17c478bd9Sstevel@tonic-gate /*
27c478bd9Sstevel@tonic-gate * CDDL HEADER START
37c478bd9Sstevel@tonic-gate *
47c478bd9Sstevel@tonic-gate * The contents of this file are subject to the terms of the
54c21f043Sizick * Common Development and Distribution License (the "License").
64c21f043Sizick * You may not use this file except in compliance with the License.
77c478bd9Sstevel@tonic-gate *
87c478bd9Sstevel@tonic-gate * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
97c478bd9Sstevel@tonic-gate * or http://www.opensolaris.org/os/licensing.
107c478bd9Sstevel@tonic-gate * See the License for the specific language governing permissions
117c478bd9Sstevel@tonic-gate * and limitations under the License.
127c478bd9Sstevel@tonic-gate *
137c478bd9Sstevel@tonic-gate * When distributing Covered Code, include this CDDL HEADER in each
147c478bd9Sstevel@tonic-gate * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
157c478bd9Sstevel@tonic-gate * If applicable, add the following below this CDDL HEADER, with the
167c478bd9Sstevel@tonic-gate * fields enclosed by brackets "[]" replaced with your own identifying
177c478bd9Sstevel@tonic-gate * information: Portions Copyright [yyyy] [name of copyright owner]
187c478bd9Sstevel@tonic-gate *
197c478bd9Sstevel@tonic-gate * CDDL HEADER END
207c478bd9Sstevel@tonic-gate */
217c478bd9Sstevel@tonic-gate /*
22*d288ba74SAnthony Scarpino * Copyright 2009 Sun Microsystems, Inc. All rights reserved.
237c478bd9Sstevel@tonic-gate * Use is subject to license terms.
247c478bd9Sstevel@tonic-gate */
257c478bd9Sstevel@tonic-gate
267c478bd9Sstevel@tonic-gate #include <security/cryptoki.h>
277c478bd9Sstevel@tonic-gate #include "softGlobal.h"
287c478bd9Sstevel@tonic-gate #include "softSession.h"
297c478bd9Sstevel@tonic-gate #include "softKeys.h"
307c478bd9Sstevel@tonic-gate #include "softOps.h"
317c478bd9Sstevel@tonic-gate
327c478bd9Sstevel@tonic-gate
337c478bd9Sstevel@tonic-gate CK_RV
C_GenerateKey(CK_SESSION_HANDLE hSession,CK_MECHANISM_PTR pMechanism,CK_ATTRIBUTE_PTR pTemplate,CK_ULONG ulCount,CK_OBJECT_HANDLE_PTR phKey)347c478bd9Sstevel@tonic-gate C_GenerateKey(CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism,
357c478bd9Sstevel@tonic-gate CK_ATTRIBUTE_PTR pTemplate, CK_ULONG ulCount, CK_OBJECT_HANDLE_PTR phKey)
367c478bd9Sstevel@tonic-gate {
377c478bd9Sstevel@tonic-gate
387c478bd9Sstevel@tonic-gate CK_RV rv;
397c478bd9Sstevel@tonic-gate soft_session_t *session_p;
407c478bd9Sstevel@tonic-gate boolean_t lock_held = B_FALSE;
417c478bd9Sstevel@tonic-gate
427c478bd9Sstevel@tonic-gate if (!softtoken_initialized)
437c478bd9Sstevel@tonic-gate return (CKR_CRYPTOKI_NOT_INITIALIZED);
