// Copyright (c) 2002 Graz University of Technology. All rights reserved. // // Redistribution and use in source and binary forms, with or without modification, // are permitted provided that the following conditions are met: // // 1. Redistributions of source code must retain the above copyright notice, this // list of conditions and the following disclaimer. // // 2. Redistributions in binary form must reproduce the above copyright notice, // this list of conditions and the following disclaimer in the documentation // and/or other materials provided with the distribution. // // 3. The end-user documentation included with the redistribution, if any, must // include the following acknowledgment: // // "This product includes software developed by IAIK of Graz University of // Technology." // // Alternately, this acknowledgment may appear in the software itself, if and // wherever such third-party acknowledgments normally appear. // // 4. The names "Graz University of Technology" and "IAIK of Graz University of // Technology" must not be used to endorse or promote products derived from this // software without prior written permission. // // 5. Products derived from this software may not be called "IAIK PKCS Wrapper", // nor may "IAIK" appear in their name, without prior written permission of // Graz University of Technology. // // THIS SOFTWARE IS PROVIDED "AS IS" AND ANY EXPRESSED OR IMPLIED // WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED // WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR // PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE LICENSOR BE // LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, // OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, // PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, // OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON // ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, // OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY // OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE // POSSIBILITY OF SUCH DAMAGE. package iaik.pkcs.pkcs11; import iaik.pkcs.pkcs11.objects.Key; import iaik.pkcs.pkcs11.objects.KeyPair; import iaik.pkcs.pkcs11.objects.Object; import iaik.pkcs.pkcs11.objects.PrivateKey; import iaik.pkcs.pkcs11.objects.PublicKey; import iaik.pkcs.pkcs11.objects.SecretKey; import iaik.pkcs.pkcs11.parameters.Parameters; import iaik.pkcs.pkcs11.parameters.SSL3KeyMaterialParameters; import iaik.pkcs.pkcs11.parameters.SSL3MasterKeyDeriveParameters; import iaik.pkcs.pkcs11.wrapper.CK_ATTRIBUTE; import iaik.pkcs.pkcs11.wrapper.CK_MECHANISM; import iaik.pkcs.pkcs11.wrapper.CK_SESSION_INFO; import iaik.pkcs.pkcs11.wrapper.CK_SSL3_KEY_MAT_PARAMS; import iaik.pkcs.pkcs11.wrapper.CK_SSL3_MASTER_KEY_DERIVE_PARAMS; import iaik.pkcs.pkcs11.wrapper.Constants; import iaik.pkcs.pkcs11.wrapper.Functions; import iaik.pkcs.pkcs11.wrapper.PKCS11; import iaik.pkcs.pkcs11.wrapper.PKCS11Constants; import java.util.Vector; import java.util.concurrent.atomic.AtomicInteger; /** * Session objects are used to perform cryptographic operations on a token. The * application gets a Session object by calling openSession on a certain Token * object. Having the session object, the application may log-in the user, if * required. * *
 * 
 *   TokenInfo tokenInfo = token.getTokenInfo();
 *   // check, if log-in of the user is required at all
 *   if (tokenInfo.isLoginRequired()) {
 *     // check, if the token has own means to authenticate the user; e.g. a PIN-pad on the reader
 *     if (tokenInfo.isProtectedAuthenticationPath()) {
 *       System.out.println("Please enter the user PIN at the PIN-pad of your reader.");
 *       session.login(Session.UserType.USER, null); // the token prompts the PIN by other means; e.g. PIN-pad
 *     } else {
 *       System.out.print("Enter user-PIN and press [return key]: ");
 *       System.out.flush();
 *       BufferedReader input = new BufferedReader(new InputStreamReader(System.in));
 *       String userPINString = input.readLine();
 *       session.login(Session.UserType.USER, userPINString.toCharArray());
 *     }
 *   }
 * 
 * 
* * With this session object the application can search for token objects and * perform a cryptographic operation. For example, to find private RSA keys that * the application can use for signing, you can write: * *
 * 
 *   RSAPrivateKey privateSignatureKeyTemplate = new RSAPrivateKey();
 *   privateSignatureKeyTemplate.getSign().setBooleanValue(Boolean.TRUE);
 *
 *   session.findObjectsInit(privateSignatureKeyTemplate);
 *   Object[] privateSignatureKeys;
 *
 *   List signatureKeyList = new Vector(4);
 *   while ((privateSignatureKeys = session.findObjects(1)).length > 0) {
 *     signatureKeyList.add(privateSignatureKeys[0]);
 *   }
 *   session.findObjectsFinal();
 * 
 * 
* * Having chosen one of this keys, the application can create a signature value * using it. * *
 * 
 *   // e.g. the encoded digest info object that contains an identifier of the
 *   // hash algorithm and the hash value
 *   byte[] toBeSigned;
 *
 *   // toBeSigned = ... assign value
 *
 *   RSAPrivateKey selectedSignatureKey;
 *
 *   // selectedSignatureKey = ... assign one of the available signature keys
 *
 *   // initialize for signing
 *   session.signInit(Mechanism.RSA_PKCS, selectedSignatureKey);
 *
 *   // sign the data to be signed
 *   byte[] signatureValue = session.sign(toBeSigned);
 * 
 * 
* * If the application does not need the session any longer, it should close the * session. * *
 * 
 *   session.closeSession();
 * 
 * 
* * @see iaik.pkcs.pkcs11.objects.Object * @see iaik.pkcs.pkcs11.parameters.Parameters * @see iaik.pkcs.pkcs11.Session * @see iaik.pkcs.pkcs11.SessionInfo * @author Karl Scheibelhofer * @version 1.0 * @invariants (pkcs11Module_ <> null) */ public class Session { /** * This interface defines the different user types of PKCS#11. * * @author Karl Scheibelhofer * @version 1.0 * @invariants */ public interface UserType { /** * This constant stands for the security officer. */ public static boolean SO = false; /** * Thsi constant stands for the user (token owner). */ public static boolean USER = true; } /** * A reference to the underlying PKCS#11 module to perform the operations. */ protected Module module_; /** * A reference to the underlying PKCS#11 module to perform the operations. */ protected PKCS11 pkcs11Module_; /** * The session handle to perform the operations with. */ protected long sessionHandle_; /** * The token to perform the operations on. */ protected Token token_; /** * True, if UTF8 encoding is used as character encoding for character array * attributes and PINs. */ private boolean useUtf8Encoding_; // time after which to close idle sessions, in milliseconds (3 minutes) private final static long MAX_IDLE_TIME = 3 * 60 * 1000; // number of objects created within this session private final AtomicInteger createdObjects; // time this session was last used // not synchronized/volatile for performance, so may be unreliable // this could lead to idle sessions being closed early, but that is harmless private long lastAccess; /** * Constructor taking the token and the session handle. * * @param token The token this session operates