Developer's Guide
 All Classes Namespaces Files Functions Variables Typedefs Enumerations Enumerator Macros Groups Pages
readme.txt File Reference

Functions

it may not contain all the
symbols used by this software
If you run into undefined
symbol please let us know and
we can provide you a build
that will be compatible with
your specific when KMIP
messages are in XML or JSON no
pretty printing is done in
order to capture exactly what
is sent received from the
server On any error other than
CKR_BUFFER_TOO_SMALL functions
C_Encrypt and C_Decrypt are
supposed to terminate active
encryption decryption
operations This was not being
done properly but has now been
fixed
p6ISymmetricCrypto::encryptEnd
and
p6ISymmetricCrypto::decryptEnd
did not return zero for data
length returned when there is
no data to be returned Caller
would believe that there was
more encrypted decrypted data
for a final block when there
was none Now these functions
properly return a zero data
length returned when there is
no data for the caller Proper
handling of the
CKA_ALWAYS_AUTHENTICATE
attribute was not implemented
Fixed race condition in the
use of a semaphore that
protects calls to C_Initialize
and C_Finalize Created native
linux installer for only
versions of Linux operating
systems and DestroyMutex calls
on 
C_Initialize ().-CKA_TRUSTED defaults to CK_FALSE when certificates are added via a call to C_CreateObject().-Third party tokens that do not support token re-initialization still had their User PIN deleted on a second call to C_InitToken.Now the user PIN is only deleted if the third party token re-initialization code is successful.-C_GetAttribute did not support the CKA_VALUE_LEN attribute.Now the correct value is returned if the attribute is associated with the object being accessed.-Added The p6ITrustedStorage struct override ion that any can implement itself.It was used by the main PKCS11 wrapper classes to proved a trusted storage for all 3rd party tokens so they would not have to design key storage it the HSM does not store the keys in itself(e.g.
 
it may not contain all the
symbols used by this software
If you run into undefined
symbol please let us know and
we can provide you a build
that will be compatible with
your specific when KMIP
messages are in XML or JSON no
pretty printing is done in
order to capture exactly what
is sent received from the
server On any error other than
CKR_BUFFER_TOO_SMALL functions
C_Encrypt and C_Decrypt are
supposed to terminate active
encryption decryption
operations This was not being
done properly but has now been
fixed
p6ISymmetricCrypto::encryptEnd
and
p6ISymmetricCrypto::decryptEnd
did not return zero for data
length returned when there is
no data to be returned Caller
would believe that there was
more encrypted decrypted data
for a final block when there
was none Now these functions
properly return a zero data
length returned when there is
no data for the caller Proper
handling of the
CKA_ALWAYS_AUTHENTICATE
attribute was not implemented
Fixed race condition in the
use of a semaphore that
protects calls to C_Initialize
and C_Finalize Created native
linux installer for only
versions of Linux operating
systems and DestroyMutex calls
on Thales and HPE HSMs Added
new component p6ISemaphore
which implements a platform
independent named semaphore
Minimum glibc version is now
Integrated the Utimaco HSM
PKCS under the P6R PKCS
Utimaco HSM can be mapped into
a P6R PKCS Utimaco Token The
P6R Utimaco Token also
converts Utimaco HSM vendor
extension mechanism codes into
and out of PKCS codes where
ever possible Added the
following PKCS11 API functions
to P6R s software and C_Digest
Added streaming API calls to
the p6Digest object in support
of similar functions required
for our Software token in
PKCS11 Provide scripts to
verify the environment on
Centos and Ubuntu Linux
distributions They can be run
to ensure that everything
needed for SKC is present and
configured properly These
scripts are located source
module and log level and log
module in addition to the log
event itself C_CopyObject was
not previously implemented for
the KMIP token Now a full
implementation supports all
PKCS objects can be copied
Also all PKCS attributes
defined to be able to be
modified during a 
copy (via the 2.40 specification) are also supported.+Added a new token type that allows the user of our PKCS11 library to communicate to a Utimaco CryptoServer HSM.We map one slot of the Utimaco HSM into one slot defined in our PKCS11 library.+Added a new token type that allows the user of our PKCS11 library to communicate to a Thales nShield Connect HSM.We map one slot of the Thales HSM into one slot defined in our PKCS11 library.+Added a new token type that allows the user of our PKCS11 library to communicate to a FutureX HSM.We map one slot of the FutureX HSM into one slot defined in our PKCS11 library.+Added a new token type that allows the user of our PKCS11 library to communicate to a DocuSign ARX PrivateServer HSM.We map one slot of the DocuSign HSM into one slot defined in our PKCS11 library.+Created a new command line tool named p6pkcs11tool to help support manage tokens and their individual configuration needs.The tool also allows the TLS client side certificate to be replaced once/before it expires.+New struct added-p6IKeystoreSSL2 which adds replace methjods that correspond to the existing import methods in p6iKeystoreSSL.New struct added-p6IKeystore3 which modified all the replace methods to return the UUID of the new item.+Added a new struct named p6ITrustedStorage which defines basic operations to a trusted storage mechanism.+Enhanced formatStrin() and formatStringW() to indicate common format string errors in the output buffer to make those issues more obvious.+Allow the XML and JSON message formats to encode the Cryptographic Usage Mask attribute as a decimal number.+Added support for HPE's Network Security Processor HSM in our PKCS11 implementation.*Removed pkcs11 standard header files from each example.They are already located in the SKC's include directory.*Changed p6InitializeLoader() and p6CleanupLoader() to implement reference counting so that multiple/nested calls will work more easily and cleanup appropriately.2015.1.0.14795-(linux) Fixed a problem in the example makefiles that caused the wrong calling convention to be used on 32bit platforms resulting in the example crashing.-(UEFI) Fixed Release UEFI build is throwing warnings about/Ob21s being an invalid compiler option-(UEFI) Fixed UEFI unit test fails testing KMIP decoder with"UNIQUE ID NOT FOUND"+Added flag to ensure interoperation with KMIP servers that have a bug properly reading out of a network socket.+Added TTLV logging before only had XML
 
