0N/A/*
2362N/A * Copyright (c) 2003, 2009, Oracle and/or its affiliates. All rights reserved.
0N/A */
0N/A
0N/A/* Copyright (c) 2002 Graz University of Technology. All rights reserved.
0N/A *
0N/A * Redistribution and use in source and binary forms, with or without
0N/A * modification, are permitted provided that the following conditions are met:
0N/A *
0N/A * 1. Redistributions of source code must retain the above copyright notice,
0N/A * this list of conditions and the following disclaimer.
0N/A *
0N/A * 2. Redistributions in binary form must reproduce the above copyright notice,
0N/A * this list of conditions and the following disclaimer in the documentation
0N/A * and/or other materials provided with the distribution.
0N/A *
0N/A * 3. The end-user documentation included with the redistribution, if any, must
0N/A * include the following acknowledgment:
0N/A *
0N/A * "This product includes software developed by IAIK of Graz University of
0N/A * Technology."
0N/A *
0N/A * Alternately, this acknowledgment may appear in the software itself, if
0N/A * and wherever such third-party acknowledgments normally appear.
0N/A *
0N/A * 4. The names "Graz University of Technology" and "IAIK of Graz University of
0N/A * Technology" must not be used to endorse or promote products derived from
0N/A * this software without prior written permission.
0N/A *
0N/A * 5. Products derived from this software may not be called
0N/A * "IAIK PKCS Wrapper", nor may "IAIK" appear in their name, without prior
0N/A * written permission of Graz University of Technology.
0N/A *
0N/A * THIS SOFTWARE IS PROVIDED "AS IS" AND ANY EXPRESSED OR IMPLIED
0N/A * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
0N/A * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
0N/A * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE LICENSOR BE
0N/A * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,
0N/A * OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
0N/A * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA,
0N/A * OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
0N/A * ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
0N/A * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
0N/A * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
0N/A * POSSIBILITY OF SUCH DAMAGE.
0N/A */
0N/A
0N/A#include "pkcs11wrapper.h"
0N/A
0N/A#include <stdio.h>
0N/A#include <stdlib.h>
0N/A#include <string.h>
0N/A#include <assert.h>
0N/A
0N/A#include "sun_security_pkcs11_wrapper_PKCS11.h"
0N/A
0N/A#ifdef P11_ENABLE_C_SIGNINIT
0N/A/*
0N/A * Class: sun_security_pkcs11_wrapper_PKCS11
0N/A * Method: C_SignInit
0N/A * Signature: (JLsun/security/pkcs11/wrapper/CK_MECHANISM;J)V
0N/A * Parametermapping: *PKCS11*
0N/A * @param jlong jSessionHandle CK_SESSION_HANDLE hSession
0N/A * @param jobject jMechanism CK_MECHANISM_PTR pMechanism
0N/A * @return jlong jKeyHandle CK_OBJECT_HANDLE hKey
0N/A */
0N/AJNIEXPORT void JNICALL Java_sun_security_pkcs11_wrapper_PKCS11_C_1SignInit
