0N/A/*
2362N/A * Copyright (c) 2003, 2009, Oracle and/or its affiliates. All rights reserved.
0N/A */
0N/A
0N/A/* Copyright (c) 2002 Graz University of Technology. All rights reserved.
0N/A *
0N/A * Redistribution and use in source and binary forms, with or without
0N/A * modification, are permitted provided that the following conditions are met:
0N/A *
0N/A * 1. Redistributions of source code must retain the above copyright notice,
0N/A * this list of conditions and the following disclaimer.
0N/A *
0N/A * 2. Redistributions in binary form must reproduce the above copyright notice,
0N/A * this list of conditions and the following disclaimer in the documentation
0N/A * and/or other materials provided with the distribution.
0N/A *
0N/A * 3. The end-user documentation included with the redistribution, if any, must
0N/A * include the following acknowledgment:
0N/A *
0N/A * "This product includes software developed by IAIK of Graz University of
0N/A * Technology."
0N/A *
0N/A * Alternately, this acknowledgment may appear in the software itself, if
0N/A * and wherever such third-party acknowledgments normally appear.
0N/A *
0N/A * 4. The names "Graz University of Technology" and "IAIK of Graz University of
0N/A * Technology" must not be used to endorse or promote products derived from
0N/A * this software without prior written permission.
0N/A *
0N/A * 5. Products derived from this software may not be called
0N/A * "IAIK PKCS Wrapper", nor may "IAIK" appear in their name, without prior
0N/A * written permission of Graz University of Technology.
0N/A *
0N/A * THIS SOFTWARE IS PROVIDED "AS IS" AND ANY EXPRESSED OR IMPLIED
0N/A * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
0N/A * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
0N/A * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE LICENSOR BE
0N/A * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,
0N/A * OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
0N/A * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA,
0N/A * OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
0N/A * ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
0N/A * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
0N/A * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
0N/A * POSSIBILITY OF SUCH DAMAGE.
0N/A * ===========================================================================
0N/A */
0N/A
0N/A#include "pkcs11wrapper.h"
0N/A
0N/A#include <stdio.h>
0N/A#include <stdlib.h>
0N/A#include <string.h>
0N/A#include <assert.h>
0N/A
0N/A#include "sun_security_pkcs11_wrapper_PKCS11.h"
0N/A
0N/A#ifdef P11_ENABLE_C_DIGESTENCRYPTUPDATE
0N/A/*
0N/A * Class: sun_security_pkcs11_wrapper_PKCS11
0N/A * Method: C_DigestEncryptUpdate
0N/A * Signature: (J[B)[B
0N/A * Parametermapping: *PKCS11*
0N/A * @param jlong jSessionHandle CK_SESSION_HANDLE hSession
0N/A * @param jbyteArray jPart CK_BYTE_PTR pPart
0N/A * CK_ULONG ulPartLen
0N/A * @return jbyteArray jEncryptedPart CK_BYTE_PTR pEncryptedPart
0N/A * CK_ULONG_PTR pulEncryptedPartLen
0N/A */
