--- a/jdk/src/jdk.crypto.pkcs11/share/native/libj2pkcs11/p11_dual.c Wed Dec 14 19:46:21 2016 +0100
+++ /dev/null Thu Jan 01 00:00:00 1970 +0000
@@ -1,315 +0,0 @@
-/*
- * Copyright (c) 2003, 2011, Oracle and/or its affiliates. All rights reserved.
- */
-
-/* Copyright (c) 2002 Graz University of Technology. All rights reserved.
- *
- * Redistribution and use in source and binary forms, with or without
- * modification, are permitted provided that the following conditions are met:
- *
- * 1. Redistributions of source code must retain the above copyright notice,
- * this list of conditions and the following disclaimer.
- *
- * 2. Redistributions in binary form must reproduce the above copyright notice,
- * this list of conditions and the following disclaimer in the documentation
- * and/or other materials provided with the distribution.
- *
- * 3. The end-user documentation included with the redistribution, if any, must
- * include the following acknowledgment:
- *
- * "This product includes software developed by IAIK of Graz University of
- * Technology."
- *
- * Alternately, this acknowledgment may appear in the software itself, if
- * and wherever such third-party acknowledgments normally appear.
- *
- * 4. The names "Graz University of Technology" and "IAIK of Graz University of
- * Technology" must not be used to endorse or promote products derived from
- * this software without prior written permission.
- *
- * 5. Products derived from this software may not be called
- * "IAIK PKCS Wrapper", nor may "IAIK" appear in their name, without prior
- * written permission of Graz University of Technology.
- *
- * THIS SOFTWARE IS PROVIDED "AS IS" AND ANY EXPRESSED OR IMPLIED
- * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
- * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
- * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE LICENSOR BE
- * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,
- * OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
- * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA,
- * OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
- * ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
- * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
- * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
- * POSSIBILITY OF SUCH DAMAGE.
- * ===========================================================================
- */
-
-#include "pkcs11wrapper.h"
-
-#include <stdio.h>
-#include <stdlib.h>
-#include <string.h>
-#include <assert.h>
-
-#include "sun_security_pkcs11_wrapper_PKCS11.h"
-
-#ifdef P11_ENABLE_C_DIGESTENCRYPTUPDATE
-/*
- * Class: sun_security_pkcs11_wrapper_PKCS11
- * Method: C_DigestEncryptUpdate
- * Signature: (J[B)[B
- * Parametermapping: *PKCS11*
- * @param jlong jSessionHandle CK_SESSION_HANDLE hSession
- * @param jbyteArray jPart CK_BYTE_PTR pPart