0N/A (JNIEnv *env, jobject obj, jlong jSessionHandle, jobject jMechanism, jlong jKeyHandle)
0N/A{
0N/A CK_SESSION_HANDLE ckSessionHandle;
0N/A CK_MECHANISM ckMechanism;
0N/A CK_OBJECT_HANDLE ckKeyHandle;
0N/A CK_RV rv;
0N/A
0N/A CK_FUNCTION_LIST_PTR ckpFunctions = getFunctionList(env, obj);
0N/A if (ckpFunctions == NULL) { return; }
0N/A
0N/A ckSessionHandle = jLongToCKULong(jSessionHandle);
0N/A jMechanismToCKMechanism(env, jMechanism, &ckMechanism);
936N/A if ((*env)->ExceptionCheck(env)) { return; }
0N/A ckKeyHandle = jLongToCKULong(jKeyHandle);
0N/A
0N/A rv = (*ckpFunctions->C_SignInit)(ckSessionHandle, &ckMechanism, ckKeyHandle);
0N/A
936N/A if (ckMechanism.pParameter != NULL_PTR) {
0N/A free(ckMechanism.pParameter);
0N/A }
0N/A
936N/A if (ckAssertReturnValueOK(env, rv) != CK_ASSERT_OK) { return; }
0N/A}
0N/A#endif
0N/A
0N/A#ifdef P11_ENABLE_C_SIGN
0N/A/*
0N/A * Class: sun_security_pkcs11_wrapper_PKCS11
0N/A * Method: C_Sign
0N/A * Signature: (J[B)[B
0N/A * Parametermapping: *PKCS11*
0N/A * @param jlong jSessionHandle CK_SESSION_HANDLE hSession
0N/A * @param jbyteArray jData CK_BYTE_PTR pData
0N/A * CK_ULONG ulDataLen
0N/A * @return jbyteArray jSignature CK_BYTE_PTR pSignature
0N/A * CK_ULONG_PTR pulSignatureLen
0N/A */
0N/AJNIEXPORT jbyteArray JNICALL Java_sun_security_pkcs11_wrapper_PKCS11_C_1Sign
0N/A (JNIEnv *env, jobject obj, jlong jSessionHandle, jbyteArray jData)
0N/A{
0N/A CK_SESSION_HANDLE ckSessionHandle;
0N/A CK_BYTE_PTR ckpData = NULL_PTR;
0N/A CK_BYTE_PTR ckpSignature;
0N/A CK_ULONG ckDataLength;
0N/A CK_ULONG ckSignatureLength = 0;
1428N/A jbyteArray jSignature = NULL;
0N/A CK_RV rv;
0N/A
0N/A CK_FUNCTION_LIST_PTR ckpFunctions = getFunctionList(env, obj);
0N/A if (ckpFunctions == NULL) { return NULL; }
0N/A
0N/A ckSessionHandle = jLongToCKULong(jSessionHandle);
0N/A jByteArrayToCKByteArray(env, jData, &ckpData, &ckDataLength);
936N/A if ((*env)->ExceptionCheck(env)) { return NULL; }
0N/A
0N/A /* START standard code */
0N/A
0N/A /* first determine the length of the signature */
0N/A rv = (*ckpFunctions->C_Sign)(ckSessionHandle, ckpData, ckDataLength, NULL_PTR, &ckSignatureLength);
936N/A if (ckAssertReturnValueOK(env, rv) != CK_ASSERT_OK) {
936N/A free(ckpData);
936N/A return NULL;
936N/A }
0N/A
0N/A ckpSignature = (CK_BYTE_PTR) malloc(ckSignatureLength * sizeof(CK_BYTE));
936N/A if (ckpSignature == NULL) {
936N/A free(ckpData);
936N/A JNU_ThrowOutOfMemoryError(env, 0);
936N/A return NULL;
936N/A }
0N/A
0N/A /* now get the signature */
0N/A rv = (*ckpFunctions->C_Sign)(ckSessionHandle, ckpData, ckDataLength, ckpSignature, &ckSignatureLength);
0N/A /* END standard code */
0N/A
0N/A
0N/A /* START workaround code for operation abort bug in pkcs#11 of Datakey and iButton */
0N/A/*
0N/A ckpSignature = (CK_BYTE_PTR) malloc(256 * sizeof(CK_BYTE));
936N/A if (ckpSignature == NULL) {
936N/A free(ckpData);
936N/A JNU_ThrowOutOfMemoryError(env, 0);
936N/A return NULL;
936N/A }
