1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
|
/*
* CDDL HEADER START
*
* The contents of this file are subject to the terms of the
* Common Development and Distribution License (the "License").
* You may not use this file except in compliance with the License.
*
* You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
* or http://www.opensolaris.org/os/licensing.
* See the License for the specific language governing permissions
* and limitations under the License.
*
* When distributing Covered Code, include this CDDL HEADER in each
* file and include the License file at usr/src/OPENSOLARIS.LICENSE.
* If applicable, add the following below this CDDL HEADER, with the
* fields enclosed by brackets "[]" replaced with your own identifying
* information: Portions Copyright [yyyy] [name of copyright owner]
*
* CDDL HEADER END
*/
/*
* Copyright 2009 Sun Microsystems, Inc. All rights reserved.
* Use is subject to license terms.
*/
#ifndef _KERNELOBJECT_H
#define _KERNELOBJECT_H
#ifdef __cplusplus
extern "C" {
#endif
#include <security/pkcs11t.h>
#include "kernelSession.h"
#include "kernelSlot.h"
#define KERNELTOKEN_OBJECT_MAGIC 0xECF0B003
#define KERNEL_CREATE_OBJ 1
#define KERNEL_GEN_KEY 2
#define RSA_PRI_ATTR_COUNT 7
#define RSA_PUB_ATTR_COUNT 3
#define DSA_ATTR_COUNT 4
#define EC_ATTR_COUNT 2
/*
* Secret key Struct
*/
typedef struct secret_key_obj {
CK_BYTE *sk_value;
CK_ULONG sk_value_len;
} secret_key_obj_t;
/*
* This structure is used to hold the attributes in the
* Extra Attribute List.
*/
typedef struct attribute_info {
CK_ATTRIBUTE attr;
struct attribute_info *next;
} attribute_info_t;
typedef attribute_info_t *CK_ATTRIBUTE_INFO_PTR;
/*
* biginteger Struct
*/
typedef struct biginteger {
CK_BYTE *big_value;
CK_ULONG big_value_len;
} biginteger_t;
/*
* PKCS11: RSA Public Key Object Attributes
*/
typedef struct rsa_pub_key {
biginteger_t modulus;
CK_ULONG modulus_bits;
biginteger_t pub_exponent;
} rsa_pub_key_t;
/*
* PKCS11: DSA Public Key Object Attributes
*/
typedef struct dsa_pub_key {
biginteger_t prime;
biginteger_t subprime;
biginteger_t base;
biginteger_t value;
} dsa_pub_key_t;
/*
* PKCS11: Diffie-Hellman Public Key Object Attributes
*/
typedef struct dh_pub_key {
biginteger_t prime;
biginteger_t base;
biginteger_t value;
} dh_pub_key_t;
/*
* PKCS11: EC Public Key Object Attributes
*/
typedef struct ec_pub_key {
biginteger_t point;
} ec_pub_key_t;
/*
* Public Key Main Struct
*/
typedef struct public_key_obj {
union {
rsa_pub_key_t rsa_pub_key; /* RSA public key */
dsa_pub_key_t dsa_pub_key; /* DSA public key */
dh_pub_key_t dh_pub_key; /* DH public key */
ec_pub_key_t ec_pub_key; /* EC public key */
} key_type_u;
} public_key_obj_t;
/*
* PKCS11: RSA Private Key Object Attributes
*/
typedef struct rsa_pri_key {
biginteger_t modulus;
biginteger_t pub_exponent;
biginteger_t pri_exponent;
biginteger_t prime_1;
biginteger_t prime_2;
biginteger_t exponent_1;
biginteger_t exponent_2;
biginteger_t coefficient;
} rsa_pri_key_t;
/*
* PKCS11: DSA Private Key Object Attributes
*/
typedef struct dsa_pri_key {
biginteger_t prime;
biginteger_t subprime;
biginteger_t base;
biginteger_t value;
} dsa_pri_key_t;
/*
* PKCS11: Diffie-Hellman Private Key Object Attributes
*/
typedef struct dh_pri_key {
biginteger_t prime;
biginteger_t base;
biginteger_t value;
CK_ULONG value_bits;
} dh_pri_key_t;
/*
* PKCS11: EC Private Key Object Attributes
*/
typedef struct ec_pri_key {
biginteger_t value;
} ec_pri_key_t;
/*
* Private Key Main Struct
*/
typedef struct private_key_obj {
union {
rsa_pri_key_t rsa_pri_key; /* RSA private key */
dsa_pri_key_t dsa_pri_key; /* DSA private key */
dh_pri_key_t dh_pri_key; /* DH private key */
ec_pri_key_t ec_pri_key; /* EC private key */
} key_type_u;
} private_key_obj_t;
/*
* This is the main structure of the Objects.
