified in Chinese Remainder format or
1240	// they can be specified in modula exponent format. Right now, I only
1241	// support keys created in Chinese Remainder format. That is, we return
1242	// CKR_TEMPLATE_INCOMPLETE if a modula exponent key is specified.  This
1243	// is allowed by PKCS #11.
1244	//
1245	// In the future, we should allow for creation of keys in modula exp
1246	// format too.  This raises some issues.  It's easy enough to recognize
1247	// when a key has been specified in modula exponent format.  And it's
1248	// easy enough to recognize when all attributes have been specified
1249	// (which is what we require right now).  What's trickier to handle is
1250	// the "middle" cases in which more than the minimum yet less than the
1251	// full number of attributes have been specified.  Do we revert back to
1252	// modula - exponent representation?  Do we compute the missing
1253	// attributes ourselves?  Do we simply return CKR_TEMPLATE_INCOMPLETE?
1254	//
1255
1256	found = template_attribute_find(tmpl, CKA_PUBLIC_EXPONENT, &attr);
1257	if (! found) {
1258		if (mode == MODE_CREATE) {
1259			return (CKR_TEMPLATE_INCOMPLETE);
1260		}
1261	}
1262
1263	found = template_attribute_find(tmpl, CKA_PRIVATE_EXPONENT, &attr);
1264	if (! found) {
1265		if (mode == MODE_CREATE) {
1266			return (CKR_TEMPLATE_INCOMPLETE);
1267		}
1268	}
1269
1270	found = template_attribute_find(tmpl, CKA_PRIME_1, &attr);
1271	if (! found) {
1272		if (mode == MODE_CREATE) {
1273			return (CKR_TEMPLATE_INCOMPLETE);
1274		}
1275	}
1276
1277	found = template_attribute_find(tmpl, CKA_PRIME_2, &attr);
1278	if (! found) {
1279		if (mode == MODE_CREATE) {
1280			return (CKR_TEMPLATE_INCOMPLETE);
1281		}
1282	}
1283
1284	found = template_attribute_find(tmpl, CKA_EXPONENT_1, &attr);
1285	if (! found) {
1286		if (mode == MODE_CREATE) {
1287			return (CKR_TEMPLATE_INCOMPLETE);
1288		}
1289	}
1290
1291	found = template_attribute_find(tmpl, CKA_EXPONENT_2, &attr);
1292	if (! found) {
1293		if (mode == MODE_CREATE) {
1294			return (CKR_TEMPLATE_INCOMPLETE);
1295		}
1296	}
1297
1298	found = template_attribute_find(tmpl, CKA_COEFFICIENT, &attr);
1299	if (! found) {
1300		if (mode == MODE_CREATE) {
1301			return (CKR_TEMPLATE_INCOMPLETE);
1302		}
1303	}
1304
1305	return (priv_key_check_required_attributes(tmpl, mode));
1306}
1307
1308CK_RV
1309rsa_priv_set_default_attributes(TEMPLATE *tmpl, CK_ULONG mode)
1310{
1311	CK_ATTRIBUTE   *modulus_attr	= NULL;
1312	CK_ATTRIBUTE   *public_exp_attr   = NULL;
1313	CK_ATTRIBUTE   *private_exp_attr  = NULL;
1314	CK_ATTRIBUTE   *type_attr	 = NULL;
1315
1316	(void) priv_key_set_default_attributes(tmpl, mode);
1317
1318	type_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
1319	    sizeof (CK_KEY_TYPE));
1320	modulus_attr	= (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE));
