jdk/src/jdk.crypto.token/share/native/libj2pkcs11/p11_sign.c
changeset 43248 5e15de85a1a0
parent 43247 8d242299a219
child 43249 b017b10f62ab
--- a/jdk/src/jdk.crypto.token/share/native/libj2pkcs11/p11_sign.c	Mon Jan 23 14:04:44 2017 +0100
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,674 +0,0 @@
-/*
- * Copyright (c) 2003, 2012, Oracle and/or its affiliates. All rights reserved.
- */
-
-/* Copyright  (c) 2002 Graz University of Technology. All rights reserved.
- *
- * Redistribution and use in  source and binary forms, with or without
- * modification, are permitted  provided that the following conditions are met:
- *
- * 1. Redistributions of  source code must retain the above copyright notice,
- *    this list of conditions and the following disclaimer.
- *
- * 2. Redistributions in  binary form must reproduce the above copyright notice,
- *    this list of conditions and the following disclaimer in the documentation
- *    and/or other materials provided with the distribution.
- *
- * 3. The end-user documentation included with the redistribution, if any, must
- *    include the following acknowledgment:
- *
- *    "This product includes software developed by IAIK of Graz University of
- *     Technology."
- *
- *    Alternately, this acknowledgment may appear in the software itself, if
- *    and wherever such third-party acknowledgments normally appear.
- *
- * 4. The names "Graz University of Technology" and "IAIK of Graz University of
- *    Technology" must not be used to endorse or promote products derived from
- *    this software without prior written permission.
- *
- * 5. Products derived from this software may not be called
- *    "IAIK PKCS Wrapper", nor may "IAIK" appear in their name, without prior
- *    written permission of Graz University of Technology.
- *
- *  THIS SOFTWARE IS PROVIDED "AS IS" AND ANY EXPRESSED OR IMPLIED
- *  WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
- *  WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
- *  PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE LICENSOR BE
- *  LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,
- *  OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
- *  PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA,
- *  OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
- *  ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
- *  OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
- *  OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
- *  POSSIBILITY  OF SUCH DAMAGE.
- */
-
-#include "pkcs11wrapper.h"
-
-#include <stdio.h>
-#include <stdlib.h>
-#include <string.h>
-#include <assert.h>
-#include "jlong.h"
-
-#include "sun_security_pkcs11_wrapper_PKCS11.h"
-
-#ifdef P11_ENABLE_C_SIGNINIT
-/*
- * Class:     sun_security_pkcs11_wrapper_PKCS11
- * Method:    C_SignInit
- * Signature: (JLsun/security/pkcs11/wrapper/CK_MECHANISM;J)V
- * Parametermapping:                    *PKCS11*
- * @param   jlong jSessionHandle        CK_SESSION_HANDLE hSession
- * @param   jobject jMechanism          CK_MECHANISM_PTR pMechanism