with. * @param sessionHandle The session handle to perform the operations with. * @preconditions (token <> null) * @postconditions */ protected Session(Token token, long sessionHandle) { if (token == null) { throw new NullPointerException("Argument \"token\" must not be null."); } token_ = token; module_ = token_.getSlot().getModule(); pkcs11Module_ = module_.getPKCS11Module(); sessionHandle_ = sessionHandle; useUtf8Encoding_ = token.useUtf8Encoding_; createdObjects = new AtomicInteger(); } boolean isLive(long currentTime) { return currentTime - lastAccess < MAX_IDLE_TIME; } long id() throws TokenException { if (token_.getSlot().getSlotInfo().isTokenPresent() == false) { throw new TokenException("Token has been removed"); } return sessionHandle_; } int addObject() { int n = createdObjects.incrementAndGet(); // XXX update statistics in session manager if n == 1 return n; } int removeObject() { int n = createdObjects.decrementAndGet(); return n; } public boolean hasObjects() { return createdObjects.get() != 0; } /** * Initializes the user-PIN. Can only be called from a read-write security * officer session. May be used to set a new user-PIN if the user-PIN is * locked. * * @param pin The new user-PIN. This parameter may be null, if the token has * a protected authentication path. Refer to the PKCS#11 standard for * details. * @exception TokenException If the session has not the right to set the PIN * of if the operation fails for some other reason. * @preconditions * @postconditions */ public void initPIN(char[] pin) throws TokenException { pkcs11Module_.C_InitPIN(sessionHandle_, pin, useUtf8Encoding_); } /** * Set the user-PIN to a new value. Can only be called from a read-write * sessions. * * @param oldPin The old (current) user-PIN. * @param newPin The new value for the user-PIN. * @exception TokenException If setting the new PIN fails. * @preconditions * @postconditions */ public void setPIN(char[] oldPin, char[] newPin) throws TokenException { pkcs11Module_.C_SetPIN(sessionHandle_, oldPin, newPin, useUtf8Encoding_); } /** * Closes this session. * * @exception TokenException If closing the session failed. * @preconditions * @postconditions */ public void closeSession() throws TokenException { pkcs11Module_.C_CloseSession(sessionHandle_); } /** * Compares the sessionHandle and token_ of this object with the other * object. Returns only true, if those are equal in both objects. * * @param otherObject The other Session object. * @return True, if other is an instance of Token and the session handles * and tokens of both objects are equal. False, otherwise. * @preconditions * @postconditions */ public boolean equals(java.lang.Object otherObject) { boolean equal = false; if (otherObject instanceof Session) { Session other = (Session) otherObject; equal = (this == other) || ((this.sessionHandle_ == other.sessionHandle_) && this.token_ .equals(other.token_)); } return equal; } /** * The overriding of this method should ensure that the objects of this * class work correctly in a hashtable. * * @return The hash code of this object. Gained from the sessionHandle. * @preconditions * @postconditions */ public int hashCode() { return (int) sessionHandle_; } /** * Get the handle of this session. * * @return The handle of this session. * @preconditions * @postconditions */ public long getSessionHandle() { return sessionHandle_; } /** * Get information about this session. * * @return An object providing information about this session. * @exception TokenException If getting the information failed. * @preconditions * @postconditions (result <> null) */ public SessionInfo getSessionInfo() throws TokenException { CK_SESSION_INFO ckSessionInfo = pkcs11Module_.C_GetSessionInfo(sessionHandle_); return new SessionInfo(ckSessionInfo); } /** * Get the Module which this Session object operates with. * * @return The module of this session. * @preconditions * @postconditions */ public Module getModule() { return module_; } /** * Get the token that created this Session object. * * @return The token of this session. * @preconditions * @postconditions */ public Token getToken() { return token_; } /** * Get the current operation state. This state can be used later to restore * the operation to exactly this state. * * @return The current operation state as a byte array. * @exception TokenException If saving the state fails or is not possible. * @see #setOperationState(byte[],Key,Key) * @preconditions * @postconditions (result <> null) */ public byte[] getOperationState() throws TokenException { return pkcs11Module_.C_GetOperationState(sessionHandle_); } /** * Sets the operation state of this session to a previously saved one. This * method may need the key used during the saved operation to continue, * because it may not be possible to save a key into the state's byte array. * Refer to the PKCS#11 standard for details on this function. * * @param operationState The previously saved state as returned by * getOperationState(). * @param encryptionKey A encryption or decryption key, if a encryption or * decryption operation was saved which should be continued, but the keys * could not be saved. * @param authenticationKey A signing, verification of MAC key, if a * signing, verification or MAC operation needs to be restored that could * not save the key. * @exception TokenException If restoring the state fails. * @see #getOperationState() * @preconditions * @postconditions */ public void setOperationState(byte[] operationState, Key encryptionKey, Key authenticationKey) throws TokenException { pkcs11Module_.C_SetOperationState(sessionHandle_, operationState, encryptionKey.getObjectHandle(), authenticationKey.getObjectHandle()); } /** * Returns whether UTF8 encoding is set. * * @return true, if UTF8 is used as character encoding for character array * attributes and PINs. */ public boolean isSetUtf8Encoding() { return useUtf8Encoding_; } /** * Logs in the user or the security officer to the session. Notice that all * sessions of a token have the same login state; i.e. if you login the user * to one session all other open sessions of this token get user rights. * * @param userType UserType.SO for the security officer or UserType.USER to * login the user. * @param pin The PIN. The security officer-PIN or the user-PIN depending on * the userType parameter. * @exception TokenException If login fails. * @preconditions * @postconditions */ public void login(boolean userType, char[] pin) throws TokenException { long lUserType = (userType == UserType.SO) ? PKCS11Constants.CKU_SO : PKCS11Constants.CKU_USER; pkcs11Module_.C_Login(sessionHandle_, lUserType, pin, useUtf8Encoding_); } /** * Logs out this session. * * @exception TokenException If logging out the session fails. * @preconditions * @postconditions */ public void logout() throws TokenException { pkcs11Module_.C_Logout(sessionHandle_); } /** * Create a new object on the token (or in the session). The application * must provide a template that holds enough information to create a certain * object. For instance, if the application wants to create a new DES key * object it creates a new instance of the DESSecretKey class to serve as a * template. The application must set all attributes