1321	public_exp_attr   = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE));
1322	private_exp_attr  = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE));
1323
1324	if (! type_attr || ! modulus_attr || ! public_exp_attr ||
1325	    ! private_exp_attr) {
1326		if (type_attr)	free(type_attr);
1327		if (modulus_attr)	free(modulus_attr);
1328		if (public_exp_attr)  free(public_exp_attr);
1329		if (private_exp_attr) free(private_exp_attr);
1330
1331		return (CKR_HOST_MEMORY);
1332	}
1333
1334	modulus_attr->type	= CKA_MODULUS;
1335	modulus_attr->ulValueLen = 0;
1336	modulus_attr->pValue	= NULL;
1337
1338	public_exp_attr->type	= CKA_PUBLIC_EXPONENT;
1339	public_exp_attr->ulValueLen = 0;
1340	public_exp_attr->pValue	= NULL;
1341
1342	private_exp_attr->type	= CKA_PRIVATE_EXPONENT;
1343	private_exp_attr->ulValueLen = 0;
1344	private_exp_attr->pValue	= NULL;
1345
1346	type_attr->type	= CKA_KEY_TYPE;
1347	type_attr->ulValueLen = sizeof (CK_KEY_TYPE);
1348	type_attr->pValue = (CK_BYTE *)type_attr + sizeof (CK_ATTRIBUTE);
1349	*(CK_KEY_TYPE *)type_attr->pValue = CKK_RSA;
1350
1351	(void) template_update_attribute(tmpl, type_attr);
1352	(void) template_update_attribute(tmpl, modulus_attr);
1353	(void) template_update_attribute(tmpl, public_exp_attr);
1354	(void) template_update_attribute(tmpl, private_exp_attr);
1355
1356	return (CKR_OK);
1357}
1358
1359CK_RV
1360rsa_priv_validate_attribute(TEMPLATE *tmpl, CK_ATTRIBUTE *attr, CK_ULONG mode) {
1361	switch (attr->type) {
1362		case CKA_MODULUS:
1363		case CKA_PRIVATE_EXPONENT:
1364		if (mode == MODE_CREATE)
1365			return (remove_leading_zeros(attr));
1366		else {
1367			return (CKR_ATTRIBUTE_READ_ONLY);
1368		}
1369		case CKA_PUBLIC_EXPONENT:
1370		case CKA_PRIME_1:
1371		case CKA_PRIME_2:
1372		case CKA_EXPONENT_1:
1373		case CKA_EXPONENT_2:
1374		case CKA_COEFFICIENT:
1375		if (mode == MODE_CREATE)
1376			return (remove_leading_zeros(attr));
1377		else {
1378			return (CKR_ATTRIBUTE_READ_ONLY);
1379		}
1380		default:
1381		return (priv_key_validate_attribute(tmpl, attr, mode));
1382	}
1383}
1384
1385CK_BBOOL
1386rsa_priv_check_exportability(CK_ATTRIBUTE_TYPE type) {
1387	switch (type) {
1388		case CKA_PRIVATE_EXPONENT:
1389		case CKA_PRIME_1:
1390		case CKA_PRIME_2:
1391		case CKA_EXPONENT_1:
1392		case CKA_EXPONENT_2:
1393		case CKA_COEFFICIENT:
1394		return (FALSE);
1395	}
1396
1397	return (TRUE);
1398}
1399
1400
1401/*
1402 * create the ASN.1 encoding for the private key for wrapping as defined
1403 * in PKCS #8
1404 *
1405 * ASN.1 type PrivateKeyInfo ::= SEQUENCE {
1406 *    version Version
1407 *    privateKeyAlgorithm  PrivateKeyAlgorithmIdentifier
1408 *    privateKey PrivateKey
1409 *    attributes OPTIONAL
1410 *
1411 * }
1412 *
1413 * Where PrivateKey is defined as follows for RSA:
1414 *
1415 * ASN.1 type RSAPrivateKey
1416 *
1417 * RSAPrivateKey ::= SEQUENCE {