0N/A rv = (*ckpFunctions->C_Sign)(ckSessionHandle, ckpData, ckDataLength, ckpSignature, &ckSignatureLength);
0N/A
0N/A if (rv == CKR_BUFFER_TOO_SMALL) {
0N/A free(ckpSignature);
0N/A ckpSignature = (CK_BYTE_PTR) malloc(ckSignatureLength * sizeof(CK_BYTE));
936N/A if (ckpSignature == NULL) {
936N/A free(ckpData);
936N/A JNU_ThrowOutOfMemoryError(env, 0);
936N/A return NULL;
936N/A }
0N/A rv = (*ckpFunctions->C_Sign)(ckSessionHandle, ckpData, ckDataLength, ckpSignature, &ckSignatureLength);
0N/A }
0N/A */
0N/A /* END workaround code */
936N/A if (ckAssertReturnValueOK(env, rv) == CK_ASSERT_OK) {
936N/A jSignature = ckByteArrayToJByteArray(env, ckpSignature, ckSignatureLength);
936N/A }
0N/A free(ckpData);
0N/A free(ckpSignature);
0N/A
0N/A return jSignature ;
0N/A}
0N/A#endif
0N/A
0N/A#ifdef P11_ENABLE_C_SIGNUPDATE
0N/A/*
0N/A * Class: sun_security_pkcs11_wrapper_PKCS11
0N/A * Method: C_SignUpdate
0N/A * Signature: (J[BII)V
0N/A * Parametermapping: *PKCS11*
0N/A * @param jlong jSessionHandle CK_SESSION_HANDLE hSession
0N/A * @param jbyteArray jPart CK_BYTE_PTR pPart
0N/A * CK_ULONG ulPartLen
0N/A */
0N/AJNIEXPORT void JNICALL Java_sun_security_pkcs11_wrapper_PKCS11_C_1SignUpdate
0N/A (JNIEnv *env, jobject obj, jlong jSessionHandle, jlong directIn, jbyteArray jIn, jint jInOfs, jint jInLen)
0N/A{
0N/A CK_SESSION_HANDLE ckSessionHandle;
0N/A CK_RV rv;
0N/A CK_BYTE_PTR bufP;
0N/A CK_BYTE BUF[MAX_STACK_BUFFER_LEN];
0N/A jsize bufLen;
0N/A
0N/A CK_FUNCTION_LIST_PTR ckpFunctions = getFunctionList(env, obj);
0N/A if (ckpFunctions == NULL) { return; }
0N/A
0N/A ckSessionHandle = jLongToCKULong(jSessionHandle);
0N/A
0N/A if (directIn != 0) {
0N/A rv = (*ckpFunctions->C_SignUpdate)(ckSessionHandle, (CK_BYTE_PTR)directIn, jInLen);
0N/A ckAssertReturnValueOK(env, rv);
0N/A return;
0N/A }
0N/A
0N/A if (jInLen <= MAX_STACK_BUFFER_LEN) {
0N/A bufLen = MAX_STACK_BUFFER_LEN;
0N/A bufP = BUF;
0N/A } else {
0N/A bufLen = min(MAX_HEAP_BUFFER_LEN, jInLen);
936N/A bufP = (CK_BYTE_PTR) malloc((size_t)bufLen);
936N/A if (bufP == NULL) {
936N/A JNU_ThrowOutOfMemoryError(env, 0);
936N/A return;
936N/A }
0N/A }
0N/A
0N/A while (jInLen > 0) {
0N/A jsize chunkLen = min(bufLen, jInLen);
0N/A (*env)->GetByteArrayRegion(env, jIn, jInOfs, chunkLen, (jbyte *)bufP);
936N/A if ((*env)->ExceptionCheck(env)) {
936N/A if (bufP != BUF) { free(bufP); }
936N/A return;
936N/A }
0N/A rv = (*ckpFunctions->C_SignUpdate)(ckSessionHandle, bufP, chunkLen);
936N/A if (ckAssertReturnValueOK(env, rv) != CK_ASSERT_OK) {
0N/A if (bufP != BUF) {
0N/A free(bufP);
0N/A }
0N/A return;
0N/A }
0N/A jInOfs += chunkLen;
0N/A jInLen -= chunkLen;
0N/A }
0N/A
936N/A if (bufP != BUF) { free(bufP); }
0N/A}
0N/A#endif
0N/A
0N/A#ifdef P11_ENABLE_C_SIGNFINAL
0N/A/*
0N/A * Class: sun_security_pkcs11_wrapper_PKCS11
0N/A * Method: C_SignFinal
0N/A * Signature: (J)[B
0N/A * Parametermapping: *PKCS11*
0N/A * @param jlong jSessionHandle CK_SESSION_HANDLE hSession
0N/A * @return jbyteArray jSignature CK_BYTE_PTR pSignature