447c478bd9Sstevel@tonic-gate
457c478bd9Sstevel@tonic-gate /* Obtain the session pointer. */
467c478bd9Sstevel@tonic-gate rv = handle2session(hSession, &session_p);
477c478bd9Sstevel@tonic-gate if (rv != CKR_OK)
487c478bd9Sstevel@tonic-gate return (rv);
497c478bd9Sstevel@tonic-gate
507c478bd9Sstevel@tonic-gate if ((pMechanism == NULL) || (phKey == NULL)) {
517c478bd9Sstevel@tonic-gate rv = CKR_ARGUMENTS_BAD;
527c478bd9Sstevel@tonic-gate goto clean_exit;
537c478bd9Sstevel@tonic-gate }
547c478bd9Sstevel@tonic-gate
557c478bd9Sstevel@tonic-gate if ((pTemplate == NULL) && (ulCount != 0)) {
567c478bd9Sstevel@tonic-gate rv = CKR_ARGUMENTS_BAD;
577c478bd9Sstevel@tonic-gate goto clean_exit;
587c478bd9Sstevel@tonic-gate }
597c478bd9Sstevel@tonic-gate
607c478bd9Sstevel@tonic-gate rv = soft_genkey(session_p, pMechanism, pTemplate,
617c478bd9Sstevel@tonic-gate ulCount, phKey);
627c478bd9Sstevel@tonic-gate
637c478bd9Sstevel@tonic-gate clean_exit:
647c478bd9Sstevel@tonic-gate SES_REFRELE(session_p, lock_held);
657c478bd9Sstevel@tonic-gate return (rv);
667c478bd9Sstevel@tonic-gate
677c478bd9Sstevel@tonic-gate }
687c478bd9Sstevel@tonic-gate
697c478bd9Sstevel@tonic-gate
707c478bd9Sstevel@tonic-gate CK_RV
C_GenerateKeyPair(CK_SESSION_HANDLE hSession,CK_MECHANISM_PTR pMechanism,CK_ATTRIBUTE_PTR pPublicKeyTemplate,CK_ULONG ulPublicKeyAttributeCount,CK_ATTRIBUTE_PTR pPrivateKeyTemplate,CK_ULONG ulPrivateKeyAttributeCount,CK_OBJECT_HANDLE_PTR phPublicKey,CK_OBJECT_HANDLE_PTR phPrivateKey)717c478bd9Sstevel@tonic-gate C_GenerateKeyPair(CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism,
727c478bd9Sstevel@tonic-gate CK_ATTRIBUTE_PTR pPublicKeyTemplate, CK_ULONG ulPublicKeyAttributeCount,
737c478bd9Sstevel@tonic-gate CK_ATTRIBUTE_PTR pPrivateKeyTemplate, CK_ULONG ulPrivateKeyAttributeCount,
747c478bd9Sstevel@tonic-gate CK_OBJECT_HANDLE_PTR phPublicKey, CK_OBJECT_HANDLE_PTR phPrivateKey)
757c478bd9Sstevel@tonic-gate {
767c478bd9Sstevel@tonic-gate
777c478bd9Sstevel@tonic-gate CK_RV rv;
787c478bd9Sstevel@tonic-gate soft_session_t *session_p;
797c478bd9Sstevel@tonic-gate boolean_t lock_held = B_FALSE;
807c478bd9Sstevel@tonic-gate
817c478bd9Sstevel@tonic-gate if (!softtoken_initialized)
827c478bd9Sstevel@tonic-gate return (CKR_CRYPTOKI_NOT_INITIALIZED);
837c478bd9Sstevel@tonic-gate
847c478bd9Sstevel@tonic-gate /* Obtain the session pointer. */
857c478bd9Sstevel@tonic-gate rv = handle2session(hSession, &session_p);
867c478bd9Sstevel@tonic-gate if (rv != CKR_OK)
877c478bd9Sstevel@tonic-gate return (rv);
887c478bd9Sstevel@tonic-gate