*/
typedef struct object {
boolean_t is_lib_obj; /* default is TRUE */
crypto_object_id_t k_handle;
/* Generic common fields. Always present */
CK_OBJECT_CLASS class;
CK_KEY_TYPE key_type;
CK_ULONG magic_marker;
uint64_t bool_attr_mask;
CK_MECHANISM_TYPE mechanism;
/* Fields for access and arbitration */
pthread_mutex_t object_mutex;
struct object *next;
struct object *prev;
/* Extra non-boolean attribute list */
CK_ATTRIBUTE_INFO_PTR extra_attrlistp;
CK_ULONG extra_attrcount;
/* For each object, only one object class is presented */
union {
secret_key_obj_t *secret_key;
public_key_obj_t *public_key;
private_key_obj_t *private_key;
} object_class_u;
/* Session handle that the object belongs to */
CK_SESSION_HANDLE session_handle;
uint32_t obj_refcnt; /* object reference count */
pthread_cond_t obj_free_cond; /* cond variable for signal and wait */
uint32_t obj_delete_sync; /* object delete sync flags */
} kernel_object_t;
typedef struct find_context {
kernel_object_t **objs_found;
CK_ULONG num_results;
CK_ULONG next_result_index; /* next result object to return */
} find_context_t;
/*
* The following structure is used to link the to-be-freed session
* objects into a linked list. The objects on this linked list have
* not yet been freed via free() after C_DestroyObject() call; instead
* they are added to this list. The actual free will take place when
* the number of objects queued reaches MAX_OBJ_TO_BE_FREED, at which
* time the first object in the list will be freed.
*/
#define MAX_OBJ_TO_BE_FREED 300
typedef struct obj_to_be_freed_list {
kernel_object_t *first; /* points to first obj in the list */
kernel_object_t *last; /* points to last obj in the list */
uint32_t count; /* current total objs in the list */
pthread_mutex_t obj_to_be_free_mutex;
} object_to_be_freed_list_t;
extern object_to_be_freed_list_t obj_delay_freed;
/*
* The following definitions are the shortcuts
*/
/*
* Secret Key Object Attributes
*/
#define OBJ_SEC(o) \
(o->object_class_u.secret_key)
#define OBJ_SEC_VALUE(o) \
(o->object_class_u.secret_key->sk_value)
#define OBJ_SEC_VALUE_LEN(o) \
(o->object_class_u.secret_key->sk_value_len)
/*
* RSA Public Key Object Attributes
*/
#define OBJ_PUB(o) \
((o)->object_class_u.public_key)
#define KEY_PUB_RSA(k) \
&((k)->key_type_u.rsa_pub_key)
#define OBJ_PUB_RSA_MOD(o) \
&((o)->object_class_u.public_key->key_type_u.rsa_pub_key.modulus)
#define KEY_PUB_RSA_MOD(k) \
&((k)->key_type_u.rsa_pub_key.modulus)
#define OBJ_PUB_RSA_PUBEXPO(o) \
&((o)->object_class_u.public_key->key_type_u.rsa_pub_key.pub_exponent)
#define KEY_PUB_RSA_PUBEXPO(k) \
&((k)->key_type_u.rsa_pub_key.pub_exponent)
