⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 verify_mgr.c

📁 IBM的Linux上的PKCS#11实现
💻 C
📖 第 1 页 / 共 3 页
字号:
            if (!ctx->context){               st_err_log(0, __FILE__, __LINE__);               return CKR_HOST_MEMORY;            }            memset( ctx->context, 0x0, sizeof(SSL3_MAC_CONTEXT));         }         break;      default:         st_err_log(28, __FILE__, __LINE__);         return CKR_MECHANISM_INVALID;   }   if (mech->ulParameterLen > 0) {      ptr = (CK_BYTE *)malloc(mech->ulParameterLen);      if (!ptr){         st_err_log(0, __FILE__, __LINE__);         return CKR_HOST_MEMORY;      }      memcpy( ptr, mech->pParameter, mech->ulParameterLen );   }   ctx->key                 = key;   ctx->mech.ulParameterLen = mech->ulParameterLen;   ctx->mech.mechanism      = mech->mechanism;   ctx->mech.pParameter     = ptr;   ctx->multi               = FALSE;   ctx->active              = TRUE;   ctx->recover             = recover_mode;   return CKR_OK;}////CK_RVverify_mgr_cleanup( SIGN_VERIFY_CONTEXT *ctx ){   if (!ctx){      st_err_log(4, __FILE__, __LINE__, __FUNCTION__);      return CKR_FUNCTION_FAILED;   }   ctx->key                 = 0;   ctx->mech.ulParameterLen = 0;   ctx->mech.mechanism      = 0;   ctx->multi               = FALSE;   ctx->active              = FALSE;   ctx->recover             = FALSE;   ctx->context_len         = 0;   if (ctx->mech.pParameter) {      free( ctx->mech.pParameter );      ctx->mech.pParameter = NULL;   }   if (ctx->context) {      free( ctx->context );      ctx->context = NULL;   }   return CKR_OK;}////CK_RVverify_mgr_verify( SESSION             * sess,                   SIGN_VERIFY_CONTEXT * ctx,                   CK_BYTE             * in_data,                   CK_ULONG              in_data_len,                   CK_BYTE             * signature,                   CK_ULONG              sig_len ){   if (!sess || !ctx){      st_err_log(4, __FILE__, __LINE__, __FUNCTION__);      return CKR_FUNCTION_FAILED;   }   if (ctx->active == FALSE){      st_err_log(32, __FILE__, __LINE__);      return CKR_OPERATION_NOT_INITIALIZED;   }   if (ctx->recover == TRUE){      st_err_log(32, __FILE__, __LINE__);      return CKR_OPERATION_NOT_INITIALIZED;   }   // if the caller just wants the signature length, there is no reason to   // specify the input data.  I just need the input data length   //   if (!in_data || !signature){      st_err_log(4, __FILE__, __LINE__, __FUNCTION__);      return CKR_FUNCTION_FAILED;   }   if (ctx->multi == TRUE){      st_err_log(31, __FILE__, __LINE__);      return CKR_OPERATION_ACTIVE;   }   switch (ctx->mech.mechanism) {      case CKM_RSA_PKCS:         return rsa_pkcs_verify( sess,      ctx,                                 in_data,   in_data_len,                                 signature, sig_len );      case CKM_RSA_X_509:         return rsa_x509_verify( sess,      ctx,                                 in_data,   in_data_len,                                 signature, sig_len );      case CKM_MD2_RSA_PKCS:      case CKM_MD5_RSA_PKCS:      case CKM_SHA1_RSA_PKCS:         return rsa_hash_pkcs_verify( sess,      ctx,                                      in_data,   in_data_len,                                      signature, sig_len );#if !(NODSA)      case CKM_DSA:         return dsa_verify( sess,      ctx,                            in_data,   in_data_len,                            signature, sig_len );#endif#if !(NOMD2)      case CKM_MD2_HMAC:      case CKM_MD2_HMAC_GENERAL:         return md2_hmac_verify( sess,      ctx,                                 in_data,   in_data_len,                                 signature, sig_len );#endif      case CKM_MD5_HMAC:      case CKM_MD5_HMAC_GENERAL:         return md5_hmac_verify( sess,      ctx,                                 in_data,   in_data_len,                                 signature, sig_len );      case CKM_SHA_1_HMAC:      case CKM_SHA_1_HMAC_GENERAL:         return sha1_hmac_verify( sess,      ctx,                                  in_data,   in_data_len,                                  signature, sig_len );      case CKM_SSL3_MD5_MAC:      case CKM_SSL3_SHA1_MAC:         return ssl3_mac_verify( sess,      ctx,                                 in_data,   in_data_len,                                 