diff options
Diffstat (limited to 'security/tf_sdk/include/pkcs11.h')
-rw-r--r-- | security/tf_sdk/include/pkcs11.h | 595 |
1 files changed, 595 insertions, 0 deletions
diff --git a/security/tf_sdk/include/pkcs11.h b/security/tf_sdk/include/pkcs11.h new file mode 100644 index 0000000..8f28917 --- /dev/null +++ b/security/tf_sdk/include/pkcs11.h @@ -0,0 +1,595 @@ +/**
+ * Copyright(c) 2011 Trusted Logic. All rights reserved.
+ *
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted provided that the following conditions
+ * are met:
+ *
+ * * Redistributions of source code must retain the above copyright
+ * notice, this list of conditions and the following disclaimer.
+ * * Redistributions in binary form must reproduce the above copyright
+ * notice, this list of conditions and the following disclaimer in
+ * the documentation and/or other materials provided with the
+ * distribution.
+ * * Neither the name Trusted Logic nor the names of its
+ * contributors may be used to endorse or promote products derived
+ * from this software without specific prior written permission.
+ *
+ * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
+ * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
+ * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
+ * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
+ * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
+ * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
+ * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
+ * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
+ * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
+ * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
+ * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+ */ + +/* + * This header file contains the definition of the PKCS#11 types and functions + * supported by the Trusted Foundations Software. This header file is + * derived from the RSA Security Inc. PKCS #11 Cryptographic Token Interface + * (Cryptoki) + */ +#ifndef __PKCS11_H__ +#define __PKCS11_H__ + +#ifdef __cplusplus +extern "C" { +#endif + +/*------------------------------------------ +* Types and constants +*------------------------------------------*/ + +#include "s_type.h" + +#define CK_TRUE true +#define CK_FALSE false + +#ifndef FALSE +#define FALSE CK_FALSE +#endif + +#ifndef TRUE +#define TRUE CK_TRUE +#endif + +#define NULL_PTR NULL + +typedef uint8_t CK_BYTE, *CK_BYTE_PTR; +typedef CK_BYTE CK_CHAR, *CK_CHAR_PTR; +typedef CK_BYTE CK_UTF8CHAR, *CK_UTF8CHAR_PTR; +typedef bool CK_BBOOL; +typedef uint32_t CK_ULONG, *CK_ULONG_PTR; +typedef int32_t CK_LONG; +typedef CK_ULONG CK_FLAGS; +typedef void* CK_VOID_PTR, *CK_VOID_PTR_PTR; + +#define CK_INVALID_HANDLE 0 + +typedef struct CK_VERSION +{ + CK_BYTE major; + CK_BYTE minor; +} +CK_VERSION, *CK_VERSION_PTR; + +typedef struct CK_INFO +{ + CK_VERSION cryptokiVersion; + CK_UTF8CHAR