fixup .text where possible
7127  remove -Wno-missing-braces from Makefile.uts

   1 /*
   2  * CDDL HEADER START
   3  *
   4  * The contents of this file are subject to the terms of the
   5  * Common Development and Distribution License (the "License").
   6  * You may not use this file except in compliance with the License.
   7  *
   8  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
   9  * or http://www.opensolaris.org/os/licensing.
  10  * See the License for the specific language governing permissions
  11  * and limitations under the License.
  12  *
  13  * When distributing Covered Code, include this CDDL HEADER in each
  14  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
  15  * If applicable, add the following below this CDDL HEADER, with the
  16  * fields enclosed by brackets "[]" replaced with your own identifying
  17  * information: Portions Copyright [yyyy] [name of copyright owner]
  18  *
  19  * CDDL HEADER END
  20  */
  21 /*
  22  * Copyright 2010 Sun Microsystems, Inc.  All rights reserved.
  23  * Use is subject to license terms.
  24  */
  25 /*
  26  * Copyright 2010 Nexenta Systems, Inc.  All rights reserved.
  27  */
  28 
  29 #include <sys/types.h>
  30 #include <sys/systm.h>
  31 #include <sys/param.h>
  32 #include <sys/modctl.h>
  33 #include <sys/ddi.h>
  34 #include <sys/crypto/spi.h>
  35 #include <sys/crypto/impl.h>
  36 #include <sys/crypto/ioctladmin.h>
  37 #include <sys/sysmacros.h>
  38 #include <sys/strsun.h>
  39 #include <sys/sha1.h>
  40 #include <sys/random.h>
  41 #include <sys/conf.h>
  42 #include <sys/devops.h>
  43 #include <sys/sunddi.h>
  44 #include <sys/varargs.h>
  45 #include <sys/kmem.h>
  46 #include <sys/kstat.h>
  47 
  48 #include <des/des_impl.h>
  49 #include <ecc/ecc_impl.h>
  50 
  51 #define CKD_NULL                0x00000001
  52 
  53 extern struct mod_ops mod_cryptoops;
  54 
  55 /*
  56  * Module linkage information for the kernel.
  57  */
  58 static struct modlcrypto modlcrypto = {
  59         &mod_cryptoops,
  60         "EC Kernel SW Provider"
  61 };
  62 
  63 static struct modlinkage modlinkage = {
  64         MODREV_1,
  65         {   (void *)&modlcrypto,
  66             NULL }
  67 };
  68 
  69 /*
  70  * CSPI information (entry points, provider info, etc.)
  71  */
  72 typedef enum ecc_mech_type {
  73         EC_KEY_PAIR_GEN_MECH_INFO_TYPE, /* SUN_CKM_EC_KEY_PAIR_GEN */
  74         ECDSA_MECH_INFO_TYPE,           /* SUN_CKM_ECDSA */
  75         ECDSA_SHA1_MECH_INFO_TYPE,      /* SUN_CKM_ECDSA_SHA1 */
  76         ECDH1_DERIVE_MECH_INFO_TYPE     /* SUN_CKM_ECDH1_DERIVE */
  77 } ecc_mech_type_t;
  78 
  79 /*
  80  * Context for ECDSA mechanism.
  81  */
  82 typedef struct ecc_ctx {
  83         ecc_mech_type_t mech_type;
  84         crypto_key_t *key;
  85         size_t keychunk_size;
  86         ECParams ecparams;
  87 } ecc_ctx_t;
  88 
  89 /*
  90  * Context for ECDSA_SHA1 mechanism.
  91  */
  92 typedef struct digest_ecc_ctx {
  93         ecc_mech_type_t mech_type;
  94         crypto_key_t *key;
  95         size_t keychunk_size;
  96         ECParams ecparams;
  97         union {
  98                 SHA1_CTX sha1ctx;
  99         } dctx_u;
 100 } digest_ecc_ctx_t;
 101 
 102 #define sha1_ctx        dctx_u.sha1ctx
 103 
 104 /*
 105  * Mechanism info structure passed to KCF during registration.
 106  */
 107 static crypto_mech_info_t ecc_mech_info_tab[] = {
 108         /* EC_KEY_PAIR_GEN */
 109         {SUN_CKM_EC_KEY_PAIR_GEN, EC_KEY_PAIR_GEN_MECH_INFO_TYPE,
 110             CRYPTO_FG_GENERATE_KEY_PAIR, EC_MIN_KEY_LEN, EC_MAX_KEY_LEN,
 111             CRYPTO_KEYSIZE_UNIT_IN_BITS},
 112         /* ECDH */
 113         {SUN_CKM_ECDH1_DERIVE, ECDH1_DERIVE_MECH_INFO_TYPE, CRYPTO_FG_DERIVE,
 114             EC_MIN_KEY_LEN, EC_MAX_KEY_LEN, CRYPTO_KEYSIZE_UNIT_IN_BITS},
 115         /* ECDSA */
 116         {SUN_CKM_ECDSA, ECDSA_MECH_INFO_TYPE,
 117             CRYPTO_FG_SIGN | CRYPTO_FG_VERIFY |
 118             CRYPTO_FG_SIGN_ATOMIC | CRYPTO_FG_VERIFY_ATOMIC,
 119             EC_MIN_KEY_LEN, EC_MAX_KEY_LEN, CRYPTO_KEYSIZE_UNIT_IN_BITS},
 120         /* ECDSA_SHA1 */
 121         {SUN_CKM_ECDSA_SHA1, ECDSA_SHA1_MECH_INFO_TYPE,
 122             CRYPTO_FG_SIGN | CRYPTO_FG_VERIFY |
 123             CRYPTO_FG_SIGN_ATOMIC | CRYPTO_FG_VERIFY_ATOMIC,
 124             EC_MIN_KEY_LEN, EC_MAX_KEY_LEN, CRYPTO_KEYSIZE_UNIT_IN_BITS}
 125 };
 126 
 127 static void ecc_provider_status(crypto_provider_handle_t, uint_t *);
 128 
 129 static crypto_control_ops_t ecc_control_ops = {
 130         ecc_provider_status
 131 };
 132 
 133 static int ecc_sign_init(crypto_ctx_t *, crypto_mechanism_t *,
 134     crypto_key_t *, crypto_spi_ctx_template_t, crypto_req_handle_t);
 135 static int ecc_sign(crypto_ctx_t *, crypto_data_t *, crypto_data_t *,
 136     crypto_req_handle_t);
 137 static int ecc_sign_update(crypto_ctx_t *, crypto_data_t *,
 138     crypto_req_handle_t);
 139 static int ecc_sign_final(crypto_ctx_t *, crypto_data_t *,
 140     crypto_req_handle_t);
 141 static int ecc_sign_atomic(crypto_provider_handle_t, crypto_session_id_t,
 142     crypto_mechanism_t *, crypto_key_t *, crypto_data_t *, crypto_data_t *,
 143     crypto_spi_ctx_template_t, crypto_req_handle_t);
 144 
 145 static crypto_sign_ops_t ecc_sign_ops = {
 146         ecc_sign_init,
 147         ecc_sign,
 148         ecc_sign_update,
 149         ecc_sign_final,
 150         ecc_sign_atomic,
 151         NULL,
 152         NULL,
 153         NULL
 154 };
 155 
 156 static int ecc_verify_init(crypto_ctx_t *, crypto_mechanism_t *,
 157     crypto_key_t *, crypto_spi_ctx_template_t, crypto_req_handle_t);
 158 static int ecc_verify(crypto_ctx_t *, crypto_data_t *, crypto_data_t *,
 159     crypto_req_handle_t);
 160 static int ecc_verify_update(crypto_ctx_t *, crypto_data_t *,
 161     crypto_req_handle_t);
 162 static int ecc_verify_final(crypto_ctx_t *, crypto_data_t *,
 163     crypto_req_handle_t);