1418 *   version Version
1419 *   modulus INTEGER
1420 *   publicExponent INTEGER
1421 *   privateExponent INTEGER
1422 *   prime1 INTEGER
1423 *   prime2 INTEGER
1424 *   exponent1 INTEGER
1425 *   exponent2 INTEGER
1426 *   coefficient INTEGER
1427 * }
1428 */
1429CK_RV
1430rsa_priv_wrap_get_data(TEMPLATE  *tmpl,
1431	CK_BBOOL   length_only,
1432	CK_BYTE  **data,
1433	CK_ULONG  *data_len)
1434{
1435	CK_ATTRIBUTE *modulus   = NULL;
1436	CK_ATTRIBUTE *publ_exp  = NULL, *priv_exp  = NULL;
1437	CK_ATTRIBUTE *prime1    = NULL, *prime2    = NULL;
1438	CK_ATTRIBUTE *exponent1 = NULL, *exponent2 = NULL;
1439	CK_ATTRIBUTE *coeff	= NULL;
1440	CK_RV	rc;
1441
1442	if (template_attribute_find(tmpl, CKA_MODULUS, &modulus) == FALSE) {
1443		return (CKR_FUNCTION_FAILED);
1444	}
1445	if (template_attribute_find(tmpl, CKA_PUBLIC_EXPONENT,
1446	    &publ_exp) == FALSE) {
1447		return (CKR_FUNCTION_FAILED);
1448	}
1449	if (template_attribute_find(tmpl, CKA_PRIVATE_EXPONENT,
1450	    &priv_exp) == FALSE) {
1451		return (CKR_FUNCTION_FAILED);
1452	}
1453	if (template_attribute_find(tmpl, CKA_PRIME_1,
1454	    &prime1) == FALSE) {
1455		return (CKR_FUNCTION_FAILED);
1456	}
1457	if (template_attribute_find(tmpl, CKA_PRIME_2,
1458	    &prime2) == FALSE) {
1459		return (CKR_FUNCTION_FAILED);
1460	}
1461	if (template_attribute_find(tmpl, CKA_EXPONENT_1,
1462	    &exponent1) == FALSE) {
1463		return (CKR_FUNCTION_FAILED);
1464	}
1465	if (template_attribute_find(tmpl, CKA_EXPONENT_2,
1466	    &exponent2) == FALSE) {
1467		return (CKR_FUNCTION_FAILED);
1468	}
1469	if (template_attribute_find(tmpl, CKA_COEFFICIENT,
1470	    &coeff) == FALSE) {
1471		return (CKR_FUNCTION_FAILED);
1472	}
1473	rc = ber_encode_RSAPrivateKey(length_only, data, data_len,
1474	    modulus, publ_exp,  priv_exp, prime1,    prime2,
1475	    exponent1, exponent2, coeff);
1476
1477	return (rc);
1478}
1479
1480CK_RV
1481rsa_priv_unwrap(TEMPLATE *tmpl,
1482	CK_BYTE  *data,
1483	CK_ULONG  total_length)
1484{
1485	CK_ATTRIBUTE *modulus   = NULL;
1486	CK_ATTRIBUTE *publ_exp  = NULL;
1487	CK_ATTRIBUTE *priv_exp  = NULL;
1488	CK_ATTRIBUTE *prime1    = NULL;
1489	CK_ATTRIBUTE *prime2    = NULL;
1490	CK_ATTRIBUTE *exponent1 = NULL;
1491	CK_ATTRIBUTE *exponent2 = NULL;
1492	CK_ATTRIBUTE *coeff	= NULL;
1493	CK_RV	rc;
1494
1495	rc = ber_decode_RSAPrivateKey(data, total_length,
1496	    &modulus, &publ_exp, &priv_exp, &prime1, &prime2,
1497	    &exponent1, &exponent2, &coeff);
1498
1499	if (rc != CKR_OK) {
1500		return (rc);
1501	}
1502	(void) remove_leading_zeros(modulus);
1503	(void) remove_leading_zeros(publ_exp);
1504	(void) remove_leading_zeros(priv_exp);
1505	(void) remove_leading_zeros(prime1);
1506	(void) remove_leading_zeros(prime2);
1507	(void) remove_leading_zeros(exponent1);
1508	(void) remove_leading_zeros(exponent2);