it may not contain all the
symbols used by this software
If you run into undefined
symbol please let us know and
we can provide you a build
that will be compatible with
your specific when KMIP
messages are in XML or JSON no
pretty printing is done in
order to capture exactly what
is sent received from the
server On any error other than
CKR_BUFFER_TOO_SMALL functions
C_Encrypt and C_Decrypt are
supposed to terminate active
encryption decryption
operations This was not being
done properly but has now been
fixed
p6ISymmetricCrypto::encryptEnd
and
p6ISymmetricCrypto::decryptEnd
did not return zero for data
length returned when there is
no data to be returned Caller
would believe that there was
more encrypted decrypted data
for a final block when there
was none Now these functions
properly return a zero data
length returned when there is
no data for the caller Proper
handling of the
CKA_ALWAYS_AUTHENTICATE
attribute was not implemented
Fixed race condition in the
use of a semaphore that
protects calls to C_Initialize
and C_Finalize Created native
linux installer for only
versions of Linux operating
systems and DestroyMutex calls
on Thales and HPE HSMs Added
new component p6ISemaphore
which implements a platform
independent named semaphore
Minimum glibc version is now
Integrated the Utimaco HSM
PKCS under the P6R PKCS
Utimaco HSM can be mapped into
a P6R PKCS Utimaco Token The
P6R Utimaco Token also
converts Utimaco HSM vendor
extension mechanism codes into
and out of PKCS codes where
ever possible Added the
following PKCS11 API functions
to P6R s software and C_Digest
Added streaming API calls to
the p6Digest object in support
of similar functions required
for our Software token in
PKCS11 Provide scripts to
verify the environment on
Centos and Ubuntu Linux
distributions They can be run
to ensure that everything
needed for SKC is present and
configured properly These
scripts are located source
module and log level and log
module in addition to the log
event itself C_CopyObject was
not previously implemented for
the KMIP token Now a full
implementation supports all
PKCS objects can be copied
Also all PKCS attributes
defined to be able to be
modified during a JSON or just
a simple dump of the entire
binary message with no parsing
*Updated documentation for
building examples to include
Added missing file SkcPkg dec
for UEFI platforms Updated the
file comment to be correct for
KMIP example Corrected the
link order of libraries in
some example Makefiles Removed
support for SSLv2 since it is
vulnerable and many platforms
are now shipping with openSSL
versions that have this
support compiled out Specify
P6SSF_METHOD_SSLV2 for a
connection is synonymous with
P6SSF_METHOD_NEGOTIATE!Removed
Solaris makefiles from the
examples Supports PKCS reset
token allowing easy linking of
KMIP credentials via the use
of the keystore link
capability KMIP server side
Notify and Put responses needs
an empty payload rather than
return no payload Fixed an
issue where the loader would
needlessly read from dev
random on startup causing
large delays on low entropy 
systems (VMs).+Added support for Attestation to the API which was added fully in KMIP 1.2.+Added support allowing KMIP client to get any Key or certificate as a binary blob format.+Added SuiteB support.+Added limited UEFI platform support.A library providing support for accessing the low-level KMIP TTLV encoder/decoder interfaces is provided and linkable with native PE format UEFI drivers and applications.byte-code format is not supported.+Added support for Elliptical Curve Private Keys to support SuiteB crypto.+Added full support for KMIP 1.3 streaming Encryption and Hashing.+Add support for importing PEM encoded SSL credentials into the keystore.Keys and certs are automatically placed in the correct namespaces
 
it may not contain all the
symbols used by this software
If you run into undefined
symbol please let us know and
we can provide you a build
that will be compatible with
your specific when KMIP
messages are in XML or JSON no
pretty printing is done in
order to capture exactly what
is sent received from the
server On any error other than
CKR_BUFFER_TOO_SMALL functions
C_Encrypt and C_Decrypt are
supposed to terminate active
encryption decryption
operations This was not being
done properly but has now been
fixed
p6ISymmetricCrypto::encryptEnd
and
p6ISymmetricCrypto::decryptEnd
did not return zero for data
length returned when there is
no data to be returned Caller
would believe that there was
more encrypted decrypted data
for a final block when there
was none Now these functions
properly return a zero data
length returned when there is
no data for the caller Proper
handling of the
CKA_ALWAYS_AUTHENTICATE
attribute was not implemented
Fixed race condition in the
use of a semaphore that
protects calls to C_Initialize
and C_Finalize Created native
linux installer for only
versions of Linux operating
systems and DestroyMutex calls
on Thales and HPE HSMs Added
new component p6ISemaphore
which implements a platform
independent named semaphore
Minimum glibc version is now
Integrated the Utimaco HSM
PKCS under the P6R PKCS
Utimaco HSM can be mapped into
a P6R PKCS Utimaco Token The
P6R Utimaco Token also
converts Utimaco HSM vendor
extension mechanism codes into
and out of PKCS codes where
ever possible Added the
following PKCS11 API functions
to P6R s software and C_Digest
Added streaming API calls to
the p6Digest object in support
of similar functions required
for our Software token in
PKCS11 Provide scripts to
verify the environment on
Centos and Ubuntu Linux
distributions They can be run
to ensure that everything
needed for SKC is present and
configured properly These
scripts are located 
under (installdir)/scripts/install". + Low-level and p6ILogProducer logging output (in SKC) has been improved to include a timestamp
 