897c478bd9Sstevel@tonic-gate if ((pMechanism == NULL) || (phPublicKey == NULL) ||
907c478bd9Sstevel@tonic-gate (phPrivateKey == NULL)) {
917c478bd9Sstevel@tonic-gate rv = CKR_ARGUMENTS_BAD;
927c478bd9Sstevel@tonic-gate goto clean_exit;
937c478bd9Sstevel@tonic-gate }
947c478bd9Sstevel@tonic-gate
957c478bd9Sstevel@tonic-gate if ((pPublicKeyTemplate == NULL) ||
967c478bd9Sstevel@tonic-gate (ulPublicKeyAttributeCount == 0)) {
977c478bd9Sstevel@tonic-gate rv = CKR_ARGUMENTS_BAD;
987c478bd9Sstevel@tonic-gate goto clean_exit;
997c478bd9Sstevel@tonic-gate }
1007c478bd9Sstevel@tonic-gate
1017c478bd9Sstevel@tonic-gate if ((pPrivateKeyTemplate == NULL) &&
1027c478bd9Sstevel@tonic-gate (ulPrivateKeyAttributeCount != 0)) {
1037c478bd9Sstevel@tonic-gate rv = CKR_ARGUMENTS_BAD;
1047c478bd9Sstevel@tonic-gate goto clean_exit;
1057c478bd9Sstevel@tonic-gate }
1067c478bd9Sstevel@tonic-gate
1077c478bd9Sstevel@tonic-gate rv = soft_genkey_pair(session_p, pMechanism, pPublicKeyTemplate,
1087c478bd9Sstevel@tonic-gate ulPublicKeyAttributeCount, pPrivateKeyTemplate,
1097c478bd9Sstevel@tonic-gate ulPrivateKeyAttributeCount, phPublicKey, phPrivateKey);
1107c478bd9Sstevel@tonic-gate
1117c478bd9Sstevel@tonic-gate clean_exit:
1127c478bd9Sstevel@tonic-gate SES_REFRELE(session_p, lock_held);
1137c478bd9Sstevel@tonic-gate return (rv);
1147c478bd9Sstevel@tonic-gate }
1157c478bd9Sstevel@tonic-gate
1167c478bd9Sstevel@tonic-gate CK_RV
C_WrapKey(CK_SESSION_HANDLE hSession,CK_MECHANISM_PTR pMechanism,CK_OBJECT_HANDLE hWrappingKey,CK_OBJECT_HANDLE hKey,CK_BYTE_PTR pWrappedKey,CK_ULONG_PTR pulWrappedKeyLen)1177c478bd9Sstevel@tonic-gate C_WrapKey(CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism,
1187c478bd9Sstevel@tonic-gate CK_OBJECT_HANDLE hWrappingKey, CK_OBJECT_HANDLE hKey,
1197c478bd9Sstevel@tonic-gate CK_BYTE_PTR pWrappedKey, CK_ULONG_PTR pulWrappedKeyLen)
1207c478bd9Sstevel@tonic-gate {
1217c478bd9Sstevel@tonic-gate CK_RV rv;
1227c478bd9Sstevel@tonic-gate soft_session_t *session_p;
1237c478bd9Sstevel@tonic-gate soft_object_t *wrappingkey_p;
1247c478bd9Sstevel@tonic-gate soft_object_t *hkey_p;
1257c478bd9Sstevel@tonic-gate boolean_t lock_held = B_FALSE;
1267c478bd9Sstevel@tonic-gate
1277c478bd9Sstevel@tonic-gate if (!softtoken_initialized)
1287c478bd9Sstevel@tonic-gate return (CKR_CRYPTOKI_NOT_INITIALIZED);
1297c478bd9Sstevel@tonic-gate
1307c478bd9Sstevel@tonic-gate /* Obtain the session pointer. */
1317c478bd9Sstevel@tonic-gate rv = handle2session(hSession, &session_p);
1327c478bd9Sstevel@tonic-gate if (rv != CKR_OK)
1337c478bd9Sstevel@tonic-gate return (rv);
1347c478bd9Sstevel@tonic-gate
1357c478bd9Sstevel@tonic-gate if (pMechanism == NULL) {