0N/AJNIEXPORT jbyteArray JNICALL Java_sun_security_pkcs11_wrapper_PKCS11_C_1DigestEncryptUpdate
0N/A (JNIEnv *env, jobject obj, jlong jSessionHandle, jbyteArray jPart)
0N/A{
0N/A CK_SESSION_HANDLE ckSessionHandle;
0N/A CK_BYTE_PTR ckpPart = NULL_PTR, ckpEncryptedPart;
0N/A CK_ULONG ckPartLength, ckEncryptedPartLength = 0;
936N/A jbyteArray jEncryptedPart = NULL;
0N/A CK_RV rv;
0N/A
0N/A CK_FUNCTION_LIST_PTR ckpFunctions = getFunctionList(env, obj);
0N/A if (ckpFunctions == NULL) { return NULL; }
0N/A
0N/A ckSessionHandle = jLongToCKULong(jSessionHandle);
0N/A jByteArrayToCKByteArray(env, jPart, &ckpPart, &ckPartLength);
936N/A if ((*env)->ExceptionCheck(env)) { return NULL; }
0N/A
0N/A rv = (*ckpFunctions->C_DigestEncryptUpdate)(ckSessionHandle, ckpPart, ckPartLength, NULL_PTR, &ckEncryptedPartLength);
936N/A if (ckAssertReturnValueOK(env, rv) != CK_ASSERT_OK) {
936N/A free(ckpPart);
936N/A return NULL;
936N/A }
0N/A
0N/A ckpEncryptedPart = (CK_BYTE_PTR) malloc(ckEncryptedPartLength * sizeof(CK_BYTE));
936N/A if (ckpEncryptedPart == NULL) {
936N/A free(ckpPart);
936N/A JNU_ThrowOutOfMemoryError(env, 0);
936N/A return NULL;
936N/A }
0N/A
0N/A rv = (*ckpFunctions->C_DigestEncryptUpdate)(ckSessionHandle, ckpPart, ckPartLength, ckpEncryptedPart, &ckEncryptedPartLength);
936N/A if (ckAssertReturnValueOK(env, rv) == CK_ASSERT_OK) {
936N/A jEncryptedPart = ckByteArrayToJByteArray(env, ckpEncryptedPart, ckEncryptedPartLength);
936N/A }
0N/A free(ckpPart);
0N/A free(ckpEncryptedPart);
0N/A
0N/A return jEncryptedPart ;
0N/A}
0N/A#endif
0N/A
0N/A#ifdef P11_ENABLE_C_DECRYPTDIGESTUPDATE
0N/A/*
0N/A * Class: sun_security_pkcs11_wrapper_PKCS11
0N/A * Method: C_DecryptDigestUpdate
0N/A * Signature: (J[B)[B
0N/A * Parametermapping: *PKCS11*
0N/A * @param jlong jSessionHandle CK_SESSION_HANDLE hSession
0N/A * @param jbyteArray jEncryptedPart CK_BYTE_PTR pEncryptedPart
0N/A * CK_ULONG ulEncryptedPartLen
0N/A * @return jbyteArray jPart CK_BYTE_PTR pPart
0N/A * CK_ULONG_PTR pulPartLen
0N/A */
0N/AJNIEXPORT jbyteArray JNICALL Java_sun_security_pkcs11_wrapper_PKCS11_C_1DecryptDigestUpdate
0N/A (JNIEnv *env, jobject obj, jlong jSessionHandle, jbyteArray jEncryptedPart)
0N/A{
0N/A CK_SESSION_HANDLE ckSessionHandle;
0N/A CK_BYTE_PTR ckpPart, ckpEncryptedPart = NULL_PTR;
0N/A CK_ULONG ckPartLength = 0, ckEncryptedPartLength;
936N/A jbyteArray jPart = NULL;
0N/A CK_RV rv;
0N/A
0N/A CK_FUNCTION_LIST_PTR ckpFunctions = getFunctionList(env, obj);
0N/A if (ckpFunctions == NULL) { return NULL; }
0N/A
0N/A ckSessionHandle = jLongToCKULong(jSessionHandle);
0N/A jByteArrayToCKByteArray(env, jEncryptedPart, &ckpEncryptedPart, &ckEncryptedPartLength);
936N/A if ((*env)->ExceptionCheck(env)) { return NULL; }
0N/A
0N/A rv = (*ckpFunctions->C_DecryptDigestUpdate)(ckSessionHandle, ckpEncryptedPart, ckEncryptedPartLength, NULL_PTR, &ckPartLength);
936N/A if (ckAssertReturnValueOK(env, rv) != CK_ASSERT_OK) {
936N/A free(ckpEncryptedPart);
936N/A return NULL;
936N/A }
0N/A
0N/A ckpPart = (CK_BYTE_PTR) malloc(ckPartLength * sizeof(CK_BYTE));
936N/A if (ckpPart == NULL) {
936N/A free(ckpEncryptedPart);