Variables

it may not contain all the
symbols used by this software
If you run into undefined
symbol please let us know and
we can provide you a build
that will be compatible with
your specific when KMIP
messages are in XML or JSON no
pretty printing is done in
order to capture exactly what
is sent received from the
server On any error other than
CKR_BUFFER_TOO_SMALL functions
C_Encrypt and C_Decrypt are
supposed to terminate active
encryption decryption
operations This was not being
done properly but has now been
fixed
p6ISymmetricCrypto::encryptEnd
and
p6ISymmetricCrypto::decryptEnd
did not return zero for data
length returned when there is
no data to be returned Caller
would believe that there was
more encrypted decrypted data
for a final block when there
was none Now these functions
properly return a zero data
length returned when there is
no data for the caller Proper
handling of the
CKA_ALWAYS_AUTHENTICATE
attribute was not implemented
Fixed race condition in the
use of a semaphore that
protects calls to C_Initialize
and C_Finalize Created native
linux installer for only
versions of Linux operating
systems and DestroyMutex calls
on Thales and HPE HSMs Added
new component p6ISemaphore
which implements a platform
independent named semaphore
Minimum glibc version is now
Integrated the Utimaco HSM
PKCS under the P6R PKCS
Utimaco HSM can be mapped into
a P6R PKCS Utimaco Token The
P6R Utimaco Token also
converts Utimaco HSM vendor
extension mechanism codes into
and out of PKCS codes where
ever possible Added the
following PKCS11 API functions
to P6R s software 
C_Decrypt
 
it may not contain all the
symbols used by this software
If you run into undefined
symbol please let us know and
we can provide you a build
that will be compatible with
your specific when KMIP
messages are in XML or JSON no
pretty printing is done in
order to capture exactly what
is sent received from the
server On any error other than
CKR_BUFFER_TOO_SMALL functions
C_Encrypt and C_Decrypt are
supposed to terminate active
encryption decryption
operations This was not being
done properly but has now been
fixed
p6ISymmetricCrypto::encryptEnd
and
p6ISymmetricCrypto::decryptEnd
did not return zero for data
length returned when there is
no data to be returned Caller
would believe that there was
more encrypted decrypted data
for a final block when there
was none Now these functions
properly return a zero data
length returned when there is
no data for the caller Proper
handling of the
CKA_ALWAYS_AUTHENTICATE
attribute was not implemented
Fixed race condition in the
use of a semaphore that
protects calls to C_Initialize
and C_Finalize Created native
linux installer for only
versions of Linux operating
systems and DestroyMutex calls
on Thales and HPE HSMs Added
new component p6ISemaphore
which implements a platform
independent named semaphore
Minimum glibc version is now
Integrated the Utimaco HSM
PKCS under the P6R PKCS
Utimaco HSM can be mapped into
a P6R PKCS Utimaco Token The
P6R Utimaco Token also
converts Utimaco HSM vendor
extension mechanism codes into
and out of PKCS codes where
ever possible Added the
following PKCS11 API functions
to P6R s software 
C_DecryptFinal
 
it may not contain all the
symbols used by this software
If you run into undefined
symbol please let us know and
we can provide you a build
that will be compatible with
your specific when KMIP
messages are in XML or JSON no
pretty printing is done in
order to capture exactly what
is sent received from the
server On any error other than
CKR_BUFFER_TOO_SMALL functions
C_Encrypt and C_Decrypt are
supposed to terminate active
encryption decryption
operations This was not being
done properly but has now been
fixed
p6ISymmetricCrypto::encryptEnd
and
p6ISymmetricCrypto::decryptEnd
did not return zero for data
length returned when there is
no data to be returned Caller
would believe that there was
more encrypted decrypted data
for a final block when there
was none Now these functions
properly return a zero data
length returned when there is
no data for the caller Proper
handling of the
CKA_ALWAYS_AUTHENTICATE
attribute was not implemented
Fixed race condition in the
use of a semaphore that
protects calls to C_Initialize
and C_Finalize Created native
linux installer for only
versions of Linux operating
systems and DestroyMutex calls
on Thales and HPE HSMs Added
new component p6ISemaphore
which implements a platform
independent named semaphore
Minimum glibc version is now
Integrated the Utimaco HSM
PKCS under the P6R PKCS
Utimaco HSM can be mapped into
a P6R PKCS Utimaco Token The
P6R Utimaco Token also
converts Utimaco HSM vendor
extension mechanism codes into
and out of PKCS codes where
ever possible Added the
following PKCS11 API functions
to P6R s software 
C_DecryptInit
 