- * @return  jlong jKeyHandle            CK_OBJECT_HANDLE hKey
- */
-JNIEXPORT void JNICALL Java_sun_security_pkcs11_wrapper_PKCS11_C_1SignInit
-    (JNIEnv *env, jobject obj, jlong jSessionHandle, jobject jMechanism, jlong jKeyHandle)
-{
-    CK_SESSION_HANDLE ckSessionHandle;
-    CK_MECHANISM ckMechanism;
-    CK_OBJECT_HANDLE ckKeyHandle;
-    CK_RV rv;
-
-    CK_FUNCTION_LIST_PTR ckpFunctions = getFunctionList(env, obj);
-    if (ckpFunctions == NULL) { return; }
-
-    ckSessionHandle = jLongToCKULong(jSessionHandle);
-    jMechanismToCKMechanism(env, jMechanism, &ckMechanism);
-    if ((*env)->ExceptionCheck(env)) { return; }
-    ckKeyHandle = jLongToCKULong(jKeyHandle);
-
-    rv = (*ckpFunctions->C_SignInit)(ckSessionHandle, &ckMechanism, ckKeyHandle);
-
-    if (ckMechanism.pParameter != NULL_PTR) {
-        free(ckMechanism.pParameter);
-    }
-
-    if (ckAssertReturnValueOK(env, rv) != CK_ASSERT_OK) { return; }
-}
-#endif
-
-#ifdef P11_ENABLE_C_SIGN
-/*
- * Class:     sun_security_pkcs11_wrapper_PKCS11
- * Method:    C_Sign
- * Signature: (J[B)[B
- * Parametermapping:                    *PKCS11*
- * @param   jlong jSessionHandle        CK_SESSION_HANDLE hSession
- * @param   jbyteArray jData            CK_BYTE_PTR pData
- *                                      CK_ULONG ulDataLen
- * @return  jbyteArray jSignature       CK_BYTE_PTR pSignature
- *                                      CK_ULONG_PTR pulSignatureLen
- */
-JNIEXPORT jbyteArray JNICALL Java_sun_security_pkcs11_wrapper_PKCS11_C_1Sign
-    (JNIEnv *env, jobject obj, jlong jSessionHandle, jbyteArray jData)
-{
-    CK_SESSION_HANDLE ckSessionHandle;
-    CK_BYTE_PTR ckpData = NULL_PTR;
-    CK_BYTE_PTR ckpSignature;
-    CK_ULONG ckDataLength;
-    CK_ULONG ckSignatureLength = 0;
-    jbyteArray jSignature = NULL;
-    CK_RV rv;
-
-    CK_FUNCTION_LIST_PTR ckpFunctions = getFunctionList(env, obj);
-    if (ckpFunctions == NULL) { return NULL; }
-
-    ckSessionHandle = jLongToCKULong(jSessionHandle);
-    jByteArrayToCKByteArray(env, jData, &ckpData, &ckDataLength);
-    if ((*env)->ExceptionCheck(env)) { return NULL; }
-
-    /* START standard code */
-
-    /* first determine the length of the signature */
-    rv = (*ckpFunctions->C_Sign)(ckSessionHandle, ckpData, ckDataLength, NULL_PTR, &ckSignatureLength);
-    if (ckAssertReturnValueOK(env, rv) != CK_ASSERT_OK) {
-        free(ckpData);
-        return NULL;
-    }
-
-    ckpSignature = (CK_BYTE_PTR) malloc(ckSignatureLength * sizeof(CK_BYTE));
-    if (ckpSignature == NULL) {
-        free(ckpData);
-        throwOutOfMemoryError(env, 0);
-        return NULL;
-    }
-
-    /* now get the signature */
-    rv = (*ckpFunctions->C_Sign)(ckSessionHandle, ckpData, ckDataLength, ckpSignature, &ckSignatureLength);
- /* END standard code */
-
-
-    /* START workaround code for operation abort bug in pkcs#11 of Datakey and iButton */
-/*
-    ckpSignature = (CK_BYTE_PTR) malloc(256 * sizeof(CK_BYTE));
-    if (ckpSignature == NULL) {
-        free(ckpData);
-        throwOutOfMemoryError(env, 0);