 164 static int ecc_verify_atomic(crypto_provider_handle_t, crypto_session_id_t,
 165     crypto_mechanism_t *, crypto_key_t *, crypto_data_t *,
 166     crypto_data_t *, crypto_spi_ctx_template_t, crypto_req_handle_t);
 167 
 168 static crypto_verify_ops_t ecc_verify_ops = {
 169         ecc_verify_init,
 170         ecc_verify,
 171         ecc_verify_update,
 172         ecc_verify_final,
 173         ecc_verify_atomic,
 174         NULL,
 175         NULL,
 176         NULL
 177 };
 178 
 179 static int ecc_nostore_key_generate_pair(crypto_provider_handle_t,
 180     crypto_session_id_t, crypto_mechanism_t *, crypto_object_attribute_t *,
 181     uint_t, crypto_object_attribute_t *, uint_t, crypto_object_attribute_t *,
 182     uint_t, crypto_object_attribute_t *, uint_t, crypto_req_handle_t);
 183 static int ecc_nostore_key_derive(crypto_provider_handle_t,
 184     crypto_session_id_t, crypto_mechanism_t *, crypto_key_t *,
 185     crypto_object_attribute_t *, uint_t, crypto_object_attribute_t *,
 186     uint_t, crypto_req_handle_t);
 187 
 188 static crypto_nostore_key_ops_t ecc_nostore_key_ops = {
 189         NULL,
 190         ecc_nostore_key_generate_pair,
 191         ecc_nostore_key_derive
 192 };
 193 
 194 static crypto_ops_t ecc_crypto_ops = {{{{{{
 195                                 &ecc_control_ops,
 196                                 NULL,
 197                                 NULL,
 198                                 NULL,
 199                                 &ecc_sign_ops,
 200                                 &ecc_verify_ops,
 201                                 NULL,
 202                                 NULL,
 203                                 NULL,
 204                                 NULL,
 205                                 NULL,
 206                                 NULL,
 207                                 NULL,
 208                                 NULL }, /* cou_v1 */
 209                         NULL },         /* cou_v2 */
 210                 &ecc_nostore_key_ops },     /* cou_v3 */
 211         NULL },                         /* cou_v4 */
 212 }};
 213 
 214 static crypto_provider_info_t ecc_prov_info = {{{{
 215         CRYPTO_SPI_VERSION_4,
 216         "EC Software Provider",
 217         CRYPTO_SW_PROVIDER,
 218         {&modlinkage},
 219         NULL,
 220         &ecc_crypto_ops,
 221         sizeof (ecc_mech_info_tab)/sizeof (crypto_mech_info_t),
 222         ecc_mech_info_tab
 223 }}}};
 224 
 225 static crypto_kcf_provider_handle_t ecc_prov_handle = NULL;
 226 
 227 static int ecc_sign_common(ecc_ctx_t *, crypto_data_t *, crypto_data_t *,
 228     crypto_req_handle_t);
 229 static int ecc_verify_common(ecc_ctx_t *, crypto_data_t *, crypto_data_t *,
 230     crypto_req_handle_t);
 231 static int find_attr(crypto_object_attribute_t *, uint_t, uint64_t);
 232 static int get_template_attr_ulong(crypto_object_attribute_t *,
 233     uint_t, uint64_t, ulong_t *);
 234 static void ecc_free_context(crypto_ctx_t *);
 235 static void free_ecparams(ECParams *, boolean_t);
 236 static void free_ecprivkey(ECPrivateKey *);
 237 
 238 int
 239 _init(void)
 240 {
 241         int ret;
 242 
 243         if ((ret = mod_install(&modlinkage)) != 0)
 244                 return (ret);
 245 
 246         /* Register with KCF.  If the registration fails, remove the module. */
 247         if (crypto_register_provider(&ecc_prov_info, &ecc_prov_handle)) {
 248                 (void) mod_remove(&modlinkage);
 249                 return (EACCES);
 250         }
 251 
 252         return (0);
 253 }
 254 
 255 int
 256 _fini(void)
 257 {
 258         /* Unregister from KCF if module is registered */
 259         if (ecc_prov_handle != NULL) {
 260                 if (crypto_unregister_provider(ecc_prov_handle))
 261                         return (EBUSY);
 262 
 263                 ecc_prov_handle = NULL;
 264         }
 265 
 266         return (mod_remove(&modlinkage));
 267 }
 268 
 269 int
 270 _info(struct modinfo *modinfop)
 271 {
 272         return (mod_info(&modlinkage, modinfop));
 273 }
 274 
 275 /* ARGSUSED */
 276 static void
 277 ecc_provider_status(crypto_provider_handle_t provider, uint_t *status)
 278 {
 279         *status = CRYPTO_PROVIDER_READY;
 280 }
 281 
 282 /*
 283  * Return the index of an attribute of specified type found in
 284  * the specified array of attributes. If the attribute cannot
 285  * found, return -1.
 286  */
 287 static int
 288 find_attr(crypto_object_attribute_t *attr, uint_t nattr, uint64_t attr_type)
 289 {
 290         int i;
 291 
 292         for (i = 0; i < nattr; i++)
 293                 if (attr[i].oa_value != NULL && attr[i].oa_type == attr_type)
 294                         return (i);
 295         return (-1);
 296 }
 297 
 298 /*
 299  * Common function used by the get_template_attr_*() family of
 300  * functions. Returns the value of the specified attribute of specified
 301  * length. Returns CRYPTO_SUCCESS on success, CRYPTO_ATTRIBUTE_VALUE_INVALID
 302  * if the length of the attribute does not match the specified length,
 303  * or CRYPTO_ARGUMENTS_BAD if the attribute cannot be found.
 304  */
 305 static int
 306 get_template_attr_scalar_common(crypto_object_attribute_t *template,
 307     uint_t nattr, uint64_t attr_type, void *value, size_t value_len)
 308 {
 309         size_t oa_value_len;
 310         size_t offset = 0;
 311         int attr_idx;
 312 
 313         if ((attr_idx = find_attr(template, nattr, attr_type)) == -1)
 314                 return (CRYPTO_ARGUMENTS_BAD);
 315 
 316         oa_value_len = template[attr_idx].oa_value_len;
 317         if (oa_value_len != value_len) {
 318                 return (CRYPTO_ATTRIBUTE_VALUE_INVALID);
 319         }
 320 
 321 do_copy:
 322         bcopy(template[attr_idx].oa_value, (uchar_t *)value + offset,
 323             oa_value_len);
 324 
 325         return (CRYPTO_SUCCESS);
 326 }
 327 
 328 /*
 329  * Get the value of a ulong_t attribute from the specified template.
