OLD | NEW |
1 /* This Source Code Form is subject to the terms of the Mozilla Public | 1 /* This Source Code Form is subject to the terms of the Mozilla Public |
2 * License, v. 2.0. If a copy of the MPL was not distributed with this | 2 * License, v. 2.0. If a copy of the MPL was not distributed with this |
3 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ | 3 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ |
4 /* | 4 /* |
5 * This file implements PKCS 11 on top of our existing security modules | 5 * This file implements PKCS 11 on top of our existing security modules |
6 * | 6 * |
7 * For more information about PKCS 11 See PKCS 11 Token Inteface Standard. | 7 * For more information about PKCS 11 See PKCS 11 Token Inteface Standard. |
8 * This implementation has two slots: | 8 * This implementation has two slots: |
9 * slot 1 is our generic crypto support. It does not require login. | 9 * slot 1 is our generic crypto support. It does not require login. |
10 * It supports Public Key ops, and all they bulk ciphers and hashes. | 10 * It supports Public Key ops, and all they bulk ciphers and hashes. |
(...skipping 248 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
259 * | 259 * |
260 */ | 260 */ |
261 | 261 |
262 /* ------------------------- RSA Operations ---------------------------*/ | 262 /* ------------------------- RSA Operations ---------------------------*/ |
263 {CKM_RSA_PKCS_KEY_PAIR_GEN,{RSA_MIN_MODULUS_BITS,CK_MAX, | 263 {CKM_RSA_PKCS_KEY_PAIR_GEN,{RSA_MIN_MODULUS_BITS,CK_MAX, |
264 CKF_GENERATE_KEY_PAIR},PR_TRUE}, | 264 CKF_GENERATE_KEY_PAIR},PR_TRUE}, |
265 {CKM_RSA_PKCS, {RSA_MIN_MODULUS_BITS,CK_MAX, | 265 {CKM_RSA_PKCS, {RSA_MIN_MODULUS_BITS,CK_MAX, |
266 CKF_DUZ_IT_ALL}, PR_TRUE}, | 266 CKF_DUZ_IT_ALL}, PR_TRUE}, |
267 {CKM_RSA_PKCS_PSS, {RSA_MIN_MODULUS_BITS,CK_MAX, | 267 {CKM_RSA_PKCS_PSS, {RSA_MIN_MODULUS_BITS,CK_MAX, |
268 CKF_SN_VR}, PR_TRUE}, | 268 CKF_SN_VR}, PR_TRUE}, |
| 269 {CKM_RSA_PKCS_OAEP, {RSA_MIN_MODULUS_BITS,CK_MAX, |
| 270 CKF_EN_DE_WR_UN}, PR_TRUE}, |
269 #ifdef SFTK_RSA9796_SUPPORTED | 271 #ifdef SFTK_RSA9796_SUPPORTED |
270 {CKM_RSA_9796, {RSA_MIN_MODULUS_BITS,CK_MAX, | 272 {CKM_RSA_9796, {RSA_MIN_MODULUS_BITS,CK_MAX, |
271 CKF_DUZ_IT_ALL}, PR_TRUE}, | 273 CKF_DUZ_IT_ALL}, PR_TRUE}, |
272 #endif | 274 #endif |
273 {CKM_RSA_X_509, {RSA_MIN_MODULUS_BITS,CK_MAX, | 275 {CKM_RSA_X_509, {RSA_MIN_MODULUS_BITS,CK_MAX, |
274 CKF_DUZ_IT_ALL}, PR_TRUE}, | 276 CKF_DUZ_IT_ALL}, PR_TRUE}, |
275 /* -------------- RSA Multipart Signing Operations -------------------- */ | 277 /* -------------- RSA Multipart Signing Operations -------------------- */ |
276 {CKM_MD2_RSA_PKCS, {RSA_MIN_MODULUS_BITS,CK_MAX, | 278 {CKM_MD2_RSA_PKCS, {RSA_MIN_MODULUS_BITS,CK_MAX, |
277 CKF_SN_VR}, PR_TRUE}, | 279 CKF_SN_VR}, PR_TRUE}, |
278 {CKM_MD5_RSA_PKCS, {RSA_MIN_MODULUS_BITS,CK_MAX, | 280 {CKM_MD5_RSA_PKCS, {RSA_MIN_MODULUS_BITS,CK_MAX, |
(...skipping 4446 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
4725 | 4727 |
4726 | 4728 |
4727 CK_RV NSC_WaitForSlotEvent(CK_FLAGS flags, CK_SLOT_ID_PTR pSlot, | 4729 CK_RV NSC_WaitForSlotEvent(CK_FLAGS flags, CK_SLOT_ID_PTR pSlot, |
4728 CK_VOID_PTR pReserved) | 4730 CK_VOID_PTR pReserved) |
4729 { | 4731 { |
4730 CHECK_FORK(); | 4732 CHECK_FORK(); |
4731 | 4733 |
4732 return CKR_FUNCTION_NOT_SUPPORTED; | 4734 return CKR_FUNCTION_NOT_SUPPORTED; |
4733 } | 4735 } |
4734 | 4736 |
OLD | NEW |