1367c478bd9Sstevel@tonic-gate rv = CKR_ARGUMENTS_BAD;
1377c478bd9Sstevel@tonic-gate goto clean_exit;
1387c478bd9Sstevel@tonic-gate }
1397c478bd9Sstevel@tonic-gate
1407c478bd9Sstevel@tonic-gate if (pulWrappedKeyLen == NULL) {
1417c478bd9Sstevel@tonic-gate rv = CKR_ARGUMENTS_BAD;
1427c478bd9Sstevel@tonic-gate goto clean_exit;
1437c478bd9Sstevel@tonic-gate }
1447c478bd9Sstevel@tonic-gate
1457c478bd9Sstevel@tonic-gate /* Obtain the wrapping key object pointer. */
1467c478bd9Sstevel@tonic-gate HANDLE2OBJECT(hWrappingKey, wrappingkey_p, rv);
1477c478bd9Sstevel@tonic-gate if (rv != CKR_OK) {
1487c478bd9Sstevel@tonic-gate rv = CKR_WRAPPING_KEY_HANDLE_INVALID;
1497c478bd9Sstevel@tonic-gate goto clean_exit;
1507c478bd9Sstevel@tonic-gate }
1517c478bd9Sstevel@tonic-gate
1527c478bd9Sstevel@tonic-gate /* Obtain the to-be-wrapped key object pointer. */
1537c478bd9Sstevel@tonic-gate HANDLE2OBJECT(hKey, hkey_p, rv);
1547c478bd9Sstevel@tonic-gate if (rv != CKR_OK)
1557c478bd9Sstevel@tonic-gate goto clean_exit1;
1567c478bd9Sstevel@tonic-gate
1577c478bd9Sstevel@tonic-gate /* Check if given wrapping key may be used for wrapping. */
1587c478bd9Sstevel@tonic-gate if (!(wrappingkey_p->bool_attr_mask & WRAP_BOOL_ON)) {
1597c478bd9Sstevel@tonic-gate rv = CKR_WRAPPING_KEY_TYPE_INCONSISTENT;
1607c478bd9Sstevel@tonic-gate goto clean_exit2;
1617c478bd9Sstevel@tonic-gate }
1627c478bd9Sstevel@tonic-gate
1637c478bd9Sstevel@tonic-gate /* Check if given wrapping key may be used for encryption. */
1647c478bd9Sstevel@tonic-gate if (!(wrappingkey_p->bool_attr_mask & ENCRYPT_BOOL_ON)) {
165*d288ba74SAnthony Scarpino rv = CKR_KEY_FUNCTION_NOT_PERMITTED;
1667c478bd9Sstevel@tonic-gate goto clean_exit2;
1677c478bd9Sstevel@tonic-gate }
1687c478bd9Sstevel@tonic-gate
1697c478bd9Sstevel@tonic-gate /*
1707c478bd9Sstevel@tonic-gate * Check to see if key to be wrapped is extractable.
1717c478bd9Sstevel@tonic-gate * Note: this should always be true for softtoken keys.
1727c478bd9Sstevel@tonic-gate */
1737c478bd9Sstevel@tonic-gate if (!(hkey_p->bool_attr_mask & EXTRACTABLE_BOOL_ON)) {
1747c478bd9Sstevel@tonic-gate rv = CKR_KEY_UNEXTRACTABLE;
1757c478bd9Sstevel@tonic-gate goto clean_exit2;
1767c478bd9Sstevel@tonic-gate }
1777c478bd9Sstevel@tonic-gate
1787c478bd9Sstevel@tonic-gate (void) pthread_mutex_lock(&session_p->session_mutex);
1797c478bd9Sstevel@tonic-gate lock_held = B_TRUE;
1807c478bd9Sstevel@tonic-gate
1817c478bd9Sstevel@tonic-gate /*
1827c478bd9Sstevel@tonic-gate * Wrapping key objects requires calling encrypt operations.
1837c478bd9Sstevel@tonic-gate * Check to see if encrypt operation is already active.