 330  */
 331 static int
 332 get_template_attr_ulong(crypto_object_attribute_t *template,
 333     uint_t nattr, uint64_t attr_type, ulong_t *attr_value)
 334 {
 335         return (get_template_attr_scalar_common(template, nattr,
 336             attr_type, attr_value, sizeof (ulong_t)));
 337 }
 338 
 339 /*
 340  * Called from init routines to do basic sanity checks. Init routines,
 341  * e.g. sign_init should fail rather than subsequent operations.
 342  */
 343 static int
 344 check_mech_and_key(ecc_mech_type_t mech_type, crypto_key_t *key, ulong_t class)
 345 {
 346         int rv = CRYPTO_SUCCESS;
 347         uchar_t *foo;
 348         ssize_t point_len;
 349         ssize_t value_len;
 350 
 351         if (mech_type != ECDSA_SHA1_MECH_INFO_TYPE &&
 352             mech_type != ECDSA_MECH_INFO_TYPE)
 353                 return (CRYPTO_MECHANISM_INVALID);
 354 
 355         if (key->ck_format != CRYPTO_KEY_ATTR_LIST) {
 356                 return (CRYPTO_KEY_TYPE_INCONSISTENT);
 357         }
 358 
 359         switch (class) {
 360         case CKO_PUBLIC_KEY:
 361                 if ((rv = crypto_get_key_attr(key, CKA_EC_POINT, &foo,
 362                     &point_len)) != CRYPTO_SUCCESS) {
 363                         return (CRYPTO_TEMPLATE_INCOMPLETE);
 364                 }
 365                 if (point_len < CRYPTO_BITS2BYTES(EC_MIN_KEY_LEN) * 2 + 1 ||
 366                     point_len > CRYPTO_BITS2BYTES(EC_MAX_KEY_LEN) * 2 + 1)
 367                         return (CRYPTO_KEY_SIZE_RANGE);
 368                 break;
 369 
 370         case CKO_PRIVATE_KEY:
 371                 if ((rv = crypto_get_key_attr(key, CKA_VALUE, &foo,
 372                     &value_len)) != CRYPTO_SUCCESS) {
 373                         return (CRYPTO_TEMPLATE_INCOMPLETE);
 374                 }
 375                 if (value_len < CRYPTO_BITS2BYTES(EC_MIN_KEY_LEN) ||
 376                     value_len > CRYPTO_BITS2BYTES(EC_MAX_KEY_LEN))
 377                         return (CRYPTO_KEY_SIZE_RANGE);
 378                 break;
 379 
 380         default:
 381                 return (CRYPTO_TEMPLATE_INCONSISTENT);
 382         }
 383 
 384         return (rv);
 385 }
 386 
 387 /*
 388  * This function guarantees to return non-zero random numbers.
 389  * This is needed as the /dev/urandom kernel interface,
 390  * random_get_pseudo_bytes(), may return zeros.
 391  */
 392 int
 393 ecc_knzero_random_generator(uint8_t *ran_out, size_t ran_len)
 394 {
 395         int rv;
 396         size_t ebc = 0; /* count of extra bytes in extrarand */
 397         size_t i = 0;
 398         uint8_t extrarand[32];
 399         size_t extrarand_len;
 400 
 401         if ((rv = random_get_pseudo_bytes(ran_out, ran_len)) != 0)
 402                 return (rv);
 403 
 404         /*
 405          * Walk through the returned random numbers pointed by ran_out,
 406          * and look for any random number which is zero.
 407          * If we find zero, call random_get_pseudo_bytes() to generate
 408          * another 32 random numbers pool. Replace any zeros in ran_out[]
 409          * from the random number in pool.
 410          */
 411         while (i < ran_len) {
 412                 if (ran_out[i] != 0) {
 413                         i++;
 414                         continue;
 415                 }
 416 
 417                 /*
 418                  * Note that it is 'while' so we are guaranteed a
 419                  * non-zero value on exit.
 420                  */
 421                 if (ebc == 0) {
 422                         /* refresh extrarand */
 423                         extrarand_len = sizeof (extrarand);
 424                         if ((rv = random_get_pseudo_bytes(extrarand,
 425                             extrarand_len)) != 0) {
 426                                 return (rv);
 427                         }
 428 
 429                         ebc = extrarand_len;
 430                 }
 431                 /* Replace zero with byte from extrarand. */
 432                 -- ebc;
 433 
 434                 /*
 435                  * The new random byte zero/non-zero will be checked in
 436                  * the next pass through the loop.
 437                  */
 438                 ran_out[i] = extrarand[ebc];
 439         }
 440 
 441         return (CRYPTO_SUCCESS);
 442 }
 443 
 444 static void
 445 ecc_free_context(crypto_ctx_t *ctx)
 446 {
 447         ecc_ctx_t *ctxp = ctx->cc_provider_private;
 448 
 449         if (ctxp != NULL) {
 450                 bzero(ctxp->key, ctxp->keychunk_size);
 451                 kmem_free(ctxp->key, ctxp->keychunk_size);
 452 
 453                 free_ecparams(&ctxp->ecparams, B_FALSE);
 454 
 455                 if (ctxp->mech_type == ECDSA_MECH_INFO_TYPE)
 456                         kmem_free(ctxp, sizeof (ecc_ctx_t));
 457                 else
 458                         kmem_free(ctxp, sizeof (digest_ecc_ctx_t));
 459 
 460                 ctx->cc_provider_private = NULL;
 461         }
 462 }
 463 
 464 /* ARGSUSED */
 465 static int
 466 ecc_sign_verify_common_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism,
 467     crypto_key_t *key, crypto_spi_ctx_template_t ctx_template,
 468     crypto_req_handle_t req)
 469 {
 470         int rv;
 471         int kmflag;
 472         ecc_ctx_t *ctxp;
 473         digest_ecc_ctx_t *dctxp;
 474         ecc_mech_type_t mech_type = mechanism->cm_type;
 475         uchar_t *params;
 476         ssize_t params_len;
 477         ECParams  *ecparams;
 478         SECKEYECParams params_item;
 479 
 480         if (crypto_get_key_attr(key, CKA_EC_PARAMS, (void *) &params,
 481             &params_len)) {
 482                 return (CRYPTO_ARGUMENTS_BAD);
 483         }
 484 
 485         /* ASN1 check */
 486         if (params[0] != 0x06 ||
 487             params[1] != params_len - 2) {
 488                 return (CRYPTO_ATTRIBUTE_VALUE_INVALID);
 489         }
 490         params_item.data = params;
 491         params_item.len = (uint_t)params_len;
 492         kmflag = crypto_kmflag(req);
 493         if (EC_DecodeParams(&params_item, &ecparams, kmflag) != SECSuccess) {
 494                 /* bad curve OID */
 495                 return (CRYPTO_ARGUMENTS_BAD);
 496         }
 497 
 498         /*
 499          * Allocate an ECC context.