936N/A JNU_ThrowOutOfMemoryError(env, 0);
936N/A return NULL;
936N/A }
0N/A
0N/A rv = (*ckpFunctions->C_DecryptDigestUpdate)(ckSessionHandle, ckpEncryptedPart, ckEncryptedPartLength, ckpPart, &ckPartLength);
936N/A if (ckAssertReturnValueOK(env, rv) == CK_ASSERT_OK) {
936N/A jPart = ckByteArrayToJByteArray(env, ckpPart, ckPartLength);
936N/A }
936N/A free(ckpEncryptedPart);
0N/A free(ckpPart);
0N/A
0N/A return jPart ;
0N/A}
0N/A#endif
0N/A
0N/A#ifdef P11_ENABLE_C_SIGNENCRYPTUPDATE
0N/A/*
0N/A * Class: sun_security_pkcs11_wrapper_PKCS11
0N/A * Method: C_SignEncryptUpdate
0N/A * Signature: (J[B)[B
0N/A * Parametermapping: *PKCS11*
0N/A * @param jlong jSessionHandle CK_SESSION_HANDLE hSession
0N/A * @param jbyteArray jPart CK_BYTE_PTR pPart
0N/A * CK_ULONG ulPartLen
0N/A * @return jbyteArray jEncryptedPart CK_BYTE_PTR pEncryptedPart
0N/A * CK_ULONG_PTR pulEncryptedPartLen
0N/A */
0N/AJNIEXPORT jbyteArray JNICALL Java_sun_security_pkcs11_wrapper_PKCS11_C_1SignEncryptUpdate
0N/A (JNIEnv *env, jobject obj, jlong jSessionHandle, jbyteArray jPart)
0N/A{
0N/A CK_SESSION_HANDLE ckSessionHandle;
0N/A CK_BYTE_PTR ckpPart = NULL_PTR, ckpEncryptedPart;
0N/A CK_ULONG ckPartLength, ckEncryptedPartLength = 0;
936N/A jbyteArray jEncryptedPart = NULL;
0N/A CK_RV rv;
0N/A
0N/A CK_FUNCTION_LIST_PTR ckpFunctions = getFunctionList(env, obj);
0N/A if (ckpFunctions == NULL) { return NULL; }
0N/A
0N/A ckSessionHandle = jLongToCKULong(jSessionHandle);
0N/A jByteArrayToCKByteArray(env, jPart, &ckpPart, &ckPartLength);
936N/A if ((*env)->ExceptionCheck(env)) { return NULL; }
0N/A
0N/A rv = (*ckpFunctions->C_SignEncryptUpdate)(ckSessionHandle, ckpPart, ckPartLength, NULL_PTR, &ckEncryptedPartLength);
936N/A if (ckAssertReturnValueOK(env, rv) != CK_ASSERT_OK) {
936N/A free(ckpPart);
936N/A return NULL;
936N/A }
0N/A
0N/A ckpEncryptedPart = (CK_BYTE_PTR) malloc(ckEncryptedPartLength * sizeof(CK_BYTE));
936N/A if (ckpEncryptedPart == NULL) {
936N/A free(ckpPart);
936N/A JNU_ThrowOutOfMemoryError(env, 0);
936N/A return NULL;
936N/A }
0N/A
0N/A rv = (*ckpFunctions->C_SignEncryptUpdate)(ckSessionHandle, ckpPart, ckPartLength, ckpEncryptedPart, &ckEncryptedPartLength);
936N/A if (ckAssertReturnValueOK(env, rv) == CK_ASSERT_OK) {
936N/A jEncryptedPart = ckByteArrayToJByteArray(env, ckpEncryptedPart, ckEncryptedPartLength);
936N/A }
0N/A free(ckpPart);
0N/A free(ckpEncryptedPart);
0N/A
0N/A return jEncryptedPart ;
0N/A}
0N/A#endif
0N/A
0N/A#ifdef P11_ENABLE_C_DECRYPTVERIFYUPDATE
0N/A/*
0N/A * Class: sun_security_pkcs11_wrapper_PKCS11
0N/A * Method: C_DecryptVerifyUpdate
0N/A * Signature: (J[B)[B
0N/A * Parametermapping: *PKCS11*
0N/A * @param jlong jSessionHandle CK_SESSION_HANDLE hSession
0N/A * @param jbyteArray jEncryptedPart CK_BYTE_PTR pEncryptedPart
0N/A * CK_ULONG ulEncryptedPartLen
0N/A * @return jbyteArray jPart CK_BYTE_PTR pPart
0N/A * CK_ULONG_PTR pulPartLen
0N/A */
0N/AJNIEXPORT jbyteArray JNICALL Java_sun_security_pkcs11_wrapper_PKCS11_C_1DecryptVerifyUpdate
0N/A (JNIEnv *env, jobject obj, jlong jSessionHandle, jbyteArray jEncryptedPart)
0N/A{
0N/A CK_SESSION_HANDLE ckSessionHandle;