it may not contain all the
symbols used by this software
If you run into undefined
symbol please let us know and
we can provide you a build
that will be compatible with
your specific when KMIP
messages are in XML or JSON no
pretty printing is done in
order to capture exactly what
is sent received from the
server On any error other than
CKR_BUFFER_TOO_SMALL functions
C_Encrypt and C_Decrypt are
supposed to terminate active
encryption decryption
operations This was not being
done properly but has now been
fixed
p6ISymmetricCrypto::encryptEnd
and
p6ISymmetricCrypto::decryptEnd
did not return zero for data
length returned when there is
no data to be returned Caller
would believe that there was
more encrypted decrypted data
for a final block when there
was none Now these functions
properly return a zero data
length returned when there is
no data for the caller Proper
handling of the
CKA_ALWAYS_AUTHENTICATE
attribute was not implemented
Fixed race condition in the
use of a semaphore that
protects calls to C_Initialize
and C_Finalize Created native
linux installer for only
versions of Linux operating
systems and DestroyMutex calls
on Thales and HPE HSMs Added
new component p6ISemaphore
which implements a platform
independent named semaphore
Minimum glibc version is now
Integrated the Utimaco HSM
PKCS under the P6R PKCS
Utimaco HSM can be mapped into
a P6R PKCS Utimaco Token The
P6R Utimaco Token also
converts Utimaco HSM vendor
extension mechanism codes into
and out of PKCS codes where
ever possible Added the
following PKCS11 API functions
to P6R s software 
C_DecryptUpdate
 
it may not contain all the
symbols used by this software
If you run into undefined
symbol please let us know and
we can provide you a build
that will be compatible with
your specific when KMIP
messages are in XML or JSON no
pretty printing is done in
order to capture exactly what
is sent received from the
server On any error other than
CKR_BUFFER_TOO_SMALL functions
C_Encrypt and C_Decrypt are
supposed to terminate active
encryption decryption
operations This was not being
done properly but has now been
fixed
p6ISymmetricCrypto::encryptEnd
and
p6ISymmetricCrypto::decryptEnd
did not return zero for data
length returned when there is
no data to be returned Caller
would believe that there was
more encrypted decrypted data
for a final block when there
was none Now these functions
properly return a zero data
length returned when there is
no data for the caller Proper
handling of the
CKA_ALWAYS_AUTHENTICATE
attribute was not implemented
Fixed race condition in the
use of a semaphore that
protects calls to C_Initialize
and C_Finalize Created native
linux installer for only
versions of Linux operating
systems and DestroyMutex calls
on Thales and HPE HSMs Added
new component p6ISemaphore
which implements a platform
independent named semaphore
Minimum glibc version is now
Integrated the Utimaco HSM
PKCS under the P6R PKCS
Utimaco HSM can be mapped into
a P6R PKCS Utimaco Token The
P6R Utimaco Token also
converts Utimaco HSM vendor
extension mechanism codes into
and out of PKCS codes where
ever possible Added the
following PKCS11 API functions
to P6R s software 
C_DigestInit
 
it may not contain all the
symbols used by this software
If you run into undefined
symbol please let us know and
we can provide you a build
that will be compatible with
your specific when KMIP
messages are in XML or JSON no
pretty printing is done in
order to capture exactly what
is sent received from the
server On any error other than
CKR_BUFFER_TOO_SMALL functions
C_Encrypt and C_Decrypt are
supposed to terminate active
encryption decryption
operations This was not being
done properly but has now been
fixed
p6ISymmetricCrypto::encryptEnd
and
p6ISymmetricCrypto::decryptEnd
did not return zero for data
length returned when there is
no data to be returned Caller
would believe that there was
more encrypted decrypted data
for a final block when there
was none Now these functions
properly return a zero data
length returned when there is
no data for the caller Proper
handling of the
CKA_ALWAYS_AUTHENTICATE
attribute was not implemented
Fixed race condition in the
use of a semaphore that
protects calls to C_Initialize
and C_Finalize Created native
linux installer for only
versions of Linux operating
systems and DestroyMutex calls
on Thales and HPE HSMs Added
new component p6ISemaphore
which implements a platform
independent named semaphore
Minimum glibc version is now
Integrated the Utimaco HSM
PKCS under the P6R PKCS
Utimaco HSM can be mapped into
a P6R PKCS Utimaco Token The
P6R Utimaco Token also
converts Utimaco HSM vendor
extension mechanism codes into
and out of PKCS codes where
ever possible Added the
following PKCS11 API functions
to P6R s software 
C_Encrypt
 