of this new object * which are required for the creation of such an object on the token. Then * it passes this DESSecretKey object to this method to create the object on * the token. Example: * DESSecretKey desKeyTemplate = new DESSecretKey(); * // the key type is set by the DESSecretKey's constructor, so you need not do it * desKeyTemplate.setValue(myDesKeyValueAs8BytesLongByteArray); * desKeyTemplate.setToken(Boolean.TRUE); * desKeyTemplate.setPrivate(Boolean.TRUE); * desKeyTemplate.setEncrypt(Boolean.TRUE); * desKeyTemplate.setDecrypt(Boolean.TRUE); * ... * DESSecretKey theCreatedDESKeyObject = (DESSecretKey) userSession.createObject(desKeyTemplate); * Refer to the PKCS#11 standard to find out what attributes must be * set for certain types of objects to create them on the token. * * @param templateObject The template object that holds all values that the * new object on the token should contain. (this is not a java.lang.Object!) * @return A new PKCS#11 Object (this is not a java.lang.Object!) that * serves holds all the (readable) attributes of the object on the token. In * contrast to the templateObject, this object might have certain attributes * set to token-dependent default-values. * @exception TokenException If the creation of the new object fails. If it * fails, the no new object was created on the token. * @preconditions (templateObject <> null) * @postconditions (result <> null) */ public Object createObject(Object templateObject) throws TokenException { CK_ATTRIBUTE[] ckAttributes = Object.getSetAttributes(templateObject); long objectHandle = pkcs11Module_.C_CreateObject(sessionHandle_, ckAttributes, useUtf8Encoding_); return Object.getInstance(this, objectHandle); } /** * Copy an existing object. The source object and a template object are * given. Any value set in the template object will override the * corresponding value from the source object, when the new object ist * created. See the PKCS#11 standard for details. * * @param sourceObject The source object of the copy operation. * @param templateObject A template object which's attribute values are used * for the new object; i.e. they have higher priority than the attribute * values from the source object. May be null; in that case the new object * is just a one-to-one copy of the sourceObject. * @return The new object that is created by copying the source object and * setting attributes to the values given by the templateObject. * @exception TokenException If copying the object fails for some reason. * @preconditions (sourceObject <> null) * @postconditions */ public Object copyObject(Object sourceObject, Object templateObject) throws TokenException { long sourceObjectHandle = sourceObject.getObjectHandle(); CK_ATTRIBUTE[] ckAttributes = Object.getSetAttributes(templateObject); long newObjectHandle = pkcs11Module_.C_CopyObject(sessionHandle_, sourceObjectHandle, ckAttributes, useUtf8Encoding_); return Object.getInstance(this, newObjectHandle); } /** * Gets all present attributes of the given template object an writes them * to the object to update on the token (or in the session). Both parameters * may refer to the same Java object. This is possible, because this method * only needs the object handle of the objectToUpdate, and gets the * attributes to set from the template. This means, an application can get * the object using createObject of findObject, then modify attributes of * this Java object and then call this method passing this object as both * parameters. This will update the object on the token to the values as * modified in the Java object. * * @param objectToUpdate The attributes of this object get updated. * @param templateObject This methods gets all present attributes of this * template object and set this attributes at the objectToUpdate. * @exception TokenException If updateing the attributes fails. All or no * attributes are updated. * @preconditions (objectToUpdate <> null) and (template <> null) * @postconditions */ public void setAttributeValues(Object objectToUpdate, Object templateObject) throws TokenException { long objectToUpdateHandle = objectToUpdate.getObjectHandle(); CK_ATTRIBUTE[] ckAttributesTemplates = Object.getSetAttributes(templateObject); pkcs11Module_.C_SetAttributeValue(sessionHandle_, objectToUpdateHandle, ckAttributesTemplates, useUtf8Encoding_); } /** * Reads all the attributes of the given Object from the token and returns a * new Object that contains all these attributes. The given objectToRead and * the returned Object are different Java objects. This method just uses the * object handle of the given object, it does not modify anything in this * object. * * @param objectToRead The object to newly read from the token. * @return A new Object holding all attributes that this method just read * from the token. * @exception TokenException If reading the attributes fails. * @preconditions (objectToRead <> null) * @postconditions (result <> null) */ public Object getAttributeValues(Object objectToRead) throws TokenException { long objectHandle = objectToRead.getObjectHandle(); return Object.getInstance(this, objectHandle); } /** * Destroy a certain object on the token (or in the session). Give the * object that you want to destroy. This method uses only the internal * object handle of the given object to identify the object. * * @param object The object that should be destroyed. * @exception TokenException If the object could not be destroyed. * @preconditions (object <> null) * @postconditions */ public void destroyObject(Object object) throws TokenException { long objectHandle = object.getObjectHandle(); pkcs11Module_.C_DestroyObject(sessionHandle_, objectHandle); } /** * Get the size of the specified object in bytes. This size specifies how * much memory the object takes up on the token. * * @param object The object to get the size for. * @return The object's size bytes. * @exception TokenException If determining the size fails. * @preconditions (object <> null) * @postconditions */ public long getObjectSize(Object object) throws TokenException { long objectHandle = object.getObjectHandle(); return pkcs11Module_.C_GetObjectSize(sessionHandle_, objectHandle); } /** * Initializes a find operations that provides means to find objects by * passing a template object. This method get all set attributes of the * template object ans searches for all objects on the token that match with * these attributes. * * @param templateObject The object that serves as a template for searching. * If this object is null, the find operation will find all objects that * this session can see. Notice, that only a user session will see private * objects. * @exception TokenException If initializing the find operation fails. * @preconditions * @postconditions */ public void findObjectsInit(Object templateObject) throws TokenException { CK_ATTRIBUTE[] ckAttributes = Object.getSetAttributes(templateObject); pkcs11Module_.C_FindObjectsInit(sessionHandle_, ckAttributes, useUtf8Encoding_); } /** * Finds objects that match the template object passed to findObjectsInit. * The application must call findObjectsInit before calling this method. * With maxObjectCount the application can specifay how many objects to * return at once; i.e. the application can get all found objects by * susequent calls to this method like maxObjectCount(1) until it receives * an empty array (this method never returns null!). * * @param maxObjectCount Specifies how many objects to return with this * call. * @return An array of found objects. The maximum size of this array is * maxObjectCount, the minimum length is 0. Never returns null. * @exception TokenException A plain TokenException if something during * PKCS11 FindObject went wrong, a TokenException with a nested * TokenException if the Exception is raised during object parsing. * @preconditions * @postconditions (result <> null) */ public Object[] findObjects(int maxObjectCount) throws TokenException { Vector foundObjects = new Vector(); long[] objectHandles = pkcs11Module_.C_FindObjects(sessionHandle_, maxObjectCount); try { for (int i = 0; i < objectHandles.length; i++) { Object object = Object.getInstance(this, objectHandles[i]); foundObjects.addElement(object); } Object[] objectArray = new Object[foundObjects.size()]; foundObjects.copyInto(objectArray); return objectArray; } catch (TokenException e) { // encapsulate exception to signal a cause other than C_FindObjects throw new TokenException(e); } } /** * Finalizes a find operation. The application must call this method to * finalize a find operation before attempting to start any other operation. * * @exception TokenException If finalizing the current find operation was * not possible. * @preconditions * @postconditions */ public void findObjectsFinal() throws TokenException { pkcs11Module_.C_FindObjectsFinal(sessionHandle_); } /** * Initializes a new encryption operation. The application must call this * method before calling any other encrypt* operation. Before initializing a * new operation, any currently pending operation must be finalized using * the appropriate *Final method (e.g. digestFinal()). There are exceptions * for dual-function operations. This method requires the mechansim to use * for encrpytion and the key for this oepration. The key must have set its * encryption flag. For the mechanism the application may use a constant * defined in the Mechanism class. Notice that the key and the mechanism * must be compatible; i.e. you cannot use a DES key with the RSA mechanism. * * @param mechanism The mechanism to use; e.g. Mechanism.DES_CBC. * @param key The decryption key to use. * @exception TokenException If initializing this operation failed. * @preconditions (mechansim <> null) and (key <> null) * @postconditions */ public void encryptInit(Mechanism mechanism, Key key) throws TokenException { CK_MECHANISM ckMechanism = new CK_MECHANISM(); ckMechanism.mechanism = mechanism.getMechanismCode(); Parameters parameters = mechanism.getParameters(); ckMechanism.pParameter = (parameters != null) ? parameters.getPKCS11ParamsObject() : null; pkcs11Module_.C_EncryptInit(sessionHandle_, ckMechanism, key.getObjectHandle(), useUtf8Encoding_); } /** * Encrypts the given data with the key and mechansim given to the * encryptInit method. This method finalizes the current encryption * operation; i.e. the application need (and should) not call encryptFinal() * after this call. For encrypting multiple pices of data use encryptUpdate * and encryptFinal. * * @param data The data to encrpyt. * @return The encrpyted data. * @exception TokenException If encrypting failed. * @preconditions (data <> null) * @postconditions (result <> null) */ public byte[] encrypt(byte[] data) throws TokenException { return pkcs11Module_.C_Encrypt(sessionHandle_, data); } /** * This method can be used to encrypt multiple pieces of data; e.g. * buffer-size pieces when reading the data from a stream. Encrypts the * given data with the key and mechansim given to the encryptInit method. * The application must call encryptFinal to get the final result of the * encryption after feeding in all data using this method. * * @param part The piece of data to encrpt. * @return The intermediate encryption result. May not be available. To get * the final result call encryptFinal. * @exception TokenException If encrypting the data failed. * @preconditions (part <> null) * @postconditions */ public byte[] encryptUpdate(byte[] part) throws TokenException { return pkcs11Module_.C_EncryptUpdate(sessionHandle_, part); } /** * This method finalizes an encrpytion operation and returns the final * result. Use this method, if you fed in the data using encryptUpdate. If * you used the encrypt(byte[]) method, you need not (and shall not) call * this method, because encrypt(byte[]) finalizes the encryption itself. * * @return The final result of the encryption; i.e. the encrypted data. * @exception TokenException If calculating the final result failed. * @preconditions * @postconditions (result <> null) */ public byte[] encryptFinal() throws TokenException { return pkcs11Module_.C_EncryptFinal(sessionHandle_); } /** * Initializes a new decryption operation. The application must call this * method before calling any other decrypt* operation. Before initializing a * new operation, any currently pending operation must be finalized using * the appropriate *Final method (e.g. digestFinal()). There are exceptions * for dual-function operations. This method requires the mechansim to use * for decrpytion and the key for this oepration. The key must have set its * decryption flag. For the mechanism the application may use a constant * defined in the Mechanism class. Notice that the key and the mechanism * must be compatible; i.e. you cannot use a DES key with the RSA mechanism. * * @param mechanism The mechanism to use; e.g. Mechanism.DES_CBC. * @param key The decryption key to use. * @exception TokenException If initializing this operation failed. * @preconditions (mechansim <> null) and (key <> null) * @postconditions */ public void decryptInit(Mechanism mechanism, Key key) throws TokenException { CK_MECHANISM ckMechanism = new CK_MECHANISM(); ckMechanism.mechanism = mechanism.getMechanismCode(); Parameters parameters = mechanism.getParameters(); ckMechanism.pParameter = (parameters != null) ? parameters.getPKCS11ParamsObject() : null; pkcs11Module_.C_DecryptInit(sessionHandle_, ckMechanism, key.getObjectHandle(), useUtf8Encoding_); } /** * Decrypts the given data with the key and mechansim given to the * decryptInit method. This method finalizes the current decryption * operation; i.e. the application need (and should) not call decryptFinal() * after this call. For decrypting multiple pices of data use decryptUpdate * and decryptFinal. * * @param data The data to decrpyt. * @return The decrpyted data. * @exception TokenException If decrypting failed. * @preconditions (data <> null) * @postconditions (result <> null) */ public byte[] decrypt(byte[] data) throws TokenException { return pkcs11Module_.C_Decrypt(sessionHandle_, data); } /** * This method can be used to decrypt multiple pieces of data; e.g. * buffer-size pieces when reading the data from a stream. Decrypts the * given data with the key and mechansim given to the decryptInit method. * The application must call decryptFinal to get the final result of the * encryption after feeding in all data using this