0N/A CK_BYTE_PTR ckpPart, ckpEncryptedPart = NULL_PTR;
0N/A CK_ULONG ckPartLength = 0, ckEncryptedPartLength;
936N/A jbyteArray jPart = NULL;
0N/A CK_RV rv;
0N/A
0N/A CK_FUNCTION_LIST_PTR ckpFunctions = getFunctionList(env, obj);
0N/A if (ckpFunctions == NULL) { return NULL; }
0N/A
0N/A ckSessionHandle = jLongToCKULong(jSessionHandle);
0N/A jByteArrayToCKByteArray(env, jEncryptedPart, &ckpEncryptedPart, &ckEncryptedPartLength);
936N/A if ((*env)->ExceptionCheck(env)) { return NULL; }
0N/A
0N/A rv = (*ckpFunctions->C_DecryptVerifyUpdate)(ckSessionHandle, ckpEncryptedPart, ckEncryptedPartLength, NULL_PTR, &ckPartLength);
936N/A if (ckAssertReturnValueOK(env, rv) != CK_ASSERT_OK) {
936N/A free(ckpEncryptedPart);
936N/A return NULL;
936N/A }
0N/A
0N/A ckpPart = (CK_BYTE_PTR) malloc(ckPartLength * sizeof(CK_BYTE));
936N/A if (ckpPart == NULL) {
936N/A free(ckpEncryptedPart);
936N/A JNU_ThrowOutOfMemoryError(env, 0);
936N/A return NULL;
936N/A }
0N/A
0N/A rv = (*ckpFunctions->C_DecryptVerifyUpdate)(ckSessionHandle, ckpEncryptedPart, ckEncryptedPartLength, ckpPart, &ckPartLength);
0N/A
936N/A if (ckAssertReturnValueOK(env, rv) == CK_ASSERT_OK) {
936N/A jPart = ckByteArrayToJByteArray(env, ckpPart, ckPartLength);
936N/A }
0N/A free(ckpEncryptedPart);
936N/A free(ckpPart);
0N/A
0N/A return jPart ;
0N/A}
0N/A#endif
0N/A
0N/A#ifdef P11_ENABLE_C_GETFUNCTIONSTATUS
0N/A/*
0N/A * Class: sun_security_pkcs11_wrapper_PKCS11
0N/A * Method: C_GetFunctionStatus
0N/A * Signature: (J)V
0N/A * Parametermapping: *PKCS11*
0N/A * @param jlong jSessionHandle CK_SESSION_HANDLE hSession
0N/A */
0N/AJNIEXPORT void JNICALL Java_sun_security_pkcs11_wrapper_PKCS11_C_1GetFunctionStatus
0N/A (JNIEnv *env, jobject obj, jlong jSessionHandle)
0N/A{
0N/A CK_SESSION_HANDLE ckSessionHandle;
0N/A CK_RV rv;
0N/A
0N/A CK_FUNCTION_LIST_PTR ckpFunctions = getFunctionList(env, obj);
0N/A if (ckpFunctions == NULL) { return; }
0N/A
0N/A ckSessionHandle = jLongToCKULong(jSessionHandle);
0N/A
0N/A /* C_GetFunctionStatus should always return CKR_FUNCTION_NOT_PARALLEL */
0N/A rv = (*ckpFunctions->C_GetFunctionStatus)(ckSessionHandle);
936N/A if (ckAssertReturnValueOK(env, rv) != CK_ASSERT_OK) { return; }
0N/A}
0N/A#endif
0N/A
0N/A#ifdef P11_ENABLE_C_CANCELFUNCTION
0N/A/*
0N/A * Class: sun_security_pkcs11_wrapper_PKCS11
0N/A * Method: C_CancelFunction
0N/A * Signature: (J)V
0N/A * Parametermapping: *PKCS11*
0N/A * @param jlong jSessionHandle CK_SESSION_HANDLE hSession
0N/A */
0N/AJNIEXPORT void JNICALL Java_sun_security_pkcs11_wrapper_PKCS11_C_1CancelFunction
0N/A (JNIEnv *env, jobject obj, jlong jSessionHandle)
0N/A{
0N/A CK_SESSION_HANDLE ckSessionHandle;
0N/A CK_RV rv;
0N/A
0N/A CK_FUNCTION_LIST_PTR ckpFunctions = getFunctionList(env, obj);
0N/A if (ckpFunctions == NULL) { return; }
0N/A
0N/A ckSessionHandle = jLongToCKULong(jSessionHandle);
0N/A
0N/A /* C_GetFunctionStatus should always return CKR_FUNCTION_NOT_PARALLEL */
0N/A rv = (*ckpFunctions->C_CancelFunction)(ckSessionHandle);
936N/A if (ckAssertReturnValueOK(env, rv) != CK_ASSERT_OK) { return; }
0N/A}
0N/A#endif