-        return NULL;
-    }
-    rv = (*ckpFunctions->C_Sign)(ckSessionHandle, ckpData, ckDataLength, ckpSignature, &ckSignatureLength);
-
-    if (rv == CKR_BUFFER_TOO_SMALL) {
-        free(ckpSignature);
-        ckpSignature = (CK_BYTE_PTR) malloc(ckSignatureLength * sizeof(CK_BYTE));
-        if (ckpSignature == NULL) {
-            free(ckpData);
-            throwOutOfMemoryError(env, 0);
-            return NULL;
-        }
-        rv = (*ckpFunctions->C_Sign)(ckSessionHandle, ckpData, ckDataLength, ckpSignature, &ckSignatureLength);
-    }
- */
-    /* END workaround code */
-    if (ckAssertReturnValueOK(env, rv) == CK_ASSERT_OK) {
-        jSignature = ckByteArrayToJByteArray(env, ckpSignature, ckSignatureLength);
-    }
-    free(ckpData);
-    free(ckpSignature);
-
-    return jSignature ;
-}
-#endif
-
-#ifdef P11_ENABLE_C_SIGNUPDATE
-/*
- * Class:     sun_security_pkcs11_wrapper_PKCS11
- * Method:    C_SignUpdate
- * Signature: (J[BII)V
- * Parametermapping:                    *PKCS11*
- * @param   jlong jSessionHandle        CK_SESSION_HANDLE hSession
- * @param   jbyteArray jPart            CK_BYTE_PTR pPart
- *                                      CK_ULONG ulPartLen
- */
-JNIEXPORT void JNICALL Java_sun_security_pkcs11_wrapper_PKCS11_C_1SignUpdate
-  (JNIEnv *env, jobject obj, jlong jSessionHandle, jlong directIn, jbyteArray jIn, jint jInOfs, jint jInLen)
-{
-    CK_SESSION_HANDLE ckSessionHandle;
-    CK_RV rv;
-    CK_BYTE_PTR bufP;
-    CK_BYTE BUF[MAX_STACK_BUFFER_LEN];
-    jsize bufLen;
-
-    CK_FUNCTION_LIST_PTR ckpFunctions = getFunctionList(env, obj);
-    if (ckpFunctions == NULL) { return; }
-
-    ckSessionHandle = jLongToCKULong(jSessionHandle);
-
-    if (directIn != 0) {
-        rv = (*ckpFunctions->C_SignUpdate)(ckSessionHandle, (CK_BYTE_PTR) jlong_to_ptr(directIn), jInLen);
-        ckAssertReturnValueOK(env, rv);
-        return;
-    }
-
-    if (jInLen <= MAX_STACK_BUFFER_LEN) {
-        bufLen = MAX_STACK_BUFFER_LEN;
-        bufP = BUF;
-    } else {
-        bufLen = min(MAX_HEAP_BUFFER_LEN, jInLen);
-        bufP = (CK_BYTE_PTR) malloc((size_t)bufLen);
-        if (bufP == NULL) {
-            throwOutOfMemoryError(env, 0);
-            return;
-        }
-    }
-
-    while (jInLen > 0) {
-        jsize chunkLen = min(bufLen, jInLen);
-        (*env)->GetByteArrayRegion(env, jIn, jInOfs, chunkLen, (jbyte *)bufP);
-        if ((*env)->ExceptionCheck(env)) {
-            if (bufP != BUF) { free(bufP); }
-            return;
-        }
-        rv = (*ckpFunctions->C_SignUpdate)(ckSessionHandle, bufP, chunkLen);
-        if (ckAssertReturnValueOK(env, rv) != CK_ASSERT_OK) {
-            if (bufP != BUF) {
-                free(bufP);
-            }
-            return;
-        }
-        jInOfs += chunkLen;
-        jInLen -= chunkLen;
-    }
-
-    if (bufP != BUF) { free(bufP); }
-}
-#endif
-
-#ifdef P11_ENABLE_C_SIGNFINAL
-/*
- * Class:     sun_security_pkcs11_wrapper_PKCS11
- * Method:    C_SignFinal
- * Signature: (J)[B
- * Parametermapping:                    *PKCS11*