- * CK_ULONG ulPartLen
- * @return jbyteArray jEncryptedPart CK_BYTE_PTR pEncryptedPart
- * CK_ULONG_PTR pulEncryptedPartLen
- */
-JNIEXPORT jbyteArray JNICALL Java_sun_security_pkcs11_wrapper_PKCS11_C_1DigestEncryptUpdate
- (JNIEnv *env, jobject obj, jlong jSessionHandle, jbyteArray jPart)
-{
- CK_SESSION_HANDLE ckSessionHandle;
- CK_BYTE_PTR ckpPart = NULL_PTR, ckpEncryptedPart;
- CK_ULONG ckPartLength, ckEncryptedPartLength = 0;
- jbyteArray jEncryptedPart = NULL;
- CK_RV rv;
-
- CK_FUNCTION_LIST_PTR ckpFunctions = getFunctionList(env, obj);
- if (ckpFunctions == NULL) { return NULL; }
-
- ckSessionHandle = jLongToCKULong(jSessionHandle);
- jByteArrayToCKByteArray(env, jPart, &ckpPart, &ckPartLength);
- if ((*env)->ExceptionCheck(env)) { return NULL; }
-
- rv = (*ckpFunctions->C_DigestEncryptUpdate)(ckSessionHandle, ckpPart, ckPartLength, NULL_PTR, &ckEncryptedPartLength);
- if (ckAssertReturnValueOK(env, rv) != CK_ASSERT_OK) {
- free(ckpPart);
- return NULL;
- }
-
- ckpEncryptedPart = (CK_BYTE_PTR) malloc(ckEncryptedPartLength * sizeof(CK_BYTE));
- if (ckpEncryptedPart == NULL) {
- free(ckpPart);
- throwOutOfMemoryError(env, 0);
- return NULL;
- }
-
- rv = (*ckpFunctions->C_DigestEncryptUpdate)(ckSessionHandle, ckpPart, ckPartLength, ckpEncryptedPart, &ckEncryptedPartLength);
- if (ckAssertReturnValueOK(env, rv) == CK_ASSERT_OK) {
- jEncryptedPart = ckByteArrayToJByteArray(env, ckpEncryptedPart, ckEncryptedPartLength);
- }
- free(ckpPart);
- free(ckpEncryptedPart);
-
- return jEncryptedPart ;
-}
-#endif
-
-#ifdef P11_ENABLE_C_DECRYPTDIGESTUPDATE
-/*
- * Class: sun_security_pkcs11_wrapper_PKCS11
- * Method: C_DecryptDigestUpdate
- * Signature: (J[B)[B
- * Parametermapping: *PKCS11*
- * @param jlong jSessionHandle CK_SESSION_HANDLE hSession
- * @param jbyteArray jEncryptedPart CK_BYTE_PTR pEncryptedPart
- * CK_ULONG ulEncryptedPartLen
- * @return jbyteArray jPart CK_BYTE_PTR pPart
- * CK_ULONG_PTR pulPartLen
- */
-JNIEXPORT jbyteArray JNICALL Java_sun_security_pkcs11_wrapper_PKCS11_C_1DecryptDigestUpdate
- (JNIEnv *env, jobject obj, jlong jSessionHandle, jbyteArray jEncryptedPart)
-{
- CK_SESSION_HANDLE ckSessionHandle;
- CK_BYTE_PTR ckpPart, ckpEncryptedPart = NULL_PTR;
- CK_ULONG ckPartLength = 0, ckEncryptedPartLength;
- jbyteArray jPart = NULL;
- CK_RV rv;
-
- CK_FUNCTION_LIST_PTR ckpFunctions = getFunctionList(env, obj);
- if (ckpFunctions == NULL) { return NULL; }
-
- ckSessionHandle = jLongToCKULong(jSessionHandle);
- jByteArrayToCKByteArray(env, jEncryptedPart, &ckpEncryptedPart, &ckEncryptedPartLength);
- if ((*env)->ExceptionCheck(env)) { return NULL; }
-
- rv = (*ckpFunctions->C_DecryptDigestUpdate)(ckSessionHandle, ckpEncryptedPart, ckEncryptedPartLength, NULL_PTR, &ckPartLength);
- if (ckAssertReturnValueOK(env, rv) != CK_ASSERT_OK) {
- free(ckpEncryptedPart);
- return NULL;
- }
-