1847c478bd9Sstevel@tonic-gate */
1857c478bd9Sstevel@tonic-gate if (session_p->encrypt.flags & CRYPTO_OPERATION_ACTIVE) {
1867c478bd9Sstevel@tonic-gate /* free the memory to avoid memory leak */
1877c478bd9Sstevel@tonic-gate soft_crypt_cleanup(session_p, B_TRUE, lock_held);
1887c478bd9Sstevel@tonic-gate }
1897c478bd9Sstevel@tonic-gate
1907c478bd9Sstevel@tonic-gate /* This active flag will remain ON while wrapping the key. */
1917c478bd9Sstevel@tonic-gate session_p->encrypt.flags = CRYPTO_OPERATION_ACTIVE;
1927c478bd9Sstevel@tonic-gate
1937c478bd9Sstevel@tonic-gate (void) pthread_mutex_unlock(&session_p->session_mutex);
1947c478bd9Sstevel@tonic-gate lock_held = B_FALSE;
1957c478bd9Sstevel@tonic-gate
1967c478bd9Sstevel@tonic-gate rv = soft_wrapkey(session_p, pMechanism, wrappingkey_p,
1977c478bd9Sstevel@tonic-gate hkey_p, pWrappedKey, pulWrappedKeyLen);
1987c478bd9Sstevel@tonic-gate
1997c478bd9Sstevel@tonic-gate (void) pthread_mutex_lock(&session_p->session_mutex);
2004c21f043Sizick
2017c478bd9Sstevel@tonic-gate lock_held = B_TRUE;
2024c21f043Sizick session_p->encrypt.flags = 0;
2034c21f043Sizick
2044c21f043Sizick if ((rv == CKR_OK && pWrappedKey == NULL) ||
2054c21f043Sizick rv == CKR_BUFFER_TOO_SMALL)
2064c21f043Sizick soft_crypt_cleanup(session_p, B_TRUE, lock_held);
2077c478bd9Sstevel@tonic-gate
2087c478bd9Sstevel@tonic-gate clean_exit2:
2097c478bd9Sstevel@tonic-gate OBJ_REFRELE(hkey_p);
2107c478bd9Sstevel@tonic-gate clean_exit1:
2117c478bd9Sstevel@tonic-gate OBJ_REFRELE(wrappingkey_p);
2127c478bd9Sstevel@tonic-gate clean_exit:
2137c478bd9Sstevel@tonic-gate SES_REFRELE(session_p, lock_held);
2147c478bd9Sstevel@tonic-gate return (rv);
2157c478bd9Sstevel@tonic-gate }
2167c478bd9Sstevel@tonic-gate
2177c478bd9Sstevel@tonic-gate CK_RV
C_UnwrapKey(CK_SESSION_HANDLE hSession,CK_MECHANISM_PTR pMechanism,CK_OBJECT_HANDLE hUnwrappingKey,CK_BYTE_PTR pWrappedKey,CK_ULONG ulWrappedKeyLen,CK_ATTRIBUTE_PTR pTemplate,CK_ULONG ulAttributeCount,CK_OBJECT_HANDLE_PTR phKey)2187c478bd9Sstevel@tonic-gate C_UnwrapKey(CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism,
2197c478bd9Sstevel@tonic-gate CK_OBJECT_HANDLE hUnwrappingKey, CK_BYTE_PTR pWrappedKey,
2207c478bd9Sstevel@tonic-gate CK_ULONG ulWrappedKeyLen, CK_ATTRIBUTE_PTR pTemplate,
2217c478bd9Sstevel@tonic-gate CK_ULONG ulAttributeCount, CK_OBJECT_HANDLE_PTR phKey)
2227c478bd9Sstevel@tonic-gate {
2237c478bd9Sstevel@tonic-gate CK_RV rv;
2247c478bd9Sstevel@tonic-gate soft_session_t *session_p;
2257c478bd9Sstevel@tonic-gate soft_object_t *unwrappingkey_p;
2267c478bd9Sstevel@tonic-gate boolean_t lock_held = B_FALSE;
2277c478bd9Sstevel@tonic-gate
2287c478bd9Sstevel@tonic-gate if (!softtoken_initialized)