#define OBJ_PUB_RSA_MOD_BITS(o) \
((o)->object_class_u.public_key->key_type_u.rsa_pub_key.modulus_bits)
#define KEY_PUB_RSA_MOD_BITS(k) \
((k)->key_type_u.rsa_pub_key.modulus_bits)
/*
* DSA Public Key Object Attributes
*/
#define KEY_PUB_DSA(k) \
&((k)->key_type_u.dsa_pub_key)
#define OBJ_PUB_DSA_PRIME(o) \
&((o)->object_class_u.public_key->key_type_u.dsa_pub_key.prime)
#define KEY_PUB_DSA_PRIME(k) \
&((k)->key_type_u.dsa_pub_key.prime)
#define OBJ_PUB_DSA_SUBPRIME(o) \
&((o)->object_class_u.public_key->key_type_u.dsa_pub_key.subprime)
#define KEY_PUB_DSA_SUBPRIME(k) \
&((k)->key_type_u.dsa_pub_key.subprime)
#define OBJ_PUB_DSA_BASE(o) \
&((o)->object_class_u.public_key->key_type_u.dsa_pub_key.base)
#define KEY_PUB_DSA_BASE(k) \
&((k)->key_type_u.dsa_pub_key.base)
#define OBJ_PUB_DSA_VALUE(o) \
&((o)->object_class_u.public_key->key_type_u.dsa_pub_key.value)
#define KEY_PUB_DSA_VALUE(k) \
&((k)->key_type_u.dsa_pub_key.value)
/*
* Diffie-Hellman Public Key Object Attributes
*/
#define KEY_PUB_DH(k) \
&((k)->key_type_u.dh_pub_key)
#define OBJ_PUB_DH_PRIME(o) \
&((o)->object_class_u.public_key->key_type_u.dh_pub_key.prime)
#define KEY_PUB_DH_PRIME(k) \
&((k)->key_type_u.dh_pub_key.prime)
#define OBJ_PUB_DH_BASE(o) \
&((o)->object_class_u.public_key->key_type_u.dh_pub_key.base)
#define KEY_PUB_DH_BASE(k) \
&((k)->key_type_u.dh_pub_key.base)
#define OBJ_PUB_DH_VALUE(o) \
&((o)->object_class_u.public_key->key_type_u.dh_pub_key.value)
#define KEY_PUB_DH_VALUE(k) \
&((k)->key_type_u.dh_pub_key.value)
/*
* EC Public Key Object Attributes
*/
#define OBJ_PUB_EC_POINT(o) \
&((o)->object_class_u.public_key->key_type_u.ec_pub_key.point)
#define KEY_PUB_EC_POINT(k) \
&((k)->key_type_u.ec_pub_key.point)
/*
* RSA Private Key Object Attributes
*/
#define OBJ_PRI(o) \
((o)->object_class_u.private_key)
#define KEY_PRI_RSA(k) \
&((k)->key_type_u.rsa_pri_key)
#define OBJ_PRI_RSA_MOD(o) \
&((o)->object_class_u.private_key->key_type_u.rsa_pri_key.modulus)
#define KEY_PRI_RSA_MOD(k) \
&((k)->key_type_u.rsa_pri_key.modulus)
#define OBJ_PRI_RSA_PUBEXPO(o) \
&((o)->object_class_u.private_key->key_type_u.rsa_pri_key.pub_exponent)
#define KEY_PRI_RSA_PUBEXPO(k) \
&((k)->key_type_u.rsa_pri_key.pub_exponent)
#define OBJ_PRI_RSA_PRIEXPO(o) \
&((o)->object_class_u.private_key->key_type_u.rsa_pri_key.pri_exponent)
#define KEY_PRI_RSA_PRIEXPO(k) \
&((k)->key_type_u.rsa_pri_key.pri_exponent)
#define OBJ_PRI_RSA_PRIME1(o) \
&((o)->object_class_u.private_key->key_type_u.rsa_pri_key.prime_1)
#define KEY_PRI_RSA_PRIME1(k) \
&((k)->key_type_u.rsa_pri_key.prime_1)
#define OBJ_PRI_RSA_PRIME2(o) \
&((o)->object_class_u.private_key->key_type_u.rsa_pri_key.prime_2)