method. * * @param encryptedPart The piece of data to decrpt. * @return The intermediate decryption result. May not be available. To get * the final result call decryptFinal. * @exception TokenException If decrypting the data failed. * @preconditions (encryptedPart <> null) * @postconditions */ public byte[] decryptUpdate(byte[] encryptedPart) throws TokenException { return pkcs11Module_.C_DecryptUpdate(sessionHandle_, encryptedPart); } /** * This method finalizes a decrpytion operation and returns the final * result. Use this method, if you fed in the data using decryptUpdate. If * you used the decrypt(byte[]) method, you need not (and shall not) call * this method, because decrypt(byte[]) finalizes the decryption itself. * * @return The final result of the decryption; i.e. the decrypted data. * @exception TokenException If calculating the final result failed. * @preconditions * @postconditions (result <> null) */ public byte[] decryptFinal() throws TokenException { return pkcs11Module_.C_DecryptFinal(sessionHandle_); } /** * Initializes a new digesting operation. The application must call this * method before calling any other digest* operation. Before initializing a * new operation, any currently pending operation must be finalized using * the appropriate *Final method (e.g. digestFinal()). There are exceptions * for dual-function operations. This method requires the mechansim to use * for digesting for this oepration. For the mechanism the application may * use a constant defined in the Mechanism class. * * @param mechanism The mechanism to use; e.g. Mechanism.SHA_1. * @exception TokenException If initializing this operation failed. * @preconditions (mechansim <> null) * @postconditions */ public void digestInit(Mechanism mechanism) throws TokenException { CK_MECHANISM ckMechanism = new CK_MECHANISM(); ckMechanism.mechanism = mechanism.getMechanismCode(); Parameters parameters = mechanism.getParameters(); ckMechanism.pParameter = (parameters != null) ? parameters.getPKCS11ParamsObject() : null; pkcs11Module_.C_DigestInit(sessionHandle_, ckMechanism, useUtf8Encoding_); } /** * Digests the given data with the mechansim given to the digestInit method. * This method finalizes the current digesting operation; i.e. the * application need (and should) not call digestFinal() after this call. For * digesting multiple pices of data use digestUpdate and digestFinal. * * @param data The data to digest. * @return The digested data. * @exception TokenException If digesting the data failed. * @preconditions (data <> null) * @postconditions (result <> null) */ public byte[] digest(byte[] data) throws TokenException { return pkcs11Module_.C_Digest(sessionHandle_, data); } /** * This method can be used to digest multiple pieces of data; e.g. * buffer-size pieces when reading the data from a stream. Digests the given * data with the mechansim given to the digestInit method. The application * must call digestFinal to get the final result of the digesting after * feeding in all data using this method. * * @param part The piece of data to digest. * @exception TokenException If digesting the data failed. * @preconditions (part <> null) * @postconditions */ public void digestUpdate(byte[] part) throws TokenException { pkcs11Module_.C_DigestUpdate(sessionHandle_, part); } /** * This method is similar to digestUpdate and can be combined with it during * one digesting operation. This method digests the value of the given * secret key. * * @param key The key to digest the value of. * @exception TokenException If digesting the key failed. * @preconditions (key <> null) * @postconditions */ public void digestKey(SecretKey key) throws TokenException { pkcs11Module_.C_DigestKey(sessionHandle_, key.getObjectHandle()); } /** * This method finalizes a digesting operation and returns the final result. * Use this method, if you fed in the data using digestUpdate and/or * digestKey. If you used the digest(byte[]) method, you need not (and shall * not) call this method, because digest(byte[]) finalizes the digesting * itself. * * @return The final result of the digesting; i.e. the message digest. * @exception TokenException If calculating the final message digest failed. * @preconditions * @postconditions (result <> null) */ public byte[] digestFinal() throws TokenException { return pkcs11Module_.C_DigestFinal(sessionHandle_); } /** * Initializes a new signing operation. Use it for signatures and MACs. The * application must call this method before calling any other sign* * operation. Before initializing a new operation, any currently pending * operation must be finalized using the appropriate *Final method (e.g. * digestFinal()). There are exceptions for dual-function operations. This * method requires the mechansim to use for signing and the key for this * oepration. The key must have set its sign flag. For the mechanism the * application may use a constant defined in the Mechanism class. Notice * that the key and the mechanism must be compatible; i.e. you cannot use a * DES key with the RSA mechanism. * * @param mechanism The mechanism to use; e.g. Mechanism.RSA_PKCS. * @param key The signing key to use. * @exception TokenException If initializing this operation failed. * @preconditions (mechansim <> null) and (key <> null) * @postconditions */ public void signInit(Mechanism mechanism, Key key) throws TokenException { CK_MECHANISM ckMechanism = new CK_MECHANISM(); ckMechanism.mechanism = mechanism.getMechanismCode(); Parameters parameters = mechanism.getParameters(); ckMechanism.pParameter = (parameters != null) ? parameters.getPKCS11ParamsObject() : null; pkcs11Module_.C_SignInit(sessionHandle_, ckMechanism, key.getObjectHandle(), useUtf8Encoding_); } /** * Signs the given data with the key and mechansim given to the signInit * method. This method finalizes the current signing operation; i.e. the * application need (and should) not call signFinal() after this call. For * signing multiple pices of data use signUpdate and signFinal. * * @param data The data to sign. * @return The signed data. * @exception TokenException If signing the data failed. * @preconditions (data <> null) * @postconditions (result <> null) */ public byte[] sign(byte[] data) throws TokenException { return pkcs11Module_.C_Sign(sessionHandle_, data); } /** * This method can be used to sign multiple pieces of data; e.g. buffer-size * pieces when reading the data from a stream. Signs the given data with the * mechansim given to the signInit method. The application must call * signFinal to get the final result of the signing after feeding in all * data using this method. * * @param part The piece of data to sign. * @exception TokenException If signing the data failed. * @preconditions (part <> null) * @postconditions */ public void signUpdate(byte[] part) throws TokenException { pkcs11Module_.C_SignUpdate(sessionHandle_, part); } /** * This method finalizes a signing operation and returns the final result. * Use this method, if you fed in the data using signUpdate. If you used the * sign(byte[]) method, you need not (and shall not) call this method, * because sign(byte[]) finalizes the signing operation itself. * * @return The final result of the signing