--- old/jdk/src/jdk.crypto.pkcs11/share/native/libj2pkcs11/p11_dual.c 2016-12-13 21:44:32.000000000 -0800 +++ /dev/null 2016-12-13 21:44:32.000000000 -0800 @@ -1,315 +0,0 @@ -/* - * Copyright (c) 2003, 2011, Oracle and/or its affiliates. All rights reserved. - */ - -/* Copyright (c) 2002 Graz University of Technology. All rights reserved. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions are met: - * - * 1. Redistributions of source code must retain the above copyright notice, - * this list of conditions and the following disclaimer. - * - * 2. Redistributions in binary form must reproduce the above copyright notice, - * this list of conditions and the following disclaimer in the documentation - * and/or other materials provided with the distribution. - * - * 3. The end-user documentation included with the redistribution, if any, must - * include the following acknowledgment: - * - * "This product includes software developed by IAIK of Graz University of - * Technology." - * - * Alternately, this acknowledgment may appear in the software itself, if - * and wherever such third-party acknowledgments normally appear. - * - * 4. The names "Graz University of Technology" and "IAIK of Graz University of - * Technology" must not be used to endorse or promote products derived from - * this software without prior written permission. - * - * 5. Products derived from this software may not be called - * "IAIK PKCS Wrapper", nor may "IAIK" appear in their name, without prior - * written permission of Graz University of Technology. - * - * THIS SOFTWARE IS PROVIDED "AS IS" AND ANY EXPRESSED OR IMPLIED - * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED - * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR - * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE LICENSOR BE - * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, - * OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, - * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, - * OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON - * ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, - * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY - * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE - * POSSIBILITY OF SUCH DAMAGE. - * =========================================================================== - */ - -#include "pkcs11wrapper.h" - -#include -#include -#include -#include - -#include "sun_security_pkcs11_wrapper_PKCS11.h" - -#ifdef P11_ENABLE_C_DIGESTENCRYPTUPDATE -/* - * Class: sun_security_pkcs11_wrapper_PKCS11 - * Method: C_DigestEncryptUpdate - * Signature: (J[B)[B - * Parametermapping: *PKCS11* - * @param jlong jSessionHandle CK_SESSION_HANDLE hSession - * @param jbyteArray jPart CK_BYTE_PTR pPart - * CK_ULONG ulPartLen - * @return jbyteArray jEncryptedPart CK_BYTE_PTR pEncryptedPart - * CK_ULONG_PTR pulEncryptedPartLen - */ -JNIEXPORT jbyteArray JNICALL Java_sun_security_pkcs11_wrapper_PKCS11_C_1DigestEncryptUpdate - (JNIEnv *env, jobject obj, jlong jSessionHandle, jbyteArray jPart) -{ - CK_SESSION_HANDLE ckSessionHandle; - CK_BYTE_PTR ckpPart = NULL_PTR, ckpEncryptedPart; - CK_ULONG ckPartLength, ckEncryptedPartLength = 0; - jbyteArray jEncryptedPart = NULL; - CK_RV rv; - - CK_FUNCTION_LIST_PTR