- * @param   jlong jSessionHandle        CK_SESSION_HANDLE hSession
- * @return  jbyteArray jSignature       CK_BYTE_PTR pSignature
- *                                      CK_ULONG_PTR pulSignatureLen
- */
-JNIEXPORT jbyteArray JNICALL Java_sun_security_pkcs11_wrapper_PKCS11_C_1SignFinal
-    (JNIEnv *env, jobject obj, jlong jSessionHandle, jint jExpectedLength)
-{
-    CK_SESSION_HANDLE ckSessionHandle;
-    jbyteArray jSignature = NULL;
-    CK_RV rv;
-    CK_BYTE BUF[MAX_STACK_BUFFER_LEN];
-    CK_BYTE_PTR bufP = BUF;
-    CK_ULONG ckSignatureLength = MAX_STACK_BUFFER_LEN;
-
-    CK_FUNCTION_LIST_PTR ckpFunctions = getFunctionList(env, obj);
-    if (ckpFunctions == NULL) { return NULL; }
-
-    ckSessionHandle = jLongToCKULong(jSessionHandle);
-
-    if ((jExpectedLength > 0) && ((CK_ULONG)jExpectedLength < ckSignatureLength)) {
-        ckSignatureLength = jExpectedLength;
-    }
-
-    rv = (*ckpFunctions->C_SignFinal)(ckSessionHandle, bufP, &ckSignatureLength);
-    if (rv == CKR_BUFFER_TOO_SMALL) {
-        bufP = (CK_BYTE_PTR) malloc(ckSignatureLength);
-        if (bufP == NULL) {
-            throwOutOfMemoryError(env, 0);
-            return NULL;
-        }
-        rv = (*ckpFunctions->C_SignFinal)(ckSessionHandle, bufP, &ckSignatureLength);
-    }
-    if (ckAssertReturnValueOK(env, rv) == CK_ASSERT_OK) {
-        jSignature = ckByteArrayToJByteArray(env, bufP, ckSignatureLength);
-    }
-
-    if (bufP != BUF) { free(bufP); }
-
-    return jSignature;
-}
-#endif
-
-#ifdef P11_ENABLE_C_SIGNRECOVERINIT
-/*
- * Class:     sun_security_pkcs11_wrapper_PKCS11
- * Method:    C_SignRecoverInit
- * Signature: (JLsun/security/pkcs11/wrapper/CK_MECHANISM;J)V
- * Parametermapping:                    *PKCS11*
- * @param   jlong jSessionHandle        CK_SESSION_HANDLE hSession
- * @param   jobject jMechanism          CK_MECHANISM_PTR pMechanism
- * @return  jlong jKeyHandle            CK_OBJECT_HANDLE hKey
- */
-JNIEXPORT void JNICALL Java_sun_security_pkcs11_wrapper_PKCS11_C_1SignRecoverInit
-    (JNIEnv *env, jobject obj, jlong jSessionHandle, jobject jMechanism, jlong jKeyHandle)
-{
-    CK_SESSION_HANDLE ckSessionHandle;
-    CK_MECHANISM ckMechanism;
-    CK_OBJECT_HANDLE ckKeyHandle;
-    CK_RV rv;
-
-    CK_FUNCTION_LIST_PTR ckpFunctions = getFunctionList(env, obj);
-    if (ckpFunctions == NULL) { return; }
-
-    ckSessionHandle = jLongToCKULong(jSessionHandle);
-    jMechanismToCKMechanism(env, jMechanism, &ckMechanism);
-    if ((*env)->ExceptionCheck(env)) { return; }
-
-    ckKeyHandle = jLongToCKULong(jKeyHandle);
-
-    rv = (*ckpFunctions->C_SignRecoverInit)(ckSessionHandle, &ckMechanism, ckKeyHandle);
-
-    if (ckMechanism.pParameter != NULL_PTR) {
-        free(ckMechanism.pParameter);
-    }
-
-    if(ckAssertReturnValueOK(env, rv) != CK_ASSERT_OK) { return; }
-}
-#endif
-
-#ifdef P11_ENABLE_C_SIGNRECOVER
-/*
- * Class:     sun_security_pkcs11_wrapper_PKCS11
- * Method:    C_SignRecover
- * Signature: (J[BII[BII)I
- * Parametermapping:                    *PKCS11*
- * @param   jlong jSessionHandle        CK_SESSION_HANDLE hSession
