1 /*
2 * CDDL HEADER START
3 *
4 * The contents of this file are subject to the terms of the
5 * Common Development and Distribution License, Version 1.0 only
6 * (the "License"). You may not use this file except in compliance
7 * with the License.
8 *
9 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
10 * or http://www.opensolaris.org/os/licensing.
11 * See the License for the specific language governing permissions
12 * and limitations under the License.
13 *
14 * When distributing Covered Code, include this CDDL HEADER in each
15 * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
16 * If applicable, add the following below this CDDL HEADER, with the
17 * fields enclosed by brackets "[]" replaced with your own identifying
18 * information: Portions Copyright [yyyy] [name of copyright owner]
19 *
20 * CDDL HEADER END
21 */
22 /*
23 * Copyright 2003 Sun Microsystems, Inc. All rights reserved.
24 * Use is subject to license terms.
25 */
26
27 #pragma ident "%Z%%M% %I% %E% SMI"
28
29 #include <security/cryptoki.h>
30 #include "softGlobal.h"
31 #include "softSession.h"
32 #include "softObject.h"
33 #include "softOps.h"
34
35 CK_RV
C_DigestEncryptUpdate(CK_SESSION_HANDLE hSession,CK_BYTE_PTR pPart,CK_ULONG ulPartLen,CK_BYTE_PTR pEncryptedPart,CK_ULONG_PTR pulEncryptedPartLen)36 C_DigestEncryptUpdate(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pPart,
37 CK_ULONG ulPartLen, CK_BYTE_PTR pEncryptedPart,
38 CK_ULONG_PTR pulEncryptedPartLen)
39 {
40
41 CK_RV rv;
42
43 /*
44 * All the front-end checkings will be done in the
45 * C_EncryptUpdate and C_DigestUpdate.
46 */
47 rv = C_EncryptUpdate(hSession, pPart, ulPartLen,
48 pEncryptedPart, pulEncryptedPartLen);
49
50 if (rv != CKR_OK)
51 return (rv);
52
53 /*
54 * If the application just wants to know the length of output
55 * buffer, then we do not digest the data.
56 */
57 if (pEncryptedPart == NULL)
58 return (CKR_OK);
59
60 return (C_DigestUpdate(hSession, pPart, ulPartLen));
61 }
62
63
64 CK_RV
C_DecryptDigestUpdate(CK_SESSION_HANDLE hSession,CK_BYTE_PTR pEncryptedPart,CK_ULONG ulEncryptedPartLen,CK_BYTE_PTR pPart,CK_ULONG_PTR pulPartLen)65 C_DecryptDigestUpdate(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pEncryptedPart,
66 CK_ULONG ulEncryptedPartLen, CK_BYTE_PTR pPart, CK_ULONG_PTR pulPartLen)
67 {
68
69 CK_RV rv;
70
71 /*
72 * All the front-end checkings will be done in the
73 * C_DecryptUpdate and C_DigestUpdate.
74 */
75 rv = C_DecryptUpdate(hSession, pEncryptedPart, ulEncryptedPartLen,
76 pPart, pulPartLen);
77
78 if (rv != CKR_OK)
79 return (rv);
80
81 /*
82 * If the application just wants to know the length of output
83 * buffer, then we do not digest the data.
84 */
85 if (pPart == NULL)
86 return (CKR_OK);
87
88 return (C_DigestUpdate(hSession, pPart, *pulPartLen));
89 }
90
91
92 CK_RV
C_SignEncryptUpdate(CK_SESSION_HANDLE hSession,CK_BYTE_PTR pPart,CK_ULONG ulPartLen,CK_BYTE_PTR pEncryptedPart,CK_ULONG_PTR pulEncryptedPartLen)93 C_SignEncryptUpdate(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pPart,
94 CK_ULONG ulPartLen, CK_BYTE_PTR pEncryptedPart,
95 CK_ULONG_PTR pulEncryptedPartLen)
96 {
97
98 CK_RV rv;
99
100 /*
101 * All the front-end checkings will be done in the
102 * C_EncryptUpdate and C_SignUpdate.
103 */
104 rv = C_EncryptUpdate(hSession, pPart, ulPartLen,
105 pEncryptedPart, pulEncryptedPartLen);
106
107 if (rv != CKR_OK)
108 return (rv);
109
110 /*
111 * If the application just wants to know the length of output
112 * buffer, then we do not sign the data.
113 */
114 if (pEncryptedPart == NULL)
115 return (CKR_OK);
116
117 return (C_SignUpdate(hSession, pPart, ulPartLen));
118 }
119
120
121 CK_RV
C_DecryptVerifyUpdate(CK_SESSION_HANDLE hSession,CK_BYTE_PTR pEncryptedPart,CK_ULONG ulEncryptedPartLen,CK_BYTE_PTR pPart,CK_ULONG_PTR pulPartLen)122 C_DecryptVerifyUpdate(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pEncryptedPart,
123 CK_ULONG ulEncryptedPartLen, CK_BYTE_PTR pPart, CK_ULONG_PTR pulPartLen)
124 {
125
126 CK_RV rv;
127
128 /*
129 * All the front-end checkings will be done in the
130 * C_DecryptUpdate and C_VerifyUpdate.
131 */
132 rv = C_DecryptUpdate(hSession, pEncryptedPart, ulEncryptedPartLen,
133 pPart, pulPartLen);
134
135 if (rv != CKR_OK)
136 return (rv);
137
138 /*
139 * If the application just wants to know the length of output
140 * buffer, then we do not verify the data.
141 */
142 if (pPart == NULL)
143 return (CKR_OK);
144
145 return (C_VerifyUpdate(hSession, pPart, *pulPartLen));
146 }
147