- ckpPart = (CK_BYTE_PTR) malloc(ckPartLength * sizeof(CK_BYTE));
- if (ckpPart == NULL) {
- free(ckpEncryptedPart);
- throwOutOfMemoryError(env, 0);
- return NULL;
- }
-
- rv = (*ckpFunctions->C_DecryptDigestUpdate)(ckSessionHandle, ckpEncryptedPart, ckEncryptedPartLength, ckpPart, &ckPartLength);
- if (ckAssertReturnValueOK(env, rv) == CK_ASSERT_OK) {
- jPart = ckByteArrayToJByteArray(env, ckpPart, ckPartLength);
- }
- free(ckpEncryptedPart);
- free(ckpPart);
-
- return jPart ;
-}
-#endif
-
-#ifdef P11_ENABLE_C_SIGNENCRYPTUPDATE
-/*
- * Class: sun_security_pkcs11_wrapper_PKCS11
- * Method: C_SignEncryptUpdate
- * Signature: (J[B)[B
- * Parametermapping: *PKCS11*
- * @param jlong jSessionHandle CK_SESSION_HANDLE hSession
- * @param jbyteArray jPart CK_BYTE_PTR pPart
- * CK_ULONG ulPartLen
- * @return jbyteArray jEncryptedPart CK_BYTE_PTR pEncryptedPart
- * CK_ULONG_PTR pulEncryptedPartLen
- */
-JNIEXPORT jbyteArray JNICALL Java_sun_security_pkcs11_wrapper_PKCS11_C_1SignEncryptUpdate
- (JNIEnv *env, jobject obj, jlong jSessionHandle, jbyteArray jPart)
-{
- CK_SESSION_HANDLE ckSessionHandle;
- CK_BYTE_PTR ckpPart = NULL_PTR, ckpEncryptedPart;
- CK_ULONG ckPartLength, ckEncryptedPartLength = 0;
- jbyteArray jEncryptedPart = NULL;
- CK_RV rv;
-
- CK_FUNCTION_LIST_PTR ckpFunctions = getFunctionList(env, obj);
- if (ckpFunctions == NULL) { return NULL; }
-
- ckSessionHandle = jLongToCKULong(jSessionHandle);
- jByteArrayToCKByteArray(env, jPart, &ckpPart, &ckPartLength);
- if ((*env)->ExceptionCheck(env)) { return NULL; }
-
- rv = (*ckpFunctions->C_SignEncryptUpdate)(ckSessionHandle, ckpPart, ckPartLength, NULL_PTR, &ckEncryptedPartLength);
- if (ckAssertReturnValueOK(env, rv) != CK_ASSERT_OK) {
- free(ckpPart);
- return NULL;
- }
-
- ckpEncryptedPart = (CK_BYTE_PTR) malloc(ckEncryptedPartLength * sizeof(CK_BYTE));
- if (ckpEncryptedPart == NULL) {
- free(ckpPart);
- throwOutOfMemoryError(env, 0);
- return NULL;
- }
-
- rv = (*ckpFunctions->C_SignEncryptUpdate)(ckSessionHandle, ckpPart, ckPartLength, ckpEncryptedPart, &ckEncryptedPartLength);
- if (ckAssertReturnValueOK(env, rv) == CK_ASSERT_OK) {
- jEncryptedPart = ckByteArrayToJByteArray(env, ckpEncryptedPart, ckEncryptedPartLength);
- }
- free(ckpPart);
- free(ckpEncryptedPart);
-
- return jEncryptedPart ;
-}
-#endif
-
-#ifdef P11_ENABLE_C_DECRYPTVERIFYUPDATE
-/*
- * Class: sun_security_pkcs11_wrapper_PKCS11
- * Method: C_DecryptVerifyUpdate
- * Signature: (J[B)[B
- * Parametermapping: *PKCS11*
- * @param jlong jSessionHandle CK_SESSION_HANDLE hSession
- * @param jbyteArray jEncryptedPart CK_BYTE_PTR pEncryptedPart
- * CK_ULONG ulEncryptedPartLen
- * @return jbyteArray jPart CK_BYTE_PTR pPart
- * CK_ULONG_PTR pulPartLen
- */
-JNIEXPORT jbyteArray JNICALL Java_sun_security_pkcs11_wrapper_PKCS11_C_1DecryptVerifyUpdate
- (JNIEnv *env, jobject obj, jlong jSessionHandle, jbyteArray jEncryptedPart)