 500          */
 501         switch (mech_type) {
 502         case ECDSA_SHA1_MECH_INFO_TYPE:
 503                 dctxp = kmem_zalloc(sizeof (digest_ecc_ctx_t), kmflag);
 504                 ctxp = (ecc_ctx_t *)dctxp;
 505                 break;
 506         default:
 507                 ctxp = kmem_zalloc(sizeof (ecc_ctx_t), kmflag);
 508                 break;
 509         }
 510 
 511         if (ctxp == NULL) {
 512                 free_ecparams(ecparams, B_TRUE);
 513                 return (CRYPTO_HOST_MEMORY);
 514         }
 515 
 516         if ((rv = crypto_copy_key_to_ctx(key, &ctxp->key, &ctxp->keychunk_size,
 517             kmflag)) != CRYPTO_SUCCESS) {
 518                 switch (mech_type) {
 519                 case ECDSA_SHA1_MECH_INFO_TYPE:
 520                         kmem_free(dctxp, sizeof (digest_ecc_ctx_t));
 521                         break;
 522                 default:
 523                         kmem_free(ctxp, sizeof (ecc_ctx_t));
 524                         break;
 525                 }
 526                 free_ecparams(ecparams, B_TRUE);
 527                 return (rv);
 528         }
 529         ctxp->mech_type = mech_type;
 530         ctxp->ecparams = *ecparams;
 531         kmem_free(ecparams, sizeof (ECParams));
 532 
 533         switch (mech_type) {
 534         case ECDSA_SHA1_MECH_INFO_TYPE:
 535                 SHA1Init(&(dctxp->sha1_ctx));
 536                 break;
 537         }
 538 
 539         ctx->cc_provider_private = ctxp;
 540 
 541         return (CRYPTO_SUCCESS);
 542 }
 543 
 544 /* ARGSUSED */
 545 static int
 546 ecc_sign_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism,
 547     crypto_key_t *key, crypto_spi_ctx_template_t ctx_template,
 548     crypto_req_handle_t req)
 549 {
 550         int rv;
 551 
 552         ecc_mech_type_t mech_type = mechanism->cm_type;
 553 
 554         if ((rv = check_mech_and_key(mech_type, key,
 555             CKO_PRIVATE_KEY)) != CRYPTO_SUCCESS)
 556                 return (rv);
 557 
 558         rv = ecc_sign_verify_common_init(ctx, mechanism, key,
 559             ctx_template, req);
 560 
 561         return (rv);
 562 }
 563 
 564 /* ARGSUSED */
 565 static int
 566 ecc_verify_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism,
 567     crypto_key_t *key, crypto_spi_ctx_template_t ctx_template,
 568     crypto_req_handle_t req)
 569 {
 570         int rv;
 571 
 572         ecc_mech_type_t mech_type = mechanism->cm_type;
 573 
 574         if ((rv = check_mech_and_key(mech_type, key,
 575             CKO_PUBLIC_KEY)) != CRYPTO_SUCCESS)
 576                 return (rv);
 577 
 578         rv = ecc_sign_verify_common_init(ctx, mechanism, key,
 579             ctx_template, req);
 580 
 581         return (rv);
 582 }
 583 
 584 #define SHA1_DIGEST_SIZE 20
 585 
 586 #define INIT_RAW_CRYPTO_DATA(data, base, len, cd_len)   \
 587         (data).cd_format = CRYPTO_DATA_RAW;             \
 588         (data).cd_offset = 0;                           \
 589         (data).cd_raw.iov_base = (char *)base;          \
 590         (data).cd_raw.iov_len = len;                    \
 591         (data).cd_length = cd_len;
 592 
 593 static int
 594 ecc_digest_svrfy_common(digest_ecc_ctx_t *ctxp, crypto_data_t *data,
 595     crypto_data_t *signature, uchar_t flag, crypto_req_handle_t req)
 596 {
 597         int rv = CRYPTO_FAILED;
 598         uchar_t digest[SHA1_DIGEST_LENGTH];
 599         crypto_data_t der_cd;
 600         ecc_mech_type_t mech_type;
 601 
 602         ASSERT(flag & CRYPTO_DO_SIGN || flag & CRYPTO_DO_VERIFY);
 603         ASSERT(data != NULL || (flag & CRYPTO_DO_FINAL));
 604 
 605         mech_type = ctxp->mech_type;
 606         if (mech_type != ECDSA_SHA1_MECH_INFO_TYPE)
 607                 return (CRYPTO_MECHANISM_INVALID);
 608 
 609         /* Don't digest if only returning length of signature. */
 610         if (signature->cd_length > 0) {
 611                 if (mech_type == ECDSA_SHA1_MECH_INFO_TYPE) {
 612                         rv = crypto_digest_data(data, &(ctxp->sha1_ctx),
 613                             digest, (void (*)())SHA1Update,
 614                             (void (*)())SHA1Final, flag | CRYPTO_DO_SHA1);
 615                         if (rv != CRYPTO_SUCCESS)
 616                                 return (rv);
 617                 }
 618         }
 619 
 620         INIT_RAW_CRYPTO_DATA(der_cd, digest, SHA1_DIGEST_SIZE,
 621             SHA1_DIGEST_SIZE);
 622 
 623         if (flag & CRYPTO_DO_SIGN) {
 624                 rv = ecc_sign_common((ecc_ctx_t *)ctxp, &der_cd, signature,
 625                     req);
 626         } else
 627                 rv = ecc_verify_common((ecc_ctx_t *)ctxp, &der_cd, signature,
 628                     req);
 629 
 630         return (rv);
 631 }
 632 
 633 /*
 634  * This is a single-part signing routine. It does not
 635  * compute a hash before signing.