ckpFunctions = getFunctionList(env, obj); - if (ckpFunctions == NULL) { return NULL; } - - ckSessionHandle = jLongToCKULong(jSessionHandle); - jByteArrayToCKByteArray(env, jPart, &ckpPart, &ckPartLength); - if ((*env)->ExceptionCheck(env)) { return NULL; } - - rv = (*ckpFunctions->C_DigestEncryptUpdate)(ckSessionHandle, ckpPart, ckPartLength, NULL_PTR, &ckEncryptedPartLength); - if (ckAssertReturnValueOK(env, rv) != CK_ASSERT_OK) { - free(ckpPart); - return NULL; - } - - ckpEncryptedPart = (CK_BYTE_PTR) malloc(ckEncryptedPartLength * sizeof(CK_BYTE)); - if (ckpEncryptedPart == NULL) { - free(ckpPart); - throwOutOfMemoryError(env, 0); - return NULL; - } - - rv = (*ckpFunctions->C_DigestEncryptUpdate)(ckSessionHandle, ckpPart, ckPartLength, ckpEncryptedPart, &ckEncryptedPartLength); - if (ckAssertReturnValueOK(env, rv) == CK_ASSERT_OK) { - jEncryptedPart = ckByteArrayToJByteArray(env, ckpEncryptedPart, ckEncryptedPartLength); - } - free(ckpPart); - free(ckpEncryptedPart); - - return jEncryptedPart ; -} -#endif - -#ifdef P11_ENABLE_C_DECRYPTDIGESTUPDATE -/* - * Class: sun_security_pkcs11_wrapper_PKCS11 - * Method: C_DecryptDigestUpdate - * Signature: (J[B)[B - * Parametermapping: *PKCS11* - * @param jlong jSessionHandle CK_SESSION_HANDLE hSession - * @param jbyteArray jEncryptedPart CK_BYTE_PTR pEncryptedPart - * CK_ULONG ulEncryptedPartLen - * @return jbyteArray jPart CK_BYTE_PTR pPart - * CK_ULONG_PTR pulPartLen - */ -JNIEXPORT jbyteArray JNICALL Java_sun_security_pkcs11_wrapper_PKCS11_C_1DecryptDigestUpdate - (JNIEnv *env, jobject obj, jlong jSessionHandle, jbyteArray jEncryptedPart) -{ - CK_SESSION_HANDLE ckSessionHandle; - CK_BYTE_PTR ckpPart, ckpEncryptedPart = NULL_PTR; - CK_ULONG ckPartLength = 0, ckEncryptedPartLength; - jbyteArray jPart = NULL; - CK_RV rv; - - CK_FUNCTION_LIST_PTR ckpFunctions = getFunctionList(env, obj); - if (ckpFunctions == NULL) { return NULL; } - - ckSessionHandle = jLongToCKULong(jSessionHandle); - jByteArrayToCKByteArray(env, jEncryptedPart, &ckpEncryptedPart, &ckEncryptedPartLength); - if ((*env)->ExceptionCheck(env)) { return NULL; } - - rv = (*ckpFunctions->C_DecryptDigestUpdate)(ckSessionHandle, ckpEncryptedPart, ckEncryptedPartLength, NULL_PTR, &ckPartLength); - if (ckAssertReturnValueOK(env, rv) != CK_ASSERT_OK) { - free(ckpEncryptedPart); - return NULL; - } - - ckpPart = (CK_BYTE_PTR) malloc(ckPartLength * sizeof(CK_BYTE)); - if (ckpPart == NULL) { - free(ckpEncryptedPart); - throwOutOfMemoryError(env, 0); - return NULL; - } - - rv = (*ckpFunctions->C_DecryptDigestUpdate)(ckSessionHandle, ckpEncryptedPart, ckEncryptedPartLength, ckpPart, &ckPartLength); - if (ckAssertReturnValueOK(env, rv) == CK_ASSERT_OK) { - jPart = ckByteArrayToJByteArray(env, ckpPart, ckPartLength); - } - free(ckpEncryptedPart); - free(ckpPart); - - return jPart ; -} -#endif - -#ifdef P11_ENABLE_C_SIGNENCRYPTUPDATE -/* - * Class: sun_security_pkcs11_wrapper_PKCS11 - * Method: C_SignEncryptUpdate - * Signature: (J[B)[B - * Parametermapping: *PKCS11* - * @param jlong jSessionHandle CK_SESSION_HANDLE hSession - * @param jbyteArray jPart CK_BYTE_PTR pPart - * CK_ULONG ulPartLen - * @return jbyteArray jEncryptedPart CK_BYTE_PTR pEncryptedPart - * CK_ULONG_PTR