1 /*
2 * CDDL HEADER START
3 *
4 * The contents of this file are subject to the terms of the
5 * Common Development and Distribution License (the "License").
6 * You may not use this file except in compliance with the License.
7 *
8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9 * or http://www.opensolaris.org/os/licensing.
10 * See the License for the specific language governing permissions
11 * and limitations under the License.
12 *
13 * When distributing Covered Code, include this CDDL HEADER in each
14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15 * If applicable, add the following below this CDDL HEADER, with the
16 * fields enclosed by brackets "[]" replaced with your own identifying
17 * information: Portions Copyright [yyyy] [name of copyright owner]
18 *
19 * CDDL HEADER END
20 *
21 * Copyright (c) 2010, Oracle and/or its affiliates. All rights reserved.
22 */
23
24 #include <security/cryptoki.h>
25 #include "kmsGlobal.h"
26
27 /*ARGSUSED*/
28 CK_RV
C_VerifyInit(CK_SESSION_HANDLE hSession,CK_MECHANISM_PTR pMechanism,CK_OBJECT_HANDLE hKey)29 C_VerifyInit(CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism,
30 CK_OBJECT_HANDLE hKey)
31 {
32 if (!kms_initialized)
33 return (CKR_CRYPTOKI_NOT_INITIALIZED);
34
35 return (CKR_FUNCTION_NOT_SUPPORTED);
36 }
37
38 /*ARGSUSED*/
39 CK_RV
C_Verify(CK_SESSION_HANDLE hSession,CK_BYTE_PTR pData,CK_ULONG ulDataLen,CK_BYTE_PTR pSignature,CK_ULONG ulSignatureLen)40 C_Verify(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen,
41 CK_BYTE_PTR pSignature, CK_ULONG ulSignatureLen)
42 {
43 if (!kms_initialized)
44 return (CKR_CRYPTOKI_NOT_INITIALIZED);
45
46 return (CKR_FUNCTION_NOT_SUPPORTED);
47 }
48
49 /*ARGSUSED*/
50 CK_RV
C_VerifyUpdate(CK_SESSION_HANDLE hSession,CK_BYTE_PTR pPart,CK_ULONG ulPartLen)51 C_VerifyUpdate(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pPart,
52 CK_ULONG ulPartLen)
53 {
54 if (!kms_initialized)
55 return (CKR_CRYPTOKI_NOT_INITIALIZED);
56
57 return (CKR_FUNCTION_NOT_SUPPORTED);
58 }
59
60 /*ARGSUSED*/
61 CK_RV
C_VerifyFinal(CK_SESSION_HANDLE hSession,CK_BYTE_PTR pSignature,CK_ULONG ulSignatureLen)62 C_VerifyFinal(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature,
63 CK_ULONG ulSignatureLen)
64 {
65 if (!kms_initialized)
66 return (CKR_CRYPTOKI_NOT_INITIALIZED);
67
68 return (CKR_FUNCTION_NOT_SUPPORTED);
69 }
70
71 /*ARGSUSED*/
72 CK_RV
C_VerifyRecoverInit(CK_SESSION_HANDLE hSession,CK_MECHANISM_PTR pMechanism,CK_OBJECT_HANDLE hKey)73 C_VerifyRecoverInit(CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism,
74 CK_OBJECT_HANDLE hKey)
75 {
76 if (!kms_initialized)
77 return (CKR_CRYPTOKI_NOT_INITIALIZED);
78
79 return (CKR_FUNCTION_NOT_SUPPORTED);
80 }
81
82 /*ARGSUSED*/
83 CK_RV
C_VerifyRecover(CK_SESSION_HANDLE hSession,CK_BYTE_PTR pSignature,CK_ULONG ulSignatureLen,CK_BYTE_PTR pData,CK_ULONG_PTR pulDataLen)84 C_VerifyRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSignature,
85 CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen)
86 {
87 if (!kms_initialized)
88 return (CKR_CRYPTOKI_NOT_INITIALIZED);
89
90 return (CKR_FUNCTION_NOT_SUPPORTED);
91 }
92