1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License (the "License").
6  * You may not use this file except in compliance with the License.
7  *
8  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9  * or http://www.opensolaris.org/os/licensing.
10  * See the License for the specific language governing permissions
11  * and limitations under the License.
12  *
13  * When distributing Covered Code, include this CDDL HEADER in each
14  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15  * If applicable, add the following below this CDDL HEADER, with the
16  * fields enclosed by brackets "[]" replaced with your own identifying
17  * information: Portions Copyright [yyyy] [name of copyright owner]
18  *
19  * CDDL HEADER END
20  */
21 /*
22  * Copyright 2007 Sun Microsystems, Inc.  All rights reserved.
23  * Use is subject to license terms.
24  * Copyright 2014 Nexenta Systems, Inc.  All rights reserved.
25  */
26 
27 #include <stdlib.h>
28 #include <strings.h>
29 #include <sys/types.h>
30 #include <security/cryptoki.h>
31 #include "softObject.h"
32 #include "softOps.h"
33 #include "softSession.h"
34 #include "softMAC.h"
35 #include "softRSA.h"
36 #include "softDSA.h"
37 #include "softEC.h"
38 #include "softCrypt.h"
39 
40 /*
41  * soft_sign_init()
42  *
43  * Arguments:
44  *	session_p:	pointer to soft_session_t struct
45  *	pMechanism:	pointer to CK_MECHANISM struct provided by application
46  *	key_p:		pointer to key soft_object_t struct
47  *
48  * Description:
49  *	called by C_SignInit(). This function calls the corresponding
50  *	sign init routine based on the mechanism.
51  *
52  */
53 CK_RV
54 soft_sign_init(soft_session_t *session_p, CK_MECHANISM_PTR pMechanism,
55     soft_object_t *key_p)
56 {
57 
58 	switch (pMechanism->mechanism) {
59 
60 	case CKM_SSL3_MD5_MAC:
61 	case CKM_SSL3_SHA1_MAC:
62 	case CKM_MD5_HMAC_GENERAL:
63 	case CKM_MD5_HMAC:
64 	case CKM_SHA_1_HMAC_GENERAL:
65 	case CKM_SHA_1_HMAC:
66 	case CKM_SHA256_HMAC_GENERAL:
67 	case CKM_SHA256_HMAC:
68 	case CKM_SHA384_HMAC_GENERAL:
69 	case CKM_SHA384_HMAC:
70 	case CKM_SHA512_HMAC_GENERAL:
71 	case CKM_SHA512_HMAC:
72 
73 		return (soft_hmac_sign_verify_init_common(session_p,
74 		    pMechanism, key_p, B_TRUE));
75 
76 	case CKM_RSA_X_509:
77 	case CKM_RSA_PKCS:
78 	case CKM_MD5_RSA_PKCS:
79 	case CKM_SHA1_RSA_PKCS:
80 	case CKM_SHA256_RSA_PKCS:
81 	case CKM_SHA384_RSA_PKCS:
82 	case CKM_SHA512_RSA_PKCS:
83 
84 		return (soft_rsa_sign_verify_init_common(session_p, pMechanism,
85 		    key_p, B_TRUE));
86 
87 	case CKM_DSA:
88 	case CKM_DSA_SHA1:
89 
90 		return (soft_dsa_sign_verify_init_common(session_p, pMechanism,
91 		    key_p, B_TRUE));
92 
93 	case CKM_ECDSA:
94 	case CKM_ECDSA_SHA1:
95 
96 		return (soft_ecc_sign_verify_init_common(session_p, pMechanism,
97 		    key_p, B_TRUE));
98 
99 	case CKM_DES_MAC_GENERAL:
100 	case CKM_DES_MAC:
101 
102 		return (soft_des_sign_verify_init_common(session_p, pMechanism,
103 		    key_p, B_TRUE));
104 
105 	case CKM_AES_CMAC_GENERAL:
106 	case CKM_AES_CMAC:
107 
108 		return (soft_aes_sign_verify_init_common(session_p, pMechanism,
109 		    key_p, B_TRUE));
110 
111 	default:
112 		return (CKR_MECHANISM_INVALID);
113 	}
114 
115 }
116 
117 
118 /*
119  * soft_sign()
120  *
121  * Arguments:
122  *      session_p:	pointer to soft_session_t struct
123  *	pData:		pointer to the input data to be signed
124  *	ulDataLen:	length of the input data
125  *	pSignature:	pointer to the signature after signing
126  *	pulSignatureLen: pointer to the length of the signature
127  *
128  * Description:
129  *      called by C_Sign(). This function calls the corresponding
130  *	sign routine based on the mechanism.
