Functions | |
it may not contain all the symbols used by this software If you run into undefined symbol please let us know and we can provide you a build that will be compatible with your specific when KMIP messages are in XML or JSON no pretty printing is done in order to capture exactly what is sent received from the server On any error other than CKR_BUFFER_TOO_SMALL functions C_Encrypt and C_Decrypt are supposed to terminate active encryption decryption operations This was not being done properly but has now been fixed p6ISymmetricCrypto::encryptEnd and p6ISymmetricCrypto::decryptEnd did not return zero for data length returned when there is no data to be returned Caller would believe that there was more encrypted decrypted data for a final block when there was none Now these functions properly return a zero data length returned when there is no data for the caller Proper handling of the CKA_ALWAYS_AUTHENTICATE attribute was not implemented Fixed race condition in the use of a semaphore that protects calls to C_Initialize and C_Finalize Created native linux installer for only versions of Linux operating systems and DestroyMutex calls on | C_Initialize ().-CKA_TRUSTED defaults to CK_FALSE when certificates are added via a call to C_CreateObject().-Third party tokens that do not support token re-initialization still had their User PIN deleted on a second call to C_InitToken.Now the user PIN is only deleted if the third party token re-initialization code is successful.-C_GetAttribute did not support the CKA_VALUE_LEN attribute.Now the correct value is returned if the attribute is associated with the object being accessed.-Added The p6ITrustedStorage struct override ion that any can implement itself.It was used by the main PKCS11 wrapper classes to proved a trusted storage for all 3rd party tokens so they would not have to design key storage it the HSM does not store the keys in itself(e.g. |
it may not contain all the symbols used by this software If you run into undefined symbol please let us know and we can provide you a build that will be compatible with your specific when KMIP messages are in XML or JSON no pretty printing is done in order to capture exactly what is sent received from the server On any error other than CKR_BUFFER_TOO_SMALL functions C_Encrypt and C_Decrypt are supposed to terminate active encryption decryption operations This was not being done properly but has now been fixed p6ISymmetricCrypto::encryptEnd and p6ISymmetricCrypto::decryptEnd did not return zero for data length returned when there is no data to be returned Caller would believe that there was more encrypted decrypted data for a final block when there was none Now these functions properly return a zero data length returned when there is no data for the caller Proper handling of the CKA_ALWAYS_AUTHENTICATE attribute was not implemented Fixed race condition in the use of a semaphore that protects calls to C_Initialize and C_Finalize Created native linux installer for only versions of Linux operating systems and DestroyMutex calls on Thales and HPE HSMs Added new component p6ISemaphore which implements a platform independent named semaphore Minimum glibc version is now Integrated the Utimaco HSM PKCS under the P6R PKCS Utimaco HSM can be mapped into a P6R PKCS Utimaco Token The P6R Utimaco Token also converts Utimaco HSM vendor extension mechanism codes into and out of PKCS codes where ever possible Added the following PKCS11 API functions to P6R s software and C_Digest Added streaming API calls to the p6Digest object in support of similar functions required for our Software token in PKCS11 Provide scripts to verify the environment on Centos and Ubuntu Linux distributions They can be run to ensure that everything needed for SKC is present and configured properly These scripts are located source module and log level and log module in addition to the log event itself C_CopyObject was not previously implemented for the KMIP token Now a full implementation supports all PKCS objects can be copied Also all PKCS attributes defined to be able to be modified during a | copy (via the 2.40 specification) are also supported.+Added a new token type that allows the user of our PKCS11 library to communicate to a Utimaco CryptoServer HSM.We map one slot of the Utimaco HSM into one slot defined in our PKCS11 library.+Added a new token type that allows the user of our PKCS11 library to communicate to a Thales nShield Connect HSM.We map one slot of the Thales HSM into one slot defined in our PKCS11 library.+Added a new token type that allows the user of our PKCS11 library to communicate to a FutureX HSM.We map one slot of the FutureX HSM into one slot defined in our PKCS11 library.+Added a new token type that allows the user of our PKCS11 library to communicate to a DocuSign ARX PrivateServer HSM.We map one slot of the DocuSign HSM into one slot defined in our PKCS11 library.+Created a new command line tool named p6pkcs11tool to help support manage tokens and their individual configuration needs.The tool also allows the TLS client side certificate to be replaced once/before it expires.+New struct added-p6IKeystoreSSL2 which adds replace methjods that correspond to the existing import methods in p6iKeystoreSSL.New struct added-p6IKeystore3 which modified all the replace methods to return the UUID of the new item.+Added a new struct named p6ITrustedStorage which defines basic operations to a trusted storage mechanism.+Enhanced formatStrin() and formatStringW() to indicate common format string errors in the output buffer to make those issues more obvious.+Allow the XML and JSON message formats to encode the Cryptographic Usage Mask attribute as a decimal number.