 636  */
 637 static int
 638 ecc_sign_common(ecc_ctx_t *ctx, crypto_data_t *data, crypto_data_t *signature,
 639     crypto_req_handle_t req)
 640 {
 641         int rv = CRYPTO_FAILED;
 642         SECStatus ss;
 643         uchar_t *param;
 644         uchar_t *private;
 645         ssize_t param_len;
 646         ssize_t private_len;
 647         uchar_t tmp_data[EC_MAX_DIGEST_LEN];
 648         uchar_t signed_data[EC_MAX_SIG_LEN];
 649         ECPrivateKey ECkey;
 650         SECItem signature_item;
 651         SECItem digest_item;
 652         crypto_key_t *key = ctx->key;
 653         int kmflag;
 654 
 655         if ((rv = crypto_get_key_attr(key, CKA_EC_PARAMS, &param,
 656             &param_len)) != CRYPTO_SUCCESS) {
 657                 return (rv);
 658         }
 659 
 660         if (data->cd_length > sizeof (tmp_data))
 661                 return (CRYPTO_DATA_LEN_RANGE);
 662 
 663         if ((rv = crypto_get_input_data(data, &digest_item.data, tmp_data))
 664             != CRYPTO_SUCCESS) {
 665                 return (rv);
 666         }
 667         digest_item.len = data->cd_length;
 668 
 669         /* structure assignment */
 670         ECkey.ecParams = ctx->ecparams;
 671 
 672         if ((rv = crypto_get_key_attr(key, CKA_VALUE, &private,
 673             &private_len)) != CRYPTO_SUCCESS) {
 674                 return (rv);
 675         }
 676         ECkey.privateValue.data = private;
 677         ECkey.privateValue.len = (uint_t)private_len;
 678 
 679         signature_item.data = signed_data;
 680         signature_item.len = sizeof (signed_data);
 681 
 682         kmflag = crypto_kmflag(req);
 683         if ((ss = ECDSA_SignDigest(&ECkey, &signature_item, &digest_item,
 684             kmflag)) != SECSuccess) {
 685                 if (ss == SECBufferTooSmall)
 686                         return (CRYPTO_BUFFER_TOO_SMALL);
 687 
 688                 return (CRYPTO_FAILED);
 689         }
 690 
 691         if (rv == CRYPTO_SUCCESS) {
 692                 /* copy out the signature */
 693                 if ((rv = crypto_put_output_data(signed_data,
 694                     signature, signature_item.len)) != CRYPTO_SUCCESS)
 695                         return (rv);
 696 
 697                 signature->cd_length = signature_item.len;
 698         }
 699 
 700         return (rv);
 701 }
 702 
 703 /* ARGSUSED */
 704 static int
 705 ecc_sign(crypto_ctx_t *ctx, crypto_data_t *data, crypto_data_t *signature,
 706     crypto_req_handle_t req)
 707 {
 708         int rv;
 709         ecc_ctx_t *ctxp;
 710 
 711         ASSERT(ctx->cc_provider_private != NULL);
 712         ctxp = ctx->cc_provider_private;
 713 
 714         switch (ctxp->mech_type) {
 715         case ECDSA_SHA1_MECH_INFO_TYPE:
 716                 rv = ecc_digest_svrfy_common((digest_ecc_ctx_t *)ctxp, data,
 717                     signature, CRYPTO_DO_SIGN | CRYPTO_DO_UPDATE |
 718                     CRYPTO_DO_FINAL, req);
 719                 break;
 720         default:
 721                 rv = ecc_sign_common(ctxp, data, signature, req);
 722                 break;
 723         }
 724 
 725         if (rv != CRYPTO_BUFFER_TOO_SMALL)
 726                 ecc_free_context(ctx);
 727 
 728         return (rv);
 729 }
 730 
 731 /* ARGSUSED */
 732 static int
 733 ecc_sign_update(crypto_ctx_t *ctx, crypto_data_t *data, crypto_req_handle_t req)
 734 {
 735         int rv;
 736         digest_ecc_ctx_t *ctxp;
 737         ecc_mech_type_t mech_type;
 738 
 739         ASSERT(ctx->cc_provider_private != NULL);
 740         ctxp = ctx->cc_provider_private;
 741         mech_type = ctxp->mech_type;
 742 
 743         if (mech_type == ECDSA_MECH_INFO_TYPE) {
 744                 ecc_free_context(ctx);
 745                 return (CRYPTO_MECHANISM_INVALID);
 746         }
 747 
 748         if (mech_type == ECDSA_SHA1_MECH_INFO_TYPE)
 749                 rv = crypto_digest_data(data, &(ctxp->sha1_ctx), NULL,
 750                     (void (*)())SHA1Update, (void (*)())SHA1Final,
 751                     CRYPTO_DO_SHA1 | CRYPTO_DO_UPDATE);
 752 
 753         if (rv != CRYPTO_SUCCESS)
 754                 ecc_free_context(ctx);
 755 
 756         return (rv);
 757 }
 758 
 759 /* ARGSUSED */
 760 static int
 761 ecc_sign_final(crypto_ctx_t *ctx, crypto_data_t *signature,
 762     crypto_req_handle_t req)
 763 {
 764         int rv;
 765         digest_ecc_ctx_t *ctxp;
 766 
 767         ASSERT(ctx->cc_provider_private != NULL);
 768         ctxp = ctx->cc_provider_private;
 769 
 770         rv = ecc_digest_svrfy_common(ctxp, NULL, signature, CRYPTO_DO_SIGN |
 771             CRYPTO_DO_FINAL, req);
 772         if (rv != CRYPTO_BUFFER_TOO_SMALL)
 773                 ecc_free_context(ctx);
 774 
 775         return (rv);
 776 }
 777 
 778 /* ARGSUSED */
 779 static int
 780 ecc_sign_atomic(crypto_provider_handle_t provider,
 781     crypto_session_id_t session_id, crypto_mechanism_t *mechanism,
 782     crypto_key_t *key, crypto_data_t *data, crypto_data_t *signature,
 783     crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req)
 784 {
 785         int rv;
 786         ecc_mech_type_t mech_type = mechanism->cm_type;
 787         uchar_t *params;
 788         ssize_t params_len;
 789         ECParams  *ecparams;
 790         SECKEYECParams params_item;
 791         int kmflag;
 792 
 793         if ((rv = check_mech_and_key(mech_type, key,
 794             CKO_PRIVATE_KEY)) != CRYPTO_SUCCESS)
 795                 return (rv);
 796 
 797         if (crypto_get_key_attr(key, CKA_EC_PARAMS, (void *) &params,
 798             &params_len)) {
 799                 return (CRYPTO_ARGUMENTS_BAD);
 800         }
 801 
 802         /* ASN1 check */
 803         if (params[0] != 0x06 ||
 804             params[1] != params_len - 2) {
 805                 return (CRYPTO_ATTRIBUTE_VALUE_INVALID);
 806         }
 807         params_item.data = params;
 808         params_item.len = (uint_t)params_len;
 809         kmflag = crypto_kmflag(req);
 810         if (EC_DecodeParams(&params_item, &ecparams, kmflag) != SECSuccess) {
 811                 /* bad curve OID */
 812                 return (CRYPTO_ARGUMENTS_BAD);
 813         }
 814 
 815         if (mechanism->cm_type == ECDSA_MECH_INFO_TYPE) {
 816                 ecc_ctx_t ctx;
 817 
 818                 ctx.mech_type = mech_type;