manufacturerID[32]; + CK_FLAGS flags; + CK_UTF8CHAR libraryDescription[32]; + CK_VERSION libraryVersion; +} +CK_INFO, *CK_INFO_PTR; + +typedef CK_ULONG CK_NOTIFICATION; +typedef CK_ULONG CK_SLOT_ID, *CK_SLOT_ID_PTR; +typedef CK_ULONG CK_SESSION_HANDLE, *CK_SESSION_HANDLE_PTR; + +typedef CK_ULONG CK_USER_TYPE; +#define CKU_SO 0 +#define CKU_USER 1 +#define CKU_CONTEXT_SPECIFIC 2 + +typedef CK_ULONG CK_STATE; +#define CKS_RO_PUBLIC_SESSION 0 +#define CKS_RO_USER_FUNCTIONS 1 +#define CKS_RW_PUBLIC_SESSION 2 +#define CKS_RW_USER_FUNCTIONS 3 +#define CKS_RW_SO_FUNCTIONS 4 + +typedef struct CK_SESSION_INFO +{ + CK_SLOT_ID slotID; + CK_STATE state; + CK_FLAGS flags; + CK_ULONG ulDeviceError; +} +CK_SESSION_INFO, *CK_SESSION_INFO_PTR; + +#define CKF_RW_SESSION 0x00000002 +#define CKF_SERIAL_SESSION 0x00000004 +#define CKVF_OPEN_SUB_SESSION 0x00000008 + +typedef CK_ULONG CK_OBJECT_HANDLE, *CK_OBJECT_HANDLE_PTR; + +typedef CK_ULONG CK_OBJECT_CLASS, *CK_OBJECT_CLASS_PTR; + +#define CKO_DATA 0x00000000 +#define CKO_PUBLIC_KEY 0x00000002 +#define CKO_PRIVATE_KEY 0x00000003 +#define CKO_SECRET_KEY 0x00000004 + +typedef CK_ULONG CK_KEY_TYPE; + +#define CKK_RSA 0x00000000 +#define CKK_DSA 0x00000001 +#define CKK_DH 0x00000002 +#define CKK_EC 0x00000003 + +#define CKK_GENERIC_SECRET 0x00000010 + +#define CKK_RC4 0x00000012 +#define CKK_DES 0x00000013 +#define CKK_DES2 0x00000014 +#define CKK_DES3 0x00000015 + +#define CKK_AES 0x0000001F + +#define CKK_VENDOR_DEFINED 0x80000000 + +typedef CK_ULONG CK_ATTRIBUTE_TYPE; + +#define CKF_ARRAY_ATTRIBUTE 0x40000000 + +#define CKA_CLASS 0x00000000 +#define CKA_TOKEN 0x00000001 +#define CKA_PRIVATE 0x00000002 +#define CKA_VALUE 0x00000011 + +#define CKA_OBJECT_ID 0x00000012 + +#define CKA_KEY_TYPE 0x00000100 +#define CKA_ID 0x00000102 +#define CKA_SENSITIVE 0x00000103 +#define CKA_ENCRYPT 0x00000104 +#define CKA_DECRYPT 0x00000105 +#define CKA_WRAP 0x00000106 +#define CKA_UNWRAP 0x00000107 +#define CKA_SIGN 0x00000108 +#define CKA_VERIFY 0x0000010A +#define CKA_DERIVE 0x0000010C +#define CKA_MODULUS 0x00000120 +#define CKA_MODULUS_BITS 0x00000121 +#define CKA_PUBLIC_EXPONENT 0x00000122 +#define CKA_PRIVATE_EXPONENT 0x00000123 +#define CKA_PRIME_1 0x00000124 +#define CKA_PRIME_2 0x00000125 +#define CKA_EXPONENT_1 0x00000126 +#define CKA_EXPONENT_2 0x00000127 +#define CKA_COEFFICIENT 0x00000128 +#define CKA_PRIME 0x00000130 +#define CKA_SUBPRIME 0x00000131 +#define CKA_BASE 0x00000132 + +#define CKA_VALUE_BITS 0x00000160 +#define CKA_VALUE_LEN 0x00000161 + +#define CKA_EXTRACTABLE 0x00000162 + +#define CKA_MODIFIABLE 0x00000170 +#define CKA_COPYABLE 0x00000171 +#define CKA_ALWAYS_AUTHENTICATE 0x00000202 + +#define CKA_VENDOR_DEFINED 0x80000000 + +#define CKAV_ALLOW_NON_SENSITIVE_DERIVED_KEY 0x80000001 + +typedef struct CK_ATTRIBUTE +{ + CK_ATTRIBUTE_TYPE type; + void* pValue; + CK_ULONG