- * @param   jbyteArray jData            CK_BYTE_PTR pData
- *                                      CK_ULONG ulDataLen
- * @return  jbyteArray jSignature       CK_BYTE_PTR pSignature
- *                                      CK_ULONG_PTR pulSignatureLen
- */
-JNIEXPORT jint JNICALL Java_sun_security_pkcs11_wrapper_PKCS11_C_1SignRecover
-  (JNIEnv *env, jobject obj, jlong jSessionHandle, jbyteArray jIn, jint jInOfs, jint jInLen, jbyteArray jOut, jint jOutOfs, jint jOutLen)
-{
-    CK_SESSION_HANDLE ckSessionHandle;
-    CK_RV rv;
-    CK_BYTE INBUF[MAX_STACK_BUFFER_LEN];
-    CK_BYTE OUTBUF[MAX_STACK_BUFFER_LEN];
-    CK_BYTE_PTR inBufP;
-    CK_BYTE_PTR outBufP = OUTBUF;
-    CK_ULONG ckSignatureLength = MAX_STACK_BUFFER_LEN;
-
-    CK_FUNCTION_LIST_PTR ckpFunctions = getFunctionList(env, obj);
-    if (ckpFunctions == NULL) { return 0; }
-
-    ckSessionHandle = jLongToCKULong(jSessionHandle);
-
-    if (jInLen <= MAX_STACK_BUFFER_LEN) {
-        inBufP = INBUF;
-    } else {
-        inBufP = (CK_BYTE_PTR) malloc((size_t)jInLen);
-        if (inBufP == NULL) {
-            throwOutOfMemoryError(env, 0);
-            return 0;
-        }
-    }
-
-    (*env)->GetByteArrayRegion(env, jIn, jInOfs, jInLen, (jbyte *)inBufP);
-    if ((*env)->ExceptionCheck(env)) {
-        if (inBufP != INBUF) { free(inBufP); }
-        return 0;
-    }
-    rv = (*ckpFunctions->C_SignRecover)(ckSessionHandle, inBufP, jInLen, outBufP, &ckSignatureLength);
-    /* re-alloc larger buffer if it fits into our Java buffer */
-    if ((rv == CKR_BUFFER_TOO_SMALL) && (ckSignatureLength <= jIntToCKULong(jOutLen))) {
-        outBufP = (CK_BYTE_PTR) malloc(ckSignatureLength);
-        if (outBufP == NULL) {
-            if (inBufP != INBUF) {
-                free(inBufP);
-            }
-            throwOutOfMemoryError(env, 0);
-            return 0;
-        }
-        rv = (*ckpFunctions->C_SignRecover)(ckSessionHandle, inBufP, jInLen, outBufP, &ckSignatureLength);
-    }
-    if (ckAssertReturnValueOK(env, rv) == CK_ASSERT_OK) {
-        (*env)->SetByteArrayRegion(env, jOut, jOutOfs, ckSignatureLength, (jbyte *)outBufP);
-    }
-
-    if (inBufP != INBUF) { free(inBufP); }
-    if (outBufP != OUTBUF) { free(outBufP); }
-
-    return ckSignatureLength;
-}
-#endif
-
-#ifdef P11_ENABLE_C_VERIFYINIT
-/*
- * Class:     sun_security_pkcs11_wrapper_PKCS11
- * Method:    C_VerifyInit
- * Signature: (JLsun/security/pkcs11/wrapper/CK_MECHANISM;J)V
- * Parametermapping:                    *PKCS11*
- * @param   jlong jSessionHandle        CK_SESSION_HANDLE hSession
- * @param   jobject jMechanism          CK_MECHANISM_PTR pMechanism
- * @return  jlong jKeyHandle            CK_OBJECT_HANDLE hKey
- */
-JNIEXPORT void JNICALL Java_sun_security_pkcs11_wrapper_PKCS11_C_1VerifyInit
-    (JNIEnv *env, jobject obj, jlong jSessionHandle, jobject jMechanism, jlong jKeyHandle)
-{
-    CK_SESSION_HANDLE ckSessionHandle;
-    CK_MECHANISM ckMechanism;
-    CK_OBJECT_HANDLE ckKeyHandle;
-    CK_RV rv;
-
-    CK_FUNCTION_LIST_PTR ckpFunctions = getFunctionList(env, obj);