0N/A * CK_ULONG_PTR pulSignatureLen
0N/A */
0N/AJNIEXPORT jbyteArray JNICALL Java_sun_security_pkcs11_wrapper_PKCS11_C_1SignFinal
0N/A (JNIEnv *env, jobject obj, jlong jSessionHandle, jint jExpectedLength)
0N/A{
0N/A CK_SESSION_HANDLE ckSessionHandle;
0N/A jbyteArray jSignature = NULL;
0N/A CK_RV rv;
0N/A CK_BYTE BUF[MAX_STACK_BUFFER_LEN];
0N/A CK_BYTE_PTR bufP = BUF;
0N/A CK_ULONG ckSignatureLength = MAX_STACK_BUFFER_LEN;
0N/A
0N/A CK_FUNCTION_LIST_PTR ckpFunctions = getFunctionList(env, obj);
0N/A if (ckpFunctions == NULL) { return NULL; }
0N/A
0N/A ckSessionHandle = jLongToCKULong(jSessionHandle);
0N/A
0N/A if ((jExpectedLength > 0) && (jExpectedLength < ckSignatureLength)) {
0N/A ckSignatureLength = jExpectedLength;
0N/A }
0N/A
0N/A rv = (*ckpFunctions->C_SignFinal)(ckSessionHandle, bufP, &ckSignatureLength);
0N/A if (rv == CKR_BUFFER_TOO_SMALL) {
0N/A bufP = (CK_BYTE_PTR) malloc(ckSignatureLength);
936N/A if (bufP == NULL) {
936N/A JNU_ThrowOutOfMemoryError(env, 0);
936N/A return NULL;
936N/A }
0N/A rv = (*ckpFunctions->C_SignFinal)(ckSessionHandle, bufP, &ckSignatureLength);
0N/A }
0N/A if (ckAssertReturnValueOK(env, rv) == CK_ASSERT_OK) {
0N/A jSignature = ckByteArrayToJByteArray(env, bufP, ckSignatureLength);
0N/A }
0N/A
936N/A if (bufP != BUF) { free(bufP); }
936N/A
0N/A return jSignature;
0N/A}
0N/A#endif
0N/A
0N/A#ifdef P11_ENABLE_C_SIGNRECOVERINIT
0N/A/*
0N/A * Class: sun_security_pkcs11_wrapper_PKCS11
0N/A * Method: C_SignRecoverInit
0N/A * Signature: (JLsun/security/pkcs11/wrapper/CK_MECHANISM;J)V
0N/A * Parametermapping: *PKCS11*
0N/A * @param jlong jSessionHandle CK_SESSION_HANDLE hSession
0N/A * @param jobject jMechanism CK_MECHANISM_PTR pMechanism
0N/A * @return jlong jKeyHandle CK_OBJECT_HANDLE hKey
0N/A */
0N/AJNIEXPORT void JNICALL Java_sun_security_pkcs11_wrapper_PKCS11_C_1SignRecoverInit
0N/A (JNIEnv *env, jobject obj, jlong jSessionHandle, jobject jMechanism, jlong jKeyHandle)
0N/A{
0N/A CK_SESSION_HANDLE ckSessionHandle;
0N/A CK_MECHANISM ckMechanism;
0N/A CK_OBJECT_HANDLE ckKeyHandle;
0N/A CK_RV rv;
0N/A
0N/A CK_FUNCTION_LIST_PTR ckpFunctions = getFunctionList(env, obj);
0N/A if (ckpFunctions == NULL) { return; }
0N/A
0N/A ckSessionHandle = jLongToCKULong(jSessionHandle);
0N/A jMechanismToCKMechanism(env, jMechanism, &ckMechanism);
936N/A if ((*env)->ExceptionCheck(env)) { return; }
936N/A
0N/A ckKeyHandle = jLongToCKULong(jKeyHandle);
0N/A
0N/A rv = (*ckpFunctions->C_SignRecoverInit)(ckSessionHandle, &ckMechanism, ckKeyHandle);
0N/A
936N/A if (ckMechanism.pParameter != NULL_PTR) {
0N/A free(ckMechanism.pParameter);
0N/A }
0N/A
0N/A if(ckAssertReturnValueOK(env, rv) != CK_ASSERT_OK) { return; }
0N/A}
0N/A#endif
0N/A
0N/A#ifdef P11_ENABLE_C_SIGNRECOVER
0N/A/*
0N/A * Class: sun_security_pkcs11_wrapper_PKCS11
0N/A * Method: C_SignRecover
0N/A * Signature: (J[BII[BII)I
0N/A * Parametermapping: *PKCS11*
0N/A * @param jlong jSessionHandle CK_SESSION_HANDLE hSession
0N/A * @param jbyteArray jData CK_BYTE_PTR pData
