Esempio n. 1
0
/*
 * meta_DigestKey
 *
 * NOTE: This function can fail under certain circumstances!
 * Unlike the other crypto functions, we didn't get the key object
 * when the operation was initialized with C_DigestInit().
 * Thus, the slot we're using for the digest operation may
 * not be the slot containing the key -- if the key is extractible we can
 * deal with it, but if it's not the operation will FAIL.
 */
CK_RV
meta_DigestKey(CK_SESSION_HANDLE hSession, CK_OBJECT_HANDLE hKey)
{
	CK_RV rv;
	meta_session_t *session;
	meta_object_t *key;

	rv = meta_handle2session(hSession, &session);
	if (rv != CKR_OK)
		return (rv);

	rv = meta_handle2object(hKey, &key);
	if (rv != CKR_OK) {
		REFRELEASE(session);
		return (rv);
	}

	/* meta_do_operation() will clone the key, if needed. */
	rv = meta_do_operation(OP_DIGEST, MODE_UPDATE_WITHKEY, session, key,
	    NULL, 0, NULL, NULL);

	OBJRELEASE(key);
	REFRELEASE(session);

	return (rv);
}
Esempio n. 2
0
/*
 * meta_EncryptInit
 *
 */
CK_RV
meta_EncryptInit(CK_SESSION_HANDLE hSession, CK_MECHANISM_PTR pMechanism,
    CK_OBJECT_HANDLE hKey)
{
	CK_RV rv;
	meta_session_t *session;
	meta_object_t *key;

	if (pMechanism == NULL)
		return (CKR_ARGUMENTS_BAD);

	rv = meta_handle2session(hSession, &session);
	if (rv != CKR_OK)
		return (rv);

	rv = meta_handle2object(hKey, &key);
	if (rv != CKR_OK) {
		REFRELEASE(session);
		return (rv);
	}

	rv = meta_operation_init_defer(CKF_ENCRYPT, session, pMechanism, key);

	OBJRELEASE(key);
	REFRELEASE(session);

	return (rv);
}