 819                 /* structure assignment */
 820                 ctx.ecparams = *ecparams;
 821                 ctx.key = key;
 822                 rv = ecc_sign_common(&ctx, data, signature, req);
 823         } else {
 824                 digest_ecc_ctx_t dctx;
 825 
 826                 dctx.mech_type = mech_type;
 827                 /* structure assignment */
 828                 dctx.ecparams = *ecparams;
 829                 dctx.key = key;
 830                 SHA1Init(&(dctx.sha1_ctx));
 831 
 832                 rv = ecc_digest_svrfy_common(&dctx, data, signature,
 833                     CRYPTO_DO_SIGN | CRYPTO_DO_UPDATE | CRYPTO_DO_FINAL, req);
 834         }
 835         free_ecparams(ecparams, B_TRUE);
 836 
 837         return (rv);
 838 }
 839 
 840 static int
 841 ecc_verify_common(ecc_ctx_t *ctx, crypto_data_t *data, crypto_data_t *signature,
 842     crypto_req_handle_t req)
 843 {
 844         int rv = CRYPTO_FAILED;
 845         uchar_t *param;
 846         uchar_t *public;
 847         ssize_t param_len;
 848         ssize_t public_len;
 849         uchar_t tmp_data[EC_MAX_DIGEST_LEN];
 850         uchar_t signed_data[EC_MAX_SIG_LEN];
 851         ECPublicKey ECkey;
 852         SECItem signature_item;
 853         SECItem digest_item;
 854         crypto_key_t *key = ctx->key;
 855         int kmflag;
 856 
 857         if ((rv = crypto_get_key_attr(key, CKA_EC_PARAMS, &param,
 858             &param_len)) != CRYPTO_SUCCESS) {
 859                 return (rv);
 860         }
 861 
 862         if (signature->cd_length > sizeof (signed_data)) {
 863                 return (CRYPTO_SIGNATURE_LEN_RANGE);
 864         }
 865 
 866         if ((rv = crypto_get_input_data(signature, &signature_item.data,
 867             signed_data)) != CRYPTO_SUCCESS) {
 868                 return (rv);
 869         }
 870         signature_item.len = signature->cd_length;
 871 
 872         if (data->cd_length > sizeof (tmp_data))
 873                 return (CRYPTO_DATA_LEN_RANGE);
 874 
 875         if ((rv = crypto_get_input_data(data, &digest_item.data, tmp_data))
 876             != CRYPTO_SUCCESS) {
 877                 return (rv);
 878         }
 879         digest_item.len = data->cd_length;
 880 
 881         /* structure assignment */
 882         ECkey.ecParams = ctx->ecparams;
 883 
 884         if ((rv = crypto_get_key_attr(key, CKA_EC_POINT, &public,
 885             &public_len)) != CRYPTO_SUCCESS) {
 886                 return (rv);
 887         }
 888         ECkey.publicValue.data = public;
 889         ECkey.publicValue.len = (uint_t)public_len;
 890 
 891         kmflag = crypto_kmflag(req);
 892         if (ECDSA_VerifyDigest(&ECkey, &signature_item, &digest_item, kmflag)
 893             != SECSuccess) {
 894                 rv = CRYPTO_SIGNATURE_INVALID;
 895         } else {
 896                 rv = CRYPTO_SUCCESS;
 897         }
 898 
 899         return (rv);
 900 }
 901 
 902 /* ARGSUSED */
 903 static int
 904 ecc_verify(crypto_ctx_t *ctx, crypto_data_t *data, crypto_data_t *signature,
 905     crypto_req_handle_t req)
 906 {
 907         int rv;
 908         ecc_ctx_t *ctxp;
 909 
 910         ASSERT(ctx->cc_provider_private != NULL);
 911         ctxp = ctx->cc_provider_private;
 912 
 913         switch (ctxp->mech_type) {
 914         case ECDSA_SHA1_MECH_INFO_TYPE:
 915                 rv = ecc_digest_svrfy_common((digest_ecc_ctx_t *)ctxp, data,
 916                     signature, CRYPTO_DO_VERIFY | CRYPTO_DO_UPDATE |
 917                     CRYPTO_DO_FINAL, req);
 918                 break;
 919         default:
 920                 rv = ecc_verify_common(ctxp, data, signature, req);
 921                 break;
 922         }
 923 
 924         ecc_free_context(ctx);
 925         return (rv);
 926 }
 927 
 928 /* ARGSUSED */
 929 static int
 930 ecc_verify_update(crypto_ctx_t *ctx, crypto_data_t *data,
 931     crypto_req_handle_t req)
 932 {
 933         int rv;
 934         digest_ecc_ctx_t *ctxp;
 935 
 936         ASSERT(ctx->cc_provider_private != NULL);
 937         ctxp = ctx->cc_provider_private;
 938 
 939         switch (ctxp->mech_type) {
 940         case ECDSA_SHA1_MECH_INFO_TYPE:
 941                 rv = crypto_digest_data(data, &(ctxp->sha1_ctx), NULL,
 942                     (void (*)())SHA1Update, (void (*)())SHA1Final,
 943                     CRYPTO_DO_SHA1 | CRYPTO_DO_UPDATE);
 944                 break;
 945         default:
 946                 rv = CRYPTO_MECHANISM_INVALID;
 947         }
 948 
 949         if (rv != CRYPTO_SUCCESS)
 950                 ecc_free_context(ctx);
 951 
 952         return (rv);
 953 }
 954 
 955 /* ARGSUSED */
 956 static int
 957 ecc_verify_final(crypto_ctx_t *ctx, crypto_data_t *signature,
 958     crypto_req_handle_t req)
 959 {
 960         int rv;
 961         digest_ecc_ctx_t *ctxp;
 962 
 963         ASSERT(ctx->cc_provider_private != NULL);
 964         ctxp = ctx->cc_provider_private;
 965 
 966         rv = ecc_digest_svrfy_common(ctxp, NULL, signature,
 967             CRYPTO_DO_VERIFY | CRYPTO_DO_FINAL, req);
 968 
 969         ecc_free_context(ctx);
 970 
 971         return (rv);
 972 }
 973 
 974 
 975 /* ARGSUSED */
 976 static int
 977 ecc_verify_atomic(crypto_provider_handle_t provider,
 978     crypto_session_id_t session_id, crypto_mechanism_t *mechanism,
 979     crypto_key_t *key, crypto_data_t *data, crypto_data_t *signature,
 980     crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req)
 981 {
 982         int rv;
 983         ecc_mech_type_t mech_type = mechanism->cm_type;
 984         uchar_t *params;
 985         ssize_t params_len;
 986         ECParams  *ecparams;
 987         SECKEYECParams params_item;
 988         int kmflag;
 989 
 990         if ((rv = check_mech_and_key(mech_type, key,
 991             CKO_PUBLIC_KEY)) != CRYPTO_SUCCESS)
 992                 return (rv);
 993 
 994         if (crypto_get_key_attr(key, CKA_EC_PARAMS, (void *) &params,
 995             &params_len)) {
 996                 return (CRYPTO_ARGUMENTS_BAD);
 997         }
 998 
 999         /* ASN1 check */
1000         if (params[0] != 0x06 ||
1001             params[1] != params_len - 2) {
1002                 return (CRYPTO_ATTRIBUTE_VALUE_INVALID);
1003         }
1004         params_item.data = params;
1005         params_item.len = (uint_t)params_len;