2297c478bd9Sstevel@tonic-gate return (CKR_CRYPTOKI_NOT_INITIALIZED);
2307c478bd9Sstevel@tonic-gate
2317c478bd9Sstevel@tonic-gate /* Obtain the session pointer. */
2327c478bd9Sstevel@tonic-gate rv = handle2session(hSession, &session_p);
2337c478bd9Sstevel@tonic-gate if (rv != CKR_OK)
2347c478bd9Sstevel@tonic-gate return (rv);
2357c478bd9Sstevel@tonic-gate
2367c478bd9Sstevel@tonic-gate if (pMechanism == NULL) {
2377c478bd9Sstevel@tonic-gate rv = CKR_ARGUMENTS_BAD;
2387c478bd9Sstevel@tonic-gate goto clean_exit;
2397c478bd9Sstevel@tonic-gate }
2407c478bd9Sstevel@tonic-gate
2417c478bd9Sstevel@tonic-gate if ((pTemplate == NULL) || (ulAttributeCount == 0)) {
2427c478bd9Sstevel@tonic-gate rv = CKR_ARGUMENTS_BAD;
2437c478bd9Sstevel@tonic-gate goto clean_exit;
2447c478bd9Sstevel@tonic-gate }
2457c478bd9Sstevel@tonic-gate
2467c478bd9Sstevel@tonic-gate if ((pWrappedKey == NULL) || (ulWrappedKeyLen == 0)) {
2477c478bd9Sstevel@tonic-gate rv = CKR_ARGUMENTS_BAD;
2487c478bd9Sstevel@tonic-gate goto clean_exit;
2497c478bd9Sstevel@tonic-gate }
2507c478bd9Sstevel@tonic-gate
2517c478bd9Sstevel@tonic-gate if (phKey == NULL) {
2527c478bd9Sstevel@tonic-gate rv = CKR_ARGUMENTS_BAD;
2537c478bd9Sstevel@tonic-gate goto clean_exit;
2547c478bd9Sstevel@tonic-gate }
2557c478bd9Sstevel@tonic-gate
2567c478bd9Sstevel@tonic-gate /* Obtain the unwrapping key object pointer. */
2577c478bd9Sstevel@tonic-gate HANDLE2OBJECT(hUnwrappingKey, unwrappingkey_p, rv);
2587c478bd9Sstevel@tonic-gate if (rv != CKR_OK) {
2597c478bd9Sstevel@tonic-gate rv = CKR_UNWRAPPING_KEY_HANDLE_INVALID;
2607c478bd9Sstevel@tonic-gate goto clean_exit;
2617c478bd9Sstevel@tonic-gate }
2627c478bd9Sstevel@tonic-gate
2637c478bd9Sstevel@tonic-gate /* Check if given unwrapping key may be used for unwrapping. */
2647c478bd9Sstevel@tonic-gate if (!(unwrappingkey_p->bool_attr_mask & UNWRAP_BOOL_ON)) {
2657c478bd9Sstevel@tonic-gate rv = CKR_UNWRAPPING_KEY_TYPE_INCONSISTENT;
2667c478bd9Sstevel@tonic-gate goto clean_exit1;
2677c478bd9Sstevel@tonic-gate }
2687c478bd9Sstevel@tonic-gate
2697c478bd9Sstevel@tonic-gate /* Check if given unwrapping key may be used to decrypt. */
2707c478bd9Sstevel@tonic-gate if (!(unwrappingkey_p->bool_attr_mask & DECRYPT_BOOL_ON)) {
271*d288ba74SAnthony Scarpino rv = CKR_KEY_FUNCTION_NOT_PERMITTED;
2727c478bd9Sstevel@tonic-gate goto clean_exit1;
2737c478bd9Sstevel@tonic-gate }
2747c478bd9Sstevel@tonic-gate
2757c478bd9Sstevel@tonic-gate (void) pthread_mutex_lock(&session_p->session_mutex);
2767c478bd9Sstevel@tonic-gate lock_held = B_TRUE;
2777c478bd9Sstevel@tonic-gate
2787c478bd9Sstevel@tonic-gate /*
2797c478bd9Sstevel@tonic-gate * Unwrapping key objects requires calling decrypt operations.