0N/A * CK_ULONG ulDataLen
0N/A * @return jbyteArray jSignature CK_BYTE_PTR pSignature
0N/A * CK_ULONG_PTR pulSignatureLen
0N/A */
0N/AJNIEXPORT jint JNICALL Java_sun_security_pkcs11_wrapper_PKCS11_C_1SignRecover
0N/A (JNIEnv *env, jobject obj, jlong jSessionHandle, jbyteArray jIn, jint jInOfs, jint jInLen, jbyteArray jOut, jint jOutOfs, jint jOutLen)
0N/A{
0N/A CK_SESSION_HANDLE ckSessionHandle;
0N/A CK_RV rv;
0N/A CK_BYTE INBUF[MAX_STACK_BUFFER_LEN];
0N/A CK_BYTE OUTBUF[MAX_STACK_BUFFER_LEN];
0N/A CK_BYTE_PTR inBufP;
0N/A CK_BYTE_PTR outBufP = OUTBUF;
0N/A CK_ULONG ckSignatureLength = MAX_STACK_BUFFER_LEN;
0N/A
0N/A CK_FUNCTION_LIST_PTR ckpFunctions = getFunctionList(env, obj);
0N/A if (ckpFunctions == NULL) { return 0; }
0N/A
0N/A ckSessionHandle = jLongToCKULong(jSessionHandle);
0N/A
0N/A if (jInLen <= MAX_STACK_BUFFER_LEN) {
0N/A inBufP = INBUF;
0N/A } else {
936N/A inBufP = (CK_BYTE_PTR) malloc((size_t)jInLen);
936N/A if (inBufP == NULL) {
936N/A JNU_ThrowOutOfMemoryError(env, 0);
936N/A return 0;
936N/A }
0N/A }
0N/A
0N/A (*env)->GetByteArrayRegion(env, jIn, jInOfs, jInLen, (jbyte *)inBufP);
936N/A if ((*env)->ExceptionCheck(env)) {
936N/A if (inBufP != INBUF) { free(inBufP); }
936N/A return 0;
936N/A }
0N/A rv = (*ckpFunctions->C_SignRecover)(ckSessionHandle, inBufP, jInLen, outBufP, &ckSignatureLength);
0N/A /* re-alloc larger buffer if it fits into our Java buffer */
0N/A if ((rv == CKR_BUFFER_TOO_SMALL) && (ckSignatureLength <= jIntToCKULong(jOutLen))) {
0N/A outBufP = (CK_BYTE_PTR) malloc(ckSignatureLength);
936N/A if (outBufP == NULL) {
936N/A if (inBufP != INBUF) {
936N/A free(inBufP);
936N/A }
936N/A JNU_ThrowOutOfMemoryError(env, 0);
936N/A return 0;
936N/A }
0N/A rv = (*ckpFunctions->C_SignRecover)(ckSessionHandle, inBufP, jInLen, outBufP, &ckSignatureLength);
0N/A }
0N/A if (ckAssertReturnValueOK(env, rv) == CK_ASSERT_OK) {
0N/A (*env)->SetByteArrayRegion(env, jOut, jOutOfs, ckSignatureLength, (jbyte *)outBufP);
0N/A }
0N/A
936N/A if (inBufP != INBUF) { free(inBufP); }
936N/A if (outBufP != OUTBUF) { free(outBufP); }
936N/A
0N/A return ckSignatureLength;
0N/A}
0N/A#endif
0N/A
0N/A#ifdef P11_ENABLE_C_VERIFYINIT
0N/A/*
0N/A * Class: sun_security_pkcs11_wrapper_PKCS11
0N/A * Method: C_VerifyInit
0N/A * Signature: (JLsun/security/pkcs11/wrapper/CK_MECHANISM;J)V
0N/A * Parametermapping: *PKCS11*
0N/A * @param jlong jSessionHandle CK_SESSION_HANDLE hSession
0N/A * @param jobject jMechanism CK_MECHANISM_PTR pMechanism
0N/A * @return jlong jKeyHandle CK_OBJECT_HANDLE hKey
0N/A */
0N/AJNIEXPORT void JNICALL Java_sun_security_pkcs11_wrapper_PKCS11_C_1VerifyInit
0N/A (JNIEnv *env, jobject obj, jlong jSessionHandle, jobject jMechanism, jlong jKeyHandle)
0N/A{
0N/A CK_SESSION_HANDLE ckSessionHandle;
0N/A CK_MECHANISM ckMechanism;
0N/A CK_OBJECT_HANDLE ckKeyHandle;
0N/A CK_RV rv;
0N/A
0N/A CK_FUNCTION_LIST_PTR ckpFunctions = getFunctionList(env, obj);
0N/A if (ckpFunctions == NULL) { return; }
0N/A
