[Cryptech-Commits] [sw/pkcs11] 01/01: Track API changes on sw/libhal rpc branch.

git at cryptech.is git at cryptech.is
Fri May 6 19:01:58 UTC 2016


This is an automated email from the git hooks/post-receive script.

sra at hactrn.net pushed a commit to branch rpc
in repository sw/pkcs11.

commit b204d24d68d66aadb18884d0a0d97ddc6fa2c75e
Author: Rob Austein <sra at hactrn.net>
AuthorDate: Fri May 6 14:56:16 2016 -0400

    Track API changes on sw/libhal rpc branch.
    
    So far this is just dumb little things like changed names for old data
    types and functions.  Changes to use new API features will come later.
---
 GNUmakefile | 12 ++++++++++++
 pkcs11.c    | 38 ++++++++++++++++++--------------------
 2 files changed, 30 insertions(+), 20 deletions(-)

diff --git a/GNUmakefile b/GNUmakefile
index a74f06a..90440a7 100644
--- a/GNUmakefile
+++ b/GNUmakefile
@@ -45,6 +45,14 @@ ifndef ENABLE_DEBUGGING
   ENABLE_DEBUGGING := no
 endif
 
+# Whether to disable #warning statements; generally these are present for
+# a reason, but they can get distracting when one is attempting to debug
+# something else.
+
+ifndef ENABLE_FOOTNOTE_WARNINGS
+  ENABLE_FOOTNOTE_WARNINGS := yes
+endif
+
 LIBHAL_DIR   = ../libhal
 LIBTFM_DIR   = ../thirdparty/libtfm
 SQLITE3_DIR  = ../thirdparty/sqlite3
@@ -53,6 +61,10 @@ CFLAGS	:= -g3 -fPIC -Wall -std=c99 -I${LIBHAL_DIR} -I${SQLITE3_DIR}
 SOFLAGS := -Wl,-Bsymbolic-functions -Wl,-Bsymbolic -Wl,-z,noexecstack
 LIBS	:= ${LIBHAL_DIR}/libhal.a ${LIBTFM_DIR}/libtfm.a ${SQLITE3_DIR}/libsqlite3.a
 
+ifeq "${ENABLE_FOOTNOTE_WARNINGS}" "no"
+  CFLAGS += -Wno-\#warnings
+endif
+
 ifeq "${ENABLE_THREADS}" "yes"
   CFLAGS += -pthread
 else
diff --git a/pkcs11.c b/pkcs11.c
index e0a43ac..433e7ab 100644
--- a/pkcs11.c
+++ b/pkcs11.c
@@ -481,7 +481,7 @@ static CK_RV posix_mutex_unlock(CK_VOID_PTR pMutex)
  */
 #warning Perhaps this should be  a utility routine in libhal instead of here
 
-static int ec_curve_oid_to_name(const uint8_t * const oid, const size_t oid_len, hal_ecdsa_curve_t *curve)
+static int ec_curve_oid_to_name(const uint8_t * const oid, const size_t oid_len, hal_curve_name_t *curve)
 {
   static uint8_t ec_curve_oid_p256[] = { 0x06, 0x08, 0x2a, 0x86, 0x48, 0xce, 0x3d, 0x03, 0x01, 0x07 };
   static uint8_t ec_curve_oid_p384[] = { 0x06, 0x05, 0x2b, 0x81, 0x04, 0x00, 0x22 };
@@ -491,13 +491,13 @@ static int ec_curve_oid_to_name(const uint8_t * const oid, const size_t oid_len,
     return 0;
 
   else if (oid_len == sizeof(ec_curve_oid_p256) && memcmp(oid, ec_curve_oid_p256, oid_len) == 0)
-    *curve = HAL_ECDSA_CURVE_P256;
+    *curve = HAL_CURVE_P256;
 
   else if (oid_len == sizeof(ec_curve_oid_p384) && memcmp(oid, ec_curve_oid_p384, oid_len) == 0)
-    *curve = HAL_ECDSA_CURVE_P384;
+    *curve = HAL_CURVE_P384;
 
   else if (oid_len == sizeof(ec_curve_oid_p521) && memcmp(oid, ec_curve_oid_p521, oid_len) == 0)
-    *curve = HAL_ECDSA_CURVE_P521;
+    *curve = HAL_CURVE_P521;
 
   else
     return 0;
@@ -1237,7 +1237,7 @@ static hal_error_t p11_object_encode_rsa_key(const void * const key,
                                              size_t *der_len,
                                              const size_t der_max)
 {
-  return hal_rsa_key_to_der(key, der, der_len, der_max);
+  return hal_rsa_private_key_to_der(key, der, der_len, der_max);
 }
 
 static int p11_object_set_rsa_private_key(const CK_OBJECT_HANDLE object_handle,
@@ -1245,7 +1245,7 @@ static int p11_object_set_rsa_private_key(const CK_OBJECT_HANDLE object_handle,
 {
   return p11_object_set_generic_private_key(object_handle,
                                             key,
-                                            hal_rsa_key_to_der_len(key),
+                                            hal_rsa_private_key_to_der_len(key),
                                             p11_object_encode_rsa_key);
 }
 