pulEncryptedPartLen - */ -JNIEXPORT jbyteArray JNICALL Java_sun_security_pkcs11_wrapper_PKCS11_C_1SignEncryptUpdate - (JNIEnv *env, jobject obj, jlong jSessionHandle, jbyteArray jPart) -{ - CK_SESSION_HANDLE ckSessionHandle; - CK_BYTE_PTR ckpPart = NULL_PTR, ckpEncryptedPart; - CK_ULONG ckPartLength, ckEncryptedPartLength = 0; - jbyteArray jEncryptedPart = NULL; - CK_RV rv; - - CK_FUNCTION_LIST_PTR ckpFunctions = getFunctionList(env, obj); - if (ckpFunctions == NULL) { return NULL; } - - ckSessionHandle = jLongToCKULong(jSessionHandle); - jByteArrayToCKByteArray(env, jPart, &ckpPart, &ckPartLength); - if ((*env)->ExceptionCheck(env)) { return NULL; } - - rv = (*ckpFunctions->C_SignEncryptUpdate)(ckSessionHandle, ckpPart, ckPartLength, NULL_PTR, &ckEncryptedPartLength); - if (ckAssertReturnValueOK(env, rv) != CK_ASSERT_OK) { - free(ckpPart); - return NULL; - } - - ckpEncryptedPart = (CK_BYTE_PTR) malloc(ckEncryptedPartLength * sizeof(CK_BYTE)); - if (ckpEncryptedPart == NULL) { - free(ckpPart); - throwOutOfMemoryError(env, 0); - return NULL; - } - - rv = (*ckpFunctions->C_SignEncryptUpdate)(ckSessionHandle, ckpPart, ckPartLength, ckpEncryptedPart, &ckEncryptedPartLength); - if (ckAssertReturnValueOK(env, rv) == CK_ASSERT_OK) { - jEncryptedPart = ckByteArrayToJByteArray(env, ckpEncryptedPart, ckEncryptedPartLength); - } - free(ckpPart); - free(ckpEncryptedPart); - - return jEncryptedPart ; -} -#endif - -#ifdef P11_ENABLE_C_DECRYPTVERIFYUPDATE -/* - * Class: sun_security_pkcs11_wrapper_PKCS11 - * Method: C_DecryptVerifyUpdate - * Signature: (J[B)[B - * Parametermapping: *PKCS11* - * @param jlong jSessionHandle CK_SESSION_HANDLE hSession - * @param jbyteArray jEncryptedPart CK_BYTE_PTR pEncryptedPart - * CK_ULONG ulEncryptedPartLen - * @return jbyteArray jPart CK_BYTE_PTR pPart - * CK_ULONG_PTR pulPartLen - */ -JNIEXPORT jbyteArray JNICALL Java_sun_security_pkcs11_wrapper_PKCS11_C_1DecryptVerifyUpdate - (JNIEnv *env, jobject obj, jlong jSessionHandle, jbyteArray jEncryptedPart) -{ - CK_SESSION_HANDLE ckSessionHandle; - CK_BYTE_PTR ckpPart, ckpEncryptedPart = NULL_PTR; - CK_ULONG ckPartLength = 0, ckEncryptedPartLength; - jbyteArray jPart = NULL; - CK_RV rv; - - CK_FUNCTION_LIST_PTR ckpFunctions = getFunctionList(env, obj); - if (ckpFunctions == NULL) { return NULL; } - - ckSessionHandle = jLongToCKULong(jSessionHandle); - jByteArrayToCKByteArray(env, jEncryptedPart, &ckpEncryptedPart, &ckEncryptedPartLength); - if ((*env)->ExceptionCheck(env)) { return NULL; } - - rv = (*ckpFunctions->C_DecryptVerifyUpdate)(ckSessionHandle, ckpEncryptedPart, ckEncryptedPartLength, NULL_PTR, &ckPartLength); - if (ckAssertReturnValueOK(env, rv) != CK_ASSERT_OK) { - free(ckpEncryptedPart); - return NULL; - } - - ckpPart = (CK_BYTE_PTR) malloc(ckPartLength * sizeof(CK_BYTE)); - if (ckpPart == NULL) { - free(ckpEncryptedPart); - throwOutOfMemoryError(env, 0); - return NULL; - } - - rv = (*ckpFunctions->C_DecryptVerifyUpdate)(ckSessionHandle, ckpEncryptedPart, ckEncryptedPartLength, ckpPart, &ckPartLength); - - if (ckAssertReturnValueOK(env, rv) == CK_ASSERT_OK) { - jPart = ckByteArrayToJByteArray(env, ckpPart, ckPartLength); - } - free(ckpEncryptedPart); - free(ckpPart); - - return jPart ; -} -#endif - -#ifdef