131  *
132  */
133 CK_RV
134 soft_sign(soft_session_t *session_p, CK_BYTE_PTR pData,
135     CK_ULONG ulDataLen, CK_BYTE_PTR pSignature,
136     CK_ULONG_PTR pulSignatureLen)
137 {
138 
139 	CK_MECHANISM_TYPE mechanism = session_p->sign.mech.mechanism;
140 	CK_RV rv = CKR_OK;
141 
142 	switch (mechanism) {
143 
144 	case CKM_SSL3_MD5_MAC:
145 	case CKM_SSL3_SHA1_MAC:
146 	case CKM_MD5_HMAC_GENERAL:
147 	case CKM_MD5_HMAC:
148 	case CKM_SHA_1_HMAC_GENERAL:
149 	case CKM_SHA_1_HMAC:
150 	case CKM_SHA256_HMAC_GENERAL:
151 	case CKM_SHA256_HMAC:
152 	case CKM_SHA384_HMAC_GENERAL:
153 	case CKM_SHA384_HMAC:
154 	case CKM_SHA512_HMAC_GENERAL:
155 	case CKM_SHA512_HMAC:
156 	{
157 		CK_BYTE hmac[SHA512_DIGEST_LENGTH]; /* use the maximum size */
158 
159 		if (pSignature != NULL) {
160 			/* Pass local buffer to avoid overflow. */
161 			rv = soft_hmac_sign_verify_common(session_p, pData,
162 			    ulDataLen, hmac, pulSignatureLen, B_TRUE);
163 		} else {
164 			/* Pass original pSignature, let callee to handle it. */
165 			rv = soft_hmac_sign_verify_common(session_p, pData,
166 			    ulDataLen, pSignature, pulSignatureLen, B_TRUE);
167 		}
168 
169 		if ((rv == CKR_OK) && (pSignature != NULL))
170 			(void) memcpy(pSignature, hmac, *pulSignatureLen);
171 
172 		return (rv);
173 	}
174 	case CKM_DES_MAC_GENERAL:
175 	case CKM_DES_MAC:
176 	{
177 		CK_BYTE signature[DES_BLOCK_LEN]; /* use the maximum size */
178 
179 		if (pSignature != NULL) {
180 			/* Pass local buffer to avoid overflow. */
181 			rv = soft_des_sign_verify_common(session_p, pData,
182 			    ulDataLen, signature, pulSignatureLen, B_TRUE,
183 			    B_FALSE);
184 		} else {
185 			/* Pass NULL, let callee to handle it. */
186 			rv = soft_des_sign_verify_common(session_p, pData,
187 			    ulDataLen, NULL, pulSignatureLen, B_TRUE, B_FALSE);
188 		}
189 
190 		if ((rv == CKR_OK) && (pSignature != NULL))
191 			(void) memcpy(pSignature, signature, *pulSignatureLen);
192 
193 		return (rv);
194 	}
195 	case CKM_AES_CMAC_GENERAL:
196 	case CKM_AES_CMAC:
197 	{
198 		CK_BYTE signature[AES_BLOCK_LEN];
199 
200 		if (pSignature != NULL) {
201 			/* Pass local buffer to avoid overflow. */
202 			rv = soft_aes_sign_verify_common(session_p, pData,
203 			    ulDataLen, signature, pulSignatureLen, B_TRUE,
204 			    B_FALSE);
205 		} else {
206 			/* Pass NULL, let callee handle it. */
207 			rv = soft_aes_sign_verify_common(session_p, pData,
208 			    ulDataLen, NULL, pulSignatureLen, B_TRUE, B_FALSE);
209 		}
210 
211 		if ((rv == CKR_OK) && (pSignature != NULL))
212 			(void) memcpy(pSignature, signature, *pulSignatureLen);
213 
214 		return (rv);
215 	}
216 	case CKM_RSA_X_509:
217 	case CKM_RSA_PKCS:
218 
219 		return (soft_rsa_sign_common(session_p, pData, ulDataLen,
