1*0Sstevel@tonic-gate /*
2*0Sstevel@tonic-gate * CDDL HEADER START
3*0Sstevel@tonic-gate *
4*0Sstevel@tonic-gate * The contents of this file are subject to the terms of the
5*0Sstevel@tonic-gate * Common Development and Distribution License, Version 1.0 only
6*0Sstevel@tonic-gate * (the "License"). You may not use this file except in compliance
7*0Sstevel@tonic-gate * with the License.
8*0Sstevel@tonic-gate *
9*0Sstevel@tonic-gate * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
10*0Sstevel@tonic-gate * or http://www.opensolaris.org/os/licensing.
11*0Sstevel@tonic-gate * See the License for the specific language governing permissions
12*0Sstevel@tonic-gate * and limitations under the License.
13*0Sstevel@tonic-gate *
14*0Sstevel@tonic-gate * When distributing Covered Code, include this CDDL HEADER in each
15*0Sstevel@tonic-gate * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
16*0Sstevel@tonic-gate * If applicable, add the following below this CDDL HEADER, with the
17*0Sstevel@tonic-gate * fields enclosed by brackets "[]" replaced with your own identifying
18*0Sstevel@tonic-gate * information: Portions Copyright [yyyy] [name of copyright owner]
19*0Sstevel@tonic-gate *
20*0Sstevel@tonic-gate * CDDL HEADER END
21*0Sstevel@tonic-gate */
22*0Sstevel@tonic-gate /*
23*0Sstevel@tonic-gate * Copyright 2003 Sun Microsystems, Inc. All rights reserved.
24*0Sstevel@tonic-gate * Use is subject to license terms.
25*0Sstevel@tonic-gate */
26*0Sstevel@tonic-gate
27*0Sstevel@tonic-gate #pragma ident "%Z%%M% %I% %E% SMI"
28*0Sstevel@tonic-gate
29*0Sstevel@tonic-gate #include <security/cryptoki.h>
30*0Sstevel@tonic-gate #include "pkcs11Global.h"
31*0Sstevel@tonic-gate #include "pkcs11Conf.h"
32*0Sstevel@tonic-gate #include "pkcs11Session.h"
33*0Sstevel@tonic-gate #include "pkcs11Slot.h"
34*0Sstevel@tonic-gate
35*0Sstevel@tonic-gate /*
36*0Sstevel@tonic-gate * C_DigestInit will verify that the session handle is valid within
37*0Sstevel@tonic-gate * the framework, that the mechanism is not disabled for the slot
38*0Sstevel@tonic-gate * associated with this session, and then redirect to the underlying
39*0Sstevel@tonic-gate * provider. Policy is only checked for C_DigestInit, since it is
40*0Sstevel@tonic-gate * required to be called before C_Digest and C_DigestUpdate.
41*0Sstevel@tonic-gate */
42*0Sstevel@tonic-gate CK_RV
C_DigestInit(CK_SESSION_HANDLE hSession,CK_MECHANISM_PTR pMechanism)43*0Sstevel@tonic-gate C_DigestInit(CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism)
44*0Sstevel@tonic-gate {
45*0Sstevel@tonic-gate
46*0Sstevel@tonic-gate CK_RV rv;
47*0Sstevel@tonic-gate pkcs11_session_t *sessp;
48*0Sstevel@tonic-gate CK_SLOT_ID slotid;
49*0Sstevel@tonic-gate
50*0Sstevel@tonic-gate /* Check for a fastpath */
51*0Sstevel@tonic-gate if (purefastpath || policyfastpath) {
52*0Sstevel@tonic-gate if (policyfastpath &&
53*0Sstevel@tonic-gate pkcs11_is_dismech(fast_slot, pMechanism->mechanism)) {
54*0Sstevel@tonic-gate return (CKR_MECHANISM_INVALID);
55*0Sstevel@tonic-gate }
56*0Sstevel@tonic-gate return (fast_funcs->C_DigestInit(hSession, pMechanism));
57*0Sstevel@tonic-gate }
58*0Sstevel@tonic-gate
59*0Sstevel@tonic-gate if (!pkcs11_initialized) {
60*0Sstevel@tonic-gate return (CKR_CRYPTOKI_NOT_INITIALIZED);
61*0Sstevel@tonic-gate }