2807c478bd9Sstevel@tonic-gate * Check to see if decrypt operation is already active.
2817c478bd9Sstevel@tonic-gate */
2827c478bd9Sstevel@tonic-gate if (session_p->decrypt.flags & CRYPTO_OPERATION_ACTIVE) {
2837c478bd9Sstevel@tonic-gate /* free the memory to avoid memory leak */
2847c478bd9Sstevel@tonic-gate soft_crypt_cleanup(session_p, B_FALSE, lock_held);
2857c478bd9Sstevel@tonic-gate }
2867c478bd9Sstevel@tonic-gate
2877c478bd9Sstevel@tonic-gate /*
2887c478bd9Sstevel@tonic-gate * This active flag will remain ON until application
2897c478bd9Sstevel@tonic-gate * is done unwrapping the key.
2907c478bd9Sstevel@tonic-gate */
2917c478bd9Sstevel@tonic-gate session_p->decrypt.flags = CRYPTO_OPERATION_ACTIVE;
2927c478bd9Sstevel@tonic-gate
2937c478bd9Sstevel@tonic-gate (void) pthread_mutex_unlock(&session_p->session_mutex);
2947c478bd9Sstevel@tonic-gate lock_held = B_FALSE;
2957c478bd9Sstevel@tonic-gate
2967c478bd9Sstevel@tonic-gate rv = soft_unwrapkey(session_p, pMechanism, unwrappingkey_p,
2977c478bd9Sstevel@tonic-gate pWrappedKey, ulWrappedKeyLen, pTemplate, ulAttributeCount,
2987c478bd9Sstevel@tonic-gate phKey);
2997c478bd9Sstevel@tonic-gate
3007c478bd9Sstevel@tonic-gate (void) pthread_mutex_lock(&session_p->session_mutex);
3014c21f043Sizick
3024c21f043Sizick if ((rv == CKR_OK && pWrappedKey == NULL) ||
3034c21f043Sizick rv == CKR_BUFFER_TOO_SMALL)
3044c21f043Sizick soft_crypt_cleanup(session_p, B_TRUE, lock_held);
3054c21f043Sizick
3067c478bd9Sstevel@tonic-gate session_p->decrypt.flags = 0;
3077c478bd9Sstevel@tonic-gate lock_held = B_TRUE;
3087c478bd9Sstevel@tonic-gate
3097c478bd9Sstevel@tonic-gate clean_exit1:
3107c478bd9Sstevel@tonic-gate OBJ_REFRELE(unwrappingkey_p);
3117c478bd9Sstevel@tonic-gate clean_exit:
3127c478bd9Sstevel@tonic-gate SES_REFRELE(session_p, lock_held);
3137c478bd9Sstevel@tonic-gate return (rv);
3147c478bd9Sstevel@tonic-gate }
3157c478bd9Sstevel@tonic-gate
3167c478bd9Sstevel@tonic-gate
3177c478bd9Sstevel@tonic-gate CK_RV
C_DeriveKey(CK_SESSION_HANDLE hSession,CK_MECHANISM_PTR pMechanism,CK_OBJECT_HANDLE hBaseKey,CK_ATTRIBUTE_PTR pTemplate,CK_ULONG ulAttributeCount,CK_OBJECT_HANDLE_PTR phKey)3187c478bd9Sstevel@tonic-gate C_DeriveKey(CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism,
3197c478bd9Sstevel@tonic-gate CK_OBJECT_HANDLE hBaseKey, CK_ATTRIBUTE_PTR pTemplate,
3207c478bd9Sstevel@tonic-gate CK_ULONG ulAttributeCount, CK_OBJECT_HANDLE_PTR phKey)