P11_ENABLE_C_GETFUNCTIONSTATUS -/* - * Class: sun_security_pkcs11_wrapper_PKCS11 - * Method: C_GetFunctionStatus - * Signature: (J)V - * Parametermapping: *PKCS11* - * @param jlong jSessionHandle CK_SESSION_HANDLE hSession - */ -JNIEXPORT void JNICALL Java_sun_security_pkcs11_wrapper_PKCS11_C_1GetFunctionStatus - (JNIEnv *env, jobject obj, jlong jSessionHandle) -{ - CK_SESSION_HANDLE ckSessionHandle; - CK_RV rv; - - CK_FUNCTION_LIST_PTR ckpFunctions = getFunctionList(env, obj); - if (ckpFunctions == NULL) { return; } - - ckSessionHandle = jLongToCKULong(jSessionHandle); - - /* C_GetFunctionStatus should always return CKR_FUNCTION_NOT_PARALLEL */ - rv = (*ckpFunctions->C_GetFunctionStatus)(ckSessionHandle); - if (ckAssertReturnValueOK(env, rv) != CK_ASSERT_OK) { return; } -} -#endif - -#ifdef P11_ENABLE_C_CANCELFUNCTION -/* - * Class: sun_security_pkcs11_wrapper_PKCS11 - * Method: C_CancelFunction - * Signature: (J)V - * Parametermapping: *PKCS11* - * @param jlong jSessionHandle CK_SESSION_HANDLE hSession - */ -JNIEXPORT void JNICALL Java_sun_security_pkcs11_wrapper_PKCS11_C_1CancelFunction - (JNIEnv *env, jobject obj, jlong jSessionHandle) -{ - CK_SESSION_HANDLE ckSessionHandle; - CK_RV rv; - - CK_FUNCTION_LIST_PTR ckpFunctions = getFunctionList(env, obj); - if (ckpFunctions == NULL) { return; } - - ckSessionHandle = jLongToCKULong(jSessionHandle); - - /* C_GetFunctionStatus should always return CKR_FUNCTION_NOT_PARALLEL */ - rv = (*ckpFunctions->C_CancelFunction)(ckSessionHandle); - if (ckAssertReturnValueOK(env, rv) != CK_ASSERT_OK) { return; } -} -#endif --- /dev/null 2016-12-13 21:44:32.000000000 -0800 +++ new/jdk/src/jdk.crypto.token/share/native/libj2pkcs11/p11_dual.c 2016-12-13 21:44:32.000000000 -0800 @@ -0,0 +1,315 @@ +/* + * Copyright (c) 2003, 2011, Oracle and/or its affiliates. All rights reserved. + */ + +/* Copyright (c) 2002 Graz University of Technology. All rights reserved. + * + * Redistribution and use in source and binary forms, with or without + * modification, are permitted provided that the following conditions are met: + * + * 1. Redistributions of source code must retain the above copyright notice, + * this list of conditions and the following disclaimer. + * + * 2. Redistributions in binary form must reproduce the above copyright notice, + * this list of conditions and the following disclaimer in the documentation + * and/or other materials provided with the distribution. + * + * 3. The end-user documentation included with the redistribution, if any, must + * include the following acknowledgment: + * + * "This product includes software developed by IAIK of Graz University of + * Technology." + * + * Alternately, this acknowledgment may appear in the software itself, if + * and wherever such third-party acknowledgments normally appear. + * + * 4. The names "Graz University of Technology" and "IAIK of Graz University of + * Technology" must not be used to endorse or promote products derived from + * this software without prior written permission. + * + * 5. Products derived from this software may not be called + * "IAIK PKCS Wrapper", nor may "IAIK" appear in their name, without prior + * written permission of Graz University of Technology. + * + * THIS SOFTWARE IS