#define KEY_PRI_RSA_PRIME2(k) \
&((k)->key_type_u.rsa_pri_key.prime_2)
#define OBJ_PRI_RSA_EXPO1(o) \
&((o)->object_class_u.private_key->key_type_u.rsa_pri_key.exponent_1)
#define KEY_PRI_RSA_EXPO1(k) \
&((k)->key_type_u.rsa_pri_key.exponent_1)
#define OBJ_PRI_RSA_EXPO2(o) \
&((o)->object_class_u.private_key->key_type_u.rsa_pri_key.exponent_2)
#define KEY_PRI_RSA_EXPO2(k) \
&((k)->key_type_u.rsa_pri_key.exponent_2)
#define OBJ_PRI_RSA_COEF(o) \
&((o)->object_class_u.private_key->key_type_u.rsa_pri_key.coefficient)
#define KEY_PRI_RSA_COEF(k) \
&((k)->key_type_u.rsa_pri_key.coefficient)
/*
* DSA Private Key Object Attributes
*/
#define KEY_PRI_DSA(k) \
&((k)->key_type_u.dsa_pri_key)
#define OBJ_PRI_DSA_PRIME(o) \
&((o)->object_class_u.private_key->key_type_u.dsa_pri_key.prime)
#define KEY_PRI_DSA_PRIME(k) \
&((k)->key_type_u.dsa_pri_key.prime)
#define OBJ_PRI_DSA_SUBPRIME(o) \
&((o)->object_class_u.private_key->key_type_u.dsa_pri_key.subprime)
#define KEY_PRI_DSA_SUBPRIME(k) \
&((k)->key_type_u.dsa_pri_key.subprime)
#define OBJ_PRI_DSA_BASE(o) \
&((o)->object_class_u.private_key->key_type_u.dsa_pri_key.base)
#define KEY_PRI_DSA_BASE(k) \
&((k)->key_type_u.dsa_pri_key.base)
#define OBJ_PRI_DSA_VALUE(o) \
&((o)->object_class_u.private_key->key_type_u.dsa_pri_key.value)
#define KEY_PRI_DSA_VALUE(k) \
&((k)->key_type_u.dsa_pri_key.value)
/*
* Diffie-Hellman Private Key Object Attributes
*/
#define KEY_PRI_DH(k) \
&((k)->key_type_u.dh_pri_key)
#define OBJ_PRI_DH_PRIME(o) \
&((o)->object_class_u.private_key->key_type_u.dh_pri_key.prime)
#define KEY_PRI_DH_PRIME(k) \
&((k)->key_type_u.dh_pri_key.prime)
#define OBJ_PRI_DH_BASE(o) \
&((o)->object_class_u.private_key->key_type_u.dh_pri_key.base)
#define KEY_PRI_DH_BASE(k) \
&((k)->key_type_u.dh_pri_key.base)
#define OBJ_PRI_DH_VALUE(o) \
&((o)->object_class_u.private_key->key_type_u.dh_pri_key.value)
#define KEY_PRI_DH_VALUE(k) \
&((k)->key_type_u.dh_pri_key.value)
#define OBJ_PRI_DH_VAL_BITS(o) \
((o)->object_class_u.private_key->key_type_u.dh_pri_key.value_bits)
#define KEY_PRI_DH_VAL_BITS(k) \
((k)->key_type_u.dh_pri_key.value_bits)
/*
* EC Private Key Object Attributes
*/
#define OBJ_PRI_EC_VALUE(o) \
&((o)->object_class_u.private_key->key_type_u.ec_pri_key.value)
#define KEY_PRI_EC_VALUE(k) \
&((k)->key_type_u.ec_pri_key.value)
/*
* key related attributes with CK_BBOOL data type
*/
#define DERIVE_BOOL_ON 0x00000001
#define LOCAL_BOOL_ON 0x00000002
#define SENSITIVE_BOOL_ON 0x00000004
#define SECONDARY_AUTH_BOOL_ON 0x00000008
#define ENCRYPT_BOOL_ON 0x00000010
#define DECRYPT_BOOL_ON 0x00000020
#define SIGN_BOOL_ON 0x00000040