1509	(void) remove_leading_zeros(coeff);
1510
1511	(void) template_update_attribute(tmpl, modulus);
1512	(void) template_update_attribute(tmpl, publ_exp);
1513	(void) template_update_attribute(tmpl, priv_exp);
1514	(void) template_update_attribute(tmpl, prime1);
1515	(void) template_update_attribute(tmpl, prime2);
1516	(void) template_update_attribute(tmpl, exponent1);
1517	(void) template_update_attribute(tmpl, exponent2);
1518	(void) template_update_attribute(tmpl, coeff);
1519
1520	return (CKR_OK);
1521}
1522
1523CK_RV
1524generic_secret_check_required_attributes(TEMPLATE *tmpl, CK_ULONG mode)
1525{
1526	CK_ATTRIBUTE *attr = NULL;
1527	CK_BBOOL   found;
1528
1529	found = template_attribute_find(tmpl, CKA_VALUE, &attr);
1530	if (! found) {
1531		if (mode == MODE_CREATE) {
1532			return (CKR_TEMPLATE_INCOMPLETE);
1533		}
1534	}
1535
1536
1537	found = template_attribute_find(tmpl, CKA_VALUE_LEN, &attr);
1538	if (! found) {
1539		return (CKR_OK);
1540	} else {
1541		if (mode == MODE_CREATE) {
1542			return (CKR_ATTRIBUTE_READ_ONLY);
1543		}
1544	}
1545
1546	return (secret_key_check_required_attributes(tmpl, mode));
1547}
1548
1549CK_RV
1550generic_secret_set_default_attributes(TEMPLATE *tmpl, CK_ULONG mode)
1551{
1552	CK_ATTRIBUTE   *value_attr	= NULL;
1553	CK_ATTRIBUTE   *value_len_attr   = NULL;
1554	CK_ATTRIBUTE   *type_attr	= NULL;
1555	CK_ULONG    len = 0L;
1556
1557	if (mode)
1558		value_attr = NULL;
1559
1560	(void) secret_key_set_default_attributes(tmpl, mode);
1561
1562	type_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
1563	    sizeof (CK_KEY_TYPE));
1564	value_attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE));
1565	value_len_attr  = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) +
1566	    sizeof (CK_ULONG));
1567
1568	if (! type_attr || ! value_attr || ! value_len_attr) {
1569		if (type_attr)	free(type_attr);
1570		if (value_attr)	free(value_attr);
1571		if (value_len_attr) free(value_len_attr);
1572
1573		return (CKR_HOST_MEMORY);
1574	}
1575
1576	value_attr->type	= CKA_VALUE;
1577	value_attr->ulValueLen = 0;
1578	value_attr->pValue	= NULL;
1579
1580	value_len_attr->type	= CKA_VALUE_LEN;
1581	value_len_attr->ulValueLen = sizeof (CK_ULONG);
1582	value_len_attr->pValue	= (CK_BYTE *)value_len_attr +
1583	    sizeof (CK_ATTRIBUTE);
1584	*(CK_ULONG *)value_len_attr->pValue = len;
1585
1586	type_attr->type	= CKA_KEY_TYPE;
1587	type_attr->ulValueLen = sizeof (CK_KEY_TYPE);
1588	type_attr->pValue	= (CK_BYTE *)type_attr +
1589	    sizeof (CK_ATTRIBUTE);
1590	*(CK_KEY_TYPE *)type_attr->pValue = CKK_GENERIC_SECRET;
1591
1592	(void) template_update_attribute(tmpl, type_attr);
1593	(void) template_update_attribute(tmpl, value_attr);
1594	(void) template_update_attribute(tmpl, value_len_attr);
1595
1596	return (CKR_OK);
1597}
1598
1599CK_RV
1600generic_secret_validate_attribute(TEMPLATE *tmpl,