0N/A ckSessionHandle = jLongToCKULong(jSessionHandle);
0N/A jMechanismToCKMechanism(env, jMechanism, &ckMechanism);
936N/A if ((*env)->ExceptionCheck(env)) { return; }
936N/A
0N/A ckKeyHandle = jLongToCKULong(jKeyHandle);
0N/A
0N/A rv = (*ckpFunctions->C_VerifyInit)(ckSessionHandle, &ckMechanism, ckKeyHandle);
0N/A
0N/A if(ckMechanism.pParameter != NULL_PTR) {
0N/A free(ckMechanism.pParameter);
0N/A }
0N/A
936N/A if (ckAssertReturnValueOK(env, rv) != CK_ASSERT_OK) { return; }
0N/A}
0N/A#endif
0N/A
0N/A#ifdef P11_ENABLE_C_VERIFY
0N/A/*
0N/A * Class: sun_security_pkcs11_wrapper_PKCS11
0N/A * Method: C_Verify
0N/A * Signature: (J[B[B)V
0N/A * Parametermapping: *PKCS11*
0N/A * @param jlong jSessionHandle CK_SESSION_HANDLE hSession
0N/A * @param jbyteArray jData CK_BYTE_PTR pData
0N/A * CK_ULONG ulDataLen
0N/A * @param jbyteArray jSignature CK_BYTE_PTR pSignature
0N/A * CK_ULONG_PTR pulSignatureLen
0N/A */
0N/AJNIEXPORT void JNICALL Java_sun_security_pkcs11_wrapper_PKCS11_C_1Verify
0N/A (JNIEnv *env, jobject obj, jlong jSessionHandle, jbyteArray jData, jbyteArray jSignature)
0N/A{
0N/A CK_SESSION_HANDLE ckSessionHandle;
0N/A CK_BYTE_PTR ckpData = NULL_PTR;
0N/A CK_BYTE_PTR ckpSignature = NULL_PTR;
0N/A CK_ULONG ckDataLength;
0N/A CK_ULONG ckSignatureLength;
0N/A CK_RV rv;
0N/A
0N/A CK_FUNCTION_LIST_PTR ckpFunctions = getFunctionList(env, obj);
0N/A if (ckpFunctions == NULL) { return; }
0N/A
0N/A ckSessionHandle = jLongToCKULong(jSessionHandle);
0N/A jByteArrayToCKByteArray(env, jData, &ckpData, &ckDataLength);
936N/A if ((*env)->ExceptionCheck(env)) { return; }
936N/A
0N/A jByteArrayToCKByteArray(env, jSignature, &ckpSignature, &ckSignatureLength);
936N/A if ((*env)->ExceptionCheck(env)) {
936N/A free(ckpData);
936N/A return;
936N/A }
0N/A
0N/A /* verify the signature */
0N/A rv = (*ckpFunctions->C_Verify)(ckSessionHandle, ckpData, ckDataLength, ckpSignature, ckSignatureLength);
0N/A
0N/A free(ckpData);
0N/A free(ckpSignature);
0N/A
936N/A if (ckAssertReturnValueOK(env, rv) != CK_ASSERT_OK) { return; }
0N/A}
0N/A#endif
0N/A
0N/A#ifdef P11_ENABLE_C_VERIFYUPDATE
0N/A/*
0N/A * Class: sun_security_pkcs11_wrapper_PKCS11
0N/A * Method: C_VerifyUpdate
0N/A * Signature: (J[BII)V
0N/A * Parametermapping: *PKCS11*
0N/A * @param jlong jSessionHandle CK_SESSION_HANDLE hSession
0N/A * @param jbyteArray jPart CK_BYTE_PTR pPart
0N/A * CK_ULONG ulPartLen
0N/A */
0N/AJNIEXPORT void JNICALL Java_sun_security_pkcs11_wrapper_PKCS11_C_1VerifyUpdate
0N/A (JNIEnv *env, jobject obj, jlong jSessionHandle, jlong directIn, jbyteArray jIn, jint jInOfs, jint jInLen)
0N/A{
0N/A CK_SESSION_HANDLE ckSessionHandle;
0N/A CK_RV rv;
0N/A CK_BYTE_PTR bufP;
0N/A CK_BYTE BUF[MAX_STACK_BUFFER_LEN];
0N/A jsize bufLen;
0N/A
0N/A CK_FUNCTION_LIST_PTR ckpFunctions = getFunctionList(env, obj);
0N/A if (ckpFunctions == NULL) { return; }
0N/A
0N/A ckSessionHandle = jLongToCKULong(jSessionHandle);
0N/A
0N/A if (directIn != 0) {
0N/A rv = (*ckpFunctions->C_VerifyUpdate)(ckSessionHandle, (CK_BYTE_PTR)directIn, jInLen);