#define SIGN_RECOVER_BOOL_ON 0x00000080
#define VERIFY_BOOL_ON 0x00000100
#define VERIFY_RECOVER_BOOL_ON 0x00000200
#define WRAP_BOOL_ON 0x00000400
#define UNWRAP_BOOL_ON 0x00000800
#define TRUSTED_BOOL_ON 0x00001000
#define EXTRACTABLE_BOOL_ON 0x00002000
#define ALWAYS_SENSITIVE_BOOL_ON 0x00004000
#define NEVER_EXTRACTABLE_BOOL_ON 0x00008000
#define PRIVATE_BOOL_ON 0x00010000
#define TOKEN_BOOL_ON 0x00020000
#define MODIFIABLE_BOOL_ON 0x00040000
#define SECRET_KEY_DEFAULT (ENCRYPT_BOOL_ON|\
DECRYPT_BOOL_ON|\
SIGN_BOOL_ON|\
VERIFY_BOOL_ON|\
WRAP_BOOL_ON|\
UNWRAP_BOOL_ON|\
EXTRACTABLE_BOOL_ON|\
MODIFIABLE_BOOL_ON)
#define PUBLIC_KEY_DEFAULT (ENCRYPT_BOOL_ON|\
WRAP_BOOL_ON|\
VERIFY_BOOL_ON|\
VERIFY_RECOVER_BOOL_ON|\
MODIFIABLE_BOOL_ON)
#define PRIVATE_KEY_DEFAULT (DECRYPT_BOOL_ON|\
UNWRAP_BOOL_ON|\
SIGN_BOOL_ON|\
SIGN_RECOVER_BOOL_ON|\
EXTRACTABLE_BOOL_ON|\
MODIFIABLE_BOOL_ON)
/*
* Flag definitions for obj_delete_sync
*/
#define OBJECT_IS_DELETING 1 /* Object is in a deleting state */
#define OBJECT_REFCNT_WAITING 2 /* Waiting for object reference */
/* count to become zero */
/*
* This macro is used to type cast an object handle to a pointer to
* the object struct. Also, it checks to see if the object struct
* is tagged with an object magic number. This is to detect when an
* application passes a bogus object pointer.
* Also, it checks to see if the object is in the deleting state that
* another thread is performing. If not, increment the object reference
* count by one. This is to prevent this object from being deleted by
* other thread.
*/
#define HANDLE2OBJECT_COMMON(hObject, object_p, rv, REFCNT_CODE) { \
object_p = (kernel_object_t *)(hObject); \
if ((object_p == NULL) || \
(object_p->magic_marker != KERNELTOKEN_OBJECT_MAGIC)) {\
rv = CKR_OBJECT_HANDLE_INVALID; \
} else { \
(void) pthread_mutex_lock(&object_p->object_mutex); \
if (!(object_p->obj_delete_sync & OBJECT_IS_DELETING)) { \
REFCNT_CODE; \
rv = CKR_OK; \
} else { \
rv = CKR_OBJECT_HANDLE_INVALID; \
} \
(void) pthread_mutex_unlock(&object_p->object_mutex); \
} \
}
#define HANDLE2OBJECT(hObject, object_p, rv) \
HANDLE2OBJECT_COMMON(hObject, object_p, rv, object_p->obj_refcnt++)
#define HANDLE2OBJECT_DESTROY(hObject, object_p, rv) \
HANDLE2OBJECT_COMMON(hObject, object_p, rv, /* no refcnt increment */)
#define OBJ_REFRELE(object_p) { \
(void) pthread_mutex_lock(&object_p->object_mutex); \
if ((--object_p->obj_refcnt) == 0 && \
(object_p->obj_delete_sync & OBJECT_REFCNT_WAITING)) { \
(void) pthread_cond_signal(&object_p->obj_free_cond); \
} \
(void) pthread_mutex_unlock(&object_p->object_mutex); \
}
/*
* Function Prototypes.