it may not contain all the
symbols used by this software
If you run into undefined
symbol please let us know and
we can provide you a build
that will be compatible with
your specific when KMIP
messages are in XML or JSON no
pretty printing is done in
order to capture exactly what
is sent received from the
server On any error other than
CKR_BUFFER_TOO_SMALL functions
C_Encrypt and C_Decrypt are
supposed to terminate active
encryption decryption
operations This was not being
done properly but has now been
fixed
p6ISymmetricCrypto::encryptEnd
and
p6ISymmetricCrypto::decryptEnd
did not return zero for data
length returned when there is
no data to be returned Caller
would believe that there was
more encrypted decrypted data
for a final block when there
was none Now these functions
properly return a zero data
length returned when there is
no data for the caller Proper
handling of the
CKA_ALWAYS_AUTHENTICATE
attribute was not implemented
Fixed race condition in the
use of a semaphore that
protects calls to C_Initialize
and C_Finalize Created native
linux installer for only
versions of Linux operating
systems and DestroyMutex calls
on Thales and HPE HSMs Added
new component p6ISemaphore
which implements a platform
independent named semaphore
Minimum glibc version is now
Integrated the Utimaco HSM
PKCS under the P6R PKCS
Utimaco HSM can be mapped into
a P6R PKCS Utimaco Token The
P6R Utimaco Token also
converts Utimaco HSM vendor
extension mechanism codes into
and out of PKCS codes where
ever possible Added the
following PKCS11 API functions
to P6R s software 
C_EncryptFinal
 
it may not contain all the
symbols used by this software
If you run into undefined
symbol please let us know and
we can provide you a build
that will be compatible with
your specific when KMIP
messages are in XML or JSON no
pretty printing is done in
order to capture exactly what
is sent received from the
server On any error other than
CKR_BUFFER_TOO_SMALL functions
C_Encrypt and C_Decrypt are
supposed to terminate active
encryption decryption
operations This was not being
done properly but has now been
fixed
p6ISymmetricCrypto::encryptEnd
and
p6ISymmetricCrypto::decryptEnd
did not return zero for data
length returned when there is
no data to be returned Caller
would believe that there was
more encrypted decrypted data
for a final block when there
was none Now these functions
properly return a zero data
length returned when there is
no data for the caller Proper
handling of the
CKA_ALWAYS_AUTHENTICATE
attribute was not implemented
Fixed race condition in the
use of a semaphore that
protects calls to C_Initialize
and C_Finalize Created native
linux installer for only
versions of Linux operating
systems and DestroyMutex calls
on Thales and HPE HSMs Added
new component p6ISemaphore
which implements a platform
independent named semaphore
Minimum glibc version is now
Integrated the Utimaco HSM
PKCS under the P6R PKCS
Utimaco HSM can be mapped into
a P6R PKCS Utimaco Token The
P6R Utimaco Token also
converts Utimaco HSM vendor
extension mechanism codes into
and out of PKCS codes where
ever possible Added the
following PKCS11 API functions
to P6R s software 
C_EncryptInit
 
it may not contain all the
symbols used by this software
If you run into undefined
symbol please let us know and
we can provide you a build
that will be compatible with
your specific when KMIP
messages are in XML or JSON no
pretty printing is done in
order to capture exactly what
is sent received from the
server On any error other than
CKR_BUFFER_TOO_SMALL functions
C_Encrypt and C_Decrypt are
supposed to terminate active
encryption decryption
operations This was not being
done properly but has now been
fixed
p6ISymmetricCrypto::encryptEnd
and
p6ISymmetricCrypto::decryptEnd
did not return zero for data
length returned when there is
no data to be returned Caller
would believe that there was
more encrypted decrypted data
for a final block when there
was none Now these functions
properly return a zero data
length returned when there is
no data for the caller Proper
handling of the
CKA_ALWAYS_AUTHENTICATE
attribute was not implemented
Fixed race condition in the
use of a semaphore that
protects calls to C_Initialize
and C_Finalize Created native
linux installer for only
versions of Linux operating
systems and DestroyMutex calls
on Thales and HPE HSMs Added
new component p6ISemaphore
which implements a platform
independent named semaphore
Minimum glibc version is now
Integrated the Utimaco HSM
PKCS under the P6R PKCS
Utimaco HSM can be mapped into
a P6R PKCS Utimaco Token The
P6R Utimaco Token also
converts Utimaco HSM vendor
extension mechanism codes into
and out of PKCS codes where
ever possible Added the
following PKCS11 API functions
to P6R s software 
C_EncryptUpdate
 
it may not contain all the
symbols used by this software
If you run into undefined
symbol please let us know and
we can provide you a build
that will be compatible with
your specific when KMIP
messages are in XML or JSON no
pretty printing is done in
order to capture exactly what
is sent received from the
server On any error other than
CKR_BUFFER_TOO_SMALL functions
C_Encrypt and C_Decrypt are
supposed to terminate active
encryption decryption
operations This was not being
done properly but has now been
fixed
p6ISymmetricCrypto::encryptEnd
and
p6ISymmetricCrypto::decryptEnd
did not return zero for data
length returned when there is
no data to be returned Caller
would believe that there was
more encrypted decrypted data
for a final block when there
was none Now these functions
properly return a zero data
length returned when there is
no data for the caller Proper
handling of the
CKA_ALWAYS_AUTHENTICATE
attribute was not implemented
Fixed race condition in the
use of a semaphore that
protects calls to C_Initialize
and C_Finalize Created native
linux installer for only
versions of Linux operating
systems and DestroyMutex calls
on Thales and HPE HSMs Added
new component p6ISemaphore
which implements a platform
independent named semaphore
Minimum glibc version is now
Integrated the Utimaco HSM
PKCS under the P6R PKCS
Utimaco HSM can be mapped into
a P6R PKCS Utimaco Token The
P6R Utimaco Token also
converts Utimaco HSM vendor
extension mechanism codes into
and out of PKCS codes where
ever possible Added the
following PKCS11 API functions
to P6R s software 
C_GenerateKeyPair
 