3217c478bd9Sstevel@tonic-gate {
3227c478bd9Sstevel@tonic-gate
3237c478bd9Sstevel@tonic-gate CK_RV rv;
3247c478bd9Sstevel@tonic-gate soft_session_t *session_p;
3257c478bd9Sstevel@tonic-gate soft_object_t *basekey_p;
3267c478bd9Sstevel@tonic-gate boolean_t lock_held = B_FALSE;
3277c478bd9Sstevel@tonic-gate
3287c478bd9Sstevel@tonic-gate if (!softtoken_initialized)
3297c478bd9Sstevel@tonic-gate return (CKR_CRYPTOKI_NOT_INITIALIZED);
3307c478bd9Sstevel@tonic-gate
3317c478bd9Sstevel@tonic-gate /* Obtain the session pointer. */
3327c478bd9Sstevel@tonic-gate rv = handle2session(hSession, &session_p);
3337c478bd9Sstevel@tonic-gate if (rv != CKR_OK)
3347c478bd9Sstevel@tonic-gate return (rv);
3357c478bd9Sstevel@tonic-gate
3367c478bd9Sstevel@tonic-gate if (pMechanism == NULL) {
3377c478bd9Sstevel@tonic-gate rv = CKR_ARGUMENTS_BAD;
3387c478bd9Sstevel@tonic-gate goto clean_exit;
3397c478bd9Sstevel@tonic-gate }
3407c478bd9Sstevel@tonic-gate
3417c478bd9Sstevel@tonic-gate if (((pTemplate != NULL) && (ulAttributeCount == 0)) ||
3427c478bd9Sstevel@tonic-gate ((pTemplate == NULL) && (ulAttributeCount != 0))) {
3437c478bd9Sstevel@tonic-gate rv = CKR_ARGUMENTS_BAD;
3447c478bd9Sstevel@tonic-gate goto clean_exit;
3457c478bd9Sstevel@tonic-gate }
3467c478bd9Sstevel@tonic-gate
3477c478bd9Sstevel@tonic-gate /* Obtain the private key object pointer. */
3487c478bd9Sstevel@tonic-gate HANDLE2OBJECT(hBaseKey, basekey_p, rv);
3497c478bd9Sstevel@tonic-gate if (rv != CKR_OK)
3507c478bd9Sstevel@tonic-gate goto clean_exit;
3517c478bd9Sstevel@tonic-gate
3527c478bd9Sstevel@tonic-gate /* Check to see if key object allows for derivation. */
3537c478bd9Sstevel@tonic-gate if (!(basekey_p->bool_attr_mask & DERIVE_BOOL_ON)) {
354*d288ba74SAnthony Scarpino rv = CKR_KEY_FUNCTION_NOT_PERMITTED;
3557c478bd9Sstevel@tonic-gate goto clean_exit1;
3567c478bd9Sstevel@tonic-gate }
3577c478bd9Sstevel@tonic-gate
3587c478bd9Sstevel@tonic-gate rv = soft_derivekey(session_p, pMechanism, basekey_p,
3597c478bd9Sstevel@tonic-gate pTemplate, ulAttributeCount, phKey);
3607c478bd9Sstevel@tonic-gate
3617c478bd9Sstevel@tonic-gate clean_exit1:
3627c478bd9Sstevel@tonic-gate OBJ_REFRELE(basekey_p);
3637c478bd9Sstevel@tonic-gate clean_exit:
3647c478bd9Sstevel@tonic-gate SES_REFRELE(session_p, lock_held);
3657c478bd9Sstevel@tonic-gate return (rv);
3667c478bd9Sstevel@tonic-gate }
367