0N/A ckAssertReturnValueOK(env, rv);
0N/A return;
0N/A }
0N/A
0N/A if (jInLen <= MAX_STACK_BUFFER_LEN) {
0N/A bufLen = MAX_STACK_BUFFER_LEN;
0N/A bufP = BUF;
0N/A } else {
0N/A bufLen = min(MAX_HEAP_BUFFER_LEN, jInLen);
936N/A bufP = (CK_BYTE_PTR) malloc((size_t)bufLen);
936N/A if (bufP == NULL) {
936N/A JNU_ThrowOutOfMemoryError(env, 0);
936N/A return;
936N/A }
0N/A }
0N/A
0N/A while (jInLen > 0) {
0N/A jsize chunkLen = min(bufLen, jInLen);
0N/A (*env)->GetByteArrayRegion(env, jIn, jInOfs, chunkLen, (jbyte *)bufP);
936N/A if ((*env)->ExceptionCheck(env)) {
936N/A if (bufP != BUF) { free(bufP); }
936N/A return;
936N/A }
936N/A
0N/A rv = (*ckpFunctions->C_VerifyUpdate)(ckSessionHandle, bufP, chunkLen);
936N/A if (ckAssertReturnValueOK(env, rv) != CK_ASSERT_OK) {
936N/A if (bufP != BUF) { free(bufP); }
0N/A return;
0N/A }
0N/A jInOfs += chunkLen;
0N/A jInLen -= chunkLen;
0N/A }
0N/A
936N/A if (bufP != BUF) { free(bufP); }
0N/A}
0N/A#endif
0N/A
0N/A#ifdef P11_ENABLE_C_VERIFYFINAL
0N/A/*
0N/A * Class: sun_security_pkcs11_wrapper_PKCS11
0N/A * Method: C_VerifyFinal
0N/A * Signature: (J[B)V
0N/A * Parametermapping: *PKCS11*
0N/A * @param jlong jSessionHandle CK_SESSION_HANDLE hSession
0N/A * @param jbyteArray jSignature CK_BYTE_PTR pSignature
0N/A * CK_ULONG ulSignatureLen
0N/A */
0N/AJNIEXPORT void JNICALL Java_sun_security_pkcs11_wrapper_PKCS11_C_1VerifyFinal
0N/A (JNIEnv *env, jobject obj, jlong jSessionHandle, jbyteArray jSignature)
0N/A{
0N/A CK_SESSION_HANDLE ckSessionHandle;
0N/A CK_BYTE_PTR ckpSignature = NULL_PTR;
0N/A CK_ULONG ckSignatureLength;
0N/A CK_RV rv;
0N/A
0N/A CK_FUNCTION_LIST_PTR ckpFunctions = getFunctionList(env, obj);
0N/A if (ckpFunctions == NULL) { return; }
0N/A
0N/A ckSessionHandle = jLongToCKULong(jSessionHandle);
0N/A jByteArrayToCKByteArray(env, jSignature, &ckpSignature, &ckSignatureLength);
936N/A if ((*env)->ExceptionCheck(env)) { return; }
0N/A
0N/A /* verify the signature */
0N/A rv = (*ckpFunctions->C_VerifyFinal)(ckSessionHandle, ckpSignature, ckSignatureLength);
0N/A
0N/A free(ckpSignature);
0N/A
936N/A if (ckAssertReturnValueOK(env, rv) != CK_ASSERT_OK) { return; }
0N/A}
0N/A#endif
0N/A
0N/A#ifdef P11_ENABLE_C_VERIFYRECOVERINIT
0N/A/*
0N/A * Class: sun_security_pkcs11_wrapper_PKCS11
0N/A * Method: C_VerifyRecoverInit
0N/A * Signature: (JLsun/security/pkcs11/wrapper/CK_MECHANISM;J)V
0N/A * Parametermapping: *PKCS11*
0N/A * @param jlong jSessionHandle CK_SESSION_HANDLE hSession
0N/A * @param jobject jMechanism CK_MECHANISM_PTR pMechanism
0N/A * @return jlong jKeyHandle CK_OBJECT_HANDLE hKey
0N/A */
0N/AJNIEXPORT void JNICALL Java_sun_security_pkcs11_wrapper_PKCS11_C_1VerifyRecoverInit
0N/A (JNIEnv *env, jobject obj, jlong jSessionHandle, jobject jMechanism, jlong jKeyHandle)
0N/A{
0N/A CK_SESSION_HANDLE ckSessionHandle;
0N/A CK_MECHANISM ckMechanism;
0N/A CK_OBJECT_HANDLE ckKeyHandle;
0N/A CK_RV rv;
0N/A
0N/A CK_FUNCTION_LIST_PTR ckpFunctions = getFunctionList(env, obj);