operation; i.e. the signature * value. * @exception TokenException If calculating the final signature value * failed. * @preconditions * @postconditions (result <> null) */ public byte[] signFinal() throws TokenException { return pkcs11Module_.C_SignFinal(sessionHandle_); } /** * Initializes a new signing operation for signing with recovery. The * application must call this method before calling signRecover. Before * initializing a new operation, any currently pending operation must be * finalized using the appropriate *Final method (e.g. digestFinal()). There * are exceptions for dual-function operations. This method requires the * mechansim to use for signing and the key for this oepration. The key must * have set its sign-recover flag. For the mechanism the application may use * a constant defined in the Mechanism class. Notice that the key and the * mechanism must be compatible; i.e. you cannot use a DES key with the RSA * mechanism. * * @param mechanism The mechanism to use; e.g. Mechanism.RSA_9796. * @param key The signing key to use. * @exception TokenException If initializing this operation failed. * @preconditions (mechansim <> null) and (key <> null) * @postconditions */ public void signRecoverInit(Mechanism mechanism, Key key) throws TokenException { CK_MECHANISM ckMechanism = new CK_MECHANISM(); ckMechanism.mechanism = mechanism.getMechanismCode(); Parameters parameters = mechanism.getParameters(); ckMechanism.pParameter = (parameters != null) ? parameters.getPKCS11ParamsObject() : null; pkcs11Module_.C_SignRecoverInit(sessionHandle_, ckMechanism, key.getObjectHandle(), useUtf8Encoding_); } /** * Signs the given data with the key and mechansim given to the * signRecoverInit method. This method finalizes the current sign-recover * operation; there is no equivalent method to signUpdate for signing with * recovery. * * @param data The data to sign. * @return The signed data. * @exception TokenException If signing the data failed. * @preconditions (data <> null) * @postconditions (result <> null) */ public byte[] signRecover(byte[] data) throws TokenException { return pkcs11Module_.C_SignRecover(sessionHandle_, data); } /** * Initializes a new verification operation. You can use it for verifying * signatures and MACs. The application must call this method before calling * any other verify* operation. Before initializing a new operation, any * currently pending operation must be finalized using the appropriate * *Final method (e.g. digestFinal()). There are exceptions for * dual-function operations. This method requires the mechansim to use for * verification and the key for this oepration. The key must have set its * verify flag. For the mechanism the application may use a constant defined * in the Mechanism class. Notice that the key and the mechanism must be * compatible; i.e. you cannot use a DES key with the RSA mechanism. * * @param mechanism The mechanism to use; e.g. Mechanism.RSA_PKCS. * @param key The verification key to use. * @exception TokenException If initializing this operation failed. * @preconditions (mechansim <> null) and (key <> null) * @postconditions */ public void verifyInit(Mechanism mechanism, Key key) throws TokenException { CK_MECHANISM ckMechanism = new CK_MECHANISM(); ckMechanism.mechanism = mechanism.getMechanismCode(); Parameters parameters = mechanism.getParameters(); ckMechanism.pParameter = (parameters != null) ? parameters.getPKCS11ParamsObject() : null; pkcs11Module_.C_VerifyInit(sessionHandle_, ckMechanism, key.getObjectHandle(), useUtf8Encoding_); } /** * Verifies the given signature against the given data with the key and * mechansim given to the verifyInit method. This method finalizes the * current verification operation; i.e. the application need (and should) * not call verifyFinal() after this call. For verifying with multiple pices * of data use verifyUpdate and verifyFinal. This method throws an * exception, if the verification of the signature fails. * * @param data The data that was signed. * @param signature The signature or MAC to verify. * @exception TokenException If verifying the signature fails. This is also * the case, if the signature is forged. * @preconditions (data <> null) and (signature <> null) * @postconditions */ public void verify(byte[] data, byte[] signature) throws TokenException { pkcs11Module_.C_Verify(sessionHandle_, data, signature); } /** * This method can be used to verify a signature with multiple pieces of * data; e.g. buffer-size pieces when reading the data from a stream. To * verify the signature or MAC call verifyFinal after feeding in all data * using this method. * * @param part The piece of data to verify against. * @exception TokenException If verifying (e.g. digesting) the data failed. * @preconditions (part <> null) * @postconditions */ public void verifyUpdate(byte[] part) throws TokenException { pkcs11Module_.C_VerifyUpdate(sessionHandle_, part); } /** * This method finalizes a verification operation. Use this method, if you * fed in the data using verifyUpdate. If you used the verify(byte[]) * method, you need not (and shall not) call this method, because * verify(byte[]) finalizes the verification operation itself. If this * method verified the signature successfully, it returns normally. If the * verification of the signature fails, e.g. if the signature was forged or * the data was modified, this method throws an exception. * * @param signature The signature value. * @exception TokenException If verifying the signature fails. This is also * the case, if the signature is forged. * @preconditions * @postconditions (result <> null) */ public void verifyFinal(byte[] signature) throws TokenException { pkcs11Module_.C_VerifyFinal(sessionHandle_, signature); } /** * Initializes a new verification operation for verification with data * recovery. The application must call this method before calling * verifyRecover. Before initializing a new operation, any currently pending * operation must be finalized using the appropriate *Final method (e.g. * digestFinal()). This method requires the mechansim to use for * verification and the key for this oepration. The key must have set its * verify-recover flag. For the mechanism the application may use a constant * defined in the Mechanism class. Notice that the key and the mechanism * must be compatible; i.e. you cannot use a DES key with the RSA mechanism. * * @param mechanism The mechanism to use; e.g. Mechanism.RSA_9796. * @param key The verification key to use. * @exception TokenException If initializing this operation failed. * @preconditions (mechansim <> null) and (key <> null) * @postconditions */ public void verifyRecoverInit(Mechanism mechanism, Key key) throws TokenException { CK_MECHANISM ckMechanism = new CK_MECHANISM(); ckMechanism.mechanism = mechanism.getMechanismCode(); Parameters parameters = mechanism.getParameters(); ckMechanism.pParameter = (parameters != null) ? parameters.getPKCS11ParamsObject() : null; pkcs11Module_.C_VerifyRecoverInit(sessionHandle_, ckMechanism, key.getObjectHandle(), useUtf8Encoding_); } /** * Signs the given data with the key and mechansim given to the * signRecoverInit method. This method finalizes the current