-{
- CK_SESSION_HANDLE ckSessionHandle;
- CK_BYTE_PTR ckpPart, ckpEncryptedPart = NULL_PTR;
- CK_ULONG ckPartLength = 0, ckEncryptedPartLength;
- jbyteArray jPart = NULL;
- CK_RV rv;
-
- CK_FUNCTION_LIST_PTR ckpFunctions = getFunctionList(env, obj);
- if (ckpFunctions == NULL) { return NULL; }
-
- ckSessionHandle = jLongToCKULong(jSessionHandle);
- jByteArrayToCKByteArray(env, jEncryptedPart, &ckpEncryptedPart, &ckEncryptedPartLength);
- if ((*env)->ExceptionCheck(env)) { return NULL; }
-
- rv = (*ckpFunctions->C_DecryptVerifyUpdate)(ckSessionHandle, ckpEncryptedPart, ckEncryptedPartLength, NULL_PTR, &ckPartLength);
- if (ckAssertReturnValueOK(env, rv) != CK_ASSERT_OK) {
- free(ckpEncryptedPart);
- return NULL;
- }
-
- ckpPart = (CK_BYTE_PTR) malloc(ckPartLength * sizeof(CK_BYTE));
- if (ckpPart == NULL) {
- free(ckpEncryptedPart);
- throwOutOfMemoryError(env, 0);
- return NULL;
- }
-
- rv = (*ckpFunctions->C_DecryptVerifyUpdate)(ckSessionHandle, ckpEncryptedPart, ckEncryptedPartLength, ckpPart, &ckPartLength);
-
- if (ckAssertReturnValueOK(env, rv) == CK_ASSERT_OK) {
- jPart = ckByteArrayToJByteArray(env, ckpPart, ckPartLength);
- }
- free(ckpEncryptedPart);
- free(ckpPart);
-
- return jPart ;
-}
-#endif
-
-#ifdef P11_ENABLE_C_GETFUNCTIONSTATUS
-/*
- * Class: sun_security_pkcs11_wrapper_PKCS11
- * Method: C_GetFunctionStatus
- * Signature: (J)V
- * Parametermapping: *PKCS11*
- * @param jlong jSessionHandle CK_SESSION_HANDLE hSession
- */
-JNIEXPORT void JNICALL Java_sun_security_pkcs11_wrapper_PKCS11_C_1GetFunctionStatus
- (JNIEnv *env, jobject obj, jlong jSessionHandle)
-{
- CK_SESSION_HANDLE ckSessionHandle;
- CK_RV rv;
-
- CK_FUNCTION_LIST_PTR ckpFunctions = getFunctionList(env, obj);
- if (ckpFunctions == NULL) { return; }
-
- ckSessionHandle = jLongToCKULong(jSessionHandle);
-
- /* C_GetFunctionStatus should always return CKR_FUNCTION_NOT_PARALLEL */
- rv = (*ckpFunctions->C_GetFunctionStatus)(ckSessionHandle);
- if (ckAssertReturnValueOK(env, rv) != CK_ASSERT_OK) { return; }
-}
-#endif
-
-#ifdef P11_ENABLE_C_CANCELFUNCTION
-/*
- * Class: sun_security_pkcs11_wrapper_PKCS11
- * Method: C_CancelFunction
- * Signature: (J)V
- * Parametermapping: *PKCS11*
- * @param jlong jSessionHandle CK_SESSION_HANDLE hSession
- */
-JNIEXPORT void JNICALL Java_sun_security_pkcs11_wrapper_PKCS11_C_1CancelFunction
- (JNIEnv *env, jobject obj, jlong jSessionHandle)
-{
- CK_SESSION_HANDLE ckSessionHandle;
- CK_RV rv;
-
- CK_FUNCTION_LIST_PTR ckpFunctions = getFunctionList(env, obj);
- if (ckpFunctions == NULL) { return; }
-
- ckSessionHandle = jLongToCKULong(jSessionHandle);
-
- /* C_GetFunctionStatus should always return CKR_FUNCTION_NOT_PARALLEL */
- rv = (*ckpFunctions->C_CancelFunction)(ckSessionHandle);
- if (ckAssertReturnValueOK(env, rv) != CK_ASSERT_OK) { return; }
-}
-#endif