it may not contain all the
symbols used by this software
If you run into undefined
symbol please let us know and
we can provide you a build
that will be compatible with
your specific when KMIP
messages are in XML or JSON no
pretty printing is done in
order to capture exactly what
is sent received from the
server On any error other than
CKR_BUFFER_TOO_SMALL functions
C_Encrypt and C_Decrypt are
supposed to terminate active
encryption decryption
operations This was not being
done properly but has now been
fixed
p6ISymmetricCrypto::encryptEnd
and
p6ISymmetricCrypto::decryptEnd
did not return zero for data
length returned when there is
no data to be returned Caller
would believe that there was
more encrypted decrypted data
for a final block when there
was none Now these functions
properly return a zero data
length returned when there is
no data for the caller Proper
handling of the
CKA_ALWAYS_AUTHENTICATE
attribute was not implemented
Fixed race condition in the
use of a semaphore that
protects calls to C_Initialize
and C_Finalize Created native
linux installer for only
versions of Linux operating
systems and DestroyMutex calls
on Thales and HPE HSMs Added
new component p6ISemaphore
which implements a platform
independent named semaphore
Minimum glibc version is now
Integrated the Utimaco HSM
PKCS under the P6R PKCS
Utimaco HSM can be mapped into
a P6R PKCS Utimaco Token The
P6R Utimaco Token also
converts Utimaco HSM vendor
extension mechanism codes into
and out of PKCS codes where
ever possible Added the
following PKCS11 API functions
to P6R s software 
C_GenerateRandom
 
it may not contain all the
symbols used by this software
If you run into undefined
symbol please let us know and
we can provide you a build
that will be compatible with
your specific when KMIP
messages are in XML or JSON no
pretty printing is done in
order to capture exactly what
is sent received from the
server On any error other than
CKR_BUFFER_TOO_SMALL functions
C_Encrypt and C_Decrypt are
supposed to terminate active
encryption decryption
operations This was not being
done properly but has now been
fixed
p6ISymmetricCrypto::encryptEnd
and
p6ISymmetricCrypto::decryptEnd
did not return zero for data
length returned when there is
no data to be returned Caller
would believe that there was
more encrypted decrypted data
for a final block when there
was none Now these functions
properly return a zero data
length returned when there is
no data for the caller Proper
handling of the
CKA_ALWAYS_AUTHENTICATE
attribute was not implemented
Fixed race condition in the
use of a semaphore that
protects calls to C_Initialize
and C_Finalize Created native
linux installer for only
versions of Linux operating
systems and DestroyMutex calls
on Thales and HPE HSMs Added
new component p6ISemaphore
which implements a platform
independent named semaphore
Minimum glibc version is now
Integrated the Utimaco HSM
PKCS under the P6R PKCS
Utimaco HSM can be mapped into
a P6R PKCS Utimaco Token The
P6R Utimaco Token also
converts Utimaco HSM vendor
extension mechanism codes into
and out of PKCS codes where
ever possible Added the
following PKCS11 API functions
to P6R s software 
C_Sign
 
it may not contain all the
symbols used by this software
If you run into undefined
symbol please let us know and
we can provide you a build
that will be compatible with
your specific when KMIP
messages are in XML or JSON no
pretty printing is done in
order to capture exactly what
is sent received from the
server On any error other than
CKR_BUFFER_TOO_SMALL functions
C_Encrypt and C_Decrypt are
supposed to terminate active
encryption decryption
operations This was not being
done properly but has now been
fixed
p6ISymmetricCrypto::encryptEnd
and
p6ISymmetricCrypto::decryptEnd
did not return zero for data
length returned when there is
no data to be returned Caller
would believe that there was
more encrypted decrypted data
for a final block when there
was none Now these functions
properly return a zero data
length returned when there is
no data for the caller Proper
handling of the
CKA_ALWAYS_AUTHENTICATE
attribute was not implemented
Fixed race condition in the
use of a semaphore that
protects calls to C_Initialize
and C_Finalize Created native
linux installer for only
versions of Linux operating
systems and DestroyMutex calls
on Thales and HPE HSMs Added
new component p6ISemaphore
which implements a platform
independent named semaphore
Minimum glibc version is now
Integrated the Utimaco HSM
PKCS under the P6R PKCS
Utimaco HSM can be mapped into
a P6R PKCS Utimaco Token The
P6R Utimaco Token also
converts Utimaco HSM vendor
extension mechanism codes into
and out of PKCS codes where
ever possible Added the
following PKCS11 API functions
to P6R s software 
C_SignInit
 