ulValueLen; +} +CK_ATTRIBUTE, *CK_ATTRIBUTE_PTR; + +typedef CK_ULONG CK_MECHANISM_TYPE, *CK_MECHANISM_TYPE_PTR; + +#define CKM_RSA_PKCS_KEY_PAIR_GEN 0x00000000 +#define CKM_RSA_PKCS 0x00000001 +#define CKM_RSA_X_509 0x00000003 +#define CKM_MD5_RSA_PKCS 0x00000005 +#define CKM_SHA1_RSA_PKCS 0x00000006 +#define CKM_RSA_PKCS_OAEP 0x00000009 +#define CKM_RSA_PKCS_PSS 0x0000000D +#define CKM_SHA1_RSA_PKCS_PSS 0x0000000E +#define CKM_DSA_KEY_PAIR_GEN 0x00000010 +#define CKM_DSA 0x00000011 +#define CKM_DSA_SHA1 0x00000012 +#define CKM_DH_PKCS_KEY_PAIR_GEN 0x00000020 +#define CKM_DH_PKCS_DERIVE 0x00000021 +#define CKM_SHA256_RSA_PKCS 0x00000040 +#define CKM_SHA384_RSA_PKCS 0x00000041 +#define CKM_SHA512_RSA_PKCS 0x00000042 +#define CKM_SHA256_RSA_PKCS_PSS 0x00000043 +#define CKM_SHA384_RSA_PKCS_PSS 0x00000044 +#define CKM_SHA512_RSA_PKCS_PSS 0x00000045 +#define CKM_SHA224_RSA_PKCS 0x00000046 +#define CKM_SHA224_RSA_PKCS_PSS 0x00000047 +#define CKM_RC4_KEY_GEN 0x00000110 +#define CKM_RC4 0x00000111 +#define CKM_DES_KEY_GEN 0x00000120 +#define CKM_DES_ECB 0x00000121 +#define CKM_DES_CBC 0x00000122 +#define CKM_DES_MAC 0x00000123 +#define CKM_DES2_KEY_GEN 0x00000130 +#define CKM_DES3_KEY_GEN 0x00000131 +#define CKM_DES3_ECB 0x00000132 +#define CKM_DES3_CBC 0x00000133 +#define CKM_DES3_MAC 0x00000134 +#define CKM_MD5 0x00000210 +#define CKM_MD5_HMAC 0x00000211 +#define CKM_SHA_1 0x00000220 +#define CKM_SHA_1_HMAC 0x00000221 +#define CKM_SHA256 0x00000250 +#define CKM_SHA256_HMAC 0x00000251 +#define CKM_SHA224 0x00000255 +#define CKM_SHA224_HMAC 0x00000256 +#define CKM_SHA384 0x00000260 +#define CKM_SHA384_HMAC 0x00000261 +#define CKM_SHA512 0x00000270 +#define CKM_SHA512_HMAC 0x00000271 +#define CKM_GENERIC_SECRET_KEY_GEN 0x00000350 +#define CKM_AES_KEY_GEN 0x00001080 +#define CKM_AES_ECB 0x00001081 +#define CKM_AES_CBC 0x00001082 +#define CKM_AES_MAC 0x00001083 +#define CKM_AES_CTR 0x00001086 +#define CKM_VENDOR_DEFINED 0x80000000 +#define CKMV_AES_CTR 0x80000001 + +#define CKMV_IMPLEMENTATION_DEFINED_0 0xC0000000 +#define CKMV_IMPLEMENTATION_DEFINED_1 0xC0000001 +#define CKMV_IMPLEMENTATION_DEFINED_2 0xC0000002 +#define CKMV_IMPLEMENTATION_DEFINED_3 0xC0000003 +#define CKMV_IMPLEMENTATION_DEFINED_4 0xC0000004 +#define CKMV_IMPLEMENTATION_DEFINED_5 0xC0000005 +#define CKMV_IMPLEMENTATION_DEFINED_6 0xC0000006 +#define CKMV_IMPLEMENTATION_DEFINED_7 0xC0000007 +#define CKMV_IMPLEMENTATION_DEFINED_8 0xC0000008 +#define CKMV_IMPLEMENTATION_DEFINED_9 0xC0000009 +#define CKMV_IMPLEMENTATION_DEFINED_10 0xC000000A +#define CKMV_IMPLEMENTATION_DEFINED_11 0xC000000B +#define CKMV_IMPLEMENTATION_DEFINED_12 0xC000000C +#define CKMV_IMPLEMENTATION_DEFINED_13 0xC000000D +#define CKMV_IMPLEMENTATION_DEFINED_14 0xC000000E +#define CKMV_IMPLEMENTATION_DEFINED_15 0xC000000F + +typedef struct CK_MECHANISM +{ + CK_MECHANISM_TYPE mechanism; + void* pParameter; + CK_ULONG ulParameterLen; /* in