62*0Sstevel@tonic-gate
63*0Sstevel@tonic-gate /* Obtain the session pointer */
64*0Sstevel@tonic-gate HANDLE2SESSION(hSession, sessp, rv);
65*0Sstevel@tonic-gate
66*0Sstevel@tonic-gate if (rv != CKR_OK) {
67*0Sstevel@tonic-gate return (rv);
68*0Sstevel@tonic-gate }
69*0Sstevel@tonic-gate
70*0Sstevel@tonic-gate slotid = sessp->se_slotid;
71*0Sstevel@tonic-gate
72*0Sstevel@tonic-gate /* Make sure this is not a disabled mechanism */
73*0Sstevel@tonic-gate if (pkcs11_is_dismech(slotid, pMechanism->mechanism)) {
74*0Sstevel@tonic-gate return (CKR_MECHANISM_INVALID);
75*0Sstevel@tonic-gate }
76*0Sstevel@tonic-gate
77*0Sstevel@tonic-gate /* Initialize the digest with the underlying provider */
78*0Sstevel@tonic-gate rv = FUNCLIST(slotid)->C_DigestInit(sessp->se_handle,
79*0Sstevel@tonic-gate pMechanism);
80*0Sstevel@tonic-gate
81*0Sstevel@tonic-gate /* Present consistent interface to the application */
82*0Sstevel@tonic-gate if (rv == CKR_FUNCTION_NOT_SUPPORTED) {
83*0Sstevel@tonic-gate return (CKR_FUNCTION_FAILED);
84*0Sstevel@tonic-gate }
85*0Sstevel@tonic-gate
86*0Sstevel@tonic-gate return (rv);
87*0Sstevel@tonic-gate }
88*0Sstevel@tonic-gate
89*0Sstevel@tonic-gate /*
90*0Sstevel@tonic-gate * C_Digest is a pure wrapper to the underlying provider.
91*0Sstevel@tonic-gate * The only argument checked is whether or not hSession is valid.
92*0Sstevel@tonic-gate */
93*0Sstevel@tonic-gate CK_RV
C_Digest(CK_SESSION_HANDLE hSession,CK_BYTE_PTR pData,CK_ULONG ulDataLen,CK_BYTE_PTR pDigest,CK_ULONG_PTR pulDigestLen)94*0Sstevel@tonic-gate C_Digest(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen,
95*0Sstevel@tonic-gate CK_BYTE_PTR pDigest, CK_ULONG_PTR pulDigestLen)
96*0Sstevel@tonic-gate {
97*0Sstevel@tonic-gate
98*0Sstevel@tonic-gate CK_RV rv;
99*0Sstevel@tonic-gate pkcs11_session_t *sessp;
100*0Sstevel@tonic-gate
101*0Sstevel@tonic-gate /* Check for a fastpath */
102*0Sstevel@tonic-gate if (purefastpath || policyfastpath) {
103*0Sstevel@tonic-gate return (fast_funcs->C_Digest(hSession, pData, ulDataLen,
104*0Sstevel@tonic-gate pDigest, pulDigestLen));
105*0Sstevel@tonic-gate }
106*0Sstevel@tonic-gate
107*0Sstevel@tonic-gate if (!pkcs11_initialized) {
108*0Sstevel@tonic-gate return (CKR_CRYPTOKI_NOT_INITIALIZED);
109*0Sstevel@tonic-gate }
110*0Sstevel@tonic-gate
111*0Sstevel@tonic-gate /* Obtain the session pointer */
112*0Sstevel@tonic-gate HANDLE2SESSION(hSession, sessp, rv);
113*0Sstevel@tonic-gate
114*0Sstevel@tonic-gate if (rv != CKR_OK) {
115*0Sstevel@tonic-gate return (rv);
116*0Sstevel@tonic-gate }
117*0Sstevel@tonic-gate
118*0Sstevel@tonic-gate /* Pass data to the provider */
119*0Sstevel@tonic-gate rv = FUNCLIST(sessp->se_slotid)->C_Digest(sessp->se_handle, pData,
120*0Sstevel@tonic-gate ulDataLen, pDigest, pulDigestLen);
121*0Sstevel@tonic-gate
122*0Sstevel@tonic-gate /* Present consistent interface to the application */
123*0Sstevel@tonic-gate if (rv == CKR_FUNCTION_NOT_SUPPORTED) {
124*0Sstevel@tonic-gate return (CKR_FUNCTION_FAILED);
125*0Sstevel@tonic-gate }
126*0Sstevel@tonic-gate
127*0Sstevel@tonic-gate return (rv);
128*0Sstevel@tonic-gate
129*0Sstevel@tonic-gate }
130*0Sstevel@tonic-gate
131*0Sstevel@tonic-gate /*
132*0Sstevel@tonic-gate * C_DigestUpdate is a pure wrapper to the underlying provider.