*/
void kernel_cleanup_object(kernel_object_t *objp);
CK_RV kernel_add_object(CK_ATTRIBUTE_PTR pTemplate, CK_ULONG ulCount,
CK_ULONG *objecthandle_p, kernel_session_t *sp);
CK_RV kernel_delete_session_object(kernel_session_t *sp, kernel_object_t *objp,
boolean_t lock_held, boolean_t wrapper_only);
void kernel_cleanup_extra_attr(kernel_object_t *object_p);
CK_RV kernel_copy_extra_attr(CK_ATTRIBUTE_INFO_PTR old_attrp,
kernel_object_t *object_p);
void kernel_cleanup_object_bigint_attrs(kernel_object_t *object_p);
CK_RV kernel_build_object(CK_ATTRIBUTE_PTR template, CK_ULONG ulAttrNum,
kernel_object_t *new_object, kernel_session_t *sp, uint_t);
CK_RV kernel_copy_object(kernel_object_t *old_object,
kernel_object_t **new_object, boolean_t copy_everything,
kernel_session_t *sp);
void kernel_merge_object(kernel_object_t *old_object,
kernel_object_t *new_object);
CK_RV kernel_get_attribute(kernel_object_t *object_p,
CK_ATTRIBUTE_PTR template);
CK_RV kernel_set_attribute(kernel_object_t *object_p,
CK_ATTRIBUTE_PTR template, boolean_t copy, kernel_session_t *sp);
void copy_bigint_attr(biginteger_t *src, biginteger_t *dst);
void kernel_add_object_to_session(kernel_object_t *objp, kernel_session_t *sp);
CK_RV kernel_copy_public_key_attr(public_key_obj_t *old_pub_key_obj_p,
public_key_obj_t **new_pub_key_obj_p, CK_KEY_TYPE key_type);
CK_RV kernel_copy_private_key_attr(private_key_obj_t *old_pri_key_obj_p,
private_key_obj_t **new_pri_key_obj_p, CK_KEY_TYPE key_type);
CK_RV kernel_copy_secret_key_attr(secret_key_obj_t *old_secret_key_obj_p,
secret_key_obj_t **new_secret_key_obj_p);
CK_RV kernel_validate_attr(CK_ATTRIBUTE_PTR template, CK_ULONG ulAttrNum,
CK_OBJECT_CLASS *class);
CK_RV kernel_find_objects_init(kernel_session_t *sp,
CK_ATTRIBUTE_PTR pTemplate, CK_ULONG ulCount);
void kernel_find_objects_final(kernel_session_t *sp);
void kernel_find_objects(kernel_session_t *sp,
CK_OBJECT_HANDLE *obj_found, CK_ULONG max_obj_requested,
CK_ULONG *found_obj_count);
void kernel_process_find_attr(CK_OBJECT_CLASS *pclasses,
CK_ULONG *num_result_pclasses, CK_ATTRIBUTE_PTR pTemplate,
CK_ULONG ulCount);
boolean_t kernel_find_match_attrs(kernel_object_t *obj,
CK_OBJECT_CLASS *pclasses, CK_ULONG num_pclasses,
CK_ATTRIBUTE *tmpl_attr, CK_ULONG num_attr);
CK_ATTRIBUTE_PTR get_extra_attr(CK_ATTRIBUTE_TYPE type, kernel_object_t *obj);
CK_RV get_string_from_template(CK_ATTRIBUTE_PTR dest, CK_ATTRIBUTE_PTR src);
void string_attr_cleanup(CK_ATTRIBUTE_PTR template);
void kernel_add_token_object_to_slot(kernel_object_t *objp,
kernel_slot_t *pslot);
void kernel_remove_token_object_from_slot(kernel_slot_t *pslot,
kernel_object_t *objp);
CK_RV kernel_delete_token_object(kernel_slot_t *pslot, kernel_session_t *sp,
kernel_object_t *obj, boolean_t lock_held, boolean_t wrapper_only);
void kernel_cleanup_pri_objects_in_slot(kernel_slot_t *pslot,
kernel_session_t *sp);
CK_RV kernel_get_object_size(kernel_object_t *objp, CK_ULONG_PTR pulSize);
void kernel_object_delay_free(kernel_object_t *objp);
#ifdef __cplusplus
}
#endif
#endif /* _KERNELOBJECT_H */
|