220 		    pSignature, pulSignatureLen, mechanism));
221 
222 	case CKM_MD5_RSA_PKCS:
223 	case CKM_SHA1_RSA_PKCS:
224 	case CKM_SHA256_RSA_PKCS:
225 	case CKM_SHA384_RSA_PKCS:
226 	case CKM_SHA512_RSA_PKCS:
227 
228 		return (soft_rsa_digest_sign_common(session_p, pData, ulDataLen,
229 		    pSignature, pulSignatureLen, mechanism, B_FALSE));
230 
231 	case CKM_DSA:
232 
233 		return (soft_dsa_sign(session_p, pData, ulDataLen,
234 		    pSignature, pulSignatureLen));
235 
236 	case CKM_DSA_SHA1:
237 
238 		return (soft_dsa_digest_sign_common(session_p, pData, ulDataLen,
239 		    pSignature, pulSignatureLen, B_FALSE));
240 
241 	case CKM_ECDSA:
242 
243 		return (soft_ecc_sign(session_p, pData, ulDataLen,
244 		    pSignature, pulSignatureLen));
245 
246 	case CKM_ECDSA_SHA1:
247 
248 		return (soft_ecc_digest_sign_common(session_p, pData, ulDataLen,
249 		    pSignature, pulSignatureLen, B_FALSE));
250 
251 	default:
252 		return (CKR_MECHANISM_INVALID);
253 	}
254 }
255 
256 
257 /*
258  * soft_sign_update()
259  *
260  * Arguments:
261  *      session_p:	pointer to soft_session_t struct
262  *      pPart:		pointer to the input data to be signed
263  *      ulPartLen:	length of the input data
264  *
265  * Description:
266  *      called by C_SignUpdate(). This function calls the corresponding
267  *	sign update routine based on the mechanism.
268  *
269  */
270 CK_RV
271 soft_sign_update(soft_session_t *session_p, CK_BYTE_PTR pPart,
272     CK_ULONG ulPartLen)
273 {
274 	CK_MECHANISM_TYPE	mechanism = session_p->sign.mech.mechanism;
275 
276 	switch (mechanism) {
277 
278 	case CKM_SSL3_MD5_MAC:
279 	case CKM_SSL3_SHA1_MAC:
280 	case CKM_MD5_HMAC_GENERAL:
281 	case CKM_MD5_HMAC:
282 	case CKM_SHA_1_HMAC_GENERAL:
283 	case CKM_SHA_1_HMAC:
284 	case CKM_SHA256_HMAC_GENERAL:
285 	case CKM_SHA256_HMAC:
286 	case CKM_SHA384_HMAC_GENERAL:
287 	case CKM_SHA384_HMAC:
288 	case CKM_SHA512_HMAC_GENERAL:
289 	case CKM_SHA512_HMAC:
290 
291 		return (soft_hmac_sign_verify_update(session_p, pPart,
292 		    ulPartLen, B_TRUE));
293 
294 	case CKM_DES_MAC_GENERAL:
295 	case CKM_DES_MAC:
296 
297 		return (soft_des_mac_sign_verify_update(session_p, pPart,
298 		    ulPartLen));
299 
300 	case CKM_AES_CMAC_GENERAL:
301 	case CKM_AES_CMAC:
302 
303 		return (soft_aes_mac_sign_verify_update(session_p, pPart,
304 		    ulPartLen));
305 
306 	case CKM_MD5_RSA_PKCS:
307 	case CKM_SHA1_RSA_PKCS:
308 	case CKM_SHA256_RSA_PKCS:
309 	case CKM_SHA384_RSA_PKCS:
310 	case CKM_SHA512_RSA_PKCS:
311 		/*
312 		 * The MD5/SHA1 digest value is accumulated in the context
313 		 * of the multiple-part digesting operation. In the final
314 		 * operation, the digest is encoded and then perform RSA
315 		 * signing.