sign-recover * operation; there is no equivalent method to signUpdate for signing with * recovery. * * @param signature The data to sign. * @return The signed data. * @exception TokenException If signing the data failed. * @preconditions (data <> null) * @postconditions (result <> null) */ public byte[] verifyRecover(byte[] signature) throws TokenException { return pkcs11Module_.C_VerifyRecover(sessionHandle_, signature); } /** * Dual-function. Continues a multipart dual digest and encryption * operation. This method call can also be combined with calls to * digestUpdate, digestKey and encryptUpdate. Call digestFinal and * encryptFinal to get the final results. * * @param part The piece of data to digest and encrypt. * @return The intermediate result of the encryption. * @exception TokenException If digesting or encrypting the data failed. * @preconditions (part <> null) * @postconditions */ public byte[] digestEncryptedUpdate(byte[] part) throws TokenException { return pkcs11Module_.C_DigestEncryptUpdate(sessionHandle_, part); } /** * Dual-function. Continues a multipart dual decrypt and digest operation. * This method call can also be combined with calls to digestUpdate, * digestKey and decryptUpdate. It is the recovered plaintext that gets * digested in this method call, not the given encryptedPart. Call * digestFinal and decryptFinal to get the final results. * * @param part The piece of data to decrypt and digest. * @return The intermediate result of the decryption; the decrypted data. * @exception TokenException If decrypting or digesting the data failed. * @preconditions (part <> null) * @postconditions */ public byte[] decryptDigestUpdate(byte[] part) throws TokenException { return pkcs11Module_.C_DecryptDigestUpdate(sessionHandle_, part); } /** * Dual-function. Continues a multipart dual sign and encrypt operation. * Calls to this method can also be combined with calls to signUpdate and * encryptUpdate. Call signFinal and encryptFinal to get the final results. * * @param part The piece of data to sign and encrypt. * @return The intermediate result of the encryption; the encrypted data. * @exception TokenException If signing or encrypting the data failed. * @preconditions (part <> null) * @postconditions */ public byte[] signEncryptUpdate(byte[] part) throws TokenException { return pkcs11Module_.C_SignEncryptUpdate(sessionHandle_, part); } /** * Dual-function. Continues a multipart dual decrypt and verify operation. * This method call can also be combined with calls to decryptUpdate and * verifyUpdate. It is the recovered plaintext that gets verified in this * method call, not the given encryptedPart. Call decryptFinal and * verifyFinal to get the final results. * * @param encryptedPart The piece of data to decrypt and verify. * @return The intermediate result of the decryption; the decrypted data. * @exception TokenException If decrypting or verifying the data failed. * @preconditions (encryptedPart <> null) * @postconditions */ public byte[] decryptVerifyUpdate(byte[] encryptedPart) throws TokenException { return pkcs11Module_.C_DecryptVerifyUpdate(sessionHandle_, encryptedPart); } /** * Generate a new secret key or a set of domain parameters. It uses the set * attributes of the template for setting the attributes of the new key * object. As mechanism the application can use a constant of the Mechanism * class. * * @param mechanism The mechanism to generate a key for; e.g. Mechanism.DES * to generate a DES key. * @param template The template for the new key or domain parameters; e.g. a * DESSecretKey object which has set certain attributes. * @return The newly generated secret key or domain parameters. * @exception TokenException If generating a new secert key or domain * parameters failed. * @preconditions * @postconditions (result instanceof SecretKey) or (result instanceof * DomainParameters) */ public Object generateKey(Mechanism mechanism, Object template) throws TokenException { CK_MECHANISM ckMechanism = new CK_MECHANISM(); ckMechanism.mechanism = mechanism.getMechanismCode(); Parameters parameters = mechanism.getParameters(); ckMechanism.pParameter = (parameters != null) ? parameters.getPKCS11ParamsObject() : null; CK_ATTRIBUTE[] ckAttributes = Object.getSetAttributes(template); long objectHandle = pkcs11Module_.C_GenerateKey(sessionHandle_, ckMechanism, ckAttributes, useUtf8Encoding_); return Object.getInstance(this, objectHandle); } /** * Generate a new public key - private key key-pair and use the set * attributes of the template objects for setting the attributes of the new * public key and private key objects. As mechanism the application can use * a constant of the Mechanism class. * * @param mechanism The mechanism to generate a key for; e.g. Mechanism.RSA * to generate a new RSA key-pair. * @param publicKeyTemplate The template for the new public key part; e.g. a * RSAPublicKey object which has set certain attributes (e.g. public * exponent and verify). * @param privateKeyTemplate The template for the new private key part; e.g. * a RSAPrivateKey object which has set certain attributes (e.g. sign and * decrypt). * @return The newly generated key-pair. * @exception TokenException If generating a new key-pair failed. * @preconditions * @postconditions */ public KeyPair generateKeyPair(Mechanism mechanism, Object publicKeyTemplate, Object privateKeyTemplate) throws TokenException { CK_MECHANISM ckMechanism = new CK_MECHANISM(); ckMechanism.mechanism = mechanism.getMechanismCode(); Parameters parameters = mechanism.getParameters(); ckMechanism.pParameter = (parameters != null) ? parameters.getPKCS11ParamsObject() : null; CK_ATTRIBUTE[] ckPublicKeyAttributes = Object.getSetAttributes(publicKeyTemplate); CK_ATTRIBUTE[] ckPrivateKeyAttributes = Object.getSetAttributes(privateKeyTemplate); long[] objectHandles = pkcs11Module_.C_GenerateKeyPair(sessionHandle_, ckMechanism, ckPublicKeyAttributes, ckPrivateKeyAttributes, useUtf8Encoding_); PublicKey publicKey = (PublicKey) Object.getInstance(this, objectHandles[0]); PrivateKey privateKey = (PrivateKey) Object.getInstance(this, objectHandles[1]); return new KeyPair(publicKey, privateKey); } /** * Wraps (encrypts) the given key with the wrapping key using the given * mechanism. * * @param mechanism The mechanism to use for wrapping the key. * @param wrappingKey The key to use for wrapping (encrypting). * @param key The key to wrap (encrypt). * @return The wrapped key as byte array. * @exception TokenException If wrapping the key failed. * @preconditions (mechanism <> null) and (wrappingKey <> null) and (key <> * null) * @postconditions (result <> null) */ public byte[] wrapKey(Mechanism mechanism, Key wrappingKey, Key key) throws TokenException { CK_MECHANISM ckMechanism = new CK_MECHANISM(); ckMechanism.mechanism = mechanism.getMechanismCode(); Parameters parameters = mechanism.getParameters(); ckMechanism.pParameter = (parameters != null) ? parameters.getPKCS11ParamsObject() : null; return pkcs11Module_.C_WrapKey(sessionHandle_, ckMechanism, wrappingKey.getObjectHandle(), key.getObjectHandle(), useUtf8Encoding_); } /** * Unwraps (decrypts) the given encrypted key with the unwrapping key using * the given mechanism. The