PROVIDED "AS IS" AND ANY EXPRESSED OR IMPLIED + * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED + * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR + * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE LICENSOR BE + * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, + * OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, + * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, + * OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON + * ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, + * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY + * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE + * POSSIBILITY OF SUCH DAMAGE. + * =========================================================================== + */ + +#include "pkcs11wrapper.h" + +#include +#include +#include +#include + +#include "sun_security_pkcs11_wrapper_PKCS11.h" + +#ifdef P11_ENABLE_C_DIGESTENCRYPTUPDATE +/* + * Class: sun_security_pkcs11_wrapper_PKCS11 + * Method: C_DigestEncryptUpdate + * Signature: (J[B)[B + * Parametermapping: *PKCS11* + * @param jlong jSessionHandle CK_SESSION_HANDLE hSession + * @param jbyteArray jPart CK_BYTE_PTR pPart + * CK_ULONG ulPartLen + * @return jbyteArray jEncryptedPart CK_BYTE_PTR pEncryptedPart + * CK_ULONG_PTR pulEncryptedPartLen + */ +JNIEXPORT jbyteArray JNICALL Java_sun_security_pkcs11_wrapper_PKCS11_C_1DigestEncryptUpdate + (JNIEnv *env, jobject obj, jlong jSessionHandle, jbyteArray jPart) +{ + CK_SESSION_HANDLE ckSessionHandle; + CK_BYTE_PTR ckpPart = NULL_PTR, ckpEncryptedPart; + CK_ULONG ckPartLength, ckEncryptedPartLength = 0; + jbyteArray jEncryptedPart = NULL; + CK_RV rv; + + CK_FUNCTION_LIST_PTR ckpFunctions = getFunctionList(env, obj); + if (ckpFunctions == NULL) { return NULL; } + + ckSessionHandle = jLongToCKULong(jSessionHandle); + jByteArrayToCKByteArray(env, jPart, &ckpPart, &ckPartLength); + if ((*env)->ExceptionCheck(env)) { return NULL; } + + rv = (*ckpFunctions->C_DigestEncryptUpdate)(ckSessionHandle, ckpPart, ckPartLength, NULL_PTR, &ckEncryptedPartLength); + if (ckAssertReturnValueOK(env, rv) != CK_ASSERT_OK) { + free(ckpPart); + return NULL; + } + + ckpEncryptedPart = (CK_BYTE_PTR) malloc(ckEncryptedPartLength * sizeof(CK_BYTE)); + if (ckpEncryptedPart == NULL) { + free(ckpPart); + throwOutOfMemoryError(env, 0); + return NULL; + } + + rv = (*ckpFunctions->C_DigestEncryptUpdate)(ckSessionHandle, ckpPart, ckPartLength, ckpEncryptedPart, &ckEncryptedPartLength); + if (ckAssertReturnValueOK(env, rv) == CK_ASSERT_OK) { + jEncryptedPart = ckByteArrayToJByteArray(env, ckpEncryptedPart, ckEncryptedPartLength); + } + free(ckpPart); + free(ckpEncryptedPart); + + return jEncryptedPart ; +} +#endif + +#ifdef P11_ENABLE_C_DECRYPTDIGESTUPDATE +/* + * Class: sun_security_pkcs11_wrapper_PKCS11 + * Method: C_DecryptDigestUpdate + * Signature: (J[B)[B + * Parametermapping: *PKCS11* + * @param jlong jSessionHandle CK_SESSION_HANDLE hSession + * @param jbyteArray jEncryptedPart CK_BYTE_PTR pEncryptedPart + * CK_ULONG ulEncryptedPartLen + * @return jbyteArray jPart CK_BYTE_PTR pPart + * CK_ULONG_PTR pulPartLen + */ +JNIEXPORT jbyteArray JNICALL Java_sun_security_pkcs11_wrapper_PKCS11_C_1DecryptDigestUpdate + (JNIEnv *env, jobject obj, jlong