133*0Sstevel@tonic-gate * The only argument checked is whether or not hSession is valid.
134*0Sstevel@tonic-gate */
135*0Sstevel@tonic-gate CK_RV
C_DigestUpdate(CK_SESSION_HANDLE hSession,CK_BYTE_PTR pPart,CK_ULONG ulPartLen)136*0Sstevel@tonic-gate C_DigestUpdate(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pPart,
137*0Sstevel@tonic-gate CK_ULONG ulPartLen)
138*0Sstevel@tonic-gate {
139*0Sstevel@tonic-gate CK_RV rv;
140*0Sstevel@tonic-gate pkcs11_session_t *sessp;
141*0Sstevel@tonic-gate
142*0Sstevel@tonic-gate /* Check for a fastpath */
143*0Sstevel@tonic-gate if (purefastpath || policyfastpath) {
144*0Sstevel@tonic-gate return (fast_funcs->C_DigestUpdate(hSession, pPart,
145*0Sstevel@tonic-gate ulPartLen));
146*0Sstevel@tonic-gate }
147*0Sstevel@tonic-gate
148*0Sstevel@tonic-gate if (!pkcs11_initialized) {
149*0Sstevel@tonic-gate return (CKR_CRYPTOKI_NOT_INITIALIZED);
150*0Sstevel@tonic-gate }
151*0Sstevel@tonic-gate
152*0Sstevel@tonic-gate /* Obtain the session pointer */
153*0Sstevel@tonic-gate HANDLE2SESSION(hSession, sessp, rv);
154*0Sstevel@tonic-gate
155*0Sstevel@tonic-gate if (rv != CKR_OK) {
156*0Sstevel@tonic-gate return (rv);
157*0Sstevel@tonic-gate }
158*0Sstevel@tonic-gate
159*0Sstevel@tonic-gate /* Pass data to the provider */
160*0Sstevel@tonic-gate rv = FUNCLIST(sessp->se_slotid)->C_DigestUpdate(sessp->se_handle,
161*0Sstevel@tonic-gate pPart, ulPartLen);
162*0Sstevel@tonic-gate
163*0Sstevel@tonic-gate /* Present consistent interface to the application */
164*0Sstevel@tonic-gate if (rv == CKR_FUNCTION_NOT_SUPPORTED) {
165*0Sstevel@tonic-gate return (CKR_FUNCTION_FAILED);
166*0Sstevel@tonic-gate }
167*0Sstevel@tonic-gate
168*0Sstevel@tonic-gate return (rv);
169*0Sstevel@tonic-gate }
170*0Sstevel@tonic-gate
171*0Sstevel@tonic-gate /*
172*0Sstevel@tonic-gate * C_DigestKey is a pure wrapper to the underlying provider.
173*0Sstevel@tonic-gate * The only argument checked is whether or not hSession is valid.