-    if (ckpFunctions == NULL) { return; }
-
-    ckSessionHandle = jLongToCKULong(jSessionHandle);
-    jMechanismToCKMechanism(env, jMechanism, &ckMechanism);
-    if ((*env)->ExceptionCheck(env)) { return; }
-
-    ckKeyHandle = jLongToCKULong(jKeyHandle);
-
-    rv = (*ckpFunctions->C_VerifyInit)(ckSessionHandle, &ckMechanism, ckKeyHandle);
-
-    if(ckMechanism.pParameter != NULL_PTR) {
-        free(ckMechanism.pParameter);
-    }
-
-    if (ckAssertReturnValueOK(env, rv) != CK_ASSERT_OK) { return; }
-}
-#endif
-
-#ifdef P11_ENABLE_C_VERIFY
-/*
- * Class:     sun_security_pkcs11_wrapper_PKCS11
- * Method:    C_Verify
- * Signature: (J[B[B)V
- * Parametermapping:                    *PKCS11*
- * @param   jlong jSessionHandle        CK_SESSION_HANDLE hSession
- * @param   jbyteArray jData            CK_BYTE_PTR pData
- *                                      CK_ULONG ulDataLen
- * @param   jbyteArray jSignature       CK_BYTE_PTR pSignature
- *                                      CK_ULONG_PTR pulSignatureLen
- */
-JNIEXPORT void JNICALL Java_sun_security_pkcs11_wrapper_PKCS11_C_1Verify
-    (JNIEnv *env, jobject obj, jlong jSessionHandle, jbyteArray jData, jbyteArray jSignature)
-{
-    CK_SESSION_HANDLE ckSessionHandle;
-    CK_BYTE_PTR ckpData = NULL_PTR;
-    CK_BYTE_PTR ckpSignature = NULL_PTR;
-    CK_ULONG ckDataLength;
-    CK_ULONG ckSignatureLength;
-    CK_RV rv;
-
-    CK_FUNCTION_LIST_PTR ckpFunctions = getFunctionList(env, obj);
-    if (ckpFunctions == NULL) { return; }
-
-    ckSessionHandle = jLongToCKULong(jSessionHandle);
-    jByteArrayToCKByteArray(env, jData, &ckpData, &ckDataLength);
-    if ((*env)->ExceptionCheck(env)) { return; }
-
-    jByteArrayToCKByteArray(env, jSignature, &ckpSignature, &ckSignatureLength);
-    if ((*env)->ExceptionCheck(env)) {
-        free(ckpData);
-        return;
-    }
-
-    /* verify the signature */
-    rv = (*ckpFunctions->C_Verify)(ckSessionHandle, ckpData, ckDataLength, ckpSignature, ckSignatureLength);
-
-    free(ckpData);
-    free(ckpSignature);
-
-    if (ckAssertReturnValueOK(env, rv) != CK_ASSERT_OK) { return; }
-}
-#endif
-
-#ifdef P11_ENABLE_C_VERIFYUPDATE
-/*
- * Class:     sun_security_pkcs11_wrapper_PKCS11
- * Method:    C_VerifyUpdate
- * Signature: (J[BII)V
- * Parametermapping:                    *PKCS11*
- * @param   jlong jSessionHandle        CK_SESSION_HANDLE hSession
- * @param   jbyteArray jPart            CK_BYTE_PTR pPart
- *                                      CK_ULONG ulPartLen
- */
-JNIEXPORT void JNICALL Java_sun_security_pkcs11_wrapper_PKCS11_C_1VerifyUpdate
-  (JNIEnv *env, jobject obj, jlong jSessionHandle, jlong directIn, jbyteArray jIn, jint jInOfs, jint jInLen)
-{
-    CK_SESSION_HANDLE ckSessionHandle;
-    CK_RV rv;
-    CK_BYTE_PTR bufP;
-    CK_BYTE BUF[MAX_STACK_BUFFER_LEN];
-    jsize bufLen;
-
-    CK_FUNCTION_LIST_PTR ckpFunctions = getFunctionList(env, obj);
-    if (ckpFunctions == NULL) { return; }
-
-    ckSessionHandle = jLongToCKULong(jSessionHandle);
-
-    if (directIn != 0) {
