/* * meta_DigestKey * * NOTE: This function can fail under certain circumstances! * Unlike the other crypto functions, we didn't get the key object * when the operation was initialized with C_DigestInit(). * Thus, the slot we're using for the digest operation may * not be the slot containing the key -- if the key is extractible we can * deal with it, but if it's not the operation will FAIL. */ CK_RV meta_DigestKey(CK_SESSION_HANDLE hSession, CK_OBJECT_HANDLE hKey) { CK_RV rv; meta_session_t *session; meta_object_t *key; rv = meta_handle2session(hSession, &session); if (rv != CKR_OK) return (rv); rv = meta_handle2object(hKey, &key); if (rv != CKR_OK) { REFRELEASE(session); return (rv); } /* meta_do_operation() will clone the key, if needed. */ rv = meta_do_operation(OP_DIGEST, MODE_UPDATE_WITHKEY, session, key, NULL, 0, NULL, NULL); OBJRELEASE(key); REFRELEASE(session); return (rv); }
/* * meta_EncryptInit * */ CK_RV meta_EncryptInit(CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism, CK_OBJECT_HANDLE hKey) { CK_RV rv; meta_session_t *session; meta_object_t *key; if (pMechanism == NULL) return (CKR_ARGUMENTS_BAD); rv = meta_handle2session(hSession, &session); if (rv != CKR_OK) return (rv); rv = meta_handle2object(hKey, &key); if (rv != CKR_OK) { REFRELEASE(session); return (rv); } rv = meta_operation_init_defer(CKF_ENCRYPT, session, pMechanism, key); OBJRELEASE(key); REFRELEASE(session); return (rv); }