316 		 */
317 	case CKM_DSA_SHA1:
318 	case CKM_ECDSA_SHA1:
319 
320 		return (soft_digest_update(session_p, pPart, ulPartLen));
321 
322 	default:
323 		/* PKCS11: The mechanism only supports single-part operation. */
324 		return (CKR_MECHANISM_INVALID);
325 	}
326 }
327 
328 
329 /*
330  * soft_sign_final()
331  *
332  * Arguments:
333  *      session_p:	pointer to soft_session_t struct
334  *      pSignature:	pointer to the signature after signing
335  *      pulSignatureLen: pointer to the	length of the signature
336  *
337  * Description:
338  *      called by C_SignFinal(). This function calls the corresponding
339  *	sign final routine based on the mechanism.
340  *
341  */
342 CK_RV
343 soft_sign_final(soft_session_t *session_p, CK_BYTE_PTR pSignature,
344     CK_ULONG_PTR pulSignatureLen)
345 {
346 
347 	CK_MECHANISM_TYPE mechanism = session_p->sign.mech.mechanism;
348 	CK_RV rv = CKR_OK;
349 
350 	switch (mechanism) {
351 
352 	case CKM_SSL3_MD5_MAC:
353 	case CKM_SSL3_SHA1_MAC:
354 	case CKM_MD5_HMAC_GENERAL:
355 	case CKM_MD5_HMAC:
356 	case CKM_SHA_1_HMAC_GENERAL:
357 	case CKM_SHA_1_HMAC:
358 	case CKM_SHA256_HMAC_GENERAL:
359 	case CKM_SHA256_HMAC:
360 	case CKM_SHA384_HMAC_GENERAL:
361 	case CKM_SHA384_HMAC:
362 	case CKM_SHA512_HMAC_GENERAL:
363 	case CKM_SHA512_HMAC:
364 	{
365 		CK_BYTE hmac[SHA512_DIGEST_LENGTH]; /* use the maximum size */
366 
367 		if (pSignature != NULL) {
368 			/* Pass local buffer to avoid overflow */
369 			rv = soft_hmac_sign_verify_common(session_p, NULL,
370 			    0, hmac, pulSignatureLen, B_TRUE);
371 		} else {
372 			/* Pass original pSignature, let callee to handle it. */
373 			rv = soft_hmac_sign_verify_common(session_p, NULL,
374 			    0, pSignature, pulSignatureLen, B_TRUE);
375 		}
376 
377 		if ((rv == CKR_OK) && (pSignature != NULL))
378 			(void) memcpy(pSignature, hmac, *pulSignatureLen);
379 
380 		return (rv);
381 	}
382 	case CKM_DES_MAC_GENERAL:
383 	case CKM_DES_MAC:
384 	{
385 		CK_BYTE signature[DES_BLOCK_LEN]; /* use the maximum size */
386 
387 		if (pSignature != NULL) {
388 			/* Pass local buffer to avoid overflow. */
389 			rv = soft_des_sign_verify_common(session_p, NULL, 0,
390 			    signature, pulSignatureLen, B_TRUE, B_TRUE);
391 		} else {
392 			/* Pass NULL, let callee to handle it. */
393 			rv = soft_des_sign_verify_common(session_p, NULL, 0,
394 			    NULL, pulSignatureLen, B_TRUE, B_TRUE);
395 		}
396 
397 		if ((rv == CKR_OK) && (pSignature != NULL))
398 			(void) memcpy(pSignature, signature, *pulSignatureLen);
399 