-        rv = (*ckpFunctions->C_VerifyUpdate)(ckSessionHandle, (CK_BYTE_PTR)jlong_to_ptr(directIn), jInLen);
-        ckAssertReturnValueOK(env, rv);
-        return;
-    }
-
-    if (jInLen <= MAX_STACK_BUFFER_LEN) {
-        bufLen = MAX_STACK_BUFFER_LEN;
-        bufP = BUF;
-    } else {
-        bufLen = min(MAX_HEAP_BUFFER_LEN, jInLen);
-        bufP = (CK_BYTE_PTR) malloc((size_t)bufLen);
-        if (bufP == NULL) {
-            throwOutOfMemoryError(env, 0);
-            return;
-        }
-    }
-
-    while (jInLen > 0) {
-        jsize chunkLen = min(bufLen, jInLen);
-        (*env)->GetByteArrayRegion(env, jIn, jInOfs, chunkLen, (jbyte *)bufP);
-        if ((*env)->ExceptionCheck(env)) {
-            if (bufP != BUF) { free(bufP); }
-            return;
-        }
-
-        rv = (*ckpFunctions->C_VerifyUpdate)(ckSessionHandle, bufP, chunkLen);
-        if (ckAssertReturnValueOK(env, rv) != CK_ASSERT_OK) {
-            if (bufP != BUF) { free(bufP); }
-            return;
-        }
-        jInOfs += chunkLen;
-        jInLen -= chunkLen;
-    }
-
-    if (bufP != BUF) { free(bufP); }
-}
-#endif
-
-#ifdef P11_ENABLE_C_VERIFYFINAL
-/*
- * Class:     sun_security_pkcs11_wrapper_PKCS11
- * Method:    C_VerifyFinal
- * Signature: (J[B)V
- * Parametermapping:                    *PKCS11*
- * @param   jlong jSessionHandle        CK_SESSION_HANDLE hSession
- * @param   jbyteArray jSignature       CK_BYTE_PTR pSignature
- *                                      CK_ULONG ulSignatureLen
- */
-JNIEXPORT void JNICALL Java_sun_security_pkcs11_wrapper_PKCS11_C_1VerifyFinal
-    (JNIEnv *env, jobject obj, jlong jSessionHandle, jbyteArray jSignature)
-{
-    CK_SESSION_HANDLE ckSessionHandle;
-    CK_BYTE_PTR ckpSignature = NULL_PTR;
-    CK_ULONG ckSignatureLength;
-    CK_RV rv;
-
-    CK_FUNCTION_LIST_PTR ckpFunctions = getFunctionList(env, obj);
-    if (ckpFunctions == NULL) { return; }
-
-    ckSessionHandle = jLongToCKULong(jSessionHandle);
-    jByteArrayToCKByteArray(env, jSignature, &ckpSignature, &ckSignatureLength);
-    if ((*env)->ExceptionCheck(env)) { return; }
-
-    /* verify the signature */
-    rv = (*ckpFunctions->C_VerifyFinal)(ckSessionHandle, ckpSignature, ckSignatureLength);
-
-    free(ckpSignature);
-
-    if (ckAssertReturnValueOK(env, rv) != CK_ASSERT_OK) { return; }
-}
-#endif
-
-#ifdef P11_ENABLE_C_VERIFYRECOVERINIT
-/*
- * Class:     sun_security_pkcs11_wrapper_PKCS11
- * Method:    C_VerifyRecoverInit
- * Signature: (JLsun/security/pkcs11/wrapper/CK_MECHANISM;J)V
- * Parametermapping:                    *PKCS11*
- * @param   jlong jSessionHandle        CK_SESSION_HANDLE hSession
- * @param   jobject jMechanism          CK_MECHANISM_PTR pMechanism
- * @return  jlong jKeyHandle            CK_OBJECT_HANDLE hKey
- */
-JNIEXPORT void JNICALL Java_sun_security_pkcs11_wrapper_PKCS11_C_1VerifyRecoverInit
-    (JNIEnv *env, jobject obj, jlong jSessionHandle, jobject jMechanism, jlong jKeyHandle)
-{
-    CK_SESSION_HANDLE ckSessionHandle;
-    CK_MECHANISM ckMechanism;
-    CK_OBJECT_HANDLE ckKeyHandle;
-    CK_RV rv;
-