it may not contain all the
symbols used by this software
If you run into undefined
symbol please let us know and
we can provide you a build
that will be compatible with
your specific when KMIP
messages are in XML or JSON no
pretty printing is done in
order to capture exactly what
is sent received from the
server On any error other than
CKR_BUFFER_TOO_SMALL functions
C_Encrypt and C_Decrypt are
supposed to terminate active
encryption decryption
operations This was not being
done properly but has now been
fixed
p6ISymmetricCrypto::encryptEnd
and
p6ISymmetricCrypto::decryptEnd
did not return zero for data
length returned when there is
no data to be returned Caller
would believe that there was
more encrypted decrypted data
for a final block when there
was none Now these functions
properly return a zero data
length returned when there is
no data for the caller Proper
handling of the
CKA_ALWAYS_AUTHENTICATE
attribute was not implemented
Fixed race condition in the
use of a semaphore that
protects calls to C_Initialize
and C_Finalize Created native
linux installer for only
versions of Linux operating
systems and DestroyMutex calls
on Thales and HPE HSMs Added
new component p6ISemaphore
which implements a platform
independent named semaphore
Minimum glibc version is now
Integrated the Utimaco HSM
PKCS under the P6R PKCS
Utimaco HSM can be mapped into
a P6R PKCS Utimaco Token The
P6R Utimaco Token also
converts Utimaco HSM vendor
extension mechanism codes into
and out of PKCS codes where
ever possible Added the
following PKCS11 API functions
to P6R s software 
C_Verify
 
it may not contain all the
symbols used by this software
If you run into undefined
symbol please let us know and
we can provide you a build
that will be compatible with
your specific when KMIP
messages are in XML or JSON no
pretty printing is done in
order to capture exactly what
is sent received from the
server On any error other than
CKR_BUFFER_TOO_SMALL functions
C_Encrypt and C_Decrypt are
supposed to terminate active
encryption decryption
operations This was not being
done properly but has now been
fixed
p6ISymmetricCrypto::encryptEnd
and
p6ISymmetricCrypto::decryptEnd
did not return zero for data
length returned when there is
no data to be returned Caller
would believe that there was
more encrypted decrypted data
for a final block when there
was none Now these functions
properly return a zero data
length returned when there is
no data for the caller Proper
handling of the
CKA_ALWAYS_AUTHENTICATE
attribute was not implemented
Fixed race condition in the
use of a semaphore that
protects calls to C_Initialize
and C_Finalize Created native
linux installer for only
versions of Linux operating
systems and DestroyMutex calls
on Thales and HPE HSMs Added
new component p6ISemaphore
which implements a platform
independent named semaphore
Minimum glibc version is now
Integrated the Utimaco HSM
PKCS under the P6R PKCS
Utimaco HSM can be mapped into
a P6R PKCS Utimaco Token The
P6R Utimaco Token also
converts Utimaco HSM vendor
extension mechanism codes into
and out of PKCS codes where
ever possible Added the
following PKCS11 API functions
to P6R s software 
C_VerifyInit
 
it may not contain all the
symbols used by this software
If you run into undefined
symbol 
errors
 
it may not contain all the
symbols used by this software
If you run into undefined
symbol please let us know and
we can provide you a build
that will be compatible with
your specific when KMIP
messages are in XML or JSON no
pretty printing is done in
order to capture exactly what
is sent received from the
server On any error other than
CKR_BUFFER_TOO_SMALL functions
C_Encrypt and C_Decrypt are
supposed to terminate active
encryption decryption
operations This was not being
done properly but has now been
fixed
p6ISymmetricCrypto::encryptEnd
and
p6ISymmetricCrypto::decryptEnd
did not return zero for data
length returned when there is
no data to be returned Caller
would believe that there was
more encrypted decrypted data
for a final block when there
was none Now these functions
properly return a zero data
length returned when there is
no data for the caller Proper
handling of the
CKA_ALWAYS_AUTHENTICATE
attribute was not implemented
Fixed race condition in the
use of a semaphore that
protects calls to C_Initialize
and C_Finalize Created native
linux installer for only
versions of Linux operating
systems and DestroyMutex calls
on Thales and HPE HSMs Added
new component p6ISemaphore
which implements a platform
independent named semaphore
Minimum glibc version is now
Integrated the Utimaco HSM
PKCS under the P6R PKCS
Utimaco HSM can be mapped into
a P6R PKCS Utimaco Token The
P6R Utimaco Token also
converts Utimaco HSM vendor
extension mechanism codes into
and out of PKCS codes where
ever possible Added the
following PKCS11 API functions
to P6R s software and C_Digest
Added streaming API calls to
the p6Digest object in support
of similar functions required
for our Software token in
PKCS11 Provide scripts to
verify the environment on
Centos and Ubuntu Linux
distributions They can be run
to ensure that everything
needed for SKC is present and
configured properly These
scripts are located source
module and 
line
 
it may not contain all the
symbols used by this software
If you run into undefined
symbol please let us know and
we can provide you a build
that will be compatible with
your specific when KMIP
messages are in XML or JSON no
pretty printing is done in
order to capture exactly what
is sent received from the
server On any error other than
CKR_BUFFER_TOO_SMALL functions
C_Encrypt and C_Decrypt are
supposed to terminate active
encryption decryption
operations This was not being
done properly but has now been
fixed
p6ISymmetricCrypto::encryptEnd
and
p6ISymmetricCrypto::decryptEnd
did not return zero for data
length returned when there is
no data to be returned Caller
would believe that there was
more encrypted decrypted data
for a final block when there
was none Now these functions
properly return a zero data
length returned when there is
no data for the caller Proper
handling of the
CKA_ALWAYS_AUTHENTICATE
attribute was not implemented
Fixed race condition in the
use of a semaphore that
protects calls to C_Initialize
and C_Finalize Created native
linux installer for only
versions of Linux operating
systems 
LockMutex
 
it may not contain all the
symbols used by this software
If you run into undefined
symbol please let us know and
we can provide you a build
that will be compatible with
your specific 
options
 