+Added support for HPE's Network Security Processor HSM in our PKCS11 implementation.*Removed pkcs11 standard header files from each example.They are already located in the SKC's include directory.*Changed p6InitializeLoader() and p6CleanupLoader() to implement reference counting so that multiple/nested calls will work more easily and cleanup appropriately.2015.1.0.14795-(linux) Fixed a problem in the example makefiles that caused the wrong calling convention to be used on 32bit platforms resulting in the example crashing.-(UEFI) Fixed Release UEFI build is throwing warnings about/Ob21s being an invalid compiler option-(UEFI) Fixed UEFI unit test fails testing KMIP decoder with"UNIQUE ID NOT FOUND"+Added flag to ensure interoperation with KMIP servers that have a bug properly reading out of a network socket.+Added TTLV logging before only had XML |
it may not contain all the symbols used by this software If you run into undefined symbol please let us know and we can provide you a build that will be compatible with your specific when KMIP messages are in XML or JSON no pretty printing is done in order to capture exactly what is sent received from the server On any error other than CKR_BUFFER_TOO_SMALL functions C_Encrypt and C_Decrypt are supposed to terminate active encryption decryption operations This was not being done properly but has now been fixed p6ISymmetricCrypto::encryptEnd and p6ISymmetricCrypto::decryptEnd did not return zero for data length returned when there is no data to be returned Caller would believe that there was more encrypted decrypted data for a final block when there was none Now these functions properly return a zero data length returned when there is no data for the caller Proper handling of the CKA_ALWAYS_AUTHENTICATE attribute was not implemented Fixed race condition in the use of a semaphore that protects calls to C_Initialize and C_Finalize Created native linux installer for only versions of Linux operating systems and DestroyMutex calls on Thales and HPE HSMs Added new component p6ISemaphore which implements a platform independent named semaphore Minimum glibc version is now Integrated the Utimaco HSM PKCS under the P6R PKCS Utimaco HSM can be mapped into a P6R PKCS Utimaco Token The P6R Utimaco Token also converts Utimaco HSM vendor extension mechanism codes into and out of PKCS codes where ever possible Added the following PKCS11 API functions to P6R s software and C_Digest Added streaming API calls to the p6Digest object in support of similar functions required for our Software token in PKCS11 Provide scripts to verify the environment on Centos and Ubuntu Linux distributions They can be run to ensure that everything needed for SKC is present and configured properly These scripts are located source module and log level and log module in addition to the log event itself C_CopyObject was not previously implemented for the KMIP token Now a full implementation supports all PKCS objects can be copied Also all PKCS attributes defined to be able to be modified during a JSON or just a simple dump of the entire binary message with no parsing *Updated documentation for building examples to include Added missing file SkcPkg dec for UEFI platforms Updated the file comment to be correct for KMIP example Corrected the link order of libraries in some example Makefiles Removed support for SSLv2 since it is vulnerable and many platforms are now shipping with openSSL versions that have this support compiled out Specify P6SSF_METHOD_SSLV2 for a connection is synonymous with P6SSF_METHOD_NEGOTIATE!Removed Solaris makefiles from the examples Supports PKCS reset token allowing easy linking of KMIP credentials via the use of the keystore link capability KMIP server side Notify and Put responses needs an empty payload rather than return no payload Fixed an issue where the loader would needlessly read from dev random on startup causing large delays on low entropy | systems (VMs).+Added support for Attestation to the API which was added fully in KMIP 1.2.+Added support allowing KMIP client to get any Key or certificate as a binary blob format.+Added SuiteB support.+Added limited UEFI platform support.A library providing support for accessing the low-level KMIP TTLV encoder/decoder interfaces is provided and linkable with native PE format UEFI drivers and applications.byte-code format is not supported.+Added support for Elliptical Curve Private Keys to support SuiteB crypto.+Added full support for KMIP 1.3 streaming Encryption and Hashing.+Add support for importing PEM encoded SSL credentials into the keystore.Keys and certs are automatically placed in the correct namespaces |
it may not contain all the symbols used by this software If you run into undefined symbol please let us know and we can provide you a build that will be compatible with your specific when KMIP messages are in XML or JSON no pretty printing is done in order to capture exactly what is sent received from the server On any error other than CKR_BUFFER_TOO_SMALL functions C_Encrypt and C_Decrypt are supposed to terminate active encryption decryption operations This was not being done properly but has now been fixed p6ISymmetricCrypto::encryptEnd and p6ISymmetricCrypto::decryptEnd did not return zero for data length returned when there is no data to be returned Caller would believe that there was more encrypted decrypted data for a final block when there was none Now these functions properly return a zero data length returned when there is no data for the caller Proper handling of the CKA_ALWAYS_AUTHENTICATE attribute was not implemented Fixed race condition in the use of a semaphore that protects calls to C_Initialize and C_Finalize Created native linux installer for only versions of Linux operating systems and DestroyMutex calls on Thales and HPE HSMs Added new component p6ISemaphore which implements a platform independent named semaphore Minimum glibc version is now Integrated the Utimaco HSM PKCS under the P6R PKCS Utimaco HSM can be mapped into a P6R PKCS Utimaco Token The P6R Utimaco Token also converts Utimaco HSM vendor extension mechanism codes into and out of PKCS codes where ever possible Added the following PKCS11 API functions to P6R s software and C_Digest Added streaming API calls to the p6Digest object in support of similar functions required for our Software token in PKCS11 Provide scripts to verify the environment on Centos and Ubuntu Linux distributions They can be run to ensure that everything needed for SKC is present and configured properly These scripts are located | under (installdir)/scripts/install". + Low-level and p6ILogProducer logging output (in SKC) has been improved to include a timestamp |
Variables | |
it may not contain all the symbols used by this software If you run into undefined symbol please let us know and we can provide you a build that will be compatible with your specific when KMIP messages are in XML or JSON no pretty printing is done in order to capture exactly what is sent received from the server On any error other than CKR_BUFFER_TOO_SMALL functions C_Encrypt and C_Decrypt are supposed to terminate active encryption decryption operations This was not being done properly but has now been fixed p6ISymmetricCrypto::encryptEnd and p6ISymmetricCrypto::decryptEnd did not return zero for data length returned when there is no data to be returned Caller would believe that there was more encrypted decrypted data for a final block when there was none Now these functions properly return a zero data length returned when there is no data for the caller Proper handling of the CKA_ALWAYS_AUTHENTICATE attribute was not implemented Fixed race condition in the use of a semaphore that protects calls to C_Initialize and C_Finalize Created native linux installer for only versions of Linux operating systems and DestroyMutex calls on Thales and HPE HSMs Added new component p6ISemaphore which implements a platform independent named semaphore Minimum glibc version is now Integrated the Utimaco HSM PKCS under the P6R PKCS Utimaco HSM can be mapped into a P6R PKCS Utimaco Token The P6R Utimaco Token also converts Utimaco HSM vendor extension mechanism codes into and out of PKCS codes where ever possible Added the following PKCS11 API functions to P6R s software | C_Decrypt |
it may not contain all the symbols used by this software If you run into undefined symbol please let us know and we can provide you a build that will be compatible with your specific when KMIP messages are in XML or JSON no pretty printing is done in order to capture exactly what is sent received from the server On any error other than CKR_BUFFER_TOO_SMALL functions C_Encrypt and C_Decrypt are supposed to terminate active encryption decryption operations This was not being done properly but has now been fixed p6ISymmetricCrypto::encryptEnd and p6ISymmetricCrypto::decryptEnd did not return zero for data length returned when there is no data to be returned Caller would believe that there was more encrypted decrypted data for a final block when there was none Now these functions properly return a zero data length returned when there is no data for the caller Proper handling of the CKA_ALWAYS_AUTHENTICATE attribute was not implemented Fixed race condition in the use of a semaphore that protects calls to C_Initialize and C_Finalize Created native linux installer for only versions of Linux operating systems and DestroyMutex calls on Thales and HPE HSMs Added new component p6ISemaphore which implements a platform independent named semaphore Minimum glibc version is now Integrated the Utimaco HSM PKCS under the P6R PKCS Utimaco HSM can be mapped into a P6R PKCS Utimaco Token The P6R Utimaco Token also converts Utimaco HSM vendor extension mechanism codes into and out of PKCS codes where ever possible Added the following PKCS11 API functions to P6R s software | C_DecryptFinal |
it may not contain all the symbols used by this software If you run into undefined symbol please let us know and we can provide you a build that will be compatible with your specific when KMIP messages are in XML or JSON no pretty printing is done in order to capture exactly what is sent received from the server On any error other than CKR_BUFFER_TOO_SMALL functions C_Encrypt and C_Decrypt are supposed to terminate active encryption decryption operations This was not being done properly but has now been fixed p6ISymmetricCrypto::encryptEnd and p6ISymmetricCrypto::decryptEnd did not return zero for data length returned when there is no data to be returned Caller would believe that there was more encrypted decrypted data for a final block when there was none Now these functions properly return a zero data length returned when there is no data for the caller Proper handling of the CKA_ALWAYS_AUTHENTICATE attribute was not implemented Fixed race condition in the use of a semaphore that protects calls to C_Initialize and C_Finalize Created native linux installer for only versions of Linux operating systems and DestroyMutex calls on Thales and HPE HSMs Added new component p6ISemaphore which implements a platform independent named semaphore Minimum glibc version is now Integrated the Utimaco HSM PKCS under the P6R PKCS Utimaco HSM can be mapped into a P6R PKCS Utimaco Token The P6R Utimaco Token also converts Utimaco HSM vendor extension mechanism codes into and out of PKCS codes where ever possible Added the following PKCS11 API functions to P6R s software | C_DecryptInit |
it may not contain all the symbols used by this software If you run into undefined symbol please let us know and we can provide you a build that will be compatible with your specific when KMIP messages are in XML or JSON no pretty printing is done in order to capture exactly what is sent received from the server On any error other than CKR_BUFFER_TOO_SMALL functions C_Encrypt and C_Decrypt are supposed to terminate active encryption decryption operations This was not being done properly but has now been fixed p6ISymmetricCrypto::encryptEnd and p6ISymmetricCrypto::decryptEnd did not return zero for data length returned when there is no data to be returned Caller would believe that there was more encrypted decrypted data for a final block when there was none Now these functions properly return a zero data length returned when there is no data for the caller Proper handling of the CKA_ALWAYS_AUTHENTICATE attribute was not implemented Fixed race condition in the use of a semaphore that protects calls to C_Initialize and C_Finalize Created native linux installer for only versions of Linux operating systems and DestroyMutex calls on Thales and HPE HSMs Added new component p6ISemaphore which implements a platform independent named semaphore Minimum glibc version is now Integrated the Utimaco HSM PKCS under the P6R PKCS Utimaco HSM can be mapped into a P6R PKCS Utimaco Token The P6R Utimaco Token also converts Utimaco HSM vendor extension mechanism codes into and out of PKCS codes where ever possible Added the following PKCS11 API functions to P6R s software | C_DecryptUpdate |
it may not contain all the symbols used by this software If you run into undefined symbol please let us know and we can provide you a build that will be compatible with your specific when KMIP messages are in XML or JSON no pretty printing is done in order to capture exactly what is sent received from the server On any error other than CKR_BUFFER_TOO_SMALL functions C_Encrypt and C_Decrypt are supposed to terminate active encryption decryption operations This was not being done properly but has now been fixed p6ISymmetricCrypto::encryptEnd and p6ISymmetricCrypto::decryptEnd did not return zero for data length returned when there is no data to be returned Caller would believe that there was more encrypted decrypted data for a final block when there was none Now these functions properly return a zero data length returned when there is no data for the caller Proper handling of the CKA_ALWAYS_AUTHENTICATE attribute was not implemented Fixed race condition in the use of a semaphore that protects calls to C_Initialize and C_Finalize Created native linux installer for only versions of Linux operating systems and DestroyMutex calls on Thales and HPE HSMs Added new component p6ISemaphore which implements a platform independent named semaphore Minimum glibc version is now Integrated the Utimaco HSM PKCS under the P6R PKCS Utimaco HSM can be mapped into a P6R PKCS Utimaco Token The P6R Utimaco Token also converts Utimaco HSM vendor extension mechanism codes into and out of PKCS codes where ever possible Added the following PKCS11 API functions to P6R s software | C_DigestInit |
it may not contain all the symbols used by this software If you run into undefined symbol please let us know and we can provide you a build that will be compatible with your specific when KMIP messages are in XML or JSON no pretty printing is done in order to capture exactly what is sent received from the server On any error other than CKR_BUFFER_TOO_SMALL functions C_Encrypt and C_Decrypt are supposed to terminate active encryption decryption operations This was not being done properly but has now been fixed p6ISymmetricCrypto::encryptEnd and p6ISymmetricCrypto::decryptEnd did not return zero for data length returned when there is no data to be returned Caller would believe that there was more encrypted decrypted data for a final block when there was none Now these functions properly return a zero data length returned when there is no data for the caller Proper handling of the CKA_ALWAYS_AUTHENTICATE attribute was not implemented Fixed race condition in the use of a semaphore that protects calls to C_Initialize and C_Finalize Created native linux installer for only versions of Linux operating systems and DestroyMutex calls on Thales and HPE HSMs Added new component p6ISemaphore which implements a platform independent named semaphore Minimum glibc version is now Integrated the Utimaco HSM PKCS under the P6R PKCS Utimaco HSM can be mapped into a P6R PKCS Utimaco Token The P6R Utimaco Token also converts Utimaco HSM vendor extension mechanism codes into and out of PKCS codes where ever possible Added the following PKCS11 API functions to P6R s software | C_Encrypt |
it may not contain all the symbols used by this software If you run into undefined symbol please let us know and we can provide you a build that will be compatible with your specific when KMIP messages are in XML or JSON no pretty printing is done in order to capture exactly what is sent received from the server On any error other than CKR_BUFFER_TOO_SMALL functions C_Encrypt and C_Decrypt are supposed to terminate active encryption decryption operations This was not being done properly but has now been fixed p6ISymmetricCrypto::encryptEnd and p6ISymmetricCrypto::decryptEnd did not return zero for data length returned when there is no data to be returned Caller would believe that there was more encrypted decrypted data for a final block when there was none Now these functions properly return a zero data length returned when there is no data for the caller Proper handling of the CKA_ALWAYS_AUTHENTICATE attribute was not implemented Fixed race condition in the use of a semaphore that protects calls to C_Initialize and C_Finalize Created native linux installer for only versions of Linux operating systems and DestroyMutex calls on Thales and HPE HSMs Added new component p6ISemaphore which implements a platform independent named semaphore Minimum glibc version is now Integrated the Utimaco HSM PKCS under the P6R PKCS Utimaco HSM can be mapped into a P6R PKCS Utimaco Token The P6R Utimaco Token also converts Utimaco HSM vendor extension mechanism codes into and out of PKCS codes where ever possible Added the following PKCS11 API functions to P6R s software | C_EncryptFinal |
it may not contain all the symbols used by this software If you run into undefined symbol please let us know and we can provide you a build that will be compatible with your specific when KMIP messages are in XML or JSON no pretty printing is done in order to capture exactly what is sent received from the server On any error other than CKR_BUFFER_TOO_SMALL functions C_Encrypt and C_Decrypt are supposed to terminate active encryption decryption operations This was not being done properly but has now been fixed p6ISymmetricCrypto::encryptEnd and p6ISymmetricCrypto::decryptEnd did not return zero for data length returned when there is no data to be returned Caller would believe that there was more encrypted decrypted data for a final block when there was none Now these functions properly return a zero data length returned when there is no data for the caller Proper handling of the CKA_ALWAYS_AUTHENTICATE attribute was not implemented Fixed race condition in the use of a semaphore that protects calls to C_Initialize and C_Finalize Created native linux installer for only versions of Linux operating systems and DestroyMutex calls on Thales and HPE HSMs Added new component p6ISemaphore which implements a platform independent named semaphore Minimum glibc version is now Integrated the Utimaco HSM PKCS under the P6R PKCS Utimaco HSM can be mapped into a P6R PKCS Utimaco Token The P6R Utimaco Token also converts Utimaco HSM vendor extension mechanism codes into and out of PKCS codes where ever possible Added the following PKCS11 API functions to P6R s software | C_EncryptInit |
it may not contain all the symbols used by this software If you run into undefined symbol please let us know and we can provide you a build that will be compatible with your specific when KMIP messages are in XML or JSON no pretty printing is done in order to capture exactly what is sent received from the server On any error other than CKR_BUFFER_TOO_SMALL functions C_Encrypt and C_Decrypt are supposed to terminate active encryption decryption operations This was not being done properly but has now been fixed p6ISymmetricCrypto::encryptEnd and p6ISymmetricCrypto::decryptEnd did not return zero for data length returned when there is no data to be returned Caller would believe that there was more encrypted decrypted data for a final block when there was none Now these functions properly return a zero data length returned when there is no data for the caller Proper handling of the CKA_ALWAYS_AUTHENTICATE attribute was not implemented Fixed race condition in the use of a semaphore that protects calls to C_Initialize and C_Finalize Created native linux installer for only versions of Linux operating systems and DestroyMutex calls on Thales and HPE HSMs Added new component p6ISemaphore which implements a platform independent named semaphore Minimum glibc version is now Integrated the Utimaco HSM PKCS under the P6R PKCS Utimaco HSM can be mapped into a P6R PKCS Utimaco Token The P6R Utimaco Token also converts Utimaco HSM vendor extension mechanism codes into and out of PKCS codes where ever possible Added the following PKCS11 API functions to P6R s software | C_EncryptUpdate |
it may not contain all the symbols used by this software If you run into undefined symbol please let us know and we can provide you a build that will be compatible with your specific when KMIP messages are in XML or JSON no pretty printing is done in order to capture exactly what is sent received from the server On any error other than CKR_BUFFER_TOO_SMALL functions C_Encrypt and C_Decrypt are supposed to terminate active encryption decryption operations This was not being done properly but has now been fixed p6ISymmetricCrypto::encryptEnd and p6ISymmetricCrypto::decryptEnd did not return zero for data length returned when there is no data to be returned Caller would believe that there was more encrypted decrypted data for a final block when there was none Now these functions properly return a zero data length returned when there is no data for the caller Proper handling of the CKA_ALWAYS_AUTHENTICATE attribute was not implemented Fixed race condition in the use of a semaphore that protects calls to C_Initialize and C_Finalize Created native linux installer for only versions of Linux operating systems and DestroyMutex calls on Thales and HPE HSMs Added new component p6ISemaphore which implements a platform independent named semaphore Minimum glibc version is now Integrated the Utimaco HSM PKCS under the P6R PKCS Utimaco HSM can be mapped into a P6R PKCS Utimaco Token The P6R Utimaco Token also converts Utimaco HSM vendor extension mechanism codes into and out of PKCS codes where ever possible Added the following PKCS11 API functions to P6R s software | C_GenerateKeyPair |
it may not contain all the symbols used by this software If you run into undefined symbol please let us know and we can provide you a build that will be compatible with your specific when KMIP messages are in XML or JSON no pretty printing is done in order to capture exactly what is sent received from the server On any error other than CKR_BUFFER_TOO_SMALL functions C_Encrypt and C_Decrypt are supposed to terminate active encryption decryption operations This was not being done properly but has now been fixed p6ISymmetricCrypto::encryptEnd and p6ISymmetricCrypto::decryptEnd did not return zero for data length returned when there is no data to be returned Caller would believe that there was more encrypted decrypted data for a final block when there was none Now these functions properly return a zero data length returned when there is no data for the caller Proper handling of the CKA_ALWAYS_AUTHENTICATE attribute was not implemented Fixed race condition in the use of a semaphore that protects calls to C_Initialize and C_Finalize Created native linux installer for only versions of Linux operating systems and DestroyMutex calls on Thales and HPE HSMs Added new component p6ISemaphore which implements a platform independent named semaphore Minimum glibc version is now Integrated the Utimaco HSM PKCS under the P6R PKCS Utimaco HSM can be mapped into a P6R PKCS Utimaco Token The P6R Utimaco Token also converts Utimaco HSM vendor extension mechanism codes into and out of PKCS codes where ever possible Added the following PKCS11 API functions to P6R s software | C_GenerateRandom |
it may not contain all the symbols used by this software If you run into undefined symbol please let us know and we can provide you a build that will be compatible with your specific when KMIP messages are in XML or JSON no pretty printing is done in order to capture exactly what is sent received from the server On any error other than CKR_BUFFER_TOO_SMALL functions C_Encrypt and C_Decrypt are supposed to terminate active encryption decryption operations This was not being done properly but has now been fixed p6ISymmetricCrypto::encryptEnd and p6ISymmetricCrypto::decryptEnd did not return zero for data length returned when there is no data to be returned Caller would believe that there was more encrypted decrypted data for a final block when there was none Now these functions properly return a zero data length returned when there is no data for the caller Proper handling of the CKA_ALWAYS_AUTHENTICATE attribute was not implemented Fixed race condition in the use of a semaphore that protects calls to C_Initialize and C_Finalize Created native linux installer for only versions of Linux operating systems and DestroyMutex calls on Thales and HPE HSMs Added new component p6ISemaphore which implements a platform independent named semaphore Minimum glibc version is now Integrated the Utimaco HSM PKCS under the P6R PKCS Utimaco HSM can be mapped into a P6R PKCS Utimaco Token The P6R Utimaco Token also converts Utimaco HSM vendor extension mechanism codes into and out of PKCS codes where ever possible Added the following PKCS11 API functions to P6R s software | C_Sign |
it may not contain all the symbols used by this software If you run into undefined symbol please let us know and we can provide you a build that will be compatible with your specific when KMIP messages are in XML or JSON no pretty printing is done in order to capture exactly what is sent received from the server On any error other than CKR_BUFFER_TOO_SMALL functions C_Encrypt and C_Decrypt are supposed to terminate active encryption decryption operations This was not being done properly but has now been fixed p6ISymmetricCrypto::encryptEnd and p6ISymmetricCrypto::decryptEnd did not return zero for data length returned when there is no data to be returned Caller would believe that there was more encrypted decrypted data for a final block when there was none Now these functions properly return a zero data length returned when there is no data for the caller Proper handling of the CKA_ALWAYS_AUTHENTICATE attribute was not implemented Fixed race condition in the use of a semaphore that protects calls to C_Initialize and C_Finalize Created native linux installer for only versions of Linux operating systems and DestroyMutex calls on Thales and HPE HSMs Added new component p6ISemaphore which implements a platform independent named semaphore Minimum glibc version is now Integrated the Utimaco HSM PKCS under the P6R PKCS Utimaco HSM can be mapped into a P6R PKCS Utimaco Token The P6R Utimaco Token also converts Utimaco HSM vendor extension mechanism codes into and out of PKCS codes where ever possible Added the following PKCS11 API functions to P6R s software | C_SignInit |
it may not contain all the symbols used by this software If you run into undefined symbol please let us know and we can provide you a build that will be compatible with your specific when KMIP messages are in XML or JSON no pretty printing is done in order to capture exactly what is sent received from the server On any error other than CKR_BUFFER_TOO_SMALL functions C_Encrypt and C_Decrypt are supposed to terminate active encryption decryption operations This was not being done properly but has now been fixed p6ISymmetricCrypto::encryptEnd and p6ISymmetricCrypto::decryptEnd did not return zero for data length returned when there is no data to be returned Caller would believe that there was more encrypted decrypted data for a final block when there was none Now these functions properly return a zero data length returned when there is no data for the caller Proper handling of the CKA_ALWAYS_AUTHENTICATE attribute was not implemented Fixed race condition in the use of a semaphore that protects calls to C_Initialize and C_Finalize Created native linux installer for only versions of Linux operating systems and DestroyMutex calls on Thales and HPE HSMs Added new component p6ISemaphore which implements a platform independent named semaphore Minimum glibc version is now Integrated the Utimaco HSM PKCS under the P6R PKCS Utimaco HSM can be mapped into a P6R PKCS Utimaco Token The P6R Utimaco Token also converts Utimaco HSM vendor extension mechanism codes into and out of PKCS codes where ever possible Added the following PKCS11 API functions to P6R s software | C_Verify |
it may not contain all the symbols used by this software If you run into undefined symbol please let us know and we can provide you a build that will be compatible with your specific when KMIP messages are in XML or JSON no pretty printing is done in order to capture exactly what is sent received from the server On any error other than CKR_BUFFER_TOO_SMALL functions C_Encrypt and C_Decrypt are supposed to terminate active encryption decryption operations This was not being done properly but has now been fixed p6ISymmetricCrypto::encryptEnd and p6ISymmetricCrypto::decryptEnd did not return zero for data length returned when there is no data to be returned Caller would believe that there was more encrypted decrypted data for a final block when there was none Now these functions properly return a zero data length returned when there is no data for the caller Proper handling of the CKA_ALWAYS_AUTHENTICATE attribute was not implemented Fixed race condition in the use of a semaphore that protects calls to C_Initialize and C_Finalize Created native linux installer for only versions of Linux operating systems and DestroyMutex calls on Thales and HPE HSMs Added new component p6ISemaphore which implements a platform independent named semaphore Minimum glibc version is now Integrated the Utimaco HSM PKCS under the P6R PKCS Utimaco HSM can be mapped into a P6R PKCS Utimaco Token The P6R Utimaco Token also converts Utimaco HSM vendor extension mechanism codes into and out of PKCS codes where ever possible Added the following PKCS11 API functions to P6R s software | C_VerifyInit |
it may not contain all the symbols used by this software If you run into undefined symbol | errors |
it may not contain all the symbols used by this software If you run into undefined symbol please let us know and we can provide you a build that will be compatible with your specific when KMIP messages are in XML or JSON no pretty printing is done in order to capture exactly what is sent received from the server On any error other than CKR_BUFFER_TOO_SMALL functions C_Encrypt and C_Decrypt are supposed to terminate active encryption decryption operations This was not being done properly but has now been fixed p6ISymmetricCrypto::encryptEnd and p6ISymmetricCrypto::decryptEnd did not return zero for data length returned when there is no data to be returned Caller would believe that there was more encrypted decrypted data for a final block when there was none Now these functions properly return a zero data length returned when there is no data for the caller Proper handling of the CKA_ALWAYS_AUTHENTICATE attribute was not implemented Fixed race condition in the use of a semaphore that protects calls to C_Initialize and C_Finalize Created native linux installer for only versions of Linux operating systems and DestroyMutex calls on Thales and HPE HSMs Added new component p6ISemaphore which implements a platform independent named semaphore Minimum glibc version is now Integrated the Utimaco HSM PKCS under the P6R PKCS Utimaco HSM can be mapped into a P6R PKCS Utimaco Token The P6R Utimaco Token also converts Utimaco HSM vendor extension mechanism codes into and out of PKCS codes where ever possible Added the following PKCS11 API functions to P6R s software and C_Digest Added streaming API calls to the p6Digest object in support of similar functions required for our Software token in PKCS11 Provide scripts to verify the environment on Centos and Ubuntu Linux distributions They can be run to ensure that everything needed for SKC is present and configured properly These scripts are located source module and | line |
it may not contain all the symbols used by this software If you run into undefined symbol please let us know and we can provide you a build that will be compatible with your specific when KMIP messages are in XML or JSON no pretty printing is done in order to capture exactly what is sent received from the server On any error other than CKR_BUFFER_TOO_SMALL functions C_Encrypt and C_Decrypt are supposed to terminate active encryption decryption operations This was not being done properly but has now been fixed p6ISymmetricCrypto::encryptEnd and p6ISymmetricCrypto::decryptEnd did not return zero for data length returned when there is no data to be returned Caller would believe that there was more encrypted decrypted data for a final block when there was none Now these functions properly return a zero data length returned when there is no data for the caller Proper handling of the CKA_ALWAYS_AUTHENTICATE attribute was not implemented Fixed race condition in the use of a semaphore that protects calls to C_Initialize and C_Finalize Created native linux installer for only versions of Linux operating systems | LockMutex |
it may not contain all the symbols used by this software If you run into undefined symbol please let us know and we can provide you a build that will be compatible with your specific | options |
it may not contain all the symbols used by this software If you run into undefined symbol please let us know and we can provide you a build that will be compatible with your specific when KMIP messages are in XML or JSON no pretty printing is done in order to capture exactly what is sent received from the server On any error other than CKR_BUFFER_TOO_SMALL functions C_Encrypt and C_Decrypt are supposed to terminate active encryption decryption operations This was not being done properly but has now been fixed p6ISymmetricCrypto::encryptEnd and p6ISymmetricCrypto::decryptEnd did not return zero for data length returned when there is no data to be returned Caller would believe that there was more encrypted decrypted data for a final block when there was none Now these functions properly return a zero data length returned when there is no data for the caller Proper handling of the CKA_ALWAYS_AUTHENTICATE attribute was not implemented Fixed race condition in the use of a semaphore that protects calls to C_Initialize and C_Finalize Created native linux installer for only versions of Linux operating systems and DestroyMutex calls on Thales and HPE HSMs Added new component p6ISemaphore which implements a platform independent named semaphore Minimum glibc version is now Integrated the Utimaco HSM PKCS under the P6R PKCS Utimaco HSM can be mapped into a P6R PKCS Utimaco Token The P6R Utimaco Token also converts Utimaco HSM vendor extension mechanism codes into and out of PKCS codes where ever possible Added the following PKCS11 API functions to P6R s software and C_Digest Added streaming API calls to the p6Digest object in support of similar functions required for our Software token in PKCS11 Provide scripts to verify the environment on Centos and Ubuntu Linux distributions They can be run to ensure that everything needed for SKC is present and configured properly These scripts are located | threadid |
it may not contain all the symbols used by this software If you run into undefined symbol please let us know and we can provide you a build that will be compatible with your specific when KMIP messages are in XML or JSON no pretty printing is done in order to capture exactly what is sent received from the server On any error other than CKR_BUFFER_TOO_SMALL functions C_Encrypt and C_Decrypt are supposed to terminate active encryption decryption operations This was not being done properly but has now been fixed p6ISymmetricCrypto::encryptEnd and p6ISymmetricCrypto::decryptEnd did not return zero for data length returned when there is no data to be returned Caller would believe that there was more encrypted decrypted data for a final block when there was none Now these functions properly return a zero data length returned when there is no data for the caller Proper handling of the CKA_ALWAYS_AUTHENTICATE attribute was not implemented Fixed race condition in the use of a semaphore that protects calls to C_Initialize and C_Finalize Created native linux installer for only versions of Linux operating systems and DestroyMutex calls on Thales and HPE HSMs Added new component p6ISemaphore which implements a platform independent named semaphore Minimum glibc version is now Integrated the Utimaco HSM PKCS under the P6R PKCS Utimaco HSM can be mapped into a P6R PKCS Utimaco Token The P6R Utimaco Token also converts Utimaco HSM vendor extension mechanism codes into and out of PKCS codes where ever possible Added the following PKCS11 API functions to P6R s software | token |
it may not contain all the symbols used by this software If you run into undefined symbol please let us know and we can provide you a build that will be compatible with your specific when KMIP messages are in XML or JSON no pretty printing is done in order to capture exactly what is sent received from the server On any error other than CKR_BUFFER_TOO_SMALL functions C_Encrypt and C_Decrypt are supposed to terminate active encryption decryption operations This was not being done properly but has now been fixed p6ISymmetricCrypto::encryptEnd and p6ISymmetricCrypto::decryptEnd did not return zero for data length returned when there is no data to be returned Caller would believe that there was more encrypted decrypted data for a final block when there was none Now these functions properly return a zero data length returned when there is no data for the caller Proper handling of the CKA_ALWAYS_AUTHENTICATE attribute was not implemented Fixed race condition in the use of a semaphore that protects calls to C_Initialize and C_Finalize Created native linux installer for only versions of Linux operating systems | UEFI |
it may not contain all the symbols used by this software If you run into undefined symbol please let us know and we can provide you a build that will be compatible with your specific when KMIP messages are in XML or JSON no pretty printing is done in order to capture exactly what is sent received from the server On any error other than CKR_BUFFER_TOO_SMALL functions C_Encrypt and C_Decrypt are supposed to terminate active encryption decryption operations This was not being done properly but has now been fixed p6ISymmetricCrypto::encryptEnd and p6ISymmetricCrypto::decryptEnd did not return zero for data length returned when there is no data to be returned Caller would believe that there was more encrypted decrypted data for a final block when there was none Now these functions properly return a zero data length returned when there is no data for the caller Proper handling of the CKA_ALWAYS_AUTHENTICATE attribute was not implemented Fixed race condition in the use of a semaphore that protects calls to C_Initialize and C_Finalize Created native linux installer for only versions of Linux operating systems | UnlockMutex |