174*0Sstevel@tonic-gate */
175*0Sstevel@tonic-gate CK_RV
C_DigestKey(CK_SESSION_HANDLE hSession,CK_OBJECT_HANDLE hKey)176*0Sstevel@tonic-gate C_DigestKey(CK_SESSION_HANDLE hSession, CK_OBJECT_HANDLE hKey)
177*0Sstevel@tonic-gate {
178*0Sstevel@tonic-gate CK_RV rv;
179*0Sstevel@tonic-gate pkcs11_session_t *sessp;
180*0Sstevel@tonic-gate
181*0Sstevel@tonic-gate /* Check for a fastpath */
182*0Sstevel@tonic-gate if (purefastpath || policyfastpath) {
183*0Sstevel@tonic-gate return (fast_funcs->C_DigestKey(hSession, hKey));
184*0Sstevel@tonic-gate }
185*0Sstevel@tonic-gate
186*0Sstevel@tonic-gate if (!pkcs11_initialized) {
187*0Sstevel@tonic-gate return (CKR_CRYPTOKI_NOT_INITIALIZED);
188*0Sstevel@tonic-gate }
189*0Sstevel@tonic-gate
190*0Sstevel@tonic-gate /* Obtain the session pointer */
191*0Sstevel@tonic-gate HANDLE2SESSION(hSession, sessp, rv);
192*0Sstevel@tonic-gate
193*0Sstevel@tonic-gate if (rv != CKR_OK) {
194*0Sstevel@tonic-gate return (rv);
195*0Sstevel@tonic-gate }
196*0Sstevel@tonic-gate
197*0Sstevel@tonic-gate /* Pass data to the provider */
198*0Sstevel@tonic-gate rv = FUNCLIST(sessp->se_slotid)->C_DigestKey(sessp->se_handle, hKey);
199*0Sstevel@tonic-gate
200*0Sstevel@tonic-gate /* Present consistent interface to the application */
201*0Sstevel@tonic-gate if (rv == CKR_FUNCTION_NOT_SUPPORTED) {
202*0Sstevel@tonic-gate return (CKR_FUNCTION_FAILED);
203*0Sstevel@tonic-gate }
204*0Sstevel@tonic-gate
205*0Sstevel@tonic-gate return (rv);
206*0Sstevel@tonic-gate }
207*0Sstevel@tonic-gate
208*0Sstevel@tonic-gate /*
209*0Sstevel@tonic-gate * C_DigestFinal is a pure wrapper to the underlying provider.
210*0Sstevel@tonic-gate * The only argument checked is whether or not hSession is valid.
211*0Sstevel@tonic-gate */
212*0Sstevel@tonic-gate CK_RV
C_DigestFinal(CK_SESSION_HANDLE hSession,CK_BYTE_PTR pDigest,CK_ULONG_PTR pulDigestLen)213*0Sstevel@tonic-gate C_DigestFinal(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pDigest,
214*0Sstevel@tonic-gate CK_ULONG_PTR pulDigestLen)
215*0Sstevel@tonic-gate {
216*0Sstevel@tonic-gate CK_RV rv;
217*0Sstevel@tonic-gate pkcs11_session_t *sessp;
218*0Sstevel@tonic-gate
219*0Sstevel@tonic-gate /* Check for a fastpath */
220*0Sstevel@tonic-gate if (purefastpath || policyfastpath) {
221*0Sstevel@tonic-gate return (fast_funcs->C_DigestFinal(hSession, pDigest,
222*0Sstevel@tonic-gate pulDigestLen));
223*0Sstevel@tonic-gate }
224*0Sstevel@tonic-gate
225*0Sstevel@tonic-gate if (!pkcs11_initialized) {
226*0Sstevel@tonic-gate return (CKR_CRYPTOKI_NOT_INITIALIZED);
227*0Sstevel@tonic-gate }
228*0Sstevel@tonic-gate
229*0Sstevel@tonic-gate /* Obtain the session pointer */
230*0Sstevel@tonic-gate HANDLE2SESSION(hSession, sessp, rv);
231*0Sstevel@tonic-gate
232*0Sstevel@tonic-gate if (rv != CKR_OK) {
233*0Sstevel@tonic-gate return (rv);
234*0Sstevel@tonic-gate }
235*0Sstevel@tonic-gate
236*0Sstevel@tonic-gate /* Pass data to the provider */
237*0Sstevel@tonic-gate rv = FUNCLIST(sessp->se_slotid)->C_DigestFinal(sessp->se_handle,
238*0Sstevel@tonic-gate pDigest, pulDigestLen);
239*0Sstevel@tonic-gate
240*0Sstevel@tonic-gate /* Present consistent interface to the application */
241*0Sstevel@tonic-gate if (rv == CKR_FUNCTION_NOT_SUPPORTED) {
242*0Sstevel@tonic-gate return (CKR_FUNCTION_FAILED);
243*0Sstevel@tonic-gate }
244*0Sstevel@tonic-gate
245*0Sstevel@tonic-gate return (rv);
246*0Sstevel@tonic-gate }
247