0N/A if (ckpFunctions == NULL) { return; }
0N/A
0N/A ckSessionHandle = jLongToCKULong(jSessionHandle);
0N/A jMechanismToCKMechanism(env, jMechanism, &ckMechanism);
936N/A if ((*env)->ExceptionCheck(env)) { return; }
936N/A
0N/A ckKeyHandle = jLongToCKULong(jKeyHandle);
0N/A
0N/A rv = (*ckpFunctions->C_VerifyRecoverInit)(ckSessionHandle, &ckMechanism, ckKeyHandle);
0N/A
936N/A if (ckMechanism.pParameter != NULL_PTR) {
0N/A free(ckMechanism.pParameter);
0N/A }
0N/A
936N/A if (ckAssertReturnValueOK(env, rv) != CK_ASSERT_OK) { return; }
0N/A}
0N/A#endif
0N/A
0N/A#ifdef P11_ENABLE_C_VERIFYRECOVER
0N/A/*
0N/A * Class: sun_security_pkcs11_wrapper_PKCS11
0N/A * Method: C_VerifyRecover
0N/A * Signature: (J[BII[BII)I
0N/A * Parametermapping: *PKCS11*
0N/A * @param jlong jSessionHandle CK_SESSION_HANDLE hSession
0N/A * @param jbyteArray jSignature CK_BYTE_PTR pSignature
0N/A * CK_ULONG ulSignatureLen
0N/A * @return jbyteArray jData CK_BYTE_PTR pData
0N/A * CK_ULONG_PTR pulDataLen
0N/A */
0N/AJNIEXPORT jint JNICALL Java_sun_security_pkcs11_wrapper_PKCS11_C_1VerifyRecover
0N/A (JNIEnv *env, jobject obj, jlong jSessionHandle, jbyteArray jIn, jint jInOfs, jint jInLen, jbyteArray jOut, jint jOutOfs, jint jOutLen)
0N/A{
0N/A CK_SESSION_HANDLE ckSessionHandle;
0N/A CK_RV rv;
0N/A CK_BYTE INBUF[MAX_STACK_BUFFER_LEN];
0N/A CK_BYTE OUTBUF[MAX_STACK_BUFFER_LEN];
0N/A CK_BYTE_PTR inBufP;
0N/A CK_BYTE_PTR outBufP = OUTBUF;
0N/A CK_ULONG ckDataLength = MAX_STACK_BUFFER_LEN;
0N/A
0N/A CK_FUNCTION_LIST_PTR ckpFunctions = getFunctionList(env, obj);
0N/A if (ckpFunctions == NULL) { return 0; }
0N/A
0N/A ckSessionHandle = jLongToCKULong(jSessionHandle);
0N/A
0N/A if (jInLen <= MAX_STACK_BUFFER_LEN) {
0N/A inBufP = INBUF;
0N/A } else {
936N/A inBufP = (CK_BYTE_PTR) malloc((size_t)jInLen);
936N/A if (inBufP == NULL) {
936N/A JNU_ThrowOutOfMemoryError(env, 0);
936N/A return 0;
936N/A }
0N/A }
0N/A
0N/A (*env)->GetByteArrayRegion(env, jIn, jInOfs, jInLen, (jbyte *)inBufP);
936N/A if ((*env)->ExceptionCheck(env)) {
936N/A if (inBufP != INBUF) { free(inBufP); }
936N/A return 0;
936N/A }
936N/A
0N/A rv = (*ckpFunctions->C_VerifyRecover)(ckSessionHandle, inBufP, jInLen, outBufP, &ckDataLength);
936N/A
0N/A /* re-alloc larger buffer if it fits into our Java buffer */
0N/A if ((rv == CKR_BUFFER_TOO_SMALL) && (ckDataLength <= jIntToCKULong(jOutLen))) {
0N/A outBufP = (CK_BYTE_PTR) malloc(ckDataLength);
936N/A if (outBufP == NULL) {
936N/A if (inBufP != INBUF) { free(inBufP); }
936N/A JNU_ThrowOutOfMemoryError(env, 0);
936N/A return 0;
936N/A }
0N/A rv = (*ckpFunctions->C_VerifyRecover)(ckSessionHandle, inBufP, jInLen, outBufP, &ckDataLength);
0N/A }
0N/A if (ckAssertReturnValueOK(env, rv) == CK_ASSERT_OK) {
0N/A (*env)->SetByteArrayRegion(env, jOut, jOutOfs, ckDataLength, (jbyte *)outBufP);
0N/A }
0N/A
936N/A if (inBufP != INBUF) { free(inBufP); }
936N/A if (outBufP != OUTBUF) { free(outBufP); }
936N/A
0N/A return ckDataLength;
0N/A}
0N/A#endif