400 		return (rv);
401 	}
402 	case CKM_AES_CMAC_GENERAL:
403 	case CKM_AES_CMAC:
404 	{
405 		CK_BYTE signature[AES_BLOCK_LEN]; /* use the maximum size */
406 
407 		if (pSignature != NULL) {
408 			/* Pass local buffer to avoid overflow. */
409 			rv = soft_aes_sign_verify_common(session_p, NULL, 0,
410 			    signature, pulSignatureLen, B_TRUE, B_TRUE);
411 		} else {
412 			/* Pass NULL, let callee handle it. */
413 			rv = soft_aes_sign_verify_common(session_p, NULL, 0,
414 			    NULL, pulSignatureLen, B_TRUE, B_TRUE);
415 		}
416 
417 		if ((rv == CKR_OK) && (pSignature != NULL))
418 			(void) memcpy(pSignature, signature, *pulSignatureLen);
419 
420 		return (rv);
421 	}
422 	case CKM_MD5_RSA_PKCS:
423 	case CKM_SHA1_RSA_PKCS:
424 	case CKM_SHA256_RSA_PKCS:
425 	case CKM_SHA384_RSA_PKCS:
426 	case CKM_SHA512_RSA_PKCS:
427 
428 		return (soft_rsa_digest_sign_common(session_p, NULL, 0,
429 		    pSignature, pulSignatureLen, mechanism, B_TRUE));
430 
431 	case CKM_DSA_SHA1:
432 
433 		return (soft_dsa_digest_sign_common(session_p, NULL, 0,
434 		    pSignature, pulSignatureLen, B_TRUE));
435 
436 	case CKM_ECDSA_SHA1:
437 
438 		return (soft_ecc_digest_sign_common(session_p, NULL, 0,
439 		    pSignature, pulSignatureLen, B_TRUE));
440 
441 	default:
442 		/* PKCS11: The mechanism only supports single-part operation. */
443 		return (CKR_MECHANISM_INVALID);
444 	}
445 }
446 
447 
448 CK_RV
449 soft_sign_recover_init(soft_session_t *session_p, CK_MECHANISM_PTR pMechanism,
450     soft_object_t *key_p)
451 {
452 
453 	switch (pMechanism->mechanism) {
454 
455 	case CKM_RSA_X_509:
456 	case CKM_RSA_PKCS:
457 
458 		return (soft_rsa_sign_verify_init_common(session_p, pMechanism,
459 		    key_p, B_TRUE));
460 
461 	default:
462 		return (CKR_MECHANISM_INVALID);
463 	}
464 }
465 
466 
467 CK_RV
468 soft_sign_recover(soft_session_t *session_p, CK_BYTE_PTR pData,
469     CK_ULONG ulDataLen, CK_BYTE_PTR pSignature,
470     CK_ULONG_PTR pulSignatureLen)
471 {
472 
473 	CK_MECHANISM_TYPE mechanism = session_p->sign.mech.mechanism;
474 
475 	switch (mechanism) {
476 
477 	case CKM_RSA_X_509:
478 	case CKM_RSA_PKCS:
479 
480 		return (soft_rsa_sign_common(session_p, pData, ulDataLen,
481 		    pSignature, pulSignatureLen, mechanism));
482 
483 	default:
484 		return (CKR_MECHANISM_INVALID);
485 	}
486 }
487 
488 /*
489  * This function frees the allocated active crypto context.
490  * It is only called by the first tier of sign/verify routines
491  * and the caller of this function may or may not hold the session mutex.