1601	CK_ATTRIBUTE *attr, CK_ULONG mode)
1602{
1603	switch (attr->type) {
1604		case CKA_VALUE:
1605		if (mode == MODE_CREATE)
1606			return (CKR_OK);
1607		else
1608			return (CKR_ATTRIBUTE_READ_ONLY);
1609
1610		case CKA_VALUE_LEN:
1611		if (mode == MODE_KEYGEN || mode == MODE_DERIVE)
1612			return (CKR_OK);
1613		else {
1614			if (mode == MODE_UNWRAP) {
1615				return (CKR_OK);
1616			}
1617			return (CKR_ATTRIBUTE_READ_ONLY);
1618		}
1619
1620		default:
1621		return (secret_key_validate_attribute(tmpl, attr, mode));
1622	}
1623}
1624
1625CK_BBOOL
1626generic_secret_check_exportability(CK_ATTRIBUTE_TYPE type) {
1627	switch (type) {
1628		case CKA_VALUE:
1629		return (FALSE);
1630	}
1631
1632	return (TRUE);
1633}
1634
1635CK_RV
1636generic_secret_wrap_get_data(TEMPLATE   * tmpl,
1637	CK_BBOOL	length_only,
1638	CK_BYTE   ** data,
1639	CK_ULONG   * data_len)
1640{
1641	CK_ATTRIBUTE    * attr = NULL;
1642	CK_BYTE	* ptr  = NULL;
1643	CK_RV	  rc;
1644
1645	if (! tmpl || ! data_len) {
1646		return (CKR_FUNCTION_FAILED);
1647	}
1648
1649	rc = template_attribute_find(tmpl, CKA_VALUE, &attr);
1650	if (rc == FALSE) {
1651		return (CKR_KEY_NOT_WRAPPABLE);
1652	}
1653	*data_len = attr->ulValueLen;
1654
1655	if (length_only == FALSE) {
1656		ptr = (CK_BYTE *)malloc(attr->ulValueLen);
1657		if (! ptr) {
1658			return (CKR_HOST_MEMORY);
1659		}
1660		(void) memcpy(ptr, attr->pValue, attr->ulValueLen);
1661
1662		*data = ptr;
1663	}
1664
1665	return (CKR_OK);
1666}
1667
1668CK_RV
1669generic_secret_unwrap(TEMPLATE *tmpl,
1670	CK_BYTE  *data,
1671	CK_ULONG  data_len,
1672	CK_BBOOL  fromend)
1673{
1674	CK_ATTRIBUTE  * attr	   = NULL;
1675	CK_ATTRIBUTE  * value_attr	= NULL;
1676	CK_ATTRIBUTE  * value_len_attr = NULL;
1677	CK_BYTE    * ptr	    = NULL;
1678	CK_ULONG	rc, len = 0;
1679
1680
1681	if (fromend == TRUE)
1682		ptr = data + data_len;
1683	else
1684		ptr = data;
1685
1686	rc = template_attribute_find(tmpl, CKA_VALUE_LEN, &attr);
1687	if (rc) {
1688		len = *(CK_ULONG *)attr->pValue;
1689		if (len > data_len) {
1690			rc = CKR_ATTRIBUTE_VALUE_INVALID;
1691			goto error;
1692		}
1693
1694		if (len != 0)
1695			data_len = len;
1696	}
1697
1698	if (fromend == TRUE)
1699		ptr -= data_len;
1700
1701	rc = build_attribute(CKA_VALUE, ptr, data_len, &value_attr);
1702	if (rc != CKR_OK) {
1703		goto error;
1704	}
1705	if (data_len != len) {
1706		rc = build_attribute(CKA_VALUE_LEN, (CK_BYTE *)&data_len,
1707		    sizeof (CK_ULONG), &value_len_attr);
1708		if (rc != CKR_OK)
1709			goto error;
1710	}
1711
1712	(void) template_update_attribute(tmpl, value_attr);
1713
1714	if (data_len != len)
1715		(void) template_update_attribute(tmpl, value_len_attr);
1716
1717	return (CKR_OK);
1718
1719error:
1720	if (value_attr)	free(value_attr);
1721	if (value_len_attr) free(value_len_attr);
1722
1723	return (rc);
1724}
1725