bytes */ +} +CK_MECHANISM, *CK_MECHANISM_PTR; + +typedef CK_ULONG CK_RV; + +#define CKR_OK 0x00000000 +#define CKR_CANCEL 0x00000001 +#define CKR_HOST_MEMORY 0x00000002 +#define CKR_SLOT_ID_INVALID 0x00000003 +#define CKR_GENERAL_ERROR 0x00000005 +#define CKR_ARGUMENTS_BAD 0x00000007 +#define CKR_ATTRIBUTE_SENSITIVE 0x00000011 +#define CKR_ATTRIBUTE_TYPE_INVALID 0x00000012 +#define CKR_ATTRIBUTE_VALUE_INVALID 0x00000013 +#define CKR_COPY_PROHIBITED 0x0000001A +#define CKR_DATA_INVALID 0x00000020 +#define CKR_DATA_LEN_RANGE 0x00000021 +#define CKR_DEVICE_ERROR 0x00000030 +#define CKR_DEVICE_MEMORY 0x00000031 +#define CKR_ENCRYPTED_DATA_INVALID 0x00000040 +#define CKR_ENCRYPTED_DATA_LEN_RANGE 0x00000041 +#define CKR_KEY_HANDLE_INVALID 0x00000060 +#define CKR_KEY_SIZE_RANGE 0x00000062 +#define CKR_KEY_TYPE_INCONSISTENT 0x00000063 +#define CKR_KEY_FUNCTION_NOT_PERMITTED 0x00000068 +#define CKR_KEY_NOT_WRAPPABLE 0x00000069 +#define CKR_MECHANISM_INVALID 0x00000070 +#define CKR_MECHANISM_PARAM_INVALID 0x00000071 +#define CKR_OBJECT_HANDLE_INVALID 0x00000082 +#define CKR_OPERATION_ACTIVE 0x00000090 +#define CKR_OPERATION_NOT_INITIALIZED 0x00000091 +#define CKR_PIN_INCORRECT 0x000000A0 +#define CKR_SESSION_COUNT 0x000000B1 +#define CKR_SESSION_HANDLE_INVALID 0x000000B3 +#define CKR_SESSION_PARALLEL_NOT_SUPPORTED 0x000000B4 +#define CKR_SESSION_READ_ONLY 0x000000B5 +#define CKR_SIGNATURE_INVALID 0x000000C0 +#define CKR_SIGNATURE_LEN_RANGE 0x000000C1 +#define CKR_TEMPLATE_INCOMPLETE 0x000000D0 +#define CKR_TEMPLATE_INCONSISTENT 0x000000D1 +#define CKR_TOKEN_NOT_PRESENT 0x000000E0 +#define CKR_USER_ALREADY_LOGGED_IN 0x00000100 +#define CKR_USER_NOT_LOGGED_IN 0x00000101 +#define CKR_USER_TYPE_INVALID 0x00000103 +#define CKR_WRAPPED_KEY_LEN_RANGE 0x00000112 +#define CKR_WRAPPING_KEY_HANDLE_INVALID 0x00000113 +#define CKR_RANDOM_SEED_NOT_SUPPORTED 0x00000120 +#define CKR_RANDOM_NO_RNG 0x00000121 +#define CKR_BUFFER_TOO_SMALL 0x00000150 +#define CKR_CRYPTOKI_NOT_INITIALIZED 0x00000190 +#define CKR_CRYPTOKI_ALREADY_INITIALIZED 0x00000191 +#define CKR_VENDOR_DEFINED 0x80000000 + +typedef CK_RV (*CK_NOTIFY)( + CK_SESSION_HANDLE hSession, + CK_NOTIFICATION event, + void* pApplication +); + +typedef CK_ULONG CK_RSA_PKCS_MGF_TYPE, *CK_RSA_PKCS_MGF_TYPE_PTR; + +#define CKG_MGF1_SHA1 0x00000001 +#define CKG_MGF1_SHA256 0x00000002 +#define CKG_MGF1_SHA384 0x00000003 +#define CKG_MGF1_SHA512 0x00000004 +#define CKG_MGF1_SHA224 0x00000005 + +typedef CK_ULONG CK_RSA_PKCS_OAEP_SOURCE_TYPE, *CK_RSA_PKCS_OAEP_SOURCE_TYPE_PTR; + +#define CKZ_DATA_SPECIFIED 0x00000001 +typedef struct CK_RSA_PKCS_OAEP_PARAMS +{ + CK_MECHANISM_TYPE hashAlg; + CK_RSA_PKCS_MGF_TYPE mgf; + CK_RSA_PKCS_OAEP_SOURCE_TYPE source; + void* pSourceData; + CK_ULONG ulSourceDataLen; +} +CK_RSA_PKCS_OAEP_PARAMS, *CK_RSA_PKCS_OAEP_PARAMS_PTR; + +typedef struct CK_RSA_PKCS_PSS_PARAMS +{ + CK_MECHANISM_TYPE hashAlg; + CK_RSA_PKCS_MGF_TYPE mgf; + CK_ULONG sLen; +} +CK_RSA_PKCS_PSS_PARAMS, *CK_RSA_PKCS_PSS_PARAMS_PTR; + +typedef struct CK_AES_CTR_PARAMS +{ + CK_ULONG ulCounterBits; + CK_BYTE cb[16]; +} +CK_AES_CTR_PARAMS, *CK_AES_CTR_PARAMS_PTR; + +/*------------------------------------------ +* Functions +*------------------------------------------*/ +CK_RV PKCS11_EXPORT C_Initialize(void* pInitArgs); + +CK_RV PKCS11_EXPORT C_Finalize(void* pReserved); + +CK_RV PKCS11_EXPORT C_GetInfo(CK_INFO* pInfo); + +CK_RV PKCS11_EXPORT C_OpenSession( + CK_SLOT_ID slotID, + CK_FLAGS flags, + void* pApplication, + CK_NOTIFY Notify, + CK_SESSION_HANDLE* phSession); + +CK_RV PKCS11_EXPORT C_CloseSession( + CK_SESSION_HANDLE hSession); + +CK_RV PKCS11_EXPORT C_Login( + CK_SESSION_HANDLE hSession, + CK_USER_TYPE userType, + const CK_UTF8CHAR* pPin, + CK_ULONG ulPinLen); + +CK_RV PKCS11_EXPORT C_Logout( + CK_SESSION_HANDLE hSession); + +CK_RV PKCS11_EXPORT C_CreateObject( + CK_SESSION_HANDLE hSession, + const CK_ATTRIBUTE* pTemplate, + CK_ULONG ulCount, + CK_OBJECT_HANDLE* phObject); + +CK_RV PKCS11_EXPORT C_DestroyObject( + CK_SESSION_HANDLE hSession, + CK_OBJECT_HANDLE hObject); + +CK_RV PKCS11_EXPORT C_GetAttributeValue( + CK_SESSION_HANDLE hSession, + CK_OBJECT_HANDLE hObject, + CK_ATTRIBUTE* pTemplate, + CK_ULONG ulCount); + +CK_RV PKCS11_EXPORT C_FindObjectsInit( + CK_SESSION_HANDLE hSession, + const CK_ATTRIBUTE* pTemplate, + CK_ULONG ulCount); + +CK_RV PKCS11_EXPORT C_FindObjects( + CK_SESSION_HANDLE hSession, + CK_OBJECT_HANDLE* phObject, + CK_ULONG ulMaxObjectCount, + CK_ULONG* pulObjectCount); + +CK_RV PKCS11_EXPORT C_FindObjectsFinal( + CK_SESSION_HANDLE hSession); + +CK_RV PKCS11_EXPORT C_EncryptInit( + CK_SESSION_HANDLE hSession, + const CK_MECHANISM* pMechanism, + CK_OBJECT_HANDLE hKey); + +CK_RV PKCS11_EXPORT C_Encrypt( + CK_SESSION_HANDLE hSession, + const CK_BYTE* pData, + CK_ULONG ulDataLen, + CK_BYTE* pEncryptedData, + CK_ULONG* pulEncryptedDataLen); + +CK_RV PKCS11_EXPORT C_EncryptUpdate( + CK_SESSION_HANDLE hSession, + const CK_BYTE* pPart, + CK_ULONG ulPartLen, + CK_BYTE* pEncryptedPart, + CK_ULONG* pulEncryptedPartLen); + +CK_RV PKCS11_EXPORT C_EncryptFinal( + CK_SESSION_HANDLE hSession, + CK_BYTE* pLastEncryptedPart, + CK_ULONG* pulLastEncryptedPartLen); + +CK_RV PKCS11_EXPORT C_DecryptInit( + CK_SESSION_HANDLE hSession, + const CK_MECHANISM* pMechanism, + CK_OBJECT_HANDLE hKey); + +CK_RV PKCS11_EXPORT C_Decrypt( + CK_SESSION_HANDLE hSession, + const CK_BYTE* pEncryptedData, + CK_ULONG ulEncryptedDataLen, + CK_BYTE* pData, + CK_ULONG* pulDataLen); + +CK_RV PKCS11_EXPORT C_DecryptUpdate( + CK_SESSION_HANDLE hSession, + const CK_BYTE* pEncryptedPart, + CK_ULONG ulEncryptedPartLen, + CK_BYTE* pPart, + CK_ULONG* pulPartLen); + +CK_RV PKCS11_EXPORT C_DecryptFinal( + CK_SESSION_HANDLE hSession, + CK_BYTE* pLastPart, + CK_ULONG* pulLastPartLen); + +CK_RV