492  */
493 void
494 soft_sign_verify_cleanup(soft_session_t *session_p, boolean_t sign,
495     boolean_t lock_held)
496 {
497 
498 	crypto_active_op_t *active_op;
499 	boolean_t lock_true = B_TRUE;
500 
501 	if (!lock_held)
502 		(void) pthread_mutex_lock(&session_p->session_mutex);
503 
504 	active_op = (sign) ? &(session_p->sign) : &(session_p->verify);
505 
506 	switch (active_op->mech.mechanism) {
507 
508 	case CKM_MD5_RSA_PKCS:
509 	case CKM_SHA1_RSA_PKCS:
510 	case CKM_SHA256_RSA_PKCS:
511 	case CKM_SHA384_RSA_PKCS:
512 	case CKM_SHA512_RSA_PKCS:
513 		if (session_p->digest.context != NULL) {
514 			free(session_p->digest.context);
515 			session_p->digest.context = NULL;
516 			session_p->digest.flags = 0;
517 		}
518 		/* FALLTHRU */
519 
520 	case CKM_RSA_PKCS:
521 	case CKM_RSA_X_509:
522 	{
523 		soft_rsa_ctx_t *rsa_ctx =
524 		    (soft_rsa_ctx_t *)active_op->context;
525 
526 		if (rsa_ctx != NULL && rsa_ctx->key != NULL) {
527 			soft_cleanup_object(rsa_ctx->key);
528 			free(rsa_ctx->key);
529 		}
530 		break;
531 
532 	}
533 	case CKM_DSA_SHA1:
534 		if (session_p->digest.context != NULL) {
535 			free(session_p->digest.context);
536 			session_p->digest.context = NULL;
537 			session_p->digest.flags = 0;
538 		}
539 
540 		/* FALLTHRU */
541 	case CKM_DSA:
542 	{
543 		soft_dsa_ctx_t *dsa_ctx =
544 		    (soft_dsa_ctx_t *)active_op->context;
545 
546 		if (dsa_ctx != NULL && dsa_ctx->key != NULL) {
547 			soft_cleanup_object(dsa_ctx->key);
548 			free(dsa_ctx->key);
549 		}
550 		break;
551 
552 	}
553 	case CKM_SSL3_MD5_MAC:
554 	case CKM_SSL3_SHA1_MAC:
555 	case CKM_MD5_HMAC_GENERAL:
556 	case CKM_MD5_HMAC:
557 	case CKM_SHA_1_HMAC_GENERAL:
558 	case CKM_SHA_1_HMAC:
559 	case CKM_SHA256_HMAC_GENERAL:
560 	case CKM_SHA256_HMAC:
561 	case CKM_SHA384_HMAC_GENERAL:
562 	case CKM_SHA384_HMAC:
563 	case CKM_SHA512_HMAC_GENERAL:
564 	case CKM_SHA512_HMAC:
565 		if (active_op->context != NULL)
566 			bzero(active_op->context, sizeof (soft_hmac_ctx_t));
567 		break;
568 	case CKM_DES_MAC_GENERAL:
569 	case CKM_DES_MAC:
570 		if (session_p->encrypt.context != NULL) {
571 			free(session_p->encrypt.context);
572 			session_p->encrypt.context = NULL;
573 			session_p->encrypt.flags = 0;
574 		}
575 		if (active_op->context != NULL)
576 			bzero(active_op->context, sizeof (soft_des_ctx_t));
577 		break;
578 
579 	case CKM_AES_CMAC_GENERAL:
580 	case CKM_AES_CMAC:
581 		if (session_p->encrypt.context != NULL) {
582 			free(session_p->encrypt.context);
583 			session_p->encrypt.context = NULL;
584 			session_p->encrypt.flags = 0;
585 		}
586 		if (active_op->context != NULL)
587 			bzero(active_op->context, sizeof (soft_aes_ctx_t));
588 		break;
589 
590 	}
591 
592 	if (active_op->context != NULL) {
593 		free(active_op->context);
594 		active_op->context = NULL;
595 	}
596 
597 	active_op->flags = 0;
598 
599 	if (!lock_held)
600 		SES_REFRELE(session_p, lock_true);
601 }
602