OASIS Mailing List ArchivesView the OASIS mailing list archive below
or browse/search using MarkMail.

 


Help: OASIS Mailing Lists Help | MarkMail Help

pkcs11 message

[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]


Subject: Groups - New_wording_for_ckr_buffer_too_small.docx uploaded


Document Name: New_wording_for_ckr_buffer_too_small.docx

Description
Here's the wording which implements the semantics we talked about. On
further reflection we could solve the issue in another way:

Note that even though the operation isn't closed, future calls to
xxxxUpdate are undefined if the output buffer is specified.

I believe the expected implementation of the semantic was:
1) if no buffer is specified, return CKR_BUFFER_TOO_SMALL and a length big
enough to handle whatever data is left.
2) if a buffer is specified, do the final decrypt and now we know the
length. if the length is too small, return the full length and cache the
decrypted data. On the next call we return that decrypted data.

In this mode, calling C_DecryptUpdate again, or using a different encrypted
buffer in C_Decrypt would not work as expected.

Anyway I think we should discuss this on our next call.

bob
Download Latest Revision
Public Download Link

Submitter: Mr. Robert Relyea
Group: OASIS PKCS 11 TC
Folder: Working Drafts
Date submitted: 2020-04-27 16:08:42



[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]