PKCS11_EXPORT C_DigestInit( + CK_SESSION_HANDLE hSession, + const CK_MECHANISM* pMechanism); + +CK_RV PKCS11_EXPORT C_Digest( + CK_SESSION_HANDLE hSession, + const CK_BYTE* pData, + CK_ULONG ulDataLen, + CK_BYTE* pDigest, + CK_ULONG* pulDigestLen); + +CK_RV PKCS11_EXPORT C_DigestUpdate( + CK_SESSION_HANDLE hSession, + const CK_BYTE* pPart, + CK_ULONG ulPartLen); + +CK_RV PKCS11_EXPORT C_DigestFinal( + CK_SESSION_HANDLE hSession, + CK_BYTE* pDigest, + CK_ULONG* pulDigestLen); + +CK_RV PKCS11_EXPORT C_SignInit( + CK_SESSION_HANDLE hSession, + const CK_MECHANISM* pMechanism, + CK_OBJECT_HANDLE hKey); + +CK_RV PKCS11_EXPORT C_Sign( + CK_SESSION_HANDLE hSession, + const CK_BYTE* pData, + CK_ULONG ulDataLen, + CK_BYTE* pSignature, + CK_ULONG* pulSignatureLen); + +CK_RV PKCS11_EXPORT C_SignUpdate( + CK_SESSION_HANDLE hSession, + const CK_BYTE* pPart, + CK_ULONG ulPartLen); + +CK_RV PKCS11_EXPORT C_SignFinal( + CK_SESSION_HANDLE hSession, + CK_BYTE* pSignature, + CK_ULONG* pulSignatureLen); + +CK_RV PKCS11_EXPORT C_VerifyInit( + CK_SESSION_HANDLE hSession, + const CK_MECHANISM* pMechanism, + CK_OBJECT_HANDLE hKey); + +CK_RV PKCS11_EXPORT C_Verify( + CK_SESSION_HANDLE hSession, + const CK_BYTE* pData, + CK_ULONG ulDataLen, + CK_BYTE* pSignature, + CK_ULONG ulSignatureLen); + +CK_RV PKCS11_EXPORT C_VerifyUpdate( + CK_SESSION_HANDLE hSession, + const CK_BYTE* pPart, + CK_ULONG ulPartLen); + +CK_RV PKCS11_EXPORT C_VerifyFinal( + CK_SESSION_HANDLE hSession, + const CK_BYTE* pSignature, + CK_ULONG ulSignatureLen); + +CK_RV PKCS11_EXPORT C_GenerateKey( + CK_SESSION_HANDLE hSession, + const CK_MECHANISM* pMechanism, + const CK_ATTRIBUTE* pTemplate, + CK_ULONG ulCount, + CK_OBJECT_HANDLE* phKey); + +CK_RV PKCS11_EXPORT C_GenerateKeyPair( + CK_SESSION_HANDLE hSession, + const CK_MECHANISM* pMechanism, + const CK_ATTRIBUTE* pPublicKeyTemplate, + CK_ULONG ulPublicKeyAttributeCount, + const CK_ATTRIBUTE* pPrivateKeyTemplate, + CK_ULONG ulPrivateKeyAttributeCount, + CK_OBJECT_HANDLE* phPublicKey, + CK_OBJECT_HANDLE* phPrivateKey); + +CK_RV PKCS11_EXPORT C_DeriveKey( + CK_SESSION_HANDLE hSession, + const CK_MECHANISM* pMechanism, + CK_OBJECT_HANDLE hBaseKey, + const CK_ATTRIBUTE* pTemplate, + CK_ULONG ulAttributeCount, + CK_OBJECT_HANDLE* phKey); + +CK_RV PKCS11_EXPORT C_SeedRandom( + CK_SESSION_HANDLE hSession, + const CK_BYTE* pSeed, + CK_ULONG ulSeedLen); + +CK_RV PKCS11_EXPORT C_GenerateRandom( + CK_SESSION_HANDLE hSession, + CK_BYTE* pRandomData, + CK_ULONG ulRandomLen); + +CK_RV PKCS11_EXPORT C_CloseObjectHandle( + CK_SESSION_HANDLE hSession, + CK_OBJECT_HANDLE hObject); + +CK_RV PKCS11_EXPORT C_CopyObject( + CK_SESSION_HANDLE hSession, + CK_OBJECT_HANDLE hObject, + const CK_ATTRIBUTE* pTemplate, + CK_ULONG ulAttributeCount, + CK_OBJECT_HANDLE* phNewObject); + +#ifdef __cplusplus +} +#endif + +#endif /* __PKCS11_H__ */ |