@@ -1261,7 +1261,7 @@ static hal_error_t p11_object_encode_ec_key(const void * const key,
                                             size_t *der_len,
                                             const size_t der_max)
 {
-  return hal_ecdsa_key_to_der(key, der, der_len, der_max);
+  return hal_ecdsa_private_key_to_der(key, der, der_len, der_max);
 }
 
 static int p11_object_set_ec_private_key(const CK_OBJECT_HANDLE object_handle,
@@ -1269,7 +1269,7 @@ static int p11_object_set_ec_private_key(const CK_OBJECT_HANDLE object_handle,
 {
   return p11_object_set_generic_private_key(object_handle,
                                             key,
-                                            hal_ecdsa_key_to_der_len(key),
+                                            hal_ecdsa_private_key_to_der_len(key),
                                             p11_object_encode_ec_key);
 }
 
@@ -1347,7 +1347,7 @@ static hal_error_t p11_object_decode_rsa_key(void **key_,
 {
   assert(key_ != NULL);
   hal_rsa_key_t *key = NULL;
-  hal_error_t err = hal_rsa_key_from_der(&key, keybuf, keybuf_len, der, der_len);
+  hal_error_t err = hal_rsa_private_key_from_der(&key, keybuf, keybuf_len, der, der_len);
   *key_ = key;
   return err;
 }
@@ -1376,7 +1376,7 @@ static hal_error_t p11_object_decode_ec_key(void **key_,
 {
   assert(key_ != NULL);
   hal_ecdsa_key_t *key = NULL;
-  hal_error_t err = hal_ecdsa_key_from_der(&key, keybuf, keybuf_len, der, der_len);
+  hal_error_t err = hal_ecdsa_private_key_from_der(&key, keybuf, keybuf_len, der, der_len);
   *key_ = key;
   return err;
 }
@@ -1451,7 +1451,7 @@ static int p11_object_get_ec_public_key(const CK_OBJECT_HANDLE object_handle,
 
   const char *flavor = is_token_handle(object_handle) ? "token" : "session";
   sqlite3_stmt *q = NULL;
-  hal_ecdsa_curve_t curve;
+  hal_curve_name_t curve;
 
   assert(key != NULL && keybuf != NULL);
 
@@ -1996,7 +1996,7 @@ static CK_RV generate_keypair_ec(p11_session_t *session,
   uint8_t keybuf[hal_ecdsa_key_t_size];
   hal_ecdsa_key_t *key = NULL;
   const CK_BYTE *params = NULL;
-  hal_ecdsa_curve_t curve;
+  hal_curve_name_t curve;
   size_t params_len;
   CK_RV rv;
   int i;
@@ -2443,7 +2443,7 @@ static CK_RV sign_ecdsa(p11_session_t *session,
 {
   uint8_t keybuf[hal_ecdsa_key_t_size];
   hal_ecdsa_key_t *key = NULL;
-  hal_ecdsa_curve_t curve;
+  hal_curve_name_t curve;
   size_t signature_len;
   CK_RV rv;
 
@@ -2463,9 +2463,9 @@ static CK_RV sign_ecdsa(p11_session_t *session,
     lose(CKR_FUNCTION_FAILED);
 
   switch (curve) {
-  case HAL_ECDSA_CURVE_P256: signature_len = 256; break;
-  case HAL_ECDSA_CURVE_P384: signature_len = 384; break;
-  case HAL_ECDSA_CURVE_P521: signature_len = 521; break;
+  case HAL_CURVE_P256: signature_len = 256; break;
+  case HAL_CURVE_P384: signature_len = 384; break;
+  case HAL_CURVE_P521: signature_len = 521; break;
   default: lose(CKR_FUNCTION_FAILED);
   }
 
@@ -2488,8 +2488,7 @@ static CK_RV sign_ecdsa(p11_session_t *session,
   }
 
   if (pSignature != NULL && !hal_check(hal_ecdsa_sign(NULL, key, pData, ulDataLen,
-                                                      pSignature, &signature_len, *pulSignatureLen,
-                                                      HAL_ECDSA_SIGNATURE_FORMAT_PKCS11)))
+                                                      pSignature, &signature_len, *pulSignatureLen)))
     lose(CKR_FUNCTION_FAILED);
 
   assert(signature_len == *pulSignatureLen);
@@ -2532,8 +2531,7 @@ static CK_RV verify_ecdsa(p11_session_t *session,
     ulDataLen = sizeof(digest);
   }
 
-  if (!hal_check(hal_ecdsa_verify(NULL, key, pData, ulDataLen,
-                                  pSignature, ulSignatureLen, HAL_ECDSA_SIGNATURE_FORMAT_PKCS11)))
+  if (!hal_check(hal_ecdsa_verify(NULL, key, pData, ulDataLen, pSignature, ulSignatureLen)))
     lose(CKR_SIGNATURE_INVALID);
 
   rv = CKR_OK;                  /* Fall through */



More information about the Commits mailing list