1006         kmflag = crypto_kmflag(req);
1007         if (EC_DecodeParams(&params_item, &ecparams, kmflag) != SECSuccess) {
1008                 /* bad curve OID */
1009                 return (CRYPTO_ARGUMENTS_BAD);
1010         }
1011 
1012         if (mechanism->cm_type == ECDSA_MECH_INFO_TYPE) {
1013                 ecc_ctx_t ctx;
1014 
1015                 ctx.mech_type = mech_type;
1016                 /* structure assignment */
1017                 ctx.ecparams = *ecparams;
1018                 ctx.key = key;
1019                 rv = ecc_verify_common(&ctx, data, signature, req);
1020         } else {
1021                 digest_ecc_ctx_t dctx;
1022 
1023                 dctx.mech_type = mech_type;
1024                 /* structure assignment */
1025                 dctx.ecparams = *ecparams;
1026                 dctx.key = key;
1027                 SHA1Init(&(dctx.sha1_ctx));
1028 
1029                 rv = ecc_digest_svrfy_common(&dctx, data, signature,
1030                     CRYPTO_DO_VERIFY | CRYPTO_DO_UPDATE | CRYPTO_DO_FINAL, req);
1031         }
1032         free_ecparams(ecparams, B_TRUE);
1033         return (rv);
1034 }
1035 
1036 /* ARGSUSED */
1037 static int
1038 ecc_nostore_key_generate_pair(crypto_provider_handle_t provider,
1039     crypto_session_id_t session_id, crypto_mechanism_t *mechanism,
1040     crypto_object_attribute_t *pub_template, uint_t pub_attribute_count,
1041     crypto_object_attribute_t *pri_template, uint_t pri_attribute_count,
1042     crypto_object_attribute_t *pub_out_template, uint_t pub_out_attribute_count,
1043     crypto_object_attribute_t *pri_out_template, uint_t pri_out_attribute_count,
1044     crypto_req_handle_t req)
1045 {
1046         int rv = CRYPTO_SUCCESS;
1047         ECPrivateKey *privKey;  /* contains both public and private values */
1048         ECParams *ecparams;
1049         SECKEYECParams params_item;
1050         ulong_t pub_key_type = ~0UL, pub_class = ~0UL;
1051         ulong_t pri_key_type = ~0UL, pri_class = ~0UL;
1052         int params_idx, value_idx, point_idx;
1053         uchar_t *params = NULL;
1054         unsigned params_len;
1055         uchar_t *value = NULL;
1056         uchar_t *point = NULL;
1057         int valuelen;
1058         int pointlen;
1059         int xylen;
1060         int kmflag;
1061 
1062         if (mechanism->cm_type != EC_KEY_PAIR_GEN_MECH_INFO_TYPE) {
1063                 return (CRYPTO_MECHANISM_INVALID);
1064         }
1065 
1066         /* optional */
1067         (void) get_template_attr_ulong(pub_template,
1068             pub_attribute_count, CKA_CLASS, &pub_class);
1069 
1070         /* optional */
1071         (void) get_template_attr_ulong(pri_template,
1072             pri_attribute_count, CKA_CLASS, &pri_class);
1073 
1074         /* optional */
1075         (void) get_template_attr_ulong(pub_template,
1076             pub_attribute_count, CKA_KEY_TYPE, &pub_key_type);
1077 
1078         /* optional */
1079         (void) get_template_attr_ulong(pri_template,
1080             pri_attribute_count, CKA_KEY_TYPE, &pri_key_type);
1081 
1082         if (pub_class != ~0UL && pub_class != CKO_PUBLIC_KEY) {
1083                 return (CRYPTO_TEMPLATE_INCONSISTENT);
1084         }
1085         pub_class = CKO_PUBLIC_KEY;
1086 
1087         if (pri_class != ~0UL && pri_class != CKO_PRIVATE_KEY) {
1088                 return (CRYPTO_TEMPLATE_INCONSISTENT);
1089         }
1090         pri_class = CKO_PRIVATE_KEY;
1091 
1092         if (pub_key_type != ~0UL && pub_key_type != CKK_EC) {
1093                 return (CRYPTO_TEMPLATE_INCONSISTENT);
1094         }
1095         pub_key_type = CKK_EC;
1096 
1097         if (pri_key_type != ~0UL && pri_key_type != CKK_EC) {
1098                 return (CRYPTO_TEMPLATE_INCONSISTENT);
1099         }
1100         pri_key_type = CKK_EC;
1101 
1102         /* public output template must contain CKA_EC_POINT attribute */
1103         if ((point_idx = find_attr(pub_out_template, pub_out_attribute_count,
1104             CKA_EC_POINT)) == -1) {
1105                 return (CRYPTO_TEMPLATE_INCOMPLETE);
1106         }
1107 
1108         /* private output template must contain CKA_VALUE attribute */
1109         if ((value_idx = find_attr(pri_out_template, pri_out_attribute_count,
1110             CKA_VALUE)) == -1) {
1111                 return (CRYPTO_TEMPLATE_INCOMPLETE);
1112         }
1113 
1114         if ((params_idx = find_attr(pub_template, pub_attribute_count,
1115             CKA_EC_PARAMS)) == -1) {
1116                 return (CRYPTO_TEMPLATE_INCOMPLETE);
1117         }
1118 
1119         params = (uchar_t *)pub_template[params_idx].oa_value;
1120         params_len = pub_template[params_idx].oa_value_len;
1121 
1122         value = (uchar_t *)pri_out_template[value_idx].oa_value;
1123         valuelen = (int)pri_out_template[value_idx].oa_value_len;
1124         point = (uchar_t *)pub_out_template[point_idx].oa_value;
1125         pointlen = (int)pub_out_template[point_idx].oa_value_len;
1126 
1127         /* ASN1 check */
1128         if (params[0] != 0x06 ||
1129             params[1] != params_len - 2) {
1130                 return (CRYPTO_ATTRIBUTE_VALUE_INVALID);
1131         }
1132         params_item.data = params;
1133         params_item.len = params_len;
1134         kmflag = crypto_kmflag(req);
1135         if (EC_DecodeParams(&params_item, &ecparams, kmflag) != SECSuccess) {
1136                 /* bad curve OID */
1137                 return (CRYPTO_ARGUMENTS_BAD);
1138         }
1139 
1140         if (EC_NewKey(ecparams, &privKey, kmflag) != SECSuccess) {
1141                 free_ecparams(ecparams, B_TRUE);
1142                 return (CRYPTO_FAILED);
1143         }
1144 
1145         xylen = privKey->publicValue.len;
1146         /* ASSERT that xylen - 1 is divisible by 2 */
1147         if (xylen > pointlen) {
1148                 rv = CRYPTO_BUFFER_TOO_SMALL;
1149                 goto out;
1150         }
1151 
1152         if (privKey->privateValue.len > valuelen) {
1153                 rv = CRYPTO_BUFFER_TOO_SMALL;
1154                 goto out;
1155         }
1156         bcopy(privKey->privateValue.data, value, privKey->privateValue.len);
1157         pri_out_template[value_idx].oa_value_len = privKey->privateValue.len;
1158 
1159         bcopy(privKey->publicValue.data, point, xylen);