it may not contain all the
symbols used by this software
If you run into undefined
symbol please let us know and
we can provide you a build
that will be compatible with
your specific when KMIP
messages are in XML or JSON no
pretty printing is done in
order to capture exactly what
is sent received from the
server On any error other than
CKR_BUFFER_TOO_SMALL functions
C_Encrypt and C_Decrypt are
supposed to terminate active
encryption decryption
operations This was not being
done properly but has now been
fixed
p6ISymmetricCrypto::encryptEnd
and
p6ISymmetricCrypto::decryptEnd
did not return zero for data
length returned when there is
no data to be returned Caller
would believe that there was
more encrypted decrypted data
for a final block when there
was none Now these functions
properly return a zero data
length returned when there is
no data for the caller Proper
handling of the
CKA_ALWAYS_AUTHENTICATE
attribute was not implemented
Fixed race condition in the
use of a semaphore that
protects calls to C_Initialize
and C_Finalize Created native
linux installer for only
versions of Linux operating
systems and DestroyMutex calls
on Thales and HPE HSMs Added
new component p6ISemaphore
which implements a platform
independent named semaphore
Minimum glibc version is now
Integrated the Utimaco HSM
PKCS under the P6R PKCS
Utimaco HSM can be mapped into
a P6R PKCS Utimaco Token The
P6R Utimaco Token also
converts Utimaco HSM vendor
extension mechanism codes into
and out of PKCS codes where
ever possible Added the
following PKCS11 API functions
to P6R s software and C_Digest
Added streaming API calls to
the p6Digest object in support
of similar functions required
for our Software token in
PKCS11 Provide scripts to
verify the environment on
Centos and Ubuntu Linux
distributions They can be run
to ensure that everything
needed for SKC is present and
configured properly These
scripts are located 
threadid
 
it may not contain all the
symbols used by this software
If you run into undefined
symbol please let us know and
we can provide you a build
that will be compatible with
your specific when KMIP
messages are in XML or JSON no
pretty printing is done in
order to capture exactly what
is sent received from the
server On any error other than
CKR_BUFFER_TOO_SMALL functions
C_Encrypt and C_Decrypt are
supposed to terminate active
encryption decryption
operations This was not being
done properly but has now been
fixed
p6ISymmetricCrypto::encryptEnd
and
p6ISymmetricCrypto::decryptEnd
did not return zero for data
length returned when there is
no data to be returned Caller
would believe that there was
more encrypted decrypted data
for a final block when there
was none Now these functions
properly return a zero data
length returned when there is
no data for the caller Proper
handling of the
CKA_ALWAYS_AUTHENTICATE
attribute was not implemented
Fixed race condition in the
use of a semaphore that
protects calls to C_Initialize
and C_Finalize Created native
linux installer for only
versions of Linux operating
systems and DestroyMutex calls
on Thales and HPE HSMs Added
new component p6ISemaphore
which implements a platform
independent named semaphore
Minimum glibc version is now
Integrated the Utimaco HSM
PKCS under the P6R PKCS
Utimaco HSM can be mapped into
a P6R PKCS Utimaco Token The
P6R Utimaco Token also
converts Utimaco HSM vendor
extension mechanism codes into
and out of PKCS codes where
ever possible Added the
following PKCS11 API functions
to P6R s software 
token
 
it may not contain all the
symbols used by this software
If you run into undefined
symbol please let us know and
we can provide you a build
that will be compatible with
your specific when KMIP
messages are in XML or JSON no
pretty printing is done in
order to capture exactly what
is sent received from the
server On any error other than
CKR_BUFFER_TOO_SMALL functions
C_Encrypt and C_Decrypt are
supposed to terminate active
encryption decryption
operations This was not being
done properly but has now been
fixed
p6ISymmetricCrypto::encryptEnd
and
p6ISymmetricCrypto::decryptEnd
did not return zero for data
length returned when there is
no data to be returned Caller
would believe that there was
more encrypted decrypted data
for a final block when there
was none Now these functions
properly return a zero data
length returned when there is
no data for the caller Proper
handling of the
CKA_ALWAYS_AUTHENTICATE
attribute was not implemented
Fixed race condition in the
use of a semaphore that
protects calls to C_Initialize
and C_Finalize Created native
linux installer for only
versions of Linux operating
systems 
UEFI
 
it may not contain all the
symbols used by this software
If you run into undefined
symbol please let us know and
we can provide you a build
that will be compatible with
your specific when KMIP
messages are in XML or JSON no
pretty printing is done in
order to capture exactly what
is sent received from the
server On any error other than
CKR_BUFFER_TOO_SMALL functions
C_Encrypt and C_Decrypt are
supposed to terminate active
encryption decryption
operations This was not being
done properly but has now been
fixed
p6ISymmetricCrypto::encryptEnd
and
p6ISymmetricCrypto::decryptEnd
did not return zero for data
length returned when there is
no data to be returned Caller
would believe that there was
more encrypted decrypted data
for a final block when there
was none Now these functions
properly return a zero data
length returned when there is
no data for the caller Proper
handling of the
CKA_ALWAYS_AUTHENTICATE
attribute was not implemented
Fixed race condition in the
use of a semaphore that
protects calls to C_Initialize
and C_Finalize Created native
linux installer for only
versions of Linux operating
systems 
UnlockMutex