application can also pass a template key to set * certain attributes of the unwrapped key. This creates a key object after * unwrapping the key and returns an object representing this key. * * @param mechanism The mechanism to use for unwrapping the key. * @param unwrappingKey The key to use for unwrapping (decrypting). * @param wrappedKey The encrypted key to unwrap (decrypt). * @param keyTemplate The template for creating the new key object. * @return A key object representing the newly created key object. * @exception TokenException If unwrapping the key or creating a new key * object failed. * @preconditions (mechanism <> null) and (unwrappingKey <> null) and * (wrappedKey <> null) * @postconditions (result <> null) */ public Key unwrapKey(Mechanism mechanism, Key unwrappingKey, byte[] wrappedKey, Object keyTemplate) throws TokenException { CK_MECHANISM ckMechanism = new CK_MECHANISM(); ckMechanism.mechanism = mechanism.getMechanismCode(); Parameters parameters = mechanism.getParameters(); ckMechanism.pParameter = (parameters != null) ? parameters.getPKCS11ParamsObject() : null; CK_ATTRIBUTE[] ckAttributes = Object.getSetAttributes(keyTemplate); long objectHandle = pkcs11Module_.C_UnwrapKey(sessionHandle_, ckMechanism, unwrappingKey.getObjectHandle(), wrappedKey, ckAttributes, useUtf8Encoding_); Key ret = new Key(); ret.setObjectHandle(objectHandle); return ret; //return (Key) Object.getInstance(this, objectHandle); } public Key unwrapKey20210224(Mechanism mechanism, Key unwrappingKey, byte[] wrappedKey, Object keyTemplate) throws TokenException { CK_MECHANISM ckMechanism = new CK_MECHANISM(); ckMechanism.mechanism = mechanism.getMechanismCode(); Parameters parameters = mechanism.getParameters(); ckMechanism.pParameter = (parameters != null) ? parameters.getPKCS11ParamsObject() : null; CK_ATTRIBUTE[] ckAttributes = Object.getSetAttributes(keyTemplate); long objectHandle = pkcs11Module_.C_UnwrapKey(sessionHandle_, ckMechanism, unwrappingKey.getObjectHandle(), wrappedKey, ckAttributes, useUtf8Encoding_); return (Key) Object.getInstance(this, objectHandle); } /** * Derives a new key from a specified base key unsing the given mechanism. * After deriving a new key from the base key, a new key object is created * and a representation of it is returned. The application can provide a * template key to set certain attributes of the new key object. * * @param mechanism The mechanism to use for deriving the new key from the * base key. * @param baseKey The key to use as base for derivation. * @param template The template for creating the new key object. * @return A key object representing the newly derived (created) key object * or null, if the used mechanism uses other means to return its values; * e.g. the CKM_SSL3_KEY_AND_MAC_DERIVE mechanism. * @exception TokenException If deriving the key or creating a new key * object failed. * @preconditions (mechanism <> null) and (baseKey <> null) * @postconditions */ public Key deriveKey(Mechanism mechanism, Key baseKey, Key template) throws TokenException { Key derivedKey = null; CK_MECHANISM ckMechanism = new CK_MECHANISM(); ckMechanism.mechanism = mechanism.getMechanismCode(); Parameters parameters = mechanism.getParameters(); ckMechanism.pParameter = (parameters != null) ? parameters.getPKCS11ParamsObject() : null; CK_ATTRIBUTE[] ckAttributes = Object.getSetAttributes(template); long objectHandle = pkcs11Module_.C_DeriveKey(sessionHandle_, ckMechanism, baseKey.getObjectHandle(), ckAttributes, useUtf8Encoding_); /* * for certain mechanisms we must copy back the returned values the the * parameters object of the given mechanism */ if ((ckMechanism.mechanism == PKCS11Constants.CKM_SSL3_MASTER_KEY_DERIVE || ckMechanism.mechanism == PKCS11Constants.CKM_TLS_MASTER_KEY_DERIVE) && (parameters instanceof SSL3MasterKeyDeriveParameters)) { /* * The SSL3MasterKeyDeriveParameters object need special handling due to * their deeper nesting of their data structure, which needs to be copied * back to get all the results. */ // set the returned client version ((SSL3MasterKeyDeriveParameters) parameters).getVersion().setPKCS11ParamsObject( ((CK_SSL3_MASTER_KEY_DERIVE_PARAMS) (ckMechanism.pParameter)).pVersion); derivedKey = (Key) Object.getInstance(this, objectHandle); } else if ((ckMechanism.mechanism == PKCS11Constants.CKM_SSL3_KEY_AND_MAC_DERIVE || ckMechanism.mechanism == PKCS11Constants.CKM_TLS_KEY_AND_MAC_DERIVE) && (parameters instanceof SSL3KeyMaterialParameters)) { /* * The SSL3KeyMaterialParameters object need special handling due to their * deeper nesting of their data structure, which needs to be copied back * to get all the results. */ // set the returned secret keys and IVs ((SSL3KeyMaterialParameters) parameters).getReturnedKeyMaterial() .setPKCS11ParamsObject( ((CK_SSL3_KEY_MAT_PARAMS) (ckMechanism.pParameter)).pReturnedKeyMaterial, this); /* * this mechanism returns its keys and values through the parameters * object of the mechanism, but it does not return a key */ derivedKey = null; } else { derivedKey = (Key) Object.getInstance(this, objectHandle); } return derivedKey; } /** * Mixes additional seeding material into the random number generator. * * @param seed The seed bytes to mix in. * @exception TokenException If mixing in the seed failed. * @preconditions (seed <> null) * @postconditions */ public void seedRandom(byte[] seed) throws TokenException { pkcs11Module_.C_SeedRandom(sessionHandle_, seed); } /** * Generates a certain number of random bytes. * * @param numberOfBytesToGenerate The number of random bytes to generate. * @return An array of random bytes with length numberOfBytesToGenerate. * @exception TokenException If generating random bytes failed. * @preconditions (numberOfBytesToGenerate >= 0) * @postconditions (result <> null) and (result.length == * numberOfBytesToGenerate) */ public byte[] generateRandom(int numberOfBytesToGenerate) throws TokenException { byte[] randomBytesBuffer = new byte[numberOfBytesToGenerate]; pkcs11Module_.C_GenerateRandom(sessionHandle_, randomBytesBuffer); // fill // the // buffer // with // random // bytes return randomBytesBuffer; } /** * Legacy function that will normally throw an PKCS11Exception with the * error-code PKCS11Constants.CKR_FUNCTION_NOT_PARALLEL. * * @exception TokenException Throws always an PKCS11Excption. * @preconditions * @postconditions */ public void getFunctionStatus() throws TokenException { pkcs11Module_.C_GetFunctionStatus(sessionHandle_); } /** * Legacy function that will normally throw an PKCS11Exception with the * error-code PKCS11Constants.CKR_FUNCTION_NOT_PARALLEL. * * @exception TokenException Throws always an PKCS11Excption. * @preconditions * @postconditions */ public void cancelFunction() throws TokenException { pkcs11Module_.C_CancelFunction(sessionHandle_); } /** * Returns the string representation of this object. * * @return the string representation of this object */ public String toString() { StringBuffer buffer = new StringBuffer(); buffer.append("Session Handle: "); buffer.append("0x"); buffer.append(Functions.toHexString(sessionHandle_)); buffer.append(Constants.NEWLINE); buffer.append("Token: "); buffer.append(token_.toString()); return buffer.toString(); } }