1160         pub_out_template[point_idx].oa_value_len = xylen;
1161 
1162 out:
1163         free_ecprivkey(privKey);
1164         free_ecparams(ecparams, B_TRUE);
1165         return (rv);
1166 }
1167 
1168 /* ARGSUSED */
1169 static int
1170 ecc_nostore_key_derive(crypto_provider_handle_t provider,
1171     crypto_session_id_t session_id, crypto_mechanism_t *mechanism,
1172     crypto_key_t *base_key, crypto_object_attribute_t *in_attrs,
1173     uint_t in_attr_count, crypto_object_attribute_t *out_attrs,
1174     uint_t out_attr_count, crypto_req_handle_t req)
1175 {
1176         int rv = CRYPTO_SUCCESS;
1177         int params_idx, value_idx = -1, out_value_idx = -1;
1178         ulong_t key_type;
1179         ulong_t key_len;
1180         crypto_object_attribute_t *attrs;
1181         ECParams *ecparams;
1182         SECKEYECParams params_item;
1183         CK_ECDH1_DERIVE_PARAMS *mech_param;
1184         SECItem public_value_item, private_value_item, secret_item;
1185         int kmflag;
1186 
1187         if (mechanism->cm_type != ECDH1_DERIVE_MECH_INFO_TYPE) {
1188                 return (CRYPTO_MECHANISM_INVALID);
1189         }
1190 
1191         ASSERT(IS_P2ALIGNED(mechanism->cm_param, sizeof (uint64_t)));
1192         /* LINTED: pointer alignment */
1193         mech_param = (CK_ECDH1_DERIVE_PARAMS *)mechanism->cm_param;
1194         if (mech_param->kdf != CKD_NULL) {
1195                 return (CRYPTO_MECHANISM_PARAM_INVALID);
1196         }
1197 
1198         if ((base_key->ck_format != CRYPTO_KEY_ATTR_LIST) ||
1199             (base_key->ck_count == 0)) {
1200                 return (CRYPTO_ARGUMENTS_BAD);
1201         }
1202 
1203         if ((rv = get_template_attr_ulong(in_attrs, in_attr_count,
1204             CKA_KEY_TYPE, &key_type)) != CRYPTO_SUCCESS) {
1205                 return (rv);
1206         }
1207 
1208         switch (key_type) {
1209         case CKK_DES:
1210                 key_len = DES_KEYSIZE;
1211                 break;
1212         case CKK_DES2:
1213                 key_len = DES2_KEYSIZE;
1214                 break;
1215         case CKK_DES3:
1216                 key_len = DES3_KEYSIZE;
1217                 break;
1218         case CKK_RC4:
1219         case CKK_AES:
1220         case CKK_GENERIC_SECRET:
1221                 if ((rv = get_template_attr_ulong(in_attrs, in_attr_count,
1222                     CKA_VALUE_LEN, &key_len)) != CRYPTO_SUCCESS) {
1223                         return (rv);
1224                 }
1225                 break;
1226         default:
1227                 key_len = 0;
1228         }
1229 
1230         attrs = base_key->ck_attrs;
1231         if ((value_idx = find_attr(attrs, base_key->ck_count,
1232             CKA_VALUE)) == -1) {
1233                 return (CRYPTO_TEMPLATE_INCOMPLETE);
1234         }
1235 
1236         if ((params_idx = find_attr(attrs, base_key->ck_count,
1237             CKA_EC_PARAMS)) == -1) {
1238                 return (CRYPTO_TEMPLATE_INCOMPLETE);
1239         }
1240 
1241         private_value_item.data = (uchar_t *)attrs[value_idx].oa_value;
1242         private_value_item.len = attrs[value_idx].oa_value_len;
1243 
1244         params_item.len = attrs[params_idx].oa_value_len;
1245         params_item.data = (uchar_t *)attrs[params_idx].oa_value;
1246 
1247         /* ASN1 check */
1248         if (params_item.data[0] != 0x06 ||
1249             params_item.data[1] != params_item.len - 2) {
1250                 return (CRYPTO_ATTRIBUTE_VALUE_INVALID);
1251         }
1252         kmflag = crypto_kmflag(req);
1253         if (EC_DecodeParams(&params_item, &ecparams, kmflag) != SECSuccess) {
1254                 /* bad curve OID */
1255                 return (CRYPTO_ARGUMENTS_BAD);
1256         }
1257 
1258         public_value_item.data = (uchar_t *)mech_param->pPublicData;
1259         public_value_item.len = mech_param->ulPublicDataLen;
1260 
1261         if ((out_value_idx = find_attr(out_attrs, out_attr_count,
1262             CKA_VALUE)) == -1) {
1263                 rv = CRYPTO_TEMPLATE_INCOMPLETE;
1264                 goto out;
1265         }
1266         secret_item.data = NULL;
1267         secret_item.len = 0;
1268 
1269         if (ECDH_Derive(&public_value_item, ecparams, &private_value_item,
1270             B_FALSE, &secret_item, kmflag) != SECSuccess) {
1271                 free_ecparams(ecparams, B_TRUE);
1272                 return (CRYPTO_FAILED);
1273         } else {
1274                 rv = CRYPTO_SUCCESS;
1275         }
1276 
1277         if (key_len == 0)
1278                 key_len = secret_item.len;
1279 
1280         if (key_len > secret_item.len) {
1281                 rv = CRYPTO_ATTRIBUTE_VALUE_INVALID;
1282                 goto out;
1283         }
1284         if (key_len > out_attrs[out_value_idx].oa_value_len) {
1285                 rv = CRYPTO_BUFFER_TOO_SMALL;
1286                 goto out;
1287         }
1288         bcopy(secret_item.data + secret_item.len - key_len,
1289             (uchar_t *)out_attrs[out_value_idx].oa_value, key_len);
1290         out_attrs[out_value_idx].oa_value_len = key_len;
1291 out:
1292         free_ecparams(ecparams, B_TRUE);
1293         SECITEM_FreeItem(&secret_item, B_FALSE);
1294         return (rv);
1295 }
1296 
1297 static void
1298 free_ecparams(ECParams *params, boolean_t freeit)
1299 {
1300         SECITEM_FreeItem(&params->fieldID.u.prime, B_FALSE);
1301         SECITEM_FreeItem(&params->curve.a, B_FALSE);
1302         SECITEM_FreeItem(&params->curve.b, B_FALSE);
1303         SECITEM_FreeItem(&params->curve.seed, B_FALSE);
1304         SECITEM_FreeItem(&params->base, B_FALSE);
1305         SECITEM_FreeItem(&params->order, B_FALSE);
1306         SECITEM_FreeItem(&params->DEREncoding, B_FALSE);
1307         SECITEM_FreeItem(&params->curveOID, B_FALSE);
1308         if (freeit)
1309                 kmem_free(params, sizeof (ECParams));
1310 }
1311 
1312 static void
1313 free_ecprivkey(ECPrivateKey *key)
1314 {
1315         free_ecparams(&key->ecParams, B_FALSE);
1316         SECITEM_FreeItem(&key->publicValue, B_FALSE);
1317         bzero(key->privateValue.data, key->privateValue.len);
1318         SECITEM_FreeItem(&key->privateValue, B_FALSE);
1319         SECITEM_FreeItem(&key->version, B_FALSE);
1320         kmem_free(key, sizeof (ECPrivateKey));
1321 }
--- EOF ---