signature, sig_len );      default:         st_err_log(28, __FILE__, __LINE__);         return CKR_MECHANISM_INVALID;   }   st_err_log(4, __FILE__, __LINE__, __FUNCTION__);   return CKR_FUNCTION_FAILED;}////CK_RVverify_mgr_verify_update( SESSION             * sess,                          SIGN_VERIFY_CONTEXT * ctx,                          CK_BYTE             * in_data,                          CK_ULONG              in_data_len ){   if (!sess || !ctx || !in_data){      st_err_log(4, __FILE__, __LINE__, __FUNCTION__);      return CKR_FUNCTION_FAILED;   }   if (ctx->active == FALSE){      st_err_log(32, __FILE__, __LINE__);      return CKR_OPERATION_NOT_INITIALIZED;   }   if (ctx->recover == TRUE){      st_err_log(32, __FILE__, __LINE__);      return CKR_OPERATION_NOT_INITIALIZED;   }   ctx->multi = TRUE;   switch (ctx->mech.mechanism) {      case CKM_MD2_RSA_PKCS:      case CKM_MD5_RSA_PKCS:      case CKM_SHA1_RSA_PKCS:         return rsa_hash_pkcs_verify_update( sess, ctx, in_data, in_data_len );      case CKM_SSL3_MD5_MAC:      case CKM_SSL3_SHA1_MAC:         return ssl3_mac_verify_update( sess, ctx, in_data, in_data_len );      default:         st_err_log(28, __FILE__, __LINE__);         return CKR_MECHANISM_INVALID;   }   st_err_log(28, __FILE__, __LINE__);   return CKR_MECHANISM_INVALID;}////CK_RVverify_mgr_verify_final( SESSION             * sess,                         SIGN_VERIFY_CONTEXT * ctx,                         CK_BYTE             * signature,                         CK_ULONG              sig_len ){   if (!sess || !ctx){      st_err_log(4, __FILE__, __LINE__, __FUNCTION__);      return CKR_FUNCTION_FAILED;   }   if (ctx->active == FALSE){      st_err_log(32, __FILE__, __LINE__);      return CKR_OPERATION_NOT_INITIALIZED;   }   if (ctx->recover == TRUE){      st_err_log(32, __FILE__, __LINE__);      return CKR_OPERATION_NOT_INITIALIZED;   }   switch (ctx->mech.mechanism) {      case CKM_MD2_RSA_PKCS:      case CKM_MD5_RSA_PKCS:      case CKM_SHA1_RSA_PKCS:         return rsa_hash_pkcs_verify_final( sess, ctx, signature, sig_len );      case CKM_SSL3_MD5_MAC:      case CKM_SSL3_SHA1_MAC:         return ssl3_mac_verify_final( sess, ctx, signature, sig_len );      default:         st_err_log(28, __FILE__, __LINE__);         return CKR_MECHANISM_INVALID;   }   st_err_log(28, __FILE__, __LINE__);   return CKR_MECHANISM_INVALID;}////CK_RVverify_mgr_verify_recover( SESSION             * sess,                           CK_BBOOL              length_only,                           SIGN_VERIFY_CONTEXT * ctx,                           CK_BYTE             * signature,                           CK_ULONG              sig_len,                           CK_BYTE             * out_data,                           CK_ULONG            * out_len ){   if (!sess || !ctx){      st_err_log(4, __FILE__, __LINE__, __FUNCTION__);      return CKR_FUNCTION_FAILED;   }   if (ctx->active == FALSE){      st_err_log(32, __FILE__, __LINE__);      return CKR_OPERATION_NOT_INITIALIZED;   }   if (ctx->recover == FALSE){      st_err_log(32, __FILE__, __LINE__);      return CKR_OPERATION_NOT_INITIALIZED;   }   // if the caller just wants the signature length, there is no reason to   // specify the input data.  I just need the input data length   //   if (!signature || !out_len){      st_err_log(4, __FILE__, __LINE__, __FUNCTION__);      return CKR_FUNCTION_FAILED;   }   if (ctx->multi == TRUE){      st_err_log(31, __FILE__, __LINE__);      return CKR_OPERATION_ACTIVE;   }   switch (ctx->mech.mechanism) {      case CKM_RSA_PKCS:         return rsa_pkcs_verify_recover( sess,      length_only,                                         ctx,                                         signature, sig_len,                                         out_data,  out_len );      case CKM_RSA_X_509:         return rsa_x509_verify_recover( sess,      length_only,                                         ctx,                                         signature, sig_len,                                         out_data,  out_len );      default:         st_err_log(28, __FILE__, __LINE__);         return CKR_MECHANISM_INVALID;   }   st_err_log(4, __FILE__, __LINE__, __FUNCTION__);   return CKR_FUNCTION_FAILED;}

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -