18 #ifdef CK_NEED_ARG_LIST
32 #ifdef CK_NEED_ARG_LIST
41 #ifdef CK_NEED_ARG_LIST
50 #ifdef CK_NEED_ARG_LIST
64 #ifdef CK_NEED_ARG_LIST
77 #ifdef CK_NEED_ARG_LIST
89 #ifdef CK_NEED_ARG_LIST
101 #ifdef CK_NEED_ARG_LIST
114 #ifdef CK_NEED_ARG_LIST
125 #ifdef CK_NEED_ARG_LIST
137 #ifdef CK_NEED_ARG_LIST
148 #ifdef CK_NEED_ARG_LIST
166 #ifdef CK_NEED_ARG_LIST
181 #ifdef CK_NEED_ARG_LIST
190 #ifdef CK_NEED_ARG_LIST
199 #ifdef CK_NEED_ARG_LIST
211 #ifdef CK_NEED_ARG_LIST
224 #ifdef CK_NEED_ARG_LIST
237 #ifdef CK_NEED_ARG_LIST
249 #ifdef CK_NEED_ARG_LIST
261 #ifdef CK_NEED_ARG_LIST
275 #ifdef CK_NEED_ARG_LIST
288 #ifdef CK_NEED_ARG_LIST
298 #ifdef CK_NEED_ARG_LIST
311 #ifdef CK_NEED_ARG_LIST
325 #ifdef CK_NEED_ARG_LIST
339 #ifdef CK_NEED_ARG_LIST
353 #ifdef CK_NEED_ARG_LIST
367 #ifdef CK_NEED_ARG_LIST
379 #ifdef CK_NEED_ARG_LIST
390 #ifdef CK_NEED_ARG_LIST
405 #ifdef CK_NEED_ARG_LIST
420 #ifdef CK_NEED_ARG_LIST
431 #ifdef CK_NEED_ARG_LIST
442 #ifdef CK_NEED_ARG_LIST
457 #ifdef CK_NEED_ARG_LIST
472 #ifdef CK_NEED_ARG_LIST
486 #ifdef CK_NEED_ARG_LIST
496 #ifdef CK_NEED_ARG_LIST
511 #ifdef CK_NEED_ARG_LIST
525 #ifdef CK_NEED_ARG_LIST
537 #ifdef CK_NEED_ARG_LIST
555 #ifdef CK_NEED_ARG_LIST
569 #ifdef CK_NEED_ARG_LIST
585 #ifdef CK_NEED_ARG_LIST
598 #ifdef CK_NEED_ARG_LIST
611 #ifdef CK_NEED_ARG_LIST
624 #ifdef CK_NEED_ARG_LIST
643 #ifdef CK_NEED_ARG_LIST
657 #ifdef CK_NEED_ARG_LIST
673 #ifdef CK_NEED_ARG_LIST
686 #ifdef CK_NEED_ARG_LIST
699 #ifdef CK_NEED_ARG_LIST
712 #ifdef CK_NEED_ARG_LIST
730 #ifdef CK_NEED_ARG_LIST
745 #ifdef CK_NEED_ARG_LIST
760 #ifdef CK_NEED_ARG_LIST
775 #ifdef CK_NEED_ARG_LIST
793 #ifdef CK_NEED_ARG_LIST
808 #ifdef CK_NEED_ARG_LIST
815 CK_ULONG ulPrivateKeyAttributeCount,
824 #ifdef CK_NEED_ARG_LIST
840 #ifdef CK_NEED_ARG_LIST
858 #ifdef CK_NEED_ARG_LIST
877 #ifdef CK_NEED_ARG_LIST
888 #ifdef CK_NEED_ARG_LIST
905 #ifdef CK_NEED_ARG_LIST
916 #ifdef CK_NEED_ARG_LIST
927 #ifdef CK_NEED_ARG_LIST
it may not contain all the symbols used by this software If you run into undefined symbol please let us know and we can provide you a build that will be compatible with your specific when KMIP messages are in XML or JSON no pretty printing is done in order to capture exactly what is sent received from the server On any error other than CKR_BUFFER_TOO_SMALL functions C_Encrypt and C_Decrypt are supposed to terminate active encryption decryption operations This was not being done properly but has now been fixed p6ISymmetricCrypto::encryptEnd and p6ISymmetricCrypto::decryptEnd did not return zero for data length returned when there is no data to be returned Caller would believe that there was more encrypted decrypted data for a final block when there was none Now these functions properly return a zero data length returned when there is no data for the caller Proper handling of the CKA_ALWAYS_AUTHENTICATE attribute was not implemented Fixed race condition in the use of a semaphore that protects calls to C_Initialize and C_Finalize Created native linux installer for only versions of Linux operating systems and DestroyMutex calls on Thales and HPE HSMs Added new component p6ISemaphore which implements a platform independent named semaphore Minimum glibc version is now Integrated the Utimaco HSM PKCS under the P6R PKCS Utimaco HSM can be mapped into a P6R PKCS Utimaco Token The P6R Utimaco Token also converts Utimaco HSM vendor extension mechanism codes into and out of PKCS codes where ever possible Added the following PKCS11 API functions to P6R s software C_VerifyInit
CK_MECHANISM_INFO CK_PTR CK_MECHANISM_INFO_PTR
CK_ULONG CK_OBJECT_HANDLE
it may not contain all the symbols used by this software If you run into undefined symbol please let us know and we can provide you a build that will be compatible with your specific when KMIP messages are in XML or JSON no pretty printing is done in order to capture exactly what is sent received from the server On any error other than CKR_BUFFER_TOO_SMALL functions C_Encrypt and C_Decrypt are supposed to terminate active encryption decryption operations This was not being done properly but has now been fixed p6ISymmetricCrypto::encryptEnd and p6ISymmetricCrypto::decryptEnd did not return zero for data length returned when there is no data to be returned Caller would believe that there was more encrypted decrypted data for a final block when there was none Now these functions properly return a zero data length returned when there is no data for the caller Proper handling of the CKA_ALWAYS_AUTHENTICATE attribute was not implemented Fixed race condition in the use of a semaphore that protects calls to C_Initialize and C_Finalize Created native linux installer for only versions of Linux operating systems and DestroyMutex calls on C_Initialize().-CKA_TRUSTED defaults to CK_FALSE when certificates are added via a call to C_CreateObject().-Third party tokens that do not support token re-initialization still had their User PIN deleted on a second call to C_InitToken.Now the user PIN is only deleted if the third party token re-initialization code is successful.-C_GetAttribute did not support the CKA_VALUE_LEN attribute.Now the correct value is returned if the attribute is associated with the object being accessed.-Added The p6ITrustedStorage struct override ion that any can implement itself.It was used by the main PKCS11 wrapper classes to proved a trusted storage for all 3rd party tokens so they would not have to design key storage it the HSM does not store the keys in itself(e.g.
it may not contain all the symbols used by this software If you run into undefined symbol please let us know and we can provide you a build that will be compatible with your specific when KMIP messages are in XML or JSON no pretty printing is done in order to capture exactly what is sent received from the server On any error other than CKR_BUFFER_TOO_SMALL functions C_Encrypt and C_Decrypt are supposed to terminate active encryption decryption operations This was not being done properly but has now been fixed p6ISymmetricCrypto::encryptEnd and p6ISymmetricCrypto::decryptEnd did not return zero for data length returned when there is no data to be returned Caller would believe that there was more encrypted decrypted data for a final block when there was none Now these functions properly return a zero data length returned when there is no data for the caller Proper handling of the CKA_ALWAYS_AUTHENTICATE attribute was not implemented Fixed race condition in the use of a semaphore that protects calls to C_Initialize and C_Finalize Created native linux installer for only versions of Linux operating systems and DestroyMutex calls on Thales and HPE HSMs Added new component p6ISemaphore which implements a platform independent named semaphore Minimum glibc version is now Integrated the Utimaco HSM PKCS under the P6R PKCS Utimaco HSM can be mapped into a P6R PKCS Utimaco Token The P6R Utimaco Token also converts Utimaco HSM vendor extension mechanism codes into and out of PKCS codes where ever possible Added the following PKCS11 API functions to P6R s software C_Encrypt
it may not contain all the symbols used by this software If you run into undefined symbol please let us know and we can provide you a build that will be compatible with your specific when KMIP messages are in XML or JSON no pretty printing is done in order to capture exactly what is sent received from the server On any error other than CKR_BUFFER_TOO_SMALL functions C_Encrypt and C_Decrypt are supposed to terminate active encryption decryption operations This was not being done properly but has now been fixed p6ISymmetricCrypto::encryptEnd and p6ISymmetricCrypto::decryptEnd did not return zero for data length returned when there is no data to be returned Caller would believe that there was more encrypted decrypted data for a final block when there was none Now these functions properly return a zero data length returned when there is no data for the caller Proper handling of the CKA_ALWAYS_AUTHENTICATE attribute was not implemented Fixed race condition in the use of a semaphore that protects calls to C_Initialize and C_Finalize Created native linux installer for only versions of Linux operating systems and DestroyMutex calls on Thales and HPE HSMs Added new component p6ISemaphore which implements a platform independent named semaphore Minimum glibc version is now Integrated the Utimaco HSM PKCS under the P6R PKCS Utimaco HSM can be mapped into a P6R PKCS Utimaco Token The P6R Utimaco Token also converts Utimaco HSM vendor extension mechanism codes into and out of PKCS codes where ever possible Added the following PKCS11 API functions to P6R s software C_DecryptInit
CK_OBJECT_HANDLE CK_PTR CK_OBJECT_HANDLE_PTR
it may not contain all the symbols used by this software If you run into undefined symbol please let us know and we can provide you a build that will be compatible with your specific when KMIP messages are in XML or JSON no pretty printing is done in order to capture exactly what is sent received from the server On any error other than CKR_BUFFER_TOO_SMALL functions C_Encrypt and C_Decrypt are supposed to terminate active encryption decryption operations This was not being done properly but has now been fixed p6ISymmetricCrypto::encryptEnd and p6ISymmetricCrypto::decryptEnd did not return zero for data length returned when there is no data to be returned Caller would believe that there was more encrypted decrypted data for a final block when there was none Now these functions properly return a zero data length returned when there is no data for the caller Proper handling of the CKA_ALWAYS_AUTHENTICATE attribute was not implemented Fixed race condition in the use of a semaphore that protects calls to C_Initialize and C_Finalize Created native linux installer for only versions of Linux operating systems and DestroyMutex calls on Thales and HPE HSMs Added new component p6ISemaphore which implements a platform independent named semaphore Minimum glibc version is now Integrated the Utimaco HSM PKCS under the P6R PKCS Utimaco HSM can be mapped into a P6R PKCS Utimaco Token The P6R Utimaco Token also converts Utimaco HSM vendor extension mechanism codes into and out of PKCS codes where ever possible Added the following PKCS11 API functions to P6R s software C_DecryptUpdate
CK_ULONG CK_MECHANISM_TYPE
CK_MECHANISM_TYPE CK_PTR CK_MECHANISM_TYPE_PTR
CK_SESSION_INFO CK_PTR CK_SESSION_INFO_PTR
CK_MECHANISM CK_PTR CK_MECHANISM_PTR
CK_FUNCTION_LIST_PTR CK_PTR CK_FUNCTION_LIST_PTR_PTR
unsigned long int CK_ULONG
CK_INFO CK_PTR CK_INFO_PTR
CK_UTF8CHAR_PTR CK_ULONG ulPinLen
CK_TOKEN_INFO CK_PTR CK_TOKEN_INFO_PTR
it may not contain all the symbols used by this software If you run into undefined symbol please let us know and we can provide you a build that will be compatible with your specific when KMIP messages are in XML or JSON no pretty printing is done in order to capture exactly what is sent received from the server On any error other than CKR_BUFFER_TOO_SMALL functions C_Encrypt and C_Decrypt are supposed to terminate active encryption decryption operations This was not being done properly but has now been fixed p6ISymmetricCrypto::encryptEnd and p6ISymmetricCrypto::decryptEnd did not return zero for data length returned when there is no data to be returned Caller would believe that there was more encrypted decrypted data for a final block when there was none Now these functions properly return a zero data length returned when there is no data for the caller Proper handling of the CKA_ALWAYS_AUTHENTICATE attribute was not implemented Fixed race condition in the use of a semaphore that protects calls to C_Initialize and C_Finalize Created native linux installer for only versions of Linux operating systems and DestroyMutex calls on Thales and HPE HSMs Added new component p6ISemaphore which implements a platform independent named semaphore Minimum glibc version is now Integrated the Utimaco HSM PKCS under the P6R PKCS Utimaco HSM can be mapped into a P6R PKCS Utimaco Token The P6R Utimaco Token also converts Utimaco HSM vendor extension mechanism codes into and out of PKCS codes where ever possible Added the following PKCS11 API functions to P6R s software C_DigestInit
it may not contain all the symbols used by this software If you run into undefined symbol please let us know and we can provide you a build that will be compatible with your specific when KMIP messages are in XML or JSON no pretty printing is done in order to capture exactly what is sent received from the server On any error other than CKR_BUFFER_TOO_SMALL functions C_Encrypt and C_Decrypt are supposed to terminate active encryption decryption operations This was not being done properly but has now been fixed p6ISymmetricCrypto::encryptEnd and p6ISymmetricCrypto::decryptEnd did not return zero for data length returned when there is no data to be returned Caller would believe that there was more encrypted decrypted data for a final block when there was none Now these functions properly return a zero data length returned when there is no data for the caller Proper handling of the CKA_ALWAYS_AUTHENTICATE attribute was not implemented Fixed race condition in the use of a semaphore that protects calls to C_Initialize and C_Finalize Created native linux installer for only versions of Linux operating systems and DestroyMutex calls on Thales and HPE HSMs Added new component p6ISemaphore which implements a platform independent named semaphore Minimum glibc version is now Integrated the Utimaco HSM PKCS under the P6R PKCS Utimaco HSM can be mapped into a P6R PKCS Utimaco Token The P6R Utimaco Token also converts Utimaco HSM vendor extension mechanism codes into and out of PKCS codes where ever possible Added the following PKCS11 API functions to P6R s software C_EncryptUpdate
it may not contain all the symbols used by this software If you run into undefined symbol please let us know and we can provide you a build that will be compatible with your specific when KMIP messages are in XML or JSON no pretty printing is done in order to capture exactly what is sent received from the server On any error other than CKR_BUFFER_TOO_SMALL functions C_Encrypt and C_Decrypt are supposed to terminate active encryption decryption operations This was not being done properly but has now been fixed p6ISymmetricCrypto::encryptEnd and p6ISymmetricCrypto::decryptEnd did not return zero for data length returned when there is no data to be returned Caller would believe that there was more encrypted decrypted data for a final block when there was none Now these functions properly return a zero data length returned when there is no data for the caller Proper handling of the CKA_ALWAYS_AUTHENTICATE attribute was not implemented Fixed race condition in the use of a semaphore that protects calls to C_Initialize and C_Finalize Created native linux installer for only versions of Linux operating systems and DestroyMutex calls on Thales and HPE HSMs Added new component p6ISemaphore which implements a platform independent named semaphore Minimum glibc version is now Integrated the Utimaco HSM PKCS under the P6R PKCS Utimaco HSM can be mapped into a P6R PKCS Utimaco Token The P6R Utimaco Token also converts Utimaco HSM vendor extension mechanism codes into and out of PKCS codes where ever possible Added the following PKCS11 API functions to P6R s software C_EncryptInit
it may not contain all the symbols used by this software If you run into undefined symbol please let us know and we can provide you a build that will be compatible with your specific when KMIP messages are in XML or JSON no pretty printing is done in order to capture exactly what is sent received from the server On any error other than CKR_BUFFER_TOO_SMALL functions C_Encrypt and C_Decrypt are supposed to terminate active encryption decryption operations This was not being done properly but has now been fixed p6ISymmetricCrypto::encryptEnd and p6ISymmetricCrypto::decryptEnd did not return zero for data length returned when there is no data to be returned Caller would believe that there was more encrypted decrypted data for a final block when there was none Now these functions properly return a zero data length returned when there is no data for the caller Proper handling of the CKA_ALWAYS_AUTHENTICATE attribute was not implemented Fixed race condition in the use of a semaphore that protects calls to C_Initialize and C_Finalize Created native linux installer for only versions of Linux operating systems and DestroyMutex calls on Thales and HPE HSMs Added new component p6ISemaphore which implements a platform independent named semaphore Minimum glibc version is now Integrated the Utimaco HSM PKCS under the P6R PKCS Utimaco HSM can be mapped into a P6R PKCS Utimaco Token The P6R Utimaco Token also converts Utimaco HSM vendor extension mechanism codes into and out of PKCS codes where ever possible Added the following PKCS11 API functions to P6R s software C_GenerateKeyPair
it may not contain all the symbols used by this software If you run into undefined symbol please let us know and we can provide you a build that will be compatible with your specific when KMIP messages are in XML or JSON no pretty printing is done in order to capture exactly what is sent received from the server On any error other than CKR_BUFFER_TOO_SMALL functions C_Encrypt and C_Decrypt are supposed to terminate active encryption decryption operations This was not being done properly but has now been fixed p6ISymmetricCrypto::encryptEnd and p6ISymmetricCrypto::decryptEnd did not return zero for data length returned when there is no data to be returned Caller would believe that there was more encrypted decrypted data for a final block when there was none Now these functions properly return a zero data length returned when there is no data for the caller Proper handling of the CKA_ALWAYS_AUTHENTICATE attribute was not implemented Fixed race condition in the use of a semaphore that protects calls to C_Initialize and C_Finalize Created native linux installer for only versions of Linux operating systems and DestroyMutex calls on Thales and HPE HSMs Added new component p6ISemaphore which implements a platform independent named semaphore Minimum glibc version is now Integrated the Utimaco HSM PKCS under the P6R PKCS Utimaco HSM can be mapped into a P6R PKCS Utimaco Token The P6R Utimaco Token also converts Utimaco HSM vendor extension mechanism codes into and out of PKCS codes where ever possible Added the following PKCS11 API functions to P6R s software C_EncryptFinal
it may not contain all the symbols used by this software If you run into undefined symbol please let us know and we can provide you a build that will be compatible with your specific when KMIP messages are in XML or JSON no pretty printing is done in order to capture exactly what is sent received from the server On any error other than CKR_BUFFER_TOO_SMALL functions C_Encrypt and C_Decrypt are supposed to terminate active encryption decryption operations This was not being done properly but has now been fixed p6ISymmetricCrypto::encryptEnd and p6ISymmetricCrypto::decryptEnd did not return zero for data length returned when there is no data to be returned Caller would believe that there was more encrypted decrypted data for a final block when there was none Now these functions properly return a zero data length returned when there is no data for the caller Proper handling of the CKA_ALWAYS_AUTHENTICATE attribute was not implemented Fixed race condition in the use of a semaphore that protects calls to C_Initialize and C_Finalize Created native linux installer for only versions of Linux operating systems and DestroyMutex calls on Thales and HPE HSMs Added new component p6ISemaphore which implements a platform independent named semaphore Minimum glibc version is now Integrated the Utimaco HSM PKCS under the P6R PKCS Utimaco HSM can be mapped into a P6R PKCS Utimaco Token The P6R Utimaco Token also converts Utimaco HSM vendor extension mechanism codes into and out of PKCS codes where ever possible Added the following PKCS11 API functions to P6R s software C_Decrypt
CK_SLOT_ID CK_PTR CK_SLOT_ID_PTR
it may not contain all the symbols used by this software If you run into undefined symbol please let us know and we can provide you a build that will be compatible with your specific when KMIP messages are in XML or JSON no pretty printing is done in order to capture exactly what is sent received from the server On any error other than CKR_BUFFER_TOO_SMALL functions C_Encrypt and C_Decrypt are supposed to terminate active encryption decryption operations This was not being done properly but has now been fixed p6ISymmetricCrypto::encryptEnd and p6ISymmetricCrypto::decryptEnd did not return zero for data length returned when there is no data to be returned Caller would believe that there was more encrypted decrypted data for a final block when there was none Now these functions properly return a zero data length returned when there is no data for the caller Proper handling of the CKA_ALWAYS_AUTHENTICATE attribute was not implemented Fixed race condition in the use of a semaphore that protects calls to C_Initialize and C_Finalize Created native linux installer for only versions of Linux operating systems and DestroyMutex calls on Thales and HPE HSMs Added new component p6ISemaphore which implements a platform independent named semaphore Minimum glibc version is now Integrated the Utimaco HSM PKCS under the P6R PKCS Utimaco HSM can be mapped into a P6R PKCS Utimaco Token The P6R Utimaco Token also converts Utimaco HSM vendor extension mechanism codes into and out of PKCS codes where ever possible Added the following PKCS11 API functions to P6R s software C_SignInit
CK_BBOOL CK_SLOT_ID_PTR CK_ULONG_PTR pulCount
CK_NOTIFICATION CK_VOID_PTR pApplication
CK_ULONG CK_SESSION_HANDLE
CK_BBOOL CK_SLOT_ID_PTR pSlotList
it may not contain all the symbols used by this software If you run into undefined symbol please let us know and we can provide you a build that will be compatible with your specific when KMIP messages are in XML or JSON no pretty printing is done in order to capture exactly what is sent received from the server On any error other than CKR_BUFFER_TOO_SMALL functions C_Encrypt and C_Decrypt are supposed to terminate active encryption decryption operations This was not being done properly but has now been fixed p6ISymmetricCrypto::encryptEnd and p6ISymmetricCrypto::decryptEnd did not return zero for data length returned when there is no data to be returned Caller would believe that there was more encrypted decrypted data for a final block when there was none Now these functions properly return a zero data length returned when there is no data for the caller Proper handling of the CKA_ALWAYS_AUTHENTICATE attribute was not implemented Fixed race condition in the use of a semaphore that protects calls to C_Initialize and C_Finalize Created native linux installer for only versions of Linux operating systems and DestroyMutex calls on Thales and HPE HSMs Added new component p6ISemaphore which implements a platform independent named semaphore Minimum glibc version is now Integrated the Utimaco HSM PKCS under the P6R PKCS Utimaco HSM can be mapped into a P6R PKCS Utimaco Token The P6R Utimaco Token also converts Utimaco HSM vendor extension mechanism codes into and out of PKCS codes where ever possible Added the following PKCS11 API functions to P6R s software C_GenerateRandom
#define CK_PKCS11_FUNCTION_INFO(name)
CK_SLOT_INFO CK_PTR CK_SLOT_INFO_PTR
CK_BYTE CK_PTR CK_BYTE_PTR
it may not contain all the symbols used by this software If you run into undefined symbol please let us know and we can provide you a build that will be compatible with your specific when KMIP messages are in XML or JSON no pretty printing is done in order to capture exactly what is sent received from the server On any error other than CKR_BUFFER_TOO_SMALL functions C_Encrypt and C_Decrypt are supposed to terminate active encryption decryption operations This was not being done properly but has now been fixed p6ISymmetricCrypto::encryptEnd and p6ISymmetricCrypto::decryptEnd did not return zero for data length returned when there is no data to be returned Caller would believe that there was more encrypted decrypted data for a final block when there was none Now these functions properly return a zero data length returned when there is no data for the caller Proper handling of the CKA_ALWAYS_AUTHENTICATE attribute was not implemented Fixed race condition in the use of a semaphore that protects calls to C_Initialize and C_Finalize Created native linux installer for only versions of Linux operating systems and DestroyMutex calls on Thales and HPE HSMs Added new component p6ISemaphore which implements a platform independent named semaphore Minimum glibc version is now Integrated the Utimaco HSM PKCS under the P6R PKCS Utimaco HSM can be mapped into a P6R PKCS Utimaco Token The P6R Utimaco Token also converts Utimaco HSM vendor extension mechanism codes into and out of PKCS codes where ever possible Added the following PKCS11 API functions to P6R s software C_DecryptFinal
it may not contain all the symbols used by this software If you run into undefined symbol please let us know and we can provide you a build that will be compatible with your specific when KMIP messages are in XML or JSON no pretty printing is done in order to capture exactly what is sent received from the server On any error other than CKR_BUFFER_TOO_SMALL functions C_Encrypt and C_Decrypt are supposed to terminate active encryption decryption operations This was not being done properly but has now been fixed p6ISymmetricCrypto::encryptEnd and p6ISymmetricCrypto::decryptEnd did not return zero for data length returned when there is no data to be returned Caller would believe that there was more encrypted decrypted data for a final block when there was none Now these functions properly return a zero data length returned when there is no data for the caller Proper handling of the CKA_ALWAYS_AUTHENTICATE attribute was not implemented Fixed race condition in the use of a semaphore that protects calls to C_Initialize and C_Finalize Created native linux installer for only versions of Linux operating systems and DestroyMutex calls on Thales and HPE HSMs Added new component p6ISemaphore which implements a platform independent named semaphore Minimum glibc version is now Integrated the Utimaco HSM PKCS under the P6R PKCS Utimaco HSM can be mapped into a P6R PKCS Utimaco Token The P6R Utimaco Token also converts Utimaco HSM vendor extension mechanism codes into and out of PKCS codes where ever possible Added the following PKCS11 API functions to P6R s software C_Verify
CK_ULONG CK_PTR CK_ULONG_PTR
it may not contain all the symbols used by this software If you run into undefined symbol please let us know and we can provide you a build that will be compatible with your specific when KMIP messages are in XML or JSON no pretty printing is done in order to capture exactly what is sent received from the server On any error other than CKR_BUFFER_TOO_SMALL functions C_Encrypt and C_Decrypt are supposed to terminate active encryption decryption operations This was not being done properly but has now been fixed p6ISymmetricCrypto::encryptEnd and p6ISymmetricCrypto::decryptEnd did not return zero for data length returned when there is no data to be returned Caller would believe that there was more encrypted decrypted data for a final block when there was none Now these functions properly return a zero data length returned when there is no data for the caller Proper handling of the CKA_ALWAYS_AUTHENTICATE attribute was not implemented Fixed race condition in the use of a semaphore that protects calls to C_Initialize and C_Finalize Created native linux installer for only versions of Linux operating systems and DestroyMutex calls on Thales and HPE HSMs Added new component p6ISemaphore which implements a platform independent named semaphore Minimum glibc version is now Integrated the Utimaco HSM PKCS under the P6R PKCS Utimaco HSM can be mapped into a P6R PKCS Utimaco Token The P6R Utimaco Token also converts Utimaco HSM vendor extension mechanism codes into and out of PKCS codes where ever possible Added the following PKCS11 API functions to P6R s software C_Sign
CK_ATTRIBUTE CK_PTR CK_ATTRIBUTE_PTR
CK_UTF8CHAR CK_PTR CK_UTF8CHAR_PTR
CK_SESSION_HANDLE CK_PTR CK_SESSION_HANDLE_PTR