-    CK_FUNCTION_LIST_PTR ckpFunctions = getFunctionList(env, obj);
-    if (ckpFunctions == NULL) { return; }
-
-    ckSessionHandle = jLongToCKULong(jSessionHandle);
-    jMechanismToCKMechanism(env, jMechanism, &ckMechanism);
-    if ((*env)->ExceptionCheck(env)) { return; }
-
-    ckKeyHandle = jLongToCKULong(jKeyHandle);
-
-    rv = (*ckpFunctions->C_VerifyRecoverInit)(ckSessionHandle, &ckMechanism, ckKeyHandle);
-
-    if (ckMechanism.pParameter != NULL_PTR) {
-        free(ckMechanism.pParameter);
-    }
-
-    if (ckAssertReturnValueOK(env, rv) != CK_ASSERT_OK) { return; }
-}
-#endif
-
-#ifdef P11_ENABLE_C_VERIFYRECOVER
-/*
- * Class:     sun_security_pkcs11_wrapper_PKCS11
- * Method:    C_VerifyRecover
- * Signature: (J[BII[BII)I
- * Parametermapping:                    *PKCS11*
- * @param   jlong jSessionHandle        CK_SESSION_HANDLE hSession
- * @param   jbyteArray jSignature       CK_BYTE_PTR pSignature
- *                                      CK_ULONG ulSignatureLen
- * @return  jbyteArray jData            CK_BYTE_PTR pData
- *                                      CK_ULONG_PTR pulDataLen
- */
-JNIEXPORT jint JNICALL Java_sun_security_pkcs11_wrapper_PKCS11_C_1VerifyRecover
-  (JNIEnv *env, jobject obj, jlong jSessionHandle, jbyteArray jIn, jint jInOfs, jint jInLen, jbyteArray jOut, jint jOutOfs, jint jOutLen)
-{
-    CK_SESSION_HANDLE ckSessionHandle;
-    CK_RV rv;
-    CK_BYTE INBUF[MAX_STACK_BUFFER_LEN];
-    CK_BYTE OUTBUF[MAX_STACK_BUFFER_LEN];
-    CK_BYTE_PTR inBufP;
-    CK_BYTE_PTR outBufP = OUTBUF;
-    CK_ULONG ckDataLength = MAX_STACK_BUFFER_LEN;
-
-    CK_FUNCTION_LIST_PTR ckpFunctions = getFunctionList(env, obj);
-    if (ckpFunctions == NULL) { return 0; }
-
-    ckSessionHandle = jLongToCKULong(jSessionHandle);
-
-    if (jInLen <= MAX_STACK_BUFFER_LEN) {
-        inBufP = INBUF;
-    } else {
-        inBufP = (CK_BYTE_PTR) malloc((size_t)jInLen);
-        if (inBufP == NULL) {
-            throwOutOfMemoryError(env, 0);
-            return 0;
-        }
-    }
-
-    (*env)->GetByteArrayRegion(env, jIn, jInOfs, jInLen, (jbyte *)inBufP);
-    if ((*env)->ExceptionCheck(env)) {
-        if (inBufP != INBUF) { free(inBufP); }
-        return 0;
-    }
-
-    rv = (*ckpFunctions->C_VerifyRecover)(ckSessionHandle, inBufP, jInLen, outBufP, &ckDataLength);
-
-    /* re-alloc larger buffer if it fits into our Java buffer */
-    if ((rv == CKR_BUFFER_TOO_SMALL) && (ckDataLength <= jIntToCKULong(jOutLen))) {
-        outBufP = (CK_BYTE_PTR) malloc(ckDataLength);
-        if (outBufP == NULL) {
-            if (inBufP != INBUF) { free(inBufP); }
-            throwOutOfMemoryError(env, 0);
-            return 0;
-        }
-        rv = (*ckpFunctions->C_VerifyRecover)(ckSessionHandle, inBufP, jInLen, outBufP, &ckDataLength);
-    }
-    if (ckAssertReturnValueOK(env, rv) == CK_ASSERT_OK) {
-        (*env)->SetByteArrayRegion(env, jOut, jOutOfs, ckDataLength, (jbyte *)outBufP);
-    }
-
-    if (inBufP != INBUF) { free(inBufP); }
-    if (outBufP != OUTBUF) { free(outBufP); }
-
-    return ckDataLength;
-}
-#endif