jSessionHandle, jbyteArray jEncryptedPart) +{ + CK_SESSION_HANDLE ckSessionHandle; + CK_BYTE_PTR ckpPart, ckpEncryptedPart = NULL_PTR; + CK_ULONG ckPartLength = 0, ckEncryptedPartLength; + jbyteArray jPart = NULL; + CK_RV rv; + + CK_FUNCTION_LIST_PTR ckpFunctions = getFunctionList(env, obj); + if (ckpFunctions == NULL) { return NULL; } + + ckSessionHandle = jLongToCKULong(jSessionHandle); + jByteArrayToCKByteArray(env, jEncryptedPart, &ckpEncryptedPart, &ckEncryptedPartLength); + if ((*env)->ExceptionCheck(env)) { return NULL; } + + rv = (*ckpFunctions->C_DecryptDigestUpdate)(ckSessionHandle, ckpEncryptedPart, ckEncryptedPartLength, NULL_PTR, &ckPartLength); + if (ckAssertReturnValueOK(env, rv) != CK_ASSERT_OK) { + free(ckpEncryptedPart); + return NULL; + } + + ckpPart = (CK_BYTE_PTR) malloc(ckPartLength * sizeof(CK_BYTE)); + if (ckpPart == NULL) { + free(ckpEncryptedPart); + throwOutOfMemoryError(env, 0); + return NULL; + } + + rv = (*ckpFunctions->C_DecryptDigestUpdate)(ckSessionHandle, ckpEncryptedPart, ckEncryptedPartLength, ckpPart, &ckPartLength); + if (ckAssertReturnValueOK(env, rv) == CK_ASSERT_OK) { + jPart = ckByteArrayToJByteArray(env, ckpPart, ckPartLength); + } + free(ckpEncryptedPart); + free(ckpPart); + + return jPart ; +} +#endif + +#ifdef P11_ENABLE_C_SIGNENCRYPTUPDATE +/* + * Class: sun_security_pkcs11_wrapper_PKCS11 + * Method: C_SignEncryptUpdate + * Signature: (J[B)[B + * Parametermapping: *PKCS11* + * @param jlong jSessionHandle CK_SESSION_HANDLE hSession + * @param jbyteArray jPart CK_BYTE_PTR pPart + * CK_ULONG ulPartLen + * @return jbyteArray jEncryptedPart CK_BYTE_PTR pEncryptedPart + * CK_ULONG_PTR pulEncryptedPartLen + */ +JNIEXPORT jbyteArray JNICALL Java_sun_security_pkcs11_wrapper_PKCS11_C_1SignEncryptUpdate + (JNIEnv *env, jobject obj, jlong jSessionHandle, jbyteArray jPart) +{ + CK_SESSION_HANDLE ckSessionHandle; + CK_BYTE_PTR ckpPart = NULL_PTR, ckpEncryptedPart; + CK_ULONG ckPartLength, ckEncryptedPartLength = 0; + jbyteArray jEncryptedPart = NULL; + CK_RV rv; + + CK_FUNCTION_LIST_PTR ckpFunctions = getFunctionList(env, obj); + if (ckpFunctions == NULL) { return NULL; } + + ckSessionHandle = jLongToCKULong(jSessionHandle); + jByteArrayToCKByteArray(env, jPart, &ckpPart, &ckPartLength); + if ((*env)->ExceptionCheck(env)) { return NULL; } + + rv = (*ckpFunctions->C_SignEncryptUpdate)(ckSessionHandle, ckpPart, ckPartLength, NULL_PTR, &ckEncryptedPartLength); + if (ckAssertReturnValueOK(env, rv) != CK_ASSERT_OK) { + free(ckpPart); + return NULL; + } + + ckpEncryptedPart = (CK_BYTE_PTR) malloc(ckEncryptedPartLength * sizeof(CK_BYTE)); + if (ckpEncryptedPart == NULL) { + free(ckpPart); + throwOutOfMemoryError(env, 0); + return NULL; + } + + rv = (*ckpFunctions->C_SignEncryptUpdate)(ckSessionHandle, ckpPart, ckPartLength, ckpEncryptedPart, &ckEncryptedPartLength); + if (ckAssertReturnValueOK(env, rv) == CK_ASSERT_OK) { + jEncryptedPart = ckByteArrayToJByteArray(env, ckpEncryptedPart, ckEncryptedPartLength); + } + free(ckpPart); + free(ckpEncryptedPart); + + return jEncryptedPart ; +} +#endif + +#ifdef P11_ENABLE_C_DECRYPTVERIFYUPDATE +/* + * Class: sun_security_pkcs11_wrapper_PKCS11 + * Method: C_DecryptVerifyUpdate + * Signature: (J[B)[B + * Parametermapping: *PKCS11* + * @param jlong jSessionHandle CK_SESSION_HANDLE hSession + * @param jbyteArray jEncryptedPart CK_BYTE_PTR pEncryptedPart + * CK_ULONG ulEncryptedPartLen + * @return jbyteArray jPart CK_BYTE_PTR pPart + * CK_ULONG_PTR pulPartLen + */ +JNIEXPORT jbyteArray JNICALL Java_sun_security_pkcs11_wrapper_PKCS11_C_1DecryptVerifyUpdate + (JNIEnv *env, jobject obj, jlong jSessionHandle, jbyteArray jEncryptedPart) +{ + CK_SESSION_HANDLE ckSessionHandle; + CK_BYTE_PTR ckpPart, ckpEncryptedPart = NULL_PTR; + CK_ULONG ckPartLength = 0, ckEncryptedPartLength; + jbyteArray jPart = NULL; + CK_RV rv; + + CK_FUNCTION_LIST_PTR ckpFunctions = getFunctionList(env, obj); + if (ckpFunctions == NULL) { return NULL; } + + ckSessionHandle = jLongToCKULong(jSessionHandle); + jByteArrayToCKByteArray(env, jEncryptedPart, &ckpEncryptedPart, &ckEncryptedPartLength); + if ((*env)->ExceptionCheck(env)) { return NULL; } + + rv = (*ckpFunctions->C_DecryptVerifyUpdate)(ckSessionHandle, ckpEncryptedPart, ckEncryptedPartLength, NULL_PTR, &ckPartLength); + if (ckAssertReturnValueOK(env, rv) != CK_ASSERT_OK) { + free(ckpEncryptedPart); + return NULL; + } + + ckpPart = (CK_BYTE_PTR) malloc(ckPartLength * sizeof(CK_BYTE)); + if (ckpPart == NULL) { + free(ckpEncryptedPart); + throwOutOfMemoryError(env, 0); + return NULL; + } + + rv = (*ckpFunctions->C_DecryptVerifyUpdate)(ckSessionHandle, ckpEncryptedPart, ckEncryptedPartLength, ckpPart, &ckPartLength); + + if (ckAssertReturnValueOK(env, rv) == CK_ASSERT_OK) { + jPart = ckByteArrayToJByteArray(env, ckpPart, ckPartLength); + } + free(ckpEncryptedPart); + free(ckpPart); + + return jPart ; +} +#endif + +#ifdef P11_ENABLE_C_GETFUNCTIONSTATUS +/* + * Class: sun_security_pkcs11_wrapper_PKCS11 + * Method: C_GetFunctionStatus + * Signature: (J)V + * Parametermapping: *PKCS11* + * @param jlong jSessionHandle CK_SESSION_HANDLE hSession + */ +JNIEXPORT void JNICALL Java_sun_security_pkcs11_wrapper_PKCS11_C_1GetFunctionStatus + (JNIEnv *env, jobject obj, jlong jSessionHandle) +{ + CK_SESSION_HANDLE ckSessionHandle; + CK_RV rv; + + CK_FUNCTION_LIST_PTR ckpFunctions = getFunctionList(env, obj); + if (ckpFunctions == NULL) { return; } + + ckSessionHandle = jLongToCKULong(jSessionHandle); + + /* C_GetFunctionStatus should always return CKR_FUNCTION_NOT_PARALLEL */ + rv = (*ckpFunctions->C_GetFunctionStatus)(ckSessionHandle); + if (ckAssertReturnValueOK(env, rv) != CK_ASSERT_OK) { return; } +} +#endif + +#ifdef P11_ENABLE_C_CANCELFUNCTION +/* + * Class: sun_security_pkcs11_wrapper_PKCS11 + * Method: C_CancelFunction + * Signature: (J)V + * Parametermapping: *PKCS11* + * @param jlong jSessionHandle CK_SESSION_HANDLE hSession + */ +JNIEXPORT void JNICALL Java_sun_security_pkcs11_wrapper_PKCS11_C_1CancelFunction + (JNIEnv *env, jobject obj, jlong jSessionHandle) +{ + CK_SESSION_HANDLE ckSessionHandle; + CK_RV rv; + + CK_FUNCTION_LIST_PTR ckpFunctions = getFunctionList(env, obj); + if (ckpFunctions == NULL) { return; } + + ckSessionHandle = jLongToCKULong(jSessionHandle); + + /* C_GetFunctionStatus should always return CKR_FUNCTION_NOT_PARALLEL */ + rv = (*ckpFunctions->C_CancelFunction)(ckSessionHandle); + if (ckAssertReturnValueOK(env, rv) != CK_ASSERT_OK) { return; } +} +#endif